{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T18:19:37Z","timestamp":1769192377024,"version":"3.49.0"},"reference-count":23,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2025,2,22]],"date-time":"2025-02-22T00:00:00Z","timestamp":1740182400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>The rapid and accurate transfer of information is essential in today\u2019s digital world, where error detecting and correcting codes play a crucial role. In this context, Fibonacci numbers have been extensively applied in coding theory, particularly in coding structures based on Fibonacci polynomials and symmetric matrices. This study proposes a novel coding framework by defining and using some new Fibonacci matrices with their determinants. The properties of these matrices are analyzed to construct efficient coding and error correction mechanisms. The proposed structure enables the transmission of larger data volumes in a single iteration without compromising the error correction performance, demonstrating the potential of Fibonacci matrices for reliable and efficient information transfer.<\/jats:p>","DOI":"10.3390\/sym17030333","type":"journal-article","created":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T07:46:57Z","timestamp":1740383217000},"page":"333","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Some New Fibonacci Matrices and Error Detecting-Correcting Codes"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6197-4958","authenticated-orcid":false,"given":"Ferhat","family":"K\u00fcr\u00fcz","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Istanbul Gelisim University, 34310 Istanbul, Turkey"}]}],"member":"1968","published-online":{"date-parts":[[2025,2,22]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2738","DOI":"10.1016\/j.camwa.2010.08.091","article-title":"A Fibonacci-polynomial based coding method with error detection and correction","volume":"60","author":"Esmaeili","year":"2010","journal-title":"Comput. Math. Appl."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/s40065-017-0171-7","article-title":"Optimal codes from Fibonacci polynomials and secret sharing schemes","volume":"6","author":"Koroglu","year":"2017","journal-title":"Arab. J. Math."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"2522","DOI":"10.1016\/j.chaos.2009.03.197","article-title":"Coding theory on the m-extension of the Fibonacci p-numbers","volume":"42","author":"Basu","year":"2009","journal-title":"Chaos Solitons Fractals"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1016\/j.chaos.2005.12.054","article-title":"Fibonacci matrices, a generalization of the \u201cCassini formula\u201d, and a new coding theory","volume":"30","author":"Stakhov","year":"2006","journal-title":"Chaos Solitons Fractals"},{"key":"ref_5","first-page":"54","article-title":"Application of Jacobsthal and Jacobsthal-Lucas numbers in coding theory","volume":"57","year":"2017","journal-title":"Math. Montisnigri"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Akbiyik, M., and Alo, J. (2021). On Third-Order Bronze Fibonacci Numbers. Mathematics, 9.","DOI":"10.3390\/math9202606"},{"key":"ref_7","unstructured":"Akbiyik, S.Y. (2024). The third order Nickel Fibonacci numbers. Log. J. IGPL, jzae122."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"17497","DOI":"10.1007\/s00500-020-05256-1","article-title":"New algebraic and geometric constructs arising from Fibonacci numbers: In honor of Masami Ito","volume":"24","author":"Caldarola","year":"2020","journal-title":"Soft Comput."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"5777","DOI":"10.37256\/cm.5420244871","article-title":"Some Identities for the (a, b; k)-Nacci Sequences","volume":"5","author":"Sirivoravit","year":"2024","journal-title":"Contemp. Math."},{"key":"ref_10","first-page":"125","article-title":"k-Fibonacci and k-Lucas Hybrid Numbers","volume":"2021","author":"Erkan","year":"2021","journal-title":"Tamap J. Math. Stat."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"113396","DOI":"10.1016\/j.chaos.2023.113396","article-title":"Image encryption based on 8D hyperchaotic system using Fibonacci Q-Matrix","volume":"170","author":"Biban","year":"2023","journal-title":"Chaos Solitons Fractals"},{"key":"ref_12","first-page":"1","article-title":"A novel color image encryption method using Fibonacci transformation and chaotic systems","volume":"12","author":"Xu","year":"2023","journal-title":"EAI Endorsed Trans. Scalable Inf. Syst."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"8425","DOI":"10.2298\/FIL2325425K","article-title":"Pell and Pell-Lucas hybrid quaternions","volume":"37","year":"2023","journal-title":"Filomat"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00236-024-00473-9","article-title":"Dense non-binary Fibonacci codes","volume":"62","author":"Klein","year":"2025","journal-title":"Acta Inform."},{"key":"ref_15","unstructured":"Stakhov, A.P. (1977). Introduction into Algorithmic Measurement Theory, Soviet Radio."},{"key":"ref_16","unstructured":"Hoggatt, V.E. (1969). Fibonacci and Lucas Numbers, Houghton Mifflin."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1080\/00150517.1981.12430088","article-title":"A history of the Fibonacci Q-matrix and a higher-dimensional problem","volume":"19","author":"Gould","year":"1981","journal-title":"Fibonacci Quart"},{"key":"ref_18","first-page":"46","article-title":"A generalization of the Fibonacci Q-matrix","volume":"9","author":"Stakhov","year":"1999","journal-title":"Rep. Natl. Acad. Sci. Ukraine"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1111\/j.1949-8594.1944.tb06202.x","article-title":"The Fibonacci Numbers","volume":"44","author":"Struyk","year":"1944","journal-title":"Sch. Sci. Math."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1080\/00029890.1961.11989696","article-title":"A generalized Fibonacci sequence","volume":"68","author":"Horadam","year":"1961","journal-title":"Am. Math. Mon."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2517","DOI":"10.1016\/j.chaos.2008.09.030","article-title":"The generalized relations among the code elements for Fibonacci coding theory","volume":"41","author":"Basu","year":"2009","journal-title":"Chaos Solitons Fractals"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1450008-1","DOI":"10.1142\/S1793830914500086","article-title":"Tribonacci matrices and a new coding theory","volume":"6","author":"Basu","year":"2014","journal-title":"Discret. Math. Algorithms Appl."},{"key":"ref_23","unstructured":"American National Standards Institute (2025, February 21). 2022. American Standard Code for Information Interchange (ASCII). Available online: https:\/\/www.ascii-code.com\/."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/3\/333\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:40:28Z","timestamp":1760028028000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/3\/333"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,22]]},"references-count":23,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025,3]]}},"alternative-id":["sym17030333"],"URL":"https:\/\/doi.org\/10.3390\/sym17030333","relation":{},"ISSN":["2073-8994"],"issn-type":[{"value":"2073-8994","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,22]]}}}