
We present here a generalized Girard-Waring identity constructed from recursive sequences. We also present the construction of Binet Girard-Waring identity and classical Girard-Waring identity by using the generalized Girard-Waring identity and divided differences. The application of the generalized Girard-Waring identity to the transformation of recursive sequences of numbers and polynomials is discussed.
Citation: Tian-Xiao He, Peter J.-S. Shiue, Zihan Nie, Minghao Chen. Recursive sequences and girard-waring identities with applications in sequence transformation[J]. Electronic Research Archive, 2020, 28(2): 1049-1062. doi: 10.3934/era.2020057
[1] | Maria Parapouli, Anastasios Vasileiadis, Amalia-Sofia Afendra, Efstathios Hatziloukas . Saccharomyces cerevisiae and its industrial applications. AIMS Microbiology, 2020, 6(1): 1-31. doi: 10.3934/microbiol.2020001 |
[2] | Alfred Mitema, Naser Aliye Feto . Molecular and Vegetative Compatibility Groups Characterization of Aspergillus flavus Isolates from Kenya. AIMS Microbiology, 2020, 6(3): 231-249. doi: 10.3934/microbiol.2020015 |
[3] | Bambang Irawan, Aandi Saputra, Salman Farisi, Yulianty Yulianty, Sri Wahyuningsih, Noviany Noviany, Yandri Yandri, Sutopo Hadi . The use of cellulolytic Aspergillus sp. inoculum to improve the quality of Pineapple compost. AIMS Microbiology, 2023, 9(1): 41-54. doi: 10.3934/microbiol.2023003 |
[4] | Mohammed M. M. Abdelrahem, Mohamed E. Abouelela, Nageh F. Abo-Dahab, Abdallah M. A. Hassane . Aspergillus-Penicillium co-culture: An investigation of bioagents for controlling Fusarium proliferatum-induced basal rot in onion. AIMS Microbiology, 2024, 10(4): 1024-1051. doi: 10.3934/microbiol.2024044 |
[5] | Oluwafolajimi Adesanya, Tolulope Oduselu, Oluwawapelumi Akin-Ajani, Olubusuyi M. Adewumi, Olusegun G. Ademowo . An exegesis of bacteriophage therapy: An emerging player in the fight against anti-microbial resistance. AIMS Microbiology, 2020, 6(3): 204-230. doi: 10.3934/microbiol.2020014 |
[6] | Nur Raihan Abdullah, Faez Sharif, Nur Hafizah Azizan, Ismail Fitri Mohd Hafidz, Sugenendran Supramani, Siti Rokhiyah Ahmad Usuldin, Rahayu Ahmad, Wan Abd Al Qadr Imad Wan-Mohtar . Pellet diameter of Ganoderma lucidum in a repeated-batch fermentation for the trio total production of biomass-exopolysaccharide-endopolysaccharide and its anti-oral cancer beta-glucan response. AIMS Microbiology, 2020, 6(4): 379-400. doi: 10.3934/microbiol.2020023 |
[7] | Bahram Nikmanesh, Kazem Ahmadikia, Muhammad Ibrahim Getso, Sanaz Aghaei Gharehbolagh, Shima Aboutalebian, Hossein Mirhendi, Shahram Mahmoudi . Candida africana and Candida dubliniensis as causes of pediatric candiduria: A study using HWP1 gene size polymorphism. AIMS Microbiology, 2020, 6(3): 272-279. doi: 10.3934/microbiol.2020017 |
[8] | Hafidh Shofwan Maajid, Nurliyani Nurliyani, Widodo Widodo . Exopolysaccharide production in fermented milk using Lactobacillus casei strains AP and AG. AIMS Microbiology, 2022, 8(2): 138-152. doi: 10.3934/microbiol.2022012 |
[9] | Chika C. Anotaenwere, Omoanghe S. Isikhuemhen, Peter A. Dele, Michael Wuaku, Joel O. Alabi, Oludotun O. Adelusi, Deborah O. Okedoyin, Kelechi A. Ike, DeAndrea Gray, Ahmed E. Kholif, Uchenna Y. Anele . Ensiled Pleurotus ostreatus based spent mushroom substrate from corn: In vitro gas production, greenhouse gas emissions, nutrient degradation, and ruminal fermentation characteristics. AIMS Microbiology, 2025, 11(1): 1-21. doi: 10.3934/microbiol.2025001 |
[10] | Ogueri Nwaiwu, Chiugo Claret Aduba . An in silico analysis of acquired antimicrobial resistance genes in Aeromonas plasmids. AIMS Microbiology, 2020, 6(1): 75-91. doi: 10.3934/microbiol.2020005 |
We present here a generalized Girard-Waring identity constructed from recursive sequences. We also present the construction of Binet Girard-Waring identity and classical Girard-Waring identity by using the generalized Girard-Waring identity and divided differences. The application of the generalized Girard-Waring identity to the transformation of recursive sequences of numbers and polynomials is discussed.
In 2017, Khalid and Shahbaz [1] introduced the notions of totient, super totient and hyper totient numbers (see also [2]). Recall in this regard that a positive integer t is said to be totient if the sum of its co-prime residues is 2kt, with k≥1. Further, a positive integer s is called super totient if its set of co-prime residues can be divided into two nonempty disjoint subsets with equal sum. Finally, a positive integer h is said to be hyper totient if its set of co-prime residues including h can be divided into two nonempty disjoint subsets with equal sum. This paper focuses on the use of hyper totient numbers in graph labeling.
The assignment of positive integers as labels of vertices and/or edges of a graph is a classic problem in graph theory (see, for instance, [3,4,5]), with a broad range of applications in real daily life problems as networking, coding theory, digital design, database or management, amongst other areas. Nowadays, the problem of finding and characterizing new classes of integers satisfying certain given conditions, together with the problem of finding illustrative families of graphs for which a labeling based on such classes exists, constitutes a challenge for researchers in both number and graph theory. In the recent literature, one can find a wide amount of examples in this regard [6,7,8,9]. Of particular interest for the topic of this paper, it is remarkable the recent studies of Shahbaz and Khalid [1,10] on graph labelings based on super totient numbers, and the introduction of both concepts of restricted super totient labeling and super totient index of graphs by Joshua and Wong [11].
The paper is organized as follows. In Section 2, we describe some preliminary concepts and results on graph theory and hyper totient numbers that are used throughout the paper. Then, we introduce in Section 3 the concept of (restricted) hyper totient graph labeling. In particular, we prove that every finite graph is hyper totient. Finally, we investigate in Section 4 under which assumptions the following families of graphs constitute restricted hyper totient graphs: complete graphs, star graphs, complete bipartite graphs, wheel graphs, cycles, paths, fan graphs and friendship graphs.
This section deals with some preliminary concepts, notations and results on graph theory and hyper totient numbers that are used throughout the paper. For more details about these topics, we refer the reader to the manuscripts [1,10,12].
A graph is any pair G=(V,E) formed by a set V of vertices and a set E of edges so that each edge joins two vertices, which are then said to be adjacent. The number of vertices and the number of edges of G constitute, respectively, the order and size of G. A graph is said to be finite if both its order and size are finite. A subetaaph of G is any graph H=(W,F) such that W⊆V and F⊆E. The set of vertices that are adjacent to a given vertex v∈V constitutes its neighborhood NG(v). The number of such vertices constitutes the degree dG(v) of such a vertex v. The minimum vertex degree of the graph G is denoted δ(G).
From now on, let vw be the edge formed by two vertices v,w∈V. If v=w, then it is a loop. A graph is called simple if it does not contain loops. Two graphs G1=(V1,E1) and G2=(V2,E2) are said to be isomorphic if there exists a bijection f:V1→V2 such that uv∈E1 if and only if f(u)f(v)∈E2.
A finite graph is called complete if all its vertices are pairwise adjacent. The complete graph of order n is denoted Kn. Further, the complete bipartite graph Km,n is the finite graph of order m+n whose set of vertices may be partitioned into two subsets of respective sizes m and n so that every edge of the graph contains a vertex of each one of these two sets. The complete bipartite graph K1,n, with n>2, is called a star graph. Its center is the unique vertex that is contained in all the edges.
A path between two distinct vertices v and w of a given finite graph G is any ordered sequence of adjacent and pairwise distinct vertices ⟨v0=v,v1,…,vn−2,vn−1=w⟩ in G, with n>2. If v=w, then it constitutes a cycle. As such, paths and cycles are also finite graphs. From here on, let Pn and Cn respectively denote the path and the cycle of order n. A graph is connected if there always exists a path between any pair of vertices. If no subetaaph of a connected graph G is a cycle, then G is called a tree.
Further, the wheel graph Wn results after joining all the vertices of the cycle Cn to a new vertex, which is called the center of the wheel graph. The fan graph Fm,n is the graph that results after joining each vertex of a set of m isolated vertices with all the vertices of the path Pn. Finally, the friendship graph Fn is the graph that results after joining n copies of the cycle C3 with a common vertex. Figure 1 illustrates the different families of graphs that we have enumerated until now.
A vertex-labeling of a graph G is any map f:V→N assigning |V| positive integers or labels to the set of vertices V. It gives rise to the induced multiplicative edge-labeling f∗:E→N so that f∗(vw)=f(v)f(w), for all vw∈E. In 2017, Khalid and Shahbaz [1] defined a super totient graph as any finite graph G for which there exists an injective vertex-labeling f (which is called super totient labeling of G) whose induced multiplicative edge-labeling f∗ assigns a super totient number to each one of its edges. In particular, they proved that every finite graph is super totient. Much more recently, Joshua and Wong [11] defined the super totient index of a finite graph G as the minimum cardinality of the image of f∗, for every super totient labeling f of G. In this paper, we focus on those injective vertex-labelings f so that the image of the induced map f∗ is only formed by hyper totient numbers. To this end, the following result characterizing this type of numbers is of particular interest. It gathers together the different results on this subject that are enumerated in [2].
Theorem 2.1. Every hyper totient number is a positive integer n>2 satisfying exactly one of the following two assertions.
a) It is an even integer distinct from 10 and 30.
b) It is a prime power pk, with k≥1, where p is a prime such that p≡3(mod4).
Proof. If n<32, then the result follows readily from a simple computational check (see, for instance, [2,Table 1]). Further, according to [2,Theorem 3.6], a positive integer n≥32 is hyper totient if and only if n(φ(n)+2) is divisible by 4. Here, φ(n) denote the Euler's totient number associated to n. That is, the number of co-prime residues of n. The result holds from the following study of cases.
● If n is even, then n(φ(n)+2) is divisible by 4, because φ(m) is also even, whatever the positive integer m is. Hence, n is hyper totient.
● If n is odd, then n is hyper totient if and only if φ(n)+2 is divisible by 4. Equivalently, if n=∏mi=1pkii is the prime factorization of n, then φ(n)=∏mi=1pki−1i(pi−1)≡2(mod4). Since n is an odd integer, we have that pi is also odd, for all i≤m. Thus, φ(n)≡2(mod4) if and only if m=1 in the previous prime factorization. (Otherwise, if m>1, then φ(n) would be divisible by 4.) Hence, n=pk, for some prime p≡3(mod4). (Notice to this last end that it would be φ(n)=pk−1(p−1)≡2(mod4), where p is odd.)
In this section, we show how hyper totient numbers may be implemented in graph labeling. In this regard, we say that a finite graph G=(V,E) is an hyper totient graph if there exists an injective vertex-labeling f of G whose induced multiplicative edge-labeling f∗ assigns a hyper totient number to each edge in E. In such a case, we say that the map f is an hyper totient labeling (HTL) and that the graph G is an hyper totient graph (HTG). In order to illustrate these concepts, Figure 2 shows an HTG of order five and size ten, whose vertices are uniquely labeled by the positive integers of the subset {2,3,4,6,7}⊂N and whose set of edges is then labeled by the set of totient numbers {4,6,8,9,12,14,16,36,49}. In order to distinguish both vertex- and edge-labelings, they are respectively colored in blue and black. Notice the fact that this graph is not simple.
Similarly to the concept of super totient index, which was introduced by Joshua and Wong in [11], we define the hyper totient index of the graph G as
h∗(G):=min{|f∗(V)|:f is an HTL of G}. |
Then, we say that an HTL f of the graph G is optimal if |f∗(V)|=h∗(G). In an analogous way to the result obtained by the mentioned authors in [11,Lemma 4.3], the following lemma holds.
Lemma 3.1. Let G be an HTG. There always exists an optimal HTL of G whose image is contained in the set {3i:i∈N}.
Proof. Let f be an optimal HTL of the graph G and let V={v1,…,vn} be its set of vertices. Then, let {p1,…,pt} be a set of primes such that f∗(vi)=∏tj=1paijj, for all positive integers i≤n, where each aij is a non-negative integer. Let m=1+max{aij:1≤i≤n,1≤j≤t}. Then, Theorem 2.1 implies that the map g:V→{3i:i∈N} that is described so that g(vi)=3∑tk=1aikmk−1 constitutes an optimal HTL of the graph G.
The previous result enables us to ensure the equivalence of super totient and hyper totient indices, and the subsequent result concerning the fact that every finite graph is an HTG.
Theorem 3.2. Both the hyper totient index and the super totient index of any given finite graph coincide.
Proof. Let f be an injective vertex-labeling of a graph G=(V,E). This map induces the additive edge-labeling f+:E→N so that f+(vw)=f(v)+f(w), for all vw∈E. In addition, it is defined the sum index of the graph G as
min{|f+(V)|:f is an injective vertex-labeling of G}. |
As a simple consequence of Lemma 3.1, the hyper totient index of the graph G coincides with the sum index of such a graph. The result follows simply from the fact that, according to [11,Theorem 4.5], this last index also coincides with the super totient index of the graph G.
Corollary 3.3. Every finite graph constitutes an HTG.
Proof. The result follows straighforwardly from Theorem 3.2 and the fact that every finite graph is a super totient graph (see [1,Theorem 5.5]).
We say that a finite graph G=(V,E) is a restricted hyper totient graph (RHTG) if it is a simple HTG whose set of vertices may be labeled by the subset of positive integers {1,…,|V|}. The corresponding vertex-labeling is termed a restricted hyper totient labeling (RHTL) of G. Thus, for instance, Figure 3 illustrates a RHTL of order and size six, whose set of edges is labeled by the set of totient numbers {3,4,6,12}. Again, the vertex-labeling is colored in blue and the edge-labeling is colored in black.
Of particular interest for the development of our work is the RHTG having maximum size for each given order. It is described as follows. Let ℜn be the RHTG of order n that is defined so that there is an edge between the vertices labeled as i and j, with 1≤i≠j≤n, if and only if the product ij is a hyper totient number. Figure 4 illustrates this graph ℜn, for all positive integers n≤9. In order to avoid a tangled mess of labels, we remove from now on the edge-labeling of the corresponding graphs.
The following result follows straightforwardly from the previous definitions.
Lemma 4.1. For n>3, every spanning subetaaph of ℜn is an RHTG.
Lemma 4.1 enables us to ensure that the finding of RHTGs is completely solved once one may construct the graph ℜn, for every positive integer n. In this regard, and based on Theorem 2.1, Algorithm 1 describes a simple computational method of time complexity O(n2) for determining this graph ℜn.
Algorithm 1 Construction of the graph ℜn. |
1. procedure R(n) |
2: V(ℜn)={1,…,n}; |
3: fori←1,n do |
4: forj←i+1,n do |
5: if ij satisfies either Condition (a) or Condition (b) in Theorem 2.1 then |
6: E(ℜn)←E(ℜn)∪{ij}; |
7: end if |
8: end for |
9: end for |
10: return ℜn=(V(ℜn),E(ℜn)) |
11: end procedure |
In this section, we study under which assumptions the following types of graphs constitute RHTGs: a complete graph Kn, a star graph K1,n, a complete bipartite graph Km,n, a wheel graph Wn, a cycle Cn, a path Pn, a fan graph F1,n and a friendship graph Fn. Notice that, according to Lemma 4.1, any subetaaph of any of these types of graphs satisfying the mentioned assumptions constitutes also an RHTG. Firstly, we focus on the complete graph Kn.
Proposition 4.2. Let n be a positive integer. Then, the complete graph Kn is an RHTG if and only if n=1.
Proof. The case n=1 is trivial. Further, the case n≥2 follows straightforwardly from the fact that the vertices labeled as 1 and 2 must be adjacent, but the induced edge label 2 is not a hyper totient number.
Proposition 4.3. Let n>2 be a positive integer. Then, the star graph K1,n is a spanning subetaaph of ℜn+1. As a consequence, every star graph constitutes an RHTG.
Proof. According to Theorem 2.1, every multiple of 4 is a hyper totient number. Hence, the spanning subetaaph of ℜn+1 having as edges those ones containing the vertex labeled as 4 constitutes a star graph K1,n. This vertex corresponds indeed to the center of the star graph. The consequence follows readily from Lemma 4.1.
Theorem 4.4. Let m and n be two positive integers such that 2≤m≤n. The complete bipartite graph Km,n is an RHTG if and only one of the following assertions hold.
a) m=n=2.
b) m=2 and n≥6.
c) 3≤m≤11 and n≥m+6.
d) m≥12 and n≥m+8.
Proof. Figure 5 illustrates the case m=n=2. Thus, let us suppose the existence of two positive integers m≥2 and n≥2 such that m+n>4 and Km,n is an RHTG. Let vi denote the vertex that is labeled as i∈{1,…,m+n} in the graph ℜm+n. Since 10 is not a hyper totient number, the two vertices v2 and v5 must belong to the same part of Km,n. Let P denote such a part. Then,
NKm,n(v2)=NKm,n(v5)=Km,n∖P⊆Nℜm+n(v2)∩Nℜm+n(v5). |
From Theorem 2.1, we have that
Nℜm+n(v5)={v4}∪{v2k:4≤k≤m+n2}⊂Nℜm+n(v2). |
In particular, since 2≤m≤n, it must be m+n≥8 and n=|P|. Moreover, Theorem 2.1 enables us to ensure that every vertex in the set Nℜm+n(v5), except for v10 (if m+n≥10) and v30 (if m+n≥30), is adjacent to any other vertex in the set ℜm+n. Notice to this end that all the indices of such vertices are even integers and that both vertices v10 and v30 are not adjacent to v1∈P. Due to this last aspect, it must be {v10,v30}⊂P. As a consequence,
m+n≥{8, if m=2,2(m+3), if 3≤m≤11,2(m+4), if m≥12. |
Let αm,n denote the previous lower bound, for the positive integers m and n under consideration. Then, in order to get an RHTL of the graph Km,n, it is enough to take
Km,n∖P={v2k:2≤k≤αm+n2}∖{v6,v10,v30}. |
Figure 6 illustrates an RHTL for the complete bipartite graph K4,13.
Theorem 4.5. Every tree containing at least 32 vertices is an RHTG.
Proof. The result follows straightforwardly from Lemma 4.1, Proposition 4.3 and Theorem 4.4 once it is noticed that every tree is a bipartite graph.
Theorem 4.6. The wheel graph Wn is an RHTG if and only if n≥9.
Proof. Throughout this proof, let vi denote the vertex labeled as i∈N in the graph under consideration. Notice in Figure 4 that δ(ℜn)≤2, for all positive integer n≤9. To this end, observe in the mentioned figure the vertex v1, if 1≤n≤5, and the vertex v5, if 6≤n≤9. Then, since δ(Wn)=3, for all positive integers n, we have from Lemma 4.1 that the wheel graph Wn is not an RHTG, if n<9.
Now, Figure 7 illustrates an RHTL of the wheel graph W9. If we replace the edge v10v6 in that figure by the path ⟨v10,v11,…,vn+1,v6⟩, so that all the vertices are joined with the center v4 by an edge, then Theorem 2.1 implies that the resulting vertex-labeling is an RHTL of the wheel graph Wn.
Theorem 4.7. Let n>2 be a positive integer. Then, the cycle graph Cn is an RHTG if and only if n=4 or n≥8.
Proof. Again, let vi denote the vertex labeled as i∈N in the graph under consideration. Notice in Figure 4 that δ(ℜn)≤1, for all positive integer n≤7, except for n=4. To this end, observe in the mentioned figure the vertex v1, if 1≤n≤3, and the vertex v5, if 5≤n≤7. Then, since δ(Cn)=2, for all positive integers n, we have from Lemma 4.1 that the cycle Cn is not an RHTG, if n∈{3,5,6,7}.
Now, Figures 5 and 8 illustrate, respectively, RHTLs of the cycles C4, which is isomorphic to the complete bipartite graph K2,2, and C8. Finally, if n≥9, then the result follows simply from Lemma 4.1 and Theorem 4.6, once it is noticed that the cycle Cn is a subetaaph of the wheel graph Wn+1.
Theorem 4.8. Every path is an RHTG.
Proof. Firstly, notice that the path P3 is isomorphic to the graph ℜ3, and hence, it constitutes an RHTG. In addition, if n=4 or n≥8, then the result follows simply from Lemma 4.1 and Theorem 4.7, once it is noticed that the path Pn is a subetaaph of the cycle Cn. Finally, the case n∈{5,6,7} is illustrated by the RHTL of the path P7 in Figure 9, which contains implicitly the RHTLs of both paths P5 and P6 as subetaaphs.
Theorem 4.9. Let n>2 be a positive integer. Then, the fan graph F1,n is an RHTG if and only if n≥9.
Proof. Since δ(F1,n)=2, for all positive integers n>2, Lemma 4.1 enables us to ensure that the fan graph F1,n is not an RHTG, for all n∈{4,5,6}, because δ(ℜn+1)=1 in such cases. Further, the case n≥9 follows simply from Lemma 4.1 and Theorem 4.6, once it is noticed that the fan graph F1,n is a subetaaph of the wheel graph Wn. Finally, the case n∈{3,7,8} is illustrated by the RHTLs of the fan graphs F1,3 and F1,8 in Figure 10. Notice to this end that the RHTL of the fan graph F1,7 is implicitly indicated in that one of the fan graph F1,8, of which the former constitutes a subetaaph.
Theorem 4.10. The friendship graph Fn is an RHTG if and only if n≥4.
Proof. Since the order of the friendship graph Fn is 2n+1 and δ(ℜn)=1, for all n∈{3,5,7}, then Lemma 4.1 implies that the friendship graph Fn is not an RHTG, for all n≤3. Further, the case n≥4 follows simply from Lemma 4.1 and Theorem 4.6, once it is noticed that the friendship graph Fn is a subetaaph of the wheel graph Wm, for all m≥2n.
In this paper, we have introduced the notion of hyper totient graph as any finite graph G=(V,E) admitting an injective vertex-labeling f:V→N so that its induced multiplicative edge-labeling assigns a hyper totient number to each edge. We have proved in particular that every finite graph is hyper totient. Furthermore, we have introduced the concept of restricted hyper totient graph as a hyper totient graph of order n whose vertices are labeled by the elements of the set {1,…,n}. Then, we have determined under which assumptions some well-known families of graphs are restricted hyper totient.
Of course, the current manuscript constitutes a starting point for the study of hyper totient graphs, but a much deeper study is required in order to characterize all the structural properties of this type of graphs. In this regard, we propose as further work the study of locating, dominating and independent sets within a given RHTG, together with their corresponding locating, dominating and independent numbers. We also propose the following open questions for further work on this subject.
Problem 5.1. In Theorem 4.5, we have determined a lower bound for the number of vertices of a tree in order to ensure that the latter is an RHTG. But, what about trees of smaller orders? A similar reasoning to that one developed by Joshua and Wong in [11,Theorem 3.9] may be done in this regard.
Problem 5.2. In 2001, Beineke and Hedge [13] defined a strongly multiplicative graph as a finite graph of order n for which there exists an injective vertex-labeling f:V→{1,…,n} so that the induced multiplicative edge-coloring f∗ is injective. In a similar way, we may introduce here the notion of strongly hyper totient graph (SHTG) as an RHTG having distinct all the hyper totient numbers that are used for labeling its edges. Notice in this regard that the majority of RHTGs appearing in the figures of this paper are not SHTGs. The study of this type of RHTGs is established as further work.
Problem 5.3. Under which assumptions is the condition of being RHTG preserved by the different graph products existing in the literature? A similar question may be dealt with concerning the just introduced notion of SHTG.
Falcón's work is partially supported by the research project FQM-016 from Junta de Andalucía. In addition, the authors want to express their gratitude to the anonymous referees for the comprehensive reading of the paper and their pertinent comments and suggestions, which helped improve the manuscript.
All authors are here with confirm that there are no competing interests between them.
[1] |
Fibonacci, Chebyshev, and orthogonal polynomials. Amer. Math. Monthly (2005) 112: 612-630. ![]() |
[2] | L. Comtet, Advanced Combinatorics, D. Reidel Publishing Co., Dordrecht, 1974. |
[3] | The Girard-Waring power sum formulas for symmetric functions and Fibonacci sequences. Fibonacci Quart. (1999) 37: 135-140. |
[4] | Construction of nonlinear expression for recursive number sequences. J. Math. Res. Appl. (2015) 35: 473-483. |
[5] |
Row sums and alternating sums of Riordan arrays. Linear Algebra Appl. (2016) 507: 77-95. ![]() |
[6] |
T.-X. He and P. J.-S. Shiue, On sequences of numbers and polynomials defined by linear recurrence relations of order 2, Int. J. Math. Math. Sci., 2009 (2009), Art. ID 709386, 21 pp. doi: 10.1155/2009/709386
![]() |
[7] | On the applications of the Girard-Waring identities. J. Comput. Anal. Appl. (2020) 28: 698-708. |
[8] | Vieta polynomials, A special tribute to Calvin T. Long. Fibonacci Quart. (2002) 40: 223-232. |
[9] | Pell and Pell-Lucas polynomials. Fibonacci Quart. (1985) 23: 7-20. |
[10] |
Über vertauschbare Polynome. Math. Z. (1955) 63: 243-276. ![]() |
[11] | R. Lidl, G. L. Mullen and G. Turnwald, Dickson Polynomials, Pitman Monographs and Surveys in Pure and Applied Mathematics, 65. Longman Scientific & Technical, Harlow; copublished in the United States with John Wiley & Sons, Inc., New York, 1993. |
[12] | W. Magnus, F. Oberhettinger and R. P. Soni, Formulas and Theorems for the Special Functions of Mathematical Physics, 3rd enlarged edition, Die Grundlehren der mathematischen Wissenschaften, Band 52, Springer-Verlag New York, Inc., New York, 1966. |
[13] |
Vieta's triangular array and a related family of polynomials. Internat. J. Math. Math. Sci. (1991) 14: 239-244. ![]() |
[14] | M. Saul and T. Andreescu, Symmetry in algebra, part Ⅲ, Quantinum, (1998), 41–42. |
[15] | N. J. A. Sloane, The On-Line Encyclopedia of Integer Sequences, , Available from: https://oeis.org/, founded in 1964. |
1. | Wen Ching Ooi, Debbie Dominic, Mohd Asyraf Kassim, Siti Baidurah, Biomass Fuel Production through Cultivation of Microalgae Coccomyxa dispar and Scenedesmus parvus in Palm Oil Mill Effluent and Simultaneous Phycoremediation, 2023, 13, 2077-0472, 336, 10.3390/agriculture13020336 | |
2. | Olalekan S. Alade, Modeling and simulation of an integrated bioethanol-hydrogen production process, 2024, 15, 1759-7269, 943, 10.1080/17597269.2024.2306010 | |
3. | Debbie Dominic, Siti Baidurah, Biomass Fuel Production through Fermentation of Lysinibacillus sp. LC 556247 in Various Ratios of Palm Oil Mill Effluent and Empty Fruit Bunch, 2023, 11, 2227-9717, 1444, 10.3390/pr11051444 | |
4. | Ras Izzati Ismail, Chu Yee Khor, Alina Rahayu Mohamed, Pelletization Temperature and Pressure Effects on the Mechanical Properties of Khaya senegalensis Biomass Energy Pellets, 2023, 15, 2071-1050, 7501, 10.3390/su15097501 | |
5. | Manpreet Kaur, Ashish Kumar Singh, Ajay Singh, Bioconversion of food industry waste to value added products: Current technological trends and prospects, 2023, 55, 22124292, 102935, 10.1016/j.fbio.2023.102935 | |
6. | Tonni Agustiono Kurniawan, Mehwish Ali, Ayesha Mohyuddin, Ahtisham Haider, Mohd Hafiz Dzarfan Othman, Abdulkader Anouzla, Hui Hwang Goh, Dongdong Zhang, Wei Dai, Faissal Aziz, Muhammad Imran Khan, Imran Ali, Mohamed Mahmoud, Sadeq Abdullah Abdo Alkhadher, G. Abdulkareem Alsultan, Innovative Transformation of Palm Oil Biomass Waste into Sustainable Biofuel: Technological Breakthroughs and Future Prospects, 2024, 09575820, 10.1016/j.psep.2024.11.073 | |
7. | Siti Suraya Munirah Normi, Siti Baidurah, 2024, Chapter 12, 978-981-97-8556-8, 261, 10.1007/978-981-97-8557-5_12 | |
8. | Debbie Dominic, Siti Baidurah, A review of biological processing technologies for palm oil mill waste treatment and simultaneous bioenergy production at laboratory scale, pilot scale and industrial scale applications with technoeconomic analysis, 2025, 25901745, 100914, 10.1016/j.ecmx.2025.100914 | |
9. | Kai Chen Goh, Tonni Agustiono Kurniawan, G. Abdulkareem AlSultan, Mohd Hafiz Dzarfan Othman, Abdelkader Anouzla, Faissal Aziz, Imran Ali, Joan Cecilia C. Casila, Muhammad Imran Khan, Dongdong Zhang, Choo Wou Onn, Ta Wee Seow, Haryati Shafii, Innovative circular bioeconomy and decarbonization approaches in palm oil waste management: A review, 2025, 195, 09575820, 106746, 10.1016/j.psep.2024.12.127 |
Algorithm 1 Construction of the graph ℜn. |
1. procedure R(n) |
2: V(ℜn)={1,…,n}; |
3: fori←1,n do |
4: forj←i+1,n do |
5: if ij satisfies either Condition (a) or Condition (b) in Theorem 2.1 then |
6: E(ℜn)←E(ℜn)∪{ij}; |
7: end if |
8: end for |
9: end for |
10: return ℜn=(V(ℜn),E(ℜn)) |
11: end procedure |