Loading [MathJax]/jax/output/SVG/jax.js
Research article

Efficient numerical method for pricing multi-asset options with the time-fractional Black-Scholes model: focus on American and digital options

  • This study presents a numerical solution for the two-asset time-fractional Black-Scholes model, which governs American and digital options, using a local meshless collocation method based on Gaussian radial basis functions. The proposed meshless approach effectively discretized the spatial derivatives of the model, while the Caputo derivative was employed to represent the time-fractional component, capturing the memory effects and non-local properties characteristic of fractional-order models. Numerical assessments were conducted to evaluate the method's performance across these option models. The study discusses the handling of interest rates, highlighting the method's capability to manage the complexities inherent in multi-asset options. The efficacy and accuracy of the proposed meshless approach were evaluated using the L error norms. In the absence of exact solutions for these option models, the double mesh technique was utilized to validate the accuracy and efficiency of the proposed method, ensuring the robustness and reliability of the numerical results.

    Citation: Imtiaz Ahmad, Muhammad Nawaz Khan, Rashid Jan, Normy Norfiza Abdul Razak. Efficient numerical method for pricing multi-asset options with the time-fractional Black-Scholes model: focus on American and digital options[J]. Mathematical Modelling and Control, 2025, 5(2): 147-163. doi: 10.3934/mmc.2025011

    Related Papers:

    [1] Yiqin Bao, Qiang Zhao, Jie Sun, Wenbin Xu, Hongbing Lu . An edge cloud and Fibonacci-Diffie-Hellman encryption scheme for secure printer data transmission. Mathematical Biosciences and Engineering, 2024, 21(1): 96-115. doi: 10.3934/mbe.2024005
    [2] Takao Komatsu, Haotian Ying . The p-Frobenius and p-Sylvester numbers for Fibonacci and Lucas triplets. Mathematical Biosciences and Engineering, 2023, 20(2): 3455-3481. doi: 10.3934/mbe.2023162
    [3] Zhongxue Yang, Yiqin Bao, Yuan Liu, Qiang Zhao, Hao Zheng, Wenbin Xu . Lightweight blockchain fuzzy decision scheme through MQTT and Fibonacci for sustainable transport. Mathematical Biosciences and Engineering, 2022, 19(12): 11935-11956. doi: 10.3934/mbe.2022556
    [4] Yan Wang, Guichen Lu, Jiang Du . Calibration and prediction for the inexact SIR model. Mathematical Biosciences and Engineering, 2022, 19(3): 2800-2818. doi: 10.3934/mbe.2022128
    [5] Anh Quang Tran, Tien-Anh Nguyen, Van Tu Duong, Quang-Huy Tran, Duc Nghia Tran, Duc-Tan Tran . MRI Simulation-based evaluation of an efficient under-sampling approach. Mathematical Biosciences and Engineering, 2020, 17(4): 4048-4063. doi: 10.3934/mbe.2020224
    [6] Yong Tao, Fan Ren, Youdong Chen, Tianmiao Wang, Yu Zou, Chaoyong Chen, Shan Jiang . A method for robotic grasping based on improved Gaussian mixture model. Mathematical Biosciences and Engineering, 2020, 17(2): 1495-1510. doi: 10.3934/mbe.2020077
    [7] Zhipeng Zhao, Zhenyu Hu, Zhiyu Zhao, Xiaoyu Du, Tianfei Chen, Lijun Sun . Fault-tolerant Hamiltonian cycle strategy for fast node fault diagnosis based on PMC in data center networks. Mathematical Biosciences and Engineering, 2024, 21(2): 2121-2136. doi: 10.3934/mbe.2024093
    [8] Auwalu Saleh Mubarak, Zubaida Said Ameen, Fadi Al-Turjman . Effect of Gaussian filtered images on Mask RCNN in detection and segmentation of potholes in smart cities. Mathematical Biosciences and Engineering, 2023, 20(1): 283-295. doi: 10.3934/mbe.2023013
    [9] Sergio Bermudo, Robinson A. Higuita, Juan Rada . k-domination and total k-domination numbers in catacondensed hexagonal systems. Mathematical Biosciences and Engineering, 2022, 19(7): 7138-7155. doi: 10.3934/mbe.2022337
    [10] Lal Hussain, Wajid Aziz, Ishtiaq Rasool Khan, Monagi H. Alkinani, Jalal S. Alowibdi . Machine learning based congestive heart failure detection using feature importance ranking of multimodal features. Mathematical Biosciences and Engineering, 2021, 18(1): 69-91. doi: 10.3934/mbe.2021004
  • This study presents a numerical solution for the two-asset time-fractional Black-Scholes model, which governs American and digital options, using a local meshless collocation method based on Gaussian radial basis functions. The proposed meshless approach effectively discretized the spatial derivatives of the model, while the Caputo derivative was employed to represent the time-fractional component, capturing the memory effects and non-local properties characteristic of fractional-order models. Numerical assessments were conducted to evaluate the method's performance across these option models. The study discusses the handling of interest rates, highlighting the method's capability to manage the complexities inherent in multi-asset options. The efficacy and accuracy of the proposed meshless approach were evaluated using the L error norms. In the absence of exact solutions for these option models, the double mesh technique was utilized to validate the accuracy and efficiency of the proposed method, ensuring the robustness and reliability of the numerical results.



    The Fibonacci sequence is defined Fn=Fn1+Fn2 for n2 with the initial conditions F0=0,F1=1. The Fibonacci sequence and the golden ratio are used in many fields such as cryptology, coding theory and quantum physics in [1,2,3,4,5,6,7,8,9,10,11]. Horadam defined the Gaussian Fibonacci numbers in [12,13] and gave some general identities about the Gaussian Fibonacci numbers. Jordan generalized the Gaussian Fibonacci numbers with a similar definition in [14]. The Gaussian Fibonacci sequence is defined as GFn=GFn1+GFn2 with n>1 where GF0=i,GF1=1 in [14]. It can also be easily seen Fn that GFn=Fn+iFn1 where Fn is the nth Fibonacci number.

    Asci and Gurel generalized these studies and defined the k-order Gaussian Fibonacci numbers in [15] by the following recurrence relation

    GF(k)n=kj=1GF(k)nj,forn>0andk2

    with boundary conditions for 1kn0,

    GF(k)n={1i,k=1ni,k=2n0,otherwise.

    It can also be seen that GF(k)n=F(k)n+iF(k)n1 where F(k)n is the nth k-order Fibonacci number.

    In [16], Asci and Aydinyuz defined the k-order Gaussian Fibonacci polynomials and gave some important results. The k-order Gaussian Fibonacci polynomials {GFn(k)}n=0 are

    GF(k)n(x)=kj=1xkjGF(k)nj(x)

    for n>0 and k2 with the initial conditions for 1kn0,

    GF(k)n(x)={1ix,k=1ni,k=2n0,otherwise.

    It can be seen that

    GF(k)n(x)=F(k)n(x)+iF(k)n1(x)

    where F(k)n(x) is the nth k-order Fibonacci polynomial.

    In order to ensure information security in terms of data transfer over communication channels, a lot of work has been done on this subject and continues to be done. Therefore, coding/decoding algorithms play an important role to ensure information security. Especially, Fibonacci coding theory is one of the most preferred in this field. We can see examples of these in many studies. For example, in [17], Stakhov gave a new approach to a coding theory using the generalization of the Cassini formula for Fibonacci p-numbers and Qp matrices in 2006. In 2009, Basu and Prasad in [18] presented the generalized relations among the code elements for the Fibonacci coding theory. Also, Basu and Das introduced a new coding theory for Tribonacci matrices in [19] and in 2014 they defined the coding theory for Fibonacci n-step numbers by generalizing the coding theory for Tribonacci numbers in [20]. Esmaeili in [21] also described a Fibonacci polynomial-based coding method with error detection and correction.

    In this paper, we remember the coding theory for k-order Gaussian Fibonacci polynomials given in [16] by taking x=1 for k-order Gaussian Fibonacci numbers. We describe the coding theory for the k-order Gaussian Fibonacci numbers. We give illustrative examples. The interesting relation between the elements of the code-message matrix is analyzed and derived. The most important of this paper is that we deal with error detection and error correction methods and examples of error probability is given.

    When we take x=1 in the coding theory defined in [16], we obtain the k-order Gaussian Fibonacci coding method. First, we define the Qk, Rk and En(k) matrices, which plays an important role in this coding theory. Qk, Rk and En(k) are defined the k×k matrices as the following:

    Qk=[111111000001000000000010]k×k,Rk=[GF(k)k1GF(k)k2GF(k)k3GF(k)2GF(k)10GF(k)k2GF(k)k3GF(k)k4GF(k)100GF(k)k3GF(k)k4GF(k)k5000GF(k)2GF(k)1000GF(k)10000i0000i1i]k×k

    and

    E(k)n=[GF(k)n+k1GF(k)n+k2GF(k)n+1GF(k)nGF(k)n+k2GF(k)n+k3GF(k)nGF(k)n1GF(k)n+1GF(k)nGF(k)nk+3GF(k)nk+2GF(k)nGF(k)n1GF(k)nk+2GF(k)nk+1]k×k

    where GF(k)n is the nth k-order Gaussian Fibonacci number.

    Theorem 2.1. For n1, we get in [15] as follow:

    QnkRk=E(k)n. (2.1)

    Corollary 2.1. For k=2, we get

    QnR=[1110]n[1ii1i]
    =[GFn+1GFnGFnGFn1]

    where GFn is the nth usual Gaussian Fibonacci number in [15].

    Corollary 2.2. For k=3, we get

    Qn3R3=[111100010]n[1+i1010i0i1i]
    =[GTn+2GTn+1GTnGTn+1GTnGTn1GTnGTn1GTn2]

    where GTn is the nth Gaussian Tribonacci number in [23].

    In this section, we redefine k-order Gaussian Fibonacci coding theory using k-order Gaussian Fibonacci numbers and Qk, Rk and En(k) play very important role in the construction of k-order Gaussian Fibonacci coding theory.

    We now obtain the matrix En(k) using Qk, Rk matrices for the k=2,k=3 values and examine the inverse.

    • For k=2, introducing the square matrix Q2 of order 2 as:

    Q2=[1110]

    and the square matrix R2 of order 2 as:

    R2=[1ii1i]

    for n=1, we can use (2.1)

    E(2)1=Q2.R2
    =[1+i11i]
    =[GF(2)2GF(2)1GF(2)1GF(2)0]

    such that

    detE(2)1=det(Q2.R2)
    =(1).(2i)
    =2+i.

    The inverse of E(2)1 is as:

    (E(2)1)1=[1525i25+15i25+15i1535i]
    =1detE(2)1[GF0GF1GF1GF2]
    =12+i[GF0GF1GF1GF2]

    such that

    det(E(2)1)1=12+i
    =2515i.

    Also, by (2.1) for n=2, we can get E(2)2 as follows:

    E(2)2=Q22.R2
    =[2+i1+i1+i1]
    =[GF(2)3GF(2)2GF(2)2GF(2)1]

    such that

    detE(2)2=det(Q22.R2)
    =(1)2.(2i)
    =2i.

    The inverse of E(2)2 is as:

    (E(2)2)1=[25+15i1535i1535i35+45i]
    =1detE(2)2[GF(2)1GF(2)2GF(2)2GF(2)3]
    =12i[GF(2)1GF(2)2GF(2)2GF(2)3]

    such that

    det(E(2)2)1=12i
    =25+15i.

    Theorem 2.1.1. E(2)n=[GF(2)n+1GF(2)nGF(2)nGF(2)n1] where E(2)1=[1+i11i].

    Theorem 2.1.2. (E(2)n)1=1detE(2)n[GF(2)n1GF(2)nGF(2)nGF(2)n+1]

    =1(detQ2)n.detR2[GF(2)n1GF(2)nGF(2)nGF(2)n+1].

    • For k=3, introducing the square matrix Q3 of order 3 as:

    Q3=[111100010]

    and the square matrix R3 of order 3 as:

    R3=[1+i1010i0i1i]

    for n=1, we can use (2.1)

    E(3)1=Q3.R3
    =[2+i1+i11+i1010i]
    =[GF(3)3GF(3)2GF(3)1GF(3)2GF(3)1GF(3)0GF(3)1GF(3)0GF(3)1]

    such that

    detE(3)1=det(Q3.R3)
    =1.2i
    =2i.

    The inverse of E(3)1 is as:

    (E(3)1)1=[121212i12i1212i1+i1212i12i1212i12i]
    =1detE(3)1[GF(3)1GF1(3)(GF(3)0)2GF(3)0GF1(3)GF(3)1GF2(3)GF(3)0GF2(3)(GF(3)1)2GF(3)0GF1(3)GF(3)1GF2(3)GF(3)3GF1(3)(GF(3)1)2GF(3)1GF2(3)GF(3)0GF3(3)(GF(3)1)2GF(3)0GF2(3)GF(3)1GF2(3)GF(3)0GF3(3)GF(3)1GF3(3)(GF(3)2)2]
    =1detR3[GF(3)1GF1(3)(GF(3)0)2GF(3)0GF1(3)GF(3)1GF2(3)GF(3)0GF2(3)(GF(3)1)2GF(3)0GF1(3)GF(3)1GF2(3)GF(3)3GF1(3)(GF(3)1)2GF(3)1GF2(3)GF(3)0GF3(3)(GF(3)1)2GF(3)0GF2(3)GF(3)1GF2(3)GF(3)0GF3(3)GF(3)1GF3(3)(GF(3)2)2]

    such that

    det(E(3)1)1=12i
    =i2.

    Also, by (2.1) for n=2, we can get E(3)2 as follows:

    E(3)2=Q23.R3
    =[4+2i2+i1+i2+i1+i11+i10]
    =[GF(3)4GF(3)3GF(3)2GF(3)3GF(3)2GF(3)1GF(3)2GF(3)1GF(3)0]

    such that

    detE(3)2=det(Q23.R3)
    =12.2i
    =2i.

    The inverse of E(3)2 is as:

    (E(3)2)1=[12i1212i12i1212i112+32i12i12+32i1+12i]
    =1detE(3)2[GF(3)0GF(3)2(GF(3)1)2GF(3)1GF(3)2GF(3)0GF(3)3GF(3)1GF(3)3(GF(3)2)2GF(3)1GF(3)2GF(3)0GF(3)3GF(3)0GF(3)4(GF(3)2)2GF(3)2GF(3)3GF(3)1GF(3)4GF(3)1GF(3)3(GF(3)2)2GF(3)2GF(3)3GF(3)1GF(3)4GF(3)2GF(3)4(GF(3)3)2]
    =1detR3[GF(3)0GF(3)2(GF(3)1)2GF(3)1GF(3)2GF(3)0GF(3)3GF(3)1GF(3)3(GF(3)2)2GF(3)1GF(3)2GF(3)0GF(3)3GF(3)0GF(3)4(GF(3)2)2GF(3)2GF(3)3GF(3)1GF(3)4GF(3)1GF(3)3(GF(3)2)2GF(3)2GF(3)3GF(3)1GF(3)4GF(3)2GF(3)4(GF(3)3)2].

    Theorem 2.1.3. E(3)n=[GF(3)n+2GF(3)n+1GF(3)nGF(3)n+1GF(3)nGF(3)n1GF(3)nGF(3)n1GF(3)n2] where E(3)1=[2+i1+i11+i1010i].

    Theorem 2.1.4.

    (E(3)n)1=1detR3[GF(3)n2GF(3)n(GF(3)n1)2GF(3)n1GF(3)nGF(3)n2GF(3)n+1GF(3)n1GF(3)n+1(GF(3)n)2GF(3)n1GF(3)nGF(3)n2GF(3)n+1GF(3)n2GF(3)n+2(GF(3)n)2GF(3)nGF(3)n+1GF(3)n1GF(3)n+2GF(3)n1GF(3)n+1(GF(3)n)2GF(3)nGF(3)n+1GF(3)n1GF(3)n+2GF(3)nGF(3)n+2(GF(3)n+1)2].

    For arbitrary k-positive integers, the square matrix E(k)n of order k and inverses can be found similarly.

    In this section, we describe a new k-order Gaussian Fibonacci coding theory. We put our message in a matrix of M and let us represent the initial message in the form of the square matrix M of order k. We take the k-order Gaussian Fibonacci matrix E(k)n as a coding matrix and its inverse matrix (E(k)n)1 as a decoding matrix for an arbitrary positive integer k. The transformation M×E(k)n=C is called k-order Gaussian Fibonacci coding and we name the transformation C×(E(k)n)1=M as k-order Gaussian Fibonacci decoding. We define C as a code matrix.

    The given example is solved using the alphabet table below.

    Using the arbitrary value of s0, we write the following alphabet according to mod30. We can extend the characters in the table according to our wishes. We begin the “s” for the first character in Table 1.

    Table 1.  Alphabet table.
    A B C D E F G H I J
    s s+1 s+2 s+3 s+4 s+5 s+6 s+7 s+8 s+9
    K L M N O P Q R S T
    s+10 s+11 s+12 s+13 s+14 s+15 s+16 s+17 s+18 s+19
    U V W X Y Z 0 ! ? .
    s+20 s+21 s+22 s+23 s+24 s+25 s+26 s+27 s+28 s+29

     | Show Table
    DownLoad: CSV

    Example 2.3.1. Let us consider the message matrix for the following message text:

    âœCODE❠(2.2)

    Step 1: Let’s create the message matrix using the message text:

    M=[CODE]2×2

    Step 2: Let’s write the message matrix M according to the alphabet table for the arbitrary value “s” we choose. For s=2;

    M=[41656]

    Step 3: For k=2, n=2, we use (2.1);

    E(2)2=Q22.R2
    =[2+i1+i1+i1]

    Step 4: The code message is:

    C=M×E(2)2
    =[41656][2+i1+i1+i1]
    =[24+20i20+4i16+11i11+5i]

    Step 5: The decode message is:

    M=C×(E(2)2)1
    =[24+20i20+4i16+11i11+5i][25+15i1535i1535i35+45i]
    =[41656]
    =[CODE].

    Example 2.3.2. Let us consider the message matrix for the following message text:

    "PUBLICKEY"

    Step 1: Let’s create the message matrix using the message text:

    M=[PUBLICKEY]3×3

    Step 2: Let’s write the message matrix M according to the alphabet table for the arbitrary value “s” we choose. For s=5:

    M=[202561613715929]

    Step 3: For k=3, n=6, we use (2.1):

    E(3)6=Q63.R3
    =[44+24i24+13i13+7i24+13i13+7i7+4i13+7i7+4i4+2i]

    Step 4: The code message is:

    C=M×E(3)6
    =[1558+847i847+459i459+252i1107+602i602+327i327+178i1253+680i680+374i374+199i]

    Step 5: The decode message is:

    M=C×(E(6)3)1
    =[PUBLICKEY]
    =[202561613715929].

    In this section, we consider the k-order Gaussian Fibonacci coding/decoding method for k=2. We have an interesting relation among the elements of a code matrix C that has a crucial role in the error-correction process, outlined as follows:

    C=M×E(2)n=[m1m2m3m4]×[GF(2)n+1GF(2)nGF(2)nGF(2)n1] (3.1)
    =[c1c2c3c4] (3.2)

    and

    M=C×(E(2)n)1 (3.3)
    =[c1c2c3c4]×(1(det(Q2))ndetR2[GF(2)n1GF(2)nGF(2)nGF(2)n+1]) (3.4)
    =[m1m2m3m4]

    For the case for an even integer n=2m, we obtain the following equation

    [m1m2m3m4]=[c1c2c3c4]×(12i[GF(2)n1GF(2)nGF(2)nGF(2)n+1]) (3.5)

    since the det(Q2)=1 and det(R2)=2i.

    It follows from (3.5) that the elements of the matrix M can be obtained according to the following formulas:

    m1=12i(GF(2)n1c1GF(2)nc2) (3.6)
    m2=12i(GF(2)nc1+GF(2)n+1c2) (3.7)
    m3=12i(GF(2)n1c3GF(2)nc4) (3.8)
    m4=12i(GF(2)nc3+GF(2)n+1c4) (3.9)

    Since the s0, the elements of the matrix M are

    m10,m20,m30andm40 (3.10)

    Because of the condition (3.10) we can write the equalities (3.6)–(3.9) as:

    m1=12i(GF(2)n1c1GF(2)nc2)0 (3.11)
    m2=12i(GF(2)nc1+GF(2)n+1c2)0 (3.12)
    m3=12i(GF(2)n1c3GF(2)nc4)0 (3.13)
    m4=12i(GF(2)nc3+GF(2)n+1c4)0 (3.14)

    From the Eqs (3.11) and (3.12), we can get

    GF(2)nGF(2)n1c2c1GF(2)n+1GF(2)nc2 (3.15)

    or

    GF(2)nGF(2)n1c1c2GF(2)n+1GF(2)n (3.16)

    Similarly, from (3.13) and (3.14), we can obtain:

    GF(2)nGF(2)n1c4c3GF(2)n+1GF(2)nc4 (3.17)

    or

    GF(2)nGF(2)n1c3c4GF(2)n+1GF(2)n (3.18)

    Since two consecutive Gaussian Fibonacci numbers approach the golden ratio, we also obtain the following equations in (3.16) and (3.18) that connect the elements of the code matrix in (3.1):

    c1τc2 (3.19)
    c3τc4 (3.20)

    where τ=1+52 is the “golden ratio”.

    Similarly, for an odd integer n=2m+1, we can write the same approximate equalities (3.19) and (3.20) that connect the elements c1,c2,c3 and c4 of the code matrix in (3.1).

    Thus, we have generated some important identities that connect the elements of the code matrix in (3.1) for the case k=2.

    If we consider the coding/decoding method for k=3, we can obtain interesting identities as in k=2. Since two consecutive Gaussian Tribonacci numbers approach Φ where Φ=1.8393. However, for general case of k we can find mathematical identities that connect the code matrix elements similar to the (3.19) and (3.20).

    Example 3.1. Suppose k=2. Thus, we have τ=1+521.618. Assume that the following message-matrix is to be transmitted in (2.2):

    For s=2, we can get

    M=[CODE]=[41656]

    • If n=2 then

    C=[24+20i20+4i16+11i11+5i]=[c1c2c3c4]

    In this case, we have the following numbers rounded off to their first five digits:

    c1c2=1.3462+0.7307i,c3c4=1.5822+0.2808i

    • For n=5, we have

    C=[112+68i68+44i70+43i43+27i]

    In this case

    c1c2=1.61710.0463i,c3c4=1.61790.0159i

    • For n=10, we have

    C=[1236+764i764+472i775+479i479+296i]

    In this case

    c1c2=1.618+0.0003i,c3c4=1.618+0.0001i

    • For n=15, we have

    C=[13708+8472i8472+5236i8595+5312i5312+3283i]

    In this case

    c1c2=1.618,c3c4=1.618

    These show that for n=15 the relation (3.19) and (3.20) holds very well.

    Therefore, we select the value of n large enough, as seen in Examples 2.3.1 we get a good approximation of τ. If we apply similar operation in Example 2.3.2, when n is chosen large enough we get a good approximation of Φ where Φ=1.8393 and Φ is the ratio between two Gaussian Tribonacci numbers.

    The k-order Gaussian Fibonacci coding/decoding method considered above provides an interesting possibility to detect and correct “errors” in code message C. Error detection and correction for k=2 depends on the states of the determinant of the matrix C and the connections with the code matrix elements at (3.19) and (3.20). These mathematical relations given by (3.19), (3.20) and the determinant of the code matrix C play a role in checking relations of the k-order Gaussian Fibonacci coding/decoding method. The error-correction algorithm for Fibonacci coding has been explained in [10] and [13]. This defined algorithm is valid and applicable to the k-order Gaussian Fibonacci numbers we have given in this study.

    First, let’s calculate the determinant of our message matrix M and send it to the communication channel right after the code matrix elements. Here, the determinant of M will be the control element for the C code matrix received from the communication channel. After taking the determinant of the code matrix C and its control element M, we can calculate the determinant of the code matrix C and compare the determinant of M with the determinant of C with respect to the control relation. If the operations we have done after this check are exactly appropriate, we can conclude that the elements of the code matrix C are transmitted on the communication channel without errors. If the opposite happens, we can say that there are errors in the elements of the code matrix C or the determinant of the control element M.

    Suppose the elements of the C code matrix errors. This matrix can have a one-fold error, double-fold error or k2 fold error. To explain how to correct these errors, we consider the 2×2 type matrix obtained for k=2. These cases are considered.

    Our first hypothesis is that we have the case of a “single” error in the code matrix C received from the communication channel. It is clearly seen that there are four types of single-fold errors in the C code matrix:

    (a)[xc2c3c4](b)[c1yc3c4](c)[c1c2zc4](d)[c1c2c3t] (4.1)

    where x,y,z,t are possible “destroyed” elements.

    Since it is C=M×E(2)n, if we take the determinant of both sides, we get the following equations:

    xc4c2c3=det(M)(1)n(2i)(apossibleâœsingleerrorâisintheelementc1) (4.2)
    c1c4yc3=det(M)(1)n(2i)(apossibleâœsingleerrorâisintheelementc2) (4.3)
    c1c4c2z=det(M)(1)n(2i)(apossibleâœsingleerrorâisintheelementc3) (4.4)
    c1tc2c3=det(M)(1)n(2i)(apossibleâœsingleerrorâisintheelementc4) (4.5)

    or equivalently

    x=det(M)(1)n(2i)+c2c3c4(a) (4.6)
    y=det(M)(1)n(2i)+c1c4c3(b) (4.7)
    z=det(M)(1)n(2i)+c1c4c2(c) (4.8)
    t=det(M)(1)n(2i)+c2c3c1(d) (4.9)

    The formulas (4.6)–(4.9) give four possible states of a “single error”. However, we need to choose the correct case from among x,y,z,t integer solutions. We have to choice such solutions, which satisfies to the additional “checking relations” (3.19) and (3.20). If calculations by formulas (4.6)–(4.9) do not give an integer result, we can conclude that our “single error” hypothesis is incorrect or that the determinant of control element M is “error”. In the second case, we can use approximate Eqs (3.19) and (3.20) to check the correctness of the C code matrix.

    Similarly, we can easily check “double errors” of the C code matrix. Suppose that the code matrix C has elements x and y error as shown below:

    [xyc3c4] (4.10)

    Then,

    xc4yc3=det(M)(1)n(2i) (4.11)

    However, according to the (3.19) there is the following relation between x and y

    xτy (4.12)

    Again, only integer solutions are acceptable. If no integer solution is obtained, then two-fold errors have not occurred.

    Hence, we can show that with this type of approach, there is the possibility to correct all possible triple-fold errors in the C code matrix.

    [xyzc4].

    Therefore, our method of error correction depends on the verification of different hypotheses regarding errors in the code matrix using the determinant of the control relationship C matrix, (3.19) and (3.20), and the elements of the code matrix as integers. If all our solutions do not reach integer solutions, it means that the determinant of the control item M is wrong or there is a four-fold error in the C code matrix, and we should reject it. The code matrix C is defective and not correctable.

    As a result, there are 15 error conditions in the C code matrix. According to the method given in [17], it means that the correctable probability of the method is equal since 14 cases between them can be corrected and

    Scor=1415=0.9333=93.33%

    If we generalize this equation as in [20], since only k2 fold errors cannot be corrected with this method, the error correction capacity of the method is

    2k212k2

    where k is the order of the message-matrix. So far sufficiently large values of k, the probability of decoding error is almost zero.

    Consequently, for a sufficiently large value of k, in the case of n=k, the correct ability of this method is

    2k222k21.

    Therefore, for large value of k, the correct possibility of the method is

    2k222k211=100%.

    In this paper, we obtained the coding theory for k-order Gaussian Fibonacci polynomials given in [16] by taking x=1 for k-order Gaussian Fibonacci numbers and gave illustrative examples. This coding method differs from classical algebraic coding methods in this respect. We can show this difference with the following features:

    1)      Since the n,k and s0 values are arbitrarily chosen in the k-order Gaussian Fibonacci coding theory, it is difficult to estimate the information transmission between the two channels by a third channel, which increases the reliability of the information transmission. In addition, this method depends on matrix multiplication and can be performed quickly and easily by today’s computers.

    2)      With k-order Gaussian Fibonacci coding theory, we can encrypt and send messages of the desired length by enlarging the k value sufficiently.

    3)      The main practical feature of this method is that matrix elements are error detection and correction objects.

    4)      The Gaussian Fibonacci coding method, which is the simplest coding method obtained for the k=2 value, has been redefined by handling the 2×2 type matrices with “single-fold, double-fold and triple-fold errors”.

    5)      In the simplest case, for k=2, the correct capability of the method is essentially equal to 93.33%, exceeding all well-known correction codes.

    6)      This error correction method given for k=2 is generalized and the correct ability of the errors of this method increases as k increases, and the correct ability approaches 100% for a sufficiently large value of k.

    7)      This article is just a brief outline of a new coding theory based on the k-order Gaussian Fibonacci matrices of the articles in [17,18,20,21] and [22].

    The authors declare there is no conflict of interest.



    [1] S. B. Chen, H. Jahanshahi, O. A. Abba, J. E. Solís-Pérez, S. Bekiros, J. F. Gómez-Aguilar, et al., The effect of market confidence on a financial system from the perspective of fractional calculus: Numerical investigation and circuit realization, Chaos, Soliton. Fract., 140 (2020), 110223. https://doi.org/10.1016/j.chaos.2020.110223 doi: 10.1016/j.chaos.2020.110223
    [2] P. Ma, A. Najafi, J. F. Gomez-Aguilar, Sub mixed fractional Brownian motion and its application to finance, Chaos, Soliton. Fract., 184 (2024), 114968. https://doi.org/10.1016/j.chaos.2024.114968 doi: 10.1016/j.chaos.2024.114968
    [3] J. Wu, J. F. Gomez-Aguilar, R. Taleghani, Portfolio optimization under the uncertain financial model, Comput. Econ., 2024, 1–22. https://doi.org/10.1007/s10614-024-10727-w doi: 10.1007/s10614-024-10727-w
    [4] J. P. Aguilar, J. Korbel, N. Pesci, On the quantitative properties of some market models involving fractional derivatives, Mathematics, 9 (2021), 3198. https://doi.org/10.3390/math9243198 doi: 10.3390/math9243198
    [5] F. Black, M. Scholes, The pricing of options and corporate liabilities, J. Polit. Econ., 81 (1973), 637–654. https://doi.org/10.1086/260062 doi: 10.1086/260062
    [6] P. Carr, L. Wu, The finite moment log stable process and option pricing, J. Finance, 58 (2003), 753–777. https://doi.org/10.1111/1540-6261.00544 doi: 10.1111/1540-6261.00544
    [7] A. I. Alaje, M. O. Olayiwola, K. A. Adedokun, J. A. Adedeji, A. O. Oladapo, Y. O. Akeem, The modified homotopy perturbation method and its application to the dynamics of price evolution in Caputo-fractional order Black Scholes model, Beni-Suef Univ. J. Basic Appl. Sci., 12 (2023), 93. https://doi.org/10.1186/s43088-023-00433-1 doi: 10.1186/s43088-023-00433-1
    [8] S. N. Ogunyebi, S. E. Fadugba, T. O. Ogunlade, K. J. Adebayo, B. T. Babalola, O. Faweya, et al., Direct solution of the Black-Scholes PDE models with non-integer order, J. Phys. Conf. Ser., 2199 (2022), 012003. https://doi.org/10.1088/1742-6596/2199/1/012003 doi: 10.1088/1742-6596/2199/1/012003
    [9] G. Jumarie, Derivation and solutions of some fractional Black-Scholes equations in coarse-grained space and time. application to merton's optimal portfolio, Comput. Math. Appl., 59 (2010), 1142–1164. https://doi.org/10.1016/j.camwa.2009.05.015 doi: 10.1016/j.camwa.2009.05.015
    [10] J. Korbel, Y. Luchko, Modeling of financial processes with a space-time fractional diffusion equation of varying order, Fract. Calc. Appl. Anal., 19 (2016), 1414–1433. https://doi.org/10.1515/fca-2016-0073 doi: 10.1515/fca-2016-0073
    [11] A. Farhadi, M. Salehi, G. H. Erjaee, A new version of Black-Scholes equation presented by time-fractional derivative, Iran J. Sci. Technol. Trans. Sci., 42 (2018), 2159–2166. https://doi.org/10.1007/s40995-017-0244-7 doi: 10.1007/s40995-017-0244-7
    [12] A. Cartea, D. del Castillo-Negrete, Fractional diffusion models of option prices in markets with jumps, Phys. A: Stat. Mech. Appl., 374 (2007), 749–763. https://doi.org/10.1016/j.physa.2006.08.071 doi: 10.1016/j.physa.2006.08.071
    [13] Q. Li, Y. Zhou, X. Zhao, X. Ge, Fractional order stochastic differential equation with application in European option pricing, Discrete Dyn. Nat. Soc., 2014 (2014), 621895. https://doi.org/10.1155/2014/621895 doi: 10.1155/2014/621895
    [14] W. Chen, X. Xu, S. P. Zhu, A predictor–corrector approach for pricing American options under the finite moment log-stable model, Appl. Numer. Math., 97 (2015), 15–29. https://doi.org/10.1016/j.apnum.2015.06.004 doi: 10.1016/j.apnum.2015.06.004
    [15] W. Chen, S. Wang, A penalty method for a fractional order parabolic variational inequality governing American put option valuation, Comput. Math. Appl., 67 (2014) 77–90. https://doi.org/10.1016/j.camwa.2013.10.007 doi: 10.1016/j.camwa.2013.10.007
    [16] G. Colldeforns-Papiol, L. Ortiz-Gracia, C. W. Oosterlee, Two-dimensional Shannon wavelet inverse Fourier technique for pricing European options, Appl. Numer. Math., 117 (2017), 115–138. https://doi.org/10.1016/j.apnum.2017.03.002 doi: 10.1016/j.apnum.2017.03.002
    [17] M. J. Ruijter, C. W. Oosterlee, Two-dimensional Fourier cosine series expansion method for pricing financial options, SIAM J. Sci. Comput., 34 (2012), B642–B671. https://doi.org/10.1137/120862053 doi: 10.1137/120862053
    [18] Q. J. Meng, D. Ding, An efficient pricing method for rainbow options based on two-dimensional modified sine–sine series expansions, Int. J. Comput. Math., 90 (2013), 1096–1113. https://doi.org/10.1080/00207160.2012.749349 doi: 10.1080/00207160.2012.749349
    [19] W. Wang, X. Chen, D. Ding, S. L. Lei, Circulant preconditioning technique for barrier options pricing under fractional diffusion models, Int. J. Comput. Math., 92 (2015), 2596–2614. https://doi.org/10.1080/00207160.2015.1077948 doi: 10.1080/00207160.2015.1077948
    [20] X. Chen, W. Wang, D. Ding, S. L. Lei, A fast preconditioned policy iteration method for solving the tempered fractional HJB equation governing American options valuation, Comput. Math. Appl., 73 (2017), 1932–1944. https://doi.org/10.1016/j.camwa.2017.02.040 doi: 10.1016/j.camwa.2017.02.040
    [21] S. L. Lei, W. Wang, X. Chen, D. Ding, A fast preconditioned penalty method for American options pricing under regime-switching tempered fractional diffusion models, J. Sci. Comput., 75 (2018), 1633–1655. https://doi.org/10.1007/s10915-017-0602-9 doi: 10.1007/s10915-017-0602-9
    [22] S. Kim, D. Jeong, C. Lee, J. Kim, Finite difference method for the multi-asset Black–Scholes equations, Mathematics, 8 (2020), 391. https://doi.org/10.3390/math8030391 doi: 10.3390/math8030391
    [23] D. Černá, K. Fiňková, Option pricing under multifactor Black–Scholes model using orthogonal spline wavelets, Math. Comput. Simul., 220 (2024), 309–340. https://doi.org/10.1016/j.matcom.2024.01.020 doi: 10.1016/j.matcom.2024.01.020
    [24] J. Choi, Sum of all Black–Scholes–Merton models: an efficient pricing method for spread, basket, and Asian options, J. Futures Markets, 38 (2018), 627–644. https://doi.org/10.1002/fut.21909 doi: 10.1002/fut.21909
    [25] C. Bayer, C. B. Hammouda, A. Papapantoleon, M. Samet, R. Tempone, Quasi-Monte Carlo for efficient fourier pricing of multi-asset options, arXiv Preprint, 2024. https://doi.org/10.48550/arXiv.2403.02832
    [26] W. Chen, S. Wang, A 2nd-order FDM for a 2D fractional Black-Scholes equation, In: I. Dimov, I. Faragó, L. Vulkov, Numerical analysis and its applications, NAA 2016, Lecture Notes in Computer Science, Springer, Cham., 10187 (2017), 46–57. https://doi.org/10.1007/978-3-319-57099-0_5
    [27] W. Chen, S. Wang, A power penalty method for a 2D fractional partial differential linear complementarity problem governing two-asset American option pricing, Appl. Math. Comput., 305 (2017), 174–187. https://doi.org/10.1016/j.amc.2017.01.069 doi: 10.1016/j.amc.2017.01.069
    [28] L. Mohan, A. Prakash, Stability and numerical analysis of the generalised time-fractional Cattaneo model for heat conduction in porous media, Eur. Phys. J. Plus, 138 (2023), 1–28. https://doi.org/10.1140/epjp/s13360-023-03765-0 doi: 10.1140/epjp/s13360-023-03765-0
    [29] K. S. Chaudhary, N. Kumar, Fractional order fast terminal sliding mode control scheme for tracking control of robot manipulators, ISA Trans., 142 (2023), 57–69. https://doi.org/10.1016/j.isatra.2023.08.008 doi: 10.1016/j.isatra.2023.08.008
    [30] N. Kumar, K. S Chaudhary, Motion control of underactuated Cart-Double-Pendulum system Via fractional-order sliding mode controller, In: R. Kumar, A. K. Verma, O. P. Verma, T. Wadehra, Soft computing: theories and applications, SoCTA 2023, Lecture Notes in Networks and Systems, Springer, Singapore, 970 (2023), 155–165. https://doi.org/10.1007/978-981-97-2031-6_14
    [31] I. Ahmad, A. A. Bakar, R. Jan, S. Yussof, Dynamic behaviors of a modified computer virus model: insights into parameters and network attributes, Alex. Eng. J., 103 (2024), 266–277. https://doi.org/10.1016/j.aej.2024.06.009 doi: 10.1016/j.aej.2024.06.009
    [32] A. A. Khan, M. Ahsan, I. Ahmad, M. Alwuthaynani, Enhanced resolution in solving first-order nonlinear differential equations with integral condition: a high-order wavelet approach, Eur. Phys. J. Spec. Top., 2024, 1–14. https://doi.org/10.1140/epjs/s11734-024-01254-8
    [33] A. Prakash, L. Mohan, Two efficient techniques for analysis and simulation of time-fractional Tricomi equation, Sādhanā, 49 (2024), 1–13. https://doi.org/10.1007/s12046-024-02482-3 doi: 10.1007/s12046-024-02482-3
    [34] I. Ali, I. Ahmad, Applications of the nonlinear Klein/Sinh-Gordon equations in modern physics: a numerical study, Math. Model. Control, 4 (2024), 361–373. https://doi.org/10.3934/mmc.2024029 doi: 10.3934/mmc.2024029
    [35] J. F. Li, I. Ahmad, H. Ahmad, D. Shah, Y. M. Chu, P. Thounthong, et al., Numerical solution of two-term time-fractional PDE models arising in mathematical physics using local meshless method, Open Phys., 18 (2020), 1063–1072. https://doi.org/10.1515/phys-2020-0222 doi: 10.1515/phys-2020-0222
    [36] F. Wang, I. Ahmad, H. Ahmad, M. D. Alsulami, K. S. Alimgeer, C. Cesarano, et al., Meshless method based on RBFs for solving three-dimensional multi-term time fractional PDEs arising in engineering phenomenons, J. King Saud Univ.-Sci., 33 (2021), 101604. https://doi.org/10.1016/j.jksus.2021.101604 doi: 10.1016/j.jksus.2021.101604
    [37] F. Wang, M. N. Khan, I. Ahmad, H. Ahmad, H. Abu-Zinadah, Y. M. Chu, Numerical solution of traveling waves in chemical kinetics: time-fractional Fishers equations, Fractals, 30 (2022), 2240051. https://doi.org/10.1142/S0218348X22400515 doi: 10.1142/S0218348X22400515
    [38] I. Ahmad, M. Ahsan, I. Hussain, P. Kumam, W. Kumam, Numerical simulation of PDEs by local meshless differential quadrature collocation method, Symmetry, 11 (2019), 394. https://doi.org/10.3390/sym11030394 doi: 10.3390/sym11030394
    [39] I. Ahmad, A. O. Alshammari, R. Jan, N. N. A. Razak, S. A. Idris, An efficient numerical solution of a multi-dimensional two-term fractional order PDE via a hybrid methodology: the Caputo–Lucas–Fibonacci approach with strang splitting, Fractal Fract., 8 (2024), 364. https://doi.org/10.3390/fractalfract8060364 doi: 10.3390/fractalfract8060364
    [40] M. N. Khan, I. Ahmad, M. Shakeel, R. Jan, Fractional calculus analysis: investigating Drinfeld-Sokolov-Wilson system and Harry Dym equations via meshless procedures, Math. Model. Control, 4 (2024), 86–100. https://doi.org/10.3934/mmc.2024008 doi: 10.3934/mmc.2024008
    [41] M. N. Khan, I. Ahmad, A. Akgül, H. Ahmad, P. Thounthong, Numerical solution of time-fractional coupled Korteweg–de Vries and Klein–Gordon equations by local meshless method, Pramana, 95 (2021), 1–13. https://doi.org/10.1007/s12043-020-02025-5 doi: 10.1007/s12043-020-02025-5
    [42] I. Ahmad, M. Ahsan, Z. Din, A. Masood, P. Kumam, An efficient local formulation for time–dependent PDEs, Mathematics, 7 (2019), 216. https://doi.org/10.3390/math7030216 doi: 10.3390/math7030216
    [43] G. Yao, Siraj-ul-Islam, B. Sarler, A comparative study of global and local meshless methods for diffusion-reaction equation, Comput. Model. Eng. Sci., 59 (2010), 127–154. https://doi.org/10.3970/cmes.2010.059.127 doi: 10.3970/cmes.2010.059.127
    [44] Siraj-ul-Islam, I. Ahmad, A comparative analysis of local meshless formulation for multi-asset option models, Eng. Anal. Bound. Elem., 65 (2016), 159–176. https://doi.org/10.1016/j.enganabound.2015.12.020 doi: 10.1016/j.enganabound.2015.12.020
    [45] L. Mohan, A. Prakash, An efficient technique for solving fractional diffusion equations arising in oil pollution via natural transform, Waves Random Complex Media, 2023, 1–22. https://doi.org/10.1080/17455030.2023.2273323
    [46] L. Mohan, A. Prakash, Stability and numerical analysis of fractional BBM-Burger equation and fractional diffusion-wave equation with Caputo derivative, Opt. Quant. Electron., 56 (2024), 26. https://doi.org/10.1007/s11082-023-05608-9 doi: 10.1007/s11082-023-05608-9
    [47] A. Prakash, L. Mohan, Application of Caputo fractional operator to analyse the fractional model of Brain Tumour via modified technique, Int. J. Appl. Comput. Math., 9 (2023), 117. https://doi.org/10.1007/s40819-023-01591-7 doi: 10.1007/s40819-023-01591-7
    [48] G. Jumarie, Stock exchange fractional dynamics defined as fractional exponential growth driven by (usual) Gaussian white noise. Application to fractional Black-Scholes equations, Insur.: Math. Econ., 42 (2008), 271–287. https://doi.org/10.1016/j.insmatheco.2007.03.001 doi: 10.1016/j.insmatheco.2007.03.001
    [49] M. Caputo, Linear models of dissipation whose Q is almost frequency independent-Ⅱ, Geophys. J. Int., 13 (1967), 529–539. https://doi.org/10.1111/j.1365-246X.1967.tb02303.x doi: 10.1111/j.1365-246X.1967.tb02303.x
    [50] A. Atangana, D. Baleanu, New fractional derivatives with non-local and nonsingular kernel theory and application to heat transfer model, Therm. Sci., 20 (2016), 763–769. https://doi.org/10.2298/TSCI160111018A doi: 10.2298/TSCI160111018A
    [51] J. H. He, Z. B. Li, Q. L. Wang, A new fractional derivative and its application to explanation of polar bear hairs, J. King Saud. Univ.-Sci., 28 (2016), 190–192. https://doi.org/10.1016/j.jksus.2015.03.004 doi: 10.1016/j.jksus.2015.03.004
    [52] Z. Z. Sun, X. Wu, A fully discrete difference scheme for a diffusion-wave system, Appl. Numer. Math., 56 (2006), 193–209. https://doi.org/10.1016/j.apnum.2005.03.003 doi: 10.1016/j.apnum.2005.03.003
    [53] S. A. Sarra, A local radial basis function method for advection–diffusion–reaction equations on complexly shaped domains, Appl. Math. Comput., 218 (2012), 9853–9865. https://doi.org/10.1016/j.amc.2012.03.062 doi: 10.1016/j.amc.2012.03.062
    [54] A. Q. M. Khaliq, D. A. Voss, K. Kazmi, Adaptive θ-methods for pricing American options, J. Comput. Appl. Math., 222 (2008), 210–227. https://doi.org/10.1016/j.cam.2007.10.035 doi: 10.1016/j.cam.2007.10.035
    [55] M. K. Kadalbajooa, A. Kumar, L. P. Tripathia, Application of local radial basis function based finite difference method for American option problems, Int. J. Comput. Math., 92 (2015), 1608–1624. https://doi.org/10.1080/00207160.2014.950571 doi: 10.1080/00207160.2014.950571
    [56] B. F. Nielsen, O. Skavhaug, A. Tveito, Penalty and front-fixing methods for the numerical solution of American option problems, J. Comput. Finance, 5 (2002), 69–97. https://doi.org/10.21314/JCF.2002.084 doi: 10.21314/JCF.2002.084
    [57] G. E. Fasshauer, A. Q. M. Khaliq, D. A. Voss, Using meshfree approximation for multi-asset American option problems, J. Chin. Inst. Eng., 27 (2004), 563–571. https://doi.org/10.1080/02533839.2004.9670904 doi: 10.1080/02533839.2004.9670904
    [58] C. S. Huang, C. H. Hung, S. Wang, A fitted finite volume method for the valuation of options on assets with stochastic volatilities, Computing, 77 (2006), 297–320. https://doi.org/10.1007/s00607-006-0164-4 doi: 10.1007/s00607-006-0164-4
    [59] C. S. Huang, C. H. Hung, S. Wang, On convergence of a fitted finite-volume method for the valuation of options on assets with stochastic volatilities, IMA J. Numer. Anal., 30 (2010), 1101–1120. https://doi.org/10.1093/imanum/drp016 doi: 10.1093/imanum/drp016
    [60] Z. Cen, J. Huang, A. Xu, A. Le, Numerical approximation of a time-fractional Black–Scholes equation, Comput. Math. Appl., 75 (2018), 2874–2887. https://doi.org/10.1016/j.camwa.2018.01.016 doi: 10.1016/j.camwa.2018.01.016
  • This article has been cited by:

    1. Öznur ÖZTUNÇ KAYMAK, Coding theory for h(x)-Fibonacci polynomials, 2024, 26, 1301-7985, 226, 10.25092/baunfbed.1347379
    2. Bahar Demirtürk, Combinatorial Analysis of k-Oresme and k-Oresme–Lucas Sequences, 2025, 17, 2073-8994, 697, 10.3390/sym17050697
  • Reader Comments
  • © 2025 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(254) PDF downloads(34) Cited by(0)

Figures and Tables

Figures(10)  /  Tables(2)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog