JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento...
Transcript of JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento...
VOLUME 10, NUMBERS 1-2 JANUARY-APRIL 2012 ISSN:1548-5390 PRINT,1559-176X ONLINE
JOURNAL
OF CONCRETE AND APPLICABLE MATHEMATICS EUDOXUS PRESS,LLC
1
SCOPE AND PRICES OF THE JOURNAL Journal of Concrete and Applicable Mathematics A quartely international publication of Eudoxus Press,LLC Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis Memphis, TN 38152, U.S.A. [email protected]
Assistant to the Editor:Dr.Razvan Mezei,Lander University,SC 29649, USA. The main purpose of the "Journal of Concrete and Applicable Mathematics" is to publish high quality original research articles from all subareas of Non-Pure and/or Applicable Mathematics and its many real life applications, as well connections to other areas of Mathematical Sciences, as long as they are presented in a Concrete way. It welcomes also related research survey articles and book reviews.A sample list of connected mathematical areas with this publication includes and is not restricted to: Applied Analysis, Applied Functional Analysis, Probability theory, Stochastic Processes, Approximation Theory, O.D.E, P.D.E, Wavelet, Neural Networks,Difference Equations, Summability, Fractals, Special Functions, Splines, Asymptotic Analysis, Fractional Analysis, Inequalities, Moment Theory, Numerical Functional Analysis,Tomography, Asymptotic Expansions, Fourier Analysis, Applied Harmonic Analysis, Integral Equations, Signal Analysis, Numerical Analysis, Optimization, Operations Research, Linear Programming, Fuzzyness, Mathematical Finance, Stochastic Analysis, Game Theory, Math.Physics aspects, Applied Real and Complex Analysis, Computational Number Theory, Graph Theory, Combinatorics, Computer Science Math.related topics,combinations of the above, etc. In general any kind of Concretely presented Mathematics which is Applicable fits to the scope of this journal. Working Concretely and in Applicable Mathematics has become a main trend in many recent years,so we can understand better and deeper and solve the important problems of our real and scientific world. "Journal of Concrete and Applicable Mathematics" is a peer- reviewed International Quarterly Journal. We are calling for papers for possible publication. The contributor should send via email the contribution to the editor in-Chief: TEX or LATEX (typed double spaced) and PDF files. [ See: Instructions to Contributors]
Journal of Concrete and Applicable Mathematics(JCAAM) ISSN:1548-5390 PRINT, 1559-176X ONLINE. is published in January,April,July and October of each year by EUDOXUS PRESS,LLC, 1424 Beaver Trail Drive,Cordova,TN38016,USA, Tel.001-901-751-3553 [email protected] http://www.EudoxusPress.com. Visit also www.msci.memphis.edu/~ganastss/jcaam. Webmaster:Ray Clapsadle
2
Annual Subscription Current Prices:For USA and Canada,Institutional:Print $400,Electronic $250,Print and Electronic $450.Individual:Print $150, Electronic $80,Print &Electronic $200.For any other part of the world add $50 more to the above prices for Print. Single article PDF file for individual $15.Single issue in PDF form for individual $60. No credit card payments.Only certified check,money order or international check in US dollars are acceptable. Combination orders of any two from JoCAAA,JCAAM,JAFA receive 25% discount,all three receive 30% discount. Copyright©2012 by Eudoxus Press,LLC all rights reserved.JCAAM is printed in USA. JCAAM is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH. It is strictly prohibited the reproduction and transmission of any part of JCAAM and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes no responsibility for the content of published papers. JCAAM IS A JOURNAL OF RAPID PUBLICATION PAGE CHARGES: Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage.
3
Editorial Board
Associate Editors
Editor in -Chief: George Anastassiou Department of Mathematical Sciences The University Of Memphis Memphis,TN 38152,USA tel.901-678-3144,fax 901-678-2480 e-mail [email protected] www.msci.memphis.edu/~ganastss Areas:Approximation Theory, Probability,Moments,Wavelet, Neural Networks,Inequalities,Fuzzyness. Associate Editors: 1) Ravi Agarwal Florida Institute of Technology Applied Mathematics Program 150 W.University Blvd. Melbourne,FL 32901,USA [email protected] Differential Equations,Difference Equations, Inequalities 2) Carlo Bardaro Dipartimento di Matematica & Informatica Universita' di Perugia Via Vanvitelli 1 06123 Perugia,ITALY tel.+390755855034, +390755853822, fax +390755855024 [email protected] , [email protected] Functional Analysis and Approximation Th., Summability,Signal Analysis,Integral Equations, Measure Th.,Real Analysis 3) Francoise Bastin Institute of Mathematics University of Liege 4000 Liege BELGIUM [email protected] Functional Analysis,Wavelets 4) Yeol Je Cho
21) Gustavo Alberto Perla Menzala National Laboratory of Scientific Computation LNCC/MCT Av. Getulio Vargas 333 25651-075 Petropolis, RJ Caixa Postal 95113, Brasil and Federal University of Rio de Janeiro Institute of Mathematics RJ, P.O. Box 68530 Rio de Janeiro, Brasil [email protected] and [email protected] Phone 55-24-22336068, 55-21-25627513 Ext 224 FAX 55-24-22315595 Hyperbolic and Parabolic Partial Differential Equations, Exact controllability, Nonlinear Lattices and Global Attractors, Smart Materials 22) Ram N.Mohapatra Department of Mathematics University of Central Florida Orlando,FL 32816-1364 tel.407-823-5080 [email protected] Real and Complex analysis,Approximation Th., Fourier Analysis, Fuzzy Sets and Systems 23) Rainer Nagel Arbeitsbereich Funktionalanalysis Mathematisches Institut Auf der Morgenstelle 10 D-72076 Tuebingen Germany tel.49-7071-2973242 fax 49-7071-294322 [email protected] evolution equations,semigroups,spectral th., positivity 24) Panos M.Pardalos Center for Appl. Optimization University of Florida 303 Weil Hall P.O.Box 116595 Gainesville,FL 32611-6595 tel.352-392-9011 [email protected] Optimization,Operations Research
4
Department of Mathematics Education College of Education Gyeongsang National University Chinju 660-701 KOREA tel.055-751-5673 Office, 055-755-3644 home, fax 055-751-6117 [email protected] Nonlinear operator Th.,Inequalities, Geometry of Banach Spaces 5) Sever S.Dragomir School of Communications and Informatics Victoria University of Technology PO Box 14428 Melbourne City M.C Victoria 8001,Australia tel 61 3 9688 4437,fax 61 3 9688 4050 [email protected], [email protected] Math.Analysis,Inequalities,Approximation Th., Numerical Analysis, Geometry of Banach Spaces, Information Th. and Coding 6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451 fax.++39 051 2094490 [email protected] Partial Differential Equations, Control Theory, Differential Equations in Banach Spaces 7) Claudio A. Fernandez Facultad de Matematicas Pontificia Unversidad Católica de Chile Vicuna Mackenna 4860 Santiago, Chile tel.++56 2 354 5922 fax.++56 2 552 5916 [email protected] Partial Differential Equations, Mathematical Physics, Scattering and Spectral Theory 8) A.M.Fink Department of Mathematics Iowa State University Ames,IA 50011-0001,USA tel.515-294-8150
25) Svetlozar T.Rachev Dept.of Statistics and Applied Probability Program University of California,Santa Barbara CA 93106-3110,USA tel.805-893-4869 [email protected] AND Chair of Econometrics and Statistics School of Economics and Business Engineering University of Karlsruhe Kollegium am Schloss,Bau II,20.12,R210 Postfach 6980,D-76128,Karlsruhe,Germany tel.011-49-721-608-7535 [email protected] Mathematical and Empirical Finance, Applied Probability, Statistics and Econometrics 26) John Michael Rassias University of Athens Pedagogical Department Section of Mathematics and Infomatics 20, Hippocratous Str., Athens, 106 80, Greece Address for Correspondence 4, Agamemnonos Str. Aghia Paraskevi, Athens, Attikis 15342 Greece [email protected] [email protected] Approximation Theory,Functional Equations, Inequalities, PDE 27) Paolo Emilio Ricci Universita' degli Studi di Roma "La Sapienza" Dipartimento di Matematica-Istituto "G.Castelnuovo" P.le A.Moro,2-00185 Roma,ITALY tel.++39 0649913201,fax ++39 0644701007 [email protected],[email protected] Orthogonal Polynomials and Special functions, Numerical Analysis, Transforms,Operational Calculus, Differential and Difference equations 28) Cecil C.Rousseau Department of Mathematical Sciences The University of Memphis Memphis,TN 38152,USA tel.901-678-2490,fax 901-678-2480 [email protected] Combinatorics,Graph Th., Asymptotic Approximations, Applications to Physics 29) Tomasz Rychlik
5
[email protected] Inequalities,Ordinary Differential Equations 9) Sorin Gal Department of Mathematics University of Oradea Str.Armatei Romane 5 3700 Oradea,Romania [email protected] Approximation Th.,Fuzzyness,Complex Analysis 10) Jerome A.Goldstein Department of Mathematical Sciences The University of Memphis, Memphis,TN 38152,USA tel.901-678-2484 [email protected] Partial Differential Equations, Semigroups of Operators 11) Heiner H.Gonska Department of Mathematics University of Duisburg Duisburg,D-47048 Germany tel.0049-203-379-3542 office [email protected] Approximation Th.,Computer Aided Geometric Design 12) Dmitry Khavinson Department of Mathematical Sciences University of Arkansas Fayetteville,AR 72701,USA tel.(479)575-6331,fax(479)575-8630 [email protected] Potential Th.,Complex Analysis,Holomorphic PDE, Approximation Th.,Function Th. 13) Virginia S.Kiryakova Institute of Mathematics and Informatics Bulgarian Academy of Sciences Sofia 1090,Bulgaria [email protected] Special Functions,Integral Transforms, Fractional Calculus 14) Hans-Bernd Knoop Institute of Mathematics Gerhard Mercator University D-47048 Duisburg Germany tel.0049-203-379-2676
Institute of Mathematics Polish Academy of Sciences Chopina 12,87100 Torun, Poland [email protected] Mathematical Statistics,Probabilistic Inequalities 30) Bl. Sendov Institute of Mathematics and Informatics Bulgarian Academy of Sciences Sofia 1090,Bulgaria [email protected] Approximation Th.,Geometry of Polynomials, Image Compression 31) Igor Shevchuk Faculty of Mathematics and Mechanics National Taras Shevchenko University of Kyiv 252017 Kyiv UKRAINE [email protected] Approximation Theory 32) H.M.Srivastava Department of Mathematics and Statistics University of Victoria Victoria,British Columbia V8W 3P4 Canada tel.250-721-7455 office,250-477-6960 home, fax 250-721-8962 [email protected] Real and Complex Analysis,Fractional Calculus and Appl., Integral Equations and Transforms,Higher Transcendental Functions and Appl.,q-Series and q-Polynomials, Analytic Number Th. 33) Stevo Stevic Mathematical Institute of the Serbian Acad. of Science Knez Mihailova 35/I 11000 Beograd, Serbia [email protected]; [email protected] Complex Variables, Difference Equations, Approximation Th., Inequalities 34) Ferenc Szidarovszky Dept.Systems and Industrial Engineering The University of Arizona Engineering Building,111 PO.Box 210020 Tucson,AZ 85721-0020,USA [email protected] Numerical Methods,Game Th.,Dynamic Systems,
6
[email protected] Approximation Theory,Interpolation 15) Jerry Koliha Dept. of Mathematics & Statistics University of Melbourne VIC 3010,Melbourne Australia [email protected] Inequalities,Operator Theory, Matrix Analysis,Generalized Inverses 16) Robert Kozma Dept. of Mathematical Sciences University of Memphis Memphis, TN 38152, USA [email protected]
Mathematical Learning Theory,
Dynamic Systems and Chaos,
Complex Dynamics.
17) Mustafa Kulenovic Departm ent of Mathematics University of Rhode Island Kingston,RI 02881,USA [email protected] Differential and Difference Equations 18) Gerassimos Ladas Department of Mathematics University of Rhode Island Kingston,RI 02881,USA [email protected] Differential and Difference Equations 19) V. Lakshmikantham Department of Mathematical Sciences Florida Institute of Technology Melbourne, FL 32901 e-mail: [email protected] Ordinary and Partial Differential Equations, Hybrid Systems, Nonlinear Analysis 20) Rupert Lasser Institut fur Biomathematik & Biomertie,GSF -National Research Center for environment and health Ingolstaedter landstr.1 D-85764 Neuherberg,Germany [email protected] Orthogonal Polynomials,Fourier Analysis, Mathematical Biology
Multicriteria Decision making, Conflict Resolution,Applications in Economics and Natural Resources Management 35) Gancho Tachev Dept.of Mathematics Univ.of Architecture,Civil Eng. and Geodesy 1 Hr.Smirnenski blvd BG-1421 Sofia,Bulgaria [email protected] Approximation Theory 36) Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock Germany [email protected] Approximation Th.,Wavelet,Fourier Analysis, Numerical Methods,Signal Processing, Image Processing,Harmonic Analysis 37) Chris P.Tsokos Department of Mathematics University of South Florida 4202 E.Fowler Ave.,PHY 114 Tampa,FL 33620-5700,USA [email protected],[email protected] Stochastic Systems,Biomathematics, Environmental Systems,Reliability Th. 38) Lutz Volkmann Lehrstuhl II fuer Mathematik RWTH-Aachen Templergraben 55 D-52062 Aachen Germany [email protected] Complex Analysis,Combinatorics,Graph Theory
7
Instructions to Contributors
Journal of Concrete and Applicable Mathematics A quartely international publication of Eudoxus Press, LLC, of TN.
Editor in Chief: George Anastassiou
Department of Mathematical Sciences University of Memphis
Memphis, TN 38152-3240, U.S.A.
1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves. 2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.
8
4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corrolaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,
9
name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990). Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986. Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495. 11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears. 15. This journal will consider for publication only papers that contain proofs for their listed results.
10
THE METHOD OF LAPLACE AND WATSON’S LEMMA
RICHARD A. ZALIK
Abstract. in this paper we present a diferent proof of a well known asymp-totic estimate for Laplace integrals. The novelty of our approach is that it em-phasizes, and rigorously justifies, the appealing heuristic method of Laplace.
As a bonus, we also obtain a simple and short proof of Watson’s Lemma.
Let a be an element of the extended real number set [−∞,∞]. If
limx−→a
f(x)/g(x) = 1
we write
f(x) ∼ g(x), x −→ a
and say that f is asymptotic to g, or that g is an asymptotic approximation to f .If there is no risk of ambiguity, we may also write f ∼ g for the sake of brevity.
Note that f ∼ g if and only if lim(f(x) − g(x))/g(x) = 0. In other words, ifand only if the relative error made in approximating f by g tends to zero. In somecases, in particular when the values involved are either very small or very large, itmay be more appropriate to estimate the relative rather than the absolute error.
In this article we discuss the problem of obtaining asymptotic estimates forintegrals of the form
(1) I(x) :=
∫
J
e−xp(t)q(t) dt,
where J is a bounded or unbounded interval, p(x) and q(x) are functions satisfyingcertain properties, and x −→ ∞. Most authors, such as Bender and Orszag [1]use an appealing heuristic method attributed to Laplace to obtain an asymptoticestimate for I(x). A rigorous proof may be found in, for example, Erdelyi [2, §2.4](see also Olver [3, pp.80–82]). We give another rigorous proof of this estimate inTheorem 1. The novelty of our approach consists in breaking down the proof bymeans of two preliminary lemmas that highlight and rigorously justify the methodof Laplace.
Under suitable conditions I(x) has an infinite asymptotic expansion (see forexample [3, pp.85–88]). In Theorem 2 we use Lemma 2 to give a simple proofof Watson’s lemma, which gives an infinite asymptotic expansion for I(x) whenp(t) = t. We define asymptotic series in the paragraph preceding the statement ofTheorem 2.
We begin with
Lemma 1. Let J be an interval of the form [a,∞) or [a, b], a < b, and assumethat the following conditions are satisfied:
Key words and phrases. Asymptotic methods; Laplace integrals; Watson’s Lemma.2010 Mathematics Classification: 34E05.
1
11
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS,VOL. 10, NO'S 1-2, 11-16, 2012, COPYRIGHT 2012 EUDOXUS PRESS LLC
2 RICHARD A. ZALIK
(a) The function p(t) is real–valued and measurable on J and for every pointc > a in J ,
(2) infp(t); t ∈ J ∩ [c,∞) > p(a).
(b) There is a number σ > 0 such that p(t) is continuous and strictly increasingon [a, a+ σ].
(c) The function q(t) is Lebesgue integrable on J .(d) There are numbers α > −1 and Q 6= 0 such that
q(t) ∼ Q(t− a)α, t → a+.
Let I(x) be given by (1) and, for δ > 0 such that a+ δ ∈ J ,
(3) I(x, δ) :=
∫ a+δ
a
e−xp(t)q(t) dt.
Then e−xp(t)q(t) is Lebesgue integrable on J for every positive x and there is anumber η > 0 such that p(t) is strictly increasing on [a, a + η], and 0 < δ ≤ ηimplies that
(4) I(x) ∼ I(x, δ), x → ∞.
Remark 1: Equation (2) is needed when J = [a,∞) to ensure that p(t) remainsbounded away from p(a) as t grows. If J = [a, b], (2) is equivalent to p(t) having aunique absolute minimum at a.
Proof. The integrability follows from
|e−xp(t)q(t)| = e−xp(a)e−x[p(t)−p(a)]|q(t)| ≤ e−xp(a)|q(t)|.
From (b) and (d) there is a number η > 0 such that p(t) is continuous and strictlyincreasing on [a, a+ η], and if t ∈ (a, a+ η] then
|Q−1(t− a)−αq(t)− 1| < 1/2.
Thus Q−1(t − a)−αq(t) > 1/2, and we conclude that q(t) has constant sign on(a, a+ η] and that
|q(t)| > (1/2)|Q|(t− a)α on (a, a+ η].
Let δ ∈ (0, η] be arbitrary but fixed, and let Jδ := J \ [a, a+ δ) and
Mδ := infp(t); t ∈ Jδ.
Assume x > 0. Since the hypotheses imply that p(a) < Mδ we have∣
∣
∣
∣
∫
Jδ
e−xp(t)q(t) dt
∣
∣
∣
∣
≤
∫
Jδ
e−xp(t)|q(t)| dt ≤ K1e−Mδx.
Let C ∈ (p(a),Mδ). By continuity, there is a δ1 ∈ (0, δ] such that p(a + δ1) < C.Since p(t) is strictly increasing on [a, a + δ1], we deduce that p(t) < C for t ∈[a, a+ δ1]. Since q(t) has constant sign on (a, a+ δ], we have
|I(x, δ)| =
∣
∣
∣
∣
∣
∫ a+δ
a
e−xp(t)q(t) dt
∣
∣
∣
∣
∣
=
∫ a+δ
a
e−xp(t)|q(t)| dt ≥
∫ a+δ1
a
e−xp(t)|q(t)| dt ≥ (1/2)|Q|
∫ a+δ1
a
e−xp(t)(t− a)α| dt ≥ K2e−Cx.
R. ZALIK, WATSON'S LEMMA
12
THE METHOD OF LAPLACE AND WATSON’S LEMMA 3
Thus∣
∣
∣
∣
∣
∫
Jδ
e−xp(t)q(t) dt
I(x, δ)
∣
∣
∣
∣
∣
≤ K3e(C−Mδ)x −→ 0, x −→ ∞.
Since
I(x) = I(x, δ) +
∫
Jδ
e−xp(t)q(t) dt,
the assertion follows.
As a consequence of Lemma 1 we obtain the following basic proposition, whichwill be used to prove both theorems in this paper.
Lemma 2. Let J be an interval of the form [a,∞) or [a, b] with a < b, and assumethat the function q(t) satisfies conditions (c) and (d) of Lemma 1. Then
∫
J
e−xtq(t) dt ∼ Q
∫
J
e−xt(t− a)α dt, x → ∞.
Proof. If J = [a,∞), Lemma 1 implies that there exists a number b > a such that∫
J
e−xtq(t) dt ∼
∫ b
a
e−xtq(t) dt, x → ∞.
Thus we may assume without loss of generality that J = [a, b].Let
A(x) :=
∫ b
a e−xtq(t) dt
Q∫ b
ae−xt(t− a)α dt
, A1(x, δ) :=
∫ b
a e−xtq(t) dt∫ a+δ
ae−xtq(t) dt
,
A2(x, δ) :=
∫ a+δ
ae−xtq(t) dt
Q∫ a+δ
a e−xt(t− a)α dt, A3(x, δ) :=
∫ a+δ
ae−xt(t− a)α dt
∫ b
a e−xt(t− a)α dt.
Applying Lemma 1 we see that there is a δ1 > 0 such that if 0 < δ ≤ δ1, then
(5) limx→∞
A1(x, δ) = limx→∞
A3(x, δ) = 1.
Let ε > 0 be given. Then there is a δ2 > 0 such that if 0 < t− a < δ2, then
(6) |Q−1(t− a)−αq(t)− 1| < ε.
Let δ := min(δ1, δ2). Since the Generalized Mean Value Theorem implies there is aξ ∈ (a, a+ δ) such that A2(x, δ) = Q−1(ξ − a)−αq(ξ), we conclude from (6) that
−ε ≤ A2(x, δ)− 1 ≤ ε.
SinceA(x) = A1(x, δ)A2(x, δ)A3(x, δ),
we deduce from (5) that
1− ε ≤ lim infx→∞
A(x) ≤ lim supx→∞
A(x) ≤ 1 + ε.
Since ε is arbitrary, the assertion follows.
Theorem 1. Let J be an interval of the form [a,∞) or [a, b], a < b, and assumethat the following conditions are satisfied:
(a) The function p(t) is real–valued and measurable on J and for every pointc > a in J , inequality (2) holds.
(b) There is a number σ > 0 such that p(t) is continuous and strictly increasingon [a, a+ σ], and p ∈ C1(a, a+ σ].
R. ZALIK, WATSON'S LEMMA
13
4 RICHARD A. ZALIK
(c) There are numbers P, µ > 0 such that
(7) p(t)− p(a) ∼ P (t− a)µ, t → a+,
and
(8) p′(t) ∼ µP (t− a)µ−1, t → a+.
(d) The function q(t) is Lebesgue integrable on J .(e) There are numbers λ > 0 and Q 6= 0 such that
(9) q(t) ∼ Q(t− a)λ−1, t → a+.
Then e−xp(t)q(t) is Lebesgue integrable on J for every positive x, and if I(x) isgiven by (1) then
(10) I(x) ∼Q
µΓ
(
λ
µ
)
e−xp(a)
(Px)λ/µ, x → ∞.
Remark 2: Conditions (b), (c) and (d) are satisfied if, for instance, there is apositive integer µ and a positive number σ such that p ∈ Cµ[a, a+ σ],
p(ℓ)(a) = 0, 1 ≤ ℓ ≤ µ− 1, and p(µ)(a) < 0.
Proof. From Lemma 1 we deduce that there is a δ0 > 0 such that p(t) is continuousand strictly increasing on [a, a + δ0], p ∈ C1(a, a + δ0], and (4) is satisfied for anyδ ∈ (0, δ0]. Let δ be an arbitrary but fixed number in (0, δ0], and let I(x, δ) begiven by (3). Making the change of variable s = p(t) we see that
I(x, δ) =
∫ p(a+δ)
p(a)
e−xs q[p−1(s)]
p′[p−1(s)]ds.
Setting c = p(a) and applying (7) we have
lims→c+
(
p−1(s)− a)µ
s− c= lim
t→a+
(t− a)µ
p(t)− p(a)= 1/P.
Therefore
(11) p−1(s)− a ∼
(
s− c
P
)1/µ
, s → c+.
Moreover, (9) implies that
q[p−1(s)] ∼ Q[p−1(s)− a]λ−1, s → c+.
Thus, from (11),
(12) q[p−1(s)] ∼ Q
(
s− c
P
)(λ−1)/µ
, s → c+.
On the other hand, (8) and (11) yield
(13) p′[p−1(s)] ∼ µP (p−1(s)− a)µ−1 ∼ µ(P )1/µ(s− c)1−1/µ, s → c+.
Combining (12) and (13) we conclude that
q[p−1(s)]
p′[p−1(s)]∼ (Q/µ)(P )−(λ/µ)(s− c)λ/µ−1, s → c+,
R. ZALIK, WATSON'S LEMMA
14
THE METHOD OF LAPLACE AND WATSON’S LEMMA 5
and Lemma 2 implies that
I(x, δ) ∼
∫ p(a+δ)
p(a)
e−xs(Q/µ)(P )−(λ/µ)(s− c)λ/µ−1 ds =
(Q/µ)(P )−(λ/µ)
∫ p(a+δ)
p(a)
e−xs(s− c)λ/µ−1 ds =
(Q/µ)(P )−λ/µep(a)x∫ p(a+δ)−p(a)
0
e−xttλ/µ−1 dt.
But Lemma 1 implies that there is a δ ∈ (0, δ0] such that∫ p(a+δ)−p(a)
0
e−xttλ/µ−1 dt ∼
∫
∞
0
e−xttλ/µ−1 dt = Γ
(
λ
µ
)
x−λ/µ, x → ∞,
and the assertion follows.
In the preceding theorem we have assumed that the minimum of p(t) is uniqueand occurs at a. In other cases the interval of integration may be subdivided atthe maxima and minima of p(t). We may then apply Theorem 1 to intervals wherethe minimum is at a left end–point, and Corollary 1 below to intervals where theminimum is at a right end–point.
Making the change of variable t −→ −t we obtain
Corollary 1. Let J be an interval of the form (−∞, b] or [a, b], a < b, and assumethat the following conditions are satisfied:
(a) The function p(t) is real–valued and measurable on J and for every pointc < b in J ,
infp(t); t ∈ J ∩ (−∞, c] > p(b).
(b) There is a number σ > 0 such that p(t) is continuous and strictly decreasingon [b− σ, b], and p ∈ C1[b− σ, b).
(c) There are numbers P, µ > 0 such that
p(t)− p(b) ∼ P (b− t)µ, t −→ b−.
andp′(t) ∼ −µP (b− t)µ−1, t → b−.
(d) The function q(t) is Lebesgue integrable on J .(e) There are numbers λ > 0 and Q 6= 0 such that
q(t) ∼ Q(b− t)λ−1, t → b−.
Then e−xp(t)q(t) is Lebesgue integrable on J for every positive x, and if I(x) isgiven by (1) then
I(x) ∼Q
µΓ
(
λ
µ
)
e−xp(b)
(Px)λ/µ, x → ∞.
Before proceeding further, let us recall the definition of asymptotic expansion inthe particular format that we require here. Let (fk)
∞
k=0 be a sequence of functions,let (a(k))∞k=0 be a sequence of scalars such that the set of integers k for whicha(k) 6= 0 is infinite, and let m(k) := infr ≥ k : a(r) 6= 0. We say that
f(x) ∼
∞∑
k=0
a(k)fk, x −→ a,
R. ZALIK, WATSON'S LEMMA
15
6 RICHARD A. ZALIK
if for every n > 0
f(x)−
n−1∑
k=0
a(k)fk ∼ a(m(n))fm(n)), x −→ a,
Fron Lemma 2 we obtain a simple proof of Watson’s Lemma ([2, §2.4], [3, p.71]):
Theorem 2. (Watson’s Lemma) Let J be an interval of the form [0,∞) or [0, b],b > 0, and assume that q(t) is Lebesgue integrable on J and that there are α > −1and β > 0 such that
q(t) ∼
∞∑
k=0
aktα+βk, t → 0+.
If
I(x) :=
∫
J
e−xtq(t) dt,
then
I(x) ∼
∞∑
k=0
akΓ(α+ βk + 1)
xα+βk+1, x → ∞.
Proof. Defining if necessary q(t) to equal 0 on [b,∞) we may assume, withoutessential loss of generality, that J = [0,∞).
Let n ≥ 0 be an arbitrary integer, and let N denote the smallest integer k ≥ nsuch that ak+1 6= 0. By definition,
q(t)−n∑
k=0
aktα+βk ∼ aN+1t
α+β(N+1), t → 0+.
Applying Lemma 2 we conclude that∫
∞
0
[
q(t)−
n∑
k=0
aktα+βk
]
e−xt dt ∼
∫
∞
0
tα+β(N+1)e−xt dt, x → ∞,
i.e.,
I(x) −
n∑
k=0
akΓ(α+ βk + 1)
xα+βk+1∼
Γ(α+ β(N + 1) + 1)
xα+β(N+1)+1, x → ∞,
and the assertion follows.
The interested reader will have no difficulty in applying Lemma 1 and Lemma 2to obtain a version of Watson’s lemma for an arbitrary p(t), as in [3, p.86].
References
[1] C. M. Bender and S. A. Orszag, Advanced Mathematical Methods for Scientists and Engi-
neers, McGraw–Hill, New York, 1978. Reprint, Springer–Verlag, New–York 1999.[2] A. Erdelyi, Asymptotic Expansions, Dover, New York, 1956.[3] F. W. J. Olver, Asymptotics and Special Functions, Academic Press, New York, 1974.
Department of Mathematics and Statistics, Auburn University, AL 36849–5310
E-mail address: [email protected]
R. ZALIK, WATSON'S LEMMA
16
On special strong di¤erential subordinations using a generalizedS¼al¼agean operator and Ruscheweyh derivative
Alina Alb LupasDepartment of Mathematics and Computer Science
University of Oradeastr. Universitatii nr. 1, 410087 Oradea, Romania
Abstract
In the present paper we establish several strong di¤erential subordinations regardind the new operatorRDn
;, given by RDn; : A
! A , RD
n;f(z; ) = (1 )Rnf(z; ) + Dn
f(z; ); where Rnf(z; )
denote the Ruscheweyh derivative, Dnf(z; ) is the generalized S¼al¼agean operator and A
n = ff 2H(U U); f(z; ) = z + an+1 () zn+1 + : : : ; z 2 U; 2 Ug is the class of normalized analytic functionswith A
1 = A : A certain subclass, denoted by RDn (; ; ) ; of analytic functions is introduced by
means of the new operator.
Keywords: strong di¤erential subordination, univalent function, convex function, di¤erential operator, bestdominant, generalized S¼al¼agean operator, Ruscheweyh derivative.2000 Mathematical Subject Classication: 30C45, 30A20, 34A40.
1 Introduction
Denote by U the unit disc of the complex plane U = fz 2 C : jzj < 1g, U = fz 2 C : jzj 1g the closedunit disc of the complex plane and H(U U) the class of analytic functions in U U .Let An = ff 2 H(U U); f(z; ) = z + an+1 () z
n+1 + : : : ; z 2 U; 2 Ug; with A1 = A ;where ak () are holomorphic functions in U for k 2; and H[a; n; ] = ff 2 H(U U); f(z; ) =a+ an () z
n + an+1 () zn+1 + : : : ; z 2 U; 2 Ug; for a 2 C and n 2 N; ak () are holomorphic functions in
U for k n:
Denition 1.1 For f 2 A , 0 and n 2 N, the operator Dn is dened by D
n : A ! A ,
D0f (z; ) = f (z; ) ;
D1f (z; ) = (1 ) f (z; ) + zf 0(z; ) = Df (z; ) ; :::
Dn+1 f(z; ) = (1 )Dn
f (z; ) + z (Dnf (z; ))
0= D (D
nf (z; )) , z 2 U; 2 U:
Remark 1.1 If f 2 A and f(z) = z +P1
j=2 aj () zj, then Dn
f (z; ) = z +P1
j=2 [1 + (j 1)]naj () z
j,z 2 U; 2 U .
Denition 1.2 For f 2 A , n 2 N; the operator Rn is dened by Rn : A ! A ,
R0f (z; ) = f (z; ) ;
R1f (z; ) = zf 0 (z; ) ; :::
(n+ 1)Rn+1f (z; ) = z (Rnf (z; ))0+ nRnf (z; ) , z 2 U; 2 U:
Remark 1.2 If f 2 A , f(z; ) = z +P1
j=2 aj () zj, then Rnf (z; ) = z +
P1j=2 C
nn+j1aj () z
j, z 2 U; 2 U:
1
17
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.'S 1-2, 17-23, 2012, COPYRIGHT 2012 EUDOXUS PRESS LLC
Generalizing the notion of di¤erential subordinations, J.A. Antonino and S. Romaguera have introducedin [4] the notion of strong di¤erential subordinations, which was developed by G.I. Oros and Gh. Oros in [6],[5].
Denition 1.3 [6] Let f (z; ), H (z; ) analytic in U U: The function f (z; ) is said to be strongly sub-ordinate to H (z; ) if there exists a function w analytic in U , with w (0) = 0 and jw (z)j < 1 such thatf (z; ) = H (w (z) ; ) for all 2 U . In such a case we write f (z; ) H (z; ) ; z 2 U; 2 U:
Remark 1.3 [6] (i) Since f (z; ) is analytic in U U , for all 2 U; and univalent in U; for all 2 U ,Denition 1.3 is equivalent to f (0; ) = H (0; ) ; for all 2 U; and f
U U
H
U U
:
(ii) If H (z; ) H (z) and f (z; ) f (z) ; the strong subordination becomes the usual notion of subor-dination.
We have need the following lemmas to study the strong di¤erential subordinations.
Lemma 1.1 [3] Let h (z; ) be a convex function with h (0; ) = a for every 2 U and let 2 C be acomplex number with Re 0. If p 2 H[a; n; ] and p (z; ) + 1
zp0z (z; ) h (z; ) ; then p (z; )
g (z; ) h (z; ) ; where g (z; ) =
nz n
R z0h (t; ) t
n1dt is convex and it is the best dominant.
Lemma 1.2 [3] Let g (z; ) be a convex function in UU , for all 2 U; and let h(z; ) = g(z; )+nzg0z(z; );z 2 U; 2 U; where > 0 and n is a positive integer. If p(z; ) = g(0; )+pn () zn+pn+1 () zn+1+: : : ; z 2 U; 2 U; is holomorphic in U U and p(z; ) + zp0z(z; ) h(z; ); z 2 U; 2 U; then p(z; ) g(z; )and this result is sharp.
2 Main results
Denition 2.1 Let 2 [0; 1), ; 0 and m 2 N. A function f 2 A is said to be in the classRDm (; ; ; ) if it satises the inequality
ReRDm
;f (z; )0z> ; z 2 U; 2 U: (2.1)
Theorem 2.1 The set RDm (; ; ; ) is convex.
Proof. Let the functions fj (z; ) = z +P1
j=2 ajk () zj , k = 1; 2; z 2 U; 2 U; be in the class
RDm (; ; ; ). It is su¢ cient to show that the function h (z; ) = 1f1 (z; ) + 2f2 (z; ) is in the classRDm (; ; ; ) ; with 1 and 2 nonnegative such that 1 + 2 = 1:Since h (z; ) = z +
P1j=2 (1aj1 () + 2aj2 ()) z
j ; z 2 U; 2 U; then
RDm;h (z; ) = z +
1Pj=2
[1 + (j 1)]m + (1 )Cmm+j1
(1aj1 () + 2aj2 ()) z
j , z 2 U; 2 U:
(2.2)Di¤erentiating (2.2) we obtainRDm
;h (z; )0z= 1+
P1j=2
[1 + (j 1)]m + (1 )Cmm+j1
(1aj1 (z) + 2aj2 ()) jz
j1; z 2 U; 2U:Hence
ReRDm
;h (z; )0z= 1 + Re
1
1Pj=2
j [1 + (j 1)]m + (1 )Cmm+j1
aj1 () z
j1
!(2.3)
+Re
2
1Pj=2
j [1 + (j 1)]m + (1 )Cmm+j1
aj2 () z
j1
!:
Taking into account that f1; f2 2 RDm (; ; ; ) we deduce
Re
k
1Pj=2
j [1 + (j 1)]m + (1 )Cmm+j1
ajk () z
j1
!> k ( 1) ; k = 1; 2: (2.4)
2
A.LUPAS,...SALAGEAN OPERATOR AND RUSCHEWEYH DERIVATIVE
18
Using (2.4) we get from (2.3)
ReRDm
;h (z; )0z> 1 + 1 ( 1) + 2 ( 1) = , z 2 U; 2 U;
which is equivalent that RDm (; ; ; ) is convex.
Theorem 2.2 Let g (z; ) be a convex function such that g (0; ) = 1 and let h be the function h (z; ) =g (z; ) + 1
c+2zg0z (z; ), z 2 U; 2 U; c > 0. If ; 0, m 2 N, f 2 RDm (; ; ; ) and F (z; ) =
Ic (f) (z; ) =c+2zc+1
R z0tcf (t; ) dt; z 2 U; 2 U; then
RDm;f(z; )
0z h (z; ) , z 2 U; 2 U; (2.5)
implies RDm
;F (z; )0z g (z; ) , z 2 U; 2 U;
and this result is sharp.
Proof. We obtain that
zc+1F (z; ) = (c+ 2)
Z z
0
tcf (t; ) dt: (2.6)
Di¤erentiating (2.6), with respect to z, we have (c+ 1)F (z; ) + zF 0z (z; ) = (c+ 2) f (z; ) and
(c+ 1)RDm;F (z; ) + z
RDm
;F (z; )0z= (c+ 2)RDm
;f (z; ) ; z 2 U; 2 U: (2.7)
Di¤erentiating (2.7) with respect to z we haveRDm
;F (z; )0z+
1
c+ 2zRDm
;F (z; )00z2=RDm
;f (z; )0z, z 2 U; 2 U: (2.8)
Using (2.8), the strong di¤erential subordination (2.5) becomesRDm
;F (z; )0z+
1
c+ 2zRDm
;F (z; )00z2 g (z; ) + 1
c+ 2zg0z (z; ) : (2.9)
Denotep (z; ) =
RDm
;F (z; )0z; z 2 U; 2 U: (2.10)
Replacing (2.10) in (2.9) we obtain
p (z; ) +1
c+ 2zp0z (z; ) g (z; ) +
1
c+ 2zg0z (z; ) , z 2 U; 2 U:
Using Lemma 1.2 we have
p (z; ) g (z; ) ; z 2 U; 2 U; i.e.RDm
;F (z; )0z g (z; ) , z 2 U; 2 U;
and this result is sharp.
Theorem 2.3 Let h (z; ) = +(2)z1+z ; z 2 U; 2 U; 2 [0; 1) and c > 0. If ; 0, m 2 N and Ic is
given by Theorem 2.2, thenIc [RDm (; ; ; )] RDm (; ; ; ) ; (2.11)
where = 2 + 2 (c+ 2) ( ) (c) and (x) =R 10
tx
t+1dt:
Proof. The function h is convex and using the same steps as in the proof of Theorem 2.2 we get fromthe hypothesis of Theorem 2.3 that p (z; ) + 1
c+2zp0z (z; ) h (z; ) ; where p (z; ) is dened in (2.10).
Using Lemma 1.1 we deduce that p (z; ) g (z; ) h (z; ) ; that isRDm
;F (z; )0z g (z; )
h (z; ) ; where g (z; ) = c+2zc+2
R z0tc+1 +(2)t1+t dt = (2 ) + 2(c+2)()
zc+2
R z0tc+1
1+t dt: Since g is convex andgU U
is symmetric with respect to the real axis, we deduce
ReRDm
;F (z; )0z min
jzj=1Re g (z; ) = Re g (1; ) = = 2 + 2 (c+ 2) ( ) (c) : (2.12)
From (2.12) we deduce inclusion (2.11).
3
A.LUPAS,...SALAGEAN OPERATOR AND RUSCHEWEYH DERIVATIVE
19
Theorem 2.4 Let g (z; ) be a convex function such that g (0; ) = 1 and let h be the function h (z; ) =g (z; ) + zg0z (z; ), z 2 U; 2 U . If ; 0, m 2 N, f 2 A and the strong di¤erential subordination
RDm;f(z; )
0z h (z; ) , z 2 U; 2 U; (2.13)
holds, thenRDm
;f(z; )
z g (z; ) , z 2 U; 2 U;
and this result is sharp.
Proof. By using the properties of operator RDm;, we have
RDm;f(z; ) = z +
P1j=2
[1 + (j 1)]m + (1 )Cmm+j1
aj () z
j ; z 2 U; 2 U:
Consider p(z; ) =RDm
;f(z;)
z =z+P1
j=2f[1+(j1)]m+(1)Cmm+j1gaj()zj
z = 1 + p1 () z + p2 () z2 +
:::; z 2 U; 2 U:Let RDm
;f(z; ) = zp(z; ); z 2 U; 2 U: Di¤erentiating with respect to z we obtainRDm
;f(z; )0z=
p(z; ) + zp0z(z; ); z 2 U; 2 U:Then (2.13) becomes
p(z; ) + zp0z(z; ) h(z; ) = g(z; ) + zg0z(z; ); z 2 U; 2 U:
By using Lemma 1.2, we have
p(z; ) g(z; ); z 2 U; 2 U; i.e.RDm
;f(z; )
z g(z; ); z 2 U; 2 U:
Theorem 2.5 Let h (z; ) be a convex function such that h (0; ) = 1. If ; 0; m 2 N, f 2 A and thestrong di¤erential subordination
RDm;f(z; )
0z h (z; ) , z 2 U; 2 U; (2.14)
holds, thenRDm
;f(z; )
z g (z; ) h (z; ) , z 2 U; 2 U;
where g (z; ) = 1z
R z0h(t)dt is convex and it is the best dominant.
Proof. With notation p (z; ) =RDm
;f(z;)
z = 1+P1
j=2
[1 + (j 1)]m + (1 )Cmm+j1
aj () z
j1
and p (0; ) = 1, we obtain for f(z; ) = z +P1
j=2 aj () zj ; p (z; ) + zp0z (z; ) =
RDm
;f(z; )0z:
We have p (z; ) + zp0z (z; ) h (z; ), z 2 U; 2 U . Since p (z; ) 2 H [1; 1; ] ; using Lemma 1.1, for
n = 1 and = 1; we obtain p (z; ) g (z; ) h (z; ), z 2 U , 2 U , i.e. RDm;f(z;)
z g (z; ) =1z
R z0h(t)dt h (z; ), z 2 U; 2 U , and g (z; ) is convex and it is the best dominant.
Corollary 2.6 Let h(z; ) = +(2)z1+z ; a convex function in U U , 0 < 1. If ; 0, m 2 N; f 2 A
and veries the strong di¤erential subordinationRDm
;f(z; )0z h(z; ); z 2 U; 2 U; (2.15)
thenRDm
;f(z; )
z g (z; ) h (z; ) , z 2 U; 2 U;
where g is given by g(z; ) = 2 + 2()z ln (1 + z) ; z 2 U; 2 U: The function q is convex and it is the
best dominant.
4
A.LUPAS,...SALAGEAN OPERATOR AND RUSCHEWEYH DERIVATIVE
20
Proof. Following the same steps as in the proof of Theorem 2.5 and considering p(z; ) =RDm
;f(z;)
z ,the strong di¤erential subordination (2.15) becomes
p(z; ) + zp0z(z; ) h(z; ) = + (2 )z
1 + z; z 2 U; 2 U:
By using Lemma 1.1 for n = 1 and = 1, we have p (z; ) g (z; ) h (z; ), z 2 U , 2 U , i.e.,
RDm;f(z; )
z g (z; ) = 1
z
Z z
0
h (t; ) dt =1
z
Z z
0
+ (2 ) t1 + t
dt = 2 + 2( )z
ln (1 + z) ;
z 2 U; 2 U:
Theorem 2.7 Let g (z; ) be a convex function such that g (0; ) = 1 and let h be the function h (z; ) =g (z; ) + zg0z (z; ), z 2 U; 2 U . If ; 0, m 2 N, f 2 A and the strong di¤erential subordination
zRDm+1; f (z; )
RDm;f (z; )
!0z
h (z; ) , z 2 U; 2 U; (2.16)
holds, thenRDm+1
; f (z; )
RDm;f (z; )
g (z; ) , z 2 U; 2 U;
and this result is sharp.
Proof. For f 2 An , f(z; ) = z +P1
j=2 aj () zj we have
RDm;f(z; ) = z +
P1j=2
[1 + (j 1)]m + (1 )Cmm+j1
aj () z
j , z 2 U; 2 U .
Consider p (z; ) =RDm+1
; f(z;)
RDm;f(z;)
=z+P1
j=2([1+(j1)]m+1+(1)Cm+1
m+j )aj()zj
z+P1
j=2([1+(j1)]m+(1)Cm
m+j1)aj()zj=
1+P1
j=2([1+(j1)]m+1+(1)Cm+1
m+j )aj()zj1
1+P1
j=2([1+(j1)]m+(1)Cm
m+j1)aj()zj1:
We have p0z (z; ) =(RDm+1
; f(z;))0z
RDm;f(z;)
p (z; ) (RDm;f(z;))
0z
RDm;f(z;)
:
Then p (z; ) + zp0z (z; ) =zRDm+1
; f(z;)
RDm;f(z;)
0z
:
Relation (2.16) becomes p (z; ) + zp0z (z; ) h (z; ) = g (z; ) + zg0z (z; ), z 2 U; 2 U; and by usingLemma 1.2 we obtain p (z; ) g (z; ), z 2 U; 2 U , i.e. RD
m+1; f(z;)
RDm;f(z;)
g (z; ), z 2 U; 2 U:
Theorem 2.8 Let g (z; ) be a convex function such that g (0; ) = 1 and let h be the function h (z; ) =g (z; ) + zg0z (z; ), z 2 U; 2 U . If ; 0, m 2 N, f 2 A and the strong di¤erential subordination
(m+ 1) (m+ 2)
zRDm+2
; f (z; ) (m+ 1) (2m+ 1)z
RDm+1; f (z; ) +
m2
zRDm
;f (z; )
(m+ 1) (m+ 2) 1
2
z
Dm+2 f (z; ) +
h(m+ 1) (2m+ 1) 2(1)
2
iz
Dm+1 f (z; )
hm2 (1)2
2
iz
Dm f (z; ) h(z; ); z 2 U; 2 U; (2.17)
holds, then RDm
;f(z; )0z g(z; ); z 2 U; 2 U:
This result is sharp.
5
A.LUPAS,...SALAGEAN OPERATOR AND RUSCHEWEYH DERIVATIVE
21
Proof. Letp(z; ) =
RDm
;f(z; )0z= (1 ) (Rmf(z; ))0z + (D
m f(z; ))
0z (2.18)
= 1 +1Xj=2
[1 + (j 1)]m + (1 )Cmm+j1
jaj () z
j1 = 1 + p1 () z + p2 () z2 + ::::
By using the properties of operators RDm;, R
m and Dm , after a short calculation, we obtain
p (z; ) + zp0z (z; ) =(m+1)(m+2)
z RDm+2; f (z; ) (m+1)(2m+1)
z RDm+1; f (z; )+ m2
z RDm;f (z; )
[(m+1)(m+2) 12]
z Dm+2 f (z; )+
[(m+1)(2m+1) 2(1)2
]z Dm+1
f (z; )
m2 (1)2
2
z Dm
f (z; ) :Using the notation in (2.18), the strong di¤erential subordination becomes
p(z; ) + zp0z(z; ) h(z; ) = g(z; ) + zg0z(z; ):
By using Lemma 1.2, we have
p(z; ) g(z; ); z 2 U; 2 U; i.e.RDm
;f(z; )0z g(z; ); z 2 U , 2 U;
and this result is sharp.
Theorem 2.9 Let h (z; ) be a convex function such that h (0; ) = 1. If ; 0; m 2 N, f 2 A and thestrong di¤erential subordination
(m+ 1) (m+ 2)
zRDm+2
; f (z; ) (m+ 1) (2m+ 1)z
RDm+1; f (z; ) +
m2
zRDm
;f (z; )
(m+ 1) (m+ 2) 1
2
z
Dm+2 f (z; ) +
h(m+ 1) (2m+ 1) 2(1)
2
iz
Dm+1 f (z; )
hm2 (1)2
2
iz
Dm f (z; ) h (z; ) , z 2 U; 2 U; (2.19)
holds, then RDm
;f(z; )0z g (z; ) h (z; ) , z 2 U; 2 U;
where g (z; ) = 1z
R z0h(t)dt is convex and it is the best dominant.
Proof. Using the properties of operator RDm; and considering p (z) =
RDm
;f (z; )0z2 H [1; 1; ],
we obtainp (z; ) + zp0z (z; ) =
(m+1)(m+2)z RDm+2
; f (z; ) (m+1)(2m+1)z RDm+1
; f (z; )+ m2
z RDm;f (z; )
[(m+1)(m+2) 12]
z Dm+2 f (z; )+
[(m+1)(2m+1) 2(1)2
]z Dm+1
f (z; )
m2 (1)2
2
z Dm
f (z; ), z 2 U , 2U:Then (m+1)(m+2)
z RDm+2; f (z; ) (m+1)(2m+1)
z RDm+1; f (z; )+ m2
z RDm;f (z; )
[(m+1)(m+2) 12]
z Dm+2 f (z; )+
[(m+1)(2m+1) 2(1)2
]z Dm+1
f (z; )
m2 (1)2
2
z Dm
f (z; ) h (z; ),z 2 U; 2 U; becomes p (z; ) + zp0z (z; ) h (z; ), z 2 U , 2 U: By using Lemma 1.1, for n = 1 and = 1; we obtain
p (z; ) g (z; ) h (z; ) ; z 2 U; 2 U; i.e.RDm
;f(z; )0z g (z; ) = 1
z
Z z
0
h(t)dt h (z; ) ; z 2 U; 2 U;
and g (z; ) is convex and it is the best dominant.
6
A.LUPAS,...SALAGEAN OPERATOR AND RUSCHEWEYH DERIVATIVE
22
Corollary 2.10 Let h(z; ) = +(2)z1+z a convex function in U U , 0 < 1. If ; 0, m 2 N; f 2 A
and veries the strong di¤erential subordination
(m+ 1) (m+ 2)
zRDm+2
; f (z; ) (m+ 1) (2m+ 1)z
RDm+1; f (z; ) +
m2
zRDm
;f (z; )
(m+ 1) (m+ 2) 1
2
z
Dm+2 f (z; ) +
h(m+ 1) (2m+ 1) 2(1)
2
iz
Dm+1 f (z; )
hm2 (1)2
2
iz
Dm f (z; ) h(z; ); z 2 U; 2 U; (2.20)
then RDm
;f(z; )0z g (z; ) h (z; ) , z 2 U; 2 U;
where g is given by g(z; ) = 2 + 2()z ln (1 + z) ; z 2 U; 2 U: The function q is convex and it is the
best dominant.
Proof. Following the same steps as in the proof of Theorem 2.9 and considering p(z; ) =RDm
;f(z; )0z,
the strong di¤erential subordination (2.20) becomes
p(z; ) + zp0z(z; ) h(z; ) = + (2 )z
1 + z; z 2 U; 2 U:
By using Lemma 1.1 for n = 1 and = 1, we have p (z; ) g (z; ) h (z; ), z 2 U , 2 U , i.e.
RDm
;f(z; )0z g (z; ) = 1
z
Z z
0
h (t; ) dt =1
z
Z z
0
+ (2 ) t1 + t
dt = 2 + 2( )z
ln (1 + z) ;
z 2 U; 2 U:
References
[1] A. Alb Lupas, On special di¤erential subordinations using S¼al¼agean and Ruscheweyh operators, Mathe-matical Inequalities and Applications, Volume 12, Issue 4 (2009), 781-790.
[2] A. Alb Lupas, On special di¤erential subordinations using a generalized S¼al¼agean operator and Ruscheweyhderivative, Journal of Computational Analysis and Applications, Vol. 13, No.1, 2011, 98-107.
[3] A. Alb Lupas, G.I. Oros, Gh. Oros, On special strong di¤erential subordinations using S¼al¼agean andRuscheweyh operators, Journal of Computational Analysis and Applications, submitted, 2011.
[4] J.A. Antonino, S. Romaguera, Strong di¤erential subordination to Briot-Bouquet di¤erential equations,Journal of Di¤erential Equations, 114 (1994), 101-105.
[5] G.I. Oros, On a new strong di¤erential subordination, (to appear).
[6] G.I. Oros, Gh. Oros, Strong di¤erential subordination, Turkish Journal of Mathematics, 33 (2009), 249-257.
7
A.LUPAS,...SALAGEAN OPERATOR AND RUSCHEWEYH DERIVATIVE
23
A note on special strong di¤erential subordinations using amultiplier transformation and Ruscheweyh derivative
Alina Alb LupasDepartment of Mathematics and Computer Science
University of Oradeastr. Universitatii nr. 1, 410087 Oradea, Romania
Abstract
In the present paper we establish several strong di¤erential subordinations regardind the new operatorRIm;;l, given by RI
m;;l : A
n ! An , RI
m;;lf(z; ) = (1 )Rmf(z; ) + I (m;; l) f(z; ); where
Rmf(z; ) denote the Ruscheweyh derivative, I (m;; l) is the multiplier transformation and An = ff 2
H(U U); f(z; ) = z + an+1 () zn+1 + : : : ; z 2 U; 2 Ug is the class of normalized analytic functions.A certain subclass, denoted by RIm (; ; l; ; ) ; of analytic functions is introduced by means of the newoperator.
Keywords: strong di¤erential subordination, univalent function, convex function, best dominant, di¤erentialoperator, multiplier transformation, Ruscheweyh derivative.2000 Mathematical Subject Classication: 30C45, 30A20, 34A40.
1 Introduction
Denote by U the unit disc of the complex plane U = fz 2 C : jzj < 1g, U = fz 2 C : jzj 1g the closedunit disc of the complex plane and H(U U) the class of analytic functions in U U .Let An = ff 2 H(UU); f(z; ) = z+an+1 () zn+1+ : : : ; z 2 U; 2 Ug; where ak () are holomorphic
functions in U for k 2; and H[a; n; ] = ff 2 H(UU); f(z; ) = a+an () zn+an+1 () zn+1+: : : ; z 2 U; 2 Ug; for a 2 C, n 2 N; ak () are holomorphic functions in U for k n:We also extend the di¤erential operators presented above to the new class of analytic functions An
introduced in [8].
Denition 1.1 [1] For f 2 An , n;m 2 N; the operator Sm is dened by Sm : An ! An ,
S0f (z; ) = f (z; ) ;
S1f (z; ) = zf 0z(z; ); :::;
Sm+1f(z; ) = z (Smf (z; ))0z , z 2 U; 2 U:
Remark 1.1 [1] If f 2 An , f(z; ) = z +P1
j=n+1 aj () zj, then Smf (z; ) = z +
P1j=n+1 j
maj () zj,
z 2 U; 2 U .
Denition 1.2 [3] For n 2 N, m 2 N [ f0g, ; l 0; f 2 An , f(z; ) = z +P1
j=n+1 aj () zj, the operator
I (m;; l) f (z; ) is dened by the following innite series
I (m;; l) f (z; ) = z +1P
j=n+1
1 + (j 1) + l
l + 1
maj () z
j ; z 2 U; 2 U:
Remark 1.2 [3] It follows from the above denition that
(l + 1) I (m+ 1; ; l) f(z; ) = [l + 1 ] I (m;; l) f(z; ) + z (I (m;; l) f(z; ))0z , z 2 U; 2 U:
1
24
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2, 24-31, 2012, COPYRIGHT 2012 EUDOXUS PRESS LLC
Generalizing the notion of di¤erential subordinations, J.A. Antonino and S. Romaguera have introducedin [7] the notion of strong di¤erential subordinations, which was developed by G.I. Oros and Gh. Oros in [9],[8].
Denition 1.3 [9] Let f (z; ), H (z; ) analytic in U U: The function f (z; ) is said to be strongly sub-ordinate to H (z; ) if there exists a function w analytic in U , with w (0) = 0 and jw (z)j < 1 such thatf (z; ) = H (w (z) ; ) for all 2 U . In such a case we write f (z; ) H (z; ) ; z 2 U; 2 U:
Remark 1.3 [9] (i) Since f (z; ) is analytic in U U , for all 2 U; and univalent in U; for all 2 U ,Denition 1.3 is equivalent to f (0; ) = H (0; ) ; for all 2 U; and f
U U
H
U U
:
(ii) If H (z; ) H (z) and f (z; ) f (z) ; the strong subordination becomes the usual notion of subor-dination.
We have need the following lemmas to study the strong di¤erential subordinations.
Lemma 1.1 [1] Let h (z; ) be a convex function with h (0; ) = a for every 2 U and let 2 C be acomplex number with Re 0. If p 2 H[a; n; ] and p (z; ) + 1
zp0z (z; ) h (z; ) ; then p (z; )
g (z; ) h (z; ) ; where g (z; ) =
nz n
R z0h (t; ) t
n1dt is convex and it is the best dominant.
Lemma 1.2 [1] Let g (z; ) be a convex function in U U , for all 2 U; and let h(z; ) = g(z; ) +nzg0z(z; ); z 2 U; 2 U; where > 0 and n is a positive integer. If p(z; ) = g(0; ) + pn () z
n +pn+1 () z
n+1+ : : : ; z 2 U; 2 U; is holomorphic in U U and p(z; )+zp0z(z; ) h(z; ); z 2 U; 2 U;then p(z; ) g(z; ) and this result is sharp.
2 Main results
Denition 2.1 Let ; ; l 0, n;m 2 N. Denote by RIm;;l the operator given by RIm;;l : An ! An ;
RIm;;lf(z; ) = (1 )Rmf(z; ) + I (m;; l) f(z; ); z 2 U; 2 U:
Remark 2.1 If f 2 An , f(z; ) = z +P1
j=n+1 aj () zj, then
RIm;;lf(z; ) = z +P1
j=n+1
n1+(j1)+l
l+1
m+ (1 )Cmm+j1
oaj () z
j ; z 2 U; 2 U:
Remark 2.2 For = 0, RI0m;;lf(z; ) = Rmf(z; ), where z 2 U; 2 U; and for = 1, RI1m;;lf (z; ) =
I (m;; l) f (z; ), where z 2 U , 2 U; which was studied in [3], [4]. For l = 0; we obtain RIm;;0f (z; ) =RDm
1;f (z; ) which was studied in [5], [6] and for l = 0 and = 1; we obtain RIm;1;0f (z; ) = L
m f (z; )
which was studied in [1], [2].Form = 0, RI0;;lf (z; ) = (1 )R0f (z; )+I (0; ; l) f (z; ) = f (z; ) = R0f (z; ) = I (0; ; l) f (z; ),
where z 2 U; 2 U:
Denition 2.2 Let 2 [0; 1), ; ; l 0 and n;m 2 N. A function f (z; ) 2 An is said to be in the classRIm (; ; l; ; ) if it satises the inequality
ReRIm;;lf (z; )
0z> ; z 2 U; 2 U: (2.1)
Theorem 2.1 The set RIm (; ; l; ; ) is convex.
Proof. Let the functions fj (z; ) = z +P1
j=n+1 ajk () zj , k = 1; 2; z 2 U; 2 U; be in the class
RIm (; ; l; ; ). It is su¢ cient to show that the function h (z; ) = 1f1 (z; ) + 2f2 (z; ) is in the classRIm (; ; l; ; ) ; with 1 and 2 nonnegative such that 1 + 2 = 1:Since h (z; ) = z +
P1j=n+1 (1aj1 () + 2aj2 ()) z
j ; z 2 U; 2 U; then
RIm;;lh (z; ) = z +1P
j=n+1
1 + (j 1) + l
l + 1
m+ (1 )Cmm+j1
(1aj1 () + 2aj2 ()) z
j , (2.2)
z 2 U; 2 U:
2
A.LUPAS,...MULTIPLIER TRANSFORMATION AND RUSCHEWEYH DERIVATIVE
25
Di¤erentiating (2.2) with respect to z we obtainRIm;;lh (z; )
0z= 1 +
P1j=n+1
n1+(j1)+l
l+1
m+ (1 )Cmm+j1
o(1aj1 () + 2aj2 ()) jz
j1; z 2 U; 2 U:Hence
ReRIm;;lh (z; )
0z= 1 + Re
1
1Pj=n+1
j
1 + (j 1) + l
l + 1
m+ (1 )Cmm+j1
aj1 () z
j1
!(2.3)
+Re
2
1Pj=n+1
j
1 + (j 1) + l
l + 1
m+ (1 )Cmm+j1
aj2 () z
j1
!:
Taking into account that f1; f2 2 RIm (; ; l; ; ) we deduce
Re
k
1Pj=n+1
j
1 + (j 1) + l
l + 1
m+ (1 )Cmm+j1
ajk () z
j1
!> k ( 1) ; k = 1; 2:
Using (2.1) we get from (2.3)
ReRIm;;lh (z; )
0z> 1 + 1 ( 1) + 2 ( 1) = , z 2 U; 2 U;
which is equivalent that RIm (; ; l; ; ) is convex.
Theorem 2.2 Let g (z; ) be a convex function such that g (0; ) = 1 and let h (z; ) = g (z; )+ 1c+2zg
0z (z; ) ;
where z 2 U; 2 U; c > 0:If ; ; l 0; n;m 2 N, f 2 RIm (; ; l; ; ) and F (z; ) = Ic (f) (z; ) =
c+2zc+1
R z0tcf (t; ) dt, z 2 U;
2 U; then RIm;;lf (z; )
0z h (z; ) , z 2 U; 2 U; (2.4)
implies RIm;;lF (z; )
0z g (z; ) , z 2 U; 2 U;
and this result is sharp.
Proof. We obtain that
zc+1F (z; ) = (c+ 2)
Z z
0
tcf (t; ) dt: (2.5)
Di¤erentiating (2.5), with respect to z, we have (c+ 1)F (z; ) + zF 0z (z; ) = (c+ 2) f (z; ) and
(c+ 1)RIm;;lF (z; ) + zRIm;;lF (z; )
0z= (c+ 2)RIm;;lf (z; ) ; z 2 U; 2 U: (2.6)
Di¤erentiating (2.6) with respect to z we haveRIm;;lF (z; )
0z+
1
c+ 2zRIm;;lF (z; )
00z2=RIm;;lf (z; )
0z, z 2 U; 2 U: (2.7)
Using (2.7), the strong di¤erential subordination (2.4) becomesRIm;;lF (z; )
0z+
1
c+ 2zRIm;;lF (z; )
00z2 g (z) + 1
c+ 2zg0z (z) : (2.8)
Denotep (z; ) =
RIm;;lF (z; )
0z; z 2 U; 2 U: (2.9)
Replacing (2.9) in (2.8) we obtain
p (z; ) +1
c+ 2zp0z (z; ) g (z; ) +
1
c+ 2zg0z (z; ) , z 2 U; 2 U:
Using Lemma 1.2 we have
p (z; ) g (z; ) ; z 2 U; 2 U; i.e.RIm;;lF (z; )
0z g (z; ) , z 2 U; 2 U;
and this result is sharp.
3
A.LUPAS,...MULTIPLIER TRANSFORMATION AND RUSCHEWEYH DERIVATIVE
26
Theorem 2.3 Let h (z; ) = +(2)z1+z ; z 2 U; 2 U; 2 [0; 1) and c > 0. If ; ; l 0, m 2 N and Ic is
given by Theorem 2.2, thenIc [RIm (; ; l; ; )] RIm (; ; l; ; ) ; (2.10)
where = 2 + 2(c+2)()n
c+2n 2
and (x) =
R 10tx1
t+1 dt:
Proof. The function h is convex and using the same steps as in the proof of Theorem 2.2 we get fromthe hypothesis of Theorem 2.3 that, p (z; ) + 1
c+2zp0z (z; ) h (z; ) ; where p (z; ) is dened in (2.9).
Using Lemma 1.1 we deduce that p (z; ) g (z; ) h (z; ) ; that isRIm;;lF (z; )
0z g (z; )
h (z; ) ; where g (z; ) = c+2
nzc+2n
R z0tc+2n 1 +(2)t
1+t dt = (2 ) + 2(c+2)()nz
c+2n
R z0tc+2n
1
1+t dt: Since g is convex
and gU U
is symmetric with respect to the real axis, we deduce
ReRIm;;lF (z; )
0z min
jzj=1Re g (z; ) = Re g (1; ) = = 2+ 2 (c+ 2) ( )
n
c+ 2
n 2: (2.11)
From (2.11) we deduce inclusion (2.10).
Theorem 2.4 Let g (z; ) be a convex function such that g(0; ) = 1 and let h be the function h(z; ) =g(z; ) + zg0z(z; ); z 2 U; 2 U:If ; ; l 0, n;m 2 N; f 2 An and satises the strong di¤erential subordination
RIm;;lf(z; )0z h(z; ); z 2 U; 2 U; (2.12)
thenRIm;;lf(z; )
z g(z; ); z 2 U; 2 U;
and this result is sharp.
Proof. By using the properties of operator RIm;;l, we have
RIm;;lf(z; ) = z +P1
j=n+1
n1+(j1)+l
l+1
m+ (1 )Cmm+j1
oaj () z
j ; z 2 U; 2 U:
Consider p(z; ) =RIm;;lf(z;)
z =z+P1
j=n+1f( 1+(j1)+ll+1 )m+(1)Cm
m+j1gaj()zjz = 1+pn () z
n+pn+1 () zn+1+
:::; z 2 U; 2 U:Let RIm;;lf(z; ) = zp(z; ); z 2 U; 2 U:Di¤erentiating with respect to z we obtain
RIm;;lf(z; )
0z=
p(z; ) + zp0z(z; ); z 2 U; 2 U:Then (2.12) becomes
p(z; ) + zp0z(z; ) h(z; ) = g(z; ) + zg0z(z; ); z 2 U; 2 U:
By using Lemma 1.2, we have
p(z; ) g(z; ); z 2 U; 2 U; i.e.RIm;;lf(z; )
z g(z; ); z 2 U , 2 U:
Theorem 2.5 Let h (z; ) be a convex function such that h(0; ) = 1:If ; ; l 0; n;m 2 N, f 2 An and satises the strong di¤erential subordination
RIm;;lf(z; )0z h(z; ); z 2 U; 2 U; (2.13)
thenRIm;;lf(z; )
z g(z; ) h (z; ) ; z 2 U; 2 U;
where g (z; ) = 1
nz1n
R z0h (t; ) t
1n1dt is convex and it is the best dominant.
4
A.LUPAS,...MULTIPLIER TRANSFORMATION AND RUSCHEWEYH DERIVATIVE
27
Proof. Let p(z; ) =RIm;;lf(z;)
z =z+P1
j=n+1f( 1+(j1)+ll+1 )m+(1)Cm
m+j1gaj()zjz =
1 +P1
j=n+1
n1+(j1)+l
l+1
m+ (1 )Cmm+j1
oaj () z
j1 = 1 +P1
j=n+1 pj () zj1; z 2 U; 2 U:
Di¤erentiating with respect to z, we obtainRIm;;lf(z; )
0z= p(z; ) + zp0z(z; ); z 2 U; 2 U; and
(2.13) becomesp(z; ) + zp0z(z; ) h(z; ); z 2 U; 2 U:
Since p (z; ) 2 H [1; n; ], using Lemma 1.1 for = 1, we have
p (z; ) g (z; ) h (z; ) ; z 2 U; 2 U; i.e:
RIm;;lf(z; )
z g (z; ) = 1
nz1n
Z z
0
h (t; ) t1n1dt h (z; ) ; z 2 U; 2 U;
and g (z; ) is convex and it is the best dominant.
Corollary 2.6 Let h(z; ) = +(2)z1+z a convex function in U U , 0 < 1. If 0, m 2 N; f 2 An
and veries the strong di¤erential subordinationRIm;;lf(z; )
0z h(z; ); z 2 U; 2 U; (2.14)
thenRIm;;lf(z; )
z g (z; ) h (z; ) , z 2 U; 2 U;
where g is given by g(z; ) = 2 + 2()nz
1n
R z0t1n1
1+t dt; z 2 U; 2 U: The function q is convex and it is thebest dominant.
Proof. Following the same steps as in the proof of Theorem 2.5 and considering p(z; ) =RIm;;lf(z;)
z ,the strong di¤erential subordination (2.14) becomes
p(z; ) + zp0z(z; ) h(z; ) = + (2 )z
1 + z; z 2 U; 2 U:
By using Lemma 1.1 for = 1, we have p (z; ) g (z; ) h (z; ), z 2 U , 2 U , i.e.
RIm;;lf(z; )
z g (z; ) = 1
nz1n
Z z
0
h (t; ) t1n1dt =
1
nz1n
Z z
0
t1n1
+ (2 ) t1 + t
dt
= 2 + 2( )nz
1n
Z z
0
t1n1
1 + tdt; z 2 U; 2 U:
Theorem 2.7 Let g (z; ) be a convex function such that g (0; ) = 1 and let h be the function h (z; ) =g (z; ) + zg0z (z; ), z 2 U; 2 U .If ; ; l 0, n;m 2 N; f 2 An and the strong di¤erential subordination
zRIm+1;;lf (z; )
RIm;;lf (z; )
!0z
h (z; ) , z 2 U; 2 U; (2.15)
holds, thenRIm+1;;lf (z; )
RIm;;lf (z; ) g (z; ) , z 2 U; 2 U;
and this result is sharp.
5
A.LUPAS,...MULTIPLIER TRANSFORMATION AND RUSCHEWEYH DERIVATIVE
28
Proof. For f 2 An , f(z; ) = z +P1
j=n+1 aj () zj we have
RIm;;lf(z; ) = z +P1
j=n+1
n1+(j1)+l
l+1
m+ (1 )Cmm+j1
oaj () z
j ; z 2 U; 2 U:Consider
p(z; ) =RIm+1;;lf(z; )
RIm;;lf (z; )=
z +P1
j=n+1
1+(j1)+l
l+1
m+1+ (1 )Cm+1m+j
aj () z
j
z +P1
j=n+1
n1+(j1)+l
l+1
m+ (1 )Cmm+j1
oaj () zj
:
We have p0z (z; ) =(RIm+1;;lf(z;))
0z
RIm;;lf(z;) p (z; ) (RI
m;;lf(z;))
0z
RIm;;lf(z;)and we obtain
p (z; ) + z p0z (z; ) =zRIm+1;;lf(z;)
RIm;;lf(z;)
0z.
Relation (2.15) becomes
p(z; ) + zp0z(z; ) h(z; ) = g(z; ) + zg0z(z; ); z 2 U; 2 U:
By using Lemma 1.2, we have
p(z; ) g(z; ); z 2 U; 2 U; i.e.RIm+1;;lf(z; )
RIm;;lf (z; ) g(z; ); z 2 U; 2 U:
Theorem 2.8 Let g (z; ) be a convex function such that g (0; ) = 1 and let h be the function h (z; ) =g (z; ) + zg0z (z; ), z 2 U; 2 U .If ; ; l 0, n;m 2 N, f 2 An and the strong di¤erential subordination
(m+ 1) (m+ 2)
zRIm+2;;lf (z; )
(m+ 1) (2m+ 1)
zRIm+1;;lf (z; )+
m2
zRIm;;lf (z; ) +
z
"(l + 1)
2
2 (m+ 1) (m+ 2)
#I (m+ 2; ; l) f (z; )
z
"2 (l + 1 )
l + 1
2
(m+ 1) (2m+ 1)#I (m+ 1; ; l) f (z; )+
z
"(l + 1 )2
2m2
#I (m;; l) f (z; ) h(z; ); z 2 U; 2 U; (2.16)
holds, then[RIm;;lf(z; )]
0z g(z; ); z 2 U; 2 U:
This result is sharp.
Proof. Let
p(z; ) =RIm;;lf (z; )
0z= (1 ) (Rmf(z; ))0z + (I (m;; l) f(z; ))
0z (2.17)
= 1 +1X
j=n+1
1 + (j 1) + l
l + 1
m+ (1 )Cmm+j1
jaj () z
j1 = 1 + pn () zn + pn+1 () z
n+1 + ::::
By using the properties of operators RIm;;l, Rm and I (m;; l), after a short calculation, we obtain
p (z; ) + zp0z (z; ) =(m+1)(m+2)
z RIm+2;;lf (z; )(m+1)(2m+1)
z RIm+1;;lf (z; )+m2
z RIm;;lf (z; )+
z
h(l+1)2
2 (m+ 1) (m+ 2)
iI (m+ 2; ; l) f (z; )
z
2(l+1)(l+1)
2 (m+ 1) (2m+ 1)
I (m+ 1; ; l) f (z; )+ z
h(l+1)2
2m2
iI (m;; l) f (z; ) :
6
A.LUPAS,...MULTIPLIER TRANSFORMATION AND RUSCHEWEYH DERIVATIVE
29
Using the notation in (2.17), the di¤erential subordination becomes
p(z; ) + zp0z(z; ) h(z; ) = g(z; ) + zg0z(z; ):
By using Lemma 1.2, we have
p(z; ) g(z; ); z 2 U; 2 U; i.e.RIm;;lf(z; )
0z g(z; ); z 2 U; 2 U;
and this result is sharp.
Theorem 2.9 Let h (z; ) be a convex function such that h (0; ) = 1:If ; ; l 0, n;m 2 N, f 2 An and satises the strong di¤erential subordination
(m+ 1) (m+ 2)
zRIm+2;;lf (z; )
(m+ 1) (2m+ 1)
zRIm+1;;lf (z; )+
m2
zRIm;;lf (z; ) +
z
"(l + 1)
2
2 (m+ 1) (m+ 2)
#I (m+ 2; ; l) f (z; )
z
"2 (l + 1 )
l + 1
2
(m+ 1) (2m+ 1)#I (m+ 1; ; l) f (z; )+
z
"(l + 1 )2
2m2
#I (m;; l) f (z; ) h(z; ); z 2 U; 2 U; (2.18)
then RIm;;lf(z; )
0z g (z; ) h (z; ) , z 2 U; 2 U;
where g (z; ) = 1
nz1n
R z0h (t; ) t
1n1dt is convex and it is the best dominant.
Proof. Using the properties of operator RIm;;l and considering p (z; ) =RIm;;lf (z; )
0z, we obtain
p(z; ) + zp0z(z; ) =(m+1)(m+2)
z RIm+2;;lf (z; )(m+1)(2m+1)
z RIm+1;;lf (z; ) +m2
z RIm;;lf (z; )+
z
h(l+1)2
2 (m+ 1) (m+ 2)
iI (m+ 2; ; l) f (z; )
z
2(l+1)(l+1)
2 (m+ 1) (2m+ 1)
I (m+ 1; ; l) f (z; )+ z
h(l+1)2
2m2
iI (m;; l) f (z; ) ; z 2 U; 2 U:
Then (2.18) becomesp(z; ) + zp0z(z; ) h(z; ); z 2 U; 2 U:
By using Lemma 1.1, for = 1; we obtain p (z; ) g (z; ) h (z; ), z 2 U , 2 U; i.e.RIm;;lf(z; )
0z g (z; ) = 1
nz1n
R z0h (t; ) t
1n1dt h (z; ), z 2 U; 2 U; and g (z; ) is convex
and it is the best dominant.
Corollary 2.10 Let h(z; ) = +(2)z1+z a convex function in U U , 0 < 1. If 0, m 2 N; f 2 An
and veries the strong di¤erential subordination
(m+ 1) (m+ 2)
zRIm+2;;lf (z; )
(m+ 1) (2m+ 1)
zRIm+1;;lf (z; )+
m2
zRIm;;lf (z; ) +
z
"(l + 1)
2
2 (m+ 1) (m+ 2)
#I (m+ 2; ; l) f (z; )
z
"2 (l + 1 )
l + 1
2
(m+ 1) (2m+ 1)#I (m+ 1; ; l) f (z; )+
z
"(l + 1 )2
2m2
#I (m;; l) f (z; ) h(z; ); z 2 U; 2 U; (2.19)
7
A.LUPAS,...MULTIPLIER TRANSFORMATION AND RUSCHEWEYH DERIVATIVE
30
then RIm;;lf(z; )
0z g (z; ) h (z; ) , z 2 U; 2 U;
where g is given by g(z; ) = 2 + 2()nz
1n
R z0t1n1
1+t dt; z 2 U; 2 U: The function q is convex and it is thebest dominant.
Proof. Following the same steps as in the proof of Theorem 2.9 and considering p(z; ) =RIm;;lf(z; )
0z,
the strong di¤erential subordination (2.19) becomes
p(z; ) + zp0z(z; ) h(z; ) = + (2 )z
1 + z; z 2 U; 2 U:
By using Lemma 1.1 for = 1, we have p (z; ) g (z; ) h (z; ), z 2 U , 2 U , i.e.
RIm;;lf(z; )
0z g (z; ) = 1
nz1n
Z z
0
h (t; ) t1n1dt =
1
nz1n
Z z
0
t1n1
+ (2 ) t1 + t
dt = 2 + 2( )nz
1n
Z z
0
t1n1
1 + tdt; z 2 U; 2 U:
References
[1] A. Alb Lupas, G.I. Oros, Gh. Oros, On special strong di¤erential subordinations using S¼al¼agean andRuscheweyh operators, Journal of Computational Analysis and Applications, Vol. 14, 2012 (to appear).
[2] A. Alb Lupas, D. Breaz, A note on strong di¤erential subordinations using S¼al¼agean operator andRuscheweyh derivative, submitted 2011.
[3] A. Alb Lupas, On special strong di¤erential subordinations using multiplier transformation, submitted2011.
[4] A. Alb Lupas, G.I. Oros, Gh. Oros, A note on special strong di¤erential subordinations using multipliertransformation, Journal of Computational Analysis and Applications, Vol. 14, 2012, (to appear).
[5] A. Alb Lupas, On special strong di¤erential subordinations using a generalized S¼al¼agean operator andRuscheweyh derivative, submitted 2011.
[6] A. Alb Lupas, A note on special strong di¤erential subordinations using a generalized S¼al¼agean operatorand Ruscheweyh derivative, submitted 2011.
[7] J.A. Antonino, S. Romaguera, Strong di¤erential subordination to Briot-Bouquet di¤erential equations,Journal of Di¤erential Equations, 114 (1994), 101-105.
[8] G.I. Oros, On a new strong di¤erential subordination, (to appear).
[9] G.I. Oros, Gh. Oros, Strong di¤erential subordination, Turkish Journal of Mathematics, 33 (2009), 249-257.
8
A.LUPAS,...MULTIPLIER TRANSFORMATION AND RUSCHEWEYH DERIVATIVE
31
Global behavior of the max-type difference
equation xn+1 = max Axn−m
, 1xα
n−k
Taixiang Sun∗,1 Hongjian Xi2 Bin Qin 2
1College of Mathematics and Information Science, Guangxi University, Nanning 530004, P.R. China
2Department of Mathematics, Guangxi College of Finance and Economics, Nanning 530003, P.R. China
Abstract In this paper, we study global behavior of the following max-type differ-ence equation
xn+1 = max A
xn−m,
1xα
n−k
, n = 0, 1, . . . ,
where A ∈ (0,+∞), α ∈ (0, 1) and m, k ∈ 0, 1, 2, · · ·, and initial valuesx−l, x−l+1, · · · , x0 ∈ (0,+∞) with l = maxk, m. The special case when m = 0and k = 2 has been completely investigated by A.Gelisken and C.Cinar. Here weextend their results to the general case.
AMS Subject Classification: 39A10; 39A11.
Keywords: Max-type difference equation, Positive solution, Periodicity.
1 Introduction
In the recent years, there has been a lot of interest in studying the global behavior of, so called,
max-type difference equations, see e.g.[1-24] (see also references therein). In [9], the second order
max-type difference equation
xn+1 = max A
xn,
1xα
n−2
, n = 0, 1, . . . ,
has been studied. In this paper, we study the following max-type difference equation
xn+1 = max A
xn−m,
1xα
n−k
, n = 0, 1, . . . , (1.1)
The project is supported by NNSF of China(10861002) and NSF of Guangxi (2010GXNSFA013106) and SFof Education Department of Guangxi (200911MS212)∗ E-mail address: [email protected]
1
32
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2, 32-39, 2012, COPYRIGHT 2012 EUDOXUS PRESS LLC
where A ∈ R+ ≡ (0,+∞), α ∈ (0, 1) and m, k ∈ 0, 1, 2, · · ·, and initial values x−l, x−l+1, · · · , x0 ∈R+ with l = maxk, m.
2 The case A ≤ 1
In this section, we investigate the equation (1.1) with A ≤ 1. It is easy to see that if xn∞n=−l
is a positive solution of equation (1.1), then for all n ≥ 0,
xn+1xαn−k ≥ 1. (2.1)
Lemma 2.1. Let xn∞n=−l be a positive solution of equation (1.1) and Pn = maxxn, xn−1, · · · ,xn−2l−1, 1 for all n ≥ l + 1. Then
(1) xn+1 ≤ Pn for all n ≥ l + 1 and Pn∞n=l+1 is non-increasing.
(2) xn is bounded and moreover A/Pl+1 ≤ xn ≤ Pl+1 for any n ≥ m + l + 2.
Proof. By (2.1), we obtain that for any n ≥ l + 1,
xn+1 = max Axαn−m−k−1
xn−mxαn−m−k−1
,xα2
n−2k−1
xαn−kx
α2
n−2k−1
≤ maxAxαn−m−k−1, x
α2
n−2k−1≤ maxxn−m−k−1, xn−2k−1, 1≤ Pn.
Hence
Pn+1 = maxxn+1, xn, · · · , xn−2l, 1 ≤ Pn,
which implies that for all n ≥ l + 1,
xn ≤ Pl+1.
Furthermore, it follows that for all n ≥ m + l + 1,
xn+1 = max A
xn−m,
1xα
n−k
≥ A
Pl+1.
The proof is complete. 2
Remark 2.2. Note that from definition Pn we have that Pn ≥ 1 for all n ≥ l + 1.
Lemma 2.3. Let xn∞n=−l be a positive solution of equation (1.1) and Pn be as in Lemma
2.1. If limn−→∞ Pn = S, then lim supn−→∞ xn = S ≥ 1.
Proof. Since Pn is a subsequence of xn, it follows
S ≤ lim supn−→∞
xn.
2
T. SUN ET AL, MAX-TYPE DIFFERENCE EQUATION
33
On the other hand, by xn+1 ≤ Pn for all n ≥ l + 1, we obtain
lim supn−→∞
xn ≤ lim supn−→∞
Pn = S.
The proof is complete. 2
Theorem 2.4. Suppose that xn∞n=−l is a positive solution of equation (1.1) with A ≤ 1,
then limn−→∞ xn = 1
Proof. By Lemma 2.1 we may assume that there exist 0 < m1 < m2 < · · · < mt < · · · and
0 < n1 < n2 < · · · < nt < · · · such that
xnt+1 −→ lim infn−→∞ xn = L > 0,
xnt−m −→ L1,
xnt−k −→ L2,
xmt+1 −→ lim supn−→∞
xn = S ≥ 1,
xmt−m −→ K1,
xmt−k −→ K2.
By taking the limit in the following relationship
xmt+1 = max A
xmt−m,
1xα
mt−k
as t −→∞, it follows
S = max A
K1,
1Kα
2
=
AK1
, if AK1
≥ 1Kα
21
Kα2, if A
K1≤ 1
Kα2
≤ 1
K1, if A
K1≥ 1
Kα2
1K2
, if AK1
≤ 1Kα
2
≤ 1L
,
which implies SL ≤ 1.
We claim S = 1. Indeed, if S > 1, then by taking the limit in the following relationship
xnt+1 = max A
xnt−m,
1xα
nt−k
(2.2)
as t −→∞, we obtain
1 >1S≥ L = max A
L1,
1Lα
2
≥ (1L2
)α >1L2
≥ 1S
.
3
T. SUN ET AL, MAX-TYPE DIFFERENCE EQUATION
34
This is a contradiction. The claim is proven.
Furthermore by taking the limit in (2.2) as t −→∞, we obtain
1 =1S≥ L = max A
L1,
1Lα
2
≥ (1L2
)α ≥ 1L2
≥ 1S
= 1,
which implies limn−→∞ xn = 1. The proof is complete. 2
3 The case A > 1 and m = 0
In this section, we investigate the equation (1.1) with A > 1 and m = 0. Let xn =√
Ayn(n ≥−k), then the equation (1.1) implies the equation
yn+1 = max 1yn
,B
yαn−k
, (3.1)
where B = A−1+α
2 < 1 and initial values y−k, y−k+1, · · · , y0 ∈ R+. It is easy to see that if
yn∞n=−k is a positive solution of equation (3.1), then for all n ≥ 0,
yn+1yn ≥ 1. (3.2)
Lemma 3.1. Let yn∞n=−k be a positive solution of equation (3.1) and Qn = maxyn, yn−1, · · · ,yn−k−1, 1 for all n ≥ k + 1. Then
(1) yn+1 ≤ Qn for all n ≥ k + 1 and Qn∞n=k+1 is non-increasing.
(2) yn is bounded and moreover 1/Qk+1 ≤ yn ≤ Qk+1 for any n ≥ k + 2.
Proof. By (3.2), we obtain that for any n ≥ k + 1,
yn+1 = max yn−1
ynyn−1,
Byαn−k−1
yαn−ky
αn−k−1
≤ maxyn−1, Byαn−k−1
≤ maxyn−1, yn−k−1, 1≤ Qn.
Hence
Qn+1 = maxyn+1, yn, · · · , yn−k, 1 ≤ Qn,
which implies that for all n ≥ k + 1,
yn ≤ Qk+1.
Furthermore, it follows that for all n ≥ k + 1,
yn+1 = max 1yn
,B
yαn−k
≥ 1Qk+1
.
4
T. SUN ET AL, MAX-TYPE DIFFERENCE EQUATION
35
The proof is complete. 2
Remark 3.2. Note that from definition Qn we have that Qn ≥ 1 for all n ≥ k + 1.
Lemma 3.3. Let yn∞n=−k be a positive solution of equation (3.1) and Qn be as in Lemma
3.1. If limn−→∞Qn = S, then lim supn−→∞ yn = S ≥ 1.
Proof. Since Qn is a subsequence of yn, it follows
S ≤ lim supn−→∞
yn.
On the other hand, by yn+1 ≤ Qn for all n ≥ k + 1, we obtain
lim supn−→∞
yn ≤ lim supn−→∞
Qn = S.
The proof is complete. 2
Theorem 3.4 Let yn∞n=−k be a positive solution of equation (3.1) and Qn be as in Lemma
3.1. If limn−→∞Qn = S, then there exists N1 > 0 such that yN1+2p ≥ yN1+2(p+1) ≥ S for all
p ≥ 0, and limp−→∞ yN1+2p = S and limp−→∞ yN1+2p+1 = 1/S.
Proof For ε = 1−B1+B S, by (3.2) and Lemma 3.3 there exists N such that for any n ≥ N ,
yαn−k−1 ≤ S + ε
and
yn+1 = max yn−1
ynyn−1,
Byαn−k−1
yαn−ky
αn−k−1
≤ maxyn−1, Byαn−k−1
≤ maxyn−1, B(S + ε)= maxyn−1, S − ε.
It follows from Lemma 3.1 and Lemma 3.3 that there exist N < n1 < n2 < · · · < nk < · · · such
that ynk≥ S. By taking a subsequence we may assume that nk = 2lk + t (0 ≤ t < 2). Hence
S ≤ ynk= y2lk+t ≤ maxy2(lk−1)+t, S − ε= y2(lk−1)+t ≤ maxy2(lk−2)+t, S − ε= y2(lk−2)+t ≤ maxy2(lk−3)+t, S − ε
· · · · · · · · · · · · · · · · · ·= yn1 .
Choose N1 = n1, then yN1+2p ≥ yN1+2(p+1) ≥ S for all p ≥ 0.
On the other hand, for sufficiently large p ≥ 0,
max 1yN1+2p+1
, S ≤ yN1+2p+2 = max 1yN1+2p+1
,Byα
N1+2p−k
yαN1+2p+1−ky
αN1+2p−k
5
T. SUN ET AL, MAX-TYPE DIFFERENCE EQUATION
36
≤ max 1yN1+2p+1
, ByαN1+2p−k
≤ max 1yN1+2p+1
, B(S + ε)
= max 1yN1+2p+1
, S − ε
=1
yN1+2p+1.
Hence yN1+2p+2yN1+2p+1 = 1 and limn−→∞ yN1+2p+1 = 1/S. The proof is complete. 2
From Theorem 3.4, we get
Theorem 3.5 Suppose that xn∞n=−l is a positive solution of equation (1.1) with A > 1, then
limn−→∞ x2n and limn−→∞ x2n+1 are convergent.
Acknowledgments The project is supported by NNSF of China(10861002) and NSF of
Guangxi (0728002).
References
[1] A.M.Amleh, J.Hoag and G.Ladas, A difference equation with eventually periodic solutions,
Comput. Math. Appl., 36(1998), pp 401-404.
[2] K.Berenhaut, J.Foley and S.Stevic, Boundedness character of positive solution of a max
difference equation, J.Difference Equ. Appl. 12(2006), pp1193-1199.
[3] J.Bibby, Axiomatisations of the average and a further generalization of monotonic sequences,
Glasgow Math. J., 15(1974), pp63-65.
[4] W.J.Bride, E.A.Grove, G.Ladas and L.C.Mcgrath, On the nonautonomous equation xn+1 =
maxAn/xn, Bn/xn−1, in: Proceedings of the Third International Conference on Differ-
ence equations and Applications, September 1-5, 1997, Taipei, Taiwan(New York: Gordon
and Breach Science Publishers), 1999, pp49-73.
[5] W.J.Bride, E.A.Grove, C.M.Kent and G.Ladas, Eventually periodic solutions of xn+1 =
max1/xn, An/xn−1, Communication in Applied Nonlinear Analysis, 6(1999), pp31-34.
[6] Y.Chen, Eventually periodicity of xn+1 = max1/xn, An/xn−1 with periodic coefficients,
J. Difference Equ. Appl., 11(2005), pp1289-1294.
[7] C.Cinar, S.Stevic and I.Yalcinkaya, On positive solutions of a reciprocal difference equation
with minimum, J. Appl. Math & Computing, 17(2005), pp307-314.
[8 J.Feuer, On the eventual periodicity of xn+1 = max1/xn, An/xn−1 with a period-four
parameter, J. Difference Equ. Appl., 12(2006), pp467-486.
6
T. SUN ET AL, MAX-TYPE DIFFERENCE EQUATION
37
[9] A.Gelisken and C.Cinar, On the global attractivity of a max-type difference equation, Dis-
crete Dyn. Nat. Soc., Vol.2009, Article ID 812674, (2009), 5 pages.
[10] E.A.Grove, C.Kent, G.Ladas and M.A.Radin, On xn+1 = max1/xn, An/xn−1 with a
period 3 parameter, Fields Institute Communication, 29(2001),pp161-180.
[11] E.A.Grove and G.Ladas, Periodicities in nonlinear difference equations, Chapman & Hall/CRC,
Press, 2005.
[12] Bratislav D. Iricanin1 and E. M. Elsayed, On the max-type difference equation xn+1 =
maxA/xn, xn−3, Discrete Dyn. Nat. Soc., Vol.2010, Article ID 675413, (2010), 13 pages.
[13] C.M.Kent and M.A.Radin, On the boundedness nature of positive solutions of the difference
equation xn+1 = maxAn/xn, Bn/xn−1 with periodic parameters, Dyn. Contin. Discrete
Impuls. Syst. Ser.B Appl. Algorithms, 2003, suppl., pp11-15.
[14] W.T.Patula and H.D.Voulov, On a max type recurrence relation with periodic coefficients,
J.Difference Equ. Appl., 10(2004), pp329-338.
[15] D. Simsek, B. Demir and C. Cinar, On the solutions of the system of difference equations
xn+1 = maxA/xn, yn/xn, yn+1 = maxA/yn, xn/yn, Discrete Dyn. Nat. Soc., Vol.2009,
Article ID 325296, (2009), 11 pages.
[16] S.Stevic, Global stability of a max-type difference equation, Applied Math. Comput.,
216(2010), pp354-356.
[17] S.Stevic, A global convergence result, Indian J. Math., 44(2002), pp361-368.
[18] S.Stevic, Asymptotic behaviour of a nonlinear difference equation, Indian J. Pure Appl.
Math., 34(2003), pp1681-1687.
[19] S.Stevic, On the recursive sequence xn+1 = A + (xpn/xr
n−1), Discrete Dyn. Nat. Soc.,
Vol.2007, Article ID40963,(2007), 9 pages.
[20] S.Stevic, On the recursive sequence xn+1 = maxc, xpn/xp
n−1, Appl. Math. Letter,
21(2008), pp791-796.
[21] F.Sun, On the asymptotic behavior of a difference equation with maximum, Discrete Dyn.
Nat. Soc., Vol.2008, Article ID243291,(2008), 4 pages.
[22] I.Szalkai, On the periodicity of the sequence xn+1 = maxA0/xn, · · · , Ak/xn−k, J. Differ-
ence Equations Appl., 5(1999), pp25-29.
[23] H.D.Voulov, Periodic solutions to a difference equation with maximum, Proc. Amer. Math.
Soc., 131(2003), pp2155-2160.
7
T. SUN ET AL, MAX-TYPE DIFFERENCE EQUATION
38
[24] H.D.Voulov, On the periodic nature of the solutions of the reciprocal difference equation
with maximum, J. Math. Anal. Appl., 296(2004), pp32-43.
8
T. SUN ET AL, MAX-TYPE DIFFERENCE EQUATION
39
A General System Of Quadratic Functional Equations In
Non-Archimedean Fuzzy Menger Normed Spaces
1M. B. Ghaemi and 2H. Majani
1,2Department of Mathematics, Iran University of Science and Technology,
Narmak, Tehran, Iran.
E-mails:[email protected], [email protected].
Abstract. In this paper, we prove the generalized Hyers–Ulam–Rassias stability for a general system of quadratic func-
tional equations in non–Archimedean fuzzy Menger normed spaces. Our results notably generalize previous papers in
this topic and by the method of our paper, one can prove many various general systems of n functional equations and n
variables (n ∈ N) in fuzzy normed spaces.
Keywords: Quadratic Functional Equations, Non-Archimedean Fuzzy Menger Normed spaces, Generalized Hyers–Ulam–
Rassias stability.
1. Introduction and preliminaries
A. K. Katsaras[21] introduced an idea of a fuzzy norm on a linear space in 1984, in the same year
Wu and Fang[34] introduced a notion of fuzzy normed space to give a generalization of the Kolmogoroff
normalized theorem for fuzzy topological linearspaces. In 1992, Felbin[10] introduced an alternative
definition of a fuzzy norm on a linear space with an associated metric of Kaleva and Seikkala type(see
[19]). Xiao and Zhu[35] studied the linear topological structures of fuzzy normed linear spaces. In 1994,
Cheng and Mordeson introduced a definition of a fuzzy norm on a linear space in such a way that the
corresponding induced fuzzy metric is of Kramosiland Michalek type[23]. In 2003, Bag and Samanta[5]
modified the definition of Cheng and Mordeson[6] by removing a regular condition. Following D.
Mihet[24] and modifying the definition of a fuzzy normed space in [4], A. K. Mirmostafaee and M.
02000 Mathematics Subject Classification: 39B22, 39B82, 46S10, 46S40.
40
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2, 40-52, 2012, COPYRIGHT 2012 EUDOXUS PRESS LLC
2 M. B. Ghaemi and H. Majani
Sal Moslehian[26] introduced non–Archimedean fuzzy normed spaces. Recently D. Mihet[25] restated
definition of them. Although many results in the classical normed space theory have a non–Archimedean
counterpart, their proofs are different and require a rather new kind of intuition [3, 8, 27, 28, 33].
In 1897, Hensel[15] has introduced a normed space which does not have the Archimedean property.
During the last three decades theory of non–Archimedean spaces has gained the interest of physicists for
their research in particular in problems coming from quantum physics, p–adic strings and superstrings
[22]. One may note that |n| ≤ 1 in each valuation field, every triangle is isosceles and there may be no
unit vector in a non–Archimedean normed space; cf. [27]. These facts show that the non–Archimedean
framework is of special interest.
Definition 1.1. Let K be a field. A valuation mapping on K is a function | · | : K → R such that for
any a, b ∈ K we have
(i) |a| ≥ 0 and equality holds if and only if a = 0,
(ii) |ab| = |a||b|,
(iii) |a + b| ≤ |a|+ |b|.
A field endowed with a valuation mapping will be called a valued field. If the condition (iii) in the
definition of a valuation mapping is replaced with
(iii)′ |a + b| ≤ max|a|, |b|
then the valuation | · | is said to be non–Archimedean. The condition (iii)′ is called the strict triangle
inequality. By (ii), we have |1| = | − 1| = 1. Thus, by induction, it follows from (iii)′ that |n| ≤ 1 for
each integer n. We always assume in addition that | · | is non trivial, i.e., that there is an a0 ∈ K such
that |a0| 6∈ 0, 1. The most important examples of non-Archimedean spaces are p–adic numbers.
Example 1.2. Let p be a prime number. For any non–zero rational number a = pr mn such that m
and n are coprime to the prime number p, define the p–adic absolute value |a|p = p−r. Then | · | is a
M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES
41
A General System Of Quadratic ... 3
non–Archimedean norm on Q. The completion of Q with respect to | · | is denoted by Qp and is called
the p–adic number field.
Definition 1.3. A triangular norm (briefly t–norm, [30]) is a binary operation T : [0, 1]× [0, 1] → [0, 1]
which is commutative, associative, non–decreasing in each variable and has 1 as the unit element.
Basic examples are the Lukasiewicz t–norm TL, TL(a, b) = max(a + b − 1, 0), the product t–norm TP ,
TP (a, b) = ab and the strongest triangular norm TM , TM (a, b) = min(a, b).
Now we recall definition of a non–Archimedean fuzzy Menger normed space which is given in [25]
and [26].
Definition 1.4. Let X be a linear space over a non–Archimedean field K and T be a continuous t–
norm. A function N : X × R → [0, 1] is said to be a non–Archimedean fuzzy Menger norm on X if for
all x, y ∈ X and all s, t ∈ K,
(N1) N(x, c) = 0 for c ≤ 0;
(N2) x = 0 if and only if N(x, c) = 1 for all c > 0;
(N3) N(cx, t) = N(x, t|c| ) if c 6= 0;
(NA4) N(x + y, maxs, t) ≥ T (N(x, s), N(y, t));
(N5) limt→∞N(x, t) = 1.
If N is a non–Archimedean fuzzy Menger norm on X, then the triple (X, N, T ) is called a non–
Archimedean fuzzy Menger normed space.
It follows from (NA4) that N(x, .) is non–decreasing for every x ∈ X. Also one can show that the
condition (NA4) is equivalent to the following condition:
N(x + y, t) ≥ T (N(x, t), N(y, t)).
M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES
42
4 M. B. Ghaemi and H. Majani
Definition 1.5. Let (X, N, T ) be a non–Archimedean fuzzy Menger normed space. Let xn be a
sequence in X. Then xn is said to be convergent if there exists x ∈ X such that
limn→∞N(xn − x, t) = 1, for all t > 0. In that case, x is called the limit of the sequence xn and we
denote it by N − lim xn = x. A sequence xn in X is called Cauchy if for each ε > 0 and each t > 0
there exists n0 such that for all n ≥ n0 and all p > 0 we have N(xn+p − xn, t) > 1− ε.
Let T be a given t–norm. Then (by associativity) a family of mappings Tn : [0, 1] → [0, 1], n ∈ N, is
defined as follows:
T 1(x) = T (x, x) , Tn(x) = T (Tn−1(x), x) , x ∈ [0, 1].
For three important t–norms TM , TP and TL we have
TnM (x) = x , Tn
P (x) = xn , TnL (x) = max(n + 1)x− n, 0 , n ∈ N.
Definition 1.6. (Hadzic[13]) A t–norm T is said to be of H–type if a family of functions Tn(t);
n ∈ N , is equicontinuous at t = 1, that is,
∀ε ∈ (0, 1) ∃δ ∈ (0, 1) : t > 1− δ ⇒ Tn(t) > 1− ε (n ≥ 1).
The t-norm TM is a trivial example of t–norm of H–type, but there are t-norms of H–type with
T 6= TM (see, e.g., Hadzic[12]).
Lemma 1.7. We consider the notations of the definition(1.5). Also assume that T is a t–norm of
H–type. Then the sequence xn is Cauchy if for each ε > 0 and each t > 0 there exists n0 such that
for all n ≥ n0 we have N(xn+1 − xn, t) > 1− ε.
M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES
43
A General System Of Quadratic ... 5
Proof. Due to
N(xn+p − xn, t) ≥ T (N(xn+p − xn+p−1, t), N(xn+p−1 − xn, t)) ≥
T (N(xn+p − xn+p−1, t), T (N(xn+p−1 − xn+p−2, t), N(xn+p−2 − xn, t))) ≥
...
≥ T (N(xn+p − xn+p−1, t), T (N(xn+p−1 − xn+p−2, t), · · · ,
T (N(xn+2 − xn+1, t), N(xn+1 − xn, t))) · · · ),
and by the assumption, T is an H–type t–norm, the sequence xn is Cauchy if for each ε > 0 and each
t > 0 there exists n0 such that for all n ≥ n0 we have N(xn+1−xn, t) > 1−ε. We will use this criterion
in this paper.
It is easy to see that every convergent sequence in a non–Archimedean fuzzy Menger normed space is
Cauchy. If each Cauchy sequence is convergent, then the fuzzy Menger norm is said to be complete and
the non–Archimedean fuzzy Menger normed space is called a non–Archimedean fuzzy Menger Banach
space.
The first stability problem concerning group homomorphisms was raised by Ulam[32] in 1940 and
solved in the next year by Hyers[14]. Hyers’ theorem was generalized by Aoki[2] for additive mappings
and by Th. M. Rassias[29] for linear mappings by considering an unbounded Cauchy difference. In
1994, a generalization of the Rassias theorem was obtained by Gavruta[11] by replacing the unbounded
Cauchy difference by a general control function.
The functional equation
f(x + y) + f(x− y) = 2f(x) + 2f(y) (1.1)
is related to a symmetric bi–additive function [1, 20]. It is natural that this equation is called a quadratic
functional equation. In particular, every solution of the quadratic equation(1.1) is said to be a quadratic
function. It is well known that a function f : X → Y where X and Y are real vector spaces, is quadratic
if and only if there exists a unique symmetric bi–additive function B such that f(x) = B(x, x) for all
M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES
44
6 M. B. Ghaemi and H. Majani
x. The bi–additive function B is given by
B(x, y) =14(f(x + y)− f(x− y)).
The Hyers-Ulam stability problem for the quadratic functional equation was solved by F. Skof[31]. S.
Czerwik[7] proved the Hyers–Ulam–Rassias stability of the equation(1.1). Later, S.-M. Jung[17] has
generalized the results obtained by Skof and Czerwik. Eshaghi Gordji and Khodaei [9] obtained the
general solution and the generalized Hyers–Ulam–Rassias stability of the following quadratic functional
equation for a, b ∈ Z\0 with a 6= ±1,±b,
f(ax + by) + f(ax− by) = 2a2f(x) + 2b2f(y) (1.2)
Throughout this paper, unless otherwise explicitly stated, we assume that u ∈ R, i,m, n ∈ N ∪ 0,
K is a non–Archimedean field, T is an H–type continuous t–norm, (Y, N, T ) be a non–Archimedean
fuzzy Menger Banach space over K, (Z,M, T ) be a non–Archimedean fuzzy Menger normed space over
K and X be a vector space over K. Also assume f : Xn → Y be a mapping. We consider following
general system of quadratic functional equations:
f(a1x1 + b1y1, x2, ..., xn) + f(x1, ..., xn−1, anxn − bnyn) =
2a21f(x1, x2, ..., xn) + 2b2
1f(x1, ..., xn);
...
f(x1, ..., xn−1, anxn + bnyn) + f(x1, ..., xn−1, anxn − bnyn) =
2a2nf(x1, ..., xn) + 2b2
nf(x1, ..., xn−1, yn);
(1.3)
for all xi, yi ∈ X and ai, bi ∈ K \ 0 with ai 6= ±1,±bi , i = 1, ..., n.
In this paper, we establish the generalized Hyers–Ulam–Rassias stability of system(1.3) in non–
Archimedean fuzzy Menger Banach space .
2. Main Results
In this section, we prove the fuzzy generalized Hyers–Ulam–Rassias stability of system(1.3).
M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES
45
A General System Of Quadratic ... 7
Theorem 2.1. Let ϕi : Xn+1 → Z for i ∈ 1, ..., n be a mapping such that
ϕmi = ϕm
i (x1, ..., xi, yi, ..., xn, u) =
T
M(
12a2m+2
1 ...a2m+2i a2m
i+1...a2mn
ϕi(am+11 x1, ..., a
m+1i−1 xi−1, a
mi xi, 0, am
i+1xi+1, ..., amn xn), u
),
N(
b2ia2m+21 ...a2m+2
i a2mi+1...a2m
n
f(am+11 x1, ..., a
m+1i−1 xi−1, 0, am
i+1xi+1, ..., amn xn), u
);
Φm1 = Φm
1 (x1, y1, x2, ..., xn, u) = ϕm1 (x1, y1, x2, ..., xn, u);
Φmi = Φm
i (x1, ..., xi, yi, ..., xn, u) =
T(ϕm
i (x1, ..., xi, yi, ..., xn, u),Φmi−1(x1, ..., xi−1, yi−1, ..., xn, u)
);
limm→∞Φmn = 1;
(2.1)
and
Ψ1 = Ψ1(x1, ..., xn, yn, u) = Φ1n(x1, ..., xn, yn, u);
Ψm = Ψm(x1, ..., xn, yn, u) = T(Φm
n (x1, ..., xn, yn, u),Ψm−1(x1, ..., xn, yn, u));
Ψ = Ψ(x1, ..., xn, yn, u) = limm→∞Ψm(x1, ..., xn, yn, u) = 1.
(2.2)
and
limm→∞
M( 1
a2m1 ...a2m
n
ϕi(am1 x1, ..., a
mi xi, a
mi yi, ..., a
mn xn), u
)= 1; (2.3)
for all u > 0 and xi, yi ∈ X and ai ∈ K \ 0 with ai 6= ±1,±bi , i = 1, ..., n. Let f : Xn → Y be a
mapping satisfying
N(f(a1x1 + b1y1, x2, ..., xn) + f(a1x1 − b1y1, x2, ..., xn)−
2a21f(x1, ..., xn)− 2b2
1f(y1, x2, ..., xn), u)≥ M
(ϕ1(x1, y1, x2, ..., xn), u
);
...
N(f(x1, ..., xn−1, anxn + bnyn) + f(x1, ..., xn−1, anxn − bnyn)−
2a2nf(x1, ..., xn)− 2b2
nf(x1, ..., xn−1, yn), u)≥ M
(ϕn(x1, ..., xn, yn), u
);
M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES
46
8 M. B. Ghaemi and H. Majani
for all u > 0 and xi, yi ∈ X and ai, bi ∈ K \ 0 with ai 6= ±1,±bi , i = 1, ..., n. Then there exists a
unique mapping F : Xn → Y satisfying (1.3) and
N(f(x1, ..., xn)− F (x1, ..., xn), u
)≥ Ψ (2.4)
for all u > 0 and xi ∈ X, i = 1, ..., n.
Proof. Fix i ∈ 1, 2, ..., n and consider the following inequality.
N(f(x1, x2, ..., aixi + biyi, ..., xn) + f(x1, x2, ..., aixi − biyi, ..., xn)−
2a2i f(x1, ..., xn)− 2b2
i f(x1, x2, ..., yi, ..., xn), u)≥ M
(ϕi(x1, ..., xi, yi, ..., xn), u
).
(2.5)
Let yi = 0 in (2.5). Then we get
N(f(x1, ..., xn)− 1
a2i
f(x1, x2, ..., aixi, ..., xn), u)≥
T
M( 1
2a2i
ϕi(x1, ..., xi, 0, xi+1, ..., xn), u), N
( b2i
a2i
f(x1, ..., xi−1, 0, xi+1, ..., xn), u)
Hence
N( 1
a21...a
2i−1
f(a1x1, ..., ai−1xi−1, xi, ..., xn)− 1a21...a
2i
f(a1x1, ..., aixi, xi+1, ..., xn), u)≥
T
M( 1
2a21...a
2i
ϕi(a1x1, ..., ai−1xi−1, xi, 0, xi+1, ..., xn), u),
N( b2
i
a21...a
2i
f(a1x1, ..., ai−1xi−1, 0, xi+1, ..., xn), u)
.
So we have
N( 1
a2m+21 ...a2m+2
i−1 a2mi ...a2m
n
f(am+11 x1, ..., a
m+1i−1 xi−1, a
mi xi, ..., a
mn xn)−
1a2m+21 ...a2m+2
i a2mi+1...a
2mn
f(am+11 x1, ..., a
m+1i xi, a
mi+1xi+1, ..., a
mn xn), u
)≥
T
M( 1
2a2m+21 ...a2m+2
i a2mi+1...a
2mn
ϕi(am+11 x1, ..., a
m+1i−1 xi−1, a
mi xi, 0, am
i+1xi+1, ..., amn xn), u
),
N( b2
i
a2m+21 ...a2m+2
i a2mi+1...a
2mn
f(am+11 x1, ..., a
m+1i−1 xi−1, 0, am
i+1xi+1, ..., amn xn), u
)= ϕm
i .
Therefore we obtain
N( 1
a2m+21 ...a2m+2
n
f(am+11 x1, ..., a
m+1n xn)− 1
a2m1 ...a2m
n
f(am1 x1, ..., a
mn xn), u
)≥ Φm
n . (2.6)
M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES
47
A General System Of Quadratic ... 9
for all m ∈ N ∪ 0. Hence by (2.1) and (2.6) the sequence
1a2m1 ...a2m
n
f(am1 x1, ..., a
mn xn)
is Cauchy. By completeness of Y , we conclude that it is convergent. Therefore we can define F : Xn → Y
by
limm→∞
N(F (x1, ..., xn)− 1
a2m1 ...a2m
n
f(am1 x1, ..., a
mn xn), u
)= 1, (2.7)
for all u > 0 , xi ∈ X and ai ∈ K \ 0 with ai 6= ±1,±bi , i = 1, ..., n. Using induction with (2.6) and
(2.2), we obtain
N(f(x1, ..., xn)− 1
a2m1 ...a2m
n
f(am1 x1, ..., a
mn xn), u
)≥ Ψm. (2.8)
By taking m to approach infinity in (2.8) and using (2.2) one obtains (2.4).
For i ∈ 1, 2, ..., n and by (2.5) and (2.7), we get
N(F (x1, x2, ..., aixi + biyi, ..., xn) + F (x1, x2, ..., aixi − biyi, ..., xn)−
2a2i F (x1, ..., xn)− 2b2
i F (x1, ..., xi−1, yi, xi+1, ..., xn), u)
=
limm→∞
N( 1
a2m1 ...a2m
n
f(am1 x1, ..., a
mi (aixi + biyi), ..., am
n xn)+
1a2m1 ...a2m
n
f(am1 x1, ..., a
mi (aixi − biyi), ..., am
n xn)−
2a2i
a2m1 ...a2m
n
f(am1 x1, ..., a
mi xi, ..., a
mn xn)− 2b2
i
a2m1 ...a2m
n
f(am1 x1, ..., a
mi yi, ..., a
mn xn), u
)≥
limm→∞
M( 1
a2m1 ...a2m
n
ϕi(am1 x1, ..., a
mi xi, a
mi yi, ..., a
mn xn), u
).
(2.9)
By (2.3) and (2.9), we conclude that F satisfies (1.3).
M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES
48
10 M. B. Ghaemi and H. Majani
Suppose that there exists another mapping F ′ : Xn → Y which satisfies (1.3) and (2.4). So we have
N(F (x1, ..., xn)− F ′(x1, ..., xn), u
)=
limm→∞
N( 1
a2m1 ...a2m
n
F (am1 x1, ..., a
mn xn)− 1
a2m1 ...a2m
n
f(am1 x1, ..., a
mn xn)+
1a2m1 ...a2m
n
f(am1 x1, ..., a
mn xn)− 1
a2m1 ...a2m
n
F ′(am1 x1, ..., a
mn xn), u
)≥
T
Ψ(am1 x1, ..., a
mn xn, yn, |a2m
1 ...a2mn |u
),Ψ
(am1 x1, ..., a
mn xn, yn, |a2m
1 ...a2mn |u
),
which tends to 1 as m →∞ by (2.2). Therefore F = F ′. This completes the proof.
In the manner of proof of Theorem(2.1), one can prove the following corollary.
Corollary 2.2. Let ϕi : Xn+1 → Z for i ∈ 1, ..., n be a mapping such that
ϕmi = ϕm
i (x1, ..., xi, yi, ..., xn, u) =
M(
12a2m+2
1 ...a2m+2i a2m
i+1...a2mn
ϕi(am+11 x1, ..., a
m+1i−1 xi−1, a
mi xi, 0, am
i+1xi+1, ..., amn xn), u
);
Φm1 = Φm
1 (x1, y1, x2, ..., xn, u) = ϕm1 (x1, y1, x2, ..., xn, u);
Φmi = Φm
i (x1, ..., xi, yi, ..., xn, u) =
T(ϕm
i (x1, ..., xi, yi, ..., xn, u),Φmi−1(x1, ..., xi−1, yi−1, ..., xn, u)
);
limm→∞Φmn = 1;
and
Ψ1 = Ψ1(x1, ..., xn, yn, u) = Φ1n(x1, ..., xn, yn, u);
Ψm = Ψm(x1, ..., xn, yn, u) = T(Φm
n (x1, ..., xn, yn, u),Ψm−1(x1, ..., xn, yn, u));
Ψ = Ψ(x1, ..., xn, yn, u) = limm→∞Ψm(x1, ..., xn, yn, u) = 1.
and
limm→∞
M( 1
a2m1 ...a2m
n
ϕi(am1 x1, ..., a
mi xi, a
mi yi, ..., a
mn xn), u
)= 1;
M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES
49
A General System Of Quadratic ... 11
for all u > 0 and xi, yi ∈ X and ai ∈ K \ 0 with ai 6= ±1,±bi , i = 1, ..., n. Let f : Xn → Y be a
mapping satisfying
N(f(a1x1 + b1y1, x2, ..., xn) + f(a1x1 − b1y1, x2, ..., xn)−
2a21f(x1, ..., xn)− 2b2
1f(y1, x2, ..., xn), u)≥ M
(ϕ1(x1, y1, x2, ..., xn), u
);
...
N(f(x1, ..., xn−1, anxn + bnyn) + f(x1, ..., xn−1, anxn − bnyn)−
2a2nf(x1, ..., xn)− 2b2
nf(x1, ..., xn−1, yn), u)≥ M
(ϕn(x1, ..., xn, yn), u
);
for all xi, yi ∈ X and ai, bi ∈ K \ 0 with ai 6= ±1,±bi , i = 1, ..., n. Assume that f(x1, x2, ..., xn) = 0
if xi = 0 for some i = 1, ..., n. Then there exists a unique mapping F : Xn → Y satisfying (1.3) and
N(f(x1, ..., xn)− F (x1, ..., xn), u
)≥ Ψ
for all u > 0 and xi ∈ X, i = 1, ..., n.
References
[1] J. Aczel and J. Dhombres, Functional Equations in Several Variables, Cambridge Univ. Press, 1989.
[2] T. Aoki, On the stability of the linear transformation in Banach spaces. J. Math. Soc. Japan 2 (1950) 64–66.
[3] L. M. Arriola and W. A. Beyer, Stability of the Cauchy functional equation over p−adic fields, Real Anal. Exchange
31 (2005/2006), 125–132.
[4] T. Bag, S. K. Samanta, Fuzzy bounded linear operators, Fuzzy Sets Syst. 151 (2005) 513-547.
[5] T. Bag, S. K. Samanta, Finite dimensional fuzzy normed linear spaces, J. Fuzzy Math. 11 (3) (2003) 687705.
[6] S. C. Cheng, J. N. Mordeson, Fuzzy linear operator and fuzzy normed linear spaces, Bull. Calcutta Math. Soc. 86
(1994) 429-436.
[7] S. Czerwik, On the stability of the quadratic mapping in normed spaces, Abh. Math. Sem. Univ. Hamburg 62 (1992)
59–64.
[8] M. Eshaghi Gordji and H. Khodaei, Stability of Functional Equations, LAP LAMBERT Academic Publishing, 2010.
[9] M. Eshaghi Gordji and H. Khodaei, On the generalized Hyers–Ulam–Rassias stability of quadratic functional equa-
tions, Abs. App. Anal. Volume 2009, Article ID 923476, 11 pages.
[10] C. Felbin, Finite dimensional fuzzy normed linear space, Fuzzy Sets Syst. 48 (1992) 239-248.
M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES
50
12 M. B. Ghaemi and H. Majani
[11] P. Gavruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings, J. Math. Anal.
Appl. 184 (1994) 431-436.
[12] O. Hadzic, Fixed point theorems for multivalued mappings in probabilistic metric spaces, Fuzzy Sets Syst. 88 (1997)
219–226.
[13] O. Hadzic, A fixed point theorem in Menger spaces, Publ. Inst. Math. (Beograd) T 20 (1979) 107–112.
[14] D.H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. 27 (1941) 222–224.
[15] K. Hensel, Uber eine neue Begrundung der Theorie der algebraischen Zahlen, Jahresber. Deutsch. Math. Verein 6
(1897) 83–88.
[16] K.W. Jun, H.M. Kim, The generalized Hyers–Ulam–Rassias stability of a cubic functional equation. J. Math. Anal.
Appl. 274 (2002) 867–878.
[17] S.-M. Jung, Stability of the quadratic equation of Pexider type, Abh. Math. Sem. Univ. Hamburg 70 (2000) 175–190.
[18] K.W. Jun, H.M. Kim, I.S. Chang, On the Hyers-Ulam stability of an Euler-Lagrange type cubic functional equation,
J. Comput. Anal. Appl. 7 (2005) 21–33.
[19] O. Kaleva, S. Seikkala, On fuzzy metric spaces, Fuzzy Sets Syst. 12 (3) (1984) 215-229.
[20] Pl. Kannappan, Quadratic functional equation and inner product spaces, Results Math. 27 (1995) 368–372.
[21] A. K. Katsaras, Fuzzy topological vector spaces II, Fuzzy Sets Syst. 12 (1984) 143-154.
[22] A. Khrennikov, non–Archimedean Analysis: Quantum Paradoxes, Dynamical Systems and Biological Models, Kluwer
Academic Publishers, Dordrecht, 1997.
[23] I. Kramosil, J. Michalek, Fuzzy metric and statistical metric spaces, Kybernetika 11 (1975) 326-334.
[24] D. Mihet, Fuzzy ψ-contractive mappings in non-Archimedean fuzzy metric spaces, Fuzzy Sets Syst. 159 (2008) 739-
744.
[25] D. Mihet, The stability of the additive Cauchy functional equationin non-Archimedean fuzzy normed spaces, Fuzzy
Sets Syst. 161 (2010) 2206-2212.
[26] A. K. Mirmostafaee, M. S. Moslehian, Stability of additive mappings in non–Archimedean fuzzy normed spaces,
Fuzzy Sets Syst. 160 (2009) 1643-1652.
[27] L. Narici, E. Beckenstein, Strange terrain—non–Archimedean spaces, Am. Math. Mon. 88 (9) (1981) 667-676.
[28] C. Park, D.H. Boo and Th.M. Rassias, Approximately addtive mappings over p-adic fields, J. Chungcheong Math.
Soc. 21 (2008) 1–14.
[29] Th.M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 (1978) 297–300.
[30] B.Schweizer, A.Sklar, Probabilistic Metric Spaces, North-Holland, NewYork, 1983.
[31] F. Skof, Proprieta locali e approssimazione di operatori, Rend. Sem. Mat. Fis. Milano (1983) 113–129.
[32] S.M. Ulam, Problems in Modern Mathematics, Chapter VI, Science Editions, Wiley, New York, 1964.
M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES
51
A General System Of Quadratic ... 13
[33] V. S. Vladimirov, I. V. Volovich and E. I. Zelenov, p-adic Analysis and Mathematical Physics, World Scientific, 1994.
[34] C.Wu ,J. Fang, Fuzzy generalization of Kolmogoroff s theorem, J. Harbin Inst. Technol. (1) (1984) 1-7 (in Chinese,
English abstract).
[35] J. -Z. Xiao, X. -H. Zhu, Fuzzy normed spaces of operators and its completeness, Fuzzy Sets Syst. 133 (2003) 389-399.
M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES
52
A Note on Horner’s Method
Tian-Xiao He1 and Peter J.-S. Shiue 2
1Department of Mathematics and Computer Science
Illinois Wesleyan University
Bloomington, IL 61702-2900, USA2Department of Mathematical Sciences, University of Nevada, Las Vegas
Las Vegas, NV 89154-4020, USA
Abstract
Here we present an application of Horner’s method in evaluatingthe sequence of Stirling numbers of the second kind. Based onthe method, we also give an efficient way to calculate the differ-ence sequence and divided difference sequence of a polynomial,which can be applied in the Newton interpolation. Finally, wesurvey all of the results in Proposition 1.4.
AMS Subject Classification: 05A15, 65B10, 33C45, 39A70, 41A80.
Key Words and Phrases: Horner’s method, Stirling numbersof the second kind, divided difference, Newton interpolation.
1 Introduction
The number of ways of partition a set of n elements into k nonemptysubsets is called the Stirling number of the second kind, denoted byS(n, k). In other words, S(n, k) is the number of equivalence relationswith k classes on a finite set with n elements. From [3], S(n, k) equals
1
53
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2, 53-64, 2012, COPYRIGHT 2012 EUDOXUS PRESS LLC
2 T. X. He and P. J.-S. Shiue
S(n, k) =1
k!
k∑j=0
(−1)j
(k
j
)(k − j)n
=1
k!
k∑j=1
(−1)k−j
(k
j
)jn
=1
k!∆ktn
∣∣∣∣t=0
. (1)
As a division algorithm, Horner’s method is a nesting techniquerequiring only nmultiplications and n additions to evaluate an arbitrarynth-degree polynomial, which can be surveyed by Horner’s theorem(see, for example, [1]).
Theorem 1.1 Let
P (x) = adxd + ad−1x
d−1 + · · ·+ a1x+ a0.
If bd = ad and
bk = ak + bk+1x0, k = n− 1, n− 2, . . . , 1, 0,
then b0 = P (x0), and P (x) can be written as
P (x) = (x− x0)Q(x) + b0,
where
Q(x) = bdxd−1 + bd−1x
d−2 + · · ·+ b2x+ b1.
The theorem can be proved using a direct calculation. An additionaladvantage of Horner’s method is the differentiation of P (x):
P ′(x) = Q(x) + (x− x0)Q′(x).
Hence, P ′(x0) = Q(x0), which is very convenient when applying New-ton’s method to find roots of a polynomial.
Example 1 As an example, we use Horner’s method to evaluate P (x) =x4− 2x2 + 3x− 4 at x0 = −1. First we construct the synthetic divisionas follows.
T.X.HE, P.J. SHIUE, HORNER'S METHOD
54
Horner’s Method 3
x0 = −1 a4 = 1 a3 = 0 a2 = −2 a1 = 3 a0 = −4
b4x0 = −1 b3x0 = 1 b2x0 = 1 b1x0 = −4
b4 = 1 b3 = −1 b2 = −1 b1 = 4 b0 = −8
Hence,
x4 − 2x2 + 3x− 4 = (x+ 1)(x3 − x2 − x+ 4)− 8.
In [6], Pathan and Collyer present an excellent survey on Horner’smethod and its application in solving polynomial equations by deter-mining the location of roots. In this note, we shall give other appli-cations of Horner’s method in the calculation of Stirling numbers ofthe second kind, the difference sequences, and the divided differencesequences (or equivalently, the coefficients of Newton interpolation) ofpolynomials. There are numerous ways to evaluate a Stirling numbersequence or Stirling matrix. For example, in [4], El-Mikkawy gives analgorithm based on Newton’s divided difference interpolating polyno-mials. In [2], Cheon and Kim present a method based on the relation-ship between the Stirling matrix and other combinatorial sequencessuch as the Vandermonde matrix, the Bernoulli numbers, and Eule-rian numbers. However, our algorithm of calculating Stirling numbersequences based on Horner’s method is different and efficient, whichcontains an idea suitable for constructing algorithms in calculation ofmany sequences. This general idea will be presented in Proposition 1.4.
From Proposition 1.4.2 of [7], if the polynomial f(n) of degree ≤ dis expanded in terms of the basis
(nk
), 0 ≤ k ≤ d, then the coefficients
are ∆kf(0), namely,
f(n) =d∑
k=0
∆kf(0)
(n
k
)=
d∑k=0
∆kf(0)
k!(n)k, (2)
where (n)k = n(n−1) · · · (n−k+1) are the falling factorial polynomials.In particular, for f(n) = nd, we have ∆0f(0) = f(0) = 0 and
nd =d∑
k=1
∆k0d
(n
k
)=
d∑k=1
S(d, k)(n)k, (3)
T.X.HE, P.J. SHIUE, HORNER'S METHOD
55
4 T. X. He and P. J.-S. Shiue
where the rightmost equation comes from (1). Therefore, we may givethe following algorithm to find out the kth order difference of f at 0and Stirling numbers of the second order from (2) and (3) respectively.
Algorithm 1.2 Write (2) as
f(n) = (n− 0)
(∆0f(0) + (n− 1)
(∆1f(0)
1!+ (n− 2)
(∆2f(0)
2!+ · · ·
+(n− d+ 1)∆df(0)
d!
))· · ·).
Use synthetic division to obtain f(n)/(n − 0), a polynomial of degreed− 1, with the constant term ∆0f(0). Then, evaluate (f(n)/(n− 0)−∆0f(0))/(n−1) to find the quotient polynomial of degree d−2 includingits constant term ∆1f(0). Continue this process until a single constantis left, which is ∆df(0)/d!. Or equivalently, Use Horner’s method tofind
f(n) = (n− 0)f1(n), deg f1(n) ≤ d− 1,
where the constant term of f1(n) is ∆0f(0). Then, use Horner’s methodagain to evaluate
f1(n) = (n− 1)f2(n), deg f2(n) ≤ d− 2,
which contain the constant term ∆1f(0)/1!. Continue the process andfinally obtain
fd−1 = (n− d+ 1)fd(n), fd(n) = ∆df(0)/d!.
When f(n) = nd, from (3) it can be seen that the above algo-rithm provides a way to evaluate the Stirling numbers of the secondkind S(d, 1), S(d, 2), . . ., S(d, d) defined by (1).
Example 2 Consider f(n) = n4 − 2n2 + 3n− 4. We use the followingsynthetic division to find out its difference sequence from order 0 to 4.
T.X.HE, P.J. SHIUE, HORNER'S METHOD
56
Horner’s Method 5
0 1 0 −2 3 −4
0 0 0 0
1 1 0 −2 3 −4
1 1 −1
2 1 1 −1 2
2 6
3 1 3 5
3
1 6
Hence, ∆0f(0) = f(0) = −4, ∆1f(0) = 2, ∆2f(0) = 5(2!) = 10, and∆3f(0) = 6(3!) = 36, and ∆4f(0) = 1(4!) = 24, which can be read onthe diagonal from the top right to the bottom line.
Example 3 From expansion (see, for examples, [3] and [7])
n4 =4∑
k=1
S(4, k)(n)k,
or equivalently,
n3 = S(4, 1) + (n− 1)(S(4, 2) + (n− 2)(S(4, 3) + (n− 3)S(4, 4))),
we may use the following division to evaluate S(4, k) (k = 1, 2, 3, 4).
1 1 0 0 0
1 1 1
2 1 1 1 1
2 6
3 1 3 7
3
1 6
T.X.HE, P.J. SHIUE, HORNER'S METHOD
57
6 T. X. He and P. J.-S. Shiue
Hence, we can read S(4, 1) = 1, S(4, 2) = 7, S(4, 3) = 6, and S(4, 4) = 1diagonally from the top right to the bottom line. In addition, the firstcalculation gives 1, 0, 0, 0, 0, the second calculation 1, 1, 1, 1, , thethird calculation 1, 3, 7, and the fourth calculation 1, 6, which arerespectively the first, second, third, and fourth row of the table of theStirling numbers of the second kind. In other words, the division of xd
by x− j generates S(d, j), S(d− 1, j), · · · , S(j, j).From (3) we immediately know that S(d, d) = 1 because it is the
coefficient of nd. Using our method, one may calculate the matricesrelated to Stirling numbers easily, for example, matrices Tn and Wn
defined by (2) and (16) in [8].Algorithm 1.2 can also be used to evaluate non-centeral Stirling
numbers of the second kind (cf. [5]) defined by
(x− a)d =d∑
k=0
Sa(d, k)(x)k
with a parameter a. In fact, a similar argument can be used to calculateSa(d, k) by using the transformation x− a 7→ x in Algorithm 1.2.
From Theorem 1.1 we also know that Horner’s method providessimple algorithms to evaluate divided differences and derivatives of apolynomial, and the former can be used to find the coefficients of theNewton interpolation while the latter can be used to approximate thezeros of the polynomial with any required significant digits.
Let X = x0, x1, . . . , xd be a set of d + 1 distinct points, and letf(x) be a polynomial of degree d. Then we can write f(x) in terms ofits Newton interpolation form on the set X as
f(x) = f [x0] + f [x0, x1](x− x0) + f [x0, x1, x2](x− x0)(x− x1) + · · ·+f [x0, x1, . . . , xd](x− x0)(x− x1) · · · (x− xd−1), (4)
where f [x0] = f(x0) and f [x0, x1, . . . xk] is the kth order divided differ-ence of f at x0, x1, . . . , xk defined by
f [x0, x1, . . . xk] =1
xk − x0
(f [x1, x2, . . . , xk]− f [x0, x1, . . . , xk−1])
for k = 1, 2, . . . , d, and can be evaluated using the following algorithm.
T.X.HE, P.J. SHIUE, HORNER'S METHOD
58
Horner’s Method 7
Algorithm 1.3 Write (4) as
f(x) = f [x0] + (x− x0) (f [x0, x1] + (x− x1) (f [x0, x1, x2] + · · ·+(x− xd−1)f [x0, x1, . . . , xd])) ,
where f [x0] = f(x0). Use synthetic division to obtain (f(x)−f(x0))/(x−x0), a polynomial of degree d−1, with the constant term f [x0, x1]. Then,evaluate (f(x)−f(x0))/(x−x0)−f [x0, x1])/(x−x1) to find the quotientpolynomial of degree d−2 and its constant term f [x0, x1, x2]. Continuethis process until a single constant is left, which is f [x0, x1, . . . , xd]. Orequivalently, Use Horner’s method to find
f(x)− f(x0) = (x− x0)f1(x), deg f1(x) ≤ d− 1,
where the constant term of f1(x) is f [x0, x1]. Then, use Horner’smethod again to evaluate
f1(x) = (x− x1)f2(x), deg f2(x) ≤ d− 2,
which contains the constant term f [x0, x1, x2]. Continue the processand finally to obtain
fd−1 = (x− xd−1)fd(x), fd(n) = f [x0, x1, . . . , xd].
Example 4 To find the divided differences of f(x) = x4− 2x2 + 3x− 4on the set −1, 0, 1, 3, 4, we consider f(x)−f(−1) = x4−2x2 + 3x+ 4and use the following synthetic division to obtain its divided differenceat the given knot points.
−1 1 0 −2 3 4
−1 1 1 −4
0 1 −1 −1 4 0
0 0 0
1 1 −1 −1 4
1 0
3 1 0 −1
3
1 3
T.X.HE, P.J. SHIUE, HORNER'S METHOD
59
8 T. X. He and P. J.-S. Shiue
Hence, f [−1] = f(−1) = −8, f [−1, 0] = 4, f [−1, 0, 1] = −1, f [−1, 0, 1, 3] =3, and f [−1, 0, 1, 3, 4] = 1. It can be seen that the new method is mucheasier than the traditional method.
Let r be a real number, and let f(x) be a polynomial of degree d.Then, using the Taylor expansion of f(x) yields
f(x) = f(r) + f ′(r)(x− r) +f ′′(r)
2!(x− r)2 + · · ·+ f (d)(r)
d!(x− r)d, (5)
which can written recursively as
f(x)−f(r) = (x−r)f1(x), fk(x) = (x−r)fk+1(x), k = 1, 2, . . . , d−1,
and the constant term of fk(x) is f (k)(r)/k! (k = 1, 2, . . . , d). Thus wemay apply Horner’s method to find all derivatives of f at r. Obviously,for polynomial
g(x) = f(r) + f ′(r)x+f ′′(r)
2!x2 + · · ·+ f (d)(r)
d!xd, (6)
the roots of g(x) = 0 are the roots of equation f(x) = 0, each dimin-ished by r. We can use the process to diminish a root of the proposedequation by its first digit. Then we apply it again to diminish the cor-responding root of the resulting equation by its first digit, which is thesecond digit of the required root of the original equation. Using thisprocess continuously, we finally approximate the root of the originalequation f(x) = 0 to the required significant digits. More details canbe found in [9]. Here is an example.
Example 5 Consider equation f(x) = x4 − 2x2 + 3x − 4 = 0, whichhas a root in the interval (1, 2). We may use (6) to find g(x), wherer = 1. The process can be shown in the following synthetic division.
T.X.HE, P.J. SHIUE, HORNER'S METHOD
60
Horner’s Method 9
1 1 0 −2 3 −4
1 1 −1 2
1 1 −1 2 −2
1 2 1
1 2 1 3
1 3
1 3 4
1
1 4
Hence, we obtain
f(1) = −2, f ′(1) = 3,f ′′(1)
2!= 4,
f ′′′(1)
3!= 4,
f (4)(1)
4!= 1,
and the corresponding
g(x) = −2 + 3x+ 4x2 + 4x3 + x4.
Therefore the new equation is g(x) = 0. Multiply the root by 10 andchange the equation to be
x4 + 40x3 + 400x2 + 3000x− 20000 = 0.
It is easy to see that g(x) has a root between 3 and 4. Thus we mayuse (6) again to generate a new polynomial and solve the correspondingequation.
T.X.HE, P.J. SHIUE, HORNER'S METHOD
61
10 T. X. He and P. J.-S. Shiue
3 1 40 400 3000 −20000
3 129 1587 13761
1 43 529 4587 −6239
3 138 2001
1 46 667 6588
3 147
1 49 814
3
1 52
The above table shows that an approximation of the original polynomialequation to its second significant digit is 1.3, and the third significantdigit can be found using the polynomial equation
x4 + 52x3 + 814x2 + 6588x− 6239 = 0.
Multiply the root by 10 to change the equation to be
x4 + 520x3 + 81400x2 + 6588000x− 62390000 = 0,
which has a root in the interval (8, 9). Thus, the original polynomialequation f(x) = x4 − 2x2 + 3x − 4 = 0 has a root of approximately1.38, and its better approximation with more significant digits can befound from the equation
x4 + 552x3 + 94264x2 + 7992288x− 4206064 = 0
generated by using the following table. Since x4 + 552x3 + 94264x2 +7992288x − 4206064 = 0 has a root between 5 and 6, we obtain theroot of original equation with four significant digits as 1.385.
T.X.HE, P.J. SHIUE, HORNER'S METHOD
62
Horner’s Method 11
8 1 520 81400 6588000 −62390000
8 4224 684992 58183936
1 528 85624 7272992 −4206064
8 4288 719296
1 536 89912 7992288
8 4352
1 544 94264
8
1 552
From Example 5, one may find Horner’s method is not an efficientway to evaluate the roots of polynomial equations, but it is a faster wayto find out the coefficients of the expansions of polynomials in terms ofnested bases formed by products of linear polynomials.
Proposition 1.4 Let φk(x) = akx− bk, k = 1, 2, . . ., and let f(x) be apolynomial of degree d. Then
f(x) = c0 +d∑
k=1
ckΠkj=1φj(x), (7)
where ck (k = 0, 1, . . . , d) can be found using the synthetic divisionbased on Horner’s method.
One may see the examples of Proposition 1.4 from the algorithmsapplied to the expansions (2)-(5). Interested readers may also constructexamples for any polynomial expansion defined by (7). For instance,we may calculate the binomial sequence
(nk
)(k = 0, 1, . . . , n) for n ∈ N
by applying Horner’s method to the expansion
xn =n∑
k=0
(n
k
)(x− 1)k.
T.X.HE, P.J. SHIUE, HORNER'S METHOD
63
12 T. X. He and P. J.-S. Shiue
References
[1] R. L. Burden and J. D. Faires, Numerical Analysis, 8th Edition,Thomson Brooks/Cole, Belmont, CA, USA, 2005.
[2] G.-S. Cheon and J.-S. Kim, Factorial Stirling matrix and relatedcombinatorial sequences, Linear Algebra and its Applications, 357(2002), 247-258.
[3] L. Comtet, Advanced Combinatorics, Reidel, Dordrecht, 1974.
[4] M. E. A. El-Mikkawy, A note on the Stirling matrix of the secondkind, Applied Mathematics and Computation, 151 (2004) 147-151.
[5] M. Koutras, Noncentral Stirling numbers and some applications.Discrete Math. 42 (1982), no. 1, 73–89.
[6] A. Pathan and T. Collyer, The wonder of Horner’s method, Math-ematical Gazette, 87 (2003), No. 509, 230-242.
[7] R. Stanley, Enumerative Combinatorics Vol. 1, Cambridge Uni-versity Press, New York, 1997.
[8] W. Wang and T. Wang, Remarks on two special matrices, ArsCombinatoria, 94 (2010), 521-535.
[9] T. E. Whittaker and G. Robinson, The Ruffini-Horner Method,53 in The Calculus of Observations: A Treatise on NumericalMathematics, 4th ed. New York: Dover, pp. 100-106, 1967.
T.X.HE, P.J. SHIUE, HORNER'S METHOD
64
COMMON FIXED POINT RESULTS WITH APPLICATIONS
IN CONVEX METRIC SPACES
SAFEER HUSSAIN KHAN and MUJAHID ABBAS
Abstract The notion of metric convexity introduced by Takahashi [24] is em-
ployed to obtain sucient conditions for the existence of a common xed point
for a Banach operator pair of mappings satisfying generalized contractive con-
ditions. As an application, related results on best approximation are derived.
Our results generalize various known results in contemporary literature.
|||||||||||||||
Keywords and Phrases: Convex metric space, common xed point, best
approximation, Banach operator pair.
2000 Mathematics Subject Classication: 47H09, 47H10, 47H19, 54H25.
|||||||||||||||
1. INTRODUCTION and PRELIMINARIES
Metric xed point theory is a branch of xed point theory which nds
its primary applications in functional analysis. The interplay between the
geometry of Banach spaces and xed point theory has been very strong and
fruitful. In particular, geometric conditions on mappings and/or underlying
spaces play a crucial role in metric xed point problems. Although it has a
purely metric avor, it is also a major branch of nonlinear functional analysis
with close ties to Banach space geometry, see for example [10] and references
mentioned therein. Several results concerning the existence and approxima-
tion of a xed point of a mapping rely on convexity hypotheses and geometric
properties of the Banach spaces. Takahashi [24] introduced the notion of a
convexity on metric spaces. Afterwards, Ciric [6], Ding [7], Goebel and Kirk
[9], Guay et al [11], Shimizu and Takahashi[20, 21] and other authors have
studied xed point theorems in convex metric spaces (see also [4]). On the
other hand, Shahzad[19] introduced a class of noncommuting mappings called
R-subweakly commuting mappings, and thus obtained common xed points
of S-nonexpansive mappings in normed spaces. Recently, Chen and Li [5] in-
1
65
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2, 65-76, 2012, COPYRIGHT 2012 EUDOXUS PRESS LLC
troduced the class of Banach operator pairs as a new class of noncommuting
maps. In this paper, common xed points for Banach operator pair of map-
pings which are more general than Cq-commuting mappings, are obtained in
the setting of a convex metric space. As an application, invariant approxima-
tion results for these mappings are also derived.
For the sake of convenience, we gather some basic denitions and set out
the terminology needed in the sequel.
Denition 1.1. Let (X; d) be a metric space. A mapping W : X X
[0; 1] ! X is said to be a convex structure on X; if, for each (x; y; ) 2
X X [0; 1] and u 2 X;
d(u;W (x; y; )) d(u; x) + (1 )d(u; y):
A metric space X together with a convex structureW is called a convex metric
space. Obviously, W (x; x; ) = x:
LetX be a convex metric space. A nonempty subset E ofX is said to be convex
if W (x; y; ) 2 E whenever (x; y; ) 2 E E [0; 1]. A subset E of a convex
metric space is said to be q-starshaped or starshaped with respect to q if there
exists q in E such that W (x; q; ) 2 E whenever (x; ) 2 E [0; 1]. Obviously,
q- starshaped subsets ofX contain all convex subsets ofX as a proper subclass.
Takahashi [24] has shown that open spheres B(x; r) = fy 2 X : d(y; x) < rg
and closed spheres B[x; r] = fy 2 X : d(y; x) rg are convex in a convex
metric space X. A convex metric space X is said to have property (A) if:
d(W (y; x; );W (z; x; )) d(y; z), for all x; y; z 2 X and 2 (0; 1): Property
(A) is a convex metric space analogue of condition (I) for the starshaped metric
spaces of Guay et al, see Denition 3.2 [11]. Throughout this paper, a convex
metric space X is assumed to have property (A):
Note that every normed space is a convex metric space. Takahashi [24] has
also shown that there are convex metric spaces which cannot be embedded in
any normed space .
Example 1.2. Let X = f(x1; x2; x3) 2 R3 : x1; x2; x3 > 0g: For x =
2
S.H. KHAN, M.ABBAS: COMMON FIXED POINT...
66
(x1; x2; x3); y = (y1; y2; y3) and z = (z1; z2; z3) in X; and ; ; 2 [0; 1] with
+ + = 1; dene a mapping W : X3 [0; 1]3 ! X by,
W (x; y; z; ; ; ) = (x1 + x2 + x3; y1 + y2 + y3; z1 + z2 + z3);
and a metric d : X X ! [0;1) by, d(x; y) = jx1y1 + x2y2 + x3y3j : Here X
is a convex metric space but it is not a normed space.
Example 1.3. Let X = f(x1; x2) 2 R2 : x1; x2 > 0g: For x = (x1; x2);
y = (y1; y2) in X; and 2 [0; 1]: Dene a mapping W : XX [0; 1]! X by
W (x; y; ) = (x1 + (1 )y1;x1x2 + (1 )y1y2x1 + (1 )y1
);
and a metric d : X X ! [0;1) by d(x; y) = jx1 y1j+ jx1x2 y1y2j : It can
be veried that X is a convex metric space but not a normed space.
Denition 1.4. Let T; S : X ! X: A point x 2 X is called:
(1) a xed point of T if Tx = x;
(2) a coincidence point of the pair fT; Sg if Tx = Sx;
(3) a common xed point of the pair fT; Sg if x = Tx = Sx:
F (T ); C(T; S) and F (T; S) denote the set of all xed points of T; the set of all
coincidence points of the pair fT; Sg; and the set of all common xed points
of the pair fT; Sg; respectively.
Denition 1.5. Let E be a q-starshaped subset of a convex metric space
X: Let T; S : X ! X ; q 2 F (S) and E be both T and S invariant. Put
Y Txq = fy : y = W (Tx; q; ) and 2 [0; 1]g;
and for each x in X; d(Sx; Y Txq ) = inffd(Sx; y) : 2 [0; 1]g. The map T is
said to be:
(1) an S-contraction if there exists k 2 (0; 1) such that
d(Tx; Ty) kd(Sx; Sy);
(2) asymptotically S-nonexpansive if there exists a sequence fkng; kn 1;
with limn!1
kn = 1 such that d(Tnx; T ny) kn d(Sx; Sy) for each x; y in E
3
S.H. KHAN, M.ABBAS: COMMON FIXED POINT...
67
and n 2 N: If kn = 1 for all n 2 N, then T is called an S- nonexpansive
mapping. If S = I (the identity map), then T is an asymptotically
nonexpansive mapping;
(3) R-weakly commuting if there exists a real number R > 0 such that
d(STx; TSx) Rd(Tx; Sx)
for all x in E;
(4) R-subweakly commuting if there exists a real number R > 0 such that
d(TSx; STx) Rd(Sx; Y Txq )
for all x 2 E;
(5) Cq-commuting if STx = TSx for all x 2 Cq(S; T ); where Cq(S; T ) =
[fC(S; Tk) : 0 k 1g and Tkx = W (Tx; q; k):
Clearly Cq-commuting maps are weakly compatible but the converse is not
true in general ( see for example [2] ).
A self mapping T on a convex metric space X is said to be
(6) ane on E if
T (W (x; y; )) = W (Tx; Ty; )
for all x; y 2 E and 2 (0; 1);
(7) uniformly asymptotically regular on E if for each " > 0; there exists a
positive integer N such that d(T nx; T n+1x) < " for all n N and for all x in
E:
The ordered pair (T; I) of two self maps of a metric space (X; d) is called
a Banach operator pair if the set F (I) is T -invariant, namely T (F (I))
F (I). Obviously, any commuting pair (T; I) is a Banach operator pair but not
conversely in general, see [5]. If (T; I) is a Banach operator pair then (I; T )
need not be a Banach operator pair (cf. Example 1 [5]). If the self-maps T
and I of X satisfy
d(ITx; Tx) kd(Ix; x)
4
S.H. KHAN, M.ABBAS: COMMON FIXED POINT...
68
for all x 2 X and k 0, then (T; I) is a Banach operator pair.
Example 1.6. Let X = R with usual metric and M = [1;1): Let T (x) = x2
and I(x) = 2x1; for all x 2M . Let q = 1: ThenM is convex with q 2 F (I),
F (I) = f1g and Cq(I; T ) = [1;1). Note that the pair (T; I) is Banach
operator but T and I are not Cq-commuting maps and hence not R-subweakly
commuting maps.
2. COMMON FIXED POINT RESULTS
In this section, the existence of common xed points of Banach operator
pair of mappings is established in a convex metric space. The following result
is a consequence of ([14], Theorem 2.1).
Theorem 2.1. Let M be a subset of a metric space (X; d), and I and T
be weakly compatible self-maps of M . Assume that clT (M) I(M), clT (M)
is complete, and T and I satisfy for all x; y 2M and 0 h < 1;
d(Tx; Ty) hmax fd(Ix; Iy); d(Ix; Tx); d(Iy; Ty); d(Ix; Ty); d(Iy; Tx)g :
Then M \ F (I) \ F (T ) is a singleton.
The following result extends and improves Lemma 3.1 of [5] and Theorem 1
in [16].
Lemma 2.2. LetM be a nonempty subset of a metric space (X; d), and (T; I)
be a Banach operator pair on M . Assume that clT (M) is complete, and T
and I satisfy for all x; y 2M and 0 h < 1;
d(Tx; Ty) hmax fd(Ix; Iy); d(Tx; Ix); d(Ty; Iy); d(Tx; Iy); d(Ty; Ix)g :
(2.1)
If I is continuous and F (I) is nonempty, then there exists a unique common
xed point of T and I.
Proof. By our assumptions, T (F (I)) F (I) and F (I) is nonempty and closed.
Moreover, cl(T (F (I))) being subset of cl(T (M)) is complete. Further, for all
x; y 2 F (I), we have by inequality (2.1),
d(Tx; Ty) hmaxfd(Ix; Iy); d(Ix; Tx); d(Iy; Ty); d(Iy; Tx); d(Ix; Ty)g
= hmaxfd(x; y); d(x; Tx); d(y; Ty); d(y; Tx); d(x; Ty)g:
5
S.H. KHAN, M.ABBAS: COMMON FIXED POINT...
69
Hence T is a generalized contraction on F (I) and cl(T (F (I))) cl(F (I)) =
F (I). By Theorem 2.1, T has a unique xed point z in F (I) and consequently
F (I) \ F (T ) is singleton.
The following result presents an analogue of Lemma 3.3 [3] for Banach operator
pair without linearity of I.
Lemma 2.3. Let I and T be self-maps on a nonempty q-starshaped subset
M of a convex metric space X. Assume that I is continuous and F (I) is q-
starshaped with q 2 F (I), (T; I) is a Banach operator pair on M and satisfy
for each n 1
d(T nx; T ny) knmax
8<: d(Ix; Iy); dist(Ix; Y Tnx
q ); dist(Iy; Y Tny
q );
dist(Ix; Y Tny
q ; dist(Iy; Y Tnx
q )
9=; (2.2)
for all x; y 2 M , where fkng is a sequence of real numbers with kn 1 and
limn!1
kn = 1. For each n 1, dene a mapping Tn on M by
Tnx = W (Tnx; q; n);
where n =nknand fng is a sequence of numbers in (0; 1) such that lim
n!1n =
1. Then for each n 1, Tn and I have exactly one common xed point xn in
M such that
Ixn = xn = W (Tnx; q; n);
provided cl(Tn(M)) is complete for each n.
Proof. By denition,
Tnx = W (Tnx; q; n):
As (T; I) is a Banach operator pair, for each n 1, T n(F (I)) F (I) and
F (I) is nonempty and closed. Since F (I) is q-starshaped and T nx 2 F (I), for
each x 2 F (I), Tnx = W (T nx; q; n) 2 F (I). Thus (Tn; I) is Banach operator
pair for each n. Also by (2.2),
d(Tnx; Tny) = d(W (T nx; q; n);W (Tny; q; n))
nd(Tnx; T ny)
6
S.H. KHAN, M.ABBAS: COMMON FIXED POINT...
70
nmaxfd(Ix; Iy); dist(Ix; Y Tnx
q ); dist(Iy; Y Tny
q );
dist(Ix; Y Tny
q ; dist(Iy; Y Tnx
q )g
nmaxfd(Ix; Iy); d(Ix; Tnx); d(Iy; Tny);
d(Ix; Tny); d(Iy; Tnx)g
for each x; y 2M . By Lemma 2.2, for each n 1, there exists a unique xn 2M
such that xn = Ixn = Tnxn: Thus for each n 1, M \ F (Tn) \ F (I) 6= :
The following result extends the recent results due to Chen and Li ([5], The-
orems 3.2-3.3) to asymptotically I-nonexpansive maps.
Theorem 2.4. Let I and T be self-maps on a q-starshaped subset M of a
convex metric spaceX. Assume that (T; I) is Banach operator pair onM , F (I)
is q-starshaped with q 2 F (I), I is continuous, T is uniformly asymptotically
regular and asymptotically I-nonexpansive. Then F (T ) \ F (I) 6= ; provided
cl(T (M)) is compact and T is continuous.
Proof. Notice that compactness of cl(T (M)) implies that clTn(M) is compact
and thus complete. From Lemma 2.3, for each n 1, there exists xn 2 M
such that xn = Ixn = W (Tnx; q; n): As T (M) is bounded, so d(xn; T
nxn) =
d(W (T nx; q; n); Tnxn)) (1 n)d(T nxn; q) ! 0 as n ! 1. Since (T; I) is
Banach operator pair and Ixn = xn, so ITnxn = T
nIxn = Tnxn and thus we
get
d(xn; Txn) = d(xn; Tnxn) + d(T
nxn; Tn+1xn) + d(T
n+1xn; Txn)
d(xn; Tnxn) + d(T
nxn; Tn+1xn) + k1d(IT
nxn; Ixn)
= d(xn; Tnxn) + d(T
nxn; Tn+1xn) + k1d(T
nxn; xn):
Further, T is uniformly asymptotically regular, therefore we have
d(xn; Txn) d(xn; T nxn) + d(T nxn; T n+1xn) + k1d(T nxn; xn)! 0;
as n ! 1. Since cl(T (M)) is compact, there exists a subsequence fTxmg of
fTxng such that Txm ! y as m !1. By the continuity of I and T and the
fact d(xm; Txm)! 0, we have y 2 F (T ) \ F (I): Thus F (T ) \ F (I) 6= :
7
S.H. KHAN, M.ABBAS: COMMON FIXED POINT...
71
Corollary 2.5([5], Theorems 3.2-3.3). Let I and T be self-maps on a q-
starshaped subset M of a normed space X. Assume that (T; I) is Banach
operator pair on M , F (I) is q-starshaped with q 2 F (I), I is continuous and
T is I-nonexpansive. Then F (T ) \ F (I) 6= ; provided cl(T (M)) is compact.
Corollary 2.6 ([1], Theorem 2.2 and [13], Theorem 6). Let I and T be self-
maps on a q-starshaped subset M of a normed space X. Assume that (T; I) is
commuting pair onM , F (I) is q-starshaped with q 2 F (I), I is continuous and
T is I-nonexpansive. Then F (T ) \ F (I) 6= ; provided cl(T (M)) is compact.
Meinardus [17] was the rst to employ a xed point theorem to prove the ex-
istence of an invariant approximation in Banach spaces. Subsequently, several
interesting and valuable results have appeared in the literature of approxima-
tion theory ( [1], [19] and [22] ).
Denition 2.7. Let X be a metric space and M be a closed subset of X:
If there exists a y0 2M such that d(x; y0) = d(x;M) = inffd(x; y) : y 2Mg;
then y0 is called a best approximation to x out of M:We denote by PM(x); the
set of all best approximations to x out of M:
Remark 2.8. Let M be a closed convex subset of a convex metric space.
As W (u; v; ) 2 M for (u; v; ) 2 M M [0; 1]; the denition of convex
structure on X implies that W (u; v; ) 2 PM(x): Hence PM(x) is a convex
subset of X: Also, PM(x) is a closed subset of X. Moreover, it can be shown
that PM(x) @M; where @M stands for the boundary of M:
Now we obtain results on best approximation as a xed point of Banach op-
erator pair of mappings in a convex metric space.
Theorem 2.9. LetM be a subset of a convex metric spaceX and I; T : X !
X be mappings such that u 2 F (I)\F (T ) for some u 2 X and T (@M \M)
M: Suppose that PM(u) is nonempty and q-starshaped, I is continuous on
PM(u), d(Tx; Tu) d(Ix; Iu) for each x 2 PM(u) and I(PM(u)) PM(u): If
(T; I) is a Banach operator pair on PM(u), F (I) is nonempty and q-starshaped
for q 2 F (I), T is uniformly asymptotically regular and asymptotically I-
nonexpansive then PM(u) \ F (I) \ F (T ) 6= ; provided T is continuous and
8
S.H. KHAN, M.ABBAS: COMMON FIXED POINT...
72
cl(T (PM(u))) is compact.
Proof. Let x 2 PM(u). Then for any h 2 (0; 1), d(W (u; x; h); u) (1
h)d(x; u) < dist(u;C). It follows that fW (u; x; h) : 0 < h < 1g and the set
M are disjoint. Thus x is not in the interior of M and so x 2 @M \M: Since
T (@M \M) M; Tx must be in M: Also Ix 2 PM(u); u 2 F (I) \ F (T ) and
I and T satisfy d(Tx; Tu) d(Ix; Iu), thus we have
d(Tx; u) = d(Tx; Tu) d(Ix; Iu)
= d(Ix; u) = dist(u;M):
It further implies that Tx 2 PM(u): Therefore T is a self map of PM(u). The
result now follows from Theorem 2.4.
The above result extends Theorem 3.2 of [1], Theorems 4.1-4.2 of [5], Theorem
7 of [13], Theorem 3 of [18], the corresponding results of [15], [16], [22], and[23].
Remarks 2.10.
(1) Theorem 2.4 extends and improves Theorems 1 and 2 of Dotson [8],
Theorem 2.2 of Al-Thaga [1], Theorem 4 of Habiniak [12] and Theorem
1 of Khan and Khan [16].
(2) As an application of Theorem 2.4, we can prove an analogue of recent
invariant approximation results in [2], namely, Theorem 3.1Theorem 4.4
for asymptotically I-nonexpansive map T for which (T; I) is a Banach
operator pair.
(3) Theorem 2.7 extends and improves Theorem 3.4 of Beg et al [3] to convex
metric spaces.
References
[1] M. A. Al-Thaga, Common xed points and best approximation, J. Ap-
prox. Theory, 85 (1996), 318-320.
9
S.H. KHAN, M.ABBAS: COMMON FIXED POINT...
73
[2] M. A. Al-Thaga and N. Shahzad, Noncommuting self maps and invariant
approximations, Nonlinear Anal., 64 (12) (2006), 2778-2786.
[3] I. Beg, D. R. Sahu and S. D. Diwan, Approximation of xed points of
uniformly R- subweakly commuting mappings, J. Math. Anal. Appl.,
324(2006), 1105-1114.
[4] I. Beg, M. Abbas and J. K. Kim, Convergence theorems of the iterative
schemes in convex metric spaces, Nonlinear Funct. Anal. and Appl., 3
(2006), 421-436.
[5] J. Chen and Z. Li, Common xed points for Banach operator pairs in
best approximation, J. Math. Anal. Appl., (2007) (in press).
[6] L. Ciric, On some discontinuous xed point theorems in convex metric
spaces, Czech. Math. J., (43)188(1993), 319-326.
[7] X. P. Ding, Iteration process for nonlinear mappings in convex metric
spaces, J. Math. Anal. Appl., 132(1988), 114-122.
[8] W. J. Dotson Jr., Fixed point theorems for nonexpansive mappings on
star-shaped subsets of Banach spaces, J. London Math. Soc., 4(1972),
408-410.
[9] K. Goebel and W. A. Kirk, Iteration process for nonexpansive mappings,
Contemporary Math., 21(1983), 115-123.
[10] K. Goebel and W. A. Kirk, Topics in Metric Fixed Point Theory, Cam-
bridge University Press, Cambridge 1990.
[11] M. D. Guay, K. L. Singh and J. H. M. Whiteld, Fixed point theorems for
nonexpansive mappings in convex metric spaces, Proceedings, Conference
on Nonlinear Analysis, Marcel Dekker Inc., New York 80 (1982), 179-189.
[12] L. Habiniak, Fixed point theorems and invariant approximation, J. Ap-
prox. Theory 56(1989), 241-244.
10
S.H. KHAN, M.ABBAS: COMMON FIXED POINT...
74
[13] G. Jungck and S. Sessa, Fixed point theorems in best approximation
theory, Math. Japon., 42(1995), 249-252.
[14] G. Jungck and N. Hussain, Compatible maps and invariant approxima-
tions, J. Math. Anal. Appl., 325(2007), 1003-1012.
[15] A. R. Khan, N. Hussain and A. B. Thaheem, Applications of xed
point theorems to invariant approximation, Approx. Theory and Appl.
16(2000), 48-55.
[16] L. A. Khan and A. R. Khan, An extension of Brosowski-Meinardus the-
orem on invariant approximations, Approx. Theory and Appl., 11(1995),
1-5.
[17] G. Meinardus, Invarianz bei linearn Approximation, Arch. Rat. Mech.
Anal., 14 (1963), 301-303.
[18] S. A. Sahab, M. S. Khan and S. Sessa, A result in best approximation
theory, J. Approx. Theory 55(1988), 349-351.
[19] N. Shahzad, Invariant approximations and R- subweakly commuting
maps, J. Math. Anal. Appl., 257 (2001), 39-45.
[20] T. Shimizu and W. Takahashi, Fixed point theorems in certain convex
metric spaces, Math. Japon., 37 (1992), 855-859.
[21] T. Shimizu and W. Takahashi, Fixed points of multivalued mappings in
certain convex metric spaces, Topol. Methods and Non Linear Analysis,
8(1996), 197-203.
[22] S. P. Singh, Application of a xed point theorem to approximation theory,
J. Approx. Theory, 25 (1979), 88-90.
[23] P. V. Subrahmanyam, An application of a xed point theorem to best
approximation, J. Approx. Theory 20(1977), 165-172.
11
S.H. KHAN, M.ABBAS: COMMON FIXED POINT...
75
[24] W. Takahashi, A convexity in metric spaces and nonexpansive mappings
I, Kodai Math. Sem. Rep., 22 (1970), 142-149.
Safeer Hussain Khan
Department of Mathematics, Statistics and Physics, Qatar University, Doha
2713, Qatar.
[email protected]; [email protected]
Mujahid Abbas
Department of Mathematics,
Lahore University of Management Sciences, 54792-Lahore, Pakistan.
12
S.H. KHAN, M.ABBAS: COMMON FIXED POINT...
76
BASIC HYPERGEOMETRIC SERIES ANDq-HARMONIC NUMBER IDENTITIES
Wenchang ChuDipartimento di Matematica
Universita del SalentoLecce–Arnesano P. O. Box 193
Lecce 73100 Italy
Nancy S. S. GuCenter for Combinatorics, LPMC
Nankai UniversityTianjin 300071, P.R. China
Abstract. The derivative operator method is systematically employed in examining fourtypical basic hypergeometric series theorems, named as the q-Chu-Vandermonde identity,the q-Pfaff-Saalschutz theorem, the q-Dougall-Dixon formula and Watson’s q-Whipple trans-formation, which establish numerous identities on q-harmonic numbers, including severalsurprising summation formulae.
1. Introduction and notations
Let N0 be the set of nonnegative integers. With the q-shifted factorial of order n ∈ N0 givenby
(x; q)0 = 1 and (x; q)n :=
n−1∏
k=0
(1 − xqk) for n = 1, 2, · · ·
we define the q-binomial coefficients[x
k
]=
(q1+x−k; q)k
(q; q)k
and
[n
k
]=
(q; q)n
(q; q)k(q; q)n−k
as well as the basic hypergeometric series
1+rφr
[a0, a1, · · · , ar
b1, · · · , br
∣∣∣ q; z
]=
∞∑
n=0
(a0; q)n(a1; q)n · · · (ar; q)n
(q; q)n (b1; q)n · · · (br; q)nzn
where for convenience, 0 < |q| < 1 will be assumed throughout the paper. See Gasper andRahman [6] for a comprehensive study of the theory of basic hypergeometric series.
2000 Mathematics Subject Classification. Primary 05A30, Secondary 33D15.Key words and phrases. Basic hypergeometric series; Derivative operator; q-harmonic number.Email addresses: [email protected] and [email protected].
77
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2, 77-98, 2012, COPYRIGHT 2012 EUDOXUS PRESS LLC
2 Wenchang Chu and Nancy S. S. Gu
For a differentiable function f(x), denote the two derivative operators by
Dxf(x) =d
dxf(x) and D0f(x) =
d
dxf(x)
∣∣∣x=0
.
Then it is easy to check the following derivatives of q-binomial coefficients at x = 0
D0
[x + m
n
]= (ln q)
[m
n
]Hm−n(q)−Hm(q),(1.1)
D0
[x + m
n
]−1
= (ln q)
[m
n
]−1
Hm(q)−Hm−n(q);(1.2)
where the q-analogue of harmonic number [1] reads as
(1.3) H0(q) = 0 and Hn(q) =
n∑
k=1
qk
1 − qkfor n = 1, 2, · · ·
which will frequently be written as Hn instead of Hn(q) for brevity.
Richard Askey has pointed out that Isaac Newton was the first to notice that the partialsums of the harmonic series arise from the differentiation of a product [10]. In the sequel,many harmonic number identities were discovered by using this differentiation method (see[1, 3, 5, 11] for example).
In this paper, we will apply further the derivative operator method to four typical ba-sic hypergeometric series formulae. Numerous identities on q-harmonic numbers will beestablished. Especially, we will examine, in detail, the q-Chu-Vandermonde identity, the q-Pfaff-Saalschutz summation theorem, the q-Dougall-Dixon formula and Watson’s q-Whippletransformation. They will present a complete coverage on the q-harmonic numbers identitiesrelated to these four fundamental q-series summation formulae.
The method can briefly be described as the following three steps:
• For a given q-series theorem, reformulating it in terms of q-binomial sum equation.• Applying the derivative operator D0 across the resulting q-binomial equation.• Writing down the q-harmonic number identities by specifying parameters.
In most cases, this procedure can be carried out through quite routine computations. How-ever there are several situations in which a limiting relation on finite q-harmonic numbersums will be required, that will be proved in the sixth section. As a documentary source forfurther references on q-harmonic number identities, ninty examples will carefully be selectedas consequences.
The rest of the paper will be organized as follows. From Section 2 to Section 5, we shallsystematically investigate the q-harmonic number identities by utilizing the aforementionedfour well-known basic hypergeometric series formulae. Then the sixth section will present aquite useful limiting relation concerning a class of finite q-sums. Finally, the paper will endup with Section 7 by comparing the classical harmonic number identities appeared in [5] andtheir q-analogues obtained in this paper.
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
78
Basic Hypergeometric Series and q-Harmonic Number Identities 3
2. The q-Chu-Vandermonde identity
Recall the q-Chu-Vandermonde convolution identity [6, Appendix II-6]
2φ1
[q−n, a
c
∣∣∣ q; q
]=
(c/a; q)n
(c; q)nan.
Performing the parameter replacements
a → q−n−µn
c → q1+λn+x
where λ, µ ∈ N0
we can equivalently restate it as the following q-binomial identity
(2.1)n∑
k=0
q(n−k)(n−k+µn)
[n + µn
k
][x + n + λn
n − k
]=
[x + 2n + λn + µn
n
].
Applying the derivative operator D0 across this equation and then appealing to (1.1), wefind the expression
n∑
k=0
q(n−k)(n−k+µn)
[n+µn
k
][n+λn
n − k
]Hλn+n−Hλn+k
=
[2n+λn+µn
n
]Hλn+µn+2n−Hλn+µn+n
.
According to the factor inside the braces · · · , splitting the left-hand side into two sumswith respect to k and then evaluating the first one by (2.1), we get immediately the followingq-harmonic number identity.
Theorem 1 (λ, µ ∈ N0).n∑
k=0
q(n−k)(n−k+µn)
[n + µn
k
][n + λn
n − k
]Hλn+k =
[2n+λn+µn
n
]Hλn+n +Hλn+µn+n −Hλn+µn+2n
.
One special case corresponding to µ = 0 reads as
(2.2)n∑
k=0
q(n−k)2
[n
k
][n + λn
n − k
]Hλn+k =
[2n + λn
n
]2Hλn+n −Hλn+2n
which can further be specialized by letting λ = 0 to the following identity
(2.3)
n∑
k=0
q(n−k)2[n
k
]2
Hk =
[2n
n
]2Hn −H2n
.
3. The q-Pfaff-Saalschutz theorem
Making the parameter replacements
a → q−n−µn−µ′x
b → q1+λn+λ′x
c → q1+νn+ν′x
where λ, µ, ν ∈ N0
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
79
4 Wenchang Chu and Nancy S. S. Gu
in the q-Pfaff-Saalschutz theorem [6, Appendix II-12]
3φ2
[q−n, a, b
c, q1−nab/c
∣∣∣ q; q
]=
(c/a; q)n(c/b; q)n
(c; q)n(c/(ab); q)n
we can reformulate it as the q-binomial equation
n∑
k=0
[nk
][k+λn+λ′x
k
][n+µn+µ′x
k
][k+νn+ν′x
k
][k+(λ−µ−ν−2)n+(λ′−µ′−ν′)x
k
]q(n−k)(n−k+µn+µ′x) =
[(λ−ν)n+(λ′−ν′)x
n
][(µ+ν+2)n+(µ′+ν′)x
n
][n+νn+ν′x
n
][(λ−µ−ν−1)n+(λ′−µ′−ν′)x
n
] .
In view of (1.1) and (1.2), we establish the following three theorems on q-harmonic sums byapplying the derivative operator D0 respectively to the cases µ′ = ν′ = 0, λ′ = ν′ = 0 andλ′ = µ′ = 0 of the last identity.
Theorem 2 (λ, µ, ν ∈ N0: λ > 1 + µ + ν).
n∑
k=0
q(n−k)(n−k+µn)
[nk
][λn+k
k
][µn+n
k
][νn+k
k
][(λ−µ−ν−2)n+k
k
]Hλn+k −H(λ−µ−ν−2)n+k
=
[(λ−ν)n
n
][(µ+ν+2)n
n
][νn+n
n
][(λ−µ−ν−1)n
n
]H(λ−ν)n−H(λ−ν−1)n+ Hλn−H(λ−µ−ν−1)n.
Theorem 3 (λ, µ, ν ∈ N0: λ > 1 + µ + ν).
n∑
k=0
q(n−k)(n−k+µn)
[nk
][λn+k
k
][µn+n
k
][νn+k
k
][(λ−µ−ν−2)n+k
k
]k −Hµn+n−k+H(λ−µ−ν−2)n+k
=
[(λ−ν)n
n
][(µ+ν+2)n
n
][νn+n
n
][(λ−µ−ν−1)n
n
]n −Hµn+n−H(1+µ+ν)n+H(2+µ+ν)n+H(λ−µ−ν−1)n
.
Theorem 4 (λ, µ, ν ∈ N0: λ > 1 + µ + ν).
n∑
k=0
q(n−k)(n−k+µn)
[nk
][λn+k
k
][µn+n
k
][νn+k
k
][(λ−µ−ν−2)n+k
k
]Hνn+k −H(λ−µ−ν−2)n+k
=
[(λ−ν)n
n
][(µ+ν+2)n
n
][νn+n
n
][(λ−µ−ν−1)n
n
]
H(1+µ+ν)n −H(µ+ν+2)n + Hνn+n
−H(λ−ν−1)n + H(λ−ν)n −H(λ−µ−ν−1)n
.
These identities contain the following interesting special cases.
Example 1 (Theorem 2: λ = 2 and µ = ν = 0).
n∑
k=0
q(n−k)2[
nk
]2[2n + kk
]H2n+k −Hk
= 2
[2nn
]2H2n −Hn
.
Example 2 (Theorem 2: λ = 3, µ = 1 and ν = 0).
n∑
k=0
q(n−k)(2n−k)[
nk
][2nk
][3n + k
k
]H3n+k−Hk
=
[3nn
]22H3n−Hn−H2n
.
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
80
Basic Hypergeometric Series and q-Harmonic Number Identities 5
Example 3 (Theorem 2: λ = 3, µ = 0 and ν = 1).n∑
k=0
q(n−k)2[
nk
]2[3n + k2n
]H3n+k −Hk
=
[3nn
]2H2n + H3n − 2Hn
.
Example 4 (Theorem 3: λ = 2 and µ = ν = 0).n∑
k=0
q(n−k)2[
nk
]2[2n + kk
]k + Hk −Hn−k
=
[2nn
]2n + H2n −Hn
.
Example 5 (Theorem 3: λ = 3, µ = 1 and ν = 0).n∑
k=0
q(n−k)(2n−k)[nk
][2nk
][3n+k
k
]k + Hk−H2n−k
=
[3nn
]2n + Hn+H3n−2H2n
.
Example 6 (Theorem 3: λ = 3, µ = 0 and ν = 1).n∑
k=0
q(n−k)2[
nk
]2[3n + k2n
]k + Hk −Hn−k
=
[3nn
]2n + H3n −H2n
.
Example 7 (Theorem 4: λ = 3, µ = 0 and ν = 1).n∑
k=0
q(n−k)2[
nk
]2[3n + k2n
]Hn+k−Hk
=
[3nn
]23H2n − 2Hn −H3n
.
4. The terminating q-Dougall-Dixon theorem
In this section, we shall derive three summation theorems on q-harmonic numbers by exam-ining the following terminating version of the q-Dougall-Dixon formula [6, Appendix II-21]
6φ5
[a, qa
12 , −qa
12 , b, d, q−n
a12 , −a
12 , aq/b, aq/d, q1+na
∣∣∣ q;q1+na
bd
]=
(aq; q)n(aq/(bd); q)n
(aq/b; q)n(aq/d; q)n.
4.1. Firstly, making the parameter replacements
a → q−n−x
b → q1+bn
d → q1+dn
where b, d ∈ N0
we can rewrite the terminating q-Dougall-Dixon formula as the q-binomial equationn∑
k=0
qk
[nk
][x+n
k
][k+bn
k
][k+dn
k
][k−x
k
][x+bn+n
k
][x+dn+n
k
](1 − qx+n−2k) = (1 − qx)
[x+n
n
][1+x+bn+dn+n
n
][x+bn+n
n
][x+dn+n
n
]
which yields, under the derivative operator D0, the following summation theorem.
Theorem 5 (q-harmonic number identity: b, d ∈ N0).n∑
k=0
qk[
nk
]2[k+bn
k
][k+dn
k
][n+bn
k
][n+dn
k
]1 + (1−qn−2k)(2Hk−Hbn+k−Hdn+k)
=
[1+bn+dn+n
n
][n+bn
n
][n+dn
n
] .
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
81
6 Wenchang Chu and Nancy S. S. Gu
As applications, we display the following q-harmonic number identities.
Example 8 (Theorem 5: b = 0 and d → ∞).n∑
k=0
qk[
nk
]1 + (1 − qn−2k)Hk
= 1.
Example 9 (Theorem 5: b, d → ∞).n∑
k=0
qk[
nk
]21 + 2(1 − qn−2k)Hk
= (q; q)n.
Example 10 (Theorem 5: b = 1 and d → ∞).n∑
k=0
qk[
nk
][n + k
k
][2n − k
n
]1 + (1−qn−2k)(2Hk−Hn+k)
= 1.
Example 11 (Theorem 5: b = 0 and d = 1).n∑
k=0
qk[n + k
k
][2n − k
n
]1 + (1−qn−2k)(Hk−Hn+k)
=
[1 + 2n
n
].
Example 12 (Theorem 5: b = d = 1).n∑
k=0
qk[n + k
k
]2[2n − kn
]21 + 2(1−qn−2k)(Hk−Hn+k)
=
[1 + 3n
n
].
4.2. Secondly, under the parameter replacements
a → q−n−x
b → q1+bn
d → q−n−dn
where b, d ∈ N0
the terminating q-Dixon formula becomes the following q-binomial equationn∑
k=0
(1−qx+n−2k)
[nk
][x+n
k
][k+bn
k
][n+dn
k
][k−x
k
][x+bn+n
k
][k+dn−x
k
]qk+(n−k)(x−k) = (−1)n(1−qx)
[x+n
n
][x+bn−dn
n
][n+bn+x
n
][n+dn−x
n
]qdn2+(1+n2 ).
Applying the derivative operator D0 to it gives rise to the summation theorem.
Theorem 6 (q-harmonic number identity: b, d ∈ N0).n∑
k=0
qk(1+k−n)
[nk
]2 [k+bnk ][n+dn
k ][n+bn
k ][k+dnk ]
1+(1−qn−2k)(k+2Hk−Hbn+k+Hdn+k)
= (−1)n
[bn−dn
n
][n+bn
n
][n+dn
n
]qdn2+(1+n2 ).
As applications, we display the following q-harmonic number identities.
Example 13 (Theorem 6: b = 0 and d → ∞).n∑
k=0
q(1+k)(k−n)[
nk
]1 + (1−qn−2k)(k+Hk)
= 1.
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
82
Basic Hypergeometric Series and q-Harmonic Number Identities 7
Example 14 (Theorem 6: b = d = 0).
n∑
k=0
qk(1+k−n)[
nk
]21 + (1−qn−2k)(k+2Hk)
=
1, n = 0;
0, n 6= 0.
Example 15 (Theorem 6: b → ∞ and d = 0).
n∑
k=0
qk(1+k−n)[
nk
]31 + (1−qn−2k)(k+3Hk)
= (−1)nq(
1+n2 ).
Example 16 (Theorem 6: b = 0 and d = 1).
n∑
k=0
qk(1+k−n)[2nk
][2n
n+k
]1 + (1−qn−2k)(k+Hk+Hn+k)
=
[2n−1
n
]qn.
Example 17 (Theorem 6: b = 1 and d → ∞).
n∑
k=0
qk(1+k−n)[nk
][n+k
k
][2n−k
n
]1 + (1−qn−2k)(k+2Hk−Hn+k)
= qn2+n.
Example 18 (Theorem 6: b → ∞ and d = 1).
n∑
k=0
qk(1+k−n)[nk
][2nk
][2n
n+k
]1 + (1−qn−2k)(k+2Hk+Hn+k)
= (−1)nq
n2 (1+3n).
Example 19 (Theorem 6: b = 1 and d = 0).
n∑
k=0
qk(1+k−n)[nk
]2[n+kk
][2n−k
n
]1 + (1−qn−2k)(k+3Hk−Hn+k)
= (−1)nq(
1+n2 ).
4.3. Finally, carrying out the parameter replacements
a → q−n−x
b → q−n−bn
d → q−n−dn
where b, d ∈ N0
in the terminating q-Dougall-Dixon formula, we can express it as the q-binomial equationn∑
k=0
(1 − qx+n−2k)
[nk
][x+n
k
][n+bn
k
][n+dn
k
][k−x
k
][k+bn−x
k
][k+dn−x
k
]q(n−2k
2 )+x(n−2k) = (−1)n(1 − qx)
[x+n
n
][2n+bn+dn−x
n
][n+bn−x
n
][n+dn−x
n
]
which results, under the derivative operator D0, in the following summation theorem.
Theorem 7 (q-harmonic number identity: b, d ∈ N0).
n∑
k=0
q(n−2k
2 )[nk
]2
[n+bn
k
][n+dn
k
][k+bn
k
][k+dn
k
]1 + (1−qn−2k)(2k+2Hk+Hbn+k+Hdn+k)
= (−1)n
[2n+bn+dn
n
][n+bn
n
][n+dn
n
] .
As applications, we display the following q-harmonic number identities.
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
83
8 Wenchang Chu and Nancy S. S. Gu
Example 20 (Theorem 7: b, d → ∞).n∑
k=0
q(n−2k
2 )[
nk
]21 + 2(1−qn−2k)(k+Hk)
= (−1)n(q; q)n.
Example 21 (Theorem 7: b = 0 and d → ∞).n∑
k=0
q(n−2k
2 )[
nk
]31 + (1 − qn−2k)(2k + 3Hk)
= (−1)n.
Example 22 (Theorem 7: b = d = 0).n∑
k=0
q(n−2k
2 )[
nk
]41 + 2(1 − qn−2k)(k + 2Hk)
= (−1)n
[2nn
].
Example 23 (Theorem 7: b = 1 and d → ∞).n∑
k=0
q(n−2k
2 )[
nk
][2nk
][2n
n + k
]1 + (1−qn−2k)(2k+2Hk+Hn+k)
= (−1)n.
Example 24 (Theorem 7: b = 0 and d = 1).n∑
k=0
q(n−2k
2 )[nk
]2[2nk
][2n
n+k
]1 + (1−qn−2k)(2k+3Hk+Hn+k)
= (−1)n
[3nn
].
Example 25 (Theorem 7: b = d = 1).n∑
k=0
q(n−2k
2 )[2nk
]2[ 2nn+k
]21 + 2(1−qn−2k)(k+Hk+Hn+k)
= (−1)n
[4nn
].
5. Watson’s q-Whipple transformation
Watson’s q-Whipple transformation [6, Appendix III-18] is fundamental in the q-series theory
8φ7
[a, qa
12 , −qa
12 , b, c, d, e, q−n
a12 , −a
12 , aq/b, aq/c, aq/d, aq/e, q1+na
∣∣∣ q;q2+na2
bcde
]
=(aq; q)n(aq/(bd); q)n
(aq/b; q)n(aq/d; q)n× 4φ3
[q−n, b, d, aq/(ce)
aq/c, aq/e, q−nbd/a
∣∣∣ q; q
].
It will systematically be explored in five different manners to prove five transformationtheorems concerning q-binomial coefficients and q-harmonic numbers.
5.1. Making the parameter replacements
a → q−x−n
b → q1+bn
c → q1+cn
d → q1+dn
e → q1+en
where b, c, d, e ∈ N0
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
84
Basic Hypergeometric Series and q-Harmonic Number Identities 9
we can reformulate Watson’s q-Whipple transformation asn∑
k=0
(1 − qx+n−2k)
[nk
][x+n
k
][k+bn
k
][k+cn
k
][k+dn
k
][k+en
k
][k−x
k
][n+bn+x
k
][n+cn+x
k
][n+dn+x
k
][n+en+x
k
]qk(1+x+n−k)
= (1 − qx)
[x+n
n
][1+x+bn+dn+n
n
][x+bn+n
n
][x+dn+n
n
]n∑
`=0
qx`
[n`
][`+bn
`
][`+dn
`
][1+x+cn+en+n
`
][x+cn+n
`
][x+en+n
`
][1+x+bn+dn+`
`
] .
Under the derivative operator D0, this gives the following transformation theorem.
Theorem 8 (Transformation formula: b, c, d, e ∈ N0).n∑
k=0
qk(1+n−k)[
nk
]2[k+bn
k
][k+cn
k
][k+dn
k
][k+en
k
][n+bn
k
][n+cn
k
][n+dn
k
][n+en
k
]
×1 − (1−qn−2k)(k+Hbn+k+Hcn+k+Hdn+k+Hen+k−2Hk)
=
[1+bn+dn+n
n
][n+bn
n
][n+dn
n
]n∑
`=0
[n`
] [`+bn
`
][`+dn
`
][1+cn+en+n
`
][n+cn
`
][n+en
`
][1+bn+dn+`
`
].
We collect the following q-harmonic number identities as consequences.
Example 26 (Theorem 8: b = c = d = 0 and e → ∞).n∑
k=0
qk(1+n−k)[
nk
]−11 − (1 − qn−2k)(k + Hk)
= (1 − q1+n)
1 + n + Hn+1
.
Example 27 (Theorem 8: b = c = d = e = 0).n∑
k=0
qk(1+n−k)[
nk
]−21 − (1−qn−2k)(k+2Hk)
= (1−q1+n)2
1−q2+n
1 + n + 2Hn+1
.
Example 28 (Theorem 8: b = c = d = 0 and e = 1).n∑
k=0
qk(1+n−k)
[2nk
][2n
n+k
]1−(1 − qn−2k)(k + Hk + Hn+k)
=
1 − q1+2n
1 + q1+n
[2nn
]−11+n+ q1+n
1−q1+n +H2n+1
.
Example 29 (Theorem 8: b = d = 0, c = 1 and e → ∞).n∑
k=0
qk(1+n−k)
[n+k
k
][2nk
] 1 − (1 − qn−2k)(k + Hn+k)
= (1 − q1+2n)
1 + n + H2n+1 −Hn
.
Example 30 (Theorem 8: b = d = 0 and c = e = 1).
n∑
k=0
qk(1+n−k)
[n+k
k
]2
[2nk
]2
1 − (1−qn−2k)(k+2Hn+k)
= (1−q1+2n)2
1−q2+3n
1 + n + 2H2n+1 − 2Hn
.
Example 31 (Theorem 8: b, c, d → ∞ and e = 0).n∑
k=0
qk(1+n−k)[
nk
]1 − (1 − qn−2k)(k −Hk)
=
n∑
`=0
(q; q)n
(q; q)`.
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
85
10 Wenchang Chu and Nancy S. S. Gu
Example 32 (Theorem 8: b, c, d, e → ∞).
n∑
k=0
qk(1+n−k)[
nk
]21 − (1 − qn−2k)(k − 2Hk)
= (q; q)n
n∑
`=0
[n`
].
Example 33 (Theorem 8: b = d = 1, c = 0 and e → ∞).
n∑
k=0
qk(1+n−k)
[nk
][n+k
k
]2
[2nk
]2
1 − (1−qn−2k)(k+2Hn+k−Hk)
=
[1+3n
n
][2nn
]2
n∑
`=0
[n+`
`
]2
[1+2n+`
`
] .
Example 34 (Theorem 8: b = c = d = 1 and e = 0).
n∑
k=0
qk(1+n−k)[
nk
][n+k
k
]3
[2nk
]3
1−(1−qn−2k)(k+3Hn+k−Hk)
=
[1+3n
n
][2nn
]2
n∑
`=0
(1 − q1+2n)[n+`
`
]2
(1 − q1+2n−`)[1+2n+`
`
] .
Example 35 (Theorem 8: b = c = d = 1 and e → ∞).
n∑
k=0
qk(1+n−k)[
nk
]2[n+k
k
]3
[2nk
]3
1 − (1 − qn−2k)(k + 3Hn+k − 2Hk)
=
[1+3n
n
][2nn
]2
n∑
`=0
[n`
][n+`
`
]2
[2n`
][1+2n+`
`
] .
Example 36 (Theorem 8: b = c = d = e = 1).
n∑
k=0
qk(1+n−k)[
nk
]2[n+k
k
]4
[2nk
]4
1− (1− qn−2k)(k +4Hn+k − 2Hk)
=
[1+3n
n
][2nn
]2
n∑
`=0
[n`
] [n+`
`
]2[1+3n`
][2n`
]2[1+2n+``
] .
Example 37 (Theorem 8: b = 0, d = 1 and c, e → ∞).
n∑
k=0
qk(1+n−k)[n + k
k
][2n − k
n
]1−(1−qn−2k)(k+Hn+k−Hk)
=
[1 + 2n
n
] n∑
`=0
[n`
] [n+`
`
][1+n+`
`
](q; q)`.
Example 38 (Theorem 8: b, c, d → ∞ and e = 1).
n∑
k=0
qk(1+n−k)[
nk
][n + k
k
][2n − k
n
]1 − (1−qn−2k)(k+Hn+k−2Hk)
=
n∑
`=0
[2n − `
n
](q; q)n
(q; q)`.
Example 39 (Theorem 8: b = d = 1 and c, e → ∞).
n∑
k=0
qk(1+n−k)[n + k
k
]2[2n − kn
]21−(1−qn−2k)(k+2Hn+k−2Hk)
=
[1 + 3n
n
] n∑
`=0
[n`
] [n+`
`
]2
[1+2n+`
`
](q; q)`.
5.2. With the parameter replacements
a → q−x−n
b → q1+bn
c → q1+cn
d → q1+dn
e → q−n−en
where b, c, d, e ∈ N0
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
86
Basic Hypergeometric Series and q-Harmonic Number Identities 11
Watson’s q-Whipple transformation can be rewritten asn∑
k=0
(1 − qx+n−2k)
[nk
][x+n
k
][k+bn
k
][k+cn
k
][k+dn
k
][n+en
k
][k−x
k
][n+bn+x
k
][n+cn+x
k
][n+dn+x
k
][k+en−x
k
]qk
= (1−qx)[x+n
n ][1+x+bn+dn+nn ]
[x+bn+nn ][x+dn+n
n ]
n∑
`=0
(−1)`[n`
][`+bn
`
][`+dn
`
][x+cn−en
`
][n+cn+x
`
][`+en−x
`
][1+x+bn+dn+`
`
] qne`+(1+`2 ).
Applying the derivative operator D0 to it, we get the following transformation theorem.
Theorem 9 (Transformation formula: b, c, d, e ∈ N0).n∑
k=0
qk[
nk
]2[k+bn
k
][k+cn
k
][k+dn
k
][n+en
k
][n+bn
k
][n+cn
k
][n+dn
k
][k+en
k
]
×1 + (1−qn−2k)(2Hk−Hbn+k−Hcn+k−Hdn+k+Hen+k)
=
[1+bn+dn+n
n
][n+bn
n
][n+dn
n
]n∑
`=0
(−1)`
[n`
][`+bn
`
][`+dn
`
][cn−en
`
][n+cn
`
][`+en
`
][1+bn+dn+`
`
]qne`+(1+`2 ).
We collect the following q-harmonic number identities as consequences.
Example 40 (Theorem 9: b = c = d = 0 and e → ∞).n∑
k=0
qk[
nk
]−11 − (1 − qn−2k)Hk
= (q−1 − qn)Hn+1.
Example 41 (Theorem 9: b = 1, c = d = 0 and e → ∞).n∑
k=0
qk
[n+k
k
][2nk
] 1 − (1 − qn−2k)Hn+k
= (q−1−n − qn)
H2n+1 −Hn
.
Example 42 (Theorem 9: b = d = 0, c → ∞ and e = 1 with n > 0).n∑
k=0
qk
[2nk
][n+k
k
]1 + (1 − qn−2k)Hn+k
= (1 − q−n)
Hn−1 −H2n
.
Example 43 (Theorem 9: b = c = d = 0 and e = 1 with n > 1).n∑
k=0
qk [2nk ]
[nk][n+k
k ]
1 − (1−qn−2k)(Hk−Hn+k)
= (1−qn)(1−qn+1)
q−qn
Hn+1+Hn−1−H2n
.
Example 44 (Theorem 9: b, c, d → ∞, e = 0).n∑
k=0
qk[
nk
]31 + 3(1 − qn−2k)Hk
=
n∑
`=0
(−1)`[n`
](q; q)n
(q; q)`q(
1+`2 ).
Example 45 (Theorem 9: b = d = 1, c = 0 and e → ∞).
n∑
k=0
qk[
nk
][n+k
k
]2
[2nk
]2
1 + (1−qn−2k)(Hk−2Hn+k)
=
[1+3n
n
][2nn
]2
n∑
`=0
q`
[n+`
`
]2
[1+2n+`
`
] .
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
87
12 Wenchang Chu and Nancy S. S. Gu
Example 46 (Theorem 9: b = d = 1, c → ∞ and e = 0).
n∑
k=0
qk[
nk
]3[n+k
k
]2
[2nk
]2
1 + (1 − qn−2k)(3Hk − 2Hn+k)
=
[1+3n
n
][2nn
]2
n∑
`=0
(−1)`
[n`
][n+`
`
]2
[1+2n+`
`
] q(1+`2 ).
Example 47 (Theorem 9: b = c = d = 1 and e → ∞).
n∑
k=0
qk[
nk
]2[n+k
k
]3
[2nk
]3
1 + (1 − qn−2k)(2Hk − 3Hn+k)
=
[1+3n
n
][2nn
]2
n∑
`=0
q(1+n)`
[n`
][n+`
`
]2
[2n`
][1+2n+`
`
] .
Example 48 (Theorem 9: b = c = d = 1 and e = 0).
n∑
k=0
qk[
nk
]3[n+k
k
]3
[2nk
]3
1 + 3(1 − qn−2k)(Hk −Hn+k)
=
[1+3n
n
][2nn
]2
n∑
`=0
(−1)`
[n`
]2[n+``
]2
[2n`
][1+2n+`
`
]q(1+`2 ).
Example 49 (Theorem 9: b = 0, c, d → ∞ and e = 1).
n∑
k=0
qk[2nk
][2n
n + k
]1 + (1 − qn−2k)(Hk + Hn+k)
=
n∑
`=0
(−1)`[
2nn + `
]qn`+(1+`
2 ).
Example 50 (Theorem 9: b, c, d → ∞ and e = 1).
n∑
k=0
qk[
nk
][2nk
][2n
n + k
]1+ (1− qn−2k)(2Hk +Hn+k)
=
n∑
`=0
(−1)`[
2nn + `
](q; q)n
(q; q)`qn`+(1+`
2 ).
Example 51 (Theorem 9: b = 1, c, d → ∞ and e = 0).
n∑
k=0
qk[
nk
]2[n + kk
][2n − k
n
]1 + (1 − qn−2k)(3Hk −Hn+k)
=
n∑
`=0
(−1)`[n`
][n + `
`
]q(
1+`2 ).
5.3. Performing the parameter replacements
a → q−x−n
b → q1+bn
c → q−n−cn
d → q1+dn
e → q−n−en
where b, c, d, e ∈ N0
we can express Watson’s q-Whipple transformation as
n∑
k=0
(1 − qx+n−2k)
[nk
][x+n
k
][k+bn
k
][n+cn
k
][k+dn
k
][n+en
k
][k−x
k
][n+bn+x
k
][k+cn−x
k
][n+dn+x
k
][k+en−x
k
]qk(1+k−n−x)
= (1−qx)[x+n
n ][1+x+bn+dn+nn ]
[x+bn+nn ][x+dn+n
n ]
n∑
`=0
(−1)`
[n`
][`+bn
`
][`+dn
`
][`+n+cn+en−x
`
][`+cn−x
`
][`+en−x
`
][1+x+bn+dn+`
`
]q(1+`2 )−n`
which results, under the derivative operator D0, in the following transformation theorem.
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
88
Basic Hypergeometric Series and q-Harmonic Number Identities 13
Theorem 10 (Transformation formula: b, c, d, e ∈ N0).
n∑
k=0
qk(1+k−n)[
nk
]2[k+bn
k
][n+cn
k
][k+dn
k
][n+en
k
][n+bn
k
][k+cn
k
][n+dn
k
][k+en
k
]
×1 + (1−qn−2k)(k+2Hk−Hbn+k+Hcn+k−Hdn+k+Hen+k)
=
[1+bn+dn+n
n
][n+bn
n
][n+dn
n
]n∑
`=0
(−1)`[n`
][`+bn
`
][`+dn
`
][n+cn+en+`
`
][`+cn
`
][`+en
`
][1+bn+dn+`
`
]q(1+`2 )−n`.
We collect the following q-harmonic number identities as consequences.
Example 52 (Theorem 10: b = d = 0, c = 1 and e → ∞ with n > 0).
n∑
k=0
qk(1+k−n)
[2nk
][n+k
k
]1 + (1−qn−2k)(k+Hn+k)
= (qn − q2n)
1 + n + H2n −Hn−1
.
Example 53 (Theorem 10: b = d = 0 and c = e = 1 with n > 0).
n∑
k=0
qk(1+k−n)
[2nk
]2
[n+k
k
]2
1 + (1−qn−2k)(k+2Hn+k)
= qn (1−qn)2
1−q3n
1+n+2H2n−2Hn−1
.
Example 54 (Theorem 10: b = 0 and c, d, e → ∞).
n∑
k=0
qk(1+k−n)
[nk
]1 + (1−qn−2k)(k+Hk)
=
n∑
`=0
(−1)`(q; q)`
[n`
]q(
1+`2 )−n`.
Example 55 (Theorem 10: b, d → ∞ and c = e = 0).
n∑
k=0
qk(1+k−n)[
nk
]41 + (1 − qn−2k)(k + 4Hk)
=
n∑
`=0
(−1)`[n`
][n + `
`
](q; q)n
(q; q)`
q(1+`2 )−n`.
Example 56 (Theorem 10: b = 0, c = e = 1 and d → ∞).
n∑
k=0
qk(1+k−n)[
nk
] [2nk
]2
[n+k
k
]2
1 + (1 − qn−2k)(k + Hk + 2Hn+k)
=
n∑
`=0
(−1)`[n`
][3n+`
`
][n+`
`
]2 q(1+`2 )−n`.
Example 57 (Theorem 10: b = d = 1, c = 0 and e → ∞).
n∑
k=0
qk(1+k−n)[
nk
]3[n+k
k
]2
[2nk
]2
1+(1−qn−2k)(k+3Hk−2Hn+k)
=
[1+3n
n
][2nn
]2
n∑
`=0
(−1)`
[n`
][n+`
`
]2
[1+2n+`
`
] q(1+`2 )−n`.
Example 58 (Theorem 10: b = d = 1 and c = e = 0).
n∑
k=0
qk(1+k−n)[
nk
]4[n+k
k
]2
[2nk
]2
1+(1−qn−2k)(k+4Hk−2Hn+k)
=
[1+3n
n
][2nn
]2
n∑
`=0
(−1)`
[n`
][n+`
`
]3
[1+2n+`
`
] q(1+`2 )−n`.
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
89
14 Wenchang Chu and Nancy S. S. Gu
Example 59 (Theorem 10: b = 0, d = 1 and c, e → ∞).
n∑
k=0
qk(1+k−n)[n + k
k
][2n − k
n
]1 + (1 − qn−2k)(k + Hk −Hn+k)
=[1 + 2n
n
] n∑
`=0
(−1)`(q; q)`
[n`
] [n+`
`
][1+n+`
`
]q(1+`2 )−n`.
Example 60 (Theorem 10: b, d → ∞ and c = e = 1).
n∑
k=0
qk(1+k−n)[2nk
]2[ 2nn + k
]21 + (1 − qn−2k)(k + 2Hk + 2Hn+k)
=
n∑
`=0
(−1)`[
2nn + `
]2[3n+`
`
][n`
] (q; q)n
(q; q)`q(
1+`2 )−n`.
Example 61 (Theorem 10: b = d = 1 and c, e → ∞).
n∑
k=0
qk(1+k−n)[n + k
k
]2[2n − kn
]21 + (1 − qn−2k)(k + 2Hk − 2Hn+k)
=[1 + 3n
n
] n∑
`=0
(−1)`(q; q)`
[n`
][n+`
`
]2
[1+2n+`
`
] q(1+`2 )−n`.
Example 62 (Theorem 10: b, d → ∞, c = 0 and e = 1).
n∑
k=0
qk(1+k−n)[
nk
]2[2nk
][2n
n + k
]1 + (1 − qn−2k)(k + 3Hk + Hn+k)
=n∑
`=0
(−1)`[2n + `
`
][2n
n + `
](q; q)n
(q; q)`q(
1+`2 )−n`.
Example 63 (Theorem 10: b = 1, c = e = 0 and d → ∞).
n∑
k=0
qk(1+k−n)[
nk
]3[n + kk
][2n − k
n
]1+(1−qn−2k)(k+4Hk−Hn+k)
= n
`=0(−1)`
[n`
][n + `
`
]2
q(1+`2 )−n`
.
5.4. Under the parameter replacements
a → q−x−n
b → q1+bn
c → q−n−cn
d → q−n−dn
e → q−n−en
where b, c, d, e ∈ N0
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
90
Basic Hypergeometric Series and q-Harmonic Number Identities 15
Watson’s q-Whipple transformation becomes the equationn∑
k=0
(1−qx+n−2k)[nk][
x+nk ][k+bn
k ][n+cnk ][n+dn
k ][n+enk ]
[k−xk ][n+bn+x
k ][k+cn−xk ][k+dn−x
k ][k+en−xk ]
q(n−2k
2 )+(n−2k)x
= (−1)n(1−qx)[x+n
n ][bn−dn+xn ]
[x+bn+nn ][n+dn−x
n ]
n∑
`=0
q(n−`)(n−`+dn) [n`][`+bn
` ][n+dn` ][`+n+cn+en−x
` ][`+cn−x
` ][`+en−x` ][`−n+bn−dn+x
` ].
Applying the derivative operator D0 to it, we obtain the following transformation theorem.
Theorem 11 (Transformation formula: b, c, d, e ∈ N0).
n∑
k=0
q(n−2k
2 )[
nk
]2[k+bn
k
][n+cn
k
][n+dn
k
][n+en
k
][n+bn
k
][k+cn
k
][k+dn
k
][k+en
k
]
×1 + (1−qn−2k)(2k+2Hk−Hbn+k+Hcn+k+Hdn+k+Hen+k)
=(−1)n[bn−dn
n ][n+bn
n ][n+dnn ]
n∑
`=0
q(n−`)(n−`+dn)[n`
][`+bn
`
][n+dn
`
][`+cn+en+n
`
][`+cn
`
][`+en
`
][`+bn−dn−n
`
] .
We collect the following q-harmonic number identities as consequences.
Example 64 (Theorem 11: b = 0 and c, d, e → ∞).
n∑
k=0
q(n−2k
2 )[
nk
]1 + (1−qn−2k)(2k+Hk)
=
n∑
`=0
(−1)`(q; q)`
[n`
]q(
1+n−`2 ).
Example 65 (Theorem 11: b → ∞ and c = d = e = 0).
n∑
k=0
q(n−2k
2 )[
nk
]51 + (1−qn−2k)(2k+5Hk)
= (−1)n
n∑
`=0
[n`
]2[n + ``
]q(n−`)2 .
Example 66 (Theorem 11: b = 0, c = d = 1 and e → ∞).
n∑
k=0
q(n−2k
2 )[
nk
] [2nk
]2
[n+k
k
]2
1+(1−qn−2k)(2k+Hk+2Hn+k)
=
[2n−1
n
][2nn
]n∑
`=0
(−1)`
[n`
][2n`
][n+`
`
][2n−1
`
]q(1+n−`
2 ).
Example 67 (Theorem 11: b = 0 and c = d = e = 1).
n∑
k=0
q(n−2k
2 )[
nk
] [2nk
]3
[n+k
k
]3
1 + (1 − qn−2k)(2k + Hk + 3Hn+k)
=
[2n−1
n
][2nn
]n∑
`=0
(−1)`[n`
] [2n`
][3n+`
`
][n+`
`
]2[2n−1`
]q(1+n−`
2 ).
Example 68 (Theorem 11: b → ∞ and c = d = e = 1).
n∑
k=0
q(n−2k
2 )[
nk
]2[2nk
]3
[n+k
k
]3
1 + (1−qn−2k)(2k+2Hk+3Hn+k)
=
(−1)n
[2nn
]n∑
`=0
q(n−`)(2n−`)[n`
][2n`
][3n+`
`
][n+`
`
]2 .
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
91
16 Wenchang Chu and Nancy S. S. Gu
Example 69 (Theorem 11: b → ∞, c = e = 1 and d = 0).
n∑
k=0
q(n−2k
2 )[
nk
]3[2nk
]2
[n+k
k
]2
1 + (1−qn−2k)(2k+3Hk+2Hn+k)
= (−1)n
n∑
`=0
q(n−`)2[n`
]2[3n+`
`
][n+`
`
]2 .
Example 70 (Theorem 11: b → ∞, d = 1 and c = e = 0).
n∑
k=0
q(n−2k
2 )[
nk
]4[2nk
][n+k
k
]1 + (1−qn−2k)(2k+4Hk+Hn+k)
= (−1)n
n∑
`=0
q(n−`)(2n−`)[n`
]2[2n`
][
2nn+`
].
Example 71 (Theorem 11: b = 1 and c = d = e = 0).
n∑
k=0
q(n−2k
2 )[
nk
]5[n+k
k
][2nk
] 1 + (1 − qn−2k)(2k+5Hk−Hn+k)
=
(−1)n
[2nn
]n∑
`=0
q(n−`)2[n`
]2[n + ``
]2
.
Example 72 (Theorem 11: b = 0, c = 1 and d, e → ∞).
n∑
k=0
q(n−2k
2 )[2nk
][2n
n + k
]1 + (1 − qn−2k)(2k + Hk + Hn+k)
=
n∑
`=0
(−1)`[
2nn + `
]q(
1+n−`2 ).
Example 73 (Theorem 11: b = 1 and c, d, e → ∞).
n∑
k=0
q(n−2k
2 )[
nk
][n + k
k
][2n − k
n
]1 + (1−qn−2k)(2k+2Hk−Hn+k)
=n∑
`=0
(−1)`(q; q)`
[n`
][n + `
`
]qn(n−`)+(1+n−`
2 ).
Example 74 (Theorem 11: b = 1, c = 0 and d, e → ∞).
n∑
k=0
q(n−2k
2 )[
nk
]2[n + kk
][2n − k
n
]1 + (1−qn−2k)(2k+3Hk−Hn+k)
=n∑
`=0
(−1)`[n`
][n + `
`
]qn(n−`)+(1+n−`
2 ).
Example 75 (Theorem 11: b = 1, c = d = 0 and e → ∞).
n∑
k=0
q(n−2k
2 )[
nk
]3[n + kk
][2n − k
n
]1+(1−qn−2k)(2k+4Hk−Hn+k)
= (−1)n
n∑
`=0
[n`
]2[n + ``
]q(n−`)2.
5.5. Carrying out the parameter replacements
a → q−x−n
b → q−n−bn
c → q−n−cn
d → q−n−dn
e → q−n−en
where b, c, d, e ∈ N0
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
92
Basic Hypergeometric Series and q-Harmonic Number Identities 17
we can display Watson’s q-Whipple transformation as
n∑
k=0
(1 − qx+n−2k)[nk][
x+nk ][n+bn
k ][n+cnk ][n+dn
k ][n+enk ]
[k−xk ][k+bn−x
k ][k+cn−xk ][k+dn−x
k ][k+en−xk ]
qk(1+3k−3n)+x(n−3k)+(n2)
= (−1)n(1−qx)[x+n
n ][2n+bn+dn−xn ]
[n+bn−xn ][n+dn−x
n ]
n∑
`=0
q`(`−x−n)
[n`
][n+bn
`
][n+dn
`
][`+n+cn+en−x
`
][
`+cn−x
`
][`+en−x
`
][2n+bn+dn−x
`
]
which yields, under the derivative operator D0, the following transformation theorem.
Theorem 12 (Transformation formula: b, c, d, e ∈ N0).
n∑
k=0
qk(1+3k−3n)[
nk
]2[n+bn
k
][n+cn
k
][n+dn
k
][n+en
k
][k+bn
k
][k+cn
k
][k+dn
k
][k+en
k
]
×1 + (1−qn−2k)(3k+2Hk+Hbn+k+Hcn+k+Hdn+k+Hen+k)
=(−1)n
[2n+bn+dn
n
][n+bn
n
][n+dn
n
]n∑
`=0
q`(`−n)−(n2)
[n`
][n+bn
`
][n+dn
`
][n+cn+en+`
`
][`+cn
`
][`+en
`
][2n+bn+dn
`
] .
We collect the following q-harmonic number identities as consequences.
Example 76 (Theorem 12: b, c, d, e → ∞).
n∑
k=0
qk(1+3k−3n)[
nk
]21 + (1 − qn−2k)(3k + 2Hk)
= (−1)n(q; q)n
n∑
`=0
[n`
]q`(`−n)−(n
2).
Example 77 (Theorem 12: b, c, d → ∞ and e = 0).
n∑
k=0
qk(1+3k−3n)[
nk
]31 + 3(1 − qn−2k)(k + Hk)
= (−1)n
n∑
`=0
[n`
](q; q)n
(q; q)`q`(`−n)−(n
2).
Example 78 (Theorem 12: b, e → ∞ and c = d = 0).
n∑
k=0
qk(1+3k−3n)[
nk
]41 + (1 − qn−2k)(3k + 4Hk)
= (−1)n
n∑
`=0
[n`
]2
q`(`−n)−(n2).
Example 79 (Theorem 12: b = c = d = 0 and e → ∞).
n∑
k=0
qk(1+3k−3n)[
nk
]51 + (1 − qn−2k)(3k + 5Hk)
= (−1)n
n∑
`=0
q`(`−n)−(n2)
[n`
]2[2n − `n
].
Example 80 (Theorem 12: b = c = d = e = 0).
n∑
k=0
qk(1+3k−3n)[
nk
]61+3(1−qn−2k)(k+2Hk)
= (−1)n
n∑
`=0
q`(`−n)−(n2)
[n`
]2[n + ``
][2n − `
n
].
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
93
18 Wenchang Chu and Nancy S. S. Gu
Example 81 (Theorem 12: b = c = d = 1 and e → ∞).
n∑
k=0
qk(1+3k−3n)[
nk
]2[2nk
]3
[n+k
k
]3
1 + (1 − qn−2k)(3k + 2Hk + 3Hn+k)
= (−1)n
[4nn
][2nn
]2
n∑
`=0
[n`
][2n`
]2
[n+`
`
][4n`
]q`(`−n)−(n2).
Example 82 (Theorem 12: b = c = d = e = 1).
n∑
k=0
qk(1+3k−3n)[
nk
]2[2nk
]4
[n+k
k
]4
1 + (1−qn−2k)(3k+2Hk+4Hn+k)
= (−1)n
[4nn
][2nn
]2
n∑
`=0
q`(`−n)−(n2)
[n`
][2n`
]2[3n+``
][4n`
][n+`
`
]2 .
Example 83 (Theorem 12: b = d = 1, c = 0 and e → ∞).
n∑
k=0
qk(1+3k−3n)[
nk
]3[2nk
]2
[n+k
k
]2
1+(1−qn−2k)(3k+3Hk+2Hn+k)
= (−1)n
[4nn
][2nn
]2
n∑
`=0
[n`
][2n`
]2
[4n`
] q`(`−n)−(n2).
Example 84 (Theorem 12: b = 0 and c = d = e = 1).
n∑
k=0
qk(1+3k−3n)[
nk
]3[2nk
]3
[n+k
k
]3
1+3(1−qn−2k)(k+Hk+Hn+k)
= (−1)n
[3nn
][2nn
]n∑
`=0
q`(`−n)−(n2)
[n`
]2[2n`
][3n+`
`
][n+`
`
]2[3n`
] .
Example 85 (Theorem 12: b = d = 0, c = 1 and e → ∞).
n∑
k=0
qk(1+3k−3n)[
nk
]4[2nk
][n+k
k
]1 + (1−qn−2k)(3k+4Hk+Hn+k)
= (−1)n
n∑
`=0
[n`
]2[
2nn+`
][2n`
] q`(`−n)−(n2).
Example 86 (Theorem 12: b = d = 0 and c = e = 1).
n∑
k=0
qk(1+3k−3n)[
nk
]4[2nk
]2
[n+k
k
]2
1+(1−qn−2k)(3k+4Hk+2Hn+k)
= (−1)n
[2nn
] n∑
`=0
q`(`−n)−(n2)
[n`
]3[3n+``
][n+`
`
]2[2n`
] .
Example 87 (Theorem 12: b = c = d = 0 and e = 1).
n∑
k=0
qk(1+3k−3n)[
nk
]5[2nk
][n+k
k
]1+(1−qn−2k)(3k+5Hk+Hn+k)
= (−1)n
[2nn
] n∑
`=0
q`(`−n)−(n2)
[n`
]3[2n+`
`
][n+`
`
][2n`
] .
Example 88 (Theorem 12: b, c, d → ∞ and e = 1).
n∑
k=0
qk(1+3k−3n)[
nk
][2nk
][2n
n + k
]1 + (1−qn−2k)(3k+2Hk+Hn+k)
= (−1)nn∑
`=0
[2n
n + `
](q; q)n
(q; q)`q`(`−n)−(n
2).
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
94
Basic Hypergeometric Series and q-Harmonic Number Identities 19
Example 89 (Theorem 12: b, e → ∞ and c = d = 1).
n∑
k=0
qk(1+3k−3n)[2nk
]2[ 2nn + k
]21+(1−qn−2k)(3k+2Hk+2Hn+k)
= (−1)n
n∑
`=0
[2n`
][2n
n + `
]q`(`−n)−(n
2).
Example 90 (Theorem 12: b, e → ∞, c = 0 and d = 1).
n∑
k=0
qk(1+3k−3n)[
nk
]2[2nk
][2n
n + k
]1+(1−qn−2k)(3k+3Hk+Hn+k)
= (−1)n
n∑
`=0
[n`
][2n`
]q`(`−n)−(n
2).
6. Limiting Relation on finite sums of q-harmonic numbers
Recall the assumption 0 < |q| < 1 in the introduction, that will be invoked in this sectionfor deriving limiting relations. Let Pk(w), Qk(w) be two sequences of polynomials withPk(w) and Qk(w) being of degree k in w and Pk(0) = Qk(0) = 1 (i.e. the constant termbeing equal to one). Suppose that λ, ν, n, k ∈ N0 with k ≤ n. Then there holds the limitingrelation
(6.1) limy→∞
Pλk+ν(q
y)
Qλk+ν(qy)Hny+k(q) −
Pλ(n−k)+ν (qy)
Qλ(n−k)+ν(qy)Hny+n−k(q)
= 0.
To see this, rewrite the left-hand side of (6.1) in two terms
Pλk+ν(qy)
Qλk+ν(qy)Hny+k(q)−
Pλ(n−k)+ν (qy)
Qλ(n−k)+ν(qy)Hny+n−k(q)
=Hny+k(q) −Hny+n−k(q)
Pλ(n−k)+ν (qy)
Qλ(n−k)+ν(qy)
+ Hny+k(q)
Pλk+ν (q
y)
Qλk+ν(qy)−
Pλ(n−k)+ν(qy)
Qλ(n−k)+ν(qy)
.
Observe that bothPλ(n−k)+ν (qy)
Qλ(n−k)+ν(qy)and Hny+k(q) are bounded. More precisely, we have
limy→∞
Pλk+ν (qy)
Qλk+ν(qy)=
Pλk+ν(0)
Qλk+ν(0)= 1 and
∣∣∣ limy→∞
Hny+k(q)∣∣∣ <
∞∑
`=1
|q|`1 − |q| =
|q|(1 − |q|)2
.
They imply further the following two limiting relations
limy→∞
Hny+k(q) −Hny+n−k (q)
= 0 and lim
y→∞
Pλk+ν(q
y)
Qλk+ν(qy)−
Pλ(n−k)+ν (qy)
Qλ(n−k)+ν(qy)
= 0.
From these four relations, the limiting relation displayed in (6.1) follows consequently.
Now we are ready to prove the limiting relation on finite sums of the q-binomial coeffi-cients and the q-harmonic numbers, similar to that in [5, Theorem 13] on classical harmonicnumbers.
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
95
20 Wenchang Chu and Nancy S. S. Gu
Theorem 13. Let Pk(w), Qk(w) be two polynomial sequences with Pk(w) and Qk(w) beingof degree k in w and Pk(0) = Qk(0) = 1. If fn(k) is a function independent of y whichsatisfies the reflection property fn(k) = −fn(n − k), then there holds the limiting relation:
(6.2) limy→∞
n∑
k=0
fn(k)Pλk+ν(q
y)
Qλk+ν(qy)Hny+k(q) = 0.
Proof. Reversing the summation order and applying the reflection property, we can refor-mulate the finite sum stated in the theorem as
2n∑
k=0
fn(k)Pλk+ν(q
y)
Qλk+ν(qy)Hny+k(q) =
n∑
k=0
fn(k)
Pλk+ν (qy)
Qλk+ν(qy)Hny+k(q) −
Pλ(n−k)+ν (qy)
Qλ(n−k)+ν (qy)Hny+n−k (q)
.
According to (6.1), the last line tends to zero as y → ∞, which confirms (6.2).
There is a large class of functions satisfying the reflection property stated in Theorem 13.In particular for β ∈ Z and α, γ, λ, µ, ν ∈ N0, the following functions
fn(k) = 1 − qn−2k[
nk
]λ[n+αn
k
]µ
[k+αn
k
]µ
[k+γn
k
]ν
[n+γn
k
]ν qk+βk(n−k)
have frequently appeared in the transformations proved in Sections 4 and 5. According to thetheorems numbered from 2 to 12, we have found 90 summation and transformation formulaeon q-binomial coefficients and q-harmonic numbers, that are presented as 90 examples. Eventhough the computations to deduce them are almost routine, Theorem 13 becomes oftenindispensable for simplifying finite q-harmonic number sums, when there exist one or morefree parameters involved tending to infinity.
Now we take the summation formula displayed in Example 52 to illustrate how to deriveq-harmonic number identities from the theorems established in this paper.
First, specifying with b = d = 0 and c = 1, we may state Theorem 10 as the followingtransformation
n∑
k=0
qk(1+k−n)
[2nk
][n+ne
k
][n+k
k
][k+ne
k
]1+(1−qn−2k)(k+Hn+k+Hk+ne)
=
n∑
`=0
(−1)`
[1+n
n
][n`
][2n+ne+`
`
][1+``
][n+`
`
][ne+`
`
] q(1+`2 )−n`.
Then letting e → ∞ and applying Theorem 13, we derive
n∑
k=0
qk(1+k−n)
[2nk
][n+k
k
]
1+(1−qn−2k)(k+Hn+k)
=
n∑
`=0
(−1)`
[1+n
n
][n`
][1+`
`
][n+`
`
]q(1+`2 )−n`.
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
96
Basic Hypergeometric Series and q-Harmonic Number Identities 21
The right-hand side may be expressed in terms of basic hypergeometric series and thenfurther simplified by means of the q-Chu-Vandermonde formula as follows
1−qn+1
1 − q3φ2
[q, q, q−n
q2, qn+1
∣∣∣ q; q
]= lim
ε→1
q2n−qn
1 − ε
2φ1
[ε, q−n−1
qn
∣∣∣ q; q
]− 1
= limε→1
q2n−qn
1 − ε
εn+1 (qn/ε; q)n+1
(qn; q)n+1− 1
= (qn − q2n)1 + n + H2n −Hn−1
.
This confirms the q-harmonic number identity stated in Example 52.
7. Comparison with Classical Harmonic Number Identities
Generally, for a given classical binomial identity, there may exist more than one q-analogue.This phenomenon happens also for harmonic number identities. In order to facilitate refer-ence for the reader, we tabulate the comparison between classical harmonic number identitiesand their q-analogues established respectively in [5] and the present paper. Here the entrynumbers stand for that displayed in the two tables collected in [5] and the example numbersfor the corresponding q-analogues found in this paper. We point out, by the way, that forthe two formulae in Examples 42 and 52, their following common limiting case (the classicalharmonic number identity) has been missed from reference [5]
n∑
k=0
(2nk
)(
n+kk
)1 + (n − 2k)Hn+k
= n
H2n −Hn−1
.
Entry Examples Entry Examples Entry Examples
I-1 1 I-17 22,55,78 II-7 56,66
I-2 4 I-18 24,62,90 II-8 63,75
I-3 2 I-19 25,60,89 II-9 57
I-4 5 I-20 26,40 II-10 58
I-5 3 I-21 27 II-11 70,85
I-6 6 I-22 28 II-12 71
I-7 7 I-23 29,41 II-13 69,83
I-8 8,13,31,54,64 I-24 30 II-14 67
I-9 9,14,20,32,76 I-25 43 II-15 68,81
I-10 11,37,59 I-26 53 II-16 65,79
I-11 12,39,61 II-1 34 II-17 80
I-12 16,49,72 II-2 36 II-18 87
I-13 18,23,50,88 II-3 33,45 II-19 86
I-14 10,17,38,73 II-4 46 II-20 84
I-15 19,51,74 II-5 35,47 II-21 82
I-16 15,21,44,77 II-6 48 Missed 42,52
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
97
22 Wenchang Chu and Nancy S. S. Gu
Concluding Comments. In the previous paper [5], four classical hypergeometric seriestheorems are examined through the derivative operator method. Following the same scheme,their q-analogues are explored in the present work. Altogether both papers provide a com-prehensive coverage to the identities on the classical and q-harmonic numbers. The authorshope that the summation and tranformation formulae shown in both papers may serve as adocumentary source for further references.
References
[1] G. E. Andrews – K. Uchimura, Identities in combinatorics IV: Differentiation and harmonic num-bers, Utilitas Mathematica 28 (1985), 265–269.
[2] A. T. Benjamin – G. O. Preston – J. J. Quinn, A Stirling encounter with harmonic numbers, Mathe-matics Magazine 75:2 (2002), 95–103.
[3] D. Bradley, Duality for finite multiple harmonic q-series, Discrete Math. 300 (2005), 44–56.[4] W. Chu, A Binomial coefficient identity associated with Beukers’ conjecture on Apery numbers, The
electronic journal of combinatorics 11 (2004), N15.[5] W. Chu – L. De Donno, Hypergeometric series and harmonic number identities, Advances in Applied
Math. 34 (2005), 123–137.[6] G. Gasper – M. Rahman, Basic Hypergeometric Series, Cambridge University Press, Cambridge, 1990.[7] H. W. Gould, Combinatorial Identities, Morgantown, 1972.[8] R. L. Graham – D. E. Knuth – O. Patashnik, Concrete Mathematics, Addison-Wesley Publ. Company,
Reading, Massachusetts, 1989.[9] P. J. Larcombe – E. J. Fennessey – W. A. Koepf, Integral proofs of two alternating sign binomial
coefficients identities, Utilitas mathematica 66 (2004), 93–103.[10] I. Newton, Mathematical Papers Vol. III, D. T. Whiteside ed., Cambridge Univ. Press, London, 1969.[11] P. Paule – C. Schneider, Computer proofs of a new family of harmonic number identities, Adv. in Appl.
Math. 31 (2003), 359–378.
W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES
98
SOME RELATIONSHIP BETWEEN THE q-GENOCCHINUMBERS AND BERNSTEIN POLYNOMIALS
N. S. Jung, H. Y. Lee, C. S. Ryoo
Department of Mathematics, Hannam University, Daejeon 306-791, Korea
Abstract : Recently, we introduced some interesting relations between Genocchi number andBernstein polynomials(see [9]). In this paper, we give some interesting identities on the q-Genocchipolynomials and Bernstein polynomials.
Key words : Genocchi numbers and polynomials, q-Genocchi numbers and polynomials, Bernsteinpolynomials
1. Introduction
Throughout this paper, let p be a fixed odd prime number. The symbol, Zp, Qp and Cp denotethe ring of p-adic integers, the field of p-adic rational numbers and the completion of algebraicclosure of Qp. Let N be the set of natural numbers and Z+ = N∪0. As well known definition, the
p-adic absolute value is given by |x|p = p−r where x = pr t
swith (t, p) = (s, p) = (t, s) = 1. When
one talks of q-extension, q is variously considered as an indeterminate, a complex number q ∈ C, ora p-adic number q ∈ Cp. In this paper we assume that q ∈ Cp with |1 − q|p < 1.
We assume that UD(Zp) is the space of the uniformly differentiable function on Zp. Forf ∈ UD(Zp), the fermionic p-adic invariant integral on Zp is defined as follows:
I−1(f) =∫
Zp
f(x)dμ−1(x) = limN→∞
pN−1∑x=0
f(x)(−1)x, see [1, 2] . (1.1)
For n ∈ N, let fn(x) = f(x + n) be translation. As well known equation, by (1.1), we have
I−1(fn) =∫
Zp
f(x + n)dμ−1(x) = (−1)n
∫Zp
f(x)dμ−1(x) + 2n−1∑l=0
(−1)n−1−lf(l). (1.2)
The Genocchi polynomials are defined by the generating function as follows:
2t
et + 1ext =
∞∑n=0
Gn(x)tn
n!. (1.3)
In the special case, x = 0, Gn(0) = Gn are called the n-th Genocchi numbers(see [1-9]).We introduced the q-Genocchi polynomials as follows:
2t
qet + 1ext =
∞∑n=0
Gn,q(x)tn
n!. (1.4)
In the special case, x = 0, Gn,q(0) = Gn,q are called the n-th q-Genocchi numbers.From (1.4), we note that
Gn,q(x) =n∑
l=0
(n
l
)Gl,qx
n−l. (1.5)
99
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2, 99-105, 2012, COPYRIGHT 2012 EUDOXUS PRESS LLC
From (1.2) and (1.4), for n = 1, we have
t
∫Zp
qye(x+y)tdμ−1(y) =2t
qet + 1ext =
∞∑n=0
Gn,q(x)tn
n!. (1.6)
By (1.6), we obtain
G0,q(x) = 0,
∫Zp
qy(x + y)ndμ−1(y) =Gn+1,q(x)
n + 1, for n ∈ N. (1.7)
Bernstein polynomials of degree n are given by
Bk,n(x) =(
n
k
)xk(1 − x)n−k, where x ∈ [0, 1], n, k ∈ Z+, see [3, 4, 5, 7, 8, 9]. (1.8)
In [1], Kim introduced p-adic extension of Bernstein polynomials as follows:
Bk,n(x) =(
n
k
)xk(1 − x)n−k, where x ∈ Zp and n, k ∈ Z+. (1.9)
In this paper, we give some properties for the q-Genocchi numbers and polynomials. By usingthese properties, we investigate some interesting identities on the Bernstein polynomials and theq-Genocchi polynomials.
2. Some identities on the Bernstein and q-Genocchi polynomials
From (1.6), we can derive the following recurrence formula for the q-Genocchi numbers:
G0,q = 0, and q(Gq + 1)n + Gn,q =
2, if n = 1,
0, if n > 1,(2.1)
with usual convention about replacing (Gq)n by Gn,q,w.
By (1.4), we easily get
∞∑n=0
Gn,q−1(1 − x)(−1)n tn
n!= (−1)
2tq
qet + 1ext = (−1)q
∞∑n=0
Gn,q(x)tn
n!. (2.2)
By (2.2), we obtain the following theorem.
Theorem 1. Let n ∈ Z+. Then we have
Gn,q(x) = (−1)n−1q−1Gn,q−1(1 − x).
From (1.7), we note that
G0,q = 0,
∫Zp
qxxndμ−1(x) =Gn+1,q
n + 1, for n ∈ N. (2.3)
By (2.1), for n ∈ N with n > 1, we have
N. JUNG ET AL: q-GENOCCHI NUMBERS
100
Gn,q(2) = (Gq + 1 + 1)n =n∑
l=0
(n
l
)Gl,q(1)
=1q
n∑l=1
(n
l
)qGl,q(1)
=1q(nqG1,q(1)) +
1q
n∑l=2
(n
l
)Gl,q(1)
=2n
q− 1
q2qGn,q(1)
=2n
q+
1q2
Gn,q.
(2.4)
Therefore, by (2.4), we obtain the following theorem.
Theorem 2. For n ∈ N with n > 1, we have
qGn,q(2) = 2n +1qGn,q.
By (2.3) and Theorem 2, we obtain the following corollary.
Corollary 3. For n ∈ N with n > 1, we have
1q
∫Zp
q−x(x + 2)ndμ−1(x) = 2 + qGn+1,q−1
n + 1.
By (1.7), (2.3) and Corollary 3, we know that
∫Zp
qx(1 − x)ndμ−1(x) = (−1)n
∫Zp
qx(x − 1)ndμ−1(x)
= (−1)n Gn+1,q(−1)n + 1
=1q
Gn+1,q−1,w−1(2)n + 1
=1q
∫Zp
q−x(x + 2)ndμ−1(x)
= 2 + qGn+1,q−1
n + 1
= 2 + q
∫Zp
q−xxndμ−1(x).
Therefore, we obtain the following theorem.
Theorem 4. For n ∈ N with n > 1, we have∫Zp
qx(1 − x)ndμ−1(x) = 2 + q
∫Zp
q−xxndμ−1(x).
In (1.9), we take the fermionic p-adic invariant integral on Zp for one Bernstein polynomials asfollows:
N. JUNG ET AL: q-GENOCCHI NUMBERS
101
∫Zp
qxBk,n(x)dμ−1(x) =(
n
k
) n−k∑l=0
(n − k
l
)(−1)n−k−l
∫Zp
qxxn−ldμ−1(x)
=(
n
k
) n−k∑l=0
(n − k
l
)(−1)n−k−l Gn−l+1,q
n − l + 1
=(
n
k
) n−k∑l=0
(n − k
l
)(−1)l Gk+l+1,q
k + l + 1, where n, k ∈ Z+.
(2.5)
From the reflection symmetric properties of Bernstein polynomials, we note that
Bk,n(x) = Bn−k,n(1 − x), where n, k ∈ Z+ and x ∈ Zp. (2.6)
For n, k ∈ Z+ with n > k + 1, we have∫Zp
qxBk,n(x)dμ−1(x) =∫
Zp
qxBn−k,n(1 − x)dμ−1(x)
=(
n
k
) k∑l=0
(k
l
)(−1)k−l
∫Zp
qx(1 − x)n−ldμ−1(x)
=(
n
k
) k∑l=0
(k
l
)(−1)k−l
(2 + q
∫Zp
q−xxn−ldμ−1(x)
).
Therefore, we have the following theorem.
Theorem 5. For n, k ∈ Z+ with n > k + 1, we have
∫Zp
qxBk,n(x)dμ−1(x) =(
n
k
) k∑l=0
(k
l
)(−1)k−l
(2 + q
Gn−l+1,q−1,w−1
n − l + 1
).
By (2.5) and Theorem 5, we obtain the following theorem.
Theorem 6. Let n, k ∈ Z+ with n > k + 1. Then we have
n−k∑l=0
(n − k
l
)(−1)l Gk+l+1,q
k + l + 1=
k∑l=0
(k
l
)(−1)k−l
(2 + q
Gn−l+1,q−1,w−1
n − l + 1
).
Let n1, n2, k ∈ Z+ with n1 + n2 > 2k + 1. Then we get∫Zp
qxBk,n1(x)Bk,n2(x)dμ−1(x)
=(
n1
k
)(n2
k
) 2k∑l=0
(2k
l
)(−1)l+2k
∫Zp
qx(1 − x)n1+n2−ldμ−1(x)
=(
n1
k
)(n2
k
) 2k∑l=0
(2k
l
)(−1)l+2k 1
q
∫Zp
q−x(x + 2)n1+n2−ldμ−1(x)
=(
n1
k
)(n2
k
) 2k∑l=0
(2k
l
)(−1)l+2k
(2 + q
∫Zp
q−xxn1+n2−l
dμ−1(x)
).
Therefore, we obtain the following theorem.
N. JUNG ET AL: q-GENOCCHI NUMBERS
102
Theorem 7. For n1, n2 k ∈ Z+ with n1 + n2 > 2k + 1, we have∫Zp
qxBk,n1(x)Bk,n2(x)dμ−1(x)
=(
n1
k
)(n2
k
) 2k∑l=0
(2k
l
)(−1)l+2k
(2 + q
Gn1+n2−l+1,q−1,w−1
n1 + n2 − l + 1
).
By simple calculation, we easily see that
∫Zp
qxBk,n1(x)Bk,n2(x)dμ−1(x)
=(
n1
k
)(n2
k
) n1+n2−2k∑l=0
(−1)l
(n1 + n2 − 2k
l
) ∫Zp
qxxl+2kdμ−1(x)
=(
n1
k
)(n2
k
) n1+n2−2k∑l=0
(−1)l
(n1 + n2 − 2k
l
)Gl+2k+1,q
l + 2k + 1, where n1, n2, k ∈ Z+.
(2.7)
Therefore, by (2.7) and Theorem 7, we obtain the following theorem.
Theorem 8. Let n1, n2, k ∈ Z+ with n1 + n2 > 2k + 1. Then we have
2k∑l=0
(2k
l
)(−1)l+2k
(2 + q
Gn1+n2−l+1,q−1,w−1
n1 + n2 − l + 1
)
=n1+n2−2k∑
l=0
(−1)l
(n1 + n2 − 2k
l
)Gl+2k+1,q
l + 2k + 1.
For n1, n2, n3, k ∈ Z+ with n1 + n2 + n3 > 3k + 1, by the symmetry of Bernstein polynomials,we see that∫
Zp
qxBk,n1(x)Bk,n2(x)Bk,n3(x)dμ−1(x)
=(
n1
k
)(n2
k
)(n3
k
) 3k∑l=0
(3k
l
)(−1)l+3k
∫Zp
qx(1 − x)n1+n2+n3−ldμ−1(x)
=(
n1
k
)(n2
k
)(n3
k
) 3k∑l=0
(3k
l
)(−1)l+3k 1
wqh
∫Zp
q−hxw−x(x + 2)n1+n2+n3−ldμ−1(x)
=(
n1
k
)(n2
k
)(n3
k
) 3k∑l=0
(3k
l
)(−1)l+3k
(2 + q
∫Zp
q−hxw−xxn1+n2+n3−ldμ−1(x)
).
Therefore, we have the following theorem.
Theorem 9. For n1, n2, n2, k ∈ Z+ with n1 + n2 + n3 > 3k + 1, we have∫Zp
qxBk,n1(x)Bk,n2(x)Bk,n3(x)dμ−1(x)
=(
n1
k
)(n2
k
)(n3
k
) 3k∑l=0
(3k
l
)(−1)l+3k
(2 + q
Gn1+n2+n3−l,q−1,w−1
n1 + n2 + n3 − l + 1
).
N. JUNG ET AL: q-GENOCCHI NUMBERS
103
In the same manner, multiplication of three Bernstein polynomials can be given by the followingrelation: ∫
Zp
qxBk,n1(x)Bk,n2(x)Bk,n3(x)dμ−1(x)
=(
n1
k
)(n2
k
)(n3
k
) n1+n2+n3−3k∑l=0
(−1)l
(n1 + n2 + n3 − 3k
l
) ∫Zp
qxxl+3kdμ−1(x)
=(
n1
k
)(n2
k
)(n3
k
) n1+n2+n3−3k∑l=0
(−1)l
(n1 + n2 + n3 − 3k
l
)Gl+3k+1,q
l + 3k + 1,
where n1, n2, n3, k ∈ Z+ with n1 + n2 + n3 > 3k + 1.
Therefore, by Theorem 9, we obtain the following theorem.
Theorem 10. Let n1, n2, n3, k ∈ Z+ with n1 + n2 + n3 > 3k + 1. Then we have
3k∑l=0
(3k
l
)(−1)l+3k
(2 + q
Gn1+n2+n3−l+1,q−1,w−1
n1 + n2 + n3 − l + 1
)
=n1+n2+n3−3k∑
l=0
(−1)l
(n1 + n2 + n3 − 3k
l
)Gl+3k+1,q
l + 3k + 1.
Using the above theorem and mathematical induction, we have the following theorem.
Theorem 11. Let m ∈ N. For n1, n2, . . . , nm, k ∈ Z+ with n1 + · · · + nm > mk + 1, themultiplication of the sequence of Bernstein polynomials Bk,n1(x), . . . , Bk,nm
(x) with different degreesunder fermionic p-adic invariant integral on Zp can be given as
∫Zp
qx
(m∏
i=1
Bk,ni(x)
)dμ−1(x)
=
(m∏
i=1
(ni
k
))mk∑l=0
(−1)l+mk+1
(2 + q
Gn1+···+nm−l+1,q−1,w−1
n1 + · · · + nm − l + 1
).
We also easily see that
∫Zp
qx
(m∏
i=1
Bk,ni(x)
)dμ−1(x)
=
(m∏
i=1
(ni
k
))n1+···+nm−mk∑
l=0
(n1 + · · · + nm − mk
l
)(−1)l Gl+mk+1,q
l + mk + 1.
(2.8)
By Theorem 11 and (2.8), we have the following corollary.
Corollary 12. Let m ∈ N. For n1, n2, . . . , nm, k ∈ Z+ with n1 + · · · + nm > mk + 1, we have
mk∑l=0
(−1)l+mk
(2 + q
Gn1+···+nm−l+1,q−1,w−1
n1 + · · · + nm − l + 1
)
=n1+···+nm−mk∑
l=0
(n1 + · · · + nm − mk
l
)(−1)l Gl+mk+1,q
l + mk + 1.
N. JUNG ET AL: q-GENOCCHI NUMBERS
104
References
[1] T. Kim, Some identities on the q-Euler polynomials of higher order and q-Stirling numbersby the fermionic p-adic integral on Zp, Russian Journal of Mathematical physics, 16 (2009),484-491.
[2] T. Kim, Note on the Euler numbers and polynomials, Adv. Stud. Contemp. Math, 17 (2008),131-136.
[3] T.Kim, L.C. Jang, H. Yi, A note on the modified q-Bernstein polynomials, Discrete Dynamicsin Nature and Society, 2010 (2010), Article ID 706483, 12pp.
[4] Y. Simsek, M. Acikgoz, A new generating function of q-Bernstein-type polynomials and theirinterpolation function, Abstract and Applied Analysis, 2010 (2010), Article ID 769095, 12pp.
[5] L. C. Jang, W.-J. Kim, Y. Simsek, A study on the p-adic integral representation on Zp as-sociated with Bernstein and Bernoulli polynomials, Advances in Difference Equations, 2010(2010), Article ID 163217, 6pp.
[6] T. Kim, J. Choi, Y. H. Kim, C. S. Ryoo, On the fermionic p-adic integral representation ofBernstein polynomials associated with Euler numbers and polynomials, J. Inequal. Appl., 2010(2010), Art ID 864247, 12pp.
[7] C. S. Ryoo, On the generalized Barnes type multiple q-Euler polynomials twisted by ramifiedroots of unity, Proc. Jangjeon Math. Soc., 13 (2010), 255-263.
[8] C. S. Ryoo, Some relations between twisted q-Euler numbers and Bernstein polynomials, Adv.Stud. Contemp. Math., 21 (2011), 217-233.
[9] H. Y. Lee, N. S. Jung, C. S. Ryoo, Some identities of the Genocchi numbers and polynomialsassociated with Bernstein polynomials, to appear in J. Appl. Math. & Informatics.
N. JUNG ET AL: q-GENOCCHI NUMBERS
105
SOME THEOREMS IN CONE METRIC
SPACES
Duran Turkoglu, Muhib Abuloha, Thabet Abdeljawad
Department of Mathematics, Faculty of Science and Arts, Gazi University, 06500,Ankara-Turkey. [email protected].
Department of Mathematics, Institute of Science and Technology, Gazi University,06500, Ankara-Turkey. [email protected].
Department of Mathematics and Computer Science, ankaya University, 06530Ankara-Turkey. [email protected].
Abstract
In this paper, some topological concepts and definitions are generalized to conemetric spaces. The distance between two sets in cone metric spaces is defined,where some examples are given. Moreover, it is proved that every cone metric spaceis a T2−space and that Baire’s category theorem is still valid in cone metric spaces.Regarding, the theory of linear operators in cone normed spaces, we defined boundedlinear operators and scalar bounded linear operators. Examples are given to showthat not necessarily all linear operators are bounded on finite dimensional conenormed spaces and to show that not every continuous linear operator between conenormed spaces is bounded.
Key words: Cone metric, cone normed, cone Banach, strongly minihedral,absolute value function, Meager (the first category), Nonmeager ( the secondcategory), Baire’s category theorem, monotonic, semi-monotonic, linear operator,scalar bounded, continuous.
1 Introduction and Preliminaries
Cone metric spaces were first introduced in [4], where the authors describedconvergence in cone metric spaces and introduced completeness. Furthermore,in [1,5,7,13,14], they proved some common fixed point theorems in cone metricspaces. In [2], the authors introduced some generalized topological conceptsand definitions in cone metric spaces and proved that every cone metric spaceis topological space as well as they proved some fixed point theorems in di-ametrically contractive mappings in cone metric spaces. Furthermore, cone
Preprint submitted to Elsevier 28 April 2010
106
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2,106-116,2012, COPYRIGHT 2012 EUDOXUS PRESS LLC
metric spaces were studied by many authors (see [6,8–12] ). However, in thispaper, some topological concepts and definitions are generalized to cone met-ric spaces. We defined the distance between two sets in cone metric spacessupported by examples. Moreover, it is proved that every cone metric spaceis a T4 − space. Also to prove Baire’s category theorem in cone metric space,we defined the first category (Meager) and the second category (nonmeager).We also defined the cone normed space and proved that each cone normedspace is a cone metric space. Furthermore, we defined cone Banach space andwe gave an example about that and we defined the absolute value functionand scalar bounded linear operator in cone metric spaces as well. Finally, wegeneralized bounded linear operators between two cone normed spaces and byan example showed that not necessarily all linear operators are bounded onfinite dimensional cone normed spaces and to show that not every continuouslinear operator between cone normed spaces is bounded.
Let E be a real Banach space and P a subset of E. Then, P is called a coneif and only if
P1) P is closed, non empty and P 6= 0
P2) a, b ∈ R a, b ≥ 0; x, y ∈ P ⇒ ax+ by ∈ P
P3) x ∈ P and −x ∈ P ⇒ x = 0
Given a cone P ⊂ E, we define a partial ordering ≤ with respect to P byx ≤ y if and only if y − x ∈ P. We write x < y to indicate that x ≤ y butx 6= y, while x << y will stand for y − x ∈ IntP. (IntP ∼= interior of P ).
The cone P is called normal if there is a number K > 0, such that for allx, y ∈ E, 0 ≤ x ≤ y ⇒ ‖ x ‖≤ K ‖ y ‖, where K is called the normal constantof P.
The cone P is called regular if every increasing sequence which is boundedfrom above is convergent. That is if xn is sequence such that x1 ≤ x2 ≤... ≤ xn ≤ y for some y ∈ E, then there is x ∈ E such that ‖ xn − x ‖→ 0 asn→∞.
Equivalently the cone P is called regular if every decreasing sequence which isbounded from below is convergent[4]. Throughout this article we assume thatthe cone P is normal with constant K.
P is called minihedral cone if supx, y exists for all x, y ∈ E, and stronglyminihedral if every subset of E which is bounded from above has a supremumand hence any subset of E which is bounded from below has an infimum . Anorm ‖ . ‖ on E is called monotonic if 0 ≤ x ≤ y implies ‖ x ‖≤‖ y ‖, andsemi-monotonic if ‖ x ‖≤ K ‖ y ‖ for some K > 0 and all x and y such
2
D. TURKOGLU ET AL: CONE METRIC SPACES
107
that 0 ≤ x ≤ y [3]. It is know by [3] that P is normal if and only if ‖ . ‖ issemi-monotonic.
Throughout this article we assume that P is a cone in E with IntP 6= ∅and ≤ is partial ordering with respect to P. We also appeal to the followingrelations:
IntP + IntP ⊂ IntP and λIntP ⊂ IntP, λ > 0
2 Cone Metric Spaces and Baire’s Category Theorem
Definition 1 [4] A cone metric space is an ordered pair (X, d), where Xany set and d : X × X → E is a mapping satisfying: d1) 0 < d(x, y) for allx, y ∈ X, and d(x, y) = 0 if and only if x = y. d2) d(x, y) = d(y, x) for allx, y ∈ X. d3) d(x, y) ≤ d(x, z) + d(z, y) for all x, y, z ∈ X.
Example 2 Let E = Rn and P = (x1, x2, ..., xn) ∈ Rn : xi ≥ 0, i = 1, 2, 3, ..., nwith x = (x1, x2, ..., xn) ≤ y = (y1, y2, ..., yn) if and only if (yi − xi) ≥ 0 forall i = 1, 2, 3, ..., n. Then any subset of P has an infimum.
Definition 3 Let A 6= ∅ and B 6= ∅ be two subset of a cone metric space(X, d) . Then the distance between A and B, denoted by d (A,B) , is definedby d (A,B) = inf d (x, y) : x ∈ A, y ∈ B . If A = a , we write d(a,B) ford(A,B).
Example 4 Let E = R2 and P = (x, y) : x ≥ 0, y ≥ 0 . Define d : R2 ×R2 → E by d((x1, x2), (y1, y2)) = (| x1 − y1 |, | x2 − y2 |) and let A =(x, y) ∈ R2 : 0 ≤ x ≤ 1, 0 ≤ y ≤ 1 , B = (x, y) ∈ R2 : 2 ≤ x ≤ 3, 0 ≤ y ≤ 1 ,C = (0, 0) , D =
(12, 1
2
). Then d(A,B) = (1, 0) , d(A,C) = (0, 0) ,
d(C,B) = (2, 0) .
Example 5 Let E = R2 and P = (x, y) : x ≥ 0, y ≥ 0 . Define d : R2 ×R2 → E by d((x1, x2), (y1, y2)) = (| x1 − y1 |, | x2 − y2 |) and let A =(x, y) ∈ R2 : 0 ≤ x ≤ 1, 2 ≤ y ≤ 3 , B = (x, y) ∈ R2 : 3 ≤ x ≤ 4, 0 ≤ y ≤ 3 .Then d(A,B) = (2, 1) .
Lemma 6 Let c1, c2 ∈ P such that c1 < c2 + s for all s >> 0. Then c1 ≤ c2.
Proposition 7 (see prop.(1) in [2]) Every cone metric space (X, d) is a firstcountable topological space, whose topology τc is given by
τc = U ⊂ X : ∀x ∈ U, ∃c >> 0 such that B(x, c) ⊂ U ∪ ∅ (1)
where
3
D. TURKOGLU ET AL: CONE METRIC SPACES
108
B(x, c) = y ∈ X : d (x, y) << c (2)
Theorem 8 Let (X, d) be a cone metric space and A 6= ∅ a subset of X.Then x ∈ A if and only if d (x,A) = 0.
PROOF. Suppose x ∈ A. Then, for fixed c >> 0 and each n ∈ N, B(x,c
n
)∩
A 6= ∅. Therefore, for each n ∈ N there exists an ∈ A such that 0 ≤ d (x,A) ≤d (x, an) <
c
n. Hence,
c
n− d(x,A) ∈ P , for all n ∈ N. That P is closed implies
that −d(x,A) ∈ P and our conclusion then is that d (x,A) = 0. Conversely,
d(x,A) = 0 <c0n
for all n ∈ N and some c0 >> 0 implies the existence of a
sequence an ∈ A such that d(x, an) <c0n
for all n ∈ N. Since P is a closed
cone then we conclude that − limn→∞ d(x, an) ∈ P, limn→∞ d(x, an) ∈ Pand hence limn→∞ d(x, an) = 0. Now let c >> 0 be given and choose δ > 0such that ‖b‖ < δ implies that b << c. Since limn→∞ d(x, an) = 0 then forsome n0 ∈ N and all n > n0 we have ‖d(x, an)‖ < δ and so d(x, an) << cfor all n > n0. Thus, an → x in (X, d). Since every cone metric space is firstcountable topological space then x ∈ A.
As a consequence of the above Theorem, if a subset A of a cone metric space(X, d) is closed and x /∈ A, then d (x,A) > 0.
Theorem 9 Every cone metric space (X, d) is a T2 − space.
PROOF. Let x 6= y be two points in X. Suppose B(x,c
2) ∩ B(y,
c
2) = ∅ for
all c >> 0, then by the triangle inequality d(x, y) ≤ c for all c >> 0. Hence
d(x, y) ≤ c0n
for all n ∈ N and some c0 >> 0. Since P is a closed cone then
d(x, y) = 0 and so x = y which is a contradiction.
Definition 10 A subset M of a topological space (X, τc) is called: (I) Rare(nowhere dense) in X if Int(M) = ∅. (II) Meager (the first category) in Xif M is the union of countably many sets each of which is rare in X.(III)Nonmeager (second category) in X if M is not meager in X.
Lemma 11 [4]Let (X, d) be a cone metric space, P be a normal cone withnormal constant K. Let xn and yn be two sequences in X and yn → y,xn → x as (n→∞), then d(xn, yn)→ d(x, y) as n→∞.
Lemma 12 Let (X, d) be a cone metric space. If an ∈ E such that b ≤ an forall n and an → a then b ≤ a.
4
D. TURKOGLU ET AL: CONE METRIC SPACES
109
Theorem 13 (Baire’s Category Theorem in Cone Metric Space) Ev-ery complete nonempty cone metric space (X, d) is nonmeager in itself. HenceX = ∪∞k=1Mk, Mk closed, then at least one Mk contains a nonempty open sub-set.
PROOF. Suppose the complete cone metric space (X, d) were first category.Then X = ∪∞k=1Mk with each Mk rare in X, we can shall construct a Cauchysequence xk in X whose limit x (which exists by completeness) is no Mk
and get a contradiction. By assumption, M1 is rare in X, so that by defi-nition, M1 does not contain a nonempty open set. But X does have. Thisimplies that M1 6= X. Hence choose x1 ∈ M1
cand an open ball about it,
say B1 = B(x1, c1) = M1c
with c1 <c
2where c ∈ IntP is some fixed point.
By assumption, M2 is rare in X, so M2 does not contain a nonempty open
set. Hence, it does not contain the open ball B(x1,c12
). This implies that
M2c ∩ B(x1,
c12
) is not empty and open, so that we may choose an open ball
in this set say, B2 = B(x2, c2) ⊂ M2c ∩ B(x1,
c12
), c2 <c12. By induction
we thus construct a sequence of balls, Bk = B(xk,ck2
), ck <c
2ksuch that
Bk ∩Mk = ∅ and Bk+1 ⊂ B(xk,ck2
) ⊂ Bk, k = 1, 2, 3, ... . Since ck <c
2kthe
sequence xk of the centers is Cauchy and hence converges, say xk → x ∈ Xbecause X is complete by assumption. Also, for every m and n > m we have
Bn ⊂ B(xm,cm2
), so that d(xm, x) ≤ d(xm, xn) + d(xn, x) <cm2
+ d(xn, x).
Since xn → x, then we havec0n
+cm2− d(xm, x) ∈ P for all n ∈ N and some
c0 >> 0. Since P is a closed cone we conclude thatcm2− d(xm, x) ∈ P and so
x ∈ Bm for every m. Since Bm ⊂ Mmc, we now see that x /∈ Mm for every
m, so that x /∈ X = ∪∞m=1Mm. This contradicts that x ∈ X.
3 Cone Normed Spaces
Definition 14 (see also [15], [16]) A cone normed space is an ordered pair(X, ‖ . ‖c) where X is a vector space over R and ‖ . ‖c: X → E is a functionsatisfying:
C1) 0< ‖ x ‖c, for all x ∈ X.C2) ‖ x ‖c= 0 if and only if x = 0.
C3) ‖ α.x ‖c=| α |‖ x ‖c, for each x ∈ X and α ∈ R.C4) ‖ x+ y ‖c≤‖ x ‖c + ‖ y ‖c, x, y ∈ X.
5
D. TURKOGLU ET AL: CONE METRIC SPACES
110
Proposition 15 Each cone normed space is cone metric space. Namely, d :X ×X → E is defined by d(x, y) =‖ x− y ‖c .
PROOF. for all x, y, z ∈ X
d1) d(x, y) = 0 if and only if ‖ x−y ‖c= 0 if and only if x−y = 0⇔ x = y.
d2) d(x, y) = ‖ x− y ‖c= ‖ −(y − x) ‖c by (C3) ‖ y − x ‖c= d(y, x).
d3) d(x, y) =‖ x − y ‖c=‖ x − z + z − y ‖c by (C4) ‖ x − z + z − y ‖c≤‖x− z ‖c + ‖ z − y ‖c= d (x, z) + d (z, y).
Remark 16 Convergence in cone normed space is described by the cone met-ric induced by the norm. For example, a sequence xn ∈ X is said to con-verge to an element x ∈ X, if for all c >> 0 there exists n0 such thatd(xn, x) =‖ xn − x ‖c<< c for all n > n0. Hence, by [4], when the coneis normal, a sequence xn → x if and only if ‖ d(xn, x) ‖=‖‖ xn − x ‖c‖→ 0as n→∞.
Definition 17 A sequence xn ∈ X is called Cauchy sequence if for all c >> 0there exists n0 such that d(xn, xm) =‖ xn − xm ‖c<< c for all m,n > n0.Equivalently by [4] if lim
m,n→∞‖ d(xn, xm) ‖= lim
m,n→∞‖‖ xn − xm ‖c‖= 0.
Definition 18 A cone normed space (X, ‖ . ‖c) is called cone Banach spaceif every Cauchy sequence in X convergent in X.
Example 19 Let (E, ‖ . ‖c), E = R2, P = (x, y) : x ≥ 0, y ≥ 0 . Thefunction ‖ . ‖c defined by ‖ (x, y) ‖c= (α | x |, β | y |), α, β > 0 is a conenorm space and cone Banach space. Indeed,
C1) ‖ (x, y) ‖c> 0, ‖ (x, y) ‖c= 0 ⇔ (α | x |, β | y |) = (0, 0) ⇔ α | x |= 0and β | y |= 0⇔ x = 0, y = 0 ⇔ (x, y) = (0, 0).
C2) ‖ a(x, y) ‖c=‖ (ax, ay) ‖c= (α | ax |, β | ay |) =| a | (α|x|, β|y|) =| a | . ‖(x, y) ‖c .
C3) ‖ (x, y) + (z, w) ‖c=‖ x+ z, y + w ‖c= (α | x+ z |, β | y + w |) ≤ (α | x |+α | z |, β | y | +β | w |) = (α | x |, β | y |) + (α | z |, β | w |) = ‖ (x, y) ‖c +‖ (z, w) ‖c .
This space is complete and hence cone Banach. Let zn = (xn, yn) ∈ R2 be aCauchy sequence.
6
D. TURKOGLU ET AL: CONE METRIC SPACES
111
Hence by Lemma 4 in [4],
limm,n→∞
‖‖ zn − zm ‖c‖= limm,n→∞
‖‖ xn − xm, yn − ym ‖c‖=
limm,n→∞
‖ (α | xn−xm |, β | yn−ym |) ‖= limm,n→∞
√α2 | xn − xm |2 +β2 | yn − ym |2 = 0.
Therefore, | xn − xm |→ 0, | yn − ym |→ 0 as n,m→∞ and hence xn andyn are Cauchy sequence in the field R. Find x, y ∈ R such that | xn−x |→ 0, | yn − y |→ 0 as n→∞.
We shall show that zn = (xn, yn)→ z = (x, y) in cone norm space and hence(R2, ‖ . ‖c) is complete. lim
n→∞‖‖ zn − z ‖c‖= lim
n→∞‖‖ (xn − x, yn − y) ‖c‖=
limn→∞
‖ (α | xn − x |, β | yn − y |‖= limn→∞
√α2 | xn − x |2 +β2 | yn − y |2 = 0.
Proposition 20 Every cone normed space is topological space.
The result follows by [2] since each cone normed space is cone metric space.Actually, the topology is given by
τc = U ⊂ X : ∀x ∈ U, ∃c >> 0 such that B(x, c) ⊂ U ∪ Φ (3)
whereB(x, c) = y ∈ X :‖ x− y ‖c<< c (4)
Proposition 21 The cone metric d induced by a cone norm on a cone normedspace satisfies :
d (x+ a, y + a) = d (x, y) (5)
d (αx, αy) =| α | d (x, y) (6)
for all x, y, a ∈ X and every scalar α.
PROOF. We have d (x+ a, y + a) =‖ x+ a− (y+ a) ‖c=‖ x− y ‖c= d (x, y)and d (αx, αy) =‖ αx− αy ‖c=| α |‖ x− y ‖c=| α | d (x, y) .
Definition 22 The absolute value function abs : E → E is defined by:
abs(a) =
a a ≥ 0
−a a < 0
0 otherwise
(7)
Note that if a < 0 then −a > 0 and abs(a) ∈ P.
7
D. TURKOGLU ET AL: CONE METRIC SPACES
112
Definition 23 A cone norm ‖ . ‖n: E → P is said to satisfy the property (A)if : −c ≤ a ≤ c if and only if ‖ a ‖n≤ c, for all a ∈ E and c >> 0.
Example 24 Let E = R2 and P = (x, y) ∈ R2 : x ≥ 0, y ≥ 0 . Then thenorm ‖ . ‖n: E → P defined by ‖ (x, y) ‖n= (| x |, | y |) , satisfies the property(A). Indeed a = (x, y) , satisfies ‖ a ‖n≤ c = (c1, c2) , c1, c2 > 0 if and only if(| x |, | y |) ≤ (c1, c2) if and only if −c = (−c1,−c2) ≤ a = (x, y) ≤ (c1, c2) =c. Also it can be easily seen that ‖ . ‖n is monotonic on P (i.e. 0 ≤ a ≤ bimplies ‖ a ‖n≤ ‖ b ‖n).
Remark 25 Using (C4) and that E is normal cone with constant K, we canshow that
‖ abs(‖ y ‖c − ‖ x ‖c) ‖≤ K ‖‖ x− y ‖c‖ . ∀x, y ∈ X (8)
Indeed, ‖ x ‖c=‖ x−y+y ‖c≤‖ x−y ‖c + ‖ y ‖c and ‖ y ‖c=‖ y−x+x ‖c≤‖y − x ‖c + ‖ x ‖c, hence, ‖ x ‖c − ‖ y ‖c≤‖ x − y ‖c and ‖ y ‖c − ‖x ‖c≤‖ x− y ‖c . But then 0 ≤ abs(‖ y ‖c − ‖ x ‖c) ≤‖ x− y ‖c implies that‖ abs(‖ y ‖c − ‖ x ‖c) ‖≤ K ‖‖ x − y ‖c‖ . Furthermore, if ‖ . ‖n is a conenorm on E with the property (A) then ‖‖‖ x ‖c − ‖ y ‖c‖n‖≤ K ‖‖ x−y ‖c‖ .
For more examples of cone normed spaces and the completion of cone normedspaces see [15] and [16], respectively.
4 Bounded Linear Operators Between Cone Normed Spaces
Definition 26 A linear operator T : (X, ‖ . ‖c1) → (Y, ‖ . ‖c2) between conenormed spaces over the same cone P in E, is called : (a) Bounded if thereexists M > 0 such that for all x ∈ X,
‖ Tx ‖c2≤M ‖ x ‖c1 (9)
(b) Scalar bounded if there exists L > 0 such that for all x ∈ X,
‖‖ Tx ‖c2‖≤ L ‖‖ x ‖c1‖ (10)
When T is scalar bounded, we define its scalar norm by
‖ T ‖s= inf L > 0 :‖‖ Tx ‖c2‖≤ L ‖‖ x ‖c1‖, ∀x ∈ X (11)
8
D. TURKOGLU ET AL: CONE METRIC SPACES
113
From the above definition it easy to see that every bounded linear operatorbetween cone normed spaces is scalar bounded with L = MK and K is thenormal constant of the cone P in E and
‖ T ‖s= sup06=x∈X
‖‖ Tx ‖c2‖‖‖ x ‖c1‖
(12)
Proposition 27 If the norm ‖ . ‖ on E is monotonic or the normal constantK = 1, then (X, ‖‖ . ‖c1‖) is a normed linear space.
PROOF. If ‖ x+ y ‖c1≤‖ x ‖c1 + ‖ y ‖c1 , then monotonicity of ‖ . ‖ impliesthat ‖ ‖ x+y ‖c1‖≤‖‖ x ‖c1 + ‖ y ‖c1‖≤‖‖ x ‖c1‖ + ‖‖ y ‖c1‖ and the triangleinequality follows. The other axioms for the norm are trivially satisfied.
Remark 28 If ‖ . ‖ is monotonic on E then we call the above normed space(X, ‖‖ . ‖c1‖), the normed space associated to the cone normed space ( X, ‖. ‖c1)
Definition 29 A map T : (X, ‖ . ‖c1) → (Y, ‖ . ‖c2) is called continuous atx0 ∈ X, if for all q ∈ E with q >> 0 there exists p ∈ E, p >> 0 such that forall x ∈ X, ‖ x− x0 ‖c1< p implies ‖ Tx− Tx0 ‖c2< q. T is called continuous,if it is continuous at each x ∈ X.
Theorem 30 If T : (X, ‖ . ‖c1) → (Y, ‖ . ‖c2) is a bounded linear operatorthen it is continuous.
PROOF. Assume T is bounded and let x0 ∈ X then there exists M > 0 such
that ‖ Tx ‖c2≤ M ‖ x ‖c1 for all x ∈ X. Now for q >> 0, choose p =1
Mq.
Then, x ∈ X, ‖ x− x0 ‖c1< p implies ‖ Tx− Tx0 ‖c2=‖ T (x− x0) ‖c2≤ M ‖x− x0 ‖c1< M
q
M= q.
Linear operators on finite dimensional normed linear spaces are necessarybounded. However, in general, it is not the case for cone normed spaces. Also,the converse of the above theorem may not be true.
Example 31 Let E = R2 and P = (x, y) ∈ R2 : x ≥ 0, y ≥ 0 and X = E.Define on E the cone norm ‖ (x, y) ‖c= (| x |, | y |) . Then ,
(a) the linear operator T : (E, ‖ . ‖c) → (E, ‖ . ‖c) define by T (x, y) =(x− y, y − x) is not bounded. Indeed, for any m > 0, m 6= 1, let xm =(
1
m,m), then for m > 1, we have ‖ Txm ‖c=‖
(m− 1
m,
1
m−m
)‖c=
9
D. TURKOGLU ET AL: CONE METRIC SPACES
114
(m− 1
m,m− 1
m
)is not comparable to m. ‖ (
1
m,m) ‖c= (1,m2) , and
for 0 < m ≤ 1, let x=(1,−1) then ‖ Tx ‖c=‖ (2,−2) ‖c= (2, 2) ≥ m. ‖(1,−1) ‖c= (m,m) .
(b) The linear operator T in (a) is continuous. Since cone metric spaces arefirst countable [2], in order to prove continuity of T, it will be enough to showthat it is sequentially continuous. To this end assume that zn = (xn, yn) isa sequence in E such that zn → z = (x, y) . Then, by Lemma (1) in [4],lim
n→∞‖ d (zn, z) ‖= lim
n→∞‖‖ zn − z ‖c‖= lim
n→∞‖ (| xn − x |, | yn − y |) ‖= 0.
Equivalently, if | xn−x |→ 0 and | yn−y |→ 0. But then, 0 ≤‖ Tzn−Tz ‖c=‖(xn − yn, yn − xn)−(x− y, y − x) ‖c=‖ (xn − yn − x+ y, yn − xn − y + x) ‖c=(| (xn − yn − x+ y |, | yn − xn − y + x |) ≤
(| xn − x | + | y − yn |, | yn − y | + | x− xn |) implies,
0 ≤‖‖ Tzn−Tz ‖c‖≤√
(| xn − x | + | yn − y |)2 + (| yn − y | + | x− xn |)2 →0, hence ‖‖ Tzn − Tz ‖c‖→ 0, that is Tzn → Tz.
(c) It can be easily shown that any linear operator on E represented by a diag-onal matrix is bounded. For example, if T is defined by T (x, y) = (αx, βy) ,α, β ∈ R, then ‖ T (x, y) ‖c≤ max | α |, | β | . ‖ (x, y) ‖c .
Theorem 32 If the norm of E is monotonic. Then any linear operator on afinite dimensional cone normed space is scalar bounded.
PROOF. Let (X, ‖ . ‖c1) be a finite dimensional cone normed space over acone P in E with a monotonic norm ‖ . ‖, and (Y, ‖ . ‖c2) an arbitrarycone normed space over the same cone. Then any linear operator T from Xinto Y is bounded if treated as a linear operator between the normed linearspaces (X, ‖‖ . ‖c1‖) , (Y, ‖‖ . ‖c2‖) . But bounded linear operators betweenthese two normed spaces are exactly scalar bounded operators from (X, ‖ . ‖c1)into (Y, ‖ . ‖c2) .
Acknowledgements
The research has been supported by The Scientific and Technological Re-search Council of Turkey (TUBITAK-Turkey).
10
D. TURKOGLU ET AL: CONE METRIC SPACES
115
References
[1] D. Ilic, V. Rakocevic. Common Fixed Points For Maps on Cone Metric Space.J. Math. Anal. Appl. 341, 2, 876-882 (2008).
[2] D. Turkoglu, M. Abuloha. Cone Metric Spaces and Fixed Point Theorems inDiametrically Contractive Mappings. Acta Mathematica Sinica, English Series.,26, 3 489-496 (2010).
[3] K.Deimling. Nonlinear Functional Analysis. Springer-Verlage , 1985.
[4] L.G. Huang, X. Zhang. Cone Metric Spaces and Fixed Point Theorems ofContractive Mappings. J. Math. Anal. Appl., 332, 1468-1476, 2007.
[5] M. Abbas, G. Jungck. Common Fixed Point Results For Non CommutingMappings Without Continuity In Cone Metric Spaces. J. Math. Anal. Appl.341, 1, 416-420 (2008).
[6] R. Raja, S. M. Vaezpour, Some Extensions of Banach‘s Contraction Principlein Complete Cone Metric Spaces. Fixed Point Theory and Applications, (2008),Art. ID 768294, 11pp..
[7] Pasquale Vetro, Common Fixed Points in Cone Metric Spaces. Rendi ContiDel Matematico Di Palermo. Serie II, Tomo LVI, 464-468,2007.
[8] Sh. Rezapour, R. Hamlbarani, Some Notes on the Paper ”Cone Metric Spacesand Fixed Point Theorems of Contractive Mappings”. J. Math. Anal. Appl.345, 2, 719-724 (2008).
[9] D. Ilic, V. Rakocevic, Quasi-Contraction on Cone Metric space. AppliedMathematics Letters 22, 5, 728-731(2009).
[10] M. Abbas, B.E.Rhoades, Fixed and Periodic Point Results in Cone metricSpaces. Applied Mathematics Letters 22, 4, 511-515 (2009).
[11] D. Wardowski, Endpoint and Fixed Points of set-valued Contractions in ConeMetric Spaces, Nonlinear Analysis 71, 1-2, 512-516 (2009).
[12] Sh. Rezapour, Best Approximations in Cone Metric Spaces, MathematicaMoravica, Vol.11 (2007), 85-88.
[13] Cristina Di Bari, Pasquale Vetro, ϕ−Pairs and Common Fixed Points in ConeMetric Spaces, Rendiconti del Circolo Matematico di Palermo(2), 295-303, 2008.
[14] Akbar Azam, Muhammad Arshad, Ismat Beg, Common Fixed Points of TwoMaps in Cone Metric Spaces, Rendiconti del Circolo Matematico di Palermo(2),3, 433-441 (2008).
[15] T. Abdeljawad, Turkoglu D. and Abuloha M. Some theorems and examples ofcone Banach spaces, Journal of Computational Analysis and Applications, 12(4), 739-753 (2010).
[16] Thabet Abdeljawad, Completion of Cone Metric Spaces, Hacettepe JournalMath. and Statistics, 39 (1), (2010).
11
D. TURKOGLU ET AL: CONE METRIC SPACES
116
Stability of a mixed type additive and quadraticfunctional equation in random normed spaces
M. Eshaghi Gordji1, M. Bavand Savadkouhi2 and J. M. Rassias3
1,2 Department of Mathematics, Semnan University, P. O. Box 35195-363,Semnan, Iran;
Center of Excellence in Nonlinear Analysis and Applications, SemnanUniversity, Semnan, Iran
3 Section of Mathematics and Informatics, Pedagogical Department, Nationaland Capodistrian University of Athens, 4, Agamemnonos St., Aghia Paraskevi,
Athens 15342, Greecee-mail: [email protected], [email protected], [email protected]
Abstract. In this paper, we obtain the general solution and the stability result for thefollowing functional equation
f(3x+ y) + f(3x− y) = f(x+ y) + f(x− y) + 2f(3x)− 2f(x)
in random normed spaces (in the sense of Sherstnev) under arbitrary t-norms.
1. Introduction
The stability problem of functional equations originated from the question of Ulam [59] in1940, concerning the stability of group homomorphisms. In 1941, D. H. Hyers [38] gave thefirst affirmative answer to the question of Ulam for Banach spaces. In 1978, Th. M. Rassias[53] provided a generalization of Hyers’ Theorem which allows the Cauchy difference to beunbounded. (see [8]–[33] and [49]–[52]).
This new concept is known as generalized Hyers-Ulam stability of functional equations(see [1]-[4],[28, 29, 37],[39]-[46] and [48, 54, 57]). The functional equation
f(x+ y) + f(x− y) = 2f(x) + 2f(y) (1.1)
is related to symmetric bi-additive function. It is natural that this equation is called aquadratic functional equation. In particular, every solution of the quadratic equation (1.1)is said to be a quadratic function. It is well known that a function f between real vectorspaces is quadratic if and only if there exits a unique symmetric bi-additive function B suchthat f(x) = B(x, x) for all x (see [1, 43]). The bi-additive function B is given by
B(x, y) =1
4(f(x+ y)− f(x− y)) (1.2)
Hyers-Ulam-Rassias stability problem for the quadratic functional equation (1.1) was provedby Skof for functions f : A → B, where A is normed space and B Banach space (see [58]).Cholewa [5] noticed that the Theorem of Skof is still true if relevant domain A is replacedby an abelian group. In the paper [7], Czerwik proved the Hyers-Ulam-Rassias stability ofthe equation (1.1). Grabiec [34] has generalized the above mentioned result.
02000 Mathematics Subject Classification: 46S40,54E40.0Keywords: Additive-quadratic functional equation; Random normed space.
117
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2,117-129,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC
2 M. Eshaghi Gordji, M. Bavand Savadkouhi and J. M. Rassias
A. Najati and M. B. Moghimi in [47] introduced the following functional equation
f(2x+ y) + f(2x− y) = f(x+ y) + f(x− y) + 2f(2x)− 2f(x)
with f(0)=0. It is easy to see that the mapping f(x) = ax2 + bx + c is a solution of thefunctional equation. They established the general solution and the generalized Hyers-Ulam-Rassias stability for the functional equation whenever f is a mapping between two quasiBanach spaces.The aim of this paper is to investigate the stability of the additive–quadratic functionalequation in random normed spaces (in the sense of Sherstnev), under arbitrary continuoust-norms.In the sequel we adopt the usual terminology, notations and conventions of the theory ofrandom normed spaces, as in [6, 55, 56]. Throughout this paper, ∆+ is the space of dis-tribution maps; that is, the space of all mappings F : R ∪ −∞,∞ → [0, 1], such that Fis left-continuous and non-decreasing on R, F (0) = 0 and F (+∞) = 1. D+ is a subset of∆+ consisting of all functions F ∈ ∆+ for which l−F (+∞) = 1, where l−f(x) denotes theleft limit of the function f at the point x; that is, l−f(x) = limt→x− f(t). The space ∆+
is partially ordered by the usual point-wise ordering of functions, i.e., F ≤ G if and only ifF (t) ≤ G(t) for all t in R. The maximal element for ∆+ in this order is the distributionfunction ε0 given by
ε0(t) =
0, if t ≤ 0,
1, if t > 0.
Definition 1.1. ([55]). A mapping T : [0, 1]× [0, 1] → [0, 1] is a continuous triangular norm(briefly, a continuous t-norm) if T satisfies the following conditions:(a) T is commutative and associative;(b) T is continuous;(c) T (a, 1) = a for all a ∈ [0, 1];(d) T (a, b) ≤ T (c, d) whenever a ≤ c and b ≤ d for all a, b, c, d ∈ [0, 1].
Typical examples of continuous t-norms are TP (a, b) = ab, TM (a, b) = min(a, b) andTL(a, b) = max(a + b − 1, 0) (the Lukasiewicz t-norm). Recall (see [35], [36]) that if T is at-norm and xn is a given sequence of numbers in [0, 1], Tn
i=1xi is defined recurrently byT 1
i=1xi = x1 and Tni=1xi = T (Tn−1
i=1 xi, xn) for n ≥ 2. T∞i=nxi is defined as T∞i=1xn+i. It isknown ([36]) that for the Lukasiewicz t-norm the following implication holds:
limn→∞
(TL)∞i=1xn+i = 1 ⇐⇒∞∑
n=1
(1− xn) <∞. (1.3)
Definition 1.2. ([56]). A random normed space (briefly, RN-space) is a triple (X,µ, T ),where X is a vector space, T is a continuous t-norm, and µ is a mapping from X into D+
such that, the following conditions hold:(RN1) µx(t) = ε0(t) for all t > 0 if and only if x = 0;(RN2) µαx(t) = µx( t
|α| ) for all x ∈ X, α 6= 0;
(RN3) µx+y(t+ s) ≥ T (µx(t), µy(s)) for all x, y ∈ X and t, s ≥ 0.
Every normed space (X, ‖.‖) defines a random normed space (X,µ, TM ) where
µx(t) =t
t+ ‖x‖ ,
for all t > 0, and TM is the minimum t-norm. This space is called induced random normedspace.
M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES
118
Stability of a mixed type additive and quadratic functional ... 3
Definition 1.3. Let (X,µ, T ) be an RN-space.(1) A sequence xn in X is said to be convergent to x in X if, for every ε > 0 and λ > 0,there exists positive integer N such that µxn−x(ε) > 1− λ whenever n ≥ N .(2) A sequence xn in X is called Cauchy sequence if, for every ε > 0 and λ > 0, thereexists positive integer N such that µxn−xm(ε) > 1− λ whenever n ≥ m ≥ N .(3) An RN-space (X,µ, T ) is said to be complete if and only if every Cauchy sequence in Xis convergent to a point in X.
Theorem 1.4. ([55]). If (X,µ, T ) is an RN-space and xn is a sequence such that xn → x,then limn→∞ µxn(t) = µx(t) almost everywhere.
In this paper we deal with the following functional equation:
f(3x+ y) + f(3x− y) = f(x+ y) + f(x− y) + 2f(3x)− 2f(x) (1.4)
on random normed spaces. It is easy to see that the function f(x) = ax2 + bx is a solutionof the functional equation (1.4). In section 2 we investigate the general solution of functionalequation (1.4) when f is a mapping between vector spaces, and in section 3 we establish thestability of the functional equation (1.4) in RN-spaces.
2. General solution
We need the following two lemmas for the general solution of (1.4). Throughout thissection X and Y are vector space.
Lemma 2.1. If an even function f : X −→ Y with f(0) = 0 satisfies (1.4) for all x, y ∈ X,then f is quadratic.
Proof. Replacing y by x+ y in (1.4), by evenness of f , we obtain
f(4x+ y) + f(2x− y) = f(2x+ y) + f(y) + 2f(3x)− 2f(x) (2.1)
for all x, y ∈ X. If we Replace y by −y in (2.1), we get by evenness of f,
f(4x− y) + f(2x+ y) = f(2x− y) + f(y) + 2f(3x)− 2f(x) (2.2)
for all x, y ∈ X. If we add (2.1) to (2.2), we have
f(4x+ y) + f(4x− y)− 2f(y) = 4f(3x)− 4f(x) (2.3)
for all x, y ∈ X. Letting y = 0 in (2.3), we get
f(4x) = 2f(3x)− 2f(x) (2.4)
for all x ∈ X. Once again letting y = 2x in (2.3), we get
f(6x) = 4f(3x) + f(2x)− 4f(x) (2.5)
for all x ∈ X. It follows from (2.4) and (2.5) that
f(6x) = 2f(4x) + f(2x) (2.6)
for all x ∈ X. Once again letting y = 4x in (2.3), we get
f(8x) = 2f(4x) + 4f(3x)− 4f(x) (2.7)
for all x ∈ x. It follows from (2.4) and (2.7) that
f(8x) = 4f(4x). (2.8)
If we replace x by x4
in (2.8), we get that
f(2x) = 4f(x) (2.9)
M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES
119
4 M. Eshaghi Gordji, M. Bavand Savadkouhi and J. M. Rassias
for all x ∈ X. Replacing x by x2
in (2.6), we obtain
f(3x) = 2f(2x) + f(x) (2.10)
for all x ∈ X. It follows from (2.9) and (2.10) that
f(3x) = 9f(x). (2.11)
Replacing y by 3y in (1.4), we get
f(3x+ 3y) + f(3x− 3y) = f(x+ 3y) + f(x− 3y) + 2f(3x)− 2f(x) (2.12)
for all x, y ∈ X. By (2.12) and using (1.4) and (2.11), we get
9f(x+ y) + 9f(x− y) = f(x+ y) + f(x− y) + 2f(3y)
− 2f(y) + 2f(3x)− 2f(x)
for all x, y ∈ X. Hence the function f : X → Y is quadratic.
Corollary 2.2. If an even function f : X → Y satisfies (1.4) for all x, y ∈ X, then mappingg : X → Y defined by g(x) := f(x)− f(0) is quadratic.
Lemma 2.3. If an odd function f : X → Y satisfies (1.4) for all x, y ∈ X, then f is additive.
Proof. By letting y = x in (1.4), we get
f(4x) = 2f(3x)− 2f(x) (2.13)
for all x ∈ X. If we let y = 3x in (1.4), we get by the oddness of f,
f(6x) = 2f(3x) + f(4x)− 2f(x)− f(2x) (2.14)
for all x ∈ X. It follows from (2.13) and (2.14) that
f(6x) = 2f(4x)− f(2x) (2.15)
for all x ∈ X. Once again, by letting y = 5x in (1.4), we get by the oddness of f,
f(8x)− f(2x) = f(6x)− f(4x) + 2f(3x)− 2f(x) (2.16)
for all x ∈ X. By (2.13) and using (2.15) and (2.16), we get
f(8x) = 2f(4x) (2.17)
for all x ∈ X. If we replace x by x4
in (2.17), we obtain
f(2x) = 2f(x) (2.18)
for all x ∈ X. Now, in (2.15), replacing x by x2, we have
f(3x) = 2f(2x)− f(x) (2.19)
for all x ∈ X. It follows from (2.18) and (2.19) that
f(3x) = 3f(x) (2.20)
for all x ∈ X. By (1.4) we conclude that
f(3x+ y) + f(3x− y) = f(x+ y) + f(x− y) + 4f(x) (2.21)
for all x, y ∈ X. Replacing x in (2.21) by x3
and multiplying both sides of (2.21) by 2 weobtain
f(x+ 3y) + f(x− 3y) = 3f(x+ y) + 3f(x− y)− 4f(x) (2.22)
for all x, y ∈ X. Replacing x and y by y and x in (2.21), respectively, we get
f(x+ 3y)− f(x− 3y) = f(x+ y)− f(x− y) + 4f(x) (2.23)
M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES
120
Stability of a mixed type additive and quadratic functional ... 5
for all x, y ∈ X. By adding (2.22) to (2.23), we obtain
f(x+ 3y) = 2f(x+ y) + f(x− y)− 2f(x) + 2f(y) (2.24)
for all x, y ∈ X. Replacing y by −y in (2.24)
f(x− 3y) = 2f(x− y) + f(x+ y)− 2f(x) + 2f(y) (2.25)
for all x, y ∈ X. Once again, if we replace x in (2.24) by x− 2y, we get that
f(x+ y) = 2f(x− y) + f(x− 3y)− 2f(x− 2y) + 2f(y) (2.26)
for all x, y ∈ X. It follows from (2.25) and (2.26),
f(x− 2y) = 2f(x− y)− f(x) (2.27)
for all x, y ∈ X. Replacing y by −y in (2.27), we lead to
f(x+ 2y) = 2f(x+ y)− f(x) (2.28)
for all x, y ∈ X. If we replace y by x+ y in (2.27), we get that
f(x+ 2y) = f(x) + 2f(y) (2.29)
for all x, y ∈ X. It follows from (2.28) and (2.29),
f(x+ y) = f(x) + f(y)
for all x, y ∈ X. Hence mapping f : X → Y is additive.
Theorem 2.4. A function f : X → Y satisfies (1.4) for all x, y ∈ X if and only if thereexists a symmetric bi-additive function B : X×X → Y and an additive function A : X → Y,such that f(x) = B(x, x) +A(x) for all x ∈ X.
Proof. If there exists a symmetric bi-additive function B : X × X → Y and an additivefunction A : X → Y, such that f(x) = B(x, x) +A(x) for all x ∈ X. It is clear that functionf : X → Y satisfies (1.4).Conversely, let f satisfies (1.4). We decompose f into the even part and odd part by setting
fe(x) =1
2(f(x) + f(−x)), fo(x) =
1
2(f(x)− f(−x)),
for all x ∈ X. By (1.4), we have
fe(3x+ y) + fe(3x− y) =1
2[f(3x+ y) + f(−3x− y) + f(3x− y) + f(−3x+ y)]
=1
2[f(3x+ y) + f(3x− y)] +
1
2[f(−3x+ (−y)) + f(−3x− (−y))]
=1
2[f(x+ y) + f(x− y) + 2f(3x)− 2f(x)]
+1
2[f(−x− y) + f(−x− (−y)) + 2f(−3x)− 2f(−x)]
=1
2(f(x+ y) + f(−x− y)) +
1
2(f(x− y) + f(x− (−y)))
+ 2[1
2(f(3x) + f(−3x))]− 2[
1
2(f(x) + f(−x))]
= fe(x+ y) + fe(x− y) + 2fe(3x)− 2fe(x),
for all x, y ∈ X. This means that fe satisfies (1.4). Similarly we can show that fo satisfies(1.4). By Corollary 2.2 and Lemma 2.3, we achive that the function fe − f(0) and fo arequadratic and additive respectively. Therefore there exists a symmetric bi-additive function
M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES
121
6 M. Eshaghi Gordji, M. Bavand Savadkouhi and J. M. Rassias
B : X×X → Y such that fe(x) = B(x, x)+f(0) for all x ∈ X. So f(x) = B(x, x)+A(x)+f(0)for all x ∈ X, where A(x) = fo(x) for all x ∈ X.
3. Stability
Throughout this section X will be a real linear space and (Y, µ, T ) will be a completeRN-space.
Theorem 3.1. Let f : X → Y be an even function with f(0) = 0 for which there isρ : X ×X → D+ ( ρ(x, y) is denoted by ρx,y ) with the property:
µf(3x+y)+f(3x−y)−f(x+y)−f(x−y)−2f(3x)+2f(x)(t) ≥ ρx,y(t) (3.1)
for all x, y ∈ X and all t > 0. If
limn→∞
T∞i=1(2ρ 2n+i−14 x, 2n+i−1
4 x(22n+it) + ρ 2n+i−1
4 x, 5.2n+i−14 x
(22n+it)
+ ρ 2n+i−14 x,−3.2n+i−1
4 x(22n+it)) = 1 (3.2)
and
limn→∞
ρ2nx,2ny(22nt) = 1 (3.3)
for all x, y ∈ X and all t > 0, then there exists a unique quadratic mapping Q : X → Y suchthat
µQ(x)−f(x)(t) ≥ T∞i=1(2ρ 2i−14 x, 2i−1
4 x(2it)+ρ 2i−1
4 x, 5.2i−14 x
(2it)+ρ 2i−14 x,−3.2i−1
4 x(22it)), (3.4)
for all x ∈ X and all t > 0.
Proof. By replacing y by x+ y in (3.1), we get
µf(4x+y)+f(2x−y)−f(2x+y)−f(y)−2f(3x)+2f(x)(t) ≥ ρx,x+y(t) (3.5)
for all x, y ∈ X. If we Replace y by −y in (3.5), we get
µf(4x−y)+f(2x+y)−f(2x−y)−f(y)−2f(3x)+2f(x)(t) ≥ ρx,x−y(t) (3.6)
for all x, y ∈ X. If we add (3.5) to (3.6), we have
µf(4x+y)+f(4x−y)−2f(y)−4f(3x)+4f(x)(t) ≥ ρx,x+y(t) + ρx,x−y(t). (3.7)
Letting y = 0 in (3.7), we get the inequality
µ2f(4x)−4f(3x)+4f(x)(t) ≥ 2ρx,x(t) (3.8)
for all x ∈ X. Once again by letting y = 4x in (3.7), we get the inequality
µf(8x)−2f(4x)−4f(3x)+4f(x)(t) ≥ ρx,5x(t) + ρx,−3x(t) (3.9)
for all x ∈ X. It follows from (3.8) and (3.9) that
µf(8x)−4f(4x)(t) ≥ 2ρx,x(t) + ρx,5x(t) + ρx,−3x(t) (3.10)
for all x ∈ X. If we replace x by x4
in (3.10), we obtain
µf(2x)−4f(x)(t) ≥ 2ρ x4 , x
4(t) + ρ x
4 , 5x4
(t) + ρ x4 ,−3x
4(t) (3.11)
for all x ∈ X. Letting
ψx,x(t) = 2ρ x4 , x
4(t) + ρ x
4 , 5x4
(t) + ρ x4 ,−3x
4(t) (3.12)
for all x ∈ X, then we get
µf(2x)−4f(x)(t) ≥ ψx,x(t) (3.13)
M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES
122
Stability of a mixed type additive and quadratic functional ... 7
for all x ∈ X and all t > 0. Thus we have
µ f(2x)22
−f(x)(t) ≥ ψx,x(22t) (3.14)
for all x ∈ X and all t > 0. Hence,
µ f(2k+1x)
22(k+1) − f(2kx)22k
(t) ≥ ψ2kx,2kx(22(k+1)t) (3.15)
for all x ∈ X and all k ∈ N. This means that
µ f(2k+1x)
22(k+1) − f(2kx)22k
(t
2k+1) ≥ ψ2kx,2kx(2k+1t) (3.16)
for all x ∈ X, t > 0 and all k ∈ N. As 1 > 12
+ 122 + ... + 1
2n , by the triangle inequality itfollows
µ f(2nx)22n −f(x)
(t) ≥ Tn−1k=1 (µ f(2k+1x)
22(k+1) − f(2kx)22k
(t
2k+1)) ≥ Tn−1
k=1 (ψ2kx,2kx(2k+1t))
= Tni=1(ψ2i−1x,2i−1x(2it)) (3.17)
for all x ∈ X and t > 0. In order to prove the convergence of the sequence f(2nx)
22n , wereplace x with 2mx in (3.17) to find that
µ f(2n+mx)
22(n+m) − f(2mx)22m
(t) ≥ Tni=1(ψ2i+m−1x,2i+m−1x(2i+2mt)). (3.18)
Since the right hand side of the inequality (3.18) tends to 1 as m and n tend to infinity,
sequence f(2nx)
22n is a Cauchy sequence. Therefore, we may define Q(x) = limn→∞f(2nx)
22n
for all x ∈ X. Now, we show that Q is a quadratic map. Replacing x, y with 2nx and 2nyrespectively in (3.1), it follows that
µ f(3.2nx+2ny)22n +
f(3.2nx−2ny)22n − f(2nx+2ny)
22n − f(2nx−2ny)22n −2
f(3.2nx)22n +2
f(2nx)22n
(t) ≥ ρ2nx,2ny(22nt).
(3.19)Taking limit as n→∞, we find that Q satisfies (1.4) for all x, y ∈ X. Therefore by Lemma2.1 we get that mapping Q : X → Y is quadratic.To prove (3.4), take limit as n→∞ in (3.17) and by (3.12). Finally, to prove the uniquenessof the quadratic function Q subject to (3.4), let us assume that there exists a quadraticfunction Q′ which satisfies (3.4). Since Q(2nx) = 22nQ(x) and Q′(2nx) = 22nQ′(x) for allx ∈ X and n ∈ N, from (3.4) it follows that
µQ(x)−Q′(x)(2t) = µQ(2nx)−Q′(2nx)(22n+1t)
≥ T (µQ(2nx)−f(2nx)(22nt), µf(2nx)−Q′(2nx)(2
2nt))
≥ T (T∞i=1(2ρ 2i+n−14 x, 2i+n−1
4 x(22n+it) + ρ 2i+n−1
4 x, 5.2i+n−14 x
(22n+it)
+ ρ 2i+n−14 x,−3.2i+n−1
4 x(22n+it)), T∞i=1(2ρ 2i+n−1
4 x, 2i+n−14 x
(22n+it)
+ ρ 2i+n−14 x, 5.2i+n−1
4 x(22n+it) + ρ 2i+n−1
4 x,−3.2i+n−14 x
(22n+it))) (3.20)
for all x ∈ X and all t > 0. By letting n→∞ in (3.20), we find that Q = Q′.
Theorem 3.2. Let X be a real linear space, (Y, µ, T ) be a complete RN-space and f : X → Ybe an odd function which there is ρ : X × X → D+ ( ρ(x, y) is denoted by ρx,y ) with theproperty:
µf(3x+y)+f(3x−y)−f(x+y)−f(x−y)−2f(3x)+2f(x)(t) ≥ ρx,y(t) (3.21)
M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES
123
8 M. Eshaghi Gordji, M. Bavand Savadkouhi and J. M. Rassias
for all x, y ∈ X and all t > 0. If
limn→∞
T∞i=1(2ρ 2n+i−14 x, 2n+i−1
4 x(2n+it) + ρ 2n+i−1
4 x, 3.2n+i−14 x
(2n+it)
+ ρ 2n+i−14 x, 5.2n+i−1
4 x(2n+it)) = 1 (3.22)
andlim
n→∞ρ2nx,2ny(2nt) = 1 (3.23)
for all x, y ∈ X and all t > 0, then there exists a unique additive mapping A : X → Y suchthat
µA(x)−f(x)(t) ≥ T∞i=1(2ρ 2i−14 x, 2i−1
4 x(2it)+ρ 2i−1
4 x, 3.2i−14 x
(2it)+ρ 2i−14 x, 5.2i−1
4 x(2it)), (3.24)
for all x ∈ X and all t > 0.
Proof. By letting y = x in (3.21), we get
µf(4x)−2f(3x)+2f(x)(t) ≥ ρx,x(t) (3.25)
for all x ∈ X. If we let y = 3x in (3.21), we get by the oddness of f,
µf(6x)−2f(3x)−f(4x)+2f(x)+f(2x)(t) ≥ ρx,3x(t) (3.26)
for all x ∈ X. It follows from (3.25) and (3.26) that
µf(6x)−2f(4x)+f(2x)(t) ≥ ρx,x(t) + ρx,3x(t) (3.27)
for all x ∈ X. Once again, by letting y = 5x in (3.21), we get by the oddness of f,
µf(8x)−f(2x)−f(6x)+f(4x)−2f(3x)+2f(x)(t) ≥ ρx,5x(t) (3.28)
for all x ∈ X. By (3.25) and using (3.27) and (3.28), we get
µf(8x)−2f(4x)(t) ≥ 2ρx,x(t) + ρx,3x(t) + ρx,5x(t) (3.29)
for all x ∈ X. If we replace x by x4
in (3.29), we get that
µf(2x)−2f(x)(t) ≥ 2ρ x4 , x
4(t) + ρ x
4 , 3x4
(t) + ρ x4 , 5x
4(t) (3.30)
for all x ∈ X. Letφx,x(t) = 2ρ x
4 , x4(t) + ρ x
4 , 3x4
(t) + ρ x4 , 5x
4(t) (3.31)
for all x ∈ X and all t > 0, then we get
µf(2x)−2f(x)(t) ≥ φx,x(t) (3.32)
for all x ∈ X and t > 0. Thus we have
µ f(2x)2 −f(x)
(t) ≥ φx,x(2t) (3.33)
for all x ∈ X. Therefore,
µ f(2k+1x)2k+1 − f(2kx)
2k
(t) ≥ φ2kx,2kx(2k+1t) (3.34)
for all x ∈ X and all k ∈ N. Hence
µ f(2nx)2n −f(x)
(t) ≥ Tn−1k=1 (µ f(2k+1x)
2k+1 − f(2kx)2k
(t)) ≥ Tn−1k=1 (φ2kx,2kx(2k+1t))
= Tni=1(φ2i−1x,2i−1x(2it)) (3.35)
for all x ∈ X and t > 0. In order to prove the convergence of the sequence f(2nx)2n , we
replace x with 2mx in (3.35) to find that
µ f(2n+mx)2n+m − f(2mx)
2m(t) ≥ Tn
i=1(φ2i+m−1x,2i+m−1x(2i+mt)). (3.36)
M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES
124
Stability of a mixed type additive and quadratic functional ... 9
Since the right hand side of (3.36) tends to 1 as m and n tend to infinity, sequence f(2nx)2n
is a Cauchy sequence. Therefore, we may define A(x) = limn→∞f(2nx)
2n for all x ∈ X. Now,we show that A is a additive map. Replacing x, y with 2nx and 2ny respectively in (3.21),it follows that
µ f(3.2nx+2ny)2n +
f(3.2nx−2ny)2n − f(2nx+2ny)
2n − f(2nx−2ny)2n −2
f(3.2nx)2n +2
f(2nx)2n
(t) ≥ ρ2nx,2ny(2nt).
(3.37)Taking limit as n→∞, we find that A satisfies (1.4) for all x, y ∈ X. Therefore by Lemma2.3 we get that mapping A : X → Y is additive.To prove (3.24), take limit as n→∞ in (3.35) and by (3.31). Finally, to prove the uniquenessof the additive function A subject to (3.24), let us assume that there exists an additivefunction A′ which satisfies (3.24). Since A(2nx) = 2nA(x) and A′(2nx) = 2nA′(x) for allx ∈ X and n ∈ N, from (3.24) it follows that
µA(x)−A′(x)(2t) = µA(2nx)−A′(2nx)(2n+1t)
≥ T (µA(2nx)−f(2nx)(2nt), µf(2nx)−A′(2nx)(2
nt))
≥ T (T∞i=1(2ρ 2i+n−14 x, 2i+n−1
4 x(2i+nt) + ρ 2i+n−1
4 x, 3.2i+n−14 x
(2i+nt)
+ ρ 2i+n−14 x, 5.2i+n−1
4 x(2i+nt)), T∞i=1(2ρ 2i+n−1
4 x, 2i+n−14 x
(2i+nt)
+ ρ 2i+n−14 x, 3.2i+n−1
4 x(2i+nt) + ρ 2i+n−1
4 x, 5.2i+n−14 x
(2i+nt))) (3.38)
for all x ∈ X and all t > 0. By letting n→∞ in (3.38), we find that A = A′.
Theorem 3.3. Let f : X → Y be a function with f(0) = 0 for which there is ρ : X×X → D+
( ρ(x, y) is denoted by ρx,y ) with the property:
µf(3x+y)+f(3x−y)−f(x+y)−f(x−y)−2f(3x)+2f(x)(t) ≥ ρx,y(t) (3.39)
for all x, y ∈ X and all t > 0. If
limn→∞
T∞i=1(2ρ 2n+i−14 x, 2n+i−1
4 x(2n+it) + ρ 2n+i−1
4 x, 3.2n+i−14 x
(2n+it)
+ ρ 2n+i−14 x, 5.2n+i−1
4 x(2n+it) + 2ρ−2n+i−1
4 x,−2n+i−14 x
(2n+it) + ρ−2n+i−14 x,−3.2n+i−1
4 x(2n+it)
+ ρ−2n+i−14 x,−5.2n+i−1
4 x(2n+it)) = 1 = lim
n→∞T∞i=1(2ρ 2n+i−1
4 x, 2n+i−14 x
(22n+it)
+ ρ 2n+i−14 x, 5.2n+i−1
4 x(22n+it) + ρ 2n+i−1
4 x,−3.2n+i−14 x
(22n+it) + 2ρ−2n+i−14 x,−2n+i−1
4 x(22n+it)
+ ρ−2n+i−14 x,−5.2n+i−1
4 x(22n+it) + ρ−2n+i−1
4 x, 3.2n+i−14 x
(22n+it)) (3.40)
andlim
n→∞ρ2nx,2ny(22nt) = 1 = lim
n→∞ρ2nx,2ny(2nt) (3.41)
for all x, y ∈ X and all t > 0, then there exists a unique additive mapping A : X → Y and aunique quadratic mapping Q : X → Y such that
µQ(x)−A(x)−f(x)(t) ≥ T∞i=1(2ρ 2i−14 x, 2i−1
4 x(2it) + ρ 2i−1
4 x, 3.2i−14 x
(2it) + ρ 2i−14 x, 5.2i−1
4 x(2it)
+ 2ρ−2i−14 x,−2i−1
4 x(2it) + ρ−2i−1
4 x,−3.2i−14 x
(2it) + ρ−2i−14 x,−5.2i−1
4 x(2it))
+ T∞i=1(2ρ 2i−14 x, 2i−1
4 x(2it) + ρ 2i−1
4 x, 5.2i−14 x
(2it) + ρ 2i−14 x,−3.2i−1
4 x(2it)
+ 2ρ−2i−14 x,−2i−1
4 x(2it) + ρ−2i−1
4 x,−5.2i−14 x
(2it) + ρ−2i−14 x, 3.2i−1
4 x(2it)),
(3.42)
M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES
125
10 M. Eshaghi Gordji, M. Bavand Savadkouhi and J. M. Rassias
for all x ∈ X and all t > 0.
Proof. Let
fe(x) =1
2[f(x) + f(−x)]
for all x ∈ X. Then fe(0) = 0, fe(−x) = fe(x), and
µfe(3x+y)+fe(3x−y)−fe(x+y)−fe(x−y)−2fe(3x)+2fe(x)(t) ≥ ρx,y(2t) + ρ−x,−y(2t)
≥ ρx,y(t) + ρ−x,−y(t) (3.43)
for all x, y ∈ X. Hence, in view of Theorem 3.1, there exists a unique quadratic functionQ : X → Y satisfying (3.4). Let
fo(x) =1
2[f(x)− f(−x)]
for all x ∈ X. Then fo(0) = 0, fo(−x) = −fo(x), and
µfo(3x+y)+fo(3x−y)−fo(x+y)−fo(x−y)−2fo(3x)+2fo(x)(t) ≥ ρx,y(2t) + ρ−x,−y(2t)
≥ ρx,y(t) + ρ−x,−y(t) (3.44)
for all x, y ∈ X. From Theorem 3.2, it follows that there exist a unique additive mappingA : X → Y satisfying (3.24). Now it is obvious that (3.42) holds true for all x ∈ A, and theproof of Theorem is complete.
References
[1] J. Aczel and J. Dhombres, Functional equations in several variables, Cambridge Univ.Press, 1989.
[2] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc.Japan. 2 (1950), 64–66.
[3] B. Bouikhalene and E. Elquorachi: ”Ulam-Gavruta-Rassias stability of the Pexiderfunctional equation”, International Journal of Applied Mathematics and Statistics, 7(Fe07), 2007, 7–39.
[4] D. G. Bourgin, Classes of transformations and bordering transformations, Bull. Amer.Math. Soc. 57 (1951) 223-237.
[5] P. W. Cholewa, Remarks on the stability of functional equations, Aequationes Math. 27(1984), 76–86.
[6] S. S. Chang, Y. J. Cho and S. M. Kang, Nonlinear operator theory in probabilisticmetric spaces, Nova Science Publishers, Inc. New York, 2001.
[7] S. Czerwik, On the stability of the quadratic mapping in normed spaces, Abh. Math.Sem. Univ. Hamburg 62 (1992), 59–64.
[8] A. Ebadian, N. Ghobadipour, M. E. Gordji, A fixed point method for perturbation ofbimultipliers and Jordan bimultipliers in C∗−ternary algebras, J. Math. Phys. 51, 1,2010, 10 pages, doi:10.1063/1.3496391.
[9] A. Ebadian, A. Najati and M. Eshaghi Gordji, On approximate additive–quartic andquadratic–cubic functional equations in two variables on abelian groups, Results Math.,DOI 10.1007/s00025-010-0018-4 (2010).
[10] M. Eshaghi Gordji, Nearly ring homomorphisms and nearly ring derivations on non-Archimedean Banach algebras, Abs. Appl. Anal., Article ID:393247.
[11] M. Eshaghi Gordji and Z. Alizadeh, Stability and superstability of ring homomorphismson non–Archimedean Banach algebras, Abstract and Applied Analysis, Vol. 2011, Ar-ticle ID:123656, (2011), 10 pages.
M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES
126
Stability of a mixed type additive and quadratic functional ... 11
[12] M. Eshaghi Gordji and M. Bavand Savadkouhi, Stability of cubic and quartic functionalequations in non–Archimedean spaces, Acta Appl. Math. 110 (2010), 1321–1329.
[13] M. Eshaghi Gordji and M. Bavand Savadkouhi, Stability of a mixed type cubicquarticfunctional equation in non–Archimedean spaces, Appl. Math. Lett. 23, No.10, (2010),1198-1202.
[14] M. Eshaghi Gordji, M. Bavand Savadkouhi and M. Bidkham, Stability of a mixed typeadditive and quadratic functional equation in non–Archimedean spaces, J. Comput.Anal. Appl. 12(2010) 454–462.
[15] M. Eshaghi Gordji and M. Bavand Savadkouhi, Approximation of generalized homo-morphisms in quasi-Banach algebras, Analele Univ. Ovidius Constata, Math series, Vol.17(2), (2009), 203–214.
[16] M. Eshaghi Gordji and M. Bavand Savadkouhi, On approximate cubic homomor-phisms, Advances in difference equations, Volume (2009), Article ID 618463, 11 pages,doi:10.1155/2009/618463.
[17] M. Eshaghi Gordji, T. Karimi and S. Kaboli Gharetapeh, Approximately n–Jordanhomomorphisms on Banach algebras, J. Ineq. Appl. Volume 2009, Article ID 870843, 8pages.
[18] M. Eshaghi Gordji, R. Khodabakhsh, H. Khodaei and S. M. Jung, AQCQ-functionalequation in non–Archimedean normed spaces, Abs. Appl. Anal., Volume 2010, ArticleID741942.
[19] M. Eshaghi Gordji, H. Khodaei and R. Khodabakhsh, General quartic-cubic-quadraticfunctional equation in non–Archimedean normed spaces, U.P.B. Sci. Bull. (Series A) 72(2010), Issue 3, 69–84.
[20] M. Eshaghi Gordji and H. Khodaei, Solution and stability of generalized mixed typecubic, quadratic and additive functional equation in quasi–Banach spaces, NonlinearAnalysis–TMA 71 (2009), 5629–5643.
[21] M. Eshaghi Gordji, H. Khodaei and R. Khodabakhsh, General quartic–cubic–quadraticfunctional equation in non–Archimedean normed spaces, U.P.B. Sci. Bull., Series A,Vol. 72, Iss. 3, 2010, 69-84.
[22] M. Eshaghi Gordji and A. Najati, Approximately J∗-homomorphisms: A fixed pointapproach, Journal of Geometry and Physics, 60 (2010), 809–814.
[23] R. Farokhzad and S. A. R. Hosseinioun, Perturbations of Jordan higher derivations inBanach ternary algebras: An alternative fixed point approach, Int. J. Nonlinear Anal.Appl. 1 (2010),1, 42–53.
[24] M. Eshaghi Gordji, M. B. Ghaemi and H. Majani, Generalized Hyers–Ulam–RassiasTheorem in Menger Probabilistic Normed Spaces, Discrete Dynamics in Nature andSociety, Volume 2010, Article ID 162371, 11 pages.
[25] M. Eshaghi Gordji, M. B. Ghaemi, H. Majani and C. Park, Generalized Ulam–HyersStability of Jensen Functional Equation in Serstnev PN Spaces, Journal of Inequalitiesand Applications, Volume 2010, Article ID 868193, 14 pages.
[26] M. Eshaghi Gordji and H. Khodaei, Stability of Functional Equations, LAP LAMBERTAcademic Publishing, 2010.
[27] Z. Gajda, On stability of additive mappings, Internat. J. Math. Math. Sci. 14 (1991),431–434.
[28] P. Gavruta, An answer to a question of J. M. Rassias concerning the stability ofCauchy functional equation, Advances in Equations and Inequalities, Hadronic Math.Ser., (1999), 67–71.
[29] P. Gavruta, A generalization of the Hyers-Ulam-Rassias stability of approximately ad-ditive mappings, J. Math. Anal. Appl. 184 (1994), 431–436.
M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES
127
12 M. Eshaghi Gordji, M. Bavand Savadkouhi and J. M. Rassias
[30] P. Gavruta and L. Gavruta, A new method for the generalized Hyers–Ulam–Rassiasstability, Int. J. Nonlinear Anal. Appl, 1 (2010), 2, 11–18.
[31] M. E. Gordji, H. Khodaei, On the generalized Hyers–Ulam–Rassias stability of quadraticfunctional equations, Abs. Appl. Anal., Volume 2009, Article ID 923476, 11 pages.
[32] M. E. Gordji, S. Kaboli Gharetapeh, T. Karimi , E. Rashidi and M. Aghaei, TernaryJordan derivations on C∗−ternary algebras, Journal of Computational Analysis andApplications, VOL.12, No.2, 2010, 463–470.
[33] M. E. Gordji, J.M. Rassias, N. Ghobadipour, Generalized Hyers–Ulam stability of thegeneralized (n, k)–derivations, Abs. Appl. Anal., Volume 2009, Article ID 437931, 8pages.
[34] A. Grabiec, The generalized Hyers-Ulam stability of a class of functional equations,Publ. Math. Debrecen 48 (1996), 217–235.
[35] O. Hadzic, E. Pap, Fixed Point Theory in PM Spaces, Kluwer Academic Publishers,Dordrecht, 2001.
[36] O. Hadzic, E. Pap and M. Budincevic, Countable extension of triangular norms andtheir applications to the fixed point theory in probabilistic metric spaces, Kybernetica,38 (3) (2002), 363–381.
[37] D. H. Hyers, G. Isac and Th. M. Rassias, Stability of functional equations in severalvariables, Birkhauser, Basel, 1998.
[38] D. H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci.27 (1941), 222–224.
[39] G. Isac and Th. M. Rassias, On the Hyers-Ulam stability of ψ-additive mappings, J.Approx. Theory 72 (1993), 131–137.
[40] K. W. Jun, H. M. Kim, J. M. Rassias, Extended Hyers-Ulam stability for Cauchy-Jensenmappings, J. Difference Equ. Appl., 13 (2007), no. 12, 1139–1153.
[41] S. M. Jung, J. M. Rassias, Stability of general Newton functional equations for loga-rithmic spirals, Adv. Difference Equ., (2008), Art. 143053, 5 pp.
[42] Yong-Soo Jung, ”The Ulam-Gavruta-Rassias stability of module left derivations”, J.Math. Anal. Appl., doi:10.1016/j.jmaa.2007.07.003, 1–9.
[43] Pl. Kannappan, Quadratic functional equation and inner product spaces, Results Math.27 (1995), 368–372.
[44] H. M. Kim, J. M. Rassias, Y. S. Cho, Stability problem of Ulam for Euler-Lagrangequadratic mappings. J. Inequal. Appl., (2007), Art. ID 10725, 15 pp.
[45] H. M. Kim, J. M. Rassias, Generalization of Ulam stability problem for Euler-Lagrangequadratic mappings, J. Math. Anal. Appl., 336 (2007), no. 1, 277–296.
[46] H. M. Kim, K. W. Jun, J. M. Rassias, Extended stability problem for alternativeCauchy-Jensen mappings, JIPAM. J. Inequal. Pure Appl. Math., 8 (2007), no. 4, Article120, 17 pp.
[47] A. Najati and M. B. Moghimi, Stability of a functional equation driving from quadraticand additive function in quasi-Banach spaces, J. Math. Anal. Appl. 342 (2008), 1318–1331.
[48] C. G. Park, J. M. Rassias, Hyers-Ulam stability of an Euler-Lagrange type additivemapping, Int. J. Appl. Math. Stat., 7 (2007), No. Fe07, 112–125.
[49] J. M. Rassias, On approximation of approximately linear mappings by linear mappings,J. Funct. Anal. 46 (1982), no. 1, 126–130.
[50] J. M. Rassias, On approximation of approximately linear mappings by linear mappings,Bull. Sci. Math. 2 108 (1984), no. 4, 445–446.
[51] J. M. Rassias, On a new approximation of approximately linear mappings by linearmappings, Discuss. Math. 7 (1985), 193–196.
M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES
128
Stability of a mixed type additive and quadratic functional ... 13
[52] J. M. Rassias, solution of a problem of Ulam, J. Approx. Theory 57 (1989), no. 3,268–273.
[53] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer.Math. Soc. 72 (1978), 297–300.
[54] K. Ravi and M. Arunkumar, ”On the Ulam-Gavruta-Rassias stability of the orthogo-nally Euler-Lagrange type functional equation”, International Journal of Applied Math-ematics and Statistics, 7 (Fe07), 2007, 143–156.
[55] B. Schweizer and A. Sklar, Probabilistic Metric Spaces, Elsevier, North Holand, NewYork, 1983.
[56] A. N. Sherstnev, On the notion of a random normed space, Dokl. Akad. Nauk SSSR149 (1963), 280-283 (in Russian).
[57] M. A. Sibaha, B. Bouikhalene and E. Elquorachi: ”Ulam-Gavruta-Rassias stability for alinear fuctional equation”, International Journal of Applied Mathematics and Statistics,7 (Fe07), 2007, 157–168.
[58] F. Skof, Propriet locali e approssimazione di operatori, Rend. Sem. Mat. Fis. Milano,53 (1983), 113-129.
[59] S. M. Ulam, Problems in modern mathematics, Chapter VI, science ed., Wiley, NewYork, 1940.
M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES
129
Monotonic Random Walk on a One-DimensionalLattice
Alexander P. BuslaevDept. of Higher Mathematics, State Technical University MADI
64, Leningradskiy prosp., Moscow, Russia, 125319E-mail: [email protected].
Alexander G. TatashevDept. of Higher Mathematics, State Technical University MADI
64, Leningradskiy prosp., Moscow, Russia, 125319E-mail: [email protected].
Abstract
Monotonic random walk of particles on a one-dimensional lattice is considered.This model is treated as the limit case of the model in which the particles moveon a ring. In this limit case the ring is great. The average velocity of the particleshas been found.
Key words: stochastic models, random walk, traffic, average velocity, Markovchains.
1. Introduction
Models of random walk on a lattice are used for the study of the road traffic.The appearance of cell automata models in the problem of traffic flows is
associated with works of Nagel and al. [11, 12], which were published in mid-nineties. In [11, 12] the dependence of the average velocity and intensity oftraffic flow on the model parameters was studied. The following factors, whichcontributed to the activation of this approach, can be noted
1) desire to explain the discrepancy between the solutions of traffic equationsand experimental observations, which exhibited chaotic behavior in the so-calledregime of instability;
2) desire to create models discrete in time and space (or only on one coor-dinate), which would be independent on continuum models and could take intoaccount the individual behavior of ”particles with motivated behavior”.
It has been noted that the scheme considered in [11, 12] is similar to monotonicrandom walks on a lattice. This theme has its own history. In particular, theworks of Soviet mathematician Yu.K. Belyaev and his students [1, 13] are devotedto traffic flows in the underground and contain exact results for one-dimensionalrandom walk (not only monotonic walk).
1
130
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2,130-139,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC
As the Russian mathematician M. Blank noted, in subsequent developmentof the model of cellular automata, the Western science has been satisfied bynumerical results only, which is apparently due to the relative availability ofcomputational tools. M. Blank gave well-defined statements and found exactresults in a number of important cases, [2, 3].
Here we are talking about exact estimates, while simulation results such asthe statement of the decisive influence of the presence of heavy trucks on flowwork certainly exist.
In [8] a model of movement of particles (vehicles) on a multi-lane road locationwas considered. In this model the velocity of movement is the sum of determi-nate and stochastic components. In this model the determinate component ofmovement corresponds to the background movement on lane and the stochasticcomponent corresponds to individual manoeuvres of particles. Each lane is asequence of cells. The dimension of the cell is determined by the dynamic di-mension i.e the length of the road segment occupied by a particle. The dynamicdimension takes into account the safety requirement and depends on velocity ofmovement, [10]. Stochastic movement is described by monotonic random walkon cells of lane and the regular movement is described by uniform movement ofall the cells of lane, [7, 8].
In [9] a model of random walk on one-lane ring has been considered. Theformula has been found for the average velocity of particles. This formula is ageneralization of the formula, found in [3], for the model of random walk, whererandomness occurs only for the initial configuration of particles.
In [4–6] models of random walk on a discrete lattice, similar to models intro-duced in [7, 8], have been used to solve some traffic optimization problems.
The present work considers a stochastic model, which describes movement ofparticles (vehicles) on a one-dimensional lattice. The model is the limit case ofthe model considered in [9], in which the number of cells is great.
2. Formulation of problem
Let us describe the stochastic model of movement on the ring, which was con-sidered in [9]. The ring contains n cells and m < n particles. The (i + 1)th cellfollows the ith cell in the direction of movement, i = 1, 2, . . . , n− 1. The 1st cellfollows the nth cell. Transitions of particles occur at discrete times 1, 2, 3, . . .. Ifat a discrete time the cell, which follows the particle in the direction of movement,is empty then the particle passes to the following cell with a probability p whichdoes not depend on behavior of the other particles. The initial configuration ofparticles on the lattice is fixed.
States of the model are determined by configurations of particles on the lattice.The steady state probabilities and the average velocity of particles were foundin [9]. The initial configuration of particles on the lattice is fixed.
In [9] a Markov chain was considered, each state of which corresponds toa state of the model. The number of states is equal to number Cm
n of m-combinations from a set of n elements. It is proved that the probabilities of
2
BUSLAEV, TATASHEV: MONOTONIC RANDOM WALK
131
states depend on the number of particle clusters only. ”Cluster” is a group ofoccupied cells isolated from other clusters by empty cells.
By u(n,m, p) denote the average individual velocity of movement of particles,i.e. the stable probability that some fixed particle passes at the current time tothe next cell.
In accordance with results of work [9]
u(n,m, p) =n
m
min(m,n−m)∑
k=1
Cp
(1− p)k−1Ck−1
m−1Ck−1n−m−1,
where
C =
⎛
⎝
min(m,n−m)∑
k=1
n
k· Ck−1
m−1Ck−1n−m−1
1
(1− p)k−1
⎞
⎠
−1
.
Let r be the density of flow defined as r = m/n. In present work the limit ofindividual velocity u(r, p) has been found for n → ∞, m → ∞ so that m/n → r.
3. The average velocity of particles
Theorem 1. The limit of individual velocity u(r, p) for n → ∞, m → ∞,m/n → r exists and is calculated as
limn→∞, m/n→r
u(n,m, p) = u(r, p) =1−
√
1− 4rp(1− r)
2r. (1)
Proof. Let Ai be the event that the ith cell is occupied and Bk be the eventthat there are only k clusters. Consider a pair of cells with numbers 1 and 2 as aMarkov chain with four states E0 = (0, 0), E1 = (0, 1), E2 = (1, 0), E3 = (1, 1),where 0 or 1 in the ith position means that cell i is empty or occupied, i = 1, 2(Fig. 1). Then E0 = A1 A2, E1 = A1A2, E2 = A1A2, E3 = A1A2.
Let p0, p1, p2 and p3 be the stable probabilities of states E0, E1, E2 and E3.The stable probabilities of both the original model and the considered pair ofcells exist and do not depend on the choice of the initial state, [9].
If k is the number of clusters for the current state of model, then k particleshave empty cells ahead in the direction of movement.
Then the ratio a = a(n,m) of average number of clusters to the number ofparticles is equal to the probability P (A2/A1) that the cell is free in front ofthe fixed particle. Let q(n,m) be intensity of particles, that is the number ofparticles passing the section per a time unit
q(n,m) = pra(n,m) = pma(n,m)/n. (2)
We haveP (A2/A1) =
p2p2 + p3
= a(n,m) = a. (3)
3
BUSLAEV, TATASHEV: MONOTONIC RANDOM WALK
132
n 1 2 3n 1 2 3
n 1 2 3 n 1 2 3
)b
с) )d
Е0 Е1
Е2Е3
a)
Figure 1: States of the pair of neighboring cells
It follows from (3) that
p3 =1− a
ap2. (4)
We shall use the fact that for the considered model all states with the samenumber of clusters have the same probability. This fact is a consequence of for-mula found in [9]. In accordance with this formula
P (k) =C
(1− p)k−1, (5)
where P (k) is the probability of a state with k clusters; C is the normalizingconstant.
Let us use the notion of a dual model. A similar notion was introduced in[3]. In the dual model there are n−m particles, which correspond to the emptyplaces of the original model. Direction of movement in the dual model is oppositeto direction of movement in the original model.
Lemma 1. The following equality is true
a(n, n−m) =r
1− ra(n,m), r =
m
n. (6)
Proof of Lemma 1. Flow intensities in the original and dual models are equal
q(n,m) = q(n, n−m).
From this equality and (2) it follows that
pma(n,m)/n = p(n−m)a(n, n−m)/n
4
BUSLAEV, TATASHEV: MONOTONIC RANDOM WALK
133
and hence (6) is true.
Let us derive the formula for a.Let p13 be probability of transition from state E1 to state E3 (Fig. 1b, 1d)
and p32 probability of transition from state E3 to state E2 (Fig. 1c, 1d). Fromstate E3 the chain can come only to state E2. The chain can come to state E3
only from E1. For a stable state the number of entrances to a state per time unitis equal to the number of exits from this state
p3p32 = p1p13. (7)
Next we derive formulas for transition probabilities
p32 = ap + o(1), n → ∞, m/n → r, (8)
p13 = ar
1− rp(1− ap) + o(1), n → ∞, m/n → r. (9)
Equations (7)–(9) allow to write the balance equation so that value of a couldbe found.
Lemma 2. Equality (8) is true for the probabilities of transition from stateE3 to state E2.
Proof of Lemma 2. Transition of chain from state E3 to state E2 occurs if aparticle passes from cell 2 to cell 3, Fig. 1c, 1d, and so
p32 = P (A3/A1A2)p. (10)
The equalityP (A3/A1A2) = a(n− 1, m− 1)
is true. This equality follows from the one-to-one correspondence between twosets, one of which is the set of states of the original models, for which cells 1 and2 are occupied, and the other set is the set of states of the model with n−1 cellsand m− 1 particles, for which cell 1 is occupied.
Indeed, a model state is described by vector (θ1, . . . , θn) where the value of
θi, i = 1, . . . , n, is 1 for Ai and 0 for Ai. State (1, 1, θ(n)3 , . . . , θ(n)n ) of the original
model corresponds to state (1, θ(n−1)2 , . . . , θ
(n−1)n−1 ) of the model with n − 1 cells
and θ(n−1)i = θ
(n)i+1, i = 2, . . . , n− 1. All the configurations of m − 2 particles on
the set of cells 3, . . . , n have the same probability under condition A1A2Bk. Theprobabilities of all particle configurations on the set of cells 2, . . . , n − 1 of themodel with n−1 cells and m−1 particles under condition A1Bk, k = 1, . . . , m−1are also equal. The states which are in one-to-one correspondence have the sameconditional probabilities. Indeed, let α(k) be the number of model states forwhich cells 1, 2 are occupied and there are k clusters, k = 1, . . . ,min(m − 1, n −m). Then the probability of a configuration of m − 2 particles
5
BUSLAEV, TATASHEV: MONOTONIC RANDOM WALK
134
on the set of cells 3, . . . , n, under the condition A1A2, if there are k clusters inthe model, is calculated with formula (5) where
C =
⎛
⎝
min(m−1,n−m)∑
k=1
α(k)
(1− p)k−1
⎞
⎠
−1
.
The probability of a fixed configuration of m− 2 particles on the set of particles2, . . . , n−1 in the model with n−1 cells and m−1 particles under the conditionsA1, if there are k clusters in the model, is the same. If states of two models arein one-to-one correspondence, then these states are characterized by the samenumber of clusters. So the considered conditional probabilities of these statesare the same.
Value of a(m,n) is continuous on density r so that
limn→∞, m/n→r
(P (A3/A1A2)− a(n,m)) =
= limn→∞, m/n→r
(a(n− 1, m− 1)− a(n,m)) = 0.
Hence,P (A3/A1A2) = a(n,m) + o(1), n → ∞, m/n → r. (11)
Formula (8) follows from (10) and (11). Lemma 2 is proved.
Lemma 3. For the transition from state E1 to state E3, equation (9) is true.
Proof of Lemma 3. Transition of the chain from state E1 to state E3 (Fig. 1b,1d) occurs if the particle occupying the n-th cell passes to cell 1 and the particleoccupying cell 2 does not move. The transition occurs with probability p if cellsn and 3 are occupied, and with probability p(1− p) if cell n is occupied and cell3 is empty. We have (Fig. 2)
p13 = P (A3An/A1A2)p+ P (A3An/A1A2)p(1− p) =
.= P (A3/A1A2)P (An/A1A2A3)p+
+P (A3/A1A2)P (An/A1A2A3)p(1− p). (12)
We have
a(n,m) =1
p1 + p3· (p1P (A3/A1A2) + p3P (A3/A1A2)). (13)
From (11) and (13) we have
P (A3/A1A2) = a(n,m) + o(1), n → ∞, m/n → r. (14)
6
BUSLAEV, TATASHEV: MONOTONIC RANDOM WALK
135
n 1 2 3n 1 2 3
А А А1 2 3
А А А1 2 3
a) b)
Figure 2: States of the four cells. Conditional probabilities of states of cell n arecalculated
Comparing the behavior of the original and dual system and taking into ac-count (6) and (14) we have
P (An/A1A2) = P ∗(A3/A1A2) = a(n, n−m) + o(1) =
=r
1− ra(n,m) + o(1), n → ∞, m/n → r, (15)
where the asterisk indicates that probability is calculated for the model for whichthe number of particles is n−m and the number of cells is n still.
We have (Fig. 2a)
P (An/A1A2A3) = a(n− 2, n−m− 1). (16)
Equality (16) follows from the one-to-one correspondence between configurationsof n−m− 2 empty places on the set of cells 4, . . . , n, for which cells 1 and 3 areempty, cell 2 is occupied and there are k clusters in the considered model, andthe set of configurations of n−m−2 empty places on the set of cells 2, . . . , n−2of the model with n−2 cells and n−m−1 empty places, for which cell 1 is empty
and there are k − 1 clusters. State (0, 1, 0, θ(n)4 , . . . , θ(n)n ) of the original model
corresponds to state (0, θ(n−2)2 , . . . , θ
(n−2)n−2 ) of the model with n − 2 cells, where
θ(n−2)i = θ
(n)i+2, i = 2, . . . , n−2. In addition, in accordance with (5) the conditional
probabilities of the states that are in correspondence are the same. Indeed, letβ(k) be the number of the original model states, for which cells 1,3 are free, cell2 is occupied and there are k clusters, k = 2, . . . , min(n−m,m− 2). Then theprobability of a fixed configuration of n−m− 2 empty places on cells 4, . . . , n ofthe original model under the condition A1A2A3 is calculated with formula (5),where k is the number of clusters for this configuration,
C =
⎛
⎝
min(m,n−m)∑
l=2
β(l)
(1− p)l−1
⎞
⎠
−1
.
This probability is equal to the probability of a fixed configuration of n−m−2empty places on set of cells 2, . . . , n−2 of the model with n−2 cells and n−m−1empty places under the condition A1 if there are k − 1 clusters in the model forthis configuration. For a state of this model the number of clusters is less by one
7
BUSLAEV, TATASHEV: MONOTONIC RANDOM WALK
136
than for the corresponding state of the original model, therefore the consideredconditional probabilities are the same for corresponding states of the models.
Aslim
n→∞, m/n→r(a(n, n−m)− a(n− 2, n−m− 1)) = 0
we have
a(n− 2, n−m− 1) = a(n, n−m) + o(1), n → ∞, m/n → r. (17)
From (6), (16) and (17) we obtain (Fig. 2a)
P (An/A1A2A3) =r
1− ra(n,m) + o(1), n → ∞, m/n → r. (18)
Taking into account (15) and (18) we have (Fig. 2b)
P (An/A1A2A3) =r
1− ra(n,m) + o(1), n → ∞, m/n → r. (19)
From (12), (14), (18) and (19) we obtain (9). Lemma 3 has been proved.
Let us proceed to prove Theorem 1.From the fact that probabilities of all the states with the same number of
clusters are the same it follows that
p1 = p2. (20)
From (4), (7)–(9) and (20) we obtain
p1(1− a)p = p1ar
1− rp(1− ap) + o(1), n → ∞, m/n → r. (21)
Passing to the limit in (21) we obtain
p1(1− a)p = p1ar
1− rp(1− ap). (22)
From (22) we obtain the quadratic equation for a
a2rp− a + 1− r = 0. (23)
The solution of this equation, all values of which are not greater than 1, is
a = a(r, p) =1−
√
1− 4rp(1− r)
2rp. (24)
Some values of the second branch of the solution of equation (23) are greaterthan 1 and a pass from the first branch to the second one means that functionu(r, p) is discontinuous. In accordance with theory of Markov chain, steady stateprobabilities are unique and therefore solution (24) is unique.
8
BUSLAEV, TATASHEV: MONOTONIC RANDOM WALK
137
Recall u(r, p) = pa(r, p). Then (1) is true.Theorem 1 is proved.
Table 1 shows values of average velocity u(170, 170r) of particles for n = 170and different values of p, r, and the corresponding limit values of u(p, r).
Table 1. Average velocity u(170, 170r) (on the left) of particles for n = 170and different values of p, r, and the corresponding value of u(r, p) (on the right)
r = 0.1 r = 0.3 r = 0.5 r = 0.7 r = 0.9p = 0.1 0.091 0.091 0.072 0.072 0.052 0.051 0.031 0.031 0.010 0.010p = 0.3 0.279 0.278 0.226 0.225 0.164 0.163 0.097 0.097 0.031 0.031p = 0.5 0.474 0.472 0.399 0.397 0.294 0.293 0.171 0.170 0.053 0.052p = 0.7 0.677 0.676 0.599 0.597 0.454 0.452 0.257 0.256 0.075 0.075p = 0.9 0.890 0.889 0.845 0.843 0.686 0.684 0.362 0.361 0.099 0.099
4. Conclusion
In this paper the formula has been found for the average velocity of movementon a one-dimensional lattice as the limit case of random walk on a ring as thelength of the ring tends to infinity.
Acknowledgement
The work was supported by Dept. of Education and Science of Russia (Statecontract N 14.740.11.0397).
9
BUSLAEV, TATASHEV: MONOTONIC RANDOM WALK
138
References
[1] Belyaev Yu.K., Zele U., A simplified model of movement without overtaking,Izv. AN SSSR, ser. Tekhn. kibernet., 1969, N 3, pp. 17–21.
[2] Blank M., Dynamics of traffic jams: order and chaos, Mosc. Math. J., 1:1,pp. 1-26 (2001).
[3] Blank M.L., Exact analysis of dynamical systems arising in models of trafficflow, Russian Mathematical Surveys, vol. 55, N 3 (333), pp. 167–168 (2000).
[4] Bugaev A.S., Buslaev A.P., Tatashev A.G., Monotone random walk of par-ticles on an integer number lane and LYuMen problem, Mat. modelirovanie,vol. 18, N 12, pp. 19–34 (2006).
[5] Bugaev A.S., Buslaev A.P., Tatashev A.G., Simulation of segregation of two-lane flow of particles, Mat. modelirovaniye, vol. 20, N 9, pp. 111–119 (2008).
[6] Bugaev A.S., Buslaev A.P., Tatashev A.G., Yashina M.V., Optimization ofpartially-connected flows for deterministic-stochastic model, Trudy MFTI,vol. 2, N 4, 2010. pp. 15–26 (8).
[7] Buslaev A.P., Novikov A.N., Prikhodko V.M., Tatashev A.G., Yashina M.V.,Stochastic and simulation approaches to optimization of road traffic, Moscow,Mir, 2003.
[8] Buslaev A.P., Prikhodko V.M., Tatashev A.G., Yashina M.V., Thedeterministic-stochastic flow model, arXiv: physics/ 0504139v1[physics/soc.-ph], vol. 20, Apr. 2005, pp. 1–21.
[9] Buslaev A.P., Tatashev A.G. Particles flow on the regular polygon, JCAAM,vol. 9, N 4, pp. 290–303 (2011).
[10] Inose H., Hamada T. Road Traffic Control. University of Tokyo Press, 1975.
[11] K. Nagel, M. Schreckenberg, A cellular automaton model for freeway traffic,J. Phys. I France, 2, pp. 1221–1229 (1992).
[12] Schreckenberg M., Schadschneider A., Nagel K., Ito N., Discrete stochasticmodels for traffic flow, Phys. Rev. E., vol. 51, pp. 2939–2949 (1995).
[13] Zele U. Generalizations of movement without overtaking, Izv. AN SSSR,ser. Tekhn. kibernet., 1972, N 5, pp. 100–103.
10
BUSLAEV, TATASHEV: MONOTONIC RANDOM WALK
139
TABLE OF CONTENTS, JOURNAL OF CONCRETE AND
APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2, 2012
The Method of Laplace and Watson’s Lemma, Richard A. Zalik,…….………………………11
On special strong differential subordinations using a generalized Salagean operator and Ruscheweyh derivative, Alina Alb Lupas,……….…………………………………………….17
A note on special strong differential subordinations using a multiplier transformation and Ruscheweyh derivative, Alina Alb Lupas,…………………………………………………….24
Global behavior of the max-type difference equation xn+1 = max ,
, Taixiang Sun,
Hongjian Xi, Bin Qin, ………………………………………………………………………...32
A General System of Quadratic Functional Equations in Non-Archimedean Fuzzy Menger Normed Spaces, M. B. Ghaemi and H. Majani,………………………………………………40
A Note on Horner's Method, Tian-Xiao He and Peter J.-S. Shiue,…………………………...53
Common Fixed Point Results with Applications in Convex Metric Spaces, Safeer Hussain Khan and Mujahid Abbas,………………………………………………………………………….. 65
Basic Hypergeometric Series and q-Harmonic Number Identities, Wenchang Chu,N.Gu,……………………………………………………………………………………..77
Some Relationship between the q-Genocchi Numbers and Bernstein Polynomials, N. S. Jung, H. Y. Lee, C. S. Ryoo,……………………………………………………………………………99
Some Theorems in Cone Metric Spaces, Duran Turkoglu, Muhib Abuloha, Thabet Abdeljawad,…………………………………………………………………………………..106
Stability of a mixed type additive and quadratic functional equation in random normed spaces, M. Eshaghi Gordji, M. Bavand Savadkouhi, J. M. Rassias,………………………………….117
Monotonic Random Walk on a One-Dimensional Lattice, Alexander P. Buslaev, A.G. Tatashev,………………………………………………………………………………………130
140
VOLUME 10, NUMBERS 3-4 JULY-OCTOBER 2012 ISSN:1548-5390 PRINT,1559-176X ONLINE
JOURNAL
OF CONCRETE AND APPLICABLE MATHEMATICS EUDOXUS PRESS,LLC
141
SCOPE AND PRICES OF THE JOURNAL Journal of Concrete and Applicable Mathematics A quartely international publication of Eudoxus Press,LLC Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis Memphis, TN 38152, U.S.A. [email protected]
Assistant to the Editor:Dr.Razvan Mezei,Lander University,SC 29649, USA. The main purpose of the "Journal of Concrete and Applicable Mathematics" is to publish high quality original research articles from all subareas of Non-Pure and/or Applicable Mathematics and its many real life applications, as well connections to other areas of Mathematical Sciences, as long as they are presented in a Concrete way. It welcomes also related research survey articles and book reviews.A sample list of connected mathematical areas with this publication includes and is not restricted to: Applied Analysis, Applied Functional Analysis, Probability theory, Stochastic Processes, Approximation Theory, O.D.E, P.D.E, Wavelet, Neural Networks,Difference Equations, Summability, Fractals, Special Functions, Splines, Asymptotic Analysis, Fractional Analysis, Inequalities, Moment Theory, Numerical Functional Analysis,Tomography, Asymptotic Expansions, Fourier Analysis, Applied Harmonic Analysis, Integral Equations, Signal Analysis, Numerical Analysis, Optimization, Operations Research, Linear Programming, Fuzzyness, Mathematical Finance, Stochastic Analysis, Game Theory, Math.Physics aspects, Applied Real and Complex Analysis, Computational Number Theory, Graph Theory, Combinatorics, Computer Science Math.related topics,combinations of the above, etc. In general any kind of Concretely presented Mathematics which is Applicable fits to the scope of this journal. Working Concretely and in Applicable Mathematics has become a main trend in many recent years,so we can understand better and deeper and solve the important problems of our real and scientific world. "Journal of Concrete and Applicable Mathematics" is a peer- reviewed International Quarterly Journal. We are calling for papers for possible publication. The contributor should send via email the contribution to the editor in-Chief: TEX or LATEX (typed double spaced) and PDF files. [ See: Instructions to Contributors]
Journal of Concrete and Applicable Mathematics(JCAAM) ISSN:1548-5390 PRINT, 1559-176X ONLINE. is published in January,April,July and October of each year by EUDOXUS PRESS,LLC, 1424 Beaver Trail Drive,Cordova,TN38016,USA, Tel.001-901-751-3553 [email protected] http://www.EudoxusPress.com. Visit also www.msci.memphis.edu/~ganastss/jcaam. Webmaster:Ray Clapsadle
142
Annual Subscription Current Prices:For USA and Canada,Institutional:Print $400,Electronic $250,Print and Electronic $450.Individual:Print $150, Electronic $80,Print &Electronic $200.For any other part of the world add $50 more to the above prices for Print. Single article PDF file for individual $15.Single issue in PDF form for individual $60. No credit card payments.Only certified check,money order or international check in US dollars are acceptable. Combination orders of any two from JoCAAA,JCAAM,JAFA receive 25% discount,all three receive 30% discount. Copyright©2012 by Eudoxus Press,LLC all rights reserved.JCAAM is printed in USA. JCAAM is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH. It is strictly prohibited the reproduction and transmission of any part of JCAAM and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes no responsibility for the content of published papers. JCAAM IS A JOURNAL OF RAPID PUBLICATION PAGE CHARGES: Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage.
143
Editorial Board
Associate Editors
Editor in -Chief: George Anastassiou Department of Mathematical Sciences The University Of Memphis Memphis,TN 38152,USA tel.901-678-3144,fax 901-678-2480 e-mail [email protected] www.msci.memphis.edu/~ganastss Areas:Approximation Theory, Probability,Moments,Wavelet, Neural Networks,Inequalities,Fuzzyness. Associate Editors: 1) Ravi Agarwal Florida Institute of Technology Applied Mathematics Program 150 W.University Blvd. Melbourne,FL 32901,USA [email protected] Differential Equations,Difference Equations, Inequalities 2) Carlo Bardaro Dipartimento di Matematica & Informatica Universita' di Perugia Via Vanvitelli 1 06123 Perugia,ITALY tel.+390755855034, +390755853822, fax +390755855024 [email protected] , [email protected] Functional Analysis and Approximation Th., Summability,Signal Analysis,Integral Equations, Measure Th.,Real Analysis 3) Francoise Bastin Institute of Mathematics University of Liege 4000 Liege BELGIUM [email protected] Functional Analysis,Wavelets 4) Yeol Je Cho
21) Gustavo Alberto Perla Menzala National Laboratory of Scientific Computation LNCC/MCT Av. Getulio Vargas 333 25651-075 Petropolis, RJ Caixa Postal 95113, Brasil and Federal University of Rio de Janeiro Institute of Mathematics RJ, P.O. Box 68530 Rio de Janeiro, Brasil [email protected] and [email protected] Phone 55-24-22336068, 55-21-25627513 Ext 224 FAX 55-24-22315595 Hyperbolic and Parabolic Partial Differential Equations, Exact controllability, Nonlinear Lattices and Global Attractors, Smart Materials 22) Ram N.Mohapatra Department of Mathematics University of Central Florida Orlando,FL 32816-1364 tel.407-823-5080 [email protected] Real and Complex analysis,Approximation Th., Fourier Analysis, Fuzzy Sets and Systems 23) Rainer Nagel Arbeitsbereich Funktionalanalysis Mathematisches Institut Auf der Morgenstelle 10 D-72076 Tuebingen Germany tel.49-7071-2973242 fax 49-7071-294322 [email protected] evolution equations,semigroups,spectral th., positivity 24) Panos M.Pardalos Center for Appl. Optimization University of Florida 303 Weil Hall P.O.Box 116595 Gainesville,FL 32611-6595 tel.352-392-9011 [email protected] Optimization,Operations Research
144
Department of Mathematics Education College of Education Gyeongsang National University Chinju 660-701 KOREA tel.055-751-5673 Office, 055-755-3644 home, fax 055-751-6117 [email protected] Nonlinear operator Th.,Inequalities, Geometry of Banach Spaces 5) Sever S.Dragomir School of Communications and Informatics Victoria University of Technology PO Box 14428 Melbourne City M.C Victoria 8001,Australia tel 61 3 9688 4437,fax 61 3 9688 4050 [email protected], [email protected] Math.Analysis,Inequalities,Approximation Th., Numerical Analysis, Geometry of Banach Spaces, Information Th. and Coding 6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451 fax.++39 051 2094490 [email protected] Partial Differential Equations, Control Theory, Differential Equations in Banach Spaces 7) Claudio A. Fernandez Facultad de Matematicas Pontificia Unversidad Católica de Chile Vicuna Mackenna 4860 Santiago, Chile tel.++56 2 354 5922 fax.++56 2 552 5916 [email protected] Partial Differential Equations, Mathematical Physics, Scattering and Spectral Theory 8) A.M.Fink Department of Mathematics Iowa State University Ames,IA 50011-0001,USA tel.515-294-8150
25) Svetlozar T.Rachev Dept.of Statistics and Applied Probability Program University of California,Santa Barbara CA 93106-3110,USA tel.805-893-4869 [email protected] AND Chair of Econometrics and Statistics School of Economics and Business Engineering University of Karlsruhe Kollegium am Schloss,Bau II,20.12,R210 Postfach 6980,D-76128,Karlsruhe,Germany tel.011-49-721-608-7535 [email protected] Mathematical and Empirical Finance, Applied Probability, Statistics and Econometrics 26) John Michael Rassias University of Athens Pedagogical Department Section of Mathematics and Infomatics 20, Hippocratous Str., Athens, 106 80, Greece Address for Correspondence 4, Agamemnonos Str. Aghia Paraskevi, Athens, Attikis 15342 Greece [email protected] [email protected] Approximation Theory,Functional Equations, Inequalities, PDE 27) Paolo Emilio Ricci Universita' degli Studi di Roma "La Sapienza" Dipartimento di Matematica-Istituto "G.Castelnuovo" P.le A.Moro,2-00185 Roma,ITALY tel.++39 0649913201,fax ++39 0644701007 [email protected],[email protected] Orthogonal Polynomials and Special functions, Numerical Analysis, Transforms,Operational Calculus, Differential and Difference equations 28) Cecil C.Rousseau Department of Mathematical Sciences The University of Memphis Memphis,TN 38152,USA tel.901-678-2490,fax 901-678-2480 [email protected] Combinatorics,Graph Th., Asymptotic Approximations, Applications to Physics 29) Tomasz Rychlik
145
[email protected] Inequalities,Ordinary Differential Equations 9) Sorin Gal Department of Mathematics University of Oradea Str.Armatei Romane 5 3700 Oradea,Romania [email protected] Approximation Th.,Fuzzyness,Complex Analysis 10) Jerome A.Goldstein Department of Mathematical Sciences The University of Memphis, Memphis,TN 38152,USA tel.901-678-2484 [email protected] Partial Differential Equations, Semigroups of Operators 11) Heiner H.Gonska Department of Mathematics University of Duisburg Duisburg,D-47048 Germany tel.0049-203-379-3542 office [email protected] Approximation Th.,Computer Aided Geometric Design 12) Dmitry Khavinson Department of Mathematical Sciences University of Arkansas Fayetteville,AR 72701,USA tel.(479)575-6331,fax(479)575-8630 [email protected] Potential Th.,Complex Analysis,Holomorphic PDE, Approximation Th.,Function Th. 13) Virginia S.Kiryakova Institute of Mathematics and Informatics Bulgarian Academy of Sciences Sofia 1090,Bulgaria [email protected] Special Functions,Integral Transforms, Fractional Calculus 14) Hans-Bernd Knoop Institute of Mathematics Gerhard Mercator University D-47048 Duisburg Germany tel.0049-203-379-2676
Institute of Mathematics Polish Academy of Sciences Chopina 12,87100 Torun, Poland [email protected] Mathematical Statistics,Probabilistic Inequalities 30) Bl. Sendov Institute of Mathematics and Informatics Bulgarian Academy of Sciences Sofia 1090,Bulgaria [email protected] Approximation Th.,Geometry of Polynomials, Image Compression 31) Igor Shevchuk Faculty of Mathematics and Mechanics National Taras Shevchenko University of Kyiv 252017 Kyiv UKRAINE [email protected] Approximation Theory 32) H.M.Srivastava Department of Mathematics and Statistics University of Victoria Victoria,British Columbia V8W 3P4 Canada tel.250-721-7455 office,250-477-6960 home, fax 250-721-8962 [email protected] Real and Complex Analysis,Fractional Calculus and Appl., Integral Equations and Transforms,Higher Transcendental Functions and Appl.,q-Series and q-Polynomials, Analytic Number Th. 33) Stevo Stevic Mathematical Institute of the Serbian Acad. of Science Knez Mihailova 35/I 11000 Beograd, Serbia [email protected]; [email protected] Complex Variables, Difference Equations, Approximation Th., Inequalities 34) Ferenc Szidarovszky Dept.Systems and Industrial Engineering The University of Arizona Engineering Building,111 PO.Box 210020 Tucson,AZ 85721-0020,USA [email protected] Numerical Methods,Game Th.,Dynamic Systems,
146
[email protected] Approximation Theory,Interpolation 15) Jerry Koliha Dept. of Mathematics & Statistics University of Melbourne VIC 3010,Melbourne Australia [email protected] Inequalities,Operator Theory, Matrix Analysis,Generalized Inverses 16) Robert Kozma Dept. of Mathematical Sciences University of Memphis Memphis, TN 38152, USA [email protected]
Mathematical Learning Theory,
Dynamic Systems and Chaos,
Complex Dynamics.
17) Mustafa Kulenovic Departm ent of Mathematics University of Rhode Island Kingston,RI 02881,USA [email protected] Differential and Difference Equations 18) Gerassimos Ladas Department of Mathematics University of Rhode Island Kingston,RI 02881,USA [email protected] Differential and Difference Equations 19) V. Lakshmikantham Department of Mathematical Sciences Florida Institute of Technology Melbourne, FL 32901 e-mail: [email protected] Ordinary and Partial Differential Equations, Hybrid Systems, Nonlinear Analysis 20) Rupert Lasser Institut fur Biomathematik & Biomertie,GSF -National Research Center for environment and health Ingolstaedter landstr.1 D-85764 Neuherberg,Germany [email protected] Orthogonal Polynomials,Fourier Analysis, Mathematical Biology
Multicriteria Decision making, Conflict Resolution,Applications in Economics and Natural Resources Management 35) Gancho Tachev Dept.of Mathematics Univ.of Architecture,Civil Eng. and Geodesy 1 Hr.Smirnenski blvd BG-1421 Sofia,Bulgaria [email protected] Approximation Theory 36) Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock Germany [email protected] Approximation Th.,Wavelet,Fourier Analysis, Numerical Methods,Signal Processing, Image Processing,Harmonic Analysis 37) Chris P.Tsokos Department of Mathematics University of South Florida 4202 E.Fowler Ave.,PHY 114 Tampa,FL 33620-5700,USA [email protected],[email protected] Stochastic Systems,Biomathematics, Environmental Systems,Reliability Th. 38) Lutz Volkmann Lehrstuhl II fuer Mathematik RWTH-Aachen Templergraben 55 D-52062 Aachen Germany [email protected] Complex Analysis,Combinatorics,Graph Theory
147
Instructions to Contributors
Journal of Concrete and Applicable Mathematics A quartely international publication of Eudoxus Press, LLC, of TN.
Editor in Chief: George Anastassiou
Department of Mathematical Sciences University of Memphis
Memphis, TN 38152-3240, U.S.A.
1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves. 2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.
148
4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corrolaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,
149
name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990). Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986. Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495. 11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears. 15. This journal will consider for publication only papers that contain proofs for their listed results.
150
A New Approach of Statistical Hypothesis VerificationIuliana F IATAN
Abstract
A new approach of statistical hypothesis verification is proposed. We shallprove a theorem which allow us to express our likelihood ratio test. Sinceits distribution is difficult to calculate we shall use the simulation with ouralgorithm in order to determine the critical value of the generalized likelihoodratio.
Keywords: hypothesis verification, parameter space, critical value, gen-eralized likelihood ratio,
1 Introduction
The paper is organized as follows. The first section gives a brief review of thepaper. The second section presents the proposed approach of statistical hypothesisverification. The third section focuses on computing critical value of the generalizedlikelihood ratio. The sections 4 introduces an algorithm for two classes comparing.The section 5 presents some conclusions of this paper. The paper one finishes withits references.
Assume that we have:
• a selection X(1)1 , . . . , X
(1)N1
on a random vector X(1) ∼ N (µ(1),Σ(1)) and
• a selection X(2)1 , . . . , X
(2)N2
on a random vector X(2) ∼ N (µ(2),Σ(2)),
where µ(1), µ(2),Σ(1),Σ(2) unknown parameters, µ(1), µ(2) being d × 1 vectors andΣ(1),Σ(2) being a d× d definite positive matrix.
We propose to verify the hypothesis
H0 : µ(1) = µ(2), Σ(1) = Σ(2).
The critical value Vα of our likelihood ratio test V (which is used for testing ofthe hypothesis H0) has to be determined such that P (V ≤ Vα|H0) = α, α beingthe risk of first order which has to be small. We shall prove a theorem which allowus to express V . Since the distribution of this ratio V is difficult to calculate weshall use the simulation with our algorithm in order to determine the critical valueVα of the generalized likelihood ratio.
2 Hypothesis Verification Concerning the Identityof Two Normal Distribution
We denote by:
• Ω the parameter space where Σ(1),Σ(2) are d× d defined positive matrices,
• Ω1 is a subset of the parameter space for which Σ(1) = Σ(2),
• Ω2 is a subset of the parameter space for which Σ(1) = Σ(2) and µ(1) = µ(2).
1
151
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,151-158,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC
Proposition[4] We consider the hypotheses
H1 : Σ(1) = Σ(2), µ(1) 6= µ(2),
H2 : Σ(1) = Σ(2), µ(1) = µ(2),
H12 : µ(1) = µ(2), Σ(1) 6= Σ(2).
If l1, l2 and l12 are the likelihood ratios for verification of the hypotheses H1,H2
and respective H12, then
l12 = l1l2.
Proof:The likelihood function is
L =1
(2π)d2 (N1+N2) · |Σ(1)|
N12 · |Σ(2)|
N22
·exp
[−1
2
N1∑α=1
(X(1)α − µ(1)
)t(Σ(1))−1
(X(1)α − µ(1)
)]·
· exp
[−1
2
N2∑α=1
(X(2)α − µ(2)
)t(Σ(2))−1
(X(2)α − µ(2)
)]. (1)
The maximum likelihood estimates of parameter with respect to Ω are:
µ(j) = X(j)
=1
Nj
Nj∑i=1
Xi(j), j = 1, 2,
Σ(j) =1
Nj
Nj∑i=1
(Xi
(j) −X(j))(
Xi(j) −X(j)
)t, j = 1, 2,
or
Σ(j) =1
NjSj , j = 1, 2. (2)
where
Sj =
Nj∑i=1
(Xi
(j) −X(j))(
Xi(j) −X(j)
)t, j = 1, 2. (3)
The maximum value of the likelihood function from (1) with respect to Ω is
LΩ =1
(2π)d2 (N1+N2) · |Σ(1)|
N12 · |Σ(2)|
N22
·exp
[−1
2
N1∑α=1
(X(1)α −X
(1))t
(Σ(1))−1(X(1)α −X
(1))]·
· exp
[−1
2
N2∑α=1
(X(2)α −X
(2))t
(Σ(2))−1(X(2)α −X
(2))]
. (4)
Taking into account [4] that
2
IATAN: STATISTICAL HYPOTHESIS
152
−1
2
N1∑α=1
(X(1)α −X
(1))t
(Σ(1))−1(X(1)α −X
(1))
= −N1
2d
and respectively
−1
2
N2∑α=1
(X(2)α −X
(2))t
(Σ(2))−1(X(2)α −X
(2))
= −N2
2d
the relation (4) may be written in the form
LΩ =1
(2π)d2 (N1+N2) · |Σ(1)|
N12 · |Σ(2)|
N22
· e−N1
2 d · e−N2
2 d;
therefore
LΩ =1
(2π)d2N · |Σ(1)|
N12 · |Σ(2)|
N22
· e−N2 d, (5)
where N = N1 +N2.With respect to Ω1, the maximum value of the likelihood function is
LΩ1=
1
(2π)d2N · |Σ|
N2
· exp
[−1
2
N1∑α=1
(X(1)α −X
(1))t
Σ−1(X(1)α −X
(1))]·
· exp
[−1
2
N2∑α=1
(X(2)α −X
(2))t
Σ−1(X(2)α −X
(2))]
, (6)
where
µ(j) = X(j), j = 1, 2,
Σ(1) = Σ(2) = Σ =1
NS;
we have used the notation
S = S1 + S2, (7)
with S1 and S2 from (3).With respect to Ω2, the maximum value of the likelihood function is
LΩ2=
1
(2π)d2N · |Σ∗|
N2
· exp
[−1
2
N1∑α=1
(X(1)α −X
)t(Σ∗)−1
(X(1)α −X
)]·
· exp
[−1
2
N2∑α=1
(X(2)α −X
)t(Σ∗)−1
(X(2)α −X
)], (8)
where
3
IATAN: STATISTICAL HYPOTHESIS
153
µ(1) = µ(2) = X,
Σ∗ =1
NS∗, (9)
and
S∗ =
N1∑α=1
(X(1)α −X
)(X(1)α −X
)t+
N2∑α=1
(X(2)α −X
)(X(2)α −X
)t.
Since, keeping with [4] we have
N1∑α=1
(X(1)α −X
)t(Σ∗)−1
(X(1)α −X
)+
N2∑α=1
(X(2)α −X
)t(Σ∗)−1
(X(2)α −X
)= Nd,
we deduce
LΩ2=
1
(2π)d2N · |Σ∗|
N2
· e−N2 d. (10)
We can write
S∗ =
N1∑α=1
(X(1)α −X
(1)+X
(1) −X)(
X(1)α −X
(1)+X
(1) −X)t
+
+
N2∑α=1
(X(2)α −X
(2)+X
(2) −X)(
X(2)α −X
(2)+X
(2) −X)t
=
=
N1∑α=1
(X(1)α −X
(1))(
X(1)α −X
(1))t
+N1
(X
(1) −X)(
X(1) −X
)t+
+
N2∑α=1
(X(2)α −X
(2))(
X(2)α −X
(2))t
+N2
(X
(2) −X)(
X(2) −X
)t. (11)
Based on the relation (7), from (11) we deduce
S∗ = S +N1
(X
(1) −X)(
X(1) −X
)t+N2
(X
(2) −X)(
X(2) −X
)t. (12)
Since l1, l2 and l12 are the likelihood ratios for verification of the hypothesesH1,H2 respective H12 it results
l1 =LΩ1
LΩ,
l2 =LΩ2
LΩ1
,
l12 =LΩ2
LΩ.
4
IATAN: STATISTICAL HYPOTHESIS
154
We obtain
l1l2 =LΩ1
LΩ· LΩ2
LΩ1
=LΩ2
LΩ= l12. (13)
Substituting (5) and (10) into (13) we shall obtain
l12 =
1
(2π)d2N ·|Σ∗|
N2· e−N
2 d
1
(2π)d2N ·|Σ(1)|
N12 ·|Σ(2)|
N22
· e−N2 d
=|Σ(1)|
N12 · |Σ(2)|
N22
|Σ∗|N2
. (14)
Using (9) and (2) in (14) we deduce
l12 =|S1|
N12 · |S2|
N22
NN1d
21 ·N
N2d
22
· |S∗|
N2
NNd2
.
3 Computing Critical Value of the Generalized Like-lihood Ratio
The critical value lα of the likelihood ratio test l (which is used for testing of thehypothesis H0) has to be determined such that P (l ≤ lα|H0) = α, α being the riskof first order which has to be small.
From [4] we know that
V2 =|S| 12n
|S∗|12n
= ln/N2 ,
where n = n1 + n2, and nj = Nj − 1, j = 1, 2 is the same with the likelihood ratiofor verification of the hypothesis H2.
It results that for verification of the hypothesis H0 we can use the statistic
V = V1V2 =|S1|
12n1 · |S2|
12n2
|S∗|12n
. (15)
instead of the statistic l.The distribution of this ratio V is difficult to calculate since:
• |S1|, |S2|, |S∗| are generalized dispersions (see [7]); their distributions don’thave a form which can permit us to calculate the critical values ;
• |S1|, |S2| and |S∗| are not independently.
Therefore, in order to determine the critical value Vα of the generalized likelihoodratio such that
P (V ≤ Vα|H0) = α,
(α being the risk of first order which has to be small) one use the simulation withthe following algorithm:
5
IATAN: STATISTICAL HYPOTHESIS
155
Algorithm 1Step 0. Inputs N1, N2, µ
(1), µ(2),Σ(1),Σ(2), d.
Step 1. Generate X(1)1 , . . . , X
(1)N1∼ N (µ(1),Σ(1)).
Step 2. Generate X(2)1 , . . . , X
(2)N2∼ N (µ(2),Σ(2)).
Step 3. Generate S1, S2 using (3).Step 4. Calculate S∗ using the relation (12).Step 5. Calculate |S1|, |S2|.Step 6. Calculate |S∗|.Step 7. Calculate V with (15).Step 8. We have to repeat for m times the steps 1-7 (for example m ≥ 2000) andwe shall obtain the selection l1, l2, . . . lm.Step 9. We construct a histogram with l1, l2, . . . lm (see [7]) such as:
Step 9.1. We choose a positive integer k which represents the number of thehistogram intervals I1, I2, . . . Ik.
Step 9.2. We determine the absolute frequencies f1, f2, . . . fk, namely the numberof the selection values which are in the interval Ij , 1 ≤ j ≤ k.
Step 9.3. We determine the relative frequencies r1, r2, . . . rk, ri = fim , 1 ≤ i ≤ k.
The graph from the Figure 1 represents the form of selection histogram l1, l2, . . . lmwhich one obtains by simulation.
Figure 1. Histogram
The critical value for our test Vα one chooses such that the sum of rectangle areafrom the left side of lα is α, where α = P (V ≤ Vα) is the risk of the first kind.
4 An Algorithm for Two Classes Comparing
In this section we shall describe an algorithm which can classify some new givend- dimensional objects, Y1, ..., YK drawn from N (µ,Σ), testing if they apart intoone of the two classes C1 or C2.
The class C1 contains N1 vectors: X(1)1 , . . . , X
(1)N1
while the class C2 contains N2
vectors: X(2)1 , . . . , X
(2)N2
.
Algorithm 2Step 0. Input K,N1, N2, µ, µ
(1), µ(2),Σ,Σ(1),Σ(2), d.Step 1. We generate Y1, ..., YK ∼ N (µ,Σ).Step 2. We verify the hypothesis:
6
IATAN: STATISTICAL HYPOTHESIS
156
H0: µ1 = µ2, Σ(1) = Σ(2)
using the Algorithm 1.In the case when the hypothesis isn’t true we have to go to Step 4.Otherwise, go to Step 3.
Step 3. For i := 1 to Kdo beginWe test the null hypothesis
H : Yi, X(1)1 , . . . , X
(1)N1
are drawn from N (µ(1),Σ(1))against the alternative hypothesis
NH : X(1)1 , . . . , X
(1)N1
are drawn from N (µ(1),Σ(1)), µ 6= µ1
using [3] the Algorithm 3.1;end
Step 4. We verify the hypothesis:H0: Σ(1) = Σ(2), µ1 6= µ2, see [7], [4].In the case when the hypothesis is true we have to go to Step 5.Otherwise, go to Step 6.
Step 5. For i := 1 to Kdo beginWe test the null hypothesis
H : Yi, X(1)1 , . . . , X
(1)N1
are drawn from N (µ(1),Σ) and
X(2)1 , . . . , X
(2)N2
are drawn from N (µ(2),Σ),
against the alternative hypothesis
NH : X(1)1 , . . . , X
(1)N1
are drawn from N (µ(1),Σ) and
Yi, X(2)1 , . . . , X
(2)N2
are drawn from N (µ(2),Σ),
using [3] the Algorithm 3.2;end
Step 6. We verify the hypothesis:
• H0: µ = µ(1), Σ = Σ(1)
• H′0: µ = µ(2), Σ = Σ(2)
using the Algorithm 1.If one of the hypotheses is true, namely if the new objects belong to the same
class C1 or C2 then the algorithm one finishes.If either of the hypotheses is not true, namely if the new objects don’t belong to
the same class C1 or C2 then go to Step 7.Step 7. For i := 1 to K
do beginWe test the null hypothesis
H : Yi, X(1)1 , . . . , X
(1)N1
are drawn from N (µ(1),Σ(1)) and
X(2)1 , . . . , X
(2)N2
are drawn from N (µ(2),Σ(2)),
7
IATAN: STATISTICAL HYPOTHESIS
157
against the alternative hypothesis
NH : X(1)1 , . . . , X
(1)N1
are drawn from N (µ(1),Σ(1)) and
Yi, X(2)1 , . . . , X
(2)N2
are drawn from N (µ(2),Σ(2)),
using [3] the Algorithm 3.3.end
5 Conclusions
The paper discusses a new approach of statistical hypothesis verification. We haveproved a theorem which allow us to express our likelihood ratio test. Since itsdistribution is difficult to calculate we have used the simulation with our algorithmin order to determine the critical value of the generalized likelihood ratio. Thisalgorithm is used in order to construct a complex algorithm for two classes compar-ing. In conclusion, the classification problem of the new given objects Y1, ..., YK ,drawn from N (µ,Σ) is a complex problem which one reduces to application of theAlgorithm 1 and Algorithms 3.1, 3.2 or 3.3 (see [3]).
6 Acknowledgment
This work was supported by the strategic grant POSDRU/89/1.5/S/58852, Project”Postdoctoral programme for training scientific researchers” cofinanced by the Eu-ropean Social Found within the Sectorial Operational Program Human ResourcesDevelopment 2007-2013.
References
[1] C. M. Bishop, Pattern Recognition and Machine Learning, Springer, Heidel-berg (2006).
[2] I. Iatan, On the Generalized Test Likelihood Ratio for Multivariate NormalDistribution Applied to Classification, Journal of Concrete and ApplicableMathematics, 6(2), 145–152 (2008).
[3] I. Iatan, Statistical Methods for Pattern Recognition, Lambert Academic Pub-lishing AG & Co. KG, Saarbrucken, Germany (2010).
[4] Gh. Mihoc and V. Craiu Treatise of Mathematical Statistics. Testing StatisticalHypotheses, vol. 2, Ed. Academy of Bucharest (1977).
[5] Y. S. Qin and B. Smith, The likelihood ratio test for homogeneity in bivariatenormal mixtures, Journal of Multivariate Analysis, 97(2), 474–491 (2006).
[6] S. Theodoridis and K. Koutroumbas, Pattern Recognition, Elsevier (2009).
[7] I. Vaduva, Simulation Models, Ed. University of Bucharest (2004).
8
IATAN: STATISTICAL HYPOTHESIS
158
Elements of right delta fractional Calculus onTime Scales
George A. AnastassiouDepartment of Mathematical Sciences
University of MemphisMemphis, TN 38152, [email protected]
Abstract
Here we develop the right delta fractional calculus on time scales.
2010 AMS Subject Classication : 26A33, 39A12, 93C70.Keywords and phrases: Fractional Calculus on Time Scales.
1 Background
For the basics of times scales please read [1], [2], [3], [5], [7], [8], [9], [10], [11],[12], [13].Let T be a time scale, and ([9], p. 38) gk; hk : T2 ! R, k 2 N0 = N [ f0g,
s; t 2 T : g0 (t; s) = h0 (t; s) = 1,
gk+1 (t; s) =
Z t
s
gk ( () ; s) ; (1)
hk+1 (t; s) =
Z t
s
hk ( ; s) , 8 s; t 2 T:
We havehk (t; s) = hk1 (t; s) , (2)
gk (t; s) = gk1 ( (t) ; s) , k 2 N, t 2 Tk:
Alsog1 (t; s) = h1 (t; s) = t s; 8 s; t 2 T: (3)
Here gk, hk are continuous in t.
1
159
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,159-167,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC
Example 1 (see [9], p. 39-40)i) When T = R,
gk (t; s) = hk (t; s) =(t s)k
k!; 8 s; t 2 R: (4)
ii) When T = Z, we get
hk (t; s) =(t s)(k)
k!;
and
gk (t; s) =(t s+ k 1)(k)
k!; (5)
furthermore it holds
hk (t; s) = (1)k gk (s; t) ; k 2 N0, 8 s; t 2 Z. (6)
We need
Theorem 2 ([9], p. 45) We have that
hn (t; s) = (1)n gn (s; t) ; (7)
for every t 2 T and every s 2 Tkn :If T = Tk, then (7) is true for every s; t 2 T.
We need delta Taylor formula on time scales.
Theorem 3 ([6], [11]) Assume T = Tk, f 2 Cmrd (T), m 2 N, s; t 2 T. Then
f (t) =
m1Xk=0
fk
(s)hk (t; s) +Rsm (f) (t) ; (8)
where
Rsm (f) (t) =
Z t
s
hm1 (t; ()) fm
() : (9)
We notice that
Rsm (f) (t) = Z s
t
hm1 (t; ()) fm
()
(7)= (1)m
Z s
t
gm1 ( () ; t) fm
() : (10)
In this article we assume T = Tk:We make
2
ANASTASSIOU: RIGHT DELTA FRACTIONAL CALCULUS
160
Denition 4 Let 0. We consider the continuous functions
g : T2 ! R :
g0 (t; s) = 1;
g+1 (t; s) =
Z t
s
g ( () ; s) ; 8 s; t 2 T: (11)
We are motivated a lot by the formulaZ x
t
(x s)1
()
(s t)1
()ds =
(x t)+1
(+ ); (12)
where ; > 0 and is the gamma function.
Assumption 5 Let ; > 1 and x t , x; t; 2 T: We assume thatZ ()
x
g1 ( (t) ; x) g1 ( () ; t)t = g+1 ( () ; x) : (13)
We call for ; > 1 and x t ,
(x; ) :=
Z ()
g1 ( (t) ; x) g1 ( () ; t)t: (14)
By Theorem 1.75, p. 28, [9] for f 2 Crd (T) and t 2 Tk, we haveZ (t)
t
f () = (t) f (t) ; (15)
where (t) := (t) t:So by (15) we get that
(x; ) = g1 ( () ; x) g1 ( () ; ) () : (16)
Denition 6 Let f 2 L1 ([a; b) \ T). We dene the right forward graininessdeviation functional of f as follows:
E (f; ; ; b;T; x) =Z b
x
f () (x; ) = (17)
Z b
x
f () g1 ( () ; x) g1 ( () ; ) () :
If T = R, then () = 0 and hence E (f; ; ; b;R; x) = 0:
3
ANASTASSIOU: RIGHT DELTA FRACTIONAL CALCULUS
161
2 Results
We give
Denition 7 Let a; b 2 T, 1 and f : [a; b]\T! R. Here f 2 L1 ([a; b) \ T)(Lebesgue -integrable function on [a; b)\T). We dene the right -Riemann-Liouville type fractional integral
Ibf (t) :=
Z b
t
g1 ( () ; t) f () ; (18)
for t 2 [a; b] \ T. HereR bt =
R[t;b)
:
By [8] we get that I1bf (t) =R btf () is absolutely continuous in t 2
[a; b] \ T.
Lemma 8 Let > 1, f 2 L1 ([a; b) \ T), f : [a; b] \ T ! R. Assume thatg1 ( () ; t) is Lebesgue -measurable on ([a; b] \ T)2; a; b 2 T. Then Ibf 2L1 ([a; b] \ T), that is Ibf is nite a.e.
Proof. By Tietzes extension theorem of General Topology we easily derivethat the continuous function g1 on ([a; b] \ T)2 is bounded, since its contin-uous extension F1 on [a; b]
2 is bounded. Notice here ([a; b] \ T)2 is a closedsubset of [a; b]2.So there exists M > 0 such that jga1 (s; t)j M , 8 (s; t) 2 ([a; b] \ T)2 :Let here id denote the identity map. We see that
(; id) (([a; b) \ T) ([a; b] \ T)) ([a; b] \ T)2 :Therefore jg1 ( () ; t)j M , 8 ( ; t) 2 ([a; b) \ T) ([a; b] \ T) ; since
( () ; t) 2 ([a; b] \ T)2 :Dene K : := ([a; b] \ T)2 ! R, by
K ( ; t) :=
g1 ( () ; t) , if a t < b;0, if a < t b;
where t; 2 T.Clearly hereK is Lebesgue-measurable on , since the restriction of a mea-
surable function to a measurable subset of its domain is a measurable function,and the union of two measurable functions over disjoint domains is measurable.Notice here that jK ( ; t)j M , 8 ( ; t) 2 ([a; b] \ T)2.Next we consider the repeated double Lebesgue -integralZ b
a
Z b
a
jK ( ; t)j jf ()jt! =
Z b
a
jf ()j Z b
a
jK ( ; t)jt!
4
ANASTASSIOU: RIGHT DELTA FRACTIONAL CALCULUS
162
M (b a)Z b
a
jf ()j =M (b a) kfkL1([a;b)\T) <1:
By Tonellis theorem we derive that ( ; t) ! K ( ; t) f () is Lebesgue -integrable over :Let now the characteristic function
[t;b) () =
1; if 2 [t; b)0, else,
where 2 [a; b] \ T.Then the function ( ; t) ! [t;b) ()K ( ; t) f () is Lebesgue -integrable
over .Hence by Fubinis theorem we get thatZ b
a
[t;b) ()K ( ; t) f () =
Z b
t
g1 ( () ; t) f () = Ibf (t)
is Lebesgue -integrable on [a; b] \ T, proving the claim.From now on we make
Assumption 9 We suppose that g1 ( () ; ) is continuous on ([a; b] \ T)2,for any > 1:
We give the following semigroup property of right -Riemann-Liouville typefractional integrals.
Theorem 10 Let a; b 2 T, f 2 L1 ([a; b) \ T) ; ; > 1: Then
IbIbf (x) = I
+b f (x) E (f; ; ; b;T; x) ; 8 x 2 [a; b] \ T: (19)
Proof. Here we have
Ibf (t) =
Z b
t
g1 ( () ; t) f () :
We observe that
IbIbf (x) =
Z b
x
g1 ( (t) ; x) Ibf (t)t =
Z b
x
g1 ( (t) ; x)
Z b
t
g1 ( () ; t) f ()
!t =
Z b
x
Z b
t
g1 ( (t) ; x) g1 ( () ; t) f ()
!t =: () :
5
ANASTASSIOU: RIGHT DELTA FRACTIONAL CALCULUS
163
Clearly here it holds
jg1 ( (t) ; x)j M1; 8 t; x 2 [a; b] \ T;
andjg1 ( () ; t)j M2; 8 ; t 2 [a; b] \ T;
where M1;M2 > 0.HenceIbIbf (x) Z b
x
Z b
t
jg1 ( (t) ; x)j jg1 ( () ; t)j jf ()j!t
M1M2
Z b
x
Z b
t
jf ()j!t
!M1M2
Z b
x
Z b
a
jf ()j!t
!
M1M2 (b a) kfkL1([a;b)\T) <1:
So that IbIbf (x) exists, 8 x 2 [a; b] \ T. Consequently by Fubinis theorem
we have
() =Z b
x
Z
x
g1 ( (t) ; x) g1 ( () ; t) f ()t
=
Z b
x
f ()
Z
x
g1 ( (t) ; x) g1 ( () ; t)t
(here x t < )
=
Z b
x
f ()
Z ()
x
g1 ( (t) ; x) g1 ( () ; t)t
Z ()
g1 ( (t) ; x) g1 ( () ; t)t
!
by ((13), (14))=
Z b
x
g+1 ( () ; x) f () Z b
x
f () (x; )
= I+b f (x)Z b
x
f () (x; )
(17)= I+b f (x) E (f; ; ; b;T; x) ;
proving the claim (19).We make
6
ANASTASSIOU: RIGHT DELTA FRACTIONAL CALCULUS
164
Remark 11 Let > 2 : m 1 < m, m 2 N, i.e. m = de (ceilingof the number), e = m (0 e < 1). Let f 2 Cmrd ([a; b] \ T). Clearlyhere ([10]) f
m
is Lebesgue -integrable function. We dene the right deltafractional derivative on T of order 1 as follows
1b f (t) = (1)mIe+1b f
m(t) = (1)m
Z b
t
ge ( () ; t) fm
() ; (20)
8 t 2 [a; b] \ T.Notice 1b f 2 C ([a; b] \ T), by a simple argument using the dominated
convergence theorem in Lebesgue -sense.If = m, then e = 0, thenm1b f (t) = (1)m
Z b
t
fm
() = (1)mf
m1(b) f
m1(t): (21)
More generally, by [8], given that fm1
is everywhere nite and absolutelycontinuous on [a; b] \ T, then fm
exists -a.e. and is Lebesgue -integrableon [t; b) \ T, 8 t 2 [a; b] \ T, and one can plug it into (20).
Remark 12 We observe thatI1b 1b f
(t) = (1)m
I1b Ie+1b f
m(t)
(19)= (1)m
I1+e+1b f
m(t) E
f
m
; 1; e + 1; b;T; t= (1)m
Imbf
m(t) E
f
m
; 1; e + 1; b;T; t : (22)
Therefore I1b 1b f
(t) + (1)mE
f
m
; 1; e + 1; b;T; t =(1)m
Imbf
m
(t)= (1)m
Z b
t
gm1 ( () ; t) fm
() (23)
(10)= Rbm (f) (t) :
Now we can use (8) with s = b:
We have established the following delta time scales right fractional Taylorformula.
Theorem 13 Assume T = Tk, f 2 Cmrd (T), m 2 N, a; b 2 T, and > 2 :
m 1 < m, e = m ; also suppose Assumption 5, Assumption 9. Thenf (t) =
m1Xk=0
fk
(b)hk (t; b) +I1b 1b f
(t)+
7
ANASTASSIOU: RIGHT DELTA FRACTIONAL CALCULUS
165
(1)mEf
m
; 1; e + 1; b;T; t ; (24)
8 t 2 [a; b] \ T.
Remark 14 One can rewrite (24) as follows
f (t) =m1Xk=0
fk
(b)hk (t; b) +
Z b
t
g2 ( () ; t)1b f
()
+(1)mZ b
t
fm
() g2 ( () ; t) ge ( () ; ) () ; (25)
8 t 2 [a; b] \ T:
Corollary 15 In the assumptions of Theorem 13, additionally assume thatf
k
(b) = 0, k = 0; 1; :::;m 1. Then
B (t) := f (t) + (1)m+1Ef
m
; 1; e + 1; b;T; t=
Z b
t
g2 ( () ; t)1b f
() ; (26)
8 t 2 [a; b] \ T:
Remark 16 Notice (by [8]) thatI1b 1b f
(t) and E(f
m
; 1; e + 1; b;T; t) are absolutely continuous functions on [a; b] \ T.
One can use (25) and (26) to establish right fractional delta inequalities ontime scales of Poincaré type, Sobolev type, Opial type, Ostrowski type, Hilbert-Pachpatte type, etc, analogous to [4].To keep article short we avoid this similar task.Our theory is not void because it is fullled when T = R, etc, see also [4].
References
[1] R. Agarwal, M. Bohner, Basic Calculus on time scales and some of itsapplications, Results Math. 35(1999), no. 1-2, 3-22.
[2] R. Agarwal, M. Bohner, A. Peterson, Inequalities on time scales: a survey,Math. Inequalities & Applications, Vol. 4 no. 4, (2001), 535-557.
[3] G. Anastassiou, Time Scales Inequalities, Inter. J. of Di¤erence Equations,5, no. 1 (2010), 1-23.
[4] G. Anastassiou, Principles of Delta Fractional Calculus on Time Scalesand Inequalities, Mathematical and Computer Modelling, 52(3-4) (2010),556-566.
8
ANASTASSIOU: RIGHT DELTA FRACTIONAL CALCULUS
166
[5] M. Bohner, G.S. Guseinov, Multiple Lebesgue integration on time scales,Advances in Di¤erence Equations, Vol. 2006, Article ID 26391, pp. 1-12,DOI 10.1155/ADE/2006/26391.
[6] M. Bohner, G. Guseinov, The Convolution on time scales, Abstract andApplied Analysis, Vol. 2007, Article ID 58373, 24 pages.
[7] M. Bohner, G. Guseinov, Double integral calculus of variations on timescales, Computers and Mathematics with Applications, 54 (2007), 45-57.
[8] M. Bohner, H. Luo, Singular second-order multipoint dynamic boundaryvalue problems with mixed derivatives, Advances in Di¤erence Equations,Vol. 2006, Article ID 54989, p. 1-15, DOI 10.1155/ADE/2006/54989.
[9] M. Bohner, A. Peterson, Dynamic equations on time scales: An Introduc-tion with Applications, Birkhaüser, Boston (2001).
[10] G. Guseinov, Integration on time scales, J. Math. Anal. Appl., 285 (2003),107-127.
[11] R. Higgins, A. Peterson, Cauchy functions and Taylors formula for Timescales T, (2004), in Proc. Sixth. Internat. Conf. on Di¤erence equations,edited by B. Aulbach, S. Elaydi, G. Ladas, pp. 299-308, New Progress inDi¤erence Equations, Augsburg, Germany, 2001, publisher: Chapman &Hall / CRC.
[12] S. Hilger, Ein Maßketten kalkül mit Anwendung auf Zentrumsmannig-faltigkeiten, PhD. thesis, Universität Würzburg, Germany (1988).
[13] Wenjun Liu, Quôc Anh Ngô, Wenbing Chen, Ostrowski type inequalities ontime scales for double integrals, Acta Appl. Math., 106(2009), 229-239.
9
ANASTASSIOU: RIGHT DELTA FRACTIONAL CALCULUS
167
Center manifolds for some partial functionaldifferential equations with infinite delay in fading
memory spaces1
Mostafa ADIMY?, Khalil EZZINBI† and Catherine MARQUET‡
?INRIA, Dracula team, Institut Camille JordanCNRS UMR 5208, Universite Claude Bernard Lyon 1
43 boulevard du 11 novembre 191869622 Villeurbanne cedex, France
†Universite Cadi AyyadFaculte des Sciences Semlalia
Departement de Mathematiques, B.P. 2390Marrakesh, Morocco
‡Universite de Pau et des Pays de l’AdourLaboratoire de Mathematiques Appliquees CNRS UMR 5142
Avenue de l’universite 64000Pau, France
Abstract. We study the existence of a center manifold for some semilinear partial func-tional differential equations with infinite delay in fading memory spaces. We assume thatthe unbounded linear part of the equation satisfies the Hille-Yosida condition. The exis-tence of this centre manifold is obtained, under sufficiently small nonlinearity, as the graphof a fixed point for an integral operator given by a variation-of-constants formula. Weuse a new reduction principle to prove that the flow on the center manifold is completelydetermined by an ordinary differential equation in a finite dimensional space. When thenonlinear perturbation is only locally Lipschitzian, we obtain the existence of a localcenter manifold.
Keys words: Partial differential equations, infinite delay, Hille-Yosida operator, integralsolution, semigroup, variation-of-constants formula, fading memory space, center mani-fold, reduction principle.
2000 Mathematical Subject Classification: 34K17, 34K19, 34K20, 34K30, 34G20,47D06.
1This research is supported by Grant from CNRST (Morocco) and CNRS (France) Ref. CNRS/CNRST(projet N 21575).
[email protected], †[email protected], ‡[email protected]
1
168
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,168-185,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC
2
1. Introduction
In this paper we prove the existence of a center manifold for the following class ofpartial functional differential equations with infinite delay
(1.1)
d
dtu(t) = Au(t) + L(ut) + g(ut), t ≥ σ, σ ∈ lR,
uσ = ϕ ∈ B,
where A : D (A) → E is a linear operator defined on a Banach space (E, |.|). We supposethat A satisfies the following Hille-Yosida condition.
(H1) There exist ω ∈ R and M0 ≥ 1 such that (ω, +∞) ⊂ ρ(A) and
(1.2) |R(λ,A)n| ≤ M0
(λ− ω)nfor n ∈ N and λ > ω,
where ρ(A) denotes the resolvent set of A and R(λ, A) = (λI − A)−1 for λ > ω.
Without loss of generality, we assume that M0 = 1. Otherwise, one can renorm thespace (E, |.|) with an equivalent norm for which we get the estimation (1.2) with M0 = 1.Remark that with the condition (H1) the domain of the operator A is not necessarilydense in E.B is a normed linear space of functions mapping (−∞, 0] into E satisfying the funda-
mental axioms introduced by Hale and Kato in [20] (see also [22] and section 2). As usual,for every t ∈ R, the history function ut ∈ B is defined for θ ∈ (−∞, 0] by ut (θ) = u (t + θ) .L is a bounded linear operator from B to E and g is Lipschitzian from B into E withg(0) = 0.
The center manifold theory is a powerful tool in the analysis of the qualitative behaviorof solutions for infinite dimensional dynamical systems, because the interesting behaviortakes place on the center manifold. The existence and other proprieties (bifurcation,stability, etc.) of centre manifolds for partial functional differential equations have beenconsidered in many works. For further references on the development and applications ofthe center manifold theory, we refer the reader to [10, 12–14, 17–19, 21, 23–30] and thereferences therein.
Partial functional differential equations with infinite delay have been studied extensivelyin the literature, for the reader, we refer to [1–3, 8, 9, 11, 20, 22, 32] , and the referencestherein. In [3], the authors proved when A satisfies (H1) the existence, regularity ofsolutions and stability of equilibriums of equation (1.1). They obtained that the phase
space of (1.1) is given by Y :=
ϕ ∈ B : ϕ(0) ∈ D(A)
. If g is differentiable at 0 with
g′(0) = 0, then the linearized equation of (1.1) around zero is given by
(1.3)
d
dtv(t) = Av(t) + L(vt), t ≥ σ,
vσ = φ ∈ B.
If all characteristic values of equation (1.3) have negative real part and B is uniform fadingmemory space, then the zero equilibrium of (1.1) is uniformly asymptotically stable (moredetails can be found in [3]). However, if there exists at least one characteristic value witha positive real part, then the zero solution of (1.1) is unstable. In the critical case, whenexponential stability is not possible and there exists a characteristic value with zero realpart, the situation is more complicated since either stability or instability may hold. The
M. ADIMY ET AL: CENTER MANIFOLDS...
169
3
existence of a center manifold brings up the question about the dynamics of the systemin this critical case.
In [17] and [29], the authors studied the existence of a center manifold for equation (1.1)
when D(A) = E and the delay is finite. In this paper, we consider equation (1.1) whenthe domain D(A) is not necessarily dense in E and the delay is infinite. The non-densityof the operator A in equation (1.1) occurs, in many situations, from restrictions made onthe space where the equations are considered (for example, periodic continuous solutions,Holder continuous functions) or from boundary conditions ( the space C1 with null valueon the boundary is not dense in the space of continuous functions). For more details, werefer to [4–7] .
As a simple example of equation (1.1), let us consider the following Lotka–Volterramodel with diffusion, which has been studied in [5] and [11] (see also [32, p.10])
∂
∂tv(t, x) = D
∂2
∂x2v(t, x) +
∫ 0
−∞K(θ)v (t + θ, x) dθ +
∫ 0
−∞G (θ, v(t + θ, x) dθ,
for t ≥ 0 and 0 ≤ x ≤ π,
v(t, 0) = v(t, π) = 0, for t ≥ 0,
v(0, θ) = v0(θ), for −∞ < θ ≤ 0 and 0 ≤ x ≤ π.
The organization of this work is as follows. In section 2, we recall some results aboutintegral solutions and the semigroup generated by the linearized equation (1.3). Wedescribe the variation-of-constants formula for non-homogeneous problems. We also givesome results on the spectral analysis of (1.3). In section 3, we prove the existence of aglobal center manifold for equation (1.1) with sufficiently small nonlinearities. In section4, we study the existence of a local center manifold when the function g is only C1-functionin a neighborhood of zero. In section 5, we prove an important result namely that theflow on the center manifold is governed by an ordinary differential equation in a finitedimensional space.
2. Fading memory spaces, variation-of-constants formula and spectraldecomposition
We use the axiomatic approach introduced by Hale and Kato [20] for the phase spaceB. That is the best way to treat the infinite delay differential equations, since propertiesof solutions depend especially on the choice of the space B. We assume that (B, |·|) is alinear normed space of functions mapping (−∞, 0] into the Banach space E and satisfyingthe following fundamental axioms.
(A) There exist a positive constant N , a locally bounded function M (·) on [0, +∞) anda continuous function K (·) on [0, +∞), such that if x : (−∞, a] → E is continuous on[σ, a] with xσ ∈ B, for some σ < a, then for all t ∈ [σ, a],
(i) xt ∈ B,(ii) t → xt is continuous with respect to |·| on [σ, a],(iii) N |x (t)| ≤ |xt| ≤ K (t− σ) sup
σ≤s≤t|x (s)|+ M (t− σ) |xσ|.
(B) B is a Banach space.
As a consequence of axiom (A), we deduce the following result.
M. ADIMY ET AL: CENTER MANIFOLDS...
170
4
Lemma 2.1. [20] Let C00 := C00((−∞, 0]; E) be the space of continuous functions map-ping (−∞, 0] into E with compact support. Then, C00 ⊂ B. More precisely, for a < 0, wehave
|ϕ| ≤ K(−a) supa≤θ≤0
|ϕ(θ)|,
for any ϕ ∈ C00 with supp(ϕ) ⊂ [a, 0].
Our next objective is to write equation (1.1) as an integral equation (variation-of-constants formula). We need the following lemma.
Lemma 2.2. [7] Assume that (H1) holds. Let A0 be the part of the operator A in D(A),which is defined by
D(A0) = x ∈ D(A) : Ax ∈ D(A),A0x = Ax.
Then A0 generates a C0-semigroup (T0(t))t≥0 on D(A).
Definition 2.3. [3] Let φ ∈ B. A function u : R → E is called an integral solution ofequation (1.1) on R if the following conditions hold.(i) u is continuous on [σ,∞),(ii) uσ = φ,
(iii)
∫ t
σ
u (s) ds ∈ D (A) for t ≥ σ,
(iv) u (t) = φ (0) + A
∫ t
σ
u (s) ds +
∫ t
σ
L(us)ds +
∫ t
σ
g (xs) ds for t ≥ σ.
For the next, we assume that B satisfies axioms (A) and (B).
Theorem 2.4. [3] Assume that (H1) holds and g is Lipschitzian. Then, for all φ ∈ Bsuch that φ (0) ∈ D (A), equation (1.1) has a unique integral solution which is given by
u(t) =
T0 (t− σ) φ (0) + limλ→+∞
∫ t
σ
T0 (t− s) λR (λ,A) [L (us) + g (xs)] ds for t ≥ σ,
φ(t) for t ≤ σ,
where R (λ,A) = (λI − A)−1 .
Let Y =
φ ∈ B : φ (0) ∈ D (A)
be the phase space corresponding to equation (1.1).
For t ≥ 0, we define the operator U (t) by
U (t) φ = ut (·, φ, L, 0) , φ ∈ Y,
where u (·, φ, L, 0) is the integral solution of equation (1.1) with g = 0 and σ = 0.
Theorem 2.5. [3] Assume that (H1) holds. Then (U (t))t≥0 is a C0-semigroup on Y .Moreover, (U(t))t≥0 satisfies, for t ≥ 0, φ ∈ Y, the following translation property.
(U(t)φ) (θ) =
(U(t + θ)φ) (0) for t + θ ≥ 0,φ(t + θ) for t + θ ≤ 0.
M. ADIMY ET AL: CENTER MANIFOLDS...
171
5
In order to give a variation-of-constants formula for equation (1.1), we need to introduce
the following sequence of linear operators Bn : E → B defined, for n > ω and x ∈ E, by
(Bnx)(θ) =
n(nθ + 1)R(n,A)x, − 1
n≤ θ ≤ 0,
0, θ < − 1
n.
For x ∈ E, the functions Bnx belong to C00 with the support included in [−1, 0]. ByLemma 2.1, we deduce that∣∣∣Bnx
∣∣∣ ≤ K(1)|x| for x ∈ E and n > ω.
The following integral formula of equation (1.1) was obtained in [9].
Theorem 2.6. [9] Assume that (H1) holds. Then, for all φ ∈ Y , the integral solutionu of equation (1.1) satisfies the following variation-of-constants formula
(2.1) ut = U(t− σ)φ + limn→∞
∫ t
σ
U(t− s)Bng (xs) ds for t ≥ σ.
Moreover, for any T > σ, the limit in (2.1) exists uniformly for t ∈ [σ, T ].
To get some interesting properties of partial functional differential equations with infi-nite delay, we need to suppose the following axiom.
(C) If a uniformly bounded sequence (ϕn)n in C00 converges to a function ϕ compactlyin (−∞, 0], then ϕ is in B and |ϕn − ϕ| → 0 as n →∞.
Let (S0 (t))t≥0 be the strongly continuous semigroup defined on the subspace
B0 = φ ∈ B : φ (0) = 0by
(S0 (t) φ) (θ) =
φ (t + θ) , t + θ ≤ 0,0, t + θ ≥ 0.
Definition 2.7. Assume that B satisfies (C).(i) B is said to be a fading memory space if for all φ ∈ B0,
S0 (t) φ −→t→∞
0 in B.
(ii) Moreover, B is said to be a uniform fading memory space, if
|S0 (t)| −→t→∞
0.
The following results give some properties of fading memory spaces.
Lemma 2.8. [22] (i) If B is a fading memory space, then the functions K (·) and M (·)in (A) can be chosen to be constants.(ii) If B is a uniform fading memory space, then the functions K(·) and M(·) can bechosen such that K(·) is constant and M(t) → 0 as t →∞.
Proposition 2.9. [22] If B is a fading memory space, then the space BC ((−∞, 0]; E)of all bounded and continuous E-valued functions on (−∞, 0], endowed with the uniformnorm topology, is continuously embedding in B.
M. ADIMY ET AL: CENTER MANIFOLDS...
172
6
In order to study the qualitative behavior of the semigroup (U (t))t≥0, we suppose thefollowing assumption.
(H2) T0 (t) is compact on D (A) for each t > 0.
Let V be a bounded subset of a Banach space Z. The Kuratowski measure of non-compactness α (V ) of V is defined by
α (V ) = inf
d > 0 such that there exists a finite number of sets V1, ..., Vn with
diam (Vi) ≤ d such that V ⊆ n∪i=1
Vi
.
Moreover, for a bounded linear operator P on Z, we define |P |α by
|P |α = inf k > 0 : α (P (V )) ≤ kα (V ) for any bounded set V in Z .
For the semigroup (U (t))t≥0, we define the essential growth bound ωess (U) by
ωess (U) := limt→∞
1
tlog |U (t)|α .
We have the following fundamental result.
Theorem 2.10. [11] Assume that (H1) and (H2) hold, and B is a uniform fading memoryspace. Then
ωess (U) < 0.
Definition 2.11. Let C be a densely defined operator on Z. The essential spectrum of Cdenoted by σess(C) is the set of λ ∈ σ(C) such that one of the following conditions holds.
(i) Im(λI − C) is not closed,
(ii) the generalized eigenspace Mλ(C) :=⋃
k≥1
Ker(λI − C)k is of infinite dimension,
(iii) λ is a limit point of σ(C) \ λ.The essential radius of any bounded operator P on Z is defined by
ress(P ) := sup|λ| : λ ∈ σess(P ).Let AU denote the infinitesimal generator of (U (t))t≥0 . Then
D(AU) = ϕ ∈ Y : ϕ′ ∈ Y, ϕ(0) ∈ D(A) and ϕ′(0) = Aϕ(0) + L(ϕ) ,AUϕ = ϕ′.
Letσ+ (AU) = λ ∈ σ (AU) : Re(λ) ≥ 0.
As an immediate consequence of Theorem 2.10, we have the following spectral propertyof AU .
Lemma 2.12. Assume that (H1) and (H2) hold, and B is a uniform fading memoryspace. Then, σ+(AU) is a finite set of eigenvalues of AU which are not in the essentialspectrum. More precisely, λ ∈ σ+(AU) if and only if there exists x ∈ D(A)\0 solvingthe following characteristic equation
∆(λ)x := λx− Ax− L(eλ·x) = 0,
where eλ·x is the element of B defined for all θ ≤ 0 by (eλ·x)(θ) := eλθx.
M. ADIMY ET AL: CENTER MANIFOLDS...
173
7
Proof. Theorem 2.10 implies that ωess(U) < 0. By Corollary 2.11 of ([16], page 258), weknow that σ+(AU) is a finite subset of the point spectrum σp(AU). On the other hand,we have for t ≥ 0
ress(U(t)) = etωess(U) < 1 and etσess(AU ) ⊂ σess(U(t)).
It follows that
σess(AU) ⊂ λ ∈ C : Re(λ) < 0 .
Consequently, σ+(AU) is a finite subset of the point spectrum σp(AU). Let λ ∈ σ+(AU).Then, there exists ϕ ∈ D(AU), ϕ 6= 0 such that AUϕ = λϕ, which implies that
limt→0+
1
t(U(t)ϕ− ϕ) = λϕ.
By axiom (A) − (ii), we deduce that limt→0+
(1
t(U(t)ϕ− ϕ)
)(0) = λϕ(0). On the other
hand, (1
t(U(t)ϕ− ϕ)
)(0) = A
(1
t
∫ t
0
(U(s)ϕ)(0)ds
)+
1
t
∫ t
0
L(U(s)ϕ)ds.
Let t go to zero. From the closedness of the operator A, we obtain that
ϕ(0) ∈ D(A) and Aϕ(0) + L(ϕ) = λϕ(0).
By the spectral mapping theorem ([16], page 277), we have
eλt ∈ σp(U(t)) and U(t)ϕ = eλtϕ.
Using the translation property of the semigroup solution, we obtain that
ϕ(θ) = eλθϕ(0) for θ ≤ 0.
Since ϕ 6= 0, then ϕ(0) 6= 0 and
ker ∆(λ) 6= 0.Conversely, let λ ∈ C with Re(λ) ≥ 0. Then, for all x ∈ E we have eλ·x ∈ B. If thereexists a ∈ D(A)\0 such that ∆(λ)a = 0, then ϕ = eλ·a ∈ Y. Hence ϕ ∈ C1((−∞, 0]; E)and ϕ′(0) = λa = Aϕ(0) + L(ϕ) ∈ D(A). By Theorem 3 in [3], we conclude that
ϕ ∈ D(AU) and AUϕ = λϕ. ¤
As ωess (U) < 0, we have the following spectral decomposition of the phase space Y .
Theorem 2.13. Assume that (H1) and (H2) hold, and B is a uniform fading memoryspace. Then, there exist linear subspaces of Y denoted by Y−, Y0 and Y+ respectively with
Y = Y− ⊕ Y0 ⊕ Y+
such that(i) AU(Y−) ⊂ Y−, AU(Y0) ⊂ Y0 and AU(Y+) ⊂ Y+;(ii) Y0 and Y+ are finite dimensional;(iii) σ(AU |Y0) = λ ∈ σ(AU) : Re λ = 0 , σ(AU |Y+) = λ ∈ σ(AU) : Re λ > 0;(iv) U(t)Y− ⊂ Y− for t ≥ 0 and U(t)|Y0 ∪ Y+ can be extended to t < 0 such thatU(t)Y0 ⊂ Y0, U(t)Y+ ⊂ Y+ for t ∈ lR;
M. ADIMY ET AL: CENTER MANIFOLDS...
174
8
(v) for any 0 < γ < inf |Re λ| : λ ∈ σ(AU) and Re λ 6= 0 , there exists K ≥ 1 such that,for ϕ ∈ Y ,
|U(t)P−ϕ| ≤ Ke−γt |P−ϕ| for t ≥ 0,|U(t)P0ϕ| ≤ Ke
γ3|t| |P0ϕ| for t ∈ lR,
|U(t)P+ϕ| ≤ Keγt |P+ϕ| for t ≤ 0,
where P−, P0 and P+ are the projections of Y into Y−, Y0 and Y+.Y−, Y0 and Y+ are called respectively the stable, center and unstable subspaces of thesemigroup (U(t))t≥0 .
3. Global existence of the center manifold
Theorem 3.1. Assume that (H1) and (H2) hold, and there exists ε > 0 such that
Lip(g) = supϕ1 6=ϕ2
|g(ϕ1)− g(ϕ2)||ϕ1 − ϕ2| < ε.
Then, there exists a bounded Lipschitz map hg : Y0 → Y− ⊕ Y+ such that hg(0) = 0 andthe Lipschitz manifold
Mg := ϕ + hg(ϕ) : ϕ ∈ Y0is globally invariant under the flow of equation (1.1) on Y .Mg is called the center manifold of equation (1.1).
Proof. Let M = BC(Y0, Y−⊕Y+) denote the Banach space of bounded continuous mapsh : Y0 → Y− ⊕ Y+ endowed with the uniform norm topology. We define
F := h ∈M : h is Lipschitz, h(0) = 0 and Lip(h) ≤ 1 .
Let h ∈ F and ϕ ∈ Y0. Using the strict contraction principle, one can prove the existenceof vϕ
t ∈ Y0 solution of the following equation
(3.1) vϕt = U(t)ϕ + lim
n→∞
∫ t
0
U(t− τ)(Bng(vϕ
τ + h(vϕτ ))
)0
dτ, t ∈ lR.
We now introduce the mapping Tg : F → M defined, for h ∈ F and ϕ ∈ Y0, by
Tg(h)ϕ = limn→∞
∫ 0
−∞U(−τ)
(Bng(vϕ
τ + h(vϕτ ))
)−dτ
− limn→∞
∫ +∞
0
U(−τ)(Bng(vϕ
τ + h(vϕτ ))
)+
dτ.
The first step is to prove that Tg maps F into itself. Let ϕ1, ϕ2 ∈ Y0, 0 < γ <inf |Re λ| : λ ∈ σ(AU) and Re λ 6= 0 and t ∈ lR. Suppose that Lip(g) < ε. Then,
|vϕ1t − vϕ2
t | ≤ Keγ3|t| |ϕ1 − ϕ2|+ 2K |P0| ε
∣∣∣∣∫ t
0
eγ3|t−τ | |vϕ1
τ − vϕ2τ | dτ
∣∣∣∣ ,
where K is the positive constant given by Theorem (2.13). By Gronwall’s lemma, we getthat
e−γ3|t| |vϕ1
t − vϕ2t | ≤ K |ϕ1 − ϕ2| e2K|P0|ε|t|.
Then
|vϕ1t − vϕ2
t | ≤ K |ϕ1 − ϕ2| e[γ3+2K|P0|ε]|t|, t ∈ lR.
M. ADIMY ET AL: CENTER MANIFOLDS...
175
9
If we choose ε such that
(3.2) 2K |P0| ε <γ
6,
we obtain
(3.3) |vϕ1t − vϕ2
t | ≤ K |ϕ1 − ϕ2| eγ2|t|.
Moreover,
|Tg(h)ϕ1 − Tg(h)ϕ2| ≤∫ 0
−∞|U(−τ)P−| |g(vϕ1
τ + h(vϕ1τ ))− g(vϕ2
τ + h(vϕ2τ ))| dτ
+
∫ +∞
0
|U(−τ)P+| |g(vϕ1τ + h(vϕ1
τ ))− g(vϕ2τ + h(vϕ2
τ ))| dτ.
Consequently,
|Tg(h)ϕ1 − Tg(h)ϕ2| ≤ 2
∫ 0
−∞Keγτ |P−| ε |vϕ1
τ − vϕ2τ | dτ+2
∫ +∞
0
Ke−γτ |P+| ε |vϕ1τ − vϕ2
τ | dτ.
Using the inequality (3.3), we obtain
|Tg(h)ϕ1 − Tg(h)ϕ2| ≤ 2K2 |P−| ε |ϕ1 − ϕ2|∫ 0
−∞e
γ2τdτ+2K2 |P+| ε |ϕ1 − ϕ2|
∫ +∞
0
e−γ2τdτ.
It follows that
|Tg(h)ϕ1 − Tg(h)ϕ2| ≤ 4ε
γK2 (|P−|+ |P+|) |ϕ1 − ϕ2| .
We choose ε such that4ε
γK2 (|P−|+ |P+|) < 1.
Then Tg maps F into itself.The next step is to show that Tg is a strict contraction on F . Let h1, h2 ∈ F and ϕ ∈ Y0.Let vi
t, i = 1, 2, denote the solution of the following equation
vit = U(t)ϕ + lim
n→∞
∫ t
0
U(t− τ)(Bng(vi
τ + hi(viτ ))
)0
dτ for t ∈ lR.
Then,
∣∣v1t − v2
t
∣∣ ≤ εK |P0|∣∣∣∣∫ t
0
eγ3|t−τ | (∣∣v1
τ − v2τ
∣∣ +∣∣h1(v
1τ )− h1(v
2τ )
∣∣ +∣∣h1(v
2τ )− h2(v
2τ )
∣∣) dτ
∣∣∣∣ .
Consequently,
∣∣v1t − v2
t
∣∣ ≤ 2εK |P0|∣∣∣∣∫ t
0
eγ3|t−τ | ∣∣v1
τ − v2τ
∣∣ dτ
∣∣∣∣ + εK |P0| |h1 − h2|∣∣∣∣∫ t
0
eγ3|t−τ |dτ
∣∣∣∣ .
By Gronwall’s lemma, we obtain
∣∣v1t − v2
t
∣∣ ≤ 3εK
γ|P0| |h1 − h2| e[
γ3+2K|P0|ε]|t|.
Thanks to (3.2), we state
∣∣v1t − v2
t
∣∣ ≤ 3εK
γ|P0| |h1 − h2| e
γ2|t| for all t ∈ lR.
M. ADIMY ET AL: CENTER MANIFOLDS...
176
10
For i = 1, 2, we have
Tg(hi)ϕ = limn→∞
∫ 0
−∞U(−τ)
(Bng(vi
τ + hi(viτ ))
)−dτ
− limn→∞
∫ +∞
0
U(−τ)(Bng(vi
τ + hi(viτ ))
)+
dτ.
It follows that
|Tg(h1)ϕ− Tg(h2)ϕ| ≤ 2K |P−| 6ε2K
γ2|P0| |h1 − h2|+ K |P−| ε
γ|h1 − h2|
+ 2K |P+| 6ε2K
γ2|P0| |h1 − h2|+ K |P+| ε
γ|h1 − h2| .
Consequently,
|Tg(h1)− Tg(h2)| ≤ (|P−|+ |P+|) Kε
γ
[|P0| 12εK
γ+ 1
]|h1 − h2| .
We choose ε such that
(|P−|+ |P+|) Kε
γ
[|P0| 12εK
γ+ 1
]< 1.
Then Tg is a strict contraction on F . Consequently, it has a unique fixed point hg in F(Tg(hg) = hg).Finally, we show that
Mg := ϕ + hg(ϕ) : ϕ ∈ Y0is globally invariant under the flow on Y . Let ϕ ∈ Y0 and v be the solution of equation(3.1). We claim that t → vϕ
t + hg(vϕt ) is an integral solution of equation (1.1) with initial
condition ϕ + hg(ϕ). In fact, we have Tg(hg)(vϕt ) = hg(v
ϕt ) for t ∈ lR. Moreover,
Tg(h)(vϕt ) = lim
n→∞
∫ 0
−∞U(−τ)
(Bng(vϕ
t+τ + hg(vϕt+τ ))
)−dτ
− limn→∞
∫ +∞
0
U(−τ)(Bng(vϕ
t+τ + hg(vϕt+τ ))
)+
dτ.
Therefore
hg(vϕt ) = lim
n→∞
∫ t
−∞U(t− τ)
(Bng(vϕ
τ + hg(vϕτ ))
)−dτ
− limn→∞
∫ +∞
t
U(t− τ)(Bng(vϕ
τ + hg(vϕτ ))
)+
dτ.
Then, for t ∈ lR, we obtain
vϕt + hg(v
ϕt ) = U(t)ϕ + lim
n→∞
∫ t
0
U(t− τ)(Bng(vϕ
τ + hg(vϕτ ))
)0
dτ
+ limn→∞
∫ t
−∞U(t− τ)
(Bng(vϕ
τ + hg(vϕτ ))
)−dτ
− limn→∞
∫ +∞
t
U(t− τ)(Bng(vϕ
τ + hg(vϕτ ))
)+
dτ.
M. ADIMY ET AL: CENTER MANIFOLDS...
177
11
For any t ≥ a, we have
limn→∞
∫ t
−∞U(t− τ)
(Bng(vϕ
τ + hg(vϕτ ))
)−dτ
= limn→∞
∫ a
−∞U(t− τ)
(Bng(vϕ
τ + hg(vϕτ ))
)−dτ
+ limλ→∞
∫ t
a
U(t− τ)(Bng(vϕ
τ + hg(vϕτ ))
)−dτ,
and
limλ→∞
∫ a
−∞U(t− τ)
(Bng(vϕ
τ + hg(vϕτ ))
)−dτ
= U(t− a)
(lim
n→∞
∫ a
−∞U(a− τ)
(Bng(vϕ
τ + hg(vϕτ ))
)−dτ
).
By the same argument, we have
limn→∞
∫ t
a
U(t− τ)(Bng(vϕ
τ + hg(vϕτ ))
)+
dτ
= limn→∞
∫ +∞
a
U(t− τ)(Bng(vϕ
τ + hg(vϕτ ))
)+
dτ
− limn→∞
∫ +∞
t
U(t− τ)(Bng(vϕ
τ + hg(vϕτ ))
)+
dτ,
and
limn→∞
∫ +∞
a
U(t− τ)(Bng(vϕ
τ + hg(vϕτ ))
)+
dτ
= U(t− a)
(lim
n→∞
∫ +∞
a
U(a− τ)(Bng(vϕ
τ + hg(vϕτ ))
)+
dτ
).
Moreover, note that
hg(vϕa ) = lim
n→∞
∫ a
−∞U(a− τ)
(Bng(vϕ
τ + hg(vϕτ ))
)−dτ
− limn→∞
∫ +∞
a
U(a− τ)(Bng(vϕ
τ + hg(vϕτ ))
)+
dτ.
In particular
vϕt = U(t− a)vϕ
a + limn→∞
∫ t
a
U(t− τ)(Bng(vϕ
τ + hg(vϕτ ))
)0
dτ.
Consequently, for any t ≥ a, we obtain
vϕt + hg(v
ϕt ) = U(t− a) (vϕ
a + hg(vϕa )) + lim
n→∞
∫ t
a
U(t− τ)(Bng(vϕ
τ + hg(vϕτ ))
)0
dτ
+ limn→∞
∫ t
a
U(t− τ)(Bng(vϕ
τ + hg(vϕτ ))
)+
dτ
+ limn→∞
∫ t
a
U(t− τ)(Bng(vϕ
τ + hg(vϕτ ))
)−dτ.
M. ADIMY ET AL: CENTER MANIFOLDS...
178
12
Therefore, for any t ≥ a,
vϕt + hg(v
ϕt ) = U(t− a) (vϕ
a + hg(vϕa )) + lim
n→∞
∫ t
a
U(t− τ)(Bng(vϕ
τ + hg(vϕτ ))
)dτ.
Finally, we conclude that vϕt + hg(v
ϕt ) is an integral solution of equation (1.1) on lR with
initial value ϕ + hg(ϕ). ¤
Theorem 3.2. Let h ∈ F and ϕ ∈ Y0. If vϕ is the solution of equation (3.1) on lR, then
|vϕt | ≤ K |ϕ| e γ
2|t| and |vϕ
t + hg(vϕt )| ≤ 2K |ϕ| e γ
2|t|.
Conversely, if we choose ε such that
2Kε
γ(|P−|+ |P+|+ 3 |P0|) < 1,
then for any integral solution u of equation (1.1) on lR with ut = O(eγ2|t|), we have
ut ∈ Mg for all t ∈ lR.
Proof. Let vϕ be the solution of equation (3.1). Then, using the estimate (3.3) we obtain
|vϕt | ≤ K |ϕ| e γ
2|t| for t ∈ lR.
Moreover, from the fact that Lip(h) ≤ 1 and hg(0) = 0, we obtain
|vϕt + hg(v
ϕt )| ≤ 2K |ϕ| e γ
2|t| for t ∈ lR.
Let u be an integral solution of equation (1.1) such that ut = O(eγ2|t|). Then there exists
a positive constant K0 such that |ut| ≤ K0eγ2|t| for all t ∈ lR. Note that
ut = U(t− s)us + limn→∞
∫ t
s
U(t− τ)Bng(uτ )dτ, t ≥ s.
On the other hand,
u+t = U(t− s)u+
s + limn→∞
∫ t
s
U(t− τ)(Bng(uτ )
)+
dτ, s ≥ t.
Moreover, for s ≥ t and s ≥ 0 we have∣∣U(t− s)u+
s
∣∣ ≤ Keγ(t−s) |P+us| ≤ K0K |P+| eγ(t−s)eγ2|s| = K0K |P+| eγte−
γ2s.
Therefore,
lims→∞
∣∣U(t− s)u+s
∣∣ = 0.
It follows that
u+t = − lim
n→∞
∫ +∞
t
U(t− τ)(Bng(uτ )
)+
dτ.
Similarly, we can prove that
u−t = limn→∞
∫ t
−∞U(t− τ)
(Bng(uτ )
)−dτ.
We conclude that
ut = u+t + u−t + U(t)u0
0 + limn→∞
∫ t
0
U(t− τ)(Bng(uτ )
)0
dτ for t ∈ lR.
M. ADIMY ET AL: CENTER MANIFOLDS...
179
13
Let φ ∈ Y0 such that φ = u0. By Theorem 3.1, there exists an integral solution w ofequation (1.1) on lR with initial value φ + hg(φ) such that, for all t ∈ lR, wt ∈ Mg and
wt = U(t)φ + limn→∞
∫ t
0
U(t− τ)(Bng(wτ )
)0
dτ
+ limn→∞
∫ t
−∞U(t− τ)
(Bng(wτ )
)+
dτ
− limn→∞
∫ +∞
t
U(t− τ)(Bng(wτ )
)−dτ.
Then
|ut − wt| ≤∣∣∣∣ limn→∞
∫ t
0
U(t− τ)(Bn (g(uτ )− g(wτ ))
)0
dτ
∣∣∣∣
+
∣∣∣∣ limn→∞
∫ t
−∞U(t− τ)
(Bn (g(uτ )− g(wτ ))
)+
dτ
∣∣∣∣
+
∣∣∣∣ limn→∞
∫ +∞
t
U(t− τ)(Bn (g(uτ )− g(wτ ))
)−dτ
∣∣∣∣ .
This implies that
|ut − wt| ≤ Kε
(|P0|
∣∣∣∣∫ t
0
eγ3|t−τ | |uτ − wτ | dτ
∣∣∣∣
+ |P−|∫ t
−∞e−γ(t−τ) |uτ − wτ | dτ + |P+|
∫ +∞
t
eγ(t−τ) |uτ − wτ | dτ
).
Let N(t) = e−γ2|t| |ut − wt| for all t ∈ lR. Then, N = sup
t∈lR(N(t)) < ∞. On the other hand,
we have
N(t) ≤ KεN
(|P0|
∣∣∣∣∫ t
0
e−γ6|t−τ |dτ
∣∣∣∣ + |P−|∫ t
−∞e−
γ2(t−τ)dτ + |P+|
∫ +∞
t
eγ2(t−τ)dτ
).
Finally, we obtain
N ≤ 2Kε
γ(3 |P0|+ |P−|+ |P+|) N .
Consequently, N = 0 and ut = wt for t ∈ lR. In particular, Mg contains all boundedsolutions of equation (1.1). ¤
4. Local existence of the center manifold
In this section, we prove the existence of a local center manifold when g is defined in aneighborhood of zero. We suppose that
(H3) There exists ρ1 > 0 such that g : B(0, ρ1) → E is C1-function, g(0) = 0 andg′(0) = 0, where B(0, ρ1) = ϕ ∈ B : |ϕ| < ρ1 .
For ρ < ρ1, we define the cut-off function gρ : B → E by
gρ(ϕ) =
g(ϕ) if |ϕ| ≤ ρ,
g( ρ|ϕ|ϕ) if |ϕ| > ρ.
M. ADIMY ET AL: CENTER MANIFOLDS...
180
14
We consider the following partial functional differential equation
(4.1)
d
dtu(t) = Au(t) + L(ut) + gρ(ut), t ≥ σ,
uσ = ϕ ∈ B.
Theorem 4.1. Assume that (H1), (H2) and (H3) hold. Then there exist 0 < ρ < ρ1 anda Lipschitz continuous a mapping hgρ : Y0 → Y− ⊕ Y+ such that hgρ(0) = 0 and the localLipschitz manifold
Mgρ =ϕ + hgρ(ϕ) : ϕ ∈ Y0
is globally invariant under the flow associated to equation (4.1).
Proof. Using the same arguments as in [31], Proposition 3.10, p.95, one can show thatgρ is Lipschitz continuous with
Lip(gρ) ≤ 2 sup|ϕ|<ρ
|g′(ϕ)| .
It follows that Lip(gρ) goes to zero when ρ goes to zero. According to Theorem 3.1, wededuce that there exist ρ ≥ 0 and mapping hgρ : Y0 → Y−⊕ Y+ with hgρ(0) = 0 such thatthe Lipschitz manifold
Mgρ =ϕ + hgρ(ϕ) : ϕ ∈ Y0
is globally invariant under the flow of equation (4.1). ¤
Remark 4.2. (i) The set
Mgρ :=ϕ + hgρ(ϕ) : ϕ ∈ Y0
∩B(0, ρ)
is called the local center manifold associated to equation (1.1).
(ii) Mgρ contains all bounded integral solutions by ρ of equation (1.1).
5. Reduction principle: flow on the center manifold
We establish that the flow on the center manifold is governed by an ordinary differentialequation in a finite dimensional space. We assume that the conditions of Theorem 3.1are satisfied. We also assume that the unstable space Y+ is reduced to zero. This meansthat σ(AU) ⊂ λ ∈ C : Re λ ≤ 0 and
Y = Y− ⊕ Y0.
Let d be the dimension of the center space Y0 and Φ = (φ1, ..., φd) be a basis of Y0. Then,there exist d elements φ∗1, ..., φ
∗d of Y ∗, the dual space of Y, such that
〈φ∗i , φj〉 := φ∗i (φj) = δij, 1 ≤ i, j ≤ d,φ∗i = 0 on Y−.
Denote by Ψ the transpose of (φ∗1, ...., φ∗d). Let φ ∈ Y. Define
〈Ψ, φ〉 := (φ∗1(φ), ..., φ∗d(φ))T .
Then, the projection operator P0 : Y → Y0 is given by
P0φ = Φ 〈Ψ, φ〉 .
M. ADIMY ET AL: CENTER MANIFOLDS...
181
15
Put U0(t) := U(t)|Y0. As Y0 is a finite dimensional space, (U0(t))t∈R is a strongly con-tinuous group. Then, there exists a d × d matrix G ([15], Theorem 2.15, p.102) suchthat
U0(t)Φ = ΦetG, t ∈ R.
Let n ∈ N, n ≥ n0 > ω and i ∈ 1, ...., d . We define the function x∗n,i on E by
x∗n,i(y) =⟨φ∗i , Bny
⟩, y ∈ E.
Then, x∗n,i is a bounded linear operator on E. Let x∗n be the transpose of (x∗n,1, ..., x∗n,d).
We obtain
〈x∗n, y〉 =⟨Ψ, Bn (y)
⟩.
Consequently,
supn≥n0
|x∗n| < ∞.
This implies that (x∗n)n≥n0is a bounded sequence in L(E,Rd). Then, we get the following
important result.
Theorem 5.1. There exists x∗ ∈ L(E,Rd) such that (x∗n)n≥n0converges weakly to x∗ in
the sense that
〈x∗n, y〉 → 〈x∗, y〉 as n →∞ for y ∈ E.
To prove this result, we need the following fundamental theorem [33, p. 776]
Theorem 5.2. Let X be a separable Banach space and (z∗n)n≥p be a bounded sequence in
X∗. Then there exists a subsequence(z∗nk
)k≥0
of (z∗n)n≥p which converges weakly in X∗ in
the sense that there exists z∗ ∈ X∗ such that⟨z∗nk
, y⟩ → 〈z∗, y〉 as k →∞ for y ∈ X.
Proof of Theorem 5.1. Let Z0 be a closed separable subspace of E. Since (x∗n)n≥n0
is a bounded sequence, thanks to Theorem 5.2 there is a subsequence(x∗nk
)k∈N which
converges weakly to some x∗Z0in Z0. We claim that all the sequence (x∗n)n≥n0
convergesweakly to x∗Z0
in Z0. This can be done by contradiction. Suppose that there exists a
subsequence(x∗nq
)q∈N
of (x∗n)n≥n0which converges weakly to some x∗Z0
with x∗Z06= x∗Z0
.
Let ut(., σ, ϕ, f) be the integral solution of the following equation
d
dtu(t) = Au(t) + L(ut) + f(t), t ≥ σ,
uσ = ϕ ∈ B,
where f is a continuous function from R to E. By using the variation-of-constants formulaand the spectral decomposition, we obtain
P0ut(., σ, 0, f) = limn→+∞
∫ t
σ
U (t− ξ)(Bnf(ξ)
)0
dξ
and
P0
(Bnf(ξ)
)= Φ
⟨Ψ, Bnf(ξ)
⟩= Φ 〈x∗n, f(ξ)〉 .
M. ADIMY ET AL: CENTER MANIFOLDS...
182
16
It follows that
P0ut(., σ, 0, f) = limn→+∞
Φ
∫ t
σ
e(t−ξ)G⟨Ψ, Bnf(ξ)
⟩dξ,
= limn→+∞
Φ
∫ t
σ
e(t−ξ)G 〈x∗n, f(ξ)〉 dξ.
Let f = c (for a fixed c ∈ Z0) be a constant function. Then
limk→+∞
∫ t
σ
e(t−ξ)G⟨x∗nk
, c⟩dξ = lim
p→+∞
∫ t
σ
e(t−ξ)G⟨x∗np
, c⟩
dξ.
Consequently, ∫ t
σ
e(t−ξ)G⟨x∗Z0
, c⟩dξ =
∫ t
σ
e(t−ξ)G⟨x∗Z0
, c⟩dξ.
Hence x∗Z0= x∗Z0
. This yields to a contradiction.We now conclude that the whole sequence (x∗n)n≥n0
converges weakly to x∗Z0in Z0. Let
Z1 be another closed separable subspace of E. By using the same argument as above, weobtain that (x∗n)n≥n0
converges weakly to x∗Z1in Z1. Since Z0 ∩ Z1 is a closed separable
subspace of E, we get that x∗Z1= x∗Z0
in Z0 ∩ Z1. For any y ∈ E, we define x∗ by
〈x∗, y〉 = 〈x∗Z , y〉 ,where Z is an arbitrary given closed separable subspace of E such that y ∈ Z. Then x∗
is a bounded linear operator from E to Rd such that
|x∗| ≤ supn≥n0
|x∗n| < ∞
and (x∗n)n≥n0converges weakly to x∗ in E. ¤
As an immediate consequence, we obtain the following result.
Corollary 5.3. For any continuous function f : R→ E, we have
limn→+∞
∫ t
σ
U (t− ξ)(Bnf(ξ)
)0
dξ = Φ
∫ t
σ
e(t−ξ)G 〈x∗, f(ξ)〉 dξ, t, σ ∈ R.
Let ϕ ∈ Y0. Then from the properties of the center manifold, we know that the integralsolution starting from ϕ + h(ϕ) is given by vϕ
t + hg(vϕt ), where vϕ
t is the solution of
vϕt = U(t)ϕ + lim
λ→∞
∫ t
0
U(t− τ)(Bλg(vϕ
τ + hg(vϕτ ))
)0
dτ, t ∈ R.
Let z(t) be the component of vϕt ∈ Y0. Then
Φz(t) = vϕt for t ∈ R.
By Theorem 5.1 and Corollary 5.3, we have for t ∈ R
Φz(t) = ΦeGtz(0) + Φ
∫ t
0
e(t−τ)G 〈x∗, g(vϕτ + hg(v
ϕτ ))〉 dτ.
We conclude that z satisfies
z(t) = eGtz(0) + limn→∞
∫ t
0
e(t−τ)G 〈x∗n, g(vϕτ + hg(v
ϕτ ))〉 dτ.
M. ADIMY ET AL: CENTER MANIFOLDS...
183
17
Finally, we obtain at the following ordinary differential equation (the reduced system)
(5.1) z′(t) = Gz(t) + 〈x∗, g(Φz(t) + hg(Φz(t)))〉 for t ∈ R.
This determines the flow on the center manifold.
Remark: In this paper, the center manifold reduction technique has been proposed forsome partial functional differential equations with infinite delay in fading memory spaces.We expect many applications of this important result, especially to study the stability ofequilibriums in critical cases when the classical methods (like the linearization principle)do not work. We also expect to use it to develop new results on bifurcation theory forpartial functional differential equations with infinite delay.
References
[1] M. Adimy, M. Alia and K. Ezzinbi, Partial neutral functional differential equationswith infinite delay in extrapolation spaces, Differential and Integral Equations, (toappear 2011).
[2] M. Adimy, H. Bouzahir and K. Ezzinbi, Existence for a class of partial functionaldifferential equations with infinite delay, Nonlinear Analysis, Theory, Methods andApplications 46 (2001) 91-112.
[3] M. Adimy, H. Bouzahir and K. Ezzinbi, Local existence and stability for some par-tial functional differential equations with infinite delay, Nonlinear Analysis, Theory,Methods and Applications 48 (2002) 323-348.
[4] M. Adimy and K. Ezzinbi, A class of linear partial neutral functional differentialequations with non-dense domain, Journal of Differential Equations 147 (1998) 285-332.
[5] M. Adimy and K. Ezzinbi, Local existence and linearized stability for partial functionaldifferential equations, Dynamic Systems and Applications 7 (1998) 389-403.
[6] M. Adimy and K. Ezzinbi, Existence and stability of solutions for a class of partialneutral functional differential equations, Hiroshima Mathematical Journal 34 (2004)251-294.
[7] M. Adimy, K. Ezzinbi and M. Laklach, Spectral decomposition for some partial neutralfunctional differential equations, Canadian Applied Mathematics Quarterly 9 (2001)1-34.
[8] M. Adimy, K. Ezzinbi and A. Ouhinou, Variation of constants formula and almostperiodic solutions for some partial functional differential equations with infinite delay,Journal of Mathematical Analysis and Applications 317 (2006) 668-689.
[9] M. Adimy, K. Ezzinbi and A. Ouhinou, Behavior near hyperbolic stationary solutionsfor partial functional differential equations with infinite delay, Nonlinear Analysis,Theory, Methods and Applications 68 (2008) 2280-2302.
[10] M. Adimy, K. Ezzinbi and J. Wu, Center manifold and stability in critical casesfor some partial functional differential equations, International Journal of EvolutionEquations 2 (2007) 69-95.
[11] R. Benkhalti, H. Bouzahir and K. Ezzinbi, Existence of a periodic solution for somepartial functional differential equations with infinite delay, Journal of MathematicalAnalysis and Applications 256 (2001) 257-280.
[12] J. Carr, Applications of Center Manifold Theory, Applied Mathematical Sciences,Springer-Verlag, Vol. 35 (1981).
M. ADIMY ET AL: CENTER MANIFOLDS...
184
18
[13] S.N. Chow and K. Lu, Invariant manifolds for flows in Banach spaces, Journal ofDifferential equations 74 (1988) 285-317.
[14] G. Da Prato and A. Lunardi, Stability, instability and center manifold theorem forfully nonlinear autonomous parabolic equations in Banach spaces, Archive for RationalMechanics and Analysis 101 (1988) 115-141.
[15] O. Diekmann, S.A. van Gils, S.M. Verduyn Lunel and H-O Walther, Delay Equa-tions, Functional Complex and Nonlinear Analysis, Applied Mathematical Sciences,Springer-Verlag, (1995).
[16] K.J. Engel and R. Nagel, One-parameter Semigroups of Linear Evolution Equations,Grad. Texts in Math., Vol. 194, Springer-Verlag, (2001).
[17] T. Faria, W. Huang and J. Wu, Smoothness of center manifolds for maps and formaladjoints for semilinear FDEs in general Banach spaces, SIAM, Journal of MathematicalAnalysis 34 (2002) 173-203.
[18] J.K. Hale, Critical cases for neutral functional differential equations, Journal of Dif-ferential Equations 10 (1971) 59-82.
[19] J.K. Hale, Theory of Functional Differential Equations, Springer-Verlag, (1977).[20] J.K. Hale and J. Kato, Phase space for retarded equations with infinite delay, Funkcial
Ekvac 21 (1978) 11-41.[21] D. Henry, Geometric Theory of Semilinear Parabolic Equations, Lecture Notes in
Mathematics, Springer-Verlag, Vol. 840, (1981).[22] Y. Hino, S. Murakami and T. Naito, Functional Differential Equations with Infinite
Delay, Lecture Notes in Mathematics, Springer-Verlag, Vol. 1473, (1991).[23] A. Keller, The stable, center-stable, center, center-unstable and unstable manifolds,
Journal of Differential Equations 3 (1967) 546-570.[24] A. Keller, Stability of the center-stable manifold, Journal of Mathematical Analysis
and Applications, 18 (1967) 336-344.[25] X. Lin, J.W.H. So and J. Wu, Centre manifolds for partial differential equations with
delays, Proceedings of the Royal Society of Edinburgh 122 (1992) 237-254.[26] N.V. Minh and J. Wu, Invariant manifolds of partial functional differential equations,
Journal of Differential Equations 198 (2004) 381-421.[27] K. Palmer, On the stability of the center manifold, Journal of Applied Mathematics
and Physics, (ZAMP) 38 (1987) 273-278.[28] S.N. Shimanov, On the stability in the critical case of a zero root for systems with
time lag, Prikl. Mat. Mekh. 24 (1960) 447-457.[29] J.W.H. So, Y. Yang and J. Wu, Center manifolds for functional partial differential
equations: Smoothness and attractivity, Mathematica Japonica 48 (1998) 67-81.[30] A. Vanderbauwhede and S.A. Van Gils, Center manifolds and contractions on a scale
of Banach spaces, Journal of Functional Analysis 72 (1987) 209-224.[31] G.F. Webb, Theory of Nonlinear Age-dependent Population Dynamics, Marcel
Dekker, (1985).[32] J. Wu, Theory and Applications of Partial Functional Differential Equations, Applied
Mathematical Sciences, Springer-Verlag, Vol. 119, (1996).[33] E. Zeidler, Nonlinear Functional Analysis and its Applications, Tome I, Fixed Point
Theorems, Springer-Verlag, (1993).
M. ADIMY ET AL: CENTER MANIFOLDS...
185
Fuzziffied Random Generalized Nonlinear Variational LikeInequalities
G. AnastassiouDepartment of Mathematical Sciences
University of Memphis, Memphis, TN 38152, USA
Salahuddin and M.K. AhmadDepartment of Mathematics
Aligarh Muslim University, Aligarh-202002, [email protected]; ahmad [email protected]
Abstract
In this paper, we introduced and studied a new class of generalized nonlinearvariational like inequality for fuzzy random mappings and have proved existencetheorem for auxiliary problem of the fuzziffied random generalized nonlinear vari-ational like inequalities. By exploiting the theorem, we construct and analyze anew random iterative algorithm for finding the selections of the fuzziffied ran-dom generalized nonlinear variational like inequality. Further more, we prove theexistence of unique solutions of the fuzzified random iterative algorithm for find-ing the selection of the fuzziffied generalized nonlinear variational like inequalityproblems. The convergence analysis of fuzziffied random iterative sequences gen-erated by the random iterative algorithm is also discussed.
Keywords: Fuzziffied random generalized nonlinear variational like inequali-ties, fuzziffied random iterative sequences, random iterative algorithm, Hausdorffspace, Hilbert spaces, measurable spaces, Borel set.Mathematics Subject Classification: 49J40
1 Introduction
Variational inequality theory has been a very effective and powerful tool for study-ing a wide range of problems arising in many diverse fields of pure and applied sci-ences. It is well known that one of the most important problems in variational in-equality theory is the development of efficient and implementable iterative algorithmsfor solving various class of variational inequalities and variational inclusions. In [8]and [20, 27, 28, 30, 31, 32] there are lot of iterative algorithms for finding the approx-imate solutions of various variational inequalities. Glowinski, Lions and Tremolieres[16] had developed the auxiliary principle techniques. By using the auxiliary principletechnique, Ding [13, 14, 15] suggested several iterative algorithms to compute approx-imate solutions for some class of general nonlinear mixed variational inequalities andvariational like inequalities in reflexive Banach spaces. Variational inequalities have
186
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,186-206,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC
been widely used as a mathematical programming tool in modeling, optimization anddecision making problems. However, facing uncertainty is a constant challenge for op-timization and decision making problems. Treating uncertainty for fuzzy mathematicalresults in the study of fuzzy optimization and decision making, the variational inequal-ities have been generalized and extended in multi direction using novel techniques offuzzy environment.
It is well known that fuzzy set theory which was introduced by Zadeh [35] in1965 has gained importance in analysis, from both theoretical and practical point ofview. The fuzzy sets are distinguished from ordinary or crisp sets in that the degree ofmembership of an element in a fuzzy set can be any number in the unit interval [0,1] asopposed to a number from the binary pair 0,1 for crisp sets. This property of fuzzysets enable us to represent realistically imprecise concepts in which the transition frommembership to membership is gradual.
In 1989, Chang and Zhu [4] introduced the concepts of variational inequality forfuzzy mappings which were later developed by Chang and Huang [5], Noor [29], Lee etal. [24], Ding [10], Ding and Park [11] etc. in Hilbert spaces. Recently Huang and Lan[17] considered nonlinear equations with fuzzy mappings in fuzzy normed spaces andLan and Verma [22] considered fuzzy variational inclusion problems in Banach spaces.The concepts of random fuzzy mapping was first introduced by Huang [18]. Therandom variational inclusion problem for fuzzy random mappings is studied by Lee etal. [25], Dai [9] and Ahmad and Faraj [1]. The random variational inequality (inclusion)problems and random quasi-variational inclusion problems have been studied by Chang[3], Khan and Salahuddin [21], Cho et al. [7], Lan [23] and Huang and Cho [20] etc.
Inspired and motivated by recent works [1, 6, 9, 16, 25, 26, 31, 33, 36], in thispaper we introduced and studied a new class of fuzziffied random generalized nonlinearvariational like inequalities. An existence theorem for auxiliary problem of the fuzziffiedrandom generalized nonlinear variational like inequality is established. By exploitingthe theorem, we construct and analyze a new random iterative algorithm for findingthe solution of the fuzziffied random generalized nonlinear variational like inequality.Further, we prove the existence of unique solutions of the fuzziffied random generalizednonlinear variational like inequality problems and discuss the convergence analysis offuzziffied random iterative sequences generated by the random iterative algorithm.Our results improve and generalize many known corresponding results presented in[12, 14, 18, 20].
2 Preliminaries
Throughout this paper, let H be a real Hilbert space endowed with dual spaceH∗, pairing between norm denoted by ‖.‖, inner product 〈u, v〉 for u ∈ H, v ∈ H∗, Dbe a nonempty closed convex subset of H. We denote by 2H and CB(H) the familyof all nonempty subsets and the families of all the nonempty bounded closed subsets
2
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
187
of H respectively, H(., .) represents the Hausdorff metric on CB(H). Let (Ω,Σ) be ameasurable space, where Ω is a set and Σ is σ-algebra of subsets of Ω. We denote byB(H) the class of Borel σ-fields in H.
Definition 2.1. A mapping f : Ω→ H is said to be measurable if for any C ∈ B(H),f−1(C) = t ∈ Ω : f(t) ∈ C ∈ Σ.
Definition 2.2. A multivalued mapping A : Ω → CB(H) is said to be measurable iffor any C ∈ B(H),
A−1(C) = t ∈ Ω : A(t) ∩ C 6= ∅ ∈ Σ.
Definition 2.3. A mapping f : Ω × H → H is called a random operator if for anyw ∈ H, f(t, w) = w(t) is measurable. A random operator f : Ω×H → H is said to becontinuous if for any t ∈ Ω, the mapping f(t, ·) : H → H is continuous.
Definition 2.4. A mapping u : Ω → H is called a measurable selection of themultivalued measurable mapping A : Ω → CB(H) if u is a measurable mapping andt ∈ Ω, u(t) ∈ A(t).
Definition 2.5. A mapping T : Ω × H → CB(H) is called a random multivaluedmapping if for any w ∈ H, T (·, w) is measurable. A random multivalued mappingT : Ω×H → CB(H) is said to be H-continuous if for any t ∈ Ω, T (t, ·) is continuousin the Hausdorff metric.
Let F(H) be a collection of fuzzy sets over H. A mapping F from H into F(H) iscalled a fuzzy mapping. If F is a fuzzy mapping on H, for any u ∈ H, F (u) (denotedby Fu in what follows) is a fuzzy set on H and Fu(z) is the membership function of zin Fu.
Let M ∈ F(H), q ∈ [0, 1], then the set
(M)q = u ∈ H : M(u) ≥ q
is called q-cut of M .
Definition 2.6. A fuzzy mapping F : Ω → F(H) is called measurable if for anyα ∈ (0, 1], (F (·))α : Ω→ 2H is measurable multivalued mapping.
Definition 2.7. A fuzzy mapping F : Ω × H → F(H) is called a random fuzzymapping if for any w ∈ H, F (·, w) : Ω→ F(H) is a measurable mapping.
Clearly, the random fuzzy mapping includes multivalued mapping, random multi-valued mappings and fuzzy mappings as the special cases:
Let A, T : Ω×H → F(H) be two fuzzy random mappings satisfying the followingcondition (S):
3
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
188
(S): There exist two mappings a, c : H → (0, 1] such that for all (t, w) ∈ Ω × H,(At,w)a(w) ∈ CB(H), (Tt,w)c(w) ∈ CB(H). By using the fuzzy random mappings A, T ,
we can define two random multivalued mappings A and T as follows:
∀ (t, w) ∈ Ω×H, A : Ω×H → CB(H), (t, w)→ (At,w)a(w),
∀ (t, w) ∈ Ω×H, T : Ω×H → CB(H), (t, w)→ (Tt,w)c(w),
where A(t,w) = A(t, w(t)).
So, A and T are called the random multivalued mappings induced by the fuzzyrandom mappings A and T respectively.
Given mappings a, c : H → (0, 1] the fuzzy random mappings A, T : Ω × H →F(H) satisfying the condition (S). Let N : Ω×H×H → H and η : Ω×H×H → H∗ bethe mappings. Let b : H ×H → (−∞,∞) be a real valued function. For given f ∈ Hand any measurable mapping v : Ω → H, find measurable mappings u, x, y : Ω → Hsuch that At,u(t)(x(t)) ≥ a(u(t)), Tt,u(t)(y(t)) ≥ c(u(t)) and
〈Nt(x(t), y(t))−f, ηt(v(t), u(t))〉+a(u(t), v(t)−u(t)) ≥ b(u(t), u(t))−b(u(t), v(t)) (2.1)
for all v(t) ∈ H, t ∈ Ω and ηt(u(t), v(t)) = η(t, u(t), v(t)), where a : H × H →(−∞,+∞) is a coercive continuous bilinear form, that is there exists the measurablemappings e, d : Ω→ (0, 1) such that
(C1) a(v(t), v(t)) ≥ dt‖v(t)‖2 for all v(t) ∈ H(C2) |a(u(t), v(t))| ≤ et‖u(t)‖.‖v(t)‖ for all u(t), v(t) ∈ H.
It follows from (C1) and (C2) that d(t) ≤ e(t). Again function b(., .) is non differ-entiable and satisfies the following conditions:
(C3) for any measurable mapping v : Ω→ H, b(., v(t)) is linear;
(C4) for each measurable mapping w : Ω→ H, b(w(t), .) is a convex function;
(C5) for any measurable mappings w, v : Ω → H, b(w(t), v(t)) is bounded, that isthere exists a measurable function γ : Ω→ (0,+∞) such that
b(w(t), v(t)) ≤ γt‖w(t)‖.‖v(t)‖;
(C6) for any measurable mappings w, v, z : Ω→ H
b(w(t), v(t))− b(w(t), z(t) ≤ b(w(t), v(t)− z(t)).
The inequality (2.1) is called fuzziffied random generalized nonlinear variationallike inequalities.
Remark 2.1.
4
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
189
1. For any measurable mapping w, v : Ω→ H
b(−w(t), v(t)) = −b(w(t), v(t)) and b(−w(t), v(t)) ≤ γt‖w(t)‖.‖v(t)‖,
hold from condition (C3) and (C5), respectively. So
|b(w(t), v(t))| ≤ γt‖w(t)‖ ‖v(t)‖.
2. For any measurable mappings w, v, z : Ω→ H
|b(w(t), v(t))− b(w(t), z(t))| ≤ γt‖w(t)‖ ‖v(t)− z(t)‖,
follows from conditions (C4) and (C6). So, b(w(t), v(t)) is continuous with respectto second variable.
Special Cases:
1. If a is zero operator f ≡ 0. Then problem (2.1) is equivalent to the problem(2.1) of Dai [9]. For any measurable mapping v : Ω → H, finding measurablemappings u, x, y : Ω→ H such that
At,u(t)(x(t)) ≥ a(u(t)), Tt,u(t)(y(t)) ≥ c(u(t))
and〈N(x(t), y(t)), η(v(t), u(t))〉+ b(u(t), v(t))− b(u(t), u(t)) ≥ 0 (2.2)
where N, η : H ×H → H.
2. If A, T : H → CB(H) are classical set valued mappings we can define the fuzzymappings A, T : H → F(H) by
u→ χA(u), u→ χT (u)
where χA(u) and χT (u) are characteristic functions of A(u) and T (u) respec-tively, taking a(u) = c(u) = 1 for all u ∈ H. For given f ∈ H and any measurablemapping v : Ω→ H, find measurable mappings u, x, y : Ω→ H such that
〈Nt(x(t), y(t))−f, ηt(v(t), u(t))〉+a(u(t), v(t)−u(t))−b(u(t), v(t)) ≥ b(u(t), u(t))(2.3)
for all v(t) ∈ H. It is called random generalized nonlinear variational like inequal-ities, which is the variant form of a problem studied by Liu et al. [26].
3. If a is zero operator, A, T : D → H and η : D × D → H∗ be the single valuedmappings, then (2.3) reduces to the following nonlinear mixed variational likeinequality:
For a given f ∈ H, find u ∈ D such that
〈N(A(u), T (u))− f, η(v, u)〉+ b(u, v)− b(u, u) ≤ 0, ∀ v ∈ H, (2.4)
considered by Ding [14].
5
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
190
4. If N(Au, Tu) = Au− Tu, f ≡ 0 and b(u, u) = ϕ(u), where ϕ : H → (−∞,∞) isa functional. Then (2.4) is equivalent to a problem for finding u ∈ D such that
〈A(u)− T (u), η(v, u)〉 ≥ ϕ(u)− ϕ(v), ∀ v ∈ D. (2.5)
It is called mixed nonlinear variational like inequalities, considered and studiedby Ding [13].
5. Again, η(v, u) = gv − gu, for all u, v ∈ D where g : D → D is a mapping, then(2.5) is equivalent to finding u ∈ K such that
〈Au− Tu, gv − gu〉 ≥ ϕ(u)− ϕ(v), ∀ v ∈ D, (2.6)
which was studied by Yao [34].
Definition 2.8. A random multivalued mapping A : Ω ×H → CB(H) is said to beH-Lipschitz continuous, if there exists a measurable function λ : Ω → (0,+∞) suchthat
H(A(t, u1(t)), A(t, u2(t))) ≤ λ(t)‖u1(t)− u2(t)‖2 ∀ u1(t), u2(t) ∈ H.We give the following Lemmas.
Lemma 2.1[1]. Let A : Ω × H → CB(H) be a H-continuous random multival-ued mapping, then for measurable mapping u : Ω → H, the multivalued mappingA(., u(t)) : Ω→ CB(H) is measurable.
Lemma 2.2[2]. Let A1, A2 : Ω→ CB(H) be two measurable multivalued mappings,ε > 0 be a constant and x1 : Ω→ H be a measurable selection of A1, then there existsa measurable selection x2 : Ω→ H of A2 such that for all t ∈ Ω,
‖x1(t)− x2(t)‖ ≤ (1 + ε)H(A1(t), A2(t)).
Lemma 2.3[3]. Let D be a nonempty closed convex subset of a Hausdorff lineartopological space E and φ, ψ : D × D → R be the mappings satisfying the followingconditions:
(a) ψ(u, v) ≤ φ(u, v) for all u, v ∈ D and ψ(u, u) ≥ 0 for all u ∈ D;
(b) for each u ∈ D φ(u, .) is upper semicontinuous on D;
(c) for each v ∈ D, the set u ∈ D : ψ(u, v) < 0 is a convex set;
(d) there exists a nonempty compact set K ⊂ D and u0 ∈ K such that ψ(u0, y) < 0for all v ∈ D\K.
Then there exists v ∈ K such that φ(u, v) ≥ 0 for all u ∈ D.
Definition 2.9. Let N : Ω×H ×H → H and η : Ω×D×D → H∗ be the mappings.
6
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
191
(i) N is said to be random η-strongly monotone with respect to the first variable ifthere exists a measurable function st,N : Ω→ (0, 1) such that
〈Nt(u(t), .)−Nt(v(t), .), ηt(u(t), v(t))〉 ≥ st,N‖u(t)− v(t)‖2
for all u, v ∈ D, t ∈ Ω;
(ii) N is said to be randomly η-monotone with respect to the second variable if
〈Nt(., u(t))−Nt(., v(t)), ηt(u(t), v(t))〉 ≥ 0
for all u, v ∈ D and t ∈ Ω;
(iii) N is said to be randomly Lipschitz continuous if there exists a measurable map-ping δ : Ω→ (0, 1) such that
‖Nt(u(t), .)−Nt(v(t), .)‖ ≤ δt,N‖u(t)− v(t)‖ ∀ u, v ∈ D, t ∈ Ω;
(iv) N is said to be η-hemicontinuous with respect to A and T of the first and secondvariables if for any u, v ∈ D, the mapping g : [0, 1]→ (−∞,∞) defined by
g(t) = 〈Nt(α(t)u(t) + (1− α(t))v(t), α(t)u(t) + (1− α(t))v(t)), ηt(u(t), v(t))〉
is continuous at 0+;
(v) η is said to be randomly Lipschitz continuous with measurable mapping σ : Ω→(0, 1) such that
‖ηt(u(t), v(t))‖ ≤ σt,η‖u(t)− v(t)‖ ∀ u, v ∈ D, t ∈ Ω;
(v) η is said to be randomly strongly monotone with a measurable mapping µ : Ω→(0, 1) such that
〈u(t)− v(t), ηt(u(t), v(t))〉 ≥ µt,η‖u(t)− v(t)‖2 ∀ u(t), v(t) ∈ D, t ∈ Ω.
Definition 2.10. Let N : Ω ×H ×H → H, η : Ω ×D ×D → H∗ be the mappings.A random multivalued mapping A : Ω×H → CB(H) is said to be
(i) randomly monotone if
〈Nt(x(t), .)−Nt(y(t), .), ηt(u(t), v(t))〉 ≥ 0
for all x(t) ∈ A(t, u(t)), y(t) ∈ A(t, v(t)), u(t), v(t) ∈ H, t ∈ Ω;
7
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
192
(ii) A is said to be random τ -strong monotone with respect to the first variable of Nif there exists a measurable function τ : Ω→ (0,∞) such that
〈Nt(x(t), .)−Nt(y(t), .), ηt(u(t), v(t))〉 ≥ τt,N‖u(t)− v(t)‖2
for all x(t) ∈ A(t, u(t)), y(t) ∈ A(t, v(t)), u(t), v(t) ∈ H, t ∈ Ω.
Lemma 2.4. Let (Ω,Σ) be a measurable space and D be a nonempty convex subsetof a topological vector space. Let ϕ : Ω×D×D → (−∞,∞) be a real valued functionsuch that
(i) for each (v, u) ∈ D ×D, t→ ϕ(t, v, u) is measurable mapping;
(ii) for each (t, v) ∈ Ω×D, u→ ϕ(t, v, u) is continuous on each nonempty compactsubset of D;
(iii) for each (t, u) ∈ Ω×D, v → ϕ(t, v, u) is lower semicontinuous on each nonemptycompact subset of D;
(iv) for each t ∈ Ω, each nonempty finite set v1, v2, · · · , vn ⊂ D and for each
u =m∑i=1
αivi (αi ≥ 0,m∑i=1
αi = 1), min1≤i≤m
ϕ(t, vi, u) ≤ 0;
(v) for each t ∈ Ω, there exists a nonempty compact subset D0 of D and a nonemptycompact subset K of D such that for each u ∈ D\K there is a v ∈ co(D0 ∪ u)with ϕ(t, v, u) > 0.
Then there exists a measurable mapping u : Ω→ D such that ϕ(t, v, u(t)) ≤ 0 forall v ∈ D and t ∈ Ω.Definition 2.11. A random multivalued mapping T : Ω×H → CB(H) is said to berandomly H-Lipschitz continuous, if there exists a measurable function κ : Ω→ (0,∞)such that
H(T (t, u(t)), T (t, v(t))) ≤ κT‖u(t)− v(t)‖ ∀ u(t), v(t) ∈ H, t ∈ Ω.
3 Auxiliary Problem and Algorithm
Now we consider the following auxiliary problem with respect to the fuzziffied randomgeneralized nonlinear variational like inequality problem (2.1).
For any given measurable mapping u : Ω→ D, for measurable mapping v : Ω→ D,find measurable mapping w : Ω → D such that for all t ∈ Ω x(t) ∈ A(t, w(t)),y(t) ∈ T (t, w(t)) and
〈w(t), ηt(v(t), w(t))〉 ≥ 〈u(t), ηt(v(t), w(t))〉 − ρt〈Nt(x(t), y(t))− f, ηt(v(t), w(t))〉−ρta(w(t), v(t)− w(t))− ρtb(u(t), v(t)) + ρtb(u(t), w(t))(3.1)
8
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
193
where ρ : Ω→ (0,∞) is a measurable mapping.
Theorem 3.1. Let (Ω,Σ) be a measurable space, D be a nonempty convex closedsubset of H and f ∈ H. Let random fuzzy mappings A, T : Ω × H → F(H) satisfythe condition (S) and A and T , the random multivalued mappings induced by thefuzzy random mappings A and T respectively. Let N : Ω × H × H → H be themapping such that N is random η-hemicontinuous with respect to A and T in firstand second variables. Let η : Ω × D × D → H∗ be the random Lipschitz continuouswith a measurable function σ : Ω → (0, 1) and random η strongly monotone withrespect to the measurable mappings µ : Ω → (0, 1). For each v ∈ D, ηt(., v(t)) becontinuous and semi continuous in second variables and ηt(v(t), u(t)) = −ηt(u(t), v(t))for all u, v ∈ D, t ∈ Ω. Suppose a : D ×D → (−∞,+∞) satisfies (C1) and (C2). Letb : D ×D → (−∞,+∞] be a real valued function satisfying (C3).
(1) For each t ∈ Ω, the mappings A(t, .), T (t, .) are randomly H-Lipschitz continuouswith the measurable functions λ, κ : Ω→ (0, 1) respectively;
(2) the measurable mappings Nt(., .) is randomly Lipschitz continuous and randomlyη-strongly monotone with respect to the random multivalued mappings A in thefirst variable with the measurable functions δ, s : Ω → (0,+∞) respectively andN(., .) is randomly Lipschitz continuous and randomly η-relaxed monotone withrespect to the random multivalued mapping T in the second variable with themeasurable functions ξ, r : Ω→ (0,+∞) respectively.
Then the auxiliary problem (3.1) has a unique random solutions.Proof. For any fixed measurable mapping u : Ω → D, for any measurable mappingsv, w : Ω→ D, we define the functional φ, ψ : Ω×D ×D → (−∞,+∞] by
φt(v(t), w(t)) = 〈v(t), ηt(v(t), w(t))〉 − 〈u(t), ηt(v(t), w(t))〉+ ρt〈Nt(x1(t), y1(t))− f, ηt(v(t), w(t))〉+ ρta(v(t), v(t)− w(t))− ρtb(u(t), w(t)) + ρtb(u(t), v(t))
for all x1(t) ∈ A(t, v(t)), y1(t) ∈ T (t, v(t)) and
ψt(v(t), w(t)) = 〈w(t), ηt(v(t), w(t))〉 − 〈u(t), ηt(v(t), w(t))〉+ ρt〈Nt(x2(t), y2(t))− f, ηt(v(t), w(t))〉+ ρta(w(t), v(t)− w(t))− ρtb(u(t), w(t)) + ρtb(u(t), v(t)),
for all x2(t) ∈ A(t, w(t)), y2(t) ∈ T (t, w(t)).
Since A and T are random multivalued mappings induced by the fuzzy randommappings A and T respectively i.e., for each t ∈ Ω, u(t) ∈ D, A(t, u(t)) and T (t, u(t))are measurable mappings. From Lemma 2.4, for any fixed (v(t), u(t)) ∈ D × D, t →
9
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
194
ϕt(v(t), u(t)) is measurable. Now we verify the functional φ and ψ satisfy all conditionsof Lemma 2.3 in the weak topology. It is easy to see that for all v(t), w(t) ∈ D, t ∈ Ω,
φt(v(t), w(t))− ψt(v(t), w(t)) = 〈v(t)− w(t), ηt(v(t), w(t))〉+ ρt〈Nt(x1(t), y1(t))−Nt(x2(t), y1(t)), ηt(v(t), w(t))〉+ ρt〈Nt(x2(t), y1(t))−Nt(x2(t), y2(t)), ηt(v(t), w(t))〉+ ρta(v(t)− w(t), v(t)− w(t))
≥ [µt,η + ρt(st,NA,η− rt,NT ,η
+ dt)]‖v(t)− w(t)‖2 ≥ 0,
which implies that φt and ψt satisfy the condition (1) of Lemma 2.3. Given a is acoercive continuous bilinear from, therefore a(v(t), v(t) − w(t)) is weakly upper semicontinuous with respect to w(t). Since b is convex, lower semi continuous in the secondvariable. For any measurable mapping v : Ω→ D, the mapping u(t)→ ηt(u(t), v(t)) fort ∈ Ω is convex and upper semi continuous. Therefore φt(v(t), .) is weakly upper semicontinuous in the second variable and the set t ∈ Ω, v(t) ∈ D : ψt(v(t), w(t)) < 0is convex for each measurable mapping w : Ω → D. Therefore the Assumption (b)and (c) of Lemma 2.3, and (iv) of Lemma 2.4 hold. Let v : Ω → D be a measurablemapping. Assume
Lt = [µt,η + ρt(st,NA,η− rt,NT ,η
+ dt)]−1[σt,η‖u(t)− v(t)‖+ ρtet‖v(t)‖
+ ρtσt,η‖Nt(x1(t), y1(t))− f‖+ ρtγt‖u(t)‖]
andMt = t ∈ Ω, w(t) ∈ D : ‖w(t)− v(t)‖ ≤ Lt.
Since Mt is weakly compact subset of D and for any w(t) ⊆ D\M and x2(t) ∈A(t, w(t)), y2(t) ∈ T (t, w(t)), x1(t) ∈ A(t, v(t)), y1(t) ∈ T (t, v(t))
ψt(v(t), w(t)) = 〈w(t), ηt(v(t), w(t))〉 − 〈u(t), ηt(v(t), w(t))〉+ ρt〈Nt(x2(t), y2(t))− f, ηt(v(t), w(t))〉+ ρta(w(t), v(t)− w(t))− ρtb(u(t), w(t)) + ρtb(u(t), v(t))
≤ −〈w(t)− v(t), ηt(w(t), v(t))〉+ 〈u(t)− v(t), ηt(w(t), v(t))〉− ρt〈Nt(x2(t), y2(t))−Nt(x1(t), y2(t)), ηt(w(t), v(t))〉− ρt〈Nt(x1(t), y2(t))−Nt(x1(t), y1(t)), ηt(w(t), v(t))〉− ρt〈Nt(x1(t), y1(t))− f, ηt(w(t), v(t))〉 − ρta(w(t)− v(t), w(t)− v(t))
− ρta(v(t), w(t)− v(t)) + ρtb(u(t), v(t)− w(t))
≤ −‖w(t)− v(t)‖[µt,η + ρt(st,NA,η− rt,NT ,η
+ dt)]‖w(t)− v(t)‖− σt,η‖u(t)− v(t)‖ − ρtet‖v(t)‖ − ρtσt,η‖Nt(x1(t), y1(t))− f‖ − ρtγt‖u(t)‖< 0.
Hence condition (d) of Lemma 2.3 holds. By Lemma 2.3, for t ∈ Ω, there existsa measurable mapping w : Ω → D such that φt(u(t), w(t)) ≥ 0 for each measurablemapping u : Ω→ D.
10
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
195
We know that mapping Nt(., .) is random Lipschitz continuous in first and secondvariable and the mapping A(t, .), T (t, .) are random H-Lipschitz continuous. Based onLemma 2.1, for any measurable mapping v : Ω→ D, we obtain w : Ω→ D, there existx1(t) ∈ A(t, v(t)), y1(t) ∈ T (t, v(t)) such that
〈v(t), ηt(v(t), w(t))〉 ≥ 〈u(t), ηt(v(t), w(t))〉 − ρt〈Nt(x1(t), y1(t))− f, ηt(v(t), w(t))〉−ρta(v(t), v(t)− w(t))− ρtb(u(t), v(t)) + ρtb(u(t), w(t)) (3.2)
for each given measurable mappings u : Ω→ D.
Let β be in (0, 1] and a measurable point v : Ω → D. Replacing v(t) by vβ(t) =βv(t) + (1− β)w(t) in (3.2), we have
〈vβ(t), ηt(vβ(t), w(t))〉 ≥ 〈u(t), ηt(vβ(t), w(t))〉 − ρt〈Nt(xβ(t), yβ(t))− f,ηt(vβ(t), w(t))〉 − ρta(vβ(t), vβ(t)− w(t))
−ρtb(u(t), vβ(t)) + ρtb(u(t), w(t)) (3.3)
for all v(t) ∈ D, t ∈ Ω, for xβ(t) ∈ A(t, vβ(t)) and yβ(t) ∈ T (t, vβ(t)).
Since b is convex in the second variable, 〈Nt(x(t), y(t)), ηt(v(t), .)〉 is concave andupper semicontinuous. From (C6) and (3.3), we have
[〈vβ(t), ηt(v(t), w(t))〉] ≥ β[〈u(t), ηt(v(t), w(t))〉 − ρt〈Nt(xβ(t), yβ(t))− f,ηt(v(t), w(t))〉 − ρta(vβ(t), v(t)− w(t))− ρtb(u(t), v(t))
+ ρtb(u(t), w(t))] ∀ v(t) ∈ D, t ∈ Ω,
implies that
[〈vβ(t), ηt(v(t), w(t))〉] ≥ 〈u(t), ηt(v(t), w(t))〉 − ρt〈Nt(xβ(t), yβ(t))− f,ηt(v(t), w(t))〉 − ρta(vβ(t), v(t)− w(t))− ρtb(u(t), v(t))
+ ρtb(u(t), w(t)) ∀ v(t) ∈ D, t ∈ Ω,
where ρ : Ω→ (0, 1) is a measurable mapping.
Letting β → 0+ in the above inequality, thus
〈w(t), ηt(v(t), w(t))〉 ≥ 〈u(t), ηt(v(t), w(t))〉 − ρt〈Nt(x(t), y(t))− f, ηt(v(t), w(t))〉− ρta(w(t), v(t)− w(t))− ρtb(u(t), v(t)) + ρtb(u(t), w(t))
for all v(t) ∈ D, t ∈ Ω, x(t) ∈ A(t, w(t)) and y(t) ∈ T (t, w(t)).
This shows that for any t ∈ Ω and given each measurable mapping u : Ω → D,for each v : Ω → D measurable mapping, the measurable mapping w : Ω → D,x(t) ∈ A(t, w(t)), y(t) ∈ T (t, w(t)) is the random solution of the auxiliary problem(3.1).
11
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
196
We prove that for any t ∈ Ω, the measurable mapping t→ w(t), x(t) ∈ A(t, w(t)),y(t) ∈ T (t, w(t)) is unique random solutions of the auxiliary problem (3.1). Suppos-ing the measurable mapping w1(t), w2(t) ∈ D, x1(t) ∈ A(t, w1(t)), y1(t) ∈ T (t, w1(t)),x2(t) ∈ A(t, w2(t)), y2(t) ∈ T (t, w2(t)) are two random solutions of the auxiliary prob-lem (3.1), we have the conclusion that for all v : Ω→ D, t ∈ Ω
〈w1(t), ηt(v(t), w1(t))〉 ≥ 〈u(t), ηt(v(t), w1(t))〉 − ρt〈Nt(x1(t), y1(t))− f,ηt(v(t), w1(t))〉 − ρta(w1(t), v(t)− w1(t))
− ρtb(u(t), v(t)) + ρtb(u(t), w1(t)) (3.4)
and
〈w2(t), ηt(v(t), w2(t))〉 ≥ 〈u(t), ηt(v(t), w2(t))〉 − ρt〈Nt(x2(t), y2(t))− f,ηt(v(t), w2(t))〉 − ρta(w2(t), v(t)− w2(t))
− ρtb(u(t), v(t)) + ρtb(u(t), w2(t)). (3.5)
Putting v(t) = w2(t) in (3.4) and v(t) = w1(t) in (3.5), we have
〈w1(t), ηt(w2(t), w1(t))〉 ≥ 〈u(t), ηt(w2(t), w1(t))〉 − ρt〈Nt(x1(t), y1(t))− f,ηt(w2(t), w1(t))〉 − ρta(w1(t), w2(t)− w1(t))
− ρtb(u(t), w2(t)) + ρtb(u(t), w1(t))
and
〈w2(t), ηt(w1(t), w2(t))〉 ≥ 〈u(t), ηt(w1(t), w2(t))〉 − ρt〈Nt(x2(t), y2(t))− f,ηt(w1(t), w2(t))〉 − ρta(w2(t), w1(t)− w2(t))
− ρtb(u(t), w1(t)) + ρtb(u(t), w2(t)).
〈w1(t)− w2(t), ηt(w1(t), w2(t))〉 ≤ −ρt〈Nt(x1(t), y1(t))−Nt(x2(t), y1(t)),
ηt(w1(t), w2(t))〉 − ρt〈Nt(x2(t), y1(t))
−Nt(x2(t), y2(t)), ηt(w1(t), w2(t))〉− ρta(w1(t)− w2(t), w1(t)− w2(t)).
Noting that N(., .) is random η-strongly monotone with respect to random mul-tivalued mapping A in first variable with measurable function st : Ω → (0,+∞) andrandom η-relaxed monotone with respect to the random multivalued mapping T in thesecond argument with r : Ω→ (0,+∞), a(., .) a coercive we have
µt‖w1(t)− w2(t)‖2 ≤ −ρt(rt,NT ,η+ st,NA,η
+ dt)‖w1(t)− w2(t)‖2 ≤ 0
which yield that w1(t) = w2(t).
Further let x1(t) ∈ A(t, w1(t)), y1(t) ∈ T (t, w1(t)), x2(t) ∈ A(t, w2(t)), y2(t) ∈T (t, w2(t)) by Lemma 2.2, we get
‖x1(t)− x2(t)‖ ≤ (1 + ε)H(A(t, w1(t)), A(t, w2(t))) ≤ (1 + ε)λt,HA‖w1(t)− w2(t)‖
12
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
197
‖y1(t)− y2(t)‖ ≤ (1 + ε)H(T (t, w1(t)), T (t, w2(t))) ≤ (1 + ε)κt,HT‖w1(t)− w2(t)‖.
So we get x1(t) = x2(t) and y1(t) = y2(t), which imply that for any t ∈ Ω and themeasurable mapping u : Ω → D, the measurable mapping w, x, y : Ω → D such thatt ∈ Ω, x(t) ∈ A(t, w(t)), y(t) ∈ T (t, w(t)) is a unique random solutions of the auxiliaryproblem (3.1).
4 Existence and Convergence Analysis
In this section, we first construct an algorithm for solving the fuzziffied random general-ized nonlinear variational like inequality (2.1). Then we prove the existence of solutionsfor the fuzziffied random generalized nonlinear variational like inequalities (2.1) andalso discuss the convergence of the sequence generated by the Algorithm 4.1. FromTheorem 3.1, we suggest the following algorithm for the fuzziffied random generalizednonlinear variational like inequalities (2.1).
Algorithm 4.1. Suppose that a : D × D → (−∞,∞) satisfies (C1) − (C2), b :D×D → (−∞,∞) satisfies (C3)− (C6), N : Ω×H×H → H, η : Ω×D×D → H∗ aremappings and f ∈ H. For any given measurable mapping u0 : Ω→ D by Lemma 2.1,the multivalued mappings A(., u0(.)), T (., u0(.)) : Ω × H → CB(H) are measurable,hence there exist measurable selection x0 : Ω → D of A(., u0(.)) and y0 : Ω → D ofT (., u0(.)). From Theorem 3.1 for given each measurable mapping v : Ω → D, thereexists measurable mapping u1 : Ω → D, the measurable selection x1 : Ω → D ofA(., u1(.)) and y1 : Ω→ D of T (., u1(.)) such that for all t ∈ Ω,
〈u1(t), ηt(v(t), u1(t))〉 ≥ 〈u0(t), ηt(v(t), u1(t))〉 − ρt〈Nt(x1(t), y1(t))− f,ηt(v(t), u1(t))〉 − ρta(u1(t), v(t)− u1(t))− ρtb(u0(t), v(t))
+ ρtb(u0(t), u1(t)) + 〈e0(t), ηt(v(t), u1(t))〉
and‖x1(t)− x0(t)‖ ≤ (1 + 1)H(A(t, u1(t)), A(t, u0(t)))
‖y1(t)− y0(t)‖ ≤ (1 + 1)H(T (t, u1(t)), T (t, u0(t))).
Continuing the above process inductively, we can define the following randomiterative sequences un(t) and xn(t) and yn(t) for solving problem (2.1) as follows:
〈un+1(t), ηt(v(t), un+1(t))〉 ≥ 〈un(t), ηt(v(t), un+1(t))〉 − ρt〈Nt(xn+1(t), yn+1(t))− f,ηt(v(t), un+1(t))〉 − ρta(un+1(t), v(t)− un+1(t))− ρtb(un(t), v(t))
+ ρtb(un(t), un+1(t)) + 〈en(t), ηt(v(t), un+1(t))〉,
xn+1(t) ∈ A(t, un+1(t)), yn+1(t) ∈ T (t, un+1(t)),
‖xn+1(t)− xn(t)‖ ≤ (1 + (1 + n)−1)H(A(t, un+1(t)), A(t, un(t))),
‖yn+1(t)− yn(t)‖ ≤ (1 + (1 + n)−1)H(T (t, un+1(t)), T (t, un(t))), (4.1)
13
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
198
for n ≥ 0, where en(t)n≥0 ⊂ H and ρ : Ω→ (0,∞) is measurable mapping.
Theorem 4.1. Let (Ω,Σ) be a measurable space and D be a nonempty closed convexsubset of H and f ∈ H. Let the measurable mapping η : Ω×D ×D → D be randomstrongly η monotone and random Lipschitz continuous with the measurable functionsµ, σ : Ω→ (0,+∞) respectively. Let the measurable function b : D×D → (−∞,+∞]be a real valued function satisfy (C3) − (C6). Suppose a : D × D → (−∞,+∞)satisfy (C1) and (C2). Suppose A, T : Ω×H → F(H) be two random fuzzy mappingssatisfying the condition (S). Let A, T : Ω × H → CB(H) be random H-Lipschitzcontinuous multivalued mappings induced by A and T respectively. The measurablefunction N is randomly Lipschitz continuous and random strongly monotone in thefirst variable with respect to the random multivalued mapping A with the measurablefunctions δ, s : Ω → (0,+∞) respectively. Nt(., .) is randomly Lipschitz continuousand random relaxed monotone with respect to the random multivalued mappings Tin the second variable with measurable functions ξ, r : Ω → (0,+∞) respectivelytoo. Suppose that A and T are Lipschitz H-continuous with λHA
, κHT: Ω → (0, 1)
respectively and
(δtλt,HA+ ξtκt,HT
) > st,NA, qt =
γt − dtσt
, pt =µtσt, lim
n→∞‖en(t)‖ = 0. (4.2)
If there exists any measurable function ρ : Ω→ (0,+∞) satisfying
0 < ρt <µt
γt − dt(4.3)
and one of the following conditions:∣∣∣∣∣ρt − st,NA− rt,NT
− qtpt(δtλt,HA
+ ξtκt,HT)2 − q2t
∣∣∣∣∣<
√(st,NA
− rt,NT− qtpt)2 − ((λt,HA
δt + ξtκt,HT)2 − q2t )(1− p2t )
(δtλt,HA+ ξtκt,HT
)2 − q2t(4.4)
(δtλt,HA+ ξtκt,HT
) > qt,
|st,NA− rt,NT
− qtpt| >√
((δtλt,HA+ ξtκt,HT
)2 − q2t )(1− p2t ),
pt < 1, (4.5)∣∣∣∣∣ρt − rt,NT− qtpt − st,NA
q2t − (δtλt,HA+ ξtκt,HT
)2
∣∣∣∣∣<
√(st,NA
− rt,NT− qtpt)2 + (q2t − (δtλt,HA
+ ξtκt,HT)2)(1− p2t )
q2t − (δtλt,HA+ ξtκt,HT
)2
14
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
199
(δtλt,HA+ ξtκt,HT
) < qt.
Then there exist measurable mappings u, x, y : Ω → D such that for all t ∈ Ω,x(t) ∈ A(t, u(t)), y(t) ∈ T (t, u(t)) has a unique solutions of (2.1). Moreover therandom iterative sequences un(t)n≥0, xn(t)n≥0 and yn(t)n≥0 obtained by randomAlgorithm 4.1 converges to u(t), x(t) and y(t), respectively.
Proof. From the proof of Theorem 3.1, for each t ∈ Ω and the measurable mappingu : Ω → D, there exists a unique solution w (i.e., u(t) ∈ D, x(t) ∈ A(t, u(t)), y(t) ∈T (t, u(t))) satisfying the auxiliary problem (3.1). Defining a random mapping G :Ω×D → D satisfying Gt(u(t)) = w(t) (i.e. u(t)→ w(u(t)) where w(t) (i.e. u(t) ∈ D,x(t) ∈ A(t, u(t)), y(t) ∈ T (t, u(t)))) is the unique solution of (3.1). Now we will provethat the random mapping G is a contraction mapping. Let any u1(t) and u2(t) in D,there exists unique w1(t) = Gt(u1(t)), w2(t) = Gt(u2(t)) for all v(t) ∈ D and t ∈ Ω,such that
〈Gt(u1(t)), ηt(v(t), Gt(u1(t)))〉 ≥ 〈u1(t), ηt(v(t), Gt(u1(t)))〉 − ρt〈Nt(x1(t), y1(t))
− f, ηt(v(t), Gt(u1(t)))〉 − ρta(Gt(u1(t)), v(t)
−Gt(u1(t)))− ρtb(u1(t), v(t))
+ ρtb(u1(t), Gt(u1(t))), (4.6)
for all x1(t) ∈ A(t, u1(t)) and y1(t) ∈ T (t, u1(t)) and
〈Gt(u2(t)), ηt(v(t), Gt(u2(t)))〉 ≥ 〈u2(t), ηt(v(t), Gt(u2(t)))〉 − ρt〈Nt(x2(t), y2(t))
− f, ηt(v(t), Gt(u2(t)))〉 − ρta(Gt(u2(t)), v(t)
−Gt(u2(t)))− ρtb(u2(t), v(t))
+ ρtb(u2(t), Gt(u2(t))), (4.7)
for all x2(t) ∈ A(t, u2(t)) and y2(t) ∈ T (t, u2(t)) for all t ∈ Ω. Taking v(t) = Gt(u2(t))in (4.6) and v(t) = Gt(u1(t)) in (4.7) and adding these inequalities with ηt(u(t), v(t)) =−ηt(v(t), v(t)) and the assumption of b(., .), we arrive at
µt,η‖Gt(u1(t))−Gt(u2(t))‖2
≤ 〈Gt(u1(t))−Gt(u2(t)), ηt(Gt(u1(t)), Gt(u2(t)))〉≤ 〈u1(t)− u2(t)− ρt(Nt(x1(t), y1(t))
−Nt(x2(t), y2(t))), ηt(Gt(u1(t)), Gt(u2(t))〉− ρta(Gt(u1(t))−Gt(u2(t)), Gt(u1(t))−Gt(u2(t)))
+ ρtb(u1(t)− u2(t), Gt(u2(t))−Gt(u1(t)))
≤ ‖u1(t)− u2(t)− ρt(Nt(x1(t), y1(t))
−Nt(x2(t), y2(t)))‖‖ηt(Gt(u1(t)), Gt(u2(t)))‖− ρtdt‖Gt(u1(t))−Gt(u2(t))‖2
+ ρtγt‖u1(t)− u2(t)‖‖Gt(u1(t))−Gt(u2(t))‖. (4.8)
15
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
200
Now from the random Lipschitz H-continuity of N both variables and strongrandom monotonicity of N with first variable and random relaxed monotonicity of Nwith second variables, we have
16
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
201
‖u1(t)−u2(t)−ρt(Nt(x1(t), y1(t))−Nt(x2(t), y2(t)))‖2
= ‖u1(t)− u2(t)‖2 − 2ρt〈Nt(x1(t), y1(t))−Nt(x2(t), y2(t)), u1(t)− u2(t)〉+ ρ2t‖Nt(x1(t), y1(t))−Nt(x2(t), y2(t))‖2
≤ ‖u1(t)− u2(t)‖2 − 2ρt〈Nt(x1(t), y1(t))−Nt(x2(t), y1(t)), u1(t)− u2(t)〉− 2ρt〈Nt(x2(t), y1(t))−Nt(x2(t), y2(t)), u1(t)− u2(t)〉
+ ρ2t
[‖Nt(x1(t), y1(t))−Nt(x2(t), y1(t))‖+ ‖Nt(x2(t), y1(t))−Nt(x2(t), y2(t))‖
]2≤ ‖u1(t)− u2(t)‖2 − 2ρtst,NA
‖u1(t)− u2(t)‖2 + 2ρtrt,NT‖u1(t)− u2(t)‖2
+ ρ2t
[δt‖x1(t)− x2(t)‖+ ξt‖y1(t)− y2(t)‖
]2≤[1− 2ρt(st,NA
− rt,NT)]‖u1(t)− u2(t)‖2
+ ρ2t
[δtH(A(t, u1(t)), A(t, u2(t))) + ξtH(T (t, u1(t)), T (t, u2(t)))
]2≤[1− 2ρt(st,NA
− rt,NT)]‖u1(t)− u2(t)‖2
+ ρ2t
[δtλt,HA
‖u1(t)− u2(t)‖+ ξtκt,HT‖u1(t)− u2(t)‖
]2≤[1− 2ρt(st,NA
− rt,NT) + ρ2t (δtλt,HA
+ ξtκt,HT)2]‖u1(t)− u2(t)‖2. (4.9)
From (4.8) and (4.9), we get
µt‖Gt(u1(t))−Gt(u2(t))‖2
≤[σt√
1− 2ρt(st,NA− rt,NT
) + ρ2t (δtλt,HA+ ξtκt,HT
)2 + ρtγt
]‖u1(t)− u2(t)‖
‖Gt(u1(t))−Gt(u2(t))‖ − ρtdt‖Gt(u1(t))−Gt(u2(t))‖2,that is
‖Gt(u1(t))−Gt(u2(t))‖ ≤ θ(t)‖u1(t)− u2(t)‖,
where
θ(t) =σt√
1− 2ρt(st,NA− rt,NT
) + ρ2t (δtλt,HA+ ξtκt,HT
)2 + ρtγt
µt + ρtdt< 1. (4.10)
By (4.3), and one of (4.4) and (4.5), therefore G : Ω × D → D is a contractionmapping. Hence there exists a unique point u(t) ∈ D such that u(t) = Gt(u(t)) andfor each measurable mapping v : Ω→ D,
〈u(t), ηt(v(t), u(t))〉 ≥ 〈u(t), ηt(v(t), u(t))〉 − ρt〈Nt(x(t), y(t))
− f, ηt(v(t), u(t))〉 − ρta(u(t), v(t)− u(t))
− ρtb(u(t), v(t)) + ρtb(u(t), u(t)), (4.11)
17
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
202
where ρ : Ω→ (0, 1) is a measurable mapping, which implies that
〈Nt(x(t), y(t))− f, ηt(v(t), u(t))〉+ a(u(t), v(t)− u(t)) ≥ b(u(t), u(t))− b(u(t), v(t)),
for all v(t) ∈ D, that is u(t) ∈ D, x(t) ∈ A(t, u(t)), y(t) ∈ T (t, u(t)) is the uniquerandom solutions of the problem (2.1).
Next we consider the convergence of random iterative sequence generated by Al-gorithm 4.1. Taking v(t) = un+1(t) in (4.11) and v(t) = un(t) in (4.1) and adding theseinequalities we have
µt‖un+1(t)− un(t)‖2 ≤ 〈un+1(t)− un(t), ηt(un+1(t), un(t))〉≤ 〈un+1(t)− un(t)− ρt(Nt(xn+1(t), yn+1(t))
−Nt(xn(t), yn(t))), ηt(un+1(t), un(t))〉− ρta(un+1(t)− un(t), un+1(t)− un(t))
+ ρtb(un+1(t)− un(t), un(t)− un+1(t))
+ 〈en(t), ηt(un+1(t), un(t))〉
≤[σt√
1− 2ρt(st,NA− rt,NT
) + ρ2t (δtλt,HA+ ξtκt,HT
)2 + ρtγt]‖un+1(t)− un(t)‖
‖un+1(t)− un(t)‖ − ρtdt‖un+1(t)− un(t)‖2 + ‖en(t)‖‖un+1(t)− un(t)‖, ∀ n ≥ 1.
That is‖un+1(t)− un(t)‖ ≤ θn(t)‖un−1(t)− un(t)‖+ ‖en(t)‖ (4.12)
where
θn(t) =σt√
1− 2ρt(st,NA− rt,NT
) + ρ2t (δtλt,HA+ ξtκt,HT
)2(1 + n−1)2 + ρtγt
µt + ρtdt.
Let
θ(t) =σt√
1− 2ρt(st,NA− rt,NT
) + ρ2t (δtλt,HA+ ξtκt,HT
)2 + ρtγt
µt + ρtdt, ∀ t ∈ Ω.
We know that for each t ∈ Ω, θn(t) → θ(t) and ‖en(t)‖ → 0 as n → ∞. ByCondition (4.2), it follows that θ(t) ∈ (0, 1) and hence (4.12) implies that un(t) isa Cauchy sequence in D. Since D is complete, there exists a measurable mappingu : Ω→ D such that un(t)→ u(t) as n→∞.
Further, from Algorithm 4.1, we have
‖xn+1(t)− xn(t)‖ ≤ λt,HA
(1 +
1
n
)‖un+1(t)− un(t)‖
‖yn+1(t)− yn(t)‖ ≤ κt,HT
(1 +
1
n
)‖un+1(t)− un(t)‖,
18
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
203
which implies that xn(t), yn(t) are also Cauchy sequences in H. Let xn(t)→ x(t),yn(t)→ y(t), n→∞. Since un(t), xn(t) and yn(t) are sequences of measurablemappings, we know that u, x, y : Ω → H are measurable. Now we prove that x(t) ∈A(t, u(t)) and y(t) ∈ T (t, u(t)) for any t ∈ Ω, we have
d(x(t), A(t, u(t)) = inf‖x(t)− z‖ : z ∈ A(t, u(t))≤ ‖x(t)− xn(t)‖+ d(xn(t), A(t, u(t)))
≤ ‖x(t)− xn(t)‖+ H(A(t, un(t)), A(t, u(t)))
≤ ‖x(t)− xn(t)‖+ λt,HA‖un(t)− u(t)‖ → 0.
Hence, x(t) ∈ A(t, u(t)), for all t ∈ Ω. Similarly, we can prove that y(t) ∈T (t, u(t)). So we have
〈Nt(x(t), y(t))− f, η(v(t), u(t))〉+ a(u(t), v(t)− u(t)) ≤ b(u(t), u(t))− b(u(t), v(t)),
for all v(t) ∈ D, t ∈ Ω. This completes the proof.
References
[1] R. Ahmad and A.P. Farajzadeh, On random variational inclusions with randomfuzzy mappings and random relaxed cocoercive mappings, Fuzzy Sets and Systems160 (2009), 3166–3174.
[2] S.S. Chang, Fixed Point Theory with Applications, Chongging Publishing House,Chongging, 1984.
[3] S.S. Chang, Variational Inequality and Complementarity Problem Theory withApplication, Shanghai Scientific and Tech. Literature Publishing House, Shanghai,1991.
[4] S.S. Chang, and Y.G. Zhu, On variational inequalities for fuzzy mappings, FuzzySets and Systems 32 (1989), 359–367.
[5] S.S. Chang and N.J. Huang, On variational inequalities for fuzzy mappings, FuzzySets and Systems 32 (1989), 356–367.
[6] Cheng-Feng Hu, Solving variational inequalities in a fuzzy environment, J. Math.Anal. Appl. 249 (2000), 527–538.
[7] Y.J. Cho and H.Y. Lan, Generalized nonlinear random (A, η)-accretive equationswith random relaxed cocoercive mappings in Banach spaces, Comput. Math. Appl.55(9) (2008), 2173–2182.
19
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
204
[8] P. Cubiotti, Existence of solutions for lower semicontinuous quasi equilibriumproblems, Comput. Math. Appl. 30 (1995), 11–22.
[9] H.X. Dai, Generalized mixed variational-like inequality for random fuzzy mappings,J. Computational and Applied Mathematics 224 (2009), 20–28.
[10] X.P. Ding, Algorithm of solutions for mixed implicit quasi-variational inequalitieswith fuzzy mappings, Comput. Math. Appl. 38(5-6) (1999), 231–249.
[11] X.P. Ding and Y.J. Park, A new class of generalized nonlinear implicit quasi-variational inclusions with fuzzy mappings, J. Comput. Appl. Math. 138 (2002),243–257.
[12] X.P. Ding, Algorithm of solutions for mixed nonlinear variational like inequalitiesin reflexive Banach spaces, Appl. Math. Mech. 19(6) (1998), 521–529.
[13] X.P. Ding, Existence and uniqueness of solutions for random mixed variational-like inequalities in Banach spaces, J. Sichuan Normal Univ. Nat. Sci. 20 (1997),1–5.
[14] X.P. Ding, Existence and algorithm of solutions for nonlinear mixed variational-like inequalities in Banach spaces, J. Comput. Appl. Math. 157 (2003), 419–434.
[15] X.P. Ding and K.K. Tan, A minimax inequality with applications to existence ofequilibrium point and fixed point theorems, Colloq. Math. 63 (1992), 233–247.
[16] R. Glowinski, J.L. Lions and R. Tremolieres, Numerical Analysis of VariationalInequalities, North-Holland, Amsterdam, 1981.
[17] N.J. Huang and H.Y. Lan, A couple of nonlinear equations with fuzzy normedspaces, Fuzzy Sets and Systems 152 (2005), 209–222.
[18] N.J. Huang, Random generalized nonlinear variational inclusions for random fuzzymappings, Fuzzy Sets and Systems 105(1999), 437–444.
[19] N.J. Huang and C.X. Ding, Auxiliary principle and iterative algorithms for gen-eralized set-valued strongly nonlinear mixed variational like inequalities, J. Math.Anal. Appl. 256 (2001), 345–359.
[20] N.J. Huang and Y.J. Cho, Random completely generalized set-valued implicitquasi-variational inequalities, Positivity 3 (1999), 201–213.
[21] M.F. Khan and Salahuddin, Completely generalized nonlinear random variationalinclusions, South East Asian Bulletin of Mathematics 30(5) (2006), 261–276.
[22] H.Y. Lan and R.U. Verma, Iterative algorithms for nonlinear fuzzy variational in-clusions systems with (A, η)-accretive mappings in Banach spaces, Adv. NonlinearVar. Inequal. 11(1) (2008), 15–30.
20
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
205
[23] H.Y. Lan, Projection iterative approximations for a new class of general randomimplicit quasi-variational inequalities, J. Inequal. Appl. 17 (2006), (Art. 1081261).
[24] G.M. Lee, D.S. Kim and B.S. Lee, Strongly quasi-variational inequalities for fuzzymappings, Fuzzy Sets and Systems 78 (1996), 381–386.
[25] B.S. Lee, M.F. Khan and Salahuddin, Fuzzy generalized nonlinear mixed randomvariational like inclusions, Pacific J. Optim. (2010).
[26] Z. Liu, H. Gao, S.M. Kang and S.H. Kim, Auxiliary principle for generalizednonlinear variational like inequalities, (in Press).
[27] Z. Liu and S.M. Kang, Comments on the papers involving variational and quasi-variational inequalities for fuzzy mappings, Math. Sci. Res. J. 7(10) (2003), 394–399.
[28] Z. Liu and S.M. Kang, Convergence and stability of perturbed three step iterativealgorithm for completely generalized nonlinear quasi-variational inequalities, Appl.Math. Comput. 149 (2004), 245–258.
[29] M.A. Noor, Variational inequalities with fuzzy mappings (I), Fuzzy Sets and Sys-tems 55 (1989), 309–314.
[30] P.D. Panagiotopoulos and G.E. Stavroulakis, New type of variational principlesbased on the notion of quasi differentiability, Acta. Math. 94 (1992), 171–194.
[31] J. Parida and A. Sen, A variational-like inequalities for multi functions with ap-plications, J. Math. Anal. Appl. 124 (1987), 73–81.
[32] G. Tian, Generalized quasi-variational inequality problem, Math. Oper. Res. 18(1993), 752–764.
[33] H.F. Wang and H.L. Liao, Variational inequalities with fuzzy convex cone, J.Global Optim. 14(4) (1999), 395–414.
[34] J.C. Yao, Existence of generalized variational inequalities, Oper. Res. Lett. 15(1994), 35–40.
[35] L.A. Zadeh, Fuzzy sets, Inform. Control 8 (1965), 338–353.
[36] H.J. Zimmermann, Fuzzy Set Theory and its Applications, 2nd Edition KluwerAcademic, Dordrecht, 1991.
21
ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES
206
Spaces of DLp type and a convolution product
associated with a singular second order
differential operator
M.DziriDepartment of Mathematics, Faculty of Sciences of Tunis
2092 Elmanar 2, Tunis, [email protected]
M.JelassiDepartment of Mathematics, College of Sciences, Al Jouf University
Al Jouf 2014, Saudi [email protected]
L.T.RachdiDepartment of Mathematics, Faculty of Sciences of Tunis
2092 Elmanar 2, Tunis, [email protected]
May 11, 2011
Abstract We define and study the spaces Mρ,p, 1 ≤ p ≤ ∞, that are ofDLp-type. Using the harmonic analysis associated with a singular second orderdifferential operator, we give new characterization of the dual space M′
ρ,p andwe describe its bounded subsets. Next, we define the convolution product inM′
ρ,p ×Mρ,r, 1 ≤ r ≤ p <∞ and we prove some new results.
Keywords: DLp type, convolution product, differential operator.2000 MSC codes: 43-xx, 46-Exx.
1 Introduction
The spaces DLp ; 1 ≤ p ≤ ∞, have been studied by many authors ([1], [2], [3],[4], [9]). In this paper, we consider the second order differential operator definedon ]0,+∞[, by
∆u = u′′ +A′
Au′ + ρ2u,
1
207
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,207-232,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC
where A is a non negative function satisfying some conditions and ρ is a nonnegative real number.
This operator plays an important role in Mathematical Analysis. For ex-ample, many special functions (orthogonal polynomials) are eigenfunctions ofoperator of ∆ type. The radial part of the Laplacian-Beltrami on symmetricspace is also of ∆ type.
The operator ∆ has been studied by many authors and from many pointsof view ( see [5],[8] [13], [14], [16], [17]). In particular, in [5] and [14] manyproperties of harmonic analysis related to the operator ∆ have been studied(translation operators, convolution product, Fourier transform...).
In this work, we introduce the function spaces Mρ,p, 1 ≤ p ≤ ∞, similar toDLp , but replacing the usual derivatives by the operator ∆.
The main result of this paper consists to give a new characterization of thedual space M′
ρ,p of the space Mρ,p and a description of its bounded subsets.More precisely, in the first section, we recall some harmonic analysis resultsrelated to the convolution product and the Fourier transform connected withthe differential operator ∆, that we use in the next sections.
In the second section, we define the space Mρ,p, 1 ≤ p ≤ ∞, to be the setof measurable functions f on [0,+∞[ such that for all k ∈ N;∆kf belongs tothe space Lp(dν) (the space of measurable functions on [0,+∞[ of pth powerintegrable on [0,+∞[ with respect to the measure dν(x) = A(x)dx). We givesome properties of this space, in particular we prove that it is a Frechet space.
The third section is consecrated to the study of the dual space M′ρ,p. We
give a nice description of the elements of this space and we characterize itsbounded subsets.
In the last section, we define and study the convolution product in M′ρ,p ×
Mρ,r, 1 ≤ r ≤ p <∞, where Mρ,r is the closure of the space D∗(R) ( the spaceof even infinitely differentiable functions on R, with compact support ) in Mρ,r.
2 The operator ∆
In this section, we define and recall some properties of the harmonic analysisrelated to the operator ∆, defined on ]0,+∞[, by
∆u = u′′ +A′
Au′ + ρ2u,
where
A(x) = x2α+1B(x); α >−12, (2.1)
and B is a positive even infinitely differentiable function on R, withB(0) = 1.We assume that the functions A and B satisfy the following conditions
i) A is increasing, and limx→+∞
A(x) = +∞.
2
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
208
ii)A′
Ais decreasing, and lim
x→+∞
A′(x)A(x)
= 2ρ.
iii) there exists a constant δ > 0, satisfyingB
′(x)
B(x)= 2ρ− 2α+1
x + e−δxF (x), forρ > 0
B′(x)
B(x)= e−δxF (x) , forρ = 0
where F is C∞ on ]0,∞[, bounded together with its derivatives on all interval[x0,∞[, x0 > 0.
This operator has been studied by many authors ([6],[8],[14]). In particular,the following results have been established :For all λ ∈ C, the equation
∆u = −λ2uu(0) = 1, u′(0) = 0 (2.2)
admits a unique solution denoted by ϕλ.The function ϕλ satisfies the following properties :
• product formula
∀x, y > 0; ϕλ(x)ϕλ(y) =∫ ∞
0
ϕλ(z)w(x, y, z)A(z)dz (2.3)
where w(x, y, .) is a measurable positive function on [0,+∞[, with supportin [|x− y|, x+ y], satisfying
•∫ ∞
0
w(x, y, z)A(z)dz = 1
• ∀z > 0; w(x, y, z) = w(y, x, z)
• ∀z>0; w(x, y, z) = w(x, z, y)
• ∀x > 0, the function
λ 7−→ ϕλ(x)
is analytic on C.
• ∀λ ≥ 0 and x ∈ R |ϕλ(x)| ≤ 1.
• ∀λ ∈ C, the function
x 7−→ ϕλ(x)
3
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
209
is even infinitely differentiable on R, and for all k ∈ N there exist mk ∈ Nand cA,k > 0 such that
∀x ∈ R;∣∣∣∣( ddx )k(ϕλ(x))
∣∣∣∣ 6 cA,k(1 + x2)λ2mkϕ0(x). (2.4)
• For ρ > 0, and from ([13], p.99) we have
∀x ≥ 0,∀λ ∈ R, |ϕλ(x)| ≤ ϕ0(x) ≤ m(1 + x)exp(−ρx), (2.5)
where m is a positive constant.
• We have the integral representation of Mehler type,
∀x > 0,∀λ ∈ CI , ϕλ(x) =∫ x
0
k(x, t) cos(λt)dt, (2.6)
where k(x, .) is an even positive C∞ function on ]− x, x[, with support in[−x, x]. Also, for all λ ∈ C, λ 6= 0, the equation
∆u = −λ2u
has a solution Φλ, satisfying
Φλ(x) = A−12 (x) exp (iλx)V (x, λ),
with
limx→+∞
V (x, λ) = 1.
Consequently there exists a function (spectral function)
λ 7−→ c(λ),
such that,
∀λ ∈ C, λ 6= 0; ϕλ = c(λ)Φλ + c(−λ)Φ−λ.
The function
λ −→ c(λ)
satisfies the following property
• For λ ∈ R ,we have c(−λ) = c(λ).
• The function |c(λ)|−2 is continuous on [0,+∞[ .
• there exist positive constants k1, k2, and k3, such that∀λ ∈ C, Imλ 6 0, |λ| > k3;
k1 |λ|α+1/2 6 |c(λ)|−1 6 k2 |λ|α+1/2. (2.7)
4
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
210
We denote by
• dν(x) the measure defined on [0,+∞[, by
dν(x) = A(x)dx
• Lp(dν), 1 6 p 6 +∞; the space of measurable functions on [0,+∞[, satis-fying
‖f‖p,ν =(∫ +∞
0
|f(x)|p dν(x))1/p
< +∞; 1 6 p < +∞
‖f‖∞,ν = ess sup |f(x)| < +∞;x∈[0,+∞[
p = +∞
• dγ(λ) the measure defined on [0,+∞[, by
dγ(λ) =dλ
2π |c(λ)|2
• Lp(dγ), 1 6 p 6 +∞; the space of measurable functions on [0,+∞[, satis-fying
‖f‖p,γ =(∫ +∞
0
|f(λ)|p dγ(λ))1/p
< +∞; 1 6 p < +∞
‖f‖∞,γ = ess sup |f(λ)| < +∞;λ∈[0,+∞[
p = +∞
Definition 2.1 i) The translation operator associated with the operator ∆is defined on L1(dν), by
∀x, y > 0; Txf(y) =∫ +∞
0
f(z)w(x, y, z)dν(z)
where w is the function defined by the relation (2.3).
ii) The convolution product, associated with the operator ∆ of f, g ∈ L1(dν)is defined by
f ∗ g(x) =∫ +∞
0
Txf(y)g(y)dν(y).
We have the following properties
• Txϕλ(y) = ϕλ(x)ϕλ(y)
• If f ∈ Lp(dν), 1 6 p 6 +∞; then for all x ∈ [0,+∞[, the function Txfbelongs to Lp(dν), and we have
‖Txf‖p,ν 6 ‖f‖p,ν .
5
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
211
• Let p, q, r ∈ [1,∞] such that 1/r = 1/p+ (1/q)− 1. If f ∈ Lp(dν) andg ∈ Lq(dν) then the function f ∗ g ∈ Lr(dν) and we have
‖f ∗ g‖r,ν 6 ‖f‖p,ν ‖g‖q,ν . (2.8)
Definition 2.2 The Fourier transform associated with the operator ∆ is definedon L1(dν), by
∀λ ∈ R; Ff(λ) =∫ +∞
0
f(x)ϕλ(x)dν(x).
We have the following properties• For f ∈ L1(dν), such that Ff ∈ L1(dγ), we have the inversion formula forF : for almost every x ∈ [0,+∞[,
f(x) = F−1(Ff)(x) (2.9)
where F−1 is the application defined on L1(dγ) by
F−1(g)(x) =∫ +∞
0
g(λ)ϕλ(x)dγ(λ). (2.10)
• Let f be in L1(dν). For all x ∈ [0,+∞[, we have
∀λ ∈ R; F(Txf)(λ) = ϕλ(x)Ff(λ).
• For f, g ∈ L1(dν), we have
∀λ ∈ R, F(f ∗ g)(λ) = Ff(λ)Fg(λ).
• The Fourier transform F , can be extended to an isometric isomorphism fromL2(dν) onto L2(dγ). This means that
∀f ∈ L2(dν); ‖Ff‖2,γ = ‖f‖2,ν . (2.11)
∀f ∈ L2(dγ);∥∥F−1f
∥∥2,ν
= ‖f‖2,γ . (2.12)
• For all f ∈ D∗(R) we have
F(f) = F0 t χ(f) (2.13)
where F0 is the usual Fourier transform on D∗(R) defined by
F0(f)(λ) =2π
∫ ∞
0
f(x) cos(λx)dx and tχ is the generalized Weyl transform as-
sociated with ∆, given by
tχ(f)(x) =∫ ∞
x
k(y, x)f(y)A(y)dy
( see [14]).
6
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
212
Proposition 2.1 Let p ∈ [1, 2], f ∈ Lp(dν) and g ∈ Lp(dγ). Then Ff ∈Lp
′(dγ), F−1(g) ∈ Lp′(dν) and we have
‖Ff‖p′,γ 6 ‖f‖p,ν ;∥∥F−1g
∥∥p′,ν
6 ‖g‖p,γ
with p′ = pp−1 .
This result is an immediate consequence of the Riesz-Thorin theorem ([10], [11]).
We denote by• E∗(R) the space of even infinitely differentiable functions on R.• S∗(R) the subspace of E∗(R) , consisting of functions f rapidly decreasingtogether with their derivatives.• S2
∗(R) = ϕ0S∗(R), where ϕ0 is the eigenfunction of the operator ∆ associatedwith the value λ = 0. For ρ = 0 the space S2
∗(R) is S∗(R).• D′∗(R), S′∗(R) and (S2
∗)′(R) are respectively the dual spaces of D∗(R), S∗(R)
and S2∗(R).
From [13], the Fourier transform F is a topological isomorphism from S2∗(R)
onto S∗(R). The inverse mapping is given by the relation (2.10).
Definition 2.3 The Fourier transform F is defined on (S2∗)′(R) by
< F(T ), ϕ >=< T,F−1(ϕ) >, ϕ ∈ S∗(R).
Then F is an isomorphism from (S2∗)′(R) onto S′∗(R).
3 The space Mρ,p
We denote by
• For f ∈ Lp(dν), p ∈ [1,∞], Tf is the element of D′∗(R) defined by
< Tf , ϕ >=∫ ∞
0
f(x)ϕ(x)dν(x), ϕ ∈ D∗(R).
• For g ∈ Lp(dγ), p ∈ [1,∞], Tg is the element of S′∗(R) defined by
< Tg, ψ >=∫ ∞
0
g(λ)ψ(λ)dγ(λ), ψ ∈ S∗(R).
Remark 3.1
i) Using the relation (2.5) and the fact that A(x) ∼ exp(2ρx) (x→ +∞) forρ > 0, we deduce that for all p ∈ [1, 2],Lp(dν) ⊂ (S2
∗)′(R).
7
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
213
ii) From proposition 2.1, we deduce that for all f ∈ Lp(dν), 1 ≤ p ≤ 2;Ff belongs to the space Lp
′(dγ) and we have
F(Tf ) = TF(f) (3.1)
Definition 3.1 Let p ∈ [1,∞]. We define Mρ,p to be the set of even measurablefunctions f on R such that for all k ∈ N there exists gk ∈ Lp(dν) satisfying
∆kTf = Tgk (3.2)
in D′∗(R),
where, for all T ∈ D′∗(R) (resp.(S2∗)′(R)),
< ∆T, ϕ >=< T,∆ϕ >; ϕ ∈ D∗(R) (resp.S2∗(R)).
The space Mρ,p is equipped with the topology generated by the family ofnorms
γm,p(f) = max0≤k≤m
‖gk‖p,ν , m ∈ N,
where gk, k ∈ N, is the function given by the relation (3.2).Let
dp : Mρ,p ×Mρ,p → [0,∞[
(f, g) 7→ dp(f, g) =∞∑m=0
12m
γm,p(f − g)1 + γm,p(f − g)
.
Then dp is a distance on Mρ,p. Moreover the sequence (fk)k∈N converges to0 in (Mρ,p, dp) if and only if
∀ m ∈ N; γm,p (fk) → 0k→∞
In the following, we will give some properties of the space Mρ,p.
Proposition 3.1 (Mρ,p, dp) is a Frechet space.
Proof. Let (fn)n∈N be a Cauchy sequence in (Mρ,p, dp) and (gn,k)k∈N ⊂ Lp(dν)such that
∆kTfn = Tgn,k , k ∈ N. (3.3)
Then for all k ∈ N, (gn,k)n∈N is a Cauchy sequence in Lp(dν).We put
f = g0 = limn→∞
fn
andgk = lim
n→∞gn,k, k ∈ N∗,
8
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
214
in Lp(dν). Thus
∀ k ∈ N ; Tgn,k → Tgkn→∞
(3.4)
in D′∗(R). Since ∆ is a continuous operator from D′∗(R) into itself, we deducethat
∆kTfn → ∆kTfn→∞
,
in D′∗(R).
From the relations (3.3) and (3.4), we deduce that
∀ k ∈ N ; ∆kTf = Tgk .
This proves that f ∈Mρ,p and
fn → fn→∞
,
in (Mρ,p, dp).
Proposition 3.2 Let p ∈ [1, 2] and f ∈Mρ,p. Then
i) For all k ∈ N, the function
λ→ (1 + λ2)kF(f)(λ)
belongs to the space Lp′(dγ), with p′ =
p
p− 1.
ii) Mρ,p ∩ C∗(R) ⊂ E∗(R), where C∗(R) is the space of even continuous func-tions on R .
Proof. i) Let f ∈Mρ,p, 1 ≤ p ≤ 2, and gk ∈ Lp(dν) such that
∆kTf = Tgk k ∈ NI .
From the relation (3.1), we have
F(Tgk) = TF(gk),
which givesF(∆kTf ) = TF(gk)
On the other hand
F(∆kTf ) = λ2kF(Tf ) (3.5)
= Tλ2kF(f)
9
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
215
henceλ2kF(f) = F(gk)
this equality, together with the fact that the function F(gk) belongs to the spaceLp
′(dγ) implies i).ii) Let f ∈ Mρ,p ∩ C∗(R). From the assertion i), we deduce that F(f) ∈
L1(dγ) ∩ L2(dγ).On the other hand, the transform F is an isometric isomorphism from L2(dν)
onto L2(dγ), then from the inversion formula for F and using the continuity ofthe function f , we have
∀x ∈ R; f(x) =∫ +∞
0
Ff(λ)ϕλ(x)dγ(λ). (3.6)
Consequently, ii) follows from the relation (2.4) and the fact that for all k ∈ N,,the function
λ→ λkFf(λ)
belongs to the space L1(dγ).
Proposition 3.3 Let p ∈ [1, 2], then, for all r ∈ [2,∞],
Mρ,p ∩ C∗(R) ⊂Mρ,r.
Proof. Let f ∈Mρ,p ∩ C∗(R), p ∈ [1, 2], r ≥ 2 and r′ =r
r − 1.
From the proposition 3.2, we deduce that f ∈ E∗(R) and that for all k ∈ N, thefunction
λ→ λ2kF(f)(λ)
belongs to the space Lp′(dγ). By applying Holder’s inequality it follows that
this last function belongs to the space Lr′(dγ). On the other hand, from the
relation (3.6), we deduce that
∀ x ∈ R, ∆kf(x) =∫ ∞
0
(−λ2)kF(f)(λ)ϕλ(x)dγ(λ)
= F−1((−λ2)kF(f))(x),
Consequently, from proposition 2.1 it follows that for all k ∈ N, the function∆kf belongs to the space Lr(dν).
4 The Dual spaceM′ρ,p
In this section we will give a new characterization of the dual space M′ρ,p of
Mρ,p. It is clear that for every f ∈ Mρ,p, the family Vm,p,ε(f),m ∈ N, ε > 0is a basic of neighborhoods of f in (Mρ,p, dp), where
Vm,p,ε(f) = g ∈Mρ,p, γm,p(f − g) < ε.
10
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
216
In addition, T ∈M′ρ,p if and only if there exist m ∈ NI and c > 0 such that
∀ f ∈Mρ,p; | < T, f > | ≤ cγm,p(f). (4.1)
For f ∈ Lp′(dν) and ψ ∈Mρ,p, we put
< ∆k(Tf ), ψ >=∫ ∞
0
f(x)ψk(x)dν(x) (4.2)
with Tψk = ∆kTψ. Then
| < ∆k(Tf ), ϕ > | ≤ ‖f‖p′,ν‖ψk‖p,ν≤ ‖f‖p′,νγk,p(ψ)
this proves that for all f ∈ Lp′(dν) and k ∈ N, the functional ∆kTf defined bythe relation (4.2) belongs to the space M′
ρ,p.
In the following, we shall prove that every element of M′ρ,p is also of this
type.
Theorem 4.1 Let T ∈ D′∗(R). Then T belongs to M′ρ,p, 1 ≤ p < ∞, if and
only if there exist m ∈ N and f0, ..., fm ⊂ Lp′(dν) such that
T =m∑k=0
∆kTfk (4.3)
where ∆kTfk is given by the relation (4.2).
Proof. It is clear that if
T =m∑k=0
∆kTfk ; f0, ..., fm ⊂ Lp′(dν)
then T belongs to the space M′ρ,p.
Conversely, suppose that T ∈ M′ρ,p. From the relation (4.1) there exist
m ∈ N and c > 0 such that
∀ ϕ ∈Mρ,p, | < T,ϕ > | ≤ cγm,p(ϕ)
Let(Lp(dν))m+1 = (f0, ..., fm), fk ∈ Lp(dν), 0 ≤ k ≤ m
equipped with the norm
‖(f0, ..., fm)‖(Lp(dν))m+1 = max0≤k≤m
‖fk‖p,ν
Now, we consider the mappings
A : Mρ,p → (Lp(dν))m+1
11
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
217
ϕ 7→ (ϕ, g1, ..., gm)
where∆kTϕ = Tgk , k ≥ 1
andB : Im(A) → C
B(Aϕ) =< T,ϕ > .
From the relation (4.1) we deduce that
|BA(ϕ)| = | < T,ϕ > |≤ c ‖A(ϕ)‖(Lp(dν))m+1
this means that B is a continuous functional on the subspace Im(A) of the space(Lp(dν))m+1. From Hahn Banach theorem’s there exists a continuous extensionof B to (Lp(dν))m+1, denoted again by B.By Riez’s theorem there exist (f0, ..., fm) ∈ (Lp
′(dν))m+1 such that
∀ (ϕ0, ..., ϕm) ∈ (Lp(dν))m+1,
B(ϕ0, ..., ϕm) =m∑k=0
∫ ∞
0
fk(x)ϕk(x)dν(x).
By means of the relation (4.2), we deduce that for ϕ ∈Mρ,p, we have
< T,ϕ >=m∑k=0
∫ ∞
0
fk(x)ϕk(x)dν(x)
=m∑k=0
< ∆kTfk , ϕ > .
This completes the proof of the theorem 4.1.
Proposition 4.1 Let p ≥ 2. Then for all T ∈ M′ρ,p, T ∈ (S2
∗)′(R) and there
exist m ∈ N and F ∈ Lp(dγ) such that
F(T ) = T(1+λ2)mF
Proof. Let T ∈M′ρ,p. From the theorem 4.1 there existm ∈ N and (f0, ..., fm) ∈
(Lp′(dν))m+1, p′ =
p
p− 1, such that
T =m∑k=0
∆kTfk .
From the remark 3.1 i) and the fact that the operator ∆ is continuous from(S2∗)′(R) into itself, we deduce that T belongs to (S2
∗)′(R). Consequently, by
virtue of the relation (3.5), we have
F(T ) = T(1+λ2)mF ,
12
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
218
where
F =m∑k=0
λ2k
(1 + λ2)mF(fk)
which proves the result.
Proposition 4.2 Let T ∈ D′∗(R), then T ∈M′ρ,2 if and and only if there exist
m ∈ NI and F ∈ L2(dγ) such that
F(T ) = T(1+λ2)mF
Proof. From the proposition 4.1, we deduce that if T ∈ M′ρ,2 then there exist
m ∈ N and F ∈ L2(dγ) verifying
F(T ) = T(1+λ2)mF .
Conversely, suppose thatF(T ) = T(1+λ2)mF ,
with F ∈ L2(dγ). Since F is an isometric isomorphism from L2(dν) onto L2(dγ),then there exists G ∈ L2(dν) such that F(G) = F and from the relation (3.1)we have
F(TG) = TF .
ConsequentlyF(T ) = F((I −∆)mTG)
thus
T =m∑k=0
(−1)kCkm∆kTG
and the theorem 4.1 implies that T belongs to M′ρ,2.
For a > 0, we denote by• D∗,a(R) the subspace of D∗(R) consisting of function f such that suppf ⊂[−a, a].• D′∗,a(R) the dual space of D∗,a(R).• Wm
a (R), m ∈ N the space of function f : R → C, of class C2m on R, even andwith support in [−a, a], normed by
Qm,a(f) = max0≤k≤m
‖∆k(f)‖∞,ν .
Lemma 4.1 For all m ∈ N, there exists s0 ∈ N such that for all s ≥ s0, thefunction gs defined by
∀ x ∈ R ; gs(x) = F−1(1
(1 + λ2)s)(x).
is even, of class C2m on R and infinitely differentiable on R\0.
13
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
219
Proof. Let m ∈ N. From the relations (2.4) and (2.10), we deduce that thereexists s0 ∈ N, sufficiently large such that for s ≥ s0, the functions gs and
fs = F0(1
(1 + λ2)s) are of class C2m on R.
In the following we shall prove that for s ≥ s0, the function gs is infinitelydifferentiable on R\0.
Let ψ ∈ S∗(R); ψ ≥ 0 and∫
Rψ(x)dx = 1.Then,
limn→+∞
fs ∗ ψn = fs
in L2(R,dx), where ψn(x) = nψ(nx) and ∗ is the usual convolution producton R.
Now, we take k = E(α) + 2. Since s is sufficiently large, then for every j ∈ N,0 ≤ j ≤ 2k, the function f (j)
s belongs to L2(R, dx) and
limn→+∞
f (j)s ∗ ψn = (fs ∗ ψn)(j) = f (j)
s (4.4)
in L2(R,dx).Consequently
∀j ∈ N, 0 ≤ j ≤ k; limn→+∞
λ2jF0(fs ∗ ψn) =2π
λ2j
(1 + λ2)s(4.5)
in L2(R,dx).Using the relations (2.7) and (4.5), we deduce that
limn→+∞
F0(fs ∗ ψn) =2π
1(1 + λ2)s
in L2(dγ), and the relations (2.12); (2.13) lead to
2πgs = lim
n→+∞(tχ)−1(fs ∗ ψn) in L2(dν). (4.6)
Let [a, b] ⊂]0,∞[ and θ ∈ D∗(R) such that θ(x) = 1 if x ∈ [−a4,a
4]
supp(θ) ⊂]−a2,a
2[.
and ϕ an infinitely differentiable function on R such thatϕ(x) = 1 if x ∈ [a,b]suppϕ ⊂ ]
a2,b + 1[
using the relation (4.4), we deduce that
limn→+∞
((1− θ)(fs ∗ ψn))(2k) = ((1− θ)fs)(2k)
14
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
220
in L2(R,dx), and by the same way as before, we have
limn→+∞
(tχ)−1((1− θ)(fs ∗ ψn)) = F−1(F0((1− θ)fs) (4.7)
in L2(dν). However, using the expression of (tχ)−1 (see[14]) and the relation(4.6) we get
2πϕgs = lim
n→+∞ϕ(tχ)−1((1− θ)(fs ∗ ψn)) in L2(dν). (4.8)
On the other hand, by a standart calculus, for all s ≥ s0, we have
fs(x) = e−|x|Ps(|x|),
where, Ps is a real polynomial; which implies that the function (1−θ)fs belongsto S∗(R) .Since, F0 is an isomorphism from S∗(R) onto itself and F is an isomorphismfrom S2
∗(R) onto S∗(R), we deduce that the function F−1(F0(fs(1−θ))) belongsto S2
∗(R) .Hence, the relations (4.7) and (4.8) lead to
2πϕgs = ϕF−1(F0(fs(1− θ)))
this shows that the function gs is infinitely differentiable on all interval [a, b] ⊂]0,∞[ and by parity it is infinitely differentiable on R \ 0.
Proposition 4.3 Let a > 0 and m ∈ N. Then there exists so ∈ N such that forevery s ∈ N, s ≥ so, we can find ψs ∈ Wm
a (R) and Fs ∈ D∗,a(R) satisfying
δ = (I −∆)sTψs + TFs
in D′∗(R).
Proof. From lemma 4.1 there exists so ∈ N such that for every s ∈ N, s ≥ so,the function gs is of class C2m on R, and we have
(I −∆)sTgs = δ.
Let h ∈ D∗,a(R), satisfying
∀x ∈ [−a2,a
2]; h(x) = 1.
Then,h(I −∆)sTgs = δ.
On the other hand, the lemma 4.1 involves that for every s ≥ so, the function
Fs(x) = (h− 1)(I −∆)sgs + (I −∆)s((1− h)gs) (4.9)
15
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
221
belongs to the space D∗,a(R).Moreover, we have
T(h−1)(I−∆)sgs = (h− 1)(I −∆)sTgs = 0
and this implies, by using the relation (4.9) that
TFs = T(I−∆)s((1−h)gs)
= (I −∆)sT((1−h)gs).
Hence,TFs + (I −∆)sThgs = (I −∆)sTgs = δ.
We complete the proof of the proposition by taking ψs = hgs .
For f ∈ D∗,a(R), a > 0, we denote by
• Pm(f) = max0≤k≤m
‖( ddx )kf‖∞,ν
• Np,m(f) = max0≤k≤m
‖∆k(f)‖p,ν , p ∈ [1,∞].
Lemma 4.2 Let p ∈ [1,∞]. For all m ∈ N, there exist c > 0 and m′ ∈ N suchthat
∀ϕ ∈ D∗,a(R), Pm(ϕ) ≤ cNp,m′(ϕ).
Proof. The case p = ∞ is proved in [6], then for all m ∈ N, there exist c > 0and m′ ∈ N such that for all 0 ≤ k ≤ m, we have
‖( ddx
)kϕ‖∞,ν ≤ c max0≤k≤m′
‖∆kϕ‖∞,ν (4.10)
On the other hand, from the inversion formula for F , we have
∆kϕ(x) =∫ ∞
0
F(∆kϕ)(λ)ϕλ(x)dγ(λ)
=∫ ∞
0
(−λ2)kF(ϕ)(λ)ϕλ(x)dγ(λ)
Now, from the relation (2.7), it follows that∫ ∞
0
dγ(λ)(1 + λ2)α+2
<∞.
This involves that
‖∆kϕ‖∞,ν ≤ c‖(1 + λ2)k+E(α)+3F(ϕ)‖∞,γ≤ c‖F((I −∆)k+E(α)+3ϕ)‖∞,γ
16
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
222
≤ c‖(I −∆)k+E(α)+3ϕ‖1,ν (4.11)
According to the relation (4.10) and (4.11), we deduce that for every k; 0 ≤k ≤ m;
‖( ddx
)kϕ‖∞,ν ≤ cmN1,m′+E(α)+3(ϕ),
where cm = c 2m′+E(α)+3. Hence,
Pm(ϕ) ≤ cmN1,m′+E(α)+3(ϕ). (4.12)
For p ∈]1,∞[, the result follows by using Holder’s inequality and the relation(4.12).
Theorem 4.2 Let a > 0 and B′ a weakly* bounded set of D′∗,a(R). Then, thereexists m ∈ N such that the elements of B′ can be continuously extended toWma (R). Moreover, the family of these extensions is equicontinuous.
Proof. Let p ∈ [1,∞]. Since B′ is weakly* bounded in D′∗,a(R), then from [12]and lemma 4.2 there exist a positive constant c and m ∈ N such that∀ T ∈ B′, ∀ϕ ∈ D∗,a(R),
| < T,ϕ > | ≤ cNp,m(ϕ) (4.13)
Let’s consider the mappings
A : Wma (R) → (Lp(dν))m+1
ϕ 7→ (∆kϕ)0≤k≤m
and for all T ∈ B′,LT : A(D∗,a(R)) → C
< LT ,Aϕ >=< T,ϕ > .
From the relation (4.13), we deduce that∀ϕ ∈ D∗,a(R),
| < LT ,Aϕ > | ≤ c‖ϕ‖(Lp(dν))m+1
this means that LT is a continuous functional on the subspace A(D∗,a(R)) ofthe space (Lp(dν))m+1 and that for all T ∈ B′
‖LT ‖(D∗,a(R)) = sup‖Aϕ‖(Lp(dν))m+1≤1
| < LT ,Aϕ > | ≤ c
From the Hahn Banach theorem’s, LT can be continuously extended on (Lp(dν))m+1
denoted again by LT . Furthermore, for all T ∈ B′
‖LT ‖(Lp(dν))m+1 = sup‖ψ‖(Lp(dν))m+1≤1
| < LT , ψ > |
17
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
223
= ‖LT ‖A(D∗,a(R)) ≤ c (4.14)
Now, from the Riez’s theorem, there exists (fT,k)0≤k≤m ⊂ Lp′(dν) such that
∀ψ = (ψ0, ..., ψm) ∈ (Lp(dν))m+1,
< LT , ψ >=m∑k=0
∫ ∞
0
fT,k(x)ψk(x)dν
with‖LT ‖(Lp(dν))m+1 = max
0≤k≤m‖fT,k‖p′,ν .
Thus, from (4.14) it follows that∀T ∈ B′, ∀ 0 ≤ k ≤ m
‖fT,k‖p′,ν ≤ c. (4.15)
In particular, for ϕ ∈ Wma (R) we have
< LT ,Aϕ >=m∑k=0
∫ ∞
0
fT,k(x)∆k(ϕ)(x)dν(x)
using Holder inequality and the relation (4.15), we get∀T ∈ B′, ∀ ϕ ∈ Wm
a (R);
| < LT ,Aϕ > | ≤ (m+ 1)c[ν(B(0, a))]1/p‖ϕ‖Wma (R)
this shows that the mapping LT oA is a continuous extension of T on Wma (R)
and that the family LT oAT∈B′ is equicontinuous, when applied to Wma (R).
This completes the proof of the theorem 4.2.
In the following, we will give a new characterization of the space M′ρ,p.
Theorem 4.3 Let T ∈ D′∗(R). Then for p ∈ [1,∞[ and p′ = pp−1 , T belongs to
M′ρ,p if and only if for every ϕ ∈ D∗(R), the function T ∗ϕ belongs to the space
Lp′(dν), where
T ∗ ϕ(x) =< T, Txϕ > .
Proof. Let T ∈M′ρ,p. From the theorem 4.1 there exist m ∈ N and f0, ..., fm ∈
Lp′(dν) such that
T =m∑k=0
∆k(Tfk),
in M′ρ,p. Thus, for every ϕ ∈ D∗(R)
T ∗ ϕ =m∑k=0
Tfk ∗∆kϕ
=m∑k=0
fk ∗∆kϕ
18
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
224
Since, for all k ∈ N, 0 ≤ k ≤ m, fk ∈ Lp′(dν) and ∆kϕ ∈ L1(dν), then we
deduce that fk ∗∆kϕ ∈ Lp′(dν). This implies that the function T ∗ ϕ belongs
to the space Lp′(dν).
Conversely, let T ∈ D′∗(R) such that for every ϕ ∈ D∗(R) the function T ∗ϕbelongs to the space Lp
′(dν). For ϕ, ψ in D∗(R), we have
< TT∗ϕ, ψ > = < T,ϕ ∗ ψ >= < T,ψ ∗ ϕ >= < TT∗ψ, ϕ >
From Holder inequality and using the hypothesis we obtain
| < TT∗ϕ, ψ > | ≤ ‖T ∗ ψ‖p′,ν‖ϕ‖p,ν ,
from which, we deduce that the set
B′ = TT∗ϕ, ϕ ∈ D∗(R); ‖ϕ‖p,ν ≤ 1
is bounded in D′∗(R).Now, using the theorem 4.2, it follows that for all a > 0 there exists m ∈ N
such that for all ϕ ∈ D∗(R); ‖ϕ‖p,ν ≤ 1, the mapping TT∗ϕ can be continuouslyextended on the space Wm
a (R) and the family of these extensions is equicontin-uous, which means that there exists c > 0 such that∀ϕ ∈ D∗(R); ‖ϕ‖p,ν ≤ 1, ∀ψ ∈ Wm
a (R)
| < TT∗ϕ, ψ > | ≤ c‖ψ‖Wma (R).
This involves that∀ϕ ∈ D∗(R); ∀ψ ∈ Wm
a (R)
| < TT∗ϕ, ψ > | ≤ c‖ψ‖Wma (R)‖ϕ‖p,ν . (4.16)
On the other hand, we have∀ϕ ∈ D∗(R), ∀ψ ∈ Wm
a (R)
< TT∗ϕ, ψ >=< T ∗ Tψ, ϕ > (4.17)
where, for all ϕ ∈ D∗(R)
< T ∗ Tψ, ϕ > = < T, Tψ ∗ ϕ >= < T,ψ ∗ ϕ > .
The relations (4.16) and (4.17) lead to∀ϕ ∈ D∗(R),
| < T ∗ Tψ, ϕ > | ≤ c‖ψ‖Wma (R)‖ϕ‖p,ν
this last inequality shows that the functional T ∗Tψ can be continuously extendedon the space Lp(dν) and from Riez’s theorem there existsg ∈ Lp′(dν) such that
T ∗ Tψ = Tg (4.18)
19
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
225
Furthermore, from the proposition 4.3 , there exist s ∈ N, ψs ∈ Wma (R) and
ϕs ∈ D?,a(R) satisfying
δ = (I −∆)sTψs + Tϕs
then
T = (I −∆)s(T ∗ Tψs) + T ∗ Tϕs
= (I −∆)s(T ∗ Tψs) + TT∗ϕs . (4.19)
We complete the proof by using the hypothesis, the relations (4.18), (4.19) andthe theorem 4.1.
In the following, we will give a characterization of the bounded sets in M′ρ,p.
Theorem 4.4 Let p ∈ [1,∞[ and B′ a subset of M′ρ,p. The following assertions
are equivalent.
i) B′ is weakly bounded in M′ρ,p.
ii) There exist c > 0 and m ∈ N such that for every T ∈ B′ we can findf0,T , ..., fm,T ⊂ Lp
′(dν) satisfying
T =m∑k=0
∆kTfk with max0≤k≤m
‖fk‖p′,ν ≤ c
iii) For every ϕ ∈ D∗(R), the set T ∗ ϕT∈B′ is bounded in Lp′(dν).
Proof. 1) Suppose that B′ is weakly* bounded in M′ρ,p, then from [12] B′ is
equicontinuous. There exist c > 0 and m ∈ N such that
∀ T ∈ B′, ∀ f ∈Mρ,p, | < T, f > | ≤ cγm,p(f). (4.20)
As in the proof of the theorem 4.2, we consider the mappings
A : Mρ,p → (Lp(dν))m+1
f 7→ (f, g1, ..., gm),
with∆kTf = Tgk ; 0 ≤ k ≤ m
and for all T ∈ B′,LT : A(Mρ,p) → C
< LT ,A(f) >=< T, f > .
Then, the relation (4.20) implies that∀ϕ ∈Mρ,p,
|LT (Aϕ)| ≤ c‖Aϕ‖(Lp(dν))m+1 .
20
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
226
Using Hahn Banach’s theorem and Riez’s theorem, we deduce that LT can becontinuously extended on (Lp(dν))m+1, denoted again by LT , and that thereexists (fT,k)0≤k≤m ⊂ Lp
′(dν) verifying
∀ψ = (ψ0, ..., ψm) ∈ (Lp(dν))m+1,
< LT , ψ >=m∑k=0
∫ ∞
0
fT,k(x)ψk(x)dν(x)
with‖LT ‖(Lp(dν))m+1 = max
0≤k≤m‖fT,k‖p′,ν ≤ c.
In particular, if ψ = A(f), f ∈Mρ,p,
< LT ,A(f) >=< T, f >=m∑k=0
< ∆kTfT,k , f >
this proves that i) implies ii).2) Suppose that there exist c > 0 and m ∈ N such that for every T ∈ B′ we
can find f0,T , ..., fm,T ⊂ Lp′(dν) satisfying
∀T ∈ B′, T =m∑k=0
∆kTfT,k and max0≤k≤m
‖fT,k‖p′,ν ≤ c
then∀ f ∈Mρ,p, ∀T ∈ B′
< T, f >=m∑k=0
∫ ∞
0
fT,k(x)gk(x)dν(x)
consequently,∀T ∈ B′, ∀ f ∈Mρ,p,
| < T, f > | ≤ (m+ 1)cγm,p(f)
which means that the set B′ is weakly* bounded in M′ρ,p and proves that ii)
implies i).3) Suppose that ii) holds. Let ϕ ∈ D∗(R), then from theorem 4.3 we know
that for all T ∈ B′ the function T ∗ ϕ belongs to the space Lp′(dν). But
T ∗ ϕ =m∑k=0
Tfk ∗∆kϕ
consequently,∀T ∈ B′,
‖T ∗ ϕ‖p′,ν ≤ (m+ 1)cγm,p(ϕ).
Which shows that the set T ∗ ϕT∈B′ is bounded in Lp′(dν) and therefore ii)
involves iii).
21
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
227
4) Suppose that iii) holds. Let T ∈ B′, for all ϕ, ψ ∈ D∗(R), we have
| < TT∗ϕ, ψ > | = | < TT∗ψ, ϕ > |≤ ‖T ∗ ψ‖p′,ν‖ϕ‖p,ν
from which, we deduce that the set
B′ = TT∗ϕ, T ∈ B′, ϕ ∈ D∗(R); ‖ϕ‖p,ν ≤ 1
is bounded in D′∗(R).Now, using the theorem 4.2, it follows that for all a > 0 there exists m ∈ N
such that for all ϕ ∈ D∗(R); ‖ϕ‖p,ν ≤ 1, and T ∈ B′, the mapping TT∗ϕ can becontinuously extended on the space Wm
a (R) and the family of these extensionsis equicontinuous, which means that there exists c > 0 satisfying∀T ∈ B′, ∀ϕ ∈ D∗(R); ∀ψ ∈ Wm
a (R)
| < TT∗ϕ, ψ > | ≤ c‖ψ‖Wma (R)‖ϕ‖p,ν (4.21)
On the other hand, for every T ∈ B′, we have∀ϕ ∈ D∗(R), ∀ψ ∈ Wm
a (R)
< TT∗ϕ, ψ >=< T ∗ Tψ, ϕ > (4.22)
from the relations (4.21) and (4.22) we deduce that the functional T ∗ Tψ canbe continuously extended on the space Lp(dν) and from Riez’s theorem thereexist gT,ψ ∈ Lp
′(dν) such that
T ∗ Tψ = TgT,ψ (4.23)
However, the relations (4.21) and (4.23) involve that∀T ∈ B′,
‖gT,ψ‖p′,ν ≤ c‖ψ‖Wma (R) (4.24)
By using the proposition 4.3, it follows that there exist s ∈ N,ψs ∈ Wm
a (R) and ϕs ∈ D∗,a(R) verifying, for all T ∈ B′,
T = T ∗ δ = (I −∆)s(T ∗ Tψs) + TT∗ϕs
and by the relation (4.23) we get
T = (I −∆)sTgT,s + TT∗ϕs
thus, from the hypothesis, we obtain,
∀T ∈ B′, ‖T ∗ ϕs‖p′,ν ≤ cs,
and using the relation (4.24), we have
∀T ∈ B′, ‖gT,s‖p′,ν ≤ c‖ϕs‖Wma (R)
this completes the proof.
22
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
228
5 Convolution product on the space M′ρ,p ×Mρ,r
In this section, we define and study the convolution product on the spaceM′ρ,p×
Mρ,r, 1 ≤ r ≤ p <∞, where Mρ,r is the closure of the space D∗(R) in Mρ,r.
Proposition 5.1 Let p ∈ [1,∞[. For every x ∈ [0,∞[, the operator Tx given bythe definition 2.1 i), is a continuous mapping from Mρ,p into itself.
Proof. Let f ∈Mρ,p and gk ∈ Lp(dν) such that
Tgk = ∆kTf , k ∈ N
then,∀ϕ ∈ D∗(R);
< ∆kTTxf , ϕ >=< TTxgk , ϕ > .
Since the operator Tx is continuous from Lp(dν) into itself, we deduce thatfor all f ∈Mρ,p and x ∈ [0,∞[, the function Txf belongs to the space Mρ,p.Moreover,
γm,p(Txf) = max0≤k≤m
‖Txgk‖p,ν
≤ max0≤k≤m
‖gk‖p,ν = γm,p(f)
which shows that the operator Tx is continuous from Mρ,p into itself.
Definition 5.1 The convolution product of T ∈M′ρ,p and f ∈Mρ,p is defined
by∀x ∈ [0,∞[
T ∗ f(x) =< T, Txf > .
Let T ∈ M′ρ,p; T =
m∑k=0
∆kTfk with fk0≤k≤m ⊂ Lp′(dν) and φ ∈ Mρ,r, 1 ≤
r ≤ p, then for all k ∈ N there exists φk ∈ Lr(dν) such that
Tφk = ∆kTφ.
It follows that for 0 ≤ k ≤ m the function fk ∗ φk belongs to the space Lq(dν)
with,1q
=1r
+1p′− 1 =
1r− 1p
and by using the density of D∗(R) in Mρ,r, we de-
duce that the expressionm∑k=0
fk ∗ φk is independent of the sequence fk0≤k≤m.
Then, we put
T ∗ φ =m∑k=0
fk ∗ φk. (5.1)
This allows us to say that
M′ρ,p ∗Mρ,r ⊂ Lq(dν). (5.2)
23
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
229
Lemma 5.1 Let 1 ≤ r ≤ p <∞, T ∈M′ρ,p and φ ∈ Mρ,r. Then, for all k ∈ N
∆kTT∗φ = TT∗φk
withTφk = ∆kTφ.
Proof. If φ ∈ D∗(R), then the function T ∗ φ is infinitely differentiable and wehave
∆k(TT∗φ) = T∆k(T∗φ) = TT∗∆kφ
therefore, the result follows from the density of D∗(R) in Mρ,r.
Proposition 5.2 Let 1 ≤ r ≤ p <∞ and q ∈ [1,∞] such that
1q
=1r− 1p
then for every T ∈M′ρ,p, the mapping
φ→ T ∗ φ
is continuous from Mρ,r into Mρ,q.
Proof. Let T ∈ M′ρ,p; T =
m∑k=0
∆kTfk with fk0≤k≤m ⊂ Lp′(dν) then for
φ ∈ Mρ,r, 1 ≤ r ≤ p,
T ∗ φ =m∑k=0
fk ∗ φk
where φk ∈ Lr(dν) andTφk = ∆kTφ.
From the lemma 5.1, we have∀ s ∈ N, ∀φ ∈ Mρ,r
∆sTT∗φ = TT∗φs
using the relation (5.2), we deduce that the function T ∗ φ belongs to the spaceMρ,q.
On the other hand, from the relation (5.1), we obtain
γl,q(T ∗ φ) = max0≤s≤l
‖T ∗ φs‖q,ν
But
T ∗ φs =m∑k=0
fk ∗ φk+s
24
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
230
consequently,
‖T ∗ φs‖q,ν ≤m∑k=0
‖fk‖p′,ν‖φk+s‖r,ν
≤( m∑k=0
‖fk‖p′,ν)γm+l,r(φ).
Hence,
γl,q(T ∗ φ) ≤( m∑k=0
‖fk‖p′,ν)γm+l,r(φ)
which proves the result.
Definition 5.2 Let 1 ≤ p, q, r <∞ such that
1q
=1r− 1p.
The convolution product of T ∈M′ρ,p and S ∈M′
ρ,q is defined by∀φ ∈ Aρ,r
< S ∗ T, φ >=< S, T ∗ φ > .
From this definition and the proposition 5.2 we deduce the following result
Proposition 5.3 Let 1 ≤ p, q, r <∞ such that
1q
=1r− 1p.
Then, for all T ∈ M′ρ,p and S ∈ M′
ρ,q, the functional S ∗ T is continuous onMρ,r.
References
[1] S.Abdullah. On convolution operators and multipliers of distributionsof Lp-growth, J.Math.Anal.Appl.183 (1994), 196-207. MR 95c: 46060.
[2] S.Abdullah and S.Pillipovic. Bounded subsets in spaces of distributionsof Lp-growth,Hokkaido Math.J 23 (1994), 51-54. MR 94m:46065.
[3] J.Barros-Neto. An introduction to the theory of distributions. Pure andApplied Mathematics, 14. Marcel Dekker, Inc. New York, 1973. MR57:1113.
[4] J.J.Betancor and B.J.Gonzalez. Spaces of DLp type and the Hankelconvolution, Proceeding of the American Mathematical Society 129Number 1, 219-228.
25
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
231
[5] H.Chebli. Theoreme de Paley-Wiener associe a un operateurdifferentiel singulier sur (0,+∞),J.Math.Pures et Appl. 58, (1979), p.1-19.
[6] H.Chebli. Positivite des operateurs de translation generalisee associesa un operateur de Sturm-Liouville et quelques applications a l’analyseharmonique. These d’etat. Universite Louis Pasteur-Strasbourg I,(1974).
[7] N.N.Lebedev. Special Functions and their applications. Dover publica-tions, Inc. New-York.
[8] M.M.Nessibi,L.T.Rachdi and K.Trimeche. The local central limit the-orem on the product of the Chebli-Trimeche Hypergroup and the Eu-clidean Hypergroup Rn, Jour of Math. Sciences, 9 No2 (1998), 109-123.
[9] L.Schwartz. Theory of distributions I/II, Hermann, Paris, (1957/1959).
[10] E.M.Stein. Interpolation of linear operators, Trans. Amer. Math. Soc.83, (1956), 482-492.
[11] E.M.Stein and Weiss. Introduction to Fourier Analysis on EuclideanSpaces , Princeton Univ. Press. Princeton, N.J, (1971).
[12] F.Treves. Topological vector spaces. Distributions and kernels, Aca-demic Press. New-York, (1967).
[13] K.Trimeche. Inversion of the Lions Translation operator using gener-alized Wavelets, App.and.Compu.Harm.Anal, 4(1997),97-112
[14] K.Trimeche.Transformation integrale de Weyl et theoreme de Paley-Wiener associes a un operateur differentiel singulier sur (0,+∞),J.Math.pure et appl,60,(1981), 51-98
[15] G.N.Watson. A treatise on the theory of Bessel functions, 2nd ed. Cam-bridge Univ. Press. London and New-York, (1966).
[16] Z.Xu. Harmonic Analysis on Chebli-Trimeche Hypergroups; PhD The-sis, Murdock Uni, Australia (1994).
[17] Hm.Zeuner. The central limit Thereom for Chebli-Trimeche Hyper-groups, J.Theoret.Probab, 2,no1 (1989); 51-63.
26
M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR
232
Multivariate complex general singular integraloperators simultaneous approximation
George A. AnastassiouDepartment of Mathematical Sciences
University of MemphisMemphis, TN 38152, [email protected]
Abstract
Here we present complex multivariate simultaneous approximation forgeneral smooth singular integral operators converging with rates to theunit operator. The associated and presented inequalities are in kkp,1 p 1 norm and they involve multivariate related moduli of smooth-ness. At the end we list as our theorys applicators the special casesof multivariate complex Picard, Gauss-Weierstrass, Poisson-Cauchy andTrigonometric singular integral operators.
Mathematics Subject Classication 2010: 41A17, 41A25, 41A28, 41A35.Key Words and Phrases: Complex multivariate Approximation, multi-
variate singular integral, simultaneous approximation, multivariate modulus ofsmoothness, rate of convergence.
1 Introduction
Here we are motivated by [1]-[3] and expand these works to complex valuedfunctions. We present simultaneous approximation in kkp ; 1 p 1, of mul-tivariate general smooth singular integral operators to the unit operator withrates. At the end we list specic operators where our theory can be applied.From our approximation results one can derive interesting convergence proper-ties of these general operators. Our expansion to complex case is based on basicproperties of complex numbers and complex valued functions.
1
233
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,233-244,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC
2 Main Results
Here r 2 N; m 2 Z+, we dene
[m]j;r :=
8>>><>>>:(1)rj
r
j
jm; if j = 1; 2; :::; r;
1rXj=1
(1)rjr
j
jm; if j = 0;
(1)
and
[m]k;r :=
rXj=1
[m]j;r j
k; k = 1; 2; :::;m 2 N. (2)
See thatrXj=0
[m]j;r = 1; (3)
and
rXj=1
(1)rjr
j
= (1)r
r
0
: (4)
Let n be a probability Borel measure on RN , N 1, n > 0, n 2 N.
We now dene the real multiple smooth singular integral operators
[m]r;n (f ;x1; :::; xN ) :=rXj=0
[m]j;r
ZRNf (x1 + s1j; x2 + s2j; :::; xN + sN j) dn (s) ;
(5)where s := (s1; :::; sN ), x := (x1; :::; xN ) 2 RN ; n; r 2 N, m 2 Z+, f : RN ! R isa Borel measurable function, and also (n)n2N is a bounded sequence of positivereal numbers.Above operators [m]r;n are not in general positive operators and they preserve
constants, see [1].
Denition 1 Let f 2 CRN, N 1; m 2 N, the mth modulus of smoothness
for 1 p 1, is given by
!m (f ;h)p := supktk2h
kmt f (x)kp;x ; (6)
h > 0, where
mt f (x) :=mXj=0
(1)mjm
j
f (x+ jt) : (7)
Denote!m (f ;h)1 = !m (f; h) : (8)
Above, x; t 2 RN :
2
ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS
234
We make
Remark 2 We consider here complex valued Borel measurable functions f :RN ! C such that f = f1 + if2, i =
p1, where f1; f2 : RN ! R are implied
to be real valued Borel measurable functions.We dene the complex singular operators
[m]r;n (f ;x) := [m]r;n (f1;x) + i
[m]r;n (f2;x) ; x 2 RN : (9)
We assume that [m]r;n (fj ;x) 2 R, 8 x 2 RN , j = 1; 2:One notices easily that [m]r;n (f ;x) f (x)
(10)[m]r;n (f1;x) f1 (x)+ [m]r;n (f2;x) f2 (x)
also [m]r;n (f ;x) f (x)
1;x
(11) [m]r;n (f1;x) f1 (x) 1;x
+ [m]r;n (f2;x) f2 (x)
1;x
and [m]r;n (f) f p (12) [m]r;n (f1) f1
p+ [m]r;n (f2) f2
p; p 1:
Furthermore it holdsf (x) = f1; (x) + if2; (x) ; (13)
where denotes a partial derivative of any order and arrangement.
Here based on Theorem 9 of [1] we obtain
Theorem 3 Let f : RN ! C, N 1, such that f = f1 + if2, j = 1; 2. Herem 2 N, fj 2 Cm
RN, x 2 RN : Assume kfj;k1 < 1, for all k 2 Z+,
k = 1; :::; N : jj =NXk=1
k = m; j = 1; 2: Let n be a Borel probability
measure on RN , for n > 0, (n)n2N bounded sequence. Assume that for all
:= (1; :::; N ) ; k 2 Z+, k = 1; :::; N; jj :=NXk=1
k = m we have that
ZRN
NYk=1
jskjk!
1 +ksk2n
rdn (s) <1: (14)
3
ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS
235
For ej = 1; :::;m, and := (1; :::; N ), k 2 Z+, k = 1; :::; N; jj := NXk=1
k = ej,call
c;n;ej :=ZRN
NYk=1
skk dn (s1; :::; sN ) : (15)
Then [m]r;n (f ;x) f (x)
mXej=1
[m]ej;r
0BBBBB@X
1;:::;N0:jj=ej
c;n;ejf (x)NYk=1
k!
1CCCCCA
1;x
X0@1;:::;N0jj=m
1A(!r (f1;; n) + !r (f2;; n))
NYk=1
k!
! (16)
ZRN
NYk=1
jskjk!
1 +ksk2n
rdn (s)
!; x 2 RN :
The m = 0 case follows
Corollary 4 Let f : RN ! C : f = f1 + if2, N 1. Here j = 1; 2. Letfj 2 CB
RN(continuous and bounded functions). Then [0]r;nf f 1
ZRN
1 +
ksk2n
rdn (s)
(17)
(!r (f1; n) + !r (f2; n)) ;
by assuming ZRN
1 +
ksk2n
rdn (s) <1: (18)
Proof. By Theorem 11 of [1].
Theorem 5 ([3]) Let f 2 ClRN, l; N 2 N. Here n is a Borel probability
measure on RN ; n > 0, (n)n2N a bounded sequence. Let := (1; :::; N ),
i 2 Z+, i = 1; :::; N ; jj :=NXi=1
i = l: Here f (x+ sj), x; s 2 RN , is
n-integrable wrt s, for j = 1; :::; r: There exist n-integrable functions hi1;j ;h1;i2;j ; h1;2;i3;j ; :::; h1;2;:::;N1;iN ;j 0 (j = 1; :::; r) on RN such that@i1f (x+ sj)@xi11
hi1;j (s) ; i1 = 1; :::; 1; (19)
4
ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS
236
@1+i2f (x+ sj)@xi22 @x11
h1;i2;j (s) ; i2 = 1; :::; 2;
...@1+2+:::+N1+iN f (x+ sj)
@xiNN @xN1N1 :::@x
22 @x
11
h1;2;:::;N1;iN ;j (s) ; iN = 1; :::; N ;
8 x; s 2 RN .Then, both of the next exist and
[em]r;n (f ;x)= [em]r;n (f ;x) : (20)
We give
Theorem 6 Let f : RN ! C such that f = f1 + if2: Here j = 1; 2. Letfj 2 Cm+l
RN, m; l;N 2 N: For fj the assumptions of Theorem 5 are valid.
Call = 0; : Assume f( +) 1 <1 andZ
RN
NYk=1
jskjk!
1 +ksk2n
rdn (s) <1; (21)
where n is a Borel probability measure on RN , for n > 0, (n)n2N is bounded
sequence; for all k 2 Z+, k = 1; :::; N : jj =NXk=1
k = m:
For ej = 1; :::;m, and := (1; :::; N ), k 2 Z+, k = 1; :::; N; jj :=NXk=1
k = ej, callc;n;ej :=
ZRN
NYk=1
skk dn (s) :
Then [m]r;n (f ; )
f ()
mXej=1
[m]ej;r
0BBBBB@X
1;:::;N0:jj=ej
c;n;ejf + ()NYk=1
k!
1CCCCCA
1
X0@1;:::;N0jj=m
1A(!r (f1; +; n) + !r (f2; +; n))
NYk=1
k!
! (22)
ZRN
NYk=1
jskjk!
1 +ksk2n
rdn (s)
!:
5
ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS
237
Proof. By Theorem 10 of [3].Also we have
Theorem 7 Let f : RN ! C such that f = f1 + if2: Here j = 1; 2. Letfj 2 ClB
RN, l; N 2 N: The assumptions of Theorem 5 are valid for fj. Call
= 0; : Assume ZRN
1 +
ksk2n
rdn (s) <1:
Then [0]r;nf f 1Z
RN
1 +
ksk2n
rdn (s)
(23)
(!r (f1; ; n) + !r (f2; ; n)) :
Proof. By Theorem 11 of [3].By Theorem 4 of [2] we get
Theorem 8 Let f : RN ! C : f = f1 + if2: Here j = 1; 2. Let fj 2 CmRN,
m 2 N, N 1; with fj; 2 LpRN; jj = m, x 2 RN . Let p; q > 1 : 1p +
1q =
1: Here n is a Borel probability measure on RN for n > 0, (n)n2N is a
bounded sequence. Assume for all := (1; :::; N ), k 2 Z+, k = 1; :::; N;
jj :=NXk=1
k = m, we have that
ZRN
NYk=1
jskjk!
1 +ksk2n
r!pdn (s) <1: (24)
For ej = 1; :::;m, and := (1; :::; N ), k 2 Z+, k = 1; :::; N; jj := NXk=1
k = ej,call
c;n;ej :=ZRN
NYk=1
skk dn (s) : (25)
Then [m]r;n (f ;x) f (x)
mXej=1
[m]ej;r
0BBBBB@Xjj=ej
c;n;ejf (x)NYk=1
k!
1CCCCCA
p;x
m
(q (m 1) + 1)1q
!0BBBBB@Xjj=m
1 NYk=1
k!
!1CCCCCA
6
ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS
238
"ZRN
" NYk=1
jskjk!
1 +ksk2n
r#pdn (s)
# 1p
!r (f1;; n)p + !r (f2;; n)p
: (26)
We further get
Theorem 9 Let f : RN ! C : f = f1+if2; j = 1; 2. Let fj 2CRN\ Lp
RN,
N 1; p; q > 1 : 1p +1q = 1: Assume n probability Borel measures on R
N ,(n)n2N > 0 and bounded. Also supposeZ
RN
1 +
ksk2n
rpdn (s) <1: (27)
Then [0]r;n (f) f pZ
RN
1 +
ksk2n
rpdn (s)
1p
(28)!r (f1; n)p + !r (f2; n)p
:
Proof. By Theorem 6 of [2].Based on Theorem 8 of [2] we get
Theorem 10 Let f : RN ! C; f = f1+if2; j = 1; 2. Let fj 2CRN\ L1
RN,
N 1: Assume n probability Borel measures on RN , (n)n2N > 0 andbounded. Also suppose Z
RN
1 +
ksk2n
rdn (s) <1: (29)
Then [0]r;n (f) f 1Z
RN
1 +
ksk2n
rdn (s)
(30)
(!r (f1; n)1 + !r (f2; n)1) :
Based on Theorem 10 of [2] we get
Theorem 11 Let f : RN ! C; f = f1 + if2; j = 1; 2. Let fj 2 CmRN,
m;N 2 N; with fj; 2 L1RN; jj = m, x 2 RN . Here n is a Borel
probability measure on RN for n > 0, (n)n2N is a bounded sequence. Assume
for all := (1; :::; N ), k 2 Z+, k = 1; :::; N; jj :=NXk=1
k = m that we have
ZRN
NYk=1
jskjk!
1 +ksk2n
r!dn (s) <1: (31)
7
ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS
239
For ej = 1; :::;m, and := (1; :::; N ), k 2 Z+, k = 1; :::; N; jj := NXk=1
k = ej,call
c;n;ej :=ZRN
NYk=1
skk dn (s) : (32)
Then [m]r;n (f ;x) f (x)
mXej=1
[m]ej;r
0BBBBB@Xjj=ej
c;n;ejf (x)NYk=1
k!
1CCCCCA
1;x
Xjj=m
0BBBBB@1
NYk=1
k!
1CCCCCA!r (f1;; n)1 + !r (f2;; n)1
(33)
ZRN
NYk=1
jskjk!
1 +ksk2n
rdn (s) :
Based on Theorem 12 of [3] we get
Theorem 12 Let f : RN ! C; f = f1 + if2; j = 1; 2, with fj 2 Cm+lRN;
m; l;N 2 N: The assumptions of Theorem 5 are valid for fj. Call = 0; . Letfj;( +) 2 Lp
RN, jj = m, x 2 RN , p; q > 1 : 1p +
1q = 1: Here n is a Borel
probability measure on RN for n > 0, (n)n2N is a bounded sequence. Assume
for all := (1; :::; N ), k 2 Z+, k = 1; :::; N; jj :=NXk=1
k = m we have that
ZRN
NYk=1
jskjk!
1 +ksk2n
r!pdn (s) <1: (34)
For ej = 1; :::;m, and := (1; :::; N ), k 2 Z+, k = 1; :::; N; jj := NXk=1
k = ej,call
c;n;ej :=ZRN
NYk=1
skk dn (s) :
8
ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS
240
Then [m]r;n (f ;x)
f (x)
mXej=1
[m]ej;r
0BBBBB@Xjj=ej
c;n;ejf + (x)NYk=1
k!
1CCCCCA
p;x
(35)
m
(q (m 1) + 1)1q
!0BBBBB@Xjj=m
1 NYk=1
k!
!1CCCCCA
"ZRN
" NYk=1
jskjk!
1 +ksk2n
r#pdn (s)
# 1p
!r (f1; +; n)p + !r (f2; +; n)p
:
Based on Theorem 13 of [3] we get
Theorem 13 Let f : RN ! C; f = f1+ if2; j = 1; 2: Let fj 2 ClRN; l; N 2
N: The assumptions of Theorem 5 are valid. Call = 0; . Let fj; 2 LpRN,
x 2 RN , p; q > 1 : 1p +1q = 1: Assume n probability Borel measures on R
N ;
(n)n2N > 0 and bounded. Also supposeZRN
1 +
ksk2n
rpdn (s) <1:
Then [0]r;nf f p
Z
RN
1 +
ksk2n
rpdn (s)
1p
(36)
!r (f1; ; n)p + !r (f2; ; n)p
:
By Theorem 14 of [3] we get
Theorem 14 Let f : RN ! C; f = f1 + if2; j = 1; 2: Let fj 2 ClRN;
l; N 2 N: The assumptions of Theorem 5 are valid for fj. Call = 0; .Let fj; 2 L1
RN, x 2 RN : Assume n probability Borel measures on R
N ;
(n)n2N > 0 and bounded. Also supposeZRN
1 +
ksk2n
rdn (s) <1:
9
ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS
241
Then [0]r;nf f 1
Z
RN
1 +
ksk2n
rdn (s)
(37)
!r (f1; ; n)1 + !r (f2; ; n)1:
Finally we have
Theorem 15 Let f : RN ! C; f = f1 + if2; j = 1; 2, with fj 2 Cm+lRN,
m; l;N 2 N. The assumptions of Theorem 5 are valid for fj. Call = 0; . Letfj;( +) 2 L1
RN; jj = m, x 2 RN . Here n is a Borel probability measure
on RN for n > 0, (n)n2N is bounded. Assume for all := (1; :::; N ),
k 2 Z+, k = 1; :::; N; jj :=NXk=1
k = m; we have that
ZRN
NYk=1
jskjk!
1 +ksk2n
r!dn (s) <1: (38)
For ej = 1; :::;m, and := (1; :::; N ), k 2 Z+, k = 1; :::; N; jj := NXk=1
k = ej,call
c;n;ej :=ZRN
NYk=1
skk dn (s) : (39)
Then [m]r;n (f ;x)
f (x)
mXej=1
[m]ej;r
0BBBBB@Xjj=ej
c;n;ejf( +) (x)NYk=1
k!
1CCCCCA
1;x
(40)
Xjj=m
0BBBBB@1
NYk=1
k!
1CCCCCA!r (f1; +; n)1 + !r (f2; +; n)1
ZRN
NYk=1
jskjk!
1 +ksk2n
rdn (s) :
Proof. By Theorem 15 of [3].
10
ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS
242
3 Applications
Let all entities as in section 2. We dene the following specic operators forf : RN ! C:i) The general multivariate Picard singular integral operators:
P [m]r;n (f ;x1; :::; xN ) :=1
(2n)N
rXj=0
[m]j;r (41)
ZRNf (x1 + s1j; x2 + s2j; :::; xN + sN j) e
0BBB@NXi=1
jsij
1CCCAn ds1:::dsN :
ii) The general multivariate Gauss-Weierstrass singular integral operators:
W [m]r;n (f ;x1; :::; xN ) :=
1pn
N rXj=0
[m]j;r (42)
ZRNf (x1 + s1j; x2 + s2j; :::; xN + sN j) e
0BBB@NXi=1
s2i
1CCCAn ds1:::dsN :
iii) The general multivariate Poisson-Cauchy singular integral operators:
U [m]r;n (f ;x1; :::; xN ) :=WNn
rXj=0
[m]j;r (43)
ZRNf (x1 + s1j; :::; xN + sN j)
NYi=1
1s2i + 2n
ds1:::dsN ;with 2 N, > 1
2 ; and
Wn := ()21n
12
1
2
: (44)
iv) The general multivariate trigonometric singular integral operators:
T [m]r;n (f ;x1; :::; xN ) := Nn
rXj=0
[m]j;r (45)
ZRNf (x1 + s1j; :::; xN + sN j)
NYi=1
0@ sinsin
si
1A2
ds1:::dsN ;
11
ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS
243
where 2 N, and
n := 212n (1)
Xk=1
(1)k k21
( k)! ( + k)! : (46)
One can apply the results of this article to the operators P [m]r;n ; W[m]r;n ; U
[m]r;n , T
[m]r;n
(special cases of [m]r;n ) and derive interesting results. We intend to do that in afuture article.Conclusion: Our approximation results here imply important convergence
properties of operators [m]r;n to the unit operator.
References
[1] G. Anastassiou, General uniform Approximation theory by multivariate sin-gular integral operators, submitted, 2010.
[2] G. Anastassiou, Lp-general approximations by multivariate singular integraloperators, submitted, 2010.
[3] G. Anastassiou, Global smoothness preservation and simultaneous approxi-mation for multivariate general singular integral operators, submitted, 2010.
12
ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS
244
Stability and superstability of ∗−bihomomorphisms on C∗-ternary
algebras
M. Eshaghi GordjiDepartment of Mathematics, Semnan University, P. O. Box 35195-363, Semnan, Iran
Center of Excellence in Nonlinear Analysis and Applications (CENAA), Semnan University, Iran
e-mail: [email protected]
A. FazeliIslamic AZAD University (IAU), Science and Research Branch, Tehran, Iran.
e-mail: [email protected]
Abstract. In this paper, we establish the stability and superstability of ∗−bihomomorphisms on C∗-ternaryalgebras associated with the following functional equation
f(x− y, t) + f(x, t− s) = 2f(x, t)− f(y, t)− f(x, s).
1. Introduction
Let f be a mapping such that in general case its domain is a semigroup and its range is a topological vector space.
Suppose that we are given a functional equation E(f) = 0 so that the boundedness of f gives the boundedness of
E(f). More precisely, in the category of normed spaces, the functional equation E(f) = 0 is stable if for every ε > 0
there exists a δ > 0 that whenever ‖E(g)‖ < δ then there exists a function f such that E(f) = 0 and ‖f − g‖ < ε.
The equation E(f) = 0 is superstable whenever every approximate solution of E(f) ≥ 0 or E(f) ≤ 0
is a true solution of E(f) = 0. In other words, the boundedness of E(f) shows that either f is bounded or E(f) = 0.
In question, stability was originated from Ulam conjecture by the following explanation.
Given a metric group (G, d), a number ε > 0 and a mapping f : G → G which satisfies the inequality
d(f(x.y), f(x).f(y)) < ε, for all x,y in G, does there exist an automorphism g of G and a constant k > 0, depending
only on G, such that d(g(x), f(x)) ≤ kε for all x in G?
Hyers proved the Ulam conjecture in the category of Banach spaces under the following theorem. Suppose that
E1, E2 are two Banach spaces and f : E1 → E2 is a function that for all x, y ∈ E1 satisfy the inequality
‖f(x+y)−f(x)−f(y)‖ < ε then there exists an additive function g : E1 → E2 that for all x ∈ E1, ‖g(x)−f(x)‖ ≤ ε.
So far we have the stability of Hyers–Ulam. Th. M. Rassias extended the Ulam’s theorem by setting ε(‖x‖p +‖y‖p)
instead of ε where 0 ≤ p < 1, that, at present, is called Hyers–Ulam–Rassias stability. Thence the stability theory
was extended day by day and several applications were obtained in a variety of branches of physics and mathemat-
ical sciences among others in Supersymmetric theories and Yang-Baxter equation and Cubic analog of Laplace and
d’Alembert equations. The primitive work of Ulam has come in [69] and partial solution of Hyers is shown in [49].
The generalization of Hyers theorem by Rssias appears in [66]. The expression Hyers-Ulam-Rassias stability was
propounded in [66]. For the history and various aspects of stability theory we refer the reader to [2, 34], [5]–[47],
0 2000 Mathematics Subject Classification: 39B82, 39B52.0 Keywords: stability; suprestability ; C∗-ternary algebra; bi-homomorphism
245
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,245-258,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC
2 M. Eshaghi Gordji and A.Fazeli
[52, 53] and [62]–[65].
Ternary algebraic operations have propounded originally in 19th century in Cayley [4] and J.J.Silvester’s paper
[68]. The application of ternary algebra in supersymmetry is presented in [51] and in Yang-Baxter equation in
[55]. Cubic analogue of Laplace and d’alembert equations have been considered for first order by Himbert in
[48],[50]. The previous definition of C∗-ternary algebras has been propounded by H.Zettle in [70]. In relation to
homomorphisms and isomorphisms between various spaces we refer readers to [56]–[61], [67].
2. Preliminaries
Assume A is a linear space over a complex field equipped with a mapping [ ] : A3 = A × A × A → A with
(x, y, z) → [x, y, z] that is linear in variables x, y, z and satisfies the associative identity, i.e. [x, y, [z, u, v]] =
[x, [y, z, u], v] = [[x, y, z], u, v] for all x, y, z, u, v ∈ A. The pair (A, [ ]) is called a ternary algebra. The ternary
algebra (A, [ ]) is called unital if it has an identity element, i.e. an element e ∈ A such that [x, e, e] = [e, e, x] = x
for every x ∈ A. A ∗ − ternary algebra is a ternary algebra together with a mapping ∗ : A → A which satisfies
(x∗)∗ = x, (λx)∗ = λx∗, (x + y)∗ = x∗+ y∗, [x, y, z]∗ = [z∗, y∗, x∗] for all x, y, z ∈ A and all λ ∈ C. In the case that
A is unital and e is its unit, we assume that e∗ = e.
A is normed ternary algebra if A is a ternary algebra and there exists a norm ‖.‖ on A which satisfies ‖[x, y, z]‖ ≤‖x‖ ‖y‖ ‖z‖ for all x, y, z ∈ A. Whenever the ternary algebra A is unital with unit element e, we repute ‖e‖ = 1. A
normed ternary algebra A is called a Banach ternary algebra, if (A, ‖ ‖) is a Banach space. A C∗-ternary algebra
is a Banach ∗ − ternary algebra if ‖[x, x∗, x]‖ = ‖x‖3 for all x ∈ A.
We suggest [54] for definition of C∗-ternary algebra.
Theorem 2.1. Assume that A and B are two C∗-ternary algebras, then the cartesian product A×B is a C∗-ternary
algebra.
Proof. We define in A×B sum and scaler product and ternary product, pointwise ie
(a1, b1) + (a2, b2) = (a1 + a2, b1 + b2) and λ(a, b) = (λa, λb) and [(a1, b1), (a2, b2), (a3, b3)] = ([a1, a2, a3], [b1, b2, b3])
for all a, a1, a2, a3 ∈ A and b, b1, b2, b3 ∈ B and λ ∈ C. Also we define (a, b)∗ = (a∗, b∗) and ||(a, b)|| = max(||a||, ||b||)for all a ∈ A and b ∈ B. The only subject that is not clear is C∗-ternary algebra identity,
||[(a, b), (a, b)∗, (a, b)]|| = ||([a, a∗, a], [b, b∗, b])|| = max(||a||3, ||b||3) = max(||a||, ||b||)3 = ||(a, b)||3
Now we proceed to the resumption of definitions.
Let X, Y, Z be linear spaces. A mapping f : X × Y → Z is said to biadditive if for each fixed x in X, the map
y 7→ f(x, y) is additive and for each fixed y in Y the map x 7→ f(x, y) is additive. We say that f : X × Y → Z is
bilinear if f is biadditive and f(λx, µy) = λµf(x, y) for all λ, µ ∈ C and x ∈ X, y ∈ Y .
Definition 2.2. [1] Suppose A and B are ternary algebras. A bilinear mapping f : A × A → B is called ternary
algebra left[right] bihomomorphism if it satisfies
f([x, y, z], t) = [f(x, t), f(y, t), f(z, t)] [f(x, [y, z, t]) = [f(x, y), f(x, z), f(x, t)]]
GORDJI, FAZELI: C*-TERNARY ALGEBRAS
246
Stability and superstability of bihomomorphisms and ... 3
for all x, y, z, t ∈ A. f is called bihomomorphism if it is right and left bihomomorphism. In the case the function f
is bijective and bihomomorphism, it will be called ternary algebra biisomorphism.
Definition 2.3. Let A and B be C∗−ternary algebras and f : A × A → B be a bihomomorphism. f is called
∗−bihomomorphism if f(x∗) = f(x)∗ for every x ∈ A×A.
3. Biadditivity
We need the following theorem to prove the main results of the present paper.
Theorem 3.1. Let X and Y and Z be linear spaces and f : X × Y → Z be a mapping. Then f is biadditive if and
only if
f(x− y, t) + f(x, t− s) = 2f(x, t)− f(y, t)− f(x, s) (3.1)
for all x, y ∈ X and t, s ∈ Y .
Proof. If f is a biadditive mapping, it is obvious that it satisfies (3.1). Conversely suppose that f satisfies (3.1). In
(3.1) we set x = y = s = t = 0, we have f(0, 0) = 0. Letting x = y = s = 0 in (3.1), we obtain f(0, t) = 0. Putting
y = s = t = 0 we get f(x, 0) = 0. Setting s = 0 in (3.1) we arrive at
f(x− y, t) = f(x, t)− f(y, t). (3.2)
Letting x = 0 in (3.2), shows that f(−y, t) = −f(y, t). Thus (3.2) gets out in the following form
f(x− y, t) = f(x, t) + f(−y, t). (3.3)
By changing y to −y, (3.3) shows that f is additive with respect to first variable. Putting y = 0 in (3.1), we obtain
f(x, t− s) = f(x, t)− f(x, s). (3.4)
Setting t = 0 in (3.4), we arrive at f(x,−s) = −f(x, s). Interchanging s by −s in (3.4) and the last equality we
see that f is additive with respect to the second variable. So f is biadditive .
Theorem 3.2. Let X and Y and Z be linear spaces and f : X×Y → Z be a biadditive mapping. Then f is bilinear
if and only if
f(λx, µy) = λµf(x, y) (3.5)
for each x in X and y in Y and λ, µ ∈ T 114
= eiθ; 0 ≤ θ ≤ π
2.
Proof. At the beginning suppose that (3.5) is satisfied. Since f is biadditive, f(rx, sy) = rsf(x, y) for all r, s ∈ Qand x ∈ X and y ∈ Y . Now we consider some equalities:
Ifπ
2≤ θ ≤ π then 0 ≤ θ − π
2≤ π
2and eiθ = e
i(θ−π
2).e
iπ
2 = iei(θ−
π
2).
If π ≤ θ ≤ 3π
2then 0 ≤ θ − π ≤ π
2and eiθ = ei(θ−π).eiπ = (−1)ei(θ−π).
If−π
2≤ θ ≤ 0 then 0 ≤ θ +
π
2≤ π
2and eiθ = e
i(θ+π
2).e
−iπ
2 = (−i)ei(θ+
π
2).
So by using the above equalities and (3.5), we arrive at f(λx, µy) = λµf(x, y)
GORDJI, FAZELI: C*-TERNARY ALGEBRAS
247
4 M. Eshaghi Gordji and A.Fazeli
for all λ, µ ∈ T 1 = z ∈ C; |z| = 1 and x ∈ X and y ∈ Y .
If 0 ≤ r, s ≤ 1 letting s1 = s +√
1− s2 i ∈ T 1 and r1 = r +√
1− r2 i ∈ T 1.
So r =r1 + r1
2, s =
s1 + s1
2. Therefore, by paying attention to what come in the above
f(rx, sy) = rsf(x, y). Now if λ, µ belong to C then
λ = |λ|eiλ1 , µ = |µ|eiµ1 , |λ| = [|λ|] + λ2, |µ| = [|µ|] + µ2 that in those 0 ≤ λ2, µ2 < 1. Thus
f(λx, µy) = f(([|λ|] + λ2)eiλ1x, ([|µ|] + µ2)eiµ1y) = eiλ1eiµ1f(([|λ|] + λ2)x, ([|µ|] + µ2)y) = λµf(x, y)
for all x ∈ X and y ∈ Y . Hence f is bilinear. The converse is clear.
Theorem 3.3. Let X,Y,Z be linear spaces and f : X × Y → Z be a mapping. Then f is bilinear if and only if
f(λx− λy, µt) + f(λx, µt− µs) = λµ(2f(x, t)− f(y, t)− f(x, s)) (3.6)
for all x, y ∈ X and t, s ∈ Y and λ, µ ∈ T 114.
Proof. If f is bilinear, then it is obvious that f satisfies (3.6).
On the other hand, suppose that f satisfies (3.6). Setting λ = µ = 1 in (3.6). By Theorem 3.1, f is biadditive.
Putting y = s = 0 in (3.6), we achieve f(λx, µt) = λµf(x, t) for all λ, µ ∈ T 114
and t ∈ Y . Therefore, according to
theorem 3.2 f is bilinear.
Notation: Let X, Y, Z be linear spaces. For a given mapping f : X × Y → Z, we set
Eλ,µf(x, y, t, s) = f(λx− λy, µt) + f(λx, µt− µs)− λµ(2f(x, t)− f(y, t)− f(x, s))
for all x, y ∈ X and s, t ∈ Y and λ, µ ∈ C.
4. Stability of ∗−bihomomorphisms of C∗-ternary algebras
In this section we investigate the Stability of ∗−bihomomorphisms between C∗-ternary algebras.
Theorem 4.1. Let A and B be two C∗−ternary algebras and ϕ : A4 → [0,∞) be a function such that
ϕ(0, 0, 0, 0) = 0 limn→∞
14nl
ϕ(2nlx, 2nly, 2nlt, 2nls) = 0, (4.1)
Ml(x, y) =∞∑
n= 1−l2
14nl
M(2nlx, 2nly) < ∞ (4.2)
where x, y, t, s ∈ A and l ∈ +1,−1 and
M(x, y) = ϕ(0, x, 2y, 0) + ϕ(x,−x, 2y, y) + ϕ(0, 0, 2y, 0) + 3(ϕ(x, 0, y,−y) + ϕ(x, 0, 0, y) + ϕ(x, 0, 0, 0) + ϕ(0, 0, y, 0))
and f : A×A → B be a mapping which satisfies
||f(x, y)− f(x∗, y∗)|| ≤ ϕ(x, y, 0, 0), (4.3)
‖Eλ,µf(x, y, t, s)‖ ≤ ϕ(x, y, t, s), (4.4)
GORDJI, FAZELI: C*-TERNARY ALGEBRAS
248
Stability and superstability of bihomomorphisms and ... 5
max(||f([x, y, t], s)− [f(x, s), f(y, s), f(t, s)]||, ||f(x, [y, t, s])− [f(x, y), f(x, t), f(x, s)]|| ≤ ϕ(x3, y3, t3, s3), (4.5)
limn→∞
14n
f(2nx, 2ny) = limn→∞
143n
f(2nx, 23ny) = limn→∞
143n
f(23nx, 2ny), (4.6)
[ limn→∞
4nf(x
2n,
y
2n) = lim
n→∞43nf(
x
2n,
y
23n) = lim
n→∞43nf(
x
23n,
y
2n) ] (4.7)
for all x, y, t, s ∈ A and λ, µ ∈ T 114. Then there exists a unique ∗−bihomomorphism of ternary algebras
H : A×A → B such that
||H(x, y)− f(x, y)|| ≤ 14Ml(x, y) (4.8)
and H(x, y) = limn→∞
14n
f(2nx, 2ny) [H(x, y) = limn→∞
4nf(x
2n,
y
2n)]
for all x, y ∈ A.
Proof. Setting λ = µ = 1 in (4.4) we have
||f(x− y, t) + f(x, t− s)− 2f(x, t) + f(y, t) + f(x, s)|| ≤ ϕ(x, y, t, s). (4.9)
Putting x = y = t = s = 0 in (4.9), we obtain f(0, 0) = 0 by (4.1).
Letting x = y = s = 0 in (4.9), shows that
||f(0, t)|| ≤ ϕ(0, 0, t, 0).
Assuming y = t = s = 0 in (4.9) we get
‖f(x, 0)‖ ≤ ϕ(x, 0, 0, 0).
Setting y = −x, t = 2s in (4.9) we arrive at
||f(2x, 2s) + 2f(x, s)− 2f(x, 2s) + f(−x, 2s)|| ≤ ϕ(x,−x, 2s, s). (4.10)
Putting x = s = 0 in (4.9) we conclude that
||f(−y, t) + f(y, t)|| ≤ ϕ(0, y, t, 0) + ϕ(0, 0, t, 0). (4.11)
Letting y = x, t = 2s in (4.11) we get
||f(−x, 2s) + f(x, 2s)|| ≤ ϕ(0, x, 2s, 0) + ϕ(0, 0, 2s, 0). (4.12)
By using (4.10) and (4.12) we come to
||f(2x, 2s) + 2f(x, s)− 3f(x, 2s)|| ≤ ϕ(0, x, 2s, 0) + ϕ(x,−x, 2s, s) + ϕ(0, 0, 2s, 0). (4.13)
In (4.9) setting y = 0 and s = −t, we achieve
||f(x, 2t)− f(x, t) + f(0, t) + f(x,−t)|| ≤ ϕ(x, 0, t,−t). (4.14)
Assuming y = t = 0 in (4.9) we have
‖f(x, s) + f(x,−s)‖ ≤ ϕ(x, 0, 0, s) + ϕ(x, 0, 0, 0). (4.15)
GORDJI, FAZELI: C*-TERNARY ALGEBRAS
249
6 M. Eshaghi Gordji and A.Fazeli
Substituting s by t in (4.15) shows that
||f(x,−t) + f(x, t)|| ≤ ϕ(x, 0, 0, t) + ϕ(x, 0, 0, 0). (4.16)
(4.14) and (4.16) show that
||f(x, 2t)− 2f(x, t)|| ≤ ϕ(x, 0, t,−t) + ϕ(x, 0, 0, t) + ϕ(x, 0, 0, 0) + ϕ(0, 0, t, 0). (4.17)
Letting t = s in (4.17) and multiply both sides by 3, gives
||3f(x, 2s)− 6f(x, s)|| ≤ 3(ϕ(x, 0, s,−s) + ϕ(x, 0, 0, s) + ϕ(x, 0, 0, 0) + ϕ(0, 0, s, 0)). (4.18)
(4.18) and (4.13) give
||f(2x, 2s)− 4f(x, s)|| ≤ M(x, s). (4.19)
Now let l = 1. By replacing x by 2jx and s by 2js, and multiplying both sides of (4.19) by1
4j+1, we get
|| 14j+1
f(2j+1x, 2j+1s)− 14j
f(2jx, 2js)|| ≤ 14j+1
M(2jx, 2js).
Now for given m, p ∈ N, we have
|| 14m+p
f(2m+px, 2m+ps)− 14m
f(2mx, 2ms)|| ≤
m+p−1∑j=m
|| 14j+1
f(2j+1x, 2j+1s)− 14j
f(2jx, 2js)|| ≤
m+p−1∑j=m
14j+1
M(2jx, 2js). (4.20)
So by (4.20) and (4.2), the sequence14n
f(2nx, 2ny) is a Cauchy sequence in Banach space B for all x, y ∈ A, and
hence it is convergent. Define H : A × A → B by H(x, y) = limn→∞
14n
f(2nx, 2ny) for all x, y ∈ A. Letting m = 0
and p →∞ in (4.20), so we obtain (4.8) with l = 1. From (4.4) and (4.1), we get
||Eλ,µH(x, y, t, s)|| ≤ limn→∞
14n||Eλ,µf(2nx, 2ny, 2nt, 2ns)|| ≤
limn→∞
14n
ϕ(2nx, 2ny, 2nt, 2ns) = 0.
Thus Eλ,µH(x, y, t, s) = 0 for all x, y, t, s ∈ A and λ, µ ∈ T 114. So, according to Theorem 3.3 H is a bilinear mapping.
By (4.5), (4.6) and (4.1), we conclude that
max(||H([x, y, t], s)− [H(x, s),H(y, s),H(t, s)] ||, ||H(x, [y, t, s])− [H(x, y),H(x, t),H(x, s)] ||) =
max(|| limn→∞
14n
f(2n[x, y, t], 2ns)− limn→∞
143n
[f(2nx, 2ns), f(2ny, 2ns), f(2nt, 2ns)]||,
|| limn→∞
14n
f(2nx, 2n[y, t, s])− limn→∞
143n
[f(2nx, 2ny), f(2nx, 2nt), f(2nx, 2ns)]||) =
limn→∞
143n
max(||f([2nx, 2ny, 2nt], 2ns)− [f(2nx, 2ns), f(2ny, 2ns), f(2nt, 2ns)]||,
||f(2nx, [2ny, 2nt, 2ns])− [f(2nx, 2ny), f(2nx, 2nt), f(2nx, 2ns)]||) ≤
limn→∞
143n
ϕ(23nx3, 23ny3, 23nt3, 23ns3) = 0.
GORDJI, FAZELI: C*-TERNARY ALGEBRAS
250
Stability and superstability of bihomomorphisms and ... 7
So H([x, y, t], s) = [H(x, s),H(y, s),H(t, s)] and H(x, [y, t, s]) = [H(x, y),H(x, t),H(x, s)]. Therefore, H is a
bihomomorphism. On the other hand, by (4.3), we have
||H(x, y)−H(x∗, y∗)|| = limn→∞
14n||f(2nx, 2ny)− f((2nx)∗, (2ny)∗)|| ≤ 1
4nϕ(2nx, 2ny, 0, 0) = 0.
Hence H is ∗−bihomomorphism. Now let T : A×A → B be another ∗−bihomomorphism satisfying (4.8), then by
(4.2) we have
||H(x, y)− T (x, y)|| = limn→∞
|| 14n
f(2nx, 2ny)− T (x, y)|| = limn→∞
14n||f(2nx, 2ny)− T (2nx, 2ny)|| ≤
limn→∞
14n+1
M1(2nx, 2ny) = limn→∞
14
∞∑j=n
14n
M(2nx, 2ny) = 0.
So, we conclude that H(x, y) = T (x, y) for all x, y ∈ A.
Now assume that l = −1.
Interchanging x byx
2j+1and s by
s
2j+1in(4.19) and multiplying its both sides by 4j , we achieve
||4jf(x
2j,
s
2j)− 4j+1f(
x
2j+1,
s
2j+1)|| ≤ 4jM(
x
2j+1,
s
2j+1).
Now for given m, p ∈ N, we see that
||4m+pf(x
2m+p,
s
2m+p)− 4mf(
x
2m,
s
2m)|| ≤
m+p−1∑j=m
||4jf(x
2j,
s
2j)− 4j+1f(
x
2j+1,
s
2j+1)|| ≤
m+p−1∑j=m
4jM(x
2j+1,
s
2j+1). (4.21)
By (4.21) and (4.2) the sequence 4nf(x
2n,
y
2n) is Cauchy in Banach space B. Then it is convergent for all x, y ∈ A.
Define H1 : A × A → B by H1(x, y) = limn→∞
4nf(x
2n,
y
2n) for all x,y in A. The rest of the proof is similar to the
case that l = 1.
Theorem 4.2. Let θ, p1, p2, p3, p4 be real numbers such that θ ≥ 0 and all of p1, p2, p3, p4 be located in (0, 2) [or
all in (2,∞)] and A,B be C∗ternary algebras and f : A×A → B be a mapping that satisfies
||f(x, y)− f(x∗, y∗)|| ≤ θ(||x||p1 + ||y||p2),
‖Eλ,µf(x, y, t, s)‖ ≤ θ(||x||p1 + ||y||p2 + ||t||p3 + ||s||p4),
max(||f([x, y, t], s)− [f(x, s), f(y, s), f(t, s)]||, ||f(x, [y, t, s])− [f(x, y), f(x, t), f(x, s)]||,
≤ θ(||x3||p1 + ||y3||p2 + ||t3||p3 + ||s3||p4),
limn→∞
14n
f(2nx, 2ny) = limn→∞
143n
f(2nx, 23ny) = limn→∞
143n
f(23nx, 2ny),
[ limn→∞
4nf(x
2n,
y
2n) = lim
n→∞43nf(
x
2n,
y
23n) = lim
n→∞43nf(
x
23n,
y
2n)]
for all x, y, t, s ∈ A and λ, µ ∈ T 114. Then there exists a unique ∗−bihomomorphism H : A×A → B which satisfies
the following inequality
||H(x, y)− f(x, y)|| ≤
θ(10
|4− 2p1 |||x||p1 +
2|4− 2p2 |
||x||p2 +6 + 3× 2p3
|4− 2p3 |||y||p3 +
7 + 2p4
|4− 2p4 |||y||p4),
and
H(x, y) = limn→∞
14n
f(2nx, 2ny) [H(x, y) = limn→∞
4nf(x
2n,
y
2n)]
GORDJI, FAZELI: C*-TERNARY ALGEBRAS
251
8 M. Eshaghi Gordji and A.Fazeli
for all x, y ∈ A.
Proof. We set in Theorem 4.1
ϕ(x, y, t, s) = θ(||x||p1 + ||y||p2 + ||t||p3 + ||s||p4).
Theorem 4.3. Let A and B be two C∗−ternary algebras and ϕ : A4 → [0,∞) be a function such that ϕ(0, 0, 0, 0) = 0
and
limn→∞
12n
ϕ(2nx, 2ny, 2nt, s) = 0 [ limn→∞
12n
ϕ(x, 2ny, 2nt, 2ns) = 0 ]
M1(x, t) =∞∑
j=0
12j
M(2jx, t) < ∞ [ M2(x, t) =∞∑
j=0
12j
M(x, 2jt) < ∞ ] (4.22)
where x, y, t, s ∈ A and
M(x, t) = ϕ(x,−x, t, t) + ϕ(x, 0, 0, 0) + ϕ(0, x, t, 0) + ϕ(0, 0, t, 0),
[ M(x, t) = ϕ(x, x, t,−t) + ϕ(x, 0, 0, 0) + ϕ(x, 0, 0, t) + ϕ(0, 0, t, 0) ]
and f : A×A → B be a mapping satisfying
||f(x, y)− f(x∗, y∗)|| ≤ ϕ(x, x, x, y) [ ||f(x, y)− f(x∗, y∗)|| ≤ ϕ(x, y, y, y) ]
||Eλ,µf(x, y, t, s)|| ≤ ϕ(x, y, t, s)
||f([x, y, t], s)− [f(x, s), f(y, s), f(t, s)]|| ≤ ϕ(x3, y3, t3, s3)
[ ||f(x, [y, t, s])− [f(x, y), f(x, t), f(x, s)]|| ≤ ϕ(x3, y3, t3, s3) ]
limn→∞
12n
f(2nx, y) = limn→∞
123n
f(23nx, y) [ limn→∞
12n
f(x, 2ny) = limn→∞
123n
f(x, 23ny)]
for all x, y, t, s ∈ A and λ, µ ∈ T 114. Then there exist a unique ∗−bihomomorphism H : A×A → B such that
||H(x, y)− f(x, y)|| ≤ 12M1(x, y) [ ||H(x, y)− f(x, y)|| ≤ 1
2M2(x, y) ] (4.23)
and
H(x, y) = limn→∞
12n
f(2nx, y) [ H(x, y) = limn→∞
12n
f(x, 2ny) ]
for all x, y ∈ A.
Proof. Putting y = t = s = 0 in (4.9) shows that
||f(x, 0)|| ≤ ϕ(x, 0, 0, 0). (4.24)
Setting y = −x and s = t in (4.9) we get
||f(2x, t) + f(x, 0)− f(x, t) + f(−x, t)|| ≤ ϕ(x,−x, t, t). (4.25)
Substituting y with x in (4.11) we obtain
||f(−x, t) + f(x, t)|| ≤ ϕ(0, x, t, 0) + ϕ(0, 0, t, 0). (4.26)
By using (4.24) and (4.25) and (4.26) we come to
||f(2x, t)− 2f(x, t)|| ≤ M(x, t). (4.27)
GORDJI, FAZELI: C*-TERNARY ALGEBRAS
252
Stability and superstability of bihomomorphisms and ... 9
Replacing x with 2jx and multiply its both sides by1
2j+1we get
|| 12j+1
f(2j+1x, t)− 12j
f(2jx, t)|| ≤ 12j+1
M(2jx, t).
Now let m,p be in N. We have
|| 12m+p
f(2m+px, t)− 12m
f(2mx, t)|| ≤m+p−1∑
j=m
|| 12j+1
f(2j+1x, t)− 12j
f(2jx, t)|| ≤m+p−1∑
j=m
12j+1
M(2jx, t). (4.28)
From (4.22) and (4.28) the sequence 12n
f(2nx, y) is Cauchy and hence is convergent. Define H : A×A → B by
H(x, y) = limn→∞
12n
f(2nx, y) for all x,y in A.
Letting m = 0 and p →∞ in (4.28), it follows that (4.23) is satisfied. The rest of the proof is similar to the proof
of Theorem 4.1 .
Theorem 4.4. Suppose that θ, p1, p2, p3, p4 be real numbers such that θ ≥ 0, p1, p2, p3 lie in (0, 1) [p2, p3 , p4 lie in (0, 1)].
Let A and B be two C∗-ternary algebras and f : A×A → B be a mapping satisfying
||f(x, y)−f(x∗, y∗)|| ≤ θ(||x||p1+||x||p2+||x||p3+||y||p4) [ ||f(x, y)−f(x∗, y∗)|| ≤ θ(||x||p1+||y||p2+||y||p3+||y||p4) ]
||Eλ,µf(x, y, t, s)|| ≤ θ(||x||p1 + ||y||p2 + ||t||p3 + ||s||p4)
||f([x, y, t], s)− [f(x, s), f(y, s), f(t, s)]|| ≤ θ(||x3||p1 + ||y3||p2 + ||t3||p3 + ||s3||p4)
[ ||f(x, [y, t, s])− [f(x, y), f(x, t), f(x, s)]|| ≤ θ(||x3||p1 + ||y3||p2 + ||t3||p3 + ||s3||p4) ]
limn→∞
12n
f(2nx, y) = limn→∞
123n
f(23nx, y) [ limn→∞
12n
f(x, 2ny) = limn→∞
123n
f(x, 23ny) ]
for all x, y, t, s ∈ A and λ, µ ∈ T 114. Then there exist a unique left [right] ∗−bihomomorphism H : A×A → B such
that
||H(x, y)− f(x, y)|| ≤ θ(2
2− 2p1||x||p1 +
22− 2p2
||x||p2 + 3||y||p3 + ||y||p4)
[ ||H(x, y)− f(x, y)|| ≤ θ(3||x||p1 + ||x||p2 +2
2− 2p3||y||p3 +
22− 2p4
||y||p4) ]
and
H(x, y) = limn→∞
12n
f(2nx, y) [H(x, y) = limn→∞
12n
f(x, 2ny)]
for all x, y ∈ A.
Proof. It follows by Theorem 4.3 by putting ϕ(x, y, t, s) = θ(||x||p1 + ||y||p2 + ||t||p3 + ||s||p4).
5. Superstability
In this section, we investigate the Superstability of ∗−bihomomorphisms of C∗-ternary algebras.
Theorem 5.1. Let A and B be two C∗−ternary algebras and ϕ : A4 → [0,∞) be a function such that
ϕ(0, y, t, s) = ϕ(x, 0, t, s) = ϕ(x, y, t, 0) = 0 (5.1)
limn→∞
14nl
ϕ(2nlx, 2nly, 2nlt, 2nls) = 0 (5.2)
for all x, y, t, s ∈ A and l ∈ 1,−1 and let f : A×A → B be a mapping satisfying
||f(x, y)− f(x∗, y∗)|| ≤ ϕ(x, y, x, y), (5.3)
GORDJI, FAZELI: C*-TERNARY ALGEBRAS
253
10 M. Eshaghi Gordji and A.Fazeli
||Eλ,µf(x, y, t, s)|| ≤ ϕ(x, y, t, s), (5.4)
max(||f([x, y, t], s)− [f(x, s), f(y, s), f(t, s)]||, ||f(x, [y, t, s])− [f(x, y), f(x, t), f(x, s)]||) ≤ ϕ(x3, y3, t3, s3), (5.5)
limn→∞
14n
f(2nx, 2ny) = limn→∞
143n
f(23nx, 2ny) = limn→∞
143n
f(2nx, 23ny), (5.6)
[ limn→∞
4nf(x
2n,
y
2n) = lim
n→∞43nf(
x
23n,
y
2n) = lim
n→∞43nf(
x
2n,
y
23n)]
for all x, y, t, s ∈ A and λ, µ ∈ T 114. Then f is a ∗−bihomomorphism.
Proof. Letting λ = µ = 1 in (5.4) to get
||f(x− y, t) + f(x, t− s)− 2f(x, t) + f(y, t) + f(x, s)|| ≤ ϕ(x, y, t, s). (5.7)
Reputing x = y = t = s = 0 in (5.7) to obtain f(0, 0) = 0. Putting x = y = s = 0 in (5.7) to obtain f(0, t) = 0
for all t ∈ A. putting y = s = t = 0 in (5.7) to get f(x, 0) = 0 for all x ∈ A. In (5.7), put x = 0 and s = t, we
arrive at f(−y, t) = −f(y, t), for all y, t ∈ A. Letting t = y = 0 in (5.7), we conclude that f(x,−s) = −f(x, s)
for all x, s ∈ A. Put y = 0 and s = −t in (5.7) to obtain f(x, 2t) = 2f(x, t) for all x, t ∈ A. Suppose that s = 0
and y = −x in (5.7) we arrive at f(2x, t) = 2f(x, t) for all x, t ∈ A. Thus we receive f(2x, 2y) = 4f(x, y) for all
x, y ∈ A. By induction, we get f(2nx, 2ny) = 4nf(x, y) for all x, y ∈ A and n ∈ Z .Now let l = 1. From (5.4), we
get
||Eλ,µf(x, y, t, s)|| = limn→∞
14n||Eλ,µf(2nx, 2ny, 2nt, 2ns)|| ≤ lim
n→∞
14n
ϕ(2nx, 2ny, 2nt, 2ns) = 0.
Thus Eλ,µf(x, y, t, s) = 0 for all x, y, t, s ∈ A and λ, µ ∈ T 114. So, according to Theorem 3.3, f is a bilinear map. By
(5.2), (5.5) and (5.6) we conclude that
max(||f([x, y, t], s)− [f(x, s), f(y, s), f(t, s)] ||, ||f(x, [y, t, s])− [f(x, y), f(x, t), f(x, s)] ||) =
max(|| limn→∞
14n
f(2n[x, y, t], 2ns)− limn→∞
143n
[f(2nx, 2ns), f(2ny, 2ns), f(2nt, 2ns)]||,
|| limn→∞
14n
f(2nx, 2n[y, t, s])− limn→∞
143n
[f(2nx, 2ny), f(2nx, 2nt), f(2nx, 2ns)]||) =
limn→∞
143n
max(||f([2nx, 2ny, 2nt], 2ns)− [f(2nx, 2ns), f(2ny, 2ns), f(2nt, 2ns)]||,
||f(2nx, [2ny, 2nt, 2ns])− [f(2nx, 2ny), f(2nx, 2nt), f(2nx, 2ns)]||) ≤
limn→∞
143n
ϕ(23nx3, 23ny3, 23nt3, 23ns3) = 0.
So f([x, y, t], s) = [f(x, s), f(y, s), f(t, s)] and f(x, [y, t, s]) = [f(x, y), f(x, t), f(x, s)].
Therefore f is a bihomomorphism. On the other hand, by (5.3), we have
||f(x, y)− f(x∗, y∗)|| = limn→∞
14n||f(2nx, 2ny)− f((2nx)∗, (2ny)∗)|| ≤ 1
4nϕ(2nx, 2ny, 2nx, 2ny) = 0.
Hence f is ∗−bihomomorphism. The proof of other case is similar.
GORDJI, FAZELI: C*-TERNARY ALGEBRAS
254
Stability and superstability of bihomomorphisms and ... 11
Theorem 5.2. Let θ, p1, p2, p3, p4 be real numbers such that θ ≥ 0, p1 + p2 + p3 + p4 lie in (0, 2) [p1 + p2 + p3 +
p4 lie in (2,∞)]. Let A and B be two ternary C∗-algebras and f : A×A → B be a mapping satisfying
||f(x, y)− f(x∗, y∗)|| ≤ θ(||x||p1+p3 ||y||p2+p4),
||Eλ,µf(x, y, t, s)|| ≤ θ(||x||p1 ||y||p2 ||t||p3 ||s||p4),
max(||f([x, y, t], s)− [f(x, s), f(y, s), f(t, s)]||, ||f(x, [y, t, s])− [f(x, y), f(x, t), f(x, s)]||
≤ θ(||x3||p1 ||y3||p2 ||t3||p3 ||s3||p4),
limn→∞
14n
f(2nx, 2ny) = limn→∞
143n
f(23nx, 2ny) = limn→∞
143n
f(2nx, 23ny)
[ limn→∞
4nf(x
2n,
y
2n) = lim
n→∞43nf(
x
23n,
y
2n) = lim
n→∞43nf(
x
2n,
y
23n)]
for all x, y, t, s ∈ A and λ, µ ∈ T 114. Then f is a ∗−bihomomorphism.
Proof. It follows from Theorem 5.1 by putting ϕ(x, y, t, s) = θ(||x||p1 ||y||p2 ||t||p3 ||s||p4).
References
[1] J. H. Bae and W. G. Park, Approximate Bi-homomorphisms and Bi-derivations in C∗-ternary algebras, Bull.korean Math. Soc. 47(2010), No. 1, pp. 195-209.
[2] M. Bavand Savadkouhi, M. E. Gordji, J. M. Rassias and N. Ghobadipour, Approximate ternary Jordan deriva-tions on Banach ternary algebras, J. Math. Phys. 50, 042303 (2009), 9 pages.
[3] M. Bidkham, H. Soleyman Mazreji and M. E. Gordji, Hyers–Ulam stability of polynomial equations, Abstractand Applied Analysis, Art.ID: 754120, 7 pages.
[4] A. Cayley, On the 34 concomitants of the ternary cubic, Am. J. Math. 4 (1881).[5] Y.J. Cho, M. Eshaghi Gordji, S. Zolfaghari, Solutions and Stability of Generalized Mixed Type QC Functional
Equations in Random Normed Spaces, Journal of Inequalities and Applications Volume 2010, Article ID403101, 17 pages doi:10.1155/2010/403101.
[6] A. Ebadian, N. Ghobadipour, M. E. Gordji, A fixed point method for perturbation of bimultipliers and Jordanbimultipliers in C∗−ternary algebras, J. Math. Phys. 51, 1, 2010, 10 pages, doi:10.1063/1.3496391.
[7] A. Ebadian, A. Najati, M. E. Gordji, On approximate additive–quartic and quadratic–cubic functional equa-tions in two variables on abelian groups, Results Math. 58 (2010), no. 1-2, 39-53.
[8] M. Eshaghi Gordji, Nearly ring homomorphisms and nearly ring derivations on non-Archimedean Banachalgebras, Abs. Appl. Anal., Volume 2010, Article ID 393247, 12 pages, doi:10.1155/2010/393247.
[9] M. Eshaghi Gordji, Stability of a functional equation deriving from quartic and additive functions, Bull.Korean Math. Soc., Vol. 47, No.3, 2010, 491–502.
[10] M. Eshaghi Gordji, Stability of an additive-quadratic functional equation of two variables in F–spaces, Journalof Nonlinear Sciences and Applications, Vol 2, No 4,(2009) pp.251-259.
[11] M. Eshaghi Gordji, S. Abbaszadeh and C. Park, On the stability of generalized mixed type quadratic andquartic functional equation in quasi-Banach spaces, J. Ineq. Appl., Volume 2009 (2009), Article ID 153084, 26pages.
[12] M. Eshaghi Gordji and Z. Alizadeh, Stability and superstability of ring homomorphisms on non–ArchimedeanBanach algebras, Abstract and Applied Analysis, Vol. 2011, Article ID:123656, (2011), 10 pages.
[13] M. Eshaghi Gordji and M. Bavand Savadkouhi, On approximate cubic homomorphisms, Advances in differenceequations, Volume 2009, Article ID 618463, 11 pages, doi:10.1155/2009/618463.
[14] M. Eshaghi Gordji, M. Bavand Savadkouhi, M. Bidkham, C. Park and J.–R. Lee, Nearly Partial Derivationson Banach Ternary Algebras, Journal of Mathematics and Statistics 6 (4)(2010), 454–461.
[15] M. Eshaghi Gordji and A. Bodaghi, On the stability of quadratic double centralizers on Banach algebras, J.Comput. Anal. Appl. VOL. 13, NO.4, (2011) 724–729.
GORDJI, FAZELI: C*-TERNARY ALGEBRAS
255
12 M. Eshaghi Gordji and A.Fazeli
[16] M. Eshaghi Gordji, A. Bodaghi and I.–A. Alias, On the stability of quadratic double centralizers and quadraticmultipliers: A fixed point approach, Journal of Inequalities and Applications, Vol. 2011, Article ID: 957541,(2011), 12 pages.
[17] M. Eshaghi Gordji, A. Ebadian and S. Zolfaghari, Stability of a functional equation deriving from cubic andquartic functions, Abs. Appl. Anal., Volume 2008, Article ID 801904, 17 pages.
[18] M. Eshaghi Gordji, M.B. Ghaemi, S. Kaboli Gharetapeh, S. Shams and A. Ebadian, On the stability ofJ∗−derivations, Journal of Geometry and Physics 60 (3) (2010) 454–459.
[19] M. Eshaghi Gordji, M. B. Ghaemi and H. Majani, Generalized Hyers-Ulam-Rassias Theorem in MengerProbabilistic Normed Spaces, Discrete Dynamics in Nature and Society, 2010, Article ID 162371, 11 pages.
[20] M. Eshaghi Gordji, M. B. Ghaemi, H. Majani and C. Park, Generalized Ulam-Hyers Stability of JensenFunctional Equation in erstnev PN Spaces, J. Ineq. Appl., 2010, Article ID 868193, 14 pages.
[21] M. Eshaghi Gordji and N. Ghobadipour, Generalized Ulam–Hyers stabilities of quartic derivations on Banachalgebras, Proyecciones Journal of Mathematics,Vol. 29, No 3, (2010), 209–224.
[22] M. Eshaghi Gordji and N. Ghobadipour, Stability of (α, β, γ)−derivations on Lie C∗−algebras, InternationalJournal of Geometric Methods in Modern Physics, Vol. 7, No. 7 (2010) 1-10, DOI: 10.1142/S0219887810004737.
[23] M. Eshaghi Gordji and F. Habibian, Hyers–Ulam–Rassias stability of quadratic derivations on Banach Alge-bras, Nonlinear Functional Analysis and Applications, Vol. 14, No. 5 (2009), 759–766.
[24] M. Eshaghi Gordji, S. Kaboli Gharetapeh, T. Karimi , E. Rashidi and M. Aghaei, Ternary Jordan derivationson C∗−ternary algebras, Journal of Computational Analysis and Applications, VOL.12, No.2, 2010, 463–470.
[25] M. Eshaghi Gordji, S. Kaboli-Gharetapeh, C. Park and S. Zolfaghri, Stability of an additive-cubic-quarticfunctional equation, Advances in Difference EquationsVolume 2009 (2009), Article ID 395693, 20 pages.
[26] M. Eshaghi Gordji, S Kaboli Gharetapeh, M. B. Savadkouhi, M. Aghaei and T. Karimi, On cubic derivations,Int. Journal of Math. Analysis, Vol. 4, 2010, no. 51, 2501–2514.
[27] M. Eshaghi Gordji, S. Kaboli Gharetapeh, J.M. Rassias and S. Zolfaghari, Solution and stability of a mixedtype additive, quadratic and cubic functional equation, Advances in difference equations, Volume 2009, ArticleID 826130, 17 pages,
[28] M. Eshaghi Gordji, T. Karimi, S. Kaboli Gharetapeh, Approximately n–Jordan homomorphisms on Banachalgebras, J. Ineq. Appl. Volume 2009, Article ID 870843, 8 pages.
[29] M. Eshaghi Gordji and H. Khodaei, Stability of Functional Equations, LAP LAMBERT Academic Publishing,2010.
[30] M. Eshaghi Gordji, H. Khodaei, On the Generalized Hyers–Ulam–Rassias Stability of Quadratic FunctionalEquations, Abs. Appl. Anal., Volume 2009, Article ID 923476, 11 pages.
[31] M. Eshaghi Gordji, H. Khodaei, Solution and stability of generalized mixed type cubic, quadratic and additivefunctional equation in quasi–Banach spaces, Nonlinear Analysis–TMA 71 (2009) 5629–5643.
[32] M. Eshaghi Gordji, H. Khodaei, The fixed point method for fuzzy approximation of a functional equationassociated with inner product spaces, Discrete Dynamics in Nature and Society Volume 2010, Article ID140767, 15 pages, doi:10.1155/2010/140767.
[33] M. Eshaghi Gordji, H. Khodaei and R. Khodabakhsh, General quartic–cubic–quadratic functional equation innon–Archimedean normed spaces, U.P.B. Sci. Bull., Series A, Vol. 72, Iss. 3, 2010, 69-84.
[34] M. Eshaghi Gordji, R. Khodabakhsh, S. M. Jung and H. Khodaei, AQCQ–functional equation innon–Archimedean normed spaces, Abs. Appl. Anal., Volume 2010, Article ID 741942, 22 pagesdoi:10.1155/2010/741942.
[35] M. Eshaghi Gordji and A. Najati, Approximately J∗-homomorphisms: A fixed point approach, Journal ofGeometry and Physics 60 (2010), 809–814.
[36] M. Eshaghi Gordji and M. S. Moslehian, A trick for investigation of approximate derivations, Math. Commun.15 (2010), no. 1, 99-105.
[37] M. Eshaghi Gordji, J.M. Rassias and N. Ghobadipour, Generalized Hyers–Ulam stability of the generalized(n, k)–derivations, Abs. Appl. Anal., Volume 2009, Article ID 437931, 8 pages.
GORDJI, FAZELI: C*-TERNARY ALGEBRAS
256
Stability and superstability of bihomomorphisms and ... 13
[38] M. Eshaghi Gordji and M. B. Savadkouhi, Approximation of generalized homomorphisms in quasi-Banachalgebras , Analele Univ. Ovidius Constata, Math series, Vol. 17(2), 2009, 203–214.
[39] M. Eshaghi Gordji and M. B. Savadkouhi, Stability of cubic and quartic functional equations in non-Archimedean spaces, Acta Appl. Math. 110 (2010) 1321-1329.
[40] M. Eshaghi Gordji and M. B. Savadkouhi, Stability of a mixed type cubic and quartic functional equations inrandom normed spaces , J. Ineq. Appl., Volume 2009 (2009), Article ID 527462, 9 pages.
[41] M. Eshaghi Gordji and M. B. Savadkouhi, Stability of a mixed type cubicquartic functional equation in non-Archimedean spaces, Appl. Math. Lett. 23, No.10, (2010), 1198-1202.
[42] M. Eshaghi Gordji, M. B. Savadkouhi and M. Bidkham, Stability of a mixed type additive and quadraticfunctional equation in non-Archimedean spaces, Journal of Computational Analysis and Applications, VOL.12,No.2, 2010, 454–462.
[43] M. Eshaghi Gordji, M. B. Savadkouhi and C. Park, Quadratic-quartic functional equations in RN-spaces , J.Ineq. Appl., Volume 2009 (2009), Article ID 868423, 14 pages.
[44] N. Ghobadipour, M. Eshaghi gordji, A. Ebadian and Th. M. Rassias, A perturbation of double derivations onBanach algebras, Commun. Math. Anal. 11, (2011) 1, pp. 51–60.
[45] M. E. Gordji, S. Zolfaghari , J. M. Rassias and M. B. Savadkouhi, Solution and Stability of a Mixed type Cubicand Quartic functional equation in Quasi-Banach spaces, Abs. Appl. Anal., Volume 2009, Art. ID 417473, 1-14.
[46] R. Farokhzad and S. A. R. Hosseinioun, Perturbations of Jordan higher derivations in Banach ternary algebras:An alternative fixed point approach, Int. J. Nonlinear Anal. Appl. 1 (2010),1, 42–53.
[47] P. Gavruta and L. Gavruta, A new method for the generalized Hyers-Ulam-Rassias stability, Int. J. NonlinearAnal. Appl. 1 (2010), 2, 11–18.
[48] A.Himbert, Comptes Rendus de l’Acad. Sci. Paris, (1985).[49] D. H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. 27 (1941) 222-224.[50] R. Kerner, The cubic chessboard: Geometry and physics, Class. Quantum Grav, 14, A203 (1997).[51] R. Kerner, Z3-graded algebras and the cubic root of the supersymmetry translations, J. Math. phys. 33(1),
403-411 (1992).[52] H. Khodaei and M. Kamyar, Fuzzy approximately additive mappings, Int. J. Nonlinear Anal. Appl. 1 (2010),2,
44–53.[53] H. Khodaei and Th. M. Rassias, Approximately generalized additive functions in several variables, Int. J.
Nonlinear Anal. Appl. 1 (2010),1, 22–41.[54] G. J. Murphy, C∗-Algebras and operator theory, Academic Press.Inc. 1990.[55] S. Okabo, Triple products and Yang-Baxter equation I& II. Octonionic and quaternionic triple systems, J.
Math. phys. 34(7), 3273-3291 (1993) and 34(7), 3292-3215.[56] C. Park, Approximate homomorphims on JB*-tribles , J. Math. Anal. Appl. 306 (2005) 375-381. MR2132907
(2005m:46113).[57] C. Park, Homomorphisms between Lie JC*-algebras and Cauchy-Rassias stability of Lie JC*-algebra deriva-
tions, J. Lie theory 15 (2005) 393-414. MR2147435 (2006b:17033).[58] C. Park, Homomorphisms between poisson JC∗-algebras, Bull. Braz. math. Soc. 36(2005).[59] C. Park, Isomorphisms between unital C*-algebras, J. Math. Anal. Appl. 307 (2005) 753-762. MR2142458
(2005k:46140).[60] C. Park, Lie *-homomorphisms between Lie C*-algebras and Lie *-derivations on Lie C*-algebras, J. Math.
Anal. Appl. 293 (2004) 419-434. MR2053888 (2005f:47092).[61] C. Park, A. Najati, Homomorphisms and derivations in C*-algebras, Abst. Appl. Anal. 2007(2007), Article
ID 80630. MR2302193 (2007m:46100).[62] C. Park and M. Eshaghi Gordji, Comment on Approximate ternary Jordan derivations on Banach ternary
algebras [Bavand Savadkouhi et al. J. Math. Phys. 50, 042303 (2009)], J. Math. Phys. 51, 044102 (2010);doi:10.1063/1.3299295 (7 pages).
GORDJI, FAZELI: C*-TERNARY ALGEBRAS
257
14 M. Eshaghi Gordji and A.Fazeli
[63] Choonkil Park, M. Eshaghi Gordji and H. Khodaei, A fixed point approach to the Cauchy-Rassias stability ofgeneral Jensen type quadratic-quadratic mappings, Bull. Korean Math. Soc. 2010 47, 987–996.
[64] C. Park and A. Najati, Generalized additive functional inequalities in Banach algebras, Int. J. NonlinearAnal. Appl. 1 (2010),2, 54–62.
[65] C. Park and Th.M. Rassias, Isomorphisms in unital C∗-algebras, Int. J. Nonlinear Anal. Appl. 1 (2010),2,1–10.
[66] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 (1978)297-300.
[67] J. M. Rassias and H. M. Kim, Approximate homomorphisms and derivations between C∗-ternary algebras, J.Math. Phys. 49 (2008), no. 6, 063507, 10 pp. 46Lxx (39B82).
[68] J. J. Sylvester, Johns Hopkins Circ. Journ., 3 P.7(1883).[69] S. M. Ulam, Problems in Modern Mathematics, Chapter VI, science ed. Wiley, New York, 1940.[70] H. Zettl, A characterization of ternary rings of operators, Adv. Math. 48 (1983) 117-143. MR0700979
(84h:46093).
GORDJI, FAZELI: C*-TERNARY ALGEBRAS
258
Convergence of Complex General SingularIntegral Operators
George A. Anastassiou & Razvan A. Mezei
Department of Mathematical SciencesThe University of MemphisMemphis, TN 38152, [email protected]@memphis.edu
2010 Mathematics Subject Classication:Primary : 26A15, 26D15 , 41A17, 41A25, 41A35Secondary : 26A33, 41A28.
Key Words and Phrases: general singular integral, fractional singular in-tegral, trigonometric singular integral, modulus of smoothness, right and leftCaputo fractional derivatives, complex valued functions.
Abstract. In this article we study the general complex-valued sin-gular integral operators over the real line regarding their convergenceto the unit operator with rates in the Lp norm, 1 p 1: Therelated established inequalities involve the higher order Lp modulusof smoothness of the engaged function or its higher order deriva-tive. Also we study the complex-valued fractional general singularintegral operators on the real line, regarding their convergence tothe unit operator with rates in the uniform norm. The related es-tablished inequalities involve the higher order moduli of smoothnessof the associated right and left Caputo fractional derivatives of theengaged function.We nish with applications to trigonometric sin-gular integral operators. The related simultaneous approximationsare also studied extensively.
1 Convergence of Complex General Singular In-tegral Operators Background
We consider here complex valued Borel measurable functions f : R ! C suchthat f = f1 + if2; i :=
p1: Here f1; f2 : R! R are implied to be real valued
1
259
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,259-283,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC
Borel measurable functions.Let > 0 and be a Borel probability measure on R: For r 2 N and n 2 Z+
we put
j =
((1)rj
rj
jn; j = 1; : : : ; r;
1Pr
j=1 (1)rj r
j
jn; j = 0:
(1)
Here we study the convergence of smooth general singular integral operators
r;(f ;x) :=
Z 1
1
0@ rXj=0
jf(x+ jt)
1A d(t);8 > 0: (2)
Clearly by the denition of R.H.S.(2) we have
r;(f ;x) = r;(f1;x) + ir;(f2;x): (3)
We assume that r;(fj ;x) 2 R; 8x 2 R; j = 1; 2:
I) Let f1; f2 2 Cn(R); n 2 Z+ with the rth modulus of smoothness nite,i.e.
!r(f(n)ej ; h) := sup
jtjhkrtf
(n)ej (x)k1;x <1; (4)
h > 0; where
rtf(n)ej (x) :=
rXj=0
(1)rjr
j
f(n)ej (x+ jt); (5)
ej = 1; 2:We need to introduce
k :=rXj=1
jjk; k = 1; : : : ; n 2 N:
The integrals
ck; :=
Z 1
1tkd(t)
are assumed to be nite, k = 1; : : : ; n:
One notices easily that
jr;(f ;x) f(x)j jr;(f1;x) f1(x)j+ jr;(f2;x) f2(x)j (6)
also
kr;(f ;x) f(x)k1;x kr;(f1;x) f1(x)k1;x + kr;(f2;x) f2(x)k1;x ;
(7)
2
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
260
and
kr;(f ;x) f(x)kp;x kr;(f1;x) f1(x)kp;x+kr;(f2;x) f2(x)kp;x ; p 1:(8)
Furthermore it holds
f (k)(x) = f(k)1 (x) + if
(k)2 (x); (9)
for all k = 1; : : : ; n:
2 Main Results
By using Theorem 9 of [1] we obtain
Theorem 1. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 Cn (R) ; n 2 Z+: Suppose thatZ 1
1jtjn
1 +
jtj
rd(t) <1:
Assume also that !r(f(n)j ; h) <1;8h > 0: Then r;(f ;x) f(x)
nXk=1
f (k)(x)
k!kck;
1;x
(10)
1
n!
Z 1
1jtjn
1 +
jtj
rd(t)
!r(f
(n)1 ; ) + !r(f
(n)2 ; )
:
When n = 0 the sum in L.H.S.(10) collapses.Proof. By Theorem 9 of [1] and (6), (7), (9) we get r;(f ;x) f(x)
nXk=1
f (k)(x)
k!kck;
1;x
=
"r;(f1;x) f1(x)
nXk=1
f(k)1 (x)
k!kck;
#
+i
"r;(f2;x) f2(x)
nXk=1
f(k)2 (x)
k!kck;
# 1;x
r;(f1;x) f1(x)
nXk=1
f(k)1 (x)
k!kck;
1;x
+
r;(f2;x) f2(x)nXk=1
f(k)2 (x)
k!kck;
1;x
3
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
261
!r(f(n)1 ; )
n!
Z 1
1jtjn
1 +
jtj
rd(t)
+!r(f
(n)2 ; )
n!
Z 1
1jtjn
1 +
jtj
rd(t)
=1
n!
Z 1
1jtjn
1 +
jtj
rd(t)
!r(f
(n)1 ; ) + !r(f
(n)2 ; )
;
proving the claim.
The n = 0 case follows.
Corollary 2 (to Theorem 1). Let f : R ! C : f = f1 + if2: Here j = 1; 2:Let fj 2 C (R) : Suppose Z 1
1
1 +
jtj
rd(t) <1:
Assume also !r(fj ; h) <1;8h > 0: Then
kr;(f) fk1 Z 1
1
1 +
jtj
rd(t)
(!r(f1; ) + !r(f2; )) : (11)
In [4] we proved
Theorem 3([4]). Let g 2 Cn1(R), such that g(n) exists, n; r 2 N. Further-more suppose that for each x 2 R the function g(ej)(x + jt) 2 L1(R; ) as afunction of t ; for all ej = 0; 1; : : : ; n 1; j = 1; : : : ; r: Suppose that there existej;j 0, ej = 1; : : : ; n;j = 1; : : : ; r; with ej;j 2 L1(R; ) such that for eachx 2 R we have
jg(ej)(x+ jt)j ej;j(t); (12)
for almost all t 2 R, all ej = 1; : : : ; n; j = 1; 2; : : : ; r: Then g(ej)(x+jt) denesa integrable function with respect to t for each x 2 R, all ej = 1; : : : ; n;j = 1; : : : ; r, and
(r; (g;x))(ej)= r;
g(ej);x ; (13)
for all x 2 R, all ej = 1; : : : ; n:We present the following simultaneous approximation result.
Theorem 4. Let f : R ! C; such that f = f1 + if2: Here j = 1; 2: Let
fj 2 Cn+ (R) ; n; 2 Z+; and !r(f (n+ej)
j ; h) < 1;8h > 0; for ej = 0; 1; : : : ; :Suppose Z 1
1jtjn
1 +
jtj
rd(t) <1:
4
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
262
We consider the assumptions of Theorem 3 valid regarding f1; f2 for n = :Then (r;(f ;x))(ej) f(ej)(x)
nXk=1
f(k+ej)(x)k!
kck;
1;x
1
n!
Z 1
1jtjn
1 +
jtj
rd(t)
!r(f
(n+ej)1 ; ) + !r(f
(n+ej)2 ; )
; (14)
for all ej = 0; 1; : : : ; : When n = 0 the sum in L.H.S.(14) collapses.Proof. Similar to Theorem 1 here, and based on Theorem 8 of [4].
II) Here let f1; f2 2 Cn(R) with f (n)1 ; f(n)2 2 Lp(R); 1 p < 1: We need
the rth Lp-modulus of smoothness
!r(f(n)ej ; h)p := sup
jtjhkrtf
(n)ej (x)kp;x; h > 0; with ej = 1; 2: (15)
Here we assume that !r(f(n)ej ; h)p <1; h > 0; ej = 1; 2:
We present
Theorem 5. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 Cn (R) with f (n)j 2 Lp (R) ; n 2 N; p; q > 1 : 1p +
1q = 1: Assume thatZ 1
1
"1 +
jtj
rp+1 1#jtjnp1 d(t) <1;
and ck; 2 R; k = 1; : : : ; n: Then r;(f ;x) f(x)nXk=1
f (k)(x)
k!kck;
p;x
1
((n 1)!)(q(n 1) + 1)1q (rp+ 1)
1p
"Z 1
1
1 +
jtj
rp+1 1!jtjnp1 d(t)
# 1p
1p
!r(f
(n)1 ; )p + !r(f
(n)2 ; )p
: (16)
Proof. By Theorem 1 of [2] and (6), (8), (9) we get r;(f ;x) f(x)nXk=1
f (k)(x)
k!kck;
p;x
=
"r;(f1;x) f1(x)
nXk=1
f(k)1 (x)
k!kck;
#
5
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
263
+i
"r;(f2;x) f2(x)
nXk=1
f(k)2 (x)
k!kck;
# p;x
r;(f1;x) f1(x)
nXk=1
f(k)1 (x)
k!kck;
p;x
+
r;(f2;x) f2(x)nXk=1
f(k)2 (x)
k!kck;
p;x
R:H:S(16);
proving the claim.
Based on Proposition 3 of [2], similarly we give
Proposition 6. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ Lp (R)) ; p; q > 1 : 1p +
1q = 1: Assume thatZ 1
1
1 +
jtj
rpd(t) <1:
Then
kr;(f) fkp Z 1
1
1 +
jtj
rpd(t)
1p
(!r(f1; )p + !r(f2; )p) : (17)
Based on Theorem 2 of [2] we get similarly
Theorem 7. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 Cn (R) with f (n)j 2 L1 (R) ; n 2 N: Assume thatZ 1
1
"1 +
jtj
r+1 1#jtjn1 d(t) <1;
and ck; 2 R; k = 1; : : : ; n: Then r;(f ;x) f(x)nXk=1
f (k)(x)
k!kck;
1;x
1
(n 1)! (r + 1)
"Z 1
1
1 +
jtj
r+1 1!jtjn1 d(t)
#(18)
!r(f
(n)1 ; )1 + !r(f
(n)2 ; )1
:
Based on Proposition 4 of [2], we give similarly
6
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
264
Proposition 8. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ L1 (R)) : AssumeZ 1
1
1 +
jtj
rd(t) <1:
Then
kr;(f) fk1 Z 1
1
1 +
jtj
rd(t)
(!r(f1; )1 + !r(f2; )1) : (19)
Next we give simultaneous approximation results.
Theorem 9. Let f : R ! C; such that f = f1 + if2: Here j = 1; 2: Let
fj 2 Cn+ (R) ; n 2 N; 2 Z+; with f (n+ej)
j 2 Lp (R) ; ej = 0; 1; : : : ; : Let
p; q > 1 : 1p +1q = 1: Assume that
R11
1 + jtj
rp+1 1jtjnp1 d(t) <1;
and ck; 2 R; k = 1; : : : ; n: We consider the assumptions of Theorem 3 validregarding f1; f2 for n = : Then (r;(f ;x))(ej) f (ej)(x)
nXk=1
f (k+ej)(x)k!
kck;
p;x
1
((n 1)!)
1
(q(n 1) + 1)1q (rp+ 1)
1p
!r(f
(n+ej)1 ; )p + !r(f
(n+ej)2 ; )p
"Z 1
1
1 +
jtj
rp+1 1!jtjnp1 d(t)
# 1p
1p ; (20)
for all ej = 0; 1; : : : ; :Proof. By Theorem 11 of [4], and as in the proof of Theorem 5 here.
We give the related
Proposition 10. Let f : R ! C; such that f = f1 + if2: Let f(ej)1 ; f
(ej)2 2
(C (R) \ Lp (R)) ; ej = 0; 1; : : : ; 2 Z+; p; q > 1 : 1p + 1q = 1: Assume thatZ 1
1
1 +
jtj
rpd(t) <1:
We consider the assumptions of Theorem 3 valid regarding f1; f2 for n = :Then (r;(f))(ej) f(ej)
p
Z 1
1
1 +
jtj
rpd(t)
1p !r(f
(ej)1 ; )p + !r(f
(ej)2 ; )p
; (21)
7
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
265
ej = 0; 1; : : : ; :Proof. By Proposition 12 of [4].
Next comes the related L1 result.
Theorem 11. Let f : R ! C; such that f = f1 + if2; and j = 1; 2: Let
f1; f2 2 Cn+ (R) ; with f (n+ej)
j 2 L1 (R) ; n 2 N; ej = 0; 1; : : : ; 2 Z+: Assumethat Z 1
1
1 +
jtj
r+1 1!jtjn1d(t) <1;
and ck; 2 R; k = 1; : : : ; n: We consider the assumptions of Theorem 3 validregarding f1; f2 for n = : Then (r;(f ;x))(ej) f(ej)(x)
nXk=1
f(k+ej)(x)k!
kck;
1;x
1
(n 1)! (r + 1)
"Z 1
1
1 +
jtj
r+1 1!jtjn1d(t)
# (22)
!r(f
(n+ej)1 ; )1 + !r(f
(n+ej)2 ; )1
;
for all ej = 0; 1; : : : ; :Proof. Based on Theorem 15 of [4].
The last simultaneous approximation result follows
Proposition 12. Let f : R ! C; such that f = f1 + if2: Here f(j)1 ; f
(j)2 2
(C (R) \ L1 (R)) ; j = 0; 1; : : : ; 2 Z+: AssumeZ 1
1
1 +
jtj
rd(t) <1:
We consider the assumptions of Theorem 3 valid regarding f1; f2 for n = :Then (r;(f))(j) f (j)
1Z 1
1
1 +
jtj
rd(t)
!r(f
(j)1 ; )1 + !r(f
(j)2 ; )1
;
(23)for all j = 0; 1; : : : ; :Proof. Based on Proposition 16 of [4].
III) We need
Denition 13. Let r 2 N; > 0: We dene
j =
((1)rj
rj
j ; j = 1; : : : ; r;
1Pr
j=1 (1)rj r
j
j ; j = 0:
(24)
8
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
266
Denote
k =rXj=1
jjk; k = 1; : : : ;m 1; (25)
where m = d e ; de is the ceiling of a number:
In the next let > 0; x; x0 2 R; f : R ! C Borel measurable, such that
f = f1 + if2: Suppose f1; f2 2 Cm (R) ; with f (m)1
1<1;
f (m)2
1<1:
Let probability Borel measure on R; 8 > 0: Consider the fractionalintegral
r;(f ;x) : =
Z 1
1
0@ rXj=0
jf(x+ jt)
1A d(t) (26)
=
Z 1
1
0@ rXj=0
jf1(x+ jt)
1A d(t) + iZ 1
1
0@ rXj=0
jf2(x+ jt)
1A d(t)= r;(f1;x) + ir;(f2;x):
We assume here that r; (f1; x) ;r; (f2; x) 2 R; 8x 2 R:Assume existence of ck; :=
R11 t
kd(t); k = 1; : : : ;m 1: Also supposethe existence of
R11 jtj
+kd(t); k = 0; 1; : : : ; r:
Using Theorem 18 of [3], we obtain similarly, as in Theorem 1 here, the nextresult.
Theorem 14. It holds r; (f; ) f ()m1Xk=1
f (k)()k!
kck;
1
"
rXk=0
r!
(r k)! ( + k + 1) kZ 1
1jtj +k d(t)
#
supx2R
max
!rD xf1;
; !r (D
xf1; )
(27)
+supx2R
max
!rD xf2;
; !r (D
xf2; )
:
If m = 1 the sum disappears in L.H.S.(27):
Denition 15 (for Theorem 14). Let j = 1; 2: Above D x0fj is the right
Caputo fractional derivative of order > 0 is given by
D x0fj(x) :=
(1)m
(m )
Z x0
x
( x)m 1 f (m)j ()d; (28)
9
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
267
8x x0 2 R xed:We assume D
x0f(x) = 0;8x > x0:
Also D x0fj is the left Caputo fractional derivative of order > 0 is given
by
D x0fj(x) :=
1
(m )
Z x
x0
(x t)m 1 f (m)j (t)dt; (29)
8x x0 2 R xed, where () =R10ett1dt; > 0:
We assume D x0fj(x) = 0; for x < x0:
3 Convergence of Complex Trigonometric Sin-gular Integral Operators
In this section we apply the general theory of this article to the complex-valuedtrigonometric smooth general singular integral operator Tr;(f; x) dened below.We make
Remark 16. We need the following preliminary result.Let j;m 2 Z; m 1 such that 0 j < 2m 1: The integralZ 1
1xjsinx
x
2mdx =
2R10xjsin xx
2mdx; if j is even
0; if j is odd; (30)
is an (absolutely) convergent integral (See also Note 17).
According to [5], page 210, item 1033, we obtaincase 1: j is even, j < 2m 1Z 1
0
xjsinx
x
2mdx =
(1) 2mj2 (2m)!
2j+1(2m j 1)!
mXk=1
(1)k k2mj1
(m k)!(m+ k)! ; (31)
andcase 2: j is odd, j < 2m 1Z 1
0
xjsinx
x
2mdx =
(1)j12 (2m)!
2j (2m j 1)!
mXk=1
(1)mk k2mj1 [ln (2k)]
(m k)!(m+ k)! : (32)
In particular, for j = 0 the formula (31) becomesZ 1
0
sinx
x
2mdx = (1)mm
mXk=1
(1)k k2m1
(m k)!(m+ k)! : (33)
10
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
268
We consider here complex valued Borel measurable functions f : R ! Csuch that f = f1 + if2; i :=
p1:
Let 2 N and > 0: Here we study the convergence of smooth trigonometricsingular integral operators
Tr;(f ;x) :=1
W
Z 1
1
0@ rXj=0
jf(x+ jt)
1A sin (t=)t
2dt; (34)
where
W =
Z 1
1
sin (t=)
t
2dt
= 212Z 1
0
sin t
t
2dt (35)
(33)= 212(1)
Xk=1
(1)k k21
( k)!( + k)! :
Clearly by the denition of R.H.S.(34) we have
Tr;(f ;x) = Tr;(f1;x) + iTr;(f2;x): (36)
We assume that Tr;(fj ;x) 2 R; 8x 2 R; j = 1; 2:
Let bc denote the integer part of a real number and let
ck; :=1
W
Z 1
1tksin (t=)
t
2dt; k = 1; : : : ; n: (37)
Note 17. As in the proof of Theorem 6 from [2], inequality (54) there, for
> k+12 we have Z 1
0
tksin t
t
2dt <1: (38)
Hence
ck; =1
Wk+12
Z 1
1tksin t
t
2dt
(35)=
8<:kR10tk( sin tt )
2dtR1
0 (sin tt )
2dt; k = even
0; k = odd
< 1; (39)
for any k such that > k+12 :
11
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
269
I) Let f1; f2 2 Cn(R); n 2 Z+ with the rth modulus of smoothness nite,i.e. !r(f
(n)ej ; h) <1; h > 0 and let 2 N; > n+12 :
One notices easily that
jTr;(f ;x) f(x)j jTr;(f1;x) f1(x)j+ jTr;(f2;x) f2(x)j (40)
also
kTr;(f ;x) f(x)k1;x kTr;(f1;x) f1(x)k1;x + kTr;(f2;x) f2(x)k1;x ;
(41)and
kTr;(f ;x) f(x)kp;x kTr;(f1;x) f1(x)kp;x+kTr;(f2;x) f2(x)kp;x ; p 1:(42)
By using Theorem 14 of [1] we obtain
Theorem 18. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Let fj 2Cn (R) ; n 2 Z+ and 1 +
n+r+1
2
: Assume also !r(f
(n)j ; h) < 1;8h > 0:
Then Tr;(f ;x) f(x)bn=2cXk=1
f (2k)(x)
(2k)!2kc2k;
1;x
1
(1)hP
k=1(1)k k21
(k)!(+k)!
i"Z 1
0
tn (1 + t)r
sin t
t
2dt
#!r(f
(n)1 ; ) + !r(f
(n)2 ; )
nn!: (43)
When n = 0; 1 the sum in L.H.S.(43) collapses.Proof. By Theorem 14 of [1] and (40), (41), (9), similar to the proof of Theorem1.
The n = 0 case follows.
Corollary 19 (to Theorem 18). Let f : R! C : f = f1 + if2: Here j = 1; 2:Let fj 2 C (R) and 1 +
r+12
: Assume also !r(fj ; h) <1;8h > 0: Then
kTr;(f) fk1
hR10(1 + t)
r sin tt
2dti
(1)hP
k=1(1)k k21
(k)!(+k)!
i (!r(f1; ) + !r(f2; )) :(44)
In [4] we mentioned
Theorem 20 ([4, Theorem 22 there]). Let g 2 Cn1(R), such that g(n) exists,n; r 2 N. Furthermore suppose that for each x 2 R the function g(
ej)(x +12
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
270
jt) 2 L1
R;sin(t=)
t
2dt
as a function of t ; for all ej = 0; 1; : : : ; n 1;
j = 1; : : : ; r: Suppose that there exist ej;j 0, ej = 1; : : : ; n; j = 1; : : : ; r; with
ej;j 2 L1R;sin(t=)
t
2dt
such that for each x 2 R we have
jg(ej)(x+ jt)j ej;j(t); (45)
for almost every t 2 R, all ej = 1;: : : ; n; j = 1; 2; : : : ; r: Then g(ej)(x+ jt) denesa Lebesgue integrable function with respect to t for each x 2 R, all ej = 1; : : : ; n;j = 1; : : : ; r, and
(Tr; (f ;x))(ej)= Tr;
f (ej);x ; (46)
for all x 2 R, all ej = 1; : : : ; n.We present the following simultaneous approximation result.
Theorem 21. Let f : R ! C; such that f = f1 + if2: Here j = 1; 2: Let fj 2Cn+ (R) ; n; 2 Z+; 2 N; 1 +
r+n+1
2
and !r(f
(n+ej)j ; h) < 1;8h > 0;
for ej = 0; 1; : : : ; : We consider the assumptions of Theorem 20 valid regardingf1; f2 for n = : Then (Tr;(f ;x))(ej) f(ej)(x)
bn=2cXk=1
f(2k+ej)(x)
(2k)!2kc2k;
1;x
n
n!
hR10tn (1 + t)
r sin tt
2dti
hR10
sin tt
2dti
!r(f(n+ej)1 ; ) + !r(f
(n+ej)2 ; )
; (47)
for all ej = 0; 1; : : : ; : When n = 0; 1 the sum in L.H.S.(47) collapses.Proof. Similar to Theorem 4 here, and based on Theorem 27 of [4].
II) Here let f1; f2 2 Cn(R) with f (n)1 ; f(n)2 2 Lp(R); 1 p <1: We assume
that !r(f(n)ej ; h)p <1; h > 0; ej = 1; 2:
We present
Theorem 22. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Let fj 2Cn (R) with f (n)j 2 Lp (R) ; n 2 N; p; q > 1 : 1p +
1q = 1; 2 N; >
drpe+np+12 :
Then Tr;(f ;x) f(x)bn=2cXk=1
f (2k)(x)
(2k)!2kc2k;
p;x
13
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
271
24 1R10
sin tt
2dt drpe+1X
h=1
Z 1
0
tnp1+hsin t
t
2dt
35 1p
(48)
n
((n 1)!)(q(n 1) + 1)1q (rp+ 1)
1p
!r(f
(n)1 ; )p + !r(f
(n)2 ; )p
:
When n = 0; 1 the sum in L.H.S.(48) collapses.Proof. By Theorem 6 of [2] and (40), (42), (9), similar to Theorem 5 here.
Based on Proposition 8 of [2], similarly we give
Proposition 23. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ Lp (R)) ; p; q > 1 : 1p +
1q = 1; 2 N; >
drpe+12 :Then
kTr;(f) fkp
24 1R10
sin tt
2dt
drpeXh=0
Z 1
0
thsin t
t
2dt
35 1p
(!r(f1; )p + !r(f2; )p) :
(49)
Based on Theorem 7 of [2] we get similarly
Theorem 24. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 Cn (R) with f (n)j 2 L1 (R) ; n 2 N; 2 N; > r+1+n
2 : Then Tr;(f ;x) f(x)bn=2cXk=1
f (2k)(x)
(2k)!2kc2k;
1;x
(50)
n!r(f
(n)1 ; )1 + !r(f
(n)2 ; )1
(n 1)! (r + 1)
hR10
sin tt
2dti r+1Xh=1
"Z 1
0
tn1+hsin t
t
2dt
#:
When n = 0; 1 the sum in L.H.S.(50) collapses.
Based on Proposition 9 of [2], we give similarly
Proposition 25. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ L1 (R)) ; 2 N; > r+1
2 : Then
kTr;(f) fk1 (!r(f1; )1 + !r(f2; )1)hR1
0
sin tt
2dti rX
h=0
"Z 1
0
thsin t
t
2dt
#: (51)
Next we give simultaneous approximation results.
14
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
272
Theorem 26. Let f : R ! C; such that f = f1 + if2: Here j = 1; 2: Let
fj 2 Cn+ (R) ; n 2 N; 2 Z+; with f (n+ej)
j 2 Lp (R) ; ej = 0; 1; : : : ; : Let
p; q > 1 : 1p +1q = 1; 2 N; > drpe+np+1
2 : We consider the assumptions ofTheorem 20 valid regarding f1; f2 for n = : Then (Tr;(f ;x))(ej) f (ej)(x)
bn=2cXk=1
f (2k+ej)(x)
(2k)!2kc2k;
p;x
1
((n 1)!)
1
(q(n 1) + 1)1q (rp+ 1)
1p
!r(f
(n+ej)1 ; )p + !r(f
(n+ej)2 ; )p
24 1hR10
sin tt
2dti drpe+1X
h=1
Z 1
0
tnp1+hsin t
t
2dt
35 1p
n; (52)
for all ej = 0; 1; : : : ; : When n = 0; 1 the sum in L.H.S.(52) collapses.Proof. By Theorem 30 of [4], and as in the proof of Theorem 5 here.
We give the related
Proposition 27. Let f : R ! C; such that f = f1 + if2: Let f(ej)1 ; f
(ej)2 2
(C (R) \ Lp (R)) ; ej = 0; 1; : : : ; 2 Z+; p; q > 1 : 1p + 1q = 1; 2 N; >
drpe+12 :
We consider the assumptions of Theorem 20 valid regarding f1; f2 for n = :Then
(Tr;(f))(ej) f(ej) p
24Pdrpeh=0
R10thsin tt
2dthR1
0
sin tt
2dti
35 1p !r(f
(ej)1 ; )p + !r(f
(ej)2 ; )p
;
(53)ej = 0; 1; : : : ; :Proof. By Proposition 31 of [4].
Next comes the related L1 result.
Theorem 28. Let f : R ! C; such that f = f1 + if2; and j = 1; 2: Let
f1; f2 2 Cn+ (R) ; with f (n+ej)
j 2 L1 (R) ; n 2 N; ej = 0; 1; : : : ; 2 Z+; 2 N; > r+n+1
2 : We consider the assumptions of Theorem 20 valid regarding f1; f2for n = : Then (Tr;(f ;x))(ej) f(ej)(x)
bn=2cXk=1
f(2k+ej)(x)
(2k)!2kc2k;
1;x
1
(n 1)! (r + 1)hR10
sin tt
2dti "r+1X
h=1
Z 1
0
tn1+hsin t
t
2dt
#n (54)
!r(f
(n+ej)1 ; )1 + !r(f
(n+ej)2 ; )1
;
15
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
273
for all ej = 0; 1; : : : ; : When n = 0; 1 the sum in L.H.S.(54) collapses.Proof. Based on Theorem 34 of [4].
The last simultaneous approximation result follows
Proposition 29. Let f : R ! C; such that f = f1 + if2: Here f(j)1 ; f
(j)2 2
(C (R) \ L1 (R)) ; j = 0; 1; : : : ; 2 Z+; 2 N; > r+12 : We consider the
assumptions of Theorem 20 valid regarding f1; f2 for n = : Then (Tr;(f))(j) f (j) 1 1hR1
0
sin tt
2dti " rX
h=0
Z 1
0
thsin t
t
2dt
#(55)
!r(f
(j)1 ; )1 + !r(f
(j)2 ; )1
;
for all j = 0; 1; : : : ; :Proof. Based on Proposition 35 of [4].
III) In the next let > 0; x; x0 2 R; f : R! C Borel measurable, such thatf = f1 + if2: Suppose f1; f2 2 Cm (R) ; with
f (m)1
1<1;
f (m)2
1<1:
Consider the fractional integral
T r;(f ;x) : =1
W
Z 1
1
0@ rXj=0
jf(x+ jt)
1A sin (t=)t
2dt (56)
=1
W
Z 1
1
0@ rXj=0
jf1(x+ jt)
1A sin (t=)t
2dt
+i
W
Z 1
1
0@ rXj=0
jf2(x+ jt)
1A sin (t=)t
2dt
= T r;(f1;x) + iT r;(f2;x):
We assume here that T r; (f1; x) ; T r; (f2; x) 2 R; 8x 2 R:Let 2 N; > +r+1
2 ; > 0; r 2 N:
Using Theorem 23 of [3], we obtain similarly, as in Theorem 1 here, the nextresult.
Theorem 30. It holds T r; (f; ) f ()bm1
2 cXk=1
f (2k)()(2k)!
2kc2k;
1
"
rXk=0
r!
(r k)! ( + k + 1)
R10t +k
sin tt
2dtR1
0
sin tt
2dt
#
16
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
274
supx2R
max
!rD xf1;
; !r (D
xf1; )
(57)
+supx2R
max
!rD xf2;
; !r (D
xf2; )
:
If m = 1; 2 the sum disappears in L.H.S.(57):
4 Applications to Particular Complex Trigono-metric Singular Operators
In this section we work on the approximation results given in the previoussection, for some particular values of r; n; p and :
Case = 2: We have the following resultsTheorem 31. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 C1(R): Assume !r(f 0j ; h) <1;8h > 0: Then
kT1;(f) fk1 3
hln 2 +
4
i(!1(f
01; ) + !1(f
02; )) : (58)
Proof. By Theorem 18, with n = r = 1; = 2:
Corollary 32. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ L1 (R)) : Then
kT1;(f) fk1 (!1(f1; )1 + !1(f2; )1)3 ln 2
+ 1
: (59)
Proof. By Proposition 25, with r = 1; = 2.
Corollary 33. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 C1 (R) with f 0j 2 L1(R). Then
kT1;(f ;x) f(x)k1 3
2
ln 2 +
4
(!1(f
01; )1 + !1(f
02; )1) : (60)
Proof. By Theorem 24, with r = n = 1; = 2.
Corollary 34. Let f : R ! C; such that f = f1 + if2: Here j = 1; 2: Let
fj 2 C1+ (R) ; 2 Z+ and !1(f (1+ej)
j ; h) < 1;8h > 0; for ej = 0; 1; : : : ; : Weconsider the assumptions of Theorem 20 valid regarding f1; f2 for n = : Then (T1;(f ;x))(ej) f(ej)(x)
1;x 3
ln 2 +
4
!1(f
(1+ej)1 ; ) + !1(f
(1+ej)2 ; )
;
(61)for all ej = 0; 1; : : : ; :
17
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
275
Proof. We are applying Theorem 21 here for n = r = 1; = 2.
Corollary 35. Let f : R ! C; such that f = f1 + if2; and j = 1; 2: Letf1; f2 2 C1+(R) and f (ej+1) 2 L1(R); ej = 0; 1; : : : ; 2 Z+: We consider theassumptions of Theorem 20 valid regarding f1; f2 for n = : Then
k (T1;(f ;x))(ej) f(ej)(x)k1 3
2
ln 2 +
4
!1(f
(1+ej)1 ; )1 + !1(f
(1+ej)2 ; )1
;
(62)for all ej = 0; 1; : : : ; :Proof. We are applying Theorem 28 here for n = r = 1; = 2.
Corollary 36. Let f : R ! C; such that f = f1 + if2: Let f(ej)1 ; f
(ej)2 2
(C(R) \ L2 (R)) ; ej = 0; 1; : : : ; 2 Z+;We consider the assumptions of Theorem20 valid regarding f1; f2 for n = . Then
k (T1;(f))(ej) f(ej)k2 !1(f (ej)1 ; )2 + !1(f
(ej)2 ; )2
r74+3
ln 2: (63)
for all ej = 0; 1; : : : :Proof. By Proposition 27, with p = 2; r = 1; = 2.
Corollary 37. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ L2 (R)) : Then
kT1;(f) fk2 (!1(f1; )2 + !1(f2; )2)r7
4+3
ln 2: (64)
Proof. By Proposition 23, with p = 2; r = 1; = 2.
Corollary 38. Let f : R ! C; such that f = f1 + if2: Here f(j)1 ; f
(j)2 2
(C(R) \ L1 (R)) ; j = 0; 1; : : : ; 2 Z+;We consider the assumptions of Theorem20 valid regarding f1; f2 for n = : Then
k (T1;(f))(j) f (j)k1 !1(f
(j)1 ; )1 + !1(f
(j)2 ; )1
3 ln 2
+ 1
; (65)
for all j = 0; 1; : : : :Proof. By Proposition 29, with r = 1; = 2.
Corollary 39. Let f : R ! C; such that f = f1 + if2: Here f(j)1 ; f
(j)2 2
(C(R) \ L1 (R)) ; j = 0; 1; : : : ; 2 Z+;We consider the assumptions of Theorem20 valid regarding f1; f2 for n = : Then
k (T2;(f))(j) f (j)k1 !2(f
(j)1 ; )1 + !2(f
(j)2 ; )1
74+3
ln 2
; (66)
for all j = 0; 1; : : : :
18
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
276
Proof. By Proposition 29, with r = = 2.
Corollary 40. Consider the assumptions of Theorem 30 are fullled. Then
T 1; (f; ) f () 1 56p2 1615
!12
supx2R
nmax
h!1
D
12xf1;
; !1
D
12xf1;
io(67)
+supx2R
nmax
h!1
D
12xf2;
; !1
D
12xf2;
io:
Proof. By Theorem 30, with = 2; = 12 ; r = 1 :
Case = 3: We have the following resultsCorollary 41. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ L1 (R)) : Then
kT2;(f) fk1 (!2(f1; )1 + !2(f2; )1) 40
11ln
32716
4
!+16
11
!: (68)
Proof. By Proposition 25, with r = 2; = 3.
Corollary 42. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ L1 (R)) : Then
kT3;(f)fk1 (!3(f1; )1 + !3(f2; )1) 40
11ln
32716
4
!+16
11+15
22ln256
27
!:
(69)Proof. By Proposition 25, with r = 3; = 3.
Corollary 43. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 C1 (R) with f 0j 2 L2 (R) : Then
kT1;(f ;x) f(x)k2 r
5
22ln256
27+25
66
! (!1(f
01; )2 + !1(f
02; )2) : (70)
Proof. By Theorem 22, with p = 2; r = n = 1; = 3.
Corollary 44. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ L2 (R)) : Then
kT2;(f) fk2 (!2(f1; )2 + !2(f2; )2)
vuut 40
11ln
32716
4
!+15
22ln256
27+47
22:
(71)
19
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
277
Proof. By Proposition 23, with p = r = 2; = 3.
Corollary 45. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 C1 (R) with f 0j 2 L1(R): Then
kT1;(f ;x)f(x)k1 20
11ln
32716
4
!+5
22
! (!1(f
01; )1 + !1(f
02; )1) : (72)
Proof. By Theorem 24, with r = n = 1; = 3.
Corollary 46. f : R! C such that f = f1+if2: Here j = 1; 2: Let fj 2 C2 (R)with f 00j 2 L1(R): Then
kT2;(f ;x)f(x)f 00(x)
22c2;k1
25
66+
5
22ln256
27
2 (!2(f
001 ; )1 + !2(f
002 ; )1) :
(73)Proof. By Theorem 24, with r = n = 2; = 3.
Corollary 47. Let f : R! C; such that f = f1+ if2: Here j = 1; 2: Let fj 2C1+(R); 2 Z+: Assume also !1(f (1+
ej)j ; h) < 1;8h > 0; for ej = 0; 1; : : : ; :
We consider the assumptions of Theorem 20 valid regarding f1; f2 for n = :Then (T1;(f ;x))(ej) f(ej)(x)
1;x 5
22[2 32 ln 2 + 27 ln 3] (74)
!1(f
(1+ej)1 ; ) + !1(f
(1+ej)2 ; )
;
for all ej = 0; 1; : : : ; :Proof. We are applying Theorem 21 here for n = r = 1; = 3.
Corollary 48. Let f : R ! C; such that f = f1 + if2: Here j = 1; 2: Let
fj 2 C(R); 2 Z+: Assume also !3(f (ej)j ; h) < 1;8h > 0; for ej = 0; 1; : : : ; :
We consider the assumptions of Theorem 20 valid regarding f1; f2 for n = :Then (T1;(f ;x))(ej) f(ej)(x)
1;x 2
11[13 90 ln 2 + 90 ln 3] (75)
!3(f
(ej)1 ; ) + !3(f
(ej)2 ; )
;
for all ej = 0; 1; : : : ; :Proof. We are applying Theorem 21 here for n = 0; r = 3; = 3.
Corollary 49. Let f : R ! C; such that f = f1 + if2: Here j = 1; 2: Let
fj 2 C1+ (R) ; with f (1+ej)
j 2 L2(R); ej = 0; 1; : : : 2 Z+: We consider the
20
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
278
assumptions of Theorem 20 valid regarding f1; f2 for n = : Then
k (T1;(f ;x))(ej) f(ej)(x)k2
r5
22ln256
27+25
66
!(76)
!1(f
(1+ej)1 ; )2 + !1(f
(1+ej)2 ; )2
;
for all ej = 0; 1; : : : ; :Proof. By Theorem 26, with p = 2; r = n = 1; = 3.
Corollary 50. Let f : R ! C; such that f = f1 + if2; and j = 1; 2: Let
f1; f2 2 C2+ (R) ; with f (2+ej)
j 2 L1(R); ej = 0; 1; : : : 2 Z+: We consider theassumptions of Theorem 20 valid regarding f1; f2 for n = : Then
k (T2;(f ;x))(ej) f(ej)(x) + 5
222f(
ej+2)(x)k1 25
66+
5
22ln256
27
2!2(f
(2+ej)1 ; )1 + !2(f
(2+ej)2 ; )1
; (77)
for all ej = 0; 1; : : : ; :Proof. By Theorem 28, with r = n = 2; = 3.
Corollary 51. Let f : R ! C; such that f = f1 + if2: Let f(ej)1 ; f
(ej)2 2
(C(R) \ L2 (R)) ; ej = 0; 1; : : : ; 2 Z+;We consider the assumptions of Theorem20 valid regarding f1; f2 for n = : Then
k (T2;(f))(ej) f(ej)k2 !2(f (ej)1 ; )2 + !2(f
(ej)2 ; )2
vuut 40
11ln
32716
4
!+15
22ln256
27+47
22: (78)
for all ej = 0; 1; : : : ; .Proof. By Proposition 27, with p = r = 2; = 3.
Corollary 52. Let f : R ! C; such that f = f1 + if2: Here f(j)1 ; f
(j)2 2
(C(R) \ L1 (R)) ; j = 0; 1; : : : ; 2 Z+;We consider the assumptions of Theorem20 valid regarding f1; f2 for n = : Then
k (T1;(f))(j) f (j)k1 !1(f
(j)1 ; )1 + !1(f
(j)2 ; )1
1 +
40
11ln
32716
4
!!;
(79)for all j = 0; 1; : : : ; :Proof. By Proposition 29, with r = 1; = 3.
Corollary 53. Consider the assumptions of Theorem 30 are fullled. Then
21
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
279
T 2; (f; ) f () 1 64
1155
95 + 252
p2 127
p3
32
supx2R
nmax
h!2
D
32xf1;
; !2
D
32xf1;
io+supx2R
nmax
h!2
D
32xf2;
; !2
D
32xf2;
io:(80)
Proof. By Theorem 30, with = 3; = 32 ; r = 2:
Case = 4: We have the following resultsCorollary 54. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ L1 (R)) : Then
kT1;(f) fk1 (!1(f1; )1 + !1(f2; )1)1 +
630
151ln2104=15
381=20
: (81)
Proof. By Proposition 25, with r = 1; = 4.
Corollary 55. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 C1 (R) with f 0j 2 L2 (R) : Then
kT1;(f ;x) f(x)k2 s
35
151+210
151ln
327=8
32
! (!1(f
01; )2 + !1(f
02; )2) :
(82)Proof. By Theorem 22, with p = 2; r = n = 1; = 4.
Corollary 56. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ L2 (R)) : Then
kT2;(f) fk2 (!2(f1; )2 + !2(f2; )2)r630
151ln229=15
327=40+256
151: (83)
Proof. By Proposition 23, with p = r = 2; = 4.
Corollary 57. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 C1 (R) with f 0j 2 L1(R). Then
kT5;(f ;x) f(x)k1 105
151ln229=15
327=40+
945
1208ln4
3+1085
4832
(!5(f 01; )1 + !5(f 02; )1) : (84)
Proof. By Theorem 24, with r = 5; n = 1; = 4.
Corollary 58. Let f : R! C; such that f = f1 + if2: Here j = 1; 2: Let fj 2C2+(R); 2 Z+: Assume also !1(f (2+
ej)j ; h) < 1;8h > 0; for ej = 0; 1; : : : :
22
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
280
We consider the assumptions of Theorem 20 valid regarding f1; f2 for n = :Then (T1;(f ;x))(ej) f(ej)(x) 1056042f (2+ej)(x)
1;x
[2 120 ln 2 + 81 ln 3]
1051208
!1(f
(2+ej)1 ; ) + !1(f
(2+ej)2 ; )
2; (85)
for all ej = 0; 1; : : : ; :Proof. We are applying Theorem 21 here for n = 2; r = 1; = 4.
Corollary 59. Let f : R ! C; such that f = f1 + if2: Here j = 1; 2: Let
fj 2 C1+ (R) ; with f (1+ej)
j 2 L2(R); ej = 0; 1; : : : 2 Z+: We consider theassumptions of Theorem 20 valid regarding f1; f2 for n = : Then
k (T1;(f ;x))(ej) f(ej)(x)k2
s35
151+210
151ln
327=8
32
!!1(f
(1+ej)1 ; )2 + !1(f
(1+ej)2 ; )2
; (86)
for all ej = 0; 1; : : : ; :Proof. By Theorem 26, with p = 2; r = n = 1; = 4.
Corollary 60. Let f : R ! C; such that f = f1 + if2; and j = 1; 2: Let
f1; f2 2 C3+ (R) ; with f (3+ej)
j 2 L1(R); ej = 0; 1; : : : 2 Z+: We consider theassumptions of Theorem 20 valid regarding f1; f2 for n = : Then (T3;(f ;x))(ej) f(ej)(x) 385
12082f(
ej+2)(x) 1
315
604ln39=4
211=4+2415
19328
3!3(f
(3+ej)1 ; )1 + !3(f
(3+ej)2 ; )1
; (87)
for all ej = 0; 1; : : : ; :Proof. By Theorem 28, with r = n = 3; = 4.
Corollary 61. Let f : R ! C; such that f = f1 + if2: Let f(ej)1 ; f
(ej)2 2
(C(R) \ L2 (R)) ; ej = 0; 1; : : : ; 2 Z+;We consider the assumptions of Theorem20 valid regarding f1; f2 for n = : Then
k (T2;(f))(ej) f(ej)k2 !2(f (ej)1 ; )2 + !2(f
(ej)2 ; )2
r 630
151ln229=15
327=40+256
151:
(88)for all ej = 0; 1; : : : ; :Proof. By Proposition 27, with p = r = 2; = 4.
23
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
281
Corollary 62. Let f : R ! C; such that f = f1 + if2: Let f(ej)1 ; f
(ej)2 2
(C(R) \ L2 (R)) ; ej = 0; 1; : : : ; 2 Z+;We consider the assumptions of Theorem20 valid regarding f1; f2 for n = : Then
k (T1;(f))(ej) f(ej)k2 !1(f (ej)1 ; )2 + !1(f
(ej)2 ; )2
r 630
151ln2104=15
381=20+407
302:
(89)for all ej = 0; 1; : : : ; :Proof. By Proposition 27, with p = 2; r = 1; = 4.
Corollary 63. Let f : R ! C; such that f = f1 + if2: Here f(j)1 ; f
(j)2 2
(C(R) \ L1 (R)) ; j = 0; 1; : : : ; 2 Z+;We consider the assumptions of Theorem20 valid regarding f1; f2 for n = : Then
k (T1;(f))(j) f (j)k1 !1(f
(j)1 ; )1 + !1(f
(j)2 ; )1
1 +
630
151ln2104=15
381=20
;
(90)for all j = 0; 1; : : : ; :Proof. By Proposition 29, with r = 1; = 4.
Corollary 64. Consider the assumptions of Theorem 30 are fullled. Then
T 2; (f; ) f () 1 1024
971685
10011 15848
p2 + 21303
p312
supx2R
nmax
h!2
D
12xf1;
; !2
D
12xf1;
io(91)
+supx2R
nmax
h!2
D
12xf2;
; !2
D
12xf2;
io:
Proof. By Theorem 30, with = 4; = 12 ; r = 2:
Note 65. All the approximation results of this article lead to interesting anduseful convergence conclusions regarding our general and trigonometric opera-tors as approximators to the unit operator.
References
[1] G.A. Anastassiou and R. A. Mezei, Uniform Convergence With Rates ofGeneral Singular Operators, submitted, 2010.
[2] G.A. Anastassiou and R. A. Mezei, Lp Convergence With Rates of GeneralSingular Integral Operators, submitted, 2010.
[3] G.A. Anastassiou and R. A. Mezei, Quantitative Approximation by Frac-tional Smooth General Singular Operators, submitted, 2010.
24
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
282
[4] G.A. Anastassiou and R. A. Mezei, General Theory of Global Smoothnessand Approximation by Smooth Singular Operators, submitted, 2010.
[5] Joseph Edwards, A treatise on the integral calculus, Vol II, Chelsea, NewYork, 1954.
25
ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS
283
On the MAC solution for a circular elastic plate
Igor NeygebauerUniversity of Dodoma, Tanzania
Department of Mathematics and StatisticsEmail:[email protected]
November 30, 2010
Abstract
The method of additional conditions or MAC is applied to the bound-ary value problems of mathematical physics, where the classical solutiondoes not exist or a nonphysical generalized solution is obtained. The cir-cular elastic plate under a transversal force at the center of the plate isconsidered. The MAC solution is obtained using MAC transformation forLaplace equation.KEYWORDS: Laplace and biharmonic equations, membrane, plate, MACsolution.
1 Introduction
Let us consider an isotropic elastic body. If one point of a body is given a smalldisplacement which could present a displacement of one atom then the reactionat that point should be a force in general case and it is not a stress. Thatfollows immediately from the balance of forces acting on the body. It seemsthat we have the small displacements and also small deformations in the wholebody and the classical linear elasticity theory should be applied. But it is wellknown that an elastic body under applied force has a infinite displacement ofthe point of application of the force (1). So we obtain an unsolvable problemin the theory of linear elasticity. It could be possible to create a MAC solutionof the given problem but it is not the goal of this paper. The method how tointroduce the MAC solution could be understandable from what follows.Some classical boundary value problems from elasticity could be considered.Sometimes it is easy to obtain the general solution of the differential equationsof the problems. But we could meet difficulties to satisfy the prescribed bound-ary conditions. We will see that the solutions of some problems do not exist. Inthis case it is possible to create a generalized solution, using a limit of existing so-lutions. These solutions can be easily verified in experiments. If the experimentshows, that the physical solution exists and differs from the obtained generalizedsolution then the MAC or the method of additional conditions can be applied.
1
284
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,284-290,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC
This method allows to transform the obtained generalized solution to the phys-ically acceptable form. Examples of MAC solutions are solution in scheme ofDugdale-Barrenblat (5) in fracture mechanics. This scheme was applied to thelinear elastic crack problem. The linear elastic solution has singularity near thetip of a crack. To avoid this singularity Dugdale and Barrenblat introducedadditional yield stresses near the tip. The applied nonsingular condition gavethe size of the zone, there the stresses are applied. This scheme was developedin (4), where the second additional condition of zero J-integral was introduced.This new condition gave the value of the applied additional stresses, which are6 times more then the given stresses at infinity. This stress concentration factorcorresponds to the experiments of Griffith’s and Inglis (4). The usual strengthcriteria, which are used in the elastic stress fields without singularities, can beused here.Sen-Venan method in elasticity could be considered as another example of MAC.Let us apply the method of additional conditions (MAC) to consider the dis-placements of an elastic plate under a transversal force. The equations andboundary conditions of the plates with some solved problems can be found in(2), (6), (7). Our goal is to present the MAC in this problem.
2 Circular plate
2.1 Nonexistent solution
Consider the bending of a circular elastic plate. The differential equation of theproblem is
∆∆u = 0, (1)
where u is the transversal displacements of the points of a circular plate, ∆ isthe Laplace operator. We consider an axis symmetric case, then the equation(1) will take the form
1
r· ∂∂r
(r · ∂
∂r
(1
r· ∂∂r
(r · ∂
∂r
)))= 0, (2)
where the plate occupies the domain Ω : 0 ≤ r ≤ R. Suppose the followingboundary conditions
u(0) = u0, (3)
u(R) = 0. (4)
∂u
∂r(0) = 0 (5)
M(R) = −D · 1
r· ∂∂r
(r · ∂u
∂r
)(R) = 0 (6)
The condition (5) is natural and it is one of two values which are possiblein classical case. The second possible value is infinity. The MAC theory couldallow to consider any finite value of the condition (5). It will not be considered
2
NEYGEBAUER, CIRCULAR ELASTIC PLATE
285
in this paper.The condition (6) is taken just for simplicity to use the result of the work (5)and to show the MAC approach in case of elastic plate.The general solution of the equation (2) is
u = C1 · ln r + C2 · r2 · ln r + C3 + C4 · r2, (7)
where the arbitrary constants C1, C2, C3, C4 could be found using the boundaryconditions (3)-(6). The derivative of the function (7) is
∂u
∂r=C1
r+ C2 · r · (2 · ln r + 1) + 2 · C4 · r. (8)
We obtain at r = 0 from (8):∂u
∂r(0) = 0. (9)
The constant C1 = 0 because of the finiteness of that derivative in the experi-ments with the plate. If the condition (5) is not zero then the solution of thegiven problem does not exist.If we put the function (7) into the condition (3) then
C3 = u(0) = u0. (10)
Then the condition (4) gives the following equation
C2 ·R2 · lnR+ u0 + C4 ·R2 = 0. (11)
If the force P is applied ar r = 0 then the equilibrium equation allows to find
Q(R) =P
2 · π ·R. (12)
The expression for Q in the theory of elastic plate is
Q(r) = D · ∂∂r
(1
r· ∂∂r
(r · ∂u
∂r
)), (13)
where D is the bending stiffness of the plate. The equations (12) and (13) create
C2 =r
4·Q(r) =
R
4·Q(R) =
P
8 · π ·D. (14)
Then the equation(11) gives the constant C4
C4 = −C2 · lnR−u0R2
= − P
8 · π ·D· lnR− u0
R2. (15)
The solution (7) and its derivative (8) will take the form
u(r) =P
8 · π ·D· r2 · ln r + u0 +
(P · lnR8 · π ·D
− u0R2
)· r2. (16)
3
NEYGEBAUER, CIRCULAR ELASTIC PLATE
286
∂u
∂r(r) =
P
8 · π ·D· r · (2 · ln r + 1) + 2 ·
(P · lnR8 · π ·D
− u0R2
)· r. (17)
The bending moments are from (8):
Mr = −D ·(∂2u
∂r2+ν
r· ∂u∂r
), (18)
Mt = −D ·(
1
r· ∂u∂r
+ ν · ∂2u
∂r2
). (19)
Using (16), (18), and (19) we obtain
Mr = −2 ·D · (C2 · (1 + ν) · (2 · ln r + 1) + C2 + C4 · (1 + ν)), (20)
Mt = −2 ·D · (C2 · (1 + ν) · (2 · ln r + 1) + ν · C2 + C4 · (1 + ν)). (21)
We can see in the experiment with the circular plate under the force P inthe middle of a plate, that there are only the finite bending moments andcorresponding stresses. It means that the logarithmic terms in the expressions(20) and (21) must be avoided. Then it should be
C2 =P
8 · π ·D= 0. (22)
Therefore we obtain from (22) that
P = 0. (23)
The force P 6= 0 according to the stated problem. This contradicts to the value(23). We can conclude from the obtained contradiction that the solution of thestated problem does not exist.As we can see that the situation with the plate is similar to the situation withthe membrane (3): the classical solution of the problem does not exist but thephysical solution of the problem exists evidently.
2.2 Generalized solution
We can obtain the generalized solution of the problem using the similar way asin the membrane problem (3). It means that can suppose the distribution ofthe force P near the origin in the small circle. Then we can find the solution ofthe stated problem. And after that the radius of the small circle must tend tozero. This approach is presented in (6).Let us consider for instance consider the case of boundary condition
du
dr(R) = 0 (24)
instead of the condition (6). Then the generalized solution of the problemaccording to (8) is:
u(r) =P · r2
8 · π ·D· ln r
R+
P
16 · π ·D· (R2 − r2). (25)
4
NEYGEBAUER, CIRCULAR ELASTIC PLATE
287
The bending moments are (8):
Mr =P
4 · π· ((1 + ν) · ln R
r− 1), (26)
Mt =P
4 · π· ((1 + ν) · ln R
r− ν). (27)
We can see that the expression for the displacement u according to (25) iswell enough. But the expressions (26), (27) for the bending moments havesingularities at the point of application of the force. They can not be used todetermine the stresses near the origin. Another models have to be consideredto determine the real stresses. We will use for that the MAC-solution of ourproblem.
2.3 MAC-solution
The method of Marcus (6) will help to obtain the MAC-solution for our plateproblem.Consider the differential equation of the plate (1) in the form
(∂2
∂x2+
∂2
∂y2)(∂2u
∂x2+∂2u
∂y2) = 0. (28)
The bending moments are
Mx = −D · (∂2u
∂x2+ ν · ∂
2u
∂y2), (29)
My = −D · (∂2u
∂y2+ ν · ∂
2u
∂x2), (30)
The sum of the expressions (29), (30) gives
Mx +My = −D · (1 + ν) · (∂2u
∂x2+∂2u
∂y2). (31)
If we introduce a new notation
M =Mx +My
1 + ν= −D · (∂
2u
∂x2+∂2u
∂y2), (32)
the equations (28) and (32) can be written in the form:
∂2M
∂x2+∂2M
∂y2= 0, (33)
∂2u
∂x2+∂2u
∂y2= −M
D. (34)
5
NEYGEBAUER, CIRCULAR ELASTIC PLATE
288
We consider the symmetric case and therefore the equations (33), (34) in polarcoordinates will take the form
1
r· ∂∂r
(r · ∂M
∂r
)= 0, (35)
1
r· ∂∂r
(r · ∂u
∂r
)= −M
D. (36)
The equation (35) is the classical membrane equation and its general MAC-solution according to (3) can be written in the form:
M(r) = C1 + C2 · r, (37)
where C1 and C2 are arbitrary constants.Then the equation (36) yields
1
r· ∂∂r
(r · ∂u
∂r
)= − 1
D· (C1 + C2 · r). (38)
This equation could be considered in two ways: to find the classical solutionand to find the MAC solution. Let us consider the classical solution of (38).Consider the general solution of the equation (38)
u(r) = C3 · ln(r) + C4 −1
D·(C1 ·
r2
4+ C2 ·
r3
9
), (39)
where C3 and C4 are arbitrary constants.Using the boundary conditions (3)-(6) the solution (38) will be
u(r) = u0 ·(
1− 9
5·( rR
)2
+4
5·( rR
)3)
(40)
The bending moments Mr,Mt could be obtained from Eqs. (18), (19) and theforce Q - from the equilibrium equation (12). Using classical equation
Q(r) = −∂M∂r
(41)
at r = R we find the connection between applied force P and displacement u0:
u0 =5 · P ·R2
72 · π ·D. (42)
3 Conclusion
The nonexistent, generalized and MAC solutions of the circular elastic platewere considered. Some problems of mathematical physics with nonexistent so-lutions can have the MAC-solutions. These MAC-solutions are correspondingand explaining the real physical situation of applied force.
6
NEYGEBAUER, CIRCULAR ELASTIC PLATE
289
4 References
1. V.I.Astafjev,J.N.Radaev,L.V.Stepanova, Nonlinear fracture mechanics, Samara,Publisher Samara University, (2004).
2. A.W.Leissa, Vibration of plates, NASA, Washington D.C., (1969).
3. I.Neygebauer, MAC-solution for a rectangular membrane, Journal of Con-crete and Applicable Mathematics, Vol.8, No.2,344-352, (2010).
4. I.Neygebauer, The method to obtain the finite solutions in the continuummechanics, Fundamental research at the Saint Petersburg State Polytech-nic University,(2005).
5. E.I.Shifrin, 3D problems of linear fracture mechanics, Fizmatlit, Moscow,(2002).
6. S.Timoshenko,S.Woinowsky-Krieger, Theory of plates and shells, McGraw-Hill Book Company, Inc, New York, Toronto, London, (1959).
7. H.Yuce,C.Y.Wang, Fundamental frequency of clamped plates with circu-larly periodic boundaries, Journal of sound and vibration, Vol.299,355-362,(2007).
7
NEYGEBAUER, CIRCULAR ELASTIC PLATE
290
Approximate bi-homomorphisms and bi-derivationsin normed Lie triple systems
1Javad Shokri, 2Ali Ebadian, 3Rasoul Aghalari and Madjid Eshaghi Gordji1,2,3Department of Mathematics, Urmia University,
P.O.Box 165, Urmia, Iran. 4 Department of Mathematics, Semnan University, P. O. Box 35195-363, Semnan, Iran
Center of Excellence in Nonlinear Analysis and Applications (CENAA), Semnan University, Iran
Abstract. We prove the generalized Hyers–Ulam stability of the following 2-dimensional quadratic functional equation:
f(x+ y, z − w) + f(x− y, z + w) = 2f(x, z) + 2f(y, w).
Moreover, we investigate the stability of bi-homomorphisms and bi-derivations on normed Lie triple systems.
1. Introduction
In 1940 S.Ulam [36] proposed the general Ulam stability problem:
Let G1 be a group and let G2 be a matric group with the matric d(., .). Given ε > 0, does there
exists a δ > 0 such that if a function h : G1 → G2 satisfies inequality d(h(xy)− h(x)h(y)
)< δ for all
x, y ∈ G1 then there is a homomorphism H : G1 → G2 with d(h(x),H(x)) < ε for all x ∈ G1?
D. H. Hyers [24] gave a partial affirmative answer to the question of Ulam in the context of Banach
spaces. In 1950, a generalized version of Hyers’ theorem for approximate additive mappings was given by
T. Aoki [2]. In 1978, Th. M. Rassias [30] extended the theorem of Hyers by considering the unbounded
cauchy difference inequality
‖f(x+ y)− f(x)− f(y)‖ 6 ε(‖x‖p + ‖y‖p) (ε ≥ 0, p ∈ [0, 1))
In 1990, Th. M. Rassias during the 27th International Symposium on Functional Equations asked the
question whether such a theorem can also be proved for p ≥ 1. In 1991, Z. Gajda [22] following the
same approach as in Th. M. Rassias [30] gave an affirmative solution to this question for p > 1. It
was proved by Z. Gajda [22], as well as by Th. M. Rassias’ and P. Semrl [34] that one can prove Th.
M. Rassias’ type theorem when p = 1. Th. M. Rassias Theorem for the stability for stability of the
linear mappings between Banach spaces provided some influence for the development of the concept of
generalized Hyers–Ulam stability, a fact which rekindled interest in the subject of stability of functional
equations. This concept is known today as generalized Hyers–Ulam stability or Hyers-Ulam-Rassias
stability of functional equations; cf. [4, 33]. Several mathematicians following the spirit of the approach
in the paper of Th. M. Rassias [30] for the unbounded Cauchy difference obtained various results. For
example in 1982, J. M. Rassias [29] obtained an analogous stability theorem in which he replace the
factor ‖x‖p +‖y‖p by ‖x‖p.‖y‖q for p, q ∈ R with p+ q 6= 1. In 1994, P. Gavruta [23] provided a further
generalization of Th. M. Rassias’ theorem in which he replaced the bound ε(‖x‖p + ‖y‖p) in (1.1) by
02000 Mathematics Subject Classification: 39B82, 16W25, 17A40,39B52.0Keywords: Normed Lie systems; bi-homomorphism; bi-derivation; Generalized Hyers–Ulam stability.0E-mail: [email protected], [email protected], [email protected],[email protected] corresponding author: [email protected] (Madjid Eshaghi Gordji)
291
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,291-300,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC
2 J. Shokri, A. Ebadian, R. Aghalary and M. Eshaghi Gordji
a general control function ϕ(x, y). In 1996, G. Isac and Th. M. Rassias [25] applied the generalized
Hyers-Ulam stability theory to prove fixed point theorems and obtained some new applications in
nonlinear Analysis. During the last decades several stability problems of functional equations have
been investigated by a number of mathematicians; cf. [4]– [32] and references therein.
Ternary algebraic operations were considered in 19th century by several mathematicians such as
Cayley [3] how introduced the notion of cubic matrix which in turn was generalized by Kapranov [?]et.
al. in 1990. there are some applications, although still hypothetical, in the fractional quantum Hall
effect, the nonstandard statistics, supersymmetric theory, and Yang-Baxter equation. the comments on
physical applications of ternary structures can be found in Refs. [1, 26, 35, 37].
A normed (Banach) Lie triple system is a normed (Banach) space (A; ‖.‖) with a trilinear mapping
(x, y, z) 7−→ [xyz] from A×A×A to A satisfying the following axioms
[xyz] = −[yxz],[xyz] + [yzx] + [zxy] = 0[uv[xyz]] = [[uvx]yz] + [x[uvy]z] + [xy[uvz]],‖[xyz]‖ 6 ‖x‖‖y‖‖z‖,
for all u, v, x, y, z ∈ A.
Let A and B be normed Lie triple systems. A C-linear mapping H : A → B is said to be a
homomorphism if
H([xyz]) = [H(x)H(y)H(z)]
for all x, y, z ∈ A. A C-linear mapping δ : A → B is called a derivation if
δ([xyz]) = [δ(x)yz] + [xδ(y)z] + [xyδ(z)]
for all x, y, z ∈ A.
Let A and B be normed Lie triple systems. A C-bilinear H : A×A → B is said to be a bihomomor-
phism if it satisfies
H([xyz], w) = [H(x,w)H(y, w)H(z, w)],
H(x, [yzw]) = [H(x, y)H(x, z)H(x,w)]
for all x, y, z, w ∈ A. A C-bilinear δ : A×A → B is said to be a biderivation if it satisfies
δ([xyz], w) = [δ(x,w)yz] + [xδ(y, w)z] + [xyδ(z, w)],
δ(x, [yzw]) = [δ(x, y)zw] + [yδ(x, z)w] + [yzδ(x,w)]
for all x, y, z, w ∈ A.
In this paper, we have analyzed the Hyers-Ulam-Rassias stability of bi-homomorphism and bi-
derivation associated with the following quadratic functional equation
f(x+ y, z − w) + f(x− y, z + w) = 2f(x, z) + 2f(y, w), (1.1)
in Lie triple systems, which can be regarded as ternary structures. The reader is referred to [27, 28] for
some other related results.
SHOKRI ET AL: NORMED LIE TRIPLE SYSTEMS
292
approximate bi-homomorphisms and bi-derivations in... 3
Throughout this paper, suppose that A is normed Lie triple system with norm ‖.‖A and that B is a
Banach Lie triple system with norm ‖.‖B. For given mapping f : A×A :→ B and given subset E of C,
we define Dλ,µ : A4 → B by
Dλ,µf(x, y, z, w) := f(λx+ λy, µz − µw) + f(λx− λy, µz + µw)− 2λµf(x, z)− 2λµf(y, w)
for all λ, µ ∈ T1 = z ∈ C : |z| = 1 and all x, y, z, w ∈ A.
2. Stability of bi–linear mappings
Throughout this section X denotes a normed space and Y is a Banach space. We aim to prove the
generalized Hyers–Ulam stability of 2-dimensional linear mappings.
Lemma 2.1. Let V and W be C-linear spaces and f : V × V → W be a bi-additive mapping, such that
f(λx, µy) = λµf(x, y) for all λ, µ ∈ T1 = z ∈ C : |z| = 1 and all x, y, z, w ∈ V, then f is C-bilinear.
Proof. Since f is a bi-additive, we get f( 12x,
12y) = 1
4f(x, y) for all x, y ∈ X . Obviously, f(0x, 0y) =
0f(x, y), now let µ1, µ2 ∈ C(µ1 6= 0, µ2 6= 0), and let M1 and M2 are two natural numbers, respectively,
greater than |µ1| and |µ2|. By an easily geometric argument, one can conclude that there exist numbers
λ11, λ12, λ21, λ22 ∈ T1 such that 2 µ1M1
= λ11 + λ12 and 2 µ2M2
= λ21 + λ22. Therefore
f(µ1x, µ2y) = f(M1
2.2.
µ1
M1x,M2
2.2.
µ2
M2y) =
M1
2.M2
2f(2.
µ1
M1x, 2.
µ2
M2y)
=M1
2.M2
2f((λ11 + λ12)x, (λ21 + λ22)y)
=M1
2(λ11 + λ12).
M2
2(λ21 + λ22)f(x, y) = µ1µ2f(x, y)
for all x, y ∈ V. Thus the mapping f : V × V → W is a C-bilinear.
Lemma 2.2. Let V andW be C-linear spaces and f : V×V → W be a mapping satisfies Dλ,µf(x, y, z, w) =
0 for all λ, µ ∈ T1 = z ∈ C : |z| = 1 and all x, y, z, w ∈ V, then f is C-bilinear.
Proof. Letting λ = µ = 1, Theorem 2.1 in [?], f is bi-additive. Putting y = w = 0 inDλ,µ(x, y, z, w) = 0,
we get f(λx, µz) = λµf(x, y) for all λ, µ ∈ T1 and all x, y, z, w ∈ X . So by Lemma 2.1, the mapping f
is C-bilinear.
Theorem 2.3. Let f : X × X → Y with f(0, 0) = 0 be a mapping for which there exist a function
ϕ : X 4 → [0,∞), such that
‖Dλ,µf(x, y, z, w)‖Y 6 ϕ(x, y, z, w), (2.1)
ϕ(x, y, z, w) :=14
∞∑n=0
4−nϕ(2nx, 2ny, 2nz, 2nw) <∞ (2.2)
for all λ, µ ∈ T1 and x, y, z, w ∈ X . then there exist a unique bi-linear mapping T : X → Y such that
‖f(x, y)− T (x, y)‖Y 632ϕ(x.x, y,−y) +
12ϕ(x,−x, y, y) + ϕ(0, x, 0, y) (2.3)
for all x, y ∈ X .
SHOKRI ET AL: NORMED LIE TRIPLE SYSTEMS
293
4 J. Shokri, A. Ebadian, R. Aghalary and M. Eshaghi Gordji
Proof. Assume that λ = µ = 1. Put w = z and y = −x in (2.1) to obtain
‖f(2x, 2z)− 2f(x, z)− 2f(−x, z)‖Y 6 ϕ(x,−x, z, z) (2.4)
for all x, z ∈ X . Letting x = z = 0 in (2.1), we get
‖f(y,−w) + f(−y, w)− 2f(y, w)‖Y 6 ϕ(0, y, 0, w) (2.5)
for all y, w ∈ X . Replacing y by x and w by z in (2.5)
‖f(x,−z) + f(−x, z)− 2f(x, z)‖Y 6 ϕ(0, x, 0, z) (2.6)
for all x, z ∈ X . Putting x = y and w = −z in (2.1), we get
‖f(2x, 2z)− 2f(x, z)− 2f(x,−z)‖Y 6 ϕ(x, x, z,−z) (2.7)
for all x, z ∈ X . By inequalities (2.4) and (2.7), we get
‖2f(x,−z)− 2f(−x, z)‖Y 6 ϕ(x, x, z,−z) + ϕ(x,−x, z, z) (2.8)
for all x, z ∈ X . By (2.6) and (2.7), we have
‖f(2x, 2z)− 4f(x, z)− f(x,−z) + f(−x, z)‖Y 6 ϕ(x, x, z,−z) + ϕ(0, x, 0, z) (2.9)
for all x, z ∈ X . By two inequalities (2.8) and (2.9), we get
‖f(2x, 2y)− 4f(x, z) 632ϕ(x, x, z,−z) +
12ϕ(x,−x, z, z) + ϕ(0, x, 0, z)
for all x, z ∈ X . Setting z = y in the above inequality and put ψ(x, y) := 32ϕ(x, x, y,−y)+ 1
2ϕ(x,−x, y, y)+ϕ(0, x, 0, y) to get
‖f(2x, 2y)− 4f(x, y)‖Y 6 ψ(x, y), (2.10)
or ∥∥∥14f(2x, 2y)− f(x, y)
∥∥∥Y
614ψ(x, y),
for all x, y ∈ X . Replacing x by2jx and y by 2jy and dividing 4j in the above inequality, we obtain
that ∥∥∥ 14j+1
f(2j+1x, 2j+1y)− 14jf(2jx, 2jy)
∥∥∥Y
61
4j+1ψ(2jx, 2jy)
for all x, y ∈ X and all j = 0, 1, . . .. One can use induction to show that∥∥∥ 14nf(2nx, 2ny)− 1
4mf(2mx, 2my)
∥∥∥Y
614
n−1∑j=m
4−jψ(2jx, 2jy) (2.11)
for all nonnegative integers n > m and all x, y ∈ X . It follows from the convergence of the series
(2.2) and (2.11) that the sequence
14n f(2nx, 2ny)
is a Cauchy sequence for all x, y ∈ X . Due to the
completeness of Y, this sequence is convergent. Define T : X × X → Y by
T (x, y) := limn→∞
14nf(2nx, 2ny)
SHOKRI ET AL: NORMED LIE TRIPLE SYSTEMS
294
approximate bi-homomorphisms and bi-derivations in... 5
for all x, y ∈ X . By (2.1) and (2.2), we have
‖T (x+ y, z − w) + T (x− y, z + w)− 2T (x, z)− 2T (y, w)‖Y
= limn→∞
∥∥∥ 14nf(2n(x+ y), 2n(z − w)) +
14nf(2n(x− y), 2n(z + w))
− 24nf(2nx, 2nz)− 2
4nf(2ny, 2nw)
∥∥∥Y
6 limn→∞
14nϕ(2nx, 2ny, 2nz, 2nw) = 0
for all x, y, z, w ∈ X . Then T satisfies (1.1), so by Lemma 2.2, the mapping T : X ×X → Y is C-bilinear.
Setting m = 0 and taking n→∞ in (2.11), one can obtain the inequality (2.3).
Now, let T ′ : X × X → Y be another bi-linear mapping satisfy (2.3). Then we have
‖T (x, y)− T ′(x, y)‖ =14n‖T (2nx, 2ny)− T ′(2nx, 2ny)‖Y
614n‖T (2nx, 2ny)− f(2nx, 2ny)‖Y +
14n‖f(2nx, 2ny)− T ′(2nx, 2ny)‖Y
624n
(32ϕ(2nx, 2nx, 2ny,−2ny) +
12ϕ(2nx,−2nx, 2ny, 2ny) + ϕ(0, 2nx, 0, 2ny)
)6
14n
(12
∞∑k=0
4−kψ(2k2nx, 2k2ny))
=12
∞∑k=n
4−kψ(2kx, 2ky) → 0
as n→∞. Hence T = T ′.
The next result is a dual to the previous theorem in some sense.
Theorem 2.4. Let f : X × X → Y with f(0, 0) = 0 be a mapping for which there exist a function
ϕ : X 4 → [0,∞), such that
‖Dλ,µf(x, y, z, w)‖ 6 ϕ(x, y, z, w),
ϕ(x, y, z, w) :=14
∞∑n=0
4nϕ(2−nx, 2−ny, 2−nz, 2−nw) <∞ (2.12)
for all λ, µ ∈ T1 and x, y, z, w ∈ X . Then there exists a unique bi-linear mapping T : X → Y such that
‖f(x, y)− T (x, y)‖ 632ϕ(x.x, y,−y) +
12ϕ(x,−x, y, y) + ϕ(0, x, 0, y)
for all x, y ∈ X .
Proof. It follows from(2.10) that∥∥∥f(x, y)− 4f(12x,
12y)
∥∥∥Y
6 ψ(12x,
12y)
for all x, y ∈ X . So ∥∥∥4mf(x
2m,y
2m)− 4nf(
x
2n,y
2n)∥∥∥Y
6n−1∑j=m
∥∥∥4jf(x
2j,y
2j)− 4j+1f(
x
2j+1,y
2j+1)∥∥∥Y
614
n−1∑j=m
4jψ(x
2j,y
2j) (2.13)
for all nonnegative integers m and n with n > m and all x, y ∈ X . It follows from convergency of two
series (2.12) and (2.13) that the sequence 4nf( x2n ,
y2n ) is a Cauchy sequence for all x, y ∈ X . Since Y
SHOKRI ET AL: NORMED LIE TRIPLE SYSTEMS
295
6 J. Shokri, A. Ebadian, R. Aghalary and M. Eshaghi Gordji
is complete, the sequence 4nf( x2n ,
y2n ) is convergence for all x, y ∈ X . So we can define the mapping
T : X × X → Y by
T (x, y) := limn→∞
4nf(x
2n,y
2n)
for all x, y ∈ X . Moreover, letting m = 0 and passing the limit n → ∞ in (2.13), we get desired
inequality. The rest of the proof is similar to the proof of Theorem 2.3.
3. Stability of bi-homomorphisms in normed Lie triple systems
In this section, we prove the stability of bi-homomorphisms in normed Lie triple systems associated
with the bi–linear functional equation.
Theorem 3.1. Let θ and p < 2 be positive real numbers, and let f : A×A → B with f(0, 0) = 0 be a
mapping such that
‖Dλ,µf(x, y, z, w)‖B 6 θ(‖x‖pA + ‖y‖p
A + ‖z‖pA + ‖w‖p
A), (3.1)
‖f([x, y, z], w)− [f(x,w)f(y, w)f(z, w)]‖B+‖f(x, [y, z, w])− [f(x, y)f(x, z)f(x,w)]‖B6 θ(‖x‖p
A + ‖y‖pA + ‖z‖p
A + ‖w‖pA)
(3.2)
for all λ, µ ∈ T1 and x, y, z, w ∈ A. Then there exist a unique bi-homomorphism H : A×A → B such
that
‖f(x, y)−H(x, y)‖B 65θ
4− 2p(‖x‖p
A + ‖y‖pA) (3.3)
for all x, y ∈ A.
Proof. First let us assume ‖0‖p = 0 for p < 0. Put ϕ(x, y, z, w) = θ(‖x‖pA + ‖y‖p
A + ‖z‖pA + ‖w‖p
A)
in Theorem 2.3, to get a unique C-bilinear mapping H given by H(x, y) := limn→∞14n f(2nx, 2ny)
satisfying (3.3). It follows from (3.1) that
‖H([x, y, z], w)− [H(x,w)H(y, w)H(z, w)]‖B
+ ‖H(x, [y, z, w])− [H(x, y)H(x, z)H(x,w)]‖B
= limn→∞
14n
(‖f([2nx, 2ny, 2nz], 2nw)− [f(2nx, 2nw), f(2ny, 2nw), f(2nz, 2nw)]‖B
+ ‖f(2nx, [2ny, 2nz, 2nw])− [f(2nx, 2ny)f(2nx, 2nz)f(2nx, 2nw)]‖B)
6 limn→∞
2np
4nθ(‖x‖p
A + ‖y‖pA + ‖z‖p
A + ‖w‖pA) = 0
for all x, y, z, w ∈ A. So
H([x, y, z], w) = [H(x,w),H(y, w),H(z, w)]
and
H(x, [y, z, w]) = [H(x, y),H(x, z),H(x,w)]
for all x, y, z, w ∈ A.
SHOKRI ET AL: NORMED LIE TRIPLE SYSTEMS
296
approximate bi-homomorphisms and bi-derivations in... 7
Theorem 3.2. Let θ and p > 2 a positive real number, and let f : A×A → B be a mapping satisfying
(3.1) and (3.2). Then there exists a unique bi-homomorphism H : A×A → B such that
‖f(x, y)−H(x, y)‖B 65θ
2p − 4(‖x‖p
A + ‖y‖pA).
Proof. Put ϕ(x, y, z, w) = θ(‖x‖pA + ‖y‖p
A + ‖z‖pA + ‖w‖p
A) in Theorem 2.4 and note that inequality
(3.2) implies that f(0, 0) = 0. One can define H : A×A → B
H(x, y) := limn→∞
4nf(x
2n,y
2n)
for all x, y ∈ A. Then desired inequality for H and f is obtained. The rest of the proof is similar to the
proof of Theorem 2.4.
Theorem 3.3. Let θ and p 6= 12 be positive real numbers, and f : A × A → B, with f(0, 0) = 0, be a
mapping such that
‖Dλ,µf(x, y, z, w)‖B 6 θ(‖x‖pA.‖y‖
pA.‖z‖
pA.‖w‖
pA),
‖f([x, y, z], w)− [f(x,w), f(y, w), f(z, w)]‖B+‖f(x, [y, z, w])− [f(x, y), f(x, z), f(x,w)]‖B
6 θ(‖x‖pA.‖y‖
pA.‖z‖
pA.‖w‖
pA)
(3.4)
for all λ, µ ∈ T1 and all x, y, z, w ∈ A. Then there exists a bi-homomorphism H : A×A → B such that
‖f(x, y)−H(x, y)‖B =
2θ
4−24p ‖x‖2pB .‖y‖
2pB ; p < 1
22θ
24p−4‖x‖2pB .‖y‖
2pB ; p > 1
2
, (3.5)
Proof. In case p < 12 , we first assume ‖0‖p = 0 for p < 0. Put ϕ(x, y, z, w) = θ(‖x‖p
A.‖y‖pA.‖z‖
pA.‖w‖
pA)
in Theorem 2.3, to get a unique C-bilinear mapping H given by H(x, y) := limn→∞14n f(2nx, 2ny)
satisfying (3.5). Eq. (3.4) implies that
‖H([x, y, z], w)− [H(x,w)H(y, w)H(z, w)]‖B
+ ‖H(x, [y, z, w])− [H(x, y)H(x, z)H(x,w)]‖B
= limn→∞
14n
(‖f([2nx, 2ny, 2nz], 2nw)− [f(2nx, 2nw), f(2ny, 2nw), f(2nz, 2nw)]‖B
+ ‖f(2nx, [2ny, 2nz, 2nw])− [f(2nx, 2ny)f(2nx, 2nz)f(2nx, 2nw)]‖B)
6 limn→∞
24np
4nθ(‖x‖p
A.‖y‖pA.‖z‖
pA.‖w‖
pA) = 0
for all x, y, z, w ∈ A. So
H([x, y, z], w) = [H(x,w),H(y, w),H(z, w)]
and
H(x, [y, z, w]) = [H(x, y),H(x, z),H(x,w)]
for all x, y, z, w ∈ A.
The rest of proof is similar to the proof of Theorems 3.1 and 2.3.
In the case p > 12 , put ϕ(x, y, z, w) = θ(‖x‖p
A.‖y‖pA.‖z‖
pA.‖w‖
pA) in Theorem 2.4, to get unique C-
bilinear mapping H given by H(x, y) := limn→∞ 4nf( x2n ,
y2n ) satisfies inequality in (3.5). The rest of
proof is similar to the proof of Theorems 3.2 and 2.4
SHOKRI ET AL: NORMED LIE TRIPLE SYSTEMS
297
8 J. Shokri, A. Ebadian, R. Aghalary and M. Eshaghi Gordji
4. Stability of bi-derivations in normed Lie triple systems
In this section we prove the Hyers-Ulam-Rassias stability of bi-derivation of (1.1).
Theorem 4.1. Let θ and p 6= 12 be positive real numbers, and let f : A×A → B with f(0, 0) = 0 be a
mapping such that
‖Dλ,µf(x, y, z, w)‖B 6 θ(‖x‖pA.‖y‖
pA.‖z‖
pA.‖w‖
pA),
‖f([x, y, z], w)− [f(x,w), y, z]− [x, f(y, w), z]− [x, y, f(z, w)]‖B+‖f(x, [y, z, w])− [f(x, y), z, w]− [y, f(x, z), w][y, z, f(x,w)]‖B6 θ(‖x‖p
A.‖y‖pA.‖z‖
pA.‖w‖
pA)
(4.1)
for all x, y, z, w ∈ A. If f satisfies
limn→∞
14nf(2nx, 2ny) = lim
n→∞
14nf(2nx, 23ny) = lim
n→∞
14nf(23nx, 2ny)
for all x, y,∈ A. Then there exists a unique bi-derivation δ : A×A → B such that
‖f(x, y)− δ(x, y)‖B 6
2θ
4−24p (‖x‖2pA .‖y‖
2pA ) ; p < 1
22θ
24p−4 (‖x‖2pA .‖y‖
2pA ) ; p > 1
2
, (4.2)
for all x, y ∈ A.
Proof. For the case p < 12 by putting ϕ(x, y, z, w) = θ(‖x‖p
A.‖y‖pA.‖z‖
pA.‖w‖
pA) in Theorem 2.3, it
follows that there exists C-bilinear mapping δ given by δ(x, y) := limn→∞14n f(2nx, 2ny) which satisfies
inequality (4.2).
It follows from (4.1) that
‖δ([x, y, z], w)− [δ(x,w), y, z]− [x, δ(y, w), z]− [x, y, δ(z, w)]‖B
+ ‖δ(x, [y, z, w])− [δ(x, y), z, w]− [y, δ(x, z), w][y, z, δ(x,w)]‖B
= limn→∞
(∥∥∥ 143n
f(23n[x, y, z], 23nw)−[ 14nf(2nx, 2nw), y, z
]−
[x,
14nf(2nx, 2nw), z
]−
[x, y,
14nf(2nz, 2nw)
]∥∥∥B
+∥∥∥ 1
43nf(23nx, 23n[y, z, w])−
[ 14nf(2nx, 2ny), z, w
]−
[y,
14nf(2nx, 2nz), w
]−
[y, z,
14nf(2nx, 2nw)
]∥∥∥B
)= lim
n→∞
(∥∥∥ 143n
f([2nx, 2ny, 2nz], 23nw)− 143n
[f(2nx, 23nw), 2ny, 2nz]
− 143n
[2nx, f(2ny, 23nw), 2nz]− 143n
[2nx, 2ny, f(2nz, 23nw)]∥∥∥B
+∥∥∥ 1
43nf(23nx, [2ny, 2nz, 2nw])− 1
43n[f(23nx, 2ny), 2nz, 2nw]
− 143n
[2ny, f(23nx, 2nz), 2nw]− 143n
[2ny, 2nz, f(23nx, 2nw)]∥∥∥B
)6 lim
n→∞
( θ
43n(2np‖x‖p
A.2np‖y‖p
A.2np‖z‖p
A.23np‖w‖p
A)
+θ
43n(23np‖x‖p
A.2np‖y‖p
A.2np‖z‖p
A.2np‖w‖p
A))
= limn→∞
2θ26np
43n(‖x‖p
A.‖y‖pA.‖z‖
pA.‖w‖
pA) = 0
SHOKRI ET AL: NORMED LIE TRIPLE SYSTEMS
298
approximate bi-homomorphisms and bi-derivations in... 9
for all x, y, z, w ∈ A. Therefore
δ([xyz], w) = [δ(x,w)yz] + [xδ(y, w)z] + [xyδ(z, w)],
δ(x, [yzw]) = [δ(x, y)zw] + [yδ(x, z)w] + [yzδ(x,w)]
for all x, y, z, w ∈ A.
For the case p > 12 , similar to the first case by putting ϕ(x, y, z, w) = θ(‖x‖p
A.‖y‖pA.‖z‖
pA.‖w‖
pA) in
Theorem 2.4 and by the same argument in Theorem 3.2 one can get a unique C-bilinear mapping δ
given by δ(x, y) := limn→∞ 4nf( x2n ,
y2n ) which satisfies inequality (4.2).
Theorem 4.2. Let θ and p 6= 2 be positive real numbers, and let f : A×A → B with f(0, 0) = 0 be a
mapping such that
‖Dλ,µf(x, y, z, w)‖B 6 θ(‖x‖pA + ‖y‖p
A + ‖z‖pA + ‖w‖p
A),
‖f([x, y, z], w)− [f(x,w), y, z]− [x, f(y, w), z]− [x, y, f(z, w)]‖B+‖f(x, [y, z, w])− [f(x, y), z, w]− [y, f(x, z), w][y, z, f(x,w)]‖B6 θ(‖x‖p
A + ‖y‖pA + ‖z‖p
A + ‖w‖pA)
(4.3)
for all x, y, z, w ∈ A. If f satisfies
limn→∞
14nf(2nx, 2ny) = lim
n→∞
14nf(2nx, 23ny) = lim
n→∞
14nf(23nx, 2ny)
for all x, y,∈ A. Then there exists a unique bi-derivation δ : A×A → B such that
‖f(x, y)− δ(x, y)‖B 6
5θ
4−2p (‖x‖pA + ‖y‖p
A) ; p < 25θ
2p−4 (‖x‖pA + ‖y‖p
A) ; p > 2,
for all x, y ∈ A.
Proof. If p < 2, we first assume that ‖0‖p = 0 for p < 0. Put ϕ(x, y, z, w) = θ(‖x‖pA + ‖y‖p
A + ‖z‖pA +
‖w‖pA) in Theorem 2.3, to get a unique C-bilinear mapping δ given by δ(x, y) := limn→∞
14n f(2nx, 2ny)
satisfies desired inequality. The rest of the proof is similar to the proof of Theorem 4.1.
If p > 2, putting ϕ(x, y, z, w) = θ(‖x‖pA + ‖y‖p
A + ‖z‖pA + ‖w‖p
A) in Theorem 2.4, to get a unique
C-bilinear mapping δ given by δ(x, y) := limn→∞ 4nf( x2n ,
y2n ) satisfies desired inequality. The rest of
the proof is similar to the proof of Theorem 4.1.
References
[1] V. Abramov, R. Kerner and B. Le Roy, Hypersymmetry a Z3 graded generalization of supersymmetry, J. Math.
Phys. 38, Art. ID 1650 (1997).
[2] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan. 2 (1950), 64–66.
[3] A. Cayley, On the 34 concomitants of the ternary cubic, Am. J. Math. 4 (1881).
[4] A. Ebadian, N. Ghobadipour, M. E. Gordji, A fixed point method for perturbation of bimultipliers and Jordan
bimultipliers in C∗−ternary algebras, J. Math. Phys. 51, 1, 2010, 10 pages, doi:10.1063/1.3496391.
[5] A. Ebadian, A. Najati and M. Eshaghi Gordji, On approximate additive–quartic and quadratic–cubic functional
equations in two variables on abelian groups, Results Math., DOI 10.1007/s00025-010-0018-4 (2010).
[6] M. Eshaghi Gordji and H. Khodaei, Stability of Functional Equations, LAP LAMBERT Academic Publishing, 2010.
[7] M. Eshaghi Gordji, Nearly ring homomorphisms and nearly ring derivations on non-Archimedean Banach algebras,
Abs. Appl. Anal., Article ID:393247.
[8] M. Eshaghi Gordji and Z. Alizadeh, Stability and superstability of ring homomorphisms on non–Archimedean Banach
algebras, Abstract and Applied Analysis, Vol. 2011, Article ID:123656, (2011), 10 pages.
SHOKRI ET AL: NORMED LIE TRIPLE SYSTEMS
299
10 J. Shokri, A. Ebadian, R. Aghalary and M. Eshaghi Gordji
[9] M. Eshaghi Gordji and M. Bavand Savadkouhi, Stability of cubic and quartic functional equations in non–
Archimedean spaces, Acta Appl. Math. 110 (2010), 1321–1329.
[10] M. Eshaghi Gordji and M. Bavand Savadkouhi, Stability of a mixed type cubicquartic functional equation in non–
Archimedean spaces, Appl. Math. Lett. 23, No.10, (2010), 1198-1202.
[11] M. Eshaghi Gordji, M. Bavand Savadkouhi and M. Bidkham, Stability of a mixed type additive and quadratic
functional equation in non–Archimedean spaces, J. Comput. Anal. Appl. 12(2010) 454–462.
[12] M. Eshaghi Gordji and M. Bavand Savadkouhi, Approximation of generalized homomorphisms in quasi-Banach
algebras, Analele Univ. Ovidius Constata, Math series, Vol. 17(2), (2009), 203–214.
[13] M. Eshaghi Gordji and M. Bavand Savadkouhi, On approximate cubic homomorphisms, Advances in difference
equations, Volume (2009), Article ID 618463, 11 pages ,doi:10.1155/2009/618463.
[14] M. Eshaghi Gordji, T. Karimi and S. Kaboli Gharetapeh, Approximately n–Jordan homomorphisms on Banach
algebras, J. Ineq. Appl. Volume 2009, Article ID 870843, 8 pages.
[15] M. Eshaghi Gordji, R. Khodabakhsh, H. Khodaei and S. M. Jung, AQCQ-functional equation in non–Archimedean
normed spaces, Abs. Appl. Anal., Volume 2010, Article ID741942.
[16] M. Eshaghi Gordji, H. Khodaei and R. Khodabakhsh, General quartic-cubic-quadratic functional equation in non–
Archimedean normed spaces, U.P.B. Sci. Bull. (Series A) 72 (2010), Issue 3, 69–84.
[17] M. Eshaghi Gordji and H. Khodaei, Solution and stability of generalized mixed type cubic, quadratic and additive
functional equation in quasi–Banach spaces, Nonlinear Analysis–TMA 71 (2009), 5629–5643.
[18] M. Eshaghi Gordji, H. Khodaei and R. Khodabakhsh, General quartic–cubic–quadratic functional equation in non–
Archimedean normed spaces, U.P.B. Sci. Bull., Series A, Vol. 72, Iss. 3, 2010, 69-84.
[19] M. Eshaghi Gordji and A. Najati, Approximately J∗-homomorphisms: A fixed point approach, Journal of Geometry
and Physics, 60 (2010), 809–814.
[20] R. Farokhzad and S. A. R. Hosseinioun, Perturbations of Jordan higher derivations in Banach ternary algebras: An
alternative fixed point approach, Int. J. Nonlinear Anal. Appl. 1 (2010),1, 42–53.
[21] V. Falziev, Th. M. Rassias and P. K. Sahoo, The space of (ψ, γ)–additive mappings on semigroups, Trans. Amer.
Math. Sci. 345 (2002), no. 11, 4455-4472.
[22] Z. Gajda, On the stability of additive mappings, Internat. J. Math. Math. Sci. 14(1991), 431-434.
[23] P. Gavruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings, J. Math. Anal.
Appl. 184(1994), 431-436.
[24] D.H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. 27, 222–224 (1941).
[25] G. Isac and Th. M. Rassias, Stability of ψ-additive mappings, Applications to Nonlinear analysis Internat. J. Math.
Math. Sci. 19 (1996), 219-228.
[26] R. Kerner, The cubic chessboard: Geometry and physics, Class. Quantum Grav. 14 A203 (1997).
[27] C. Park, Lie ∗−homomorphisms between Lie C∗−algebras and Lie ∗−derivations on Lie C∗−algebras, J. Math. Anal.
Appl. 293 (2004) 419–434.
[28] C. Park, Homomorphisms between Lie JC∗−algebras and Cauchy–Rassias stability of Lie JC∗−algebra derivations,
Journal of Lie Theory. 15 (2005) 393–414.
[29] J.M. Rassias, On approximation of approximately linear mappings by linear mappings, J. Funct. Anal. 46 (1982),
126–130.
[30] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 297–300 (1978).
[31] Th. M. Rassias, On the stability of functional equations and a problem of Ulam,Acta Math. Appl. 62 (2000), 23–130.
[32] Th. M. Rassias, On the stability of functional equations in Banach spaces,J. Math. Anal. Appl. 251 (2000), 264–284.
[33] Th. M. Rassias, The problem of S.M.Ulam for approximately multiplicative mappings, J. Math. Anal. Appl. 246
(2000), 352–378.
[34] Th. M. Rassias and P. Semrl, On the behaviour of mappings which do not satisfy Hyers-Ulam stability, Proc. Amer.
Math. Soc. 114 989–993 (1992).
[35] G.L. Sewell, Quantum Mechanics and its Emergent Macrophysics, Princeton Univ. Press, Princeton, NJ, 2002.
MR1919619 (2004b:82001).
[36] S. M. Ulam, Problems in Modern Mathematics, Chapter VI, science ed. Wiley, New York, 1940.
[37] H. Zettl, A characterization of ternary rings of operators, Adv. Math. 48 (1983), 117–143.
SHOKRI ET AL: NORMED LIE TRIPLE SYSTEMS
300
SOME INEQUALITIES FOR THE q-DIGAMMA FUNCTIONS
W. T. Sulaiman
Department of Computer Engineering College of Engineering
University of Mosul, Iraq.
Abstract. In [7] the authors proved many inequalities concerning the q-digamma function of the form )()()()(2 yfxfxyf ≥≤ and ).()()()( yfxfyxf +≥≤+ In the present paper we reproof some of the above results by simpler method using different technique as well as we present many other new results. 2000 Mathematics Subject Classification : 33D05. Key words : q-digamma function, integral inequality. 1. Introduction Let c be a complex number, the q-shifted factorial are defined by
(1.1) ( ) ( ) ( ) ,.....2,1,1,,1;1
00 =−== ∏
−
=
ncqqcqcn
k
kn
(1.2) ( ) ( ) ( ).1;lim; ∏∞
=∞→∞ −==
ok
knn
cqqcqc
For x complex we denote
(1.3) [ ] .1
1q
qxx
q −−
=
The q-Jakson integrals from 0 to c are defined by [5,6]
(1.4) ( ) ,)1()(00
n
n
nc
q qcqfcqxdxf ∑∫∞
=
−=
and
(1.5) ( ) n
n
nq qqfqxdxf ∑∫
∞
−∞=
∞
−= )1()(0
,
provided the sum converges absolutely . The q-analogue of the Gamma function is defined by Jakson [6] as follows
(1.6) ( )( ) ,,......2,1,0,)1(
;;
)( 1 −−≠−=Γ −
∞
∞ xqqq
qqx x
xq
and it is satisfying the following (1.7) [ ] ,1)1(),()1( =ΓΓ=+Γ qqq xxx and tends to )(xΓ as .1→q
301
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,301-308,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC
The q-integral representation of the Gamma function is (see [2,4]) as follows
(1.8) ,)()(0
1 tdetxKx qt
qx
qq−
∞−∫=Γ
where
( ) ,;)1(
1
∞−=
qtqet
q
and
( ) ( )
( ) ( )∞−−∞
∞−
∞−
−
−−−−−−−−
×−+
−=
qqqqqqqqqq
qqtK tt
x
q ;)1(;)1(;)1();1(
)1(1)1()( 11
1
1 .
The q-analogue of the psi function )()()(
xxx
ΓΓ′
=ψ is defined as the logarithmic
derivative of the q-gamma function, that is .)()(
)(xx
xq
qq Γ
Γ′=ψ
From (1.6), we obtain for 0>x
∑∞
=+
+
−+−−=
0 1log)1log()(
nxn
xn
q qqqqxψ
(1.9) ,1
log)1log(1∑∞
= −+−−=
nn
nx
qqqq
(1.10) .11
log)1log(0
1
tdt
tqqq q
q x
∫ −−+−−=
−
For ,0>x we put
⎟⎟⎠
⎞⎜⎜⎝
⎛−=
)log()log(
)log()log()(
qxE
qxxα
and
[ ][ ]( ) ,
qxxq
xx α+=
where ⎟⎟⎠
⎞⎜⎜⎝
⎛)log()log(
qxE is the integer part of .
)log()log(
qx
From (1.9) one can deduce that
(1.11) ∑∞
=
+
−=
1
1)(
1log)(
nn
nxkkk
q qqnqxψ .
2. results We start with the following Lemma Lemma 2.1. Let ,10,0, <≤> ayx then (2.1) yxyx aaa +≥+ ,
SULAIMAN: q-DIGAMMA FUNCTIONS
302
and the function yxyx aaaxf +−+=)( is non-increasing. Proof. On keeping y fixed, we have .0)(log)( ≤−=′ + yxx aaaxf Therefore f is non-increasing. Since ,0)(lim >=
∞→
y
xaxf then .0)( ≥xf
A short proof is giving for the following Lemma Lemma 2.2[7]. For 2
10 << q and ,10 << x we have .0)( <xqψ Proof. From (1.9),
∑∞
= −+−−=
1 1log)1log()(
nn
nx
qqqqxψ
∑∞
=
+−−≤1
log)1log(n
nxqqq
x
x
qqqq−
+−−=1
log)1log(
q
qqq−
+−−≤1
log)1log( = ,0)1(
log 1 <− −q
q
as qq qq −−< 1)1( for .0 21<< q
The following results extend the scope of Lemma 2.2 to .10 << q Lemma 2.3. For ,10.10 <<<< xq we have .0)( <xqψ Proof. We have
∑∞
= −+−−=
1 1log)1log()(
nn
nx
qqqqxψ
∑∞
= −+−−<
1 1log)1log(
nn
n
qqqq
dxq
qqq x
x
∫∞
−+−−=
1 1log)1log(
∫ −−
+−−=q
uduq
0 1)1log(
.0)1log()1log( =−+−−= qq The following result is proved in three different methods Theorem 2.4[7]. For all 10 << q and ,1,0 << yx (2.2) )()()( yxyx ψψψ +<+ . Proof. Method 1. By Lemma 2.1, yxyxn qqq −−+ )( is non-decreasing in both x and y .
SULAIMAN: q-DIGAMMA FUNCTIONS
303
∑∞
=
+
−−−
+−=−−+1
)(
1log)1log()()()(
nn
nynxyxn
qqq qqqqqqyxyx ψψψ
∑∞
= −−
+−≥1
2
12log)1log(
nn
nn
qqqqq
∑∑∞
=
∞
= −−−−=
11 1loglog)1log(
nn
n
n
n
qqqqqq
dzq
qqqq
qq z
z
∫∞
−−
−−−=
1 1loglog
1)1log(
∫ −+
−−−=
q
uduq
qqq
0 1log
1)1log(
.0log1
>−
q
Method 2. This method is restricted to .0,0 ∞<<> yx Write .)()()()( yxyxxf ψψψ −−+= On keeping y fixed, we have )()()( xyxxf ψψ ′−+′=′
( ) .01
log )(
1
2 ≤−−
= +∞
=∑ xyxn
nn qq
qnq
Therefore f is non-increasing . As ,0)()(lim >−=
∞→yxf
xψ then .0)( ≥xf
Method 3. We have )()()( )1()1()1( yxyx qqq ψψψ +≤+ , Let a,c be chosen such that ,0 xa << aycy +<< and
)()()()( )1( acayxa qqq ψψψ −′≥− , then we have
dxydxxdxyx q
a
xq
a
xq
a
x
)()()( )1()1()1( ψψψ ∫∫∫ +≤+
that is )()()()()()( )1( yxaxayxya qqqqq ψψψψψ −+−≤+−+ or )()()()()()()()( )1( yaxayyayxyx qqqqqq ψψψψψψψ −+−−+++≥+ . Since, by the mean value theorem ,)()()( cayya qqq ψψψ ′=−+ for some ,yacy +<< then ( ) )()()()()()( yaxacayxyx qqqqq ψψψψψψ ′−+−′++≥+ .)()( yxq ψψ +≥
SULAIMAN: q-DIGAMMA FUNCTIONS
304
)()()()()( )1( yaxaxy qqqq ψψψψ −+−+≥ ).()( xy qq ψψ +≥ An easy proof is given for the following theorem Theorem 2.5[7]. Let ).1,0(∈q Let 1≥k be an integer. (1) If k is even, then (2.3) )()()( )()()( yxyx kkk ψψψ +≥+ . (2) If k is odd, then (2.4) )()()( )()()( yxyx kkk ψψψ +≤+ . Proof. Making use of (1.11) , we have via Lemma 2.1, when k is even )()()( )()()( yxyx kkk ψψψ −−+
( ) .01
log )(
1
1 ≥−−−
= +∞
=
+ ∑ nynxyxn
nn
kk qqq
qnq
If k is odd, the above inequality reverses . The following results are all new : Theorem 2.6. Let 1≥k be an integer, ,1,1 11 =+> tss then
(i) If k odd, (2.5) ( ) ( ) ( ) .)()( /1)(/1)()( tk
qsk
qty
sxk
q yx ψψψ ≤+ (ii) If k even (2.5) reverses. In particular, for odd k ( )( ) ,)()( )()(2
2)( yx k
qk
qyxk
q ψψψ ≤+ the above inequality reverses if k is even. If k is odd, then ( )( ) )()( )()(2)( yxyx k
qk
qk
q ψψψ ≤+ . Proof.
( ) ∑∞
=
⎟⎠⎞
⎜⎝⎛ +
+
−=+
1
1)(
1log
nn
ty
sxn
kk
ty
sxk
q qqnqψ
( ) ( )tn
tny
tk
n sn
snx
sk
k
q
qn
q
qnq 11
11
11log
−−= ∑
∞
=
+
t
nn
nyks
nn
nxkk
qqn
qqnq
/1
1
/1
1
1
11log ⎟⎟
⎠
⎞⎜⎜⎝
⎛−⎟⎟
⎠
⎞⎜⎜⎝
⎛−
≤ ∑∑∞
=
∞
=
+
SULAIMAN: q-DIGAMMA FUNCTIONS
305
t
nn
nykk
s
nn
nxkk
qqnq
qqnq
/1
1
1/1
1
1
1log
1log ⎟⎟
⎠
⎞⎜⎜⎝
⎛−⎟⎟
⎠
⎞⎜⎜⎝
⎛−
= ∑∑∞
=
+∞
=
+
( ) ( ) .)()( /1)(/1)( tkq
skq yx ψψ=
On putting ,21== ts we obtain
( )( ) .)()( )()(2
2)( yx k
qk
qyxk
q ψψψ ≤+
If k is odd, )()( xkqψ is decreasing and hence
( ) ( )( ) )()()( )()(2
2)(2 yxyx k
qk
qyxk
qψψψψ ≤≤+ + .
Theorem 2.7. Let 1≥k be an odd integer. Then (2.6) ( ) ( ) .(()( /1)(/1)()( ttk
qssk
qk
q yxxy ψψψ ≤ In particular for ,1, ≥yx
(2.7) ( ) )()()( )()(2)( yxxy kq
kq
kq ψψψ ≤ .
Proof.
∑∞
=
+
−=
1
1)(
1log)(
nn
nxykkk
q qqnqxyψ
∑∞
=
⎟⎟⎠
⎞⎜⎜⎝
⎛+
+
−≤
1
1
1log
nn
ty
sxn
kk
qqnq
ts
t
nn
nykk
s
nn
nxkk
qqnq
qqnq
ts /1
1
1
/1
1
1
1log
1log ⎟
⎟⎠
⎞⎜⎜⎝
⎛
−⎟⎟⎠
⎞⎜⎜⎝
⎛
−≤ ∑∑
∞
=
+∞
=
+
( ) ( ) .(( /1)(/1)( ttkq
sskq yx ψψ=
In particular, If ,1, ≥yx then )()( )()( xx k
qsk
q ψψ < , and the same for y and hence we have ( ) ( ) .()()( /1)(/1)()( tk
qsk
qk
q yxxy ψψψ ≤ On putting ,2== ts we obtain
( ) .)()()( )()(2)( yxxy kq
kq
kq ψψψ ≤
Theorem 2.8. Let .0, >ba Define
( ))2(
)1()1(1,1
byaxbyax
byaxBq
qqq ++Γ
+Γ+Γ=++ .
Then the function qB is non-increasing Proof. Define
( ) .)2(
)1()1(1,1)(
byaxbyax
byaxBxfq
qqq ++Γ
+Γ+Γ=++=
)2(log)1(log)1(log)(log byaxbyaxxf qqq ++Γ−+Γ++Γ=
SULAIMAN: q-DIGAMMA FUNCTIONS
306
On keeping y fixed and differentiating with respect to x, we have
)2()2(
)1()1(
)()(
byaxbyaxa
axaxa
xfxf
+++Γ++Γ′
−+Γ+Γ′
=′
)2()1( byaxaaxa qq ++Ψ−+= ψ
( )( ) .01
log 1
1
≤−−
= ++∞
=∑ byaxnnax
nn
n
qqq
qqa
Theorem2.9. Let .1,1 11 =+> tss Then
(2.8) ( ) ( ) ttssq qyqxqxy /1/1 )1log()()1log()()1log()( −+Ψ−+Ψ≥−+Ψ .
Proof. We have
∑∞
=
⎟⎟⎠
⎞⎜⎜⎝
⎛+
−+−−=Ψ
1 1log)1log()(
nn
ty
sxn
q qqqqxy
ts
( ) ( ) tn
tny
nsn
snx
qqqq
ts
/11
/1 11log)1log(
−−+−−= ∑
∞
=
t
nn
nys
nn
nx
qqqq
ts /1
1
/1
1 11log)1log( ⎟
⎟⎠
⎞⎜⎜⎝
⎛
−⎟⎟⎠
⎞⎜⎜⎝
⎛
−+−−≥ ∑∑
∞
=
∞
=
,1
log1
log)1log(/1
1
/1
1
t
nn
nys
nn
nx
qqq
qqqq
ts
⎟⎟⎠
⎞⎜⎜⎝
⎛
−⎟⎟⎠
⎞⎜⎜⎝
⎛
−+−−= ∑∑
∞
=
∞
=
which implies ( ) ( ) ttss
q qyqxqxy /1/1 )1log()()1log()()1log()( −+Ψ−+Ψ≥−+Ψ
References [1] K. Brahim, Turan type inequalities for some q-special functions, J. Inequal. Pure Appl. Math.,10 (2) (2009), Art.50. [2] A. De. Sole and V. G. Kac, On integral representation ofq-gamma and q-beta Function, Atti. Accad. Naz. Lincei Cl.. Fis. Sci. Mat. Natur. Rend. Lincei Mat. Appl., 16(9) (2005), 11-29. [3] A. Fitouhi, N. Bettaibi and K. Brahim, The Mellin transform in quantum calculus Constructive Approximation, 23 (3) (2006), 305-323. [4] A. Fitouhi and K. Brahim, Tauberian theorems in quantum calculus, J. Nonlinear Mathematical Physics, 14(3) (2007), 316-332. [5] G. Gasper and M. Rahman, Basic hypergeometric series, Encyclopedia of Math- ematics and its Applications, Vol.35, Cambridge Univ. Press, Cambridge, UK, 1990. [6] F. H. Kackson, On a q-definite integral, Quarterly J. Pure and Appl. Math., 41 (1910), 193-203.
SULAIMAN: q-DIGAMMA FUNCTIONS
307
[7] T. Mansour and A. S. Shabani, Some inequalities for the q-digamma function, J, Inequal. Pure Appl. Math.,10(1) (2009), Art. 12.
SULAIMAN: q-DIGAMMA FUNCTIONS
308
Some Product Summability Of An Infinite Series
W. T. Sulaiman
Abstract. New results concerning product summability of an infinite series are given. Some special cases are
also deduced.
1. Introduction Let ∑ na be a given infinite series with partial sums ns . Let α
nu denote the nth
Cesaro mean of order 1−>α of the sequence ( )ns . The series ∑ na is summable
,1,, ≥kCk
α if
(1) ( ).]1[11
1 Flettuunk
nnn
k ∞<− −
∞
=
−∑ αα
For k
C αα ,,1= reduces to k
C 1, summability. Let ( )np be a sequence of positive real constants such that ∞→++= nn ppP ...0 As ∞→n ( ).011 == −− pP The ( )pN , transform nφ of ( )ns generated by ( )np is defined by
(2) .10∑=
−=n
vvvn
nn sp
Pφ
The sequence - to – sequence transformation
∑=
=Φn
vvv
nn sp
P 0
1
defines the sequence ( )nΦ of ( )npN , transform of ( )ns generated by ( ).np The series ∑ na is summable ,1,, ≥kpR
kn if
(3) .11
1 ∞<Φ−Φ −
∞
=
−∑ knn
n
kn
In the special case when 1=np for all n (resp. k=1) , knpR, summability reduces
to k
C 1, (resp. npR, ) summability .
309
JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,309-318,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC
The series ∑ na is said to be summable ( )( )qNpN ,, , when the ( )pN , transform
of the ( )qN , transform of ( )ns is a sequence of bounded variation (see Das [2]) . We give the following new definition : Let ( )nT defines the sequence of the ( )nqN , transform of the ( )npN , transform of ( )ns generated by the sequences ( )nq and ( )np respectively. The series ∑ na is
said to be summable ( )( ) ifkpRqRknn ,1,,, ≥
(4) .1
11 ∞<−∑
∞
=−
−k
nnn
k TTn
We may assume through the paper that ,,...0 ∞→∞→++= nasqqQ nn
2. New Results We state and prove the following Theorem 1. Let ( )nk λ,1≥ be a sequence of constants. Define
∑∑==
==n
vrrrv
n
vr r
rv fpF
Pq
f , .
Let ( ),)5( vvv PQp Ο=
( )
.)6(1
1 1
1
⎟⎟⎠
⎞⎜⎜⎝
⎛Ο=
−∞
+= −
−
∑ kv
kv
vn nkn
kn
k
Qvq
QQqn
Then sufficient conditions for the implication
(7) ( )( )knnnnknn pRqRsummableisapRsummableisa ,,, ∑∑ ⇒ λ
are ( ) ,)8( vvn QF Ο=λ
( ),1)9( Ο=vvv fP λ
( ),)10( vvv Qp Ο=λ
(11) ( ),nnn pP Ο=λ
( ),)12( vvvvv QpFP Ο=∆λ and ( ).)13( vvvv QpP Ο=∆λ Proof. Let ( )nS be the sequence of partial sums of ∑ nna λ . Let nn Vv , be the
( ) ( )( )nnn pNqNpN ,,,, transforms of the sequences ( ) ( )nn Ss , respectively. We
SULAIMAN: PRODUCT SUMMABILITY
310
write ., 11 −− −=−= nnnnnn VVTvvt Therefore
(14) ∑=
−−
=n
vvv
nn
nn aP
PPp
t1
11
,
and
∑∑==
=r
vvv
r
n
rr
nn Sp
Pq
QV
00
11
∑∑==
=n
vr r
rn
vvv
n Pq
SpQ 0
1
.10∑=
=n
vvvv
n
fSpQ
1−−= nnn VVT
101 −=−
+= ∑n
nnnn
rrrr
nn
n
QfSp
fSpQQq
∑∑ ∑=−= =−
+=n
vvv
nn
nnv
r
r
vvvrr
nn
n aQPqp
afpQQq
010 01
λλ
∑ ∑∑= =−=−
+=n
vr
n
vvv
nn
nnrr
n
vvv
nn
n aQPqp
fpaQQq
0101
)15( λλ
11
1111
11 −=
−−=−=
−−
∑∑∑ +=v
vn
vvv
nn
nnn
vrrr
v
vn
vvv
nn
n
PaP
QPqp
fpP
aPQQq λλ
⎟⎟⎠
⎞⎜⎜⎝
⎛⎟⎠
⎞⎜⎝
⎛+⎟⎟⎠
⎞⎜⎜⎝
⎛∆⎟⎠
⎞⎜⎝
⎛= ∑ ∑∑∑
−
= −=−
=−=−
−
1
1 111
111
1
n
v n
nnnn
vvv
n
vrrr
v
vv
v
rrr
nn
n
Qfp
aQfpQ
aQQQq λλ
⎟⎟⎠
⎞⎜⎜⎝
⎛⎟⎠
⎞⎜⎝
⎛+⎟⎟⎠
⎞⎜⎜⎝
⎛∆⎟⎠
⎞⎜⎝
⎛+ ∑ ∑∑
−
= −=−
−=−
−
1
1 111
111
1
n
v n
nn
vvv
v
vv
rrr
nn
nn
PaP
PaP
QPqp λλ
nnnn
n
vvvv
v
vvvvvvvv
nn
n ftPFtp
PftPFt
QQq
λλλλ +⎟⎟⎠
⎞⎜⎜⎝
⎛⎟⎟⎠
⎞⎜⎜⎝
⎛∆++= ∑
−
=+
−−
−
1
11
11
1
,1
1
1
1nn
n
nn
vvv
v
vvvv
nn
nn tpP
tp
Ptp
QPqp
λλλ +⎟⎟⎠
⎞⎜⎜⎝
⎛⎟⎟⎠
⎞⎜⎜⎝
⎛∆++ ∑
−
=
−
−
.7
1∑=
=j
njT
In order to complete the proof, it sufficient to show that
.7,6,5,4,3,2,1,
1
1 =∞<∑∞
=
− jTnk
njn
k
Applying Holder's inequality,
SULAIMAN: PRODUCT SUMMABILITY
311
kn
vvvv
nn
nm
n
kkn
m
n
k FtQQq
nTn ∑∑∑−
=−
+
=
−+
=
− =1
11
1
2
11
1
2
1 λ
11
1 1
1
11
1
2 1
1 1−
−
= −
−
=−
+
= −
−
⎟⎟⎠
⎞⎜⎜⎝
⎛≤ ∑∑∑
kn
v n
vv
kv
kv
n
vkv
m
n nkn
kn
k
FtqQQ
qn k
λ
( ) ∑∑+
+= −
−
=−
Ο=1
1 1
1
11
11m
vn nkn
kn
kk
vk
vk
v
m
vkv QQ
qnFt
qλ
( ) ( ).111
1 Ο=Ο= ∑=
−kv
kv
kvk
v
m
v
k
QF
tvλ
kn
vvvvv
nn
nm
n
kkn
m
n
k ftPQQq
nTn ∑∑∑−
=−
−
+
=
−+
=
− =1
11
1
1
2
12
1
2
1 λ
11
1 1
1
11
1
2 1
1 −−
= −
−
=−
+
= −
−
⎟⎟⎠
⎞⎜⎜⎝
⎛≤ ∑∑∑
kn
v n
vkv
kv
kv
n
vkv
kv
m
n nkn
kn
k
ftqP
QQqn
λ
( ) ∑∑+
+= −
−
=−
Ο=1
1 1
1
111
m
vn nkn
kn
kk
vk
vk
v
m
vkv
kv
QQqn
ftqP
λ
( ) kv
kvk
v
kvk
v
m
v
k fQP
tv λ∑=
−Ο=1
11
( ) ( ).111
1 Ο=Ο= ∑=
− kv
m
v
k tv
kn
vvvv
v
v
nn
nm
n
kkn
m
n
k Ftp
PQQq
nTn ∑∑∑−
=+
−
−
+
=
−+
=
− ∆=1
11
1
1
1
2
13
1
2
1 λ
kn
v n
vkv
kv
kv
n
vkv
kv
kv
nkn
kn
m
n
k
QqFt
qpP
QQqn ⎟⎟
⎠
⎞⎜⎜⎝
⎛∆≤ ∑∑∑
−
= −
−
=−
−
+
=
−1
1 1
1
11
1
1
1
1 λ
( ) ∑∑+
+= −
−
=−
∆Ο=1
1 1
1
111
m
vn nkn
kn
kk
vk
vk
v
m
vkv
kv
kv
QQqn
Ftqp
Pλ
( ) ( ).111
1 Ο=∆Ο= ∑=
−kv
kv
kvk
vk
vk
v
m
v
k
QpP
Ftv λ
knnnn
m
n
kkn
m
n
k ftPnTn λ∑∑=
−
=
− =1
14
1
1
( ) ( ).111
1 Ο=Ο= ∑=
− kn
kn
kn
kn
m
n
k fPtn λ ,
kn
vvvv
nn
nnm
n
kkn
m
n
k tpQPqp
nTn ∑∑∑−
=−
+
=
−+
=
− =1
11
1
2
15
1
2
1 λ
SULAIMAN: PRODUCT SUMMABILITY
312
( ) ∑∑+
+= −
−
−=
Ο=1
1 1
1
11
11m
vn nkn
kn
k
kv
kv
km
vv
kv QQ
qnq
tp λ
( ) ( ).111
1 Ο=Ο= ∑=
−kv
kvk
vk
v
m
v
k
Qp
tv λ
kn
vvv
v
v
nn
nnm
n
kkn
m
n
k tp
PQPqp
nTn ∑∑∑−
=
−
−
+
=
−+
=
− ∆=1
1
1
1
1
2
16
1
2
1 λ
11
1 1
1
11
1
1
2
1−
−
= −
−
=−
−
+
=
−⎟⎟⎠
⎞⎜⎜⎝
⎛∆≤ ∑∑∑
kn
v n
vkv
kv
n
vkk
v
kv
nk
n
kn
kn
m
n
k
tqp
PQPqp
n λ
( )1
1
1
1
11
11−
+
+=
−
=− ∑∑ ∆Ο=
nk
n
kn
kn
m
vn
kkv
kv
m
vkv
kv
k
QPqp
ntqp
Pλ
( ) ( ).111
1 Ο=∆Ο= ∑=
−kv
kv
kvk
vk
v
m
v
k
QpP
tv λ
Finally
k
nnn
nm
n
kkn
m
n
k tpP
nTn λ∑∑=
−
=
− =1
17
1
1
( ) ( ).111
1 Ο=Ο= ∑=
−kn
knk
nk
n
m
n
k
pP
tn λ
This completes the proof of the theorem .
Theorem 2 . Let
(16) ( )
,1
1 1
1
⎟⎟⎠
⎞⎜⎜⎝
⎛Ο=
−∞
+= −
−
∑ kv
kv
vn nk
v
kn
k
Pvp
PPpn
(17) ( ),vvv QpP Ο= (18) ( ).nn nqQ Ο= Then necessary conditions for the implication (8) to be satisfied are
( ) ( ) .1
,,1 1
/11/111
⎟⎟⎠
⎞⎜⎜⎝
⎛+
Ο=∆⎟⎟⎠
⎞⎜⎜⎝
⎛Ο=⎟⎟
⎠
⎞⎜⎜⎝
⎛+
Ο=+
−−−
v
v
v
vk
vvv
vk
vv
v
vv
vvv P
pF
QvfPQv
Pp
qFQQ
λλλ
Proof . For 1≥k define ( ) ∑=
knjj pRsummableisaaA ,:* ,
( ) ( )( ) .,,:*knnjjj pRqRsummableisbbB ∑= λ
SULAIMAN: PRODUCT SUMMABILITY
313
From (15), we have
(19) vv
n
v nn
nn
nn
vnn a
QPqp
QQFq
T λ∑= −−
⎟⎟⎠
⎞⎜⎜⎝
⎛+=
1 11
With nn Tandt as defined by (14) and (19), the spaces ** BandA are BK-spaces with norms defined by
(20) k
kn
n
kk tntc/1
1
101 ⎭
⎬⎫
⎩⎨⎧
+= ∑∞
=
− ,
(21) ./1
1
102
kk
nn
kk TnTc⎭⎬⎫
⎩⎨⎧
+= ∑∞
=
−
respectively. By the hypothesis of the theorem, (22) ∞<⇒∞<
21cc .
The inclusion map **: BAi → defined by i(a) = a is continuous since *A and *B are BK-spaces. By the closed graph theorem, there exist a constant K>0 such
that (23) .
12cKc ≤
Let ne denote the nth coordinate vector. From (14) and (19), with ( )na defined by
0,,1 ==−= + nnnn avneea otherwise, we have
⎪⎪⎪⎪
⎩
⎪⎪⎪⎪
⎨
⎧
>−
=
<
=
−
.,
,
,0
1
vnPPpp
vnPp
vn
t
nn
vn
v
vn
and
⎪⎪⎪⎪
⎩
⎪⎪⎪⎪
⎨
⎧
>⎟⎟⎠
⎞⎜⎜⎝
⎛⎟⎟⎠
⎞⎜⎜⎝
⎛+∆
=⎟⎟⎠
⎞⎜⎜⎝
⎛+
<
=
−−
−−
.,
,0
11
11
vnQPqp
QQFq
vnQPqp
QQFq
vn
T
vnn
nn
nn
vnv
vvv
vv
vv
vvn
λ
λ
SULAIMAN: PRODUCT SUMMABILITY
314
From (20) and (21), we have
(24) ,
/1
11
111
kk
nn
vn
vn
kk
v
vk
PPpp
nPp
vc⎪⎭
⎪⎬⎫
⎪⎩
⎪⎨⎧
⎟⎟⎠
⎞⎜⎜⎝
⎛+⎟⎟
⎠
⎞⎜⎜⎝
⎛=
−
∞
+=
−− ∑
kk
vnn
nn
nn
vnv
vn
k
k
vvv
vv
vv
vvk
QPqp
QQFq
nQPqp
QQFq
vc
/1
111
1
11
12
)25(⎪⎭
⎪⎬⎫
⎪⎩
⎪⎨⎧
⎟⎟⎠
⎞⎜⎜⎝
⎛⎟⎟⎠
⎞⎜⎜⎝
⎛+∆+⎟⎟
⎠
⎞⎜⎜⎝
⎛+=
−−
∞
+=
−
−−
− ∑ λλ
Applying (23), we obtain
(26) k
vnn
nn
nn
vnv
vn
k
k
vvv
vv
vv
vvk
QPqp
QQFq
nQPqp
QQFq
v ⎟⎟⎠
⎞⎜⎜⎝
⎛⎟⎟⎠
⎞⎜⎜⎝
⎛+∆+⎟⎟
⎠
⎞⎜⎜⎝
⎛+
−−
∞
+=
−
−−
− ∑ λλ111
1
11
1
( ) .111
11
⎟⎟
⎠
⎞
⎜⎜
⎝
⎛⎟⎟⎠
⎞⎜⎜⎝
⎛+⎟⎟
⎠
⎞⎜⎜⎝
⎛Ο=
−
∞
+=
−− ∑k
nn
vn
vn
kk
v
vk
PPpp
nPp
v
As the R.H.S of (26), by (16), is
( )⎟⎟
⎠
⎞
⎜⎜
⎝
⎛+⎟⎟
⎠
⎞⎜⎜⎝
⎛Ο= ∑
∞
+= −
−
−−
1 1
1
111
vn nk
n
kn
k
kv
kv
k
v
vk
PPpn
Pp
Pp
v
( ) ⎟⎟
⎠
⎞
⎜⎜
⎝
⎛⎟⎟⎠
⎞⎜⎜⎝
⎛⎟⎟⎠
⎞⎜⎜⎝
⎛+⎟⎟
⎠
⎞⎜⎜⎝
⎛Ο= −
−
−
k
v
vkk
v
vk
v
vk
Pp
vPp
Pp
v 11
11
,1
⎟⎟
⎠
⎞
⎜⎜
⎝
⎛⎟⎟⎠
⎞⎜⎜⎝
⎛Ο= −
k
v
vk
Pp
v
and the fact that each term of the L.H.S of (26) is ⎟⎟
⎠
⎞
⎜⎜
⎝
⎛⎟⎟⎠
⎞⎜⎜⎝
⎛Ο −
k
v
vk
Pp
v 1 , we obtain
⎟⎟
⎠
⎞
⎜⎜
⎝
⎛⎟⎟⎠
⎞⎜⎜⎝
⎛Ο=⎟⎟
⎠
⎞⎜⎜⎝
⎛+ −
−−
−
k
v
vkkv
k
vv
vv
vv
vvk
Pp
vQPqp
QQFq
v 1
11
1 λ ,
which implies by (17)
( )k
v
vkv
kv
k
vv
v
Pp
FQQq
⎟⎟⎠
⎞⎜⎜⎝
⎛Ο=+⎟⎟
⎠
⎞⎜⎜⎝
⎛
−
λ11
,
that is
( ) ⎟⎟⎠
⎞⎜⎜⎝
⎛+
Ο= −
v
v
vv
vvv P
pqF
QQ1
1λ .
Also, we have, by (26),
(27) ⎟⎟
⎠
⎞
⎜⎜
⎝
⎛⎟⎟⎠
⎞⎜⎜⎝
⎛Ο=∆⎟⎟
⎠
⎞⎜⎜⎝
⎛++⎟⎟
⎠
⎞⎜⎜⎝
⎛ −
−−
+
−
∞
+=
−∑k
v
vk
k
vnn
nn
nn
vnv
nn
vvn
vn
k
vQPqp
QQFq
QQfpq
n 1
11
1
11
1 λλ .
SULAIMAN: PRODUCT SUMMABILITY
315
The above , via the linear independence of vv and λλ ∆ , implies
⎟⎟
⎠
⎞
⎜⎜
⎝
⎛⎟⎟⎠
⎞⎜⎜⎝
⎛Ο=∆⎟⎟
⎠
⎞⎜⎜⎝
⎛+ −
∞
+= −−
+−∑k
v
vkkv
k
vn nn
nn
nn
vnk
Pp
vQPqp
QQFq
n 1
1 11
11 λ
( ) ⎟⎟
⎠
⎞
⎜⎜
⎝
⎛⎟⎟⎠
⎞⎜⎜⎝
⎛Ο=⎟⎟
⎠
⎞⎜⎜⎝
⎛+∆ −
−
∞
+=
−+ ∑
k
v
vkk
nn
n
vn
kkv
kv P
pvQQqnF 1
11
111λ (by (17))
As, by (18), via the mean value theorem,
( ) ( ) ( ) ,11111
11
1
1 1
11
1 1
1
1 1
k
nn
n
vn
k
vnkn
kn
nkn
vnkn
kn
kn
vnkn
kv QQ
qn
QQqQ
Q
QQ ⎟⎟⎠
⎞⎜⎜⎝
⎛Ο=Ο=
∆Ο=⎟⎟
⎠
⎞⎜⎜⎝
⎛∆=
−
∞
+=
−∞
+= −
−−
∞
+= −
−∞
+= −∑∑∑∑
we get
( ) ,11 11 ⎟
⎟
⎠
⎞
⎜⎜
⎝
⎛⎟⎟⎠
⎞⎜⎜⎝
⎛Ο=+∆ −
+
k
v
vk
v
kv
kv P
pv
QFλ
which implies
.1 1
/11
⎟⎟⎠
⎞⎜⎜⎝
⎛+
Ο=∆+
−
v
v
v
vk
v Pp
FQv
λ
Also, by (26),
,1
11
1
⎟⎟
⎠
⎞
⎜⎜
⎝
⎛⎟⎟⎠
⎞⎜⎜⎝
⎛Ο= −
−+=
−∑k
v
vkk
vnn
vvn
vn
k
Pp
vQQ
fpqn λ
,1
11
1
⎟⎟
⎠
⎞
⎜⎜
⎝
⎛⎟⎟⎠
⎞⎜⎜⎝
⎛Ο=⎟⎟
⎠
⎞⎜⎜⎝
⎛ −
−
∞
+=
−∑k
v
vkk
nn
n
vn
kkv
kv
kv P
pv
QQq
nfp λ
⎟⎟
⎠
⎞
⎜⎜
⎝
⎛⎟⎟⎠
⎞⎜⎜⎝
⎛Ο= −
k
v
vkkv
kv
kv
kv P
pv
Qfp 11λ ,
which implies
./11
⎟⎟⎠
⎞⎜⎜⎝
⎛Ο=
−
vv
vk
v fPQv
λ
3. Applications Corollary 3. Let .1≥k Define
(28) ., ∑∑==
==n
vrrv
n
vr
rv fF
rq
f
Let (29) ( ),vQv Ο= (30) ( )vv qf Ο= . Then sufficient conditions for the implication
SULAIMAN: PRODUCT SUMMABILITY
316
(31) ∑ na is summable knqR, ∑⇒ nna λ is summable ( )( )
kn CqR 1,, are (32) ,nn Q<λ
(33) ( ),1Ο=vv fλ
(34) ( )vvv QF Ο=λ ,
(35) ( ),vvv qF Ο=∆λ
(36) ( ).vv qΟ=∆λ Proof. Follows from theorem 1 by putting 1=np for all n. Corollary 4. Let .1≥k Define
(37) .,1 ∑∑==
==n
vrrrv
n
vr rv fpF
Pf
Let (38) ( ),vv Pvp Ο= (39) ( ).vfP vv Ο= Then sufficient conditions for the implication (40) ∑ na is summable ∑⇒ nnk
aC λ1, is summable ( )( ) knpRC ,1, are (41) ,nn <λ
(42) ( ),vvv Pvp Ο=λ
(43) ( ),vFvv Ο=λ
(44) ( ),1Ο=∆ vv Fλ
(45) ( ).1Ο=∆ vλ Proof. This follows from theorem 1, by putting 1=nq for all n, noticing that (3) is obviously satisfied as
(46) ( ) .111
11
111 vnnnn vnvn
=⎟⎠⎞
⎜⎝⎛ −
−=
− ∑∑∞
+=
∞
+=
Corollary 5. Let vv Ff , be as defined in (28) . Let (18) be satisfied and (47) ( ).nQn Ο= Then necessary conditions for the implication (31) are
( ) ( ).
1,,
1 /11
/111
⎟⎟⎠
⎞⎜⎜⎝
⎛
+Ο=∆⎟⎟
⎠
⎞⎜⎜⎝
⎛Ο=⎟⎟
⎠
⎞⎜⎜⎝
⎛+
Ο=+
−−
kv
vv
v
vk
vvv
vvv vF
Qvf
QvvqF
QQλλλ
Proof. Follows from theorem 4 by putting 1=np for all n, noticing that (16) is satisfied, the same as (46) .
SULAIMAN: PRODUCT SUMMABILITY
317
Corollary 6. Let vv Ff , be as defined in (36) . Let (16) be satisfied and (48) ( ).vv vpP Ο= Then necessary conditions for the implication (40) are
.1
,,1 1
/12/122
⎟⎟⎠
⎞⎜⎜⎝
⎛+
Ο=∆⎟⎟⎠
⎞⎜⎜⎝
⎛Ο=⎟⎟
⎠
⎞⎜⎜⎝
⎛+
Ο=+
−−
v
v
v
k
vvv
k
vv
v
vv P
pF
vfP
vPp
Fv λλλ
Proof. Follows from theorem 4 by putting 1=nq for all n .
References [1] T.M.Flett, On an extension of absolute summability and some theorems of Littlewood and Paley, Proc. London. Math. Soc.7 (1957) 113-141. [2] G. Das, Tauberian theorems for absolute Norlund summability, Proc. London Math. Soc. 19 (1969) 357-384.
SULAIMAN: PRODUCT SUMMABILITY
318
319
TABLE OF CONTENTS, JOURNAL OF CONCRETE AND
APPLICABLE MATHEMATICS, VOL. 10, NO.’S 3-4, 2012
A New Approach of Statistical Hypothesis Verification, Iuliana F. Iatan, …….…………….151
Elements of right delta fractional Calculus on Time Scales, George A. Anastassiou,……….…………………………………………………………………………..159
Center Manifolds For Some Partial Functional Differential Equations with Infinite Delay in Fading Memory Spaces, Mostafa Adimy, Khalil Ezzinbi and Catherine Marquet,……………………………………………………………………………………… 168
Fuzziffied Random Generalized Nonlinear Variational Like Inequalities, George A. Anastassiou, Salahuddin and M.K. Ahmad, ………………………………………………………………. 186
Spaces of type and a convolution product associated with a singular second order
differential operator, M.Dziri, M.Jelassi, L.T.Rachdi,………………………………………. 207
Multivariate complex general singular integral operators simultaneous approximation, George A. Anastassiou,…………………………………………………………………………………...233
Stability and superstability of *−bihomomorphisms on C*-ternary algebras, M. Eshaghi Gordji and A. Fazeli,………………………………………………………………………………… 245
Convergence of Complex General Singular Integral Operators, George A. Anastassiou and
Razvan A. Mezei,……………………………………………………………………………..259
On the MAC solution for a circular elastic plate, Igor Neygebauer,…………………………284
Approximate bi-homomorphisms and bi-derivations in normed Lie triple systems, Javad Shokri, Ali Ebadian, Rasoul Aghalari and Madjid Eshaghi Gordji,………………………………….291
Some Inequalities for the q-Digamma Functions, W. T. Sulaiman,………………………….301
Some Product Summability of an Infinite Series, W. T. Sulaiman,……………………….....309
320