Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India...

805
N° 40 – July 2018 Italian Journal of Pure and Applied Mathematics ISSN 2239-0227 EDITOR-IN-CHIEF Piergiulio Corsini Editorial Board Saeid Abbasbandy Praveen Agarwal Bayram Ali Ersoy Reza Ameri Luisa Arlotti Alireza Seyed Ashrafi Krassimir Atanassov Vadim Azhmyakov Malvina Baica Federico Bartolozzi Rajabali Borzooei Carlo Cecchini Gui-Yun Chen Domenico Nico Chillemi Stephen Comer Irina Cristea Mohammad Reza Darafsheh Bal Kishan Dass Bijan Davvaz Mario De Salvo Alberto Felice De Toni Mostafa Eslami Franco Eugeni Giovanni Falcone Yuming Feng Antonino Giambruno Furio Honsell Luca Iseppi James Jantosciak Tomas Kepka David Kinderlehrer Sunil Kumar Andrzej Lasota Violeta Leoreanu-Fotea Maria Antonietta Lepellere Mario Marchi Donatella Marini Angelo Marzollo Antonio Maturo Fabrizio Maturo Sarka Hozkova-Mayerova Vishnu Narayan Mishra M. Reza Moghadam Syed Tauseef Mohyud-Din Petr Nemec Vasile Oproiu Livio C. Piccinini Goffredo Pieroni Flavio Pressacco Vito Roberto Ivo Rosenberg Gaetano Russo Paolo Salmon Maria Scafati Tallini Kar Ping Shum Alessandro Silva Florentin Smarandache Sergio Spagnolo Stefanos Spartalis Hari M. Srivastava Yves Sureau Carlo Tasso Ioan Tofan Aldo Ventre Thomas Vougiouklis Hans Weber Shanhe Wu Xiao-Jun Yang Yunqiang Yin Mohammad Mehdi Zahedi Fabio Zanolin Paolo Zellini Jianming Zhan F O R U M

Transcript of Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India...

Page 1: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

N° 40 – July 2018

Italian Journal of Pure andApplied Mathematics

ISSN 2239-0227

EDITOR-IN-CHIEFPiergiulio Corsini

Editorial BoardSaeid AbbasbandyPraveen AgarwalBayram Ali Ersoy

Reza AmeriLuisa Arlotti

Alireza Seyed AshrafiKrassimir AtanassovVadim Azhmyakov

Malvina BaicaFederico BartolozziRajabali Borzooei

Carlo CecchiniGui-Yun Chen

Domenico Nico ChillemiStephen Comer

Irina CristeaMohammad Reza Darafsheh

Bal Kishan DassBijan Davvaz

Mario De SalvoAlberto Felice De Toni

Mostafa Eslami Franco Eugeni

Giovanni FalconeYuming Feng

Antonino GiambrunoFurio HonsellLuca Iseppi

James JantosciakTomas Kepka

David KinderlehrerSunil Kumar

Andrzej LasotaVioleta Leoreanu-Fotea

Maria Antonietta LepellereMario Marchi

Donatella MariniAngelo MarzolloAntonio MaturoFabrizio Maturo

Sarka Hozkova-MayerovaVishnu Narayan Mishra

M. Reza MoghadamSyed Tauseef Mohyud-Din

Petr NemecVasile Oproiu

Livio C. PiccininiGoffredo PieroniFlavio Pressacco

Vito Roberto

Ivo RosenbergGaetano RussoPaolo Salmon

Maria Scafati TalliniKar Ping ShumAlessandro Silva

Florentin SmarandacheSergio Spagnolo

Stefanos SpartalisHari M. Srivastava

Yves SureauCarlo TassoIoan TofanAldo Ventre

Thomas VougiouklisHans WeberShanhe Wu

Xiao-Jun YangYunqiang Yin

Mohammad Mehdi ZahediFabio ZanolinPaolo Zellini

Jianming Zhan

F O R U M

Page 2: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

EDITOR-IN-CHIEF

Piergiulio Corsini Department of Civil Engineering and Architecture Via delle Scienze 206 - 33100 Udine, Italy [email protected]

VICE-CHIEFS

Violeta LeoreanuMaria Antonietta Lepellere

MANAGING BOARD

Domenico Chillemi, CHIEFPiergiulio CorsiniIrina CristeaAlberto Felice De ToniFurio HonsellVioleta LeoreanuMaria Antonietta LepellereElena MocanuLivio PiccininiFlavio PressaccoLuminita TeodorescuNorma Zamparo

EDITORIAL BOARD

Saeid Abbasbandy Dept. of Mathematics, Imam Khomeini International University, Ghazvin, 34149-16818, Iran [email protected]

Praveen Agarwal Department of Mathematics, Anand International College of Engineering Jaipur-303012, India [email protected]

Bayram Ali Ersoy Department of Mathematics, Yildiz Technical University 34349 Beşiktaş, Istanbul, Turkey [email protected]

Reza Ameri Department of Mathematics University of Tehran, Tehran, Iran [email protected]

Luisa Arlotti Department of Civil Engineering and Architecture Via delle Scienze 206 - 33100 Udine, Italy [email protected]

Alireza Seyed Ashrafi Department of Pure Mathematics University of Kashan, Kāshān, Isfahan, Iran [email protected]

Krassimir Atanassov Centre of Biomedical Engineering, Bulgarian Academy of Science BL 105 Acad. G. Bontchev Str. 1113 Sofia, Bulgaria [email protected]

Vadim Azhmyakov Department of Basic Sciences, Universidad de Medellin, Medellin, Republic of Colombia [email protected]

Malvina Baica University of Wisconsin-Whitewater Dept. of Mathematical and Computer Sciences Whitewater, W.I. 53190, U.S.A. [email protected]

Federico Bartolozzi Dipartimento di Matematica e Applicazioni via Archirafi 34 - 90123 Palermo, Italy [email protected]

Rajabali Borzooei Department of Mathematics Shahid Beheshti University, Tehran, Iran [email protected]

Carlo Cecchini Dipartimento di Matematica e Informatica Via delle Scienze 206 - 33100 Udine, Italy [email protected]

Gui-Yun Chen School of Mathematics and Statistics, Southwest University, 400715, Chongqing, China [email protected]

Domenico (Nico) Chillemi Executive IT Specialist, IBM z System Software IBM Italy SpA Via Sciangai 53 – 00144 Roma, Italy [email protected]

Stephen Comer Department of Mathematics and Computer Science The Citadel, Charleston S. C. 29409, USA [email protected]

Irina Cristea CSIT, Centre for Systems and Information Technologies University of Nova Gorica Vipavska 13, Rožna Dolina, SI-5000 Nova Gorica, Slovenia [email protected]

Mohammad Reza Darafsheh School of Mathematics, College of Science University of Tehran, Tehran, Iran [email protected]

Bal Kishan Dass Department of Mathematics University of Delhi, Delhi - 110007, India [email protected]

Bijan Davvaz Department of Mathematics, Yazd University, Yazd, Iran [email protected]

Mario De Salvo Dipartimento di Matematica e Informatica Viale Ferdinando Stagno d'Alcontres 31, Contrada Papardo 98166 Messina [email protected]

Alberto Felice De Toni Udine University, Rector Via Palladio 8 - 33100 Udine, Italy [email protected]

Franco Eugeni Dipartimento di Metodi Quantitativi per l'Economia del Territorio Università di Teramo, Italy [email protected]

Mostafa Eslami Department of Mathematics Faculty of Mathematical Sciences University of Mazandaran, Babolsar, Iran [email protected]

Giovanni Falcone Dipartimento di Metodi e Modelli Matematici viale delle Scienze Ed. 8 90128 Palermo, Italy [email protected]

Yuming Feng College of Math. and Comp. Science, Chongqing Three-Gorges University, Wanzhou, Chongqing, 404000, P.R.China [email protected]

Antonino Giambruno Dipartimento di Matematica e Applicazioni via Archirafi 34 - 90123 Palermo, Italy [email protected]

Furio Honsell Dipartimento di Matematica e Informatica Via delle Scienze 206 - 33100 Udine, Italy [email protected]

Luca Iseppi Department of Civil Engineering and Architecture, section of Economics and Landscape Via delle Scienze 206 - 33100 Udine, Italy [email protected]

James Jantosciak Department of Mathematics, Brooklyn College (CUNY) Brooklyn, New York 11210, USA [email protected]

Tomas Kepka MFF-UK Sokolovská 83 18600 Praha 8,Czech Republic [email protected]

David Kinderlehrer Department of Mathematical Sciences, Carnegie Mellon University Pittsburgh, PA15213-3890, USA [email protected]

Sunil Kumar Department of Mathematics, National Institute of Technology Jamshedpur, 831014, Jharkhand, India [email protected]

Andrzej Lasota Silesian University, Institute of Mathematics Bankova 14 40-007 Katowice, Poland [email protected]

Violeta Leoreanu-Fotea Faculty of Mathematics Al. I. Cuza University 6600 Iasi, Romania [email protected]

Maria Antonietta Lepellere Department of Civil Engineering and Architecture Via delle Scienze 206 - 33100 Udine, Italy [email protected]

Mario Marchi Università Cattolica del Sacro Cuore via Trieste 17, 25121 Brescia, Italy [email protected]

Donatella Marini Dipartimento di Matematica Via Ferrata 1- 27100 Pavia, Italy [email protected]

Angelo Marzollo Dipartimento di Matematica e Informatica Via delle Scienze 206 - 33100 Udine, Italy [email protected]

Antonio Maturo University of Chieti-Pescara, Department of Social Sciences, Via dei Vestini, 31 66013 Chieti, Italy [email protected]

Fabrizio Maturo University of Chieti-Pescara, Department of Management and Business Administration, Viale Pindaro, 44 65127 Pescara, Italy [email protected]

Sarka Hoskova-Mayerova Department of Mathematics and Physics University of Defence Kounicova 65, 662 10 Brno, Czech Republic [email protected]

Vishnu Narayan Mishra Applied Mathematics and Humanities Department Sardar Vallabhbhai National Institute of Technology 395 007, Surat, Gujarat, India [email protected]

M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of Mashhadh P.O.Box 1159 - 91775 Mashhad, Iran [email protected] Syed Tauseef Mohyud-Din Faculty of Sciences, HITEC University Taxila Cantt Pakistan [email protected]

Petr Nemec Czech University of Life Sciences, Kamycka’ 129 16521 Praha 6, Czech Republic [email protected]

Vasile Oproiu Faculty of Mathematics Al. I. Cuza University 6600 Iasi, Romania [email protected]

Livio C. Piccinini Department of Civil Engineering and Architecture Via delle Scienze 206 - 33100 Udine, Italy [email protected]

Goffredo Pieroni Dipartimento di Matematica e Informatica Via delle Scienze 206 - 33100 Udine, Italy [email protected]

Flavio Pressacco Dept. of Economy and Statistics Via Tomadini 30 33100, Udine, Italy [email protected]

Vito Roberto Dipartimento di Matematica e Informatica Via delle Scienze 206 - 33100 Udine, Italy [email protected]

Ivo Rosenberg Departement de Mathematique et de Statistique Université de Montreal C.P. 6128 Succursale Centre-Ville Montreal, Quebec H3C 3J7 - Canada [email protected]

Gaetano Russo Department of Civil Engineering and Architecture Via delle Scienze 206 33100 Udine, Italy [email protected] Paolo Salmon Dipartimento di Matematica, Università di Bologna Piazza di Porta S. Donato 5 40126 Bologna, Italy [email protected]

Maria Scafati Tallini Dipartimento di Matematica "Guido Castelnuovo" Università La Sapienza Piazzale Aldo Moro 2 - 00185 Roma, Italy [email protected]

Kar Ping Shum Faculty of Science The Chinese University of Hong Kong Hong Kong, China (SAR) [email protected]

Alessandro Silva Dipartimento di Matematica "Guido Castelnuovo" Università La Sapienza Piazzale Aldo Moro 2 - 00185 Roma, Italy [email protected]

Florentin Smarandache Department of Mathematics, University of New Mexico Gallup, NM 87301, USA [email protected]

Sergio Spagnolo Scuola Normale Superiore Piazza dei Cavalieri 7 - 56100 Pisa, Italy [email protected]

Stefanos Spartalis Department of Production Engineering and Management, School of Engineering, Democritus University of Thrace V.Sofias 12, Prokat, Bdg A1, Office 308 67100 Xanthi, Greece [email protected]

Hari M. Srivastava Department of Mathematics and Statistics University of Victoria Victoria, British Columbia V8W3P4, Canada [email protected]

Yves Sureau 27, rue d'Aubiere 63170 Perignat, Les Sarlieve - France [email protected]

Carlo Tasso Dipartimento di Matematica e Informatica Via delle Scienze 206 - 33100 Udine, Italy [email protected]

Ioan Tofan Faculty of Mathematics Al. I. Cuza University 6600 Iasi, Romania [email protected]

Aldo Ventre Seconda Università di Napoli, Fac. Architettura, Dip. Cultura del Progetto Via San Lorenzo s/n 81031 Aversa (NA), Italy [email protected]

Thomas Vougiouklis Democritus University of Thrace, School of Education, 681 00 Alexandroupolis. Greece [email protected]

Hans Weber Dipartimento di Matematica e Informatica Via delle Scienze 206 - 33100 Udine, Italy [email protected]

Shanhe Wu Department of Mathematics, Longyan University, Longyan, Fujian, 364012, China [email protected]

Xiao-Jun Yang Department of Mathematics and Mechanics, China University of Mining and Technology, Xuzhou, Jiangsu, 221008, China [email protected]

Yunqiang Yin School of Mathematics and Information Sciences, East China Institute of Technology, Fuzhou, Jiangxi 344000, P.R. China [email protected]

Mohammad Mehdi Zahedi Department of Mathematics, Faculty of Science Shahid Bahonar, University of Kerman Kerman, Iran [email protected]

Fabio Zanolin Dipartimento di Matematica e Informatica Via delle Scienze 206 - 33100 Udine, Italy [email protected]

Paolo Zellini Dipartimento di Matematica, Università degli Studi Tor Vergata via Orazio Raimondo (loc. La Romanina) 00173 Roma, Italy [email protected]

Jianming Zhan Department of Mathematics, Hubei Institute for Nationalities Enshi, Hubei Province,445000, China [email protected]

Page 3: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

i ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40-2018

Page 4: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ii ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40-2018

Page 5: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

iii ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40-2018

Italian Journal of Pure and Applied Mathematics ISSN 2239-0227

Web Site

http://ijpam.uniud.it/journal/home.html

Twitter @ijpamitaly

https://twitter.com/ijpamitaly

EDITOR-IN-CHIEF

Piergiulio Corsini Department of Civil Engineering and Architecture

Via delle Scienze 206 - 33100 Udine, Italy [email protected]

Vice-CHIEFS

Violeta Leoreanu-Fotea Maria Antonietta Lepellere

Managing Board

Domenico Chillemi, CHIEF Piergiulio Corsini

Irina Cristea Alberto Felice De Toni

Furio Honsell Violeta Leoreanu-Fotea

Maria Antonietta Lepellere Elena Mocanu Livio Piccinini

Flavio Pressacco

Luminita Teodorescu Norma Zamparo

Editorial Board

Saeid Abbasbandy

Praveen Agarwal

Bayram Ali Ersoy

Reza Ameri

Luisa Arlotti

Alireza Seyed Ashrafi

Krassimir Atanassov

Vadim Azhmyakov

Malvina Baica

Federico Bartolozzi

Rajabali Borzooei

Carlo Cecchini

Gui-Yun Chen

Domenico Nico Chillemi

Stephen Comer

Irina Cristea

Mohammad Reza Darafsheh

Bal Kishan Dass

Bijan Davvaz

Mario De Salvo

Alberto Felice De Toni

Franco Eugeni

Mostafa Eslami

Giovanni Falcone

Yuming Feng

Antonino Giambruno

Furio Honsell

Luca Iseppi

James Jantosciak

Tomas Kepka

David Kinderlehrer

Sunil Kumar

Andrzej Lasota

Violeta Leoreanu-Fotea

Maria Antonietta Lepellere

Mario Marchi

Donatella Marini

Angelo Marzollo

Antonio Maturo

Fabrizio Maturo

Sarka Hozkova-Mayerova

Vishnu Narayan Mishra

M. Reza Moghadam

Syed Tauseef Mohyud-Din

Petr Nemec

Vasile Oproiu

Livio C. Piccinini

Goffredo Pieroni

Flavio Pressacco

Vito Roberto

Ivo Rosenberg

Gaetano Russo

Paolo Salmon

Maria Scafati Tallini

Kar Ping Shum

Alessandro Silva

Florentin Smarandache

Sergio Spagnolo

Stefanos Spartalis

Hari M. Srivastava

Yves Sureau

Carlo Tasso

Ioan Tofan

Aldo Ventre

Thomas Vougiouklis

Hans Weber

Shanhe Wu

Xiao-Jun Yang

Yunqiang Yin

Mohammad Mehdi Zahedi

Fabio Zanolin

Paolo Zellini

Jianming Zhan

Forum Editrice Universitaria Udinese Srl

Via Larga 38 - 33100 Udine

Tel: +39-0432-26001, Fax: +39-0432-296756 [email protected]

Page 6: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 iv

Table of contents

Sanja Jancic Rasovic, Vucic DasicOn generalization of division near-rings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-8

H. Mirabdollahi, S.M. Anvariyeh, S. MirvakiliBasic notions of partially ordered hypermodules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-27

Xuesha WuInequalities of unitarily invariant norms for matrices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28-33

Kuldip Raj, Charu SharmaIdeal convergent generalized difference sequence

spaces of infinite matrix and Orlicz function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34-46

R. Maritz, J.M.W. MungangaOn the role of the Stokes problem in second grade fluid flow

in regions with permeable interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .47-60

Ibraheem Abu-FalahahSoliton solutions for non-linear dispersive wave equations with

variable-coefficients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61-67

Junling Sun, Jie Yang, Lei SunA dissipative hyperbolic systems approach to image restoration . . . . . . . . . . . . . . . . . . . . . . . . . 68-81

Aynur Keskin Kaymakci, Wan Aunin Mior Othman, Cenap OzelOn partially topological groups: extension closed properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82-89

Ahmad Yousefian Darani, Masoomeh ShabaniOn weak McCoy modules over commutative rings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90-97

H. Faramarzi, F. Rahbarnia, M. TavakoliSome results on distanced-balanced and strongly distance-balanced graphs . . . . . . . . . . . . . . 98-107

Yu-Hsien Liao, Tsu-Yin Chen, Ling-Yun ChungA power index and its normalization under fuzzy multicriteria situation . . . . . . . . . . . . . . 108-121

Q.J. Kong, S. WangSome sufficient conditions implying nilpotency of finite groups . . . . . . . . . . . . . . . . . . . . . . . 122-125

Xiaohui Wang, Xumeng Li, Xingjie WuGlobal exponential stability of Cohen-Grossberg neural networks

with time-varying delays . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .126-140

Hamed M. Obiedat, Ameer A. JaberF -contractive mappings of Hardy-Rogers-type in G-metric spaces . . . . . . . . . . . . . . . . . . . . .141-148

S.A. KhafagyOn positive weak solutions for a class of nonlinear systems . . . . . . . . . . . . . . . . . . . . . . . . . . .149-156

Z. Fattahi, A. Erfanian, A. AzimiA bipartite graph associated to a BI-module of a ring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157-163

Zhang Qiu-JuAn improved clustering method based on density and division method. . . . . . . . . . . . . . . . .164-171

Zhenluo LouExistence of many non-radial solutions of an elliptic system . . . . . . . . . . . . . . . . . . . . . . . . . 172-179

K. Rahman, F. Hussain, M.S. Ali KhanPythagorean fuzzy hybrid averaging aggregation operator

and its application to multiple attribute decision making . . . . . . . . . . . . . . . . . . . . . . . . . 180-187

Page 7: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40-2018 v

Renario G. Hinampas Jr., Sergio R. Canoy Jr.1-movable doubly connected domination in graphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188-199

A.F. Sayed, Jamshaid AhmadFixed point theorems for fuzzy soft contractive mappings

in fuzzy soft metric spaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200-214

Moa’ath N. OqielatComparison of surface fitting methods for modelling leaf surface . . . . . . . . . . . . . . . . . . . . . 215-226

Zhi-Jie JiangProduct-type operators from area Nevanlinna spaces to Bloch-Orlicz spaces . . . . . . . . . . . 227-243

Jiayin Feng, Dongyan Jia, Li Cui, Jing Cao, Zhuo Lin, Min ZhangComparison of SVM algorithm and BP algorithm: study

on the evaluation index system of scientific research performanceof vocational colleges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244-255

Morteza Jafari, Akbar Golchin, Hossein Mohammadzadeh SaanyOn characterization of monoids by properties of generators II . . . . . . . . . . . . . . . . . . . . . . . . 256-276

P.L. Rama Kameswari, V.S. BhagavanCertain generating functions of generalized hypergeometric

2D polynomials from Truesdell’s method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277-285

A. Tajmouati, M. El Berragd-mixing and d-universal J-class operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .286-293

Ruhul Amin, Sahadat HossainPairwise connectedness in fuzzy bitopological spaces in quasi-coincidence sense . . . . . . . 294-300

Ping CaiHopf bifurcation analysis and amplitude control of a

new 4D hyper-chaotic system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301-310

Javid Iqbal, Rustam Abass, Puneet KumarSolution of linear and nonlinear singular boundary value problems

using Legendre wavelet method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311-328

A.R. Hassan, R. Maritz, M. MbehouOn the application of the adomian decomposition method

to solve non-linear boundary value problems of a steady state flow of a liquid film 329-338

Sumera Naz, Samina Ashraf, Faruk KaraaslanEnergy of a bipolar fuzzy graph and its application in decision making . . . . . . . . . . . . . . . .339-352

X. Zhang, F. Smarandache, M. Ali, X. LiangCommutative neutrosophic triplet group and neutro-homomorphism basic theorem . . . . 353-375

Gurninder S. Sandhu, Deepak KumarDerivable mappings and commutativity of associative rings . . . . . . . . . . . . . . . . . . . . . . . . . . .376-393

Z. Mustafa, S.U. Khan, M.M.M. Jaradat, M. Arshad, H.M. JaradatFixed point results of F -rational cyclic contractive mappings

on 0-complete partial metric spaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394-409

J.B. Bacani, J.F.T. RabagoClass of admissible perturbations of special expressions

involving completely monotonic functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410-423

S. Shokrolahi YancheshmehThe topological indices of the Cayley graphs of dihedral group D2n

and the generalized quaternion group Q2n . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424-433

B.G. SidharthGoing beyond the standard model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434-437

Page 8: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

vi ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40-2018

Ould Ahmed Mahmoud Sid AhmedOn the joint (m, q)-partial isometries and the joint m-invertible

tuples of commuting operators on a Hilbert space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438-463

S. Shanthi, N. RajeshSeparation axioms in topological ordered spaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 464-473

Sushil Kumar, Rajendra PrasadConformal anti-invariant submersions from Kenmotsu manifolds

onto Riemannian manifolds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474-500

A.A. Alsaraireh, M. Almasarweh, M. B. Alnawaiseh, S. Al Wadi, V. BhamaThe effect of methods of operation research in obtaining

the best results in the trade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 501-509

Yao Zhang, Tingsong Du, Hao WangSome new k-fractional integral inequalities containing multiple

parameters via generalized (s,m)-preinvexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .510-527

Jianming XueSome operator α-geometric mean inequalities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528-534

M. ZuriqatThe homo separation analysis method for solving the partial differential equation . . . . . 535-543

Mahmood ParsamaneshGlobal dynamics of an SIVS epidemic model with bilinear incidence rate . . . . . . . . . . . . . 544-557

Fengwen Zhai, Jianwu Dang, Yangping Wang, Jing JinUsing multi-scale auto convolution moments to get image affine invariant features . . . .558-571

J. Moori, P. PerumalOn the double Frobenius group of the form 22r:(Z2r−1:Z2). . . . . . . . . . . . . . . . . . . . . . . . . . . .572-599

Pengfei Guo, Yue YangFinite groups whose all proper subgroups are GPST-groups . . . . . . . . . . . . . . . . . . . . . . . . . . .600-606

S. Al Wadi, Ahmed Atallah AlsarairehIndustrial data forecasting using discrete wavelet transform . . . . . . . . . . . . . . . . . . . . . . . . . . 607-614

Kewalee Suebyat, Nopparat PochaiThree-dimensional air quality assessment simulations inside sky

train platform with airflow obstacles on heavy traffic road . . . . . . . . . . . . . . . . . . . . . . . . 615-632

Barbora Batıkova, Tomas Kepka and Petr NemecA construction of congruence-simple semirings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .633-655

Abdul Haseeb, Mobin Ahmad, Sheeba RizviOn the conformal curvature tensor of ϵ-Kenmotsu manifolds . . . . . . . . . . . . . . . . . . . . . . . . . 656-670

Xingkai Hu, Linru NieExponential stability of nonlinear systems via alternate control . . . . . . . . . . . . . . . . . . . . . . . 671-678

Moin Akhtar Ansari, Ali N.A. KoamRough approximations in KU-algebras . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 679-691

Ze GuOn hyperideals of ordered semihypergroups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692-698

Ghassan K. Abufoudeh, Raed R. Abu AwwadBayesian estimation and prediction based on exponential residual

type II censored life data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699-710

Essam R. El-Zahar, Abdelhalim EbaidOn computing differential transform of nonlinear non-autonomous

functions and its applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .711-723

Liang Liu, Ling Zhang, Xiangguang Dai, Yuming FengNAGSC: Nesterov’s accelerated gradient methods for sparse coding . . . . . . . . . . . . . . . . . . . 724-735

Page 9: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40-2018 vii

Manisha Shrivastava, Takashi Noiri, Purushottam JhaContra weakly-θI-precontinuous functions

in ideal topological spaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .736-747

Lamairia Abd Elhakim, Haouam Kamel, Rebiai BelgacemNonexistence of global solutions to a fractional nonlinear ultra-parabolic system . . . . . . 748-755

Rakesh Kumar, Om ParkashA new intuitionistic fuzzy divergence measure and its applications to handle

fault diagnosis of turbine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756-771

Mohammad Hadi Zahedi, Abbas Ali Rezaee, Zeinab DehghanFuzzy protection method for flood attacks in software defined networking (SDN) . . . . . . 772–789

Page 10: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40-2018

Exchanges

Up to December 2015 this journal is exchanged with the following periodicals:

1. Acta Cybernetica - Szeged H2. Acta Mathematica et Informatica Universitatis Ostraviensis CZ3. Acta Mathematica Vietnamica – Hanoi VN4. Acta Mathematica Sinica, New Series – Beijing RC5. Acta Scientiarum Mathematicarum – Szeged H6. Acta Universitatis Lodziensis – Lodz PL7. Acta Universitatis Palackianae Olomucensis, Mathematica – Olomouc CZ8. Actas del tercer Congreso Dr. Antonio A.R. Monteiro - Universidad Nacional del Sur Bahía Blanca AR9. AKCE International Journal of Graphs and Combinatorics - Kalasalingam IND10. Algebra Colloquium - Chinese Academy of Sciences, Beijing PRC11. Alxebra - Santiago de Compostela E12. Analele Ştiinţifice ale Universităţii “Al. I Cuza” - Iaşi RO13. Analele Universităţii din Timişoara - Universitatea din Timişoara RO14. Annales Academiae Scientiarum Fennicae Mathematica - Helsinki SW15. Annales de la Fondation Louis de Broglie - Paris F16. Annales Mathematicae Silesianae – Katowice PL17. Annales Scientif. Université Blaise Pascal - Clermont II F18. Annales sect. A/Mathematica – Lublin PL19. Annali dell’Università di Ferrara, Sez. Matematica I20. Annals of Mathematics - Princeton - New Jersey USA21. Applied Mathematics and Computer Science -Technical University of Zielona Góra PL22. Archivium Mathematicum - Brnö CZ23. Atti del Seminario di Matematica e Fisica dell’Università di Modena I24. Atti dell’Accademia delle Scienze di Ferrara I25. Automatika i Telemekhanika - Moscow RU26. Boletim de la Sociedade Paranaense de Matematica - San Paulo BR27. Bolétin de la Sociedad Matemática Mexicana - Mexico City MEX28. Bollettino di Storia delle Scienze Matematiche - Firenze I29. Buletinul Academiei de Stiinte - Seria Matem. - Kishinev, Moldova CSI30. Buletinul Ştiinţific al Universităţii din Baia Mare - Baia Mare RO31. Buletinul Ştiinţific şi Tecnic-Univ. Math. et Phyis. Series Techn. Univ. - Timişoara RO32. Buletinul Universităţii din Braşov, Seria C - Braşov RO33. Bulletin de la Classe de Sciences - Acad. Royale de Belgique B34. Bulletin de la Societé des Mathematiciens et des Informaticiens de Macedoine MK35. Bulletin de la Société des Sciences et des Lettres de Lodz - Lodz PL36. Bulletin de la Societé Royale des Sciences - Liege B37. Bulletin for Applied Mathematics - Technical University Budapest H38. Bulletin Mathematics and Physics - Assiut ET39. Bulletin Mathématique - Skopje Macedonia MK40. Bulletin Mathématique de la S.S.M.R. - Bucharest RO41. Bulletin of the Australian Mathematical Society - St. Lucia - Queensland AUS42. Bulletin of the Faculty of Science - Assiut University ET43. Bulletin of the Faculty of Science - Mito, Ibaraki J44. Bulletin of the Greek Mathematical Society - Athens GR45. Bulletin of the Iranian Mathematical Society - Tehran IR46. Bulletin of the Korean Mathematical Society - Seoul ROK47. Bulletin of the Malaysian Mathematical Sciences Society - Pulau Pinang MAL48. Bulletin of Society of Mathematicians Banja Luka - Banja Luka BiH49. Bulletin of the Transilvania University of Braşov - Braşov RO50. Bulletin of the USSR Academy of Sciences - San Pietroburgo RU51. Busefal - Université P. Sabatier - Toulouse F52. Calculus CNR - Pisa I53. Chinese Annals of Mathematics - Fudan University – Shanghai PRC

viii

Page 11: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40-2018

54. Chinese Quarterly Journal of Mathematics - Henan University PRC55. Classification of Commutative FPF Ring - Universidad de Murcia E56. Collectanea Mathematica - Barcelona E57. Collegium Logicum - Institut für Computersprachen Technische Universität Wien A58. Colloquium - Cape Town SA59. Colloquium Mathematicum - Instytut Matematyczny - Warszawa PL60. Commentationes Mathematicae Universitatis Carolinae - Praha CZ61. Computer Science Journal of Moldova CSI62. Contributi - Università di Pescara I63. Cuadernos - Universidad Nacional de Rosario AR64. Czechoslovak Mathematical Journal - Praha CZ65. Demonstratio Mathematica - Warsawa PL66. Discussiones Mathematicae - Zielona Gora PL67. Divulgaciones Matemáticas - Universidad del Zulia YV68. Doctoral Thesis - Department of Mathematics Umea University SW69. Extracta Mathematicae - Badajoz E70. Fasciculi Mathematici - Poznan PL71. Filomat - University of Nis SRB72. Forum Mathematicum - Mathematisches Institut der Universität Erlangen D73. Functiones et Approximatio Commentarii Mathematici - Adam Mickiewicz University L74. Funkcialaj Ekvaciaj - Kobe University J75. Fuzzy Systems & A.I. Reports and Letters - Iaşi University RO76. General Mathematics - Sibiu RO77. Geometria - Fasciculi Mathematici - Poznan PL78. Glasnik Matematicki - Zagreb CRO79. Grazer Mathematische Berichte – Graz A80. Hiroshima Mathematical Journal - Hiroshima J81. Hokkaido Mathematical Journal - Sapporo J82. Houston Journal of Mathematics - Houston - Texas USA83. IJMSI - Iranian Journal of Mathematical Sciences & Informatics, Tarbiat Modares University, Tehran IR84. Illinois Journal of Mathematics - University of Illinois Library - Urbana USA85. Informatica - The Slovene Society Informatika - Ljubljana SLO86. Internal Reports - University of Natal - Durban SA87. International Journal of Computational and Applied Mathematics – University of Qiongzhou, Hainan PRC88. International Journal of Science of Kashan University - University of Kashan IR89. Iranian Journal of Science and Technology - Shiraz University IR90. Irish Mathematical Society Bulletin - Department of Mathematics - Dublin IRL91. IRMAR - Inst. of Math. de Rennes - Rennes F92. Israel Mathematical Conference Proceedings - Bar-Ilan University - Ramat -Gan IL93. Izvestiya: Mathematics - Russian Academy of Sciences and London Mathematical Society RU94. Journal of Applied Mathematics and Computing – Dankook University, Cheonan – Chungnam ROK95. Journal of Basic Science - University of Mazandaran – Babolsar IR96. Journal of Beijing Normal University (Natural Science) - Beijing PRC97. Journal of Dynamical Systems and Geometric Theory - New Delhi IND98. Journal Egyptian Mathematical Society – Cairo ET99. Journal of Mathematical Analysis and Applications - San Diego California USA100. Journal of Mathematics of Kyoto University - Kyoto J101. Journal of Science - Ferdowsi University of Mashhad IR102. Journal of the Bihar Mathematical Society - Bhangalpur IND103. Journal of the Faculty of Science – Tokyo J104. Journal of the Korean Mathematical Society - Seoul ROK105. Journal of the Ramanujan Mathematical Society - Mysore University IND106. Journal of the RMS - Madras IND107. Kumamoto Journal of Mathematics - Kumamoto J108. Kyungpook Mathematical Journal - Taegu ROK109. L’Enseignement Mathématique - Genève CH110. La Gazette des Sciences Mathématiques du Québec - Université de Montréal CAN111. Le Matematiche - Università di Catania I112. Lecturas Matematicas, Soc. Colombiana de Matematica - Bogotà C113. Lectures and Proceedings International Centre for Theorical Phisics - Trieste I

ix

Page 12: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40-2018

114. Lucrările Seminarului Matematic – Iaşi RO115. m-M Calculus - Matematicki Institut Beograd SRB116. Matematicna Knjiznica - Ljubljana SLO117. Mathematica Balcanica – Sofia BG118. Mathematica Bohemica - Academy of Sciences of the Czech Republic Praha CZ119. Mathematica Macedonica, St. Cyril and Methodius University, Faculty of Natural Sciences and Mathematics - Skopje MK120. Mathematica Montisnigri - University of Montenegro - Podgorica MNE121. Mathematica Moravica - Cacak SRB122. Mathematica Pannonica - Miskolc - Egyetemvaros H123. Mathematica Scandinavica - Aarhus - Copenhagen DK124. Mathematica Slovaca - Bratislava CS125. Mathematicae Notae - Universidad Nacional de Rosario AR126. Mathematical Chronicle - Auckland NZ127. Mathematical Journal - Academy of Sciences - Uzbekistan CSI128. Mathematical Journal of Okayama University - Okayama J129. Mathematical Preprint - Dep. of Math., Computer Science, Physics – University of Amsterdam NL130. Mathematical Reports - Kyushu University - Fukuoka J131. Mathematics Applied in Science and Technology – Sangyo University, Kyoto J132. Mathematics Reports Toyama University - Gofuku J133. Mathematics for Applications - Institute of Mathematics of Brnö University of Technology, Brnö CZ134. MAT - Prepublicacions - Universidad Austral AR135. Mediterranean Journal of Mathematics – Università di Bari I136. Memoirs of the Faculty of Science - Kochi University - Kochi J137. Memorias de Mathematica da UFRJ - Istituto de Matematica - Rio de Janeiro BR138. Memorie linceee - Matematica e applicazioni - Accademia Nazionale dei Lincei I139. Mitteilungen der Naturforschenden Gesellschaften beider Basel CH140. Monografii Matematice - Universitatea din Timişoara RO141. Monthly Bulletin of the Mathematical Sciences Library – Abuja WAN142. Nagoya Mathematical Journal - Nagoya University,Tokyo J143. Neujahrsblatt der Naturforschenden Gesellschaft - Zürich CH144. New Zealand Journal of Mathematics - University of Auckland NZ145. Niew Archief voor Wiskunde - Stichting Mathematicae Centrum – Amsterdam NL146. Nihonkai Mathematical Journal - Niigata J147. Notas de Algebra y Analisis - Bahia Blanca AR148. Notas de Logica Matematica - Bahia Blanca AR149. Notas de Matematica Discreta - Bahia Blanca AR150. Notas de Matematica - Universidad de los Andes, Merida YV151. Notas de Matematicas - Murcia E152. Note di Matematica - Lecce I153. Novi Sad Journal of Mathematics - University of Novi Sad SRB154. Obzonik za Matematiko in Fiziko - Ljubljana SLO155. Octogon Mathematical Magazine - Braşov RO156. Osaka Journal of Mathematics - Osaka J157. Periodica Matematica Hungarica - Budapest H158. Periodico di Matematiche - Roma I159. Pliska - Sofia BG160. Portugaliae Mathematica - Lisboa P161. Posebna Izdanja Matematickog Instituta Beograd SRB162. Pre-Publicaçoes de Matematica - Univ. de Lisboa P163. Preprint - Department of Mathematics - University of Auckland NZ164. Preprint - Institute of Mathematics, University of Lodz PL165. Proceeding of the Indian Academy of Sciences - Bangalore IND166. Proceeding of the School of Science of Tokai University - Tokai University J167. Proceedings - Institut Teknology Bandung - Bandung RI168. Proceedings of the Academy of Sciences Tasked – Uzbekistan CSI169. Proceedings of the Mathematical and Physical Society of Egypt – University of Cairo ET170. Publicaciones del Seminario Matematico Garcia de Galdeano - Zaragoza E171. Publicaciones - Departamento de Matemática Universidad de Los Andes Merida YV172. Publicaciones Matematicas del Uruguay - Montevideo U173. Publicaciones Mathematicae - Debrecen H

x

Page 13: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40-2018

174. Publicacions mathematiques - Universitat Autonoma, Barcelona E175. Publications de l’Institut Mathematique - Beograd SRB176. Publications des Séminaires de Mathématiques et Informatiques de Rennes F177. Publications du Departmenet de Mathematiques, Université Claude Bernard - Lyon F178. Publications Mathematiques - Besançon F179. Publications of Serbian Scientific Society - Beograd SRB180. Publikacije Elektrotehnickog Fakulteta - Beograd SRB181. Pure Mathematics and Applications - Budapest H182. Quaderni di matematica - Dip. to di Matematica – Caserta I183. Qualitative Theory of Dynamical Systems - Universitat de Lleida E184. Quasigroups and Related Systems - Academy of Science - Kishinev Moldova CSI185. Ratio Mathematica - Università di Pescara I186. Recherche de Mathematique - Institut de Mathématique Pure et Appliquée Louvain-la-Neuve B187. Rendiconti del Seminario Matematico dell’Università e del Politecnico – Torino I188. Rendiconti del Seminario Matematico - Università di Padova I189. Rendiconti dell’Istituto Matematico - Università di Trieste I190. Rendiconti di Matematica e delle sue Applicazioni - Roma I191. Rendiconti lincei - Matematica e applicazioni - Accademia Nazionale dei Lincei I192. Rendiconti Sem. - Università di Cagliari I193. Report series - Auckland NZ194. Reports Math. University of Stockholm - Stockholm SW195. Reports - University Amsterdam NL196. Reports of Science Academy of Tajikistan – Dushanbe TAJ197. Research Reports - Cape Town SA198. Research Reports - University of Umea - Umea SW199. Research Report Collection (RGMIA) Melbourne AUS200. Resenhas do Instituto de Matemática e Estatística da universidadae de São Paulo BR201. Review of Research, Faculty of Science, Mathematics Series - Institute of Mathematics University of Novi Sad SRB202. Review of Research Math. Series - Novi Sad YN203. Revista Ciencias Matem. - Universidad de la Habana C204. Revista Colombiana de Matematicas - Bogotà C205. Revista de Matematicas Aplicadas - Santiago CH206. Revue Roumaine de Mathematiques Pures et Appliquées - Bucureşti RO207. Ricerca Operativa AIRO - Genova I208. Ricerche di Matematica - Napoli I209. Rivista di Matematica - Università di Parma I210. Sains Malaysiana - Selangor MAL211. Saitama Mathematical Journal - Saitama University J212. Sankhya - Calcutta IND213. Sarajevo Journal of Mathematics BIH214. Sciences Bulletin, DPRK, Pyongyang KR215. Scientific Rewiev - Beograd SRB216. Scientific Studies and Research, Vasile Alecsandri University Bacau RO217. Semesterbericht Funktionalanalysis - Tübingen D218. Séminaire de Mathematique - Université Catholique, Louvain la Neuve B219. Seminario di Analisi Matematica - Università di Bologna I220. Serdica Bulgaricae Publicaciones Mathematicae - Sofia BG221. Serdica Mathematical Journal - Bulgarian Academy of Sciences, University of Sofia BG222. Set-Valued Mathematics and Applications – New Delhi IND223. Sitzungsberichte der Mathematisch Naturwissenschaflichen Klasse Abteilung II – Wien A224. Southeast Asian Bulletin of Mathematics - Southeast Asian Mathematical Society PRC225. Studia Scientiarum Mathematica Hungarica – Budapest H226. Studia Universitatis Babes Bolyai - Cluj Napoca RO227. Studii şi Cercetări Matematice - Bucureşti RO228. Studii şi Cercetări Ştiinţifice, ser. Matematică - Universitatea din Bacău RO229. Sui Hak - Pyongyang DPR of Korea KR230. Tamkang Journal of Mathematics - Tamsui - Taipei TW231. Thai Journal of Mathematics – Chiang Mai TH232. Task Quarterly PL233. The Journal of the Academy of Mathematics Indore IND

xi

Page 14: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40-2018

234. The Journal of the Indian Academy of Mathematics - Indore IND235. The Journal of the Nigerian Mathematical Society (JNMS) - Abuja WAN236. Theoretical and Applied Mathematics – Kongju National University ROK237. Thesis Reprints - Cape Town SA238. Tohoku Mathematical Journal – Sendai J239. Trabalhos do Departamento de Matematica Univ. - San Paulo BR240. Travaux de Mathematiques – Bruxelles B241. Tsukuba Journal of Mathematics - University of Tsukuba J242. UCNW Math. Preprints Prifysgol Cymru - University of Wales – Bangor GB243. Ukranii Matematiskii Journal – Kiev RU244. Uniwersitatis Iagiellonicae Acta Mathematica – Krakow PL245. Verhandlungen der Naturforschenden Gesellschaft – Basel CH246. Vierteljahrsschrift der Naturforschenden Gesellschaft – Zürich CH247. Volumenes de Homenaje - Universidad Nacional del Sur Bahía Blanca AR248. Yokohama Mathematical Journal – Yokohama J249. Yugoslav Journal of Operations Research – Beograd SRB250. Zbornik Radova Filozofskog – Nis SRB251. Zbornik Radova – Kragujevac SRB252. Zeitschrift für Mathematick Logic und Grundlagen der Math. – Berlin D

xii

Page 15: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (1–8) 1

ON GENERALIZATION OF DIVISION NEAR-RINGS

Sanja Jancic Rasovic∗

Department of MathematicsFaculty of Natural Science and MathematicsUniversity of MontenegroPodgorica, [email protected]

Vucic DasicDepartment of Mathematics

Faculty of Natural Science and Mathematics

University of Montenegro

Podgorica, Montenegro

[email protected]

Abstract. In this paper we introduce the class of D-division near-rings as a subclassof near-rings with a defect D and that one of division near-rings. We introduce thenotion of D-division near-ring and we state necessary and sufficient condition underwhich a near-ring with defect of distributivity D is a D-division near-ring.

Keywords: near-ring, division near-ring.

1. Introduction and preliminaries

The interest in near-rings and near-fields started at the beginning of the 20th

century when Dickson wanted to know if the list of axioms for skew fields id re-dundant. He found in [3] that there do exist ”near-fields” which fulfill all axiomsfor skew fields except one distributive law. Since 1950, the theory of near-ringshad applications to several domains, for instance in area of dynamical systems,graphs, homological algebra, universal algebra, category theory, geometry andso on.

A comprehensive review of the theory of near-rings and its applications ap-pears in Pilz [10], Meldrun [8], Clay [1], Wahling [14], Scot [12], Ferrero [4],Vukovic [13], and Satyanarayana and Prasad [11].

Let (R,+, ·) be a left near-ring, i.e. (R,+) is a group (not necessarily commu-tative) with the unit element 0, (R, ·) is a semigroup and the left distributivityholds: x · (y + z) = x · y + x · z for any x, y, z ∈ R. It is clear that x · 0 = 0,for any x ∈ R, while it might exists y ∈ R such that 0 · y = 0. If 0 is a bi-laterally absorbing element, that is 0 · x = x · 0 = 0, for any x ∈ R, then R iscalled a zero-symmetric near-ring. Obviously, if (R,+, ·) is a left near-ring thenx · (−y) = −(xy) for any x, y ∈ R .

∗. Corresponding author

Page 16: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

2 SANJA JANCIC RASOVIC and VUCIC DASIC

A normal subgroup I of (R,+) is called an ideal of a near-ring (R,+, ·) if:1) RI = r · i|r ∈ R, i ∈ I ⊆ I.2) (r + i)r′ − r · r′ ∈ I , for all r, r′ ∈ R and i ∈ I.Obviously, if I is an ideal of zero-symmetric near-ring R, then IR ⊆ I and

RI ⊆ I . In particular, if (R,+, ·) is a left near-ring that contains a multiplicativesemigroup S, whose elements generate (R,+) and satisfy (x+y) ·s = x ·s+y ·s,for all x, y ∈ R and s ∈ S, then we say that R is a distributively generatednear-ring (d.g. near-ring). Regarding the classical example of a near-ring, thatone represented by the set of the functions from an additive group G into itselfwith the pointwise addition and the natural composition of functions, if S is themultiplicative semigroup of the endomorphisms of G and R′ is the subnear-ringgenerated by S, then R′ is a d.g. near-ring. Other examples of d.g. near-rings may be found in [5]. A near-ring containing more than one element iscalled a division near-ring, if the set R\0 is a multiplicative group [7]. Severalexamples of division near-rings are given in [5]. It is well known that everydivision ring is a division near-ring, while there are division nearrings which arenot division rings.

Ligh [7] give necessary and sufficient condition for a d.g. near-ring to be adivision ring.

Lemma 1.1 ([7]). If R is a d.g. near-ring, then 0 · x = 0, for all x ∈ R.

Theorem 1.1 ([7]). A necessary and sufficient condition for a d.g. near-ringwith more than one element to be division ring is that for all non-zero elementsa ∈ R, it holds a ·R = R.

Lemma 1.2 ([7]). The additive group (R,+) of a division near-ring R is abelian.

Another example of division ring is given by the following result.

Lemma 1.3. Every d.g. division near-ring R is a division ring.

Proof. By Lemma 1.2, the additive group (R,+) of a division near-ring isabelian. It follows ([5], p.93) that every element of R is right distributive, i.e.(x+ y) · z = x · z + y · z, for all x, y, z ∈ R. Thereby, if R is d.g. near-ring, thenR is a division near-ring if and only if R is a division ring.

In [2] Dasic introduced the notion of a near-ring with defect of distributivityas a generalization of d.g. near-ring.

Definition 1.1 ([2]). Let R be a zero-symmetric (left) near-ring. A set S ofgenerators of R is a multiplicative subsemigroup (S, ·) of the semigroup (R, ·),whose elements generate (R,+). The normal subgroup D of the group (R,+)which is generated by the set DS = d ∈ R|d = −(x · s+ y · s) + (x+ y) · s, x, y ∈R, s ∈ S is called the defect of distributivity of the near-ring R.

In other words, if s ∈ S, then for all x, y ∈ R, there exists d ∈ D such that(x+ y) · s = x · s+ y · s+ d. This expresses the fact that the elements of S are

Page 17: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON GENERALIZATION OF DIVISION NEAR-RINGS 3

distributive with the defect D. When we want to stress the set S of generators,we will denote the near-ring by the couple (R,S). In particular, if D = 0, thenR is a distributively generated near-ring. The following lemma is easy to verify.

Lemma 1.4. Let (R,S) be a near-ring with the defect D.

i) If s ∈ S and x ∈ R, then there exists d ∈ D such that (−x)s = −(xs) + d.

ii) If s ∈ S, and x, y ∈ R,then there exists d ∈ D such that that (x− y) · s =x · s− y · s+ d.

The main properties of this kind of near-rings are summarized in the follow-ing results [2].

Theorem 1.2. i) Every homomorphic image of a near-ring with the defect Dis a near-ring with the defect f(D), when f is a homomorphism of near-rings.

ii) Every direct sum of a family of near-rings Ri with the defects Di, respec-tively, is a near-ring whose defect is a direct sum of the defects Di.

iii) The defect D of the near-ring R is an ideal of R.

iv) Let R be a near-ring with the defect D and A be an ideal of R. Thequotient near-ring R/A has the defect D = d + A|d ∈ D. Moreover, R/A isdistributively generated if and only if D ⊆ A.

Following this idea, Jancic Rasovic and Cristea [6], introduce the concept ofhypernear-ring with a defect of distributivity, and present several properties ofthis class of hypernear-rings, in connection with their direct product, hyperho-momorphisms, or factor hypernear-rings.

In this paper we introduce the class of D−division near-rings as a subclassof near-rings with a defect D and that one of division near-rings. Then westate necessary and sufficient condition under which a near-ring with defect ofdistributivity D is a D− division near-ring. On the end, we show that Ligh’stheorem proved for distributively generated near-rings is a corollary of our result.

2. D-division near-rings

Definition 2.1. Let (R,S) be a near-ring with the defect of distributivity D = R.The structure (R\D, ·) is a D− multiplicative group of the near -ring R if:

i) The set R\D is closed under the multiplication.

ii) There exists e ∈ R\D such that, for each x ∈ R it holds x · e = x + d1and e · x = x+ d2, for some d1, d2 ∈ D . A such element e is called the identityelement.

iii) For each x ∈ R\D there exists x′ ∈ R\D and d1, d2 ∈ D, such that:x · x′ = e+ d1 and x′ · x = e+ d2 .

Definition 2.2. Let (R,S) be a near-ring with the defect of distributivity D =R. We say that R is a D−division near-ring (a near-ring of D− fractions) if(R\D, ·) is a D−multiplicative group.

Page 18: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

4 SANJA JANCIC RASOVIC and VUCIC DASIC

Obviously, if (R,S) is a near-ring with defect of distributivity D = R, suchthat (R\D, ·) is a multiplicative group, then (R\D, ·) is a D−multiplicativegroup. Also, if R is a distributively generated such that R is a division near-ring, then R is an example of D−division near ring with defect of distributivityD = 0 .

Now we present another examples of D−division near-rings.

Example 2.1. Let (R,+) = (Z6,+), be the additive group of integers modulo6, and define on R the multiplication as follows:

· 0 1 2 3 4 5

0 0 0 0 0 0 0

1 0 5 4 3 2 1

2 0 1 2 3 4 5

3 0 0 0 0 0 0

4 0 5 4 3 2 1

5 0 1 2 3 4 5

It is simple to check that the multiplication is associative, so (R, ·) is a semi-group, having 0 as two-sided absorbing element. Moreover, the multiplicationdistributes over addition, so for any x, y, z ∈ R, we have x · (y+ z) = x · y+x · z(we let these part to the reader as a simple exercice). For example, 1 · (4 + 2) =1 ·0 = 0(0 = 2+4 = 1 ·4+1 ·2.) Take S = 0, 2, 3 a system of generators of thehypergroup (R,+). We also notice that (S, ·) is a subsemigroup of (R, ·). Nowwe determine the set DS : DS = d ∈ R|d = −(x · s+ y · s) + (x+ y) · s, x, y ∈R, s ∈ S = −(x·0+y ·0)+(x+y)·0|x, y ∈ R∪−(x·2+y ·2)+(x+y)·2|x, y ∈R ∪ −(x · 3 + y · 3) + (x + y) · 3|x, y ∈ R = 0 ∪ 0 ∪ 0, 3 = 0, 3. Thetable of the hypercomposition x · 3 + y · 3 is the following one:

0 1 2 3 4 5

0 0 3 3 0 3 3

1 3 0 0 3 0 0

2 3 0 0 3 0 0

3 0 3 3 0 3 3

4 3 0 0 3 0 0

5 3 0 0 3 0 0

It follows that the table of −(x · 3 + y · 3) is:

0 1 2 3 4 5

0 0 3 3 0 3 3

1 3 0 0 3 0 0

2 3 0 0 3 0 0

3 0 3 3 0 3 3

4 3 0 0 3 0 0

5 3 0 0 3 0 0

Similarly, the table of the hypercomposition (x+ y) · 3 is:

Page 19: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON GENERALIZATION OF DIVISION NEAR-RINGS 5

0 1 2 3 4 5

0 0 3 3 0 3 3

1 3 3 0 3 3 0

2 3 0 3 3 0 3

3 0 3 3 0 3 3

4 3 3 0 3 3 0

5 3 0 3 3 0 3

We obtain that A = −(x · 3 + y · 3) + (x+ y) · 3|x, y ∈ R = 0, 3.It follows that the defect of distributivity of the near-ring R is D = 0, 3.It can be easily verified that (R\D, ·) is a D−multiplicative group. Indeed,

R\D = 1, 2, 4, 5 is closed under the multiplication. Moreover, e = 2 is theidentity element. Finally, for any a ∈ R\D, there exists d ∈ D such thata · a = 2 + d, meaning that the inverse of each element a ∈ R\D is a itself. So(R,S) is a D−division near-ring.

Example 2.2. Let (R,+) = (Z4,+) be the additive group of the integers mod-ulo 4 and define on R the multiplication as follows:

· 0 1 2 3

0 0 0 0 0

1 0 1 2 3

2 0 0 0 0

3 0 3 2 1

Then, (R, ·) is a semigroup, having 0 as a bilaterally absorbing element. Itcan be veried that, for any x, y, z ∈ R, it holds x · (y+ z) = x · y+x · z, meaningthat (R,+, ·) is a near-ring. Take S = 1. Obviously, S is a subsemigroup of(R, ·) and it generates (R,+). Since the set DS = −(x·1+y ·1)+(x+y)·1|x, y ∈R = 0, 2, we conclude that the the defect of distributivity of the near-ring Ris D = 0, 2.

We can see that the multiplicative structure(R\D, ·) is a group, so R\D isa D−multiplicative group, i.e. (R,S) is a D−division near-ring.

Definition 2.3. Let (R,S) be a near-ring with the defect of distributivity D. Wesay that (R,S) is a near-ring without D− divisors if, for all x, y ∈ R, x · y ∈ Dimplies that x ∈ D or y ∈ D. Otherwise, we say that R has D−divisors if thereexist x, y ∈ R\D such that x · y ∈ D.

Proposition 2.1. Let (R,S) be a near-ring with the defect of distributivityD = R. If a · (R\D) + D = R\D + D, for all a ∈ R\D, then R is a near-ringwithout D−divisors.

Proof. Suppose there exist x, y ∈ R\D such that x · y ∈ D. Since x ∈ R\D ⊆R\D+D = x ·(R\D)+D, it follows that there exists x′ ∈ R\D and d1 ∈ D suchthat x = x · x′ + d1. Moreover, from x′ ∈ R\D ⊆ R\D +D = y · (R\D) +D, itfollows that there exist y′ ∈ R\D and d2 ∈ D such that x′ = y·y′+d2. Therefore,x = x · (y · y′ + d2) + d1 = x · y · y′ + x · d2 + d1. Since D is an ideal of R, and R

Page 20: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

6 SANJA JANCIC RASOVIC and VUCIC DASIC

is a zero-symmetric near-ring, then (x · y) · y′ ∈ D as x · y ∈ D, and x · d2 ∈ D,as d2 ∈ D. It follows that (x · y) · y′ + x · d2 + d1 ∈ D, i.e. x ∈ D. It contradictsthe initial assumption. Therefore, R is a near-ring without D−divisors.

Corollary 2.1. If (R,S) is a near-ring with the defect of distributivity D = R,such that a · (R\D) + D = R\D + D, for all a ∈ R\D, then the set R\D isclosed under the multiplication.

Proof. It follows immediately from the previous proposition.

Theorem 2.1. Let (R,S) be a near-ring with the defect D = R. A necessaryand sufficient condition for the near-ring R to be a D−division near-ring is thata · (R\D) +D = R\D +D, for all a ∈ R\D.

Proof. Sufficiency. Let a · (R\D) + D = R\D + D, for all a ∈ R\D. ByCorollary 2.1, it follows that the set R\D is closed under the multiplication.Note that there exists s ∈ R\D such that s ∈ S. To the contrary, if S ⊆ D,then R = ⟨S⟩ ⊆ D, meaning that R = D, which contradicts our assumption.Thus, let s ∈ R\D such that s ∈ S. Since s ∈ (R\D) + D = s · (R\D) + D,it follows that there exists e ∈ R\D and d1 ∈ D such that s = s · e + d1.Hence, s · (e · s − s) = (s · e) · s − s · s = (s − d1) · s − s · s ∈ D, since D isan ideal in R. By Proposition 2.1, R is a near-ring without D−divisors andsince s ∈ R\D, we get e · s − s ∈ D, i.e. e · s ∈ D + s = s + D, and so thereexists d2 ∈ D such that es = s+ d2. If x ∈ R\D, then for some d3 ∈ D it holds:(x ·e−x) ·s = x ·(e ·s)−x ·s+d3 = x ·(s+d2)−x ·s+d3 = x ·s+x ·d2−x ·s+d3 ∈x · s+D−x · s+D ⊆ D+D = D. Since s /∈ D, we have x · e−x ∈ D, meaningthat x · e ∈ D + x = x + D. So, there exists d4 ∈ D such that xe = x + d4 .Besides, s ·(e ·x−x) = (s ·e) ·x−s ·x = (s−d1) ·x−s ·x ∈ D, since D is an ideal.Again, since s /∈ D, we obtain e ·x−x ∈ D, implying that e ·x ∈ D+x = x+D.Thus, there exists d5 ∈ D such that ex = x + d5 .Thereby e is the identityelement.

Suppose now that a ∈ R\D. Since e ∈ R\D ⊆ R\D + D = a · (R\D) + D,then there exist a′ ∈ R\D and d ∈ D such that e = a · a′ + d. Besides,a ·(a′ ·a−e) = (a ·a′) ·a−a ·e = (e−d) ·a−(a+d1), for some d1 ∈ D. Since D isan ideal of R, we have (e−d) ·a− e ·a ∈ D, i.e. (e−d) ·a ∈ D+ e ·a = e ·a+D.Therefore, a·(a′·a−e) ∈ e·a+D−(a+d1) = e·a+D−d1−a. Besides, e·a = a+d2,for some d2 ∈ D and thus a · (a′ · a− e) ∈ a+ d2 +D− d1− a ⊆ a+D− a ⊆ D.Since a /∈ D, it follows that a′ · a− e ∈ D, meaning that a′ · a ∈ D + e = e+Di.e a′ · a = e + d4 for some d4 ∈ D. Hence, we have shown that R\D is aD−multiplicative group, implying that (R,S) is a D−division near-ring.

Necessity. Let R\D be a D−multiplicative group with the identity elemente. Let a ∈ R\D. Obviously, a · (R\D) + D ⊆ R\D + D. We prove now theother inclusion R\D +D ⊆ a · (R\D) +D. Suppose x ∈ R\D. Since R\D is aD−multiplicative group, it follows that there exist a′ ∈ R\D and d1 ∈ D suchthat a · a′ = e + d1. Besides there exists d2 ∈ D such that x = e · x + d2 =(a ·a′−d1) ·x+d2. Since D is an ideal of R, we have (aa′−d1) ·x−(a ·a′) ·x ∈ D,

Page 21: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON GENERALIZATION OF DIVISION NEAR-RINGS 7

and therefore (a ·a′−d1) ·x = (aa′−d1) ·x−(a ·a′) ·x+(a ·a′) ·x ∈ D+(a ·a′) ·x.It follows that x ∈ D+a ·(a′ ·x)+d2 = a ·(a′ ·x)+D ⊆ a ·(R\D)+D. Therefore,R\D ⊆ a · (R\D) +D, i.e. R\D +D ⊆ a · (R\D) +D.

Now we will show that Theorem 1.1 [7] follows from the previous theorem.

Corollary 2.2. A necessary and sufficient condition for a d.g. near-ring withmore than one element to be division ring is that for all non-zero elements a ∈ R,it holds a ·R = R.

Proof. If R is a d.g. near-ring, then by Lemma 1.1, R is a zero symmetric near-ring, with the defect of disrtributivity D = 0. From the previous theorem, itfollows that a necessary and sucient condition for a d.g. near-ring R with morethan one element to be a division near-ring is that a · (R\0) = R\0, forall a ∈ R\0. Now we prove that if R is a d.g. near-ring with more than oneelement, then a · R = R, for all a ∈ R\0, if and only if a · (R\0) = R\0,for all a ∈ R\0. Obviously, a · (R\0) = R\0, for all a ∈ R\0 impliesthat a ·R = R, for all a ∈ R\0.

Suppose now that we have a ·R = R, for all a ∈ R\0. First we prove thata ·R\0 ⊆ R\0, for a = 0. If there exist a = 0, b = 0, such that a ·b = 0, thensince a·R = R and b·R = R it follows that there exist x, y ∈ R such that a = a·xand x = b · y. Therefore, by Lemma 1.1, we have 0 = 0 · y = a · b · y = a · x = a,which is a contradiction. Thus a · R\0 ⊆ R\0. On the other side, for alla ∈ R\0, it holds R\0 ⊆ a · R = R and since a · 0 = 0 it follows thatR\0 ⊆ a · (R\0). Therefore, a · (R\0) = R\0, for all a ∈ R\0. Thus,from Lemma 1.3, we obtain Corollary 2.2.

3. Conclusion and future work

In our future research we intend to extend to the case of hypernear-rings the no-tions that were studied in this paper. Jancic- Rasovic and Cristea have recentlystarted [6] the study of hypernear-rings with a defect of distributivity D. Ouraim is to continue in the same direction, introducing the class of D−divisionhypernear-rings as a subclass of hypernear-rings with a defect D, and that oneof division hypernear-rings. Another aim is to state a necessary and sufficientcondition under which a hypernear-ring with a defect of distributivity D is aD−division hypernear-ring.

References

[1] J. Clay, Nearrings: Geneses and Application, Oxford Univ. Press, Oxford,1992.

[2] V. Dasic, A defect of distributivity of the near-rings , Math. Balkanica, 8(1978), 63-75.

Page 22: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

8 SANJA JANCIC RASOVIC and VUCIC DASIC

[3] L. Dickson, Definitions of a group and a field by independent postulates,Trans. Amer. Math. Soc., 6 (1905), 198-204.

[4] G. Ferrero, C. Ferrero-Cotti, Nearrings. Some Developments Linked toSemigroups and Groups, Kluwer, Dordrecht, 2002.

[5] A. Fronlich, Distributively generated near-rings (I. Ideal Theory), Proc.London Math. Soc., (3) 8 (1958), 76-94.

[6] S. Jancic Rasovic, I. Cristea, Hypernear-rings with a defect of distributivity,submitted.

[7] S. Ligh, On distributively generated near-rings, Proc. Edinburg Math. Soc.,16, Issue 3 (1969), 239-242.

[8] J. Meldrum, Near-Rings and their Links with Groups, Pitman, London,1985.

[9] B.H. Neumann, On the commutativity of addition, London Math. Soc. 15(1940), 203-208.

[10] G. Pilz, Near-rings, North-Holland Publ.Co., rev.ed. 1983.

[11] B. Satyanarayana, K.S Prasad, Near-Rings, Fuzzy Ideals, and Graph The-ory, CRC Press, New York, 2013.

[12] S. Scott, Tame Theory, Amo Publishing, Auckland, 1983.

[13] V. Vukovic, Nonassociative Near-Rings, Univ. of Kragujevac-Studio Plus,Belgrade, 1996.

[14] H. Wahling, Theorie der Fastkorper, Thales-Verlag, Essen, 1987.

Accepted: 24.01.2018

Page 23: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (9–27) 9

BASIC NOTIONS OF PARTIALLY ORDEREDHYPERMODULES

H. MirabdollahiDepartment of MathematicsYazd [email protected]

S.M. Anvariyeh∗

Department of MathematicsYazd [email protected]

S. MirvakiliDepartment of Mathematics

Payame Noor University (PNU)

Yazd

Iran

saeed [email protected]

Abstract. In this paper, we construct the ring-like hyperstructures derived froma (partially) quasi ordered ring R, and we study some basic properties to this class.Then, we introduce the new class of (partially) ordered hypermodules by using of the(partially) ordered modules. Moreover, we study some basic properties of this newclass and the essential differences between this class and the earlier one (i.e. orderedmodules) are also investigated.

Keywords: (partially) ordered hypermodule, (partially) ordered ring, (partially)ordered module, (good) hyperring, (good) hypermodule

1. Introduction and preliminaries

Hyperstructures theory was born in 1934, when Marty at the 8th congress ofScandinavian mathematicians, gave the definition of a hypergroup and illus-trated some applications and showed its utility in the study of groups, algebraicfunctions and rational functions [16]. He defined the concept of hypergroups,as a natural generalization of groups, based on the notion of hyperoperation.Since then, a number of different hyperstructures have been widely studied bymany mathematicians. One of the first books about hypergroups was written

∗. Corresponding author

Page 24: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

10 H. MIRABDOLLAHI, S.M. ANVARIYEH and S. MIRVAKILI

by P. Corsini in 1993 [6]. Also the book ”Hyperstructures and Their Repre-sentations” was published in 1994 by T. Vougiouklis [26]. The other book onthese topics is ”Applications of Hyperstructure Theory”, by P. Corsini and V.Leoreanu, published in 2003 [5]. Another book, devoted especially to the studyof hyperring theory, is ”Hyperring Theory and Applications”, written by B.Davvaz and V. Leoreanu-Fotea [9]. A recent book on hyperstructures [8] pointsout on their applications in fuzzy and rough set theory, cryptography, codes,automata, probability, geometry, lattices, binary relations, graphs and hyper-graphs. In this book basic definitions and notions concerning hyperstructuretheory can be found.

First of all, we present some basic definitions and ideas from the hyperstruc-tures theory. The hyperstructures are algebraic structures equipped with atleast one multi-valued operation, called a hyperoperation. A nonempty set H,endowed with a hyperoperation, + : H×H −→ ℘∗(H) is called a hypergroupoid.℘∗(H) denotes the set of all nonempty subsets of H. A hypergroupoid whichverifies the condition (x + y) + z = x + (y + z), for all x, y, z ∈ H, is calleda semihypergroup. A semihypergroup H which verifies reproduction axioms,x+H = H = H + x, for all x ∈ H, is called a hypergroup [8].

Since we deal with the theory of ordered structures, we recall that a quasiordered (semi)group is a triple (G,+,≤), where (G,+) is a (semi)group and ≤ isa reflexive and transitive binary relation on G such that for any triple a, b, c ∈ Gwith the property a ≤ b also a + c ≤ b + c and c + a ≤ c + b hold. We callthe (semi)group partially ordered if the relation ≤ is moreover antisymmetric[13]. In a partially ordered group, an element x of G is called positive elementif 0 ≤ x. The set of elements 0 ≤ x is often denoted with G+, and it is calledthe positive cone of G. So, we have a ≤ b if and only if −a+ b ∈ G+.

For a general group G, the existence of a positive cone specifies an order onG [1]. A group G is a partially ordered group if and only if there exists a subsetH which is G+ of G such that:

i) 0 ∈ G+;

ii) if a, b ∈ G+ then a+ b ∈ G+;

iii) if a ∈ G+ then −x+ a+ x ∈ G+ for any x of G;

iv) if a ∈ G+ and −a ∈ G+ then a = 0;

v) G is totally ordered when it satisfies also G+ ∪ G− = G, in which G− =−x|x ∈ G+.

The (partially) ordered group (G,≤) is denoted by (G,G+). In addition [a)≤ :=x ∈ H|a ≤ x is a principal end generated by a ∈ G. The definition of partiallyordered ring and modules will be presented later in sections 2 and 3, respectively.

Recall that a ring consists of a set R equipped with two binary operations+ and . such that (i) (R,+) is an abelian group and (ii) (R, .) is a semigroup,

Page 25: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

BASIC NOTIONS OF PARTIALLY ORDERED HYPERMODULES 11

and (iii) a.(b+ c) = a.b+ a.c and (a+ b).c = a.c+ b.c for all a, b, c ∈ R. A ringR is called unitary whenever, there exists 1 ∈ R such that 1.a = a.1 = a for alla ∈ R. Let R is a ring and 1 is its multiplicative identity. A left R-module Mconsists of an abelian group (M,+) and an operation . : R ×M −→ M suchthat for all a, b ∈ R and x, y ∈ M , we have (i’) a.(x + y) = a.x + a.y, (ii’)(a+ b).x = a.x+ b.x, (iii’) (ab).x = a.(b.x), and (iv’) 1.x = x. The operation ofthe ring R on M is called scalar multiplication.

The relation of ordered sets and algebraic hyperstructures was first stud-ied by Vougiouklis in 1987 [27]. Then the connection between hyperstructuresand ordered sets have been analyzed by many researchers, such as Vougiouk-lis [29, 28], Corsini [7], Hoskova [15], Ghazavi and et al [11, 12, 13], Heidariand Davvaz [14] and Novak [18, 19]. One special aspect of this issue, knownas EL-hyperstructures, was touched upon by Chvalina [3]. He investigatedquasi ordered sets and hypergroups. Also, Rosenberg in [25], Hoskova in [15],Rackova in [24] and Novak in [17, 20, 21, 22] extended some results on the or-dered semigroups and ordered groups connected with EL-hyperstructures. EL-hyperstructures, mainly studied by M. Novak, are hyperstructures constructedfrom a (partially) quasi-ordered (semi)groups. More exactly, Novak in [21] con-sidered subhyperstructures of EL-hyperstructures and in [18], he discussed someinteresting results of important elements in this family of hyperstructures. Then,in [19] Novak studied some basic properties of EL-hyperstructures like invert-ibility, normality, being closed (ultra closed) and etc.

A number of articles and contributions in the hyperstructures theory dis-cussed about the creation of hyperstructures from a (partially) quasi-ordered(semi)groups. This results known as the ”Ends lemma”and first used in [4] astheorems 1.3 and 1.4 (chapter 4; and the remark mentioned in the following),would be presented in the following:

Theorem 1.1 ([4], Theorem 1.3, p. 146). Let (G,+,≤) be a partially orderedsemigroup. Binary hyperoperation ⊕ : G×G −→ ℘∗(G) defined by a⊕b = [a+b)≤is associative. The semihypergroup (G,⊕) is commutative if and only if thesemigroup (G,+) is commutative.

Theorem 1.2 ([4], Theorem 1.4, p. 147). Let (G,+,≤) be a partially orderedsemigroup. The following conditions are equivalent:

i) For any pair a, b ∈ G, there exists a pair c, c′ ∈ G such that b+ c ≤ a andc′ + b ≤ a.

ii) The associated semihypergroup (G,⊕) is a hypergroup.

Remark 1 ([4]). If (G,+,≤) is a partially ordered group, then if we takec = −b+ a and c′ = a− b, then condition (i) is valid. Therefore, if (G,+,≤) isa partially ordered group, then its associated hyperstructure is a hypergroup.

If the condition of quasi ordered is replaced by the condition of partiallyordered, then the proofs are valid.

Page 26: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

12 H. MIRABDOLLAHI, S.M. ANVARIYEH and S. MIRVAKILI

In this paper, we intend to build the ring-like hyperstructures using of aring H. Also, the ring H with order relation, on which two operations + and .and the quasi ordered semigroups (groups) (H,+,≤) and (H, .,≤) has studied.In addition, we introduce a new class of hypermodules from a given (partially)quasi-ordered modules as a generalization of Ends lemma based on hyperstruc-tures. Then, the essential differences between this class and the ordered modulesare also investigated.

2. (Partially) ordered (semi)hyperrings

Since a ring R is a algebraic structure that endow two operations + and ., suchthat (R,+) is an abelian group and (R, .) is a semigroup, therefore an orderedring is defined as:

Definition 2.1 ([10]). Let R be a ring with unit element 1 = 0. We say thatR is partially ordered when there exists a partial order ≤ on the underlying setR such that for any a, b, c in R:

i) a ≤ b implies a+ c ≤ b+ c

ii) 0 ≤ a and 0 ≤ b imply that 0 ≤ a.b.

If any two elements a, b ∈ R are comparable, then R is ordered.

The additive group of a partially ordered ring is a partially ordered group.Furthermore, The set of elements x for which 0 ≤ x (the set of non-negativeelements) of a partially ordered ring, is closed under addition and multiplication,i.e. if P is the set of non-negative elements of a partially ordered ring, thenP + P ⊆ P , and P.P ⊆ P . Furthermore, P ∩ (−P ) = 0.

If there exists a subset R+ of R such that:

i) 0 ∈ R+;

ii) R+ ∩ (R−) = 0, in which R− = −x|x ∈ R+;

iii) R+ +R+ ⊆ R+;

iv) R+.R+ ⊆ R+;

v) R is ordered when it satisfies also R+ ∪R− = R,

then the relation ≤ where a ≤ b if and only if b− a ∈ R+ defines a compatiblepartial order on R (i.e. (R,≤) is a partially ordered ring). Also, R is orderedwhen it satisfies also R+ ∪R− = R.

Example 1. i) The ring (Z,≤) with the usually order relation is an orderedring.

ii) The ring ZI of integral-valued functions on a set, with pointwise order, ispartially ordered (when I has at least two elements).

Page 27: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

BASIC NOTIONS OF PARTIALLY ORDERED HYPERMODULES 13

In any ring R, the absolute value | x | of an element x can be defined asfollowing:

| x |=

x, 0R ≤ x−x, x ≤ 0R .

The order relation of partially ordered ring R is compatible with the additionof the abelian group (R,+). Thus for the construction of hyperstructures basedEnds Lemma, the hyperoperations are defined:

Definition 2.2. Let R be an ordered ring. For all a, b ∈ R, we define:

a⊕ b = [| a | + | b |)≤(1)

a⊙ b = [| a || b |)≤.(2)

Lemma 2.3. Let R be an ordered ring. By definitions are presented in (1) and(2), (R,⊕) is an commutative semihypergroup, and (R,⊙) is a semihypergroup.

Proof. Let a1, a2, a3 ∈ R such that a1, a2 ∈ R− and a3 ∈ R+. Now, we showthat a1 ⊕ (a2 ⊕ a3) = (a1 ⊕ a2)⊕ a3. Therefore, by Definition 2.2. we have:

a1 ⊕ (a2 ⊕ a3) = ∪a1 ⊕ a′|a′ ≥| a2 | + | a3 |= ∪a1 ⊕ a′|a′ ≥ −a2 + a3= a|a ≥| a1 | + | a′ |, a′ ≥ −a2 + a3= a|a ≥ −a1 + a′, a′ ≥ −a2 + a3= a|a ≥ −a1 + a′ ≥ −a1 + (−a2 + a3)= a|a ≥ −a1 − a2 + a3.

On the other hand

(a1 ⊕ a2)⊕ a3 = ∪a′ ⊕ a3|a′ ≥| a1 | + | a2 |= ∪a′ ⊕ a3|a′ ≥ −a1 − a2= a|a ≥| a′ | + | a3 |, a′ ≥ −a1 − a2= a|a ≥ a′ + a3, a

′ ≥ −a1 − a2= a|a ≥ a′ + a3 ≥ (−a1 − a2) + a3= a|a ≥ −a1 − a2 + a3.

For (R,⊙), we have:

a1 ⊙ (a2 ⊙ a3) = ∪a1 ⊙ a′|a′ ≥| a2 || a3 |= ∪a1 ⊙ a′|a′ ≥ (−a2)a3= a|a ≥| a1 || a′ |, a′ ≥ −a2a3= a|a ≥ (−a1)a′, a′ ≥ −a2a3= a|a ≥ −a1a′ ≥ −a1(−a2a3)= a|a ≥ a1a2a3.

Page 28: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

14 H. MIRABDOLLAHI, S.M. ANVARIYEH and S. MIRVAKILI

On the other hand

(a1 ⊙ a2)⊙ a3 = ∪a′ ⊙ a3|a′ ≥| a1 || a2 |= ∪a′ ⊙ a3|a′ ≥ (−a1)(−a2)= a|a ≥| a′ || a3 |, a′ ≥ a1a2= a|a ≥ a′a3, a′ ≥ a1a2= a|a ≥ a′a3 ≥ (a1a2)a3= a|a ≥ a1a2a3.

Therefore, in this case (R,⊕) and (R,⊙) are semihypergroup. The other casesare proved, similarly. The commutativity of hyperoperation ⊕ is the directconsequence of the commutativity of operation +, according to Theorem 1.1.

The hyperstructures endowed with two internal hyperoperations, is called ahyperringoid. Recall that (R,+, .) is a hyperring (semihyperring) in the generalsense if; (1) (R,+) is a commutative hypergroup (semihypergroup); (2) . isassociative hyperoperation and; (3) the distributive law a.(b+ c) ⊆ (a.b) + (a.c)and (a + b).c ⊆ (a.c) + (b.c) is satisfied for every a, b, c of R. If the equality inthe distributive law is valid, then the hyperring (semihyperring) is called good.

Theorem 2.4. Let R be an ordered ring. Then (R,⊕,⊙) is a semihyperring.

Proof. It is sufficient the condition (3) of definition of semihyperring is checked.So, let a, b ∈ R− and c ∈ R+. Then

a1 ⊙ (a2 ⊕ a3) = ∪a1 ⊙ a′|a′ ≥ |a2|+ |a3|= ∪a1 ⊙ a′|a′ ≥ −a2 + a3= a|a ≥ |a1||a′|, a′ ≥ −a2 + a3= a|a ≥ −a1a′, a′ ≥ −a2 + a3= a|a ≥ −a1(−a2 + a3)= a|a ≥ a1a2 − a1a3).

On the other hand

(a1 ⊙ a2)⊕ (a1 ⊙ a3) = ∪a⊕ b|a ≥ |a1||a2|, b ≥ |a1||a3|= ∪a⊕ b|a ≥ a1a2, b ≥ −a1a3= a′|a′ ≥ |a|+ |b|, a ≥ a1a2, b ≥ −a1a3= a′|a′ ≥ a+ b, a ≥ a1a2, b ≥ −a1a3= a′|a′ ≥ a1a2 − a1a3.

The proof of distributive property on the right is done, similarly. The proof ofthe other cases is done easily, too.

Page 29: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

BASIC NOTIONS OF PARTIALLY ORDERED HYPERMODULES 15

Notice that if R is not ordered, then there exists an element a0 ∈ R suchthat a0 /∈ R+ ∪ R−, so |a0| is meaningless. Therefore, the definitions of hyper-operations ⊕ and ⊙ in (1) and (2) respectively, is not efficient for a⊕ b or a⊙ bwhen, at least one of a or b is not belonging to R+ ∪ R−. So, we modify thedefinitions of ⊕ and ⊙ in (1) and (2) respectively, in the following way:

Definition 2.5. Let (R,+, .,≤) be a partially ordered ring. For a, b ∈ R, wedefine:

a⊕1 b = [| a | + | b |)≤ ∪ a, b,(3)

a⊙1 b = [| a || b |)≤ ∪ a, b.(4)

With the hyperoperations ⊕1 and ⊙1 presented in (3) and (4), for any a, bof the partially ordered ring R, we have a⊕1 b ⊆ ℘∗(R) and a⊙1 b ⊆ ℘∗(R).

Recall that (R,+, .) is a hyperring in the general sense if (R,+) is a com-mutative hypergroup, . is associative hyperoperation and the distributive lawa.(b+ c) ⊆ (a.b) + (a.c), (a+ b).c ⊆ (a.c) + (b.c) is satisfied for any a, b, c of R.If the equality in the distributive law is valid, then the hyperring is called good.

Example 2. The hyperstructure R = (a, b,⊕,⊙) defined as follows:

⊕ a b

a a a, bb a, b a, b

⊙ a b

a a a, bb a a, b

is a good hyperring.

Theorem 2.6. Let (R,+, .,≤) be an ordered ring. Then (R,⊕1,⊙) is a goodhyperring.

Proof. Let a, b, c ∈ R. First of all, we show that (a⊕1 b)⊕1 c = a⊕1 (b⊕1 c).To prove the associative property of ⊕, there are eight different cases. All cases,particularly the cases in which a, b, c ∈ R+ or a, b, c ∈ R−, can easily be proved.Here we prove the case in which a ∈ R+ and b, c ∈ R−.

(a⊕1 b)⊕1 c = ([| a | + | b |)≤ ∪ a, b)⊕1 c

= (r′|r′ ≥| a | + | b | ∪ a, b)⊕1 c

= (r′|r′ ≥ a− b ∪ a, b)⊕1 c

= ∪r′ ⊕1 c|r′ ≥ a− b ∪ a⊕1 c ∪ b⊕1 c

= r|r ≥ |r′|+ |c|, r′ ≥ a− b ∪ r′|r′ ≥ a− b ∪ c∪a, c ∪ r|r ≥ |a|+ |c| ∪ b, c ∪ r|r ≥ |b|+ |c|

= r|r ≥ r′ − c, r′ ≥ a− b ∪ r′|r′ ≥ a− b∪r|r ≥ a− c ∪ r|r ≥ −b− c ∪ a, b, c

= r|r ≥ (a− b)− c ∪ r′|r′ ≥ a− b ∪ r|r ≥ a− c∪r|r ≥ −b− c ∪ a, b, c.

Page 30: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

16 H. MIRABDOLLAHI, S.M. ANVARIYEH and S. MIRVAKILI

On the other hand

a⊕1 (b⊕1 c) = a⊕1 ([| b | + | c |)≤ ∪ b, c)= a⊕1 (r′|r′ ≥| b | + | c | ∪ b, c)= a⊕1 (r′|r′ ≥ −b− c ∪ b, c)= ∪a⊕1 r

′|r′ ≥ −b− c ∪ a⊕1 b ∪ a⊕1 c

= r|r ≥ |a|+ |r′|, r′ ≥ −b− c ∪ r′|r′ ≥ −b− c∪a ∪ a, b ∪ r|r ≥ |a|+ |b| ∪ a, c ∪ r|r ≥ |a|+ |c|

= r|r ≥ a+ r′, r′ ≥ −b− c ∪ r′|r′ ≥ −b− c∪r|r ≥ a− b ∪ r|r ≥ a− c ∪ a, b, c

= r|r ≥ a+ (−b− c) ∪ r′|r′ ≥ −b− c ∪ r|r ≥ a− b∪r|r ≥ a− c ∪ a, b, c.

In the following, we show that the reproduction principles. Let a ∈ R, then wehave:

R ⊇ a⊕1 R = ∪a⊕1 b|b ∈ R ⊇ ∪a, b|b ∈ R = R,

as well as

R ⊇ R⊕1 a = ∪b⊕1 a|b ∈ R ⊇ ∪b, a|b ∈ R = R.

So R ⊕1 a = a ⊕1 R = R, for all a ∈ R. Therefore, (R,⊕1) is a hypergroup.Now, we show that (R,⊙) is a semihypergroup. Again, consider the case inwhich a ∈ R+ and b, c ∈ R−, then

(a⊙ b)⊙ c = ([| a || b |)≤)⊙ c= (r′|r′ ≥ −ab)⊙ c= ∪r′ ⊙ c|r′ ≥ −ab= r|r ≥| r′ || c |, a′ ≥ −ab= r|r ≥ −r′c, r′ ≥ −ab= r|r ≥ r′(−c) ≥ (−ab)(−c)= r|r ≥ (ab)c.

On the other hand

a⊙ (b⊙ c) = a⊙ ([| b || c |)≤)

= a⊙ r′|r′ ≥ (−b)(−c)= ∪a⊙ r′|r′ ≥ bc= r|r ≥| a || r′ |, r′ ≥ bc= r|r ≥ ar′, r′ ≥ bc= r|r ≥ ar′ ≥ a(bc)= r|r ≥ a(bc).

Page 31: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

BASIC NOTIONS OF PARTIALLY ORDERED HYPERMODULES 17

To investigate the distribution ⊙ by the ratio of ⊕1 of the left, the case a ∈ R+

and b, c ∈ R− are considered. So we have:

a⊙ (b⊕1 c) = a⊙ (r′|r′ ≥| b | + | c | ∪ b, c)= ∪a⊙ r′|r′ ≥ −b− c ∪ a⊙ b ∪ a⊙ c= r|r ≥| a || r′ |, r′ ≥ (−b− c)∪r|r ≥| a || b | ∪ r|r ≥| a || c |

= r|r ≥ ar′, r′ ≥ −(b+ c) ∪ r|r ≥ −ab ∪ r|r ≥ −ac= r|r ≥ −ab− ac ∪ r|r ≥ −ab ∪ r|r ≥ −ac.

On the other hand

(a⊙ b)⊕1 (a⊙ c) = ∪r ⊕1 r′|r ≥| a || b |, r′ ≥| a || c |

= r|r ≥ −ab ∪ r|r′ ≥ −ac∪r′′|r′′ ≥ |r|+ |r′|, r ≥ −ab, r′ ≥ −ac

= r|r ≥ −ab ∪ r|r′ ≥ −ac∪r′′|r′′ ≥ r + r′, r ≥ −ab, r′ ≥ −ac

= r|r ≥ −ab ∪ r|r′ ≥ −ac ∪ r′′|r′′ ≥ −ab− ac.

The distribution ⊙ by the ratio of ⊕1 of the right is proved similarly. Therefore,(R,⊕1,⊙) is a good hyperring.

Theorem 2.7. Let (R,+,≤) be a partially ordered group. Then (R,⊕1) is ahypergroup.

Proof. According to the previous theorems, it is sufficient to show the associa-tive property of hyperoperation ⊕1 and the reproduction principles for the casein which at least one element is not belonging to R+ ∪ R−. Let a /∈ R+ ∪ R−,and b, c ∈ R+. Then we have:

(a⊕1 b)⊕1 c = ([| a | + | b |)≤ ∪ a, b)⊕1 c

= (∅ ∪ a, b)⊕1 c

= a⊕1 c ∪ b⊕1 c

= a, c ∪ r|r ≥ |a|+ |c| ∪ b, c ∪ r|r ≥ |b|+ |c|= ∅ ∪ r|r ≥ b+ c ∪ a, b, c= r|r ≥ b+ c ∪ a, b, c.

On the other hand

a⊕1 (b⊕1 c) = a⊕1 ([| b | + | c |)≤ ∪ b, c)= a⊕1 (r′|r′ ≥| b | + | c | ∪ b, c)= a⊕1 (r′|r′ ≥ b+ c ∪ b, c)= ∪a⊕1 r

′|r′ ≥ b+ c ∪ a⊕1 b ∪ a⊕1 c

Page 32: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

18 H. MIRABDOLLAHI, S.M. ANVARIYEH and S. MIRVAKILI

= r|r ≥ |a|+ |r′|, r′ ≥ b+ c ∪ r′|r′ ≥ b+ c∪a ∪ a, b ∪ r|r ≥ |a|+ |b| ∪ a, c ∪ r|r ≥ |a|+ |c|

= ∅ ∪ r′|r′ ≥ b+ c ∪ ∅ ∪ a, b ∪ ∅ ∪ a, c= r|r ≥ b+ c ∪ a, b, c.

But, for a ∈ R such that a /∈ R+ ∪R−, we have:

a⊕1 R = ∪a⊕1 b|b ∈ R = ∪a, b|b ∈ R = R,

as well as

R⊕1 a = ∪b⊕1 a|b ∈ R = ∪b, a|b ∈ R = R.

So R⊕1 a = a⊕1 R = R, for all a ∈ R. Therefore, (R,⊕1) is a hypergroup.

Example 3. Let G = (Z[i] = a + bi|a, b ∈ Z,+) with ordinary addition ofcomplex numbers. Put Z[i]+ = a|a ∈ Z, a ≥ 0 ∪ bi|b ∈ Z, b ≤ 0. Then(Z[i],Z[i]+) is a partially ordered group.

Also, we can see that:

Theorem 2.8. Let (R, .,≤) be a partially ordered group. Then (R,⊙1) is ahypergroup.

According to the previous lemmas, The following theorems satisfying:

Theorem 2.9. Let (R,+, .,≤) be a partially ordered ring. Then (R,⊕1,⊙1) isa hyperring.

Proof. First, we show the distribution ⊙1 by the ratio of ⊕1 of the left, for thecase in which a ∈ R+ and b, c ∈ R−.

a⊙1 (b⊕1 c) = a⊙1 (r′|r′ ≥| b | + | c | ∪ b, c)= ∪a⊙1 r

′|r′ ≥ −b− c ∪ a⊙1 b ∪ a⊙1 c

= a ∪ r′|r′ ≥ −b− c ∪ r|r ≥| a || r′ |, r′ ≥ (−b− c)∪a, b ∪ r|r ≥| a || b | ∪ a, c ∪ r|r ≥| a || c |

= r|r ≥ ar′, r′ ≥ −(b+ c) ∪ r|r ≥ −ab ∪ r|r ≥ −ac∪a, b, c ∪ r′|r′ ≥ −b− c

= r|r ≥ −ab− ac ∪ r|r ≥ −ab ∪ r|r ≥ −ac∪a, b, c ∪ r′|r′ ≥ −b− c.

On the other hand

(a⊙1 b)⊕1 (a⊙1 c) = ∪r ⊕1 r′|r ∈ a⊙1 b, r

′ ∈ a⊙1 c= ∪r ⊕1 r

′|r ≥ |a||b|, r = a, b, r′ ≥ |a||c|, r′ = a, c⊇ ∪r ⊕1 r

′|r ≥ −ab, r′ ≥ −ac ∪ b⊕1 c ∪ a= r|r ≥ −ab ∪ r′|r′ ≥ −ac∪r′′|r′′ ≥ |r|+ |r′|, r ≥ −ab, r′ ≥ −ac

Page 33: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

BASIC NOTIONS OF PARTIALLY ORDERED HYPERMODULES 19

∪r|r ≥ |b|+ |c| ∪ b, c ∪ a= r|r ≥ −ab ∪ r′|r′ ≥ −ac ∪ r′′|r′′ ≥ −ab− ac∪r|r ≥ −b− c ∪ a, b, c.

Then, consider the case in which a, c ∈ R+ and b /∈ R+ ∪R−.

a⊙1 (b⊕1 c) = a⊙1 (r′|r′ ≥| b | + | c | ∪ b, c)= a⊙1 (∅ ∪ b, c)= a⊙1 b ∪ a⊙1 c

= a, b ∪ r|r ≥ |a||c| ∪ a, c= a, b, c ∪ r|r ≥ ac.

On the other hand

(a⊙1 b)⊕1 (a⊙1 c) = ∪r ⊕1 r′|r ∈ a⊙1 b, r

′ ∈ a⊙1 c= ∪r ⊕1 r

′|r ≥ |a||b|, r = a, b, r′ ≥ |a||c|, r′ = a, c= ∪r ⊕1 r

′|r = a, b, r′ ≥ ac, r′ = a, c⊇ a, b, c ∪ r′|r′ ≥ ac.

The other cases are proved, similarly. therefore (R,⊕1,⊙1) is a hyperring.

Example 4. Consider the partially ordered ring ZI of integral-valued functionson a set I = a, b, with pointwise order. Then (ZI ,⊕1,⊙) is a good hyperring.

3. (Partially) ordered hypermodules

In this section, we intend to build module-like hyperstructures using the defi-nitions presented in previous section and the definitions would be presented infollowing.

Definition 3.1 ([23]). Let R be a partially ordered ring. A partially ordered(left) R-module is a (left) R-module (M, .) (by the function . : R × M −→M), together with a compatible partial order, i.e. a partial order ≤M on theunderlying set M that is compatible with the operation of the abelian group Mand the operation ., in the sense that it satisfies:

i) x ≤ y implies x+ z ≤ y + z

ii) 0R ≤ a and 0M ≤ x imply that 0M ≤ a.x,

for any x, y, z ∈M and a ∈ R. If any two elements a, b ∈ R are comparable andany two elements x, y ∈M too, then M is ordered.

If there exists a subset N (which is M+) of M such that:

i) 0M ∈M+;

Page 34: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

20 H. MIRABDOLLAHI, S.M. ANVARIYEH and S. MIRVAKILI

ii) M+ ∩M− = 0 in which M− = −m|m ∈ m ∈M+;

iii) M+ +M+ ⊆M+;

iv) R+.M+ ⊆M+;

v) M is ordered when it satisfies also M+ ∪M− = M .

Then the relation ≤M where x ≤ y if and only if y−x ∈ N defines a compatiblepartial order on M (i.e. (M,≤M ) is a partially ordered R-module).

Example 5. Consider Z-module Z with the usually order relation. Then M+

equals to all non-negative integer numbers, and M− equals to all non-positiveinteger numbers. Therefore M = M+ ∪M−.

In the following, we present an example of an ordered module in which theorder relation is partially only.

Example 6. Let I be a non-empty set and M := ZI be the Z- module of allfunctions from I to Z, with pointwise order, where the order relation is theusually order relation on integer numbers. Then M+ consists of all functionsfrom I to Z+ ∪0. Now, Let me put I := a, b. Then, assuming f(a) = 1 andf(b) = −1, we have f ∈M , while f /∈M+ ∪M−.

In any module, the absolute value | x | of an element x can be defined asfollowing:

| x |=

x, 0M ≤ x−x, 0M ≥ x .

Now we are trying to present an appropriate hyperoperations associated tothe operations and order relation of the R-module M . The order relation ofpartially ordered R-module M is compatible with the addition of the abeliangroup M and abelian group R. Thus for the construction of hyperstructuresbased Ends Lemma, the hyperoperations are defined:

Definition 3.2. Let R be a partially ordered ring and M be a partially ordered(left) R-module. For all a ∈ R and x, y ∈ M , we define the hyperoperations asfollows:

x ⋆ y = [| x | + | y |)≤;(5)

x ⋆1 y = [| x | + | y |)≤ ∪ x, y;(6)

a x = [| a | . | x |)≤;(7)

a 1 x = [|a|.|x|)≤ ∪ x.(8)

Let (R,+, .) be a hyperring and : R ×M −→ ℘∗(M) be the scalar hyper-operation. Then M is a left R- hypermodule whenever, (M,+) is a commutativehypergroup and for all a, b ∈ R and x, y ∈ M , i) a (x+ y) ⊆ (a x) + (a y);ii) (a + b) x ⊆ (a x) + (b x), and iii) (a.b) x = a (b x). If R is a goodhyperring and the equalities in the (i) and (ii) are valid, then the hypermoduleis called good [2].

Page 35: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

BASIC NOTIONS OF PARTIALLY ORDERED HYPERMODULES 21

Example 7 ( [2]). Let A be a ring and M be an R−module. If M ′ is asubmodule of M and one defines the following scalar hyperoperation

∀(a, x) ∈ A×M, a x = ax+M ′.

Then M is an R−hypermodule.

Remark 2. With an argument similar to that presented in the previous sec-tion, we can see that (M,⋆) is a commutative semihypergroup and (M,⋆1) is acommutative hypergroup.

Theorem 3.3. Let R be an ordered ring, and M be an ordered module over R.We apply hyperoperations ⊕1, ⊙, ⋆1 and on the ordered R-module M . ThenM is an good R-hypermodule.

Proof. It is sufficient that we show the validity of equality in conditions (i),(ii) and (iii) of definition good R-hypermodule. To show equality in conditions(i), (ii) and (iii); we consider cases in which a ∈ R−, x ∈ M+, y ∈ M−, a, b ∈R−, x ∈M− and a ∈ R+, b ∈ R−, x ∈M−, respectively. To prove (i), we have:

a (x⊕1 y) = a (z|z ≥ |x|+ |y| ∪ x, y)= a (z|z ≥ x− y ∪ x, y)= ∪a z|z ≥ x− y ∪ a x ∪ a y= z′|z′ ≥ |a|.|z|, z ≥ x− y ∪ z′|z′ ≥ |a|.|x| ∪ z′|z′ ≥ |a|.|y|= z′|z′ ≥ −a.z, z ≥ x− y ∪ z′|z′ ≥ −a.x ∪ z′|z′ ≥ a.y= z′|z′ ≥ a.(y − x) ∪ z′|z′ ≥ −a.x ∪ z′|z′ ≥ a.y.

On the other hand

a x ⋆1 a y = ∪z1 ⋆1 z2|z1 ≥ |a|.|x|, z2 ≥ |a|.|y|= z′|z′ ≥ |z1|+ |z2|, z1 ≥ −a.x, z2 ≥ a.y ∪ z1|z1 ≥ −a.x∪z2|z2 ≥ a.y

= z′|z′ ≥ z1 + z2, z1 ≥ −a.x, z2 ≥ a.y ∪ z1|z1 ≥ −a.x∪z2|z2 ≥ a.y

= z′|z′≥z1+z2 ≥ −a.x+a.y∪z1|z1≥− a.x∪z2|z2≥a.y= z′|z′ ≥ a.(y − x) ∪ z1|z1 ≥ −a.x ∪ z2|z2 ≥ a.y.

To prove (ii),

(a⊕1 b) x = (c|c ≥ |a|+ |b| ∪ a, b) x= ∪c x|c ≥ −a− b ∪ a x ∪ b x= y|y ≥ |c|.|x|, c ≥ −a− b ∪ y|y ≥ a.x ∪ y|y ≥ b.x= y|y ≥ −c.x, c ≥ −a− b ∪ y|y ≥ a.x ∪ y|y ≥ b.x= y|y ≥ (a+ b).x ∪ y|y ≥ a.x ∪ y|y ≥ b.x,

Page 36: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

22 H. MIRABDOLLAHI, S.M. ANVARIYEH and S. MIRVAKILI

and

a x ⋆1 b x = ∪y1 ⋆1 y2|y1 ≥ |a|.|x|, y2 ≥ |b|.|x|= y′|y′ ≥ |y1|+ |y2|, y1 ≥ a.x, y2 ≥ b.x ∪ y1|y1 ≥ a.x∪y2|y2 ≥ b.x

= y′|y′ ≥ y1 + y2, y1 ≥ a.x, y2 ≥ b.x ∪ y1|y1 ≥ a.x∪y2|y2 ≥ b.x

= y′|y′ ≥ y1 + y2 ≥ a.x+ b.x ∪ y1|y1 ≥ a.x ∪ y2|y2 ≥ b.x= y′|y′ ≥ a.x+ b.x ∪ y1|y1 ≥ a.x ∪ y2|y2 ≥ b.x.

In the following for proving (iii), we have

(a⊙ b) x = c|c ≥ |a||b| x= ∪c x|c ≥ −ab= y|y ≥ |c|.|x|, c ≥ −ab= y|y ≥ c.(−x), c ≥ −ab= y|y ≥ c.(−x) ≥ (−ab).(−x)= y|y ≥ (ab).x,

and

a (b x) = a y|y ≥ |b|.|x|= ∪a y|y ≥ b.x= y′|y′ ≥ |a|.|y|, y ≥ b.x= y′|y′ ≥ a.y, y ≥ b.x= y′|y′ ≥ a.(b.x).

The other cases in (i), (ii) and (iii) are proved, similarly.

Theorem 3.4. Let R be an ordered ring, and M be an ordered module over R.We apply hyperoperations ⊕1, ⊙1, ⋆1 and 1 on the ordered R-module M . ThenM is an R-hypermodule.

Proof. We showed that (R,⊕1,⊙1) is a hyperring, and we know that (M,⋆1)is a commutative hypergroup. Now, we prove that for all a, b ∈ R and x, y ∈M ,(i) a 1 (x ⋆1 y) ⊆ (a 1 x) + (a 1 y); (ii) (a⊕1 b) 1 x ⊆ (a 1 x) + (b 1 x), and(iii) (a ⊙1 b) 1 x = a 1 (b 1 x). For the proving of the case (i), suppose thatx ∈M+, y ∈M− and a ∈ R−. So, we have:

a 1 (x ⋆1 y) = a 1 (z : z ≥ |x|+ |y| ∪ x, y)= ∪a 1 z : z ≥ x− y ∪ a 1 x ∪ a 1 y= z′ : z′ ≥ |a|.|z|, z : z ≥ x− y ∪ z : z ≥ x− y

Page 37: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

BASIC NOTIONS OF PARTIALLY ORDERED HYPERMODULES 23

∪z′ : z′ ≥ |a|.|x| ∪ z′ : z′ ≥ |a|.|y| ∪ x, y= z′ : z′ ≥ (−a).z, (−a).z ≥ (−a).(x− y) ∪ z : z ≥ x− y∪z′ : z′ ≥ (−a).x ∪ z′ : z′ ≥ (−a).(−y) ∪ x, y

= z′ : z′ ≥ (−a).z ≥ (−a).(x− y) ∪ z : z ≥ x− y∪z′ : z′ ≥ (−a).x ∪ z′ : z′ ≥ (−a).(−y) ∪ x, y

= z′ : z′ ≥ a.(y − x) ∪ z : z ≥ x− y ∪ z′ : z′ ≥ −a.x∪z′ : z′ ≥ a.y ∪ x, y,(9)

and

a 1 x ⋆1 a 1 y = ∪z1 ⋆1 z2|z1 ≥ |a|.|x|, z1 = x, z2 ≥ |a|.|y|, z2 = y⊇ z′|z′ ≥ |z1|+ |z2|, z1 ≥ −a.x, z2 ≥ a.y ∪ z1|z1 ≥ −a.x∪z2|z2 ≥ a.y ∪ x ⋆1 y

= z′|z′ ≥ z1 + z2, z1 ≥ −a.x, z2 ≥ a.y ∪ z1|z1 ≥ −a.x∪z2|z2 ≥ a.y ∪ z|z ≥ |x|+ |y| ∪ x, y

= z′|z′ ≥ z1 + z2, z1 + z2 ≥ (−a.x+ a.y) ∪ z1|z1 ≥ −a.x∪z2|z2 ≥ a.y ∪ z|z ≥ x− y ∪ x, y

= z′|z′ ≥ a.(y − x) ∪ z1|z1 ≥ −a.x ∪ z2|z2 ≥ a.y∪z|z ≥ x− y ∪ x, y.(10)

The proof of (ii), for a ∈ R+, b ∈ R− and x ∈M−,

(a⊕1 b) 1 x = (c|c ≥ |a|+ |b| ∪ a, b) 1 x= ∪c 1 x|c ≥ a− b ∪ a 1 x ∪ b 1 x= y|y ≥ |c|.|x|, c ≥ a− b ∪ y|y ≥ −a.x ∪ y|y ≥ b.x ∪ x= y|y ≥ c.(−x), c.(−x) ≥ (a− b).(−x) ∪ y|y ≥ −a.x∪y|y ≥ b.x ∪ x

= y|y ≥ (b− a).x ∪ y|y ≥ −a.x ∪ y|y ≥ b.x ∪ x,

and

a 1 x ⋆1 b 1 x = ∪y1 ⋆1 y2|y1 ≥ |a|.|x|, y1 = x, y2 ≥ |b|.|x|, y2 = x⊇ y′|y′ ≥ |y1|+ |y2|, y1 ≥ a.(−x), y2 ≥ (−b).(−x)∪x ⋆1 x ∪ y1|y1 ≥ a.(−x) ∪ y2|y2 ≥ (−b).(−x)

⊇ y′|y′ ≥ y1 + y2, y1 + y2 ≥ −a.x+ b.x ∪ x∪y1|y1 ≥ −a.x ∪ y2|y2 ≥ b.x

= y′|y′ ≥ (−a+ b).x ∪ x ∪ y1|y1 ≥ −a.x ∪ y2|y2 ≥ b.x= y′|y′ ≥ (b− a).x ∪ y1|y1 ≥ −a.x ∪ y2|y2 ≥ b.x ∪ x.

Page 38: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

24 H. MIRABDOLLAHI, S.M. ANVARIYEH and S. MIRVAKILI

Finally, for a, b ∈ R+ and x ∈M−, we have

(a⊙1 b) 1 x = (c|c ≥ |a||b| ∪ a, b) 1 x= ∪c 1 x|c ≥ ab ∪ a 1 x ∪ b 1 x= y|y ≥ |c|.|x|, c ≥ ab ∪ y|y ≥ |a|.|x| ∪ y|y ≥ |b|.|x| ∪ x= y|y ≥ c.(−x), c.(−x) ≥ (ab).(−x) ∪ y|y ≥ a.(−x)∪y|y ≥ b.(−x) ∪ x

= y|y ≥ (ab).(−x) ∪ y|y ≥ −a.x ∪ y|y ≥ −b.x ∪ x,

and

a 1 (b 1 x) = a 1 (y|y ≥ |b|.|x| ∪ x)= ∪a 1 y|y ≥ b.(−x) ∪ a 1 x= y′|y′ ≥ |a|.|y|, y ≥ b.(−x) ∪ y|y ≥ b.(−x)∪y|y ≥ a.(−x) ∪ x

= y′|y′ ≥ a.y, a.y ≥ a.(−b.x) ∪ y|y ≥ −b.x∪y|y ≥ −a.x ∪ x

= y′|y′ ≥ −a.(b.x) ∪ y|y ≥ −b.x ∪ y|y ≥ −a.x ∪ x.

The other cases in (i), (ii) and (iii) are proved, similarly.

Example 8. Consider the abelian group (Z[x],+) with the ordinary additionof polynomials. Let p(x) = amx

m + am+1xm+1 + · · · + anx

n be a polynomialwith am, an = 0 and m ≤ n. Define p(x) ∈ Z[x]+ if and only if am ∈ Z+. Then(Z[x],Z[x]+) is an ordered abelian group, and Z- module Z[x] is an orderedmodule. Applying Theorem 3.3, the resulting hyperstructure (Z[x],⊕, ⋆1) willbe a good hypermodule.

Theorem 3.5. Let R be a partially ordered ring, and M be a partially orderedmodule over R. We apply hyperoperations ⊕1, ⊙1, ⋆1 and 1 on the partiallyordered R-module M . Then M is an R-hypermodule.

Proof. It is sufficient that we show inclusion in scalar conditions for the casein which there is at least an element a ∈ R or x ∈M such that a /∈ R+ ∪R− orx /∈ M+ ∪M−, respectively. So for condition (i), in the case a ∈ R+, x ∈ M−and y /∈M+ ∪M−, we have:

a 1 (x ⋆1 y) = a 1 (z|z ≥ |x|+ |y| ∪ x, y)= a 1 (∅ ∪ x, y)= a 1 x ∪ a 1 y= z|z ≥ |a|.|x| ∪ z|z ≥ |a|.|y| ∪ x, y= z|z ≥ a.(−x) ∪ ∅ ∪ x, y= z|z ≥ −a.x ∪ x, y.

Page 39: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

BASIC NOTIONS OF PARTIALLY ORDERED HYPERMODULES 25

On the other hand

a 1 x ⋆1 a 1 y = (z|z ≥ |a|.|x| ∪ x) ⋆1 (z|z ≥ |a|.|y| ∪ y)= (z|z ≥ a.(−x) ∪ x) ⋆1 (∅ ∪ y)= ∪z ⋆1 y|z ≥ a.(−x) ∪ x ⋆1 y= z′|z′ ≥ |z|+ |y|, z ≥ −a.x ∪ z|z ≥ −a.x∪z′|z′ ≥ |x|+ |y| ∪ x, y

= ∅ ∪ z|z ≥ −a.x ∪ ∅ ∪ x, y= z|z ≥ −a.x ∪ x, y.

In condition (ii), for the case in which a /∈ R+ ∪ R−, b ∈ R− and x ∈ M+, wehave

(a⊕1 b) 1 x = (c|c ≥ |a|+ |b| ∪ a, b) 1 x= (∅ ∪ a, b) 1 x= a 1 x ∪ b 1 x= y|y ≥ |a|.|x| ∪ y|y ≥ |b|.|x| ∪ x= ∅ ∪ y|y ≥ −b.x ∪ x= y|y ≥ −b.x ∪ x.

On the other hand

a 1 x ⋆1 b 1 x = (y1|y1 ≥ |a|.|x| ∪ x) ⋆1 (y2|y2 ≥ |b|.|x| ∪ x)= (∅ ∪ x) ⋆1 (y2|y2 ≥ |b|.|x| ∪ x)= ∪x ⋆1 y2|y2 ≥ (−b).x ∪ x ⋆1 x⊇ y|y ≥ |x|+ |y2|, y2 ≥ −b.x ∪ y2|y2 ≥ −b.x ∪ x⊇ y2|y2 ≥ −b.x ∪ x.

Finally, for a ∈ R+, b /∈ R− ∪R+ and x ∈M−, we have

(a⊙1 b) 1 x = (c|c ≥ |a||b| ∪ a, b) 1 x= (∅ ∪ a, b) 1 x= a 1 x ∪ b 1 x= y|y ≥ |a|.|x| ∪ y|y ≥ |b|.|x| ∪ x= y|y ≥ a.(−x) ∪ ∅ ∪ x= y|y ≥ −a.x ∪ x,

and

a 1 (b 1 x) = a 1 (y|y ≥ |b|.|x| ∪ x)= a 1 (∅ ∪ x)= a 1 x

Page 40: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

26 H. MIRABDOLLAHI, S.M. ANVARIYEH and S. MIRVAKILI

= y|y ≥ |a|.|x| ∪ x= y|y ≥ a.(−x) ∪ x= y|y ≥ −a.x ∪ x.

The other cases in (i), (ii) and (iii) are proved, similarly.

References

[1] N.G. Alimov, On ordered semigroups, Izvestiya Akad. Nauk SSSR., 14(1950), 569-576.

[2] S. M. Anvariyeh and B. Davvaz, Strongly transitive geometric spaces asso-ciated to hypermodules, J. Algebra, 322 (2009), 1340-1359.

[3] J. Chvalina, S. Hoskova-Mayerova, On certain proximities and preorderingson the transposition hypergroups of linear first-order partial differential op-erators, An. St. Univ. Ovidius Constanta, 22(1) (2014), 85-103.

[4] J. Chvalina, Functional graphs, quasi-ordered sets and commutative hyper-groups, Masaryk University, Brno (in Czech), 1995.

[5] P. Corsini and V. Leoreanu, Applications of Hyperstructure Theory, Kluwer,Dordrecht, 2003.

[6] P. Corsini, Prolegomena of hypergroup theory, 2nd edition, Aviani editor,1993.

[7] P. Corsini, Hyperstrutures associated with ordered sets, Bull Greek Math.Soc. 48, (2003) 7-18.

[8] B. Davvaz, Polygroup theory and related system, World Scientific Publish-ing, Singapore CrossRef. Math., 2012.

[9] B. Davvaz and V. Leoreanu-Fotea, Hyperring Theory and Applications, In-ternational Academic Press, 115, Palm Harber, USA, 2007.

[10] L. Gillman and M. Jerison, Rings of Continuous Functions, Van NostrandCompany, Inc., Princeton, 1960.

[11] S. H. Ghazavi, S. M. Anvariyeh, EL–hyperstructures associated to n-aryrelations, Soft Comput. DOI 10.1007/s00500-016-2165-3, (2016), 1-10.

[12] S. H. Ghazavi, S. M. Anvarieh and S. Mirvakili, Ideals in EL-semihypergroups associated to ordered semigroups, J. Algebraic Syst., 3(2),(2016), 109-125.

[13] S. H. Ghazavi, S. M. Anvarieh and S. Mirvakili, EL-hyperstructures derivedfrom (partially) quasi ordered hyperstructures, Iran J. Math. Sci. Inf., 10(2),(2015), 99-114.

Page 41: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

BASIC NOTIONS OF PARTIALLY ORDERED HYPERMODULES 27

[14] D. Heidari, B. Davvaz, On ordered hyperstructures, U. P. B. Sci. Bull. SeriesA, Vli. 73, Iss.2, (2011), 85-96.

[15] S. Hoskova, Order Hypergroups-The unique square root condition for quasi-order hypergroups, Set-valued Mathematics and Applications, 1, (2008),1-7.

[16] F. Marty, Sur une generalization de la notion de groupe, 8th Congress Math.Scandenaves, Stockholm, (1934), 45-49.

[17] M. Novak, EL-hyperstructures: an overview, Ratio Math., 23 (2012), 85-96.

[18] M. Novak, Important elements of EL-hyperstructures, APLIMAT: 10th In-ternational Conference, STU in Bratislava, Bratislava, (2011), 151-158.

[19] M. Novak, Some basic properties of EL-hyperstructure, Eur. J. Combin., 34(2013), 446-459.

[20] M. Novak, The notion of subhyperstructure of Ends Lemma-based hyper-structures, Aplimat. J. Appl. Math., 3(II), (2010), 237-247.

[21] M. Novak, On EL-semihypergroups, Eur. J. Combin. Part B, 44 (2015),274-286.

[22] M. Novak, Potential of the Ends Lemma to create ring-like hyperstruc-tures from quasi-ordered (semi)groups, South Bohemia Mathematical Let-ters, Volume 17, 1 (2009), 39-50.

[23] P. Ribenboim, On ordered modules, Crelles J., 225 (2009), 120-146.

[24] P. Rackova, Hypergroups of symmetric matrices, 10th InternationalCongress of Algebraic Hyperstructures and Applications, Proceeding ofAHA, 2008.

[25] I. G. Rosenberg, Hypergroups and join spaces determined by relations, Ital.J. Pure. Appl. Math., 4 (1998), 93-101.

[26] T. Vougiouklis, Hyperstructures and Their Representations, HadronicPress, Palm Harbour, 1994.

[27] T. Vougiouklis, Generalization of P-hypergroups, Rend Circ Mat. Palermo,36(II) (1987), 114-121.

[28] T. Vougiouklis, Representation of hypergroups by generalized permutations,Math Sci. Net. CrossRef. Math., 1992, 172-183.

[29] T. Vougiouklis, On some representations of hypergroups, Ann. Sci. Univ.Clermont-Ferrand II Math., 26 (1990), 21-29.

Accepted: 21.01.2016

Page 42: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (28–33) 28

INEQUALITIES OF UNITARILY INVARIANT NORMS FORMATRICES

Xuesha WuSchool of Marxism and General Education

Chongqing College of Electronic Engineering

Chongqing, 401331

P.R. China

xuesha [email protected]

Abstract. We present some inequalities of unitarily invariant norms for matrices byusing majorization, Fan dominance principle and some existing inequalities of singu-lar values and unitarily invariant norms for matrices. Our results are refinements orgeneralizations of ones shown by Audenaert, Al-khlyleh, and Kittaneh.

Keywords: singular values, unitarily invariant norms, fan dominance principle.

1. Introduction

Let Mn be the space of n × n complex matrices and suppose that s1(A) ≥· · · ≥ sn(A) ≥ 0 are the singular values of A, which is the eigenvalues of thepositive semidefinite matrix |A| = (A∗A)1/2, arranged in decreasing order andrepeated according to multiplicity. Let ∥ · ∥ denote any unitarily invariant normon Mn. For A ∈ Mn , by singular value decomposition of A, we know thatthe trace norm ∥A∥1 =

∑nj=1 sj(A) = tr|A| and the Frobenius norm ∥A∥F =

(∑n

j=1 s2j (A))1/2 = (tr|A|2)1/2 are both unitarily invariant.

Let A,B ∈Mn. Recently, Audenaert proved in [1] that if v ∈ [0, 1], then

(1.1) ∥AB∗∥2 ≤ ∥vA∗A+ (1− v)B∗B∥ ∥(1− v)A∗A+ vB∗B∥ ,

which is unity of the arithmetic-geometric mean and Cauchy-Schwarz inequali-ties for unitarily invariant norms.

Let A,X,B ∈Mn. Zou proved in [2] that if v ∈ [0, 1], then

(1.2) ∥AXB∗∥2 ≤ ∥vA∗AX + (1− v)XB∗B∥ ∥(1− v)A∗AX + vXB∗B∥ ,

which is a generalization of inequality (1.1).Let A,X,B ∈ Mn. Very recently, Al-Manasrah and Kittaneh proved in [3]

that if v ∈ [0, 1], then

∥AXB∗∥2F ≤(∥vA∗AX + (1− v)XB∗B∥2F − v

20 ∥A∗AX −XB∗B∥2F

)1/2×(∥(1− v)A∗AX + vXB∗B∥2F − v

20 ∥A∗AX −XB∗B∥2F

)1/2,(1.3)

Page 43: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

INEQUALITIES OF UNITARILY INVARIANT NORMS FOR MATRICES 29

where v0 = min v, 1− v. Inequality (1.3) is a refinement of inequality (1.2)for the Frobenius norm.

Lin [4] gave a new proof of inequality (1.1). The authors of [5, 6] showedsome generalizations of inequality (1.2).

In this short note, following the idea of Lin [4], Al-Manasrah and Kittaneh[3], we first present an improvement of inequality (1.1) for the trace norm.Meanwhile, we also give a generalization of inequality (1.3).

2. Main results

In this section, we will show the main results of this paper. To do this, we needthe following lemmas.

Lemma 2.1 ([7]). Let A ∈Mn. Then for any k = 1, · · · , n, we have

k∏j=1

|λj (A)| ≤k∏j=1

sj (A).

Lemma 2.2 ([7]). Let A,B ∈Mn. Then for any k = 1, · · · , n, we have

k∏j=1

sj (AB) ≤k∏j=1

sj (A) sj (B).

Lemma 2.3 ([8]). Let A,B ∈Mn be positive semidefinite. If v ∈ [0, 1], then

∥∥AvB1−v∥∥1≤ ∥vA+ (1− v)B∥1 − v0

(√∥A∥1 −

√∥B∥1

)2

,

where v0 = min v, 1− v.

Lemma 2.4 ([9]). Let A,X,B ∈ Mn such that A,B are positive semidefinite.If v ∈ [0, 1], then∥∥AvXB1−v∥∥

F≤(∥vAX + (1− v)XB∥pF

−vp0(∥AX +XB∥pF − 2p

∥∥∥A1/2XB1/2∥∥∥pF

))1/p,

where v0 = min v, 1− v.

Theorem 2.1. Let A,B ∈Mn. If v ∈ [0, 1], then

∥AB∗∥21 ≤

(∥vA∗A+ (1− v)B∗B∥ − v0

(√∥A∗A∥1 −

√∥B∗B∥1

)2)

×

(∥(1− v)A∗A+ vB∗B∥ − v0

(√∥A∗A∥1 −

√∥B∗B∥1

)2),(2.1)

where v0 = min v, 1− v.

Page 44: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

30 Xuesha Wu

Proof. By Lemmas 2.1 and 2.2, we know that for any k = 1, · · · , n, we have

k∏j=1

s2j (AXB∗) =

k∏j=1

λj (BX∗A∗AXB∗)

=

k∏j=1

λj (A∗AXB∗BX∗)

=

k∏j=1

λj

((A∗A)vX (B∗B)1−v (B∗B)vX∗ (A∗A)1−v

)

≤k∏j=1

sj

((A∗A)vX (B∗B)1−v (B∗B)vX∗ (A∗A)1−v

)

≤k∏j=1

sj

((A∗A)vX (B∗B)1−v

)sj

((B∗B)vX∗ (A∗A)1−v

).

That is

(2.2)

k∏j=1

sj(AXB∗) ≤

k∏j=1

s1/2j ((A∗A)vX(B∗B)1−v)s

1/2j ((B∗B)vX∗(A∗A)1−v).

Let

Y1 = diag(s1/21

((A∗A)vX (B∗B)1−v

), · · · , s1/2n

((A∗A)vX (B∗B)1−v

)),

Y2 = diag(s1/21

((B∗B)vX∗ (A∗A)1−v

), · · · , s1/2n

((B∗B)vX∗ (A∗A)1−v

)).

Then, it follows from (2.2) that

k∏j=1

sj (AXB∗) ≤k∏j=1

sj (Y1) sj (Y2) =k∏j=1

sj (Y1Y2).

Since weak log-majorization implies weak majorization, we obtain

(2.3)k∑j=1

sj (AXB∗) ≤k∑j=1

sj (Y1Y2).

By Fan’s dominance principle [7], we know that inequality (2.3) is equivalent to

(2.4) ∥AXB∗∥ ≤ ∥Y1Y2∥ .

Putting X = I and v = 0 or v = 1 in inequality (1.1), we get

∥Y1Y ∗2 ∥

2 ≤ ∥Y ∗1 Y1∥ ∥Y ∗

2 Y2∥ .

Page 45: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

INEQUALITIES OF UNITARILY INVARIANT NORMS FOR MATRICES 31

It follows from (2.4) and this last inequality that

(2.5) ∥AXB∗∥2 ≤∥∥∥(A∗A)vX (B∗B)1−v

∥∥∥ ∥∥∥(B∗B)vX∗ (A∗A)1−v∥∥∥ .

Since trace is unitarily invariant, we have

∥AB∗∥21 ≤∥∥∥(A∗A)v (B∗B)1−v

∥∥∥1

∥∥∥(B∗B)v (A∗A)1−v∥∥∥1.

Lemma 2.3 and the above inequality complete the proof. Remark 2.1. Obviously, inequality (2.1) is a refinement of inequality (1.1).

Remark 2.2. Putting X = I in (2.2), we have

(2.6)

k∏j=1

s2j (AB∗) ≤k∏j=1

sj

((A∗A)v (B∗B)1−v

)sj

((B∗B)v (A∗A)1−v

).

Ando proved in [10] that if v ∈ [0, 1], then

sj(AvB1−v) ≤ sj (vA+ (1− v)B) , j = 1, · · · , n.

Combining inequality (2.6) with Ando’s result, we get

k∏j=1

s2j (AB∗) ≤k∏j=1

sj (vA∗A+ (1− v)B∗B)sj ((1− v)A∗A+ vB∗B) ,

which implies inequality (1.1).

Next, we shall give a generalization of inequality (1.3).

Theorem 2.2. Let A,X,B ∈Mn. If v ∈ [0, 1], then

(2.7)∥AXB∗∥2F ≤

(∥vA∗AX + (1− v)XB∗B∥pF − v

p0f (A,X,B, p)

)1/p×

(∥(1− v)A∗AX + vXB∗B∥pF − v

p0f (A,X,B, p)

)1/p,

wherev0 = min v, 1− v ,

f (A,X,B, p) = ∥A∗AX +XB∗B∥pF − 2p∥∥∥(A∗A)1/2X (B∗B)1/2

∥∥∥pF.

Proof. Note that for any Y ∈ Mn , we have ∥Y ∥ = ∥Y ∗∥. Since Frobeniusnorm is unitarily invariant, it follows from inequality (2.5) and Lemma 2.5, weobtain

∥AXB∗∥2F ≤∥∥∥(A∗A)vX (B∗B)1−v

∥∥∥F

∥∥∥(B∗B)vX∗ (A∗A)1−v∥∥∥F

=∥∥∥(A∗A)vX (B∗B)1−v

∥∥∥F

∥∥∥(A∗A)1−vX (B∗B)v∥∥∥F

≤(∥vA∗AX + (1− v)XB∗B∥pF − v

p0f (A,X,B, p)

)1/p×(∥(1− v)A∗AX + vXB∗B∥pF − v

p0f (A,X,B, p)

)1/p,

Page 46: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

32 Xuesha Wu

wherev0 = min v, 1− v ,

f (A,X,B, p) = ∥A∗AX +XB∗B∥pF − 2p∥∥∥(A∗A)1/2X (B∗B)1/2

∥∥∥pF.

This completes the proof.

Remark 2.3. Putting p = 2 in inequality (2.7), we obtain

(2.8)∥AXB∗∥2F ≤

(∥vA∗AX + (1− v)XB∗B∥2F − v20f (A,X,B, 2)

)1/2×

(∥(1− v)A∗AX + vXB∗B∥2F − v20f (A,X,B, 2)

)1/2.

Note that

∥A∗AX +XB∗B∥2F = ∥A∗AX −XB∗B∥2F + 4∥∥∥(A∗A)1/2X (B∗B)1/2

∥∥∥2F,

then, we can rewrite inequality (2.8) as follows

∥AXB∗∥2F ≤(∥vA∗AX + (1− v)XB∗B∥2F − v20 ∥A∗AX −XB∗B∥2F

)1/2×

(∥(1− v)A∗AX + vXB∗B∥2F − v20 ∥A∗AX −XB∗B∥2F

)1/2.

This is inequality (1.3) and so we know that inequality (2.7) is a generalizationof inequality (1.3).

Acknowledgements

The author wishes to express her heartfelt thanks to the referees for their de-tailed and helpful suggestions for revising the manuscript.

Competing interests

The author declares that there is no conflict of interests regarding the publicationof this paper.

References

[1] K.M.R. Audenaert, Interpolating between the arithmetic-geometric meanand Cauchy-Schwarz matrix norm inequalities, Oper. Matrices, 9 (2015),475-479.

[2] L. Zou, Y. Jiang, A note on interpolation between the arithmetic-geometricmean and Cauchy-Schwarz matrix norm inequalities, J. Math. Inequal., 10(2016), 1119-1122.

[3] M. Al-khlyleh, F. Kittaneh, Interpolating inequalities related to a recentresult of Audenaert, Linear Multilinear Algebra, 65 (2017), 922-929.

Page 47: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

INEQUALITIES OF UNITARILY INVARIANT NORMS FOR MATRICES 33

[4] M. Lin, Remarks on two recent results of Audenaert, Linear Algebra Appl.,489 (2016), 24-29.

[5] M. Bakherad, R. Lashkaripour, M. Hajmohamadi, Extensions of interpo-lation between the arithmetic-geometric mean inequality for matrices, J.Inequal. Appl, 2017 (2017), 209.

[6] M. Alakhrass, A note on Audenaert interpolation inequality, Linear Multi-linear Algebra. In Press, doi: 10.1080/03081087.2017.1376614.

[7] R. Bhatia, Matrix Analysis, Springer-Verlag, New York, 1997.

[8] F. Kittaneh, Y. Manasrah, Improved Young and Heinz inequalities for ma-trices, J. Math. Anal. Appl., 361 (2010), 262-269.

[9] Y. Al-Manasrah, F. Kittaneh, Further Generalizations, Refinements, andReverses of the Young and Heinz Inequalities, Results in Mathematics, 71(2017), 1063-1072.

[10] T. Ando, Matrix Young inequality, Oper. Theory Adv. Appl., 75 (1995),33-38.

Accepted: 21.01.2016

Page 48: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (34–46) 34

IDEAL CONVERGENT GENERALIZED DIFFERENCESEQUENCE SPACES OF INFINITE MATRIX AND ORLICZFUNCTION

Kuldip Raj∗

Charu SharmaDepartment of Mathematics

Shri Mata Vaishno Devi University

Katra-182320, J&K

India

[email protected]

[email protected]

Abstract. In this paper we introduce some generalized difference sequence spacesby using Musielak-Orlicz function, ideal convergence and an infinite matrix defined onn-normed spaces. We study some basic topological and algebraic properties of thesespaces. We also investigate some inclusion relations related to these spaces.

Keywords: Musielak-Orlicz function, ideal convergence, solid, infinite matrix, n-normed space.

1. Introduction and preliminaries

The concept of 2-normed spaces was initially developed by Gahler [10] in themid of 1960’s, while that of n-normed spaces one can see in Misiak [20]. Sincethen, many others have studied this concept and obtained various results, seeGunawan ([11], [12]) and Gunawan and Mashadi [13] and many others. Letn ∈ N and X be a linear space over the real field R of dimension d, whered ≥ n ≥ 2. A real valued function ∥·, . . . , ·∥ on Xn satisfying the following fourconditions:

1. ∥x1, x2, . . . , xn∥ = 0 if and only if x1, x2, . . . , xn are linearly dependent inX;

2. ∥x1, x2, . . . , xn∥ is invariant under permutation;

3. ∥αx1, x2, . . . , xn∥ = |α| ∥x1, x2, . . . , xn∥ for any α ∈ R, and

4. ∥x+ x′, x2, . . . , xn∥ ≤ ∥x, x2, . . . , xn∥+ ∥x′, x2, . . . , xn∥

is called an n-norm on X, and the pair (X, ∥·, · · · , ·∥) is called an n-normedspace over the field R.

∗. Corresponding author

Page 49: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

IDEAL CONVERGENT GENERALIZED DIFFERENCE SEQUENCE SPACES ... 35

For example, we may take X = Rn being equipped with the n-norm ∥x1, x2,. . . , xn∥E = the volume of the n-dimensional parallelopiped spanned by thevectors x1, x2, . . . , xn which may be given explicitly by the formula

∥x1, x2, · · · , xn∥E = | det(xij)|,

where xi = (xi1, xi2, · · · , xin) ∈ Rn for each i = 1, 2, · · · , n, where script Edenotes Euclidean space. Let (X, ∥·, · · · , ·∥) be an n-normed space of dimensiond ≥ n ≥ 2 and a1, a2, . . . , an be linearly independent set in X. Then thefollowing function ∥·, · · · , ·∥∞ on Xn−1 defined by

∥x1, x2, · · · , xn−1∥∞ = max∥x1, x2, . . . , xn−1, ai∥ : i = 1, 2, · · · , n

defines an (n− 1)-norm on X with respect to a1, a2, . . . , an.A sequence (xk) in a n-normed space (X, ∥·, · · · , ·∥) is said to converge to

some L ∈ X if

limk→∞

∥xk − L, z1, · · · , zn−1∥ = 0, for every z1, . . . , zn−1 ∈ X.

A sequence (xk) in a n-normed space (X, ∥·, · · · , ·∥) is said to be Cauchy if

limk,i→∞

∥xk − xi, z1, · · · , zn−1∥ = 0, for every z1, . . . , zn−1 ∈ X.

If every Cauchy sequence in X converges to some L ∈ X, then X is said to becomplete with respect to the n-norm. Any complete n-normed space is said tobe n-Banach space.

The notions of statistical convergence and convergence in density for se-quences has been in the literature, under different guises, since the early part ofthe last century. Over the years and under different names, statistical conver-gence has been discussed in the theory of Fourier analysis, ergodic theory andnumber theory. Statistical convergence was recently investigated by Fast [9] andSchoenberg [29] independently.

The concept of ideal convergence was first introduced by P. Kostyrko etal. [16] as a generalization of statistical convergence which was further studiedin topological spaces by Das et al. [1]. More applications of ideals can beseen in ([1], [2]). We continue in this direction and introduce I-convergence ofgeneralized sequences in more general setting.

A family I ⊂ 2X of subsets of a non empty set X is said to be an ideal inXif

1. ϕ ∈ I;

2. A,B ∈ I imply A ∪B ∈ I;

3. A ∈ I, B ⊂ A imply B ∈ I, while an admissible ideal I of X furthersatisfies x ∈ I for each x ∈ X (see [14]).

Page 50: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

36 KULDIP RAJ and CHARU SHARMA

A sequence (xn)n∈N in X is said to be I-convergent to x ∈ X, if for each ϵ > 0the set A(ϵ) = n ∈ N : ∥xn − x∥ ≥ ϵ belongs to I (see [13]). A non emptyfamily of sets F ⊆ 2X is said to be filter on X if and only if Φ /∈ F, for A,B ∈ Fwe have A ∩ B ∈ F and for each A ∈ F and A ⊆ B implies B ∈ F. An idealI ⊆ 2X is called non trivial if I = 2X . A non-trivial ideal I ⊆ 2X is calledadmissible if x : x ∈ X ⊆ I. A non-trivial ideal is maximal if there cannotexist any non-trivial ideal J = I containing I as a subset. Further details onideals of 2X can be found in [16].

An Orlicz function M : [0,∞)→ [0,∞) is a continuous, non-decreasing andconvex function such that M(0) = 0, M(x) > 0 for x > 0 and M(x) → ∞ asx→∞.

Lindenstrauss and Tzafriri [18] used the idea of Orlicz function to define thefollowing sequence space,

ℓM =

(xk) ∈ w :∞∑k=1

M( |xk|ρ

)<∞, for some ρ > 0

which is called as an Orlicz sequence space. Also ℓM is a Banach space with thenorm

∥(xk)∥ = infρ > 0 :

∞∑k=1

M( |xk|ρ

)≤ 1.

Also, it was shown in [18] that every Orlicz sequence space ℓM contains a sub-space isomorphic to ℓp(p ≥ 1). An Orlicz function M satisfies ∆2−conditionif and only if for any constant L > 1 there exists a constant K(L) such thatM(Lu) ≤ K(L)M(u) for all values of u ≥ 0.

A sequence M = (Mk) of Orlicz functions is called a Musielak-Orlicz func-tion see ([19], [24]).

A Musielak-Orlicz function (Mk) is said to satisfy ∆2-condition if there existconstants a,K > 0 and a sequence c = (ck)

∞k=1 ∈ ℓ1+ (the positive cone of ℓ1)

such that the inequality

Mk(2u) ≤ KMk(u) + ck

holds for all k ∈ N and u ∈ R+ whenever Mk(u) ≤ a.The notion of difference sequence spaces was introduced by Kızmaz [17],

who studied the difference sequence spaces l∞(∆), c(∆) and c0(∆). The notionwas further generalized by Et and Colak [8] by introducing the spaces l∞(∆n),c(∆n) and c0(∆

n). Let w be the space of all complex or real sequences x = (xk)and let m, n be non-negative integers, then for Z = l∞, c, c0 we have sequencespaces

Z(∆mn ) = x = (xk) ∈ w : (∆m

n xk) ∈ Z,where ∆m

n x = (∆mn xk) = (∆m−1

n xk −∆m−1n xk+1) and ∆0

nxk = xk for all k ∈ N,which is equivalent to the following binomial representation

∆mn xk =

m∑v=0

(−1)v(mv

)xk+nv.

Page 51: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

IDEAL CONVERGENT GENERALIZED DIFFERENCE SEQUENCE SPACES ... 37

Taking n = 1, we get the spaces which were studied by Et and Colak [8]. Takingm = n = 1, we get the spaces which were introduced and studied by Kızmaz[17].For more details about sequence spaces (see [3], [4], [5], [6], [7], [21], [22],[23], [25], [26], [27], [28], [30], [31]) and reference therein.

Let X and Y be two sequence spaces and A = (ank) be an infinite matrixof real or complex numbers ank, where n, k ∈ N. Then we say that A definesa matrix mapping from X into Y if for every sequence x = (xk)

∞k=0 ∈ X, the

sequence Ax = An(x)∞n=0, the A-transform of x, is in Y , where

An(x) =∞∑k=0

ankxk (n ∈ N).

By (X,Y ), we denote the class of all matrices A such that A : X → Y . Thus,A ∈ (X,Y ) if and only if the series on the right-hand side of above equentionconverges for each n ∈ N and every x ∈ X.

The matrix domain XA of an infinite matrix A in a sequence space X isdefined by

XA = x = (xk) : Ax ∈ X.

A sequence space E is said to be solid(or normal) if (xk) ∈ E implies (αkxk) ∈ Efor all sequences of scalars (αk) with |αk| ≤ 1 and for all k ∈ N.

Let I be an admissible ideal of N, let p = (pk) be a bounded sequence of positivereal numbers and A = (ank) be an infinite matrix. LetM = (Mk) be a Musielak-Orlicz function, u = (uk) be a sequence of strictly positive real numbers and(X, ∥., ..., .∥) be an n-normed space. Suppose Λ = (λn) is a non-decreasingsequence of positive real numbers such that λn+1 ≤ λn + 1, λ1 = 1, λn → ∞ asn→∞. Further w(n−x) denotes the space of all X-valued sequences. For everyz1, z2, ..., zn−1 ∈ X, for each ϵ > 0 and for some ρ > 0 we define the followingsequence spaces:

W I[Λ,∆m

n , A,M, u, p, ∥., ..., .∥]

=

x = (xk) ∈ w(n− x) : for given ϵ > 0,

n ∈ N :1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

mn xk − Lρ

, z1, z2, ..., zn−1∥)]pk

≥ ϵ∈ I,

for L ∈ X and s ≥ 0

,

W I0

[Λ,∆m

n , A,M, u, p, ∥., ..., .∥]

=

x = (xk) ∈ w(n− x) : for given ϵ > 0,

n ∈ N :

1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

mn xkρ

, z1, z2, ..., zn−1∥)]pk

≥ ϵ∈ I, for s ≥ 0

Page 52: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

38 KULDIP RAJ and CHARU SHARMA

and

W I∞[Λ,∆m

n , A,M, u, p, ∥., ..., .∥]

=

x = (xk) ∈ w(n− x) : ∃ K > 0,

n ∈ N :

1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

mn xkρ

, z1, z2, ..., zn−1∥)]pk≥K

∈I, for s ≥ 0

,

where In = [n − λn + 1, n]. Some special cases of the above defined sequencespaces are arises: If m = 0, then we obtain the spaces as follows:

W I[Λ, A,M, u, p, ∥., ..., .∥

]=

x = (xk) ∈ w(n− x) : for given ϵ > 0,

n ∈ N :1

λn

∑k∈In

ank

[k−sMk

(∥ukxk − L

ρ, z1, z2, ..., zn−1∥

)]pk≥ ϵ∈ I,

for L ∈ X and s ≥ 0

,

W I0

[Λ, A,M, u, p, ∥., ..., .∥

]=

x = (xk) ∈ w(n− x) : for given ϵ > 0,

n ∈ N :

1

λn

∑k∈In

ank

[k−sMk

(∥ukxk

ρ, z1, z2, ..., zn−1∥

)]pk≥ ϵ∈ I, for s ≥ 0

and

W I∞[Λ, A,M, u, p, ∥., ..., .∥

]=

x = (xk) ∈ w(n− x) : ∃ K > 0,

n ∈ N :

1

λn

∑k∈In

ank

[k−sMk

(∥ukxk

ρ, z1, z2, ..., zn−1∥

)]pk≥ K

∈ I, for s ≥ 0

.

If m = n = 1, then the above spaces are as follows:

W I[Λ,∆, A,M, u, p, ∥., ..., .∥

]=

x = (xk) ∈ w(n− x) : for given ϵ > 0,

n ∈ N :1

λn

∑k∈In

ank

[k−sMk

(∥uk∆xk − L

ρ, z1, z2, ..., zn−1∥

)]pk≥ ϵ∈ I,

for L ∈ X and s ≥ 0

,

W I0

[Λ,∆, A,M, u, p, ∥., ..., .∥

]=

x = (xk) ∈ w(n− x) : for given ϵ > 0,

n ∈ N :

1

λn

∑k∈In

ank

[k−sMk

(∥uk∆xk

ρ, z1, z2, ..., zn−1∥

)]pk≥ ϵ∈ I, for s ≥ 0

Page 53: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

IDEAL CONVERGENT GENERALIZED DIFFERENCE SEQUENCE SPACES ... 39

and

W I∞[Λ,∆, A,M, u, p, ∥., ..., .∥

]=

x = (xk) ∈ w(n− x) : ∃ K > 0,

n ∈ N :

1

λn

∑k∈In

ank

[k−sMk

(∥uk∆xk

ρ, z1, z2, ..., zn−1∥

)]pk≥ K

∈ I, for s ≥ 0

.

If s = 0 and M(x) = x for all x ∈ [0,∞), then we have

W I[Λ,∆m

n , A, u, p, ∥., ..., .∥]

=

x = (xk) ∈ w(n− x) : for given ϵ > 0,

n ∈ N :1

λn

∑k∈In

ank

(∥uk∆

mn xk − Lρ

, z1, z2, ..., zn−1∥)pk≥ ϵ∈ I,

for L ∈ X and s ≥ 0

,

W I0

[Λ,∆m

n , A, u, p, ∥., ..., .∥]

=

x = (xk) ∈ w(n− x) : for given ϵ > 0,

n ∈ N :

1

λn

∑k∈In

ank

(∥uk∆

mn xkρ

, z1, z2, ..., zn−1∥)pk≥ ϵ∈ I, for s ≥ 0

and

W I∞[Λ,∆m

n , A, u, p, ∥., ..., .∥]

=

x = (xk) ∈ w(n− x) : ∃ K > 0,

n ∈ N :

1

λn

∑k∈In

ank

(∥uk∆

mn xkρ

, z1, z2, ..., zn−1∥)pk≥ K

∈ I, for s ≥ 0

.

If p = (pk) = 1 for all k, then the above spaces are as follows

W I[Λ, A,∆m

n ,M, u, ∥., ..., .∥]

=

x = (xk) ∈ w(n− x) : for given ϵ > 0,

n ∈ N :1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

mn xk − Lρ

, z1, z2, ..., zn−1∥)]

≥ ϵ∈ I, for L ∈ X and s ≥ 0

,

W I0

[Λ,∆m

n , A,M, u, ∥., ..., .∥]

=

x = (xk) ∈ w(n− x) : for given ϵ > 0,

Page 54: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

40 KULDIP RAJ and CHARU SHARMA

n ∈ N :

1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

mn xkρ

, z1, z2, ..., zn−1∥)]

≥ ϵ∈ I, for s ≥ 0

and

W I∞[Λ,∆m

n , A,M, u, ∥., ..., .∥]

=

x = (xk) ∈ w(n− x) : ∃ K > 0,

n ∈ N :

1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

mn xkρ

, z1, z2, ..., zn−1∥)]≥ K

∈ I, for s ≥ 0

.

If A = (C, 1), the Cesaro matrix, then the above spaces are as follows:

W I[Λ,∆m

n ,M, u, p, ∥., ..., .∥]

=

x = (xk) ∈ w(n− x) : for given ϵ > 0,

n ∈ N :1

λn

∑k∈In

[k−sMk

(∥uk∆

mn xk − Lρ

, z1, z2, ..., zn−1∥)]pk

≥ ϵ∈ I,

for L ∈ X and s ≥ 0

,

W I0

[Λ,∆m

n ,M, u, p, ∥., ..., .∥]

=

x = (xk) ∈ w(n− x) : for given ϵ > 0,

n ∈ N :

1

λn

∑k∈In

[k−sMk

(∥uk∆

mn xkρ

, z1, z2, ..., zn−1∥)]pk

≥ ϵ∈ I, for s ≥ 0

and

W I∞[Λ,∆m

n ,M, u, p, ∥., ..., .∥]

=

x = (xk) ∈ w(n− x) : ∃ K > 0,

n ∈ N :

1

λn

∑k∈In

[k−sMk

(∥uk∆

mn xkρ

, z1, z2, ..., zn−1∥)]pk

≥ K∈ I, for s ≥ 0

.

By a lacunary sequence θ = (kr); r = 0, 1, 2, ... where k0 = 0, we shall mean anincreasing sequence of non-negative integers with kr−kr−1 →∞ as r →∞. Theintervals determined by θ will be denoted by Ir = (kr−1, kr] and hr = kr− kr−1.We finally arrived, let

ank =

1

hr, if kr−1 < k < kr

0, otherwise.

Page 55: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

IDEAL CONVERGENT GENERALIZED DIFFERENCE SEQUENCE SPACES ... 41

Then the above classes of sequences are denoted by W I[Λ, θ,∆m

n ,M, p, ∥., ..., .∥],

W I0

[Λ, θ, ∆m

n ,M, p, ∥., ..., .∥]

and W I∞[Λ, θ,∆m

n ,M, p, ∥., ..., .∥].

The following inequality will be used throughout the paper. If 0 ≤ pk ≤sup pk = G, D = max(1, 2G−1) then

(1) |ak + bk|pk ≤ D|ak|pk + |bk|pk,

for all k and ak, bk ∈ R. Also |a|pk ≤ max(1, |a|G) for all a ∈ R.The main aim of this paper is to introduce some generalized difference se-

quence spaces defined by ideal convergence, Musielak-Orlicz function and aninfinite matrix. We have also make an effort to study some inclusion relationsand their topological properties.

2. Main results

Theorem 2.1. Let M = (Mk) be a Musielak-Orlicz function, p = (pk) be abounded sequence of positive real numbers and u = (uk) be a sequence of strictlypositive real numbers. ThenW I

[Λ,∆m

n , A,M, u, p, ∥., ..., .∥],W I

0

[Λ,∆m

n , A,M, u,p, ∥., ..., .∥

]and W I

∞[Λ,∆m

n , A,M, u, p, ∥., ..., .∥]are linear spaces over the real

field R.

Proof. We shall prove the result for the space W I0

[Λ,∆m

n , A,M, u, p, ∥., ..., .∥].

Let x = (xk) and y = (yk) be two elements of W I0

[Λ,∆m

n , A,M, u, p, ∥., ..., .∥].

Then there exists ρ1 > 0 and ρ2 > 0 and for z1, z2, ..., zn−1 ∈ X such that

A ϵ2

=n ∈ N :

1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

mn xkρ1

, z1, z2, ..., zn−1∥)]pk

≥ ϵ

2

∈ I

and

B ϵ2

=n ∈ N :

1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

mn ykρ2

, z1, z2, ..., zn−1∥)]pk

≥ ϵ

2

∈ I.

Let α, β ∈ R. Since ∥., ..., .∥ is a n-norm, ∆mn is linear and the contributing of

M = (Mk), the following inequality holds:

1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

mn (αxk + βyk)

|α|ρ1 + |β|ρ2, z1, z2, ..., zn−1∥

)]pk≤ D 1

λn

∑k∈In

ank

[ |α||α|ρ1 + |β|ρ2

k−sMk

(∥uk∆

mn xkρ1

, z1, z2, ..., zn−1∥)]pk

+D1

λn

∑k∈In

ank

[ |β||α|ρ1 + |β|ρ2

k−sMk

(∥uk∆

mn ykρ2

, z1, z2, ..., zn−1∥)]pk

≤ DK 1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

mn xkρ1

, z1, z2, ..., zn−1∥)]pk

+DK1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

mn ykρ2

, z1, z2, ..., zn−1∥)]pk

,

Page 56: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

42 KULDIP RAJ and CHARU SHARMA

where K = max1, |α||α|ρ1+|β|ρ2 ,

|β||α|ρ1+|β|ρ2 .

From the above relation, we getn ∈ N :

1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

mn (αxk + βyk)

|α|ρ1 + |β|ρ2, z1, z2, ..., zn−1∥

)]pk≥ ϵ

⊆n ∈ N : DK

1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

mn xkρ1

, z1, z2, ..., zn−1∥)]pk

≥ ϵ

2

∪n ∈ N : DK

1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

mn ykρ2

, z1, z2, ..., zn−1∥)]pk

≥ ϵ

2

.

Since both the sets on the R.H.S of above relation are belongs to I, so the seton the L.H.S of the inclusion relation belongs to I. Similarly we can prove othercases. This completes the proof of the theorem.

Theorem 2.2. Let M′ = (M ′k) and M′′ = (M ′′

k ) be two Musielak-orlicz func-tions. Then we have W I

0

[Λ,∆m

n , A,M′, u, p, ∥., ..., .∥]∩ W I

0

[Λ,∆m

n , A,M′′, u,p, ∥., ..., .∥

]⊆W I

0

[Λ,∆m

n , A,M′ +M′′, u, p, ∥., ..., .∥].

Proof. Let x = (xk) ∈W I0

[Λ,∆m

n , A,M′, u, p, ∥., ..., .∥]∩W I

0

[Λ,∆m

n , A,M′′, u,p, ∥., ..., .∥

]. Then we get the result by the following inequality:

1

λn

∑k∈In

ank

[k−s(M ′

k +M ′′k )(∥uk∆

mn xkρ

, z1, z2, ..., zn−1∥)]pk

≤ D 1

λn

∑k∈In

ank

[k−sM ′

k

(∥uk∆

mn xkρ

, z1, z2, ..., zn−1∥)]pk

+D1

λn

∑k∈In

ank

[k−sM ′′

k

(∥uk∆

mn xkρ

, z1, z2, ..., zn−1∥)]pk

.

Hence,n ∈ N :

1

λn

∑k∈In

ank

[k−s(M ′

k +M ′′k )(∥uk∆

mn xkρ

, z1, z2, ..., zn−1∥)]pk

≥ ϵ

⊆n ∈ N : D

1

λn

∑k∈In

ank

[k−sM ′

k

(∥uk∆

mn xkρ

, z1, z2, ..., zn−1∥)]pk

≥ ϵ

2

∪n ∈ N : D

1

λn

∑k∈In

ank

[k−sM ′′

k

(∥uk∆

mn xkρ

, z1, z2, ..., zn−1∥)]pk

≥ ϵ

2

.

Since both the sets on the R.H.S of above relation are belongs to I, so the seton the L.H.S of the inclusion relation belongs to I. This completes the proof ofthe theorem.

Theorem 2.3. The inclusions Z[Λ,∆m−1

n , A, M, u, p, ∥., ..., .∥]⊆ Z

[Λ,∆m

n , A,M, u, p, ∥., ..., .∥

]are strict form ≥ 1. In general Z

[Λ,∆m−1

n ,M, u, p, ∥., ..., .∥]⊆

Z[Λ,∆m

n , A,M, u, p, ∥., ..., .∥], for m = 0, 1, 2, ... where Z = W I ,W I

0 ,WI∞.

Page 57: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

IDEAL CONVERGENT GENERALIZED DIFFERENCE SEQUENCE SPACES ... 43

Proof. We give the proof forW I0

[Λ,∆m−1

n , A,M, u, p, ∥., ..., .∥]

only. The otherscan be proved by similar argument. Let x = (xk) be any element in the spaceW I

0

[Λ,∆m−1

n , A,M, u, p, ∥., ..., .∥]. Let ϵ > 0 be given. Then there exists ρ > 0

such that the setn ∈ N :

1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

m−1n xkρ

, z1, z2, ..., zn−1∥)]pk

≥ ϵ∈ I.

Since M = (Mk) is non-decreasing and convex for every k, it follows that

1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

mn xk

2ρ, z1, z2, ..., zn−1∥

)]pk=

1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

m−1n xk+1 − uk∆m−1

n xk2ρ

, z1, z2, ..., zn−1∥)]pk

≤ D 1

λn

∑k∈In

ank

[1

2k−sMk

(∥uk∆

m−1n xk+1

ρ, z1, z2, ..., zn−1∥

)]pk+D

1

λn

∑k∈In

ank

[1

2k−sMk

(∥uk∆

m−1n xkρ

, z1, z2, ..., zn−1∥)]pk

≤ DH 1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

m−1n xk+1

ρ, z1, z2, ..., zn−1∥

)]pk+DH

1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

m−1n xkρ

, z1, z2, ..., zn−1∥)]pk

,

where H = max

1, (12)G. Thus we have

n ∈ N :1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

mn xk

2ρ, z1, z2, ..., zn−1∥

)]pk≥ ϵ

⊆n ∈ N :

1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

m−1n xk+1

ρ, z1, z2, ..., zn−1∥

)]pk≥ ϵ

2

∪n ∈ N :

1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

m−1n xkρ

, z1, z2, ..., zn−1∥)]pk

≥ ϵ

2

.

Since both the sets in right hand side of the above relation belongs to I, thereforewe get the set

n ∈ N :1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

mn xkρ

, z1, z2, ..., zn−1∥)]pk

≥ ϵ∈ I.

This inclusion is strict follows from the following example.

Example. Let Mk(x) = x, for all k ∈ N, uk = pk = 1 for all k ∈ N, s = 0,λn = 1 and A = (C, 1), the Cesaro matrix. Now consider a sequence x =

Page 58: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

44 KULDIP RAJ and CHARU SHARMA

(xk) = (kt). Then for n = 1, x = (xk) belongs to W I0

[Λ,∆m

n ,M, u, p, ∥., ..., .∥]

but does not belongs to W I0

[Λ,∆m−1

n ,M, u, p, ∥., ..., .∥], because ∆m

n xk = 0 and∆m−1n xk = (−1)m−1(m− 1)!.

Theorem 2.4. For any two sequences p = (pk) and q = (qk) of positive realnumbers and for any two n-norms ∥., ..., .∥1 and ∥., ..., .∥2 on X, we have thefollowing Z

[Λ,∆m

n , A,M, u, p, ∥., ..., .∥1]∩ Z

[Λ,∆m

n , A,M, u, q, ∥., ..., .∥2]= ϕ

where Z = W I ,W I0 and W I

∞.

Proof. Since the zero element belongs to both the classes of sequences, so theintersection is non-empty.

Theorem 2.5. The sequence spacesW I0

[Λ,∆m

n , A,M, u, p, ∥., ..., .∥]andW I

∞[Λ,

∆mn , A,M, u, p, ∥., ..., .∥

]are normal as well as monotone.

Proof. We shall prove the theorem for W I0

[Λ,∆m

n , A,M, u, p, ∥., ..., .∥]. Let

x = (xk) ∈ W I0

[Λ,∆m

n , A,M, u, p, ∥., ..., .∥]

and α = (αk) be a sequence ofscalars such that |αk| ≤ 1 for all k ∈ N. Then for given ϵ > 0, we have

n ∈ N :1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

mn (αkxk)

ρ, z1, z2, ..., zn−1∥

)]pk≥ ϵ

⊆n ∈ N :

1

λn

∑k∈In

ank

[k−sMk

(∥uk∆

mn (xk)

ρ, z1, z2, ..., zn−1∥

)]pk≥ ϵ∈ I.

Hence, αkxk ∈ W I0

[Λ,∆m

n , A,M, u, p, ∥., ..., .∥]. Thus, the space W I

0

[Λ,∆m

n ,A,M, u, p, ∥., ..., .∥

]is normal. Therefore, W I

0

[Λ,∆m

n , A,M, u, p, ∥., ..., .∥]

ismonotone also (see [15]). Similarly, we can prove the theorem for other case.This completes the proof of the theorem.

References

[1] P. Das, P. Kostyrko, W. Wilczynski and P. Malik, I and I∗ convergence ofdouble sequences, Math. Slovaca, 58 (2008), 605-620.

[2] P. Das and P. Malik, On the statistical and I-variation of double sequences,Real Anal. Exchange, 33 (2007-2008), 351-364.

[3] A. Esi and B. C. Tripathy, On some new difference sequence spaces, Com-mun. Fac. Sci. Univ. Ank. Series A1, 53 (2004), 57-66.

[4] A. Esi and M. Isık, Some Generalized Difference Sequence Spaces, Thai J.Math., 3 (2005), 241-247.

[5] A. Esi, Some Classes of Generalized difference paranormed sequence spacesassociated with multiplier sequences, J. Comput. Anal. Appl., 11 (2009),536-545.

Page 59: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

IDEAL CONVERGENT GENERALIZED DIFFERENCE SEQUENCE SPACES ... 45

[6] A. Esi, On some generalized difference sequence spaces of invariant meansdefined by a sequence of Orlicz functions, J. Comput. Anal. Appl., 11(2009), 524-535.

[7] A. Esi, Generalized difference sequence spaces defined by Orlicz functions,Gen. Math., 17 (2009), 53-66.

[8] M. Et and R. Colak, On generalized difference sequence spaces, SoochowJ. Math., 21 (1995), 377-386.

[9] H. Fast, Sur la convergence statistique, Colloq. Math., 2 (1951), 241-244.

[10] S. Gahler, Linear 2-normietre Rume, Math. Nachr., 28 (1965), 1-43.

[11] H. Gunawan, On n-inner product, n-norms, and the Cauchy-Schwartz in-equality, Sci. Math. Jpn., 5 (2001), 47-54.

[12] H. Gunawan, The space of p-summable sequence and its natural n-norm,Bull. Aust. Math. Soc., 64 (2001), 137-147.

[13] H. Gunawan and M. Mashadi, On n-normed spaces, Int. J. Math. Math.Sci., 27 (2001), 631-639.

[14] M. Gurdal, and S. Pehlivan, Statistical convergence in 2-normed spaces,Southeast Asian Bull. Math., 33 (2009), 257-264.

[15] P. K. Kamthan and M. Gupta, Sequence spaces and series, Marcel Dekkar,New York, 1981.

[16] P. Kostyrko, T. Salat and W. Wilczynski, I-Convergence, Real Anal. Ex-change, 26 (2000), 669-686.

[17] H. Kızmaz, On certain sequence spaces, Canad. Math-Bull., 24 (1981), 169-176.

[18] J. Lindenstrauss and L. Tzafriri, On Orlicz sequence spaces, Israel J. Math.,10 (1971), 345-355.

[19] L. Maligranda, Orlicz spaces and interpolation, Seminars in Mathematics,5, Polish Academy of Science, 1989.

[20] A. Misiak, n-inner product spaces, Math. Nachr., 140 (1989), 299-319.

[21] M. Mursaleen, On statistical convergence in random 2-normed spaces, Actasci. Math., 76 (2010), 101-109.

[22] M. Mursaleen and A. Alotaibi, On I-convergence in random 2-normedspaces, Math. Slovaca, 61 (2011), 933-940.

Page 60: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

46 KULDIP RAJ and CHARU SHARMA

[23] M. Mursaleen and S. A. Mohiuddine, Statistical convergence of double se-quences in intuitionistic fuzzy normed spaces, Chaos Solitons Fractals, 41(2009), 2414-2421.

[24] J. Musielak, Orlicz spaces and modular spaces, Lecture Notes in Mathe-matics, 1034 (1983).

[25] K. Raj and S. Jamwal, On some generalized statistical convergent sequencespaces, Kuwait J. Sci., 42(3) (2015), 86-104.

[26] K. Raj and A. Kilicman, On certain generalized paranormed spaces, J.Inequal. Appl., 37 (2015).

[27] K. Raj and S. K. Sharma, Some sequence spaces in 2-normed spaces definedby Musielak-Orlicz function, Acta Univ. Sapientiae Math., 3 (2011), 97-109.

[28] K. Raj, S. Jamwal and S. K. Sharma, Some double lacurnary sequencespaces, Italian J. Pure and Appl. Math., 32 (2014), 347-358.

[29] I. J. Schoenberg, The integrability of certain functions and related summa-bility methods, Amer. Math. Monthly, 66 (1959), 361-375.

[30] B. C. Tripathy, A. Esi and B. Tripathy, On a New Type Of GeneralizedDifference Cesaro Sequence Spaces, Soochow J. Math., 31 (2005), 333-340.

[31] B. C. Tripathy and A. Esi, A new type difference sequence spaces, Int. J.Sci. Technol., 1 (2006), 11-14.

Accepted: 20.04.2016

Page 61: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (47–60) 47

ON THE ROLE OF THE STOKES PROBLEM IN SECONDGRADE FLUID FLOW IN REGIONS WITH PERMEABLEINTERFACES

R. MaritzDepartment of Mathematical SciencesUniversity of South AfricaScience Campus, FloridaUnisa 0003South Africa

J.M.W. Munganga∗

Department of Mathematical Sciences

University of South Africa

Science Campus, Florida

Unisa 0003

South Africa

[email protected]

Abstract. The role of the Stokes problem in conducting a theory of existence ofsolutions, weak as well as classical, is under investigation in this research paper. Wemodel the motion of incompressible flows of non–Newtonian fluids through permeableboundaries in terms of the Stokes equation. The equation of motion in the region Ω ∈ R3

is coupled with the dynamic boundary condition through the permeable boundary Γ,in order to design a transport equation in a product space Ym. The existence of aunique solution for the Stokes problem is proved by using a special Helmholtz projectionand employing the results from a paper of Agmon et al [1, Theorem 10.5 p.78]. Themodelling is done for a special case where a ”shear flow” is assumed.

Keywords: Stokes problem, Helmholtz projection, weak solution, non-Newtonian flu-ids, permeable boundary, dynamic boundary conditions, kinematic boundary condition.

1. Introduction

Existence of solutions to the general initial-boundary-value problem for an in-compressible second grade fluid in a bounded domain, with no slip, has firstbeen addressed by the pioneer A.P. Oskolkov [13], who proved the global (intime) existence and uniqueness of a general solution to a simplified version ofthe problem by formulating it in terms of

u ≡ v − α∆v,

and applying the Faedo-Galerkin method. Cioranescu and Girault [5] followeda similar approach, but used the quantity curl(v − α1∆v) and applied the

∗. Corresponding author

Page 62: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

48 R. MARITZ and J.M.W. MUNGANGA

Faedo-Galerkin method to the full problem in order to obtain a unique solution,global in time if Ω is in R2 and local in time if Ω is in R3, for flows withα1 ≥ 0 and α1 + α2 = 0.

Certain one-dimensional flows of a so-called power-law fluid of grade two,with shear-dependent viscosity, were studied by Man [9], where similar existenceresults were established.

In the proof of existence the Galdi-Grobbelaar-Sauer method [6] of reducingthe equation of conservation of linear momentum to a transport equation anda Stokes-type equation is modified so that the dynamical boundary conditionis combined with the transport equation. In [6], Galdi et.al. formulated theproblem of existence of classical solutions as a problem of the existence of afixed point of a certain mapping by considering the change of variable v →u = v− α1∆v. This was the first proof of existence and uniqueness of classicalsolutions. The restriction that α1 > 0 as well as α1 sufficiently large was imposedfor the global existence result to hold. No restriction on α2 was imposed. Here,orthogonal projections on solenoidal fields were used to annihilate the pressureterm in the equation of motion in the region Ω. They considered a fixed pointproblem in w, based on the Helmholtz decomposition ∆v = w +∇π.

Stokes flow in region with stretching boundaries was investigated by nu-merous researchers like Wang [17], Andersson [2] and Ariel et Al [3]. Wang[17] proved an exact solution for a flow due to a stretching boundary, whereas Andersson and Ariel et Al[2, 3] gave an analysis of slip flow past stretchingsurfaces. Makinde et Al [8] investigated MHD steady flow in a channel withslip at permeable boundaries, and Sekhar et Al [4] discussed Stokes flow insidea porous spherical shell stress jump boundary condition.

For traditional boundary conditions, the classical Helmholtz decompositionis often useful. The Helmholtz decomposition results from orthogonal projec-tions from the space of square integrable vector fields onto the subspaces con-sisting of gradients and solenoidal fields [16, Thm. 1.5, p. 16].

To answer the question: “What will cause the fluid to move through thepermeable boundary?”, we consider the boundary as a continuum with its ownphysical properties. The motion of the boundary material is determined bynormal forces exerted on it by the fluid in the container as well as forces dueto the contact between the fluid in the container and the boundary surfaces. Insection 2 we present the problem where the Frenet-Serret formulae, [11, 19, 18]is used to formulate the permeability through the boundary. In this sectiontwo additional assumptions were made concerning the shape of Ω. Section 3 isdevoted to definitions of spaces, operators, norms and projections. In section 4we formulate the auxiliary problems in terms of a Stokes-like expression for thefluid in the region Ω as well as the fluid flow through the boundary. The existencefor the Stokes Problem is presented in section 5. The transport problem in termsof the Stokes expression is given in section 6 to be followed by the Conclusionin section 7.

Page 63: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE ROLE OF THE STOKES PROBLEM ... 49

Figure 1: Profile for normal flow through the permeable wall Γ.

2. Presentation

In our case, we consider a canister (Ω), filled with incompressible non-Newtonianfluid, immersed in fluid of the same kind. It is assumed that the wall of thecanister admits normal flow through it.

Figure 1 illustrates the situation where the curvature of the boundary Γ ofΩ is non negative.

Permeability of the walls of the container is described by assuming that atthe boundary Γ, the flow v has the direction of the normal (see Figure 1):

(1) γov(x, t) = −η(x, t)n(x).

The velocity component η is treated as an unknown and an evolution equationhas to be found for it.

The Frenet-Serret [11, 19, 18], formulae are used to model the dynamicboundary condition, and we ask the reader to familiarize himself with this mod-elling from [10] or [11].

Modelling of the situation, has led to the equations which are written asfollows [10]:

(2)

ρ1/2vt + ρ1/2(v · ∇)v + ρ−1/2∇p = ρ−1/2∇ ·T∗ in Ω∇ · v = 0 in Ωγov = −ηvn on Γ; v = 0 on Γ1

γo[A(v)] = −2ηvM on Γ

ρ1/2∂t(ρηv − α∆sηv) + ρ−1/2 γopδ = ρ−1/2µ∆sηv on Γ.

where ρ denotes the density of the fluid and δ the ”thickness of the boundary”and has a physical dimension of length. T∗ is the part of the stress tensor whichdepends only on velocity, that is

T∗ = µA + αDtA +α

2(AW −WA).

Page 64: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

50 R. MARITZ and J.M.W. MUNGANGA

In what follows, we assume that the constants µ and α are strictly positive.Please see [11] equation (2.16) for an explanation of the tensor M which onlydepends on the geometry of the surface Γ. M is defined by

(3) M := [K(n⊗ n)− κ1(τ1 ⊗ τ1)− κ2(τ2 ⊗ τ2)]

We have chosen τ1, τ2 and n so that τ1 ∧ τ2 = n. Apart from the smoothnessof Γ we make two additional assumptions regarding the shape of Ω, namely thatthe curvatures κ1, κ2 and K are constrained in the following way:

1. There exist constants g and G such that

(4) 0 < g ≤ K(x) ≤ G for all x ∈ Γ.

2. There exists a constant H such that

(5) 0 ≤ κ21 + κ22 ≤ H2 on Γ.

When considering dynamic boundary conditions where interaction betweenthe boundary and the fluid is taken into account, we need a modified projec-tion theorem for the same results. The projection we construct is designed tokeep the pair ⟨ρ

12v, ρ1/2η⟩ intact and at the same time eliminate the pressure

term ⟨ρ−1/2∇p, ρ−1/2γop⟩ [14]. The following: ⟨v, η⟩ ∈ L2(Ω) × L2(Γ) has theorthogonal (therefore, unique) decomposition

⟨v, η⟩ = ⟨ρ1/2w,−ρ1/2n · γow⟩+ ⟨ρ−1/2∇q, ρ−1/2γoq⟩∇ ·w = 0

with w ∈ Hk(Ω), q ∈ Hk+1(Ω), provided that v ∈ Hk(Ω) and η ∈ Hk−1/2(Γ).

The orthogonal projection associated with the term ⟨ρ1/2w,−ρ1/2γow · n⟩will be denoted by P .

3. Some spaces, operators and definitions

All spaces of vector fields are denoted by boldface letters. We define the spaceV(Ω) as

V(Ω) = v ∈ C∞(Ω) : ∇ · v = 0 in Ω, γov = −ηvn on Γ,

γo[A(v)] = −2ηvM on Γ, γov = 0 on Γ1.

Note that V(Ω) is a closed subspace of H2(Ω).

From now on, the notation γov will be used to denote the restriction of v toΓ and Γ1.

We define the following Hilbert spaces:

Xm = ClHm(Ω)(V(Ω)); Xom = v ∈ Xm : γov = 0, m = 1, 2, 3 . . . .

Page 65: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE ROLE OF THE STOKES PROBLEM ... 51

The inner products of the above spaces are the usual inner products defined forthe Sobolev space Hm(Ω).

The metric of a product space is defined in the usual way: For X and YHilbert spaces, the scalar product in X×Y is defined as

(⟨p,q⟩, ⟨r, s⟩)X×Y = (p, r)X + (q, s)Y .

The corresponding norm is then defined by

∥⟨p,q⟩∥2X×Y = ∥p∥2X + ∥q∥2Y .

We define the canonical operators Co and Cm in the following way:Let

Yo = L2(Ω)× L2(Γ), and Ym = Xm ×Hm− 12 (Γ).

The canonical operator Co : X1 → Yo := L2(Ω)× L2(Γ) is defined by

(6) Cov = ⟨ρ1/2v,−ρ1/2n · γov⟩ = ⟨ρ1/2v, ρ1/2ηv⟩.

According to the definition (6) above, we have

(7)(Cov,Cow)Yo := ρ(v,w)L2(Ω) + (ρ1/2ηv, ρ

1/2ηw)L2(Γ)

∥Cov∥2Yo := ρ∥v∥2L2(Ω) + ρ∥ηv∥2L2(Γ).

The canonical operator Cm : Xm → Ym (m ≥ 1) is defined by

(8) Cmv = ⟨ρ1/2v,−ρ1/2n · γov⟩ = ⟨ρ1/2v, ρ1/2ηv⟩.

With (7) in mind, the norm of Cmv in Ym is given by

∥Cmv∥2Ym = ρ∥v∥2Xm + ρ∥ηv∥2Hm−1/2(Γ).

In terms of the Trace Theorem, Co and Cm are continuous linear mappings.

Let I = [0, T ]. For Y , a Banach space with norm ∥ · ∥Y , and for 1 ≤ p <∞let

Lp(I;Y ) = v : t→ v(t) ∈ Y ; t ∈ I, v measurable, and

∫ T

o∥v(t)∥pY dt <∞.

and denote by Wm,p(I;Y ) the space of functions such that the distributionaltime derivatives of order up to and including m are in Lp(I;Y ). For p =∞, wedenote by L∞(I;Y ) the Banach space of measurable and essentially boundedfunctions defined on I with values in Y . The norms in W k,∞(I;Hm(Ω)) andin W k,∞(I;Hm−1/2(Γ)), k ≥ 0, are denoted by ∥ · ∥k,m,T and ∥ · ∥k,m−1/2,T,Γ,respectively. For k = 0, we write ∥ · ∥m,T and ∥ · ∥m−1/2,T,Γ.

The linear operator Bm : Xm+2 → Ym is defined by

Bmv := ⟨ρ−1/2(ρv − α∆v), δρ−1/2(ρηv − α∆sηv)⟩.

Page 66: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

52 R. MARITZ and J.M.W. MUNGANGA

Now for v ∈ Xm+2, we define

u1 = ρ−1/2(ρv − α∆v)

u2 = δρ−1/2(ρηv − α∆sηv)

u = ⟨u1, u2⟩ ∈ Ym,

so thatBmv = u.

We note that since Xm is embedded in X1 and Ym is embedded in Yo, Cmv =Cov, v ∈ Xm for m ≥ 1.

In motivation of what is to follow, we obtain a formal energy identity bytaking the scalar product in Yo of u = Bmv with Cmϕ. This identity holds forϕ, v ∈ Xm, m ≥ 1:

(u,Cmϕ)Yo = (Bmv,Coϕ)Yo

= (⟨ρ−1/2(ρv − α∆v), δρ−1/2(ρηv − α∆sηv)⟩, ⟨ρ1/2ϕ,−ρ1/2γoϕ · n⟩)Yo= ρ(v, ϕ)L2(Ω) − α(∆v, ϕ)L2(Ω) + δρ(ηv, ηϕ)L2(Γ) − δα(∆sηv, ηϕ)L2(Γ)..

But with γoϕ = −ηϕn and γoA(v)n = −2Kηvn, we have

−(∆v, ϕ)L2(Ω) = −(∇ ·A(v), ϕ)L2(Ω)

=1

2(A(v),A(ϕ))L2(Ω) − (γoA(v)n, γoϕ)L2(Γ)

=1

2(A(v),A(ϕ))L2(Ω) − (−2Kηvn,−ηϕn)L2(Γ)

=1

2(A(v),A(ϕ))L2(Ω) − 2(Kηv, ηϕ)L2(Γ).

Thus

(u,Coϕ)Yo = ρ(v, ϕ)L2(Ω) + δρ(ηv, ηϕ)L2(Γ) +α

2(A(v),A(ϕ))L2(Ω)

−2α(Kηv, ηϕ)L2(Γ) + δα(∇sηv,∇sηϕ)L2(Γ)

for any ϕ, v ∈ Xm; m ≥ 1.

For ϕ = v,

(u,Cov)Yo = ρ∥v∥2L2(Ω) +∥(δρ−2αK)ηv∥2L2(Γ) +α

2∥A(v)∥2L2(Ω) +α∥∇sηv∥2L2(Γ).

We define, accordingly, the bilinear form b1 by

b1(v, ϕ) = ρ(v, ϕ)L2(Ω) + ((δρ− 2αK)γov, γoϕ)L2(Γ) +α

2(A(v),A(ϕ))L2(Ω)

+ δα(∇sηv,∇sηϕ)L2(Γ) for v, ϕ ∈ X1.(9)

Page 67: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE ROLE OF THE STOKES PROBLEM ... 53

We assume that the parameter p2 ∈ (0, 1/2), as in [10], and that p2 = αKδρ .

We define the following two operators: the operator Nv by

(10) Nvu = ⟨(v · ∇)u1, 0⟩

with u1 = ρ−1/2(ρv − α∆v),and the pressure operator Π is defined by

(11) Πp = ⟨ρ−1/2∇p, ρ−1/2γop⟩.

According to [15] on Helmholtz projections, there exists a unique q ∈ Hk+1(Ω)and w ∈ Hk(Ω) such that

⟨v, ηv⟩ = Cow + Πq

if v ∈ H1(Ω), q ∈ H1/2(Γ), i.e. PCow = Cow, PΠq = 0.

4. The auxiliary problems

Let us write the equations of (2) in the form

(12)

∂t[ρ1/2v − αρ−1/2∆v

]+ (v · ∇)

[ρ1/2v − αρ−1/2∆v

]+ρ−1/2∇p = S(v) in Ω× (0, T )

v = 0 on Γ1 × (0, T )γ0v = −ηvn = −ηn on Γ× (0, T )γo[A(v)] = −2ηM on Γ× (0, T )

δ∂t(ρ1/2ηv − ρ−1/2α∆sηv) + ρ−1/2γ0p = s∗(η), on Γ

with

(13)S(v) = ρ−1/2[α2∇ · [A(v)W(v)−W(v)A(v)]+

α∇ · (∇vA(v)) + µ∆v]

s∗(η) = ρ−1/2δµ∆sηv

Note that we refer to γo[A(v)n] = −2Kηvn as the kinematic boundary

condition.Under the substitution

(14)ρ1/2v − αρ−1/2∆v = u1 in Ω

δ(ρ1/2ηv − ρ−1/2α∆sηv) = u2 on Γv ∈ Xm+2, m ≥ 1

the first and last equations of (12) become

(15)∂tu1 + (v · ∇)u1 + ρ−1/2∇p = S(v) in Ω

∂tu2 + ρ−1/2γop = s∗(η) on Γ.

Page 68: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

54 R. MARITZ and J.M.W. MUNGANGA

5. The stokes problem (SP)

The problem (14) with u1 and u2 given, leads to the Stokes Problem. Since vhas to be divergence-free, we shall write the system (14) as a Stokes-like system.To this end, we use the Helmholtz-decomposition [15] in the following form:

Theorem 1. Let u1 ∈ Hk(Ω) and u2 ∈ Hk−1/2(Γ); k ≥ 1. Then there existsq ∈ Hk+1(Ω) and w ∈ Hk(Ω), such that

u1 = ρ1/2w + ρ−1/2∇q in Ω

u2 = −ρ1/2n · γow + ρ−1/2γoq on Γ∇ ·w = 0 in Ω.

See [15] for proof of Theorem 1.The operator P : ⟨u1, u2⟩ ∈ L2(Ω) × L2(Γ) → ⟨ρ1/2w,−ρ1/2n · γow⟩ ∈

L2(Ω)× L2(Γ) is an orthogonal projection.

Remark 2. Note that for v ∈ Xm; m ≥ 1, PCmv = Cmv, (see (8)).

Indeed, we have the orthogonal decomposition

u = ⟨u1, u2⟩ = ⟨ρ1/2w,−ρ1/2γon ·w⟩+ ⟨ρ−1/2∇q, ρ−1/2γoq⟩= Cow + Πq.

From this result, we can rewrite (14) in the form

(16)

ρ1/2v − αρ−1/2∆v + ρ−1/2∇p = ρ1/2w in Ω× (0, T )∇ · v = 0 in Ω× (0, T )

γov = −ηvn on Γ× (0, T ); v = 0 on Γ1 × (0, T )

δ(ρ1/2ηv − ρ−1/2α∆sηv) + ρ−1/2γop = −ρ1/2n · γow on Γ× (0, T )γoA(v)n = −2ηvKn on Γ× (0, T )

(with p = −q), which is Stokes-like. We shall refer to (16) as the Stokes Problem(SP).

Note that the kinematical boundary condition is incorporated in the SP.According to the definition of the operators Cm, Bm and Π, (16) may also

be written in the form

Bmv + Πp = Cmw, v ∈ Xm+2, m ≥ 1.

Led by the discussion above, we show the existence and uniqueness for theSP:

Theorem 3. Let Γ be of class C∞, and suppose that p2 < 1/2. Let m ≥ 0 andlet there be given w ∈Wk,∞(I;Hm(Ω)) and γow · n ∈ W k,∞(I;Hm+1/2(Γ)).Then the problem (16) has a solution for which v is unique and ∇p is unique.v ∈Wk,∞(I;Xm+2), ηv ∈W k,∞(I;Hm+3/2(Γ)) and p ∈ Hm+1(Ω).

Page 69: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE ROLE OF THE STOKES PROBLEM ... 55

Proof. Consider the system (16) of equations

(17)

ρ1/2v − αρ−1/2∆v + ρ−1/2∇p = ρ1/2w in Ω× (0, T )

δρ−1/2(ρηv − α∆sηv) + ρ−1/2γop = −ρ1/2n · γow on Γ× (0, T )γov = −ηvn on Γ× (0, T )

γo[A(v)n] = −2ηvKn on Γ× (0, T ).

We prove first that (17) has a unique weak solution: We use the projection Pin [15] to eliminate p. If we formally take the L2(Ω)-inner product of the firsttwo equations of (17) with Coϕ, we obtain the weak formulation of the problem

(18) b1(v, ϕ) = ρ(w, ϕ) + ρ(n · γow, ηϕ)L2(Γ),

with b1 defined in (9).Since all the spaces Xm have a common dense subspace V(Ω), we define a

weak solution of (16) if v ∈ X1 such that (18) holds for all ϕ ∈ X1. The bilinearform b1, being equivalent to the metric in H1(Ω), is clearly positive definite onX1, and therefore, a unique weak solution exists.

Regularity results for the SP need to be investigated. A classical result isthat the solution u ∈ H1

o(Ω) for the Dirichlet problem −∆u + u = f belongsto Hm+2(Ω) whenever f ∈ Hm(Ω)(with Ω sufficiently smooth). The question iswhether similar results exist for the SP.

A priori estimates for the solution v of (17) is obtained in a propositionwith the use of Theorem 10.5 of [1] in the following way:

Proposition 4. Let Ω be an open bounded set in R3, with boundary Γ ∪ Γ1 ofclass Cm+3, m a non-negative integer. Suppose that v ∈ X2 is a weak solutionof the Stokes-like problem (16). If w ∈ Hm(Ω) and γow · n ∈ Hm−1/2(Γ), thenv ∈ Hm+2(Ω), and there exists a p ∈ Hm+1(Ω) and a constant Co(α, ρ,m,Ω)such that

(19) ∥v∥m+2 + ∥p∥m+1 ≤ Co∥w∥m + ∥γow · n∥Hm−1/2(Γ).

Proof. We write equation (16), after multiplying both sides with ρ1/2, in theform

(∆− ρα)v1 · · − 1

αp,1 = −ρ1/2

α (y1)1

· (∆− ρα)v2 · − 1

αp,2 = −ρ1/2

α (y1)2

· · (∆− ρα)v3 − 1

αp,3 = −ρ1/2

α (y1)3v1,1 +v2,2 +v3,3 = 0

Let v4 = − ρα and f = (−ρ1/2

α (y1)1,−ρ1/2

α (y1)2,−ρ1/2

α (y1)3, 0), to become

4∑j=1

ℓij(∂)vj(x) = fi(x) in Ω, i = 1, 2, 3, 4

Page 70: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

56 R. MARITZ and J.M.W. MUNGANGA

where ∂ = (∂1, ∂2, ∂3) and the matrix [ℓij(ξ)], ξ = (ξ1, ξ2, ξ3) ∈ R3, is given by

ℓij(ξ) = |ξ|2δij −ρ

α, |ξ|2 = ξ21 + ξ22 + ξ23 , i, j = 1, 2, 3,

ℓ4j(ξ) = −ℓj4(ξ) = ξj , j = 1, 2, 3,

ℓ4,4(ξ) = 0.

In accordance with the proof of Proposition 2.2 [16, p.34], we define two systemsof weights by s1 = s2 = s3 = 0, s4 = −1, and t1 = t2 = t3 = 2, t4 = 1. Thensi ≤ 0 and degree(ℓij(ξ)) ≤ si + tj , as required by [1, p.38]. The matrix [ℓ′ij(ξ)],where ℓ′ij(ξ) consists of the terms in ℓij(ξ) that are of order si + tj in ξ, isidentical to the corresponding matrix in [16]:

[ℓ′ij(ξ)] =

|ξ|2 0 0 −ξ10 |ξ|2 0 −ξ20 0 |ξ|2 −ξ3ξ1 ξ2 ξ3 0

It is easily shown that L(ξ) ≡ det[ℓ′ij(ξ)] = |ξ|6, so that L(ξ) = 0 for non-zeroreal ξ, that is (16) is elliptic. Moreover, the supplementary condition on Lis satisfied: L(ξ) is of even degree 6, and for every pair of linearly independentreal vectors ξ, ξ′, in particular for each point x on Γ, ξ is a tangent and ξ′ is anormal at x; the polynomial L(ξ + τξ′) in τ has exactly 3 roots with positiveimaginary part, namely τ+(ξ, ξ′) = i|ξ|/|ξ′|:

L(ξ + τξ′) = [(ξ + τξ′) · (ξ + τξ′3

= (|(ξ|2 + |ξ′2τ2))3

= |ξ|6(τ − i|ξ|/|ξ′6(τ + i|ξ|/|(ξ′6.

Now, concerning the boundary conditions, we set

γov1,3 + γov3,1 = 0

γov2,3 + γov3,2 = 0

α−∆s)v3 + γop = y2.

These boundary conditions can be expressed as

[Bhj(x, ξ)] =

ξ3 0 ξ1 00 ξ3 ξ2 00 0 ρ

α − ξ23 1

Page 71: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE ROLE OF THE STOKES PROBLEM ... 57

in other words

Bhj = ξ3δhj for h = 1, 2, 3 and j = 1, 2

Bh3 = ξh, for h = 1, 2,

Bh4 = 0, for h = 1, 2

B34 = 1

B33 =ρ

α− ξ23 .

Take r1 = r2 = −1, r3 = 0 and t1 = t2 = t3 = 2, then degree(Bhj) ≤ rh + tj and[B′hj ] = [Bhj ], where B′hj(x, ξ) consists of the terms in Bhj(x, ξ) that are of orderrh + tj in ξ.

[B′hj(x, ξ)] =

ξ3 0 ξ1 00 ξ3 ξ2 00 0 ξ23 0

Now it remains to check the complementing boundary condition: For an arbitraryx ∈ Γ, let n denote the outward unit normal vector at x, let ξ be any non-zero real tangent vector to Γ at x and define Ljk(·) ≡ ℓ′jk(·), j, k = 1, 2, 3, 4.

Then[B′hj(x, ξ + τn)Ljk(ξ + τn)] = τ [|ξ|2 + τ2] 0 ξ1[|ξ|2 + τ2] −2ξ1τ0 τ [|ξ|2 + τ2] ξ2[|ξ|2 + τ2] −2ξ2τ0 0 τ2[|ξ|2 + τ2] −τ3

.The rows of the latter matrix are required to be linearly independent moduloM+. Let τ+ = τ+(ξ,n) = i|ξ| and set M+ = (τ − τ+)3, and suppose thatC = (C1, C2, C3) is a constant vector with the property that, as polynomials in τ ,

3∑h=1

Ch(4∑j=1

B′hjLjk) ≡ 0 (mod M+), k = 1, 2, 3,

that is

C1τ(|ξ|2 + τ2) = 0

C2τ(|ξ|2 + τ2) = 0

C1ξ1(|ξ|2 + τ2) + C2ξ2(|ξ|2 + τ2) + C3τ2(|ξ|2 + τ2) = 0.

Now it is easy to verify that C = 0 and that the complementing condition holds.We then apply Theorem 10.5, on [1, p.78] in order to get the final result.

(For a similar application, see [7].)

Proposition 5. Let Γ∪Γ1 be of class C∞. Let k ≥ 0 and let w ∈Wk,∞(I;Hm(Ω))

and γow · n ∈ W k,∞(I;Hm−1/2(Γ)) be given. Then there exists a unique vec-tor field v ∈ Wk,∞(I;Xm+2) satisfying (17). Moreover, there is a constantC1 = C1(Ω,m,ρ,α) such that

∥v∥k,m+2,T ≤ C1∥w∥k,m,T + ∥γow · n∥Wk,∞(I;Hm−1/2(Γ)).

Page 72: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

58 R. MARITZ and J.M.W. MUNGANGA

Proof. By Proposition 4, it is only necessary to prove that v ∈ X2. This wasproven for the general Lp case by Miyakawa in [12].

This concludes the proof of Theorem 3.

Let the mapping f : Ym → Xm+2 be defined as

f : u→ w→ v∗ = f(u),

where v∗ ∈ Xm+2 is the unique solution of (16) for a given u ∈ Ym.

Theorem 6. f is a bounded linear operator.

Proof. The result follows from (19) and the fact that w is obtained from u bythe orthogonal projection P .

6. Conclusion

We modelled the flow of a second grade fluid in the region Ω which is emerged influid of the same kind. The interface of Ω is permeable and fluid flow is modelledthrough the boundary in the direction of the outer normal. The ultimate goalwould be to prove the existence of a weak and classical solution. In this article,the T P was modelled in terms of the SP, for which the existence of a uniquesolution was proved. This article lays the foundation for a existence proof.

The existence of a weak and/or classical solution of the T P can be provenand should roughly be based on the following algorithm:

1. With v given, at least one solution u = ⟨u1, u2⟩ of (15) under the initialcondition u(x, 0) := u0(x) must be found.

2. With each u = ⟨u1, u2⟩ in hand, a unique solution v∗ of (14) must befound.

3. It must be proved that the composite mapping

Φ : v −→g u −→f v∗

has a fixed point, which is a solution of (12).

The rough algorithm described above, should be developed in detail, aftersome refinement of the equations (14) and (15).

References

[1] S. Agmon, A. Douglis, L. Nirenberg, Estimates near the boundary for so-lutions of elliptic partial differential equations satisfying general boundaryconditions II, Commun. Pure Appl. Math., 17 (1964), 3592.

Page 73: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE ROLE OF THE STOKES PROBLEM ... 59

[2] Helge I. Andersson, Slip flow past a stretching surface, Acta Mech., 158(2002), 121125.

[3] P. D. Ariel, T. Hayat, S. Asghar, The flow of an elastico-viscous fluid pasta stretching sheet with partial slip, Acta Mech., 187 (2006), 2935.

[4] Anindita Bhattacharyya and G. P. Raja Sekhar, Stokes flow inside a porousspherical shell: Stress jump boundary condition, Zeitschrift fur Angew.Math. und Phys., 56 (2005), 475496.

[5] D. Cioranescu and V. Girault, Solutions variationnelles et classiques d’unefamille de fluides de grade deux, C.R. Acad. Sci. Paris, 322 (1996),11631168.

[6] G.P. Galdi, M. Grobbelaar-Van Dalsen, N. Sauer, Existence and Uniquenessof Classical Solutions of the Equations of a Second-Grade Fluid, Arch. Rat.Mech. Anal., 124 (1992), 221235.

[7] Christian Le Roux, Second Grade Fluids with Slip Boundary Conditions,PhD. thesis, University of Pretoria, 1997.

[8] O.D. Makinde and E. Osalusi, MHD steady flow in a channel with slip atthe permeable boundaries, Rom. Journ. Phys., 51 (2006), 319328.

[9] Chi Sing Man, Nonsteady channel flow of ice as a modified second-orderfluid with power-law viscosity, Arch. Ration. Mech. Anal., 119 (1992), 3557.

[10] Riette Maritz and Emile Franc Doungmo Goufo, Newtonian and Non-Newtonian Fluids through Permeable Boundaries, Math. Probl. Eng., 2014,114.

[11] Riette Maritz and Niko Sauer, On Boundary Permeation in Navier Stokesand Second Grade Incompressible Fluids, Math. Model. Methods Appl. Sci.,16 (2006), 5975.

[12] Tetsuro Miyakawa, The Lp approach to the Navier-Stokes equations withthe Neumann boundary condition, 10 (1980), 517537.

[13] A.P. Oskolkov, Solvability in the large of the first boundary-value problemfor a quasilinear third-order system pertaining to the motion of a viscousfluid, V.A. Steklova Akad. Nauk SSSR, 27 (1972), 145160.

[14] Niko Sauer, On Helmholtz Projections, In R. Salvi, editor, Navier-Stokesequations Theory Numer. methods, 257-263, Pitman-Longman, London,1998. Research Notes in Maths Series 338.

[15] Niko Sauer, Alna Van, and Der Merwe, Eigenvalue problems with the spec-tral parameter also in the boundary condition, Quaest. Math., 5 (1982),127.

Page 74: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

60 R. MARITZ and J.M.W. MUNGANGA

[16] Roger Temam, Navier-Stokes Equations, North-Holland Publishing Com-pany, Amsterdam, 2nd edition, 1977.

[17] C.Y. Wang, Flow due to a stretching boundary with partial slip an exactsolution of the Navier Stokes equations, 2002.

[18] C. E. Weatherburn, Differential Geometry of three dimensions, Vol II. Cam-bridge University Press, Cambridge, 1930.

[19] C.E. Weatherburn, Differential Geometry of three dimensions, Vol I. Cam-bridge University Press, Cambridge, 1931.

Accepted: 15.11.2016

Page 75: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (61–67) 61

SOLITON SOLUTIONS FOR NON-LINEAR DISPERSIVEWAVE EQUATIONS WITH VARIABLE-COEFFICIENTS

Ibraheem Abu-FalahahDepartment of Mathematics

Hashemite University

Zarqa 13115

Jordan

[email protected]

Abstract. In this paper, we study the solitary wave solution for the variable-coefficientnon-linear dispersive wave equation. We develop a simplified bilinear method to con-struct the multi-soliton solutions for such an equation. We prove that the proposedscheme is effective and easy to implement. Finally, effects of the inhomogeneities ofmedia on the soliton behavior are discussed with the aid of the characteristic curvemethod and graphical analysis.

Keywords: dispersive wave equations, multiple soliton solution, hirota bilinear method.

Introduction

Nowadays, attention has been focused on soliton equations due to its scien-tific applications. There has been growing interest in studying the variable-coefficient nonlinear evolution equations (NLEEs), which are often consideredto be more realistic than their constant-coefficient counterparts in modeling avariety of complex nonlinear phenomena under different physical backgrounds.Since those variable-coefficient NLEEs are of practical importance, it is meaning-ful to construct various exact analytic solutions, including the soliton solutionsand study the integrable properties. However, the inverse scattering transform[1], the Hirota direct method [6, 7], Backlund transformation method [12], andthe Darboux transformations method [10] are applied for the soliton solutionsto NLEEs.

For describing the propagation of solitonic waves in inhomogeneous media,the variable-coefficient non-linear dispersive wave equation

(0.1) ut + α(t)ux + β(t)uux + γ(t)uxxx = 0

where α(t), β(t) and γ(t) are time-dependent functions, has been derived frommany physical applications in plasma physics, fluid dynamics and other fields[9, 11, 13].

Obviously, equation (0.1) contains quite a number of variable-coefficientmodels arising from various branches of physics. A currently important ex-ample of which can be seen in [3]. The forced variable-coefficient KdV equation,

Page 76: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

62 IBRAHEEM ABU-FALAHAH

which has the relevant physical applications not only in the internal solitarywaves dynamics [3], but also in the arterial mechanics [11, 13]. For instance, in[11], the forced variable-coefficient KdV equation has been derived by means ofthe reductive perturbation as studying the propagation of the weakly nonlinearwaves in a composite medium, in which the arteries and blood are treated as theprestressed thin walled elastic tubes with a stenosis and the Newtonian fluid,respectively.

In this paper, by virtue of a newly developed simplified bilinear method, wewould like to study equation (0.1) and devote ourselves to its soliton solutionsand some important properties under nonlinearly dependent constraints amongthe variable coefficients.

The structure of the present paper is as follows. In section 1, with certaincoefficient conditions, we will construct the analytic one- and two-soliton solu-tions for equation (0.1) by employing the variable-coefficient simplified bilinearmethod [2, 8] and Hirota method [6, 7]. Moreover, new singular soliton solutionswill be constructed. Section 2 will analyze the effects of the coefficient functionson the stabilities and propagation characteristics of the solitonic waves throughfigure drawing. Section 3 will offer the conclusion.

1. Solitary wave solutions for equation (0.1)

It is well known that the Hirota method is an important analytic tool for deal-ing with NLEEs and relevant soliton problems [7]. Through bilinearization fora given NLEE, one can not only construct its multi-soliton solutions, but alsoderive the bilinear auto-Backlund transformation, nonlinear superposition for-mula, Lax pair and some other remarkable properties.

In this method, a given nonlinear equation is rewritten into the bilinearequation by the dependent variable transformation to enable us deriving theauxiliary function. But it is not easy for us to find such a transformation formany equations. However, Hereman et al. [4, 5], introduced a simplified algo-rithm to derive the auxiliary functions without using the bilinear forms; insteadit assumes that the N -soliton solutions can be expressed as polynomials of ex-ponential functions. The authors in [2] modified Hereman’s simplified methodto be able to solve variable-coefficient NLEEs. In the rest of this section, wewill employ the method in [2, 8] to obtain multiple soliton solutions for equation(0.1).

1.1 Analytic one-soliton solution

Taking as our ansatz the plane wave solution

(1.1) u(x, t) = ekix−ωi(t).

Page 77: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOLITON SOLUTIONS FOR NON-LINEAR DISPERSIVE WAVE EQUATIONS ... 63

Substituting (1.1) into the linear terms of (0.1), we get the following non-lineardispersion relation

(1.2) ωi(t) = ϕi(t) = k2i

∫γ(t)dt.

and as a result we obtain the following phase variables

(1.3) θi = kix−∫ [

k3i γ(t) + kiα(t)]dt, i = 1, 2, . . . .

Our practice with the perturbation method suggests that making the substitu-tion

(1.4) u(x, t) = R (ln f)xx

in (0.1) to obtain a bilinear form may be a fruitful undertaking.

To find the one-soliton solution, take

(1.5) f(x, t) = 1 + εek1x−ω1(t),

where ε = ±1. Substituting (1.4) and (??) into equation (0.1) and solving forR we find

R = 12γ(t)

β(t)

with the constraint on coefficients

γ(t) = λβ(t).

Here λ = 0 is an arbitrary constant. That is to say, the one-soliton solution ofequation (0.1) under condition (1.5) is derived as

(1.6) u(x, t) = 12λεk21eθ1

(1 + εeθ1)2 .

Upon using ε = 1 we obtain the one-soliton solution

u(x, t) = 3λk21 sech2(θ12

),

which can be seen as the bell-shaped profile, while ε = −1 leads to the singularone-soliton solution

u(x, t) = 3λk21 csch2(θ12

),

which gives a profile of an explosive pulse.

Page 78: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

64 IBRAHEEM ABU-FALAHAH

1.2 Multiple soliton solutions

To generate the two-soliton solution, we expand the function f as

(1.7) f(x, t) = 1 + ε1eθ1 + ε2e

θ2 + ε1ε2a12eθ1+θ2 ,

where ε = ±1 and θi are given by (1.4).

Upon substituting (1.7) and (1.4), into equation (0.1) and solving for thephase shift we obtain

a12 =(k1 − k2)2

(k1 + k2)2

and hence we can generalize for other phase shifts by

(1.8) aij =(ki − kj)2

(ki + kj)2 , 1 ≤ i < j ≤ 3.

In this case, the two-soliton solution of equation (0.1) subject to condition (1.5)and using ε1 = ϵ2 = 1 is found to be

(1.9) u(x, t) = 12γF (θ1, θ2)

G(θ1, θ2)

where

F (θ1, θ2) = k21eθ1(

1 + a12e2θ2)

+ k22eθ2(

1 + a12e2θ1)

+[(k1 − k2)2 + a12 (k1 + k2)

2]eθ1+θ2 ,

G(θ1, θ2) =(

1 + eθ1 + eθ2 + a12eθ1+θ2

)2,

where θ1 and θ2 are defined in (1.3). It is noted that solution (1.9) representsthe interaction of two solitonic waves. On the other hand, using ε1 = ϵ2 = −1in (1.7), gives the singular two-soliton solution

u(x, t) = −12γH(θ1, θ2)

I(θ1, θ2),

where

H(θ1, θ2) = k21eθ1(

1 + a12e2θ2)

+ k22eθ2(

1 + a12e2θ1)

−[(k1 − k2)2 + a12 (k1 + k2)

2]eθ1+θ2

and

I(θ1, θ2) =(

1− eθ1 − eθ2 + a12eθ1+θ2

)2.

Page 79: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOLITON SOLUTIONS FOR NON-LINEAR DISPERSIVE WAVE EQUATIONS ... 65

For the three kink solutions, we set the auxiliary function

f(x, t) = 1 + ε1eθ1 + ε2e

θ2 + ε3eθ3 + ε1ε2a12e

θ1+θ2 + ε1ε3a13eθ1+θ3

+ ε2ε3a23eθ2+θ3 + ε1ε2ε3a123e

θ1+θ2+θ3 ,(1.10)

where εi = ±1, i = 1, 2, 3, and θi are given by (1.3). Substituting (1.10) and(1.4) into equation (0.1), we find that

a123 = a12a13a23.

This shows that equation (0.1) has N -soliton solution which can be obtainedfor finite N , where N > 1. Proceeding as before, the three-soliton solutionsand the singular three-soliton solutions can be obtained using calculations withMathematica.

1.3 Propagation characteristics of the soliton solutions

From the one-soliton solution (1.6), it is obvious that the amplitude of the front is3λk2i which keeps invariant during the propagation. Following the characteristic-line method [14], the characteristic curve for each solitary solution can be definedby

x−∫ [

k2i γ(t) + α(t)]dt = 0, i = 1, 2, . . . ,

which can be derived from relations (1.2) and (1.3). Correspondingly, the ve-locity of the front at time t can be expressed as

(1.11) νx = k2i γ(t) + α(t).

From the explicit expression (1.11), we can see that the functions α(t) andγ(t) affect the propagation velocity of the solitonic fronts significantly. Forexample, taking γ(t) = sin t and α(t) = 0, solution (1.6) becomes

(1.12) u(x, t) = 6 sech2(x+ cos t

2

),

which has the non-zero boundary value 0 as t, x→∞. Its velocity along the xdirection is given by

νx = sin t

and during one periodic time from 0 to 2π, the solitonic wave moves along thepositive x direction when t ∈ (0, π) and along the negative x direction whent ∈ (π, 2π). Moreover, the wave accelerates in the intervals (0, π/2)∪ (3π/2, 2π)while decelerates in the interval (π/2, 3π/2).

The characteristic curve in Fig. 1 can be expressed by

x+ cos t = 0.

Page 80: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

66 IBRAHEEM ABU-FALAHAH

The profile figure for solution (1.6) in an inhomogeneous medium in the x − tplane with: α(t) = 0, γ(t) = sint, k1 = 1. As a result, the front revealsthe snake-like type propagation trajectory with the unalterable amplitude butcontinuously changeable velocity.

In Fig 2, the characteristic curve is given in the form

x+ 2 cos t− t3

3= 0.

When t approaches zero, i.e. cos t >> t3, the trajectory is snake-like typewith periodic oscillation. Otherwise, when t is far from the origin, the trajectoryis t3-like type one. From which we conclude that, besides the periodic oscillationof the solitons in the local region, the large scale propagation trajectories forsuch a structure are the t3-typed curves. Likewise, if the variable coefficients aretaken as the other forms, the corresponding characteristic curves will presentdifferent characters.

The profile figure for solution (1.6) in an inhomogeneous medium in the x−tplane with: α(t) = t2, γ(t) = sint, λ = 2, k1 = 1.

2. Conclusions

In the present work, we have studied the variable-coefficient non-linear dispersivewave equation (0.1) from the soliton analysis point of view. Of physical interest,we have specially presented the multiple soliton solutions and multiple singularsoliton solutions for equation (0.1). Through the figures for some sample solu-tions, we have discussed the structures of solitonic waves with inhomogeneitiesof media and nonuniformities of boundaries effects.

Further work for this class of equations is possible to be performed, for exam-ple, one can extend the present results to the corresponding three-dimensionalvariable-coefficient evolution equations.

References

[1] M.J. Ablowitz and H. Segur, Soliton and the inverse scattering transform,SIAM, Philadelphia, 1981.

[2] F. Awawdeh, H.M. Jaradat and S. Al-Shara , Applications of a simplifiedbilinear method to ion-acoustic solitary waves in plasma, Eur. Phys. J. D.,vol. 66, (2012.

[3] R.H. Grimshaw, E. Pelinovsky and T. Talipova, Modelling internal solitarywaves in the coastal ocean. Surv. Geophys., vol. 28, 2007.

[4] W. Hereman and A. Nuseir, Symbolic methods to construct exact solutionsof nonlinear partial differential equations, Math. Comput. Simul., vol. 43,pp. 13-27, 1997.

Page 81: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOLITON SOLUTIONS FOR NON-LINEAR DISPERSIVE WAVE EQUATIONS ... 67

[5] W. Hereman and W. Zhuang, Symbolic computation of solitons with Mac-syma, Comput. Appl. Math. II: Differen. Equat., pp. 287-296, 1992.

[6] R. Hirota, Direct methods in soliton theory, in: R.K. Bullough, P.J. Cau-drey (Eds.), Solitons, Springer, Berlin, 1980.

[7] R. Hirota, The direct method in soliton theory, Cambridge University Press,Cambridge, 2004.

[8] H.M. Jaradat, S. Al-Shara, F. Awawdeh and M. Alquran, Variable coeffi-cient equations of the Kadomtsev-Petviashvili hierarchy: multiple solitonsolutions and singular multiple soliton solutions, Phys. Scr., vol. 85, 2012.

[9] Y. Liu, Y.T. Gao, Z.Y. Sun, and X. Yu, Multi-soliton solutions of theforced variable-coefficient extended Korteweg-de Vries equation arisen influid dynamics of internal solitary waves, Nonlinear Dyn., vol. 66, pp. 575-587, 2011.

[10] V.B. Matveev and M.A. Salle, Darboux transformations and solitons.Berlin, Heidelberg: Springer-Verlag; 1991.

[11] J.W. Miles, On internal solitary waves II. Tellus, vol. 33, pp. 397, 1981.

[12] C. Rogers and W.K. Schief, Backlund and Darboux transformations, Cam-bridge University Press, 2002.

[13] B. Tian, G.M. Wei, C.Y. Zhang, W.R. Shan and Y.T.Gao, Transforma-tions for a generalized variable-coefficient Korteweg-de Vries model fromblood vessels, Bose-Einstein condensates, rods and positons with symboliccomputation, Phys. Lett. A., vol. 356, pp. 8, 2006.

[14] A. Veksler and Y. Zarmi, Wave interactions and the analysis of the per-turbed Burgers equation, Physica D, vol. 211, pp. 57-73, 2005.

Accepted: 22.11.2016

Page 82: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (68–81) 68

A DISSIPATIVE HYPERBOLIC SYSTEMS APPROACH TOIMAGE RESTORATION

Junling SunSchool of Information EngineeringWuHan University of TechnologyWuhan, 430070People’s Republic of China

Jie Yang∗

School of Information EngineeringWuHan University of TechnologyWuhan, 430070People’s Republic of [email protected]

Lei SunSchool of Mathematics and Information Science

Henan University of Polytechnic

Jiaozuo, Henan 454003

People’s Republic of China

Abstract. We present here a new dissipative hyperbolic systems to image restoration.The existence of global dissipative solutions of this system under the Dirichlet boundaryconditions and initial condition is shown. To this end, an experimental results areprovided to show the efficiency of this kind of model.

Keywords: image restoration, wave equation, dissipative solution.

1. Introduction

In this paper, we consider the following dissipative hyperbolic systems

∂2u

∂t2+∂u

∂t− div(g(|∇Gρ ∗ u|)∇u) = 0,(1.1)

∂2v

∂t2+∂v

∂t− λ div(∇v)− (1− λ)(|∇u| − v) = 0,(1.2)

subject to the initial condition and Dirichlet boundary conditions

u(x, 0) = u0(x), v(x, 0) = v0(x),∂u

∂t(x, 0) = 0,

∂v

∂t(x, 0) = 0 x ∈ Ω(1.3)

∂u

∂n|∂Ω = 0,

∂v

∂n|∂Ω = 0 0 < t < T,(1.4)

∗. Corresponding author

Page 83: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A DISSIPATIVE HYPERBOLIC SYSTEMS APPROACH TO IMAGE RESTORATION 69

where Ω is a bounded domain of Rn with appropriately smooth boundary, n isthe unit outer normal to Ω, T > 0 and λ > 0. The nonlinear term g(s),

g(s) =1

1 + ( sK )2, or g(s) = |s|−1(1.5)

with K > 0.Here u = u(t, x) denotes the original image describing a real scene, u0(x)

denotes the observed image, Gρ(x) is the Gaussian kernel

Gρ(x) =1

(4πρ)M2

e−|x|24ρ ,

and

|∇Gρ ∗ u| = [

M∑i=1

(∂Gρ∂xi∗ u)2]

12 .

Partial differential equations based image restoration is a powful methodto deal with the trade-off between noise removal and edge preservation. Thismethod is now a well researched area within the image processing community.One of powerful models is the following nonlinear parabolic model with variablecoefficient

∂u

∂t− div(c(x, y)∇u) = 0,

where the degree of denoising and preservation of singularities can be deter-mined by changing c(x, y). There exist other type parabolic equation, suchas anisotropic diffusion models [1, 18], complex diffusion models [13], fourthorder equation models [7, 20], total variation models [9, 14, 24]. In Perona-Malik [18] the denoising capabilities of the linear diffusion can be better, letc(x, y) = g(|∇u|) and initial data u(0) = u0. Here the diffusion smooth func-tion g : [0,∞) −→ [0,∞) is important in controlling the smoothing and evenenhancement of edges. They mainly considered the following two diffusion func-tions

g(s) =1

1 + ( sK )2, or g(s) = e−( s

K)2 with K > 0.

Catte et al. [3] first introduced a new modification and proved its wellposednessto make the gradient computation robust outliers and provide a smooth edgemap for the diffusion operator. This makes the Perona-Malik type PDE better.

∂u

∂t− div(g(|Gσ ⋆∇u|))∇u) = 0,

where

Gσ(x) = (2πσ)−1e−|x|22σ

Page 84: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

70 JUNLING SUN, JIE YANG and LEI SUN

is the Gaussian kernel and the operation means convolution.

A coupled parabolic equations was introduced to create better edge maps(see [5, 6]), which has the following form:

∂u

∂t− div(g(v)∇u) = 0,

∂v

∂t−v = 0.

In order to localizing denoising effects in the diffusion process based scheme,Nitzberg and Shiota [17] introduced the following relaxation model:

∂u

∂t− div(g(v)∇u) = 0,

∂v

∂t− λGσ ⋆ |∇u|2 − λv = 0,

where λ > 0 is the relaxation parameter.

Surya Prasath and Vorotnikov [19] improved the above model and providedsome new modifications. One of them has caught our attention, as follows:

∂u

∂t− div(g(v)∇u) = 0,

∂v

∂t− λdiv(∇v)− (1− λ)(|∇u| − v) = 0,

where g(s) = 11+( s

K)2

(Perona-Malik type diffusion function) or g(s) = |s|−1

(total variation diffusion function). 0 ≤ λ ≤ 1 is a balancing parameter. Thefirst equation is usually used in the Perona-Malik type PDEs. In their discussion,above model is in favor of preservation of edges. However, when the noise isvery large, the preservation of edges will be unstable, which is similar to that ofthe Perona-Malik model.

Another of powerful models is the following nonlinear hyperbolic model withvariable coefficient

∂2u

∂t2− div(c(x, y)∇u) = 0,

where the degree of denoising and preservation of singularities can be determinedby changing c(x, y). Ratner and Zeevi [21] introduced a new telegraph-diffusionmodel

∂2u

∂t2+ λ

∂u

∂t− div(c(x, y)∇u) = 0

to discribe the contraction and fluctuation of the image create denoising andedge preserving effect. This model is based on viewing the image as an elasticsheet.

Page 85: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A DISSIPATIVE HYPERBOLIC SYSTEMS APPROACH TO IMAGE RESTORATION 71

Inspired by the work of [19, 21], we consider a coupled hyperbolic systems(1.1)-(1.2) as a method based on viewing the image as an elastic sheet to improvethe quality of the detected edges. As we known, most of these schemes use theabsolute value of the gradient image as a guiding road map in the diffusionprocess to restore noisy images. One can see [2, 3, 4, 8, 12, 16, 23] for moredetails.

This paper is organized as follows. In section 2 we study the existence anduniqueness of solutions of the problem (1.1)-(1.5). In section 3 we give somenumerical experiments.

2. Existence of dissipative solutions and weak solutions

In this section, we establish the existence, uniqueness, regularity of dissipativesolutions to the problem (1.1)-(1.5) following the arguments in [19]. Recallthat the standard notations used throughout the paper. Let Lp(Ω), Wm

p (Ω)and Hm(Ω) for the Lebesgue and Sobolev spaces. We will keep the functionspace symbol and omit Ω. The Euclidean norm in finite-dimensional spaces isdenoted by | · |. The symbol ∥ · ∥ will stand for the Euclidean norm in L2(Ω).The corresponding scalar products is denoted by a · and parentheses (·, ·). LetH1

0 (Ω) be the closure of the smooth set, and it is compactly supported in Ω .By virtue of Friedrichs inequality, the Euclidean norm ∥ · ∥1 corresponding tothe scalar product (u, v)1 = (∇u,∇v) is a norm in H1

0 . Then there are standardSobolev inequality

The usual Sobolev inequality

∥u∥L∞ ≤ C(Ω)∥u∥2, ∀u ∈ V2,

and the Ladyzhenskaya inequality

∥u2∥ ≤√

2∥u∥∥∇u∥, ∀u ∈ H10 .

Let Vr be the closure of V2 in W 1r with 1 < r < 2, where V2 = H1

0 (Ω)∩H2(Ω)is a Hilbert space with the scalar product

(u, v)2 = (u, v)1 +∑|α|=2

(Dαu,Dαv).

We will consider our problem in the following space

W1 = W1(Ω, T ) = u ∈ L2(0, T ;V2), u′ ∈ L2(0, T ;V ∗

2 )

with the norm

∥u∥W1 = ∥u∥L2(0,T ;V2) + ∥u′∥L2(0,T ;V ∗2 ),

and

W2 = W2(Ω, T ) = u ∈ L2(0, T ;H10 ), u′ ∈ L2(0, T ;H−1)

Page 86: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

72 JUNLING SUN, JIE YANG and LEI SUN

with the norm

∥u∥W2 = ∥u∥L2(0,T ;H10 )

+ ∥u′∥L2(0,T ;H−1).

We also need the following class of pairs of functions

R = L4,loc(0,∞;V2) ∩ L∞(0,∞;W 1∞) ∩W 1

4,loc(0,∞;L2)× L2,loc(0,∞;V2)

∩L∞(0,∞;L∞) ∩W 12,loc(0,∞;L2).

Define

E1(u, v, ν) = −∂2u

∂t2− ∂u

∂t− ν div(g(|∇Gρ ∗ u|)∇u),

E2(u, v, ν) = −∂2v

∂t2− ∂v

∂t+ λdiv(∇v) + ν(1− λ)(|∇u| − v) + (1− δ)(∇v,∇λ),

E1(u, v) = E1(u, v, 1),

E2(u, v) = E2(u, v, 1),

where ν is a positive constant and ∀(u, v) ∈ R.

Definition 2.1. A pair of functions (u, v) ∈ Cw([0,∞);L2) is called a dissi-pative solutions of the problem (1.1)-(1.2), if ∀ test functions (ψ, ϕ) ∈ R, onehas

γ∥u(t)∥2[∥u(t)− ψ(t)∥2 + ∥u′(t)− ψ′(t)∥2 + ∥v(t)− ϕ(t)∥2 + ∥v′(t)− ϕ′(t)∥2]

≤ γ2t+∥u0∥2∥u(0)− ψ(0)∥2 + ∥u′(0)− ψ′(0)∥2 + ∥v(0)− ϕ(0)∥2

+ ∥v′(0)− ϕ′(0)∥2 +

∫ t

02γ−s|(E1(ψ, ϕ)(s), u(s)− ψ(s))

+ (E2(ψ, ϕ)(s), v(s)− ϕ(s))|,

where u′(t) = dudt , v

′(t) = dvdt , u0, v0, v

′0 ∈ L2(Ω) and γ > 1 is a certain function

of Ω, g, λ, ψ and ϕ.

Definition 2.2. A pair of functions (u, v) ∈W1×W2 is called a weak solutionsof the problem (1.1)-(1.2), if ∀ test functions (ψ, ϕ) ∈ V2 ×H1

0 ,

d

dt(u′, ψ′) +

d

dt(u, ψ) + ϵ(u, ψ)2 + ν(g(|∇Gρ ∗ u|)∇u,∇ψ) = 0,(2.1)

d

dt(v′, ϕ′) +

d

dt(v, ϕ) + λ(∇v,∇ϕ) + ν(∇v, ϕ∇ν)

− ν(1− λ)(|∇u| − v, ϕ) = 0(2.2)

holds almot everywhere in (0, T ).

Now we state our main result.

Page 87: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A DISSIPATIVE HYPERBOLIC SYSTEMS APPROACH TO IMAGE RESTORATION 73

Theorem 2.3. The problem (1.1)-(1.2) with conditions (1.3)-(1.4) admits adissipative solution (u, v) ∈ H1(0,∞;H1

0 ) × H1(0,∞;H10 ) with the initial data

u0, u′0, v0, v

′0 ∈ L2 and 0 < ϵ < 1

3 . Moreover, if there exists a strong solution(uT , vT ) of problem (1.1)-(1.2), then the restriction of any dissipative solutionto (0, T ) coincides with (uT , vT ) (T > 0). Every strong solution (u, v) ∈ R is aunique dissipative solution.

To prove our main result, we introduce the following auxiliary problem

∂2u

∂t2+∂u

∂t= ν div(g(|∇Gρ ∗ u|)∇u),(2.3)

∂2v

∂t2+∂v

∂t− λ div(∇v) = ν(1− λ)(|∇u| − v) + (1− δ)(∇v,∇λ),(2.4)

with the condition

u(x, 0) = νu0(x), u′(x, 0) = νu′0(x) v(x, 0) = νv0(x),

v′(x, 0) = νv′0(x), x ∈ Ω,(2.5)

∂u

∂n|∂Ω = 0,

∂v

∂n|∂Ω = 0, 0 < t < T.(2.6)

Lemma 2.4. Let (u0, v0, u′o, v

′0) ∈ L2 × L2 and T be positive constant. Then

the problem (2.3)-(2.4) admits a weak solution with ν = 1.

Proof. We define the operators A and B from W1 × W2 to L2(0, T ;V ∗2 ) ×

H1(0, T ;H−1)× L2 × L2 × L2 by

(A(u, v), (ψ, ϕ)) = (d

dt(u′, ψ′) +

d

dt(u, ψ) + ϵ(u, ψ)2,

d

dt(v′, ϕ′) +

d

dt(v, ϕ)

+ (λ∇v,∇ϕ), u|t=0, v|t=0, v′|t=0),

(B(u, v), (ψ, ϕ)) = (−(g(|∇Gρ ∗ u|)∇u,∇ψ),−(c(x)∇v, ϕ∇λ)

+ (1− λ)(|∇u| − v, ϕ), u0, v0),

where (ψ, ϕ) ∈ H10 ×H1

0 is a pair of test function.

Then we can rewrite the problem (2.3)-(2.4) as weak statement

A(u, v) = νB(u, v).(2.7)

Note that B is continuous and compact, W1 ⊂ Lp(0, T ;W 1p ) is compact for some

p > 2 and W2 ⊂ Lp(0, T ;L12) (see [22]). If

(un, vn) −→ (u0, v0), weakly in W1 ×W2,

then we have

(un, vn) −→ (u0, v0), strongly in H1(0, T ;L2)×H1(0, T ;L2).

Page 88: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

74 JUNLING SUN, JIE YANG and LEI SUN

By Krasnoselskii’s theorem ([15]), we have

g(vn) −→ g(v0), in Lp(0, T ;Lq) ∀q < +∞.

So there holds

g(|∇Gρ ∗ un|)∇un −→ g(|∇Gρ ∗ u0|)∇u0, in Lp(0, T ;L2).

Since the linear operator A is continuous and invertible (see [19]), we can rewrite(2.7) as

(u, v) = νA−1B(u, v) in W1 ×W2.(2.8)

Now we derive the following estimate.

γ∥u(t)∥2[∥u(t)− ψ(t)∥2 + ∥u′(t)− ψ′(t)∥2

+ ∥v(t)− ϕ(t)∥2 + ∥v′(t)− ϕ′(t)∥2

+ 2ϵ

∫ t

0∥u(s)− ψ(s)∥22ds+ λ0

∫ t

0∥v(s)− ϕ(s)∥21ds]

≤ γ2t+ν∥u0∥2∥νu(0)− ψ(0)∥2 + ∥νu′(0)− ψ′(0)∥2(2.9)

+ ∥νv(0)− ϕ(0)∥2 + ∥νv′(0)− ϕ′(0)∥2

+

∫ t

02γ−s|(E1(ψ, ϕ, ν)(s), u(s)− ψ(s))

+ (E2(ψ, ϕ, ν)(s), v(s)− ϕ(s))− ϵ(ψ(s), u(s)− ψ(s))2|ds,

where γ > 1 is a certain function of Ω, g, λ, µ, ψ and ϕ.

To prove above estimate, we need to carry out energy estimate. Let ψ(t) =u(t) and ϕ(t) = v(t) in (2.1)-(2.2), respectively, and we have

d

dt(u′, u′) +

1

2

d

dt(u, u) + ϵ(u, u)2 + ν(g(|∇Gρ ∗ u|)∇u,∇u) = 0,(2.10)

d

dt(v′, v′) +

1

2

d

dt(v, v) + λ(∇v,∇v) + ν(∇v, v∇ν)

− ν(1− λ)(|∇u| − v, v) = 0.(2.11)

Summing up (2.12)-(2.13) and integrating over (0, t), we get

1

2(∥u∥2 + ∥u′∥2 + ∥v∥2 + ∥v′∥2) +

∫ t

0ν(g(|∇Gρ ∗ u|)∇u,∇u)ds

+

∫ t

0λ(∇v,∇v) + ν(∇v, v∇ν)− ν(1− λ)(|∇u| − v, v)ds

≤ ν

2(∥u0∥2 + ∥u′0∥2 + ∥v0∥2 + ∥v′0∥2).(2.12)

Page 89: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A DISSIPATIVE HYPERBOLIC SYSTEMS APPROACH TO IMAGE RESTORATION 75

On the other hand, ∀(η, θ) test function in H10 ×H1

0 , we have

d

dt(ψ′, η′) +

d

dt(ψ, η) + ν(g(|∇Gρ ∗ u|)∇u,∇η)

+ (E1(ψ, ϕ, ν), η) + ϵ(ψ, η)2 = ϵ(ψ, η),(2.13)

d

dt(ϕ′, θ′) +

dt

dt(ϕ, θ) + (λ∇ϕ, θ) + ν(∇ϕ, θ∇λ)

− ν(1− λ)(|∇ψ| − ϕ, θ) + (E2(ψ, ϕ, λ), θ) = 0.(2.14)

Let η = u − ψ and θ = v − ϕ. Summing up (2.13)-(2.14) and noticing (2.12)-(2.13), we get

1

2

d

dt((η, η) + (θ, θ) + (η′, η′) + (θ′, θ′)) + ν(g(|∇Gρ ∗ v|)∇η,∇η)

+ ϵ(η, η)2 + (λ∇θ,∇θ) + ν((1− λ)θ, θ)

= −ν([g(|∇Gρ ∗ v|)− g(|∇Gρ ∗ ϕ|)]∇θ,∇η)

+ ν(1− λ)(|∇u| − |∇θ|, θ)− ν(∇θ, θ∇λ)

+ (E1(ψ, ϕ, ν), η) + (E2(ψ, ϕ, λ), θ)− ϵ(η, θ)2.(2.15)

It is easy to derive that

−ν([g(|∇Gρ ∗ v|)− g(|∇Gρ ∗ ϕ|)]∇θ,∇η) + ν(1− λ)(|∇u| − |∇θ|, θ)≤ C(ψ, g)ν(|v − ϕ|, |∇η|)

≤ ∥√νg(|∇Gρ ∗ v|)∇η∥2 + C(ψ, ϕ, g)∥θ∥2

+ C(ψ, g)(θ2,√νg(|∇Gρ ∗ v|)|∇u|),(2.16)

and

−ν(∇θ, θ∇λ) ≤ λ04∥θ∥21 + C(λ)∥θ∥2.(2.17)

Thus, applying (2.16)-(2.17) to (2.15), we derive

1

2

d

dt((η, η) + (η′, η′) + (θ, θ) + (θ′, θ′)) + ϵ(η, η)2 +

3λ04µ−1∥θ∥21

≤ C(θ, ϕ, λ, g)(θ2, 1 +√νg(|∇Gρ ∗ v|)|∇u|)

+ (E1(ψ, ϕ, ν), η) + (E2(ψ, ϕ, λ), θ)− ϵ(η, θ)2.(2.18)

Denote Φ(t) = ∥1 +√νg(|∇Gρ ∗ v|)|∇u|∥. Then it follows from (2.18) that

1

2

d

dt(∥η∥2 + ∥θ∥2 + ∥θ′∥2) + 2ϵ∥η∥22 + λ0µ

−1∥∇θ∥2

≤ C(θ, ϕ, λ, g)Φ2∥θ∥2 + 2(E1(ψ, ϕ, ν), η) + 2(E2(ψ, ϕ, λ), θ)

−2ϵ(η, θ)2.(2.19)

Page 90: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

76 JUNLING SUN, JIE YANG and LEI SUN

By (2.13), we have

t|Ω| ≤∫ t

0Φ2(s)ds ≤ 2t|Ω|+ ν∥u0∥2 − ∥u(t)∥2.(2.20)

Hence, using (2.19)-(2.20) and a Growall-type inequality, we obtain (2.9).

Let η = θ = 0. It is easy to see that

∥u∥L∞(0,T ;L2) + ∥u′∥L2(0,T ;H10 )

+ ∥v∥L∞(0,T ;L2) + ∥v′∥L2(0,T ;H10 )≤ C,(2.21)

∥u∥L∞(0,T ;V2) + ∥u′∥L2(0,T ;H10 )≤ Cϵ−

12 ,(2.22)

where C is a constant independent of ϵ and ν.

It follows from (1.5) that

1√g(s)

≤ | 1√g(s)

− 1√g(0)|+ 1√

g(0)≤ C(g)(1 + |s|).(2.23)

So by (2.23) and (2.15), we have

∥∇u∥L2(0,T ;L1)≤∥√νg(|∇Gρ ∗ v|)∇u∥L2(0,T ;L2)∥

√g(|∇Gρ ∗ v|)

−1

∥L∞(0,T ;L2)≤C.

By Sobolev embedding H10 ⊂ Lp for any p <∞ and Holder inequality, we derive

∥∇u∥L2(0,T ;L1) + ∥∇u∥L1(0,T ;Lr) + ∥∇u∥L 43(0,T ;L−ϵ+4

3) ≤ C.

Furthermore, by (2.13)-(2.14) and (2.15), for 1 < r < 2 and 0 < ϵ < 13 , we have

the following estimates

∥∇u∥L2(0,T ;V ∗2 ) + ∥v∥L2(0,T ;H−2) ≤ C(1 +

√ϵ),

∥u∥H1(0,T ;H−1) ≤ C(1 +1√ϵ),

∥v∥H1(0,T ;H−1) ≤ C(1 +1√ϵ),

where C is a constant independent of ϵ and ν.

Hence the above estimates imply that

∥u∥W1 + ∥u′∥W1 + ∥v∥W2 + ∥v′∥W2 ≤ C,

where C depends on ϵ but not ν.

Applying Schaeffer’s theorem (see [11], p. 539), we know that there exists afixed point of (2.8),which is a solution of (2.7). This completes the proof.

The following convergence Proposition is tanken from [19].

Page 91: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A DISSIPATIVE HYPERBOLIC SYSTEMS APPROACH TO IMAGE RESTORATION 77

Proposition 2.5. Let G be a measurable set in a finite dimensional space,yn : G −→ R be a sequence of functions and X : R −→ R be a continuousfunction. Assume that yn is uniformly bounded in L∞(G) and ym −→ y0 inLq(G) with q ≥ 1. Then

X (yn) −→ X (y0)

in Lp(G) for any p <∞.

Now we are ready to prove Theorem 2.1. The proof is similar to that oftheorem 1 in [19]. For completeness of our paper, we sketch the proof. Basedon Lemma 2.1, we can proceed with the sketch of the proof of Theorem 2.1. Werefer to [19] for the details of the technique, and mainly focus on the new issues.The existence of dissipative solutions, one passes the limit in (2.9) with ν = 1as ϵ = ϵm −→ 0 on every interval (0, T ) with T > 0. Let (un, vn) be the weaksolution to problem (2.5)-(2.6) with ϵn in Lemma 2.1. Using Sobolev embeddingW1 ⊂ L2, we derive

um −→ u in H1(0, T ;L2),

vm −→ v in H1(0, T ;L2).

Then (2.21) and Proposition 2.1,

γ∥un(t)∥2 −→ γ∥u(t)∥

2in L2(0, T ),

∥un(t)− ψ(t)∥2 −→ ∥u(t)− ψ(t)∥2 in L2(0, T ),

∥u′n(t)− ψ′(t)∥2 −→ ∥u′(t)− ψ′(t)∥2 in L2(0, T ),

∥vn(t)− ϕ(t)∥2 −→ ∥v(t)− ϕ(t)∥2 in L2(0, T ),

∥v′n(t)− ϕ′(t)∥2 −→ ∥v′(t)− ϕ′(t)∥2 in L2(0, T ).

So we have

γ∥un(t)∥2(∥un(t)− ψ(t)∥2+∥u′n(t)−ψ′(t)∥2+∥vn(t)−ϕ(t)∥2 + ∥v′n(t)− ϕ′(t)∥2)

→ γ∥u(t)∥2(∥u(t)− ψ(t)∥2 + ∥u′(t)− ψ′(t)∥2 + ∥v(t)− ϕ(t)∥2 + ∥v′(t)− ϕ′(t)∥2)

in L1(0, T ). Thus, we can pass to the limit in the right-hand side of (2.9) as welland the last summand (the one with ϵ) goes to zero. Therefore, we concludethat Theorem 2.1 holds.

3. Numerical experiments

In this section we present some experimental results on pictures in the two di-mensions case by using an explicit numerical scheme based on Rothe’s methodin time discretization and finite difference method in spatial discretization. Toproceed with the discrete numerical algorithm, we subdivide the time inter-val (0, T ) by points tn = nτ with τ = T

L , n = 0, 1, 2, . . . , N , where N is

Page 92: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

78 JUNLING SUN, JIE YANG and LEI SUN

a positive integer. Assume that the image (u(t), v(t)) is defined in the lat-tice 1h, 2h, . . . ,Mh × 1h, 2h, . . . , Lh, where h is the space stepsize. Denote(uni,j , v

ni,j) an approximation of (u(nτ, ih, jh), v(nτ, ih, jh)). We define the dis-

crete approximation

∇+x u

ni,j =

uni+1,j − uni,jh

, ∇+x v

ni,j =

vni+1,j − vni,jh

,

∇−x u

ni,j =

uni−1,j − uni,jh

, ∇−x v

ni,j =

vni−1,j − vni,jh

,

∇+y u

ni,j =

uni,j+1 − uni,jh

, ∇+y v

ni,j =

vni,j+1 − vni,jh

,

∇−y u

ni,j =

uni,j−1 − uni,jh

, ∇−y v

ni,j =

vni,j−1 − vni,jh

,

δuni,j =uni,j − u

n−1i,j

τ, δvni,j =

vni,j − vn−1i,j

τ,

δ2uni,j =δuni,j − δu

n−1i,j

τ, δ2vni,j =

δvni,j − δvn−1i,j

τ,

gni,j =1

1 + (vni,jK )2

, |∇Gρ ∗ uni,j | = [

M∑i=1

(δGρ ∗ uni,j)2]12 .

Then the discrete explicit scheme of the problem (1.1)-(1.2) can be obtained

δ2un+1i,j + δun+1

i,j − 1

2[(gni+1,j + gni,j)∇+

x uni,j + (gni−1,j + gni,j)∇−

x uni,j

+(gni,j+1 + gni,j)∇+y u

ni,j + (gni,j−1 + gni,j)∇−

y uni,j ] = 0,

δ2vn+1i,j + δvn+1

i,j − 1

2[(cni+1,j + cni,j)∇+

x vni,j + (cni−1,j + cni,j)∇−

x vni,j

+(cni,j+1 + cni,j)∇+y v

ni,j + (cni,j−1 + cni,j)∇−

y vni,j ]

−(1− λ)(|∇+x u

ni,j |+ |∇−

x uni,j | − vni,j) = 0,

with the condition

u0i,j = u0(i, j), δu0i,j = δu0(i, j) v0i,j = v0(i, j),

δv0i,j = δv0(i, j) 1 ≤ i ≤M, 1 ≤ j ≤ L,un0,j = un1,j , unM,j = unM+1,j , uni,0 = uni,1, uni,L = uni,L+1,

vn0,j = vn1,j , vnM,j = vnM+1,j , vni,0 = vni,1, vni,L = vni,L+1.

We show numerical results which are obtained by applying the above scheme totwo artificial heavily noised images. In order to stabilize the numerical scheme,we rescale the images so that the theoretical results obtained in the previoussection can be applied. Our experiments depend on three parameters: the“scale” of diffusion λ, the diffusive coefficient c(x) and the threshold K. In

Page 93: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A DISSIPATIVE HYPERBOLIC SYSTEMS APPROACH TO IMAGE RESTORATION 79

general, we measure the amount of noise by its standard deviation. The betterquality image will have a higher SNR. Define the signal noise ratio (SNR) as

SNR = 10 log10(

∑Ω(ui,j − u)2∑

Ω(ni,j)2),

where u denotes the mean of the signal ui,j and ni,j is the noise.

References

[1] L. Alvarez, L. Mazorra, Signal and image restoration using shock filters andanisotropic diffusion, SIAM J. Numer. Anal., 31 (2) (1994) 590-605.

[2] L. Ambrosio, V.M. ortorelli, Approximation of functionals depending onjumps by elliptic functionals via-convergence, Commun. Pure Appl. Math.,43(8) (1990), 999-1036.

[3] V. Catte, P.L. Lions, J.M. Morel, T. Coll, Image selective smoothing andedge detection by nonlinear diffusion, SIAM J. Numer. Anal., 29(1) (1992),182-193.

[4] M. Ceccarelli, A finite Markov random field approach to fast edge-preservingimage recovery, Image Vis. Comput., 25(6) (2007), 792- 804.

[5] Y. Chen, C.A.Z. Barcelos, B.A. Mair, Smoothing and edge detection bytime-varying coupled nonlinear diffusion equations, Comput. Vis. ImageUnderst., 82(2) (2001), 85-100.

[6] Y. Chen, P. Bose, On the incorporation of time-delay regularization intocurvature-based diffusion, J. Math. Imaging Vis., 14(2) (2001) 149-164.

[7] T.F. Chan, A. Marquina, P. Mulet, High-order total variation based imagerestoration, SIAM J. Sci. Comput., 22 (2) (2000), 503-516.

[8] P. Charbonnier, L. Blanc-Feraud, G. Aubert, M. Barlaud, Deterministicedge-preserving regularization in computed imaging, IEEE Trans. ImageProcess, 6(2) (1997), 298-311.

[9] T.F. Chan, G.H. Golub, P. Mulet, A nonlinear primal-dual method for totalvariation-based image restoration, SIAM J. Sci. Comput., 20 (6) (1999),1964-1977.

[10] E. Erdem, S. Tari, Mumford-Shah regularizer with contextual feedback, J.Math. Imaging Vis., 33(1) (2009), 67-84 .

[11] L.C. Evans, Partial Differential Equations, 2nd edn. Graduate Studies inMathematics, 19. Am. Math. Soc., Providence, 2010.

Page 94: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

80 JUNLING SUN, JIE YANG and LEI SUN

[12] S. Geman, D. Geman, Stochastic relaxation, Gibbs distribution and theBayesian restoration of images, IEEE Trans. Pattern Anal. Mach. Intell.,6(6) (1984), 721-741.

[13] G. Gilboa, N. Sochen, Y.Y. Zeevi, Image enhancement and denoising bycomplex diffusion process, IEEE Trans. Pattern Anal. Machine Intell., 26(8) (2004), 1020-1036.

[14] L.I. Rudin, S. Osher, E. Fatemi, Nonlinear total variation based noise re-moval algorithms, Physica D., 60 (1992), 259-268.

[15] M.A. Krasnoselskii, Topological methods in the theory of nonlinear inte-gral equations, Pergamon, Elmsford, 1964, Translated by A. H. Armstrong;translation edited by J. Burlak.

[16] D. Mumford, J. Shah, Optimal approximations by piecewise smooth func-tions and associated variational problems, Commun. Pure Appl. Math.,42(5) (1989), 577-685.

[17] M. Nitzberg, T. Shiota, Nonlinear image filtering with edge and cornerenhancement, IEEE Trans. Pattern Anal. Mach. Intell., 14(8) (1992), 826-833.

[18] P. Perona, J. Malik, Scale-space and edge detection using anisotropic diffu-sion, IEEE Trans. Pattern Anal. Machine Intell., 12 (7) (1990), 629-639.

[19] V.B. Surya Prasath, D. Vorotnikov, On a system of adaptive coupled PDEsfor image restoration, J. Math. Imaging Vis, 48 (2014), 35-52.

[20] L. Qiang, Z.A. Yao, Y.Y. Ke, Entropy solutions for a fourth-order nonlineardegenerate problem for noise removal, Nonlinear Anal. TMA, 2007 (67)(2007), 1908-1918.

[21] V. Ratner, Y.Y. Zeevi, Image enhancement using elastic manifolds, ICIAP2007, 14th International Conference on Image Analysis and Processing,2007, 769-774.

[22] J. Simon, Compact sets in the space Lp(0, T ;B), Ann Mat. Pura Appl., 146(1987), 65-96.

[23] R. Szeliski, R. Zabih, D. Scharstein, O. Veksler, V. Kolmogorov, A. Agar-wala, M. Tapen, C. Rother, A comparative study of energy minimizationmethods for Markov random fields with smoothness based priors, IEEETrans. Pattern Anal. Mach. Intell., 30(6) (2008), 1068-1080.

[24] C.R. Vogel, M.E. Oman, Iterative methods for total variation denoising,SIAM J. Sci. Comput., 17 (1) (1996), 227-238.

Page 95: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A DISSIPATIVE HYPERBOLIC SYSTEMS APPROACH TO IMAGE RESTORATION 81

[25] V.G. Zvyagin, D.A. Vorotnikov, Topological Approximation Methods forEvolutionary Problems of Nonlinear Hydrodynamics, de Gruyter Series inNonlinear Analysis and Applications, vol. 12, de Gruyter, Berlin, 2008.

Accepted: 29.11.2016

Page 96: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (82–89) 82

ON PARTIALLY TOPOLOGICAL GROUPS: EXTENSIONCLOSED PROPERTIES

Aynur Keskin KaymakciDepartment of MathematicsSelcuk [email protected]

Wan Aunin Mior OthmanInstitute of Mathematical ScienceFaculty of SciencesUniversity of Malaya50603, Kuala [email protected]

Cenap Ozel∗

Department of Mathematics

King Abdulaziz University

P.O.Box 80203 Jeddah 21589

Saudi Arabia

and

Department of Mathematics

Dokuz Eylul University

Tinaztepe Campus Buca, Izmir, 35160

Turkey

[email protected]

Abstract. The partially (para)topological groups were defined in [9]. In this paper,we give more results in partially topological groups in the sense of H. Delfs and M.Knebusch and we prove extension closed property for connectedness, compactness, andseparability of partially topological groups.

Keywords: extension closed property, Delfs-Knebusch generalized topology, partiallytopological groups.

1. Introduction and preliminaries

In 1985, H. Delfs and M. Knebusch [3] introduced a notion of generalized topo-logical space. Morphisms between such spaces were named strictly continuous.In 2013, a more convenient definition of a generalized topological space (gts) was

∗. Corresponding author

Page 97: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON PARTIALLY TOPOLOGICAL GROUPS: EXTENSION CLOSED PROPERTIES 83

introduced and basic theory of gtses was developed by A. Piekosz [10, 11]. Herewe will work in the category GTSpt of partially topological gtses and strictlycontinuous mappings (introduced in [10]). From now on, we will use notationsfrom [10].

Generalized topology in the sense od H. Delfs and M. Knebusch is an un-known chapter of general topology. In fact, it is a generalization of the classicalconcept of topology. The aim of this paper is to continue the systematic studyof generalized topology in this sense. Do not mix with other meanings of gen-eralized topology appearing in the literature.

Now we need some assumptions in this paper. We assume the existence ofa universe U (cf. pages 22 and 23 of [8]). Sets in the sense of [8] can be calledtotalities or collections. A class is a collection u ⊆ U. A proper class is a class usuch that u /∈ U. Elements of the universe U are called U-small sets in [8]. Wedenote by ZF the system of axioms which consists of the existence of a universeand axioms 0–8 from pages 9–10 of [7] for sets in the sense of [8]. From nowon, a totality u will be called a set if and only if u is a U-small set. All otherset-theoretic axioms applied here, defined in [6] and independent of ZF, concernonly U-small sets. Axioms independent of ZF that are used in this work will bedenoted as in [6]. When we do not involve proper classes, we can use directlyZF instead of ZF and still use the notation ZF of [6] for ZF . That is why wewrite ZF + AC = ZFC. We recall that, in view of Exercise E2 in Section 1.1 of[6], given a finite collection of sets X1, . . . , Xn, where n ∈ ω \0, the statementthat every Xi with i ∈ 1, ..., n is non-void is equivalent in ZF to the statementthat the collection X1, . . . Xn has a choice function.

The basic set-theoretic assumption of this work is ZF. If a theorem isunprovable in ZF or if we give its proof not in ZF, we shall clearly denotethe system of axioms we use in the proof. In all other cases, theorems and theirproofs are in ZF.

Definition 1.1. Let X be any set, τX be a topology on X. A family of openfamilies CovX ⊆ P(τX) will be called a partial topology if the following condi-tions are satisfied:

(i) if U ⊆ τX and U is finite, then U ∈ CovX ;

(ii) if U ∈ CovX and V ∈ τX , then U ∩ V : U ∈ U ∈ CovX ;

(iii) if U ∈ CovX and, for each U ∈ U , we have V(U) ∈ CovX such that∪V(U) = U , then

∪U∈U V(U) ∈ CovX ;

(iv) if U ⊆ τX and V ∈ CovX are such that∪V =

∪U and, for each V ∈ V

there exists U ∈ U such that V ⊆ U , then U ∈ CovX .

Elements of τX are called open sets, and elements of CovX are called ad-missible families. We say that (X,CovX) is a partially topological generalized

Page 98: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

84 AYNUR KESKIN KAYMAKCI, WAN AUNIN MIOR OTHMAN and CENAP OZEL

topological space or simply partially topological space. We shall denote a par-tially topological space (X,CovX) by X when no confusion will arise. SinceτX =

∪CovX , we can omit τX in notation.

Let X and Y be partially topological spaces and let f : X → Y be a function.Then f is called strictly continuous if f−1(U) ∈ CovX for any U ∈ CovY . Abijection f : X → Y is called a strict homeomorphism if both f and f−1 arestrictly continuous functions. If we have a strict homeomorphism between X andY we say that they are strictly homeomorphic and we denote that by X ∼= Y .

Remark 1.2. The above notion of partial topology is a special case of the notionof generalized topology in the sense of H. Delfs and M. Knebusch considered in[3, 10, 11, 12, 13], when the family OpX of open sets of the generalized topologyforms a topology. The category GTSpt of partially topological spaces and theirstrictly continuous mappings is a topological construct (Theorem 4.4 of [13]).

Definition 1.3. Let (X,CovX) be a partially topological space and let Y be asubset of X. Then the partial topology

CovY = (⟨CovX ∩2 Y ⟩Y )pt,

that is: the smallest partial topology containing CovX ∩2 Y , is called a subspacepartial topology on Y , and (Y,CovY ) is a subspace of (X,CovX). (It is also thesmallest generalized topology containing CovX ∩2 Y .)

Fact 1.4. Let φ : X → X ′ be a mapping between partially topological spaces andlet Y be a subspace of X. Then the following are equivalent:

a) φ is strictly continuous,

b) the restriction map φ|Y : Y → X ′ is strictly continuous.

Definition 1.5. Let (X,CovX) and (Y,CovY ) be two partially topologicalspaces. The product partial topology on X×Y is the partial topology CovX×Y =(⟨CovX×2 CovY ⟩X×Y )pt in the notation of Definition 4.6 of [13]; in other words:the smallest partial topology in X × Y that contains CovX ×2 CovY .

2. Partially topological groups

The fundamental reference for topological groups and their properties is [1]; seealso [15]. In [9], the partially (para)topological groups in the sense of H. Delfsand M. Knebusch were defined. Now we discuss partially topological groupswith more details and recall their basic properties.

Definition 2.1. A partially paratopological group G is an ordered pair ((G, ∗),CovG)such that (G, ∗) is a group, while CovG is a generalized topology on G such that∪

CovG is a T1 topology on G and the multiplication map of (G×G,CovG×G)into (G,CovG), which sends ordered pair (x, y) ∈ G × G to x ∗ y, is strictly

Page 99: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON PARTIALLY TOPOLOGICAL GROUPS: EXTENSION CLOSED PROPERTIES 85

continuous. If also the inverse map from (G,CovG) into (G,CovG), which sendseach x ∈ G to x−1, is strictly continuous, then ((G, ∗),CovG) is called a partiallytopological group. For simplicity, when this does not lead to misunderstanding,we shall denote a partially (para)topological group ((G, ∗),CovG) by G or by(G,CovG), or by (G, ∗).

Definition 2.2. (i) A small partially (para)topological group is a partially (para)-topological group ((G, ∗),CovG) such thatCovG = EssFin(

∪CovG).

(ii) A smallification of a partially (para)topological groupG = ((G, ∗),CovG)is the partially (para)topological group

Gsm = ((G, ∗), EssF in(∪

CovG)).

(Cf. Definintion 2.3.16 of [10]).

Fact 2.3. Let (G, ∗) be a group and let τ be a topology on G. Let us applythe functor of smallification to (G, τ) by putting CovGsm = EssFin(τ). ThenG = ((G, ∗), τ) is a (para)topological group if and only if Gsm = ((G, ∗),CovGsm)is a partially (para)topological group.

The group Gsm can also be denoted by Gst, applying the conventions fromDefinition 1.2 of [13]. Similarly, we have

Example 2.4. Since (Rn,+) is a group and the localized smallified euclideanspace Rnlst (the localization of Rnst; see Definition 2.1.15 in [11]) is still partiallytopological, we get partially topological groups (Rnlst,+) for n ∈ N.

Example 2.5. The usual topological as well as smallified Sorgenfrey lines (seeDefinition 4.3 of [14]) with addition as group action form partially paratopolog-ical groups (RSut,+), (RSst,+).

Definition 2.6. Any subgroup H of a partially (para)topological group G is apartially (para)topological group again, and is called a partially (para)topologicalsubgroup of G.

Definition 2.7. Let φ : G → G′ be a function. Then φ is called a morphismof partially (para)topological groups if φ is both strictly continuous and a grouphomomorphism. Moreover, φ is an isomorphism if it is a strict homeomorphismand group isomorphism.

If we have an isomorphism between two partially (para)topological groupsG and G′ then we say that they are isomorphic and we denote that by G ∼= G′.

Remark 2.8. It is obvious that composition of two morphisms of partially(para)topological groups is again a morphism. Also, the identity map is anisomorphism. So partially paratopological groups and their morphisms form acategory PPTGr, while partially topological groups and their morphisms forma category PTGr.

Page 100: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

86 AYNUR KESKIN KAYMAKCI, WAN AUNIN MIOR OTHMAN and CENAP OZEL

3. Extension closed properties of partially topological groups

In this section, we prove extension closed property for connectedness, compact-ness, and separability of partially topological groups.

From [9] we know that Cartesian product of compact(small) sets is compact.

Definition 3.1. A partially topological space (X,CovX) is topologically com-pact (admissibly compact) if each open (admissible) cover of X admits a finitesubcover, and is small if it is hereditary admissibly compact.

Fact 3.2. Let (X,CovX) and (Y,CovY ) be two partially topological spaces andf : X → Y a surjective strictly continuous function. If (X,CovX) is

i) topologically compact,

ii) admissibly compact,

iii) small

then so is (Y,CovY ).

The famous Tychonoff’s theorem may be stated in the following way

Theorem 3.3. Assume ZF. Let X be the product of partially topological spacesXk, k ∈ K, where K is a finite set. If every Xk is topologically compact (small,respectively), then so is X.

Remark 3.4. It is still unknown whether admissible compactness is finitelyproductive even in ZFC.

Corollary 3.5. Assume ZF. Let G be a partially topological group and A andB subsets of G. If A and B are topologically compact (small, respectively), thenso is AB.

Theorem 3.6. For any two compact(small) subsets E and F of a partial topo-logical group G, their product EF in G is a compact(small) subspace of G.

Proof. Since multiplication is strictly continuous, the subspace EF of G is astrictly continuous image of the Cartesian product E × F of the spaces E andF . Since E × F is compact(small), the space EF is compact.

Theorem 3.7. Assume ZF. Let G be a normal compact partial topologicalgroup, F a compact subset of G, and P a closed subset of G. Then the sets FPand PF are closed.

Proof. Since G is compact then P × F is compact and by previous result PFand FP are G-compact. Since G is normal, FP and PF are closed.

From[9] we know that Cartesian product of connected sets is connected.

Page 101: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON PARTIALLY TOPOLOGICAL GROUPS: EXTENSION CLOSED PROPERTIES 87

Definition 3.8. Let X be a partially topological space and let U, V ⊆ X. Thenwe say that the pair U, V is separated if Cl(U) ∩ V = Cl(V ) ∩ U = ∅. We saythat X is connected if it can not be written as a union of two separated sets.

Definition 3.9. A function f : X → Y between partially topological spaces iscalled open(closed) if for every open (closed) set U ⊆ X, f(U) is open (closed)in Y .

Fact 3.10. Let f : X → Y be an open and injective function between partiallytopological spaces and let A ⊆ X. If f(A) is connected, so is A.

Theorem 3.11. For any two connected subsets E and F of a partial topologicalgroup G, their product EF in G is a connected subspace of G.

Proof. Since multiplication is strictly continuous, the subspace EF of G is astrictly continuous image of the Cartesian product E × F of the spaces E andF . Since E × F is connected from [9], the space EF is connected.

Definition 3.12. A closed strictly continuous mapping with compact pre-images of points is called perfect.

Theorem 3.13. The quotient mapping π of G onto the quotient space G/H isperfect where H is a compact subgroup of a normal partial topological group G.

Proof. Take any closed subset P of G. Then, by Theorem 3.7, PH is closedin G. However, PH is the union of cosets, that is PH = π−1π(P ). It followsby definition of a quotient mapping, that the set π(P ) is closed in the quotientspace G/H. Thus π is a closed mapping. In addition, if y ∈ G/H and π(x) = yfor some x ∈ G, then π−1(y) = xH is a compact subset of G. Hence the fibersof π are compact and π is perfect.

Corollary 3.14. Let H be a compact subgroup of a normal partial topologicalgroup G such that the quotient space G/H is compact. Then G is also compact.

Theorem 3.15. Let f : G → H be a strictly continuous mapping of partialtopological spaces. If G is compact and H is normal, then f is closed.

Proof. Let K be a closed set in G. Since G is compact then K is compact. Soby strictly continuity of f , f(K) is compact in H. By assumption, H is normal,so f(K) is closed.

Definition 3.16. Let Xand Y be partially topological spaces. A strictly con-tinuous onto mapping f : X → Y is called identification map if f is open orclosed.

Theorem 3.17. Let f : G → H be a strictly continuous onto homomorphismof partial topological groups. If G is compact and H is normal, then f is open.

Page 102: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

88 AYNUR KESKIN KAYMAKCI, WAN AUNIN MIOR OTHMAN and CENAP OZEL

Proof. By Theorem 3.15, the mapping f is closed, and hence it is quotient.Let K be the kernel of f . If U is open in G, then f−1(f(U)) = KU is open inG. Since f is quotient, it follows that the image f(U) is open in H. Therefore,f is an open mapping.

Lemma 3.18. Suppose that f : X → Y is an open strictly continuous mappingof a space X onto a space Y, x ∈ X, B ⊆ Y, and f(x) ∈ Cl(B) where Cl(B) isclosure of B. Then x ∈ f−1(Cl(B)).

Proof. Take y = f(x), and let O be an open neighborhood of x. Then f(O) isan open neighborhood of y. Therefore, f(O)∩B = ∅ and, hence O∩f−1(B) = ∅.It follows that x ∈ Cl(f−1(B)). Equality is evident.

Theorem 3.19. Let H be a closed subgroup of a partial topological group G. Ifthe spaces H and G/H are separable, then the space G is also separable.

Proof. Let π be the natural homomorphism of G onto the quotient space G/H.Since G/H is separable, we can fix a dense countable subset B of G/H. SinceH is separable and every coset xH is strictly homeomorphic to H, we can fix adense countable subset My of π−1(y), for each y ∈ B. Put M =

∪My : y ∈ B.

Then M is a countable subset of G and M is dense in π−1(B). Since π is an openmapping of G onto G/H, it follows from Lemma 3.18 that Cl(π−1(B)) = G.Hence, M is dense in G and G is separable.

Theorem 3.20. Let H be a closed invariant subgroup of a partial topologicalgroup G. If H and G/H are connected, then so is G.

Proof. Suppose that H and G/H are connected and f : G → 0, 1 be anarbitrary strictly continuous map. We have to show that f is constant. Therestriction of f to H must be constant and since each coset gH is connected, fmust be constant on gH as well taking value f(g). Thus we have a well-definedmap f : G/H → 0, 1 such that f π = f . By the fundamental property ofquotient spaces, it follows that f is strictly continuous and so must be constantsince G/H is connected. Hence f is also constant and we conclude that G isconnected.

Acknowledgements

Authors would like to express their appreciation to the referees for their com-ments and valuable suggestions.

References

[1] A. Arhangel’skii and M. Tkachenko, Topological groups and related struc-tures, World Scientific, 2008.

Page 103: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON PARTIALLY TOPOLOGICAL GROUPS: EXTENSION CLOSED PROPERTIES 89

[2] T. Banakh and A. Ravsky, Each regular paratopological group is completelyregular, to appear in Proc. Amer. Math. Soc.

[3] H. Delfs and M. Knebusch, Locally Semialgebraic Spaces, Lecture Notes inMath., 1173, Springer, Berlin-Heidelberg, 1985.

[4] R. Engelking, General Topology, PWN, Warszawa, 1977.

[5] C. Good and I. J. Tree, Continuing horrors of topology without choice,Topology Appl., 63 (1995), 79-90.

[6] H. Herrlich, Axiom of Choice, Lecture Notes in Mathematics 1876,Springer-Verlag, Berlin-Heidelberg, 2006.

[7] K. Kunen, The Foundations of Mathematics, Studies in Logic 19, CollegePublications, London, 2009.

[8] S. Mac Lane, Categories for the Working Mathematician, Springer-Verlag,Berlin-Heidelberg, 1971.

[9] C. Ozel, A. Piekosz, M. A. Al Shumrani and E. Wajch, Partial paratopo-logical groups, Submitted to Topology Appl., 2016.

[10] A. Piekosz, On generalized topological spaces I, Ann. Polon. Math., 107(2013), 217-241.

[11] Piekosz, A. On generalized topological spaces II, Ann. Polon. Math., 108(2013), 185-214.

[12] A. Piekosz, O-minimal homotopy and generalized (co)homology, RockyMountain J. Math., 43 (2013), 573-617.

[13] A. Piekosz and E. Wajch, Compactness and compactifications in generalizedtopology, Topology Appl., 194 (2015), 241-268.

[14] A. Piekosz and E. Wajch, Quasi-metrizability in generalized topology in thesense of Delfs and Knebusch, arxiv:1505.04442v2, 2015.

[15] L. Pontryagin, Topological groups, CRC Press, 3 edition, 1987.

[16] A. Ravsky, Paratopological groups I, Mat. Stud., 16 (2001), 37-48.

[17] A. Ravsky, Paratopological groups II, Mat. Stud., 17 (2002) 93-101.

[18] M. Sanchis and M. Tkachenko, Recent progress in paratopological groups,a preliminary version of the article published in Quaderni Math. in: Assy-metric Topology and its Applications, 26 (2012), 247-300, 2012

Accepted: 7.12.2016

Page 104: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (90–97) 90

ON WEAK MCCOY MODULES OVER COMMUTATIVERINGS

Ahmad Yousefian DaraniDepartment of Mathematics and ApplicationsUniversity of Mohaghegh ArdabiliP. O. Box 179, [email protected]

Masoumeh ShabaniDepartment of Mathematics and Applications

University of Mohaghegh Ardabili

P. O. Box 179, Ardabil

Iran

[email protected]

Abstract. Let M be a module over a commutative ring R. In this paper we generalizesome annihilator conditions from rings to modules. Denote by Nil(M) the set of allnilpotent elements of M . M is said to be weak McCoy if f(x)m(x) = 0, where f(x) =∑k

i=0mixi ∈ R[x]\0 and m(x) =

∑nj=0 ajx

j ∈ M [x]\0, then smi ∈ Nil(M), forevery 1 ≤ i ≤ k and for some s ∈ R\0. We prove that the class of weak McCoymodules is closed under direct limit, finite direct product and localization. We showthat if R is a uniform R-module, then the direct sum of weak McCoy R-modules isagain weak McCoy. We prove that over a domain D, the D-module M is weak McCoyprovided that if T (M) is weak McCoy, where T (M) is the torsion submodule of M .

Keywords: McCoy ring, McCoy module, weak McCoy ring, weak McCoy module.

1. Introduction

Throughout this paper all rings are considered to be commutative with a nonzeroidentity and all modules are unitary unless otherwise stated. Let R be a ring,M an R-module and N a submodule of M . We denote by (N :R M) the setof all r in R such that rM ⊆ N . The annihilator of M , denoted by annR(M),is then (0 :R M). We denote by R[x] the polynomial ring over the ring R andM [x] the polynomial module over the module M .

An R-module M is called a multiplication module if every submodule N ofM has the form IM for some ideal I of R (Barnard, 1981). Note that sinceI ⊆ (N :R M), then N = IM ⊆ (N :R M)M ⊆ N . So that N = (N :R M)M .A submodule N of M is called pure if IN = N ∩ IM for every ideal I of R(Ribenboim, 1972). It is proved in [2, Theorem 1.1] that every pure submoduleof a multiplication module is again a multiplication module. A submodule N of

Page 105: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON WEAK MCCOY MODULES OVER COMMUTATIVE RINGS 91

M is prime whenever rm ∈ N for some r ∈ R and m ∈ M , then either m ∈ Nor rM ⊆ N .

We recall that an ideal I of R is nilpotent if Ik = 0 for some positive integerk and an element r of R is nilpotent if rk = 0 for some k ∈ N. We denote byNil(R) the set of all nilpotent elements of R. According to [1], a submoduleN of M is called nilpotent if (N :R M)kN = 0 for some positive integer k.An element m ∈ M is said to be nilpotent if Rm is a nilpotent submodule ofM . Clearly, the zero submodule of M is nilpotent and hence the zero elementof M is nilpotent. Denote by Nil(M) the set of all nilpotent elements of M .Nil(M) is not necessarily a submodule of M , but if M is faithful, then Nil(M)is a submodule of M [1, Theorem 6]. Moreover, if M is a faithful multiplica-tion R-module, then Nil(M) = Nil(R)M = ∩P , where P runs over all primesubmodules of M .

By [1, Proposition 4(2)], if I is a nilpotent ideal of R, then IM is nilpotentin M and the converse is true if M is faithful. Also if K ⊆ N and N is nilpotentin M , then N

K is nilpotent in MK as an R-module and the converse is true if K

is nilpotent in M and M is faithful. Also, a submodule N of M is idempotentif N = (N :R M)N (Ali and Smith, 2004). By [1, Theorem 3], if N is adirect summand of a multiplication module M , then N is multiplication andidempotent. An R module M is called uniform if any two nonzero submodulesof M have a nonzero intersection (Faith, 1981).

Let R be an associative ring with identity. R is said to be right McCoy(respectively left McCoy) if for each pair of non-zero polynomials f(x), g(x) ∈R[x] with f(x)g(x) = 0, then there exists a non-zero element r ∈ R with f(x)r =0 (respectively rg(x) = 0). A ring is McCoy if it is both left and right McCoy.Also, we say that a ring R is right weak McCoy whenever f(x) = a0 + a1x +. . .+ amx

m, g(x) = b0 + b1x+ . . .+ bnxn ∈ R[x] \ 0 satisfy f(x)g(x) = 0, then

ais ∈ Nil(R) for each i = 0, 1, . . . ,m and for some s ∈ R\0. Left weak McCoyrings are defined similarly. If a ring R is both left and right weak McCoy, thenwe say that R is a weak McCoy ring.

By those definitions, clearly, McCoy rings are weak McCoy. Also, the name”McCoy” was chosen because McCoy in [7] had noted that every commutativering satisfies this condition.

An R-module M is said to be McCoy if f(x)m(x) = 0, where f(x) =∑ni=0 aix

i ∈ R[x]\0 and m(x) =∑k

j=0mjxj ∈M [x], implies that there exists

a nonzero element r ∈ R such that rm(x) = 0 (Cui and Chen, 2011).

In this paper, we generalize the concept of weak McCoy rings defined onassociative rings to modules over commutative rings. Let R be a commutativering. An R-module M is called a weak McCoy module if f(x)m(x) = 0, wheref(x) ∈ R[x]\0 and m(x) =

∑ni=0mix

i ∈ M [x]\0, then smi ∈ Nil(M), forevery 0 ≤ i ≤ n and for some s ∈ R\0.

Page 106: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

92 AHMAD YOUSEFIAN DARANI and MASOOMEH SHABANI

2. Weak McCoy modules

In this section we study some basic properties of weak McCoy modules andinvestigate the relations between weak McCoy rings and weak McCoy modules.

Definition 2.1. Let R be a commutative ring. An R-module M is called weakMcCoy whenever f(x) ∈ R[x]\0 and m(x) =

∑ni=0mix

i ∈ M [x]\0 satisfyf(x)m(x) = 0, then smi ∈ Nil(M), for every 0 ≤ i ≤ n and for some s ∈R\0.

Proposition 2.2. Let R be a ring. Then every McCoy R-module M is weakMcCoy and the converse is true if M has no nilpotent elements.

Proof. It is trivial.

Corollary 2.3. Let M be a finitely generated faithful multiplication R-module.Then, the R

Nil(R) -module MNil(M) is McCoy if and only if it is weak McCoy.

Proof. First note that Nil(M) is a submodule of M and Nil(M) = Nil(R)Mby [1, Theorem 6]. So we may form the R

Nil(R) -module MNil(M) . By [1, Corollary

7], MNil(M) has no nilpotent elements. Now the result follows from Proposition

2.2.

Proposition 2.4. Let M be an R-module. Then the direct limit of every directsystem of weak McCoy submodules of M is weak McCoy.

Proof. Let I be a directed set and Mi; i ∈ I a direct system of weak Mc-Coy submodules of M . Set N = lim−→

i∈IMi. We know that N =∑

i∈IMi =∪i∈IMi, by [8, Example 5.32]. Let m(x) =

∑nj=0mjx

j ∈ N [x]\0 and

f(x) =∑m

k=0 akxk ∈ R[x]\0 with f(x)m(x) = 0. There exists t ∈ I such

that mj ∈ Mt for each 0 ≤ j ≤ n. So m(x) ∈ Mt[x]. Since Mt is weak Mc-Coy, there exists s ∈ R\0 such that smj ∈ Nil(Mt). Thus, there exists anlj ∈ N such that (R(smj) :R Mt)

ljR(smj) = 0, for each j = 0, 1, . . . , n. But(R(smj) :R N) ⊆ (R(smj) :R Mt), hence (R(smi) :R N)ljR(smj) = 0 andsmj ∈ Nil(N), for each j = 0, 1, . . . , n.

Corollary 2.5. If every finitely generated submodule of an R-module M is weakMcCoy, then M is weak McCoy.

Proof. By , by [8, Example 5.32], every module is the direct limit of it’s finitelygenerated submodules. Now the result is trivial by Proposition 2.4.

Definition 2.6. A ring R is said to be a strongly weak McCoy ring if everyR-module is weak McCoy.

It is clear that if an R-module M is not faithful, then it is McCoy, and sois weak McCoy. Hence to study the weak McCoy condition on a module, it issufficient to consider the faithful case.

Page 107: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON WEAK MCCOY MODULES OVER COMMUTATIVE RINGS 93

Proposition 2.7. A ring R is strongly weak McCoy if and only if every finitelygenerated R-module is weak McCoy.

Proof. ⇒) It is trivial.⇐) Let M be a faithful R-module. We know that M is a direct limit of its

finitely generated submodules. Hence by assumption and Proposition 2.4, M isweak McCoy.

Let M be an R-module and S a multiplicatively closed subset of R. ThenS−1M has an S−1R-module structure. M is called S-torsion free if sm = 0, foreach 0 = m ∈M and s ∈ S.

Lemma 2.8. Let R be a ring, S a multiplicatively closed subset of R andM a finitely generated R-module. Then m ∈ NilR(M) if and only if m

s ∈NilS−1R(S−1M), for every s ∈ S.

Proof. Let m ∈M and k ∈ N. Since M is finitely generated, we have

S−1((Rm :R M)kRm) = S−1((Rm :R M)k)S−1(Rm)= (S−1(Rm :R M))kS−1(Rm)= (S−1(Rm) :S−1R S

−1M)kS−1(Rm).

On the other hand, S−1(Rm) = S−1R(ms ), for each s ∈ S. So the proof iscomplete.

Theorem 2.9. Let R be a ring, S a multiplicatively closed subset of R and M afinitely generated S-torsion free R-module. then M is weak McCoy if and onlyif S−1M is a weak McCoy S−1R-module.

Proof. First suppose that M is a weak McCoy R-module.Let f(x) =

∑mi=0 αix

i ∈ S−1R[x]\0 and m(x) =∑n

j=0 βjxj ∈ S−1M [x]\0

with f(x)m(x) = 0.We can assume that αi = ri

u and βj =mjv for some ri ∈ R, mj ∈ M and

u, v ∈ S. Note that if αi = riui

and βj =mjvj

, then we can assume u = u1u2 . . . umand v = v1v2 . . . vn.

Therefore f(x)m(x) = 0 implies that 0S−1R = r0m0uv = r0m1+r1+m0

uv =r0m2+r1m1+r2m0

uv = · · · . But M is S-torsion free, so 0 = r0m0 = r0m1 + r1m0 =r0m2 + r1m1 + r2m0 = · · · .

Now, we set f1(x) =∑m

i=0 rixi and m1(x) =

∑nj=0mjx

j . Clearly f1(x) ∈R[x]\0, m1(x) ∈ M [x]\0 and f1(x)m1(x) = 0. Since M is weak McCoy,there exists c ∈ R\0 such that cmj ∈ NilR(M), for each 0 ≤ j ≤ n. It is clearthat c ∈ S−1R\0 and c(

mjv ) ∈ Nil(S−1M), for each 0 ≤ j ≤ n, by Lemma

2.8. Hence, S−1M is a weak McCoy S−1R-module.Now assume that S−1M is a weak McCoy S−1R-module. Let g(x) =∑qi=0 aix

i ∈ R[x]\0 and n(x) =∑p

j=0 njxj ∈ M [x]\0 with g(x)n(x) = 0.

But n(x) ∈ S−1M [x]\0 and g(x) ∈ S−1R[x]\0. By assumption, there existsrs ∈ S−1R[x]\0) such that r

s(mj) ∈ NilS−1R(S−1M), for each 0 ≤ j ≤ p.

Page 108: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

94 AHMAD YOUSEFIAN DARANI and MASOOMEH SHABANI

Therefore, rmj ∈ NilR(M), for each 0 ≤ j ≤ p and hence M is a weak McCoyR-module.

We recall that R[x, x−1] denotes the Laurent polynomial ring over R. For anR-module M , let M [x, x−1] =

∑ni=kmix

i;n, k ∈ Z,mi ∈ M. M [x, x−1] is anR[x, x−1]-module under the addition operation and the following scaler productoperation. For m(x) =

∑imix

i ∈ M [x, x−1] and f(x) =∑

j ajxj ∈ R[x, x−1],

then f(x)m(x) =∑

k(∑

i+j=k ajmi)xk (see [6]).

Corollary 2.10. Let R be a ring and M a finitely generated R-module. ThenM [x] is a weak McCoy R[x]-module if and only if M [x, x−1] is a weak McCoyR[x, x−1]-module.

Proof. Let S = 1, x, x2, .... It is clear that S is a multiplicatively closedsubset of R[x] and R[x]-module M [x] is S-torsion free. By Theorem 2.9, M [x] isa weak McCoy R[x]-module if and only if S−1M [x] is a weak McCoy S−1R[x]-module. But S−1R[x] = R[x, x−1] and S−1M [x] = M [x, x−1]. Now the resultfollows from Theorem 2.9.

Corollary 2.11. Let R be a ring, S a multiplicatively closed subset of R andevery R-module is finitely generated and S-torsion free. Then the localizationS−1R is strongly weak McCoy if and only if R is strongly weak McCoy.

Proposition 2.12. Every pure submodule of a weak McCoy multiplication mod-ule is weak McCoy.

Proof. Let N be a faithful pure submodule of the weak McCoy multiplicationR-module M . It is clear that N is multiplication. Let f(x)m(x) = 0, wherem(x) =

∑ni=1mix

i ∈ N [x] \ 0 and f(x) ∈ R[x] \ 0. Since m(x) ∈ M [x]and M is weak McCoy, there exists s ∈ R\0 such that smi ∈ Nil(M). By [1,Proposition 4], (R(smi) :R M) is a nilpotent ideal of R and hence (R(smi) :RM) ⊆ Nil(R), for each i = 0, 1, . . . , n. By [1, Theorem 6], Nil(R)M = M andNil(R)N = N , since N and M are multiplication. Also, N is a pure submoduleof M and R(smi) = (R(smi) :R M)M . So smi ∈ N ∩ (R(smi) :R M)M =(R(smi) :R M)N ⊆ Nil(R)N = Nil(N), for each i = 0, 1, . . . , n. Therefore,these elements are nilpotent in N and hence N is weak McCoy.

Proposition 2.13. Let R be a ring, I a directed set and Mii∈I a family offaithful weak McCoy R-modules. If R is uniform as an R-module, then the directsum M =

⨿i∈IMi is a weak McCoy R-module.

Proof. Let f(x) ∈ R[x]\0 and m(x) =∑n

k=0mkxk ∈ M [x]\0 satisfy

f(x)m(x) = 0, where mk = (mik)i∈I , for k = 0, 1, . . . , n.Set mi(x) =

∑nk=0mikx

k ∈ Mi[x]. Clearly, f(x)mi(x) = 0. Since Mi’sare weak McCoy, there exists si ∈ R\0 such that simik ∈ Nil(Mi) for eachi ∈ I and k = 0, 1, . . . , n. We know that the set I ′ = i ∈ I;mi(x) = 0is a finite set. Set U =

∩i∈I′ Rsi. Since R is a uniform R-module, U = 0.

Page 109: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON WEAK MCCOY MODULES OVER COMMUTATIVE RINGS 95

Let s ∈ U\0. Then s = risi, for each i ∈ I ′ and for some ri ∈ R. AlsoR(smik) = R(risimik) = (Rri)(Rsimik). But R(simik) is a nilpotent submoduleof Mi. Hence R(smik) is nilpotent in Mi, for each i ∈ I ′ and k = 0, 1, . . . , n, by[1, Proposition]. Therefore, (R(smik) :R Mi) is a nilpotent ideal of R, for eachi ∈ I ′, since Mi’s are faithful. But R(smk) ⊆

⨿i∈I R(smik) and also we have

(R(smk) :⨿i∈IMi) ⊆ (

⨿i∈I R(smik) :R

⨿i∈IMi)

⊆ (⨿i∈I′ R(smik) :R

⨿i∈I′ Mi)

=∩i∈I(R(smik) :R Mi).

Thus, smk ∈ Nil(M), for each k = 0, 1, . . . , n, since finite intersection of nilpo-tent ideals is nilpotent. Consequently, M =

⨿i∈IMi is weak McCoy.

Proposition 2.14. Every finite direct product of faithful weak McCoy modulesis weak McCoy.

Proof. Let M =∏nk=1Mk, where Mk’s are faithful weak McCoy R-modules.

So M is a faithful R-module. Let m(x) =∑p

i=0mixi ∈ M [x]\0 and f(x) ∈

R[x]\0 with f(x)m(x) = 0. Since mi ∈ M , for each i, mi = (mi1, . . . ,min),for some mik ∈Mk.

Set mk(x) =∑p

i=0mikxi ∈ Mk[x], for each 1 ≤ k ≤ n. Hence f(x)mk(x) =

0, for each 1 ≤ k ≤ n. By assumption, there exists ck ∈ R\0 such that ckmik ∈Nil(Mk). Therefore, R(ckmik) is nilpotent in Mk. So the ideal (R(ckmik) :RMk) is nilpotent, for each 1 ≤ k ≤ n and 0 ≤ i ≤ p, by [1, Proposition 4].Consider c = c1c2 . . . cn. Clearly, (R(cmik) :R Mk) = (R(ckmik) :R Mk). Thus(R(mik) :R Mk) is a nilpotent ideal, for each i = 0, 1, . . . , p and k = 0, 1, . . . , n.

On the other hand,

(R(cmi) :R M) = (

n∏k=1

R(cmik) :R

n∏k=1

Mk) =

n∩k=1

(R(cmik) :R Mk).

Intersection of finite number of nilpotent ideals is nilpotent. This implies that(R(cmi) :R M) is a nilpotent ideal and therefore cmi ∈ Nil(M), for each i =0, 1, . . . , p.

Proposition 2.15. A ring R is weak McCoy if and only if it is weak McCoyas an R-module.

Proof. We knowR is a multiplicationR-module. So by [1, Theorem 6], Nil(R) =Nil(R)R. Therefore the proof is obvious.

Proposition 2.16. Let R be a ring and N a submodule of an R-module M suchthat M

N is a faithful weak McCoy R-module. Then M is weak McCoy.

Proof. Let m(x) =∑n

i=0mixi ∈ M [x]\0 and f(x) =

∑kj=0 ajx

j ∈ R[x]\0with f(x)m(x) = 0. Set m(x) =

∑ni=0mix

i =∑n

i=0(mi + N)xi ∈ (MN )[x]\0.Hence f(x)m(x) = 0 = N . By hypothesis, there exists c ∈ R\0 such that

Page 110: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

96 AHMAD YOUSEFIAN DARANI and MASOOMEH SHABANI

cmi ∈ Nil(MN ), for every 0 ≤ i ≤ n. Since R-module MN is faithful, by [1,

Proposition 4], (R(cmi) :RMN ) is a nilpotent ideal of R, for each 0 ≤ i ≤ n. But

(R(cmi) :R M) ⊆ (R(cmi) :RMN ). Thus (R(cmi) :R M) is a nilpotent ideal and

hence cmi ∈ Nil(M) for each i. Therefore, M is weak McCoy.

For a commutative domain R and an R-module M , the torsion submoduleof M is defined by T (M) = x ∈ M |annR(x) = 0. In this case, T (M) is asubmodule of M , called the torsion part of M . An R-module M is called atorsion module if T (M) = M .

Proposition 2.17. Let D be a domain and M a D-module. If D-module T (M)is weak McCoy, then M is also weak McCoy.

Proof. Suppose that T (M) is weak McCoy. Let f(x) =∑n

i=0 aixi ∈ D[x]\0

and m(x) =∑n

j=0mjxj ∈ M [x] satisfy f(x)m(x) = 0. We have a0m0 =

a0m1 + a1m0 = a0m2 + a1m1 + a2m0 = . . . = akmn = 0.

Since f(x) = 0, we may assume that a0 = 0. Multiplying a0m1 + a1m0 = 0by a0 implies that a20m1 = 0. Similarly, multiplying a0m2 + a1m1 + a2m0 = 0by a20 implies that a30m2 = 0. Continuing this process, we have aj+1

0 mj =0 and so mj ∈ T (M), for j = 0, 1, . . . , n. Hence m(x) ∈ T (M)[x]. SinceT (M) is a weak McCoy D-module, there exists d ∈ D\0 such that dmj ∈Nil(T (M)). Therefore, for each 0 ≤ j ≤ n, there exists positive integer kj suchthat (D(dmj) :D T (M))kjD(dmj) = 0.

But (D(dmj) :D M) ⊆ (D(dmj) :D T (M)). Thus, (D(dmj) :D M)kjD(dmj) =0, for j = 0, 1, . . . , n. Therefore, dmj ∈ Nil(M), for j = 0, 1, . . . , n and henceM is a weak McCoy D-module.

Theorem 2.18. Let R be an integral domain and Q the quotient field of R. IfM is a weak McCoy Q-module, then M is weak McCoy as an R-module and theconverse is true if M is finitely generated.

Proof. Suppose that M is a weak McCoy Q-module. Let f(x) =∑n

i=0 aixi ∈

R[x] and m(x) =∑n

j=0mjxj ∈ M [x] satisfy f(x)m(x) = 0. First note that

every element q ∈ Q has the form rs−1 for some regular element s ∈ R. SinceM is weak McCoy as an Q-module, there exists a nonzero element q ∈ Q suchthat qmj ∈ NilQ(M), for every j = 0, 1, . . . , k. We have q = rs−1. So rmj =sqmj ∈ NilQ(M), for every j = 0, 1, . . . , k. Moreover, M is a faithful Q-module,since M = 0. Hence the ideal (Q(rmj) :Q M) is a nilpotent ideal of Q, for each0 ≤ j ≤ k, by [1, Theorem 4(1)]. Hence M is a weak McCoy R-module.

For the converse, suppose that M is a finitely generated weak McCoy R-module. Let f(x) =

∑ni=0 aix

i ∈ Q[x]\0 and m(x) =∑n

j=0mjxj belongs to

the Q[x]-module M [x]. We may assume that ai = a′is−1i , for every 0 ≤ i ≤ n and

for some a′i ∈ R and regular element si ∈ R. Setting s = s0s1 . . . sn, we have ai =

a′is−1, for every 0 ≤ i ≤ n. Then 0 = f(x)m(x) =

∑ni=0

∑kj=0 s

−1aimjxi+j =

s−1f(x)m(x). So f ′(x)m(x) = 0.

Page 111: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON WEAK MCCOY MODULES OVER COMMUTATIVE RINGS 97

Since M is weak McCoy as an R-module, there exists r ∈ R\0(⊆ Q\0)such that rmj ∈ Nil(M). By assumption, M is a faithful R-module. Thus(R(rmj) :R M) is a nilpotent ideal ofR, for each j = 0, 1, . . . , k. ButQ(R(rmj) :RM) = (Q(rmj) :Q M), since M is finitely generated. Hence (Q(rmj) :Q M) is anilpotent ideal of Q and so rmj ∈ NilQ(M), for every 0 ≤ j ≤ k. Therefore, Mis a weak McCoy Q-module.

References

[1] M. M. Ali, Idempotent and nilpotent submodules of multiplication modules,Comm. Algebra, 36 (2008), 4620–4642.

[2] M. M. Ali and D. J. Smith, Pure submodules of multiplication modules,Contributions to Algebra and Geometry, 45(1) (2004), 61–74.

[3] J. Cui and J. Chen, On McCoy modules, Bull. Korean Math. Soc., 48(2011), 23–33.

[4] C. Faith, Algebra I, Rings, Modules and Categories, Springer-Verlag, NewYork, (1981), 205-207.

[5] E. Hashemi, Annihilator conditions on polynomials over modules, Mediterr.J. Math., 8 (2011), 207-214.

[6] T. K. Lee and Y. Zhou, Reduced Modules, Rings, modules, algebras andabelian groups, Lect. Notes Pure Appl. Math., 236, Dekker, New york,(2004) 365-377.

[7] N. H. McCoy, Remarks on divisors of zero, Amer. Math. Monthly, 49 (1942),286-295.

[8] J. J. Rotman, An Introduction to Homological Algebra, Springer, New York,second edition, 2009.

Accepted: 9.12.2016

Page 112: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (98–107) 98

SOME RESULTS ON DISTANCED-BALANCED ANDSTRONGLY DISTANCE-BALANCED GRAPHS

H. FaramarziDepartment of Applied MathematicsFerdowsi University of MashhadP. O. Box 1159, Mashhad 91775, I. [email protected]

F. RahbarniaDepartment of Applied MathematicsFerdowsi University of MashhadP. O. Box 1159, Mashhad 91775, I. [email protected]

M. TavakoliDepartment of Applied Mathematics

Ferdowsi University of Mashhad

P. O. Box 1159, Mashhad 91775, I. R.

Iran

m [email protected]

Abstract. Distance-balanced graphs are graphs in which for every edge e = uv thenumber of vertices closer to u than to v is equal to the number of vertices closer tov than to u. The graph is strongly distance-balanced if the relation holds for everydistance of i which 0 ≤ i ≤ diam(G). In this paper, we study some local properties ofthem and also under some graph operations.

Keywords: distance-balanced graph, strongly distance-balanced graph, graph invari-ant, graph operation.

1. Introduction and preliminaries

Let G be a simple undirected graph. The distance dG(u, v) between verticesu, v ∈ V (G) is the length of a shortest path between u and v in G. For a pair ofadjacent vertices a, b ∈ V (G) let Wab denote the set of all vertices of G closer toa than to b and let aW b denote the set of all vertices of G that are at the samedistance to a and b. For each i ≥ 0 let W i

ab and aW bi be the subsets of Wab and

aW b respectively, of all the vertices at distance i to a. Therefore

Wab = x ∈ V (G)|d(a, x) < d(b, x),aW b = x ∈ V (G)|d(a, x) = d(b, x),

W iab = x ∈Wab|d(a, x) = i,aW b

i = x ∈a W b|d(a, x) = i.

Page 113: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOME RESULTS ON DISTANCED-BALANCED ... 99

Distance-balanced graphs were introduced as graphs that |Wab| = |Wba| forevery pair of adjacent vertices a, b ∈ V (G). A graph G is strongly distance-balanced if W i

ab = W iba holds for every pair of adjacent vertices a, b ∈ V (G)

and every i ≥ 0. For more information, we recommend the readers to lookat [4, 1, 2, 5]. Note that every strongly distance-balanced graph is distance-balanced. Throughout this article, graphs are supposed to be simple and con-nected. Moreover, we denote the neighbours of v by N(v).

2. Local properties

Let G be a regular graph with v vertices and degree k. G is said to be stronglyregular with (v, k, µ, λ) if there are also integers λ and µ such that:

1. Every two adjacent vertices have µ common neighbours.

2. Every two non-adjacent vertices have λ common neighbours.

Theorem 2.1. Let G is a strongly regular graph with (v, k, µ, λ), then G isstrongly distance-balanced and hence distance-balanced.

Proof. Let λ = 0, then every v ∈ V (G) is connected to the neighbours of N(v),therefore G is a complete graph and strongly distance-balanced. On the otherhand, if λ = 0, then for every uv ∈ E(G), |W 1

uv| = |W 1vu| = k − µ and since

dim(G) ≤ 2 then |W 2uv| = |W 2

vu| = |V (G)| − (k − µ) − |uW 2v |. Therefore G is

strongly distance-balanced and hence distance-balanced.Let u ∈ V (G). We define d(u,G) and di(u,G) by

d(u,G) =∑

v∈V (G)

d(u, v)

anddi(u,G) =

∑v∈V (G),d(u,v)=i

d(u, v) ,

respectively, which 1 ≤ i ≤ diam(G). Moreover, diam(G) is the length of thelongest shortest path between any two graph vertices of G.

Theorem 2.2. G is strongly distance-balanced if and only if di(u,G) = di(v,G)for each 1 ≤ i ≤ diam(G) and for each u, v ∈ V (G).

Proof. Suppose di(u,G) = di(v,G) for each 1 ≤ i ≤ diam(G) and for eachu, v ∈ V (G). It is clear that if d1(u,G) = d1(v,G) then |W 1

uv| = |W 1vu|. Now By

induction, suppose the statement holds for i ≤ k:

di(u,G) = di(v,G)→ |W iuv| = |W i

vu|, 1 ≤ i ≤ k.

Let dk+1(u,G) = dk+1(v,G), then

dk+1(u,G) = dk+1(u,Wk+1uv ) + (dk(v,W

kvu) + |W k

vu|) + dk+1(u,uW vk+1) =

Page 114: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

100 H. FARAMARZI, F. RAHBARNIA and M. TAVAKOLI

dk+1(v,G) = dk+1(v,Wk+1vu ) + (dk(u,W

kuv) + |W k

uv|) + dk+1(v,vW uk+1) .

Thereforedk+1(u,W

k+1uv ) = dk+1(v,W

k+1vu ),

which implies that|W k+1

uv | = |W k+1vu |.

For sufficiency, let G be a strongly distance-balanced graph, which means thatfor each 1 ≤ i ≤ diam(G) and uv ∈ E(G), |W i

uv| = |W ivu|. Therefore

|W iuv| × i+ |W i−1

vu | × (i− 1) + |uW vi| × i =

|W ivu| × i+ |W i−1

uv | × (i− 1) + |vW ui| × i,

which shows thatdi(u,G) = di(v,G).

Let G be a graph and e ∈ E(G), then by G.e we mean contraction of e thatis the operation which removes the edge from the graph while simultaneouslymerging the two vertices that it previously joined. By G.[e1, · · · , en], we mean(((G.e1).e2). · · · .en).

Theorem 2.3. If G is regular, then G is distance-balanced if and only if

Wuv(G.[upi]uv =upi∈E(G)) = Wvu(G.[vqj ]vu=vqj∈E(G))

for each u, v ∈ V (G), which [upi]uv =upi∈E(G) and [vqj ]vu=vqj∈E(G) are all edgesconnected to u and v respectively, except for uv and vu.

Proof. Since

|Wuv| = |W 1uv|+ |Wp1u|+ · · ·+ |Wpnu| − Cuv,

where pi(1 ≤ i ≤ n) are vertices connected to u that pi = v and Cuv consists ofmembers x such that

1. if x ∈Wpiu but x ∈Wvu or x ∈u W v.

2. x ∈Wpiu for more than one i.

Since members of Cuv and Wpiu(pi ∈ N(u)\v) are not related to neighbours ofu and v, therefore

Wuv(G.[upi]uv =upi∈E(G)) = (|Wuv| − |W 1uv|) + |uWv|

Hence

|Wuv| = |Wvu|,|W 1

uv|+ |Wup1 |+ · · ·+ |Wupi | − |Cuv|+ |uWv|= |W 1

vu|+ |Wvq1 |+ · · ·+ |Wvqi | − |Cvu|+ |vWu|Wuv(G.[upi]uv =upi∈E(G)) = Wvu(G.[vqj ]vu =vqj∈E(G)).

Page 115: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOME RESULTS ON DISTANCED-BALANCED ... 101

Graph G is a chordal graph if all its cycles of four or more vertices have achord, which is an edge that is not part of the cycle but connects two verticesof the cycle.

Theorem 2.4. Let G be a chordal graph. G is complete if G is distance-balanced.

Proof. If G be a chordal graph on 3 vertices and distance-balanced, then G iscomplete. By induction, suppose G is a chordal graph on n > 3 vertices anddistance-balanced, then G is complete. Now let G be a graph on n+ 1 vertices,T be the left corner triangle in G, u ∈ V (T ) and x, y be other vertices of T .If there is no other vertex connected to u, therefore G is not distance-balanced(|Wux| = |Wxu|). Since the graph is chordal, suppose p1 be a vertex such thatup1, xp1 ∈ E(G). If there is no vertex connected to p1, then G is not distance-balanced (|Wp1u| = |Wup1 |). By chordal property, let p2 be a vertex on suchthat p1p2, up2 ∈ E(G). By continuing this method, u is connected to all verticesof G. By removing u from G, G − u is again chordal and distance-balanced.Therefore, G−u is complete which implies that the statement holds for eachgraph with n > 3 vertices.

Let G be a graph, u ∈ V (G), N(u) = p1, p2, · · · , pn and 1 ≤ i < j ≤ n. Wedenote the set Wup1 ∩· · ·∩Wupi−1 ∩Wupi+1 ∩· · ·∩Wupj−1 ∩Wupj+1 ∩· · ·∩Wupnby Su(pi, pj).

Lemma 2.5. Let G be a distance-balanced graph which diam(G) > 1. Then Gis triangle-free if and only if for each uv, uw ∈ E(G), |Su(v, w)∩Wwu ∩uWv| =|Su(v, w) ∩Wvu ∩uWw|.

Proof. Let uv, uw ∈ E(G), then by the property of triangle-free, we have

uWv ∩Wwu ∩ Su(v, w) = x ∈ Su(v, w)|d(w, x) = d(v, x) + 1,

uWw ∩Wvu ∩ Su(v, w) = x ∈ Su(v, w)|d(pk, x) = d(v, x)− 1.

Now, we define the function

f :u W v ∩Wwu ∩ Su(v, w)→u Ww ∩Wvu ∩ Su(v, w),

x→ y (y ∈ p(v, · · · , y, x)),

where p(v, · · · , y, x) is the shortest path between v and x. Since w is not con-nected to v (triangle-free), the function is well-defined and bijective. Therefore

|Wwu ∩uWv ∩ Su(v, w)| = |Wvu ∩uWw ∩ Su(v, w)|.

For the sufficiency, supposeN(u) = v, w, p1, p2, · · · , pn and for each uv, uw ∈E(G), |Su(v, w) ∩ Wwu ∩u Wv| = |Su(v, w) ∩ Wvu ∩u Ww|. By contrary, ifvw ∈ E(G), then |Su(v, pi) ∩ Wpiu ∩u Wv| = 0 for each 1 ≤ i ≤ n. There-fore vpi ∈ E(G) for each 1 ≤ i ≤ n, and consequently neighbours of any vertexare connected together and by theorem 2.4, the graph is complete.

Page 116: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

102 H. FARAMARZI, F. RAHBARNIA and M. TAVAKOLI

Theorem 2.6. Let G be a distance-balanced graph which diam(G) > 1. Thenfor each uv, ab ∈ E(G), |Wvu| = |Wab| if and only if G is triangle-free and foreach u ∈ V (G) and uv, uw ∈ E(G), |Su(v, w) ∩Wvu| = |Su(v, w) ∩Wwu|.

Proof. Let G be a distance-balanced graph which diam(G) > 1, uv, uw ∈ E(G)and for each uv, ab ∈ E(G), |Wvu| = |Wab|. Then

|Wuv| = deg(u) + |WuvG.[upi]uv =upi∈E(G)| − |uWv|,

|Wuw| = deg(u) + |WuwG.[upi]uw =uqj∈E(G)| − |uWw|.

Therefore we have

|Wuv|+ |uWv| = deg(u) + |WuvG.[upi]uv =upi∈E(G)|,

|Wuw|+ |uWw| = deg(u) + |WuwG.[upi]uw =upi∈E(G)|

and|V (G)| − |Wuv| = deg(u) + |WuvG.[upi]uv =upi∈E(G)|,

|V (G)| − |Wuw| = deg(u) + |WuwG.[upi]uw =upi∈E(G)| ,

which implies that

|WuvG.[upi]uv =upi∈E(G)| = |WuwG.[upi]uw =upi∈E(G)|.

Therefore|(Wp1u ∪ · · · ∪Wpnu ∪Wwu) ∩ (Wuv ∪uW v)| =

|(Wp1u ∪ · · · ∪Wpnu ∪Wvu) ∩ (Wuw ∪uWw)| ,

which shows that

|(Wuv ∪uW v)| − |(Wup1 ∩ · · · ∩Wupn ∩Wuw)| =

|(Wuw ∪uWw)| − |(Wup1 ∩ · · · ∩Wupn ∩Wuv)|.

Therefore we have|(Wup1 ∩ · · · ∩Wupn ∩Wuw)| =

|(Wup1 ∩ · · · ∩Wupn ∩Wuv)| ,

which implies that

|(Wup1 ∩ · · · ∩Wupn ∩Wuw ∩Wvu)| =

|(Wup1 ∩ · · · ∩Wupn ∩Wuv ∩Wwu)| ,

and finally|(Su(v, w) ∩Wuw ∩Wvu)| =

|(Su(v, w) ∩Wuv ∩Wwu)|.

Page 117: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOME RESULTS ON DISTANCED-BALANCED ... 103

On the other hand,

|Wwu| = |Wwu ∩uWv|+ |Wwu ∩Wuv|+ |Wwu ∩Wvu|

|Wvu| = |Wvu ∩uWw|+ |Wvu ∩Wuw|+ |Wvu ∩Wwu|.

Therefore|Su(v, w) ∩Wwu| − |Su(v, w) ∩Wwu ∩uWv| =

|Su(v, w) ∩Wvu| − |Su(v, w) ∩Wvu ∩uWw|.

Since (Su(v, w)∩Wwu∩uWv) ⊆ (Su(v, w)∩Wwu) and (Su(v, w)∩Wvu∩uWw) ⊆(Su(v, w) ∩Wvu), we have

|Su(v, w) ∩Wwu ∩uWv| = |Su(v, w) ∩Wvu ∩uWw|

and|Su(v, w) ∩Wwu| = |Su(v, w) ∩Wvu|.

Therefore by lemma 2.5, the graph is triangle-free and |Su(v, w) ∩ Wwu| =|Su(v, w)∩Wvu| for each u ∈ V (G) and v, w ∈ N(u). The sufficiency is straight-forward with regard to the reverse of the proof and lemma 2.5.

Corollary 2.7. Let G be a k-regular distance-balanced and triangle-free graphwith diam(G) = 2. Then |Wab| = k for each ab ∈ E(G).

Lemma 2.8. Let G be a connected graph with at least one leaf and n > 2vertices. Then G is not distance-balanced.

Proof. Let uv ∈ E(G) which v be a leaf of G. Then |Wvu| = 0 which impliesthat |Wvu| < |Wuv|.

Lemma 2.9. If G is a connected distance-balanced graph, then κ(G) ≥ 2.

Proof. By contrary, suppose that κ(G) = 1 and u ∈ V (G) be the cut-vertex,and C1, C2, · · · , Cn be components of G− u. Let Cp be the component suchthat

|V (Cp)| ≤ |V (Ci)| (1 ≤ i ≤ n).

Then by selecting e = uv such that v ∈ V (Cp), we have |Wuv| > |Wvu|.

Theorem 2.10. Let G be a connected distance-balanced graph. Then for eachu, v ∈ V (G), there exists a cycle containing u and v.

Proof. The proof is clear up to lemma 2.8 and lemma 2.9.Wiener index W is a graph index defined for a graph on n vertices by

W = 1/2n∑i=1

n∑j=1

dij ,

where dij is the graph distance matrix. In [7], it has been conjectured that Cnhas the most wiener value among distance-balanced graphs.

Page 118: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

104 H. FARAMARZI, F. RAHBARNIA and M. TAVAKOLI

Theorem 2.11. Let G be a connected distance-balanced graph with n > 2 ver-tices. Then

W (G) ≤W (Cn).

Proof. Since W (G + e) ≤ W (G), then suppose G does not contain Cn as its

subgraph. Moreover, since W (G) = n×d(u,G)2 , and the fact that between every

u, v ∈ V (G), there exists a cycle in G containing u and v, thus

d(u,G) ≤ d(x,Cn),

where x ∈ V (Cn) and therefore

W (G) ≤W (Cn).

3. Strongly distance-balanced graphs under product graphs

All of the graph products constructed from two graphs G and H have vertexset V (G)× V (H). Let (a, u) and (b, v) be two vertices in V (G)× V (H). Theyare adjacent in the Cartesian product GH if they are equal in one coordinateand adjacent in the other and are adjacent in the direct product G×H if theyare adjacent in both coordinates. The edge set of the strong product GH isE(G×H)∪E(GH). These vertices are adjacent in the lexicographic productG H if ab ∈ E(G) or if a = b and uv ∈ E(H). The edge set of disjunctionG ∨H of graphs G and H is such that (u1, v1) is adjacent to (u2, v2) wheneveru1u2 ∈ E(G) or v1v2 ∈ E(H), see [3]. Moreover, the edge corona of two graphsG and H is denoted by G ⋄ H is obtained by taking a copy of G and |E(G)|copies of H and joining each end vertices of i-th edge of G to every vertex inthe i-th copy of H. We have denoted ab ∈ E(G ⋄H) if both a and b belong toG and (ab, x) ∈ E(G ⋄H) if x ∈ V (H) is connected to a, b ∈ V (G) (ab ∈ E(G))in G ⋄H. For more information, refer to [3].

By Gi and Hj , we mean i-th copy and j-th copy of G and H, respectively.Moreover, |Wab|G, |aW b|G and |aW b

1|G denotes |Wab| and |aW b| in graph G.

Theorem 3.1. G ∨H is strongly distance-balanced if and only if G and H arestrongly distance-balanced.

Proof. Let G,H be strongly distance-balanced graphs on n and m vertices,respectively. Then

|W 1(a,x)(b,y)| = |W

1ab|G1 + · · · |W 1

ab|Gm + |W 1xy|H1 + · · · |W 1

xy|Hn− deg(a)deg(x)− |(a,x)W 1

(b,y)|

|W 1(b,y)(a,x)| = |W

1ba|G1 + · · · |W 1

ba|Gm + |W 1yx|H1 + · · · |W 1

yx|Hn− deg(b)deg(y)− |(a,x)W 1

(b,y)|,

and consequently,

|W 2(a,x)(b,y)| = |V (G)| × |V (H)| − |W 1

(a,x)(b,y)| − |(a,x)W2(b,y)|.

Page 119: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOME RESULTS ON DISTANCED-BALANCED ... 105

Therefore,

|W 1(a,x)(b,y)|=m(deg(a)−|aW 1

b |G)+n(deg(x)−|xW 1y |H)−deg(a)deg(x)−|(a,x)W 1

(b,y)|,

|W 1(b,y)(a,x)|=m(deg(b)−|aW 1

b |G)+n(deg(y)−|xW 1y |H)−deg(b)deg(y)−|(a,x)W 1

(b,y)|.

Hence G ∨H is strongly distance-balanced. Now, suppose G ∨H be a stronglydistance-balanced. Since |W 1

(a,x)(b,y)| = |W 1(b,y)(a,x)|, then by summing up over

all ab ∈ E(G), we have:∑ab∈E(G)

m(deg(a)− deg(b)) + n(deg(x)− deg(y))

=∑

ab∈E(G)

(deg(b)deg(y)− deg(a)deg(x))

mn|E(G)|

2−mn |E(G)|

2+ n3(deg(x)− deg(y))

= n|E(G)|

2deg(y)− n |E(G)|

2deg(x)

n2(deg(x)− deg(y)) =|E(G)|

2(deg(y)− deg(x)).

Since |E(G)| < 2n2, therefore deg(y) = deg(x), deg(b) = deg(a) and G,H arestrongly distance-balanced.

Theorem 3.2. G ⋄H is strongly distance-balanced and hence distance-balancedif and only if G = P2 and H is complete.

Proof. Let G = P2 and H be a complete graph, ab ∈ E(G) and xy ∈ E(H).Then

|W 1(ab,x)(ab,y)| = |W

1xy∈H |,

|W 2(ab,x)(ab,y)| = |W

2(ab,y)(ab,x)| = 0.

Therefore |W(ab,x)(ab,y)| = |W 1(ab,x)(ab,y)| = degH(x) − |xW 1

y |H = |W(ab,y)(ab,x)| =|W 1

(ab,y)(ab,x)| = degH(y)− |xW 1y |H . Moreover,

|W 1a(ab,x)| = (degG(a)− 1) + (degG(a)− 1)|V (H)|,

|Wa(ab,x)| = (|V (G)|−2)+(|E(G)|−1)|V (H)|+(|V (H)|−degH(x)−1)−|aW(ab,x)|,

|W(ab,x)a| = 0.

Then|Wa(ab,x)| = |W(ab,x)a| = 0

and finally

|Wab|G⋄H = |Wab|G +∑

c,d∈Wab in G,cd∈E(G)

|V (H)|,

Page 120: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

106 H. FARAMARZI, F. RAHBARNIA and M. TAVAKOLI

which implies that|Wab|G⋄H = |Wba|G⋄H = 0.

On the other hand, suppose that G ⋄H is (strongly) distance-balanced graph.Then

|W 1(ab,x)(ab,y)| = degH(x)− |xW 1

y |H = |W 1(ab,y)(ab,x)| = degH(y)− |xW 1

y |H ,

which implies that H is regular and (degG(a) − 1) + (degG(a) − 1)|V (H)| = 0shows that degG(a) = 1 for each a ∈ V (G). Moreover, |Wa(ab,x)| = 0 impliesthat degH(x) = |V (H)| − 1 for each x ∈ V (H).

4. Minimum edges for distance-balanced

Let G be a graph and let b(G) be the smallest number of edges that can beadded to G such that the obtained graph is distance-balanced.

Lemma 4.1. Let G,H be graphs. Then

1. b(GH) = b(G)× |V (H)|+ b(H)× |V (G)|.

2. b(G H) = b(G)× |V (H)|+ r(H)× |V (G)|.

where r(H) = degmax(H)+1)×(V (H)−1)2 + 1 if degmax(H) and V (H) − 1 are odd

and r(H) = degmax(H)×(V (H)−1)2 , otherwise.

Proof.

1. Since GH is distance-balanced if and only if G and H are distance-balanced, the proof is clear.

2. Since G H is distance-balanced if and only if G is distance-balanced andH is regular, the proof is clear.

Theorem 4.2. Let G is a graph on n vertices with diam(G) = 2. then

1/2∑

uv∈E(G)

|deg(u)− deg(v)| ≤ b(G) ≤ |E(Kn)| − E(G).

Proof. Let uv ∈ E(G), then for G to be distanced-balanced, we should haved(u,G) = d(v,G). Therefore,

d(u,G) = deg(u) + 2× (|V (G)| − deg(u)− 1),

d(v,G) = deg(v) + 2× (|V (G)| − deg(v)− 1),

b(G) ≥∑

uv∈E(G)

1/2|(deg(u) + 2× (|V (G)− deg(u)− 1))

− (deg(v) + 2× (|V (G)| − deg(v)− 1))|

= 1/2∑

uv∈E(G)

|deg(u)− deg(v)|.

On the other hand, it is clear that b(G) ≤ |E(Kn)| − |E(G)|.

Page 121: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOME RESULTS ON DISTANCED-BALANCED ... 107

References

[1] K. Balakrishnan, M. Changat, I. Peterin, S. Spacapan, P. Sparl and A. R.Subhamathi, Strongly distance-balanced graphs and graph products, Euro-pean J. Combin., 30 (2009), 1048-1053.

[2] A. Ilic, S. Klavzar and M. Milanovic, On distance-balanced graphs, Euro-pean J. Combin., 31 (2010), 733-737.

[3] S. Klavzar and W. Imrich, Product graphs: structure and recognition, Wiley,New York, 2000.

[4] S. Klavzar, J. Jerebic and D.F. Rall, Distance-balanced graphs, Anna.Comb., 12 (2008), 71-79.

[5] M.H. Khalifeh, H. Yousefi-Azari, A.R. Ashrafi, and S. G. Wagner, Somenew results on distance-based graph invariants, European J. Combin., 30(2009), 1149-1163.

[6] H. Narumi and M. Katayama, Simple Topological Index: A Newly De-vised Index Characterizing The Topological Nature of Structural Isomers ofSaturated Hydrocarbons, Memoirs of the Faculty of Engineering, HokkaidoUniversity, 16 (1984) 209-214.

[7] M. Tavakoli, F. Rahbarnia and A.R. Ashrafi, Further results on Distance-Balanced graphs, Politehn. Univ. Bucharest Sci. Bull. Ser. A Appl. Math.Phys., 75 (2013), 77-84.

Accepted: 11.12.2016

Page 122: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (108–121) 108

A POWER INDEX AND ITS NORMALIZATION UNDERFUZZY MULTICRITERIA SITUATION

Yu-Hsien Liao∗

Department of Applied MathematicsNational Pingtung UniversityPingtung [email protected]

Tsu-Yin ChenDepartment of Cosmetic ScienceChang Gung University of Science and [email protected]

Ling-Yun ChungGraduate School of Technological and Vocational Education

National Yunlin University of Science and Technology

Taiwan

[email protected]

Abstract. By considering the supreme-utilities among fuzzy level vectors, we proposean index and its normalization in the framework of multicriteria fuzzy transferable-utility (TU) games. We show that there exists a reduced game that could be adopted toanalyze these two indexes. Further, alternative formulation for the normalized index isalso proposed by applying excess function. Based on reduced game and excess function,we introduce different dynamic processes for the normalized index.

Keywords: multicriteria fuzzy TU games, supreme-utilities, reduced game, excessfunction, dynamic process.

1. Introduction

In the framework of transferable-utility (TU) games, the power indexes may bedefined to measure the political power of each member of a voting system. Amember in a voting system is, e.g., a party in a parliament or a country in aconfederation. Each member will have a certain number of votes, and so itspower will be different. Results of the power indexes may be found in, e.g.,Banzhaf [3], Dubey and Shapley [8], Haller [9], Lehrer [11], van den Brink andvan der Laan [5] and so on. The theory of fuzzy TU games commenced withthe investigation of Aubin [1, 2] where the opinions of a fuzzy TU game and thefuzzy core are introduced. Many fuzzy solutions have been applied wildly, e.g.,

∗. Corresponding author

Page 123: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A POWER INDEX AND ITS NORMALIZATION ... 109

Borkotokey and Mesiar [4], Butnariu and Kroupa [6], Hwang [10], Li and Zhang[12], Meng and Zhang [14], Tijs et al. [19], and so on.

In the axiomatic formulation of cooperative games, consistency is a crucialcharacteristic of viable solutions. Consistency states the independence of a valuewith respect to fixing some agents with their assigned payoffs. It asserts that therecommendation made for any problem should always agree with the recommen-dation made in the subproblem that appears when the payoffs of some agentsare settled on. It has been introduced in different ways depending upon howthe payoffs of the agents that ”leave the bargaining” are defined. This propertyhas been investigated in various classes of problems by applying reduced gamesalways. In addition to axiomatizations for solutions, dynamic processes also canbe described that lead the agents to that solution, starting from an arbitraryefficient payoff vector. The foundation of a dynamic theory was laid by Stearns[18].

The above pre-existing results raise one motivation in the framework of fuzzyTU games:

• whether the power indexes could be extended under fuzzy behavior andmulticriteria situation simultaneously.

The paper is devoted to answer the question. Different from the framework offuzzy TU games, we consider the framework of multicriteria fuzzy TU games inSection 2. A power index and its normalization on multicriteria fuzzy TU games,the fuzzy marginal index and the fuzzy normalized index, are further introducedby considering the supreme-utilities among fuzzy level vectors. In order topresent the rationality for these two indexes, we propose an extended reductionto analyze these two indexes in Section 3. In order to establish the dynamicprocesses of the fuzzy normalized index, we present alternative formulation forthe fuzzy normalized index in terms of excess functions. In Section 4, we adoptreduced game and excess function to show that the fuzzy normalized index canbe reached by agents who start from an arbitrary efficient payoff vector.

2. The fuzzy marginal index and its normalization

Let U be the universe of agents. For i ∈ U and bi ∈ (0, 1], Bi = [0, bi] could betreated as the level (decision) space of agent i and B+

i = (0, bi], where 0 denotesno participation. Let BN =

∏i∈N Bi be the product set of the level (decision)

spaces of all agents of N . For all T ⊆ N , we define θT ∈ BN is the vector withθTi = 1 if i ∈ T , and θTi = 0 if i ∈ N \ T . Denote 0N the zero vector in RN . Form ∈ N, let 0m be the zero vector in Rm and Nm = 1, 2, · · · ,m.

A fuzzy TU game1 is a triple (N, b, v), where N is a non-empty and finiteset of agents, b = (bi)i∈N ∈

∏i∈N B

+i is the vector that presents the highest

1. A fuzzy TU game, which is defined by Aubin [1, 2], is a pair (N, va), where N is a coalitionand va is a mapping such that va : [0, 1]N −→ R and va(0N ) = 0. In fact, (N, va) =(N, θN , v) .

Page 124: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

110 YU-HSIEN LIAO, TSU-YIN CHEN and LING-YUN CHUNG

levels for each agent, and v : BN → R is a characteristic mapping with v(0N ) = 0which assigns to each α = (αi)i∈N ∈ BN the worth that the agents can gainwhen each agent i participates at level αi. Given a fuzzy TU game (N, b, v) andα ∈ BN , we write A(α) = i ∈ N | αi = 0 and αT to be the restriction of α atT for each T ⊆ N . Further, we define v∗(T ) = supα∈BN v(α)|A(α) = T is thesupreme-utility2 among all action vector α with A(α) = T . A multicriteriafuzzy TU game is a triple (N, b, V m), where m ∈ N, V m = (vt)t∈Nm and(N, b, vt) is a fuzzy TU game for all t ∈ Nm.

Denote the collection of all multicriteria fuzzy TU games by Γ. Let (N, b, V m)∈ Γ. A payoff vector of (N, b, V m) is a vector x = (xt)t∈Nm and xt = (xti)i∈N ∈RN , where xti denotes the payoff to agent i in (N, b, vt) for all t ∈ Nm andfor all i ∈ N . A payoff vector x of (N, b, V m) is multicriteria efficient if∑

i∈N xti = vt∗

(N)

for all t ∈ Nm. The collection of all multicriteria efficient vec-tor of (N, b, V m) is denoted by E(N, b, V m). A solution is a map σ assigningto each (N, b, V m) ∈ Γ an element

σ(N, b, V m

)=(σt(N, b, V m

))t∈Nm ,

where σt(N, b, V m

)=(σti(N, b, V m

))i∈N ∈ RN and σti

(N, b, V m

)is the payoff

of the agent i assigned by σ in(N, b, vt

).

Next, we provide the fuzzy marginal index and the fuzzy normalized indexunder multicriteria situation.

Definition 1. The fuzzy marginal index (FMI), β, is defined by

βti(N, b, Vm) = vt∗(N)− vt∗(N \ i)

for all (N, b, V m) ∈ Γ, for all t ∈ Nm and for all i ∈ N . Under the solution β,all agents receive their marginal contributions related to supreme-utilities inN respectively.

A solution σ satisfies multicriteria efficiency (MEFF) if for all (N, b, V m)∈ Γ and for all t ∈ Nm,

∑i∈N σi(N, b, V

m) = vt∗(N). Property MEFF assertsthat all agents allocate all the utility completely. It is easy to check that theFMI violates EFF. Therefore, we consider an efficient normalization as follows.

Definition 2. The fuzzy normalized index (FNI), β, is defined by

βti(N, b, Vm) =

vt∗(N)∑k∈N

βtk(N, b, Vm)· βti(N, b, V m)

for all (N, b, V m) ∈ Γ∗, for all t ∈ Nm and for all i ∈ N , where Γ∗ =(N, b, V m) ∈ Γ |

∑i∈N

βti(N, b, Vm) = 0 for all t ∈ Nm.

2. From now on we consider bounded fuzzy TU games, defined as those games (N, b, v) suchthat, there exists Kv ∈ R such that v(α) ≤ Kv for all α ∈ BN . We adopt it to ensure thatv∗(T ) is well-defined.

Page 125: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A POWER INDEX AND ITS NORMALIZATION ... 111

Lemma 1. The FNI satisfies MEFF on Γ∗.

Proof. For all (N, b, V m) ∈ Γ∗ and for all t ∈ Nm,∑i∈N

βti(N, b, Vm) =

∑i∈N

vt∗(N)∑k∈N

βtk(N,b,Vm)· βti(N, b, V m)

= vt∗(N)∑k∈N

βtk(N,b,Vm)

∑i∈N

βti(N, b, Vm)

= vt∗(N).

Thus, the FNI satisfies MEFF on Γ∗.

Here we provide a brief application of multicriteria fuzzy TU games in thesetting of “management”. This kind of problem can be formulated as follows.Let N = 1, 2, · · · , n be a set of all agents of a grand management system(N, b, V m). The function vt could be treated as an utility function which as-signs to each level vector α = (αi)i∈N ∈ BN the worth that the agents canobtain when each agent i participates at operation strategy αi ∈ Bi in thesub-management system (N, b, vt). Modeled in this way, the grand manage-ment system (N, b, V m) could be considered as a multicriteria fuzzy TU game,with vt being each characteristic function and Bi being the set of all operationstrategies of the agent i. In the following sections, we would like to show thatthe FMI and the FNI could provide “optimal allocation mechanisms” among allagents, in the sense that this organization can get payoff from each combina-tion of operation strategies of all agents under fuzzy behavior and multicriteriasituation.

3. Axiomatizations

In this section, we show that there exists a corresponding reduced game thatcould be adopted to analyze the FMI and the FNI.

First, we present alternative formulation for the FNI in terms of excess. Let(N, b, V m) ∈ Γ∗, S ⊆ N and x be a payoff vector in (N, b, V m). Define thatxt(S) =

∑i∈S x

ti for all t ∈ Nm. The excess of a coalition S ⊆ N at x is the

real number

(1) e(S, V m, x) = (e(S, vt, xt))t∈Nm and e(S, vt, xt) = vt∗(S)− xt(S).

The value e(S, vt, xt) can be treated as the complaint of coalition S when allagents receive their payoffs from xt in (N, b, vt).

Lemma 2. Let (N, b, V m) ∈ Γ∗, t ∈ Nm, x ∈ E(N, b, V m) and at = vt∗(N)∑k∈N

βtk(N,b,Vm)

.

Then

e(N \ i, vt, xt

at) = e(N \ j, vt, x

t

at) ∀ i, j ∈ N ⇐⇒ x = β(N, b, V m).

Page 126: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

112 YU-HSIEN LIAO, TSU-YIN CHEN and LING-YUN CHUNG

Proof. Let (N, b, V m) ∈ Γ∗ and x ∈ E(N, b, V m). For all t ∈ Nm and for alli, j ∈ N ,

(2)

e(N \ j, vt, xtat ) = e(N \ i, vt, xtat )⇐⇒ vt∗(N \ j)−

xt(N\j)at = vt∗(N \ i)−

xt(N\i)at

⇐⇒ vt∗(N \ j)−xtiat = vt∗(N \ i)−

xtjat

⇐⇒ xti − xtj = at · [vt∗(N \ j)− vt∗(N \ i)].

By definition of β,

(3) βti(N, b, Vm)− βtj(N, b, V m) = at · [vt∗(N \ j)− vt∗(N \ i)].

By equations (2) and (3), for all i, j ∈ N ,

xti − xtj = βti(N, b, Vm)− βtj(N, b, V

m).

Hence, ∑j =i

[xti − xtj ] =∑j =i

[βti(N, b, Vm)− βtj(N, b, V

m)].

That is, (|N | − 1) · xti −∑

j =i xtj = (|N | − 1) · βti(N, b, V m)−

∑j =i β

tj(N, b, V

m).

Since x ∈ E(N, b, V m) and β satisfies MEFF, |N |·xti−vt∗(N) = |N |·βti(N, b, V m)−vt∗(N). Therefore, xti = βti(N, b, V

m) for all t ∈ Nm and for all i ∈ N , i.e.,x = β(N, b, V m).

Remark 1. It is easy to check that e(N \i, V m, β(N, b, V m)) = e(N \j, V m,β(N, b, V m)) for all (N, b, V m) ∈ Γ and for all i, j ∈ N .

Inspired by the complement-reduced game due to Moulin [15], we intro-duced a fuzzy extension and related consistency as follows. Let ψ be a solution,(N, b, V m) ∈ Γ and S ⊆ N . The reduced game (S, bS , V

mS,ψ) is defined by

V mS,ψ = (vtS,ψ)t∈Nm and

vtS,ψ(α) =

0, if α = 0S ,

v∗(A(α) ∪ (N \ S)

)−

∑i∈N\S

σi(N, b, v), otherwise.

ψ satisfies consistency (CON) if ψti(S, bS , VmS,ψ) = ψti(N, bS , V

m) for all (N, b,V m) ∈ Γ, for all S ⊆ N with |S| = 2, for all t ∈ Nm and for all i ∈ S. Unfor-tunately, it is easy to check that

∑k∈S β

tk(N, b, v) = 0 for some (N, b, V m) ∈ G,

for some t ∈ Nm and for some S ⊆ N , i.e., β(S, bS , VmS,ψ) doesn’t exist for

some (N, b, V m) ∈ Γ and for some S ⊆ N . Therefore, we consider the resilientconsistency as follows. A solution ψ satisfies resilient consistency (RCON)if (S, bS , V

mS,ψ) and ψ(S, bS , V

mS,ψ) exist for some (N, b, V m) ∈ Γ and for some

S ⊆ N with |S| = 2, it holds that ψti(S, bS , VmS,ψ) = ψti(N, b, V

m) for all t ∈ Nmand for all i ∈ S.

Page 127: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A POWER INDEX AND ITS NORMALIZATION ... 113

Lemma 3.

1. The FMI satisfies CON on Γ.

2. The FNI satisfies RCON on Γ∗.

Proof. To verify result 1, let (N, b, V m) ∈ Γ∗ and S ⊆ N . If |N | = 1, then theproof is completed. Assume that |N | ≥ 2 and S = i, j for some i, j ∈ N . Forall t ∈ Nm and for all i ∈ S,

(4)

βti(S, bS , VmS,β)

= (vtS,β)∗(S)− (vtS,β)∗(S \ i)= sup

α∈BSvtS,β(α)|A(α) = S − sup

α∈BSvtS,β(α)|A(α) = S \ i

= vt∗(N)− vt∗(N \ i)= βti(N, b, V

m).

Thus, the FMI satisfies CON.

To prove result 2, let (N, b, V m) ∈ Γ∗ and S ⊆ N . If |N | = 1, then theproof is completed. Assume that |N | ≥ 2. If S = i, j for some i, j ∈ N and(S, bS , v

mS,β

) ∈ Γ∗. Similar to the proof of equation (4), for all t ∈ Nm and for all

i ∈ S,

(5) βti(S, bS , VmS,β

) = βti(N, b, Vm).

By definition of β and equation (5),

βti(S, bS , VmS,β

)

=(vtS,β

)∗(S)∑k∈S

βtk(S,bS ,VmS,β

)· βti(S, bS , V m

S,β)

=

vt∗(N)−∑

k∈N\Sβtk(N,b,V

m)∑k∈S

βtk(S,bS ,VmS,β

)· βti(S, bS , V m

S,β) (by definition of V m

S,β)

=

vt∗(N)−∑

k∈N\Sβtk(N,b,V

m)∑k∈S

βtk(N,b,Vm)

· βti(N, b, V m) (by equation (5))

=

∑k∈S

βtk(N,b,Vm)∑

k∈Sβtk(N,b,V

m)· βti(N, b, V m) (by MEFF of β)

= at · βti(N, b, V m), where at = vt∗(N)∑k∈N

βtk(N,b,Vm)

= βti(N, b, Vm).

Thus, the FNI satisfies RCON on Γ∗.

Next, we characterize the FMI and the FNI by applying the properties ofCON and RCON.

Page 128: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

114 YU-HSIEN LIAO, TSU-YIN CHEN and LING-YUN CHUNG

• A solution ψ satisfies marginal-standard for games (MSG) ifψ(N, b, v) = β(N, b, v) for all (N, b, v) ∈ Γ with |N | ≤ 2.

• A solution ψ satisfies normalized-standard for games (NSG) ifψ(N, b, v) = β(N, b, v) for all (N, b, v) ∈ Γ∗ with |N | ≤ 2.

Lemma 4. If a solution ψ satisfies NSG and RCON on Γ∗, then it also satisfiesMEFF on Γ∗.

Proof. Let (N, b, V m) ∈ Γ∗. If |N | ≤ 2, then ψ satisfies MEFF on Γ∗ by NSG.Suppose that |N | > 2. Assume, on the contrary, that there exists (N, bS , V

m) ∈Γ∗ such that

∑i∈N ψ

ti(N, b, V

m) = vt∗(N) for some t ∈ Nm. This means thatthere exist i ∈ N and j ∈ N such that [vt∗(N) −

∑k∈N\i,j ψ

tk(N, b, V

m)] =[ψti(N, b, V

m) + ψtj(N, b, Vm)]. By RCON and ψ satisfies MEFF for two-person

games, this contradicts with

ψti(N, b, Vm) + ψtj(N, b, V

m) = ψti(i, j, V mi,j,ψ) + ψtj(i, j, V m

i,j,ψ)

= vt∗(N)−∑

k∈N\i,jψtk(N, b, V

m).

Hence ψ satisfies MEFF.

Theorem 1.

1. On Γ, the FMI is the only solution satisfying MSG and CON.

2. On Γ∗, the FNI is the only solution satisfying NSG and RCON.

Proof. By Lemma 3, β and β satisfy CON and RCON on Γ and Γ∗ respectively.Clearly, β and β satisfy MSG and NSG on Γ and Γ∗ respectively.

To prove uniqueness of result 1, suppose ψ satisfies CON and MSG on Γ. Let(N, b, V m) ∈ Γ. If |N | ≤ 2, then ψ(N, b, V m) = β(N, b, V m) by MSG. Supposethat |N | > 2. Let t ∈ Nm and i ∈ N . Assume that S ⊆ N with |S| = 2 andi ∈ S. Then,

ψti(N, b, Vm) = ψti(S, bS , V

mS,ψ) (by CON of ψ)

= βti(S, bS , VmS,ψ) (by MSG of ψ)

= (vtS,ψ)∗(S)− (vtS,ψ)∗(S \ i)= vt∗(N)− vt∗(N \ i)= βti(N, b, V

m).

Hence, ψ(N, b, V m) = β(N, b, V m) for all (N, b, V m)Γ.To prove uniqueness of result 2, suppose ψ satisfies RCON and NSG on Γ∗.

By Lemma 4, ψ satisfies MEFF on Γ∗. Let (N, b, V m) ∈ Γ∗. We will completethe proof by induction on |N |. If |N | ≤ 2, it is trivial that ψ(N, b, V m) =β(N, b, V m) by NSG. Assume that it holds if |N | ≤ r − 1, r ≥ 3. The case

|N | = r: Let t ∈ Nm and i, j ∈ N with i = j. By Definition 2, βtk(N, b, Vm) =

Page 129: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A POWER INDEX AND ITS NORMALIZATION ... 115

vt∗(N)∑h∈N

βth(N,b,Vm)· βtk(N, b, V m) for all k ∈ N . Assume that αtk =

βtk(N,b,v)∑h∈N

βth(N,b,v)for

all k ∈ N . Therefore,

(6)

ψti(N, b, Vm) = ψti

(N \ j, V m

N\j,ψ)

(by RCON of ψ)

= βti(N \ j, V m

N\j,ψ)

(by NSG of ψ)

=(vtN\j,ψ)∗

(N\j

)∑

k∈N\jβtk

(N\j,Vm

N\j,ψ

) · βti(N \ j, V mN\j,ψ

)=

vt∗(N)−ψti(N,b,Vm)∑k∈N\j

βtk(N,b,Vm)· βti(N, b, V m) (by equation (5))

=vt∗(N)−ψti(N,b,Vm)

−βtj(N,b,Vm)+∑k∈N

βtk(N,b,Vm)· βti(N, b, V m).

By equation (6),

ψti(N, b, Vm) · [1− αtj ] = [vt∗(N)− ψtj(N, b, V m)] · αtj

=⇒∑i∈N

ψti(N, b, Vm) · [1− αtj ] = [vt∗(N)− ψtj(N, b, V m)] ·

∑i∈N

αtj

=⇒ vt∗(N) · [1− αtj ] = [vt∗(N)− ψtj(N, b, V m)] · 1 (by MEFF of ψ)

=⇒ vt∗(N)− vt∗(N) · αtj = vt∗(N)− ψtj(N, b, V m)

=⇒ βtj(N, b, Vm) = ψtj(N, b, V

m).

The proof is completed.

The following examples are to show that each of the axioms used in Theorem1 is logically independent of the remaining axioms.

Example 1. Define a solution ψ by for all (N, b, V m) ∈ Γ, for all t ∈ Nm andfor all i ∈ N , ψti(N, b, V

m) = 0. Clearly, ψ satisfies CON and RCON on Γ andΓ∗, but it violates MSG and NSG on Γ and Γ∗.

Example 2. Define a solution ψ by for all (N, b, V m) ∈ Γ, for all t ∈ Nm andfor all i ∈ N ,

ψti(N, b, Vm) =

βti(N, b, V

m), if |N | ≤ 2,

0, otherwise.

On Γ, ψ satisfies MSG, but it violates CON.

Example 3. Define a solution ψ by for all (N, b, V m) ∈ Γ∗, for all t ∈ Nm andfor all i ∈ N ,

ψti(N, b, Vm) =

βi(N, b, V

m), if |N | ≤ 2,

0, otherwise.

On Γ∗, ψ satisfies NSG, but it violates RCON.

Page 130: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

116 YU-HSIEN LIAO, TSU-YIN CHEN and LING-YUN CHUNG

4. Dynamic processes

In this section, we adopt excess function and reduction to propose dynamicprocesses for the FNI.

In order to establish the dynamic processes of the FNI, we firstly definecorrection function by means of excess functions. The correction function isbased on the idea that, each agent shortens the complaint relating to his ownand others’ nonparticipation, and adopts these regulations to correct the originalpayoff.

Definition 3. Let (N, b, V m) ∈ Γ∗ and i ∈ N . The correction function isdefined to be f = (f t)t∈Nm, where f

t = (f ti )i∈N and f ti : E(N, b, V m) → R isdefine by

f ti (x) = xti + w∑

j∈N\i

at ·(e(N \ j, vt, x

t

at)− e(N \ i, vt, x

t

at)),

where at = vt∗(N)∑k∈N

βtk(N,b,Vm)

and w ∈ R is a fixed postive number, which reflects the

assumption that agent i does not ask for full correction (when w = 1) but only(usually) a fraction of it. Define [x]0 = x, [x]1 = f([x]0), · · · , [x]q = f([x]q−1)for all q ∈ N.

Lemma 5. f(x)∈E(N, b, V m) for all (N, b, V m)∈Γ∗ and for all x∈E(N, b, V m).

Proof. Let (N, b, V m) ∈ Γ∗, t ∈ Nm, i, j ∈ N and x ∈ E(N, b, V m).

(7)

∑j∈N\i

at ·(e(N \ j, vt, xtat )− e(N \ i, v

t, xt

at ))

=∑

j∈N\iat ·(vt(N \ j)− xt(N\j)

at − vt(N \ i) + xt(N\i)at

)=

∑j∈N\i

at ·(vt(N \ j)− vt(N \ i)− xti

at +xtjat

).

By definition of β,

(8) βti(N, b, Vm)− βtj(N, b, V

m) = at ·(vt(N \ j)− vt(N \ i)

).

By equations (7) and (8),

(9)

∑j∈N\i

at ·(e(N \ j, vt, xtat )− e(N \ i, v,

xt

at ))

=∑

j∈N\i

(βti(N, b, V

m)− βtj(N, b, V m)− xti + xtj

)=

((|N | − 1)

(βti(N, b, V

m)− xti)−

∑j∈N\i

βtj(N, b, Vm) +

∑j∈N\i

xtj

)=

(|N |(βti(N, b, V

m)− xti)− vt∗(N) + vt∗(N)

)(by MEFF of β, x ∈ E(N, b, V m))

= |N | ·(βti(N, b, V

m)− xti).

Page 131: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A POWER INDEX AND ITS NORMALIZATION ... 117

Moreover,

(10)

∑i∈N

∑j∈N\i

at ·(e(N \ j, vt, xtat )− e(N \ i, v

t, xt

at ))

=∑i∈N|N | ·

(βti(N, b, V

m)− xti)

= |N | ·( ∑i∈N

βti(N, b, Vm)−

∑i∈N

xti

)= |N | ·

(vt∗(N)− vt∗(N)

)(by MEFF of β, x ∈ E(N, b, V m))

= 0.

So we have that∑i∈N

f ti (x) =∑i∈N

[xti + w

∑j∈N\i

at ·(e(N \ j, vt, xtat )− e(N \ i, v

t, xt

at ))]

=∑i∈N

xti + w∑i∈N

∑j∈N\i

at ·(e(N \ j, vt, xtat )− e(N \ i, v

t, xt

at ))

= vt∗(N) + 0(by equation (10) and x ∈ E(N, b, V m)

)= vt∗(N).

Hence, f(x) ∈ E(N, b, V m) if x ∈ E(N, b, V m).

Theorem 2. Let (N, b, V m) ∈ Γ∗. If 0 < t < 2|N | , then [x]q∞q=1 converges

geometrically to β(N, b, V m) for each x ∈ E(N, b, V m).

Proof. Let (N, b, V m) ∈ Γ∗, t ∈ Nm, i ∈ N and x ∈ E(N, b, V m). By equation(9) and definition of f ,

f ti (x)− xti = w∑

j∈N\iat ·(e(N \ j, vt, xtat )− e(N \ i, v

t, xt

at ))

= w · |N | ·(βti(N, b, V

m)− xti).

Hence,

βti(N, b, Vm)− f ti (x) = βti(N, b, V

m)− xti + xti − f ti (x)

= βti(N, b, Vm)− xti − w · |N | · (βti(N, b, V m)− xti)

=(

1− w · |N |)[βti(N, b, V

m)− xti].

So, for all q ∈ N,

β(N, b, V m)− [x]q =(

1− w · |N |)q[

β(N, b, V m)− x].

If 0 < w < 2|N | , then −1 <

(1− w · |N |

)< 1 and [x]q∞q=1 converges geometri-

cally to β(N, b, V m).

Inspired by Maschler and Owen [13], we will find a dynamic process underreductions.

Page 132: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

118 YU-HSIEN LIAO, TSU-YIN CHEN and LING-YUN CHUNG

Definition 4. Let ψ be a solution, (N, b, V m) ∈ Γ∗, S ⊆ N and x ∈ E(N, b, V m).The (x, ψ)-reduced game (S, bS , V

mψ,S,x) is given by V m

ψ,S,x = (vtψ,S,x)t∈Nm andfor all T ⊆ S,

vtψ,S,x(α) =

vt∗(N)−

∑i∈N\S

xti, A(α) = S,

vtS,ψ(α), otherwise.

Inspired by Maschler and Owen [13], we also define different correctionfunction as follow. The R-correction function to be g = (gt)t∈Nm , wheregt = (gti)i∈N and gti : E(N, b, V m)→ R is define by

gti(x) = xti + w∑

k∈N\i

(βti(i, k, vt

β,i,k,x)− xti

).

Define [η]0 = x, [η]1 = g([η]0), · · · , [η]q = g([η]q−1) for all q ∈ N.

Lemma 6. g(x)∈E(N, b, V m) for all (N, b, V m)∈Γ∗ and for all x∈E(N, b, V m).

Proof. Let (N, b, V m) ∈ Γ∗, t ∈ Nm, i, k ∈ N and x ∈ X(N, b, v). Let S =i, k, by MEFF of β and Definition 4,

βti(S, bS , Vmβ,S,x

) + βtk(S, bS , Vmβ,S,x

) = xti + xtk.

By RCON and NSG of β,

βti(S, bS , vcomβ,S,x

)− βtk(S, bS , Vmβ,S,x

) = (vtβ,S,x

)∗(i)− (vtβ,S,x

)∗(k)= (vt

S,β)∗(i)− (vt

S,β)∗(k)

= βti(S, bS , VmS,β

)− βtk(S, bS , VmS,β

)

= βti(N, b, Vm)− βtk(N, b, V

m).

Therefore,

(11) 2 ·[βti(S, bS , V

mβ,S,x

)− xti]

= βti(N, b, Vm)− βtk(N, b, V

m)− xti + xtk.

By definition of g and equation (11),

(12)

gti(x) = xti + w2 ·[ ∑k∈N\i

βti(N, b, Vm)−

∑k∈N\i

xti

−∑

k∈N\iβtk(N, b, V

m) +∑

k∈N\ixtk

]= xti + w

2 ·[ ∑k∈N\i

βti(N, b, Vm)−

(|N | − 1

)xti

−∑

k∈N\iβtk(N, b, v) +

(vt∗(N)− xti

)]= xti + w

2 ·[(|N | − 1

)βti(N, b, V

m)−(|N | − 1

)xti

−(vt∗(N)− βti(N, b, V m)

)+(vt∗(N)− xti

)]= xti + |N |·w

2 ·[βti(N, b, V

m)− xti].

Page 133: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A POWER INDEX AND ITS NORMALIZATION ... 119

So we have that∑i∈N

gti(x) =∑i∈N

[xti + |N |·w

2 ·[βti(N, b, V

m)− xti]]

=∑i∈N

xti + |N |·w2 ·

[ ∑i∈N

βti(N, b, Vm)−

∑i∈N

xti]

= vt∗(N) + |N |·w2 ·

[vt∗(N)− vt∗(N)

]= vt∗(N).

Thus, g(x)∈ E(N, b, V m) for all x ∈ E(N, b, V m).

Theorem 3. Let (N, b, V m) ∈ Γ∗. If 0 < α < 4|N | , then [η]q∞q=1 converges to

β(N, b, V m) for each x ∈ E(N, b, V m).

Proof. Let (N, b, V m) ∈ Γ∗, t ∈ Nm and x ∈ E(N, b, V m). By equation (12),

gti(x) = xti + |N |·w2 ·

[βti(N, b, V

m)− xti]

for all i ∈ N . Therefore,

(1− |N | · w

2

)·[βti(N, b, V

m)− xti]

=[βti(N, b, V

m)− gti(x)]

So, for all q ∈ N,

β(N, b, V m)− [η]q =(

1− |N | · w2

)q[β(N, b, V m)− x

].

If 0 < w < 4|N | , then −1 <

(1− |N |·w

2

)< 1 and [η]q∞q=1 converges to β(N, b, v)

for all (N, b, V m) ∈ Γ∗, for all t ∈ Nm and for all i ∈ N .

5. Conclusions

In this paper, we investigate the normalizations for the fuzzy marginal indexand the fuzzy normalized index. Based on reduced game, two axiomatizationsfor these two indexes are proposed. By applying reduction and excess function,we also introduce alternative formulations and related dynamic processes forthe normalized index. One should compare our results with related pre-existingresults:

• The fuzzy marginal index and the fuzzy normalized index are introducedinitially in the framework of multicriteria fuzzy TU games.

• The idea of our correction functions in Definitions 3, 4 and related dynamicprocesses are based on that of Maschler and Owen’s [13] dynamic resultsfor the Shapley value [17]. The major difference is that our correctionfunctions in Definition 4 are based on “excess function”, and Maschlerand Owen’s [13] correction function is based on “reduced games”.

These mentioned above raise one question:

• Whether there exist other normalizations and related results for some moresolutions in the framework of multicriteria fuzzy TU games.

To our knowledge, these issues are still open questions.

Page 134: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

120 YU-HSIEN LIAO, TSU-YIN CHEN and LING-YUN CHUNG

Acknowledgements

The authors are very grateful to the Editor and the anonymous referees forvaluable comments which much improved the paper.

References

[1] J.P. Aubin, Coeur et valeur des jeux flous a paiements lateraux, ComptesRendus de l’Academie des Sciences, 279 (1974), 891-894

[2] J.P. Aubin, Cooperative fuzzy games, Mathematics of Operations Research,6 (1981), 1-13.

[3] J.F. Banzhaf, JF (1965) Weighted voting doesn’t work: A mathematicalanalysis, Rutgers Law Review, 19 (1965), 317-343, Problemy Kybernetiki10, 119-139 (in Russian).

[4] S. Borkotokey, R. Mesiar, The Shapley value of cooperative games underfuzzy settings: a survey, International Journal of General Systems, 43(2014), 75-95.

[5] R. van den Brink, G. van der Lann, Axiomatizations of the normalizedbanzhaf value and the Shapley value, Social Choice and Welfare, KluwerAcademic Publishers, Dordrecht, 15 (1998), 567-582.

[6] D. Butnariu, T. Kroupa, Shapley mappings and the cumulative value for n-person games with fuzzy coalitions, Eur. J. Oper. Res., 186 (2008), 288-299,Mathematical Social Sciences 34, 175-190

[7] M. Davis, M. Maschler, The kernel of a cooperative game, Naval ResearchLogistics Quarterly, 12 (1965), 223-259.

[8] P. Dubey, L.S. Shapley, Mathematical properties of the Banzhaf power in-dex, Mathematics of Operations Research, 4 (1979), 99-131 Econometrica,57, 589-614.

[9] H. Haller, Collusion properties of values, International Journal of GameTheory, 23 (1994), 261-281.

[10] Y.A. Hwang, Fuzzy games: a characterization of the core, Fuzzy Sets andSystems, 158 (2007), 2480-2493, International Journal of Game Theory, 29,597-623.

[11] E. Lehrer, An axiomatization of the Banzhaf value, International Journalof Game Theory, 17 (1988), 89-99.

[12] S. Li, Q. Zhang, A simplified expression of the Shapley function for fuzzygame, Eur. J. Oper. Res., 196 (2009), 234-245.

Page 135: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A POWER INDEX AND ITS NORMALIZATION ... 121

[13] M. Maschler, G. Owen, The consistent Shapley value for hyperplane games,International Journal of Game Theory, 18 (1989), 389-407.

[14] F. Meng, Q. Zhang, The Shapley value on a kind of cooperative fuzzy games,Journal of Computational Information Systems, 7 (2011), 1846-1854.

[15] H. Moulin, On additive methods to share joint costs, The Japanese Eco-nomic Review, 46 (1995), 303-332.

[16] S. Muto, S. Ishihara, S. Fukuda, S. Tijs and R. Branzei, Generalized coresand stable sets for fuzzy games, International Game Theory Review, 8(2006), 95-109.

[17] L.S. Shapley, A value for n-person game, In: Kuhn, H.W., Tucker, A.W.(eds.), Contributions to the Theory of Games II, Princeton, 307-317, 1953.

[18] R.E. Stearns, Convergent transfer schemes for n-person games, Trans.Amer. Math. Soc., 134 (1968), 449-459.

[19] S. Tijs, R. Branzei, S. Ishihara, S. Muto, On cores and stable sets for fuzzygames, Fuzzy Sets and Systems, 146 (2004), 285-296.

Accepted: 22.01.2017

Page 136: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (122–125) 122

SOME SUFFICIENT CONDITIONS IMPLYINGNILPOTENCY OF FINITE GROUPS

Qingjun Kong∗

Department of MathematicsTianjin Polytechnic UniversityTianjin 300387People’s Republic of [email protected]

Shuai WangDepartment of Mathematics

Tianjin Polytechnic University

Tianjin 300387

People’s Republic of China

Abstract. Let G be a finite group. For a weak n-Engel condition, we mean that[x,n y] ∈ Z(G) for two elements x and y of G, where n is a positive integer. In thispaper, we mainly study the influence of the weak n-Engel condition on the nilpotenceand p-nilpotence of finite groups. Our results generalize some well-known results.

Keywords: weak n-Engel condition, nilpotent groups, p-nilpotent group.

1. Introduction

As we know, the n-Engel condition is that [x,n y] = 1 for two elements x andy of G, where n is a positive integer. Obviously, a finite group which satisfiesthe n-Engel condition must satisfy the weak n-Engel condition, but the inverseis not true. Many scholars investigate the influence of the n-Engel conditionon the nilpotence of finite groups. In [1], Huppert. B proved that let x and ybe arbitrary element of G, if there is a positive integer n such that [x,n y] = 1,then G is nilpotent. In [2], It is proved that let G = AB, where A and B arenilpotent subgroups of G. If [A,B]=1, then G is nilpotent. In this paper, wemainly discuss the influence of the weak n-Engel condition on the nilpotenceand p-nilpotence of finite groups and generalize some well-known results.

We shall use the following notation for commutators:[x, y] = x−1y−1xy,[x1, x2, · · · , xn] = [[x1, · · · , xn−1], xn](n ≥ 3),[x,0 y] = x,[x,n y] = [[x,n−1 y], y](n ≥ 1)The rest of the notation is standard (see [2]), all groups mentioned are as-

sumed to be finite groups.

∗. Corresponding author

Page 137: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOME SUFFICIENT CONDITIONS IMPLYING NILPOTENCY OF FINITE GROUPS 123

2. Basic definitions and preliminary results

In this section, we give one definition and some results that are needed in thispaper.

Definition 2.1. Let G be a finite group. For a weak n-Engel condition, wemean that [x,n y] ∈ Z(G) for two elements x and y of G, where n is a positiveinteger.

Lemma 2.2 ([2]). Let G = AB, where A and B are nilpotent subgroups of G.If [A,B]=1, then G is nilpotent.

Lemma 2.3 ([2]). If G/Φ(G) is nilpotent, then G is nilpotent.

3. Main results

Theorem 3.1. Let G = AB, where A is a normal nilpotent subgroup of G andB is a nilpotent subgroup of G with(|A|, |B|) = 1. If for each element x in Aand each element y in B there is a positive integer n such that [x,n y] ∈ Z(G),then G is nilpotent.

Proof. Since [x, y] ∈ Z(G) means [x,2 y] ∈ Z(G), we may assume n ≥ 2.Let a = [x,n−2 y], by the hypothesis we have [(y−1)ay, y] = [a, y, y] ∈ Z(G).It follows that (y−1)ayy = y(y−1)ayz for some z ∈ Z(G), that is, (y−1)ay =y(y−1)az, i,e., [(y−1)a, y] ∈ Z(G). We consider the following cases:

(i) If |B|2 = 1 or |B|2 > 1 and q is an odd prime, then o(y)|C2o(y) and

((y−1)a)o(y) = ((y−1)a)o(y)yo(y)([y, (y−1)a]o(y))C2o(y)

/o(y)= 1. Hence (y−1)ay is a

q-element of G.(ii) If |B|2 > 1 and q is 2, then ((y−1)ay)2o(y) = 1 and (y−1)ay is a 2-element

of G.On the other hand, since A is a normal subgroup of G, (y−1)ay = [a, y] ∈

A. And (y−1)ay is a p-element. Therefore, by the above discussion, [a, y] =(y−1)ay = 1. That is, [x,n−1 y] = 1. Now, a simple induction on n, we have[x, y]=1. Since (|A|, |B|) = 1, it follows that [A,B]=1. By Lemma 2.2 we haveG is nilpotent.

If we drop the restriction that A is a normal subgroup of G, we can provethe following result.

Theorem 3.2. Let G = AB, where A and B are nilpotent subgroups of G with(|A|, |B|) = 1. If for each element x in A and each element y in B there is apositive integer n such that [x,n y] ∈ Z(G), then G is nilpotent.

Proof. Let M be an arbitrary maximal subgroup of G. Since G is solvable,it follows that |G : M | = pn for some prime p. Since (|A|, |B|) = 1, we canassume that p does not divide, say, |B|. Let M1 be a p′-Hall subgroup of M . By

Page 138: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

124 Q.J. KONG and S. WANG

π-Sylow Theorem [1, Theorem 4.1, p.231], we have B ≤ Mx1 for some x in G.

Since Mx has the same properties as M , we can replace M by Mx and so wecan assume without loss of generality that B ≤ M . Since G = AB, it followsthat M = B(A ∩M). Clearly, B and A ∩M are nilpotent subgroups of M ,(|B|, |A ∩M |) = 1. By the hypothesis, for each element x in A ∩M and eachelement y in B there is a positive integer n such that [x,n y] ∈ Z(G)∩M ≤ Z(M).By induction on |G|, M is nilpotent. If G is not nilpotent, then G is a minimalnon-nilpotent group. By Ito′s Theorem [1, Theorem 5.2, p.281], G = PQ, whereP is normal in G, and P is a Sylow p-subgroup of G, Q is non-normal cyclicSylow q-subgroup of G, p = q. We can assume that P = A and Q = B, so thatAG. Due to each element x in A and each element y in B there is a positiveinteger n such that [x,n y] ∈ Z(G), Theorem 3.1 implies that G is nilpotent, acontradiction. This is impossible as G is minimal non-nilpotent group. Thiscompletes the proof of the Theorem.

Theorem 3.3. Let N E G, N and G/N are nilpotent groups. If for eachelement x in N and each element y in G, there is a positive integer n such that[x,n y] ∈ Z(G), then G is nilpotent.

Proof. We first prove that there is a nilpotent subgroup A of G such thatG = NA. Let F = A|A ⊆ G,G = NA. Clearly, G ∈ F , then F is anon-empty set. Now let A be a minimal element in the set F , we show thatA is nilpotent. Assume that N ∩ A * Φ(A), there exists a maximal subgroupB of A such that N ∩ A * B. Since N ∩ A A, we have A = (N ∩ A)B.Since G = NA = N(N ∩ A)B = NB, then B ∈ F , a contradiction. HenceN ∩ A ⊆ Φ(A). Since G = NA, so that G/N ≃ A/N ∩ A. But A/N ∩ A ∼(A/N ∩ A)/(Φ(A)/N ∩ A), then G/N ∼ (A/N ∩ A)/(Φ(A)/N ∩ A) ≃ A/Φ(A).This implies that G/N ∼ A/Φ(A). G/N is nilpotent implies that A/Φ(A) isnilpotent. By Lemma 2.3 we have A is nilpotent. By the hypothesis, G = NA,N and A are nilpotent subgroups of G, so for each element x in N and eachelement y in A there is a positive integer n such that [x,n y] ∈ Z(G). By Theorem3.1 we know that G is nilpotent.

Theorem 3.4. Let G be a finite group, x is an arbitrary element of order p ororder 4(p=2) and y is an arbitrary p′-element of G. If there is positive integern such that [x,n y] ∈ Z(G), then G is p-nilpotent.

Proof. Suppose that the theorem is false and let G be a counter-example ofminimal order. Then G is not p-nilpotent. But each of whose proper subgroupof G is p-nilpotent, by Ito′s Theorem [1, Theorem 5.2, p.281], G = PQ, P ∈Slyp(G), Q ∈ Sylq(G), P E G, exp(P ) = p or 4. Let x ∈ P , y ∈ Q. By thehypothesis, there is a positive integer n such that [x,n y] ∈ Z(G). Theorem 3.1implies that G is nilpotent.

Page 139: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOME SUFFICIENT CONDITIONS IMPLYING NILPOTENCY OF FINITE GROUPS 125

This Theorem may be considered as a generalization of the following well-known result of Ito: Let G be a finite group. If each element of G of order p ororder 4(p=2) lies in Z(G), then G is p-nilpotent[1, Theorem 5.5, p.435].

Theorem 3.5. Let G be a finite group and P be an arbitrary p-subgroup ofG. Let x be an arbitrary element of P of order p or order 4(p=2) and y bean arbitrary p′-element of NG(P ). If there is a positive integer n such that[x,n y] ∈ Z(G), then G is p-nilpotent.

Proof. Let y be an arbitrary p′-element of NG(P ). We can consider the groupP ⟨y⟩. Let x be an arbitrary element of P ⟨y⟩ of order p order 4. Clearly, x ∈ P ,since P ⟨y⟩ ≤ NG(P ). Thus an arbitrary p′-element in P ⟨y⟩ that it is an arbitraryp′-element in NG(P ). We can assume that y′ is an arbitrary p′-element inNG(P ). By the hypothesis, there is a positive integer n such that [x,n y

′] ∈ Z(G).Theorem 3.4 implies that P ⟨y′⟩ is p-nilpotent. It follows that ⟨y′⟩P ⟨y′⟩. HenceP ⟨y′⟩ = P × ⟨y′⟩, NG(P )/CG(P ) is p-group. By Frobenius, Theorem, G is p-nilpotent. This completes the proof of the Theorem.

This Theorem may be considered as a generalization of Theorem 10.24 [1,Theorem 10.24, p.124].

4. Acknowledgements

The paper is dedicated to Professor Xiuyun Guo for his 60th birthday.The research of the author is supported by the National Natural Science

Foundation of China(11301378).

References

[1] B. Huppert, Endliche Gruppen I, Berlin-Heidelberg-New York, 1967.

[2] D.J.S Robinson, A course in the theory of groups, Springer-Verlag, Newyork, 1993.

Accepted: 19.02.2017

Page 140: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (126–140) 126

GLOBAL EXPONENTIAL STABILITY OFCOHEN-GROSSBERG NEURAL NETWORKS WITHTIME-VARYING DELAYS

Xiaohui WangCollege of ScienceHunan Agricultural UniversityChangsha, Hunan 410128People’s Republic of China

Xumeng Li∗

College of ScienceHunan Agricultural UniversityChangsha, Hunan 410128People’s Republic of [email protected]

Wenxin ZhouCollege of Science

Hunan Agricultural University

Changsha, Hunan 410128

People’s Republic of China

Abstract. In this paper, without the assumptions for boundedness, monotonicity,and differentiability on activation functions and symmetry of interconnections, a classof Cohen-Grossberg neural networks with time-varying delays is studied. A new usefulcriteria on the uniqueness of equilibrium is obtained by utilizing the nonlinear measure.Combining with Dini derivatives and Young inequality, new sufficient condition for theglobal exponential stability is established by directly estimating the upper bound ofsolutions of the system. All results are presented in M-matrix form, which extendedand generalized the corresponding results in previous literature.

Keywords: Cohen-Grossberg neural networks, time-varying delays, unique equilib-rium, global exponential stability, nonlinear measure, M -matrix.

1. Introduction

The classic Cohen-Grossberg neural network was initially proposed and studiedby Cohen and Grossberg in 1983([1]), which can be described by the followingordinary differential equations:

(1) xi(t) = ai(xi(t))−bi(xi(t)) +

n∑j=1

wijfj(xj(t)) + Ii, i = 1, 2, . . . , n.

∗. Corresponding author

Page 141: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

GLOBAL EXPONENTIAL STABILITY OF COHEN-GROSSBERG NEURAL NETWORKS... 127

Here n ≥ 2 is the number of neurons in the network, xi(t) is the state of neuroni at time t, ai(·) represents an amplification function, bi(·) is an appropriatelybehaved function to keep the solutions of system (1) bounded, the activationfunction fj(·) shows how neuron i reacts to the input, W = (wij)n×n is a realconstant matrix and denotes the normal weights of the neuron interconnections.System(1) is a very general neural network model. Models such as the Hopfieldneural networks, cellular neural networks, and bidirectional associative memoryneural networks are its special cases(see for instance [4],[7],[8]). All these neuralneural networks have attracted much attention for they successful or promis-ing potential applications in the pattern recognition, associative memory,signalprocessing,and optimization([5],[9],[10]).

In reality, however, time delays universally exist in biological and artificialneural networks due to the finite switching speed of neurons and amplifiers. Itis well known that, with symmetric connection matrix and the so called sigmoidactivation functions, system (1) has the property of absolute stability([1]), i.e.given any initial conditions, the solution of system (1) converges to some equilib-rium of the system. On the other hand, the existence of time delays is frequentlya source of oscillation and instability([6]). Marcus and Westervelt ([2]) first in-troduced a single delay into the model and observed sustained oscillations evenwith symmetric connections. Moreover, the delays in artificial neural networksare usually time-varying([3]). Therefore, it is natural and important to incor-porate time-varying delays into the model. A general Cohen-Grossberg neuralnetwork with time-varying delays can be described by the following retardeddifferential difference equations:

xi(t) = ai(xi(t)) − bi(xi(t)) +

n∑j=1

wijfj(xj(t))

+

n∑j=1

wdijfj(xj(t− dij(t))) + Ii, i = 1, 2, . . . , n

(2)

where n, xi(t), ai(·), bi(·) and W = (wij)n×n are the same as these in system(1), W d = (wdij)n×n is a real constant matrix and denotes the delayed weightsof the neuron interconnections, dij(t) is the time delay required in processingand transmitting signals from neuron j to neuron i at time t.

The stability of neural networks is a prerequisite for almost all applications.In applications of neural networks to parallel computation, signal processingand other problems involving the solutions of optimization problems, it is fre-quently required that the network have a unique global attractive equilibrium.Meanwhile, in designing and implementing a network, it is preferable and de-sirable that the neural network not only converges to an equilibrium, but alsoconverges as fast as possible. It is well known that the exponential stability givesa fast convergence rate to the equilibrium. Thus, the global exponential stabil-ity of system(1), system (2) and their special cases are of great importance,

Page 142: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

128 XIAOHUI WANG, XUMENG LI and XINGJIE WU

and has been widely investigated. Many useful results have been obtainedby some authors in the previous literature([14][16], [17],[18],[19],[20],[21],[22],[23],[24],[25],[26]).

In applications, the activation functions maybe just continuous. On theother hand, the assumption of symmetry connections also lays a restriction onthe connection topology of the networks. In this paper, without any assumptionon the boundedness, monotonicity, and differentiability of activation functionsand symmetry of interconnections, we will study the existence and global ex-ponential stability of an equilibrium for System (2). A new useful criteria onthe uniqueness of equilibrium is obtained by utilizing the nonlinear measure,which was initially introduced in [11]. Combining with Dini derivatives andYoung inequality, new sufficient conditions for the global exponential stabilityare established by inroducing many real paremeters and directly estimating theupper bound of solutions of the system. This mathod has been utilized bysome authors (see for instance,[14],[22],[17]), but we do introduce a differenttype parameters. Our results extend and generalize the corresponding results inprevious literature. By the way, for the common use of M-matrix in the studyof qualitative properties of various neural networks, we represent our results inM-matrix form.

The remainder of this paper is organized as follows. In section 2, the basicnotations, definitions, and some useful lemmas are introduced. Some assump-tions used in the main results are listed there, too. In section 3, the main resultsof this paper are proposed and proved. Some remarks and corollaries are given.In section 4, some examples are given to demonstrate the main results.

2. Preliminaries

In this section, we state some notations, definitions and lemmas.

Let N = 1, 2, . . . , n, R denote the set of real numbers, Rn denote the n-dimensional real vector space, ⟨·, ·⟩ and ∥·∥r (r ≥ 1) denote the usual inner prod-uct and lr norm of vectors in Rn respectively. For x ∈ Rn, xi denotes the ith co-ordinate of x, xT denotes the transpose of x, sign(x) = (sign(x1), . . . , sign(xn))T

denotes the sign vector of x, where sign(·) is the sign function of real num-bers. Rn+ = x|x ∈ Rn, xi > 0, for i ∈ N. Rn×n denotes the set of alln × n real matrices, diaga1, . . . , an denotes the usual diagonal matrix. ForA = (aij) ∈ Rn×n, |A| = (|aij |), AT denotes the transpose of A, A−1 denotesthe inverse of A (if it has). For two matrices A = (aij), B = (bij) ∈ Rn×n, wesay A ≤ B if aij ≤ bij , for i, j ∈ N .

Throughout this paper, we always assume that for i, j ∈ N, ai, bi, fi, dij :R → R are continuous functions, and there exist a real number d such that0 ≤ dij(t) ≤ d, t ∈ R. Let x(t) = (x1(t), . . . , xn(t))T denote the solution ofsystem (2). System (2) is supplemented with initial values of the type

x(t) = φ(t), φ(t) ∈ C([−d, 0], Rn), t ∈ [−d, 0],

Page 143: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

GLOBAL EXPONENTIAL STABILITY OF COHEN-GROSSBERG NEURAL NETWORKS... 129

where C([−d, 0], Rn) denotes the space of continuous functions φ : [−d, 0]→ Rn.

Definition 1. Suppose that x∗ ∈ Rn is an equilibrium of system (2), x∗ is saidto be globally exponentially stable, if there exist λ > 0 and C > 0 such that forany solution x(t) of system (2), we have

|xi(t)− x∗i | ≤ Cn∑i=1

supt∈[−d,0]

|φi(t)− x∗i |e−λt, for t ≥ 0, i ∈ N.

In order to obtain the uniqueness of equilibrium of system (2), we introducesome results about nonlinear measure from J.Peng,H.Qiao and Z.Xu([11]).

Definition 2 ([11]). Suppose that Ω is an open subset of Rn, F is an operatorfrom Ω to Rn, the constant

mΩ(F ) = supx,y∈Ω,x =y

⟨F (x)− F (y), sign(x− y)⟩∥x− y∥1

is called the nonlinear measure of F on Ω.

Lemma 2.1 ([11]). If mΩ(F ) < 0, then F is injective on Ω. If in additionΩ = Rn, then F is a homeomorphism of Rn.

For the study of the global exponential stability of an equilibrium by ourmethods, we introduce the Dini derivatives and the Young inequality now.

Definition 3. Suppose that V (t) is a real function, the left upper Dini derivativeand the left lower Dini derivative of V (t), denoted by D−V (t) and D−V (t)respectively , are defined by

D−V (t) = lim suph→0−

V (t+ h)− V (t)

h, D−V (t) = lim inf

h→0−

V (t+ h)− V (t)

h.

Lemma 2.2 ([12],Young inequality). Assume that a ≥ 0, b ≥ 0, p > 1, q > 1with 1

p + 1q = 1. Then we have inequality

ab ≤ 1

pap +

1

qbq.

For the common use of M-matrix in the study of qualitative properties ofvarious neural networks, we represent all of our results in the M-matrix form.The definition of M-matrix and some useful results about it are given as follows.

Definition 4 ([14]). Let A = (aij) ∈ Rn×n, and aij ≤ 0 for i = j, i, j ∈ N . Ais called M-matrix if there exist P ∈ Rn+, such that AP > 0 or P TA > 0.

Remark 2.3. From the definition, it is obvious that A is a M-matrix if andonly if for every diagonal matrix D with positive diagonal elements, DA andAD are M-matrices.

Page 144: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

130 XIAOHUI WANG, XUMENG LI and XINGJIE WU

Lemma 2.4 ([13]). Let A = (aij) ∈ Rn×n, and aij ≤ 0 for i = j, i, j ∈ N .Then the following conditions are equivalent:

(1) A is a M-matrix;(2) All the leading principal minors of A are positive;(3) A−1 ≥ 0.

Remark 2.5. From lemma 2.4 (2), we can obtain that A is a M-matrix if andonly if AT is. Thus in the definition, The statement ” there exist P ∈ Rn+,such that AP > 0 or P TA > 0 ” is equivalent to the statement ” there existP1, P2 ∈ Rn+, such that AP1 > 0 and P T2 A > 0 ”.

Lemma 2.6 ([25]). Let B = (bij) ∈ Rn×n, and bij ≤ 0 for i = j, i, j ∈ N . IfB ≥ A and A is a M-matrix, then B is a M-matrix.

At the end of this section, we list some assumptions which will be used inthe main results of system (2).

(H1) For each i ∈ N , ai(s) > 0, for s ∈ R.(H

′1) For each i ∈ N , there exist positive real numbers αi and αi such that

αi ≤ ai(s) ≤ αi, for s ∈ R.

(H2) For each i ∈ N , bi is global left Lipschitz continuous, i.e. there existsa positive constant βi > 0 such that

bi(s)− bi(t)s− t

≥ βi, for s, t ∈ R and s = t.

(H3) For each i ∈ N , fi is global Lipschitz continuous, i.e. there exists apositive constant Li such that

|fi(s)− fi(t)| ≤ Li|s− t|, for s, t ∈ R.

3. Main results

In this section, a new criteria on uniqueness of equilibrium of system (2) isfirstly proposed and proved. The remainder is mainly concerned with the globalexponential stability.

On the existence of equilibrium of system (2), we refer to the powerful resultinitially proposed recently in K. Lu, D. Xu and Z. Yang ([14]).

Theorem 3.1 ([14]). Assume that (H1) holds, and there are nonnegative con-stants such that

bi(s) ≥ β0i |s| − ξi, |fi(s)| ≤ L0i |s|+ µi, for s ∈ R, i ∈ N.

If

(3) M0 , B0 − |W +W d|L0

is a M-matrix, where B0 = diagβ01 , . . . , β0n and L0 = diagL01, . . . , L

0n, then

System (2) has at least a equilibrium x∗. Furthermore, |x∗| ≤M−10 (|W+W d|ξ+

µ+ |I|), where ξ = (ξ1, . . . , ξn)T , and µ = (µ1, . . . , µn)T .

Page 145: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

GLOBAL EXPONENTIAL STABILITY OF COHEN-GROSSBERG NEURAL NETWORKS... 131

Now, we propose and prove our result on uniqueness of equilibrium of system(2).

Theorem 3.2. Assume that (H1), (H2), (H3) hold. If

(4) M , B − |W +W d|L

is a M-matrix, where B = diagβ1, . . . , βn and L = diagL1, . . . , Ln, thenSystem (2) has a unique equilibrium x∗. Furthermore, for any x ∈ Rn, lety = x− x∗, we have |y| ≤M−1J(x), where J : Rn → Rn is defined by

Ji(x) =

n∑j=1

|wij + wdij ||fj(xj)|+ |Ii − bi(xi)|, for i ∈ N.

In particular, |x∗| ≤M−1J(0).

Proof. By (H1), x∗ is an equilibrium of System (2) if and only if x = x∗ is a

solution of equations

(5) Fi(x) , −bi(xi) +

n∑j=1

(wij + wdij)fj(xj) + Ii = 0, for i ∈ N.

Using (4), there exists P ∈ Rn+ such that P TM > 0, i.e.

(6) Piβi −n∑j=1

Pj |wji + wdji|Li > 0, for i ∈ N.

Define F : Rn → Rn by F (x) = (P1F1(x), . . . , PnFn(x))T ,∀x ∈ Rn. Thenx∗ is an equilibrium of System (2) if and only if F (x∗) = 0.

We now prove that mRn(F ) < 0. For all x, y ∈ Rn, Using (H2) and (H3),

⟨F (x)− F (y), sign(x− y)⟩

=n∑i=1

Pi−(bi(xi)− bi(yi)) +n∑j=1

|wij + wdij |(fj(xj)− fj(yj))sign(xi − yi)

≤n∑i=1

Pi(−βi|xi − yi|+n∑j=1

|wij + wdij |Lj |xj − yj |)

= −n∑i=1

(Piβi −n∑j=1

Pj |wji + wdji|Li)|xi − yi|

≤ −mini∈NPiβi −

n∑j=1

Pj |wji + wdji|Lin∑i=1

|xi − yi|.

Page 146: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

132 XIAOHUI WANG, XUMENG LI and XINGJIE WU

Therefore, by means of (6),

mRn(F ) ≤ −mini∈NPiβi −

n∑j=1

Pj |wji + wdji|Li < 0.

According to lemma 2.1, F is a homeomorphism of Rn, which indicates thatF (x) = 0 has a unique solution x∗, and thus system (2) has a unique equilibriumx∗. To estimate the existence region of x∗, for ∀x ∈ Rn and i ∈ N , using (H2) ,(H3) and (5), we can obtain

βi|x∗i − xi| ≤ (bi(x∗i )− bi(xi))sign(x∗i − xi)

= (

n∑j=1

(wij + wdij)fj(x∗j ) + Ii − bi(xi))sign(x∗i − xi)

≤ |n∑j=1

(wij + wdij)fj(x∗j ) + Ii − bi(xi)|

≤ |n∑j=1

|wij + wdij |Lj |x∗j − xi|+n∑j=1

|wij + wdij ||fj(xj)|+ |Ii − bi(xi)|,

namely, M |y| ≤ J(x). Utilizing lemma 2.4, M−1 ≥ 0, then we have |y| ≤M−1J(x). In particular, Let x = 0, |x∗| ≤M−1J(0). The proof is completed.Remark 3.3. As far as existence of equlibrium concerned, theorem 3.2 is just adirect corollary of theorem 3.1. But theorem 3.1 can not ensure the uniquenessof equilibrium. To the best of our knowledge, there are few results about theuniqueness of equilibrium ([21]), most of the existing results in the previousliterature just deal with the existence ([18], [16]). Moreover, our estimate of theexistence region of equilibrium can be used many times by setting different x toobtain more exact estimation.

For the global exponential stability of equilibrium of system (2), we have thefollowing main result.

Theorem 3.4. Assume that all the conditions in theorem 3.1 hold. Moreover,(H

′1),(H2) and (H3) hold. If there exist r ≥ 1, P = (P1, . . . , Pn)T ∈ Rn+, and

real numbers hij , lij , h∗ij , l

∗ij , for i, j ∈ N , such that

(7) Mr,P,h,l,h∗,l∗ , (mij)

is a M-matrix, where for i, j ∈ N ,

mii = rαiαiβiPi − (r − 1)

n∑k=1

(|wik|r−hikr−1 L

r−likr−1

k + |wdik|r−h∗ikr−1 L

r−l∗ikr−1

k )Pk

− (|wii|hiiLliii + |wdii|h∗iiL

l∗iii )Pi,

mij = −(|wij |hijLlijj + |wdij |

h∗ijLl∗ijj )Pj , i = j,

then System (2) has a unique equilibrium, which is globally exponentially stable.

Page 147: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

GLOBAL EXPONENTIAL STABILITY OF COHEN-GROSSBERG NEURAL NETWORKS... 133

Proof. From theorem 3.1, system (2) has at least one equilibrium, say x∗.Uniqueness of equilibrium can be induced directly from the global exponentialstability of x∗. So we just need to prove the global exponential stability of x∗.Let y(t) = x(t)−x∗, substitute x(t) = y(t) +x∗ into system (2), for each i ∈ N ,

(8) yi(t) = Ai(yi(t))−Bi(yi(t)) +

n∑j=1

wijgj(yj(t)) +

n∑j=1

wdijgj(yj(t− dij(t))).

Here, for each i, j ∈ N , Ai(yi(t)) = ai(yi(t) + x∗i ), Bi(yi(t)) = bi(yi(t)) −bi(x

∗i ), gj(yj(t)) = fj(yj(t) + x∗j )− fj(x∗j ).We will show that y(t) = 0 is globally exponentially stable. Firstly, using

(H′1), (H2) and (H3),

(9) αi ≤ Ai(s) ≤ αi,Bi(s)

s≥ βi, |gi(s)| ≤ Li|s|, for s ∈ R, i ∈ N.

Using (7), let A=diagα1, . . ., αn, there exists Q∈Rn+ such that Mr,P,h,l,h∗,l∗AQ> 0, i.e.

rαiβiPiQi − (r − 1)αi

n∑j=1

(|wij |r−hijr−1 L

r−lijr−1

j + |wdij |r−h∗ijr−1 L

r−l∗ijr−1

j )PjQi

−n∑j=1

|wij |hijLlijj αjPjQj −

n∑j=1

|wdij |h∗ijL

l∗ijj αjPjQj > 0, for i ∈ N.(10)

So, we can choose a real number 0 < λ≪ 1 such that

rαiβiPi0Qi − (r − 1)αi

n∑j=1

(|wij |r−hijr−1 L

r−lijr−1

j + |wdij |r−h∗ijr−1 L

r−l∗ijr−1

j )PjQi

−n∑j=1

|wij |hijLlijj αjPjQj −

n∑j=1

|wdij |h∗ijL

l∗ijj αjPjQje

λd − PiQiλ > 0,(11)

for i ∈ N.Let yi(t) = Pizi(t), Ui(t) =

∣∣∣∫ zi(t)0|s|r−1

Ai(Pis)ds∣∣∣. It follows From (9) that

(12)|zi(t)|r

rαi≤ Ui(t) ≤

|zi(t)|r

rαi

For any ε > 0, let V (t) = m∑n

j=1(sups∈[−d,0] |zj(s)|r + ε)e−λt, Vi(t) =

QiV (t), where m≫ 1 is a constant such that mQie−λt > 1

rαi, for t ∈ [−d, 0] i ∈

N . Then Ui(t) < Vi(t), for t ∈ [−d, 0], i ∈ N . We claim that

(13) Ui(t) < Vi(t), for i ∈ N, t ∈ [−d,∞).

Page 148: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

134 XIAOHUI WANG, XUMENG LI and XINGJIE WU

Contrarily, there must exist i0 ∈ N and t0 > 0 such that

(14) Ui0(t0) = Vi0(t0), and Uj(t) < Vj(t), forj ∈ N, t ∈ [−d, t0),

and we have

(15) D−Ui0(t0) ≥ Vi0(t0) = −λVi0(t0).

Now, By (8), (9), and (12), for each i ∈ N , we estimate D−Ui(t). Noting

that |s|r−1

Ai(Pis)> 0, for each i ∈ N , we have

D−Ui(t) = D−sign(zi(t))

∫ zi(t)

0

|s|r−1

Ai(Pis)dx

≤ 1

Pi|zi(t)|r−1−Bi(Pizi(t)) +

n∑j=1

wijgj(Pjzj(t))

+n∑j=1

wdijgj(Pjzj(t− dij(t)))sign(zj(t))

≤ 1

Pi−βiPi|zi(t)|r +

n∑j=1

|wij |PjLj |zj(t)||zi(t)|r−1

+

n∑j=1

|wdij |PjLj |zj(t− dij(t))||zi(t)|r−1

According to the Young inequality (lemma 2.2), for i, j ∈ N and r > 1,

|wij |Lj |zj(t)||zi(t)|r−1

= |wij |r−hijr−1 L

r−lijr−1

j |zi(t)|rr−1r |wij |hijL

lijj |zj(t)|

r1r

≤ r − 1

r|wij |

r−hijr−1 L

r−lijr−1

j |zi(t)|r +1

r|wij |hijL

lijj |zj(t)|

r,

similarly,

|wdij |Lj |zj(t− dij(t))||zi(t)|r−1

≤ r − 1

r|wdij |

r−h∗ijr−1 L

r−l∗ijr−1

j |zi(t)|r +1

r|wdij |

h∗ijLl∗ijj |zj(t− dij(t))|

r.

We regulate it that 0 · ∞ = 0,then the preceding two inequality hold triviallyfor r = 1. Thus, for each i ∈ N ,

D−Ui(t) ≤1

Pi−βiPi|zi(t)|r

+r − 1

r

n∑j=1

(|wij |r−hijr−1 L

r−lijr−1

j + |wdij |r−h∗ijr−1 L

r−l∗ijr−1

j )Pj |zi(t)|r(16)

+1

r

n∑j=1

|wij |hijLlijj Pj |zj(t)|

r +1

r

n∑j=1

|wdij |h∗ijL

l∗ijj Pj |zj(t− dij(t))|

r.

Page 149: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

GLOBAL EXPONENTIAL STABILITY OF COHEN-GROSSBERG NEURAL NETWORKS... 135

In light of (14) and (16), we estimate D−Ui0(t0)− Vi(t0) as follows.

D−Ui0(t0)− Vi(t0) ≤ D−Ui0(t0)− Vi(t0)

≤ 1

Pi0−βi0Pi0 |zi0(t)|r +

r − 1

r

n∑j=1

(|wi0j |r−hi0jr−1 L

r−li0jr−1

j

+ |wdi0j |r−h∗i0jr−1 L

r−l∗i0jr−1

j )Pj |zi0(t)|r +1

r

n∑j=1

|wi0j |hi0jLli0jj Pj |zj(t)|r

+1

r

n∑j=1

|wdi0j |h∗i0jL

l∗i0jj Pj |zj(t− di0j(t))|r+ λVi0(t0)

≤ 1

Pi0−βi0Pi0rαi0Ui0(t0) + (r − 1)

n∑j=1

(|wi0j |r−hi0jr−1 L

r−li0jr−1

j

+ |wdi0j |r−h∗i0jr−1 L

r−l∗i0jr−1

j )Pjαi0Ui0(t0) +

n∑j=1

|wi0j |hi0jLli0jj PjαjUj(t0)

+

n∑j=1

|wdi0j |h∗i0jL

l∗i0jj PjαjUj(t0 − di0j(t0)) + Pi0λVi0(t0)

≤ 1

Pi0−βi0Pi0rαi0Vi0(t0) + (r − 1)

n∑j=1

(|wi0j |r−hi0jr−1 L

r−li0jr−1

j

+ |wdi0j |r−h∗i0jr−1 L

r−l∗i0jr−1

j )Pjαi0Vi0(t0) +

n∑j=1

|wi0j |hi0jLli0jj PjαjVj(t0)

+

n∑j=1

|wdi0j |h∗i0jL

l∗i0jj PjαjVj(t0 − di0j(t0)) + Pi0λVi0(t0)

≤ 1

Pi0−βi0Pi0rαi0Vi0(t0) + (r − 1)

n∑j=1

(|wi0j |r−hi0jr−1 L

r−li0jr−1

j

+ |wdi0j |r−h∗i0jr−1 L

r−l∗i0jr−1

j )Pjαi0Vi0(t0) +n∑j=1

|wi0j |hi0jLli0jj PjαjVj(t0)

+n∑j=1

|wdi0j |h∗i0jL

l∗i0jj PjαjVj(t0 − d) + Pi0λVi0(t0)

= − 1

Pi0rαi0βi0Pi0Qi0 − (r − 1)αi0

n∑j=1

(|wi0j |r−hi0jr−1 L

r−li0jr−1

j

+ |wdi0j |r−h∗i0jr−1 L

r−l∗i0jr−1

j )PjQi0 −n∑j=1

|wi0j |hi0jLli0jj αjPjQj

−n∑j=1

|wdi0j |h∗i0jL

l∗i0jj αjPjQje

λd − Pi0Qi0λV (t0).

Page 150: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

136 XIAOHUI WANG, XUMENG LI and XINGJIE WU

Using (11), we obtain that D−Ui0(t0) < Vi(t0), which contradicts (15).Hence, (13) holds. With the help of (12),

|yi(t)| = Pi|zi(t)| < (rαiVi(t))1r

= (mrαiQi)1r (

n∑j=1

( sups∈[−d,0]

|yj(s)|r + ε))1r e−

λrt, for i ∈ N.

For the arbitrariness of ε, it follows that

(17) |yi(t)| ≤ Pi(mrαiQi)1r (

n∑j=1

sups∈[−d,0]

|yj(s)|r)1r e−

λrt.

Noting that all norms in Rn are equivalent, then there exist Cr > 0 such that,

(18) ∥x∥r = (

n∑j=1

|xj |r)1r ≤ Cr∥x∥1 = Cr

n∑j=1

|xj |, for x ∈ Rn

By virtue of (17) and (18), we can obtain that

|yi(t)| ≤ Cn∑j=1

sups∈[−d,0]

|yj(s))|e−λrt, for i ∈ N,

where C = maxi∈NPi(mαiQi)1rCr. Namely, system(8) and thus system(2) is

globally exponentially stable.

Remark 3.5. From the proof of theorem 3.4, (H2) and (H3) are only use to

ensure that ”Bi(s)s ≥ βi, |gi(s)| ≤ Li|s|, for s ∈ R, i ∈ N” in (9). If we haveknown the equlibrium x∗ of system (2), the global left Lipschitz continuity ofbi(t) and the global Lipschitz continuity of fi(t) can be relaxed to the so calledglobal left quasi-Lipschtiz continuity and global quasi-Lipschtiz continuity at x∗i ,respectively. Namely,

bi(s)−bi(x∗i )s−x∗i

≥ βi, |fi(s)− fi(x∗i )| ≤ Li|s− x∗i |for s = x∗i ∈ R, i ∈ N.

Remark 3.6. When theorem 3.4 ensures global exponential stability of system(2), it really ensures the robust global exponential stability in the followingmeaning: changing the involved system parameters ( namely, all the parametersin theorem 3.4 except r, P , and hij , lij , h

∗ij , l

∗ij , for i, j ∈ N ) small enough has

no harm on the global exponential stability. This can be infered by lemma 2.4(2) and the well-known fact that the determinant of every matrix in Rn×n is acontinuous function of its elements.

By letting P = (1, . . . , 1)T in theorem 3.4, we can obtain the following result.

Page 151: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

GLOBAL EXPONENTIAL STABILITY OF COHEN-GROSSBERG NEURAL NETWORKS... 137

Corollary 3.7. Assume that all the conditions in theorem 3.1 hold. Moreover,(H

′1),(H2) and (H3) hold. If there exist r ≥ 1, real numbers hij , lij , h

∗ij , l

∗ij , for

i, j ∈ N , such that

(19) Mr,h,l , (mij)

is a M-matrix, where for i, j ∈ N ,

mii = rαiαiβi − (r − 1)

n∑k=1

(|wik|r−hikr−1 L

r−likr−1

k + |wdik|r−h∗ikr−1 L

r−l∗ikr−1

k )

− (|wii|hiiLliii + |wdii|h∗iiL

l∗iii ) ,

mij = −(|wij |hijLlijj + |wdij |

h∗ijLl∗ijj ), i = j,

then System (2) has a unique equilibrium, which is globally exponentially stable.

Remark 3.8. Because coditions in theorem 3.1 are always satisfied by lettingL0 = diag0, . . . , 0 and µ = (sups∈R f1(s) . . . , sups∈R fn(s))T for bounded ac-tivation functions. Corollary 3.7 contains the corresponding results in [22]. In[22] the activation functions are assumed to be bounded, and (H2) is replacedby the assumption (H

′2): ”For each i ∈ N , bi ∈ C1(R,R), bi(·) > 0, bi(·) and

b−1i (·) is global Lipschtiz continuous.” Obviously, we have relaxed this condi-

tion. Moreover, Corollary 3.7 can be used when the activation functions areunbounded.

Corollary 3.9. Assume that all the conditions in theorem 3.1 hold. Moreover,(H

′1),(H2) and (H3) hold. If there exist r ≥ 1 and P = (P1, . . . , Pn)T ∈ Rn+

such that

(20) Mr,P , (mij)

is a M-matrix, where for i, j ∈ N ,

mii = rαiβiαiLi

− (|wii|+ |wdii|)Pi − (r − 1)

n∑k=1,k =i

(|wik|+ |wdik|)Pk,

mij = −(|wij |+ |wdij |)Pj , i = j,

then System (2) has a unique equilibrium, which is globally exponentially stable.

Proof. Let P = LP′

with L = diagL1, . . . , Ln, then we can see that Mr,LP ′ isthe same as Mr,P ′ ,h,l,h∗,l∗ in theorem 3.4 with hij = lij = h∗ij = l∗ij = 1, for i, j ∈N . Using (20), Mr,P ′ ,h,l,h∗,l∗ is also a M-matrix. Thus, according to theorem3.4, corollary 3.9 is proved. Corollary 3.10. Assume that (H

′1), (H2) and (H3) hold. If

(21) M1 , A− (|W |+ |W d|)

is a M-matrix, where A = diag α1β1α1L1

, . . . ,αnβnαnLn

, then System (2) has a uniqueequilibrium, which is globally exponentially stable.

Page 152: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

138 XIAOHUI WANG, XUMENG LI and XINGJIE WU

Proof. From (21), M1L is a M-matrix. Noting that M ≥ M1L with L =diagL1, . . . , Ln, by lemma 2.6, M is a M-matrix, too. Then theorem 3.2ensures a unique equilibrium. In the corollary 3.9, let r = 1 and P = (1, . . . , 1)T ,we immediately get the result.

Remark 3.11. Corollary 3.10 contains the corresponding results in [17]. Butin [17], (H2) is replaced by (H

′2).

4. Acknowledgements

This work was supported by the State’s Key R & D Program of China (GrantNo.2017YFD0301507), the Natural Science Foundation of Hunan Province, China(Grant No.2018JJ3227) and Key R & D Program in Hunan Province, China(No.2017NK2382).

References

[1] M. Cohen, S. Grossberg, Absolute stability and global pattern formation andparallel memory storage by competitive neural networks, IEEE Transactionson Systems, Man and Cybernetics, SMC, 13 (1983), 815-826.

[2] C. Marcus, R. Westervelt, Stability of analog neural networks with delay,Physical Review A, 39 (1989), 347-359.

[3] Z. Liu, L. Liao, Existence and global exponential stability of periodic solutionof cellular neural networks with time-varying delays, J. Math. Anal. Appl.,290 (2004), 247-262.

[4] J. Hopfield, Neural networks and physical systems with emergent collectivecomputational ablities, Proceedings of the National Academy of Sciences,71 (1982), 2252-2258.

[5] J. Hopfield, D. Tank, Computing with neural circuits: a model, Science,233 (1986), 625-633.

[6] P. Baldi, A. Atiya, How delays affect neural dynamics and leaning, IEEETransactions on Neural Networks, 5 (1994), 612-621.

[7] K. Gopalsamy, X. He, Delay-independent stability in bidirectional associa-tive memory networks, IEEE Transactions on Neural Networks, 5 (1994),998-1002.

[8] L. Chua, L. Yang, Cellular neural networks: theory, IEEE Transactions onCircuits and Systems, 35 (1988), 1257-1272.

[9] L. Chua, L. Yang, Cellular neural networks: applications, IEEE Transac-tions on Circuits and Systems, 35 (1988), 1273-1290.

Page 153: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

GLOBAL EXPONENTIAL STABILITY OF COHEN-GROSSBERG NEURAL NETWORKS... 139

[10] M. Kennedy, L. Chua, Neural networks for nonlinear programming, IEEETransactions on Circuits and Systems, 35 (1988), 554-562.

[11] J. Peng, H. Qiao, Z. Xu, A new approach to stability of neural networkswith time-varying delays, Neural Networks, 15 (2002), 95-103.

[12] G. Hardy, H. Littlewood, G. Polya, Inequality, Cambridge University Press,Cambridge, 1934.

[13] A. Berman, R. Plemmons, Nonnegative matrices in the mathematical sci-ences, New York: Academic, 1979.

[14] K. Lu, D. Xu, Z. Yang, Global attraction and stability for Cohen-Grossbergneural networks with delays, Neural Networks, 19 (2006), 1538-1549.

[15] D. Xu, Z. Xu, Stability analysis of linear delay-differential systems, ControlTheory and Advanced Technology, 7 (1991), 629-642.

[16] X. Liao, C. Li, K. Wong, Criteria for exponential stability of Cohen-Grossberg neural networks, Neural Networks, 17 (2004), 1401-1404.

[17] C. Huang and L. Huang, Dynamics of a class of Cohen-Grossberg neuralnetworks with time-varying delays, Nonlinear Analysis: Real World Appli-cations, 8 (2007), 40-52.

[18] L. Wang, X. Zou, Exponential stability of Cohen-Grossberg neural networks,Neural Networks, 15 (2002), 415-422.

[19] L. Wang, X. Zou, Harmless delays in Cohen-Grossberg neural networks,Physica D, 170 (2002), 162-173.

[20] T. Chen, L. Rong, Robust global exponential stability of Cohen-Grossbergneural networks with time delays, IEEE Transactions on Neural Networks,15 (2004), 203-206.

[21] A. Wan, M. Wang, J. Peng, H. Qiao, Exponential stability of Cohen-Grossberg neural networks with a general class of activation functions,Physics Letters A, 350 (2006), 96-102.

[22] H. Jiang, J. Cao, Z. Teng, Dynamics of Cohen-Grossberg neural networkswith time-varying delays, Physics Letters A, 354 (2006), 414-422.

[23] S. Mandal, N. C. Majee, A. B. Roy, Global exponential stability of peri-odic solution to Cohen-Grossberg type neural network with both ordinaryand neutral type discrete time varying delays: an LMI approach, AppliedMathematical Sciences, 7 (2013), 2979 - 2991.

Page 154: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

140 XIAOHUI WANG, XUMENG LI and XINGJIE WU

[24] Zhengqiu Zhang, Jinde Cao, Dongming Zhou, Novel LMI-based conditionon global asymptotic stability for a class of Cohen-Grossberg BAM networkswith extended activation functions, IEEE Trans on Neural Networks andLearning System, 256 (2014), 1161-1172.

[25] C. Xu, Q. Zhang, Existence and global exponential stability of anti-periodicsolutions for BAM neural networks with inertial term and delay, Neuro-computing, 153 (2015), 207-215.

[26] Z. Zhang, S. Yu, Global asymptotic stability for a class of complex-valuedCohen-Grossberg neural network with time delays, Neurocomputing, 171(2016), 1158-1166.

Accepted: 25.02.2017

Page 155: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (141–148) 141

F -CONTRACTIVE MAPPINGS OF HARDY-ROGERS-TYPEIN G-METRIC SPACES

Hamed M. Obiedat∗

Department of MathematicsHashemite [email protected]

Ameer A. JaberDepartment of Mathematics

Hashemite University

P.O.Box150459

Zarqa13115-Jordan

[email protected]

Abstract. In this paper, we prove some fixed point results for F -contractive mappingsof Hardy-Rogers-Type in the setting of G−metric spaces.

Keywords: fixed point theorems, G-metric spaces, F -contractive mappings of Hardy-Rogers-type.

1. Introduction

The class of G−metric spaces introduced by Z. Mustafa and B. Sims (See [5])was to provide a new class of generalized metric spaces and to extend the fixedpoint theory for a variety of mappings. Moreover, many theorems were proved inthis new setting with most of them recognizable as counterparts of a well-knownmetric space theorems (See [1], [2], [3]).

In [9], a new type of contractive mappings was introduced, called F−contrac-tive mappings, to provide a generalization of Banach’s contraction mappingprinciple. Recently, in ([4]), the authors proved some fixed point results forF−contractive mappings of Hardy-Rogers-Type. Due to the importance of thefixed point results of Hardy-Rogers-Type, it has been improved, generalized,extended and used in many applications such as logic programming semantics,ordinary differential equations of first order, and dislocated topology (see[8], [7],[6]).

In this paper, we prove some fixed point results for F−contractive mappingsof Hardy-Rogers-Type in the setting ofG−metric spaces. Throughout the articlewe denote by R the set of all real numbers, by R+ the set of all positive realnumbers and by N the set of all positive integers.

∗. Corresponding author

Page 156: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

142 HAMED M. OBIEDAT and AMEER A. JABER

Definition 1 ([5]). G-metric space is a pair (X,G), where X is a nonemptyset, and G is a nonnegative real-valued function defined on X × X × X suchthat for all x, y, z, a ∈ X, we have:

(G1) G(x, y, z) = 0 if x = y = z;

(G2) 0 < G(x, x, y), for all x, y ∈ X, with x = y;

(G3) G(x, x, y) ≤ G(x, y, z), for all x, y, z ∈ X, with z = y;

(G4) G(x, y, z) = G(px, z, y) (symmetry in all three variables);

(G5) G(x, y, z) ≤ G(x, a, a) +G(a, y, z), (rectangle inequality).

The function G is called a G−metric on X .

Definition 2 ([5]). A sequence (xn) in a G−metric space X is said to convergeif there exists x ∈ X such that limn,m→∞G(x, xn, xm) = 0, and one says thatthe sequence (xn) is G−convergent to x.

Proposition 3. Let X be G−metric space. Then the following statements areequivalent.

1. (xn) is G−convergent to x.

2. G(xn, xn, x)→ 0, as n→∞.

3. G(xn, x, x)→ 0, as n→∞.

4. G(xm, xn, x)→ 0, as m,n→∞.

In a G−metric space X, a sequence (xn) is said to be G−Cauchy if givenε > 0, there is Nε ∈ N such that G(xn, xm, xl) < ε, for all n,m, l ≥ Nε.

Proposition 4 ([5]). In a G−metric space X, the following statements areequivalent.

1. The sequence (xn) is G−Cauchy.

2. For every ε > 0, there exists Nε ∈ N such that G(xn, xm, xm) < ε, for alln,m ≥ N.

Proposition 5 ([5]). Let X be a G−metric space, then the function G(x, y, z)is jointly continuous in all three of its variables. A G−metric space X is said tobe complete if every G−Cauchy sequence in X is G−convergent in X.

Page 157: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

F -CONTRACTIVE MAPPINGS OF HARDY-ROGERS-TYPE IN G-METRIC SPACES 143

2. Preliminaries

In this section, we give definitions and results that we will use later. We startwith F−contractive mappings as stated in [9].

Definition 6. Let F : R+ → R be a mapping satisfying:

(F1) F is strictly increasing;

(F2) for each sequence αn ⊂ R+ of positive numbers limαn = 0 if and onlyif limF (αn) = −∞;

(F3) there exists k ∈ (0, 1) such that limαknF (αn) = 0.

We denote with F the family of all functions F that satisfy the conditions(F1)− (F3).

Definition 7. Let (X;G) be a G−metric space. A self-mapping T on X iscalled an F−contraction if there exist F ∈ Fand ρ ∈ R+ such that

ρ+ F (G(Tx;Ty, Tz)) ≤ F (G(x; y, z));

for all x, y ∈ X with G(Tx, Ty, Tz) > 0.

Definition 8. Let (X;G) be a G−metric space. A self-mapping T on X iscalled an F -contraction of Hardy-Rogers-type if there exist F ∈ Fand ρ ∈ R+

such that

ρ+ F (G(Tx, Ty, Tz)) ≤ F (α1G(x, y, z) + α2G(x, Tx, Tx)

+α3G(y, Ty, Ty) + α4G(z, Tz, Tz) + α5G(x, Ty, Tz)

+α6G(y, Tx, Tz) + α7G(y, Ty, Tx)),

for all x, y ∈ X with G(Tx, Ty, Tz) > 0, where α1 +α2 +α3 +α4 + 2(a5 +α6 +α7) = 1 and α3 + α4 = 1.

3. Fixed points for F -contractions of Hardy-Rogers-type

In this section, we give some fixed point results for F -contractions of Hardy-Rogers-type in complete G−metric spaces.

Theorem 9. Let (X;G) be a complete metric space and let T be a self-mappingon X. Assume that there exist F ∈ Fand ρ ∈ R+ such that

ρ+ F (G(Tx, Ty, Tz)) ≤ F (α1G(x, y, z) + α2G(x, Tx, Tx)(1)

+α3G(y, Ty, Ty) + α4G(z, Tz, Tz))

+α5G(x, Ty, Tz) + α6G(y, Tx, Tz)

+α7G(y, Ty, Tx)),

for all x, y, z ∈ X with G(Tx, Ty, Tz) = 0, where α1 + α2 + α3 + α4 + 2(a5 +α6 + α7) = 1 and α3 + α4 = 1. Then T has a fixed point. Moreover, if α1 +α5 + α6 + α7 ≤ 1, then the fixed point of T is unique.

Page 158: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

144 HAMED M. OBIEDAT and AMEER A. JABER

Proof. Fix x0 ∈ X and let xn = Tnx0 = T (Tn−1x0) = T xn−1 for n ∈ N. Ifxn = xn−1 for some n ∈ N, then it is clear that xn is a fixed point. Supposexn = xn−1 for all n ∈ N and set x = xn−1 and y = z = xn. Then by applyingthe inequality (1) with x = xn−1 and y = z = xn. We obtain

ρ+ F (G(Txn−1, Txn, Txn)) = ρ+ F (G(xn, xn+1, xn+1))

≤ F (α1G(xn−1, xn, xn) + α2G(xn−1, Txn−1, Txn−1) + α3G(xn, Txn, Txn)

+ α4G(xn, Txn, Txn) + α5G(xn−1, Txn, Txn) + α6G(xn, Txn−1, Txn)

+ α7G(xn, Txn−1, Txn))

= F (α1G(xn−1, xn, xn) + α2G(xn−1, xn, xn) + α3G(xn, xn+1, xn+1)

+ α4G(xn, xn+1, xn+1) + α5G(xn−1, xn+1, xn+1) + α6G(xn, xn, xn+1)

+ α7G(xn, xn, xn+1))

= F ((α1 + α2)G(xn−1, xn, xn) + (α3 + α4)G(xn, xn+1, xn+1)

+ α5G(xn−1, xn+1, xn+1) + (α6 + α7)G(xn, xn, xn+1)).

This implies that

0 < ρ ≤ F ((α1 + α2)G(xn−1, xn, xn) + (α3 + α4)G(xn, xn+1, xn+1)

+ α5G(xn−1, xn+1, xn+1) + (α6 + α7)G(xn, xn, xn+1))− F (G(xn, xn+1, xn+1)).

Since F is strictly increasing, which produce

G(xn, xn+1, xn+1) ≤ (α1 + α2)G(xn−1, xn, xn) + (α3 + α4)G(xn, xn+1, xn+1)

+α5G(xn−1, xn+1, xn+1) + (α6 + α7)G(xn, xn, xn+1).

This leads to

(1− (α3 + α4))G(xn, xn+1, xn+1) ≤ (α1 + α2)G(xn−1, xn, xn)

+ α5G(xn−1, xn+1, xn+1) + (α6 + α7)G(xn, xn, xn+1)

≤ (α1 + α2)G(xn−1, xn, xn) + α5G(xn−1, xn, xn)

+ α5G(xn, xn+1, xn+1) + (α6 + α7)G(xn, xn, xn+1),

which implies

(1− (α3 + α4 + a5))G(xn, xn+1, xn+1)

≤ (α1 + α2 + a5)G(xn−1, xn, xn) + (α6 + α7)G(xn, xn, xn+1)

≤ (α1 + α2 + a5)G(xn−1, xn, xn) + (α6 + α7)G(xn, xn+1, xn+1)

+ (α6 + α7)G(xn+1, xn, xn+1)

= (α1 + α2 + a5)G(xn−1, xn, xn) + (α6 + α7)G(xn, xn+1, xn+1)

+ (α6 + α7)G(xn, xn+1, xn+1)

= (α1 + α2 + a5)G(xn−1, xn, xn) + 2(α6 + α7)G(xn, xn+1, xn+1).

Page 159: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

F -CONTRACTIVE MAPPINGS OF HARDY-ROGERS-TYPE IN G-METRIC SPACES 145

Therefore,

(1−(α3+α4+a5+2a6+2a7))G(xn, xn+1, xn+1) ≤ (α1+α2+a5)G(xn−1, xn, xn).

Hence,

G(xn, xn+1, xn+1) ≤(α1 + α2 + a5)

(1− (α3 + α4 + a5 + 2a6 + 2a7))G(xn−1, xn, xn).

Since α1 + α2 + α3 + α4 + 2(a5 + α6 + α7) = 1 with α3 + α4 = 1, we obtain1− (α3 + α4 + a5 + 2a6 + 2a7) > 0. We have

G(xn, xn+1, xn+1)

≤ (α1 + α2 + a5)

(1− (α3 + α4 + a5 + 2a6 + 2a7))G(xn−1, xn, xn) = G(xn−1, xn, xn).

Therefore,

F (G(xn, xn+1, xn+1)) ≤ F (G(xn−1, xn, xn))− ρ≤ F (G(xn−2, xn−1, xn−1))− 2ρ

≤ F (G(xn−3, xn−2, xn−2))− 3ρ.

Continuing in the same argument, we deduce

(2) F (G(xn, xn+1, xn+1)) ≤ F (G(x0, x1, x1))− nρ.

This implies that lim F (G(xn, xn+1, xn+1)) = −∞. By Definition 6 property(F2), we get limG(xn, xn+1, xn+1) = 0. Also, if we choose k ∈ (0, 1) and multiplyboth sides of (2) by Gk(xn, xn+1, xn+1), we obtain

Gk(xn, xn+1, xn+1)F (G(xn, xn+1, xn+1))−Gk(xn, xn+1, xn+1)F (G(x0, x1, x1))

≤ −nρGk(xn, xn+1, xn+1) ≤ 0.

Using Definition 6 property (F2), we get

limGk(xn, xn+1, xn+1)F (G(xn, xn+1, xn+1)) = 0,

which implies that

lim(nρ− F (G(x0, x1, x1)Gk(xn, xn+1, xn+1)) ≤ 0.

But limG(xn, xn+1, xn+1) = 0. Hence, lim(nGk(xn, xn+1, xn+1)) = 0, and then

we deduce that lim(n1kG(xn, xn+1, xn+1)) = 0. Now we claim that the se-

quence xn is G−Cauchy. To show this given ε > 0, then there exists a

natural number K such that∣∣∣n 1

kG(xn, xn+1, xn+1)∣∣∣ < ε for all n ≥ K. That

is, G(xn, xn+1, xn+1) < εn−1k for all n ≥ K which implies that the series

Page 160: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

146 HAMED M. OBIEDAT and AMEER A. JABER

∑G(xn, xn+1, xn+1) is convergent by comparison test. Hence, the sequence

xn is G-Cauchy in a complete G−metric space. Then there exists u ∈ X suchthat xn → u as n→∞. This implies that u = Tu and hence u is a fixed pointof T . To show this, assume on the contrary that u = Tu. Then by inequality(1),we have

ρ+ F (G(xn+1, Tu, Tu)) ≤ F (α1G(xn, u, u)

+ α2G(xn, xn+1, xn+1) + α3G(u, Tu, Tu)

+ α4G(u, Tu, Tu)) + α5G(xn, xn+1, Tu)

+ α6G(u, xn+1, Tu) + α7G(u, xn+1, Tu)).

By Definition 6 property (F1), we have

G(xn+1, Tu, Tu) ≤ α1G(xn, u, u)

+ α2G(xn, xn+1, xn+1) + α3G(u, Tu, Tu) + α4G(u, Tu, Tu))

+ α5G(xn, xn+1, Tu) + α6G(u, xn+1, Tu) + α7G(u, xn+1, Tu).

By letting n→∞, we have

G(u, Tu, Tu) ≤ α1G(u, u, u) + α2G(u, u, u) + α3G(u, Tu, Tu)

+ α4G(u, Tu, Tu)) + α5G(u, u, Tu) + α6G(u, u, Tu) + α7G(u, u, Tu)

≤ α3G(u, Tu, Tu) + α4G(u, Tu, Tu)) + α5G(u, u, Tu)

+ α6G(u, u, Tu) + α7G(u, u, Tu).

Therefore, we obtain

(1− (α3 + α4)G(u, Tu, Tu) ≤ (α5 + α6 + α7)G(u, u, Tu)

= (α5 + α6 + α7)G(Tu, u, u)

≤ (α5 + α6 + α7)G(u, Tu, Tu) + (α5 + α6 + α7)G(Tu, u, Tu)

= 2(α5 + α6 + α7)G(u, Tu, Tu).

Thus(1− (α3 + α4 − 2(α5 + α6 + α7))G(u, Tu, Tu) ≤ 0.

But (1−(α3+α4−2(α5+α6+α7)) ≥ 0 which implies that G(u, Tu, Tu) = 0, andtherefore, Tu = u. Now, we prove the uniqueness of the fixed point. Assumethat v ∈ X, is another fixed point of T such that u = v. This means thatG(u, v, v) > 0. Taking x = u and y = z = v in (1), we have

ρ+ F (G(u, v, v)) ≤ F (α1G(u, v, v) + α2G(u, u, u) + α3G(v, v, v)

+ α4G(v, v, v)) + α5G(u, v, v) + α6G(v, u, v) + α7G(v, u, v))

≤ F (α1G(u, v, v) + α5G(u, v, v) + α6G(v, u, v) + α7G(v, u, v))

= F (α1 + α5 + α6 + α7)G(u, v, v)).

Page 161: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

F -CONTRACTIVE MAPPINGS OF HARDY-ROGERS-TYPE IN G-METRIC SPACES 147

By Definition 6 property (F1), we have

G(u, v, v) ≤ (α1 + α5 + α6 + α7)G(u, v, v).

The condition α1 + α5 + α6 + α7 ≤ 1 implies that G(u, v, v) = 0, and henceu = v. This completes the proof of Theorem 9.

If we put α5 = α6 = α7 = 0 and∑4

i=1 ai < 1 , we obtain a version of Reich([2], Theorem 2.1) in G−metric spaces setting.

Corollary 10. Let (X;G) be a complete metric space and let T be a self-mapping on X. Assume that there exist F ∈ F and ρ ∈ R+ such that

ρ+ F (G(Tx, Ty, Tz)) ≤ F (α1G(x, y, z)

+ α2G(x, Tx, Tx) + α3G(y, Ty, Ty) + α4G(z, Tz, Tz)),

for all x, y, z ∈ X where∑4

i=1 ai < 1. Then T has a unique fixed point in X.

Corollary 11. Let (X;G) be a complete metric space and let T be a self-mapping on X. Assume that there exist F ∈ F and ρ ∈ R+ such that themapping T satisfy the following condition for some m ∈ N

ρ+ F (G(Tmx, Tmy, Tmz)) ≤ F (α1G(x, y, z) + α2G(x, Tmx, Tmx)

+α3G(y, Tmy, Tmy) + α4G(z, Tmz, Tmz)),

for all x, y, z ∈ X where∑4

i=1 ai < 1. Then T has a unique fixed point in X.

Proof. From Theorem 9 we deduce that the mapping Tm has a unique fixedpoint (say u). Then Tmu = u but Tu = Tm+1u = Tm(Tu). This implies thatTu is another fixed point of Tm. But Tm has a unique fixed point. Hence,Tu = u.

References

[1] Mustafa, Z, A new structure for generalized metric spaces-with applicationsto fixed point theory, PhD thesis, the University of Newcastle, Australia(2005).

[2] Z. Mustafa, H. Obiedat, A fixed point theorem of Reich in G-metric spaces,CUBO, 12 (2010), 83-93.

[3] Z. Mustafa, H. Obiedat, F. Awawdeh, Some fixed point theorem for mappingon complete G-metric spaces, Fixed Point Theory Appl., 2008, Article ID189870 (2008).

[4] M. Cosentino, P. Vetro, Fixed point results for F -contractive mappings ofHardy-Rogers-type, Filomat, 28 (2014), 715-722.

Page 162: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

148 HAMED M. OBIEDAT and AMEER A. JABER

[5] Z. Mustafa, B. Sims, A new approach to generalized metric spaces, J. Non-linear Convex Anal., 7 (2006), 289-297.

[6] J.J. Nieto, R. Rodrıguez-Lopez, Existence and uniqueness of fixed point inpartially ordered sets and applications to ordinary differential equations, ActaMathematica Sinica, English Series, 23 (2007), 2205-2212.

[7] A.C.M. Ran, M.C. Reurings, A fixed point theorem in partially ordered setsand some applications to matrix equations, Proceedings.

[8] I. R. Sarma and P. S. Kumari, On dislocated metric spaces, InternationalJournal of Mathematical Archive, 3 (2012), 72-77.

[9] D. Wardowski, Fixed points of a new type of contractive mappings in com-plete metric spaces, Fixed Point Theory and Applications, 94 (2012).

Accepted 1.03.2017

Page 163: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (149–156) 149

ON POSITIVE WEAK SOLUTIONS FOR A CLASS OFNONLINEAR SYSTEMS

S. A. KhafagyMathematics Department

Faculty of Science in Zulfi

Majmaah University

Zulfi 11932, P.O. Box 1712

Saudi Arabia

and

Mathematics Department

Faculty of Science

Al-Azhar University

Nasr City (11884), Cairo

Egypt

el [email protected]

Abstract. We study the positive weak solutions for the system

−∆P,pu = λa(x)f(v) in Ω,−∆P,pv = λb(x)g(u) in Ω,

u = v = 0 on ∂Ω.

where λ > 0 is a parameter, ∆P,p with p > 1 and P = P (x) is a weight function,denotes the weighted p-Laplacian defined by ∆P,pu ≡ div[P (x)|∇u|p−2∇u], a(x), b(x)are weight functions and Ω ⊂ ℜN is a bounded domain with smooth boundary ∂Ω. Wediscuss the existence of positive weak solutions for large λ when

limx→+∞

f1

p−1 (M(g(x))1

p−1 )

x= 0, for every M > 0.

In particular, we do not assume any sign-changing conditions on a(x) or b(x). Ourapproach depends on the method of sub–supersolutions.

Keywords: weak solution, p-Laplacian, nonlinear system, sub-supersolutions.

1. Introduction

In this paper, we study the existence of positive weak solutions for λ large forthe following nonlinear system

(1.1)−∆P,pu = λa(x)f(v) in Ω,−∆P,pv = λb(x)g(u) in Ω,

u = v = 0 on ∂Ω,

Page 164: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

150 S. A. KHAFAGY

where ∆P,p with p > 1 and P = P (x) is a weight function, denotes the weightedp-Laplacian defined by ∆P,pu ≡ div[P (x)|∇u|p−2∇u], λ is a positive parameter,a(x) and b(x) are weight functions and that there exist positive constants a0,b0 such that a(x) ≥ a0, b(x) ≥ b0, f and g are given functions and Ω ⊂ ℜN isa bounded domain with smooth boundary ∂Ω. Our approach is based on themethod of sub-supersolutions (see e.g. [2]).

Recently many results concerning the existence of positive weak solutions forthe nonlinear systems involving Laplacian, p-Laplacian or weighted p-Laplacianoperators were obtained by various authors with the help of the sub-supersolutionsmethod (see [1, 3, 6],[8]-[16]).

Dalmasso [4] have been studied system (1.1) when p = 2, P (x) = a(x) =b(x) = 1, f and g are increasing functions and f, g ≥ 0. Results of [4] extendedin [7] to the case when no sigh conditions on f(0) or g(0) were required andwithout assuming monotonicity conditions on f or g.

This paper is organized as follows:In section 2, we introduce some technical results and notations, which are

established in [5]. In section 3, we give some assumptions on the functions f, g toinsure the validity of the existence of the positive weak solutions for system (1.1)in a suitable weighted Sobolev space. Also, we prove the existence of positiveweak solutions for system (1.1) by using the method of sub–supersolutions. Insection 4, we give some related results and examples.

2. Technical results

Now, we introduce some technical results to the weighted homogeneous eigen-value problem (see [5])

(2.1)−∆P,pu ≡ div[P (x)|∇u|p−2∇u] = λa(x)|u|p−2u in Ω,

u = 0 on ∂Ω.

The function P (x) is a weight function (measurable and positive a.e. in Ω),

satisfying the conditions

P (x), (P (x))− 1p−1 ∈ L1

Loc(Ω), with p > 1, (P (x))−s ∈ L1(Ω),

with s ∈ (N

p,∞) ∩ [

1

p− 1,∞),(2.2)

and a(x) is a measurable function satisfies

(2.3) a(x) ∈ Lkk−r (Ω),

with some k satisfies p < k < p∗s where p∗s = NpsN−ps with ps = ps

s+1 < p < p∗sand meas x ∈ Ω : a(x) > 0 > 0. Examples of functions satisfying (2.2) arementioned in [5].

Lemma 1 ([5]). There exists the first eigenvalue λ1p > 0 and at least onecorresponding eigenfunction ϕ1p ≥ 0 a.e. in Ω of the eigenvalue problem (2.1).

Page 165: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON POSITIVE WEAK SOLUTIONS FOR A CLASS OF NONLINEAR SYSTEMS 151

Theorem 2 ([5]). Let P (x) satisfies (2.2) and a(x) satisfies (2.3), then (2.1)admits a positive eigenvalue λ1p. Moreover, it is characterized by

(2.4) λ1p

∫Ωa(x)|ϕ1p|p ≤

∫ΩP (x)|∇ϕ1p|p.

Moreover, let us consider the weighted Sobolev space W 1,p(P,Ω) which isthe set of all real valued functions u defined in Ω with the norm

(2.5) ∥u∥W 1,p(P,Ω) =

(∫Ω|u|p +

∫ΩP (x)|∇u|p

) 1p

<∞,

and the space W 1,p0 (P,Ω) which is the closure of C∞

0 (Ω) in W 1,p(P,Ω) withrespect to the norm

(2.6) ∥u∥W 1,p

0 (P,Ω)=

(∫ΩP (x)|∇u|p

) 1p

<∞,

which is equivalent to the norm given by (2.5). The two spaces W 1,p(P,Ω) andW 1,p

0 (P,Ω) are well defined reflexive Banach Spaces.

3. Existence results

In this section, we prove the existence of positive weak solutions (u, v) for sys-tem (1.1) via the method of sub-supersolutions. We shall establish our resultsby constructing a subsolution (ψ1, ψ2) ∈ (W 1,p

0 (P,Ω))2 and a supersolution

(z1, z2) ∈ (W 1,p0 (P,Ω))2 of (1.1) such that ψi ≤ zi for i = 1, 2. That is, ψi,

i = 1, 2, satisfies∫ΩP (x)|∇ψ1|p−2∇ψ1∇ζdx ≤ λ

∫Ωa(x)f(ψ2)ζdx∫

ΩP (x)|∇ψ2|p−2∇ψ2∇ζdx ≤ λ

∫Ωb(x)g(ψ1)ζdx

and zi, i = 1, 2, satisfies∫ΩP (x)|∇z1|p−2∇z1∇ζdx ≥ λ

∫Ωa(x)f(z2)ζdx∫

ΩP (x)|∇z2|p−2∇z2∇ζdx ≥ λ

∫Ωb(x)g(z1)ζdx,

for all test functions ζ ∈W 1,p0 (P,Ω) with ζ ≥ 0. Then the following result holds:

Lemma 3 ([2]). Suppose there exist sub and supersolutions (ψ1, ψ2) and (z1, z2)respectively of system (1.1) such that (ψ1, ψ2) ≤ (z1, z2). Then system (1.1) hasa solution (u, v) such that (u, v) ∈ [(ψ1, ψ2), (z1, z2)].

Page 166: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

152 S. A. KHAFAGY

We give the following hypotheses:(H1) f, g : [0,∞) −→ [0,∞) are C1 nondecreasing functions such that

f(s), g(s) > 0 for s > 0.(H2) For all M > 0,

limx→+∞

f1p−1 (M(g(x))

1p−1 )

x= 0.

Theorem 4. Let (H.1) and (H.2) hold. Then system (1.1) has a positive weaksolution (u, v) ∈ (W 1,p

0 (P,Ω))2 for λ large.

Proof. Let λ1p be the first eigenvalue of the eigenvalue problem (2.1) and ϕ1pthe corresponding positive eigenfunction with ∥ϕ1p∥∞ = 1. Let k0, m, δ > 0be such that f(x), g(x) ≥ −k0 for all x ≥ 0, P (x)|∇ϕ1p|p − λ1pa(x)ϕp1p ≥m on Ωδ = x ∈ Ω : d(x, ∂Ω) ≤ δ. We shall verify that (ψ1, ψ2) = (p−1p (λa0k0m )

1p−1ϕ

pp−1

1p , p−1p (λb0k0m )

1p−1ϕ

pp−1

1p ) is a subsolution of (1.1) for λ large. Let

ζ ∈W 1,p0 (P,Ω) with ζ ≥ 0.

A calculation shows that∫ΩP (x)|∇ψ1|p−2∇ψ1 · ∇ζdx

=λa0k0m

∫ΩP (x)ϕ1p|∇ϕ1p|p−2∇ϕ1p · ∇ζdx

=λa0k0m

∫ΩP (x)|∇ϕ1p|p−2∇ϕ1p∇(ϕ1pζ)dx−

∫ΩP (x)|∇ϕ1p|pζdx

=λa0k0m

∫Ω

(λ1pa(x)ϕp1p − P (x)|∇ϕ1p|p)ζdx.

Similarly, we have∫ΩP (x)|∇ψ2|p−2∇ψ2 · ∇ζdx =

λb0k0m

∫Ω

(λ1pb(x)ϕp1p − P (x)|∇ϕ1p|p)ζdx.

Now, on Ωδ, we have P (x)|∇ϕ1p|p − λ1pa(x)ϕp1p ≥ m. Hence,

λa0k0m

(λ1pa(x)ϕp1p − P (x)|∇ϕ1p|p) ≤ −λa0k0 ≤ λa(x)f(ψ2).

A similar argument shows that

λb0k0m

(λ1pb(x)ϕp1p − P (x)|∇ϕ1p|p) ≤ −λb0k0 ≤ λb(x)g(ψ1).

Next, on Ω−Ωδ, we have ϕ1p ≥ µ for some µ > 0. Also f(ψ2) and g(ψ1) aredepending on λ and nondecreasing functions and therefore for λ large we have,using (2.4),

f(ψ2) ≥k0mλ1p ≥

k0m

(λ1pa(x)ϕp1p − P (x)|∇ϕ1p|p),

g(ψ1) ≥k0mλ1p ≥

k0m

(λ1pb(x)ϕp1p − P (x)|∇ϕ1p|p).

Page 167: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON POSITIVE WEAK SOLUTIONS FOR A CLASS OF NONLINEAR SYSTEMS 153

Hence ∫ΩP (x)|∇ψ1|p−2∇ψ1 · ∇ζdx ≤ λ

∫Ωa(x)f(ψ2)ζdx.

Similarly, we have∫ΩP (x)|∇ψ2|p−2∇ψ2 · ∇ζdx ≤ λ

∫Ωb(x)g(ψ1)ζdx,

i.e. (ψ1, ψ2) is a subsolution of (1.1) for λ large.Next, let ep be the solution of (see [17])

−∆P,pep = 1 in Ω, ep = 0 on ∂Ω.

Let

(z1, z2) =

(C

µpλ

1p−1 ep, (lbλ)

1p−1 [g(Cλ

1p−1 )]

1p−1 ep

)where µp = ∥ep∥∞ , lb = ∥b(x)∥∞and C > 0 is a large number to be chosen later,We shall verify that (z1, z2) is a supersolution of (1.1 ) for λ large. To this end,let ζ ∈W 1,p

0 (P,Ω) with ζ ≥ 0. Then we have∫ΩP (x)|∇z1|p−2∇z1 · ∇ζdx = λ

(C

µp

)p−1 ∫ΩP (x)|∇ep|p−2∇ep · ∇ζdx

=1

µp−1p

(Cλ

1p−1

)p−1∫Ωζdx.

By (H2), we can choose C large enough so that

(Cλ1p−1 )p−1 ≥ (µp−1

p laλ)f([(lbλ)1p−1µp][g(Cλ

1p−1 )]

1p−1 ),

where la = ∥a(x)∥∞ , and therefore,∫ΩP (x)|∇z1|p−2∇z1 · ∇ζdx ≥ λla

∫Ωf([(lbλ)

1p−1µp][g(Cλ

1p−1 )]

1p−1 )ζdx

≥ λ

∫Ωa(x)f(z2)ζdx.

Next, we have∫ΩP (x)|∇z2|p−2∇z2 · ∇ζdx = λlbg(Cλ

1p−1 )

∫ΩP (x)|∇ep|p−2∇ep · ∇ζdx

= λlbg(Cλ1p−1 )

∫Ωζdx

≥ λlb

∫Ωg(Cµ−1

p λ1p−1 ep)ζdx

≥ λ

∫Ωb(x)g(z1)ζdx

i.e. (z1, z2) is a supersolution of (1.1) with zi ≥ ψi for C large, i = 1, 2. Thus,there exists a positive weak solution (u, v) of (1.1 ) with ψ1 ≤ u ≤ z1, ψ2 ≤ v ≤z2. This completes the proof.

Page 168: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

154 S. A. KHAFAGY

4. Example and related result

4.1 Example

Many illustrative examples for the results obtained in this paper can be easilyconstructed. We just give the following one below.

Letf(x) = axr, g(x) = bxs,

where, a, b, r, s > 0 and rs < (p−1)2. Then it is easy to see that f and g satisfy(H1), (H2).

4.2 Related result

Existence results obtained in this article can be established in a similar way forthe following nonlinear system

−∆P,pu = λa(x)vβ in Ω,−∆P,pv = λb(x)uα in Ω,

u = v = 0 on ∂Ω,

under the assumptions that

(A1) a(x) and b(x) are weight functions such that a(x) ≥ a0 > 0, b(x) ≥b0 > 0.

(A2) 0 < α < p− 1 and 0 < β < p− 1.

Remark 5. Existence results of positive weak solutions for system (1.1) still

hold if we replace the condition limx→+∞f

1p−1 (M(g(x))

1p−1 )

x = 0, for every M > 0,

given in (H2), by the condition limx→+∞f [M(g(x))

1p−1 ]

xp−1 = 0, for every M > 0.

Acknowledgements

The author would like to express his gratitude to Professor H. M. Serag (Mathe-matics Department, Faculty of Science, AL- Azhar University) for continuousencouragement during the development of this work.

References

[1] G. Afrouzi, S. Ala, An existence result of positive solutions for a class ofLaplacian system, Int. Journal of Math. Analysis, 4 (42) (2010), 2075-2078.

[2] A. Canada, P. Drabek, J. Games, Existence of Positive solutions for someproblems with nonlinear diffusion, Trans. Amer. Math. Soc., 349 (1997),4231-4249.

[3] M. Chhetri, D. Hai, R. Shivaji, On positive solutions for classes of p-Laplacian semipositone system, Discrete and Dynamical Systems, 9(4)(2003), 1063-1071.

Page 169: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON POSITIVE WEAK SOLUTIONS FOR A CLASS OF NONLINEAR SYSTEMS 155

[4] R. Dalmasso, Existence and uniqueness of positive solutions of semilinearelliptic systems, Nonlinear Anal., 39 (2000), 559-568.

[5] P. Drabek, A. Kufner, F. Nicolosi, Quasilinear elliptic equation with degen-erations and singularities, Walter de Gruyter, Bertin, New York, 1997.

[6] D. Hai, R. Shivaji, An existence result on positive solutions for a class ofp-Laplacian systems, Nonlinear Anal., 56 (2004), 1007-1010.

[7] D. Hai, R. Shivaji, An existence result on positive solutions for a class ofsemilinear elliptic systems, Proc. Roy. Soc. Edinburgh Sect. A, 134 (2004),137-141.

[8] S. Khafagy, Existence and nonexistence of positive weak solutions for a classof (p, q)-Laplacian with different weights, Int. J. Contemp. Math. Sciences,6 (48) (2011), 2391-2400.

[9] S. Khafagy, Existence and nonexistence of positive weak solutions for a classof weighted (p, q)-Laplacian nonlinear system, Global Journal of Pure andApplied Mathematics, 9(4) (2013), 379-387.

[10] S. Khafagy, Maximum principle and existence of weak solutions for nonlin-ear system involving weighted (p, q)-Laplacian, Southeast Asian Bulletin ofMathematics, 40 (2016), 353-364.

[11] S. Khafagy, Maximum principle and existence of weak solutions for non-linear system involving singular p-Laplacian operators, Journal of Partialdifferential equations, 29 (2) (2016), 89-101.

[12] S. Khafagy, Non-existence of positive weak solutions for some weighted p-Laplacian system, Journal of Advanced Research in Dynamical and ControlSystems, 7 (2015), 71-77.

[13] S. Khafagy, On positive weak solutions for nonlinear elliptic system involv-ing singular p-Laplacian operator, Journal of Mathematical Analysis, 7 (5)(2016), 10-17.

[14] S. Khafagy, On the stability of positive weak solution for weighted p-Laplacian nonlinear system, New Zealand Journal of Mathematics, 45(2015), 39-43.

[15] E. Lee, R. Shivaji, J. Ye, Positive solutions for elliptic equations involvingnonlinearities with falling zeroes, Applied Mathematics Letters, 22 (2009),846-851.

[16] S. Rasouli, Z. Halimi, Z. Mashhadban, A note on the existence of posi-tive solution for a class of Laplacian nonlinear system with sign-changingweight, The Journal of Mathematics and Computer Science, 3 (3) (2011),339-354.

Page 170: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

156 S. A. KHAFAGY

[17] H. Serag, S. Khafagy, On maximum principle and existence of positive weaksolutions for n × n nonlinear systems involving degenerated p-Laplacianoperator, Turk. J. M., 34 (2010), 59-71.

Accepted: 9.03.2017

Page 171: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (157–163) 157

A BIPARTITE GRAPH ASSOCIATED TO A BI-MODULEOF A RING

Z. FattahiFerdowsi University of Mashhad International CampusMashhadIranz [email protected]

A. Erfanian∗

Department of Pure Mathematics and Center of Excellence in Analysis on AlgebraicStructuresFerdowsi University of [email protected]

A. AzimiDepartment of Mathematics

University of Neyshabur

P. O. Box 91136-899, Neyshabur

Iran

[email protected]

Abstract. Let R be a ring, M be a left and right R-module. We associate a bipartitegraph to R-module M of ring R, denoted by ΓR,M as undirected simple graph whosetwo parts of vertices are R \CR(M) and M \CM (R) and two distinct vertices x and yare adjacent if xy = yx, where CR(M) is the set of elements of R that commute withall elements in M . Some graph theoretical properties of this graph stated in this paper.

Keywords: Bi-module, diameter, girth, bipartite, planar, vertex and edge connectiv-ity.

1. Introduction

The study of algebraic structures, using the properties of graphs, becomes anexciting research topic in the last ten years, leading to many interesting results.There are many papers on assigning a graph to a group of ring, see [1-6]. Nowwe are going to define a graph which is associated to a ring R and R-moduleM . Assume that CR(M) is the set of elements of R which commutes with allelements of M and similarly CM (R) is the set of elements of M that commuteswith all elements of R. Then we define a bipartite undirected simple graphwith vertex sets VR ∪ VM , where VR = R \ CR(M) and VM = M \ CM (R) and

∗. Corresponding author

Page 172: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

158 Z. FATTAHI, A. ERFANIAN and A. AZIMI

two vertices x ∈ VR and y ∈ VM are adjacent if xy = yx. We denoted thisgraph by ΓR,M . In the rest of this section, we remind some basic definitions ingraph theory which are necessary in the paper. Section 2 deals with connectiv-ity, diameter, girth and planarity of this graph. In section 3, vertex and edgeconnectivity of ΓR,M will be considered.

Now we remind some basic definitions and concepts in graph theory as fol-lowing. Let X be a graph. X is a simple graph if it does not have loop andmultiple edges. V (X) is the set of vertices of X and the degree of a vertex vof X, denoted by deg(v), is the number of edges incident to v. A path P is analternating sequence vertices and edges, v1e1v2e2v3 . . . vkekvk+1, such that foreach i, 1 ≤ i ≤ k , ei is edge between vi and vi+1. If edges between vertices inpath is not important we show them by v1 ∼ v2 ∼ v3 ∼ ... ∼ vk ∼ vk+1. Wedenote the minimum and maximum degrees of the vertices of X ,respectively, byδ and ∆ and we use the notaion N(v) for the set of neighbours of vertex v. Fortwo vertices x and y, d(x, y) denotes the length of the shortest path between xand y and if there is no such path d(x, y) =∞. The diameter of X is defined bydiam(X)=maxd(x, y) : x and y are distinct vertices of X. X is a connectedgraph if there is a path between every two distinct vertices of X.

The girth of X is the length of the shortest cycle in X and it is denotedby gr(X) and if X does not have cycles gr(X) = ∞. A bipartite graph is agraph whose vertices can be divided into two disjoint parts V1 and V2 such thatevery edge connects a vertex in V1 to one in V2 .A complete bipartite graph is aspecial kind of bipartite graph where every vertex of the first part is connectedto every vertex of the second part. A complete bipartite graph with parts ofsize | V1 |= m and | V2 |= n is denoted by Km,n.

A dominating set in a graph X is a subset S of V (X) such that everyvertex not in S is joined to at least one member of S. The domination numberγ(X) of X is the number of vertices in the smallest dominating set for X. Anindependent set of X is a subset of vertices that no each pair of distinct verticesare adjacent. A maximal independent set is an independent set such that addingany other vertex to the set forces the set to contain some edges.The notationα(X) is the order of maximal independent set of X . A planar graph is a graphthat can be embedded in the plane so that no two edges intersect expect atthe end vertices. uv-paths P and Q in a graph are internally disjoint if theyhave no internal vertices in common, that is, if V (P1) ∩ V (P2) = u, v. Thelocal connectivity between distinct vertices u and v is the maximum number ofpairwise internally disjoint uv-paths, denoted p(u, v); the local connectivity isundefined when u = v. A non trivial graph X is k-connected if p(u, v) ≥ k forany distinct vertices u and v . The connectivity κ(X) of X is the maximumvalue of k for which X is k-connected. Two uv-paths P and Q in a graph areinternally edge-disjoint if they have no internal edges in common, that is, ifE(P1) ∩ E(P2) = ∅. All notations and terminology are standard here and werefer to [7] and [8]. Moreover, we always assume that R is finite ring, M is finiteR-module.

Page 173: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A BIPARTITE GRAPH ASSOCIATED TO A BI-MODULE OF A RING 159

2. Basic properties of ΓR,M

In this section, we start with the definition of graph ΓR,M

Definition. Let R be a ring and M be a left and right R-module such that Mand R are distinct and have different object. The non-commutative graph of Rwith respect to R-module M , denoted by ΓR,M , is defined as a bipartite graphwith vertex sets R \CR(M) , M \CM (R) as its parts such that CR(M) = x ∈R | xy = yx for all y ∈ M and CM (R) = x ∈ M |xy = yx for all y ∈ R insuch a way that two vertices x ∈ R \ CR(M) and y ∈ M \ CM (R) are adjacentif xy = yx.

It is clear that if we have one of the cases R = 0, M = 0, R = CR(M)or M = CM (R) then VR = ∅ or VM = ∅ and so the graph is null. Moreover,if R is a commutative ring, then graph is null. Thus we always assume thatR = 0 and M = 0. We may also assume that R and M are finite and we donot mention it in the lemmas and theorems. If R is infinite, then we will statespecifically. Let us state the following simple lemmas.

Lemma 2.1. Graph ΓR,M does not have an isolated vertex.

Proof. Assume that V (ΓR,M ) = VR ∪ VM where VR = R \ CR(M) and VM =M \ CM (R). If x ∈ VR is an arbitrary vertex in the first part, then we havex ∈ R and x /∈ CR(M) thus there exists an element y ∈ M such that xy = yx.Hence y ∈M \CM (R) which it implies that y is vertex in VM . Therefore x andy are adjacent. Similary, for every vertex of VM there exists a vertex in VR.

Lemma 2.2. Let x be a vertex in graph ΓR,M . Then deg(x) = |M | − |CM (x)|if x ∈ R \ CR(M) and deg(x) = |R| − |CR(x)| if x ∈M \ CM (R).

Proof. Let x ∈ R \ CR(M) then deg(x) = |y ∈ M \ CM (R) such that xy =yx| = |M |− |y ∈M such that xy = yx| = |M |− |CM (x)|. If x ∈M \CM (R)thus it is similar to above.

Lemma 2.3. The graph ΓR,M is connected.

Proof. Let x and y be two arbitrary vertices. We have two cases. The first caseis that x and y are in the same part, for instance assume that x, y ∈ VR. Thenby Lemma 2.2, there are vertices m,n ∈ VM such that x ∼ m , y ∼ n. If y ∼ mor x ∼ n then we have a path between x and y and the proof is done. Supposethat y m and x n then put z = x + y and we have x ∼ m ∼ z ∼ n ∼ y.The second case is that x,∈ VR and y ∈ VM . If x is adjacent to y then the prooffollows. Otherwise, there are vertices r ∈ VR such that r ∼ y, by Lemma 2.2.So we have path between x and r by the previous case and r ∼ y. Therefore wehave a path between x and y and the proof is completed.

Lemma 2.4. Let a ∈ R , b ∈ M and a + CR(M) , b + CM (R) are two cosetsof R and R-module M ,respectively, and a is adjacent to b if and only if everyx ∈ a+ CR(M) and every y ∈ b+ CM (R) are adjacent.

Page 174: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

160 Z. FATTAHI, A. ERFANIAN and A. AZIMI

Proof. Assume that x ∈ a+CR(M) and y ∈ b+CM (R) then there are elementsz ∈ CR(M) and m ∈ CM (R) such that x = a + z and y = b + m. If x is notadjacent to y, then we have xy = yx or (a + z)(b + m) = (b + m)(a + z) orab = ba which is a contradiction. Hence x is adjacent to y as required.

By the above lemma, one can see that induce subgraph of ΓR,M to the cosetsa + CR(M) and b + CM (R) is a complete bipartite graph, where a ∈ VR andb ∈ VM .

Lemma 2.5. diam (ΓR,M ) ≤ 3 .

Proof. Suppose that x and y are two arbitrary vertices. Then we have thefollowing cases:

Case1: x, y ∈ R\CR(M). Then there are vertices n and m in part M\CM (R)such that x ∼ n and y ∼ m . If x ∼ m or y ∼ n., then x ∼ m ∼ y or x ∼ n ∼ yand so d(x, y) = 2 otherwise, we will have x ∼ n + m ∼ y which implies thatd(x, y) = 2 thus in case 1, d(x, y) = 2.

Case 2: x ∈ R \ CR(M) and y ∈ M \ CM (R). If x ∼ y then d(x, y) = 1. Soassume that x y. By Lemma 2.2, there are vertices n ∈ R \CR(M) such thatn ∼ y. Hence d(x, y) ≤ d(x, n) + d(n, y) ≤ 3. Thus d(x, y) ≤ 3.

The case that x, y ∈M \CM (R), then the proof is very similar to case 1.

Lemma 2.6. If diam(ΓR,M ) = 2 then ΓR,M is complete bipartite graph.

Proof. If there are two vertices that not adjacent so diam(ΓR,M ) > 2 which isa contradiction.

In the following lemma, we compute the girth of ΓR,M .

Lemma 2.7. gr(ΓR,M ) = 4 or 6.

Proof. We have three cases to follow:

Case 1: If | VR |= 1 or | VM |= 1 then gr(ΓR,M ) = ∞. So | VR |≥ 2 and| VM |≥ 2.

Case 2: If r1, r2 are in one part. Assume that r1, r2 ∈ VR. By lemma 2.2there exist m1,m2 ∈ VM such that if r1 ∼ m1, r2 ∼ m2 then gr(ΓR,M ) = 4.

Case 3: If r1 ∈ VR and m1 ∈ VM . By lemma 2.2 there exist r2 ∈ VR andm2 ∈ VM such that r1 ∼ m1, r2 ∼ m2 so we will have r1 ∼ m1 + m2 ∼ r2 ∼m2 ∼ r1 + r2 ∼ m1 ∼ r1. The proof is completed.

Lemma 2.8. R = ∪a∈Ra+ CR(M).

Proof. The proof follows the fact that CR(M) is an additive subgroup of R.

Lemma 2.9. If x ∈ V (ΓR,M ), if x ∈ VR then d(x) ≥ ⌈ |M\CM (R)|2 ⌉. or if x ∈ VM

then d(x) ≥ ⌈ |R\CR(M)|2 ⌉.

Page 175: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A BIPARTITE GRAPH ASSOCIATED TO A BI-MODULE OF A RING 161

Proof. Case 1: Assume that x ∈ VR. Let x be adjacent to y in M \CM (R) andthe vertex mi not be adjacent to x in M \CM (R), for each 1 ≤ i ≤ k. Obviously,the vertices y, y +m1, y +m2, · · · , y +mk are in M \CM (R) and are adjacentto x. Since they are distinguished, then x is adjacent to k + 1 vertices.

Case 2: If x ∈ VM then the proof is similar above.

Lemma 2.10. α(ΓR,M ) = max| R \ CR(M) |, |M \ CM (R) |.

Proof. Without loss of generality, suppose that |M \CM (R) |≤| R\CR(M) |=k. Let H be the largest independent set and V (H) = V1 ∪ V2, where V1 ⊆V (R \CR(M)) and V2 ⊆ V (M \CM (R)). Clearly, V1 = ∅ or V2 = ∅. By Lemma

2.9, each vertex of V1 or V2 is adjacent to at least ⌈ |M\CM (R)|2 ⌉ or ⌈ |R\CR(M)|

2 ⌉vertices, respectively. Therefore,

| V1 | + | V2 |≤ ⌈|M \ CM (R) |

2⌉+ ⌈ | R \ CR(M) |

2⌉.

Thus, V (H) is lower than k.

Lemma 2.11. If graph ΓR,M has a pendent then ΓR,M is star graph.

Proof. Suppose that x ∈ R \ CR(M) and deg(x) = 1 then by Lemma 2.3,|M | − |CM (x)| = 1 or |CM (x)| = |M | − 1. Since CM (x) ⊂M so |CM (x)|||M | or|M | − 1||M | then there exists a positive integer k such that |M | = k(|M | − 1).

Thus k = |M ||M |−1 ∈ Z and we should have |M | − 1 = 1 consequently |M | = 2 or

|M | − 1 = |M | that is a contradicthion. We know that CM (R) ⊆ M then wehave two cases: CM (R) = M that it is a contradiction and CM (R) = 0 thenM \ CM (R) = a so |M \ CM (R)| = 1 therefore ΓR,M is star graph.

Theorem 2.12. If |CR(M)| ≥ 3 and |CM (R)| ≥ 3 then ΓR,M is not planargraph.

Proof. Since |CR(M)| ≥ 3 and |CM (R)| ≥ 3 then the order of cosets of CR(M)and CM (R) are at least 3. Let x ∈ CR(M) so by Lemma 2.2, there existsa ∈ M \ CM (R) such that x ∼ a and by Lemma 2.5, x is adjacent to allmembers of coset a+ CM (R) and because the order of cosets of R is at least 3so we have a subgraph K3,3.Therefore ΓR,M is not planar.

Corollary 2.13. If |CR(M)| ≥ 2 and |CM (R)| ≥ 3 then ΓR,M is not 1-plannargraph.

Proof. It is similar to proof of Theorem 2.12.

Page 176: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

162 Z. FATTAHI, A. ERFANIAN and A. AZIMI

3. Vertex and edge connectivity

In this section, we discuss about vertex and edge k-connectivity of ΓR,M . Letus state the following lemma which plays an important role in the proof of nexttheorem.

Lemma 3.1. Every connected graph G satisfies the inequalities κ(G) ≤ κ′(G) ≤

δ.

Definition. For two vertices x and y which are in the same part, put Z =N(x) ∩N(y), X = N(x) \ Z and Y = N(y) \ Z.

Lemma 3.2. Let x and y be the vertices in the same part. Then |Z| > |X| and|Z| > |Y |.

Proof. If X = ∅ or Y = ∅, then the assertion holds by Lemma 2.9. So, supposethat 1 ≤ |X| ≤ |Y | and x1 ∈ X. If Y = y1, y2, · · · , yk, then y1 + x1, y2 +x1, · · · , yk + x1 ⊆ Z.

Theorem 3.3. Graph ΓR,M is δ-edge-connected.

Proof. Let x, y be two vertices of ΓR,M . We show that there exists mind(x), d(y)edge disjoint paths between x and y. Consider the two following cases:

Case 1: x and y belong to the same part. Assume that x, y∈R\CR(M) and|X|≤|Y |. PutX = x1, x2, · · · , xk, Y = y1, y2, · · · , yl and Z = z1, z2, · · · , zt.For vertices xi and yi, there is vertex ui such that xi ∼ ui ∼ yi, 1 ≤ i ≤ k. Now,consider the paths x ∼ yi ∼ y (1 ≤ i ≤ l) and x ∼ xi ∼ ui ∼ yi ∼ y (1≤i≤k).Therefore, there exists d(x) edge disjoint paths between x and y.

Case 2: x and y are in the different parts. Let x ∈ R \ CR(M) and y ∈M \ CM (R) and consider the following cases:

Case 2.1: x y. Put H the induced bipartite subgraph on A ∪ B, whereA = N(x) ∪ y and B = N(y) ∪ x. For each set S ⊆ A, we claim thatN(S) ≥ S. If |S| < |A|/2, then we have N(S) ≥ S, by Lemma 2.9. If |S| ≥ |A|/2and a ∈ B \ N(S), then we have N(a) ⊂ A \ S, that it is a contradiction byLemma 2.9. From Hall’s Theorem we can conclude that graph H has a perfectmatching. If vertex x is not in perfect matching, then assume that xi ∼ yi, forevery integer i, 1 ≤ i ≤ k. In this case, there are k disjoint paths x ∼ xi ∼ yi ∼ y.If vertex x is in perfect matching, then consider x ∼ x1 and xi ∼ yi and y ∼ yk+1,for each 2 ≤ i ≤ k. Consider the following cases:

Case 2.1.1: yk+1 is adjacent to x1. Then consider the paths x ∼ xi ∼ yi ∼ y,for 2 ≤ i ≤ k and x ∼ x1 ∼ yk+1 ∼ y.

Case 2.1.2: yk+1 is not adjacent to x1. By Lemma 2.9, there is integer t suchthat 2 ≤ t ≤ k, x1 ∼ yt and yk+1 ∼ xt. Now, there is k disjoint paths betweenx to y as x ∼ x1 ∼ yt ∼ y, x ∼ xt ∼ yk+1 ∼ y, and x ∼ xi ∼ yi ∼ y, for integers2 ≤ i ≤ k except i = t.

Case 3: x ∼ y. Each vertex of the set A or B is adjacent to half of verticesof other part, by Lemma 2.9. It is not difficult to see that similar to Case

Page 177: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A BIPARTITE GRAPH ASSOCIATED TO A BI-MODULE OF A RING 163

2.1, graph H has a perfect matching by Hall’s Theorem. Let the edge xy bein the matching. Without of lose of generality, assume that xi ∼ yi, for every1 ≤ i ≤ k.. Thus, x ∼ y and x ∼ xi ∼ yi ∼ y are the disjoint xy-paths. If theedge xy is not in the matching, then similar to Case 1, we have k edge disjointpaths.

The following theorem gives the maximum value of k for which ΓR,M isk-connected.

Theorem 3.4. κ(ΓR,M ) = δ.

Proof. Let x, y be two vertices of ΓR,M . If x and y are in different parts, thenthere are δ disjoint paths between x and y, by Theorem 3.3. Now, suppose thatx and y are in the same part. Without lose of generality, assume that x, y ∈R \ CR(M) and d(x) = δ. Put X = x1, x2, · · · , xk, Y = y1, y2, · · · , yl andZ = z1, z2, · · · , zt. By Lemma 3.2, t > l and t > k. Put Ai = N(xi) ∩N(yi),for 1 ≤ i ≤ k. Since d(x) = δ, we have |Ai| > k. Thus, there exist k distinguishedvertices h1, h2, · · · , hk such that xi ∼ hi ∼ yi, 1 ≤ i ≤ k. Now, consider xy-pathsx ∼ zi ∼ y, 1 ≤ i ≤ t and x ∼ xi ∼ hi ∼ yi ∼ y, 1 ≤ i ≤ k. Thus, there is δdisjoint xy-paths. If d(x) = δ, then it is enough to put δ neighbours of x anddo like above.

References

[1] A. Abdollahi, S. Akbari and H. R. Maimani, Non-commuting graph of agroup, J. Algebra, 298 (2006), 468-492.

[2] S. Akbari and A. Mohammadian, Zero-divisor graphs of non-commutativerings, J. Algebra, 296 (2006), 462-479.

[3] D. F. Anderson and P. S. Livingston, The zero-divisor graph of a commuta-tive ring, J. Algebra, 217 (2) (1999) 434-447.

[4] P. J. Cameron, The power graph of a finite group, J. Group Theory, 13(2010), 779-783.

[5] I. Chakrabarty, S. Ghosh, T. K. Mukherjee and M. K. Sen,Intersectiongraphs of ideals of rings, Discrete Math., 309 (2009), 5381-5392.

[6] H. Maimani, M. Salimi, A. Sattari and S. Yassemi, Comaximal graph ofcommutative rings, J. Algebra, 319 (2008), 1801-1808.

[7] R. Y. Sharp, Steps in Commutative Algebra, Cambridge University Press,Cambridge, 1990.

[8] West D.B., Introduction to Graph Theory, 2000.

Accepted: 11.03.2017

Page 178: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (164–171) 164

AN IMPROVED CLUSTERING METHOD BASED ONDENSITY AND DIVISION METHOD

Zhang Qiu-JuSchool of Management and Economics

Beijing Institute of Technology, Beijing

100081, China

[email protected]

Abstract. Combining partitioning and density - based clustering method, an im-proved clustering method is proposed in this paper on the basis of objective clusteringalgorithm. Firstly, the points with greater density which are distant from each otherwere selected as the initial centers of K-means clustering. Then, Use K-means was usedto roughly determine the elements contained in each class. Afterwards, the points withthe largest density in each class were searched and taken as the centers to re-conductK-means clustering. If a class has more than one maximum density points, then theclass will have multiple clustering centers, which make the shape of the class not roundany longer and facilitate the classification of irregular shapes. Finally, by the dipoleidea of the objective clustering algorithm, the optimal number of clusters was deter-mined. The improved algorithm proposed in this paper achieved very good results inthe clustering tests on random data set and UCI data set

Keywords: clustering analysis, K-means, density-based clustering method, objectiveclustering algorithm.

1. Introduction

In the analysis and description of the world, class represents a group of objectswith public characteristics. People divide objects into different classes to explorethe commonality between the objects of the same class and the gap between theobjects of different classes, which are the information that can not be obtainedby other methods. In the case of data analysis, clusters are potential classes andclustering analysis is a technique for discovering these classes automatically.

Clustering analysis refers to the analysis process which divides the sets ofphysical or abstract objects into classes made up of similar objects, with a goalto collect data on a similar basis to classify. Clustering has been applied anddeveloped in many fields, including mathematics, computer science, statistics,biology and economics, which is mainly used for describing data, measuringthe similarity between different data sources and classifying data sources intodifferent clusters.

Traditional clustering analysis methods are mainly partitioning method, hi-erarchical method, density-based method, grid-based method and model-basedmethod, with algorithms that are widely used in each method, such as K-means

Page 179: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

AN IMPROVED CLUSTERING METHOD BASED ON DENSITY AND DIVISION METHOD 165

clustering algorithm in partitioning method, cohesive hierarchical clustering al-gorithm in hierarchical method, neural network clustering algorithm in model-based method, etc.

In general, a partitioning-based clustering method firstly requires a givennumber of clusters to create an initial division and then applies an iterativerelocation technique to move the objects between partitions to achieve the finaldivision. Each class contains at least one sample point, each of which belongsto and can only belong to one class. The typical division methods are K-means algorithm, CLARANS algorithm and FREM algorithm. Partitioning-based clustering requires the size of the number of clusters to be specified inadvance. If the values are not appropriate, the clustering rationality will beaffected. Besides, partitioning-based clustering basically belongs to sphericalclustering and its division effect on classes with irregular shapes is not obvious.

Hierarchical clustering methods combine data objects into a clustered tree,which can be further divided into agglomerative type (with bottom-up hierarchi-cal decomposition) and divisive type (with top-down hierarchical decomposition)hierarchical clustering. Aggregated hierarchical clustering initially treats eachsample point as a class and then merges the different classes in each iterationprocess until the preset clustering effect is reached. Split hierarchical clusteringinitially treats all sample points as a class and then splits them in each iterationprocess until the termination condition is met. The representative hierarchicalclustering algorithms are BIRCH algorithm and CURE algorithm. However, thetwo methods are time-consuming and their clustering complexity is too high.

The density - based clustering methods consider a cluster as a high-densityregion in the data space that is separated by a low-density region. Its mainidea is to continue clustering as long as the density of the neighboring area (thenumber of objects or data points) exceeds a certain threshold. That is, for eachdata point in a given class, there must be at least a certain number of points ina region with a given range. The methods can be used to filter ”noise”, isolatepoint data and find clusters of arbitrary shapes. Typical density-based clusteringmethods are DBSCAN and OPTICS. However, density-based clustering requirestwo parameters to be preset: the radius of adjacent threshold and the number ofdata points. As the clustering results are highly sensitive to the two parameters,improper parameter setting can lead to poor classification results.

The grid-based clustering methods quantify the object space into a finitenumber of units to form a grid structure, where all the clustering operations areperformed. Represented by STING algorithm and CLIQUE algorithm, the grid-based clustering methods have fast processing speed and their processing timeis independent of the number of data objects and is only related to the numberof units in each dimension in the quantization space. However, the clusteringeffect of the methods is sensitive to the division of the grid.

The model - based clustering methods assume a model for each cluster,looking for data to best fit the given models. Model-based clustering algorithmsmay locate clustering by constructing a spatial density function that reflects

Page 180: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

166 ZHANG QIU-JU

the spatial distribution of data points. It also automatically determines thenumber of clusters based on standard statistics, taking into account ”noise”data or isolated points, resulting in robust clustering methods. Neural networksand decision trees are typical model-based clustering methods, which often havestrict assumptions on data distribution. Therefore, model - based clusteringmethods have their own limitations.

In this paper, an improved clustering algorithm is proposed based on ananalysis of the advantages and disadvantages of various clustering methods. Onthe one hand, the objective clustering analysis algorithm is applied to deter-mine the number of clusters. On the other hand, the idea of density - basedclustering methods is introduced to realize the clustering of classes of variousshapes, breaking the limitation that division-based clustering is only suitablefor spherical shape.

2. The basic principle of objective clustering algorithm (OCA)

One of the major problems to be solved in clustering is the number of classesthat should be divided. One of the basic principles of clustering is to ensurethat the similarity of the samples within the class is high and the gap be-tween classes is obvious. At present, the algorithms that can automaticallydetermine the number of clusters are grid-based clustering algorithm, density-based clustering algorithm and model-based clustering algorithm. However, asmentioned above, the clustering results of grid-based clustering methods anddensity-based clustering methods rely heavily on input parameters while themodel-based clustering method is relatively strict on the assumption of datadistribution. Partitioning-based clustering and hierarchical clustering often de-termine the number of clusters by establishing an objective function, for ex-ample, taking the average distance of the elements in each class to the variouscentroids as the objective function, and the number of clusters which makesthe objective function reaches the minimum value is determined as the optimalnumber of clusters. However, in the case that the clustering point is not clear,the situation that the objective function gets smaller and smaller with the in-crease in the number of clusters tends to appear, resulting in a best clusteringresult that each sample becomes a class.

The objective clustering algorithm is a nonparametric clustering methodproposed by Academician A. G. Ivakhnenko [11, 12] of the Ukrainian Academyof Sciences that can automatically and objectively determine the number ofclassification categories. The method uses two criteria for clustering: innercriteria are used to generate classes, and outer criteria (consistency criteria) areused to determine the optimal number of classes.

The basic principle firstly uses the ”dipole” idea to classify the sample datainto two corresponding subsets A and B, where clustering is carried out basedon the distance between the sample points, respectively, so that each class hassimilarity. Then, by applying the idea that the nearest two points should belong

Page 181: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

AN IMPROVED CLUSTERING METHOD BASED ON DENSITY AND DIVISION METHOD 167

to the same category, whether the corresponding dipole samples in the two setsare assigned to the same class is taken as a criterion for testing the rationalityof clustering in order to determine the optimal number of clusters.

The specific method is as follows:

Step 1: Calculation of the distance between all the data samples in thetraining set. The distance between the samples is sorted from small to large,with each distance corresponding to a dipole.

Step 2: Assuming that the sample size is n, take a number of dipoles thatdo not have a common sample with each other and put them into set A and B.Similarly, sets C and D are obtained from the remaining dipoles and taken asdetection sets.

Step 3: The samples in sets A and B are numbered and the two samplesfrom the same dipole use the same number in sets A and B to correspond toeach other.

Step 4: for i = 1 : r − 2.

Step 5: Find the classification scheme with the highest value. If there aremultiple schemes with the same vale, then Step 4 is repeated on detection sets Cand D. Afterwards, which scheme has the highest value on C and D among theschemes that have the highest value on A and B is considered and the clusteringof this scheme is the optimal clustering and the corresponding number of clustersis the optimal number of clusters.

Obviously, objective clustering analysis is essentially a hierarchical clusteringalgorithm, so there exists the ubiquitous defects that hierarchical clusteringalgorithm have. When the sample size is very large, the number of times neededfor clustering is large, resulting in very low calculation efficiency. Moreover, thealgorithm is only suitable for the clustering of spherical clusters and can not findclusters of arbitrary shapes. Therefore, this paper combines OCA with K-meansand density-based clustering method to propose a new clustering algorithm.

3. Improved objective clustering algorithm

The improved objective clustering algorithm takes into account the fact thatdividing the data into too many classes has actually lost the meaning of clus-tering, so it sets one parameter to be the maximum number of classes. Thedata is clustered using the K-means method. The criteria for determining thebest number of classes refer to the OCA algorithm. The specific algorithm is asfollows:

Step 1: The corresponding two sets A and B, as well as C and D, aregenerated using the methods mentioned in the objective clustering algorithm,and each set contains one sample.

Step 2: Let the number of clusters be an integer which is large enough.

Step 3: Select the initial clustering center.

The Euclidean distance between the samples in set A is calculated to rep-resent the Euclidean distance between points and points. The average distance

Page 182: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

168 ZHANG QIU-JU

between all points is calculated and taken as the neighborhood threshold. As-suming that the two most distant sample points in the set are E and F, put theminto the initial cluster center set; the distance between the remaining points inthe set and point E and F is tested and corresponding points are selected anddenoted by G and put into the set; the distance between the remaining pointsin the set and point E, F and G is tested and corresponding points are selectedand denoted by H and put into the set. This process goes on until the point isfinally found out.

Step 4: Select the previous point in the set as the initial cluster center. Thedata in set A is clustered as a class using the K-means algorithm. The averagedistance of the samples in this class is calculated as the neighborhood threshold,and the points with the highest density in each class are found as the newclustering centers. If there is more than one point with the maximum density,it suggests that the class is of irregular shape and the points should be takenas the new clustering centers of the class. K-means clustering is re-conductedwith the new clustering centers to re-determine which class the sample pointsbelong to, and to gradually obtain the final clustering center through iteration.The final cluster centers of each class are used as the initial centers of set B toconduct K-means clustering and set B is also clustered as a class.

Step 5: command.

Step 6: command, if, execute Step 4.

Step 7: The corresponding classification scheme is the optimal clusteringscheme. If there are multiple schemes with the same value, clustering is car-ried out on the sets C and D based on these schemes. The clustering of thescheme with the highest value on C and D is the optimal clustering and thecorresponding number of clusters is the optimal number of clusters.

Step 8: The clustering center point of the optimal clustering scheme in Step7is used as the initial clustering center, and the whole data set is clustered toobtain the final clustering result.

4. Numerical experiment

The improved algorithm proposed in this paper is applied to the clustering oftwo random data sets, which is compared to the OCA algorithm and K-meanalgorithm. The number of clusters of the K-mean algorithm is set to three. Theclustering results are shown in Fig. 1 and Fig. 2.

It can be seen from Figure 1 and Figure 2 that the improved-OCA algorithminherits the advantages of density-based clustering algorithm for class contourrecognition, and has obvious advantages on non-spherical data clustering com-pared with other partition-based algorithms. Meanwhile, it is not as muchsensitive as the density-based algorithm to input parameters and its clusteringaccuracy and number of clusters are independent from parameter setting. Forexample, the clustering process of the above random data sets verifies that theobtained clustering results are exactly the same, whether the K value is set to be

Page 183: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

AN IMPROVED CLUSTERING METHOD BASED ON DENSITY AND DIVISION METHOD 169

Figure 1. Comparison of clustering algorithms on random data set 1

Figure 2. Comparison of clustering algorithms on random data set 2

20, 15 or 10. The improved-OCA algorithm automatically determines the num-ber of categories and identifies the category outline. In addition, when the Kvalue is set to be small, the number of operations is small, and the classificationefficiency can be improved.

Among the judgments on the classes of the 1200 samples on data set 1 by theimproved-OCA algorithm, there are only 16 wrong judgments, with an accuracyrate of 98.67%. While the accuracy rate of the judgment on the 1510 sampleson data set 2 is 90.73%.

Then, the Iris dataset and the Breastcancerw dataset provided on the UCIdataset are clustered. The Iris dataset contains 150 sample points and is di-vided into three classes, each containing 50 sample points. Class 1 is completelyseparated from class 2 and class 3 while class 2 and class 3 are crossed. There-

Page 184: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

170 ZHANG QIU-JU

fore, it is a reasonable division to divide the dataset into 2 or 3 classes. Theimproved-OCA algorithm classifies the first 50 sample points into one class andthe remaining 100 sample points into another class, with a correct rate of 100di-agnosis, contains 444 class 1 data and 239 class 2 data, which are correctlyclassified into 435 class 1 data and 168 class 2 data by the improved-OCA algo-rithm, with an accuracy rate of 88.29

The above random data set and UCI dataset clustering test proved theadvantage of the improved-OCA algorithm in discovering clusters of arbitraryshapes relative to partitioning and hierarchical methods. Besides, the improved-OCA algorithm is not as sensitive as the density-based clustering method toinput parameters. The only input parameter of the improved algorithm is themaximum number of classes permitted and the final clustering result does notdepend on this parameter.

5. Conclusion

This study improved the OCA algorithm based on hierarchical clustering basedon the analysis of the advantages and disadvantages of various algorithms bypreserving its consistency criteria for determining the number of clustered cate-gories, introduced the idea of density - based clustering algorithm, found out thepoint with the largest density in each class and took them as the centers of theclasses to reconduct clustering so as to ensure that the classes are of arbitraryshapes, with no need of inputting parameters which may influence the clusteringresults. Finally, a test was carried out on the random data set and UCI dataset, which proves the effectiveness of the improved-OCA algorithm proposed inthis paper.

However, there are some shortcomings in the improved-OCA algorithm. Itis essentially exhaustive K-means clustering in a small range to determine thevalue of the number of clusters, which is bound to affect the efficiency of clus-tering when the sample size is very large. How to judge the optimal number ofclusters more quickly and efficiently is the problem which remains to be furtherstudied.

References

[1] I.S. Dhillon, D.S. Modha, Concept decompositions for large sparse text datausing clustering, Machine learning, 2001, 42(1-2), 143-175.

[2] A.K. Jain, M.N. Murty, P.J. Flynn, Data clustering: a review, ACM com-puting surveys (CSUR), 1999, 31(3), 264-323.

[3] C. Elkan, Using the triangle inequality to accelerate k-means, Fawcett T.,Mishra N. Proceedings of the Twentieth International Conference on Ma-chine Learning (ICML-2003). Washington DC,USA: The AAAI Press, 2003,3, 147-153.

Page 185: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

AN IMPROVED CLUSTERING METHOD BASED ON DENSITY AND DIVISION METHOD 171

[4] D. Arthur, S. Vassilvitskii, k-means++: The advantages of careful seeding,Proceedings of the eighteenth annual ACM-SIAM symposium on Discretealgorithms. Philadelphia, PA, USA: Association for Computing Machinery,2007, 1027-1035.

[5] P.S. Bradley, U.M. Fayyad, Refining Initial Points for K-Means Clustering,Shavlik J. Proceedings of the 15th International Conference on MachineLearning (ICML98), San Francisco, USA: Morgan Kaufmann, 1998,98, 91-99.

[6] Zhao Yanchang, Song Mei, Xie Fan, et al., Clustering Datasets ContainingClusters of Various Densities, Journal of Beijing University of Posts andTelecommunications, 2003, 26(2), 42-47.

[7] L. Ertoz, M. Steinbach, V. Kumar, Finding Clusters of Different Sizes,Sharps, Densities in Noisy, High Dimensional Data, Proc of InternationalConference on Data Mining San Francisco, USA SIAM Press, 2003, 1-12.

[8] E. Martin, H.P. Kriegel, A Density-based Algorithm for Discovering Clus-ters in Large Spatial Databases with Noise, Proc of the 2nd InternationalConference on Knowledge Discovery and Data Mining, Portland, OR, USA,1996, 226-231.

[9] M. Patwary, D. Palsetia, A. Agrawal et al., A new scalable parallel DB-SCAN algorithm using the disjointset data structure, High PerformanceComputing, Networking, Storage and Analysis Salt Lake City, Utah, USA,IEEE, 2012, 10-16

[10] T.N. Thanh, K. Drab, M. Daszykowski, Revised DBSCAN algorithm tocluster data with dense adjacent clusters, Chemo metrics and IntelligentLaboratory Systems, 2013, 120, 92-96.

[11] A.G. Ivakhnenko, Heuristic self-organizing in problems of engineering cy-bernetics, Automatic, 1967, 6, 207-219.

[12] A.G. Ivakhnenko, The Review of Problems Solvable by Algorithms of theGroup Method of Data Handling (GMDH), Pattern Recognition and ImageAnalysis, 1995, 5 (4), 527 - 535.

Accepted: 31.03.2017

Page 186: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (172–179) 172

EXISTENCE OF MANY NON-RADIAL SOLUTIONS OF ANELLIPTIC SYSTEM

Zhenluo LouSchool of Mathematics and Statistics

Henan University of Science and Technology

Luoyang, Henan, 471023

P.R. China

[email protected]

Abstract. In this paper, we consider the following elliptic system−∆u = µ1u

p−1 + βup2−1v

p2 , x ∈ Ω

−∆v = µ2vp−1 + βu

p2 v

p2−1, x ∈ Ω

u, v > 0, x ∈ Ω, u = v = 0, x ∈ ∂Ω,

where Ω ⊂ RN (N > 4) is an annulus, µ1, µ2 > 0, β > 0 and 2 < p < 2N−2N−3 . By varia-

tional and rescaling method, we prove that the system has many non-radial solutions.

Keywords: elliptic system, variational method, non-radial solutions.

1. Introduction

In this paper, we study the following elliptic system

(1.1)

−∆u = µ1u

p−1 + βup2−1v

p2 , x ∈ Ω

−∆v = µ2vp−1 + βu

p2 v

p2−1, x ∈ Ω

u, v > 0, x ∈ Ω, u = v = 0, x ∈ ∂Ω,

where Ω = x ∈ RN : r2 < |x|2 < (r + d)2 is an annulus, N > 4, µ1, µ2 > 0,β > 0, 2 < p < 2N−2

N−3 , and d is a fixed positive number.In [6, 7], Gidas-Ni-Nirenberg studied the scalar equation

(1.2) −∆u+ u = up, x ∈ Ω, u > 0, x ∈ Ω, u = 0, x ∈ ∂Ω,

where 1 < p < 2∗ = 2NN−2 . By moving plane method, they proved that the

positive solutions of equation (1.2) are radially symmetric. After that there aremany results about the symmetric properties of solutions. In fact, if movingplane method can not be used, then the solutions can be symmetry-breaking.We point out that if the domain Ω is an annulus, then it is not convex, thus themoving plane method can not be used. In [9], Y. Li considered the non-radialsolutions of equation (1.2), the author also studied the supercritical case, seealso [11, 15] and the reference therein.

Page 187: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

EXISTENCE OF MANY NON-RADIAL SOLUTIONS OF AN ELLIPTIC SYSTEM 173

In recently decades, several researchers have studied the symmetric resultsof elliptic systems. In [3], by maximal principle and Morse index, the authorsstudied the symmetric and symmetry-breaking results of elliptic system, see[14, 17, 18] for symmetry-breaking results of system and the references therein.In particular, for p = 3 of system, the author [12] studied the non-radial solutionof system (1.1), where they proved that the system has at least a non-radialsolution.

Noticing that 2N−2N−3 > 2∗, the exponent p may be super critical exponent. In

this paper, by a compact embedding in [9], we study the multiple solutions ofsystem (1.1), we have that

Theorem 1.1. Let d be a fixed positive number, 2 < p < 2N−2N−3 (N > 4). If r > d

is large enough, then system (1.1) has at least [N2 ] − 1 non-radially symmetricsolutions.

This paper is organized as follows. In section 2, we give several preliminariesand lemmas; in section 3, by variational and rescaling method, we give the proofof Theorem 1.1.

2. Some preliminaries and lemmas

Firstly, we define the working space H = H10 (Ω)×H1

0 (Ω) with the norm as

∥(u, v)∥ =

(∫Ω|∇u|2 + |∇v|2dx

)1/2

,

where H10 (Ω) is the standard Sobolev space.

We define the functional of system (1.1) as

I(u, v) =1

2

∫Ω|∇u|2 + |∇v|2dx− 1

p

∫Ωµ1u

p + µ2vpdx− 2

∫Ωup2 v

p2 dx,

and the following quotation

J(u, v) =

(∫Ω |∇u|

2 + |∇v|2dx)p/2∫

Ω µ1up + µ2vpdx+ p

2

∫Ω u

p2 v

p2 dx

.

Now we define

Λ0 = (u, v) ∈ H\(0, 0) : u, v are radial functions ,

and

Λk = (u, v) ∈ H\(0, 0) : u(x) = u(|y1|, |y2|), v(x) = v(|y1|, |y2|) ,

where y1 = (x1, · · · , xk), y2 = (xk+1, · · · , xN ), k = 0, 1, · · · , [N2 ].We define the minimum value as

λk = inf(u,v)∈Λk

J(u, v), k = 0, 1, · · · , [N2

].

Now we list a inequality, see [9].

Page 188: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

174 ZHENLUO LOU

Lemma 2.1. Let Ω = x ∈ RN : r2 < |x|2 < (r + d)2 be an annulus, N > 4,2 < p < 2N−2

N−3 and d is a fixed positive number, let

Λk = u ∈ H10 (Ω) : u(x) = u(|y1|, |y2|),

where y1 = (x1, · · · , xk), y2 = (xk+1, · · · , xN ). Then for r > 10d large enough,we have (∫

Ω |∇u|2dx)p/2∫

Ω updx

≥ Crp−22 ,

where C is a positive constant independent of r.

Remark 2.2. If 1 < p < 2∗, by Sobolev embedding theorem, we have that Λk →Lp is compact, see [8, 20, 22], by previous lemma, we have that Λk → L

2N−2N−3 is

continuous, thus for 2 < p < 2N−2N−3 , we have that Λk → Lp is compact.

Lemma 2.3. Suppose 2 ≤ k < k ≤ [N2 ], then

Λk ∩ Λk ⊂ Λ0.

Next section we give the proof of the main result.

3. The proof of Theorem 1.1

We divide the proof into two parts. Firstly we have that

Lemma 3.1. There exists a positive constant C depending on µ1, µ2, β, d, suchthat

(3.1) λ0 ≥ Cr(N−1)( p2−1).

Proof. Let (u, v) ∈ Λ0, i.e. u(x) = u(|x|), v(x) = v(|x|), then

(3.2)

∫Ω|∇u|2dx = |∂Ω|

∫ r+d

r|u′ρ|2ρN−1dρ

≥ C(Ω)rN−1

∫ r+d

r|u′ρ|2dρ.

Similarly we have that∫Ω|∇v|2dx ≥ C(Ω)rN−1

∫ r+d

r|v′ρ|2dρ.

By Sobolev embedding results, we have that

(3.3)

∫Ωupdx = |∂Ω|

∫ r+d

rup(ρ)ρN−1dρ

≤ C(Ω, d)rN−1

∫ r+d

rupdρ

≤ C(Ω, d)rN−1

(∫ r+d

r|u′ρ|2dρ

)p/2,

Page 189: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

EXISTENCE OF MANY NON-RADIAL SOLUTIONS OF AN ELLIPTIC SYSTEM 175

and ∫Ωvpdx ≤ C(Ω, d)rN−1

(∫ r+d

r|v′ρ|2dρ

)p/2.

By Holder and Sobolev inequalities, we have

(3.4)

∫Ωup2 v

p2 dx ≤

(∫Ωupdx

)1/2(∫Ωvpdx

)1/2

≤ C(Ω, d)rN−1

(∫ r+d

r|u′ρ|2dρ

) p4(∫ r+d

r|v′ρ|2dρ

) p4

.

Then we obtain that(3.5)∫

Ωµ1u

p + µ2vp+

2up2 v

p2 dx ≤ CrN−1

(∫ r+d

r|u′ρ|2dρ

) p2

+

(∫ r+d

r|v′ρ|2dρ

) p2

+ 2

(∫ r+d

r|u′ρ|2dρ

) p4(∫ r+d

r|v′ρ|2dρ

) p4

≤CrN−1

(∫ r+d

r|u′ρ|2dρ

) p4

+

(∫ r+d

r|v′ρ|2dρ

) p4

2

≤4CrN−1

(∫ r+d

r|u′ρ|2dρ

) p2

+

(∫ r+d

r|v′ρ|2dρ

) p2

,

where C is a positive constant depending on µ1, µ2, β, d.Noticing that 2 < p < 2N−2

N−3 , then we obtain that(∫ r+d

r|u′ρ|2dρ

) p2

+

(∫ r+d

r|u′ρ|2dρ

) p2

≤(∫ r+d

r|u′ρ|2dρ+

∫ r+d

r|v′ρ|2dρ

) p2

.

Then we have that

(3.6)λ0 ≥

Crp2(N−1)

(∫ r+dr |u′ρ|2dρ+

∫ r+dr |v′ρ|2dρ

) p2

4CrN−1(∫ r+d

r |u′ρ|2dρ+∫ r+dr |v′ρ|2dρ

) p2

∼ C(µ1, µ2, β, d)r(N−1)( p2−1).

In conclusion, we complete the proof.

Following the idea of Li [9]. we have that

Lemma 3.2. There exists a constant C > 0 depending on µ1, µ2, β, d, such that

(3.7) λk ≤ Cr(N−2)( p2−1), for r > 10d large enough,

where k = 2, · · · , [N2 ].

Page 190: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

176 ZHENLUO LOU

Proof. Choose a nonnegative function ω(x) ∈ C∞0 (Bd/10)\0, where Bd/10 ⊂

R2, and let

uk(x) = vk(x) = ω(|y1| −1√2

(r +d

2), |y2| −

1√2

(r +d

2)),

where y1 = (x1, · · · , xk), y2 = (xk+1, · · · , xN ). One can prove that (uk(x), vk(x)) ∈H, see the following figure

Then we have that

(3.8)

∫Ω|∇uk|2dx ≤ C

∫r2≤t2+s2≤(r+d)2

|∇ω|2tk−1sN−k−1dtds

≤ C(r + d)N−2

∫r2≤t2+s2≤(r+d)2

|∇ω|2dtds

≤ C(d,Ω)rN−2

∫r2≤t2+s2≤(r+d)2

|∇ω|2dtds,

and ∫Ω|∇vk|2dx ≤ C(d,Ω)rN−2

∫r2≤t2+s2≤(r+d)2

|∇ω|2dtds.

Page 191: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

EXISTENCE OF MANY NON-RADIAL SOLUTIONS OF AN ELLIPTIC SYSTEM 177

Next we have that

(3.9)

∫Ωupkdx = |∂Ω|

∫r2≤t2+s2≤(r+d)2

upktk−1sN−k−1dtds

≥ CrN−2

∫r2≤t2+s2≤(r+d)2

ωpdtds,

and

(3.10)

∫Ωvpkdx ≥ Cr

N−2

∫r2≤t2+s2≤(r+d)2

ωpdtds.

Then

(3.11)

∫Ωup2k v

p2k dx =

∫Ωωpdx ≥ CrN−2

∫r2≤t2+s2≤(r+d)2

ωpdtds.

By the previous inequalities and noticing supp ω(t, s) ⊂ R2, we have that

λk ≤Cr

p2(N−2)

(∫r2≤t2+s2≤(r+d)2 |∇ω|

2dtds) p

2

C(β, µ1, µ2)∫r2≤t2+s2≤(r+d)2 ω

pdtds

≤ Cr(p2−1)(N−2),

where C > 0 is constant depending on β, µ1, µ2. In conclusion, we complete theproof.

Next we give the proof of main result.

The Proof of Theorem 1.1. By Lemma 2.1, we have that λk, k =0, 1, · · · , [N2 ] − 1 is achieved, then by standard rescaling method and criticaltheory, we can find (u0, v0) ∈ Λ0 and (uk, vk) ∈ Λk which are solutions of sys-tem (1.1). If r > 0 is large enough, by (3.1) and (3.7), it is a contraction, thus(uk, vk) is non-radial, k = 2, · · · , [N2 ]. Notice that Lemma 2.3, we prove thatsystem (1.1) has at least [N2 ]−1 non-radial solutions. In conclusion, we completethe proof.

Remark 3.3. If y1 = (x1, · · · , xk) y2 = (xk+1, · · · , xN ) and y1 = (xi1 , · · · , xik)y2 = (xik+1

, · · · , xiN ), i1, · · · , iN is a permutation of 1, · · · , N , we call thatu(|y1|, |y2|) ∼ u(|y1|, |y2|).

Acknowledgements

This work is supported by NSFC 11571339, HAUST 13480051.

Page 192: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

178 ZHENLUO LOU

References

[1] C.O. Alves, D.C. de Morais Filho, M.A.S. Souto, On system of ellipticequations involving subcritical or critical Sobolev exponents, Nonl. Anal.,42 (2000), 771-787.

[2] C. V. Coffman, A nonlinear boundary value problem with many positivesolutions, J. Diff. Equa., 54 (1984), 429-437.

[3] L. Damascelli, F. Pacella, Symmetry results for coorperative elliptic systemsvia linearization, SIAM J. Math. Anal., 45 (2013), 1003-1026.

[4] E.N. Dancer, K. Wang, Z. Zhang, The limit equation for the Gross-Pitaevskii equations and S. Terracini’s conjecture, J. Func. Anal., 262(2012), 1087-1131.

[5] E.N. Dancer, J. Wei, T. Weth, A priori bounds versus multiple existence ofpositive solutions for a nonlinear Schrodinger system, Ann. I.H. Poincare-AN, 27 (2010), 953-969.

[6] B. Gidas, W. Ni, L. Nirenberg, Symmetry and related properties via themaximum principle, Comm. Math. Phys., 68 (1979), 209-243.

[7] B. Gidas, W. Ni, L. Nirenberg, Symmetry of positive solutions of nonlinearelliptic equations in Rn, Mathematical Analysis and Applications, Part A,Adv. in Math. Suppl. Stud., 7a, 369-402, Academic Press, 1981.

[8] D. Gilbarg, N. Trdinger, Elliptic partial differential equations of secondorder, Springer Verlag, 1998.

[9] Y. Li, Existence of many positive solutions of semilinear elliptic equationson annulus, J. Diff. Equa., 83 (1990), 348-367.

[10] K. Li, Z. Zhang, A perturbation result for system of Schrodinger equationsof Bose-Einstein condensates in R3, Disc. Cont. Dyna. Syst., 36 (2016),851-860.

[11] S. S. Lin, Existence of many positive nonradial solutions for nonlinear el-liptic equations on an annulus, J. Diff. Equa., 103 (1993), 338-349.

[12] Z. Lou, Existence of non-radial solutions of an elliptic system, Appl. Math.Lett., 68 (2017), 157-162.

[13] L.A. Maia, E. Montefuso, B. Pellacci, Positive solutions for a weakly couplednonlinear Schrodinger system, J. Diff. Equa., 229 (2006), 743-767.

[14] S. Peng, Z.-Q. Wang, Segregated and synchronized vector solutions for non-linear Schrodinger systems, Arch. Rational Mech. Anal., 208 (2013), 305-339.

Page 193: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

EXISTENCE OF MANY NON-RADIAL SOLUTIONS OF AN ELLIPTIC SYSTEM 179

[15] D. Smets, J. Su, M. Willem, Non-radial ground states for the Henon equa-tion, Comm. in Cont. Math., 4 (2002), 467-480.

[16] S. Terracini, G. Verzini, Multipulse phases in K-Mixtures of Bose-Einsteincondensates, Arch. Rational Mech. Anal., 194 (2009), 717-741.

[17] H. Tavares, T. Weth, Existence and symmetry results for competing varia-tional systems, NoDEA Nonl. Diff. Equa. Appl., 20 (2013), 715-740.

[18] Z.-Q. Wang, M. Willem, Partial symmetry of vector solutions for ellipticsystems, J. Anal. Math., 122 (2014), 69-85.

[19] K. Wang, Z. Zhang, Some new results in competing systems with manyspecies, Ann. I. H. Poincare-AN, 27 (2010), 739-761.

[20] M. Willem, Minimax theorems, Progress in Nonlinear Differential Equationsand Their Applications, 24, Birkhauser, Boston, 1996.

[21] J. Wei, T. Weth, Radial solutions and phase separation in a system of twocoupled Schrodinger equations, Arch. Rational Mech. Anal., 190 (2008),83-106.

[22] Z. Zhang, Variational, topological, and partial order methods with theirapplications, Springer, 2013.

Accepted: 4.04.2017

Page 194: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (180–187) 180

PYTHAGOREAN FUZZY HYBRID AVERAGINGAGGREGATION OPERATOR AND ITS APPLICATION TOMULTIPLE ATTRIBUTE DECISION MAKING

K. Rahman∗

Department of MathematicsHazara University MansehraKPK, [email protected]

F. HussainDepartment of MathematicsAbbottabad University of Science and Technology AbbottabadKPK, [email protected]

M. S. Ali KhanDepartment of Mathematics

Hazara University Mansehra

KPK, Pakistan

[email protected]

Abstract. In this paper, we introduce the notion of Pythagorean fuzzy hybrid av-eraging operator, which is the generalization of Pythagorean fuzzy weighted averagingoperator and Pythagorean fuzzy ordered weighted averaging operator. We also studyseveral properties of the propose operator. At the last we apply the the proposedoperator to deal with MAGDM under Pythagorean fuzzy information.

Keywords: pythagorean fuzzy set, PFHA operator, some properties of PFHA oper-ator, decision making.

1. Introducation

In [1] Zadeh introduced the notion of fuzzy set characterized by a membershipfunction. In [2] Atanassov generalized the notion of fuzzy set and introduced theidea of intuitionistic fuzzy set characterized by a membership function and a non-membership function. In [3] Yager generalized the concept of intuitionistic fuzzyset and introduced the concept of Pythagorean fuzzy set. Pythagorean fuzzyset is more powerful tool to solve uncertain problems. Like intuitionistic fuzzyaggregation operators, Pythagorean fuzzy aggregation operators are also becomean interesting and important area for research, after the advent of Pythagoreanfuzzy set theory. In [4] Yager and Abbasov introduced the notion of PFWAoperator, PFOWA operator. In [5] X. Zeng and Z. S. Xu introduced the notion

∗. Corresponding author

Page 195: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

PYTHAGOREAN FUZZY HYBRID AVERAGING AGGREGATION OPERATOR ... 181

of Topsis method using Pythagorean fuzzy numbers. In [6, 7] H. Garg usedthe Einstein sum and Einstein product and introduced the notion of severalarithmetic and geometric aggregation operators and also applied them to groupdecision making. In [8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22] K.Rahman et al. introduced the notion of many aggregation operators based onPFNs and applied them to group decision making. Thus, in this paper, our aimto introduce the notion of Pythagorean fuzzy hybrid averaging operator.

The remainder of this paper is structured as follows. In section 2, we givesome basic definitions and results. In section 3, we develop Pythagorean fuzzyhybrid averaging operator. In section 4, we apply the proposed operator to dealwith MAGD based on PFNs. In section 5, we construct a numerical example.In section 6, we have conclusion.

2. Preliminaries

Definition 1 ([3]). Let Z be a fixed set, then PFS can be defined as:

(1) P = (z, µP (z), νP (z)) |z ∈ Z,

where µp(z) and νp(z) are mappings from z to [0, 1], with the condition 0 ≤µ2p(z) + ν2p(z) ≤ 1, for all z ∈ Z. Let πp(z) =

√1− µ2p(z)− ν2p(z), then it is

called the Pythagorean fuzzy index of element z ∈ Z to set P , which shows thedegree of hesitation or indeterminacy of z to p. It is clear that 0 ≤ πp(z) ≤ 1,for every z ∈ Z.

Definition 2 ([5]). Let β = (µβ, νβ) , β1 = (µβ1 , νβ1) and β2 = (µβ2 , νβ2) be thethree PFVs, then

(1) β1 ⊕ β2 =(√

µ2β1 + µ2β2 − µ2β1µ2β2 , νβ1νβ2

),

(2) β1 ⊗ β2 =(µβ1µβ2 ,

√ν2β1 + ν2β2 − ν

2β1ν2β2

),

(3) λβ =

(√1−

(1− µ2β

)λ, νλβ

), λ > 0,

(4) βλ =

(µλa ,

√1−

(1− ν2β

)λ), λ > 0.

Definition 3 ([5]). Let β = (µβ, νβ) be a PFN , then the score function andaccuracy degree of β can be denoted by: s (β) = µ2β − ν2β , s (β) ∈ [−1, 1] and

h (β) = µ2β + ν2β where h (β) ∈ [0, 1].

Definition 4 ([4]). Let βi = (µβi , νβi) (i = 1, 2, ..., n) be a collection of PFVs,then a PFWA operator of dimension n is a mapping PFWA : Ωn → Ω, thathas an associated vector w = (w1, w2, w3, ..., wn)T , such that wi ∈ [0, 1] and∑n

i=1wi = 1. Furthermore,

(2) PFWAw (β1, β2, β3, ..., βn) = w1β1 ⊕ w2β2 ⊕ w3β3 ⊕ ...⊕ wnβn.

Page 196: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

182 K. RAHMAN, F. HUSSAIN and M.S. ALI KHAN

Definition 5 ([4]). Let βi = (µβi , νβi) (i = 1, 2, ..., n) be a collection of PFV s,then a PFOWA operator of dimension n is a mapping PFOWA : Ωn → Ω,that has an associated vector w = (w1, w2, w3, ..., wn)T , such that wi ∈ [0, 1] and∑n

i=1wi = 1. Furthermore

(3) PFOWAw (β1, β2, β3, ..., βn) = w1βσ(1)⊕w2βσ(2)⊕w3βσ(3)⊕ ...⊕wnβσ(n) ,

where (σ (1) , σ (2) , σ (3) , ..., σ (n)) is any permutation of (1, 2, 3, ..., n) , suchthat βσ(i−1) ≥ βσ(i) for all i.

3. Pythagorean fuzzy hybrid averaging aggregation operator

Definition 6. A Pythagorean fuzzy hybrid averaging operator of dimension n isa mapping PFHA : Ωn → Ω, which has an associated vector w = (w1, w2, ..., wn)T ,such that wi ∈ [0, 1] and

∑ni=1wi = 1. Furthermore

(4) PFHAω,w (β1, β2, ..., βn) = w1βσ(1) ⊕ w2βσ(2) ⊕ ...⊕ wnβσ(n),

where βσ(i) is the ith largest of the weighted PFVs βσ(i)

(βσ(i) = nωiβi

). ω =

(ω1, ω2, ..., ωn)T is the weighted vector of βi (i = 1, 2, 3, ..., n) such that ωi ∈ [0, 1],∑ni=1ωi = 1, and n is the balancing coefficient, which plays a role of balance.

If the vector w = (w1, w2, ..., wn)T approaches(1n ,

1n , ...,

1n

)T, then the vector

(nω1β1, nω2β2, ..., nωnβn)T approaches (β1, β2, ..., βn)T .

Theorem 1. Let βi = (µβi , νβi) (i = 1, 2, 3, ..., n) be a collection of PFVs, thentheir aggregated value by using the PFHA operator is also a PFV, and

(5) PFHAω,w(β1, β2, β3, ..., βn) =

√√√√1−n∏i=1

(1− µ2βσ(i)

)wi ,

n∏i=1

(ν2βσ(i)

)wi

.

Proof. By mathematical induction we can prove that equation (5) holds for alln. First we show that equation (5) holds for n = 2. Since

w1βσ(1)=

(√1− (1− µ2

βσ(1))w1 , νw1

βσ(1)

), w2βσ(2)=

(√1− (1− µ2

βσ(2))w2 , νw2

βσ(2)

).

Thus

PFHAω,w (β1, β2) = w1βσ(1) ⊕ w2βσ(2)

=

√√√√1−

2∏i=1

(1− µ2

βσ(i)

)wi,

2∏i=1

νwiβσ(i)

.

Thus equation (5) holds for n = 2. Now we show that equation (5) holds forn = k. Thus

PFHAω,w (β1, β2, β3, ..., βk) =

√√√√1−

k∏i=1

(1− µ2

βσ(i)

)wi,

k∏i=1

(νβσ(i)

)wi .

Page 197: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

PYTHAGOREAN FUZZY HYBRID AVERAGING AGGREGATION OPERATOR ... 183

If equation (5) true for n = k, then we show that equation (5) holds for n = k+1.Thus

PFHAω,w (β1, β2, ..., βk+1) =

√√√√1−

k∏i=1

(1− µ2

βσ(i)

)wi,k∏i=1

(νβσ(i)

)wi+

(√1−

(1− µ2

βσ(k+1)

)wk+1

,(νβσ(k+1)

)wk+1

)

=

√√√√1−

k+1∏i=1

(1− µ2

βσ(i)

)wi,

k+1∏i=1

(νβσ(i)

)wi .

Thus equation (5) holds for n = k + 1. Thus equation (5) holds for n.

Theorem 2. Let βi = (µβi , νβi) (i = 1, 2, 3, ..., n) be a collection of PFVs, thenthe following conditions always true.

(1) (Idempotency): If βσ(i) = β, for all i, then

(6) PFHAω,w (β1, β2, β3, ..., βn) = β.

(2) (Boundary):

(7) β−σ(i) ≼ PFHAω,w (β1, β2, β3, ..., βn) ≼ β+σ(i),

where β+σ(i) = (maxi(µβσ(i)),mini(νβσ(i))), β−σ(i) = (mini(µβσ(i)),maxi(νβσ(i))).

(3) (Monotonicity): Let β∗σ(i) = (µβ∗σ(i), νβ∗

σ(i))(i = 1, 2, 3, ..., n) a collection

of PFVs, if µβσ(i) ≼ µβ∗σ(i)

and νβσ(i) ≽ νβ∗σ(i)

for all i, then

(8) PFHAω,w (β1, β2, β3, ..., βn) ≼ PFHAω,w (β∗1 , β∗2 , β

∗3 , ..., β

∗n) .

Proof. Idempotency: Since PFHAω,w(β1, β2, β3, ..., βn) = w1βσ(1) ⊕ w2βσ(2) ⊕...⊕ wnβσ(n) = (w1 ⊕ w2 ⊕ ...⊕ wn)β = β.

Boundedness: Since β−σ(j)≼ PFHAω,w (β1, β2, β3, ..., βn) ≼ β+

σ(j). Since

⇔ mini

(µβσ(i)

)≼ µβσ(i) ≼ max

i

(µβσ(i)

)⇔ min

i

(µβσ(i)

)≼

√√√√1−n∏i=1

(1− µ2

βσ(i)

)wi≼ max

i

(µβσ(i)

).(9)

Again

⇔ mini

(νβσ(i)

)≼ νβσ(i) ≼ max

i

(νβσ(i)

)⇔ min

i

(νβσ(i)

)≼

n∏i=1

νwiβσ(i)≼ max

i

(νβσ(i)

).(10)

Page 198: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

184 K. RAHMAN, F. HUSSAIN and M.S. ALI KHAN

Let PFHAω,w(β1, β2, ..., βn) = βσ(i) = (µβσ(i) , νβσ(i)). Then s(βσ(i)) ≼ s(β+σ(i)

).

Again s(βσ(i)) ≽ s(β−σ(i)). Thus

(11) β−σ(i)≺ PFWAω,w (β1, β2, β3, ..., βn) ≺ β+

σ(i).

If s(βσ(i)

) = s(β+σ(i)

). Then h(βσ(i)

) = µ2βσ(i)

+ν2βσ(i)

= maxi(µβσ(i))2+mini(νβσ(i))

2 =

h(β+σ(i)

). Thus

(12) PFHAω,w (β1, β2, β3, ..., βn) = β+σ(i).

If s(βσ(i)

) = s(β−σ(i)

). Then h(βσ(i)

) = µ2βσ(i)

+ν2βσ(i)

= mini(νβσ(i))2+maxi(µβσ(i))

2 =

h(β−σ(i)

). Thus

(13) PFHAω,w (β1, β2, β3, ..., βn) = β−σ(i).

Thus from equation (11) to (13), we have β−σ(i)≼ PFHAω,w(β1, β2, β3, ..., βn) ≼

β+σ(i).

(3) (Monotonicity): Follows the proof of above.

Theorem 3. The PFWA operator is a special case of the PFHA operator.

Proof. Let w =(1n ,

1n , ...,

1n

)T, then

PFHAω,w(β1, β2, β3, ..., βn) = w1βσ(1) ⊕ w2βσ(2) ⊕ ... ⊕ wnβσ(n) = 1n(βσ(1) ⊕

βσ(2) ⊕ ...⊕ βσ(n)) = ω1β1 ⊕ ω2β2 ⊕ ...⊕ ωnβn = PFWAω(β1, β2, β3, ..., βn).

Theorem 4. The PFOWA operator is a special case of the PFHA operator.

Proof. ω =(1n ,

1n ,

1n , ...,

1n

)T, then βσ(i) = βσ(i) (i = 1, 2, 3, ..., n) . Thus

PFHAω,w(β1, β2, β3, ..., βn) = w1βσ(1) ⊕ w2βσ(2) ⊕ ... ⊕ wnβσ(n) = w1βσ(1) ⊕w2βσ(2) ⊕ ...⊕ wnβσ(n) = PFOWAw(β1, β2, β3, ..., βn).

4. Approaches to multiple attribute decision making withpythagorean fuzzy information

Algorithm 1. Let A = (A1, A2, ..., Am) be the set of alternatives and C =(C1, C2, ..., Cn) be the set of attributes. Let ω = (ω1, ω2, ..., ωn)T be the weightedvector of attributes, Cj (j = 1, 2, ..., n) , such that ωj ∈ [0, 1] and

∑nj=1ωi = 1. Let

us suppose that, D = (dij)m×n = (µij , νij)m×n

be the Pythagorean fuzzy decisionmatrix.

Step 1: Construct decision matrix.Step 2: Calculating Aij = nwjAij .Step 3: Apply PFHA operator to derive the overall preference values.Step 4: Calculate the score function.Step 5: Ranking to the given alternatives accoring to their scores function.

Page 199: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

PYTHAGOREAN FUZZY HYBRID AVERAGING AGGREGATION OPERATOR ... 185

5. Numerical example

Suppose a man wants to invest money, for the investment the man has fourpossible options (1) A1 : Mobile Company (2) A2 : Car Company (3) A3 : FanCompany (4) A4 : Laptop Company. There are many factors that must be con-sidered while selecting a suitable company for investment, but here, we considerthe following four criteria. whose weighted vector is w = (0.10, 0.20, 0.30, 0.40)T .

(1) C1 : is the risk analysis,(2) C2 : is the growth analysis,(3) C3 : is the social political impact analysis,(4) C4 : is the environmental impact analysis.Step 1. The decision makers give his decision in the following table.

Table 1 : Pythagorean Fuzzy Decision Making D

C1 C2 C3 C4

A1 (0.60, 0.40) (0.70, 0.50) (0.80, 0.30) (0.70, 0.40)

A2 (0.70, 0.60) (0.60, 0.40) (0.70, 0.40) (0.60, 0.50)

A3 (0.60, 0.60) (0.70, 0.40) (0.80, 0.40) (0.70, 0.50)

A4 (0.70, 0.40) (0.60, 0.50) (0.70, 0.30) (0.60, 0.40)

Using βij = nωjβij , where ω = (0.10, 0.20, 0.30, 0.40)T we have

β11 = (0.40, 0.69) , β12 = (0.64, 0.57) , β13 = (0.84, 0.23) , β14 = (0.81, 0.23)

β21 = (0.48, 0.81) , β22 = (0.54, 0.48) , β23 = (0.74, 0.33) , β24 = (0.71, 0.32)

β31 = (0.40, 0.81) , β32 = (0.64, 0.48) , β33 = (0.84, 0.33) , β34 = (0.81, 0.32)

β41 = (0.48, 0.69) , β42 = (0.54, 0.57) , β43 = (0.74, 0.23) , β44 = (0.71, 0.23) .

By the score function we have

βσ(11) = (0.84, 0.23), βσ(12) = (0.81, 0.23), βσ(13) = (0.64, 0.57), βσ(14) = (0.40, 0.69)

βσ(21) = (0.74, 0.33), βσ(22) = (0.71, 0.32), βσ(23) = (0.54, 0.48), βσ(24) = (0.48, 0.81)

βσ(31) = (0.84, 0.33), βσ(32) = (0.81, 0.32), βσ(33) = (0.64, 0.48), βσ(34) = (0.40, 0.81)

βσ(41) = (0.74, 0.23), βσ(42) = (0.71, 0.23), βσ(43) = (0.54, 0.57), βσ(44) = (0.48, 0.69).

Step 2. Using Pythagorean fuzzy hybrid averaging operator, whereω = (0.10, 0.20, 0.30, 0.40)T we have d1 = (0.65, 0.47), d2 = (0.60, 0.53), d3 =(0.60, 0.47), d4 = (0.45, 0.41).Step 3. Calculating scores function s(di)(i = 1, 2, 3, 4), s(d1) = 0.14, s(d2) =0.08, s(d3) = 0.15, s(d4) = −0.01.Step 4. Thus A3 : fan company is the best option for a man to invest his money.

6. Conclusion

In this paper, we have defined Pythagorean fuzzy hybrid averaging operator,which is the generalization of PFWA operator and PFOWA operator. At the

Page 200: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

186 K. RAHMAN, F. HUSSAIN and M.S. ALI KHAN

last we applied the proposed operator to MCDM problem, based on Pythagoreanfuzzy information.

References

[1] L. A. Zadeh, Fuzzy sets, Information and Control, 8 (1965), 338-353.

[2] K. Atanassov, Intuitionistic fuzzy sets, Fuzzy Sets Syst., 20 (1986), 87-96.

[3] R. R. Yager, Pythagorean membership grades in multi-criteria decisionmaking, IEEE Trans Fuzzy Syst., 22 (2014), 958-965.

[4] R. R. Yager, A. M. Abbasov, Pythagorean membeship grades, complex num-bers and decision making, Int. J. Intell Syst., 28 (2013), 436–452.

[5] X. Zang, Z. S. Xu, Extension of TOPSIS to multiple criteria decision mak-ing with pythagorean fuzzy sets, international journal of intelligent systems,29 (2014), 1061–1078.

[6] H. Garg, Generalized pythagorean fuzzy geometric aggregation operators us-ing einstein t-norm and t-conorm for multicriteria decision-making process,International Journal of Intelligent Systems, 2016, 1–34.

[7] H. Garg, A new generalized pythagorean fuzzy information aggregation us-ing einstein operations and its application to decision making, InternationalJournal of Intelligent Systems, (2011), 1–35.

[8] K. Rahman, S. Abdullah, M. S. Ali Khan, M. Shakeel, Pythagorean fuzzyhybrid geometric operator and their application to multiple attribute deci-sion making, International Journal of Computer Science and InformationSecurity, 14 (2016), 837-854.

[9] K. Rahman, S. Abdullah, F. Hussain, M. S. Ali Khan, Approaches topythagorean fuzzy geometric aggregation operators, International Journalof Computer Science and information security, 14 (2016), 174-200.

[10] K. Rahman, M.S.A. Khan, M. Ullah, A. Fahmi, Multiple attribute groupdecision making for plant location selection with pythagorean fuzzy weightedgeometric aggregation operator, The Nucleus, 54 (2017), 66-74.

[11] K. Rahman, S. Abdullah, F. Hussain, M. S. Ali Khan, Pythagorean fuzzyordered weighted geometric aggregation operator and their application tomultiple attribute group decision making, J. Appl. Environ. Biol. Sci., 7(2017), 67-83.

[12] K. Rahman, A. Ali, M. Shakeel, M.S. A. Khan, Murad Ullah, Pythagoreanfuzzy weighted averaging aggregation operator and its application to decisionmaking theory, The Nucleus, 54 (2017), 190-196.

Page 201: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

PYTHAGOREAN FUZZY HYBRID AVERAGING AGGREGATION OPERATOR ... 187

[13] K. Rahman, M. S. A. Khan, M. Ullah, New Approaches to pythagorean fuzzyaveraging aggregation operators, Mathematics Letters, 3 (2017), 29-36.

[14] K. Rahman, M. S. Ali Khan, S. Abdullah, F. Husain, M. Ibrar, Someproperties of pythagorean fuzzy hybrid averaging aggregation operator, J.Appl. Environ. Biol. Sci., 7 (2017), 122-133.

[15] K. Rahman, S. Abdullah, A. Ali, F. Amin, Some induced averaging aggre-gation operators based on pythagorean fuzzy numbers, Mathematics Letters,3 (2017), 40-45.

[16] K. Rahman, S. Abdullah, R. Ahmed, M. Ullah, Pythagorean fuzzy Einsteinweighted geometric aggregation operator and their application to multipleattribute group decision making, Journal of Intelligent & Fuzzy Systems, 33(2017), 635–647.

[17] K. Rahman, S. Abdullah, M. Shakeel, M. S. Ali Khan, M. Ullah, Interval-valued pythagorean fuzzy geometric aggregation operators and their appli-cation to group decision making problem, Cogent Mathematics, 4 (2017),1338638.

[18] K. Rahman, S. Abdullah, M. S. Ali Khan M. Ibrar, F. Husain, Some basicoperations on pythagorean fuzzy sets, J. Appl. Environ. Biol. Sci., 7 (2017),111-119.

[19] K. Rahman, A. Ali, M. S. Ali Khan, Some interval-valued pythagorean fuzzyweighted averaging aggregation operators and their application to multipleattribute decision making, Punjab University Journal of Mathematics, 50(2018), 113-129.

[20] K. Rahman, S. Abdullah, M. S. Ali Khan, Some interval-valued pythagoreanfuzzy einstein weighted averaging aggregation operators and their applica-tion to group decision making, J. Intell. Syst., (2018), 1-16.

[21] K. Rahman, S. Abdullah, Generalized interval-valued Pythagorean fuzzy ag-gregation operators and their application to group decision-making, Granu-lar Computing, https://doi.org/10.1007/s41066-018-0082-9

[22] K. Rahman, S. Abdullah, A. Ali, Some induced aggregation operatorsbased on interval-valued pythagorean fuzzy numbers, Granular Computing,https://doi.org/10.1007/s41066-018-0091-8.

Accepted: 6.04.2017

Page 202: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (188–199) 188

1-MOVABLE DOUBLY CONNECTED DOMINATION INGRAPHS

Renario G. Hinampas, Jr.∗

College of Teacher EducationBohol Island State University-Main CampusCPG North Avenue, 6300 Tagbilaran City, BoholPhilippinesrenariojr.hinampas@[email protected]

Sergio R. Canoy, Jr.Department of Mathematics and Statistics

Mindanao State University-Iligan Institute of Technology

Tibanga Highway, 9200 Iligan City

Philippines

serge [email protected]

Abstract. This paper presents some characterizations involving the concept of 1-movable doubly connected domination and investigates the 1-movable doubly connecteddominating sets in the join of graphs. Moreover, the 1-movable doubly connected dom-ination number of the join of graphs is determined.

Keywords: Doubly connected domination, 1-movable doubly connected domination,internal and external private neighbors, join.

1. Introduction

Let G = (V (G), E(G)) be a graph and v ∈ V (G). The open neighborhood of v isthe setNG(v) = N(v) = u ∈ V (G) : uv ∈ E(G) and the closed neighborhood ofv is the set NG[v] = N [v] = N(v)∪v. If S ⊆ V (G), then the open neighborhoodof S is the set NG(S) = N(S) = ∪v∈SNG(v) and the closed neighborhood of S isthe set NG[S] = N [S] = S ∪N(S). A subset S of V (G) is a dominating setof G if for every v ∈ V (G)\S, there exists u ∈ S such that uv ∈ E(G), that is,NG[S] = V (G). The domination number of G denoted by γ(G), is the smallestcardinality of a dominating set of G. A dominating set of G with cardinalityequal to γ(G) is called a γ-set of G. If S is a dominating set of G, then a vertexw is a private neighbor of v ∈ S with respect to S if N(w)∩ S = v. If w ∈ S,then w is an internal private neighbor of v ∈ S, otherwise, w is an externalprivate neighbor of v ∈ S. The set of private neighbors of v ∈ S is denoted bypn (v;S), the set of internal private neighbors of v ∈ S is denoted by ipn (v;S)

∗. Coressponding author

Page 203: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

1-MOVABLE DOUBLY CONNECTED DOMINATION IN GRAPHS 189

and the set of external private neighbors of v ∈ S is denoted by epn (v;S). Adominating set S of V (G) is a connected dominating set of G if the subgraph ⟨S⟩induced by S is connected. The connected domination number of G, denotedby γc(G), is the smallest cardinality of a connected dominating set of G. Aconnected dominating set of G with cardinality equal to γc(G) is called a γc-setof G. A non-empty subset S of V (G) is a doubly connected dominating set ofG if S is a connected dominating set and the subgraph ⟨V (G) \ S⟩ induced byV (G) \S is connected. The doubly connected domination number of G, denotedby γcc(G), is the smallest cardinality of a doubly connected dominating set ofG. A doubly connected dominating set of G with cardinality equal to γcc(G) iscalled a γcc-set of G. Doubly connected domination in graphs was studied in[1], [2], [5] and [8].

A non-empty set S ⊆ V (G) is a 1-movable doubly connected dominatingset of G if (i) S = V (G) and for each v ∈ S, S \ v is a doubly connecteddominating set of G or (ii) S is a doubly connected dominating set of G and foreach v ∈ S, S \v is a doubly connected dominating set of G or (S \ v)∪uis a doubly connected dominating set of G for some u ∈ (V (G) \ S) ∩ NG(v) .The 1-movable doubly connected domination number of a graph G, denoted byγ1mcc(G), is the smallest cardinality of a 1-movable doubly connected dominatingset of G. A 1-movable doubly connected dominating set of G with cardinalityequal to γ1mcc(G) is called γ1mcc-set of G.

Consider for example the graph as shown in Figure 1. The sets S = x, y,(S \ x) ∪ z3 = y, z3 and (S \ y) ∪ w1 = x,w1 are doubly connecteddominating sets of G. Moreover, S is a γ1mcc-set of G. Hence, γ1mcc(G) = |S| = 2.

Figure 1: A graph G with a 1-movable doubly connected dominating set

The movability of sets in some variants of domination were introduced andstudied in [3], [6], [7], [9] and [10].

2. Results

Remark 2.1 ([4]). Every connected dominating set in a connected graph con-tains every cut-vertex of G.

Page 204: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

190 RENARIO G. HINAMPAS JR. and SERGIO R. CANOY JR.

The next result characterizes those graphs with 1-movable doubly connecteddominating sets.

Theorem 2.2. A connected nontrivial graph G has a 1-movable doubly con-nected dominating set if and only if G has no cut-vertices.

Proof. Suppose that G has a 1-movable doubly connected dominating set, sayS. Then clearly, S is a connected dominating set of G. Suppose further that Ghas a cut-vertex, say v. Then by Remark 2.1, v ∈ S. Thus, ⟨S \ v⟩ and ⟨(S \v)∪u⟩ are not connected subgraphs of G for every u ∈ (V (G) \S)∩NG(v).Hence, S is not a 1-movable doubly connected dominating set of G. This is acontradiction to the assumption. Therefore, G has no cut-vertex.

For the converse, suppose that G has no cut-vertex. Let S = V (G) and letv ∈ S. From the assumption, v is not a cut-vertex. Hence, S\v is a connecteddominating set of G and ⟨V (G) \ (S \ v)⟩ ∼= K1 is a connected subgraph of G.Hence, S \ v is a doubly connected dominating set of G. Thus, S = V (G) isa 1-movable doubly connected dominating set of G.

The next result follows from the proof of Theorem 2.2.

Corollary 2.3. If G is a connected nontrivial graph without cut-vertices, thenV (G) is a 1-movable doubly connected dominating set of G.

Clearly, every 1-movable doubly connected dominating set S = V (G) of agraph G is a doubly connected dominating set of G. Hence, γcc(G) ≤ γ1mcc(G)for any graph G without cut-vertices. Moreover, for any graph G without cut-vertices, 1 ≤ γ1mcc(G) ≤ n and these bounds are sharp. Consider the completegraph K10 and the cycle C10 as shown in Figure 2. In these graphs, γ1mcc(K10) =1 and γ1mcc(C10) = 10.

Figure 2: The complete graph K10 and the cycle C10.

The next result characterizes all graphs without cut-vertices which attainedthe lower bound.

Theorem 2.4. Let G be a connected nontrivial graph without cut-vertices. Thenγ1mcc(G) = 1 if and only if G = K2 or G ∼= K2 +H for some graph H.

Proof. Suppose that γ1mcc(G) = 1. Let S = x be a γ1mcc-set of G for somex ∈ V (G). If |V (G)| = 2, then G = K2. Suppose that |V (G)| ≥ 3. Since S is

Page 205: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

1-MOVABLE DOUBLY CONNECTED DOMINATION IN GRAPHS 191

a dominating set of G, xv ∈ E(G) for all v ∈ V (G) \ x. Also, since S is a1-movable doubly connected dominating set of G, there exists u ∈ (V (G) \ S)∩NG(x) such that (S \ x) ∪ u = u is a doubly connected dominating setof G. This implies that uw ∈ E(G) for all w ∈ V (G) \ u. This means thatxu ∈ E(G). Let H = ⟨V (G)\x, u⟩. Then G = ⟨x, u⟩+H ∼= K2+H. Forthe converse, suppose first that G = K2. Then, clearly, γ1mcc(G) = 1. Supposethat G = K2 +H. Let V (K2) = x, y and let S = x. Then S is a connecteddominating set of G and ⟨V (G) \ S⟩ = ⟨V (G) \ x⟩ = ⟨y⟩+H is connected.Hence, S is a doubly connected dominating set of G. Furthermore, since y ∈(V (G)\S)∩NG(x) and (S \x)∪y = y is a connected dominating set of Gand ⟨V (G)\y⟩ = ⟨x⟩+H is connected, it follows that (S \x)∪y = yis a doubly connected dominating set of G. Consequently, S is a 1-movabledoubly connected dominating set of G and hence, a γ1mcc-set of G. Thereforeγ1mcc(G) = |S| = 1.

Corollary 2.5. γ1mcc(Kn) = 1 for all n ≥ 2.

The next result characterizes the concept of 1-movable doubly connecteddomination in graphs in terms of the concept of private neighbors.

Theorem 2.6. Let G be a connected graph without cut-vertices. A proper subsetS of V (G) is a 1-movable doubly connected dominating set of G if and only ifS is a doubly connected dominating set of G and for each v ∈ S, either

(i) epn(v;S) = ipn(v;S) = ∅ and ⟨(V (G) \ S) ∪ v⟩ is connected or

(ii) there exists u ∈ (V (G) \ S)∩NG(v) such that ⟨[V (G) \ (S ∪u)]∪v⟩ isconnected, epn(v;S) ∪ ipn(v;S) ⊆ N(u) and u ∈ NG[(S \ v) \ ipn(v;S)]whenever S \ v = ipn(v;S).

Proof. Suppose S is a 1-movable doubly connected dominating set of G, whereS = V (G). Then S is a doubly connected dominating set of G. Let v ∈ S.Since S is a 1-movable doubly connected dominating set of G, S \ v or Sv =(S\v)∪u, for some u ∈ (V (G)\S)∩NG(v), is a doubly connected dominatingset of G. Suppose that S \v is a doubly connected dominating set of G. Then⟨V (G) \ (S \ v)⟩ = ⟨(V (G) \ S) ∪ v)⟩ is connected and every vertex w in(V (G) \ S) ∩ NG(v) is adjacent to some vertex in S \ v. This implies thatepn(v;S) = ∅. Moreover, since ⟨S \ v⟩ is connected, ipn(v;S) = ∅. SupposeS \ v is not a doubly connected dominating set of G. Then there exists avertex u ∈ (V (G) \ S) ∩NG(v) such that Sv is a doubly connected dominatingset of G. Hence, ⟨V (G) \ Sv⟩ = ⟨[V (G) \ (S ∪ u)] ∪ v⟩ is connected. Letz ∈ epn(v;S). Then z ∈ N(u) since Sv is a dominating set of G. Thus,epn(v;S) ⊆ N(u). Also, if y ∈ ipn(v;S), then y ∈ N(u) since ⟨Sv⟩ is connected.Thus, epn(v;S) ∪ ipn(v;S) ⊆ N(u). Now, suppose that S \ v = ipn(v;S).Suppose further that u /∈ NG[(S \ v) \ ipn(v;S)]. Then ⟨(S \ v) \ ipn(v;S)⟩

Page 206: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

192 RENARIO G. HINAMPAS JR. and SERGIO R. CANOY JR.

and ⟨u ∪ ipn(v;S)⟩ are components of ⟨Sv⟩, contrary to the fact that ⟨Sv⟩ isconnected. Therefore, u ∈ NG[(S \v)\ ipn(v;S) whenever S \v = ipn(v;S).

For the converse, suppose that S is a doubly connected dominating set of Gsatisfying one of the given conditions. Let v ∈ S. If (i) holds, then epn(v;S) =ipn(v;S) = ∅. Hence, S \ v is a connected dominating set of G. Furthermore,since ⟨(V (G) \ S) ∪ v⟩ = ⟨V (G) \ (S \ v)⟩ is connected, S \ v is a doublyconnected dominating set of G. Suppose that (ii) holds. Then there existsu ∈ (V (G) \ S) ∩ NG(v) such that epn(v;S) ∪ ipn(v;S) ⊆ N(u). Set Sv =(S \ v) ∪ u and let x ∈ V (G) \ Sv. If x = v or x ∈ epn(v;S), thenxu ∈ E(G). If x /∈ v∪ epn(v;S), then xy ∈ E(G) for some y ∈ S \ v since Sis a dominating set ofG. Thus, Sv is a dominating set ofG. If S\v = ipn(v;S),then S \ v ⊆ N(u). Thus, ⟨Sv⟩ is connected. If S \ v = ipn(v;S), then byassumption, u ∈ NG[(S \ v) \ ipn(v;S)⟩. Hence, since ipn(v;S) ⊆ NG(u) also,⟨Sv⟩ is connected. Thus, Sv is a connected dominating set of G. Furthermore, byassumption, ⟨[V (G)\(S∪u)]∪v⟩ = ⟨V (G)\[(S\v)∪u]⟩ = ⟨V (G)\Sv⟩ isconnected. Hence, Sv is a doubly connected dominating set of G. Accordingly,S is a 1-movable doubly connected dominating set of G.

Theorem 2.7. Let G be a connected graph without cut-vertices and let its orderbe n ≥ 3. Then γ1mcc(G) = 2 if and only if the following conditions hold:

(i) G is not isomorphic to K2 +H for any graph H and

(ii) there exist two adjacent vertices x and y that dominate G such that

(a) ⟨V (G) \ x, y⟩ is connected

(b) epn(x; x, y) = ∅ or ∅ = epn(x; x, y) ⊆ NG(z) for some z ∈NG(x) ∩NG(y) and ⟨V (G) \ z, y⟩ is connected and

(c) epn(y; x, y) = ∅ or ∅ = epn(y; x, y) ⊆ NG(w) for some w ∈NG(x) ∩NG(y) and ⟨V (G) \ x,w⟩ is connected.

Proof. Suppose that γ1mcc(G) = 2. Then by Theorem 2.4, G is not isomorphicto K2 +H for any graph H. Thus, (i) holds. Let S = x, y be a γ1mcc-set of G.Since S is a doubly connected dominating set of G, x and y are two adjacentvertices that dominate G and ⟨V (G) \ x, y⟩ is connected. Suppose first thatS \ x is a doubly connected dominating set of G. Then epn(x; x, y) = ∅.Suppose that S \ x is not a doubly connected dominating set of G. Then(S \ x) ∪ z = y, z is a doubly connected dominating set of G for somez ∈ (V (G) \ S) ∩NG(x). This implies that z ∈ NG(y) and ⟨V (G) \ z, y⟩ is aconnected subgraph of G. Let v ∈ epn(x; x, y). Since vy /∈ E(G) and sincez, y is a dominating set of G, it follows that v ∈ NG(z). Since v was arbitrarilychosen, it follows that epn(x; x, y) ⊆ NG(z). Similarly, (c) holds. Hence, (ii)holds.

For the converse, suppose that (i) and (ii) hold. Then by Theorem 2.4,γ1mcc(G) ≥ 2. Let S = x, y such that x and y are vertices in G satisfying (ii).Then S is a doubly connected dominating set of G. Now by (b), suppose that

Page 207: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

1-MOVABLE DOUBLY CONNECTED DOMINATION IN GRAPHS 193

epn(x; x, y) = ∅. Then S \ x = y is a connected dominating set of G.Since y is not a cut-vertex, ⟨V (G) \y⟩ is connected. Thus, S \x is a doublyconnected dominating set of G. Suppose that ∅ = epn(x; x, y) ⊆ NG(z) forsome z ∈ (V (G) \ S)∩ [NG(x)∩NG(y)] and ⟨V (G) \ z, y⟩ is connected. Then(S \ x) ∪ z = y, z is a doubly connected dominating set of G. Similarly,S \ y = x or (S \ y) ∪ w = x,w is a doubly connected of G for somew ∈ NG(x) ∩NG(y). Hence, S is a 1-movable doubly connected dominating setof G and thus a γ1mcc-set of G. Therefore, γ1mcc(G) = |S| = 2.

We now characterize the 1-movable doubly connected dominating sets in thejoin of two connected nontrivial graphs.

Theorem 2.8 ([2]). Let G and H be any graphs of orders m ≥ 2 and n ≥ 2,respectively. Then S ⊆ V (G+H) is a doubly connected dominating set of G+Hif and only if at least one of the following holds:

(i) S ⊆ V (G) is a connected dominating set of G, where H is connected ifS = V (G);

(ii) S ⊆ V (H) is a connected dominating set of H, where G is connected ifS = V (H);

(iii) V (G) ⊆ S, V (H) ∩ S = ∅, and ⟨V (H) \ (S ∩ V (H))⟩ is a connected sub-graph of H;

(iv) V (H) ⊆ S, V (G) ∩ S = ∅, and ⟨V (G) \ (S ∩ V (G))⟩ is a connected sub-graph of G;

(v) 1 ≤ |S ∩ V (G)| < m and 1 ≤ |S ∩ V (H)| < n.

Theorem 2.9. Let G and H be connected graphs of order m ≥ 2 and n ≥ 2,respectively. Then S ⊆ V (G + H) is a 1-movable doubly connected dominatingset of G+H if and only if one of the following statements is true:

(i) S = V (G+H).

(ii) S is a connected dominating set of G such that if |S| = 1, then either S isa 1-movable connected dominating set of G or there exists u ∈ V (H) suchthat u is a connected dominating set of H.

(iii) S is a connected dominating set of H such that if |S| = 1, then either Sis a 1-movable connected dominating set of H or there exists w ∈ V (G)such that w is a connected dominating set of G.

(iv) S = S1 ∪ S2(= V (G+H) where ∅ = S1 ⊆ V (G) and ∅ = S2 ⊆ V (H) suchthat

(1) if S1 = V (G), then ⟨V (H) \ S2⟩ is connected and for every v ∈ S2,either ⟨V (H) \ (S2 \ v)⟩ or ⟨V (H) \ [(S2 \ v) ∪ u]⟩ is connected forsome u ∈ (V (H) \ S2) ∩NH(v) and

Page 208: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

194 RENARIO G. HINAMPAS JR. and SERGIO R. CANOY JR.

(2) if S2 = V (H), then ⟨V (G) \ S1⟩ is connected and for every v ∈ S1,either ⟨V (G) \ (S1 \ v)⟩ or ⟨V (G) \ [(S1 \ v) ∪ u]⟩ is connected forsome u ∈ (V (G) \ S1) ∩NG(v).

Proof. Suppose that S is a 1-movable doubly connected dominating set of G+H. If S = V (G + H), then (i) holds. Suppose that S = V (G + H). ThenS is a doubly connected dominating set of G + H. Suppose that S ⊆ V (G).Then by Theorem 2.8(i), S is a connected dominating set of G. Suppose that|S| = 1, say S = x for some x ∈ V (G). If γ(H) = 1, then there existsu ∈ V (H) such that u is a dominating set of H. Suppose that γ(H) =1. Since S is a 1-movable doubly connected dominating set of G + H, thereexists w ∈ (V (G + H) \ S) ∩ NG(x) such that (S \ x) ∪ w = w is adoubly connected dominating set of G + H. Since γ(H) = 1, it follows thatw ∈ V (G) \ S. Hence, (S \ x) ∪ w = w is a connected dominating setof G. Thus, S is a 1-movable connected dominating set of G. This proves (ii).Similarly, (iii) holds if S ⊆ V (H). Next, suppose that S1 = S ∩ V (G) = ∅and S2 = S ∩ V (H) = ∅. Then S = S1 ∪ S2. Suppose that S1 = V (G). SinceS = V (G + H), S2 = V (H). Since S is a doubly connected dominating set ofG + H, ⟨V (G + H) \ S⟩ = ⟨V (H) \ S2⟩ is connected. Let v ∈ S2. With theassumption, suppose first that S \ v is a doubly connected dominating set ofG+H. Then ⟨V (G+H)\(S \v)⟩ = ⟨V (H)\(S2\v)⟩ is connected. Supposethat S \ v is not a doubly connected dominating set of G + H. Then thereexists u ∈ (V (G + H) \ S) ∩ NG+H(v) such that (S \ v) ∪ u is a doublyconnected dominating set of G+H. Since S1 = V (G), u ∈ (V (H)\S2)∩NH(v).Thus, ⟨V (G+H) \ [(S \ v)∪ u]⟩ = ⟨V (H) \ [(S2 \ v)∪ u]⟩ is connected.Showing that (1) holds. Similarly, (2) holds if S2 = V (H) Hence, (iv) holds.

For the converse, suppose first that (i) holds i.e., S = V (G + H). SinceG+H has no cut-vertices, S is 1-movable doubly connected dominating set ofG + H by Corollary 2.3. Suppose that (ii) holds. Then by Theorem 2.8(i), Sis a doubly connected dominating set of G + H. Let v ∈ S. If |S| ≥ 2, thenS \ v = ∅ and there exists u ∈ V (H) ∩ NG+H(v) such that (S \ v) ∪ uis a doubly connected dominating set of G + H by Theorem 2.8(v). Supposethat |S| = 1. Suppose further that S is a 1-movable connected dominating setof G. Then there exists w ∈ V (G) ∩ NG(v) such that (S \ v) ∪ w = wis a connected dominating set of G. By Theorem 2.8(i), (S \ v) ∪ w is adoubly connected dominating set of G+H. Suppose that S is not a 1-movableconnected dominating set of G. Then by assumption, there exists u ∈ V (H)such that u is a connected dominating set of H. Hence, (S \ v)∪u = uis a doubly connected dominating set of G+H by Theorem 2.8(ii). Therefore,S is a 1-movable doubly connected dominating set of G +H. Similarly, if (iii)holds, then S is a 1-movable doubly connected dominating set of G+H. Supposethat (iv) holds. Then S = S1 ∪ S2(= V (G + H), where ∅ = S1 ⊆ V (G) and∅ = S2 ⊆ V (H). Consider the following cases:

Case 1: S1 = V (G) and S2 = V (H) or S1 = V (G) and S2 = V (H).

Page 209: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

1-MOVABLE DOUBLY CONNECTED DOMINATION IN GRAPHS 195

Suppose that S1 = V (G) and S2 = V (H). Then by assumption, ⟨V (G)\S1⟩is connected. Hence, by Theorem 2.8(iv), S is a doubly connected dominatingset of G + H. Let v ∈ S. Suppose that v ∈ S1. If |S1| ≥ 2, then S1 \ v =∅. If ⟨(V (G) \ (S1 \ v)⟩ is connected, then S \ v = (S1 \ v) ∪ S2 isa doubly connected dominating set of G + H by Theorem 2.8(iv). Supposethat ⟨(V (G) \ (S1 \ v)⟩ is not connected. Then by assumption, there existsu ∈ (V (G) \ S1) ∪ NG(v) such that ⟨V (G) \ [(S1 \ v) ∪ u]⟩ is connected.Hence, (S \v)∪u = [(S1 \v)∪u]∪S2 is a doubly connected dominatingset of G+H by Theorem 2.8(iv). Suppose that |S1| = 1. Then S \ v = S2 =V (H) and ⟨V (G + H) \ (S \ v)⟩ = ⟨V (G)⟩ is connected. Hence, S \ v is adoubly connected dominating set of G+H by Theorem 2.8(ii). Next, supposethat v ∈ S2. Since S2 = V (H), ∅ = S2 \ v = V (H). Since S1 = V (H),S \ v = S1 ∪ (S2 \ v) is a doubly connected dominating set of G + H byTheorem 2.8(v). Therefore, S is a 1-movable doubly connected dominating setof G+H. Similarly, if S1 = V (G) and S2 = V (H), then S is a 1-movable doublyconnected dominating set of G+H.

Case 2: S1 = V (G) and S2 = V (H).

Then by Theorem 2.8(v), S = S1 ∪ S2 is a doubly connected dominating setof G + H. Let v ∈ S. Suppose that v ∈ S1. If |S1| ≥ 2, then S1 \ v = ∅.Hence, S \ v = (S1 \ v)∪S2 is a doubly connected dominating set of G+Hby Theorem 2.8(v). Suppose that |S1| = 1. Since G is a connected nontrivialgraph, there exists u ∈ V (G) such that uv ∈ E(G). Hence, |(S1\v)∪u| = 1.Thus, (S \v)∪u = [(S1 \v)∪u]∪S2 is a doubly connected dominatingset of G + H by Theorem 2.8(v). Similarly, if v ∈ S2, then either S \ vor (S \ v) ∪ u is a doubly connected dominating set of G + H for someu ∈ (V (G+H)\S)∩NG+H(v). Consequently, S is a 1-movable doubly connecteddominating set of G+H.

Corollary 2.10. Let G and H be connected nontrivial graphs. Then

γ1mcc(G+H) =

1, if γ(G) = 1 = γ(H) or γ1mc(G) = 1 or γ1mc(H) = 1

2, otherwise

Theorem 2.11. Let H be a connected graph of order n ≥ 2 and K1 = ⟨x⟩.Then S ⊆ V (K1+H) is a 1-movable doubly connected dominating set of K1+Hif and only if one of the following statements holds:

(i) S = V (K1) and there exists w ∈ V (H) such that w is a connecteddominating set of H.

(ii) S = V (K1) ∪ S1 where ∅ = S1 ⊆ V (H) such that if S1 = V (H), then

(1) ⟨V (H) \ S1⟩ is connected;

(2) either S1 is a connected dominating set of H or S1∪a is a connecteddominating set of H for some a ∈ V (H) \ S1; and

Page 210: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

196 RENARIO G. HINAMPAS JR. and SERGIO R. CANOY JR.

(3) for every v ∈ S1 , either ⟨V (H)\(S1\v)⟩ or ⟨V (H)\[(S1\v)∪u]⟩is connected for some u ∈ (V (H) \ S1) ∩NH(v).

(iii) S is a connected dominating set of H such that for every v ∈ S, S \v or(S \ v) ∪ u is a connected dominating set of H for some u ∈ (V (H) \S) ∩NH(v) or ⟨V (H) \ (S \ v)⟩ is connected.

Proof. Suppose that S ⊆ V (K1 + H) is a 1-movable doubly connected domi-nating set of K1 +H. Consider the following cases:

Case 1: x ∈ S.Suppose that S = x. Since S is a 1-movable doubly connected dominating

set of K1 + H, there exists w ∈ V (H) such that (S \ x) ∪ w = w is adoubly connected dominating set of K1 +H. It follows that w is a connecteddominating set of K1 + H (and hence of H). This proves (i). Suppose thatS = V (K1)∪ S1, where ∅ = S1 ⊆ V (H). Suppose that S1 = V (H). Since S is adoubly connected dominating set of K1 +H, it follows that ⟨V (K1 +H) \ S⟩ =⟨V (H) \ S1⟩ is connected. Suppose that S\x is a doubly connected dominatingset in K1 + H. Then S \ x = S1 is a connected dominating set in H. Next,suppose that S \ x is not a doubly connected dominating set of K1 + H.Since S is a 1-movable doubly connected dominating set of K1 +H, there existsa ∈ V (H) \ S1 such that (S \ x) ∪ a = S1 ∪ a is a doubly connecteddominating set of K1 +H. This implies that S1∪a is a connected dominatingset of H. Let v ∈ S1. Suppose that S \ v is a doubly connected dominatingset of K1 +H. Then ⟨V (K1 +H)\ (S \v)⟩ = ⟨V (H)\ (S1 \v)⟩ is connected.Suppose that S \v is not a doubly connected dominating set of K1 +H. Thenby assumption, (S \ v)∪u is a doubly connected dominating set of K1 +Hfor some u ∈ V (H) \ S1) ∩ NH(v). Hence, ⟨V (K1 + H) \ [(S \ v) ∪ u]⟩ =⟨V (H) \ [(S1 \ v) ∪ v]⟩ is connected. This proves (ii).

Case 2: x /∈ S.Then S ⊆ V (H). By assumption, S is a connected dominating set of H.

Let v ∈ S. If S \ v is a doubly connected dominating set of K1 + H, thenS \ v is a connected dominating set of H. Suppose that S \ v is not adoubly connected dominating set of K1 +H. Then by assumption, there existsu ∈ (V (K1 +H)\S)∩NK1+H(v) such that (S \v)∪u is a doubly connecteddominating set of K1 +H. If u ∈ V (H) \ S, then (S \ v)∪ u is a connecteddominating set of H. If u = x, then ⟨V (H) \ (S \ v)⟩ is connected. Thus, (iii)holds.

For the converse, suppose first that (i) holds. Then S = x = V (K1) is aconnected dominating set of K1 + H and ⟨V (K1 + H) \ S⟩ = H is connected.Thus, S is a doubly connected dominating set of K1 + H. By assumption,there exists w ∈ V (H) such that w is a connected dominating set of H.This implies that (S \ x) ∪ w = w is a connected dominating set ofK1 + H and ⟨V (K1 + H) \ w⟩ = ⟨(V (H) \ w) ∪ x⟩ is connected. Hence,(S\x)∪w = w is a doubly connected dominating set ofK1+H. Therefore,S is a 1-movable doubly connected dominating set of K1 +H. Suppose that (ii)

Page 211: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

1-MOVABLE DOUBLY CONNECTED DOMINATION IN GRAPHS 197

holds. Suppose first that S = V (K1 + H). Since K1 + H has no cut-vertices,by Corollary 2.3, S is a 1-movable doubly connected dominating set of K1 +H.Suppose that S1 = V (H). Then by (1), S is a doubly connected dominating setof K1 +H. Let v ∈ S. Consider the following cases:

Case 1: v = x.

Suppose that S1 is a connected dominating set of H. Then S \ v =S \x = S1 is a connected dominating set of K1+H. Since ⟨V (K1+H)\S1⟩ =⟨x⟩+ ⟨V (H) \ S1⟩ is connected, S \ v is a doubly connected dominating setof K1 +H. Suppose that S1 is not a connected dominating set of H. Then byassumption, S1∪a is a connected dominating set of H for some a ∈ V (H)\S1.It follows that (S\x)∪a = S1∪a is a connected dominating set of K1+H.Moreover, since ⟨V (K1+H)\[(S1\v)∪a]⟩ = ⟨V (H)\[(S1\v)∪a]∪x⟩is connected, (S \ x) ∪ a is a doubly connected dominating set of K1 +H.

Case 2: v = x.

Then v ∈ S1. Clearly, S \ v = x ∪ (S1 \ v) is a connected dominatingset of K1+H. If ⟨V (H)\(S1\v)⟩ is connected, then ⟨V (K1+H)\(S\v)⟩ =⟨V (H)\(S1\v)⟩ is connected. Thus, S\v is a doubly connected dominatingset of K1 + H. Suppose that ⟨V (H) \ (S1 \ v)⟩ is not connected. Then byassumption, ⟨V (H) \ [(S1 \ v)∪ u⟩ is connected for some u ∈ (V (H) \S1)∩NH(v). Hence, ⟨V (K1 +H) \ [(S \ v) ∪ u]⟩ = ⟨V (H) \ [(S1 \ v) ∪ u⟩ isconnected. Moreover, (S \ v) ∪ u = x ∪ [(S1 \ v) ∪ u] is a connecteddominating set of K1+H. Thus, (S\v)∪u is a doubly connected dominatingset of K1 +H. Therefore, S is a 1-movable doubly connected dominating set ofK1 +H.

Finally, suppose that (iii) holds. Since S is a connected dominating set of H,it is a connected domonating set of K1 +H. Moreover, since ⟨V (K1 +H)\S⟩ =⟨x⟩ + ⟨V (H) \ S⟩ is connected, S is a doubly connected dominating set ofK1 +H. Now, let v ∈ S. Suppose that S \ v is a connected dominating set ofH. Since ⟨V (K1 +H)\(S \v)⟩ = K1 +⟨V (H)\(S \v)⟩ is connected, S \vis a doubly connected dominating set of K1 +H. Suppose that (S \ v) ∪ uis a connected dominating set of H for some u ∈ (V (H)\S)∩NH(v). Then it isa connected dominating set of K1 +H. Since ⟨V (K1 +H) \ [(S \ v)∪ u]⟩ =K1+⟨V (H)\ [(S\v)∪u]⟩ is connected, (S\v)∪u is a doubly connecteddominating set of K1 +H. Suppose that ⟨V (H) \ (S \ v)⟩ is connected in H.Let S∗ = (S \ v) ∪ x. Then S∗ is a connected dominating set of K1 + H.Since ⟨V (K1 +H) \ S∗⟩ = ⟨V (H) \ (S \ v)⟩ is connected in K1 +H, it followsthat S∗ is a doubly connected dominating set of K1+H. Thus, S is a 1-movabledoubly connected dominating set of K1 +H.

Corollary 2.12. Let H be a connected nontrivial graph. Then the followingholds:

(i) γ1mcc(K1 +H) = 1 if and only if γ(H) = 1.

(ii) If H has no cut-vertices, then γ1mcc(K1 +H) ≤ γ1mc(H).

Page 212: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

198 RENARIO G. HINAMPAS JR. and SERGIO R. CANOY JR.

Corollary 2.13. Let n be a positive integer. Then

γ1mcc(Fn) =

1, if 1 ≤ n ≤ 3

n, if n ≥ 4

and

γ1mcc(Wn) =

1, if n = 3

2, if n = 4

3, if n = 5

n, if n ≥ 6

Theorem 2.14. Let m ≥ 2 and n ≥ 2 be integers. Then S ⊆ V (Km,n) is a1-movable doubly connected dominating set of Km,n = Km + Kn if and only ifS = S1 ∪ S2, where ∅ = S1 ⊆ V (Km) with |S1| ≥ 2 and ∅ = S2 ⊆ V (Kn) with|S2| ≥ 2 such that S1 = V (Km) if and only if S2 = V (Kn).

Proof. Suppose that S ⊆ V (Km,n) is a 1-movable doubly connected dominatingset of Km,n. Let S1 = S∩V (Km) and S2 = S∩V (Kn). Then S = S1∪S2. SinceS is a (doubly) connected dominating set of Km,n, S1 = ∅ and S2 = ∅. Supposethat |S1| = 1, say S1 = x for some x ∈ V (Km). Then ⟨S \ x⟩ = ⟨S2⟩ is anempty subgraph of Kn. Hence, S \ x is not a (doubly)connected dominatingset of Km,n. Also, ⟨(S \ x) ∪ u⟩ = ⟨S2 ∪ u⟩ is an empty subgraph ofKn for all u ∈ V (Kn) \ S2. Hence, (S \ x) ∪ u is not a (doubly)connecteddominating set of Km,n for all u ∈ V (Kn) \ S2. This implies that S is not a 1-movable doubly connected dominating set of Km,n, contrary to our assumption.Hence, |S1| ≥ 2. Similarly, |S2| ≥ 2. Suppose that S1 = V (Km). Since S isa doubly connected dominating set of Km,n, ⟨V (Km,n) \ S⟩ = ⟨V (Kn) \ S2⟩ isconnected if S2 = V (Kn). Since this is not possible, S2 = V (Kn). Similarly,S1 = V (Km) if S2 = V (Kn).

For the converse, suppose that S = S1 ∪ S2, where S1 and S2 are the setssatisfying the given conditions. If S1 = V (Km) and S2 = V (Kn), then S =V (Km,n). Since m ≥ 2 and n ≥ 2, Km,n has no cut-vertices. Hence by Corollary2.3, S is a 1-movable doubly connected dominating set of Km,n. Suppose thatS1 = V (Km) or S2 = V (Kn). Then by assumption, 2 ≤ |S1| < m and 2 ≤ |S2| <n. Hence, by Theorem 2.8(v), S = S1 ∪ S2 is a doubly connected dominatingset of Km,n. Let v ∈ S. Suppose that v ∈ S1. Since 2 ≤ |S1| < m, S1 \ v = ∅.Since 1 ≤ |S1 \v| < m, it follows from Theorem 2.8(v) that S \v is a doublyconnected dominating set of Km,n. Similarly, S \ v is a doubly connecteddominating set of Km,n if v ∈ S2. Consequently, S is a 1-movable doublyconnected dominating set of Km,n.

Corollary 2.15. Let m ≥ 2 and n ≥ 2 be integers. Then

γ1mcc(Km,n) =

n+ 2, if m = 2 and n ≥ 2

m+ 2, if n = 2 and m ≥ 2

4, otherwise

Page 213: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

1-MOVABLE DOUBLY CONNECTED DOMINATION IN GRAPHS 199

References

[1] M.H. Akhbari, R. Hasni, O. Favaron, H. Karami and S.M. Sheikholeslami,Inequalities of nordhaus-gaddum type for doubly connected dominationnumber, Discrete Applied Mathematics, 158 (2010), 1465-1470.

[2] B. Arriola and S.R. Canoy Jr., Doubly connected domination in the joinand Cartesian product of some graphs, Asian-Europian J. Math., 7 (2014).

[3] J. Blair, R. Gera and S. Horton, Movable dominating sensor sets in net-works, Journal of Combinatorial Mathematics and Combinatorial Comput-ing, 77 (2011), 103-123.

[4] M. Chellali, F. Maffray and K. Tablennehas, Connected domination DOT-critical graphs, Contributions to Discrete Mathematics, 5 (2010), 11-25.

[5] J. Cyman, M. Lemanska and J. Raczek, On the doubly connected domi-nation number of a graph, Central European Journal of Mathematics, 4(2006), 34-45.

[6] R.G. Hinampas, Jr. and S.R. Canoy, Jr., 1-movable domination in graphs,Applied Mathematical Sciences, 8 (2014), 8565-8571.

[7] R.G. Hinampas, Jr. and S.R. Canoy, Jr., 1-movable independent dominationin graphs, International Journal of Mathematical Analysis, 9 (2015), 73-80.

[8] H. Karami, R. Khoeilar, S.M. Sheikholeslami, Doubly connected dominationsubdivision numbers of graphs, Matematicki Vesnik, 64 3(2012), 232-239.

[9] J. Lomarda and S.R. Canoy, Jr., 1-movable total dominating sets in graphs,International journal of Mathematical Analysis, 8 (2014), 2703-2709.

[10] J. Lomarda and S.R. Canoy, Jr., 1-movable connected dominating sets ingraphs, Applied Mathematical Sciences, 9 (2015), 507-514.

Accepted: 19.05.2017

Page 214: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (200–214) 200

FIXED POINT THEOREMS FOR FUZZY SOFTCONTRACTIVE MAPPINGS IN FUZZY SOFT METRICSPACES

A.F. Sayed∗

Mathematics DepartmentAl-Lith University CollegeUmm Al-Qura UniversityP.O. Box 112, Al-Lith 21961Makkah Al MukarramahKingdom of Saudi [email protected]

Jamshaid AhmadDepartment of Mathematics

University of Jeddah

P.O.Box 80327, Jeddah 21589

Kingdom of Saudi Arabia

jamshaid [email protected]

Abstract. The aim of this paper is to examine some important properties of fuzzysoft metric spaces. Fuzzy soft continuous mappings are introduced and some theirproperties are investigated. Finally, we prove some fixed point theorems of fuzzy softcontractive mappings in fuzzy soft metric spaces.

Keywords: soft set, fuzzy set, fuzzy soft set, fuzzy soft metric space, fuzzy softcontractive mapping.

1. Introduction

In daily life, the problems in many fields deal with uncertain data and are notsuccessfully modelled in classical mathematics. There are two types of mathe-matical tools to deal with uncertainties namely fuzzy set theory introduced byZadeh [15] and the theory of soft sets initiated by Molodstov [9], which helps tosolve problems in all areas. Maji et al. [8], introduced several operations in softsets and has also coined fuzzy soft sets. In [12], Beaula and Gunaseelib wereintroduced a definition of the fuzzy soft metric space.

The concept of fuzzy soft topology firstly introduced by Tanay and Kan-demir [11], they defined the concept of fuzzy soft topology as a topology overthe given fuzzy soft set fA. So a fuzzy soft topology in the sense of Tanay andKandemir [11], is the collection τ of fuzzy soft subsets of fA closed under ar-bitrary supremum and finite infimum. It also contains ϕ and E. But Roy and

∗. Corresponding Author

Page 215: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

FIXED POINT THEOREMS FOR FUZZY SOFT CONTRACTIVE MAPPINGS ... 201

Samanta [10], redefined the concept of fuzzy soft topology. The most significantreason for such a change is to make sure that the DeMorgan Laws hold in thenew definition of fuzzy soft topology. Here we recall the definition of fuzzy softtopology as introduced in [10].

The aim of this paper is to examine some important properties of fuzzy softmetric spaces. Fuzzy soft continuous mappings are introduced and some theirproperties are investigated. Finally, we prove some fixed point theorems of fuzzysoft contractive mappings in fuzzy soft metric spaces.

2. Preliminaries

In this section we present some basic definitions of fuzzy soft set and fuzzy softmetric space.

Throughout our discussion, X refers to an initial universe, E the set of allparameters for X, P (X) denotes the power set of X and [0, 1] = I.

Definition 2.1 ([15]). A fuzzy set A in a non-empty set X is characterized bya membership function µA : X → I whose value µA(x) represents the “degree ofmembership” of x in A for every x ∈ X. Let IX denotes the family of all fuzzysets on X.

A member A in IX is contained in a member B of IX , denoted A ≤ B ifand only if µA(x) ≤ µB(x) for every x ∈ X (see [15]).

Let A,B ∈ IX , we have the following properties on fuzzy sets (see [15]).

(1) A = B if and only if µA(x) = µB(x)∀x ∈ X. (Equality),

(2) C = A ∧B ∈ IX by µC(x) = minµA(x), µB(x)∀x ∈ X. (Intersction),

(3) D = A ∨B ∈ IX by µC(x) = maxµA(x), µB(x)∀x ∈ X.(Union),

(4) E = Ac ∈ IX by µE(x) = 1− µA(x)∀x ∈ X. (Complement).

Definition 2.2 ([15]). An empty fuzzy set denoted by 0 is a function whichmaps each x ∈ X to 0. That is, 0(x) = 0 for all x ∈ X. A universal fuzzy setdenoted by 1 is a function which maps each x ∈ X to 1. That is, 1(x) = 1 forall x ∈ X.

Definition 2.3 ([9]). Let A ⊆ E. A pair (F,A) is called a soft set over X if Fis a mapping F : A→ P (X).

In other words, a soft set over X is a parameterized family of subsets of theuniverse X. For ϵ ∈ A, F (ϵ) may be considered as the set of ϵ-approximateelements of the soft set (F,A), or as the set of ϵ-approximate elements of thesoft set.

Page 216: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

202 A.F. SAYED and JAMSHAID AHMAD

Definition 2.4 ([7]). A pair (f,A), denoted by fA, is called a fuzzy soft set overX, where f is a mapping given by f : A→ IX defined by fA(e) = µefA where

µefA =

0, if e /∈ A;otherwise, if e ∈ A.

(X,E) denotes the class of all fuzzy soft sets over (X,E) and is called afuzzy soft universe ([8]).

Definition 2.5 ([2]). A fuzzy soft set FA over X is said to be:

(a) NULL fuzzy soft set, denoted by ϕ, if for all e ∈ A, fA(e) = 0.

(b) absolute fuzzy soft set, denoted by E, if for all e ∈ A, fA(e) = 1.

Definition 2.6 ([10]). The complement of a fuzzy soft set fA, denoted by f cA,where f cA : E → IX is a mapping given by µefcA

= 1 − µefA, for all e ∈ E and

where 1(x) = 1, for all x ∈ X. Clearly (f cA)c = fA.

Definition 2.7 ([10]). Let fA, gB ∈ (X,E). fA is fuzzy soft subset of gB,denoted by fA⊆gB, if A ⊆ B and µefA ≤ µ

egB

for all e ∈ A, i.e. µefA(x) ≤ µegB (x)for all x ∈ X and for all e ∈ A.

Definition 2.8 ([10]). Let fA, gB ∈ (X,E). The union of fA and gB is thefuzzy soft set hC , where C = A∪B and for all e ∈ C, hC(e) = µehc = µefA ∨ µ

egB.

Here we write hC = fA∪gB.

Definition 2.9 ([10]). Let fA, gB ∈ (X,E). The intersection of fA and gB is thefuzzy soft set dC , where C = A ∩B and for all e ∈ C, dC(e) = µedc = µefA ∧ µ

egB.

Here we write dC = fA∩gB.

Definition 2.10 ([6]). The fuzzy soft set fA ∈ (X,E) is called fuzzy soft pointif there exist x ∈ X and e ∈ E such that µefA(x) = α(0 < α ≤ 1) and µefA(y) = 0for each y ∈ X − x, and this fuzzy soft point is denoted by xeα or fe.

Definition 2.11 ([6]). The fuzzy soft point xeα is said to be belonging to thefuzzy soft set gA, denoted by xeα∈gA, if for the element e ∈ A, α ≤ µegA(x).

Definition 2.12 ([12]). Let fA be fuzzy soft set over X. The two fuzzy softpoints fe1 , fe2 ∈ fA are said to be equal if µfe1 (x) = µfe2 (x) for all x ∈ X. Thusfe1 = fe2 if and only µfe1 (x) = µfe2 (x) for all x ∈ X.

Proposition 2.13 ([12]). The union of any collection of fuzzy soft points canbe considered as a fuzzy soft set and every fuzzy soft set can be expressed as theunion of all fuzzy soft points.

fA = ∪fe∈fAfe : e ∈ E

Page 217: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

FIXED POINT THEOREMS FOR FUZZY SOFT CONTRACTIVE MAPPINGS ... 203

Proposition 2.14 ([12]). Let fA, fB be two fuzzy soft sets then fA⊆fB if andonly if fe∈fA implies fe∈fB and hence fA = fB if and only if fe∈fA if and onlyif fe∈fB.

Definition 2.15 ([4]). Let R be the set of real numbers and B(R) be the collec-tion of all non-empty bounded subsets of R and E be taken as a set of parameters,A ⊆ E. Then a mapping f : A→ B(R) is called a soft real set. If a soft real setis a singleton soft set, it will be called a soft real number and denoted by r, s, tetc. 0 and 1 are the soft real numbers where 0(e) = 0, 1(e) = 1 for all e ∈ Erespectively.

The set of all soft real numbers is denoted by R(A) and the set of all non-negative soft real numbers by R(A)∗

Definition 2.16 ([3]). A (non negative) fuzzy soft real number is a fuzzy seton the set of all (non negative) soft real numbers R(A), that is, a mapping˜λ : R(A) → [0, 1] , associating with each (non negative) soft real number t, its

grade of membership˜λ(t) satisfying the following conditions:

(i)˜λ is convex that is,

˜λ(t) ≥ min (

˜λ(s),

˜λ(r)) for s ⊆ t ⊆ r,

(ii)˜λ is normal that is, there exists t0 ∈ R(A)∗ such that

˜λ(t0) = 1,

(iii)˜λ is upper semi continuous provided for all t ∈ R(A) and α ∈ [0, 1],˜λ(t) < α, there is a δ > 0 such that ∥s− t∥ ≤ δ implies that

˜λ(s) < α.

Definition 2.17 ([10]). A fuzzy soft topology τ on X is a family of fuzzy softsets over X satisfying the following properties:

(i) ϕ, E ∈ τ ,

(ii) if fA, gB ∈ τ, then fA∩gB ∈ τ.

(iii) if fAα ∈τ for all α ∈ ∆ an index set, then∪α∈∆fAα ∈ τ.

Definition 2.18 ([10]). If τ is a fuzzy soft topology on X, then the triple(X,E, τ) is said to be a fuzzy soft topological space. Also each member of τis called a fuzzy soft open set in (X,E, τ).

The complement of a fuzzy soft open set is a fuzzy soft closed set.

Definition 2.19 ([11]). Let (X,E, τ) be a fuzzy soft topological space. Let fA bea fuzzy soft set over X. The fuzzy soft closure of fA is defined as the intersectionof all fuzzy soft closed sets which contained fA and is denoted by fA or cl(fA)we write

cl(fA) =∩gB : gB is fuzzy soft closed and fA⊆fB.

Page 218: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

204 A.F. SAYED and JAMSHAID AHMAD

Definition 2.20 ([11]). Let (X,E, τ) be a fuzzy soft topological space. Let fAbe a fuzzy soft set over X. The fuzzy soft interior of fA denoted by foA is theunion of all fuzzy soft open subsets of fA. Clearly, foA is the largest fuzzy softopen set over X which contained in fA.

Definition 2.21 ([5]). Let (X,E, τ) be a fuzzy soft topological space. Let fA bea fuzzy soft set over X. The fuzzy soft boundary of fA denoted by ∂fA is definedas ∂fA = fA∩f ′A.

Definition 2.22 ([6]). A fuzzy soft topological space (X,E, τ)) is said to be afuzzy soft normal space if for every pair of disjoint fuzzy soft closed sets hA andkA, ∃ disjoint fuzzy soft open sets g1A , g2A such that hA⊆g1A and kA⊆g2A.

Definition 2.23 ( [1] ). Let (X,E) and (Y,E′) be classes of fuzzy soft sets overX and Y with attributes (the set of all parameters) from E and E′ respectively.Let φ : X −→ Y and ψ : E −→ E′ be two mappings. Then φψ = (φ,ψ) :

(X,E) −→ (Y,E′) is called a fuzzy soft mapping from (X,E) to (Y,E′).If φ and ψ is injective then the fuzzy soft mapping φψ = (φ,ψ) is said to be

injective.If φ and ψ is surjective then the fuzzy soft mapping φψ = (φ,ψ) is said to

be surjective.If φ and ψ is constant then the fuzzy soft mapping φψ = (φ,ψ) is said to be

constant.

Definition 2.24 ([14]). Let (X,E, τ1) and (X,E, τ2) be two fuzzy soft topologicalspaces.

(i) A fuzzy soft mapping φψ = (φ,ψ) : ˜(X,E, τ1) −→ ˜(X,E, τ2) is called fuzzysoft continuous if φψ−1(gB) ∈ τ1, for all gB ∈ τ2.

(ii) A fuzzy soft mapping φψ = (φ,ψ) : ˜(X,E, τ1) −→ ˜(X,E, τ2) is called fuzzysoft open if φψ∈τ2, for all fA ∈ τ1.

Let A ⊆ E. The collection of all fuzzy soft points of a fuzzy soft set fA overX be denoted by FSC(fA).

Let R(A)∗ be the set of all non negative fuzzy soft real numbers. The fuzzysoft metric using fuzzy soft points is defined as follows:

Definition 2.25 ([12]). Let A ⊆ E and E be the absolute fuzzy soft set. Amapping d : FSC(E) × FSC(E) → R(A)∗ is said to be a fuzzy soft metric onE if d satisfies the following conditions:

(FSM1) : d(fe1 , fe2)≥0 for all fe1 , fe2∈E,(FSM2) : d(fe1 , fe2) = 0 if and only if fe1 = fe2 for al fe1 , fe2∈E,(FSM3) : d(fe1 , fe2) = d(fe2 , fe1) for all fe1 , fe2∈E,(FSM4) : d(fe1 , fe3)≤d(fe1 , fe2) + d(fe2 , fe3) for all fe1 , fe2 , fe3∈E).The fuzzy soft set E with the fuzzy soft metric d is called the fuzzy soft metric

space and is denoted by (E, d).

Page 219: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

FIXED POINT THEOREMS FOR FUZZY SOFT CONTRACTIVE MAPPINGS ... 205

Definition 2.26 ([13]). Let (E, d) be a fuzzy soft metric space and ˜t be a fuzzysoft real number and ϵ ∈ (0, 1). A fuzzy soft open ball centered at the fuzzy

point fe∈E and radius ˜t is a collection of all fuzzy soft points ge of E such that

d(ge, fe)<˜t. It is denoted by ˜B(fe,

˜t, ϵ) where ˜B(fe,˜t, ϵ) = ge∈E|d(ge, fe)<

˜twith | µage(x)− µafe(x) | <ϵ for all a ∈ E, x ∈ X .

The fuzzy soft closed ball is denoted by ˜B[fe,˜t, ϵ] = ge∈E|d(ge, fe)≤˜t with

| µage(x)− µafe(x) | ≤ϵ for all a ∈ E, x ∈ X.

Definition 2.27 ([13]). A sequence fen in a fuzzy soft metric space (E, d)is said to converge to fe′ if d(fen , fe′) → 0 as n → ∞ for every ϵ>0 thereexists δ>0 and a positive integer N = N(ϵ) such that d(fen , fe′)<δ implies| µafen (x)−µafe′ (x) |< ϵ whenever n ≥ N, a ∈ E and x ∈ X. It is usually denotedas lim n→∞fen = fe′.

Definition 2.28 ([13]). A sequence fen in a fuzzy soft metric space (E, d)is said to be a Cauchy sequence if to every ϵ>0 there exists δ>0 and a positiveinteger N = N(ϵ) such that d(fen , fem)<δ implies | µafen (x) − µafem (x) |< ϵ for

all n,m ≥ N, a ∈ E and x ∈ X that is d(fen , fem)→ 0 as n,m→∞ .

Definition 2.29 ([13]). A fuzzy soft metric space (E, d) is said to be completeif every cauchy sequence in E converges to some fuzzy soft point of E.

Definition 2.30 ([13]). A fuzzy soft set fA in a fuzzy soft metric space (E, d)is said to be fuzzy soft open if for each fuzzy soft point fe of fA there exist a

fuzzy soft open ball ˜B(fe,˜t, ϵ)⊆fA.

Lemma 2.31 ([13]). Let (E, d) be a fuzzy soft metric space then the fuzzy soft

open ball ˜B(fe,˜t, ϵ) is a fuzzy soft open set.

Theorem 2.32 ([13]). Given a fuzzy soft metric space (E, d). Let ℑ denote theset of all fuzzy soft open sets in E. Then ℑ has the following properties:

(i) ϕ, E ∈ ℑ,

(ii) if fA, gB ∈ ℑ then fA∩gB ∈ ℑ,

(iii) if fαAα ∈ℑ for all α ∈ ∆ an index set, then ∪α∈∆fαAα ∈ ℑ.

ℑ is called the topology determined by the fuzzy soft metric d.

3. Fuzzy soft topology generated by fuzzy soft metric

In this section, we study some important results of fuzzy soft metric spaces.Let E be the absolute fuzzy soft set over X and E be a parameter set and Ee

be a family of fuzzy soft points i.e. Ee = fe = (e, 1) : 1(x) = 1,∀x ∈ X, e ∈ E.Then there exists a bijective mapping between the fuzzy soft set E and the setX. If e = e ∈ E, then Ee∩Ee = ϕ, and FSC(E) = ∪e∈EEe.

Page 220: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

206 A.F. SAYED and JAMSHAID AHMAD

Let (E, d) be a fuzzy soft metric space. It is clear that (Ee, de) is a fuzzysoft metric space for e ∈ E. Then by using the fuzzy soft metric de, we define ametric on X as de(x, y) = de(fe, ge), for all x, y ∈ X and fe, ge∈Ee.

Note that e = e ∈ E, then de and de on X are generally different metrics.

Proposition 3.1. Every fuzzy soft metric space is a family of parameterizedmetric spaces.

Proof. It is obvious from above.

The converse of Proposition 3.1 may not be true in general. This is shownby the following example.

Example 3.2. Let E = R be a parameter set and (X, d) be a metric space.

We define the function d : FSC(E)× FSC(E)→ R by

d(fe, ge) = d(x, y)1+|µafe (x)−µage

(y)|,

for all fe, ge ∈ FSC(E). Then for all e ∈ E, de is a metric on X.

If d(fe, ge) = 0, then this does not always mean that fe = ge , so d is not afuzzy soft metric on E.

Proposition 3.3. Let (E, d) be a fuzzy soft metric space and τde be a fuzzy soft

topology generated by the fuzzy soft metric d. Then for every e ∈ E, the topology(τd)e on X is the topology τde generated by the metric de on X.

Proof. It is obvious.

Lemma 3.4. Let (E, d) be a fuzzy soft metric space. Then the following expres-sions are true:

(i) fe∈fA ⇔ d(fe, fA) = 0;

(ii) fe∈foA ⇔ d(fe, fcA)>0;

(iii) fe∈∂fA ⇔ d(fe, fA) = d(fe, fcA) = 0.

Proof. It is clear.

Note that if fA is a fuzzy soft closed set in the fuzzy soft metric space

(E, d) and fe /∈(fA), then there exists a fuzzy soft open ball ˜B(fe,˜t, ϵ) such that

˜B(fe,˜t, ϵ)∩fA = ϕ.

Theorem 3.5. Every fuzzy soft metric space is a fuzzy soft normal space.

Page 221: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

FIXED POINT THEOREMS FOR FUZZY SOFT CONTRACTIVE MAPPINGS ... 207

Proof. Let hA and kB be two disjoint fuzzy soft closed sets in the fuzzy softmetric space (E, d). For every fuzzy soft points fe∈hA and ge∈kB, we choose

fuzzy soft open balls ˜B(fe,˜t, ϵ) and ˜B(fe, ˜r, ˜ϵ) such that ˜B(fe,

˜t, ϵ)∩kB = ϕ and˜B(ge, ˜r, ˜ϵ)∩hA = ϕ.

Thus, we have hA⊆∪ ˜B(fe,

˜t, ϵ/3) = uA and kB⊆∪ ˜B(ge, ˜r, ˜ϵ/3) = vB. We

want to show that uA∩vB = ϕ.

Assume that uA∩vB = ϕ. Then there exists a fuzzy soft point w´e such

that w´e∈uA∩vB. Therefore, there exist fuzzy soft open balls ˜B(fe,˜t, ϵ/3) and

˜B(ge, ˜r, ˜ϵ/3) such that w´e∈˜B(fe,

˜t, ϵ/3) and w´e∈˜B(ge, ˜r, ˜ϵ/3).

Here, we have d(fe, w´e)<ϵ/3 and d(ge, w´e)<ϵ/3. If we get max ϵ/3, ˜ϵ/3 =ϵ/3, then we have

d(fe, ge)≤d(fe, w´e) + d(w´e, ge)≤ϵ/3 + ϵ/3≤ϵ

and so ge∈ ˜B(fe,˜t, ϵ) and which contradicts with our assumption. Therefore,

uA∩vB = ϕ.

4. Fuzzy soft contractive mappings

In this section we shall prove some fixed point theorems of fuzzy contractivemappings.

Definition 4.1. Let (E, d) and (E′, ρ) be two fuzzy soft metric spaces. Themapping φψ = (φ,ψ) : (E, d) → (E′, ρ) is a fuzzy soft mapping, if φ : E → E′

and ψ : E → E′ are two mappings.

Proposition 4.2. For each fuzzy soft point fe∈FSC(E), φψ(fe) is a fuzzy softpoint in E′.

Proof. Let fe∈FSC(E) be a fuzzy soft point.

Then φψ(fe)(e) =∪e∈ψ−1(e)φ(fe(e)) = (φ(fe))ψ(e).

Definition 4.3. Let (E, d) and (E′, ρ) be two fuzzy soft metric spaces andφψ : (E, d) → (E′, ρ) is a fuzzy soft continuous mapping at the fuzzy soft point

fe∈FSC(E) if for every fuzzy soft open ball ˜B(φψ(fe),˜t, ˜ϵ) of (E′, ρ), there exists

a fuzzy soft open ball ˜B(fe,˜t, ϵ) of (d, E) such that φ( ˜B(fe,

˜t, ϵ))⊆ ˜B(φψ(fe), ˜r, ˜ϵ).

If φψ(fe) is a fuzzy soft continuous mapping at every fuzzy soft point fe of(E, d), then it is said to be fuzzy soft continuous mapping on (E, d).

Now, this definition can be expressed using ε− δ as follows:

Definition 4.4. The mapping φψ : (E, d) → (E′, ρ) is said to be a fuzzy softcontinuous mapping at the fuzzy soft point fe∈FSC(E) if for every ε>0 thereexists a δ>0 such that d(fe, ge)<δ implies that ρ(φψ(fe), φψ(ge))<ε.

Page 222: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

208 A.F. SAYED and JAMSHAID AHMAD

Theorem 4.5. Let φψ : (E, d) → (E′, ρ) be a fuzzy soft mapping. Then thefollowing conditions are equivalent:

(1) φψ : (E, d)→ (E′, ρ) is a fuzzy soft continuous mapping,

(2) For each fuzzy soft open set gB in (E′, ρ), (φψ)−1(gB) is a fuzzy soft openset in (E, d),

(3) For each fuzzy soft closed set hC in (E′, ρ), (φψ)−1(hC) is a fuzzy softclosed set in (E, d),

(4) For each fuzzy soft set fA in (E, d), φψ(fA)⊂(φψ(fA)) is a fuzzy soft closedset in (E′, ρ),

(5) For each fuzzy soft set gB in (E′, ρ), ((φψ)−1(gB))⊂(φψ)−1(gB) ,

(6) For each fuzzy soft set gB in (E′, ρ), (φψ)−1(goB)⊂((φψ)−1(gB))o.

Proof. (1) ⇒ (2) Let φψ be a fuzzy soft continuous mapping and gB be afuzzy soft open set in (E′, ρ). Consider the fuzzy soft set (φψ)−1(gB). If(φψ)−1(gB) = ϕ, then the proof is completed. Let (φψ)−1(gB) = ϕ. In thiscase there exists at least one fuzzy soft point fe∈(φψ)−1(gB). Then we haveφψ(fe)∈gB. Since gB is a fuzzy soft open set, there exists a fuzzy soft open ball˜B(φψ(fe),

˜t, ϵ) such that ˜B(φψ(fe),˜t, ϵ)⊂⊂gB holds. Also since φψ is a fuzzy

soft continuous mapping, there exists a fuzzy soft open ball ˜B(fe, ˜r, ˜ϵ) such that

φψ( ˜B(fe, ˜r, ˜ϵ))⊂ ˜B(φψ(fe),˜t, ϵ) . Thus,

˜B(fe, ˜r, ˜ϵ)⊂(φψ)−1(φψ)( ˜B(fe, ˜r, ˜ϵ))⊂(φψ)−1( ˜B(φψ(fe),˜t, ϵ)⊂(φψ)−1(gB).

Consequently, (φψ)−1(gB) is a fuzzy soft open set.

(2) ⇒ (3) Let hC be any fuzzy soft set in (E′, ρ) Then hcC is a fuzzy softopen set. From (2), we have (φψ)−1(hC)c is a fuzzy soft open set in (E, d). Thus(φψ)−1(hC) is a fuzzy soft closed set.

(3)⇒ (4) Let fA be a fuzzy soft set in (E, d). Since fA⊂(φψ)−1φψ(fA) and

φψ(fA)⊂(φψ(fA)),we have fA⊂(φψ)−1φψ(fA)⊂(φψ)−1((φψ(fA))). By part (3),

since (φψ)−1((φψ(fA))) is a fuzzy soft closed set in (E, d), fA⊂(φψ)−1((φψ(fA))).

Thus φψ(fA)⊂φψ((φψ)−1((φψ(fA)))) is obtained.

(4) ⇒ (5) Let gB be a fuzzy soft set in (E′, ρ) and (φψ)−1(gB) = fA. By

part (4), we have φψ(fA) = φψ(((φψ)−1(gB)))⊂(φψ(φψ)−1(gB))⊂gB. Then

((φψ)−1(gB)) = fA⊂(φψ)−1(φψ(fA))⊂(φψ)−1(gB).

Page 223: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

FIXED POINT THEOREMS FOR FUZZY SOFT CONTRACTIVE MAPPINGS ... 209

(5)⇒ (6) Let gB be a fuzzy soft set in (E′, ρ). Substituting gcB for condition

in (5). Then ((φψ)−1(gcB))⊂(φψ)−1(gcB). Since goB = (gcB)c, then we have

(φψ)−1(goB) = (φψ)−1((gcB)c)

= ((φψ)−1(gcB))c⊂(((φψ)−1(gcB)))c

= (((φψ)−1(gB))c)c

= ((φψ)−1(gB))o.

(6)⇒ (1) Let gB be a fuzzy soft open set in (E′, ρ).

Then since ((φψ)−1(gB))o⊂(φψ)−1gB = (φψ)−1(goB)⊂((φψ)−1(gB))o,((φψ)−1(gB))o = (φψ)−1(gB) is obtained. This implies that (φψ)−1(gB) is afuzzy soft open set.

Definition 4.6. The fuzzy soft mapping φψ : (E, d) → (E′, ρ) is said to befuzzy soft sequentially continuous at the fuzzy soft point fe∈FSC(E) iff forevery sequence of fuzzy soft points fen converging to the fuzzy soft point fe inthe fuzzy soft metric space (E, d), the sequence φψ(fen) in (E′, ρ) convergesto a fuzzy soft point φψ(fe)∈FSC(E′).

Theorem 4.7. Fuzzy soft continuity is equivalent to fuzzy soft sequential con-tinuity in fuzzy soft metric spaces.

Proof. Let φψ : (E, d) → (E′, ρ) be a fuzzy soft continuous mapping andfen be any sequence of fuzzy soft points converging to the fuzzy soft point

fe∈FSC(E). Let ˜B(φψ(fe),˜t, ˜ϵ) be a fuzzy soft open ball in (E′, ρ). By fuzzy

soft continuity of φψ choose a fuzzy soft open ball ˜B(fe, ˜r,˜ϵ) containing fe such

that φψ( ˜B(fe, ˜r,˜ϵ))⊆ ˜B(φψ(fe),

˜t, ˜ϵ). Since fen converges to fe there exists

n0 ∈ N such that fen∈˜B(fe, ˜r,

˜ϵ) for all n ≥ n0. Therefore for all n ≥ n0 we

have φψ(fen)∈φψ( ˜B(fe, ˜r,˜ϵ))⊆ ˜B(φψ(fe),

˜t, ˜ϵ), as required.

Conversely, assume for contradiction that φψ : (E, d)→ (E′, ρ) is fuzzy softsequential continuous but not fuzzy soft continuous mapping. Since φψ is notfuzzy soft continuous at the fuzzy soft point fe, there exists such that ε>0 forall δ>0 there exists ge∈FSC(E) such that d(fe, ge)<δ and ρ(φψ(fe), φψ(ge))>ϵ0. For n ≥ 1(n ∈ N), define δn = 1/n . For n ≥ 1 we may choose gen in (E, d)such that d(fen , gen)<δn and ρ(φψ(fe), φψ(ge))>ϵ0.

Therefore, by definition the sequence gen(n ≥ 1) converges to fe. However,by definition the sequence φψ(gen)(n ≥ 1) does not converge to φψ(fe). Thatis, φψ is not fuzzy soft sequentially continuous at fe.

Definition 4.8. Let (E, d) be a fuzzy soft metric space. A function φψ :(E, d) → (E, d) is called a fuzzy soft contraction mapping if there exists a softreal number ˜α with 0≤ ˜α<1 such that for every fuzzy soft points fe, ge∈FSC(E)we have d(φψ(fe), φψ(ge))≤ ˜α · d(fe, ge).

Page 224: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

210 A.F. SAYED and JAMSHAID AHMAD

Proposition 4.9. Every fuzzy soft contraction mapping is a fuzzy soft contin-uous mapping.

Proof. Let fe∈FSC(E) be any fuzzy soft point and ϵ>0 be arbitrary.

If we choose d(fe, ge)<δ<ϵ, then since φψ is a fuzzy soft contraction mapping,we haved(φψ(fe), φψ(ge))≤d(fe, ge)< ˜α · δ<ϵ and so φψ is a soft continuous mapping.

Theorem 4.10. Let (E, d) be a complete fuzzy soft metric space. If the mappingφψ : (E, d) → (E, d) is a fuzzy soft contraction mapping on a complete fuzzysoft metric space, then there exists a unique fuzzy soft point fe∈FSC(E) suchthat φψ(fe) = fe.

Proof. Let f0e be any fuzzy soft point in FSC(E).

Set f1e1 = φψ(f0e ) = (φ(f0e ))ψ(e), f2e2 = φψ(f1e1) = (φ2(f0e ))ψ2(e), ..., f

n+1en+1

=

φψ(fnen) = (φn+1(f0e ))ψn+1(e), ....

We have

d(fn+1en+1

, fnen) = d(φψ(fnen), φψ(fn−1en−1

))≤ ˜α · d(fnen , fn−1en−1

)

≤ ˜α2 · d(fn−1en−1

, fn−2en−2

)≤...≤ ˜αn · d(f1e1 , f0e0).

So for n > m

d(fnen , fmem)≤d(fnen , f

n−1en−1

) + d(fn−1en−1

, fn−2en−2

) + ...+ d(fm+1em+1

, fmem)

≤( ˜αn−1 + ˜αn−2 + ...+ ˜αm) · d(f1e1 , f0e0)

≤˜αm

1− ˜α· d(f1e1 , f

0e0).

We get d(fnen , fmem)≤ ˜αm

1− ˜α· d(f1e1 , f

0e ). This implies d(fnen , f

mem)→ 0 as (n,m→

∞).

Hence fnen is a fuzzy soft Cauchy sequence, by the completeness of (E, d),

there is a fuzzy soft point f0e ∈FSC(E) such that fnen → f0e as (n→∞).

Since

˜d(φψ(f0e ), f0e )≤ ˜

d(φψ(fnen), φψ(f0e )) + d(φψ(fnen), f0e )

≤ ˜α · (d(fnen , f0e ) + d(fn+1

en+1, f0e )),

d(φψ(f0e ), f0e )≤ ˜α · ( ˜α · d(fnen , f0e ) + d(fn+1

en+1, f0e ))→ 0.

Hence, d(φψ(f0e ), f0e )→ 0. This implies φψ(f0e ) = f0e . So the fuzzy soft point f0eis a fixed fuzzy soft point of the mapping φψ. Now, if g0´e is another fixed fuzzy

soft point of φψ, then d(f0e , g0e) = d(φψ(f0e ), φψ(g0´e))≤

˜α · d(f0e , g0e) .

Hence, for ˜α≤1, d(f0e , g0e) = 0⇒ f0e = g0e .

Therefore, the fixed fuzzy soft point of φψ is unique.

Page 225: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

FIXED POINT THEOREMS FOR FUZZY SOFT CONTRACTIVE MAPPINGS ... 211

Theorem 4.11. Let (E, d) be a complete fuzzy soft metric space. Suppose thefuzzy soft mapping φψ : (E, d)→ (E, d)satisfies the fuzzy soft contractive condi-tion:

d(φψ(fe), φψ(ge))≤ ˜α · [d(φψ(fe), fe) + d(φψ(ge), ge)],

for all fe, ge∈FSC(E, where ˜α∈[0, 12) is a fuzzy soft constant. Then φψ has a

unique fixed fuzzy soft point in FSC(E)

Proof. Choose f0e be any fuzzy soft point in FSC(E). Set

f1e1 = φψ(f0e ) = (φ(f0e ))ψ(e), f2e2 = φψ(f1e1) = (φ2(f0e ))ψ2(e), ...,

fn+1en+1

= φψ(fnen) = (φn+1(f0e ))ψn+1(e), ....

We have

d(fn+1en+1

, fnen) = d(φψ(fnen), φψ(fn−1en−1

))

≤ ˜α · [d(φψ(fnen), fnen) + d(φψ(fn−1en−1

), fn−1en−1

)]

= ˜α · [d(fn+1en+1

, fnen) + d(fnen , fn−1en−1

)].

d(fn+1en+1

, fnen)≤˜α

1− ˜α· d(fnen+1

, fn−1en−1

) =˜h · d(fn+1

en+1, fnen),

where˜h =

˜α1− ˜α

. For n > m

d(fnen , fmem)≤d(fnen , f

n−1en−1

) + d(fn−1en−1

, fn−2en−2

) + ...+ d(fm+1em+1

, fmem)

≤(˜hn−1 +

˜hn−2 + ...+

˜hm) · d(f1e1 , f

0e )≤

˜hm

1− ˜h· d(f1e1 , f

0e ).

We get d(fnen , fmem)≤

˜hm

1−˜h·d(f1e1 , f

0e ). This implies d(fnen , f

mem)→ 0 as (n,m→∞).

Hence fnen is a fuzzy soft Cauchy sequence, by the completeness of (E, d),

there is a fuzzy soft point f∗e ∈FSC(E) such that fnen → f∗e as (n→∞).Since

d(φψ(f∗e ), f∗e )≤ ˜d(φψ(fnen), φψ(f∗e )) + d(φψ(fnen), f∗e )

≤ ˜α · [d(φψ(fnen), fnen) + d(φψ(fnen), f∗e )] + d(fn+1en+1

, f∗e ),

≤ 1

1− α[ ˜α · d(φψ(fnen), fnen) + d(fn+1

en+1, f∗e )],

d(φψ(f∗e ), f∗e )≤ ˜α · 1

1− ˜α[ ˜α · d(fn+1

en+1, fnen) + d(fn+1

en+1, f∗e )]→ 0.

Hence, d(φψ(f∗e ), f∗e )→ 0.This implies φψ(f∗e ) = f∗e . So the fuzzy soft point f∗e is a fixed fuzzy soft

point of the mapping φψ. Now, if g∗e is another fixed fuzzy soft point of φψ,then d(f∗e , g

∗e) = d(φψ(f∗e ), φψ(g∗e))≤ ˜α · [d(φψ(f∗e ), f∗e ) + d(φψ(g∗e), g

∗e)] = 0.

Page 226: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

212 A.F. SAYED and JAMSHAID AHMAD

Hence, for ˜α≤1, d(f∗e , g∗e) = 0⇒ f∗e = g∗e .

Therefore, the fixed fuzzy soft point of φψ is unique.

Theorem 4.12. Let (E, d) be a complete fuzzy soft metric space. Suppose thefuzzy soft mapping φψ : (E, d)→ (E, d)satisfies the fuzzy soft contractive condi-tion:

d(φψ(fe), φψ(ge))≤ ˜α · [d(φψ(fe), ge) + d(φψ(ge), fe)],

for all fe, ge∈FSC(E, where ˜α∈[0, 12) is a fuzzy soft constant. Then φψ has a

unique fixed fuzzy soft point in FSC(E)

Proof. Choose f0e be any fuzzy soft point in FSC(E). Set

f1e1 = φψ(f0e ) = (φ(f0e ))ψ(e), f2e2 = φψ(f1e1) = (φ2(f0e ))ψ2(e), ...,

fn+1en+1

= φψ(fnen) = (φn+1(f0e ))ψn+1(e), ....

We have

d(fn+1en+1

, fnen) = d(φψ(fnen), φψ(fn−1en−1

))≤ ˜α · [d(φψ(fnen), fn−1en−1

) + d(φψ(fn−1en−1

), fnen)]

= ˜α · [d(fn+1en+1

, fnen) + d(fnen , fn−1en−1

)].

So d(fn+1en+1

, fnen)≤ ˜α1− ˜α· d(fnen , f

n−1en−1

) =˜h · d(fnen , f

n−1en−1

), where˜h =

˜α1− ˜α

. Forn > m

d(fnen , fmem)≤d(fnen , f

n−1en−1

) + d(fn−1en−1

, fn−2en−2

) + ...+ d(fm+1em+1

, fmem)

≤(˜hn−1 +

˜hn−2 + ...+

˜hm) · d(f1e1 , f

0e )≤

˜hm

1− ˜h· d(f1e1 , f

0e ).

We get d(fnen , fmem)≤

˜hm

1−˜h·d(f1e1 , f

0e ). This implies d(fnen , f

mem)→ 0 as (n,m→∞).

Hence fnen is a fuzzy soft Cauchy sequence, by the completeness of (E, d),

there is a fuzzy soft point f∗e ∈FSC(E) such that fnen → f∗e as (n→∞).

Since

d(φψ(f∗e ), f∗e )≤d(φψ(fnen), φψ(f∗e )) + d(φψ(fnen), f∗e )

≤ ˜α · [d(φψ(f∗e ), fnen) + d(φψ(fnen), f∗e )] + d(fn+1en+1

, f∗e )

≤ ˜α · [d(φψ(f∗e ), f∗e ) + d(fnen , f∗e ) + d(fn+1

en+1, f∗e )] + d(fn+1

en+1, f∗e )

≤ 1

1− ˜α[ ˜α · (d(fnen , f

∗e ) + d(fn+1

en+1, f∗e ) + d(fn+1

en+1, f∗e )],

d(φψ(f∗e ), f∗e )≤ ˜α · 1

1− ˜α[ ˜α · (d(fnen , f

∗e )) + d(fn+1

en+1, f∗e )].

Hence, d(φψ(f∗e ), f∗e )→ 0.

Page 227: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

FIXED POINT THEOREMS FOR FUZZY SOFT CONTRACTIVE MAPPINGS ... 213

This implies φψ(f∗e ) = f∗e . So the fuzzy soft point f∗e is a fixed fuzzy softpoint of the mapping φψ.

Now, if g∗e is another fixed fuzzy soft point of φψ, then d(f∗e , g∗e) = d(φψ(f∗e ),

φψ(g∗e))≤ ˜α · [d(φψ(f∗e ), g∗e)+ d(φψ(g∗e), f∗e )] = 0. Hence, for ˜α≤1, d(f∗e , g

∗e) = 0⇒

f∗e = g∗e .

Therefore, the fixed fuzzy soft point of φψ is unique.

Acknowledgements

The authors are very grateful to the editor and the reviewers for their valuablesuggestions.

References

[1] A. Aygunoglu and H. Aygun, Introduction to fuzzy soft groups, Comput.Math. Appl., 58(2009), 1279-1286.

[2] P.K. Maji, R. Biswas and A.R. Roy, Soft set theory, Computers and Math-ematics with Applications, 45 (2003), 555-562.

[3] S. Christinal Gunaseeli, Some Contributions to Special Fuzzy TopologicalSpaces, Thesis submitted to the Bharathidasan University, Tiruchirappalliin partial fulfillment of the requirements for the Degree of Doctor OF Philos-ophy in Mathematics, Ref.No.16690/Ph.D./Mathematics/Full-Time/July2012

[4] S. Das and S.K. Samanta, Soft real sets, soft real numbers and their prop-erties, J. Fuzzy Math., 20 (2012), 551-576.

[5] C. Gunduz and S. Bayramov, Some results on fuzzy soft topological spaces,Hindawi Publishing Corporation Mathematical Problems in EngineeringVolume 2013, Article ID 835308, 10 pages.

[6] J. Mahanta and P.K. Das, Results on fuzzy soft topological spaces,arXiv:1203.0634v1,2012.

[7] P.K. Maji, R. Biswas and A.R. Roy, Fuzzy soft sets, Journal of Fuzzy Math-ematics, 9(3) (2001), 589-602.

[8] P.K. Maji, A.R. Roy and R. Biswas, An application of soft sets in a decisionmaking problem, Comput. Math. Appl., 44(8-9) (2002), 1077–1083.

[9] D. Molodtsov, Soft set theory First results, Comput. Math. Appl., 8(4/5)(1999), 19–31.

[10] S. Roy and T.K. Samanta, A note on fuzzy soft topological spaces, Annalsof Fuzzy Mathematics and informatics, 3 (2) (2012), 305–311.

Page 228: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

214 A.F. SAYED and JAMSHAID AHMAD

[11] B. Tanay and M.B. Kandemir, Topological structures of fuzzy soft sets,Comput. Math. Appl., 61 (2011), 412-418.

[12] T. Beaulaa and C. Gunaseelib, On fuzzy soft metric spaces, Malaya J. Mat.,44(8-9) (2014), 197–202.

[13] T. Beaulaa and R. Raja, Completeness in Fuzzy Soft Metric Space, MalayaJ. Mat., S(2,(2015), 438-442.

[14] B.P. Varol and H. Aygun, Fuzzy soft topology, Hacet. J. Math. Stat.,41(3)(2012), 407-419.

[15] L.A. Zadeh, Fuzzy sets, Information and Control, 8 (1965), 338–353.

Accepted: 20.05.2017

Page 229: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (215–226) 215

COMPARISON OF SURFACE FITTING METHODS FORMODELLING LEAF SURFACE

Moa’ath N. OqielatDepartment of Mathematics

Faculty of Science

Al-balqa’ Applied University

Al-Salt 19117

Jordan

[email protected]

Abstract. A novel hybrid method for modelling leaf surface that combines Gaussianradial basis function (RBF) and Clough-Tocher (CT) methods to achieve a continuoussurface is proposed by the author [20]. In this paper, we demonstrate the accuracy ofthe hybrid Gaussion RBF-CT approach by applying it to model the surface of frangipaniand anthurium leaves. Furthermore, a comparison between the hybrid Gaussion RBF-CT method and the hybrid multiquadric RBF-CT method introduced by the authorOqielat et al. [17] is presented.

The development of the algorithm has been made to assist the understanding ofleaf surface properties. It is found that the hybrid multiquadric RBF-CT surface fittingmethodology produces more accurate and realistic leaf surface representation than usingthe hybrid Gaussion RBF-CT method.

Keywords: finite elements methods, interpolation, radial basis functions, Clough-Tocher method, virtual plants.

1. Introduction

The modelling of virtual plant has been researched extensively over the lastdecades [24] and models of leaf surfaces have generally been generated recentlywith accurate accuracy and level of detail by [5,9,10,11,19]. Leaves play an im-portant role in the development of a plant, and therefore leaf model is required.Loch [13] proposed two methods to accurately model leaf surfaces.

Surface data can often be collected at a discrete set of points and a keyproblem is to reconstruct the surface, or perhaps capture important featuresof the surface from a discrete set of measurements. This representation maybe used for visualization purposes only [13] or may be used to study biologicalprocesses such as photosynthesis and canopy light environments.

The minority of the leaf models that presented in the past were based onaccurate measurements until 3D digitizers and faster computers with improvedgraphic capabilities became available. Virtual leaf models may be presented inan abstract way, where the leaf is represented by a disk [25] or more realistically,by a surface model that captures the surface shape and boundary [22]. Boundary

Page 230: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

216 MOA’ATH N. OQIELAT

algorithms were applied by [16] for modelling lobed leaves. Maddonni [15] usedpiecewise linear triangles to represent the leaf surface, where vertices along theboundary are estimated by allometric relationships.

Loch [13,14] presented two methods to model accurate leaf surfaces in threedimensions based on finite elements methods (piecewise linear triangular andpiecewise cubic Clough-Tocher triangular). Loch modelled the leaf surfaces forFlame,Frangipani, Elephant’s ear and Anthurium leaves.

Our research in this paper introduces a new surface fitting method thatcombine Clough-Tocher with Gaussian radial basis techniques for modelling theleaf surface. Then, a comparison of our method with a hybrid method introducedby the author [17] is presented. Finally, the proposed hybrid technique is appliedto a large number of three-dimensional data points captured from an Frangipaniand Anthurium leaf surface and we found that the hybrid method gives accuraterepresentation of the leaf surface, see figure 1. This work form the bases forfuture research , for example, accurate leaf surface representation can be usedin the context of modelling surface droplet movement.

The research is presented over four sections. In section 1, we overview ofinterpolation surface fitting methods based on the Clough-Tocher and the radialbasis function method which are already outlined by the auother in [19,20]. Insection 2 a new surface fitting method is proposed that combines the CT andGaussian RBF methods for modelling leaf surfaces. In section 3, the applicationof the new method to a Frangipani leaf and Anthurium leaf is presented. Futurework and further applications of the model are discussed in section 4.

2. Clough-Tocher finite element method

The Clough-Tocher method (CTM) is an interpolating finite element methodthat was introduced originally by Clough and Tocher [4]. This method is used tominimize the degree of the polynomial interpolant without losing the continuityof the gradient over the whole domain.

The CTM is a seamed element approach, whereby each triangle is treated asa macro-element that is split into subtriangles, which are called micro-elements.The CTM, has the advantage that it results in a smooth surface over the wholedomain. It approximates the surface as an interpolating cubic polynomial con-structed on each subtriangle which enables a bivariate piecewise cubic inter-polant to be devised over the entire triangle that is continuously differentiable.The key result is that only twelve degrees of freedom are required for the CTM,namely the function values and the gradient at each vertex, as well as the normalderivative along the edges. The CT interpolant has the form:

(1) φ(x, y) =

3∑i=1

(fibi + (ci, di)

T · ∇fi)

+

3∑j=1

∂f

∂njej .

Page 231: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMPARISON OF SURFACE FITTING METHODS FOR MODELLING LEAF SURFACE 217

In this representation the twelve functions bi(x, y), ci(x, y), di(x, y) and ej(x, y),i = 1, 2, 3 are cardinal basis functions (see Lancaster [12]), having the propertythat just one of them is unity and the reminder zero at each of the node points.

In the modelling of leaf surface, the function value is assigned at the tri-angle vertices. However, the derivative information at the vertices and at themidpoints of each side is unavailable and needs to be estimated. The gradientat the triangle vertices are estimated from neighbouring data information andthereafter the edge normal derivatives are determined as the mean of the normalestimated at the two vertices associated with the edge. This approximation isbased on the assumption that the normal slope along the sides of the trianglechanges linearly. The author [1,26] presented analysis for the least square gra-dient estimation method as well as an error bounds for the method. A moredetailed description of CTM including the list of cardinal basis functions for thestandard triangular element can be found in (Lancaster [12]).

1.2 Radial basis functions

A Radial Basis Function (RBF) approximation to f is a function S of the form:

(2) S(x) =

n∑i=1

aiΦi(x), x ∈ R2,

where Φi(x) = R (∥x− xi∥) , R(r) is a non-negative real-valued function withnon-negative argument r and ∥.∥ denotes the Euclidean norm. The points xibelonging to R2 are called the centres of the RBF approximation. The expansioncoefficients ai are determined by satisfying some approximation criterion; inthis application by interpolation (see equation 4).

Radial basis function method has found applications in areas such as geodesyand medical imaging, the theory of the RBF approximation is given by Powell[21]. A main problem of the radial basis function method concerns large setsof data points where the computational costs involved in fitting and evaluatingthe RBF can become time-consuming.

Well known examples of radial basis function methods include Gaussian RBFwhich is adopted in this paper:

(3) R (∥x− xi∥) = exp−c2 ∥x− xi∥2 .

The parameter c is specified by the user, however, it is well known that theaccuracy for interpolating scattered data with radial basis functions dependsstrongly on this parameter, see for example [3,6,23]. For some values of c theproblem may become ill-conditioned. Franke [6] used c = 1.25 D√

nwhere D is

the diameter of the minimal circle enclosing all data points.Rippa [23] proposed an algorithm for selecting a good value for the param-

eter c based on minimizing a cost function that represents the error betweenthe interpolating radial basis function and the unknown function (RMS), see

Page 232: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

218 MOA’ATH N. OQIELAT

equation 6. Rippa considered two sets of data points and nine different testfunctions defined on the unit square. A data vector f = (f1, f2, ..., fn)T wasconstructed by evaluating each test function over the set of data points so that

(4) S(xj) = fj , j = 1, 2, ..., n.

3. Hybrid Gaussian radial basis function Clough-Tocher method

The CT method requires derivative estimates at the vertices and midpoints ofthe elements for its evaluation. We propose a new hybrid approach [20] forsurface fitting based on using Gaussian RBF (either local or global) to estimatethe gradient at the vertices and mid-points of the Clough-Tocher triangle. TheGaussian RBF interpolant Q(x) is given by equation 2. The gradient of Q isthen given by

(5) ∇Q(x) =n∑i=1

ai∇Ψi(x).

Where

∇Ψi(x) = ∇R (∥x− xi∥) = (dR/dxk, dR/dyk) =(−2(xk − xi)c2 exp−r2c2,−2(yk − yi)c2 exp−r2c2).

The procedure that uses this hybrid approach for the purpose of surfacefitting is summarised in the following algorithm:

Algorithm 1: Construction Surfaces using the Hybrid RBF-CTMethod

INPUT:N data points (xi, fi), i = 1, . . . , NStep 1: Choose a subset of n data points from the given N points to trian-

gulate the surface.Step 2: Using either a global multiquadric RBF interpolant constructed from

the ntriangulation points OR, a local multiquadric RBF interpolant constructedon each triangle using a local subset of m points, generate the RBF linearsystem.

Step 3: Approximately solve this linear system using the TSVD method.Step 4: Use the RBF coefficients to construct either the global or local

gradient.Step 5: Apply the hybrid CT-RBF method to construct the surface using

either∇Sn(x) (global) or ∇Sm(x) (local) to provide the necessary derivativeinformation for the construction of the CT interpolant.

The local hybrid approach applied here is based on choosing the set of5 nearest neighbours to each vertex and to the center of the triangle. Next, alocal radial basis function is built from the 20 points for each triangle, whichis then used to estimate the directional derivative at the triangle vertices andmidpoints. A global hybrid approach is also applied, which is based on

Page 233: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMPARISON OF SURFACE FITTING METHODS FOR MODELLING LEAF SURFACE 219

building one single global RBF from the triangulation points and then usingit to evaluate the gradients at the vertices and midpoints of all triangles. Theparameter c in both cases was estimated globally using the triangulation pointsfollowing the Rippa framework [23].

The selection of the local set of points to use for the construction of theRBF is important. For Frangipani leaf, we used the 5 points closest points toeach vertex and to the centroid of the triangle for the construction of the localRBF. Using this point set produced the best results and we found that usingmore points, for example 10 or 20, did not improve the fit. For Anthurium leafusing closest 5 points struck problems because we did not produce enough pointsof the triangular element to enable a sufficient sampling of function values toproduce reasonable gradient estimates. To avoid this problem we construct thelocal RBF by select the closest 30 points to each vertex and to the centroidof the triangle. This selection process ensured that the local RBF contains asufficient set of data that enables a more accurate gradient to be produced.

4. Application of hybrid method for the frangipani and anthuriumleaves

A set of representative data points sampled from the surface are required toreconstruct the shape of a leaf using surface fitting techniques. The process ofsampling data points from the leaf surface using a measuring device is calleddigitizing such that the visible exterior data points of the leaf are enough tocapture the surface of the leaf. Loch [14] collected data points for differenttypes of leaves (such as, Frangipani, Anthurium, Flame and Elephant’s Ear)using a laser scanner. The boundary points were selected by hand from thecomplete set of points using the PointPicker, software written by Hanan [7].

To assess the accuracy of the hybrid Clough-Tocher Radial basis functioninterpolation method, we applied the method to the laser scanned Frangipaniand Anthurium leaf data taken from (Loch [14]) to construct the surface ofthose two leaves. The Anthurium leaf data set consists of a set containing 4,688points, which represent the entire leaf surface points and a second set containing79 points representing the boundary points of the Anthurium leaf surface. TheFrangipani leaf data set contains two subsets of data. The first set consistsof 3,388 points, which represents the entire leaf surface scanned points; whilethe second set consists of 17 points representing the boundary points of theFrangipani leaf surface. These point sets are displayed in Figures 1 (a) and(b). Now, to apply the hybrid method to the leaf data, preprocessingsteps areessential which includes determination a new plane for the leaf data and thentringulation of the leaf surface. These two steps are discussed previously by theauthor [17,19,20] and will explain briefly in the following two subsections.

Page 234: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

220 MOA’ATH N. OQIELAT

4.1 Leaf reference plane

The laser scanner returns the coordinate system of points on the leaf, Thesecoordinates may not be suitable for interpolation due to the possibility of mul-tivalued and vertical surfaces. To solve this problem we can use use a referenceplane that is a least squares fit to these data points. We construct a referenceplane by making a linear least squares fit to the data and rotating the coordinatesystem so that the reference plane becomes the xy−plane. This rotation can beachieved by rotating the normal vector of the reference plane about the y−axisinto the yz− plane and then about the x−axis into the xz− plane (Oqielat[18]). If the vertical height of the data points is single valued in the transformedcoordinate system, then the procedure is successful.

(a) (b)

(c) (d)

Figure 1: Photos of the scanned (a) Frangipani and (b) Anthurium leaves andcorresponding (c) Frangipani and (d) Anthurium leaf surface modelsfor these point sets.

5. Triangulation of the leaf surface

To apply our method to the leaf data points, we need to construct a triangu-lation to the leaf surface. The data points that represent the leaf surface is large,so the computational expense for surface fitting can be reduced by selecting onlya subset of these data to generate a triangulation of the leaf surface. In thisresearch we constructed the triangulation of the leaf using the EasyMesh gener-ator, which is software written in the C language by Bojan Niceno [2]. EasyMeshgenerates two-dimensional Delaunay and constrained Delaunay triangulationsin general domains. This software return a good quality triangulation if thedomain is convex. However, because the piecewise linear boundary defined bythe boundary points do not enclose a convex set, EasyMesh was unable to pro-duce the required triangulation. To solve this problem, an algorithm was usedto generate a convex hull from the entire set of leaf data points.

Moreover, EasyMesh produce better shaped triangles if we define either ahorizontal, or vertical, line Inside the convex hull (leaf surface). For the Frangi-

Page 235: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMPARISON OF SURFACE FITTING METHODS FOR MODELLING LEAF SURFACE 221

pani and Anthurium leaves (Oqielat [17,18]) it appears that the vertical lineproduces a more suitable triangulation than the horizontal line. The final tri-angulation is given in figures 2 and 3. The hybrid Clough-Tocher- radial basisfunction method is then applied to construct the leaf surface after the triangu-lation of the leaf surface is constructed.

(a) (b)

Figure 2: (a) The vertices of the mesh structure generated using Easymesh.The square points represent the 11 boundary points that are givento Easymesh; the dot points represent the 58 extra points added byEasymesh, while the x points represent the 93 internal points. (b)Thevertices of the mesh structure generated using Easymesh. The squarepoints represent the 38 boundary points that are given to Easymesh;the dot points represent the 28 extra points added by Easymesh, whilethe x points represent the 146 internal points.

6. Numerical experiments

The results of comparisons and applying the hybrid methods to the Frangipaniand Anthurium leaf data is present in this section. First, the triangulationpoints were selected, then the rest of the m data points (denoted by zk =z(xk), k = 1, ...,m) from the leaf data set were used to measure the quality ofthe approximation of the hybrid methods. Some of the m data points occurredoutside of the virtual leaf mesh so these points were ignored in the qualityanalysis. The hybrid method then applied to estimate the surface values for thedata points occurring inside the triangulation to construct the leaf surface, seeFigure 1 (c) and (d).

Page 236: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

222 MOA’ATH N. OQIELAT

(a) (b)

Figure 3: (a) Triangulation of 151 points of Frangipani leaf surface generatedusing EasyMesh. (b) Triangulation of 212 points of Anthurium leafsurface generated using EasyMesh.

The root mean square error RMS, is used in this paper as an error metricto assess the accuracy of our methods which is given by:

(6) RMS =

√∑k=mk=1 [Q(xk)− zk]2

m.

Q(xk) represents the CT estimated value at the m data points and zk representsthe given function values at the same data points. The second error metricmeasured the quality in terms of the maximum error associated with the surfacefit in relation to the maximum variation in z.

Scaled Max. Error =max (|Q(xk)− zk|)max(zk)−min(zk)

, k = 1, 2, ...,m.

Tables 1 and 2 show a comparison between the scaled maximum errors andthe scaled RMS = RMS

max(zk)−min(zk)for the Frangipani and the Anthurium leaf

data sets respectively using the local and global hybrid multiquadric methodand hybrid Gaussian method. For the Anthurium leaf there were a total of4,460 data points used to assess the accuracy of the surface. Note the EasyMeshtriangulation comprised 212 vertices. There were about 59 points ignored in theanalysis because these points were deemed to lie outside the leaf mesh structure.

One observes for the Frangipani leaf that using the local hybrid multiquadricRBF method produced slightly more accurate RMS value than using the globalhybrid multiquadric RBF method while it is the converse for the maximum error.The trends depicted in Table 1 for the Frangipani leaf appear consistent withobservations from Table 1 for the Athurium leaf. Moreover, the hybrid (local andglobal) multiquadric RBF method produced more accurate RMS and maximumerror than using the hybrid (local and global) Gaussian RBF method.

Page 237: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMPARISON OF SURFACE FITTING METHODS FOR MODELLING LEAF SURFACE 223

Table 1: A comparison of RMS computed using hybrid local and global RBFfor the Frangipani leaf data points as well as the maximum error associated withthe surface fit.

Hybrid Hybrid Hybrid Hybridmultiquadric Gaussian multiquadratic Gaussian

local local global globalRBF RBF RBF RBF

Scaled RMS 0.0086 0.0218 0.0139 0.1163Scaled maximum error 0.0700 0.3603 0.0655 0.4749

Boundary points 48 48 48 48Points tested 3155 3155 3155 3155

Triangulation points 141 141 141 141Outside points 104 104 104 104No. of triangles 257 257 257 257

Table 2: A comparison of RMS computed using hybrid local and global GaussianRBF for the Anthurium leaf data points as well as the maximum error associatedwith the surface fit.

Hybrid Hybrid Hybrid Hybridmultiquadric Gaussian multiquadratic Gaussian

local local global globalRBF RBF RBF RBF

Scaled RMS 0.0043 0.02313 0.0068 0.0100Scaled maximum error 0.0537 0.8209 0.0435 0.0561

Boundary points 66 66 66 66Points tested 4460 4460 4460 4460

Triangulation points 212 212 212 212Outside points 59 59 59 59No. of triangles 387 387 387 387

6.1 Conclusion and future research

The research described here proposed a new mathematical surface fitting tech-nique for modelling the leaf surface based on a hybrid CT-Gaussion-RBF method-ology. The hybrid method has been successfully applied and compared with an-other interpolation method introduced by the author (Oqielat [17]) and shownto produce a good accuracy for the leaf surface representation compared withthe other method.

Our method allows the user to construct an accurate leaf surface based onthree-dimensional data points. Moreover, the research provides a basis on whichfuture research can be built. Surface representations can be extended to modelsdetermining a water droplet, or pesticide paths along a leaf surface before itfalls from or comes to a standstill on the surface; for example, the simulationof a pesticide application to plant surfaces presented by Hanan [5,8,11]. Anadvantage of the leaf models described in this paper is that they may be usedin different plant modelling environments such as AMAP, xfrog or L-Studio.

Page 238: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

224 MOA’ATH N. OQIELAT

References

[1] J. Belward, I. Turner I. and M. Oqielat, Numerical Investigation of LinearLeast Square Methods for Derivatives Estimation, CTAC 08 ComputationalTechniques and applications conference, Australia, 2008.

[2] Bojan Niceno, www.dinma.univ.trieste.it/nirftc/research/easymesh, 2002.

[3] R.E. Carlson, and T.A. Foley, The parameter R2 in multiquadric interpo-lation, Mathematics with Applications, 21 (1991), 29-42.

[4] R.W. Clough and J.L. Tocher, Finite element stiffness matrices for analysisof plate bending, In Proceedings of the Conference on Matrix Methods inStructural Mechanics. Wright-Patterson A.F.B., Ohio, 515-545, 1965.

[5] G.J. Dorr, D. Kempthorne, L.C. Mayo, W.A. Forster, J.A. Zabkiewicz,S.W. McCue, J.A. Belward, I.W. Turner, J. Hanan, Towards a model ofspray–canopy interactions: interception, shatter, bounce and retention ofdroplets on horizontal leaves, Ecol.Model., 290 (2014), 94-101.

[6] R. Franke, R. (1982) Scattered data interpolation: tests of some methods,Mathematics of Computation, 38 (157), 1982.

[7] J. Hanan, B. Loch, T. McAleer, Processing laser scanner plant data toextract structural information, Proceedings of the 4th International Work-shop on Functional-Structural Plant Models, 7-11, June 2004, Montpellier,France, pages 9-12, 2004.

[8] J. Hanan, M. Renton, E. Yorston, Simulating and visualising spray depo-sition in plant canopies, ACM GRAPHITE 2003, Melbourne, Australia,259-260, 11-14 February 2003.

[9] D.M. Kempthorne, I.W. Turner, J.A. Belward, A comparison of techniquesfor the reconstruction of leaf surfaces from scanned data, SIAM J. Sci.,2015.

[10] D.M. Kempthorne, I.W. Turner, J.A. Belward, S.W. McCue, M. Barry, J.Young, G.J. Dorr, J. Hanan, J.A. Zabkiewicz, Surface reconstruction ofwheat leaf morphology from three-dimensionalscanned data, Funct. PlantBiol., 42 (2015), 444-451.

[11] C.M.Lisa, S. McCue, T. Moroney, W. Alison, D. Kempthorne1, J. Belwardand I. Turner, Simulating droplet motion on virtual leaf surfaces, Royalsociety open science, 10, 2016.

[12] P. Lancaster and K. Salkauskas, Curve and Surface Fitting, an introduction,Academic Press, London, Orlando, 1986.

Page 239: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMPARISON OF SURFACE FITTING METHODS FOR MODELLING LEAF SURFACE 225

[13] B. Loch, Surface fitting for the modelling of plant leaves, PhD Thesis, Uni-versity of Queensland, http://www.sci.usq.edu.au/staff/lochb, 2004.

[14] B. Loch, J. Belward and J. Hanan, Application of surface fitting tech-niques for the representation of leaf surfaces, MODSIM 2005 InternationalCongress on Modelling and SimulatMion, 12-15 Dec 2005, Melbourne, Aus-tralia, 2005.

[15] G. Maddonni, M. Chelle, J.-L. Drouet and B. Andrieu, Light interceptionof contrasting azimuth canopies under square and rectangular plant spatialdistributions: simulations and crop measurements, Field Crops Research,13 (2001), 1-13.

[16] L. Mundermann, P. MacMurchy, J. Pivovarov and P. Prusinkiewicz, Model-ing lobed leaves, In Computer Graphics International, Proceedings, Tokyo,13 (2003), 60-67, 9-11.

[17] M.N. Oqielat, J.A. Belward and I.W. Turner, A Hybrid Clough-Tochermethod for surface fitting with application to leaf data, Applied Mathe-matical Modelling, 33 (2009), 2582-2595.

[18] M.N. Oqielat, J.A. Belward, I.W. Turner, B.I. Loch, A hybrid Clough-Tocher radial basis function method for modelling leaf surfaces, MODSIM2007 International Congress on Modelling and Simulation. Modelling andSimulation Society of Australia and New Zealand, 400-406, 2007.

[19] M.N. Oqielat, I.W. Turner, J.A. Belward, S.W. McCue, Modelling waterdroplet movements on a leaf surface, Math. Comput. Simulat., 81 (2011),1553-1571.

[20] M.N. Oqielat, Surface Fitting Methods for Modelling Leaf surface fromscanned data, Journal of King Saud University-Science, 2017.

[21] M.N. Oqielat, Scattered data approximation using radial basis functionwith a cubic polynomial reproduction for modelling leaf surface, Journalof Taibah University for Science, 2018.

[22] M.N. Oqielat, Application of interpolation finite element methods to a real3D leaf data, Journal of King Saud University-Science, 2018.

[23] M.J.D. Powell, Advances in numerical analysis, wavelets, subdivision algo-rithms and radial functions, W. Light, Oxford University Press, Oxford,UK, 105-210, 1991.

[24] P. Prusinkiewicz, A. Lindenmayer, J.S. Hanan, F.D. Fracchia, D.R. Fowler,M.J.M. de Boer and L. Mercer, The algorithmic beauty of plants, SpringerVerlag, New York, Berlin, 1990.

Page 240: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

226 MOA’ATH N. OQIELAT

[25] S. Rippa, An algorithm for selecting a good value for the parameter c in ra-dial basis function interpolation, Advances in Computational Mathematics,11 (1999), 193-210.

[26] P. Room, J. Hanan and P. Prunsinkiewicz, Virtual plants: new perspec-tives for ecologists, pathologists and agricultural scientist, Trends in PlantScience, 1 (1996), 33-38.

[27] A.R. Smith, Plants, fractals and formal languages, Computer Graphics, 18(1984), 1-10.

[28] I. Turner, J. Belward and M. Oqielat, Error Bounds for Least square Gra-dients Estimates, SIAM Journal on Scientic Computing, 2008.

Accepted: 23.05.2017

Page 241: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (227–243) 227

PRODUCT-TYPE OPERATORS FROM AREANEVANLINNA SPACES TO BLOCH-ORLICZ SPACES

Zhi-Jie JiangSchool of Science

Sichuan University of Science and Engineering

Zigong, Sichuan

643000

P. R. China

[email protected]

Abstract. Let D be the unit disk in the complex plane C and H(D) the class ofall analytic functions on D. Let φ be an analytic self-map of D and u ∈ H(D). Byconstructing some more effective test functions in area Nevanlinna space, in this paperwe characterize the boundedness and compactness of product-type operators DnMuCφ,DnCφMu, CφD

nMu, MuDnCφ, MuCφD

n and CφMuDn from area Nevanlinna spaces

to Bloch-Orlicz spaces.

Keywords: Area Nevanlinna space, product-type operator, boundednedss, compact-ness.

1. Introduction

Let D = z ∈ C : |z| < 1 be the open unit disk in the complex plane C andH(D) the class of all analytic functions on D. Let φ be an analytic self-map ofD and u ∈ H(D). The weighted composition operator Wφ,u on H(D) is definedby

Wφ,uf(z) = u(z)f(φ(z)), z ∈ D.

If u ≡ 1, it is reduced to the composition operator, usually denoted by Cφ.While if φ(z) = z, it is reduced to the multiplication operator, usually denotedby Mu. Since Wφ,u = MuCφ, it can be regarded as a product-type operator. Itis a standard problem how to provide function theoretic characterizations whenφ and u induce a bounded or compact weighted composition operator (see, e.g.,[2, 4, 5, 18, 21, 23] and the references therein).

Let D be the differentiation operator on H(D), that is

Df(z) = f ′(z), z ∈ D.

A systematic study of other product-type operators started with Stevic et al. in[14, 16]. Before that there were a few papers in the topic, e.g., [6]. The next twoproduct-type operators DCφ and CφD, attracted some attention first (see, e.g.,[17, 19, 27, 29] and the references therein). The publication of [16] attractedsome attention in product-type operators involving integral-type ones (see, e.g.,

Page 242: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ZHI-JIE JIANG 228

[10, 28, 30, 31, 34] and the references therein). Since that time there has been agreat interest in various product-type operators. For example, the following sixoperators

MuCφD, CφMuD, MuDCφ, CφDMu, DCφMu, DMuCφ(1)

were studied by Sharma in [25]. The product-type operators Wφ,uD and DWφ,u,which were considered by Jiang in [7, 8], are included in (1) as the first andsixth operators, respectively. For some other product-type operators, we referthe reader to [12, 13, 15, 20, 22, 24, 39] and the references therein.

The nth differentiation operator Dn on H(D) is defined by

Dnf(z) = f (n)(z), z ∈ D.

Zhu in [38] introduced the so-called generalized weighted composition operator:

Dnφ,uf(z) = u(z)f (n)(φ(z)), z ∈ D.

Since Dnφ,u = MuCφD

n, it is also a product-type operator.

The product-type operator MuCφDn from area Nevanlinna space to Bloch-

type and Zygmund spaces was studied by Yang et al. in [35, 36]. The weightedcomposition operator from weighted Bergman-Nevanlinna space to Zygmundand Bloch-type spaces was also studied in [11, 26]. It must be mentioned thatin these studies, there is no need to construct more complex test functions inarea Nevanlinna space or weighted Bergman-Nevanlinna space. But we find thatthe used test functions become invalid in the study of the following product-typeoperators

DnMuCφ, DnCφMu, CφD

nMu, MuDnCφ, MuCφD

n, CφMuDn.(2)

By constructing some more suitable test functions in area Nevanlinna space, inthis paper we characterize the boundedness and compactness of the operatorsin (2) from area Nevanlinna space to Bloch-Orlicz space. This paper can beregarded as a continuation of the investigation of concrete operators betweenthese spaces.

Let dA(z) = 1πdxdy be the normalized Lebesgue measure on D and dAα(z) =

(α+ 1)(1− |z|2)αdA(z) the weighted Lebesgue measure on D. For α > −1 andp ≥ 1, the area Nevanlinna space N p

α consists of all f ∈ H(D) such that

∥f∥N pα

=

∫D

[log(1 + |f(z)|)

]pdAα(z) <∞.

From [3], we see that the area Nevanlinna space N pα is a Frechet space with the

translation invariant metric given by d(f, g) = ∥f − g∥N pα. If p = 1, it becomes

the weighted Bergman-Nevanlinna space, usually denoted by Aαlog (see, [11, 26]).

Page 243: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

PRODUCT-TYPE OPERATORS FROM AREA NEVANLINNA SPACES ... 229

Let Ψ be a strictly increasing convex function on [0,+∞) such that Ψ(0) = 0.The Bloch-Orlicz space BΨ was introduced in [21] by Ramos Fernandez, is theclass of all f ∈ H(D) such that

supz∈D

(1− |z|2)Ψ(λ|f ′(z)|) <∞

for some λ > 0 depending on f . Ramos Fernandez in [21] proved that BΨ isisometrically equal to µΨ-Bloch space, where

µΨ(z) =1

Ψ−1( 11−|z|2 )

, z ∈ D.

Hence, BΨ is a Banach space with the norm given by ∥f∥BΨ = |f(0)|+ bµΨ(f),where

bµΨ(f) = supz∈D

µΨ(z)|f ′(z)|.

This space generalizes some other spaces. For example, if Ψ(t) = tp with p > 0,then the space BΨ coincides with the weighted Bloch space Bα, where α = 1/p.Also, if Ψ(t) = t log(1+ t), then BΨ coincides with the Log-Bloch space (see [1]).

Let X be a topological vector space whose topology is given by the transla-tion invariant metric dX . A linear operator L : X → BΨ is metrically boundedif there exists a positive constant K such that

∥Lf∥BΨ ≤ KdX(f, 0)

for all f ∈ X. The operator L : X → BΨ is metrically compact if it mapsbounded sets into relatively compact sets.

In this paper, an operator is bounded (respectively, compact), if it is metri-cally bounded (respectively, metrically compact). Constants are denoted by C,they are positive and may differ from one occurrence to the next. The notationa . b means that there exists a positive constant C such that a ≤ Cb.

2. Auxiliary results

In [33], Stevic used the Faa di Bruno’s formula of the following version

(f φ)(n)(z) =

n∑k=0

f (k)(φ(z))Bn,k(φ′(z), . . . , φ(n−k+1)(z)),(3)

where Bn,k(x1, . . . , xn−k+1) is the Bell polynomial. For n ∈ N, the sum cango from k = 1 since Bn,0(φ

′(z), . . . , φ(n+1)(z)) = 0, however we will keep thesummation since for n = 0 the only existing term B0,0 = 1.

Now we present some useful information of the Bell polynomials from [9].The Bell polynomials are associated with set partitions. To the partition 1 weassociate the monomial x1; this is the only partition of the set 1, and we define

Page 244: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ZHI-JIE JIANG 230

B1,1(x1) = x1. The set 1, 2 has the two partitions 1, 2 and 1, 2, the for-mer with one block and the latter with two, and we associate to them the mono-mials x2 and x21, respectively. Then B2,1(x1, x2) = x2 and B2,2(x1, x2) = x21.There are five partitions of the set 1, 2, 3. Three of these have two blocks,namely 1, 2, 3 and 1, 3, 2 and 1, 2, 3; we associate the monomialx1x2 to each of these, and so B3,2(x1, x2) = 3x1x2. The other Bell polyno-mials of order three are B3,3(x1) = x31, corresponding to 1, 2, 3; andB3,1(x1, x2, x3) = x3, corresponding to 1, 2, 3. In general,

Bn,k(x1, x2, . . . , xn−k+1) =1

k!

∑j1+···+jk=n

ji≥1

(n

j1, j2, . . . , jk

)xj1 · · · xjk .

The sum is effectively over set partitions of 1, 2, . . . , n with block sizes j1, . . . ,jk, with the factor 1/k! correcting for the multiple counting inside the sum.

From (3) and the Leibnitz formula the next result follows.

Lemma 2.1. Let f , u ∈ H(D) and φ be an analytic self-map of D. Then(u(z)f(φ(z))

)(m)

=

m∑k=0

f (k)(φ(z))

m∑j=k

Cjmu(m−j)(z)Bj,k

(φ′(z), . . . , φ(j−k+1)(z)

).(4)

To find some useful test functions, we first introduce the following functions.For a fixed w ∈ D and i ∈ N0 = N ∪ 0, we define the function

kw,i(z) =(1− |w|2)

α+2p

+i

(1− wz)2(α+2)

p+i, z ∈ D.

Then from Lemma 4.2.2 in [37], it follows that

supw∈D

∫D|kw,i(z)|pdAα(z) . 1.(5)

By using the functions kw,i, the following result provides some useful test func-tions.Lemma 2.2. Let w ∈ D and m ∈ N. Then for each fixed k ∈ 0, 1, . . . ,m,there exist two groups of constants a0,k, a1,k,. . . , am,k and b0,k, b1,k,. . . , bm,k,such that the function

hw,k(z) =

m∑i=0

ai,kkw,i(z) exp

m∑i=0

bi,kkw,i(z)(6)

satisfies

h(k)w,k(w) =

wk

(1− |w|2)α+2p

+kexp

1

(1− |w|2)α+2p

and h(j)w,k(w) = 0(7)

Page 245: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

PRODUCT-TYPE OPERATORS FROM AREA NEVANLINNA SPACES ... 231

for each j ∈ 0, 1, . . . ,m \ k. Moreover,

supw∈D∥hw,k∥N p

α. 1.

Proof. First we prove that if the function hw,k has the expression (6), thenhw,k ∈ N p

α and supw∈D∥hw,k∥N p

α. 1. Indeed, from the facts that

log(1 + xy) ≤ log(1 + x) + log(1 + y) and log(1 + x) ≤ x, x, y > 0,

we have

log(1 + |hw,k(z)|) = log(

1 +∣∣ m∑i=0

ai,kkw,i(z)∣∣∣∣ exp

m∑i=0

bi,kkw,i(z)∣∣)

≤∣∣ m∑i=0

ai,kkw,i(z)∣∣+ log

(1 + exp

∣∣ m∑i=0

bi,kkw,i(z)∣∣)

≤ 1 +

m∑i=0

(|ai,k|+ |bi,k|)|kw,i(z)|.

Then from this, (5) and a elementary inequality, we get

∥hw,k∥N pα≤∫D

(1 +

m∑i=0

(|ai,k|+ |bi,k|)|kw,i(z)|)pdAα(z)

≤ (m+ 2)p(

1 +

m∑i=0

(|ai,k|+ |bi,k|)p∫D|kw,i(z)|pdAα(z)

)≤ C.

From this, the desired result follows.

Write

fw,k(z) :=m∑i=0

ai,kkw,i(z) and gw,k(z) :=m∑i=0

bi,kkw,i(z).

We first consider the case of k = 0. By some calculation, we obtain that thefunction hw,0 satisfies (7) if and only if the functions fw,0 and gw,0 satisfy thefollowing systems

(8)

fw,0(w) = 1(1−|w|2)a

f ′w,0(w) = 0

f ′′w,0(w) = 0

· · · · ·f(m)w,0 (w) = 0

Page 246: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ZHI-JIE JIANG 232

and

(9)

gw,0(w) = 1(1−|w|2)a

g′w,0(w) = 0

g′′w,0(w) = 0

· · · · ·g(m)w,0 (w) = 0,

respectively, where a := (α + 2)/p. According to the expressions of fw,0 and

gw,0, by calculating f(j)w,0(w) and g

(j)w,0(w) we see that fw,0 and gw,0 satisfy the

systems (8) and (9), respectively, if and only if unknowns a0,0, a1,0, . . . , am,0,b0,0, b1,0, . . . , bm,0, satisfy the following linear system of equations

(10)

m∑i=0

ai,0 = 1

m∑i=0

(2a+ i)ai,0 = 0

m∑i=0

(2a+ i)(2a+ i+ 1)ai,0 = 0

· · · · ·m∑i=0

m∏j=1

(2a+ i+ j − 1)ai,0 = 0

and

(11)

m∑i=0

bi,0 = 1

m∑i=0

(2a+ i)bi,0 = 0

m∑i=0

(2a+ i)(2a+ i+ 1)bi,0 = 0

· · · · ·m∑i=0

m∏j=1

(2a+ i+ j − 1)bi,0 = 0,

respectively. Hence we only need to prove that (10) and (11) have nonzerosolutions, respectively. Indeed, if we can show that the determinants of thesystems (10) and (11) are nonzero, then (10) and (11) have nonzero solutions,respectively. By Lemma 3 in [33], the determinants of the systems (10) and (11)equal

∏mj=1 j!, respectively, which is different from zero. This finishes the proof

of the lemma for the case k = 0.

Page 247: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

PRODUCT-TYPE OPERATORS FROM AREA NEVANLINNA SPACES ... 233

We next consider the case of k = 0. From (4) we have

h(k)w,k(z) =

k∑j=0

k∑i=j

Cikf(k−i)w,k (z)Bi,j(g

′w,k(z), . . . , g

(i−j+1)w,k (z)) exp gw,k(z)

= f(k)w,k(z) exp gw,k(z)(12)

+k∑j=1

k∑i=j

Cikf(k−i)w,k (z)Bi,j(g

′w,k(z), . . . , g

(i−j+1)w,k (z)) exp gw,k(z)

+

k∑i=1

Cikf(k−i)w,k (z)Bi,j(g

′w,k(z), . . . , g

(i−j+1)w,k (z)) exp gw,k(z).

From (12) we see that if f(l)w,k(w) = 0 for all l < k, then h

(l)w,k(w) = 0. On the

other hand, for all s > k, from (4) we have

h(s)w,k(z) =

s∑j=0

s∑i=j

Cisf(s−i)w,k (z)Bi,j(g

′w,k(z), . . . , g

(i−j+1)w,k (z)) exp gw,k(z)

= Cks f(k)w,k(z) exp gw,k(z)

s−k∑j=0

Bs−k,j(g′w,k(z), . . . , g

(s−k−j+1)w,k (z))

+

s−k∑j=0

s∑i=j,i=s−k

Cisf(s−i)w,k (z)Bi,j(g

′w,k(z), . . . , g

(i−j+1)w,k (z)) exp gw,k(z)(13)

+s∑

j=s−k+1

s∑i=j

Cisf(s−i)w,k (z)Bi,j(g

′w,k(z), . . . , g

(i−j+1)w,k (z)) exp gw,k(z).

From (13), for each s > k we see that if g′w,k(w) = 0, . . . , g(s−k+1)w,k (w) = 0,

fw,k(w) = 0, f ′w,k(w) = 0, . . . , f(k−1)w,k (w) = 0, f

(k+1)w,k = 0, . . . , f

(s)w,k(w) = 0, then

h(s)w,k(w) = 0.

Now letting s = k + 1, . . . , m, and noticing condition (7), we see that if wecan prove that there exist two groups of constants a0,k, a1,k, . . . , am,k and b0,k,b1,k, . . . , bm,k, such that the following systems hold

(14)

m∑i=0

ai,k = 0,m∑i=0

(2a+ i)ai,k = 0

m∑i=0

(2a+ i)(2a+ i+ 1)ai,k = 0

· · · · ·m∑i=0

k∏j=1

(2a+ i+ j − 1)ai,k = 1

· · · · ·m∑i=0

m∏j=1

(2a+ i+ j − 1)ai,k = 0

Page 248: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ZHI-JIE JIANG 234

and

(15)

m∑i=0

bi,k = 1

m∑i=0

(2a+ i)bi,k = 0

m∑i=0

(2a+ i)(2a+ i+ 1)bi,k = 0

· · · · ·m∑i=0

m−k+1∏j=1

(2a+ i+ j − 1)bi,k = 0,

then this finishes the proof of the lemma for the case of k = 0. From Lemma 3in [33] and a calculation, we get that the determinant of the system (14) equals(−1)k−1

∏mj=1 j!, which is different from zero. By this, there must exist a0,k,

a1,k, . . . , am,k such that the system (14) holds. Since the number of equationsin the system (15) is less than the number of variables, there must exist b0,k,b1,k, . . . , bm,k, such that the system (15) holds.

To characterize the compactness, we need the following result, which isproved in a standard way (see [23]). So the proof is omitted.

Lemma 2.3. Let T ∈ DnMuCφ, DnCφMu, CφD

nMu,MuDnCφ,MuCφD

n,CφMuD

n. Then the bounded operator T : N pα → BΨ is compact if and only

if for every bounded sequence fj in N pα such that fj → 0 uniformly on every

compact subset of D as j →∞, it follows that

limj→∞

∥Tfj∥BΨ = 0.

We need also the following estimate for derivative of functions in area Nevan-linna spaces. We refer the reader to [36] for a complete proof.

Lemma 2.4. For a fixed k ∈ N0 = N ∪ 0, there exists a positive constantCk = C(α, p, k) independent of f ∈ N p

α and z ∈ D such that

|f (k)(z)| ≤ 1

(1− |z|2)kexp

Ck∥f∥N pα

(1− |z|2)α+2p

.

3. Boundedness and compactness

We first characterize the boundedness and compactness of DnMuCφ : N pα → BΨ.

Theorem 3.1. Let φ be an analytic self-map of D and u ∈ H(D). Then thefollowing statements are equivalent:

(i) The operator DnMuCφ : N pα → BΨ is bounded.

Page 249: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

PRODUCT-TYPE OPERATORS FROM AREA NEVANLINNA SPACES ... 235

(ii) The operator DnMuCφ : N pα → BΨ is compact.

(iii) For all c > 0 and k ∈ 0, 1, . . . , n + 1, u and φ satisfy the followingconditions:

Ik = supz∈D

µΨ(z)Ik(z) <∞

and

lim|φ(z)|→1

µΨ(z)Ik(z)

(1− |φ(z)|2)kexp

c

(1− |φ(z)|2)α+2p

= 0,

where

Ik(z) =∣∣∣ n+1∑j=k

Cjn+1u(n+1−j)(z)Bj,k(φ

′(z), . . . , φ(j−k+1)(z))∣∣∣.

Proof. (i) ⇒ (iii). Let hk(z) = zk ∈ N pα , k = 0, 1, . . . , n + 1. Applying the

operator DnMuCφ : N pα → BΨ to the function h0, we have

bµΨ(DnMuCφh0) = supz∈D

µΨ(z)∣∣∣(DnMuCφh0)

′(z)∣∣∣

= supz∈D

µΨ(z)∣∣∣ n+1∑j=0

Cjn+1u(n+1−j)(z)Bj,0(φ

′(z), . . . , φ(j+1)(z))∣∣∣(16)

= supz∈D

µΨ(z)I0(z) = I0.

Since the operator DnMuCφ : N pα → BΨ is bounded, we have

bµΨ(DnMuCφh0) ≤ ∥DnMuCφh0∥ ≤ C∥DnMuCφ∥.(17)

From (16) and (17), we obtain that I0 <∞.Assume now that we have proved the following inequalities

Il = supz∈D

µΨ(z)Il(z) ≤ C∥DnMuCφ∥(18)

for each l ∈ 0, 1, ..., k−1 and a k ≤ n+1. Applying Lemma 2.1 to the function

hk, and noticing that h(s)k (z) ≡ 0 for s > k, we get

(DnMuCφhk

)′(z) =

k∑j=0

h(j)k (φ(z))

n+1∑i=j

Cin+1u(n+1−i)(z)·

·Bi,j(φ′(z), . . . , φ(i−j+1)(z))(19)

=

k∑j=0

k · · · (k − j + 1)(φ(z))k−jn+1∑i=j

Cin+1u(n+1−i)(z)·

·Bi,j(φ′(z), . . . , φ(i−j+1)(z)).

Page 250: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ZHI-JIE JIANG 236

From (19), using the boundedness of DnMuCφ : N pα → BΨ, the boundedness of

φ(z) and the triangle inequality, noticing that the coefficient at

n+1∑j=k

Cjn+1u(n+1−j)(z)Bj,k(φ

′(z), . . . , φ(j−k+1)(z))

is independent of z, finally using hypothesis (18) we easily obtain

Ik = supz∈D

µΨ(z)Ik(z) ≤ C∥DnMuCφ∥.(20)

By induction we get that (20) holds for each k ∈ 0, 1, . . . , n+ 1.Let w ∈ D and c > 0. Then for a fixed k ∈ 0, 1, . . . , n+ 1, by Lemma 2.2

there exists a function hφ(w),k ∈ Npα such that

h(k)φ(w),k(φ(w)) =

φ(w)k

(1− |φ(w)|2)α+2p

+kexp

c

(1− |φ(w)|2)α+2p

and(21)

h(j)φ(w),k(φ(w)) = 0

for each j ∈ 0, 1, . . . , n+ 1 \ k. Hence, from the boundedness of DnMuCφ :N pα → BΨ, we have

µΨ(w)∣∣(DnMuCφhφ(w))

′(w)∣∣ =

µΨ(w)|φ(w)|kIk(w)

(1− |φ(w)|2)α+2p

+kexp

c

(1− |φ(w)|2)α+2p

≤ ∥DnMuCφhφ(w)∥BΨ ≤ C∥DnMuCφ∥.(22)

Then from (22) we get

µΨ(w)|φ(w)|kIk(w)

(1− |φ(w)|2)kexp

c

(1− |φ(w)|2)α+2p

≤ C(1− |φ(w)|2)α+2p .(23)

Taking the limit in (23) as |φ(w)| → 1 gives the following

lim|φ(w)|→1

µΨ(w)Ik(w)

(1− |φ(w)|2)kexp

c

(1− |φ(w)|2)α+2p

= 0.

This shows that the statement (i) implies (iii).(iii) ⇒ (ii). In order to prove that the operator DnMuCφ : N p

α → BΨ iscompact, by Lemma 2.3 we just need to prove that, if fi is a sequence in N p

α

such that supi∈N ∥fi∥N pα≤ M and fi → 0 uniformly on any compact subset of

D as i→∞, thenlimi→∞∥DnMuCφfi∥BΨ = 0.

Notice that the second condition in (iii) holds for all c > 0. Hence, for arbitraryε > 0, there is an η ∈ (0, 1), such that for any z ∈ K = z ∈ D : |φ(z)| > η

µΨ(z)Ik(z)

(1− |φ(z)|2)kexp

CkM

(1− |φ(z)|2)α+2p

< ε,(24)

Page 251: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

PRODUCT-TYPE OPERATORS FROM AREA NEVANLINNA SPACES ... 237

where Ck is the constant in Lemma 2.4. For such chosen ε and η, by using (24)and Lemma 2.4, we have

supz∈D

µΨ(z)∣∣(DnMuCφfi

)′(z)∣∣

= supz∈D

µΨ(z)∣∣∣ n+1∑k=0

f(k)i (φ(z))

n+1∑j=k

Cjn+1u(n+1−j)(z)·

·Bj,k(φ′(z), . . . , φ(j−k+1)(z)

)∣∣∣(25)

≤ supz∈D

µΨ(z)

n+1∑k=0

∣∣f (k)i (φ(z))∣∣Ik(z)

≤(

supz∈K

+ supz∈D\K

)µΨ(z)

n+1∑k=0

∣∣f (k)i (φ(z))∣∣Ik(z)

≤ (n+ 2)ε+n+1∑k=0

Ik sup|z|≤η

∣∣f (k)i (z)∣∣.

Since fi → 0 uniformly on compact subsets of D as i→∞ implies that for each

k ∈ N, f(k)i → 0 uniformly on compact subsets of D as i→∞, from (25) we get

limi→∞

supz∈D

µΨ(z)∣∣(DnMuCφfi)

′(z)∣∣ = 0.

It is clear that

limi→∞

∣∣(DnMuCφfi)(0)∣∣ = 0.(26)

Consequently, from (25) and (26) we obtain

limi→∞∥DnMuCφfi∥BΨ = 0.(27)

Hence, from Lemma 2.3 we see that the operator DnMuCφ : N pα → BΨ is

compact.(ii) ⇒ (i). This implication is obvious. This finishes the proof of the

theorem. Since DnCφMu = DnMuφCφ, by Faa di Bruno’s formula and Theorem 3.1

we obtain the characterizations of the boundedness and compactness for theoperator DnCφMu : N p

α → BΨ in the following result.

Corollary 3.1. Let φ be an analytic self-map of D and u ∈ H(D). Then thefollowing statements are equivalent:

(i) The operator DnCφMu : N pα → BΨ is bounded.

(ii) The operator DnCφMu : N pα → BΨ is compact.

Page 252: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ZHI-JIE JIANG 238

(iii) For all c > 0 and k ∈ 0, 1, . . . , n + 1, u and φ satisfy the followingconditions:

supz∈D

µΨ(z)Jk(z) <∞

and

lim|φ(z)|→1

µΨ(z)Jk(z)

(1− |φ(z)|2)kexp

c

(1− |φ(z)|2)α+2p

= 0,

where

Jk(z) =∣∣∣ n+1∑j=k

n+1−j∑i=0

Cjn+1u(i)(φ(z))Bn+1−j,i

(φ′(z), . . . , φ(n+2−j−i)(z)

·Bj,k(φ′(z), . . . , φ(j−k+1)(z)

)∣∣∣.Since

(CφDnMuf)′(z) =

n+1∑k=0

Ckn+1u(n+1−k)(φ(z))φ′(z)f (k)(φ(z)),

we have the following result, whose proof is similar to that of Theorem 3.1. Soit is omitted.

Theorem 3.2. Let φ be an analytic self-map of D and u ∈ H(D). Then thefollowing statements are equivalent:

(i) The operator CφDnMu : N p

α → BΨ is bounded.

(ii) The operator CφDnMu : N p

α → BΨ is compact.

(iii) For all c > 0 and k ∈ 0, 1, . . . , n + 1, u and φ satisfy the followingconditions:

supz∈D

µΨ(z)|u(n+1−k)(φ(z))||φ′(z)| <∞

and

lim|φ(z)|→1

µΨ(z)|u(n+1−k)(φ(z))||φ′(z)|(1− |φ(z)|2)k

expc

(1− |φ(z)|2)α+2p

= 0.

Next we characterize the boundedness and compactness ofMuDnCφ : N p

α → BΨ.

Theorem 3.3. Let φ be an analytic self-map of D and u ∈ H(D). Then thefollowing statements are equivalent:

Page 253: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

PRODUCT-TYPE OPERATORS FROM AREA NEVANLINNA SPACES ... 239

(i) The operator MuDnCφ : N p

α → BΨ is bounded.

(ii) The operator MuDnCφ : N p

α → BΨ is compact.

(iii) For all c > 0 and k ∈ 0, 1, . . . , n, u and φ satisfy the following condi-tions:

supz∈D

µΨ(z)|u(z)||φ′(z)|n+1 <∞,

supz∈D

µΨ(z)Lk(z) <∞,

lim|φ(z)|→1

µΨ(z)Lk(z)

(1− |φ(z)|2)kexp

c

(1− |φ(z)|2)α+2p

= 0,

where

Lk(z) =∣∣u′(z)Bn,k(φ′(z), . . . , φ(n−k+1)(z))

+ u(z)Bn+1,k(φ′(z), . . . , φ(n−k+2)(z))

∣∣,and

lim|φ(z)|→1

µΨ(z)|u(z)||φ′(z)|n+1

(1− |φ(z)|2)n+1exp

c

(1− |φ(z)|2)α+2p

= 0.

Proof. By some calculation, we have

(MuDnCφf)′(z) =

n∑k=0

f (k)(φ(z))(u′(z)Bn,k

(φ′(z), . . . , φ(n−k+1)(z)

)+ u(z)Bn+1,k

(φ′(z), . . . , φ(n−k+2)(z)

))+ u(z)(φ′(z))n+1f (n+1)(φ(z)).

By this formula, the proof can be given similar to that of Theorem 3.1. So weomit it.

Since (MuCφDnf)′(z) = u′(z)f (n)(φ(z)) + u(z)φ′(z)f (n+1)(φ(z)), we have

Theorem 3.4. Let φ be an analytic self-map of D and u ∈ H(D). Then thefollowing statements are equivalent:

(i) The operator MuCφDn : N p

α → BΨ is bounded.

(ii) The operator MuCφDn : N p

α → BΨ is compact.

(iii) For all c > 0, the functions u and φ satisfy the following conditions:

supz∈D

µΨ(z)|u′(z)| <∞,

supz∈D

µΨ(z)|u(z)||φ′(z)| <∞,

lim|φ(z)|→1

µΨ(z)|u′(z)|(1− |φ(z)|2)n

expc

(1− |φ(z)|2)α+2p

= 0,

Page 254: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ZHI-JIE JIANG 240

and

lim|φ(z)|→1

µΨ(z)|u(z)||φ′(z)|(1− |φ(z)|2)n+1

expc

(1− |φ(z)|2)α+2p

= 0.

Noticing that CφMuDn = MuφCφD

n, by Theorem 3.4 we have

Corollary 3.2. Let φ be an analytic self-map of D and u ∈ H(D). Then thefollowing statements are equivalent:

(i) The operator CφMuDn : N p

α → BΨ is bounded.

(ii) The operator CφMuDn : N p

α → BΨ is compact.

(iii) For all c > 0, the functions u and φ satisfy the following conditions:

supz∈D

µΨ(z)|u′(φ(z))||φ′(z)| <∞,

supz∈D

µΨ(z)|u(φ(z))||φ′(z)| <∞,

lim|φ(z)|→1

µΨ(z)|u′(φ(z))||φ′(z)|(1− |φ(z)|2)n

expc

(1− |φ(z)|2)α+2p

= 0,

and

lim|φ(z)|→1

µΨ(z)|u(φ(z))||φ′(z)|(1− |φ(z)|2)n+1

expc

(1− |φ(z)|2)α+2p

= 0.

Acknowledgments. The author would like to thank the anonymous ref-eree very much for providing valuable suggestions for the improvement of thispaper. This work was supported by the Open Program of Key Laboratoryof Mathematics and Interdiscriplinary Science of Guangdong Higher Educa-tion Institutes, Guangzhou University, the Sichuan Province University KeyLaboratory of Bridge Non-destruction Detecting and Engineering Computing(No.2016QZJ01) and the Cultivation Project of Sichuan University of Scienceand Engineering (No.2015PY04).

References

[1] K. Attele, Toeplitz and Hankel operators on Bergman spaces, HokkaidoMath. J., 21 (1992), 279-293.

[2] F. Colonna, S. Li, Weighted composition operators from the minimal Mobiusinvariant space into the Bloch space, Mediter. J. Math., 10 (1) (2013), 395-409.

[3] B. Choe, H. Koo, W. Smith, Carleson measure for the area Nevalinnaspaces and applications, J. Anal. Math., 104 (2008), 207-233.

Page 255: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

PRODUCT-TYPE OPERATORS FROM AREA NEVANLINNA SPACES ... 241

[4] C. C. Cowen, B. D. MacCluer, Composition operators on spaces of analyticfunctions, CRC Press, Boca Roton, 1995.

[5] K. Esmaeili, M. Lindstrom, Weighted composition operators between Zyg-mund type spaces and their essential norms, Integral Equ. Oper. Theory.,75 (2013), 473-490.

[6] R. A. Hibschweiler, N. Portnoy, Composition followed by differentiation be-tween Bergman and Hardy spaces, Rocky Mountain J. Math., 35 (3) (2005),843-855.

[7] Z. J. Jiang, On a class of operators from weighted Bergman spaces to somespaces of analytic functions, Taiwan. J. Math., 15 (5) (2011), 2095-2121.

[8] Z. J. Jiang, On a product-type operator from weighted Bergman-Orlicz spaceto some weighted type spaces, Appl. Math. Comput., 256 (2015), 37-51.

[9] W. Johnson, The curious history of Faa di Bruno’s formula, Amer. Math.Monthly., 109 (3) (2002), 217-234.

[10] S. Krantz, S. Stevic, On the iterated logarithmic Bloch space on the unitball, Nonlinear Anal. TMA 71 (2009), 1772-1795.

[11] P. Kumar, S. D. Sharma, Weighted composition operators from weightedBergman Nevanlinna spaces to Zygmund spaces, Int. J. Mod. Math. Sci., 3(1) (2012), 31-54.

[12] Y. Liu, Y. Yu, Products of composition, multiplication and radial derivativeoperators from logarithmic Bloch spaces to weighted-type spaces on the unitball, J. Math. Anal. Appl., 423(1) (2015), 76-93.

[13] H. Li, Z. Guo, On a product-type operator from Zygmund-type spaces toBloch-Orlicz spaces, J. Inequal. Appl., Vol. 2015, Article no. 132, (2015),18 pages.

[14] S. Li, S. Stevic, Composition followed by differentiation between Bloch typespaces, J. Comput. Anal. Appl., 9 (2) (2007), 195-205.

[15] S. Li, S. Stevic, Generalized composition operators on Zygmund spaces andBloch type spaces, J. Math. Anal. Appl., 338 (2008), 1282-1295.

[16] S. Li, S. Stevic, Products of composition and integral type operators fromH∞ to the Bloch space, Complex Var. Elliptic Equ., 53 (5) (2008), 463-474.

[17] S. Li, S. Stevic, Products of composition and differentiation operators fromZygmund spaces to Bloch spaces and Bers spaces, Appl. Math. Comput.,217 (2010), 3144-3154.

Page 256: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ZHI-JIE JIANG 242

[18] K. Madigan, A. Matheson, Compact composition operators on the Blochspace, Trans. Amer. Math. Soc., 347 (1995), 2679-2687.

[19] S. Ohno, Products of composition and differentiation on Bloch spaces, Bull.Korean Math. Soc., 46 (6) (2009), 1135-1140.

[20] C. Pan, Generalized composition operators from µ-Bloch spaces into mixednorm spaces, Ars Combin., 102 (2011), 263-268

[21] J. C. Ramos Fernandez, Composition operators on Bloch-Orlicz type spaces,Appl. Math. Comput., 217 (2010), 3392-3402.

[22] Y. Ren, On an integral-type operator from mixed norm spaces to Zygmund-type spaces, Bulletin of Mathematical Analysis and Applications, 4 (3)(2012), 71-77.

[23] H. J. Schwartz, Composition operators on Hp, Thesis, University of Toledo,1969.

[24] B. Sehba, S. Stevic, On some product-type operators from Hardy-Orlicz andBergman-Orlicz spaces to weighted-type spaces, Appl. Math. Comput., 233(2014), 565-581.

[25] A. K. Sharma, Products of composition multiplication and differentiationbetween Bergman and Bloch type spaces, Turkish. J. Math., 35 (2011), 275-291.

[26] A. K. Sharma, Z. Abbas, Weighted composition operators between weightedBergman-Nevanlinna and Bloch-type spaces, Appl. Math. Sci., 41 (4)(2010), 2039-2048.

[27] S. Stevic, Norm and essential norm of composition followed by differen-tiation from α-Bloch spaces to H∞

µ , Appl. Math. Comput., 207 (2009),225-229.

[28] S. Stevic, On an integral-type operator from logarithmic Bloch-type andmixed-norm spaces to Bloch-type spaces, Nonlinear Anal. TMA, 71 (2009),6323-6342.

[29] S. Stevic, Products of composition and differentiation operators on theweighted Bergman space, Bull. Belg. Math. Soc., 16 (2009), 623-635.

[30] S. Stevic, Products of integral-type operators and composition operatorsfrom the mixed norm space to Bloch-type spaces, Siberian Math. J., 50(4) (2009), 726-736.

[31] S. Stevic, On an integral operator from the Zygmund space to the Bloch-typespace on the unit ball, Glasg. J. Math., 51 (2009), 275-287.

Page 257: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

PRODUCT-TYPE OPERATORS FROM AREA NEVANLINNA SPACES ... 243

[32] S. Stevic, On an integral-type operator from logarithmic Bloch-type spacesto mixed-norm spaces on the unit ball, Appl. Math. Comput., 215 (2010),3817-3823.

[33] S. Stevic, Weighted differentiation composition operators from H∞ andBloch spaces to nth weighted-type spaces on the unit disk, Appl. Math.Comput., 216 (2010), 3634-3641.

[34] S. Stevic, S. Ueki, Integral-type operators acting between weighted-typespaces on the unit ball, Appl. Math. Comput., 215 (2009), 2464-2471.

[35] W. Yang, W. Yan, Generalized weighted composition operators from areaNevanlinna spaces to weighted-type spaces, Bull. Korean Math. Soc., 48 (6)(2011), 1195-1205.

[36] W. Yang, X. Zhu, Generalized weighted composition operators from areaNevanlinna spaces to Bloch-type spaces, Taiwan. J. Math., 16 (3) (2012),869-883.

[37] K. Zhu, Spaces of holomorphic functions in the unit ball, Springer, NewYork, 2005.

[38] X. Zhu, Products of differentiation, composition and multiplication operatorfrom Bergman type spaces to Bers spaces, Integral Transforms Spec. Funct.,18 (2007), 223-231.

[39] X. Zhu, Generalized weighted composition operators from Bloch spaces intoBers-type spaces, Filomat., 26 (2012), 1163-1169.

Accepted: 1.06.2017

Page 258: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (244–255) 244

COMPARISON OF SVM ALGORITHM AND BPALGORITHM: STUDY ON THE EVALUATION INDEXSYSTEM OF SCIENTIFIC RESEARCH PERFORMANCE OFVOCATIONAL COLLEGES

Jiayin Feng∗

Dongyan JiaLi CuiJing CaoZhuo LinMin ZhangHebei Normal University of Science & Technology

Qinhuangdao Haigang District

Heibei, 066000

China

feng [email protected]

Abstract. As the education in China develops rapidly, the scientific research of highervocational education has gradually drawn extensive attentions. In order to constructa reasonable evaluation model of scientific research performance to further enhancethe research enthusiasm of teachers, this study constructed a model based on relevanttheories of the support vector machine (SVM) algorithm and the back propagation (BP)algorithm. In addition, the simulation of the model was performed and the accuracyrate and errors of these two algorithms were compared and analyzed. Then the mostappropriate algorithm was applied to the evaluation index system. The simulationresults showed that, simplified data of scientific research evaluation could be appliedas the input data of the SVM algorithm to accurately and effectively construct anevaluation index system of scientific research performances of vocational colleges. Thusa more reasonable and accurate evaluation system was constructed.

Keywords: SVM algorithm, BP algorithm, vocational colleges, scientific research,performance evaluation.

1. Introduction

The classification of industries refines day by day. The performance evaluationis not only the recognition to the achievements of bottom workers, but alsoa reflection of top managers’ ability. Therefore, patents for invention of thecomprehensive performance evaluation system of enterprises occur [1]. However,the corporate image can also be affected by safety problems, thus patents ofthe safety performance evaluation system of manufacturing enterprises come

∗. Corresponding author

Page 259: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMPARISON OF SVM ALGORITHM AND BP ALGORITHM 245

into being [2]. Medical institutions also have the same service performanceevaluations [3].

Under the impetus of China’s education, the higher vocational educationalso develops rapidly. Therefore, the evaluation of the performance of teach-ers in vocational colleges becomes very important [4]. As the reflection of theteaching level and educational quality of vocational colleges, the performance ofteachers has become the competitive force of each college [5]. Current vocationalcolleges are transformed from secondary technical schools, thus their manage-ment systems and teaching models are still in old modes. Teachers are the mainforce of scientific researches, thus the correct evaluation of teachers’ capacityfor scientific research becomes the important issue of each vocational college [6].Teachers with strong capacity for scientific researches are more likely to partic-ipate in scientific and research activities, thus the scientific research ability ofcolleges can be improved [7]. As the discipline classification increases, it has beenunreasonable to evaluate teachers of different disciplines using the same evalua-tion standard [8]. Thus evaluation systems that are more accurate and fair areneeded. Current evaluation methods include Delphi method, analytic hierarchyprocess (AHP), fuzzy comprehensive evaluation, etc. [9]. Heping Y et al. [10]formulated a new evaluation index system for scientific research achievementsin universities by introducing value engineering and then analyzed the systemusing AHP method and multi-level fuzzy comprehensive evaluation method toobtain comprehensive and objective evaluation conclusions. Xiaoping W et al.[11] designed the framework of university teacher performance assessment in-dicators, established a hierarchical model of comprehensive quality evaluationusing AHP to figure out the weight of each indicator, set up a fuzzy compre-hensive evaluation model and provides the emamples to suggest the feasibilityand effectiveness of the method. Combining scientificity with systematicness,hierarchy with independence and maneuverability with easy quantization, thisstudy established evaluation models of scientific research performance based ontheories of the support vector machine (SVM) algorithm and the back propaga-tion (BP) algorithm respectively. The simulation was performed after obtainingmodel results. The comparison showed that the SVM algorithm could establishthe evaluation index system of scientific research performance more accuratelyand reasonbly in vocational colleges.

2. Relevant theories

2.1 SVM and particle swarm optimization algorithms

The SVM keeps the balance of a small range of data samples in model trainingcomplexity and learning ability based on Vapnik-Chervonenkis (VC) dimensionand theories of structual risk minimization [12]. The SVM can be linearly sep-arable, linearly inseparable and multi-classification [13]. Its fitting function is

(1) (g)n = fn(m) = ωn, φn(m)+ αn.

Page 260: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

246 JIAYIN FENG, DONGYAN JIA, LI CUI, JING CAO, ZHUO LIN and MIN ZHANG

In equation (1), ωn shows the complexity of fn(m) and αn is a constant. If

(2) (f)k − ωn, φn(n) − αn = (ξn)k, (k = 1, 2, 3, . . . , d),

the minimum cost functional is

(3) Pn = 0.5ωn, ωn+ 0.5W

d∑k=1

[(ξn)k]2

where W is the penalty factor and ξ refers to the slack variable. The constructedoptimizing function is:

Kn(ωn, αn, ξn, µn) = 0.5ωn, ωn+ 0.5Wd∑

k=1

[(ξn)k]2(4)

+d∑

k=1

(µn)k[ωnφn(tk)+ αn + (ξn)− (IMFn)k].

In equation (4), (µn)k refers to the multiplier and final equation (1) is

(5) fn(m) =

d∑k=1

(µn)kKn(m,mk) + αn.

If the Kn(m,mk) in equation (5) is the SVM function, then

(6) Kn(m,mk) = exp[∥m−mk∥2

2ϑ2n],

which is the most common kernel function. In equation (6), ϑn is the standarddeviation of fn in the nth group.

In particle swarm optimization (PSO), each individual is a particle and eachparticle is a potential solution [14]. The initial particle is expressed by posi-tion (Q), speed (V) and adaptive value (F). The adaptive value determines theperformance of the particle. There is an optimal particle position in all par-ticles, which is called the population extremum Fbest. Meanwhile, there is anindividual extremum Gbest at the optimal position of individual fitness value.Suppose the X-dimensional solution space is composed of h populations com-posed of particles, Y = (Y 1, Y 2, . . . , Y h). The nth particle represents a vectorquantity as well as the search location in the X-dimensional solution space. Af-ter obtaining the fitness value, the speed of the nth particle is solved: Vn =(Vn1, Vn2, . . . , VnX)T . The individual extremum is Gn = (Gn1, Gn2, . . . , GnX)T ;the population extremum is F = (Gσ1, Gσ2, . . . , GσX)T . Through the itera-tion, particles can adjust and update by themselves according to the speed andthe position of individual extremum and population extremum. The result isV i+1nx = τV i

nx+ l1r1(Dinx−Xi

nd)+ l2r2(Diαx−Xi

σx), V i+1nd = Y i

nx+V i+1nd , in which

i refers to the times of iteration and τ is the inertia weight; x = 1, 2, . . . , X;n = 1, 2, . . . , h; Vnx is the particle speed; l1 and l2 are accelerated factors; r1and r2 are random values in [0, 1].

Page 261: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMPARISON OF SVM ALGORITHM AND BP ALGORITHM 247

2.2 BP algorithm

BP algorithm is used to estimate errors of the leading layer based on errors of theoutput layer; then based on this, errors of the upper layer were estimated, untilerrors of all layers were estimated [15]. The specific algorithm is as follows.Random values are given to the weight matrix and the threshold vector andthe error is designed as 0; the accuracy value is E and the maximum times oflearning is U. Then sample data are input for calculation of the output resultsof each layer. The actual network output and neuron partial derivative arecalculated. Then based on this, the neuron partial derivative of the hiddenlayer is calculated. The overall errors of network and error signals of each layerare calculated, and the weight of each layer is adjusted. Finally, it is checkedwhether all samples are tested and whether the overall errors of network reachthe requirements.

3. Simulation experiment

3.1 Data collection

3.1.1 Index selection for the evaluation system of scientific research

As shown in table 1, the system is composed of 5 level-I indexes and 28 level-II indexes. Due to the lack of unified assessment criteria, this study took theengineering higher vocational schools as examples to establish a system for eval-uation of scientific research performance of teachers.

3.1.2 Data acquirement

Data were collected from representative scientific research data of teachers. Tak-ing the performance scoring of scientific researches formulated by vocational col-leges as the standard, we calculated the scientific research activities of teachers.Teachers’ capacity for scientific research was expressed as Z; one to four pointswas used to represent the capability, 1 point for weak capacity, 2 for moder-ate capacity, 3 for good capacity and 4 for strong capacity. As shown in table2, P1 ∼ P11, P12 ∼ P18, P19 ∼ P23 and P24 ∼ P28 were data of teach-ers with strong capacity, good capacity, moderate capacity and weak capacityrespectively.

The missing data were recorded as 0 to reduce experimental errors.

3.1.3 Pretreatment of experimental data

The data in table 2 were pretreated and the equation was:

anγ =anγ −Min aκγ

Max aκγ −Minaκγ, n = 1, 2, 3, . . . , t, γ = 1, 2, 3, . . . , ρ, 1 ≤ κ ≤ t.

In the equation, Min aκγ refers to the minimum value of the column wherethe attribute of variate aγ locates and Max aκγ − Minaκγ refers to the range

Page 262: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

248 JIAYIN FENG, DONGYAN JIA, LI CUI, JING CAO, ZHUO LIN and MIN ZHANG

Table 1. Index system of teachers’ capacity for scientific research

value of variate aγ . However, these two values might be 0, thus the index waseliminated to guarantee the accuracy of the experiment. L1∼L11 were selectedas the experimental sample data and the obtained sample data are as shown intable 3.

3.2 Construction of the evaluation model based on SVM algorithm

In order to achieve the balance between the tolerance degree and the complexityof sample classification errors, this study adopted penalty factor W to define thedegree of misclassification of penalty samples. The model included the trainingfunction and the forecasting function. The scientific research evaluation modelafter training was SVMtrain (labels, research, −w8g0.02t2), in which the labelsrepresented teachers’ capacity for scientific research (1∼4 points); research wasthe sample data; −w, g and t were the penalty factor, kernel parameter and

Page 263: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMPARISON OF SVM ALGORITHM AND BP ALGORITHM 249

Table 2. Partial original data of the evaluation indexsystem of teachers scientific research

kernel function respectively. The range of the penalty factor and the kernelparameter was [2−10, 210].

The classification model of the predicted function was (New label, accu-racy)=SVMpredict(labels, research, model), in which “New label” refers to thenew capacity score, “accuracy” was the accurate rate of classification; “labels”represented the forecasting of the capacity for scientific research, “research”refers to the predicted sample data and “model” refers to the scientific researchevaluation model after training.

Page 264: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

250 JIAYIN FENG, DONGYAN JIA, LI CUI, JING CAO, ZHUO LIN and MIN ZHANG

Table 3. Experimental sample data after pretreatment

3.3 Construction of the evaluation model based on BP algorithm

During the training process, the corresponding weight of the neuron was con-stantly adjusted to narrow the gap between the forecasting output results andthe actual results. The number of samples, input nodes and output layers was11, 11 and 4 respectively. The learning rate was set as 0.01, the maximumtraining times was as 200, and the training accuracy was E− 3. The model wasnet=new ff(research, labels, 2); net=train(net, research, labels); sim=sim(net,labels), in which research represented sample data and labels represented thenetwork predicting capacity for scientific research.

Page 265: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMPARISON OF SVM ALGORITHM AND BP ALGORITHM 251

Figure 1. Comparison of the predicted results and the actual results.

4. Simulation results

Figure 1 shows the comparison between predicted values obtained from theabove two models and the actual values. It can be noted from the figure thatmost of BP predicted values were basically similar to the actual values, butsome of them had large error, and the error value of the maximum capabilityassessment reached 1.5 approximately; SVM predicted values had higher accu-racy and smaller error compared to the predicted values; except sample 7, theerrors of other samples could be ignored. Therefore, the SVM algorithm couldevaluate the scientific research performance of teachers more accurately.

5. Improvement of the evaluation system based on SVM algorithm

The SVM model was optimized and improved by combining the SVM algorithmwith PSO. It was obtained by the proof method that w was 8 and g was 0.25.In iterative solution, w was 11.5 and g was 1.5 under the optimal accuracy. Theobtained predicted values are shown in figure 2.

Compared to the SVM algorithm, the accuracy of the PSO optimized SVMalgorithm reached 100%, indicating the penalty factor and kernel parameter ofthe PSO optimized SVP algorithm ensured the accuracy of prediction, avoiderrors caused by individual samples, and effectively improved the accuracy ofpredicted results.

The optimized SVM algorithm was applied to the computer system, andthe detection results were the same as the actual results. Its application in theevaluation indicator system for the research performance in higher vocationalcolleges had a 100% accuracy.

Page 266: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

252 JIAYIN FENG, DONGYAN JIA, LI CUI, JING CAO, ZHUO LIN and MIN ZHANG

Figure 2. Comparison between predicted values of the PSO optimized SVM algorithm,

predicted values of the SVM algorithm and actual values.

Figure 3. Computer interface.

6. Discussion and conclusion

Currently, the evaluation of the scientific research performance of vocationalcolleges is still at the starting stage. There are plenty of theoretical researchesconcerning core factors, evaluation indexes and methods that can affect theevaluation of the scientific research performance; however, there are still somedeficiencies. Compared with universities, the vocational colleges still need tofurther improve their evaluation on the scientific research performance. Currentevaluation methods in vocational colleges focus more on quantized evaluationsinstead of qualitative evaluations. This study compared the BP algorithm and

Page 267: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMPARISON OF SVM ALGORITHM AND BP ALGORITHM 253

Figure 4. Pretreatment data.

Figure 5. Assessment after the improvement of SVM algorithm.

the SVM algorithm, established evaluation models, and made simulation. Theresults demonstrated that the SVM algorithm was more accurately in process-ing small samples and multiple indexes than the BP algorihtm. Currently, theBP algorihtm develops well in related fields, but there were some deficiencies.The SVM algorithm tactfully avoids those deficiencies and moreover achievesglobal optimization. Therefore, the evaluation of SVM algorithm is more scien-tific and accurate in this study. Based on it, the SVM algorithm was furtheroptimized and improved and combined with PSO. Then the accuracy of theexperimental results reached 100%. However, only one vocational college wasselected for study; the research performance was evaluated using the optimizedSVM algorithm to further prove the accuracy of the experimental results. Dueto the diversity of different vocational colleges, further studies are required inthe future. In conclusion, the application of SVM algorithm to the evaluationof scientific research performance in vocational colleges should be promoted.

This study is supported by Study on the new method of practical teachingin SSH course,(JYZD201606).

Page 268: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

254 JIAYIN FENG, DONGYAN JIA, LI CUI, JING CAO, ZHUO LIN and MIN ZHANG

Acknowledgements

Research project on the development of social science in Hebei province 2018The people’s livelihood project No.201803040106.

References

[1] Enterprise integrated performance evaluation system, CN Patent2,00,810,080,220.4, December 25, 2008.

[2] State grid corporation of its electric power company in zhejiang provincetaizhou power supply company, Production enterprise security performanceappraisal system, CN Patent 2,01,410,008,561.6, January 08, 2014.

[3] Wave software Co, LTD, A method of medical institutions in hospital serviceperformance evaluation, CN Patent 2,01,410,426,131.6, August 27, 2014.

[4] Hunan institute of finance and economy, A device used for evaluation ofuniversity teachers’ performance, CN Patent2,01,520,902,556.X, November13, 2015.

[5] L. Qian, vAnalysis of incentive theory of research management in HigherVocational Colleges and universities research management enlightenment,J. Education and Teaching Forum, 47 (2015), 19-20.

[6] Z. Hui, L. Caigao, H. Chaocai, Innovation of teaching supervision systemin Higher Vocational Colleges- the construction of all-around supervisionmode, J. Hunan Social Sciences, 6 (2015), 194-198.

[7] S. Jing, P. Huaiqing, X. Jing, The strategy of promoting the scientific re-search quality of Higher Vocational College Teachers, J. Journal of HebeiNormal University, Education Science Edition, 110-113, 2015.

[8] S. Yuelan, Research on the structure and evaluation system of teachers’vocational ability in Higher Vocational Colleges, J. Journal of QingyuanPolytechnic, 4 (2014), 26-29.

[9] L. Ziyu, Research on Evaluation of scientific research performance man-agement in Higher Vocational Colleges, J. Journal of Nanyang Institute ofTechnology, 4 (2012), 62-65.

[10] Y. Heping, J. Hongxia, D. Lianjie, Evaluation on the Performance of Sci-entific Research in Universities Based on VE, 5 (2013), 843-849.

[11] W. Xiaoping, J. Li, J.M. Zhong, Study on Fuzzy Comprehensive EvaluationModel of Teacher’s Performance, Applied Mechanics & Materials, 701-702,1352-1358, 2015.

Page 269: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMPARISON OF SVM ALGORITHM AND BP ALGORITHM 255

[12] C. Chingshan, C. Minyuan, W. Yuwei, Seismic assessment of school build-ings in Taiwan using the evolutionary support vector machine inferencesystem, J. Expert Systems with Applications, 39 (2012), 4102-4110.

[13] L. State, C. Cocianu, C. Uscatu et al., Extensions of the SVM Method tothe Non-Linearly Separable Data, J. Informatica Economica, 17(2/2013),173-182.

[14] Q. Quande, L. Li, S. Cheng, L. Rongjun, Particle swarm optimization al-gorithm for interactive learning, J. Journal of Intelligent Systems, 7 (2012),547-553.

[15] Z. Lina, D. Qian, Performance prediction model based on BP algorithm,J. Journal of Shenyang Normal University (Natural Science Edition), 29(2011), 226-229.

Accepted: 29.06.2017

Page 270: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (256–276) 256

ON CHARACTERIZATION OF MONOIDS BYPROPERTIES OF GENERATORS II

Morteza JafariDepartment of MathematicsUniversity of Sistan and [email protected]

Akbar Golchin∗

Department of MathematicsUniversity of Sistan and [email protected]

Hossein Mohammadzadeh SaanyDepartment of Mathematics

University of Sistan and Baluchestan

Zahedan

Iran

[email protected]

Abstract. Kilp and Knauer in (Communications In Algebra, 20(7), 1841-1856, 1992)gave a characterizations of monoids when all generators in the category of right S-acts(Sis a monoid) satisfy properties such as freeness, projectivity, strong flatness, Condition(P ), principal weak flatness, principal weak injectivity, weak injectivity, injectivity, di-visibility, strong faithfulness and torsion freeness. Sedaghatjoo in (Semigroup Forum,87: 653-662, 2013) gave a characterizations of monoids when all generators in the cate-gory of right S-acts satisfy properties such as weak flatness, Condition (E) and regular-ity. Continuing this study the authors (On characterization of monoids by properties ofgenerators, submitted) investigated the corresponding problem for (finitely generated,cyclic, monocyclic) right acts. To our knowledge the problem has not been yet studiedfor properties such as GP -flatness, strongly (P )-cyclic, (P )-regularity and Conditions(EP ), (E′P ), (E′), (PE), (PWP ), (PWPE),WPF,WKF,PWKF, TKF, (WP ) etc. Inthis article we answer the question corresponding to these properties.

Keywords: generator, GP -flat, strongly (P )-cyclic, (P )-regular, condition (PWP).

1. Introduction

For a monoid S, a non-empty set A is called a right S-act, usually denoted AS , ifS acts on A unitarily from the right, that is, there exists a mapping A×S −→ A,

∗. Corresponding author

Page 271: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON CHARACTERIZATION OF MONOIDS BY PROPERTIES OF GENERATORS II 257

(a, s) 7−→ as, satisfying the conditions (as)t = a(st) and a1 = a, for all a ∈ ASand all s, t ∈ S. Throughout this article, S will always stand for a monoid andAS is a right S-act. For basic definitions and terminology relating semigroupsand acts over monoids, we refer the reader to [11] and [13].

Let C be a category. An objectG ∈ C is called a generator in C if the functorMorC(G,−) is faithful, i.e, for any X,Y ∈ C and any f, g ∈MorC(X,Y ) withf = g there exists α ∈MorC(G,X) such that fα = gα.

We recall from [13, II, 3.16] that GS is a generator if and only if there existsan epimorphism π : GS −→ SS . Hence SS is a generator in Act-S. Recall from[13], [8] and [7] that:

An S-act AS satisfies Condition (P ), if for all a, a′ ∈ AS , s, s′ ∈ S, as =

a′s′ ⇒ (∃a′′ ∈ AS)(∃u, u′ ∈ S)(a = a′′u, a′ = a′′u′ and us = u′s′). AS satisfiesCondition (E), if for all a ∈ AS , s, s′ ∈ S, as = as′ ⇒ (∃a′ ∈ AS)(∃u ∈ S)(a =a′u and us = us′).

AS satisfies Condition (EP ), if for all a ∈ AS , s, s′ ∈ S, as = as′ ⇒ (∃a′ ∈AS)(∃u, u′ ∈ S)(a = a′u = a′u′ and us = u′s′).

AS satisfies Condition (E′P ), if for all a ∈ AS , s, s′, z ∈ S, as = as′, sz =s′z ⇒ (∃a′ ∈ AS)(∃u, u′ ∈ S)(a = a′u = a′u′ and us = u′s′).

Also we recall that a monoid S is called left(right) collapsible if for everys, t ∈ S there exists u ∈ S such that us = ut(su = tu). Let S be a monoidand x, y ∈ S then l(x, y) = z ∈ S | zx = zy. Evidently, l(x, y) = ∅ orl(x, y) is a left ideal. If S is a left collapsible monoid, then for every x, y ∈ S,l(x, y) = ∅, and so l(x, y) is a left ideal. Similarly, for every x, y ∈ S, we definer(x, y) = t ∈ S | xt = yt. Clearly r(x, y) = ∅ or r(x, y) is a right ideal of S.If S is a right collapsible monoid, then for every x, y ∈ S, r(x, y) = ∅ and sor(x, y) is a right ideal.

We use the following abbreviations

weak pullback flatness = WPF

weak kernel flatness = WKF

principal weak kernel flatness = PWKF

translation kernel flatness = TKF

principal weak homoflatness = (PWP )

torsion freeness = TF

Theorem 1.1 (12, Theorem 1.3). Let S be a monoid and α be an act propertywhich is preserved under retraction. Then the following statements are equiva-lent:

1. all generators satisfy property α;

2. SS ×AS satisfies property α for right S-act AS;

Page 272: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

258 MORTEZA JAFARI, AKBAR GOLCHIN and HOSSEIN MOHAMMADZADEH SAANY

3. SS ×AS satisfies property α for every generator AS;

4. a right S-act AS satisfies property α if Hom(AS , SS) = ∅.

It is obvious that all properties under discussion here are preserved under re-traction.

2. Monoids over which all generators are GP -flat, strongly(P )-cyclic, (P )-regular

A monoid S is called regular, if for every s ∈ S, there exists x ∈ S such thats = sxs. We recall from 18 that a monoid S is called a generally regular, if forevery s ∈ S, there exist a natural number n and x ∈ S such that sn = sxsn. Itis clear that the class of generally regular monoids contains all regular monoids.Also we recall from [18] that an act AS is called GP -flat, if for every s ∈ S anda, a′ ∈ AS , a⊗ s = a′ ⊗ s in AS ⊗ SS implies the existence of a natural numbern such that a⊗ sn = a′ ⊗ sn in AS ⊗ SSs

n. It is obvious that every principallyweakly flat act is GP -flat, but not the converse, also every GP -flat act is torsionfree.

First see the following result.

Lemma 2.1 (18, Lemma 2.2). Let S be a monoid and AS be a right S−act.Then The following statements are equivalent:

1. AS is GP -flat;

2. for every s ∈ S, and a, a′ ∈ A, a⊗ s = a′ ⊗ s in A⊗ S implies that thereexist m,n ∈ N and elements a1, · · · am ∈ AS , s1, t1, · · · , sm, tm ∈ S suchthat

a = a1s1a1t1 = a2s2 s1s

n = t1sn

a2t2 = a3s3 s2sn = t2s

n

......

amtm = a′ smsn = tms

n.

Now we begin our investigations for monoids over which all (finitely gener-ated) generators are GP -flat.

Theorem 2.2. For any monoid S the following statements are equivalent:

1. all generators right S-acts are GP -flat;

2. all finitely generated generators right S-acts are GP -flat;

3. all generators right S-acts generated by at most three elements are GP -flat;

4. S ×AS is GP -flat for every generator right S-act AS;

Page 273: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON CHARACTERIZATION OF MONOIDS BY PROPERTIES OF GENERATORS II 259

5. S ×AS is GP -flat for every finitely generated generator right S-act AS;

6. S×AS is GP -flat for every generator right S-act AS generated by at mostthree elements;

7. S ×AS is GP -flat for every right S-act AS;

8. S ×AS is GP -flat for every finitely generated right S-act AS;

9. S × AS is GP -flat for every right S-act AS generated by at most twoelements;

10. a right S-act AS is GP -flat if Hom(AS , SS) = ∅;

11. a finitely generated right S-act AS is GP -flat if Hom(AS , SS) = ∅;

12. a right S-act AS generated by at most two elements is GP -flat ifHom(AS , SS) = ∅;

13. all right S-acts are GP -flat;

14. all finitely generated right S-acts are GP -flat;

15. S is generally regular.

Proof. Implications (1)⇔ (4)⇔ (7)⇔ (10) and (13)⇔ (14)⇔ (15) are clearfrom Theorem 1.1 and [18, Theorem 3.4].

Implications (1) ⇒ (2) ⇒ (3), (4) ⇒ (5) ⇒ (6), (7) ⇒ (8) ⇒ (9), (10) ⇒(11)⇒ (12) and (13)⇒ (1) are obvious.

(3) ⇒ (1). Let AS be a generator and suppose π : AS −→ SS is an epi-morphism. Let a ⊗ s = a′ ⊗ s in A ⊗ S, for a, a′∈ AS , s ∈ S, then as = a′sin AS . Since π is an epimorphism, there exists a′′∈ AS such that π(a′′) = 1.If A′ = aS ∪ a′S ∪ a′′S, Then as = a′s in AS implies as = a′s in A′, and soa ⊗ s = a′ ⊗ s in A′ ⊗ S. But A′ is a generator and so A′ is GP -flat by as-sumption. Thus there exists a natural number n such that a ⊗ sn = a′ ⊗ sn inA′S ⊗ SSs

n ⊆ AS ⊗ SSsn. Hence AS is GP -flat.

(6) ⇒ (4). Let AS be a generator and suppose (l1, a) ⊗ s = (l2, a′) ⊗ s in

(S ×A)S ⊗ SS, for l1, l2, s ∈ S and a, a′ ∈ AS . Let A′ = aS ∪ a′S ∪ a′′S is as inthe proof of (3)⇒ (1), then S×A′ is GP -flat by assumption. Thus there existsa natural number n such that (l1, a)⊗ sn = (l2, a

′)⊗ sn in (S ×A′)S ⊗ SSsn ⊆

(S ×A)S ⊗ SSsn, and so the result follows.

(7) ⇒ (13) Let AS be a right S-act and suppose a ⊗ s = a′ ⊗ s in A ⊗ S,for a, a′ ∈ AS and s ∈ S. Then as = a′s in AS and so (1, a)s = (1, a′)sin S × AS . Thus (1, a) ⊗ s = (1, a′) ⊗ s in (S × A) ⊗ S. Since S × AS isGP -flat, by lemma 2.1 there exist m,n ∈ N, s1, t1, s2, t2, · · · , sm, tm ∈ S and

Page 274: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

260 MORTEZA JAFARI, AKBAR GOLCHIN and HOSSEIN MOHAMMADZADEH SAANY

(l1, a1), (l2, a2), · · · , (lm, tm) ∈ S ×AS such that:

(1, a) = (l1, a1)s1(l1, a1)t1 = (l2, a2)s2 s1s

n = t1sn

(l2, a2)t2 = (l3, a3)s3 s2sn = t2s

n

......

(lm, am)tm = (1, a′) smsn = tms

n.

The above tossing implies that

a = a1s1a1t1 = a2s2 s1s

n = t1sn

a2t2 = a3s3 s2sn = t2s

n

......

amtm = a′ smsn = tms

n ,

and so AS is GP -flat by Lemma 2.1.

(9) ⇒ (7). Let AS be a right S-act and suppose (l1, a) ⊗ s = (l2, a′) ⊗ s,

for a, a′ ∈ AS and l1, l2, s ∈ S. Let A′ = aS ∪ a′S. Then S × A′S is GP -flat

by assumption and so there exists a natural number n such that (l1, a) ⊗ sn =(l2, a

′)⊗ sn in (S ×A′)S ⊗ SSsn ⊆ (S ×A)S ⊗ SSs

n and so the result follows.

(12) ⇒ (10). Let AS be a right S-act such that Hom(AS , SS) = ∅ andsuppose a⊗ s = a′⊗ s, for a, a′ ∈ AS and s ∈ S. Since Hom(AS , SS) = ∅, thereexists a homomorphism f : AS −→ SS . If A′ = aS ∪ a′S and f ′ = f |A′ , thenA′ is GP -flat by assumption and so a⊗ s = a′ ⊗ s in A′ ⊗ S implies that thereexists a natural number n such that a ⊗ sn = a′ ⊗ sn in A′ ⊗ Ssn ⊆ A ⊗ Ssn,and so the result follows.

We recall from [19] that a right congruence ρ on SS is called right subannihi-lator congruence if ρ ≤ kerλs for some s ∈ S. Also we recall from [10] that S isa right PCP monoid, if all principal right ideals of S satisfy Condition (P ) anda right S-act AS is called strongly (P)-cyclic, if for every a ∈ AS there existsz ∈ S such that kerλa = kerλz and zS satisfies Condition (P ).

Now similar to Theorem 2.2, we give equivalents of when all (finitely gener-ated) generators right S-acts are strongly (P )-cyclic.

Theorem 2.3. For any monoid S the following statements are equivalent:

1. all generators right S-acts are strongly (P )-cyclic;

2. all finitely generated generators right S-acts are strongly (P )-cyclic;

3. all generators right S-acts generated by at most two elements are strongly(P )-cyclic;

4. S ×AS is strongly (P )-cyclic for every generator right S-act AS;

Page 275: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON CHARACTERIZATION OF MONOIDS BY PROPERTIES OF GENERATORS II 261

5. S × AS is strongly (P )-cyclic for every finitely generated generator rightS-act AS;

6. S×AS is strongly (P )-cyclic for every generator right S-acts generated byat most two elements;

7. S ×AS is strongly (P )-cyclic for every right S-act AS;

8. S ×AS is strongly (P )-cyclic for every finitely generated right S-act AS;

9. S ×AS is strongly (P )-cyclic for every cyclic right S-act AS;

10. a right S-act AS is strongly (P )-cyclic if Hom(AS , SS) = ∅;

11. a finitely generated right S-act AS is strongly (P )-cyclic if Hom(AS , SS) =∅;

12. a cyclic right S-act AS is strongly (P )-cyclic if Hom(AS , SS) = ∅;

13. for every right subannihilator congruence ρ, S/ρ is strongly (P )-cyclic.

Proof. Implications (1)⇔ (4)⇔ (7)⇔ (10) are clear from Theorem 1.1.

Implications (1) ⇒ (2) ⇒ (3), (4) ⇒ (5) ⇒ (6), (7) ⇒ (8) ⇒ (9) and(10)⇒ (11)⇒ (12) are obvious.

(3)⇒ (1). Let AS be a generator and let π : AS −→ SS be an epimorphism.Let a ∈ AS . Since π is an epimorphism, there exists a′ ∈ AS such that π(a′) = 1.If A′ = aS ∪ a′S then A′ is a generator and so it is strongly (P )-cyclic byassumption. Thus there exists z ∈ S such that kerλa = kerλz and zS satisfiesCondition (P ), and so the result follows.

(6) ⇒ (4). Let AS be a generator and let (l, a) ∈ S × A, for a ∈ AS andl ∈ S. Let A′ = aS ∪ a′S be as in the proof of (3)⇒ (1), then A′ is a generatorand so S × A′ is strongly (P )-cyclic by assumption. Thus there exists z ∈ Ssuch that kerλ(l,a) = kerλz and zS satisfies Condition (P ), and so the resultfollows.

(9)⇒ (10). Let AS be a right S-act such that Hom(AS , SS) = ∅. Let a ∈ ASand let f : AS −→ SS be an S-homomorphism. Consider (f(a), a) ∈ S × aS.Since S × aS is strongly (P )-cyclic by assumption, there exists z ∈ S such thatzS satisfy Condition (P ) and kerλ(f(a),a) = kerλz. So we have:

kerλz = kerλ(f(a),a) = kerλf(a) ∩ kerλa ⊆ kerλa.

Hence kerλz ⊆ kerλa. Now we show that kerλa ⊆ kerλz. Let (l1, l2) ∈ kerλafor l1, l2 ∈ S, then (l1, l2) ∈ kerλf(a). Thus (l1, l2) ∈ kerλa ∩ kerλf(a) = kerλzand so kerλa ⊆ kerλz. Therefore, kerλa = kerλz and zS satisfy Condition (P ),as required.

(12) ⇒ (13). Let ρ be a right subannihilator congruence. Thus there existss ∈ S such that ρ ≤ kerλs. Define f : S/ρ −→ S by f([t]ρ) = st. Clearly f is

Page 276: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

262 MORTEZA JAFARI, AKBAR GOLCHIN and HOSSEIN MOHAMMADZADEH SAANY

an S-homomorphism. So Hom(S/ρ, S) = ∅. Thus S/ρ is strongly (P )-cyclic byassumption.

(13) ⇒ (1). Let AS be a generator and a ∈ AS . Thus, there exists anepimorphism π : AS −→ S. Let π(a) = t and let (l1, l2) ∈ kerλa, for l1, l2 ∈ S.Then (l1, l2) ∈ kerλt. So kerλa ≤ kerλt. Thus kerλa is a right subannihilatorcongruence and so aS ∼= S/kerλa is strongly (P )-cyclic by assumption. Thusthere exists z ∈ S such that kerλa = kerλz and zS satisfies Condition (P ), andso the result follows.

Corollary 2.4. Let S be a monoid over which all generators right S-acts arestrongly (P )-cyclic. Then for any nonempty family Ai | i ∈ I of strongly(P )-cyclic right S-acts,

∏I Ai is strongly (P )-cyclic.

Proof. Since SS is a generator, it is strongly (P )-cyclic by assumption and soS is right PCP by [10, Theorem 2.2]. Thus by Theorem 2.3, (SS)I is strongly(P )-cyclic for any nonempty set I and so the result follows by [16, Corollary5.5].

Definition 2.5 ([3]). Let S be a monoid. A right S-act AS is called (P )-regularif all cyclic subacts of AS satisfy Condition (P ).

It is obvious that every regular right act is (P )-regular, but not the converse.

Theorem 2.6 ([3], Theorem 2.2). Let S be a monoid and AS be a right S-act.Then AS is (P )-regular if and only if for every a ∈ A and x, y ∈ S, ax = ayimplies that there exist u, v ∈ S such that a = au = av and ux = vy.

Similar to Theorem 2.3 we have the following result for (P )-regularity.

Theorem 2.7. For any monoid S the following statements are equivalent:

1. all generators right S-acts are (P )-regular;

2. all finitely generated generators right S-acts are (P )-regular;

3. all generators right S-acts generated by at most two elements are (P )-regular;

4. S ×AS is (P )-regular for every generator right S-act AS;

5. S×AS is (P )-regular for every finitely generated generator right S-act AS;

6. S × AS is (P )-regular for every generator right S-act AS generated by atmost two elements;

7. S ×AS is (P )-regular for every right S-act AS;

8. S ×AS is (P )-regular for every finitely generated right S-act AS;

9. S ×AS, is (P )-regular for every cyclic right S-act AS;

Page 277: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON CHARACTERIZATION OF MONOIDS BY PROPERTIES OF GENERATORS II 263

10. a right S-act AS is (P )-regular if Hom(AS , SS) = ∅;

11. a finitely generated right S-act AS is (P )-regular if Hom(AS , SS) = ∅;

12. a cyclic right S-act AS is (P )-regular if Hom(AS , SS) = ∅;

13. for every right subannihilator congruence ρ, S/ρ is (P )-regular.

Proof. Implications (1)⇔ (4)⇔ (7)⇔ (10) are clear from Theorem 1.1.Implications (1) ⇒ (2) ⇒ (3), (4) ⇒ (5) ⇒ (6), (7) ⇒ (8) ⇒ (9) and

(10)⇒ (11)⇒ (12) are obvious.(3) ⇒ (1). Let AS be a generator and π : AS −→ SS be an epimorphism.

Let a ∈ AS . Since π is an epimorphism, there exists a′∈ AS such that π(a′) = 1.If A′ = aS ∪ a′S then A′ is a generator and so it is (P )-regular by assumption.Thus aS satisfies Condition (P ) and the result follows.

(6) ⇒ (4). Let AS be a generator and let (l, a) ∈ S × A, for a ∈ AS andl ∈ S. Let A′ = aS ∪ a′S be as in the proof of (3)⇒ (1), then A′ is a generatorand so S×A′ is (P )-regular by assumption. Thus (l, a)S satisfies Condition (P )and the result follows.

(9)⇒ (10). Let AS be a right S-act such that Hom(AS , SS) = ∅. Let a ∈ ASand let f : AS −→ SS be an S-homomorphism such that ax = ay, for x, y ∈ S.Thus (f(a), a)x = (f(a), a)y. Since S × aS is (P )-regular, the last equalityimplies that there exist u, v ∈ S such that (f(a), a) = (f(a), a)u = (f(a), a)vand ux = vy. Thus a = au = av and ux = vy, and so AS is (P )-regular byTheorem 2.6.

(12)⇒ (13). Let ρ be a right subannihilator congruence. ThusHom(S/ρ, S) =∅ and so S/ρ is (P )-regular by assumption.

(13) ⇒ (1). Let AS be a generator and let a ∈ AS . Similar to (13) ⇒ (1)in Theorem 2.3, aS ∼= S/kerλa is (P )-regular and so aS satisfy Condition (P ),thus the result follows.

3. Monoids over which all generators satisfy Condition (EP ), (E′P ),(E′), (PE), (PWPE), (PWP ), (P ), (WP ), WPF , WKF , PWKF , TKFor (P ′)

In this section by using Theorem 1.1, we give a characterization of monoids overwhich all generators satisfy each of the above conditions.

Lemma 3.1 ([12], Lemma 3.3). Suppose for every x, y ∈ S,( l(x, y) = ∅ ∨l(x, y) = S ∨ xS ∪ yS = S). If x, x′ ∈ S such that xx′ = 1, then xx′ = 1 = x′x.

Now we investigate monoids over which all generators satisfy Condition(EP ).

Theorem 3.2. For any monoid S the following statements are equivalent:

1. all generators right S-acts satisfy Condition (EP );

Page 278: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

264 MORTEZA JAFARI, AKBAR GOLCHIN and HOSSEIN MOHAMMADZADEH SAANY

2. all finitely generated generators right S-acts satisfy Condition (EP );

3. all generators right S-acts generated by at most two elements satisfy Con-dition (EP );

4. S ×AS satisfies Condition (EP ) for every generator right S-act AS;

5. S×AS satisfies Condition (EP ) for every finitely generated generator rightS-act AS;

6. S × AS satisfies Condition (EP ) for every generator right S-act AS gen-erated by at most two elements

7. S ×AS satisfies Condition (EP ) for every right S-act AS;

8. S × AS satisfies Condition (EP ) for every finitely generated right S-actAS;

9. S ×AS satisfies Condition (EP ) for every cyclic right S-act AS;

10. S ×AS satisfies Condition (EP ) for every monocyclic right S-act AS;

11. a right S-act AS satisfies Condition (EP ) if Hom(AS , SS) = ∅;

12. a finitely generated right S-act AS satisfies Condition (EP ) ifHom(AS , SS) = ∅;

13. a cyclic right S-act AS satisfies Condition (EP ) if Hom(AS , SS) = ∅;

14. a monocyclic right S-act AS satisfies Condition (EP ) if Hom(AS , SS) =∅;

15. (∀x, y ∈ S) (l(x, y) = ∅ ∨ l(x, y) = S ∨ xS ∪ yS = S);

16. for every right subannihilator congruence ρ, S/ρ satisfies Condition (EP );

17. (∀x, y ∈ S)( l(x, y) = ∅ ∨ S/ρ(x, y) satisfies Condition (EP ));

18. (∀x, y ∈ S)( l(x, y) = ∅ ∨ (∃u, v ∈ S, ux = vy ∧ 1 ρ(x, y) u ρ(x, y) v)).

19. (∀x, y, t ∈ S)( l(tx, ty) = ∅ ∨ S/ρ(tx, ty) satisfies Condition (EP ));

20. (∀x, y, t ∈ S)( l(tx, ty) = ∅ ∨ (∃u, v ∈ S, t ρ(tx, ty) u ρ(tx, ty) v ∧ ux =vy)).

Proof. Implications (1)⇔ (4)⇔ (7)⇔ (11) are clear from Theorem 1.1.Implications (1) ⇒ (2) ⇒ (3), (4) ⇒ (5) ⇒ (6), (7) ⇒ (8) ⇒ (9) ⇒ (10),

(11)⇒ (12)⇒ (13)⇒ (14) and (17)⇒ (19) are obvious.(3) ⇒ (1). Let AS be a generator and π : AS −→ SS be an epimorphism.

Let as = at, for a ∈ AS and s, t ∈ S. Since π is an epimorphism, there existsa′ ∈ AS such that π(a′) = 1. If A′ = aS ∪ a′S, then A′ is a generator and

Page 279: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON CHARACTERIZATION OF MONOIDS BY PROPERTIES OF GENERATORS II 265

so it satisfies Condition (EP ) by assumption. Thus as = at in A′ implies theexistence of a′′ ∈ A′ ⊆ A and u, v ∈ S such that a = a′′u = a′′v and us = vt.That is, AS satisfies Condition (EP ), as required.

(6) ⇒ (4). Let AS be a generator and let (l, a)s = (l, a)t, for a ∈ AS andl, s, t ∈ S. If A′ = aS ∪ a′S, then A′ is a generator and so S × A′ satisfiesCondition (EP ) by assumption. Thus there exist (l′, a′′) ∈ S ×A′ ⊆ S ×A andu, v ∈ S such that (l, a) = (l′, a′′)u = (l′, a′′)v and us = vt. Thus S ×A satisfiesCondition (EP ).

(11)⇒ (16). Let ρ be a right subannihilator congruence. ThusHom(S/ρ, S) =∅, and so S/ρ satisfies Condition (EP ) by assumption.

(16)⇒ (17). Let x, y ∈ S and suppose l(x, y) = ∅. Then there exists s ∈ Ssuch that sx = sy, and so (x, y) ∈ kerλs, that is, ρ(x, y) ≤ kerλs. Thus ρ(x, y)is a right subannihilator congruence and so S/ρ(x, y) satisfies Condition (EP )as required.

(17) ⇒ (18). Let x, y ∈ S such that l(x, y) = ∅. Then S/ρ(x, y) satisfiesCondition (EP ) and so [1]ρx = [1]ρy implies that there exist α, u1, u2 ∈ S, suchthat [1]ρ = [α]ρu1 = [α]ρu2 and u1x = u2y. If αu1 = u and αu2 = v, then[1]ρ = [u]ρ = [v]ρ and ux = vy. Hence 1 ρ(x, y) u ρ(x, y) v and ux = vy.

(18) ⇒ (20). Let x, y ∈ S such that l(tx, ty) = ∅. By assumption thereexist u1, u2 ∈ S such that u1tx = u2ty, 1 ρ(tx, ty) u1 ρ(tx, ty) u2. Therefore,t ρ(tx, ty) u1t ρ(tx, ty) u2t and u1tx = u2ty. If u1t = u and u2t = v, thent ρ(tx, ty) u ρ(tx, ty) v and ux = vy as required.

(19) ⇒ (20). Let x, y, t ∈ S such that l(tx, ty) = ∅, and let ρ(tx, ty) = ρ.Since [t]ρx = [t]ρy and S/ρ satisfy Condition (EP ), there exist α, u1, u2 ∈ S,such that [t]ρ = [α]ρu1 = [α]ρu2 and u1x = u2y. If αu1 = u and αu2 = v, thent ρ u ρ v and ux = vy.

(20) ⇒ (15). Let x, y ∈ S such that l(x, y) = ∅ and suppose l(x, y) = S.Since l(x, y) = S, thus x = y. Let KS = xS ∪ yS. Clearly, KS is a rightideal and |KS | ≥ 2. Since ρKS = (KS ×KS) ∪ 1S , we have (x, y) ∈ ρKS and soρ(x, y) ≤ ρKS . By assumption there exists u, v ∈ S such that 1 ρ(x, y) u ρ(x, y) vand ux = vy. Now ρ(x, y) ≤ ρKS implies that, 1 ρKS u ρKSv and ux = vy. IfKS = S then 1 ρKS u ρKS v implies that u = v = 1 and so x = y, a contradiction.Hence KS = xS ∪ yS = S.

(14)⇒ (17). Let x, y ∈ S such that l(x, y) = ∅. Then there exists z ∈ S suchthat zx = zy and so ρ(x, y) ≤ kerλz. Define the mapping f : S/ρ(x, y) −→ SSby f([t]ρ(x,y)) = zt, for t ∈ S. Clearly f is a well defined S-homomorphism.Therefore, Hom(S/ρ(x, y), SS) = ∅ and so by assumption S/ρ(x, y) satisfiesCondition (EP ), as required.

(14) ⇒ (15). Let x, y ∈ S such that l(x, y) = ∅ and l(x, y) = S. Thusx = y and there exists z ∈ S such that zx = zy, which implies (x, y) ∈ kerλzand so ρ(x, y) ≤ kerλz. Let ρ = ρ(x, y). Thus similarly as (14) ⇒ (17),Hom(S/ρ, SS) = ∅ and so by assumption S/ρ satisfies Condition (EP ). Sincex ρ y and S/ρ satisfies Condition (EP ), [1]ρx = [1]ρy implies that there existw, u, v ∈ S such that [1]ρ = [w]ρu = [w]ρv and ux = vy. If 1 = wu = wv then

Page 280: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

266 MORTEZA JAFARI, AKBAR GOLCHIN and HOSSEIN MOHAMMADZADEH SAANY

x = y, which is a contradiction. Thus without loss of generality we suppose1 = wu. Using [13, Lemma I, 4.37], we get the following sequence of equalities:

1 = p1w1 q2w2 = p3w3 · · · qnwn = wuq1w1 = p2w2 · · ·

where pi, qi ∈ x, y, wi ∈ S for each 1 ≤ i ≤ n. Thus 1 = p1w1 implies thatxS ∪ yS = S.

(15)⇒ (1). Let AS be a generator and let π : AS −→ SS be an epimorphism.Suppose as = as′, for a ∈ AS and s, s′ ∈ S. Thus π(a)s = π(a)s′ implies thatl(s, s′) = ∅ and so l(s, s′) = S or sS ∪ s′S = S by assumption. If l(s, s′) = Sthen s = s′ and so the result follows. Otherwise, sS ∪ s′S = S. Without loss ofgenerality we suppose 1 ∈ sS, thus there exists x ∈ S such that sx = 1. Thenxs = 1 by Lemma 3.1 and so xss′ = s′1 = s′xs. Let xs = u and s′x = v. Thusa = au = av and us′ = vs, as required.

(10) ⇒ (17). Let x, y ∈ S such that l(x, y) = ∅. Then there exists z ∈ Ssuch that zx = zy and so ρ(x, y) ≤ kerλz. Suppose ρ(x, y) = ρ and let l1 ρ l2for l1, l2 ∈ S. Then zl1 = zl2. Thus (z, [1]ρ)l1 = (z, [1]ρ)l2 in S × S/ρ. Thelast equality implies that there exist (w, [a]ρ) ∈ S × S/ρ and u, v ∈ S such that(z, [1]ρ) = (w, [a]ρ)u = (w, [a]ρ)v, ul1 = vl2. If au = u′ and av = v′. ThusS/ρ(x, y) satisfies Condition (EP ) by [7, Theorem 3.2].

Since (E) =⇒ (EP ), the following can be concluded immediately.

Corollary 3.3 ([19], Corollary 2.6). Let S be a monoid over which all generatorssatisfy Condition (E). Then for each pair (x, y) ∈ S×S, l(x, y) = ∅ or l(x, y) =S or xS ∪ yS = S.

Now using an argument similar to that of the proof of Theorem 3.2, we havethe following.

Theorem 3.4. For any monoid S the following statements are equivalent:

1. all generators right S-acts satisfy Condition (E′P );

2. all finitely generated generators right S-acts satisfy Condition (E′P );

3. all generators right S-acts generated by at most two elements satisfy Con-dition (E′P );

4. S ×AS satisfies Condition (E′P ) for every generator right S-act AS;

5. S × AS satisfies Condition (E′P ) for every finitely generated generatorright S-act AS;

6. S ×AS satisfies Condition (E′P ) for every generator right S-act AS gen-erated by at most two elements

7. S ×AS satisfies Condition (E′P ) for every right S-act AS;

Page 281: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON CHARACTERIZATION OF MONOIDS BY PROPERTIES OF GENERATORS II 267

8. S × AS satisfies Condition (E′P ) for every finitely generated right S-actAS;

9. S ×AS satisfies Condition (E′P ) for every cyclic right S-act AS;

10. S ×AS satisfies Condition (E′P ) for every monocyclic right S-act AS;

11. a right S-act AS satisfies Condition (E′P ) if Hom(AS , SS) = ∅;

12. a finitely generated right S-act AS satisfies Condition (E′P ) ifHom(AS , SS) = ∅;

13. a cyclic right S-act AS satisfies Condition (E′P ) if Hom(AS , SS) = ∅;

14. a monocyclic right S-act AS satisfies Condition (E′P ) if Hom(AS , SS) =∅;

15. (∀x, y ∈ S) (l(x, y) = ∅ ∨ r(x, y) = ∅ ∨ l(x, y) = r(x, y) = S ∨ xS∪yS =S);

16. for every right subannihilator congruence ρ, S/ρ satisfies Condition (E′P );

17. (∀x, y ∈ S)( l(x, y) = ∅ ∨ S/ρ(x, y) satisfies Condition (E′P ));

18. (∀x, y ∈ S)( l(x, y) = ∅ ∨ r(x, y) = ∅ ∨ (∃u, v ∈ S, ux = vy ∧ 1 ρ(x, y) uρ(x, y) v));

19. (∀x, y, t ∈ S)( l(tx, ty) = ∅ ∨ S/ρ(tx, ty) satisfies Condition (E′P ));

20. (∀x, y, t ∈ S)( l(tx, ty) = ∅ ∨ r(tx, ty) = ∅ ∨ (∃u, v ∈ S, t ρ(tx, ty) uρ(tx, ty) v ∧ ux = vy)).

Corollary 3.5 ([8], Corollary 2.12). If S is a right collapsible monoid, then forcyclic acts Conditions (P ) and (E′P ) coincide.

Theorem 3.6. If S is a collapsible monoid, then the following statements areequivalent:

1. all generators right S-acts satisfy Condition (E′P );

2. all right S-acts satisfy Condition (E′P );

3. all finitely generated right S-acts satisfy Condition (E′P );

4. all cyclic right S-acts satisfy Condition (E′P );

5. S = 1 or S = 1, 0.

Page 282: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

268 MORTEZA JAFARI, AKBAR GOLCHIN and HOSSEIN MOHAMMADZADEH SAANY

Proof. Implications (2)⇒ (3)⇒ (4), (2)⇒ (1) and (5)⇒ (2) are obvious.(1)⇒ (2). Let AS be a right S-act and as = at, sz = tz, for a ∈ AS , s, t, z ∈

S. By Theorem 3.4, S×AS satisfies Condition (E′P ). Since S is left collapsible,there exists u ∈ S such that us = ut. Thus (u, a)s = (u, a)t, sz = tz implies thatthere exist (w, a′) ∈ S×AS , u, v ∈ S such that (u, a) = (w, a′)u = (w, a′)v, us =vt. Hence a = a′u = a′v, us = vt and so AS satisfies Condition (E′P ).

(4) ⇒ (5). By Corollary 3.5, all cyclic right S-acts satisfy Condition (P )and so by [13, IV, 9.9] S is a group or a group with a zero adjoined. Since S isright collapsible, S = 1 or S = 1, 0.

Now for a monoid S we answer the question of when all generators rightS-acts satisfy Condition (E′). Recall from [15] that AS satisfies Condition (E′),if for all a ∈ AS , s, s′, z ∈ S

as = as′, sz = s′z ⇒ (∃a′ ∈ AS)(∃u ∈ S)(a = a′u and us = us′).

Theorem 3.7. For any monoid S the following statements are equivalent:

1. all generators right S-acts satisfy Condition (E′);

2. all finitely generated generators right S-acts satisfy Condition (E′);

3. all generators right S-acts generated by at most two elements satisfy Con-dition (E′);

4. S ×AS satisfies Condition (E′) for every generator right S-act AS;

5. S×AS satisfies Condition (E′) for every finitely generated generator rightS-act AS;

6. S ×AS satisfies Condition (E′) for every generator right S-act AS gener-ated by at most two elements;

7. S ×AS satisfies Condition (E′) for every right S-act AS;

8. S×AS satisfies Condition (E′) for every finitely generated right S-act AS;

9. S ×AS satisfies Condition (E′) for every cyclic right S-act AS;

10. S ×AS satisfies Condition (E′) for every monocyclic right S-act AS;

11. a right S-act AS satisfies Condition (E′) if Hom(AS , SS) = ∅;

12. a finitely generated right S-act AS satisfies Condition (E′) ifHom(AS , SS) = ∅;

13. a cyclic right S-act AS satisfies Condition (E′) if Hom(AS , SS) = ∅;

14. a monocyclic right S-act AS satisfies Condition (E′) if Hom(AS , SS) = ∅;

15. (∀x, y ∈ S)( l(x, y) = ∅ ∨ r(x, y) = ∅ ∨ (∃e ∈ E(S), ρ(x, y) = kerλe));

Page 283: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON CHARACTERIZATION OF MONOIDS BY PROPERTIES OF GENERATORS II 269

16. for every right subannihilator congruence ρ, S/ρ satisfies Condition (E′);

17. (∀x, y ∈ S)( l(x, y) = ∅ ∨ S/ρ(x, y) satisfies Condition (E′));

18. (∀x, y ∈ S)( l(x, y) = ∅ ∨ r(x, y) = ∅ ∨ (∃u ∈ S, ux = uy ∧ 1 ρ(x, y) u));

19. (∀x, y, t ∈ S)( l(tx, ty) = ∅ ∨ S/ρ(tx, ty) satisfies Condition (E′));

20. (∀x, y, t ∈ S)( l(tx, ty) = ∅∨ r(tx, ty) = ∅∨ (∃u ∈ S, t ρ(tx, ty) u ∧ ux =uy));

21. (∀x, y ∈ S)( l(x, y) = ∅∨ r(x, y) = ∅∨(∃e ∈ E(S), ex = ey ∧1 ρ(x, y) e));

Proof. Implications (1)⇔ (4)⇔ (7)⇔ (11) are clear from Theorem 1.1.Implications (1) ⇒ (2) ⇒ (3), (4) ⇒ (5) ⇒ (6), (7) ⇒ (8) ⇒ (9) ⇒ (10),

(11)⇒ (12)⇒ (13)⇒ (14) and (17)⇒ (19) are obvious.(20) ⇒ (21). Let x, y ∈ S such that l(x, y) = ∅ and r(x, y) = ∅. If t = 1,

then there exists u ∈ S such that ux = uy and 1 ρ(x, y) u. If ρ = ρ(x, y), then(x, y) ∈ kerλu implies that ρ ⊆ kerλu. Since 1 ρ u we have (1, u) ∈ kerλu, thatis, u = u2 and so u is an idempotent. If u = e, then we are done.

(21)⇒ (15). Let x, y ∈ S such that l(x, y) = ∅ and r(x, y) = ∅. If ρ = ρ(x, y),then by assumption there exists e ∈ E(S) such that ex = ey and 1 ρ e. Thusex = ey implies ρ ⊆ kerλe. Let l1, l2 ∈ S, such that (l1, l2) ∈ kerλe. Thenel1 = el2, and that 1 ρ e we have l1 ρ el1, l2 ρ el2 and so l1 ρ l2. Thus,kerλe ⊆ ρ, and so kerλe = ρ as required.

(15)⇒ (1). Let AS be a generator and let π : AS −→ SS be an epimorphism.Let a ∈ AS , x, y, z ∈ S and suppose ax = ay and xz = yz. Then π(a)x = π(a)yand so l(x, y) = ∅. Also xz = yz implies that r(x, y) = ∅. Thus by assumptionthere exists e ∈ E(S) such that ρ(x, y) = kerλe. On the other hand ax = ayimplies that (x, y) ∈ kerλa and so kerλe = ρ(x, y) ⊆ kerλa. Since (1, e) ∈kerλe ⊆ kerλa so a = ae. Also (x, y) ∈ ρ(x, y) = kerλe implies that ex = ey,and so AS satisfies Condition (E′) as required.

(3) ⇒ (1). Let AS be a generator and π : AS −→ SS be an epimorphism.Suppose as = at, sz = tz, for a ∈ AS and s, t, z ∈ S. Since π is an epimorphism,there exists a′ ∈ AS such that π(a′) = 1. If A′ = aS∪a′S, then A′ is a generatorand so by assumption satisfies Condition (E′). Thus as = at, sz = tz impliesthe existence of a′′ ∈ A′ ⊆ A and u ∈ S such that a = a′′u and us = ut. Thatis AS satisfies Condition (E′), as required.

(6)⇒ (4). Let AS be a generator and let (l, a)s = (l, a)t, sz = tz, for a ∈ ASand l, s, t, z ∈ S. If A′ = aS ∪ a′S is as in the proof of (3) ⇒ (1), then A′ isa generator and so S × A′ satisfies Condition (E′) by assumption. Thus thereexist (l′, a′′) ∈ S×A′ ⊆ S×A and u ∈ S such that (l, a) = (l′, a′′)u and us = ut.Therefore S ×A satisfies Condition (E′).

(17) ⇒ (18). Let x, y ∈ S such that l(x, y) = ∅ and r(x, y) = ∅. Sincer(x, y) = ∅, there exists z ∈ S such that xz = yz. Then S/ρ(x, y) satisfiesCondition (E′) and so [1]ρx = [1]ρy, xz = yz implies that there exist α, u1 ∈ S

Page 284: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

270 MORTEZA JAFARI, AKBAR GOLCHIN and HOSSEIN MOHAMMADZADEH SAANY

such that [1]ρ = [α]ρu1 and u1x = u1y. If αu1 = u, then [1]ρ = [u]ρ and ux = uy.Hence 1 ρ(x, y) u and ux = uy.

(18) ⇒ (20). Let x, y, t ∈ S such that l(tx, ty) = ∅ and r(tx, ty) = ∅. Thenby assumption there exists u1 ∈ S such that u1tx = u1ty and 1 ρ(tx, ty) u1.Thus t ρ(tx, ty) u1t and u1tx = u1ty. If u1t = u, then t ρ(tx, ty) u and ux = uyas required.

(19) ⇒ (20). Let x, y, t ∈ S such that l(tx, ty) = ∅ and r(tx, ty) = ∅. Sincer(tx, ty) = ∅, there exists z ∈ S such that txz = tyz. Suppose ρ(tx, ty) = ρ.Since [1]ρtx = [1]ρty, txz = tyz, there exist α, u ∈ S, such that [1]ρ = [α]ρu1 andu1tx = u1ty. If αu1t = u then t ρ(tx, ty) u and ux = uy and so we are done.

(14) ⇒ (17). Let x, y ∈ S such that l(x, y) = ∅. Then there exists z ∈ Ssuch that zx = zy and so ρ(x, y) ≤ kerλz. Therefore, Hom(S/ρ(x, y), SS) = ∅and so by assumption S/ρ(x, y) satisfies Condition (E′), as required.

(10)⇒ (17). Let x, y ∈ S such that l(x, y) = ∅. Then there exists l ∈ S suchthat lx = ly and so ρ(x, y) ≤ kerλl. Suppose ρ(x, y) = ρ and let l1, l2, z ∈ Ssuch that l1ρ l2 and l1z = l2z, then ll1 = ll2. Thus (l, [1]ρ)l1 = (l, [1]ρ)l2 inS×S/ρ and l1z = l2z. By assumption there exist (w, [a]ρ) ∈ S×S/ρ and v ∈ Ssuch that (l, [1]ρ) = (w, [a]ρ)v and vl1 = vl2. If av = u, then 1ρ(x, y)u andul1 = ul2. Thus S/ρ(x, y) satisfies Condition (E′) by [17, Lemma 2.2].

Recall from [1] and [4] that an act AS satisfies Condition (PWP ), if forall a, a′ ∈ AS , s ∈ S, as = a′s ⇒ (∃a′′ ∈ AS)(∃u, v ∈ S)(a = a′′u, a′ = a′′vand us = vs). Also we say that AS satisfies Condition (PWPE), if for alla, a′ ∈ AS , s ∈ S, as = a′s ⇒ (∃a′′ ∈ AS)(∃u, v ∈ S)(∃e, f ∈ E(S))(ae =a′′ue, a′f = a′′vf, es = s = fs and us = vs).

Theorem 3.8. For any monoid S the following statements are equivalent:

1. all generators right S-acts satisfy Condition (PWP );

2. all finitely generated generators right S-acts satisfy Condition (PWP );

3. all generators right S-acts generated by at most three elements satisfy Con-dition (PWP );

4. S ×AS satisfies Condition (PWP ) for every generator right S-act AS;

5. S × AS satisfies Condition (PWP ) for every finitely generated generatorright S-act AS;

6. S × AS satisfies Condition (PWP ) for every generator right S-act ASgenerated by at most three elements;

7. S ×AS satisfies Condition (PWP ) for every right S-act AS;

8. S×AS satisfies Condition (PWP ) for every finitely generated right S-actAS;

Page 285: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON CHARACTERIZATION OF MONOIDS BY PROPERTIES OF GENERATORS II 271

9. S ×AS satisfies Condition (PWP ) for every right S-act AS generated byat most two elements;

10. a right S-act AS satisfies Condition (PWP ) if Hom(AS , SS) = ∅;

11. a finitely generated right S act AS satisfies Condition (PWP ) ifHom(AS , SS) = ∅;

12. a right S-act AS generated by at most two elements satisfies Condition(PWP ) if Hom(AS , SS) = ∅;

13. all right S-acts satisfy Condition (PWP ).

14. S is group.

Proof. Implications (1)⇔ (4)⇔ (7)⇔ (10) are clear from Theorem 1.1.

Implications (1) ⇒ (2) ⇒ (3), (4) ⇒ (5) ⇒ (6), (7) ⇒ (8) ⇒ (9) and(10)⇒ (11)⇒ (12) are obvious.

Implications (13)⇒ (14) and (14)⇒ (1) follows from [1, Proposition 9].

(9) ⇒ (7). Let AS be a right S-act and (s, x)c = (t, y)c, for s, t, c ∈ Sand x, y ∈ AS . If A′ = xS ∪ yS, then S × A′ satisfies Condition (PWP ) byassumption. Thus there exist, (w, z) ∈ S × A′ ⊆ S × A for w ∈ S, z ∈ A′ andu, v ∈ S such that (s, x) = (w, z)u, (t, y) = (w, z)v and us = vs. That is, S×ASsatisfies Condition (PWP ) as required.

(12) ⇒ (10). Let AS be a right S-act such that Hom(AS , SS) = ∅ andsuppose as = a′s, for a, a′ ∈ AS and s ∈ S. Since Hom(AS , SS) = ∅, thereexists homomorphism f : AS −→ SS . If A′ = aS∪a′S and f ′ = f |A′ , the resultfollows by assumption.

(3) ⇒ (1). Let AS be a generator. Then there exists an epimorphismπ : AS −→ SS . Suppose now that as = a′s, for a, a′ ∈ AS and s ∈ S. Since π isan epimorphism, there exists c ∈ AS such that π(c) = 1. Let A′ = aS ∪a′S ∪ cSand so π |A′ : A′ −→ S is an epimorphism. Thus A′ is a generator and so A′

satisfies Condition (PWP ) by assumption. Hence as = a′s implies that thereexist a′′ ∈ A′ ⊆ A, u, v ∈ S such that a = a′′u, a′ = a′′v and us = vs, thus theresult follows.

(6) ⇒ (1). Let AS be a generator and let as = a′s, for a, a′ ∈ AS ands ∈ S. If A′ = aS ∪ a′S ∪ cS is as in the proof of (3) ⇒ (1), then (1, a)s =(1, a′)s. Clearly, A′ is a generator and so S ×A′ satisfies Condition (PWP ) byassumption. Thus (1, a)s = (1, a′)s implies that there exist (w, z) ∈ S×A′ ⊆ S×AS , w ∈ S, a ∈ A′ ⊆ A and u, v ∈ S such that (1, a) = (w, z)u, (1, a′) = (w, z)vand us = vs. Thus a = zu, a′ = zv and us = vs and so the result follows.

(7) ⇒ (13). Let AS be a right S-act and as = a′s, for a, a′ ∈ AS , s ∈ S.Thus (1, a)s = (1, a′)s. Since S × A satisfies Condition (PWP ), there exist(w, a′′) ∈ S × AS , u, v ∈ S such that (1, a) = (w, a′′)u, (1, a′) = (w, a′′)v andus = vs. Thus a = a′′u, a′ = a′′v and us = vs, as required.

Page 286: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

272 MORTEZA JAFARI, AKBAR GOLCHIN and HOSSEIN MOHAMMADZADEH SAANY

From Theorems 3.2, 3.4, 3.7, 3.8 and [16, Theorems 3.21, 3.22, 3.23], and[16, Proposition 3.16], we have the following corollary.

Corollary 3.9. Let S be a monoid over which all generators satisfy Condi-tion (EP )(Condition (E′P ), Condition (E′), Condition (PWP )). Then for anynonempty family Ai | i ∈ I of right S-acts satisfying Condition (EP )(Condition(E′P ), Condition (E′), Condition (PWP )),

∏I Ai satisfies Condition (EP )

(Condition (E′P ), Condition (E′), Condition (PWP )).

By a similar argument as in the proof of Theorem 3.8 and using [4, Theorem3.1] we can show the following theorem.

Theorem 3.10. For any monoid S the following statements are equivalent:

1. all generators right S-acts satisfy Condition (PWPE);

2. all finitely generated generators right S-acts satisfy Condition (PWPE);

3. all generators right S-acts generated by at most three elements satisfy Con-dition (PWPE);

4. S ×AS satisfies Condition (PWPE) for every generator right S-act AS;

5. S×AS satisfies Condition (PWPE) for every finitely generated generatorright S-act AS;

6. S × AS satisfies Condition (PWPE) for every generator right S-act ASgenerated by at most three elements;

7. S ×AS satisfies Condition (PWPE) for every right S-act AS;

8. S×AS satisfies Condition (PWPE) for every finitely generated right S-actAS;

9. S×AS satisfies Condition (PWPE) for every right S-act AS generated byat most two elements;

10. a right S-act AS satisfies Condition (PWPE) if Hom(AS , SS) = ∅;

11. a finitely generated right S act AS satisfies Condition (PWPE) ifHom(AS , SS) = ∅;

12. a right S act AS generated by at most two elements satisfies Condition(PWPE) if Hom(AS , SS) = ∅;

13. all right S-acts satisfy Condition (PWPE);

14. S is regular.

Page 287: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON CHARACTERIZATION OF MONOIDS BY PROPERTIES OF GENERATORS II 273

We recall from [5] and [13] that a right S−act AS satisfies Condition (PE), iffor all a, a′ ∈ A, s, s′ ∈ S, as = a′s′ ⇒ (∃a′′ ∈ A)(∃u, u′ ∈ S)(∃e, f ∈ E(S))(ae =a′′ue, a′f = a′′u′f, es = s, fs′ = s′ and us = u′s′) also S is called right reversible,if for any s, t ∈ S, there exist u, v ∈ S such that us = vt.

We recall from [19], a right S-act AS is called almost weakly flat if AS isprincipally weakly flat and satisfies Condition

(W ′) If as = a′t, and Ss ∩ St = ∅, for a, a′ ∈ AS , s, t ∈ S, then there existsa′′ ∈ AS , u ∈ Ss ∩ St such that as = a′t = a′′u. It is proved in [19, Theorem3.4] that all generators are weakly flat if and only if all right S-acts are almostweakly flat.

Theorem 3.11. For any monoid S the following statements are equivalent:

1. all generators right S-acts satisfy Condition (PE);

2. all finitely generated generators right S-acts satisfy Condition (PE);

3. all generators right S-acts generated by at most three elements satisfy Con-dition (PE);

4. S ×AS satisfies Condition (PE) for every generator right S-act AS;

5. S×AS satisfies Condition (PE) for every finitely generated generator rightS-act AS;

6. S × AS satisfies Condition (PE) for every generator right S-act AS gen-erated by at most three elements;

7. S ×AS satisfies Condition (PE) for every right S-act AS;

8. S × AS satisfies Condition (PE) for every finitely generated right S-actAS;

9. S × AS satisfies Condition (PE) for every right S-act AS generated by atmost two elements;

10. a right S-act AS satisfies Condition (PE) if Hom(AS , SS) = ∅;

11. a finitely generated right S act AS satisfies Condition (PE) ifHom(AS , SS) = ∅;

12. a right S act AS generated by at most two elements satisfies Condition(PE) if Hom(AS , SS) = ∅;

13. all right S-acts are almost weakly flat.

14. S is regular and for every s, t ∈ S with Ss∩St = ∅, there exists w ∈ Ss∩Stsuch that 1 (kerλs ∨ kerλt) w.

Page 288: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

274 MORTEZA JAFARI, AKBAR GOLCHIN and HOSSEIN MOHAMMADZADEH SAANY

Proof. Implications (1)⇔ (4)⇔ (7)⇔ (10) are clear from Theorem 1.1.

Implications (1) ⇒ (2) ⇒ (3), (4) ⇒ (5) ⇒ (6), (7) ⇒ (8) ⇒ (9), (10) ⇒(11)⇒ (12) are obvious.

(1)⇒ (13). Since Condition (PE) implies weak flatness by [9, Theorem 2.3],the result follows by [19, Theorem 3.4].

(13)⇒ (14). It follows from [19, Theorems 3.4, 3.8].

(3)⇒ (1). It is similar to (3)⇒ (1) of Theorem 3.8.

(14) ⇒ (1). Since S is regular, it is left PP and so by [9, Theorem 2.5]Condition (PE) and weak flatness are the same and so the result follows by [19,Theorem 3.8] .

(9) ⇒ (7). Let AS be a right S-act and (w1, a)s = (w2, a′)t, for w1, w2 ∈

S, a, a′ ∈ A. If A′ = aS∪a′S, then S×A′ satisfies Condition (PE) by assumption.Hence there exists (w, a′′) ∈ S × A′ ⊆ S × AS and u, v ∈ S, e, f ∈ E(S), suchthat (w1, a)e = (w, a′′)ue, (w2, a

′)f = (w, a′′)vf, es = s, ft = t and us = vt, asrequired.

(12) ⇒ (10). Let AS be a right S-act such that Hom(AS , SS) = ∅ andas = a′t, for a, a′ ∈ AS , s, t ∈ S. Since Hom(AS , SS) = ∅, there exists an S-homomorphism f : AS −→ SS . Let A′ = aS∪a′S and f ′ = f |A′ . Thus as = a′tin A′ implies that there exists a′′ ∈ A′ ⊆ AS , u, v ∈ S, e, f ∈ E(S) such thatae = a′′ue, a′f = a′′vf, es = s, ft = t, us = vt, and so AS satisfies Condition(PE) as required.

(6) ⇒ (1). Let AS be a generator and let as = a′s′ for a, a′ ∈ AS , s, s′ ∈ S.If A′ = aS ∪ a′S ∪ cS is as in the proof of (3) ⇒ (1) of Theorem 3.8, then(π(a), a)s = (π(a′), a′)s′. Clearly, A′ is a generator and so S × A′ satisfiesCondition (PE) by assumption. Thus the last equality implies that there exist(w, a′′) ∈ S × A′ ⊆ S × A, u, v ∈ S and e, f ∈ E(S) such that (π(a), a)e =(w, a′′)ue, (π(a′), a′)f = (w, a′′)vf, es = s, fs′ = s′ and us = u′s′ and so theresult follows.

Corollary 3.12. Let S be a right reversible monoid. Then the following state-ments are equivalent:

1. all generators right S-acts satisfy Condition (PE);

2. all right S-acts satisfy Condition (PE);

3. S is regular and satisfies Condition (R).

(R) : (∀s, t ∈ S)(∃w ∈ Ss ∩ St), w ρ(s, t) s

Proof. (2)⇔ (3) By [5,Theorem 2.1].

(2)⇒ (1). It is obvious.

(1)⇒ (3). Since S is right reversible, weak flatness and almost weak flatnessare equivalent. By Theorem 3.11, all S-acts are weakly flat, and so the resultfollows from [13, IV,7.5].

Page 289: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON CHARACTERIZATION OF MONOIDS BY PROPERTIES OF GENERATORS II 275

From Theorems 3.10, 3.11 and [16, Theorems 3.18, 3.15] we have the follow-ing corollary.

Corollary 3.13. Let S be a commutative monoid over which all generators sat-isfy Condition (PWPE)((PE)). If A1, · · ·An, n ∈ N satisfy Condition (PWPE)((PE)) , then

∏ni=1Ai satisfies Condition (PWPE)((PE)).

Definition 3.14 ([20]). An act AS is called strongly torsion free (STF ) if forany a, b ∈ A and any s ∈ S the equality as = bs implies a = b.

It is obvious that STF ⇒ Condition(PWP )⇒ PWF ⇒ TF .

Corollary 3.15. Let S be a monoid and (U) be any of the conditions or prop-erties WPF,WKF,PWKF, TKF, (P ), (WP ), (P ′), STF of right S-acts, thenthe following statements are equivalent:

1. all generators right S-acts satisfy (U);

2. S ×AS satisfies (U) for every generator right S-act AS;

3. S ×AS satisfies (U) for every right S-act AS;

4. a right S-act AS satisfies (U) if Hom(AS , SS) = ∅;

5. all right S-acts satisfy (U).

6. S is group.

Proof. Implications (1) ⇔ (2) ⇔ (3) ⇔ (4) are clear from Theorem 1.1 and(5) ⇔ (6) follows from [1, Proposition 9], [2, Theorem 2.5] and [20, Theorem3.2].

(6)⇒ (1). It is obvious.(1)⇒ (6). Since (U) =⇒ (PWP ) the result follows from Theorem 3.8.

References

[1] S. Bulman-Fleming, M. Kilp, V. Laan, Pullbacks and flatness properties ofacts II, Comm. Algebra, 29 (2001), 851-878.

[2] A. Golchin, H. Mohammadzadeh, On Condition (P ′), Semigroup Forum.,86 (2012), 413-430.

[3] A. Golchin, H. Mohammadzadeh, P. Rezaei, On (P )-regularity of acts, Ad-vances in Pure Mathematics, 2 (2012), 104-108.

[4] A. Golchin, H. Mohammadzadeh, On Condition (PWPE), Southeast AsianBulletin of Mathematics, 33 (2009), 245-256.

[5] A. Golchin, H. Mohammadzadeh, On homological classification of monoidsby Condition (PE) of right S-acts, Italian Journal of Pure and AppliedMathematics, 25 (2009), 175-186.

Page 290: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

276 MORTEZA JAFARI, AKBAR GOLCHIN and HOSSEIN MOHAMMADZADEH SAANY

[6] A. Golchin, H. Mohammadzadeh, On homological classification of monoidsby Condition (E′) of right S-acts, Yokohama Mathematical, 54 (2007), 79-88.

[7] A. Golchin, H. Mohammadzadeh, On Condition (EP ), International Math-ematical Forum., 19 (2007), 911-918.

[8] A. Golchin, H. Mohammadzadeh, On Condition (E′P ), Journal of Sciences,Islamic Republic of Iran, 17 (2006), 343-349.

[9] A. Golchin, J. Renshaw, A flatness property of acts over monoids, Confer-ence on Semigroup, University of St. Andrews, July 1997, 1998, 72-77.

[10] A. Golchin, P. Rezaei, H. Mohammadzadeh, On strongly (P )-cyclic acts,Czechoslovak Mathematical Journal, 59 (2009), 595-611.

[11] J.M. Howie, Fundamentals of Semigroup Theory, London MathematicalSociety Monographs, London, Oxford University Press.

[12] M. Jafari, A. Golchin, H. Mohammadzadeh Saany, On charaterization ofmonoids by properties of generators, (submitted).

[13] M. Kilp, U. Knauer, A. Mikhalev, Monoids, Acts and Categories, Walterde Gruyter, Berlin, New York, 2000.

[14] M. Kilp, U. Knauer, Charaterization of monoids by properties of generators,Communication in Algebra, 20 (1992), 1841-1856.

[15] V. Laan, Pullbacks and flatness properties of acts, Ph.D Thesis, Universityof Tartu, Tartu, Estonia, 1999.

[16] L. Nouri, A. Golchin, H. Mohammadzadeh, On properties of product actsover monoids,Comm. Algebra., 43 (2015), 1854-1876.

[17] H. Qiao, Z. Liu, Monoids characterized by Condition (E′), Pure Mathemat-ics and Applications, 19( 2005), 165-171.

[18] H. Qiao, C. Wei, On a generalization of principal weak flatness property,Semigroup Forum., 85 (2012), 147-159.

[19] H. Sedaghatjoo, On monoids over which all generators satisfy a flatnessproperty, Semigroup Forum, 87 (2013), 653-662.

[20] A. Zare, A. Golchin, H. Mohammadzadeh, Strongly torsion free acts overmonoids, Asian-European Journal of Mathematics, 6 (2013), 1350049 (22pages).

Accepted: 23.07.2017

Page 291: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (277–285) 277

CERTAIN GENERATING FUNCTIONS OF GENERALIZEDHYPERGEOMETRIC 2D POLYNOMIALS FROMTRUESDELL’S METHOD

P.L. Rama Kameswari∗

Department of MathematicsK. L. UniversityGuntur Dt., A.P.IndiaandDepartment of MathematicsSwarnandhra College of Engineering and TechnologySeetharampuram, Narsapuram-534 280West Godawari Dt., [email protected]

V.S. BhagavanDepartment of Mathematics

K. L. University

Guntur Dt., A.P.

India

[email protected]

Abstract. In this paper, the generating functions for generalized Hypergeometric 2Dpolynomials Un (β, γ, x, y) are obtained by using the Truesdell’s method giving a suit-able interpretation to the index n. Further, a pair of linearly independent differentialrecurrence relations are used in order to derive generating functions for Un (β, γ, x, y).The principal interest in our results lies in the fact that, how the Truesdell’s methodis utilized in an effective and suitable way to generalized Hypergeometric 2D polyno-mials in order to derive two generating functions independently from ascending anddescending recurrence relations respectively.

Keywords: special functions, generalized hypergeometric 2D polynomials Un(β, γ, x, y)generating functions.

1. Introduction

Generating functions play a very important role in the investigation of variousproperties of the sequences, which they generate. They are used with good ef-fect for the determination of the asymptotic behaviour of the generated sequencefn as n −→∞[2].In recent years, the development of advanced computers hasmade it necessary to study the hypergeometric polynomials with series represen-

∗. Corresponding author

Page 292: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

278 P.L. RAMA KAMESWARI and V.S. BHAGAVAN

tations from the numerical point of view. Because of the important role whichhypergeometric polynomials play important role in problems of applied mathe-matics, the theory of generating functions has been developed various directionsand found wide applications in different branches of science and technology.

The aim of present paper is to derive the generating functions for the gener-alized hypergeometric 2D polynomials by using the Truesdell’s method , givingsuitable interpretation to the index n. It is worth recalling that this methodyields two generating functions for the generalized hypergeometric 2D polyno-mials, independently from ascending and descending recurrence relations, whereas the simultaneous use of these recurrence relations in other group theoreticmethods. The results obtained for generalized hypergeometric 2D polynomialsare new in the theory of special functions.

The generalized hypergeometric polynomials Un (β, γ, x, y) satisfy the fol-lowing descending and ascending recurrence relations, respectively:

(1.1) DUn (β, γ, x, y) = nUn−1 (β, γ, x, y) .

DUn(β, γ, x, y) =1

y(x− y)(γ + n)Un+1(β, γ, x, y)

+ [(n+ β)x− (γ + 2n)y]Un(β, γ, x, y).(1.2)

These two independent differential recurrence relations determine the secondorder linear ordinary differential equation

y (x− y)D2Un (x, y)− [(n+ β − 1)x− (γ + 2n− 2) y]DUn (x, y)

− n (γ + n− 1)Un (x, y) = 0,(1.3)

where D = ddy . The proof of these results are obvious.

2. Generating funcion derived from the ascending recurrencerelation

We shell use the Truesdell’s F -equation

(2.1)∂

∂tF (z, α) = F (t, α+ 1) .

To find the generating function for the ser of polynomials Un (β, γ, x, y) as fol-lows:

The polynomials Un (β, γ, x, y) satisfies the asending recurrence relation

d

dyUn(β, γ, x, y) =

1

y(x− y)(γ + n)Un+1(β, γ, x, y)

+ [(n+ β)x− (γ + 2n)y]Un(β, γ, x, y).(2.2)

Page 293: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CERTAIN GENERATING FUNCTIONS ... 279

Let f (z, α) = Un (β, γ, x, y), so that we have

∂zf(z, α) =

[(α+ β)− (γ + 2α)z]

z(x− z)Uα(β, γ, x, y)

+(γ + α)

z(x− z)Uα+1)(β; γ;x, y).(2.3)

This equation is called the f-type equation and can be written as

∂zf (z, α) = A (z, α) f (z, α) +B (z, α) f (z, α+ 1) ,

with A (z, α) = [(α+β)−(γ+2α)z]z(x−z) and B (z, α) = (γ+α)

z(x−z) .

∂zg (z, α) = C (z, α) g (z, α+ 1)

by supposing

g (z, α) = f (z, α) exp

−∫ z

z0

A(ν, α)dν

= f (z, α) zα+β0 z−α−β (x− z0)α−β+γ (x− z)−α+β−γ

and by choosing z0 = 1, then we get

(2.4) g (z, α) = (x− 1)α−β+γ z−α−β (x− z)β−γ−α f (z, α) .

Now, it can easily verified that this satisfies g-type equation

(2.5)∂

∂zg (z, α) = (α+ γ) (x− 1)−1 g (z, α+ 1) .

Let C (z, α) denote the factorable coefficient of g (z, α+ 1) in (2.5), then

C (z, α) = (α+ γ) (x− 1)−1

with C (z, α) = A (α)Z (z). Where A (α) = (α+ γ) (x− 1)−1 and Z (z) = 1.We effect the transformation of f (z, α) into F (t, α) by letting

(2.6) t = −∫ z

z1

Z(ν)dν = z − z1

and F0F (t, α) = g (z, α) exp∫ α

α0logA(ν)∆ν

on choosing α0 = −γ, we get∫ α

−γ

(V + γ)(x− 1)−1

∆V =∫ α−γ log

((x− 1)−1

)+ log(V + γ)∆V Since

(2.7)

∫ x

0log z∆z = log Γ(x)− log

√2π

Page 294: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

280 P.L. RAMA KAMESWARI and V.S. BHAGAVAN

we have∫ α−γ

(V + γ)(x− 1)−1

∆V = log[Γ(α+γ)(x−1)−(α+γ)

√2π

]. This implies

F0F (t, α) = g (z, α) exp

log

[Γ(α+ γ) (x− 1)−(α+γ)

√2π

].

Now by choosing α0 = −γ, z1 = v and F0 = 1√2π

, we get

(2.8) F (t, α) = Γ(α+ γ)(x− 1)−(α+γ)g(t+ v, α).

To show that F (t, α) does indeed satisfy the F-equation we determine ∂∂tF (t, α)

as follows:

F (t, α) = Γ(α+ γ)(x− 1)−(α+γ)∂g(t+ v, α)

∂(t+ v)

∂g(t+ v)

∂t

= Γ(α+ γ + 1)(x− 1)−(α+γ+1)g(v + t, α+ 1).(2.9)

Therefore,∂

∂tF (t, α) = F (t, α+ 1).

For later use express F (t, α) in the following form:

F (t, α) = Γ(α+ γ)(x− 1)−(α+γ)g(t+ v, α)

= Γ(α+ γ)(x− 1)−(α+γ)(x− 1)α+β−γ(v + t)−α−β

(x− v − t)−(α−β+γ)f(v + t, α)(2.10)

= Γ(α+ γ)(x− 1)−β(v + t)−(α+β)

(x− v − t)−(α−β+γ)Uα(β; γ;x, v + t).

Thus

F (t+ z, α) = Γ(α+ γ)(x− 1)−β(v + t+ z)−(α+β)

(x− v − t− z)−(α−β+γ)Uα(β; γ;x, v + t+ z).(2.11)

F (t, α+ n) = Γ(α+ n+ γ)(x− 1)−β(v + t)−(α+n+β)

(x− v − t)−(α−β+γ−n)Uα+n(β; γ;x, v + t).(2.12)

Now let us apply Truesdell’s generating function theorem, if the function F (t, α).Satisfies the F-equation and f(t+ z, α) possesses a Taylor’s series in power of z,then this series may be expressed as

(2.13) F (t+ z, α) =

∞∑n=0

zn

n!F (t, α+ n).

Page 295: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CERTAIN GENERATING FUNCTIONS ... 281

It follows that

(v + t+ z)−(α+β)(x− v − t− z)−(α−β+γ)Uα(β; γ;x, v + t+ z)∞∑n=0

Γ(α+ n+ γ)

Γ(α+ γ)(v + t)−(α+n+β)(x− v − t)−(α−β+γ−n)Uα+n(β; γ;x, v + t).

Now replacing v + t by y and z by yt(x− y), we get the generating relation

(1− yt)−(α−β+γ) 1 + t(x− y)−(α+β) Uα [β; γ;x, y + yt(x− y)]∞∑n=0

(γ + α)nn!

Uα+n(β; γ;x, y)tn.(2.14)

Which is a generating relation for Un(β; γ;x, y).

3. Generating function derived from the descending recurrencerelation

Similarly, by using the Truesdell’s G-equation

(3.1)∂

∂tG(t, α) = G(t, α− 1).

We have derived a generating relation for the set of polynomials Uα−n (β; γ;x, y)as follows:

The decsending recurrence relation for Un (β; γ;x, y) is

(3.2)d

dyUn (β; γ;x, y) = nUn−1 (β; γ;x, y) .

Let f(z, α) = Un (β; γ;x, y), so that we have

(3.3)∂

∂zf(z, α) = αf(z, α− 1).

This equation is called the F-type equation and can be written as

∂zf(z, α) = A(z, α)f(z, α) +B(z, α)f(z, α− 1)

with A(z, α) = 0 and B(z, α) = α.Now let us transform f(z, α) into g(z, α) so that

∂zg(z, α) = C(z, α)g(z, α− 1).

Let us suppose that

g(z, α) = f(z, α) exp

−∫ z

z0

A(ν, α)dν

= exp(c)f(z, α),

Page 296: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

282 P.L. RAMA KAMESWARI and V.S. BHAGAVAN

where c being an integration constant.Now in particular, if we write z0 = 0, then we get

g(z, α) = exp(c)f(z, α).

Now

g(z, α) = exp(c)f(z, α)

= α exp(c)f(z, α− 1)(3.4)

= αg(z, α− 1).

Let C(z, α) denote the factorable coefficient of g(z, α−1),then C(z, α) = α withZ(z) = 1 and A(α) = α. Further let us effect the transformation of g(z, α) intog(t, α) by letting

t = −∫ z

z1

Z(ν)dν = z − z1

and

G0G(t, α) = g(z, α) exp

−∫ α+1

α0

logA(ν)∆ν

= g(z, α) exp

−∫ α+1

α0

log ν∆ν

.

In particular if we choose α0 = 0 then we have

G0G(t, α) = g(z, α) exp

−∫ α+1

0logA(ν)∆ν

= g(z, α) exp

− log

Γ(α+ 1)√2π

= g(z, α)

√2π

Γ(α+ 1).

Suppose z1 = ν, α0 = 0 and G0 =√

2π then

G(t, α) =exp c

Γ(α+ 1)g(ν + t, α).

To show that G(t, α) does indeed satisfy the G-equation we determine ∂∂tG(t, α)

as follows:

∂tG(t, α) =

exp c

Γ(α+ 1)

∂g(ν + t, α)

∂(ν + t)

∂(ν + t)

∂t

=exp c

Γ(α+ 1)g(ν + t, α− 1).

Therefore,∂

∂tG(t− α).

Page 297: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CERTAIN GENERATING FUNCTIONS ... 283

For later use let us express G(t, α) in the following form:

G(t, α) =exp c

Γ(α+ 1)g(ν + t, α)

=exp(2c)

Γ(α+ 1)f(ν + t, α)

=exp c

Γ(α+ 1)Uα(β; γ;x, ν + t).

Also

G(t+ z, α) =exp(2c)

Γ(α+ 1)Uα(β; γ;x, ν + t+ z)

and

G(t, α− n) =exp(2c)

Γ(α− n+ 1)Uα−n(β; γ;x, ν + t).

By Tailor’s series in powers of z

(3.5) G(t+ z, α) =

∞∑n=0

zn

n!G(t, α− n).

Which implies that

exp(2c)

Γ(α+ 1)Uα(β; γ;x, ν + t+ z)

=

∞∑n=0

zn

n!

exp(2c)

Γ(α− n+ 1)Uα−n(β; γ;x, ν + t)

or

Uα(β; γ;x, ν + t+ z) =∞∑n=0

(−1)n(−α)nn!

Uα−n(β; γ;x, ν + t).

Now replacing ν + t by y and z by −t, we get

Uα(β; γ;x, y − t) =∞∑n=0

(−α)nn!

Uα−n(β; γ;x, y)tn.

which is the another generating relation for

(3.6) Un(β; γ;x, y).

4. Applications

From the relations (2.14) and (3.6),we can derive the following generating func-tions for Laguerre polynomials of two variables:

(1− yt)−n−α−1 exp

(−tx

(1− ty)

)L(α)n

(x,

x

1− ty

)=

n∑l=0

(1 + n)ll!

L(α)n+l(x)tl.(1)

Page 298: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

284 P.L. RAMA KAMESWARI and V.S. BHAGAVAN

(2) (1− t)nL(α)n

(x,

1− ty

)=

n∑l=0

(α− n)ll!

L(α)n−1(x, y)tl.

5. Conclusion

Generating functions involving generalized Hypergeometric 2D polynomials arederived by Truesdell’s Method. Certain known generating relations to two vari-able Laguerre polynomials are discussed as applications. The applications ofgeneralized Hypergeometric 2D polynomials in communications including wire-less, mobile, and satellite communications with new ideas and approaches todesign communications system with high performance in comparison with em-ployed communication systems is the further scope of this research.

References

[1] I.K. Khanna, V.S. Bhagavan, Lie group theoretic origins of certain gen-erating functions of the generalised hypergeometric polynomials, IntegralTransforms Spec. Functions, 11(2) (2001), 177-188.

[2] I.K. Khanna, V.S. Bhagavan, Weisner’s method to obtain generating re-lations for the generalised hypergeometric polynomial set, J. Phys. A: Genand Math, 32 (1999), 989-998.

[3] S. Khan, M.A. Pathan, G. Yasmin, Representation of lie algebra G(0, 1)and three variable generalized Hermite polynomials Hn(x,y,z), Integral Trans-forms Special Functions, 13 (2002), 59-64.

[4] S. Khan, G. Yasmin, Lie-theoretic generating relations of two variable la-guerre polynomials, Reports on Mathematical Physics, 51 (2013), 1-7.

[5] Manic Chandra Mukherjee, Generating functions on extended Jacobi poly-nomials from Lie group view point, Publications Matematiques, 40 (1996),3-13.

[6] E.B. Mc Bride, Obtaining Generating Functions, Springer Verlag, NewYork, 1971.

[7] W. Miller Jr., Lie theory and special functions, Academic Press, New York,1968.

[8] E.D. Rainville, Special functions, Macmillan Co., New York, 1960.

[9] K.P. Samanta, B.C. Chandra, C.S. Bera, Some generating functions ofmodified Gegenbauer polynomials by Lie algebraic method, Mathematics andStatistics, 2(4) (2014), 172-178.

Page 299: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CERTAIN GENERATING FUNCTIONS ... 285

[10] A.K. Shukla, S.K. Meher, Group-theoretic origin of some generating func-tions for lagurre polynomials of two variables, Appl. Math. Sci., 5(61)(2011), 775-784.

[11] H.M. Srivastava, H.L. Manocha, A treatise on generating functions, Hal-sted/Wiley, New York, 1984.

[12] T. Srinivasulu, V.S. Bhagavan, Irreducible representation of SL(2, C) andgenerating relations for the generalized hypergeometric functions, Far EastJ. Math. Sci., 83(2) (2013), 127-144.

[13] Subuhi Khan, Ghazale Yasmin, Lie theoretic generating relation of twovariable Laguerre Polynomials, Rep. Math. Phys., 51 (2003), 1-7.

Accepted: 25.07.2017

Page 300: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (286–293) 286

d-MIXING AND d-UNIVERSAL J-CLASS OPERATORS

A. Tajmouati∗

M. El BerragSidi Mohamed Ben Abdellah University

Faculty of Sciences Dhar El Mahraz

Fez

Morocco

[email protected]

[email protected]

Abstract. In this paper, we characterize the notion of d-universal extended (respec-tively d-universal extended mixing) limit set and we give a relation between d-universal(or d-hypercyclic sequences) and d-universal extended limit set.

Keywords: tuple of sequence, hypercyclic sequences,d-topologically transitive, d-Juniver-class operators, d-Ju−mix- class operators.

1. Introduction

For an infinite-dimensional separable complex Banach spaceX, B(X) will denotethe algebra of all bounded linear operators on X. For x ∈ X, the orbit of x under(Tn)n is the set Orb(Tn, x) = Tnx : n ∈ Z+. A sequence (Tn)n of operatorsis called hypercyclic or universal if there is some x whose orbit under (Tn)nis dense in X. In such a case, x is called a hypercyclic or universal vector for(Tn)n. A sequence (Tn)n of operators is called topologically transitive if forevery nonempty open subsets U and V of X there is some n ≥ 0 such thatTn(U) ∩ V = ∅. For some sources on these topics; see [1, 6, 7, 8, 10].

The notion of disjoint hypercyclicity, a strengthening of hypercyclicity, con-cerning a tuple of linear operators, was introduced independently by Bernal [2]and by Bes and Peris [4] in 2007.

For any integer N ≥ 2, the tuple (T1, T2, ..., TN ) of operators, acting on thesame topological vector space X, is said disjoint hypercyclic, or d-hypercyclic forshort, provided there exists (z, . . . , z) in XN , such that (Tn1 z, Tn2 z, ..., TnNz) :n ∈ Z+ is dense in XN . Such a vector z is called a d−hypercyclic vector forthe tuple (T1, T2, . . . , TN ).

We say that the operators T1, T2, . . . , TN in B(X) with N ≥ 2 are d-topologically transitive if for any non-empty open subsets V0, V1, . . . , VN in X,there exists a positive integer n so that ∅ = V0 ∩ T−n

1 (V1) ∩ T−n2 (V2) ∩ . . . ∩

T−nN (VN ).

∗. Corresponding author

Page 301: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

d-MIXING AND d-UNIVERSAL J-CLASS OPERATORS 287

Definition 1.1 ([4], Definition 2.1). We say that N ≥ 2 sequences of oper-ators (T1,n)∞n=1, (T2,n)∞n=1,. . . , (TN,n)∞n=1 in B(X) are d-topologically transitive(respectively d-mixing) provided for every non-empty open subsets V0, V1, ..., VNof X there exists a positive integer m so that ∅ = V0 ∩ T−1

1,m(V1)∩T−12,m(V2)∩ . . .∩

T−1N,m(VN ) (respectively so that ∅ = V0 ∩ T−1

1,n(V1) ∩ T−12,n(V2) ∩ . . . ∩ T−1

N,n(VN )for every n ≥ m).

Definition 1.2 ([4], Definition 2.2). We say that N ≥ 2 sequences (T1,n)∞n=1,(T2,n)∞n=1, . . . , (TN,n)∞n=1 in B(X) are d-universal if (T1,nz, T2,nz, ..., TN,nz) :n ∈ Z+ is dense in XN for some vector z ∈ X. We call vector z a d-universalfor (T1,n)∞n=1, (T2,n)∞n=1,. . . , (TN,n)∞n=1.

Recall that S. Shkarin in [9] gave a short proof of existence of disjoint hy-percyclic tuples of operators of any given length on any separable infinite di-mensional Frechet space. Similar argument provides disjoint dual hypercyclictuples of operators of any length on any infinite dimensional Banach space withseparable dual. For recent results on disjoint hypercyclicity (see [3]).

Definition 1.3. Let T : X → X be a bounded linear operator on a Banachspace X. For every x ∈ X the sets J(x) = y ∈ X : there exist a strictlyincreasing sequence of positive integers kn and a sequence xn ⊂ X such thatxn → x and T knxn → y Jmix(x) = y ∈ X : there exist a sequence xn ⊂ Xsuch that xn → x and Tnxn → y will be called the extended limit set of x underT and the extended mixing limit set of x under T respectively.

The notions of the limit and extended limit sets are well known in the the-ory of topological dynamics. In [5] G. Costakis and A. Manoussos, defined theJ-sets, examined some basic properties of these sets and investigated the re-lation between hypercyclicity and J-sets. In particular they showed that T ishypercyclic if and only if there exists a cyclic vector x ∈ X such that J(x) = X.Recall that a vector x is cyclic for T if the linear span of the orbit Orb(T, x)is dense in X. In [12] we localized the notion of M-extended semigroup(resp.M-extended semigroup mixing) limit set of x under T = (Tt)t≥0 and we gavesufficient conditions of being M -hypercyclic for this semigroup. Then by thisresult, we proved that (T−1

t )t≥0 is a M -hypercyclic.On other hand, let T1, T2, . . . , TN in B(X) with N ≥ 2 . For every x0 ∈ X

the sets d-J(T1,T2,...,TN )(x0) = (x1, . . . , xN ) ∈ XN : for every neighborhoodV0, V1, . . . , VN of x0, x1, . . . , xN respectively, there exists a positive integer n sothat ∅ = V0 ∩ T−n

1 (V1) ∩ T−n2 (V2) ∩ . . . ∩ T−n

N (VN ) and d-Jmix(T1,T2,...,TN )(x0) =

(x1, . . . , xN ) ∈ XN : for every neighborhood V0, V1, . . . , VN of x0, x1, . . . , xNrespectively, there exists a positive integer m so that ∅ = V0 ∩ T−n

1 (V1) ∩T−n2 (V2) ∩ . . . ∩ T−n

N (VN ) for every n ≥ m, will be called the extended limitset of x0 under T1, T2, . . . , TN and the extended mixing limit set of x0 underT1, T2, . . . , TN respectively. We have introduced this notion in [11], and weextended some results known for a single operator to a tuple of sequences ofoperators.

Page 302: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

288 A. TAJMOUATI and M. EL BERRAG

In this paper, we characterize the notion of d-universal extended (respec-tively d-universal extended mixing) limit set and we give a relation betweend-universal (or d-hypercyclic sequences) and d-universal extended limit set.

2. d-universal J-class

Definition 2.1. Let T1,n, T2,n, . . . , TN,n in B(X) with N ≥ 2 . For every x0 ∈ Xthe sets

d-Luniver(x0) := (x1, . . . , xN ) ∈ XN : there exists a strictly increasing se-quence of positive integers kn such that Ti,knx0 → xi for all 1 ≤ i ≤ N

d-Juniver(T1,n,T2,n,...,TN,n)(x0) = (x1, . . . , xN ) ∈ XN : for every neighborhood V0, V1,

. . . , VN of x0, x1, . . . , xN respectively, there exists a positive integer n so that∅ = V0 ∩ T−1

1,n(V1) ∩ T−12,n(V2) ∩ . . . ∩ T−1

N,n(VN ) will be called the d-universallimit set and d-universal extended limit set of x0 under T1,n, T2,n, . . . , TN,n re-spectively.

Remark 2.2. An equivalent definition for the set d-Juniver(T1,n,T2,n,...,TN,n)(x0) is the

following:d-Juniver(T1,n,T2,n,...,TN,n)

(x0) = (x1, . . . , xN ) ∈ XN : there exist a strictly increas-

ing sequence of positive integers kn and a sequence (xn) ⊂ X such that xn → x0and Ti,knxn → xi for all 1 ≤ i ≤ N.

Theorem 2.3. Let T1,n, T2,n, . . . , TN,n in B(X) with N ≥ 2 . Then the followingconditions are equivalent:

1. For every x0 ∈ X, d-Juniver(T1,n,T2,n,...,TN,n)(x0) = XN .

2. T1,n, T2,n, . . . , TN,n is d-transitive.

3. The set of d-universal vectors for (T1,n)∞1 , (T2,n)∞1 , . . . , (TN,n)∞1 is a denseGδ.

Proof. We first prove: (1) implies (2). Let V0, V1, . . . , VN the nonempty open.Consider xi ∈ Vi (0 ≤ i ≤ N). Since d-Juniver(T1,n,T2,n,...,TN,n)

(x0) = XN , so there

exists n ∈ N such that ∅ = V0 ∩∩Ni=1 T

−1i,n (Vi). By definition T1,n, T2,n, . . . , TN,n

is d-transitive.We will show that (2) implies (1). Let xi ∈ Vi (0 ≤ i ≤ N) and V0, V1, . . . , VN

be relatively open subsets of X. So there exists n ∈ N such that ∅ = V0 ∩∩Ni=1 T

−1i,n (Vi). So (x1, . . . , xN ) ∈ d-Juniver(T1,n,T2,n,...,TN,n)

(x0), and consequently d-

Juniver(T1,n,T2,n,...,TN,n)(x0) = XN .

For (2)⇔ (3) see [4, Proposition 2.3].

Proposition 2.4. Let T1,n, T2,n, . . . , TN,n in B(X) with N ≥ 2 . Then

d− Juniver(λ1T1,n,λ2T2,n,...,λNTN,n)(0) = d− Juniver(T1,n,T2,n,...,TN,n)

(0),

for every |λi| = 1 (1 ≤ i ≤ N).

Page 303: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

d-MIXING AND d-UNIVERSAL J-CLASS OPERATORS 289

Proof. Let (x1, . . . , xN ) ∈ d-Juniver(λ1T1,n,λ2T2,n,...,λNTN,n)(0). Then there exist a strictly

increasing sequence of positive integers kn and a sequence (xn) ⊂ X such thatxn → 0 and λiTi,knxn → xi for all 1 ≤ i ≤ N. Since |λi| = 1 then λixn → 0and since Ti,kn(λixn)→ xi it follows that (x1, . . . , xN ) ∈ d-Juniver(T1,n,T2,n,...,TN,n)

(0).

Let (x1, . . . , xN ) ∈ d-Juniver(T1,n,T2,n,...,TN,n)(0). Then there exist a strictly increas-

ing sequence of positive integers kn and a sequence (xn) ⊂ X such that xn → 0and Ti,knxn → xi for all 1 ≤ i ≤ N. Since |λi| = 1 (1 ≤ i ≤ N), with-out loss of generality we can assume that λi → µi for some |µi| = 1. HenceλiTi,kn(xnµi ) → xi for all 1 ≤ i ≤ N and since xn

µi→ 0 then (x1, . . . , xN ) ∈

d-Juniver(λ1T1,n,λ2T2,n,...,λNTN,n)(0).

Lemma 2.5. Let T1,n, T2,n, . . . , TN,n in B(X) with N ≥ 2 and x0,n, x1,n,. .. , xN,n be the sequences in X such that x0,n → x0 and xi,n → xi for somex0, xi ∈ X (1 ≤ i ≤ N). If (x1,n, ..., xN,n) ∈ d-Juniver(T1,n,T2,n,...,TN,n)

(x0,n) for every

n = 1, 2, ..., then (x1, ..., xN ) ∈ d-Juniver(T1,n,T2,n,...,TN,n)(x0).

Proof. For n = 1 there exists a positive integer k1 such that

∥x0,k1 − x0∥ < 12 and ∥xi,k1 − xi∥ < 1

2 (1 ≤ i ≤ N).

Since (x1,k1 , . . . , xN,k1) ∈d-J(T1,n,T2,n,...,TN,n)(x0,k1) we may find a positive inte-ger l1 and z1 ∈ X such that

∥z1 − x0,k1∥ < 12 and ∥Ti,l1z1 − xi,k1∥ < 1

2 (1 ≤ i ≤ N).

Therefore,

∥z1 − x0∥ < 1 and ∥Ti,l1z1 − xi∥ < 1 (1 ≤ i ≤ N).

Proceeding inductively we find a strictly increasing sequence of positive integersln and a sequence zn in X, such that

∥zn − x0∥ < 1n and ∥Ti,lnzn − xi∥ < 1

n (1 ≤ i ≤ N).

This complete the proof.

Proposition 2.6. Let T1,n, T2,n, . . . , TN,n in B(X) with N ≥ 2 . If supn ∥Ti,n∥ <∞ for all 1 ≤ i ≤ N, then d-Juniver(T1,n,T2,n,...,TN,n)

(x0) = d-Luniver(x0) For every

x0 ∈ X.

Proof. Since supn ∥Ti,n∥ <∞ for all 1 ≤ i ≤ N there exists a positive numberM such that ∥Ti,n∥ ≤M for every positive integer n and 1 ≤ i ≤ N. Let x0 ∈ X.If d-Juniver(T1,n,T2,n,...,TN,n)

(x0) = ∅ there is nothing to prove. Therefore assume that

d-Juniver(T1,n,T2,n,...,TN,n)(x0) = ∅.

Since the inclusion d-Luniver(x0) ⊂ d-Juniver(T1,n,T2,n,...,TN,n)(x0) is always true, it

suffices to show that d-Juniver(T1,n,T2,n,...,TN,n)(x0) ⊂ d-Luniver(x0). Take (x1, ..., xN ) ∈

d-Juniver(T1,n,T2,n,...,TN,n)(x0). There exist a strictly increasing sequence of positive

Page 304: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

290 A. TAJMOUATI and M. EL BERRAG

integers kn and a sequence (xn) ⊂ X such that xn → x0 and Ti,knxn → xi forall 1 ≤ i ≤ N. Then we have

∥Ti,knx0 − xi∥ ≤ ∥Ti,knx0 − Ti,knxn∥+ ∥Ti,knxn − xi∥≤ M∥x0 − xn∥+ ∥Ti,knxn − xi∥

and letting n goes to infinity to the above inequality, we get that (x1, . . . , xN ) ∈d-Luniver(x0).

Proposition 2.7. Let T1,n, T2,n, . . . , TN,n in B(X) with N ≥ 2 . Then the setA = x0 ∈ X : d-Juniver(T1,n,T2,n,...,TN,n)

(x0) = XN is closed.

Proof. By Lemma 2.5 A is closed.

Theorem 2.8. Let T1,n, T2,n, . . . , TN,n in B(X) with N ≥ 2 . Then the followingconditions are equivalent:

1. (T1,n)∞1 , (T2,n)∞1 , . . . , (TN,n)∞1 is d-universal or d-hypercyclic sequences.

2. For every x0 ∈ X, d-Juniver(T1,n,T2,n,...,TN,n)(x0) = XN .

3. The set A = x0 ∈ X : d-Juniver(T1,n,T2,n,...,TN,n)(x0) = XN is dense in XN .

Proof. We first prove that (1) implies (2). Let xi ∈ Vi (0 ≤ i ≤ N). Since theset of d-universal vectors for (T1,n)∞1 , (T2,n)∞1 , . . . , (TN,n)∞1 is a dense Gδ in XN .Hence there exist a d-universal (or sequences of hypercyclic) vectors (xn) ⊂ Xand a strictly increasing sequence of positive integers kn such that xn → x0 andTi,knxn → xi for all 1 ≤ i ≤ N. Hence (x1, . . . , xN ) ∈ d-Juniver(T1,n,T2,n,...,TN,n)

(x0).

The implication (2) ⇒ (3) is trivial. Conversely (3) ⇒ (2) By Lemma2.5.

3. d-mixing J-class

Definition 3.1. Let T1,n, T2,n, . . . , TN,n in B(X) with N ≥ 2 . For every x0 ∈ Xthe sets d-Ju−mix(T1,n,T2,n,...,TN,n)

(x0) = (x1, . . . , xN ) ∈ XN : for every neighborhood

V0, V1,. . . , VN of x0, x1, . . . , xN respectively, there exists a positive integer m sothat ∅ = V0 ∩ T−1

1,n(V1) ∩ T−12,n(V2) ∩ . . . ∩ T−1

N,n(VN ) for every n ≥ m will becalled the d-universal extended mixing limit set of x0 under T1,n, T2,n,. . . , TN,n.

Proposition 3.2. An equivalent definition for the set d-Ju−mix(T1,n,T2,n,...,TN,n)(x0) is

the following:d-Ju−mix(T1,n,T2,n,...,TN,n)

(x0) = (x1, . . . , xN ) ∈ XN : there exists a sequence (xn) ⊂X such that xn → x0 and Ti,nxn → xi for all 1 ≤ i ≤ N.

Proof. Let us prove that d-Ju−mix(T1,n,T2,n,...,TN,n)(x0) ⊂ (x1, . . . , xN ) ∈ XN : there

exists a sequence (xn) ⊂ X such that xn → x0 and Ti,nxn → xi for all1 ≤ i ≤ N.

Page 305: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

d-MIXING AND d-UNIVERSAL J-CLASS OPERATORS 291

Let (x1, . . . , xN ) ∈ d-Ju−mix(T1,n,T2,n,...,TN,n)(x0) and consider the open balls V0,n =

B(x0,1n), Vi,n = B(xi,

1n) centered at x0, xi ∈ X and with radius 1/n for n =

1, 2, . . . . and 1 ≤ i ≤ N. Then there exists a positive integer m so that ∅ =V0,n ∩ T−1

1,n(V1,n) ∩ T−12,n(V2,n) ∩ ... ∩ T−1

N,n(VN,n) for every n ≥ m. Hence there

exists xn ∈ V0,n = B(x0,1n) such that xn ∈

∩Ni=1 T

−1i,n (Vi,n), this implies that

Ti,n(xn) ∈ Vi,n for all i = 1, ..., N. Therefore there exists a sequence (xn) ⊂ Xsuch that xn → x0 and Ti,nxn → xi for all 1 ≤ i ≤ N. The converse isobvious.

Theorem 3.3. Let T1,n, T2,n, . . . , TN,n in B(X) with N ≥ 2 . Then the followingconditions are equivalent:

1. For every x0 ∈ X, d-Ju−mix(T1,n,T2,n,...,TN,n)(x0) = XN .

2. T1,n, T2,n, . . . , TN,n is d-mixing.

Proof. The proof goes similarly as in Theorem 2.3.

Proposition 3.4. Let T1,n, T2,n, . . . , TN,n in B(X) with N ≥ 2 . Then

d− Ju−mix(λ1T1,n,λ2T2,n,...,λNTN,n)(0) = d− Ju−mix(T1,n,T2,n,...,TN,n)

(0),

for every |λi| = 1, (1 ≤ i ≤ N).

Proof. The proof goes similarly as in Proposition 2.4.

Lemma 3.5. Let T1,n, T2,n, . . . , TN,n in B(X) with N ≥ 2 and x0,n, x1,n,. . . ,xN,nbe the sequences in X such that x0,n → x0 and xi,n → xi for some x0, xi ∈X (1 ≤ i ≤ N). If (x1,n, . . . , xN,n) ∈ d-Ju−mix(T1,n,T2,n,...,TN,n)

(x0,n) for every n =

1, 2, ..., then (x1, ..., xN ) ∈ d-Ju−mix(T1,n,T2,n,...,TN,n)(x0).

Proof. For n = 1 there exists a positive integer k1 such that

∥x0,k1 − x0∥ < 12 and ∥xi,k1 − xi∥ < 1

2 (1 ≤ i ≤ N).

Since (x1,k1 , . . . , xN,k1) ∈d-Ju−mix(T1,n,T2,n,...,TN,n)(x0,k1) we may find a positive inte-

ger l1 and zn ∈ X such that

∥zn − x0,k1∥ < 12 and ∥Ti,nzn − xi,k1∥ < 1

2 (1 ≤ i ≤ N).

For every n ≥ l1. Therefore,

∥zn − x0∥ < 1 and ∥Ti,nzn − xi∥ < 1 (1 ≤ i ≤ N).

For every n ≥ l1. Proceeding inductively we find a strictly increasing sequenceof positive integers l2 > l1 and a sequence wn ⊂ X such that

∥wn − x0∥ < 12 and ∥Ti,nwn − xi∥ < 1

2 (1 ≤ i ≤ N).

For every n ≥ l2. Set vn = zn for every l1 ≤ n ≤ l2, hence

Page 306: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

292 A. TAJMOUATI and M. EL BERRAG

∥vn − x0∥ < 1 and ∥Ti,nvn − xi∥ < 1 (1 ≤ i ≤ N).

Proceeding inductively we find a strictly increasing sequence of positive integersnk and a sequence vn ⊂ X such that if n ≥ k then

∥vn − x0∥ < 1k and ∥Ti,nvn − xi∥ < 1

k (1 ≤ i ≤ N).

Take any ε > 0. There exists a positive integer k0 such that 1k0< ε. Hence for

every n ≥ nk0 we get

∥vn − x0∥ < 1k0< ε and ∥Ti,nvn − xi∥ < 1

k0< ε (1 ≤ i ≤ N).

This completes the proof .

Proposition 3.6. Let T1,n, T2,n, . . . , TN,n in B(X) with N ≥ 2 . Then the set

B = x0 ∈ X : d-Ju−mix

(T1,n,T2,n,...,TN,n)(x0) = XN is closed.

Proof. By Lemma 3.5 B is closed.

Theorem 3.7. Let T1,n, T2,n, . . . , TN,n in B(X) with N ≥ 2 . Then the followingconditions are equivalent:

1. (T1,n)∞1 , (T2,n)∞1 , . . . , (TN,n)∞1 is d-mixing.

2. For every x0 ∈ X, d-Ju−mix(T1,n,T2,n,...,TN,n)(x0) = XN .

3. The set B = x0 ∈ X : d-Ju−mix(T1,n,T2,n,...,TN,n)(x0) = XN is dense in XN

Proof. For (1) implies (2) we use the same argument as in the proof of Theorem3.3.

The implication (2)⇒ (3) is trivial. Conversely (3)⇒ (2) by Lemma 3.5.

Acknowledgement

The authors thank the referees for his suggestions and comments thorough read-ing of the manuscript.

References

[1] S.I. Ansari, Existance of hypercyclic operatos on topological vector space, J.F. Anal., 148 (1997), 384-390.

[2] L. Bernal-Gonzalez, Disjoint hypercyclic operators, Studia Math, 182 (2)(2007), 113-130.

[3] J. Bes, O. Martin, A. Peris and S. Shkarin, Disjoint mixing operators, J.Funct. Anal., 263 (2012), 1283-1322.

[4] J. Bes and A. Peris, Disjointness in hypercyclicity, J. Math. Anal. Appl.,336 (2007), 297-315.

Page 307: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

d-MIXING AND d-UNIVERSAL J-CLASS OPERATORS 293

[5] G. Costakis, A. Manoussos, J-class operators and hypercyclicity, J. Opera-tor Theory, 67 (1) (2012), 101-119.

[6] K. Goswin and G. Erdmann, Universal families and hypercyclic operators.Bulletin of the American Mathematical Society, 36 (1999), 345-381.

[7] Karl-G. Grosse-Erdmann, Alfred Peris Manguillot, Linear chaos, Springer-Verlag London Limited, 2011.

[8] F. Leon-Saavedra, V. Muller, Hypercyclic sequences of operators, StudiaMath., 175 (1) (2006), 1-18.

[9] S. Shkarin, A short proof of existence of disjoint hypercyclic operators, J.Math. Anal. Appl., 367 (2) (2010), 713-715.

[10] A.Tajmouati, M. El Berrag, Some results on hypercyclicity of tuple of oper-ators, Italian Journal of Pure and Applied Mathematics, 35-2015, 487-492.

[11] A. Tajmouati, M. El Berrag, Disjoint J-class operators, Italian Journal ofPure and Applied Mathematics, 37 (2017), 19-28.

[12] A. Tajmouati, M. El Berrag, J-class semigroup operators, InternationalJournal of Pure and Applied Mathematics, 109, 4 (2016), 861-868.

Accepted: 28.07.2017

Page 308: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (294–300) 294

PAIRWISE CONNECTEDNESS IN FUZZYBITOPOLOGICAL SPACES IN QUASI-COINCIDENCESENSE

Ruhul Amin∗

Department of MathematicsFaculty of ScienceBegum Rokeya UniversityRangpur, [email protected]

Sahadat HossainDepartment of Mathematics

Faculty of Science

University of Rajshahi

Rajshahi-6205

Bangladesh

Abstract. In this paper, we have defined a new notion of fuzzy connectedness in fuzzybitopological spaces in sense of quasi-coincidence sense. We have found the relationsamong our and other such notions. We have observed that our notion is stronger thansome other such notions. We have shown that the pairwise fuzzy connectedness ispreserved under the FP-continuous mapping. Moreover, we have obtained productivityand some other properties of this new concept.

Keywords: quasi-coincidence, fuzzy bitopological spaces, fuzzy pairwise connected-ness.

1. Introduction

Zadeh [17] introduced the concept of a fuzzy set in his classical paper. Using thisnotion Chang [3] introduced the concept of fuzzy topological space. Since then,many authors have studied successfully to generalize several concepts of generaltopology to the fuzzy setting. The notion of bitopological spaces was initiallyintroduced by Kelly [8] in 1963. Kandil and El-Shafee [7] introduced and studiedthe notion of fuzzy bitopological spaces as a natural generalization of fuzzytopological spaces. The concepts of fuzzy connectedness have been introducedearlier by Lowen and Srivastava [9], Wuyts [16], Dewan Muslim Ali [1], Tapiand Deole [13], Fatteh and Bassan [4] and G. Jager [6]. In [11], Park and Leegeneralized the concept of fuzzy extremally disconnected spaces due to Ghosh[5] into a fuzzy bitopoogical setting and discuss some of its properties. In 2002,

∗. Corresponding author

Page 309: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

PAIRWISE CONNECTEDNESS IN FUZZY BITOPOLOGICAL SPACES ... 295

Chandrasekar and Balasubramanian [2] defined weaker forms of connectednessand stronger forms of disconnectedness in fuzzy bitopological spaces.

The purpose of this paper is to introduce a new notion of fuzzy connectednessin fuzzy bitopological space in the light of quasi-coincidence sense and comparewith [2]. We investigate that pairwise fuzzy connectedness is preserved underFP -continuous mapping. Moreover, we obtain some other properties of thisnew concept.

2. Priliminaries

For the purpose of the main results, we need to introduce some definitions andnotations. Through this paper, X will be a nonempty set, I = [0, 1] and FPstands for fuzzy pairwise. The notations (X, t) and (X, s, t) will be denotedfuzzy topological space and fuzzy bitopological space respectively and µA willbe denoted the characteristics function on the subset A of X.

Definition 2.1 ([17]). A fuzzy set µ in a set X is a function from X into theclosed unit interval I = [0, 1]. For every x ∈ X, µ(x) ∈ I is called the grade ofmembership of x. A member of IX may also be called fuzzy subset of X.

Definition 2.2 ([17]). Let f be a mapping from a set X into a set Y and u afuzzy set in X. Then the image of u, written as f(u), is a fuzzy set in Y whosemembership function is given by

f(u)(y) =

supu(x), if f−1[y] = Φ, x ∈ X;

0, otherwise.

Definition 2.3 ([17]). Let f be a mapping from a set X into a set Y and v bea fuzzy set in Y . Then the inverse of v, denoted by f−1(v) a fuzzy set in X, isdefined by f−1(v)(x) = v(f(x)), for all x ∈ X.

Definition 2.4 ([15]). A fuzzy set µ in X is called a fuzzy singleton if and onlyif µ(x) = r, (0 < r ≤ 1) for a certain x ∈ X and µ(y) = 0 for all points y of Xexcept x. The fuzzy singleton is denoted by xr and x is its support. We call xris a fuzzy point if 0 < r < 1. The class of all fuzzy singletons in X is denotedby S(X).

Definition 2.5 ([3]). A fuzzy topology t on X is a collection of members of IX

which is closed under arbitrary suprema and finite infima and which containsconstant fuzzy sets 1 and 0. The pair (X, t) is called a fuzzy topological space(fts, in short) and members of t are called t-open (or simply open) fuzzy sets.A fuzzy set µ is called t-closed (or simply closed) fuzzy set if 1− µ ∈ t.

Definition 2.6 ([3]). A function f from a fuzzy topological space (X, t) into afuzzy topological space (Y, s) is called fuzzy continuous if and only if for everyu ∈ s, f−1(u) ∈ t.

Page 310: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

296 RUHUL AMIN and SAHADAT HOSSAIN

Definition 2.7 ([7]). A fuzzy singleton xr is said to be quasi-coincident with afuzzy set µ, denoted by xrqµ iff r + µ(x) > 1. If xr is not quasi-coincident withµ, we write xrqµ.

Definition 2.8 ([8]). Let X be any non empty set and S and T be any twogeneral topologies on X then the triple (X,S, T ) is called bitopological space.

Definition 2.9 ([7]). A fuzzy bitopological space (fbts, in short) is a triple(X, s, t) where s and t are arbitrary fuzzy topologies on X.

Definition 2.10 ([10]). A function f from a fuzzy bitopological space (X, s, t)into a fuzzy bitopological space (Y, s1, t1) is called FP -continuous if and only iff : (X, s)→ (Y, s1) and f : (X, t)→ (Y, t1) are both fuzzy continuous.

Definition 2.11 ([14]). Let (Xi, si, ti), i ∈∧ be a family of fuzzy bitopological

spaces. Then the space (∏Xi,

∏si,∏ti) is called product fuzzy bitopological

space of the family (Xi, si, ti), i ∈∧, where

∏si,∏ti respectively denote the

usual product fuzzy topologies of the families ∏si : i ∈

∧ and

∏ti : i ∈

of the fuzzy topologies on X.

A fuzzy topological property P is called productive if the product of a familyof fbts, each having property P , has property P .

3. The main results

The aim of this section is to introduce a new notion of fuzzy pairwise connect-edness in fuzzy bitopological spaces by using quasi-coincidence sense.

Definition 3.1 ([2]). An fbts (X, s, t) is called pairwise fuzzy connected if Xhas no proper fuzzy sets u ∈ s, v ∈ t such that u+ v = 1.

Definition 3.2 ([2]). An fbts (X, s, t) is called pairwise fuzzy strongly connectedif it has no proper fuzzy sets u, v ∈ sc ∪ tc such that u+ v ≤ 1.

Definition 3.3. An fbts (X, s, t) is called pairwise fuzzy q-connected if it hasno proper fuzzy sets u ∈ sc, v ∈ tc such that uqv.

Theorem 3.1. In a fuzzy bitopological space, the following implications hold:

Pairwise fuzzy strongly connectedness

Pairwise fuzzy q-connectedness

Pairwise fuzzy connectedness.

Page 311: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

PAIRWISE CONNECTEDNESS IN FUZZY BITOPOLOGICAL SPACES ... 297

Proof. The proof is obvious.

However, the converses are not true in general as shown in the followingexamples.

Example. Let X = a, b and let s be indiscrete fuzzy topology on X and tbe discrete fuzzy topology on X. Then (X, s, t) is pairwise fuzzy q-connectedbut not pairwise strongly fuzzy connected.

Example. Let X = [0, 1]. Let s be a fuzzy topology on X generated byu where u(x) = 0.7 for all x ∈ X. Again, let t be a fuzzy topology on Xgenerated by v where v(x) = 0.6 for all x ∈ X. Then (X, s, t) is pairwisefuzzy connected but not pairwise fuzzy q-connected.

Theorem 3.2. An fbts (X, s, t) is pairwise fuzzy q-connected iff it has no properfuzzy sets u ∈ s, v ∈ t such that u+ v ≥ 1.

Proof. Suppose (X, s, t) is not pairwise fuzzy q-connected. Then there existfuzzy sets u ∈ sc, v ∈ tc such that uqv. That is, u(x) + v(x) ≤ 1 for all x ∈ X.Put α = 1− u, β = 1− v. Then α ∈ s, β ∈ t such that

α(x) + β(x) ≥ 1 for all x ∈ X.

Hence α+ β ≥ 1 which is a contradiction.

Conversely, suppose that (X, s, t) contains fuzzy sets u ∈ s, v ∈ t such thatu+ v ≥ 1. Put λ = 1− u, µ = 1− v. Then λ ∈ sc, µ ∈ tc. Now

λ(x) + µ(x) = 1− u(x) + 1− v(x) = 2− (u(x) + v(x)) ≤ 1,

since u + v ≥ 1. Thus (X, s, t) is not pairwise fuzzy q-connected which is acontradiction and hence the proof is complete.

Theorem 3.3. An fbts (X, s, t) is pairwise fuzzy q-connected if X contains noproper fuzzy set u such that u is both s-open and t-closed or both t-open ands-closed.

Proof. Suppose that X contains no proper fuzzy set u such that u is boths-open and t-closed. Then by definition, 1− u is s-closed fuzzy set. Now,

(1− u)(x) + u(x) = 1 ≤ 1 for all x ∈ X.

That is, (1− u)qu. Hence (X, s, t) is not pairwise fuzzy q-connected

Theorem 3.4. Let (X, s, t) be a fuzzy topological space, A ⊂ X. If A isa pairwise fuzzy q-connected subset of X, then for any fuzzy sets u ∈ s, v ∈t, µA ≤ u+ v implies either µA ≤ u or µA ≤ v.

Page 312: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

298 RUHUL AMIN and SAHADAT HOSSAIN

Proof. Suppose that A is not pairwise fuzzy q-connected subset of X. Thenthere exist fuzzy sets λ ∈ sc, δ ∈ tc such that (i) λ/A = 0, (ii) δ/A = 0 and(iii) (λ/A)q(δ/A). Now, (iii) implies that

(λ/A)(x) + (δ/A)(x) ≤ 1 . . . . . . . . . (iv)

Now, if we put u = 1 − λ, v = 1 − δ then u/A = 1 − λ/A and v/A = 1 − δ/A.Hence (i), (ii) and (iv) imply that µA ≤ u+ v but µA ≤ u and µA ≤ v.

Theorem 3.5. If F is a subset of an fbts (X, s, t) such that µF is both s-openand t-closed in X, then X is pairwise fuzzy q-connected implies that F is apairwise q-connected subset of X.

Proof. Suppose F is not pairwise q-connected subset of X. Then there existfuzzy sets u ∈ sc, v ∈ tc such that

(i)u/F = 0, (ii)v/F = 0 and (iii) (u/F )q(v/F ).

Now (iii) implies that

(u/F )(x) + (v/F )(x) ≤ 1 for all x ∈ F .

Since µF is s-open, then 1− µF is s-closed. Now we have

(u ∩ (1− µF ))(x) + (v ∩ µF )(x) ≤ 1, for all x ∈ X.

Also by (i) and (ii), we get

u ∩ (1− µF ) = 0 and v ∩ µF = 0.

So, X is not pairwise fuzzy q-connected which is a contradiction.

Theorem 3.6. If A and B are two subsets of a fuzzy bitopological space (X, s, t)and µA ≤ µB ≤ µA and A is a pairwise fuzzy q-connected subset of X, then Bis a pairwise fuzzy q-connected subset of X.

Proof. Suppose B is not pairwise fuzzy q-connected subset of X. Then thereexist fuzzy sets u ∈ sc, v ∈ tc such that

(i)u/B = 0, (ii)v/B = 0 and (iii) (u/B)q(v/B).

We first show that u/A = 0. Suppose u/A = 0. Then it is clear that

u(x) + µA(x) ≤ 1 for all x ∈ A.

This implies thatu(x) + µA(x) ≤ 1 for all x ∈ A.

So,u(x) + µB(x) ≤ 1 for all x ∈ A

Page 313: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

PAIRWISE CONNECTEDNESS IN FUZZY BITOPOLOGICAL SPACES ... 299

since µB ≤ µA. Hence u/B = 0 which is a contradiction as u/B = 0. Therefore,u/A = 0. Similarly, we can show that v/A = 0.

Now from (iii) we get

u/B(x) + v/B(x) ≤ 1 for all x ∈ B.

So, we have u/A(x)+v/A(x) ≤ 1 for all x ∈ A. as µA ≤ µB. Hence (u/A)q(v/A).Therefore A is not pairwise fuzzy q-connected subset of X which is a contradic-tion.

In following theorem, we observe here that our concept is preserved underfuzzy continuous mapping.

Theorem 3.7. Let (X, s, t) and (Y, s1, t1) be two fuzzy bitopological spaces andf : X → Y be FP -continuous. Then X is pairwise fuzzy q-connected implies Yis pairwise fuzzy q-connected.

Proof. Suppose Y is not pairwise fuzzy q-connected. Then there exist fuzzysets u ∈ sc1, v ∈ tc1 such that uqv. That is, u(y) + v(y) ≤ 1 for all y ∈ Y .Since f is continuous, then f−1(u) and f−1(v) are non-zero s-open and t-closedrespectively. Now

f−1(u)(x) + f−1(v)(x) = u(f(x)) + v(f(x)) ≤ 1,

for all x ∈ X since uqv. Hence f−1(u)qf−1(v). Therefore X is not pairwisefuzzy q-connected which is a contradiction.

In the following theorem, we show that the productivity property holds inpairwise fuzzy q-connected spaces.

Theorem 3.8. Product space is pairwise fuzzy q-connected if coordinate spacesare pairwise fuzzy q-connected.

Proof. Let (X, s1, t1) and (Y, s2, t2) be two fuzzy bitopological spaces. Sup-pose the product space (X×Y, s1×s2, t1×t2) is not pairwise fuzzy q-connected.Then there exist fuzzy sets u × v ∈ t1 × t2, α × β ∈ t1 × t2 such that u × v =1, α× β = 1 and for every x ∈ X, y ∈ Y

(u× v)(x) + (α× β)(x, y) ≥ 1.

That is, minu(x), v(y) + minα(x), β(y) ≥ 1. Hence u(x) + α(x) ≥1 and v(y) + β(y) ≥ 1. Therefore, the coordinate spaces are not pairwise fuzzyq-connected which is a contradiction.

References

[1] D. M. Ali, Some other types of Fuzzy connectedness, Fuzzy Sets and Sys-tems, 46 (1992), 55-61.

Page 314: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

300 RUHUL AMIN and SAHADAT HOSSAIN

[2] V. Chandrasekar and G. Balasubramanian, Weaker forms of connectednessand stronger forms of disconnectedness in fuzzy bitopological spaces, IndianJ. pure appl. Math., 33 (2002), 955-965.

[3] C. L. Chang, Fuzzy topological spaces, Journal of Mathematical Analysisand Applications, 24 (1968), 190-201.

[4] U. V. Fatteh and D. S. Bassan, Fuzzy connectedness and Its stronger forms,Journal of Mathematical Analysis and Applications, 111 (1985), 449-464.

[5] B. Ghosh, Fuzzy extremally disconnected space, Fuzzy Sets and Systems, 46(1992), 245-250.

[6] G. Jager, Compactness and connectedness as absolute properties in fuzzytopological spaces, Fuzzy Sets and Systems, 94 (1998), 405-410.

[7] A. Kandil and M. E. El-Shafee, Separation axioms for fuzzy bitopologicalspace, Journal of Institute of Mathematics and Computer Sciences, 4 (3)(1991), 373-383.

[8] J. C. Kelly, Bitopological space, Proc. London Math. Soc., 13 (1963), 71-89.

[9] R. Lowen and A. K. Srivastava, On Preuss’ connectedness concept in FTS,Fuzzy Sets and Systems, 47 (1992), 99-104.

[10] A. Mukherjee, Completely induced bifuzzy topological spaces, Indian J. pureappl Math., 33 (6) (2002), 911-916.

[11] J. H. Park and B. Y. Lee, Fuzzy pairwise extremally disconnected spaces,Fuzzy sets and systems, 98 (1998), 201-206.

[12] A. K. Srivastava and D. M. Ali, A note on K. K. Azads fuzzy Hausdorffnessconcepts, Fuzzy sets and Systems, 42 (1991), 363-367.

[13] U. D. Tapi and B. A. Deole, Strongly connectedness in fuzzy closure spaces,Annals of Pure and Applied Mathematics 8 (1) (2014) 77-82.

[14] C. K. Wong, Fuzzy topology: product and quotient theorems, Journal ofMathematical Analysis and Applications, 45 (1974), 512-521.

[15] C. K. Wong, Fuzzy points and local properties of fuzzy topology, Journal ofMathematical Analysis and Applications, 46 (1974), 316-328.

[16] P. Wuyts, Fuzzy path and fuzzy connectedness, Fuzzy Sets and Systems, 24(1987), 127-128.

[17] L. A. Zadeh, Fuzzy sets, Information and Control, 8 (1965), 338-353.

Accepted: 13.08.2017

Page 315: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (301–310) 301

HOPF BIFURCATION ANALYSIS AND AMPLITUDECONTROL OF A NEW 4D HYPER-CHAOTIC SYSTEM

Ping CaiSchool of Mathematics and Statistics

Minnan Normal University

Zhangzhou 363000

China

[email protected]

Abstract. Hopf bifurcation and amplitude control in a new 4D hyper-chaotic systemare investigated in this paper. Theoretical analysis shows that the system will exhibitHopf bifurcation at equilibrium when the Hopf bifurcation conditions are satisfied. Re-lationship between the amplitude and control gains is given. Hence the amplitude of thelimit cycle can be controlled by choosing suitable control gains, ensuring the stability ofthe bifurcating period solution. Finally, some applications of the amplitude control arecarried out to illustrate the effectiveness of the main theoretical results. The accuracyof different kinds of control function are also compared.

Keywords: 4D hyper-chaotic system, Hopf bifurcation, limit cycle, amplitude control.

1. Introduction

Dynamics of nonlinear system is very rich in terms of bifurcation and chaos, andthey have great potential applications in many areas of science, biology and en-gineering. Bifurcation analysis and control have been studied as early as in 60sof the last century, which play an important role in modern nonlinear dynamics[1, 2, 3, 4, 5]. In general, bifurcation control deals with designing a control law tomodify the bifurcation characteristics. More specifically, in dynamic bifurcationcontrol, Hopf bifurcation control has an essential role. During the last few years,great efforts have been devoted to investigating chaotic systems, such as Lorenzsystem [6], Chua’s system [7], Chen system [8], Lu system [9], Liu system [10], Tsystem [11] and other new chaotic system [12]. The problem of amplitude con-trol of the bifurcated solution is becoming more and more widely concerned byresearchers [13, 14, 15]. On the one hand, decreasing the amplitude can inhibitthe harmful vibration behavior of the system. On the other hand, increasingthe amplitude can make the vibration used by people. 4D hyper-chaotic systemhas more complicated dynamical behavior, which has recently become a hottopic [16, 17, 18, 19]. Base on Lorenz system, a new four-dimensional quadratic

Page 316: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

302 PING CAI

autonomous hyper-chaotic attractors is present in Ref.[20],

(1)

x1 = a(x2 − x1),x2 = bx1 − x2 + ex4 − x1x3,x3 = −cx3 + x1x2 + x21,x4 = −dx2,

where x1, x2, x3, x4 are the state variables, a, b, c, d, e are positive real param-eters. Several properties of system (1) were investigated, including analysis ofHopf bifurcation and estimation of ultimate bound. In this paper, we would liketo investigate Hopf bifurcation and amplitude control of the system.

The rest of this paper is organized as follows. In Section 2, the local stabil-ity and Hopf bifurcation at the equilibrium are analyzed, then the bifurcationbehavior in the model is given. In Section 3, a control strategy based on theintroduction control parameters with quadratic nonlinearities is applied to themodel. The relationship between the amplitude of the limit cycle and the controlgains is given by using the normal form theory and the center manifold theorem.In Section 4, some applications of the amplitude control are given, and the ef-fectiveness of the control strategy is verified through numerical simulation. Theaccuracy for different cases of control functions are compared. Conclusions aregiven in Section 5 finally.

2. Local stability and Hopf bifurcation analysis

Obviously, system (1) has only one equilibrium at S0(0, 0, 0, 0). The Jacobianmatrix of system (1) at the equilibrium S0 is given by

(2) J =

−a a 0 0b −1 0 e0 0 −c 00 −d 0 0

.

And the characteristic equation is

(3) λ4 + k1λ3 + k2λ

2 + k3λ+ k4 = 0,

where

k1 = 1 + a+ c,

k2 = a− ab+ c+ ac+ de,

k3 = ac− abc+ ade+ cde,

k4 = acde.

Page 317: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

HOPF BIFURCATION ANALYSIS AND AMPLITUDE CONTROL... 303

Computing the following determinants:

∆1 = k1,

∆2 =

∣∣∣∣ k1 1k3 k2

∣∣∣∣ = k1k2 − k3,

∆3 =

∣∣∣∣∣∣k1 1 0k3 k2 k10 k4 k3

∣∣∣∣∣∣ = k3(k1k2 − k3)− k21k4,

∆4 =

∣∣∣∣∣∣∣∣k1 1 0 0k3 k2 k1 10 k4 k3 k20 0 0 k4

∣∣∣∣∣∣∣∣ = k4∆3.

If k1 > 0, k3 > 0, k4 > 0 and k3(k1k2−k3)−k21k4 > 0, then ∆i > 0(i = 1, 2, 3, 4).Based on Routh-Hurwitz criteria, all roots of the characteristic equation havenegative real parts. Thus, S0 is locally asymptotically stable. If k3(k1k2− k3)−k21k4 ≤ 0, and ki > 0(i = 1, 2, 3, 4), S0 is unstable and non-hyperbolic. Taking bas the Hopf bifurcation parameter, by the equation

(4) k3(k1k2 − k3)− k21k4 = 0,

we get the critical value

(5) b0 =a+ a2 + de

a+ a2.

When b = b0, the Jacobian matrix J has a pair of imaginary eigenvalues asfollows:

(6) λ1,2 = ±iω0 = ±i√

ade

1 + a.

The other two eigenvalues are

(7) λ3 = −1− a < 0

and

(8) λ4 = −c < 0.

Under these conditions, the following transversality condition is also satisfied:

(9) α′(0) = Re(λ′(0)|λ=iω0) =(1 + a)(3adek1k5 + 2cω0k6k7)

ade(9k8 + 4k9)= 0,

Page 318: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

304 PING CAI

where

k5 = cde+ a(c+ de+ cde) + a2(c+ 2de),

k6 = c+ 2ac+ a2c− ade,k7 = de+ (1 + ω0)(a

2 + a),

k8 = ade(1 + a)(1 + a+ c)2,

k9 = ((1 + a)2c− ade)2.

Therefore, system (1) undergoes Hopf bifurcation at S0(0, 0, 0, 0) based onHopf bifurcation theory [21]. The bifurcation results a family of limit cyclesemerging from the equilibrium S0 at the sufficiently small neighborhood of b0.Next, a control strategy is applied to the model to control the amplitude of thelimit cycle.

3. Relationship between the amplitude of limit cycle and controlgains

In this section, a control strategy is applied to the model. The control functionsare introduced for the quadratic nonlinearities of system (1), as shown below:

(10)

x1 = a(x2 − x1),x2 = bx1 − x2 + ex4 − f(m) ∗ x1x3,x3 = −cx3 + g(n) ∗ (x1x2 + x21),x4 = −dx2,

where f(m) and g(n) are control functions. In general, the threshold of bi-furcation is determined by the linear parts of the system, and the stabilityof bifurcating solution is determined by the non-linear parts of the system.So, the control approach do not shift the bifurcation critical value. And theoriginal equilibrium S0(0, 0, 0, 0) is also preserved. By the linear transform(x1, x2, x3, x4)

T = P (X1, X2, X3, X4)T , where

(11) P =

(a2+a)ω0

d(a2+a+de)−ae

a2+a+de−a2−ad 0

ω0d 0 1+a

d 00 0 0 10 1 1 0

,

then system (10) has the following normal form:

(12)

X1 = −ω0X2 + F1(X1, X2, X3, X4),

X2 = ω0X1 + F2(X1, X2, X3, X4),

X3 = λ3X3 + F3(X1, X2, X3, X4),

X4 = λ4X4 + F4(X1, X2, X3, X4),

Page 319: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

HOPF BIFURCATION ANALYSIS AND AMPLITUDE CONTROL... 305

where F1, F2, F3, F4 are high order nonlinear functions about X1, X2, X3, X4 ,which are shown as follows:

F1(X1, X2, X3, X4)

=(1 + a)(a2 + 2a+ de+ 1)f(m)(−a2ω0X1X4 + aω2

0X2X4 + (a4 + a3 + a2de)X3X4)

ω0(a2 + de+ a)(a3 + 3a2 + 3a+ ade+ 1),

F2(X1, X2, X3, X4)

=af(m)((1 + a)2ω0X1X4 − (1 + a)deX2X4 − (a4 + 3a3 + 3a2 + a+ (1 + a)2de)X3X4)

a5 + 4a4 + 2a3(3 + de) + 4a2(1 + de) + a(1 + 3de+ d2e2) + de,

F3(X1, X2, X3, X4)

=(a2 + a)f(m)(−(1 + a)ω0X1X4 + deX2X4 + (1 + a)(a+ a2de)X3X4)

a5 + 4a4 + 2a3(3 + de) + 4a2(1 + de) + a(1 + 3de+ d2e2) + de,

F4(X1, X2, X3, X4)

=ag(n)((1 + a)(2a+ 2a2 + de)ω2

0X21 − (3a2de+ 3ade+ d2e2)ω0X1X2 + ad2e2X2

2 )

d(a+ a2 + de)

+ a(a+ 1)g(n)

((1− de− 2a− 3a2)ω0

dX1X3 + ae(2a− 1)X2X3

+(a2 − 1)(a2 + a+ de)

dX2

3

).

Based on the center manifold theory and normal form reduction, the curva-ture coefficient is expressed by the following according to Ref. [21]:

(13) σ1 = Re

g20g112ω0

i+G1110w

111 +G2

110w211 +

G21 +G1101w

120 +G2

101w220

2

.

The characteristic quantities can be calculated from system (12) as follows:

g11 = 0, g20 = 0, G1110 = 0, G1

101 = 0, G21 = 0, w111 = 0, w1

20 = 0,

G2110 =

−(a(a+ 1)2 + i(a2 + a)ω0)f(m)

2(a3 + 3a2 + 3a+ ade+ 1),

G2101 =

−a5 − 3a3 − 3a2 − a2de+ ade− a+ iω0(a3 + 4a2 + 5a+ ade+ de+ 2)

2(a2 + a+ de)(a3 + 3a2 + 3a+ ade+ 1),

w211 =

a2eg(n)

cd(a2 + a+ de),

w220 =

((−2a3 − 2a2)i+ (3a2 + 3a+ de)ω0)aeg(n)

2d(a2 + a+ de)2(2ω0 − ic).

So an explicit expression of the curvature coefficient is written as:

(14) σ1 = −a2e√

1 + af(m)g(n)(k10 + k11)

8cdk12k13,

Page 320: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

306 PING CAI

where

k10 =√

1 + a(−2cω20 + ac2(6 + de) + 2a3(3c2 + 8de)),

k11 = 2a2√

1 + a(6c2 + 8de+ cω20),

k12 = (1 + a)c2 + 4ade,

k13 = a5 + 4a4 + 2a3(3 + de) + 4a2(1 + de) + a(1 + 3de+ d2e2) + de.

Therefore, the approximate amplitude in close vicinity to the Hopf bifurcationpoint is

r =

√−α

′(0)

σ1(b− b0)

=

√8√

1 + ack12k13(3adek1k5 + 2cw0k6k7)

a3e2f(m)g(n)(9k8 + 4k9)(k10 + k11)(b− b0), |b− b0| ≪ 1.(15)

4. Application of amplitude control

It should be pointed out that Eq.(15) describes the relationship between theamplitude of the state variable x1 and the control functions. Other linear trans-formation can be chosen to describe the amplitude of the other state variables.We choose a = 2, c = 1, d = 3, e = 4, then b0 = 3, α′(0) = 0.484654, σ1 =−0.0546643f(m)g(n). Obviously, σ1 degrade into the curvature coefficient ofthe original system(1) when f(m)g(n) = 1. If f(m)g(n) > 0, the bifurcatedlimit cycle is stable, and then the parameter µ2 = − σ1

α′(0) > 0, where the Hopfbifurcation is supercritical and the bifurcating periodic solutions exist for b > b0.Since this control strategy does not change the bifurcation critical value of thesystem, it means that both the original system and the controlled system bifur-cated at b0 = 3. The bifurcation figures are shown in Fig.1.

2.8 3.0 3.2 3.4 3.6 3.8

-0.5

0.0

0.5

b

x 1

(a) the original system

2.8 3.0 3.2 3.4 3.6 3.8

-0.4

-0.2

0.0

0.2

0.4

b

x 1

(b) the controlled system

Fig. 1. Bifurcation diagrams of the original system and the controlled system at equilibriumS0.

Page 321: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

HOPF BIFURCATION ANALYSIS AND AMPLITUDE CONTROL... 307

Setting b = 3.10, time displacement curves of the period solutions underdifferent value of control gains are shown in Fig.2 and Fig.3, respectively. Thesolid lines denote the period solutions of the original system while the dashedlines represent the period solutions of the controlled system. It can be seen thatunder different values of the control functions, the amplitude can be large orsmall. Other values can be similar.

400 405 410 415 420 425 430

-0.4

-0.2

0.0

0.2

0.4

t

x 1

400 405 410 415 420 425 430

0.1

0.2

0.3

0.4

0.5

0.6

t

x 3Fig. 2. Time displacement curves of period solutions (0 < f(m)g(n) < 1, 0 < f(m) <1).

400 405 410 415 420 425 430

-0.3

-0.2

-0.1

0.0

0.1

0.2

0.3

t

x 1

400 405 410 415 420 425 430

0.06

0.08

0.10

0.12

t

x 3

Fig. 3. Time displacement curves of period solutions (f(m)g(n) > 1, f(m) >1).

For simplicity, suppose m = n. Let f(m) = m, while g(m) = m+ 1, g(m) =1

m+1 , g(m) = em and g(m) = 1em , the accuracy of approximate solution of

amplitude(15) and numerical solution is compared in Fig.4. In this case, thedotted lines represent the approximate solution, and the solid lines representthe numerical solution.

5. Conclusion

This paper is concerned about Hopf bifurcation and amplitude control of ahyper-chaotic system. Applying Routh-Hurwitz criterion, the stability of theequilibrium is investigated. Then the existence of Hopf bifurcation is givenbased on Hopf bifurcation theory. A control approach is applied to the system,which not only keeps the equilibrium structure of the original system, but alsonot change the Hopf bifurcation critical value. By the normal form theory andthe center manifold theorem, the relationship between the amplitude of the limit

Page 322: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

308 PING CAI

0 10 20 30 40 50

0.05

0.10

0.15

0.20

m

r

(a) f(m) = m, g(m) = m+ 1

0 10 20 30 40 50

0.96

0.98

1.00

1.02

1.04

m

r

(b) f(m) = m, g(m) = 1m+1

0 10 20 30 40 500.000

0.001

0.002

0.003

0.004

0.005

0.006

m

r

(c) f(m) = m, g(m) = em

0 10 20 30 40 500

5.0´107

1.0´108

1.5´108

2.0´108

2.5´108

3.0´108

3.5´108

mr

(d) f(m) = m, g(m) = e−m

Fig. 4. The accuracy of approximated solution of amplitude and numericalsolution.

cycle and the control gains is presented. Numerical simulations show, in case ofthe stability of the bifurcating periodic solutions, the control law can increase ordecrease the amplitude of the periodic solution effectively under different controlgains. The accuracy of different kinds of control functions is also compared.

Acknowledgment

The author wishes to thank the anonymous reviewers for their valuable com-ments and suggestions.

Project supported by Natural Science Foundation of Fujian Province ofChina (No. 2017J05012); and National Natural Science Foundation of Chinafor Youth (Nos. 61403181, 61603174); and the Institute of Meteorological BigData-Digital Fujian and Fujian Key Laboratory of Date Science and Statistics.

References

[1] C.X. Liang, J.S. Tang, Equilibrium points and bifurcation control of achaotic system, Chin. Phys. B, 17 (2008), 0135-0139.

[2] S.H. Liu, J.S. Tang, J.Q. Qin and X.B. Yin, Bifurcation analysis and controlof periodic solutions changing into invariant tori in Langford system, Chin.Phys. B, 17 (2008), 1691-1697.

Page 323: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

HOPF BIFURCATION ANALYSIS AND AMPLITUDE CONTROL... 309

[3] G.R. Jiang, B.G. Xu and Q.G. Yang, Bifurcation control and chaos in alinear impulsive system, Chin. Phys. B, 18 (2009), 5235-5241.

[4] J. Zhou, Bifurcation analysis of the Oregonator model, Appl. Math. Lett.,52 (2016), 192-198.

[5] D.W. Ding, X.Y. Zhang, J.D. Cao, N. Wang and D. Liang, Bifurcationcontrol of complex networks model via pd controller, Neurocomputing, 175(2016), 1-9.

[6] H.W. Li and M. Wang, Hopf bifurcation analysi in a Lorenz-type system,Nonlinear Dyn., 71 (2013), 235-240.

[7] J.H. Yang and L.Q. Zhao, Bifurcation analysis and chaos control of themodified Chua’s circuit system, Chaos Soliton Fract., 77 (2015), 332-339.

[8] Z.S. Cheng, Anti-control of Hopf bifurcation for Chen’s system throughwashout filters, Neurocomputing, 73 (2010), 3139-3146.

[9] Z.S. Lu and L.X. Duan, Control of codimension-2 bautin bifurcation inchaotic lu system, Commun. Theor. Phys., 52 (2009), 631-636.

[10] Z.S. Lu and L.X. Duan, Anti-control of Hopf bifurcation in the chaotic Liusystem with symbolic computation, Chin. Phys. Lett., 26 (2009), 050504.

[11] R.Y. Zhang, Bifurcation analysis for T system with delayed feedback andits application to control of chaos, Nonlinear Dyn., 72 (2013), 629-641.

[12] P. Cai and Z.Z. Yuan, Hopf bifurcation and chaos control in a new chaoticsystem via hybrid control strategy, Chinese J. Phys., 55 (2017), 64-70.

[13] J.S. Tang, F. Han, H. Xiao and X. Wu, Amplitude control of a limit cyclein a coupled van der Pol system, Nonlinear Anal.-Theor., 71 (2009), 2491-2496.

[14] C. Yan, S.H. Liu, J.S. Tang and Y.M. Meng, Amplitude control of limitcycles in Langford system, Chaos Soliton Fract., 42 (2009), 335-340.

[15] P. Cai, J. S. Tang, Control of amplitude of limit cycles in a class of stronglynonlinear oscilation systems, J. Vib. Shock (in Chinese), 32 (2013), 110-112.

[16] C.L. Li, K.L. Su, J. Zhang and D.Q. Wei, Robust control for fractional-orderfour-wing hyperchaotic system using LMI, Optik, 12 (2013), 5807-5810.

[17] W. Xue, G.Y. Qi, J.J. Mu, H.Y. Jia and Y.L. Guo, Hopf bifurcation analy-sis and circuit implementation for a novel four-wing hyper-chaotic system,Chin. Phys. B, 22 (2013), 080504.

[18] P. Cai, J.S. Tang and Z.B. Li, Controlling Hopf bifurcation of a new modifiedhyperchaotic system, Math. Prob. Eng., 2015, 614135.

Page 324: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

310 PING CAI

[19] L.L. Zhou, Z.Q. Chen, Z.L. Wang and J.Z. Wang, On the analysis of localbifurcation and topological horseshoe of a new 4D hyper-chaotic system,Chaos Soliton Fract., 91 (2016), 148-156.

[20] A. Zarei and S. Tavakoli, Hopf bifurcation analysis and ultimate boundestimation of a new 4-D quadratic autonomous hyper-chaotic system, Appl.Math. Comput., 291 (2016), 323-339.

[21] B.D. Hassard, N.D. Kazarinoff and Y. Wan, Theory and Applications ofHopf Bifurcation, Theory and Applications of Hopf Bifurcation, LondonCambridge Univ., 1981.

Accepted: 1.09.2017

Page 325: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (311–328) 311

SOLUTION OF LINEAR AND NONLINEAR SINGULARBOUNDARY VALUE PROBLEMS USING LEGENDREWAVELET METHOD

Javid Iqbal∗

Department of Mathematical SciencesBGSB UniversityRajouri-185234, J & [email protected]

Rustam AbassDepartment of Mathematical SciencesBGSB UniversityRajouri-185234, J & [email protected]

Puneet KumarDepartment of Applied Sciences

Dronacharya College

Greater Noida-201308, U.P.

India

[email protected]

Abstract. In this paper, we utilize a robust and precise method for solving both linearand nonlinear singular initial or boundary value problems. We use Legendre waveletsto construct operational matrix of integration and product operational matrix to solvethe problems. This method reduces the problems into algebraic equations and givesa fast convergent series of easily computable components. Illustrative examples areincorporated to show the productivity and exactness of the technique. The outcomesobtained by the utilized method demonstrate that the proposed way is entirely sensiblewhen compared with exact solution.

Keywords: Legendre wavelets, operational matrix of integration, product operationalmatrix, singular value problems, MATLAB.

1. Introduction

The investigation of singular initial as well as boundary value problems of thesecond order ordinary differential equations (ODEs) have attracted a special at-tention of many mathematicians and physicists. One of the equations describing

∗. Corresponding author

Page 326: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

312 JAVID IQBAL, RUSTAM ABASS and PUNEET KUMAR

this type is formulated as

(1.1) y′′(t) + p(t)y′(t) + q(t)y(t) = f(t), a < t < b,

with the initial conditions

y(a) = α1, y′(a) = α2

or boundary conditions

y(a) = α1, y(b) = α2,

where a, b, α1 andα2 are finite constants, whereas the coefficients p(t), q(t) andf(t) are given continuous functions. Eq.(1.1) with singularities appears to manyphenomena in mathematical physics, astrophysics, chemistry and mechanicssuch as in the theory of stellar structure, the thermal behavior of a sphericalcloud of gas, isothermal gas sphere, and theory of thermionic currents. Whilemaking the model in these fields, singularity typically occurs at the end of theinterval of integration which causes the computed solution in losing its accuracyin the vicinity of the singular points. A systematic study of the formulationof these models and the physical structure of the solutions can be found in[5, 7, 10, 12]. Due to the presence of singularity, it is not easy to derive theanalytical or exact solutions of most of the singular boundary value problems,so that it requires an efficient and accurate numerical method for solving thesekind of problems. A number of mathematicians and physicists have attemptedto solve these sort of problems which are available in the literature. Biazar etal. [3] used He’s variational iteration method for solving linear cum nonlin-ear ordinary differential equations. Lu [18] employed the variational iterationmethod for solving a nonlinear system of second-order boundary value problems.Rashidinia et al. [22] suggested a convergence of cubic-spline technique for solv-ing boundary-value problems, while B-spline approach has been used by Caglaret al. [4]. Later on, Tatari et al. [26] generalized He’s variational iterationmethod for solving the same systems of singular initial value problems. Homo-topy perturbation with reproducing kernel has been applied by Geng and Cui[11] whereas Akinfenwa et al. [1] have employed the continuous block backwarddifferentiation formula for solving the same behaviour Stiff differential equations.Again Dehghan and Nikpour [9] showed their interest to solve singular initialvalue problem by differential quadrature collocation method based on local ba-sis functions. Moreover, Kadalbajoo and Aggarwal [14] have also employed amethod based on Chebyshev polynomials coupled with B-spline for solving sin-gular boundary value problems in which they have suggested the economizedexpansion procedure to avoid the singularity from the singular BVPs. Althoughall these methods has successfully solved these type of problems but still smallconvergence rate and high computational efforts compel us to use a high ac-curacy and low computational method. For more details, refer [16] and thereferences therein.

Page 327: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOLUTION OF LINEAR AND NONLINEAR SINGULAR BOUNDARY VALUE PROBLEMS ... 313

In recent years, wavelet theory [8] have received a special attention by re-searchers from both theoretical and practical point of view in different fields ofscience and engineering. It possesses several beautiful properties like orthog-onality, compact support, accurate representation of concern polynomial at acertain degree and ability to represent different type of functions at differentlevels of resolution. In addition, wavelet method has made a connection withfast numerical algorithms [2]. From the last decades many wavelet methodssuch as Haar wavelet method [6, 7, 17], Daubechies wavelet method [8, 20],Haar wavelet collocation method [25], Chebyshev wavelet method [13, 15], Leg-endre wavelet method [23, 24, 28] and Laguerre wavelet method [29] were usedto solve differential equations but among them Legendre wavelet method at-tracted much attention. The key strength of Legendre wavelet method (LWM)is to convert the differential equations into a system of algebraic equations bythe operational matrices of integral.

In this paper, we use Legendre wavelet method to solve the singular initialor boundary value problems by using operational matrix of integration alongwith product operational matrix. This paper is organized as follows. In Section2, we present the Legendre wavelets, their approximation and the operationalmatrix of integration. The derivation of product operational matrix and theconvergence analysis of Legendre wavelets is discussed in Section 3. Severalnumerical examples are included in Section 4 to show the efficiency and accuracyof our proposed method. In the end, conclusions are appended.

2. Definition and properties of Legendre wavelets

In this section, we state some necessary definitions and preliminaries of Legendrewavelet theory which are required for establishing our results.

2.1 Wavelets and Legendre wavelets

For last two decades, wavelets have found their ways towards recent fields ofscience and technology. Wavelets constitute a family of functions constructedfrom dilation and translation of a single function called the mother wavelet ψ(t)as:

ψa,b(t) = |a|−12 ψ

(t− ba

)a, b ∈ R, a = 0.

If we choose a = a−k and b = nba−k where a > 1, b > 0 and n, k ∈ Z+, thenwe get the following family of discrete wavelets as

ψk,n(t) = |a|k2 ψ(akt− nb),

where ψk,n(t) forms a basis for L2(R). In particular, when a = 2 and b = 1 thenψk,n(t) forms an orthonormal basis.

Legendre wavelets ψn,m = ψ(k, n,m, t) have four arguments; k = 2, 3, . . . , n =2n − 1, n = 1, 2, 3, . . . , 2k−1, m is the order of Legendre polynomials and t de-

Page 328: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

314 JAVID IQBAL, RUSTAM ABASS and PUNEET KUMAR

notes the time. Legendre wavelets defined in [24] are as follows:

(2.1) ψn,m(t) =

√(m+ 1

2

)2k2Tm(2kt− 2n+ 1), t ϵ [2n−2

2k, 2n2k

],

0, otherwise,

where m = 0, 1, 2, . . . ,M − 1. The coefficient√(

m+ 12

)is for orthonormality,

the dilation parameter is a = 2−k and translation parameter is b = n2−k. Here,Tm(x) are well-known Legendre polynomials of order m which are orthogonalwith respect to the weight function w(t) = 1 on the interval [-1,1] and can bedetermined with the aid of the following recurrence formulae:

T0(t) = 1, T1(t) = t,

Tm+1(t) =

(2m+ 1

m+ 1

)tTm(t)−

(m

m+ 1

)Tm−1(t), m = 1, 2, 3, ....

The set of Legendre wavelets ψn,m(t) also forms an orthonormal set with respectto the weight function w(t) = 1.

2.2 Function approximation

Any function f defined over [0, 1) can be expanded as

(2.2) f(t) =

∞∑n=1

∞∑m=0

cn,mψn,m(t),

where

(2.3) cn,m = ⟨f(t), ψn,m(t)⟩ =

∫ t

0f(t)ψn,m(t)dt.

The series in Eq.(2.2) is truncated, which can then be written as

(2.4) f(t) ≈2k−1∑n=1

M−1∑m=0

cn,mψn,m(t) = CTΨ(t),

where C and Ψ(t) are 2k−1M × 1 matrices are given by

C = [c10, c11, . . . , c1M−1, c20, c21, . . . , c2M−1, . . . ,

c2k−10, c2k−11, . . . , c2k−1M−1]T ,(2.5)

Ψ(t) = [ψ10(t), ψ11(t), . . . , ψ1M−1(t), ψ20(t), ψ21(t), . . . ,

ψ2M−1(t), . . . , ψ2k−10(t), ψ2k−11(t), . . . , ψ2k−1M−1(t)]T.(2.6)

The suitable collocation points depends on resolution are as follows:

(2.7) ti =2i− 1

2kM, i = 1, 2, . . . , 2k−1M.

Page 329: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOLUTION OF LINEAR AND NONLINEAR SINGULAR BOUNDARY VALUE PROBLEMS ... 315

2.3 Operational matrix of integration

The integration of Ψ(t) defined in Eq.(2.6) can be approximated by Legendrewavelet series with Legendre wavelet coefficient matrix P as

(2.8)

∫ t

0Ψ(t)dt = PΨ(t).

Now we construct the structure of operational matrix of integration for ψ(t)which is defined in Eq.(2.1). To illustrate the calculation procedure, we chooseM = 3, k = 2. On the basis of chosen values we get the six basis function whichare given by

Ψ1 = ψ1,0 =

21/2, for t ∈ [0, 12)

0, otherwise., Ψ2 = ψ1,1 =

61/2(4t− 1), for t ∈ [0, 12)

0, otherwise.

Ψ3 = ψ1,2 =

(10)1/2[

3

2(4t− 1)2 − 1

2

], for t ∈ [0, 12)

0, otherwise.,

Ψ4 = ψ2,0 =

21/2, for t ∈ [12 , 1)

0, otherwise.

Ψ5 = ψ2,1 =

61/2(4t− 3), for t ∈ [12 , 1)

0, otherwise.,

Ψ6 = ψ2,2 =

(10)1/2[

3

2(4t− 3)2 − 1

2

], for t ∈ [12 , 1)

0, otherwise.

Thus

(2.9) Ψ6×6 =

√2−2

3

√6

√10

60 0 0

√2 0

√10

20 0 0

√2

2

3

√6

√10

60 0 0

0 0 0√

2−2

3

√6

√10

6

0 0 0√

2 0

√10

2

0 0 0√

22

3

√6

√10

6

.

So, integrating the above defined basis Ψ1,Ψ2,Ψ3,Ψ4,Ψ5,Ψ6 from 0 to t andusing wavelet coefficients, we obtain

Page 330: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

316 JAVID IQBAL, RUSTAM ABASS and PUNEET KUMAR

∫ t

0Ψ1(t)dt =

21/2t, t ∈ [0, 12)

21/2

2, t ∈ [12 , 1)

=

[1

4,

21/2

4× 61/2, 0,

1

2, 0, 0

]TΨ6(t),

∫ t

0Ψ2(t)dt =

2× 61/2t2 − 61/2t, t ∈ [0, 12)

0, t ∈ [12 , 1)

=

[−31/2

12, 0,

31/2

12× 51/2, 0, 0, 0

]TΨ6(t),

Similarly, we have∫ t

0Ψ3(t)dt =

[0,− 51/2

20× 31/2, 0, 0, 0, 0

]TΨ6(t),

∫ t

0Ψ4(t)dt =

[0, 0, 0,

1

4,

21/2

4× 51/2, 0

]TΨ6(t),

∫ t

0Ψ5(t)dt =

[0, 0, 0,

−31/2

12, 0,

31/2

12× 51/2

]TΨ6(t),

∫ t

0Ψ6(t)dt =

[0, 0, 0, 0,

−51/2

20× 31/2, 0,

]TΨ6(t).

Due to the support of Ψi, i = 1, 2, . . . 6, it is obvious that we have matrix Pin [24] as

(2.10) P6×6 =1

4

121/2

61/20 2 0 0

−31/2

30

31/2

3× 51/20 0 0

0−51/2

5× 31/20 0 0 0

0 0 0 121/2

61/20

0 0 0−31/2

30

31/2

3× 51/2

0 0 0 0−51/2

5× 31/20

.

For general case, we have

(2.11) P2k−1M×2k−1M =1

2k

L F F . . . F

O L F. . .

...

O O L. . . F

.... . .

. . .. . . F

O . . . O O L

,

Page 331: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOLUTION OF LINEAR AND NONLINEAR SINGULAR BOUNDARY VALUE PROBLEMS ... 317

where L, F and O are M ×M matrices given by

L =

1√32 0 . . . 0 0

−√33 0

√3

3√5

0 . . . 0

0 −√5

5√3

. . .. . .

. . ....

... 0. . .

. . .. . . 0

.... . .

. . . −√2M−1

(2M−1)√2M−3

. . .√2M−3

(2M−3)√2M−1

0 . . . . . . 0 −√2M−1

(2M−1)√2M−3

0

,

F =

2 0 . . . 0

0 0. . . 0

......

. . ....

0 0 . . . 0

and

O =

0 0 . . . 00 0 . . . 0...

.... . .

...0 0 . . . 0

.

3. The product operational matrix

The following properties of product of two Legendre wavelet functions are alsoused for solving differential as well as integral equations:

(3.1) CTΨ(t)ΨT (t) ≈ CΨT (t),

where C and Ψ(t) are given in Eq.(2.5) and Eq.(2.6), respectively, and C is(2k−1M) × (2k−1M) product operational matrix. To illustrate the calculationprocedure, we choose M = 3, k = 2 and using Ψ(t) as defined in Eq.(2.6), wehave

(3.2) Ψ(t)ΨT (t) =

ψ10ψ10 ψ10ψ11 ψ10ψ12 ψ10ψ20 ψ10ψ21 ψ10ψ22

ψ11ψ10 ψ11ψ11 ψ11ψ12 ψ11ψ20 ψ11ψ21 ψ11ψ22

ψ12ψ10 ψ12ψ11 ψ12ψ12 ψ12ψ20 ψ12ψ21 ψ12ψ22

ψ20ψ10 ψ20ψ11 ψ20ψ12 ψ20ψ20 ψ20ψ21 ψ20ψ22

ψ21ψ10 ψ21ψ11 ψ21ψ12 ψ21ψ20 ψ21ψ21 ψ21ψ22

ψ22ψ10 ψ22ψ11 ψ22ψ12 ψ22ψ20 ψ22ψ21 ψ22ψ22

.

As we know, the support of ψm,n, the entries of vector Ψ(t), are the intervals[2n−22k

, 2n2k

], therefore ψijψkl = 0 if i = k. We also have ψi0ψij = 21/2ψij , ψi1ψi1 =

4

101/2ψi2 + 21/2ψi0.

Page 332: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

318 JAVID IQBAL, RUSTAM ABASS and PUNEET KUMAR

If we retain only the elements of Ψ(t), then we have

Ψ(t)ΨT(t) =

21/2ψ10 21/2ψ11 21/2ψ12 0 0 0

21/2ψ11 21/2ψ10 +4

101/2ψ12

4

101/2ψ11 0 0 0

21/2ψ124

101/2ψ11 21/2ψ10 +

20

7 × 101/2ψ12 0 0 0

0 0 0 21/2ψ20 21/2ψ21 21/2ψ22

0 0 0 21/2ψ21 21/2ψ20 +4

101/2ψ22

4

101/2ψ21

0 0 0 21/2ψ224

101/2ψ21 21/2ψ20 +

20

7 × 101/2ψ22

.

Therefore the 6× 6 matrix C in Eq.(3.1) can be written as

(3.3) C =

[B1 00 B2

],

where Bi, i = 1, 2, are 3× 3 matrices given by

Bi =

21/2ci0 21/2ci1 21/2ci2

21/2ci1 21/2ci0 +4

101/2ci2

4

101/2ci1

21/2ci24

101/2ci1 21/2ci0 +

20

7× 101/2ci2

where ci,d, d = 0, 1, 2 are taken from Eq.(2.5), for more information, one canrefer to [24].

Now, we state the following result regarding the convergence of Legendrewavelet method for expansion of any continuous function f(t) ∈ L2(R).

Theorem 3.1 ([27]). The series solution defined in Eq. (2.4) of Eq. (1.1) usingLegendre wavelet method converges to y(t).

4. Numerical experiment and discussion

In order to show the effectiveness of Legendre wavelet method (LWM), we im-plement LWM to many linear and nonlinear singular ordinary differential equa-tions. All the numerical experiments were carried out with MATLAB R2010band MAPLE 14 codes.

Example 4.1 ([19]). Consider the linear singular initial value problem

(4.1) y′′(t) +2

ty′(t)− 10y(t) = 12− 10t4, 0 < t < 1,

with initial conditions as

y(0) = 0, y′(0) = 0.

First we assume that the unknown function y′′(t) is given by

(4.2) y′′(t) = CTΨ(t).

Page 333: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOLUTION OF LINEAR AND NONLINEAR SINGULAR BOUNDARY VALUE PROBLEMS ... 319

Integrating Eq.(4.2) from 0 to t and using boundary conditions, we have

(4.3) y′(t) = CTPΨ(t) + y′(0).

Again integrating Eq.(4.3) from 0 to t, we obtain

(4.4) y(t) = CTP 2Ψ(t) + ty′(0) + y(0).

We can express2

tand 12− 10t4 as

2

t=

[32

5

√2,−12

5

√6,

24

25

√10,

320

231

√2,−12

77

√6,

8

382

√10

]TΨ(t)

= HT1 Ψ(t),(4.5)

and

12− 10t4 =

[41047

6912

√2,−65

1728

√6,−29

1728

√10,

28087

6912

√2,−425

576

√6,−245

1728

√10

]TΨ(t)

= HT2 Ψ(t).(4.6)

Now substituting Eq.(4.2) to Eq.(4.6) in Eq.(4.1), we get

CTΨ(t) +HT1 Ψ(t)CTPΨ(t)− 10CTP 2Ψ(t) = HT

2 Ψ(t).

Thus with the orthonormality of Legendre wavelet and Eq.(3.1), we have

(4.7) CI6×6 + H1PC − 10P 2TC = HT2 .

where H1 can be calculated similarly to Eq.(3.3) and I is the identity matrix.Eq.(4.7) is a set of algebraic equations which can be solved for C. Substitutingthe value of C in Eq.(4.4), we get the solution of Eq.(4.1). The obtained nu-merical solution of Eq.(4.1) is presented in comparison with the ADM [19] andexact solution y(t) = 2t2 + t4 in Table 4.1 and graphically shown in Figure 4.1.

t LWM Result Ref.[19] Exact

0.1 0.02020000 0.02009999 0.020100000.2 0.08162990 0.08159992 0.081600000.3 0.18811922 0.18809781 0.188100000.4 0.34557010 0.34557801 0.345600000.5 0.56260300 0.56236789 0.562500000.6 0.84980100 0.84902639 0.849600000.7 1.22051000 1.21810873 1.220100000.8 1.68980100 1.68372918 1.689600000.9 2.27620000 2.26081676 2.27610000

Table 4.1 Comparison of the approximate solution of Example 4.1 against theexact and ADM [19] solutions for M = 3, k = 2.

Page 334: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

320 JAVID IQBAL, RUSTAM ABASS and PUNEET KUMAR

Figure 4.1 Comparison of numerical and exact solution.

Example 4.2 ([19]). Consider the linear singular initial value problem

(4.8) y′′(t) +4

ty′(t) +

2

t2y(t) = 12, 0 < t < 1,

with initial conditions asy(0) = 0, y′(0) = 0.

We can express4

tand

2

t2as

4

t=

[64

5

√2,−24

5

√6,

48

25

√10,

640

231

√2,−24

77

√6,

16

385

√10

]TΨ(t)

= HT3 Ψ(t).(4.9)

and

2

t2=

[1504

25

√2,−864

25

√6,

2208

125

√10,

106336

53361

√2,−2592

5929

√6,

7648

88935

√10

]TΨ(t)

= HT4 Ψ(t).

(4.10)

We follow the procedure outlined in Example 4.1 and obtain the algebraicequation as

CTΨ(t) +HT3 Ψ(t)CTPΨ(t) +HT

4 CTP 2Ψ(t) = 12.

Thus using the orthonormality of Legendre wavelet and Eq.(3.1),we have

(4.11) CI6×6 + H3PC + H4P2TC = 12.

Page 335: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOLUTION OF LINEAR AND NONLINEAR SINGULAR BOUNDARY VALUE PROBLEMS ... 321

Where H3 and H4 can be calculated similarly to Eq.(3.3) and I is the identitymatrix. Eq.(4.11) is a set of algebraic equations which can be solved for C.Substituting the value of C in Eq.(4.4), we get the solution of Eq.(4.8). Theobtained numerical solution of Eq.(4.8) is compared with the ADM [19] andexact solution y(t) = t2 in Table 4.2 and graphically shown in Figure 4.2.

t LWM Result Ref.[19] Exact

0.1 0.010000 0.010000 0.0100000.2 0.040000 0.040000 0.0400000.3 0.090000 0.090000 0.0900000.4 0.160000 0.160000 0.1600000.5 0.250000 0.250000 0.2500000.6 0.360000 0.360000 0.3600000.7 0.490000 0.490000 0.4900000.8 0.490000 0.490000 0.4900000.9 0.810000 0.810000 0.810000

Table 4.2 Comparison of the approximate solution of Example 4.2 against theexact and ADM [19] solutions for M = 3, k = 2.

Figure 4.2 Comparison of numerical and exact solution.

Example 4.3 ([19]). Consider the linear singular initial value problem

(4.12) y′′(t) +4

ty′(t) +

(2

t2+ t

)y(t) = 20t+ t4, 0 < t < 1,

with initial conditions asy(0) = 0, y′(0) = 0.

Page 336: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

322 JAVID IQBAL, RUSTAM ABASS and PUNEET KUMAR

We can express 4t and

(2t2

+ t)

as

2

t2 + t=[60.2850

√2, 34.5183

√6, 17.6640

√10, 2.3678

√2, 0.3955

√6,

0.0860√

10]

Ψ(t) = HT5 Ψ(t).(4.13)

(20t+ t4

)=[2.5061

√2, 0.8371

√6, 0.0017

√10, 7.6936

√2,

0.9071√

6, 0.0142√

10]

Ψ(t) = HT6 Ψ(t).(4.14)

The given algebraic equation follows from the procedure configured in Ex-ample 4.1 as

CTΨ(t) +HT3 Ψ(t)CTPΨ(t) +HT

5 CTP 2Ψ(t) = HT

6 Ψ(t).

Applying the orthonormality condition of Legendre wavelet and Eq.(3.1),wehave

(4.15) CI6×6 + H3PC + H5P2TC = HT

6 .

Where H3 and H5 can be calculated similarly to Eq.(3.3) and I is the identitymatrix. Eq.(4.15) is a set of algebraic equations which can be solved for C.Substituting the value of C in Eq.(4.4), we get the solution of Eq.(4.12). Theobtained numerical solution of Eq.(4.12) is presented in comparison with theADM [19] and exact solution y(t) = t3 in Table 4.3 and graphically in Figure4.3.

t LWM Results Ref.[19] Exact

0.1 0.001000 0.001000 0.0010000.2 0.008003 0.008001 0.0080000.3 0.027008 0.027013 0.0270000.4 0.064045 0.064073 0.0640000.5 0.125131 0.125279 0.1250000.6 0.216534 0.216834 0.2160000.7 0.345017 0.345107 0.3430000.8 0.513002 0.516702 0.5120000.9 0.730000 0.738553 0.729000

Table 4.3 Comparison of the approximate solution of Example 4.3 against theexact and ADM [19] solutions for M = 3, k = 2.

Example 4.4 ([21]). Consider the linear singular initial value problem

(4.16) y′′(t) +1

ty′(t) =

(8

8− t2

)2

, 0 < t < 1,

Page 337: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOLUTION OF LINEAR AND NONLINEAR SINGULAR BOUNDARY VALUE PROBLEMS ... 323

Figure 4.3 Comparison of numerical and exact solution.

with initial conditions asy(0) = 0, y′(0) = 0.

We can express 1t and ( 8

8−t2 )2 as

1

t=

[16

5

√2,−6

5

√6,

12

25

√10,

160

231

√2,− 6

77

√6,

4

385

√10

]Ψ(t)

= HT7 Ψ(t).(4.17)

(8

8− t2

)2

=[0.5107

√2, 0.0054

√6, 0.0011

√10, 0.5832

√2,

0.0197√

6, 0.0019√

10]

Ψ(t) = HT8 Ψ(t).(4.18)

We follow the strategy defined in Example 4.1 and obtain the algebraicequation as

CTΨ(t) +HT7 Ψ(t)CTPΨ(t) = HT

8 Ψ(t).

Eq.(3.1) and orthonormality of Legendre wavelet together give putting, wehave

(4.19) CI6×6 + H7PC = HT8 .

Where H7 can be calculated similarly to Eq.(3.3) and I is the identity matrix.Eq.(4.19) is a set of algebraic equations which can be solved for C. Substitutingthe value of C in Eq.(4.4), we get the solution of Eq.(4.16). The obtained nu-merical solution of Eq.(4.16) is presented in comparison with the exact solutiony(t) = 2 log( 7

8−t2 ) in Table 4.4 and graphically shown in Figure 4.4.

Page 338: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

324 JAVID IQBAL, RUSTAM ABASS and PUNEET KUMAR

t LWM Results Ref.[21] Exact

0.1 -0.26456123 -0.26456122 -0.264561220.2 -0.25703772 -0.25703770 -0.257037700.3 -0.24443526 -0.24443526 -0.244435260.4 -0.22665738 -0.22665736 -0.226657370.5 -0.20356540 -0.20356538 -0.203565380.6 -0.17497491 -0.17497491 -0.174974900.7 -0.14065064 -0.14065063 -0.140650630.8 -0.10029958 -0.10029956 -0.100299560.9 -0.53562045 -0.53562045 -0.53562045

Table 4.4 Comparison of the approximate solution of Example 4.4 against theexact and Chebyshev wavelet [21] solutions for M = 3, k = 2.

Figure 4.4 Comparison of numerical and exact solution.

Example 4.5 ([21]). Consider the nonlinear singular boundary value problem

(4.20) y′′(t) +2

ty′(t) + y5(t) = f(t), 0 < t ≤ 1,

with boundary conditions as y′(0) = 0, y(1) =√32 where f(t) = 0 and the

exact solution is y(t) = 1√1+ t2

2

which explains the equilibrium of isothermal gas

sphere.For this case, we also follow the same procedure as we did in previous ex-

amples to approximate y′′(t), y′(t) and y(t) with the given boundary conditionsusing basis functions Ψ(t). We collocate the obtained algebraic equation at suit-able collocation points in Eq.(2.7). So, we have a nonlinear system of algebraic

Page 339: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOLUTION OF LINEAR AND NONLINEAR SINGULAR BOUNDARY VALUE PROBLEMS ... 325

equations with the same number of unknowns which can be easily solved byclassical Newton method to obtain the vector C. Now we substitute the waveletcoefficient C into y(t) to get the approximation solution for the Eq.(4.20) whichis shown numerically in Table 4.5 and graphically in Figure 4.5. We observefrom Table 4.5 and Figure 4.5 that the proposed technique is in full agreementwith the exact and Chebyshev wavelet method [21] solutions.

t LWM Results Ref.[21] Exact

0.1 0.99503719 0.99503720 0.995037190.2 0.98058069 0.98058067 0.980580670.3 0.95782631 0.95782628 0.957826280.4 0.92847672 0.92847670 0.928476690.5 0.89442718 0.89442718 0.894427190.6 0.85749294 0.85749292 0.857492920.7 0.81923195 0.81923192 0.819231920.8 0.78086881 0.78086880 0.780868800.9 0.74329414 0.74329414 0.74329414

Table 4.5 Comparison of the approximate solution of Example 4.5 against theexact and CWM [21] solutions for M = 3, k = 2.

Figure 4.5 Comparison of numerical and exact solution.

Page 340: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

326 JAVID IQBAL, RUSTAM ABASS and PUNEET KUMAR

5. Conclusion

In this study, we have utilized Legendre wavelet method and its propertiesfor solving linear and nonlinear singular ordinary differential equations. Thismethod also reduces the problem to the solution of algebraic equations which canbe solved easily by classical numerical methods. The advantage of this methodis that the values of k and M are adjustable as well to yield more accuratenumerical solutions. The given numerical examples support the claim that onlya small number of Legendre wavelets are needed to accomplish a satisfactoryresult. A symbolic and numerical calculation software package like MATLABR2010a and MAPLE 14 are used. The results corroborate our belief that theproposed method is a reliable technique to handle these types of problems. Itcan therefore be concluded that this method is quite suitable, accurate, andefficient in comparison to other classical methods.

References

[1] O.A. Akinfenwa, S.N. Jator and N.M. Yao, Continuous block backward dif-ferentiation formula for solving stiff ordinary differential equations, Com-put. Math. Appl., 65 (2013), 996-1005.

[2] G. Beylkin, R. Coifman and V. Rokhlin, Fast wavelet transforms and nu-merical algorithms, Commun. Pure Appl. Math., 4 (1991), 141-183.

[3] J. Biazar and H. Ghazvini, He’s variational iteration method for solving lin-ear and non-linear systems of ordinary differential equations, Appl. Math.Comput., 191 (2007), 287-297.

[4] N. Caglar and H. Caglar, B-spline method for solving linear system ofsecond-order boundary value problems, Comput. Math. Appl., 57 (2009),757-762.

[5] C. Canuto et al., Spectral methods in fluid dynamics, Springer-Verlag,Berlin, 1988.

[6] F.C. Chen and C.H. Hsiao, Haar wavelet method for solving lumped anddistributed-parameter systems, IEE Proc. Control Theory Appl., 144 (1997),87-94.

[7] C.F. Chen and C.H. Hsiao, A Walsh series direct method for solving vari-ational problems, J. Franklin Inst., 30 (1997), 265-280.

[8] I. Daubechies, Ten lectures on wavelets, CBMS-NSF Regional ConferenceSeries in Applied Mathematics, 61, SIAM, Philadelphia, 1992.

[9] M. Dehghan and A. Nikpour, Numerical solution of the system of second-order boundary value problems using the local radial basis functions based

Page 341: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOLUTION OF LINEAR AND NONLINEAR SINGULAR BOUNDARY VALUE PROBLEMS ... 327

differential quadrature collocation method, Appl. Math. Model., 37 (2013),8578-8599.

[10] L. Fox and I.B. Parker, Chebyshev polynomials in numerical analysis,Clarendon Press, Oxford, 1968.

[11] F. Geng and M. Cui, Homotopy perturbation-reproducing kernel method fornonlinear systems of second order boundary value problems, J. Comput.Appl. Math., 235 (2011), 2405-2411.

[12] D. Gottelieb and S. Orszag, Numerical analysis of spectral methods, Theoryand Applications, SIAM, Philadelphia, PA, 1977.

[13] J. Iqbal and R. Abass, Numerical Solution of Klein/Sine-Gordon Equationsby Spectral Method Coupled with Chebyshev Wavelets, Applied Mathemat-ics, 7 (2016), 2097-2109.

[14] M.K. Kadalbajoo and V.K. Aggarwal, Numerical solution of singularboundary value problems via Chebyshev polynomial and B-spline, Appl.Math. Comput., 160 (2005), 851-863.

[15] M. T. Kajania, A. H. Vencheha and M. Ghasemi, The Chebyshev waveletsoperational matrix of integration and product operation matrix, Int. J.Comp. Math., 86 (2009), 1118-1125.

[16] M. Kumar and N. Singh, A collection of computational techniques for solv-ing singular boundary-value problems, Adv. Eng. Softw., 40 (2009), 288-297.

[17] U. Lepik, Haar wavelet method for solving stiff differential equations, Math.Modell. Anal., 14 (2009), 467-481.

[18] J. Lu, Variational iteration method for solving a nonlinear system of second-order boundary value problems, Comput. Math. Appl., 54 (2007), 1133-1138.

[19] M. Mahmoudi and H. Jafari, Modified Laplace decomposition method forsingular IVPs in the second-order ordinary differential equations, Casp. J.Math. Sci., 3 (2014), 105-113.

[20] K. Maleknejad and H. Derili, The collocation method for Hammersteinequations by Daubechies wavelets, Appl. Math. Comput., 172 (2006), 846-864.

[21] A. K. Nasab et al., Wavelet analysis method for solving linear and nonlinearsingular boundary value problems, Appl. Math. Model., 37 (2013), 5876-5886.

Page 342: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

328 JAVID IQBAL, RUSTAM ABASS and PUNEET KUMAR

[22] J. Rashidinia et al., Convergence of cubic-spline approach to the solutionof a system of boundary-value problems, Appl. Math. Comput., 192 (2007),319-331.

[23] M. Razzaghi and S. Yousefi, Legendre wavelets method for the solution ofnonlinear problems in the calculus of variations, Math. Comput. Model.,34 (2001), 45-54.

[24] M. Razzaghi and S. Yousefi, The Legendre wavelets operational matrix ofintegration, Int. J. Syst. Sci., 32 (2001), 495-502.

[25] F. A. Shah, R. Abass and J. Iqbal, Numerical Solution of Singularly Per-turbed Problems using Haar Wavelet Collocation Method, Cogent Mathe-matics, 3 (2016), 1-13.

[26] M. Tatari and M. Dehghan, Improvement of He’s variational iterationmethod for solving systems of differential equations, Comput. Math. Appl.,58 (2009), 2160-2166.

[27] S.G. Venkatesh, S.K. Ayyaswamy and S. R. Balachandar, The Legendrewavelet method for solving initial value problems of Bratu-type, Comput.Math. Appl., 63 (2012), 1287-1295.

[28] S. Yousefi and M. Razzaghi, Legendre wavelets method for the nonlinearVolterra-Fredholm integral equations, Math. Comput. Simul., 70 (2005), 1-8.

[29] F. Zhou and X. Xu, Numerical solutions for the linear and nonlinear sin-gular boundary value problems using Laguerre wavelets, Adv. Diff. Eqs., 17(2016), 1-17.

Accepted: 6.09.2017

Page 343: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (329–338) 329

ON THE APPLICATION OF THE ADOMIANDECOMPOSITION METHOD TO SOLVE NON-LINEARBOUNDARY VALUE PROBLEMS OF A STEADY STATEFLOW OF A LIQUID FILM

A.R. Hassan∗

Department of Mathematical SciencesUniversity of South AfricaPretoria 0003South [email protected]@yahoo.co.ukandDepartment of MathematicsTai Solarin University of Education IjagunOgun State Nigeria

R. MaritzDepartment of Mathematical SciencesUniversity of South Africa Pretoria 0003South Africa

M. MbehouDepartment of Mathematical Sciences

University of South Africa Pretoria 0003

South Africa

and

Department of Mathematics

University of Yaounde 1

Cameroon

Abstract. This paper shows the reliability of the Adomian Decomposition Method(ADM) for solving a non-linear boundary value problem in a steady state flow of aliquid film. The solutions of the momentum and energy equations are solved throughADM and the results were compared with previously obtained results by the HomotopyPerturbation Method(HPM) and Hermite - Pade Approximation method (HPA). It isobserved that solutions obtained by the ADM takes the form of a convergent series thatis capable of greatly reducing the size of computation and solve a large class of non-linear equations effectively and accurately. The results of the boundary value problemare presented in tables and graphs.

Keywords: Adomian Decomposition Method (ADM), Variable Viscosity, HomotopyPerturbation Method (HPM) and Hermite - Pade Approximation (HPA).

∗. Corresponding author

Page 344: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

330 A.R. HASSAN, R. MARITZ AND M. MBEHOU

1. Introduction

The use of the Adomian Decomposition Method (ADM) has been applied to awide class of problems in the sciences. The method is useful for obtaining theclosed form and numerical approximations of linear or non linear differentialequations as in [1-3]. Also, the method has been established to obtain formalsolutions of stochastic and deterministic problems in sciences and engineeringinvolving algebraic, differential, integro - differential, differential delay, integraland partial differential equations as in [4]. This method was first introduced bythe American Mathematician, George Adomian (1923 - 1996), in search of a so-lution in the form of a series and on decomposing the non linear operator into aseries in which the terms are calculated recursively using Adomian polynomials[5-7]. In addition to that, some modification were introduced recently to extendthe reliability of the ADM in solving problems involving differential equationsas described in [8-10] where the proposed modification accelerate the rapid con-vergence of the series solution if compared with the standard Adomian method.Hence, the various applications of the ADM schemes have been established in[11-17].

In industries, issues like productivity and competitiveness require engineer-ing solutions which heavily rely on Mathematical models. These models areused to determine and investigate fluid flow properties like viscous heating, in-ternal heat generation, entropy generation rates, thermal stability and so onas mentioned in literature [10-18]. It is mentioned in [19] that, one of the themajor goals in industries is to understand the fluid behaviour and heat transferaccurately in order to predict the flow regime.

In order to have clear understanding of the fluid dynamics in a channel flowbetween walls, it is extremely important to critically find and choose an ap-proximate as well as accurate method to solutions of different mathematicalmodels under different conditions. However, critical examination into compar-ative studies relating to the use of the ADM with other methods has beenextensively established, for example, [2] compared ADM and Tau Methods, [3]modified ADM to obtain Taylor series, [4] compared ADM with Picard iterationmethod and [20] made use of the ADM to solve generalized Riccati differentialequations.

Meanwhile, there are other methods that have not been compared with theADM, like the differential transform method [21], the traditional perturbationmethod [18] and the Homotopy perturbation method [22]. Hence, the purposeof this paper is to compare and show the reliability of ADM in solving a non-linear boundary value problem in a steady state flow of a liquid film. Thepresent result from ADM shall be compared with the results of [22] where theHomotopy Perturbation Method (HPM) and the Hermite - Pade Approximation(HPA) were previously used.

Page 345: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE APPLICATION OF THE ADOMIAN DECOMPOSITION METHOD ... 331

2. Review of the Adomian Decomposition Method (ADM)

The ADM provides a closed form of the solution where a general functionalequation is given as described in [2,17,23]:

(1) y −N(y) = f

where N is a nonlinear operator, f is a function that is known with the solutiony satisfying (1) which is assumed to have a unique solution. We introduce anapproximate solution of (1) in the form of

(2) y =

∞∑n=0

yn

and decomposing the nonlinear operator N as

(3) N(y) =∞∑n=0

An,

where An are the Adomian Polynomials of (3) as y0, y1, ..., yn that is determinedformally from the relation as:

(4) An =1

n!

[dn

dzn

(N

∞∑i=0

ziyi

)]z=0

.

Therefore, we can identify

y0 = f(5)

yn+1 = An (y0, y1, ..., yn) , n = 0, 1, 2, ....(6)

3. Application of the Adomian Decomposition Method (ADM)

The dimensionless governing equations of the non-linear boundary value problemin a steady flow of a liquid film together with the boundary conditions in [22]are given as:

d2θ

dy2+ λ (1− y)2 eβθ = 0(7)

du

dy= (1− y) eβθ(8)

with u = θ = 0 on y = 0 anddθ

dy= 0 on y = 1,(9)

where θ is the absolute temperature, u is the velocity, λ is the variable viscosityparameter and β is the Brinkmann number.

Page 346: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

332 A.R. HASSAN, R. MARITZ AND M. MBEHOU

For simplicity, we expanded the exponential function in (7) and (8) and takethe approximation to be:

(10) eβθ ≃ 1 + βθ +(βθ)2

2.

Inserting (10) into (7) and (8) together with the boundary conditions in (9), weobtained the following solution for the energy equation:

θ(y) = a0y − λ(y4

12− y3

3+y2

2

)− λβ

∫ y

0

(∫ y

0(1− y)2θ(Y )dY

)dY

− λβ2

2

∫ y

0

(∫ y

0(1− y)2[θ(Y )]2dY

)dY(11)

u(y) = y − y2

2+ β

∫ y

0(1− y)θ(y)dY +

β2

2

∫ y

0(1− y)(θ(Y ))2dY,(12)

where a0 = dθdy (0) is to be determined by using the boundary condition (9).

We now introduce a series solution of the form

(13) θ(y) =∞∑n=0

θn(Y ) and u(y) =∞∑n=0

un(Y ).

Substituting (13) into (11) and (12) respectively, then we have:

θ(y) = a0y − λ(y4

12− y3

3+y2

2

)− λβ

∫ y

0

(∫ y

0(1− y)2

∞∑n=0

θn(Y )dY

)dY

− λβ2

2

∫ y

0

∫ y

0(1− y)2

[ ∞∑n=0

θn(Y )

]2dY

dY(14)

u(y) = y − y2

2+ β

∫ y

0(1− y)[

∞∑n=0

θn(Y )]dY

+β2

2

∫ y

0(1− y)

[ ∞∑n=0

θn(Y )

]2dY.(15)

We let [ ∞∑n=0

θn(Y )

]2=

∞∑n=0

An,(16)

where A0, A1, A2, ... are called Adomian polynomials.

Page 347: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE APPLICATION OF THE ADOMIAN DECOMPOSITION METHOD ... 333

Substituting (16) into (14) and (15), we obtain the following:

θ(y) = a0y − λ(y4

12− y3

3+y2

2

)− λβ

∫ y

0

(∫ y

0(1− y)2

∞∑n=0

θn(Y )dY

)dY

−λβ2

2

∫ y

0

(∫ y

0(1− y)2

∞∑n=0

AndY

)dY(17)

u(y)=y−y2

2+β

∫ y

0(1−y)[

∞∑n=0

θn(Y )]dY+β2

2

∫ y

0

((1−y)

∞∑n=0

An

)dY.(18)

The few Adomian polynomials of (16) are given as follows:

A0 = θ0(y)2,

A1 = 2θ0(y)θ1(y),

A2 = 2θ0(y)θ2(y) + θ1(y)2, and so on.(19)

Then, the zeroth component of (17) and (18) following the modification of ADMin [8-10, 15, 16, 23] are given as follows:

θ0(y) = a0y − λ(y4

12− y3

3+y2

2

)and u0(y) = y − y2

2(20)

θn+1(y) = −λβ∫ y

0

(∫ y

0(1− y)2θn(Y )dY

)dY

− λβ2

2

∫ y

0

(∫ y

0(1− y)2AndY

)dY(21)

un+1(y) = β

∫ y

0(1− y)θn(Y )dY +

β2

2

∫ y

0((1− y)An) dY, for n ≥ 0.(22)

Hence, the approximate solutions for temperature and velocity profiles ofthe boundary value problem using ADM are obtained as follows:

θ(y) = a0(y) + λ

(1

6a0βy

4 − 1

6a0βy

3 − y4

12+y3

3− y2

2

)+ λ

(− 1

20a0βy

5 − 1

120a20β

2(2(y − 3)y + 5)y4)

+ λ2(βy8

672− βy7

84+βy6

24− βy5

15+βy4

24

)+λ2

(−(a0β

2y5(y(1344− 5y(y(7y − 54) + 180))− 756)))

30240+O(λ3)(23)

u(y) = y − y2

2+

1

504a20β

2(84− 63y)y3 − 1

3a0βy

3 +1

2a0βy

2

+ λ

(1

504a0β

2(y(y(6y − 35) + 84)−63)y4+βy6

72−βy

5

12+

5βy4

24−βy

3

6

)− β2λ2y5(y(y(7y((y − 10)y + 45)− 760) + 980)− 504)

20160+O(λ3).(24)

Page 348: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

334 A.R. HASSAN, R. MARITZ AND M. MBEHOU

4. Previous works

4.1 The Homotopy Perturbation Method (HPM)

The approximate analytical solutions for temperature and velocity fields fromHPM in [22] are given as:

θ(y) =λ

12

[1− (1− y)4

]+

(11λ2β

2016+

101λ3β2

1330560

)− λβ2

72

((1− y)4

12− (1− y)8

56

)

− λ3β2

288

((1− y)5

20+

(1− y)12

132− (1− y)8

28

)and

(25)

u(y) =

(y − y2

2

)+λβ

72

[(6y − 3y2 + (1− y)6

)−(

1 +7β

120

)]

+λ2β2

8640

[30y − 15y2 − 3(1− y)10 + 10(1− y)6

].

(26)

4.2 The Hermite - Pade Approximation (HPA)

The solution for the temperature and velocity fields using HPA in [22] are alsogiven thus:

θ(y) = − λ

12y(y − 2)(y2 − 2y + 2)

+λ2β

2016y(y − 2)(y2 − 2y + 2)(3y4 − 12y3 + 18y2 − 12y − 8) +O(λ3)(27)

u(y) = −1

2y(y − 2) +

λβ

72y2(y − 2)2(y2 − 2y + 3)

− λ2β2

6048y2(y − 2)2(3y6 − 18y5 + 51y4 + 7y2 − 32y − 12) +O(λ3).(28)

5. Results and discussion

The main interest of this study is to establish the reliability and accuracy of theADM in the solution of a non linear boundary value problem in a steady stateand to compare the present result of the ADM with the previously obtainedresults from the HPM and the HPA in [22].

In tables 1 and 2, the numerical values of solutions from the temperature andvelocity profiles obtained from the HPM, HPA and ADM are respectively givenwith the absolute errors in comparison with the present result from ADM. Thenumerical solutions showed that the ADM is also another convenient method toget an approximate solution of non linear boundary value problems. The presentresults from ADM showed the reliability and validity of the method with size-able number of iterations compared with previously obtained results from HPMand HPA. The absolute errors obtained in each comparison evidently showed

Page 349: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE APPLICATION OF THE ADOMIAN DECOMPOSITION METHOD ... 335

that the present ADM results are almost identical with an average difference oforder 10−4. This is evident that, results from ADM can conveniently be usedas an alternative method to solve non linear problems where exact solutions arenot known. Moreso, the assurance of the existence and uniqueness of resultsfrom ADM is analysed in [17,24]

Table 1: Comparison of temperature profile between ADM and previous re-sults(HPM and HPA)

β = 1, λ = 1

y θHPM (y) θHPA(y) θADM (y) |θHPM (y)− θADM (y)| |θHPA(y)− θADM (y)|0.0 0.00454696 0.00000000 0.00000000 4.54696× 10−3 0

0.1 0.03330329 0.03019901 0.03040397 2.89932× 10−3 2.04959× 10−4

0.2 0.05399523 0.05206157 0.05245361 1.54162× 10−3 3.92044× 10−4

0.3 0.06828202 0.06719977 0.06774765 5.34382× 10−4 5.47873× 10−4

0.4 0.07764161 0.07711468 0.07778099 1.39372× 10−4 6.66309× 10−4

0.5 0.08336393 0.08315313 0.08390098 5.37054× 10−4 7.47845× 10−4

0.6 0.08654554 0.08647955 0.08727721 7.31679× 10−4 7.97668× 10−4

0.7 0.08808602 0.08805853 0.08888207 7.96050× 10−4 8.23544× 10−4

0.8 0.08868590 0.08864524 0.08947920 7.93293× 10−4 8.33956× 10−4

0.9 0.08884568 0.08878065 0.08961719 7.71510× 10−4 8.36535× 10−4

1.0 0.08886559 0.08878968 0.08962640 7.60811× 10−4 8.36717× 10−4

Table 2: Comparison of the velocity profile between ADM and previous results(HPM and HPA)

β = 1, λ = 1

y uHPM (y) uHPA(y) uADM (y) |uHPM (y)− uADM (y)| |uHPA(y)− uADM (y)|0.0 0.00000000 0.00000000 0.00000000 0 0

0.1 0.09642260 0.09649557 0.09650809 8.54821× 10−5 1.25197× 10−5

0.2 0.18483294 0.18509391 0.18515536 3.22413× 10−4 6.14393× 10−5

0.3 0.26419672 0.26471145 0.26487414 6.77422× 10−4 1.62687× 10−4

0.4 0.33377860 0.33456914 0.33489208 1.11348× 10−3 3.22944× 10−4

0.5 0.39308777 0.39414324 0.39467937 1.59160× 10−3 5.36129× 10−4

0.6 0.44182085 0.44310865 0.44389284 2.07199× 10−3 7.84194× 10−4

0.7 0.47980842 0.48128330 0.48232310 2.51468× 10−3 1.03980× 10−3

0.8 0.50696856 0.50857908 0.50984842 2.87987× 10−3 1.26934× 10−3

0.9 0.52326969 0.52496199 0.52639763 3.12794× 10−3 1.43564× 10−3

1.0 0.52870370 0.53042328 0.53192311 3.21941× 10−3 1.49983× 10−3

The effects of the Brinkmann number (λ) and the viscosity parameter (β) onthe temperature profiles are displayed in figures 1 and 2. The result is approxi-mately the same obtained in [22]. The results showed that the fluid temperatureincreases as both Brinkmann number (λ) and the viscosity parameter (β) in-crease. Similarly, figures 3 and 4 displayed the velocity profile. The results alsoshowed that the maximum velocity are obtained as both Brinkmann number(λ) and the viscosity parameter (β) increase in values. Both temperature and

Page 350: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

336 A.R. HASSAN, R. MARITZ AND M. MBEHOU

Figure 1: Effect of β on tempera-ture profile

Figure 2: Effect of λ on tempera-ture profile

velocity profiles agreed with the previously obtained results where HPM andHAM were used.

Figure 3: Effect of β on velocityprofile

Figure 4: Effect of λ on velocityprofile

6. Conclusion

In this study, the ADM has been applied to obtain the solution of a non linearboundary value problem in a steady state flow of a liquid film. The solutionsof both temperature and velocity from the ADM were compared with the pre-viously obtained results from [22] where the HPM and the HPA were formerlyused. The results showed that the ADM can also be used as an alternativemethod of getting an approximate and reliable solutions to linear and nonlineardifferential equations, and therefore can be applied to wide range of problemsin the fields of science and engineering.

References

[1] N. Bildik and M. A. Inc, A comparison between adomian decomposition andtau methods, Abstract and Applied Analysis, 2013:15, 2013.

Page 351: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE APPLICATION OF THE ADOMIAN DECOMPOSITION METHOD ... 337

[2] S. Somali and G. Gokmen, Adomian decomposition method for nonlin-ear sturm-liouville problems, Surveys in Mathematics and its Applications,2:1120, 2007.

[3] E. Kutafina, Taylor series for the adomian decomposition method, Interna-tional Journal of Computer Mathematics, 88(17):36773684, 2011.

[4] E. A. Ibijola and B. J. Adegboyegun, A comparison of adomians decompo-sition method and picard iterations method in solving nonlinear differentialequations, Global Journal of Science Frontier Research Mathematics andDecision Sciences, 12(7):3642, 2012.

[5] G. Adomian, A comparison review of the decomposition method in ap-plied mathematics, Journal of Mathematical Analysis and Application,135:501544, 1988.

[6] G. Adomian, Solving frontier problems of Physics: The decompositionmethod, Kluwer academic Publishers, Boston, 1994.

[7] G. Adomian and R. Rach, Solution of nonlinear ordinary and partial differ-ential equations of physics, Journal of Mathematics and Physical Sciences,25:703718, 1991.

[8] M. Almazmumy, F. A. Hendi, H. O. Bakodah, and H. Alzumi, Recent mod-ifications of adomian decomposition method for initial value problem inordinary differential equations, American Journal of Computational Math-ematics, 2:228234, 2012.

[9] Y. Q. Hasan and L. M. Zhu, Modified adomian decomposition methodfor singular initial value problems in the second-order ordinary differentialequations, Surveys in Mathematics and its Applications, 3:183193, 2008.

[10] A. M. Wazwaz and S. M. El-Sayed, A new modification of the adomiandecomposition method for linear and nonlinear operators, Applied MathsComputation, 122:393405, 2001.

[11] A. R. Hassan and O. J. Fenuga, Flow of a maxwell fluid through a porousmedium induced by a constantly accelerating plate, Journal of the NigerianAssociation of Mathematical Physics, 19:249254, 2011.

[12] J. A. Gbadeyan and A. R. Hassan, Multiplicity of solutions for a reac-tive variable viscous couette flow under arrhenius kinetics, MathematicalTheory and Modelling, 2(9):3949, 2012.

[13] A. R. Hassan and J. A. Gbadeyan, The effect of heat absorption on avariable viscosity reactive couette flow under arrhenius kinetics, TheoreticalMathematics and Applications, 3(1):145159, 2013.

Page 352: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

338 A.R. HASSAN, R. MARITZ AND M. MBEHOU

[14] A. R. Hassan and J. A. Gbadeyan, On multiplicity of solutions for a reactivevariable viscous couette flow under arrhenius kinetics in the presence of ac-tivation energy, International Journal of Energy and Technology, 5(26):16,2013.

[15] A. R. Hassan and J. A. Gbadeyan, Thermal stability analysis of a reactivehydromagnetic fluid flow through a channel, American Journal of AppliedMathematics, 2(1):1420, 2014.

[16] A. R. Hassan and J. A. Gbadeyan, Entropy generation analysis of a reactivehydromagnetic fluid flow through a channel, U. P. B. Sci. Bull. Series A,77(2):285296, 2015.

[17] S. O. Adesanya and J. A. Gbadeyan, Adomian decomposition approach tosteady visco elastic fluid flow with slip through a planer channel, Interna-tional Journal of Nonlinear Science, 11(1):86 94, 2011.

[18] A. R. Hassan and J. A. Gbadeyan, A reactive hydromagnetic internal heatgenerating fluid flow through a channel, International Journal of Heat andTechnology, 33(3):4350, 2015.

[19] D. A. Kamenettski Frank, Diffusion and heat transfer in chemical kinetics,Plenum Press, New York, 1969.

[20] T. R. Ramesh Rao, The use of adomian decomposition method for solv-ing generalised riccati differential equations, Proceedings of 6th IMT-GTConference on Mathematics, Statistics and its Applications,(ICMSA2010),pages 935941, 2010.

[21] J. Ali, One dimensional differential transform method for some higher or-der boundary value problems in finite domain, International Journal ofComptemporary Mathemematical Sciences, 7(6):263272, 2012.

[22] V. Ananthaswamy, S. P. Ganesan, and L. Rajendran, Approximate ana-lytical solution of nonlinear boundary value problem in steady state flowof a liquid films: Homotopy perturbation method, International Journal ofApplied Sciences and Engineering Research, 2(5):569578, 2013.

[23] A. M. Wazwaz, A new algorithm for calculating adomian polynomials fornonlinear operators, Abstract and Applied Analysis, 111(1):5369, 2000.

[24] S. S. Ray, New approach for general convergence of the adomian decompo-sition method, World Applied Sciences Journal, 32(11):22642268, 2014.

Accepted: 13.09.2017

Page 353: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (339–352) 339

ENERGY OF A BIPOLAR FUZZY GRAPH AND ITSAPPLICATION IN DECISION MAKING

Sumera Naz∗

Department of MathematicsUniversity of the PunjabQuaid-e-Azam [email protected]

Samina AshrafQuality Enhancement CellLahore College For Women [email protected]

Faruk KaraaslanDepartment of Mathematics

Faculty of Sciences

Cankiri Karatekin University

18100 Cankiri

Turkey

[email protected]

Abstract. In many domains of information processing, bipolarity is a core featureto be considered: positive information represents what is possible or preferred, whilenegative information represents what is forbidden or surely false. If the information ismoreover endowed with vagueness and imprecision, then bipolar fuzzy sets (BFSs) con-stitute an appropriate knowledge representation framework. In this paper, we introducethe novel concepts of energy of a graph in the context of a bipolar fuzzy environmentand investigate some of their properties. We show that if G is a bipolar fuzzy graph(BFG) on n vertices, then E(G) ≤ n

2 (1 +√n) must hold. Moreover, we introduce

the concept of energy of bipolar fuzzy digraphs (BFDGs) along with its application indecision making problem.

Keywords: bipolar fuzzy graph, spectrum, energy, decision making.

1. Introduction

Zhang [21] introduced the concept of BFS characterized by a positive mem-bership function and a negative membership function as an extension of tra-ditional fuzzy set [20] whose basic component is only a membership function.This domain has recently motivated work in several directions, for instance for

∗. Corresponsing author

Page 354: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

340 SUMERA NAZ, SAMINA ASHRAF and FARUK KARAASLAN

applications in preference modeling, knowledge representation, argumentation,cooperative games and multi-criteria decision analysis. The range of member-ship degree of BFSs is [−1, 1]. In a BFS, the positive membership degree (0, 1]of an element indicates that the element somewhat satisfies the correspondingproperty, the negative membership degree [−1, 0) of an element indicates thatthe element somewhat satisfies the implicit counter-property and the member-ship degree 0 of an element means that the element is irrelevant to the property[11].

In real life, many situations can be simply abstracted as the graphics prob-lems containing points and connection. For instance, in the Internet, a routercan be represented as a vertex and an edge connects two routers with opticalfiber. The theory of graphs was first introduced in 1736, when Euler pub-lished his paper on graph theory, and solved the problem of the Konigsberg’sbridges, which gave birth to a new branch of mathematics. The energy of agraph was originally investigated by Gutman in 1978 [8] and has a wide rang ofapplications in different fields, including, computer science, physics, chemistryand other branches of mathematics. Fuzzy graphs are designed to representstructures of relationships between objects such that the existence of a con-crete object (vertex) and relationship between two objects (edge) are mattersof degree. The concept of fuzzy graphs was initiated by Kaufmann [10], basedon Zadeh’s fuzzy relations. Later, another elaborated definition of fuzzy graphwith fuzzy vertex and fuzzy edges was introduced by Rosenfeld [17] and ob-taining analogs of several graph theoretical concepts such as paths, cycles andconnectedness etc, he developed the structure of fuzzy graphs. Energy of a fuzzygraph was investigated in [5] by Anjali and Mathew. Akram et al. originallyproposed the concept of BFGs, and made a lot of studies on this extension offuzzy graphs [1, 2, 3, 4, 18]. Naz et al. put forward some new concepts concern-ing the extended structures of fuzzy graphs and provided their applications indecision-making [6, 13, 14, 15]. Borzooei and Rashmanlou [7] defined the energyof a vague graph. However, to the best of our knowledge, no work addressingthe energy in bipolar fuzzy setting is in literature. So, the main purpose of thispaper is to introduce the concept of energy of a BFG and BFDG.

The paper is structured as follows: Section 2 contains a brief backgroundabout BFSs and BFGs. Section 3 mainly proposes the concept of the energyof a BFG, and investigates its properties. Section 4 introduces the concept ofenergy of BFDGs along with its application in decision making problem, andfinally conclusions are given in Section 5.

Throughout this paper, V represents a crisp universe of generic elements, Gstands for the crisp (undirected, simple) graph and G is the BFG.

2. Preliminaries

In the following, some basic concepts on BFSs and BFGs are reviewed to facili-tate next sections.

Page 355: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ENERGY OF A BIPOLAR FUZZY GRAPH AND ITS APPLICATION IN DECISION MAKING 341

A graph G = (V, E) is a mathematical structure consisting of a set ofvertices V and a set of edges E, where each edge is an unordered pair of distinctvertices. If G is a graph with n vertices and m edges, its adjacency matrix A(G)is the n × n matrix whose ij-th entry is the number of edges joining vertices iand j. The eigenvalues λi, i = 1, 2, . . . , n, of the adjacency matrix of G are theeigenvalues of G. The spectrum λ1, λ2, . . . , λn of the adjacency matrix of Gis the spectrum, Spec(G), of G. The eigenvalues of a graph satisfy the followingrelations:

n∑i=1

λi = 0,

n∑i=1

λ2i = 2m.

Definition 2.1 ([8, 9]). The energy of a graph G, denoted by E(G), is definedas the sum of the absolute values of the eigenvalues of G, i.e., E(G) =

∑ni=1 |λi|.

A graph with all isolated vertices Kcn has zero energy while the complete graph

Kn with n vertices has energy 2(n− 1).

Definition 2.2 ([16]). The energy of a digraph D, denoted by E(D), is definedas the sum of the absolute values of the real part of eigenvalues of D, i.e.,E(D) =

∑ni=1 |Re(zi)|.

In 1965, Zadeh [20] originally introduced the fuzzy set, characterized by amembership function in [0, 1], which is very useful in dealing with uncertainty,imprecision and vagueness.

Definition 2.3 ([20]). A fuzzy set υ on a set V is defined through its membershipfunction υ : V → [0, 1], where υ(x) represents the degree to which point x ∈ Vbelongs to the fuzzy set. The smallest element and the largest element are thefunction constantly equal to 0 and 1, respectively.

Definition 2.4 ( [19] ). A fuzzy preference relation R on a set of alternativesV = x1, x2, . . . , xn is characterized by a membership function ηR : V × V →[0, 1]. A fuzzy preference relation can be conveniently represented by the n× nmatrix R = (rij)n×n, where rij indicates the degree of preference of alternativexi over xj with rij ∈ [0, 1], rij + rji = 1, rij = 0.5 for all i, j = 1, 2, . . . , n.

Definition 2.5 ( [21]). A BFS X in a non-empty set V is an object havingthe following form X = (x, ηPX(x), ηNX (x)) | x ∈ V which is characterized bya positive membership function ηPX and a negative membership function ηNX ,where ηPX : V → [0, 1], x ∈ V → ηPX(x) ∈ [0, 1], ηNX : V → [−1, 0], x ∈ V →ηNX (x) ∈ [−1, 0]. If ηPX(x) = 0 and ηNX (x) = 0, then x is regarded as having onlypositive satisfaction for X. If ηPX(x) = 0 and ηNX (x) = 0, then x does not satisfythe property of X but somewhat satisfies the counter property of X. Finally,if ηPX(x) = 0 and ηNX (x) = 0, then the membership function of the propertyoverlaps that of its counter property over some portion of V.

By introducing the concept of BFSs into the theory of graphs, Akram [1]put forward the notion of the BFGs as follows.

Page 356: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

342 SUMERA NAZ, SAMINA ASHRAF and FARUK KARAASLAN

Definition 2.6 ([1]). A BFG with a finite set V as the underlying set is apair G = (X,Y ), where X = (ηPX , η

NX ) is a BFS on V and Y = (ηPY , η

NY )

is a bipolar fuzzy relation on V such that ηPY (xy) ≤ minηPX(x), ηPX(y) andηNY (xy) ≥ maxηNX (x), ηNX (y) for all x, y ∈ V, We call X the bipolar fuzzyvertex set of G and Y the bipolar fuzzy edge set of G.

3. Energy of a bipolar fuzzy graph

In this section, based on the extension of the energy of a fuzzy graph [5], wedefine the concept of energy of a BFG, which can be used in real scientific andengineering applications.

Definition 3.1. The adjacency matrix A(G) of a BFG G = (X,Y ) is defined asa square matrix A(G) = [aij ], aij = (ηPY (uiuj), η

NY (uiuj)), where ηPY (uiuj) and

ηNY (uiuj) represent the strength of positive relationship and strength of negativerelationship between ui and uj , respectively.

Example 3.1. Consider a graph G = (V,E), where V = u1, u2, u3, u4, u5 andE = u1u2, u1u3, u1u4, u1u5, u2u3, u3u4, u4u5. Let G = (X,Y ) be a BFG of agraph G, as shown in Fig. 1. Tabular representation of a BFG is given in Table1. The adjacency matrix of a BFG given in Fig. 1, is

u1(0.7,−0.5)

u2(0.4,−0.2)

(0.1,−0.2)

(0.4,−

0.3)

(0.3,−

0.1) (0.2,

−0.3)

(0.2,−0.1)

u3(0.5,−0.6) u4(0.2,−0.3)

u5(0.6,−0.4)

(0.2,−0.1)

(0.4,−0.3)

Figure 1: Bipolar fuzzy graph.

Table 1: Tabular representation of a BFG.X u1 u2 u3 u4 u5ηPX 0.7 0.4 0.5 0.2 0.6ηNX −0.5 −0.2 −0.6 −0.3 −0.4

Y u1u2 u1u3 u1u4 u1u5 u2u3 u3u4 u4u5ηPY 0.2 0.4 0.2 0.4 0.3 0.1 0.2ηNY −0.1 −0.3 −0.1 −0.3 −0.1 −0.2 −0.3

Page 357: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ENERGY OF A BIPOLAR FUZZY GRAPH AND ITS APPLICATION IN DECISION MAKING 343

A(G) =

(0, 0) (0.2,−0.1) (0.4,−0.3) (0.2,−0.1) (0.4,−0.3)

(0.2,−0.1) (0, 0) (0.3,−0.1) (0, 0) (0, 0)(0.4,−0.3) (0.3,−0.1) (0, 0) (0.1,−0.2) (0, 0)(0.2,−0.1) (0, 0) (0.1,−0.2) (0, 0) (0.2,−0.3)(0.4,−0.3) (0, 0) (0, 0) (0.2,−0.3) (0, 0)

.

Definition 3.2. The spectrum of adjacency matrix of a BFG A(G) is de-fined as (S, T ), where S and T are the sets of eigenvalues of A(ηPY (uiuj)) andA(ηNY (uiuj)), respectively.

Definition 3.3. The energy of a BFG G = (X,Y ) is defined as

E(G) =(E(ηPY (uiuj)), E(ηNY (uiuj))

)=

n∑i=1λi∈S

|λi|,n∑i=1δi∈T

|δi|

.

Theorem 3.1. Let G = (X,Y ) be a BFG and A(G) be its adjacency matrix. Ifλ1 ≥ λ2 ≥ . . . ≥ λn and δ1 ≥ δ2 ≥ . . . ≥ δn are the eigenvalues of A(ηPY (uiuj))and A(ηNY (uiuj)), respectively. Then

1.∑n

i=1λi∈S

λi = 0 and∑n

i=1δi∈T

δi = 0.

2.∑n

i=1λi∈S

λ2i=2∑

1≤i<j≤n(ηPY (uiuj))2 and

∑ni=1δi∈T

δ2i =2∑

1≤i<j≤n(ηNY (uiuj))2.

Proof. 1. Since A(G) is a symmetric matrix with zero trace, so its eigenvaluesare real with sum equal to zero.

2. By trace properties of a matrix, we have tr((A(ηPY (uiuj)))2) =

∑ni=1λi∈S

λ2i ,

where

tr((A(ηPY (uiuj)))2) =

(0 + (ηPY (u1u2))

2 + . . .+ (ηPY (u1un))2)

+((ηPY (u2u1))

2 + 0 + . . .+ (ηPY (u2un))2)

...

+((ηPY (unu1))

2 + (ηPY (unu2))2 + . . .+ 0

)= 2

∑1≤i<j≤n

(ηPY (uiuj))2.

Hence∑n

i=1λi∈S

λ2i = 2∑

1≤i<j≤n(ηPY (uiuj))2.

Similarly, we can show that∑n

i=1δi∈T

δ2i = 2∑

1≤i<j≤n(ηNY (uiuj))2.

Example 3.2. The spectrum and the energy of a BFG G, given in Fig. 1 are asfollows: Spec(G) = (−0.5661,−0.6219), (−0.2767,−0.1029), (−0.1504, 0.0814),(0.2075, 0.1361), (0.7857, 0.5074), E(G) = (1.9864, 1.4498).

Page 358: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

344 SUMERA NAZ, SAMINA ASHRAF and FARUK KARAASLAN

Further,∑5

i=1λi∈S

λi = −0.5661−0.2767−0.1504+0.2075+0.7857 = 0,∑5

i=1δi∈T

δi =

−0.6219−0.1029+0.0814+0.1361+0.5074 = 0.∑5

i=1λi∈S

λ2i = 1.0800 = 2(0.54) =

2∑

1≤i<j≤5(ηPY (uiuj))

2,∑5

i=1δi∈T

δ2i = 0.6800 = 2(0.34) = 2∑

1≤i<j≤5(ηNY (uiuj))

2.

We now find upper and lower bounds of the energy of a BFG G, in termsof the number of vertices and the sum of squares of positive membership andnegative membership values of edges.

Theorem 3.2. Let G = (X,Y ) be a BFG on n vertices and A(G) = (A(ηPY (uiuj)),A(ηNY (uiuj))) be the adjacency matrix of G. Then

(i)√

2∑

1≤i<j≤n(ηPY (uiuj))2 + n(n− 1)|det(A(ηPY (uiuj)))|2n

≤ E(ηPY (uiuj)) ≤√

2n∑

1≤i<j≤n(ηPY (uiuj))2;

(ii)√

2∑

1≤i<j≤n(ηNY (uiuj))2 + n(n− 1)|det(A(ηNY (uiuj)))|2n

≤ E(ηNY (uiuj)) ≤√

2n∑

1≤i<j≤n(ηNY (uiuj))2.

Proof. (i) Upper bound: Applying Cauchy-Schwarz inequality to the vectors(1, 1, . . . , 1) and (|λ1|, |λ2|, . . . , |λn|) with n entries, we get

(3.1)

n∑i=1

|λi| ≤√n

√√√√ n∑i=1

|λi|2

(3.2)

(n∑i=1

λi

)2

=

n∑i=1

|λi|2 + 2∑

1≤i<j≤nλiλj

By comparing the coefficients of λn−2 in the characteristic polynomial

n∏i=1

(λ− λi) = |A(G)− λI|,

we have

(3.3)∑

1≤i<j≤nλiλj = −

∑1≤i<j≤n

(ηPY (uiuj))2.

Substituting (3.3) in (3.2), we obtain

(3.4)

n∑i=1

|λi|2 = 2∑

1≤i<j≤n(ηPY (uiuj))

2.

Page 359: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ENERGY OF A BIPOLAR FUZZY GRAPH AND ITS APPLICATION IN DECISION MAKING 345

Substituting (3.4) in (3.1), we obtain

n∑i=1

|λi| ≤√n

√2

∑1≤i<j≤n

(ηPY (uiuj))2 =

√2n

∑1≤i<j≤n

(ηPY (uiuj))2.

Therefore,

E(ηPY (uiuj)) ≤√

2n∑

1≤i<j≤n(ηPY (uiuj))2

Lower bound:

(E(ηPY (uiuj)))2 =

(n∑i=1

|λi|

)2

=n∑i=1

|λi|2 + 2∑

1≤i<j≤n|λiλj |

= 2∑

1≤i<j≤n(ηPY (uiuj))

2 +2n(n− 1)

2AM|λiλj |

Since AM|λiλj | ≥ GM|λiλj |, 1 ≤ i < j ≤ n, so,

E(ηPY (uiuj)) ≥√

2∑

1≤i<j≤n(ηPY (uiuj))2 + n(n− 1)GM|λiλj |

also since

GM|λiλj | =

∏1≤i<j≤n

|λiλj |

2n(n−1)

=

(n∏i=1

|λi|n−1

) 2n(n−1)

=

(n∏i=1

|λi|

) 2n

= |det(A(ηPY (uiuj)))|2n

so,

E(ηPY (uiuj)) ≥√

2∑

1≤i<j≤n(ηPY (uiuj))2 + n(n− 1)|det(A(ηPY (uiuj)))|

2n .

Thus,√

2∑

1≤i<j≤n(ηPY (uiuj))2 + n(n− 1)|det(A(ηPY (uiuj)))|2n

≤ E(ηPY (uiuj)) ≤√

2n∑

1≤i<j≤n(ηPY (uiuj))2.

Similarly, we can show that√2∑

1≤i<j≤n(ηNY (uiuj))2 + n(n− 1)|det(A(ηNY (uiuj)))|2n ≤ E(ηNY (uiuj))

≤√

2n∑

1≤i<j≤n(ηNY (uiuj))2.

The following result gives us upper bound of the energy of a BFG, with theconditions n ≤ 2

∑1≤i<j≤n(ηPY (uiuj))

2 and n ≤ 2∑

1≤i<j≤n(ηNY (uiuj))2.

Page 360: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

346 SUMERA NAZ, SAMINA ASHRAF and FARUK KARAASLAN

Theorem 3.3. Let G = (X,Y ) be a BFG on n vertices and A(G) = (A(ηPY (uiuj)),A(ηNY (uiuj))) be the adjacency matrix of G. If n ≤ 2

∑1≤i<j≤n(ηPY (uiuj))

2 and

n ≤ 2∑

1≤i<j≤n(ηNY (uiuj))2. Then

(i) E(ηPY (uiuj)) ≤2∑

1≤i<j≤n(ηPY (uiuj))

2

n

+

√√√√(n− 1)

2∑

1≤i<j≤n(ηPY (uiuj))2 −(

2∑

1≤i<j≤n(ηPY (uiuj))2

n

)2;

(ii) E(ηNY (uiuj)) ≤2∑

1≤i<j≤n(ηNY (uiuj))

2

n

+

√√√√(n− 1)

2∑

1≤i<j≤n(ηNY (uiuj))2 −(

2∑

1≤i<j≤n(ηNY (uiuj))2

n

)2.

Proof. If A = [aij ]n×n is a symmetric matrix with zero trace. Then λmax ≥2∑

1≤i<j≤n aijn , where, λmax is the maximum eigenvalue of A. If A(G) is the

adjacency matrix of a BFG G, then λ1 ≥2∑

1≤i<j≤n ηPY (uiuj)

n , where λ1 ≥ λ2 ≥. . . ≥ λn. Moreover, since

n∑i=1

λ2i = 2∑

1≤i<j≤n(ηPY (uiuj))

2

(3.5)

n∑i=2

λ2i = 2∑

1≤i<j≤n(ηPY (uiuj))

2 − λ21

Applying Cauchy-Schwarz inequality to the vectors (1, 1, . . . , 1) and (|λ1|, |λ2|, . . . ,|λn|) with n− 1 entries, we get

(3.6) E(ηPY (uiuj))− λ1 =n∑i=2

|λi| ≤

√√√√(n− 1)n∑i=2

|λi|2.

Substituting (3.5) in (3.6), we must have

E(ηPY (uiuj))− λ1 ≤

√√√√√(n− 1)

2∑

1≤i<j≤n(ηPY (uiuj))2 − λ21

(3.7) E(ηPY (uiuj)) ≤ λ1 +

√√√√√(n− 1)

2∑

1≤i<j≤n(ηPY (uiuj))2 − λ21

.

Page 361: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ENERGY OF A BIPOLAR FUZZY GRAPH AND ITS APPLICATION IN DECISION MAKING 347

Now, since the function F (x) = x+√

(n− 1)(2∑

1≤i<j≤n(ηPY (uiuj))2 − x2) de-

creases on the interval (

√2∑

1≤i<j≤n(ηPY (uiuj))2

n ,√

2∑

1≤i<j≤n(ηPY (uiuj))2). Also

n ≤ 2∑

1≤i<j≤n(ηPY (uiuj))2, 1 ≤ 2

∑1≤i<j≤n(η

PY (uiuj))

2

n . So,√2∑

1≤i<j≤n(ηPY (uiuj))2

n ≤ 2∑

1≤i<j≤n(ηPY (uiuj))

2

n ≤ 2∑

1≤i<j≤n ηPY (uiuj)

n ≤ λ1≤√

2∑

1≤i<j≤n(ηPY (uiuj))2. Therefore, (3.7) implies E(ηPY (uiuj))

≤ 2∑

1≤i<j≤n(ηPY (uiuj))

2

n

+

√(n− 1)2

∑1≤i<j≤n(ηPY (uiuj))2 − (

2∑

1≤i<j≤n(ηPY (uiuj))2

n )2.

Similarly, E(ηNY (uiuj)) ≤2∑

1≤i<j≤n(ηNY (uiuj))

2

n

+

√(n− 1)2

∑1≤i<j≤n(ηNY (uiuj))2 − (

2∑

1≤i<j≤n(ηNY (uiuj))2

n )2.

Theorem 3.4. Let G = (X,Y ) be a BFG on n vertices. Then E(G) ≤ n2 (1 +√

n).

Proof. Suppose that G = (X,Y ) is a BFG with n vertices.

If n ≤ 2∑

1≤i<j≤n(ηPY (uiuj))2 = 2y, then by routine calculus, it is easy to

show that f(y) = 2yn +

√(n− 1)(2y − (2yn )2) is maximized when y = n2+n

√n

4 .

Substituting this value of y in place of y =∑

1≤i<j≤n(ηPY (uiuj))2 in Theorem

3.3, we must have E(ηPY (uiuj)) ≤ n2 (1 +

√n). Similarly, it is easy to show that

E(ηNY (uiuj)) ≤ n2 (1 +

√n). Hence E(G) ≤ n

2 (1 +√n).

4. Energy of a bipolar fuzzy digraph

In this section, we generalize the concept of energy to BFDGs.

Definition 4.1. Let D = (X,−→Y ) be a BFDG on n vertices. The energy of D is

defined as

E(D) =(E(ηP−→

Y(uiuj)), E(ηN−→

Y(uiuj))

)=

n∑i=1zi∈S

|Re(zi)|,n∑i=1wi∈T

|Re(wi)|

,

where Re(zi) and Re(wi) represent the real part of eigenvalues zi and wi, re-spectively.

Example 4.1. Consider a digraph D = (V,−→E ), where V = u1, u2, u3, u4, u5

and−→E = u1u2, u2u3, u3u4, u4u1, u3u1, u5u4. Let D = (X,

−→Y ) be a BFDG of

(crisp) digraph D, as given in Fig. 2.The corresponding adjacent matrix R is as follows:

Page 362: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

348 SUMERA NAZ, SAMINA ASHRAF and FARUK KARAASLAN

u1(0.7,−0.4)

u2(0.9,−0.3)

(0.2,−0.4)

(0.1,−

0.2)

(0.3,−0.2)

u3(0.3,−0.5)

u4(0.5,−0.2)

u5(0.4,−0.7)

(0.6,−0.1)

(0.2,−0.1)

(0.4,−0.1)

Figure 2: Bipolar fuzzy digraph.

R =

(0, 0) (0.6,−0.1) (0, 0) (0, 0) (0, 0)(0, 0) (0, 0) (0.1,−0.2) (0, 0) (0, 0)

(0.2,−0.4) (0, 0) (0, 0) (0.2,−0.1) (0, 0)(0.4,−0.1) (0, 0) (0, 0) (0, 0) (0, 0)

(0, 0) (0, 0) (0, 0) (0.3,−0.2) (0, 0)

The spectrum and the energy of a BFDG D, given in Fig. 2 are Spec(G) =(0, 0), (0.3031,−0.2077), (−0.0432+0.2669i, 0.0914+0.1739i), (−0.0432−0.2669i,0.0914− 0.1739i), (−0.2166, 0.0250) and E(G) = (0.6061, 0.4154), respectively.

Definition 4.2. A bipolar fuzzy preference relation R on a set of alternativesV = x1, x2, . . . , xn is defined as a matrix R = (bij)n×n ⊂ V × V where bij =(ηP (xixj), η

N (xixj)) for all i, j = 1, 2, ..., n. Let bij = (ηPij , ηNij ) is a bipolar fuzzy

value, composed by the certainty degree ηPij to which xi is positively preferred

to xj and the certainty degree ηNij to which xi is negatively preferred to xj with

0 ≤ ηPij ≤ 1,−1 ≤ ηNij ≤ 0, ηPij + ηPji = 1, ηNij + ηNji = −1 and bii = (0.5,−0.5) forall i, j = 1, 2, . . . , n.

4.1 Application of energy of a BFDG in decision making problem

In modern warfare, it is very important to maintain the communication smoothly.Thus, the performance of the communication equipment plays a key role in cam-paign victory and defeat. It is necessary for communication units to keep regularcommunication drills. Suppose that the headquarters are drawing up a plan ofcommunication drill next round. According to the consultations with differentsimulation environments, there are four possible training venues (alternatives)xi(i = 1, 2, 3, 4) to choose from. The leaders of the communication unit invitea decision group which contains six experts ek(k = 1, 2, . . . , 6) to evaluate allvenues so as to make the most reasonable choice. Based on their experiences,the experts compare each pair of alternatives and give individual judgments us-

ing the following bipolar fuzzy preference relations Rk = (rP (k)ij , r

N(k)ij )4×4 (k =

1, 2, . . . , 6):

Page 363: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ENERGY OF A BIPOLAR FUZZY GRAPH AND ITS APPLICATION IN DECISION MAKING 349

R1 =

(0.50,−0.50) (0.23,−0.17) (0.57,−0.67) (0.63,−0.5)(0.77,−0.83) (0.50,−0.50) (0.17,−1) (0.84,−0.67)(0.43,−0.33) (0.83, 0) (0.50,−0.50) (0.42,−0.17)(0.37,−0.50) (0.16,−0.33) (0.58,−0.83) (0.50,−0.50)

R2 =

(0.50,−0.50) (0.38,−0.38) (0.51,−0.58) (0.27,−0.84)(0.62,−0.62) (0.50,−0.50) (0.60,−0.69) (0.75,−0.90)(0.49,−0.42) (0.40,−0.31) (0.50,−0.50) (0.14,−0.80)(0.73,−0.16) (0.25,−0.10) (0.86,−0.20) (0.50,−0.50)

R3 =

(0.50,−0.50) (0.57,−0.10) (0.40,−0.60) (0.46,−0.70)(0.43,−0.90) (0.50,−0.50) (0.61,−0.80) (0.19,−0.40)(0.60,−0.40) (0.39,−0.20) (0.50,−0.50) (0.80,−0.90)(0.54,−0.30) (0.81,−0.60) (0.20,−0.10) (0.50,−0.50)

R4 =

(0.50,−0.50) (0.30,−0.33) (0.42,−0.17) (0.26,−0.67)(0.70,−0.67) (0.50,−0.50) (0.90,−0.33) (0.72,−0.17)(0.58,−0.83) (0.10,−0.67) (0.50,−0.50) (0.81,−1)(0.74,−0.33) (0.28,−0.83) (0.19, 0) (0.50,−0.50)

R5 =

(0.50,−0.50) (0.70,−0.34) (0.16,−0.20) (0.41,−0.96)(0.30,−0.66) (0.50,−0.50) (0.80,−0.33) (0.29,−0.98)(0.84,−0.80) (0.20,−0.67) (0.50,−0.50) (0.63,−0.99)(0.59,−0.04) (0.71,−0.02) (0.37,−0.01) (0.50,−0.50)

R6 =

(0.50,−0.50) (0.23,−0.50) (1.0,−0.70) (0.30,−1.0)(0.77,−0.50) (0.50,−0.50) (0.60,−0.80) (0.36,−0.60)

(0,−0.30) (0.40,−0.20) (0.50,−0.50) (0.72,−0.80)(0.70, 0) (0.64,−0.40) (0.28,−0.20) (0.50,−0.50)

The BFDGs Di corresponding to bipolar fuzzy preference relations given

in matrices Ri are shown in Fig. 3. The energy of each BFDG is E(R1) =(2.9357, 2.3961), E(R2) = (2.8289, 2.5249), E(R3) = (2.9602, 2.8495), E(R4) =(2.7304, 2.6413), E(R5) = (2.9699, 1.9252), E(R6) = (2.9510, 2.5897). Then theweights can be calculated as:

wk = (wPk , wNk ) =

(E(RPk )∑ml=1E(RPl )

,E(RNk )∑ml=1E(RNl )

), k = 1, 2, . . . ,m,

Here w1 = (0.1690, 0.1605), w2 = (0.1628, 0.1692), w3 = (0.1704, 0.1909), w4 =(0.1571, 0.177), w5 = (0.1709, 0.1290), w6 = (0.1698, 0.1735).

The collective bipolar fuzzy preference relation aggregated from the six bipo-lar fuzzy preference relations is determined as:

Page 364: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

350 SUMERA NAZ, SAMINA ASHRAF and FARUK KARAASLAN

(0.23,−0.17)

(0.83,0)

(0.63,−0.5)

(0.77,−0.83)

(0.58,−0.83)

(0.42,−0.17)

(0.17,−1)

(0.37,−0.5)

(0.57,−0.67)

(0.43,−0.33)

(0.16,−

0.33)

(0.84,−

0.67)

D1

x1

x4

x2

x3

(0.38,−0.38)

(0.40,−0.31)

(0.27,−0.84)

(0.62,−0.62)

(0.86,−0.20)

(0.14,−0.80)

(0.60,−0.69)

(0.73,−0.16)

(0.51,−0.58)

(0.49,−0.42)

(0.25,−

0.10)

(0.75,−

0.90)

D2

x1

x4

x2

x3

(0.57,−0.10)

(0.39,−0.20)

(0.46,−0.70)

(0.43,−0.90)

(0.20,−0.10)

(0.80,−0.90)

(0.61,−0.80)

(0.54,−0.30)

(0.40,−0.60)

(0.60,−0.40)

(0.81,−

0.60)

(0.19,−

0.40)

D3

x1

x4

x2

x3

(0.30,−0.33)

(0.10,−0.67)

(0.26,−0.67)

(0.70,−0.67)

(0.19, 0)

(0.81,−1)

(0.90,−0.33)

(0.74,−0.33)

(0.42,−0.17)

(0.58,−0.83)

(0.28,−

0.83)

(0.72,−

0.17)

D4

x1

x4

x2

x3

(0.70,−0.34)

(0.20,−0.67)

(0.41,−0.96)

(0.30,−0.66)

(0.37,−0.01)

(0.63,−0.99)

(0.80,−0.33)

(0.59,−0.04)

(0.16,−0.20)

(0.84,−0.80)

(0.71,−

0.02)

(0.29,−

0.98)

D5

x1

x4

x2

x3

(0.23,−0.50)

(0.40,−0.20)

(0.30,−1.0)

(0.77,−0.50)

(0.28,−0.20)

(0.72,−0.80)

(0.60,−0.80)

(0.70,0)

(1.0,−0.70)

(0,−0.30)

(0.64,−

0.40)

(0.36,−

0.60)

D6

x1

x4

x2

x3

Figure 3: Bipolar fuzzy digraphs

R =∑6

k=1wkRk =(0.5,−0.5) (0.4037,−0.2997) (0.5106,−0.4976) (0.3907,−0.7719)

(0.5963,−0.7004) (0.5,−0.5) (0.6103,−0.6697) (0.5202,−0.5968)(0.4894,−0.5025) (0.3897,−0.3304) (0.5,−0.5) (0.5873,−0.7780)(0.6093,−0.2282) (0.4798,−0.4033) (0.4127,−0.2221) (0.5,−0.5)

.Calculate their scores using the score function sij = η−ij + η+ij [12]:

R =

0 0.1040 0.0130 −0.3812

−0.1041 0 −0.0594 −0.0766−0.0131 0.0593 0 −0.19070.3811 0.0765 0.1906 0

.

Page 365: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ENERGY OF A BIPOLAR FUZZY GRAPH AND ITS APPLICATION IN DECISION MAKING 351

The net flow of xi, i.e., the net degree of preference of xi over the other alter-natives is

ϕ(xi) =m∑k=1

wk

n∑j=1j =i

(r(k)ij − r

(k)ji )

, i = 1, 2, . . . , n.

So, the net flows of the four alternatives are ϕ(x1) = −0.5281, ϕ(x2) = −0.4799,ϕ(x3) = −0.2887, ϕ(x4) = 1.2967, which give the ranking of x4 ≻ x3 ≻ x2 ≻ x1.Thus, the best choice is x4.

5. Conclusions

A bipolar fuzzy model provides more precision, flexibility, and compatibility tothe system as compared to the classical and fuzzy model. In this paper, wehave introduced the concept of energy of a graph in bipolar fuzzy setting andinvestigated its properties. We have derived the maximal energy of BFGs. Wehave also introduced the concept of energy of a BFDG along with its applicationin decision making problem. In further work, it is necessary and meaningfulto extend the energy of BFGs to (1) Pythagorean fuzzy graphs, (2) Interval-valued Pythagorean fuzzy graphs, (3) Hesitant fuzzy graphs, and (4) HesitantPythagorean fuzzy graphs.

References

[1] M. Akram, Bipolar fuzzy graphs, Information Sciences, 181 (2011), 5548-5564.

[2] M. Akram, Bipolar fuzzy graphs with applications, Knowledge-Based Sys-tems, 39 (2013), 1-8.

[3] M. Akram, N. Waseem, Novel applications of bipolar fuzzy graphs to deci-sion making problems, Journal of Applied Mathematics and Computing, 56(2018), 73-91 .

[4] M. Akram, N. Alshehri, B. Davvaz, A. Ashraf, Bipolar fuzzy digraphs indecision support systems, Journal of Multiple-Valued Logic and Soft Com-puting, 27(5-6) (2016), 531-551.

[5] N. Anjali, S. Mathew, Energy of a fuzzy graph, Annals Fuzzy Maths andInformatics, 6 (2013), 455–65.

[6] S. Ashraf, S. Naz, H. Rashmanlou, M.A. Malik, Regularity of graphs insingle valued neutrosophic environment, Journal of Intelligent and FuzzySystems, 33(1)(2017), 529–542.

Page 366: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

352 SUMERA NAZ, SAMINA ASHRAF and FARUK KARAASLAN

[7] R.A. Borzooei, H. Rashmanlou, New concepts of vague graphs, Interna-tional Journal of Machine Learning and Cybernetics, 8(4) (2017), 1081-1092.

[8] I. Gutman, The energy of a graph, Ber Math Stat Sekt Forsch Graz, 103(1978), 1–22.

[9] I. Gutman, The energy of a graph: old and new results, Algebraic Combi-natorics and Applications, Springer Berlin Heidelberg, (2001), 196–211.

[10] A. Kaufmann, Introduction a la Theorie des Sour-ensembles Flous, Massonet Cie, 1 (1973).

[11] K.M. Lee, Bipolar-valued fuzzy sets and their basic operations, in: Proceed-ings of the International Conference, Bangkok 2000, Thailand, 307–317.

[12] T. Mahmood, et al., Multiple criteria decision making based on bipolarvalued fuzzy sets, Annals of Fuzzy Mathematics and Informatics, 11 (6)(2016), 1003–1009.

[13] S. Naz, H. Rashmanlou, M.A. Malik, Operations on single valued neutro-sophic graphs with application, Journal of Intelligent and Fuzzy Systems,32(3) (2017), 2137–2151.

[14] S. Naz, M.A. Malik, H. Rashmanlou, Hypergraphs and transversals ofhypergraphs in interval-valued intuitionistic fuzzy setting, The Journal ofMultiple-Valued Logic and Soft Computing, 30 (4-6) (2018), 399-417.

[15] S. Naz, S. Ashraf, M. Akram, A novel approach to decision-making withPythagorean fuzzy information, 6 (2018), 1-28.

[16] I. Pea, J. Rada, Energy of digraphs, Linear and Multilinear Algebra, 56(5)(2008), 565–579.

[17] A. Rosenfeld, Fuzzy graphs, Fuzzy Sets and their Applications (L. A. Zadeh,K. S. Fu, M. Shimura, Eds.) Academic Press, New York, (1975), 77–95.

[18] M. Sarwar, M. Akram, Certain algorithms for computing strength of com-petition in bipolar fuzzy graphs, International Journal of Uncertainty, Fuzzi-ness and Knowledge-Based Systems, 25(6) (2017), 877-896.

[19] Y.M. Wang, Z. P. Fan, Fuzzy preference relations: Aggregation and weightdetermination, Computers & Industrial Engineering, 53(1) (2007), 163–172.

[20] L.A. Zadeh, Fuzzy sets, Information and Control, 8(3) (1965), 338–353.

[21] W-R. Zhang, Bipolar fuzzy sets and relations: a computational frame-work forcognitive modeling and multiagent decision analysis, Proceedingsof IEEE conference, (1994), 305–309.

Accepted: 27.10.2017

Page 367: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (353–375) 353

COMMUTATIVE NEUTROSOPHIC TRIPLET GROUP ANDNEUTRO-HOMOMORPHISM BASIC THEOREM

Xiaohong Zhang∗

Department of MathematicsShaanxi University of Science and TechnologyXi′an 710021P. R. ChinaandDepartment of MathematicsShanghai Maritime UniversityShanghai, 201306P. R. [email protected]@shmtu.edu.cn

Florentin SmarandacheDepartment of MathematicsUniversity of New MexicoGallup, NM [email protected]

Mumtaz AliDepartment of MathematicsQuaid-i-Azam UniversityIslamabad, [email protected]

Xingliang LiangDepartment of Mathematics

Shaanxi University of Science and Technology

Xi′an, 710021

P. R. China

[email protected]

Abstract. Recently, the notions of neutrosophic triplet and neutrosophic triplet groupare introduced by Florentin Smarandache and Mumtaz Ali. The neutrosophic triplet isa group of three elements that satisfy certain properties with some binary operations.The neutrosophic triplet group is completely different from the classical group in thestructural properties. In this paper, we further study neutrosophic triplet group. First,to avoid confusion, some new symbols are introduced, and several basic properties ofneutrosophic triplet group are rigorously proved (because the original proof is flawed),

∗. Corresponding author

Page 368: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

354 X. ZHANG, F. SMARANDACHE, M. ALI and X. LIANG

and a result about neutrosophic triplet subgroup is revised. Second, some new proper-ties of commutative neutrosophic triplet group are funded, and a new equivalent relationis established. Third, based on the previous results, the following important proposi-tions are proved: from any commutative neutrosophic triplet group, an Abel group canbe constructed; from any commutative neutrosophic triplet group, a BCI-algebra canbe constructed. Moreover, some important examples are given. Finally, by using anyneutrosophic triplet subgroup of a commutative neutrosophic triplet group, a new con-gruence relation is established, and then the quotient structure induced by neutrosophictriplet subgroup is constructed and the neutro-homomorphism basic theorem is proved.

Keywords: neutrosophic triplet, neutrosophic triplet group, Abel group, BCI-algebra,neutro-homomorphism basic theorem.

1. Introduction

From a philosophical point of view, Florentin Smarandache introduced the con-cept of a neutrosophic set (see [12, 13, 14]). The neutrosophic set theory isapplied to many scientific fields and also applied to algebraic structures (see[1, 3, 7, 10, 11, 15, 17, 19]). Recently, Florentin Smarandache and Mumtaz Aliin [16], for the first time, introduced the notions of neutrosophic triplet and neu-trosophic triplet group. The neutrosophic triplet is a group of three elementsthat satisfy certain properties with some binary operation. The neutrosophictriplet group is completely different from the classical group in the structuralproperties. In 2017, Florentin Smarandache has written the monograph [15]which is present the last developments in neutrodophic theories (including neu-trosophic triplet and neutrosophic triplet group).

In this paper, we further study neutrosophic triplet group. We discuss somenew properties of commutative neutrosophic triplet group, and investigate therelationships among commutative neutrosophic triplet group, Abel group (thatis, commutative group) and BCI-algebra. Moreover, we establish the quotientstructure and neutro-homomorphism basic theorem.

As a guide, it is necessary to give a brief overview of the basic aspectsof BCI-algebra and related algebraic systems. In 1966, K. Iseki introduced theconcept of BCI-algebra as an algebraic counterpart of the BCI-logic (see [5, 24]).The algebraic structures closely related to BCI algebra are BCK-algebra, BCC-algebra, BZ-algebra, BE-algebra, and so on (see [2, 8, 20, 21, 22, 25]). Asa generalization of BCI-algebra, W. A. Dudek and Y. B. Jun [4] introducedthe notion of pseudo-BCI algebras. Moreover, pseudo-BCI algebra is also as ageneralization of pseudo-BCK algebra (which is close connection with variousnon-commutative fuzzy logic formal systems, see [18, 22, 23, 24]). Recently,some articles related filter theory of pseudo-BCI algebras are published (see[26, 27, 28, 29]). As non-classical logic algebras, BCI-algebras are closely relatedto Abel groups (see [9]); similarly, BZ-algebras (pseudo-BCI algebras) are closelyrelated general groups (see [20, 26]), and some results in [9, 20] will be appliedin this paper.

Page 369: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMMUTATIVE NEUTROSOPHIC TRIPLET GROUP ... 355

2. Some basic concepts

2.1 On neutrosophic triplet group

Definition2.1 ([16]). Let N be a set together with a binary operation ∗. Then,N is called a neutrosophic triplet set if for any a ∈ N , there exist a neutral of“a” called neut(a), different from the classical algebraic unitary element, and anopposite of “a” called anti(a), with neut(a) and anti(a) belonging to N , suchthat:

a ∗ neut(a) = neut(a) ∗ a = a;a ∗ anti(a) = anti(a) ∗ a = neut(a).

The elements a, neut(a) and anti(a) are collectively called as neutrosophictriplet, and we denote it by (a, neut(a), anti(a)). By neut(a), we mean neu-tral of a and apparently, a is just the first coordinate of a neutrosophic tripletand not a neutrosophic triplet. For the same element “a” in N , there may bemore neutrals to it neut(a) and more opposites of it anti(a).

Definition2.2 ([16]). The element b in (N, ∗) is the second component, denotedas neut(·), of a neutrosophic triplet, if there exist other elements a and c in Nsuch that a ∗ b = b ∗a = a and a ∗ c = c ∗a = b. The formed neutrosophic tripletis (a, b, c).

Definition2.3 ([16]). The element c in (N, ∗) is the third component, denotedas anti(·), of a neutrosophic triplet, if there exist other elements a and b in Nsuch that a ∗ b = b ∗a = a and a ∗ c = c ∗a = b. The formed neutrosophic tripletis (a, b, c).

Definition2.4 ([16]). Let (N, ∗) be a neutrosophic triplet set. Then, N is calleda neutrosophic triplet group, if the following conditions are satisfied:

(1) If (N, ∗) is well-defined, i.e. for any a, b ∈ N , one has a ∗ b ∈ N .

(2) If (N, ∗) is associative, i.e. (a ∗ b) ∗ c = a ∗ (b ∗ c) for all a, b, c ∈ N .

Definition 2.5 ([16]). Let (N, ∗) be a neutrosophic triplet group. Then, Nis called a commutative neutrosophic triplet group if for all a, b ∈ N , we havea ∗ b = b ∗ a.

Definition 2.6 ([16]). Let (N, ∗) be a neutrosophic triplet group under ∗, andlet H be a subset of N . Then, H is called a neutrosophic triplet subgroup of Nif H itself is a neutrosophic triplet group with respect to ∗.

Remark 2.7. In order to include richer structure, the original concept of neu-trosophic triplet is generalized to neutrosophic extended triplet by FlorentinSmarandache. A neutrosophic extended triplet is a neutrosophic triplet, de-fined as above, but where the neutral of x (called “extended neutral”) is allowed

Page 370: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

356 X. ZHANG, F. SMARANDACHE, M. ALI and X. LIANG

to also be equal to the classical algebraic unitary element (if any). There-fore, the restriction “different from the classical algebraic unitary element ifany” is released. As a consequence, the “extended opposite” of x, is also al-lowed to be equal to the classical inverse element from a classical group. Thus,a neutrosophic extended triplet is an object of the form (x, neut(x), anti(x)),for x ∈ N , where neut(x) ∈ N is the extended neutral of x, which can beequal or different from the classical algebraic unitary element if any, such that:x ∗ neut(x) = neut(x) ∗ x = x, and anti(x) ∈ N is the extended opposite of xsuch that: x ∗ anti(x) = anti(x) ∗ x = neut(x). In this paper, “neutrosophictriplet” means that “neutrosophic extended triplet”.

2.2 On BCI-algebras

Definition2.8 ([5, 23]). A BCI-algebra is an algebra (X;→, 1) of type (2, 0) inwhich the following axioms are satisfied:

(i) (x→ y)→ ((y → z)→ (x→ z)) = 1,(ii) x→ x = 1,(iii) 1→ x = x,(iv) if x→ y = y → x = 1, then x = y.

In any BCI-algebra (X;→, 1) one can define a relation ≤ by putting x ≤ yif and only if x→ y = 1, then ≤ is a partial order on X.

Definition 2.9 ([9, 26]). Let (X;→, 1) be a BCI-algebra. The set x|x ≤ 1 iscalled the p-radical (or BCK-part) of X. A BCI-algebra X is called p-semisimpleif its p-radical is equal to 1.

Proposition2.10 ([9]). Let (X;→, 1) be a BCI-algebra. Then the following areequivalent:

(i) X is p-semisimple,(ii) x→ 1 = 1⇒ x = 1,(iii) (x→ 1)→ 1 = x, ∀x ∈ X,(iv) (x→ 1)→ y = (y → 1)→ x for all x, y ∈ X.

Proposition 2.11 ([26]). Let (X;→, 1) be a BCI-algebra. Then the followingare equivalent:

(S1) X is p-semisimple,(S2) x→ y = 1⇒ x = y for all x, y ∈ X,(S3) (x→ y)→ (z → y) = z → x for all x, y, z ∈ X,(S4) (x→ y)→ 1 = y → x for all x, y ∈ X,(S5) (x→ y)→ (a→ b) = (x→ a)→ (y → b) for all x, y, a, b ∈ X.

Proposition 2.12 ([9, 26]). Let (X;→, 1) be p-semisimple BCI-algebra; define+ and − as follows: for all x, y ∈ X,

x+ ydef= (x→ 1)→ y, − x def

= x→ 1.

Then (X; +,−, 1) is an Abel group.

Page 371: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMMUTATIVE NEUTROSOPHIC TRIPLET GROUP ... 357

Proposition 2.13 ([9, 26]). Let (X; +,−, 1) be an Abel group. Define (X;≤,→, 1), where

x→ y = −x+ y, x ≤ y if and only if − x+ y = 1, ∀x, y ∈ X.

Then, (X;≤,→, 1) is a BCI-algebra.

3. Some properties of neutrosophic triplet group

As mentioned earlier, for a neutrosophic triplet group (N, ∗), if a ∈ N , thenneut(a) may not be unique, and anti(a) may not be unique. Thus, the symbolicneut(a) sometimes means one and sometimes more than one, which is ambigu-ous. To this end, this paper introduces the following notations to distinguish:

neut(a): denote any certain one of neutral of a;neut(a): denote the set of all neutral of a.Similarly,anti(a): denote any certain one of opposite of a;anti(a): denote the set of all opposite of a.

Remark 3.1. In order not to cause confusion, we always assume that: (1)for the same a, when multiple neut(a) (or anti(a)) are present in the sameexpression, they are always are consistent. Of course, if they are neutral (oropposite) of different elements, they refer to different objects (for example, ingeneral, neut(a) is different from neut(b)). (2) if neut(a) and anti(a) are presentin the same expression, then they are match each other.

Proposition 3.2. Let (N, ∗) be a neutrosophic triplet group with respect to ∗and a ∈ N . Then

neut(a) ∗ neut(a) ∈ neut(a).Proof. For any a ∈ N , by Definition 2.1 we have

a ∗ neut(a) = a, neut(a) ∗ a = a.

From this, using associative law, we can get

a ∗ (neut(a) ∗ neut(a)) = (neut(a) ∗ neut(a)) ∗ a = a.

By Definition 2.1, it follows that (neut(a) ∗ neut(a)) is a neutral of a. That is,neut(a) ∗ neut(a) ∈ neut(a).

Remark 3.3. This proposition is a revised version of Theorem 3.21(1) in [16].If neut(a) is unique, then they are same. But, if neut(a) is not unique, theyare different. For example, assume neut(a) = s, t, then neut(a) denote anyone of s, t. Thus neut(a) ∗ neut(a) represents one of s ∗ s, and t ∗ t. Moreover,Proposition 3.2 means that s ∗ s, t ∗ t ∈ neut(a) = s, t, that is,

s ∗ s = s, or s ∗ s = t; t ∗ t = s, or t ∗ t = t.

And, in this case, the equation neut(a)∗neut(a) = neut(a) means that s∗s = s,t ∗ t = t. So, they are different.

Page 372: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

358 X. ZHANG, F. SMARANDACHE, M. ALI and X. LIANG

Proposition 3.4. Let (N, ∗) be a neutrosophic triplet group with respect to ∗and a ∈ N . If

neut(a) ∗ neut(a) = neut(a).

Then

neut(a) ∗ anti(a) ∈ anti(a);anti(a) ∗ neut(a) ∈ anti(a).

Proof. For any a ∈ N , by Definition 2.1 we have

a ∗ neut(a) = neut(a) ∗ a = a;a ∗ anti(a) = anti(a) ∗ a = neut(a).

From this, using associative law, we can get

a ∗ (neut(a) ∗ anti(a)) = (a ∗ neut(a)) ∗ anti(a) = a ∗ anti(a) = neut(a).

And,

(neut(a) ∗ anti(a)) ∗ a = neut(a) ∗ (anti(a) ∗ a) = neut(a) ∗ neut(a) = neut(a).

By Definition 2.1, it follows that (neut(a) ∗ anti(a)) is a opposite of a. That is,neut(a) ∗ anti(a) ∈ anti(a). In the same way, we can get anti(a) ∗ neut(a) ∈anti(a).

Proposition 3.5. Let (N, ∗) be a neutrosophic triplet group with respect to ∗and let a, b, c ∈ N . Then

(1) a ∗ b = a ∗ c if and only if neut(a) ∗ b = neut(a) ∗ c.

(2) b ∗ a = c ∗ a if and only if b ∗ neut(a) = c ∗ neut(a).

Proof. Assume a ∗ b = a ∗ c. Then anti(a) ∗ (a ∗ b) = anti(a) ∗ (a ∗ c). Byassociative law, we have

(anti(a) ∗ a) ∗ b = (anti(a) ∗ a) ∗ c.

Using Definition 2.1 we get neut(a) ∗ b = neut(a) ∗ c.Conversely, assume neut(a) ∗ b = neut(a) ∗ c. Then a ∗ (neut(a) ∗ b) =

a ∗ (neut(a) ∗ c). By associative law, we have

(a ∗ neut(a)) ∗ b = (a ∗ neut(a)) ∗ c.

Using Definition 2.1 we get a ∗ b = a ∗ c. That is, (1) holds.Similarly, we can prove that (2) holds.

Proposition 3.6. Let (N, ∗) be a neutrosophic triplet group with respect to ∗and let a, b, c ∈ N .

(1) If anti(a) ∗ b = anti(a) ∗ c, then neut(a) ∗ b = neut(a) ∗ c.

Page 373: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMMUTATIVE NEUTROSOPHIC TRIPLET GROUP ... 359

(2) If b ∗ anti(a) = c ∗ anti(a), then b ∗ neut(a) = c ∗ neut(a).

Proof. Assume anti(a)∗b = anti(a)∗c. Then a∗(anti(a)∗b) = a∗(anti(a)∗c).By associative law, we have

(a ∗ anti(a)) ∗ b = (a ∗ anti(a)) ∗ c.

Using Definition 2.1 we get neut(a) ∗ b = neut(a) ∗ c. It follows that (1) holds.Similarly, we can prove that b ∗ anti(a) = c ∗ anti(a) ⇒ b ∗ neut(a) =

c ∗ neut(a).

Theorem 3.7. Let (N, ∗) be a neutrosophic triplet group with respect to ∗ anda ∈ N . Then

neut(neut(a)) ∈ neut(a).

Proof. For any a ∈ N , by Definition 2.1 we have

neut(a) ∗ neut(neut(a)) = neut(a);neut(neut(a)) ∗ neut(a) = neut(a).

Then

a ∗ (neut(a) ∗ neut(neut(a))) = a ∗ neut(a);(neut(neut(a)) ∗ neut(a)) ∗ a = neut(a) ∗ a.

By associative law and Definition 2.1, we have

a ∗ neut(neut(a)) = a;neut(neut(a)) ∗ a = a.

From this, by Definition 2.1, neut(neut(a)) ∈ neut(a).

Theorem 3.8. Let (N, ∗) be a neutrosophic triplet group with respect to ∗ anda ∈ N . Then

neut(anti(a)) ∈ neut(a).

Proof. For any a ∈ N , by Definition 2.1 we have

anti(a) ∗ neut(anti(a)) = anti(a);neut(anti(a)) ∗ anti(a) = anti(a).

Then

a ∗ (anti(a) ∗ neut(anti(a))) = a ∗ anti(a);(neut(anti(a)) ∗ anti(a)) ∗ a = anti(a) ∗ a.

Using associative law and Definition 2.1,

neut(a) ∗ neut(anti(a)) = neut(a);neut(anti(a)) ∗ neut(a) = neut(a).

It follows that a∗neut(anti(a)) = a, neut(anti(a))∗a = a. That is, neut(anti(a)) ∈neut(a).

Page 374: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

360 X. ZHANG, F. SMARANDACHE, M. ALI and X. LIANG

Theorem 3.9. Let (N, ∗) be a neutrosophic triplet group with respect to ∗ anda ∈ N . Then

neut(a) ∗ anti(anti(a)) = a.

where, neut(a) ∈ neut(a), anti(a) ∈ anti(a), and neut(a) matches anti(a),that is, a ∗ anti(a) = anti(a) ∗ a = neut(a).

Proof. For any a ∈ N , by Definition 2.1 we have

anti(a) ∗ anti(anti(a)) = neut(anti(a)).

Then

a ∗ (anti(a) ∗ anti(anti(a))) = a ∗ neut(anti(a)).(a ∗ anti(a)) ∗ anti(anti(a)) = a ∗ neut(anti(a)).neut(a) ∗ anti(anti(a)) = a ∗ neut(anti(a)).

On the other hand, by Theorem 3.8, neut(anti(a)) ∈ neut(a). By Definition2.1, it follows that a∗neut(anti(a))=a. Therefore, neut(a)∗anti(anti(a))=a.

Theorem 3.10. Let (N, ∗) be a neutrosophic triplet group with respect to ∗ anda ∈ N . Then

anti(neut(a)) ∈ neut(a).

Proof. For any a ∈ N , by Definition 2.1 we have

neut(a) ∗ anti(neut(a)) = neut(neut(a));anti(neut(a)) ∗ neut(a) = neut(neut(a)).

Thus

a ∗ (neut(a) ∗ anti(neut(a))) = a ∗ neut(neut(a));(anti(neut(a)) ∗ neut(a)) ∗ a = neut(neut(a)) ∗ a.

Applying associative law and Definition 2.1,

a ∗ anti(neut(a)) = a ∗ neut(neut(a));anti(neut(a)) ∗ a = neut(neut(a)) ∗ a.

On the other hand, by Theorem 3.7, neut(neut(a)) ∈ neut(a). It follows that

a ∗ neut(neut(a)) = neut(neut(a)) ∗ a = a.

Therefore,

a ∗ anti(neut(a))) = anti(neut(a)) ∗ a = a.

This means that anti(neut(a)) ∈ neut(a).

Theorem 3.11. Let (N, ∗) be a neutrosophic triplet group with respect to ∗ anda, b ∈ N . Then

neut(a ∗ a) ∈ neut(a).

Page 375: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMMUTATIVE NEUTROSOPHIC TRIPLET GROUP ... 361

Proof. For any a ∈ N , by Definition 2.1 we have

(a ∗ a) ∗ neut(a ∗ a) = a ∗ a.

From this and applying the associativity of operation ∗ and Definition 2.1 weget

(anti(a) ∗ a) ∗ a ∗ neut(a ∗ a) = (anti(a) ∗ a) ∗ a.neut(a) ∗ a ∗ neut(a ∗ a) = neut(a) ∗ a.

a ∗ neut(a ∗ a) = a.

Similarly, we can prove neut(a ∗ a) ∗ a = a. This means that neut(a ∗ a) ∈neut(a).

Now, we note that Proposition 3.18 in [16] is not true.

Example 3.12. Consider (Z10, ♯), where ♯ is defined as a ♯ b = 3ab(mod10).Then, (Z10, ♯) is a neutrosophic triplet group under the binary operation ♯ withTable 1.

Table 1 Cayley table of neutrosophic triplet group (Z10, ♯)♯ 0 1 2 3 4 5 6 7 8 9

0 0 0 0 0 0 0 0 0 0 0

1 0 3 6 9 2 5 8 1 4 7

2 0 6 2 8 4 0 6 2 8 4

3 0 9 8 7 6 5 4 3 2 1

4 0 2 4 6 8 0 2 4 6 8

5 0 5 0 5 0 5 0 5 0 5

6 0 8 6 4 2 0 8 6 4 2

7 0 1 2 3 4 5 6 7 8 9

8 0 4 8 2 6 0 4 8 2 6

9 0 7 4 1 8 5 2 9 6 3

For each a ∈ Z10, we have neut(a) in Z10. That is,

neut(0) = 0, neut(1) = 7, neut(2) = 2, neut(3) = 7, neut(4) = 2,neut(5) = 5, neut(6) = 2, neut(7) = 7, neut(8) = 2, neut(9) = 7.

Let H = 0, 2, 5, 7, then (H, ♯) is a neutrosophic triplet subgroup of (Z10, ♯),but

anti(5) ∈ 1, 3, 5, 7, 9 ⊂ H,anti(0) ∈ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 ⊂ H.

Therefore, Proposition 3.18 in [16] should be revised to the following form.

Proposition3.13. Let (N, ∗) be a neutrosophic triplet group and H be a subsetof N . Then H is a neutrosophic triplet subgroup of N if and only if the followingconditions hold:

Page 376: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

362 X. ZHANG, F. SMARANDACHE, M. ALI and X. LIANG

(1) a ∗ b ∈ H for all a, b ∈ H.

(2) there exists neut(a) ∈ H for all a ∈ H.

(3) there exists anti(a) ∈ H for all a ∈ H.

4. New properties of commutative neutrosophic triplet group

Theorem 4.1. Let (N, ) be a commutative neutrosophic triplet group with re-spect to ∗ and a, b ∈ N . Then

neut(a) ∗ neut(b) ⊆ neut(a ∗ b).

Proof. For any a, b ∈ N , by Definition 2.1 and 2.4 we have

a ∗ neut(a) ∗ neut(b) ∗ b = (a ∗ neut(a)) ∗ (neut(b) ∗ b) = a ∗ b.

From this and applying the commutativity and associativity of operation ∗ weget

(neut(a) ∗ neut(b)) ∗ (a ∗ b) = (a ∗ b) ∗ (neut(a) ∗ neut(b)) = a ∗ b.

This means that neut(a)∗neut(b) ∈ neut(a∗b), that is, neut(a)∗neut(b) ⊆neut(a ∗ b).

Proposition 4.2. Let (N, ∗) be a commutative neutrosophic triplet group withrespect to ∗ and H = neut(a) | a ∈ N. Then H is a neutrosophic tripletsubgroup of N such that (∀a ∈ N) neut(a) ∈ H and unit(h) ∈ H for anyh ∈ N .

Proof. For any h1, h2 ∈ N , by the definition of H, there exists a, b ∈ N suchthat h1 = neut(a), h2 = neut(b). Then, by Theorem 4.1 we have

h1 ∗ h2 = neut(a) ∗ neut(b) ∈ neut(a ∗ b) ⊆ H.

Moreover, applying Theorem 3.7 and 3.10,

neut(h1) = neut(neut(a)) ∈ neut(a) ⊆ H.anti(h1) = anti(neut(a)) ∈ neut(a) ⊆ H.

Using Proposition 3.13 we know that H is a neutrosophic triplet subgroup ofN , and it satisfies

(∀a ∈ N) neut(a) ∈ H, and unit(h) ∈ H for any h ∈ N.

Theorem 4.3. Let (N, ∗) be a commutative neutrosophic triplet group withrespect to ∗ and a, b ∈ N . Then

anti(a) ∗ anti(b) ⊆ anti(a ∗ b).

Page 377: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMMUTATIVE NEUTROSOPHIC TRIPLET GROUP ... 363

Proof. For any a, b ∈ N , by Definition 2.1 and 2.4 we have

a ∗ anti(a) ∗ anti(b) ∗ b = (a ∗ anti(a)) ∗ (anti(b) ∗ b) = neut(a) ∗ neut(b).

From this and applying the commutativity and associativity of operation ∗ weget

(anti(a) ∗ anti(b))(a ∗ b) = (a ∗ b) ∗ (anti(a) ∗ anti(b)) = neut(a) ∗ neut(b).

Applying Theorem 4.1, neut(a) ∗ neut(b) ∈ neut(a ∗ b). Hence, by Definition2.1, anti(a) ∗ anti(b) ∈ anti(a ∗ b), that is, anti(a) ∗ anti(b) ⊆ anti(a ∗b).

Theorem 4.4. Let (N, ∗) be a commutative neutrosophic triplet group withrespect to ∗. Define binary relation ≈neut on N as following:

∀a, b ∈ N , a ≈neut b iff there exists anti(b) ∈ anti(b), and p, q ∈ N , andneut(p) ∈ neut(p) such that

a ∗ anti(b) ∗ neut(p) ∈ neut(q).

Then ≈neut is reflexive and symmetric.

Proof. (1) For any a ∈ N , by Proposition 3.2, neut(a) ∗ neut(a) ∈ neut(a).Using Definition 2.1 we get

a ∗ anti(a) ∗ neut(a) = neut(a) ∗ neut(a) ∈ neut(a).

Then, a ≈neut a.

(2) Assume a ≈neut b, then there exists p, q ∈ N such that

(C1) a ∗ anti(b) ∗ neut(p) = neut(q).

where anti(b) ∈ anti(b), neut(p) ∈ neut(p), neut(q) ∈ neut(q). UsingTheorem 3.10, anti(neut(p)) ∈ neut(p). So, we denote anti(neut(p)) = x ∈neut(p). Thus,

b ∗ anti(a) ∗ x = b ∗ anti(a) ∗ anti(neut(p))= anti(a) ∗ b ∗ anti(neut(p)) (by Definition 2.5)= anti(a) ∗ (neut(b) ∗ anti(anti(b))) ∗ anti(neut(p)) (by Theorem 3.9)= (anti(a) ∗ anti(anti(b)) ∗ anti(neut(p))) ∗ neut(b) (by Definition 2.4and 2.5)∈ anti(a ∗ anti(b) ∗ neut(p)) ∗ neut(b) (by Theorem 4.3)⊆ anti(neut(q)) ∗ neut(b) (by the above result (C1))⊆ neut(q) ∗ neut(b) (by Theorem 3.10)⊆ neut(q ∗ b) (by Theorem 4.1)

This means that b ≈neut a.

Page 378: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

364 X. ZHANG, F. SMARANDACHE, M. ALI and X. LIANG

Definition 4.5. Let (N, ∗) be a neutrosophic triplet group. Then, N is calleda neutrosophic triplet group with condition (AN) if for all a, b ∈ N , we have

(AN) anti(a ∗ b) ⊆ anti(a) ∗ anti(b).Proposition 4.6. Let (N, ∗) be a commutative neutrosophic triplet group withcondition (AN) and a, b ∈ N . Then

neut(a ∗ b) ∈ neut(a) ∗ neut(b).

Proof. For any a, b ∈ N , by Definition 4.5, there exists anti(a) ∈ anti(a),anti(b) ∈ anti(b) such that

anti(a ∗ b) = anti(a) ∗ anti(b).

Then

neut(a ∗ b) = (a ∗ b) ∗ anti(a ∗ b) = (a ∗ b) ∗ (anti(a) ∗ anti(b))= (a ∗ anti(a)) ∗ (b ∗ anti(b)) = neut(a) ∗ neut(b).

This means that neut(a ∗ b) ∈ neut(a) ∗ neut(b).

Lemma 4.7. Let (N, ∗) be a commutative neutrosophic triplet group with con-dition (AN) and a, b ∈ N . If there exists anti(b) ∈ anti(b), p, q ∈ N ,neut(p) ∈ neut(p) and neut(q) ∈ neut(q) such that

a ∗ anti(b) ∗ neut(p) = neut(q).

Then for any x ∈ anti(b), there exists p1, q1 ∈ N , neut(p1) ∈ neut(p1) andneut(q1) ∈ neut(q1) such that

a ∗ x ∗ neut(p1) = neut(q1).

Proof. For any x ∈ anti(b), there exists y ∈ neut(b) such that b ∗ x =x ∗ b = y. Thus, from a ∗ anti(b) ∗ neut(p) = neut(q) we get

a ∗ x ∗ (neut(b) ∗ neut(p))= a ∗ x ∗ (anti(b) ∗ b) ∗ neut(p)= (a ∗ anti(b) ∗ neut(p)) ∗ (x ∗ b)= neut(q) ∗ y∈ neut(q) ∗ neut(b)⊆ neut(q ∗ b) (by Theorem 4.1)

Therefore, there exists p1, q1 ∈ N , neut(p1) ∈ neut(p1) and neut(q1) ∈neut(q1) such that a ∗ x ∗ neut(p1) = neut(q1).

Theorem 4.8. Let (N, ∗) be a commutative neutrosophic triplet group withcondition (AN). Define binary relation ≈neut on N as following:∀a, b ∈ N , a ≈neut b iff there exists anti(b) ∈ anti(b), p, q ∈ N , and

neut(p) ∈ neut(p) such that

a ∗ anti(b) ∗ neut(p) ∈ neut(q).

Then ≈neut is an equivalent relation on N .

Page 379: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMMUTATIVE NEUTROSOPHIC TRIPLET GROUP ... 365

Proof. By Theorem 4.4, we only prove that ≈neut is transitive. Assume thata ≈neut b and b ≈neut c, then there exists p, q, r, s ∈ N such that

a ∗ anti(b) ∗ neut(p) = neut(q).(C1)

b ∗ anti(c) ∗ neut(r) = neut(s).(C2)

where anti(b) ∈ anti(b), anti(c) ∈ anti(c), neut(p) ∈ neut(p), neut(q) ∈neut(q), neut(r) ∈ neut(r), neut(s) ∈ neut(s). Using Theorem 3.10 andTheorem 4.1, we have

neut(p)∗neut(c)∗anti(neut(s))∈neut(p)∗neut(c)∗neut(s)⊆neut(p∗s∗c).

Denote y = neut(p) ∗ neut(c) ∗ anti(neut(s)) ∈ neut(p ∗ s ∗ c), thena ∗ anti(c) ∗ y = a ∗ anti(c) ∗ neut(p) ∗ neut(c) ∗ anti(neut(s))= a ∗ anti(c) ∗ neut(p) ∗ anti(neut(s)) ∗ neut(c) (by Definition 2.5)= a ∗ anti(c) ∗ neut(p) ∗ anti(b ∗ anti(c) ∗ neut(r)) ∗ neut(c)

(by the above result (C2))∈ a ∗ anti(c) ∗ neut(p) ∗ anti(b) ∗ anti(anti(c)) ∗ anti(neut(r)) ∗ neut(c)

(by Definition 4.5)⊆ a ∗ anti(c) ∗ neut(p) ∗ anti(b) ∗ c ∗ anti(neut(r))

(by Definition 2.4, 2.5 and Theorem 3.9)⊆ a ∗ neut(p) ∗ anti(b) ∗ neut(r) ∗ (anti(c) ∗ c)

(by Theorem 3.10, Definition 2.4 and 2.5)= a ∗ neut(p) ∗ anti(b) ∗ neut(r) ∗ neut(c) (by Definition 2.1)⊆ (a ∗ anti(b) ∗ neut(p)) ∗ neut(r) ∗ neut(c) (by Definition 2.1)⊆ neut(q1)∗neut(r)∗neut(c) (by the above result (C1) and Lemma 4.7)⊆ neut(q1 ∗ r ∗ c) (by Theorem 4.1)

This means that a ≈neut c.

5. Commutative neutrosophic triplet group and Abel group withBCI-algebra

Theorem 5.1. Let (N, ∗) be a commutative neutrosophic triplet group condition(AN). Define binary relation ≈neut on N as Theorem 4.8. Then the followingstatements are hold:

(1) a, b, c ∈ N , a ≈neut b⇒ a ∗ c ≈neut b ∗ c.

(2) a ≈neut b⇒ neut(a) ≈neut neut(b).

(3) a ≈neut b⇒ anti(a) ≈neut anti(b).

(4) a, b ∈ N , neut(a) ≈neut neut(b).

Proof. (1) Assume a ≈neut b, then there exists p, q ∈ N such that

(C1) a ∗ anti(b) ∗ neut(p) = neut(q),

where anti(b) ∈ anti(b), neut(p) ∈ neut(p), neut(q) ∈ neut(q). Thus,

Page 380: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

366 X. ZHANG, F. SMARANDACHE, M. ALI and X. LIANG

(a ∗ c) ∗ anti(b ∗ c) ∗ neut(p)∈ (a ∗ c) ∗ anti(b) ∗ anti(c) ∗ neut(p) (by Definition 4.5)⊆ a ∗ anti(b) ∗ neut(p) ∗ c ∗ anti(c) (by Definition 2.4 and 2.5)= a ∗ anti(b) ∗ neut(p) ∗ neut(c) (by Definition 2.1)⊆ neut(q1) ∗ neut(c)(by the above result (C1) and Lemma 4.7)⊆ neut(q1 ∗ c) (by Theorem 4.1)

It follows that a ∗ c ≈neut b ∗ c.(2) Assume a ≈neut b, then there exists p, q ∈ N such that

a ∗ anti(b) ∗ neut(p) = neut(q).

where anti(b) ∈ anti(b), neut(p) ∈ neut(p), neut(q) ∈ neut(q). Then,applying Theorem 3.8 and Theorem 4.1 we have

neut(a)∗anti(neut(b))∗neut(p)∈neut(a)∗neut(b)∗neut(p)⊆neut(a∗b∗p).

This means that neut(a) ≈neut neut(b).(3) Assume a ≈neut b, then there exists p, q ∈ N such that

a ∗ anti(b) ∗ neut(p) = neut(q).

where anti(b) ∈ anti(b), neut(p) ∈ neut(p), neut(q) ∈ neut(q). UsingTheorem 3.10,

anti(neut(p)) ∈ neut(p), anti(neut(q)) ∈ neut(q).

Applying Theorem 4.3 we have

anti(a) ∗ anti(anti(b)) ∗ anti(neut(p)) ∈ anti(a ∗ anti(b) ∗ neut(p))⊆ anti(neut(q)) ⊆ neut(q).

It follows that anti(a) ≈neut anti(b).(4) ∀a, b ∈ N , since

neut(a) ∗ anti(neut(b)) ∗ neut(a)∈ neut(a) ∗ neut(b) ∗ neut(a) (by Theorem 3.10)⊆ neut(a ∗ b ∗ a) (by Theorem 4.1)

This means that neut(a) ≈neut neut(b).

Theorem 5.2. Let (N, ∗) be a commutative neutrosophic triplet group withcondition (AN). Define binary relation ≈neut on N as Theorem 4.8. Then thequotient N/ ≈neut is an Abel group with respect to the following operation:

∀ a, b ∈ N, [a]neut • [b]neut = [a ∗ b]neut.

where [a]neut is the equivalent class of a, the unit elment of (N/ ≈neut, •) is1neut = [neut(a)]neut, ∀a ∈ N , neut(a) ∈ neut(a).

Page 381: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMMUTATIVE NEUTROSOPHIC TRIPLET GROUP ... 367

Proof. By Theorem 5.1 (1) ∼ (3) we know that the operation “•” is welldefinition. Obviously, (N/ ≈neut, •) is a commutative neutrosophic triplet group.

Moreover, by Theorem 5.1 (4) we get

∀a, b ∈ N , [neut(a)]neut = [neut(b)]neut.∀a, b ∈ N , neut([a]neut) = neut([b]neut).

This means that neut(·) is unique. Denote

1neut = [neut(a)]neut, ∀ a ∈ N, neut(a) ∈ neut(a).

Then 1neut is the unit element of (N/ ≈neut, •). Moreover, by Theorem 5.1 (3)we get that anti([a]neut) is unique, ∀a ∈ N . Therefore, (N/ ≈neut, •) is an Abelgroup.

Theorem 5.3. Let (N, ∗) be a commutative neutrosophic triplet group withcondition (AN). Define binary relation ≈neut on N as Theorem 4.8. If define anew operation “→” on the quotient N/ ≈neut as following:

∀a, b ∈ N, [a]neut → [b]neut = [a]neut • anti([b]neut).

Then (N/ ≈neut,→, 1neut) is a BCI-algebra, where 1neut=[neut(a)]neut, ∀a∈N .

Proof. By Theorem 5.2 and Proposition 2.13 we can get the result.

Example 5.4. Let N = 1, 2, 3, 4, 6, 7, 8, 9. The operation ∗ on N is definedas Tables 2. Then, (N, ∗) is a neutrosophic triplet group with condition (AN).For each a ∈ N , we have neut(a) in N . That is,

neut(1) = 7, neut(2) = 2, neut(3) = 7, neut(4) = 2,neut(6) = 2, neut(7) = 7, neut(8) = 2, neut(9) = 7.

Moreover, for each a ∈ N , anti(a) in N . That is,

anti(1) = 9, anti(2) ∈ 2, 7, anti(3) = 3, anti(4) ∈ 1, 6,anti(6) ∈ 4, 9, anti(7) = 7, anti(8) ∈ 3, 8, anti(9) = 1.

It is easy to verify thatN/ ≈neut= [2]neut, [1]neut, [3]neut, [4]neut and (N/ ≈neut,•) is isomorphism to (Z4,+), where

[2]neut = 2, 7, [1]neut = 1, 6, [3]neut = 3, 8, [4]neut = 4, 9.

Table 2 Cayley table of neutrosophic triplet group (N, ∗)∗ 1 2 3 4 6 7 8 9

1 3 6 9 2 8 1 4 7

2 6 2 8 4 6 2 8 4

3 9 8 7 6 4 3 2 1

4 2 4 6 8 2 4 6 8

6 8 6 4 2 8 6 4 2

7 1 2 3 4 6 7 8 9

8 4 8 2 6 4 8 2 6

9 7 4 1 8 2 9 6 3

Page 382: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

368 X. ZHANG, F. SMARANDACHE, M. ALI and X. LIANG

Table 3 Cayley table of Abel group ((N/ ≈neut, •)• [2]neut [1]neut [3]neut [4]neut

[2]neut [2]neut [1]neut [3]neut [4]neut[1]neut [1]neut [3]neut [4]neut [2]neut[3]neut [3]neut [4]neut [2]neut [1]neut[4]neut [4]neut [2]neut [1]neut [3]neut

Table 4 Cayley table of Abel group (Z4,+)+ 0 1 3 4

0 0 1 2 3

1 1 2 3 0

2 2 3 0 1

3 3 0 1 2

Example 5.5. Consider (Z10, ♯), where ♯ is defined as a ♯ b = 3ab(mod10).Then, (Z10, ♯) is a neutrosophic triplet group with condition (AN), the binaryoperation ♯ is defined in Table 1. For each ∈ Z10, we have neut(a) in Z10. Thatis,

neut(0) = 0, neut(1) = 7, neut(2) = 2, neut(3) = 7, neut(4) = 2,neut(5) = 5, neut(6) = 2, neut(7) = 7, neut(8) = 2, neut(9) = 7.

Moreover, for each a ∈ Z10, anti(a) in Z10. That is,

anti(0) ∈ 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, anti(1) = 9, anti(2) ∈ 2, 7,anti(3) = 3, anti(4) ∈ 1, 6, anti(5) ∈ 1, 3, 5, 7, 9,

anti(6) ∈ 4, 9, anti(7) = 7, anti(8) ∈ 3, 8, anti(9) = 1.

It is easy to verify that N/ ≈neut= 1neut = [0]neut and (N/ ≈neut, •) is iso-morphism to 1,where

[0]neut = 1neut = 0, 1, 2, 3, 4, 5, 6, 7, 8, 9.

6. Quotient structure and neutro-homomorphism basic theorem

Definition 6.1 ([16]). Let (N1, ∗1) and (N2, ∗2) be two neutrosophic tripletgroups. Let f : N1 → N2 be a mapping. Then, f is called neutro-homomorphismif for all a, b ∈ N1, we have:

(1) f(a ∗1 b) = f(a) ∗2 f(b);(2) f(neut(a)) = neut(f(a));(3) f(anti(a)) = anti(f(a)).

Theorem 6.2. Let (N, ∗) be a commutative neutrosophic triplet group withrespect to ∗, H be a neutrosophic triplet subgroup of N such that (∀a ∈ N)neut(a) ∈ H and (∀a ∈ H) anti(a) ∈ H. Define binary relation ≈H on N asfollowing:

Page 383: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMMUTATIVE NEUTROSOPHIC TRIPLET GROUP ... 369

∀a, b ∈ N , a ≈H b iff there exists anti(b) ∈ anti(b), p ∈ N , and neut(p) ∈neut(p) such that

a ∗ anti(b) ∗ neut(p) ∈ H.

Then ≈H is reflexive and symmetric.

Proof. (1) For any a ∈ N , by Proposition 3.2 and the hypothesis (neut(a) ∈ Hfor any a ∈ N), we have

neut(a) ∗ neut(a) ∈ neut(a) ⊆ H.

By Definition 2.1 we get

a ∗ anti(a) ∗ neut(a) = neut(a) ∗ neut(a) ∈ H.

Then, a ≈H a.

(2) Assume a ≈H b, then there exists p ∈ N such that

(C2) a ∗ anti(b) ∗ neut(p) ∈ H.

where anti(b) ∈ anti(b), neut(p) ∈ neut(p). Moreover, by the hypothesis(anti(a) ∈ H for any a ∈ H), we have

(C3) anti(a ∗ anti(b) ∗ neut(p)) ∈ H.

Using Theorem 3.10, anti(neut(p)) ∈ neut(p). So, we denote anti(neut(p)) =x ∈ neut(p). Thus,

b ∗ anti(a) ∗ x= b ∗ anti(a) ∗ anti(neut(p))= anti(a) ∗ b ∗ anti(neut(p)) (by Definition 2.5)= anti(a) ∗ (neut(b) ∗ anti(anti(b))) ∗ anti(neut(p)) (by Theorem 3.9)= (anti(a)∗anti(anti(b))∗anti(neut(p)))∗neut(b)(by Definition 2.4 and 2.5)∈ anti(a ∗ anti(b) ∗ neut(p)) ∗ neut(b) (by Theorem 4.3)⊆ H (by (C3), the hypothesis and Proposition 3.13 (1))

This means that b ≈H a.

Lemma 6.3. Let (N, ∗) be a commutative neutrosophic triplet group with con-dition (AN), a, b ∈ N , and H be a neutrosophic triplet subgroup of N suchthat (∀a ∈ N) neut(a) ∈ H and (∀a ∈ H) anti(a) ∈ H. If there existsanti(b) ∈ anti(b), p ∈ N , and neut(p) ∈ neut(p) such that

a ∗ anti(b) ∗ neut(p) ∈ H.

Then for any x ∈ anti(b), there exists p1 ∈ N , and neut(p1) ∈ neut(p1)such that

a ∗ x ∗ neut(p1) ∈ H.

Page 384: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

370 X. ZHANG, F. SMARANDACHE, M. ALI and X. LIANG

Proof. For any x ∈ anti(b), there exists y ∈ neut(b) such that b∗x = x∗b =y. Since (∀a ∈ N) neut(a) ∈ H, then y ∈ H. Thus, from a∗anti(b)∗neut(p) ∈ Hwe get

a ∗ x ∗ (neut(b) ∗ neut(p))= a ∗ x ∗ (anti(b) ∗ b) ∗ neut(p)= (a ∗ anti(b) ∗ neut(p)) ∗ (x ∗ b)= (a ∗ anti(b ∗ neut(p)) ∗ y∈ H (by Proposition 3.13)

Theorem 6.4. Let (N, ∗) be a commutative neutrosophic triplet group withcondition (AN), H be a neutrosophic triplet subgroup of N such that (∀a ∈ N)neut(a) ∈ H and (∀a ∈ H) anti(a) ∈ H. Define binary relation ≈H on N asfollowing:

∀a, b ∈ N , a ≈H b iff there exists anti(b) ∈ anti(b), p ∈ N , and neut(p) ∈neut(p) such that

a ∗ anti(b) ∗ neut(p) ∈ H.

Then ≈H is an equivalent relation on N .

Proof. By Theorem 6.2, we only prove that ≈H is transitive. Assume thata ≈H b and b ≈H c, then there exists p, r ∈ N and q, s ∈ N such that

a ∗ anti(b) ∗ neut(p) = q ∈ H.(C3)

b ∗ anti(c) ∗ neut(r) = s ∈ H.(C4)

where anti(b) ∈ anti(b), anti(c) ∈ anti(c), neut(p) ∈ neut(p), neut(r) ∈neut(r). Using Theorem 4.1 and the hypothesis (neut(a) ∈ H for any a ∈ N),we have

neut(p) ∗ neut(s) ∗ neut(c) ∈ neut(p ∗ s ∗ c) ⊆ H.

Denote y = neut(p) ∗ neut(s) ∗ neut(c) ∈ neut(p ∗ s ∗ c), then

a ∗ anti(c) ∗ y= a ∗ anti(c) ∗ neut(p) ∗ neut(s) ∗ neut(c)= a ∗ anti(c) ∗ neut(p) ∗ (s ∗ anti(s)) ∗ neut(c) (by Definition 2.1)= a ∗ anti(c) ∗ neut(p) ∗ s ∗ anti(b ∗ anti(c) ∗ neut(r)) ∗ neut(c)

(by the above result (C4))∈ a∗anti(c)∗neut(p)∗s∗anti(b)∗anti(anti(c))∗anti(neut(r))neut(c)

(by Definition 4.5)= a ∗ anti(c) ∗ neut(p) ∗ s ∗ anti(b) ∗ c ∗ anti(neut(r)) (by Theorem 3.9)⊆ a ∗ anti(c) ∗ neut(p) ∗ s ∗ anti(b) ∗ c ∗ neut(r) (by Theorem 3.10)⊆ a ∗ anti(b) ∗ neut(p) ∗ s ∗ (anti(c) ∗ c) ∗ neut(r) (by Definition 2.4 and

2.5)⊆ H ∗ s ∗ neut(c) ∗ neut(r)

Page 385: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMMUTATIVE NEUTROSOPHIC TRIPLET GROUP ... 371

(by Definition 2.1, the above result (C3) and Lemma 6.3)⊆ H (by (C4), the hypothesis and Proposition 3.13 (1))

It follows that a ≈H c.

Theorem 6.5. Let (N, ∗) be a commutative neutrosophic triplet group withcondition (AN), H be a neutrosophic triplet subgroup of N such that (∀a ∈ N)neut(a) ∈ H and (∀a ∈ H) anti(a) ∈ H. Define binary relation ≈H on N asfollowing:∀a, b ∈ N , a ≈H b iff there exists anti(b) ∈ anti(b), p ∈ N , and neut(p) ∈

neut(p) such thata ∗ anti(b) ∗ neut(p) ∈ H.

Then the following statements are hold:(1) a, b, c ∈ N , a ≈H b⇒ a ∗ c ≈H b ∗ c.(2) a ≈H b⇒ neut(a) ≈H neut(b).(3) a ≈H b⇒ anti(a) ≈H anti(b).

Proof. (1) Assume a ≈H b, then there exists p ∈ N such that

(C2) a ∗ anti(b) ∗ neut(p) ∈ H.

where anti(b) ∈ anti(b), neut(p) ∈ neut(p). We have(a ∗ c) ∗ anti(b ∗ c) ∗ neut(p)∈ (a ∗ c) ∗ anti(b) ∗ anti(c) ∗ neut(p) (by Definition 4.5)⊆ a ∗ anti(b) ∗ neut(p) ∗ c ∗ anti(c) (by Definition 2.4 and 2.5)= a ∗ anti(b) ∗ neut(p) ∗ neut(c) (by Definition 2.1)∈ H. (by (C2), the hypothesis, Lemma 6.3 and Proposition 3.13 (1))

It follows that a ∗ c ≈H b ∗ c.(2) Assume a ≈H b, then there exists p ∈ N such that a∗anti(b)∗neut(p) ∈

H, where anti(b) ∈ anti(b), neut(p) ∈ neut(p). Applying Theorem 3.8 andTheorem 4.1 we have

neut(a) ∗ anti(neut(b)) ∗ neut(p) ∈ neut(a) ∗ neut(b) ∗ neut(p)⊆ neut(a∗b∗p) ⊆ H. (by the hypothesis, neut(a) ∈ H for any a ∈ N)

It follows that neut(a) ≈H neut(b).Assume a ≈H b, then there exists p ∈ N such that

a ∗ anti(b) ∗ neut(p) ∈ H.

where anti(b) ∈ anti(b), neut(p) ∈ neut(p). Applying the hypothesis ((∀a ∈N) neut(a) ∈ H and (∀a ∈ H) anti(a) ∈ H) and Theorem 3.10,

anti(a ∗ anti(b) ∗ neut(p)) ∈ H.anti(neut(p)) ∈ neut(p) ⊆ H.

Moreover, by Theorem 4.3 we have

anti(a) ∗ anti(anti(b)) ∗ anti(neut(p)) ∈ anti(a ∗ anti(b) ∗ neut(p)) ⊆ H.

Hence, anti(a) ≈H anti(b).

Page 386: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

372 X. ZHANG, F. SMARANDACHE, M. ALI and X. LIANG

Theorem 6.6. Let (N, ∗) be a commutative neutrosophic triplet group withcondition (AN), H be a neutrosophic triplet subgroup of N such that (∀a ∈ N)neut(a) ∈ H and (∀a ∈ H) anti(a) ∈ H. Define binary relation ≈H on N asTheorem 6.5. Then the quotient N/ ≈H is a commutative neutrosophic tripletgroup with respect to the following operation:

∀a, b ∈ N, [a]H • [b]H = [a ∗ b]H .

where [a]H is the equivalent class of a with respect to ≈H . Moreover, (N, ∗) isneutron-homomorphism to (N/ ≈H , •) with respect to the following mapping:

f : N → N/ ≈H ; and ∀a ∈ N, f(a) = [a]H .

Proof. By Theorem 6.5 we know that the operation “•” is well definition.Obviously, (N/ ≈H , •) is a commutative neutrosophic triplet group.

By the definitions of operation “•” and mapping f we have

∀a, b ∈ N, f(a ∗ b) = [a ∗ b]H = [a]H • [b]H = f(a) • f(b).

Moreover, by Theorem 6.5 (2) and (3) we get

∀a ∈ N, f(neut(a)) = [neut(a)]H = neut([a]H) = neut(f(a)).∀a ∈ N, f(anti(a)) = [anti(a)]H = anti([a]H) = anti(f(a)).

Therefore, (N, ∗) is neutron-homomorphism to (N/ ≈H , •) with respect to themapping f .

Theorem 6.7. Let (N, ∗) be a commutative neutrosophic triplet group withcondition (AN), H be a neutrosophic triplet subgroup of N such that (∀a ∈ N)neut(a) ∈ H and (∀a ∈ H) anti(a) ∈ H. Define binary relation ≈H on Nas Theorem 6.5. If define a new operation “→” on the quotient N/ ≈H asfollowing: ∀a, b ∈ N , [a]H → [b]H = [a]H • anti([b]H). Then (N/ ≈H ,→, 1H) isa BCI-algebra, where 1H = [neut(a)]H , ∀a ∈ N .

Proof. By Theorem 6.7 and Proposition 2.13 we can get the result.

Example 6.8. Let N = 1, 2, 3, 4, 6, 7, 8, 9. The operation ∗ on N is definedas Tables 2. Then, (N, ∗) is a neutrosophic triplet group with condition (AN).We can get the following equation

neut(1) = 7, neut(2) = 2, neut(3) = 7, neut(4) = 2,neut(6) = 2, neut(7) = 7, neut(8) = 2, neut(9) = 7;

anti(1) = 9, anti(2) ∈ 2, 7, anti(3) = 3, anti(4) ∈ 1, 6,anti(6) ∈ 4, 9, anti(7) = 7, anti(8) ∈ 3, 8, anti(9) = 1.

Denote H = 2, 3, 7, 8, it is easy to verify that H is a neutrosophic tripletsubgroup of N such that (∀a ∈ N) neut(a) ∈ H and (∀a ∈ H) anti(a) ∈ H.Moreover, N/ ≈H= H = [2]H , [1]H and (N/ ≈H , •) is isomorphism to (Z2,+),where

[2]H = 2, 3, 7, 8, [1]H = 1, 4, 6, 9.

Page 387: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMMUTATIVE NEUTROSOPHIC TRIPLET GROUP ... 373

Table 5 Cayley table of Abel group (N/ ≈H , •)• [2]H [1]H

[2]H [2]H [1]H[1]H [1]H [2]H

Table 6 Cayley table of Abel group (Z2,+)+ 0 1

0 0 1

1 1 0

The following example shows that the basic theorem of neutro-homomorphism(Theorem 6.7) is a natural and substantial generalization of the basic theoremof group-homomorphism.

Example 6.9. Let (N, ∗) be a commutative group. Then, (N, ∗) is a neutro-sophic triplet group with condition (AN). Obviously, if H is a subgroup of N ,then binary relation ≈H on N is the relation induced by subgroup H, that is,

∀a, b ∈ N, a ≈H b if and only if a ∗ b−1 ∈ H.

Thus, (N, ∗) is group-homomorphism to (N/ ≈H , •) = (N/H, •).

7. Conclusion

This paper is focus on neutrosophic triplet group. We proved some new proper-ties of (commutative) neutrosophic triplet group, and constructed a new equiv-alent relation on any commutative neutrosophic triplet group with condition(AN). Based on these results, for the first time, we have described the innerlink between commutative neutrosophic triplet group with condition (AN) andAbel group with BCI-algebra. Furthermore, we establish the quotient struc-ture by neutrosophic triplet subgroup, and prove the basic theorem of neutro-homomorphism, which is a natural and substantial generalization of the basictheorem of group-homomorphism. Obviously, these results will play an impor-tant role in the further study of neutrosophic triplet group.

Acknowledgment

This work was supported by National Natural Science Foundation of China(Grant No. 61573240).

References

[1] A. A. A. Agboola, B. Davvaz, F. Smarandache, Neutrosophic quadruplealgebraic hyperstructures, Annals of Fuzzy Mathematics and Informatics,14(2017), 29-42.

Page 388: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

374 X. ZHANG, F. SMARANDACHE, M. ALI and X. LIANG

[2] S.S. Ahn, J.M. Ko, Rough fuzzy ideals in BCK/BCI-algebras, Journal ofComputational Analysis and Applications, 25(2018), 75-84.

[3] R.A. Borzooei, H. Farahani, M. Moniri, Neutrosophic deductive filters onBL-algebras, Journal of Intelligent and Fuzzy Systems, 26(2014), 2993-3004.

[4] W.A. Dudek, Y.B. Jun, Pseudo-BCI algebras, East Asian MathematicalJournal, 24(2008), 187-190.

[5] K. Iseki, An algebra related with a propositional calculus, Proc. Japan Acad.,42(1966), 26-29.

[6] Y. B. Jun, H.S. Kim, J. Neggers, On pseudo-BCI ideals of pseudo-BCIalgebras, Matematicki Vesnik, 58(2006), 39-46.

[7] Y. B. Jun, Neutrosophic subalgebras of several types in BCK/BCI-algebras,Annals of Fuzzy Mathematics and Informatics, 14(2017), 75-86.

[8] H. S. Kim, Y. H. Kim, On BE-algebras, Sci. Math. Japon., 66(2007), 113-116.

[9] T. D. Lei, C. C. Xi, p-radical in BCI-algebras, Mathematica Japanica,30(1985), 511-517.

[10] A. Rezaei, A.B. Saeid, F. Smarandache, Neutrosophic filters in BE-algebras,Ratio Mathematica, 29(2015), 65-79.

[11] A. B. Saeid, Y. B. Jun, Neutrosophic subalgebras of BCK/ BCI-algebrasbased on neutrosophic points, Annals of Fuzzy Mathematics and Informat-ics, 14(2017), 87-97.

[12] F. Smarandache, Neutrosophy, Neutrosophic Probability, Set, and Logic,Amer. Res. Press, Rehoboth, USA, 1998.

[13] F. Smarandache, Neutrosophy and Neutrosophic Logic, Information Sci-ences First International Conference on Neutrosophy, Neutrosophic Logic,Set, Probability and Statistics University of New Mexico, Gallup, USA,2002.

[14] F. Smarandache, Neutrosophic setCa generialization of the intuituionis-tics fuzzy sets, International Journal of Pure and Applied Mathematics,24(2005), 287-297.

[15] F. Smarandache, Neutrosophic Perspectives: Triplets, Duplets, Multisets,Hybrid Operators, Modal Logic, Hedge Algebras. And Applications, PonsPublishing House, Brussels, 2017.

[16] F. Smarandache, M. Ali, Neutrosophic triplet group, Neural Computing andApplications, 2017, DOI 10.1007/ s00521-016-2535-x

Page 389: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

COMMUTATIVE NEUTROSOPHIC TRIPLET GROUP ... 375

[17] H. Wang, F. Smarandache, Y.Q. Zhang et al, Single valued neutro-sophic sets, Multispace and Multistructure. Neutrosophic Transdisciplinar-ity, 4(2010), 410-413.

[18] X. L. Xin, Y. J. Li, Y. L. Fu, States on pseudo-BCI algebras, EuropeanJournal of Pure And Applied Mathematics, 10(2017), 455-472.

[19] J. Ye, Single valued neutrosophic cross-entropy for multicriteria decisionmaking problems, Applied Mathematical Modelling, 38(2014), 1170-1175.

[20] X. H. Zhang, R. F. Ye, BZ-algebra and group, J. Math. Phys. Sci., 29(1995),223-233.

[21] X. H. Zhang, Y. Q. Wang, W. A. Dudek, T-ideals in BZ-algebras and T-type BZ-algebras, Indian Journal Pure and Applied Mathematics, 34(2003),1559-1570.

[22] X. H. Zhang, W. H. Li, On pseudo-BL algebras and BCC-algebra, SoftComputing, 10(2006), 941-952.

[23] X. H. Zhang, Fuzzy Logics and Algebraic Analysis, Science Press, Beijing,2008.

[24] X. H. Zhang, W. A. Dudek, BIK+-logic and non-commutative fuzzy logics,Fuzzy Systems and Mathematics, 23(2009), 8-20.

[25] X. H. Zhang, BCC-algebras and residuated partially-ordered groupoid,Mathematica Slovaca, 63(2013), 397-410.

[26] X. H. Zhang, Y. B. Jun, Anti-grouped pseudo-BCI algebras and anti-groupedpseudo-BCI filters, Fuzzy Systems and Mathematics, 28(2014), 21-33.

[27] X. H. Zhang, Fuzzy anti-grouped filters and fuzzy normal filters in pseudo-BCI algebras, Journal of Intelligent and Fuzzy Systems, 33(2017), 1767-1774.

[28] X. H. Zhang, Y. T. Wu, X. H. Zhai, Neutrosophic filters in pseudo-BCIalgebras, submitted, 2017.

[29] X. H. Zhang, Y. C. Ma, F. Smarandache, Neutrosophic regular filters andfuzzy regular filters in pseudo-BCI algebras, Neutrosophic Sets and Systems,17(2017), 10-15.

Accepted: 27.10.2017

Page 390: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (376–393) 376

DERIVABLE MAPPINGS AND COMMUTATIVITY OFASSOCIATIVE RINGS

Gurninder S. Sandhu∗

Department of MathematicsPunjabi UniversityPatialagurninder [email protected]

Deepak KumarDepartment of Mathematics

Punjabi University

Patiala

deep [email protected]

Abstract. Let R be a ring with center Z(R). A mapping F : R→ R (not necessarilyadditive) is called a multiplicative (generalized)-derivation of R if it is uniquely deter-mined by a mapping d : R → R such that F (xy) = F (x)y + xd(y) for each x, y ∈ R.In the present paper, we investigate the commutativity of a semiprime (prime) ringvia studying a number polynomial constraints involving multiplicative (generalized)-derivations. Moreover, some annihilator conditions are also examined.

Keywords: Prime ring, Semiprime ring, Derivation, Generalized derivation, Multi-plicative (generalized)-derivation.

1. Introduction

All through this paper R be an associative ring with center Z(R). A ring Ris said to be a prime ring if for any a, b ∈ R, aRb = (0) implies that eithera = 0 or b = 0 and semiprime if aRa = (0) implies that a = 0. Obviously, everyprime ring is semiprime. For any nonempty subset S of R the right annihilatorrR(S) of S in R is the set of all r ∈ R such that Sr = (0). Accordingly, the leftannihilator lR(S) is the set of all r ∈ R such that rS = (0). The intersection ofright and left annihilators of S in R i.e.

AnnR(S) = r ∈ R : sr = 0 and rs = 0 for all s ∈ S

is called an annihilator of S in R . Recall that, for any x, y ∈ R the commutatorand anti-commutator are denoted by the symbols [x, y] = xy − yx and x y =xy + yx respectively. We shall frequently use the basic commutator identities:

[xy, z] = x[y, z] + [x, z]y, [x, yz] = y[x, z] + [x, y]z,

∗. Corresponding author

Page 391: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

DERIVABLE MAPPINGS AND COMMUTATIVITY OF ASSOCIATIVE RINGS 377

for all x, y, z ∈ R. For any nonempty subset Q of R, a mapping f : R→ R is saidto be centralizing on Q if [f(x), x] ∈ Z(R) and commuting if [f(x), x] = 0 forall x ∈ Q. A derivation (or left multiplier) of R is a map such that d(x + y) =d(x) + d(y) and d(xy) = d(x)y + xd(y) (or d(xy) = d(x)y) for all x, y ∈ R.The notion of derivation was extended to generalized derivation by Bresar [10].A generalized derivation of R is an additive map uniquely determined by aderivation d such that F (xy) = F (x)y + xd(y) for all x, y ∈ R.

Inspired by Martindale’s [22] remarkable paper on the additivity of mul-tiplicative bijective mappings, Daif [12] introduced multiplicative derivation,which is a map d : R → R satisfying Leibnitz rule and not necessarily additiveon R. The complete description of such mappings was explained by Gold-mann and Semrl [18]. Daif and Tammam-El-Sayiad [14] extended this notionto multiplicative generalized derivation by dropping the additivity assumptionof generalized derivation F . Recently, Dhara and Ali [16] made a slight gen-eralization in this definition of multiplicative generalized derivation by relaxingthe conditions on d and call it multiplicative (generalized)-derivation, which isa map F : R → R (not necessarily additive) along with a map d : R → Rsuch that F (xy) = F (x)y + xd(y) where x, y ∈ R. Observe that every multi-plicative derivation is a multiplicative (generalized)-derivation, so multiplicative(generalized)-derivation covers both the concepts of multiplicative derivation (ifF = d) and multiplicative left multiplier (if d = 0). In this way, multiplicative(generalized)-derivation is a more satisfactory generalization of multiplicativederivation.

2. Some preliminary results

Throughout this paper, we shall use the following well known lemmas to proveour results:

Lemma 1 (Lemma 2, [13]). If R is a prime ring containing nonzero centralideal, then R is commutative.

Lemma 2 (Corollary 2, [20]). If R is a semiprime ring and I is an ideal of R,then I ∩AnnR(I) = (0).

Lemma 3 (Lemma 2.3, [17]). If R is a prime ring, I a nonzero ideal and d isderivation of R. If for some 0 = a ∈ R, [ad(x), x] = 0 for all x ∈ I, then d = 0or R is commutative.

Lemma 4 (Corollary, [20]). Let R be a semiprime ring and let I be a nonzeroright ideal of R. If I is commutative as a ring, then I ⊆ Z(R).

Lemma 5 (Theorem, [21]). Let g be a polynomial in n noncommuting variablesu1, u2..., un with relatively prime integer coefficients. Then the following areequivalent:

Page 392: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

378 GURNINDER S. SANDHU and DEEPAK KUMAR

(i) Every ring satisfying the polynomial identity g = 0 has nil commutatorideal.

(ii) Every semiprime ring satisfying g = 0 is commutative.

(iii) For every prime p the ring of 2× 2 matrices over Zp fails to satisfy g = 0.

Throughout this paper, R will denote a semiprime ring with nonzero idealI, unless otherwise stated.

3. Main results

3.1 On central value conditions

During the last seven decades, there has been a large amount of results concern-ing the conditions that force a ring to be commutative. In this direction, Posner[23] proved a classical result: Every prime ring admitting a nonzero centralizingderivation is commutative. This theorem has been generalized in many ways.Towards the commutativity of prime rings with derivations Ashraf et al. [5]proved: Let R be a prime ring and I be a nonzero ideal of R. Suppose thatd is a nonzero derivation of R such that d(xy) ± xy ∈ Z(R) where x, y ∈ I,then R is commutative. In [3], Ashraf et al. extend these results for generalizedderivations and obtained the following theorem: Let R be a prime ring and Ia nonzero ideal of R. Suppose F is a generalized derivation associated with aderivation d on R. If one of the following:

(i) F (xy)± xy ∈ Z(R),

(ii) F (xy)± yx ∈ Z(R),

(iii) F (x)F (y)± xy ∈ Z(R) holds on I, then R is commutative.

After that, Atteya [6] studied these situations on semiprime rings and obtainedthe following results: Let R be a semiprime ring and I be a nonzero ideal of R.If R admits a generalized derivation F associated with a derivation d such thatany one of the following:

(i) F (xy)± xy ∈ Z(R),

(ii) F (xy)± yx ∈ Z(R),

(iii) F (x)F (y)±xy ∈ Z(R) holds on I, then R contains a nonzero central ideal.

It is a fact of interest to generalize these results to multiplicative (generalized)-derivations. In this line of investigation Dhara and Ali [16] studied the followingidentities: (i) F (xy) ± xy = 0, (ii) F (xy) ± yx = 0, (iii) F (xy) ± xy ∈ Z(R),(iv) F (x)F (y) ± yx ∈ Z(R), where x, y varies over some suitable subset ofsemiprime ring R. In this section, we study central valued conditions involv-ing multiplicative (generalized)-derivations and consequently give a generalizedversion of some known results.

Page 393: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

DERIVABLE MAPPINGS AND COMMUTATIVITY OF ASSOCIATIVE RINGS 379

Theorem 1. Let F : R → R be a multiplicative (generalized)-derivation ofR together with a mapping d : R → R. If ϕ is a mapping of R such thatF (xy) + xy ± [ϕ(x), y] ∈ Z(R) for all x, y ∈ I, then [d(x), x] = 0 for all x ∈ I.

Furthermore, if ϕ is an automorphism of R, then I ⊆ Z(R).

Proof. For each x, y ∈ I, we consider

(3.1) F (xy) + xy + [ϕ(x), y] ∈ Z(R).

Replace y by yz in (3.1), where z ∈ I and we get (F (xy) + xy + [ϕ(x), y])z +xyd(z) + y[ϕ(x), z] ∈ Z(R) . On commuting with z and using our hypothesis,we find

(3.2) [xyd(z), z] + [y[ϕ(x), z], z] = 0.

Again replace y by zy in (3.2), we have

(3.3) [xzyd(z), z] + z[y[ϕ(x), z], z] = 0.

Left multiply (3.2) by z and subtract from (3.3) in order to obtain

(3.4) [[x, z]yd(z), z] = 0.

Since I is an ideal of R so we substitute xd(z) in place of x in (3.4) and get

(3.5) [x[d(z), z]yd(z), z] + [[x, z]d(z)yd(z), z] = 0.

Now, substitute d(z)y instead of y in (3.4) and subtract from (3.5) to obtain

(3.6) [x[d(z), z]yd(z), z] = 0.

Putting x = d(z)x in (3.6) and we obtain d(z)[x[d(z), z]yd(z), z]+[d(z), z]x[d(z), z]yd(z) = 0. Relation (3.6) reduces it to [d(z), z]x[d(z), z]yd(z) = 0. That is,(I[d(z), z])3 = (0). But R has no nonzero nilpotent ideal, hence I[d(z), z] = (0).Clearly, [d(z), z] ∈ I as well as [d(z), z] ∈ AnnR(I). That means [d(z), z] ∈I∩AnnR(I). Therefore, Lemma 2 implies that [d(z), z] = 0 for each z ∈ I. Thisprocess also shows that every nonzero ideal of a semiprime ring is a semiprimering itself.

Next, we assume that ϕ is an automorphism of R. Replacing y by yz in(3.2), we get

(3.7) [xyzd(z), z] + [yz[ϕ(x), z], z] = 0.

Multiplying (3.2) from right by z, we get

(3.8) [xyd(z)z, z] + [y[ϕ(x), z]z, z] = 0.

Page 394: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

380 GURNINDER S. SANDHU and DEEPAK KUMAR

Subtracting (3.7) from (3.8) and we find [xy[d(z), z], z] + [y[[ϕ(x), z], z], z] = 0.Since [d(z), z] = 0, we left with the expression

(3.9) [y[[ϕ(x), z], z], z] = 0.

Putting y = ty in (3.9), where t ∈ I, we have t[y[[ϕ(x), z], z], z]+[t, z]y[[ϕ(x), z], z]= 0 for each x, y, z, t ∈ I. Use of Eq. (3.9) gives

(3.10) [t, z]y[[ϕ(x), z], z] = 0.

Replace t by t[ϕ(x), z] in (3.10) and we obtain

(3.11) t[[ϕ(x), z], z]y[[ϕ(x), z], z] + [t, z][ϕ(x), z]y[[ϕ(x), z], z] = 0.

Replace y by [ϕ(x), z]y in (3.10) and combine with (3.11) in order to findt[[ϕ(x), z], z]y[[ϕ(x), z], z] = 0. In particular, we have y[[ϕ(x), z], z]Ry[[ϕ(x), z], z]= (0). Hence, we obtain y[[ϕ(x), z], z] = 0. That is, I[[ϕ(x), z], z] = (0). Thus,semiprimeness of I assures that, for each x, z ∈ I

(3.12) [[ϕ(x), z], z] = 0.

Linearizing (12) w.r.t.z, we get

(3.13) [[ϕ(x), t], z] + [[ϕ(x), z], t] = 0.

Substituting zt in place of z in (3.13), where t ∈ I. We obtain

(3.14) [[ϕ(x), t], z]t+ z[[ϕ(x), t], t] + [[ϕ(x), z], t]t+ [z[ϕ(x), t], t] = 0.

Using (3.12) and (3.13) in (3.14), it follows that

(3.15) [z, t][ϕ(x), t] = 0.

Replace x by xϕ−1(z) in (3.15), we obtain [z, t]ϕ(x)[z, t] = 0 for any x, z, t ∈ I.Since ϕ is an automorphism of R so ϕ(I) is an ideal of R. Thus, we may inferthat I is commutative as a ring. Hence, by Lemma 4 we infer that I ⊆ Z(R).

On substituting −ϕ in place of ϕ in (3.1) and following the same argumentwith necessary variations, we get the same conclusions for the situation F (xy)+xy − [ϕ(x), y] ∈ Z(R).

Theorem 2. Let F : R → R be a multiplicative (generalized)-derivation ofR together with a mapping d : R → R. If ϕ is a mapping of R such thatF (xy)− xy ± [ϕ(x), y] ∈ Z(R) for all x, y ∈ I, then [d(x), x] = 0 for all x ∈ I.

Furthermore, if ϕ is an automorphism of R, then I ⊆ Z(R).

Proof. On replacing F by −F and d with −d in Theorem 1, we can get thedesired results.

Page 395: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

DERIVABLE MAPPINGS AND COMMUTATIVITY OF ASSOCIATIVE RINGS 381

Theorem 3. Let F : R → R be a multiplicative (generalized)-derivation ofR together with a mapping d : R → R. If ϕ is a mapping of R such thatF (x)F (y) + xy ± [ϕ(x), y] ∈ Z(R) for all x, y ∈ I, then [d(x), x] = 0 for allx ∈ I.

Furthermore, if ϕ is an automorphism of R, then I ⊆ Z(R).

Proof. For any x, y ∈ I, we consider

(3.16) F (x)F (y) + xy + [ϕ(x), y] ∈ Z(R).

On replacing y by yz in (3.16), where z ∈ I, we find (F (x)F (y)+xy+[ϕ(x), y])z+F (x)yd(z)+y[ϕ(x), z] ∈ Z(R). On commuting with z, our hypothesis forces that

(3.17) [F (x)yd(z), z] + [y[ϕ(x), z], z] = 0.

Put y = zy in (3.17) and we get

(3.18) [F (x)zyd(z), z] + z[y[ϕ(x), z], z] = 0.

Left multiply (3.17) by z and subtract from (3.18), we have

(3.19) [[F (x), z]yd(z), z] = 0.

Replace x by xz in (3.19) and we obtain

(3.20) [[F (x), z]zyd(z), z] + [[xd(z), z]yd(z), z] = 0.

Replace y by zy in (3.19) and subtract from (3.20) to obtain [[xd(z), z]yd(z), z] =0. That is, [x[d(z), z]yd(z), z] + [[x, z]d(z)yd(z), z] = 0. This expression is sameas (3.5), so the similar arguments imply that [d(z), z] = 0 for each z in I. Now,we replace y by yz in (3.17) and get

(3.21) [F (x)yzd(z), z] + [yz[ϕ(x), z], z] = 0.

Right multiply (3.17) by z, we get

(3.22) [F (x)yd(z)z, z] + [y[ϕ(x), z]z, z] = 0.

Combining relations (3.21) and (3.22), we have [F (x)y[d(z), z], z]+[y[[ϕ(x), z], z],z] = 0. Utilizing the fact [d(z), z] = 0, for all z ∈ I, we get [y[[ϕ(x), z], z], z] = 0.This expression is same as equation (3.9), again the proof follows from Theorem1.

On substituting −ϕ in place of ϕ in (3.16) and following the same tech-nique with necessary variations, we get the same conclusions for the situationF (x)F (y) + xy − [ϕ(x), y] ∈ Z(R).

Theorem 4. Let F : R → R be a multiplicative (generalized)-derivation ofR together with a mapping d : R → R. If ϕ is a mapping of R such thatF (x)F (y) − xy ± [ϕ(x), y] ∈ Z(R) for all x, y ∈ I, then [d(x), x] = 0 for allx ∈ I.

Furthermore, if ϕ is an automorphism of R, then I ⊆ Z(R).

Page 396: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

382 GURNINDER S. SANDHU and DEEPAK KUMAR

Proof. On replacing F by −F and d by −d in Theorem 3, we can get thedesired results.

Now, we extend some theorems of Tiwari et al. [25].

Theorem 5. Let F,G : R → R be multiplicative (generalized)-derivations ofR together with mappings d, g respectively. If ϕ is a mapping of R such thatG(xy) + F (x)F (y) ± [ϕ(x), y] ∈ Z(R) for all x, y ∈ I, then [d(x), x] = 0 and[g(x), x] = 0 for all x ∈ I.

Furthermore, if R is prime and ϕ is an automorphism of R, then R is com-mutative.

Proof. For each x, y ∈ I, we consider

(3.23) G(xy) + F (x)F (y) + [ϕ(x), y] ∈ Z(R).

Putting y = yz in (3.23), where z ∈ I, we get (G(xy) +F (x)F (y) + [ϕ(x), y])z+xyg(z) + F (x)yd(z) + y[ϕ(x), z] ∈ Z(R). On commuting with z, our hypothesisyields

(3.24) [xyg(z), z] + [F (x)yd(z), z] + [y[ϕ(x), z], z] = 0.

Replace y by zy in (3.24) and we get

(3.25) [xzyg(z), z] + [F (x)zyd(z), z] + z[y[ϕ(x), z], z] = 0.

Left multiply (3.24) by z and subtract from (3.25), we have

(3.26) [[x, z]yg(z), z] + [[F (x), z]yd(z), z] = 0.

On replacing x by xz in (3.26), we get

(3.27) [[x, z]zyg(z), z] + [[F (x), z]zyd(z), z] + [[xd(z), z]yd(z), z] = 0.

Replace y by zy in (3.26) and subtract from (3.27) to find

(3.28) [[xd(z), z]yd(z), z] = 0.

That is, [x[d(z), z]yd(z), z] + [[x, z]d(z)yd(z), z] = 0. This equation is same as(3.5), so similar arguments imply that [d(z), z] = 0 for each z ∈ I. Now, wesubstitute yz instead of y in (3.26) in order to obtain

(3.29) [[x, z]yzg(z), z] + [[F (x), z]yzd(z), z] = 0.

Right multiply (3.26) by z, we get

(3.30) [[x, z]yg(z)z, z] + [[F (x), z]yd(z)z, z] = 0.

Page 397: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

DERIVABLE MAPPINGS AND COMMUTATIVITY OF ASSOCIATIVE RINGS 383

Subtract (3.29) from (3.30), we obtain [[x, z]y[g(z), z], z]+[[F (x), z]y[d(z), z], z] =0. Utilizing the fact [d(z), z] = 0, for all z ∈ I, we find

(3.31) [[x, z]y[g(z), z], z] = 0.

Put x = xg(z) in (3.31), we get

(3.32) [x[g(z), z]y[g(z), z], z] + [[x, z]g(z)y[g(z), z], z] = 0.

Put y = g(z)y in (3.31) and subtract from (3.32) in order to get

(3.33) [x[g(z), z]y[g(z), z], z] = 0.

Substituting g(z)x for x in (3.33) and we get g(z)[x[g(z), z]y[g(z), z], z] + [g(z),z]x[g(z), z]y[g(z), z] = 0. Eq. (3.33) reduces it to [g(z), z]x[g(z), z]y[g(z), z] =0. It implies that (I[g(z), z])3 = (0). Since R has no nonzero ideal, we haveI[g(z), z] = (0). Semiprimeness of I yields that for each z ∈ I, [g(z), z] = 0.

Next, let us assume that R is a prime ring and ϕ is an automorphism of R.Replace y by yz in (3.24) and we find

(3.34) [xyzg(z), z] + [F (x)yzd(z), z] + [yz[ϕ(x), z], z] = 0.

Right multiply (3.24) by z in order to get

(3.35) [xyg(z)z, z] + [F (x)yd(z)z, z] + [y[ϕ(x), z]z, z] = 0.

Subtracting (3.34) from (3.35) and we find

(3.36) [xy[g(z), z], z] + [F (x)y[d(z), z], z] + [y[[ϕ(x), z], z], z] = 0.

Since d and g are commuting on I, Eq. (3.36) reduces to [y[[ϕ(x), z], z], z] = 0.This is same as equation (3.9), again from Theorem 1, we get I ⊆ Z(R). ByLemma 1, R is commutative.

On substituting −ϕ in place of ϕ in (3.23) and following the same argumentwith necessary variations, we get the same conclusions for the identity G(xy) +F (x)F (y)− [ϕ(x), y] ∈ Z(R).

Corollary 1 (Theorem 1, [25]). Let F,G : R → R be multiplicative (generali-zed)-derivations of R together with mappings d, g respectively. If ϕ is a mappingof R such that G(xy)+F (x)F (y)±[ϕ(x), y] = 0 for all x, y ∈ I, then [d(x), x] = 0and [g(x), x] = 0 for all x ∈ I.

Furthermore, if R is prime and ϕ is an automorphism of R, then R is com-mutative.

Theorem 6. Let F,G : R → R be multiplicative (generalized)-derivations ofR together with mappings d, g respectively. If ϕ is a mapping of R such thatG(xy) − F (x)F (y) ± [ϕ(x), y] ∈ Z(R) for all x, y ∈ I, then [d(x), x] = 0 and[g(x), x] = 0 for all x ∈ I.

Furthermore, if R is prime and ϕ is an automorphism of R, then R is com-mutative.

Page 398: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

384 GURNINDER S. SANDHU and DEEPAK KUMAR

Proof. On replacing G by −G and g by −g in Theorem 5, we can get thedesired results.

Corollary 2 (Theorem 2, [25]). Let F,G : R→ R be multiplicative (generalized)-derivations of R together with mappings d, g respectively. If ϕ is a mapping ofR such that G(xy)−F (x)F (y)± [ϕ(x), y] = 0 for all x, y ∈ I, then [d(x), x] = 0and [g(x), x] = 0 for all x ∈ I.

Furthermore, if R is prime and ϕ is an automorphism of R, then R is com-mutative.

Corollary 3. Let F,G : R→ R be multiplicative (generalized)-derivations of Rtogether with mappings d, g respectively. If any of the following condition

(i) G(xy)± F (x)F (y)± [x, y] ∈ Z(R)

(ii) G(xy)± F (x)F (y)± yx ∈ Z(R)

(iii) G(xy)± F (x)F (y) ∈ Z(R)

(iv) G(xy)± F (x)F (y)± xy ∈ Z(R)

holds on R. Then R is commutative.

Proof. (i) Firstly, we consider G(xy) + F (x)F (y) ± [x, y] ∈ Z(R) for eachx, y ∈ R. In particular, for ϕ = id (identity map), Theorem 5 gives us that[y[[x, z], z], z] = 0 where x, y, z ∈ R. From Theorem 5 commutativity of R easilyfollows. We also can prove the same conclusion with an alternative way. Sincefor each x, y, z ∈ I, we have [y[[z, x], z], z] = 0, which is a polynomial identityin noncommuting three variables on R. If possible assume that, for some primeinteger p the ring M2(GF (p)) satisfies the polynomial identity [y[[z, x], z], z] = 0.But, if we choose x = e11, y = e12, and z = e12 + e21, where eij denotes the2× 2 matrix with 1 in (ij)th-entry and 0 elsewhere. With these choices we seethat [y[[z, x], z], z] = 2(e11 − e22), which is a contradiction. Hence by Lemma 5,R must be commutative.

Similarly, we can prove the commutativity of R for the constraint G(xy) −F (x)F (y)± [x, y] ∈ Z(R).

The proof of (ii), (iii) and (iv) is straight forward from the fact that if G is amultiplicative (generalized)-derivation of R associated with a mapping g, thenso is G± id, where id is the identity map of R.

Immediately after Theorem 5 and Theorem 6 with Corollary 4.2 of [9], wegive the following result:

Corollary 4. Let F,G : R → R be multiplicative generalized derivations ofR together with derivations d, g respectively. If for any map ϕ on R, G(xy) ±F (x)F (y) ± [ϕ(x), y] ∈ Z(R) where x, y ∈ R, then there exist λ1, λ2 ∈ C andadditive mappings ζ1, ζ2 : R→ C respectively such that d(x) = λ1x+ ζ1(x) andg(x) = λ2x+ ζ2(x) for all x ∈ R.

Page 399: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

DERIVABLE MAPPINGS AND COMMUTATIVITY OF ASSOCIATIVE RINGS 385

Next, we give a generalization of Theorem 2.7 of [3] as a consequence ofabove results in the setting of generalized derivations:

Remark 1. Let I be a nonzero ideal of a prime ring R. If F and G aregeneralized derivations of R together with derivations d and g, then the followingconditions are equivalent:

(i) G(xy) + F (x)F (y) ± [x, y] ∈ Z(R) or G(xy) − F (x)F (y) ± [x, y] ∈ Z(R)for all x, y ∈ I.

(ii) G(xy) +F (x)F (y)± yx ∈ Z(R) or G(xy)−F (x)F (y)± yx ∈ Z(R) for allx, y ∈ I.

(iii) G(xy) + F (x)F (y) ∈ Z(R) or G(xy)− F (x)F (y) ∈ Z(R) for all x, y ∈ I.

(iv) G(xy) +F (x)F (y)± xy ∈ Z(R) or G(xy)−F (x)F (y)± xy ∈ Z(R) for allx, y ∈ I.

(v) R is commutative.

Proof. Clearly, (v)⇒ (i), (v)⇒ (ii), (v)⇒ (iii) and (v)⇒ (iv).

(i) ⇒ (v) Let x ∈ I be a fixed element. Let Ax = y ∈ I : G(xy) +F (x)F (y)±[x, y] ∈ Z(R) and Bx = y ∈ I : G(xy)−F (x)F (y)±[x, y] ∈ Z(R).Since F and G are additive mappings so both Ax and Bx are additive subgroupsof I such that I = Ax ∪Bx. Therefore, Brauer’s trick forces that either I = Axor I = Bx. Now, for some fixed y ∈ I, let Ay = x ∈ I : G(xy) + F (x)F (y) ±[x, y] ∈ Z(R) and By = x ∈ I : G(xy) − F (x)F (y) ± [x, y] ∈ Z(R). By thesame arguments as above, we find that either I = Ay or I = By. Hence, thecommutativity of R follows from Theorem 5 and Theorem 6 with ϕ = id theidentity map.

(ii)⇒ (v) By substituting ϕ = id and G = G∓id together with g in Theorem5 and Theorem 6, we may infer that R is commutative if any one of

(a) G(xy) + F (x)F (y)± yx ∈ Z(R)

(b) G(xy)− F (x)F (y)± yx ∈ Z(R)

holds on I. For a fixed element x ∈ I we set Ax = y ∈ I : G(xy) +F (x)F (y)±yx ∈ Z(R) and Bx = y ∈ I : G(xy) − F (x)F (y) ± yx ∈ Z(R). Further, byrepeating the same arguments we can get the required results.

(iii) ⇒ (v) By substituting ϕ = 0 in Theorem 5 and Theorem 6, we inferthat R is commutative if any one of

(a) G(xy) + F (x)F (y) ∈ Z(R)

(b) G(xy)− F (x)F (y) ∈ Z(R)

Page 400: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

386 GURNINDER S. SANDHU and DEEPAK KUMAR

holds on I. For a fixed element x ∈ I we set Ax = y ∈ I : G(xy) +F (x)F (y) ∈Z(R) and Bx = y ∈ I : G(xy)− F (x)F (y) ∈ Z(R). Again, by repeating thesame arguments we can get the desired results.

(iv) ⇒ (v) As we just shown that if either G(xy) + F (x)F (y) ∈ Z(R) orG(xy)− F (x)F (y) ∈ Z(R) holds on I, then R is commutative. By replacing Gby G± id in these equations, we can easily get the desired conclusion.

3.2 On annihilator conditions

Let S be any subset of R. A derivation d is said to be acting as a homomorphismor as an anti-homomorphism on a set S if d(xy)− d(x)d(y) = 0 for all x, y ∈ Sor d(xy) − d(y)d(x) = 0 for all x, y ∈ S respectively. Study of the derivationsacting as homomorphisms or as anti-homomorphisms on associative rings wasinitiated by Bell and Kappe in [7]. After that a number of results has beenobtained with various types of derivations acting as homomorphisms or as anti-homomorphisms on some appropriate subsets of associative rings (see [1], [2],[15], [17], [19], [24] and references therein). In [19], Gusic proved the following:Let R be an associative prime ring, let d be any function on R (not necessarily aderivation nor an additive function), let F be any function on R (not necessarilyadditive) satisfying F (xy) = F (x)y+ xd(y) for all x, y ∈ R, and let I be a non-zero ideal in R.

Assume that F (xy)−F (x)F (y) = 0 for all x, y ∈ I. Then d = 0, and F = 0or F (x) = x for any x ∈ R.

Assume that F (xy) − F (y)F (x) = 0 for all x, y ∈ I. Then d = 0, andF = 0 or F (x) = x for any x ∈ R (in this case R should be commutative) .Ali et al. [2] studied the same functional identities on square closed Lie ideal of2-torsion free prime ring. In [27], Dhara et al. extend this notion by studyingthe algebraic identities F (x)G(y) ± H(xy) ∈ Z(R) and F (x)G(y) ± H(yx) ∈Z(R) on square-closed Lie ideals of prime ring of char = 2, where F,G,H aregeneralized derivations of R. Further, Rehman and Raza in [26] gave a study ofgeneralized derivations acting as homomorphism or anti-homomorphism on Lieideals (without the assumption of square-closeness) of 2-torsion free prime ring.

Recently, Dhara et al. [17] obtained the following result: Let R be a primering, I a nonzero ideal of R and F : R → R be a multiplicative (generalized)-derivation associated with the map d : R → R. For some 0 = a ∈ R, supposethat a(F (xy)±F (x)F (y)) = 0 for each x, y ∈ I. Then one of the following hold:

1. d(R) = 0 and aF (R) = 0.

2. d(R) = 0 and F (r) = ∓r, where r ∈ R.Following this line of investigation, in this section we studied the situations

a(F (xy)± F (x)F (y)) ∈ Z(R) and a(F (xy)± F (y)F (x)) = 0.

Theorem 7. Let (0, Id =)F : R→ R be a multiplicative (generalized)-derivationof R together with a mapping d : R → R. If for some 0 = a ∈ R, a(F (xy) ±F (x)F (y)) ∈ Z(R) for all x, y ∈ I, then [ad(z), z] = 0 for all z ∈ I.

Page 401: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

DERIVABLE MAPPINGS AND COMMUTATIVITY OF ASSOCIATIVE RINGS 387

Furthermore, if R is prime and d is a derivation on R, then R is commuta-tive.

Proof. For each x, y ∈ I, we consider

(3.37) a(F (xy)± F (x)F (y)) ∈ Z(R).

Replace y by yt in (3.37), where t ∈ I, we find a(F (xy)±F (x)F (y))t+a(xyd(t)±F (x)yd(t)) ∈ Z(R). On commuting with t and using (3.37), we get

(3.38) [a(xyd(t)± F (x)yd(t)), t] = 0.

Put y = ty in (3.38) and we obtain

(3.39) [a(xtyd(t)± F (x)tyd(t)), t] = 0.

On replacing x by xt in (3.38), we get

(3.40) [a(xtyd(t)± F (x)tyd(t)), t]± [a(xd(t)yd(t)), t] = 0.

Subtracting (3.39) from (3.40), we get [a(xd(t)yd(t)), t] = 0. Substituting d(t)xin place of x, we obtain [ad(t)xd(t)yd(t), t] = 0. That is,

(3.41) ad(t)xd(t)yd(t)t− tad(t)xd(t)yd(t) = 0.

Replacing x by xad(t)z in (3.41), where z ∈ I, we find

ad(t)xad(t)zd(t)yd(t)t− tad(t)xad(t)zd(t)yd(t) = 0.

Making use of (3.41), we get

ad(t)xtad(t)zd(t)yd(t)− ad(t)xad(t)zd(t)tyd(t) = 0.

(3.42) ad(t)x[ad(t)zd(t), t]yd(t) = 0.

Putting x = zd(t)x in (3.42) in order to get

(3.43) ad(t)zd(t)x[ad(t)zd(t), t]yd(t) = 0.

Replacing x by tx in (3.43), we get

(3.44) ad(t)zd(t)tx[ad(t)zd(t), t]yd(t) = 0.

Left multiply (3.43) by t and subtract it from (3.44), we left with

[ad(t)zd(t), t]x[ad(t)zd(t), t]yd(t) = 0.

In this way, we obtain

[ad(t)zd(t), t]x[ad(t)zd(t), t]y[ad(t)zd(t), t] = 0.

Page 402: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

388 GURNINDER S. SANDHU and DEEPAK KUMAR

That is, for each z, t ∈ I we have(I[ad(t)zd(t), t])3 = (0). Semiprimeness of Rforces that I[ad(t)zd(t), t] = (0). Hence, for each t, z ∈ I, we get [ad(t)zd(t), t] =0. That is,

(3.45) ad(t)zd(t)t− tad(t)zd(t) = 0.

Substitute zad(t)w for z in (3.45), where w ∈ I, we get

(3.46) ad(t)zad(t)wd(t)t− tad(t)zad(t)wd(t) = 0.

By using (3.45), equation (3.46) can be written as

0 =ad(t)ztad(t)wd(t)− ad(t)zad(t)twd(t)

=ad(t)z[t, ad(t)]wd(t).(3.47)

Replacing z by tz and w by wt in (3.47) in order to get

(3.48) ad(t)tz[t, ad(t)]wtd(t) = 0.

Multiply t on both sides of (3.47), we have

(3.49) tad(t)z[t, ad(t)]wd(t)t = 0.

Subtracting (3.48) and (3.49) to obtain [ad(t), t]z[ad(t), t]w[ad(t), t] = 0. Thatmeans, (I[ad(t), t])3 = (0). Hence, by the same reasons we obtain [ad(t), t] = 0for any t ∈ I, as desired.

Further, if R is a prime ring and d is derivation of R, then by Lemma 3,either d = 0 or R is commutative. If d = 0 then our hypothesis gives,

(3.50) aF (x)(y − F (y)) ∈ Z(R).

Replacing y by yk in (3.50), where k ∈ I, we get

(3.51) aF (x)(y − F (y))k ∈ Z(R).

On commuting both sides by j ∈ I, we find

(3.52) aF (x)(y − F (y))kj − jaF (x)(y − F (y))k = 0.

By using (3.51) and (3.52), we get j(aF (x)(y − F (y)))k ∈ Z(R). Put r =aF (x)(y−F (y)) and our assumption implies that r = 0 so, we have IrI ⊆ Z(R).That means R contains a nonzero central ideal. Hence, by Lemma 1, R iscommutative.

Example 1. Consider R =

(a b0 c

): a, b, c ∈ Z2

, be a ring over inte-

gers modulo 2 and let I =

(a b0 0

): a, b ∈ Z2

, be an ideal of R. We

Page 403: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

DERIVABLE MAPPINGS AND COMMUTATIVITY OF ASSOCIATIVE RINGS 389

define maps F, d : R → R by F

(a b0 c

)=

(a nb0 0

), d

(a b0 c

)=(

0 (n− 1)b0 0

), where n is any positive integer. Clearly,F is a multiplica-

tive (generalized)-derivation associated with the map d and for any 0 = a ∈ Rit is easy to see that the identities a(F (xy) +F (x)F (y)) ∈ Z(R) and a(F (xy)−F (x)F (y)) ∈ Z(R) hold for each x, y ∈ I. Here R is not semiprime ring because(

0 10 0

)R

(0 10 0

)= (0). But neither [ad(z), z] = (0) for all z ∈ I nor R is

commutative. Hence, the condition of semiprimeness and primeness in Theorem7 is not superfluous.

Recently, in [11] Camci and Aydin proved that: If F is a multiplicative(generalized)-derivation of a semiprime (prime) ring R together with a map f ,then f must be multiplicative derivation of R. In the following theorem, we aretaking f as a left multiplier instead of a multiplicative derivation.

Theorem 8. Let R be a non-commutative prime ring and I be a nonzero idealof R. Let F : R → R be a mapping (not necessarily additive) of R such thatF (xy) = F (x)y+xd(y), where d is a left-multiplier of R. If for some 0 = a ∈ R,a(F (xy)± F (y)F (x)) = 0 for all x, y ∈ I, then either aF (R) = (0) or F : R→Z(R).

Proof. For each x, y ∈ I, we consider

(3.53) a(F (xy)− F (y)F (x)) = 0.

Replacing x by xy in (3.53), we get a(F (xy)y+xyd(y)−F (y)F (x)y−F (y)xd(y)) =0 for all x, y ∈ I. Our hypothesis forces that

(3.54) axyd(y) = aF (y)xd(y).

Putting ax in place of x in (3.54), we find

(3.55) a2xyd(y) = aF (y)axd(y).

Left multiply (3.54) by a and subtract from (3.55) and we get a[F (y), a]xd(y) =0. Primeness of R implies that either d(I) = (0) or a[F (I), a] = (0).

We assume that

(3.56) a[F (y), a] = 0, for all y ∈ I.

On substitution of yx for y in (3.56), where x ∈ I, we have aF (y)[x, a] +a[yd(x), a] = 0. Replacing x by zx, where z ∈ I, in this expression and using it,we obtain aF (yz)[x, a] = 0. For some r ∈ R, substitute xr in place of x to getaF (yz)x[r, a] = 0. Replace x by px, where p ∈ R and we get aF (yz)Rx[r, a] =(0). Therefore, either aF (I2) = 0 or I[r, a] = (0). If I[r, a] = (0), then a ∈ Z(R).

Page 404: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

390 GURNINDER S. SANDHU and DEEPAK KUMAR

Since we know that center of a prime ring contains no zero divisor, so Eq. (3.54)gives that (xy − F (y)x)d(y) = 0 for each x, y ∈ I. For some t ∈ I, replacing xby tx, we find

(3.57) (txy − F (y)tx)d(y) = 0

On pre-multiplying the expression (xy − F (y)x)d(y) = 0 by t, we obtain

(3.58) (txy − tF (y)x)d(y) = 0

Now we combine (3.57) and (3.58) in order to get [F (y), t]xd(y) = 0. It impliesthat either d(I) = (0) or [F (I), I] = (0). Further, if for any x, y ∈ I, [F (x), y] =0. Putting x = xy, we find x[d(y), y] + [x, y]d(y) = 0 for any x, y ∈ I. Again weput wx instead of x in the last relation, for all w ∈ I, we obtain [w, y]xd(y) = 0.For some r ∈ R, we replace x by rx and obtain [w, y]Rxd(y) = (0) wherex, y, w ∈ I. It implies that either [I, I] = (0) or d(I) = (0). Since R is assumedto be non-commutative, by Lemma 1, [I, I] = (0), so we have d(I) = (0). Onthe other side, if aF (yz) = 0 for each y, z ∈ I, then for some t ∈ I, substitutionof zt for z yields that ayzd(t) = 0. Since a = 0 and I a nonzero ideal of theprime ring R, we have d(I) = (0). Therefore, each of our case gives d(I) = 0.

Next, we see effect of this outcome d(I) = (0) on the behavior of the mappingF . We consider, d(I) = (0) our hypothesis implies

(3.59) aF (x)y = aF (y)F (x).

Replacing y by yt in (3.59) where t ∈ I, we get

(3.60) aF (x)yt = aF (y)tF (x).

Right multiply (3.59) by t and subtract form (3.60) in order to get aF (y)[F (x), t] =0. Put y = ry in the last expression, where r ∈ R, we find aF (r)y[F (x), t] = 0.For some s ∈ R again we replace y be sy in order to get aF (R)RI[F (I), I] = (0).Primeness of R implies that either aF (R) = (0) or I[F (I), I] = (0). Assumethat I[F (I), I] = (0). That means for each x, t ∈ I, we have

(3.61) [F (x), t] = 0.

Putting x = rx where r ∈ R, in the above relation to obtain [F (r), t]x +F (r)[x, t] = 0. In particular, we obtain [F (r), t]t = 0. Linearizing the lastrelation w.r.t.t and we get

(3.62) [F (r), t]y + [F (r), y]t = 0.

Substitute ys for y in (3.62), where s ∈ R, we obtain

(3.63) [F (r), t]ys+ [F (r), y]st+ y[F (r), s]t = 0.

Page 405: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

DERIVABLE MAPPINGS AND COMMUTATIVITY OF ASSOCIATIVE RINGS 391

Combining (3.62) and (3.63) and we have

(3.64) [F (r), y][s, t] + y[F (r), s]t = 0.

Replace t by tz in (3.64), where z ∈ I, we get [F (r), y][s, t]z + [F (r), y]t[s, z] +y[F (r), s]tz = 0. Eq. (3.64) reduces it to [F (r), y]t[s, z] = 0, for all y, t, z ∈I and r, s ∈ R. In particular, putting s = F (r) and y = z, we obtain[F (r), z]I[F (r), z] = (0). Thus, by primeness of I for each r ∈ R and z ∈ I, wehave [F (r), z] = 0. Evidently, [F (r), s] = 0, where r, s ∈ R i.e. F (R) ⊆ Z(R).Hence, F sends R into Z(R).

On replacing F by −F and d by −d in the proof given above, we can get thesame conclusions for the situation a(F (xy) + F (y)F (x)) = 0. Hence, it provesthe theorem.

We conclude with the following example, which is showing that the Theorem8 can’t be extended to multiplicative (generalized)-derivations.

Example 2. Consider R =

(m np q

): m,n, p, q ∈ Z2

, be a ring over in-

tegers modulo 2. Since a matrix ring over an integral domain is a prime ring,

so R is a non-commutative prime ring. Let I =

(m n0 0

): m,n ∈ Z2

, be

an ideal of R. We define maps F, d : R → R by F

(m np q

)=

(m 0p 0

), d

(m np q

)=

(0 np 0

). Note that F is a multiplicative (generalized)-

derivation associated with the map d. For any 0 = a ∈ R, it is easy to verifythat the identities a(F (xy) + F (y)F (x)) = 0 and a(F (xy) − F (y)F (x)) = 0are satisfied on I, but neither aF (R) = (0) nor F (R) ⊆ Z(R). Hence, therestrictions imposed in Theorem 8 are crucial.

References

[1] Ali, A., Rehman, N., Ali, S., On Lie ideals with derivations as homomor-phisms and anti-homomorphisms, Acta Math. Hung., 101 (2003), 79-82.

[2] Ali, S., Dhara, B., Dar, N. A., Khan, A. N., On Lie ideals with multiplica-tive (generalized)-derivations in prime and semiprime rings, Beitr AlgebraGeom., 56(1) (2014), 325-337.

[3] Ashraf, M., Ali, A., Ali, S., Some commutativity theorems for rings withgeneralized derivations, Southeast Asian Bull. Math., 31 (2007), 415-421.

[4] Ashraf, M., Ali, A., Rani, R., On generalized derivations of prime rings,Southeast Asian Bull. Math., 29(4) (2005), 669-675.

Page 406: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

392 GURNINDER S. SANDHU and DEEPAK KUMAR

[5] Ashraf, M., Rehman, N., On derivations and commutativity in prime rings,East-West J. Math., 3(1) (2001), 87-91.

[6] Atteya, M. J., On generalized derivations of semiprime rings, Int. J. Alge-bra, 4(12) (2010), 591-598.

[7] Bell, H. E., Kappe, L. C., Rings in which derivations satisfy certain alge-braic conditions, Acta Math. Hung., 53 (1989), 339-346.

[8] Bell, H. E., Martindale III, W. S., Centralizing mappings of semiprimerings, Canad. Math. Bull., 30(1) (1987), 92-101.

[9] Bresar, M., On certain pair of functions of semiprime rings, Proc. Amer.Math. Soc., 120(3) (1994), 709-713.

[10] Bresar, M., On the distance of composition of two derivations to the gen-eralized derivation, Glasgow Math. J., 33 (1991), 89-93.

[11] Camci, D. K., Aydin, N., On multiplicative (generalized)-derivations insemiprime rings, Commun. Fac. Sci. Univ. Ank. Ser. Al Math. Stat., 66(1)(2017), 153-164.

[12] Daif, M. N., When is a multiplicative derivation additive? Internat. J.Math. Math. Sci., 14(3) (1991), 615-618.

[13] Daif, M. N., Bell, H. E., Remarks on derivations on semiprime rings, In-ternat. J. Math. Math. Sci., 15(1) (1992), 205-206.

[14] Daif, M. N., Tammam-El-Sayiad, M. S., Multiplicative generalized deriva-tions which are additive, East-West J. Math., 9(1) (1997), 33-37.

[15] Dhara, B., Generalized derivations acting as a homomorphism or anti-homomorphism in semiprime rings, Beitr. Algebra Geom., 53 (2012), 203-209.

[16] Dhara, B., Ali, S., On multiplicative (generalized)-derivations in prime andsemiprime rings, Aequations Math. 86(1-2) (2013), 65-79.

[17] Dhara, B., Pradhan, K. G., A note on multiplicative (generalized)-derivations with annihilator conditions, Georgian Math. J., 23(2) (2016),191-198.

[18] Goldmann, H., Semrl, P., Multiplicative derivation on C(X), Monatsh.Math., 121(3) (1996), 189-197.

[19] Gusic, I., A note on generalized derivations of prime rings, Glasnik Mate.,40(60) (2005), 47-49.

[20] Herstein, I. N., Rings with involution, The University of Chicago Press,Chicago, 1976.

Page 407: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

DERIVABLE MAPPINGS AND COMMUTATIVITY OF ASSOCIATIVE RINGS 393

[21] Kezlan, T. P., A note on commutativity of semiprime PI-rings, Math.Japonica., 27(2) (1982), 267-268.

[22] Martindale III, W. S., When are multiplicative maps additive?, Proc. Amer.Math. Soc., 21 (1969), 695-698.

[23] Posner, E. C., Derivations in prime rings, Proc. Amer. Math. Soc., 8(1957),1093-1100.

[24] Rehman, N., On generalized derivations as homomorphisms and anti-homomorphisms, Glasnik Mate., 39(59) (2004), 27-30.

[25] Tiwari, S. K., Sharma, R. K., Dhara, B., Multiplicative (generalized)-derivation in semiprime rings, Beitr. Algebra Geom., DOI 10.1007/s13366-015-0279.

[26] Rehman, N., Raza, M. A., Generalized derivations as homomorphism oranti-homomorphims on Lie ideals, Arab J. Math. Sci., 22(1) (2016), 22-28.

[27] Dhara, B., Rehman, N., Raza, M. A., Lie ideals and action of generalizedderivations in rings, Miskolc Math. Notes., 16(2) (2015), 769-779.

Accepted: 2.11.2017

Page 408: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (394–409) 394

FIXED POINT RESULTS OF F -RATIONAL CYCLICCONTRACTIVE MAPPINGS ON 0-COMPLETE PARTIALMETRIC SPACES

Zead MustafaDepartment of MathematicsStatistics and PhysicsQatar UniversityDoha-QatarandDepartment of MathematicsThe Hashemite UniversityP.O. 330127, Zarqa [email protected]@hu.edu.jo

Sami Ullah KhanDepartment of MathematicsInternational Islamic UniversityH-10, Islamabad - [email protected]

M.M.M. JaradatDepartment of MathematicsStatistics and PhysicsQatar [email protected]

Muhammad ArshadDepartment of MathematicsInternational Islamic UniversityH-10, Islamabad - 44000, Pakistanmarshad [email protected]

H.M. JaradatDepartment of Mathematics

Al al-Bayt University

Jordan

[email protected]

Abstract. Wardowski [19] introduced a new concept of contraction which called F -contraction and proved a fixed point theorem on complete metric space. Following thisdirection of research, in this paper, we introduce an F−rational cyclic contraction on

Page 409: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

FIXED POINT RESULTS OF F -RATIONAL CYCLIC CONTRACTIVE MAPPINGS ... 395

partial metric spaces and we present new fixed point results for such cyclic contractionin 0-complete partial metric spaces. An example is given to illustrate the main result,also an application to integral equation is given to show the usability of our results.

Keywords: fixed point, F -contractions, (0−complete) partial metric space.

1. Introduction

In 1994, S. G. Matthews [14] introduced the notion of partial metric spacesand obtained various fixed point theorems. In fact, he showed that the Banachcontraction mapping theorem can be generalized to the partial metric contextfor applications in program verification.

Later on, Romaguera [16] introduced the notions of 0-Cauchy sequences and0-complete partial metric spaces and proved some characterizations of partialmetric spaces in terms of completeness and 0-completeness.

In 2012, Wardowski [19] introduced a new type of contraction called F -contraction and proved a new fixed point theorem concerning F -contraction.Furthermore, Abbas et al.,[1] generalized the concept of F−contraction andproved certain fixed and common fixed point results. Afterwards Secelean [17]proved fixed point theorems consisting of F−contractions by iterated functionsystems. Piri et al.,[15] proved a fixed point result for F -Suzuki contractions forsome weaker conditions on the self map of a complete metric space which gen-eralizes the result of Wardowski. Lately, Acar et al.,[5] introduced the conceptof generalized multivalued F−contraction mappings. Further Altun et al.,[4]extended multivalued mappings with δ−Distance and established fixed point re-sults in complete metric space. Sgroi et al.,[18] established fixed point theoremsfor multivalued F−contractions and obtained the solution of certain functionaland integral equations, which was a proper generalization of some multivaluedfixed point theorems including Nadler’s. Recently Ahmad et al.,[6],[9] recalledthe concept of F−contraction to obtain some fixed point, and common fixedpoint results in the context of complete metric spaces.

In this paper, we introduce an F−rational cyclic contraction on partial met-ric spaces and we present new fixed point results for such cyclic contraction in0-complete partial metric spaces. An example is given to illustrate the mainresult, also an application to integral equation is given to show the usability ofour results.

2. Preliminaries

First we recall some definitions and properties of partial metric spaces.

Definition 2.1. [14] A partial metric on a nonempty set X is a function p :X ×X → R+(R+ stands for nonnegative reals) such that for all x, y, z ∈ X :

(P1) x = y ⇔ p (x, x) = p (y, y) = p (x, y) ;

(P2) p(x, x) ≤ p(x, y);

Page 410: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

396 Z. MUSTAFA, S.U. KHAN, M.M.M. JARADAT, M. ARSHAD, H.M. JARADAT

(P3) p (x, y) = p (y, x);

(P4) p(x, y) ≤ p(x, z) + p(z, y)− p (z, z) .

A partial metric spaces is a pair (X, p) such that X is a nonempty set and p isa partial metric on X.

It is clear that, if p (x, y) = 0, then from (P1) and (P2) x = y. But if x = y,p (x, y) may not be 0. Also, every metric space is a partial metric space, withzero self distance.

Example 2.2. [14] If p : R+×R+ → R+ is defined by p (x, y) = maxx, y, forall x, y ∈ R+, then (R+, p) is a partial metric space.

For more examples of partial metric spaces, we refer the reader to [8] andthe references therein.

Each partial metric p on X generates a T0 topology τ (p) on X which has abase topology of open p−balls Bp (x, ε) : x ∈ X, ε > 0 andBp (x, ε) = y ∈ X :p (x, y) < ε+ p (x, x).

A mapping f : X → X is continuous if and only if, whenever a sequencexn in X converging with respect to τ (p) to a point x ∈ X, the sequence fxnconverges with respect to τ (p) to fx ∈ X.

Let (X, p) be a partial metric space.(i) A sequence xn in partial metric space (X, p) converges to a point x ∈ X

if and only if p (x, x) = limn→∞ p (xn, x) .(ii) A sequence xn in partial metric space (X, p) is called Cauchy sequence

if there exists (and is finite) limn,m→∞ p (xn, xm). The space (X, p) is said tobe complete if every Cauchy sequence xn in X converges, with respect toτ (p) , to a point x ∈ X such that p (x, x) = limn,m→∞ p (xn, xm) .

(iii) A sequence xn in partial metric space (X, p) is called 0-Cauchy iflimn,m→∞ p (xn, xm) = 0. The space (X, p) is said to be 0-complete if every 0-Cauchy sequence in X converges (in τ (p)) to a point x ∈ X such that p (x, x) =0.

Lemma 2.3. Let (X, p) be a partial metric space.

(a) [2],[12] If p(xn, z) → p(z, z) = 0 as n → ∞, then p(xn, y) → p(z, y) asn→∞ for each y ∈ X.

(b) [16] If (X, p) is complete, then it is 0−complete.

It is easy to see that every closed subset of a 0-complete partial metric spaceis 0-complete. The following example shows that the converse assertion of (b)need not hold.

Example 2.4 ([16]). The space X = [0,+∞) ∩ Q with the partial metricp (x, y) = maxx, y is 0-complete, but is not complete. Moreover, the sequencexn with xn = 1 for each n ∈ N is a Cauchy sequence in (X, p) , but it is not a0-Cauchy sequence.

Page 411: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

FIXED POINT RESULTS OF F -RATIONAL CYCLIC CONTRACTIVE MAPPINGS ... 397

Definition 2.5 ([11]). Let (X, d) be a metric space and f : X → X be amapping. Then it is said that f satisfies the orbital condition if there exists aconstant k ∈ (0, 1) such that

(2.1) d(fx, f2x

)≤ k d (x, fx) ,

for all x ∈ X.

Theorem 2.6 ([3]). Let (X, p) be a 0−complete partial metric space and f :X → X be continuous such that

(2.2) p(fx, f2x

)≤ k p (x, fx)

holds for all x ∈ X, where k ∈ (0, 1) . Then there exists z ∈ X such thatp (z, z) = 0 and p (fz, z) = p (fz, fz) .

Definition 2.7 ([11]). Let (X, p) be a partial metric space and f : X → Xbe a mapping with fixed point set Fix(f) = ϕ . Then f has property (P) ifFix(fn) = Fix(f), for each n ∈ N .

Lemma 2.8 ([11]). Let (X, p) be a partial metric space, f : X → X be a selfmap such that Fix (f) = ϕ. Then f has the property (P ) if (2.2) holds for somek ∈ (0, 1) and either (i) for all x ∈ X, or (ii) for all x = fx.

One of the remarkable generalizations of Banach’s contraction principle wasreported by Kirk et al.,[13] via cyclic contraction.

Theorem 2.9 ([13]). Let Aimi=1 be a nonempty closed subset of a completemetric space (X, d) and suppose f :

∪mi=1Ai →

∪mi=1Ai be a mapping satisfying

the following conditions:

(1) f(Ai) ⊆ Ai+1 for 1 ≤ i ≤ m, where Am+1 = A1.

(2) d (fx, fy) ≤ ψ (d (x, y)) , for all x ∈ Ai, y ∈ Ai+1, i ∈ 1, 2, · · ·,m,

where Am+1 = A1 and ψ : [0, 1) → [0, 1) is a function, upper semi-continuousfrom the right and 0 ≤ ψ (t) < t for t > 0. Then, f has a fixed point z ∈

∩mi=1Ai.

Wardowski [19] defined the F−contraction as follows.

Definition 2.10 ([19]). Let (X, d) be a complete metric space. A self mappingf : X → X is said to be an F−contraction if there exists a constant λ > 0 suchthat

(1.3) ∀ x, y ∈ X, d(fx, fy) > 0⇒ λ+ F (d(fx, fy)) ≤ F (d(x, y)) .

where F : R+ → R is a mapping satisfying the following conditions:

Page 412: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

398 Z. MUSTAFA, S.U. KHAN, M.M.M. JARADAT, M. ARSHAD, H.M. JARADAT

(F1) F is strictly increasing, i.e. for all x, y ∈ R+ such that x < y, F (x) <F (y);

(F2) For each sequence αn∞n=1 of positive numbers, limn→∞ αn = 0 if andonly if, limn→∞ F (αn) = −∞;

(F3) There exists k ∈ (0, 1) such that limα→ 0+αkF (α) = 0.We denote F the family of all functions F that satisfy the conditions (F1)−

(F3) .

Example 2.11 ([19]). The Family of F is not empty.

1. F (x) = ln(x);x > 0;

2. F (x) = x+ ln(x);x > 0;

3. F (x) = ln(x2 + x);x > 0;

4. F (x) = −1√x;x > 0.

Theorem 2.12 ([19]). Let (X, d) be a complete metric space and f : X → Xbe a F−contraction. If f or F is continuous, then we have

(1) f has a unique fixed point x∗ ∈ X.(2) For all x ∈ X, the sequence Tnx is convergent to x∗.

3. Main results and discussion

Let (X, p) be a partial metric space, through out of this paper we mean by ∆p

be the set of all nonempty closed subsets of X.

Definition 3.1. Let (X, p) be a partial metric space, Vi ∈ ∆p for i = 1, 2, · · · ,m,E =

∪mi=1 Vi where m ∈ N . A mapping f : E → E is called an F -rational cyclic

contraction if there exists F ∈ F and λ ∈ R+ such that1. f(Vi) ⊆ Vi+1, i = 1, 2, ...,m, where Vm+1 = V1,2. For x ∈ Vi, y ∈ Vi+1, i = 1, 2, ...,m, with p (fx, fy) > 0, we have

(3.1) λ+ F (p (fx, fy)) ≤ F (Hf (x, y)) ,

where

Hf (x, y) = ap (x, y) + bp (x, fx) + cp (y, fy) + dp (x, fy) + ep (y, fx)

+ lp (x, fx) .p (y, fy)

1 + p (x, y),(3.2)

and

(3.3) a, b, c, d, e, l ≥ 0 with a+ b+ c+ d+ e+ l < 1.

The main result of this section is the following.

Page 413: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

FIXED POINT RESULTS OF F -RATIONAL CYCLIC CONTRACTIVE MAPPINGS ... 399

Theorem 3.2. Let (X, p) be a 0-complete partial metric space, Vi ∈ ∆p; i =1, 2, · · · ,m where m ∈ N and E =

∪mi=1 Vi. Suppose that f : E → E is an

F -rational cyclic contraction. Then,

1. f has a unique fixed point z ∈ E.

2. p (z, z) = 0 and z ∈∩mi=1 Vi.

3. for any x0 ∈ E, the sequence xn = fnx0, converges to z in topology τ(p).

Proof. Let x0 ∈ E be an arbitrary point. Then there exists i0 such thatx0 ∈ Vi0 , so there is x1 ∈ Vi0+1 where x1 = fx0. Continue in this process wecan construct a sequence xn = fxn−1 = fnx0 ∈ Vi0+n. If xn = xn+1 for somen ∈ N, then xn is a fixed point of f. From now on assume that xn = xn+1, forall n ∈ N and let pn = p (xn, xn+1), so pn > 0 for all n ∈ N. Since f : E → E isan F -rational cyclic contraction. So, from (3.1) and (3.2) we have that

λ+ F (pn) = λ+ F (p (xn, xn+1))

= λ+ F (p (fxn−1, fxn))

≤ F

(ap (xn−1, xn) + bp (xn−1, xn) + cp (xn, xn+1) + dp (xn−1, xn+1)

+ep (xn, xn) + l p(xn−1,xn).p(xn,xn+1)1+p(xn−1,xn)

).

Since p(xn−1, xn+1) ≤ p(xn−1, xn)+p(xn, xn+1)−p(xn, xn), F is strictly increas-

ing and p(xn−1,xn).p(xn,xn+1)1+p(xn−1,xn)

< p (xn, xn+1), then the above inequality becomes

(3.4) λ+ F (pn) ≤ F ((a+ b+ d) pn−1 + (c+ d+ l) pn + (e− d) p (xn, xn)) .

Since λ > 0, then

F (pn) ≤ λ+ F (pn) ≤ F ((a+ b+ d) pn−1 + (c+ d+ l) pn + (e− d) p (xn, xn)) .

But, F is strictly increasing, so we deduce that

(3.5) pn ≤ (a+ b+ d)pn−1 + (c+ d+ l)pn + (e− d)p(xn, xn)).

By symmetry of p (xn+1, xn) = p (xn, xn+1) , and using similar argument asabove one can deduce that

λ+ F (p (xn+1, xn)) = λ+ F (p (fxn, fxn−1))

≤ F ((a+ c+ e) pn−1 + (b+ e+ l) pn + (d− e) p (xn, xn)) .

Thus,

F (pn) ≤ λ+ F (pn) ≤ F ((a+ c+ e) pn−1 + (b+ e+ l) pn + (d− e) p (xn, xn))

which implies that

(3.6) pn ≤ (a+ c+ e)pn−1 + (b+ e+ l)pn + (d− e)p(xn, xn).

Page 414: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

400 Z. MUSTAFA, S.U. KHAN, M.M.M. JARADAT, M. ARSHAD, H.M. JARADAT

Adding up, equations (3.5) and (3.6) we get pn ≤ βpn−1, whereβ = 2a+b+c+d+e

2−b−c−d−e−2l < 1, which is a consequence of (3.3). Hence,

(3.7) pn < pn−1, for all n ∈ N

Using property(P2) of partial metric, equations (3.4), (3.7) and the propertyof strictly increasing of F we get

λ+ F (pn) ≤ F ((a+ b+ d) pn−1 + (c+ d+ l) pn + (e− d) p (xn, xn))

≤ F ((a+ b+ d) pn−1 + (c+ d+ l) pn−1 + (e− d) pn−1)

= F ((a+ b+ c+ d+ e+ l) pn−1)

≤ F (pn−1).

Hence, λ+ F (pn) ≤ F (pn−1) for all n ∈ N. This implies

(3.8) F (pn) ≤ F (pn−1)− λ ≤ · · · ≤ F (p0)− nλ, for all n ∈ N

and so limn→+∞F (pn) = −∞. By the property (F2) , we get that pn → 0 asn→ +∞.

Now, by (F3) there exist k ∈ (0, 1) such that limn→+∞pknF (pn) = 0.

By (3.8), the following holds for all n ∈ N :

(3.9) pknF (pn)− pknF (p0) ≤ −nλpkn ≤ 0.

Letting n→ +∞ in (3.9) we deduce that

(3.10) limn→+∞

npkn = 0.

By using the continuous function g(x) = x1k ; x ∈ (0,∞), we get that

(3.11) limn→+∞

n1k pn = lim

n→+∞g(npkn) = 0.

Now, by using the limit comparison test with an = pn, bn = n−1k and equation

(3.10) we ensure that the series∑+∞

n=1 pn is convergent. This implies that xnis a 0−Cauchy sequence. Since E is closed in a 0-complete partial metric (X, p) ,then E is also 0-complete and there exist z ∈ E =

∪mi=1 Vi such that

(3.12) limn→∞

p (xn, z) = 0 = p (z, z) .

Notice that the iterative sequence xn has an infinite number of terms in Vi foreach i = 1, ...,m. Hence, there is a subsequence of xn in each Vi, i = 1, ...,m,which converges to z. Using that each Vi, i = 1, ...,m, is closed, we concludethat z ∈

∩mi=1 Vi.

Page 415: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

FIXED POINT RESULTS OF F -RATIONAL CYCLIC CONTRACTIVE MAPPINGS ... 401

We shall prove that z is a fixed point of f . Using the triangle inequality (p4)of partial metric space and (3.2) ( which is possible since z belongs to each Vi)to obtain

p (z, fz) ≤ p (z, xn+1) + p (xn+1, fz)− p (xn+1, xn+1)

≤ p (z, xn+1) + p (fxn, fz)

≤ p (z, xn+1) + ap (xn, z) + bp (xn, xn+1) + cp (z, fz) + dp (xn, fz)

+ep (xn+1, z) + lp (xn, xn+1) .p (z, fz)

1 + p (xn, z).(3.13)

Using Lemma 2.3 part (a) and passing to the limit when n → ∞ in (3.13),we obtain that

(1− c− d) p (z, fz) ≤ 0,

and hence

(3.14) p (z, fz) = 0.

Now by using triangle inequality (P4), (3.14) and (3.12) we deduce that p(fz, fz)= 0. Therefore, by (P1) we get f(z) = z.

Finally, we will prove the uniqueness, let u be another fixed point of f in E,with p (u, z) = 0. By the cyclic character of f , we have u, z ∈

∩mi=1 Vi. Since f is

an F -rational cyclic contraction and using the property (P2) of partial metric,we have

λ+ F (p (u, z)) = λ+ F (p (fu, fz))

≤ F

(ap (u, z) + bp (u, u) + cp (z, z) + dp (u, z) + ep (u, z)

+l p(u,fu).p(z,fz)1+p(u,z)

)≤ F ((a+ b+ c+ d+ e) p (u, z)) ,

which is a contradiction deduced from the strictly increasing property of F andbeing a+ b+ c+ d+ e < 1, hence z = u. Thus z is a unique fixed point of f.

By taking F (α) = α+ ln(α) in Theorem 3.2 we get the following corollary.

Corollary 3.3. Let (X, p) be a 0-complete partial metric space, Vi ∈ ∆p; i =1, 2, · · · ,m where m ∈ N and E =

∪mi=1 Vi. Suppose that f : E → E and the

following conditions are hold:

1. f(Vi) ⊆ Vi+1, i = 1, 2, ...,m, where Vm+1 = V1,

2. There exist λ > 0 such that for x ∈ Vi, y ∈ Vi+1, i = 1, 2, ...,m, withp (fx, fy) > 0, we have

Page 416: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

402 Z. MUSTAFA, S.U. KHAN, M.M.M. JARADAT, M. ARSHAD, H.M. JARADAT

λ+ ln(p(fx, fy)) ≤

(ap (x, y) + bp (x, fx) + cp (y, fy) + dp (x, fy)

+ep (y, fx) + l p(x,fx).p(y,fy)1+p(x,y)

)

+ ln

(ap (x, y) + bp (x, fx) + cp (y, fy) + dp (x, fy)

+ep (y, fx) + l p(x,fx).p(y,fy)1+p(x,y)

),

where a, b, c, d, e, l ≥ 0 and a+ b+ c+ d+ e+ l < 1. Then,

1. f has a unique fixed point z ∈ E.

2. p (z, z) = 0 and z ∈∩mi=1 Vi.

3. for any x0 ∈ E, the sequence xn = fnx0, converges to z in topology τ(p).

By taking F (α) = −1√α

in Theorem 3.2 we get the following corollary.

Corollary 3.4. Let (X, p) be a 0-complete partial metric space, Vi ∈ ∆p; i =1, 2, · · · ,m where m ∈ N and E =

∪mi=1 Vi. Suppose that f : E → E and the

following conditions are hold:

1. f(Vi) ⊆ Vi+1, i = 1, 2, ...,m, where Vm+1 = V1,

2. There exist λ > 0 such that for x ∈ Vi, y ∈ Vi+1, i = 1, 2, ...,m, withp (fx, fy) > 0, we have

λ+−1√

p(fx, fy)≤ −1√√√√( ap (x, y) + bp (x, fx) + cp (y, fy) + dp (x, fy) + ep (y, fx)

+l p(x,fx).p(y,fy)1+p(x,y)

)

where a, b, c, d, e, l ≥ 0 and a+ b+ c+ d+ e+ l < 1. Then,

1. f has a unique fixed point z ∈ E.

2. p (z, z) = 0 and z ∈∩mi=1 Vi.

3. for any x0 ∈ E, the sequence xn = fnx0, converges to z in topology τ(p).

Example 3.5. Let X = R be equipped with the usual partial metric p (x, y) =max|x|, |y|. Then, clearly (X, p) is 0−complete. Suppose V1 =

[0, 12], V2 =[−1

6 , 0], V3 =

[0, 1

18

], V4 =

[−154 , 0

]and E =

∪4i=1 Vi. Define f : E → E such

that fx = −x8 for all x ∈ E. It is clear that f(Vi) ⊆ Vi+1.

Page 417: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

FIXED POINT RESULTS OF F -RATIONAL CYCLIC CONTRACTIVE MAPPINGS ... 403

Take λ = ln(4), a = 12 and b = c = d = e = l = 1

11 . Let x ∈ Vi and y ∈ Vi+1

such that either x = 0 or y = 0, then

p(fx, fy) = max|−x8|, |−y

8|

=1

8max|x|, |y|

=1

8p(x, y)

= (1

4)(

1

2)p(x, y).(3.15)

Now take ln for both sides of (3.15) we get

ln(p(fx, fy)) = ln((1

4)(

1

2)p(x, y))

= −ln(4) + ln(1

2p(x, y))

≤ −ln(4) + ln(1

2p(x, y) +

1

11p(x, fx) +

1

11p(y, fy) +

1

11p(x, fy)

+1

11p(y, fx) +

1

11

p(x, fx)p(y, fy)

1 + p(x, y)

).

Hence,ln(4) + F (p(x, y)) ≤ F (Hf (x, y)).

Therefore, all conditions of Theorem 3.2 are satisfied and we deduce that f hasa unique fixed point z = 0 ∈

∩4i=1 Vi and p (z, z) = 0 holds true.

Another consequence of Theorem 3.2 is the following.

Theorem 3.6. Under the assumptions of Theorem 3.2. The function f satisfiesthe orbital condition (2.2). In particular, there exist z ∈ E such that p (z, z) = 0and p (fz, z) = p (fz, fz) ; also, f has the property (P) .

Proof. By Theorem 3.2, the set of fixed points for f is not empty. We willprove that f satisfies condition (2.2) of Theorem 2.6. Let x ∈ Y be arbitrary.Putting x = x and y = fx in condition (3.1) of Theorem 3.2, we have

λ+ F(p(fx, f2x

))≤ F (Hf (x, fx))

≤ F

(ap (x, fx) + bp (x, fx) + cp

(fx, f2x

)+dp

(x, f2x

)+ ep (fx, fx) + l

p(x,fx).p(fx,f2x)1+p(x,fx)

),

By (P4) and repeating the same process as in proof Theorem 3.2, we getthat

λ+ F(p(fx, f2x

))≤ F

((a+ b+ d) p (x, fx) + (c+ d+ l) p

(fx, f2x

)+ (e− d) p (fx, fx)

)(3.16)

Page 418: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

404 Z. MUSTAFA, S.U. KHAN, M.M.M. JARADAT, M. ARSHAD, H.M. JARADAT

by symmetry we have,

λ+ F(p(fx, f2x

))≤ F

((a+ c+ e) p (x, fx) + (b+ e+ l) p

(fx, f2x

)+ (d− e) p (fx, fx)

).(3.17)

Using the same argument as in the proof of Theorem 3.2, we deduce that

p(fx, f2x

)≤ βp (x, fx) ,

where β = 2a+b+c+d+e2−(b+c+d+e+2l) < 1, which is a consequence of (3.3). Thus, f satisfies

the orbital condition. By Theorem 2.6, there exists z ∈ E such that p (z, z) = 0and p (fz, z) = p (fz, fz) . So, by Lemma 2.8, f has the property (P) .

4. Application to integral equations

In this section, we will give an application to some integral equation to showthe usability of the main result. Consider the integral equation

(4.1) u(t) = h(u(t)) +

∫ t

0H(t, r)ζ(r, u(r)) dr, for all t ∈ [0, 1],

where, ζ : [0, 1]×R→ R, H : [0, 1]× [0, 1]→ R and h : R→ [0,∞) are functions.Let X = C([0, 1]) be the set of all real continuous functions on [0, 1], endowed

with the partial metric

p(u, v) = max supt∈[0,1]

|u(t)|, supt∈[0,1]

|v(t)|, for all u, v ∈ X.

Clearly, (X, p) is a 0-complete partial metric space.Let κ, η ∈ X, κ0, η0 ∈ R such that for all t ∈ [0, 1] we have

(4.2) κ0 ≤ κ(t) ≤ η(t) ≤ η0,

(4.3) κ(t) ≤ h(u(t)) +

∫ t

0H(t, r)ζ(r, η(r)) dr,

and

(4.4) η(t) ≥ h(u(t)) +

∫ t

0H(t, r)ζ(r, κ(r)) dr.

Let for all r ∈ [0, 1], ζ(r, ·) and h(.) are decreasing functions, that is,

(4.5) x, y ∈ R, x ≥ y implies ζ(r, x) ≤ ζ(r, y).

and

(4.6) h(x) ≤ h(y).

Page 419: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

FIXED POINT RESULTS OF F -RATIONAL CYCLIC CONTRACTIVE MAPPINGS ... 405

Assume that,

(4.7) maxt∈[0,1]

∫ 1

0H(t, s)ds < e−λ, for some λ ∈ (0,∞).

and

(4.8) supr∈[0,1]

|ζ(r, u(r))| ≤ supr∈[0,1]

|u(r)|.

Define a mapping f : X → X by

(4.9) f(u(t)) = h(u(t)) +

∫ t

0H(t, r)ζ(r, u(r))dr; t ∈ [0, 1].

Also, suppose that for all x, y ∈ R with (x ≤ η0 and y ≥ κ0) or (x ≥ κ0 andy ≤ η0) we have,

(4.10) |h(u(t))| ≤ 18e

−λ maxsupt∈[0,1] |u(t)|, supt∈[0,1] |f(u(t))|.

Theorem 4.1. Under the assumptions (4.2)-(4.10), the integral equation (4.1)has a solution z such that z ∈ C([0, 1]) with κ(t) ≤ z(t) ≤ η(t) for all t ∈ [0, 1].

Proof. Define the closed subsets of X, U1 and U2 by

U1 = u ∈ X : u ≤ η

andU2 = u ∈ X : u ≥ κ.

Also define the mapping f : U1 ∪ U2 → U1 ∪ U2 by

f(u(t)) = h(u(t)) +

∫ t

0H(t, r)ζ(r, u(r)) dr, for all t ∈ [0, 1].

Now we prove that,

(4.11) f(U1) ⊆ U2 and f(U2) ⊆ U1.

Suppose, u ∈ U1, that is,

u(r) ≤ η(r), for all r ∈ [0, 1].

Using condition (4.5) and (4.6) we obtain that

ζ(r, u(r)) ≥ ζ(r, η(r)), for all r ∈ [0, 1].

andh(u(r)) ≥ h(η(r)), for all r ∈ [0, 1].

Page 420: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

406 Z. MUSTAFA, S.U. KHAN, M.M.M. JARADAT, M. ARSHAD, H.M. JARADAT

The above inequalities with condition (4.3) imply that

f(u(t)) = h(u(t)) +

∫ t

0H(t, r)ζ(r, u(r)) dr ≥ h(η(t))

+

∫ t

0H(t, r)ζ(r, η(r)) dr = η(t) ≥ κ(t),

for all t ∈ [0, 1]. Then we have f(u(t)) ∈ U2. Similarly, let u ∈ U2, that is,

u(r) ≥ κ(r), for all r ∈ [0, 1].

Using condition (4.5) and (4.6) we obtain that

ζ(r, u(r)) ≤ ζ(r, κ(r)), for all r ∈ [0, 1].

and

h(u(r)) ≤ h(κ(r)), for all r ∈ [0, 1].

The above inequalities with condition (4.4) imply that

f(u(t)) = h(u(t)) +

∫ t

0H(t, r)ζ(r, u(r)) dr ≤ h(κ(t))

+

∫ t

0H(t, r)ζ(r, κ(r)) dr = κ(t) ≤ η(t),

for all t ∈ [0, 1]. Then we have f(u(t)) ∈ U1. Also, we deduce that (4.11) holds.

Let, x ∈ U1 and y ∈ U2. Then from (4.9), for all t ∈ [0, 1], we have

|f(x(t))| = |h(x(t)) +

∫ t

0H(t, r)ζ(r, x(r)) dr|

≤ |h(x(t))|+ |∫ t

0H(t, r)ζ(r, x(r)) dr|

≤ |h(x(t))|+∫ t

0|H(t, r)||ζ(r, x(r))| dr

≤ |h(x(t))|+∫ t

0|H(t, r)|max sup

r∈[0,1]|ζ(r, x(r))|, sup

r∈[0,1]|ζ(r, y(r))|) dr

≤ |h(x(t))|+ maxt∈[0,1]

∫ t

0H(t, r)p(x, y)dr

≤ |h(x(t))|+ 1

8e−λp(x, y)

≤ 1

8e−λp(x, fx) +

1

8e−λp(x, y)

= e−λ(1

8p(x, fx) +

1

8p(x, y)).

Page 421: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

FIXED POINT RESULTS OF F -RATIONAL CYCLIC CONTRACTIVE MAPPINGS ... 407

Thus,

(4.12) supt∈[0,1]

|f(x(t))| ≤ e−λ(1

8p(x, fx) +

1

8p(x, y)).

Similarly, we have

(4.13) supt∈[0,1]

|f(y(t))| ≤ e−λ(1

8p(y, fy) +

1

8p(x, y)).

Hence, from (4.12) and (4.13) we have

max supt∈[0,1]

|f(x(t))|, supt∈[0,1]

|f(y(t))| ≤ e−λ(1

8p(x, y) +

1

8p(x, fx) +

1

8p(y, fy))

≤ e−λ(1

8p(x, y) +

1

8p(x, fx) +

1

8p(y, fy)

+1

8p(x, fy) +

1

8p(y, fx)).

Therefore,

p(fx, fy) ≤ e−λ(1

8p(x, y) +

1

8p(x, fx) +

1

8p(y, fy) +

1

8p(x, fy) +

1

8p(y, fx))

and so,

ln(p(fx, fy)) ≤ −λ+ln(1

8p(x, y)+

1

8p(x, fx)+

1

8p(y, fy)+

1

8p(x, fy)+

1

8p(y, fx)

),

which implies that λ+F (p(fx, fy)) ≤ F (Hf (x, y)) is satisfied for F (α) = ln(α)for all α ∈ X with a = b = c = d = e = 1

8 and l = 0. Hence, all conditionsof Theorem 3.2 holds and f has a fixed point z such that z ∈ C([0, 1]) withκ ≤ z(t) ≤ η for all t ∈ [0, 1]. That is, z ∈ U1 ∩ U2 is a solution to (4.1).

Conflict of interests

The authors declare that they have no competing interests.

Authors’ contributions

All authors contributed equally and significantly in writing this paper. Allauthors read and approved the final manuscript.

Conclusion

We conclude that every F -rational cyclic contraction mapping f :∪mi=1 Vi →∪m

i=1 Vi defined on a 0-complete partial metric space (X, p) has a unique fixedpoint z ∈

∩mi=1 Vi and for any x0 ∈

∪mi=1 Vi, the sequence xn = fnx0 converges

to z in topology τ(p), where Vi is nonempty closed subset of X for each i =1, · · · ,m.

Page 422: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

408 Z. MUSTAFA, S.U. KHAN, M.M.M. JARADAT, M. ARSHAD, H.M. JARADAT

References

[1] M. Abbas, B. Ali and S. Romaguera, Fixed and periodic points of gen-eralized contractions in metric spaces, Fixed Point Theory Appl., 2013,2013:243.

[2] T. Abdeljawad, E. Karapinar, K. Tas, Existence and uniqueness of a com-mon fixed point on partial metric spaces, Appl. Math. Lett., 24 (2011),1900–1904.

[3] T. Abdeljawad, J. O. Alzabut, A. Mukheimer, Y. Zaidan, Banach contrac-tion principle for cyclical mappings on partial metric spaces, Fixed PointTheory Appl., 2012:154 (2012).

[4] O. Acar and I. Altun, A fixed point theorem for multivalued mappings withδ-distance, Abstr. Appl. Anal., Volume 2014, Article ID 497092, 5 pages.

[5] O. Acar, G. Durmaz and G. Minak, Generalized multivaluedF−contractions on complete metric spaces, Bulletin of the IranianMathematical Society, 40(2014), 1469-1478.

[6] J. Ahmad, A. Al-Rawashdeh and A. Azam, Some new fixed point theoremsfor generalized contractions in complete metric spaces, Fixed Point Theoryand Applications, 2015, 2015:80.

[7] M. Arshad, S. U. Khan, J. Ahmad, Fixed point results for F-contractionsinvolving some new rational expressions, JP Journal of Fixed Point Theoryand Appl. Volume 11, Number 1, 2016, Pages 79-97.

[8] H. Aydi, M. Abbas, C. Vetro, Partial Hausdorff metric and Nadlers fixedpoint theorem on partial metric spaces, Topology Appl., (2012) 159, 3234-3242.

[9] N. Hussain, J. Ahmad and A. Azam, On Suzuki-Wardowski type fixed pointtheorems, J. Nonlinear Sci. Appl., 8 (2015), 1095-1111.

[10] A. Hussain, M. Arshad, S. U. Khan, τ−Generalization of fixed point resultsfor F−contraction, Bangmod Int. J. Math. & Comp. Sci., Vol. 1, No. 1,2015, Pages 127-137.

[11] G. S. Jeong, B. E. Rhoades, Maps for which F (T ) =F (Tn), Fixed PointTheory Appl., 6(2005), 87–131.

[12] E. Karapinar, I. M. Erhan, Fixed point theorems for operators on partialmetric spaces, Appl. Math. Lett., 24(2011), 1894–1899.

[13] W. A. Kirk, P. S. Srinavasan, P. Veeramani, Fixed points for mappingssatisfying cylical contractive conditions, Fixed Point Theory, 4 (2003), 79–89.

Page 423: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

FIXED POINT RESULTS OF F -RATIONAL CYCLIC CONTRACTIVE MAPPINGS ... 409

[14] S.G. Matthews, Partial metric topology Proc. 8th Summer Conference onGeneral Topology and Applications, Ann. New York Acad. Sci., vol. 728,1994, pp. 183–197.

[15] H. Piri and P. Kumam, Some fixed point theorems concerning F -contractionin complete metric spaces, Fixed Point Theory Appl., 2014, 2014:210.

[16] S. Romaguera, A. Kirk type characterization of completeness for partialmetric spaces, Fixed Point Theory Appl., (2010), Article ID 493298, 6pages.

[17] N. Secelean, Iterated function systems consisting of F -contractions, FixedPoint Theory Appl. 2013, Article ID, 277 (2013). doi:10.1186/1687-1812-2013-277.

[18] M. Sgroi and C. Vetro, Multi-valued F−contractions and the solution ofcertain functional and integral equations, Filomat, 27:7 (2013), 1259-1268.

[19] D. Wardowski, Fixed point of a new type of contractive mappings in com-plete metric spaces, Fixed Point Theory Appl., 2012, Article ID 94 (2012).

Accepted: 3.11.2017

Page 424: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (410–423) 410

CLASS OF ADMISSIBLE PERTURBATIONS OF SPECIALEXPRESSIONS INVOLVING COMPLETELY MONOTONICFUNCTIONS

Jerico B. Bacani

Julius Fergy T. RabagoDepartment of Mathematics and Computer Science

College of Science

University of the Philippines Baguio

Gov. Pack Rd., Baguio City 2600

Philippines

[email protected]

[email protected]

Abstract. In this article, a class M2 of admissible perturbations of the special expres-sion M0 =

∑rk=0 ckt

αkDρkt in the weighted space L2

ω([1,∞)) will be presented. It will

be shown that the operator ω12M2ω

− 12 , where ω belongs to the family of completely

monotonic functions, is an admissible perturbation of M0 in the non-weighted spaceL2([1,∞)), and eventually preserves the essential spectrum and nullity of M0 in thatspace. Our discussion will be limited only to special expressions with α1 < ρ1.

Keywords: special expression, admissible perturbations, L2-space, weighted L2-space, essential spectrum, nullity, completely monotonic functions.

1. Introduction

In 2014, a new class of admissible perturbations in the weighted space L2ω([1,∞))of the special expression M0 was identified and studied by J. B. Bacani in [4].We recall that this differential operator is of the form

(1) M0 =r∑

k=0

cktαkDρk

t

where ck ∈ C and Dt = ddt with

i) ρk ∈ N for every k, such that

(2) 0 = ρ0 < ρ1 · · · < ρr = n

ii) αk ∈ R for every k, satisfying

(3) α0 = 0 and α1 6 ρ1,

Page 425: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CLASS OF ADMISSIBLE PERTURBATIONS OF SPECIAL EXPRESSIONS 411

and

(4) 1 > αk − αk−1

ρk − ρk−1> αk+1 − αkρk+1 − ρk

,

for k = 1, . . . , r − 1 if r > 1.

The perturbation, which the author denoted it by M1, satisfies the followingconditions:

AP1) For every i > l,

supt∈I

∣∣∣∣ ai(t)

ti−lal(t)

∣∣∣∣ exists,

where al(t) ∈ C l(I), I = [1,∞), l = 0, 1, . . . , n− 1; and

AP2) There exist auxiliary functions bl(t) such that∣∣∣∣al(t)bl(t)

∣∣∣∣ is bounded,

where 0 < bl(t) ∈ C∞([1,∞)) for all l and bl(t) = o(tγ(l+1)) and bl(t) =o(tγ(l)) as t→∞.

The perturbation was shown to be different from the one presented in [3] andthe one published in [2].

In the current work, another class of admissible perturbations of the specialexpression M0 in the weighted space, which we denote by M2, will be presented.It will be shown that the operator ω

12M2ω

− 12 , where ω belongs to the family

of completely monotonic functions, is an admissible perturbation of M0 in thenon-weighted space L2([1,∞)), and eventually preserves the essential spectrumof M0 in that space. As in [4], our discussion will be limited only to specialexpressions with α1 < ρ1. We point out that this new class of perturbation isindeed different from what has been presented in [4] by giving an example. Forother related works in the study of special expression M0, we offer the followingarticles: [5, 7, 9, 10] and [11].

In this section, we provide further discussion about special expressions, aswell as some basic definitions and notations used in this paper.

The special expression M0, its essential part, and the polygonal path itgenerates are defined as follows (cf. [10]).

Definition 1.1. A special expression M0 is a differential expression in L2([1,∞))of the form (1) where ρk and αk satisfy (2), (3), and (4). We denote σ1 < σ2 <· · · < σs−1 those indices k(k = 1, . . . , r−1) for which the strong inequality holdsin (3) and with σ0 = 0 and σs = r. The coefficients ck are arbitrary complexconstants and for k = σ1, . . . , r,

cσ ∈ C \ 0, and∑

ρδ + ρx = 2σσi 6 δ, x 6 σi+1

(−1)ρδ+σcδcx > 0

Page 426: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

412 J.B. BACANI and J.F.T. RABAGO

where σ = ρσi , . . . , ρσi+2 , i = 1, . . . , s− 1. The indices σ1, . . . , σs are called kinkindices. The essential part of M0 is given by

M0,0 =

σ1∑k=0

cktαkDρk

t .

We can give a graphical interpretation of the special expression M0 inR2 by plotting and joining by a line the points (ρk, αk) and (ρk+1, αk+1) fork = 0, 1, . . . , r. The resulting graph is called the polygonal path generated byM0. If we let mσi(i = 1, . . . , s) be the slope of the line connecting the points(ρσi−1 , ασi−1) and (ρσi−1 , ασi−1), then

1 > mσ1 > mσ2 > · · · > mσs .

Hence, the polygonal path generated by M0 lies on or below the bisectrix.Furthermore, the polygonal path generated by M0 corresponds to the graph ofthe function γ : [0, n]→ R defined by

(5) γ(k) =1

ρσi+1 − ρσi

(k − ρσi)ασi+1 + (ρσi+1 − k)ασi

for k ∈ [ρσi , ρσi+1 ], i = 0, 1, 2, . . . , s− 1.

In [11], Schultze evaluated the essential spectrum and nullity of M0 andshowed that the essential spectrum and nullity of the essential part of M0 andthe essential spectrum and nullity of M0 are indeed equal. In short, he had thefollowing results for α1 < ρ1:

Theorem 1.2. Let M0 be a special expression. Then, for α1 < ρ1,

(6) σe(M0) = σe(M0,0) =

σ1∑k=0

ckzρk : Re(z) = 0

,

and for every x ∈ C \ σe(M0),

(7) nul(M0 − x) = nul(M0,0 − x) +s−1∑i=1

#

z|σi+1∑k=σi

ckzρk = x,Re z < 0

,

where

nul(M0,0 − x) = #

z|

σ1∑k=0

ckzρk = x,Re z < 0

.

Also, in the usual L2-space, a different class of perturbations, called admissi-ble perturbations M of special expressions was determined by Mumpar-Victoria[9] in her paper, and was shown to preserve essential spectrum and nullity ofspecial expressions.

Page 427: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CLASS OF ADMISSIBLE PERTURBATIONS OF SPECIAL EXPRESSIONS 413

Definition 1.3. Let M be a differential expression of the form

(8) M =

n−1∑l=0

al(t)Dlt.

We say that M is an admissible perturbation of the special expression M0 ifthere exists a B such that the coefficients al(t) satisfy the following

(9) sup[x,x+1]⊂I

∫ x+1

x

∣∣∣∣al(t)bl(t)

∣∣∣∣2 dt < B

where bl(t) ∈ C l(I) for l = 0, 1, . . . , n− 1 and 0 < bl(t) is an auxiliary functionin C∞(I) satisfying

(10) bl(t) = o(tγ(l+1)) and bl(t) = o(tγ(l))

as t −→∞.For the invariance of nullity, we can only admit a somewhat less general

class of perturbations consisting of expressions (8) satisfying

(11) sup[x,x+1]⊂I

∫ x+1

x

∣∣∣∣∣a(j−l)j (t)

bl(t)

∣∣∣∣∣2

dt < B

for l = 0, . . . , n− 1 and j = l, . . . , n− 1.

Theorem 1.4. Let M0 be a special expression and M be an admissible pertur-bation of M0 of the form (8) satisfying (9) and (10). Then

σe(M0 + M) = σe(M0).

In addition, if M satisfies (11), then, nul(M0 +M−x) = nul(M0−x) for everyx ∈ C \ σe(M0).

2. Completely monotonic functions and the weighted L2-space

A function f belongs to the class of completely monotonic (c.m.) functions onI if it possesses derivatives f (n)(x) for n = 1, 2, . . ., and (−1)kf (k)(x) > 0 forall k = 0, 1, 2, . . . on I. The well-known Bernstein’s Theorem (see [12], p. 161)states that a necessary and sufficient condition for f to be a c.m. function on(0,∞) is that

(12) f(x) =

∫ ∞

0e−xtdχ(t),

where χ(t) is non-decreasing and the integral converges for 0 < x < ∞. Fromthis, one can easily infer that a non-identically zero c.m. function f(x) cannotvanish for any positive x. A more precise characterization of c.m. functions,also known as their Bernstein representation, is given as follows.

Page 428: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

414 J.B. BACANI and J.F.T. RABAGO

Theorem 2.1 (Bernstein). If f(x) is a c.m. function on (0,∞), then it is theLaplace transform of a unique Radon measure µ on [0,∞); that is,

(13) f(x) =

∫ ∞

0e−xtµ(dt),

for all x > 0. Conversely, if µ is a Radon measure on [0,∞) such that the aboveintegral is convergent for x > 0, then it defines a c.m. function.

The cumulative distribution function for measure µ on [0,∞) is denoted byχµ(t) = µ[0, t]. It is often written as χ(t), as in (12), for simplicity.

Completely monotonic functions appear naturally in various fields, such as inprobability theory, numerical analysis, physics and potential theory. A thoroughdiscussion of the main properties of these functions is given in Chapter IV of[12]. Readers may also want to see [8] for a good survey of some properties ofcompletely monotonic functions.

The following elementary functions are examples of c.m. functions:

e−ax,1

(β + µx)ν, and ln

(b+

c

x

),

where mina, β, µ, ν > 0 with β and µ are not both zero, b > 1, and c > 0.Other examples of elementary c.m. functions are

eax , a > 0, and

ln(1 + x)

x.

Obviously, given any two c.m. functions f and g, their linear combinationand their product are also c.m. (cf. [8]).

The results of Schultze in [11] were generalized in the weighted L2-space byAgapito (cf. [1]). The weighted space is defined as follows:

Definition 2.2. Suppose the function ω : [1,∞) −→ (0,∞) is measurable. Thespace L2ω(I) of weighted square integrable functions over I = [1,∞) is definedby

L2ω(I) :=

f : I→ C|f is measurable and

∫I|f(t)|2ω(t)dt <∞

,

with inner product given by

⟨f, g⟩ω :=

∫If(t)g(t)ω(t)dt

for any functions f, g ∈ L2ω(I). L2ω(I) is commonly known as the weightedL2-space with ω as the weight function.

Remark 2.3. It is easy to show that space L2ω(I) together with the inner prod-uct ⟨·, ·⟩ω is a Hilbert space. Furthermore, one can show that L2(I) is equivalent

to L2ω(I) under the isometry W : L2ω(I)→ L2(I) given by Wf = ω12 f.

Page 429: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CLASS OF ADMISSIBLE PERTURBATIONS OF SPECIAL EXPRESSIONS 415

In [4], Bacani considered weight functions ω : [1,∞) −→ (0,∞) that satisfythe following conditions in the study of a class of admissible perturbations:

(A1) ω ∈ C∞([1,∞)).

(A2)xkω(k)

ω= O(1) for k = 0, 1, . . . , n.

The next Lemma was also used in [4].

Lemma 2.4. If ω : [1,∞) −→ (0,∞) satisfies (A1) or (A2) then so does ωα,for any α ∈ R.

In this current work, we consider weight functions ω belonging to the classof completely monotonic functions but with the restriction that ω > 0 for allx ∈ (0,∞).

Clearly, any c.m. function ω satisfies condition (A1) and we claim that italso satisfies (A2). We formally state this result in the following Lemma.

Lemma 2.5. If ω is a c.m. function then it satisfies (A1) and (A2).

Proof. Let ω be a c.m. function. It is clear that (A1) is already satisfied.Hence, we only need to prove (A2). First, we note that the following inequalityholds:

fk(x) = xke−xkk+1 6 (k + 1)ke−k, ∀x ∈ (0,∞), k > 1.

Indeed, by taking the derivative of fk(x) with respect to x, we get

f ′k(x) = kxk−1e−xkk+1 − k

k + 1xke−

xkk+1 = kxk−1e−

xkk+1

(1− x

k + 1

).

Evidently, the above derivative is positive if x < k+ 1 and negative if x > k+ 1.Thus fk(x) is increasing on (0, k + 1) and decreasing on (k + 1,∞). Therefore,the global maximum is achieved at x = k + 1 with fk(k + 1) = (k + 1)ke−k.

Now, in view of the above inequality, we find that

yke−y 6 (k + 1)ke−ke−yk+1 , k > 1, y > 0.

From (13), we obtain

|xkω(k)(x)| = xk∫ ∞

0e−xttkµ(dt) =

∫ ∞

0e−xt(xt)kµ(dt)

6∫ ∞

0(k + 1)ke−ke−

xtk+1µ(dt)

= (k + 1)ke−k[ω

(x

k + 1

)− µ(0)

].

Page 430: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

416 J.B. BACANI and J.F.T. RABAGO

Note that limx→∞ ω(x) = µ(0). So, as x approaches infinity, we see thatlimx→∞ xkω(k)(x) = 0, for all n > 1. Moreover, dividing both sides of the aboveinequality by ω, we obtain

|xkω(k)(x)|ω(x)

6 (k + 1)ke−k

[ω(

xk+1

)− µ(0)

]ω(x)

.

Using the result stated in [6, Proposition D, p. 145], we see that the quotientω( x

k+1)/ω(x) is actually bounded. This, in turn, shows that |xkω(k)(x)|/ω(x) isalso bounded as desired. This proves the lemma.

Some of useful properties of ‘‘big O′s’’ are the following: f = O(f), O(f) ·O(g) = O(f · g), and for n > 0, O(x−n) = O(1). Using these identities and by(A2), we have

ω(k)(x)/ω(x) = x−k ·O(1) = O(x−k) ·O(1) = O(x−k) = O(1).

It can also be seen easily from the previous lemma that 0 6 limx→∞ ω(k)(x)/ω(x)6 limx→∞Cx−k = 0. Finally, by Squeeze Theorem, we get limx→∞ ω(k)(x)/ω(x) =0, or equivalently, ω(k)(x)/ω(x) = o(1) = O(1).

3. Main result

A new class of admissible perturbations of special expressions in the weightedspace has been identified and it is of the form

(14) M2 =

n−1∑l=0

al(t)Dlt

satisfying the following conditions:

(AP1) For every l = 0, 1, . . . , n− 1, al(t) is completely monotonic; and

(AP2) There exist auxiliary functions bl(t) such that

supl6i6n−1

∣∣∣∣ai(t)bl(t)

∣∣∣∣ <∞,

where 0 < bl(t) ∈ C∞([1,∞)) for all l and bl(t) = o(tγ(l+1)) and bl(t) =o(tγ(l)) as t −→∞.

Now we present the main result of our study.

Theorem 3.1. Let M0 be a special expression of the form (1) with α1 < ρ1. LetM2, which is of the form (14) that satisfies (AP1) and (AP2), be an admissible

perturbation of M0 in L2ω([1,∞)). If ω > 0 is a c.m. function, then ω12M2ω

− 12

is an admissible perturbation of M0 in L2([1,∞)). In addition, ω12M2ω

− 12 pre-

serves the essential spectrum and nullity of M0 in L2([1,∞)).

Page 431: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CLASS OF ADMISSIBLE PERTURBATIONS OF SPECIAL EXPRESSIONS 417

Proof. We follow [4] for the proof. Consider the admissible perturbation M2

of the form (14) of M0 presented above. Let I = [1,∞) and for l = 0, 1, . . . , n−1, al(t) is completely monotonic. Also, assume that ω > 0 is a c.m. function inI.

Now, note that ω12M2ω

− 12 is an operator that can be transformed, via Leib-

niz’s rule, as follows (cf. [4]):

ω12M2ω

− 12 = ω

12

n−1∑l=0

al(ω− 1

2 y)(l) =n−1∑l=0

(Rl(t)) y(l),

where

Rl(t) =n−1∑i=l

(i

l

)aiω

12 (ω− 1

2 )(i−l).

To show that ω12M2ω

− 12 is an admissible perturbation of M0 in L2(I), we

need to show that Definition 1.3 is satisfied. Equivalently, we need to presentthat there exists a B > 0 such that

sup[x,x+1]⊂I

∫ x+1

x

∣∣∣∣Rl(t)

Sl(t)

∣∣∣∣2 dt < B,

where Rl(t) ∈ C1(I) for l = 0, 1, . . . , n− 1 and 0 < Sl(t) is an auxiliary functionin C∞(I) satisfying

Sl(t) = o(tγ(l+1)) and Sl(t) = o(tγ(l))

as t −→∞.Since al(t) is c.m. for l = 0, 1, . . . , n − 1, al(t) ∈ C∞((0,∞)). In particular,

al(t) ∈ C l(I) for l = 0, 1, . . . , n− 1. Note that ω is c.m. function. So, by usingLemma 2.5, we can claim that ω ∈ C∞(I). Also, by using Lemma 2.4, one can

show that ω12 and ω− 1

2 are elements of C∞(I). It follows that ω12 , ω− 1

2 ∈ C l(I)for l = 0, 1, . . . , n− 1. Therefore, Rl(t) ∈ C l(I) for l = 0, 1, . . . , n− 1.

Now let Sl(t) = ω12 bl(t)ω

− 12 = bl(t). Since 0 < bl(t) ∈ C∞(I), so is Sl(t).

Clearly, Sl(t) = o(tγ(l+1)) and Sl(t) = o(tγ(l)) because bl(t) = o(tγ(l+1)) andbl(t) = o(tγ(l)). Thus, there exists an auxiliary function Sl(t).

We now proceed on evaluating the integral∫ x+1x

∣∣∣Rl(t)Sl(t)

∣∣∣2 dt, where 1 6 x <

∞, as follows:

∫ x+1

x

∣∣∣∣Rl(t)

Sl(t)

∣∣∣∣2 dt =

∫ x+1

x

∣∣∣∣∣∑n−1

i=l

(il

)ai(t)ω

12 (ω− 1

2 )(i−l)

bl(t)

∣∣∣∣∣2

dt

6 J2

∫ x+1

x

∣∣∣∣∣∑n−1

i=l ai(t)ω12 (ω− 1

2 )(i−l)

bl(t)

∣∣∣∣∣2

dt,

Page 432: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

418 J.B. BACANI and J.F.T. RABAGO

(where J = sup

l6i6n−1

(i

l

))

6 J2

∫ x+1

x

(n−1∑i=l

∣∣∣∣∣ai(t)bl(t)

(ω− 12 )(i−l)

ω− 12

∣∣∣∣∣)2

dt,

(by ∆ inequality)

6 J2

∫ x+1

x

(n−1∑i=l

∣∣∣∣∣ a(t)

bl(t)

(ω− 12 )(i−l)

ω− 12

∣∣∣∣∣)2

dt,(where a(t) = sup

l6i6n−1ai(t)

)

6 J2

∫ x+1

x

(O(1)

n−1∑i=l

1

)2 ∣∣∣∣ a(t)

bl(t)

∣∣∣∣2 dt,(by Lemma 2.4 and 2.5)

6 J2K2(n− l)2∫ x+1

x

∣∣∣∣ a(t)

bl(t)

∣∣∣∣2 dt, for some constant K,

6 J2K2(n− l)2∫ x+1

xM2dt, for some constant M

= J2K2(n− l)2M2.

Letting B = J2K2(n− l)2M2, we see that

∫ x+1

x

∣∣∣∣Rl(t)

Sl(t)

∣∣∣∣2 dt 6 B.

Consequently, taking the supremum of both sides over the interval [x, x+ 1] ⊂[1,∞), we have

sup[x,x+1]⊂I

∫ x+1

x

∣∣∣∣Rl(t)

Sl(t)

∣∣∣∣2 dt < B,

where B = J2K2(n− l)2M2.

For the invariance of nullity we need to show that equation (11) is satis-fed. Let J = supl6j6n−1

(ij

), a(t) = supl6j6n−1aj(t), and M be some non-

negative constant. Hence, for l = 0, . . . , n− 1 and j = l, . . . , n− 1, we have thefollowing

∣∣∣∣∣R(j−l)j (t)

bl(t)

∣∣∣∣∣2

=

∣∣∣∣∣∣ 1

bl(t)

n−1∑i=j

(i

j

)(a(j−l)i ω

12 (ω− 1

2 )(i−j) + ai(ω12 )(j−l)(ω− 1

2 )(i−j)

Page 433: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CLASS OF ADMISSIBLE PERTURBATIONS OF SPECIAL EXPRESSIONS 419

+ aiω12 (ω− 1

2 )(i−l))∣∣∣2

6 J2

∣∣∣∣∣∣ a(t)

bl(t)

n−1∑i=j

12 (ω− 1

2 )(i−j) + (ω12 )(j−l)(ω− 1

2 )(i−j)

+ ω12 (ω− 1

2 )(i−l))∣∣∣2

6 9J2

∣∣∣∣∣∣ a(t)

bl(t)

n−1∑i=j

ω12 (ω− 1

2 )(i−j)

∣∣∣∣∣∣2

6 9J2

∣∣∣∣ a(t)

bl(t)

∣∣∣∣2n−1∑i=j

∣∣∣∣∣(ω− 12 )(i−j)

ω− 12

∣∣∣∣∣2

= 9J2

∣∣∣∣ a(t)

bl(t)

∣∣∣∣2O(1)

n−1∑i=j

1

2

= 9J2K2(n− l)2∣∣∣∣ a(t)

bl(t)

∣∣∣∣26 9J2K2(n− l)2M2.

Hence,

(15)

∣∣∣∣∣R(j−l)j (t)

bl(t)

∣∣∣∣∣2

6 9J2K2(n− l)2M2.

Let C = 9J2K2(n− l)2M2. Integrating equation (15) over the interval [x, x+ 1]and using (AP2) we obtain∫ x+1

x

∣∣∣∣∣R(j−l)j (t)

bl(t)

∣∣∣∣∣ dt 6∫ x+1

xCdt = C.

Now, taking the supremum of both sides over the interval [x, x + 1] ⊂ [1,∞),we have

sup[x,x+1]⊂I

∫ x+1

x

∣∣∣∣∣R(j−l)j (t)

bl(t)

∣∣∣∣∣ dt 6 C.

Thus, we have shown that

ω12M2ω

− 12 =

n−1∑l=0

(Rl(t)) y(l),

which is obviously of the form (1.3), is an admissible perturbation of M0 in

L2([1,∞)). Moreover, as what we have shown previously, ω12M2ω

− 12 satisfies

Page 434: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

420 J.B. BACANI and J.F.T. RABAGO

(9) and (10). In addition, it also satisfies equation (11). We now conclude that,using Theorem (1.4), the essential spectrum and the nullity of M0 are preservedunder this kind of admissible perturbation in L2-space, In short, we have proventhe following claim:

σe(M0 + ω12M2ω

− 12 ) = σe(M0)

andnul(M0 + M2 − x) = nul(M0 − x)

for every x ∈ C \ σe(M0).

In the next section we provide an example of the admissible perturbationpresented above. We point out that our example does not satisfy condition(AP1) of [4]. This means that the class of admissible perturbation being studiedin the present paper is indeed different from the one presented in [4].

4. Example

Consider the following special expression

(16) M0y = y +1

2t12 y′ + t

34 y′′

and the weight function ω(t) =(

1 + x−12

)2which is a c.m. function.

We will show that the differential expression M2 defined by

M2y = e−2ty + ln(1 + t−1)y′,

is an admissible perturbation of M0 in L2ω(I), i.e., it should satisfy (AP1) and(AP2). We first show that a0(t) = e−2t and a1(t) = ln(1 + t−1) are c.m. func-tions. Note that

a(k)0 (t) = (−1)k2ke−2t, ∀k = 0, 1, 2, . . .

and

a(k)1 (t) = (−1)k

(k − 1)!

tk(t+ 1)k

k−1∑j=0

(n

j

)tj , ∀k = 1, 2, . . . .

It follows that

0 6 (−1)ka(k)0 (t) = 2ke−2t < ∞, ∀k > 0, t ∈ I,

and 0 6 a1(t) = ln(1 + t−1) <∞, and for k > 1, we have

0 6 (−1)ka(k)1 (t) =

(k − 1)!

tk(t+ 1)k

k−1∑j=0

(n

j

)tj < ∞, ∀t ∈ I.

Page 435: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CLASS OF ADMISSIBLE PERTURBATIONS OF SPECIAL EXPRESSIONS 421

Thus, a0(t) and a1(t) are c.m. functions and condition (AP1) is satisfied.Now, bl(t) must be of the following forms (for l = 0, 1):

b0(y) = o(tγ(1)) = o(t12 ) and b0(t) = o(tγ(0)) = o(1),(17)

b1(y) = o(tγ(2)) = o(t34 ) and b1(t) = o(tγ(1)) = o(t

12 ),(18)

and, in addition,∣∣∣∣supe−2t, ln(1 + t−1)bl(t)

∣∣∣∣ =

∣∣∣∣ ln(1 + t−1)

bl(t)

∣∣∣∣ = 1 <∞, ∀l = 0, 1.

Let b0(t) = b1(t) = t−1. Clearly, (17) and (18) are satisfied. Also, we have, byL’Hopital’s rule, that

limt→∞

ln(1 + t−1)

t−1= lim

t→∞

1−t−2(1+t−1)

−t−2= lim

t→∞

1

1 + t−1= 1 <∞.

Hence, condition (AP2) is satisfied. So, we have shown that M2y is an admis-sible perturbation of M0y in L2ω(I).

Now we proceed on showing that ω12M2ω

− 12 y is an admissible perturbation

of M0y in L2(I). Considering M2y = e−2ty+ln(1+t−1)y′, we have the following:

ω12M2ω

− 12 y =

n−1∑l=0

(1∑i=l

(i

l

)ai(t)ω

12 (ω− 1

2 )(i−l)

)y(l).

Let Rl(t) =∑1

i=l

(il

)ai(t)ω

12 (ω− 1

2 )(i−l), where l = 0, 1. So,

R0(t) =1∑i=0

(i

0

)ai(t)ω

12 (ω− 1

2 )(i) = e−2t +ln(1 + t−1)

2t+ 2t32

;

R1(t) =

1∑i=1

(i

1

)ai(t)ω

12 (ω− 1

2 )(i−1) = ln(1 + t−1).

It can be verified that R0(t) and R1(t) are c.m. functions. Hence, Rl(t) satisfies(AP1) for l = 0, 1. We can let Sl(t) = bl(t) = t−1 for l = 0, 1 so that

S0(y) = o(t12 ) and S0(t) = o(1), and S1(y) = o(t

34 ) and S1(t) = o(t

12 ),

and∣∣∣∣∣∣∣∣sup

e−2t + ln(1+t−1)

2t+2t32, ln(1 + t−1)

Sl(t)

∣∣∣∣∣∣∣∣ =

∣∣∣∣ ln(1 + t−1)

t−1

∣∣∣∣ = 1 <∞, ∀l = 0, 1.

We conclude that ω12M2ω

− 12 is an admissible perturbation of M0 in L2(I).

In addition, ω12M2ω

− 12 preserves the essential spectrum and nullity of M0 in

L2([1,∞)).

Page 436: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

422 J.B. BACANI and J.F.T. RABAGO

Remark 4.1. We point out that the functions a0(t) = e−2t and a1(t) = ln(1 +t−1) do not satisfy (AP1), since the statement∣∣∣∣ a1(t)

t1−0a0(t)

∣∣∣∣ =

∣∣∣∣ ln(1 + t−1)

te−2t

∣∣∣∣ −→∞ as t −→∞

implies that the supremum

supt∈I

∣∣∣∣ a1(t)

t1−0a0(t)

∣∣∣∣ = supt∈I

∣∣∣∣ ln(1 + t−1)

te−2t

∣∣∣∣does not exist.

Acknowledgment

This work was funded by the UP System Enhanced Creative Work and ResearchGrant (ECWRG-2015-1-006). The first author would like to thank UP Baguiofor the research load credit given in writing the manuscript. Both authors wouldlike to thank the referees for their valuable comments.

References

[1] J.C. Agapito, On relatively compact perturbations of special expressionsin L2ω(I), Ph. D. Thesis, Department of Mathematics, University of thePhilippines, 1993.

[2] J.C. Agapito, J.B. Bacani and M.P. Roque, On invariance of nullities ofspecial expressions under admissible perturbations in weighted space, Ma-timyas Matematika, 29 (2006), 1–8.

[3] J.B. Bacani, On admissible perturbations of special expressions in weightedL2-space, Master’s Thesis, Department of Mathematics and Computer Sci-ence, University of the Philippines, 2004.

[4] J.B. Bacani, Another class of admissible perturbations of special expres-sions, Int. J. Math. Anal., 8 (1) (2014), 1–8.

[5] E. Balslev and T.W. Gamelin, The essential spectrum of a class of ordinarydifferential operators, Pacific J. Math., 14(3) (1964), 755–776.

[6] C. O’Cinneide, A property of completely monotonic functions, J. Austral.Math. Soc. (Series A), 42 (1987), 143–146.

[7] J.A. Collera, Admissible perturbations of differential expressions with expo-nentially decaying coefficients preserving the nullities, Int. J. Math. Anal.,7 (57) (2013), 2803–2810.

[8] K.S. Miller and S.G. Samko, Completely monotonic functions, IntegralTransform. Spec. Funct., 12 (4) (2001), 389–402.

Page 437: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CLASS OF ADMISSIBLE PERTURBATIONS OF SPECIAL EXPRESSIONS 423

[9] M.R. Mumpar-Victoria, Perturbations of a class of ordinary differentialexpressions preserving the essential spectrum and the nullities, Science Dil-iman, 11(1) (1999), 25–33.

[10] M.P. Roque, Spectral properties of differential expressions with exponen-tially and logarithmically growing coefficients, in Functional Analysis andGlobal Analysis: Proceedings of the Conference Held in Manila, Philip-pines, October 20-26, 1996, Springer-Verlag Singapore, 1997.

[11] B. Schultze, Spectral properties of not necessarily self-adjoint linear opera-tors, Advances in Mathematics, 83 (1990), 75–95.

[12] D.V. Widder, The Laplace Transforms, Princeton University Press, 1941.

Accepted: 2.12.2017

Page 438: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (424–433) 424

THE TOPOLOGICAL INDICES OF THE CAYLEY GRAPHSOF DIHEDRAL GROUP D2n AND THE GENERALIZEDQUATERNION GROUP Q2n

S. Shokrolahi Yancheshmeh∗

Department of MathematicsAhvaz BranchIslamic Azad [email protected]

R. ModabberniaDepartment of MathematicsShoushtar BranchIslamic Azad UniversityShoushtarIran

M. JahandidehDepartemt of Mathematics

Mahshahr Branch

Islamic Azad University

Mahshahr

Iran

Abstract. A topological index of a simple connected graph Γ is a numeric quantityrelated to the structure of the graph Γ. The set of all automorphisms of Γ under thecomposition of mapping forms a group which is denoted by Aut(Γ). Let G be a group,and let S ⊂ G be a set of group elements such that the identity element 1 /∈ S. TheCayley graph associated with (G,S) is defined as the directed graph with vertex set Gand edge set E such that e = xy is an edge of E if (x−1y) ∈ S for every vertices x, y inG. In this paper we define the Cayley graph of the Dihedral group D2n and the Cayleygraph of the generalized quaternion group Q2n on the specified subsets of these groups,and compute the Wiener, Szeged and PI indices of these graphs.

Keywords: Cayley graph, Dihedral group, generalized Quaternion group, topologicalindex.

1. Introduction

Let G be a group with identity element 1 and let S be a nonempty subset of Gsuch that, 1 /∈ S. The Cayley graph of G relative to S is denoted by Γ = Γ(G,S)and it is a directed graph with vertex set G and edge set E consisting of the

∗. Corresponding author

Page 439: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THE TOPOLOGICAL INDICES OF THE CAYLEY GRAPHS OF DIHEDRAL GROUPD2n... 425

ordered pairs (x,y) such that (x−1y) ∈ S. It is obvious that the Cayley graphΓ(G,S) of a group G is undirected iff S = S−1, i.e, (x, y) ∈ E iff (y, x) ∈ E inthis case Γ(G,S) is called the Cayley graph of G relative to S. The Cayley graphΓ(G,S) is connected iff the set S is a generating set of the group G. The Cayleygraph has been studied in [10, 11]. Let Γ (V,E) be a graph with vertex set Vand edge set E, An automorphism θ of Γ is a bijective function on V whichpreserves the edges of Γ, i.e, e=uv is an edge of Γ iff eθ = uθvθ is an edge of Γtoo. The set of all automorphisms of Γ forms a group Aut(Γ) under combinationof functions. Aut(Γ) acts transitively on V if for two arbitrary vertices u and vthere is an automorphisms θ ∈ Aut(Γ) such that uθ = v, then in this case Γ issaid to be a vertex-transitive graph. In graph theory it has been shown that theCayley graph (directed or undirected) of a group is always vertex-transitive.

The topological index of Γ is a numerical quantity which is constant underany arbitrary automorphism of Γ. The Wiener index is the oldest topologicalindex of the simple connected graph, it first was introduced by a chemist namedH.Wiener for molecular graphs while he was studying properties of chemicalcompounds [2, 3, 5, 9]. The Wiener index of a connected graph Γ is denoted byW (Γ) and it is defined by:

W (Γ) =∑

u,v⊆V

d(u, v) =1

2

∑u∈V

d(u).

Where d(u,v) is the distance between two vertices u and v, and d(u) is thedistances between u with other vertices of Γ.

The Szeged index [4, 8] is another invariant of a graph Γ which is relatedto the distribution of the vertices of the graph and denoted by Sz(Γ) and it isdefined as follows:

Let e = uv be an edge of the graph Γ, the sets Nu(e|Γ) and Nv(e|Γ) aredefined as: Nu(e|Γ) = x ∈ V |d(x, u) < d(x, v), Nv(e|Γ) = x ∈ V |d(x, v) <d(x, u). Then Nu(e|Γ) is the set of all vertices of Γ which are closer to u thanv, Nv(e|Γ) is defined similarly. The cardinalities of Nu(e|Γ) and Nv(eΓ) aredenoted by nv(e|Γ) and nv(e|Γ) respectively.

Now, the Szeged index of Γ which is denoted by Sz(Γ) is defined as:

Sz(Γ) =∑

e=uv∈Enu(e|Γ).nv(e|Γ).

The Szeged index is closely related to the Wiener index such that in the casethat the graph Γ is a tree, they are the same. Thus the Szeged index concernedwith the distribution of the vertices of the graph, there is a topological indexnamed Padmakar-Ivan index [6, 7] which is related to the distribution of theedges of the graph. The Padmakar-Ivan index of graph Γ is denoted by PI(Γ)and is defined as follows:

PI(Γ) =∑

e=uv∈E(neu(e|Γ) + nev(e|Γ)).

Page 440: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

426 S. SHOKROLAHI YANCHESHMEH

Where neu(e|Γ) (resp. nev(e|Γ)) is the number of edges of the subgraph of Γwhich has the vertax set Nu(e|Γ)(resp. Nv(e|Γ)).

The Dihedral group D2n is the symmetry group of an n-sided regular polyg-onal which it has the following presentation D2n =< a, b |a2 = bn = I, (ab)2 =I > . Considering subset S1 = a, ab, bn−1, b of D2n, we can define the Cayleygraph Cay(D2n, S1) in the cases that n is odd or even.

The generalized Quaternion Q2n is the non-abelian group of order 2n andit has the following presentation Q2n =< a, b|a2n−1

= 1, a2n−2

= b2, b−1ab =a−1 > . For some integer n ≥ 3. The ordinary Quaternion group corresponds tothe case n=3. Now, we regard the subset S2 = a, a2n−1−1, b, a2

n−2 of Q2n anddefine the Cayley graph Cay(Q2n , S2)

It is obvious that S1 = S−11 and S2 = S−12 also S1 and S2 are generatingsets of groups (D2n, (Q2n respectively, so the Cayley graphs Cay(D2n, S1) andCay(Q2n , S2) both are undirected connected graphs. Here we try to computethe Wiener and Szeged indices of the Cayley graph Cay(D2n, S1).

Figure 1: The Cay(D2n, S1)

2. Computation of Wiener, Szeged and PI indices of Cay(D2n, S1)

In this paper the following lemma [1] are frequently used.

Lemma 1. Let G = (V,E) be a simple connected graph with vertex set Vand edge set E. suppose Aut(G) has orbits ∆i = ∆i(ui), 1 ≤ i ≤ k, on V ,where ui is orbit representative. Then W (G) = 1

2

∑ki=1 |∆i|d(ui). Where d(ui) =∑

x∈V d(ui, x). As a result of this lemma, when Aut(G) acts transitively on V,i.e, G is a vertex transitive graph, then W (G) = 1

2 |V |d(u), for some u ∈ V .

Lemma 2. Let G=(V,E) be a simple connected graph with vertex set V and edgeset E. If Aut(G) on E has orbits E1, E2, ..., Er with representatives e1, e2, ..., er,

Page 441: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THE TOPOLOGICAL INDICES OF THE CAYLEY GRAPHS OF DIHEDRAL GROUPD2n... 427

where ei = uivi ∈ E then:

Sz(G) =

r∑i=1

|Ei|(nui(ei|G).nvi(ei|G)), P I(G) =

r∑i=1

|Ei|(neiui(ei|G)+neivi(ei|G)).

Proposition 1. The Wiener index of the graph Γ = Cay(D2n, S1) is W (Γ) =n2(n+1)

2

Proof. Because Γ is a vertex transitive graph by the lemma 1. the Wienerindex of Γ is:

(1) W (G) =1

2|D2n|d(x).

Where x is an arbitrary vertex of Γ. We have D2n = 1, b, b2, ..., bn−1, a, ab, ab2,..., abn−1. Suppose that n is even, without less of generality we may choosex = 1 and calculate d(1) as follows:

(2) d(1) =∑u∈V

d(1, u) =

n−1∑i=1

d(1, bi) +

n∑i=1

d(1, abi).

Because the vertices 1, b, b2, ..., bn−1 form a cycle so, we have d(1, bi) = i, 1 ≤i ≤ n

2 , d(1, bi) = n− i, n2 + 1 ≤ i ≤ n− 1. Therefore:

n−1∑i=1

d(1, bi) =

n2∑i=1

d(1, bi) +

n−1∑i=n

2+1

d(1, bi) =

n2∑i=1

i+

n−1∑i=n

2+1

n− i(3)

=1

2(n

2)(n

2+ 1) +

1

2(n

2)(n

2− 1) =

n2

4.

Also the vertices a, ab, ab2, ..., abn−1 form a cycle we have: d(1, abi) = i, 1 ≤ i ≤n2 , d(1, abi) = n− i+ 1, n2 + 1 ≤ i ≤ n. Therefore:

n∑i=1

d(1, abi) =

n2∑i=1

d(1, abi) +

n∑i=n

2+1

d(1, abi) =

n2∑i=1

i

+n∑

i=n2+1

n− i+ 1 =1

2(n

2)(n

2+ 1) +

1

2(n

2)(n

2+ 1) = (

n

2)(n

2+ 1).(4)

Considering (3), (4) and replacing in (2), d(1) = n2 (n+ 1). Now, suppose that n

is odd, d(1, bi) = i, 1 ≤ i ≤ n−12 , d(1, bi) = n− i, n+1

2 + 1 ≤ i ≤ n−1. Therefore:

n−1∑i=1

d(1, bi) =

n−12∑i=1

d(1, bi) +

n−1∑i=n+1

2

d(1, bi) =

n−12∑i=1

i+

n−1∑i=n+1

2

n− i

=1

2(n− 1

2)(n+ 1

2) +

1

2(n− 1

2)(n+ 1

2) =

(n− 1)(n+ 1)

4(5)

Page 442: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

428 S. SHOKROLAHI YANCHESHMEH

Also, d(1, abi) = i, 1 ≤ i ≤ n−12 , d(1, abi) = n−i+1, n+1

2 +1 ≤ i ≤ n. Therefore:

n∑i=1

d(1, abi) =

n−12∑i=1

d(1, abi) +

n∑i=n+1

2

d(1, abi) =

n−12∑i=1

i+

n∑i=n+1

2

n− i+ 1

=1

2(n− 1

2)(n+ 1

2) +

1

2(n+ 1

2)(n+ 3

2)(6)

=n+ 1

4(n− 1

2)(n+ 3

2) =

n+ 1

4(n+ 1).

Considering (5),(6) and replacing in (2) we have:

(7) d(1) =n

2(n+ 1).

We see that in two cases n is even or odd the same result is obtained, so replacing(7) in (1) the proof is completed.

Proposition 2. The Szeged index of the graph Γ = Cay(D2n, S1) is:

Sz(Γ) =

n(52n

2 − 4n+ 2), n is even

n(52n2 − 3n+ 5

2), n is odd.

Proof. Let E be the edge set of the graph Γ. If we consider the action of Aut(Γ)on the E, it is obvious that it has two orbits, the first is the set of edges which arethe sides of the upper and lower polygons and the second is the edges that arelocated between these polygons, which are denoted by E1 and E2 respectively.Aut(Γ) acts transitively on each orbit and the set E breaks into E1 and E2

whose union is E. By the lemma 2, we have:

Sz(G) =2∑i=1

|Ei|(nui(ei|Γ).nvi(ei|Γ))

Where ei = uivi is an arbitrary edge in Ei. We choose edge e1 = u1v1 ∈ E1 asa representative of E1, and suppose that n is even, (n2 − 1) vertices on upperpolygon and (n2 ) vertices on lower polygon form the set of vertices which arecloser to u1 than v1. (Nu1(e1|Γ)). So is the set (Nv1(e1|Γ)). Also if the edgee2 = u1v2 ∈ E2 is a representative 0f E2 then (n2 ) vertices on upper polygonand (n2 ) vertices on lower polygon form the set of vertices which are closer to u1than v2, (Nu1(e2|Γ)). So is the set (Nv2(e2|Γ)). Therefore we have:

|Nu1(e1|Γ| = |Nv1(e1|Γ)| = n− 1, |Nu1(e2|Γ| = |Nv2(e2|Γ)| = n

2.

Page 443: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THE TOPOLOGICAL INDICES OF THE CAYLEY GRAPHS OF DIHEDRAL GROUPD2n... 429

It is clear that ρ(u) = 4 for every vertex, therefore |E| = 4n, and in two cases nis even or odd, |E1| = |E2| = 2n, so, we have:

Sz(G) =

2∑i=1

|Ei|(nui(ei|Γ).nvi(ei|Γ))

= |E1|((nu1(e1|Γ).nv1(e1|Γ)) + |E2|(nu1(e2|Γ).nv2(e2|Γ))

= 2n(n− 1)(n− 1) + 2n(n

2)(n

2) = 2n(n− 1)2 +

n2

2= n(

5

2n2 − 4n+ 2).

Now, when n is odd and e1 = u1v1 and e2 = u1v2 are representative of E1

and E2, respectively considering, (n2 − 1) vertices on upper polygon and (n2 − 1)vertices on lower polygon form the set Nu1(e1|Γ). So is the set Nv1(e1|Γ). Also(n+1

2 ) vertices on upper polygon and (n+12 ) vertices on lower polygon form the

set Nu1(e2|Γ). So is the set Nv2(e2|Γ). Therefore we have:

|Nu1(e1|Γ| = |Nv1(e1|Γ)| = n− 1, |Nu1(e2|Γ| = |Nv2(e2|Γ)| = n+ 1

2.

The Szeged index in this case is obtained as follows:

Sz(Γ) =

2∑i=1

|Ei|(nui(ei|Γ).nvi(ei|Γ))

= |E1|((nu1(e1|Γ).nv1(e1|Γ)) + |E2|(nu1(e2|Γ).nv2(e2|Γ))

= 2n(n− 1)(n− 1) + 2n(n+ 1

2)(n+ 1

2)

= 2n(n− 1)2 + 2n(n+ 1

2)2 = n(

5

2n2 − 3n+

5

2).

Proposition 3. The PI index of the graph Γ = Cay(D2n, S1) is:

PI(Γ) =

2n(5n− 12), n is even

2n(5n− 11), n is odd.

Proof. Similar to the proof of previous proposition, the action of Aut(Γ) on theE has two orbits E1, E2 and by the lemma 2, the PI index of Γ can be obtainedby the formula as follows:

(8) PI(Γ) =

2∑i=1

|Ei|(neiui(ei|Γ) + neivi(ei|Γ)).

Where ei = uivi is an arbitrary edge in Ei. When n is even by considering,nu1(e1|Γ), nv1(e1|Γ), nu1(e2|Γ), nv2(e2|Γ) in the proof of proposition 2.2 wehave:

(ne1u1(e1|Γ) + ne1v1(e1|Γ)) = (2n− 5), (ne2u1(e2|Γ) + ne2v2(e2|Γ)) =n

2− 1.

Page 444: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

430 S. SHOKROLAHI YANCHESHMEH

So, by (8) PI(Γ) = 2n(2(2n − 5)) + 2n(2(n2 − 1)) = 2n(5n − 12). Similarly inthe case that n is odd we have:

(ne1u1(e1|G) + ne1v1(e1|Γ)) = (2n− 5), (ne2u1(e2|G) + ne2v2(e2|Γ)) =n− 1

2.

Therefore PI(Γ) = 2n(2(2n− 5)) + 2n(2(n−12 )) = 2n(5n− 11).

Figure 2: The Cay (Q2n , S2)

3. Computation of Wiener, Szeged and PI indices of Cay(Q2n , S2)

Proposition 4. The Wiener index of the graph H = Cay(Q2n , S2) is W (H) =2n−1(2n(2n−4 + 1)− 2).

Proof. As what was said in introduction, the Cayley graph is a vertex-transitivegraph so by the lemma1 we have:

(9) W (H) =1

2|Q2n |d(x).

Where x is an arbitrary vertex of H. We have Q2n = 1, a, a2, ..., a2n−1−1, b, ab,a2b, ..., a2

n−1−1b. Now let x = 1 and calculate d(1), by Fig. 2 we have:

(10) d(1) =∑u∈V

d(1, u) =

2n−1−1∑i=1

d(1, ai) +

2n−1∑i=1

d(1, aib).

Because the vertices 1, a, a2, ..., a2n−1−1 form a cycle we have d(1, ai)=d(1, a2

n−1−i),1 ≤ i ≤ 2n−1,

(11)

2n−1−1∑i=1

d(1, ai) = 2(

2n−2−1∑i=1

d(1, ai)) + d(1, a2n−2

),

Page 445: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THE TOPOLOGICAL INDICES OF THE CAYLEY GRAPHS OF DIHEDRAL GROUPD2n... 431

d(1, ai) = i, 1 ≤ i ≤ 2n−3 + 1,

d(1, ai) = 2n−2 − i+ 2, 2n−3 + 2 ≤ i ≤ 2n−2,

d(1, a2n−2

) = 2.

So:

2n−2−1∑i=1

d(1, ai) =2n−3+1∑i=1

d(1, ai) +2n−2−1∑i=2n−3+2

d(1, ai)

2n−3+1∑i=1

i+2n−2−1∑i=2n−3+2

2n−2 − i+ 2(12)

=(2n−3 + 1)(2n−3 + 2)

2+

(2n−3)(2n−3 + 1)

2− 3

= (2n−3 + 1)(2n−3 + 1)− 3 = (2n−3 + 1)2 − 3.

Considering (11),(12) we have:

(13)

2n−1−1∑i=1

d(1, ai) = 2((2n−3 + 1)2 − 3) + 2 = 2(2n−3 + 1)2 − 4.

Also, the vertices b, ab, a2b, ..., a2n−1−1b form a cycle so we have d(1, aib) =

d(1, a2n−2+ib), 1 ≤ i ≤ 2n−2,

(14)2n−1∑i=1

d(1, aib) = 2(2n−2−2∑i=1

d(1, aib)).

d(1, aib) = i+ 1, 1 ≤ i ≤ 2n−3,

d(1, aib) = 2n−2 − i+ 1, 2n−3 + 1 ≤ i ≤ 2n−2,

2n−2∑i=1

d(1, aib) =

2n−3∑i=1

d(1, aib) +

2n−2∑i=2n−3+1

d(1, aib),

=

2n−3∑i=1

(i+ 1) +

2n−2∑i=2n−3+1

(2n−2 − i+ 1) =

2n−3∑i=1

(i+ 1) +

2n−2∑i=2n−3+1

i

=(2n−3 + 1)(2n−3 + 2)

2− 1 +

(2n−3)(2n−3 + 1)

2= (2n−3 + 1)(2n−4 + 1)− 1 + (2n−4)(2n−3 + 1)(15)

= (2n−3 + 1)(2n−4 + 1 + 2n−4)− 1

= (2n−3 + 1)(2n−3 + 1)− 1 = (2n−3 + 1)2 − 1 = (2n−2)(2n−4 + 1).

Page 446: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

432 S. SHOKROLAHI YANCHESHMEH

Now replacing (15) in (14) we have:

(16)2n−1∑i=1

d(1, aib) = (2n−1)(2n−4 + 1).

Therefore considering (16) and (13) and replacing in (10) we see:

d(1) = 2(2n−3 + 1)2)− 4 + (2n−1)(2n−4 + 1)

= (2n−1)(2n−4 + 1)− 2 + (2n−1)(2n−4 + 1)(17)

= (2n−1)(2n−3 + 1)− 2 = (2n)(2n−4 + 1)− 2.

So by replacing (17) in (9) the proof is done.

Proposition 5. The Szeged index of the graph H = Cay(Q2n , S2) is:

Sz(H) = 23n−1.

Proof. We denote the vertex set and the edge set of H by V, E respectively.Note that there is no vertex in V which it’s distances from the nodes of theedge e ∈ E be the same, for any arbitrary edge e = uv of E. So we have|Nu(e|H)|+ |Nv(e|H)| = |V |. Also, because the shape of the graph is symmetric,Fig. 2, so the number of vertices which are closer to u than v are the same tothe vertices which are closer to v than u, for any edge e = uv ∈ E, therefore:

|Nu(e|H)| = |Nv(e|H)| = 1

2|V | = 1

2|Q2n | = 2n−1.

By the Fig. 2, it is clear that:

(18) |E| = 2n−1 + 2n−1 + 4.(2n−2) = 2n+1.

So Sz(H) =∑

e=uv∈E(nu(e|H).nv(e|H)) = (2n−1)(2n−1)|E| = 23n−1.

Proposition 6. The PI index of the graph H = Cay(Q2n , S2) is:

PI(Γ) =

2n(7.2n−2 − 9), n > 3

96, n = 3.

Proof. We have PI(H) =∑

e=uv∈E(neu(e|H)+nev(e|H)). In the case n=3, wesee for any edge e = uv of E, neu(e|H) = nev(e|H) = 3, so by (18) and theformula of PI index it is done. According to the Fig. 2, it is clear that theaction of Aut(H) on the edge set E of H has two orbits E1,E2. First, the set ofthe edges which are the sides of the upper and lower polygons, second the restof the edges. we let the edges e1 = u1v1 and e2 = u1v2 as representative of E1

and E2, respectively. By Fig. 2 we have:

ne1u1(e1|H) = ne1v1(e1|H)

= 2n−3 − 1 + 2n−3 − 1 + 2n−1+2n−3−2+(2n−3 − 1).4 + 2=2n − 6.

Page 447: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THE TOPOLOGICAL INDICES OF THE CAYLEY GRAPHS OF DIHEDRAL GROUPD2n... 433

And ne2u1(e2|H) = ne2v2(e2|H) = 2n−2 + 2n−2− 2 + 2n−2− 1 = 3(2n−2)− 3. So,By lemma.2,

PI(H) =2∑i=1

|Ei|(neiui(ei|H + neivi(ei|H))

= |E1|(ne1u1(e1|H) + ne1v1(e1|H)) + |E2|(ne2u1(e2|H) + ne2v2(e2|H))

2n(2n − 6) + 2n(3.2n−2 − 3) = 2n(7.2n−2 − 9).

References

[1] M. R. Darafsheh, Computation of topological indices of some graphs, ActaAppl. Math., 110 (2010), 1225-1235.

[2] R. C. Entringer, Distance in graphs: Trees, J. Combin. Math. Combin.Comput., 24 (1997), 65-84.

[3] I. Gutman, S. Klavzar, B. Mohr (Eds.), Fifty years of the Wiener index,Match. Commun. Math. Comput. Chem., 35 (1997), 1-259.

[4] I. Gutman, A formula for the Wiener number of trees and its extension tocyclic Graphs., Graph theory Notes NY, 27 (1994), 9-15.

[5] H. Hosoya, Topological Index. A Newly Proposed Quantity Characterizingthe Topological Nature of Structural Isomers of Saturated Hydrocarbons,Bull. Chem. Soc. Japan, 44 (1971), 2332-2339.

[6] P. V. Khadikar, Distribution of some sequences of points on elliptic curves,On a Novel structural descriptor PI, Nat. Acad. Sci. Lett., 23 (2000), 113-118.

[7] P. V. Khadikar. S. Karmakar, V. k. Agrawal, Relationship and relativecorrection potential of the Wiener, Szeged and PI Indices, Nat. Acad. Sci.Lett., 23 (2000), 165-170.

[8] S. Klavzar, A. Rajapakse, I. Gutman, The Szeged and the Wiener index ofgraphs, Applied Mathematics Letter, 9 (1996), 45-49.

[9] H. Wiener, Structural Determination of Paraffin Boiling Points, J. Am.Chem. Soc., 69 (1947), 17-20.

[10] N. Biggs, Algebraic graph theory, Second Edition, Cambridge MathematicalLibrary, Cambridge University Press, 1993.

[11] C. Godsil, Royle,G. Algebraic graph theory, Graduate Texts in Mathemat-ics, Vol 207, Springer, 2001.

Accepted: 9.12.2017

Page 448: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (434–437) 434

GOING BEYOND THE STANDARD MODEL

B.G. SidharthInternational Institute for Applicable Mathematics and Information Sciences

Hyderabad (India)

and

Udine (Italy)

B.M. Birla Science Centre

Adarsh Nagar

Hyderabad - 500 063 (India)

[email protected]

Abstract. In this communication we argue that we can account for the shortcomingsof the Standard Model by including noncommutative geometry leading to a non-zero(electron) neutrino mass.

Keywords: particle physics, standard model, Dirac matrices.

It is well known that the standard model of particle physics is as of now themost complete theory and yet there are frantic efforts to go beyond the standardmodel to overcome its shortcomings. Some of these are:

1. It fails to deliver the mass to the neutrino which thus remains a masslessparticle in this theory.

2. This apart it does not include gravity, which is otherwise one of the fourfundamental interactions.

3. There is the hierarchy problem viz., the wide range of masses for theelementary particles or even for the quarks.

4. It appears that other as yet undiscovered particles exist which couldchange the picture, for example in supersymmetry in which the particles havetheir supersymmetric counterparts.

5. The standard model has no place for dark matter, which on the otherhand has not yet been definitely found. Nor is there place for dark energy.

6. Finally one has to explain the 18 odd arbitrary constants which creepinto the theory.

There are however obvious shortcomings which can be addressed in a rela-tively simple manner which could enable us to go beyond the standard model.

Page 449: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

GOING BEYOND THE STANDARD MODEL 435

Let us start with the standard model Lagrangian

LGWS =∑f

(Ψf (ıγµ∂µ −mf )Ψf − eQfΨfγµΨfAµ)+

+g√2

∑ı

(aıLγµbıLW

+µ + bıLγ

µaıLW−µ )+

+g

2Cw

∑f

Ψfγµ(I3f − 2S2

wQf − I3fγ5)ΨfZµ+

− 1

4|∂µAν − ∂νAµ − ıe(W−

µ W+ν −W+

µ W−ν )|2 − 1

2|∂µW+

ν − ∂νW+µ +

− ıe(W+µ +Aν −W+

ν Aµ) + ıg′cw(W+µ Zν −W+

ν Zµ|2+(1)

− 1

4|∂µZν − ∂νZµ + ıg′cw(W−

µ W+ν −W+

µ W−ν )|2+

− 1

2M2η η

2 −gM2

η

8MWη3 −

g′2M2

η

32MWη4 + |MWW

+µ +

g

2ηW+

µ |2+

+1

2|∂µη + ıMZZµ +

ıg

2CwηZµ|2 −

∑f

g

2

mF

MWΨfΨfη,

which includes the Dirac Lagrangian amongst other things.We would now like to point out that all this has been on the basis of the

usual point spacetime which is what may be called commutative. But in recentyears several authors including in particular the present author have workedwith a noncommutative spacetime which originates back to Snyder in the lateforties itself. (This was in an attempt to overcome the divergences).

We first observe that it was Dirac [1] who pointed out two intriguing featuresof his equation: 1. The Compton wavelength and 2. Zitterbewegung.

For the former, his intuition was that we can never make measurements atspace or time points. We need to observe over an interval to get a meaningfuldefinition of momentum for example. This interval was the Compton region [2].Next, his solution was rapidly oscillatory, what is called Zitterbewegung. Thisoscillatory behaviour disappears on averaging over spacetime intervals over theCompton region. Once this is done while meaningful physics appears, we areleft with not points but minimum intervals.

This leads to a noncommutative geometry. One model for this is that ofSnyder [3]. Applied at the Compton wavelength this leads to the so calledSnyder-Sidharth dispersion relation, the geometry being given by [4]

(2) [xı, xj ] = βıj · l2.

As described in details in reference [5] this leads to a modification in the Diracand also the Klein-Gordon equation. This is because (2) in particular it leadsto the following energy momentum relation ([4])

(3) E2 − p2 −m2 + αl2p4 = 0,

Page 450: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

436 B.G. SIDHARTH

where α is a scalar constant, ∼ 10−3 [6, 7]. Though the value of α is of no con-sequence for the present work, it may be mentioned that α gives the Schwingerterm. If we work with this energy momentum relation (3) and follow the usualprocess we get as in the usual Dirac theory

(4) γµpµ −mψ ≡ γp + Γψ = 0.

We now include the extra term in the energy momentum relation (3). It can beeasily shown that this leads to

(5) p20 −(ΓΓ + Γβ + βΓ+ β2αl2p4

ψ = 0.

Whence the modified Dirac equation

(6)γp + Γ + γ5αlp2

.ψ = 0.

The Modified Dirac equation contains an extra term. The extra term gives aslight mass for the neutrino which is roughly of the correct order viz., 10−8me,me being the mass of the electron. The behaviour too is that of the neutrino[5, 8].

To sum up the introduction of the noncommutative geometry described in(2) leads to a Dirac like equation (6) and a Lagrangian that leads to the electronneutrino mass.

It must be pointed out that the modified Lagrangian differs from the usualLagrangian in that the γ0 matrix is now replaced by a new matrix

γ0′

= γ0 + γ0 · γ5lp2

that includes the term giving rise to the neutrino mass. We can verify that themodified Lagrangian gives back the modified Dirac equation (6). Further ashas been discussed in detail the extra term arising out of the noncommutativegeometry is the direct result of the dark energy which thus also features inthe modified standard model Lagrangian. This apart this argument has beenshown to lead to a mass spectrum for elementary particles that includes all theelementary particles, giving the masses with about 5% or less error [4].

References

[1] P.A.M. Dirac, The principles of quantum mechanics, Clarendon Press, Ox-ford, 1958.

[2] B.G. Sidharth, Das Abhishek, Int. J. Mod. Phys. A., 32 (2017), 175-173.

[3] H.S. Snyder, Physical review, 72 (1947), 68-71.

[4] B.G. Sidharth, The thermodynamic universe, World Scientific, Singapore,2008.

Page 451: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

GOING BEYOND THE STANDARD MODEL 437

[5] B.G. Sidharth, Int. J. Mod. Phys. E, 19 (2010), 1-8.

[6] B.G. Sidharth, A. Das, R. Arka, Electron J. Theor. Phys., 34 (2015), 139-152.

[7] B.G. Sidharth, A. Das, R. Arka, Int. J. Th. Phys., 55 (2016), 801-808.

[8] B.G. Sidharth, New advances in physics, 11 (2017), 5-97.

Accepted: 5.01.2018

Page 452: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (438–463) 438

ON THE JOINT (m, q)-PARTIAL ISOMETRIES AND THEJOINT m- INVERTIBLE TUPLES OF COMMUTINGOPERATORS ON A HILBERT SPACE

Ould Ahmed Mahmoud Sid AhmedMathematics Department

College of Science

Jouf University

Aljouf 2014

Saudi Arabia

[email protected]

Abstract. The study of tuples of commuting operators was the subject of intensivestudy by many authors. Our aim in this work is to consider a generalization of thenotions of m-partial isometries and (m, q)-partial isometries (resp. m- left inverse andm-right inverse) of a single operator done in [23] and [21] (resp. in [14],[19], [22]) tothe multivariable operators. We study some of the basic properties of these tuples ofcommuting operators. A commuting d-tuple of operators T = (T1, . . . , Td) acting on aHilbert space H is called a joint (m; (q1, . . . , , qd))-partial isometry, if

Tq

( ∑0≤k≤m

(−1)k(m

k

) ∑|α|=k

k!

α!T∗αTα

)= 0.

Keywords: m-isometric tuple, partial isometry, m-left inverse, m-right inverse, jointspectrum, joint approximate spectrum.

1. Introduction and terminologies

Let H be an infinite dimensional separable complex Hilbert space and denoteby B(H) the algebra of all bounded linear operators from H to H. For T ∈B(H) we shall write N (T ) , R(T ) and N (T )⊥ for the null space, the rangeof T and the orthogonal complement of N (T ) respectively. I = IH being theidentity operator. In what follows N,Z+ and C stands the sets of positiveintegers, nonnegative integers and complex numbers respectively. Denote by λthe complex conjugate of a complex number λ in C. We shall henceforth shortenλIH − T by λ − T . The spectrum, the point spectrum, the approximate pointspectrum of an operator T are denoted by σ(T ), σp(T ) and σap(T ) respectively.T ∗ means the adjoint of T.

The study of tuples of commuting operators was the subject of intensivestudy by many authors as in [4], [9], [10], [11], [12], [13], [25] , [26] and the refer-ences therein.

Page 453: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE JOINT (m, q)-PARTIAL ISOMETRIES 439

Our aim in this paper is to extend the notions of m-partial isometries ([23])and (m, q)-partial isometries ([21]) for single variable operators to the tuples ofcommuting operators defined on a complex Hilbert space.

For d ∈ N, let T = (T1, . . . , Td) ∈ B(H)d be a tuple of commuting boundedlinear operators. Let α = (α1, . . . , αd) ∈ Zd+ denote tuples of nonnegative inte-gers multi-indices) and set |α| :=

∑1≤j≤d |αj |, α! := α1! · · ·αd!. Further, define

Tα := Tα11 Tα2

2 · · ·Tαdd where T

αjj denotes the product of Tj times itself αj times.

One of the most important subclasses, of the algebra of all bounded linearoperators acting on a Hilbert space, the class of partial isometries operators. Anoperator T ∈ B(H) is said to be an isometry if T ∗T = I and partial isometryif TT ∗T = T. In recent years this classes has been generalized, in some sense,to the larger sets of operators so-called m-isometries and m-partial isometries.An operator T ∈ B(H) is said to be m-isometric for some integer m ≥ 1 if itsatisfies the operator equation∑

0≤k≤m(−1)k

(m

k

)T ∗m−kTm−k = 0.(1.1)

It is immediate that T is m-isometric if and only if

(1.2)∑

0≤k≤m(−1)k

(m

k

)∥Tm−kx∥2 = 0,

for all x ∈ H. Major work on m-isometries has been done in a long paperconsisting of three parts by Agler and Stankus ([1], [2], [3]) and have since thenattracted the attention of several other authors (see for example [6], [7], [8], [15]).More recently a generalization of these operators to m-partial isometries hasbeen studied in the paper of A. Saddi and the present author in [23] and by thepresent author in [21].

An operator T ∈ B(H) is called a m-partial isometry for some integer m ≥ 1(see [23]) if

(1.3) T

(T ∗mTm−

(m

1

)T ∗m−1Tm−1 +

(m

2

)T ∗m−2Tm−2−· · ·+(−1)mI

)= 0.

and it is a (m, q)-partial isometry for m ∈ N and q ∈ Z+ (see ([21]) if

(1.4) T q

(T ∗mTm−

(m

1

)T ∗m−1Tm−1+

(m

2

)T ∗m−2Tm−2−· · ·+(−1)mI

)= 0.

Gleason and Richter [16] extend the notion of m-isometric operators to the caseof commuting d-tuples of bounded linear operators on a Hilbert space. Thedefining equation for an m-isometric tuple T = (T1, . . . , Td) ∈ B(H)d reads:

(1.5)∑

0≤k≤m(−1)m−k

(m

k

) ∑|α|=k

k!

α!T∗αTα = 0

Page 454: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

440 OULD AHMED MAHMOUD SID AHMED

or equivalently

(1.6)∑

0≤k≤m(−1)m−k

(m

k

) ∑|α|=k

k!

α!∥Tαx∥2 = 0 for all x ∈ H.

Recently, P. H. W. Hoffmann and M. Mackey in [20] introduced the con-cept of (m, p)-isometric tuples on normed space. A tuple of commuting linearoperators T := (T1, . . . , Td) with Tj : X −→ X (normed space) is called an(m, p)-isometry (or an (m, p)-isometric tuple) if, and only if, for given m ∈ Nand p ∈ (0,∞),

(1.7)∑

0≤k≤m(−1)m−k

(m

k

) ∑|α|=k

k!

α!∥Tαx∥p = 0 for all x ∈ X.

Definition 1.1. Let T = (T1, . . . , Td) ∈ B(H)d be a tuple of operators.(1) If TiTj = TjTi 1 ≤ i, j ≤ d, we say that T is a commuting tuple.(2) If TiTj = TjTi, TiT

∗j = T ∗

j Ti, 1 ≤ i = j ≤ d, we say that T is a doublycommuting tuple.

Definition 1.2 ([18]). A commuting tuple T = (T1, . . . , Td) ∈ B(H)d is called:(1) matricially quasinormal if Ti commutes with T ∗

j Tk for all i, j, k ∈1, 2, . . . , d.

(2) jointly quasinormal if Ti commutes with T ∗j Tj for all i, j ∈ 1, . . . , d

and

(3) spherically quasinormal if Tj commutes with |T| :=

(∑1≤j≤d T

∗j Tj

) 12

for all j = 1, . . . , d.

IfM is a common invariant subspace of H for each Tj ∈ B(H), then T|M =(T1|M, T2|M, . . . , Td|M) denote an d-tuple of compressions of M.

The contents of this paper are the following. Introduction and terminologiesare described in the first part. The second part is devoted to the study of somebasic properties of the class of (m; (q1, . . . , qd))-partial isometries tuples. Severalspectral properties of some (m; (q1, . . . , qd))-partial isometries are obtained insection three; concerning the joint point spectrum,the joint approximate spec-trum and the spectral radius. In the fourth section we present some resultsconcerning the m-left inverses and the m-right inverses for tuples of operators.

2. The joint (m; (q1, . . . , qd))-partial isometries tuples of commutingoperators

In this Section, we introduce and study some basic properties of a joint(m; (q1, . . . , qd))-partial isometry operators tuples. All of these results are fairlystraightforward generalizations of the corresponding single variable results thatwas proved in [21] and [23].

Page 455: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE JOINT (m, q)-PARTIAL ISOMETRIES 441

Definition 2.1. Givenm ∈ N and q = (q1, . . . , qd) ∈ Zd+. An commuting d-tupleof operators T = (T1, . . . , Td) ∈ B(H)d is called a joint (m; (q1, . . . , qd))-partialisometry (or joint (m; (q1, . . . , qd))-partial isometric d-tuple ) if and only if

Tq

( ∑0≤k≤m

(−1)k(m

k

) ∑|α|=k

k!

α!T∗αTα

)= 0.

Remark 2.1. (1) When d = 1 and q ∈ N, the Definition 2.1 coincides withDefinition 2.1 in [21].

(2) Every m-isometric d-tuple of commuting operators on H is a joint(m; (q1, . . . , qd))- partial isometry d-tuple.

(3) Every joint (m; (q1, . . . , qd))-partial isometry of commuting operatorsT = (T1, . . . , Td) such that T is entry-wise invertible, T is an m-isometric d-tuple.

Remark 2.2. Let T = (T1, T2) ∈ B(H)2 be a commuting operator 2-tuple, wehave that

(i) T is a joint (1; (1, 1))-partial isometry pair if

T1T2

(I − T ∗

1 T1 − T ∗2 T2

)= 0.

(ii) T is a joint (2; (1, 1))-partial isometry pair if

T1T2

(I − 2T ∗

1 T1 − 2T ∗2 T2 + T ∗2

1 T 21 + T ∗2

2 T 22 + 2T ∗

1 T∗2 T1T2

)= 0.

Remark 2.3. Let T = (T1, T2, . . . , Td) ∈ B(H)d be a commuting operator d-tuple. Then T is a joint (1; (1, . . . , 1))-partial isometry if and only if

T1...Td

(I − T ∗

1 T1 − T ∗2 T2 − · · · − T ∗

dTd

)= 0.

Example 2.1. Consider T =

0 0 10 0 01√2

1√2

0

∈ B(C3) and let T = ( 1√dT, 1√

dT,

. . . , 1√dT ) ∈ B(C3)d. It is easy to see that T is a joint (1; (1, . . . , 1))-partial isom-

etry d-tuple.

Remark 2.4. If T = (T1, . . . , Td) ∈ B(H)d be a doubly commuting d-tuple ofoperators on H. Then T is a joint (1; (1, . . . , 1)-partial isometry if and only ifT∗ := (T ∗

1 , T∗2 , . . . , T

∗d ) is so.

The following example of a joint (m; (q1, . . . , qd))-partial isometry is adoptedform [20].

Page 456: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

442 OULD AHMED MAHMOUD SID AHMED

Example 2.2. Let S ∈ B(H) be a (m, q1)-partial isometry operator,d ∈ N andλ = (λ1, . . . , λd) ∈ (Cd, ∥.∥2) with

∥λ∥22 =∑

1≤j≤d|λj |2 = 1.

Then the operator tuple T = (T1, . . . , Td) with Tj = λjS for j = 1, . . . , d is ajoint (m; (q1, . . . , qd))-partial isometry d-tuple.

In fact,it is clair that TiTj = TjTi for all 1 ≤ i; j ≤ d. Further, by themultinomial expansion, we get(|λ1|2 + |λ2|2 + · · ·+ |λd|2

)k=

∑α1+α2+···+αd=k

(k

α1, α2, . . . , αd

) ∏1≤i≤d

|λi|2αi

=∑|α|=k

k!

α!|λα|2.

Thus, we have

Tq∑

0≤j≤m(−1)k

(m

k

) ∑|α|=k

k!

α!T∗αTα

= Tq∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!

∏1≤j≤d

|λ|2αjS∗|α|S|α|

=∏

1≤j≤dλqjj S

|q|∑

0≤k≤m(−1)k

(m

k

)S∗kSk

=∏

1≤j≤dλqjj S

|q|−q1 Sq1∑

0≤k≤m(−1)k

(m

k

)S∗kSk︸ ︷︷ ︸

=0

= 0.

Consequently, T is a joint (m; (q1, . . . , qd))-partial isometry d-tuple as required.

The following example shows that the question about joint (m; (q1, . . . , qd))-partial isometry for d-tuple is non trivial. There exists a d-tuple of commutingoperators T = (T1, . . . , Td) ∈ B(H)d such that each Tj is a (m, qj)-partial isom-etry for j = 1, . . . , d, but T = (T1, . . . , Td) is not a joint (m; (q1, . . . , qd))-partialisometry.

Example 2.3. Let us consider H = C3 and define T1 =

0 i 00 0 ii 0 0

and

T2 =

1 0 00 1 00 0 1

. It is straightforward that T1 and T2 commute. Moreover,T1

and T2 are joint (2; 1)-partial isometry but (T1, T2) is not a joint (2; (1, 1))-partialisometry.

Page 457: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE JOINT (m, q)-PARTIAL ISOMETRIES 443

Lemma 2.1. Let Sd be the group of permutation on d symbols 1, 2, . . . , dand let T = (T1, . . . , Td) ∈ B(H)d be a d-tuple of commuting operators. IfT is a joint (m; (q1, . . . , qd))-partial isometry , then for every σ ∈ Sd, Tσ :=(Tσ(1), Tσ(2), . . . , Tσ(d)) is a joint (m; (qσ(1), . . . , qσ(d)))-partial isometry.

Proof. The proof follows from the condition that∏

1≤j≤d Tj =∏

1≤j≤d Tσ(j)and the identity∏

1≤j≤dTqjj

∑0≤k≤m

(−1)k(m

k

) ∑|α|=k

k!

α!

∏1≤j≤d

T∗αjj

∏1≤j≤d

Tαjj = 0.

Theorem 2.1. Let m ∈ N and q = (q1, . . . , qd) ∈ Zd+. Let T = (T1, . . . , Td) ∈B(H)d be a commuting d-tuple operators such that N (Tq) is a reducing subspacefor Tj for all j = 1, 2, . . . , d. Then the following properties are equivalent.

(1) T is a joint (m; (q1, . . . , qd))-partial isometry.(2) ∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!∥TαT∗qx∥2 = 0, for all x ∈ H.

Proof. First, assume that T is a joint (m; (q1, . . . , qd))-partial isometry. Wehave that for all x ∈ H

Tq∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!T∗αTαT∗qx = 0

=⇒ ⟨Tq∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!T∗αTαT∗qx, x⟩ = 0

=⇒∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!∥TαT∗qx∥2 = 0.

Thus, (2) holds.To prove the converse, assume that the equality in (2) is holds. It follows

that,

⟨Tq∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!T∗αTαT∗qx, x⟩ = 0, ∀ x ∈ H

=⇒ Tq∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!T∗αTαT∗qx = 0, ∀ x ∈ H.

Hence,

Tq∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!T∗αTα = 0 on R(T∗q) = N (Tq)⊥.

Page 458: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

444 OULD AHMED MAHMOUD SID AHMED

As N (Tq) is a reducing subspace for each Tj (1 ≤ j ≤ d), we have that

Tq∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!T∗αTα = 0 on N (Tq)

and hence,

Tq∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!T∗αTα = 0.

The following corollary is an immediate consequence of Theorem 2.1.

Corollary 2.1. Let m ∈ N and q = (q1, . . . , qd) ∈ Zd+. Let T = (T1, . . . , Td) ∈B(H)d be a commuting d-tuple of operators such that N (Tq) is a reducing sub-space for each Tj, 1 ≤ j ≤ d. Then the following properties are equivalent

1. T is a joint (m; q1, . . . , qd))-partial isometry.

2. T|N (Tq)⊥ :=

(T1|N (Tq)⊥ , T2|N (Tq)⊥ , . . . , Td|N (Tq)⊥

)is an m-isometric

tuple.

Remark 2.5. It is easy to see that every joint (m; (1, . . . , 1))-partial isometryd-tuple of commuting operators is a joint (m; (q1, . . . , qd))-partial isometry.

In the following theorem we show that by imposing certain conditions on a joint(m; (q1, . . . , qd))-partial isometry of operators it becomes a joint (m; (1, . . . , 1))-partial isometry.

Theorem 2.2. If T = (T1, . . . , Td) ∈ B(H)d be a commuting d-tuple of operatorssuch is a joint (m; (q1, . . . , qd))-partial isometry and N (Tj) = N (T 2

j ) for eachj, 1 ≤ j ≤ d, then T is a joint (m; (1, . . . , 1))-partial isometry.

Proof. By the assumption we have for j = 1, . . . , d that N (Tj) = N (Tnj ) forall positive integer n. It follows that

Tq

( ∑0≤k≤m

(−1)k(m

k

) ∑|α|=k

k!

α!T∗αTα

)= 0

implies

∏1≤j≤d

Tj

( ∑0≤k≤m

(−1)k(m

k

) ∑|α|=k

k!

α!T∗αTα

)= 0.

The following proposition generalized ([23], Proposition 3.1)

Page 459: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE JOINT (m, q)-PARTIAL ISOMETRIES 445

Proposition 2.1. If T = (T1, . . . , Td) ∈ B(H)d is a jointly quasinormal anda joint (m; (1, . . . , 1))-partial isometry, then T is a joint (1; (1, . . . , 1))-partialisometry.

Proof. Since T = (T1, . . . , Td) is a jointly quasinormal and a joint (m; (1, . . . , 1))-partial isometry, it follows that∏

1≤j≤dTj

(I −

∑1≤j≤d

T ∗j Tj

)m= 0.

A straightforward computation using this last equation yields that∏1≤j≤d

Tj

(I −

∑1≤j≤d

T ∗j Tj

)= 0.

The proof is complete.

Definition 2.2. Let T = (T1, . . . , Td) and S = (S1, . . . , Sd) are two commutingd-tuples of operators on a common Hilbert space H. We said that S is unitaryequivalent to T if there exists an unitary operator V ∈ B(H) such that

S = (S1, . . . , Sd) = (V ∗T1V, V∗T2V, . . . , V

∗TdV ).

Proposition 2.2. Let T = (T1, . . . , Td) and S = (S1, . . . , Sd) ∈ B(H)d are twocommuting d-tuple of operators such that S is unitary equivalent to T, then T isa joint (m, (q1, . . . , qd)-partial isometry if and only if S is a joint (m, (q1, . . . , qd)-partial isometry.

Proof. Suppose that S and T are unitary equivalent,that is there exists a uni-tary operator V ∈ B(H) such that Sj = V ∗TjV, (1 ≤ j ≤ d). Since TiTj = TjTi;it follows that

(V ∗TjV )(V ∗TiV ) = (V ∗TiV )(V ∗TjV ) for all 1 ≤ i, j ≤ d.

Using the observations above, we get the following identity

Sq∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!S∗αSα

= V ∗TqV∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!V ∗T∗αTαV

= V ∗(Tq

∑0≤k≤m

(−1)k(m

k

) ∑|α|=k

k!

α!V ∗T∗αTα

)V.

In the proof of the following theorem, we need the following formula

Page 460: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

446 OULD AHMED MAHMOUD SID AHMED

Remark 2.6. For n, d, k1, k2, . . . , kd ∈ N with k1 + ... + kd = n, n ≥ 1 andd ≥ 2, we have (

n

k1 · · · kd

)=∑

1≤j≤d

(n− 1

k1 · · · kj − 1 · · · kd

).

It will known that if T = (T1, . . . , Td) is an m-isometric tuple then T is ann-isometric tuple for n ≥ m. This result is not true for joint (m; (q1, . . . , qd))-partial isometric tuple. Since it was shown in [21] that a (m, q)-partial isometryoperator need not be a (m+ 1, q)-partial isometry and vice versa.

Theorem 2.3. Let T = (T1, . . . , Td) ∈ B(H)d be a (m; (q1, . . . , qd))-partial isom-etry d-tuple of commuting operators such that N (Tq) is a reducing subspace foreach Tj for 1 ≤ j ≤ d. Then T is a (m+n; (q1, . . . , qd))-partial isometry d-tuplefor n ∈ N.

Proof. To prove that T is a joint (m+n; (q1, . . . , qd))-partial isometry, it sufficesto prove that T is a joint (m+ 1; (q1, . . . , qd))-partial isometry.

Indeed, for x ∈ H we have

∑0≤k≤m+1

(−1)k(m+ 1

k

) ∑|α|=k

k!

α!∥TαT∗qx∥2

= ∥T∗qx∥2+∑

1≤k≤m(−1)k

[(mk

)+

(m

k − 1

)] ∑|α|=k

k!

α!∥TαT∗qx∥2−(−1)m

∑|α|=m+1

(m+ 1)!

α!∥TαT∗qx∥2

=∑

0≤k≤m(−1)k

(m

k

) ∑|α|−k

k!

α!∥TαT∗qx∥2

−∑

0≤k≤m−1

(−1)k(m

k

) ∑|α|=k+1

(k + 1)!

α!∥TαT∗qx∥2

− (−1)m∑

|α|=m+1

(m+ 1)!

α!∥TαT∗qx∥2

= −∑

0≤k≤m−1

(−1)k(m

k

) ∑|α|=k+1

k!(α1 + ...+ αd)

α1!.α2....αd!∥TαT∗qx∥2

− (−1)m∑

|α|=m+1

m!(α1 + ...+ αd)

α1!.α2....αd!∥TαT∗qx∥2

= −∑

1≤j≤d

∑0≤k≤m−1

(−1)k(m

k

) ∑|α|=k+1

(−1)k(m

k

)

Page 461: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE JOINT (m, q)-PARTIAL ISOMETRIES 447

k!αjα1!.α2!....αd!

∥Tα1 ...Tαj−1j T

αj+1

j+1 ...Tαdd TjT∗qx∥2

− (−1)m∑

1≤j≤d

∑|α|=m+1

m!αjα1!.α2!....αd!

∥Tα1 ...Tαj−1j T

αj+1

j+1 ...Tαdd TjT∗qx∥2

= −∑

1≤j≤d

∑0≤k≤m−1

(−1)k(m

k

) ∑|β|=k

(−1)k(m

k

)k!

β!∥TβTjT

∗qx∥2

− (−1)m∑

1≤j≤d

∑|α|=m

m!

β!∥TβTjT

∗qx∥2

= −∑

1≤j≤d

∑0≤k≤m

(−1)k(m

k

) ∑|β|=k

k!

β!∥TβTjT

∗qx∥2 = 0.

This completes the proof.

Proposition 2.3. Let T = (T1, . . . , Td) ∈ B(H)d be a commuting d-tuple ofoperators such that N (Tq) is a reducing subspace for each Tj for j = 1, 2, . . . , d.Assume that T satisfies

(2.1)∑

1≤j≤d

∑0≤k≤m

(−1)k(m

k

) ∑|α|=k

k!

α!∥TjTαT∗qx∥2 = 0 for all x ∈ H.

Then T is a joint (m; (q1, . . . , qd))-partial isometry if and only if T is a joint(m+ 1; (q1, . . . , qd))-partial isometry.

Proof. If T is a joint (m; (q1, . . . , qd))-partial isometry, then T is a joint (m+1; (q1, . . . , qd))-partial isometry by Theorem 2.3.

Conversely, assume that T is a joint (m + 1; (q1, . . . , qd))-partial isometryand satisfies the equation (2.1). It follows that

Tq∑

1≤j≤d

∑0≤k≤m

(−1)k(m

k

) ∑|α|=k

k!

β!T ∗j T

∗αTαTjT∗q = 0

and hence

Tq∑

1≤j≤d

∑0≤k≤m

(−1)k(m

k

) ∑|α|=k

k!

α!T ∗j T

∗αTαTj = 0 on R(T∗q

)= N

(Tq)⊥.

On the other hand, since Tj(N (Tq)

)⊂ N (Tq) and T ∗

j

(N (Tq)

)⊂ N (Tq), we

have T ∗j T

∗αTαTj N(Tq)⊆ N

(Tq). Thus,

Tq∑

1≤j≤d

∑0≤k≤m

(−1)k(m

k

) ∑|β|=k

k!

β!T ∗j T

∗βTβTj = 0 on N(Tq).

Page 462: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

448 OULD AHMED MAHMOUD SID AHMED

From the above equalities we conclude that

Tq∑

1≤j≤d

∑0≤k≤m

(−1)k(m

k

) ∑|α|=k

k!

β!T ∗j T

∗αTαTj = 0 on H = N (Tq)⊕N (Tq)⊥.

Since T is a joint (m+ 1, q)-isometry, we get

0 = Tq∑

0≤k≤m+1

(−1)k(m+ 1

k

) ∑|α|=k

k!

α!T∗αTα

= Tq∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!T∗αTα

−Tq∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k+1

(k + 1)!

α!T∗αTα.

Therefore,

Tq∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!T∗αTα

= Tq∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k+1

(k + 1)!

α!T∗αTα

= Tq∑

1≤j≤d

∑0≤k≤m

(−1)k(m

k

) ∑|α|=k

k!

β!T ∗j T

∗αTαTj = 0.

Consequently, T is a joint (m, (q1, . . . , qd))-isometry.

Proposition 2.4. Let T = (T1, . . . , Td) ∈ B(H)d be a joint (m; (q1, . . . , qd))-partial isometry d-tuple. The following statements hold:

(i) T is a joint (m+1; (q1, . . . , qd))-partial isometry d-tuple if and if T satisfies

(2.2) Tq

( ∑0≤k≤m

(−1)k(m

k

) ∑|α|=k+1

(k + 1)!

α!T∗αTα

)= 0.

(ii) If N (Tj) = N (T 2j ) for each j; 1 ≤ j ≤ d, then T is a joint (m +

1, (q1, · · · , qd))-partial isometry d-tuple if and only if T satisfies (2.1)

Proof. (i) Since T is a joint (m, (q1, · · · , qd))-partial isometry d-tuple, we have

Tq∑

0≤k≤m+1

(−1)k(m+ 1

k

) ∑|α|=k

k!

α!T∗αTα

= −Tq∑

1≤j≤d

∑0≤k≤m

(−1)k(m

k

) ∑|β|=k

k!

β!T ∗j T

∗βTβTj .

Page 463: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE JOINT (m, q)-PARTIAL ISOMETRIES 449

Thus, T is a joint (m+ 1, (q1, . . . , qd))-partial isometry d-tuple if and only if

(2.3) Tq∑

1≤j≤d

∑0≤k≤m

(−1)k(m

k

) ∑|β|=k

k!

β!T ∗j T

∗βTβTj = 0,

which is equivalent to the equation (2.2).(ii) Suppose that T is a joint (m + 1, (q1, · · · , qd))-partial isometry d-tuple.

Then

Tq∑

1≤j≤d

∑0≤k≤m

(−1)k(m

k

) ∑|β|=k

k!

β!T ∗j T

∗βTβTj = 0,

and the equation (2.1) is satisfied.Conversely, suppose that (2.1) is fulfilled. Under the conditions N (Tj) =

N (T 2j ) for each j; 1 ≤ j ≤ d, we see easily that

N (Tq) = N (∏

1≤j≤dTj) =

∩1≤j≤d

N (Tj),

and therefore we have (2.3). Now, from (i), T is a joint (m + 1, (q1, · · · , qd)-partial isometry d-tuple.

3. Spectral properties of joint (m; (q1, . . . , qd))-partial isometries tuples

Spectral properties of commuting d-tuples of operators received important at-tention during last decades. For more details, the interested reader is referredto [9], [10], [11], [12], [13], [24] and the references therein.

First, we recapitulate very briefly the following definitions.

Definition 3.1. Let T = (T1, . . . , Td) be a d-tuple of operators on a complexHilbert space H.

1. A point λ = (λ1, . . . , λd) ∈ Cd is called a joint point eigenvalue of T ifthere exists a non zero vector x ∈ H such that

(Tj − λj)x = 0 for j = 1, . . . , d.

Or equivalently if there exists a non-zero vector x ∈ H such that x ∈∩1≤j≤dN (Tj − λj),i.e.;

σp(T) = λ ∈ Cd :∩

1≤j≤dN (Tj − λj) = 0.

2. The joint point spectrum, denoted by σp(T) of T is the set of all jointeigenvalues of T.

Page 464: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

450 OULD AHMED MAHMOUD SID AHMED

Definition 3.2. For a commuting d-tuple T = (T1, . . . , Td) ∈ B(H)d. A numberλ = (λ1, . . . , λd) ∈ Cd is in the joint approximate point spectrum σap(T) if andonly if there exists a sequence of unit vector (xn)n such that

(Tj − λj)xn −→ 0 as n −→∞ for every j = 1, ..., d.

Lemma 3.1. ([16]) Let T = (T1, . . . , Td) ∈ B(H)d be a commuting tuples ofbounded operators. Then

σap(T) =

λ = (λ1, . . . , λd) ∈ Cd : ∃ (xn)n ⊂ H,

∥xn∥ = 1, / limn−→∞

∑1≤j≤d

∥(Tj − λj)xn∥ = 0

.

Definition 3.3 ([26]). The Taylor spectrum of commuting d-tuple = (T1, . . . , Td)∈ B(H)d is the set of all complex d-tuple λ = (λ1, . . . , λd) ∈ Cd with the propertythat the translated d-tuple (T1 − λ1, . . . , Td − λd) is note invertible. The symbolσ(T) will stand for the Taylor spectrum of T.

Remark 3.1 ([26]). Let T = (T1, . . . , Td) ∈ B(H)d be an d-tuple of commutingoperators on H. (λ1, . . . , λd) /∈ σ(T) if there exist operators U1, . . . , Ud, V1, . . . ,Vd ∈ B(H)) such that∑

1≤k≤dUk(Tk − λkI) = I and

∑1≤k≤d

(Tk − λkI)Vk = I.

The spectral radius of T is

r(T) = max∥λ∥2, λ ∈ σ(T)

where ∥λ∥2 =

(∑1≤j≤d |λj |2

) 12

.

In the following results we examine some spectral properties of a joint(m; (q1, . . . , qd))-partial isometries.That extend the case of single variable m-partial isometries studied in [23].

We put

B(Cd) := λ = (λ1, . . . , λd) ∈ Cd / ∥λ∥2 =

( ∑1≤j≤d

|λj |2) 1

2

< 1

and

∂B(Cd) := λ = (λ1, . . . , λd) ∈ Cd / ∥λ∥2 =

( ∑1≤j≤d

|λj |2) 1

2

= 1 .

In ([16], Lemma 3.2), the authors proved that if T is a m-isometric tuple,then the joint approximate point spectrum of T is in the boundary of the unitball B(Cd). This is not true for a joint (m; (q1, . . . , qd))-partial isometry tupleas shown in the following example.

Page 465: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE JOINT (m, q)-PARTIAL ISOMETRIES 451

Example 3.1. Let T = (T, 0, ..., 0) ∈ B(C2)d, where T is the matrix opera-

tor T =

(a 01 0

)with |a|2 = 1+

√5

2 . It is easily to show that T is a joint

(2; (1, 0, 0, . . . , 0))-partial isometry and further σ(T) = 0, a × 0 × ...× 0.

However, if in addition assume that Tj reduces N (Tq) for 1 ≤ j ≤ d, weobtain the following result.

Theorem 3.1. Let T = (T1, . . . , Td) ∈ B(H)d be a joint (m; (q1, . . . , qd))-partialisometry of d-tuple of operators such that N (Tq) is a reducing subspace for eachTj (1 ≤ j ≤ d). Then σap(T) ⊂ ∂B(Cd) ∪

[0]where[

0]

:= (λ1, . . . , λd) ∈ Cd :∏

1≤k≤dλk = 0.

Proof. Let λ = (λ1, . . . , λd) ∈ σap(T), then there exists a sequence (xn)n≥1 ⊂H, with ||xn|| = 1 such that (Tj − λjI)xn −→ 0 for all j = 1, 2, . . . , d. Since forαj > 1,

Tαjj − λ

αjj = (Tj − λj)

∑1≤k≤αj

λk−1j T

αj−kj .

By induction, for α ∈ Zd+, we have

(Tα − λαI) =∑

1≤k≤d

(∏i≤k

λαii

)(Tαjj − λ

αij

)∏i>k

Tαii .

Since, R(Tq) ⊂ N (Tq)⊥ we have from Corollary 2.1 that, for all n ≥ 1

0 = λq⟨∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!T∗αTαTqxn , xn⟩

= λq⟨∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!T∗αTα(Tq − λq)xn, xn⟩

+ λ2q∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!||Tαxn||2

= λq⟨∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!T∗αTα(Tq − λqxn|xn⟩

+ λ2q ∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!

(||(Tα − λα)xn||2

+ 2Re⟨(Tα − λα)xn|λαxn⟩+ |λα|2)

as(Tα − λαI

)xn → 0 as n −→∞ for all α ∈ Zd+ we obtain that

0 = λq∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!|λα|2 = λq(1− ∥λ∥22)m,

Page 466: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

452 OULD AHMED MAHMOUD SID AHMED

where ∥λ∥2 =

(∑1≤k≤d |λk|2

) 12

. We deduce that λq = 0 or ∥λ∥2 = 1. This

implies that

λ ∈ (λ1, λ2, ..., λd) ∈ Cd :∏

1≤k≤dλk = 0 or λ ∈ ∂B(Cd).

Corollary 3.1. If T = (T1, . . . , Td) ∈ B(H)d is a joint (m; (q1, . . . , qd))-partialisometry d-tuple of operators such that N (Tq) is a reducing subspace for eachTj (1 ≤ j ≤ d), then r(T) = 1.

Proof. It is known (see for example [24]) that the convex envelopes of all spectracoincide. Thus from Theorem 3.1 we have that the approximate point spectrumof T = (T1, . . . , Td) is contained in the boundary of the unit ball, it follows thatr(T) = 1.

We have also, the following properties.

Proposition 3.1. Let T = (T1, . . . , Td) ∈ B(H)d be a joint (m; (q1, . . . , qd))-partial isometry d-tuple such that N (Tq) is a reducing subspace for Tj (1 ≤ j ≤d). The following properties hold.

1. If λ = (λ1, . . . , λd) ∈ σap(T)\[0], then 1 ∈ σap(

∑1≤j≤d λjT

∗j ).

2. If λ = (λ1, . . . , λd) ∈ σp(T)\[0], then 1 ∈ σp(

∑1≤j≤d λjT

∗j ).

3. Eigenvectors of T corresponding to two joint eigenvalues λ = (λ1, . . . , λd)and µ = (µ1, . . . , µd) such that

∑1≤j≤d λjµj = 1 are orthogonal.

Proof. 1. Let λ = (λ1, . . . , λd) ∈ σap(T)\(λ1, . . . , λd) ∈ Cd :∏

1≤k≤d λk = 0,choose a sequence (xn)n ⊂ H, such that ∥xn∥ = 1 and (Tj − λj)xn −→ 0 for allj = 1, 2, . . . , d. Following similar arguments it is easy to see that for all αj ≥ 0.(T

αjj − λ

αjj )xn −→ 0 as n −→∞ and

(Tα − λα)xn −→ 0.

On the other hand

T∗αTα(Tq − λq)xn = T∗αTαTqxn − λqT∗αTαxn

= T∗αTαTqxn − λqT∗α(Tα − λα)xn + λqT∗αλαxn −→ 0.

Since T is a joint (m; (q1, . . . , qd))-partial isometry, we observe that

λq∑

1≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!

(λT∗)αxn −→ 0.

Page 467: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE JOINT (m, q)-PARTIAL ISOMETRIES 453

and hence,

λq(I−

∑1≤j≤d

λjT∗j

)mxn −→ 0.

Using the fact that λ = (λ1, . . . , λd) ∈ σap(T)\[0], we get(I −

∑1≤j≤d

λjT∗j

)mxn −→ 0.

We deduce that (IH −∑

1≤j≤d λjT∗j ) is not bounded below and hence 1 ∈

σap(∑

1≤j≤d λjT∗j ),

and the proof of this implication is over.2. Let λ = (λ1, . . . , λd) ∈ σp(T)\[0], there exists a non zero vector x ∈ H

such thatTjx = λjx for j = 1, 2, .., d.

By using a similar argument as in 1 we show (IH −∑

1≤j≤d λjT∗j )x = 0. From

which it follows that 1 ∈ σp(∑

1≤j≤d λjT∗j ).

3. Let λ = (λ1, . . . , λd) and µ = (µ1, . . . , µd) be eigenvalues of T such that∑1≤j≤d λjµj = 1. Assume that Tjx = λjx and Tjy = µjy for j =

1, . . . , d. Since N (Tq) is a reducing subspace for each Tj for j = 1, . . . , d, wehave R(Tq) ⊆ N (Tq)⊥. Moreover since T is a (m; (q1, . . . , qd)-partial isometrytuple,it follows from Corollary 2.1 that

0 =⟨ ∑0≤k≤m

(−1)k(m

k

) ∑|α|=k

k!

α!T∗αTαTqx, y

⟩= λq

⟨ ∑0≤k≤m

(−1)k(m

k

) ∑|α|=k

k!

α!T∗αTαx, y

⟩= λq

∑0≤k≤m

(−1)k(m

k

) ∑|α|=k

k!

α!

(λ.µ)α⟨x, y⟩

=

(1−

∑1≤j≤d

λjµj

)m⟨x, y⟩.

where λ.µ = (λ1µ1, λ2µ2, , ..., λdµd).Since 1−

∑1≤j≤d λjµj = 0, we obtain that ⟨x | y⟩ = 0.

Lemma 3.2. Let T = (T1, . . . , Td) ∈ B(H)d be an joint (m; (q1, . . . , qd))-partialisometry such that N (Tq) is a reducing subspace for Tj , j = 1, . . . , d. Letλ = (λ1, . . . , λd) and µ = (µ1, . . . , µd) ∈ σap(T) such that

∑1≤j≤d λjµj = 1. If

(xn)n and (yn)n are two sequences of unit vectors in H such that

∥(Tj−λj)xn∥ −→ 0 and ∥(Tj−µj)yn∥ −→ 0 (as n −→∞) for all j = 1, 2, ..., d,

then we have

(3.1) ⟨xn| yn⟩ −→ 0 (as n −→∞).

Page 468: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

454 OULD AHMED MAHMOUD SID AHMED

Proof. Let xnn and ynn be two sequences of unit vectors in H such that

∥(Tj−λj)xn∥ −→ 0 and ∥(Tj−µj)yn∥ −→ 0 (as n −→∞) for all j = 1, 2, ..., d.

Then for all αj , qj ∈ N, we have limn→∞(Tαj+qjj −λαj+qjj )xn = 0 and limn→∞(T

αjj −

µαjj )yn = 0. On the other hand, we also have

limn→∞

(Tα+q − λα+q)xn = 0 and limn→∞

(Tα − µα)yn = 0.

Since T is a joint (m; (q1, . . . , qd))-partial isometric tuple such that N (Tq) is areducing subspace for each Tj for j = 1, . . . , d, it follows that

0 = limn→∞

⟨( ∑0≤k≤m

(−1)k(m

k

) ∑|α|=k

k!

α!T∗αTαTqxn | yn⟩

= limn→∞

⟨∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!T∗α(Tα+q − λα+q + λα+q

)xn | yn⟩

= limn→∞

⟨( ∑0≤k≤m

(−1)k(m

k

) ∑|α|=k

k!

α!T∗αλα+q

)xn | yn⟩

= limn→∞

⟨xn |∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!λαTαyn⟩

= limn→∞

⟨xn |∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!λα(

Tα − µα + µα)yn⟩

= limn→∞

⟨xn |∑

0≤k≤m(−1)m−k

(m

k

) ∑|α|=k

k!

α!λαµαyn⟩

= limn→∞

⟨xn |∑

0≤k≤m(−1)k

(m

k

) ∑|α|=k

k!

α!

(λµ)αyn⟩

= limn→∞

⟨xn |(

1−∑

1≤j≤dλjµj

)myn⟩

=

(1−

∑1≤j≤d

λjµj

)mlimn→∞

⟨xn | yn⟩.

By the assumption∑

1≤j≤d λjµj = 1, we obtain that limn→∞⟨xn | yn⟩ = 0.

4. The joint m-left inverse and joint m-right inverse of commutingtuples of operators

An operator T ∈ B(H) is said to be a left invertible if there is an operatorS ∈ B(H) such that ST = IH, where IH, denotes the identity operator. Theoperator S is called a left inverse of T . An operator T ∈ B(H) is said to be

Page 469: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE JOINT (m, q)-PARTIAL ISOMETRIES 455

a right invertible if there is an operator R ∈ B(H) such that TR = IH. Theoperator R is called a right inverse of T .

The left and right m-invertibility of operator have been introduced by thepresent author in [22] and by B. P. Duggal and V. Muller in [14].

Given a positive integer m. A bounded linear operator T is called a m-leftinvertible (resp. m-right invertible) if there exists a bounded linear operator Ssuch that∑

0≤k≤m(−1)m−k

(m

k

)SkT k = 0

(resp.

∑0≤k≤m

(−1)m−k(m

k

)T kSk = 0

).

The m-invertibility have been extensively studied in the recent paper [19] by C.Gu. In [17] the author extends the notions of m-left and m-right invertibilityrespectively to the notions of m-left generalized inverse and m-right generalizedinverse on Banach spaces.

The following definition generalize the definition of m-left invertibility andm-right invertibility of a single operator to tuples of commuting operators.

Definition 4.1. Let T = (T1, · · · , Td) ∈ B(H)d be a commuting d-tuple ofoperators on H,we say that T is a joint m-left invertible (resp. joint m-rightinvertible) operator for some integer m ≥ 1, if there exists a commuting d-tupleof operators S = (S1, . . . , Sd) ∈ B(H)d such that∑

0≤k≤m(−1)m−k

(m

k

) ∑|α|=k

k!

α!SαTα = 0

(resp.

∑0≤k≤m

(−1)m−k(m

k

) ∑|α|=k

k!

α!TαSα = 0

).

S is called a joint m-left (resp. m-right) inverse of T.We say that T = (T1, . . . , Td) ∈ B(H)d is m-invertible d-tuple of commuting

operators if it has both a m-left inverse and a m-right inverse.

An interesting example of a m-left invertible commuting tuple of operatorsis that of an m-isometric tuple of operators.

Remark 4.1. It is clear that S is a m-left inverse of T if and only if T∗ is am-left inverse of S∗.

Example 4.1. Let T1 =

(1 10 1

)and S1 =

(1 −10 1

). Then the pair

T = (T1, T1) is m-invertible tuple with m-inverse S = (S1, S2) in B(C2)2.

Remark 4.2. 1. If S = (S1, S2) and T = (T1, T2) ∈ B(H)2 be commuting pairsof operators then S is a joint left inverse of T if S1T1 + S2T2 = I and it is ajoint 2-left inverse of T if

(4.1) S21T

21 + S2

2T22 + 2S1S2T1T2 − 2

(S1T1 + S2T2

)+ I = 0.

Page 470: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

456 OULD AHMED MAHMOUD SID AHMED

2. S = (S1, . . . , Sd) is a joint left inverse (or joint 1-left inverse) of T =(T1, T2, ..., Td) if

(4.2) S1T1 + S2T2 + ...+ SdTd = IH

and it is a joint 2-left inverse of T if

(4.3) IH − 2∑

1≤j≤dSjTj +

∑1≤j≤d

S2j T

2j + 2

∑1≤j<k≤d

SjSkTjTk = 0.

For T = (T1, . . . , Td) and S = (S1, . . . , Sd) ∈ B(H)d, set

βm(S,T) =∑

0≤k≤m(−1)m−k

(m

k

) ∑|α|=k

k!

α!SαTα.

Lemma 4.1. Let T = (T1, . . . , Td) and S = (S1, . . . , Sd) ∈ B(H)d be commutingd-tuples of operators, then the following identity holds for m ∈ N:

βm+1(S,T) = −βm(S,T) +∑

1≤j≤dSjβm(S,T)Tj .

Proof.

βm+1(S,T) = (−1)m+1IH+∑

1≤k≤m(−1)k

[(mk

)+

(m

k − 1

)] ∑|α|=k

k!

α!SαTα

+∑

|α|=m+1

(m+ 1)!

α!SαTα = −

∑0≤k≤m

(−1)k(m

k

) ∑|α|=k

k!

α!SαTα

+∑

0≤k≤m−1

(−1)k(m

k

) ∑|α|=k+1

(k + 1)!

α!SαTα

∑|α|=m+1

(m+ 1)!

α!SαTα

= −βm(S,T) +∑

0≤k≤m−1

(−1)k(m

k

) ∑|α|=k+1

k!(α1 + · · ·+ αd)

α1!. · · · .αd!SαTα

+∑

|α|=m+1

m!(α1 + · · ·+ αd)

α1!.α2....αd!SαTα = −βm(S,T)

+∑

1≤j≤d

∑0≤k≤m−1

(−1)k(m

k

) ∑|α|=k+1

k!αjα1!.α2! · · ·αd!(

SjSα1 · · ·Sαj−1

j Sαj+1

j+1 · · ·Sαdd Tα1 · · ·Tαj−1

j Tαj+1

j+1 · · ·Tαdd Tj

)+∑

1≤j≤d

∑|α|=m+1

m!αjα1!.α2!....αd!

SjSα1 ...S

αj−1j S

αj+1

j+1 ...Sαdd Tα1 ...T

αj−1j T

αj+1

j+1 ...Tαdd Tj

Page 471: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE JOINT (m, q)-PARTIAL ISOMETRIES 457

= −βm(S,T) +∑

1≤j≤d

∑0≤k≤m−1

(−1)k(m

k

) ∑|β|=k

k!

β!SjS

βTβTj

+∑

1≤j≤d

∑|α|=m

m!

β!SjS

βTβTj

= −βm(S,T) +∑

1≤j≤d

∑0≤k≤m

(−1)k(m

k

) ∑|β|=k

k1

β!SjS

βTβTj

= −βm(S,T) +∑

1≤j≤dSjβm(S,T)Tj .

Which completed the proof.

Remark 4.3. From Lemma 4.1, it is clear that if S is a joint m-left inverse(resp. m-right inverse) of T, then S is an joint m-left inverse (resp. m-rightinverse) of T for all integer n ≥ m.

For k, n ∈ N denote the (descending Pochhammer) symbol by n(k), i.e.

n(k) =

0, if n = 00 if n > 0 and k > n(nk

)k! if n > 0 and k ≤ n.

Proposition 4.1. Let S = (S1, . . . , Sd) ∈ B(H)d and T = (T1, . . . , Td) ∈ B(H)d

are commuting operators. Then the following properties hold:

1. ∑|α|=n

n!

α!SαTα =

∑0≤k≤n

n(k)

k!βk(S,T), for all n = 0, 1, ....

2. If S is a joint m-left inverse of T, then

∑|α|=n

n!

α!SαTα =

∑0≤k≤m−1

n(k)

k!βk(S,T), for all n = 0, 1, ....

Proof. 1. We prove the statement by indication on n. For n = 0, 1 the state-ment is true. Suppose that the statement is true for n.

Form the identity

βn+1(S,T) =∑

0≤k≤n+1

(−1)n+1−k(n+ 1

k

) ∑|α|=k

k!

α!SαTα

it follows that∑|α|=n+1

(n+ 1)!

α!SαTα = βn+1(S,T)−

∑0≤k≤n

(−1)n+1−k(n+ 1

k

) ∑|α|=k

k!

α!SαTα.

Page 472: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

458 OULD AHMED MAHMOUD SID AHMED

By the assumption and similar calculation as in [5] we obtained

∑|α|=n+1

(n+ 1)!

α!SαTα

= βn+1(S,T)−∑

0≤k≤n(−1)n+1−k

(n+ 1

k

) ∑0≤j≤k

k(j)

j!βj(S,T)

= βn+1(S,T)−∑

0≤j≤nβj(S,T)

( ∑j≤k≤n

(−1)n+1−k(n+ 1

k

)k(j)

j!

)

= βn+1(S,T)−∑

0≤k≤n

(n+ 1)(j)

j!βj(S,T)

( ∑0≤r≤n−j

(−1)n+1−j−r(n+ 1− j

r

)︸ ︷︷ ︸

=−1

)

=∑

0≤j≤n+1

(n+ 1)(j)

j!βj(S,T).

2. The result follows immediately from the fact that if S is a m-left inverseof T then βk(S,T) = 0 for all k ≥ m (see Lemma 4.1).

The following proposition is a generalization of [[22], Lemmas 3.1 and 3.2 ].

Proposition 4.2. Let T = (T1, . . . , Td) ∈ B(H)d be a commuting tuple of oper-ators. The following statements hold.

(1) If T possesses a joint 2-left inverse S = (S1, . . . , Sd), then

(4.4)∑|α|=n

n!

α!SαTα = (1− n)IH + n

( ∑1≤j≤d

SjTj

), ∀ n ∈ N.

(2) If T possesses a joint 2-right inverse R = (R1, . . . , Rd), then

(4.5)∑|α|=n

n!

α!TαRα = (1− n)IH + n

( ∑1≤j≤d

TjRj

), ∀ n ∈ N.

Proof. We shall prove equality (4.4) by induction on n. For n = 0 or n = 1 itis clear. Assume that (4.4) is true for n and prove it for n+ 1. Indeed, a simplecalculation shows that

∑|α|=n+1

(n+ 1)!

α!SαTα =

∑α1+···+αd=n+1

(n+ 1)n!

α1! · · ·αd!SαTα

Page 473: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE JOINT (m, q)-PARTIAL ISOMETRIES 459

=∑

α1+···+αd=n+1

(α1 + · · ·+ αd)n!

α1! · · ·αd!SαTα

=∑

1≤k≤d

( ∑α1+···+αk−1+···+αd=n

n!

α1! · · · (αk − 1)! · · ·αd!SkS

α11 · · ·S

αk−1k · · ·Sαdd

· Tα11 · · ·T

αk−1k · · ·Tαdd Tk

)=∑

1≤k≤dSk

( ∑|β|=n

n!

β!SβTβ

)Tk.

Since T possesses a joint 2-left inverse tuple S, it follow from the inductionhypothesis and (4.3) that

∑|β|=n+1

(n+ 1)!

α!SαTα

=∑

1≤k≤dSk

( ∑|β|=n

n!

β!SβTβ

)Tk

=∑

1≤k≤dSk

((1− n)IH + n

∑1≤j≤d

SjTj

)Tk

= (1− n)∑

1≤k≤dSkTk + n

∑1≤j, k≤d

SkSjTkTj

= (1− n)∑

1≤k≤dSkTk + n

( ∑1≤k≤d

S2kT

2k + 2

∑1≤j<k≤d

SjSkTjTk

)

= (1− n)∑

1≤k≤dSkTk + n

(− IH + 2

∑1≤j≤d

SjTj

)

= −nIH + (n+ 1)

( ∑1≤k≤d

SkTk

),

so that (4.4) holds for n+1. Exchanging S = R and T and similar to the aboveproof, we can prove that (4.5) holds.

Theorem 4.1. Let T = (T1, . . . , Td) ∈ B(H)d be a commuting d-tuple such thatT possesses a joint m-left inverse S = (S1, . . . , Sd) ∈ B(H)d, then the followingstatements hold:

(1) [0] ⊂ σap(T),

(2) If λ = (λ1, . . . , λd) ∈ σap(T), then 1 ∈ σap(∑

1≤j≤d λjSj),

(3) If λ = (λ1, . . . , λd) ∈ σp(T), then 1 ∈ σp(∑

1≤j≤d λjSj).

Page 474: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

460 OULD AHMED MAHMOUD SID AHMED

Proof. (1) Suppose contrary to our claim that [0] ⊂ σap(T) and let λ =(λ1, ..., λd) ∈ [0]. Then there exists a sequence (xn)n ∈ H such that

∥xn∥ = 1 and (Tj − λj)xn −→ 0 as n −→ +∞ for j = 1, 2, ..., d.

For αj ≥ 1 we deduce that

(Tαjj − λ

αjj )xn −→ 0 as n −→ +∞ for j = 1, 2, ..., d

which mean that (Tα − λα)xn −→ 0 and hence,(SαTα − λαSα)xn −→ 0.Now, we get(

SαTα − λαSα)xn −→ 0

=⇒∑

0≤k≤m(−1)m−k

(m

k

) ∑|α|=k

k!

α!

(SαTα − λαSα

)xn −→ 0

=⇒ (−1)mxn +∑

1≤k≤m(−1)m−k

(m

k

) ∑|α|=k

k!

α!

( ∏1≤j≤d

λαjj

)Sαxn −→ 0

=⇒ xn −→ 0 as n −→ 0 (since λ ∈ [0]),

which is impossible.(2) Let λ = (λ1, ..., λd) ∈ σap(T), then there exists a sequence (xn)n ∈ H

such that

∥xn∥ = 1 and (Tj − λj)xn −→ 0 as n −→ +∞ for j = 1, . . . , d.

(SαTα − λαSα

)xn −→ 0

=⇒∑

0≤k≤m(−1)m−k

(m

k

) ∑|α|=k

k!

α!

(SαTα − λαSα

)xn −→ 0

=⇒∑

0≤k≤m(−1)m−k

(m

k

) ∑|α|=k

k!

α!

( ∏1≤j≤d

λαjj

)Sαxn −→ 0

=⇒(IH −

∑1≤j≤d

λjSj

)mxn −→ 0 as n −→∞.

We deduce that (I −∑

1≤j≤d λjSj) is not bounded from below. Consequently,1 ∈ σap(

∑1≤j≤d λjSj) as required.

(3) The argument is similar to one given in (2). This achieves the proof ofthe Theorem.

The proof of the following theorem is similar to the proof of Theorem 4.1, so weomit it.

Page 475: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE JOINT (m, q)-PARTIAL ISOMETRIES 461

Theorem 4.2. Let T = (T1, . . . , Td) ∈ B(H)d be a commuting tuple of operatorssuch that T possesses a joint m-right inverse R = (R1, . . . , Rd) ∈ B(H)d, thenthe following statements hold:

(1) [0] ⊂ σap(R).

(2) If λ = (λ1, . . . , λd) ∈ σap(R), then 1 ∈ σap(∑

1≤j≤d λjTj).

(3) If λ = (λ1, . . . , λd) ∈ σp(R), then 1 ∈ σp(∑

1≤j≤d λjTj).

Remark 4.4. When d = 1, the Theorem 4.2 is proved in ([22], Lemma 3.4).

Acknowledgments

The author would like to express his warm thanks to the referee for commentsand many valuable suggestions.

References

[1] J. Agler and M. Stankus, m-isometric transformations of Hilbert Space, I,Integral Equations and Operator Theory, 21 (1995), 383-429.

[2] J. Agler, M. Stankus, m-isometric transformations of Hilbert Space, II,Integral Equations and Operator Theory, 23 (1) (1995), 1–48.

[3] J. Agler, M. Stankus, m-isometric transformations of Hilbert space, III,Integral Equations and Operator Theory, 24 (4) (1996), 379–421.

[4] C. G. Ambrozie, M. Englis and V. Muller, Operator tuples and analyticmodels over general domains in Cn, J. Operator Theory, 47 (2002), 287–302.

[5] F. Bayart, m-isometries on Banach spaces, Math. Nachr., 284 (2011), 2141–2147.

[6] T. Bermudez, A. Martinon, J. A. Noda, Products of m-isometries, LinearAlgebra and its Applications, 438 (2013), 80–86.

[7] T. Bermudez, A. Martinon, V. Muller and J. A. Noda, Perturbation of m-isometries by nilpotent operators, Abstr. Appl. Anal., vol.2014. Article ID745479, 6 pages.

[8] T. Bermudez, A. Martinon and E. Negrın, Weighted shift operators whichare m-isometries, Integral Equations Operator Theory, 68 (2010), no. 3,301– 312.

[9] M. Cho, I.H. Jeon, I.B. Jung, J.I. Lee, K. Tanahashi, Joint spectra of n-tuples of generalized Aluthge transformations, Rev. Roumaine Math. PuresAppl., 46 (6) (2001), 725–730.

Page 476: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

462 OULD AHMED MAHMOUD SID AHMED

[10] M. Cho,V. Muller, Spectral commutativity of multioperators, FunctionalAnalysis Approximation and Computation 4:1 (2012), 21-25.

[11] M. Cho and W. Zelazko, On geometric spectral radius of commuting n-tuples of operators, Hokkaido Math. J., 21(2):251–258, 1992.

[12] M. Cho, I. H. Jeon, J. I. Lee, Joint spectra of doubly commuting n-tuples ofoperators and their Aluthge transforms, Nihonkai Math. J., 11 (1) (2000),87–96.

[13] M. Cho, R. E. Curto, T. Huruya, n-Tuples of operators satisfying σT (AB) =σT (BA), Linear Algebra Appl., 341 (2002), 291–298.

[14] B. P. Duggal and V. Muller, Tensor product of left n-invertible operators,Studia Math., 215 (2013), 113–125.

[15] B.P. Duggal, Tensor product of n-isometries, Linear Alg. Appl., 437(2012),307-318.

[16] J. Gleason and S. Richter, m-Isometric Commuting Tuples of Operatorson a Hilbert Space, Integral equation and operator theory, Vol. 56, No. 2(2006), 181-196.

[17] H. Ezzahraoui, On m-generalized invertible operators on Banach spaces,Ann. Funct. Anal. Volume 7, Number, 4 (2016), 609–621.

[18] J. Gleason, Quasinormality of Toeplitz with Analytic symbols, HoustonJournal of Mathematics. Volume 32, No. 1, (2006), 293–298.

[19] C. Gu, Structures of left n-invertible operators and their applications, Stu-dia Mathematica, 226 (3), (2015).

[20] P. H. W. Hoffmann and M. Mackey, (m, p) and (m,∞)-isometric operatortuples on normed spaces, Asian-Eur. J. Math., Vol. 8, No. 2 (2015).

[21] O. A. Mahmoud Sid Ahmed, Generalization of m-Partial isometries ona Hilbert space, International Journal of Pure and Applied MathematicsVolume 104 No. 4 (2015), 599–619.

[22] O. A. Mahmoud Sid Ahmed, Some properties of m-isometries and m-invertible operators on Banach spaces, Acta Math. Sci. Ser. B Engl. Ed.,32 (2012), 520–530.

[23] A. Saddi and O. A. Mahmoud Sid Ahmed, m-partial isometries on Hilbertspaces, Intern. J. Funct. Anal. Operators Theory Appl., 2 (2010), No. 1,67–83.

[24] Z. Slodkowski and W. Zelazko, On joint spectra of commuting families ofoperators, Studia Math., 50 (1974), 127-148.

Page 477: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE JOINT (m, q)-PARTIAL ISOMETRIES 463

[25] R. Soltani, B. Khani Robati, K. Hedayatian, Hypercyclic tuples of the ad-joint of the weighted composition operators, Turk. J. Math., 36 (2012) ,452–462.

[26] J. L. Taylor, A joint spectrum for several commuting operators, J. Funct.Anal., 6 (1970), 172-191.

Accepted: 5.01.2018

Page 478: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (464–473) 464

SEPARATION AXIOMS IN TOPOLOGICAL ORDEREDSPACES

S. ShanthiDepartment of MathematicsArignar Anna Govt. Arts CollegeNamakkal -637 001Tamilnadu, [email protected]

N. RajeshDepartment of Mathematics

Rajah Serfoji Govt. College

Thanjavur-613005

Tamilnadu, India

nrajesh [email protected]

Abstract. In this paper, we introduce and study some new type of separation axiomsin topological ordered spaces via ω-open sets.

Keywords: ω-open sets, topological ordered space.

1. Introduction

Generalized open sets play a very important role in General Topology and theyare now the research topics of many topologists worldwide. Indeed a significanttheme in General Topology and Real Analysis concerns the various modifiedforms of continuity, separation axioms etc. by utilizing generalized open sets.One of the most well known notions and also an inspiration source is the notionof semiopen sets introduced by Levine in 1963. A topological ordered space(X, τ,≤) is a topological space (X, τ) equipped with a partial order ≤ (thatis, reflexive, transitive and antisymetric). A subset A of (X, τ,≤) is said tobe increasing (resp. decreasing) if A = x ∈ X : a ≤ x for a ∈ A (resp.A = x ∈ X : x ≤ a for some a ∈ A), that is, if A = ∪

a∈A[a,→] (resp. A =

∪a∈A

[→, a]), where [a,→] = x ∈ X : a ≤ x (resp. [→, a] = x ∈ X : x ≤ a).In this paper, we introduce and study some new type of separation axioms intopological ordered spaces via ω-open sets.

2. Preliminaries

For a subset A of a topological space (X, τ), Cl(A) and Int(A) denote the closureof A and the interior of A, respectively.

Page 479: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SEPARATION AXIOMS IN TOPOLOGICAL ORDERED SPACES 465

Definition 2.1. A subset S of a topological space (X, τ) is said to be semiopen[3] if S ⊂ Cl(Int(S)).

Definition 2.2 ([9]). A subset A of a topological space (X, τ) is said to be anω-closed set if Cl(A) ⊂ U whenever A ⊂ U and U is semiopen in (X, τ). Thecomplement of an ω-closed set is called an ω-open set. The family of all ω-open(ω-closed) subsets of (X, τ) is denoted by τω (resp. ωC(X)).

Definition 2.3 ([10]). The intersection of all ω-closed sets containing A ⊂ Xis called the ω-closure of A and is denoted by ωCl(A). The union of all ω-opensets contained in A ⊂ X is called the ω-interior of A and is denoted by ω Int(A).

Definition 2.4 ([7]). A subset M(x) of a topological space (X, τ) is called anω-neighbourhood of a point x ∈ X if there exists an ω-open set S such thatx ∈ S ⊂M(x).

Definition 2.5 ([10]). A function f : (X, τ)→ (Y, σ) is said to be ω-irresoluteif f−1(U) ∈ τω for every U ∈ σω.

Definition 2.6. A topological space (X, τ) is said to be:

1. ω-T1 [6] if for every x, y ∈ X, x = y, there exist U, V ∈ τω such thatx ∈ U , y /∈ V and y ∈ V , x /∈ U .

2. ω-T2 [6] if for every x, y ∈ X, x = y, there exist U, V ∈ τω such thatx ∈ U , y /∈ V and y ∈ V , x /∈ U and U ∩ V = ∅.

3. ω-regular [10] if for any closed set F in X and a ∈ X\F , there existdisjoint ω-open sets U and V in X containing a and F , respectively.

Definition 2.7 ([4]). A topological ordered space (X, τ,≤) is said to be upper(resp. lower) T1-ordered if for each pair of elements a b (that is, a is notrelated to b) in X there exists a decreasing (resp. increasing) open set U con-taining b (resp. a) such that a /∈ U (resp. b /∈ U). (X, τ,≤) is said to beT1-ordered if it is both lower and upper T1-ordered.

Definition 2.8 ([4]). A topological ordered space (X, τ,≤) is said to be T2-ordered if for each pair of elements a b in x there exist disjoint open sets Uand V in X containing a and b respectively, U is increasing and V is decreasing.

Definition 2.9 ([4]). A topological ordered space (X, τ,≤) is said to be upper(resp. lower) regularly ordered if for each increasing (resp. decreasing) closedset F in X and a /∈ F there exist disjoint open sets U and V containing a andF respectively, U is decreasing (resp. increasing) and V is increasing (resp.decreasing). (X, τ,≤) is said to be regularly ordered if it is both lower and upperregularly ordered.

Page 480: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

466 S. SHANTHI and N. RAJESH

3. On ω-T1 and ω-T2 ordered spaces

Definition 3.1. Let (X, τ,≤) be a topological ordered space and A a subset ofX. Define:Iω(A) = ∩F : F is an increasing ω-closed subset of X containing A,Dω(A) = ∩K : K is a decreasing ω-closed subset of X containing A,Ioω(A) = ∪G : G is an increasing ω-open subset of X contained in A,Doω(A) = ∪H : H is an decreasing ω-open subset of X contained in A,Cleraly, Iω(A) (resp. Dω(A)) is the smallest increasing (resp. decreasing) ω-closed subset of X containing A and Ioω(A) (resp.Doω(A)) is the largest increas-ing (resp. decreasing) ω-open subset of X contained in A.

Proposition 3.2. For any subset A of a topological ordered space (X, τ,≤), thefollowing hold:

1. X\Iω(A) = Doω(X\A).

2. X\Dω(A) = Ioω(X\A).

3. X\Ioω(A) = Dω(X\A).

4. X\Doω(A) = Iω(X\A).

Proof. We shall prove (1) only, (2), (3) and (4) can be proved in a similarmanner.

(1) Since Iω(A) is an ω-closed increasing set containing A, X\Iω(A) is anω-open decreasing set such that X\Iω(A) ⊂ X\A. Let U be an another ω-opendecreasing set such that U ⊂ X\A. Then X\U is an ω-closed increasing setsuch that X\U ⊃ A. It follows that Iω(A) ⊂ X\U . That is U ⊂ X\Iω(A).Thus, X\Iω(A) is the largest ω-open decreasing set such that X\Iω(A) ⊂ X\A.That is X\Iω(A) = Doω(X\A).

Lemma 3.3. Let (X, τ,≤) be a topological ordered space and A a subset of X.Then x ∈ Iω(A) (resp. x ∈ Dω(A)) if and only if for every decreasing (resp.increasing) ω-open subset U of X containing x, U ∩A = ∅.

Proof. Let U be a decreasing ω-open subset ofX containing x such that U∩A =∅. Then X\U is an increasing ω-closed subset of X containing A. Therefore,Iω(A) ⊂ X\U . Thus x /∈ Iω(A). Conversely, if x /∈ Iω(A). Then X\Iω(A) is adecreasing ω-open subset of X containing x, but disjoint from A. The case ofDω(A) can be deal similarly.

Definition 3.4. A topological ordered space (X, τ,≤) is said to be upper (resp.lower) ω-T1-ordered if for each pair of elements a b (that is, a is not relatedto b) in X there exists a decreasing (resp. increasing) ω-open set U containingb (resp. a) such that a /∈ U (resp. b /∈ U). (X, τ,≤) is said to be ω-T1-orderedif it is both lower and upper ω-T1-ordered.

Page 481: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SEPARATION AXIOMS IN TOPOLOGICAL ORDERED SPACES 467

Clearly every T1-ordered space is ω-T1-ordered and every ω-T1-ordered spaceis ω-T1 but the converses are not true, in general.

Example 3.5. Let X = a, b, c be equipped with the topology τ = ∅, X, a,b, a, b and with the partial order ≤ defined as a ≤ a, a ≤ b, a ≤ c, b ≤b, c ≤ b, c ≤ c. Then (X, τ,≤) is an ω-T1 space but not T1-ordered.

Example 3.6. Let X = a, b, c be equipped with the topology τ = ∅, X, a,b, a, b and with the partial order ≤ defined as a ≤ a, a ≤ b, a ≤ c, b ≤b, c ≤ b, c ≤ c. Then (X, τ,≤) is an ω-T1 space but not ω-T1 ordered.

Theorem 3.7. For a topological ordered space (X, τ,≤), the following state-ments are equivalent:

1. (X, τ,≤) is lower (resp. upper) ω-T1-ordered,

2. for each pair a b of X, there exists an ω-open set U containing a (resp.b) such that x b (resp. a x) for all x ∈ U ,

3. for each x ∈ X, [←, x] (resp. [x,→]) is ω-closed,

4. when the net xαα∈A ω-converges to a and xα ≤ b (resp. b ≤ xα) for allα ∈ A, then a ≤ b (resp. b ≤ a).

Proof. We shall prove the theorem for lower ω-T1-ordered spaces only. (1) ⇒(2): Let a b. Then by hypothesis, there exists an increasing ω-open set Ucontaining a such that b /∈ U . If x ∈ U and x ≤ b, then b ∈ U , a contradiction.(2) ⇒ (3): Let y ∈ X\[←, x]. Then y x. Then there exists an ω-open set Ucontaining y such that u x for all u ∈ U . That is, y ∈ U ⊂ X\[←, x]. Hence[←, x] is ω-closed.(3)⇒ (1): Obvious.(1)⇒ (4): Let xαα∈A be a net in X ω-converges to a and xα ≤ b for all α ∈ A.If possible a b, then by hypothesis, X\[←, x] is an ω-open set containing a.Then there exists λ ∈ A such that xα ∈ X\[←, x] for all α ≤ λ. That is xα bfor all α ≥ λ, which is a contradiction.(4)⇒ (1): Let X be not lower ω-T1-ordered. Then there exists a pair a b in Xsuch that for every ω-open set U containing a, there exists xu ∈ U with xu ≤ b.Let U be the collection of all ω-open sets containing a, then U is directed byinclusion and the net xuu∈U ω-converges to a. By hypothesis a ≤ b, which isa contradiction.

Corollary 3.8. If (X, τ,≤) is lower (upper) ω-T1-ordered and τ ≤ τ⋆, then(X, τ⋆,≤) is also lower (upper) ω-T1-ordered.

Theorem 3.9. A topological ordered space (X, τ,≤) is ω-T1-ordered if and onlyif for each x ∈ X, there exists an ω-T1-ordered ω-open set in X which is bothincreasing and decreasing containing x.

Page 482: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

468 S. SHANTHI and N. RAJESH

Proof. If X is ω-T1-ordered, then X is the required set for each x ∈ X. Con-versely, let a b in X. Then, by hypothesis, there exist ω-T1-ordered ω-opensets U1 and U2 in X containing a and b, respectively, where U1 and U2 are bothincreasing and decreasing sets. If b /∈ U1 and a /∈ U2, then there is nothing toprove. But if b ∈ U1 (resp. a ∈ U2), then there exist ω-open sets V and W in U1

(resp. U2) containing a and b, respectively, V is increasing and W is decreasingin U1 (resp. U2) also b /∈ V and a /∈ W . Since U1 (resp. U2) is both increasingand decreasing and it also an ω-open subset of X, V is an increasing and W isa decreasing ω-open subsets of X. Hence (X, τ,≤) is ω-T1-ordered.

Theorem 3.10. Let f be an order preserving (that is, x ≤ y in X if and onlyif f(x) ≤⋆ f(y) in X⋆) ω-irresolute function from a topological ordered space(X, τ,≤) to a topological ordered space (X⋆, τ⋆,≤⋆). If (X⋆, τ⋆,≤⋆) is ω-T1-ordered, then (X, τ,≤) is also ω-T1-ordered.

Proof. Let a b in X. Then f(a) ⋆ f(b) in X. Then there exists anincreasing ω-open set U⋆ in X⋆ containing f(a) but f(b) /∈ U⋆. Since f is orderpreserving and ω-irresolute, f−1(U⋆) = U is an increasing ω-open subset of X.Also, a ∈ U and b /∈ U . Hence (X, τ,≤) is lower ω-T1-ordered. Similarly, wecan prove (X, τ,≤) is upper ω-T1-ordered.

Definition 3.11. A topological ordered space (X, τ,≤) is called a Cω-space ifwhenever F is an ω-closed subset of X. i(F ) and d(F ) are also ω-closed subsetsof X, where i(F ) = ∪[x,→] : x ∈ F and d(F ) = ∪[←, x] : x ∈ F.

Definition 3.12 ([5]). Let f be a function from (X, τ,≤) onto (X, τ⋆,≤⋆). Then≤⋆ is called a quotient order of ≤ induced by f if x⋆ ≤⋆ y⋆ for x⋆, y⋆ ∈ X⋆ ifand only if there exist x ∈ f−1(x⋆), y ∈ f−1(y⋆) such that x ≤ y.

Theorem 3.13. Suppose (X, τ,≤) is a Cω-space, ω-T1-ordered space and f anω-irresolute ω⋆-closed function of (X, τ,≤) onto (X⋆, τ⋆,≤⋆), where ≤⋆ is thequotient order induced by f . Then (X⋆, τ⋆,≤⋆) is also ω-T1-ordered space.

Proof. We will first show that (X⋆, τ⋆,≤⋆) is a Cω-space. Let F ⋆ be an ω-closed subset of X⋆. Then f−1(F ⋆) is an ω-closed subset of X. Then iX⋆(F ⋆) =f(iX(f−1(F ⋆))), dX⋆(F ⋆) = f(dX(f−1(F ⋆))). Hence iX⋆(F ⋆) and dX⋆(F ⋆) areω-closed sets in X⋆ as f is ω-irresolute and ω-closed function. Now, to provethe theorem it is sufficient to show that every ω-T1, Cω-space is ω-T1-ordered.If (X, τ,≤) is an ω-T1 Cω-space, then x is ω-closed for all x ∈ X. Since(X, τ,≤) is an Cω-space, [x,→] and [←, x] are ω-closed subsets of X for all x.Hence (X⋆, τ⋆,≤⋆) is also ω-T1-ordered space.

Definition 3.14. A topological ordered space (X, τ,≤) is said to be ω-T2-orderedif for each pair of elements a b in x there exist disjoint ω-open sets U and Vin X containing a and b, respectively, U is increasing and V is decreasing.

Page 483: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SEPARATION AXIOMS IN TOPOLOGICAL ORDERED SPACES 469

Example 3.15. Let X = a, b, c be equipped with the topology τ = ∅, X, a,b, a, b and with the partial order ≤ defined as a ≤ a, a ≤ b, a ≤ c, b ≤b, c ≤ b, c ≤ c. Then (X, τ,≤) is an ω-T2 space but not T2-ordered.

Example 3.16. Let X = a, b, c be equipped with the topology τ = ∅, X, a,b, a, b and with the partial order ≤ defined as a ≤ a, a ≤ b, a ≤ c, b ≤b, c ≤ b, c ≤ c. Then (X, τ,≤) is an ω-T2 space but not ω-T2 ordered.

Theorem 3.17. A topological ordered space (X, τ,≤) is ω-T2-ordered if andonly if for each x ∈ X, there exists an increasing (resp. decreasing) ω-clopensubset of X containing x which is ω-T2-ordered.

Proof. If X is ω-T2-ordered, then X is the required increasing (resp. decreas-ing) ω-clopen subset of X for all x ∈ X. Conversely, let x y in X. Byhypothesis, there exists an increasing ω-clopen set V in X containing x. Ify ∈ V , then nothing to prove. If y /∈ V . Then X\V is a decreasing ω-clopensubset of X containing y. Hence (X, τ,≤) is ω-T2-ordered. Dually, we can provethe theorem for decreasing ω-clopen subsets of X.

Theorem 3.18. A topological ordered space (X, τ,≤) is ω-T2-ordered if andonly if for each pair of points x y in X, there exists an increasing (resp.decreasing) ω-irresolute function f of a space (X, τ,≤) into a ω-T2-ordered space(X⋆, τ⋆,≤⋆) such that f(x) =⋆ f(y) (resp. f(y) ⋆ f(x)).

Proof. If (X, τ,≤) is ω-T2-ordered then the identity mapping is the requiredfunction. Conversely, let x y in X. By hypothesis, there exists an increasingω-irresolute mapping f of a space X into an ω-T2-ordered space (X⋆, τ⋆,≤⋆)with f(x) =⋆ f(y). Therefore, there exist disjoint ω-open sets U⋆ and V ⋆ inX⋆ containing f(x) and f(y), respectively, where U⋆ is increasing and V ⋆ isdecreasing. Since f is increasing ω-irresolute, f−1(U⋆) is an increasing ω-openset containing x and f−1(V ⋆) is a decreasing ω-open set containing y. Alsof−1(U⋆) ∩ f−1(V ⋆) = ∅. Hence (X, τ,≤) is ω-T2-ordered. Analogously we canprove the theorem for decreasing functions.

Theorem 3.19. A topological ordered space (X, τ,≤) is ω-T2 if and only iffor each x ∈ X the intersection of all increasing (resp. decreasing) ω-closedi-ω-neighbourhoods (resp. d-ω-neighbourhoods) of x is [x⋆,→] (resp. [←, x]).

Proof. Let (X, τ,≤) be an ω-T2-ordered space and x ∈ X. If G⋆ = ∩F : F isan increasing ω-closed i-ω-neighbourhood of x. Clearly, [x⋆,→] ⊂ G⋆. Let y /∈[x⋆,→]. Then x y. Then there exist disjoint ω-open sets U and V containingx and y, respectively such that U is increasing and V is decreasing. Hencex ∈ U ⊂ X\V . Therefore, X\V is an increasing ω-closed i-ω-neighbourhood ofx and y /∈ X\V . Hence G⋆ = [x⋆,→]. Similarly, we can show that intersectionof all decreasing ω-closed i-ω-neighbourhoods of x is [←, x]. Conversely, letx ≤ y in X. Then y /∈ [x⋆,→]. By hypothesis, there exists an increasing ω-closed i-ω-neighbourhood F of x such that y /∈ F . Then y ∈ X\F , X\F is

Page 484: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

470 S. SHANTHI and N. RAJESH

a decreasing ω-open set. Also. there exists an increasing ω-open set U suchthat x ∈ U ⊂ F . Clearly, U (X\F ) = ∅. Hence (X, τ,≤) is ω-T2-ordered. Bydual argument we can prove that ω-T2-ordered if intersection of all decreasingω-closed d-ω-neighbourhoods of x is [x⋆,→] for all x ∈ X.

Theorem 3.20. Suppose (X, τ,≤) is an ω-T2-ordered space and f an one-to-one ω⋆-open and ω⋆-closed mapping of (X, τ,≤) onto (X⋆, τ⋆,≤⋆), where ≤⋆ isthe quotient order induced by f . Then (X⋆, τ⋆,≤⋆) is also ω-T2-ordered.

Proof. Let x⋆ ∈ X⋆ and F⋆ = ∩F ⋆ : F ⋆ is an increasing ω-closed i-ω-neighborhood of x⋆. Then [x⋆,→] ⊂ F⋆. Suppose y⋆ /∈ [x⋆,→], that is x⋆ ≤⋆ y⋆does not hold. Thus x y for x, y ∈ X such that f(x) = x⋆ and f(y) = y⋆.Therefore, there exists an increasing ω-closed i-ω-neighborhood F of x suchthat y /∈ F . Since f is one to one ω⋆-open and ω⋆-closed, f(F ) is an increasingω-closed i-ω-neighborhood of x⋆ not containing y⋆, that is F⋆ = [x⋆,→]. Henceby Theorem 3.19 (X⋆, τ⋆,≤⋆) is ω-T2-ordered.

4. Properties of ω-regularly ordered spaces

Definition 4.1. A topological ordered space (X, τ,≤) is said to be upper (resp.lower) ω-regularly ordered if for each increasing (resp. decreasing) closed setF in X and a /∈ F there exist disjoint ω-open sets U and V containing a andF respectively, U is decreasing (resp. increasing) and V is increasing (resp.decreasing). (X, τ,≤) is said to be ω-regularly ordered if it is both lower andupper ω-regularly ordered.

Remark 4.2. Clearly, every regularly ordered space is ω-regularly ordered. How-ever, the converse need not be true as can be true as can be seen from the fol-lowing example.

Example 4.3. Let X = a, b, c be equipped with the topology τ = ∅, X, a,b, a, b and with the partial order ≤ defined as a ≤ a, a ≤ b, a ≤ c, b ≤b, c ≤ b, c ≤ c. Then (X, τ,≤) is ω-regularly ordered, but not regularly ordered.

Example 4.4. Let X = a, b, c be equipped with the topology τ = ∅, X, a,b, a, b and with the partial order ≤ defined as a ≤ a, a ≤ b, b ≤ b, c ≤ c.Then (X, τ,≤) is ω-regular but not ω-regularly ordered.

Theorem 4.5. Every upper (resp. lower) ω-regularly ordered, upper (resp.lower) T1-ordered space is ω-T2-ordered.

Proof. Let (X, τ,≤) be an upper ω-regularly ordered, upper T1-ordered spaceand a b in X. Then [a,→] is an increasing closed subset of X not containingb. Thus there exist disjoint ω-open sets U , V in X such that [a,→] ⊂ U andb ∈ V,U is increasing and V is decreasing. Therefore, U and V are disjointω-open sets containing a and b respectively, U is increasing and V is decreasing.Hence, (X, τ,≤) is ω-T2-ordered.

Page 485: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SEPARATION AXIOMS IN TOPOLOGICAL ORDERED SPACES 471

Similarly, every lower ω-regularly ordered, lower T1-ordered space is ω-T2-ordered.

Definition 4.6. A subset A of topological ordered space (X, τ,≤) is said to be i-ω-neighborhood (resp. d-ω-neighborhood) of B ⊂ X, if there exists an increasing(resp. decreasing) ω-open set G in X such that B ⊂ G ⊂ A.

Theorem 4.7. For a topological ordered space (X, τ,≤), the following are equiv-alent:

1. (X, τ,≤) is lower (resp. upper) ω-regularly ordered.

2. For each x ∈ X and each increasing (resp. decreasing) open set U in Xcontaining x, there exists an increasing (resp. decreasing) ω-open set Vsuch that x ∈ V ⊂ Iω(V ) ⊂ U (resp. x ∈ V ⊂ Dω(V ) ⊂ U).

3. For every decreasing (resp. increasing) closed set F , the intersection ofall decreasing (resp. increasing) ω-closed d-ω-neighborhoods (resp. i-ω-neighborhoods) of F is exactly F .

4. For every nonempty set A and an increasing (resp. decreasing) open subsetB of X such that A∩B = ∅, there exists an increasing (resp. decreasing) ω-open set V in X such that A∩V = ∅ and Iω(V ) ⊂ B (resp. Dω(V ) ⊂ B).

5. For every nonempty set A and a decreasing (resp. increasing) closed setB such that A ∩ B = ∅, there exist disjoint ω-open sets U and V withA∩U = ∅, U is increasing (resp. decreasing) and B ⊂ V , V is decreasing(resp. increasing) in X.

6. When a net Xαα∈Λ is residually in each increasing (resp. decreasing)ω-open set containing a and a net yαα∈Λ is residually contained in eachdecreasing (resp. increasing) ω-open set containing a decreasing (resp.increasing) closed set F , xα ≤ yα for α ∈ Λ, then a ∈ F .

Proof. We shall prove the theorem for lower ω-regularly ordered spaces only.

(1)⇒(2): Let U be an increasing open subset of X containing x. Then, X\Uis a decreasing closed subset of X such that x /∈ X\U . Thus there exist disjointω-open sets V and W containing x and X\U respectively, V is increasing andW is decreasing in X. Since, V ⊂ X\W,X\W is increasing ω-closed, therefore,Iω(V ) ⊂ X\W ⊂ U . Hence x ∈ V ⊂ Iω(V ) ⊂ X\W ⊂ U .

(2)⇒(3): Let F be a decreasing closed subset of X and F ⋆ = ∩K :: is adecreasing ω-closed, d-ω-neighborhood of F, then F ⊂ F ⋆. Let x /∈ F . Thenx ∈ X\F,X\F is an increasing ω-open set. Thus, there exists an increasing ω-open set U such that x /∈ U ⊂ Iω(U) ⊂ X\F . Therefore F ⊂ X\Iω(U) ⊂ X\U ,which implies that X\U is a decreasing ω-closed d-ω-neighborhood of F notcontaining x. That is x /∈ F ⋆. Hence F = F ⋆.

Page 486: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

472 S. SHANTHI and N. RAJESH

(3)⇒(4): Let A be a nonempty set of B an increasing open subset of X suchthat A ∩B = ∅. Then, there exists x ∈ X such that x ∈ A ∩B. By hypothesis,there exists a decreasing ω-closed d-ω-neighborhood K of X\B such that x /∈ K.Define, U = X\K. Then U is an increasing ω-open set such that U ∩ A = ∅.Since K is a d-ω-neighborhood of X\B, there exists a decreasing ω-open subsetW of X such that X\B ⊂ W ⊂ K. That is, U = X\K ⊂ X\W ⊂ B. ThenIω(U) ⊂ X\W ⊂ B.

(4)⇒(5): Let A be a nonempty set and let B a decreasing closed subset ofX such that A∩B = ∅. Then, X\B is an increasing open subset of X such thatA ∩ (X\B) = ∅. Thus by hypothesis, there exists an incresing ω-open set U inX such that A ∩ U = ∅ and Iω(U) ⊂ X\B. Define X\Iω(U) = V . Then, V isa decreasing ω-open subset of X containing B and disjoint from U .

(5)⇒(6): Let a and F be as given in (5) of the theorem with a /∈ F . Thenby hypothesis, there exist disjoint ω-open sets U, V in X such that a ∈ U , Uis increasing and F ⊂ V , V is decreasing in X. Thus there exists λ ∈ Λ suchthat xα ∈ U and yα ∈ V for all α ≥ λ. Then, xα yα for all α ≥ λ, otherwiseU ∩ V = ∅, which is contradiction. Hence a ∈ F .

(6)⇒(1): Suppose (X, τ,≤) is not lower ω-regularly ordered. Then, thereexists a decreasing closed set F in X and x ∈ X\F such that every increasingω-open set containing x intersects every decreasing ω-open set containing F .Let U denote the family of all increasing ω-open subsets of X containing x andV be the family of all decreasing ω-open subsets of X containing F . Then bothU and V are ordered and directed by inclusion. The product U × V may beordered by agreeing that (U1, V1) ≤ (U2, V2) if and only if U2 ⊂ U1 and V2 ⊂ V1.For each (U, V ) ∈ U × V, an element x(U,V ) may be selected in U ∩ V . The netx(U,V )(U,V )∈U×V is residually contained in each increasing ω-open subset of Xcontaining x and in each decreasing ω-open subset of X containing F . Hence(6) does not hold.

Definition 4.8 ([4]). Let (X, τ,≤) be a topological ordered space and Y ⊂ X.then, (Y, τy,≤y) with the induced order and induced topology is said to be τ -compatibly ordered if and only if for each τy-closed set F , increasing (resp. de-creasing) in Y , there exists a τ -closed set F ⋆, increasing (resp. decreasing) inX, such that F = F ⋆ ∩ Y .

Definition 4.9 ([1]). Let F be a mapping of (X, τ,≤) onto (X⋆, τ⋆,≤⋆). Thenf is called dual isotomic if f(x) ≤⋆ f(y) implies x ≤ y.

Definition 4.10. A mapping f : (X, τ,≤)→ (X⋆, τ⋆,≤⋆) is called weakly ordercontinuous if for each increasing (resp. decreasing τ -open, τ⋆-closed set U⋆,f−1(U⋆) is increasing (resp. decreasing) τ -open, τ -closed, respectively in X.

Theorem 4.11. Let (X, τ,≤) be an ω-regularly ordered space and f a dualisotonic, ω⋆-open and weakly order continuous mapping from (X, τ,≤) onto(X⋆, τ⋆,≤⋆). Then (X⋆, τ⋆,≤⋆), is also ω-regularly ordered.

Page 487: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SEPARATION AXIOMS IN TOPOLOGICAL ORDERED SPACES 473

Proof. Let F ⋆ be an increasing closed subset of X⋆ and a /∈ F ⋆. then f−1(F ⋆)is an increasing closed subset of X and f−1(a) /∈ f−1(F ⋆). Thus by hypothesis,there exist disjoint ω-open sets U and V such that f−1(a) ∈ U , U is decreasingand f−1(F ⋆) ⊂ V , V is increasing. Since f is dual isotonic and ω⋆-open, f(U) =U⋆ and f(V ) = V ⋆ are disjoint ω-open subset of X⋆ such that a ∈ U⋆. U⋆ isdecreasing and F ⋆ ⊂ V , V ⋆ is increasing. Hence, (X⋆, τ⋆,≤⋆) is upper ω-regularly ordered. Similarly (X⋆, τ⋆,≤⋆) is lower ω-regularly ordered.

References

[1] S. P. Arya and Kavita Gupta, New separation axioms in topological orderedspaces, Indian J. Pure Appl. Math., 22 (1991), 461-468.

[2] D. C. J. Burgess and S. D. Mccartan, Order-continuous functions and order-connected spaces, Proc. Camb. Phil. Soc., 38 (1970), 27-31.

[3] N. Levine, Semiopen sets and semicontinuity in topological spaces, Amer.Math. Monthly, 70 (1963), 36-41.

[4] S. D. Mccartan, Separation axioms for topological ordered spaces, Proc.Camb. Phil. Soc., 64 (1961), 965-973.

[5] T. Miwa, On images of topological ordered spaces under some quotient map-pings, Math. J. Okayama Univ, 18 (1975/76), 99-104.

[6] H. Maki and N. Rajesh, Characterizations of ω-like closed sets and separa-tion axioms in topological spaces (under preparation).

[7] L. Nachbin, Topology and order, D. Van. Nostrand Inc, pinceton, NewJeresey, 1965.

[8] Shanthi Leela and G. Balasubramanian, New separation axioms in orderedtopological spaces, Indian J. Pure Appl. Math., 33(7) (2002), 1011-1016.

[9] P. Sundaram and M. Sheik John, Weakly closed sets and weakly contin-uous maps in topological spaces, Proc. 82nd session of the Indian ScienceCongress, Calcutta, 1995 (P-49).

[10] M. Sheik John, A study on generalizations of closed sets and continuousmaps in topological spaces, Ph. D. Thesis, Bharathiyar University, Coim-batore, India (2002).

Accepted: 21.01.2018

Page 488: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (474–500) 474

CONFORMAL ANTI-INVARIANT SUBMERSIONS FROMKENMOTSU MANIFOLDS ONTO RIEMANNIANMANIFOLDS

Sushil Kumar∗

Department of Mathematics and AstronomyUniversity of [email protected]

Rajendra PrasadDepartment of Mathematics and Astronomy

University of Lucknow

Lucknow

India

[email protected]

Abstract. In this paper, we define conformal anti-invariant submersions from Ken-motsu manifolds onto Riemannian manifolds. Further we obtain some results on suchsubmersions from Kenmotsu manifolds into Riemannian manifolds admitting verticalor horizontal structural vector fields. Among the results we find necessary and sufficientconditions for conformal anti-invariant submersions to be totally geodesic. Moreover,we derive decomposition theorems by using the existence of conformal anti-invariantsubmersions. Finally, we give some examples of conformal anti-invariant submersionssuch that characteristic vector field ξ is horizontal or vertical.

Keywords: Riemannian submersion, conformal submersion, anti-invariant submer-sion, conformal anti-invariant submersion.

1. Introduction

The theory of Riemannian submersion between Riemannian manifolds was in-troduced by O’Neill [13] in 1966 and Gray [9] in 1967. It was useful if one shouldstudy such submersions between manifolds with differentiable structures. WhenWatson was studying almost Hermitian submersions between almost Hermitianmanifolds [16] in 1976, he found that the base manifold and each fiber havethe same kind of structure as the total space in most of the cases. We notethat almost Hermitian submersions have been extended to the almost contactmanifolds [6] in 1985. We know that Riemannian submersions are related withmathematical physics and have their applications in the Yang-Mills theory [15],supergravity and superstring theories ([12], [13]), Kaluza-Klein theory ([5], [11])etc.

∗. Corresponding author

Page 489: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CONFORMAL ANTI-INVARIANT SUBMERSIONS ... 475

On the other hand, as a generalization of Riemannian submersion, horizon-tally conformal submersion are introduced [3] and defined as follows: Considertwo Riemannian manifolds M of dimension m and N of dimension n with Rie-mannian metrics gM and gN respectivly. A smooth map f : (M, gM )→ (N, gN )between Riemannian manifolds is called a horizontally conformal submersion, ifthere is a positive function λ such that

(1.1) λ2gM (U, V ) = gN (f∗U, f∗V ),

for every U, V ∈ Γ(ker f∗)⊥. It is known that every Riemannian submersion is

a particular horizontally conformal submersion with λ = 1. Let f is a smoothmap between Riemannian manifolds and x ∈M . Then, f is called horizontallyweakly conformal map at x if either (i) f∗x = 0 or (ii) f∗x maps the horizontalspace H = (ker f∗)

⊥ conformally onto Tf(x)N, i.e., f∗x is surjective and f∗ sat-isfies the equation (1.1) for U, V vectors tangent to Hx. We call the point x acritical point if it satisfies the type (i) and we call the point x regular point if itsatisfies the type (ii). The square root λ(x) =

√∧(x) is called dilation, where

number ∧(x) is called the square dilation which is necessarily non-negative .If horizontally weakly conformal map f is said to be horizontally homothetic,then the gradient of their dilation λ is vertical, i.e., H(gradλ) = 0 at regularpoints. A horizontally weakly conformal map f is called horizontally conformalsubmersion if f has no critical points [3]. Thus, it follows that a Riemanniansubmersion is a horizontally conformal submersion with dilation identically one.The horizontal conformal maps were introduced independently by Fuglede in1978 [8] and by Ishihara in 1979 [12]. From the above argument, one can de-termine that the notion of horizontal conformal maps is a generalization of theidea of Riemannian submersions.

We denote the kernel space of f∗ by ker f∗ and consider the orthogonalcomplementary space H = (ker f∗)

⊥ to ker f∗. Then the tangent bundle of Mhas the following decomposition

(1.2) TM = (ker f∗)⊕ (ker f∗)⊥.

We also denote the range of f∗ by rangef∗ and consider the orthogonalcomplementary space (rangef∗)

⊥ to rangef∗ in the tangent bundle TN of N.Thus the tangent bundle TN of N has the following decomposition

(1.3) TN = (rangef∗)⊕ (rangef∗)⊥.

We know that Riemannian submersions are very special maps comparingwith conformal submersions. Although conformal maps do not preserve distancebetween points contrary to isometries, they preserve angles between vector fields.This property enables one to transfer certain properties of a manifold to anothermanifold by deforming such properties. The concept of conformal anti-invariantsubmersions from almost Hermitian manifolds onto Riemannian manifolds wasstudied by Akyol and Sahin [1].

Page 490: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

476 SUSHIL KUMAR and RAJENDRA PRASAD

In this paper, we study conformal anti-invariant submersions from Kenmotsumanifolds onto Riemannian manifolds. The paper is organized as follows. Inthe second section, we collect main notions and formulae which need for thispaper.

In section 3, we introduce conformal anti-invariant submersions from Ken-motsu manifolds onto Riemannian manifolds, investigates the geometry of leavesof the horizontal distribution and the vertical distribution. In this section wealso find necessary and sufficient conditions for a conformal anti-invariant sub-mersion to be totally geodesic.

In section 4, we consider conformal anti-invariant submersions from Ken-motsu manifolds onto Riemannian manifolds such that the characteristic vectorfield ξ is horizontal vector field. Finally in section 5, we give some examples ofconformal anti-invariant submersions such that the characteristic vector field ξis vertical or horizontal.

2. Preliminaries

Let M be an almost contact metric manifold. So there exist on M, a (1, 1)tensor field ϕ, a vector field ξ, a 1−form η and g is Riemannian metric such that

(2.1) ϕ2 = −I + η ⊗ ξ, ϕ ξ = 0, η ϕ = 0,

(2.2) g(X, ξ) = η(X), η(ξ) = 1,

and

(2.3) g(ϕX, ϕY ) = g(X,Y )− η(X)η(Y ), g(ϕX, Y ) = −g(X,ϕY ),

for any vector fields X and Y on M and I is the identity tensor field [2]. An

almost contact metric manifold M is also denoted by (M, ϕ, ξ, η, g).

An almost contact metric manifold M is called a Kenmotsu manifold if

(2.4) (∇Xϕ)Y = g(ϕX, Y )ξ − η(Y )ϕX,

for X and Y on M, where ∇ is the Riemannian connection of the Riemannianmetric g. From above equation, we have

(2.5) ∇Xξ = X − η(X)ξ.

Definition 1 ([3]). Let M and N are two Riemannian manifolds with Rieman-nian metrics gM and gN , respectively. If f is a differentiable map from (M, gM )to (N, gN ), then f is called semi-conformal or horizontally weakly conformal atp if either

(i) dfp = 0, or

Page 491: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CONFORMAL ANTI-INVARIANT SUBMERSIONS ... 477

(ii) dfp maps the horizontal space Hp = (ker(dfp))⊥ conformally onto Tf(p)N

i.e., dfp is surjective and there exists a number Λ(p) = 0 such that

(2.6) gN (df∗U, df∗V ) = Λ(p)gM (U, V ), (U, V ∈ Hp),

where p ∈M.

Watson introduced the fundamental tensors of a submersion in [13]. It isknown that the fundamental tensor play similar role to that of the second fun-damental form of an immersion. Defined O’Neill’s tensors T and A, for vectorfields E,F on M by

AEF = V∇HEHF +H∇HEVF,(2.7)

TEF = H∇VEVF + V∇VEHF,(2.8)

where V and H are the vertical and horizontal projections [7], and ∇ is Levi-Civita connection on M . On the other hand, from equations (2.7) and (2.8), wehave

∇XY = TXY + ∇XY,(2.9)

∇XU = H∇XU + TXU,(2.10)

∇UX = AUX + V∇UX,(2.11)

∇UV = H∇UV +AUV,(2.12)

for X,Y ∈ Γ(ker f∗) and U, V ∈ Γ(ker f∗)⊥, where V∇XY = ∇XY. If U is basic,

then AXU = H∇XU.It is seen that for p ∈ M , X ∈ Vp and U ∈ Hp the linear operators AU ,

TX : TpM → TpM, are skew-symmetric, that is

(2.13) g(AUE,F ) = −g(E,AUF ) and g(TXE,F ) = −g(E, TXF ),

for each E,F ∈ TpM. We have also defined the restriction of T to the verticaldistribution T |V×V is precisely the second fundamental form of the fibers of f .Since TV is skew-symmetric we get: f has totally geodesic fibers if and onlyif T ≡ 0. For the special case when f is horizontally conformal we have thefollowing:

Proposition 1 ([10], (2.1.2)). Let f be a horizontal conformal submersion be-tween Riemannian manifolds (M, gM ) and (N, gN ) with dilation λ and U, V behorizontal vectors, then

(2.14) AUV =1

2V[U, V ]− λ2gM (U, V )gradV(

1

λ2).

We know that the skew-symmetric part of A|H×H measures the obstructionintegrability of the horizontal distribution H.

Page 492: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

478 SUSHIL KUMAR and RAJENDRA PRASAD

Let f : (M, gM ) → (N, gN ) is a smooth map between Riemannian mani-folds. Then the differential of f∗ of f can be observed a section of the bundleHom(TM, f−1TN)→M, where f−1TN is the pullback bundle which has fibers(f−1TN)p = Tf(p)N has a connection ∇ induced from the Riemannian connec-

tion and ∇M the pullback connection. Then the second fundamental form of fis given by

(2.15) (∇f∗)(U, V ) = ∇fUf∗(V )− f∗(∇MU V ),

for vector fields U, V ∈ Γ(TM), where ∇f is the pullback connection. We knowthat the second fundamental form is symmetric.

Next, we find necessary and sufficient condition for conformal anti-invariantsubmersion to be totally geodesic. We recall that a differentiable map f betweentwo Riemannian manifolds is called totally geodesic if (∇f∗)(V,W ) = 0, for allV,W ∈ Γ(TM).

A geometric clarification of a totally geodesic map is that it maps everygeodesic in the total space into a geodesic in the base space in proportion to arclengths.

We know that the followings from [14]. Let B = M ×N be a manifold withRiemannian metric gB and assume that the canonical foliations DM and DN

intersect perpendicularly everywhere. Then gB is the metric tensor of(i) a twisted product M ×F N if and only if DM is totally geodesic foliation

and DN is totally umbilical foliation,(ii) a warped product M ×F N if and only if DM is totally geodesic foliation

and DN is a spheric foliation, i.e., it is umbilical and its mean curvature vectorfield is parallel,

We note in this case, from [4] we have ∇XU = X(lnF )U, for X ∈ Γ(TM)and U ∈ Γ(TN), where ∇ is the Riemannian connection on M ×N.

(iii) a usual product of Riemannian manifolds if and only if DM and DN

are totally geodesic foliations.Next, we explain a decomposition theorem related to the concept of twisted

product manifold. However, we first define the adjoint map of a map. Letf : (M, gM ) → (N, gN ) be a map between Riemannian manifolds (M, gM ) and(N, gN ). Then the adjoint map ∗f∗ of f∗ is characterized gM (X,∗ f∗pY ) =gN (f∗pX,Y ) by X ∈ TpM, Y ∈ Tf(p)N and p ∈ M. Considering fh∗ at eachp ∈M as a linear transformation

fh∗p : ((ker f∗)⊥(p), gM(p)((ker f∗)⊥p ))→ (rangef∗(q), gN(q)(rangef∗)(q)),

we will denote the adjoint fh∗(p) by ∗fh∗(p). Let fh∗(p) be the adjoint of fh∗(p) :

(TpM, gM(p))→ (T(q)N, gN(q)). The linear transformation (∗f∗p)h : (rangef∗(p))→

(ker f∗)⊥(p) defined (∗f∗(p))

hY =∗ fh∗(p)Y , where Y ∈ (ranrgef∗(p)), q = f(p), is

an isomorphism and (fh∗(p))−1 = (∗f∗p)

h =∗ fh∗(p).

Lastly, we recollection the subsequent lemma from [3].

Page 493: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CONFORMAL ANTI-INVARIANT SUBMERSIONS ... 479

Lemma 1. Let (M, gM ) and (N, gN ) are two Riemannian manifolds. If f :M → N horizontally conformal submersion between Riemannian manifolds,then for any horizontal vector fields U, V and vertical vector fields X,Y, we have

(i)∇df(U, V ) = U(lnλ)df(V ) + V (lnλ)df(U)− gM (U, V )df(gradlnλ);

(ii)∇df(X,Y ) = −df(AVXY );

(iii)∇df(U,X) = −df(∇MU X) = df((AH)∗UX).

where (AH)∗X is the adjoint of (AHX

) characterized by ⟨(AH)∗UE,F ⟩ = ⟨E,AHUF ⟩,

(E,F ∈ Γ(TM)).

3. Conformal anti-invariant submersions

In this section we are going to introduce and study conformal anti-invariantsubmersions from Kenmotsu manifolds onto Riemannian manifolds such thatthe characteristic vector field ξ is vertical vector field.

Definition 2. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. A horizontally conformal submersion f : (M,ϕ, ξ, η, gM )→ (N, gN ) with dilation λ is a called conformal anti-invariant submersion if thedistribution ker f∗ is anti-invariant with respect to ϕ i.e., ϕ(ker f∗) ⊆ (ker f∗)

⊥.We have ϕ(ker f∗)

⊥ ∩ ker f∗ = 0. We denote the complementary orthonormaldistribution to ϕ(ker f∗) of µ in (ker f∗)

⊥. Then we have

(3.1) (ker f∗)⊥ = ϕ(ker f∗)⊕ µ.

For any U ∈ Γ(ker f∗)⊥, we have

(3.2) ϕU = BU + CU,

where BU∈Γ(ker f∗) and CU∈Γ(µ). On the additional fact, since f∗(Γ(ker f∗)⊥)

= TN and f is a conformal submersion, for every X ∈ Γ(ker f∗) and U ∈(Γ(ker f∗)

⊥), using equation (3.2) we get 1λ2gN (f∗ϕU, f∗CX) = 0, which denotes

that

(3.3) TN = f∗(ϕ(ker f∗))⊕ f∗(µ).

Lemma 2. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion, then

(3.4) gM (CV, ϕX) = 0,

and

(3.5) gM (∇MU CV, ϕX) = −gM (CV, ϕAUX) + η(X)gM (CU,CV ),

for X ∈ Γ(ker f∗) and U, V ∈ (Γ(ker f∗)⊥).

Page 494: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

480 SUSHIL KUMAR and RAJENDRA PRASAD

Proof. For X ∈ Γ(ker f∗) and U, V ∈ (Γ(ker f∗)⊥), since BV ∈ Γ(ker f∗) and

ϕX ∈ (Γ(ker f∗)⊥), using equations (3.2) and (2.3), we have gM (CV, ϕX) =

0. Now, using equations (2.3), (2.11) and (3.4), we get gM (∇UCV, ϕX) =−gM (CV,∇UϕX),= −gM (CV, ϕAUX) + η(X)gM (CU,CV ), since ϕV∇UX ∈Γ(ϕ(ker f∗)).

Theorem 1. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion, then the followings are equivalent to each other:

(i) (ker f∗)⊥ is integrable,

(ii) 1λ2gN (∇fV f∗CU −∇

fUf∗CV, f∗ϕX) = gM (AUBV −AVBU, ϕX)

− gM (Hgradlnλ,CV )gM (U, ϕX) + gM (Hgradlnλ,CU)gM (V, ϕX)− 2gM (Hgradlnλ, ϕX)gM (CU, V ), for X ∈ Γ(ker f∗) and U, V ∈ (Γ(ker f∗)

⊥).

Proof. For X ∈ Γ(ker f∗) and U, V ∈ (Γ(ker f∗)⊥), since ϕV ∈ (Γ ker f∗ ⊕ µ)

and ϕX ∈ (Γ(ker f∗)⊥). Using equations (2.1), (2.3), (2.4) and (3.2), we get

gM ([U, V ], X) = gM (ϕ∇UV, ϕX) + η(X)η(∇UV )

−gM (ϕ∇V U, ϕX)− η(X)η(∇V U),

= gM (∇UϕV, ϕX)− gM (∇V ϕU, ϕX)− gM ([U, V ], ξ)η(X),

= gM (∇UBV, ϕX) + gM (∇UCV, ϕX)− gM (∇VBU, ϕX)

−gM (∇V CU, ϕX)− gM ([U, V ], ξ)η(X).

Since f is a conformal submersion, using equations (2.11) and (2.12), we get

gM ([U, V ], X) = gM (AUBV −AVBU, ϕX) +1

λ2gN (f∗∇UCV, f∗ϕX)

− 1

λ2gN (f∗∇V CU, f∗ϕX)− gM ([U, V ], ξ)η(X).

Using equations (2.5), (2.15), (3.4) and lemma 1(i), we get

gM ([U, V ], X) = gM (AUBV −AVBU, ϕX)− gM (Hgradlnλ,CV )gM (U, ϕX)

+gM (Hgradlnλ,CU)gM (V, ϕX)

−2gM (Hgradlnλ, ϕX)gM (CU, V )

− 1

λ2gN (∇fV f∗CU −∇

fUf∗CV, f∗ϕX).

which implies (i)⇔ (ii).

Theorem 2. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion, then any two of the following conditions imply the third:

(i) (ker f∗)⊥ is integrable,

(ii) f is horizontally homothetic,

(iii) 1λ2gN (∇fV f∗CU−∇

fUf∗CV, f∗ϕX) = gM (AUBV −AVBU, ϕX), for X ∈

Γ(ker f∗) and U, V ∈ (Γ(ker f∗)⊥).

Page 495: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CONFORMAL ANTI-INVARIANT SUBMERSIONS ... 481

Proof. For X ∈ Γ(ker f∗) and U, V ∈ (Γ(ker f∗)⊥), using Theorem (1), we get

gM ([U, V ], X) = gM (AUBV −AVBU, ϕX)− gM (U, ϕX)gM (Hgradlnλ,CV )

+gM (V, ϕX)gM (Hgradlnλ,CU)−2gM (CU, V )gM (Hgradlnλ, ϕX)

− 1

λ2gN (∇fV f∗CU −∇

fUf∗CV, f∗ϕX).

Now, using conditions (i) and (ii), we get (iii)

1

λ2gN (∇fV f∗CU −∇

fUf∗CV, f∗ϕX) = gM (AUBV −AVBU, ϕX).

Similarly, one can obtain the other assertions.

Remark 1. Let f be a conformal anti-invariant submersion is conformal La-grangian submersion, if ϕ(ker f∗) = (ker f∗)

⊥. Then equation (3.3), we haveTN = f∗(ϕ(ker f∗)

⊥).

Corollary 1. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal La-grangian submersion, then the following assertions are equivalent to each other:

(i) (ker f∗)⊥ is integrable,

(ii) AUϕV = AV ϕU,(iii) (∇f∗)(V, ϕU) = (∇f∗)(U, ϕV ), for U, V ∈ (Γ(ker f∗)

⊥).

Proof. For X ∈ Γ(ker f∗) and U, V ∈ (Γ(ker f∗)⊥), since ϕX ∈ (Γ(ker f∗)

⊥)and ϕV ∈ Γ(ϕ(ker f∗)). From Theorem (1), we have

gM ([U, V ], X) = gM (AUBV −AVBU, ϕX)− gM (Hgradlnλ,CV )gM (U, ϕX)

+ gM (Hgradlnλ,CU)gM (V, ϕX)−2gM (Hgradlnλ, ϕX)gM (CU, V )

− 1

λ2gN (∇fV f∗CU −∇

fUf∗CV, f∗ϕX).

Since f conformal Lagrangian submersion, we have

gM ([U, V ], X) = gM (AUBV −AVBU, ϕX),

which implies (i)⇔ (ii). On the further using definition (2) and equation (2.11),we get

gM (AUBV−AVBU, ϕX) = gM (AUBV, ϕX)− gM (AVBU, ϕX),

=1

λ2gN (f∗AUBV, f∗ϕX)− 1

λ2gN (f∗AVBU, f∗ϕX),

=1

λ2gN (f∗(∇UBV ), f∗ϕX)− 1

λ2gN (f∗(∇VBU), f∗ϕX).

Page 496: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

482 SUSHIL KUMAR and RAJENDRA PRASAD

Now, using equation (2.15) we have

1

λ2gN (f∗(∇UBV ), f∗ϕX)− 1

λ2gN (f∗(∇VBU), f∗ϕX)

=1

λ2gN (−(∇f∗)(U,BV ) +∇fUf∗BV, f∗ϕX)

− 1

λ2gN (−(∇f∗)(V,BU) +∇fV f∗BU, f∗ϕX),

=1

λ2[gN ((∇f∗)(V,BU)− (∇f∗)(U,BV ), f∗ϕX)],

which proves that (ii)⇔ (iii).

Theorem 3. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion, then the followings are equivalent to each other:

(i) (ker f∗)⊥ defines a totally geodesic foliation on M ,

(ii)− 1λ2gN (∇fUf∗CV, f∗ϕX) = gM (AUBV, ϕX)

−gM (U, ϕX)gM (Hgradlnλ,CV ) + gM (U,CV )gM (Hgradlnλ, ϕX)

−η(X)gM (U, V ), for X ∈ Γ(ker f∗) and U, V ∈ (Γ(ker f∗)⊥).

Proof. For X ∈ Γ(ker f∗) and U, V ∈ (Γ(ker f∗)⊥), using equations (2.3), (2.4),

(2.11), (2.12) and (3.2), we have

gM (∇UV,X) = gM (∇UϕV, ϕX) + η(X)η(∇UV ),

= gM (AUBV, ϕX) + gM (H∇UCV, ϕX) + η(X)η(∇UV ).

Since f is conformal submersion, using equation (2.15), lemma 1(i), definition(2) and equation (3.4), we get

gM (∇UV,X) = gM (AUBV, ϕX)− gM (Hgradlnλ,CV )gM (U, ϕX)

− η(X)gM (U, V ) + gM (Hgradlnλ, ϕX)gM (U,CV )

+1

λ2gN (∇fUf∗CV, f∗ϕX),

which implies (i)⇔ (ii).

Theorem 4. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion, then any two of the following conditions imply the third:

(i) (ker f∗)⊥ defines a totally geodesic foliation on M ,

(ii) f is horizontally homothetic,

(iii) gM (AUBV, ϕX) − η(X)gM (U, V ) = − 1λ2gN (∇fUf∗CV, f∗ϕX), for X ∈

Γ(ker f∗) and U, V ∈ (Γ(ker f∗)⊥).

Page 497: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CONFORMAL ANTI-INVARIANT SUBMERSIONS ... 483

Proof. For X ∈ Γ(ker f∗) and U, V ∈ (Γ(ker f∗)⊥), using Theorem (3), we have

gM (∇UV,X)=gM (AUBV, ϕX)−gM (Hgradlnλ,CV )gM (U, ϕX)−η(X)gM (U, V )

+ gM (Hgradlnλ, ϕX)gM (U,CV ) +1

λ2gN (∇fUf∗CV, f∗ϕX).

Using conditions (i) and (ii), we get (iii)

gM (AUBV, ϕX)− η(X)gM (U, V ) = − 1

λ2gN (∇fUf∗CV, f∗ϕX).

Similarly, one can obtain the other assertions.

Corollary 2. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal La-grangian submersion, then the followings are equivalent to each other:

(i) (ker f∗)⊥ defines a totally geodesic foliation on M,

(ii) gM (AUϕV, ϕX) = η(X)gM (U, V ),(iii) − 1

λ2gN ((∇f∗)(U, ϕV ), f∗ϕX) = η(X)gM (U, V ), for X ∈ Γ(ker f∗) and

U, V ∈ Γ(ker f∗)⊥.

Proof. For X ∈ Γ(ker f∗) and U, V ∈ (Γ(ker f∗)⊥), from definition (2), ϕV ∈

Γ(ϕ(ker f∗)) and ϕX ∈ Γ((ker f∗)⊥). Using Theorem (3), we have

gM (∇UV,X) = gM (AUBV, ϕX)− gM (Hgradlnλ,CV )gM (U, ϕX)

− η(X)gM (U, V ) + gM (Hgradlnλ, ϕX)gM (U,CV )

+1

λ2gN (∇fUf∗CV, f∗ϕX).

Since f is conformal Lagrangian submersion, we get

gM (∇UV,X) = gM (AUBV, ϕX)− η(X)gM (U, V )

= gM (AUϕV, ϕX)− η(X)gM (U, V ),

which implies (i)⇔ (ii).On the further needed, using equation (2.11), we get

gM (AUBV, ϕX) = gM (∇UBV, ϕX).

Since f is conformal submersion, we get

gM (AUBV, ϕX) =1

λ2gN (f∗∇UBV, f∗ϕX).

Using equation (2.15), we get

gM (AUBV, ϕX) = − 1

λ2gN ((∇f∗)(U,BV ), f∗ϕX)

= − 1

λ2gN ((∇f∗)(U, ϕV ), f∗ϕX),

which shows (ii)⇔ (iii).

Page 498: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

484 SUSHIL KUMAR and RAJENDRA PRASAD

Theorem 5. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion, then the followings are equivalent to each other:

(i) (ker f∗) defines a totally geodesic foliation on M,

(ii) − 1λ2gN (∇fϕY f∗ϕX, f∗ϕCU) = gM (TXϕY,BU)

+gM (ϕY, ϕX)gM (Hgradlnλ, ϕCU), for X,Y ∈ Γ(ker f∗) andU ∈ (Γ(ker f∗)

⊥).

Proof. For X,Y ∈ Γ(ker f∗) and U ∈ (Γ(ker f∗)⊥), using equations (2.3), (2.4),

(2.10) and (3.2), we get

gM (∇XY, U) = gM (ϕ∇XY, ϕU) + η(∇XY )η(U),

= gM (TXϕY,BU) + gM (H∇XϕY,CU).

Since ∇ is torsion free and [X,ϕY ] ∈ Γ(ker f∗), we get

gM (∇XY, U) = gM (TXϕY,BU) + gM (∇ϕYX,CU),

using equations (2.3) and (2.4), we get

gM (∇XY, U) = gM (TXϕY,BU) + gM (∇ϕY ϕX, ϕCU),

here we have used µ is invariant. Since f is conformal submersion, using equation(2.15) and Lemma 1(i), we get

gM (∇XY, U) = gM (TXϕY,BU)− 1

λgM (Hgradlnλ, ϕY )gN (f∗ϕX, f∗ϕCU)

− 1

λgM (Hgradlnλ, ϕX)gN (f∗ϕY, f∗ϕCU)

+1

λgM (ϕY, ϕX)gN (f∗Hgradlnλ, f∗ϕCU)

+1

λ2gN (∇fϕY f∗ϕX, f∗ϕCU).

Next, using definition (2) and equation (3.4), we have

gM (∇XY,U) = gM (TXϕY,BU) + gM (ϕY, ϕX)gM (Hgradlnλ, ϕCU)

+1

λ2gN (∇fϕY f∗ϕX, f∗ϕCU),

which shows (i)⇔ (ii).

Theorem 6. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion, then any two of the followings conditions imply the third:

(i) (ker f∗) defines a totally geodesic foliation on M,

(ii) λ is constant on Γ(µ),

(iii)1

λ2gN (∇fϕY f∗ϕX, f∗ϕCU) = −gM (TXϕY, ϕU),

for X,Y ∈ Γ(ker f∗) and U ∈ (Γ(ker f∗)⊥).

Page 499: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CONFORMAL ANTI-INVARIANT SUBMERSIONS ... 485

Proof. For X,Y ∈ Γ(ker f∗) and U ∈ (Γ(ker f∗)⊥), from Theorem (5), we have

gM (∇XY,U) = gM (TXϕY,BU) + gM (ϕY, ϕX)gM (Hgradlnλ, ϕCU)

+1

λ2gN (∇fϕY f∗ϕX, f∗ϕCU).

Now, using conditions (i) and (iii), we havegM (ϕY, ϕX)gM (Hgradlnλ, ϕCU) =0. From above equation λ is constant on Γ(µ). Similarly, one can obtain theother assertions.

Corollary 3. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) bea Riemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal La-grangian submersion, then the following statements are equivalent to each other:

(i) (ker f∗) defines a totally geodesic foliation on M ,(ii) TXϕY = 0, for X,Y ∈ Γ(ker f∗).

Proof. For X,Y ∈ Γ(ker f∗) and U ∈ Γ(ker f∗)⊥, from Theorem (5), we have

gM (∇XY,U) = gM (TXϕY,BU) + gM (ϕY, ϕX)gM (Hgradlnλ, ϕCU)

+1

λ2gN (∇fϕY f∗ϕX, f∗ϕCU).

Since f is a conformal Lagrangian submersion, we get gM (∇XY, U) = gM (TXϕY,ϕU)), which proves (i)⇔ (ii).

Theorem 7. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion, then f is a totally geodesic map if and only if

−∇fV f∗W = f∗(ϕAV ϕW1 + ϕV∇VBW2 + ϕAV CW2 + CH∇V ϕW1

+CAVBW2 + CH∇V CW2 − η(W1)V + gM (V,W2)ξ),

for any V ∈ (Γ(ker f∗)⊥),W ∈ Γ(TM), where W = W1 + W2, W1 ∈ Γ(ker f∗)

and W2 ∈ (Γ(ker f∗)⊥).

Proof. Taking equation (2.15) and using equations (2.1), and (2.4), we get

(∇f∗)(V,W ) = ∇fV f∗W + f∗(ϕ∇V ϕW − η(W )V − η(∇VW )ξ),

for any V ∈ (Γ(ker f∗)⊥),W ∈ Γ(TM).

Now using equations (2.15) and (3.2), we get

(∇f∗)(V,W ) = ∇fV f∗W + f∗(ϕAV ϕW1 +BH∇V ϕW1 + CH∇V ϕW1

+BAVBW2+CAVBW2+ϕV∇VBW2+ϕAV CW2+BH∇V CW2

+ CH∇V CW2 + η(W1)BV − η(W1)V + gM (V,W2)ξ),

for W = W1 +W2 ∈ Γ(TM), where W1 ∈ Γ(ker f∗) and W2 ∈ (Γ(ker f∗)⊥).

Page 500: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

486 SUSHIL KUMAR and RAJENDRA PRASAD

Thus taking into account the vertical terms, we get

(∇f∗)(V,W ) = ∇fV f∗W + f∗(ϕ(AV ϕW1 + V∇VBW2 +AV CW2)

+ C(H∇V ϕW1+AVBW2+H∇V CW2)− η(W1)V )+gM (V,W2)ξ.

Thus

(∇f∗)(V,W ) = 0⇔−∇fV f∗W = f∗(ϕ(AV ϕW1 + V∇VBW2 +AV CW2) + gM (V,W2)ξ

+C(H∇V ϕW1 +AVBW2 +H∇V CW2)− η(W1)V ).

Therefore, we obtain the result.

Definition 3. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion, then f is called a (ϕ ker f∗, µ)−totally geodesic map pro-vided (∇f∗)(ϕX,U) = 0, for X ∈ Γ(ker f∗) and U ∈ (Γ(ker f∗)

⊥).

Theorem 8. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion, then f is called a (ϕ ker f∗, µ)−totally geodesic map ifand if f is horizontally homohtetic map.

Proof. For X ∈ Γ(ker f∗) and U ∈ Γ(µ), using lemma 1(i), we get

(∇f∗)(ϕX,U) = ϕX(lnλ)f∗(U) + U(lnλ)f∗(ϕX)− gM (ϕX,U)f∗(gradlnλ),

From above equation, if f is a horizontally homothetic, then (∇f∗)(ϕX,U) =0.

Conversely, if (∇f∗)(ϕX,U) = 0, we find

(3.6) ϕX(lnλ)f∗(U) + U(lnλ)f∗(ϕX) = 0.

Taking inner product in above equation with f∗(ϕX) and since f is conformalsubmersion, we have

gM (Hgradlnλ, ϕX)gN (f∗U, f∗ϕX) + gM (Hgradlnλ, U)gN (f∗ϕX, f∗ϕX) = 0.

Above equation shows that λ is a constant Γ(µ).On the other hand taking inner product in equation (3.6) with f∗X, we get

gM (Hgradlnλ, ϕX)gN (f∗U, f∗ϕU) + gM (Hgradlnλ, U)gN (f∗ϕX, f∗U) = 0.

From above equation shows that λ is a constant on Γ(ϕ(ker f∗)). Thus λ isa constant on Γ((ker f∗)

⊥).

Theorem 9. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. Let f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion. Then f is totally geodesic map if and only if

Page 501: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CONFORMAL ANTI-INVARIANT SUBMERSIONS ... 487

(i) ϕTXϕY − η(Y )X + gM (X,Y )ξ) = 0 and H∇Y ϕX ∈ Γ(ϕ ker f∗),(ii) f is horizontally homothetic map,(iii) ∇XBU = −TXCU and TXBU +H∇XCU ∈ Γ(ϕ ker f∗).

Proof. For X,Y ∈ Γ(ker f∗), using equations (2.1), (2.4) and (2.15), we get

(∇f∗)(X,Y ) = f∗(ϕ(∇XϕY )− η(Y )X + η(X)η(Y )ξ − η(∇XY )ξ).

Now, using equations (2.10) and (3.2), we get

(∇f∗)(X,Y ) = f∗(ϕTXϕY + CH∇XϕY − η(Y )X + gM (X,Y )ξ).

Thus shows that ϕTXϕY −η(Y )X+gM (X,Y )ξ) = 0 and H∇XϕY ∈ Γ(ϕ ker f∗).On the other hund lemma 1(i), we get

(∇f∗)(U, V ) = U(lnλ)f∗(V ) + V (lnλ)f∗(U)− gM (U, V )f∗(gradlnλ),

for U, V ∈ Γ(µ). It is obvious that if f is horizontally homothetic, it followsthat (∇f∗)(U, V ) = 0. Conversely, if (∇f∗)(U, V ) = 0, taking V = ϕU in aboveequation, we have

(3.7) U(lnλ)f∗(ϕU) + ϕU(lnλ)f∗(U) = 0.

Taking inner product in equation (3.7) with f∗ϕU, we get

gM (Hgradlnλ, U)gN (f∗ϕU, f∗ϕU) + gM (Hgradlnλ, ϕU)gN (f∗U, f∗ϕU) = 0.

From above equation λ is constant on Γ(µ). On the other hand, for X,Y ∈Γ(ker f∗), from lemma 1(i), we get

(∇f∗)(ϕX, ϕY ) = ϕX(lnλ)f∗(ϕY )+ϕY (lnλ)f∗(ϕX)−gM (ϕX, ϕY )f∗(gradlnλ).

Again if f is horizontally homothetic, then (∇f∗)(ϕX, ϕY ) = 0. Conversely,if (∇f∗)(ϕX, ϕY ) = 0, putting X = Y in above equation, we get

2ϕX(lnλ)f∗(ϕX)− gM (ϕX, ϕX)f∗(gradlnλ) = 0.

Taking inner product in above equation with f∗ϕX and since f is conformalsubmersion, we have gM (ϕX, ϕX)gM (gradlnλ, ϕX) = 0.

From above equation, λ is constant on Γ(ϕ ker f∗). Thus λ is constant onΓ((ker f∗)

⊥).Now, for X ∈ Γ(ker f∗) and U ∈ Γ((ker f∗)

⊥), using equations (2.1), (2.4)and (2.15), we get (∇f∗)(X,U) = f∗(ϕ(∇XϕU)− η(∇XU)ξ). Now, again usingequations (2.10) and (3.2), we get

(∇f∗)(X,U) = f∗(CTXBU + ϕ∇XBU + CH∇XCU + ϕTXCU).

Thus (∇f∗)(X,U) = 0⇔ f∗(CTXBU + ϕ∇XBU + CH∇XCU + ϕTXCU) = 0.Therefore, we obtain the result.

Page 502: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

488 SUSHIL KUMAR and RAJENDRA PRASAD

From Theorems (3) and (5) in terms of the second fundamental forms ofsuch submersions.

Theorem 10. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) bea Riemannian manifold. Let f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformalanti-invariant submersion. Then M is a locally product manifold of the formM(ker f∗)⊥×M(ker f∗) if

− 1

λ2gN (∇fUf∗CV, f∗ϕX) = gM (AUBV, ϕX)(3.8)

− gM (Hgradlnλ,CV )gM (U, ϕX) + gM (Hgradlnλ, ϕX)gM (U,CV ),

and

− 1

λ2gN (∇fϕY f∗ϕX, f∗ϕCU)(3.9)

= gM (TXϕY,BU) + gM (ϕY, ϕX)gM (Hgradlnλ, ϕCU),

for X,Y ∈ Γ(ker f∗) and U, V,W ∈ (Γ(ker f∗)⊥), where M(ker f∗)⊥ and M(ker f∗)

are integral manifolds of the distributions Γ(ker f∗) and (Γ(ker f∗)⊥). Conversely,

if M is a locally product manifold of the form M(ker f∗)⊥×M(ker f∗) then we have

− 1

λ2gN (∇fUf∗CV, f∗ϕX)

= gM (Hgradlnλ, ϕX)gM (U,CV )− gM (Hgradlnλ,CV )gM (U, ϕX),

and − 1λ2gN (∇fϕY f∗ϕX, f∗ϕCU) = gM (ϕY, ϕX)gM (Hgradlnλ, ϕCU).

Again, from Corollaries (2) and (3), we have the following theorem.

Theorem 11. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f : (M,ϕ, ξ, η, gM )→(N, gN ) be a conformal anti-inva-riant submersion, then f is a locally product manifold if and only if gM (AUϕV,ϕX) = η(X)gM (U, V ) and TXϕY=0, for X,Y ∈Γ(ker f∗) and U, V ∈ (Γ(ker f∗)

⊥).

Theorem 12. Let f be a conformal anti-invariant submersion from a Ken-motsu manifolds (M,ϕ, ξ, η, gM ) to a Riemannian manifold (N, gN ). Then M isa locally twisted product manifold of the form M(ker f∗)×M(ker f∗)⊥ if and only if

− 1

λ2gN (∇fϕY f∗ϕX, f∗ϕCU)(3.10)

= gM (TXϕY,BU) + gM (ϕY, ϕX)gM (Hgradlnλ, ϕCU),

and

gM (U, V )H = −BAUBV + CV (lnλ)BU −B(Hgradlnλ)gM (U,CV )(3.11)

− ϕ∗f∗(∇fUf∗CV ),

for X,Y ∈ Γ(ker f∗) and U, V ∈ (Γ(ker f∗)⊥), where M(ker f∗) and M(ker f∗)⊥ are

integral manifolds of the distributions (ker f∗)⊥ and (ker f∗) and H is the mean

curvature vector field of M(ker f∗)⊥ .

Page 503: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CONFORMAL ANTI-INVARIANT SUBMERSIONS ... 489

Proof. For X,Y ∈ Γ(ker f∗) and U ∈ (Γ(ker f∗)⊥), using equations (2.3), (2.4),

(2.10) and (3.2), we get gM (∇XY,U) = gM (TXϕY,BU) + gM (H∇XϕY,CU).Since ∇ is torsion free and [X,ϕY ] ∈ Γ(ker f∗), we get

gM (∇XY, U) = gM (TXϕY,BU) + gM (H∇ϕYX,CU).

Using equations (2.3), (2.4) and (2.12), we have

gM (∇XY, U) = gM (TXϕY,BU) + gM (∇ϕY ϕX, ϕCU).

Since f is conformal submersion, using equation (2.15) and lemma 1(i), we find

gM (∇XY, U) = gM (TXϕY,BU)− 1

λ2gM (Hgradlnλ, ϕY )gN (f∗ϕX, f∗ϕCU)

− 1

λ2gM (Hgradlnλ, ϕX)gN (f∗ϕY, f∗ϕCU)

+1

λ2gM (ϕX, ϕY )gN (f∗Hgradlnλ, f∗ϕCU)

+1

λ2gN (∇fϕY f∗ϕX, f∗ϕCU).

Next, using definition (2) and equation (3.2), we obtain

gM (∇XY, U) = gM (TXϕY,BU) + gM (ϕX, ϕY )gM (Hgradlnλ, ϕCU)

+1

λ2gN (∇fϕY f∗ϕX, f∗ϕCU).

Thus shows that M(ker f∗) is totally geodesic if and only if

− 1

λ2gN (∇fϕY f∗ϕX, f∗ϕCU)

= gM (TXϕY,BU) + gM (ϕX, ϕY )gM (Hgradlnλ, ϕCU).

On the other hand for X,Y ∈ Γ(ker f∗) and U, V ∈ (Γ(ker f∗)⊥), using

equations (2.3), (2.4), (2.11), (2.12) and (3.2), we get

gM (∇UV,X) = gM (AUBV, ϕX) + gM (H∇UCV, ϕX).

Since f is conformal submersion, using equation (2.15) and lemma 1(i), weobtain that

gM (∇UV,X) = gM (AUBV, ϕX)− 1

λ2gM (Hgradlnλ, U)gN (f∗CV, f∗ϕX)

− 1

λ2gM (Hgradlnλ,CV )gN (f∗U, f∗ϕX)

+1

λ2gM (U,CV )gN (f∗Hgradlnλ, f∗ϕX)

+1

λ2gN (∇fϕUf∗CV, f∗ϕX) + η(X)η(∇UV ).

Page 504: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

490 SUSHIL KUMAR and RAJENDRA PRASAD

Moreover, using definition (2) and (3.4), we get

gM (∇UV,X) = gM (AUBV, ϕX)− gM (Hgradlnλ,CV )gM (U, ϕX)

+ η(X)η(∇UV ) + gM (U,CV )gM (Hgradlnλ, ϕX)

+1

λ2gN (∇fϕUf∗CV, f∗ϕX) + η(X)η(∇UV ).

Then, we have

gM (U, V )H = −BAUBV + CV (lnλ)BU −B(Hgradlnλ)gM (U,CV )

−ϕf∗(∇fUf∗CV )− gM (U, V )ξ + η(U)η(V )ξ,

which proves.

Theorem 13. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. Let f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion with rank(ker f∗) > 1. If M is a locally warped productmanifold of the form M(ker f∗)⊥ ×λM(ker f∗), then either f is horizontally homo-thetic submersion or the fibers are one dimensional.

Proof. Since f is a conformal submersion, for X,Y ∈ Γ(ker f∗) and U ∈(Γ(ker f∗)

⊥), using, equations (2.3), (3.4) and lemma 1(i), we obtain

−U(lnλ)gM (ϕX, ϕY ) = ϕY gM (U, ϕX).

For U ∈ Γ(µ), we get −U(lnλ)gM (ϕX, ϕY ) = 0.From above equation, we find that λ is a constant on Γ(µ).For U = ϕX ∈ Γ(ϕ(ker f∗)), we have

(3.12) ϕX(lnλ)gM (ϕX, ϕY ) = ϕY (lnλ)gM (ϕX, ϕX).

Interchanging the roles of Y and X in equation (3.12), we get

(3.13) ϕY (lnλ)gM (ϕX, ϕX) = ϕX(lnλ)gM (ϕY, ϕY ).

From equations (3.12) and (3.13), we get

(3.14) ϕX(lnλ) ∥ ϕX ∥2∥ ϕY ∥2= ϕX(lnλ)(gM (ϕX, ϕY ))2.

From (3.14), either λ is a constant on Γ(ϕ(ker f∗)) or Γ(ϕ(ker f∗)) is 1-dimen-sional.

4. Conformal anti-invariant submersions admitting horizontalstructure vector field

In this section, we study conformal anti-invariant submersions from Kenmotsumanifolds onto Riemannian manifolds such that the characteristic vector field ξ

Page 505: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CONFORMAL ANTI-INVARIANT SUBMERSIONS ... 491

is horizontal vector field. Using definition (2), we have (ker f∗)⊥ = ϕ(ker f∗)⊕µ,

where µ = ϕ(µ)⊕ < ξ > . Thus, for any U ∈ Γ(ker f∗)⊥, we have

(4.1) ϕU = BU + CU,

where BU ∈ Γ(ker f∗) and CU ∈ Γϕ(µ).Now, we suppose that X is vertical and U is horizontal vector fields. Using

equations (2.3), (4.1), (2.4) and (2.10), we have

(4.2) gM (CU, ϕX) = 0.

(4.3) gM (∇UCV, ϕX) = −gM (CU, ϕAVX).

Since f is conformal submersion, using equation (4.2), we have

(4.4)1

λ2gN (f∗CV, f∗ϕX) = 0,

for X ∈ Γ(ker f∗) and U, V ∈ Γ(ker f∗)⊥.

Theorem 14. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion, then followings are equivalent to each other:

(i) (ker f∗)⊥ is integrable,

(ii) 1λ2gN (∇fV f∗CU −∇

fUf∗CV, f∗ϕX) = gM (AUBV −AVBU, ϕX)

−gM (Hgradlnλ,CV )gM (U, ϕX)+gM (Hgradlnλ,CU)gM (V, ϕX)− 2gM (Hgradlnλ, ϕX)gM (CU, V ), for X ∈

Γ(ker f∗) and U, V ∈ Γ(ker f∗)⊥.

Proof. For X ∈ Γ(ker f∗) and U, V ∈ Γ(ker f∗)⊥, since ϕX ∈ Γ(ker f∗)

⊥ andϕV ∈ (Γ ker f∗ ⊕ µ). Using equations (2.3), (2.4) and (4.1), we have

gM ([U, V ], X) = gM (∇UBV, ϕX)− gM (∇VBU, ϕX) + gM (∇UCV, ϕX)

−gM (∇V CU, ϕX).

Since f is a conformal submersion, using equation (2.10), we get

gM ([U, V ], X) = gM (AUBV −AVBU, ϕX) +1

λ2gN (f∗∇UCV, f∗ϕX)

− 1

λ2gN (f∗∇V CU, f∗ϕX).

Thus using equation (2.15), (4.2) and lemma 1(i), we have

gM ([U, V ], X) = gM (AUBV −AVBU, ϕX)− gM (U, ϕX)gM (Hgradlnλ,CV )

+ gM (V, ϕX)gM (Hgradlnλ,CU)−2gM (CU, V )gM (Hgradlnλ, ϕX)

− 1

λ2gN (∇fV f∗CU −∇

fUf∗CV, f∗ϕX),

which proves (i)⇔ (ii).

Page 506: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

492 SUSHIL KUMAR and RAJENDRA PRASAD

Theorem 15. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion, then any two of the following conditions imply the third:

(i) (ker f∗)⊥ is integrable,

(ii) f is horizontally homothetic,

(iii) 1λ2gN (∇fV f∗CU−∇

fUf∗CV, f∗ϕX) = gM (AUBV −AVBU, ϕX), for X ∈

Γ(ker f∗) and U, V ∈ (Γ(ker f∗)⊥).

Proof. For X ∈ Γ(ker f∗) and U, V ∈ (Γ(ker f∗)⊥), using Theorem (14), we get

gM ([U, V ], X)

= gM (AUBV −AVBU, ϕX)− gM (U, ϕX)gM (Hgradlnλ,CV )

+gM (V, ϕX)gM (Hgradlnλ,CU)− 2gM (CU, V )gM (Hgradlnλ, ϕX)

− 1

λ2gN (∇fV f∗CU −∇

fUf∗CV, f∗ϕX).

Since (ker f∗)⊥ is integrable and f is horizontally homothetic, we get

1

λ2gN (∇fV f∗CU −∇

fUf∗CV, f∗ϕX) = gM (AUBV −AVBU, ϕX),

using conditions (i) and (ii), we get (iii). Similarly, one can obtain the otherassertions.

Remark 2. Let f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariantsubmersion. If ϕ(ker f∗)⊕ < ξ >= (ker f∗)

⊥, then C = 0 from equation (4.1).

Corollary 4. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) bea Riemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal La-grangian submersion. Then the following assertions are equivalent to each other:

(i) (ker f∗)⊥ is integrable,

(ii) AUϕV = AV ϕU,(iii) (∇f∗)(V, ϕU) = (∇f∗)(U, ϕV ), forX ∈ Γ(ker f∗) and U, V ∈ (Γ(ker f∗)

⊥).

Proof. For X ∈ Γ(ker f∗) and U, V ∈ (Γ(ker f∗)⊥), since ϕX ∈ Γ(ker f∗)

⊥ andϕV ∈ Γ(ϕ ker f∗), from Theorem (14), we have

gM ([U, V ], X) = gM (AUBV −AVBU, ϕX)− gM (U, ϕX)gM (Hgradlnλ,CV )

+ gM (V, ϕX)gM (Hgradlnλ,CU)−2gM (CU, V )gM (Hgradlnλ, ϕX)

− 1

λ2gN (∇fV f∗CU −∇

fUf∗CV, f∗ϕX).

Since f is a conformal Lagrangian submersion, we get

gM ([U, V ], X) = gM (AUBV −AVBU, ϕX) = 0,

Page 507: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CONFORMAL ANTI-INVARIANT SUBMERSIONS ... 493

which proves (i)⇔ (ii).On the other hand, since f is a conformal submersion, using equations

(2.3), (2.11) and (2.15), we get

gM (AUBV −AVBU, ϕX)

=1

λ2gN ((∇f∗)(U,BV ), f∗ϕX)− gN ((∇f∗)(V,BU), f∗ϕX),

which proves (ii)⇔ (iii).

Theorem 16. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion, then the followings are equivalent to each other:

(i) (ker f∗)⊥ defines a totally geodesic foliation on M.

(ii)− 1λ2gN (∇fUf∗CV, f∗ϕX) = gM (AUBV, ϕX)

−gM (U, ϕX)gM (Hgradlnλ,CV )+gM (U,CV )gM (Hgradlnλ, ϕX), for X ∈ Γ(ker f∗) and U, V ∈ (Γ(ker f∗)

⊥).

Proof. For X ∈ Γ(ker f∗) and U, V ∈ (Γ(ker f∗)⊥), using equations (2.3), (2.4),

(4.1), (2.10) and (2.11), we get

gM (∇UV,X) = gM (AUBV, ϕX) + gM (H∇UCV, ϕX),

Since f is a conformal submersion, using equation (2.15) and lemma 1(i),we have

gM (∇UV,X) = gM (AUBV, ϕX)− gM (U, ϕX)gM (Hgradlnλ,CV )

+ gM (U,CV )gM (Hgradlnλ, ϕX) +1

λ2gN (∇fUf∗CV, f∗ϕX),

which shows that (i)⇔ (ii).

Theorem 17. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion, then any two of the following conditions imply the third:

(i)(ker f∗)⊥ defines a totally geodesic folation on M,

(ii) f is horizontally homothetic,

(iii) − 1λ2gN (∇fUf∗CV, f∗ϕX) = gM (AUBV, ϕX), for X ∈ Γ(ker f∗) and

U, V ∈ (Γ(ker f∗)⊥).

Proof. For X ∈ Γ(ker f∗) and U, V ∈ (Γ(ker f∗)⊥), from Theorem (16), we have

gM (∇UV,X) = gM (AUBV, ϕX)− gM (U, ϕX)gM (Hgradlnλ,CV )

+ gM (U,CV )gM (Hgradlnλ, ϕX) +1

λ2gN (∇fUf∗CV, f∗ϕX),

Page 508: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

494 SUSHIL KUMAR and RAJENDRA PRASAD

Since (ker f∗)⊥ defines a totally geodesic foliation on M and f is horizon-

tally homothetic, we have − 1λ2gN (∇fUf∗CV, f∗ϕX) = gM (AUBV, ϕX), which

haves any two conditions imply the three. Similarly, one can obtain the otherassertions.

Corollary 5. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f be a conformal Lagrangian submersion, then thefollowing statements are equivalent to each other:

(i) (ker f∗)⊥ defines a totally geodesic foliation on M,

(ii) AUϕV = 0,(iii) (∇f∗)(U, ϕV ) = 0, for U, V ∈ (Γ(ker f∗)

⊥).

Proof. For X ∈ Γ(ker f∗) and U, V ∈ (Γ(ker f∗)⊥), since ϕV ∈ Γ(ϕ ker f∗) and

ϕX ∈ (Γ(ker f∗)⊥). From theorem (16), we have

gM (∇UV,X) = gM (AUBV, ϕX)− gM (V, ϕX)gM (Hgradlnλ,CV )

+ gM (U,CV )gM (Hgradlnλ, ϕX) +1

λ2gN (∇fUf∗CV, f∗ϕX),

Since f is a conformal Lagrangian submersion, we get

(4.5) gM (∇UV,X) = gM (AUBV, ϕX),

which proves (i) ⇔ (ii). On the other hand, using equation (4.5) and (2.11),since f is a conformal Lagrangian submersion and using equation (2.15), we getgM (AUBV, ϕX) = 1

λ2gN ((∇f∗)(U,BV ) + η(V )f∗U, f∗ϕX) which proves (ii) ⇔

(iii).

Theorem 18. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion, then the following assertions are equivalent to each other:

(i) (ker f∗) defines a totally geodesic foliation on M,

(ii)− 1λ2gN (∇fϕY f∗ϕX, f∗ϕCU) = gM (TY ϕX,BU)

+gM (ϕY, ϕX)gM (Hgradlnλ, ϕCU) − η(U)gM (X,Y ), for X,Y ∈ Γ(ker f∗)and U ∈ (Γ(ker f∗)

⊥).

Proof. For X,Y ∈ Γ(ker f∗) and U ∈ (Γ(ker f∗)⊥), using equations (2.3), (2.4)

and (4.1), we have

gM (∇XY,U) = gM (TXϕY,BU) + gM (∇ϕY ϕX, ϕCU) + η(U)η(∇XY ).

Since f is a conformal submersion, using equation (2.15) and lemma 1(i), wehave

gM (∇XY,U) = gM (TXϕY,BU) + gM (ϕY, ϕX)gM (Hgradlnλ, ϕCU)

+1

λ2gN (∇fϕY f∗ϕX, f∗ϕCU)− η(U)gM (X,Y ),

Page 509: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CONFORMAL ANTI-INVARIANT SUBMERSIONS ... 495

If (ker f∗) is a totally geodesic foliation on M, then we have

gM (∇XY,U) = gM (TXϕY,BU) + gM (ϕY, ϕX)gM (Hgradlnλ, ϕCU)

+1

λ2gN (∇fϕY f∗ϕX, f∗ϕCU)− η(U)gM (X,Y ),

which proves (i)⇔ (ii).

Theorem 19. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion, then any two of the following conditions imply the third:

(i) (ker f∗) defines a totally geodesic foliation on M,(ii) λ is constant on Γ(µ),

(iii)− 1λ2gN (∇fϕY f∗ϕX, f∗ϕCU) = gM (TXϕY, ϕU)−η(U)gM (X,Y ), forX,Y ∈

Γ(ker f∗) and U ∈ (Γ(ker f∗)⊥).

Proof. For X,Y ∈ Γ(ker f∗) and U ∈ (Γ(ker f∗)⊥), from Theorem (18), we have

gM (∇XY, U) = gM (TXϕY,BU) + gM (ϕY, ϕX)gM (Hgradlnλ, ϕCU)

+1

λ2gN (∇fϕY f∗ϕX, f∗ϕCU)− η(U)gM (X,Y ),

Now, if we have (i) and (iii), then we haveFrom above equation, λ is a constant on Γ(µ). Similarly, one can obtain the

other assertions.

Corollary 6. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f be a conformal Lagrangian submersion, then thefollowing assertions are equivalent to each other:

(i) (ker f∗) defines a totally geodesic foliation on M.(ii) TXϕY = 0, for X,Y ∈ Γ(ker f∗).

Proof. For X,Y ∈ Γ(ker f∗) and U ∈ Γ(ker f∗)⊥, from Theorem (18), we have

gM (∇XY,U) = gM (TXϕY,BU) + gM (ϕY, ϕX)gM (Hgradlnλ, ϕCU)

+1

λ2gN (∇fϕY f∗ϕX, f∗ϕCU)− η(U)gM (X,Y ).

Since f is conformal Lagrangian submersion, we get gM (∇XY,U)=gM (TXϕY, ϕU)−η(U)gM (X,Y ), which proves (i)⇔ (ii).

Theorem 20. Let f be a conformal anti-invariant submersion from a Kenmotsumanifolds (M,ϕ, ξ, η, gM ) to a Riemannian manifold (N, gN ). Then f is a totallygeodesic map if and only if

−∇fV f∗W = f∗(ϕAV ϕW1 + ϕV∇VBW2 + ϕAV CW2 + CH∇V ϕW1(4.6)

+CAV CW2 + CH∇V CW2 + η(W2)CV − η(∇VW )ξ),

for any V ∈ Γ(ker f∗)⊥,W ∈ Γ(TM), where W = W1 +W2, W1 ∈ Γ(ker f∗) and

W2 ∈ (Γ(ker f∗)⊥).

Page 510: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

496 SUSHIL KUMAR and RAJENDRA PRASAD

Proof. For any V ∈ Γ(ker f∗)⊥,W ∈ Γ(TM), using equations (2.1), (2.4), (2.15)

and (4.1), we get

(∇f∗)(V,W ) = ∇fV f∗W + f∗(ϕAV ϕW1 +BHV ϕW1 + CHV ϕW1

+BAVBW2 + CAVBW2 + ϕV∇VBW2 + ϕAV CW2

+BH∇V CW2 + CH∇V CW2 + η(W2)ϕV − η(∇VW )ξ).

If (∇f∗)(V,W ) = 0, then we have

−∇fV f∗W = f∗(ϕAV ϕW1 + ϕV∇VBW2 + ϕAV CW2 + CHV ϕW1

+CAVBW2 + CH∇V CW2 + η(W2)ϕV − η(∇VW )ξ).

Thus (∇f∗)(V,W ) = 0⇔ we get equation (4.6).

Theorem 21. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. If f be a conformal Lagrangian submersion, then f iscalled a (ϕ ker f∗, µ)−totally geodesic map if and if f is horizontally homohteticmap.

Proof. For U ∈ Γ(ker f∗) and X ∈ (Γµ), using lemma 1(i), we have

(∇f∗)(ϕU,X) = ϕU(lnλ)f∗(X) +X(lnλ)f∗(ϕU)− gM (ϕU,X)f∗(Hgradlnλ).

From above equation, if f is a horizontally homothetic then (∇f∗)(ϕU,X) = 0.Conversely, if (∇f∗)(ϕU,X) = 0, we obtain

(4.7) ϕU(lnλ)f∗(X) +X(lnλ)f∗(ϕU) = 0.

Taking inner prouct above equation with f∗(ϕU) and since f is a conformalsubmersion, we write

gM (Hgradlnλ, ϕU)gN (f∗X, f∗ϕU) + gM (Hgradlnλ,X)gN (f∗ϕU, f∗ϕU) = 0.

Above equation implies that λ is constant on Γ(µ). On the other hand, againtaking inner product with f∗X, we get

gM (Hgradlnλ, ϕU)gN (f∗X, f∗X) + gM (Hgradlnλ,X)gN (f∗ϕU, f∗X) = 0,

From above equation, it follows that λ is constant on Γ(ϕ(ker f∗)). Thus λis constant on (Γ(ker f∗)

⊥).

Theorem 22. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. Let f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion. Then f is totally geodesic map if and only if

(i) TXϕY = 0 and CH∇XϕY + gM (X,Y )ξ ∈ Γ(ϕ ker f∗),(ii) f is horizontally homothetic map,(iii) ∇XBV + TXCV = 0,and TXBV + H∇XCV ∈ Γ(ϕ ker f∗), for X,Y ∈ Γ(ker f∗) and V,W ∈

Γ(ker f∗)⊥.

Page 511: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CONFORMAL ANTI-INVARIANT SUBMERSIONS ... 497

Proof. For X,Y ∈ Γ(ker f∗), using equations (2.1), (2.4), (4.1) and (2.10), weget (∇f∗)(X,Y ) = f∗(ϕTXϕY + CH∇XϕY + gM (X,Y )ξ). If (∇f∗)(X,Y ) = 0,then we have f∗(ϕTXϕY +CH∇XϕY +gM (X,Y )ξ) = 0, which prove TXϕY = 0and CH∇XϕY + gM (X,Y )ξ ∈ Γ(ϕ ker f∗).

On the other hand, from lemma 1(i) we have (∇f∗)(V,W ) = V (lnλ)f∗(W )+W (lnλ)f∗(V )−gM (V,W )f∗(Hgradlnλ), for any V,W ∈ Γ(µ). It is obvious thatif f is horizontal homothetic, it follows that (∇f∗)(V,W ) = 0. Conversely, if(∇f∗)(V,W ) = 0, taking W = ϕV in above equation, we have

(4.8) V (lnλ)f∗(ϕV ) + ϕV (lnλ)f∗(V ) = 0.

Taking inner product in equation (4.8) with f∗ϕV, we get

gM (Hgradlnλ, V )gM (ϕV, ϕV ) + gM (Hgradlnλ, ϕV )gM (V, ϕV ) = 0.

From above equation, λ is constant on Γ(µ). On the other hand, fromlemma 1(i) we have (∇f∗)(ϕX, ϕY ) = ϕX(lnλ)f∗(ϕY ) + ϕX(lnλ)f∗(ϕY ) −gM (ϕY, ϕX)f∗(Hgradlnλ),

Again if f is horizontal homothetic, it follows that (∇f∗)(ϕX, ϕY ) = 0.Conversely, if (∇f∗)(ϕX, ϕY ) = 0, taking X = Y in above equation, we have2ϕX(lnλ)f∗(ϕX)− gM (ϕX, ϕX)f∗(Hgradlnλ) = 0.

Taking inner product above equation with f∗ϕX and since f is conformalsubmersion, we get gM (ϕX, ϕX)gM (Hgradlnλ, ϕX) = 0. From above equation,λ is constant on Γ(ker f∗)

⊥. Thus λ is constant on Γ(ϕ ker f∗).Now, for U ∈ Γ(ker f∗)

⊥ and X ∈ Γ(ker f∗), from equations (2.15), (2.1),(2.4), (4.1), (2.9) and (2.10), we get

(∇f∗)(X,V ) = f∗(BTXBV + CTXBV + ϕ∇XBV +BH∇XCV+CH∇XCV + ϕTXCV + η(V )BX + η(V )X).

Thus (∇f∗)(X,V ) = 0⇔ f∗(CTXBV + ϕ∇XBV + CH∇XCV + ϕTXCV ).

Theorem 23. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. Let f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion. Then M is a locally twisted product manifold of the formM(ker f∗) ×M(ker f∗)⊥ if and only if

− 1

λ2gN (∇f∗ϕY f∗ϕX, f∗ϕCV )(4.9)

= gM (TXϕY,BV ) + gM (ϕY, ϕV )gM (Hgradlnλ, ϕX)− gM (X,Y )η(V ),

and

gM (V,W )H = −BAVBW + CW (lnλ)BV −BHgradlnλgM (V,CW )(4.10)

− ϕf∗(∇fV f∗CW ),

for X,Y ∈ Γ(ker f∗) and V,W ∈ (Γ(ker f∗)⊥), where M(ker f∗) and M(ker f∗)⊥ are

integral manifolds of the distributions (ker f∗)⊥ and (ker f∗) and H is the mean

curvature vector field of M(ker f∗)⊥ .

Page 512: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

498 SUSHIL KUMAR and RAJENDRA PRASAD

Proof. For X,Y ∈ Γ(ker f∗) and V ∈ (Γ(ker f∗)⊥), from equations (2.3), (2.4)

and (2.10), we have gM (∇XY, V ) = gM (ϕ∇XY, ϕV )+η(V )η(∇XY ) = gM (TXϕY,BV ) + gM (H∇XϕY,CV )− gM (X,Y )η(V ).

Since ∇ is torsion free and [X,ϕY ] ∈ Γ(ker f∗), we get gM (∇XY, V ) =gM (TXϕY,BV ) + gM (H∇ϕYX,CV )− gM (X,Y )η(V ).

Using equation (2.3), (2.4) and (2.11), we get gM (∇XY, V ) = gM (TXϕY,BV )+gM (∇ϕY ϕX, ϕCV ) − gM (X,Y )η(V ). Since f is a conformal submersion, usingequations (2.15), (4.2) and lemma 1(i), we have

gM (∇XY, V ) = gM (TXϕY,BV ) + gM (ϕX, ϕY )gM (Hgradlnλ, ϕCV )

+1

λ2gN (∇f∗ϕY f∗ϕX, f∗ϕCV )− gM (X,Y )η(V ),

Thus it follows that M(ker f∗) is totally geodesic if and only if equation (4.9) issatisfied.

On the other hand, for X,Y ∈ Γ(ker f∗) and V,W ∈ (Γ(ker f∗)⊥), using

equations (2.3), (2.4) and (2.11), we have

gM (∇VW,X) = gM (AVBW,ϕX) + gM (H∇V CW,ϕX)

+η(Y )gM (X,ϕV )

Since f is a conformal submersion, using equation (2.15) and lemma 1(i), wehave

gM (∇VW,X) = gM (AVBW,ϕX)− 1

λ2gM (Hgradlnλ, V )gN (f∗CW, f∗ϕX)

− 1

λ2gM (Hgradlnλ,CW )gN (f∗V, f∗ϕX)

+1

λ2gM (V,CW )gN (f∗Hgradlnλ, f∗ϕX)+

1

λ2gN (∇fV f∗CW, f∗ϕX).

Moreover, using equation (4.2), we get

gM (∇VW,X) = gM (AVBW,ϕX)− gM (Hgradlnλ,W )gM (V, ϕX)

+gM (Hgradlnλ, ϕX)gM (V,CW )

+1

λ2gN (∇fV f∗CW, f∗ϕX) + η(W )gM (V, ϕX)

Thus M(ker f∗)⊥ is totally umbilical ⇔ equation (4.10) satisfied.

Similarly, from Theorem (15), we deduce the following result.

Theorem 24. Let (M,ϕ, ξ, η, gM ) be a Kenmotsu manifold and (N, gN ) be aRiemannian manifold. Let f : (M,ϕ, ξ, η, gM ) → (N, gN ) be a conformal anti-invariant submersion with rank(ker f∗) > 1. If M is a locally warped productmanifold of the form M(ker f∗)⊥ ×λM(ker f∗), then either f is horizontally homo-thetic submersion or the fibers are one dimensional.

Page 513: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CONFORMAL ANTI-INVARIANT SUBMERSIONS ... 499

5. Example

Note that given an Euclidean space (x1, ......x2m, x2m+1) with coordinates wecan canonically choose an almost contact structure ϕ on R2m+1 as follows:

ϕ(a1∂

∂x1+ a2

∂x2+ ..........+ a2m−1

∂x2m−1+ a2m

∂x2m+ a2m+1

∂x2m+1)

= (−a2∂

∂x1+ a1

∂x2+ ..........− a2m

∂x2m−1+ a2m−1

∂x2m),

where ξ = ∂∂x2m+1

and a1, a2, ........, a2m, a2m+1 are C∞−real valued functions

in R. Let η = dx2m+1 and ( ∂∂x1

, ∂∂x2

, ......., ∂∂x2m

, ∂∂x2m+1

) is orthogonal basis of

vector fields on R2m+1.

Example 1. Define a map f : R5 → R2 by f(x1, ......, x5)=(ex2 cosx4, ex2 sinx4).

Then we have

ker f∗ =<∂

∂x1,∂

∂x3,∂

∂x5> and (ker f∗)

⊥ =<∂

∂x2,∂

∂x4>

Thus, f is a conformal anti-invariant submersion with λ = ex2 .

Example 2. Define a map f : R5 → R3 by

f(x1, ......, x5) = (ex1 sinx3, ex1 cosx3, e

x1 sinx5)

Then we have

ker f∗ =<∂

∂x2,∂

∂x4> and (ker f∗)

⊥ =<∂

∂x1,∂

∂x3,∂

∂x5>

Thus, f is a conformal anti-invariant submersion with λ = ex1 .

References

[1] M.A. Akyol and B. Sahin, Conformal anti-invariant submersions from al-most Hermitian manifolds, Turk J. Math., 40 (2016), 43-70.

[2] D.E. Blair, Contact manifolds in Riemannian geometry, Lecture Notes inMath., 509 (1976), Berlin-Heidelberg-New York.

[3] P. Baird and J.C. Wood, Harmonic Morphisms Between Riemannian Man-ifolds, London Mathematical Society Monographs, 29, Oxford UniversityPress, The Clarendon Press, Oxford, (2003).

[4] R.L. Bishop and B. O’Neill, Manifolds of negative curvature, Trans AmerMath. Soc., 145 (1969), 1-49.

[5] J.P. Bourguignon and H.B. Lawson, A Mathematician’s visit to Kaluza-Klein theory, Rend. Semin. Mat. Torino Fasc. Spec., (1989), 143-163.

Page 514: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

500 SUSHIL KUMAR and RAJENDRA PRASAD

[6] D. Chinea, Almost contact metric submersions, Rend. Circ. Mat. Palermo,34(1) (1985), 89–104.

[7] M. Falcitelli, S. Ianus and A. M. Pastore, Riemannian submersions andrelated topics, World Scientific Publishing Co., 2004.

[8] B. Fuglede, Harmonic morphisms between Riemannian manifolds, Ann.Inst. Fourier (Grenoble), 28 (1978), 107–144.

[9] A. Gray, Pseudo-Riemannian almost product manifolds and submersions,Journal of Applied Mathematics and Mechanics, 16 (1967), 715–737.

[10] D. Gromoll, W. Klingenberg and W. Meyer, Riemannsche Geometrie imGroβen, Lecture Notes in Mathematics, 55, Springer, 1975.

[11] S. Ianus and M. Visinescu, Kaluza-Klein theory with scalar fields and gen-eralized Hopf manifolds, Class. Quantum Gravity, 4 (1987), 1317-1325.

[12] T. Ishihara, A mapping of Riemannian manifolds which preserves harmonicfunctions, J. Math. Kyoto. Univ., 19 (1979), 215–229.

[13] B. O’Neill, The fundamental equations of a submersion, Mich. Math. J., 13(1966), 458–469.

[14] R. Ponge, H. Reckziegel, Twisted products in pseudo-Riemannian geometry,Geom Dedicata, 48 (1993), 15-25.

[15] B. Watson and G, G|−Riemannian submersions and nonlinear gauge fieldequations of general relativity, In: Rassias, T. (ed.) Global Analysis - Anal-ysis on manifolds, dedicated M. Morse. Teubner-Texte Math., 57 (1983),324-349, Teubner, Leipzig.

[16] B. Watson, Almost Hermitian submersions, J. Differential Geometry, 11(1),(1976), 147–165.

Accepted: 1.02.2018

Page 515: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (501–509) 501

THE EFFECT OF METHODS OF OPERATION RESEARCHIN OBTAINING THE BEST RESULTS IN THE TRADE

Ahmed Atallah Alsaraireh∗

The University of JordanDepartment of Computer Information SystemsAqabaJordanah [email protected]@ju.edu.jo

Mohammad AlmasarwehThe University of JordanDepartment of Business [email protected]

Mahmoud Barakat AlnawaisehThe University of JordanDepartment of Business [email protected]

S. Al WadiThe University of JordanDepartment of Risk Management and [email protected]

Vandana BhamaIndian Institute of Technology

Department of Management Studies

India

[email protected]

Abstract. This study aims to determine the most effective method in operationresearch regarding the potential to reduce the cost in a minimum time and achievingmore profit. In this study, three methods were used : Simplex method, Simplex methodand transportation problems and Simplex method, transportation problems, and criticalpath method. A sample of 10 traders, who work in the same field and import thesame commodities, participated in the study. Three models were applied to evaluatethe result and compare between them, actual result from these models and randomly

∗. Corresponsing author

Page 516: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

502A.A. ALSARAIREH, M. ALMASARWEH, M. B. ALNAWAISEH, S. AL WADI, V. BHAMA

results. After that the researchers applying the survey to find the degree of traderssatisfaction for these models and results.

The Statistical Package (SPSS) software was used for data analysis. The results ofthis study indicated that a three methods were a better. Also the results of questionerare linked to the satisfaction of traders on the three methods.

Keywords: operation research methods, traders satisfaction, mathematical models.

1. Introduction

The commerce field is developing and growing rapidly , and increasing the awarecompetency between all organizations in the world, and striving to be moresuccesses, survival and achieving to a competitive advantages. Therefore, allorganizations seek to minimize the cost and time, and increase their marginprofit. For these reasons, this study aims to link this important filed with math-ematical approaches including operation research, like some: Simplex method,Transportation problems, and Critical path method. For more details about theapplication of the operation research in a new fields refer to (V.N. Mishra, L.N.Mishra, 2012), (L.N. Mishra, 2017) and (Deepmala, 2014).

2. Literature review

Operations research as a science has been used to help solve decision prob-lems using mathematical and statistical models for a long time, and it has beendevelop in many scientific fields such as : Mathematics, Engineering and Man-agement. It is one of the areas that has contributed to solving many of mathe-matical problems and management problems: simplex method, Transportationproblems and the network.

The first book of operations research appeared in 1946 As ”Methods ofResearch Operations” for Morris and Campbells, the most important discoverieswere in this. In (Dantezig, 1949) developed a method of problem solving in theSimplex Method, which had the greatest effect in obtaining results in a clearmathematical style, also in (Dantezig, 1951) discussed a Proof of the Equivalenceof the Programming Problem and the Game Problem. In 1952, the Society ofResearch published its first journal of operations research and the publicationof another journal, which helped to develop this area and its use in decisionmaking. Then Taylor, Fayol, Gilbert, and Mayo used scientific methods andapplied the principles of assignment problems.

In (Walker and Kelly, 1959) developed a critical method that helped resolvemany of the problems that created the way for solution in terms of distance andtime.

(Dantzig, 1963), discussed a Linear Programming and Extensions, and (Gi-ant, 1966) used the principle of drawing to solve various problems in manyprojects but this mothod is not enough to solve all problems, for example, wecannot use this method for three variables or more. In (Khachian, 1979) pro-posed a new method of solving the linear program, but theoretically only. In

Page 517: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THE EFFECT OF METHODS OF OPERATION RESEARCH ... 503

(Karmarkar, 1984) developed a new polynomial-time algorithm for linear pro-gramming and introduced an algebraic method with high results but the rest ofthe simplex is the easiest. In (Lucey, 1994) discussed a quantitative techique inthe operation research, also (Kolman and Robert, 1995) introduced a new appli-cation about the linear programming and applied a different branch in operationresearch.

The applications continued to be widely period-intensiveuntil (Hillier, 2001),(Winston, 2004), (Khobragade, 2005), and (Hamdy, 2007) presented a new ap-plication in operation research, particularly in Semplex and transportation prob-lems, and they discussed an alternative approach about simplex method.

Later, (Hashamdar, 2011), (Khobragade, 2012), (Vaidya, 2012), introducednew information to find an alternative approach to the simplex, method Op-timum solution to the simplex method, and optimize analytical condition instructural analysis. in the recent years, (Kedia, 2013), (Vaidya, 2014), and(Jervin, 2015) discussed a New Variant of Simplex to solve a game problemusing a quick simplex method. In (Vaidya and Kasturiwale, 2016) discussed anew approach while solving two phase simplex method, and they discussed thissubject with respect to a number of iteration.

Since the applications remained separate and all studies discussed the evo-lution of simplex method, this study attempts to investigate the application ofmore than one mathematical model in problem solving and work on diffusion.

3. The problem of the study and questions

Due to the previous studies were based on separate mathematical models anddid not apply some of models on the same problem. Therefore, it is necessaryto form and apply several mathematical models in order to compare the resultsand determine the most appropriate model of the solution.

Question 1: Is there a difference between the actual results and the expectedresults?

Question 2: do the best results depend on the model of operation research?

Question 3: which is the best model?

Question 4: are the traders significantly satisfied ?

4. The importance of study

This study aims to encourage traders to use mathematical applications in theprocess of comparison between random application and mathematical applica-tion.

Page 518: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

504A.A. ALSARAIREH, M. ALMASARWEH, M. B. ALNAWAISEH, S. AL WADI, V. BHAMA

5. Methodology and procedures

The Study population: It refers to all traders who were importing the samecommodities.

The Study Sample: The traders who were importing the same commoditiesin Aqaba-Jordan.

Study Tool: This study prepared and applied mathematical models to com-pare results.

1. Collect the actual data from traders to apply the models.

2. Calculate the results of the models for all traders.

3. Choose the best result of each trader.

6. Models of operation research

1. Simplex method .

2. Simplex method and transportation problems.

3. Simplex method, transportation problems, and critical path method.

7. The results

This study aims to investigate if the mathematical models are effect of a resultson a commerce problem. So we will present the results in two parts:

7.1 Part 1

the researchers here discussed the answers of the following questions:

Question 1: Is there a difference between the actual results and expectedresults?

Question 2: do the best results depend on the model of operation research?

Question 3: which is the best model?

The following table represents the values of minimum costs, maximum prof-its, and minimum time in two columns . The first column represents the actualresults that take from the traders, while The second column represents the ex-pected values of operation research models.

as shown by previous tables, there is a difference in results between the realresults and expected results. The models were better than the real results, more-over the best result depends on the type of model. But there exist a difference inthe result of model, because there is a different way in transportation problems.Also it is noticeable that the last model is the best one.

Page 519: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THE EFFECT OF METHODS OF OPERATION RESEARCH ... 505

Table 1: Results of ModelsThe actual results The results, If the trader applied the three modelswithout models model 1 model 2 model 3

Trader1Max. profit( 10000),Min. cost(15000),Min. time(25 days)

Max. profit(10500),Min. cost( 14400),Min. time(24 days)

Max. profit(11200),Min. cost(14100),Min. time(23 days)

Max. profit(12000),Min.cost(13500),

Min. time(20 days)

Trader2Max. profit( 13000),Min. cost(11000),Min. time(30 days)

Max. profit( 13500),Min. cost( 10700),Min. time(26 days)

Max. profit( 13600),Min. cost( 9000),

Min. time( 23 days)

Max. profit( 14000),Min. cost( 9600),

Min. time(19 days)

Trader3Max. profit(18000),Min. cost( 12000),Min. time( 29 days)

Max. profit( 17000),Min. cost( 11000),Min. time( 28 days)

Max. profit( 10000),Min. cost(10300),Min.time(25days)

Max. profit( 10000),Min. cost( 10000),Min. time(20 days)

Trader 4Max. profit( 8000),Min. cost( 6000),

Min. time(15 days)

Max. profit( 8300),Min. cost( 5800),Min.time(13 days)

Max. profit( 9000),Min. cost( 5200),Min.time(11 days)

Max. profit( 12000),Min. cost( 4500),

Min. time(10 days)

Trader 5Max. profit( 9000),Min. cost( 8000),Min. time(15 days)

Max. profit( 9200),Min. cost,( 7600),Min. time(14 days)

Max. profit,( 9600),Min. cost( 7300),Min. time( 13 days)

Max. profit( 10000),Min. cost( 7000),Min. time(11 days)

Trader6Max. profit( 16000),Min. cost( 10000),Min. time(22 days)

Max. profit( 17000),Min. cost( 9500),Min. time,(19 days)

Max. profit(17500),Min. cost( 9200),Min. time(17 days)

Max. profit( 18000),Min. cost( 8800),Min. time(16 days)

Trader7Max. profit( 14000),Min. cost( 4000),Min. time(18 days)

Max. profit( 14500),Min. cost( 3950),Min. time(18 days)

Max. profit( 14700),Min. cost( 3800),Min.time(16 days)

Max. profit( 14900),Min. cost( 3700),Min.time(15 days)

Trader8Max. profit( 23000),Min. cost( 7000),Min. time( 17 days)

Max. profit( 23400),Min. cost( 6700),Min. time( 15 days)

Max. profit( 24000),Min. cost( 6500),Min. time(14 days)

Max. profit( 24600),Min. cost( 6200),Min. time( 13 days)

Trader9Max. profit(7000),Min. cost( 5000),Min. time(12 days)

Max. profit(7300),Min. cost(4900),Min. time(11 days)

Max. profit( 7500),Min. cost(4700),Min. time(10 days)

Max. profit( 8000),Min. cost( 4300),Min. time(9 days)

Trader 10Max. profit( 20000),Min. cost( 11000),Min. time(30 days)

Max. profit( 20100),Min. cost( 10900),Min. time,(27 days)

Max. profit( 20500),Min. cost,( 10600),Min. time,(24 days)

Max. profit( 21000),Min. cost(10000),Min. time(22 days)

7.2 Part 2.

In this part we discuss the answer of the following question:

Question 4: are the traders significantly satisfied ?

This part was concerned with the enumeration of the variables that called forthe application of the mathematical models that were enumerated in this studyand were divided into two axes so that each axis contained a set of questions.

This questionnaire was introduced after the mathematical models were ap-plied to the data collected from the study sample and observation results.

7.3 Question axes:

The first axis: Evaluation of models in terms of the importance, quality andfeatures available. This axis has been covered in the following questionsQ1, Q2, ....., Q7.

The second axis: the spread of mathematical models and to the attempt toapply and comprehensiveness and level of empowerment. This axis hasbeen covered in Q8, Q9, ....., Q12.

Page 520: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

506A.A. ALSARAIREH, M. ALMASARWEH, M. B. ALNAWAISEH, S. AL WADI, V. BHAMA

Table 2: ResultsFrequency Percent Valid Percent Cumulative Percent

Q1Agree

Strongly agreeTotal

614*20

3070100

3070100

30100-

Q2Agree

Strongly agreeTotal

812*20

4060100

4060100

40100-

Q3

DisagreeAgree

Strongly agreeTotal

16

13*20

53065100

53065100

335100

Q4

DisagreeAgree

Strongly agreeTotal

19

10*20

54550100

54550100

550100-

Q5Agree

Strongly agreeTotal

11*920

5545100

5545100

55100-

Q6

DisagreeAgree

Strongly agreeTotal

18

11*20

5405510

54055100

545100-

Q7

DisagreeAgree

Strongly agreeTotal

113*620

56530100

56530100

570100-

Q8

DisagreeAgree

Strongly agreeTotal

310*720

155035100

155035100

1565100-

Q9

DisagreeAgree

Strongly agreeTotal

27

11*20

103555100

103555100

1045100-

Q10

DisagreeAgree

Strongly agreeTotal

16

13*20

53065100

53065100

535100-

Q11Agree

Strongly agreeTotal

614*20

3070100

3070100

3010-

Q12Agree

Strongly agreeTotal

614*20

3070100

3070100

30100-

8. The questionnaire results

The following table represents the frequency distribution of all the questionsasked and the higher frequency and percentages for each frequency were deter-mined.

The previous table presents the distribution of data pertaining to the per-centage and frequency of all questions that used in study, and we notice thatthe maximum percentage of the results was at strongly agree and agree items.

Page 521: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THE EFFECT OF METHODS OF OPERATION RESEARCH ... 507

Table 3: My captionQ Measure

StronglyAgree

Agree Disagree mean st. dev. Result

First Axis Q1Frequency

%1470

630

--

2.7 0.470162Stronglyagree

First Axis Q2Frequency

%1260

840

--

2.6 0.50262Stronglyagree

First Axis Q3Frequency

%1365

630

15

2.6 0.598243Stronglyagree

First Axis Q4Frequenc

y%1050

945

15

2.45 0.60481Stronglyagree

First Axis Q5Frequency

%945

1155

--

2.45 0.51042Stronglyagree

First Axis Q6Frequency

%1155

840

15

2.5 0.60698Stronglyagree

First Axis Q7Frequency

%630

1365

15

2.25 0.55012 Agree

FirstResult

Frequency%

7553.5

6143.5

43

2.51 0.25163Stronglyagree

Second Axis Q8Frequency

%735

1050

315

2.2 0.55012 Agree

Second Axis Q9Frequency

%1155

735

210

2.45 0.69585Stronglyagree

Second Axis Q10Frequency

%1365

630

15

2.6 0.68633Stronglyagree

Second Axis Q11Frequency

%1470

630

--

2.7 0.47016Stronglyagree

Second Axis Q12Frequency

%1470

630

--

2.7 0.47016Stronglyagree

SecondResult

Frequency%

5959

3535

66

2.53 0.22734Stronglyagree

Table 4: Likart ScaleWeighted average Degree of approval

1 - 1.66 Disagree

1.67 - 2.33 Agree

2.34 - 3 Strongly Agree

Table(3) presents all the results and comparisons required to answer the axesof the questionnaire that was applied and relying on the Likart scale, providesresults essential to make judgments.

Note that the result of first axis 2.51 was strictly agree and was the resultof second axis 2.53 that mean agree. Therefore, we can say that the results ofthe study indicate that the models are important and have advantages in theapplication and high quality in improving the results and that the models arecomprehensive solutions to trade problems, specifically financial.

9. Conclusion

This study revealed that there is a difference between the actual values andexpected values when we applied the mathematical models. The result of modelswas better than the actual values, also we note that the traders’ satisfaction wassignificant.

Page 522: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

508A.A. ALSARAIREH, M. ALMASARWEH, M. B. ALNAWAISEH, S. AL WADI, V. BHAMA

References

[1] G. Dantzig, A proof of the equivalence of the programming problem and thegame problem, in T.C. Koopmans (ed.), Activity Analysis of Productionand Allocation, Wiley, New York, 1951.

[2] James E. Kelley, Jr, Morgan R. Walker, Critical-path planning and schedul-ing, Papers presented at the December 1-3, eastern joint IRE-AIEE-ACMcomputer conference, 160-173, December 01-03, 1959, Boston.

[3] G. Dantzig, Linear programming and extensions, Princeton UniversityPress, Princeton, New Jersey, 1963.

[4] L.G. Khachian, Polynomial algorithm for linear programming, DokladyAkademia Nauk USSR, Mathematica, 244 (1979), 1093-1096.

[5] N. Karmarkar, A new polynomial-time algorithm for linear programming,Combinatorica, 4 (1984), 373-395.

[6] T. Lucey, Quantitative Techniques, 2nd edition, D. P. Publications Ltd.,1992.

[7] Kolman and Robert, Elementary linear programming with application, 2ndedition, Academic Press Inc, United States, 1995.

[8] Hillier, Introduction to operations research, 7th edition, McGraw-Hill Sci-ence/Engineering/Math; 7 edition, 2001.

[9] Wayne Winston, Operations research: applications and algorithms, (4thedition), Duxbury, 2004.

[10] A. Hamdy, Operations research an introduction, 8th edition. Prentice-Hall,Inc. Upper Saddle River, NJ, USA 2007.

[11] N.W. Khobragade, P.G. Khot, Alternative approach to the simplex method-II, Acta Ciencia Indica, India, 2005.

[12] H. Hashamdar, Z. Ibrahim, M. Jameel, A. Karbakhsh, Z. Ismail and M. Ko-braei, Use of the simplex method to optimize analytical condition in struc-tural analysis, International Journal of Physical Sciences, 6(2011), 691-697.

[13] N.W. Khobragade, P.G. Khot, An alternative approach to the simplexmethod-1, Bulletin of Pure and Applied Sciences, 23E(2012), 35-40.

[14] N.V. Vaidya, N.W. Khobragade, Optimum solution to the simplex method- an alternative approach, Int. J Latest Trend Math. 2(2012), 99-105.

[15] R.G. Kedia, A new variant of simplex method, international Journal ofEngineering and Management Research, 3 (2013), 2013.

Page 523: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THE EFFECT OF METHODS OF OPERATION RESEARCH ... 509

[16] N.V. Vaidya, N.N. Kasturiwale, Solving game problems using a quick sim-plex algorithm a new method, Int. J Latest Trend Math, 2014, 165-182.

[17] Jervin Zen Lobo, Two square determinant approach for simplex method,IOSR Journal of Mathematics, 2015, 2278-5728.

[18] N.V. Vaidya and N.N. Kasturiwale, British Journal of Mathematics andComputer Science, 16 (2016), 1-15, Article no.BJMCS.24440.

[19] V.N. Mishra, L.N. Mishra, Trigonometric approximation of signals (func-tions) in Lp(p ≥ 1) norm, International Journal of Contemporary Mathe-matical Sciences, 7 (2012), 909-918.

[20] L.N. Mishra, On existence and behavior of solutions to some nonlinearintegral equations with Applications, Ph.D. Thesis, National Institute ofTechnology, Silchar 788 010, Assam, India, 2017.

[21] Deepmala, A study on fixed point theorems for nonlinear contractions andits applications, Ph.D. Thesis, Pt. Ravishankar Shukla University, Raipur492 010, Chhatisgarh, India, 2014.

Accepted: 2.02.2018

Page 524: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (510–527) 510

SOME NEW k-FRACTIONAL INTEGRAL INEQUALITIESCONTAINING MULTIPLE PARAMETERS VIAGENERALIZED (s,m)-PREINVEXITY

Yao ZhangDepartment of MathematicsCollege of ScienceChina Three Gorges UniversityYichang, 443002P. R. [email protected]

Tingsong Du∗

Three Gorges Mathematical Research CenterChina Three Gorges UniversityYichang, 443002P. R. [email protected]

Hao WangDepartment of Mathematics

College of Science

China Three Gorges University

Yichang, 443002

P. R. China

[email protected]

Abstract. We establish some new k-fractional integral inequalities for differentiablefunctions based on generalized (s,m)-preinvexity. We also prove Hadamard-type in-equalities involving products of two generalized (s,m)-preinvex functions. These in-equalities include some previously known results as special cases.

Keywords: Hadamard-type inequalities; generalized (s,m)-preinvex functions; k-fractional integrals.

1. Introduction

The following double inequality is notable in the literature as the Hermite-Hadamard inequality.

Theorem 1.1. Suppose that f : I ⊆ R→ R is a convex function defined on theinterval I of real numbers and a, b ∈ I along with a < b. The following double

∗. Corresponding author

Page 525: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOME NEW k-FRACTIONAL INTEGRAL INEQUALITIES ... 511

inequality holds:

f

(a+ b

2

)≤ 1

b− a

∫ b

af(x)dx ≤ f(a) + f(b)

2.(1.1)

A large number of generalizations and refinements on the inequality (1.1)have been presented, for example, see [7, 8, 10, 13, 16, 17, 19, 20, 21, 27, 28]and the references therein.

In 2013, Sarikaya et al. established the following Hadamard-type inequalitiesby utilizing Riemann-Liouville fractional integrals.

Theorem 1.2 ([30]). Let f : [a, b] → R be a positive function along with 0 ≤a < b and let f ∈ L1[a, b]. Suppose that f is a convex function on [a, b], thenthe following inequalities for fractional integrals hold:

f(a+ b

2

)≤ Γ(µ+ 1)

2(b− a)µ[Jµa+f(b) + Jµ

b−f(a)] ≤ f(a) + f(b)

2,(1.2)

where the symbols Jµa+f and Jµ

b−f denote respectively the left-sided and right-sided Riemann-Liouville fractional integrals of order µ > 0 defined by

Jµa+f(x) =

1

Γ(µ)

∫ x

a(x− t)µ−1f(t)dt, a < x

and

Jµb−f(x) =

1

Γ(µ)

∫ b

x(t− x)µ−1f(t)dt, x < b.

Here, Γ(µ) is the gamma function and its definition is Γ(µ) =∫∞0 e−ttµ−1dt. It

is to be noted that J0a+f(x) = J0

b−f(x) = f(x).

In the case of µ = 1, the fractional integral reduces to the classical integral.In 2016, Sarikaya and Yildirim presented another form with respect to

Riemann-Liouville fractional Hadamard-type inequalities as follows.

Theorem 1.3 ([31]). Let f : [a, b]→ R be a positive function with 0 ≤ a < b andf ∈ L1[a, b]. If f is a convex function on [a, b], then the following inequalitiesfor fractional integrals hold:

f(a+ b

2

)≤ 2µ−1Γ(µ+ 1)

(b− a)µ

[Jµ(a+b

2)+f(b) + Jµ

(a+b2

)−f(a)

]≤ f(a) + f(b)

2(1.3)

with µ > 0.

Due to the extensive application of Riemann-Liouville fractional integrals,there have been many studies involving this integral operator, for example, see[14, 15, 22, 26, 33] and the references therein.

In 2012, Mubeen and Habibullah presented the following k-fractional inte-grals.

Page 526: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

512 YAO ZHANG, TINGSONG DU and HAO WANG

Definition 1.1 ([24]). Let f ∈ L1[a, b], then Riemann-Liouville k-fractionalintegrals kJ

µa+f(x) and kJ

µb−f(x) of order µ > 0 are given as

kJµa+f(x) =

1

kΓk(µ)

∫ x

a(x− t)

µk−1f(t)dt, (0 ≤ a < x < b)

and

kJµb−f(x) =

1

kΓk(µ)

∫ b

x(t− x)

µk−1f(t)dt, (0 ≤ a < x < b),

respectively, where k > 0 and Γk(µ) is the k-gamma function defined by Γk(µ) =∫∞0 tµ−1e−

tk

k dt. Furthermore, Γk(µ+ k) = µΓk(µ) and kJ0a+f(x) = kJ

0b−f(x) =

f(x).

In the case of k = 1, the k-fractional integrals reduces to Riemann-Liouvillefractional integrals. For some recent results related to the k-fractional integralinequalities see [1, 2, 5, 29, 32].

In 2016, Farid et al. popularized Theorem 1.3 to the form of k-fractionalintegrals.

Theorem 1.4 ([11]). Let f : [a, b]→ R be a positive function with 0 ≤ a < b andf ∈ L1[a, b]. If f is a convex function on [a, b], then the following inequalitiesfor k-fractional integrals hold:

f(a+ b

2

)≤ 2

µk−1Γk(µ+k)

(b− a)µk

[kJ

µ

(a+b2

)+f(b) + kJ

µ

(a+b2

)−f(a)

]≤f(a)+f(b)

2(1.4)

with µ, k > 0.

The main aim of this article is to establish some new k-fractional integralinequalities related to generalized (s,m)-preinvex functions. The obtained k-fractional integral inequalities can be viewed as the extension of the results of[6, 11, 18, 23] and [25].

To end this section, let us recall some special functions and basic definitionsas follows.

(1) The beta function:

β(x, y) =Γ(x)Γ(y)

Γ(x+ y)=

∫ 1

0tx−1(1− t)y−1dt, x, y > 0,

(2) The hypergeometric function:

2F1(a, b; c; z) =1

β(b, c− b)

∫ 1

0tb−1(1− t)c−b−1(1− zt)−adt, c > b > 0, |z| < 1.

Page 527: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOME NEW k-FRACTIONAL INTEGRAL INEQUALITIES ... 513

Definition 1.2 ([12]). A function f : [0,∞) → R is named s-convex in thesecond sense with s ∈ (0, 1], if

f(αx+ βy) ≤ αsf(x) + βsf(y)

holds for all x, y ∈ [0,∞) and α, β ≥ 0 along with α+ β = 1.

Definition 1.3 ([9]). A set K ⊆ Rn is named m-invex with respect to themapping η : K×K×(0, 1]→ Rn for some fixed m ∈ (0, 1], if mx+λη(y, x,m) ∈K holds for all x, y ∈ K and λ ∈ [0, 1].

Definition 1.4 ([9]). Let K ⊆ Rn be an open m-invex subset with respect toη : K×K× (0, 1]→ Rn. For some fixed s,m ∈ (0, 1], f is said to be generalized(s,m)-preinvex, if

f(mx+ tη(y, x,m)

)≤ m(1− t)sf(x) + tsf(y)

is valid for all x, y ∈ K and t ∈ [0, 1].

Definition 1.5 ([3]). Let K ⊆ Rn be an invex set with respect to the mappingη : K ×K → Rn. For every x, y ∈ K, the η-path Pxv joining the points x andv = x+ η(y, x) is defined by

Pxv =z|z = x+ tη(y, x), t ∈ [0, 1]

.

Definition 1.6. Let K ⊆ Rn be an m-invex set with respect to η : K × K ×(0, 1] → Rn. For every u, v ∈ K and m ∈ (0, 1], the ηm-path Pvw joining thepoints mv and w = mv + η(u, v,m) is defined by

Pvw =z|z = mv + λη(u, v,m), λ ∈ [0, 1]

.

Remark 1.1. If η(u, v,m) with m = 1 reduces to η(u, v), then Definition 1.6reduces to Definition 1.5.

2. k-Fractional inequalities involving differentiable functions

Throughout this section, let R be the set of all real numbers, N∗ be the set ofall positive integers and let K ⊆ R be an open m-invex subset with respect toη : K × K × (0, 1] → R \ 0 for some fixed m ∈ (0, 1], a, b ∈ K with a < b.Assume that f : K → R is a differentiable function such that f ′ is integrable onthe ηm-path Pvw : w = mv + η(u, v,m) for arbitrary u, v ∈ [a, b]. Before statingthe results we define the following notations:

Hηm(µ, k;n, x)

:=n+ 1

2

[ηµk (x, a,m)f

(ma+ η(x, a,m)

)+ η

µk (b, x,m)f(mx)

η(b, a,m)(2.1)

Page 528: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

514 YAO ZHANG, TINGSONG DU and HAO WANG

+ηµk (x, a,m)f(ma) + η

µk (b, x,m)f

(mx+ η(b, x,m)

)η(b, a,m)

]

− (n+ 1)µk+1Γk(µ+ k)

2η(b, a,m)

×[kJ

µ(ma)+

f

(ma+

1

n+ 1η(x, a,m

))+ kJ

µ(ma+η(x,a,m))−f

(ma+

n

n+ 1η(x, a,m

))+ kJ

µ(mx)+

f

(mx+

1

n+ 1η(b, x,m

))+ kJ

µ(mx+η(b,x,m))−f

(mx+

n

n+ 1η(b, x,m

))].

Especially if η(u, v,m) = u − mv with m = 1 for u, v ∈ [a, b], equation (2.1)reduces to

H(µ, k;n, x)

:=n+ 1

2

[(x− a)

µk + (b− x)

µk

b− af(x) +

(x− a)µk f(a) + (b− x)

µk f(b)

b− a

]− (n+ 1)

µk+1Γk(µ+ k)

2(b− a)

[kJ

µa+f

(n

n+ 1a+

1

n+ 1x

)+ kJ

µx−f

(1

n+ 1a+

n

n+ 1x

)+ kJ

µx+f

(n

n+ 1x+

1

n+ 1b

)+ kJ

µb−f

(1

n+ 1x+

n

n+ 1b

)].

We need the succeeding lemma.

Lemma 2.1. The following k-fractional integral identity along with x ∈ (a, b),n ∈ N∗, µ > 0 and k > 0 holds:

Hηm(µ, k;n, x)

=ηµk+1(x, a,m)

2η(b, a,m)

∫ 1

0tµk f ′(ma+

n+ t

n+ 1η(x, a,m

))dt

−∫ 1

0tµk f ′(ma+

1− tn+ 1

η(x, a,m

))dt

− ηµk+1(b, x,m)

2η(b, a,m)

∫ 1

0tµk f ′(mx+

1− tn+ 1

η(b, x,m

))dt

−∫ 1

0tµk f ′(mx+

n+ t

n+ 1η(b, x,m

))dt

.

(2.2)

Page 529: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOME NEW k-FRACTIONAL INTEGRAL INEQUALITIES ... 515

Proof. By integration by parts and changing the variable, we can state

∫ 1

0tµk f ′(ma+

n+ t

n+ 1η(x, a,m

))dt

=(n+1)t

µk f(ma+ n+t

n+1η(x, a,m))

η(x, a,m)

∣∣∣∣10

−∫ 1

0

µ(n+1)tµk−1f

(ma+ n+t

n+1η(x, a,m))

kη(x, a,m)dt

=(n+ 1)f

(ma+ η(x, a,m)

)η(x, a,m)

− µ(n+ 1)µk+1

kηµk+1(x, a,m)

∫ ma+η(x,a,m)

ma+ nn+1

η(x,a,m)

[u−

(ma+

n

n+ 1η(x, a,m

))]µk−1

f(u)du

=(n+ 1)f

(ma+ η(x, a,m)

)η(x, a,m)

− (n+ 1)µk+1Γk(µ+ k)

ηµk+1(x, a,m)

kJµ(ma+η(x,a,m))−f

(ma+

n

n+ 1η(x, a,m

)).

Similarly, we get

∫ 1

0tµk f ′(ma+

1− tn+ 1

η(x, a,m

))dt

= −(n+ 1)f(ma)

η(x, a,m)+

(n+ 1)µk+1Γk(µ+ k)

ηµk+1(x, a,m)

kJµ(ma)+

f

(ma+

1

n+ 1η(x, a,m

)),

∫ 1

0tµk f ′(mx+

1− tn+ 1

η(b, x,m

))dt

= −(n+ 1)f(mx)

η(b, x,m)+

(n+ 1)µk+1Γk(µ+ k)

ηµk+1(b, x,m)

kJµ(mx)+

f

(mx+

1

n+ 1η(b, x,m

))and ∫ 1

0tµk f ′(mx+

n+ t

n+ 1η(b, x,m

))dt

=(n+ 1)f

(mx+ η(b, x,m)

)η(b, x,m)

− (n+ 1)µk+1Γk(µ+ k)

ηµk+1(b, x,m)

kJµ(mx+η(b,x,m))−f

(mx+

n

n+ 1η(b, x,m

)).

After suitable rearrangements we obtain the desired result. This ends the proof.

Page 530: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

516 YAO ZHANG, TINGSONG DU and HAO WANG

Corollary 2.1. In Lemma 2.1, if η(u, v,m) = u −mv with m = 1 for u, v ∈[a, b], we have

H(µ, k;n, x)

=(x− a)

µk+1

2(b− a)

∫ 1

0tµk f ′(n+ t

n+ 1x+

1− tn+ 1

a

)dt

−∫ 1

0tµk f ′(

1− tn+ 1

x+n+ t

n+ 1a

)dt

− (b− x)µk+1

2(b− a)

∫ 1

0tµk f ′(n+ t

n+ 1x+

1− tn+ 1

b

)dt

−∫ 1

0tµk f ′(

1− tn+ 1

x+n+ t

n+ 1b

)dt

.

(2.3)

Remark 2.1. (i) In Lemma 2.1, if η(u, v,m) with m = 1 reduces to η(u, v) foru, v ∈ [a, b], putting k = 1 along with n = 1, we have Lemma 2.8 in [25].

(ii) In Corollary 2.1,

(a) putting k = 1, we have Lemma 2.5 in [4],

(b) putting k = 1 = n, we have Lemma 1 in [23]. Further, putting µ = 1,we have Lemma 1 in [18].

Utilizing Lemma 2.1, the following theorem can be obtained.

Theorem 2.1. Suppose that |f ′|q for q ≥ 1 is generalized (s,m)-preinvex, thenfor x ∈ (a, b), n ∈ N∗, µ > 0 and k > 0, the following k-fractional integralinequality holds:

∣∣Hηm(µ, k;n, x)∣∣≤( 1

µk+1

)1− 1q

∣∣η µk+1(x, a,m)∣∣

2|η(b, a,m)|

[(mΦ1(µ, k, n, s)

∣∣f ′(a)∣∣q

+ Φ2(µ, k, n, s)∣∣f ′(x)

∣∣q) 1q

+(mΦ2(µ, k, n, s)

∣∣f ′(a)∣∣q + Φ1(µ, k, n, s)

∣∣f ′(x)∣∣q) 1

q

]+

∣∣η µk+1(b, x,m)∣∣

2|η(b, a,m)|

[(mΦ2(µ, k, n, s)

∣∣f ′(x)∣∣q + Φ1(µ, k, n, s)

∣∣f ′(b)∣∣q) 1q

+(mΦ1(µ, k, n, s)

∣∣f ′(x)∣∣q + Φ2(µ, k, n, s)

∣∣f ′(b)∣∣q) 1q

],

(2.4)

where

Φ1(µ, k, n, s) =

∫ 1

0tµk

(1− tn+ 1

)sdt =

β(µk + 1, s+ 1)

(n+ 1)s

Page 531: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOME NEW k-FRACTIONAL INTEGRAL INEQUALITIES ... 517

and

Φ2(µ, k, n, s) =

∫ 1

0tµk

(n+ t

n+ 1

)sdt =

2F1[−s, 1; µk + 2; 1

2 ]µk + 1

, n = 1,

ns2F1[−s, µk + 1; µk + 2;− 1n ]

(µk + 1)(n+ 1)s, n > 1.

Proof. Using Lemma 2.1, the power-mean inequality and the generalized (s,m)-preinvexity of |f ′|q, we get

∣∣Hηm(µ, k;n, x)∣∣ ≤ ∣∣η µk+1(x, a,m)

∣∣2|η(b, a,m)|

(∫ 1

0tµk dt

)1− 1q [

(I1)1q + (I2)

1q

]+

∣∣η µk+1(b, x,m)∣∣

2|η(b, a,m)|

(∫ 1

0tµk dt

)1− 1q [

(I3)1q + (I4)

1q

],

where

I1 =

∫ 1

0tµk

∣∣∣∣f ′(ma+n+ t

n+ 1η(x, a,m

))∣∣∣∣qdt≤∫ 1

0tµk

[m

(1− tn+ 1

)s∣∣f ′(a)∣∣q +

(n+ t

n+ 1

)s∣∣f ′(x)∣∣q]dt,

I2 =

∫ 1

0tµk

∣∣∣∣f ′(ma+1− tn+ 1

η(x, a,m

))∣∣∣∣qdt≤∫ 1

0tµk

[m

(n+ t

n+ 1

)s∣∣f ′(a)∣∣q +

(1− tn+ 1

)s∣∣f ′(x)∣∣q]dt,

I3 =

∫ 1

0tµk

∣∣∣∣f ′(mx+1− tn+ 1

η(b, x,m

))∣∣∣∣qdt≤∫ 1

0tµk

[m

(n+ t

n+ 1

)s∣∣f ′(x)∣∣q +

(1− tn+ 1

)s∣∣f ′(b)∣∣q]dtand

I4 =

∫ 1

0tµk

∣∣∣∣f ′(mx+n+ t

n+ 1η(b, x,m

))∣∣∣∣qdt≤∫ 1

0tµk

[m

(1− tn+ 1

)s∣∣f ′(x)∣∣q +

(n+ t

n+ 1

)s∣∣f ′(b)∣∣q]dt.Hence the proof is completed.

Corollary 2.2. In Theorem 2.1,(i) if we put q = 1, we have:∣∣Hηm(µ, k;n, x)

∣∣≤ Φ1(µ, k, n, s) + Φ2(µ, k, n, s)

2|η(b, a,m)|

[∣∣η µk+1(x, a,m)∣∣(m∣∣f ′(a)

∣∣+∣∣f ′(x)

∣∣)+∣∣η µk+1(b, x,m)

∣∣(m∣∣f ′(x)∣∣+∣∣f ′(b)∣∣)].

Page 532: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

518 YAO ZHANG, TINGSONG DU and HAO WANG

Especially if η(u, v,m) with m = 1 reduces to η(u, v) for u, v ∈ [a, b], and choos-ing k = 1 = n, we get Theorem 3.1 proved by Noor et al. in [25],

(ii) if η(u, v,m) = u−mv with m = 1 for u, v ∈ [a, b], we have:

∣∣H(µ, k;n, x)∣∣

≤(

1µk + 1

)1− 1q

(x− a)

µk+1

2(b− a)

[(Φ1(µ, k, n, s)

∣∣f ′(a)∣∣q + Φ2(µ, k, n, s)

∣∣f ′(x)∣∣q) 1

q

+(

Φ2(µ, k, n, s)∣∣f ′(a)

∣∣q + Φ1(µ, k, n, s)∣∣f ′(x)

∣∣q) 1q

]+

(b− x)µk+1

2(b− a)

[(Φ2(µ, k, n, s)

∣∣f ′(x)∣∣q + Φ1(µ, k, n, s)

∣∣f ′(b)∣∣q) 1q

+(

Φ1(µ, k, n, s)∣∣f ′(x)

∣∣q + Φ2(µ, k, n, s)∣∣f ′(b)∣∣q) 1

q

].

Especially if we choose k = 1 = n along with s = 1, we get Theorem 3 establishedby Mihai and Mitroi in [23]. Further, if we take µ = 1, we obtain Theorem 3presented by Latif in [18],

(iii) if η(u, v,m) = u−mv with m = 1 for u, v ∈ [a, b], and putting x = a+b2 ,

n = 1, we obtain:

∣∣∣∣∣(

2

b− a

)µk−1

H(µ, k; 1,

a+ b

2

)∣∣∣∣∣=

∣∣∣∣∣[f

(a+ b

2

)+f(a) + f(b)

2

]− 2

2µk−1Γk(µ+ k)

(b− a)µk

[kJ

µa+f

(3a+ b

4

)

+ kJµ

(a+b2

)−f

(3a+ b

4

)+ kJ

µ

(a+b2

)+f

(a+ 3b

4

)+ kJ

µb−f

(a+ 3b

4

)]∣∣∣∣∣≤ b− a

8

(1

µk + 1

)1− 1q

[Φ1(µ, k, 1, s)

∣∣f ′(a)∣∣q + Φ2(µ, k, 1, s)

∣∣∣f ′(a+ b

2

)∣∣∣q] 1q

+

[Φ2(µ, k, 1, s)

∣∣f ′(a)∣∣q + Φ1(µ, k, 1, s)

∣∣∣f ′(a+ b

2

)∣∣∣q] 1q

+

[Φ2(µ, k, 1, s)

∣∣∣f ′(a+ b

2

)∣∣∣q + Φ1(µ, k, 1, s)∣∣f ′(b)∣∣q] 1

q

+

[Φ1(µ, k, 1, s)

∣∣∣f ′(a+ b

2

)∣∣∣q + Φ2(µ, k, 1, s)∣∣f ′(b)∣∣q] 1

q

≤ b− a8

(1

µk + 1

)1− 1q (

1 + 21− s

q)(

Φ1q

1 (µ, k, 1, s) + Φ1q

2 (µ, k, 1, s))[∣∣f ′(a)

∣∣+∣∣f ′(b)∣∣].

Page 533: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOME NEW k-FRACTIONAL INTEGRAL INEQUALITIES ... 519

The second inequality is obtained by utilizing the s-convexity of |f ′|q and the factthat

n∑i=1

(ui + vi)θ ≤

n∑i=1

(ui)θ +

n∑i=1

(vi)θ, ui, vi ≥ 0, 1 ≤ i ≤ n, 0 ≤ θ ≤ 1.

If |f ′|q for q > 1 is also generalized (s,m)-preinvex, we obtain the followingresult.

Theorem 2.2. Assume that |f ′|q for q > 1 is generalized (s,m)-preinvex with1p+ 1

q = 1, then for x ∈ (a, b), n ∈ N∗, µ > 0 and k > 0, the following k-fractionalintegral inequality holds:∣∣Hηm(µ, k;n, x)

∣∣≤(

1µpk + 1

) 1p

∣∣η µk+1(x, a,m)∣∣

2|η(b, a,m)|

[(mΨ1

∣∣f ′(a)∣∣q + Ψ2

∣∣f ′(x)∣∣q) 1

q

+(mΨ2

∣∣f ′(a)∣∣q + Ψ1

∣∣f ′(x)∣∣q) 1

q

]+

∣∣η µk+1(b, x,m)∣∣

2|η(b, a,m)|

[(mΨ2

∣∣f ′(x)∣∣q + Ψ1

∣∣f ′(b)∣∣q) 1q

+(mΨ1

∣∣f ′(x)∣∣q + Ψ2

∣∣f ′(b)∣∣q) 1q

],

(2.5)

where

Ψ1 =

∫ 1

0

(1− tn+ 1

)sdt =

1

(s+ 1)(n+ 1)s,

Ψ2 =

∫ 1

0

(n+ t

n+ 1

)sdt =

(n+ 1)s+1 − ns+1

(s+ 1)(n+ 1)s.

Proof. From Lemma 2.1, utilizing the Holder inequality and the generalized(s,m)-preinvexity of |f ′|q, we have

∣∣Hηm(µ, k;n, x)∣∣ ≤ ∣∣η µk+1(x, a,m)

∣∣2|η(b, a,m)|

(∫ 1

0tµpk dt

) 1p [

(J1)1q + (J2)

1q

]+

∣∣η µk+1(b, x,m)∣∣

2|η(b, a,m)|

(∫ 1

0tµpk dt

) 1p [

(J3)1q + (J4)

1q

],

where

J1 =

∫ 1

0

∣∣∣∣f ′(ma+n+ t

n+ 1η(x, a,m

))∣∣∣∣qdt≤∫ 1

0m

(1− tn+ 1

)s∣∣f ′(a)∣∣q +

(n+ t

n+ 1

)s∣∣f ′(x)∣∣qdt,

J2 =

∫ 1

0

∣∣∣∣f ′(ma+1− tn+ 1

η(x, a,m

))∣∣∣∣qdt

Page 534: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

520 YAO ZHANG, TINGSONG DU and HAO WANG

≤∫ 1

0m

(n+ t

n+ 1

)s∣∣f ′(a)∣∣q +

(1− tn+ 1

)s∣∣f ′(x)∣∣qdt,

J3 =

∫ 1

0

∣∣∣∣f ′(mx+1− tn+ 1

η(b, x,m

))∣∣∣∣qdt≤∫ 1

0m

(n+ t

n+ 1

)s∣∣f ′(x)∣∣q +

(1− tn+ 1

)s∣∣f ′(b)∣∣qdtand

J4 =

∫ 1

0

∣∣∣∣f ′(mx+n+ t

n+ 1η(b, x,m

))∣∣∣∣qdt≤∫ 1

0m

(1− tn+ 1

)s∣∣f ′(x)∣∣q +

(n+ t

n+ 1

)s∣∣f ′(b)∣∣qdt.This completes the proof.

Corollary 2.3. In Theorem 2.2,

(i) if η(u, v,m) = u−mv with m = 1 for u, v ∈ [a, b], we have:

∣∣H(µ, k;n, x)∣∣ ≤ ( 1

µpk + 1

) 1p

(x− a)

µk+1

2(b− a)

[(Ψ1

∣∣f ′(a)∣∣q + Ψ2

∣∣f ′(x)∣∣q) 1

q

+(

Ψ2

∣∣f ′(a)∣∣q + Ψ1

∣∣f ′(x)∣∣q) 1

q

]+

(b− x)µk+1

2(b− a)

[(Ψ2

∣∣f ′(x)∣∣q + Ψ1

∣∣f ′(b)∣∣q) 1q

+(

Ψ1

∣∣f ′(x)∣∣q + Ψ2

∣∣f ′(b)∣∣q) 1q

].

Especially if we choose k = 1 = n along with s = 1, we get Theorem 2 establishedby Mihai and Mitroi in [23]. Further, if we take µ = 1, we obtain Theorem 2presented by Latif in [18],

(ii) if η(u, v,m) = u − mv with m = 1 for u, v ∈ [a, b], putting x = a+b2 ,

n = 1, and utilizing similar arguments as in (iii) of Corollary 2.3, we have:∣∣∣∣∣(

2

b− a

)µk−1

H(µ, k; 1,

a+ b

2

)∣∣∣∣∣=

∣∣∣∣∣[f

(a+ b

2

)+f(a) + f(b)

2

]− 2

2µk−1Γk(µ+ k)

(b− a)µk

[kJ

µa+f

(3a+ b

4

)

+ kJµ

(a+b2

)−f

(3a+ b

4

)+ kJ

µ

(a+b2

)+f

(a+ 3b

4

)+ kJ

µb−f

(a+ 3b

4

)]∣∣∣∣∣

Page 535: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOME NEW k-FRACTIONAL INTEGRAL INEQUALITIES ... 521

≤ b− a8

(1

µpk + 1

) 1p

[1

2s(s+ 1)|f ′(a)|q +

2s+1 − 1

2s(s+ 1)

∣∣∣∣f ′(a+ b

2

)∣∣∣∣q] 1q

+

[2s+1 − 1

2s(s+ 1)

∣∣f ′(a)∣∣q +

1

2s(s+ 1)

∣∣∣f ′(a+ b

2

)∣∣∣q] 1q

+

[2s+1 − 1

2s(s+ 1)

∣∣∣∣f ′(a+ b

2

)∣∣∣∣q +1

2s(s+ 1)

∣∣f ′(b)∣∣q] 1q

+

[1

2s(s+ 1)

∣∣∣f ′(a+ b

2

)∣∣∣q +2s+1 − 1

2s(s+ 1)

∣∣f ′(b)∣∣q] 1q

≤ b− a8

(1

µpk +1

) 1p (

1+21− s

q)[ 1

2s(s+1)

] 1q

+

[2s+1−1

2s(s+1)

] 1q

[∣∣f ′(a)∣∣+∣∣f ′(b)∣∣].

Remark 2.2. In Theorem 2.2, if η(u, v,m) with m = 1 reduces to η(u, v) foru, v ∈ [a, b], and choosing k = 1 = n, we get Theorem 3.3 proved by Noor et al.in [25].

3. k-Fractional inequalities for products of two functions

We next establish k-fractional integral inequality involving products of two gen-eralized (s,m)-preinvex functions.

Theorem 3.1. Let K ⊆ R be an open m-invex subset with respect to η : K ×K × (0, 1] → R \ 0 for some fixed m ∈ (0, 1], a, b ∈ K with 0 ≤ a < b. Iff, g : K → (0,+∞) are generalized (s1,m)-preinvex and generalized (s2,m)-preinvex, respectively, then the following inequality holds:

Γk(µ+k)

2ηµk (b, a,m)

[kJ

µ(ma)+

(fg)(ma+η(b, a,m)

)+kJ

µ(ma+η(b,a,m))−(fg)(ma)

]≤[

µ

2(µ+ ks1 + ks2)+µβ(s1 + s2 + 1, µk )

2k

][m2f(a)g(a) + f(b)g(b)

]+

[µβ(s2 + 1, µk + s1)

2k+µβ(s1 + 1, µk + s2)

2k

][mf(a)g(b) +mf(b)g(a)

].

(3.1)

Proof. Since f is generalized (s1,m)-preinvex and g is generalized (s2,m)-preinvex, we get

Γk(µ+ k)

2ηµk (b, a,m)

kJµ(ma)+

(fg)(ma+ η(b, a,m)

)=

µ

2kηµk (b, a,m)

∫ ma+η(b,a,m)

ma

(ma+ η(b, a,m)− u

)µk−1f(u)g(u)du

2k

∫ 1

0(1− t)

µk−1f

(ma+ tη(b, a,m)

)g(ma+ tη(b, a,m)

)dt

Page 536: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

522 YAO ZHANG, TINGSONG DU and HAO WANG

≤ µ

2k

∫ 1

0(1− t)

µk−1[m(1− t)s1f(a) + ts1f(b)

][m(1− t)s2g(a) + ts2g(b)

]dt

2k

∫ 1

0

[m2(1− t)

µk+s1+s2−1f(a)g(a) +mts2(1− t)

µk+s1−1f(a)g(b)

+mts1(1− t)µk+s2−1f(b)g(a) + ts1+s2(1− t)

µk−1f(b)g(b)

]dt

2(µ+ ks1 + ks2)m2f(a)g(a) +

µβ(s2 + 1, µk + s1)

2kmf(a)g(b)

+µβ(s1 + 1, µk + s2)

2kmf(b)g(a) +

µβ(s1 + s2 + 1, µk )

2kf(b)g(b).

Similarly we get

Γk(µ+ k)

2ηµk (b, a,m)

kJµ(ma+η(b,a,m))−(fg)(ma)

≤µβ(s1 + s2 + 1, µk )

2km2f(a)g(a) +

µβ(s1 + 1, µk + s2)

2kmf(a)g(b)

+µβ(s2 + 1, µk + s1)

2kmf(b)g(a) +

µ

2(µ+ ks1 + ks2)f(b)g(b).

By adding both sides of the above inequalities we can obtain the desired result.This completes the proof.

Corollary 3.1. In Theorem 3.1, if the mapping η(b, a,m) with m = 1 reducesto η(b, a) and s1 = s2 = s, we obtain

Γk(µ+ k)

2ηµk (b, a)

[kJ

µa+

(fg)(a+ η(b, a)

)+ kJ

µ(a+η(b,a))−(fg)(a)

]≤[

µ

2(µ+ 2ks)+µβ(2s+ 1, µk )

2k

][f(a)g(a) + f(b)g(b)

]+

[µβ(s+ 1, µk + s)

k

][f(a)g(b) + f(b)g(a)

].

Especially if η(b, a) = b− a and k = 1 = s , we get

Γ(µ+ 1)

2(b− a)µ

[Jµa+f(b)g(b) + Jµ

b−f(a)g(a)]

≤ µ2 + µ+ 2

2(µ+ 1)(µ+ 2)

[f(a)g(a) + f(b)g(b)

]+

µ

(µ+ 1)(µ+ 2)

[f(a)g(b) + f(b)g(a)

],

which is Theorem 2.1 established by Chen in [6].

Corollary 3.2. In Theorem 3.1, if the mapping η(b, a,m) = b−ma with m = 1,s1 = 1 = s2 and g(x) = 1, we obtain

Γk(µ+ k)

2(b− a)µk

[kJ

µa+f(b) + kJ

µb−f(a)

]≤ f(a) + f(b)

2.

Page 537: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOME NEW k-FRACTIONAL INTEGRAL INEQUALITIES ... 523

Especially if we take k = 1, we get

Γ(µ+ 1)

2(b− a)µ

[Jµa+f(b) + Jµ

b−f(a)]≤ f(a) + f(b)

2,

which is the right hand side of the inequality (1.2).

Another k-fractional integral inequality involving products of two generalized(s,m)-preinvex functions is obtained as follows.

Theorem 3.2. With the same assumptions in Theorem 3.1, we have

2µk−1Γk(µ+ k)

ηµk (b, a,m)

[kJ

µ

(ma+ 12η(b,a,m))+

(fg)(ma+ η(b, a,m)

)+ kJ

µ

(ma+ 12η(b,a,m))−

(fg)(ma)]

≤ Υ1

[m2f(a)g(a) + f(b)g(b)

]+ Υ2

[mf(a)g(b) +mf(b)g(a)

],

(3.2)

where

Υ1 =µ

2s1+s2+1(µ+ ks1 + ks2)+

2F1[−s1 − s2, µk ; µk + 1; 12 ]

2

and

Υ2 =2F1[−s2, µk + s1;

µk + s1 + 1; 1

2 ]µ

2s1+1(µ+ ks1)+

2F1[−s1, µk + s2;µk + s2 + 1; 1

2 ]µ

2s2+1(µ+ ks2).

Proof. Since f is generalized (s1,m)-preinvex and g is generalized (s2,m)-preinvex, we have

2µk−1Γk(µ+ k)

ηµk (b, a,m)

kJµ

(ma+ 12η(b,a,m))+

(fg)(ma+ η(b, a,m)

)=

µ2µk−1

kηµk (b, a,m)

∫ ma+η(b,a,m)

ma+ 12η(b,a,m)

(ma+ η(b, a,m)− u

)µk−1f(u)g(u)du

2k

∫ 1

0(1− t)

µk−1f

(ma+

1 + t

2η(b, a,m)

)g

(ma+

1 + t

2η(b, a,m)

)dt

≤ µ

2k

∫ 1

0(1− t)

µk−1

[m

(1− t

2

)s1f(a) +

(1 + t

2

)s1f(b)

]×[m

(1− t

2

)s2g(a) +

(1 + t

2

)s2g(b)

]dt

2k

∫ 1

0

[m2(1− t)

µk+s1+s2−1

2s1+s2f(a)g(a) +

m(1− t)µk+s1−1(1 + t)s2

2s1+s2f(a)g(b)

+m(1− t)

µk+s2−1(1 + t)s1

2s1+s2f(b)g(a) +

(1− t)µk−1(1 + t)s1+s2

2s1+s2f(b)g(b)

]dt

Page 538: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

524 YAO ZHANG, TINGSONG DU and HAO WANG

2s1+s2+1(µ+ks1+ks2)m2f(a)g(a)+

2F1[−s2, µk+s1;µk+s1+1; 1

2 ]µ

2s1+1(µ+ks1)mf(a)g(b)

+2F1[−s1, µk+s2;

µk+s2+1; 1

2 ]µ

2s2+1(µ+ks2)mf(b)g(a)+

2F1[−s1−s2, µk ; µk+1; 12 ]

2f(b)g(b).

Similarly we get

2µk−1Γk(µ+ k)

ηµk (b, a,m)

kJµ

(ma+ 12η(b,a,m))−

(fg)(ma)

≤ 2F1[−s1−s2, µk ; µk+1; 12 ]

2m2f(a)g(a)+

2F1[−s1, µk+s2;µk+s2+1; 1

2 ]µ

2s2+1(µ+ks2)mf(a)g(b)

+2F1[−s2, µk + s1;

µk + s1 + 1; 1

2 ]µ

2s1+1(µ+ ks1)mf(b)g(a) +

µ

2s1+s2+1(µ+ ks1 + ks2)f(b)g(b).

By adding both sides of the above inequalities we can obtain the desired result.This ends the proof.

Corollary 3.3. In Theorem 3.2, if the mapping η(b, a,m) with m = 1 reducesto η(b, a) and s1 = s2 = s, we obtain

2µk−1Γk(µ+ k)

ηµk (b, a)

[kJ

µ

(a+ 12η(b,a))+

(fg)(a+ η(b, a)

)+ kJ

µ

(a+ 12η(b,a))−

(fg)(a)]

≤[

µ

22s+1(µ+ 2ks)+

2F1[−2s, µk ; µk + 1; 12 ]

2

][f(a)g(a) + f(b)g(b)

]+

[2F1[−s, µk + s; µk + s+ 1; 1

2 ]µ

2s(µ+ ks)

][f(a)g(b) + f(b)g(a)

].

Especially if η(b, a) = b− a and s = 1 , we get

2µk−1Γk(µ+ k)

(b− a)µk

[kJ

µ

(a+b2

)+(fg)(b) + kJ

µ

(a+b2

)−(fg)(a)

]≤[

1

2− µ

2(µ+ k)+

µ

4(µ+ 2k)

][f(a)g(a) + f(b)g(b)

]+

2(µ+ k)− µ

4(µ+ 2k)

][f(a)g(b) + f(b)g(a)

].

Corollary 3.4. In Theorem 3.2, if the mapping η(b, a,m) = b−ma with m = 1,s1 = s2 = s and g(x) = 1, we obtain

2µk−1Γk(µ+ k)

(b− a)µk

[kJ

µ

(a+b2

)+f(b) + kJ

µ

(a+b2

)−f(a)

]≤[

µ

22s+1(µ+ 2ks)+

2F1[−2s, µk ; µk + 1; 12 ]

2+

2F1[−s, µk + s; µk + s+ 1; 12 ]µ

2s(µ+ ks)

]×[f(a) + f(b)

].

Page 539: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOME NEW k-FRACTIONAL INTEGRAL INEQUALITIES ... 525

Especially for s = 1 , we get

2µk−1Γk(µ+ k)

(b− a)µk

[kJ

µ

(a+b2

)+f(b) + kJ

µ

(a+b2

)−f(a)

]≤ f(a) + f(b)

2,

which is the right hand side of the inequality (1.4).

Acknowledgment

This work was supported by the National Natural Science Foundation of China(No. 61374028) and sponsored by Research Fund for Excellent Dissertation ofChina Three Gorges University (No. 2018SSPY132 and No. 2018SSPY134).

References

[1] P. Agarwal, J. Tariboon, S.K. Ntouyas, Some generalized Riemann-Liouville k-fractional integral inequalities, J. Inequal. Appl., 2016 (2016),Article Number 122, 13 pages.

[2] A. Ali, G. Gulshan, R. Hussain, A. Latif, M. Muddassar, Generalized in-equalities of the type of Hermite-Hadamard-Fejer with quasi-convex func-tions by way of k-fractional derivatives, J. Comput. Anal. Appl., 22 (7)(2017), 1208-1219.

[3] T. Antczak, Mean value in invexity analysis, Nonlinear Anal., 60 (8) (2005),1473-1484.

[4] M.U. Awan, M.A. Noor, M.V. Mihai, K.I. Noor, Fractional Hermite-Hadamard inequalities for differentiable s-Godunova-Levin functions, Filo-mat, 30 (12) (2016), 3235-3241.

[5] M.U. Awan, M.A. Noor, M.V. Mihai, K.I. Noor, On bounds involving k-Appell’s hypergeometric functions, J. Inequal. Appl., 2017 (2017), ArticleNumber 118, 15 pages.

[6] F.X. Chen, A note on Heimite-Hadamard inequalities for products of convexfunctions via Riemann-Liouville fractional integrals, Ital. J. Pure Appl.Math., 33 (2014), 299-306.

[7] F.X. Chen, Y.M. Feng, New inequalities of Hermite-Hadamard type forfunctions whose first derivatives absolute values are s-convex, Ital. J. PureAppl. Math., 32 (2014), 213-222.

[8] T.S. Du, J.G. Liao, L.Z. Chen, M.U. Awan, Properties and Riemann-Liouville fractional Hermite-Hadamard inequalities for the generalized(α,m)-preinvex functions, J. Inequal. Appl., 2016 (2016), Article Number306, 24 pages.

Page 540: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

526 YAO ZHANG, TINGSONG DU and HAO WANG

[9] T.S. Du, J.G. Liao, Y.J. Li, Properties and integral inequalities ofHadamard-Simpson type for the generalized (s,m)-preinvex functions, J.Nonlinear Sci. Appl., 9 (5) (2016), 3112-3126.

[10] S. Erden, M.Z. Sarikaya, On generalized some inequalities for convex func-tions, Ital. J. Pure Appl. Math., 38 (2017), 455-468.

[11] G. Farid, A.U. Rehman, M. Zahra, On Hadamard-type inequalities for k-fractional integrals, Konuralp J. Math., 4 (2) (2016), 79-86.

[12] H. Hudzik, L. Maligranda, Some remarks on s-convex functions, Aequa-tiones Math., 48 (1) (1994), 100-111.

[13] D.Y. Hwang, S.S. Dragomir, Extensions of the Hermite-Hadamard inequal-ity for r-preinvex functions on an invex set, Bull. Aust. Math. Soc., 95 (3)(2017), 412-423.

[14] S.R. Hwang, K.L. Tseng, K.C. Hsu, New inequalities for fractional integralsand their applications, Turkish J. Math., 40 (3) (2016), 471-486.

[15] M. Iqbal, M.I. Bhatti, K. Nazeer, Generalization of inequalities analogous toHermite-Hadamard inequality via fractional integrals, Bull. Korean Math.Soc., 52 (3) (2015), 707-716.

[16] A. Kashuri, R. Liko, Generalizations of Hermite-Hadamard and Ostrowskitype inequalities for MTm-preinvex functions, Proyecciones, 36 (1) (2017),45-80.

[17] M.A. Khan, T. Ali, S.S. Dragomir, M.Z. Sarikaya, Hermite-Hadamard typeinequalities for conformable fractional integrals, Rev. R. Acad. Cienc. Ex-actas Fıs. Nat. Ser. A Math., (2017), 1-16.

[18] M.A. Latif, Inequalities of Hermite-Hadamard type for functions whosederivatives in absolute value are convex with applications, Arab J. Math.Sci., 21 (1) (2015), 84-97.

[19] M.A. Latif, S.S. Dragomir, New inequalities of Hermite-Hadamard andFejer type via preinvexity, J. Comput. Anal. Appl., 19 (4) (2015), 725-739.

[20] M.A. Latif, On some new inequalities of Hermite-Hadamard type for func-tions whose derivatives are s-convex in the second sense in the absolutevalue, Ukrainian Math. J., 67 (10) (2016), 1552-1571.

[21] Y.J. Li, T.S. Du, B. Yu, Some new integral inequalities of Hadamard-Simpson type for extended (s,m)-preinvex functions, Ital. J. Pure Appl.Math., 36 (2016), 583-600.

Page 541: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOME NEW k-FRACTIONAL INTEGRAL INEQUALITIES ... 527

[22] M. Mat loka, Some inequalities of Hadamard type for mappings whose secondderivatives are h-convex via fractional integrals, J. Fract. Calc. Appl., 6 (1)(2015), 110-119.

[23] M.V. Mihai, F.C. Mitroi, Hermite-Hadamard type inequalities obtained viaRiemann-Liouville fractional calculus, Acta Math. Univ. Comenian. (N. S.),83 (2) (2014), 209-215.

[24] S. Mubeen, G.M. Habibullah, k-fractional integrals and application, Int. J.Contemp. Math. Sciences, 7 (2) (2012), 89-94.

[25] M.A. Noor, K.I. Noor, M.V. Mihai, M.U. Awan, Fractional Hermite-Hadamard inequalities for some classes of differentiable preinvex functions,Politehn. Univ. Bucharest Sci. Bull. Ser. A Appl. Math. Phys., 78 (3)(2016), 163-174.

[26] C. Peng, C. Zhou, T.S. Du, Riemann-Liouville fractional Simpson’s inequal-ities through generalized (m,h1, h2)-preinvexity, Ital. J. Pure Appl. Math.,38 (2017), 345-367.

[27] S. Qaisar, C.J. He, S. Hussain, On new inequalities of Hermite-Hadamardtype for generalized convex functions, Ital. J. Pure Appl. Math., 33 (2014),139-148.

[28] S. Qaisar, M. Iqbal, M. Muddassar, New Hermite-Hadamard’s inequalitiesfor preinvex functions via fractional integrals, J. Comput. Anal. Appl., 20(7) (2016), 1318-1328.

[29] M.Z. Sarikaya, A. Karaca, On the k-Riemann-Liouville fractional integraland applications, Int. J. Stat. Math., 1 (3) (2014), 33-43.

[30] M.Z. Sarikaya, E. Set, H. Yaldiz, N. Basak, Hermite-Hadamard’s inequali-ties for fractional integrals and related fractional inequalities, Math. Com-put. Model., 57 (2013), 2403-2407.

[31] M.Z. Sarikaya, H. Yildirim, On Hermite-Hadamard type inequalities forRiemann-Liouville fractional integrals, Miskolc Math. Notes, 17 (2) (2016),1049-1059.

[32] E. Set, M. Tomar, M.Z. Sarikaya, On generalized Gruss type inequalitiesfor k-fractional integrals, Appl. Math. Comput., 269 (2015), 29-34.

[33] E. Set, I. Iscan, H.H. Kara, Hermite-Hadamard-Fejer type inequalities fors-convex function in the second sense via fractional integrals, Filomat, 30(12) (2016), 3131-3138.

Accepted: 6.02.2018

Page 542: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (528–534) 528

SOME OPERATOR α-GEOMETRIC MEAN INEQUALITIES

Jianming XueOxbridge College

Kunming University of Science and Technology

Kunming, Yunnan 650106

P. R. China

[email protected]

Abstract. In this paper, we refine an operator α-geometric mean inequality as follows:let Φ be a positive unital linear map and let A and B be positive operators. If 0 < m ≤A ≤ m′ < M ′ ≤ B ≤M or 0 < m ≤ B ≤ m′ < M ′ ≤ A ≤M , then for each α ∈ [0, 1],

(Φ (A) ♯αΦ (B))2 ≤

(K (h)

K2r (h′)

)2

Φ2 (A♯αB) ,

where K (h) = (h+1)2

4h , K (h′) =(h′+1)

2

4h′ , h = Mm , h′ = M ′

m′ and r = min α, 1− α.Keywords: operator inequalities, α-geometric mean, positive linear maps.

1. Introduction

Throughout this paper, ∥·∥ is the operator norm and I denotes the identityoperator. A ≥ 0 (A > 0) implies that A is positive (strictly positive) operator.Φ is a positive unital linear map if Φ(A) ≥ 0 with A ≥ 0 and Φ(I) = I. ForA,B > 0 and α ∈ [0, 1], the α-geometric mean A♯αB is defined by

A♯αB = A12

(A− 1

2BA− 12

)αA

12 ,

when α = 12 , A♯ 1

2B = A♯B is said to be the geometric mean.

Seo [1] gave the following α-geometric mean inequality: let Φ be a positiveunital linear map. If 0 < m1 ≤ A,B ≤ M1 for some numbers m1 ≤ M1. Thenfor α ∈ [0, 1],

Φ(A)♯αΦ(B) ≤ K (m,M,α)−1 Φ(A♯αB),

where m = m1M1

, M = M1m1

and the generalized Kantorovich constant K (m,M,α)([2, Definition 2.2]) is defined by

K (m,M,α) =mMα −Mmα

(α− 1) (M −m)

(α− 1

α

Mα −mα

mMα −Mmα

)αfor any real number α ∈ R.

Page 543: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOME OPERATOR α-GEOMETRIC MEAN INEQUALITIES 529

Fu [3] squared operator α-geometric mean inequality: let Φ be a positiveunital linear map. If 0 < m ≤ A,B ≤ M for some numbers m ≤ M . Then forα ∈ [0, 1]

(1.1) (Φ (A) ♯αΦ (B))2 ≤ K2 (h) Φ2 (A♯αB) ,

where K (h) = (h+1)2

4h with h = Mm is the Kantorovich constant.

A great number of results on operator inequalities have been given in theliterature, for example, see [4-8] and the references therein.

In this paper, we will get a stronger result than (1.1) and apply it to obtainan operator α-geometric mean inequality to the power of 2p (p ≥ 2).

2. Main results

In this section, the main results of this paper will be given. To do this, thefollowing lemmas are necessary.

Lemma 1 ([9]). Let A,B > 0. Then

(2.1) ∥AB∥ ≤ 1

4∥A+B∥2 .

Lemma 2 ([10]). Let A > 0. Then for every positive unital linear map Φ,

(2.2) Φ(A−1) ≥ Φ−1(A).

Lemma 3 ([11]). Let A,B > 0. Then for 1 ≤ r <∞,

(2.3) ∥Ar +Br∥ ≤ ∥(A+B)r∥ .

Lemma 4 ([12]). Let 0 < m ≤ A ≤ m′ < M ′ ≤ B ≤M or 0 < m ≤ B ≤ m′ <M ′ ≤ A ≤M . Then for each α ∈ [0, 1],

(2.4) Kr(h′)

(A♯αB) ≤ A∇αB,

where K (h′) = (h′+1)2

4h′ , h′ = M ′

m′ and r = min α, 1− α.

Lemma 5. Let 0 < m ≤ A ≤ m′ < M ′ ≤ B ≤M or 0 < m ≤ B ≤ m′ < M ′ ≤A ≤M . Then for each α ∈ [0, 1],

(2.5) Kr(h′) (A−1♯αB

−1)≤ A−1∇αB−1,

where K (h′) = (h′+1)2

4h′ , h′ = M ′

m′ and r = min α, 1− α.

Page 544: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

530 JIANMING XUE

Proof. If 0 < m ≤ A ≤ m′ < M ′ ≤ B ≤M , it follows that

0 <1

M≤ B−1 ≤ 1

M ′ <1

m′ ≤ A−1 ≤ 1

m.

By h′ = M ′

m′ =1m′1M′

and (2.4), we have

Kr(h′) (A−1♯αB

−1)≤ A−1∇αB−1.

If 0 < m ≤ B ≤ m′ < M ′ ≤ A ≤M , similarly, (2.5) holds.This completes the proof.

Theorem 1. Let Φ be a positive unital linear map and let A and B be positiveoperators. If 0 < m ≤ A ≤ m′ < M ′ ≤ B ≤ M or 0 < m ≤ B ≤ m′ < M ′ ≤A ≤M , then for each α ∈ [0, 1],

(2.6) (Φ (A) ♯αΦ (B))2 ≤(

K (h)

K2r (h′)

)2

Φ2 (A♯αB) ,

whereK (h) = (h+1)2

4h , K (h′) = (h′+1)2

4h′ , h = Mm , h′ = M ′

m′ and r = min α, 1− α.

Proof. The inequality (2.6) is equivalent to∥∥(Φ (A) ♯αΦ (B)) Φ−1 (A♯αB)∥∥ ≤ K (h)

K2r (h′).

It is easy to see that

(2.7) (1− α)(A+MmA−1

)≤ (1− α) (M +m)

and

(2.8) α(B +MmB−1

)≤ α (M +m) .

Summing up inequalities (2.7) and (2.8), we get

A∇αB +Mm(A−1∇αB−1

)≤M +m

and hence

(2.9) Φ (A∇αB) +MmΦ(A−1∇αB−1

)≤M +m.

Compute∥∥Φ (A) ♯αΦ (B)MmK2r(h′)

Φ−1 (A♯αB)∥∥

≤ 1

4

∥∥Kr(h′)

Φ (A) ♯αΦ (B) +MmKr(h′)

Φ−1 (A♯αB)∥∥2 (by(2.1))

≤ 1

4

∥∥Kr(h′)

Φ (A) ♯αΦ (B) +MmKr(h′)

Φ(A−1♯αB

−1)∥∥2 (by(2.2))

≤ 1

4

∥∥Φ (A)∇αΦ (B) +MmΦ(A−1∇αB−1

)∥∥2 (by(2.4), (2.5))

≤ 1

4

∥∥Φ (A∇αB) +MmΦ(A−1∇αB−1

)∥∥2≤ 1

4(M +m)2 . (by(2.9))

Page 545: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOME OPERATOR α-GEOMETRIC MEAN INEQUALITIES 531

That is

∥∥(Φ (A) ♯αΦ (B)) Φ−1 (A♯αB)∥∥ ≤ (M +m)2

4MmK2r (h′)=

K (h)

K2r (h′).

Thus, (2.6) holds.

This completes the proof.

Remark 1. Since h′ > 1, then

K (h)

K2r (h′)< K (h) .

Thus, inequality (2.6) is tighter than (1.1).

Theorem 2. Let Φ be a positive unital linear map and let A and B be positiveoperators. If 0 < m ≤ A ≤ m′ < M ′ ≤ B ≤ M or 0 < m ≤ B ≤ m′ < M ′ ≤A ≤M and 2 ≤ p <∞, then for each α ∈ [0, 1],

(2.10) (Φ (A) ♯αΦ (B))2p ≤ 1

16

(K2 (h)

(M2 +m2

)2K4r (h′)M2m2

)pΦ2p (A♯αB) ,

whereK (h) = (h+1)2

4h , K (h′) = (h′+1)2

4h′ , h = Mm , h′ = M ′

m′ and r = min α, 1− α.

Proof. The inequality (2.10) is equivalent to

(2.11)∥∥(Φ (A) ♯αΦ (B))p Φ−p (A♯αB)

∥∥ ≤ 1

4

(K2 (h)

(M2 +m2

)2K4r (h′)M2m2

) p2

.

By the operator reverse monotonicity of inequality (2.6), we have

(2.12) Φ−2 (A♯αB) ≤(

K (h)

K2r (h′)

)2

(Φ (A) ♯αΦ (B))−2 .

Since 0 < m ≤ A,B ≤M , it follows that

m ≤ Φ (A) ♯αΦ (B) ≤M

and hence

(2.13) (Φ (A) ♯αΦ (B))2 +M2m2 (Φ (A) ♯αΦ (B))−2 ≤M2 +m2.

Page 546: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

532 JIANMING XUE

Compute∥∥(Φ (A) ♯αΦ (B))pMpmpΦ−p (A♯αB)∥∥

≤ 1

4

∥∥∥∥∥∥∥(

K (h)

K2r (h′)

) p2

(Φ (A) ♯αΦ (B))p +

M2m2

K(h)K2r(h′)

p2

Φ−p (A♯αB)

∥∥∥∥∥∥∥2

(by(2.1))

≤ 1

4

∥∥∥∥∥∥ K (h)

K2r (h′)(Φ (A) ♯αΦ (B))2 +

M2m2

K(h)K2r(h′)

Φ−2 (A♯αB)

∥∥∥∥∥∥p

(by(2.3))

≤ 1

4

∥∥∥∥ K (h)

K2r (h′)(Φ (A) ♯αΦ (B))2 +

K (h)

K2r(h′)M2m2 (Φ(A)♯αΦ(B))−2

∥∥∥∥p (by(2.12))

≤ 1

4

(K(h)

K2r(h′)(M2 +m2)

)p. (by(2.13))

That is

∥∥(Φ (A) ♯αΦ (B))p Φ−p (A♯αB)∥∥ ≤ 1

4

(K2 (h)

(M2 +m2

)2K4r (h′)M2m2

) p2

.

Thus, (2.10) holds.This completes the proof.

Lemma 6 ([13]). For any bounded operator X,

(2.14) |X| ≤ tI ⇔ ∥X∥ ≤ t⇔[tI XX∗ tI

]≥ 0 (t ≥ 0) .

Theorem 3. Let Φ be a positive unital linear map and let A and B be positiveoperators. If 0 < m ≤ A ≤ m′ < M ′ ≤ B ≤ M or 0 < m ≤ B ≤ m′ < M ′ ≤A ≤M and 2 ≤ p <∞, then for each α ∈ [0, 1],

(Φ (A) ♯αΦ (B))p Φ−p (A♯αB) + Φ−p (A♯αB) (Φ (A) ♯αΦ (B))p

≤ 1

2

(K2 (h)

(M2 +m2

)2K4r (h′)M2m2

) p2

,(2.15)

where K (h) = (h+1)2

4h , K (h′) = (h′+1)2

4h′ , h = Mm , h′ = M ′

m′ and r = min α, 1− α.

Proof. Put t = 12(K

2(h)(M2+m2)2

K4r(h′)M2m2 )p2 , X1 = (Φ (A) ♯αΦ (B))p Φ−p (A♯αB), X2 =

Φ−p (A♯αB) (Φ (A) ♯αΦ (B))p and X = X1 +X2. By (2.11) and (2.14), we have

(2.16)

[tI X1

X2 tI

]≥ 0

Page 547: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

SOME OPERATOR α-GEOMETRIC MEAN INEQUALITIES 533

and

(2.17)

[tI X2

X1 tI

]≥ 0 .

Summing up (2.16) and (2.17), we have[2tI XX 2tI

]≥ 0 .

Since X is self-adjoint, (2.15) follows from the maximal characterization of ge-ometric mean.

This completes the proof.

Acknowledgments

This work is supported by Scientific Research Fund of Yunnan Provincial Edu-cation Department (No. 2014Y645).

References

[1] Y. Seo, Reverses of Ando’s inequality for positive linear maps, Math. In-equal. Appl., 14 (2011), 905-910.

[2] T. Furuta, J. Micic, J.E. Pecaric, Y. Seo, Mond-Pecaric Method in OperatorInequalities, Monographs in Inequalities 1, Element, Zagreb, 2005.

[3] X. Fu, An operator α-geometric mean inequality, J. Math. Inequal., 9(2015), 947-950.

[4] J. Xue, Some refinements of operator reverse AM-GM mean inequalities,J. Inequal. Appl., 2017 (2017).

[5] J. Xue, On reverse weighted arithmetic-geometric mean inequalities for twopositive operators, Ital. J. Pure Appl. Math., 37 (2017), 113-116.

[6] P. Zhang, More operator inequalities for positive linear maps, Banach J.Math. Anal., 9 (2015), 166-172.

[7] M. Lin, On an operator Kantorovich inequality for positive linear maps, J.Math. Anal. Appl., 402 (2013), 127-132.

[8] L. Zou, An arithmetic-geometric mean inequality for singular values and itsapplications, Linear Algebra Appl., 528 (2017), 25-32.

[9] R. Bhatia, F. Kittaneh, Notes on matrix arithmetic-geometric mean in-equalities, Linear Algebra Appl., 308 (2000), 203-211.

Page 548: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

534 JIANMING XUE

[10] R. Bhatia, Positive Definite Matrices, Princeton University Press, Prince-ton, 2007.

[11] T. Ando, X. Zhan, Norm inequalities related to operator monotone func-tions, Math. Ann., 315 (1999), 771-780.

[12] H. Zuo, G. Shi, M. Fujii, Refined Young inequality with Kantorovich con-stant, J. Math. Inequal., 5 (2011), 551-556.

[13] R.A. Horn, C.R. Johnson, Topics in Matrix Analysis, Cambridge UniversityPress, Cambridge, 1991.

Accepted: 7.02.2018

Page 549: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (535–543) 535

THE HOMO SEPARATION ANALYSIS METHOD FORSOLVING THE PARTIAL DIFFERENTIAL EQUATION

M. ZuriqatDepartment of Mathematics

Al al-Bayt University

P.O. Box 130095, Al Mafraq

Jordan

[email protected]

Abstract. In this work,the homo separation analysis method (HSAM) is applied toobtain the exact solution for linear and nonlinear partial differential equation. Theproposed algorithm presents a procedure of constructing the set of base functions andgives the one-order deformation equation in a simple form. This analytical method is acombination of the homotopy analysis method (HAM) with the separation of variablesmethod. The exact solution is constructed by choosing an initial guess in addition toonly one term of the series obtained by HAM. This work verifies the validity and thepotential of the HSAM for the study of nonlinear partial differential equation.

Keywords: homotopy analysis method, separation of variables, partial differentialequations, analytical method, Black-scholes equation.

1. Introduction

The study of nonlinear partial differential equation is of crucial importance inall areas of physics and engineering, as well as in other disciplines. It is verydifficult to solve nonlinear problems and in general it is often more difficult toget an exact solution to a given nonlinear problem. The importance of obtain-ing the exact solutions of nonlinear PDE in mathematics is stell a significantproblem that needs new methods. Several numerical and analytical methodshave been developed and successfully employed to solve linear and nonlinearPDE. Such methods include variational iteration method [4, 12], Adomian de-composition method [5, 10, 21], differential transform method [2, 6, 17], thehomopety perturbation method [15], the exp method [13], Legendre polynomialmethod [8, 9] and the homotopy analysis method [18, 19, 22]. Some of thesemethods use specific transformations and others give the solution as a serieswhich converges to the exact solution. Recently, a lot of attention has beenfocused on the studies to getting exact solution for linear and nonlinear PDEs.Zhang and others [3, 14] give the exact solution for some specific nonlinear PDE.However, Yang [7] used the modified homotopy perturbation method to obtainthe exact solution of the Fokker-Plank equation. Furthermore, Karbalaie etal.[1] used homotopy perturbation method with sepration of variables to find

Page 550: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

536 M. ZURIQAT

exact solution of PDE. The HAM yields rapidly convergent series solutions byusing few iterations for both linear and nonlinear differential equations. TheHAM was successfully applied to solve many nonlinear problems such as Riccatidifferential equation of fractional order [11], fractional KdV-Burgers-Kuramotoequation [16] and systems of fractional algebraic-differential equations [20]. Inthis paper, we developed a symbolic algorithm to find the exact solution of non-linear PDE by using the construct of mth-order deformation equation of HAMand the technique of sepration of variables. We present an elegant fast ap-proach by designing and utilizing a proper initial guess which satisify the initialcondition of PDE as follows

u0(x, t) = u(x, 0)c1(t) +∂

∂xu(x, 0)c2(t),

where u(x, 0) is the initial condition of the PDE. The Initial guess u0(x, t) hasthe form of sepration of variables, as an initial condition for HAM. By using thismethod, the other of the PDE to be solved is reduced into an ODE or systemof ODEs. The organization of this paper is as follows: in section 2, we presentthe basic idea of HAM and the construct of homo sepration analysis method(HSAM). In Section 3, four examples are solved to illustrated the applicabilityof the considered method. Finally, relevant conclusions are drawn in section 4.

2. Homo sepration analysis method

The homotopy analysis method based on the concept of the homotopy, a fun-damental concept in topology and differential geometry. In this section, thealgorithm of this method is briefly illustrated. To achieve our gool, we considerthe nonlinear partial differential equation

(2.1) ut = F (x, t, u, ux, uxx, uxt), t ≥ 0,

subject to the initial condition

(2.2) u(x, 0) = f(x).

The so-called zero-order deformation equation of the equation (2.1) can beconstructed as follows

(1− q)L[ϕ(x, t, q)− u0(x, t)] = qh[∂

∂tϕ(x, t, q)− F (x, t, ϕ(x, t, q),

∂xϕ(x, t, q),

∂2

∂x2ϕ(x, t, q),

∂2

∂x∂tϕ(x, t, q))],(2.3)

where q ∈ [0, 1] is an embedding parameter, L is an auxiliary linear operator,h = 0 is an auxiliary parameter, ϕ(x, t, q) is unknown function and u0(x, t) is aninitial guess of u(x, t) which satisfy the initial condition. Obviously, when q = 0

(2.4) ϕ(x, t, 0) = u0(x, t),

Page 551: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THE HOMO SEPARATION ANALYSIS METHOD ... 537

and when q = 1, we have

(2.5) ϕ(x, t, 1) = u(x, t).

Expanding ϕ(x, t, q) in Taylor series with respect to q, we get

(2.6) ϕ(x, t, q) = u0(x, t) +∞∑m=1

um(x, t)qm,

where

(2.7) um(x, t) =1

m!

∂mϕ(x, t, q)

∂qm|q=0.

If the initial guess u0(x, t), the auxiliary linear operator L and the nonzero aux-iliary parameter h are properly chosen so that the power series (2.6) convergesat q = 1, one has

(2.8) u(x, t) = ϕ(x, t, 1) = u0(x, t) +

∞∑m=1

um(x, t).

Define the vector

−→u m(x, t) = u0(x, t), u1(x, t), . . . , um(x, t).

Differentiating the zero-order deformation equation (2.3) m times with respec-tive to q, then setting q = 0 and dividing them by m!, finally using (2.7), wehave the so-called high-order deformation equations

(2.9) L[um(x, t)− χm um−1(x, t)] = h ℜm(−→u m−1(x, t)),

subject to the initial conditions

um(x, 0) = 0,

where

ℜm(−→u m−1(x, t)) =∂

∂tum−1(x, t)−

1

(m− 1)!

∂m−1

∂qm−1F (x, t, ϕ(x, t, q),

∂xϕ(x, t, q),

∂2

∂x2ϕ(x, t, q),

∂2

∂x∂tϕ(x, t, q))|q=0,(2.10)

and

χm =

0, m ≤ 1

1, m > 1.

Select the auxiliary linear operator L = ∂∂t , and h = −1, then the mth-order

deformation equation (2.9) can be written in the form

(2.11)∂

∂t(um(x, t)− χm um−1(x, t)) + ℜm(−→u m−1(x, t)) = 0.

Page 552: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

538 M. ZURIQAT

For special case takem = 1 in equation (2.11) and using the relations (2.4),(2.10),then we have

∂tu1(x, t) =

∂tu0(x, t)− F (x, t, u0(x, t),

(2.12)∂

∂xu0(x, t),

∂2

∂x2u0(x, t),

∂2

∂x∂tu0(x, t)) ≡ 0,

By utilizing the results of equation (2.8), we approximate the analytical solutionu(x, t), by the truncated series:

(2.13) u(x, t) = u0 + u1 + ...+ un−1 =

n−1∑i=0

ui,

For simplicity, we assume that un(x, t) = 0, when n > 1, which means thatthe exact solution in equation (2.13) is

u(x, t) = u0(x, t).

To illustrate our basic idea, we consider the initial approximation of equation(2.1) as follows

u(x, t) = u0(x, t) = u(x, 0)c1(t) +∂

∂xu(x, 0)c2(t),

. = f(x)c1(t) + f ′(x)c2(t).(2.14)

Our gool in this method is finding c1(t) and c2(t). Since equation (2.14)satisfies the initial condition, we get

(2.15) c1(0) = 1, c2(0) = 0.

By substituting equation (2.14) into equation (2.12), we obtain

∂tu1(x, t) = f(x)c′1(t) + f ′(x)c′2(t)− F (x, t, f(x)c1(t) + f ′(x)c2(t),

f ′(x)c1(t) + f ′′(x)c2(t), f′′(x)c1(t) + f ′′′(x)c′2(t),(2.16)

f ′(x)c′1(t) + f ′′(x)c′2(t)) ≡ 0.

The partial differential equation (2.16) transform into an ordinary differentialequation or a system of ordinary differential equations. The exact solution ofthe partial differential equation is found when the target unknowns c1(t) andc2(t) are computed, by utlizing (2.16) and the initial conditions (2.15).

Page 553: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THE HOMO SEPARATION ANALYSIS METHOD ... 539

3. Numerical results

In this work, we carefully propose the HSAM, a reliable modification of theHAM, that gives the exact solution of the linear and non linear partial differentialequation. To demonstrate the effectiveness of the method, we consider here thefollowing four examples.

Example 3.1. Consider the following nonhomogenous partial differential equa-tion

(3.1) ut = −x2etuxx + (x+ 2)ux + tx,

with the initial conditionu(x, 0) = x+ 2.

Using the relation (2.14), then we get the initial approximation

u(x, t) = u0(x, t) = (x+ 2)c1(t) + c2(t),

and by using the relation (2.16), then we have

∂tu1(x, t) = x(c′1(t)− c1(t)− t) + (c′2(t) + 2c′1(t)− 2c1(t)) ≡ 0.

We obtain the system of ordinary differential equations

(3.2) c′1(t)− c1(t)− t = 0, c1(0) = 1,

(3.3) c′2(t) + 2c′1(t)− 2c1(t) = 0, c2(0) = 0.

Solving the equations (3.2) and (3.3), by using the ODEs properties, we obtain

c1(t) = 2et − t− 1, c2(t) = −t2,

and the exact solution is

u(x, t) = (x+ 2)(2et − t− 1)− t2.

Example 3.2. Consider the following Black-scholes equation

(3.4) ut = uxx + (k − 1)ux − ku,

with the initial condition

(3.5) u(x, 0) = ex − 1.

The initial approximation has the form

u(x, t) = u0(x, t) = (ex − 1)c1(t) + exc2(t),

Page 554: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

540 M. ZURIQAT

and by using the relation (2.16), then we have

∂tu1(x, t) = ex(c′1(t) + c′2(t))− (c′1(t) + kc1(t)) ≡ 0.

We obtain the system of ordinary differential equations

(3.6) c′1(t) + kc1(t) = 0, c1(0) = 1,

(3.7) c′1(t) + c′2(t) = 0, c2(0) = 0.

Solving the equations (3.6) and (3.7), by using the ODEs properties, we obtain

c1(t) = e−kt, c2(t) = 1− e−kt,

and the exact solution is

u(x, t) = (ex − 1)e−kt + ex(1− e−kt).

Example 3.3. Consider the following nonlinear partial differential equation

(3.8) ut = uxx + ux(u+ uxx),

subject to the initial condition

(3.9) u(x, 0) = sinx.

The initial approximation has the form

u(x, t) = u0(x, t) = sinx c1(t) + cosx c2(t),

then∂

∂tu1(x, t) = sinx(c′1(t) + c1(t)) + cosx(c′2(t) + c2(t)) ≡ 0.

We obtain the system of ordinary differential equations

(3.10) c′1(t) + c1(t) = 0, c1(0) = 1,

(3.11) c′2(t) + c2(t) = 0, c2(0) = 0.

Solving the equations (3.10) and (3.11), by using the ODEs properties, we obtain

c1(t) = e−t, c2(t) = 0,

and the exact solution is

u(x, t) = e−t sinx.

Page 555: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THE HOMO SEPARATION ANALYSIS METHOD ... 541

Example 3.4. Consider the following nonlinear partial differential equation

(3.12) ut = u2 − 4u ux + 2uxt −1

8u ,

subject to the initial condition

(3.13) u(x, 0) = e14x.

Choose the initial approximation

u(x, t) = u0(x, t) = e14x c1(t) +

1

4e

14x c2(t)

=1

4e

14x(4c1(t) + c2(t)),

then∂

∂tu1(x, t) =

1

32e

14x [4(4c′1(t) + c′2(t)) + (4c1(t) + c2(t))] ≡ 0.

We obtain the ordinary differential equation

(3.14) 4y′(t) + y(t) = 0, y(0) = 4,

wherey(t) = 4c1(t) + c2(t)

Solving the equations (3.14), by using the ODEs properties, we obtain

4c1(t) + c2(t) = 4e−14t,

and the exact solution isu(x, t) = e

14(x−t).

4. Conclusions

The fundamental goal of this work is to propose a simple method for thesolution of PDEs. A combined form of the HAM with sepration of variablesis effectively used to handle linear and nonlinear partial differential equations.The main advantage of the method is its fast and gives exact solution for ourproblem. In this research work, it was demonstrated through different exampleshow this new method can be used for solving linear and nonlinear PDE. Whencompared with the existing published methods, it is easy to notice that the newmethod has many advantages. It is straightforward, easy to understand andrequiring much less computations to perform a limited number of steps of thesimple procedure that can be applied to find the exact solution of a wide rangeof types of PDEs Finally, the recent appearance of nonlinear partial differentialequations as models in some fields such as models in science and engineeringmakes it is necessary to investigate the method of solutions for such equations.and we hope that this work is a step in this direction.

Page 556: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

542 M. ZURIQAT

References

[1] A. Karbalaie, H. H. Muhammed, M. Shabni and M. M. Montazeri, Exactsolution of partial differential equation using Homo-Sepration of Variables,International Journal of Nonlinear Science, 17 (2014), 84-90.

[2] A. Freihat and S. Momani, Application of multistep generalized differentialtransform method for the solutions of the fractional-order Chua’s system,Discrete Dynamics in Nature and Society, Art. ID 427393, (2012), pp. 1-12.

[3] A. M. Wazwaz, The tanh-coth and the sech methods for exact solutions ofthe Jaulent–Miodek equation, Phys. Lett. A, 366 (2007), 85–90.

[4] D. D. Ganji, M. Jannatabadi and E. Mohseni, Application of He’s varia-tional iteration method to nonlinear Jaulent–Miodek equations and compar-ing it with ADM, J. Comput. Appl. Math., 207 (2007), 35–45.

[5] D. H. Shou and J. H. He, Beyond Adomian method: The variational it-eration method for solving heat-like and wave-like equations with variablecoefficients, Phys. Lett. A, 372 (3) (2008), 233-237.

[6] E. Abuteen, A. Freihat, M. Al-Smadi, H. Khalil and R. Ali Khan, A newreliable algorithm using the generalized differential transform method for thenumeric analytic solution of fractional-order Liu chaotic and hyperchaoticsystems, Journal of Mathematics and Statistics, 75 (9) (2013), 263-276.

[7] G. Yang, R. Chen and L. Yao, On exact solutions to partial differentialequations by the modified homotopy perturbation method, Acta Mathemat-icae Applicatae Sinica, 28 (2012), 91-98.

[8] H. Khalil, R. A. Khan, M. A-Smadi and A. Freihat, A generalized algorithmbased on Legendre polynomials for numerical solutions of coupled system offractional order differential equations, Journal of Fractional Calculus andApplications, 6 (2), (2015), 123-143.

[9] H. Khalil, R. A. Khan, M. A-Smadi, A. Freihat and N. Shawagfeh, New op-erational matrix for shifted Legendre polynomials and Fractional differentialequations with variable coefficients, Punjab University Journal of Mathe-matics, 47 (2015), 81-103.

[10] J. B. Chen and X. G. Geng, Decomposition to the modified Jaulent–Miodekhierarchy, Chaos Solitons Fractals, 30 (2006), 797–803.

[11] J. Cang, Y. Tan, H. Xu and S. Liao, Series solutions of non-linear Riccatidifferential equations with fractional order, Chaos Solitons and Fractals, 40(2009), 1-9.

Page 557: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THE HOMO SEPARATION ANALYSIS METHOD ... 543

[12] J. H. He and X. H. Wu, Construction of solitary solution and compacton-likesolution by variational iteration method, Chaos. Soliton. Fract., 29 (2006),108-111.

[13] J. H. He and X. H. Wu, Exp-function method for nonlinear wave equations,Chaos. Solitons and Fractals, 30 (2006), 700-708.

[14] J. L. Zhang, M. L. Wang and X. R. Li, The subsidiary elliptic-like equationand the exact solutions of the higher-order nonlinear Schrodinger equation,Chaos Solitons Fractals, 33 (2007), 1450–1457.

[15] L. Jin, Homotopy Perturbation Method for Solving Partial DifferentialEquations with Variable Coefficients, Int. J. Contemp. Math. Sciences, 28(2008), 1395-1407.

[16] L. Song and H. Zhang, Application of homotopy analysis method to frac-tional KdV-Burgers-Kuramoto equation, Physics Letters A, 367 (2007), 88-94.

[17] M. J. Jang, C. L. Chen and Y. C.Liu, Two-dimensional differential trans-form for partial differential equations, Applied Mathematics and Compu-tation, 121 (2001), 261-270.

[18] M. M. Rashidi, G. Domairry and S. Dinarvand, The Homotopy AnalysisMethod for Explicit Analytical Solutions of Jaulent–Miodek Equations, Nu-merical Methods for Partial Differential Equations, 25 (2) (2008), 430-439.

[19] M. Zurigat, A. A. Freihat and A. Handam, The multi-step homotopy anal-ysis method for solving the Jaulent-Miodek equations, Proyecciones Journalof Mathematics, 34 (2015), 45-54.

[20] M. Zurigat, S. Momani and A. Alawneh, Analytical approximate solutions ofsystems of fractional algebraic-differential equations by homotopy analysismethod, Computer and Mathematics with Applications, 59 (2010), 1227-1235.

[21] S. Ghosh and A. Roy, An adaptation of adomian decomposition fornumeric–analytic integration of strongly nonlinear and chaotic oscillators,Comput. Method Appl. Mech. Eng., 196 (4–6) (2007), 1133–1153.

[22] V.G. Gupta and S. Gupta, Application of homotopy analysis method forsolving nonlinear cauchy problem, Surveys in Mathematics and its Appli-cations, 7 (2012), 105-116.

Accepted: 16.02.2018

Page 558: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (544–557) 544

GLOBAL DYNAMICS OF AN SIVS EPIDEMIC MODELWITH BILINEAR INCIDENCE RATE

Mahmood ParsamaneshDepartment of Mathematics

Faculty of Sciences

University of Zabol

Zabol

Iran

[email protected]

Abstract. An SIS type epidemic model with variable population size is considered.The model includes a temporary vaccination program to prevent individuals from infec-tion and to eradicate the disease. If R0 < 1, the disease-free equilibrium is locally andglobally asymptotically stable i.e. the disease will be wiped out from population. WhenR0 > 1, the endemic equilibrium is locally asymptotically stable employing a result instability of the second additive compound matrix. In addition, by using a geometricapproach it is shown that this equilibrium is also globally asymptotically stable. So inthis case, the disease will persist in population permanently. Also, a briefly discussionis made on the minimum amount of vaccination which is necessary to eradicate thedisease. Finally, some numerical examples are given to confirm the obtained results.

Keywords: SIS epidemic model, vaccination, asymptotic stability, compound matrixmethod, geometric approach.

1. Introduction

The spread and control of infectious diseases in a population have been an im-portant issue in recent years. The behavior of Population can be studied byusing mathematical models and computer simulation. Many epidemic modelshave been introduced by authors for various type of diseases. The susceptible-infected-susceptible (SIS) epidemic models are one of the well known type ofepidemic models. This type of models is appropriate for some infections inwhich individuals don’t obtain permanent immunity after recovery. Vaccina-tion is known as an efficient strategy to give immunity to the individuals andthus may also be included in the SIS epidemic models by considering a sepa-rate compartment for vaccinated individuals in the model formulation. Thesemodels may be deterministic [13,16] or stochastic [23,6], with constant [13] orvariable [16,17] population size, and with standard [16,17] or bilinear incidence[10,5]. The organization of this paper is as the following: The formulation of themodel and some basic properties such that, the boundedness of solutions, thebasic reproduction number, and the equilibria of the model, will be given in thenext section. The asymptotic stabilities of the disease-free equilibrium and the

Page 559: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

GLOBAL DYNAMICS OF AN SIVS EPIDEMIC MODEL WITH ... 545

endemic state are studied in sections 3 and 4, respectively. A brief discussionon the effect of vaccination is done in section 5. Eventually after section 6 forsome numerical examples, we summarize the results presented in the paper.

2. Model description

We consider the following deterministic SIS epidemic model with vaccinationand bilinear incidence established by Li and Ma [10]:

(2.1)

S′ = (1− q)Λ− βSI − (µ+ φ)S + γI + θV,

I ′ = βSI − (µ+ γ + α)I,

V ′ = qΛ + φS − (µ+ θ)V.

Variables S(t), I(t) and V (t) denote respectively the number of susceptible, in-fectious and vaccinated individuals at time time t. The parameters of the modelare as follows:

Λ: Number of new individuals added into the population per unit of time,q: Fraction of new individuals that are vaccinated,β: Contact rate,γ: Recovery rate,µ: Natural death rate,α: Disease-related death rate,φ: Vaccination rate for susceptible individuals,θ: Rate of loosing immunity in vaccinated individuals.All parameter values are assumed to be non-negative and Λ and µ are posi-

tive. The force of infection βSI represents the number of new infected individ-uals per unit time and is of bilinear form.

From system (2.1) it can be seen that the total population size N is notconstant and is expressed by the following equation:

(2.2) N ′ = Λ− µN − αI.

We see thatN ′ ≤ Λ− µN,

and thus

lim supNt→∞

≤ Λ

µ.

Therefore total population N and as a result I, S and V are also bounded. Wecan see that the feasible region Γ = (S, I, V ) ∈ R3

+ : S + I + V ≤ Λµ is a

positively invariant set of system (2.1) i.e. the solutions remain in Γ with initialvector (S(0), I(0), V (0)) in Γ. System (2.1) has two equilibria: A disease-freeequilibrium when I = 0;

E0 = (S0, I0, V 0) =

(Λ[µ(1− q) + θ]

µ(µ+ θ + φ), 0,

Λ(µq + φ)

µ(µ+ θ + φ)

),

Page 560: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

546 MAHMOOD PARSAMANESH

and an endemic equilibrium when I > 0;

E∗ = (S∗, I∗, V ∗),

with

S∗ =µ+ γ + α

β,

I∗ =βΛ[µ(1− q) + θ]− µ(µ+ γ + α)(µ+ φ+ θ)

β(µ+ α)(µ+ θ),

V ∗ =qΛ + φ(µ+ γ + α)/β

µ+ θ.

We use the next generation matrix method developed in [21], to find the basicreproduction number of the model. Let y = I, where y indicates all infectedstates such as exposed and infectious individuals. Thus the second equation insystem (2.1) can be written as

dy

dt= F −W,

with F = βSI and W = (µ+ γ + α)I.Also let

F =∂F∂y

∣∣∣E0

= βS0 and W =∂W∂y

∣∣∣E0

= µ+ γ + α.

Therefore the basic reproduction number of the model is obtained by

(2.3) R0 = ρ(FW−1) =βS0

µ+ γ + α=

βΛ[µ(1− q) + θ]

µ(µ+ γ + α)(µ+ φ+ θ).

Notice that

I∗ =µ(µ+ γ + α)(µ+ φ+ θ)

β(µ+ α)(µ+ θ)(R0 − 1),

and so the endemic equilibrium E∗ exists if R0 > 1. Hence we can state thefollowing:

Lemma 2.1. When R0 ≤ 1 system (2.1) has only the disease-free equilibriumE0 and if R0 > 1 it also has a unique endemic equilibrium E∗.

3. Stability of the disease-free equilibrium

In this section we consider the local and global stability of the disease-freeequilibrium. Firstly it can be seen easily that eigenvalues of the Jacobian matrixof system (2.1) at E0 are

λ1 = (µ+ γ + α)(R0 − 1),λ2 = −µ,λ3 = −(µ+ φ+ θ),

thus we can obtain the following theorem:

Page 561: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

GLOBAL DYNAMICS OF AN SIVS EPIDEMIC MODEL WITH ... 547

Theorem 3.1. The disease-free equilibrium E0 is locally asymptotically stablefor R0 < 1 and unstable for R0 > 1.

Our next task is to prove the global stability of E0. This task has beendiscussed also by many authors especially [3,11,15,12] and various methods havebeen established.

Theorem 3.2. The disease-free equilibrium E0 of system (2.1) is globally asymp-totically stable if R0 < 1.

Proof. Consider the Lyapunov function L(t) = I(t). Now, we consider twobelow cases:

Case(a): If βΛµ(µ+γ+α) ≤ 1, we see that R0 < 1 and we have

(3.1) βS − (µ+ γ + α) ≤ β(

Λ

µ

)− (µ+ γ + α) ≤ 0.

Case (b): If βΛµ(µ+γ+α) > 1 and R0 ≤ 1. R0 ≤ 1 implies βΛ

µ(µ+γ+α) ≤µ+φ+θµ(1−q)+θ

and therefore S0 ≤ µ+γ+αβ . So the region

Ω =

(S, I, V ) ∈ Γ : S >

µ+ γ + α

β, I > 0

is not an invariant set because contains no equilibrium when R0 ≤ 1.Hence, any solution with initial value in Ω lies in Γ\Ω after a finite periodof time. For any (S, I, V ) ∈ Γ\Ω we have S ≤ µ+γ+α

β and thus

(3.2) βS − (µ+ γ + α) ≤ 0.

From (3.1) and (3.2) we see

(3.3) L′ = I[βS − (µ+ γ + α)] ≤ 0.

Therefore, from the LaSalle’s invariance principle [14], we find that every solu-tion of the model (2.1) with initial values in Γ, ultimately approaches E0, whenR0 ≤ 1.

4. Stability of the endemic equilibrium

In this section we study the local and global asymptotic stability of the endemicstate E∗. We firstly attempt to explore the uniform persistence of (2.1) whenR0 > 1. Suppose that (X, d) is a locally compact metric space and H is a closed

subset of X with boundary ∂H and interiorH. We state the following definition

about uniform persistence which can be found in [8]:

Page 562: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

548 MAHMOOD PARSAMANESH

Definition 4.1. A semi-dynamical system Φt(x) : H × R+ → H defined on His said to be uniform persistence if there exists some η > 0 such that

lim inft→∞

d(Φt(x), ∂H) > η,

for all x ∈ H.

Definition 4.2. A subset Σ of H is said to be a uniform repeller if and only ifthere exists an η > 0 such that for all x ∈ H\Σ, lim inft→∞ d(Φt(x),Σ) > η.

The definitions (4.1) and (4.2) state that a semi-dynamical system definedon a closed subset of a locally compact metric space is uniform persistence ifthe boundary of such subset is uniform repeller. The following result aboutpersistence has been proved by Fonda in [7]:

Lemma 4.3. Let F be a compact subset of X such that X\F is positivelyinvariant. F is uniform repeller if and only if there exists a neighborhood U ofF and a continuous function P : X −→ R+ satisfying:

(i) P (x) = 0 if and only if x ∈ F ,(ii) For any x ∈ U , there exists a Tx such that P (ΦTx(x)) > P (x).

Now, consider the dynamical system (2.1) on positively invariant region Γ.Also, we let

H = Γ = (S, I, V ) ∈ R3+ : S + I + V ≤ Λ

µ,

Σ = ∂Γ = (S, I, V ) ∈ Γ : I = 0,

and henceH\Σ =

Γ = (S, I, V ) ∈ Γ : I > 0.

Thus to show uniform persistence of system (2.1), we must show that Σ isuniform repeller when R0 > 1.

Theorem 4.4. System (2.1) is uniform persistence if R0 > 1.

Proof. Obviously, Σ is a compact set and H\Σ is positively invariant whenR0 > 1. Let define P : Γ −→ R+ by P (S, I, V ) = I, and U = (S, I, V ) ∈ Γ :P (S, I, V ) < ζ, where ζ > 0 is chosen so small that

(4.1)βΛ[µ(1− q) + θ]

(µ+ γ + α)[µ(µ+ φ+ θ) + 2(µ+ θ)βζ]> 1.

The condition (i) is clearly satisfied. Assume that the condition (ii) doesn’thold, i.e. there exists a x ∈ U such that P (Φt(x)) < P (x) < ζ for all t > 0.This implies I < ζ and thus we see from system (2.1),

(4.2)

S′ ≥ (1− q)Λ− βζS − (µ+ φ)S + θV,

V ′ = qΛ + φS − (µ+ θ)V.

Page 563: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

GLOBAL DYNAMICS OF AN SIVS EPIDEMIC MODEL WITH ... 549

Hence, lim inft→∞ S(t; x) ≥ Λ[µ(1−q)+θ]µ(µ+φ+θ)+(µ+θ)βζ , where S(t; x) denotes the solution

S(t) with initial value x. Thus there exists some TS such that for any t > TS

(4.3) S(t; x) ≥ Λ[µ(1− q) + θ]

µ(µ+ φ+ θ) + 2(µ+ θ)βζ.

Now consider the function W (t) = I(t). We see

W ′ = I ′ = I[βS − (µ+ γ + α)]

≥ I[β

Λ[µ(1− q) + θ]

µ(µ+ φ+ θ) + 2(µ+ θ)βζ− (µ+ γ + α)

]= I(µ+ γ + α)

[βΛ[µ(1− q) + θ]

(µ+ γ + α)[µ(µ+ φ+ θ) + 2(µ+ θ)βζ]− 1

].(4.4)

Therefore from (4.1) and (4.4) it is concluded that W (t) −→ ∞ as t −→ ∞.But this result contradicts the boundedness of W (t). Hence the condition (ii)must be also satisfied and Σ is uniformly repeller. This completes the proof.

In the following, we consider the stability of the endemic equilibrium employ-ing the approach used in [1] and properties of compound matrices. The (localasymptotic) stability of the E∗ is equivalent to stability of the correspondingJacobian matrix of system (2.1) at E∗:

J∗ = J(E∗) =

−βI∗ − (µ+ φ) −(µ+ α) θβI∗ 0 0φ 0 −(µ+ θ)

.

We can easily see that tr(J∗) < 0 and det(J∗) < 0. Assume that λ1, λ2 and λ3are eigenvalues of J∗ such that ℜ(λ1) ≤ ℜ(λ2) ≤ ℜ(λ3), where ℜ(.) denotes thereal part of a complex number. Then, λ1λ2λ3 < 0 yields either ℜ(λj) < 0 forj = 1, 2, 3 or ℜ(λ1) < 0 < ℜ(λ2) ≤ ℜ(λ3).

On the other hand, the second additive compound matrix J [2](E∗) of theJacobian matrix J∗ (for example, by a strict formula in appendix of [19]) canbe calculated as

J [2](E∗) =

−βI∗ − (µ+ φ) 0 −θ0 −βI∗ − (2µ+ φ+ θ) −(µ+ α)φ βI∗ −(µ+ θ)

Notice that eigenvalues of J [2](E∗) are λ1 + λ2, λ1 + λ3 and λ2 + λ3. Besides,tr(J∗) = λ1 + λ2 + λ3 < 0 implies ℜ(λ1 + λ2) < 0 and ℜ(λ1 + λ3) < 0. Onecan show that det(J [2](E∗)) < 0, and thus we must have ℜ(λ2 + λ3) < 0. Alleigenvalues of J [2](E∗) have negative real part and as a result it is stable. Any nby n real matrix M is stable if and only if (−1)ndet(M) > 0 and M [2] is stable[19], thus the Jacobian matrix J∗ is stable and we have the following theorem:

Page 564: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

550 MAHMOOD PARSAMANESH

Theorem 4.5. The endemic equilibrium E∗ of system (2.1) is locally asymp-totically stable if R0 > 1.

To analyze the global stability of E∗ we use a geometric approach developedby Li and Muldowney [18]. This method has been used to deal with the globalstability of endemic equilibrium in many epidemic models [4,1,20,22,2]. Here webriefly explain the method:

Consider the autonomous equation x′ = f(x), where f : D −→ Rn is a C1

function on an open set D ⊂ Rn. The solution of the differential equation withinitial value x0 is denoted by x(t;x0). Assume that two following conditionshold:

(G1) The system has a unique equilibrium x in D;(G2) There exists a compact absorbing set K ⊂ D.Let Q(x) be a M ×M , M =

(n2

), matrix-valued function which is C1 on

D. Moreover, assume that Q−1(x) exists and is continuous for x ∈ K. Define aquantity q2 as

q2 = lim supt→∞

supx0∈K

1

t

∫ t

0ψ (B(x(r;x0))) dr,

where,B = QfQ

−1 +QJ [2]Q−1.

Here, J [2] is the second additive compound matrix of the Jacobian matrix J , Qf

is obtained by (qij)f =(∂qij∂x

)⊤.f(x), and ψ(B) is the Lozinski ı measure of B

with respect to a vector norm |.| in RM , defined by ψ(B) = limh→0+|I+hB|−1

h .The following result has been proved in [18].

Lemma 4.6. Suppose that D is simply connected and conditions G1 and G2 aresatisfied. The unique equilibrium x of system x′ = f(x) is globally asymptoticallystable in D if q2 < 0.

We are now in position to prove the global stability of the endemic equilib-rium.

Theorem 4.7. The endemic equilibrium E∗ of system (2.1) is globally asymp-totic stable if R0 > 1 and the following condition holds:

µ > maxθ − φ, γ − θ + φ, γ − θ + α

.

Proof. The uniform persistence of system (2.1) in the bounded region Γ, stated

in Theorem 4.4, implies that there exists a compact set K inΓ which is absorbing

for solutions of system(2.1) (see [9]).The Jacobian matrix of system (2.1) is

J = J(S, I, V ) =

−βI − (µ+ φ) −βS + γ θβI βS − (µ+ γ + α) 0φ 0 −(µ+ θ)

,

Page 565: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

GLOBAL DYNAMICS OF AN SIVS EPIDEMIC MODEL WITH ... 551

and its corresponding second additive compound matrix is

J [2] =

−βI + βS

−(2µ+ φ+ γ + α) 0 −θ0 −βI − (2µ+ φ+ θ) −βS + γ−φ βI βS − (2µ+ γ + α+ θ)

.

Set the function Q = Q(S, I, V ) = SI I3, where I3 is the identity matrix. We

obtain Qf =(S′

I −SI′

I2

)I3 and thus QfQ

−1 =(S′

S −I′

I

)I3. On the other hand

obviously QJ [2]Q−1 = J [2]. Therefore the matrix B = QfQ−1 + QJ [2]Q−1 can

be written in block form as

B =

(B11 B12

B21 B22

),

in which,

B11 = S′

S −I′

I − βI + βS − (2µ+ φ+ γ + α),

B12 = (0− θ), B21 = (0− φ)⊤,

B22 =

(S′

S −I′

I − βI − (2µ+ φ+ θ) −βS + γ

βI S′

S −I′

I + βS − (2µ+ γ + α+ θ)

).

From [18], if we select the norm∣∣∣(u, v, w)

∣∣∣ = max∣∣∣u∣∣∣, ∣∣∣v∣∣∣+∣∣∣w∣∣∣ for (u, v, w) ∈

R3, then we have

ψ(B) = supg1, g2,

where g1 = ψ(B11)+∣∣∣B12

∣∣∣ and g2 = ψ(B22)+∣∣∣B21

∣∣∣ and ψ denotes the Lozinskiı

measure with respect to the defined norm. Thus, we have ψ(B11) = S′

S −I′

I −βI + βS − (2µ+ φ+ γ + α), | B12 |= θ, | B21 |= φ and

ψ(B22) = max

S′

S− I ′

I− (2µ+ φ+ θ),

S′

S− I ′

I− (2µ+ γ + α+ θ)

=S′

S− I ′

I− (2µ+ θ) + max−φ,−α

From second equation of system (2.1) we have βS = I′

I + (µ+ γ + α), thus

g1 =S′

S− I ′

I− βI + βS − (2µ+ φ+ γ + α) + θ

=S′

S− βI − µ− φ+ θ ≤ S′

S− µ− φ+ θ,

Page 566: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

552 MAHMOOD PARSAMANESH

and

g2 =S′

S− I ′

I− (2µ+ θ) + max−φ,−α+ φ

=S′

S− βS − µ− θ + γ + α+ φ+ max−φ,−α

=S′

S− βS − µ− θ + γ + maxα, φ.

≤ S′

S− µ− θ + γ + maxα,φ.

Therefore

ψ(B) = supg1, g2 ≤S′

S− µ+ max−φ+ θ,−θ + γ + φ,−θ + γ + α

=S′

S− µ−minφ− θ, θ − γ − φ, θ − γ − α.

By the assumption in the state of theorem we get

ψ(B) = supg1, g2 ≤S′

S− η,

in which η = β + µ+ minφ− θ, θ − γ − φ, θ − γ − α > 0.Therefore for any solution of system (2.1) with (S(0), I(0), V (0)) ∈ K, we

have1

t

∫ t

0ψ(B)dr ≤ 1

t

∫ t

0

(S′

S− η)dr =

1

tlnS(t)

S(0)− η,

which implies

q2 = lim supt→∞

sup1

t

∫ t

0ψ(B)dr < −1

2η < 0,

and according to the Lemma 4.6, E∗ is globally asymptotically stable.

5. The impact of vaccination

In this section we discuss briefly the model in absence of vaccination. If weconsider model (2.1) without vaccination i.e. we omit the compartment V , wehave an SIS epidemic model and the vaccination-free basic reproduction numberbecomes

R0 =βΛ

µ(µ+ γ + α),

and therefore

R0 =

(1− µq + φ

µ+ θ + φ

)R0.

This shows that R0 ≤ R0 and thus disease will extinct sooner in present ofvaccination. For under study population if R0 < 1 the disease will die out,

Page 567: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

GLOBAL DYNAMICS OF AN SIVS EPIDEMIC MODEL WITH ... 553

but when R0 > 1 it will persist in population and thus vaccination must beperformed such that R0 ≤ 1. To this be satisfied we must have

φ+ µqR0 ≥ (µ+ θ)(R0 − 1).

This shows that to eradicate the disease at least a fraction

(5.1) q∗vac =1

µR0

[(µ+ θ)(R0 − 1)− φ

].

of new members must be vaccinated. From (5.1) it can be concluded that greatervalues for φ and less values for θ yield less values for q∗vac. This shows that in-crease in the proportion of susceptible individuals who protected by vaccination(φ), and also in the period time of loosing immunity

(1θ

), accelerates the disease

eradication. however, it must be noted that if q∗vac > 1, the vaccination can notovercome the disease even if all new members are vaccinated.

6. An example

In this section, using numerical approach the theoretical results obtained in pre-ceding sections will be examined. First, a bifurcation diagram of compartmentI(t) in terms of various values of parameter q is presented. Then, some solutionsof the model in two cases R0 < 1 and R0 > 1 are given.

Example 6.1. Let values of parameters in model (2.1) are as Λ = 0.2, β =0.6, µ = 0.1, φ = 0.2, α = 0.2, γ = 0.3, θ = 0.2, and q ∈ (0, 1). Assume alsothat the unit of population size is one million individuals and initial values areS(0) = 0.8, I(0) = 0.4 and V (0) = 0.5.

A bifurcation diagram of number of infected individuals (variable I(t)) interms of fraction of vaccinated new members (parameter q) is presented in Figure1. For values q < 0.5 obviously final values of I(t) have positive values and theendemic equilibrium E∗ is stable, while for q > 0.5 the disease-free equilibriumE0 is stable. This can be also concluded from relation (5.1) where q∗vac = 0.5 isoptimal value for which the disease will be extinct from population.

Now let q = 0.2 and q = 0.8. For these values for q and same values for otherparameters as before, we have R0 = 1.12 > 1 and R0 = 0.88 < 1, respectively.Then, according to Theorem 4.6 and Theorem 3.2 disease persists and will bewiped out in these cases, respectively. Solutions of the model for these twovalues of parameter q are shown in Figure 2.

7. Summary

In this paper, we studied an SIS epidemic model that includes a vaccinationprogram. The vaccination consist of new members and susceptible individuals.Although vaccination effect is perfect i.e. no vaccinated individual becomes in-fectious, its immunity is lost gradually. The basic reproduction number R0, and

Page 568: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

554 MAHMOOD PARSAMANESH

Figure 1: A diagram for final values of infected population I(t) in terms of various values offraction q.

Figure 2: Solutions of model (2.1) for values q = 0.2 and q = 0.8 and other parameter valuesas in Example 6.1.

Page 569: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

GLOBAL DYNAMICS OF AN SIVS EPIDEMIC MODEL WITH ... 555

equilibria of the model were found. The dynamics of the model were determinedby threshold R0; if R0 < 1, it was proved that the disease-free equilibrium islocally as well as globally asymptotically stable. In this case the disease diesout and disease extinction occurs. while the disease will persist in populationpermanently if R0 > 1. Indeed it was proved that the endemic equilibrium islocally asymptotically stable by means of the second additive compound matrixmethod and is globally asymptotically stable using a geometric approach. Im-pact of vaccination was briefly discussed and an optimal fraction of new memberswho must be vaccinated to disease dies out, was found. Finally, the theoreticalresults were discussed also numerically in some examples.

References

[1] Julien Arino, C. Connell McCluskey and Pauline van den Driessche, Globalresults for an epidemic model with vaccination that exhibits backward bifur-cation, SIAM Journal on Applied Mathematics, 64 (2003), 260-276.

[2] Bruno Buonomo and Cruz Vargas-De-Leon, Global stability for an HIV-1 infection model including an eclipse stage of infected cells, Journal ofMathematical Analysis and Applications, 385 (2012), 709-720.

[3] Carlos Castillo-Chavez, Zhilan Feng, and Wenzhang Huang, On the com-putation of R0 and its role on, Mathematical approaches for emerging andreemerging infectious diseases: an introduction, 1-229, 2002.

[4] Meng Fan, Michael Y Li, and Ke Wang, Global stability of an SEIS epidemicmodel with recruitment and a varying total population size, MathematicalBiosciences, 170 (2001), 199-208.

[5] Rahman Farnoosh and Mahmood Parsamanesh, Disease extinction and per-sistence in a discrete-time SIS epidemic model with vaccination and varyingpopulation size, Filomat, 31 (2017), 4735-4747.

[6] Rahman Farnoosh and Mahmood Parsamanesh, Stochastic differentialequation systems for an SIS epidemic model with vaccination and immigra-tion, Communications in Statistics-Theory and Methods, 46 (2017), 8723-8736.

[7] Alessandro Fonda, Uniformly persistent semidynamical systems, Proceed-ings of the American Mathematical Society, pages 111-116, 1988.

[8] HI Freedman, Shigui Ruan, and Moxun Tang, Uniform persistence andflows near a closed positively invariant set, Journal of Dynamics and Dif-ferential Equations, 6 (1994), 583-600.

[9] Vivian Hutson and Klaus Schmitt, Permanence and the dynamics of bio-logical systems, Mathematical Biosciences, 111 (1992), 1-71.

Page 570: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

556 MAHMOOD PARSAMANESH

[10] Li Jianquan and Ma Zhien, Global analysis of SIS epidemic models withvariable total population size, Mathematical and Computer Modelling, 39(2004), 1231-1242.

[11] Jean Claude Kamgang and Gauthier Sallet, Global asymptotic stability forthe disease free equilibrium for epidemiological models, Comptes RendusMathematique, 341 (2005), 433-438.

[12] Jean Claude Kamgang and Gauthier Sallet, Computation of threshold con-ditions for epidemiological models and global stability of the disease-freeequilibrium (DFE), Mathematical Biosciences, 213 (2008), 1-12.

[13] Christopher M Kribs-Zaleta and Jorge X Velasco-Hernandez, A simple vac-cination model with multiple endemic states, Mathematical biosciences, 164(2000), 183-201.

[14] Joseph La Salle and Solomon Lefschetz, Stability by Liapunov’s DirectMethod with Applications by Joseph L Salle and Solomon Lefschetz, vol-ume 4, Elsevier, 2012.

[15] Istvan G Lauko, Stability of disease free sets in epidemic models, Mathe-matical and computer modelling, 43 (2006), 1357-1366.

[16] Jianquan Li and Zhien Ma, Qualitative analyses of SIS epidemic model withvaccination and varying total population size, Mathematical and ComputerModelling, 35 (2002), 1235-1243.

[17] Jianquan Li, Zhien Ma, and Yicang Zhou, Global analysis of SIS epi-demic model with a simple vaccination and multiple endemic equilibria,Acta Mathematica Scientia, 26 (2006), 83-93.

[18] Michael Y Li and James S Muldowney, A geometric approach to global-stability problems, SIAM Journal on Mathematical Analysis, 27 (1996),1070-1083.

[19] Michael Y Li and Liancheng Wang, A criterion for stability of matrices,Journal of mathematical analysis and applications, 225 (1998), 249-264.

[20] Chengjun Sun and Ying-Hen Hsieh, Global analysis of an SEIR model withvarying population size and vaccination, Applied Mathematical Modelling,34 (2010), 2685-2697.

[21] Pauline Van den Driessche and James Watmough, Reproduction numbersand subthreshold endemic equilibria for compartmental models of diseasetransmission, Mathematical Biosciences, 180 (2002), 29-48.

[22] Wei Yang, Chengjun Sun, and Julien Arino, Global analysis for a generalepidemiological model with vaccination and varying population, Journal ofMathematical Analysis and Applications, 372 (2010), 208-223.

Page 571: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

GLOBAL DYNAMICS OF AN SIVS EPIDEMIC MODEL WITH ... 557

[23] Yanan Zhao and Daqing Jiang, The threshold of a stochastic SIS epi-demic model with vaccination, Applied Mathematics and Computation, 243(2014), 718-727.

Accepted: 21.02.2018

Page 572: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (558–571) 558

USING MULTI-SCALE AUTO CONVOLUTION MOMENTSTO GET IMAGE AFFINE INVARIANT FEATURES

Fengwen Zhai∗

School of Electronic and Information EngineeringLanzhou Jiaotong University,Lanzhou, Gansu, [email protected]

Jianwu DangSchool of Electronic and Information EngineeringLanzhou Jiaotong University,Lanzhou, Gansu, 730070China

Yangping WangSchool of Electronic and Information EngineeringLanzhou Jiaotong University,Lanzhou, Gansu, 730070China

Jing JinSchool of Electronic and Information Engineering

Lanzhou Jiaotong University,

Lanzhou, Gansu, 730070

China

Abstract. This paper includes two important works. First of all, the complete math-ematical proof procedure of Multi-Scale Auto convolution was summarized and thesimplified geometric proof the procedure was proposed. Secondly, Multi-Scale Autoconvolution moments were adopted to describe images’ maximally stable extremal re-gions to get affine invariant features of images. In the second job, the Multi-Scale Autoconvolution moments of the image features were calculated on each feature’s MSERregion to form image features’ descriptors, and then the image feature matching wasperformed. In order to verify the validity of the second job, the proposed algorithmwere compared with the SIFT algorithm and MSER SURE algorithm. Simulation ex-periments show that, for affine transformed images, the feature matching accuracy ofthe second job is much higher than the classical SIFT algorithm and the MSER SUREalgorithm, which indicates that using Multi-Scale Auto convolution moments on theMSER regions could get effective affine invariant image features.

Keywords: multi-scale auto convolution, maximally stable extremal regions, featurematching, affine invariant, pattern recognition.

∗. Corresponding author

Page 573: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

USING MULTI-SCALE AUTO CONVOLUTION MOMENTS ... 559

1. Introduction

Images provide a variety of information of colors, intensities, textures, edgesand shapes. To understand and recognize the images, it is necessary to ac-quire invariant features of digital images. The image features mainly fall intothree categories: region-based features, texture-based features, and point fea-tures. The point features are widely used in the field of image retrieval, targetrecognition and tracking, image three-dimensional reconstruction, image super-resolution reconstruction, image mosaic and image registration. David Loweproposed the scale-invariant feature transform (SIFT) algorithm in 1999 andfurther improved in 2004. SIFT features remain invariant to rotation, scaling,and brightness changes, and maintain a certain degree of stability against affinetransformation and noises [1]. Morel et al. proposed the ASIFT algorithm in2009[2]. ASIFT uses the discrete image shooting angle changes to simulate thecontinuous shooting angle changes. The matching effect of ASIFT greatly ex-ceeds the SIFT algorithm in affine invariance aspect, but the time efficiencyis lower than SIFT. In 2011, Ethan Rublee et al. proposed ORB algorithm[3]on ICCV. The ORB algorithm is based on the FAST algorithm and the BRIEFalgorithm, but the ORB algorithm could not get scale invariant and affine invari-ant features. Image moments could keep some invariant characteristics. A lot ofresearchers have concentrated on the study of adopting moments to describe im-age features [4, 5, 6]. But the before moments could only get scale or rotationalor transformational invariances while affine invariance is also important for realapplications[7, 8, 9, 10]. In 2002, Heikkil J and Esa et al. proposed Multi-scaleAuto convolution (MSA)[11] moments which are affine invariant when appliedto pattern recognition. And in the later years, Esa et al. polished the MSAmoments algorithm from different aspects [12, 13, 14, 15]. Due to the strongaffine invariance of MSA moments, there are more and more researchers appliedMSA moments into image processing. In 2014, Shao C et al. improved the MSAmoments classification ability by taking the cosine value of the angle betweentwo most prominent points within image feature’s neighborhood as the feature’sprobability density value[16]. In 2015, Li et al. proposed a feature point match-ing method based on the geometric relation constraint and MSA moments [17].In the same year, Zhang et al. Combined the MSA moments with the SIFTalgorithm [18] and improved the match accuracy of the SIFT algorithm. How-ever, it was found that the proof process of MSA moment calculation method iscomplicated and has a lot of jumping in the reference[12], which is inconvenientfor readers to understand and to simulation. At the same time, MSA Momenthas strict mathematical features, if the MSA moments were introduced intofeature point matching, the neighborhood window similar to SIFT algorithmand ORB algorithm can not be used directly. In view of the above two prob-lems, firstly, this paper summarizes the complete proof of the MSA momentsand then proposes a more easy-to-understand calculation method through spa-tial geometry analysis. Secondly, the regions of the Maximally Stable Extremal

Page 574: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

560 FENGWEN ZHAI, JIANWU DANG, YANGPING WANG and JING JIN

Regions(MSER)[19] were selected as the simple background neighborhoods ofthe image features, so that the MSA moments can be effectively applied tothe description of the image features, which was defined as MSER MSA forconvenient. Thirdly, the MSER MSA algorithm was compared with the SIFTalgorithm and the MSER SURF[20] algorithm to prove the effectiveness of theMSER MSA algorithm for large-scale affine transformed image pairs.

The remaining part of this paper is structured as follows. The second partintroduces the basic principle of the MSA moments and the MSER algorithm.The third part summarizes the complete proof procedure and proposes the easy-to-understand geometric proof of the MSA moments. The fourth part introducesthe MSER MSA algorithm to detail. The fifth part compares the proposedMSER MSA algorithm with the SIFT and MSER SURF algorithms. At last, theconclusion part concludes with a summary of the effectiveness of the proposedMSER MSA algorithm and the next work direction.

2. MSA Moments and MSER algorithm

In 2005, Esa et al. Proposed MSA moments. To understand MSA moments,references [12] gives three definitions.

Definition 1. X is the base point, and the Γ is the affine transform matrix, X′

corresponds to X

(1) X′ = Γ(X) = TX + t

Among them t,x ∈ R2, and T is a non-singular real matrix, the inversetransform recorded as

(2) Y′ = Γ−1(Y) = T−1Y −T−1t

Definition 2. Let f(x) : R2 → R, and f(x) ≥ 0 is a grayscale function definedon a two-dimensional grayscale image. Applying the affine transformation tothe image, a new image grayscale function can be obtained.

(3) f ′(x) = f(Γ−1(x)) = f(T−1x−T−1t)

Definition 3. For the feature A extracted from the image, the feature A iscalled the affine invariant feature when f (A) and f ′ (A) is the same.

Randomly take three non-collinear three points x0, x1, x2 in the image asthe basis for the two arbitrary variables α and β, then random variable u couldbe gotten form Eq. (4)

(4) u = α(x1 − x0) + β(x2 − x0) + x0

To transform the point x0, x1, x2 using Γ = ΓT, t, then x0′ = Tx0 + t,

x1′ = Tx1 + t, x2

′ = Tx2 + t. Assume u′ = α(x1′ − x0

′) + β(x2′ − x0

′) + x0′,

Page 575: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

USING MULTI-SCALE AUTO CONVOLUTION MOMENTS ... 561

then

u′ =α(x1′ − x0

′) + β(x2′ − x0

′) + x0′

=α((Tx1 + t)− (Tx0 + t)) + β((Tx2 + t)− (Tx0 + t)) + Tx0 + t

=α(Tx1 −Tx0) + β(Tx2 −Tx0) + Tx0 + t

=Tu + t

(5)

From Eq.(5), to transform the basis point x0, x1, x2 by Γ = ΓT, t, thenwe can obtain three new base point x0

′, x1′, x2

′. The same affine transforma-tion Γ = ΓT, t is performed on point u to get a new point u′. The linearrelationship between u′ and x0

′, x1′, x2

′ and the linear relationship between uandx0, x1, x2 remain unchanged. And from Eq. (3), Eq.(6) can be obtained.

(6) f ′(u′) = f(Γ−1(u′)) = f(T−1u′−T−1t) = f(T−1(Tu+ t)−T−1t)) = f(u)

In summary, we can obtain an affine invariant feature f(U), where u is arandom variable of U . The MSA moment is the mathematical expectation off(U).

(7) F (α, β) = E[f(Uα,β)]

The reference[12] gives the calculation formula of F (α, β) as equation (8)

(8) F (α, β)=

[∫R2

f(−ξ)f(αξ)f(βξ)f(γξ)dξ

]/f(0)3

2.1 The basic principle of MSER algorithm

MSER’s full name is Maximally Stable Extremal Regions, which was put forwardby J. Matatas in 2002[19]. MSER algorithm uses three definitions: Region,Extremal Region and Maximally Stable Extremal Region.

Definition 4. The region is a part of an image, for any two points A andB, A can reach B along the adjacent pixel within this part, that is, there is aconnected path between any two points.

Definition 5. The definition of Extreme region is related to the grayscalethreshold. After the grayscale threshold is set, the image is divided into twopart according to the threshold, the pixels smaller than the threshold are setto black, the pixels larger than the threshold are set to white. The region inthe image is made up of black pixels. And the region can become the extremeregion if no more pixels can be found to enlarge the current region.

For example, threshold segmentation is performed on an image. Then selecta series of grayscale thresholds. For example, we take i = 0, 1, · · · , 255. Whenthe threshold is i, the gray value of each pixel in the image is compared withthe threshold. Points below this threshold are “black spots”, otherwise, “white

Page 576: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

562 FENGWEN ZHAI, JIANWU DANG, YANGPING WANG and JING JIN

(a) (b) (c) (d)

(e) (f) (g) (h)

Figure 1: Extreme Region illustration figures. (a) is the original image.(b),(c),(d),(e),(f),(g),(h) are the Extreme Regions that appear in theimage when the grayscale thresholds are set to 80, 100, 120, 140, 160,180, 200.

spots”. This will get a picture of a frame. When all the images are arrangedin order of threshold, you can see: The first picture is all white (all pixels havea threshold of no less than 0). Then the black spots appear gradually on theimage, and some black spots gradually fuse together to form a small area tobecome the connected areas. The last picture is all black as shown in Fig.1.In these figures, all the black connected areas are Extreme Regions. Even anisolated black spot is also an Extreme Region. The determination of ExtremeRegion is closely related to this gray threshold. It is unable to determine aregion or point is Extreme Region or not when leaving this grayscale threshold.

Definition 6. During the process of obtaining Extreme Region, some ExtremeRegions increase slightly with the increasing of the set gray threshold. Sucha group of Extreme Regions is a nested relationship from small to large. Weuse Q1, Q2, · · · , Qi−1, Qi to represent this series of mutually exclusive ExtremeRegion sequences. The condition of Q∗i could be Maximally Stable ExtremalRegion if and only if the minimum value of q(i) is achieved when i = i∗.

(9) q(i) =|Qi+ξ −Qi−ξ|

|Qi|

Because Q is a collection of pixels, the absolute value represents the cardinal-ity of the collection. We can think of it as the area of this Extreme Region. Ascan be seen from the above explanation, the maximum stable Extreme Region

Page 577: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

USING MULTI-SCALE AUTO CONVOLUTION MOMENTS ... 563

is the Maximally Stable Extremal Region when the gray threshold changes. Sowe find all the Extreme Regions and then use the formula (9) to determine thefinal Maximally Stable Extremal Regions which is abbreviated as MSER.

The MSER regions can be processed as simple background image fragments.Esa et al. have experimentally proved that the MSA moments should be appliedto image pattern recognition with simple backgrounds.

3. The MSA moment calculation method

3.1 The summarized proof for MSA moment calculation

The proof process of MSA moment calculation includes convolution calculation.As we all know that convolution calculation in the time domain is very time-consuming. It has been tested that the convolution of three 5 ∗ 5 matricesrequires nearly 1 minute to run in our experimental environment. Therefore,Esa et al. converts the convolution computation of time domain into frequencydomain product[21], and gives the proof process of MSA moment. However, theproof process of MSA moment calculation is complicated and inconsistent in thereference [12], which is inconvenient for readers to understand and to simulate.Firstly, this paper summarizes the detailed proof process of the MSA momentcalculation method as follows.

(1) F (α, β) =

∫D2

f(u)(pα ∗ pβ ∗ pγ)(u)du

(2) =

∫D2

f(u)(pα ∗ pβ ∗ pγ)(u)du

(3) =

∫D2

F(f(u))F((pα ∗ pβ ∗ pγ)(u))dξ

(4) =

∫D2

F(f(u))F(pα)F(pβ)F(pγ)dξ

(5) =

∫D2

F(f(u))1

αβγ‖fR2‖L13F(f(

u

α))F(f(

u

β))F(f(

u

γ))dξ

(6) =1

αβγ‖fR2‖L13

∫D2

F(f(u))F(f(u

α))F(f(

u

β))F(f(

u

γ))dξ

(7) =αβγ

αβγ‖fR2‖L13

∫D2

F (−ξ)F (αξ))F (βξ)F (γξ)dξ

(8) =1

‖fR2‖L13

∫D2

F (−ξ)F (αξ))F (βξ)F (γξ)dξ

(9) =1

F (0)3

∫D2

F (−ξ)F (αξ))F (βξ)F (γξ)dξ

Among them, D2 is the integral domain of variable u, and f(x) is the con-jugate of f(x). Step (2) to (3) is based on the Plancherel formula

∫R2 f(x)g(x)

=∫R2 F(f(x))F(g(x)). The Fourier transform convolution theorem was used

Page 578: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

564 FENGWEN ZHAI, JIANWU DANG, YANGPING WANG and JING JIN

(a) Original image I (b) αI image, α = 2 (c) αI image, α = 0.5

Figure 2: The comparison figure between images I and αI.

from step (3) to step (4). step (5) is calculated by substituting pα(u), pβ(u) andpγ(u) into the formula, where pα(u) = f(uα)/(‖fR2‖L1 ∗ α). step (6) to step (7)is based on the similarity principle of the Fourier transform. Step (8) to step(9) is based on ‖fR2‖L1 = F (0).

3.2 Geometric Proof of MSA Moment Calculation Method

In Eq. (10), the proof of MSA moment calculation method is very rigorous.The functions and variables in the mathematical derivation from (5) to (9)have no specific physical meanings, which is hard for reader to understand.After detailed reasoning and simulating, this paper proofed the MSA momentcalculation method directly through geometric analysis. The proof begins atstep(4) in Eq.(10), as shown in Eq. (11)

(10) F (α, β) =

∫D2

F(f(u))F(pα)F(pβ)F(pγ)dξ

Firstly, the variables and functions in the Eq.(11) are described here. D2 isthe integral field of variable u, u = αx1 + βx2 + γx0, let the size of image Ibe m × n, then x0,x1,x2 ∈ [1 : m, 1 : n], so D2 is [1 : (|α| + |β| + |γ|) ×m, 1 :(|α| + |β| + |γ|) × n]. Where pα represents the probability density of αx1, pβrepresents the probability density of βx2, pγ represents the probability densityof γx0. The range or the integral field of αx1, βx2, γx0 is D2, f(x) representsthe gray value of the point x in the image I.

Secondly, the proposed geometric proof is given below. αI represents αtimes expanded image of I. Let fα(z) represent the gray value of the point z inimage αI. When |α| > 1, I increases to αI by inserting 0. When |α| < 1, bytaking the “enrichment” method, I will be shrunk to α times of image I. The“enrichment” means to sum up the pixels’ gray value within a small region. So‖fα(z)‖L1 = ‖f(x)‖L1 . Fig. 2 shows the relationship between I and αI.

The following demonstrates that the density of variable αx1 on image αI isequal to the density on D2. Because x1 ∈ [1 : m, 1 : n], so αx1 ∈ [α : αm,α :αn]. Even if the integration domain of αx1 is D2, αx1 can only take values in

Page 579: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

USING MULTI-SCALE AUTO CONVOLUTION MOMENTS ... 565

(a) Gray value of αx1 on D2 (b) Gray value of βx2 on D2 (c) Gray value of γx3 on D2

Figure 3: the intensities of αx1, βx2, γx0 with D2, α = 0.7, β = 1.5.

sub-domains in [α : αm,α : αn], as shown in Fig.3, and equation (12).

(11) pαD2X1

(u) =

pαX1

αI(u), u ∈ αI

0, u ∈ D2

In the equation (12), pαD2X1

(u1) represents the density of the variable αx1

on the integral domain D2, and pααIX1

(z) represents the density of the variableαx1 on the integral domain αI. Because αx1, βx2, γx0 are independent to eachother, so

∫D2 pαX1

D2(u1) =

∫αI pαX1

αI(z1) = 1. Similarly,∫D2 pβX2

D2(u2) =∫

βI pβX2βI(z2) = 1,

∫D2 pγX0

D2(u0) =

∫γI pγX0

γI(z0) = 1. In the equation (11),

pα represents pαD2X1

(u1), pβ represents pβD2

X2(u2), pγ represents pγ

D2

X0(z0). During

the actual calculation, F(pα) can be calculated according to equation (12). Thespecific calculation process is to stretch the original image I to αI, then performFourier transform in the way of zero-padding, as shown in Eq.(13).

(12) F(pα) = F(pααIX1

(z), (|α|+ |β|+ |γ|) ∗m, (|α|+ |β|+ |γ|) ∗ n)

In Eq. (13), pααIX1

(z) = fα(z)/‖fα(z)‖L1 . The calculation methods of F(pβ),F(pγ) are similar to F(pα)

Through the above geometric analysis, the calculation of the MSA momentcan be directly carried out according to Eq.(11). So, the deduction from step(5) to step (9) of the Eq.(10) could be omitted. The method presented in thispaper is more intuitive than the mathematical proof method in [8], and is easyto understand and to realize. At the same time, the simulation results show thatthe calculation results of the proposed method are consistent with the results ofthe reference [12].

4. The MSA moments of characteristic points are computed onMSER region

In order to apply the scale invariance and affine invariance of MSA momentsinto the description of image features, MSER method here is used as featurepoint neighborhood extraction method, and the 31 orders’ MSA moments arecalculated as the feature descriptors of the most stable extremal regions. The

Page 580: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

566 FENGWEN ZHAI, JIANWU DANG, YANGPING WANG and JING JIN

31 orders were recommended by reference [12]. For conveniently expressing, themethod proposed in this paper was named as MSER MSA, and the MSER MSAalgorithm was designed as follows:

Algorithm 1 MSER MSA.

Input:Reference image I, floating image J;

Output:Matching feature pairs;

1: To perform Gauss smoothing on image I and image J;2: The most stable extremal regions of I and J are extracted respectively, and

the external ellipses are obtained;3: The centroids of the external ellipses are taken as the feature points of the

image;4: The 31 orders’ MSA moments of each feature point in its ellipse neighbor-

hood are calculated and used as the feature descriptor of each feature point;

5: By comparing the feature descriptors, the features of image I and image Jare matched.

5. Experiment

The experimental simulation platform of this paper is configured as follows:Windows XP operating system, 3.30GHz CPU, 3.0G memory, MATLAB 2015.In the experiments, the proposed MSER MSA algorithm was compared with theSIFT algorithm and the classical MSER SURF method. The floating images inFig.4 were obtained by share transforming the reference images. The floatingimages in Fig.5 were obtained by share and scale transforming the referenceimages.

As can be seen that from Fig.4 and Fig.5, SIFT algorithm’s matching effectof affine transformation is poor, and the MSER SURF algorithm has bettermatching effect for the image with smaller affine transformation scale, but thematching effect of MSER SURF is sensitive to scale changes, and can not obtaincorrect matching for the images with relatively large affine changes and scalechanges. The MSER MSA performed stably for scale change and affine change,and the correct matching number is only slightly less for image pairs with largescale and affine changes.

Fig.6 is the matching accuracy comparison chart of SIFT, MSER SURFand MSER MSA. The image samples came from 4 images. Each image gen-erates a group of samples. The first one in each group is the reference image,and the rest 3 samples within each group are obtained by affine transform-ing the reference image, and the transforming scales are progressively increasedin each group. From Fig.6, it can be seen that the accuracy rates of SIFT,

Page 581: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

USING MULTI-SCALE AUTO CONVOLUTION MOMENTS ... 567

(a) (b) (c) (d)

(e) (f) (g) (h)

(i) (j) (k) (l)

Figure 4: The feature matching results of SIFT, MSER SURF and MSER MSAof images with share transforming. (a),(b),(c) and (d) are thematching results of SIFT. (e),(f),(g) and (h) are the matching re-sults of MSER SURF. (i),(j),(k) and (l) are the matching results ofMSER MSA.

Page 582: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

568 FENGWEN ZHAI, JIANWU DANG, YANGPING WANG and JING JIN

(a) (b) (c) (d)

(e) (f) (g) (h)

(i) (j) (k) (l)

Figure 5: The feature matching results of SIFT, MSER SURF and MSER MSAof images with share and scale transforming. (a),(b),(c) and (d) arethe matching results of SIFT. (e),(f),(g) and (h) are the matchingresults of MSER SURF. (i),(j),(k) and (l) are the matching results ofMSER MSA.

Figure 6: Accuracy comparison chart of SIFT, MSER SURF and MSER MSA

MSER SURF and MSER MSA are not far-off, but for large scaled transformingimage pairs, the accuracy rates of SIFT and MSER SURF are significantly lowerthan MSER MSA.

Since the MSA algorithm involves Fourier transforms, the time efficiency isslightly lower. At the same time, the MSA algorithm relies on the segmentationeffect of MSER algorithm. So the matching effect of artificial experimentalimages is better than that of realistic images.

Page 583: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

USING MULTI-SCALE AUTO CONVOLUTION MOMENTS ... 569

6. Conclusion

MSA moments have scale invariant and affine invariant characteristics, and haveachieved good recognition results in the field of image pattern recognition. How-ever, there is not much research on the application of MSA moments in filed ofimage feature describing. After many experiments and analysis, it was foundthat if we want to apply MSA moments to the description of image features,the simple background neighborhoods of each feature points must be obtainedfirstly. Therefore, this article combines the MSER method with the MSA mo-ments. The maximum stable extreme regions are taken as the neighborhoods ofimage feature points. And the 31 orders’ MSA moments of each feature pointare calculated as the feature descriptor of each feature point. Experimental re-sults show that the proposed MSER MSA algorithm can make full use of theinvariant characteristics of MSA moments. However, it was also found that theMSA moments are sensitive for images with larger illumination changes. Atthe same time, the time efficiency of the MSA moment is low. Therefore, thenext work of this study will focus on solving the illumination sensitivity of MSAmoments and improving the time efficiency of MSA moments.

References

[1] Zhai F, Dang J, Wang Y, et al., Application of Shape Context and BeliefPropagation in Removing SIFT Mismatches, Journal of Computer-AidedDesign & Computer Graphics, 28(2016), 443-449.

[2] Morel J M, Yu G., ASIFT: A New Framework for Fully Affine InvariantImage Comparison, Siam Journal on Imaging Sciences, 2 (2011), 438-469.

[3] Rublee E, Rabaud V, Konolige K, et al., ORB: An efficient alternative toSIFT or SURF, IEEE International Conference on Computer Vision, IEEE,2012, 2564-2571.

[4] MingKuei Hu, Visual pattern recognition by moment invariants, Informa-tion Theory Ire Transactions on, 8 (1962), 179-187.

[5] Zhai Feng-Wen, Muhammad Asim Azim, WANG Yang-PING et al.,Amendment of Zernike moment fast conputation, Journal of Jilin Univer-sity(Engineering and Technology Edition), 44 (2014):1860-1866.

[6] Dae San Kim, Seung-Hwan Yang, A recursive formula for power momentsof 2-dimensional kloosterman sums associated with general linear groups,Italian journal of Pure and Applied Mathematics, 34 (2015), 7-16.

[7] Huang Bo, Zhao Ji-Yin, Zheng Rui-Rui et al., Affine invariant patternrecognition based on multi-scale autoconvolution normalized histograms,CTA Electronic Sinica, 39 (2011), 64-69.

Page 584: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

570 FENGWEN ZHAI, JIANWU DANG, YANGPING WANG and JING JIN

[8] Huang Bo, Zhao Xiao-Hui, Chao Xin-Qin et al., Histogram affine invariantsextraction method based on two-scale auto-convolution, Journal on Commu-nications, 32 (2012), 140-146.

[9] Yang Jian-Wei, Li Pei-Yao, Affine Invariant Feature Extraction Based onFractional Order Moment, Acta Automatica Sinica, 41 (2015), 2147-2154.

[10] Miao Jun, Chun Jun, Zhang Gui-Meri, An Affine Invariant Line Descriptorand Line Matching, Acta Electronic Sinica, 43 (2015), 2505-2512.

[11] Heikkil J., Multi-Scale Autoconvolution for Affine Invariant Pattern Recog-nition, 16Th International Conference on Pattern Recognition, IEEE Com-puter Society, 2002, 10119.

[12] Rahtu E, Salo M, Heikkila J., Affine invariant pattern recognition usingmultiscale autoconvolution, IEEE Transactions on Pattern Analysis & Ma-chine Intelligence, 27(2005), 908-18.

[13] Kannala J, Rahtu E, Heikkila J., Affine registration with multi-scale au-toconvolution, IEEE International Conference on Image Processing, IEEE,2005, 1064-7.

[14] Rahtu E, Salo M, Heikkila J., Multiscale Autoconvolution Histograms forAffine Invariant Pattern Recognition, British Machine Vision Conference2006, Edinburgh, Uk, September. DBLP, 2006:1059-1068.

[15] Rahtu E, Salo M, Heikkil J, et al., Generalized affine moment invariants forobject recognition, International Conference on Pattern Recognition, IEEEComputer Society, 2006, 634-637.

[16] Shao C, Ding Q, Luo H., An improved multi-scale auto convolution trans-form, Proceedings of SPIE - The International Society for Optical Engi-neering, 9301 (2014), 120-127.

[17] Li Hui-Hui, Hua Li, Yang Ning et al., Multi-target association algorithmfor remote sensing images based on MSA features and simulated anneal-ing optimization, Journal of Jilin University (Engineering and TechnologyEdition), 45 (2015), 1353-1359.

[18] Zhang Xiongmei,Yi Zhaoxiang, Cai Xingfu et al., SAR Image RegistrationMethod Based on Improved SIFT, Computer Engineering, 41(2015), 223-226.

[19] Donoser M, Bischof H., Efficient Maximally Stable Extremal Region(MSER) Tracking, IEEE Computer Society Conference on Computer Vi-sion and Pattern Recognition, IEEE Computer Society, 2006, 553-560.

Page 585: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

USING MULTI-SCALE AUTO CONVOLUTION MOMENTS ... 571

[20] Tao L, Jing X, Sun S, et al., Combining SURF with MSER for imagematching, IEEE International Conference on Granular Computing, IEEE,2014, 286-290.

[21] B.G. Sidharth, A new integral transform, Italian Journal of Pure and Ap-plied Mathematics, 37 (2017), 15-18.

Accepted: 26.02.2018

Page 586: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (572–599) 572

ON THE DOUBLE FROBENIUS GROUP OF THE FORM22r:(Z2r−1:Z2)

J. MooriDepartment of Mathematical SciencesNorth West UniversityP Bag X2046, MmabathoSouth Africa, [email protected]

P. PerumalDepartment of Mathematics

Durban University of Technology

P.O.Box 953, Durban

South Africa, 4000

[email protected]

Abstract. Let G be a finite group. Let H = NH be a Frobenius group with kernel Nand complement H. If G admits H as a group of automorphisms such that CG(N) =1G and GN is also a Frobenius group with kernel G and complement N , then G =GNH is called a double Frobenius group (or 2-Frobenius group). The group G = GNHis a product of subgroups G ≤ G, N ≤ G, H ≤ G with G E G, GN E G andG = G:NH = GN :H. In this article we shall construct a double Frobenius groupof the form G = 22r:(Z2r−1:Z2), where G ∼= 22r, N ∼= Z2r−1 and H ∼= Z2, wherer ∈ N, r ≥ 2. The construction is a general one that gives examples of double Frobeniusgroups for particular values of n. In addition to the general construction of the groupG = 22r:(Z2r−1:Z2), we calculate in general the conjugacy classes, Fischer matricesand character table of the group. One example G = 24:(Z3:Z2), (the case r = 2) isdemonstrated.

Keywords: double Frobenius group, Fischer matrices, character table

1. Introduction

The case where a Frobenius group H = NH acts by automorphisms on a groupG has received some study in recent years. In this situation various properties(parameters) ofG are found to be close to the corresponding properties of CG(H)and H. These properties include the order, rank, exponent, nilpotency classand Fitting height of G. Khukhro in [7], Khukhro and Makarenko in [8] andKhukhro, Makarenko and Shumyatsky in [6] have obtained some results in thisregard. We are interested in the case where a Frobenius group H with kernelN and complement H acts as a group of automorphisms on a group G suchthat CG(N) = 1G and GN is also a Frobenius group. In recent years graphsassociated with finite groups have received much attention. In particular the

Page 587: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE DOUBLE FROBENIUS GROUP OF THE FORM 22r:(Z2r−1:Z2) 573

prime graph or Gruenberg-Kegel graph has been the subject of most attentionin interest and research. Both Frobenius and double Frobenius groups appearin the study of the prime graphs of finite groups. As a result of one of the keyclassification theorems of the prime graphs of finite groups (the Gruenberg-KegelTheorem), we have that: if G is a finite solvable group (Frobenius groups maybe solvable, double Frobenius groups are always solvable) with a disconnectedprime graph, then G is either Frobenius or double Frobenius.

2. Preliminary results

We will briefly describe here some results on Frobenius and double Frobeniusgroups, but first include some material on the method of coset analysis andFischer matrices.

2.1 Coset analysis

We will briefly discuss the method of coset analysis which is used to determinethe conjugacy classes of group extensionsG = N.G whereN is an abelian normalsubgroup of G. The technique is used for both split and non-split extensions.The technique was first used by Moori in [11]. More details can be found in [12]and [11].

Let G = N.G, where N G and G/N ∼= G, be a finite group extension.

1. For each g ∈ G let g ∈ G map to g under the natural epimorphismπ : G → G and let g1 = Ng1, g2 = Ng2, . . . , gr = Ngr be representativesfor the conjugacy classes of G ∼= G/N. Therefore, gi ∈ G, ∀i, and byconvention we take g1 = 1G.

2. The method of coset analysis constructs for each conjugacy class [gi]G, 1 ≤i ≤ r, a number of conjugacy classes of G. For each 1 ≤ i ≤ r, we letgi1 , gi2, . . . , gic(gi) be the corresponding representatives of these classes.

That is, each conjugacy class of G corresponds uniquely to a conjugacyclass of G.

3. We use the notation U = π(U) for any subset U ⊆ G. Therefore, π−1([gi]G)

=∪c(gi)j=1 [gij ]G for any 1 ≤ i ≤ r. We also assume that π(gij) = gi and by

convention we take g11 = 1G.

4. For fixed i ∈ 1, 2, . . . , r, act N by conjugation on the coset Ngi and letthe resulting orbits be Qi1, Qi2, . . . , Qiki . If N is abelian (for both a splitand non-split extensions), then

|Qi1| = |Qi2| = . . . = |Qiki | =|N |k.

5. Act G on Qi1, Qi2, . . . , Qiki and suppose fij orbits fuse together to forma new orbit ∆ij , and let the total number of new resulting orbits in this

Page 588: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

574 J. MOORI and P. PERUMAL

action be c(gi) (that is 1 ≤ j ≤ c(gi)). Then G has a conjugacy class [gij ]Gthat contains ∆ij and |[gij ]G| = |[gi]| × |∆ij |. We repeat steps 4 and 5above for all i ∈ 1, 2, . . . , r.

2.2 Fischer matrices

If G = N.G is a group extension, then G acts on the classes of N and onthe Irr(N). By Brauer’s Theorem (see [5], theorem 6.32 and corollary 6.33)the number of orbits of both these actions are the same. Let θ1, θ2, . . . , θt berepresentatives of the orbits of G on Irr(N) and let Hk and Hk denote thecorresponding inertia and inertia factor groups of θk. Bernd Fischer showed thatthe character table of G can be constructed by using the character tables of theinertia factor groups Hk together with some matrices called Fischer-Cliffordmatrices (see [4]). We define here the Fischer matrices which are used in theconstruction of the character table of any group extension G = N.G, N G

1. For each [gi]G (conjugacy class of G), there corresponds a Fischer matrixwhich we denote by Mi.

2. [gij ]G∩Hk =

∪c(gijk)n=1 [gijkn]Hk

, where gijkn ∈ Hk and by c(gijkn) we mean

the number of Hk-conjugacy classes that form a partition for [gij ]G. Sinceg11 = 1G, we have g11k1 = 1G and thus c(g11k1) = 1 for all 1 ≤ k ≤ t.

3. [gi]G∩Hk =

∪c(gik)m=1 [gikm]Hk , where gikm ∈ Hk and by c(gik) we mean

the number of Hk-conjugacy classes that form a partition for [gi]G. Sinceg1 = 1G, we have g1k1 = 1G and thus c(g1k1) = 1 for all 1 ≤ k ≤ t. Also,π(gijkn) = gikm for some m = f(j, n).

4. The top of the columns of the Fischer matrix Mi are labeled by the rep-resentatives of [gij ]G, 1 ≤ j ≤ c(gi) obtained by coset analysis and beloweach gij we put |CG(gij)|.

5. The bottom of the columns of Mi are labeled by some weights mij definedby

mij = [NG(Ngi) : CG(gij)] = |N | |CG(gi)||CG(gij)|

.

6. To label the rows of Mi we define the set Ji to be

Ji = (k,m)| 1 ≤ k ≤ t, 1 ≤ m ≤ c(gik).

7. Then each row of Mi is indexed by a pair (k,m) ∈ Ji.

8. For a fixed 1 ≤ k ≤ t, we let Mik be a submatrix of Mi with rows corre-sponding to the pairs (k, 1), (k, 2), . . . , (k, rk).

Page 589: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE DOUBLE FROBENIUS GROUP OF THE FORM 22r:(Z2r−1:Z2) 575

9. Let

a(k,m)ij :=

c(gijk)∑n=1

|CG(gij)||CHk

(gijkn)|ψk(gijkn)

for which π(gijkn) = gikm) and where ψk is the extension of θk to Hk.

10. For each i, corresponding to the conjugacy class [gi]G, we define the Fischer

matrix Mi =(a(k,m)ij

), where 1 ≤ k ≤ t, 1 ≤ m ≤ c(gik), 1 ≤ j ≤ c(gi).

11. The Fischer matrix Mi is now given by

Mi =(a(k,m)ij

)=

Mi1

Mi2......

Mit

12. In the Fischer matrix Mi, each Mik is the submatrix corresponding to the

inertia group Hk and it’s inertia factor Hk.

The Fischer matrices have numerous properties that help in their computa-tions. For details on the Fischer matrices and their properties, see [1], [2], [13],[15], [17], [14] and [18].

2.3 Frobenius group

Definition 2.1. We define a group H = N :H to be a Frobenius group if it hasa proper subgroup H = 1H such that H ∩Hx = 1H for all x ∈ H −H. Thesubgroup H is called the complement and the non-trivial subgroup N is calledthe kernel.

2.4 Properties of Frobenius Groups and their characters

We list here some properties of Frobenius groups and their ordinary characters.Let H = NH be a Frobenius group with kernel N and complement H.

1. The kernel N is unique and nilpotent and N H.

2. CH(n) ≤ N ∀ 1H = n ∈ N and CH(h) ≤ H ∀ 1H = h ∈ H.

3. |H|∣∣(|N | − 1

).

4. The action of H on N is fixed point free. Hence, the lengths of the non-trivial orbits of the action of H on N is |H| by the orbit stabilizer theorem.Therefore |N | = 1 +m|H| where m is the number of non-trivial orbits ofthe action of H on N.

Page 590: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

576 J. MOORI and P. PERUMAL

5. The Sylow p-subgroups of H are generalized quaternion or cyclic if p = 2and cyclic if p = 2.

6. H has a trivial center.

7. c(H) = c(N)−1|H| + c(H) where c(H), c(N) and c(H) are the number of

conjugacy classes of H, N and H respectively.

8. If ϕ1 = ϕ ∈ Irr(N) where ϕ1 is the trivial character of N , then ϕH ∈Irr(H).

9. If ψ ∈ Irr(H), then either N ⊂ kerψ or ψ = ϕH for some irreduciblecharacter ϕ = ϕ1 of N , thus the irreducible characters of H are of twotypes; those with kernel containing N and those induced from irreduciblecharacters of N .

10. If ψ ∈ Irr(H), such that kerψ ⊃ N and ρ is the regular representation ofH, then ψ|H = nρ where n ∈ N and we have that |H|

∣∣ϕ(1H). Furthermore,if ϕ1 = ϕ ∈ Irr(N) is a linear character, then |H| = ϕ(1H).

11. If ϕ1 = ϕ ∈ Irr(N), then ϕ has inertia group IH(ϕ) = N .

12. H has α = c(N) − 1|H| distinct irreducible characters of the form ϕH , ϕ1 =

ϕ ∈ Irr(N) and hence, c(H) = n irreducible characters ψ ∈ Irr(H), withN ⊂ kerψ

Proofs of the results mentioned here can be found in [16].

2.5 Double Frobenius group

Definition 2.2. Let G be a finite group. Let H = NH be a Frobenius groupwith kernel N and complement H. If G admits H as a Frobenius group ofautomorphisms with CG(N) = 1G such that GN is also a Frobenius groupwith kernel G and complement N , then G = GNH is called a double Frobeniusgroup.

2.6 Properties of double Frobenius groups

We list here some properties of double Frobenius groups. Let G = GNH be adouble Frobenius group with Frobenius subgroups GN and NH.

1. GEG and GN EG.

2. Double Frobenius groups are solvable.

3. In the double Frobenius group G = GNH, N is cyclic and of odd orderand H is cyclic.

4. The center of a double Frobenius group is trivial.

Page 591: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE DOUBLE FROBENIUS GROUP OF THE FORM 22r:(Z2r−1:Z2) 577

Before describing our construction we mention the following two resultswhich we make reference to.

Lemma 2.3 ([10]). Let (G,+) be an elementary abelian group of order pn forsome prime p. There is a cyclic fixed point free automorphism group of order kon G if and only if k | pn − 1.

Proof. See [10][Corollary 5.4].

Proposition 2.4 ([10]). Let Φ be a fixed point free automorphism group on theadditive group (N,+). Then the semi-direct product G = Φ:N is a Frobeniusgroup with complement Φ and kernel N .

Proof. See [10][Proposition 7.3].

3. Constructing the group G = 22r:(Z2r−1:Z2)

From our definition, a double Frobenius group is the result of a group action of aFrobenius group H on a finite group G. Our construction therefore begins here.We look for a Frobenius group H. Frobenius groups play an important role infinite group theory as point stabilizers of Zassenhaus groups (doubly transitivepermutation groups in which some non-identity element fixes two points butnone fixes three). They also appear frequently as maximal subgroups of thefinite simple groups.

We aim to construct double Frobenius groups using PSL(n, q) with n = 2and q even. For q even, PSL(2, q) has maximal subgroups which are Dihedralgroups of order 2(q − 1) or 2(q + 1), (see King [9]).

Since q is even, q − 1 is odd and hence, the maximal subgroup of order2(q − 1) is a Frobenius group due to the fact that the Dihedral group D2m isFrobenius if m is odd. Let q = 2r, 2 ≤ r ∈ N, then the Frobenius group D2(q−1)

has the form Z2r−1:Z2. Now for q even, PSL(2, q) ∼= SL(2, q) ≤ GL(2, q). Thenatural action of GL(2, q) on the elementary abelian group of order q2 impliesthat q2:(Z2r−1:Z2) ≤ q2:GL(2, q).

Therefore, (2r)2:(Z2r−1:Z2) ≤ (2r)2:GL(2, 2r). Since 2r − 1 divides 22r − 1(because 22r − 1 = 2r − 1 × 2r + 1), if 22r:Z2r−1 is a Frobenius group, then byProposition 2.4 and Lemma 2.3, 22r:(Z2r−1:Z2) is a double Frobenius group.

4. Fischer matrices and character table of 22r:(Z2r−1:Z2)

In this section we shall determine the conjugacy classes, Fischer matrices andcharacter table of the double Frobenius group 22r:(Z2r−1:Z2). We give a generaldescription of the conjugacy classes, Fischer matrices and character table of thegroup.

Let G = GNH be a double Frobenius group with GN and NH Frobeniusgroups. Consider now the double Frobenius group 22r:(Z2r−1:Z2). Let G =GNH = 22r:(Z2r−1:Z2). Then, G ∼= 22r, N ∼= Z2r−1 and H ∼= Z2.

Page 592: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

578 J. MOORI and P. PERUMAL

5. The group H = Z2r−1:Z2

We will first determine the conjugacy classes of the Frobenius group H =Z2r−1:Z2.

5.1 Conjugacy classes of H

We know that Z2r−1:Z2 is a Frobenius group with kernel N = ⟨a⟩ ∼= Z2r−1 andcomplement H = ⟨b⟩ ∼= Z2. Since H acts on N with fixed point free action,

we have that the number of non-trivial orbits of H on N is given by α = |N |−1|H|

and the length of each orbit is given by |H|. Therefore, here the orbits of Z2 onZ2r−1 have lengths 1 and 2. Using the method of coset analysis, briefly describedin Section 2.1, we analyse the coset Nh for each h ∈ H and find the values ofk where k is the order of the stabilizer in N of h. The values of k can bedetermined from the action of H on N . Since this action is fixed point free,k = 2r − 1 for h = 1H and k = 1 for h = b.

For h = 1H , k = 2r − 1, f1 = 1 and fi = 2 ∀i ∈ 2, 3, . . . , α+ 1.For h = 1H , k = 2r − 1, f1 = 1 :∣∣CH(x)

∣∣ =(2r − 1)× 2

1= |H|.

So for f1 = 1, we have the identity class of H.For h = 1H , k = 2r − 1 , fi = 2 :∣∣CH(x)

∣∣ =(2r − 1)× 2

2= |N |.

So for fi = 2, we have a class of H containing x with (x) = 2r− 1. The sizeof the conjugacy class is∣∣[x]H

∣∣ =|H|∣∣CH(x)

∣∣ =(2r − 1)× 2

2r − 1= 2.

Note that there are 2r−22 = 2r−1 − 1 such classes in NH.

For h = b we have k = 1, f = 1 :∣∣CH(x)∣∣ =

1× 2

1= 2.

Therefore, ∣∣[x]H∣∣ =

|H|∣∣CH(x)∣∣ =

(2r − 1)× 2

2= 2r − 1.

So, for the coset Nb there is a unique involutary class of H containing h.From the above we deduce that there are 1+(2r−1−1)+1 = 2r−1+1 classes

in H. This number can be confirmed by (6) in section 2.4, since H = Z2r−1:Z2

and we have that

c(H) = c(H) + α = c(H) +c(N)− 1

|H|= 2 +

2r − 2

2= 2r−1 + 1.

The full list of conjugacy classes based on coset analysis is given in Table 1.

Page 593: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE DOUBLE FROBENIUS GROUP OF THE FORM 22r:(Z2r−1:Z2) 579

Table 1: Conjugacy Classes of H

H H = NH (h)∣∣CNH(h)

∣∣1H 1 1 (2r − 1)2

(2r − 1)A1 c1 2r − 1...

......

......

...(2r − 1)Aα cα 2r − 1

b 2A 2 2

Note: Table notes1. (2r − 1)Ai is the conjugacy class containing elements of order 2r − 1.2. (2A) is the conjugacy class containing elements of order 2 using thenotation of the ATLAS.3. Also here H = ⟨b⟩ and ci for 1 = 1, 2, ..., α divides the order of N = 2r − 1.

5.2 Character Table of H

We obtain here a general description of the character table of the Frobeniusgroup H. To construct the character table we will use the results (7-11) listedin section 2.4 above and the following:

1. The irreducible characters of H with kernel containing N are χ1 and χ2

of degree 1 and those induced from non-trivial irreducible characters of Nare χ3, χ4, . . . , χ2+α of degree 2 (see table below).

2.

ψH(aj) =∣∣CH(aj)

∣∣ m∑i=1

ϕ(xi)∣∣CN (xi)∣∣ ,

where ϕ ∈ Irr(N), [aj ] is the conjugacy class of H containing aj andx1, x2, . . . , xm are class representatives for the classes of N that fuse to [aj ].

Since∣∣CH(aj)

∣∣ = 2r−1 and∣∣CN (xi)

∣∣ = |N | = 2r−1, ϕH(aj) =∑m

i=1 ϕ(xi).The sum on the right hand side are the orbit sums of the action of H onN.

3. We know that Z2 acts fixed point free on Z2r−1, the number of non-trivial

orbits is given by α = |N |−1|H| = 2r−1 − 1 and the length of each orbit is

given by |H| = 2. Also, since H is dihedral, the action of Z2 on Z2r−1 isgiven by baib−1 = a−i.

The orbits are: Θj = ai, a−i for j = 1, 2, . . . , α and i = 1, 2, . . . , α.

4. Now let pj =∑2

i=1 ϕ(xi) =[cj(i, 1)

], for j = 2, 3, . . . , α, then pj = ϕ(xi)+

ϕ(x−1i ).

Page 594: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

580 J. MOORI and P. PERUMAL

So pj = ϕ(xi) + ϕ(xi) = 2t, where t is the real part of exp( 2πi2r−1).

The following table gives the partial character table of H, namely the valuesof the induced characters of degree 2, χ3, χ4, . . . χ2+α, on classes

((2r−1)Ai , i =

1, 2, . . . , α), where pj =

∑2j=1 tj = 2tj and tj = exp

(2πi2r−1

).

(2r − 1)A1 (2r − 1)A2 (2r − 1)A3 . . . . . . . . . (2r − 1)Aαχ3 p1 p2 p3 . . . . . . . . . pαχ4 p2 p3 p4 . . . . . . . . . pα−1...

......

......

...

χ2+α pα pα−1 pα−2 . . . . . . . . . p1

We now produce the character tables of Z2, Z2r−1 and the Frobenius groupH in Tables 2, 3 and 4 respectively.

Table 2: Character Table of Z2

Classes e b

χ1 1 1χ2 1 −1

Table 3: Character Table of Z2r−1

Classes e a a2 . . . . . . a2r−2

ϕ1 1 1 1 1 1 1ϕ2 1 p p2 . . . . . . p2

r−2

......

......

ϕ2r−1 1 p2r−2 p2

r−3 . . . . . . p

Note:Table note: p = e2πi

2r−1

Remark 5.1. For n ∈ PSL(2, q) ∼= SL(2, q), q even (q = 2r), let n =

(λ 00 λ−1

),

where λ ∈ F∗q and (λ) = q − 1. Then there exists an involution

(1 00 1

)=

b =

(x yz t

)for x, y, z, t ∈ Fq such that bnb−1 = n−1 and ⟨n, b⟩ ∼= Z2r−1 : Z2.

For b =

(x yz t

), the following conditions apply:

Page 595: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE DOUBLE FROBENIUS GROUP OF THE FORM 22r:(Z2r−1:Z2) 581

Table 4: Character Table of H = NH

(g) (1) (2r − 1)A1 . . . . . . . . . (2r − 1)Aα (2A)

|CH(g)| (2r − 1)2 2r − 1 . . . . . . . . . . . . 2r − 1 2

χ1 1 1 . . . . . . . . . . . . 1 1χ2 1 1 . . . . . . . . . . . . 1 −1

χ3 2 p1 . . . . . . . . . . . . pα 0χ4 2 p2 . . . . . . . . . . . . pα−1 0...

...... . . . . . . . . . . . .

......

χ2+α 2 pα . . . . . . . . . . . . p1 0

Note: Table note: pj =∑2

j=1 tj = 2tj where tj = exp(

2πi2r−1

).

• xt− yz = 1 . . . . . . . . . (1)

• b2 =

(x2 + yz xy + ytxz + zt yz + t2

)=

(1 00 1

). . . . . . . . . (2)

• bnb−1 =

(λ−1 0

0 λ

). . . . . . . . . (3)

From equation (2) above , we have that:

• x2 + yz = 1 . . . . . . . . . (4)

• xy + yt = 0 . . . . . . . . . (5)

• xz + zt = 0 . . . . . . . . . (6)

• zy + t2 = 1 . . . . . . . . . (7)

From equation (5) above, we have that y(x + t) = 0 and that y = 0 orx + t = 0. Similarly from equation (6), we have z(x + t) = 0 and z = 0 orx+ t = 0. From these two equations we have the following six cases to consider.

• Case 1: y = 0 and x+ t = 0.

• Case 2: z = 0 and x+ t = 0.

• Case 3: y = z = 0.

• Case 4: y = 0.

• Case 5: z = 0.

• Case 6: x+ t = 0.

Page 596: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

582 J. MOORI and P. PERUMAL

We now consider each case:

1. Case 1: y = 0 and x+ t = 0. If x+ t = 0 then x = −t = t since in primefield F2,−1 ≡ 1. Now y = 0 implies by equation (4) that x2 = 1 and x = 1.

This gives us b =

(1 0z 1

).

Now bnb−1 = n−1 implies that

(1 0z 1

)(λ 00 λ−1

)(1 0z 1

)=

(λ−1 0

0 λ

).

So,

(λ 0

zλ+ zλ−1 λ−1

)=

(λ−1 0

0 λ

). Therefore, we must have

zλ+ zλ−1 = 0 and

z(λ + λ−1) = 0 implies z = 0 since λ + λ−1 = 0 implies that (λ) = 2which we can not have.

Hence, this gives b =

(1 00 1

), a contradiction.

2. Case 2: z = 0 and x + t = 0. Just as in Case 1 above we arrive at the

conclusion that b =

(1 00 1

), a contradiction.

3. Case 3: If y = z = 0, then as in Cases 1 and 2 above, we get b =

(1 00 1

),

a contradiction.

4. Case 4: If y = 0 then equation (4) implies that x = 1. So b has the form(1 0z 1

). This case is similar to Case 1 above and we get: b =

(1 00 1

),

a contradiction.

5. Case 5: z = 0 gives us a similar conclusion as in Case 4 above where we

get b =

(1 00 1

), a contradiction.

6. Case 6: If x + t = 0, then x = t. There are two cases to consider here:(i)x = t = 0 and (ii)x = t = 0.

If x = t = 0 , then b has the form

(x yz x

). Then for n =

(λ 00 λ−1

)and λ = 0, bnb−1 = n−1 gives:(

x yz x

) (λ 00 λ−1

) (x yz x

)=

(λ−1 0

0 λ

).

So, (x2λ+ zyλ−1 xyλ+ xyλ−1

xzλ+ xzλ−1 yzλ+ x2λ−1

)=

(λ−1 0

0 λ

).

Page 597: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE DOUBLE FROBENIUS GROUP OF THE FORM 22r:(Z2r−1:Z2) 583

So, this gives us the following: xyλ + xyλ−1 = 0 . . . . . . . . . (8). Thenxy(λ+λ−1) = 0 and λ+λ−1 = 0 or xy = 0. If λ+λ−1 = 0, then λ = λ−1

and (λ) = 2 which is not possible since λ is an element in a cyclic groupof odd order. Therefore, xy = 0 and since x = 0, y = 0. Similarly usingthe equation xzλ + xzλ−1 = 0, we arrive at the conclusion z = 0. So forthis first case x = t = 0 implies that y = z = 0 and equation (1) gives

x = 1. Hence, b =

(1 00 1

), a contradiction. For the second case, if

x + t = 0 and x = t = 0, then equations (1) and (4) implies that yz = 1.

Thus, b has the form

(0 yz 0

).

Then z = y−1 and b =

(0 λi

λ−i 0

)for λi ∈ F∗

q .

Before describing the conjugacy classes of the double Frobenius group22r:(Z2r−1:Z2), we make the following Note.

Note 5.2. 1. |PSL(2, q)| = q3 − q if q is even.

2. If q is even, then PSL(2, q) ∼= SL(2, q).

3. The group SL(2, q), q = 2t, t ≥ 1 has q + 1 distinct conjugacy classes.These classes are described in the Table 5.

Table 5: Conjugacy Classes of SL(2, q), q even.

Class T (1) T (2) T (3) T (4)

Rep. of Class

(1 00 1

) (1 10 1

) (α 00 α−1

) (0 11 r + rq

)No. of Classes 1 1 q−2

2q2

|CSL(2,2t)(g)| q3 − q q q − 1 q + 1

|Cg| 1 q2 − 1 q(q + 1) q(q − 1)

Note: Table notes;1. α ∈ F∗

q , α = ϵk, k = 0

2. F∗q2 = ⟨θ⟩ and r = θ(q−1)j for j = 1, 2, . . . , q2 .

6. Conjugacy classes of 22r:(Z2r−1:Z2)

We determine now the conjugacy classes of the double Frobenius group G =GNH = G:NH where N = ⟨a⟩ ∼= Z2r−1 and H = ⟨b⟩ ∼= Z2.

To determine the conjugacy classes of G, we consider the cosets hG whereh ∈ NH = H.

Page 598: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

584 J. MOORI and P. PERUMAL

The coset 1G :Now for h = 1H , the identity of H, h fixes all elements of G so k = 22r. We

now act the centralizer of h = 1H , CH(h) = H on G.Now let nh ∈ H = NH for 1H = n ∈ N, 1H = h ∈ H. Then for g ∈ G,

gnh = nhgh−1n−1 = n(hgh−1)n−1 = n(gh)n−1 = (gh)n.Therefore to act H on G, we act h ∈ H first and then act n ∈ N .Now Z2r−1:Z2 ≤ PSL(2, 2r) ∼= SL(2, 2r) ≤ GL(2, 2r) and H = ⟨b⟩ where b

is an involution in PSL(2, 2r). The group SL(2, q), q even, (q = 2r , r ≥ 1) hasq+ 1 distinct conjugacy classes. Of these q+ 1 classes there is only one class ofinvolutions. The size of this class is q2 − 1 and for any involution b ∈ SL(2, q),

b has the form

(0 yz 0

), where x, z ∈ F∗

q . See the Note 5.2.

Now G ∼= V2(Fq), the vector space of dimension two over the field of q = 2r

elements. So G = 0, λie1, λje2, (λie1 + λje2) for i, j = 0, 1, 2, . . . , q − 2,where λi, λj ∈ F∗

q , and e1, e2 is a basis of G, with e21 = 1, e22 = 1. So in the

action of H on G, we look at the action of b =

(0 yz 0

)on the elements of

G ∼= 22r = 0, λie1, λje2, (λie1 + λje2) followed by the action of N on theseorbits (the orbits of b on G).

Now H acts on the 22r elements of G fixing (including the identity) 2r

elements and permuting the remaining 22r − 2r elements in orbits of lengthtwo. So the elements of G are now in 22r−2r

2 orbits of length two plus the 2r

fixed points. Acting N on these 2r fixed points and the 22r−2r

2 orbits gives thefollowing:

1. Each of the (2r − 1) (identity excluded) fixed points fuses with 2r−22 =

2r−1 − 1 of the two cycles to form an orbit of size (2r − 1). There are(2r − 1) of these orbits.

2. The remaining 22r − (2r − 1)(2r − 1) + 1 = 2(2r) − 2 elements fuse toform an orbit of size 2(2r − 1).

So the action of CH(h) = H on G, gives the following: one orbit of lengthone, one orbit of length 2(2r − 1) and (2r − 1) orbits of length (2r − 1).

Therefore we have: k = 22r and f1 = 1, fi = 2r − 1 for i = 2, 3, . . . , 2r − 1and f2r+1 = 2(2r − 1).

k = 22r, f1 = 1 :

∣∣CG(x)∣∣ =

k × |CH(1H)|f1

=22r × (2r − 1)× 2

1= |G|,

∣∣[x]G∣∣ =

|G|∣∣CG(x)∣∣ =

22r × (2r − 1)× 2

22r × (2r − 1)× 2= 1.

So for f1 = 1 we have the identity class of G.

Page 599: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE DOUBLE FROBENIUS GROUP OF THE FORM 22r:(Z2r−1:Z2) 585

k = 22r, fi = 2r − 1 for i = 2, 3, . . . , 2r − 1.

∣∣CG(x)∣∣ =

k × |CH(1H)|fi

=22r × (2r − 1)× 2

2r − 1= 2× 22r,

∣∣[x]G∣∣ =

|G|∣∣CG(x)∣∣ =

22r × (2r − 1)× 2

2× 22r= 2r − 1.

k = 22r, fi = 2(2r − 1) :

∣∣CG(x)∣∣ =

k × |CH(1H)|fi

=22r × (2r − 1)× 2

2× (2r − 1)= 22r,

∣∣[x]G∣∣ =

|G|∣∣CG(x)∣∣ =

22r × (2r − 1)× 2

22r= 2× (2r − 1).

Therefore the identity coset 1G produces the following conjugacy classes ofG = 22r:(Z2r−1:Z2): the identity conjugacy class, one class of size 2(2r − 1) and(2r − 1) classes of size (2r − 1). The order of the non -identity elements in allthe classes from the identity coset is two.

The coset bG :When G acts on the coset bG, it partitions the coset into 2r orbits of size 2r.

The 2r orbits of the action of G on the coset bG consists of the orbit containingb, and (2r−1) remaining orbits each containing bλie1 for i = 0, 1, . . . , q−2 whereq = 2r. The orbit containing b also contains bλi(e1 + e2) for i = 0, 1, . . . , q − 2.Each of the orbits containing bλie1 also contain bλie2 for i = 0, 1, . . . , q − 2 anda two cycle (λie1 + λje2) , (λje1 + λie2) for i = j and i, j = 0, 1, . . . , q − 2.

We now act the centralizer of b ∈ H, CH(b) on these 2r orbits. SinceCH(b) = ⟨b⟩, the action of the centralizer is just the action of ⟨b⟩.

When b acts on G, it fixes zero and each λi(e1 + e2) for i = 0, 1, . . . , q − 2

and permutes the remaining 22r − 2r elements of G into 22r−2r

2 orbits of length

two. These 22r−2r

2 orbits are of the form (λie1 , λie2) for i = 0, 1, . . . , q − 2 and

(λie1 + λje2) , (λje1 + λie2) for i = j and i, j = 0, 1, . . . , q − 2.This implies that when ⟨b⟩ = CH(b) acts on the 2r orbits, it permutes the

elements in each of the 2r orbits.

k = 2r, fi = 1 for i = 1, 2, . . . , 2r :

∣∣CG(x)∣∣ =

k × |CH(b)|fi

=2r × 2

1= 2× 2r,

∣∣[x]G∣∣ =

|G|∣∣CG(x)∣∣ =

22r × (2r − 1)× 2

2× 2r= 2r × (2r − 1).

Therefore, the coset bG produces 2r conjugacy classes of G each of size2r(2r − 1). We determine now the orders of the elements in these 2r conjugacy

Page 600: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

586 J. MOORI and P. PERUMAL

classes. Using the result for element orders in the group G = G:H, where G isan elementary 2-group, we have that ω = ggb for g ∈ G, b ∈ H. Now if ω = 1,then g−1 = g = gb since (g) = 2. Therefore, if b fixes g ∈ G, then (g) = 2for gb = g ∈ G. If ω = 1, then (g) = 4. Since the conjugacy class containingb is the class that has the fixed points, from the discussion above the order ofthe elements in this class is two (as would be expected since the class has theelement b in it). The order of the elements in the remaining (2r − 1) conjugacyclasses is four.

The coset aiG : for i = 1, 2, . . . ,m where m is the number of non-trivialorbits of the action of H on N . Now the action of G on the coset aiG fori = 1, 2, . . . ,m produces a single orbit of length 22r. The centralizer of ai ∈N , CH(ai) = ⟨ai⟩ acts fixed point free on the orbit permuting the elementsin the orbit. Therefore, for each ai ∈ N for i = 1, 2, . . . ,m, there is a singleconjugacy class of G. There are m such classes.

k = 1, f = 1 :

∣∣CG(x)∣∣ =

k × |CH(a)|fi

=1× (2r − 1)

1= 2r − 1,

∣∣[x]G∣∣ =

|G|∣∣CG(x)∣∣ =

22r × (2r − 1)× 2

2r − 1= 2× 22r.

The coset aiG, produces a single conjugacy class of G of size 2(22r). Theorder of the elements in the class is 2r − 1.

Note 6.1. From the discussion above we can determine the number of conjugacyclasses of G. The classes produced by the identity coset are the identity class,(2r − 1) classes of size (2r − 1) and one class of size 2(2r − 1). The coset bGproduces 2r classes of size 2r(2r − 1). Each of the cosets aiG for i = 1, 2, . . . ,m

where m = |N |−1H = 2r−2

2 = 2r−1 − 1 is the number of non-trivial orbits of H onN produces a single conjugacy class of size 2(22r). There are m such classes.

c(G) =(1 + 2r − 1 + 1

)+(2r)

+(2r−1 − 1

)= 2× 2r + 2r−1 = 2r+1 + 2r−1.

The full list of conjugacy classes based on coset analysis is given in Table 6.The following Proposition and Remark will be used to construct the Fischer

matrices of the double Frobenius group 22r:(Z2r−1:Z2).

Proposition 6.2 ([15]). If G is elementary abelian and M = Im(ϕg) where ϕgis an endomorphism of G defined by ϕg : x 7→ xgx−1g−1 for x ∈ G, then [G :M ] = k where k is the number of elements of G fixed by a class representativeh ∈ H where G = G : H.

Proof. The orbits Q1, Q2, . . . , Qk of G acting on hG are the same as the or-bits D1, D2, . . . , Dk of M acting on hG by left multiplication. Also the orbitsD1, D2, . . . , Dk can be identified with the elements of G/M. Then it follows thatG/M = [G : M ] = k.

Page 601: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE DOUBLE FROBENIUS GROUP OF THE FORM 22r:(Z2r−1:Z2) 587

Table 6: Conjugacy Classes of G = G:(NH)

H = NH G = G:(NH) (g) |[g]|∣∣CG(g)

∣∣1 1 1 1 22r(2r − 1)2

(2A)1 2 2r − 1 2(22r)(2A)2 2 2r − 1 2(22r)

......

......

......

......

......

......

(2A)2r−1 2 2r − 1 2(22r)(2A)2r+1 2 2(2r − 1) 22r

b (2B) 2 2r(2r − 1) 2(2r)(4A)1 4 2r(2r − 1) 2(2r)(4A)2 4 2r(2r − 1) 2(2r)

......

......

......

......

......

......

(4A)2r−1 4 2r(2r − 1) 2(2r)

a1 (2r − 1)A1 c1 2(22r) 2r − 1a2 (2r − 1)A2 c2 2(22r) 2r − 1...

......

......

......

......

......

......

......

am (2r − 1)Am cα 2(22r) 2r − 1

Remark 6.3. If G is an elementary abelian p-group, then from coset analysisfor the group G = G:H, we obtain k = pm for 0 ≤ m ≤ n, where |G| = pn and kis the number of elements of G fixed by a class representative h of H. Supposefor some class representative h ∈ H, we have the orbits Q1, Q2, . . . , Qk of theaction of G on hG. Then for h ∈ CH(h), suppose that acting h on the orbitsQ1, Q2, . . . , Qk, we get f1 = f2 = . . . = fk = 1 and that the entries of the firstcolumn of M(h) are 1. Then in this case, the Fischer matrix M(h) coincideswith the character table of the abelian group G/M of order k = pm.

7. Fischer matrices of 22r:(Z2r−1:Z2)

In this section we will give a general description of the number of Fischer ma-trices and their form for the double Frobenius group G = 22r:(Z2r−1:Z2). For

Page 602: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

588 J. MOORI and P. PERUMAL

each conjugacy class of H there is a corresponding Fischer matrix. Thereforethere are 2r−1 + 1 such matrices. The action of H on G produces 2r + 1 orbits.The Fischer matrix M(1H) corresponding to the identity coset is therefore a((2r + 1) × (2r + 1)

)matrix. Since the action of H of G has 2r + 1 orbits, by

Brauer’s Lemma the action of H on Irr(G) has 2r + 1 orbits also. The lengthsof the orbits are 1, (2r − 1) and 2(2r − 1). The number of orbits of each lengthis 1, (2r − 1) and 1 respectively. We can show that the orbits of the action ofH on Irr(G) also has lengths 1, (2r − 1) and 2(2r − 1) and that the number oforbits is also 1, (2r − 1) and 1 respectively. Now when H acts on Irr(G), thepossibilities for orbit lengths are: 1, 2, (2r − 1) and 2(2r − 1). Let the numberof orbits of length one be a, the number of orbits of length two be b, the numberof orbits of length 2r − 1 be c and the number of orbits of length 2(2r − 1) be d.Then

a+ b+ c+ d = 2r + 1 · · · · · · (1)

and

a+ 2b+ (2r − 1)c+ 2(2r − 1)d = 22r · · · · · · (2).

where a, b, c, d ∈ N.We find values for a, b, c, d. Note first that we can assume that r ≥ 2 in

equations 1 and 2 above since r = 0 and r = 1 give trivial cases for the doubleFrobenius group 22r : (Z2r−1 : Z2).

We know that a ≥ 1 since the action of H on Irr(G) fixes the identitycharacter. We claim that a = 1. So suppose that a > 1. Then equation (2)implies that (a − 1) + 2b + c(2r − 1) + 2d(2r − 1) = 22r − 1 · · · · · · (3). So,(a− 1) + 2b+ c(2r − 1) + 2d(2r − 1) = (2r − 1)(2r + 1) · · · · · · (4). Since 2r − 1divides the right hand side of equation (4), it must divide the left hand side also.Therefore, 2r − 1 divides (a− 1) + 2b. So (2r − 1)α = a− 1 + b for some α ∈ N.From this equation we get a+ b = α2r − α+ 1. Substituting this into equation(1) above gives c+ d = 2r(1− α) + α · · · · · · (5). Since r ≥ 2, and a, b, c, d ∈ N,equation (5) will only be true if α = 0 or α = 1.α = 0:

Then a + b = 1 and since a = 0, b = 0 and a = 1. This is a contradictionsince a > 1.α = 1:

Then a+b = 2r and c+d = 1. Therefore there are two cases to consider:(i) c =0 and d = 1 (ii) c = 1 and d = 0.

If c = 0 and d = 1, then equation (2) implies that a + 2b + 2(2r − 1) = 22r

and hence 2r + b+ 2(2r − 1) = 22r after substituting for a = 2r − b. This gives22r = b− 2 + 2r + 2.2r · · · · · · (6). Now 2r divides the left hand side of equation(6) and must divide the right hand side also. Therefore, 2r divides b − 2 andb = 2rγ + 2 for some γ ∈ N. This is a contradiction since b < 2r.

If d = 0 and c = 1, then equation(2) implies that a + 2b + 2r − 1 = 22r

and hence 2r + b + 2r − 1 = 22r after substituting for a = 2r − b. This gives22r = b−1+2.2r · · · · · · (7). Now 2r divides the left hand side of equation(7) and

Page 603: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE DOUBLE FROBENIUS GROUP OF THE FORM 22r:(Z2r−1:Z2) 589

must divide the right hand side also. Therefore, 2r divides b− 1 and b = 2rδ+ 1for some δ ∈ N. This is a contradiction since b < 2r.

Therefore, a = 1 as claimed. With a = 1, from equation (1) we now havethat b+c+d = 2r and from equation (2) we have that 2b+(2r−1)c+2(2r−1)d =(2r−1)(2r +1). Since 2r−1 divides the right hand side of this equation, it mustdivide the left hand side. This implies that 2r − 1 divides 2b. Since 2r − 1 isodd, 2r − 1 must divide b. Thus, we have (2r − 1)ϵ = b for some ϵ ∈ N. Fromequation (1), a+ b+ c+ d = 2r + 1 which implies that b+ c+ d = 2r and hencethat b ≤ 2r. So, (2r − 1)ϵ ≤ 2r and since r ≥ 2, this inequality is true only ifϵ = 0 or ϵ = 1.

If ϵ = 1, then b = 2r − 1 and equation (1) now implies that c+ d = 1. Thereare two cases to consider.

c = 0 , d = 1:Equation (2) now implies that 2(2r − 1) + 0 + 2(2r − 1) = (2r + 1)(2r − 1),

which gives us 4 = 2r + 1 which is false.

c = 1 , d = 0:Equation (2) now implies that 2(2r − 1) + 2r − 1 = (2r + 1)(2r − 1) and

3 = 2r + 1 which is false for r ≥ 2.Thus we must have ϵ = 0 and hence b = 0.With a = 1 and b = 0, equation (1) and equation (2) now give c + d = 2r

and c+ 2d = 2r + 1 respectively. Solving gives us d = 1 and c = 2r − 1.Therefore a = 1 = d, b = 0 and c = 2r. Therefore, when H acts on Irr(G),

there is one orbit of length one, 2r − 1 orbits of length 2r − 1 and one orbitof length 2(2r − 1). This is the same number of orbits and orbit lengths as theaction of H on G.

7.1 The Inertia groups and inertia factor groups of 22r:(Z2r−1:Z2)

Using the results of the section above, we can give a general description ofthe inertia groups and inertia factor groups for the double Frobenius group22r:(Z2r−1:Z2).

Now denote the inertia groups by P and the inertia factor groups by P. Sincethe action of H on the Irr(G) has orbit lengths 1, (2r−1), 2(2r−1), the inertiagroups are:P 1 = G = 22r:(Z2r−1:Z2) , P 2 = P 3 = · · · = P 2r = G:H = 22r:Z2 , P 2r+1 =G = 22r.

The inertia factor groups are:

P1 = H = Z2r−1 : Z2 , P2 = P3 = · · · = P2r = H = Z2 , P2r+1 = 1H.

7.2 Fischer matrices

There are (2r + 1) Fischer matrices, namely, M(1H), M(b) and M(ai) for i =1, 2, · · · · · · ,m where m = 2r−1 − 1 is the number of non-trivial orbits of theaction of H on N.

Page 604: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

590 J. MOORI and P. PERUMAL

M(1H) :

This is a((2r + 1) × (2r + 1)

)matrix. The first row of the matrix is a row

of 1’s. The first column of the matrix consists of the (2r + 1) entries:(1, 2r −

1, 2r−1, · · · · · · · · · , 2r−1, 2(2r−1))t. There are (2r−1) entries of (2r−1). The

last column of the matrix consists of the entries(1, −1, −1, · · · · · · · · · , 2r− 2

)t.

There are (2r − 1) entries of −1. The last row of the matrix consists of theentries

(2(2r − 1), −2, −2, · · · · · · · · · , 2r − 2

). The remainder of the matrix

is a(2r − 1 × 2r − 1

)block whose rows are just a permutation of the entries(

2r − 1, −1, −1, · · · · · · · · · ,−1). This is the block denoted by X X X in the

Fischer matrix shown below.

M(1H) =

1 1 1 . . . . . . 1 1

2r − 1 −12r − 1 −1· · · · · ·· · · X X X X · · ·· · · · · ·

2r − 1 −1

2(2r − 1) −2 −2 . . . . . . −2 2r − 2

M(b) :

This is a(2r×2r

)matrix. By Remark 6.3, the Fischer matrix corresponding

to b ∈ H coincides with the character table of the elementary abelian group oforder k = 2m where k is number of fixed points of the action of b on G.

M(b) =

Character Table ofelementary abelian group

of order 2m

M(ai) :

These are just singleton matrices with entry 1 of which there are m = 2r−1−1in number.

8. Example-the group 24:(Z3:Z2)

In this section we apply the theory developed in section 4 to the group G =24:(Z3:Z2. Let G = GNH where G ∼= 22r, N ∼= Z2r−1, H ∼= Z2 and NH ∼= H.Let r = 2, then G ∼= 24, N ∼= Z3 = ⟨a⟩, H ∼= Z2 = ⟨b⟩ and NH ∼= H ∼= Z3:Z2.We know that Z3:Z2 ≤ PSL(2, 4) ∼= SL(2, 4). We note also that PSL(2, 4) hasa single class of involutions and a single class of elements of order three. Now

o(b) = 2, b =

(0 11 0

)and a =

(λ 00 λ−1

)where ⟨λ⟩ = F∗

4, (a) = 3.

Page 605: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE DOUBLE FROBENIUS GROUP OF THE FORM 22r:(Z2r−1:Z2) 591

G = 0, e1, e2, (e1 + e2), λe1, λe2, λ2e1, λ

2e2, λ(e1 + e2), λ2(e1 +

e2), λe1 + e2, λ2e1 + e2, e1 + λe2, e1 + λ2e2, λ

2e1 + λe2, λe1 + λ2e2 andGF (4) = 0, 1, λ, λ2.

Now, we have that

(0 11 0

) (10

)=

(01

)and(

0 11 0

) (01

)=

(10

), so be1 = e2 and be2 = e1.

8.1 Conjugacy classes of G = 24:(Z3:Z2)

To calculate the conjugacy classes of G, we need the conjugacy classes of thegroup H = Z3:Z2. The conjugacy classes of H are represented in Table 7.

Conjugacy classes of : H = Z3:Z2.

Table 7: Conjugacy Classes of Z3:Z2

classes of Z3:Z2 [1] [b] [a]∣∣CG(g)∣∣ 6 2 3

(g) 1 2 3

|[g]| 1 3 2

To calculate the conjugacy classes of G we use the method of coset analysis.

Conjugacy classes of : G = 24:(Z3:Z2).

To determine the conjugacy classes of G = 24:(Z3:Z2), we consider the cosetshG where h ∈ H = Z3:Z2.

The coset 1G: Now for h = 1H , the identity of H, h fixes all elements ofG so k = 24. We now act the centralizer of h = 1H , CH(1H) = H on G.

To act H on G, we first act b ∈ Z2 and then act a ∈ Z3.

The action of b on G:

In this action, b fixes 0, (e1 + e2), λ(e1 + e2), λ2(e1 + e2) and permutes

the remaining 12 elements in the following 2 cycles:

e1, e2, λe1, λe2, λ2e1, λ2e2, (λe1 + e2), (e1 + λe2), (λ2e1 +e2), (e1 + λ2e2, (λ2e1 + λe2), (λe1 + λ2e2.

Now acting a ∈ Z3 on the 4 fixed points of b and the six 2 cycles we get:

a fixes the zero vector of G and when it acts on the orbits of b, each fixedpoint λi(e1 + e2) for i = 0, 1, 2 fuses with a 2 cycle to form an orbit of sizethree as follows:

Θ1 = (e1 + e2), (λ2e1 + λe2), (λe1 + λ2e2,

Θ2 = λ(e1 + e2), (λ2e1 + e2), (e1 + λ2e2),

Page 606: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

592 J. MOORI and P. PERUMAL

Θ3 = λ2(e1 + e2), (λe1 + e2), (e1 + λe2).

The remaining orbits come together under the action of a to form the orbitΘ4 of size six.

Θ4 = e1, e2, λe1, λe2, λ2e1, λ2e2.

Thus, the identity coset produces 5 orbits (conjugacy classes) of G, viz, thesingleton orbit containing the identity, three orbits of size three containing theremaining three fixed points, one in each orbit, and an orbit of size six.

Therefore we have:k = 24 and f1 = 1, f2 = 3, f3 = 3, f4 = 3, f5 = 6.k = 24, f1 = 1 :

∣∣CG(x)∣∣ =

k × |CH(1H)|f1

=24 × 6

1= |G|,

∣∣[x]G∣∣ =

|G|∣∣CG(x)∣∣ =

24 × 6

24 × 6= 1.

So for f1 = 1 we have the identity class of G.

k = 24, fi = 3 : for i = 2, 3, 4

∣∣CG(x)∣∣ =

k × |CH(1H)|fi

=24 × 6

3= 32,

∣∣[x]G∣∣ =

|G|∣∣CG(x)∣∣ =

24 × 6

32= 3.

This will give us three conjugacy classes of G of size three. The order of theelements in all three classes is two.

k = 24, f5 = 6 :

∣∣CG(x)∣∣ =

k × |CH(1H)|f5

=24 × 6

6= 16,

∣∣[x]G∣∣ =

|G|∣∣CG(x)∣∣ =

24 × 6

16= 6.

This gives us a fifth conjugacy class from the identity coset of G of size six.The order of the elements in this class is two.

The coset bG :

First we act G on the coset bG. The action of G on the coset bG partitionsthe coset into four orbits of size four. The orbits are:

∆1 = b, b(e1 + e2), bλ(e1 + e2), bλ2(e1 + e2),

∆2 = be1, be2, b(λe1 + λ2e2), b(λ2e1 + λe2),

Page 607: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE DOUBLE FROBENIUS GROUP OF THE FORM 22r:(Z2r−1:Z2) 593

∆3 = bλe1, bλe2, b(λ2e1 + e2), b(e1 + λ2e2),

∆4 = bλ2e1, bλ2e2, b(e1 + λe2), b(λe1 + e2).

We also note that in the orbit ∆1 the g entry of the element bg where g ∈ Gis the fixed point of the action of b on G, and in the orbits ∆i for i = 2, 3, 4, theg entries of the element bg where g ∈ G are the entries of the two cycles of theaction of b on G. See the action of b on G above.

Next, we act the centralizer of b on the four orbits ∆i for i = 1, 2, 3, 4. NowCH(b) = ⟨b⟩. Therefore the action of the centralizer is the same as the action ofb. From the comment above, when b acts on the four orbits ∆i for i = 1, 2, 3, 4,it permutes the elements in each orbit. Therefore for the coset bG we have k = 4and fi = 1 for i = 1, 2, 3, 4.

k = 4, fi = 1 for i = 1, 2, 3, 4 :

∣∣CG(x)∣∣ =

k × |CH(b)|fi

=4× 2

1= 8,

∣∣[x]G∣∣ =

|G|∣∣CG(x)∣∣ =

24 × 6

8= 12.

Therefore, the coset bG produces four conjugacy classes of G each of sizetwelve. The order of the elements in the first of these classes is two (the classcontaining b) and the order of the elements in the remaining three classes isfour.

The coset aG :

Finally we act G on the coset aG. When G acts on the coset aG, it simplypermutes the 16 elements in the coset producing an orbit of length sixteen.Next we act the centralizer of a on this orbit. But CH(a) = ⟨a⟩. Therefore theaction of the centralizer is the same as the action of ⟨a⟩. When ⟨a⟩ acts on theorbit of length sixteen it permutes the elements in the orbit. Therefore, herek = 1, f = 1.

k = 1, f = 1 :

∣∣CG(x)∣∣ =

k × |CH(a)|fi

=1× 3

1= 3,

∣∣[x]G∣∣ =

|G|∣∣CG(x)∣∣ =

24 × 6

3= 32.

The coset aG, produces a single conjugacy class of G of size thirty two. Theorder of the elements in the class is three.

The full list of the conjugacy classes of G is described in Table 8.

Page 608: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

594 J. MOORI and P. PERUMAL

Table 8: Conjugacy Classes of G = 24:(Z3:Z2)

H = NH G = G : (NH) (g)∣∣CG(g)

∣∣ power map(π2) power map(π3)

1 1A 1 96 (1A) (1A)(2A) 2 32 (1A) (2A)(2B) 2 32 (1A) (2B)(2C) 2 32 (1A) (2C)(2D) 2 16 (1A) (2D)

b (2E) 2 8 (1A) (2E)(4A) 4 8 (2A) (4A)(4B) 4 8 (2B) (4B)(4C) 4 8 (2C) (4C)

a (3A) 3 3 (3A) (1A)

8.2 Fischer matrices of 24:(Z3:Z2).

We construct the Fischer matrices of G = 24:(Z3:Z2), for each conjugacy class ofH = Z3 : Z2. From the previous sections we know that there are three conjugacyclasses of H and therefore three Fischer matrices of G. For the Fischer matrixcorresponding to the identity class of Z3:Z2 we look at the action of H on G = 24.There are five orbits of lengths 1, 3, 3, 3, 6. The Fischer matrix correspondingto the identity class is M(1H) which is a (5× 5) matrix. Since the action of Hon G has five orbits of lengths 1, 3, 3, 3 and 6, we know that the action of Hon Irr(G) also produces five orbits of lengths 1, 3, 3, 3 and 6 as described inSection 7.

From Section 7.1 we have the following inertia and inertia factor groups.The inertia groups are:

P 1 = G = 24:(Z3:Z2) , P 2 = P 3 = P 4 = G:H = 24:Z2 , P 5 = G = 24.

The corresponding inertia factor groups are:

P1 = NH = Z3:Z2 , P2 = P3 = P4 = H = Z2 , P5 = 1H.

The Fischer matrices are constructed using the theory of the Fischer Cliffordmatrices. We refer the reader to [1], [2], [13], [15], [17] and [18] for details.

M(1H) :

M(1H) =

1 1 1 1 13 3 −1 −1 −13 −1 3 −1 −13 −1 −1 3 −16 −2 −2 −2 2

.

Page 609: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE DOUBLE FROBENIUS GROUP OF THE FORM 22r:(Z2r−1:Z2) 595

The matrix corresponding to b ∈ Z2 is a 4× 4 matrix M(b) given by:

M(b) =

1 1 1 11 1 −1 −11 −1 1 −11 −1 −1 1

.

Finally the third Fischer matrix is a (1× 1) matrix with the singleton entry1. This matrix M(a) is given by :M(a) = (1).

8.3 Character table of G = 24:(Z3:Z2)

We can now construct the character table of G using the Fischer matrices aboveand the character tables of the inertia factor groups P1 = H = Z3:Z2 andP2 = P3 = P4 = H = Z2.

We divide the character table of G into blocks as shown in the matrix below.Each block Ai, Bi, Ci for i = 1, 2, 3, 4, 5 corresponds to an inertia group P i. Alsothe Ai blocks for i = 1, 2, 3, 4, 5 come from the conjugacy classes produced bythe identity coset 1G, the Bi blocks for i = 1, 2, 3, 4, 5 come from the conjugacyclasses produced by the coset bG and the Ci blocks for i = 1, 2, 3, 4, 5 come theconjugacy classes produced by the coset aG.

A1 B1 C1

A2 B2 C2

A3 B3 C3

A4 B4 C4

A5 B5 C5

First we need the character tables of H = Z3:Z2 and H = Z2

Character table H :

(h) (1) (b) (a)

|CH(h)| 6 2 3

(h) 1 2 3

χ1 1 1 1χ2 1 −1 1χ3 2 0 −1

Character table H :

(h) (1) (b)

|CH(h)| 2 2

(h) 1 2

χ1 1 1χ2 1 −1

Page 610: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

596 J. MOORI and P. PERUMAL

We now calculate the characters of G, which fall into five blocks (Ai, for i =1, 2, 3, 4, 5) with inertia groups P 1 = G, P 2 = G:H, P 3 = G:H, P 4 =G:H, P 5 = G by using the Fischer matrices and inertia factor groups P1 =H, P2 = Z2, P3 = Z2, P4 = Z2, P5 = 1G.

We complete the character table of 24:(Z3:Z2) by multiplying rows of M(g)for g ∈ 1H , b, a with sections of the character tables of the inertia factorgroups corresponding to each g ∈ 1H , b, a.

The first block of table above A1 is the block corresponding to conjugacyclasses from the identity 1H . To obtain this block, we multiply the first column

C1 =

112

= 1st column of H by M1=(

1 1 1 1 1)= 1st row of M(1H).

We get: 112

(1 1 1 1 1

)=

1 1 1 1 11 1 1 1 12 2 2 2 2

.

For the A2 block, we multiply C2=

(11

)= 1st column of Z2 by M2 =(

3 3 −1 −1 −1)= 2nd row of M(1H). We get:(

11

) (3 3 −1 −1 −1

)=

(3 3 −1 −1 −13 3 −1 −1 −1

).

For the A3 block, we multiply C3=

(11

)= 1st column of Z2 by M3 =(

3 −1 3 −1 −1)= 3rd row of M(1H). We get:(

11

) (3 −1 3 −1 −1

)=

(3 −1 3 −1 −13 −1 3 −1 −1

).

For the A4 block, we multiply C4=

(11

)= 1st column of Z2 by M4 =(

3 −1 −1 3 −1)= 4th row of M(1H). We get:(

11

) (3 −1 −1 3 −1

)=

(3 −1 −1 3 −13 −1 −1 3 −1

).

For the A5 block, we multiply C5=(

1)= 1st column of 1G by M5 =(

6 −2 −2 −2 2)= 5th row of M(1H). We get:(

1) (

6 −2 −2 −2 2)

=(

6 −2 −2 −2 2).

For the next block, the Bi block for i = 1, 2, 3, 4, 5 of the character table ofG, we use the Fischer matrix M(b). To complete the B1 block of the table, we

Page 611: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE DOUBLE FROBENIUS GROUP OF THE FORM 22r:(Z2r−1:Z2) 597

multiply

1−1

0

=2nd column of H by(

1 1 1 1)= 1st row of M(b). We

get: 1−1

0

(1 1 1 1

)=

1 1 1 1−1 −1 −1 −1

0 0 0 0

.

For the B2 block of the table, we multiply

(1−1

)=2nd column of Z2 by(

1 1 −1 −1)= 2nd row of M(b). We get:(

1−1

) (1 1 −1 −1

)=

(1 1 −1 −1−1 −1 1 1

).

For the B3 block of the table, we multiply

(1−1

)=2nd column of Z2 by(

1 −1 1 −1)= 3rd row of M(b). We get:(

1−1

) (1 −1 1 −1

)=

(1 −1 1 −1−1 1 −1 1

).

For the B4 block of the table, we multiply

(1−1

)=2nd column of Z2 by(

1 −1 −1 1)= 4th row of M(b). We get:(

1−1

) (1 −1 −1 1

)=

(1 −1 −1 1−1 1 1 −1

).

For the B5 block of the table, we will have a row of zeros since P5∩

[b] = ∅and hence, M5(b) will not exist.

To complete the Ci block for i = 1, 2, 3, 4, 5 of the character table of G, weuse the Fischer matrix M(a) = 1G. To complete the C1 block of the table, we

multiply

11−1

=3rd column of H by(

1)= 1st row of M(a). We get:

11−1

(1)

=

11−1

.

For the Ci blocks for i = 2, 3, 4, 5, we have zeros since Pi∩

[a] = ∅ fori = 2, 3, 4, 5 and therefore Mi for i = 2, 3, 4, 5 does not exist.

Page 612: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

598 J. MOORI and P. PERUMAL

Character table of 24:(Z3:Z2) :

(g) (1A) (2A) (2B) (2C) (2D) (2E) (4A) (4B) (4C) (3A)

|[(g)]| 1 3 3 3 6 12 12 12 12 32

|CG(g)| 96 32 32 32 16 8 8 8 8 3

χ1 1 1 1 1 1 1 1 1 1 1χ2 1 1 1 1 1 −1 −1 −1 −1 1χ3 2 2 2 2 2 0 0 0 0 −1

χ4 3 3 −1 −1 −1 1 1 −1 −1 0χ5 3 3 −1 −1 −1 −1 −1 1 1 0

χ6 3 −1 3 −1 −1 1 −1 1 −1 0χ7 3 −1 3 −1 −1 −1 1 −1 1 0

χ8 3 −1 −1 3 −1 1 −1 −1 1 0χ9 3 −1 −1 3 −1 −1 1 1 −1 0

χ10 6 −2 −2 −2 2 0 0 0 0 0

Acknowledgements

The second author thanks his supervisor (first author) for his unwavering guid-ance and support. The financial support from the National Research Foundation(NRF) of South Africa, the North West University and the Durban Universityof Technology is also acknowledged.

References

[1] F. Ali and J. Moori, The Fischer-Clifford matrices of a maximal subgroupof F i24, Representation Theory, 7 (2003), 300-321.

[2] F. Ali, The Fischer-Clifford matrices of a maximal subgroup of the Sporadicsimple group of Held, Algebra Colloquium, 14 (2007), 135-142.

[3] J.H. Conway, R.T. Curtis, S.P. Norton, R.A. Parker and R.A. Wilson, Altasof Finite Groups, Clarendon Press, Oxford University Press, Eynsham,1985.

[4] B.Fischer, Clifford - matrices, Progr. Math., 95, Michler G.O. and RingelC. M(eds), Birkhauser, Basel, (1991), 1-16.

[5] I.M. Isaacs, Character Theory of Finite Groups, Academic Press, New York,Sans Francisco, London, 1967.

[6] E.I. Khukhro, N.Yu. Makarenko, P. Shumyatsky, Frobenius groups of auto-morphisms and their fixed points, arXiv:1010.0343v1, 2010.

Page 613: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE DOUBLE FROBENIUS GROUP OF THE FORM 22r:(Z2r−1:Z2) 599

[7] E.I. Khukhro, Fitting height of a finite group with a Frobenius group ofautomorphisms, J. Algebra, 366 (2012), 1-11.

[8] E.I. Khukhro, N.Yu. Makarenko, Finite groups and Lie rings with a meta-cyclic Frobenius group of automorphisms, J. Algebra, 386 (2013), 77-103.

[9] O. King, The subgroup structure of finite classical groups in terms of geo-metric configurations, British Combinatorial Conference, Surveys in Com-binatorics , Cambridge University Press, 2005, 29-56.

[10] P. Mayr, Finite fixed point free automorphism Groups, Diploma Thesis,University of Linz, 1998.

[11] J. Moori, On the Groups G+ and G of the forms 210 : M22 and 210 : M22,PhD thesis, University of Birmingham, 1975.

[12] J. Moori, On certain groups associated with the smallest Fischer group, J.London Math. Soc., 2 (1981), 61-67.

[13] J. Moori and T. Seretlo, On the Fischer-Clifford matrices of a maximalsubgroup of the Lyons group Ly, Bull. Iranian Math. Soc., 39 (2013), 1037-1052.

[14] J. Moori, P. Perumal, On the Frobenius group of the form 292:SL(2, 5),submitted.

[15] Z.E. Mpono, Fischer-Clifford Theory and Character Tables of Group Ex-tensions, PhD Thesis, University of Natal, Pietermaritzburg, 1998.

[16] P. Perumal, On The Theory Of The Frobenius Groups, MSc Thesis, Uni-versity of Kwa-Zulu Natal, Pietermaritzburg, 2012.

[17] A. L. Prins and R. L. Fray, The Fischer-Clifford matrices of an extensiongroup of the form 27:(25:S6), Int. J. Group Theory, 3 (2014), 21-39.

[18] N.S. Whitney, Fischer Matrices and Character Tables of Group Extensions,MSc Thesis, University of Kwazulu Natal, Pietermaritzburg, 1993.

Accepted: 8.03.2018

Page 614: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (600–606) 600

FINITE GROUPS WHOSE ALL PROPER SUBGROUPSARE GPST-GROUPS

Pengfei Guo∗

College of Mathematics and StatisticsHainan Normal UniversityHaikou, 571158P. R. [email protected]

Yue YangCollege of Mathematics and Statistics

Hainan Normal University

Haikou, 571158

P. R. China

[email protected]

Abstract. A set W = W1, . . . ,Wt of nilpotent Hall subgroups of G is a completeWielandt set if (|Wi|, |Wj |) = 1 for all i, j. A finite group G is called a GPST-group ifG has a complete Wielandt set W such that every member in W permutes all maximalsubgroups of any non-cyclic subgroup S in W. In this paper, we give a complete classi-fication of those groups which are not GPST-groups but all of whose proper subgroupsare GPST-groups, i.e., they are precisely minimal non-PST-groups.

Keywords: Wielandt set, GPST-group, supersoluble group, power automorphism,permutable subgroup.

1. Introduction

All groups considered in this paper are finite and our notation is standard.

Let Σ be an abstract group theoretical property, for example, nilpotency,supersolubility, solubility, etc. If all proper subgroups of a group G have theproperty Σ but G does not have it, then G is called a minimal non-Σ-group.

The structures of minimal non-Σ-groups have been studied for various classesof groups Σ, and many classical results about this topic have been obtained.For instance, Miller and Moreno [8], Schmidt [12], and Doerk [5] analyzed thestructures of minimal non-abelian groups, minimal non-nilpotent groups, andminimal non-supersoluble groups, respectively. However, the complete classifi-cations of minimal non-nilpotent groups and minimal non-supersoluble groupswere given by Ballester-Bolinches, Esteban-Romero and Robinson [4], Ballester-Bolinches and Esteban-Romero [2], respectively.

∗. Corresponding author

Page 615: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

FINITE GROUPS WHOSE ALL PROPER SUBGROUPS ARE GPST-GROUPS 601

On the other hand, Robinson [10] characterized minimal non-T-groups (T-groups are groups in which normality is a transitive relation, i. e., if the normal-ity of H in K and of K in G always imply that H is normal in G). A subgroupH of G is said to be s-permutable in G if H permutes all Sylow subgroups ofG. Agrawal [1] studied PST-groups, i. e., groups in which Sylow permutabilityis a transitive relation. A group is a soluble PST-group if and only if it hasan abelian Hall subgroup L of odd order such that G/L is nilpotent, and everyelement of G induces a power automorphism in L. Robinson [11] also gave acomplete classification of minimal non-PST-groups.

The aim in the present work is to determine the structure of a kind of minimalnon-Σ-groups. Guo and Skiba [6] called a set W = W1, . . . ,Wt of nilpotentHall subgroups of G a complete Wielandt set if (|Wi|, |Wj |) = 1 for all i, j, andcharacterized the structure of a group G which has a complete Wielandt set Wsuch that every member inW permutes all maximal subgroups of any non-cyclicsubgroup S in W. The specific result is as follows.

Theorem A [6, Theorem A]. A group G has a complete Wielandt set of sub-groupsW such that every member inW permutes all maximal subgroups of anynon-cyclic subgroup S in W if and only if G = D oM is a supersoluble groupwhere D = GN is a nilpotent Hall subgroup of G of odd order whose maximalsubgroups are normal in G.

In view of the structure of a group described in Theorem A is very close tosoluble PST-group but weaker than soluble PST-group, so Guo and Skiba [6]called this group a generalized PST-group or GPST-group for short.

In this paper, we give a complete classification of those groups which are notGPST-groups but all of whose proper subgroups are GPST-groups. Our mainresult is as follows:

Theorem 1.1. Let p and q be distinct prime divisors of the order of a group G.Then G is a minimal non-GPST-group if and only if G is one of the followingtypes:

(I) G = P o Q, where P = ⟨a, b⟩ is an elementary abelian p-group of orderp2, and Q = ⟨x⟩ is cyclic of order qr. Define ax = ai, bx = bi

j, p ≡ 1(mod qf ),

and r ≥ 1, where i is the least positive primitive qf -th root of unity modulo p,j = 1 + kqf−1, with 0 < k < q and r ≥ f ;

(II) G = P oQ, where Q = ⟨x⟩ is cyclic of order qr > 1, with q - p− 1, andP is an irreducible Q-module over the field of p elements with kernel ⟨xq⟩ in Q;

(III) G = P oQ, where P is a non-abelian special p-group of rank 2m, theorder of p modulo q being 2m, Q = ⟨x⟩ is cyclic of order qr > 1, x induces anautomorphism in P such that P/Φ(P ) is a faithful and irreducible Q-module,and x centralizes Φ(P ). Furthermore, |P/Φ(P )| = p2m and |P ′| ≤ pm;

(IV) G = PQ, where P = ⟨a0, a1, . . . , aq−1⟩ is an elementary abelian p-groupof order pq, Q = ⟨x⟩ is cyclic of order qr, qf is the highest power of q dividing

Page 616: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

602 PENGFEI GUO and YUE YANG

p− 1 and r > f ≥ 1. Define axj = aj+1 for 0 ≤ j < q − 1 and axq−1 = ai0, where

i is a primitive qf -th root of unity modulo p.

Coincidentally, by comparing with main result in [11], minimal non-GPST-groups are precisely minimal non-PST-groups. In addition, Ballester-Bolinchesand Esteban-Romero [3] introduced an interesting definition. Let p be a prime.A group G is said to be a Yp-group if, for all p-subgroups H and S of G suchthat H ≤ S, H is S-permutable in NG(S). They also gave that: a group G is asoluble PST-group if and only if G is a Yp-group for all primes p [3, Theorem4]. Hence the classification of minimal non-Yp-group in [4, Theorem 2] may beregarded as a local approach to the classification of minimal non-PST-groups.Our result is given naturally.

Corollary 1.2. Let G be a group. Then the following conditions are equivalent:(i) G is a minimal non-PST-group.(ii) G is a minimal non-GPST-group.(iii) G is a minimal non-Yp-group for every prime divisor p of the order of

G.

2. Preliminary results

We collect some lemmas which will be frequently used in the sequel.

Lemma 2.1 ([7]). Let P1, P2, . . . , Pr be a Sylow basis of a soluble group G.Then the following statements are equivalent:

(a) Every subgroup of Pi permutes every subgroup of Pj for i = j.(b) The nilpotent residual GN of G is an abelian Hall subgroup of G, and

every element of G induces a power automorphism in GN .

Lemma 2.2. Let G be a minimal non-GPST-group. Then there exists a normalnon-cyclic Sylow p-subgroup P of G and a non-normal cyclic Sylow q-subgroupQ of G with p = q such that |G| = paqb for positive integers a and b.

Proof. Since every proper subgroup of G is a GPST-group, G is supersolubleor minimal non-supersoluble by Theorem A. By a result of Doerk [5], G issoluble and G has a nontrivial normal Sylow p-subgroup P = Op(G) = 1,for some prime p. Let G = P o H and W = P,H1, . . . ,Ht of nilpotentHall subgroups of G be a complete Wielandt set, where H is a p′-group ofG. If t ≥ 2, then PH1, PH2, . . . , PHt are GPST-groups. Thus H1,H2, . . . , Ht

permute every maximal subgroup of P whether or not P is cyclic. Since thenormality of P and the fact that H is a GPST-group again, G is a GPST-group,a contradiction. Hence t = 1. Similar arguments as above, if |π(H)| ≥ 2, thenG is a GPST-group, a contradiction. So H = Q ∈ Sylq(G) with q = p a prime.If Q is non-cyclic, then ⟨x, P ⟩ = G for every element x of Q. The minimalityof G implies that ⟨x, P ⟩ is a GPST-group. By applying Theorem A, everymaximal subgroup of P is normal in G. By induction again, every subgroup of

Page 617: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

FINITE GROUPS WHOSE ALL PROPER SUBGROUPS ARE GPST-GROUPS 603

P permutes every subgroup of ⟨x⟩. By Lemma 2.1, P is abelian and x inducesa power automorphism on P . So G is a GPST-group, a contradiction. Thisinduces that H = ⟨x⟩, where |x| = qb > 1. Clearly, P is non-cyclic by thedefinition of GPST-group. The proof of Lemma 2.2 is complete.

Lemma 2.3 ([14],Lemma 5). Suppose G = P ⟨x⟩, P is a normal p-subgroup ofG and x is a q-element. If all maximal subgroups of Sylow subgroups of G arenormal in G, then x induces a power automorphism on P/Φ(P ).

Lemma 2.4 ([9],13.4.3). Let α be a power automorphism of an abelian groupA. If A is a p-group of finite exponent, then there is a positive integer l suchthat aα = al for all a in A. If α is nontrivial and has order prime to p, then αis fixed-point-free.

Lemma 2.5 ([5]). Let G be a minimal non-supersoluble group. Then

(1) G has a unique normal Sylow p-subgroup P ;

(2) P/Φ(P ) is a minimal normal subgroup of G/Φ(P ), and P/Φ(P ) is non-cyclic;

(3) If p = 2, then the exponent of P is p;

(4) If P is non-abelian and p = 2, then the exponent of P is 4;

(5) If P is abelian, then the exponent of P is p.

3. The proof of Theorem 1.1

Proof. If G is a minimal non-GPST-group, then we may assume G = PQby Lemma 2.2, where P is a non-cyclic normal Sylow p-subgroup of G andQ = ⟨x⟩ is a non-normal Sylow q-subgroup of G of order qr. Since all Sylowq-subgroups are conjugate in G, we only consider the case that Q acts on P . Sowe inverstigate the following two cases.

(1) Assume that G is supersoluble and d(P ) = k, where d(P ) is the rank ofP .

Let 1E · · ·EREP E · · ·EG be an arbitrary chief series of G. By Maschke’sTheorem [9, Theorem 8.1.2], there exists a normal subgroup N of G containedin P such that P/Φ(P ) = R/Φ(P ) × N/Φ(P ), where |N/Φ(P )| = p. Clearly,N R and 1 E N E P E G is a normal series of G. By applying Schreier’sRefinement Theorem [9, Theorem 3.1.2], P has another maximal subgroup K =R such that K is normal in G. Therefore, P has at least two maximal subgroupsR and K which are normal in G.

Now we prove k = 2. If k ≥ 3, then we can let P/Φ(P ) = ⟨a1⟩ × ⟨a2⟩ ×· · ·× ⟨ak⟩ where a1, a2, . . . , ak−1 ∈ R, a2, a3, . . . , ak ∈ K. Since R⟨x⟩ is a GPST-group, every maximal subgroup of R is normal in G. By Lemma 2.3, (yΦ(R))x =ylΦ(R) for every y ∈ R, where l is a positive integer. Thus, (yΦ(P ))x = ylΦ(P )for every y ∈ R. Similarly, (zΦ(P ))x = zmΦ(P ) for every z ∈ K, where mis a positive integer. Furthermore, al2Φ(P ) = (a2Φ(P ))x = am2 Φ(P ), and sol ≡ m(mod p). Hence, (aiΦ(P ))x = aliΦ(P ) for i = 1, 2, . . . , k. It is easy to

Page 618: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

604 PENGFEI GUO and YUE YANG

see that every maximal subgroup of P is normal in G. By Theorem A, G is aGPST-group. This contradiction implies k = 2.

Now we let P/Φ(P ) = R/Φ(P )×K/Φ(P ) = ⟨a1⟩ × ⟨a2⟩, where a1 ∈ R, a2 ∈K, a1

x = a1k1 and a2

x = a2k2 . If k1 = k2, then every maximal subgroup of P

is normal in G, and so G is a GPST-group, a contradiction. Hence, k1 = k2.Furthermore, we have that P has only two maximal subgroups which are normalin G. Clearly, at least one action of which x acts on R and K is nontrivial.Without loss of generality, we may assume that x induces an automorphism αon R. Since every subgroup of R⟨x⟩ is a GPST-group and by induction, it followsfrom Theorem A that every subgroup of R permutes every subgroup of ⟨x⟩. ByLemma 2.1, R is abelian and α is a power automorphism on R. By Lemma 2.4,α is fixed-point-free. Hence, we have either K ∩ R = 1 if K⟨x⟩ = K × ⟨x⟩ orK⟨x⟩ = K × ⟨x⟩. If K ∩ R = 1 and K⟨x⟩ = K × ⟨x⟩, then P = ⟨a, b⟩ is anelementary abelian group of order p2. We can easily have that G is of type (I)with f = 1 and k = q − 1.

If K⟨x⟩ = K × ⟨x⟩, similar arguments as above, K is abelian, and x inducesa power automorphism in K. Thus, Φ(P ) = R ∩K ≤ Z(P ). If |P : Z(P )| ≤ p,then P is abelian.

We prove that P is elementary abelian. Let Ω1(P ) be the group generated byall elements of order p in P and assume that Ω1(P ) = P . Then ⟨Ω1(P ), x⟩ = Gand it is a GPST-group. Therefore x induces a power automorphism in Ω1(P ),i. e., there is a positive integer t, relatively prime to p, such that ax = at forall a ∈ Ω1(P ). Let β be the automorphism of P induced by x and let γ bethe automorphism of P in which a 7→ at. Then βγ−1 is an automorphism of Pfixing each element of order p and βγ−1 has order equal to a power of p, say pd.Obviously βγ = γβ, so βp

d= γp

d ∈ ⟨γ⟩. But β has order prime to p, so β ∈ ⟨γ⟩and β is a power automorphism of P , a contradiction.

Assume that P = ⟨a⟩ × ⟨b⟩ is elementary abelian. Let qf be the order ofthe automorphism of P induced by x, ax = ai and bx = bs, where i and s aretwo distinct primitive qf -th roots of unity modulo p. Then 0 < f ≤ r andp ≡ 1(mod qf ). Since P ⟨xq⟩ = G, xq induces a power automorphism in Pand iq = sq. So i and s both have order qf . Then s = ij for some integerj ≡ 1(mod qf ). Now iq = sq = sjq, so j ≡ 1(mod qf−1), and we can assumethat j = 1 + kqf−1 where 0 < k < q. Hence G is again of type (I).

If |P : Z(P )| = p2, then Φ(P ) = R ∩ K = Z(P ), and so P is minimalnon-abelian and |P ′| = p. Let P1 = ⟨a, P ′⟩ and P2 = ⟨b, P ′⟩. Then P1Q andP2Q are GPST-groups. By hypothesis, x induces power automorphisms in P1

and P2, say g 7→ gn1 and g 7→ yn2 respectively. By Lemma 2.4, these twopower automorphisms are fixed-point-free. However, they must agree on P ′, son1 ≡ n2(mod p) and we can assume n1 = n2. Since [a, b]n1 = [a, b]x = [an1 , bn1 ],n21 ≡ n1(mod p) and n1 ≡ 1(mod p), a contradiction.

(2) Assume that G is minimal non-supersoluble.

Let M be a maximal subgroup of G such that Q ≤ M . Then M = P3Q,where P3 is a Sylow p-subgroup of M . By [P3, Q] ≤ P ∩ P3Q = P3, we have

Page 619: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

FINITE GROUPS WHOSE ALL PROPER SUBGROUPS ARE GPST-GROUPS 605

NG(P3) ≥ P3Q = M . Since NP (P3) > P3, P3 is normal in G. By Lemma 2.5and the maximality of M , P3 = Φ(P ) is the Sylow p-subgroup of M .

Case 1. If G is also a minimal non-nilpotent group, then by applying [4,Theorem 3], G is of either type (II) or type (III).

Case 2. If G is not a minimal non-nilpotent group and P is abelian,then by applying [2, Theorem 9, 10], we assume that G = PQ, where P =⟨a0, a1, . . . , aq−1⟩ is an elementary abelian p-group of order pq, Q = ⟨x⟩ is cyclicof order qr, qf is the highest power of q dividing p − 1 and r > f ≥ 1. Defineaxj = aj+1 for 0 ≤ j < q − 1 and axq−1 = ai0, where i is a primitive qf -th root ofunity modulo p.

For a maximal subgroup P ⟨xq⟩ of G and any element ak of P , by computa-tion, ax

q

k = aik. So G is of type (IV).

Case 3. Assume that G is not a minimal non-nilpotent group and P isnon-abelian. By applying [2, Theorem 9, 10], we may assume that G = PQsuch that P = ⟨a0, a1⟩ is an extraspecial group of order p3 with exponent p,Q = ⟨x⟩ is a cyclic group of order 2r with 2f the largest power of 2 dividingp− 1 and r > f ≥ 1, and ax0 = a1 and ax1 = ai0y, where y ∈ ⟨[a0, a1]⟩ and i is aprimitive 2f -th root of unity modulo p.

Since every subgroup of P ⟨x2⟩ is a GPST-group, every subgroup of P per-mutes every subgroup of ⟨x2⟩ by induction. If P ⟨x2⟩ = P × ⟨x2⟩, then Pis abelian by Lemma 2.1, a contradiction. Hence P ⟨x2⟩ = P × ⟨x2⟩ andax

2

0 = ax1 = ai0y = a0, which implies that x = 1 and i ≡ 1(mod p), a con-tradiction. Therefore, G is not of the type as above.

Conversely, it is easy to check that all groups satisfied types (I)—(IV) areminimal non-GPST-groups.

Acknowledgements

This work was supported by the National Natural Science Foundation of China(Grant No. 11661031).

References

[1] R.K. Agrawal, Finite groups whose subnormal subgroups permute with all Sylowsubgroups, Proc. Amer. Math. Soc., 47(1) (1975), 77-83.

[2] A. Ballester-Bolinches, R. Esteban-Romero, On minimal non-supersoluble groups,Rev. Mat. Iberoam., 23(1) (2007), 127-142.

[3] A. Ballester-Bolinches, R. Esteban-Romero, Sylow permutable subnormal subgroupsof finite groups, J. Algebra, 251(2) (2002), 727-738.

[4] A. Ballester-Bolinches, R. Esteban-Romero, D.J.S. Robinson, On finite minimalnon-nilpotent groups, Proc. Amer. Math. Soc., 133(12) (2005), 3455-3462.

[5] K. Doerk, Minimal nicht uberauflosbare, endliche Gruppen, Math. Z., 91 (1966),198-205.

Page 620: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

606 PENGFEI GUO and YUE YANG

[6] W.B. Guo, A.N. Skiba, Finite groups with permutable complete Wielandt sets ofsubgroups, J. Group Theory, 18 (2015), 191-200.

[7] B. Huppert, Zur sylowstruktur auflosbarer gruppen, Arch. Math., 12 (1961), 161-169.

[8] G.A. Miller, H.C. Moreno, Nonabelian groups in which every subgroup is abelian,Trans. Amer. Math. Soc., 4 (1903), 398-404.

[9] D.J.S. Robinson, A Course in the Theory of Groups, Springer-Verlag, New York-Heidelberg-Berlin, 1982.

[10] D.J.S. Robinson, Groups which are minimal with respect to normality being intran-sitive, Pacific J. Math., 31(3) (1969), 777-785.

[11] D.J.S. Robinson, Minimality and Sylow-permutability in locally finite groups,Ukrainian Math. J., 54(6) (2002), 1038-1048.

[12] O.J. Schmidt, Uber Gruppen, deren samtliche Teiler spezielle Gruppen sind, Mat.Sbornik, 31 (1924), 366-372.

[13] A.N. Skiba, Some characterizations of finite σ-soluble PσT -groups, J. Algebra, 495(2018), 114-129.

[14] G.L. Walls, Groups with maximal subgroups of Sylow subgroups normal, Israel J.Math., 43 (1982), 166-168.

[15] X.L. Yi, A.N. Skiba, Some new characterizations of PST-groups, J. Algebra, 399(2014), 39-54.

Accepted: 13.03.2018

Page 621: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (607–614) 607

INDUSTRIAL DATA FORECASTING USING DISCRETEWAVELET TRANSFORM

S. Al Wadi∗

The University of JordanDepartment of Risk Management and InsuranceAqabaJordansadam [email protected]

Ahmed Atallah AlsarairehThe University of Jordan

Department of Computer Information Systems

Aqaba

Jordan

ah [email protected]

[email protected]

Abstract. Since the industrial data plays significant element in any economic growthand these data have many factors that effect on its behavior. Therefore, in this articleevents of productivity of the Extractive Industry in Jordan will be forecasted usingsome of traditional model which is (ARIMA model) compound with Orthogonal wavelettransform (OWT) in order to improve the forecasting accuracy. First, the series ofdataset will be decomposed by OWT’s then the smooth’s series will be predicted usingARIMA model, OWT+ ARIMA model in order to improve the forecasting accuracy.As a results the compound model (OWT+ ARIMA) is better than the ARIMA modeldirectly in forecasting accuracy.

Keywords: operation research methods, traders satisfaction, mathematical models.

1. Introduction

Industry stock market tendencies are a challenging task. Numerous factors in-fluence industry stock market performance, including political events, generaleconomic conditions, and trader expectations. Though stock and futures tradersrely heavily on various types of intelligent systems to make trading decisions todate their success has been limited [1]. Even financial experts find it difficultto make accurate predictions, because industrial stock market trends tend to benonlinear, uncertain, and non-stationary. No consensus exists among expertsas to the effectiveness of forecasting industrial time series. More specific, Someof the important factors influencing industrial productivity are: TechnologicalDevelopment, Quality of Human Resources, Availability of Finance, Managerial

∗. Corresponding author

Page 622: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

608 S. AL WADI and AHMED ATALLAH ALSARAIREH

Talent, Government Policy and Natural Factors. Consequently, Many modelsthat has suggested in order to studying and predicting the industrial data such as[9,10] has discussed the volatility of the industrial data and provide a significantmodel for forecasting. In 2008, [11] investigates the interactive relationshipsbetween oil price shocks and Chinese stock market using multivariate vectorauto-regression. [12] have discussed the performance of the Singular SpectrumAnalysis (SSA) technique is assessed by applying it to 24 series measuring themonthly seasonally unadjusted industrial production for important sectors ofthe German, French and UK economies. The results are compared with thoseobtained using the HoltWinters and ARIMA models. Statistical selection pro-cedures are used in a variety of applications to select the best of a finite set ofalternatives. Best” is defined with respect to the (largest or smallest) mean,where the mean is inferred with statistical sampling, as in simulation optimiza-tion. Many sequential selection procedures are proposed to select a good designwhen the number of alternatives is large, see Alrefaei and Almomani [13], Al-momani and Alrefaei [14], Almomani and Abdul Rahman [15], Almomani andAbabneh [16], Almomani and Alrefaei [17], Al-Salem et al. [18], Almomani etal. [19].

One of the most important statistical procedure is the forecasting accuracy.Therefore, many attempts have been made to forecast financial markets such as[20-25]. One of the traditional forecasted model is ARIMA model. However, themain disadvantage of ARIMA model is the enormous difficulty of interpretingthe results. This study diverges from previous attempts at forecasting stockprices by proposing a method that uses the Wavelet transforms (WT) combinedwith ARIMA, this process create a transparent architecture. WT is a relativelynew field in signal processing [2]. Wavelets are mathematical functions that de-compose data into different frequency components, after which each componentis studied with a resolution matched to its scale, where a scale denotes a timehorizon [3]. WT is closely related to the volatile and time varying characteristicsof the real-world time series and is not limited by the stationarity assumption [4].WT decomposes a process into different scales, making it useful in distinguishingseasonality, revealing structural breaks and volatility clusters, and identifyinglocal and global dynamic properties of a process at specific timescales [5]. WThas been shown to be particularly useful in analyzing, modeling, and predictingthe behavior of financial instruments as diverse as stocks and exchange rates[6,7,26,27].

Moreover, WT has applications in forecasting in many fields such as in elec-tronic forecasting [28], finance and economic [29, 31], also it used with short andlong memory forecasting [30], and other fields [32, 33]. This study applies WTusing the OWT functions which are (Haar, Daubechies, Coiflet and symmelt) todecompose the industry time series then combine the approximation coefficientswith ARIMA model in order to make improve the forecasting accuracy thenselect the best WT function in forecasting. Then finally we compare the fore-

Page 623: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

INDUSTRIAL DATA FORECASTING ... 609

casting using the combined method with the forecasting using ARIMA modeldirectly OWT+ ARIMA model.

2. Methodology

Table 1: shows the research frameworkIndustry Time Series Data

OWT (Haar, Daubechies, Symmelet, and Coiflet) functions..........................Smoothed coefficients

Improving the forecasting accuracy by using ARIMA model for the transformed data.

Selection the best model in decomposition and forecasting

2.1 Wavelet transform

WT is based on Fourier transform (FT) which shows any function as the sumof the sine and cosine functions. WT should satisfies the following condition [8]:

(1) Cϕ =

∫ ∞0

|ϕ (f)|f

df <∞,

where ϕ (f) is the FT and a function of frequency f, of ϕ (t). WT is a mathemat-ical function that can be used in many fields such. WT was introduced to solveproblems associated with the FT as they occur specially with non-stationarydataset or with signals that are localized in time, space, or frequency. There aretwo types of WT which are Father WT which describes the smooth frequencycomponents of a signal and mother WT which describes the detailed compo-nents. Mathematically, the following equations represent the father WT andmother WT respectively, with j = 1, ..., J in the J-level WT decomposition [6]:

(2) φj,k = 2−j/2φ(t− 2jk/2j

), ϕj,k = 2−j/2ϕ

(t− 2jk/2j

),

father WT and mother WT should satisfy the following conditions:

(3)

∫φ (t) dt = 1 and

∫φ (t) dt = 0.

Time series data (f(t)) is an input represented by WT and can be built upas a sequence of projections onto father WT and mother WT indexed by bothk, k = 0, 1, 2, ... and by S = 2j, j = 1, 2, 3, ...J. Mathematically:

(4) Sj,k =

∫φj , kf(t)dt, and dj,k =

∫ϕj , kf(t)dt.

Page 624: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

610 S. AL WADI and AHMED ATALLAH ALSARAIREH

The orthogonal wavelet series approximation to f(t) is defined by:

F (t) =∑

Sj , kφj , k(t) +∑

dj , kφj , k(t)(5)

+∑

dj − 1, kφj − 1, k(t) + ....+∑

d1, kφ1, k(t)

(6) Sj(t)) =∑

Sj , kφj , k(t), Dj(t) =)∑

dj , kφj , k(t).

2.2 ARIMA model

ARMA is a suitable model for the stationary time series data, although most ofthe software uses least square estimation which requires stationary. To overcomethis problem and to allow ARMA model to handle non-stationary data, the re-searchers investigate a special class for the non-stationary data. This modelis called Auto-regressive Integrated Moving Average (ARIMA). This idea is toseparate a non-stationary series one or more times until the time series becomesstationary, and then find the fit model. ARIMA model has got very high at-tention in the scientific world. This model is popularized by George Box andGwilym Jenkins in 1970s [25]. There are a huge number of ARIMA models; gen-erally there are ARIMA (p, q, d) where: P: order of autoregressive part (AR),d: degree of first differentiation (I) and q: order of the first moving part (MA).Note that, if there is no differencing been done (d = 0), then ARMA model canbe got from ARIMA model. The general mathematical ARIMA model can bedefined as [25]

Wt = µ+β(ν)

ε(ν)at.

Where:t: Indexes time.Wt: The response series Yt or a difference of the response series.µ: The mean term.ν: The backshift operator; that is,νXt = Xt−1β(ν): The autoregressive operator, represented as a polynomial in the back-

shift operator:ε(ν) = 1− ε1(ν)− ...− εpνp

ε(ν): The moving-average operator, represented as a polynomial in the backshiftoperator:

β(ν) = 1− β1(ν)− ...− βpνp.

at: The independent disturbance, also called the random error.

2.3 Mathematical criteria

The author is used some criteria in order to make fair comparison betweenARIMA and ARIMA-WT can be presented in this section. Some types of ac-curacy criteria have used; Root means squared error (RMSE), Percentage root

Page 625: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

INDUSTRIAL DATA FORECASTING ... 611

mean absolute percentage error (MAPE) and mean absolute error (MAE) forthe mathematical formulas refer to [9].

3. Dataset, analysis and discussion

Figure 1: Original Data Set

The daily price index of ASE for a specific period of time has been selectedas the statistical population, more than 4000 observations were accumulated foreach variable from related databases in the mentioned period. Figure 1 showsthe diagram of the dataset. Regarding the target of this paper the followingtable will show the results of the forecasting accuracy using ARIMA modeldirectly and ARIMA+WT.

Table 2: forecasting resultsARIMAdirectly

ARIMA+Haar

ARIMA+Daubechies

ARIMA +Coiflet

ARIMA+symmelt

RMSE 1.56 0.6 0.3 0.4 0.7

MAPE 52 28.6 20 22 29

MAE 1.34 0.4 0.1 0.35 0.9

For the sake of fair comparison the same number of data set is selected. Thesuitable forecasted model for forecasting the sample data is the fitted DaubechiesWT- ARIMA (2,0,2) with RSME equal to 0.3 as presented in Table 2. While theFitted ARIMA model directly is ARIMA (1,0,2) with RMSE 1.56 which meansthat the forecasting accuracy has improved by combining OWT+ARIMA model.Also, the best forecasted model is Daubechies + ARIMA model. Moreover, toinsure the results the authors have used MAPE and MAE which was the best forARIMA + Daubechies also since these values were 20 and 0.1 respectively. Whilethese values were more that ARIMA+ Daubechies based on other functions.

Page 626: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

612 S. AL WADI and AHMED ATALLAH ALSARAIREH

4. Conclusion

ARIMA model is the most general way of forecasting since there is no need forany assumptions and it is not limited to specific type of pattern. These modelscan be fitted to any set of time series data (stationary or non-stationary) byestimating the parameters p, d, and q to be suitable with the required dataset.In this study, firstly, the industry stock price is modeled using wavelet method.Secondly, we compared ARIMA+ OWT with ARIMA directly model in contentof forecasting accuracy. Thirdly, we tested the accuracy of these models by usingRMSE, MAPE and MSE assessing functions. Final the forecasting accuracyhave improved using the suggested model. Indeed, we found ARIMA+OWTis suitable model in content of industry sector specially Daubechies WT withARIMA model.

References

[1] Y.S. Abu-Mostafa, A.F. Atiya, Introduction to financial forecasting, Ap-plied Intelligence, 1996, 205-213.

[2] A. Cohen, I. Daubechies, P. Vial, Wavelets on the interval and fast wavelettransform, Applied and Computational Harmonic, 1993, 5481.

[3] J.B. Ramsey, Z. Zhang, The analysis of foreign exchange data using waveform dictionaries, Journal of Empirical Finance, 1997, 341372.

[4] A. Popoola, K. Ahmad, Testing the suitability of wavelet preprocessing forTSK fuzzy models, in: Proceeding of FUZZ-IEEE: International ConferenceFuzzy System Network, 2006, 13051309.

[5] R. Gencay, F. Selcuk, B. Whitcher, Differentiating intraday seasonalitiesthrough wavelet multi-scaling, PhysicaA, 2001, 543556.

[6] J.B. Ramsey, The contribution of wavelets to the analysis of economic andfinancial data, Philosophical Transactions of the Royal Society of LondonSeries A-Mathematical Physical and Engineering Sciences, 1999, 25932606.

[7] K. Papagiannaki, N. Taft, Z.-L. Zhang, C.Diot, Long-term forecasting ofinternet backbone traffic, IEEE Transactions on Neural Networks, 2005,11101124.

[8] R. Gencay, F. Selcuk, B. Whitcher, An introduction to wavelets and otherfiltering methods in finance and economics, Academic Press, NewYork,2002.

[9] Firas Muhammad Al-Rawashdi, S. Alwadi and Mohammad Hasan Saleh,Wavelet methods in forecasting for insurance companies listed in ammanstock exchange, European Journal of Economics, finance and administrativesciences, 82 (2015), 54-60.

Page 627: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

INDUSTRIAL DATA FORECASTING ... 613

[10] S. Al Wadi, Improving volatility risk forecasting accuracy in industry sector,International Journal of Mathematics and Mathematical Sciences, 2017.

[11] R.G. Cong, Y.M. Wei, J.L. Jiao, and Y. Fan, Relationships between oil priceshocks and stock market: An empirical analysis from China, Energy Policy,36 (2008), 3544-3553.

[12] H. Hassani, S. Heravi, A. Zhigljavsky, Forecasting european industrial pro-duction with singular spectrum analysis, International journal of forecast-ing, 25 (2009), 103-118.

[13] M.H. Alrefaei, M.H. Almomani, Subset selection of best simulated systems,Journal of the Franklin Institute, 344 (2007), 495-506.

[14] M.H. Almomani, M.H. Alrefaei, A three-stage procedure for selecting a goodenough simulated system, Journal of Applied Probability and Statistics, 6(2012) (2012), 13-27.

[15] M.H. Almomani, R. Abdul Rahman, Selecting a good stochastic system forthe large number of alternatives, Communications in Statistics-Simulationand Computation, 41 (2012), 222-237.

[16] M.H. Almomani, F. Ababneh, The expected opportunity cost and selectingthe optimal subset, Applied Mathematical Sciences, 9 (2015), 6507-6519.

[17] M.H. Almomani, M.H. Alrefaei, Ordinal optimization with computing bud-get allocation for selecting an optimal subset, Asia-Pacific Journal of Oper-ational Research, 33 (2016), DOI: 10.1142/S0217595916500093.

[18] M. Al-Salem, M.H. Almomani, M.H. Alrefaei, Ali Diabat, On the optimalcomputing budget allocation problem for large scale simulation optimization,Simulation Modelling Practice and Theory, 71 (2017), 149-159.

[19] M.H. Almomani, M.H. Alrefaei, S. Al Mansour, A combined statistical se-lection procedure measured by expected opportunity cost, Arabian Journalfor Science and Engineering, 2017.

[20] S. Al Wadi, Improving volatility risk forecasting accuracy in industry sector,International Journal of Mathematics and Mathematical Sciences, 2017.

[21] A.M. Awajan, M.T. Ismail, S. Al Wadi, A hybrid EMD-MA for forecastingstock market index, Italian Journal of Pure and Applied Mathematics, 38(2017), 1-20.

[22] A.M. Awajan, M.T. Ismail, S.A. Wadi, Forecasting time series using EMD-HW bagging, International Journal of Statistics and Economics, 18 (2017),9-21.

Page 628: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

614 S. AL WADI and AHMED ATALLAH ALSARAIREH

[23] J.J. Jaber, N. Ismail, S. Al Wadi, M.H. Saleh, Forecasting of volatility riskfor Jordanian banking sector, Far East Journal of Mathematical Sciences,101 (2017), 1491-1507.

[24] S. Al Wadi, F. Ababneh, H. Alwadi, M.T. Ismail, Maximum overlap discretewavelet methods in modeling banking data, Far East Journal of AppliedMathematics, 84 (2013).

[25] M.T.I.S. Al Wadia, M. Tahir Ismail, Selecting wavelet transforms modelin forecasting financial time series data based on ARIMA model, AppliedMathematical Sciences, 5 (2011), 315-326.

[26] S. Al Wadi, M.T. Ismail, S.A.A. Karim, A comparison between theDaubechies wavelet transformation and the fast Fourier transformation inanalyzing insurance time series data, Far East J. Appl. Math, 45 (2010),53-63.

[27] S. Al Wadi, M.T. Ismail, S.A. Abdul Kari, Discovering Structure breaks inAmman stocks market, Journal of Applied Sciences, 11 (2011), 1273-1278.

[28] S. Li, P. Wang, L. Goel, Electric load forecasting using wavelet transformand extreme learning machine, In ESANN, 2014.

[29] L. Bai, S. Yan, X. Zheng, B.M. Chen, Market turning points forecasting us-ing wavelet analysis, Physica A: Statistical Mechanics and its Applications,437 (2015), 184-197.

[30] O. Renaud, F. Murtagh, J.L. Starck, Wavelet-based forecasting of shortand long memory time series, Universite de Geneve/Faculte des scienceseconomiques et sociales, 2002.

[31] J.B. Ramsey, The contribution of wavelets to the analysis of economic andfinancial data, Wavelets: The Key to Intermittent Information, VolumeWavelets: the key to intermittent information, 221-236.

[32] C.A.G. Santos, P.K.M.M. Freire, G.B.L. Silva, R.M. Silva, Discrete wavelettransform coupled with ANN for daily discharge forecasting into TresMarias reservoir, Proceedings of the International Association of Hydro-logical Sciences, 364 (2014), 100-105.

[33] S. Schluter, C. Deuschle, Using wavelets for time series forecasting: Doesit pay off?, IWQW discussion paper series, 2010.

Accepted: 14.03.2018

Page 629: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (615–632) 615

THREE-DIMENSIONAL AIR QUALITY ASSESSMENTSIMULATIONS INSIDE SKY TRAIN PLATFORM WITHAIRFLOW OBSTACLES ON HEAVY TRAFFIC ROAD

Kewalee Suebyat

Nopparat Pochai

Department of Mathematics

Faculty of Science

King Mongkut’s Institute of Technology Ladkrabang

Bangkok 10520

Thailand

and

Centre of Excellence in Mathematics

Commission on Higher Education (CHE)

Si Ayutthaya Road, Bangkok 10400

Thailand

kew26 [email protected]

nop [email protected]

Abstract. Air pollutant levels in Bangkok are generally high in street tunnels. Theyare particularly elevated in almost closed street tunnels such as an area the Bangkoksky train platform with high traffic volume where dispersion is limited. This area hasno air quality measurement stations even though there is a high percentage of peo-ple living around this vicinity. We are interested to conduct a research the Bangkoksky train platform due to the traffic density and enormous polluted areas. Therefore,we proposed a numerical modeling of air pollution concentration in sky train plat-form with airflow obstacles on heavy traffic road as an approximated solution of thethree-dimensional advection-diffusion equation by using the finite difference methods.Our research presentation is based on how air pollution model depends on the flow ofair pollution and wind directions including the governing equation of the correspond-ing three-dimensional advection-diffusion equation is presented. This also includes theinitial condition and boundary conditions of traffic and polluted areas. In order toillustrate the performance of the model, the numerical experiments are presented. Thecomparison between the two methods and the simulations of air pollution control areproposed. The three-dimensional advection-diffusion equation is solved by using theForward Time, Centered Space (FTCS) and Forward Time, Backward Space (FTBS)schemes. The results obtained indicate that the FTCS method provides a better re-sult than FTBS method. Furthermore, the proposed experimental variations of theboundary condition in the entrance gate do affect the air pollutant concentration ofeach floor.

Page 630: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

616 KEWALEE SUEBYAT and NOPPARAT POCHAI

Keywords: air pollutant concentration, finite difference techniques, air quality, heavytraffic, sky train platform, tunnel.

1. Introduction

Currently, Thailand is facing a rapid growth in both agriculture and industryresulting in Bangkok being the center of prosperity in all aspects with rapidpopulation increase in a blink of an eye, followed by a high demand for travel andtransportation. This creates an intensifying traffic congestion and air pollutionthat derives from the rapid increase of cars and vehicles. Air pollution is oneof the main and biggest problems and Bangkok has reached a critical levelwith hazardous substances in some areas because pollution is created by humanbeings and natural phenomena damaging the environment and human well-being. Not only is air pollution hazardous locally but it is one of the world’sbiggest killers and issue because people faced health problems such as asthma,bronchitis, cancer, etc. If people are constantly exposed to high levels of dust,they may suffer from illnesses such as silicosis or asbestosis. So it can be said thatair pollution from traffic is tremendously serious especially a Bangkok sky trainplatform than any other areas. The volume of carbon monoxide and nitrogenoxides in this area is higher than the standard volume. This issue should berealized for the study interest and further research to find solutions to reducepollution.

In [1], the Kriging method for regression analysis can be used to analyticallyrelate the mass emission rate of carbon monoxide and nitrogen dioxide at theBangkok Mass Transit System (BTS). The results indicate that the concentra-tion of carbon monoxide exceed the Bangkok standard volume and the concen-tration of nitrogen dioxide does not exceed the Bangkok standard volume. Un-deniably, the air pollutant concentration was related to the traffic flow pattern,traffic characteristic, street geometries, and human activities. The traffic flow isthe main pollution source in many urban areas. It causes more ambient air pol-lutants such as carbon monoxide (CO), sulfur dioxide (SO2), nitrogen dioxide(NO2), nitrogen oxides (NOx), volatile organic compounds (VOCs), ozone (O3),particulate matter (PM10), benzene, heavy metals, and respirable particulatematter (PM2.5 and PM10) [2, 3, 4]. Therefore, 1D Lighthill-Whitham-Richardstraffic model and advection-diffusion-reaction pollution model for estimatingthe pollution emission rate due to traffic flow in big cities are proposed in [3].The modeling of oxidation and hydrolysis of sulfur and nitrogen oxide usedthe convection-diffusion-reactions equation for higher order accurate solutions.The technique of Lax and Wendroff is introduced in [5]. A three-dimensionaladvection-diffusion equation of air pollutant is applied to a street tunnel con-figuration by using the FTCS finite difference method with air flow in x andy directions in [6]. In [7], a one-dimensional advection-diffusion equation withvariable coefficients in semi-infinite media [8] is solved using explicit finite dif-ference method for three dispersion problems: (i) solute dispersion along the

Page 631: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THREE-DIMENSIONAL AIR QUALITY ASSESSMENT SIMULATIONS ... 617

steady flow, (ii) temporarily dependent solute dispersion along the uniform flow,and (iii) solute dispersion is temporarily dependent on the steady flow throughinhomogeneous medium to find solutions. A study of vehicle exhaust disper-sion within different street canyons models in urban ventilated by cross-windby using the advanced computational and mathematical models. The pollutantconcentrations are estimated for the street canyon models, which may includesimplified photochemistry and particle deposition-suspension algorithms. Afterapplication of Box model to the street canyon. [9] can be calculated for CO,NOx, SPM, and PM10 by this box model. In [10], the effects of the variations ofatmospheric stability classes and wind velocities on the three-dimensional air-quality models are observed. The fractional step method is used to solve thedispersion model for advection-diffusion equation.

In this research, we are interested in traffic density of the area the Bangkoksky train platform. We proposed the numerical modeling of air pollutant con-centration in sky train platform with airflow obstacles on heavy traffic road.The estimated three-dimensional advection-diffusion equation is used by thefinite difference method. In our research, we indicate that the air pollutionmodeling depends on air pollution flows and wind directions. In the second sec-tion, the governing equation corresponding to the model is the three-dimensionaladvection-diffusion equation including the initial condition and boundary condi-tions. The third section is numerical techniques. The finite difference techniqueintroduced two methods for calculating the air pollutant concentration. Thethree-dimensional advection-diffusion equation is solved by using the ForwardTime, Centered Space (FTCS) and Forward Time, Backward Space (FTBS)schemes. In order to illustrate the performance of the model, in section 4 thenumerical experiments are presented. This is the comparisons between the twomethods and the simulations of the proposed air pollution control. Finally, thediscussion and conclusion are presented in section 5.

2. Governing equation

The street tunnel configuration is shown in Figure 1. That is, the street isflanked by buildings on both sides, including the top area is also closed. Thebottom floor is the street floor, next up is the ticket floor and the top floor isthe platform floor. For both sides of the street are the section of buildings. Inthis research, we assume that there are wind inflow in x- and y-directions andthere are the obstacles as columns. The columns are on both sides of the streettunnel. The air pollutant concentrations are emitted from the entrance gateand the right side gap as Figure 2(a). We consider the wind inflow along x- andy-directions as Figure 2(b). Then the consider domain becomes : Ω = (x, y, z);0 ≤ x ≤ L, 0 ≤ y ≤W , 0 ≤ z ≤ H, where W is the width (m), L is the length(m) and H is the height (m) of the street tunnel.

Page 632: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

618 KEWALEE SUEBYAT and NOPPARAT POCHAI

Figure 1: The street tunnel configuration.

(a) (b)

Figure 2: (a) The direction of pollution and wind flows. (b) The wind directionsfor street tunnel.

The air pollutant concentrations can be described by the three-dimensionaladvection-diffusion equation as follows:

∂C

∂t+ V · ∇C = ∇ ·

(K ⊗∇C

),(1)

where C = C(x, y, z, t) is the air pollutant concentration at point (x, y, z) inCartesion coordinates at time t (kg/m3), ∇ = ∂

∂x~i+ ∂

∂y~j+ ∂

∂z~k, and ⊗ is matrix

multiplication. The vector V is the wind velocity field (m/sec), K is the eddy-diffusivity or dispersion tensor (m2/sec).

Page 633: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THREE-DIMENSIONAL AIR QUALITY ASSESSMENT SIMULATIONS ... 619

Figure 3: The components of the street tunnel.

The three-dimensional advection-diffusion equation in Eq. (1), can be writ-ten as

∂C

∂t+ u

∂C

∂x+ v

∂C

∂y+ w

∂C

∂z= kx

∂2C

∂x2+ ky

∂2C

∂y2+ kz

∂2C

∂z2,(2)

where u, v, and w are the constant wind velocity (m/sec) in x, y, and z-directions,respectively, kx, ky, and kz are the constant diffusion coefficient (m2/sec) in x, y,and z-directions, respectively.

The assumptions of Eq. (2) are defined that the wind inflow in x- and y-directions are the horizontal direction and in z-direction is the vertical direction.Consequently, the three-dimensional advection-diffusion equation in Eq. (2), canbe written as:

∂C

∂t+ u

∂C

∂x+ v

∂C

∂y= kh

∂2C

∂x2+ kh

∂2C

∂y2+ kv

∂2C

∂z2,(3)

where kh is the constant dispersion coefficient in the horizontal direction (m2/sec)and kv is the constant dispersion coefficient in the vertical direction (m2/sec).

We consider the components of the street tunnel shown in Figure 3. Figure4 shows the model of the problem with A is the right parallel gap size alongthe ceiling, B is the left parallel gap size along the ceiling and G − F is theright side wall gap of the beside consider domain. (Dcn, Ern) is a center pointof the columns for cn = 1, 2, ..., ncl and rn = 1, 2, where ncl is the number ofthe columns. The initial condition, there is no initial pollutant C(x, y, z, 0) = 0,for all (x, y, z) ∈ Ω. For the boundary conditions are assumed that

Entrance gate : C(0, y, z, t) = c1.Margin of entrance gate : ∂C

∂x (0, y, z, t) = c2, y = 0,W, z = 0, H.

Exit gate : ∂C∂x (L, y, z, t) = c3.

Left side wall : ∂C∂y (x,W, z, t) = c4.

Right side wall gap : C(x, 0, z, t) = c5, F ≤ x ≤ G.

Page 634: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

620 KEWALEE SUEBYAT and NOPPARAT POCHAI

Figure 4: Model of the problem.

Right side wall : ∂C∂y (x, 0, z, t) = c6, otherwise.

Ground : ∂C∂z (x, y, 0, t) = c7.

Platform ceiling : ∂C∂z (x, y,H, t) = c8, A < y < B.

Parallel gaps : ∂C∂z (x, y,H, t) = c9, otherwise.

Center columns : C(Dcn, Ern, z, t) = 0, 0 ≤ z ≤ H.

Front and back columns : ∂C∂x (Dcn − 1, y, z, t) = ∂C

∂x (Dcn +1, y, z, t) =c10, Ern − 1 ≤ y ≤ Ern + 1, for all t > 0.

Left and right columns: ∂C∂y (x,Ern − 1, z, t) = ∂C

∂y (x,Ern +1, z, t) =c11, Dcn − 1 ≤ x ≤ Dcn + 1, for all t > 0.Where c1 and c5 are the air pollutant concentration inflow in x− and y− di-rections, respectively, c2, c3, c4, c6, c7, c8, c9, c10, and c11 are the rate of change ofair pollutant concentration in each the boundary conditions.

3. Numerical techniques

We use the finite difference methods to compute a numerical approximation tothe solutions of a three-dimensional advection-diffusion equation. The solutiondomain of the problem over time 0 ≤ t ≤ T is covered by a mesh of gridspacing: xi = i∆x, i = 0, 1, 2, ...,M ; yj = j∆y, j = 0, 1, 2, ..., N ; zk = k∆z, k =0, 1, 2, ..., P ; tn = n∆t, n = 0, 1, 2, ..., Q; parallel to the space and time coordinateaxes, respectively. Approximation the solution of the air pollutant concentrationCni,j,k to C(i∆x, j∆y, k∆z, n∆t) are calculated at the point of intersection of

these lines, namely, (i∆x, j∆y, k∆z, n∆t) which is referred to as the (i, j, k, n)grid point. The constant spatial and temporal grid-spacing are ∆x = L

M ,∆y =WN ,∆z = H

P ,∆t = TQ , respectively. In this research, we distinguish two difference

methods as following:

Page 635: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THREE-DIMENSIONAL AIR QUALITY ASSESSMENT SIMULATIONS ... 621

3.1 Forward time central space scheme

The first method, we use an explicit forward difference estimate for the timederivative (FT), and central difference approximations for the space derivative(CS), so the acronym FTCS. Consequently, the three-dimensional advection-diffusion equation in Eq. (3) becomes

Cn+1i,j,k − C

ni,j,k

∆t+ u

(Cni+1,j,k − Cn

i−1,j,k

2∆x

)+ v

(Cni,j+1,k − Cn

i,j−1,k

2∆y

)

= Dh

(Cni+1,j,k − 2Cn

i,j,k + Cni−1,j,k

(∆x)2

)+Dh

(Cni,j+1,k − 2Cn

i,j,k + Cni,j−1,k

(∆y)2

)

(4) +Dv

(Cni,j,k+1 − 2Cn

i,j,k + Cni,j,k−1

(∆z)2

).

Rearrangement and simplification of Eq. (4),

Cn+1i,j,k =

(sx +

rx2

)Cni−1,j,k +

(sy +

ry2

)Cni,j−1,k + (sz)C

ni,j,k−1

+(sx −

rx2

)Cni+1,j,k +

(sy −

ry2

)Cni,j+1,k + (sz)C

ni,j,k+1

+ (1− 2sx − 2sy − 2sz)Cni,j,k,(5)

in which rx = u∆t∆x , ry = v∆t

∆y , sx = Dh∆t

(∆x)2, sy = Dh∆t

(∆y)2and sz = Dv∆t

(∆z)2.

The finite difference scheme for the left end and the right end of the fictitiouspoints are following:

Cn−1,j,k =

4Cn0,j,k − Cn

1,j,k − 2c2∆x

3,(6)

Cni,−1,k =

4Cni,0,k − Cn

i,1,k − 2c6∆y

3,(7)

Cni,j,−1 =

4Cni,j,0 − Cn

i,j,1 − 2c7∆z

3,(8)

CnM+1,j,k =

4CnM,j,k − Cn

M−1,j,k + 2c3∆x

3,(9)

Cni,N+1,k =

4Cni,N,k − Cn

i,N−1,k + 2c4∆y

3,(10)

Cni,j,P+1 =

4Cni,j,P − Cn

i,j,P−1 + 2c8∆z

3.(11)

3.2 Forward time backward space scheme

The second method, we calculated by using an explicit forward difference esti-mate for the time derivative (FT), and backward difference approximations forthe space derivative (BS), so the acronym FTBS. The approximate solution of a

Page 636: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

622 KEWALEE SUEBYAT and NOPPARAT POCHAI

three-dimensional advection-diffusion equation in Eq. (3) use the FTCS schemesatisfies

Cn+1i,j,k − C

ni,j,k

∆t+ u

(Cni,j,k − Cn

i−1,j,k

2∆x

)+ v

(Cni,j,k − Cn

i,j−1,k

2∆y

)

= Dh

(Cni,j,k − 2Cn

i−1,j,k + Cni−2,j,k

(∆x)2

)+Dh

(Cni,j,k − 2Cn

i,j−1,k + Cni,j−2,k

(∆y)2

)

(12) +Dv

(Cni,j,k − 2Cn

i,j,k−1 + Cni,j,k−2

(∆z)2

).

Rearrangement and simplification of Eq. (12),

Cn+1i,j,k = (sx)Cn

i−2,j,k + (sy)Cni,j−2,k + (sz)C

ni,j,k−2

+ (rx − 2sx)Cni−1,j,k + (ry − 2sy)Cn

i,j−1,k − (2sz)Cni,j,k−1

+ (1 + sx + sy + sz − rx − ry)Cni,j,k.(13)

The finite difference scheme for the left end of the fictitious points are following:

Cn−1,j,k =

4Cn0,j,k − Cn

1,j,k − 2c2∆x

3,(14)

Cn−2,j,k =

13Cn0,j,k − 4Cn

1,j,k − 14c2∆x

9,(15)

Cni,−1,k =

4Cni,0,k − Cn

i,1,k − 2c6∆y

3,(16)

Cni,−2,k =

13Cni,0,k − 4Cn

i,1,k − 14c6∆y

9,(17)

Cni,j,−1 =

4Cni,j,0 − Cn

i,j,1 − 2c7∆z

3,(18)

Cni,j,−2 =

13Cni,j,0 − 4Cn

i,j,1 − 14c7∆z

9.(19)

4. Numerical experiments

4.1 Comparison between FTCS and FTBS solutions in sky trainplatform on a single

In this section, we describe about a comparision of some numerical methods forsolving the three-dimensional advection-diffusion equation. There are two meth-ods. These are forward time central space (FTCS) and forward time backwardspace (FTBS). We consider the domain as a single layer as shown in Figure 4that the length(L), width(W) and height(H) of tunnel are 198, 21 and 28 me-ters, respectively. Then, the problem domain is Ω = (x, y, z); 0 ≤ x ≤ 198, 0 ≤y ≤ 21, 0 ≤ z ≤ 28. We assume that ∆x = ∆y = ∆z = 2 m, ∆t = 0.06 sec,

Page 637: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THREE-DIMENSIONAL AIR QUALITY ASSESSMENT SIMULATIONS ... 623

T = 2 min, u = 0.5 m/sec, v = 0 m/sec, Dh = Dv = 0.001 m2/sec, c1 = 0.5,c3 = c9 = −0.01, c2 = c4 = c5 = c6 = c7 = c8 = c10 = c11 = 0, A = 4, B = 17,and ncl = 9. Figures 6 and 7 are solved by various methods. These are FTCSand FTBS methods, respectively. The solutions of air pollutant concentrationby using the FTCS method in Eq. (5) are shown in Figure 6. This figureshow about contour and surface plots of air pollutant concentration levels after2 minutes passed. You can be seen that the maximum value of air pollutantconcentration is 0.6 kg/m3. Furthermore, the contour and surface plots of airpollutant concentration levels after 2 minutes passed for solutions of air pollu-tant concentration by using the FTBS method in Eq. (13) are shown in Figure7. The maximum value of air pollutant concentration in Figure 7 is 0.5 kg/m3.

The approximations of air pollutant concentration for FTCS and FTBSmethods are compared in Figure 11. We choose ∆x = ∆y = ∆z = 2 m,∆t = 0.06 sec, T = 30 sec, u = 0.1 m/sec, v = 0 m/sec, Dh = Dv = 0.001m2/sec, c1 = 0.5, c3 = c9 = −0.01, c2 = c4 = c5 = c6 = c7 = c8 = c10 = c11 = 0,A = 4, B = 17 and ncl = 9. It can be seen that the trend of results fromboth methods in the same way. How do you know which one is better? Theidea is to find out the method whether we will change the grid-spacing, thesolution is stable. Table. 1 shows the stable of FTCS and FTBS approximatesolutions. You can be seen that if we choose λ = γ = 0.03, and λ = 0.06 thenthe solution of the FTBS method are unstable but the FTCS method is stable.Consequently, the FTCS method gives better than the FTBS method.

4.2 Numerical simulations of air pollutant assessment in sky trainplatform on triple layers

In this section, explicit forward time and central space (FTCS) scheme have beenpresented. We distinguish three scenarios of released air pollutant phenomenonsdemonstrated by using the finite difference in Eq. (5). In all scenarios, theair pollutant concentration is flowing along the x and y-directions, these areconstants or functions. In addition, there are two parallel gaps along the ceiling,the rate of change are decreased at the parallel gaps. Moreover, both sides wereflanked by buildings. All of the building walls are non-absorbing air pollutionmaterials, there is no rate of change.

For three scenarios, we consider the length, width and height of tunnelare 198, 21 and 28 meters, respectively. Then, the problem domain is Ω =(x, y, z); 0 ≤ x ≤ 198, 0 ≤ y ≤ 21, 0 ≤ z ≤ 28, when 0 ≤ z < 9, 9 ≤ z <22, 22 ≤ z ≤ 28 are street floor, ticket floor and platform floor, respectively, seein Figure 5. We consider c1 in the boundary condition in the entrance gate ofeach floor, we distinguish 3 scenarios in the consider domain as follows:

4.2.1 Scenario A : Air pollutant flowing into the street floor

If we consider BTS station area, we will see that the street floor has a lot ofcars. This causes heavy traffic, as a result air pollution is higher than other

Page 638: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

624 KEWALEE SUEBYAT and NOPPARAT POCHAI

Figure 5: The problem domain.

floors. Therefore, we assumed the air pollutant concentration at the entrancegate of the street floor is constant. However, ticket floor and platform floor areassumed that the pollution cannot be reached. So, we assumed that there is norate of change of air pollutant concentration at the entrance gate of the ticketand platform floors. Therefore, c1 in the boundary condition of all 3 floors asfollows:

Street floor : c1 = 0.5.

Ticket floor : c1 = ∂C∂x = 0.

Platform floor : c1 = ∂C∂x = 0.

The problem domain is Ω = (x, y, z); 0 ≤ x ≤ 198, 0 ≤ y ≤ 21, 0 ≤ z < 9.The grid spacing: ∆x = ∆y = ∆z = 1 m, ∆t = 0.06 sec and for the timeT = 2 min. We assume: c3 = c9 = −0.01, c5 = 0.2, c2 = c4 = c6 = c7 = c8 =c10 = c11 = 0, A = 4, B = 17, F = 125, G = 135 and ncl = 9. The windvelocity and diffusion coefficient are taken to be u = 2.7778, v = u/20 m/secand Dh = 0.1592, Dv = 0.05 m2/sec. Therefore, the results of ScenarioA forthree different floors are shown in Figure 8. That is, in Figures 8(a), 8(c) and8(e) show the contour plot of the air pollutant concentration levels for street,ticket and platform floors, respectively. Meanwhile, the surface plot of the airpollutant concentration levels for street, ticket and platform floors are shown inFigures 8(b), 8(d) and 8(f), respectively. It can be seen from Figure 8 that theair pollutant concentration in the platform floor is very low. It comes from onlythe pollution on the right side wall gap. So, the air pollution on platform flooris less than 0.2 kg/m3. The air pollutant concentration of Scenario A with thedifferent floors are shown in Figure 12(a).

4.2.2 Scenario B : Air pollutant flowing into every floors

In reality, we noticed that the air pollutant concentration depends on the heightof the tunnel, so if the height increases, the air pollutant concentration will be

Page 639: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THREE-DIMENSIONAL AIR QUALITY ASSESSMENT SIMULATIONS ... 625

less. Thus, the air pollutant concentration at the entrance gate for the streetfloor, ticket floor and platform floor can be described as different decreasingfunctions varied with the height of the tunnel. Therefore, c1 in the boundarycondition of all 3 floors as follows:

Street floor : c1 = 0.5− 0.02z.

Ticket floor : c1 = 0.32− 0.015z.

Platform floor : c1 = 0.01− 0.005z.

The problem domain is Ω = (x, y, z); 0 ≤ x ≤ 198, 0 ≤ y ≤ 21, 9 ≤ z < 22.The grid spacing: ∆x = ∆y = ∆z = 1 m, ∆t = 0.06 sec and for the timeT = 2 min. We assume: c3 = c9 = −0.01, c5 = 0.2, c2 = c4 = c6 = c7 = c8 =c10 = c11 = 0, A = 4, B = 17, F = 125, G = 135 and ncl = 9. We chooseu = 2.7778, v = u/20 m/sec, Dh = 0.1592, Dv = 0.05 m2/sec. So, the results ofScenario B for three different floors are shown in Figure 9. That is, in Figures9(a), 9(c) and 9(e) show the contour plot of the air pollutant concentration levelsfor street, ticket and platform floors, respectively. Meanwhile, the surface plotof the air pollutant concentration levels for street, ticket and platform floorsare shown in Figures 9(b), 9(d) and 9(f), respectively. As the results, the airpollution continues to be released as the decreasing functions but graduallydecreases. Therefore, the air pollution in three floors of this scenario is higherespecially, the air pollutant concentration on the street floor is as high as 0.7kg/m3. The air pollutant concentration of Scenario B with the different floorsare shown in Figure 12(b).

4.2.3 Scenario C : Air pollutant flowing through the streetfloor and their gaps

The air pollutant concentration on the street floor is assumed to be a constant.Furthermore, for more realism, we can see that the air pollutant concentrationfrom the previous floor impact on the next floor. So we will define the pollutionof the next floor by applying the principle of average. That is the air pollutantconcentration at the entrance of the next floor is the average of air pollutantconcentration of gaps on the previous floor. Therefore, c1 in the boundarycondition of all 3 floors as follows:

Street floor : c1 = 0.5.

Ticket floor : c1 = cavS .

Platform floor : c1 = cavT ,where cavS and cavT are the average of air pollutant concentration of gaps onthe street floor and ticket floor, respectively.

The problem domain is Ω = (x, y, z); 0 ≤ x ≤ 198, 0 ≤ y ≤ 21, 22 ≤ z ≤28. The grid spacing: ∆x = ∆y = ∆z = 1 m, ∆t = 0.06 sec and for the timeT = 2 min. We assume: c3 = c9 = −0.01, c5 = 0.2, c2 = c4 = c6 = c7 = c8 =c10 = c11 = 0, A = 4, B = 17, F = 125, G = 135 and ncl = 9. We chooseu = 2.7778, v = u/20 m/sec, Dh = 0.1592, Dv = 0.05 m2/sec. So, the results ofScenario C for three different floors are shown in Figure 10. That is, in Figures

Page 640: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

626 KEWALEE SUEBYAT and NOPPARAT POCHAI

10(a), 10(c) and 10(e) show the contour plot of the air pollutant concentrationlevels for street, ticket and platform floors, respectively. Meanwhile, the surfaceplot of the air pollutant concentration levels for street, ticket and platform floorsare shown in Figures 10(b), 10(d) and 10(f), respectively. It can also be obtainedby Figure 13 that the air pollutant concentration gradually decreases becausewe bring the value of the previous floor to the next floor. So, the pollution onthe platform floor is least the pollution than other floors as 0.5 kg/m3. Theair pollutant concentration of Scenario C with the different floors are shown inFigure 12(c).

5. Discussion and conclusion

In this research, the air pollutant concentration model is presented. The finitedifference methods such as FTCS and FTBS methods can be used to estimatethe air pollutant concentration. Also, it is appealing that the grid spacing isdifferent so FTCS method has been chosen because when making comparisonsbetween FTCS and FTBS methods in some cases, the solution for FTBS methodis unstable while the solution for FTCS method is stable. Hence, FTCS methodprovides a better result than FTBS method.

Furthermore, we proposed three scenarios for estimating the air pollutantconcentration as follows; Scenario A: there is no rate of change of air pollutantconcentration at the entrance gate of the ticket and platform floors. Based onthe results, the air pollution in the platform floor is low because it only emitspollution at the wall gap at the right side. Scenario B: the air pollutant concen-tration at the entrance of three floors can be described by different decreasingfunctions depended on the height of the tunnel. As the results, the air pollutioncontinues to be released as the decreasing functions but gradually decreases.Therefore, the air pollution in this scenario is high when compared to otherscenarios. Scenario C: the air pollution at the entrance of the next floor is theaverage of air pollutant concentration of gaps on the previous floor. The resultsof this scenario show that the pollution gradually decreases because we usedthe value of the previous floor to the next floor which significantly reduces airpollution.

Summary of the three scenarios: Scenario A is a simple model that is aneconomical method to use. It requires a few of collected data. Scenario B isa realistic numerical simulation. The approximated air pollutant concentrationdepends on the height but requires a lot of field data. Scenario C is a fairlygood model. The simulation needs to average the pollutant concentration level.It is used as the input air pollutant concentration to the above floor. However,the suitable model depends on the provided field data.

Page 641: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THREE-DIMENSIONAL AIR QUALITY ASSESSMENT SIMULATIONS ... 627

Table 1: The stable of FTCS and FTBS approximate solutions.

λ = ∆t∆x γ = ∆t

(∆x2)∆x ∆y ∆z ∆t FTCS FTBS

0.02 0.0067 3.0 3.0 3.0 0.06 stable stable0.0267 1.5 1.5 1.5 0.03 stable stable

0.03 0.015 2.0 2.0 2.0 0.06 stable stable0.03 1.0 1.0 1.0 0.03 stable unstable

0.06 0.06 1.0 1.0 1.0 0.06 stable unstable0.12 0.5 0.5 0.5 0.03 stable unstable

(a) (b)

Figure 6: Contour and surface plot of air pollutant concentration levels afterthe past 2 minutes computed by FTCS method.

(a) (b)

Figure 7: Contour and surface plot of air pollutant concentration levels afterthe past 2 minutes computed by FTBS method.

Page 642: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

628 KEWALEE SUEBYAT and NOPPARAT POCHAI

(a) (b)

(c) (d)

(e) (f)

Figure 8: Contour and surface plot of air pollutant concentration levels after thepast 2 minutes for the respective streets, tickets and platform floors. (ScenarioA)

Page 643: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THREE-DIMENSIONAL AIR QUALITY ASSESSMENT SIMULATIONS ... 629

(a) (b)

(c) (d)

(e) (f)

Figure 9: Contour and surface plot of air pollutant concentration levels after thepast 2 minutes for the respective streets, tickets and platform floors. (ScenarioB)

Page 644: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

630 KEWALEE SUEBYAT and NOPPARAT POCHAI

(a) (b)

(c) (d)

(e) (f)

Figure 10: Contour and surface plot of air pollutant concentration levels after thepast 2 minutes for the respective streets, tickets and platform floors. (ScenarioC)

Page 645: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

THREE-DIMENSIONAL AIR QUALITY ASSESSMENT SIMULATIONS ... 631

Figure 11: Comparison of air pollutant concentration between FTCS and FTBSmethods after the past 30 seconds.

(a)

(b) (c)

Figure 12: The air pollutant concentration with the different floors of (a) Sce-nario A. (b) Scenario B. (c) Scenario C.

Acknowledgements

This research is supported by the Centre of Excellence in Mathematics, theCommission on Higher Education, Thailand. The authors greatly appreciatevaluable comments received from the reviewers.

Page 646: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

632 KEWALEE SUEBYAT and NOPPARAT POCHAI

References

[1] U. Charusombat, Air pollution distribution under an elevated train station(A case study of Silom station in downtown Bangkok), Faculty of VirginiaPolytechnic Institute and State University, Blacksburg, Virginia, 1994.

[2] S.T. Leong, S. Muttamara and P. Laortanakul, Air pollution and trafficmeasurements in Bangkok streets, Asian J. Energy Environ., 3 (2002), 185-213.

[3] L.J. Alvarez-Vazquez, N. Garcia-Chan, A. Martinez and M.E. Vzquez-Mendez, Numerical simulation of air pollution due to traffic flow in urbannetworks, Journal of Computational and Applied Mathematics, 326 (2007),44-61.

[4] M. Kampa and E. Castanas, Human health effects of air pollution, Envi-ronmental Pollution, 151 (2008), 362-367.

[5] N. Sanin and G. Montero, A finite difference model for air pollution simu-lation, Advances in Engineering Software, 38 (2007), 358-365.

[6] M. Thongmoon, Numerical experiment of air pollutant concentration in thestreet tunnel, International Mathematical Forum, 10 (2010), 449-465.

[7] A. Kumar, D. K. Jaiswal, and A. Kumar, Analytical solutions to one-dimensional advection-diffusion equation with variable coefficients in semi-infinite media, Journal of Hydrology, 380 (2010), 330-337.

[8] S. Savovic and A. Djordjevich, Finite difference solution of the one-dimensional advection-diffusion equation with variable coefficients in semi-infinite media, International Journal of Heat and Mass Transfer, 55 (2012),4291-4294.

[9] R. S. Kanakiya, S. K. Singh, and P. M. Mehta, Urban canyon modelling: aneed for the design of future Indian cities, International Research Journalof Environment Sciences, 4(7) (2015), 86-95.

[10] S. A. Konglok and N. M. Pochai, Numerical computations of three-dimensional air-Quality model with variations on atmospheric stabilityclasses and wind velocities using fractional step method, IAENG Interna-tional Journal of Applied Mathematics, 46(1) (2016), 112-120.

[11] L. Sun, K. C. Wong, P. Wei, S. Ye, H. Huang, F. Yang, D. Westerdahl,K. K. Louie, W. Y. Luk, and Z. Ning, Development and application of anext generation air sensor network for the Hong Kong marathon 2015 airquality monitoring, Lecture Notes in Engineering and Computer Science:Sensors, 16 (2016), 211.

Accepted: 26.03.2018

Page 647: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (633–655) 633

A CONSTRUCTION OF CONGRUENCE-SIMPLESEMIRINGS

Barbora BatıkovaDepartment of MathematicsCULS, Kamycka 129165 21 Praha 6-SuchdolCzech [email protected]

Tomas KepkaDepartment of AlgebraMFF UK, Sokolovska 83186 75 Praha 8Czech [email protected]

Petr Nemec∗

Department of Mathematics

CULS, Kamycka 129

165 21 Praha 6-Suchdol

Czech Republic

[email protected]

Abstract. A construction of congruence-simple semirings is presented.

The congruence-simple semirings of positive rational (real) numbers arefairly familiar, but the other (congruence-)simple semirings are regarded assomewhat apocryphal. It is easy to show that simple semirings split into threebasic classes: the additively cancellative semirings, the additively nil-semiringsand the additively idempotent ones. The first class includes all simple rings andmany subsemirings of ordered rings. The second class includes many congruence-simple semigroups equipped with constant addition, but what remains is quiteenigmatic so far ([1]). Now, we come to the third class, the additively idem-potent simple semirings. These semirings (at least in the finite case) are ofinterest because of possible applications in cryptology (see e.g. [9]) and they areconstructed as endomorphism semirings of semilattices (see [2], [6], [7] and [8]).The present note continues this line of research. Finally, notice that few piecesof information on simple semirings and general semirings are available in [4] or[5].

∗. Corresponding author

Page 648: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

634 Barbora Batıkova, Tomas Kepka and Petr Nemec

1. Preliminaries

Let A = A(∗) be a groupoid. An element a ∈ A is called left (right) neutralif a ∗ x = x (x ∗ a = x) for all x ∈ A, and left (right) absorbing if a ∗ x = a(x∗a = a) for all x ∈ A. If A = A(+) then 0A ∈ A (oA ∈ A) means that 0A (oA)is (the unique) left and right neutral (absorbing) element of A(+) and 0A /∈ A(oA /∈ A) denotes the fact that A(+) has no (left and right) neutral (absorbing)element. Similarly, if A = A(·) then 1A ∈ A means that 1A is (the unique) leftand right neutral element of A(·).

A semilattice is a commutative and idempotent semigroup. If M (= M(+))is a semilattice then a basic order ≤ is defined on M by x ≤ y iff x + y = y.Now, an element w ∈M is the smallest (greatest, resp.) element of the orderedset M(≤) if and only if w = 0M (w = oM , resp.).

A non-empty subset I of M is an ideal if M + I = I. This ideal is said to beprime if M \ I is a subsemilattice of M . For every x ∈ N = M \oM (here andthroughout the paper N = M if oM /∈ M and similarly for M \ 0M), the setAx = y ∈M | y x is called principal prime ideal determined by the elementx. Clearly, a subset I of M is a prime ideal if and only if the set V = M \ I is aproper subsemilattice of M such that x ∈ V whenever x ≤ y ∈ V . This primeideal is principal if and only if oV ∈ V .

A semiring is a non-empty set equipped with two associative binary oper-ations that are usually written as addition and multiplication. The additionis commutative and the multiplication distributes over the addition. Given asemiring S, a (left S-)semimodule (SM =) M is a commutative semigroup M(+)together with a scalar multiplication S×M →M such that (a+ b)x = ax+ bx,a(x + y) = ax + ay and a(bx) = (ab)x for all a, b ∈ S and x, y ∈ M . If S isa semiring then R = R(S) = a ∈ S |Sa = a denotes the set of right multi-plicatively absorbing elements. If a ∈ R(S) then a+a = aa+aa = (a+a)a = aand a(b + b) = ab + ab = ab for every b ∈ S. Consequently, the semiring Sis additively idempotent, provided that the right semimodule R(S)S is faithful,i.e., for all a, b ∈ S, a = b, there is at least one x ∈ R(S) with xa = xb.

Let S be a semiring. A non-empty subset I of S is a left (right) ideal of Sif SI ∪ (I + I) ⊆ I (IS ∪ (I + I) ⊆ I). A left (right) ideal I is called minimal if|I| ≥ 2 and J = I whenever J is a left (right) ideal with |J | ≥ 2 and J ⊆ I. Anon-empty subset I of S is an ideal if SI ∪ IS ∪ (I + I) ⊆ I and it is a bi-ideal ifSI∪IS∪(I+S) ⊆ I. In the latter case, the relation (I×I)∪ idS is a congruenceof the semiring S. Finally, S is called– simple (more precisely: congruence–simple) if S has just two congruence rela-tions (then these are idS and S × S and |S| ≥ 2);– (bi–)ideal–simple if S = I whenever I is an (bi–)ideal of S with |I| ≥ 2.

Throughout the paper, all semirings and semimodules are assumed to beadditively idempotent. It means that the respective additive semigroups M(+)are semilattices.

Page 649: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A CONSTRUCTION OF CONGRUENCE-SIMPLE SEMIRINGS 635

2. Auxiliary results (a)

Throughout this section, let S be an (additively idempotent) semiring such that|R| ≥ 2.

2.1 Lemma. (i) If 0S ∈ S then 0R ∈ R, R0S = 0R and S0S ≤ 0R.(ii) If oS ∈ S then oR ∈ R, RoS = oR and oR ≤ SoS.

Proof. a0S+b = a0S+ab = a(0S+b) = ab and aoS+b = aoS+ab = a(oS+b) =aoS for all a ∈ S and b ∈ R.

2.2 Lemma. Assume that either R + S = S or the right semimodule RS isfaithful. Then:(i) If 0S ∈ S then 0S = 0R ∈ R.(ii) If 0R ∈ R then 0R = 0S ∈ S.

Proof. (i) By 2.1(i), ab0S = 0R = a0S for all a ∈ R and b ∈ S, and henceb0S = 0S , provided that RS is faithful. If R+S = S then 0R+S = 0R+R+S =R+ S = S.(ii) a(b+ 0R) = ab+ a0R = ab+ 0R = ab for all a ∈ R and b ∈ S.

2.3 Lemma. Assume that either R ∩ (S + a) = ∅ for every a ∈ S or the rightsemimodule RS is faithful. Then:(i) If oS ∈ S then oS = oR ∈ R.(ii) If oR ∈ R then oR = oS ∈ S.

Proof. Using 2.1(ii), we proceed similarly as in the proof of 2.2.

2.4 Lemma. If the semiring S is simple then the right semimodule RS isfaithful.

Proof. Take into account that ab = b = c = ac for all a ∈ S and b, c ∈ R,b = c.

2.5 Lemma. (i) R is the smallest (right) ideal of S.(ii) R+ S is the smallest bi-ideal of R.

Proof. It is easy.

2.6 Corollary. (i) The semiring S is ideal-simple iff R = S.(ii) The semiring S is bi-ideal-simple iff R+ S = S.

2.7 Lemma. If the semiring S is simple then R + S = S and the right semi-module RS is faithful and simple.

Page 650: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

636 Barbora Batıkova, Tomas Kepka and Petr Nemec

Proof. By 2.4 and 2.6(ii), RS is faithful and R+S = S. If α is a congruence ofRS then ϱ is a congruence of S, where (a, b) ∈ ϱ iff (ca, cb) ∈ α for every c ∈ R.Of course, ϱ ∩ (R×R) = α.

2.8 Lemma. Let the right semimodule RS be faithful and simple. If ϱ = idS isa congruence of the semiring S then R×R ⊆ ϱ.

Proof. Let (a, b) ∈ ϱ, a, b ∈ S, a = b. Since RS is faithful, ca = cb for at leastone c ∈ R, so that α = ϱ ∩ (R × R) = idR. Clearly, α is a congruence of RS ,and therefore α = R×R.

2.9 Lemma. Assume that R+S = S. The following conditions are equivalent:

(i) ϱ = S × S, whenever ϱ is a congruence of S such that R×R ⊆ ϱ.

(ii) For every a ∈ S there is b ∈ R with a ≤ b.

Proof. (i) implies (ii). Define a relation σ on S by (a, b) ∈ σ iff (a+R)∩(b+R) =∅. Then σ is a congruence of S and R×R ⊆ σ. Thus σ = S × S.(ii) implies (i). If a, b ∈ S then a ≤ c, b ≤ d and e ≤ a, f ≤ b for somec, d, e, f ∈ R. Now, (a, c) = (a+e, a+c) ∈ ϱ, (b, d) = (b+f, b+d) ∈ ϱ, (c, d) ∈ ϱand, finally, (a, b) ∈ ϱ.

2.10 Proposition. The semiring S is simple iff the right semimodule RS isboth faithful and simple and the ideal R is both upwards and downwards cofinalin S.

Proof. The direct implication follows from 2.4, 2.7 and 2.9, while the converseone from 2.8 and 2.9.

2.11 Lemma. Assume that ac = bc for all a, b ∈ R, c ∈ S and put µ(c) = ac.Then µ is a homomorphism of the semiring S onto the semiring R and µ|R =idR. Further, the left semimodule SR is not faithful, and if the right semimoduleRS is faithful then S = R and µ = idR.

Proof. Easy to check.

2.12 Lemma. (i) If the right semimodule RS is faithful and S = R then ac = bcfor some a, b ∈ R and c ∈ S.(ii) If the left semimodule RS is faithful then for all a, b ∈ R, a = b, there isc ∈ S with ac = bc.(iii) If the right semimodule RS is simple and the left semimodule RS is notfaithful then ac = bc for all a, b ∈ R and c ∈ S.

Proof. Use 2.11.

Page 651: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A CONSTRUCTION OF CONGRUENCE-SIMPLE SEMIRINGS 637

3. Auxiliary results (b)

Let S be a non-trivial semiring. A (left S-)semimodule M (=S M) will be calledcharacteristic if the following conditions are satisfied:

(a) |M | ≥ 3;

(b) 0M ∈M and S0M = 0M;

(c) oM ∈M and SoM = oM;

(d) M is faithful;

(e) There is a mapping ε : N = M \ oM → S such that ε(x)y = 0M andε(x)z = oM for all x ∈ N , y, z ∈M , y ≤ x, z x.

Throughout this section, let M be a characteristic semimodule and L = M \0M.3.1 Lemma. (i) ε is an injective mapping of N into R.(ii) |R| ≥ 2 and R = a ∈ S | aM = 0M , oM .(iii) oS ∈ S, oR ∈ R and oS = oR = ε(0M ).(iv) oSL = oM.

Proof. (i) We have aε(x)y = ε(x)y for all a ∈ S, x ∈ N and y ∈ M (use(e), (b) and (c)). Since M is faithful, we get ε(x) ∈ R. If ε(x1) = ε(x2) then0M = ε(x1)x1 = ε(x2)x1 and x1 ≤ x2. By symmetry, we obtain x1 = x2.(ii) Since |N | ≥ 2 due to (a), we get |R| ≥ 2 due to (i). If a ∈ R and x ∈M aresuch that ax ∈ N then ax = ε(ax)ax = 0M . Thus aM = 0M , oM. Conversely,if a ∈ S is such that aM = 0M , oM then bax = ax for all b ∈ S and x ∈ M .Since M is faithful, we get ba = a and a ∈ R.(iii) (ε(0M ) + a)x = ε(0M )x + ax = oM + ax = oM = ε(0M )x for every x ∈ L.Of course, (ε(0M ) + a)0M = 0M = ε(0M )0M . Thus ε(0M ) + a = ε(0M ) andε(0M ) = oS .(iv) If x ∈ L then oSx = ε(0M )x = oM .

3.2 Lemma. The following conditions are equivalent for a ∈ S:

(i) a = 0S ∈ S.

(ii) a = 0R ∈ R.

(iii) a+ ε(x) = ε(x) for every x ∈M \ oM.

(iv) aN = 0M.

Moreover, if oN ∈ N then these conditions are equivalent to:

(v) aoN = 0M .

Page 652: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

638 Barbora Batıkova, Tomas Kepka and Petr Nemec

Proof. (i) implies (iii) and (ii) implies (iii) trivially, and, evidently, (iv) is equiv-alent to (v). Now, we show that (iii) implies (iv). Indeed, 0M = ε(x)x =(ε(x) + a)x = ε(x)x + ax = ax for every x ∈ N . On the other hand, if (iv) istrue then a ∈ R by 3.1(ii) and (a+ b)x = ax+ bx = 0M + bx = bx for all b ∈ Sand x ∈ N . Then (a+b)y = by for every y ∈M , a+b = b and a = 0S = 0R.

3.3 Lemma. Let 0S ∈ S. Then:(i) 0S = 0R ∈ R.(ii) N +N = N .(iii) 0S = ε(w) for w ∈ N iff w is the greatest element of N .

Proof. (i) See 3.2.(ii) If x, y ∈ N then 0S(x+ y) = 0Sx+ 0Sy = 0M by 3.2(iv). Hence x+ y = oM .(iii) If 0S = ε(w) then ε(w)x = 0Sx = 0M and x ≤ w for every x ∈ N .Conversely, if w is the greatest element of N then ε(w)N = 0M and ε(w) = 0Sby 3.2.

3.4 Lemma. The following conditions are equivalent:

(i) 0S ∈ S and 0S ∈ ε(N).

(ii) 0R ∈ R and 0R ∈ ε(N).

(iii) The set N has the greatest element (if w is that element then ε(w) = 0S =0R).

Proof. See 3.2 and 3.3.

3.5 Lemma. (i) If a ∈ S and x ∈M then ax = 0M iff x ∈ N and a ≤ ε(x).(ii) If x, y ∈ N then x ≥ y iff ε(x) ≤ ε(y).

Proof. It is easy.

3.6 Lemma. The semimodule M is simple.

Proof. Let α be a congruence of M . If (0M , oM ) ∈ α then α = M ×M . If(x, oM ) ∈ α for some x ∈ N then (0M , oM ) = (ε(x)x, ε(x)oM ) ∈ α. If x, y ∈ Nare such that x y and (x, y) ∈ α then (0M , oM ) = (ε(y)y, ε(y)x) ∈ α.

3.7 Lemma. The right semimodule RS is faithful.

Proof. If a, b ∈ S, a = b, then ax = bx for at least one x ∈ M and we canassume that bx ax. Then ax ∈ N , c = ε(ax) ∈ R and cax = 0M = oM = cbx.Thus ca = cb.

Page 653: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A CONSTRUCTION OF CONGRUENCE-SIMPLE SEMIRINGS 639

3.8 Lemma. Let a ∈ R and A = x ∈M | ax = 0M . Then:(i) 0M ∈ A, oM /∈ A and A is a subsemilattice of M(+).(ii) If v ∈M then a = ε(v) iff v = oA ∈ A.

Proof. (i) This is obvious.(ii) If a = ε(v) then v ∈ A and, if y v, then ay = oM implies y /∈ A. Thusv = oA ∈ A. Conversely, if v = oA ∈ A then ax = ε(v)x for every x ∈ M (use3.1(ii)). Since SM is faithful, we get a = ε(v).

3.9 Lemma. Assume that every infinite strictly increasing sequence of elementsfrom M (or N , K = N \0M) is upwards cofinal in N (K). Put R1 = R\0S(R1 = R if 0S /∈ S). Then R1 ⊆ ε(N) ⊆ R.

Proof. First, observe that if x1 < x2 < x3 < . . . is a sequence of elements fromM then xi ∈ K for every i ≥ 2. Next, if a ∈ R1 then A = x ∈ M | ax =0M $ N by 3.2(iv). Consequently, using our assumption, we get oA ∈ A anda = ε(oA) by 3.8.

3.10 Lemma. If every infinite strictly decreasing sequence of elements fromR is downwards cofinal in R1 then every infinite strictly increasing sequence ofelements from M is upwards cofinal in N \ oN.

Proof. If x1 < x2 < x3 < . . . is a sequence of elements from M then xi ∈ N forevery i ≥ 1 and ε(x1) > ε(x2) > ε(x3) > . . . by 3.5(ii) and 3.1(i). If, moreover,x ∈ N \ oN then ε(x) = 0S , and hence ε(xj) ≤ ε(x) and x ≤ xj for somej ≥ 1.

3.11 Lemma. If every infinite strictly increasing sequence of elements fromR is upwards cofinal in R2 = R \ oS then every infinite strictly decreasingsequence of elements from M is downwards cofinal in L = M \ 0M.

Proof. If x1 > x2 > x3 > . . . is a sequence of elements from M then xi ∈ K =M \ 0M , oM for every i ≥ 2 and ε(x2) < ε(x3) < . . . by 3.5(ii) and 3.1(i). If,moreover, x ∈ L then ε(x) = oS , and hence ε(x) ≤ ε(xj) and xj ≤ x for somej ≥ 1.

3.12 Lemma. Assume that R1 ⊆ ε(N). Then:(i) If every infinite strictly decreasing sequence of elements fromM is downwardscofinal in K then every infinite strictly increasing sequence of elements from Ris upwards cofinal in R2.(ii) If every infinite strictly increasing sequence of elements from M is upwardscofinal in K then every infinite strictly decreasing sequence of elements from Ris downwards cofinal in R1.

Page 654: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

640 Barbora Batıkova, Tomas Kepka and Petr Nemec

Proof. (i) Let a1 < a2 < a3 < . . . be a sequence of elements from R. Thenai ∈ R3 = R \ 0S , oS for every i ≥ 2 and ai = ε(xi), where xi ∈ K. We havex2 > x3 > x4 > . . . and if a ∈ R3 then a = ε(x), x ∈ K, x ≥ xj and a ≤ aj forsome j ≥ 2.(ii) Let a1 > a2 > a3 > . . . be a sequence of elements from R. Then ai ∈ R1

for every i ≥ 1 and ai = ε(xi), xi ∈ N , x1 < x2 < x3 < . . . . If a ∈ R1 thena = ε(x), x ∈ N , x ≤ xj and aj ≤ a for some j ≥ 1.

For x ∈ M , define a relation νx on S by (a, b) ∈ νx iff acx = bcx for everyc ∈ S.

3.13 Lemma. (i) νx is a congruence of the semiring S.(ii) νx ∩ (R×R) is a congruence of the right semimodule RS.(iii) R×R ⊆ νx iff Sx ⊆ 0M , oM.(iv) If Sx ⊆ 0M , oM then νx = S × S.(v) νx = S × S iff R×R ⊆ νx.(vi) If x ∈ K then νx = S × S iff Sx = 0M , oM.(vii) 0M , oM ∈ P (M) = x ∈ M |Sx ⊆ 0M , oM and P (M) is a subsemi-module of M .

Proof. (i) and (ii). Easy to check.(iii) If R × R ⊆ νx then acx = oScx = ε(0M )cx for all a ∈ R and c ∈ S. Ifcx = 0M then acx = oM . If, moreover, cx ∈ N then oM = ε(cx)cx = 0M , acontradiction. Thus cx = oM and we see that Sx ⊆ 0M , oM.(iv) and (v). Use (iii).(vi) If x ∈ K then ε(x)x = 0M and oSx = ε(0M )x = oM .(vii) Easy to check.

3.14 Remark. Assume that the right semimodule RS is simple (cf. 2.10). Ifx ∈ M is such that Sx * 0M , oM then R × R * νx, and hence x ∈ K andνx ∩ (R × R) = idR. Now, if a, b ∈ R are such that a < b then acx = 0M andbcx = oM for some c ∈ S (see 3.1(ii)). Consequently, cx ∈ K, ac ≤ ε(x) (see3.5(i)) and ε(x) = ac+ ε(x) < bc+ ε(x) ∈ R.

3.15 Remark. Assume that the left R-semimodule RS is not faithful. Thenthere are a, b ∈ R such that a < b and ac = bc for every c ∈ S.(i) Let a = ε(x) and b = ε(y), x, y ∈ N . Then y < x and ε(x)cz = acz = bcz =ε(y)cz for every z ∈ M . In particular, if cz ≤ x then cz ≤ y. Since y < x,it follows that x /∈ SM . In fact, x = c1x1 + · · · + cnxn for all n ≥ 1, ci ∈ S,xi ∈M , and the same is true for x′ such that y < x′ ≤ x.(ii) Let a = 0S and b = ε(y), y ∈ N . Then y ∈ K and 0Scz = ε(y)cz for everyz ∈M . In particular, if cz ∈ N then cz ≤ y. Consequently, for all n ≥ 1, ci ∈ Sand xi ∈M , either x = c1x1 + · · ·+ cnxn ≤ y or x = oM .(iii) If the semiring S is simple then ce = de for all c, d, e ∈ S. Consequently,|S| = 2 and S = R.

Page 655: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A CONSTRUCTION OF CONGRUENCE-SIMPLE SEMIRINGS 641

Consider the following two conditions:

(f1) For all a, b ∈ R, a = b (a < b) and x ∈ K there is at least one c ∈ S withacx = bcx (then acx = 0M and bcx = oM ).

(f2) K ⊆ Sx for every x ∈ K.

3.16 Lemma. (f2) implies (f1).

Proof. Since SM is faithful, there is y ∈M such that ay = by. Clearly, y ∈ K,and if (f2) is true then y = cx, c ∈ S. Thus acx = bcx.

3.17 Lemma. Assume that the right semimodule RS is simple. Then (f1) isequivalent to Sx ∩K = ∅ for every x ∈ K.

Proof. If (f1) is true and x ∈ K then νx ∩ (R × R) = idR, and hence Sx *0M , oM by 3.13(iii). Conversely, if Sx ∩ K = ∅ then R × R * νx and, RSbeing simple, we get νx ∩ (R×R) = idR.

3.18 Lemma. Let the set K contain the smallest element, say w, and letSw * 0M , oM , w. If c ∈ S is such that cw /∈ 0M , oM , w then ε(w)c = oS,ε(w) = oS = c and c /∈ R.

Proof. Since cw ∈ K, we have c /∈ R, and hence c = oS (use 3.1(ii)). Sincew = 0M , we have ε(w) = oS . Now, if y ∈ L = M \ 0M then w ≤ y, and henceoM = ε(w)cw ≤ ε(w)cy (we have w < cw). Consequently, ε(w)cx = oSx forevery x ∈M and we get ε(w)c = oS .

3.19 Lemma. Let |R| ≥ 3 and let the set K contain the smallest element. Ifthe condition (f1) is satisfied then oS = ac for some a ∈ R2 = R \ oS andc ∈ S \R.

Proof. Let w be the smallest element in K. Since |R| ≥ 3, there are a, b ∈ Rsuch that a = b and aw = bw (use 3.1(ii)). Now, by (f1), there is c ∈ S suchthat acw = bcw. Then cw /∈ 0M , oM , w and 3.18 applies.

3.20 Remark. If |R| = 2 and (f1) is true then |S| = 3, 1S ∈ S and oS = 0S = acfor all a ∈ R \ oS = 0S and c ∈ S \R = 1.3.21 Lemma. oS ∈ R2 +R2 in each of the following cases:

1. The set K has at least one minimal element but no smallest element.

2. The set R2 has at least one maximal element but no greatest element.

3. There are u, v ∈ K such that, for every x ∈ K, either x u or x v.

Page 656: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

642 Barbora Batıkova, Tomas Kepka and Petr Nemec

Proof. (i) Let w ∈ K be minimal. Since w is not the smallest element of K,there is v ∈ K with w v. If x ∈ K is such that x ≤ v then x w, andhence (ε(w) + ε(v))x = oM . If x v then (ε(w) + ε(v))x = oM as well. Thusε(w) + ε(v) = ε(0M ) = oS .(ii) If a is maximal in R2 then b a for some b ∈ R2, and so a+ b = oS .

3.22 Remark. Let b ∈ S \ R be such that the set bM is finite. Due to3.1(ii), we have bM = 0M , w1, . . . , wn, oM, where n ≥ 1 and wi ∈ K. Putw = w1 + · · ·+wn. There are u1, . . . , un ∈ K such that wi = bui, Then w = bu,u = u1 + · · ·+ un.(i) If n = 1 or N +N = N then w ∈ K.(ii) Assume that w ∈ K. Then w = wj for some 1 ≤ j ≤ n. If a = ε(w) thena ∈ R2, abx = 0M for x ∈M , bx ∈ N , and aby = oM for y ∈M , by = oM .(iii) Let w ∈ K and bN ⊆ N . Then bN ≤ w, abN ≤ aw = 0M and ab = 0S ∈ Sby 3.2(iv). Since b /∈ R, we have b = 0S . On the other hand, a = 0S iff w is thegreatest element of N .(iv) If w ∈ K, w is not the greatest element of N and bN ⊆ N then a = 0S = band ab = 0S .(v) Assume that bL ⊆ L, L = M \ 0M. If v ∈ K is such that v < wi for everyi = 1, . . . , n and if a = ε(v) then a = oS and abx = oM for every x ∈ L. Thusab = oS . Of course, b /∈ R, and so b = oS as well.

3.23 Remark. Let v ∈ K, a = ε(v) and b ∈ S. We have a ∈ R2.(i) If bN ≤ v then abN = 0M, and hence ab = 0S ∈ S by 3.2. Conversely, ifab = 0S ∈ S then bN ≤ v.(ii) Let ab = 0S ∈ S. If x, y ∈ N are such that bx by = 0M then b = 0S ,ε(by)bx = oM , ε(by)b = 0s, oS and ε(by) = oS . Of course, a = ε(v) < ε(by),by < v and ε(by) ∈ R3 = R \ 0S , oS. If a = 0S (equivalently, v = oN ) then(a, ε(by)) ∈ R3 × R3 and (ab, ε(by)b) = (0S , ε(by)b) /∈ R3 × R3. In particular,the relation α3 = (R3 × R3) ∪ idR is not a congruence of the right semimoduleRS . Similarly, α1 = (R1 ×R1) ∪ idR, where R1 = R \ 0S, is not a congruenceof RS .(iii) Let ab = 0S = b and let bx ≤ by for all x, y ∈ N such that by = 0M . Now,bx1 = by1 whenever bx1 = 0M = by1, x1, y1 ∈ N . Since ab = 0S = b, we haveb /∈ R, and hence there is w ∈ K such that bM = 0M , w, oM, bN = 0M , wand ε(w)b = 0S (cf. 3.22(iv)).

If bw = 0M then (b + ε(w))z = ε(w)z for every z ∈ M , so that b ≤ ε(w),b2 = 0S = ε(w) and w = oN . We have bN ≤ v, and so w ≤ v, a = ε(v) ≤ ε(w).

If bw = 0M then bw = w, and so bz = b2z for every z ∈M and we get b2 = b.

3.24 Remark. Assume that the condition (f1) is satisfied.(i) If u, v ∈ N are such that u < v then ε(v) < ε(u), and hence for every x ∈ Kthere is c ∈ S with cx ≤ v and cx u. In particular, if u = 0M and v = oMthen cx ∈ K. If v is minimal in K (and u = 0M ) then we get cx = v.(ii) If v is minimal in K then v ∈ Sx for every x ∈ K.

Page 657: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A CONSTRUCTION OF CONGRUENCE-SIMPLE SEMIRINGS 643

(iii) If K ⊆ Sv for a minimal element v ∈ K then (f2) is true.(iv) Let A denote the subsemimodule of SM generated by 0M , oM and all min-imal elements from K. Then A ⊆ Sx for every x ∈ K. Thus (f2) is true,provided that A = M .(v) (cf. 3.19) Assume that the set K contains the smallest element w. If a, b ∈ Rare such that a < b then acw = 0M and bcw = oM for some c ∈ S. Sincecw = oM , we have c = oS . Furthermore, bcw = oM implies bcL = oM, whereL = M \ 0M, and hence bc = oS . Of course, c /∈ R follows from 3.1(ii). If|R| ≥ 3 then we can choose b = oS .(vi) Assume that oN ∈ N . If a, b ∈ R are such that a < b then acoN = 0M andbcoN = oM for some c ∈ S. Since coN = 0M , we have c = 0S . Furthermore,acoN = 0M implies acN = 0M and ac = 0S (see 3.2(iv)). If |R| ≥ 3 then wecan choose a = 0S .

4. Auxiliary results (c)

Let S be a semiring and M (=S M) a characteristic (left S-)semimodule (seethe preceding section). Furthermore, let α be a congruence of the semimoduleRS such that α = idR and α = R × R. We put A = a ∈ R | (a, oS) /∈ α andB = R \A. Thus B = b ∈ R | (b, oS) ∈ α is just the block of α containing theabsorbing element oS and we have A = ∅. If 0S ∈ S then 0S ∈ A.

4.1 Lemma. Assume that the set A has no maximal element. Then:(i) There is an infinite strictly increasing sequence a1 < a2 < a3 < . . . ofelements from A.(ii) If b ∈ B and i ≥ 1 then b ai.

Proof. If b ≤ ai then (ai, oS) = (ai + b, ai + oS) ∈ α, a contradiction.

4.2 Lemma. Let a0 ∈ R \ ε(N). Then:(i) 0M ∈ C = x ∈M | a0x = 0M and C(+) is a subsemilattice of M(+).(ii) The set C has no maximal element.(iii) a0 < ε(x) for every x ∈ C.(iv) If C = N then a0 = 0S ∈ S.

Proof. If v ∈ C is maximal in C then v = oC ∈ C, ε(v)x = 0M = a0x for x ≤ vand ε(v)y = oM for y v. But y v means y /∈ C, a0y = 0M and a0y = oMby 3.1(ii). Thus ε(v)z = a0z for every z ∈ M and ε(v) = a0, a contradictionBy 3.5(i), we get a0 < ε(x) for every x ∈ C. If C = N then a0N = 0M anda0 = 0S by 3.2.

4.3 Lemma. Let a0 ∈ R \ ε(N). Then:(ii) There is an infinite strictly increasing sequence x1 < x2 < x3 < . . . ofelements from C.(ii) If u ∈M \ C then u xi for every i ≥ 1.

Page 658: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

644 Barbora Batıkova, Tomas Kepka and Petr Nemec

(iii) ε(x1) > ε(x2) > ε(x3) > . . . is an infinite strictly decreasing sequence ofelements from R such that ε(xi) > a0 for every i ≥ 1.

Proof. Use 4.2 and 3.5(ii).

4.4 Lemma. If a0 is maximal in A then (a0, a) /∈ α for every a ∈ R such thata0 < a.

Proof. We have a /∈ A, (a, oS) ∈ α, and hence (a0, a) /∈ α.

4.5 Lemma. Let a, b ∈ R, c ∈ S and x ∈M be such that (a, b) ∈ α, a < b andacx = bcx. Then x ∈ K, ε(x) < bc+ ε(x) = a ∈ R and (ε(x), a) ∈ α.

Proof. Since acx = bcx, we have acx = 0M and bcx = oM by 3.1(ii). Conse-quently, x, cx ∈ K and (ac+ε(x))y ≤ (ac+ε(x))x = acx+ε(x)x = 0M for y ≤ x.On the other hand, if z x then (ac + ε(x))z = oM . Then ac + ε(x) = ε(x)and ac ≤ ε(x). Furthermore, (ε(x), a) = (ac+ ε(x), bc+ ε(x)) ∈ α and ε(x) ≤ a.Since ax = bcx+ ε(x)x = oM = 0M = ε(x)x, we conclude that ε(x) < a.

4.6 Lemma. Assume that (f1) is true. Then for every x ∈ K there is a ∈ Rwith ε(x) < a and (ε(x), a) ∈ α.

Proof. Since α = idR, there are a, b ∈ R with a < b and (a, b) ∈ α. By (f1),acx = bcx for some c ∈ S. The rest follows from 4.5.

4.7 Lemma. Assume that (f1) is true. If a0 is maximal in A then a0 /∈ ε(N).

Proof. Since a0 ∈ A, we have a0 = oS = ε(0M ). The rest is clear from 4.4 and4.6.

4.8 Lemma. Aassume that (f1) is true and A \ 0S ⊆ ε(N). If a ∈ A \ 0Sthen:(i) There is an infinite strictly increasing sequence a = a1 < a2 < a3 < . . . ofelements from A such that all these elements belong to the same block of thecongruence α.(ii) If b ∈ B then b ai for every i ≥ 1.(iii) There is an infinite strictly decreasing sequence x1 > x2 > x3 > . . . ofelements from K such that ai = ε(xi) for every i ≥ 1.(iv) If x ∈ N is such that x ≥ xj for some j ≥ 1 (equivalently, ε(x) ≤ aj) thenε(x) ∈ A.

Proof. We have a1 = a = ε(x1) for some x1 ∈ K. By 4.6, there is a2 ∈ R witha1 < a2 and (a1, a2) ∈ α. Clearly, a2 ∈ A \ 0S, and so a2 = ε(x2) for somex2 ∈ K. Now, x1 > x2 and we can proceed in this way on.

Page 659: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A CONSTRUCTION OF CONGRUENCE-SIMPLE SEMIRINGS 645

4.9 Lemma. Assume that (f1) is true and A \ 0S ⊆ ε(N). If the set A hasat least one maximal element then 0S ∈ S, A = 0S and B = R \ 0S.

Proof. If a0 is maximal in A then a0 /∈ ε(N) by 4.7, and hence a0 = 0S ∈ S.Since 0S is maximal in A, we have A = 0S and B = R \ 0S.

5. Auxiliary results (d)

In this section, let S be a semiring such that R = R(S) = ∅.

5.1 Lemma. Assume that 0S ∈ S and the right semimodule RS is faithful.Then 0S = 0R ∈ R and the following conditions are equivalent:

(i) α1 = (R1 ×R1) ∪ idR, where R1 = R \ 0S, is a congruence of RS .

(ii) ab = 0S for all a ∈ R1 and b ∈ S1 = S \ 0S.

(iii) cd = 0S for all c, d ∈ S1.

(iv) Either |S| = 1 or S1 is a subsemiring of S.

Proof. Proceeding similarly as in the proof of 2.2(i), we show that 0S = 0R ∈ R.Now, if α1 is a congruence of RS and if ab = 0S for some a ∈ R1 and b ∈ S1 then(0S , a

′b) = (ab, a′b) ∈ α1 for every a′ ∈ R1 and it follows that a′b = 0S . ThusR1b = 0S. Since 0Sb ≤ ab = 0S , we have Rb = 0S. Of course, R0S ≤ Rb,and therefore Rb = 0S = R0S . Since RS is faithful, we conclude that b = 0S ,a contradiction. We have proved that ab = 0S . If cd = 0S for some c, d ∈ S1then ec = e0S = 0S for some e ∈ R and we have ec ∈ R1 and ecd = e0S = 0S .The rest is clear.

5.2 Lemma. Assume that oS ∈ S and the right semimodule RS is faithful.Then oS = oR ∈ R and the following conditions are equivalent:

(i) α2 = (R2 ×R2) ∪ idR, where R2 = R \ oS, is a congruence of RS .

(ii) a+ b = oS = ac for all a, b ∈ R2 and c ∈ S2 = S \ oS.

(iii) Either |S| = 1 or S2 is a subsemiring of S.

Proof. We can proceed similarly as in the proof of 5.1.

5.3 Remark. Assume that oS ∈ S, the semimodule RS is faithful and oS /∈R2S2. Assume, furthermore, that the set R2 has no maximal element and thatα2 is not a congruence of RS . Then α2 = idR, R is infinite and, by 5.2, a+b = oSfor some a, b ∈ R2. Moreover, there is an infinite strictly increasing sequencea = a1 < a2 < a3 < . . . of elements from R2. Since a + b = oS , we have b aifor every i ≥ 1.

Page 660: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

646 Barbora Batıkova, Tomas Kepka and Petr Nemec

5.4 Remark. Assume that oS ∈ S (0S ∈ S) and oS ∈ R (0S ∈ R) (cf. 2.1,2.2, 2.3 and 2.4). Put A = a ∈ S | oSa = oS (A = a ∈ S | 0Sa = 0S ) andB = S \ A. Clearly, oS ∈ A (0S ∈ A), A is a subsemiring of S, A + S = A(B + S = B) and SB ⊆ B. Further, put β = (A×A) ∪ (B ×B).(i) β = idS iff |S| = 1, 2.(ii) β = S × S iff oS (0S) is multiplicatively absorbing (equivalently, |R| = 1).(iii) If S2 = S \ oS is a subsemiring of S then β is a congruence of thesemiring S.(iv) If |S| ≥ 3, |R| ≥ 2 and S is a simple semiring then S2 is not a subsemiringof S (cf. 5.2 and 2.10).

5.5 Proposition. Assume that |R| ≥ 3 and the right semimodule RS is bothfaithful and simple (cf. 2.10). Then:(i) If 0S ∈ S then 0S ∈ R and ab = 0S for some a ∈ R1 and b ∈ S1.(ii) If oS ∈ S then oS ∈ R and either a+ b = oS for some a, b ∈ R2 or cd = oSfor some c ∈ R2 and d ∈ S2.

Proof. Use 5.1 and 5.2.

6. Main results

Let S be a semiring and M (=S M) be a characteristic (left S-) semimodule (inparticular, |M | ≥ 3 and |S| ≥ |R| ≥ 2). Put N = M \ oM, L = M \ 0M,K = M \ 0M , oM, R1 = R \ 0S, R2 = R \ oS and R3 = R \ 0S , oS.Consider the following four conditions:

(g1) Any infinite strictly increasing sequence of elements from K is upwardscofinal in K.

(g2) Any infinite strictly decreasing sequence of elements from K is downwardscofinal in K.

(h1) Any infinite strictly increasing sequence of elements from R3 is upwardscofinal in R3.

(h2) Any infinite strictly decreasing sequence of elements from R3 is downwardscofinal in R3.

6.1 Lemma. (i) If (g1) is true then (h2) is true.(ii) If (g1) and (g2) are true then (h1) is true.(iii) If (h1) is true then (g2) is true.

Proof. See 3.9, 3.10, 3.11 and 3.12.

6.2 Lemma. (i) If (g1) is true then R1 ⊆ ε(N) ⊆ R.(ii) If (h2) is true and oN /∈ N then (g1) is true.

Page 661: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A CONSTRUCTION OF CONGRUENCE-SIMPLE SEMIRINGS 647

(iii) If (h2) is true and oN ∈ N then every infinite strictly increasing sequenceof elements from M is upwards cofinal in N \ oN.

Proof. See 3.9, 3.10, 3.11 and 3.12.

6.3 Lemma. Assume that (g1),(g2) or (h1),(h2) are true. Then:(i) If the set K has no minimal element then the ordered set L(≤) is a latticeand R2 +R2 = R2.(ii) If the set K has a minimal element, but no smallest one, then |M | ≥ 4 andR2 +R2 = R2 (i.e., oS ∈ R2 +R2).(iii) If the set K has the smallest element then the set R2 has the greatest elementand R2 +R2 = R2.

Proof. (i) Given x ∈ L, there is an infinite strictly decreasing sequence x =x1 > x2 > x3 > . . . of elements from L. If (h1) is true then (g2) is true by 6.1(iii).If (g2) is true and y ∈ L then y ≥ xi for some i ≥ 1. Thus the element xi ∈ Lis a lower bound of elements x and y. Now, put A = z ∈ L | z ≤ x, z ≤ y .The set A is non-empty and if oA ∈ A then oA = inf(x, y). On the other hand,if oA /∈ A and (g1) is true then N ⊆ A, and therefore either x ≤ y or y ≤ x, acontradiction with oA /∈ A. Finally, if oA /∈ A and (g1) is not true then (h2) istrue, oN ∈ N and N \ oN ⊆ A (use 6.2(ii),(iii)). But then x, y ⊆ oN , oMand we get a contradiction again.

It remains to show that R2 + R2 = R2. For, let a, b ∈ R2 be such thata+ b = oS . If a = ε(u) and b = ε(v) for some u, v ∈ N then u, v ∈ K and z ≤ u,z ≤ v for some z ∈ K (since L is a lattice) and a = ε(u) ≤ ε(z), b = ε(v) ≤ ε(z).Thus oS = a + b ≤ ε(z) ∈ R2, a contradiction. Therefore, we can assume thata /∈ ε(N).

Since a+b = oS and a, b ∈ R2, we see that a, b ∈ R1. According to 6.2(i), thecondition (g1) is not true, and hence (h1), (h2) are true and oN ∈ N (see 6.2(ii)).By 3.4, 0S = ε(oN ) and, by 3.8, oA /∈ A = x ∈ M | ax = 0M . Using 6.2(iii),we conclude that A = N \oN. Consequently, (a+b)x = 0M+bx = bx for everyx ∈ N\oN. Of course, (a+b)oM = oM = boM and (a+b)oN = oM+boN = oM .Since b = 0S = ε(oN ), we have bN = 0M, and so boN = oM . We have provedthat (a + b)y = by for every y ∈ M and, since SM is faithful, it means thatoS = a+ b = b = oS , the final contradiction.(ii) Clearly, |M | ≥ 4 and we use 3.21.(iii) Let w be the smallest element ofK. If ε(w) is the greatest element ofR2 thenR2 + R2 = R2 trivially. If not then a ε(w) for some a ∈ R2. Then a /∈ ε(N)and, since SM is faithful, there is v ∈ M with av ε(w)v. Clearly, v ∈ K,w ≤ v, av = 0M , and hence av = oM (see 3.1(ii)). Since ε(w)v = av = oM ,we have ε(w)v = 0M , and so v ≤ w. Thus w = v and aw = oM . We havea = 0S (otherwise aw ≤ ε(w)v) and it follows from 6.2(i) that (g1) is not true.Using 6.2(ii), we see that oN ∈ N and (h2) is true. Besides, it follows from 3.8and 6.2(ii) that a(N \ oN) = 0M. Since aw = oM , we get w = oN and,

Page 662: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

648 Barbora Batıkova, Tomas Kepka and Petr Nemec

w being the smallest element in K, we get |M | = 3, |R| = 2, R2 = 0S anda = 0S = ε(w), a contradiction.

6.4 Remark. Let (h2) be true and let oN ∈ N . If a ∈ R \ ε(N) then a is thesmallest element in R1.

6.5 Lemma. Assume that (g1),(g2) or (h1),(h2) are true. Then:(i) If the set R2 has no maximal element then R2 +R2 = R2.(ii) If v ∈ K is minimal in K then ε(v) is maximal in R2.(iii) If a ∈ R2 is maximal in R2 then a = ε(w), where w is minimal in K.(iv) If a ∈ R2 is maximal, but not the greatest element of R2 then R2+R2 = R2.(v) If w ∈ K is the smallest element of K then ε(w) is the greatest element ofR2.(vi) If a ∈ R2 is the greatest element of R2 then R2 + R2 = R2 and a = ε(w),where w is the smallest element of K.

Proof. (i) By 6.1(ii), the condition (h1) is true and the equality follows easily.(ii) Let a ∈ R be such that ε(v) ≤ a. If a = ε(u), u ∈ N , then u ≤ v and eitheru = v and a = ε(v) or u = 0M and a = oS . On the other hand, if a /∈ ε(N) thena = 0S (otherwise a = 0S = ε(v)) and it follows from 6.2(i),(ii) and 6.4 that a isthe smallest element of R1. Since ε(v) < a, we get ε(v) = 0S , v = oN , |M | = 3and (g1) is true. Then a ∈ ε(N) by 6.2(i), a contradiction.(iii) If a /∈ ε(N) then either a = 0S , |R| = 2, |N | = 3, a contradiction, or ais the smallest element of R1, |R| = 3, |M | ≤ 3, a contradiction again. Thusa ∈ ε(N).(iv) This is obvious.(v) By (ii), ε(w) is maximal in R2. If a ε(w), a ∈ R2, then a /∈ ε(N),a contradiction with 6.2(i) and 6.4.(vi) Clearly, R2 + R2 = R2. If a /∈ ε(N) then either a = 0S , |M | = 3 anda = ε(oN ), a contradiction, or a is the smallest element of R1, so that |R| = 3,R = 0S , a, oS, |M | = 3, (g1) is true and a ∈ ε(N), a contradiction again.

In the reamining part of this section, assume that the condition (f1) (see thedefinition before 3.16) is satisfied and either the conditions (g1),(g2) are trueor the conditions (h1),(h2) are true (then, due to 6.1, the conditions (h1), (h2),(g2) are true anyway).

6.6 Theorem. Assume that 0s /∈ S (then oN /∈ N – see 3.4). The semiring Sis simple if and only if the following two conditions are satisfied:

1. S = R+ S.

2. Either oS ∈ R2S2 (oS ∈ S2S2, resp.) or the set K contains at least oneminimal element (equivalently, the set R2 has a maximal element).

Proof. (i) Let S be simple. Then S = R + S follows from 2.7 and the rightsemimodule RS is simple and faithful (2.4, 2.7 and/or 3.7). Since 0S /∈ S, we

Page 663: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A CONSTRUCTION OF CONGRUENCE-SIMPLE SEMIRINGS 649

have oN /∈ N by 3.4, |N | ≥ 3, |R| ≥ 3 and α2 = (R2 × R2) ∪ idR = idR, R × R.By 5.2, oS ∈ (R2 + R2) ∪ R2S2. If K has no minimal element then oS ∈ R2S2follows from 6.3(i).(ii) Assume that the conditions (1) and (2) are satisfied. With respect to 2.10,we have to check that the right semimodule RS is simple. For, let α = idR, R×Rbe a congruence of RS and A = a ∈ R | (a, oS) /∈ α .

Let a0 ∈ A \ ε(N). The condition (h2) is true, and hence a0 = 0S ∈ S by4.3(iii), a contradiction with 0S /∈ S. It follows that A ⊆ ε(N). By 4.9, the setA has no maximal element.

Let a, b ∈ A. By 4.8(i), there are sequences a = a1 < a2 < a3 < . . . andb = b1 < b2 < b3 < . . . of elements from A such that (a, ai) ∈ α and (b, bi) ∈ αfor every i ≥ 1. Since (h1) is true, a ≤ bj and b ≤ ak for some j, k ≥ 1.From this, (a, b) ∈ α and it means that the set A is contained in a block of α.Furthermore, it follows from 4.8(ii) that R \ A = oS. Consequently, α = α2

and, using (2) and 5.2, we conclude that the set K contains at least one minimalelement. We have R2 +R2 = R2 (since α2 is a congruence of RS), and thereforeK has the smallest element by 6.3(ii), a contradiction with 3.19 and 5.2.

6.7 Theorem. Assume that 0S ∈ ε(N) (equivalently, oN ∈ N). Then thesemiring S is simple if and only if the condition 6.6(2) is satisfied.

Proof. (i) Let S be simple. If |R| ≥ 3 then α2 = (R2 × R2) ∪ idR is not acongruence of RS and 6.6(2) follows from 5.2 and 6.3(i) (see the proof of 6.6).On the other hand, if |R| = 2 then |M | = 3, |S| = 3, S = 0S , 1S , oS and S isnot simple ((0S , 0S), (0S , 1S), (1S , 0S), (1S , 1S), (oS , oS) is a congruence of S).(ii) Let the condition 6.6(2) be satisfied. With respect to 2.10, we have toshow that RS is simple. For, let α = idR, R × R be a congruence of RS andA = a ∈ R | (a, oS) /∈ α .

We have 0S ∈ A ∩ ε(N). If a0 ∈ A \ ε(N) then a0 = 0S follows from 4.3(iii)and we see that A ⊆ ε(N). By 4.7, the set A has no maximal element. By 4.6,(0S , a) ∈ α for at least one a ∈ R1; of course a ∈ A. Proceeding similarly asin the proof of 6.6, we show that the set A \ 0S is contained in a block of α.Consequently, the set A is contained in a block of α, R \A = oS (see 4.8(ii))and α = α2. Now, again, we proceed similarly as in the proof of 6.6 to gain thefinal contradiction.

6.8 Theorem. Assume that 0S ∈ S \ ε(N) (equivalently, 0S ∈ S and oN /∈ N).Then the semiring S is simple if and only if the conditions 6.6(2) is satisfiedand, moreover, the following condition is satisfied as well:

1. 0S ∈ R1S1(0S ∈ S1S1, resp.).

Proof. (i) Let S be simple. Since oN /∈ N , we have |N | ≥ 3, |R| ≥ 3 andα1, α2 = idR, R × R (see 5.1 and 5.2). Since RS is simple by 2.10, neither α1

nor α2 is a congruence of RS and it remains to use 5.1, 5.2 and 6.3(i).

Page 664: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

650 Barbora Batıkova, Tomas Kepka and Petr Nemec

(ii) Let the conditions (1) and 6.6(2) be satisfied. In view of 2.10, we have tocheck that the right S-semimodule RS is simple. For, let α = idR, R × R bea congruence of RS and A = a ∈ R | (a, oS) /∈ α. Then |R| ≥ 3, 0S ∈ A,oS /∈ A and it follows from 4.2 and 4.3 that A′ = A \ 0S ⊆ ε(N). If A′ = ∅then A = 0S and α = α1, a contradiction with (1) and 5.1. It means thatA′ = ∅. Proceeding similarly as in the proof of 6.6, we find that A′ × A′ ⊆ αand R \A = oS. Thus A′ = R3 and R3 ×R3 ⊆ α.

Assume, for a moment, that ab = oS for some a ∈ R2 and b ∈ S2. If a = 0Sthen Sb = oS = SoS and b = oS , RS being faithful, a contradiction. Thusa ∈ R3 and, since b = oS , there is v ∈ K with bv = oM . We have bv ∈ N ,ε(bv)bv = 0M and ε(bv)b = oS . If ε(bv) = oS (i.e., bv = 0M ) then a ≤ ε(bv)and oS = ab ≤ ε(bv)b = oS , a contradiction. Thus ε(bv) = oS and bv = 0M .On the other hand, ε(bv) = 0S (since 0S /∈ ε(N)), and therefore ε(bv) ∈ R3,(a, ε(bv)) ∈ α3 = (R3 × R3) ∪ idR and, finally, (ab, ε(bv)b) = (oS , ε(bv)b) /∈ α3.We see that α3 is not a congruence of RS and, since α3 ⊆ α, we come to theequality α = α2. But this is a contradiction with ab = oS and 5.2.

We have proved that oS /∈ R2S2. Now, according to 6.6(2), the set K has atleast one minimal element. If a, b ∈ R2 are such that a+ b = oS then a, b ∈ R3,(a, b) ∈ α and (a, oS) = (a+ a, a+ b) ∈ α, a contradiction. Thus oS /∈ R2 + R2

and. using 6.3(ii), we conclude that the set K has the smallest element, acontradiction with 3.19.

6.9 Remark. Assume that |R| = 2. Then |M | = 3, 2 ≤ |S| ≤ 3 and both S1and S2 are subsemirings of S. In fact, if |S| = 2 then S = R is simple, but thecondition (f1) is not true. If |S| = 3 then S = 0S , 1S , oS is not simple.

6.10 Theorem. The semiring S is simple if and only if the following threeconditions are satisfied:

1. S = R+ S.

2. S2 = S \ oS is not a subsemiring of S.

3. If 0S ∈ S then S1 = S \ 0S is not a subsemiring of S.

Proof. (i) Let S be simple. Then S = R + S follows from 2.7. The rightsemimodule RS is simple and faithful. Consequently, |R| ≥ 3 anyway andα2 = idR, R × R (α1 = idR, R × R provided that 0S ∈ S). By 5.2 and 5.1,neither S2 nor S1 is a subsemiring of S.(ii) Let the conditions (1), (2) and (3) be fulfilled. It follows from (1) and (2)thar either a+ b = oS for some a, b ∈ R2 or cd = oS for some c ∈ R2 and d ∈ S2.From (1) and (3) follows that if 0S ∈ S then ef = 0S for some e ∈ R1 and f ∈ S1(see 5.2 and 5.1). If the set K has no minimal element then R2 + R2 = R2 by6.3(i), and hence cd = oS and we use either 6.6 or 6.7 or 6.8 to show that Sis simple. On the other hand, if the set K has a minimal element then thecondition 6.6(2) is satisfied and we use 6.6, 6.7 or 6.8.

Page 665: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A CONSTRUCTION OF CONGRUENCE-SIMPLE SEMIRINGS 651

7. Constructions

Let M (= M(+)) be a semilattice containing at least three elements and suchthat 0M ∈ M and oM ∈ M . The set E (= E0,1) of all endomorphisms f ofM such that f(0M ) = 0M amd f(oM ) = oM is a unitary subsemiring of thefull endomorphism semiring of M . The set (D0,1 =)D = f ∈ E | |f(M)| ≤ 2 (= f ∈ E | f(M) = 0M , oM is an ideal of the semiring E and there is aone-to-one correspondence between endomorphisms q ∈ D and prime ideals ofthe semilattice M ; namely, q ↔ Aq = x ∈ M | q(x) = oM . If f ∈ E thenAqf = x ∈M | f(x) ∈ Aq and fq = q. Consequently, D = R(E) and, in fact,if E is a subsemiring of E such that D ⊆ E then R(E) = D.

For x ∈ N = M \ oM define qx ∈ D by qx(y) = 0M for y ≤ x andqx(z) = oM for z x. Then Aq = z ∈ M | z x and the endomorphismsqx correspond to principal prime ideals of the semilattice M . We put (B0,1 =)B = qx |x ∈ N and (C0,1 =) C = qx1 + · · ·+ qxn |n ≥ 1, xi ∈ N . Clearly,C is just the subsemiring of D generated by the set B. The following threelemmas are obvious:

7.1 Lemma. C = B iff the ordered set M(≤) is a lattice.

7.2 Lemma. D = B iff oA ∈ A for every (proper) subsemilattice A of M .

7.3 Lemma. Assume that every infinite strictly increasing sequence of elementfrom M is upwards cofinal in N . Then D = B iff either oN ∈ N or N + N =N .

In the remaining part of this section, let E be a subsemiring of E such thatB ⊆ E. The following three lemmas are obvious.

7.4 Lemma. (i) C ⊆ E.(ii) R(E) = E ∩D.(iii) q0M = oE ∈ R(E).

7.5 Lemma. (i) If 0E ∈ E then 0E ∈ R(E) and N +N = N .(ii) If x ∈ N then qx = 0E iff x = oN ∈ N .(iii) If N +N = N then the mapping ξ, where ξ(N) = 0M and ξ(oM ) = oM ,belongs to D. If oN ∈ N then ξ = qoN ∈ B.(iv) If N +N = N and ξ ∈ E then ξ = 0E.

7.6 Lemma. Assume that every infinite strictly increasing sequence of elementsfrom M is upwards cofinal in N . Then:(i) If N +N = N then oN /∈ N , 0E /∈ E and R(E) = B = D.(ii) If oN ∈ N then oN ∈ N , 0E = qoN and R(E) = B = D.(iii) If N +N = N and oN /∈ N then ξ ∈ D (see 7.5(iii)) and 0E ∈ E iff ξ ∈ E(then 0E = ξ).(iv) If N +N = N , oN /∈ N and ξ ∈ E then ξ /∈ B and R(E) = D = B ∪ ξ.(v) If N+N = N , oN /∈ N and ξ /∈ E then ξ /∈ B = R(E) and D = B∪ξ.

Page 666: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

652 Barbora Batıkova, Tomas Kepka and Petr Nemec

The semilattice M becomes a left E-semimodule via the natural action ofendomorphisms and we see readily that the conditions 3(a),. . . ,(e) are fulfilled.In our case, ε(x) = qx, x ∈M \ oM and EM is a characteristic semimodule.

In what follows, we restrict ourselves to the case when every infinite strictlyincreasing (decreasing, resp.) sequence of elements from M is upwards (down-wards, resp.) cofinal in N = M \ oM (L = M \ 0M, resp.). This meansthat the conditions 6(g1) and 6(g2) are fulfilled. We still have to introduce twoadditional conditions.

(F1) For all x ∈ N and y, z ∈ K = M \ 0M , oM, x < y, there is at least onef ∈ E such that f(z) ≤ y and f(z) x.

(F2) For all x, y ∈ K there is at least one f ∈ E such that f(x) = y.

Notice that (F2) implies (F1) and if (F2) is true then 0M, oM, 0M , oMand M are all (pair-wise different) subsemimodules of EM .

7.7 Assume that N +N = N (i.e., oM ∈ N +N). Using (g1), we see that thereis no infinite strictly increasing sequence of elements in M . By 7.6, the set Nhas at least two maximal elements, 0E /∈ E and R(E) = B (= D). The orderedset M(≤) is a lattice. Besides, (F1) is equivalent to 3(f1).

7.7.1 Theorem. Assume that the set L (or K) has at least one minimal ele-ment. Then:(i) There is no infinite strictly decreasing sequence of elements in M .(ii) If (F1) is true then the semiring E is simple if and only if the set B isdownwards cofinal in E (i.e., E ⊆ E +B).

Proof. (i) This follows from (g2).(ii) Since N +N = N , we have |M | ≥ 4. Now, (F1) implies (f1) and it remainsto use 6.6.

7.7.2 Theorem. Assume that the set L has no minimal element and (F1) istrue. The following conditions are equivalent:

(i) The semiring E is simple.

(ii) B is downwards cofinal in E (i.e., E ⊆ E + B) and there are w ∈ K andf ∈ E such that f(K) = oM and f(x) w for every x ∈ K.

(iii) B is downwards cofinal in E and there are f, g ∈ E such that f(K) =oM = g(K) and fg(K) = oM.

Proof. (i) implies (ii). We use 6.6. By 6.6(1), E = E + B and we take intoaccount 6.6(2), where oE = q0M .(ii) implies (iii). We have qwf = q0M = oE , qw = oE = f .(iii) implies (i). Use 6.6 again.

Page 667: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A CONSTRUCTION OF CONGRUENCE-SIMPLE SEMIRINGS 653

7.8 Assume that oN ∈ N . Then N + N = N , there is no infinite strictlyincreasing sequence of elements in M , M(≤) is a lattice, 0E = qoN ∈ E andR(E) = B = D (see 7.1 and 7.6). Clearly, ( F1) is equivalent to 3(f1).

7.8.1 Theorem. Assume that the set L (or K) has at least one minimal ele-ment. Then:(i) There is no infinite strictly decreasing sequence of elements in M .(ii) If (F1) is true then the semiring E is simple.

Proof. Use 6.7.

7.8.2 Theorem. Assume that the set L has no minimal element and (F1) istrue. The following conditions are equivalent:

(i) The semiring E is simple.

(ii) There are w ∈ K and f ∈ E such that f(K) = oM and f(x) w forevery x ∈ K.

(iii) There are f, g ∈ E such that f(K) = oM = g(K) and fg(K) = oM.

Proof. Use 6.7.

7.9 Assume that oN /∈ N , N + N = N (then N has no maximal element) andξ ∈ E (by 7.6(iii), we have ξ ∈ E iff 0E ∈ E, and then 0E = ξ). By 7.6(iv),R(E) = D = B ∪ξ and ξ = 0E /∈ B. Now, (F1) is equivalent to 3(f1) (use thefact that oN /∈ N = N +N).

7.9.1 Theorem. Assume that the set L (or K) has at least one minimal ele-ment. Then:(i) There is no infinite strictly decreasing sequence of elements in M .(ii) If (F1) is true then the semiring E is simple if and only if the following twoequivalent conditions are satisfied:

(ii1) There are w ∈ K and f ∈ E such that 0M = f(K) ≤ w.

(ii2) There are f, g ∈ E such that f(K) = 0M = g(K) and fg(K) = 0M.

Proof. Use 6.8.

7.9.2 Theorem. Assume that the set L has no minimal element and (F1) istrue. The following conditions are equivalent:

(i) The semiring E is simple.

(ii) There are w1, w2 ∈ K and f1, f2 ∈ E such that f1(K) = oM, f2(K) =0M, f1(K) w1 and f2(K) ≤ w2 for every x ∈ K.

Page 668: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

654 Barbora Batıkova, Tomas Kepka and Petr Nemec

(iii) There are f1, f2, g1, g2 ∈ E such that f1(K) = oM = g1(K), f2(K) =0M = g2(K), f1g1(K) = oM and f2g2(K) = 0M

Proof. Use 6.8.

7.10 Assume that oN /∈ N , N + N = N (then N has no maximal element)and ξ /∈ E. Then 0E /∈ E by 7.6(iii) and, by 7.6(v), R(E) = B. Now, (F1) isequivalent to 3(f1).

7.10.1 Theorem. Assume that the set L (or K) has at least one minimalelement. Then:(i) There is no infinite strictly decreasing sequence of elements in M .(ii) If (F1) is true then the semiring E is simple if and only if E ⊆ E +B.

Proof. Use 6.6.

7.10.2 Theorem. Assume that the set L has no minimal element and (F1) istrue. The following conditions are equivalent:

(i) The semiring E is simple.

(ii) E ⊆ E + B and there are w ∈ K and f ∈ E such that f(K) = oM andf(x) w for every x ∈ K.

(iii) E ⊆ E + B and there are f, g ∈ E such that f(K) = oM = g(K) andfg(K) = oM.

Proof. Use 6.6.

7.11 Remark. (cf. 3.22) (i) Assume that there is an endomorphism f ∈ Esuch that f(M) is finite, f(N) ⊆ N and |f(M)| ≥ 3.

We have f(M) = 0M , w1, . . . , wn, oM, n ≥ 1, wi ∈ K. Assume thatw = w1 + · · · + wn ∈ K (e.g., n = 1 or N + N = N) and w = oN . Thenqwf(N) ⊆ qw(0M , w1, . . . , wn) = 0M. Consequently, qwf = ξ = 0E ∈ E.If oN ∈ N then qwf = qoN = 0E . Of course, since w = oN , we have qw = 0E .Since f /∈ R(E), we have f = 0E as well.(ii) Assume that N + N = N and let u, v ∈ K be such that u < v. Putf(K) = u, g(K) = v, f(0M ) = 0M = g(0M ) and f(oM ) = oM = g(oM ).Clearly, f, g ∈ E, f(M) = 0M , u, oM, g(M) = 0M , v, oM, f(N) = 0M , u,g(N) = 0M , v, quf = ξ, f = ξ = qu, qug = q0M and qu = q0M = g.

Page 669: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A CONSTRUCTION OF CONGRUENCE-SIMPLE SEMIRINGS 655

References

[1] R. El Bashir, J. Hurt, A. Jancarık and T. Kepka, Simple commutativesemirings, J. Algebra, 263 (2001), 277-306.

[2] R. El Bashir and T. Kepka, Congruence-simple semirings, Semigroup Fo-rum, 75 (2007), 588-608.

[3] V. Flaska, One very particular example of a congruence-simple semiring,Europ. J. Comb., 30 (2009), 759-763.

[4] J. Golan, The Theory of Semirings with Applications in Mathematics andTheoretical Computer Science, Pitman Monographs, 54, Longman, Harlow,1992.

[5] V. Hebisch and H. J. Weinert, Halbringe - Algebraische Theorie und An-wendungen in der Informatik, Teubner, Stuttgart, 1993.

[6] J. Jezek and T. Kepka, The semiring of 1-preserving endomorphisms of asemilattice, Czech. Math. J., 59 (2009), 999-1003.

[7] J. Jezek, T. Kepka and M. Maroti, The endomorphism semiring of a semi-lattice, Semigroup Forum, 78 (2009), 21-26.

[8] A. Kendziorra, J. Zumbragel, Finite simple additively idempotent semir-ings, J. Algebra, 388 (2013), 43-64.

[9] G. Maze, C. Monico and J. Rosenthal, Public key cryptography based onsemigroup actions, Adv. Math. Commun., 1 (2007), 489-507.

[10] S. S. Mitchell and P. B. Fenoglio, Congruence-free commutative semirings,Semigroup Forum, 37 (1988), 79-91.

[11] C. Monico, On finite congruence-simple semirings, J. Algebra, 271 (2004),846-854.

[12] J. Zumbragel, Classification of finite congruence-simple semirings with zero,J. Algebra Appl., 7 (2008), 363-377.

Accepted: 3.05.2018

Page 670: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (656–670) 656

ON THE CONFORMAL CURVATURE TENSOR OFϵ-KENMOTSU MANIFOLDS

Abdul Haseeb∗

Department of MathematicsFaculty of ScienceJazan University, Jazan-2097Kingdom of Saudi [email protected]@jazanu.edu.sa

Mobin AhmadDepartment of MathematicsIntegral University, Kursi RoadLucknow-226026, [email protected]

Sheeba RizviDepartment of Mathematics

Integral University, Kursi Road

Lucknow-226026, India

[email protected]

Abstract. The conformal curvature tensor under certain curvature conditions hasbeen studied for an ϵ-Kenmotsu manifold with respect to the semi-symmetric non-metricconnection. Finally, we give an example of a 3-dimensional ϵ-Kenmotsu manifold withrespect to the semi-symmetric non-metric connection.

Keywords: ϵ-Kenmotsu manifolds, semi-symmetric non-metric connection, η-Einsteinmanifold, conformal curvature tensor.

1. Introduction

In 1972, K. Kenmotsu [14] studied a class of contact Riemannian manifoldssatisfying some special conditions. We call it Kenmotsu manifold. Kenmotsumanifolds have been studied by various authors such as J. B. Jun et al. [13],G. Pathak and U. C. De [17], M. M. Tripathi and N. Nakkar [19], A. Yildiz etal. [23] and many others. In 1993, A. Bejancu and K. L. Duggal [4] introducedthe concept of (ϵ)-Sasakian manifolds, which later on showed by X. Xufeng andC. Xiaoli [20] that the manifolds are real hypersurfaces of indefinite Kahlerianmanifolds. An (ϵ)-almost paracontact manifolds were introduced by M. M.Tripathi et al. [18], while the concept of (ϵ)-Kenmotsu manifolds was introduced

∗. Corresponding author

Page 671: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE CONFORMAL CURVATURE TENSOR OF ϵ-KENMOTSU MANIFOLDS 657

by U. C. De and A. Sarkar [8] who showed that the existence of new structureon indefinite metrics influences the curvatures.

In 1924, the idea of semi-symmetric linear connection on a differentiablemanifold was introduced by A. Friedmann and J. A. Schouten [9]. In 1930, E.Bartolotti [3] gave a geometrical meaning of such a connection. In 1932, H.A. Hayden [12] introduced semi-symmetric metric connection in a Riemannianmanifold and this was studied systematically by K. Yano [21].

A linear connection ∇ in a Riemannian manifold M is said to be a semi-symmetric connection if the torsion tensor T of the connection ∇

(1.1) T (X,Y ) = ∇XY − ∇YX − [X,Y ]

satisfiesT (X,Y ) = η(Y )X − η(X)Y,

where η is a non-zero 1-form associated with a vector field ξ and is defined byη(X) = g(X, ξ).

Further, a semi-symmetric connection is called a semi-symmetric non-metricconnection [1], if

(1.2) (∇Xg)(Y, Z) = ∇Xg(Y, Z)− g(∇XY, Z)− g(Y, ∇XZ)

= −η(Y )g(X,Z)− η(Z)g(X,Y ),

where X,Y, Z ∈ χ(M) and χ(M) is the set of all differentiable vector fields onM .

Let M be an n-dimensional ϵ-Kenmotsu manifold and ∇ be the Levi-Civitaconnection on M , the semi-symmetric non-metric connection ∇ on M is givenby [1]

(1.3) ∇XY = ∇XY + η(Y )X.

The semi-symmetric non-metric connection have been studied by severalauthors such as N. S. Agashe and M. R. Chafle [1], L. S. Das et al. [5], U. C. Deand S. C. Biswas [6], U. C. De and D. Kamilya [7], S. K. Pandey et al. [16], AjitBarman [2] and many others. Motivated by the above studies, in this paper westudy certain curvature conditions of an ϵ-Kenmotsu manifold with respect tothe semi-symmetric non-metric connection.

The paper is organized as follows : In Section 2, we give a brief intro-duction of an ϵ-Kenmotsu manifold. In Section 3, we obtain the relation be-tween the curvature tensor of an ϵ-Kenmotsu manifold with respect to the semi-symmetric non-metric connection and the Levi-Civita connection. In Section 4,we study quasi-conformally flat, ξ-conformally flat, pseudoconformally flat andϕ-conformally flat ϵ-Kenmotsu manifolds with respect to the semi-symmetricnon-metric connection and it is shown that in each case the manifold is an η-Einstein manifold. Section 5 is devoted to study ϵ-Kenmotsu manifolds withrespect to the semi-symmetric non-metric connection satisfying the curvaturecondition S · C = 0.

Page 672: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

658 ABDUL HASEEB, MOBIN AHMAD and SHEEBA RIZVI

2. Preliminaries

An n-dimensional smooth manifold (M, g) is said to be an ϵ-almost contactmetric manifold [8], if it admits a (1, 1) tensor field ϕ, a structure vector field ξ,a 1-form η and an indefinite metric g such that

(2.1) ϕ2X = −X + η(X)ξ,

(2.2) η(ξ) = 1,

(2.3) g(ξ, ξ) = ϵ,

(2.4) η(X) = ϵg(X, ξ),

(2.5) g(ϕX, ϕY ) = g(X,Y )− ϵη(X)η(Y )

for all vector fields X, Y on M, where ϵ is 1 or -1 according as ξ is space like ortime like vector field and rank ϕ is (n− 1). If

(2.6) dη(X,Y ) = g(X,ϕY )

for every X,Y ∈ χ(M), then we say that M(ϕ, ξ, η, g, ϵ) is an almost contactmetric manifold. Also, we have

(2.7) ϕξ = 0, η(ϕX) = 0.

If an ϵ-contact metric manifold satisfies

(2.8) (∇Xϕ)(Y ) = −g(X,ϕY )ξ − ϵη(Y )ϕX,

where ∇ denotes the Levi-Civita connection with respect to g, then M is calledan ϵ-Kenmotsu manifold [8].An ϵ-almost contact metric manifold is an ϵ-Kenmotsu manifold, if and only if

(2.9) ∇Xξ = ϵ(X − η(X)ξ).

Further, in an ϵ-Kenmotsu manifold, the following relations hold [8, 10, 11]:

(2.10) (∇Xη)Y = g(X,Y )− ϵη(X)η(Y ),

(2.11) R(X,Y )ξ = η(X)Y − η(Y )X,

(2.12) R(ξ,X)Y = η(Y )X − ϵg(X,Y )ξ,

Page 673: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE CONFORMAL CURVATURE TENSOR OF ϵ-KENMOTSU MANIFOLDS 659

(2.13) R(ξ,X)ξ = −R(X, ξ)ξ = X − η(X)ξ,

(2.14) η(R(X,Y )Z) = ϵ[g(X,Z)η(Y )− g(Y, Z)η(X)],

(2.15) S(X, ξ) = −(n− 1)η(X),

(2.16) Qξ = −ϵ(n− 1)ξ,

where g(QX,Y ) = S(X,Y ).

(2.17) S(ϕX, ϕY ) = S(X,Y ) + ϵ(n− 1)η(X)η(Y ).

We note that if ϵ = 1 and the structure vector field ξ is space like, then anϵ-Kenmotsu manifold is usual Kenmotsu manifold.

An ϵ-Kenmotsu manifold M is said to be an η-Einstein manifold if its Riccitensor S is of the form [22]

(2.18) S(X,Y ) = ag(X,Y ) + bη(X)η(Y ),

where a and b are scalar functions of ϵ.

3. Curvature tensor in an ϵ-Kenmotsu manifold with respect to thesemi-symmetric non-metric connection

Let M be an n-dimensional ϵ-Kenmotsu manifold. The curvature tensor R withrespect to the semi-symmetric non-metric connection ∇ is defined by

(3.1) R(X,Y )Z = ∇X∇Y Z − ∇Y ∇XZ − ∇[X,Y ]Z.

By virtue of (1.1) and (3.1), we have

R(X,Y )Z = R(X,Y )Z + η(Y )η(Z)X − η(X)η(Z)Y

+ ((∇Xη)Z)Y − ((∇Y η)Z)X,(3.2)

whereR(X,Y )Z = ∇X∇Y Z −∇Y∇XZ −∇[X,Y ]Z

is the Riemannian curvature tensor of the connection ∇. Using (2.10) in (3.2)we get

R(X,Y )Z = R(X,Y )Z + g(X,Z)Y − g(Y,Z)X

+ (1 + ϵ)[η(Y )X − η(X)Y ]η(Z).(3.3)

Now contracting X in (3.3), we get

(3.4) S(Y, Z) = S(Y,Z) + (1− n)g(Y,Z) + (1 + ϵ)(n− 1)η(Y )η(Z),

Page 674: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

660 ABDUL HASEEB, MOBIN AHMAD and SHEEBA RIZVI

where S and S are the Ricci tensors of the connections ∇ and ∇, respectivelyon M .This gives

(3.5) QY = QY + (1− n)Y + (1 + ϵ)(n− 1)η(Y )ξ.

Contracting again Y and Z in (3.4), it follows that

(3.6) r = r + n(1− n) + (1 + ϵ)(n− 1),

where r and r are the scalar curvatures of the connections ∇ and ∇, respectivelyon M .

Lemma 3.1. Let M be an n-dimensional ϵ-Kenmotsu manifold with respect tothe semi-symmetric non-metric connection, then

(3.7) R(X,Y )ξ = 0,

(3.8) R(ξ,X)Y = −(1 + ϵ)[g(X,Y )ξ − η(X)η(Y )ξ],

(3.9) S(Y, ξ) = 0,

(3.10) Qξ = 0.

Proof. By replacing Z = ξ in (3.3) and using (2.4) and (2.11), we get (3.7).(3.8) follows from (3.3) and (2.12). Taking Z = ξ in (3.4) and using (2.2), (2.4)and (2.15), we get (3.9). From (3.5), (3.16) and (2.2), we get (3.10).

Definition 3.2. The conformal curvature tensor C of type (1, 3) in an n-dimensional ϵ-Kenmotsu manifold with respect to the semi-symmetric non-metricconnection ∇ is given by ([15], [22])

C(X,Y )Z = R(X,Y )Z − 1

(n− 2)[S(Y,Z)X − S(X,Z)Y + g(Y,Z)QX

− g(X,Z)QY ] +r

(n− 1)(n− 2)[g(Y, Z)X − g(X,Z)Y ],(3.11)

where R, S, Q and r are the Riemannain curvature tensor, the Ricci tensor,the Ricci operator and the scalar curvature with respect to the semi-symmetricnon-metric connection, respectively. The Ricci tensor S and the Ricci operatorQ are related by g(QX, Y ) = S(X,Y ).

Page 675: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE CONFORMAL CURVATURE TENSOR OF ϵ-KENMOTSU MANIFOLDS 661

By using (3.3)-(3.6) in (3.11), we obtain

C(X,Y )Z = C(X,Y )Z +2n+ 1 + ϵ

n− 2(g(Y, Z)X − g(X,Z)Y )

− 1 + ϵ

n− 2(η(Y )η(Z)X − η(X)η(Z)Y )(3.12)

− (1 + ϵ)(n− 1)

n− 2(g(Y,Z)η(X)ξ − g(X,Z)η(Y )ξ),

where

C(X,Y )Z = R(X,Y )Z − 1

(n− 2)[S(Y,Z)X − S(X,Z)Y + g(Y,Z)QX

− g(X,Z)QY ] +r

(n− 1)(n− 2)[g(Y, Z)X − g(X,Z)Y ]

is the conformal curvature tensor with respect to the Levi-Civita connection ∇.

The equation (3.12) is the relation between the conformal curvature tensorswith respect to the semi-symmetric non-metric connection ∇ and the Levi-Civitaconnection ∇.

4. Flatness conditions in ϵ-Kenmotsu manifolds with respect to thesemi-symmetric non-metric connection

Definition 4.1. An ϵ-Kenmotsu manifold M is said to be:

(i) quasi-conformally flat with respect to the semi-symmetric non-metric con-nection, if

(4.1) g(C(X,Y )Z, ϕW ) = 0, X, Y, Z,W ∈ χ(M);

(ii) ξ-conformally flat with respect to the semi-symmetric non-metric connec-tion, if

(4.2) C(X,Y )ξ = 0, X, Y ∈ χ(M);

(iii) pseudoconformally flat with respect to the semi-symmetric non-metric con-nection, if

(4.3) g(C(ϕX, Y )Z, ϕW ) = 0, X, Y, Z,W ∈ χ(M); and

(iv) ϕ-conformally flat with respect to the semi-symmetric non-metric connec-tion, if

(4.4) ϕ2C(ϕX, ϕY )ϕZ = 0, X, Y, Z ∈ χ(M).

Firstly, we consider quasi-conformally flat ϵ-Kenmotsu manifolds with re-spect to the semi-symmetric non-metric connection. From the equations (3.11)

Page 676: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

662 ABDUL HASEEB, MOBIN AHMAD and SHEEBA RIZVI

and (4.1), we have

g(R(X,Y )Z, ϕW ) =1

(n− 2)[S(Y, Z)g(X,ϕW )− S(X,Z)g(Y, ϕW )

+ g(Y, Z)g(QX, ϕW )− g(X,Z)g(QY, ϕW )](4.5)

− r

(n− 1)(n− 2)[g(Y,Z)g(X,ϕW )− g(X,Z)g(Y, ϕW )]

which by taking Y = Z = ξ and using (2.4), (3.7), (3.9) and (3.10) reduces to

(4.6) S(X,ϕW ) =r

(n− 1)g(X,ϕW ).

Replacing W by ϕW and using (2.1), (4.6) yields

(4.7) S(X,W ) =r

(n− 1)g(X,W )− ϵr

(n− 1)η(X)η(W ).

In view of (3.4) and (3.6), (4.7) takes the form

(4.8) S(X,W ) = (ϵ+r

n− 1)g(X,W )− (n+

ϵr

n− 1)η(X)η(W ).

Thus we have the following theorem:

Theorem 4.2. An n-dimensional quasi-conformally flat ϵ-Kenmotsu manifoldwith respect to the semi-symmetric non-metric connection is an η-Einstein man-ifold with respect to the Levi-Civita connection.

Secondly, we consider ξ-conformally flat ϵ-Kenmotsu manifolds with respectto the semi-symmetric non-metric connection. From (3.11) and (4.2), we canwrite

g[R(X,Y )ξ − 1

(n− 2)(S(Y, ξ)X − S(X, ξ)Y + g(Y, ξ)QX − g(X, ξ)QY )

+r

(n− 1)(n− 2)(g(Y, ξ)X − g(X, ξ)Y ),W ] = 0(4.9)

which by using (2.4), (3.7) and (3.9) reduces to

η(X)S(Y,W )− η(Y )S(X,W )

+r

(n− 1)(η(Y )g(X,W )− η(X)g(Y,W )) = 0.(4.10)

Putting Y = ξ and then using (2.2), (2.4) and (3.9) in (4.10), we get

(4.11) S(X,W ) =r

(n− 1)g(X,W )− ϵr

(n− 1)η(X)η(W ).

In view of (3.4) and (3.6), (4.11) takes the form

(4.12) S(X,W ) = (ϵ+r

n− 1)g(X,W )− (n+

ϵr

n− 1)η(X)η(W ).

Thus we have the following theorem:

Page 677: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE CONFORMAL CURVATURE TENSOR OF ϵ-KENMOTSU MANIFOLDS 663

Theorem 4.3. An n-dimensional ξ-conformally flat ϵ-Kenmotsu manifold withrespect to the semi-symmetric non-metric connection is an η-Einstein manifoldwith respect to the Levi-Civita connection.

Next, taking Z = ξ in (3.12) and using (2.2) and (2.4), we have

(4.13) C(X,Y )ξ = C(X,Y )ξ +2nϵ

n− 2(η(Y )X − η(X)Y ).

Since η(X)Y − η(Y )X = R(X,Y )ξ = 0, in an ϵ-Kenmotsu manifold, in general,then we have the following theorem:

Theorem 4.4. In an ϵ-Kenmotsu manifold ξ-conformally flatness with respectto the semi-symmetric non-metric connection and the Levi-Civita connectionare not equivalent.

Thirdly, we consider pseudoconformally flat ϵ-Kenmotsu manifolds with re-spect to the semi-symmetric non-metric connection. From (3.11) and (4.3), wecan write

g(R(ϕX, Y )Z, ϕW ) =1

(n− 2)[S(Y, Z)g(ϕX, ϕW )

− S(ϕX,Z)g(Y, ϕW ) + S(ϕX, ϕW )g(Y, Z)− S(Y, ϕW )g(ϕX,Z)](4.14)

− r

(n− 1)(n− 2)[g(Y, Z)g(ϕX, ϕW )− g(ϕX,Z)g(Y, ϕW )].

In view of (3.3), (3.4) and (3.6), (4.14) takes the form

g(R(ϕX, Y )Z, ϕW ) =1

(n− 2)[S(Y, Z)g(ϕX, ϕW )

− 2(n− 1)g(Y, Z)g(ϕX, ϕW ) + (1 + ϵ)η(Y )η(Z)g(ϕX, ϕW )

− S(ϕX,Z)g(Y, ϕW ) + 2(n− 1)g(ϕX,Z)g(Y, ϕW )(4.15)

+ g(Y, Z)S(ϕX, ϕW )− g(ϕX,Z)S(Y, ϕW )]

− r − (n− 1)(2n− 3− ϵ)(n− 1)(n− 2)

[g(Y, Z)g(ϕX, ϕW )− g(ϕX,Z)g(Y, ϕW )].

Let e1, e2, ....., en−1, ξ be a local orthonormal basis of the vector fields in M .Using that ϕe1, ϕe2, ....., ϕen−1, ξ is also a local orthonormal basis, if we putX = W = ei in (4.15) and sum up with respect to i, then we have

n−1∑i=1

g(R(ϕei, Y )Z, ϕei) =1

(n− 2)

n−1∑i=1

[S(Y, Z)g(ϕei, ϕei)

− 2(n− 1)g(Y, Z)g(ϕei, ϕei) + (1 + ϵ)η(Y )η(Z)g(ϕei, ϕei)

− S(ϕei, Z)g(Y, ϕei) + 2(n− 1)g(ϕei, Z)g(Y, ϕei)(4.16)

+ g(Y, Z)S(ϕei, ϕei)− g(ϕei, Z)S(Y, ϕei)]

− r − (n− 1)(2n− 3− ϵ)(n− 1)(n− 2)

n−1∑i=1

[g(Y, Z)g(ϕei, ϕei)− g(ϕei, Z)g(Y, ϕei)].

Page 678: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

664 ABDUL HASEEB, MOBIN AHMAD and SHEEBA RIZVI

It is easy to verify that

n−1∑i=1

g(R(ϕei, Y )Z, ϕei) = S(Y, Z) + g(Y, Z)− ϵη(Y )η(Z),(4.17)

n−1∑i=1

g(R(ϕei, ϕY )ϕZ, ϕei) = S(ϕY, ϕZ) + g(ϕY, ϕZ),(4.18)

n−1∑i=1

S(ϕei, ϕei) = r + n− 1,(4.19)

n−1∑i=1

g(ϕei, Z)S(Y, ϕei) = S(Y, Z) + ϵ(n− 1)η(Y )η(Z),(4.20)

n−1∑i=1

g(ϕei, ϕZ)S(ϕY, ϕei) = S(ϕY, ϕZ),(4.21)

n−1∑i=1

g(ϕei, ϕei) = n− 1,(4.22)

n−1∑i=1

g(ϕei, Z)g(Y, ϕei) = g(Y,Z)− η(Y )η(Z),(4.23)

n−1∑i=1

g(ϕei, ϕZ)g(ϕY, ϕei) = g(ϕY, ϕZ).(4.24)

By virtue of (4.17), (4.19), (4.20), (4.22) and (4.23), (4.16) yields

(4.25) S(Y, Z) = [r

n− 1−n+3−ϵ(n−2)]g(Y, Z)−[

r

n− 1−n+2(1+ϵ)]η(Y )η(Z).

Thus we have the following theorem:

Theorem 4.5. An n-dimensional pseudoconformally flat ϵ-Kenmotsu manifoldwith respect to the semi-symmetric non-metric connection is an η-Einstein man-ifold with respect to the Levi-Civita connection.

Lastly, we consider ϕ-conformally flat ϵ-Kenmotsu manifolds with respect tothe semi-symmetric non-metric connection. From (4.4), we have

(4.26) g(C(ϕX, ϕY )ϕZ, ϕW ) = 0.

Using (3.11), (4.26) can be written as

g(R(ϕX, ϕY )ϕZ, ϕW ) =1

(n− 2)[S(ϕY, ϕZ)g(ϕX, ϕW )

−S(ϕX, ϕZ)g(ϕY, ϕW )+S(ϕX, ϕW )g(ϕY, ϕZ)−S(ϕY, ϕW )g(ϕX, ϕZ)](4.27)

− r

(n− 1)(n− 2)[g(ϕY, ϕZ)g(ϕX, ϕW )− g(ϕX, ϕZ)g(ϕY, ϕW )].

Page 679: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE CONFORMAL CURVATURE TENSOR OF ϵ-KENMOTSU MANIFOLDS 665

In view of (3.3), (3.4) and (3.6), (4.27) takes the form

g(R(ϕX, ϕY )ϕZ, ϕW ) =1

(n− 2)[S(ϕY, ϕZ)g(ϕX, ϕW )

−S(ϕX, ϕZ)g(ϕY, ϕW )+S(ϕX, ϕW )g(ϕY, ϕZ)−S(ϕY, ϕW )g(ϕX, ϕZ)](4.28)

− r + (n− 1)(1 + ϵ)

(n− 1)(n− 2)[g(ϕY, ϕZ)g(ϕX, ϕW )− g(ϕX, ϕZ)g(ϕY, ϕW )].

Let e1, e2, ....., en−1, ξ be a local orthonormal basis of the vector fields in M .Using that ϕe1, ϕe2, ....., ϕen−1, ξ is also a local orthonormal basis, if we putX = W = ei in (4.28) and sum up with respect to i, then we have

n−1∑i=1

g(R(ϕei, ϕY )ϕZ, ϕei) =1

(n− 2)

n−1∑i=1

[S(ϕY, ϕZ)g(ϕei, ϕei)

−S(ϕei, ϕZ)g(ϕY, ϕei)+S(ϕei, ϕei)g(ϕY, ϕZ)− S(ϕY, ϕei)g(ϕei, ϕZ)].(4.29)

− r + (n− 1)(1 + ϵ)

(n− 2)(n− 2)

n−1∑i=1

[g(ϕY, ϕZ)g(ϕei, ϕei)− g(ϕei, ϕZ)g(ϕY, ϕei)].

By virtue of (4.18), (4.19), (4.21), (4.22) and (4.24), (4.29) can be written as

S(ϕY, ϕZ) + g(ϕY, ϕZ) =1

(n− 2)[(n− 3)S(ϕY, ϕZ)

+ (r + n− 1)g(ϕY, ϕZ)]− r + (n− 1)(1 + ϵ)

(n− 1)g(ϕY, ϕZ)(4.30)

from which it follows that

(4.31) S(ϕY, ϕZ) = (n− 2)[r + n− 1

n− 2− r + (n− 1)(1 + ϵ)

n− 1− 1]g(ϕY, ϕZ).

Using (2.5) and (2.17), (4.31) yields

S(Y,Z) = [r

n− 1− (n− 2)ϵ− n+ 3]g(Y,Z)

− ϵ[ r

n− 1− (n− 2)ϵ+ 2]η(Y )η(Z).(4.32)

Thus we have the following theorem:

Theorem 4.6. An n-dimensional ϕ-conformally flat ϵ-Kenmotsu manifold withrespect to the semi-symmetric non-metric connection is an η-Einstein manifoldwith respect to the Levi-Civita connection.

5. ϵ-Kenmotsu manifolds with respect to the semi-symmetricnon-metric connection satisfying the condition S · C = 0

In this section we investigate ϵ-Kenmotsu manifolds with respect to the semi-symmetric non-metric connection satisfying the condition S · C = 0, where S is

Page 680: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

666 ABDUL HASEEB, MOBIN AHMAD and SHEEBA RIZVI

the Ricci tensor with respect to the semi-symmetric non-metric connection oftype (0, 2). Let the manifold satisfies the condition

(5.1) (S(X,Y ) · C)(U, V )W = 0,

where X,Y, U, V,W ∈ χ(M). The above equation implies

(X∧SY )C(U, V )W + C((X∧SY )U, V )W

+ C(U, (X∧SY )V )W + C(U, V )(X∧SY )W = 0,(5.2)

where the endomorphism X∧SY is defined by

(5.3) (X∧SY )Z = S(Y, Z)X − S(X,Z)Y.

Therefore in view of (5.3), (5.2) takes the form

S(Y, C(U, V )W )X − S(X, C(U, V )W )Y + S(Y, U)C(X,V )W

− S(X,U)C(Y, V )W + S(Y, V )C(U,X)W − S(X,V )C(U, Y )W(5.4)

+ S(Y,W )C(U, V )X − S(X,W )C(U, V )Y = 0.

Taking X = ξ in (5.4) and using (3.9), we obtain

S(Y, C(U, V )W )ξ + S(Y, U)C(ξ, V )W

+ S(Y, V )C(U, ξ)W + S(Y,W )C(U, V )ξ = 0(5.5)

which by taking U = W = ξ and then using (3.9) reduces to

(5.6) S(Y, C(ξ, V )ξ)ξ + S(Y, V )C(ξ, ξ)ξ = 0.

Using (3.11) in (5.6), we obtain

(5.7) S2(Y, V ) =r

n− 1S(Y, V ).

In view of (3.4)-(3.6) and (3.9), (5.7) yields

S2(Y, V ) = (r

n− 1+ n− 1 + ϵ)S(X,Y )− (r + nϵ− ϵ)g(Y, V )

+ (1 + ϵ)(r + n2 − n)η(Y )η(V ).(5.8)

Thus we can state the following theorem:

Theorem 5.1. If an n-dimensional ϵ-Kenmotsu manifold with respect to thesemi-symmetric non-metric connection ∇ satisfying the condition S · C = 0.Then

S2(Y, V ) = (r

n− 1+ n− 1 + ϵ)S(X,Y )− (r + nϵ− ϵ)g(Y, V )

+(1 + ϵ)(r + n2 − n)η(Y )η(V ).

Page 681: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE CONFORMAL CURVATURE TENSOR OF ϵ-KENMOTSU MANIFOLDS 667

Example. We consider the 3-dimensional manifoldM =

(x, y, z) ∈ R3 : z = 0

,where (x, y, z) are standard coordinates of R3. Let e1, e2 and e3 be the vectorfields on M given by

e1 = ϵz∂

∂x, e2 = ϵz

∂y, e3 = −ϵz ∂

∂z= ξ

which are linearly independent at each point of M and hence form a basis ofM . Define an indefinite metric g on M3 as

g(e1, e1) = g(e2, e2) = g(e3, e3) = ϵ,

g(e1, e2) = g(e1, e3) = g(e2, e3) = 0.

Let η be the 1-form on M defined as η(X) = ϵg(X, e3) for all X ∈ χ(M), andlet ϕ be the (1, 1) tensor field on M defined as

ϕe1 = −e2, ϕe2 = −e1, ϕe3 = 0.

By applying linearity of ϕ and g, we have

η(ξ) = 1, ϕ2X = −X + η(X)ξ, η(ϕX) = 0,

g(X, ξ) = ϵη(X), g(ϕX, ϕY ) = g(X,Y )− ϵη(X)η(Y )

for all X,Y ∈ χ(M). Then for ξ = e3, the structure (ϕ, ξ, η, g, ϵ) defines anindefinite almost contact metric structure on M .

Let ∇ be the Levi-Civita connection with respect to the indefinite metric g.Then we have

[e1, e2] = 0, [e2, e3] = ϵe2, [e1, e3] = ϵe1.

The Riemannian connection ∇ of the indefinite metric g is given by

2g(∇XY,Z) = Xg(Y, Z) + Y g(Z,X)− Zg(X,Y )− g(X, [Y, Z])

+ g(Y, [Z,X]) + g(Z, [X,Y ]),

which is known as Koszul’s formula. Using Koszul’s formula, we can easilycalculate

(5.9) ∇e1e1 = −ϵe3, ∇e1e2 = 0, ∇e1e3 = ϵe1, ∇e2e1 = 0,

∇e2e2 = −ϵe3, ∇e2e3 = ϵe2, ∇e3e1 = 0, ∇e3e2 = 0, ∇e3e3 = 0.

Thus from (5.9), it follows that the manifold satisfies ∇Xξ = ϵ(X − η(X)ξ)for ξ = e3. Hence the manifold is an indefinite Kenmotsu manifold.

From the equation (5.9) and the expression of curvature tensor R(X,Y )Z =∇X∇Y Z −∇Y∇XZ −∇[X,Y ]Z, it can be easily verified that

(5.10) R(e1, e2)e1 = e2, R(e1, e3)e1 = e3, R(e2, e3)e1 = 0,

Page 682: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

668 ABDUL HASEEB, MOBIN AHMAD and SHEEBA RIZVI

R(e1, e2)e2 = −e1, R(e1, e3)e2 = 0, R(e2, e3)e2 = e3,

R(e1, e2)e3 = 0, R(e1, e3)e3 = −e1, R(e2, e3)e3 = −e2.

By using (1.3) in (5.9), we obtain

(5.11) ∇e1e1 = −ϵe3, ∇e2e1 = 0, ∇e3e1 = 0, ∇e1e2 = 0, ∇e2e2 = −ϵe3,

∇e3e2 = 0, ∇e1e3 = (1 + ϵ)e1, ∇e2e3 = (1 + ϵ)e2, ∇e3e3 = e3.

From (3.3) and (5.10), we can easily obtain the following components of thecurvature tensor with respect to the semi-symmetric non-metric connection as

(5.12) R(e1, e2)e1 = (1 + ϵ)e2, R(e1, e3)e1 = (1 + ϵ)e3, R(e2, e3)e1 = 0,

R(e1, e2)e2 = −(1 + ϵ)e1, R(e1, e3)e2 = 0, R(e2, e3)e2 = (1 + ϵ)e3,

R(e1, e2)e3 = 0, R(e1, e3)e3 = 0, R(e2, e3)e3 = 0.

By using the above expressions, we get the Ricci tensors and the scalar curva-tures as follows:

S(e1, e1) = S(e2, e2) = S(e3, e3) = −2ϵ,

S(e1, e1) = S(e2, e2) = −(1 + ϵ), S(e3, e3) = −2(1 + ϵ),

r = −6ϵ, r = −4(1 + ϵ).

By using the equations (1.1) and (5.11), the torsion tensors are given by

T (e1, e1) = 0, T (e1, e3) = e1, T (e1, e2) = 0,

T (e2, e2) = 0, T (e2, e3) = e2, T (e3, e3) = 0.

In view of (1.2), we find

(∇e1g)(e1, e3) = −ϵ, (∇e2g)(e2, e3) = −ϵ, (∇e3g)(e1, e2) = 0.

Hence M is a 3-dimensional ϵ-Kenmotsu manifold with respect to the semisymmetric non-metric connection.

Acknowledgement

The authors are thankful to the referee for his/her valuable suggestions for theimprovement of the paper.

Page 683: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON THE CONFORMAL CURVATURE TENSOR OF ϵ-KENMOTSU MANIFOLDS 669

References

[1] N.S. Agashe, M.R. Chafle, A semi-symmetric non-metric connection on aRiemannian manifold, Indian J. Pure Appl. Math., 23 (1992), 399-409.

[2] A. Barman, On LP -Sasakian manifolds admitting a semi-symmetric non-metric connection, Kyungpook Math. J., 58 (2018), 105-116.

[3] E. Bartolotti, Sulla geometria della varieta a connection affine, Ann. diMat., 4(8) (1930), 53-101.

[4] A. Bejancu, K.L. Duggal, Real hypersurfaces of indefinite Kaehler mani-folds, Int. J. Math. Math. Sci., 16 (1993), 545-556.

[5] L.S. Das, M. Ahmad, A. Haseeb, On semi-invariant submanifolds of anearly Sasakian manifold admitting a semi-symmetric non-metric connec-tion, Journal of Applied Analysis, 17(1) (2011), 119-130.

[6] U.C. De, S.C. Biswas, On a type of semi-symmetric non-metric connec-tion on a Riemannian manifold, Istanbul Univ. Fen Fak. Mat. Dergisi,55-56(1996-1997), 237-243.

[7] U.C. De, D. Kamilya, On a type of semi-symmetric non-metric connectionon a Riemannian manifold, Istanbul Univ. Fen Fak. Mat. Dergisi, 53(1994),37-41.

[8] U.C. De, A. Sarkar, On ϵ-Kenmotsu manifolds, Hardonic J., 32 (2009),231-242.

[9] A. Friedmann, J.A. Schouten, Uber die Geometric der halbsymmetrischenUbertragung, Math. Z., 21 (1924), 211-223.

[10] A. Haseeb, Some results on projective curvature tensor in an ϵ-Kenmotsumanifold, Palestine J. Math., 6(Special Issue:II)(2017), 196-203.

[11] A. Haseeb, M.A. Khan, M.D. Siddiqi, Some more results on an ϵ-Kenmotsumanifold with a semi-symmetric metric connection, Acta Math. Univ.Comenianae, 85(1) (2016), 9-20.

[12] H.A. Hayden, Subspaces of a space with torsion, Proc. London Math. Soc.,34 (1932), 27-50.

[13] J.B. Jun, U.C. De, G. Pathak, On Kenmotsu manifolds, J. Korean Math.Soc., 42(3) (2005), 435-445.

[14] K. Kenmotsu, A class of almost contact Riemannian manifolds, TohokuMath. J., 24 (1972), 93-103.

[15] C. Ozgur, ϕ-conformally flat Lorentzian para-Sasakian manifolds, RadoviMatematicki, 12 (2003), 99-106.

Page 684: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

670 ABDUL HASEEB, MOBIN AHMAD and SHEEBA RIZVI

[16] S.K. Pandey, G. Pandey, K. Tiwari, R.N. Singh, On a semi-symmetricnon-metric connection in an indefinite para-Sasakian manifold, Journal ofMathematics and Computer Science, 12(2014), 159-172.

[17] G. Pathak, U.C. De, On a semi-symmetric connection in a Kenmotsu man-ifold, Bull. Calcutta Math. Soc., 94(4)(2002), 319-324.

[18] M.M. Tripathi, E. Kilic, S.Y. Perktas, S. Keles, Indefinite almost paracon-tact metric manifolds, Int. J. Math. Math. Sci., (2010), Article ID: 846195,19 pages.

[19] M.M. Tripathi, N. Nakkar, On a semi-symmetric non-metric connection ina Kenmotsu manifold, Bull. Calcutta Math. Soc., 16(2001), 323-330.

[20] X. Xufeng, C. Xiaoli, Two theorems on ϵ-Sasakian manifolds, Int. J. Math.Math. Sci., 21(2)(1998), 249-254.

[21] K. Yano, On semi-symmetric metric connections, Revue Roumaine deMath. Pures Appl., 15(1970), 1579-1586.

[22] K. Yano, M. Kon, Structures on Manifolds, Series in Pure Math., Vol. 3,World Sci., 1984.

[23] A. Yildiz, U.C. De, B.E. Acet, On Kenmotsu manifolds satisfying certaincurvature conditions, SUT J. Math., 45(2009), 89-101.

Accepted: 3.05.2018

Page 685: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (671–678) 671

EXPONENTIAL STABILITY OF NONLINEAR SYSTEMSVIA ALTERNATE CONTROL

Xingkai Hu∗

Faculty of Civil Engineering and MechanicsKunming University of Science and TechnologyKunming, Yunnan 650500P.R. ChinaandFaculty of ScienceKunming University of Science and TechnologyKunming, Yunnan 650500P. R. [email protected]

Linru NieFaculty of Civil Engineering and Mechanics

Kunming University of Science and Technology

Kunming, Yunnan 650500

P.R. China

and

Faculty of Science

Kunming University of Science and Technology

Kunming, Yunnan 650500

P. R. China

Abstract. In this paper, the exponential stability of nonlinear systems via alternatecontrol is considered. Our result avoids solving linear matrix inequalities. A numericalexample is given to show effectiveness of the result.

Keywords: exponential stability, nonlinear systems, alternate control.

1. Introduction

Throughout this paper, let ∥x∥ be the Euclidean norm of the vector x. λmax (A),λmin (A) and AT are the largest, the smallest eigenvalue and the transpose of areal symmetric matrix A, respectively. The symmetrical positive definite matrixA is represented by A > 0. I represents the proper dimension identity matrix.f(x(t−0))

is defined by f(x(t−0))

= limt→t−0f (x (t)).

∗. Corresponding author

Page 686: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

672 XINGKAI HU and LINRU NIE

Recently, Feng et al.[2] considered nonlinear systems via alternate control asfollows:

(1.1)

x(t) = Ax(t) + f(x(t)) +B1x(t), mT ≤ t < mT + τ,

x(t) = Ax(t) + f(x(t)) +B2x(t), mT + τ ≤ t < (m+ 1)T,

where x(t) ∈ Rn denotes the state vector, f : Rn → Rn is said to be a continuousnonlinear function if f(0) = 0, there exists a constant l ≥ 0 such that ∥f (x)∥ ≤l ∥x∥, A,B1, B2 ∈ Rn×n are constant matrices, T > 0 denotes the control period,τ ∈ (0, T ) is a constant.

Meanwhile, Feng et al.[2] presented three conditions to guarantee system(1.1) to be exponentially stable. Two conditions are to find g1 > 0, ϵ1 > 0,ϵ2 > 0, g2 ∈ R and 0 < P ∈ Rn×n satisfying

(1.2) PA+ATP + PB1 +BT1 P + ϵ1P

2 + ϵ−11 L+ g1P ≤ 0

and

(1.3) PA+ATP + PB2 +BT2 P + ϵ2P

2 + ϵ−12 L− g2P ≤ 0.

Inequalities (1.2) and (1.3) are equivalent to the linear matrix inequalities asfollows: [

PA+ATP + PB1 +BT1 P + ϵ−1

1 L+ g1P −P−P −ϵ−1

1 I

]≤ 0

and [PA+ATP + PB2 +BT

2 P + ϵ−12 L− g2P −P

−P −ϵ−12 I

]≤ 0.

Although linear matrix inequalities can be solved in polynomial-time, thecomputation amount of solving linear matrix inequalities is not very small [1].Therefore, our purpose is to find h1 < 0, h2 ∈ R and 0 < P ∈ Rn×n avoidingsolving linear matrix inequalities such that the system (1.1) is exponentially sta-ble. For more information on this topic and its applications have been presentedin the literature, for instance, see [5-7, 9, 10].

2. Main result

We need two lemmas which play a major role in the proof of theorem.

Lemma 2.1 ([4]). Let x, y ∈ Rn. Then∣∣xT y∣∣ ≤ ∥x∥ ∥y∥ .Lemma 2.2 ([4]). Let A ∈ Rn×n be a symmetric matrix. Then for all

x ∈ Rn,λmin (A)xTx ≤ xTAx ≤ λmax (A)xTx.

Page 687: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

EXPONENTIAL STABILITY OF NONLINEAR SYSTEMS VIA ALTERNATE CONTROL 673

Theorem 2.1. Let 0 < P ∈ Rn×n such that the following two conditionsare satisfied:

(1) h1 < 0,(2) h1τ + h2(T − τ) < 0,

where β1 = λmax(P−1(PA+ATP + PB1 +BT1 P )), β2 = λmax(P ), β3 = λmin(P ),

β4 = λmax(P−1(PA+ATP + PB2 +BT2 P )), h1 = β1+2l

√β2β3

, h2 = β4+2l√

β2β3

.

Then, system (1.1) is exponentially stable at origin.

Proof. Let us construct the following Lyapunov function:

V (x (t)) = xT (t)Px (t) .

Let t ∈ [mT,mT + τ), by Lemma 2.1 and 2.2, we have

D+ (V (x (t))) = 2xT (t)P (Ax (t) + f (x (t)) +B1x (t))= xT (t)

(PA+ATP + PB1 +BT

1 P)x (t) + 2xT (t)Pf (x (t))

≤ β1xT (t)Px (t) + 2

√xT (t)Px (t) fT (x (t))Pf (x (t))

≤ β1xT (t)Px (t) + 2

√xT (t)Px (t)β2fT (x (t)) f (x (t))

≤ β1xT (t)Px (t) + 2

√xT (t)Px (t)β2l2xT (t)x (t)

≤ β1xT (t)Px (t) + 2l

√xT (t)Px (t)

β2β3xT (t)Px (t)

= h1V (x (t)) ,

which means

(2.1) V (x (t)) ≤ V(x (mT )−

)eh1(t−mT ).

Similarly, let t ∈ [mT + τ, (m+ 1)T ), we have

D+ (V (x (t))) = 2xT (t)P (Ax (t) + f (x (t)) +B2x (t))= xT (t)

(PA+ATP + PB2 +BT

2 P)x (t) + 2xT (t)Pf (x (t))

≤ β4xT (t)Px (t) + 2

√xT (t)Px (t) fT (x (t))Pf (x (t))

≤ h2V (x (t)) ,

which infers

(2.2) V (x (t)) ≤ V(x (mT + τ)−

)eh2(t−mT−τ).

When m = 0, let t ∈ [0, τ), from (2.1), we have

V (x (t)) ≤ V (x (0)) eh1t,

so

(2.3) V(x(τ−))≤ V (x (0)) eh1τ .

Page 688: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

674 XINGKAI HU and LINRU NIE

Let t ∈ [τ, T ), by (2.2) and (2.3), we have

V (x (t)) ≤ V (x (τ−)) eh2(t−τ)

≤ V (x (0)) eh1τ+h2(t−τ),

so

(2.4) V(x(T−)) ≤ V (x (0)) eh1τ+h2(T−τ).

When m = 1, let t ∈ [T, T + τ), by (2.1) and (2.4), we have

V (x (t)) ≤ V (x (T−)) eh1(t−T )

≤ V (x (0)) eh1τ+h2(T−τ)+h1(t−T ),

so

(2.5) V(x((T + τ)−

))≤ V (x (0)) e2h1τ+h2(T−τ).

Let t ∈ [T + τ, 2T ), by (2.2) and (2.5), we have

V (x (t)) ≤ V(x((T + τ)−

))eh2(t−T−τ)

≤ V (x (0)) e2h1τ+h2(T−τ)+h2(t−T−τ).

By induction, when m = k, k = 0, 1, · · · , let t ∈ [kT, kT + τ), we have

(2.6) V (x (t)) ≤ V (x (0)) ekh1τ+kh2(T−τ)+h1(t−kT ),

so

(2.7) V(x((kT + τ)−

))≤ V (x (0)) e(k+1)h1τ+kh2(T−τ).

Let t ∈ [kT + τ, (k + 1)T ), by (2.2) and (2.7), we have

(2.8)V (x (t)) ≤ V

(x((kT + τ)−

))eh2(t−kT−τ)

≤ V (x (0)) e(k+1)h1τ+kh2(T−τ)+h2(t−kT−τ).

By (2.6), we have

(2.9)

V (x (t)) ≤ V (x (0)) ekh1τ+kh2(T−τ)

< V (x (0)) et−τT

(h1τ+h2(T−τ))

< V (x (0)) et−TT

(h1τ+h2(T−τ)),

where t ∈ [kT, kT + τ).By (2.8), we know

Case 1. When h2 > 0, we have

(2.10)

V (x (t)) < V (x (0)) e(k+1)h1τ+(k+1)h2(T−τ)

< V (x (0)) etT(h1τ+h2(T−τ))

< V (x (0)) et−TT

(h1τ+h2(T−τ)).

Page 689: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

EXPONENTIAL STABILITY OF NONLINEAR SYSTEMS VIA ALTERNATE CONTROL 675

Case 2. When h2 ≤ 0, we have

(2.11)

V (x (t)) ≤ V (x (0)) e(k+1)h1τ+kh2(T−τ)

< V (x (0)) ekh1τ+kh2(T−τ)

< V (x (0)) et−TT

(h1τ+h2(T−τ)).

So, for any h2 ∈ R, by (2.10) and (2.11), we have

(2.12) V (x (t)) < V (x (0)) et−TT

(h1τ+h2(T−τ)),

where t ∈ [kT + τ, (k + 1)T ).For all t > 0, we can conclude from (2.9) and (2.12) that

(2.13) V (x (t)) < V (x (0)) et−TT

(h1τ+h2(T−τ)).

By Lemma 2.2 and (2.13), we have

λmin (P ) ∥x (t)∥2 ≤ V (x (t))

< V (x (0)) et−TT

(h1τ+h2(T−τ))

≤ ∥x(0)∥2 λmax (P ) et−TT

(h1τ+h2(T−τ)).

That is

∥x (t)∥ <

√λmax (P )

λmin (P )∥x(0)∥ e

t−T2T

(h1τ+h2(T−τ)).

This completes the proof.

Remark 2.1. [2, Theorem 1] and [3, Theorem 1] need to solve the linearmatrix inequalities, however, Theorem 2.1 avoids solving them.

3. A numerical example

In this section, we study the control of Chua’s oscillator via employing abovetheoretical result.

Example 3.1. The Chua’s system [8] is given as follows:

(3.1)

x1 = α(x2 − x1 − g(x1)),

x2 = x1 − x2 + x3,

x3 = −ηx2.

where α and η are two parameters,

g(x1) = bx1 + 0.5(a− b)(|x1 + 1| − |x1 − 1|),

where a and b are two given constants satisfying a < b < 0 .

Page 690: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

676 XINGKAI HU and LINRU NIE

In order to use the above result, we rewrite system (3.1) as follows:

x(t) = Ax+ f (x) ,

where

A =

−α− αb α 01 −1 10 −η 0

, f (x) =

−0.5α(a− b)(|x1 + 1| − |x1 − 1|)00

.By calculations, we have

||f (x) ||2 = 0.25α2(a− b)2[(x1 + 1)2

+ (x1 − 1)2 − 2|(x1 + 1)(x1 − 1)|]= 0.5α2(a− b)2(x21 + 1− |x21 − 1|)

=

α2(a− b)2, x21 > 1α2(a− b)2x2, x21 ≤ 1

≤ α2(a− b)2x21≤ α2(a− b)2(x21 + x22 + x23).

So, we choose l2 = α2(a− b)2.In the initial condition x(0) = (22,−2,−15)T , the Chua’s system exhibits

chaotic phenomenon when

α = 9.2156, η = 15.9946, a = −1.24905, b = −0.75735,

as shown in Figure 1.

Figure 1: The chaotic phenomenon of (3.1) .

At the same time, for convenience of calculations, we choose P = I, B1 =diag(−12,−13,−14), B2 = diag(−12,−13,−12), T = 1 and τ = 0.5. Smallcalculations show that β1 = −9.9296 , β2 = β3 = 1, β4 = −8.3946, l = 4.5313,h1 = −0.8670 , h2 = 0.6680 and h1τ + h2(T − τ) = −0.0995 < 0. Thus, in the

Page 691: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

EXPONENTIAL STABILITY OF NONLINEAR SYSTEMS VIA ALTERNATE CONTROL 677

initial condition x(0) = (22,−2,−15)T , system (3.1) is exponentially stable byTheorem 2.1, as shown in Figure 2.

Figure 2: Time response curves of (3.1) via alternate control.

References

[1] S. Boyd, L. EI Ghaoui, E. Feron, V. Balakrishnan, Linear matrix inequali-ties in system and control theory, SIAM, Philadelphia, 1994.

[2] Y. Feng, C. Li, T. Huang, W. Zhao, Alternate control systems, Adv. Differ.Equ., 305 (2014).

[3] X. Hu, H. Wu, Y. Feng, J. Xiong, Alternate-continuous-control systemswith double-impulse, Adv. Differ. Equ., 298 (2017).

[4] R.A. Horn, C.R. Johnson, Matrix analysis, Cambridge University Press,Cambridge, 1985.

[5] T. Huang, C. Li, W. Yu, G. Chen, Synchronization of delayed chaotic sys-tems with parameter mismatches by using intermittent linear state feedback,Nonlinearity, 22 (2009), 569-584.

[6] X. Li, S. Song, Stabilization of delay systems: delay-dependent impulsivecontrol, IEEE Trans. Autom. Control, 62 (2017), 406-411.

[7] X. Li, J. Wu, Stability of nonlinear differential systems with state-dependentdelayed impulses, Automatica, 64 (2016), 63-69.

[8] L.P. Shilnikov, Chua’s circuit: rigorous results and furture problems, Int.J. Bifur. Chaos Appl. Sci. Engrg., 4 (1994), 489-519.

[9] X. Yang, Z. Yang, X. Nie, Exponential synchronization of discontinuouschaotic systems via delayed impulsive control and its application to secure

Page 692: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

678 XINGKAI HU and LINRU NIE

communication, Commun. Nonlinear Sci. Numer. Simul., 19 (2014), 1529-1543.

[10] L. Zou, Y. Peng, Y. Feng, Z. Tu, Impulsive control of nonlinear systemswith impulse time window and bounded gain error, Nonlinear Anal. Model.Control, 23 (2018), 40-49.

Accepted: 9.05.2018

Page 693: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (679–691) 679

ROUGH APPROXIMATIONS IN KU-ALGEBRAS

Moin Akhtar Ansari∗

Ali N.A. KoamDepartment of Mathematics

College of Science, Post Box 2097

New Campus, Jazan University

Jazan, KSA

[email protected]

[email protected]

Abstract. In this paper, the concept of roughness in KU-algebras is introduced.We study the lower and upper approximations of KU-subalgebras and KU-ideals andproved that the lower/upper approximation of KU-subalgebra (resp., KU-ideals) is aKU-subalgebra (resp., KU-ideals). A connection between rough sets and KU-Algebraswith their weak and strong ideals have also been taken under consideration and somerelated results have been shown.

Keywords: KU-subalgebras, KU-ideals, lower approximations, upper approxima-tions, definable.

1. Introduction

The notion of rough sets was introduced by Pawlak in his paper [21]. The theoryof rough sets has emerged as another major powerfull mathematical approachfor managing and handling different types of uncertainty in information sys-tems that arises from inexact, noisy, or incomplete information. It is turningout to be methodologically significant to the domains of artificial intelligenceand cognitive sciences, especially in the representation of and reasoning withvague and/or imprecise knowledge, data classification, data analysis, machinelearning, pattern recognition and knowledge discovery. In connection with alge-braic structures, Biswas and Nanda [4] gave the notion of rough subgroups, andKuroki [13] introduced rough ideals in semigroups. Xiao and Zhang [27] intro-duced rough prime ideals and rough fuzzy prime ideals in semigroups. Ameri etal. [3] applied rough set theory to hyper BCK-algebra. Dudek et al. [7] and Ma[15] applied rough set theory to BCI-algebras. Jun et al. considered roughness inBCK-algebra [10], lattice implication algebras [11] and BCC-algebra [12]. Maoand Zhou [16] studied the rough set theory in Pseudo-BCK-algebra. Torkzadehand Ghorbani [26] studied rough filters in B-Algebras.

∗. Corresponsing author

Page 694: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

680 MOIN AKHTAR ANSARI and ALI N.A. KOAM

Prabpayak and Leerawat [22] introduced a new algebraic structure which iscalled KU-algebra. They gave the concept of homomorphisms of KU-algebrasand investigated some related properties in [22, 23].

The concept of fuzzy sets was introduced by Zadeh [29]. There are severalauthors who considered KU-algebras in terms of different types of fuzzy sets, forinstance, Mostafa et al. [17] introduced the notion of fuzzy KU-ideals of KU-algebras and then they investigated several basic properties which are relatedto fuzzy KU-ideals, also see [18, 19]. Akram et al. [1] studied interval-valued(θ, δ)-fuzzy KU-ideals of KU-algebras. In [2, 28], the author applied the conceptof cubic sets to KU-algebras. Davvaz et al. [6] introduced neutrosophic ideals ofneutrosophic KU-algebras. Gulistan et al. [8, 9] studied the generalized versionfuzzy KU-ideals of KU-algebras. Muhiuddin [20] studied bipolar fuzzy KU-subalgebras/ideals of KU-algebras. Senapati et al. [24, 25] introduced T-fuzzyKU-subalgebras and intuitionistic fuzzy bi-normed KU-ideals of a KU-algebra.As a work in computer science Chen et al.[5] worked on data mining frameworkbased on rough set theory to improve location selection decisions as a case studyof a restaurant chain whereas Karimi [14] studied rough sets and Gray sets.

2. Preliminaries

In this section we shall define some basic concepts including KU-algebras, KU-subalgebras, KU-ideals and shall provide examples based on them.

Definition 1 ([23]). By a KU-algebra we mean an algebra (X, ∗, 0) of type (2, 0)with a single binary operation ∗ that satisfies the following identities: for anyx, y, z ∈ X,

(ku1) : (x ∗ y) ∗ [(y ∗ z) ∗ (x ∗ z)] = 0,(ku2) : x ∗ 0 = 0,(ku3) : 0 ∗ x = x,(ku4) : x ∗ y = 0 = y ∗ x implies x = y.

In what follows, let (X, ∗, 0) denote a KU-algebra unless otherwise specified.For brevity we also call X a KU-algebra. In X we can define a binary relation≤ by : x ≤ y if and only if y ∗ x = 0.

Definition 2 ([23]). (X, ∗, 0) is a KU-algebra if and only if it satisfies:(ku5) : (y ∗ z) ∗ (x ∗ z) ≤ (x ∗ y),(ku6) : 0 ≤ x,(ku7) : x ≤ y, y ≤ x implies x = y,(ku8) : x ≤ y if and only if y ∗ x = 0.

Definition 3. In a KU-algebra, the following identities are true [17]:(1) z ∗ z = 0,(2) z ∗ (x ∗ z) = 0,(3) x ≤ y imply y ∗ z ≤ x ∗ z,(4) z ∗ (y ∗ x) = y ∗ (z ∗ x), for all x, y, z ∈ X,

Page 695: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ROUGH APPROXIMATIONS IN KU-ALGEBRAS 681

(5) y ∗ [(y ∗ x) ∗ x] = 0.

Example 1 ([17]). Let X = 0, 1, 2, 3, 4 in which ∗ is defined by the followingtable

· 0 1 2 3 4

0 0 1 2 3 4

1 0 0 2 3 4

2 0 1 0 3 3

3 0 0 2 0 2

4 0 0 0 0 0

It is easy to see that X is KU-algebra.

Definition 4 ([23]). A subset S of KU-algebra X is called a KU-subalgebra ofX if x ∗ y ∈ S, whenever x, y ∈ S.

Definition 5 ([23]). A non-empty subset A of a KU-algebra X is called a KU-ideal of X if it satisfies the following conditions:

(1) 0 ∈ A,(2) x ∗ (y ∗ z) ∈ A, y ∈ A implies x ∗ z ∈ A, for all x, y, z ∈ X.

Example 2. Let X = 0, 1, 2, 3, 4, 5 in which ∗ is defined by the followingtable:

· 0 1 2 3 4 5

0 0 1 2 3 4 5

1 0 0 2 2 4 5

2 0 0 0 1 4 5

3 0 0 0 0 4 5

4 0 0 0 1 0 5

5 0 0 0 0 0 0

Clearly (X, ∗, 0) is a KU-algebra. It is easy to show that A = 0, 1 and B =0, 1, 2, 3, 4 are KU-ideals of X.

Definition 6. Let A be a nonempty subset of a KU-algebra X and 0 ∈ A. Then,(1) A is called a weak KU-ideal of X if y ∗ x ∈ A and y ∈ A imply that

x ∈ A, for all x, y ∈ X;(2) A is called a strong KU-ideal of X if (y ∗ x) ∩ A = ∅ and y ∈ A imply

that x ∈ A, for all x, y ∈ X.

3. Roughness in KU-algebras

Let V be a set and E an equivalence relation on V and let P (V ) denote thepower set of V . For all x ∈ V , let [x]E denote the equivalence class of x withrespect to E. Define the functions E,E : P (V )→ P (V ) as follows: ∀ S ∈ P (V ),

E(S) = x ∈ V : [x]E ⊆ S

Page 696: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

682 MOIN AKHTAR ANSARI and ALI N.A. KOAM

and

E(S) = x ∈ V : [x]E ∩ S = ∅.

The pair (V,E) is called an approximation space. Let S be a subset of V. ThenS is said to be definable if E(S) = E(S) and rough otherwise. E(S) is calledthe lower approximation of S while E(S) is called the upper approximation.

Throughout this section X is a KU-algebra. Let A be a KU-ideal of X.Define a relation Θ on X by (x, y) ∈ Θ if and only if x ∗ y ∈ A and y ∗ x ∈ A.Then Θ is an equivalence relation on X related to a KU-ideal A of X. Moreoversatisfies (x, y) ∈ Θ and (u, v) ∈ Θ imply (x ∗ u, y ∗ v) ∈ Θ.

Hence Θ is a congruence relation on X. Let Ax denote the equivalence classof x with respect to the equivalence relation Θ related to a KU-ideal A of X,and X/A denote the collection of all equivalence classes, that is, X/A = Ax :x ∈ X. Then A0 = A. If Ax ∗ Ay is defined as the class containing x ∗ y, thatis, Ax ∗Ay = Ax∗y, then (X/A, ∗, A0) is a KU-algebra. Let Θ be an equivalencerelation on X related to a KU-ideal A of X. For any nonempty subset S of X,the lower and upper approximation of S are denoted by Θ(A,S) and Θ(A,S)respectively, that is,

Θ(A,S) = x ∈ X : Ax ⊆ S

and

Θ(A,S) = x ∈ x : Ax ∩ S = ∅.

If A = S, then Θ(A,S) and Θ(A,S) are denoted by Θ(A) and Θ(A), respectively.

Definition 7 ([21]). Given an approximation space (U,Θ), a pair (A,B) ∈P (U)× P (U) is called a rough set in (U,Θ) if and only if (A,B) = Apr(X) forsome X ∈ P (U).

Definition 8 ([21]). Let (U,Θ) be an approximation space and X be a non-empty subset of U.

(i) If Apr(X) = Apr(X), then X is called definable.

(ii) If Apr(X) = ∅, then X is called empty interior.

(iii) If Apr(X) = U , then X is called empty exterior.

Example 3. Let X = 0, 1, 2, 3, 4 be a KU-algebra with the Cayley’s table asfollows (see [28]).

· 0 1 2 3 4

0 0 1 2 3 4

1 0 0 0 0 1

2 0 3 0 3 4

3 0 1 2 0 1

4 0 0 0 0 0

Let A = 0, 1 be a KU-ideal of X (A X) and let Θ be an equivalence relationon X related to A. Then A0 = A1 = A, A2 = 2, A3 = 3, and A4 = 4.

Page 697: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ROUGH APPROXIMATIONS IN KU-ALGEBRAS 683

Hence

Θ(A, 0, 1) = 0, 1 X

Θ(A, 0, 2) = 2Θ(A, 0, 3) = 3

Θ(A, 0, 1, 2, 3) = 0, 1, 2, 3 X

and

Θ(A, 0, 1) = 0, 1 X

Θ(A, 0) = 0, 1Θ(A, 2) = 0, 2

Θ(A, 1, 2, 3) = 0, 1, 2, 3 X

Θ(A, 0, 2, 3) = 0, 1, 2, 3 X

Θ(A, 1, 2, 3, 4) = 0, 1, 2, 3, 4 X.

In Example 3, we know that there exists a non-KU-ideal S of X such thattheir lower and upper approximation are KU-ideals of X. Also we choose somenon-KU-ideals S of X such that their lower and upper approximation are KU-ideals of X.

Proposition 1. Let Θ and Ξ be equivalence relations on X related to KU-idealsA and B of X, respectively. If S and T are nonempty subsets of X. Then

(1) Θ(A,S) ⊆ S ⊆ Θ(A,S);

(2) Θ(A, ∅) = ∅ = Θ(A, ∅)(3) Θ(A,S ∪ T ) = Θ(A,S) ∪Θ(A, T );

(4) Θ(A,S ∩ T ) = Θ(A,S) ∩Θ(A, T );

(5) S ⊆ T implies Θ(A,S) ⊆ Θ(A, T ) and Θ(A,S) ⊆ Θ(A, T );

(6) Θ(A,S) ∪Θ(A, T ) ⊆ Θ(A,S ∪ T );

(7) Θ(A,S ∩ T ) ⊆ Θ(A,S) ∩Θ(A, T );

(8) Θ ⊆ Ξ and A ⊆ B implies Ξ(B,S) ⊆ Θ(A,S) and Θ(A,S) ⊆ Ξ(B,S).

Proof. (1) If x ∈ Θ(A,S), then x ∈ Ax ⊆ S. Hence Θ(A,S) ⊆ S. Next, ifx ∈ S, then, since x ∈ Ax, we have Ax ∩ S = ϕ, and so x ∈ Θ(A,S). ThusS ⊆ Θ(A,S).

(2) is straightforward.

(3) Note that

x ∈ Θ(A,S ∪ T ) ⇐⇒ Ax ∩ (S ∪ T ) = ϕ⇐⇒ (Ax ∩ S) ∪ (Ax ∩ T ) = ϕ⇐⇒ Ax ∩ S = ϕ or Ax ∩ T = ϕ

⇐⇒ x ∈ Θ(A,S) or a ∈ Θ(A, T )

⇐⇒ x ∈ Θ(A,S) ∪Θ(A, T ).

Page 698: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

684 MOIN AKHTAR ANSARI and ALI N.A. KOAM

ThusΘ(A,S ∪ T ) = Θ(A,S) ∪Θ(A, T ).

(4) Note that

x ∈ Θ(A,S ∩ T ) ⇐⇒ Ax ⊆ S ∩ T⇐⇒ Ax ⊆ S and Ax ⊆ T⇐⇒ x ∈ Θ(A,S) and x ∈ Θ(A, T )⇐⇒ x ∈ Θ(A,S) ∩Θ(A, T ).

ThusΘ(A,S ∩ T ) = Θ(A,S) ∩Θ(A, T ).

(5) Since S ⊆ T if and only if S ∩ T = S, by (3) we have

Θ(A,S) = Θ(A,S ∩ T ) = Θ(A,S) ∩Θ(A, T ).

This implies that Θ(A,S) ⊆ Θ(A, T ). Note also that S ⊆ T if and only ifS ∪ T = T , by (2) we have

Θ(A, T ) = Θ(A,S ∪ T ) = Θ(A,S) ∪Θ(A, T ).

This implies that Θ(A,S) ⊆ Θ(A, T ).(6) Since S ⊆ S ∪ T and T ⊆ S ∪ T , by (4) we have

Θ(A,S) ⊆ Θ(A,S ∪ T ) and Θ(A, T ) ⊆ Θ(A,S ∪ T ).

This implies Θ(A,S) ∪Θ(A, T ) ⊆ Θ(A,S ∪ T ).(7) Since S ∩ T ⊆ S and S ∩ T ⊆ T , by (4) we have

Θ(A,S ∩ T ) ⊆ Θ(A,S) and Θ(A,S ∩ T ) ⊆ Θ(A, T ).

This implies Θ(A,S ∩ T ) ⊆ Θ(A,S) ∩Θ(A, T ).(8) Since Θ ⊆ Ξ. If x ∈ Ξ(B,S), then Bx ⊆ S. But Θ ⊆ Ξ, then Ax ⊆

Bx ⊆ S, that is, Ax ⊆ S. Thus x ∈ Θ(A,S). Hence

Ξ(B,S) ⊆ Θ(A,S).

Now let x be any element of Θ(S). So Ax ∩ S = ϕ, then there exists y ∈ Ay ∩ Ssuch that y ∈ Ay and y ∈ S. Hence (y, x) ∈ Θ, that is y ∗x ∈ A. Since A ⊆ B, itfollows that y∗x ∈ B and x∗y ∈ B so that (y, x) ∈ Ξ, that is, y ∈ Bx. Thereforey ∈ Bx ∩ S, which means that x ∈ Ξ(B,S). This completes the proof.

Proposition 2. Let Θ be an equivalence relation on X related to a KU-ideal Aof X. If S is a nonempty subset of X. Then

(1) Θ(A,Θ(A,S)) = Θ(A,S);(2) Θ(A,Θ(A,S)) = Θ(A,S);(3) Θ(A,Θ(A,S)) = Θ(A,S);(4) Θ(A,Θ(A,S)) = Θ(A,S);(5) Θ(A,S) = (Θ(A,Sc))c;(6) Θ(A,S) = (Θ(A,Sc))c;(7) Θ(A,Ax) = X = Θ(A,Ax), for all x ∈ X.

Page 699: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ROUGH APPROXIMATIONS IN KU-ALGEBRAS 685

Proof. The proof is straightforward.

Proposition 3. Let Θ be an equivalence relation on X related to a KU-ideal Aof X. If S is a nonempty subset of X. Then

(1) Θ (A,S) ∗Θ (A, T ) ⊆ Θ (A,S ∗ T ) ;(2) If Θ is congruence relation, then Θ (A,S) ∗Θ (A, T ) ⊆ Θ (A,S ∗ T ) .

Proof. (1) Let c be any element of Θ(A,S) ∗Θ(A, T ). Then c = p ∗ q with p ∈Θ(A,S) and q ∈ Θ(A, T ). Thus there exist elements x, y ∈ S such that

x ∈ Ap ∩ S and y ∈ Aq ∩ T.

Thus x ∈ Ap, y ∈ Aq, x ∈ S, and y ∈ T . Since Θ is a congruence on S, it followsthat

x ∗ y ∈ Ap ∗Aq ∈ Ap∗q.

On the other hand, since x ∗ y ∈ S ∗ T. We have x ∗ y ∈ Ap∗q ∩ S ∗ T, and soc = p ∗ q ∈ Θ(A,S ∗ T ). Thus we have

Θ(A,S) ∗Θ(A, T ) ⊆ Θ(A,S ∗ T ).

(2) Assume that Θ is complete, let c be any element of Θ(A,S) ∗ Θ(A, T ).Then c = p ∗ q with p ∈ Θ(A,S) and q ∈ Θ(A, T ). It follows that Ap ⊆ S andAq ⊆ T. Since Θ is a congruence relation on S, we have

Ap∗q = Ap ∗Aq ⊆ S ∗ T.

So c = p ∗ q ∈ Θ(A,S ∗ T ). Thus

Θ(A,S) ∗Θ(A, T ) ⊆ Θ(A,S ∗ T ).

This completes the proof.

Proposition 4. Let Θ and Ξ be equivalence relations on X related to KU-idealsA and B of X, respectively. If S and T are nonempty subsets of X. Then

(1) Θ ∩ Ξ(A ∩B,S) ⊆ Θ(A,S) ∩ Ξ(B,S);(2) Θ ∩ Ξ(A ∩B,S) ⊇ Θ(A,S) ∩ Ξ(B,S).

Proof. (1) Note that Θ∩Ξ is also a congruence relation on S. Let c ∈ Θ ∩ Ξ(A∩B,S), then [A ∩ B]c ∩ S = ϕ. Then there exists an element x ∈ [A ∩ B]c ∩ S.Since (x, c) ∈ Θ ∩ Ξ, we have

(x, c) ∈ Θ and (x, c) ∈ Ξ.

Thus we have x ∈ Ac and x ∈ Bc. Since x ∈ S, we have x ∈ Ac, x ∈ S andx ∈ Bc, x ∈ S. This implies that

x ∈ Ac ∩ S and x ∈ Bc ∩ S

Page 700: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

686 MOIN AKHTAR ANSARI and ALI N.A. KOAM

Ac ∩ S = ϕ and Bc ∩ S = ϕ.

So c ∈ Θ(A,S) and c ∈ Ξ(B,S), hence c ∈ Θ(A,S) ∩ Ξ(B,S). Thus we obtain

Θ ∩ Ξ(A ∩B,S) ⊆ Θ(A,S) ∩ Ξ(B,S).

(2) Since Θ ∩ Ξ ⊆ Θ and Θ ∩ Ξ ⊆ Ξ, which implies that

Θ(A,S) ⊆ Θ ∩ Ξ(A ∩B,S) and Ξ(B,S) ⊆ Θ ∩ Ξ(A ∩B,S)

=⇒ Θ(A,S) ∩ Ξ(B,S) ⊆ Θ ∩ Ξ(A ∩B,S).

This completes the proof.

Theorem 1. Let (X,Θ) be an approximation space. Then(1) for every S ⊆ X, Θ(A,S) and Θ(A,S) are definable sets,(2) for every x ∈ X, Ax is definable set.

Proof. (1) By Proposition 2 (1) and (3), we have

Θ(A,Θ(A,S)) = Θ(A,S) = Θ(A,Θ(A,S)).

Hence Θ(A,S) is definable. On the other hand by Proposition 2 (2) and (4), wehave

Θ(A,Θ(A,S)) = Θ(A,S) = Θ(A,Θ(A,S)).

Therefore Θ(A,S) is a definable set.(2) By Proposition 2 (7) the proof is clear.

Definition 9. A nonempty subset S of X is called an upper (resp. a lower )rough KU-subalgebra of X if the upper (resp. nonempty lower) approximationof S is a KU-subalgebra of X. If S is both an upper and a lower rough KU-subalgebra of X, we say that S is a rough KU-subalgebra of X.

Theorem 2. Let Θ be an congruence relation on X related to a KU-ideal A ofX. If S is a KU-subalgebra of X, then

(1) Θ(A,S) is a KU-subalgebra of X.(2) Θ(A,S) is a KU-subalgebra of X.

Proof. (1) Let x, y ∈ Θ(A,S). Then

Ax ∩ S = ∅ and Ay ∩ S = ∅,

and so there exist a, b ∈ S such that a ∈ Ax and b ∈ Ay. It follows that (a, x) ∈ Θand (b, y) ∈ Θ. Since Θ is a congruence relation on X, we have (a ∗ b, x ∗ y) ∈ Θ.Hence a ∗ b ∈ Ax∗y. Since S is a KU-subalgebra of X, we get a ∗ b ∈ S, andtherefore a∗b ∈ Ax∗y∩S, that is, Ax∗y∩S = ∅. This shows that x∗y ∈ Θ(A,S),and consequently Θ(A,S) is a KU-subalgebra of X.

(2) Let x, y ∈ Θ(A,S). Then Ax ⊆ S and Ay ⊆ S. Since S is a KU-subalgebraof X, it follows that

Ax∗y = Ax ∗Ay ⊆ Sso that x ∗ y ∈ Θ(A,S). Hence Θ(A,S) is a KU-subalgebra of X.

Page 701: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ROUGH APPROXIMATIONS IN KU-ALGEBRAS 687

The following example shows that the converse of Theorem 2(1) may not betrue.

Example 4. Let X = 0, 1, 2, 3, 4 be a KU-algebra with the Cayley’s table asfollows:

· 0 1 2 3 4

0 0 1 2 3 4

1 0 0 2 2 4

2 0 0 0 1 4

3 0 0 0 0 4

4 0 1 1 1 0

Let A = 0, 1, 2 be a KU-ideal of X (A X) and let Θ be an equivalencerelation on X related to A. Then A0 = A1 = A2 = A, A3 = 3, and A4 = 4.Note that S = 1, 3 is not a KU-subalgebra of X, but Θ(A,S) = 0, 1, 2, 3 isKU-subalgebra of X.

Definition 10. A nonempty subset S of X is called an upper (resp. a lower )rough KU-ideal of X if the upper (resp. nonempty lower) approximation of Sis a KU-ideal of X. If S is both an upper and a lower rough KU-ideal of X, wesay that S is a rough KU-ideal of X.

Theorem 3. Let Θ be an congruence relation on X related to a KU-ideal A ofX. If S is a KU-ideal of X containing A, then

(1) Θ(A,S) is a KU-ideal of X.

(2) Θ(A,S) is a KU-ideal of X.

Proof. (1) Let S be a KU-ideal of X containing A. Obviously 0 ∈ Θ(A,S). Letx, y, z ∈ X be such that y ∈ Θ(A,S) and x ∗ (y ∗ z) ∈ Θ(A,S). Then

Ay ∩ S = ∅ and Ax∗(y∗z) ∩ S = ∅,

and so there exist a, b ∈ S such that a ∈ Ay and b ∈ Ax∗(y∗z). Hence (a, y) ∈ Θand (b, (x∗(y∗z))) ∈ Θ, which implies y∗a ∈ A ⊆ S and (x∗(y∗z))∗b ∈ A ⊆ S.Since a, b ∈ S and S is a KU-ideal, we get

y ∈ S and x ∗ (y ∗ z) ∈ S,

it follows from Definition 5(2) that x ∗ z ∈ S. Note that x ∗ z ∈ Ax∗z, thusx ∗ z ∈ Ax∗z ∩ S, that is, Ax∗z ∩ S = ∅. Hence x ∗ z ∈ Θ(A,S) and thereforeΘ(A,S) is a KU-ideal of X.

(2) Let S be a KU-ideal of X containing A. Let x ∈ A0. Then x ∈ A ⊆ S,and so A0 ⊆ S. Hence 0 ∈ Θ(A,S). Let x, y, z ∈ X be such that y ∈ Θ(A,S)and x ∗ (y ∗ z) ∈ Θ(A,S). Then

Ay ∈ S and Ax ∗ (Ay ∗Az) = Ax∗(y∗z) ⊆ S.

Page 702: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

688 MOIN AKHTAR ANSARI and ALI N.A. KOAM

Let w ∈ Ax∗z = Ax ∗Az. Then w = Ax ∗Az for some a ∈ Ax and c ∈ Az. Froma ∈ Ax and c ∈ Az, we have (a, x) ∈ Θ and (c, z) ∈ Θ. Taking b ∈ Ay then weget (b, y) ∈ Θ. Since Θ is a congruence relation, we get

(a ∗ (b ∗ c), x ∗ (y ∗ z)) ∈ Θ and so a ∗ (b ∗ c) ∈ Ax∗(y∗z) ⊆ S.

Since S is a KU-ideal of X, it follows from Definition 5(2) that w ∈ a ∗ c ∈ S,so that Ax∗z ⊆ S. Hence x ∗ z ∈ Θ(A,S) and therefore Θ(A,S) is a KU-ideal ofX.

Theorem 4. Let Θ be an congruence relation on X related to a KU-ideal A ofX. If S is a weak KU-ideal of X containing A, then

(1) Θ(A,S) is a weak KU-ideal of X.(2) Θ(A,S) is a weak KU-ideal of X.

Proof. (1) Let S be a weak KU-ideal of X containing A. Obviously 0 ∈ Θ(A,S).Let x, y ∈ X be such that y ∈ Θ(A,S) and y ∗ x ∈ Θ(A,S). Then

Ay ∩ S = ∅ and Ay∗x ∩ S = ∅,

and so there exist a, b ∈ S such that a ∈ Ay and b ∈ Ay∗x. Hence (a, y) ∈ Θ and(b, (y ∗ x)) ∈ Θ, which implies

y ∗ a ∈ A ⊆ S and (y ∗ x) ∗ b ∈ A ⊆ S.

Since a, b ∈ S and S is a weak KU-ideal, we get y ∈ S and y ∗ x ∈ S, it followsfrom Definition 6(1) that x ∈ S. Note that x ∈ Ax, thus x ∈ Ax ∩ S, that is,Ax ∩ S = ∅. Hence x ∈ Θ(A,S) and therefore Θ(A,S) is a weak KU-ideal of X.

(2) Let S be a weak KU-ideal of X containing A. Let x ∈ A0. Then x ∈ A ⊆S, and so A0 ⊆ S. Hence 0 ∈ Θ(A,S). Let x, y ∈ X be such that y ∈ Θ(A,S)and y ∗ x ∈ Θ(A,S). Then

Ay ∈ S and Ay ∗Ax = Ay∗x ⊆ S.

Let w ∈ Ax. Then w = Ax for some a ∈ Ax. From a ∈ Ax, we have (a, x) ∈ Θ.Taking b ∈ Ay then we get (b, y) ∈ Θ. Since Θ is a congruence relation, we get

(b ∗ a, y ∗ x) ∈ Θ and b ∗ a ∈ Ay∗x ⊆ S.

Since S is a weak KU-ideal of X, it follows from Definition 6(1) that w = a ∈ S,so that Ax ⊆ S. Hence x ∈ Θ(A,S) and therefore Θ(A,S) is a weak KU-idealof X.

Theorem 5. Let Θ be an congruence relation on X related to a KU-ideal A ofX. If S is a strong KU-ideal of X containing A, then

(1) Θ(A,S) is a strong KU-ideal of X.(2) Θ(A,S) is a strong KU-ideal of X.

Page 703: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ROUGH APPROXIMATIONS IN KU-ALGEBRAS 689

Proof. (1) Let x, y ∈ X be such that

(y ∗ x) ∩Θ(A,S) = ∅ and y ∈ Θ(A,S).

Then Ay ∩ S = ∅ and so there exist z ∈ X such that z = y ∗ x and z ∈ Θ(A,S).Hence Az ∩ S = ∅ and so there exist c, d ∈ X such that

c ∈ Az ∩ S and d ∈ Ay ∩ S.

Hence cΘz and dΘy where c, d ∈ S. Thus we z ∗ c ∈ A ⊆ S and y ∗ d ∈ A ⊆ S.Since S is a strong KU-ideal and c, d ∈ S, we have z ∈ S and y ∈ S. Thus wehave proved that (y ∗ x) ∩ A = ∅ and y ∈ A. Since S is a strong KU-ideal, wehave x ∈ S and so Ax ∩ S = ∅ which means that Θ(A,S) is a strong KU-idealof S.

(2) Let x, y ∈ X be such that

(y ∗ x) ∩Θ(A,S) = ∅ and y ∈ Θ(A,S).

Let a ∈ Ax and b ∈ Ay. Then aΘx and bΘy. Since Θ is a congruence relationon X, b ∗ aΘy ∗ x. Since (y ∗ x) ∩Θ(A,S) = ∅, then there exist t ∈ X such thatt ∈ y ∗ x and t ∈ Θ(A,S). Now, t ∈ b ∗ aΘy ∗ x implies that there exist z ∈ b ∗ asuch that zΘt and so At = Az ⊆ S. Hence z ∈ S and so (b ∗ a) ∩ S = ∅. On theother hand, we have b ∈ Ay ⊆ S. Since S is a strong KU-ideal of X, then wehave a ∈ S which implies Ax ⊆ S that means x ∈ Θ(A,S). Therefore, Θ(A,S)is a strong KU-ideal of S.

4. Conclusion

Roughness is one of the important method to tackle the uncertainty and vague-ness in information system. It is widely used in database management systemmore basically in data mining and big data. In recent years roughness has beenapplied and used successfully in a number of challenging fields such as pureand applied algebras, computer science, engineering, medical science and softcomputing method in biology and and computer science.

This paper connects KU-algebras (KU-ideals) with roughness through defi-nitions, examples and results based on lower and upper approximations of thislogical algebras. We expect that this connection may invoke some new directionswith other related and similar concepts in logical algebras and different typesof KU-algebras including soft KU-algebras and hyper soft KU-algebras togatherwith some reasoning and logic. The next step in the direction of this work couldbe the results based on rough set approach to handle medical related data.

References

[1] M. Akram, N. Yaqoob and J. Kavikumar, Interval-valued (θ, δ)-fuzzy KU-ideals of KU-algebras, Int. J. Pure Appl. Math., 92 (2014), 335-349.

Page 704: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

690 MOIN AKHTAR ANSARI and ALI N.A. KOAM

[2] M. Akram, N. Yaqoob and M. Gulistan, Cubic KU-subalgebras, Int. J. PureAppl. Math., 89 (2013), 659-665.

[3] R. Ameri, R. Moradian and R. A. Borzooei, Rough set theory applied tohyper BCK-algebra, Ratio Math., 26 (2014), 3-20.

[4] R. Biswas and S. Nanda, Rough groups and rough subgroups, Bull. PolishAcad. Sci. Math., 42 (1994), 251-254.

[5] Chen, L.F. and Tsai, C.T. Data mining framework based on rough set theoryto improve location selection decisions: a case study of a restaurant chain,Tourism Management, 53 (2016), 197-206.

[6] B. Davvaz, S.M. Mostafa and F.F. Kareem, Neutrosophic ideals of neutro-sophic KU-algebras, Gazi University Journal of Science, 30 (2017), 463-472.

[7] W. Dudek, Y.B. Jun and H.S. Kim, Rough set theory applied to BCI-algebras, Quasigroups and Relt. Syst., 9 (2002), 45-54.

[8] M. Gulistan, M. Shahzad and S. Ahmed, On (α, β)-fuzzy KU-ideals of KU-algebras, Afrika Matematika, 26 (2015), 651-661.

[9] M. Gulistan, M. Shahzad and N. Yaqoob, On (∈,∈ ∨qk)-fuzzy KU-idealsof KU-algebras, Acta Universitatis Apulensis, 39 (2014), 75-83.

[10] Y.B. Jun, Roughness of ideals in BCK-algebras, Sci. Math. Japon., 7 (2002),115-119.

[11] Y.B. Jun and X. Yang, Roughness of filters in lattice implication algebras,Bull. Pol. Acad. Sci. Math., 52 (2004), 341-352.

[12] Y.B. Jun and K.H. Kim, Rough set theory applied to BCC-algebras, Int.Math. Forum, 41 (2007), 2023-2029.

[13] N. Kuroki, Rough ideals in semigroups, Inform. Sci., 100 (1997), 139-163.

[14] T. Karimi, Rough sets and gray sets, Agah publishers, 2, 2015.

[15] X. Ma, Applications of rough soft sets in BCI-algebras and decision making,J. Intell. Fuzzy Syst., 29 (2015), 1079-1085.

[16] X. Mao and H. Zhou, The application of rough set theory in Pseudo-BCK-algebra, J. Math. Res. Appl., 36 (2016), 23-35.

[17] S.M. Mostafa, M.A. Abd-Elnaby and M.M.M. Yousef, Fuzzy ideals of KU-Algebras, Int. Math. Forum., 6 (2011), 3139-3149.

[18] S.M. Mostafa, M.A. Abd-Elnaby and O.R. Elgendy, Interval-Valued FuzzyKU-Ideals in KU-Algebras, Int. Math. Forum., 6 (2011), 3151-3159.

Page 705: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ROUGH APPROXIMATIONS IN KU-ALGEBRAS 691

[19] S.M. Mostafa, A.E. Radwan, F.A. Ibrahem and F.F. Kareem, Interval valuefuzzy n-fold KU-ideals of KU-algebras, J. Math. Comput. Sci., 5 (2015), 246.

[20] G. Muhiuddin, Bipolar fuzzy KU-subalgebras/ideals of KU-algebras, Ann.Fuzzy Math. Inform., 8 (2014), 339-504.

[21] Z. Pawlak, Rough sets, Int. J. Comput. Inform. Sci., 11 (1982), 341-356.

[22] C. Prabpayak and U. Leerawat, On ideals and congurences in KU-algebras,Scientia Magna J., 5 (2009), 54-57.

[23] C. Prabpayak and U. Leerawat, On isomorphisms of KU-algebras, ScientiaMagna J., 5 (2009), 25-31.

[24] T. Senapati, T-fuzzy KU-subalgebras of KU-algebras, Ann. Fuzzy Math.Inform., 10 (2015), 261-270.

[25] T. Senapati and K. P. Shum, Atanassov’s intuitionistic fuzzy bi-normedKU-ideals of a KU-algebra, J. Intell. Fuzzy Syst., 30 (2016), 1169-1180.

[26] L. Torkzadeh and S. Ghorbani, Rough filters in B-Algebras, Int. J. Math.Math. Sci., 2011.

[27] Q. M. Xiao and Z. L. Zhang, Rough prime ideals and rough fuzzy primeideals in semigroups, Inform. Sci., 176 (2006), 725-733.

[28] N. Yaqoob, S.M. Mostafa and M.A. Ansari, On cubic KU-ideals of KU-algebras, ISRN Algebra, 2013.

[29] L.A. Zadeh, Fuzzy sets, Inform. Control., 8 (1965), 338-353.

Accepted: 11.05.2018

Page 706: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (692–698) 692

ON HYPERIDEALS OF ORDERED SEMIHYPERGROUPS

ZE GUSchool of Mathematics and Statistics

Zhaoqing University

Zhaoqing, Guangdong, 526061

P.R. China

[email protected]

Abstract. Prime, weakly prime and semiprime hyperideals in ordered semihyper-groups were studied by Kehayopulu. In this paper, we introduce the concepts of weaklysemiprime and irreducible hyperideals in ordered semihypergroups. The relationshipbetween the five classes of hyperideals is established. Finally, we characterize semisim-ple ordered semihypergroups and intra-regular ordered semihypergroups in terms ofthese hyperideals.

Keywords: ordered semihypergroups, hyperideals, semisimple ordered semihyper-groups, intra-regular ordered semihypergroups.

1. Introduction and preliminaries

The algebraic hyperstructure theory was first introduced in 1934 by Marty [18].Hyperstructures have many applications in several branches of both pure andapplied sciences (see [4-6,8,9,11-13,23]). Recently, Heidari and Davvaz appliedthe hyperstructure theory to ordered semigroups and introduced the conceptof ordered semihypergroups (see [16]), which is a generalization of the conceptof ordered semigroups. Furthermore, the ordered semihypergroup theory wasenriched by the work of many researchers, for example [2,3,10,14,15,22,23]. Inparticular, the hyperideal theory on semihypergroups and ordered semihyper-groups can be seen in [1-3,17-19,22,23]. Recently, N. Kehayopulu (see [18-19])introduced prime, weakly prime and semiprime hyperideals in ordered semihyer-groups and studied ordered semihypergroups with these hyperideals. Motivatedby the previous work on hyperideals of (ordered) semihypergroups, we attemptin the present paper to study hyperideals of ordered semihypergroups in detail.In this article, we introduce the notions of weakly semiprime and irreducible hy-perideals in ordered semihypergroups, and moreover establish the relationshipbetween the five classes of hyperideals. Finally, semisimple ordered semihyper-groups and intra-regular ordered semihypergroups are characterized in terms ofthese hyperideals. Partial results which are consistent with the conclusions in[19] are reorganized and proved. We recall first some basic notions of orderedsemihypergroup.

Page 707: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON HYPERIDEALS OF ORDERED SEMIHYPERGROUPS 693

A hypergroupoid (S, ) is a nonempty set S together with a hyperoperationor hypercomposition, that is a mapping : S×S → P∗(S), where P∗(S) denotesthe family of all nonempty subsets of S. If x ∈ S and A,B are nonempty subsetsof S, then we denote AB =

∪a∈A,b∈B ab, xA = xA and Ax = Ax.

A hypergroupoid (S, ) is called a semihypergroup if is associative, that isx (y z) = (x y) z for every x, y, z ∈ S.

An ordered semihypergroup (S, ,≤) is a semihypergroup (S, ) with an orderrelation ≤ which is compatible with the hyperoperation , meaning that for anya, b, x ∈ S, a ≤ b implies that a x ≤ b x and x a ≤ x b. Here, letA,B ∈ P ∗(S), then we say that A ≤ B if for every a ∈ A there exists b ∈ Bsuch that a ≤ b. Let S be an ordered semihypergroup and A be a nonemptysubset of S. We say that A is a hyperideal of S if (1) S A ⊆ A,A S ⊆ A and(2) a ∈ A, b ∈ S and b ≤ a imply that b ∈ A. For ∅ = H ⊆ S, we denote

(H] := t ∈ S | t ≤ h for some h ∈ H.

For convenience, we write (a] instead of (a] for H = a. We denote by I(a)the hyperideal of S generated by a. On can easily obtain that

I(a) = (a ∪ S a ∪ a S ∪ S a S].

2. Hyperideals of ordered semihypergroups

In this section, we recall prime, weakly prime and semiprime hyperideals andintroduce the concepts of weakly semiprime and irreducible hyperideals. More-over, we study the relationship between the five classes of hyperideals.

Let (S, ,≤) be an ordered semihypergroup and I be a hyperideal of S. I iscalled prime if for any A,B ⊆ S, A B ⊆ I implies A ⊆ I or B ⊆ I (equivalentto for all a, b ∈ S, a b ⊆ I implies a ∈ I or b ∈ I); I is called semiprime if forany A ⊆ S, A A ⊆ I implies A ⊆ I (equivalent to for any a ∈ S, a a ⊆ Iimplies a ∈ I); I is called weakly prime if for all hyperideals A,B of S, AB ⊆ Iimplies A ⊆ I or B ⊆ I;

Definition 2.1. Let (S, ,≤) be an ordered semihypergroup and I be a hyper-ideal of S. I is called weakly semiprime if for any hyperideal A of S, A A ⊆ Iimplies A ⊆ I; I is called irreducible if for all hyperideals I1, I2 of S, I1 ∩ I2 = Iimplies I1 = I or I2 = I.

Remark 2.2. It is easy to see that a prime hyperideal is semiprime and weaklyprime, and a semiprime hyperideal is weakly semiprime.

For further studying the relationship between the five classes of hyperideals,we need the following result which can be easily obtained.

Lemma 2.3. Let S be an ordered semihypergroup. Then(1) A ⊆ (A], ((A]] = (A] for all A ⊆ S;(2) If A ⊆ B ⊆ S, then (A] ⊆ (B];

Page 708: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

694 ZE GU

(3) (A] (B] ⊆ (A B], ((A] (B]] = (A B] for all A,B ⊆ S;(4) (T ] = T for every hyperideal T of S;(5) If A,B are hyperideals of S, then (AB), A∩B and A∪B are hyperideals

of S;(6) (S A S] is a hyperideal of S for all A ⊆ S, in particular, we write

(S a S] as (S a S].

Lemma 2.4. Let S be an ordered semihypergroup and I a hyperideal of S. ThenI is the intersection of all irreducible hyperideals of S containing I.

Proof. Let Iα | α ∈ Γ be the set of all irreducible hyperideals of S containingI. Obviously, I ⊆

∩α∈Γ Iα. It suffices to prove that

∩α∈Γ Iα − I = ∅. Suppose

that there exists a ∈∩α∈Γ Iα − I. Let Ω = H is a hyperideal | I ⊆ H, a /∈ H.

Then Ω = ∅ from I ∈ Ω, and Ω is partially ordered under inclusion. By Zorn’sLemma, there exists a maximal element M ∈ Ω. Next we show that M isirreducible. Let A,B be two hyperideals such that A ∩ B = M . Then A ∈ Ωor B ∈ Ω. Thus A = M or B = M . Otherwise, M $ A and M $ B whichcontradicts the maximality of M . Hence I =

∩α∈Γ Iα.

Theorem 2.5. Let S be an ordered semihypergroup and I a hyperideal of S.Then I is prime if and only if it is semiprime and weakly prime. In particular,if S is commutative, then the prime and weakly prime hyperideals concide.

Proof. (⇒) It is obtained from Remark 2.2.(⇐) Let a, b ∈ S and ab ⊆ I. Then (bSa](bSa] ⊆ (bSabSa] ⊆

(S (a b)S] ⊆ (S I S] ⊆ (I] = I. Since I is semiprime, (bS a] ⊆ I. Thus(SbS](SaS] ⊆ (SbSSaS] ⊆ (S(bSa)S] ⊆ (SIS] ⊆ I. Since Iis weakly prime, we have (SbS] ⊆ I or (SaS] ⊆ I. Suppose that (SaS] ⊆I. Then (I2(a)]I(a) = (I2(a)](I(a)] ⊆ (I3(a)] = ((a∪Sa∪aS∪SaS]3] ⊆(((a∪Sa∪aS∪SaS)2](a∪Sa∪aS∪SaS]] ⊆ ((Sa∪SaS](a∪Sa∪aS∪SaS]] ⊆ (((Sa∪SaS)(a∪Sa∪aS∪SaS)]] ⊆ ((SaS]] ⊆ (I] = I.Since I is weakly prime, we have (I2(a)] ⊆ I or I(a) ⊆ I. If I(a) ⊆ I, thena ∈ I(a) ⊆ I. If (I2(a)] ⊆ I, then I2(a) ⊆ I. Since I is weakly prime, I(a) ⊆ Iand so a ∈ I. By symmetries, we obtain b ∈ I if (S b S] ⊆ I. Therefore, I isa prime hyperideal of S.

Let S be commutative, I weakly prime and a, b ∈ S such that a b ⊆ I.Then I(a)I(b) = (a∪S a] (b∪S b] ⊆ (ab∪S ab] ⊆ (I ∪S I] ⊆ (I] = I.Since I is weakly prime, we have a ∈ I(a) ⊆ I or b ∈ I(b) ⊆ I.

Theorem 2.6. Let S be an ordered semihypergroup and I a hyperideal of S.Then I is weakly prime if and only if it is weakly semiprime and irreducible.

Proof. (⇒) From Remark 2.2, we know that I is weakly semiprime. Next weshow that I is irreducible. Let I1, I2 be two hyperideals such that I1 ∩ I2 = I.Then I ⊆ I1 and I ⊆ I2. Moreover, I1 I2 ⊆ I1 ∩ I2 = I. Since I is weaklyprime, I1 ⊆ I or I2 ⊆ I. Hence I1 = I or I2 = I.

Page 709: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON HYPERIDEALS OF ORDERED SEMIHYPERGROUPS 695

(⇐) Let A,B be two hyperideals such that AB ⊆ I. Then (A∩B)(A∩B) ⊆A B ⊆ I. Since I is weakly semiprime, A ∩ B ⊆ I. Thus I = I ∪ (A ∩ B) =(I ∪A)∩ (I ∪B). Since I is irreducible, we have I ∪A = I or I ∪B = I. HenceA ⊆ I or B ⊆ I. Consequently, I is weakly prime.

Combining Theorem 2.5 and 2.6, we have the following result.

Corollary 2.7. Let S be an ordered semihypergroup and I a hyperideal of S.Then I is prime if and only if it is semiprime and irreducible.

3. Semisimple and intra-regular ordered semihypergroups

In this section, we mainly characterize semisimple ordered semihypergroups andintra-regular semihypergroups in terms of the five classes hyperideals introducedin the previous section.

Let (S, ,≤) be an ordered semihypergroup. S is called semisimple if a ∈(S a S a S] for every a ∈ S; S is called intra-regular if a ∈ (S a a S]for every a ∈ S.

Theorem 3.1. Let S be an ordered semihypergroup. Then the following state-ments are equivalent:

(1) S is semisimple;

(2) A ∩B = (A B] for all hyperideals A,B of S;

(3) (A2] = A for every hyperideal A of S;

(4) Every hyperideal of S is weakly semiprime.

Proof. (1)⇒(2) Let A,B be hyperideals of S. If a ∈ A ∩ B, then a ∈ (S a S a S] = ((S a S) (a S)] ⊆ (A B]. Thus A∩B ⊆ (A B]. On the otherhand, (A B] ⊆ (A] ∩ (B] = A ∩B. Hence A ∩B = (A B].

(2)⇒(3) It is obvious.

(3)⇒(4) Let A and I be hyperideals of S such that A2 ⊆ I. Then (A2] ⊆(I] = I. By hypothesis, A = (A2] ⊆ I.

(4)⇒(1) By the proof of Theorem 2.5, we have (I3(a)] ⊆ (SaS]. Followingthe method, we can obtain (I5(a)] ⊆ (S a S a S]. Moreover, ((I2(a)]2] ((I2(a)]2] ⊆ (I4(a)] (I4(a)] ⊆ (I4(a)] (I(a)] ⊆ (I5(a)] and ((I2(a)]2] is ahyperideal. Since (SaSaS] is weakly semiprime, ((I2(a)]2] ⊆ (SaSaS].Continuing the process twice, we have a ∈ I(a) ⊆ (S a S a S].

Theorem 3.2. Let S be an ordered semihypergroup. Then S is intra-regular ifand only if every hyperideal of S is semiprime.

Proof. (⇒) Let I be a hyperideal of S and a ∈ S such that a2 ⊆ I. Thena ∈ (S a2 S] ⊆ (S I S] ⊆ (I] = I.

(⇐) Let a ∈ S. Then a2 a2 = a a2 a ⊆ S a2 S ⊆ (S a2 S]. Since(S a2 S] is a hyperideal of S, by hypothesis, (S a2 S] is semiprime. Thusa2 ⊆ (S a2 S]. In the same way, we have a ∈ (S a2 S].

Page 710: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

696 ZE GU

Theorem 3.3. Let S be an ordered semihypergroup and Θ be the set of allhyperideals of S. Then I is weakly prime for every I ∈ Θ if and only if S issemisimple and Θ is a chain.

Proof. (⇒) From Theorem 3.1, we know that S is semisimple. Let A,B ∈ Θ.Since (A B] ∈ Θ and A B ⊆ (A B], by hypothesis, we have A ⊆ (A B] orB ⊆ (A B]. Moreover, (A B] = A ∩ B from Theorem 3.1. Hence A ⊆ B orB ⊂ A. Consequently, Θ is a chain under inclusion.

(⇐) From Theorem 2.6 and 3.1, it suffice to verify that I is irreducible forany I ∈ Θ. Let A,B ∈ Θ and A ∩B = I. Since Θ is a chain, A ⊂ B or B ⊂ A.Thus A = I or B = I. Hence I is irreducible.

From Theorem 3.1, 3.2 and 3.3, we can easily obtain the following result.

Theorem 3.4. Let S be an ordered semihypergroup and Θ be the set of allhyperideals of S. Then I is prime for every I ∈ Θ if and only if S is intra-regular and Θ is a chain.

We end this paper with an example by illustrating the previous results.

Example 3.5. Let S = a, b, c, d, e with the hyperoperation and the orderrelation ≤ below:

a b c d e

a b,c a a a ab a b,c b,c b,c b,cc a b,c b,c b,c b,cd a b,c b,d d,e d,ee a b,c c d,e e

≤:= (a, a), (b, b), (c, c), (c, b), (d, d), (e, e), (e, d).

One can check that (S, ,≤) is an ordered semihypergoup (see [19]). The hyper-ideals of S are S and I = a, b, c. Obviously, the set of all hyperideals forms achain. One can also check that S is intra-regular. Thus, by Theorem 3.4, thehyperideals of S are prime. We give an independent proof as following: indeed,S\I = d, e and d d = d e = e e = d, e " I, e e = e " I. By Theorem2.5 and 2.6, we know that the ideals of S are weakly prime, semiprime, weaklysemiprime and irreducible. Moreover, by Theorem 3.3, S is semisimple.

Acknowledgements

This work is supported by the National Natural Science Foundation of China(No. 11701504), the Young Innovative Talent Project of Department of Educa-tion of Guangdong Province (No. 2016KQNCX180) and the University NaturalScience Project of Anhui Province (No. KJ2018A0329).

Page 711: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON HYPERIDEALS OF ORDERED SEMIHYPERGROUPS 697

References

[1] T. Changphas, B. Davvaz, Hyperideal theory in ordered semihypergroups,Xanthi: International Congress on Algebraic Hyperstructures and its Ap-plications, 51-54, 2014.

[2] T. Changphas, B. Davvaz, Properties of hyperideals in ordered semihyper-groups, Ital. J. Pure Appl. Math., 33 (2014), 425-432, .

[3] T. Changphas, B. Davvaz, Bi-hyperideals and quasi-hyperideals in orderedsemihypergroups, Ital. J. Pure Appl. Math., 35 (2015), 493-508.

[4] P. Corsini, Sur les semi-hypergroupes, Atti Soc. Pelorit. Sci. Fis. Math.Nat., 26 (1980), 363-372.

[5] P. Corsini, Prolegomena of Hypergroup Theory, Tricesimo: Aviani Editore,1993.

[6] P. Corsini, V. Leoreanu-Fotea, Applications of Hyperstructure Theory. Ad-vances in Mathematics, Dordrecht: Kluwer Academic Publishers, 2003.

[7] P. Corsini, M. Shabir, T. Mahmood, Semisimple semihypergroups in termsof hyperideals and fuzzy hyperideals, Iranian Journal of Fuzzy Systems, 8(2011), 95-111.

[8] B. Davvaz, Polygroup Theory and Related Systems, Hackensack: WorldScientific Publishing Co. Pte. Ltd., 2013.

[9] B. Davvaz, Semihypergroup Theory, Academic Press, Elsevier, 2016.

[10] B. Davvaz, P. Corsini, T. Changphas, Relationship between ordered semihy-pergroups and ordered semigroups by using pseudoorder, European Journalof Combinatorics, 44 (2015), 208-217.

[11] B. Davvaz, V. Leoreanu-Fotea, Hyperring theory and applications, Florida:International Academic Press, 2007.

[12] M. De Salvo, D. Freni, G. Lo Faro, Fully simple semihypergroups, J. Alge-bra, 399 (2014), 358-377.

[13] M. De Salvo, D. Freni, D. Fasino et al., Fully simple semihypergroups,transitive digraphs, and sequence A000712, J. Algebra, 415 (2014), 65-87.

[14] Z. Gu, X.L. Tang, Ordered regular equivalence relations on ordered semihy-pergroups, J. Algebra, 450 (2016), 384-397.

[15] Z. Gu, X.L. Tang, Characterizations of (strongly ) ordered regular relationson ordered semihypergroups, J. Algebra, 465 (2016), 100-110.

Page 712: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

698 ZE GU

[16] D. Heidari, B. Davvaz, On ordered hyperstructures, Politehn. Univ.Bucharest Sci. Bull. Ser. A Appl. Math. Phys., 73 (2011), 85-96.

[17] K. Hila, B. Davvaz, K. Naka, On quasi-hyperideals in semihypergroups,Comm. Algebra, 39 (2011), 4183-4194.

[18] N. Kehayopulu, Left regular and intra-regular ordered hypersemigroups interms of semiprime and fuzzy semiprime subsets, Sci. Math. Jpn., 80 (2017),295-305.

[19] N. Kehayopulu, On ordered hypersemigroups with idempotent ideals, primeor weakly prime ideals, European Journal of Pure and Applied Mathemat-ics, 11 (2018), 10-22.

[20] F. Marty, Sur une generalization de la notion de groupe, Stockholm: Pro-ceedings of the 8th Congress Math. Scandinaves, 45-49, 1934.

[21] C.G. Massouros, On connections between vector spaces and hypercomposi-tional structures, Ital. J. Pure Appl. Math., 34 (2015), 133-150.

[22] B. Pibaljommee, B. Davvaz, Characterizations of (fuzzy) bi-hyperideals inordered semihypergroups, J. Intell. Fuzzy Systems, 28 (2015), 2141-2148.

[23] J. Tang, A. Khan, Y.F. Luo, Characterizations of semisimple ordered semi-hypergroups in terms of fuzzy hyperideals, J. Intell. Fuzzy Systems, 30(2016), 1735-1753.

Accepted: 16.05.2018

Page 713: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (699–710) 699

BAYESIAN ESTIMATION AND PREDICTION BASED ONEXPONENTIAL RESIDUAL TYPE II CENSORED LIFEDATA

Ghassan K. Abufoudeh∗

Raed R. Abu Awwad

Department of Mathematics

Faculty of Arts and Sciences

University of Petra

Amman

Jordan

ghassan [email protected]

Abstract. In this paper, we consider statistical inference problems for the residual lifedata come from exponential model based on type II censored data. Maximum likelihoodand Bayesian approaches are used to estimate the scale parameter for exponential modelalso we construct symmetric credible intervals. Further, we propose to estimate theposterior predictive density of the future ordered observations and then obtain thecorresponding predictors and we obtain the predictive survival function to compute thepredictive interval for the missing order statistics. Numerical comparisons are conductedto assess the performance of the estimators of the parameter as well as the predictorsof future ordered data.

Keywords: residual life data, exponential distribution, type II censored data, Maxi-mum likelihood estimation, Bayes estimation, Bayes prediction.

1. Introduction

Exponential distribution plays an important role in lifetime data analysis andis a commonly used distribution in reliability engineering. In the last few years,many researchers have developed inference procedures for exponential model.Sarhan (2003) obtained the empirical Bayes estimators of exponential model.Janeen (2004) discussed the empirical Bayes estimators of the exponential dis-tribution parameter based on record values. Yimin and Weian (2010) estimatedthe scale parameter for two parameters exponential distribution using empiri-cal Bayes procedure under the type I censoring life test. Chen and Lio (2010)considered the parameter estimation for exponential distribution under progres-sive type I interval censoring. Also, several authers studied Bayesian inferenceand prediction. Kundu (2008) studied the Bayesian inference of the Weibull

∗. Corresponding author

Page 714: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

700 GHASSAN K. ABUFOUDEH and RAED R. ABU AWWAD

parameters when the data are progressively censored under the squared errorloss function. Kundu and Howlader (2010) described the Bayesian inference andprediction of the inverse Weibull distribution for type II censored data, they ob-tained the Bayes estimatiors based on the square error loss function. Pradhamand Kundu (2011) studied the Bayesian estimation and prediction of the twoparameter Gamma distribution, they considered the Bayes estimation undersquare error loss function with the assumption that the scale parameter has aGamma prior and the shape parameter has any log-cocave prior. Al-Hussaini(1999) studied the Bayesian prediction problem for a large class of lifetime dis-tribution. For more details, one can refer to Balakrishnan et al. (2005).

The main aim of this paper is to compute the MLE and Bayes estimate of theunknown parameter based on residual exponential life data under square errorloss function and predicte the residual life time for the missing items which isimportant especially in actuarial, medical and engineering sciences.

Suppose that n items are kept under observation until failure. These itemscould be some systems, components, or computer chips in reliability study ex-periments, or they could be patients put under certain drug or clinical conditionsand their lifetimes X

∼= (X1, X2, ..., Xn) follow the exponential distribution with

the probability density function (pdf)

(1) f(x; θ) =

θ.e−θx, if x > 0, θ > 0

0, if x ≤ 0,

and cumulative distribution function (cdf)

(2) F (x; θ) = 1− e−θx, x > 0, θ > 0.

Here θ > 0 is the scale parameter.The residual life random variable at age t is defined as Y = X − t | X >

t, t > 0. These residual life data and its ordering can be effectively appliedin reliability theory and play an important role, especially if one observes onlythe residual lifetime. This type of data do arise naturally in survival actuarialstudies.

The cdf of the residual life variable can be obtained as

(3) G(y) = Pr(X − t < y | X > t) =F (t+ y)− F (t)

1− F (t), y > 0,

and the corresponding pdf is

(4) g(y) =f(t+ y)

1− F (t), y > 0.

Now, for the exponential distribution we get

(5) G(y) = 1− e−θy, y > 0, θ > 0,

Page 715: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

BAYESIAN ESTIMATION AND PREDICTION BASED ... 701

and

(6) g(y) = θe−θy, y > 0, θ > 0.

Now, for some reason or other, one may terminate the experiment at ther− th failure, that is, at time Xr:n , we obtain type II censored sample. Here ris fixed, while Xr:n , the duration of the experiment is random. The likelihoodfunction in this case is

(7) L(θ | X∼

) =n!

(n− r)!

r∏i=1

g (xi | θ) [1−G(xr; θ)]n−r , x1 < x2 < ... < xr.

Consider we have complete data for the residual life times Y1, Y2, ..., Yn, whereYi = Xi − t | Xi > t , i = 1, 2, ..., n are the residual lifetime random variables.

2. Maximum likelihood estimation

In this section, we derive the maximum likelihood estimator (MLE) of the pa-rameter θ of the exponential model based on type II censored data using theresidual life observations. Let Y1:n < Y2:n < ... < Yr:n be a type II censoredsample of size r (1 < r < n). On using Eq.(5), Eq.(6) and Eq.(7), the likelihoodfunction is given by

L (θ | data) =n!

(n− r)!θre−θ[yr(n−r)+

∑ri=1 yi].

By differentiating the natural logarithm of the likelihood function with re-spect to θ and equating the resulting term to zero, we get

(8) θ =r

yr (n− r) +∑r

i=1 yi.

The MLE of θ, say∧θ, is obtained as a solution of Eq.(8). For more details

about the existence of these MLEs and uniqueness, see Balakrishnan and Kateri(2008).

3. Bayes estimation

For the Bayesian inference and life testing plan, we need to assume some priordistributions to obtain the Bayes estimates (BEs) of θ and the correspondingcredible intervals based on type II censored data, the natural choice of the scaleparameter θ has a conjugate gamma prior Gamma (a, b) , with pdf

π1 (θ | a, b) =

ba

Γ(a)θa−1e−bθ, if θ > 0

0, if θ ≤ 0,

Page 716: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

702 GHASSAN K. ABUFOUDEH and RAED R. ABU AWWAD

with the hyper-parameters a > 0 , b > 0 and Γ (a) =∫∞0 xa−1e−xdx .

For more details, see Kundu (2008), and Kundu and Raqab (2012). Forcomputing the Bayes estimates, we assume mainly a squared error loss (SEL)function only.

Based on a Type II censored data Y1:n < Y2:n < ... < Yr:n, (1 ≤ r ≤ n) andthe prior of θ, we obtain the conditional posterior of θ using Eq.(5) and Eq.(6)as

π (θ | data) ∝r∏i=1

g (yi | θ) [1−G(yr; θ)]n−r π1 (θ)(9)

∝ θr+a−1e−θ(b+yr(n−r)+∑ri=1 yi).

The conditional posterior distribution of θ given data, π (θ | data) is

(10) Gamma

(r + a, b+ yr (n− r) +

r∑i=1

yi

).

Therefore, the BE of θ, say∧θBayes, is

(11)∧θBayes =

r + a

b+ yr (n− r) +∑r

i=1 yi.

Also, the (1− β) 100% Bayesian credible interval for θ is given by (θL, θU )such that ∫ θU

θL

π (θ | data) dθ = 1− β.

So,

(12) Pr (λL < θ <∞) = 1− β

2and Pr (λU < θ <∞) =

β

2.

Using Eq.(10) and the incomplete gamma function which is defined as Γ (a, c)=∫∞c xa−1e−xdx , a > 0, c > 0, we obtain

(13) Γ (r + a, uθL) =

(1− β

2

)Γ (r + a) and Γ (r + a, uθU ) =

β

2Γ (r + a) ,

where u = b+ yr (n− r) +∑r

i=1 yi.Now, by using a suitable numerical method to solve equations (13), we obtain

(θL, θU ) .

4. Bayes prediction

The Bayes prediction of the unknown observation from the future sample basedon current a vailable sample, known as informative sample, is an important fea-ture in Bayes analysis. We mainly consider the estimation of posterior predictive

Page 717: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

BAYESIAN ESTIMATION AND PREDICTION BASED ... 703

density of a future observation based on the current data. The objective is toprovide an estimate of the future observation of an residual experiment basedon the results obtained from an informative experiment.

Let y1:n < y2:n < ... < yr:n be the observed sample known as informativesample and yr+1:n < yr+2:n < ... < yn:n be the unobserved future sample. Ourgoal is to predict Ys:n, r < s ≤ n. The posterior predictive density of Ys:n giventhe observed data Y

∼= (y1:n, y2:n, ..., yr:n) is defined as

πYs (y | data) =

∫ ∞

0gYs|data (y | θ)π (θ | data) dθ , ys > yr,

where gYs|data (y | θ) is the conditional density of Ys given θ and data Y∼

, see for

example Chen, Shao and Ibrahim (2000).

Using the Markovian property of the conditional order statistics, see Davidand Nagaraja (2003), the conditional pdf of Ys:n given Y

∼is just the conditional

pdf of Ys:n given Yr:n, (r + 1 ≤ s ≤ n) that is,

gYs|data(ys | α, λ) = gYs|Yr (ys | α, λ) =gr;s:n (yr, ys)

gr:n (yr)(14)

= c θ[1− e−θ(y−yr)

]s−r−1e−θ(y−yr)(n−s+1),

where gr;s:n (yr, ys) is the joint pdf of the r− th and s− th order statistics froma sample of size n from the parent distribution G (.). One can observe that theconditional density of Ys:n given Yr:n is just the marginal density of (s− r)− thorder statistics from a sample of size (n− r) from the left truncated distributionof G (.) at yr. By using the binomial expansian, we have

(15) gYs|data (y | α, λ) = c θ

s−r−1∑i=0

(s− r − 1

i

)(−1)i e−θ(y−yr)[n+i−s+1],

where c = (n−r)!(s−r−1)!(n−s)! . So, the posterior predictive density of Ys:n at any point

y > yr is

πYs(y | data) = c

∫ ∞

s−r−1∑i=0

(s− r − 1

i

)(−1)ie−θ(y−yr)[n+i−s+1] π(θ | data)dθ

= cs−r−1∑i=0

(s− r − 1

i

)(−1)i

∫ ∞

0θr+ae−θ[(y−yr)(n+i−s+1)+yr(n−r)+

∑ri=1 yi+b]dθ

= c

s−r−1∑i=0

(s− r − 1

i

)(−1)i

Γ(r + a+ 1)

[(y−yr)(n+i−s+1)+yr(n−r)+∑r

i=1 yi+b]r+a+1

.

Page 718: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

704 GHASSAN K. ABUFOUDEH and RAED R. ABU AWWAD

The Bayes predictor (BP) of Ys:n under SEL function is

Y BPs:n =

∫ ∞

yr

y πYs (y | data) dy

= c

∫ ∞

yr

y

s−r−1∑i=0

(s− r − 1

i

)(−1)i

Γ (r + a+ 1)

[(y − yr)(n+ i− s+ 1) + yr (n− r) +∑r

i=1 yi + b]r+a+1dy.

By using the transformation v = (y−yr)(n+ i−s+1)+yr (n− r)+∑r

i=1 yi+b,we get

Y BPs:n = c

s−r−1∑i=0

(s− r − 1

i

)(−1)i

1

(n− s+ i+ 1)2(16)

[b+

∑ri=1 yi + yr (n− r) + yr (n+ i− s+ 1) (r + a− 1)

(r + a− 1)].

Another important problem is to construct a two sided predictive intervalof the order statistics Ys. For this, we need to obtain the predictive survivalfunction of Ys which is defined as

SYs|data (y | θ) = Pr (Y > y) =

∫ ∞

ygYs|data (z | θ) dz(17)

= c

s−r−1∑i=0

(s− r − 1

i

)(−1)i

(n− s+ i+ 1)e−θ(y−yr)(n−s+i+1).

Under the SEL function, the predictive survival function of Ys is

SPYs|data (y | α, λ)

=

∫ ∞

0c

s−r−1∑i=0

(s− r − 1

i

)(−1)i

(n− s+ i+ 1)e−θ(y−yr)(n−s+i+1)(18)

π (θ | data) dθ.

= c

s−r−1∑i=0

(s− r − 1

i

)(−1)i

(n− s+ i+ 1)

[yr(n− r) +∑r

i=1 yi + b]r+a

[(y − yr) (n− s+ i+ 1) + yr(n− r) +∑r

i=1 yi + b]r+a.

Now, the (1− β) 100% predictive interval of Ys can be found by solving thefollowing non -linear equations (19) for the lower bound (L) and upper bound(U) using a suitable numerical technique

(19)∧SP

Ys|data (L) = 1− β

2and

∧SP

Ys|data (U) =β

2.

Page 719: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

BAYESIAN ESTIMATION AND PREDICTION BASED ... 705

5. Simulations and data analysis

5.1 Simulations

We report some numerical experiments performed to evaluate the behavior of theproposed methods for different sampling schemes and different priors based ontype II censored data. We have assumed θ = 2 to generate exponential residuallife data at t = 0.2, t = 0.5, and t = 0.9 . To compute the BEs under SELfunction, we have assumed π1 (θ), the prior of θ, has gamma density functionwith shape and scale parameters a and b respectively. For the computations ofBEs, we consider types of prior for θ: first prior is the non-informative prior, i.ea = b = 0, we call this prior as Prior 0, second prior is the informative prior, herwe use three cases namely (Prior 1 : a = 1, b = 2) , (Prior 2 : a = 1, b = 3) ,and (Prior 3 : a = 1, b = 4) .From Eq.8 and Eq.11, we notice that the MLEand BE are equals under Prior 0. In each sampling schemes, we compute theMLE and the BE of θ under SEL function and 95% credible intervals of θ basedon 10,000 samples. We report the average Bayes estimates, mean squared errors(MSEs), coverage percentages lengths and average credible intervals lenghts forθ based on 10,000 replications.

Table 1: MLEs and Bayes estimates with respect to SEL function based onresidual type II censored data, when t = 0.2.

Scheme MLE Bayes(Prior1) Bayes(Prior2) Bayes(Prior3)

θ θ θ θ

Scheme 1: n = 25, r = 10 2.1846 1.6744 1.4269 1.2260(0.5848) (0.2436) (0.3878) (0.5426)

Scheme 2: n = 25, r = 15 2.0850 1.7407 1.6311 1.4420(0.3933) (0.2101) (0.2472) (0.3695)

Scheme 3: n = 25, r = 20 2.1844 1.8432 1.6445 1.5803(0.2926) (0.1352) (0.1905) (0.2320)

Scheme 4: n = 40, r = 10 2.3275 1.6942 1.3856 1.2412(0.9030) (0.2552) (0.4404) (0.6294)

Scheme 5: n = 40, r = 20 2.1413 1.7811 1.6714 1.5249(0.2658) (0.1757) (0.1827) (0.2585)

Scheme 6: n = 40, r = 30 1.9813 1.8752 1.7477 1.6773(0.1200) (0.0865) (0.1297) (0.1109)

Note: The first entry represents the point estimate, while the correspondingMSE is given between the parentheses.

From tables 1,2 and 3, it is evident that the MLEs and Bayes estimates ofθ improve when more information is available (r gets large), this observationsis valid for priors (Prior 1, P rior 2 and Prior 3) when t = 0.2, t = 0.5, andt = 0.9 and the Bayes estimates of θ under informative priors get better thanthe MLEs of θ. The Bayes estimates of θ under informative priors perform lessbetter when the variance gets small. From table 4, we observe that the averagecredible intervals lenghts for θ become smaller when r increases and n is fixedfor all priors when t = 0.2, t = 0.5, and t = 0.9.

Page 720: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

706 GHASSAN K. ABUFOUDEH and RAED R. ABU AWWAD

For computing the predictors, based on exponential residual data we haveobtained the point predictors and 95% predictive intervals (PIs) at t = 0.2,t = 0.5, and t = 0.5 for the missing order statistics Ys, r < s ≤ n using Prior 1.From table 5 and 6, we observe that the predicted values for the missing orderstatistics Ys:n are quite close to each other and fall in their PIs for all schemes.

Table 2: MLEs and Bayes estimates with respect to SEL function based onresidual type II censored data, when t = 0.5.

Scheme MLE Bayes(Prior1) Bayes(Prior2) Bayes(Prior3)

θ θ θ θ

Scheme 1: n = 25, r = 10 2.1529 1.6004 1.4559 1.2141(0.5083) (0.3032) (0.3646) (0.4532)

Scheme 2: n = 25, r = 15 2.1741 1.8137 1.5602 1.4170(0.3508) (0.1919) (0.2752) (0.3230)

Scheme 3: n = 25, r = 20 2.1056 1.7677 1.6984 1.5445(0.2423) (0.1604) (0.1718) (0.2066)

Scheme 4: n = 40, r = 10 2.1689 1.6156 1.4082 1.2768(0.5192) (0.2661) (0.4266) (0.4884)

Scheme 5: n = 40, r = 20 2.1633 1.7927 1.6738 1.5455(0.2758) (0.1742) (0.1789) (0.2161)

Scheme 6: n = 40, r = 30 2.0712 1.9185 1.7328 1.6936(0.1819) (0.1016) (0.1340) (0.1353)

Note: The first entry represents the point estimate, while the correspondingMSE is given between the parentheses.

Table 3: MLEs and Bayes estimates with respect to SEL function based onresidual type II censored data, when t = 0.9.

Scheme MLE Bayes(Prior1) Bayes(Prior2) Bayes(Prior3)

θ θ θ θ

Scheme 1: n = 25, r = 10 2.1661 1.6435 1.4305 1.2974(0.4285) (0.2821) (0.3883) (0.4123)

Scheme 2: n = 25, r = 15 2.2071 1.8032 1.5639 1.4454(0.3329) (0.1496) (0.2441) (0.3094)

Scheme 3: n = 25, r = 20 2.0603 1.8125 1.7065 1.5159(0.1848) (0.1243) (0.1397) (0.1809)

Scheme 4: n = 40, r = 10 2.1492 1.6915 1.4051 1.2488(0.5191) (0.2422) (0.4252) (0.5043)

Scheme 5: n = 40, r = 20 2.1784 1.8448 1.6361 1.5587(0.2374) (0.1534) (0.1853) (0.2117)

Scheme 6: n = 40, r = 30 2.0036 1.8822 1.7688 1.6280(0.1430) (0.1093) (0.1250) (0.1316)

Note: The first entry represents the point estimate, while the correspondingMSE is given between the parentheses.

Page 721: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

BAYESIAN ESTIMATION AND PREDICTION BASED ... 707

Table 4: Average credible intervals lengths of θ based on residual type IIcensored data.

Schemes Prior1 Prior2 Prior3

n = 25, r = 10 t = 0.2 2.7801 (0.94) 2.8156 (0.95) 2.8116 (0.94)

t = 0.5 2.8632 (0.95) 2.8016 (0.91) 2.8068 (0.93)

t = 0.9 2.8630 (0.92) 2.8713 (0.95) 2.7282 (0.95)

n = 25, r = 15 t = 0.2 2.1333 (0.95) 2.1384 (0.95) 2.1870 (0.97)

t = 0.5 2.1600 (0.92) 2.2269 (0.93) 2.1665 (0.96)

t = 0.9 2.1862 (0.95) 2.1852 (0.94) 2.1661 (0.93)

n = 25, r = 20 t = 0.2 1.8204 (0.96) 1.8177 (0.96) 1.8049 (0.95)

t = 0.5 1.8020 (0.95) 1.8675 (0.92) 1.8371 (0.93)

t = 0.9 1.8312 (0.94) 1.8265 (0.93) 1.8231 (0.92)

n = 40, r = 10 t = 0.2 2.7981 (0.95) 1.8483 (0.94) 2.8470 (0.93)

t = 0.5 2.8390 (0.94) 2.7808 (0.96) 2.7822 (0.94)

t = 0.9 2.7631 (0.92) 2.8666 (0.96) 2.8301 (0.95)

n = 40, r = 20 t = 0.2 1.8381 (0.94) 1.8337 (0.94) 1.8256 (0.94)

t = 0.5 1.8494 (0.96) 1.8459 (0.94) 1.8910 (0.95)

t = 0.9 1.8298 (0.94) 1.9649 (0.95) 1.8303 (0.93)

n = 40, r = 30 t = 0.2 1.4673 (0.95) 1.4863 (0.94) 1.4298 (0.96)

t = 0.5 1.4764 (0.94) 1.4638 (0.96) 1.4657 (0.97)

t = 0.9 1.4839 (0.95) 1.4300 (0.95) 1.4722 (0.94)

Note: The first entry represents the average lenght of the credible intervals,while the corresponding coverage percentages is given between the parentheses.

Table 5: Point predictors and PIs for the missing order statistics Ys:n, r+1 ≤s ≤ n.

Schemes Predicted V alues Predicted V alues Predicted V alues

(95% PI) (95% PI) (95% PI)

n = 25, r = 10 t = 0.2 t = 0.5 t = 0.9

Y11:n 0.2370 (0.1982, 0.3556) 0.2927 (0.2731, 0.6551) 0.2504 (0.2109, 0.3713)

Y14:n 0.3751 (0.2379, 0.6571) 0.4508 (0.2937, 0.7737) 0.3912 (0.2513, 0.6787)

Y17:n 0.5551 (0.3119, 1.0245) 0.6569 (0.3784, 1.1944) 0.5748 (0.3268, 1.0533)

Y19:n 0.7147 (0.3804, 1.3505) 0.8397 (0.4569, 1.5677) 0.7375 (0.3967, 1.3857)

Y21:n 0.9333 (0.4731, 1.8044) 1.0899 (0.5630, 2.0875) 0.9603 (0.4911, 1.8485)

Y23:n 1.2809 (0.6124, 2.5571) 1.4880 (0.7225, 2.9494) 1.3148 (0.6332, 2.6159)

Y25:n 2.1749 (0.9016, 4.7886) 2.5117 (1.0537, 5.5046) 2.2262 (0.9280, 4.8910)

n = 25, r = 15

Y16:n 0.4719 (0.4175, 0.6329) 0.5385 (0.4729, 0.7324) 0.5369 (0.4703, 0.7341)

Y18:n 0.6035 (0.4508, 0.9153) 0.6970 (0.5131, 1.0727) 0.6980 (0.5111, 1.0801)

Y20:n 0.7759 (0.5173, 1.2597) 0.9047 (0.5932, 1.4878) 0.9093 (0.5925, 1.5021)

Y21:n 0.8873 (0.5632, 1.4822) 1.0390 (0.6485, 1.7559) 1.0458 (0.6488, 1.7748)

Y23:n 1.2122 (0.6954, 2.1528) 1.4306 (0.8077, 2.5640) 1.4439 (0.8106, 2.5964)

Y24:n 1.4908 (0.7997, 2.7692) 1.7662 (0.9334, 3.3068) 1.7852 (0.9385, 3.3517)

Y25:n 2.0478 (0.9738, 4.1686) 2.4374 (1.1433, 4.9930) 2.4677 (1.1518, 5.0663)

n = 25, r = 20

Y21:n 1.0750 (0.9405, 1.4664) 0.7690 (0.6696, 1.0582) 1.1499 (0.9983, 1.5910)

Y22:n 1.2472 (0.9721, 1.8594) 0.8963 (0.6930, 1.3486) 1.3440 (1.0339, 2.0339)

Y23:n 1.4769 (1.0380, 2.3601) 1.0660 (0.7417, 1.7186) 1.6028 (1.1082, 2.5981)

Y24:n 1.8214 (1.1470, 3.1327) 1.3205 (0.8222, 2.2894) 1.9910 (1.2310, 3.4687)

Y25:n 2.5104 (1.3436, 4.8671) 1.8296 (0.9675, 3.5710) 2.7675 (1.4526, 5.4233)

Note: The first entry represents the point predictor, while the correspondingPIs is given between the parentheses.

Page 722: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

708 GHASSAN K. ABUFOUDEH and RAED R. ABU AWWAD

Table 6: Point predictors and PIs for the missing order statistics Ys:n, r+1 ≤s ≤ n.

Schemes Predicted V alues Predicted V alues Predicted V alues

(95% PI) (95% PI) (95% PI)

n = 40, r = 10 t = 0.2 t = 0.5 t = 0.9

Y11:n 0.1817 (0.1573, 0.2561) 0.1434 (0.1228, 0.2065) 0.1836 (0.1591, 0.2581)

Y14:n 0.2620 (0.1808, 0.4285) 0.2114 (0.1427, 0.3523) 0.2640 (0.1827, 0.4307)

Y17:n 0.3519 (0.2197, 0.6059) 0.2875 (0.1756, 0.5023) 0.3544 (0.2216, 0.6083)

Y20:n 0.4542 (0.2675, 0.8040) 0.3438 (0.2018, 0.6117) 0.4564 (0.2695, 0.8067)

Y23:n 0.5726 (0.3243, 1.0327) 0.4056 (0.2312, 0.7311) 0.5750 (0.3264, 1.0355)

Y26:n 0.7134 (0.3923, 1.3044) 0.4742 (0.2641, 0.8633) 0.7160 (0.3944, 1.3077)

Y29:n 0.8868 (0.4757, 1.6414) 0.5511 (0.3012, 1.0116) 0.8895 (0.4780, 1.6451)

Y32:n 1.1130 (0.5829, 2.0854) 0.6386 (0.3434, 1.1810) 1.1162 (0.5853, 2.0897)

Y35:n 1.4384 (0.7323, 2.7372) 0.7400 (0.3922, 1.3784) 1.4418 (0.7349, 2.7423)

Y38:n 2.0249 (0.9818, 3.9715) 0.8611 (0.4497, 1.6152) 2.0291 (0.9842, 3.9781)

Y40:n 3.1481 (1.3623, 6.7199) 1.0105 (0.5198, 1.9111) 3.1537 (1.3657, 6.7298)

n = 40, r = 20

Y21:n 0.3643 (0.3366, 0.4450) 0.4397 (0.4066, 0.5359) 0.4822 (0.4444, 0.5924)

Y23:n 0.4257 (0.3530, 0.5695) 0.5129 (0.4262, 0.6843) 0.5661 (0.4668, 0.7622)

Y25:n 0.4947 (0.3823, 0.6951) 0.5951 (0.4612, 0.8341) 0.6602 (0.5069, 0.9337)

Y27:n 0.5731 (0.4203, 0.8337) 0.6887 (0.5064, 0.9994) 0.76730 (0.5586, 1.1228)

Y29:n 0.6642 (0.4665, 0.9928) 0.7973 (0.5616, 1.1891) 0.8915 (0.6218, 1.3401)

Y31:n 0.7726 (0.5227, 1.1825) 0.9266 (0.6285, 1.4153) 1.0395 (0.6984, 1.5989)

Y33:n 0.9068 (0.5921, 1.4192) 1.0865 (0.7113, 1.6975) 1.2226 (0.7931, 1.9219)

Y35:n 1.0826 (0.6813, 1.7355) 1.2962 (0.8177, 2.0747) 1.4626 (0.9149, 2.3536)

Y37:n 1.3383 (0.8054, 2.2130) 1.6011 (0.9657, 2.6441) 1.8115 (1.0841, 3.0053)

Y40:n 2.3799 (1.2058, 4.5515) 2.8430 (1.4431, 5.4325) 3.2331 (1.6307, 6.1969)

n = 40, r = 30

Y31:n 0.6022 (0.5554, 0.7362) 0.9975 (0.9352, 1.1758) 0.8688 (0.8042, 1.0535)

Y33:n 0.7155 (0.5856, 0.9644) 1.1483 (0.9754, 1.4796) 1.0251 (0.8459, 1.3684)

Y35:n 0.8641 (0.6470, 1.2395) 1.3461 (1.0571, 1.8458) 1.2305 (0.9305, 1.7479)

Y37:n 1.0800 (0.7434, 1.6425) 1.6335 (1.1855, 2.3823) 1.5279 (1.0636, 2.3039)

Y40:n 1.9598 (1.0722, 3.6069) 2.8046 (1.6231, 4.9973) 2.7417 (1.5171, 5.0142)

Note: The first entry represents the point predictor, while the correspondingPIs is given between the parentheses.

5.2 Data analysis

We analyze the residual real lifetimes data (in minutes) to breakdown of aninsulating fluid at voltage 40 kv is usually assumed to be exponential in engi-neering theory. The real lifetimes data has been recently considered by Nelson(1982). The sample consists of the smallest nine observations of tweleve timesto breakdown as follows: 1, 1, 2, 3, 12, 25, 46, 56, 68. Before we analyze the data,we divide all the points by 100.

The MLE of θ based on the above data is determined to be 1.4887. TheBayes estimate of θ using Prior1 is 1.1273. Also, the 95% cerdible interval of θis (0.9737, 2.0889). Now, we consider the prediction of the 10 − th, 11 − th and12− th order statistics which are missing. The predicted values and the 95% PIof the 10− th, 11− th and 12− th order statistics are presented in Table 7. It is

Page 723: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

BAYESIAN ESTIMATION AND PREDICTION BASED ... 709

observed that all predicted values with respect to SEL function are all orderedand fall in their corresponding PI.

Table 7: Point predictors and PIs for the real data.n = 12, r = 9 Y10:n Y11:n Y12:n

Predicted V alues 103.40 319.23 411.35

(95% PI) (79.63, 118.81) (304.42, 335.28) (394.90, 431.83)

References

[1] E.K. Al-Hussaini, Predicting observable from a general class of distribu-tions, Journal of Statistical Planning and Inference, 79 (1999), 79-81.

[2] N. Balakrishnan, C.T. Lin, P.S. Chan, A comparison of two simple pre-diction intervals for exponential distribution, IEEE T. Reliab., 54 (2005),27-33.

[3] N. Balakrishnan, M. Kateri, On the maximum likelihood estimation ofparameters of Weibull distribution based on complete and censored data,Statistics & Probability Letters, 78 (2008), 2971-2975.

[4] D.G. Chen, Y.L. Lio, Parameter estimation for generalized exponential dis-tribution under progressive Type I interval censoring, Computational Statis-tics and Data Analysis, 54 (2010), 1581-1591.

[5] M.H. Chen, Q.M. Shao, J.G. Ibrahim, Monte Carlo Methods in BayesianComputation, Springer-Verlag, New York, 2000.

[6] H.A. David, H.N. Nagaraja, Order Statistics, 3rd Edition, Wiley, New York,2003.

[7] Z.F. Janeen, Empirical Bayes analysis of record statistics based on LINEXand quadratic loss functions, Comput. Math. Appl., 47 (2004), 947-954.

[8] M.P. Kaminskiy, V.V. Krivtsov, A Simple Proccedure for Bayesian Estima-tion of the Weibull Distribution, IEEE Transactions on Reliability Analysis,54 (2005), 612-616.

[9] D. Kundu, Bayesian Inference and Life Testing Plan for the Weibull Dis-tribution in Presence of Progressive Censoring, Technometrics, 50 (2008),144-154.

[10] D. Kundu, H. Howlader, Bayesian Inference and Prediction of the InverseWeibull Distribution for Type-II Censored Data, Computational Statisticsand Data Analysis, 54 (2010),1547-1558.

[11] D. Kundu, M.Z. Raqab, Bayesian Inference and Prediction for a Type-IIcensored Weibull Distribution, Journal of Statistical Planning and Infer-ence, 142 (2012), 41-47.

Page 724: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

710 GHASSAN K. ABUFOUDEH and RAED R. ABU AWWAD

[12] W. Nelson, Applied Life Data Analysis, John Wiley and Sons, New York,1982.

[13] B. Pradhan, D. Kundu, Bayes Estimation and Prediction of the Two-Parameter Gamma Distribution, Journal of Statistical Computation andSimulation, 81 (2011), 1187-1198.

[14] A.A. Sarhan, Empirical Bayes estimetes in exponential reliability model,Appl. Math. Comput., 135 (2003), 319-332.

[15] S. Yimin, Y. Weian, The EB Estimation of Scale-parameter for Two pa-rameter Exponential Distribution Under the Type-I Censoring Life Test,Journal of Physical Sciences, 14 (2010), 25-30.

Accepted: 17.05.2018

Page 725: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (711–723) 711

ON COMPUTING DIFFERENTIAL TRANSFORM OFNONLINEAR NON-AUTONOMOUS FUNCTIONS AND ITSAPPLICATIONS

Essam R. El-Zahar∗

Department of MathematicsFaculty of Sciences and HumanitiesPrince Sattam Bin Abdulaziz UniversityAlkharj, 11942KSAandDepartment of Basic Engineering ScienceFaculty of EngineeringShebin El-Kom, 32511Menofia UniversityEgyptessam [email protected]

Abdelhalim EbaidDepartment of Mathematics

Faculty of Science

Tabuk University

P.O. Box 741, Tabuk 71491

KSA

Abstract. Although being powerful, the differential transform method yet suffersfrom a drawback which is how to compute the differential transform of nonlinear non-autonomous functions that can limit its applicability. In order to overcome this defect,we introduce in this paper, new general formulas and their related recurrence relationsfor computing the differential transform of any analytic nonlinear non-autonomous func-tion with one or multi-variable. Several test examples for different types of nonlineardifferential and integro-differential equations are solved to demonstrate the applicabilityand validity of the present method. The obtained results declare that the suggested ap-proach not only effective but also a straightforward and powerful for solving differentialand integro-differential equations with complex nonlinearities.

Keywords: differential transform method, nonlinear non-autonomous functions, non-linear differential and integro-differential equations.

1. Introduction

The Differential Transform Method (DTM) which is based on Taylor series ex-pansion was first introduced by Zhou [1] and has been successfully applied to awide class of nonlinear problems arising in mathematical sciences and engineer-

∗. Corresponding author

Page 726: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

712 ESSAM R. EL-ZAHAR and ABDELHALIM EBAID

ing. The main advantage of DTM is that it can be applied directly to nonlineardifferential equations with no need for linearization, discretization, or perturba-tion. Additionally, DTM does not generate secular terms (noise terms) and doesnot need to analytical integrations as other semi-analytical numerical methodssuch as HPM, HAM, ADM or VIM [2-7] and so DTM is an attractive tool forsolving differential equations. Although this method has been proved to be an ef-ficient tool for handling nonlinear differential and integro-differential equations,the nonlinear functions used in these equations are restricted to certain kinds ofnonlinearities, e.g., polynomials and products with derivatives. For other typesof nonlinear functions, Chang and Chang [8] construct a new algorithm basedon obtaining a differential equation satisfied by this nonlinear function and thenapplying DTM to this obtained differential equation. Although their treatmentwas found effective for some forms of nonlinearity [9,10] it significantly increasesthe computational budget, especially if there are two or more nonlinear functionsinvolved in the differential equation being investigated [11]. Moreover, in thecase of complex nonlinearities, it may be quite difficult to obtain the differentialequations satisfied by these nonlinear functions. To overcome this difficulty, anew formula has been derived [11-14] to calculate the differential transform ofnonlinear autonomous one variable functions f(y). Unfortunately, for nonlinearnon-autonomous multi-variable functions f (t, yj(t)), j = 1, 2, ..,m, no relatedformula has been given to calculate their transform functions. In order to over-come this defect, new general formulas and their related recurrence relations arededuced in this paper for computing the differential transform of any analyticnonlinear non-autonomous function with one or multi-variable. The proposedmethod deals directly with the nonlinear non-autonomous function in its formwithout any special kinds of transformations or algebraic manipulations. Also,there is no need to compute the differential transform of other functions toobtain the required one. For autonomous function, as a special case of the cur-rent study, these formulas and recurrence relations have the same mathematicalstructure as the Adomian polynomials but with constants instead of variablecomponents. The applicability and validity of the present method are demon-strated through solving several test examples including nonlinear differentialand integro-differential equations of different types.

2. New differential transform formulas

The basic definitions , fundamental theorems , convergence , error analysis ofDTM and its applicability for various kinds of differential and integro-differentialequations are given in [1, 15-31]. If a differential equation contains an analyticnonlinear non-autonomous function f (t, y(t)) then the differential transformF (n) of the function f (t, y(t)) can be computed from the following theorems,where we assume that f (t, y(t)) = f0 (t) f1 (y(t)).

Page 727: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON COMPUTING DIFFERENTIAL TRANSFORM ... 713

Theorem 1. The differential transform F (n)of any analytic nonlinear non-autonomous function f (t, y(t)) at a point t0 can be computed from the formula

(1) F (n) =1

n!

[dn

dλnf

(t0 + λ,

n∑i=0

Y (i)λi

)]λ=0

where Y (i) is the differential transform of y(t).

Proof. The differential transformF (n) of f (t, y(t)) at a point t0 is defined as

(2) F (n) =1

n!

[dn

dtnf (t, y(t))

]t=t0

.

And since y(t) can be expressed as

(3) y(t) =

∞∑i=0

Y (i)(t− t0)i,

where Y (i) is the differential transform of y(t) about t0 , then we have

(4) F (n) =1

n!

[dn

dtnf

(t,

∞∑i=0

Y (i)(t− t0)i)]

t=t0

.

Now, let t− t0 = λ, then Eq. 4 becomes

F (n) =1

n!

[dn

dλnf

(t0 + λ,

∞∑i=0

Y (i)λi

)]λ=0

.

And since F (n) is a function of t0 and Y (i)ni=0 only, then

F (n) =1

n!

[dn

dλnf

(t0 + λ,

n∑i=0

Y (i)λi

)]λ=0

.

By this way, the proof of Theorem 1 is completed.

Theorem 2. The differential transform F (n)of any analytic nonlinear non-autonomous function f (t, y(t)) at a point t0 , satisfies the analytic recurrencerelation

(5) F (n) =1

n

(∂

∂t0F (n− 1) +

n−1∑i=0

(i+ 1)Y (i+ 1)∂

∂Y (i)F (n− 1)

), n ≥ 1

where F (0) = f (t0, Y (0)).

Proof. Since we have

f (n)(t, y(t)) =∂

∂tf (n−1) (t, y(t)) +

∂y(t)f (n−1) (t, y(t))

dy(t)

dt,

Page 728: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

714 ESSAM R. EL-ZAHAR and ABDELHALIM EBAID

then

F (n) =1

n!

[∂

∂tf (n−1)

(t,

∞∑i=0

Y (i)(t− t0)i)

+

∞∑i=0

∂Y (i)f (n−1)

(t,

∞∑i=0

Y (i)(t− t0)i)

(i+ 1)Y (i+ 1)

]t=t0

=1

n!

[(n− 1)!

∂t0F (n− 1) + (n− 1)!

∞∑i=0

(i+ 1)Y (i+ 1)∂

∂Y (i)F (n− 1)

]

and since F (n− 1)is a function of t0andY (i)n−1i=0 , then

F (n) =1

n

(∂

∂t0F (n− 1) +

n−1∑i=0

(i+ 1)Y (i+ 1)∂

∂Y (i)F (n− 1)

), n ≥ 1.

By this way, the proof of Theorem 2 is completed.Thus by Theorems 1 and 2 we have implemented a new algorithm for com-

puting the one-dimensional differential transform of any analytic nonlinear non-autonomous function f (t, y(t)).

As a special case of the present study, i.e., for autonomous functions, theformula (1) and recurrence relation (5) are reduced to, respectively

(6) F (n) =1

n!

dn

dλn

[f

(n∑i=0

Y (i)λi

)]λ=0

,

(7) F (n) =1

n

(n−1∑i=0

(i+ 1)Y (i+ 1)∂

∂Y (i)F (n− 1)

), n ≥ 1,

where the special formula (6) is the present formula in [11-14]. In fact ifa system of one-dimensional differential equations contains m coupled ana-lytic nonlinearity function f (t, yj(t)), j = 1, 2, ..,m, where we assume thatf (t, yj(t)) = f0 (t) f1 (y1(t)) f2 (y2(t)) ...fm (ym(t)), then Theorems 1 and 2 canbe easily extended to multi-variable function and satisfy the following algo-rithms.

Corollary 1. The differential transform F (n)of any analytic nonlinear non-autonomous function f (t, yj(t)) , j = 1, 2, ..,m at a point t0 can be definedby

(8) F (n) =1

n!

dn

dλn

[f

(t0 + λ,

n∑i=0

Yj(i)λi

)]λ=0

, j = 1, 2, ..,m,

where Yj(i) is the differential transform of yj(t).

Page 729: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON COMPUTING DIFFERENTIAL TRANSFORM ... 715

Corollary 2. The differential transformF (n)of any analytic nonlinear non-autonomous function f (t, yj(t)) , j = 1, 2, ..,m at a point t0 , satisfies theanalytic recurrence relation

(9) F (n)=1

n

∂t0F (n− 1)+

m∑j=1

n−1∑i=0

(i+ 1)Yj(i+ 1)∂

∂Yj(i)F (n− 1)

, n≥1,

where F (0) = f (t0, Yj(0)).Moreover and as a special case of the present study, i.e., for autonomous func-tion, the definition (8) and recurrence relation (9) are reduced, respectively,to

(10) F (n) =1

n!

dn

dλn

[f

(n∑i=0

Yj(i)λi

)]λ=0

, j = 1, 2, ..,m,

(11) F (n) =1

n

m∑j=1

n−1∑i=0

(i+ 1)Yj(i+ 1)∂

∂Yj(i)F (n− 1)

,

which have the same mathematical structure as the Adomian polynomials in[32] but with constants instead of variable components.

Table 1. Some fundamental operations of DTM.

Original function Transformed function

u(t) = β ( v(t)± w(t) ) U(k) = β V (k)± βW (k)

u(t) = v(t) w(t) U(k) =∑k

ℓ=0 V (ℓ)W (k − ℓ)u(t) = dmv(t)

dtm U(k) = (k+m)!k! V (k +m)

u(t) = (β + t)m U(k) = H[m, k] m!k!|(m−k)|!(β + t0)

m−k ,

H[m, k] =

1, ifm ≥ k0, ifm < k

u(t) = eλt U(k) = λk

k! eλ t0

u(t) = sin(ωt+ β) U(k) = ωk

k! sin(ωt0 + β + kπ2 )

u(t) = cos(ωt+ β) U(k) = ωk

k! cos(ωt0 + β + kπ2 )

u(t) =∫ tt0v(t)dt U(k) = V (k−1)

k , k ≥ 1, U(0) = 0

u(t) =∫ tt0v(t)w(t) U(k) = 1

k

∑k−1l V (l)W (k − l − 1), k ≥ 1, k ≥

1, U(0) = 0.

3. Applications

In this section, we have solved different types of differential and integro-differentialproblems with different forms of nonlinear non-autonomous functions that theformula in the literature [11-14] was found not applicable.

Page 730: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

716 ESSAM R. EL-ZAHAR and ABDELHALIM EBAID

Example 1. Consider the nonlinear initial-value problem

(12) y′(t)− y(t) = ln (t+ y(t)) , t ∈ [1, 2] , y(t) ≥ 0, y(1) = 0.

Using the basic properties of DTM, Table.1, and taking the transform of equa-tions in (12) result in

(13) (k + 1)Y (k + 1)− Y (k) = F (k), Y (0) = 0, k = 0, 1, 2, ...,

whereF (k)is the differential transform of the nonlinear term ln(t+ y(t)). F (k)iscomputed using the present method and given by

F (0) = ln(1 + Y (0)), F (1) =1 + Y (1)

1 + Y (0),

F (2) =Y (2)

1 + Y (0)− 1

2

(1 + Y (1))2

(1 + Y (0))2,

F (3) =Y (3)

1 + Y (0)− Y (2) (1 + Y (1))

(1 + Y (0))2+

(1 + Y (1))3

3 (1 + Y (0))3(14)

F (4) =Y (4)

1 + Y (0)− Y (3) (1 + Y (1))

(1 + Y (0))2+Y (2) (1 + Y (1))2

(1 + Y (0))3

− Y (2)2

2 (1 + Y (0))2− (1 + Y (1))4

4 (1 + Y (0))4.

Therefore, a combination of the recurrence relation(13) and the computed F (k)in (14) with the solution formula (13) results in the series solution y(t) =12 (t− 1)2 + 1

6 (t− 1)3 + 124 (t− 1)4 + 1

120 (t− 1)5 + .... For sufficiently large num-ber of terms, the closed form of the obtained series solution is y(t) = et−1 − t,which is the exact solution.

Table 2: Numerical results for Example 2.

| y(ti)− y(ti) |ti N = 5 N = 10 N = 15

0.0 0.0000+e00 0.0000+e00 0.0000+e00

0.2 7.3689e-006 8.2100e-010 9.6316e-011

0.4 4.5510e-004 1.3793e-006 2.3291e-008

0.6 4.8955e-003 1.1150e-004 3.0230e-006

0.8 2.5675e-002 2.4110e-003 2.6524e-004

1.0 9.0957e-002 2.5516e-002 8.3823e-003

Example 2. Consider the nonlinear initial-value problem

(15) y′(t) + εy(t)2 = ε sin( ty(t) ), t ∈ [0, 1] y(0) = 1.

Page 731: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON COMPUTING DIFFERENTIAL TRANSFORM ... 717

Taking the differential transform of equations in (15) results in

(16) (k + 1)Y (k + 1) + εk∑ℓ=0

Y (ℓ)Y (k − ℓ) = εF (k), Y (0) = 1, k = 0, 1, 2, ...,

where F (k) is the differential transform of the nonlinear term sin(ty(t)) .F (k)is computed using the present method and given by

F (0) = 0, F (1) = Y (0), F (2) = Y (1), F (3) =−Y (0)3

6+ Y (2),

F (4) = y(3)− 1

2Y (0)2y(1),(17)

F (5) =1

120Y (0)5 − 1

2Y (0)Y (1)2 − 1

2Y (0)2Y (2) + Y (4).

Using (16) and (17), the series solution is obtained and given at ε = 0.1 by

y(t) = 1− 1

10t+

3

50t2 − 23

3000t3 − 119

60000t4 +

247

300000t5 − 2233

4500000t6 + ....

The presented results are compared with those obtained using MATLAB built-in solver ode45 in Table 2. The ode45 solver integrates ODEs using explicit 4th& 5th Runge-Kutta (4, 5) formula [33]. In order to guarantee a good numericalreference, ode45 is configured using an absolute error of 10−12and relative errorof 10−8.

Example 3. Consider the nonlinear first order Volterra integro-differentialequation

y′(t) = cos t− t2

2+ 1 +

∫ t

0sin−1(1− τ + y(τ)) dτ,(18)

t ∈ [0, 1] , y (0) = −1, y′ (0) = 2.

The differential transform of equations in (18) are

(k + 1)Y (k + 1) =1

k!cos

(kπ

2

)− δ(k − 2)

2+ δ(k) +

F (k − 1)

k,

Y (0) = −1 , Y (1) = 2 , k ≥ 1,

where F (k) is the differential transform of the nonlinear term sin−1(1−τ+y(τ)).By applying the present method to the nonlinear function f(τ, y(τ)) = sin−1(1−τ+y(τ)) at τ0 = 0 , Y (0) = −1 and Y (1) = 2, and by using the principal values

Page 732: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

718 ESSAM R. EL-ZAHAR and ABDELHALIM EBAID

of the square root and inverse trigonometric functions, we get

F (0) = 0, F (1) = 1, F (2) = Y (2), F (3) = Y (3) +1

6,

F (4) = Y (4) +1

2Y (2),

F (5) = Y (5) +3

40+

1

2Y (3) +

1

2Y (2)2,

F (6) =3

8Y (2) +

1

2Y (4) + Y (2)Y (3) + Y (6) +

1

6Y (2)3(19)

F (7) =1

112(56Y (3) + 84)Y (2)2 + Y (2)Y (4) +

3

8Y (3)

+1

2Y (5) + Y (7) +

1

2Y (3)2 +

5

112

Hence, the series solution is obtained and given by

y(t) = −1 + 2t− 1

6t3 +

1

120t5 − 1

5040t7 +

1

362880t9 + ...

For sufficiently large number of terms, the closed form of the obtained seriessolution is y(t) = sin(t) + t− 1, which is the exact solution.

Example 4. Consider the nonlinear second order Volterra integro-differentialequation

(20) y′′(t)− 2y(t)y′(t) = −t+

∫ t

0

sec2 τ

1 + y(τ)2dτ, t ∈ [0, 1] , y(0) = 0, y′(0) = 1.

The differential transform of equations in (20) are (k + 2)(k + 1)Y (k + 2) =

2∑k

ℓ=0(ℓ+1) Y (ℓ+1)Y (k−ℓ)−δ(k−1)+ F (k−1)k , Y (0) = 0 , Y (1) = 1 , Y (2) =

0 , k ≥ 1,where F (k) is the differential transform of the nonlinear term sec2 τ1+y(τ)2

obtained using the present method at τ0 = 0 and given by

F (0) = 1, F (1) = 0, F (2) = 0, F (3) = 0,

F (4) =2

3− 2Y (3), Y (5) = −2Y (4),

F (6) =−13

45− 2Y (5) + 2Y (3)− Y (3)2,(21)

F (6) = (2− 2Y (3))Y (4)− 2Y (6),

F (7) =17

35+ 5Y (3)2 − 10

3Y (3)− 2Y (3)Y (5) + 2Y (5)− 2Y (7)− Y (4)2

Hence, the approximate series solution is obtained and given by

y(t) = t+1

3t3 +

2

15t5 +

17

315t7 +

62

2835t9 + ...

Page 733: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON COMPUTING DIFFERENTIAL TRANSFORM ... 719

For sufficiently large number of terms, the closed form of the obtained seriessolution is y(t) = tan t, which is the exact solution.

Example 5. Consider the nonlinear Volterra integro-differential equation withproportional delay

(22) y′(t

2

)=

1

2− t sin t+

∫ t

0

y (3τ)2 sin t

(3τ + 1)2dτ, y(0) = 1, y′(0) = 1.

The differential transform of equations in (22) are

(k + 1)Y (k + 1)

(1

2

)k+1

=1

2δ(k)−

k∑ℓ=0

1

ℓ!sin

(ℓπ

2

)δ(k − ℓ− 1)

+

k−1∑ℓ=0

1

ℓ!sin

(ℓπ

2

)F (k − ℓ− 1)

k − ℓ, Y (0) = 1 , Y (1) = 1 , k ≥ 1,

where F (k) is the differential transform of the nonlinear term w(τ)2

(3τ+1)2, w (τ) =∑∞

k=0 3kY (k)τk, obtained using the present method and given by

F (0) = 1, F (1) = 0, F (2) = 18Y (2), F (3) = −54Y (2) + 54Y (3),

F (4) = 81Y (2)2 + 162Y (2)− 162Y (3) + 162Y (4),(23)

F (5) = −486Y (2)2+(486Y (3)−486)Y (2)−486Y (4)+486Y (5)+486Y (3).

Hence, the series solution is obtained and given by

y(t) = t+ 1

which is the exact solution.

Example 6. Consider the following nonlinear non-autonomous initial-valueODE system

y′1(t) = −y1(t) + t+ ln

(y1(t)−

1

t+ y2(t)

)y′2(t) = −y2(t)− 1 +

4

y1(t)− ln (t+ y2(t))(24)

y1(0) = 2 , y2(0) = 1.

Applying the differential transform to (24), results in

(k + 1)Y1(k + 1) = δ(K − 1)− Y1(k) + F1(k)

(k + 1)Y2(k + 1) = −Y2(k)− δ(K) + F2(k)(25)

Y1(0) = 2 , Y2(0) = 1.

Page 734: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

720 ESSAM R. EL-ZAHAR and ABDELHALIM EBAID

where F1(k) and F2(k) are the differential transform of the nonlinear functions

f1 = ln(y1(t)− 1

t+y2(t)

)and f2 = 4

y1(t)− ln (t+ y2(t)), respectively. F1(k) and

F2(k) are computed using the present method and given by

F1(0) = 0, F1(1) = Y1(1) + 1 + Y2(1),

F1(2) = Y1(2)− (1 + Y2(1))2 + Y2(2)− 1

2(Y1(1) + 1 + Y2(1))2

F1(3) = Y1(3) + (1 + Y2(1))3 − 2(1 + Y2(1))Y2(2) + Y2(3)(26)

− (Y1(2)− 1− 2Y2(1)− Y2(1)2 + Y2(2))(Y1(1)

+ 1 + Y2(1)) +1

3(Y1(1) + 1 + Y2(1))3,

F2(0) = 2, F2(1) = −Y1(1)− Y2(1)− 1

F2(2) =1

2Y1(1)2 − Y1(2)− Y2(2) +

1

2(1 + Y2(1))2

F2(3) = −1

4Y1(1)3 + Y1(2)Y1(1)− Y1(3)− Y2(3)(27)

+ (1 + Y2(1))Y2(2)− 1

3(1 + Y2(1))3 .

Hence, the series solutions are obtained and given as

y1(t) = 2− 2t+ t2 − 1

3t3 +

1

12t4 − 1

60t5 + ...

y2(t) = 1 +1

2t2 +

1

6t3 +

1

24t4 +

1

120t5 + ....

For sufficiently large number of terms, the closed form of the obtained seriessolutions are y1(t) = 2e−t , y2(t) = et − t, which are the exact solutions.

4. Conclusions

In this paper, new general formulas and recurrence relations have been de-rived for computing the differential transform of any analytic nonlinear non-autonomous functions with one or multi-variable. As a special case of thepresent study, i.e., for autonomous function, the current formulas and recur-rence relations have the same mathematical structure as the Adomian polyno-mials but with constants instead of variable components. The main advantage ofthe present method is that it can deal directly with nonlinear non-autonomousfunctions in their forms without any special transformation or algebraic ma-nipulations and can be directly implemented in any symbolic language such asMATHEMATICA or MAPLE. The suggested modified DTM has been success-fully applied on different types of differential and integro-differential equationswith nonlinear non-autonomous functions that no related formula in the litera-ture has been given to calculate their transform functions. The method is applied

Page 735: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON COMPUTING DIFFERENTIAL TRANSFORM ... 721

directly to the nonlinear equations with no need to analytical integration whichis essential for other semi-analytical numerical methods such as HPM, HAM,ADM or VIM. Moreover, the obtained series solutions declare that the suggestedmethod is a straight forward even in solving different types of differential andintegro-differential equations with complex nonlinearities. Finally, the authorsbelieve that the present study should be extended to include similar differen-tial and intego-differential equations in the applied sciences, which increases itsapplicability.

References

[1] J.K. Zhou, Differential transformation and its applications for electricalcircuits, Huazhong University Press, Wuhan–China 1986.

[2] H. Hosseinzadeh, H. Jafari, M.R. Gholami, D.D. Ganji, Solving a classof boundary value problems in structural engineering and fluid mechanicsusing homotopy perturbation and adomian decomposition methods, ItalianJournal of Pure and Applied Mathematics, 37 (2017), 687-698.

[3] A. Ebaid, R. Rach, E. El-Zahar, A new analytical solution of the hyperbolicKepler equation using the Adomian decomposition method, Acta Astronau-tica, 138 (2017), 1-9.

[4] H. Ghaneai, M.M. Hosseini, Solving differential-algebraic equations throughvariational iteration method with an auxiliary parameter, Applied Mathe-matical Modelling, 40 (2016), 3991-4001.

[5] Y. Zhao, Z. Lin, Z. Liu, S. Liao, The improved homotopy analysis methodfor the Thomas–Fermi equation, Applied Mathematics and Computation,218(2012), 8363-8369.

[6] S. Al-Shara, F. Awawdeh, S. Abbasbandy, An automatic scheme on thehomotopy analysis method for solving nonlinear algebraic equations, Italianjournal of pure and applied mathematics, 37 (2017), 5-14.

[7] J. Biazar, M.A. Asadi, F. Salehi, Rational Homotopy Perturbation Methodfor solving stiff systems of ordinary differential equations, Applied Mathe-matical Modelling, 39(2015), 1291-1299.

[8] S.H.Chang, I.L. Chang, A new algorithm for calculating one-dimensionaldifferential transform of nonlinear functions, Applied Mathematics andComputation, 195 (2008), 799-808.

[9] A.E.H. Ebaid, Approximate periodic solutions for the non-linear relativis-tic harmonic oscillator via differential transformation method, Communica-tions in Nonlinear Science and Numerical Simulation, 15(2010), 1921-1927.

Page 736: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

722 ESSAM R. EL-ZAHAR and ABDELHALIM EBAID

[10] A. E. Ebaid, A reliable aftertreatment for improving the differential trans-formation method and its application to nonlinear oscillators with fractionalnonlinearities, Communications in Nonlinear Science and Numerical Simu-lation, 16 (2011), 528-536.

[11] A. E. Ebaid, On a new differential transformation method for solving non-linear differential equations, Asian-European Journal of Mathematics, 6(2013), 1350057.

[12] S.H. Behiry, Differential transform method for nonlinear initial-value prob-lems by adomian polynomials, Journal of Applied & Computational Math-ematics, 2012.

[13] H.S. Nik, F. Soleymani, A Taylor-type numerical method for solving non-linear ordinary differential equations, Alexandria Engineering Journal, 52(2013), 543-550.

[14] H. Fatoorehchi, H. Abolghasemi, Improving the differential transformmethod: a novel technique to obtain the differential transforms of nonlin-earities by the Adomian polynomials, Applied Mathematical Modelling, 37(2013), 6008-6017.

[15] V.S. Erturk, Z.M. Odibat, S. Momani, Application of multi-step differentialtransform method for the analytical and numerical solutions of the densitydependent Nagumo telegraph equation, Romanian Journal of Physics, 57(2012), 1065-1078.

[16] M. Abdulkawi, Solution of Cauchy type singular integral equations of thefirst kind by using differential transform method, Applied MathematicalModelling, 39 (2015), 2107-2118.

[17] E.R. EL-Zahar, Approximate analytical solutions of singularly perturbedfourth order boundary value problems using differential transform method,Journal of King Saud University (Science), 25 (2013), 257–265.

[18] E.R. El-Zahar, Applications of adaptive multi step differential transformmethod to singular perturbation problems arising in science and engineering,Applied Mathematics and Information Sciences, 9 (2015), 223-232.

[19] E.R. El-Zahar, Piecewise approximate analytical solutions of high order sin-gular perturbation problems with a discontinuous source term, InternationalJournal of Differential Equations, 2016, Article ID 1015634, 12 pages, 2016.doi:10.1155/2016/1015634.

[20] A. Gokdogan, M. Merdan, A. Yildirim, Adaptive multi-step differentialtransformation method to solving nonlinear differential equations, Math-ematical and Computer Modelling, 55 (2012), 761-769.

Page 737: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ON COMPUTING DIFFERENTIAL TRANSFORM ... 723

[21] A. Arikoglu, I. Ozkol, Solutions of integral and integro-differential equationsystems by using differential transform method, Computers & Mathematicswith Applications, 56 (2008), 2411-2417.

[22] M. Al-Smadi, A. Freihat, O.A. Arqub, N. Shawagfeh, A novel multistepgeneralized differential transform method for solving fractional-order Luchaotic and hyperchaotic systems, Journal of Computational Analysis &Applications, 19 (2015), 713-724.

[23] K. Moaddy, A. Freihat, M. Al-Smadi, E. Abuteen, I. Hashim, Numerical in-vestigation for handling fractional-order Rabinovich–Fabrikant model usingthe multistep approach, Soft Computing, 1-10, 2016.

[24] M. Al-Smadi, A. Freihat, H. Khalil, S. Momani, R. Ali Khan, Numeri-cal multistep approach for solving fractional partial differential equations,International Journal of Computational Methods, 14 (2017), 1750029.

[25] A. El-Ajou, O.A. Arqub, M. Al-Smadi, A general form of the generalizedTaylor’s formula with some applications, Applied Mathematics and Com-putation, 256 (2015), 851-859.

[26] E.R. El-Zahar, H.M. Habib, M.M. Rashidi, I.M. El-Desoky, A Comparisonof Explicit Semi-Analytical Numerical Integration Methods for Solving StiffODE Systems, American Journal of Applied Sciences, 12 (2015), 304.

[27] Z.M. Odibat, S. Kumar, N. Shawagfeh, A. Alsaedi, T. Hayat, A studyon the convergence conditions of generalized differential transform method,Mathematical Methods in the Applied Sciences, 40 (2017), 40-48.

[28] C. Bervillier, Status of the differential transformation method, AppliedMathematics and Computation, 218 (2012), 10158-10170.

[29] R. Barrio, Performance of the Taylor series method for ODEs/DAEs, Ap-plied Mathematics and Computation, 163 (2005), 525-545.

[30] E. R. EL-Zahar, An Adaptive Step-Size Taylor Series Based Method andApplication to Nonlinear Biochemical Reaction Model, Trends in AppliedSciences Research, 7 (2012), 901-912.

[31] M. Thongmoon, S. Pusjuso, The numerical solutions of differential trans-form method and the Laplace transform method for a system of differentialequations, Nonlinear Analysis: Hybrid Systems, 4 (2010), 425-431.

[32] J.S. Duan, Convenient analytic recurrence algorithms for the Adomian poly-nomials, Applied Mathematics and Computation, 217 (2011), 6337-6348.

[33] J.R. Dormand, P.J. Prince, A family of embedded Runge-Kutta formulae,Journal of computational and applied mathematics, 6 (1980), 19-26.

Accepted: 17.05.2018

Page 738: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (724–735) 724

NAGSC: NESTEROV’S ACCELERATED GRADIENTMETHODS FOR SPARSE CODING

Liang LiuChongqing University of Posts and TelecommunicationsChongqing, [email protected]

Ling ZhangChongqing Industry Polytechnic CollegeChongqing, [email protected]

Xiangguang DaiKey Laboratory of Intelligent Information Processing

and Control of Chongqing MunicipalInstitutions of Higher EducationChongqing Three Gorges UniversityWanzhou, Chongqing, 404100China

Yuming Feng∗

Chongqing Engineering Research Center of Internet of Things

and Intelligent Control Technology

Chongqing Three Gorges University

Wanzhou, Chongqing, 404100

[email protected]

Abstract. This paper proposes efficient algorithms for Sparse Coding. Firstly, SparseCoding is divided into two sub-convex problems including L1 and L2 problems. Sec-ondly, we transform the nonsmooth L1 problem into two smooth sub-problems, and al-ternatively optimize them by Nesterov’s Accelerated Gradient methods (NAG). Thirdly,we apply NAG to optimize L2 problem. Finally, L1 and L2 problems are iterativelysolved until convergence. Experiments show that our proposed algorithms are effectiveto optimize L1, L2 and learn over-complete bases.

Keywords: sparse coding, nonsmooth, nonconvex, accelerated gradient.

1. Introduction

Sparse Coding (SC) can be viewed as an unsupervised method to find represen-tations for the original data. Given the unlabeled image data, SC learns basesto capture the intrinsic features, and the learned bases resemble the receptive

∗. Corresponding author

Page 739: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

NAGSC: NESTEROV’S ACCELERATED GRADIENT METHODS FOR SPARSE CODING 725

fields of visual neurons [1, 2]. If the number of bases is smaller than the di-mension of the original data, SC can be applied to dimensional reduction suchas Principal Component Analysis [3], Locality Preserving Projections [4] andLinear Discriminant Analysis [5]; otherwise, SC can be used to learn a set ofover-complete bases. Based on these properties, SC is widely applied to patternrecognition [6, 7], clustering [8, 9] and signal processing [10, 11].

SC is to learn sets of basis vectors so that an input vector can be represented

by the combination of these basis vectors. Given an input vector−→ξ ∈ Rm, SC

can find the basis vectors−→b1 , · · · ,

−→br ∈ Rm and the coefficient vector −→s ∈ Rr

such that the−→ξ can be represented by

−→ξ ≈

∑j

−→bj sj .

Generally, SC hopes to learn over-complete sets of basis vectors−→b1 , · · · ,

−→br ∈ Rm

to represent a input vector−→ξ ∈ Rm (i.e. r > m). Given n input vectors

−→ξ1 , · · · ,

−→ξn and their corresponding coefficient vectors

−→s1 , · · · ,−→sn, the SC model

can be mathematically defined by

minbj ,si

n∑i=1

1

2∥−→ξ i −

r∑j=1

−→b js

ij ∥2 +β

n∑i=1

r∑j=1

∥ sij ∥1(1)

subject to ∥−→bj ∥2≤ c,∀j = 1, · · · , r.

Suppose that V = [−→ξ1 , · · · ,

−→ξn] ∈ Rm×n is an input matrix, W = [

−→b1 , · · · ,

−→br ] ∈

Rm×r is a basis matrix and H = [−→s1 , · · · ,−→sn] ∈ Rr×n is a coefficient matrix,

then problem (1) can be transformed into the following matrix form:

minW,H

F (W,H) =1

2∥V −WH∥2F + β

n∑i=1

∥ Hi ∥1(2)

subject to∑i

W 2i,j ≤ c,∀j = 1, · · · , r.

In this paper, we propose efficient algorithms to optimize SC. Firstly, prob-lem (2) is divided into two sub-problems including L1 and L2 problems. Sec-ondly, we transform the nonsmooth L1 problem into two smooth sub-problems,and alternatively optimize them by Nesterov’s Accelerated Gradient methods(NAG) [12]. Thirdly, we apply NAG to optimize L2 problem. Finally, L1 andL2 problems are alternatively solved until convergence. According to the block-coordinate-descent method [13], we divide problem (2) into two convex problemsas follows:

minW

F (W ) =1

2∥V −WH∥2F(3)

subject to∑i

W 2i,j ≤ c,∀j = 1, · · · , r

Page 740: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

726 LIANG LIU, LING ZHANG, XIANGGUANG DAI and YUMING FENG

and

minH

F (H) =1

2∥V −WH∥2F + β

n∑i=1

∥ Hi ∥1 .(4)

For each sub-problem, we construct three sequences and update them recur-sively. These sequences can accelerate the optimization of each sub-problem.Therefore, this scheme leads to the convergence rate at O( 1

k2).

2. L1 optimization

Suppose that P = [pij ] = max(H, 0), Q = [qij ] = max(−H, 0), then H = P −Q.Problem (4) can be transformed as follows:

minP,Q

F (P,Q) =1

2∥V −W (P −Q)∥2F + β

∑i,j

pij + β∑i,j

qij(5)

subject to P ≥ 0, Q ≥ 0.

To minimize (5), the common approach is the block-coordinate-descent method,where P and Q are alternatively minimized until convergence. Hence, we divide(5) into two the following optimization problems:

minP

F (P ) =1

2∥V +WQ−WP∥2F + β

∑i,j

pij(6)

subject to P ≥ 0

and

minQ

F (Q) =1

2∥V −WP − (−W )(Q)∥2F + β

∑i,j

qij(7)

subject to Q ≥ 0.

According to (6) and (7), it is clear that both of them have the same matrixform. In the following, we only consider how to optimize (6), then (7) canbe solved accordingly. Based on Lemma 1 and Lemma 2, NAG can solve (6)efficiently.

Lemma 1 ([14]). The objective function F (P ) is convex.

Lemma 2 ([14]). The gradient ∇F (P ) is Lipschitz continuous, and the Lips-chitz constant is ∥W TW ∥.

Recent researches show that NAG are suitable for convex optimization prob-lems and can obtain the convergence rate at O( 1

k2). To use NAG effectively, the

optimization problem should be convex and its gradient is Lipschitz continuous.

Page 741: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

NAGSC: NESTEROV’S ACCELERATED GRADIENT METHODS FOR SPARSE CODING 727

In particular, three sequences are constructed by NAG, and they are alterna-tively updated in each iteration. At the iteration number k ≥ 1, the updatingrules for optimizing (6) are given as follows:

Yk = arg minY≥0

F (Pk)+ < ∇F (Pk), Y − Pk > +1

2L ∥ Y − Pk ∥2F ,(8)

Zk = arg minZ≥0

(L

2∥ Z − Zk−1 ∥2F +τk(< ∇F (Pk), Z >)),(9)

Pk+1 = αkZk + (1− αk)Yk,(10)

where αk = 2k+3 , τk = k+1

2 and < ·, · > is the sum of the element-wise multi-plication of two matrices. In the following, we apply KKT conditions to solveconstrained optimization problems (8) and (9). By the Lagrange multipliermethod, (8) is re-written to the following form:

(11) L(Y, λ) = F (Pk)+ < ∇F (Pk), Y − Pk > +1

2L ∥ Y − Pk ∥2F − < λ, Y >,

where λ ∈ Rr×n. Let (Yk, λk) be the optimal solution of (11). The KKTconditions are summarized as

Yk ≥ 0, λk ≥ 0, < λk, Yk >= 0,(12)

∇F (Pk) + L(Y − Pk)− λk = 0.(13)

However, λk is unknown. According to (13), we have

Yk = Pk −1

L∇F (Pk) +

1

Lλk.(14)

It is clear that only λk > 0 and Yk = 0 can satisfy (12). Hence, we obtain

λk = max(∇F (P )− LPk, 0).(15)

Next, we substitute (15) into (14). The optimal solution of Yk can be simplifiedby the following term.

Yk = max(P − 1

L∇F (Pk), 0).(16)

Similarly, the optimal solution of Zk can be obtained as follows:

Zk = max(Zk −τkL∇F (Pk), 0).(17)

Above all, the final updating rules for (6) can be summarized as the followingsequences:

Yk = max(Pk −1

L∇F (Pk), 0),(18)

Zk = max(Zk −k + 1

2L∇F (Pk), 0),(19)

Pk+1 = αkZk + (1− αk)Yk,(20)

Page 742: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

728 LIANG LIU, LING ZHANG, XIANGGUANG DAI and YUMING FENG

where L =∥W TW ∥ and∇F (Pk) = W TWPk−(W TV +W TWQ)+βE, whereinall the elements in matrix E ∈ Rr×n are 1. Similarly, the final updating rulesfor (7) can be summarized as the following sequences:

Yk = max(Qk −1

L∇F (Qk), 0),(21)

Zk = max(Zk −k + 1

2L∇F (Qk), 0),(22)

Qk+1 = αkZk + (1− αk)Yk,(23)

where ∇F (Qk) = W TWQk − (−W TV +W TWP ) + βE. We summarize aboveupdating rules (18) to (23) in Algorithm 1.

Algorithm 1 NAG for L1 (NAGL1)

Input: V , W , H, β, outerOutput: HInitialization:inner,L = 1

∥WTW∥ , k ← 0, i← 0

for i = 0 to outer do1. P = max(H, 0)2. Q = max(−H, 0)3. Z = P4. WTV = W TV +W TWQfor k = 0 to inner do

5. F (P ) = W TWP −WTV + β6. Y = max(P − L∇F (P ), 0)7. Z = max(Z − k+1

2 L∇F (P ), 0)8. P = 2

k+3Z + (1− 2k+3)Y

end for9. Z = Q10. WTV = −W TV +W TWPfor k = 0 to inner do

11.F (Q) = W TWQ−WTV + β12.Y = max(Q− L∇F (Q), 0)13.Z = max(Z − k+1

2 L∇F (Q), 0)14.Q = 2

k+3Z + (1− 2k+3)Y

15.k = k + 1end for16.H = P −Q17.i = i+ 1

end for

Algorithm 1 accepts input V , W , H, β and outer and outputs H. W and Hcan be obtained from BCD. inner is the iteration number of each sub-problemand outer is the iteration number of Algorithm 1. In the following Theorem 1

Page 743: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

NAGSC: NESTEROV’S ACCELERATED GRADIENT METHODS FOR SPARSE CODING 729

and Theorem 2, Algorithm 1 can be demonstrated to achieve the convergencerate at O( 1

k2).

Theorem 1. Supposed that the two sequences Yk∞k=0 and Pk∞k=0 aregenerated by (19) and (20), then we have

F (Yk)− F (P ∗) ≤2L ∥ P ∗ − Pk ∥2F(k + 1)(k + 2)

,

where P ∗ is an optimal solution to (6).

Proof. According to Proposition 2.1 in [15] and Lemma 1 in [12], we obtain

F (Yk)− F (P ∗) ≤ 1

Ak(ϕ0(P )− F (P ∗))(24)

and

AkF (Yk) ≤ minX1

2L ∥ X − Pk ∥2F +

k∑i=0

τi < ∇F (Pi), X − Pi >,(25)

where Ak =∑k

0 τi = (k+1)(k+2)4 and ϕk(X) = 1

2L ∥ X − Pk ∥2F +

∑ki=0 τi <

∇F (Pi), X − Pi >. We get

F (Yk)− (1− 1

Ak)F (P ∗) ≤ 1

Akϕ0(P

∗)

=1

AkL ∥ P ∗ − Pk ∥2F +τ0[F (P0)+ < ∇F (P0), P

∗ − P0 >]

≤ 1

Ak

L

2∥ P ∗ − Pk ∥2F +

1

Akτ0F (P ∗)

≤ 1

Ak

L

2∥ P ∗ − Pk ∥2F +

1

AkF (P ∗).

According to simple algebra, F (Yk)− F (P ∗) ≤ 2L∥P ∗−Pk∥2F(k+1)(k+2) .

Theorem 2. Supposed that the two sequences Yk∞k=0 and Qk∞k=0 aregenerated by (22) and (23), then we have

F (Yk)− F (Q∗) ≤2L ∥ Q∗ −Qk ∥2F

(k + 1)(k + 2),

where Q∗ is an optimal solution to (7).

Page 744: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

730 LIANG LIU, LING ZHANG, XIANGGUANG DAI and YUMING FENG

3. Constrained quadratic programming problem optimization

At the iteration number k ≥ 1, the updating rules for optimizing (3) are

Yk = arg min∥Y(i)∥22≤c

F (Wk)+ < ∇F (Wk), Y −Wk > +1

2L ∥ Y −Wk ∥2F ,(26)

Zk = arg min∥Z(i)∥22≤c

(L

2∥ Z − Zk−1 ∥2F ) + τk(< ∇F (Wk), Z >)),(27)

Wk+1 = αkZk + (1− αk)Yk,(28)

where i = 1, 2, · · · , r, Y(i) is the i-th column of Y and Z(i) is the i-th column ofZ. By the Lagrange multiplier method, (26) can be transformed as follows:

L(Y, λ) = F (Wk)+ < ∇F (Wk), Y −Wk > +1

2L ∥ Y −Wk ∥2F

− 1

2

r∑i

λi(c− ∥ Y(i), ∥22),(29)

where λ = [λ1, · · · , λr]T ∈ Rr. Let (Y, λ) be the optimal solution of (26). TheKKT conditions are as follows:

∥ Y(i) ∥22≤ c, λi ≥ 0, λi(∥ Y(i) ∥22 −c) = 0,(30)

∇F (Wk)(i) + L(Y(i) −Wk(i)) +

r∑i

λiY(i) = 0,(31)

where ∇F (Wk)(i) is the i-th column of ∇F (Wk)(i) and Wk(i) is the i-th of Wk.According to (31), we have

Y(i) =LWk(i) −∇F (Wk)(i)

L+ λi.(32)

However, λi is an unknown variable. We find that only λi > 0 and ∥ Y(i) ∥22−c = 0 can satisfy (30). We substitute (32) into ∥ Y(i) ∥22 −c = 0, and obtain

λi = max(∥ LWk(i) −∇F (Wk)(i) ∥2√

c− L, 0).(33)

Similarly to (27), we get

Z(i) =LZk(i) − τk∇F (Wk)(i)

L+ γi(34)

and

γi = max(∥ LZk(i) − τk∇F (Wk)(i) ∥22√

c− L, 0).(35)

Page 745: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

NAGSC: NESTEROV’S ACCELERATED GRADIENT METHODS FOR SPARSE CODING 731

According to above analysis, the final updating rules for (3) can be summarizedas follows:

λi = max(∥ LWk(i) −∇F (Wk)(i) ∥22√

c− L, 0),(36)

Yk(i) =LWk(i) −∇F (Wk)(i)

L+ λi,(37)

γi = max(∥ LZk(i) − τk∇F (Wk)(i) ∥22√

c− L, 0),(38)

Zk(i) =LZk(i) − τk∇F (Wk)(i)

L+ γi,(39)

Wk+1 =2

k + 3Zk + (1− 2

k + 3)Yk,(40)

where L =∥ HHT ∥ and ∇F (W ) = WHHT − V HT . We summarize aboveupdating rules in Algorithm 2.

Algorithm 2 NAG for CQP (NAGCQP)

Input: V , W , H, c, outerOutput: WInitialization:Z ←W , L =∥ HHT ∥, c =

√c

for k = 0 to outer do1. ∇F (W ) = WHHT − V HT

for i = 0 to r do2. λ = max(

∥LW(i)−∇F (W )(i)∥2c − L, 0)

3. Y(i) =LW(i)−∇F (W )(i)

L+λ

4. γ = max(∥LZ(i)− k+1

2∇F (W )(i)∥2c − L, 0)

5. Z(i) =LZ(i)− k+1

2∇F (W )(i)

L+γend for6. W = 2

k+3Z + (1− 2k+3)Y .

end forW = W k+1

Algorithm 2 accepts input V , W , c and outer and outputs W . W and Hcan be obtained from BCD. outer is the iteration number of Algorithm 2. Tosave space, we do not prove that Algorithm 2 has the convergence rate of O( 1

k2).

4. Experiments

In this section, three experiments are presented to evaluate the performances ofour proposed algorithms for the COIL20 dataset. The dataset is from ColumbiaUniversity which can be downloaded on the web site: http://www1.cs.columbia.edu/CAVE/software/softlib/coil-20.php. There are 1440 16×16 gray scaleimages in total, and this dataset includes 20 different classes.

Page 746: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

732 LIANG LIU, LING ZHANG, XIANGGUANG DAI and YUMING FENG

Firstly, Algorithm 1 is evaluated to optimize the L1 function. We comparedNAGL1, Feature-sign [16] and MexLasso [17] in the running time, the sparsedegree and the objective value. Let inner = 20, outer = 100 and β = 1. Table1 shows the results of different dimensions r by different algorithms. Whenthe number of dimensions is smaller, MexLasso achieves the shorter times, thesparser values and the smaller objective values. With the increase of dimensions,NAGL1 achieves the best performance. However, Feature-sign needs more timeto converge than NAGL1 and MexLasso.

Table 1. The running time, the sparseness and the objective value in a timelimit of 1500 seconds.

Time Sparseness Objective valuer=100 r=500 r=1000 r=100 r=500 r=1000 r=100 r=500 r=1000

NAGL1 4.679 77.937 246.046 0.111 0.127 0.160 129931 96544 57259

MexLasso 1.238 54.228 524.050 0.111 0.127 0.160 129931 96544 57259

Feature-sign 25.797 1024.693 - 0.155 0.088 - 130102 96546 -

Secondly, Algorithm 2 is evaluated to optimize the constrained quadraticprogramming function. We compared NAGCQP and LagDual [16] in the run-ning time and the objective value. Let outer = 100 and c = 10. Table 1 showsthe results of different dimensions r by different algorithms. When the num-ber of dimensions is smaller, NAGCQP performs as well as LagDual. With theincrease of dimensions, LagDual performs better than NAGCQP.

Table 2. The running time and the objective value in a time limit of 1500seconds.

Time Objective valuer=100 r=500 r=1000 r=100 r=500 r=1000

NAGCQP 0.596 4.259 10.962 125890 7057 4234

LagDual 0.041 0.487 2.387 125890 7057 2186

Thirdly, our proposed algorithms NAGL1 and NAGCQP have a fast conver-gence speed. However, it doesn’t mean that our proposed algorithm NAGSC(details in Algorithm 3) can learn over-complete bases. NAGSC and ESC [16]are compared to learn over-complete bases. We run each algorithm until therelative error is less than 10−6 (i.e., |Fnew − Fold|/Fold < 10−6). Let m = 196,r = 256, n = 10000, c = 1, β = 0.4, inner = 10, outer = 100 and iter = 50.Figure 1 shows the learned over-complete bases of natural images by each algo-rithm. NAGSC and ESC take 22.4518 minutes and 55.7725 minutes in learning256 bases, respectively.

5. Conclusion and future work

In this paper, Sparse Coding is formulated by L1 and L2 problems and wepresent algorithms for each sub-problem: NAG for solving L1 and L2 problems.

Page 747: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

NAGSC: NESTEROV’S ACCELERATED GRADIENT METHODS FOR SPARSE CODING 733

Algorithm 3 NAGSC

Input: V , W , H, c, β, outer, iterOutput: W , Hfor k = 0 to iter do

1. W=NAGLCQP(V , W , H, c, outer);2. H=NAGL1(V , W , H, β, outer);

end for

NAGSC ESC

Figure 1. Learned over-complete natural image bases

Experiments show that our proposed algorithms learn over-complete bases morequickly.

Two topics should be discussed in future work:

• There are many different sparse coding models, hence, the correspondingNAG should be discussed to optimize them.

• The Lipshcitz constant L in algorithm 1 and 2 is fixed, therefore, a variableLipshcitz constant L should be discussed.

Acknowledgments

This work is supported by the Research Foundation of Chongqing Munici-pal Education Commission (KJ1710253), Foundation of Chongqing MunicipalKey Laboratory of Institutions of Higher Education ([2017]3), Foundation ofChongqing Development and Reform Commission (2017[1007]), Foundation of

Page 748: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

734 LIANG LIU, LING ZHANG, XIANGGUANG DAI and YUMING FENG

Wanzhou Development and Reform Commission ([2017]32), and Foundation ofChongqing Three Gorges University.

References

[1] B. A. Olshausen, D. J. Field, Emergence of simple-cell receptive field prop-erties by learning a sparse code for natural images, Nature, 381 (1996),607-609.

[2] B. A. Olshausen, D. J. Field, Sparse coding with an overcomplete basis set:a strategy employed by v1?, Vision Research, 37 (1997), 3311-3325.

[3] M. Turk, A. P. Pentland, Face recognition using eigenface, IEEE Conf.Computer Vision and Pattern Recognition, 118 (1991), 586-591.

[4] X. He, P. Niyogi, Locality preserving projections, Advances in Neural Infor-mation Processing Systems, 16 (2003), 186-197.

[5] P. N. Belhumeur, J. P. Hespanha, D. J. Kriegman, Eigenfaces vs. fisher-faces: recognition using class specific linear projection, IEEE Transactionson Pattern Analysis and Machine Intelligence, 19 (2002), 711-720.

[6] K. Labusch, E. Barth, T. Martinetz, Simple method for high-performancedigit recognition based on sparse coding, IEEE Trans Neural Netw, 19(2008), 1985-1989.

[7] B. He, D. Xu, N. Rui, M. V. Heeswijk, Q. Yu, Y. Miche, A. Lendasse, Fastface recognition via sparse coding and extreme learning machine, CognitiveComputation, 6 (2014), 264-277.

[8] M. Zheng, J. Bu, C. Chen, C. Wang, L. Zhang, G. Qiu, D. Cai, Graphregularized sparse coding for image representation, IEEE Transactions onImage Processing A Publication of the IEEE Signal Processing Society, 20(2011), 1327-1336.

[9] Z. Shu, C. Zhao, P. Huang, Constrained sparse concept coding algorithmwith application to image representation, Ksii Transactions on Internet andInformation Systems, 8 (2014), 3211-3230.

[10] L. Andrs, P. Zsolt, S. Gbor, Efficient sparse coding in early sensory process-ing: Lessons from signal recovery, Plos Computational Biology, 8 (2012),e1002372.

[11] Y. Zhao, Z. Liu, Y. Wang, H. Wu, S. Ding, Sparse coding algorithm with ne-gentropy and weighted 1-norm for signal reconstruction, Entropy, 19 (2017),599.

Page 749: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

NAGSC: NESTEROV’S ACCELERATED GRADIENT METHODS FOR SPARSE CODING 735

[12] Y. Nesterov, Smooth minimization of non-smooth functions, MathematicalProgramming, 103 (2005), 127-152.

[13] D. P. Bertsekas, Nonlinear programming, Athena scientific Belmont, 1999.

[14] N. Guan, D. Tao, Z. Luo, B. Yuan, Nenmf: an optimal gradient method fornonnegative matrix factorization, IEEE Transactions on Signal Processing,60 (2012), 2882-2898.

[15] M. Baes, Estimate sequence methods: extensions and approximations, In-stitute for Operations Research, 2009.

[16] H. Lee, A. Battle, R. Raina, A. Y. Ng, Efficient sparse coding algorithms.nips, Proc of Nips, 19 (2007), 801-808.

[17] J. Mairal, F. Bach, J. Ponce, G. Sapiro, Online learning for matrix fac-torization and sparse coding, Journal of Machine Learning Research, 11(2009), 19-60.

Accepted: 28.05.2018

Page 750: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (736–747) 736

CONTRA WEAKLY-θI-PRECONTINUOUS FUNCTIONS INIDEAL TOPOLOGICAL SPACES

Manisha Shrivastava∗

Department of MathematicsGovt. J.Y. Chhattisgarh CollegeRaipur, [email protected]

Takashi Noiri2949–1 Shiokita-cho,Hinagu, Yatsushiro–shi, Kumomoto–ken869–5142 [email protected]

Purushottam JhaDepartment of Mathematics

Govt. D.K.P.G. College

Baloda Bazar-493332

Raipur, Chhattisgarh

India–494661

[email protected]

Abstract. The present authors [23] introduced and studied the notion of weakly θI-preopen sets in ideal topological spaces. In this paper, we apply this set to introduce andstudy a new class of functions called contra weakly θI-precontinuous functions in idealtopological spaces. Some characterizations and several basic properties of this class offunctions are obtained. Further, we introduce the notions of contra-θI-precontinuous,contra-θI-α-continuous, contra-θI-semicontinuous and contra-θI-β-continuous functionsin ideal topological spaces and also establish relationships among these new classes offunctions.

Keywords: weakly θI-preopen sets, weakly θI-precontinuous, contra weakly-θI-pre-continuous, contra-θI-precon-tinuous, contra-θI-α-continuous, contra-θI-semicontinuousand contra-θI-β-continuous.

1. Introduction

The concept of continuous functions is one of the important and basic topic in thetheory of classical point set topology and several branches of mathematics. Gen-eral Topologists have introduced and investigated many different generalizationsof continuous functions. Dontchev [6] introduced a new class of functions calledcontra-continuous functions. A function f : (X, τ)→ (Y, σ) is said to be contra-

∗. Corresponding author

Page 751: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CONTRA WEAKLY-θI-PRECONTINUOUS FUNCTIONS ... 737

continuous [6] if the preimage of every open set of Y is closed in X. Subsequently,some generalized forms of this class of functions namely contra-supercontinuousfunctions [15], contra-precontinuous functions [16] etc., in topological spacesand contra-pre-I-continuous functions [22] etc. in ideal topological spaces werepropounded and studied. An ideal I in a topological space has been consid-ered since 1930 by Kuratowski [13] and Vaidyanathaswamy [24] (c.f.[25]). Afterseveral decades, Jankovic and Hamlett [12] investigated the topological idealwhich is the generalization of general topology. Jankovic and Hamlett (c.f.[8],[9]) also introduced the notion of I-open sets in topological spaces. Abd El-Monsef et al. [2] further investigated I-open sets and I-continuous functions.Some generalized forms of I-open sets are introduced in [3], [7] (see [11]) andother papers. Al-Omari and Noiri [5] introduced the notions of θI-preopen,θI-semiopen, θI-α-open, θI-β-open sets by using θI-open sets and derived thedecomposition of θI-precontinuous functions and θI-β-continuous functions inideal topological spaces. In addition to this, the present authors [23] definedand investigated the notion of weakly θI-preopen sets and established the de-composition of weakly θI-precontinuity.

The purpose of this paper is to give a new class of functions called con-tra weakly-θI-precontinuous functions via weakly θI-preopen sets in ideal topo-logical spaces and study their fundamental properties and characterizations.We also devise the concept of contra-θI-precontinuous, contra-θI-α-continuous,contra-θI-semicontinuous and contra-θI-β-continuous functions in ideal topolog-ical spaces and establish their interrelationships.

2. Preliminaries

An ideal on a topological space (X, τ) is defined as a non-empty collection I ofsubsets of X satisfying the following two conditions:

1. V ∈ I and U ⊂ V implies U ∈ I,

2. V ∈ I and U ∈ I implies V ∪ U ∈ I.

The pair (X, τ , I) of a topological space (X, τ) and an ideal I on X is called anideal topological space or simply an ideal space. Given a topological space (X, τ)with an ideal I on X and if P(X) is the collection of all subsets of X, then theset operator (.) : P(X)→ P(X) is called the local function [24] of A with respectto τ and ideal I, is defined as follows: For a subset A ⊆ X, the set A∗(I, τ) =x ∈ X: (U ∩ A) /∈ I, for every U ∈ τ(x) , where τ(x)= U ∈ τ : x ∈ U [12].We simply write A∗ instead of A∗(I, τ) in case there is no chance of confusion[24] (c.f. [12], [13]). It is well known that Cl∗(A) = A ∪ A∗(I, τ) defines aKuratowski closure operator for a topology τ∗(I, τ) called the ∗-topology whichis finer than τ . The topology τ∗ is generated by the base β(I, τ) = U \ I: U ∈ τand I ∈ I . In general β(I, τ) is not always a topology as shown in [12]. X∗ isoften a proper subset of X.

Page 752: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

738 MANISHA SHRIVASTAVA, TAKASHI NOIRI and PURUSHOTTAM JHA

Throughout this paper, for a subset A of a topological space (X, τ), Cl(A)and Int(A) denote the closure and the interior of A, respectively. The family ofall weakly θI-preopen (resp. θI-preopen, θI-semiopen, θI-α-open, θI-β-open) setsof the space (X, τ, I) will be denoted by WθIPO(X) (resp. θIPO(X), θISO(X),θIαO(X), θIβO(X) ) .

We start with recalling following definitions and results, which are necessaryfor this study in the sequel.

Definition 1. A subset A of topological space (X, τ) is said to be preopen[18] (resp. semiopen [14], α-open [19] [22], β-open [1]) if A ⊂ Int(Cl(A)) (resp.A ⊂ Cl(Int(A)), A ⊂ Int(Cl(Int(A))), A ⊂ Cl(Int(Cl(A))) ).

Lemma 1 ([12]). Let (X, τ, I) be an ideal topological space and A, B be any twosubsets of X. Then the following properties hold:

1. If A ⊆ B, then A∗ ⊆ B∗;

2. If A∗ = Cl(A∗) ⊆ Cl(A);

3. (A∗)∗ ⊆ A∗;

4. (A ∪B)∗ = A∗ ∪B∗.

5. If U ∈ τ , then U ∩ A∗ ⊂ (U ∩A)∗.

Lemma 2 ([5]). Let (X, τ , I) be an ideal topological space and A be a subset ofX. Then the following properties hold.

1. If A is open, then Cl(A) = ClθI(A)= Clθ(A).

2. If A is closed, then Int(A) = IntθI(A) = Intθ(A).

Lemma 3 ([10]). For a subset A of a topological space (X, τ), the followingproperties hold:

1. sCl(A) = A ∪ Int(Cl(A)),

2. If A is open then sCl(A) = Int(Cl(A)).

Definition 2. A subset A of an ideal topological space (X, τ , I) is said tobe θI-preopen [5] (resp. θI-semiopen [5], θI-β-open [5], θI-α-open [5], weakly θI-preopen [23]) ifA ⊆ Int(ClθI(A))) (resp. A ⊆ Cl(IntθI (A)), A ⊆ Cl(Int(ClθI(A))),A ⊆ Int(Cl(IntθI (A))), A ⊆ sCl(Int(ClθI(A))) ).

Definition 3. A function f : (X, τ)→ (Y, σ) is said to be

(1) precontinuous [18] if preimage of every open set in Y is preopen in X.

(2) semicontinuous [14] if the inverse image of each open set in Y is semiopenin X.

Page 753: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CONTRA WEAKLY-θI-PRECONTINUOUS FUNCTIONS ... 739

(3) β-continuous [1] if the inverse image of each open set in Y is β-open in X.

(4) α-continuous [19] if the inverse image of each open set in Y is α-open inX.

Definition 4. A function f : (X, τ, I)→ (Y, σ) is said to be

(1) weakly θI-precontinuous [23] if the preimage of every open set in Y isweakly θI-preopen in X.

(2) weakly θI -preirresolute [23] if the preimage of every weakly θI -preopenset in Y is a weakly θI -preopen set in X.

Definition 5. A space (X, τ) is said to be extremally disconnected [26] if theclosure of every open set in X is open.

Theorem 1 ([23]). If a topological space (X, τ) is extremally disconnected andA ∈ θISO(X), then A ∈ θIαO(X).

Theorem 2 ([23]). If a topological space (X, τ) is extremally disconnected andA ∈ θIβO(X), then A ∈WθIPO(X).

3. Contra weakly-θI-precontinuous functions

Definition 6. A function f : (X, τ, I) → (Y, σ) is said to be contra weakly-θI-precontinuous if the preimage of every closed set in Y is weakly θI-preopenin X.

Example 1. Let X = a, b, c, d, τ = X,ϕ, b, c, c, d, b, c, d, c andI = P(X) then (X, τ , I) is an ideal topological space. C(X) = X,ϕ, a, d,a, b, a, a, b, d. Let Y = 1, 2, 3, 4, σ = Y, ϕ, 1, 2, 1, 2, 3, 2 andC(Y ) = Y, ϕ, 3, 4, 4, 1, 3, 4. Then (Y, σ) be a topological space. Letf : (X, τ, I) → (Y, σ) be a function defined as f(a) = 3, f(b) = 2, f(c) = 4,f(d) = 1. Then f is contra weakly-θI-precontinuous, since the preimage ofevery closed set in Y is weakly θI-preopen in X.

Definition 7. Let A be any subset of an ideal topological space (X, τ , I).

(1) The intersection of all weakly θI-preclosed sets containing A is called theweakly θI-pre-closure of A and it is denoted by WθI-PCl(A).

(2) The union of all weakly θI-preopen sets contained in A is called the weaklyθI-pre-interior of A and it is denoted by WθI-PInt(A).

Remark 1. Let A be any subset of an ideal topological space (X, τ , I), thenthe following properties hold:

(1) A is weakly θI-preclosed if and only if WθI-PCl(A) = A.

(2) A is weakly θI-preopen if and only if WθI-PInt(A) = A.

Page 754: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

740 MANISHA SHRIVASTAVA, TAKASHI NOIRI and PURUSHOTTAM JHA

Theorem 3. Let A be any subset of an ideal topological space (X, τ , I) and x ∈X. Then x ∈ WθI-PCl(A) if and only if A∩U = ϕ for each U ∈ WθIPO(X,x).

Proof. Necessity. Let x /∈ WθI-PCl(A), then suppose U = X\ WθI-PCl(A)be a weakly θI-preopen set containing x in X such that U∩ WθI-PCl(A) = ϕ.Hence the result.

Sufficiency. Let U be a weakly θI-preopen set containing x in X such thatU∩ WθI-PCl(A) = ϕ. Then X \ U is a weakly θI-preclosed set containing A.Since WθI-PCl(A) is the smallest weakly θI-preclosed set containing A, WθI-PCl(A) ⊆ X \ U . Therefore x /∈ WθI-PCl(A).

Definition 8. Let A be any subset of a space (X, τ). The set∩U : U ∈ τ,A ⊂

U is called the kernel of A [20] and is denoted by ker(A). In [17], the kernel ofA is called the ∧-set.

Lemma 4 ([15], [17]). The following properties hold for subsets A and B of aspace (X, τ) :

(1) x ∈ ker(A) if and only if A ∩ F = ϕ for any F ∈ C(X,x).

(2) A ⊂ ker(A) and A = ker(A) if A is open in X.

(3) A ⊂ B, then ker(A) ⊂ ker(B).

Theorem 4. Let f : (X, τ, I) → (Y, σ) be a function from an ideal topologicalspace (X, τ, I) to (Y, σ). Then the following statements are equivalent:

(1) f is contra weakly-θI-precontinuous,

(2) The inverse image of each open set in Y is weakly θI-preclosed in X,

(3) For each x ∈ X and each closed subset G of Y containing f(x), there existsa weakly θI-preopen set U in X such that x ∈ U and f(U) ⊂ G.

(4) f(WθI-PCl(M)) ⊂ ker(f(M)) for every subset M of X,

(5) WθI-PCl(f−1(N)) ⊂ f−1(ker(N)) for every subset N of Y.

Proof. (1)⇔ (2) is obvious.(1) ⇒ (3). Let x ∈ X and G be any closed subset of Y containing f(x).

Since f is contra weakly-θI-precontinuous, f−1(G) is weakly θI-preopen in X.Let U = f−1(G). Then x ∈ U = f−1(G). Thus f(U) ⊂ G.

(3) ⇒ (4). Let M be any subset of X. Let y ∈ Y be any element suchthat y /∈ ker(f(M)). Then by Lemma 4, there exists a closed set V containingy in Y such that f(M) ∩ V = ϕ; hence M ∩ f−1(V ) = ϕ. By (3) for anyx ∈ f−1(y) , there exists a weakly θI-preopen set W containing ’x’ such thatf(W ) ⊂ V . Therefore f(M ∩W ) ⊂ f(M) ∩f(W ) ⊂ f(M) ∩ V = ϕ and henceM ∩W = ϕ. Thus by Theorem 3, x /∈ WθI-PCl(M) for any x ∈ f−1(y).Thus f−1(y)∩ WθI-PCl(M) = ϕ and hence y /∈ f(WθI-PCl(M)). Hence we

Page 755: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CONTRA WEAKLY-θI-PRECONTINUOUS FUNCTIONS ... 741

obtain f(WθI − PCl(M)) ⊂ ker(f(M) for every subset M of X.(4)⇒ (5). Let N be any subset of Y, then f−1(N) is a subset of X. By (4)

and by Lemma 4, we have f(WθI-PCl(f−1(N))) ⊂ ker(f(f−1(N)) ⊂ ker(N).

Therefore WθI-PCl(f−1(N)) ⊂ f−1(ker(N)).

(5) ⇒ (1). Let U be an open subset of Y, then by Lemma 4, ker(U) = U .By (6), WθI-PCl(f

−1(U)) ⊂ f−1(ker(U)) = f−1(U) and thus we get WθI-PCl(f−1(U)) ⊂ f−1(U). We already have f−1(U) ⊂WθI-PCl(f

−1(U)). There-fore we get f−1(U) = WθI-PCl(f

−1(U)). Thus U is weakly θI-preclosed in X.Hence f is contra weakly-θI-precontinuous.

Remark 2. The concepts of weakly θI-precontinuous functions and contra-weakly θI-precontinuous functions are independent.

Example 2. Let X = a, b, c, d, τ = X,ϕ, a, b, b and I = P(X) then (X,τ , I) is an ideal topological space. Let Y = p, q, r and σ = Y, ϕ, q, r. Then(Y, σ) is a topological space. Let f : (X, τ, I)→ (Y, σ) be a function defined asf(a) = q, f(b) = r, f(c) = f(d) = p. Then f is weakly θI-precontinuous. Butit is not contra weakly-θI-precontinuous, since the preimage of a closed set pin Y is c, d, which is not weakly θI-preopen in X.

Example 3. Let X = 1, 2, 3, 4, τ = X,ϕ, 1, 1, 2, 1, 2, 4 and I =P(X) then (X, τ , I) is an ideal topological space. Let Y = a, b, c, d, σ =Y, ϕ, b, b, c, b, c, d. Then (Y, σ) is a topological space. Suppose a func-tion f : (X, τ, I) → (Y, σ) is defined as f(1) = a, f(2) = c, f(3) = d, f(4) = b.Then it is contra weakly-θI-precontinuous but it is not weakly θI-precontinuous,since the preimage of an open set b, c in Y is 2, 4, which is not weakly θI-preopen in X.

Remark 3. The following example shows that composition of any contra weakly-θI-precontinuous functions need not be contra weakly-θI-precontinuous in gen-eral.

Example 4. Let X= Y = Z = a, b, c, d, τ =X,ϕ, a, b, b, a, b, c andI1 = ϕ, b, σ = Y, ϕ, b, I2 = P(X) then (X, τ , I1) and (Y ,σ,I2) are idealtopological spaces. Let η = Z, ϕ, a, a, b, c, then (Z, η) is a topologicalspace. Let f : (X, τ, I1) → (Y, σ, I2) be a function defined as f(a) = c, f(b) =d, f(c) = b and f(d) = a. Then f is contra weakly-θI-precontinuous. Letg : (Y, σ, I2) → (Z, η) be a function defined as g(a) = b, g(b) = c, g(c) = d andg(d) = a. Then g is contra weakly-θI-precontinuous. But their composition gf :(X, τ, I1)→ (Z, η) is not contra weakly-θI-precontinuous, since the preimage ofa closed set b, c, d in (Z, η) i.e. (g f)−1(b, c, d) = f−1(g−1(b, c, d)) =f−1(a, b, c)= a, c, d, which is not weakly θI-preopen in (X, τ , I1).

Theorem 5. If a function f : (X, τ, I) → (Y, σ) is contra weakly θI-precon-tinuous and Y is a regular space, then f is weakly θI-precontinuous.

Page 756: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

742 MANISHA SHRIVASTAVA, TAKASHI NOIRI and PURUSHOTTAM JHA

Proof. Let (X, τ, I) be any ideal topological space and let x ∈ X be any point.Suppose P is an open set in Y with f(x) ∈ P . Since Y is regular, then thereexists an open set Q in Y with f(x) ∈ Q such that Cl(Q) ⊂ P . Since f is contraweakly θI-precontinuous, then by Theorem 4, there exists a weakly θI-preopenset M containing ’x’ such that f(M) ⊂ Cl(Q). Then f(M) ⊂ Cl(Q) ⊂ P . Itfollows from Theorem 18 of [23] that f is weakly θI-precontinuous.

Definition 9. An ideal topological space (X, τ, I) is said to be weakly θI-preconnected if X is not the union of two disjoint non-empty weakly θI-preopensubsets of X.

Theorem 6. If a function f : (X, τ, I) → (Y, σ) is a surjection and contraweakly-θI-precontinuous and X is weakly θI-preconnected, then Y is connected.

Proof. Let f : (X, τ, I)→ (Y, σ) be a contra weakly-θI-precontinuous functionfrom a weakly θI-preconnected space X onto Y. On contrary, assume that spaceY is disconnected. For, let Y = A ∪B be the separation of Y into two disjointnon-empty clopen subsets of Y. Since f is onto contra weakly-θI-precontinuousfunction, X = f−1(Y ) = f−1(A ∪ B) = f−1(A) ∪ f−1(B), where f−1(A) andf−1(B) are non-empty weakly θI-preopen sets in X and also f−1(A) ∩ f−1(B)= f−1(A∩B) = f−1(ϕ) = ϕ. Thus f−1(A) and f−1(B) forms a separation of X,which is contrary to the assumption that X is weakly θI-preconnected. HenceY is connected.

Theorem 7. Let (X, τ, I) be any ideal topological space, which is weakly θI-preconnected and (Y, σ) be a T1-space. If f : (X, τ, I) → (Y, σ) is a contraweakly θI-precontinuous function, then f is constant.

Proof. Suppose the space X is weakly θI-preconnected. Since Y is a T1-space,λ = f−1(y) : y ∈ Y is the disjoint weakly θI-preopen partition of X. If| λ |≥ 2 (where | λ | denotes the cardinality of the set λ), then X is the union oftwo disjoint non-empty weakly θI-preopen sets. But X is weakly θI-preconnectedand we have | λ | = 1. It shows that the function f is constant.

Definition 10 ([20]). A space (X, τ) is said to be locally indiscrete if everyopen set in X is closed in X.

Theorem 8. If a function f : (X, τ, I)→ (Y, σ) is weakly θI-precontinuous andthe space (Y, σ) is locally indiscrete, then f is contra weakly-θI-precontinuous.

Proof. Let V be any open set in (Y, σ). Since Y is locally indiscrete, V isclosed in Y. Since f is weakly θI-precontinuous, f−1(V ) is weakly θI-preclosedin (X, τ, I). Hence, by Theorem 4 f is contra weakly-θI-precontinuous.

Definition 11. An ideal topological space (X, τ, I) is said to be weakly θI-pre-T2 if for each pair of distinct points ’x’ and ’y’ in X, there exist weakly θI-preopensets U and V containing ’x’ and ’y’, respectively, such that U ∩ V = ϕ.

Page 757: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CONTRA WEAKLY-θI-PRECONTINUOUS FUNCTIONS ... 743

Note - A closed neighbourhood of a point ’x’ is a closed set that contains anopen set containing the point ’x’.

Definition 12 ([4]). A Urysohn space (also called T -212 -space or Te-space) is

a space in which any two distinct points can be separated by closed neighbour-hoods.

Theorem 9. Let (X, τ, I) be any ideal topological space. For each pair ofpoints x1, x2 ∈ X with x1 = x2, there exists a function f from space X intoan Urysohn space Y such that f(x1) = f(x2) and function f is contra weakly-θI-precontinuous at x1 and x2, then the space X is weakly θI-pre-T2.

Proof. Let x1, x2 ∈ X with x1 = x2 be any pair of points and supposey1 = f(x1) and y2 = f(x2). Then by assumption, y1 = y2. Since Y is anUrysohn space, there exist two open sets U and V in Y such that y1 ∈ U ,y2 ∈ V and Cl(U) ∩ Cl(V ) = ϕ. Since f is contra weakly θI-precontinuous, byTheorem 4, there exist two weakly θI-preopen sets P and Q containing x1 and x2,respectively, such that f(P ) ⊂ Cl(U) and f(Q) ⊂ Cl(V ). Since Cl(U) ∩ Cl(V )= ϕ, P ∩Q = ϕ. Hence X is weakly θI-pre-T2.

Corollary 1. If f : (X, τ, I) → (Y, σ) is a contra weakly-θI-precontinuousinjection and (Y, σ) is Urysohn, then (X, τ, I) is weakly θI-pre-T2.

Theorem 10. If f : (X, τ, I)→ (Y, σ, J) and g : (Y, σ, J)→ (Z, η) are any twofunctions, then following hold:

1. If f is a contra weakly-θI-precontinuous function and g is a continuousfunction, then their composition g f is contra weakly-θI-precontinuous.

2. If f is weakly-θI-preirresolute and g is weakly-θI-precontinuous, then theircomposition g f is contra weakly-θI-precontinuous.

Proof. 1. Let F be any closed set in (Z, η). Since g is continuous, g−1(F ) isclosed in (Y, σ, J). Since f is contra weakly-θI-precontinuous, f

−1(g−1(F )) =(g f)−1(F ) is weakly-θI-preopen in (X, τ, I). Therefore their composition g fis contra weakly-θI-precontinuous.

2. Let F be any closed set in (Z, η). Since g is weakly-θI-precontinuous,g−1(F ) is weakly-θI-preopen in (Y, σ, J). Since f is weakly-θI-preirresolute,f−1(g−1(F )) = (g f)−1(F ) is weakly-θI-preopen in (X, τ, I). Therefore theircomposition g f is contra weakly-θI-precontinuous.

4. Contra-θI-precontinuous, contra-θI-α-continuous,contra-θI-semicontinuous and contra-θI-β-continuous functions

Here, we introduce the notions of contra-θI-precontinuous, contra-θI-α-continuous,contra-θI-semicontinuous and contra-θI-β-continuous functions and elaboratetheir relationship with contra weakly-θI-precontinuous functions and their in-terrelationships.

Page 758: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

744 MANISHA SHRIVASTAVA, TAKASHI NOIRI and PURUSHOTTAM JHA

Definition 13. A function f : (X, τ, I) → (Y, σ) is said to be θI-α-continuousif the preimage of every open set in Y is θI-α-open in X.

Definition 14. A function f : (X, τ, I)→ (Y, σ) is said to be θI-semicontinuousif the preimage of every open set in Y is θI-semiopen in X.

Definition 15. A function f : (X, τ, I) → (Y, σ) is said to be contra-θI-precontinuous ((resp. contra-θI-α-continuous, contra-θI-semicontinuous, contra-θI-β-continuous) if the preimage of every closed set in Y is θI-preopen (resp.θI-α-open, θI-semiopen, θI-β-open) in X.

Theorem 11. (1) Every contra-θI-precontinuous function is contra weakly-θI-precontinuous.

(2) Every contra-precontinuous function is contra-θI-precontinuous and there-fore contra weakly-θI-precontinuous.

(3) Every contra-θI-α-continuous function is contra-θI-precontinuous and con-tra-θI-semicontinuous.

(4) Every contra weakly-θI-precontinuous function is contra-θI-β-continuous.

(5) Every contra-θI-semicontinuous function is contra-θI-β-continuous.

Proof. (1) Suppose a function f : (X, τ, I) → (Y, σ) is contra-θI-preconti-nuous and A is any closed set in Y, then f−1(A) is θI-preopen in X andf−1(A) is also weakly θI-preopen in X and therefore the function f iscontra weakly-θI-precontinuous, since every θI-preopen set is weakly θI-preopen. For, if A is θI-preopen set in X. By using the definition of a θI-preopen set, we have A ⊆ Int(ClθI(A)) ⊆ sCl(Int(ClθI (A))). This showsthat A is weakly θI-preopen. This shows that A is weakly θI-preopen.

(2) Suppose a function f : (X, τ, I)→ (Y, σ) is contra-precontinuous and A isany closed set in Y, then f−1(A) is preopen in X and therefore f−1(A) isθI-preopen in X, it follows that the function f is contra-θI-precontinuous,therefore f is contra weakly-θI-precontinuous, since every preopen set isθI-preopen and therefore weakly θI-preopen. For, if A is any preopen setin X, A ⊆ Int(Cl(A)) ⊆ Int(ClθI (A))) and therefore A is θI-preopen andhence A is weakly θI-preopen.

(3) Suppose a function f : (X, τ, I) → (Y, σ) is contra-θI-α-continuous andA is any closed set in Y, then f−1(A) is θI-α-open in X and also f−1(A)is θI-preopen, consequently function f is contra-θI-precontinuous. For, ifA is any θI-α-open set in X, A ⊆ Int(Cl(IntθI(A))). By using Lemma3, A ⊆ Int(Cl(IntθI(A))) ⊆ Int(Cl(Int(A))) ⊆ Int(Cl(Int(ClθI (A)))) =sCl(Int(ClθI (A))). Hence A is weakly θI-preopen.

Page 759: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CONTRA WEAKLY-θI-PRECONTINUOUS FUNCTIONS ... 745

(4) Suppose f : (X, τ, I)→ (Y, σ) is any contra weakly-θI-precontinuous func-tion and A is any closed set in Y, then f−1(A) is weaklyθI-preopen in Xand f−1(A) is also θI-β-open in X, since every weaklyθI-preopen set is θI-β-open. For, if A is weaklyθI-preopen then we have A ⊆ sCl(Int(ClθI(A)))⊆ Cl(Int(ClθI(A)))). This implies that A is θI-β-open. Hence f is contra-θI-β-continuous.

(5) Suppose a function f : (X, τ, I)→ (Y, σ) is contra-θI-semicontinuous andA is any closed set in Y, then f−1(A) is θI-semiopen in X and f−1(A) isalso θI-β-open in X, since every θI-semiopen set is θI-β-open. For, if A beany θI-semiopen set in X, A ⊆ Cl(IntθI(A)). Let us assume that IntθI(A)⊆ Int(A) ⊆ Int(ClθI(A))), A ⊆ Cl(IntθI(A)) ⊆ Cl(Int(ClθI(A))), whichimplies that A is θI-β-open. Thus f is contra-θI-β-continuous.

Remark 4. The converses (1)-(5) of Theorem 12 are not true, as shown by thefollowing examples.

Example 5. In Example 1, X = a, b, c, d, τ = X,ϕ, b, c, c, d, b, c, d, cand I = P(X) then (X, τ , I) is an ideal topological space. Let Y = 1, 2, 3, 4,σ = Y, ϕ, 1, 2, 1, 2, 3, 2. Then (Y, σ) is a topological space. Let f :(X, τ, I)→ (Y, σ) is a function defined as f(a) = 3, f(b) = 2, f(c) = 4, f(d) = 1.Then f is contra weakly θI-precontinuous, since the preimage of every closed setin Y is weakly θI-preopen in X. But f is not contra θI-precontinuous, since thepreimage of a closed set 3, 4 in Y is a, c, which is not θI-preopen in X.

Example 6. Let X = a, b, c, d, τ = X,ϕ, a, b, a, b, a, b, c and I =ϕ, a then (X, τ , I) is an ideal topological space. Let Y = 1, 2, 3, 4, σ =Y, ϕ, 1, 3, 1, 3, 4. Then (Y, σ) is a topological space. Let f : (X, τ, I) →(Y, σ) be a function defined as f(a) = 2, f(b) = 3, f(c) = 1, f(d) = 4. Then fis contra weakly-θI-precontinuous, since the preimage of every closed set in Yis weakly-θI-preopen in X. But f is neither contra θI-α-continuous nor contra-precontinuous, since the preimage of a closed set 2, 4 in Y is a, b, which isneither θI-α-open nor preopen in X.

Example 7. Let X = a, b, c, d, τ = X,ϕ, d, b, b, d and I = ϕ, b,d, b, d then (X, τ , I) is an ideal topological space. Let Y = p, q, r, s,σ = Y, ϕ, p, p, q, r. Then (Y, σ) be a topological space. Let f : (X, τ, I)→(Y, σ) be function defined as f(a) = q, f(b) = p, f(c) = r, f(d) = s. Then fis contra-θI-β-continuous, since the preimage of every closed set in Y is θI-β-open in X. But it is not contra weakly-θI-precontinuous, since the preimage ofa closed set q, r, s in Y is a, c, d, which is not weakly θI-preopen in X.

Example 8. Let X = a, b, c, d, τ = X,ϕ, a, b, b, c, a, b, c, b andI = ϕ, b, c then (X, τ , I) is an ideal topological space. Let Y = p, q, r, s,σ = Y, ϕ, p, p, q, r, p, r. Then (Y, σ) is a topological space. Let f :

Page 760: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

746 MANISHA SHRIVASTAVA, TAKASHI NOIRI and PURUSHOTTAM JHA

(X, τ, I) → (Y, σ) be a function defined as f(a) = r, f(b) = q, f(c) = s,f(d) = p. Then f is contra- θI-β-continuous, since the preimage of every closedset in Y is θI-β-open in X. But it is not contra θI-semicontinuous, since thepreimage of a closed set s in Y is c, which is not θI-semiopen in X.

Theorem 12. Let f : (X, τ, I)→ (Y, σ) be any contra θI-semicontinuous func-tion from an ideal topological space (X, τ , I) to any space (Y, σ). If the space(X, τ , I) is extremally disconnected, then f is contra θI-α-continuous.

Proof. Let f : (X, τ, I)→ (Y, σ) be any contra-θI-semicontinuous function fromthe space X to Y. If F is any closed set in Y, then f−1(F ) is θI-semiopen in X.Since X is extremally disconnected, by Theorem 1, f−1(F ) is θI-α-open in X.Hence f is contra-θI-α-continuous.

Theorem 13. Let f : (X, τ, I)→ (Y, σ) be any contra-θI-β-continuous functionfrom an ideal topological space (X, τ , I) to any space (Y, σ). If the space (X, τ ,I) is extremally disconnected, then f is contra weakly-θI-precontinuous.

Proof. This follows directly from Theorem 2.

References

[1] M.E. Abd-El Monsef, S.N. El-Deeb, R.A. Mahmoud, β-open sets and β-continuous mapping, Bull. Fac. Sci. Assiut Univ.A, 12 (1983), 77-90.

[2] M.E. Abd-El Monsef, E.F. Lashien and A.A. Nasef, On I-open sets andI-continuous functions, Kyungpook Math. J., 32(1) (1992), 21-30.

[3] M. Akdag, θ-I-open sets, Kochi J.Math., 3 (2008), 217-229.

[4] P. Alexandroff, P. Urysohn, Memoire sur les Espaces Topologiques Com-pacts, Verh. Nederl. Akad. Wetensch. Afd. Natuurk. Sect.I., 14 (1929), 196.

[5] A. Al-Omari, T. Noiri, Decompositions of continuity in ideal topologicalspaces, Anal. St. Univ. ”Al.I. Cuza” Iasi (S.N.) Mat., 60 (2014), 37-49.

[6] J. Dontchev, Contra-continuous functions and strongly S-closed spaces, Int.J. Math. Math. Sci., 19(2) (1996), 303-310.

[7] J. Dontchev, On pre-I-open sets and a decomposition of I-continuity,Banyan Math. J., 2 (1996).

[8] T.R. Hamlett, D.S. Jankovic, Ideals in General Topology and Applica-tions (Mid-dletown,CT,1988), Lecture Notes in Pure and Appl.Math., 123,Dekker, New York, 1990, 115-125.

[9] T.R. Hamlett, D.S. Jankovic, Compatible extensions of ideals,Boll.Un.Mat.Ital., 7 (1992), 453-465.

Page 761: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

CONTRA WEAKLY-θI-PRECONTINUOUS FUNCTIONS ... 747

[10] E. Hatir, T. Noiri , Strong C-sets and decompositions of continuity, ActaMath. Hungar., 94(4) (2002), 281-287.

[11] E. Hatir, T. Noiri, On β-I-open sets and a decomposition of almost-I-continuity, Bull. Malays. Math. Sci. Soc. (2), 29 (2006), 119-124.

[12] D.S. Jankovic, T.R. Hamlett, New topologies from old via ideals, Amer.Math. Monthly, 97(4) (1990), 295-310.

[13] K. Kuratowski, Topology, Vol.I, Academic Press, New York, 1966.

[14] N. Levine, Semi-open sets and semi-continuity in topological spaces, Amer.Math. Monthly, 70 (1963), 36-41.

[15] S. Jafari and T. Noiri, Contra-super-continuous functions, Ann. Univ. Sci.Budapest, 42 (1999), 27-34.

[16] S. Jafari and T. Noiri, Contra-precontinuous functions, Bull. Malays. Math.Sci. Soc.(2), 25 (2002), 115-128.

[17] H. Maki, The special issue in commemoration of Prof. Jazusada IKEDA’sretirement, 1. Oct., 1986, 139-146.

[18] A. S. Mashhour, M. E. Abd El-Monsef and S. N. El-Deeb, On precontinu-ous and weak precontinuous mappings, Proc. Math. Phys. Soc. Egypt., 53(1982), 47-53.

[19] A. S. Mashhour, I. A. Hasanein and S. N. El-Deeb, α-continuous and α-open mappings, Acta Math.Hungar., 41 (1983), 213218.

[20] M. Mrsevic, On pairwise R0 and R1 bitopological spaces, Bull. Math. Soc.Sci. Math. R.S. Roumance, 30(78) (1986), 141-148.

[21] O. Njastad, On some classes of nearly open sets, Pacific J. Math, 15 (1965),961-70.

[22] T. Noiri, S. Jafari, K. Viswanathan and J. Jayasudha, Contra-pre-I-continuous functions, Int. Journal of Math. Analysis, 7(8)(2013), 349-359.

[23] M. Shrivastava, T. Noiri and P. Jha, Weakly θI-Preopen Sets and Decom-position of Continuity, Ital. J. Pure Appl. Math. (accepted).

[24] R. Vaidyanathaswamy, The localization theory in set topology, Proc. IndianAcad. Sci., 20 (1945), 51-61.

[25] R. Vaidyanathaswamy, Set topology, Chelsea Publishing Company, 1960.

[26] S. Willard, General Topology, Addison-Wesley Publishing Co., Reading,Mass.-London-Don Mills, Ont., 1970.

Accepted: 6.06.2018

Page 762: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (748–755) 748

NONEXISTENCE OF GLOBAL SOLUTIONS TO AFRACTIONAL NONLINEAR ULTRA-PARABOLIC SYSTEM

Lamairia Abd ElhakimDepartment of Mathematics and InformaticsLAMIS LaboratoryUniversity of TebessaAlgeriaandDepartment of MathematicsUniversity of [email protected]

Haouam Kamel∗

Department of Mathematics and InformaticsLAMIS LaboratoryUniversity of [email protected]

Rebiai BelgacemDepartment of Mathematics and Informatics

LAMIS Laboratory

University of Tebessa

Algeria

[email protected]

Abstract. In this work, we study the sufficient conditions for that ensure the nonexis-tence of global solutions to a Cauchy problem for a fractional nonlinear ultra-parabolicsystem. The Blowing-up solutions is also presented. Our method of proof relies on asuitable choice of a test function and the weak formulation approach of the sought forsolutions.

Keywords: fractional derivatives, nonlinear ultra-parabolic equations, nonexistence,test-function, blowing-up solutions.

1. Introduction

The main objective of this work is to improve the results of Kerbal and Kirane[6] by considering fractional in time and space for the nonlinear ultra-parabolic

∗. Corresponding author

Page 763: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

NONEXISTENCE OF GLOBAL SOLUTIONS TO A FRACTIONAL NONLINEAR ... 749

system

Dα1

0|t1 (u− u2) +Dα2

0|t2 (u− u1) + (−∆)α2 (|u|) = k1|u|p1 |v|q1 , k1 = const.(1.1)

Dβ10|t1 (v − v2) +Dβ2

0|t2 (v − v1) + (−∆)β2 (|v|) = k2|u|p2 |v|q2 , k2 = const.(1.2)

posed for (t1, t2, x) ∈ Q = R+ × R+ × RN , and supplemented with the initialconditions

u (t1, 0, x) = u1 (t1, x) , u (0, t2, x) = u2 (t2, x) ,(1.3)

v (t1, 0, x) = v1 (t1, x) , v (0, t2, x) = v2 (t2, x) .(1.4)

Here p1 ≥ 0, p2 > 1, q1 > 1, q2 ≥ 0, 0 < α1, α2 < 1, 0 < β1, β2 < 1, 1 ≤ α, β ≤ 2

are constants and Dαj0|tj , D

βj0|tj , j = 1, 2 are the fractional derivatives in the

sense of Riemann-Liouville. The operator Dα0|t is defined, for an absolutely

continuous function g : R+ −→ R, by(Dα

0|t

)g (t) = 1

Γ(1−α)ddt

∫ t0

g(τ)(t−τ)αdτ, and

Γ (α) =∫∞0 rα−1e−rdr is the Euler gamma function. The fractional power of the

Laplacian (−∆)α2 (1 ≤ α ≤ 2) stands for diffusion in media with impurities and

is defined as (−∆)α2 v (x) = F−1 (|ζ|αF (v) (ζ)) (x) , where F denotes the Fourier

transform and F−1 its inverse. In addition, it satisfies the following condition

∀v;RN −→ R we have (−∆)α2 v ∈ L

pp−m

(RN)

and the operator Dα0|t counts

for the abnormal diffusion, a recently very much studied topic in probability,physics, chemistry, biology, image processing, etc, see for instance [7,8] andtheir references. Classical multi-time or ultraparabolic problems have receiveda special interest and attention by authors due to their application in real lifeproblems, see for example [2,5,9,13], while the fractional analogs are in theirpreliminary steps.

2. Preliminaries

The right-sided Riemann-Liouville derivatives of order 0 < α < 1 for an abso-lutely continuous function g : R+ −→ R, is defined by:(

Dαt|T

)g (t) = − 1

Γ (1− α)

d

dt

∫ T

t

g (τ)

(τ − t)αdτ.

Note that for a differentiable function g, the left-sided Caputo derivatives oforder α is defined as:

Dα0|t (g − g (0)) (t) =

1

Γ (1− α)

∫ t

0

g′(τ)

(τ − t)αdτ.

Finally, taking into account the following integration by parts formula:∫ T

0f (t)Dα

0|tg (t) dt =

∫ T

0Dαt|T f (t) g (t) dt,

Page 764: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

750 LAMAIRIA ABD ELHAKIM, HAOUAM KAMEL and REBIAI BELGACEM

where f, g ∈ C∞ (J,R) , J ⊂ R.

We also need some preparatory lemmas based on the function

(2.1) ϕ (t) =

(

1− t

T

)λ, 0 ≤ t ≤ T

0, t > T

where λ ≥ 2.

We define the regular function 0 ≤ ψ ≤ 1:

(2.2) ψ (ξ) =

1, if 0 ≤ ξ ≤ 1,

decreasing, if 1 ≤ ξ ≤ 2,

0, if ξ ≥ 2,

which will be used hereafter.

3. Results

We consider the system with a two-dimensional fractional time (1.1)-(1.2) andlet us set

I0 =

∫Qu2D

α1

t1|TφdP +

∫Qu1D

α2

t2|TφdP,

J0 =

∫Qv2D

β1t1|TφdP +

∫Qv1D

β2t2|TφdP.

Definition 1. Let QT = (0, T ) × (0, T ) × RN , 0 < T < +∞, and we say

that (u, v) ∈(L1loc(QT )

)2is a local weak solution to problem (1) on QT , if

upivqi ∈ L1loc(QT ), i = 1, 2, and it is such that∫

Qk1|u|p1 |v|q1φdP + I0

=

∫QuDα1

t1|TφdP +

∫QuDα2

t2|TφdP +

∫Q|u| (−∆)

α2 φdP,(3.1) ∫

Qk2|u|p2 |v|q2φdP + J0

=

∫QvDβ1

t1|TφdP +

∫QvDβ2

t2|TφdP +

∫Q|v| (−∆)

β2 φdP,(3.2)

for any test function φ ∈ C∞, such that φ(T, t2, x) = φ(t1, T, x) = 0, andP = (t1, t2, x).

Now, set

σ1 = −q1β1 − (N + 2)(p2q1 − 1) + p2q1α1

p2q1 − 1,

Page 765: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

NONEXISTENCE OF GLOBAL SOLUTIONS TO A FRACTIONAL NONLINEAR ... 751

σ2 = −q1β2 − (N + 2)(p2q1 − 1) + p2q1α1

p2q1 − 1,

σ3 = −q1β − (N + 2)(p2q1 − 1) + p2q1α1

p2q1 − 1,

σ4 = −q1β1 − (N + 2)(p2q1 − 1) + p2q1α2

p2q1 − 1,

σ5 = −q1β2 − (N + 2)(p2q1 − 1) + p2q1α2

p2q1 − 1,

σ6 = −q1β − (N + 2)(p2q1 − 1) + p2q1α2

p2q1 − 1,

σ7 = −q1β1 − (N + 2)(p2q1 − 1) + p2q1α

p2q1 − 1,

σ8 = −q1β2 − (N + 2)(p2q1 − 1) + p2q1α

p2q1 − 1,

σ9 = −q1β − (N + 2)(p2q1 − 1) + p2q1α

p2q1 − 1.

Theorem 1. Let p1 ≥ 0 , q2 ≥ 0, p2 > 1 , q1 > 1. Let u0, v0 ∈ L∞(RN ), suththat u0 ≥ 0, v0 ≥ 0, and assume that,∫

Qu2D

α1

t1|TφµdP > 0,

∫Qu1D

α2

t2|TφµdP > 0,∫

Qv2D

β1t1|Tφ

µdP > 0,

∫Qv1D

β2t2|Tφ

µdP > 0,

then solutions to system (1.1)-(1.2) blow-up whenever

max σ1, · · · , σ9, δ1, · · · , δ9 ≤ 0.

Proof. Assume that the solution is nontrivial and global. Next, replacing φ byφµ in (3.1) and then using Holder’s inequality to estimate the Iu and Iv (As weshall see later), we obtain the following estimates:∫

Qu|Dα1

t1|Tφµ| ≤

(∫Qk2|u|p2 |v|q2φµ

) 1p2

·(∫

Qk− 1p2−1

2 |Dα1

t1|Tφµ|

p2p2−1 |v|−

q2p2−1φ

− µp2−1

) p2−1p2

,(3.3) ∫Qu|Dα2

t2|Tφµ| ≤

(∫Qk2|u|p2 |v|q2φµ

) 1p2

·(∫

Qk− 1p2−1

2 |Dα2

t2|Tφµ|

p2p2−1 |v|−

q2p2−1φ

− µp2−1

) p2−1p2

,(3.4)

Page 766: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

752 LAMAIRIA ABD ELHAKIM, HAOUAM KAMEL and REBIAI BELGACEM

∫Qu| (−∆)

α2 φµ| ≤

(∫Qk2|u|p2 |v|q2φµ

) 1p2

·(∫

Qk− 1p2−1

2 | (−∆)α2 φµ|

p2p2−1 |v|−

q2p2−1φ

− µp2−1

) p2−1p2

.(3.5)

Similarly, we have∫Qv|Dβ1

t1|Tφµ| ≤

(∫Qk1|u|p1 |v|q1φµ

) 1q1

·(∫

Qk− 1q1−1

1 |Dβ1t1|Tφ

µ|q1q1−1 |u|−

p1q1−1φ

− µq1−1

) q1−1q1

(3.6) ∫Qv|Dβ2

t2|Tφµ| ≤

(∫Qk1|u|p1 |v|q1φµ

) 1q1

·(∫

Qk− 1q1−1

1 |Dβ2t2|Tφ

µ|q1q1−1 |u|−

p1q1−1φ

− µq1−1

) q1−1q1

,(3.7)

∫Qv| (−∆)

β2 φµ| ≤

(∫Qk1|u|p1 |v|q1φµ

) 1q1

·(∫

Qk− 1q1−1

1 | (−∆)β2 φµ|

q1q1−1 |u|−

p1q1−1φ

− µq1−1

) q1−1q1

(3.8)

If we set

Iu =

(∫Qk2|u|p2 |v|q2φµ

) 1p2

, Iv =

(∫Qk1|u|p1 |v|q1φµ

) 1q1

,

A(p2) =

(∫Qk− 1p2−1

2 |Dα1

t1|Tφµ|

p2p2−1 |v|−

q2p2−1φ

− µp2−1

) p2−1p2

,

A(q1) =

(∫Qk− 1q1−1

1 |Dβ1t1|Tφ

µ|q1q1−1 |u|−

p1q1−1φ

− µq1−1

) q1−1q1

,

B(p2) =

(∫Qk− 1p2−1

2 |Dα2

t2|Tφµ|

p2p2−1 |v|−

q2p2−1φ

− µp2−1

) p2−1p2

,

B(q1) =

(∫Qk− 1q1−1

1 |Dβ2t2|Tφ

µ|q1q1−1 |u|−

p1q1−1φ

− µq1−1

) q1−1q1

,

C(p2) =

∫Qk− 1p2−1

2 | (−∆)α2 φ|

p2p2−1 |v|−

q2p2−1φ

− µp2−1

) p2−1p2

,

C(q1) =

∫Qk− 1q1−1

1 | (−∆)β2 φ|

q1q1−1 |u|−

p1q1−1φ

− µq1−1

) q1−1q1

,

Page 767: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

NONEXISTENCE OF GLOBAL SOLUTIONS TO A FRACTIONAL NONLINEAR ... 753

Iµ0 =

∫Qu2D

α1

t1|Tφµ +

∫Qu1D

α2

t2|Tφµ,

Jµ0 =

∫Qv2D

β1t1|Tφ

µ +

∫Qv1D

β2t2|Tφ

µ,

then, using estimates (3.2), (3.7), we can write (3.1) as

Iv + Iµ0 ≤ I1p2u (A(p2) +B(p2) + C(p2)) ,

Iu + Jµ0 ≤ I1q1v (A(q1) +B(q1) + C(q1)) .

Since Iµ0 , Jµ0 > 0 we have

Iv ≤ I1p2u (A(p2) +B(p2) + C(p2)) ,(3.9)

Iu ≤ I1q1v (A(q1) +B(q1) + C(q1)) .(3.10)

Now, from (3.8) and (3.9), we have

Iv + Iµ0 ≤ I1

p2q1v

(A

1p2 (q1) +B

1p2 (q1) + C

1p2 (q1)

)(A(p2) +B(p2) + C(p2)) .

Then Young’s inequality implies

Iv + Iµ0 ≤ K[(A

1p2 (q1)A(p2)

) p2q1p2q1−1

+(B

1p2 (q1)A(p2)

) p2q1p2q1−1

+(C

1p2 (q1)A(p2)

) p2q1p2q1−1

+(A

1p2 (q1)B(p2)

) p2q1p2q1−1

+(B

1p2 (q1)B(p2)

) p2q1p2q1−1

+(C

1p2 (q1)B(p2)

) p2q1p2q1−1

+(A

1p2 (q1)C(p2)

) p2q1p2q1−1

+(B

1p2 (q1)C(p2)

) p2q1p2q1−1

+(C

1p2 (q1)C(p2)

) p2q1p2q1−1

],

for some positive constant K. We choose the test function φ (t1, t2, x) in theform

φ (t1, t2, x) = φ1 (t1)φ2 (t2)φ3 (x) ,

where φ1 (t1) = (1− t1/T )λ+, 1, φ2 (t2) = (1− t2/T )λ+ and φ3 (x) = ψ(|x|2/T 2

),

and let us now pass to the new variables

τ1 = T−1t1, τ2 = T−1t2, y = T−1x;

we have,

A(p2) = CT−α1+(N+2)

(1− 1

p2

),

A(q1) = CT−β1+(N+2)

(1− 1

q1

),

1. (1− t1/T )λ+ = sup

0, (1− t1/T )

λ

Page 768: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

754 LAMAIRIA ABD ELHAKIM, HAOUAM KAMEL and REBIAI BELGACEM

B(p2) = CT−α2+(N+2)

(1− 1

p2

),

B(q1) = CT−β2+(N+2)

(1− 1

q1

),

C(p2) = CT−α+(N+2)

(1− 1

p2

),

C (q1) = CT−β+(N+2)

(1− 1

q1

).

For some positive constant C. Hence, we obtain

(3.11) Iv + Iµ0 ≤ K [T σ1 + T σ2 + · · ·+ T σ9 ] .

Similarly, we obtain for Iu the estimate

(3.12) Iu + Jµ0 ≤ K[T δ1 + T δ2 + · · ·+ T δ9

].

Finally, passing to the limit as T → +∞, we observe that:

Either max σ1, · · · , σ9, δ1, · · · , δ9 < 0 and in this case, the right hand sidetends to zero while the left hand side is strictly positive. Hence, we obtain acontradiction. Or max σ1, · · · , σ9, δ1, · · · , δ9 = 0 and in this case, followingthe similar analysis used in [6], we prove a contradiction.

References

[1] P. Biler, T. Funaki, WA. Woyczynski, Fractal burgers equations, Journal ofDifferential Equations, 148(1) (1998), 9-46.

[2] K. Deng, H. A. Levine, The role of critical exponents in blow-up theorems,The sequel, J. Math. Anal. Appl., 243 (2000), 85-126.

[3] K. M. Furati, M. Kirane, Necessary conditions for the existence of globalsolutions to systems of fractional differential equations, Fractional Calculusand Applied Analysis, 11(3) (2008), 281-298.

[4] K. Haouam, M. Sfaxi, Critical exponent for nonlinear hyperbolic systemwith spatio-temporal fractional derivatives, I. J. of App. Math., 6 (2011),661-871.

[5] N. Ju, The maximum principle and the global attractor for the dissipative2D quasigeostrophic equations, Communications in Pure and Applied Anal-ysis, (2005), 161-181.

[6] S. Kerbal, M. Kirane, Nonexistence results for the Cauchy problem for non-linear ultraparabolic equations, Abstract and Applied Analysis, 2011 (2011),1-10.

Page 769: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

NONEXISTENCE OF GLOBAL SOLUTIONS TO A FRACTIONAL NONLINEAR ... 755

[7] M. Kirane, Y. Laskri, N.-E. Tatar, Critical exponents of Fujita type forcertain evolution equations and systems with Spatio-Temporal Fractionalderivatives, J. Math. Anal. Appl., 312 (2005), 488-501.

[8] E. Lanconelli, A. Pascucci, S. Polidoro, Linear and nonlinear ultraparabolicequations of Kolmogorov type arising in diffusion theory and in finance, inNonlinear Problems in Mathematical Physics and Related Topics, II, vol.2 of Int. Math. Ser. (N. Y.), Kluwer/Plenum, New York, NY, USA, (2002),243-265.

[9] E. Mitidieri, S. N. Pokhozhaev, A priori estimates and blow-up of solutionsto nonlinear partial differential equations and inequalities, Proc. SteklovInst. Math., 234(3) (2001), 1-362.

[10] B. Rebiai, K. Haouam, Nonexistence of global solutions to a nonlinear frac-tional reaction-diffusion system, IAENG International Journal of AppliedMathematics, 45(4) (2015), 259-262.

[11] S. G. Samko, A. A. Kilbas, O. I. Marichev, Fractional integrals and deriva-tives, Theory and Applications, Gordon and Breach Science Publishers,Yverdon, 1993.

[12] A. S. Tersenov, Ultraparabolic equations and unsteady heat transfer, J. Evo-lution Equ., 5(2) (2005), 277-289.

[13] W. Walter, Parabolic differential equations and inequalities with severaltime variables, Mathematische Zeitschrift, 191(2) (1986), 319-323.

Accepted: 14.06.2018

Page 770: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (756–771) 756

A NEW INTUITIONISTIC FUZZY DIVERGENCEMEASURE AND ITS APPLICATIONS TO HANDLE FAULTDIAGNOSIS OF TURBINE

Rakesh Kumar∗

Department of MathematicsGuru Nanak Dev UniversityAmritsar-143005, [email protected]

Om ParkashDepartment of Mathematics

Guru Nanak Dev University

Amritsar-143005, India

[email protected]

Abstract. The literature of probability, fuzzy and intuitionistic fuzzy divergence mea-sures provides the applications of a variety of divergence measures to different disciplinesdealing with real life problems. Many such divergence measures have been generatedthrough different approaches but still there is a scope that better ones can be developedwhich will provide applications to variety of disciplines. The present communicationinvolving the development of a new intuitionistic measure of divergence for fuzzy dis-tributions is a motivation in this direction. The newly proposed mathematical modelis helpful for the study of fault diagnosis of turbine. In the present paper, we have pro-vided an algorithm which can handle the main faults in the turbine along with usefulinformation for future trends and verified the results numerically.

Keywords: fuzzy sets, intuitionistic fuzzy sets, intuitionistic fuzzy divergence mea-sure/cross-entropy, fault diagnosis, turbine, vibration fault.

1. Introduction

This is to be emphasized that while dealing with the phenomenon of steamturbine failure, many faults are responsible for the cause of vibration of turbineand consequently delivers complex relation between vibration and fault types ofturbine. The occurrence of such turbine faults compels us to provide immediateattention, cause of fault and timely diagnose for its repair so as to avoid moreaccidents and much financial losses. This is a real life problem dealing withdiagnose of the vibration fault of steam turbine, the various diagnosis methodare available in the literature. These methods are outstanding contributions of(Ye, 2009; Salahshoor, Khoshro, & Kordestani, 2011; Zhao, Liu, & He, 2012;Yang, Lee, Junker, & Ghezel-Ayagh, 2010; Kyriazis, & Mathioudakis; 2009).

∗. Corresponding author

Page 771: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A NEW INTUITIONISTIC FUZZY DIVERGENCE MEASURE AND ITS APPLICATIONS ... 757

It has been observed that while dealing with turbine faults problems, theremay be a variety of reasons for the same symptom of the fault and as a con-sequence of the phenomenon the system becomes more complex and difficultfor its analysis and precision. The subjectivity of the experiment suggests thatthe fuzzy set theory introduced by (Zadeh, 1965) can play a vital role in han-dling such a type of uncertain information and finds widespread applications.This is to add that fuzzy set theory was extended to intuitionistic fuzzy settheory by (Atanassov, 1986), who characterize a membership function and non-membership function so as to provide mathematical background in handlingimperfect situations where proper decision cannot be made. Some work relatedwith IFSs theory has been provided by (He & He, 2016; He, He & Chen, 2015; Li& Ren, 2015). This theory is an alternative approach which finds tremendousapplications in various fields including image processing, pattern recognition,fault diagnose and medical science. Motivated by the well known distance mea-sures in probability spaces due to (Kullback, & Leibler, 1951; Bhandari, & Pal,1993) investigated and introduced a new fuzzy divergence measure. Some otherpioneer, who contributed towards the fuzzy (Parkash & Sharma, 2005; Parkash& Kumar, 2016; He, He, Wang & Chen, 2015; He, He, Lee, Kim, Zhang & Yang,2017; Fei & Li, 2016; Li, 2016, Li & Liu, 2015; Dey, Pradhan, Pal & Pal, 2015;Dey & Pal, 2016; Dey, Pal & Pal, 2016 etc.).

The present communication deals with the investigations and enlargementof a new intuitionistic fuzzy divergence measure responsible for detecting thefault diagnosis of turbine. In section 2, some drawbacks in the existing IF-divergence measures have been pointed out. To overcome the drawbacks, a newIF-divergence measure has been proposed and studied its elegant properties inthe form of theorems. These results have presented in section 3 of the paper. Insection 4, application of a new IF-divergence Measure to handle fault diagnosis ofturbine is discussed and also numerical example has been presented to illustratethe procedure of proposed method based on fault diagnosis of turbine.

2. Preliminaries and review of existing intuitionistic fuzzydivergence measures

In this section, fundamental knowledge concerning about IFS and intuitionisticfuzzy divergence measure is introduced.

2.1 Intuitionistic fuzzy sets

Definition 2.1. An intuitionistic fuzzy set A defined on the universe of dis-course X = (x1, x2, ..., xn) given by the expression (Atanassov, 1986)

A = ⟨x, µA(x), νA(x)⟩|x ∈ X,(2.1)

where the function µA(x) : X → [0, 1] and νA(x) : X → [0, 1] denote the mem-bership degree and the non-membership degree respectively with the condition

Page 772: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

758 RAKESH KUMAR and OM PARKASH

that

(2.2) 0 ≤ µA(x) + νA(x) ≤ 1, for every x ∈ X.

Now, let IFS(X) denote the family of all intuitionistic fuzzy sets in the finite uni-verse X = (x1, x2, ..., xn) and A,B ∈ IFS(X) given by A = ⟨x, µA(xi), νA(xi)⟩|xi ∈ X and B = ⟨x, µB(xi), νB(xi)⟩|xi ∈ X.Then some set operations canbe defined as follows:

Complement of A, AC = ⟨x, νA(xi), µA(xi)⟩|xi ∈ X. Intersection of A andB, A ∩ B = ⟨x,minµA(xi), µB(xi),maxνA(xi), νB(xi)⟩|xi ∈ X. Unionof A and B, A ∪ B = ⟨x,maxµA(xi), µB(xi),minνA(xi), νB(xi)⟩|xi ∈ X.Inclusion Relation, A ⊆ B if and only if µA(xi) ≤ µB(xi) and νA(xi) ≥ νB(xi),∀xi ∈ X.

Definition 2.2. Let A = ⟨x, µA(xi), νA(xi)⟩|xi ∈ X and B = ⟨x, µB(xi),νB(xi)⟩|xi ∈ X be two intuitionistic fuzzy sets in X. A mapping D : IFS(X)×IFS(X) → R is a divergence measure for intuitionistic fuzzy sets if it satisfiesthe following axioms (Montes, Pal, Jains, & Montes, 2015):

(a) D(A,B) = D(B,A).

(b) D(A,B) = 0 if and only if A = B.

(c) D(A ∩ C,B ∩ C) ≤ D(A,B) for every C ∈ IFS(X).

(d) D(A ∪B,B ∪ C) ≤ D(A,B) for every C ∈ IFS(X).

Again, the non negativity of the divergence measure is not required in the aboveaxioms. However, it is trivially deduced from (b) and (c) (or (b) and (d)).

A variety of divergence measures for intuitionistic fuzzy sets have been in-troduced by various researchers with their own merits, demerits and limitations.We, now review the following existing divergence measures for IFSs to make afurther meaningful study.

DV S(A,B) =

n∑i=1

(µA(xi) ln

(2µA(xi)

µA(xi) + µB(xi)

)+

(νA(xi) ln

(2νA(xi)

νA(xi) + νB(xi)

)))(2.3)

which is (Vlachos & Sergiadis, 2007) measures of intuitionistic fuzzy sets. (Vla-chos & Sergiadis, 2007) also defined the symmetric version of measure (2.3)given by

DsymV S (A,B) = DV S(A,B) +DV S(B,A)

=n∑i=1

(µA(xi) ln

(2µA(xi)

µA(xi)+µB(xi)

)+

(νA(xi) ln

(2νA(xi)

νA(xi) + νB(xi)

))(2.4)

+ µB(xi) ln

(2µB(xi)

µA(xi) + µB(xi)

)+

(νB(xi) ln

(2νB(xi)

νA(xi) + νB(xi)

)))

Page 773: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A NEW INTUITIONISTIC FUZZY DIVERGENCE MEASURE AND ITS APPLICATIONS ... 759

DZY (A,B) =

n∑i=1

(µA(xi) + 1− νA(xi)

2

)ln

(2(µA(xi) + 1− νA(xi))

(µA(xi + 1− νA(xi)) + (µB(xi + 1− νB(xi))

)+

n∑i=1

(νA(xi) + 1− µA(xi)

2

)(2.5)

ln

(2(νA(xi) + 1− µA(xi))

(νA(xi) + 1− µA(xi)) + (νB(xi) + 1− µB(xi))

)which is (Zhang and Jiang, 2008) measures of intuitionistic fuzzy sets.

DWY (A,B) =n∑i=1

(µA(xi) ln

(2µA(xi)

µA(xi) + µB(xi)

)+

(νA(xi) ln

(2νA(xi)

νA(xi) + νB(xi)

))+ πA(xi) ln

(2πA(xi)

πA(xi) + πB(xi)

))(2.6)

which is (Wei & Yei, 2010; Hung, 2012) measures of intuitionistic fuzzy sets.The symmetric discrimination of measures (2.6) is given by

DsymWY (A,B) = DWY (A,B) +DWY (B,A)

=n∑i=1

(µA(xi) ln

(2µA(xi)

µA(xi)+µB(xi)

)+

(νA(xi) ln

(2νA(xi)

νA(xi)+νB(xi)

))+ µB(xi) ln

(2µB(xi)

µA(xi) + µB(xi)

)+

(νB(xi) ln

(2νB(xi)

νA(xi) + νB(xi)

)))(2.7)

+ πA(xi) ln

(2πA(xi)

πA(xi) + πB(xi)

)+

(πB(xi) ln

(2πB(xi)

πA(xi) + πB(xi)

)))

DJ(A,B) =

n∑i=1

(πA(xi) ln

(2πA(xi)

πA(xi) + πB(xi)

)+

(∆A(xi) ln

(2∆A(xi)

∆A(xi) + ∆B(xi)

)))(2.8)

which is (Junjun, Dengbao, & Cuicui, 2013) measures of intuitionistic fuzzy sets.where ∆A(xi) = |µA(xi − νA(xi))|, denotes that how close the membership andnon membership degrees are. The symmetric divergence measure of (2.8) aredefined as follows

(2.9) DsymJ (A,B) = DJ(A,B) +DJ(B,A).

The above listed measures have some drawbacks introduced by (Vlachos & Ser-giadis, 2007; Zhang & Jiang, 2008; Junjun, Dengbao, & Cuicui, 2013) and thusneeds a modification as defined in (Verma and Sharma, 2012). The presentcommunication is a step in this direction of removing these drawbacks. Such anew proposal has been investigated and introduced in the section 3.

Page 774: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

760 RAKESH KUMAR and OM PARKASH

3. A new intuitionistic fuzzy divergence measure

We now propose the intuitionistic fuzzy divergence measure of A against B asgiven by the following mathematical expression

D(A,B)

= − log2

[1

2

1+

1

n

n∑i=1

(√(µA(xi)+1−νA(xi)

2

)(µB(xi)+1−νB(xi)

2

)(3.1)

+

√(νA(xi) + 1− µA(xi)

2

)(νB(xi) + 1− µB(xi)

2

) )],

where the functions µA(x), µB(x)&νA(x), νB(x) denote the membership degreeand the non-membership degree respectively. The measure defined above over-comes all the drawbacks, i.e. it satisfies all the axioms defined in definition2.2. To prove the validity of proposed measure, we now study the followingproperties.

3.1 Properties of the proposed intuitionistic fuzzy divergencemeasure

Theorem 3.1. Let A,B,C ∈ IFS(X), then the proposed measure D(A,B)given by equation (3.1) satisfies the following properties are given as follows:

(a) D(A,B) = D(B,A) and 0 ≤ D(A,B) ≤ 1.

(b) D(A,B) = 0 if and only if A = B.

(c) D(A ∩B,B ∩ C) ≤ D(A,B) for every C ∈ IFS(X).

(d) D(A ∪B,B ∪ C) ≤ D(A,B) for every C ∈ IFS(X).

(e) D(A,B) = D(AC , BC).

(f) D(A,BC) = D(AC , B).

(g) D(A,A ∪B) = D(A ∩B,B) ≤ D(A,B) for A ⊆ B and B ⊆ A.

(h) D(A ∩B,A ∪B) = D(A,B).

Page 775: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A NEW INTUITIONISTIC FUZZY DIVERGENCE MEASURE AND ITS APPLICATIONS ... 761

Proof. From equation (3.1), it is understood that D(A,B) = D(B,A). Furtherfor all xi ∈ X, we have√(

µA(xi) + 1− νA(xi)

2

)(µB(xi) + 1− νB(xi)

2

)

≤µA(xi)+1−νA(xi)

2 + µB(xi)+1−νB(xi)2

2√(νA(xi) + 1− µA(xi)

2

)(νB(xi) + 1− µB(xi)

2

)

≤νA(xi)+1−µA(xi)

2 + νB(xi)+1−µB(xi)2

2

On adding the above two equations and take summations on both sides, we get

n∑i=1

(√(µA(xi) + 1− νA(xi)

2

)(µB(xi) + 1− νB(xi)

2

)

+

√(νA(xi) + 1− µA(xi)

2

)(νB(xi) + 1− µB(xi)

2

))

≤n∑i=1

µA(xi) + 1− νA(xi)

2+µB(xi) + 1− νB(xi)

22

+

νA(xi) + 1− µA(xi)

2+νB(xi) + 1− µB(xi)

22

⇒ 0 ≤ 1

n

n∑i=1

(√(µA(xi) + 1− νA(xi)

2

)(µB(xi) + 1− νB(xi)

2

)

+

√(νA(xi) + 1− µA(xi)

2

)(νB(xi) + 1− µB(xi)

2

))≤ 1

⇒ 1

2≤ 1

2

[1 +

1

n

n∑i=1

(√(µA(xi) + 1− νA(xi)

2

)(µB(xi) + 1− νB(xi)

2

)

+

√(νA(xi) + 1− µA(xi)

2

)(νB(xi) + 1− µB(xi)

2

))]≤ 1

⇒ 0 ≤ − log2

[1

2

(1 +

1

n

n∑i=1

(√(µA(xi) + 1− νA(xi)

2

)(µB(xi) + 1− νB(xi)

2

))

+

√(νA(xi) + 1− µA(xi)

2

)(νB(xi) + 1− µB(xi)

2

))]≤ 1

Page 776: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

762 RAKESH KUMAR and OM PARKASH

⇒ 0 ≤ D(A,B) ≤ 1.

(b) It is obvious that D(A,B) = 0 if and only if A = B.(c) We have[√

min

(µA(xi) + 1− νA(xi)

2,µC(xi) + 1− νC(xi)

2

)

√min

(µB(xi) + 1− νB(xi)

2,µC(xi) + 1− νC(xi)

2

)]2

(√µA(xi) + 1− νA(xi)

2−√µB(xi) + 1− νB(xi)

2

)2

min

(µA(xi) + 1− νA(xi)

2,µC(xi) + 1− νC(xi)

2

)+ min

(µB(xi) + 1− νB(xi)

2,µC(xi) + 1− νC(xi)

2

)

−2

√min

(µA(xi) + 1− νA(xi)

2,µC(xi) + 1− νC(xi)

2

)

×

√min

(µB(xi) + 1− νB(xi)

2,µC(xi) + 1− νC(xi)

2

)

(3.2)

µA(xi) + 1− νA(xi)

2

µB(xi) + 1− νB(xi)

2

−2

√µA(xi) + 1− νA(xi)

2

×√µB(xi) + 1− νB(xi)

2

.

Similarly, we have

max

(νA(xi) + 1− µA(xi)

2,νC(xi) + 1− µC(xi)

2

)+ max

(νB(xi) + 1− µB(xi)

2,νC(xi) + 1− µC(xi)

2

)

−2

√max

(νA(xi) + 1− µA(xi)

2,νC(xi) + 1− µC(xi)

2

)

×

√max

(νB(xi) + 1− µB(xi)

2,νC(xi) + 1− µC(xi)

2

)

Page 777: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A NEW INTUITIONISTIC FUZZY DIVERGENCE MEASURE AND ITS APPLICATIONS ... 763

νA(xi) + 1− µA(xi)

2

νB(xi) + 1− µB(xi)

2

−2

√νA(xi) + 1− µA(xi)

2

×√νB(xi) + 1− µB(xi)

2

(3.3)

Adding equations (3.2) and (3.3), yields D(A ∩B,B ∩ C) ≤ D(A,B).(d) The proof is on similar lines as in part (c).(e) Consider

D(A,B)

= − log2

[1

2

(1 +

1

n

n∑i=1

(√(µA(xi) + 1− νA(xi)

2

)(µB(xi) + 1− νB(xi)

2

)

+

√(νA(xi) + 1− µA(xi)

2

)(νB(xi) + 1− µB(xi)

2

)))]

= − log2

[1

2

(1 +

1

n

n∑i=1

(√(νA(xi) + 1− µA(xi)

2

)(νB(xi) + 1− µB(xi)

2

)

+

√(µA(xi) + 1− νA(xi)

2

)(µB(xi) + 1− νB(xi)

2

)))]= D(AC , BC).

(f) Consider

D(A,BC)

= − log2

[1

2

(1 +

1

n

n∑i=1

(√(µA(xi) + 1− νA(xi)

2

)(νB(xi) + 1− µB(xi)

2

)

+

√(νA(xi) + 1− µA(xi)

2

)(µB(xi) + 1− νB(xi)

2

)))]

= − log2

[1

2

(1 +

1

n

n∑i=1

(√(νA(xi) + 1− µA(xi)

2

)(νB(xi) + 1− µB(xi)

2

)

+

√(µA(xi) + 1− νA(xi)

2

)(µB(xi) + 1− νB(xi)

2

)))]= D(AC , B)

(g) Consider D(A,A ∪B)

= − log2

[1

2

(1 +

1

n

n∑i=1

(√(µA(xi) + 1− νA(xi)

2

)(µA∪B(xi) + 1− νA∪B(xi)

2

)

Page 778: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

764 RAKESH KUMAR and OM PARKASH

+

√(νA(xi) + 1− µA(xi)

2

)(νA∪B(xi) + 1− µA∪B(xi)

2

)))]

= − log2

[1

2

(1 +

1

n

n∑i=1

(√(µA(xi) + 1− νA(xi)

2

)min

(µA(xi) + 1− νA(xi)

2,µB(xi) + 1− νB(xi)

2

)(3.4)

+

√(νA(xi) + 1− µA(xi)

2

)min

(νA(xi) + 1− µA(xi)

2,νB(xi) + 1− µB(xi)

2

)))]Similarly,D(A,A ∪B)

= − log2

[1

2

(1 +

1

n

n∑i=1

(√min

(µA(xi) + 1− νA(xi)

2,µB(xi) + 1− νB(xi)

2

)(µB(xi) + 1− νB(xi)

2

)(3.5)

+

√min

(νA(xi) + 1− µA(xi)

2,νB(xi) + 1− µB(xi)

2

)(νB(xi) + 1− µB(xi)

2

)))]For A ⊆ B, (3.4) and (3.5) gives, D(A,A ∪B) = D(A ∩B,B) = D(A,B).

Again, for B ⊆ A, (3.4) and (3.5) gives, D(A,A ∪B) = D(A ∩B,B) = 0 ≤D(A,B).

(h) Proceeding on similar lines as above, we can prove the required result.Consider

D(A ∩B,A ∪B)

= − log2

[1

2

(1 +

1

n

n∑i=1

(√(µA∩B(xi) + 1− νA∩B(xi)

2

)(µA∪B(xi) + 1− νA∪B(xi)

2

)

+

√(νA∩B(xi) + 1− µA∩B(xi)

2

)(νA∪B(xi) + 1− µA∪B(xi)

2

)))]

= − log2

1

2

1 +1

n

n∑i=1

√√√√min

(µA(xi)+1−νA(xi)

2 ,µB(xi)+1−νB(xi)

2

)max

(µA(xi)+1−νA(xi)

2 ,µB(xi)+1−νB(xi)

2

)

+

√√√√min

(νA(xi)+1−µA(xi)

2 ,νB(xi)+1−µB(xi)

2

)max

(νA(xi)+1−µA(xi)

2 ,νB(xi)+1−µB(xi)

2

)= − log2

[1

2

(1 +

1

n

n∑i=1

(√(µA(xi) + 1− νA(xi)

2

)(µB(xi) + 1− νB(xi)

2

)

+

√(νA(xi) + 1− µA(xi)

2

)(νA(xi) + 1− µA(xi)

2,νB(xi) + 1− µB(xi)

2

)))]= D(A,B)

Page 779: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A NEW INTUITIONISTIC FUZZY DIVERGENCE MEASURE AND ITS APPLICATIONS ... 765

Hence the result.

With the study of above properties, we claim that the intuitionistic fuzzydivergence measure proposed in (3.1) is an appropriate measure of divergence.In the next section, we provide the application of the proposed measure to faultdiagnosis.

4. Applications of the intuitionistic fuzzy divergence measure tofault-diagnosis of turbine

To apply the proposed model to measure the fault diagnose in steam turbine,we need the following algorithm.

4.1 Fault-diagnosis algorithm

Assume that there exist m fault patterns (knowledge of fault samples), whichare represented by IFS Fi(i = 1, 2, ...,m), and there is a testing sample to berecognized which is represented by a IFS Ft. Then diagnosis result Fk should benearest one to Ft that is

D(Ft, Fk) = Min1≤i≤mD(Ft, Fi).

where D(Ft, Fi) expresses the discrimination degree of the IFS Ft from Fi.The value of D(Ft, Fi) is calculated by using equation (3.1). Then, we de-cide that testing sample Ft should belong to the fault pattern Fk, where k =Min1≤i≤mD(Ft, Fi).

The proposed divergence measure of IFSs can realize the classification andidentification of the fault by comparing the intuitionistic fuzzy divergence valuesbetween a diagnosing sample and the knowledge of system faults. The minimumvalue of the intuitionistic fuzzy divergence will detect and confirm the type ofthe fault. The fault-diagnosis process using the intuitionistic fuzzy divergencemeasure is shown in Fig.-1. The following numerical verification will prove theauthenticity of the algorithm mentioned above.

Numerical verification

During our investigation, we have taken the ten kinds of familiar fault types inrotating machines, such as unbalance, offset center, and oil-membrane oscilla-tion, are used as the knowledge of fault samples. The vibration frequency of theturbine is divided into nine different frequency ranges representing the failurepatterns known as IFSs as shown in Table-1. (Ye, Qiao, & Wei, 2005). Next,we have established the knowledge database of fault types and then calculatedthe intuitionistic fuzzy cross entropy between a fault-testing sample and faultknowledge samples. Ten fault knowledge samples in table-1 are expressed byIFSs:F1 = [0.00, 0.00]/x1 + [0.00, 0.00]/x2 + [0.00, 0.00]/x3 + [0.00, 0.00]/x4

Page 780: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

766 RAKESH KUMAR and OM PARKASH

Figure 1: Block diagram of fault diagnosis using the intuitionistic fuzzy cross-entropy

+[0.85, 1.00]/x5+[0.04, 0.06]/x6+[0.04, 0.07]/x7+[0.00, 0.00]/x8+[0.00, 0.00]/x9F2 = [0.00, 0.00]/x1 + [0.28, 0.31]/x2 + [0.09, 0.12]/x3 + [0.55, 0.70]/x4+[0.00, 0.00]/x5+[0.00, 0.00]/x6+[0.00, 0.00]/x7+[0.00, 0.00]/x8+[0.08, 0.13]/x9F3 = [0.00, 0.00]/x1 + [0.00, 0.00]/x2 + [0.00, 0.00]/x3 + [0.00, 0.00]/x4+[0.30, 0.58]/x5+[0.40, 0.62]/x6+[0.08, 0.13]/x7+[0.00, 0.00]/x8+[0.00, 0.00]/x9F4 = [0.09, 0.11]/x1 + [0.78, 0.82]/x2 + [0.00, 0.00]/x3 + [0.08, 0.11]/x4+[0.00, 0.00]/x5+[0.00, 0.00]/x6+[0.00, 0.00]/x7+[0.00, 0.00]/x8+[0.00, 0.00]/x9F5 = [0.09, 0.12]/x1 + [0.09, 0.11]/x2 + [0.08, 0.12]/x3 + [0.09, 0.12]/x4+[0.18, 0.21]/x5+[0.08, 0.13]/x6+[0.08, 0.13]/x7+[0.08, 0.12]/x8+[0.08, 0.12]/x9F6 = [0.00, 0.00]/x1 + [0.00, 0.00]/x2 + [0.00, 0.00]/x3 + [0.00, 0.00]/x4+[0.18, 0.22]/x5+[0.12, 0.17]/x6+[0.37, 0.45]/x7+[0.00, 0.00]/x8+[0.22, 0.28]/x9F7 = [0.00, 0.00]/x1 + [0.00, 0.00]/x2 + [0.08, 0.12]/x3 + [0.86, 0.93]/x4+[0.00, 0.00]/x5+[0.00, 0.00]/x6+[0.00, 0.00]/x7+[0.00, 0.00]/x8+[0.00, 0.00]/x9F8 = [0.00, 0.00]/x1 + [0.27, 0.32]/x2 + [0.08, 0.12]/x3 + [0.54, 0.62]/x4+[0.00, 0.00]/x5+[0.00, 0.00]/x6+[0.00, 0.00]/x7+[0.00, 0.00]/x8+[0.00, 0.00]/x9F9 = [0.85, 0.93]/x1 + [0.00, 0.00]/x2 + [0.00, 0.00]/x3 + [0.00, 0.00]/x4+[0.85, 1.00]/x5+[0.04, 0.06]/x6+[0.04, 0.07]/x7+[0.08, 0.12]/x8+[0.00, 0.00]/x9F10 = [0.00, 0.00]/x1 + [0.00, 0.00]/x2 + [0.00, 0.00]/x3 + [0.00, 0.00]/x4+[0.85, 1.00]/x5+[0.77, 0.83]/x6+[0.19, 0.23]/x7+[0.00, 0.00]/x8+[0.00, 0.00]/x9

Suppose that the IFSs of fault-testing samples are as follows:Ft1 = [0.00, 0.00]/x1 + [0.00, 0.00]/x2 + [0.10, 0.10]/x3 + [0.90, 0.90]/x4+[0.00, 0.00]/x5+[0.77, 0.83]/x6+[0.21, 0.35]/x7+[0.00, 0.00]/x8+[0.00, 0.00]/x9

Page 781: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A NEW INTUITIONISTIC FUZZY DIVERGENCE MEASURE AND ITS APPLICATIONS ... 767

Ft2 = [0.39, 0.39]/x1 + [0.07, 0.07]/x2 + [0.10, 0.10]/x3 + [0.06, 0.06]/x4+[0.00, 0.00]/x5+[0.13, 0.13]/x6+[0.00, 0.00]/x7+[0.00, 0.00]/x8+[0.35, 0.35]/x9The cross-entropy values of vague sets are calculated by use of equation (3.1) asfollows:D(Ft1, F1) = 0.003200, D(Ft1, F2) = 0.082967, D(Ft1, F3) = 0.001733, D(Ft1, F4)= 0.000288, D(Ft1, F5) = 0.000205, D(Ft1, F6) = 0.000117, D(Ft1, F7) = 0.000279,D(Ft1, F8) = 0.000328, D(Ft1, F9) = 0.000548, D(Ft1, F10) = 0.082573;D(Ft2, F1) = 0.003081, D(Ft2, F2) = 0.082835, D(Ft2, F3) = 0.001582, D(Ft2, F4)= 0.000048, D(Ft2, F5) = 0.000132, D(Ft2, F6) = 0.000155, D(Ft2, F7) = 0.00018,D(Ft2, F8) = 0.000131, D(Ft2, F9) = 0.000102, D(Ft2, F10) = 0.000082.

Diagnosis result 1: The fault-diagnosis result is as follows:F6 → F3 → F5 → F7 → F4 → F8 → F9 → F1 → F10 → F2.

From the above diagnosis order, we observe the sequence of vibration fault ofturbine. This sequence has discovered that firstly antithrust bearing is damage,next offset center, and then oil membrane oscillation, and so on, which resultsin the vibration of turbine.

Diagnosis result 2: The fault-diagnosis result is as follows:F4 → F10 → F9 → F8 → F5 → F6 → F7 → F3 → F1 → F2.

From the above sequence our observations proves that the fault causing thevibration of turbine has been resulted firstly from radial impact friction of rotor,next non uniform bearing stiffness, and then looseness of bearing block, and soon.

From the above diagnostic scheme, we claim that the proposed diagnosismethod is effective and provides reasonable information in detecting a faultduring vibration of turbine.

Conclusions

In this paper, we have proposed a new intuitionistic fuzzy divergence measureand proved some elegant properties of the intuitionistic fuzzy divergence measurein detail. Furthermore, based on the proposed divergence measure for IFSs, analgorithm to deal with fault diagnosis of turbine under fuzzy environments isdescribed. On the basis of diagnosis results for the turbine, the proposed methodcannot only diagnose the main fault of the turbine; it can also detect usefulinformation for multi-fault analysis. Finally, a numerical example is providedto illustrate the fault diagnosis of turbine and proves the authenticity of ourmodel providing useful information in detecting the fault under consideration.This work can be extended to Interval valued intuitionistic fuzzy divergencemeasures.

Page 782: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

768 RAKESH KUMAR and OM PARKASH

Fault Frequency range (f: operating frequency)samples

0.01-0.39f 0.40-0.49f 0.50f 0.51-0.99f f 2f 3-5f Odd times High freqof f > 5f

Pneumatic (0.00, (0.28, (0.09, (0.55, (0.00, (0.00, (0.00, (0.00, (0.08,force 0.00) 0.31) 0.12) 0.70) 0.00) 0.00) 0.00) 0.00) 0.13)couple

Unbalance (0.00, (0.00, (0.00, (0.00, (0.85, (0.04, (0.04, (0.00, (0.00,0.00) 0.00) 0.00) 0.00) 1.00) 0.06) 0.07) 0.00) 0.00)

Offset (0.00, (0.00, (0.00, (0.00, (0.30, (0.40, (0.08, (0.00, (0.00,center 0.00) 0.00) 0.00) 0.00) 0.58) 0.62) 0.13) 0.00) 0.00)

Radial (0.09, (0.09, (0.08, (0.09, (0.18, (0.08, (0.08, (0.08, (0.08,impact 0.12) 0.11) 0.12) 0.12) 0.21) 0.13) 0.13) 0.12) 0.12)frictionof rotor

Oil- (0.09, (0.78, (0.00, (0.08, (0.00, (0.00, (0.00, (0.00, (0.00,membrane 0.11) 0.82) 0.00) 0.11) 0.00) 0.00) 0.00) 0.00) 0.00)oscillation

Damage (0.00, (0.00, (0.08, (0.86, (0.00, (0.00, (0.00, (0.00, (0.00,of 0.00) 0.00) 0.12) 0.93) 0.00) 0.00) 0.00) 0.00) 0.00)antithrustbearing

Symbiosis (0.00, (0.00, (0.00, (0.00, (0.18, (0.12, (0.37, (0.00, (0.22,looseness 0.00) 0.00) 0.00) 0.00) 0.22) 0.17) 0.45) 0.00) 0.28)

Surge (0.00, (0.27, (0.08, (0.54, (0.00, (0.00, (0.00, (0.00, (0.00,0.00) 0.32) 0.12) 0.62) 0.00) 0.00) 0.00) 0.00) 0.00)

Looseness (0.85, (0.00, (0.00, (0.00, (0.00, (0.00, (0.00, (0.08, (0.00,of bearing 0.93) 0.00) 0.00) 0.00) 0.00) 0.00) 0.00) 0.12) 0.00)block

Non- (0.00, (0.00, (0.00, (0.00, (0.00, (0.77, (0.19, (0.00, (0.00,uniform 0.00) 0.00) 0.00) 0.00) 0.00) 0.83) 0.23) 0.00) 0.00)bearingstiffness

Page 783: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A NEW INTUITIONISTIC FUZZY DIVERGENCE MEASURE AND ITS APPLICATIONS ... 769

Acknowledgement

The authors are thankful to University Grants Commission (UGC), New Delhifor providing the financial assistance for the preparation of the manuscript.

References

[1] K.T. Atanassov, Intuitionistic fuzzy sets, Fuzzy Sets and Systems, 20(1986), 87-96.

[2] D. Bhandari, N.R. Pal, Some new information measure for fuzzy sets, In-formation Science, 67 (1993), 209-228.

[3] A. Dey, A. Pal, Prim’s algorithm for solving minimum spanning tree prob-lem in fuzzy environment, Annals of Fuzzy Mathematics and Informatics,12 (2016), 419-430.

[4] A. Dey, A. Pal, T. Pal, Interval type 2 fuzzy set in fuzzy shortest pathproblem, Mathematics, 4 (2016), 62.

[5] A. Dey, R. Pradhan, A. Pal, T. Pal, The fuzzy robust graph coloring prob-lem. In Proceedings of the 3rd International Conference on Frontiers ofIntelligent Computing: Theory and Applications (FICTA), pp. 805-813,Springer, 2015.

[6] W. Fei, D.F. Li, Bilinear programming approach to solve interval bimatrixgames in tourism planning management, International Journal of FuzzySystems, 18 (2016), 504-510.

[7] Y. He, Z. He, Extensions of Atanassov’s intuitionistic fuzzy interactionBonferroni means and Their Application to Multiple attribute decision mak-ing, IEEE Transactions on Fuzzy Systems, 24 (2016), 558-573.

[8] Y. He, Z. He, H. Chen, Intuitionistic Fuzzy Interaction Bonferroni Meansand Its Application to Multiple Attribute Decision Making, IEEE Transac-tions on Cybernetics, 45 (2015), 116-128.

[9] Y. He, Z. He, D.H. Lee, K.J. Kim, L. Zhang, X. Yang, Robust Fuzzy Pro-gramming Method for MRO Problems Considering Location Effect, Disper-sion Effect and Model Uncertainty, Computers Industrial Engineering, 105(2017), 76-83.

[10] Y. He, Z. He, G. Wang, H. Chen, Hesitant Fuzzy Power Bonferroni Meansand their Application to Multiple Attribute Decision Making, IEEE Trans-actions on Fuzzy Systems, 23 (2015), 1655-1668.

[11] K.C. Hung, Medical pattern recognition: applying an improved intuition-istic fuzzy cross-entropy approach, Advances in fuzzy systems, Article ID,863549, 2012.

Page 784: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

770 RAKESH KUMAR and OM PARKASH

[12] M. Junjun, Y. Dengbao, W. Cuicui, A novel cross-entropy and entropy mea-sures of IFSs and their applications, Knowledge-Based Systems, 48 (2013),37-45.

[13] S. Kullback, R.A. Leibler, On information and sufficiency, The AnnalsMathematical Statistics, 22 (1951), 79-86.

[14] A. Kyriazis, K. Mathioudakis, Gas turbine fault diagnosis using fuzzy-baseddecision fusion, J. Propulsion Power, 25 (2009), 335-343.

[15] D.F. Li, Decision and Game Theory in Management with IntuitionisticFuzzy Sets, Germany: Springer, Heidelberg, 2014.

[16] D.F. Li, Linear Programming Models and Methods of Matrix Games withPayoffs of Triangular Fuzzy Numbers, Berlin, Springer, Heidelberg, 2016.

[17] D.F. Li, J.C. Liu, A parameterized non-linear programming approach tosolve matrix games with payoffs of I-fuzzy numbers, IEEE Transactions onFuzzy Systems, 23 (2015), 885-896.

[18] D.F. Li, H.P. Ren, Multi-attribute decision making method considering theamount and reliability of intuitionistic fuzzy information, Journal of Intel-ligent Fuzzy Systems, 28 (2015), 1877-1883.

[19] I. Montes, N.R. Pal, V. Janis, S. Montes, Divergence measures for intuition-istic fuzzy sets, IEEE Transactions on Fuzzy Systems, 23 (2015), 444-456.

[20] O. Parkash, R. Kumar, New parametric and non - parametric measuresof cross entropy, Canadian Journal of Pure Applied Sciences, 10 (2016),3921-3925.

[21] O. Parkash, P.K. Sharma, Some new measures of fuzzy directed divergenceand their generalization, Journal of the Korean Society of MathematicalEducation Series B 12 (2005), 307-315.

[22] K. Salahshoor, M.S. Khoshro, M. Kordestani, Fault detection and diagnosisof an industrial steam turbine using a distributive configuration of adaptiveneuro-fuzzy inference systems, Simulation Modell. Pract. Theory, 19 (2011),1280-1293.

[23] R. Verma Sharma, B.D. Sharma, On generalized intuitionistic fuzzy di-vergence (relative information) and their properties, Journal of UncertainSystems, 6 (2012), 308-320.

[24] K. Vlachos, G.D. Sergiadis, Intuitionistic fuzzy information-applications topattern recognition, Pattern Recognition Letters, 28 (2007), 197-206.

Page 785: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

A NEW INTUITIONISTIC FUZZY DIVERGENCE MEASURE AND ITS APPLICATIONS ... 771

[25] P. Wei, J. Ye, Improved intuitionistic fuzzy cross-entropy and its applicationto pattern recognition, International Conference on Intelligent Systems andKnowledge Engineering, 114-116, 2010.

[26] W. Yang, K.Y. Lee, S.T. Junker, H. Ghezel-Ayagh, Fuzzy fault diagno-sis and accommodation system for hybrid fuel-cell/gas-turbine power plant,IEEE Trans. Energy Convers., 25 (2010), 1187-1194.

[27] J. Ye, X.L. Qiao, H.L. Wei, Fault diagnosis of turbine on similarity measuresbetween vague sets, In Proceedings of the Asia pacific symposium on safety(Part B, pp. 1358-1362), Shaoxing, Zhejiang, China, 2005.

[28] J. Ye, Fault diagnosis of turbine based on fuzzy cross entropy of vague sets,Expert Systems with Applications, 36 (2009), 8103-8106.

[29] L.A. Zadeh, Fuzzy sets, Information and Control, 8 (1965), 338-353.

[30] Q.S. Zhang, S.Y. Jiang, A note on information entropy measures for vaguesets and its applications, Information Sciences, 178 (2008), 4184-4191.

[31] X. Zhao, Y. Liu, X. He, Fault diagnosis of gas turbine based on fuzzy matrixand the principle of maximum membership degree, Energy Proc., 16 (2012),1448-1454.

Accepted: 1.07.2018

Page 786: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS – N. 40–2018 (772–789) 772

FUZZY PROTECTION METHOD FOR FLOOD ATTACKSIN SOFTWARE DEFINED NETWORKING (SDN)

Mohammad Hadi Zahedi∗

Department of Computer EngineeringK.N. Toosi University of TechnologyTehranIranmhadi [email protected]

Abbas Ali RezaeeDepartment of Computer EngineeringPayame-Noor UniversityTehranIran

Zeinab DehghanDepartment of Computer Engineering

Payame-Noor University

Tehran

Iran

Abstract. Flood attacks (FA) are a type of distributed denial of service (DDoS)attacks. In FA, an attacker sends massive floods of packets to consume all resources.Hierarchical architecture and numerous weaknesses in the structure of communicationprotocols in conventional networks lead to the fact that firewalls are incapable to pro-vide an integrated and effective mechanism against these attacks. With the emergenceof Software Defined Networking (SDN), there are new prospects for solving structuraland security problems in conventional networks. This study investigates some ideas forprotecting against distributed FA using SDN. Later, by analyzing the strengths andweaknesses of these ideas, a heterogeneous method is proposed based on a combinationof conventional service provider and the Software Defined controller. In the proposedmethod, the attack detection and the fuzzy decision modules are located in the serviceprovider and the controller (i.e. SDN), respectively. In order to simulate the heteroge-neous method the MiniNet emulator is applied in combination with the Pox controller.Afterwards, the simulated model is evaluated. Results show that besides protectingagainst attacks in conventional networks, the proposed method provides other benefitsincluding the extent of computational load and the response time in comparision toother Software Defined methods.

Keywords: fuzzy system, software defined networks, DDoS attacks, flood attacks,OpenFlow.

∗. Corresponding author

Page 787: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

Fuzzy Protection method for Flood Attacks in Software Defined Networking (SDN) 773

1. Introduction

One of the most important measures of information security is the accessibilityof resources, which means that we have to make sure of the correct functioning ofinformation processing devices and the communication channels. In other words,authorized people should have access to resources whenever needed. Denials ofservice (DoS) attacks are amongst the threats which seriously challenge accessto information. Using these attacks, attackers try to hog a major portion ofthe accessible resources in order to interrupt service [1-2]. FA is amongst themost dangerous denial of service attacks, which bombards the network due toweaknesses in communication protocols. For instance, SynFlood attacks whichoccur in transfer plane account for more than 90 percent of DoS attacks [3].The hierarchical structure, weakness in communication protocols, and the lackof a centralized command center in current networks causes serious challengesto protect against these attacks [4, 5].

Transfer control protocol (stocktickerTCP) weakneses lead to challengeslisted above. One is the weakness of three-stage handshaking operation. Thisproblem is due to the lack of authentication for the communication initiator bythe service provider. Under normal conditions, after receiving the SYN packet,the service provider allocates some memory to follow the communication ses-sion and waits for the communication to start. Utilizing this weakness, attackersstart sending floods of invalid packets with the sign SYN=1 and fill up the ser-vice provider’s memory with invalid requests. When the memory is clogged,the service provider has to abandon new requests [6] and so it cannot provideanymore service.

User datagram protocol (UDP) also has its own probems. This protocolstarts a communication without connection, which means that the connectionis a one-way communication in one direction from source to destination withoutconsidering the status of the receiver [7]. In UDP attacks, packets are sent fromrandom ports to the victim machine to saturate the bandwidth of the targetmachine and prevent service provisioning for the users. In this state Firewallsare not able to alleviate these attacks [8].

With the emergence of Software Defined networks (SDN’s), new prospectsfor solving the structural problems of conventional networks have appeared [9].In this paper, a novel method is proposed based on the cooperation between theservice provider and the SDN controller for protecting against flood attacks inconventional networks.

The rest of this paper is organized as follows: Section 2 provides a back-ground to better understand the concepts of the study. Section 3 investigatesthe related works and research. Section 4 introduces the proposed heteroge-neous defense method and Section 5 evaluates the performance of the proposedmethod. Section 6 discusses the conclusion.

Page 788: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

774 MOHAMMAD HADI ZAHEDI, ABBAS ALI REZAEE and ZEINAB DEHGHAN

2. Software Defined Networks (SDN): state of the art

Defense against FA attacks has been studied for several decades. Some stud-ies [10, 11] have investigated a number of methods for protecting against theseattacks. They use firewalls or attack filtering devices. Based on previous stud-ies, firewalls and attack filtering devices do not provide effective approaches toprotect against attacks where weaknesses in protocols are the basis for attack[12]. Because of management complexities and weakness in communication pro-tocols, the architecture of conventional networks cannot provide effective andintegrated approaches for protecting against FA.

In the architecture of SDN, data and the control section have been separated.The architecture of the horizontal network is more intelligent and controllable.One of the big ideas in SDN’s is the fact that a device, called a controller, isdirectly linked to all the devices in a domain; it is aware of the network architec-ture and it plans the network from a central point. An SDN controller changesthe planning model of the network from distributed mode to the centralizedmode [13]. The centralized planning of the network is a valuable characteristicwhich can be used for different types of security policy. Using SDN’s, there isno need for technical managers to control and manage all the devices on thenetwork through terminals. The controller acts as a middleware which separatecomponents of the network’s physical layer, such as routers, switches, firewall,and load balancer from the software layer. In fact, the controller monitors thenetwork from a central point using both information obtained and flexible in-struction. In Fig. 1, the structure of SDN’s is illustrated. It consists of threemajor components including the controller, virtual switches, and overlappingnetworks. Moreover, SDN’s are based on the OpenFlow protocol [14].

Figure 1: Structure of a SDN [14]

Page 789: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

Fuzzy Protection method for Flood Attacks in Software Defined Networking (SDN) 775

2.1 OpenFlow protocol

OpenFlow protocol is the first standard communication interface which is de-fined between the control and the data transfer [3]. Using this protocol, high-level programming languages can be used for creating low-level instructions andtransferring them to routers and switches. As shown in Fig. 2, this protocol willfirst define the central controller. Then, with a secure connection to the con-troller, it enables the control of the network. In SDN’s, the central controllermaintains all the network rules and issues instruction through the OpenFlowprotocol as needed [15].

Figure 2: Schematic Representation of OpenFlow Protocol [16]

One of the issues in OpenFlow protocol is the flow-based nature of the ex-change policies. A flow table is a list of all the flow entries which includesmatching fields, counter, and instruction. After being received, the arrivingpackets are compared to the matching fields and if there is a match, the packetwill enter the exchange process. Otherwise, it is referred to the controller, whichdecides what will happen. Nowadays, in large-scale datacenters there is a hugeinterest in OpenFlow. Huge companies design switches based on this protocoland many of them support this protocol. Google has used this protocol in itsdatacenters [17].

3. Related works

In the literature, there are various methods that protect against distributeddenial of service (DDoS) attacks [18-19]. There are some studies regardingthe methods to protect against DDoS attacks using SDN [20-21]. In [20] therandom hopping plan of the service provider using OpenFlow in SDN’s has beenproposed. In this plan, using static IPs for service providers in the network hasbeen proposed as a challenge and it is argued that using active static IPs in adomain or network, will lead to multiple scanning and denial of service attacks.

Page 790: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

776 MOHAMMAD HADI ZAHEDI, ABBAS ALI REZAEE and ZEINAB DEHGHAN

In order to resolve these issues, the authors proposed a method where real IPsare replaced with virtual IPs and the domain name is retrievable through thesystem while the real IPs are only visible to authorized individuals. This methodprevents the identification of active sources on the network. In [21], a strategy ispresented for security in the controller core in order to detect the security issuesof flows in switches. This strategy is called FortNox and it has been developedbased on Nox controller [5]. In this method, the security core is added tothe controller, which controls the passing flows and monitors the conflicts andproblems in flows. In this method, digital signature is used for authenticatingprograms. It has a 7-second overhead for checking the flows against the Noxcontroller.

In [22], a method is introduced for validating the source address based onNox controller. In this method, each packet located outside the network thatintends to enter the network is directed towards this controller. The processof validating the source of the packet is carried out by the controller. If thesource is reliable, it permits the traffic to move along. Otherwise, the packetis stopped. This method can prevent IP spoofing operations in FA. In [23], amethod based on Nox controller is suggested for detecting DDoS attacks. In thismethod, an algorithm is proposed for detecting attacks. It uses unsupervisedneural networks and the characteristics of arriving traffic to detect DoS attacks.In this work, there is no clear discussion on attacks responds method.

In [12], the method of protecting webservers from SynFlood attacks basedon Pox controller is presented. In this method, a controller called OPERETTAis introduced which validates each Syn packet and after validation, it permitsthe connection. In this technique, two scenarios for responding to FA has beendiscussed which include a central and a local scenario. In [24], a method forprotecting against distributed traffic attacks in cloud environments based onthe Floodlight controller is introduced. This controller consists of two modulesof detection and defense. The detection module identifies attacks in the cloudand informs the defense module. Therfore the necessary measures are taken.This method is the first method proposed for protecting against attacks in cloudenvironment using SDN’s.

In studies [12 , 23,24], detection and defense module is located centrally inthe controller. One of the main problems with these methods is the increasedload exerted on the controller during the FA. When the attacks start, a hugenumber of packets with spoofed sources flood the service provider. The con-troller must analyze all the packets and take necessary measures. In such cases,an additional computational load is exerted on the controller and it is possi-ble that due to this extra load, the controller fails to manage and control thenetwork requests [25]. The second problem with the above-mentioned meth-ods occurs during the transfer of normal flows of the network to the controller.Authenticating the packets by the controller can create a delay in respondingto authorized flows. Since the majority theories of SDN’s are flow-based, the

Page 791: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

Fuzzy Protection method for Flood Attacks in Software Defined Networking (SDN) 777

additional delay in setting up an authorized flow is one of the main concerns .InTable 1; various methods proposed by collegues are summarized.

Method ProposedYear

Controller Establishment

SOM 2010 NOX Centralized controller

FortNox 2012 NOX Centralized controller

DaMask 2015 Floodlight Centralized controller

OPERETTA 2015 POX Centralized controllerTable 1. Published methods

4. Proposed method

The proposed method is a heterogeneous defense method based on the coopera-tion of conventional network service provider and the Software Defined controllerto protect against FA. In the presented method, the detection and defense com-ponents are separated in order to decrease the computational load and preventdelay in authorized flows sent to the controller. The detection and defense mod-ules with numerous analyses are seperated. During these analyses, it is noticedthat attack detection in the targeted service provider which are more accurateand presents less false-positives [26]. In Fig. 3, the structure of the proposedheterogeneous method is demonstrated.

Figure 3: The structure of the proposed heterogeneous method

In heterogeneous method, the attack detection module is located in serviceprovider and the decision module is located in the controller. It applied fuzzymethods to make decisions [27].

In the introduced method, Open vSwitch is used in order to integrate andconnect the conventional service provider to the Software Defined controller.Open vSwitch is an open source software switch, licensed under Apache License2.0. Besides supporting SFlow and NetFlow protocols, it also supports everyversion of OpenFlow protocol (1.0 to 1.5) [28]. In Fig. 4, the proposed algorithm

Page 792: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

778 MOHAMMAD HADI ZAHEDI, ABBAS ALI REZAEE and ZEINAB DEHGHAN

is shown in three phases. The closed-movement phase in the proposed methodincludes the following phases: 1- Connection request, 2- Event analysis andreport, 3. Decision and response.

Figure 4: The architecture of proposed system

4.1 Connection request phase

In this phase, the packet enters the OpenFlow switch. Then, the switch checksthe flow tables. If the arriving packet is present in the flow tables, the permissionfor the flow to move towards the destination is issued. Otherwise (if arrivingpacket belongs to a new flow), it is sent to the controller so that the necessaryactions can be determined Fig. 5.

Figure 5: An Example of a Packet Sent to the Controller

Once the packet reaches the controller, preliminary investigations such asidentifying the destination address and type of protocol are carried out. In casethe packet is determined to be based on the current rules of the network, the

Page 793: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

Fuzzy Protection method for Flood Attacks in Software Defined Networking (SDN) 779

controller creates a temporary flow table and permits some packets to continuetowards the service provider Fig. 6.

Figure 6: The Preliminary Analysis of the Packet and the Permission for Mul-tiple Packets in the Flow

4.2 Event analysis and report phase

In this phase, packets are forwarded towards the service provider based on thetemporary flow tables. Once the packets enter, the attack detection modulestarts there analysis. Different methods have been proposed for detecting DDoSattacks. Pprevious studies have shown that anomaly-based methods providebetter performance compared to signature-based methods in order to detect at-tacks [24]. On the other hand, in anomaly based detecting methods, the presenceof a few packets is enough for detecting attacks, while in signature-based meth-ods all the packets related to that flow are required [24]. Therefore, consideringthe benefits of the anomaly-based method and the current limitations (the lownumber of packets arriving at the detection module) this detection technique isa suitable approach to be used in the heterogeneous method. The parametersin [29], such as packet type entropy, packet rate, and the number of packets forattack detection are applied.

4.3 Decision phase

After receiving the event report by the controller, the decision module comesonline and updates the event report file to send the necessary decision to thedefense component. The decision determines the type of response to the attackand can be carried out by the fuzzy controller. Under this condition the param-eters of trust in the service provider and the sensitivity of the provided service

Page 794: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

780 MOHAMMAD HADI ZAHEDI, ABBAS ALI REZAEE and ZEINAB DEHGHAN

are considred. This phase makes a decision firstly and then responses to theattack subsequently.

4.3.1 Decision making step

Considering the fact that the parameters of trust and sensitivity can be rep-resented in a fuzzy manner, these two parameters are used for fuzzy decisionmaking and reporting the extent of the damage.

• The parameter of trust in the service provider

As shown in Fig. 4, after detecting the attack by the service provider,the event report is sent to the controller where it will be placed in the attackevent file. By reading this file, the number of attacks on a service provider iscalculated. Whenever an attack occurs on the service provider, it will be addedto the event log file and the controller’s trust score for the service provider islowered. The trust score can be expressed using lingual variables including high,medium, and low trust.

• The parameter of the service sensitivity

The parameter for the service sensitivity can vary from a network to another.This parameter should be given to the controller by the network administrator.For instance, an attack on the web service provider, email service provider, orspecial ports such as 53, 80, and 443 will be more sensitive than non-reservedports. The service sensitivity score can also be expressed using lingual variablesincluding high, medium, and low sensitivity.

In the decision making step, using the different values of trust and sensitivity,the damage can be calculated and reported to the defense component. Theinflicted damage can invoke different responses to the attack. For example,if the damage estimation is high, in response, the controller must choose amethod which not only alleviates the attack but also does not lead to falsepositives in the network. In order to simulate the proposed fuzzy model, thefuzzy environment of the MATLAB emulator, triangular membership function,and center of gravity defuzzification are used. Using trust inputs, sensitivity,and “if. . . then” rules entered into the fuzzy system, the fuzzy inference system(FIS) is constructed. The set of utilized rules can be seen in Fig. 7.

The output of the fuzzy inference system can be turned into FCL languageby MATLAB and using frameworks such as PyFuzzy, it can be implementedinto Python and integrated into the controller. Fig. 8 shows the fuzzy decisionbehavior model.

4.3.2 Response to attack step

After detection of the damage, decisions will be sent to the response to attackcomponent. A simple method is to prevent the construction of flow tables in the

Page 795: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

Fuzzy Protection method for Flood Attacks in Software Defined Networking (SDN) 781

Figure 7: Fuzzy rules

Figure 8: Fuzzy decision behavior model

attack source. In other words, after receiving the report, the Packet-In eventrelated to the attack packets must be halted and the formation of flow tables forsimilar packets is prevented. Fig. 9 shows the code fragment related to haltingthe attack event. After the event report in this code fragment, controller’sinstruction is sent to the switch connected to the attacker and the flow passingthrough is halted.

5. Performance evaluation of the proposed algorithm

The proposed method is analyzed and evaluated in the MiniNet simulator whichis one of the most popular Software Defined simulators by applying POX con-troller [11, 20, 27] on a Linux OS. MiniNet uses architecture of several virtualhosts that can construct virtual links, which can be connected to OpenvSwitch.In the MiniNet environment, every virtual host has a separate OS kernel andeach is able to run its programs and commands independently.

Page 796: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

782 MOHAMMAD HADI ZAHEDI, ABBAS ALI REZAEE and ZEINAB DEHGHAN

Figure 9: Halting the Attack Flow

In order to set up the Mininet emulator, Ubuntu 12.10 32bit OS with QuadProcessor Q6600 CPU using 4 GB of memory is used. For running the Poxcontroller a laptop computer with an Intel 2Core i684-1.4 GHz CPU is used. Inorder to simulate the FA, Hping3 application is used. This tool is one of themost powerful programs for sending customized packets towards a determineddestination. This tool is generally used for penetration tests. Hping3 providesthe possibility to send a flood of packets by spoofing the source’s IP towardsthe destination. In order to analyze and measure the rate of in-transit packets,WireShark tool is used. For measuring the processes which consumed resourcesthe HTop tool [30] is used. Also for creating legitimate requests for receivinginformation iPerf [31] is utilized.

The network architecture consists of a number of Linux systems, which areconnected to seven OpenFlow switches. In this architecture, a web server andthe users are working. Also, there are a number of infected systems which tryto attack and interrupt the normal flow of services in the network as shown inFig. 10.

Since the heterogeneous defense method is a technique based on the coop-eration of a service provider in conventional networks and a Software Definedcontroller, it should be able to not only pass the attacks in conventional networksbut also provide a number of benefits over the Software Defined centralized de-fense method. Therefore, in order to evaluate the efficiency of the heterogeneousdefense method, two comparisons are made. In the first comparison in Section5.1, the superiority of the heterogeneous defense method over traditional meth-ods is evaluated. Then, in Section 5.2, the heterogeneous defense method withdefense methods concentrated in the controller is compared.

Page 797: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

Fuzzy Protection method for Flood Attacks in Software Defined Networking (SDN) 783

Figure 10: Network Architecture and Controller for Evaluating the Heteroge-neous Defense Method

5.1 Comparing the proposed method with traditional methods

In this section, comparison of the heterogeneous defense method with traditionalmethods of protecting against attacks (SynCookies and the firewall present inthe service provider) is done. In order to do the evaluation, criteria such asresponse time for authorized users and the processing load exerted on the serviceprovider is used.

• Service provider’s response time

In order to measure the response time of the service provider for authorizedusers in the traditional method and the heterogeneous method an experimentwith a number of different estimated rates of SynFlood packets on the webservice provider is carried out. In the first step after the attack, traditionalmethods are used (SynCookies and the firewall present in the service provider) topass the attacks and results are recorded. Then, by activating the heterogeneousdefense system defens against the attacks are tried and the results were alsorecorded.

As obtained from Fig. 11, in traditional method, by increasing the rate ofattacks, a significant amount of time is spent for responding to unauthorizedrequests and the response time for authorized users is increased. In the hetero-geneous defense method, after detecting the attack, the controller is informedof the situation. Then, the controller identifies the source and destination ofthe attacks and sends decisions to the switch connected to the attacker to cutoff or adjust the flow. Afterwards, the attacks are halted and the response

Page 798: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

784 MOHAMMAD HADI ZAHEDI, ABBAS ALI REZAEE and ZEINAB DEHGHAN

Figure 11: Average Response Time of the Service Provider for Authorized Re-quests over Packet/second

time is revived. In the proposed method, the controller does not allow attackflow towards connection links and the resources of the service provider from theattacker switch.

• The usage of central processor

In Fig. 12, the usage level of the central processor during the protectionagainst attacks using the traditional and the heterogeneous methods is provided.As can be seen, in traditional defense methods, a high amount of processing loadis exerted on the central processor of the service provider during the defenseagainst the attacks. By increasing the rate of the attacks, the usage of theprocessor is also increased. Meanwhile in the heterogeneous method, due to theseparation of the defense system, the only load exerted on the service providerdue to calculations of the attack detection module, which can be seen in Fig.12.

The results of experiments show that traditional method in comparisionwith the heterogeneous method provides protection of resources, access for theauthorized users and prevents interference with network resources.

5.2 Comparing the proposed method with methods concentrated inthe controller in thwarting flood attacks

For evaluation, criteria such as the computational load on the controller and thedelay in responding to authorized flows are used. As previously mentioned inSection 3 , [12] , [23], and [24] provide methods for detecting and thwarting denialof service attacks based on Software Defined networks. In all proposed schemes,the detection and defense modules are concentrated on the controller. However,in the heterogeneous defense method, the detection module is in the serviceprovider and the decision module is in the controller. The strategy proposed in

Page 799: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

Fuzzy Protection method for Flood Attacks in Software Defined Networking (SDN) 785

Figure 12: Average Processing Load on the Service Provider in Traditional andHeterogeneous Defense Methods

[24] is designed for cloud environments and [23] only discusses attack detectionmethods. Therefore [12] , provides a method for thwarting attacks in traditionalnetworks.

In this scheme, the OPERETTA controller is proposed. The OPERETTAis an evolved version of the Pox controller for thwarting SynFlood attacks inconventional networks. In this scheme, each TCP packet which intends to reachthe service provider is validated by the controller. If it passes the validation pro-cess, it is allowed to go to the service provider. Among the important problemsin the OPERETTA controller, the high delay in delivering validated packets tothe service provider can be mentioned. Here, the proposed heterogeneous de-fense method is compared with the centralized method of detection and defensebased on Pox and OPERETTA controller. Table.2 shows the specifications ofthe testing environment for each controller.

Figure 13: Specifications of the Testing Environment

Page 800: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

786 MOHAMMAD HADI ZAHEDI, ABBAS ALI REZAEE and ZEINAB DEHGHAN

Evaluating the processing load in controllerIn order to evaluate the processing load on the controller in the heterogeneous

method, a flood attack consisting of Syn packets with a number of different ratesis carried out on the web service provider as shown in Fig. 10. Then, using theHtop tool, the results for the usage of the central processor on the controllerprocess were measured. The obtained results were compared to OPERETTAcentralized controller and the standard centralized method in Pox, extractedfrom [12]. The results of this comparison can be seen in Fig. 13.

Figure 14: Average Usage of Central Processor over Packet per second

As the results show, the heterogeneous defense scheme provides a lower pro-cessing rate in the range of 2000 and 5000 packets. Compared to other methodsin the range of 10000 packets, it is almost equal to the OPERETTA controller.However, as mentioned in Table. 2, the processor of the heterogeneous controllerhas a lower specification compared to the processor of OPERETTA controllerand Pox.

6. Conclusions

Denial of service flood attacks is amongst the most common and powerful attackswhich abuse the computational resources and the bandwidth of the network.The simplicity of creating denial of service tools for carrying out flood attacksand the problems of thwarting them due to the weaknesses in the structure ofcommunication protocols have turned these attacks into the most common andmost significant attacks ever. In this study, traditional networks, SDN’s and thestrategies of these networks for thwarting flood attacks are discussed. Moreover,their strengths and weaknesses of all methods are discussed. Then, a heteroge-neous approach based on the cooperation of the service provider is presented.Also Software Defined controller, which is able to thwart flood attacks in thenetwork, is introduced. Results show that the proposed method has a lowercomputational load and response time compared to other methods centralizedin the controller. There will never be an ultimate defense method which can

Page 801: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

Fuzzy Protection method for Flood Attacks in Software Defined Networking (SDN) 787

protect all the devices against these attacks. For the future work, concentrationshould be on mechanism based on voting to detect attacks in a heterogeneousmanner. Each service provider will have a vote and based on the votes, thecontroller will implement security measures in the network.

References

[1] Larson, Dave, Distributed denial of service attacks–holding back the flood,Network Security, 3 (2016), 5-7.

[2] Alert (TA14-017A) UDP-based Amplification Attacks, US-CERT, 8.

[3] Moore, D., G. Voelker and S. Savage, Inferring Internet Denial-of-ServiceActivity In 10th USENIX Security Symposium, W ashington DC, 200(2001).

[4] Goransson, Paul and Chuck Black, Software Defined Networks: A Compre-hensive Approach, Elsevier, 2014.

[5] McCauley, Murphy, About pox, URL: http://www. noxrepo.org/pox/about-pox/. Online (2013).

[6] C. Meadows, A formal framework and evaluation method for network denialof service, in Computer Security Foundations Workshop, 1999, Proceedingsof the 12th IEEE, 1999, 4-13.

[7] U. D. Protocol, RFC 768 J. Postel ISI 28 August 1980, Isi, 1980.

[8] UDP flood attack, https://en.wikipedia.org/wiki/UDP flood attack.

[9] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J.Rexford, et al., OpenFlow: enabling innovation in campus networks, ACMSIGCOMM Computer Communication Review, 38 (2008), 69-74.

[10] T. Peng, C. Leckie and K. Ramamohanarao, Survey of network-based de-fense mechanisms countering the DoS and DDoS problems, ACM Comput-ing Surveys (CSUR), 39 (2007), 2007.

[11] S. T. Zargar, J. Joshi and D. Tipper, A survey of defense mechanismsagainst distributed denial of service (DDoS) flooding attacks,” Communi-cations Surveys & Tutorials, IEEE, 15 (2013), 2046-2069.

[12] S. Fichera, L. Galluccio, S. C. Grancagnolo, G. Morabito and S. Palazzo,Operetta: An OPEnflow-based REmedy to mitigate TCP SYNFLOOD At-tacks against web servers, Computer Networks, 92 (2015), 89-100.

[13] E. Borcoci, Software Defined Networking and Architectures, in Fifth Inter-national Conference on Advances in Future Internet (AFIN 2013), 2013.

Page 802: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

788 MOHAMMAD HADI ZAHEDI, ABBAS ALI REZAEE and ZEINAB DEHGHAN

[14] A. Hakiri, A. Gokhale, P. Berthou, D. C. Schmidt and T. Gayraud, Soft-ware Defined networking: challenges and research opportunities for futureinternet, Computer Networks, 75 (2014), 453-471.

[15] T. N. Subedi, K. K. Nguyen and M. Cheriet, OpenFlow-based in-networkLayer-2 adaptive multipath aggregation in data centers, Computer Commu-nications, 61 (2015), 58-69.

[16] A. Tavakoli, Exploring a centralized/distributed hybrid routing protocol forlow power wireless networks and large-scale datacenters, University of Cal-ifornia, Berkeley, 2009.

[17] S. Sondur, Software Defined Networking for Beginners.

[18] Gulisano, Vincenzo, Mar Callau-Zori, Zhang Fu, Ricardo Jimenez-Peris,Marina Papatriantafilou and Marta Patino-Martınez, STONE: A streamingDDoS defense framework, Expert Systems with Applications 42, no. 24(2015): 9620-9633.

[19] Yan, Qiao and F. Richard Yu, Distributed denial of service attacks insoftware-defined networking with cloud computing, IEEE CommunicationsMagazine 53, 4 (2015), 52-59.

[20] J. H. Jafarian, E. Al-Shaer and Q. Duan, Openflow random host mutation:transparent moving target defense using Software Defined networking, inProceedings of the first workshop on Hot topics in Software Defined net-works, 2012, 127-132.

[21] P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson and G. Gu, Asecurity enforcement kernel for OpenFlow networks, in Proceedings of thefirst workshop on Hot topics in Software Defined networks, 2012, 121-126.

[22] G. Yao, J. Bi and P. Xiao, Source address validation solution with Open-Flow/NOX architecture, in Network Protocols (ICNP), 2011 19th IEEEInternational Conference on, 2011, 7-12.

[23] R. Braga, E. Mota and A. Passito, Lightweight DDoS flooding attack de-tection using NOX/OpenFlow, in Local Computer Networks (LCN), 2010IEEE 35th Conference on, 2010, 408-415.

[24] B. Wang, Y. Zheng, W. Lou and Y. T. Hou, DDoS attack protection inthe era of cloud computing and Software Defined Networking, ComputerNetworks, 81 (2015), 308-319.

[25] A. Tootoonchian, S. Gorbunov, Y. Ganjali, M. Casado and R. Sherwood,On controller performance in Software Defined networks, in USENIX Work-shop on Hot Topics in Management of Internet, Cloud, and Enterprise Net-works and Services (Hot-ICE), 2012.

Page 803: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

Fuzzy Protection method for Flood Attacks in Software Defined Networking (SDN) 789

[26] U. Tariq, Y. Malik, B. Abdulrazak and M. Hong, Collaborative peer to peerdefense mechanism for ddos attacks, Procedia Computer Science, 5 (2011),157-164.

[27] L. Feinstein, D. Schnackenberg, R. Balupari and D. Kindred, Statisticalapproaches to DDoS attack detection and response, in DARPA InformationSurvivability Conference and Exposition, 2003, Proceedings, 2003, 303-314.

[28] Production Quality, Multilayer Open Virtual Switchhttp://openvswitch.org.

[29] K. Lee, J. Kim, K. H. Kwon, Y. Han and S. Kim, DDoS attack detectionmethod using cluster analysis, Expert Systems with Applications, 34 (2008),1659-1665.

[30] Htop Documentation http://hisham.hm/htop/

[31] Iperf Documentation, http://iperf.fr/

[32] S. H. Yeganeh, A. Tootoonchian and Y. Ganjali, On scalability of SoftwareDefined networking, Communications Magazine, IEEE, 51 (2013), 136-141.

Page 804: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICSINFORMATION FOR AUTHORS

• Before an article can be published in the Italian Journal of Pure and AppliedMathematics, the author is required to contribute with a small fee, which has to becalculated with the following formula:

fee = EUR (20 + 4n)

where n is the number of pages of the article to be published.

• The above amount has to be payed through an international credit transfer in thefollowing bank account:

Bank name: CREDI FRIULI - CREDITO COOPERATIVO FRIULIIBAN code:BIC code:

IT 96 U 0708512304035210033938 CCRTIT2TK00 = SWIFT CODE

Account owner: FORUM EDITRICE UNIVERSITARIA UDINESE SRLVIA LARGA 3833100 UDINE (ITALY)

• All bank commissions must be payed by the author, adding them to the previouscalculated net amount

• Include the following mandatory causal in the credit transfer transaction:

CONTRIBUTO PUBBLICAZIONE ARTICOLO SULL’ITALIAN JOURNAL OFPURE AND APPLIED MATHEMATICS

• Please, include also First Name, Last Name and Paper Title in the credit transfertransaction.

• After the transaction ends successfully, the author is requested to send an e-mail to thefollowing addresses:

[email protected]@gmail.com

This e-mail should contain the author's personal information (Last name, First Name,Postemail Address, City and State, PDF copy of the bank transfer), in order to allowForum Editrice to create an invoice for the author himself.

• Payments, orders or generic fees will not be accepted if they refer to Research Institutes,Universities or any other public and private organizations).

• Finally, when the payment has been done and the e-mail has been received, ForumEditrice will issue an invoice receipt in PDF format and will send it by e-mail to theauthor.

Page 805: Italian Journal of Pure and Applied Mathematics395 007, Surat, Gujarat, India vishnunarayanmishra@gmail.com M. Reza Moghadam Faculty of Mathematical Science, Ferdowsi University of

IJPAM – Italian Journal of Pure and Applied Mathematics Issue n° 40-2018

PublisherForum Editrice Universitaria Udinese Srl

Via Larga 38 - 33100 UdineTel: +39-0432-26001, Fax: +39-0432-296756

[email protected]

Rivista semestrale: Autorizzazione Tribunale di Udine n. 8/98 del 19.3.98 - Direttore responsabile: Piergiulio Corsini

ISSN 2239-0227