JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS VOLUME 26, 2019


360 39 27MB

en Pages [1532]

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
BLOCK-2019-V26-1
FACE-2019-V26-1
JCAAA-2019-V26-front-1
BACK-JOCAAA-2019
SCOPE--JOCAAA--2019
EB--JOCAAA--2019
Instructions--JOCAAA--2019
Binder-26-1
3-2019-REV-Nazeer-Mehmood-Kang-Haq-JOCAAA-1-10-2018
4-2019-HEBA MUSTAFA-JOCAAA-3-7-2017
5-2019-PARK-JANG-JOCAAA-3-7-2017
7-2019-CHOONKIL PARK-JOCAAA--3-8-2017
8-2019-Sivasubramanian-JOCAAA--3-9-2017
Introduction and Definitions
Preliminary Lemmas
Properties of the class Sq(k,,m)
A coefficient inequality for the class Sq(k,,m)
9-2019-Lee-Chae Jang-JOCAAA--3-9-2017
10-2019-Qing Zou-jocaaa--3-9-2017
1. Introduction
2. Main Lemmas
3. transformation formula for the very-well-poised 33
4. transformation formula for the well-poised 44
References
11-2019-REV-Faizullah-JOCAAA-1-4-2019
12-2019-Anchalee Kaewcharoen-JOCAAA--3-10-2017
13-2019-REV-H-Koh-JOCAAA-1-5-2018
15-2019-Seok-Zun Song-JOCAAA-3-11-2017
1. Introduction
2. Preliminaries
3. Comparisons between isolation numbers and semiring ranks of fuzzy matrices
References
References
16-2019-Xiaoguang Qi-JOCAAA--3-11-2017
17-2019-REV-CHOONKIL PARK-JOCAAA-12-23-2017
18-2019-REV-Xiaoni Chi-JOCAAA-1-2-2018
19-2019-REV-Meraj Ali Khan-JOCAAA-1-1-2018
20-2019-Young-Oh Yang-JOCAAA-6-29-2017
BLANK-JoCAAA-2019-1
BLANK-JoCAAA-2019-2
BLOCK-2019-V26-2
FACE-2019-V26-2
JCAAA-2019-V26-front-2
BACK-JOCAAA-2019
SCOPE--JOCAAA--2019
EB--JOCAAA--2019
Instructions--JOCAAA--2019
Binder-26-2
21-2019-Taekyun Kim-jocaaa--3-13-2017
23-2019-Kavitha-JOCAAA-3-14-2017
1. Introduction and preliminaries
2. main results
References
24-2019-malik-jocaaa--3-14-2017
25-2019-REV-Yonghong Shen-JOCAAA-1-15-2018-EUDOX
26-2019-REV-kasamsuk ungchittrakool-JOCAAA-1-12-2018
27-2019-OROS-JOCAAA-3-17-2017
29-2019-REV-Yanhua Zhang-JOCAAA-1-4-2018
30-2019-REV-Hanying Fen-JOCAAA-1-3-2018
33-2019-Jiandong Yin-jocaaa--3-23-2017
35-2019-Erkan-Tasdemir-jocaaa--3-25-2017
36-2019-REV-long-zhao-JOCAAA-1-18-2018
Introduction and preliminaries
Main results
Cone and fixed point theorems
Existence and uniqueness
Example
Acknowledgment
38-2019-Young Cho-Park-JOCAAA-3-28-2017
39-2019-Zhan-hong Shi-JOCAAA-3-29-2017
41-2019-Lee-Chae Jang-JOCAAA-3-30-2017
1. Introduction
2. Fourier series of functions of the first type involving higher-order Euler polynomials
3. Fourier series of functions of the second type involving higher-order Euler polynomials
4. Fourier series of functions of the third type involving higher-order Euler polynomials
References
43-2019-Liu Kai-JOCAAA--4-3-2017
44-2019-Qi and Dou-JOCAAA-4-6-2017
BLANK-JoCAAA-2019-1
BLANK-JoCAAA-2019-2
BLANK-JoCAAA-2019-3
BLOCK-2019-V26-3
FACE-2019-V26-3
JCAAA-2019-V26-front-3
BACK-JOCAAA-2019
SCOPE--JOCAAA--2019
EB--JOCAAA--2019
Instructions--JOCAAA--2019
Binder-26-3
45-2019-Jin-Mun Jeong-JOCAAA--4-6-2017
46-2019-Dong Yun Shin-JOCAAA-4-7-2017
47-2019-Guoqing Hong-jocaaa-4-8-2017
50-2019-Jongkyum Kwon-JOCAAA-4-10-2017
51-2019-yunfei du-JOCAAA-4-12-2017
52-2019-REV-Tuo-Lan-JOCAAA-12-26-2017
54-2019-Gang Lu-JOCAAA-4-12-2017
57-2019-REV-Dan Su-Yuan He-JOCAAA-12-20-2017
58-2019-Nak Eun Cho-jocaaa-4-17-2017
59-2019-REV-Feng Qi-JOCAAA-12-28-2017
Introduction
Definition and Lemmas
Some new integral inequalities of Simpson's type
60-2019-gunduz-aydogdu-aygun-JOCAAA--4-19-2017
61-2019-REV-Han-Ahn-JOCAAA-12-27-2017
62-2019-Jung Rye Lee-JOCAAA--4-24-2017
63-2019-Shu-Xin Miao-JOCAAA-4-26-2017
64-2019-Sung Jin Lee-PARK-JOCAAA-4-27-2017
65-2019-fnl-choonkil park-JOCAAA-5-4-2017
BLANK-JoCAAA-2019-1
BLANK-JoCAAA-2019-2
BLANK-JoCAAA-2019-3
BLOCK-2019-V26-4
FACE-2019-V26-4
JCAAA-2019-V26-front-4
BACK-JOCAAA-2019
SCOPE--JOCAAA--2019
EB--JOCAAA--2019
Instructions--JOCAAA--2019
Binder-26-4
66-2019-REV-Jian Zhu-JOCAAA-1-12-2018
67-2019-Sungsik Yun -JOCAAA-5-2-2017
69-2019-REV-khanfer-jocaaa-12-20-2017
71-2019-REV-Abeer AL Otaibi-12-30-2017
72-2019-Nazim Mahmudov-jocaaa-5-3-2017
73-2019-REV-CETINKAYA-JOCAAA-12-28-2017
74-2019-REV-LU-TAO-JOCAAA-12-24-2017
75-2019-Tian- Zhou Xu-J-RASSIAS-JOCAAA-5-4-2017
77-2019-Yongxiang Li-JOCAAA-5-5-2017
81-2019-Kang-Rafiq-Kwun-Ali-JOCAAA-5-8-2017
84-2019-youyu wang-JOCAAA-5-12-2017
85-2019-REV- Yongmin Liu-JOCAAA-1-19-2018
86-2019-REV-Munir-Nazeer-Ashraf-Kang-JOCAAA-1-10-2018
87-2019-JIN-WOO-PARK-JOCAAA-5-17-2017
88-2019-Jin-Woo Park-JOCAAA--5-18-2017
BLANK-JoCAAA-2019-1
BLANK-JoCAAA-2019-2
BLANK-JoCAAA-2019-3
BLOCK-2019-V26-5
FACE-2019-V26-5
JCAAA-2019-V26-front-5
BACK-JOCAAA-2019
SCOPE--JOCAAA--2019
EB--JOCAAA--2019
Instructions--JOCAAA--2019
Binder-26-5
91-2019-REV-ELAIW-JOCAAA-12-25-2017
92-2019-REV-Han-Ahn-JOCAAA-12-27-2017
96-2019-REV-Mi Zhou-JOCAAA-12-26-2017
98-2019-REV-Faizullah-JOCAAA-1-4-2019
99-2019-choonkil-park-JOCAAA--5-28-2017
100-2019-Hongyan Xu-JOCAAA-5-29-2017
101-2019-Jin-Woo Park-jocaaa--5-29-2017
102-2019-Jung Rye Lee-JOCAAA-5-30-2017
103-2019-Nak Eun Cho-JOCAAA-5-30-2017
1. Introduction and preliminaries
2. Main results
3. Hankel determinant
Acknowledgements
References
105-2019-Lee-Chae Jang-JOCAAA-6-1-2017
107-2019-REV-Xiong-Lan-JOCAAA-12-26-2017
108-2019-Tarek-Ibrahim-JOCAAA-6-5-2017
Introduction
Forms of Solutions
Form of Solutions for PE (1) when n=2
Form of Solutions for PE (1) when n=3
Form of Solutions for PE (1) for any value n
111-2019-REV-Yue Wang-JOCAAA-12-24-2017
112-2019-zhang-jie-jocaaa-6-7-2017
113-2019-Dong Yun Shin-JOCAAA-6-8-2017
BLANK-JoCAAA-2019-1
BLANK-JoCAAA-2019-2
BLANK-JoCAAA-2019-3
BLOCK-2019-V26-6
FACE-2019-V26-6
JCAAA-2019-V26-front-6
BACK-JOCAAA-2019
SCOPE--JOCAAA--2019
EB--JOCAAA--2019
Instructions--JOCAAA--2019
Binder-26-6
115-2019-RYOOCS-JOCAAA-6-9-2017
116-2019-REV-Feng Qi-JOCAAA-12-28-2017
Introduction
Lemmas
Main results
Applications to means
117-2019-REV-Ahmad-Kang-Nazeer-Kausar-JOCAAA-1-10-2018
119-2019-REV-Yasemin Kahramaner-JOCAAA-1-2-2018
120-2019-Jongkyum Kwon-jocaaa-6-15-2017
121-2019-REV-Zareen Khan-JOCAAA-12-29-2017
122-2019-Tian-Xiao He-jocaaa-6-18-2017-free
123-2019-Young-Oh Yang-jocaaa--6-19-2017
124-2019-Jin-Woo Park-JOCAAA-6-21-2017
125-2019-REV-Ko-Ahn-JOCAAA-12-25-2017
126-2019- Shengjun Li-jocaaa-6-22-2017
127-2019-REV-Kwun-Nizami-Nazeer-Munir-Kang-JOCAAA-1-10-2018
128-2019-REV-Ahmad-Nizami-Nazeer-Kang-JOCAAA-1-10-2018
131-2019-Taekyun Kim-JOCAAA-6-30-2017
132-2019-REV-Munir-Nazeer-Kang-Nizami-Shahzadi-JOCAAA-1-10-2018
BLANK-JoCAAA-2019-1
BLANK-JoCAAA-2019-2
BLOCK-2019-V26-7
FACE-2019-V26-7
JCAAA-2019-V26-front-7
BACK-JOCAAA-2019
SCOPE--JOCAAA--2019
EB--JOCAAA--2019
Instructions--JOCAAA--2019
Binder-26-7
133-2019-Hongxiu Zhong-JOCAAA-7-1-2017
134-2019-Alshabi-JOCAAA-7-1-2017
139-2019-Dangdang Wang-JOCAAA-7-9-2017
Introduction and preliminaries
Fuzzy (,-)-contractions
Fuzzy (,bn)-contractions
An example
140-2019-lashin and elemam-JOCAAA-7-9-2017
1. Introduction
2. Main Results
References
141-2019-REV-Ahmad-Nazeer-Munir-Kang-Kausar-JOCAAA-1-10-2018
142-2019-Choonkil Park-JOCAAA-7-15-2017
144-2019-Alshehri-JOCAAA-7-15-2017
148-2019-Jung Rye Lee-JOCAAA-7-17-2017
149-2019-Jongkyum Kwon-jocaaa-7-18-2017
151-2019-Sungsik Yun -jocaaa-7-19-2017
152-2019-Nak Eun Cho-jocaaa-7-19-2017
153-2019-REV-Ahmad-Nazeer-Kang-Naqvi-1-11-2018
154-2019-choonkil-park-jocaaa-7-20-2017
155-2019-REV-Young-Hee Kim-JOCAAA-1-11-2018
BLANK-JoCAAA-2019-1
BLANK-JoCAAA-2019-2
BLANK-JoCAAA-2019-3
BLOCK-2019-V26-8
FACE-2019-V26-8
JCAAA-2019-V26-front-8
BACK-JOCAAA-2019
SCOPE--JOCAAA--2019
EB--JOCAAA--2019
Instructions--JOCAAA--2019
Binder-26-8
156-2019-REV-Zuomao Yan- JOCAAA-1-5-2018
157-2019-jin-woo-park-jocaaa-7-21-2017
158-2019-REV-Pattrawut Chansangiam-JOCAAA-12-26-2017
160-2019-Yong Liu-jocaaa-7-25-2017
161-2019-REV-El-Dessoky-JOCAAA-12-21-2017
162-2019-REV-Ahn-JOCAAA-12-25-2017
163-2019-Jung Rye Lee-jocaaa-7-27-2017
164-2019-Sungsik Yun -jocaaa-7-27-2017
165-2019-Xiaoman Liu-jocaaa-7-27-2017
166-2019-Keum Sook So-jocaaa-7-27-2017
1. Introduction and Preliminaries
2. Fibonacci logarithm
3. Fibonacci logarithm logF(x)
4. Determining the Fibonacci Mantissa of x
5. Concluding remark and future works
Acknowledgement
References
168-2019-REV-Yu-Ming Chu -JOCAAA-12-22-2017
1. Introduction and Preliminaries
2. New integral inequalities for MT(r;g,m,)-preinvex functions
3. Hermite-Hadamard type fractional integral inequalities for MT(r;g,m,)-preinvex functions
4. Applications to special means
5. Conclusions
References
169-2019-Lee-Chae Jang-jocaaa-7-30-2017
1. Review on umbral calculus
2. Introduction
3. Main results
References
171-2019-choonkil-park-jocaaa-8-4-2017
BLANK-JoCAAA-2019-1
BLANK-JoCAAA-2019-2
BLANK-JoCAAA-2019-3
Recommend Papers

JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS VOLUME 26, 2019

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

Volume 26, Number 1 ISSN:1521-1398 PRINT,1572-9206 ONLINE

January 2019

Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC

Journal of Computational Analysis and Applications ISSNno.’s:1521-1398 PRINT,1572-9206 ONLINE SCOPE OF THE JOURNAL An international publication of Eudoxus Press, LLC (fifteen times annually) Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152-3240, U.S.A [email protected] http://www.msci.memphis.edu/~ganastss/jocaaa The main purpose of "J.Computational Analysis and Applications" is to publish high quality research articles from all subareas of Computational Mathematical Analysis and its many potential applications and connections to other areas of Mathematical Sciences. Any paper whose approach and proofs are computational,using methods from Mathematical Analysis in the broadest sense is suitable and welcome for consideration in our journal, except from Applied Numerical Analysis articles. Also plain word articles without formulas and proofs are excluded. The list of possibly connected mathematical areas with this publication includes, but is not restricted to: Applied Analysis, Applied Functional Analysis, Approximation Theory, Asymptotic Analysis, Difference Equations, Differential Equations, Partial Differential Equations, Fourier Analysis, Fractals, Fuzzy Sets, Harmonic Analysis, Inequalities, Integral Equations, Measure Theory, Moment Theory, Neural Networks, Numerical Functional Analysis, Potential Theory, Probability Theory, Real and Complex Analysis, Signal Analysis, Special Functions, Splines, Stochastic Analysis, Stochastic Processes, Summability, Tomography, Wavelets, any combination of the above, e.t.c. "J.Computational Analysis and Applications" is a peer-reviewed Journal. See the instructions for preparation and submission of articles to JoCAAA. Assistant to the Editor: Dr.Razvan Mezei,[email protected], Madison,WI,USA.

Journal of Computational Analysis and Applications(JoCAAA) is published by EUDOXUS PRESS,LLC,1424 Beaver Trail Drive,Cordova,TN38016,USA,[email protected] http://www.eudoxuspress.com. Annual Subscription Prices:For USA and Canada,Institutional:Print $800, Electronic OPEN ACCESS. Individual:Print $400. For any other part of the world add $160 more(handling and postages) to the above prices for Print. No credit card payments. Copyright©2019 by Eudoxus Press,LLC,all rights reserved.JoCAAA is printed in USA. JoCAAA is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH. It is strictly prohibited the reproduction and transmission of any part of JoCAAA and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes no responsibility for the content of published papers.

2

Editorial Board Associate Editors of Journal of Computational Analysis and Applications Francesco Altomare Dipartimento di Matematica Universita' di Bari Via E.Orabona, 4 70125 Bari, ITALY Tel+39-080-5442690 office +39-080-3944046 home +39-080-5963612 Fax [email protected] Approximation Theory, Functional Analysis, Semigroups and Partial Differential Equations, Positive Operators.

Fractional Differential Equations Nonlinear Analysis, Fractional Dynamics Carlo Bardaro Dipartimento di Matematica e Informatica Universita di Perugia Via Vanvitelli 1 06123 Perugia, ITALY TEL+390755853822 +390755855034 FAX+390755855024 E-mail [email protected] Web site: http://www.unipg.it/~bardaro/ Functional Analysis and Approximation Theory, Signal Analysis, Measure Theory, Real Analysis.

Ravi P. Agarwal Department of Mathematics Texas A&M University - Kingsville 700 University Blvd. Kingsville, TX 78363-8202 tel: 361-593-2600 [email protected] Differential Equations, Difference Equations, Inequalities

Martin Bohner Department of Mathematics and Statistics, Missouri S&T Rolla, MO 65409-0020, USA [email protected] web.mst.edu/~bohner Difference equations, differential equations, dynamic equations on time scale, applications in economics, finance, biology.

George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis, TN 38152,U.S.A Tel.901-678-3144 e-mail: [email protected] Approximation Theory, Real Analysis, Wavelets, Neural Networks, Probability, Inequalities.

Jerry L. Bona Department of Mathematics The University of Illinois at Chicago 851 S. Morgan St. CS 249 Chicago, IL 60601 e-mail:[email protected] Partial Differential Equations, Fluid Dynamics

J. Marshall Ash Department of Mathematics De Paul University 2219 North Kenmore Ave. Chicago, IL 60614-3504 773-325-4216 e-mail: [email protected] Real and Harmonic Analysis

Luis A. Caffarelli Department of Mathematics The University of Texas at Austin Austin, Texas 78712-1082 512-471-3160 e-mail: [email protected] Partial Differential Equations George Cybenko Thayer School of Engineering

Dumitru Baleanu Department of Mathematics and Computer Sciences, Cankaya University, Faculty of Art and Sciences, 06530 Balgat, Ankara, Turkey, [email protected]

3

Dartmouth College 8000 Cummings Hall, Hanover, NH 03755-8000 603-646-3843 (X 3546 Secr.) e-mail:[email protected] Approximation Theory and Neural Networks

011-49-203-379-3542 e-mail: [email protected] Approximation Theory, Computer Aided Geometric Design John R. Graef Department of Mathematics University of Tennessee at Chattanooga Chattanooga, TN 37304 USA [email protected] Ordinary and functional differential equations, difference equations, impulsive systems, differential inclusions, dynamic equations on time scales, control theory and their applications

Sever S. Dragomir School of Computer Science and Mathematics, Victoria University, PO Box 14428, Melbourne City, MC 8001, AUSTRALIA Tel. +61 3 9688 4437 Fax +61 3 9688 4050 [email protected] Inequalities, Functional Analysis, Numerical Analysis, Approximations, Information Theory, Stochastics.

Weimin Han Department of Mathematics University of Iowa Iowa City, IA 52242-1419 319-335-0770 e-mail: [email protected] Numerical analysis, Finite element method, Numerical PDE, Variational inequalities, Computational mechanics

Oktay Duman TOBB University of Economics and Technology, Department of Mathematics, TR06530, Ankara, Turkey, [email protected] Classical Approximation Theory, Summability Theory, Statistical Convergence and its Applications

Tian-Xiao He Department of Mathematics and Computer Science P.O. Box 2900, Illinois Wesleyan University Bloomington, IL 61702-2900, USA Tel (309)556-3089 Fax (309)556-3864 [email protected] Approximations, Wavelet, Integration Theory, Numerical Analysis, Analytic Combinatorics

Saber N. Elaydi Department Of Mathematics Trinity University 715 Stadium Dr. San Antonio, TX 78212-7200 210-736-8246 e-mail: [email protected] Ordinary Differential Equations, Difference Equations

Margareta Heilmann Faculty of Mathematics and Natural Sciences, University of Wuppertal Gaußstraße 20 D-42119 Wuppertal, Germany, [email protected] Approximation Theory (Positive Linear Operators)

J .A. Goldstein Department of Mathematical Sciences The University of Memphis Memphis, TN 38152 901-678-3130 [email protected] Partial Differential Equations, Semigroups of Operators

Xing-Biao Hu Institute of Computational Mathematics AMSS, Chinese Academy of Sciences Beijing, 100190, CHINA [email protected]

H. H. Gonska Department of Mathematics University of Duisburg Duisburg, D-47048 Germany

4

Computational Mathematics Ram N. Mohapatra Department of Mathematics University of Central Florida Orlando, FL 32816-1364 tel.407-823-5080 [email protected] Real and Complex Analysis, Approximation Th., Fourier Analysis, Fuzzy Sets and Systems

Jong Kyu Kim Department of Mathematics Kyungnam University Masan Kyungnam,631-701,Korea Tel 82-(55)-249-2211 Fax 82-(55)-243-8609 [email protected] Nonlinear Functional Analysis, Variational Inequalities, Nonlinear Ergodic Theory, ODE, PDE, Functional Equations.

Gaston M. N'Guerekata Department of Mathematics Morgan State University Baltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'[email protected] [email protected] Nonlinear Evolution Equations, Abstract Harmonic Analysis, Fractional Differential Equations, Almost Periodicity & Almost Automorphy

Robert Kozma Department of Mathematical Sciences The University of Memphis Memphis, TN 38152, USA [email protected] Neural Networks, Reproducing Kernel Hilbert Spaces, Neural Percolation Theory Mustafa Kulenovic Department of Mathematics University of Rhode Island Kingston, RI 02881,USA [email protected] Differential and Difference Equations

M.Zuhair Nashed Department Of Mathematics University of Central Florida PO Box 161364 Orlando, FL 32816-1364 e-mail: [email protected] Inverse and Ill-Posed problems, Numerical Functional Analysis, Integral Equations, Optimization, Signal Analysis

Irena Lasiecka Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

Mubenga N. Nkashama Department OF Mathematics University of Alabama at Birmingham Birmingham, AL 35294-1170 205-934-2154 e-mail: [email protected] Ordinary Differential Equations, Partial Differential Equations

Burkhard Lenze Fachbereich Informatik Fachhochschule Dortmund University of Applied Sciences Postfach 105018 D-44047 Dortmund, Germany e-mail: [email protected] Real Networks, Fourier Analysis, Approximation Theory

Vassilis Papanicolaou Department of Mathematics National Technical University of Athens Zografou campus, 157 80 Athens, Greece tel:: +30(210) 772 1722 Fax +30(210) 772 1775 [email protected] Partial Differential Equations, Probability

Hrushikesh N. Mhaskar Department Of Mathematics California State University Los Angeles, CA 90032 626-914-7002 e-mail: [email protected] Orthogonal Polynomials, Approximation Theory, Splines, Wavelets, Neural Networks

5

Choonkil Park Department of Mathematics Hanyang University Seoul 133-791 S. Korea, [email protected] Functional Equations

Anfithea - Paleon Faliron GR-175 64 Athens, Greece [email protected] Numerical Analysis H. M. Srivastava Department of Mathematics and Statistics University of Victoria Victoria, British Columbia V8W 3R4 Canada tel.250-472-5313; office,250-4776960 home, fax 250-721-8962 [email protected] Real and Complex Analysis, Fractional Calculus and Appl., Integral Equations and Transforms, Higher Transcendental Functions and Appl.,q-Series and q-Polynomials, Analytic Number Th.

Svetlozar (Zari) Rachev, Professor of Finance, College of Business, and Director of Quantitative Finance Program, Department of Applied Mathematics & Statistics Stonybrook University 312 Harriman Hall, Stony Brook, NY 11794-3775 tel: +1-631-632-1998, [email protected] Alexander G. Ramm Mathematics Department Kansas State University Manhattan, KS 66506-2602 e-mail: [email protected] Inverse and Ill-posed Problems, Scattering Theory, Operator Theory, Theoretical Numerical Analysis, Wave Propagation, Signal Processing and Tomography

I. P. Stavroulakis Department of Mathematics University of Ioannina 451-10 Ioannina, Greece [email protected] Differential Equations Phone +3-065-109-8283

Tomasz Rychlik Polish Academy of Sciences Instytut Matematyczny PAN 00-956 Warszawa, skr. poczt. 21 ul. Śniadeckich 8 Poland [email protected] Mathematical Statistics, Probabilistic Inequalities

Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock, Germany [email protected] Numerical Fourier Analysis, Fourier Analysis, Harmonic Analysis, Signal Analysis, Spectral Methods, Wavelets, Splines, Approximation Theory

Boris Shekhtman Department of Mathematics University of South Florida Tampa, FL 33620, USA Tel 813-974-9710 [email protected] Approximation Theory, Banach spaces, Classical Analysis

Roberto Triggiani Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

T. E. Simos Department of Computer Science and Technology Faculty of Sciences and Technology University of Peloponnese GR-221 00 Tripolis, Greece Postal Address: 26 Menelaou St.

Juan J. Trujillo University of La Laguna Departamento de Analisis Matematico C/Astr.Fco.Sanchez s/n 38271. LaLaguna. Tenerife. SPAIN Tel/Fax 34-922-318209 [email protected]

6

Fractional: Differential EquationsOperators-Fourier Transforms, Special functions, Approximations, and Applications

Ahmed I. Zayed Department of Mathematical Sciences DePaul University 2320 N. Kenmore Ave. Chicago, IL 60614-3250 773-325-7808 e-mail: [email protected] Shannon sampling theory, Harmonic analysis and wavelets, Special functions and orthogonal polynomials, Integral transforms

Ram Verma International Publications 1200 Dallas Drive #824 Denton, TX 76205, USA [email protected] Applied Nonlinear Analysis, Numerical Analysis, Variational Inequalities, Optimization Theory, Computational Mathematics, Operator Theory

Ding-Xuan Zhou Department Of Mathematics City University of Hong Kong 83 Tat Chee Avenue Kowloon, Hong Kong 852-2788 9708,Fax:852-2788 8561 e-mail: [email protected] Approximation Theory, Spline functions, Wavelets

Xiang Ming Yu Department of Mathematical Sciences Southwest Missouri State University Springfield, MO 65804-0094 417-836-5931 [email protected] Classical Approximation Theory, Wavelets

Xin-long Zhou Fachbereich Mathematik, Fachgebiet Informatik Gerhard-Mercator-Universitat Duisburg Lotharstr.65, D-47048 Duisburg, Germany e-mail:[email protected] Fourier Analysis, Computer-Aided Geometric Design, Computational Complexity, Multivariate Approximation Theory, Approximation and Interpolation Theory

Xiao-Jun Yang State Key Laboratory for Geomechanics and Deep Underground Engineering, China University of Mining and Technology, Xuzhou 221116, China Local Fractional Calculus and Applications, Fractional Calculus and Applications, General Fractional Calculus and Applications, Variable-order Calculus and Applications, Viscoelasticity and Computational methods for Mathematical [email protected]

Jessada Tariboon Department of Mathematics, King Mongkut's University of Technology N. Bangkok 1518 Pracharat 1 Rd., Wongsawang, Bangsue, Bangkok, Thailand 10800 [email protected], Time scales, Differential/Difference Equations, Fractional Differential Equations

Richard A. Zalik Department of Mathematics Auburn University Auburn University, AL 36849-5310 USA. Tel 334-844-6557 office 678-642-8703 home Fax 334-844-6555 [email protected] Approximation Theory, Chebychev Systems, Wavelet Theory

7

Instructions to Contributors Journal of Computational Analysis and Applications An international publication of Eudoxus Press, LLC, of TN.

Editor in Chief: George Anastassiou Department of Mathematical Sciences University of Memphis Memphis, TN 38152-3240, U.S.A.

1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves.

2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.

8

4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corollaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,

9

name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990).

Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986.

Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495.

11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears.

15. This journal will consider for publication only papers that contain proofs for their listed results.

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

An application of Binomial distribution series on certain analytic functions Waqas Nazeer1, Qaisar Mehmood2 , Shin Min Kang3,4,∗ , and Absar Ul Haq5

1

2

3

Division of Science and Technology, University of Education, Lahore 54000, Pakistan e-mail: [email protected]

Department of Mathematics, Government Science College, Wahdat Road, Lahore 54000, Pakistan e-mail: [email protected]

Department of Mathematics and RINS, Gyeongsang National University, Jinju 52828, Korea e-mail: [email protected] 4 5

Center for General Education, China Medical University, Taichung 40402, Taiwan

Department of Mathematics, University of Management and Technology, Sialkot Campus, Lahore 51410, Pakistan e-mail: [email protected] Abstract In the present note we will introduce a Binomial distribution series and obtain necessary and sufficient conditions for this series belonging to the classes T (λ, α) and C(λ, α). An integral operator related to this series is also considered. 2010 Mathematics Subject Classification: 30C45, 30C55 Key words and phrases: analytic function, binomial distribution, univalent

1

Introduction

Consider a class A consisting of functions of the form g(z) = z +

∞ X

an z n .

(1.1)

n=2

Every g ∈ A is analytic in the open unit disk D and satisfy the normalization condition g(0) = g 0 (0) − 1 = 0. Let S be a subclass of A consisting of functions of the form (1.1), which are also univalent in D. Furthermore, consider T be the subclass of S containing the functions of the form ∞ X g(z) = z + |an |z n . (1.2) n=2



Corresponding author

11

Waqas Nazeer et al 11-17

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Let T (γ, δ) be a subclass of T having the functions which satisfy the following condition ( ) zg 0 (z) Re (1.3) >δ γzg 0(z) + (1 − γ)g(z) for all δ (0 ≤ δ < 1), γ (0 ≤ γ < 1) and z ∈ D. Also, we consider C(γ, δ) be an other subclass of T containing the functions which satisfy the following condition ( ) g 0 (z) + zg 00(z) Re 0 >δ (1.4) g (z) + γzg 00(z) for all δ (0 ≤ δ < 1), γ (0 ≤ γ < 1) and z ∈ D. From (1.2) and (1.4) one can draw the following conclusion g(z) ∈ C(γ, δ) ⇐⇒ zg 0 (z) ∈ T (γ, δ).

(1.5)

Both T (γ, δ) and C(γ, δ) are extensively studied by Altinates and Owa [1] and certain conditions for hypergeometric function and generalized Bessel function g for these classes were studied by Mostafa [8] and Porwal and Dixit [11]. Let g(l, p) be a binomial distribution defined by g(l, p) = P r(X = n) =

l! pn (1 − p)l−n , (n − l)!n!

n = 0, 1, 2, . . ., l

when n > l, then f (l, p) = 0. Consider a power series defined as: K(l, p, z) = z +

∞ X

(l − 1)! pn−1 (1 − p)l−n z n . (l − n)(n − 1)!

∞ X

(l − 1)! pn−1 (1 − p)l−n z n . (l − n)(n − 1)!

n=2

Now, we introduce the series F (l, p, z) = z −

n=2

In [3], Carlson and Shaffer studied starlike and prestarlike hypergeometric functions. The sufficient condition for a (Gaussian) hypergeometric function to be uniformly convex of order δ, which is also necessary condition under additional restrictions is given by Cho et al. [4]. Starlike hypergeometric functions were studied by Merkes and Scott [6] and Carlson and Shaffer [3]. Motivated by results on connection between various subclasses of analytic functions by using the hypergeometric function by many author particularly the authors (see [3, 4, 6, 12, 13]) and generalized Bessel functions (see [2, 7]), Porrwal [10] obtained the necessary and sufficient conditions for a functions F (l, p, z) defined by using the poisson distribution belong to the class T (δ, γ) and C(δ, γ). In this article, we give the analogous conditions for the functions F (l, p, z) and integral operator H(l, p, z) defined by the binomial distribution belong to the T (δ, γ) and C(δ, γ). To establish our main results, we will require the following lemmas due to Altintas and Owa [1].

12

Waqas Nazeer et al 11-17

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Lemma 1.1. A function g(z) characterize by (1.2) belong to the class T (δ, γ) if and only if ∞ X [n − γδn − δ + γδ]|an| ≤ 1 − δ. n=2

Lemma 1.2. A function g(z) characterize by (1.2) belong to the class C(δ, γ) if and only if ∞ X n[n − γδn − δ + γδ]|an| ≤ 1 − δ. n=2

2

Main results

Theorem 2.1. The function F (k, p, z) belong to the class T (δ, γ) if and only if p(1 − δγ)(l − 1) + (1 − δ)A ≤ 1 − δ, where A=

∞ X

n=1

Proof. Since

F (l, p, z) = z −

(l − 1)! pn (1 − p)l−n−1 . (l − n − 1)n! ∞ X

n=2

(l − 1)! pn−1 (1 − p)l−n z n , (l − n)(n − 1)!

according to the Lemma 1.1 we must show that ∞ X

[n − γδn − δ + γδ]

n=2

(l − 1)! pn−1 (1 − p)l−n ≤ 1 − δ. (l − n)(n − 1)!

Now ∞ X

[n(1 − γδ) − δ(1 − γ)]

n=2

=

∞ X

(l − 1)! pn−1 (1 − p)l−n (l − n)(n − 1)!

[(n − 1)(1 − γδ) + (1 − δ)]

n=2

= (1 − γδ)

∞ X

n=2

= (1 − γδ)

∞ X

(l − 1)! pn−1 (1 − p)l−n (l − n)(n − 1)! ∞

X (l − 1)! (l − 1)! pn−1 (1 − p)l−n + (1 − δ) pn−1 (1 − p)l−n (l − n)(n − 2)! (l − n)(n − 1)! n=2 ∞ X

(l − 1)! pn+1 (1 − p)l−n−2 + (1 − δ) (l − n − 2)n!

n=0 ∞ X

= (1 − γδ)p

n=0

(l − 1)(l − 2)! n p (1 − p)l−n−2 + (1 − δ) (l − n − 2)n!

= p(1 − γδ)(l − 1) + (1 − δ)

∞ X

n=1

≤ 1 − δ.

n=1

∞ X n=1

(l − 1)! pn (1 − p)l−n−1 (l − n − 1)n!

(l − 1)! pn (1 − p)l−n−1 (l − n − 1)n!

(l − 1)! pn (1 − p)l−n−1 (l − n − 1)n!

This completes the proof.

13

Waqas Nazeer et al 11-17

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Theorem 2.2. The function F (l, p, z) belong to the class C(γ, δ) if and only if p2 (1 − δγ)(l − 1)(l − 2) + p(3 − 2γδ − δ)(l − 1) + (1 − δ)B ≤ 1 − δ, where B=

∞ X

n=1

Proof. As

F (l, p, z) = z −

(l − 1)! pn (1 − p)l−n−1 . (l − n − 1)n! ∞ X

n=2

(l − 1)! pn−1 (1 − p)l−n z n , (l − n)(n − 1)!

therefore according to the Lemma 1.2 we must show that ∞ X

n[n − γδn − δ + γδ]

n=2

Now ∞ X

n[n(1 − γδ) − δ(1 − γ)]

n=2

=

∞ X

(l − 1)! pn−1 (1 − p)l−n ≤ 1 − δ. (l − n)(n − 1)!

(l − 1)! pn−1 (1 − p)l−n (l − n)(n − 1)!

[(1 − γδ)(n − 1)(n − 2) + (3 − 2δγ − δ)(n − 1) + (1 − δ)]

n=2

(l − 1)! pn−1 (1 − p)l−n (l − n − 2)(n − 1)! ∞ X (l − 1)! = (1 − γδ) pn−1 (1 − p)l−n + (3 − 2δγ − δ) (l − n)(n − 3)! ×

n=3

∞ X

∞ X (l − 1)! (l − 1)! n−1 l−n × p (1 − p) + (1 − δ) pn−1 (1 − p)l−n (l − n)(n − 2)! (l − n)(n − 1)! n=2 n=2

= (1 − γδ)

∞ X

n=0

×

∞ X n=0

(l − 1)! pn+2 (1 − p)l−n−3 + (3 − 2δγ − δ) (l − n − 3)n!

n=1

= p2 (1 − γδ)

∞ X

n=0

×



X (l − 1)! (l − 1)! pn+1 (1 − p)l−n−2 + (1 − δ) pn (1 − p)l−n−1 (l − n − 2)n! (l − n − 1)n! (l − 1)! pn (1 − p)l−n−3 + p(3 − 2δγ − δ) (l − n − 3)n!

∞ X (l − 1)! (l − 1)! n pn (1 − p)l−n−2 + (1 − δ) p (1 − p)l−n (l − n − 2)n! (l − n)n! n=0 n=1 ∞ X

= p2 (1 − γδ)(l − 1)(l − 2)

∞ X n=0

×

∞ X n=0

2

(l − 3)! pn (1 − p)l−n−3 + p(3 − 2δγ − δ)(l − 1) (l − n − 3)n! ∞

X (l − 1)! (l − 2)! pn (1 − p)l−n−2 + (1 − δ) pn (1 − p)l−n−1 (l − n − 2)n! (l − n − 1)n! n=1

= p (1 − γδ)(l − 1)(l − 2) + p(3 − 2δγ − δ)(l − 1) + (1 − δ)B ≤ 1 − δ.

14

Waqas Nazeer et al 11-17

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

This completes the proof. In the following theorem, we obtain the analogous results in connection with the particular integral operator H(l, p, z) as follow: Z z F (l, p, z) H(l, p, z) = (2.1) dt. t 0 Theorem 2.3. The operator H(l, p, z) characterized by (2.1) is in the class C(γ, δ) if and only if p(1 − δγ)(l − 1) + (1 − δ)C ≤ δ − 1, where C=

∞ X n=1

(l − 1)! pn (1 − p)l−n−1 . (l − n − 1)n!

Proof. Since H(l, p, z) = z −

∞ X

n=2

(l − 1)! pn−1 (1 − p)l−n z n , (l − n)(n − 1)!

according to the Lemma 1.2 we must show that ∞ X

n[n − γδn − δ + γδ]

n=2

(l − 1)! n−1 p (1 − p)l−n ≤ 1 − δ. (l − n)(n)!

Now ∞ X

[n(1 − γδ) − δ(1 − γ)]

n=2

=

∞ X

(l − 1)! pn−1 (1 − p)l−n (l − n)(n − 1)!

[(n − 1)(1 − γδ) + (1 − δ)]

n=2

= (1 − γδ)

∞ X

n=2

= (1 − γδ)

∞ X

(l − 1)! pn−1 (1 − p)l−n (l − n)(n − 1)! ∞

X (l − 1)! (l − 1)! pn−1 (1 − p)l−n + (1 − δ) pn−1 (1 − p)l−n (l − n)(n − 2)! (l − n)(n − 1)! n=2 ∞ X

(l − 1)! (l − 1)! pn+1 (1 − p)l−n−2 + (1 − δ) pn (1 − p)l−n−1 (l − n − 2)n! (l − n − 1)n! n=0 n=1

= (1 − γδ)p

∞ X

n=0



X (l − 1)! (l − 1)! pn (1 − p)l−n−2 + (1 − δ) pn (1 − p)l−n−1 (l − n − 2)n! (l − n − 1)n! n=1

= (1 − γδ)p(1 − l)

∞ X

n=0

+ (1 − δ)

∞ X n=1

(l − 2)! pn (1 − p)l−n−2 (l − n − 2)n!

(l − 1)! pn (1 − p)l−n−1 (l − n − 1)n!

= (1 − γδ)(1 − l)p + (1 − δ)C ≤ 1 − γ. This completes the proof.

15

Waqas Nazeer et al 11-17

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Theorem 2.4. The operator H(l, p, z) defined by (2.1) is in the class T (γ, δ) if and only if p(1 − δγ)D + (1 − δ)E ≤ δ − 1, where D=

∞ X

n=0

and

(l − 1)(l − 2)! pn (1 − p)l−n−2 (l − n − 2)(n + 2)n!

∞ X (l − 1)! n−1 E= p (1 − p)l−n . (l − n)n! n=2

Proof. As we know that F (l, p, z) = z −

∞ X (l − 1)! n−1 p (1 − p)l−n z n , (l − n)n!

n=2

therefore according to the Lemma 1.1 we must show that ∞ X

[n − γδn − δ + γδ]

n=2

(l − 1)! n−1 p (1 − p)l−n ≤ 1 − δ. (l − n)n!

Now ∞ X

[n(1 − γδ) − δ(1 − γ)]

n=2

=

∞ X

(l − 1)! n−1 p (1 − p)l−n (l − n)n!

[(n − 1)(1 − γδ) + (1 − δ)]

n=2

= (1 − γδ) = (1 − γδ)

∞ X (l − 1)!(n − 1) n=2 ∞ X

n=2

(l − n)n!

pn−1 (1 − p)l−n + (1 − δ)

∞ X (l − 1)! n−1 p (1 − p)l−n (l − n)n! n=2 ∞ X

(l − 1)! pn−1 (1 − p)l−n + (1 − δ) (l − n)n(n − 2)!

= (1 − γδ)p(l − 1) + (1 − δ)

(l − 1)! n−1 p (1 − p)l−n (l − n)n!

∞ X

n=2 ∞ X

= (1 − γδ)p

n=0

∞ X

n=2

(l − 1)! n−1 p (1 − p)l−n (l − n)(n)!

(l − 2)! pn (1 − p)l−n−2 2)n! (l − n − 2)(n + n=0

(l − 1)! n−1 p (1 − p)l−n (l − n)(n)! (l − 1)(l − 2)! pn (1 − p)l−n−2 (l − n − 2)(n + 2)n!

∞ X (l − 1)! n−1 + (1 − δ) p (1 − p)l−n (l − n)n! n=2

= p(1 − γδ)D + (1 − δ)E ≤ 1 − γ. This completes the proof.

16

Waqas Nazeer et al 11-17

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

References [1] O. Altintas and S. Owa, On subclasses of univalent functions with negative coefficients, Pusan Kyongnam Math. J., 4 (1988), 41–46. [2] A. Baricz, Generalized Bessel Functions of the First Kind, Lecture Notes in Mathematics, vol. 1994, Springer-Verlag, Berlin, 2010. [3] B. C. Carlson and D. B. Shaffer, Starlike and prestarlike hypergeometric functions, SIAM J. Math. Anal., 15 (1984), 37–745. [4] N. E. Cho, S. Y. Woo and S. Owa, Uniform convexity properties for hypergeometric functions, Fract. Calc. Appl. Anal., 5 (2002), 303–313. [5] A. Gangadharan, T. N. Shanmugam and H. M. Srivastava, ?Generalized hypergeometric functions associated with uniformly convex functions, Comput. Math. Appl., 44 (2002), 1515–1526. [6] E. P. Merkes and W. T. Scott, Starlike hypergeometric functions, Proc. Amer. Math. Soc., 12 (1961), 885–888. [7] S. R. Mondal and A. Swaminathan, Geometric properties of generalized Bessel functions, Bull. Malays. Math. Sci. Soc., 35 (2012), 179–194. [8] A. O. Mostafa, A study on starlike and convex properties for hypergeometric functions, J. Inequal. Pure Appl. Math., 10 (2009), Article 87, 8 pages. [9] S. Porwal, Mapping properties of generalized Bessel functions on some subclasses of univalent functions, An. Univ. Oradea Fasc. Mat., 20 (2013), 51–60. [10] S. Porwal, An application of a Poisson distribution series on certain analytic functions, J. Complex Anal., 2014 (2014), Article ID 984135, 3 pages. [11] S. Porwal and K. K. Dixit, An application of generalized Bessel functions on certain analytic functions, Acta Univ. M.e Belii Ser. Math., 21 (2013), 51–57. [12] H. Silverman, Univalent functions with negative coefficients, Proc. Amer. Math. Soc., 51 (1975), 109–116. [13] A. K. Sharma, S. Porwal and K. K. Dixit, Class mappings properties of convolutions involving certain univalent functions associated with hypergeometric functions, Electron. J. Math. Anal. Appl., 1 (2013), 326–333.

17

Waqas Nazeer et al 11-17

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Soft rough approximation operators via ideal Heba.I. Mustafa Mathematics Department, Faculty of Science, Zagazig University, Zagazig, Egypt dr heba [email protected] Abstract Soft rough approximation were introduced by Feng[7]. This paper extend soft rough approximation model by defining new soft rough approximation operators via ideal. An ideal on a set X is a non empty collection of subsets of X with heredity property which is also closed under finite unions. When I is the least ideal of ℘(U ), these two approximations coincide. We present the essential properties of new opertors via ideal and supported by illustrative examples. The notion of soft rough equal relations via ideal is proposed and related examples are examined. We also show that rough set via ideal [26] can be viewed as a special case of soft rough set via ideal, and these two notions will coincide provided that the underlaying soft set is a partition soft set. We obtain the structure of soft rough set via ideal, gives the structure of topologies induced by soft set and an ideal. Moreover, an example containing a comparative analysis between rough sets via ideal and soft rough sets via ideal is given. We show that soft rough approximation via ideal could provide a better approximation than rough set via ideal.

keywords: soft sets, rough approximations via ideal, soft rough sets via ideal, rough sets via ideal.

1. Introduction In recent years vague concepts have been used in different areas as medical applications, pharmacology, economics, engineering since the classical mathematics methods are inadequate to solve many complex problems in these areas. Traditionally crisp (well-defined) property P(x) is used in mathematics, i.e., properties that are either true or false and each property defines a set: {x : x has a property P }[19]. Researchers have proposed many methods for vague notions. The most successful theoretical approach to the vagueness is undoubtedly fuzzy set theory [33] proposed by Zadeh in 1965. The basic idea of fuzzy set theory hinges on fuzzy membership function, which allows partial membership of elements to a set, i.e., it allows elements to belong to a set to a degree. Rough set theory [20] is an extension of set theory for the analysis of a vague and inexact description of objects. Pawlak rough approximations are based on equivalence relation or their induced partition and subsystem, this requirement is not satisfied in many situations and thus limits the application domain of the rough set model. To solve this issue, generalizations of rough sets were considered. There are at least two approaches to generalize rough sets. One is to consider similarity, tolerance or general binary relation (see e.g.[30], [31],[32], Zhu [36]) rather than equivalence relation. The other is to extend the partition to cover (see e.g.[2, 3, 34, 36, 37]). Furthermore, as generalizations, rough sets were defined by fuzzy relation (see e.g.[5, 11, 12, 21, 22, 23, 24]) or a mapping [9, 26]. However, many of these generalizations have not been interconnected with each other. All these theories have their own difficulties (see [23]). For example, theory of probabilities can deal 1 18

Mustafa 18-35

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

only with stochastically stable phenomena. To overcome these kinds of difficulties, Molodtsov [16] proposed a completely new approach, which is called soft set theory, for modelling uncertainty. Molodtsov initiated a novel concept of soft set theory [16], which is a completely new approach for modeling vagueness in 1999. A soft set is a collection of approximate descriptions of an object. Molodtsov [16, 17] presented the fundamental results of the new theory and successfully applied it to several directions such as smoothness of functions, game theory, operations research, Riemann-integration, Perron integration,theory of probability etc. He also showed that how soft set theory is free from the parametrization inadequacy syndrome of fuzzy set theory, rough set theory and etc. Soft systems provide a very general framework with the involvement of parameters. It has been found that fuzzy sets, rough sets and soft sets are closely related [1]. Maji et al. investigated the concept of fuzzy soft set in 2001 [13], a more generalized concept, which is a combination of fuzzy set and soft set and also studied some of its properties. This line of exploration was further investigated by several researchers [14, 28, 29]. Soft set and fuzzy soft set theories have rich potential for applications in several directions. Feng et al. investigated the concept of soft rough set in 2010 [6] which is a combination of soft set and rough set. In [6, 7] basic properties of soft rough approximations were presented and supported by some illustrative examples. In fact, as soft set instead of an equivalence relation was used to granulate the universe of discourse. A new approach was introduced to soft rough sets which is called modified soft rough set (MSR-set) and some basic properties of MSR-sets were investigated in [25]. In [10] a new concept of soft class and soft class operations based on decision makers set are defined and some fundamental properties of soft class operations are investigated. In [18] soft rough sets and soft rough approximation operators on a complete atomic Boolean lattice are defined. Feng discussed soft set based group decision making in [8]. This study can be seen as a first attempt toward the possible application of soft rough approximations in multicriteria group decision making under vagueness. It is well known that (fuzzy) ideal is an important tool for investigating rough sets (see e.g.[4, 27]). In Pawlak rough set model, any vague concept of a universe can be defined by a pair of precise concepts called the lower and upper approximations. Particularly, the empty set φ is a concept and the set {φ} is a special ideal. Hence, we have the following equivalent description of Pawlaks approximations. That is, the lower approximation contains all objects which the intersections between equivalence classes and the complement of the concept belong to {φ}, and the upper approximation consists of all objects which the intersections between equivalence classes and the concept do not belong to {φ}. It is a natural question to ask what does happen if we substitute a general ideal instead of the particular one. Here, the role of the ideal is to bring together some knowable and interrelated concepts of the universe, through which we can approximately obtain the imprecise concept. Since a given ideal has more concepts than that of {φ}, the approximations based on ideals seem to enrich the Pawlaks approximations. In [27] we define new approximation operators in more general setting of complete atomic Boolean lattice by using an ideal. The aim of this paper is to define new soft rough approximation operators in terms of an ideal. Our approach can be viewed as a generalization of several approaches that can be found in the literature. The reminder of this paper is organized as follows. In the following section, we recall some fundamental notions and propositions to be used in the present paper. In Section 3, the definition of soft rough approximations via ideal is proposed and basic properties are examined. These decrease the soft lower approximation and increase the soft upper approximation and hence increase the accuracy measure. We show by example that soft rough approximation via ideal reduce the soft boundary in comparison of soft rough approximation and the accuracy measure is better than the soft accuracy measure. So soft rough approximation via ideal could provide a better approximation than soft rough set. We also define soft rough equal relations in termes of soft rough approximation via ideal and explore some related properties. Finally, through an example we present a comparative analysis between rough set via ideal and soft rough set via ideal. In sction 4 we investigate the relationships between soft sets, topologies and an ideal, obtain the structure of topologies induced by a soft set and an ideal. In section 5 we investigate the relation between soft rough via ideal and rough set via ideal [27]. We show that rough set via ideal may be considered as a special case of soft rough set via ideal. Also, we define a new pair of soft rough approximation operators via ideal and giving the relationship between this pair and previous one. Soft rough set approximation via ideal is a worth considering alternative to the soft rough set approximation and rogh approximation via ideal.

19

Mustafa 18-35

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

3

2. Preliminaries In this section, we present the basic definitions and results of soft set theory which may found in earlier studies [15, 16, 17]. Throughout this paper, U refers to an initial universe, the complement of X in U is denoted by X 0 , E is a set of parameters, ℘(U ) is the power set of X, and A ⊆ E. Definition 2.1 [16] Let U be a universal set and E be a set of parameters. Let A be a non empty subset of E. A soft set over A, with support A ,denoted by fA on U is defined by the set of ordered pairs fA = {(e, fA (e)) : e ∈ E, fA (e) ∈ ℘(U )}, or is a function fA : E → ℘(U ) s.t fA (e) 6= φ ∀ e ∈ A ⊆ E and fA (e) = φ if e 6∈ A. . From now on, we will use S(U, E) instead of all soft sets over U . Definition 2.2 [16] The soft set fφ ∈ S(U, E) is called null soft set, denoted by Φ, Here Fφ (e) = φ, ∀ e ∈ E. Definition 2.3 [15] Let fA ∈ S(U, E). If fA (e) = X, ∀ e ∈ A, then fA is called A-absolute soft e set, denoted by A. eU . If A = E, then the A-absolute soft set is called absolute soft set denoted by E Definition 2.4 [15] Let fA , gB ∈ S(U, E). fA is a soft subset of gB , denoted fA v gB if fA (e) ⊆ gB (e), ∀ e ∈ E. DefinitionS2.5 [15] Let fA , gB ∈ S(U, E). Union of fA and gB , is a soft set hC defined by hC (e) = fA (e) gB (e), ∀ e ∈ E, where C = A ∪ B. That is, hC = fA t gB DefinitionT2.6 [15] Let fA , gB ∈ S(U, E). Intersection of fA and gB , is a soft set hC defined by hC (e) = fA (e) gB (e), ∀ e ∈ E where C = A ∩ B. That is hC = fA u gB . Definition 2.7 [15] Let fA ∈ S(U, E). = (f (e))0 , ∀ e ∈ E.

fA0 (e)

The complement of fA , denoted by fA0 is defined by

Definition 2.8 [7] Let fA ∈ S(U, E). S i) fE is called full, if a∈A f (a) = U ; iv) fE is called partition of B if {f (a) : a ∈ A} forms a partition of U. Obviously, every partition soft set is full. Definition 2.9 [35] Let fA ∈ S(U, E). i) fA is called keeping intersection, if for any a, b ∈ A, there exists c ∈ A such that f (a) ∩ f (b) = f (c);

20

Mustafa 18-35

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

ii) fA is called keeping union, if for any a, b ∈ A, there exists c ∈ A such that f (a) ∨ f (b) = f (c); ii) fA is called topological, if {f (a) : a ∈ A} forms a topology on U. Definition 2.10 [7]Let fA ∈ S(U, E). Then the Pair P = (U, fA ) is called soft approximation space. We define a pair of operators aprP , aprP : ℘(U ) → ℘(U ) as follows: aprP (X) = {u ∈ U : ∃a ∈ A, s.t u ∈ f (a) ⊆ X}, aprP (X) = {u ∈ U : ∃a ∈ A, s.t u ∈ f (a), f (a) ∩ X 6= ∅} The elements aprP (X) and aprP (X) are called the soft P-lower and the soft P-upper approximations of X. Moreover, the sets P osP (X) = aprP (X) N egP (X) = (aprP (X))0 BndP (X) = aprP (X) − aprP (X) are called the soft P-positive region, the soft P-negative region and the soft P-boundary region of X, respectively. If aprp (X) = aprP (X), X is said to be soft P -definable; otherwise X is called a soft P -rough set. Definition 2.11[26] Let B = (B, ≤) be a bounded distributive lattice. A non empty subset I of B is called an ideal of B if for all x, y ∈ B (i) x, y ∈ I imply x ∨ y ∈ I; (ii) If x ∈ I with y ≤ x, then y ∈ B. Definition 2.12[26] Let B = (B, ≤) be a complete atomic Boolean lattice and let ϕ : A(B) → B be any mapping. Let I be any ideal on B. For any element x ∈ B, let W x∇I = {x ∧ a : a ∈ A(B), ϕ(a) ∧ x0 ∈ I and a 6= 0}, and W x4I = {x ∨ a : a ∈ A(B), ϕ(a) ∧ x 6∈ I and a 6= 1}. The elements x∇I and x4I are called the lower and the upper approximations of x via ideal I with respect to ϕ respectively. Two elements x and y are called equivalent via ideal I if they have the same upper and lower approximations via ideal I. The resulting equivalence classes are called rough sets via ideal I. Proposition 2.13[26] Let B = (B, ≤) be a complete atomic Boolean lattice and let ϕ : A(B) → B be any mapping. Let I be any ideal on B, then for all a ∈ A(B) and x ∈ B, i) a ≤ x∇I ⇐⇒ ϕ(a) ∧ x0 ∈ I and a ≤ x; ii) a ≤ x4I ⇐⇒ ϕ(a) ∧ x 6∈ I or a ≤ x. Proposition 2.14 [26] Let B = (B, ≤) be a complete atomic Boolean lattice and let ϕ : A(B) → B be any mapping. Let I be any ideal on B, then i) 04I =0 and 1∇I =1; ii) x ≤ y implies x∇I ≤ y ∇I and x4I ≤ y 4I . Remark 2.15[26](1) In general, x∇I ≤ x ≤ x4I . (2) The two operations suggested in Definition 2.12 are suitable also for other operators based on binary relations. If U is any universal set, then ℘(U ) is a complete atomic boolean lattice whose atoms are singleton subsets of U. Let R and be a general relation on U and I any ideal on U. We define a mapping ϕ : A(B) −→ B : U −→ ℘(U ), x −→ R(x) where R(x) = {y ∈ U : xRy}. Then for any X ⊆ U , X ∇I = ∪{x ∈ U : R(x) ∩ X 0 ∈ I} ∩ X and X 4I = ∪{x ∈ U : R(x) ∩ X 6∈ I} ∪ X If X ∇I = X 4I , X is said to be R-I-definable; otherwise X is called R-I-rough set.

21

Mustafa 18-35

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

5

Table 1: Tabular representation of the soft set FA u1 u2 u3 u4 u5 u6 e1 0 1 1 0 0 0 e2 0 0 0 0 1 0 e3 1 0 0 1 0 0 e4 0 1 0 0 0 1

3. Soft Rough Approximation operators via ideal In this section we introduce soft rough approximations via ideal and soft rough set via ideal. Definition 3.1 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. The triple (U, fA , I) is called soft approximation space via ideal. We define a pair of operators aprI , aprI : ℘(U ) → ℘(U ) as follows: aprI (X) = {u ∈ X : ∃a ∈ A, s.t u ∈ f (a), f (a) ∩ X 0 ∈ I}, aprI (X) = {u ∈ U : ∃a ∈ A, s.t u ∈ f (a), f (a) ∩ X 6∈ I} The elements aprI (X) and aprI (X) are called the soft I-lower and the soft I-upper approximations of X via ideal. In general, we refer to aprI (X) and aprI (X) as soft rough approximations of X with respect to P via ideal. Moreover, the sets P osI (X) = aprI (X) N egI (X) = (aprI (X))0 BndI (X) = aprI (X) − aprI (X) are called the soft I-positive region, the soft I-negative region and the soft I-boundary region of X, respectively. If aprI (X) = aprI (X), X is said to be soft I-definable; otherwise X is called a soft I-rough set. Proposition 3.2 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. Then aprI (X) ⊆ aprI (X). Proof: Let u ∈ aprI (X), then ∃a ∈ A, s.t u ∈ f (a), f (a) ∩ X 0 ∈ I. If f (a) ∩ X ∈ I. So, (f (a) ∩ X) ∪ (f (a) ∩ X 0 ) ∈ I by properties of ideal. Thus f (a) ∩ (X ∪ X 0 ) = f (a) ∩ U = f (a) ∈ I a contradiction. Hence f (a) ∩ X 6∈ I and consequently aprI (X) ⊆ aprI (X). By Definition 3.1, we immediately have that X ⊆ U is soft I-definable if the soft I-boundary region BndI (X) of X is empty. Also, By Proposition 3.2, we have aprI (X) ⊆ aprI (X) for all X ⊆ U . Nevertheless, it is worth noticing that X ⊆ aprI (X) does not hold in general. Example 3.3 Let U = {u1 , u2 , u3 , u4 , u5 , u6 }, E = {e1 , e2 , e3 , e4 , e5 , e6 } and A = {e1 , e2 , e3 , e4 } ⊆ E. Let fA be a soft over U given by Table 1. Let I be an ideal on U defined as follows I = {φ, {u1 }, {u3 }, {u6 }, {u1 , u3 }, {u1 , u6 }, {u3 , u6 }, {u1 , u3 , u6 }}. Let X = {u3 , u4 , u5 } ⊆ U . So X 0 = {u1 , u2 , u6 }. Thus we have aprI (X) = {u4 , u5 } , and aprI (X) = {u1 , u4 , u5 }. So aprI (X) 6= aprI (X) and X is soft I-rough set. In this case X = {u3 , u4 , u5 } 6⊆ aprI (X). Moreover, it is easy to see that P osI (X) = {u4 , u5 }, N egI (X) = {u2 , u3 , u6 } and BndI (X) = {u1 }. On the other hand, one can consider X1 = {u1 , u4 , u6 } ⊆ U . Since aprI (X1 ) = {u1 , u4 } = aprI (X1 ), then X1 is a soft I-definable set. Proposition 3.4 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. Then for all X ⊆ U S i) aprI (X) = X ∩ {f (a) : a ∈ A and f (a) ∩ X 0 ∈ I};

22

Mustafa 18-35

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

Table 2: Tabular representation of the soft set FA u1 u2 u3 u4 u5 u6 e1 1 0 0 0 0 1 e2 0 0 0 0 1 0 e3 0 0 0 1 0 0 e4 1 1 0 0 1 0 ii) aprI (X) =

S

{f (a) : a ∈ A and f (a) ∩ X 6∈ I}.

Proof: u ∈ X and ∃a ∈ A, s.t u ∈ f (a), f (a) ∩ X 0 ∈ I. S i) Let u ∈ aprI (X). So 0 X ∩ {f (a) : a ∈ A and f (a) ∩X ∈ I}. The other inclusion can be proved similarly.

Hence x ∈

Definition 3.5 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. For any X ⊆ U measure of accuracy for soft set with respect to X denoted by AP (X) is defined by |apr (X)|

AP (X) = |aprP (X)| P where |aprP (X)| and |aprP (X)|, denotes the cardinalities of the sets aprP (X) and aprP (X) respectively. Also, measure of accuracy for soft set with respect to X via ideal denoted by AI (X) is defined by |apr (X)|

AI (X) = |aprI (X)| I where |aprI (X)| and |aprI (X)|, denotes the cardinalities of the sets aprI (X) and aprI (X) respectively Now, we show in the next example that soft rough approximation via ideal provide a better approximation than soft rough approximation which provide a better approximation than rough sets. Example 3.6 Let U = {u1 , u2 , u3 , u4 , u5 , u6 }, E = {e1 , e2 , e3 , e4 , e5 , e6 } and A = {e1 , e2 , e3 , e4 } ⊆ E. Let fA be a soft over U given by Table 2. Let I be an ideal on U defined as follows I = {φ, {u1 }, {u2 }, {u3 }, {u1 , u2 }, {u1 , u3 }, {u2 , u3 }, {u1 , u2 , u3 }}. Let X = {u1 , u5 } ⊆ U . So X 0 = {u2 , u3 , u4 , u6 }. Thus aprP (X) = {u5 } , aprI (X) = {u1 , u5 } ∩ {u1 , u2 , u5 } = {u1 , u5 }, aprP (X) = {u1 , u2 , u5 , u6 } and aprI (X) = {u1 , u2 , u5 }. So aprP (X) ⊆ aprI (X) ⊆ X ⊆ aprI (X) ⊆ aprP (X). Thereapr (X)

apr (X)

fore AP (X) = aprP (X) = 41 and AI (X) = aprI (X) = 23 . Consequently, AI (X) > AP (X). Consequently P I accuracy measure via ideal is better than accuracy measure for soft sets. Proposition 3.7 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. i) aprI (φ) = φ = aprI (φ) ii) aprI (U ) = aprI (U ) =

S

f (a); a∈A

iii) X ⊆ Y implies aprI (X) ⊆ aprI (Y ) and aprI (X) ⊆ aprI (Y ). iv) I ⊆ J implies aprI (X) ⊆ aprJ (X) S S Proof: (i)Clearly, aprI (φ) = φ. Also, aprI (φ) = {f (a) : a ∈ A and f (a) ∩ φ 6∈ I} = {f (a) : a ∈ A and φ 6∈ I} = φ. S S S (ii) aprI (U ) = {f (a) : a ∈ A and f (a) ∩ φ ∈ I} = {f (a) : a ∈ A and φ ∈ I} = f (a). Also, since a∈A S f (a) 6∈ I ∀a ∈ A, then aprI (U ) = f (a) a∈A

(iii) Assume that X ⊆ Y and u ∈ aprI (X). So u ∈ X and ∃a ∈ A, s.t u ∈ f (a), f (a) ∩ X 0 ∈ I. Since Y 0 ⊆ X 0 , then f (a) ∩ Y 0 ∈ I by properties of ideal. Consequently, u ∈ aprI (Y ). The other part can be proved similarly. (iv) Obvious Proposition 3.8 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. Then for all X, Y ⊆ U i) aprI (X ∪ Y ) ⊇ aprI (X) ∪ aprI (Y )

23

Mustafa 18-35

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

7

ii) aprI (X ∩ Y ) ⊆ aprI (X) ∩ aprI (Y ) iii) If fA is keeping intersections, then aprI (X ∩ Y ) = aprI (X) ∩ aprI (Y ) iv) If fA is partition, then aprI (X ∩ Y ) = aprI (X) ∩ aprI (Y ) v) aprI (X ∪ Y ) = aprI (X) ∪ aprI (Y ) vi) aprI (X ∩ Y ) ⊆ aprI (X) ∪ aprI (Y ) Proof: (i) and (ii) follow immediately by Proposition 3.7. (iii) By (i), aprI (X ∩ Y ) ⊆ aprI (X) ∩ aprI (Y ). Let u ∈ aprI (X) ∩ aprI (Y ), then u ∈ X ∩ Y and there exists a, b ∈ A such that u ∈ f (a), f (a) ∩ X 0 ∈ I, u ∈ f (b), and f (b) ∩ X 0 ∈ I. Since fA is keeping intersections, then there exists c ∈ A, such that f (a) ∩ f (b) = f (c). By properties of ideal, f (a) ∩ f (b) ∩ X 0 ∈ I. So we prove that there exists c ∈ A, such that u ∈ f (c) and f (c) ∩ X 0 ∈ I. Hence u ∈ aprI (X ∩ Y ) and consequently, aprI (X ∩ Y ) = aprI (X) ∩ aprI (Y ). (iv) Let u ∈ aprI (X)∩aprI (Y ), then u ∈ X ∩ Y and there exists a, b ∈ A such that u ∈ f (a), f (a) ∩ X 0 ∈ I, u ∈ f (b), and f (b) ∩ X 0 ∈ I. Since fA is partition, then f (a) = f (b). So, Therefore u ∈ aprI (X ∩ Y ). Consequently, aprI (X ∩ Y ) = aprI (X) ∩ aprI (Y ). (v)By Proposition 3.7, aprI (X ∪ Y ) ⊇ aprI (X) ∪ aprI (Y ). On the other hand, let u ∈ aprI (X ∪ Y ), then there exists a ∈ A such that u ∈ f (a), f (a) ∩ (X ∪ Y ) = (f (a) ∩ X) ∪ (f (a) ∩ Y ) 6∈ I. Hence either f (a) ∩ X 6∈ I or f (a) ∩ Y 6∈ I by properties of ideal. So u ∈ aprI (X) ∪ aprI (Y ) and consequently, aprI (X ∪ Y ) = aprI (X) ∪ aprI (Y ). (vi) Follows immediately by Proposition 3.7. Proposition 3.9 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. Then for all X ⊆ U i) aprI (X) = aprI (aprI (X)) ii) aprI (X) ⊆ aprI (aprI (X)) iii) aprI (X) = aprI (aprI (X)) iv) aprI (X) ⊆ aprI (aprI (X)) Proof:(i) Let Y = aprI (X) and uS∈ Y . Then u ∈ f (a) and f (a) ∩ X 6∈ I for some a ∈ A. By Proposition 3.4(ii), Y = aprI (X) = {f (a) : a ∈ A and f (a) ∩ X 6∈ I}. So there exists a ∈ A such that u ∈ f (a) ⊆ Y . Hence f (a) ∩ Y 0 = φ ∈ I and consequently, u ∈ aprI (Y ). Therefore Y ⊆ aprI (Y ). On the other hand, since aprI (Y ) ⊆ Y for any Y ⊆ U , then Y = aprI (Y ) as required. 0 (ii)Let Y = apr SI (X) and u ∈ Y . Then u 0 ∈ f (a) and f (a) ∩ X ∈ I for some a ∈ A. But Y = apr and f (a) ∩ X ∈ I}. We deduce that u ∈ f (a) and f (a) ∩ Y = f (a) ∩ X ∩ S I (X) = X ∩ {f (a) : a ∈ A {f (a) : a ∈ A and f (a) ∩ X 0 ∈ I} = f (a) ∩ X. If f (a) ∩ X ∈ I, then (f (a) ∩ X) ∪ (f (a) ∩ X 0 ) ∈ I (by properties of ideal) i.e f (a) ∩ (X ∪0 X) = f (a) ∩ U = f (a) ∈ I a contradiction. Therefore, f (a) ∩ X = f (a) ∩ Y 6∈ I. Hence u ∈ aprI (Y ) and so Y ⊆ aprI (Y ).

(iii) Let Y = aprI (X)Sand u ∈ Y . Then u ∈ f (a) and f (a) ∩ X 0 ∈ I for some a ∈ A. But Y = aprI (X) = X ∩ {f (a) : a ∈ A and f (a) ∩ X 0 ∈ I}. We deduce that f (a) ∩ X ⊆ Y . Hence f (a) ∩ X ∩ Y 0 = (f (a) ∩ Y 0 ) ∩ X = φ. Hence f (a) ∩ Y 0 ⊆ X 0 and thus f (a) ∩ Y 0 ⊆ f (a) ∩ X 0 . Since f (a) ∩ X 0 ∈ I, then f (a) ∩ Y 0 ∈ I. Consequently, u ∈ aprI (Y ). So Y ⊆ aprI (Y ). (iv) Let Y = aprI (X) and u ∈ Y . Then u ∈ f (a) and f (a) ∩ X 6∈ I for some a ∈ A. But Y = aprI (X) = S {f (a) : a ∈ A and f (a) ∩ X 6∈ I}. It follows that u ∈ f (a) and f (a) ∩ Y = f (a) ⊇ f (a) ∩ X 6∈ I by properties of ideal. So u ∈ aprI (Y ) and hence Y ⊆ aprI (Y ).

24

Mustafa 18-35

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

Example 3.10 Let U = {u1 , u2 , u3 , u4 , u5 , u6 }, E = {e1 , e2 , e3 , e4 , e5 , e6 } and A = {e1 , e2 , e3 , e4 } ⊆ E. Let FA be a soft over U given by Table 2. Let I be an ideal on U defined as follows I = {φ, {u2 }, {u3 }, {u2 , u3 }}.Let X = {u1 , u5 , u6 } ⊆ U . So we have X 0 = {u2 , u3 , u4 }, and hence aprI (X) = X ∩ {u1 , u2 , u5 , u6 } = {u1 , u5 , u6 } = {u1 , u5 , u6 } and aprI (X) = {u1 , u2 , u5 , u6 } = f (e1 ) ∪ f (e2 ) ∪ f (e4 ). Let Y = aprI (X). Then we have aprI (aprI (X)) = aprI (Y ) = f (e1 ) ∪ f (e2 ) ∪ f (e4 ) = aprI (X) = Y . Also, we have aprI (aprI (X)) = aprI (X) = Y ⊃ X = aprI (X), which suggests that the inclusion (ii) in 6= Proposition may hold strictly. Moreover, it is easy to see that aprI (aprI (X)) = aprI (X). Let X1 = {u4 , u6 }, then aprI (X1 ) = {u1 , u4 , u6 }. If Y = aprI (X1 ), then aprI1 (aprI (X1 )) = aprI (Y1 ) = {u1 , u2 , u4 , u5 , u6 }⊃ Y1 = aprI (X1 ) 6=

which indicates that the inclusion in Proposition may be strict. Proposition 3.11 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. Then the following properties hold i) If fA is keeping union, then a) for any X ⊆ U , there exists a ∈ A such that aprI (X) = f (a) ∩ X a) for any X ⊆ U , there exists a ∈ A such that aprI (X) = f (a) ii) If fA is full and keeping union, then aprI (X) = U for any X ⊆ U such that X 6∈ I Proof:i) This holds by Proposition 3.4. S ii) Since fA is full and keeping union, then U =

f (a) = f (a∗ ) for some a∗ ∈ A. For each X ⊆ U

a∈A

such that X 6∈ I and each u ∈ U , u ∈ f (a∗ ) and f (a∗ ) ∩ X = X 6∈ I. Therefore aprI (X) = U . Proposition 3.12 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. Then for any X ⊆ U , X is soft I-definable if and only if aprI (X) ⊆ X. Proof: If X is soft I-definable, then aprI (X) = aprI (X) ⊆ X. Conversely, suppose that aprI (X) ⊆ X for X ⊆ U . Since f (a) 6∈ I ∀a ∈ A, then aprI (X) ⊆ aprI (X) by Proposition 3.2. To show that X is soft I-definable, it remains to prove that aprI (X) ⊆ aprI (X). Let u ∈ aprI (X). Then ∃a ∈ A, s.t u ∈ f (a), f (a) ∩ X 6∈ I. It follows that u ∈ f (a) ⊆ aprI (X) ⊆ X. So u ∈ X, u ∈ f (a) and f (a) ∩ X 0 = φ ∈ I. Therefore u ∈ aprI (X) and so aprI (X) ⊆ aprI (X) as required. Example 3.13 To illustrate the above result, we revisit Example 3.6. Let X = {u2 , u4 } ⊆ U . So X 0 = {u1 , u3 , u5 , u6 }, aprI (X) = {u4 } = aprI (X). Hence aprI (X) ⊆ X and X is soft I-definable set. On the other hand, for X1 = {u4 , u6 } ⊆ U , X1 0 = {u1 , u2 , u3 , u5 }, aprI (X1 ) = {u4 , u6 } ∩ {u1 , u4 , u6 } = {u4 , u6 } and aprI (X1 ) = {u1 , u4 , u6 }. Thus aprI (X1 ) 6⊆ X and X1 is soft I-rough set. Proposition 3.14 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. The following conditions are equivalent i) S is a full soft set. ii) aprI (U ) = U iii) aprI (U ) = U

25

Mustafa 18-35

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

9 S S Proof: aprI (U ) = U ∩ ( {fS (a) : a ∈ A and f (a) ∩ U 0 ∈ I}) = {f (a) : a ∈ A and f (a) ∩ φ ∈ I}) = S {f (a) : a ∈ A and φ ∈ I}) = f (a). a∈A

Hence by definition, S = (f, A) is a full soft set if and only if aprI (U ) = U . That is, conditions (i) and (ii) are equivalent. Similarly, we can show that (i) and (iii) are equivalent conditions. Proposition 3.15 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. The following conditions are equivalent i) X ⊆ aprI (X) ∀ X ⊆ U ii) aprI ({u}) 6= φ ∀ u ∈ U Proof: Assume that (i) holds, then {u} ⊆ aprI ({u}) ∀ u ∈ U i.e, aprI ({u}) 6= φ. Assume that (ii) holds. Let u ∈ X, so by (ii)aprI ({u}) 6= φ. Let v ∈ aprI ({u}), then ∃a ∈ A, s.t v ∈ f (a)and f (a) ∩ {u} 6∈ I. So f (a) ∩ {u} 6= φ. It follows that u = v ∈ f (a). Since f (a) ∩ {u} 6∈ I and {u} ⊆ X, then f (a) ∩ X 6∈ I. Consequently, u ∈ aprI (X). Proposition 3.16 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. If aprI ({u}) 6= φ ∀ u ∈ U , then for any X ⊆ U i) (aprI (X))0 ⊆ aprI (X 0 ) ii) N egI (X) = (aprI (X))0 ⊆ aprI (X 0 ) Proof:If (aprI (X))0 is empty, then clearly we have the inclusion (i). Suppose (aprI (X))0 6= φ. Let u ∈ (aprI (X))0 . Since fA is full, then ∃ao ∈ A, s.t u ∈ f (ao ). Note also that (aprI (X))0 = {u ∈ U : ∀a ∈ A, u ∈ f (a) ⇒ f (a) ∩ X 0 6∈ I} ∪ X 0 . Thus it follows that either u ∈ X 0 or f (ao ) ∩ X 0 6∈ I since u ∈ f (ao ). If u ∈ X 0 , since aprI ({u}) 6= φ ∀ u ∈ U , then X 0 ⊆ aprI (X 0 ) by Proposition 3.15. Therefore u ∈ aprI (X 0 ). If f (ao ) ∩ X 0 6∈ I, then u ∈ aprI (X 0 ). Consequently, (aprI (X))0 ⊆ aprI (X 0 ). (ii)It is clear that the inclusion N egI (X) = (aprI (X))0 ⊆ aprI (X 0 ) holds when the set (aprI (X))0 is empty. So suppose that (aprI (X))0 6= φ. Let u ∈ (aprI (X))0 . Since aprI ({u}) 6= φ ∀ u ∈ U , then X ⊆ aprI (X) by Proposition 3.15 and thus u ∈ X 0 . Since fA is full, then ∃ao ∈ A, s.t u ∈ f (ao ). But we have that N egI (X) = (aprI (X))0 = {u ∈ U : ∀a ∈ A, u ∈ f (a) ⇒ f (a) ∩ X ∈ I}. Thus it follows that f (ao ) ∩ (X 0 )0 ∈ I since u ∈ f (ao ). Therefore u ∈ aprI (X 0 ). Definition 3.17 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. Let X ⊆ U , We define the following seven types of soft rough sets via ideal i) X is roughly soft I-definable if aprI (X) 6= φ and aprI (X) 6= U ii) X is internally soft I-definable if aprI (X) = φ and aprI (X) 6= U iii) X is externally soft I-definable if aprI (X) 6= φ and aprI (X) = U iv) X is totally soft I-definable if aprI (X) = φ and aprI (X) = U iv) X is externally soft P-I-definable if aprI (X) 6= φ and aprP (X) = U iv) X is internally soft P-I-definable if aprP (X) = φ and aprI (X) 6= U Proposition 3.18 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. Let X ⊆ U . i) If X is roughly soft P-definable, then it is roughly soft I-definable. ii) If X is totally soft I-definable, then it is totally soft P-definable.

26

Mustafa 18-35

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

Proof: Obvious. Definition 3.19 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. For any X, Y ⊆ U we define i) X ∼I Y ⇐⇒ aprI (X) = aprI (Y ) ii) X ∼I Y ⇐⇒ aprI (X) = aprI (Y ) iii) X ≈I Y ⇐⇒ X ∼I Y and X ∼I Y These binary relations are called the lower soft rough equal relation via ideal,the upper soft rough equal relation via ideal, and the soft rough equal relation via idea, respectively. It is easy to verify that the relations defined above are all equivalence relations over ℘(U ). Proposition 3.20 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. For any X, Y ⊆ U we have i) X ∼I Y ⇐⇒ X ∼I (X ∪ Y ) ∼I Y ii) X ∼I X1 ,Y ∼I Y1 =⇒ (X ∪ Y ) ∼I (X1 ∪ Y1 ) iii) X ∼I Y =⇒ X ∪ (Y 0 ) ∼I U iv) X ⊆ Y , Y ∼I φ ⇐⇒ X ∼I φ v) X ⊆ Y , X ∼I U ⇐⇒ Y ∼I U Proof:(i)If X ∼I Y , then aprI (X) = aprI (Y ). Since aprI (X ∪ Y ) = aprI (X) ∪ aprI (Y ), we deduce aprI (X ∪ Y ) = aprI (X) = aprI (Y ) and so X ∼I (X ∪ Y ) ∼I Y . Conversely, if X ∼I (X ∪ Y ) ∼I Y , then we immediately have that X ∼I Y by using the transitivity of the relation ∼I . (ii) Assume that X ∼I X1 and Y ∼I Y1 . Then by definition, we know that aprI (X) = aprI (X1 ) and aprI (Y ) = aprI (Y1 ). Since aprI (X ∪ Y ) = aprI (X) ∪ aprI (Y ) and aprI (X1 ∪ Y1 ) = aprI (X1 ) ∪ aprI (Y1 ), we deduce that aprI (X ∪ Y ) = aprI (X1 ∪ Y1 ), whence (X ∪ Y ) ∼I (X1 ∪ Y1 ). (iii) Suppose that X ∼I Y . Then by definition, aprI (X) = aprI (Y ). Since aprI (X ∪ Y 0 ) = aprI (X) ∪ aprI (Y 0 ) and aprI (U ) = aprI (Y )∪aprI (Y 0 ), it follows that aprI (X∪Y 0 ) = aprI (U ); hence X ∪ (Y 0 ) ∼I U as required. (iv) Let X ⊆ Y and Y ∼I φ. Then we deduce aprI (X) ⊆ aprI (Y ) = aprI (φ) = φ. Hence aprI (X) = φ = aprI (φ), and so we have that X ∼I φ. (v) Suppose that X ⊆ Y and X ∼I U . Then we deduce aprI (Y ) ⊇ aprI (X) = aprI (U ). Since Y ⊆ U , then aprI (Y ) ⊇ aprI (U ). Therefore aprI (Y ) = aprI (U ), and so Y ∼I Y as required. Proposition 3.21 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. If fA is keeping intersection, then for any X, Y ⊆ U we have i) X ∼I Y ⇐⇒ X ∼I (X ∩ Y ) ∼I Y ii) X ∼I X1 ,Y ∼I Y1 =⇒ (X ∩ Y ) ∼I (X1 ∩ Y1 ) iii) X ∼I Y =⇒ X ∩ (Y 0 ) ∼I φ iv) X ⊆ Y , Y ∼I φ =⇒ X ∼I φ v) X ⊆ Y , X ∼I U ⇐⇒ Y ∼I U Proposition 3.22 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. Then for any X ⊆ U T aprI (X) = {Y ⊆ U : X ∼I Y }

27

Mustafa 18-35

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

11

Sex Age category Living area Habits

u1 Woman Young City NSND

Table 3: An information table u2 u3 u4 Woman M an M an Young M atureage Old City City V illage NSND Smoke SD

u5 M an M ature age City Smoke

u6 M an Baby V illage N SN D

Proof: Let u ∈ aprI (X). If X ∼I Y , then by definition aprI (X) = aprI (Y ). But aprI (Y ) ⊆ Y for any Y ⊆ U . It T follows that u ∈ aprI (X) = aprI (Y ) ⊆ YT . Hence u ∈T {Y ⊆ U : X ∼I Y }, and so aprI (X) ⊆ {Y ⊆ U : XT∼I Y }. Next, we show that the reverse inclusion {Y ⊆ U : X ∼I Y } ⊆ aprI (X) also holds. Let u ∈ {Y ⊆ U : X ∼I Y }. Then by Proposition 3.9, we have aprI (X) = aprI (aprI (X)). T Thus X ∼I aprI (X), and it follows that u ∈ aprI (X). Consequently, we conclude that aprI (X) = {Y ⊆ U : X ∼I Y }. Example 3.23 As in Example 3.6. Let X = {u4 , u5 , u6 } ⊆ U . So we have X 0 = {u1 , u2 , u3 }, and hence aprI (X) = X ∩ {u1 , u2 , u4 , u5 , u6 } = {u4 , u5 , u6 } = X. It is easy to see that T aprI (X) = {Y ⊆ U : X ∼I Y }. Example 3.24 Let us consider the following soft set S = fE which describes life expectancy. Suppose that the universe U = {u1 , u2 , u3 , u4 , u5 , u6 } consists of six persons and E = {e1 , e2 , e3 , e4 } is a set of decision parameters. The ei (i = 1,2,3,4) stands for ”under stress”, ”young”, ”drug addict” and ”healthy”. Set f (e1 ) = {u1 , u6 }, f (e2 ) = {u5 }, f (e3 ) = {u4 } ; and f (e4 ) = {u1 , u2 , u6 }. The soft set fE can be viewed as the following collection of approximations: fE = {(understress, {u1 , u6 }); (young, {u5 }); (drugaddict, {u4 }); (healthy; {u1 , u2 , u6 })}. On the other hand, ”life expectancy” topic can also be described using rough sets as follows: The evaluation will be done in terms of attributes: ”sex”, ”age category”, ”living area”, ”habits”, characterized by the value sets ”{man, woman}”, ”{baby, young, mature age, old}”, ”{village, city}”, ”{smoke, drinking, smoke and drinking, no smoke and no drinking}”. We denote ”smoke and drinking” by SD and ”no smoke and no drinking” by NSND. The information will be given by Table 3, where the rows are labeled by attributes and the table entries are the attribute values for each person. From here we obtain the following equivalence classes, induced by the above mentioned attributes: [u1 ]R = [u2 ]R = {u1 , u2 }, [u3 ]R = [u5 ]R = {u3 , u5 }, [u4 ]R = {u4 }, [u6 ]R = {u6 }. Let I be an ideal on U defined as follows I = {φ, {u2 }, {u3 }, {u2 , u3 }}. Let X be a target subset of U, that we wish to represent using the above equivalence classes. Hence we analyze the upper and lower approximations of X, in some particular cases: 1. Let X = {u5 }. It follows that X ∇I = {u5 }, X 4I = {u3 , u5 }. So X is R-I-rough. Let us calculate now the soft I-lower and I-upper approximations of X. We obtain aprI (X) = {u5 } = X, aprI (X) = {u5 } = X hence X is soft I-definable. 2. Let X = {u2 , u5 }. It follows that aprI (X) = {u5 } = aprI (X). So X is soft I-definable. On the other hand, aprP (X) = {u5 }, aprP (X) = {u1 , u2 , u5 , u6 }, hence X is soft P -rough. The above results show that soft rough set approximation via ideal is a worth considering alternative to the rough set approximation via ideal. Soft rough sets via ideal could provide a better than rough sets via ideal do, depending on the structure of the equivalence approximation classes and of the subsets f(e), where e ∈ E. .

28

Mustafa 18-35

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12

4. The relations among soft sets, ideal and topologies In this section, we investigate the relationship between topological soft sets, topologies and an ideal. Theorem 4.1 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. If fA is full, then i) τf = {X ⊆ U : X = aprI (X)} is a generalized topology on U. ii) If fA is keeping intersections, then τf is a topology on U. Proof: Since S aprI (φ) = φ, then φ ∈ τf . Let = ⊆ τf . Denote = = {Xα : α ∈ Γ} where Γ is an index set. Put X = {X ) ⊆ aprI (X) by Proposition Sα : α ∈ Γ}. Since Xα ⊆ X for each α ∈ Γ, then Xα = aprI (XαS 3.7. So X = {Xα : α ∈ Γ} ⊆ aprI (X). Thus aprI (X) = X. This implies {Xα : α ∈ Γ} ∈ τf . Hence τf is a generalized topology on U. (ii) By Propositions and aprI (U ) = U and thus U ∈ τf . Let X, Y ∈ τf , then aprI (X ∩ Y ) = aprI (X) ∩ aprI (Y ) = X ∩ Y by Proposition 3.8. So X ∩ Y ∈ τf . By (i) τf is a generalized topology on U. Thus τf is a topology on U. Definition 4.2 Let fA ∈ S(U, E) be full and keeping intersections and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. Then τf is called the topology induced by fA and an ideal I on U. The following Theorem gives the topological structure on soft sets and an ideal(i.e. the structure of topologies induced by soft sets and an ideal). Theorem 4.3 Let fA ∈ S(U, E) be full and keeping intersections and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. Then i) {aprI (X) : X ⊆ U } ⊆ τf = {aprI (X) : X ⊆ U } ii) τf ⊇ {f (a) : a ∈ A} iii) aprI (X) is an interior operator of τf Proof: (i) Since aprI (X) = aprI (aprI (X)) by Proposition 3.9, then {aprI (X) : X ⊆ U } ⊆ τf . Obviously, τf ⊆ {aprI (X) : X ⊆ U } Let Y ∈ {aprI (X) : X ⊆ U }. Then Y = aprI (X) for some X ⊆ U . By Proposition 3.9, aprI (X) = aprI (aprI (X)). So Y ∈ τf . Thus τf ⊇ {aprI (X) : X ⊆ U }. Hence {aprI (X) : X ⊆ U } ⊆ τf = {aprI (X) : X ⊆ U } as required. S (ii) For each a ∈ A, by Proposition 3.4 aprI (f (a)) =Sf (a) ∩ {f (a∗ ) : a∗ ∈ A, f (a∗ ) ∩ (f (a))0 ∈ I} ⊆ f (a). Since f (a) ∩ (f (a))0 = φ ∈ I, then f (a) ⊆ f (a) ∩ {f (a∗ ) : a∗ ∈ A, f (a∗ ) ∩ (f (a))0 ∈ I} = aprI (f (a)). Hence f (a) = aprI (f (a)) and so f (a) ∈ τf . Therefore {f (a) : a ∈ A} ⊆ τf . (iii)It suffices to show that aprI (X) = int(X) ∀X ⊆ U . By (i) aprI (X) ∈ τf and since aprI (X) ⊆ X, then aprI (X) ⊆ int(X). S Conversely, let Y ∈ int(X), then Y ∈ τf and Y ⊆ X. So Y = aprI (Y ) ⊆ aprI (X). Thus int(X) = {Y : Y ∈ τf , Y ⊆ X} ⊆ aprI (X). Consequently, aprI (X) = int(X). Definition 4.4 Let τ be a topology on U and I be an ideal on U. Put τ = {Ua : a ∈ A and Ua 6∈ I} where A is the set of indexes. Define a mapping fτ : A → ℘(U ) by fτ (a) = Ua for each a ∈ A. Then, the soft set (fτ )A over U is called the soft set induced by τ on U and an ideal I on U. Proposition 4.5 (1)Let τ be a topology on U and I be an ideal on U. Let (fτ )A be the soft set induced by τ and I on U. Then, (fτ )A is a full, keeping intersection, keeping union soft over U and

29

Mustafa 18-35

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

13

(fτ )A 6∈ I for each a ∈ A. (2) Let τ1 and τ2 be two topologies on U and I1 and I2 be two ideals on U. Let (fτ1 )A1 and (fτ2 )A2 be two soft sets induced, respectively, by τ1 and I1 and, τ2 and I2 on U. If τ1 ⊆ τ2 , then (fτ1 )A1 ⊇ (fτ2 )A2 Proof: Obvious. Proposition 4.6 Let τ be a topology on U, let I be an ideal on U such that G 6∈ I ∀G ∈ τ . Then there exists a full, keeping intersection, and keeping union soft set fA with fA (a) 6∈ I for each a ∈ A such that aprI (X) ⊇ int(X) for each X ∈ ℘(U ) where (U, fA , I) be a soft approximation space via ideal. Proof: Put τ = {Ua : a ∈ A}, where A is the set of indexes. Define a mapping f : A → ℘(U ) by f (a) = Ua for each a ∈ A By Proposition 4.5 fA is full, keeping intersection, and keeping union and fA (a) 6∈ I for each a ∈ A. Now, we show that aprI (X) ⊇ int(X) for each X ∈ ℘(U ). Let X ∈ ℘(U ) and x ∈ int(X), then ∃ open neighbourhood W of x s.t W ⊆ X. So, W = Ua for some a ∈ A. This implies x ∈ Ua = f (a) and f (a) ∩ X 0 = φ ∈ I. Therefore x ∈ aprI (X). Consequently, aprI (X) ⊇ int(X). Theorem 4.7 Let fA be full and keeping intersections soft set over U and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. Let τf be the topology induced by fA and I on U. Let (fτf )B be the soft set induced by τf and I on U. Then fA ⊆ (fτf )B Proof: By Theorem 4.3 τf ⊇ {f (a) : a ∈ A}. Let τf = {Ua : Ua 6∈ I, a ∈ B}, where A ⊆ B, Ua = f (a) ∀ a ∈ A. Therefore fτf : B → ℘(U ), where fτf (a) = Ua for each a ∈ B. Hence fA ⊆ (fτf )B .

5. The relations between soft rough approximation via ideal and rough approximation via ideal In this section we will describe the relationship between rough sets via ideal and soft rough sets via ideal. Definition 5.1 Let R be a binary relation on U and I be an ideal on U such that R(a) 6∈ I ∀a ∈ U . . Define a mapping fR : U → ℘(U ) by fR (a) = R(a) for each a ∈ A, where A = U . Then, (fR )A is called the soft set induced by R and I on U. Theorem 5.2 Let R be an equivalence relation on U, (fR )A ) be the soft set induced by R on U. Let I be an ideal on U and PR = (U, (fR )A , I) be a soft approximation space via ideal. If aprI ({u}) 6= φ ∀ u ∈ U , then for all X ⊆ U , X ∇I = aprI (X) and X 4I = aprI (X). Thus in this case, i) X ⊆ U is R-I-definable iff X is a soft I-definable set. ii) X ⊆ U is R-I-rough iff X is a soft I-rough set.

30

Mustafa 18-35

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14 Proof: Let X ⊆ U and u ∈ U . We show that X ∇I = aprI (X). If u ∈ RI (X) = {x ∈ X : [x]R ∩ X 0 ∈ I}, then [u]R ∩ X 0 ∈ I. So, ∃ u ∈ X s.t u ∈ [u]R = fR (u) ∩ X 0 ∈ I. Therefore u ∈ aprI (X), and so X ∇I ⊆ aprI (X). Conversely, assume that u ∈ aprI (X). So,u ∈ X and ∃ v ∈ U s.t u ∈ fR (v) = [v]R , [v]R ∩ X 0 ∈ I. It follows that [u]R = [v]R . Thus [u]R ∩ X 0 = [v]R ∩ X 0 ∈ I and u ∈ X ∇I . Consequently, X ∇I = aprI (X). Now we show that X 4I = aprI (X). Let u ∈ X 4I , then either u ∈ X or [u]R ∩ X 6∈ I. If u ∈ X , then u ∈ aprI (X) by Proposition 3.15 since aprI ({u}) 6= φ ∀ u ∈ U . If [u]R ∩ X 6∈ I, then ∃ u ∈ U s.t u ∈ [u]R = fR (u) ∩ X 6∈ I and therefore u ∈ aprI (X). Therefore X 4I ⊆ aprI (X). Conversely, let u ∈ aprI (X). Then ∃ v ∈ U s .t u ∈ fR (v) = [v]R , [v]R ∩ X 6∈ I. Thus [u]R = [v]R and [u]R ∩ X 6∈ I . Hence u ∈ X 4I and consequently X 4I = aprI (X). Definition 5.3 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A (i) Define a binary relation Rf on U by xRf y ⇔ ∃ a ∈ A , {x, y} ⊆ f (a) for each x, y ∈ U . Then Rf is called the binary relation induced by fA and I on U. (ii) For each x ∈ U , define a successor neighbourhood (Rf )s (x) = {y ∈ U : xRf y} Proposition 5.4 [35] Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let Rf be the binary relation induced by fA on U. Then, the following properties hold. i) Rf is a symmetric relation. ii) If fA is full, then Rf is a reflexive relation. iii) If fA is a partition, then Rf is an equivalence relation. Proposition 5.5 [35] Let Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let Rf be the binary relation induced by fA on U. Then, the following properties hold. i) If u ∈ f (a) for a ∈ A, then f (a) ⊆ Rf (u). ii) If fA is a partition and u ∈ f (a) for a ∈ A, then f (a) = Rf (u). iii) If fA is keeping union, then for all u ∈ U ∃a ∈ A, s.t Rf (u) = f (a). Next, we define a new pair of soft rough approximation operators via ideal and giving the relationship between this pair and previous one. Definition 5.6 Let Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. We define a pair of operators apr0P , apr0P : ℘(U ) → ℘(U ) as follows: apr0I (X) = {x ∈ X : Rf (x) ∩ X 0 ∈ I}, S apr0I (X) = {x ∈ U : Rf (x) ∩ X 6∈ I} X Proposition 5.7 Let Let fA ∈ S(U, E) be partition and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. Let Rf be a binary relation induced by fA on U. Then, the following properties hold for any X ⊆ U i) If fA is full, then aprI (X) ⊇ apr0I (X) ii) If fA is full, keeping union and X 6∈ I, then aprI (X) ⊇ apr0I (X)

31

Mustafa 18-35

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

15

iii) If fA is partition, then a) aprI (X) = apr0I (X) b) If aprI ({u}) 6= φ ∀ u ∈ U , then aprI (X) = apr0I (X) Proof: i) Suppose that x ∈ apr0I (X). Then x ∈ X and Rf (x) ∩ X 0 ∈ I. Since fA is full, then x ∈ f (a) for some a ∈ A. By Proposition 5.5 f (a) ⊆ Rf (x). Thus, x ∈ f (a) and f (a) ∩ X 0 ∈ I by properties of ideal. Consequently, x ∈ aprI (X). So, aprI (X) ⊇ apr0I (X) ii)Since X 6∈ I, then X 6= φ. By Proposition 3.11(ii), aprI (X) = U . Thus aprI (X) ⊇ apr0I (X) iii) a) Suppose that x ∈ aprI (X). Then, x ∈ X and ∃ a ∈ A s.t x ∈ f (a) and f (a) ∩ X 0 ∈ I. Since fA is partition and x ∈ f (a), then f (a) = Rf (x) by Proposition 3.11. This implies that x ∈ apr0I (X). Therefore aprI (X) ⊆ apr0I (X) Since every partition soft set is full, then by i) aprI (X) = apr0I (X) iii) b) Suppose that x ∈ aprI (X). Then, ∃ a ∈ A s.t x ∈ f (a) and f (a) ∩ X 6∈ I. Since fA is partition and x ∈ f (a), then f (a) = Rf (x) by Proposition 3.11. This implies that x ∈ apr0I (X). Therefore aprI (X) ⊆ apr0I (X) Suppose that x ∈ apr0I (X). Then, either x ∈ X or Rf (x)∩X 6∈ I. If x ∈ X, since aprI ({u}) 6= φ ∀ u ∈ U , then X ⊆ aprI (X) by Proposition 3.15 and therefore x ∈ aprI (X). If Rf (x) ∩ X 6∈ I, since fA is full, then x ∈ f (a) for some a ∈ A. Since fA is partition and x ∈ f (a), then f (a) = Rf (x) by Proposition 3.11. This implies that x ∈ aprI (X). Therefore apr0I (X) ⊆ aprI (X) Hence aprI (X) = apr0I (X). Theorem 5.8 Let fA ∈ S(U, E) be partition and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal. Let Rf be a binary relation induced by fA on U. Then, for all X ⊆ U , X ∇I = aprI (X) = apr0I (X) and X 4I = aprI (X) = apr0I (X). where X ∇If and X 4If are the rough approximations operators of X via ideal. Proof: Follows immediately by Propositions 5.5 and 5.7. Remark 5.9 Theorems 5.2 and 5.8 illustrate that rough set models via ideal can be viewed as a special case of soft rough sets via ideal. Proposition 5.10 Let fA ∈ S(U, E) and I be an ideal on U such that f (a) 6∈ I ∀a ∈ A. Let (U, fA , I) be a soft approximation space via ideal and Rf be a binary relation induced by fA on U. i) If X ⊆ U is R-I- definable, then X is soft I-definable. ii) If X ⊆ U is R-I- Rough, then X is soft I-Rough. Proof: (i) If X = φ, then X is soft I-definable by Proposition 3.7. Let φ 6= X ∈ ℘(U ) be R-I-definable. by Proposition 3.2, aprI (X) ⊆ aprI (X). It remains to show that aprI (X) ⊆ aprI (X). Let u ∈ aprI (X), then there exists a ∈ A such that u ∈ f (a) and f (a) ∩ X 6∈ I. By Proposition 5.5, f (a) ⊆ Rf (u). Since f (a) ∩ X 6∈ I, then Rf (u) ∩ X 6∈ I by Properties of ideal. But u ∈ Rf (u), so u ∈ X 4I = X ∇I . Hence u ∈ X and Rf (u) ∩ X 0 ∈ I. Therefore f (a) ∩ X 0 ∈ I by Properties of ideal and thus u ∈ aprI (X). Consequently, aprI (X) ⊆ aprI (X). So X is soft I-definable.

32

Mustafa 18-35

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

16

(ii)Follows immediately by (i). The following example shows that the converse of the above proposition is not true in general. Example 5.11 Let U = {h1 , h2 , h3 , h4 , h5 } . Let I be an ideal on U and let R be a binary relation on U, defined as follows: I = {{h1 }, {h2 }, {h1 , h2 }, φ} and let fA be a soft set over U defined as follows f (a1 ) = {h1 , h4 }, f (a2 ) = {h4 }, f (a3 ) = {h2 , h3 , h5 }, f (a4 ) = {h1 , h2 , h4 }. Let R be the binary relation induced by fA . Then R(h1 ) = {h1 , h2 , h4 }, R(h2 ) = {h1 , h2 , h3 , h4 , h5 }, R(h3 ) = {h2 , h3 , h5 }, R(h4 ) = {h1 , h2 , h4 }, R(h5 ) = {h2 , h3 , h5 }. Let X = {h2 , h3 , h5 } ⊆ U . So X 0 = {h1 , h4 }. Thus X ∇I = {h3 , h5 }, and X 4I = {h2 , h3 , h5 }. Also, aprI (X) = {h2 , h3 , h5 } , aprI (X) = {h2 , h3 , h5 }. Then X is an R-I-rough set. But X is soft I-definable set.

6. Conclusion In this paper, we have proposed the new concept of soft rough sets via ideal. We presented important properties of soft rough approximations via ideal based on soft approximation spaces via ideal, giving interesting examples. The accuracy measure is one of the ways of characterizing soft rough theory. Our approach makes the accuracy measures higher than the existing approximations. Soft rough relations via ideal were discussed. We researched relationships among soft sets, soft rough sets via ideal and topologies, obtained the structure of soft rough sets via ideal. Furthermore, we examined the relationship between soft rough sets via ideal and rough sets via ideal, and compared these two different models.

References [1] H. Aktas, N. Cagman, Soft sets and soft groups, Inf. Sci. 77(2007) 2726-2735. [2] Z. Bonikowski , E. Bryniarski , U. Wybraniec, Extensions and intentions in the rough set theory, Inf. Sci. 107(1998) 149-167. [3] E. Bryniarski, A calculus of a rough set of the first order, Bull. Pol. Acad. Sci. 16(1989) 71-77. [4] B. Davvaz, Roughness based on fuzzy ideals, Inf. Sci. 176 (2006) 2417- 2437. [5] D. Dubois , H. Prade, Rough fuzzy sets and fuzzy rough sets, Int. J. Gen. Syst. 17(2-3)(1990) 191-209. [6] F. Feng, C. Li, B. Davvaz and M. Irfan Ali, Soft sets combined with fuzzy sets and rough sets:a tentative approach, Soft Comput. 14 (2010) 899-911. [7] F. Feng, X. Liu, F. L. Violeta and J. B. Young, Soft sets and soft rough sets, Inf. Sci. 181 (2011) 1125-1137. [8] F. Feng, Soft rough sets applied to multicriteria group decision making, Ann. Fuzzy Math. Inf. 2 (2011) 69-80.

33

Mustafa 18-35

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

17

[9] J. Jrvinen, On the structure of rough approximations, Fundamenta Informaticae 50(2002) 135-153. [10] F. Karaaslan, Soft Classes and Soft Rough Classes with Applications in Decision Making, Mathematical Problems in Engineering, 2016, ID 1584528, 11 pages. Journal of applied mathematics, 2013, ID 241485, 15 pages. [11] GL. Liu, Generalized rough sets over fuzzy lattices, Inf. Sci. 178 (2008) 1651-1662. [12] JS. Mi, W.Zhang, An axiomatic characterization of a fuzzy generalization of rough sets, Inf. Sci. 160 (2004) 235-249 [13] P. K. Maji, A. R. Roy and R. Biswas, Fuzzy soft sets, J. Fuzzy Math. 9 (2001) 589-602. [14] P. K. Maji, R. Biswas and A. R. Roy, Intuitionistic fuzzy soft sets, J. Fuzzy Math. 9 (2001) 677-692. [15] P. K. Maji, A. R. Roy and R. Biswas, Soft set theory, Comput. Math. Appl.45 (2003) 555562. [16] D. Molodtsov, Soft set theory-First results, Comput. Math. Appl. 37 (1999) 19-31. [17] D. Molodtsov, The theory of soft sets, URSS Publishers, Moscow (in Russian), 2004. [18] Heba I. Mustafa, Soft rough approximation operators on a complete atomic Boolean lattice. Mathematical Problems in Engineering, 2013, Article ID 486321, 11 pages. [19] H. P. Nguyen and V. Kreinovich, Fuzzy logic and its applications in medicine, International Journal of Medical Informatics 62 (2001) 165-173. [20] Z. Pawlak (1991) Rough sets: theoretical aspects of reasoning about data. Kluwer Academic Publishers, Dordrecht. [21] Z. Pawlak , A. Skowron, Rudiments of rough sets, Inf. Sci. 177(2007) 3-27. [22] Z. Pawlak , A. Skowron, Rough sets: some extensions, Inf. Sci. 177(2007) 28-40. [23] DW. Pei, A generalized model of fuzzy rough sets, Int. J. Gen. Syst. 34(2005) 603-613. [24] A. Radzikowska, E. Kerre, Fuzzy rough sets based on residuated lattices. In: Peters JF, Skowron A, Dubois D, Grzymala-Busse JW, Inuiguchi M, Polkowski L (eds) Transactions on rough sets II, LNCS3135,(2004) pp 278-296. [25] M. Shabir, M. I. Ali and T. Shaheen, Another approach to soft rough sets, Knowledge-Based Systems 40 (2013) 72-80. [26] O. A. Tantawy , H. I. Mustafa, On rough approximations via ideal, Inf. Sci. 251(2013) 114-125. [27] QM. Xiao , Li QG, Guo LK, Rough sets induced by ideals in lattices, Inf. Sci. 271(2014) 82-92. [28] W. Xu, J. Ma, S. Y. Wang and G. Hao, Vague soft sets and their properties, Comput. Math. Appl. 59 (2010) 787-794. [29] X. B. Yang, T. Y. Lin, J. Y. Yang, Y. Li and D. J. Yu, Combination of interval valued fuzzy set and soft set, Comput. Math. Appl. 58 (2009) 521-527. [30] Y. Yao, Two views of the theory of rough sets in finite universes, International Journal of Approximate Reasoning 15(1996a)291-317. [31] Y. Yao, T. Lin, Generalization of rough sets using modal logic. Intell. Autom Soft Comput. (1996b) 103-120.

34

Mustafa 18-35

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

18

[32] Y. Yao, Relational interpretations of neighborhood operators and rough set approximation operators, Inf. Sci. 101 (1998a) 239-259. [33] L. A. Zadeh, Fuzzy sets, Inform. Control. 8 (1965) 338-353. [34] XH. Zhang , B. Zhou, P. Li, A general frame for intuitionistic fuzzy rough sets, Inf. Sci. 216(2012) 34-49. [35] L. Zhaowen, Q. Bin, and c. Zhangyong, Soft rough approximation operatoes and related results, Journal of applied mathematics, 2013, ID 241485, 15 pages. [36] W. Zhu, Generalized rough sets based on relations, Inf. Sci. 177 (2007) 4997-5011. [37] W. Zhu, Relationship among basic concepts in covering-based rough sets, Inf. Sci. 179(2009) 2478-2486.

35

Mustafa 18-35

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Stability of C ∗ -ternary quadratic 3-homomorphisms Hossein Piri1 , S. H. Aslani2 , V. Keshavarz2 , Choonkil Park∗3 and Sun Young Jang∗4 1 2

Department of Mathematics, Bonab University, P. O. Box 5551761167, Bonab, Iran

Department of Mathematics, Shiraz University of Technoiogy, P. O. Box 71555-313, Shiraz, Iran 3

Research Institute for Natural Sciences, Hanyang University, Seoul 04763, Republic of Korea Department of Mathematics, University of Ulsan, Ulsan 44610, Republic of Korea

e-mail: [email protected], [email protected], [email protected], [email protected], [email protected] Abstract. In this paper, we define C ∗ -ternary quadratic 3-homomorphisms associated with the quadratic mapping f (x + y) + f (x − y) = 2f (x) + 2f (y), and prove the Hyers-Ulam stability of C ∗ -ternary quadratic 3-homomorphisms.

1. Introduction and preliminaries As it is extensively discussed in [18], the full description of a physical system S implies the knowledge of three basic ingredients: the set of the observables, the set of the states and the dynamics that describes the time evolution of the system by means of the time dependence of the expectation value of a given observable on a given statue. Originally the set of the observables were considered to be a C ∗ -algebra [10]. We say that a functional equation (Q) is stable if any function g satisfying the equation (Q) approximately is near to true solution of (Q). The stability problem of functional equations originated from a question of Ulam [19] concerning the stability of group homomorphisms. Hyers [11] gave a first affirmative partial answer to the question of Ulam for Banach spaces. Hyers’ Theorem was generalized by Aoki [2] for additive mappings and by Th.M. Rassias [17] for linear mappings by considering an unbounded Cauchy difference. The functional equation f (x + y) + f (x − y) = 2f (x) + 2f (y) is called quadratic functional equation. In addition, every solution of the above equation is said to be a quadratic mapping. Czerwik [5] proved the Cauchy-Rassias stability of the quadratic functional equation. Since then, the stability problems of various functional equation have been extensively investigated by a number of authors (for instances, [3, 7]). Ternary algebraic operations were considered in the 19th century by several mathematicians and physicists (see [13]). As an application in physics, the quark model inspired a particular brand of ternary algebraic systems. The so-called Nambu mechanics which has been proposed by Nambu [6] in 1973, is based on such structures. There are also some applications, although still hypothetical, in the fractional quantum Hall effect, the non-standard statistics (the anyons), supersymmetric theories, Yang-Baxter equation, etc ([1, 20]). The comments on physical applications of ternary structures can be found in ([4, 8, 9, 12, 14, 15, 16]). 0

2010 Mathematics Subject Classification. Primary 39B52; 39B82; 46B99; 17A40. Keywords: Hyers-Ulam stability; C ∗ -ternary algebra; quadratic functional equation; C ∗ -ternary quadratic 3-homomorphism. ∗ Corresponding authors. 0

36

Hossein Piri et al 36-41

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Stability of C ∗ -ternary quadratic 3-homomorphisms A ternary algebra is a complex Banach space, equipped with a ternary product (x, y, z) → [x, y, z] of A3 into A, which ish C-linear in ithe houter variables, in the middle variable, and associative in the i hconjugate C-linear i sense that x, y, [z, u, v] = x, [y, z, u]v = [x, y, z], u, v and satisfies k[x, y, z]k ≤ kxkkykkzk. A C ∗ -ternary algebra is a complex Banach space A equipped with a ternary product which is associative and C-linear in the outer variables, conjugate C-linear in the middle variable, and k[x, x, x]k = kxk3 (see [21]). If a C ∗ -ternary algebra (A, [. · .·, ·]) has an identity, that is, an element e ∈ A such that x = [x, e, e] = [e, e, x] for all x ∈ A, then it is routine to verify that A, endowed with xoy := [x, e, y],

x∗ := [e, x, e], is a unital C ∗ -algebra. Conversely,

if (A, o) is a unital C ∗ -algebra, then [x, y, z] := xoy ∗ oz makes A into a C ∗ -ternary algebra. Throughout this paper, let A and B be Banach ternary algebras. A quadratic mapping Q : A → B is called a C ∗ -ternary quadratic homomorphism if Q([x, y, z]) = [Q(x), Q(y), Q(z)] for all x, y, z ∈ A. Definition 1.1. Let A and B be C ∗ -ternary algebras. A quadratic mapping Q : A → B is called a C ∗ -ternary quadratic 3-homomorphism if it satisfies Q([[x1 , y1 , z1 ], [x2 , y2 , z2 ], [x3 , y3 , z3 ]]) = [Q([x1 , x2 , x3 ]), Q([y1 , y2 , y3 ]), Q([z1 , z2 , z3 ])] for all x1 , y1 , z1 , x2 , y2 , z2 , x3 , y3 , z3 ∈ A. In this paper, we prove the Hyers-Ulam stability of C ∗ -ternary quadratic 3-homomorphisms in C ∗ -ternary algebras. 2. Stability of C ∗ -ternary quadratic 3-homomorphisms In this section, we prove the Hyers-Ulam stability of C ∗ -ternary quadratic 3-homomorphisms for the quadratic functional equation Q(x + y) + Q(x − y) = 2Q(x) + 2Q(y). Theorem 2.1. Let f : A → B be a mapping for which there exists a function ϕ : A9 → [0, ∞) such that ∞ X i=0

49i ϕ(

x1 x2 x3 y1 y2 y3 z1 z2 z3 , , , , , , , , ) < ∞, 2i 2i 2i 2i 2i 2i 2i 2i 2i

kf (x + y) + f (x − y) − 2f (x) − 2f (y)k ≤ ϕ(x, y, 0, 0, 0, 0, 0, 0, 0)



f ([[x1 , y1 , z1 ], [x2 , y2 , z2 ], [x3 , y3 , z3 ]]) − [f ([x1 , x2 , x3 ]), f ([y1 , y2 , y3 ]), f ([z1 , z2 , z3 ])]

(2.1) (2.2)

≤ ϕ(x1 , x2 , x3 , y1 , y2 , y3 , z1 , z2 , z3 ) for all x, y, x1 , x2 , x3 , y1 , y2 , y3 , z1 , z2 , z3 ∈ A. Then there exists a unique C ∗ -ternary quadratic 3-homomorphism Q : A → B such that x x kf (x) − Q(x)k ≤ ϕ( e , , 0, 0, 0, 0, 0, 0, 0) 2 2

(2.3)

for all x ∈ A, where ϕ(x e 1 , x2 , x3 , y1 , y2 , y3 , z1 , z2 , z3 ) :=

∞ X

4i ϕ(

i=0

x1 x2 x3 y1 y2 y3 z1 z2 z3 , , , , , , , , ) 2i 2i 2i 2i 2i 2i 2i 2i 2i

for all x1 , x2 , x3 , y1 , y2 , y3 , z1 , z2 , z3 ∈ A. 37

Hossein Piri et al 36-41

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

H. Piri, S. H. Aslani, V. Keshavarz, C. Park, S. Jang Proof. It follows from (2.1) that f (0) = 0. Letting y = x in (2.1), we get kf (2x) − 4f (x)k ≤ ϕ(x, x, 0, 0, 0, 0, 0, 0, 0)

(2.4)

for all x ∈ A. So x x x kf (x) − 4f ( )k ≤ ϕ( , , 0, 0, 0, 0, 0, 0, 0) 2 2 2 for all x ∈ A. Hence

x

l x

4 f ( l ) − 4m f ( m ) ≤ 2 2 ≤

m−1 X i=1 m−1 X i=0

x

i x

4 f ( i ) − 4i+1 f ( i+1 ) 2 2

(2.5)

 x  m−1  x  X x x 4i ϕ i+1 , i+1 , 0, 0, 0, 0, 0, 0, 0 ≤ 49i ϕ i+1 , i+1 , 0, 0, 0, 0, 0, 0, 0 2 2 2 2 i=0

for all nonnegative integers m and l with m > l and all x ∈ A. It follows from (2.5) that the sequence {4n f ( 2xn )} is a Cauchy sequence for all x ∈ A. Since B is complete, the sequence {4n f ( 2xn )} converges. So one can define the mapping Q : A → B by Q(x) = lim 4n f ( n→∞

x ) 2n

for all x ∈ A. Moreover, letting l = 0 and passing the limit m → ∞ in (2.5), we get (2.3). It follows from (2.1) that

x+y x−y x y

kQ(x + y) + Q(x − y) − 2Q(x) − 2Q(y)k = lim 4n f ( n ) + f ( n ) − 2f ( n ) − 2f ( n ) n→∞ 2 2 2 2 x y  x y  ≤ lim 4n ϕ n , n , 0, 0, 0, 0, 0, 0, 0 ≤ lim 49n ϕ n , n , 0, 0, 0, 0, 0, 0, 0 = 0 n→∞ n→∞ 2 2 2 2 and so Q(x + y) + Q(x − y) = 2Q(x) + 2Q(y) for all x, y ∈ A. It follows from (2.2) and the continuity of the ternary product that



Q([[x1 , y1 , z1 ], [x2 , y2 , z2 ], [x3 , y3 , z3 ]]) − [Q([x1 , x2 , x3 ]), Q([y1 , y2 , y3 ]), Q([z1 , z2 , z3 ])]

x1 y1 z1 x2 y2 z2 x3 y3 z3 x1 x2 x3 y1 y2 y3 z1 z2 z3

= lim 49n f ([[ n , n , n ], [ n , n , n ], [ n , n , n ]]) − [f ([ n , n , n ]), f ([ n , n , n ]), f ([ n , n , n ])] n→∞ 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 2 x x x y y y z z z  1 2 3 1 2 3 1 2 3 ≤ lim 49n ϕ n , n , n , n , n , n , n , n , n = 0 n→∞ 2 2 2 2 2 2 2 2 2 and so Q([[x1 , y1 , z1 ], [x2 , y2 , z2 ], [x3 , y3 , z3 ]]) = [Q([x1 , x2 , x3 ]), Q([y1 , y2 , y3 ]), Q([z1 , z2 , z3 ])] for all x1 , x2 , x3 , y1 , y2 , y3 , z1 , z2 , z3 ∈ A. Now, let T : A → B be another quadratic mapping satisfying (2.3). Then we have

x x

kQ(x) − T (x)k = 4n Q( n ) − T ( n ) 2 2

  x x x

x

≤ 4n Q( n ) − f ( n ) + T ( n ) − f ( n ) 2 2 2x x 2 x x  n ≤ 2 · 4 ϕ n , n , 0, 0, 0, 0, 0, 0, 0 ≤ 2 · 49n ϕ n , n , 0, 0, 0, 0, 0, 0, 0 , 2 2 2 2 38

Hossein Piri et al 36-41

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Stability of C ∗ -ternary quadratic 3-homomorphisms which tends to zero as n → ∞ for all x ∈ A. So we can conclude that Q(x) = T (x) for all x ∈ A. This proves the uniqueness of Q. Thus the quadratic mapping Q : A → B is a unique C ∗ -ternary quadratic 3-homomorphism satisfying (2.3).



Corollary 2.2. Let r, θ be nonnegative real numbers with r > 18 and let f : A → B be a mapping satisfying kf (x + y) + f (x − y) − 2f (x) − 2f (y)k ≤ θ(kxkr + kykr ),

(2.6)



f ([[x1 , y1 , z1 ], [x2 , y2 , z2 ], [x3 , y3 , z3 ]]) − [f ([x1 , x2 , x3 ]), f ([y1 , y2 , y3 ]), f ([z1 , z2 , z3 ])]

(2.7)

≤ θ(kx1 kr + kx2 kr + kx3 kr + ky1 kr + ky2 kr + ky3 kr + kz1 kr + kz2 kr + kz3 kr ) for all x, y, x1 , x2 , x3 , y1 , y2 , y3 , z1 , z2 , z3 ∈ A. Then there exists a unique C ∗ -ternary quadratic 3-homomorphism Q : A → B such that kf (x) − Q(x)k ≤

2θ kxkr 2r − 4

for all x ∈ A. Proof. Defining ϕ(x1 , x2 , x3 , y1 , y2 , y3 , z1 , z2 , z3 ) = θ(kx1 kr + kx2 kr + kx3 kr + ky1 kr + ky2 kr + ky3 kr + kz1 kr + kz2 kr + kz3 kr ) in Theorem 2.1, we get the desired result.



Theorem 2.3. Let f : A → B be a mapping for which there exists a function ϕ : A9 → [0, ∞) satisfying (2.1) and (2.2) such that ϕ(x e 1 , x2 , x3 , y1 , y2 , y3 , z1 , z2 , z3 ) :=

∞ X 1 ϕ(2i x1 , 2i x2 , 2i x3 , 2i y1 , 2i y2 , 2i y3 , 2i z1 , 2i z2 , 2i z3 ) < ∞ i 4 i=0

for all x1 , x2 , x3 , y1 , y2 , y3 , z1 , z2 , z3 ∈ A. Then there exists a unique C ∗ -ternary quadratic 3-homomorphisms Q : A → B such that kf (x) − Q(x)k ≤

1 ϕ(x, e x, 0, 0, 0, 0, 0, 0, 0) 4

(2.8)

for all x ∈ A Proof. It follows from (2.4) that 1 1 kf (x) − f (2x)k ≤ ϕ(x, x, 0, 0, 0, 0, 0, 0, 0) 4 4 for all x ∈ A k

m−1 m−1 X 1 X 1 1 1 1 l m j j+1 f (2 x) − f (2 x)k ≤ k f (2 x) − f (2 x)k ≤ ϕ(2j x, 2j x, 0, 0, 0, 0, 0, 0, 0) 4l 4m 4j 4j+1 4j+1 j=l

(2.9)

j=l

for all nonnegative integers m and l with m > l and all x ∈ A. It follows from (2.9) that the sequence {( 41n )f (2n x)} is a Cauchy sequence for all x ∈ A. Since B is complete, the sequence {( 41n )f (2n x)} converges. So one can define the mapping Q : A → B by Q(x) := lim

n→∞

1 f (2n x) 4n

for all x ∈ A. Moreover, letting l = 0 and passing the limit m → ∞ in (2.9), we get (2.8). 39

Hossein Piri et al 36-41

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

H. Piri, S. H. Aslani, V. Keshavarz, C. Park, S. Jang It follows from (2.2) and the continuity of the ternary product that



Q([[x1 , y1 , z1 ], [x2 , y2 , z2 ], [x3 , y3 , z3 ]]) − [Q([x1 , x2 , x3 ]), Q([y1 , y2 , y3 ]), Q([z1 , z2 , z3 ])] 1

= lim 9n f ([[2n x1 , 2n y1 , 2n z1 ], [2n x2 , 2n y2 , 2n z2 ], [2n x3 , 2n y3 , 2n z3 ]]) n→∞ 4

− [f ([2n x1 , 2n x2 , 2n x3 ]), f ([2n y1 , 2n y2 , 2n y3 ]), f ([2n z1 , 2n z2 , 2n z3 ])]  1  ≤ lim 9n ϕ 2n x1 , 2n x2 , 2n x3 , 2n y1 , 2n y2 , 2n y3 , 2n z1 , 2n z2 , 2n z3 n→∞ 4  1  ≤ lim n ϕ 2n x1 , 2n x2 , 2n x3 , 2n y1 , 2n y2 , 2n y3 , 2n z1 , 2n z2 , 2n z3 = 0 n→∞ 4 and so Q([[x1 , y1 , z1 ], [x2 , y2 , z2 ], [x3 , y3 , z3 ]]) = [Q([x1 , x2 , x3 ]), Q([y1 , y2 , y3 ]), Q([z1 , z2 , z3 ])] for all x1 , x2 , x3 , y1 , y2 , y3 , z1 , z2 , z3 ∈ A. The rest of the proof is similar to the proof of Theorem 2.1



Corollary 2.4. Let r, θ be nonnegative real numbers with r < 2 and let f : A → B be a mapping satisfying (2.6) and (2.7). Then there exists a unique C ∗ -ternary quadratic 3-homomorphism Q : A → B such that kf (x) − Q(x)k ≤

2θ kxkr 4 − 2r

for all x ∈ A. Proof. Defining ϕ(x1 , x2 , x3 , y1 , y2 , y3 , z1 , z2 , z3 ) = θ(kx1 kr + kx2 kr + kx3 kr + ky1 kr + ky2 kr + ky3 kr + kz1 kr + kz2 kr + kz3 kr ) in Theorem 2.3, we get the desired result.

 Acknowledgments

S. Y. Jang was supported by 2017 Research fund of University of Ulsan. References [1] V. Abramov, R. Kerner, B. Le Roy, Hypersymmetry: A Z3-graded generalization of supersymmetry, J. Math. Phys. 38 (1997), 1650–1669. [2] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan 2 (1950), 64–66. [3] A. Bodaghi, I. A. Alias, M. Eshaghi Gordji, On the stability of quadratic double centralizers and quadratic multipliers: a fixed point approach, J. Inequal. Appl. 2011 (2011). Article ID 957541. [4] Y. Cho, C. Park, M. Eshaghi Gordji, Approximate additive and quadratic mappings in 2-Banach spaces and related topics, Int. J. Nonlinear Anal. Appl. 3 (2012), No. 2, 75–81. [5] S. Czerwik, On the stability of the quadratic mapping in normed spaces, Abh. Math. Sem. Univ. Hamburg 62 (1992), 59–64. [6] Y. L. Daletskii, L.A. Takhtajan, Leilniz and Lie algebra structures for Nambu algebra, Lett. Math. Phys. 39 (1993), 127–143. [7] M. Eshaghi Gordji, A. Bodaghi, On the stability of quadratic double centralizers on Banach algebras, J. Comput. Anal. Appl. 13 (2011), 724–729. 40

Hossein Piri et al 36-41

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Stability of C ∗ -ternary quadratic 3-homomorphisms [8] M. Eshaghi Gordji, V. Keshavarz, C. Park, S. Jang, Ulam-Hyers stability of 3-Jordan homomorphisms in C ∗ -ternary algebras, J. Comput. Anal. Appl. 22 (2017), 573–578. [9] P. G˘avruta, L. G˘ avruta, A new method for the generalized Hyers-Ulam-Rassias stability, Int. J. Nonlinear Anal. Appl. 1 (2010), No. 2, 11–18. [10] R. Haag, D. Kastler, An algebraic approach to quantum field theory, J. Math. Phys. 5 (1964), 848–861. [11] D. H. Hyers, On the stability of the linear functional equation, Proc. Nat. Acad. Sci. U.S.A. 27 (1941), 222–224. [12] A. Javadian, M. Eshaghi Gordji, M. B. Savadkouhi, Approximately partial ternary quadratic derivations on Banach ternary algebras, J. Nonlinear Sci. Appl. 4 (2011), 60–69. [13] M. Kapranov, I. M. Gelfand, A. Zelevinskii, Discriminants, Resultants and Multi-dimensional Determinants, Birkh¨ auser, Boston, 1994. [14] C. Park, J. Lee, Approximate ternary quadratic derivation on ternary Banach algebras and C ∗ -ternary rings: revisited, J. Nonlinear Sci. Appl. 8 (2015), 218–223. [15] C. Park, A. Najati, Generalized additive functional inequalities in Banach algebras, Int. J. Nonlinear Anal. Appl. 1 (2010), No. 2, 54–62. [16] C. Park, Th. M. Rassias, Isomorphisms in unital C ∗ -algebras, Int. J. Nonlinear Anal. Appl. 1 (2010), No. 2, 1–10. [17] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Am. Math. Soc. 72 (1978), 297–300. [18] G. L. Sewell, Quantum Mechanics and its Emergent Macrophysics. Princeton Univ. Press, Princeton, 2002. [19] S. M. Ulam, Problems in Modern Mathematics, Chapter VI, Science ed., Wiley, New York, 1940. [20] G. L. Vainerman, R. Kerner, On special classes of n-algebras, J. Math. Phys. 37 (1996), 2553–2565. [21] H. Zettl, A characterization of ternary rings of operators, Adv. Math. 48 (1983), 117–143.

41

Hossein Piri et al 36-41

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

ˇ Stability of functional equations in Serstnev probabilistic normed spaces Choonkil Park Research Institute for Natural Sciences, Hanyang University,Seoul 04763, Korea email: [email protected] V. Arasu Department of Mathematics, Adhiyamaan College of Engineering (Autonomous), Hosur-635 109, Tamil Nadu, India email: [email protected] M. Angayarkanni Department of Mathematics, Kandaswami Kandar’s College, P.Velur-638 182, Namakkal, Tamil Nadu, India email: [email protected] Abstract: In this paper, we investigate the uniform version and non-uniform version of the Hyersˇ Ulam stability of the additive functional equation f (3x + y) + f (x + 3y) = 4f (x) + 4f (y) in Serstnev probabilistic normed spaces with a triangle function. AMS Subject Classification: 39B22, 39B52, 39B82, 46S40. Keywords: Hyers-Ulam stability, additive functional equation, probabilistic normed space. 1. Introduction In 1940, Ulam gave a talk before the Mathematics Club of the University of Wisconsin in which he discussed a number of unsolved problems. The stability problem of functional equations originated from a question of Ulam [26] concerning the stability of group homomorphisms. In 1941, Hyers [7] considered the case of approximately additive mappings f : X → Y such that kf (x + y) − f (x) − f (y)k ≤ ε for all x, y ∈ X and for some ε > 0, where X and Y are Banach spaces. Then there exists a unique additive function A : X → Y such that kf (x) − A(x)k ≤ ε for all x ∈ X. Aoki [1] and Rassias [14] provided a generalization of the Hyers theorem for additive and linear mappings, respectively, by allowing the Cauchy difference to be unbounded. Theorem 1.1. ([14]) Let f : X → Y be a mapping from a normed vector space X into a Banach space Y subject to the inequality kf (x + y) − f (x) − f (y)k ≤ ε(kxkp + kykp ) (1.1) for all x, y ∈ X, where ε and p are constants with ε > 0 and p < 1. Then there exists a unique additive mapping A : X → Y defined by A(x) = limn→∞ 2−n f (2n x) is the unique additive mapping which satisfies

42

Choonkil Park et al 42-49

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2ε kxkp 2 − 2p for all x ∈ X. If p < 0 then (1.1) holds for x, y 6= 0 and (1.2) for x 6= 0. kf (x) − A(x)k ≤

(1.2)

The above theorem has provided a lot of influence during the last three decades in the development of a generalization of the Hyers-Ulam stability concept (see [4, 8]). In 1994, a generalization of Rassias theorem was obtained by G˘avruta [6] by replacing the bound ε(kxkp + kykp ) by a general control function ϕ(x, y). During the last three decades a number of papers and research monographs have been published on various generalizations and applications of the Hyers-Ulam stability to a number of functional equations and functions (see [2]–[13], [15]–[22] and [27, 28]). ˇ A P N space wwas first defined by Serstnev in 1963 (see [25]). We recall the definition of probabilistic space given in [23]. Definition 1.2. ([23]) A probabilistic normed space (briefly, P N space) is a quadruple (X, ν, τ, τ ∗), where X is a real vector space, τ and τ ∗ are continuous triangle functions with τ ≤ τ ∗ and ν is a mapping (the probabilistic norm) from V into ∆+ such that for every choice of p and q in V the following hold: (N1) νp = ε0 if and only if p = θ (θ is the null vector in X); (N2) ν−p = νp ; (N3) νp+q ≥ τ (νp , νq ); (N4) νp ≤ τ ∗ (νλp , ν(1−λ)p ) for every λ ∈ [0, 1]. ˇ A P N space is called a Serstnev space if it satisfies (N1), (N3) and the following condition: 

 x ναp (x) = νp |α| holds for every α 6= 0 ∈ R and x > 0. When T is a continuous t-norm such that τ = ΠT and τ ∗ = ΠT ∗ , the P N space (X, ν, τ, τ ∗ ) is called a Menger P N space (briefly, M P N space), and is denoted by (X, ν, τ ). Let (X, ν, τ ) be an M P N space and let {xn } be a sequence in X. Then {xn } is said to be convergent if there exists x ∈ X such that lim ν(xn − x)(t) = 1

n→∞

for all t > 0. In this case x is called the limit of {xn }. The sequence {xn } in M P N space (X, ν, τ ) is called Cauchy if for each ε > 0 and δ > 0, there exists some n0 such that ν(xn − xm )(δ) > 1 − ε for all m, n ≥ n0 . Clearly, every convergent sequence in an M P N space is Cauchy. If each Cauchy sequence is convergent in an M P N space (X, ν, τ ), then (X, ν, τ ) is called a Menger probabiistic Banach space (briefly, M P B space). Recently, the stability of functional equations in P N spaces and M P N spaces has been investigated by some authors; see [5, 24] and references therein. ˇ In this paper, we investigate the stability of additive functional equations in Serstnev probabilistic normed space endowed with ΠM triangle function. 2. Main results ˇ We begin our work with uniform version of the Hyers-Ulam stability in Serstnev P N spaces in which we uniformly approximate a uniform approximate additive mapping.

43

Choonkil Park et al 42-49

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

ˇ Theorem 2.1. Let X be a linear space and (Y, ν, ΠM ) be a Serstnev PB space. Let ϕ : X×X → [0, ∞) be a control function such that ϕ˜n (x, y) = 3−n−1 ϕ(3n x, 3n y)

(x, y ∈ X)

(2.1)

converges to zero. Let f : X → Y be a uniformly approximately additive function with respect to ϕ in the sense that lim ν (f (3x + y) + f (x + 3y) − 4f (x) − 4f (y)) (tϕ(x, y)) = 1

(2.2)

t→∞

uniformly on X × X. Then A(x) := limn→∞ 31n f (3n x) for each x ∈ X exists and defines an additive mapping A : X → Y such that if for some δ > 0, α > 0 ν (f (3x + y) + f (x + 3y) − 4f (x) − 4f (y)) (δϕ(x, y)) > α

(2.3)

for all x, y ∈ X, then ν (A(x) − f (x)) (δ ϕ˜n (x, 0)) > α for all x ∈ X. Proof. Given ε > 0, by (2.2), we can choose some t0 such that ν (f (3x + y) + f (x + 3y) − 4f (x) − 4f (y)) (tϕ(x, y)) > 1 − ε

(2.4)

for all x, y ∈ X and all t ≥ t0 . Subsituting y = 0 in (2.4) , we obtain ν (f (3x) − 3f (x)) (tϕ(x, 0)) > 1 − ε and replacing x by

3n x,

we get

  ν 3−n−1 f (3n+1 x) − 3−n f (3n x) t3−n−1 ϕ(3n x, 0) > 1 − ε.  Allowing to a nonincreasing subequence, if necessary, we assume that 3−n−1 ϕ(3n x, 3n y) is nonincreasing. Thus for each n > m we have   ν 3−m f (3m x) − 3−n f (3n x) t3−m−1 ϕ(3m x, 0) (2.5) ! n−1  X  =ν 3−k f (3k x) − 3−k−1 f (3k+1 x) t3−m−1 ϕ(3m x, 0) k=m

  ≥ ΠM ν 3−m f (3m x) − 3−n f (3n x) , n−1 X

ν



k=m+1 −m





≥ ΠM 1 − ε; ΠM ν 3 ν

n−1 X

3−k f (3k x) − 3−k−1 f (3k+1 x)



!) (t3−m−1 ϕ(3m x, 0))

 f (3m x) − 3−n f (3n x) , 

 3−k f (3k x) − 3−k−1 f (3k+1 x)

!)

)  t3−m−2 ϕ(3m+1 x, 0)

k=m+2

≥1−ε for all x ∈ X. The convergence of (2.1) implies that for given δ > 0 there is n0 ∈ N such that t0 3−n−1 ϕ(3n x, 0) < δ

44

∀n ≥ n0 .

Choonkil Park et al 42-49

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Thus by (2.5) we deduce that ν(3−m f (3m x) − 3−n f (3n x))(δ)

(2.6)

≥ ν(3−m f (3m x) − 3−n f (3n x))(t0 3−m−1 ϕ(3m x, 0)) ≥ 1 −  for each n ≥ n0 . Hence 31n f (3n x) is a Cauchy sequence in Y . Since (Y, ν, ΠM ) is complete, this sequence converges to some A(x) ∈ Y . Therefore, we can define a mapping A : X → Y by A(x) := limn→∞ 31n f (3n x), namely, for each t > 0 and x ∈ X, ν(A(x) − 3−n f (3n x))(t) = 1. Next, let x, y ∈ X. Temporarily fix t > 0 and 0 < ε < 1. Since 31n ϕ (3n x, 0) converges to zero, there is some n1 > n0 such that t0 ϕ (3n x, 0) < t3n+1 for all n > n1 , we have ν (A(3x + y) + A(x + 3y) − 4A(x) − 4A(y)) (t) ≥ ΠM (ΠM (ν(A(3x + y) − 3−n−1 f (3n+1 (3x + y)))(t), ν(A(x + 3y) − 3−n−1 f (3n+1 (x + 3y)))(t), ν4(A(x) − 3n−1 f (3n+1 x))(t) ν4(A(y) − 3n−1 f (3n+1 y))(t), ν(f (3n+1 (3x + y)) + f (3n+1 (x + 3y)) − 4f (3n+1 x) −4f (3n+1 y)))(3n+1 t)) and so we have  lim ν A(3x + y) − 3−n−1 f (3n+1 (3x + y) (t) = 1,  lim ν A(x + 3y) − 3−n−1 f (3n+1 (x + 3y) (t) = 1, n→∞  lim 4ν A(x) − 3−n−1 f (3n+1 x) (t) = 1, n→∞  lim 4ν A(y) − 3−n−1 f (3n+1 y) (t) = 1 n→∞

n→∞

and, by (2.4), for large enough n, we have  ν f (3n+1 (3x + y)) + f (3n+1 (x + 3y)) − 4f (3n+1 x) − 4f (3n+1 y) (3n+1 t) ≥ ν(f (3n+1 (3x + y)) + f (3n+1 (x + 3y)) − 4f (3n+1 x) − 4f (3n+1 y))(t0 ϕ(3n x, 0)) ≥ 1 − . Thus ν (A(3x + y) + A(x + 3y) − 4A(x) − 4A(y)) (t) ≥ 1 −  ∀t > 0, 0 <  < 1. It follows that ν (A(3x + y) + A(x + 3y) − 4A(x) − 4A(y)) (t) = 1 for all t > 0 and by N (1), we have A(3x + y) + A(x + 3y) = 4A(x) + 4A(y). For some positive δ and α, let us assume that (2.3) holds. Let x ∈ X. Setting m = 0 and α = 1 −  in (2.6), we get ν(f (3n x) − 3n f (x))(δ) ≥ α for all positive integers n ≥ n0 . For large enough n, we have ν(f (x) − A(x))(δ3−n−1 ϕ(3n x, 0))  ≥ ΠM ν(f (x) − 3−n f (3n x)), ν(3−n f (3n x) − A(x)) (δ3−n−1 ϕ(3n x, 0)) ≥ α, which implies ν(A(x) − f (x))(δ ϕ˜n (x, 0)) > α, as desired.



45

Choonkil Park et al 42-49

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

ˇ Corollary 2.2. Let X be a linear space and (Y, ν, ΠM ) a Serstnev P B space. Let ϕ : X ×X → [0, ∞) be a control function satisfying (2.2). Let f : X → Y be a uniformly approximately additive function with respect to ϕ. Then there is a unique additive mapping A : X → Y such that lim ν(f (x) − A(x))(tϕ˜n (x, 0)) = 1

(2.7)

n→∞

uniformly on X. Proof. The existence of uniform limit (2.7) immediately follows from Theorem 2.1. It remans to prove the uniqueness assertion. Let S be another additive mapping satisfying (2.7). Fix c > 0. Given  > 0, by (2.7), for T and S, we can find some t0 > 0 such that ν(f (x) − A(x))(tϕ˜n (x, 0)) > 1 − , ν(f (x) − S(x))(tϕ˜n (x, 0)) > 1 −  for all x ∈ X and t ≥ t0 . Fix for some x ∈ X and find some integer n0 such that t0 3−n ϕ(3n+1 x, 0) > c∀n ≥ n0 . Then we have    ν (S(x) − A(x)) (c) ≥ ΠM ν 3−n f (3n x) − A(x) , ν S(x) − 3−n f (3n x) (c) = ΠM {ν (f (3n x) − A(3n x)) , ν (S(3n x) − f (3n x))} (3n c)  ≥ ΠM {ν (f (3n x) − A(3n x)) , ν (S(3n x) − f (3n x))} t0 ϕ 3n+1 x, 0 ≥ 1 − . It follows that ν (S(x) − A(x)) (c) = 1 for all c > 0. Thus A(x) = S(x) for all x ∈ X.



ˇ Now we present a non-uniform version of the Hyers-Ulam theorem in Serstnev P N spaces. ˇ Theorem 2.3. Let X be a linear space. Let (Z, ω, ΠM ) be a Serstnev M P N space. Let ψ : X × X → Z be a function such that for all 0 < α < 3, ω(ψ(3x, 3y))(t) ≥ ω(ψ(x, y))(t)

(2.8)

ˇ for all x, y ∈ X and t > 0. Let (Y, ν, ΠM ) be a Serstnev P B space and let f : X → Y be a ψapproximately additive mapping in the sense that ν(f (3x + y) + f (x + 3y) − 4f (x) − 4f (y))(t) ≥ ω(ψ(x, y))(t)

(2.9)

for each t > 0 and x, y ∈ X. Then there exists a unique additive mapping A : X → Y such that   1 ν(f (x) − A(x))(t) ≥ ω ψ(x, 0)(t) 3 for all x ∈ X and t > 0. Proof. Putting y = 0 in (2.9), we get ν(f (3x) − 3f (x))(t) ≥ ω(ψ(x, 0))(t)

(x ∈ X, t > 0).

(2.10)

Using (2.8) and using induction on n, we obtain ω(ψ(3n x, 3n x))(t) ≥ ω(αn ψ(x, 0))(t)

46

(2.11)

Choonkil Park et al 42-49

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

for all x ∈ X and t > 0. Replacing x by 2n−1 x in (2.10) and using (2.11), we get  ν(f (3n x) − 3f (3n−1 x))(t) ≥ ω (αn−1 ψ(x, 0) (t)

(2.12)

for all x ∈ X and t > 0. It follows from (2.12) that ν(3−n f (3n x) − 3−n+1 f (3n−1 x))(3−n t) ≥ ω and so ν 3

−n

−n+1

n

f (3 x) − 3

n−1

f (3

 x)



αn 3n

   1 ψ(x, 0) (α−n t) α

    1 t ≥ω ψ(x, 0) (t) α

for all n > m ≥ 0, x ∈ X and t > 0. So −n

ν(3

n

f (3 x) − 3

−m

k=m+1 X



f (3 x))

−k

3



m

k

f (3 x) − 3

αm+1 3m+1

−k+1

  t k−1

f (3

n

!  x)

αm+1 3m+1

    1 t ≥ω ψ(x, 0) (t) α

and hence −n

ν(3

n

f (3 x) − 3

−m

    m+1   α 1 f (3 x))(t) ≥ ω ψ(x, 0) t α 3m+1 m

(2.13)

for all n > m ≥ 0, x ∈ X and t > 0. Fix x ∈ X. Since   1 ψ(x, 0) (s) = 1, lim ω s→∞ α 3−n f (3n x) is a Cauchy sequence in (Y, ν, ΠM ). Since (Y, ν, ΠM ) is complete, this sequence converges to some point A(x) ∈ γ. It follows from (2.9) that ν(f (3n (3x + y)) + f (3n (x + 3y)) − 4f (3n x) − 4f (3n y))(t) ≥ ω(ψ(3n x, 3n y))(t) ≥ ω(αn ψ(x, y))(t) ≥ ω(ψ(x, y))(α−n t) and hence ν(3−n f (3n (3x + y)) + 3−n f (3n (x + 3y)) − 3−n 4f (3n x) − 3−n 4f (3n y)  n  3 ≥ ω(ψ(x, y)) t . α

(2.14)

So we have ν (A(3x + y) + A(x + 3y) − 4A(x) − 4A(y)) (t)   ≥ ΠM ΠM ν(A(3x + y) − 3−n f (3n (3x + y))), ν(A(x + 3y) − 3−n f (3n (x + 3y))) (t),  ΠM 4ν(A(x) − 3−n f (3n x)), 4ν(A(y) − 3−n f (3n y)), ν 3−n f (3n (3x + y)) + 3−n f (3n (x + 3y)) − 3−n f (3n x) − 3−n f (3n y)) (t) . By (2.14) and the fact that lim ν(A(z) − 3−n f (3n z)) = 1

n→∞

47

Choonkil Park et al 42-49

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

for all z ∈ X and r > 0, each term on the rignt-hand side tends to 1 as n → ∞. Hence ν(A(3x + y) + A(x + 3y) − 4A(x) − 4T (y))(t) = 1. By (N1), we have A(3x + y) + A(x + 3y) = 4A(x) + 4A(y). Let x ∈ X and t > 0. Using (2.13) with m = 0, we get  ν(A(x) − f (x))(t) ≥ ΠM ν(A(x) − 3−n f (3n x), ν(3−n f (3n x) − f (x)) (t)    1 ≥ ΠM ν(A(x) − 3−n f (3n x), ω ψ(x, 0) (t). 3 Hence 

−n

ν(A(x) − f (x))(t) ≥ ΠM lim ν(A(x) − 3 n→∞   1 ψ(x, 0) (t). ≥ ω 3

n

f (3 x), ω



 1 ψ(x, 0) (t) 3

The uniqueness of A can be proved in a similar manner as in the proof of Corollary 2.2.



References 1. T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan 2 (1950) 64–66. 2. P.W. Cholewa, Remarks on the stability of functional equations, Aequationes Math. 27 (1984) 76–86. 3. S. Czerwik, On the stability of the quadratic mapping in normed spaces, Abh. Math. Sem. Univ. Hamburg. 62 (1992) 59–64. 4. S. Czerwik, Functional Equations and Inequalities in Several Variables, World Scientific Publishing Company, New Jersey, Hong Kong, Singapore, London, 2002. 5. M. Eshaghi Gordji and M.B. Savadkouchi, Approximation of the quadratic and cubic functional equations in RN spaces, Eur. J. Pure Appl. Math. 2 (2009), Article ID 923476, 494–507. 6. P. Gˇ avruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings, J. Math. Anal. Appl. 184 (1994) 431–436. 7. D.H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. 27 (1941) 222–224. 8. D.H. Hyers, G. Isac and Th.M. Rassias, Stability of Functional Equations in Several Variables, Birkh¨ auser, Basel, 1998. 9. G. Isac and Th.M. Rassias, Stability of ψ-additive mappings: Applications to nonlinear analysis, Int. J. Math. Math. Sci. 19 (1996) 219–228. 10. S. Jung, Hyers-Ulam-Rassias Stability of Functional Equations in Mathematical Analysis, Hadronic Press Inc., Palm Harbor, Florida, 2001. 11. S. Jung and T. Kim, A fixed point approach to stability of cubic functional equation, Bol. Soc. Mat. Mexicana 12 (2006) 51–57. 12. Pl. Kannappan, Quadratic functional equation and inner product spaces, Results Math. 27 (1995) 368–372. 13. E. Movahednia, M. Eshaghi Gordji, C. Park and D. Shin, A quadratic functional equation in intuitionistic fuzzy 2-Banach spaces, J. Comput. Anal. Appl. 21 (2016) 761–768. 14. Th.M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 (1978) 297–300. 15. Th.M. Rassias, On the stability of the quadratic functional equation and its applications, Studia Univ. Babes-Bolyai. XLIII (1998) 89–124.

48

Choonkil Park et al 42-49

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

16. Th.M. Rassias, The problem of S.M. Ulam for approximately multiplicative mappings, J. Math. Anal. Appl. 246 (2000) 352–378. 17. Th.M. Rassias, On the stability of functional equations in Banach spaces, J. Math. Anal. Appl. 251 (2000) 264–284. 18. Th.M. Rassias, On the stability of functional equations and a problem of Ulam, Acta Appl. Math. 62 (2000) 23–130. 19. Th.M. Rassias, Functional Equations, Inequalities and Applications, Kluwer Academic Publishers Co., Dordrecht, Boston, London, 2003. ˇ 20. Th.M. Rassias and P. Semrl, On the behaviour of mappings which do not satisfy Hyers-Ulam stability, Proc. Amer. Math. Soc. 114 (1992) 989–993. ˇ 21. Th.M. Rassias and P. Semrl, On the Hyers-Ulam stability of linear mappings, J. Math. Anal. Appl. 173 (1993) 325–338. 22. Th.M. Rassias and K. Shibata, Variational problem of some quadratic functionals in complex analysis, J. Math. Anal. Appl. 228 (1998) 234–253. 23. B. Schweizer and A. Sklar, Probabilistic Metric Spaces, Elsevier, North Holand, New York, 1983. 24. S. Shakeri, R. Saadati, G. Sadeghi and S.M. Vaezpour, Stability of the cubic functional equation in Menger probabilistic normed spaces, J. Appl. Sci. 9 (2009) 1795–1797. ˇ 25. A.N. Serstnev, On the notion of a random normed space, Dokl. Akad. Nauk SSSR 149 (1963) 280–283 (in Russian). 26. S.M. Ulam, Problems in Modern Mathematics, Chapter VI, science Editions., Wiley, New York, 1964. 27. S. Yun, G.A. Anastassiou and C. Park, Additive-quadratic ρ-functional inequalities in β-homogeneous normed spaces, J. Comput. Anal. Appl. 21 (2016) 897–909. 28. S. Yun and C. Park, Quadratic ρ-functional inequalities in non-Archimdean normed spaces, J. Comput. Anal. Appl. 21 (2016) 791–799.

49

Choonkil Park et al 42-49

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

New subclass of analytic functions in conic domains associated with q - Sãlãgean differential operator involving complex order R. Vijaya1 , T. V. Sudharsan2 , M. Govindaraj 3 and S. Sivasubramanian4,∗ 1 Department of Mathematics, S.D.N.B Vaishnav College for women, Chromepet Chennai 600044, Tamil Nadu, India E-Mail: [email protected] 2

Department of Mathematics, SIVET College, Gowrivakkam Chennai 600073, Tamil Nadu, India E-Mail: [email protected] 3,4 Department of Mathematics, University College of Engineering Tindivanam, Anna University Tindivanam 604001, Tamil Nadu, India E-Mail: [email protected] E-Mail: [email protected] *-corresponding author Abstract The main object of this article is to define a new class of analytic functions using q - Sãlãgean differential operator involving complex order. We obtain coefficient estimates and other useful properties for this new class. 2010 Mathematics Subject Classification. Primary 30C45, 33C50; Secondary 30C80. Key Words and Phrases. Analytic functions; Univalent functions; Conic domain, q- calculus.

1

Introduction and Definitions

Let A denote the class of functions having the form f (z) = z +

∞ X

an z n

(1.1)

n=2

which are analytic in the open unit disk U = {z : z ∈ C and |z| < 1}. Further, denote by S, the class of all univalent functions in A. Also, let S ∗ , K, Sp and UCV denote the subclasses of S which are starlike, convex, parabolic starlike and uniformly convex functions respectively. (For more details see [3], [17]). Kanas and Wiśniowska [6] introduced the subclasses of univalent functions called k- uniformly convex functions and k-starlike functions with 0 ≤ k < ∞, and denoted by k − UCV and k − ST respectively. The analytic characterization of these classes are following(for more details one may refer to [5], [7], [8], [9], [10], [11]), [20] 00     zf (z) zf 00 (z) > k 0 , (z ∈ U) (1.2) k − UCV := f ∈ S : < 1 + 0 f (z) f (z) 0   0   zf (z) zf (z) k − ST := f ∈ S : < > k − 1 , (z ∈ U) . (1.3) f (z) f (z) A function f is subordinate to the function g, written as f ≺ g, provided that there is an analytic function w(z) defined on U with w(0) = 0 and |w(z)| < 1 such that f (z) = g[w(z)] for z ∈ U . In particular if the function g is univalent in U then f ≺ g is equivalent to f (0) = g(0) and f (U) ⊂ g(U). For any non-negative integer n , the q-integer number n denoted by [n]q , (See for example [2], [4],[13], [15]) is defined as [n]q =

1 − qn = 1 + q + q 2 + ... + q n−1 , [0]q = 0. 1−q 50

(1.4) R. Vijaya et al 50-57

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

The q-number shifted factorial is defined by [0]q ! = 1 and [n]q ! = [1]q [2]q [3]q · · · [n]q . We have, limq→1− [n]q = n and limq→ 1− [n]q ! = n!. The q-derivative operator or q- difference operator is defined as ∂q f (z) =

f (z) − f (qz) , z ∈ U, where U = {z ∈ C and |z| < 1}. z (1 − q)

(1.5)

It is easy to see that ( z

∂q z = [n]q z

n−1

, ∂q

∞ X

) an z

n

n=1

=

∞ X

[n]q an z n−1

(1.6)

n=1

One can easily verify that ∂q f (z) → f 0 (z) as q → 1− . In general, for a non-integer number t, [t] is defined by 1 − qt . Throughout this paper, we will assume q to be a fixed number between 0 and 1. For f ∈ A, let the [t] = 1−q Sãlãgean q-differential operator ( [2], [4],[13], [15], [19]) be defined by Sq0 f (z) = f (z), Sq1 f (z) = z∂q f (z), Sqm f (z) = z∂q (Sqm−1 f (z)). A simple calculation yields, Sqm f (z) = f (z) ∗ Gq,m (z) where, Gq,m (z) = z +

∞ X

(z ∈ U, m ∈ N ∪ {0} = N0 ),

n [n]m q z

(z ∈ U, m ∈ N0 ).

(1.7)

(1.8)

n=2

Making use of (1.7) and (1.8), the power series of Sqm f (z) for f of the form (1.1) is given by ∞ X

Sqm f (z) = z +

n [n]m q an z

(z ∈ U).

(1.9)

n=2

P∞ P∞ Note that limq→1− Gq,m (z) = z + n=2 nm z n and limq→1− Sqm f (z) = f (z) ∗ (z + n=2 nm z n ), which is the familiar Sãlãgean derivative operator [18]. Motivated by the works of Mahmood and Sokol [15] and Kanas and Yaguchi [12], we define the following class of functions using the theory of q-calculus. Definition 1. Let 0 ≤ k < ∞, γ ∈ C \ 0, q ∈ (0, 1) and m ∈ N0 . A function f ∈ A is the class Sq (k, γ, m), if it satisfies the condition !) ! ( 1 S m+1 f (z) 1 Sqm+1 f (z) q − 1 > k − 1 (1.10) < 1+ , (z ∈ U). γ γ Sqm f (z) Sqm f (z) Geometric Interpretation Sqm+1 f (z) takes all values in the conic domain Ωk,γ = pk,γ (U) Sqm f (z) = γΩk + (1 − γ), where Ωk = {u + iv : u2 > k 2 (u − 1)2 + k 2 v 2 } or equivalently

A function f ∈ A is in the class Sq (k, γ, m) if and only if such thatΩk,γ

Sqm+1 f (z) ≺ pk,γ (z), Ωk,γ = pk,γ (U). Sqm f (z)

(1.11)

The boundary ∂Ωk,γ of the above set becomes the imaginary axis when k √ = 0,  2  while hyperbolic when 0 < k < 1. In 2 2γ z this case 0 ≤ k < 1, we have pk,γ (z) = 1 + 1−k sinh arccos k arctanh 2 π  √ 2 1+√z (z ∈ U). For k = 1, the boundary ∂Ωk,γ , becomes a parabola and pk,γ (z) = 1 + π2γ2 1− (z ∈ U). It is an ellipse z   u(z) √ √ R γ t z−√ t π dx √ √ when k > 1 and in this case pk,γ (z) = 1 + k2γ−1 sin 2κ(t) + (0 < 2 −1 ), with u(z) = 2 2 2 0 k 1− tz 1−x 1−t x 0

(t) t < 1, z ∈ U), where t is chosen such that k = cosh πκ 4κ(t) , and κ(t) is Legendre’s complete elliptic integral of the first kind and κ0 (t) complementary integral of κ(t). Moreover , pk,γ (z)(U) is convex univalent in U [ see [6], [8], [13]]. (k + γ) All of these curves have the vertex at the point . Therefore the domain Ωk,γ is elliptic for k > 1, hyperbolic (k + 1) when 0 < k < 1, parabolic for k = 1 and right half plane when k = 0, symmetric with respect to real axis. Because pk,γ (U) = Ωk,γ , the functions pk,γ play the role of extremal functions for several problems in this class Sq (k, γ, m).

51

R. Vijaya et al 50-57

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

Preliminary Lemmas

In the present investigation, we also need the following lemmas. P∞ P∞ Lemma 1. [16] Let p(z) = n=1 pn z n ≺ F (z) = n=1 dn z n in C. If F (z) is convex univalent in U, then (2.1)

|pn | ≤ |d1 |, (n ≥ 1). Lemma 2. [5] Let 0 ≤ k < ∞ be fixed and pk,γ be the Riemann map of U onto Ωk,γ . If

(2.2)

pk,γ (z) = 1 + Q1 z + Q2 z 2 + · · · (z ∈ U), then

 2γA2       1 − k2 Q1 = 8γ   π2     2

0 ≤ k < 1,

π2 γ √ 4(k −1)κ2 (t) t(1+t)

and

(2.3)

k = 1, k > 1,

 2 (A + 2)   Q1    3  2 Q1 Q2 = 3     (4κ2 (t)(t2 + 6t + 1) − π 2 )   √ Q1  24κ2 (t) t(1 + t)

0 ≤ k < 1, (2.4)

k = 1, k > 1,

where

2 arccos k, π and κ(t) is the complete elliptic integral of the first kind(for details see [1]). A=

3

Properties of the class Sq (k, γ, m)

In this section, we discuss certain sufficient condition for a class of functions f to be in the class Sq (k, γ, m). Theorem 1. Let f ∈ A be given by (1.1). If the inequality ∞ X 

(3.1)

[n]m q ((k + 1)([n]q − 1) + |γ|) |an | < |γ|,

n=2

holds true for some k (0 ≤ k < ∞), m ∈ N0 and γ ∈ C \ 0, then f ∈ Sq (k, γ, m). Proof. In view of definition (1.10), it suffices to prove that ( 1 k Sqm+1 f (z) − 1 − < m γ Sq f (z) γ

Sqm+1 f (z) −1 Sqm f (z)

!) < 1.

We have, k γ

( S m+1 f (z) 1 q − 1 − < m Sq f (z) γ

!) Sqm+1 f (z) −1 ≤ Sqm f (z) =
= x − [x] ∈ [0, 1) denote the fractional part of x. We recall the following facts about Bernoulli functions Bm (< x >): (a) for m ≥ 2, ∞ X e2πinx Bm (< x >) = −m! , (1.15) (2πin)m n=−∞,n6=0

(b) for m = 1, −

∞ X n=−∞,n6=0

e2πinx = 2πin



B1 (< x >), for x ∈ Zc , 0, for x ∈ Z,

(1.16)

where Zc = R − Z. In this paper, we will study three types of sums of products of oredered Bell and Genocchi functions, and derive their Fourier expansions. Further, we will express those functions in terms of Bernoulli functions as follows: Pm−1 (1) αm (< x >) = k=0 bk (< x >)Gm−k (< x >), (m ≥ 2);

59

TAEKYUN KIM et al 58-72

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, D.V. Dolgy

(2) βm (< x >) =

Pm−1

(3) γm (< x >) =

Pm−1

1 k=0 k!(m−k)! bk (< x >)Gm−k (< x >), 1 k=1 k(m−k) bk (< x >)Gm−k (< x >),

3

(m ≥ 2); (m ≥ 2).

For elementary facts on Fourier analysis and some related recent works, the reader may refer to [1,8,22]) and [9,10,14,15], respectively.

2. Fourier series of functions of the first type In this section, we will derive the Fourier series of sums of products of oredered Bell and Genocchi functions of the first type. Let αm (x) =

m−1 X

bk (x)Gm−k (x), (m ≥ 2).

(2.1)

k=0

Pm−1 Then we will consider the function αm (< x >) = k=0 bk (< x >)Gm−k (< x >), (m ≥ 2) defined on R, which is periodic with period 1. The Fourier series of αm (< x >) is ∞ X

2πinx A(m) , n e

(2.2)

n=−∞

where A(m) n

1

Z

αm (< x >)e−2πinx dx

= 0

(2.3)

1

Z =

αm (x)e

−2πinx

dx.

0

Before proceeding further, we need to observe the following. 0 αm (x) =

m−1 X

{kbk−1 (x)Gm−k (x) + (m − k)bk (x)Gm−k−1 (x)}

k=0

=

m−1 X

kbk−1 (x)Gm−k (x) +

k=1

=

m−2 X

(m − k)bk (x)Gm−k−1 (x)

k=0

m−2 X

(k + 1)bk (x)Gm−1−k (x) +

k=0

m−2 X

(2.4)

(m − k)bk (x)Gm−1−k (x)

k=0

= (m + 1)

m−2 X

bk (x)Gm−1−k (x)

k=0

= (m + 1)αm−1 (x). From this, we have 

αm+1 (x) m+2

0 = αm (x),

(2.5)

and Z

1

αm (x)dx = 0

1 (αm+1 (1) − αm+1 (0)). m+2

60

(2.6)

TAEKYUN KIM et al 58-72

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

Fourier series of sums of products of ordered Bell and Genocchi functions

For m ≥ 2, we put ∆m = αm (1) − αm (0). Then we have ∆m = αm (1) − αm (0) =

m−1 X

(bk (1)Gm−k (1) − bk Gm−k )

k=0

=

m−1 X

((2bk − δk,0 )(−Gm−k + 2δm−1,k ) − bk Gm−k )

k=0

=

m−1 X

(−3bk Gm−k + 4bk δm−1,k + δk,0 Gm−k − 2δk,0 δm−1,k )

(2.7)

k=0

= −3

m−1 X

bk Gm−k + 4bm−1 + Gm − 2δm,1

k=0

= −3

m−2 X

bk Gm−k + bm−1 + Gm .

k=0

Note that αm (0) = αm (1) ⇐⇒ ∆m = 0,

(2.8)

1 ∆m+1 m+2 m−1 X 1 (−3 bk Gm+1−k + bm + Gm+1 ). = m+2

(2.9)

and 1

Z

αm (x)dx = 0

k=0

(m)

We are now ready to determine the Fourier coefficients An . Case 1 : n 6= 0. Z 1 A(m) = αm (x)e−2πinx dx n 0

=−

1 1 1  αm (x)e−2πinx 0 + 2πin 2πin

m+1 1 (αm (1) − αm (0)) + =− 2πin 2πin 1 m + 1 (m−1) A − ∆m . = 2πin n 2πin From this by induction on m we can deduce A(m) =− n

1

Z

0 αm (x)e−2πinx dx

0

Z

(2.10)

1 −2πinx

αm−1 (x)e

dx

0

m−1 1 X (m + 2)j ∆m−j+1 . m + 2 j=1 (2πin)j

(2.11)

Case 2: n = 0. (m)

A0

Z =

1

αm (x)dx = 0

1 ∆m+1 . m+2

(2.12)

αm (< x >), (m ≥ 1) is piecewise C ∞ . In addition, αm (< x >) is continuous for those integers (m ≥ 2) with ∆m = 0 and discontinuous with jump discontinuities at integers for those integers (m ≥ 2) with

61

TAEKYUN KIM et al 58-72

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, D.V. Dolgy

5

∆m 6= 0. Assume first that m is an integer m ≥ 2 with ∆m = 0. Then αm (0) = αm (1). Hence αm (< x >) is piecewise C ∞ , and continuous. Thus, the Fourier series of αm (< x >) converges uniformly to αm (< x >), and αm (< x >)  m−1 X (m + 2)j 1 − ∆m−j+1  e2πinx m + 2 j=1 (2πin)j n=−∞,n6=0    m−1  ∞ 2πin X 1 1 X m+2 e  = ∆m+1 + ∆m−j+1 −j! m+2 m + 2 j=1 j (2πin)j ∞ X

1 = ∆m+1 + m+2



(2.13)

n=−∞,n6=0

=

 m−1  1 1 X m+2 ∆m+1 + ∆m−j+1 Bj (< x >) m+2 m + 2 j=2 j  B1 (< x >), for x ∈ Zc , + ∆m × 0, for x ∈ Z.

We now state our first result. Theorem 2.1. For each integer l, with l ≥ 2, we put ∆l = −3

l−2 X

bk Gl−k + bl−1 + Gl .

(2.14)

k=0

AssumePthat ∆m = 0, for an integer m ≥ 2. Then we have the following. m−1 (a) k=0 bk (< x >)Gm−k (< x >) has the Fourier series expansion m−1 X

bk (< x >)Gm−k (< x >)

k=0

1 ∆m+1 + = m+2

∞ X n=−∞,n6=0



 m−1 X (m + 2)j 1 − ∆m−j+1  e2πinx , m + 2 j=1 (2πin)j

(2.15)

for all x ∈ R, where the convergence is uniform. (b) m−1 X

bk (< x >)Gm−k (< x >)

k=0

 m−1  1 1 X m+2 = ∆m+1 + ∆m−j+1 Bj (< x >), m+2 m + 2 j=2 j

(2.16)

for all x ∈ R, where Bj (< x >) is the Bernoulli function. Assume next that ∆m 6= 0, for an integer m ≥ 2. Then αm (0) 6= αm (1). Thus αm (< x >) is piecewise C ∞ , and discontinuous with jump discontinuities at integers. The Fourier series of αm (< x >) converges pointwise to αm (< x >), for x ∈ Zc , and converges to 1 1 (2.17) (αm (0) + αm (1)) = αm (0) + ∆m , 2 2 for x ∈ Z. We can now state our second result.

62

TAEKYUN KIM et al 58-72

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

Fourier series of sums of products of ordered Bell and Genocchi functions

Theorem 2.2. For each integer l, with l ≥ 2, we let ∆l = −3

l−2 X

(2.18)

bk Gl−k + bl−1 + Gl .

k=0

Assume that ∆m 6= 0, for an integer m ≥ 2. Then we have the following. (a)   m−1 ∞ X (m + 2)j X 1 1 − ∆m−j+1  e2πinx ∆m+1 + m+2 m + 2 j=1 (2πin)j n=−∞,n6=0  Pm−1 c k=0 bk (< x >)Gm−k (< x >), for x ∈ Z , Pm−1 = 1 for x ∈ Z. k=0 bk Gm−k + 2 ∆m ,

(2.19)

(b)  m−1  1 1 X m+2 ∆m−j+1 Bj (< x >) ∆m+1 + j m+2 m + 2 j=1 =

m−1 X

(2.20)

c

bk (< x >)Gm−k (< x >), for x ∈ Z ;

k=0

 m−1  1 1 X m+2 ∆m+1 + ∆m−j+1 Bj (< x >) j m+2 m + 2 j=2 =

m−1 X k=0

(2.21)

1 bk Gm−k + ∆m , x ∈ Z. 2

3. Fourier series of functions of the second type Let βm (x) =

Pm−1

1 k=0 k!(m−k)! bk (x)Gm−k (x),

βm (< x >) =

m−1 X k=0

(m ≥ 2). Then we will investigate the function

1 bk (< x >)Gm−k (< x >), (m ≥ 2), k!(m − k)!

(3.1)

defined on R, which is periodic with period 1. The Fourier series of βm (< x >) is ∞ X

Bn(m) e2πinx ,

(3.2)

n=−∞

where Bn(m)

Z

1

βm (< x >)e−2πinx dx

= 0

Z =

(3.3)

1 −2πinx

βm (x)e

dx.

0

63

TAEKYUN KIM et al 58-72

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, D.V. Dolgy

7

Before proceeding further, we need to notice the following. 0 βm (x)

=

m−1 X k=0

=

m−1 X k=1

=

m−2 X 1 1 bk−1 (x)Gm−k (x) + bk (x)Gm−k−1 (x) (k − 1)!(m − k)! k!(m − k − 1)! k=0

m−2 X k=0

 k m−k bk−1 (x)Gm−k (x) + bk (x)Gm−k−1 (x) k!(m − k)! k!(m − k)!

(3.4)

m−2 X 1 1 bk (x)Gm−1−k (x) + bk (x)Gm−1−k (x) k!(m − 1 − k)! k!(m − 1 − k)! k=0

= 2βm−1 (x). From this, we note that 

βm+1 (x) 2

0 (3.5)

= βm (x),

and Z

1

βm (x)dx = 0

1 (βm+1 (1) − βm+1 (0)). 2

(3.6)

For m ≥ 2, we set Ωm = βm (1) − βm (0) =

m−1 X k=0

=

m−1 X k=0

=

m−1 X k=0

= −3

1 (bk (1)Gm−k (1) − bk Gm−k ) k!(m − k)! 1 ((2bk − δk,0 )(−Gm−k + 2δm−1,k ) − bk Gm−k ) k!(m − k)! 1 (−3bk Gm−k + 4bk δm−1,k + δk,0 Gm−k − 2δk,0 δm−1,k ) k!(m − k)!

m−1 X k=0

= −3

m−2 X k=0

(3.7)

1 4 1 2 bk Gm−k + bm−1 + Gm − δm,1 k!(m − k)! (m − 1)! m! m! 1 1 1 bk Gm−k + bm−1 + Gm . k!(m − k)! (m − 1)! m!

From this, we see that βm (0) = βm (1) ⇐⇒ Ωm = 0,

(3.8)

and Z

1

βm (x)dx = 0

1 Ωm+1 . 2

(3.9)

(m)

Next, we want to determine the Fourier coefficients Bn .

64

TAEKYUN KIM et al 58-72

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

Fourier series of sums of products of ordered Bell and Genocchi functions

Case 1: n 6= 0. 1

Z

Bn(m)

βm (x)e−2πinx dx

= 0

=−

1 1  1 βm (x)e−2πinx 0 + 2πin 2πin

1 2 =− (βm (1) − βm (0)) + 2πin 2πin 2 1 = B (m−1) − Ωm , 2πin n 2πin from which by induction we have Bn(m) = −

m−1 X j=1

1

Z

0 βm (x)e−2πinx dx

0 Z 1

(3.10) βm−1 (x)e

−2πinx

dx

0

2j−1 Ωm−j+1 . (2πin)j

(3.11)

1 Ωm+1 . 2

(3.12)

Case 2: n = 0. (m) B0

Z =

1

βm (x)dx = 0

βm (< x >), (m ≥ 2) is piecewise C ∞ . Moreover, βm (< x >) is continuous for those integers m ≥ 2 with Ωm = 0 and discontinuous with jump discontinuities at integers for those integers m ≥ 2 with Ωm 6= 0. Assume first that m is an integer m ≥ 2 with Ωm = 0. Then βm (0) = βm (1). Hence βm (< x >) is piecewise C ∞ , and continuous. Thus the Fourier series of βm (< x >) converges uniformly to βm (< x >), and   ∞ m−1 X X 2j−1 1 −  e2πinx βm (< x >) = Ωm+1 + Ω j m−j+1 2 (2πin) j=1 n=−∞,n6=0   m−1 ∞ 2πinx X 2j−1 X e 1  (3.13) Ωm−j+1 −j! = Ωm+1 + j 2 j! (2πin) j=1 n=−∞,n6=0

1 = Ωm+1 + 2

m−1 X j=2

2

j−1

j!

 Ωm−j+1 Bj (< x >) + Ωm ×

B1 (< x >), for x ∈ Zc , 0, for x ∈ Z.

We are now ready to state our first result. Theorem 3.1. For each integer l ≥ 2, we let Ωl = −3

l−2 X k=0

1 1 1 bk Gl−k + bl−1 + Gl . k!(l − k)! (l − 1)! l!

(3.14)

AssumePthat Ωm = 0, for an integer m ≥ 2. Then we have the following. m−1 1 (a) k=0 k!(m−k)! bk (< x >)Gm−k (< x >) has the Fourier series expansion m−1 X

1 bk (< x >)Gm−k (< x >) k!(m − k)! k=0   ∞ m−1 X X 2j−1 1 −  e2πinx , = Ωm+1 + Ω j m−j+1 2 (2πin) j=1

(3.15)

n=−∞,n6=0

65

TAEKYUN KIM et al 58-72

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, D.V. Dolgy

9

for all x ∈ R, where the convergence is uniform. (b) m−1 X k=0

1 bk (< x >)Gm−k (< x >) k!(m − k)!

m−1 X 2j−1 1 = Ωm+1 + Ωm−j+1 Bj (< x >), 2 j! j=2

(3.16)

for all x ∈ R, where Bj (< x >) is the Bernoulli function. Assume next that Ωm 6= 0, for an integer m ≥ 2. Then βm (0) 6= βm (1). Thus βm (< x >) is piecewise C ∞ , and discontinuous with jump discontinuities at integers. The Fourier series of βm (< x >) converges pointwise to βm (< x >), for x ∈ Zc , and converges to 1 1 (3.17) (βm (0) + βm (1)) = βm (0) + Ωm , 2 2 for x ∈ Z. Now, we are ready to state our second result. Theorem 3.2. For each integer l, with l ≥ 2, we let Ωl = −3

l−2 X k=0

1 1 1 bk Gl−k + bl−1 + Gl . k!(l − k)! (l − 1)! l!

Assume that Ωm 6= 0, for an integer m ≥ 2. Then we have the following. (a)   ∞ m−1 X X 2j−1 1 −  e2πinx Ωm+1 + Ω j m−j+1 2 (2πin) j=1 n=−∞,n6=0 ( Pm−1 1 c k!(m−k)! bk (< x >)Gm−k (< x >), for x ∈ Z , Pk=0 = m−1 1 1 for x ∈ Z. k=0 k!(m−k)! bk Gm−k + + 2 Ωm ,

(3.18)

(3.19)

(b) m−1 X 2j−1 1 Ωm+1 + Ωm−j+1 Bj (< x >) 2 j! j=1

=

m−1 X k=0

(3.20)

1 bk (< x >)Gm−k (< x >), k!(m − k)!

for x ∈ Zc ; m−1 X 2j−1 1 Ωm+1 + Ωm−j+1 Bj (< x >) 2 j! j=2

=

m−1 X k=0

(3.21)

1 1 bk Gm−k + Ωm , k!(m − k)! 2

for x ∈ Z.

66

TAEKYUN KIM et al 58-72

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

Fourier series of sums of products of ordered Bell and Genocchi functions

4. Fourier series of functions of the third type Let γm (x) =

Pm−1

1 k=1 k(m−k) bk (x)Gm−k (x),

γm (< x >) =

m−1 X k=1

(m ≥ 2). Then we will consider the function

1 bk (< x >)Gm−k (< x >), (m ≥ 2), k(m − k)

(4.1)

defined on R, which is periodic with period 1. The Fourier series of γm (< x >) is ∞ X Cn(m) e2πinx ,

(4.2)

n=−∞

where Cn(m) =

Z

1

γm (< x >)e−2πinx dx

0

Z =

(4.3)

1 −2πinx

γm (x)e

dx.

0

Before proceeding further, we would like to observe the following. 0 γm (x) =

m−1 X k=1

m−1 X 1 1 bk−1 (x)Gm−k (x) + bk (x)Gm−k−1 (x) m−k k k=1

m−2

m−2 X

X 1 1 bk (x)Gm−1−k (x) + bk (x)Gm−1−k (x) m−1−k k k=1 k=0  m−2 X 1 1 1 = + bk (x)Gm−1−k (x) + Gm−1 (x) m−1−k k m−1

=

(4.4)

k=1

= (m − 1)

m−2 X k=1

1 1 bk (x)Gm−1−k (x) + Gm−1 (x) k(m − 1 − k) m−1

1 Gm−1 (x). m−1 1 0 (x) = (m − 1)γm−1 (x) + m−1 Gm−1 (x), and from this, we see that Thus we have γm    0 1 1 γm+1 (x) − Gm+1 (x) = γm (x), m m(m + 1) and Z 1 γm (x)dx = (m − 1)γm−1 (x) +

(4.5)

0

= = = =

 1 1 1 γm+1 (x) − Gm+1 (x) m m(m + 1) 0  1 1 γm+1 (1) − γm+1 (0) − (Gm+1 (1) − Gm+1 (0) m m(m + 1)  1 1 γm+1 (1) − γm+1 (0) − (−2Gm+1 (0) + 2δm,0 ) m m(m + 1)  1 2 Gm+1 . γm+1 (1) − γm+1 (0) + m m(m + 1)

67

(4.6)

TAEKYUN KIM et al 58-72

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, D.V. Dolgy

11

For m ≥ 2, we put Λm = γm (1) − γm (0) =

m−1 X k=1

=

m−1 X k=1

=

m−1 X k=1

= −3

1 (bk (1)Gm−k (1) − bk Gm−k ) k(m − k) 1 ((2bk − δk,0 )(−Gm−k + 2δm−1,k ) − bk Gm−k ) k(m − k)

(4.7)

1 (−3bk Gm−k + 4bk δm−1,k + δk,0 Gm−k − 2δk,0 δm−1,k ) k(m − k)

m−1 X k=1

4 1 bk Gm−k + bm−1 . k(m − k) m−1

Then γm (0) = γm (1) ⇐⇒ Λm = 0,

(4.8)

and Z

1

 2 1 Λm+1 + Gm+1 . m m(m + 1)

γm (x)dx = 0

(4.9)

(m)

Now, we are going to determine the Fourier coefficients Cn . For this, we first observe that, for l ≥ 2, ( P Z 1 l−1 Gl−k+1 2 k=1 (l)k−1 , for n 6= 0, (2πin)k Gl (x)e−2πinx dx = (4.10) 2Gl+1 − l+1 , for n = 0. 0 Case 1: n 6= 0.

Cn(m) =

1

Z

γm (x)e−2πinx dx

0

=−

1 1 [γm (x)e−2πinx ]10 + 2πin 2πin

Z

1

0 γm (x)e−2πinx dx Z 1 (m − 1)γm−1 (x) + 0

1 1 =− (γm (1) − γm (0)) + 2πin 2πin 0 m − 1 (m−1) 1 2 = Cn − Λm + Θm , 2πin 2πin 2πin(m − 1) Pm−2 k−1 Gm−k where Θm = k=1 (m−1) . From the recurrence relation (2πin)k Cn(m) =

 1 Gm−1 (x) e−2πinx dx m−1

1 2 m − 1 (m−1) Cn − Λm + Θm , 2πin 2πin 2πin(m − 1)

(4.11)

(4.12)

by induction we can show that Cn(m) = −

m−1 X j=1

m−1 X (m − 1)j−1 (m − 1)j−1 Λ + 2 Θm−j+1 . m−j+1 j (2πin) (2πin)j (m − j) j=1

68

(4.13)

TAEKYUN KIM et al 58-72

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12

Fourier series of sums of products of ordered Bell and Genocchi functions

We note here that m−1 X j=1

=

(m − 1)j−1 Θm−j+1 (2πin)j (m − j)

m−2 X j=1

=

m−2 X j=1

=

m−1 X s=2

=

m−j−1 X (m − 1)j+k−2 Gm−j−k+1 1 m−j (2πin)j+k k=1

1 m−j

m−1 X

(m − 1)s−2 Gm−s+1 (2πin)s s=j+1

(4.14)

s−1 (m − 1)s−2 Gm−s+1 X 1 (2πin)s m−j j=1

m−1 1 X (m)s Gm−s+1 (Hm−1 − Hm−s ). m s=1 (2πin)s m − s + 1

Putting everything altogether, we have Cn(m)

  m−1 Gm−s+1 1 X (m)s =− (Hm−1 − Hm−s ) . Λm−s+1 − 2 m s=1 (2πin)s m−s+1

(4.15)

Case 2: n = 0. (m)

C0

Z =

1

γm (x)dx = 0

 1 2 Λm+1 + Gm+1 . m m(m + 1)

(4.16)

γm (< x >), (m ≥ 2) is piecewise C ∞ . Moreover, γm (< x >) is continuous for those integers m ≥ 2 with Λm = 0, and discontinuous with jump discontinuities at integers for those integers m ≥ 2 with Λm 6= 0. Assume first that Λm = 0. Then γm (0) = γm (1). Hence γm (< x >) is piecewise C ∞ , and continuous. Thus the Fourier series of γm (< x >) converges uniformly to γm (< x >), and γm (< x >)   1 2 Gm+1 = Λm+1 + m m(m + 1) (  ) ∞ m−1 X 1 X (m)s 2Gm−s+1 − + Λm−s+1 − (Hm−1 − Hm−s ) e2πinx m s=1 (2πin)s m−s+1 n=−∞,n6=0   2 1 Λm+1 + Gm+1 = m m(m + 1)       m−1 ∞ 2πinx X 1 X m 2Gm−s+1 e  + Λm−s+1 − (Hm−1 − Hm−s ) −s! m s=1 s m−s+1 (2πin)s n=−∞,n6=0   1 2 = Λm+1 + Gm+1 m m(m + 1)  m−1    1 X m 2Gm−s+1 + Λm−s+1 − (Hm−1 − Hm−s ) Bs (< x >) m s=2 s m−s+1  B1 (< x >), for x ∈ Zc , + Λm × 0, for x ∈ Z.

69

(4.17)

TAEKYUN KIM et al 58-72

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, D.V. Dolgy

13

We are now ready to state our first result.

Theorem 4.1. For each integer l, with l ≥ 2, we let Λl = −3

l−1 X k=1

1 4 bk Gl−k + bl−1 . k(l − k) l−1

(4.18)

AssumePthat Λm = 0, for an integer m ≥ 2. Then we have the following. m−1 1 bk (< x >)Gm−k (< x >) has the Fourier series expansion (a) k=1 k(m−k) m−1 X

1 bk (< x >)Gm−k (< x >) k(m − k) k=1   2 1 Λm+1 + Gm+1 = m m(m + 1) ( )  ∞ m−1 X 1 X (m)s 2Gm−s+1 − + (Hm−1 − Hm−s ) e2πinx , Λm−s+1 − m s=1 (2πin)s m−s+1

(4.19)

n=−∞,n6=0

for all x ∈ R, where the convergence is uniform. (b) m−1 X

1 bk (< x >)Gm−k (< x >) k(m − k) k=1  m−1    m 2Gm−s+1 1 X Λm−s+1 − (Hm−1 − Hm−s ) Bs (< x >), = m s m−s+1

(4.20)

s=0,s6=1

for all x ∈ R, where Bs (< x >) is the Bernoulli function.

Assume next that m is an integer ≥ 2 with Λm 6= 0. Then γm (0) 6= γm (1). Hence γm (< x >) is piecewise C ∞ , and discontinuous with jump discontinuities at integers. Then the Fourier series of γm (< x >) converges pointwise to γm (< x >), for x ∈ Zc , and converges to 1 1 (γm (0) + γm (1)) = γm (0) + Λm , 2 2

(4.21)

for x ∈ Z. Now, we are ready to state our second result.

Theorem 4.2. For each integer l, with l ≥ 2, we let Λl = −3

l−1 X k=1

1 4 bk Gl−k + bl−1 . k(l − k) l−1

(4.22)

Assume that Λm 6= 0, for an integer m ≥ 2. Then we have the following.

70

TAEKYUN KIM et al 58-72

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14

Fourier series of sums of products of ordered Bell and Genocchi functions

(a)  2 Gm+1 m(m + 1) (  m−1 ∞ X 1 X (m)s Λm−s+1 − + − m s=1 (2πin)s n=−∞,n6=0 ( Pm−1 1 k=1 k(m−k) bk (< x >)Gm−k (< x >), Pm−1 = 1 1 k=0 k(m−k) bk Gm−k + 2 ∆m ,

1 m



Λm+1 +

) 2Gm−s+1 e2πinx (Hm−1 − Hm−s ) m−s+1

(4.23)

for x ∈ Zc , for x ∈ Z.

(b)   m−1   1 X m 2Gm−s+1 (2πin)s Λm−s+1 − (Hm−1 − Hm−s ) Bs (< x >) m s=0 s m−s+1 =

m−1 X k=1

1 m

m−1 X s=0,s6=1

m−1 X k=0

(4.24)

1 bk (< x >)Gm−k (< x >), for x ∈ Zc ; k(m − k)    m 2Gm−s+1 Λm−s+1 − (Hm−1 − Hm−s ) Bs (< x >) s m−s+1 (4.25)

1 1 bk Gm−k + ∆m , x ∈ Z. k(m − k) 2

References 1. M. Abramowitz, I. A. Stegun, Handbook of Mathematical Functions, Dover, New York, 1970. 2. S. Araci, E. Sen, M. Acikgoz, Theorems on Genocchi polynomials of higher order arising from Genocchi basis, Taiwanese J. of Math., 18(2014), no.2, 473-482. 3. A. Cayley, On the analytical forms called trees, Second part, Philosophical Magazine, Series IV 18 (1859), no. 121, 374–378. 4. L. Comtet, ”Advanced Combinatorics, The Art of Finite and Infinite Expansions”, D. Reidel Publishing Co., 1974, page 228. 5. S. Gaboury, R. Tremblay, B.-J. Fugere, Some explicit formulas for certain new classes of Bernoulli, Euler and Genocchi polynomials, Proc. Jangjeon Math. Soc. 17(2014), no. 1, 115–123. 6. J. M. Gandhi, Some integrals for Genocchi numbers, Math. Mag., 33(1959/1960), 21–23. 7. J. Good, The number of orderings of n candidates when ties are permitted, Fibonacci Quart., 13, (1975), 11-18. 8. O. A. Gross, Preferential arrangements, Amer. Math. Monthly, 69 (1962), 4-8. 9. G.-W. Jang, D. S. Kim, T. Kim, T. Mansour, Fourier series of functions related to Bernoulli polynomials, Adv. Stud. Contemp. Math., 27(2017), no.1, 49-62. 10. D. S. Kim, T. Kim, Fourier series of higher-order Euler functions and their applications, to appear in Bull. Korean Math. Soc. 11. D. S. Kim, T. Kim, Some identities involving Genocchi polynomials and numbers, Ars combin., 121 (2015), 403–412. 12. T. Kim, Some identities for the Bernoulli the Euler and the Genocchi numbers and polynomials, Adv. Stud. Contemp. Math. (Kyungshang), 20(2010), no. 1, 23–28. 13. T. Kim, D.S. Kim, Some formulas of ordered Bell numbers and polynomials arising from umbral calculus, preprint. 14. T. Kim, D. S. Kim, G.-W. Jang, J. Kwon, Fourier series of sums of products of Genocchi functions and their applications, to appear in J. Nonlinear Sci.Appl. 15. T. Kim, D. S. Kim, S.-H. Rim, D.-V. Dolgy, Fourier series of higher-order Bernoulli functions and their applications, J. Inequal. Appl. 2017 (2017), 2017:8. 16. A. Knopfmacher, M.E. Mays, A survey of factorization counting functions, Int. J. Number Theory 1:4 (2005) 563–581.

71

TAEKYUN KIM et al 58-72

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, D.V. Dolgy

15

17. H. Liu, W. Wang, Some identities on the the Bernoulli, Euler and Genocchi poloynomials via power sums and alternate power sums, Disc. Math., 309(2009), 3346-3363. 18. J. E. Marsden, Elementary classical analysis, W. H. Freeman and Company, 1974. 19. M. Mor, A.S. Fraenkel, Cayley permutations, Discr. Math. 48:1 (1984) 101–112. 20. A. Sklar, On the factorization of sqare free integers, Proc. Amer. Math. Soc., 3 (1952), 701-705. 21. H. M. Srivastava, Some generalizations and basic extensions of the Bernoulli, Euler and Genocchi polynomials, Appl. Math. and Inf. Sci., 5(2011), no. 3, 390-414. 22. D. G. Zill, M. R. Cullen, Advanced Engineering Mathematics, Jones and Bartlett Publishers 2006. Department of Mathematics, College of Science, Tianjin Polytechnic University, Tianjin City, 300387, China, Department of Mathematics, Kwangwoon University, Seoul 139-701, Republic of Korea E-mail address: [email protected] Department of Mathematics, Sogang University, Seoul 121-742, Republic of Korea E-mail address: [email protected] Graduate School of Education, Konkuk University, Seoul 143-701, Republic of Korea E-mail address: [email protected] Hanrimwon, Kwangwoon University, Seoul 139-701, Republic of Korea, Institute of Natural Sciences, Far eastern Federal University, Vladivostok 690950, Russia E-mail address: d [email protected]

72

TAEKYUN KIM et al 58-72

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

TWO TRANSFORMATION FORMULAS ON THE BILATERAL BASIC HYPERGEOMETRIC SERIES QING ZOU Abstract. In this paper, the author first proves a transformation formula for the very-well-poised bilateral basic hypergeometric 3 ψ3 series by using the relationship between the bilateral basic hypergeometric 5 ψ5 series and basic hypergeometric 4 φ3 series. Then, the author proves a transformation formula for the well-poised bilateral basic hypergeometric 4 ψ4 series by using the relationship between the bilateral basic hypergeometric 5 ψ5 series and basic hypergeometric 8 φ7 series.

1. Introduction One of the main parts of the theory of basic hypergeometric series is bilateral series. The general bilateral basic hypergeometric series in base q with r numerator and s denominator parameters is defined by   ∞ X n (a1 , a2 , · · · , ar ; q)n a1 , a2 , · · · , ar [(−1)n q ( 2 ) ]s−r z n , ψ ; q, z = r s b1 , b2 , · · · , bs (b1 , b2 , · · · , bs ; q)n n=−∞ where the denominator factors are never zero, q 6= 0 if s < r, and z 6= 0 if the power of z is negative. To understand this definition better, we need to define the following notations. Assume |q| < 1. Define (x)0 := (x; q)0 = 1, (x)n := (x; q)n :=

n−1 Y

(1 − xq k ),

k=0

(x1 , · · · , xm )n := (x1 , · · · , xm ; q)n := (x1 ; q)n · · · (xm ; q)n , (x; q)−k

n (−q/x)k q ( 2 ) = . (q/x; q)k

2010 Mathematics Subject Classification. Primary 33D15; Secondary 05A30, 33D05. Key words and phrases. Basic hypergeometric series; Bilateral basic hypergeometric series; Verywell-poised; Well-poised. This paper was typeset using AMS-LATEX. 1

73

QING ZOU 73-80

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

Q. ZOU

By some algebraic computations of the terms with negative n, we can obtain   X ∞ n (a1 , a2 , · · · , ar ; q)n a1 , a2 , · · · , ar [(−1)n q ( 2 ) ]s−r z n ; q, z = r ψs b1 , b 2 , · · · , bs (b1 , b2 , · · · , bs ; q)n 0  n ∞ X (q/b1 , q/b2 , · · · , q/bs ; q)n b1 b2 · · · bs + . (q/a , q/a , · · · , q/a ; q) a a · · · a z 1 2 r n 1 2 r n=1 (1.1) The convergence of each series in (1.1) can be seen in [1]. An r ψr is said to be well-poised if a1 b1 = a2 b2 = · · · = ar br , and very-well-poised if it is well-poised and a1 = −a2 = qb1 = −qb2 . When it comes to basic hypergeometric series, it is unavoidable to talk about basic hypergeometric series because they are closely related. So, let us introduce the basic hypergeometric series next. Generally speaking, basic hypergeometric series P are series cn with cn+1 /cn a rational function of q n for a fixed parameter q, which is usually taken to satisfy |q| < 1, but at other times is a power of a prime. More precisely, we can define an r φs basic hypergeometric series as   X ∞ n (a1 , a2 , · · · , ar ; q)n a1 , a2 , · · · , ar φ ; q, z = [(−1)n q ( 2 ) ]1+s−r z n , r s b1 , b2 , · · · , bs (q, b1 , b2 , · · · , bs ; q)n n=0 where q 6= 0 when r > s + 1. This definition is an extension of Heine’s series (cf. [2, 3, 4]). We say a basic hypergeometric series r+1 φr is well-poised if qa1 = a2 b1 = a3 b2 = · · · = ar+1 br, and very-well-poised if it is well-poised and 1/2

a2 = qa1/2 , a3 = −qa1 . An r φs series terminates if one of its numerator parameters is of the form q −m with m = 0, 1, 2, · · · and q 6= 0. Basic hypergeometric series is very useful. Case in point [1], Gauss used a basic hypergeometric series identity in his first proof of the determination of the sign of the Gauss sum, and Jacobi used some to determine the number of ways an integer can be written as the sum of two, four, six and eight squares. From the definition of r ψs and r φs , we can easily deduce that the results of these two series have nothing to do with the orders of a1 , a2 , · · · , ar and b1 , b2 , · · · , bs . This point is very important. Furthermore, in the second appendix of [1], Gasper

74

QING ZOU 73-80

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

TWO TRANSFORMATION FORMULAS ON THE BILATERAL BASIC HYPERGEOMETRIC SERIES 3

and Rahman showed several sums of bilateral basic series, namely, Ramanujan’s 1 ψ1 sum, the sum of a well-poised 2 ψ2 series, Bailey’s sum of a well-poised 3 ψ3 , and etc.. In [5], Zhang and Hu provided two transformation formulas on the bilateral series 5 ψ5 . In this paper, we would like to show a transformation formula for the very-wellpoised bilateral basic hypergeometric 3 ψ3 series and a a transformation formula for the well-poised bilateral basic hypergeometric 4 ψ4 series. 2. Main Lemmas In order to prove the main results of this paper, we need to introduce the following two lemmas first. Lemma 2.1. Let b, c, d, e and f be indeterminate. Then   q4 b, c, d, e, f (2.1) ; q, 5 ψ5 q 2 /b, q 2 /c, q 2 /d, q 2 /e, q 2 /f bcdef   q4 q, q 3/2 , −q 3/2 , b, c, d, e, f =(1 − q) 8 φ7 ; q, . q 1/2 , −q 1/2 , q 2 /b, q 2 /c, q 2 /d, q 2 /e, q 2 /f bcdef provided |

q4 | < 1. bcdef

The proof of this lemma can be seen in [5]. c 1 = − 2 , n ∈ N, we have f q   3/2 3/2 n n q 5/2 −q , q , c, dq , eq ; q, − 5 ψ5 d −q 1/2 , q 1/2 , q 2 /c, e, d   (q 2 , q 5 /f 2 ; q 2 )∞ −q 3/2 , q 3/2 , c, q −n = ; q, q , 4 φ3 d, e, f (1 − q/f )(1 − q 2 /f )(1 − q 3 /f )(q 8 /f 2 ; q 2 )∞

Lemma 2.2. For def − cq 4−n and

provided |q| < 1. Proof. According to Lemma 2.1 and [1, Appendix III (III.20)], we can infer that   ef q n a, b, c, dq n , eq n ; q, 5 ψ5 q 2 /a, q 2 /b, q 2 /c, e, d bc  −n  2 (1 − q)(aq/f, bq/f, cq/f, q ; q)∞ q , a, b, c = ; q, q , (2.2) 4 φ3 d, e, f (abq/f, acq/f, bcq/f, q/f ; q)∞ abc where abcq 1−n = def and = q. f Let a = −q 3/2 , b = q 3/2 in (2.2) and simplfy the result, we can obtain our conclusion. 

75

QING ZOU 73-80

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

Q. ZOU

These two lemmas are very useful. Let us give two examples to illustrate this point. Corollary 2.1. Let d, e and f be indeterminate. Then   q −q 3/2 , q 3/2 , d, e, f ; q, − 5 ψ5 −q 1/2 , q 1/2 , q 2 /d, q 2 /e, q 2 /f def   2 2 2 (q, q /de, q /df, q /ef ; q)∞ −1/q, d, e, f = 2 ; q, q , 4 φ3 −q 1/2 , q 1/2 , def /q (q /d, q 2 /e, q 2 /f, q 2 /def ; q)∞ q |} < 1 and 4 φ3 terminates. provided max{|q|, | def Proof. In [6], Watson showed the Watson’s transformation formula (a new proof of this formula can be seen in [7]),   a2 q 2 a, qa1/2 , −qa1/2 , b, c, d, e, f ; q, 8 φ7 a1/2 , −a1/2 , aq/b, aq/c, aq/d, aq/e, aq/f bcdef   (aq, aq/de, aq/df, aq/ef ; q)∞ aq/bc, d, e, f ; q, q , (2.3) = 4 φ3 aq/b, aq/c, def /a (aq/d, aq/e, aq/f, aq/def ; q)∞ whenever the 8 φ7 series converges and the 4 φ3 series terminates. By Lemma 2.1 and (2.3), we derive that   q4 b, c, d, e, f ; q, 5 ψ5 q 2 /b, q 2 /c, q 2 /d, q 2 /e, q 2 /f bcdef   2 2 2 2 (q, q /de, q /df, q /ef ; q)∞ q /bc, d, e, f ; q, q . = 2 4 φ3 q 2 /b, q 2 /c, def /q (q /d, q 2 /e, q 2 /f, q 2 /def ; q)∞ Sunstituting b and c by −q 3/2 and q 3/2 , respectively, the conclusion follows. This completes the proof.  If we let f = q −n , n ∈ N in Corollary 2.1 (a new proof of f = q −n of the q-analogue of Watson’s 3 F2 summation formula can also be found in [7]), we will arrive at   q n+1 −q 3/2 , q 3/2 , d, e, q −n ; q, − 5 ψ5 −q 1/2 , q 1/2 , q 2 /d, q 2 /e, q n+2 de   2 −n (q; q)n+1 (q /de; q)n −1/q, d, e, q = ; q, q . 4 φ3 −q 1/2 , q 1/2 , deq −n−1 (q 2 /d, q 2 /e; q)n Or equivalently,  5 ψ5

q n+1 −q 3/2 , q 3/2 , f, g, q −n ; q, − −q 1/2 , q 1/2 , q 2 /d, q 2 /e, q n+2 fg

76



QING ZOU 73-80

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

TWO TRANSFORMATION FORMULAS ON THE BILATERAL BASIC HYPERGEOMETRIC SERIES 5

(1 − q)(h, h/f g; q)n = 4 φ3 (h/f, h/g; q)n



 −1/q, f, g, q −n ; q, q , −q 1/2 , q 1/2 , h

where h = f gq −n−1 . With Lemma 2.2 in hand, we can obtain the following transformation formula for 5 ψ5 by using Sears’ transformations of terminating balanced 4 φ3 series [8], [1, Appendix III (III.15), (III.16)] (for the generalization of [1, Appendix III (III.15)], cf. [9])   q 5/2 −q 3/2 , q 3/2 , c, dq n , eq n ; q, − 5 ψ5 d −q 1/2 , q 1/2 , q 2 /c, e, d =

=

(1 − q)(aq/f, bq/f, cq/f, q 2 ; q)∞ (−eq −3/2 , −f q −3/2 ; q)n (−q 3/2 )n (abq/f, acq/f, bcq/f, q/f ; q)∞ (e, f ; q)n   −q 3/2 , dq −3/2 , d/c, q −n ×4 φ3 ; q, q d, −q 5/2−n /e, −q 5/2−n /f (1 − q)(aq/f, bq/f, cq/f, q 2 ; q)∞ (−q 3/2 , −ef q −3 , −q −3/2 ef /c; q)n (abq/f, acq/f, bcq/f, q/f ; q)∞ (e, f, −q −3 ef /c; q)n   −q 3/2 e, q −3/2 f, −q −3 ef /c, q −n ×4 φ3 ; q, q , −ef q −3 , −q 3/2 ef /c, −q 3/2 def

where d, e and f are indeterminate and |q| < 1. With these two lemmas in hand, we are ready to show our main results. 3. transformation formula for the very-well-poised 3 ψ3 In this section, we would like to prove a transformation formula for the very-wellpoised bilateral basic hypergeometric 3 ψ3 series by using the relationship between the bilateral basic hypergeometric 5 ψ5 series and basic hypergeometric 4 φ3 series. The main conclusion can be summarized as the following conclusion. Theorem 3.1. For n ∈ N and |q| < 1,   3 n −q 3/2 , q 3/2 , q 4 + 2 n ; q, q 5 3 ψ3 −q 1/2 , q 1/2 , q 4 − 2 5

=

(q 2 , q n+ 2 ; q 2 )∞ n

1

n

3

n

7

11

(1 + q 2 − 4 )(1 + q 2 + 4 )(1 + q 2 + 4 )(q n+ 2 ; q 2 )∞   3 n −q 3/2 , q 3/2 , q 4 − 2 , q −n ; q, q ×4 φ3 5 n 3 n 5 n q 4 − 2 , q 4 − 2 , −q 4 − 2

77

QING ZOU 73-80

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

Q. ZOU 5

=

(q 2 , q n+ 2 ; q 2 )∞ n

1

n

3

n

7

11

(1 + q 2 − 4 )(1 + q 2 + 4 )(1 + q 2 + 4 )(q n+ 2 ; q 2 )∞  3  3 q , q 3/2 , q − 2 −n , q −n 2 2 ×4 φ3 ;q ,q . 5 3 n 7 n q 2 −n , q 4 − 2 , −q 4 − 2

Proof. Let 3

n

5

n

3

n

5

n

c = q 4 − 2 , d = q 4 − 2 , e = q 4 − 2 , f = −q 4 − 2 in Lemma 2.2, we get that   5 3 3 n n n −q 3/2 , q 3/2 , q 4 − 2 , q 4 + 2 , q 4 + 2 n n n ; q, q 5 3 5 5 ψ5 −q 1/2 , q 1/2 , q 4 + 2 , q 4 − 2 , q 4 − 2 5

=

(q 2 , q n+ 2 ; q 2 )∞ n

1

n

n

3

7

11

(1 + q 2 − 4 )(1 + q 2 + 4 )(1 + q 2 + 4 )(q n+ 2 ; q 2 )∞   n 3 −q 3/2 , q 3/2 , q 4 − 2 , q −n ; q, q ×4 φ3 5 n 3 n 5 n q 4 − 2 , q 4 − 2 , −q 4 − 2

Note that     5 3 3 n n n 3 n −q 3/2 , q 3/2 , q 4 − 2 , q 4 + 2 , q 4 + 2 −q 3/2 , q 3/2 , q 4 + 2 = 3 ψ3 5 n 3 n 5 n ; q, q 5 n ; q, q . 5 ψ5 −q 1/2 , q 1/2 , q 4 + 2 , q 4 − 2 , q 4 − 2 −q 1/2 , q 1/2 , q 4 − 2 Thus the first equation holds. Askey and Wilson [10] proved     a2 , b2 , c, d a2 , b 2 , c 2 , d 2 2 2 ; q, q =4 φ3 ;q ,q (3.1) 4 φ3 a2 b2 q, −cd, −cdq abq 1/2 , −abq 1/2 , −cd provided that both series terminate. This formula is called Singh’s quadratic transformation formula since this formula can be traced back to [11], which was written by Singh. Let n 3 3 n 3 a = q − 2 , b = q 4 , c = q − 4 − 2 , d = −q 2 in (3.1), we can arrive at the second equation. This completes the proof.  4. transformation formula for the well-poised 4 ψ4 In this section, we would like to prove a transformation formula for the very-wellpoised bilateral basic hypergeometric 4 ψ4 series by using the relationship between the bilateral basic hypergeometric 5 ψ5 series and basic hypergeometric 8 φ7 series. The main conclusion can be summarized as the following conclusion.

78

QING ZOU 73-80

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

TWO TRANSFORMATION FORMULAS ON THE BILATERAL BASIC HYPERGEOMETRIC SERIES 7

Theorem 4.1. For |q| < 1, we have   a, q/a, −d, −q/d ; q, −q 4 ψ4 q 2 /a, qa, −q 2 /d, −qd =

(q; q)2∞ (−adq, −aq 2 /d, −dq 2 /a, −q 3 /ad; q 2 )∞ . (−qd, −q 2 /d, aq, q 2 /a; q)∞

Proof. According to Lemma 2.1, we have   a, q/a, −d, −q/d ; q, −q 4 ψ4 q 2 /a, qa, −q 2 /d, −qd   a, q/a, −q, −d, −q/d =5 ψ5 ; q, −q q 2 /a, qa, −q, −q 2 /d, −qd   q, q 3/2 , −q 3/2 , a, q/a, −q, −d, −q/d =(1 − q) 8 φ7 ; q, −q , q 1/2 , −q 1/2 , q 2 /a, qa, −q, −q 2 /d, −qd

(4.1)

provided |q| < 1. In [12, 3.4(1)], Bailey showed Whipples 3 F2 formula. In [13], Gasper and Rahman proved the following q-analogue of Whipples formula as follows, # " 1/2 1/2 −c, q(−c) , −q(−c) , a, q/a, c, −d, −q/d ; q, c 8 φ7 (−c)1/2 , −(−c)1/2 , −cq/a, −ac, −q, cq/d, cd (−c, −cq; q)∞ (acd, acq/d, cdq/a, cq 2 /ad; q 2 )∞ . (4.2) (cd, cq/d, −ac, −cq/a; q)∞ Note that (1 − q) · (q, q 2 ; q)∞ = (q; q)2∞ . Then let c = −q in (4.2) and then substitute it into (4.1), the conclusion can be obtained.  =

References [1] G. Gasper and M. Rahman, Basic hypergeometric series, second ed., Encyclopedia Math. Appl., vol. 96, Cambridge Univ. Press, Cambridge, 2004. ¨ [2] E. Heine, Uber die Reihe ..., J. reine angew. Math., 32 (1846), 210–212. [3] E. Heine, Untersuchungen uber die Reihe ..., J. reine angew. Math., 34 (1847), 285–328. [4] E. Heine, Handbuch der Kugelfunctionen, Theorie und Anwendungen, Vol. 1, Reimer, Berlin, 1878. [5] Z. Z. Zhang, Q. X. Hu, On the bilateral series 5 ψ5 , J. Math. Anal. Appl., 337 (2008), 1002– 1009. [6] G. N. Watson, A new proof of the Rogers-Ramanujan identities, J. London Math. Soc., 4 (1929), 4–9. [7] V. J. W. Guo and J. Zeng, Short proofs of summation and transformation formulas for basic hypergeometric series, J. Math. Anal. Appl., 327 (2007), 310–325.

79

QING ZOU 73-80

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

Q. ZOU

[8] D. B. Sears, On the transformation theory of basic hypergeometric functions, Proc. London Math. Soc., 53 (1951) no. 2, 158–180. [9] A. Keilthy and R. Osburn, Rogers-Ramanujan type identities for alternating knots, J. Nuber Theory, 161 (2016), 255–280. [10] R. Askey and J. A. Wilson, Some basic hypergeometric polynomials that generalize Jacobi polynomials, Memoirs Amer. Math. Soc., vol. 54, 1985. [11] V. N. Singh, The basic analogues of identities of the Cayley-Orr type, J. London Math. Soc., 34 (1959), 15–22. [12] W. N. Bailey, Generalized hypergeometric series, Cambridge University Press, Cambridge, 1935. reprinted by Stechert-Hafner, New York, 1964. [13] G. Gasper and M. Rahman, Positivity of the Poisson kernel for the continuous q-Jacobi polynomials and some quadratic transformation formulas for basic hypergeometric series, SIAM J. Math. Anal., 17 (1986), 970–999. (Zou) Department of Mathematics, The University of Iowa, Iowa City, IA 522421419, USA E-mail address: [email protected]

80

QING ZOU 73-80

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

The p-moment exponential estimates for neutral stochastic functional differential equations in the G-framework ∗

Faiz Faizullah , A.A. Memom1 , M.A. Rana1 , M. Hanif2 ∗,2

Department of BS&H, College of E&ME, National University of Sciences and Technology (NUST) Pakistan 1 Department of Basic Sciences, Riphah International University Islamabad, Pakistan

January 4, 2018

Abstract The neutral stochastic functional differential equations have attracted much attention because of their practical applications in various fields such as biology, physics, medicine, finance, telecommunication networks and population dynamics. In this note, we investigate the p-moment estimates of solutions to neutral stochastic functional differential equations (NSFDEs) in the framework of G-Brownian motion. Under non-linear growth condition, the Lp estimates of solutions to NSFDEs in the G-framework are given. The Gronwall’s inequality, H¨ older’s inequality, G-Itˆ o’s formula and Burkholder-Davis-Gundy (BDG) inequalities are utilized to establish the above stated theory. Moreover, the asymptotic estimates for the solutions to these equations are studied and the Lyapunov exponent is estimated for NSFDEs in the G-framework. Key words: G-Brownian motion, p-moment estimates, neutral stochastic functional differential equations, non-linear growth condition, Lyapunov exponent.

1

Introduction

The multifaceted usage of stochastic dynamical models has proved to be tantamount to indispensable due to their reliability and authenticity in natural sciences, engineering and economics. The ever-developing field of medical science, which is always on the lookout for such mathematically accurate tools for the investigation of a variety of maladies, is no exception in using these models. Among others, the efficacy of these models has been established to generate optimal dynamic health policies for controlling spreads of infectious diseases [15]. Such is the quantitative accuracy and efficiency of stochastic differential equation (SDE) models that the prediction of the growth of bacterial populations from a small number of pathogens [1] can be calculated through these models. Besides, these models have the highly-cherished reliability to the extent that control and navigation systems are also using them as must-have tool. Various kinds of disturbances in telecommunications systems and the effect of thermal noise in electrical circuits are modeled by SDEs. Moreover, stock prices can also be modeled using stochastic differential equations. Stochastic differential equations in the framework of G-Brownian motion were instigated by Peng [11, 12]. Afterward, SDEs in the G-frame were studied by Bai and Li with integral Lipschitz coefficients [2] and then with discontinuous coefficients by Faizullah [4]. The stochastic functional differential equations ∗

E-mail Address: faiz @ceme.nust.edu.pk, faiz [email protected] ¯ ¯

1

81

Faiz Faizullah et al 81-90

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(SFDEs) in the framework of G-Brownian motion were initiated by Ren, Bi and Sakthivel [14]. Later on, Faizullah developed the existence and uniqueness theory for SFDEs in the framework of G-Brownian motion with Cauchy-Maruyama approximation scheme [5]. Recently, the existence theory for neutral stochastic functional differential equations (NSFDEs) in the G-framework were established by Faizullah [7]. Moment estimate is a useful and fundamental method of analyzing and exploring dynamic behavior of NSFDEs in the G-framework. However, the pth moment estimates for the solutions of NSFDEs in the framework of G-Brownian motion with non-linear growth condition have not been utterly investigated, which remains a motivating and attractive research theme. This paper will fill the stated gap. The topic of our analysis is neutral stochastic functional differential equations in the G-framework of the form d(Z(t) − D(Zt )) = κ(t, Zt )dt + λ(t, Zt )dhB, Bi(t) + µ(t, Zt )dB(t),

(1.1)

with initial data Zt0 = ζ = {ζ(s) : −τ ≤ s ≤ 0} such that ζ(s) is F0 - measurable, BC([−τ, 0]; Rn )valued random variable and belongs to MG2 ([−τ, 0]; R). The coefficients κ, λ, µ ∈ MG2 ([−τ, T ]; R), Z(t) is the value of stochastic process at time t and Zt = {Z(t + θ) : −τ ≤ θ ≤ 0, τ > 0} is a bounded continuous real valued stochastic process defined on [−ρ, 0] [6]. An Ft -adapted process Z = {Z(t) : −τ ≤ t ≤ T } is called the solution of NSFDE (1.1) if it satisfies the above initial data and for all t ≥ 0 the following integral equation holds q.s. Z t Z t Z t Z(t) − D(Zt ) = ζ(0) − D(Zt0 ) + κ(v, Zv )dv + λ(v, Zv )dhB, Bi(v) + µ(v, Zv )dB(v). (1.2) 0

0

0

All through this article, we suppose that the following non-linear growth condition satisfies. Assume that Υ(.) : R+ → R+ is a concave and increasing function in such a way that Υ(z) > 0 for z > 0, Υ(0) = 0 and Z dz = ∞. (1.3) 0+ Υ(z) Then for each χ ∈ BC([−τ, 0]; R) , |κ(t, χ)|2 + |λ(t, χ)|2 + |µ(t, χ)|2 ≤ Υ(1 + |χ|2 ), t ∈ [0, T ].

(1.4)

Since Υ(0) = 0 and the function Υ is concave so for all z ≥ 0 we have Υ(z) ≤ α + βz,

(1.5)

where α and β are positive constants. The remaining article is arranged in the following manner. In section 2, preliminaries are given. In section 3, the p-moment estimates for the solutions to neutral stochastic functional differential equations in the G-framework are studied. In section 4, asymptotic estimates for the solutions to NSFDEs in the G-framework are obtained.

2

Preliminaries

This section presents some basic notions and results of G-expectation and G-Brownian motion [3, 6, 13]. They are used in the forthcoming research work of this article. Definition 2.1. Assume Ω be a nonempty basic space. Let H be a space of linear real valued functions defined on Ω. Then a real valued functional E defined on H fulfilling the following characteristics is called a sub-linear expectation

2

82

Faiz Faizullah et al 81-90

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(a) If X ≥ Y then E[X] ≥ E[Y ], where X, Y ∈ H. (b) E[α] = α, where α is a real constant. (c) E[βX] = βE[X], where β > 0. (d) E[X + Y ] ≤ E[X] + E[Y ], for all X, Y ∈ H. Let Cb.Lip (Rl×d ) denotes the set of bounded Lipschitz functions on Rl×d and LpG (ΩT ) = {φ(Bt1 , Bt2 , ..., Btl /l ≥ 1, t1 , t2 , ..., tl ∈ [0, T ], φ ∈ Cb.Lip (Rl×d ))}. Let ρi ∈ LpG (Ωti ), i = 0, 1, ..., N −1 then the collection of the following kind of processes is expressed by MG0 (0, T ) N −1 X ηt (w) = ρi (w)I[ti ,ti+1 ] (t), i=0

where the above process is defined on a partition πT = {t0 , t1 , ..., tN } of [0, T ]. Associated with norm RT kηk = { 0 E[|ηu |p ]du}1/p , MGp (0, T ), p ≥ 1, is the completion of MG0 (0, T ). For all ηt ∈ MG2,0 (0, T ), the G-Itˆo’s integral I(η) and G-quadratic variation process {hBit }t≥0 are respectively given by T

Z I(η) =

ηu dBu =

N −1 X

0

hBit =

Bt2

ρi (Bti+1 − Bti ),

i=0 t

Z −2

Bu dBu . 0

The book [10] is a good reference for the following six lemmas. The first two inequalities are known as H¨ older’s inequality and Gronwall’s inequality respectively. Lemma 2.2. If

1 p

+

1 q

= 1 for all p, q > 1, g ∈ L2 and h ∈ L2 then gh ∈ L1 and Z c

d

Z gh ≤ (

d

1 p

p

Z

d

|g| ) (

c

1

|h|q ) q .

(2.1)

c

Lemma 2.3. Let K ≥ 0, H(t) : [c, d] → R be a continuous function, h(t) ≥ 0 and for all t ∈ [c, d], Rd H(t) ≤ K + c h(s)H(s)ds, then Rt

H(t) ≤ Ke

c

h(s)ds

,

for all c ≤ t ≤ d. Lemma 2.4. Let δ ∈ (0, 1) and c, d ≥ 0. Then (c + d)2 ≤

c2 d2 + . δ 1−δ

Lemma 2.5. Let p ≥ 1 and let |D(ζ)| ≤ δkζk. Then for ζ ∈ CB([−τ, 0]; Rn ), |ζ(0) − D(ζ)|p ≤ (1 + δ)p kζkp . ˆ c, d > 0 and p ≥ 2. Then the below results hold Lemma 2.6. Let δ, 3

83

Faiz Faizullah et al 81-90

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(i) cp−1 d ≤

ˆp (p−1)δc p

(ii) cp−2 d2 ≤

+

ˆp (p−2)δc p

dp . pδˆp−1

+

2dp p−2 pδˆ 2

.

Lemma 2.7. Let p ≥ 1 and |D(ζ)| ≤ δkζk, δ ∈ (0, 1). Then sup |X(u)|p ≤ 0≤u≤t

δ 1 sup |X(u) − D(Xu )|p . kζkp + 1−δ (1 − δ)p 0≤u≤t

Theorem 2.8. Let Z ∈ Lp . Then for every  > 0, E[|Z|p ] p ˆ C(|Z| > ) ≤ ,  where Cˆ is called the capacity. ˆ The capacity is defined by C(A) = supP ∈P P (A). A collection of all probability measures on (Ω, B(Ω) is denoted by P and A ∈ B(Ω), which is Borel σ-algebra of Ω. Set A is known as a polar ˆ set if C(A) = 0. A property holds quasi-surely (q.s. in short) if it holds outside a polar set.

3

The pth moment estimates for NSFDEs in the G-framework

This section discusses the exponential estimate of the solution to NSFDE in the framework of G-Brownian motion (1.1) with the given initial data. Let equation (1.1) admit a unique solution Z(t). Suppose the non-linear growth condition (1.4) holds. In addition, assume that |D(ζ)| ≤ δkζk, where δ ∈ (0, 1). Theorem 3.1. Let the non-linear growth condition holds. Let p ≥ 2 and Ekζkp < ∞. Then E[ sup |Z(s)|p ] ≤ K1 eK2 T , −τ ≤s≤t

where K1 =

1 1 p p−1 + 2(1 + δ)p ]Ekζkp + 2 (1−δ)p [(1 − δ) + (1 − δ) (1−δ)p [(2 + pc3 + 2c2 )γ1 + c2 (p − 1)γ3 ]T , p

K2 = γ3 =

1 (1−δ)p [(2

p p (2) 2 −1 (α+β) 2 p ˆ 2 −1

δ

p

p

ˆ + δ)p + , γ4 = [(p − 1)δ(1

p

−1 (2) 2 −1 (α+β) 2 ˆ + δ)p + (2) 2 β 2 , γ2 = [(p − 1)δ(1 p−1 p−1 ˆ ˆ δ δ p p (2) 2 −1 β 2 ] and c2 , c3 are positive constants. p δˆ 2 −1

+ pc23 + 2c2 )γ2 + (p − 1)γ4 ], γ1 =

],

Proof. Apply the G-Itˆo’s formula to U (t, Z(t)) = |Z(t) − D(Zt )|p , p ≥ 2, we obtain Z

t

Z

t

U (t, Z(t)) = U (0, Z(0)) + [Uu (u, Z(u)) + UZ (u, Z(u))κ(Zu , u)]du + UZ (u, Z(u))µ(Zu , u)dB(u) 0 0 Z t 1 + [UZ (u, Z(u))λ(Zu , u) + traceµT (Zu , u)UZZ (u, Z(u))µ(Zu , u)]dhB, Bi(u), 2 0

4

84

Faiz Faizullah et al 81-90

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Next we apply G-expectation on both side and use lemma 2.5. We also use the H¨ older’s (2.1) and BDG inequalities [8] to get p

Z

p

t

E[ sup |Z(u) − D(Zu )| ] ≤ E|ζ(0) − D(ζ)| + E[ sup p 0≤u≤t

0≤u≤t

Z

|Z(u) − D(Zu )|p−1 |κ(u, Zu )|]du

0

t

p|Z(u) − D(Zu )|p−1 |µ(u, Zu )|dB(u)]

+ E[ sup 0≤u≤t 0

Z + E[ sup

(3.1)

t

[p|Z(u) − D(Zu )|p−1 |λ(u, Zu )|

0≤u≤t 0

p(p − 1) + |Z(u) − D(Zu )|p−2 |µ(u, Zu )|2 ]dhB, Bi(u)] 2 ≤ (1 + δ)p Ekζkp + Ji + Jii + Jiii , where Z

t

p|Z(u) − D(Zu )|p−1 |κ(u, Zu )|du],

Ji = E[ sup 0≤u≤t 0

Z

t

p|Z(u) − D(Zu )|p−1 |µ(u, Zu )|dB(u)],

Jii = E[ sup 0≤u≤t 0

t

Z

[p|Z(u) − D(Zu )|p−1 |λ(u, Zu )| +

Jiii = E[ sup 0≤u≤t 0

p(p − 1) |Z(u) − D(Zu )|p−2 |µ(u, Zu )|2 ]dhB, Bi(u)]. 2 (3.2)

We use lemma 2.5, Lemma 2.6 and the non-linear growth condition (1.4), for any δˆ > 0, |κ(t, Zt )|p ˆ p|Z(t) − D(Zt )|p−1 |κ(t, Zt )| ≤ (p − 1)δ|Z(t) − D(Zt )|p + δˆp−1 p 2 )] 2 [Υ(1 + kZk p p ˆ + δ) kZk + ≤ (p − 1)δ(1 δˆp−1 p

2 2 ˆ + δ)p kZkp + [α + β(1 + kZk )] ≤ (p − 1)δ(1 δˆp−1 p

p

p

−1 2 [(α + β) 2 + β 2 kZkp ] ˆ + δ)p kZkp + (2) ≤ (p − 1)θ(1 δˆp−1 p

p

p

p

−1 2 2 (2) 2 −1 (α + β) 2 β ˆ + δ)p + (2) = + [(p − 1)δ(1 ]kZkp . p−1 p−1 ˆ ˆ δ δ

So, p|Z(t) − D(Zt )|p−1 |κ(t, Zt )| ≤ γ1 + γ2 kZkp , where γ1 =

p p (2) 2 −1 (α+β) 2

δˆp−1

ˆ + δ)p + and γ2 = [(p − 1)δ(1

p p (2) 2 −1 β 2

δˆp−1

(3.3)

]. In a similar way as above,

p|Z(t) − D(Zt )|p−1 |λ(t, Zt )| ≤ γ1 + γ2 kZkp , p|Z(t) − D(Zt )|p−1 |µ(t, Zt )| ≤ γ1 + γ2 kZkp , p−2

p|Z(t) − D(Zt )|

2

(3.4)

p

|µ(t, Zt )| ≤ γ3 + γ4 kZk , 5

85

Faiz Faizullah et al 81-90

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

p

where γ3 =

p

p

(2) 2 −1 (α+β) 2 p δˆ 2 −1

ˆ + δ)p + and γ4 = [(p − 1)δ(1 Z

p

(2) 2 −1 β 2 p δˆ 2 −1

]. By the inequality (3.3) we obtain

t

[γ1 + γ2 kZkp ]du 0 Z t kZkp du. ≤ γ1 T + γ2

Ji ≤

0

By using lemma 2.6, inequality (3.4), second mean value theorem, BDG inequalities [8] and funda2 2 mental inequality |c||d| ≤ c2 + d2 we proceed as follows Z

t

Jii = pE[ sup | 0≤u≤t

|Z(u) − D(Zu )|p−1 |µ(u, Zu )|dB(u)|]

0

Z ≤ pc3 E[ sup

t

1

|Z(u) − D(Zu )|2p−2 |µ(u, Zu )|2 du] 2

0≤u≤t 0 p

Z

≤ pc3 E[ sup |Z(u) − D(Zu )| 0≤u≤t

t

1

|Z(u) − D(Zu )|p−2 |µ(u, Zu )|2 du] 2

0

Z t 1 p2 c23 p |Z(u) − D(Zu )|p−2 |µ(u, Zu )|2 du] ≤ E[ sup |Z(u) − D(Zu )| ] + E[ sup 2 0≤u≤t 2 0≤u≤t 0 Z t 2 1 pc ≤ E[ sup |Z(u) − D(Zu )|p ] + 3 E[ sup (γ1 + γ2 kZu kp )]du 2 0≤u≤t 2 0≤u≤t 0 Z t 2 1 pc pc2 = E[ sup |Z(u) − D(Zu )|p ] + 3 γ1 T + 3 γ2 E[ sup |Zu |p ]du. 2 0≤u≤t 2 2 0≤u≤t 0 By using the BDG inequalities [8], inequality (3.4) and lemma 2.6 we get Z Jiii = E[ sup | 0≤u≤t t

Z

t

[p|Z(u) − D(Zu )|p−1 |λ(u, Zu )| +

0

p(p − 1) |Z(u) − D(Zu )|p−2 |µ(u, Zu )|2 ]dhB, Bi(u)]| 2

E sup [p|Z(u) − D(Zu )|p−1 |λ(u, Zu )| +

≤ c2

0≤u≤t

0

p(p − 1) |Z(u) − D(Zu )|p−2 |µ(u, Zu )|2 ]du 2

t

(p − 1) (γ3 + γ4 kZu kp )]du 2 0≤u≤t 0 Z t 1 1 ≤ c2 (γ1 + (p − 1)γ3 )T + c2 (γ2 + (p − 1)γ4 ) E[ sup |Zu |p ]du. 2 2 0≤u≤t 0 Z

≤ c2

E sup [γ1 + γ2 kZu kp +

6

86

Faiz Faizullah et al 81-90

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Using the values of Ji , Jii and Jiii in (3.1), we have p

p

Z

p

E[ sup |Z(u) − D(Zu )| ] ≤ (1 + δ) Ekζk + γ1 T + γ2 0≤u≤t

0

t

E[ sup |Zu |p ]du 0≤u≤t 2 pc3 γ1 T +

Z t pc23 E[ sup |Zu |p ]du γ2 2 0≤u≤t 0 Z t 1 1 + c2 (γ1 + (p − 1)γ3 )T + c2 (γ2 + (p − 1)γ4 ) E[ sup |Zu |p ]du 2 2 0≤u≤t 0 1 1 = (1 + δ)p Ekζkp + (1 + pc23 + c2 )γ1 T + c2 (p − 1)γ3 T 2 2 1 + E[ sup |Z(u) − D(Zu )|p ] 2 0≤u≤t Z t 1 2 1 + [(1 + pc3 + c2 )γ2 + (p − 1)γ4 ] E[ sup kZu kp ]du, 2 2 0≤u≤t 0

1 + E[ sup |Z(u) − D(Zu )|p ] + 2 0≤u≤t 2

simplification follows that E[ sup |Z(u) − D(Zu )|p ] ≤ 2(1 + )p Ekζkp + [(2 + pc23 + 2c2 )γ1 + c2 (p − 1)γ3 ]T 0≤u≤t

+ [(2 + pc23 + 2c2 )γ2 + (p − 1)γ4 ]

Z 0

t

E[ sup kZ(r)kp ]du. −τ ≤r≤u

By using lemma (2.7), it yields δ (1 + δ)p 1 Ekζkp + 2 Ekζkp + [(2 + pc23 + 2c2 )γ1 + c2 (p − 1)γ3 ]T 1−δ (1 − δ)p (1 − δ)p Z t 1 2 + [(2 + pc3 + 2c2 )γ2 + (p − 1)γ4 ] E[ sup kZ(r)kp ]du (1 − δ)p −τ ≤r≤u 0

E[ sup |Z(u)|p ] ≤ 0≤u≤t

Noting the fact

sup |Z(u)|p ≤ kζkp + sup |Z(u)|p , we have −τ ≤u≤t

0≤u≤t

(1 + δ)p 1 δ Ekζkp + 2 Ekζkp + [(2 + pc23 + 2c2 )γ1 + c2 (p − 1)γ3 ]T p 1−δ (1 − δ) (1 − δ)p Z t 2 [(2 + pc3 + 2c2 )γ2 + (p − 1)γ4 ] E[ sup |Z(r)|p ]du p

E[ sup |Z(u)] ≤ Ekζkp + −τ ≤u≤t

1 (1 − δ) −τ ≤r≤u 0 1 [(1 − δ)p + δ(1 − δ)p−1 + 2(1 + δ)p ]Ekζkp = (1 − δ)p 1 + [(2 + pc23 + 2c2 )γ1 + c2 (p − 1)γ3 ]T (1 − δ)p Z t 1 2 + [(2 + pc + 2c )γ + (p − 1)γ ] E[ sup |Z(r)|p ]du 2 2 4 3 (1 − δ)p −τ ≤r≤u 0 Z t = K1 + K2 E[ sup |Z(r)|p ]du, +

0

−τ ≤r≤u

7

87

Faiz Faizullah et al 81-90

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1 1 p p−1 + 2(1 + δ)p ]Ekζkp + 2 where K1 = (1−δ) p [(1 − δ) + δ(1 − δ) (1−δ)p [(2 + pc3 + 2c2 )γ1 + c2 (p − 1)γ3 ]T 1 2 and K2 = (1−δ) p [(2 + pc3 + 2c2 )γ2 + (p − 1)γ4 ]. Consequently, the Grownwall’s inequality gives

E[ sup

|Z(u)|p ] ≤ K1 eK2 T .

−τ ≤u≤T

The proof stands completed.

4

Asymptotic estimates for NSFDEs in the G-framework

We now present the asymptotic estimate for the solution to NSFDE in the frame of G-Brownian motion (1.1). Recall that limt→∞ sup 1t log|Z(t)| is known as the Lyapunov exponent [9]. We show 1 2 that p(1−δ) p [(2 + pc3 + 2c2 )γ2 + (p − 1)γ4 ] is the upper bound for the Lyapunov exponent. Theorem 4.1. Suppose that the non-linear growth condition (1.4) satisfies. Then 1 1 lim sup log|Z(t)| ≤ [(2 + pc23 + 2c2 )γ2 + (p − 1)γ4 ] t→∞ t p(1 − δ)p

q.s.

Proof. By theorem 3.1 for each l = 1, 2, ..., the following inequality holds. E( sup |Z(t)|p ) ≤ K1 eK2 l , l−1≤t≤l 1 1 p p−1 + 2(1 + δ)p ]Ekζkp + 2 where K1 = (1−δ) p [(1 − δ) + δ(1 − δ) (1−δ)p [(2 + pc3 + 2c2 )γ1 + c2 (p − 1)γ3 ]T 1 2 and K2 = (1−δ) p [(2 + pc3 + 2c2 )γ2 + (p − 1)γ4 ]. Thus by theorem 2.8 for any arbitrary δ > 0,

ˆ : C(w

sup |Z(t)|p > e(K2 +)l ) ≤ l−1≤t≤l

E[supl−1≤t≤l |Z(t)|p ] e(K2 +)l

K1 eK2 l e(K2 +)l = K1 e−l . ≤

For almost all w ∈ Ω, the Borel-Cantelli lemma follows that there is a random integer l0 = l0 (w) so that sup |Z(t)|p ≤ e(K2 +)l whenever l ≥ l0 , l−1≤t≤l

it yields, 1 K2 +  lim sup log|Z(t)| ≤ t p 1  = [(2 + pc23 + 2c2 )γ2 + (p − 1)γ4 ] + , q.s. p(1 − δ)p p

t→∞

Since  is arbitrary therefore 1 1 lim sup log|Z(t)| ≤ [(2 + pc23 + 2c2 )γ2 + (p − 1)γ4 ], q.s. t→∞ t p(1 − δ)p The proof stands completed. 8

88

Faiz Faizullah et al 81-90

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Remark 4.2. If p = 2, then we have 1 1 [(2 + 2c23 + 2c2 )γ2 + γ4 ], lim sup log|Z(t)| ≤ t 2(1 − δ)2

t→∞

which shows that the Lyapunov exponent will not be greater than

5

1 [(2 2(1−δ)2

+ 2c23 + 2c2 )γ2 + γ4 ].

Acknowledgement

We are very grateful to the research directorate of NUST Pakistan. The financial support of TWAS-UNESCO Associateship-Ref. 3240290714 at Centro de Investigacin en Matemticas, A.C. (CIMAT) Jalisco S/N Valenciana A.P. 402 36000 Guanajuato, GTO Mexico, is deeply appreciated and acknowledged by the first author.

References [1] A. A. Alonso, I. Molina and C. Theodoropoulos, Modeling bacterial population growth from stochastic single-cell dynamics, Appl Environ Microbiol. 80(17), 5241-5253 (2014). [2] X. Bai and Y. Lin, On the existence and uniqueness of solutions to stochastic differential equations driven by G-Brownian motion with Integral-Lipschitz coefficients, Acta Mathematicae Applicatae Sinica, English Series, 3(30), 589610 (2014). [3] L. Denis, M. Hu and S. Peng, Function spaces and capacity related to a sublinear expectation: Application to G-Brownian motion paths, Potential Anal., 34, 139-161 (2010). [4] F. Faizullah, Existence of solutions for stochastic differential equations under G-Brownian motion with discontinuous coefficients, Zeitschrift fr Naturforschung A, 67a, 692-698 (2012). [5] F. Faizullah, Existence of solutions for G-SFDEs with Cauchy-Maruyama approximation scheme; Abst. Appl. Anal. http://dx.doi.org/10.1155/2014/809431, 8 (2014). [6] F. Faizullah, A. Mukhtar and M.A. Rana, A note on stochastic functional differential equations driven by G-Brownian motion with discontinuous drift coefficients. Journal of Computational Analysis and Applications, 5(21), 910-919 (2016). [7] F. Faizullah, Existence results and moment estimates for NSFDEs driven by G-Brownian motion, Journal of Computational and Theoretical Nanoscience, 7(13), 1-8 (2016). [8] F. Gao, Pathwise properties and homeomorphic flows for stochastic differential equations driven by G-Brownian motion, Stoch. Proc. Appl., 2, 3356-3382 (2009). [9] Y.H. Kim, On the pth moment estimates for the solution of stochastic differential equations, J Inequal Appl 395, 1-9 (2014). [10] X. Mao, Stochastic differential equations and their applications, Horwood Publishing Chichester, Coll House England, (1997). [11] S. Peng, G-expectation, G-Brownian motion and related stochastic calculus of Ito’s type, The abel symposium 2, Springer-vertag, 541-567 (2006).

9

89

Faiz Faizullah et al 81-90

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[12] S. Peng, Multi-dimentional G-Brownian motion and related stochastic calculus under Gexpectation, Stoch. Proc. Appl., 12, 2223-2253 (2008). [13] S. Peng, Nonlinear Expectations and Stochastic Calculus under Uncertainty, arXiv:1002.4546v1 [math.PR] (2010). [14] Y. Ren, Q. Bi and R. Sakthivel, Stochastic functional differential equations with infinite delay driven by G-Brownian motion, Math. Method Appl., Sci. 36(13), 1746 (2013). [15] R. Yaesoubi and T. Cohen, Generalized Markov models of infectious disease spread: A novel framework for developing dynamic health policies, Eur J Oper Res. 215(3): 679-687 (2011).

10

90

Faiz Faizullah et al 81-90

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Generalized contractions with triangular α-orbital admissible mappings with respect to η on partial rectangular metric spaces Suparat Baiya1 and Anchalee Kaewcharoen2,∗ 1,2

Department of Mathematics, Faculty of Science, Naresuan University Phitsanulok 65000, Thailand E-mails: [email protected], [email protected]

Abstract In this paper, we introduce a notion of generalized contractions in the setting of partial rectangular metric spaces. The existence of fixed point theorems for generalized contractions with triangular α-orbital admissible mappings with respect to η in the complete partial rectangular metric spaces is proven. Moreover, we also give the example for supporting our main result.

Keywords: Partial rectangular metric spaces, triangular α-orbital admissible mappings with respect to η, α-orbital attractive mappings with respect to η.

1

Introduction and preliminaries

In 2000, Branciari [2] presented a class of generalized (rectangular) metric spaces and proved the interesting topological properties in such spaces. The author [2] also assured the Banach contraction principle in the setting of complete rectangular metric spaces. After that, many authors extended and improved the existence of fixed point theorems in complete rectangular metric spaces, see [4, 5, 6, 7, 8, 9, 10, 11, 15] and the references contained therein. Recently, Arshad et al. [1] extended the results proved by Jleli et al. [6, 7] in the setting of complete rectangular metric spaces. On the other hand, Matthew [12] presented the concept of partial metric spaces as a part of the study of denotational semantics of data flow network. In this space, the usual metric is replaced by a partial metric with an interesting property that the self-distance of ∗ Corresponding

author.

1

91

Suparat Baiya et al 91-109

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

any point of a space may not be zero. Later on, Shukla [16] introduced the partial rectangular metric spaces as a generalization of the concept of rectangular metric spaces and extended the concept of partial metric spaces. In this paper, we introduce a notion of generalized contractions appeared in [1] in the setting of partial rectangular metric spaces. The existence of fixed point theorems for generalized contractions with triangular α-orbital admissible mappings with respect to η in the complete partial rectangular metric spaces is proven. Moreover, we also give the example for supporting our main result. We now recall some definitions, lemmas and propositions that will be used in the sequel. Definition 1.1 [2] Let X be a nonempty set. We say that a mapping d : X × X → R is a Branciari metric on X if d satisfies the following: (d1) 0 ≤ d(x, y), for all x, y ∈ X; (d2) d(x, y) = 0 if and only if x = y; (d3) d(x, y) = d(y, x), for all x, y ∈ X; (d4) d(x, y) ≤ d(x, w) + d(w, z) + d(z, y), for all x, y ∈ X and for all distinct points w, z ∈ X\{x, y}. If d is a Branciari metric on X, then a pair (X, d) is called a Branciari metric space (or for short BMS). As mentioned before, Branciari metric spaces are also called rectangular metric spaces in the literature. A sequence {xn } in X converges to x ∈ X if for every ε > 0, there exists n0 ∈ N such that d(xn , x) < ε for all n ≥ n0 . A sequence {xn } is called a Cauchy sequence if for every ε > 0, there exists n0 ∈ N such that d(xn , xm ) < ε for all n, m ≥ n0 . A rectangular metric space (X, d) is called complete if every Cauchy sequence in X converges in X. Shukla [16] introduced a concept of the partial rectangular metric spaces as the following: Definition 1.2 [16] Let X be a nonempty set. We say that a mapping p : X × X → R is a partial rectangular metric on X if p satisfies the following: (p1) p(x, y) ≥ 0, for all x, y ∈ X; (p2) x = y if and only if p(x, y) = p(x, x) = p(y, y), for all x, y ∈ X; (p3) p(x, x) ≤ p(x, y), for all x, y ∈ X; (p4) p(x, y) = p(y, x), for all x, y ∈ X; (p5) p(x, y) ≤ p(x, w)+p(w, z)+p(z, y)−p(w, w)−p(z, z), for all x, y ∈ X and for all distinct points w, z ∈ X\{x, y}. If p is a partial rectangular metric on X, then a pair (X, p) is called a partial rectangular metric space. Remark 1.3 [16] In a partial rectangular metric space (X, p), if x, y ∈ X and p(x, y) = 0, then x = y but the converse may not be true. Remark 1.4 [16] It is clear that every rectangular metric space is a partial rectangular metric space with zero self-distance. However, the converse of this fact need not hold.

2

92

Suparat Baiya et al 91-109

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Example 1.5 [16] Let X = [0, d], α ≥ d ≥ 3 and define a mapping p : X ×X → [0, ∞) by  if x = y;  x 3α+x+y if x, y ∈ {1, 2}, x ̸= y; p(x, y) = 2  α+x+y otherwise. 2 Then (X, p) is a partial rectangular metric space but it is not a rectangular metric space. Moreover, (X, p) is not a partial metric space. Proposition 1.6 [16] For each partial rectangular metric space (X, p), the pair (X, dp ) is a rectangular metric space where dp (x, y) = 2p(x, y) − p(x, x) − p(y, y), for all x, y ∈ X. Definition 1.7 [16] Let (X, p) be a partial rectangular metric space, {xn } be a sequence in X and x ∈ X. Then, (i) the sequence {xn } is said to converges to x ∈ X if lim p(xn , x) = p(x, x); n→∞

(ii) the sequence {xn } is said to be a Cauchy sequence in (X, p) if

lim p(xn , xm )

n,m→∞

exists and is finite; (iii) (X, p) is said to be a complete partial rectangular metric space if for every Cauchy sequence {xn } in X, there exists x ∈ X such that lim p(xn , xm ) = lim p(xn , x) = p(x, x).

n,m→∞

n→∞

Lemma 1.8 [16] Let (X, p) be a partial rectangular metric space and let {xn } be a sequence in X. Then lim dp (xn , x) = 0 if and only if lim p(xn , x) = n→∞

n→∞

lim p(xn , xn ) = p(x, x).

n→∞

Lemma 1.9 [16] Let (X, p) be a partial rectangular metric space and let {xn } be a sequence in X. Then the sequence {xn } is a Cauchy sequence in (X, p) if and only if it is a Cauchy sequence in (X, dp ). Lemma 1.10 [16] A partial rectangular metric space (X, p) is complete if and only if a rectangular metric space (X, dp ) is complete. In 2014, Popescu [13] introduced the definitions of α-orbital admissible mappings and triangular α-orbital admissible mappings including α-orbital attractive mappings. Definition 1.11 [13] Let T : X → X be a mapping and α : X × X → [0, ∞) be a function. Then T is said to be α-orbital admissible if for all x ∈ X, α(x, T x) ≥ 1 implies α(T x, T 2 x) ≥ 1. Definition 1.12 [13] Let T : X → X be a mapping and α : X × X → [0, ∞) be a function. Then T is said to be triangular α-orbital admissible if: (T3) T is α-orbital admissible; (T4) for all x, y ∈ X, α(x, y) ≥ 1 and α(y, T y) ≥ 1 imply α(x, T y) ≥ 1. 3

93

Suparat Baiya et al 91-109

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Definition 1.13 [13] Let T : X → X be a mapping and α : X × X → [0, ∞) be a function. Then T is said to be α-orbital attractive if for all x ∈ X, α(x, T x) ≥ 1 implies α(x, y) ≥ 1 or α(y, T x) ≥ 1 for all y ∈ X. We denote by Θ the set of all functions θ : (0, ∞) → (1, ∞) satisfying the following conditions: (Θ1) θ is non-decreasing; (Θ2) for each sequence {tn } ⊂ (0, ∞), lim θ(tn ) = 1 if and only if

n→∞

lim tn = 0+ ;

n→∞

(Θ3) there exist r ∈ (0, 1) and ℓ ∈ (0, ∞] such that lim+ t→0

θ(t)−1 tr

= ℓ.

Example 1.14 [6]√ The following functions θ : (0, ∞) → (1, ∞) are in Θ: (1) θ(t) = e√t ; t (2) θ(t) = e te ; (3) θ(t) = 2 − π2 arctan( t1γ ) where 0 < γ < 1. Very recently Jleli et al. [6, 7] established the following generalization of the Banach fixed point theorem in the setting of complete rectangular metric spaces. Theorem 1.15 [6] Let (X, d) be a complete rectangular metric space and T : X → X be a mapping. Suppose that there exist θ ∈ Θ and λ ∈ (0, 1) such that for all x, y ∈ X, d(T x, T y) ̸= 0 implies θ(d(T x, T y)) ≤ [θ(d(x, y))]λ . Then T has a unique fixed point. Theorem 1.16 [7] Let (X, d) be a complete rectangular metric space and T : X → X be a mapping. Suppose that there exist θ ∈ Θ and λ ∈ (0, 1) such that for all x, y ∈ X, d(T x, T y) ̸= 0 implies θ(d(T x, T y)) ≤ [θ(M (x, y))]λ , where M (x, y) = max{d(x, y), d(x, T x), d(y, T y)}. Then T has a unique fixed point. Later, Arshad et al. [1] extended the results proved by Jleli et al. [6, 7] by using the concept of triangular α-orbital admissible mappings. Theorem 1.17 [1] Let (X, d) be a complete rectangular metric space, T : X → X be a mapping and α : X × X → [0, ∞) be a function. Suppose that the

4

94

Suparat Baiya et al 91-109

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

following conditions hold : (1) there exist θ ∈ Θ and λ ∈ (0, 1) such that for all x, y ∈ X, d(T x, T y) ̸= 0 implies α(x, y) · θ(d(T x, T y)) ≤ [θ(R(x, y))]λ , where { d(x, T x)d(y, T y) } R(x, y) = max d(x, y), d(x, T x), d(y, T y), ; 1 + d(x, y) (2) there exists x1 ∈ X such that α(x1 , T x1 ) ≥ 1 and α(x1 , T 2 x1 ) ≥ 1; (3) T is a triangular α-orbital admissible mapping; (4) if {T n x1 } is a sequence in X such that α(T n x1 , T n+1 x1 ) ≥ 1 for all n ∈ N and xn → x ∈ X as n → ∞, then there exists a subsequence {T n(k) x1 } of {T n x1 } such that α(T n(k) x1 , x) ≥ 1 for all k ∈ N; (5) θ is continuous; (6) if z is a periodic point T , then α(z, T z) ≥ 1. Then T has a fixed point. Theorem 1.18 [1] Let (X, d) be a complete rectangular metric space, T : X → X be a mapping and α : X × X → [0, ∞) be a function. Suppose that the following conditions hold : (1) there exist θ ∈ Θ and λ ∈ (0, 1) such that for all x, y ∈ X, d(T x, T y) ̸= 0 implies α(x, y) · θ(d(T x, T y)) ≤ [θ(R(x, y))]λ , where { d(x, T x)d(y, T y) } R(x, y) = max d(x, y), d(x, T x), d(y, T y), ; 1 + d(x, y) (2) there exists x1 ∈ X such that α(x1 , T x1 ) ≥ 1 and α(x1 , T 2 x1 ) ≥ 1; (3) T is an α-orbital admissible mapping; (4) T is an α-orbital attractive mapping; (5) θ is continuous; (6) if z is a periodic point T , then α(z, T z) ≥ 1. Then T has a fixed point. In 2016, Chuadchawna [3] introduced the notion of triangular α-orbital admissible mappings with respect to η and proved the key lemma which will be used for proving our main results. Definition 1.19 [3] Let T : X → X be a mapping and α, η : X × X → [0, ∞) be functions. Then T is said to be α-orbital admissible with respect to η if for all x ∈ X, α(x, T x) ≥ η(x, T x) implies α(T x, T 2 x) ≥ η(T x, T 2 x). Definition 1.20 [3] Let T : X → X be a mapping and α, η : X × X → [0, ∞) be functions. Then T is said to be triangular α-orbital admissible with respect 5

95

Suparat Baiya et al 91-109

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

to η if (T1) T is α-orbital admissible with respect to η; (T2) for all x, y ∈ X, α(x, y) ≥ η(x, y) and α(y, T y) ≥ η(y, T y) imply α(x, T y) ≥ η(x, T y). Remark 1.21 If we suppose that η(x, y) = 1 for all x, y ∈ X, then Definition 1.19 and Definition 1.20 reduces to Definition 1.11 and Definition 1.12, respectively. Lemma 1.22 [3] Let T : X → X be a triangular α-orbital admissible mapping with respect to η. Assume that there exists x1 ∈ X such that α(x1 , T x1 ) ≥ η(x1 , T x1 ). Define a sequence {xn } by xn+1 = T xn . Then we have α(xn , xm ) ≥ η(xn , xm ) for all m, n ∈ N with n < m. Definition 1.23 Let T : X → X be a mapping and α, η : X × X → [0, ∞) be functions. Then T is said to be α-orbital attractive with respect to η if for all x ∈ X, α(x, T x) ≥ η(x, T x) implies α(x, y) ≥ η(x, y) or α(y, T x) ≥ η(y, T x) for all y ∈ X.

2

Main results

We now prove the following lemma needed in proving our result. The idea comes from [10] but the proof is slightly different. Lemma 2.1 Let (X, p) be a partial rectangular metric space and {xn } be a sequence in (X, p) such that p(xn , x) → p(x, x) as n → ∞ for some x ∈ X, p(x, x) = 0 and lim p(xn , xn+1 ) = 0. Then p(xn , y) → p(x, y) as n → ∞ for n→∞ all y ∈ X. Proof. Suppose that x ̸= y. If xn = y for arbitrarily large n, then p(y, x) = p(x, x) = p(y, y). Therefore x = y. Assume that y ̸= xn for all n ∈ N. We also suppose that xn ̸= x for infinitely many n. Otherwise, the result is complete. It follows that we may assume that xn ̸= xm ̸= x and xn ̸= xm ̸= y for all m, n ∈ N with m ̸= n. By the partial rectangular inequality, we have p(y, x) ≤ p(y, xn ) + p(xn , xn+1 ) + p(xn+1 , x) − p(xn , xn ) − p(xn+1 , xn+1 ) ≤ p(y, xn ) + p(xn , xn+1 ) + p(xn+1 , x) and p(y, xn ) ≤ p(y, x) + p(x, xn+1 ) + p(xn+1 , xn ) − p(x, x) − p(xn+1 , xn+1 ) ≤ p(y, x) + p(x, xn+1 ) + p(xn+1 , xn ). Since lim p(xn , xn+1 ) = 0 and taking the limit as n → ∞ in the above inequaln→∞ ities, we have lim sup p(y, xn ) ≤ p(y, x) ≤ lim inf p(y, xn ). n

n

Hence the proof is complete. 6

96

Suparat Baiya et al 91-109

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Theorem 2.2 Let (X, p) be a complete partial rectangular metric space, T : X → X be a mapping and let α, η : X × X → [0, ∞) be functions. Suppose that the following conditions hold : (1) there exist θ ∈ Θ and λ ∈ (0, 1) such that for all x, y ∈ X, p(T x, T y) > 0 and α(x, y) ≥ η(x, y) imply θ(p(T x, T y)) ≤ [θ(R(x, y))]λ , (2.1) where { p(x, T x)p(y, T y) } R(x, y) = max p(x, y), p(x, T x), p(y, T y), ; 1 + p(x, y) (2) there exists x1 ∈ X such that α(x1 , T x1 ) ≥ η(x1 , T x1 ); (3) T is a triangular α-orbital admissible mapping with respect to η; (4) if {T n x1 } is a sequence in X such that α(T n x1 , T n+1 x1 ) ≥ η(T n x1 , T n+1 x1 ) for all n ∈ N and T n x1 → x ∈ X as n → ∞, then there exists a subsequence {T n(k) x1 } of {T n x1 } such that α(T n(k) x1 , x) ≥ η(T n(k) x1 , x) for all k ∈ N; (5) θ is continuous; (6) if z is a periodic point T , then α(z, T z) ≥ η(z, T z). Then T has a fixed point. Proof. By (2), there exists x1 ∈ X such that α(x1 , T x1 ) ≥ η(x1 , T x1 ). Define the sequence {xn } in X by xn = T xn−1 = T n x1 for all n ∈ N. By Lemma 1.22, we obtain that α(T n x1 , T n+1 x1 ) ≥ η(T n x1 , T n+1 x1 ) for all n ∈ N.

(2.2)

If T n x1 = T n+1 x1 for some n ∈ N, then T n x1 is a fixed point of T . Thus we suppose that T n x1 ̸= T n+1 x1 for all n ∈ N. That is p(T n x1 , T n+1 x1 ) > 0. Applying (2.1), for each n ∈ N, we have θ(p(T n x1 , T n+1 x1 )) = θ(p(T (T n−1 x1 ), T (T n x1 ))) ≤ [θ(R(T n−1 x1 , T n x1 ))]λ ,

(2.3)

where

{ R(T n−1 x1 , T n x1 ) = max p(T n−1 x1 , T n x1 ), p(T n−1 x1 , T (T n−1 x1 )), p(T n x1 , T (T n x1 )), p(T n−1 x , T (T n−1 x ))p(T n x , T (T n x )) } 1

1

1

1

1 + p(T n−1 x1 , T n x1 )

{ = max p(T n−1 x1 , T n x1 ), p(T n−1 x1 , T n x1 ), p(T n x1 , T n+1 x1 ), p(T n−1 x , T n x )p(T n x , T n+1 x ) } 1

1

1

1

1 + p(T n−1 x1 , T n x1 ) = max{p(T n−1 x1 , T n x1 ), p(T n x1 , T n+1 x1 )}. If R(T n−1 x1 , T n x1 ) = p(T n x1 , T n+1 x1 ). By (2.3), we have θ(p(T n x1 , T n+1 x1 )) ≤ [θ(p(T n x1 , T n+1 x1 ))]λ . 7

97

Suparat Baiya et al 91-109

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

This implies that ln[θ(p(T n x1 , T n+1 x1 ))] ≤ λ ln[θ(p(T n x1 , T n+1 x1 ))], which is a contradiction with λ ∈ (0, 1). This implies that R(T n−1 x1 , T n x1 ) = p(T n−1 x1 , T n x1 ) for all n ∈ N. From (2.3), we obtain that θ(p(T n x1 , T n+1 x1 )) ≤ [θ(p(T n−1 x1 , T n x1 ))]λ for all n ∈ N. It follows that 1 ≤ θ(p(T n x1 , T n+1 x1 )) ≤ · · · ≤ [θ(p(x1 , T x1 ))]λ

n

for all n ∈ N.

(2.4)

Taking the limit as n → ∞ in the above inequality, we obtain that lim θ(p(T n x1 , T n+1 x1 )) = 1.

(2.5)

n→∞

By using condition (Θ2), we have lim p(T n x1 , T n+1 x1 ) = 0.

(2.6)

n→∞

From condition (Θ3), there exist r ∈ (0, 1) and ℓ ∈ (0, ∞] such that θ(p(T n x1 , T n+1 x1 )) − 1 = ℓ. n→∞ [p(T n x1 , T n+1 x1 )]r lim

Assume that ℓ < ∞. Let B = 2ℓ > 0. It follows that there exists n0 ∈ N such that θ(p(T n x , T n+1 x )) − 1 1 1 − ℓ ≤ B for all n ≥ n0 . [p(T n x1 , T n+1 x1 )]r This implies that θ(p(T n x1 , T n+1 x1 )) − 1 ≥ ℓ − B = B for all n ≥ n0 . [p(T n x1 , T n+1 x1 )]r Thus we have n[p(T n x1 , T n+1 x1 )]r ≤ An[θ(p(T n x1 , T n+1 x1 )) − 1] for all n ≥ n0 , where A = B1 . Assume that ℓ = ∞. Let B > 0 be an arbitrary positive number. It follows that there exists n0 ∈ N such that θ(p(T n x1 , T n+1 x1 )) − 1 ≥ B for all n ≥ n0 . [p(T n x1 , T n+1 x1 )]r This implies that n[p(T n x1 , T n+1 x1 )]r ≤ An[θ(p(T n x1 , T n+1 x1 )) − 1] for all n ≥ n0 , 8

98

Suparat Baiya et al 91-109

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

where A = that

1 B.

From the above two cases, there exist A > 0 and n0 ∈ N such

n[p(T n x1 , T n+1 x1 )]r ≤ An[θ(p(T n x1 , T n+1 x1 )) − 1] for all n ≥ n0 . Using (2.4), we have n

n[p(T n x1 , T n+1 x1 )]r ≤ An([θ(p(x1 , T x1 ))]λ − 1) for all n ≥ n0 .

(2.7)

Taking the limit as n → ∞ in the above inequality, we get that lim n[p(T n x1 , T n+1 x1 )]r = 0.

n→∞

This implies that there exists n1 ∈ N such that p(T n x1 , T n+1 x1 ) ≤

1 n1/r

for all n ≥ n1 .

(2.8)

We now prove that T has a periodic point. Suppose that T does not have periodic points. Thus T n x1 ̸= T m x1 for all n, m ∈ N such that n ̸= m. Using Lemma 1.22 and (2.1), we get that θ(p(T n x1 , T n+2 x1 )) = θ(p(T (T n−1 x1 ), T (T n+1 x1 ))) ≤ [θ(R(T n−1 x1 , T n+1 x1 ))]λ , where

{ R(T n−1 x1 , T n+1 x1 ) = max p(T n−1 x1 , T n+1 x1 ), p(T n−1 x1 , T (T n−1 x1 )), p(T n+1 x1 , T (T n+1 x1 )), p(T n−1 x , T (T n−1 x ))p(T n+1 x , T (T n+1 x )) } 1

1

1

1

1 + p(T n−1 x1 , T n+1 x1 )

{ = max p(T n−1 x1 , T n+1 x1 ), p(T n−1 x1 , T n x1 ), p(T n+1 x1 , T n+2 x1 ), p(T n−1 x , T n x )p(T n+1 x , T n+2 x ) } 1

1

1

1

1 + p(T n−1 x1 , T n+1 x1 ) = max{p(T n−1 x1 , T n+1 x1 ), p(T n−1 x1 , T n x1 ), p(T n+1 x1 , T n+2 x1 )}. Thus we have θ(p(T n x1 , T n+2 x1 )) ≤ [θ(max{p(T n−1 x1 , T n+1 x1 ), p(T n−1 x1 , T n x1 ), p(T n+1 x1 , T n+2 x1 )})]λ . It follows that θ(p(T n x1 , T n+2 x1 )) ≤ [max{θ(p(T n−1 x1 , T n+1 x1 )), θ(p(T n−1 x1 , T n x1 )), θ(p(T n+1 x1 , T n+2 x1 ))}]λ . (2.9) Let I be the set of n ∈ N such that un := max{θ(p(T n−1 x1 , T n+1 x1 )), θ(p(T n−1 x1 , T n x1 )), θ(p(T n+1 x1 , T n+2 x1 ))} 9

99

Suparat Baiya et al 91-109

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

= θ(p(T n−1 x1 , T n+1 x1 )). If |I| < ∞, then there exists N ∈ N such that, for every n ≥ N , max{θ(p(T n−1 x1 , T n+1 x1 )), θ(p(T n−1 x1 , T n x1 )), θ(p(T n+1 x1 , T n+2 x1 ))} = max{θ(p(T n−1 x1 , T n x1 )), θ(p(T n+1 x1 , T n+2 x1 ))}. For all n ≥ N, from (2.9), we obtain that 1 ≤ θ(p(T n x1 , T n+2 x1 )) ≤ [max{θ(p(T n−1 x1 , T n x1 )), θ(p(T n+1 x1 , T n+2 x1 ))}]λ . Taking the limit as n → ∞ in the above inequality and using (2.5), we get that lim θ(p(T n x1 , T n+2 x1 )) = 1.

n→∞

If |I| = ∞, then we can find a subsequence of {un }, denoted by {un }, such that un = θ(p(T n−1 x1 , T n+1 x1 )) for large n. From (2.9), we have 2

1 ≤ θ(p(T n x1 , T n+2 x1 )) ≤ [θ(p(T n−1 x1 , T n+1 x1 ))]λ ≤ [θ(p(T n−2 x1 , T n x1 ))]λ n

≤ · · · ≤ [θ(p(x1 , T 2 x1 ))]λ , for large n. Taking the limit as n → ∞ in the above inequality, we obtain that lim θ(p(T n x1 , T n+2 x1 )) = 1.

n→∞

(2.10)

Then in all cases, we obtain that (2.10) holds. By using (2.10) and (Θ2), we get that lim p(T n x1 , T n+2 x1 ) = 0. n→∞

As an analogous proof as above, from (Θ3), there exists n2 ∈ N such that 1

p(T n x1 , T n+2 x1 ) ≤

n1/r

for all n ≥ n2 .

(2.11)

Let M = max{n1 , n2 }. We consider the following two cases. Case 1: If m > 2 is odd, then m = 2L + 1 for some L ≥ 1. Using (2.8), for all n ≥ M , we get that p(T n x1 , T n+m x1 ) ≤ p(T n x1 , T n+1 x1 ) + p(T n+1 x1 , T n+2 x1 ) + p(T n+2 x1 , T n+2L+1 x1 )− p(T n+1 x1 , T n+1 x1 ) − p(T n+2 x1 , T n+2 x1 ) ≤ p(T n x1 , T n+1 x1 ) + p(T n+1 x1 , T n+2 x1 ) + p(T n+2 x1 , T n+2L+1 x1 ) ≤ p(T n x1 , T n+1 x1 ) + p(T n+1 x1 , T n+2 x1 ) + p(T n+2 x1 , T n+3 x1 )+ p(T n+3 x1 , T n+4 x1 ) + p(T n+4 x1 , T n+2L+1 x1 ) .. . ≤ p(T n x1 , T n+1 x1 ) + p(T n+1 x1 , T n+2 x1 ) + · · · + p(T n+2L x1 , T n+2L+1 x1 ) 1 1 1 ≤ 1/r + + ··· + (2.12) 1/r n (n + 1) (n + 2L)1/r ∞ ∑ 1 . ≤ 1/r i i=n 10

100

Suparat Baiya et al 91-109

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Case 2: If m > 2 is even, then m = 2L for some L ≥ 2. Using (2.8) and (2.11), for all n ≥ M , we get that p(T n x1 , T n+m x1 ) ≤ p(T n x1 , T n+2 x1 ) + p(T n+2 x1 , T n+3 x1 ) + p(T n+3 x1 , T n+2L x1 )− p(T n+2 x1 , T n+2 x1 ) − p(T n+3 x1 , T n+3 x1 ) ≤ p(T n x1 , T n+2 x1 ) + p(T n+2 x1 , T n+3 x1 ) + p(T n+3 x1 , T n+2L x1 ) ≤ p(T n x1 , T n+2 x1 ) + p(T n+2 x1 , T n+3 x1 ) + p(T n+3 x1 , T n+4 x1 )+ p(T n+4 x1 , T n+5 x1 ) + p(T n+5 x1 , T 2L x1 ) .. . ≤ p(T n x1 , T n+2 x1 ) + p(T n+2 x1 , T n+3 x1 ) + · · · + p(T n+2L−1 x1 , T n+2L x1 ) 1 1 1 + ··· + (2.13) ≤ 1/r + 1/r n (n + 2) (n + 2L − 1)1/r ∞ ∑ 1 ≤ . 1/r i i=n From Case 1 and Case 2, we have p(T n x1 , T n+m x1 ) ≤ Since the series

∑∞ i=n

1 1 1 + + ··· + n1/r (n + 1)1/r (n + 2L)1/r 1 i1/r

is convergent (since

1 r

for all n ≥ M.

(2.14) > 1) and (2.14), we have

lim p(T n x1 , T n+m x1 ) = 0.

n,m→∞

This implies that {T n x1 } is a Cauchy sequence in (X, p). By Lemma 1.9, we have {T n x1 } is a Cauchy sequence in (X, dp ). Since (X, p) is complete, then (X, dp ) is complete. This implies that there exists z ∈ X such that lim dp (T n x1 , z) = 0. Using Lemma 1.8, we have n→∞

lim p(T n x1 , z) = lim p(T n x1 , T n x1 ) = p(z, z).

n→∞

n→∞

By applying Proposition 1.6, we obtain that 2p(T n x1 , z) = dp (T n x1 , z) + p(T n x1 , T n x1 ) + p(z, z) ≤ dp (T n x1 , z) + p(T n x1 , T n+1 x1 ) + p(T n x1 , z). Therefore p(T n x1 , z) ≤ dp (T n x1 , z) + p(T n x1 , T n+1 x1 ) for all n ∈ N. Taking the limit as n → ∞, we obtain that p(z, z) = lim p(T n x1 , z) = 0. We now suppose n→∞

that p(z, T z) > 0. By condition (4), there exists a subsequence {T n(k) x1 } of {T n x1 } such that α(T n(k) x1 , z) ≥ η(T n(k) x1 , z) for all k ∈ N. Since T n x1 ̸= T m x1 for all n, m ∈ N with m ̸= n, without loss of generality, we can assume that T n(k)+1 x1 ̸= T z. And applying the condition (2.1), we obtain that θ(p(T n(k)+1 x1 , T z)) = θ(p(T (T n(k) x1 ), T z)) ≤ [θ(R(T n(k) x1 , z))]λ , 11

101

Suparat Baiya et al 91-109

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

where

{ R(T n(k) x1 , z) = max p(T n(k) x1 , z), p(T n(k) x1 , T (T n(k) x1 )), p(z, T z), p(T n(k) x1 , T (T n(k) x1 ))p(z, T z) } 1 + p(T n(k) x1 , z) { = max p(T n(k) x1 , z), p(T n(k) x1 , T n(k)+1 x1 ), p(z, T z), p(T n(k) x1 , T n(k)+1 x1 )p(z, T z) } . 1 + p(T n(k) x1 , z)

Thus we have

[ ( { θ(p(T n(k)+1 x1 , T z)) ≤ θ max p(T n(k) x1 , z), p(T n(k) x1 , T n(k)+1 x1 ), p(z, T z), p(T n(k) x1 , T n(k)+1 x1 )p(z, T z) })]λ . 1 + p(T n(k) x1 , z)

(2.15)

Taking the limit as k → ∞ in (2.15), using the continuity of θ and Lemma 2.1, we obtain that θ(p(z, T z)) ≤ [θ(p(z, T z))]λ < θ(p(z, T z)), which is a contradiction. Thus we obtain that p(z, T z) = 0. By Remark 1.3, we have T z = z, which contradicts to the assumption that T does not have a periodic point. Thus T has a periodic point, say z of period q. Suppose that the set of fixed points of T is empty. Then we have q > 1 and p(z, T z) > 0. By using (2.1) and condition (6), we get that q

θ(p(z, T z)) = θ(p(T q z, T q+1 z)) ≤ [θ(p(z, T z))]λ < θ(p(z, T z)), which is a contradiction. This implies that the set of fixed points of T is nonempty. Hence T has at least one fixed point. Example 2.3 Let X = {0, 1, 2, 3, 4, 5} and define p : X × X → [0, +∞) such that  if x = y;  x 2x+y if x, y ∈ {0, 1, 2}, x = ̸ y; p(x, y) = 2  2+x+2y otherwise. 2 Then (X, p) is a complete partial rectangular metric space. Since, for all x ∈ X and x > 0, then we have p(x, x) = x > 0. Therefore (X, p) is not a rectangular metric space. Define a mapping T : X → X by T 0 = T 1 = T 4 = 0, T 2 = T 3 = 2, and T 5 = 4. We can see that 0 and 2 are periodic points of T . Let α, η : X × X → [0, +∞) be functions defined by { 1 if x, y ∈ {0, 1, 2, 3}; α(x, y) = 0 otherwise. 12

102

Suparat Baiya et al 91-109

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

{ η(x, y) =

if x, y ∈ {0, 1, 2, 3}; 1 otherwise. 1 2



Also define θ : (0, ∞) → (1, ∞) by θ(t) = e t . We next illustrate that all conditions in Theorem 2.1 hold. Taking x1 = 1, we have α(1, T 1) = α(1, 0) = 1 ≥ 21 = η(1, 0) = η(1, T 1). Next, we prove that T is α-orbital admissible with respect to η. Let α(x, T x) ≥ η(x, T x). Thus x, T x ∈ {0, 1, 2, 3}. By the definitions of a, η, we obtain that α(T x, T 2 x) ≥ η(T x, T 2 x) for all x ∈ {0, 1, 2, 3}. It follows that T is α-orbital admissible with respect to η. Let α(x, y) ≥ η(x, y) and α(y, T y) ≥ η(y, T y). By definitions of α, η, we have x, y, T y ∈ {0, 1, 2, 3}. This yields α(x, T y) ≥ η(x, T y) for all x, y ∈ {0, 1, 2, 3}. This implies that T is triangular α-orbital admissible with respect to η. Let x, y ∈ X be such that p(T x, T y) > 0. We could observe that if x, y ∈ {0, 1, 4}, then T x = T y = 0. This implies that p(T x, T y) = 0. So we consider the following cases: • x ∈ {0, 1, 4} and y ∈ {2, 3} or • x ∈ {0, 1, 4} and y = 5 or • x = {2, 3} and y = 5. If x = 4 and y ∈ {2, 3} or x ∈ {0, 1, 4} and y = 5 or x = {2, 3} and y = 5, then we have α(x, y)  η(x, y). We divide the proof into four cases as follows: (1) If (x, y) ∈ {(0, 2), (2, 0)}, then { { } p(0, 0)p(2, 2) } R(0, 2) = max p(0, 2), p(0, 0), p(2, 2), = max 1, 0, 2, 0 = 2. 1 + p(0, 2) This implies that √

ψ(p(T 0, T 2)) = ψ(p(0, 2)) = ψ(1) = e

1



≤ [e

2 0.71

]

= [ψ(2)]0.71 ≤ [ψ(R(0, 2))]0.71 .

(2) If (x, y) ∈ {(1, 2), (2, 1)}, then { { p(1, 0)p(2, 2) } 2} R(1, 2) = max p(1, 2), p(1, 0), p(2, 2), = max 2, 1, 2, = 2. 1 + p(1, 2) 3 This implies that √

ψ(p(T 1, T 2)) = ψ(p(0, 2)) = ψ(1) = e

1



≤ [e

2 0.71

]

= [ψ(2)]0.71 ≤ [ψ(R(1, 2))]0.71 .

(3) If (x, y) ∈ {(0, 3), (3, 0)}, then { { p(0, 0)p(3, 2) } 9 } 9 R(0, 3) = max p(0, 3), p(0, 0), p(3, 2), = max 4, 0, , 0 = . 1 + p(0, 3) 2 2 This implies that √

ψ(p(T 0, T 3)) = ψ(p(0, 2)) = ψ(1) = e

1

√9 9 ≤ [e 2 ]0.5 = [ψ( )]0.5 ≤ [ψ(R(0, 3))]0.5 . 2

13

103

Suparat Baiya et al 91-109

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(4) If (x, y) ∈ {(1, 3), (3, 1)}, then { {9 9 9} 9 p(1, 0)p(3, 2) } R(1, 3) = max p(1, 3), p(1, 0), p(3, 2), = max , 1, , = . 1 + p(1, 3) 2 2 11 2 This implies that √

ψ(p(T 1, T 3)) = ψ(p(0, 2)) = ψ(1) = e

1

√9 9 ≤ [e 2 ]0.5 = [ψ( )]0.5 ≤ [ψ(R(1, 3))]0.5 . 2

It follows that ψ(p(T x, T y)) ≤ [ψ(R(x, y))]λ . Hence all assumptions in Theorem 2.1 are satisfied and thus T has a fixed point which are x = 0 and x = 2. We now prove the existence of the fixed point theorem by replacing triangular mappings and condition (4) in Theorem 2.2 by α-orbital attractive mappings. Theorem 2.4 Let (X, p) be a complete partial rectangular metric space, T : X → X be a mapping and let α, η : X × X → [0, ∞) be functions. Suppose that the following conditions hold : (1) there exist θ ∈ Θ and λ ∈ (0, 1) such that for all x, y ∈ X, p(T x, T y) > 0 and α(x, y) ≥ η(x, y) imply θ(p(T x, T y)) ≤ [θ(R(x, y))]λ , (2.16) where { p(x, T x)p(y, T y) } R(x, y) = max p(x, y), p(x, T x), p(y, T y), ; 1 + p(x, y) (2) there exists x1 ∈ X such that α(x1 , T x1 ) ≥ η(x1 , T x1 ) and α(x1 , T 2 x1 ) ≥ η(x1 , T 2 x1 ); (3) T is an α-orbital admissible mapping with respect to η; (4) T is an α-orbital attractive mapping with respect to η; (5) θ is continuous; (6) if z is a periodic point of T , then α(z, T z) ≥ η(z, T z). Then T has a fixed point. Proof. By (2), there exists x1 ∈ X such that α(x1 , T x1 ) ≥ η(x1 , T x1 ) and α(x1 , T 2 x1 ) ≥ η(x1 , T 2 x1 ). Define the iterative sequence {xn } in X such that xn = T xn−1 = T n x1 for all n ∈ N. Since T is an α-orbital admissible mapping with respect to η, we obtain that α(x1 , T x1 ) ≥ η(x1 , T x1 ) implies α(T x1 , T 2 x1 ) ≥ η(T x1 , T 2 x1 ) and α(x1 , T 2 x1 ) ≥ η(x1 , T 2 x1 ) implies α(T x1 , T 3 x1 ) ≥ η(T x1 , T 3 x1 ). By continuing this process, we get that α(T n x1 , T n+1 x1 ) ≥ η(T n x1 , T n+1 x1 ) for all n ∈ N

(2.17)

α(T n x1 , T n+2 x1 ) ≥ η(T n x1 , T n+2 x1 ) for all n ∈ N.

(2.18)

and

14

104

Suparat Baiya et al 91-109

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

If T n x1 = T n+1 x1 for some n ∈ N, then T n x1 is a fixed point of T . Thus we suppose that T n x1 ̸= T n+1 x1 for all n ∈ N. That is p(T n x1 , T n+1 x1 ) > 0. Applying (2.16) and (2.17), for each n ∈ N, we obtain that θ(p(T n x1 , T n+1 x1 )) = θ(p(T (T n−1 x1 ), T (T n x1 ))) ≤ [θ(R(T n−1 x1 , T n x1 ))]λ ,

(2.19)

where

{ R(T n−1 x1 , T n x1 ) = max p(T n−1 x1 , T n x1 ), p(T n−1 x1 , T n x1 ), p(T n x1 , T n+1 x1 ), p(T n−1 x , T n x )p(T n x , T n+1 x ) } 1

1

1

1

1 + p(T n−1 x1 , T n x1 ) = max{p(T n−1 x1 , T n x1 ), p(T n x1 , T n+1 x1 )}. If R(T n−1 x1 , T n x1 ) = p(T n x1 , T n+1 x1 ). By using (2.19), we get that θ(p(T n x1 , T n+1 x1 )) ≤ [θ(p(T n x1 , T n+1 x1 ))]λ . This implies that ln[θ(p(T n x1 , T n+1 x1 ))] ≤ λ ln[θ(p(T n x1 , T n+1 x1 ))], which is a contradiction with λ ∈ (0, 1). It follows that R(T n−1 x1 , T n x1 ) = p(T n−1 x1 , T n x1 ) for all n ∈ N. From (2.19), we obtain that θ(p(T n x1 , T n+1 x1 )) ≤ [θ(p(T n−1 x1 , T n x1 ))]λ for all n ∈ N. It follows that 1 ≤ θ(p(T n x1 , T n+1 x1 )) ≤ · · · ≤ [θ(p(x1 , T x1 ))]λ

n

for all n ∈ N.

(2.20)

Taking the limit as n → ∞, we obtain that lim θ(p(T n x1 , T n+1 x1 )) = 1.

n→∞

(2.21)

By using condition (Θ2), we have lim p(T n x1 , T n+1 x1 ) = 0.

n→∞

As in the proof of Theorem 2.2, we can prove that there exists n1 ∈ N such that 1

p(T n x1 , T n+1 x1 ) ≤

n1/r

for all n ≥ n1 .

(2.22)

We now prove that T has a periodic point. Suppose that T does not have periodic points. Thus T n x1 ̸= T m x1 for all n, m ∈ N such that n ̸= m. Using (2.16) and (2.18), we get that θ(p(T n x1 , T n+2 x1 )) = θ(p(T (T n−1 x1 ), T (T n+1 x1 ))) ≤ [θ(R(T n−1 x1 , T n+1 x1 ))]λ , 15

105

Suparat Baiya et al 91-109

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

where

{ R(T n−1 x1 , T n+1 x1 ) = max p(T n−1 x1 , T n+1 x1 ), p(T n−1 x1 , T n x1 ), p(T n+1 x1 , T n+2 x1 ), p(T n−1 x , T n x )p(T n+1 x , T n+2 x ) } 1

1

1

1

1 + p(T n−1 x1 , T n+1 x1 ) = max{p(T n−1 x1 , T n+1 x1 ), p(T n−1 x1 , T n x1 ), p(T n+1 x1 , T n+2 x1 )}. By the analogous proof in Theorem 2.2, we have lim p(T n x1 , T n+2 x1 ) = 0

n→∞

and there exists n2 ∈ N such that 1

p(T n x1 , T n+2 x1 ) ≤

n1/r

for all n ≥ n2 .

(2.23)

Let h = max{n1 , n2 }. We consider the following two cases. Case 1: If m > 2 is odd, then m = 2L + 1 for some L ≥ 1. By using (2.22), for all n ≥ h, we obtain that p(T n x1 , T n+m x1 ) ≤ p(T n x1 , T n+1 x1 ) + p(T n+1 x1 , T n+2 x1 ) + p(T n+2 x1 , T n+2L+1 x1 )− p(T n+1 x1 , T n+1 x1 ) − p(T n+2 x1 , T n+2 x1 ) .. . ≤ p(T n x1 , T n+1 x1 ) + p(T n+1 x1 , T n+2 x1 ) + · · · + p(T n+2L x1 , T n+2L+1 x1 ) 1 1 1 + ··· + ≤ 1/r + 1/r n (n + 1) (n + 2L)1/r ∞ ∑ 1 ≤ . i1/r i=n Case 2: If m > 2 is even, then m = 2L for some L ≥ 2. By using (2.22) and (2.23), for all n ≥ h, we get that p(T n x1 , T n+m x1 ) ≤ p(T n x1 , T n+2 x1 ) + p(T n+2 x1 , T n+3 x1 ) + p(T n+3 x1 , T n+2L x1 )− p(T n+2 x1 , T n+2 x1 ) − p(T n+3 x1 , T n+3 x1 ) .. . ≤ p(T n x1 , T n+2 x1 ) + p(T n+2 x1 , T n+3 x1 ) + · · · + p(T n+2L−1 x1 , T n+2L x1 ) 1 1 1 + ··· + ≤ 1/r + n (n + 2)1/r (n + 2L)1/r ∞ ∑ 1 ≤ . 1/r i i=n

16

106

Suparat Baiya et al 91-109

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

From Case 1 and Case 2, we obtain that p(T n x1 , T n+m x1 ) ≤ Since the series

∑∞

1 n1/r 1

i=n i1/r

+

1 1 + ··· + 1/r (n + 1) (n + 2L)1/r

is convergent (since

1 r

for all n ≥ h.

(2.24) > 1) and (2.24), we have

lim p(T n x1 , T n+m x1 ) = 0.

n,m→∞

This implies that {T n x1 } is a Cauchy sequence in (X, p). By Lemma 1.9, we have {T n x1 } is a Cauchy sequence in (X, dp ). Since (X, p) is complete, then (X, dp ) is complete. This implies that there exists z ∈ X such that lim dp (T n x1 , z) = 0. Using Lemma 1.8, we have n→∞

lim p(T n x1 , z) = lim p(T n x1 , T n x1 ) = p(z, z).

n→∞

n→∞

By applying Proposition 1.6, we obtain that 2p(T n x1 , z) = dp (T n x1 , z) + p(T n x1 , T n x1 ) + p(z, z) ≤ dp (T n x1 , z) + p(T n x1 , T n+1 x1 ) + p(T n x1 , z). Therefore p(T n x1 , z) ≤ dp (T n x1 , z) + p(T n x1 , T n+1 x1 ) for all n ∈ N. Taking the limit as n → ∞, we obtain that p(z, z) = lim p(T n x1 , z) = 0. We now prove n→∞ that z = T z. Suppose that z ̸= T z. Since T is α-orbital attractive with respect to η, we obtain that for all n ∈ N, α(T n x1 , z) ≥ η(T n x1 , z) or α(z, T n+1 x1 ) ≥ η(z, T n+1 x1 ). We divide the proof in two cases as follows. (1) There exists an infinite subset J of N such that α(T n(k) x1 , z) ≥ η(T n(k) x1 , z) for every k ∈ J. (2) There exists an infinite subset L of N such that α(z, T n(k)+1 x1 ) ≥ η(z, T n(k)+1 x1 ) for every k ∈ L. For the case (1), since T n x1 ̸= T m x1 for all n, m ∈ N with n ̸= m, without loss of the generality, we can assume that T n(k)+1 x1 ̸= z for all k ∈ J. Applying the condition (2.16), we get that θ(p(T n(k)+1 x1 , T z)) = θ(p(T (T n(k) x1 ), T z)) ≤ [θ(R(T n(k) x1 , z))]λ , where

{ R(T n(k) x1 , z) = max p(T n(k) x1 , z), p(T n(k) x1 , T (T n(k) x1 )), p(z, T z), p(T n(k) x1 , T (T n(k) x1 ))p(z, T z) } 1 + p(T n(k) x1 , z) { = max p(T n(k) x1 , z), p(T n(k) x1 , T n(k)+1 x1 ), p(z, T z), p(T n(k) x1 , T n(k)+1 x1 )p(z, T z) } . 1 + p(T n(k) x1 , z) 17

107

Suparat Baiya et al 91-109

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Then we have

[ ( { θ(p(T n(k)+1 x1 , T z)) ≤ θ max p(T n(k) x1 , z), p(T n(k) x1 , T n(k)+1 x1 ), p(z, T z), p(T n(k) x1 , T n(k)+1 x1 )p(z, T z) })]λ . 1 + p(T n(k) x1 , z)

Taking the limit as k → ∞ in the above equality, using the continuity of θ and Lemma 2.1, we obtain that θ(p(z, T z)) ≤ [θ(p(z, T z))]λ < θ(p(z, T z)), which is a contradiction. For the case (2), the proof is similar. Therefore z = T z, which is a contradiction with the assumption that T does not have a periodic point. Thus T has a periodic point, say z of period q. Suppose that the set of fixed points of T is empty, Then we have q > 1 and p(z, T z) > 0. Applying (2.16) and condition (6), we get that θ(p(z, T z)) = θ(p(T q z, T q+1 z)) ≤ [θ(p(z, T z))]λ < θ(p(z, T z)), which is a contradiction. Thus the set of fixed points of T is non-empty. Hence T has at least one fixed point. Since a rectangular metric space is a partial rectangular metric space, we immediately obtain Theorem 17 and Theorem 19 in [1] by applying Theorem 2.2 and Theorem 2.4, respectively. Acknowledgement This research is partially supported by the Centre of Excellence in Mathematics, the Commission of Higher Education, Thailand. We would also like to express our deep thanks to Naresuan University, Thailand.

References [1] M. Arshad, E. Ameer, E. Karapinar: Beneralized contractions with triangular α-orbital admissible mapping on Branciari metric spaces, Inequal. Appl. 2016, Article ID 63 (2016) [2] A. Branciari: A fixed point theorem of Banach-Caccioppoli type on a class of generalized metric spaces. Publ. Math. (Debr.) 57, 31-37 (2000) [3] P. Chuadchawna, A. Kaewcharoen, S. Plubtieng: Fixed point theorems for generalized α-η-ψ-Geraghty contraction type mappings in αη-complete metric spaces. J. Nonlinear Sci. Appl., 471-485, 9 (2016) [4] P. Das: A fixed point theorem on a class of generalized metric spaces. Korean J. Math. Sci., 29-33, 9(2002)

18

108

Suparat Baiya et al 91-109

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[5] M. Jleli, B. Samet: The Kannans fixed point theorem in a cone rectangular metric space. J. Nonlinear Sci. Appl. 2(3), 161-197 (2009) [6] M. Jleli, B. Samet: A new generalization of the Banach contraction principle. J. Inequal. Appl., 38 (2014) [7] M. Jleli, E. Karapinar, B. Samet: Further generalizations of the Banach contraction principle. J. Inequal. Appl., 439 (2014) [8] E. Karapinar, P. Kumam, P. Salimi: On α-ψ-Meir-Keeler contractive mappings. Fixed Point Theory Appl. 94 (2013) [9] W. A. Kirk, N. Shahzad: Generalized metrics and Caristis theorem. Fixed Point Theory Appl. (2013) [10] W. A. Kirk, N. Shahzad: Fixed point theory in Distance spaces. Springer, cham, 1 (2014) [11] Z. Mustafa, J. R. Roshan, V. Parvaneh, Z. Kadelburg: Some common fixed point result in ordered partal b-metric spaces, Journal of Inequalities and Applications, 562 (2013). [12] S. G. Matthews: Partial metric topology. Annals of the New York Academy of Sciences, 183-197, 728 (1994) [13] O. Popescu: Some new fixed point theorems for α-Geraghty contraction type maps in metric spaces. Fixed Point Theory Appl. (2014) [14] V. La Rosa, P. Vetro: Fixed points for Geraghty-contractions in partial metric spaces, J. Nonlinear Sci. Appl., 7(2014) [15] T. Suzuki: Generalized metric space do not have the compativle topology, Abstr. Appl. Anal., (2014) [16] S. Shukla: Partial rectangular metric spaces and fixed point theorems, Sci. World J., 1-12, 7(2014)

19

109

Suparat Baiya et al 91-109

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On stability problems of a functional equation deriving from a quintic function D. Kang and H. Koh∗ Abstract. In this paper, we obtain a solution of new type quintic functional equations and prove the Hyers-Ulam-Rassias stability for a quintic functional equation by the directed method and a subaddtive function approach and also, present a counterexample. Finally, we investigate the Hyers-Ulam-Rassias stability for a quintic functional equation with an involution by the fixed point method.

1. Introduction and preliminaries The concept of stability problem of a functional equation was first posed by Ulam [18] concerning the stability of group homomorphisms. In 1941, Hyers [6] solved the problem of Ulam. This result was generalized by Aoki [1] for additive mappings and by Rassias [13] for linear mappings by considering an unbounded Cauchy difference. The paper of Rassias [13] has provided a lot of influence in the development of what we now call Hyers-Ulam-Rassias stability of functional equations. Since then, several stability problems for various functional equations have been investigated by numerous mathematicians; c.f e.g. [5], [20], [14], [2], [21] and [11]. In [4], Cho and et al. introduced the following quintic functional equation 2f (2x + y) + 2f (2x − y) + f (x + 2y) + f (x − 2y) = 20{f (x + y) + f (x − y)} + 90f (x) .

(1.1)

Since f (x) = x5 is a solution of the equation (1.1), the equation (1.1) is called a quintic functional equation. Stetkær [17] introduced the following quadratic functional equation with an involution f (x + y) + f (x + σ(y)) = 2f (x) + 2f (σ(y)) and solved the general solution, Belaid and et al. [3] established generalized Hyers-Ulam stability in Banach space for this functional equation. In this paper we consider the following another type quintic functional equation f (5x + y) + f (5x − y) + 3[f (x + y) + f (x − y)] = 2[f (4x + y) + f (4x − y)] + 2f (5x) − 4090f (x) (1.2) for all x, y ∈ X . Here our purpose is to find out a solution and to prove the generalized Hyers-UlamRassias stability problem and give a counterexample for the equation (1.2). Also, we introduce a quintic functional equation with an involution σ as follows; f (3x+y)+f (3x+σ(y))+5[f (x+y)+f (x+σ(y))] = 4[f (2x+y)+f (2x+σ(y))]+2f (3x)−246f (x) (1.3) for all x, y ∈ X . We will investigate the generalized Hyers-Ulam-Rassias stability for this functional equation by using a fixed point method. 02010

Mathematics Subject Classification: 39B52 and phrases: Hyers-Ulam-Rassias stability; functional equation; quintic mapping; subadditive function; involution 0∗ Corresponding author: [email protected] (H. Koh) 0Keywords

110

D. Kang et al 110-120

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Quintic Mapping

2

2. Solutions of Equations (1.2) and (1.3) In this section let X and Y be vector spaces and we will obtain the result that the functional equations (1.2) and (1.3) are solutions of a quintic functional equation by using 5-additive symmetric mapping. Before we proceed, we will introduce some basic concepts concerning 5-additive symmetric mappings. A mapping A5 : X 5 → Y is called 5-additive if it is additive in each variable. A mapping A5 is said to be symmetric if A5 (x1 , x2 , x3 , x4 , x5 ) = A5 (xσ(1) , xσ(2) , xσ(3) , xσ(4) , xσ(5) ) for every permutation {σ(1), σ(2), σ(3), σ(4), σ(5)} of {1, 2, 3, 4, 5} . If A5 (x1 , x2 , x3 , x4 , x5 ) is a 5-additive symmetric mapping, then A5 (x) will denote the diagonal A5 (x , x , x , x , x) and A5 (qx) = q 5 A5 (x) for all x ∈ X and all q ∈ Q . A mapping A5 (x) is called a monomial function of degree 5 (assuming A5 6≡ 0). On taking x1 = x2 = · · · = xs = x and xs+1 = xs+2 = · · · = x5 = y in A5 (x1 , x2 , x3 , x4 , x5 ) , it is denoted by As,5−s (x , y) . We note that the generalized concepts of n-additive symmetric mappings are found in [16] and [19]. Theorem 2.1. A function f : X → Y is a solution of the functional equation (1.2) if and only if f is of the form f (x) = A5 (x) for all x ∈ X , where A5 (x) is the diagonal of the 5-additive symmetric map A5 : X 5 → Y . Proof. Suppose f satisfies the functional equation (1.2). Letting x = 0 and replacing y by x in the equation (1.2), we have f (x) = −f (−x) , for all x ∈ X . Hence f is an odd mapping and also we have f (0) = 0 . Putting y = 0 in the equation (1.2), we get f (4x) = 45 f (x) , for all x ∈ X . Hence we have f (4n x) = 45n f (x) ,

(2.1)

1 for all x ∈ X and n ∈ N . Note that f (x) = 45n f (4n x) , for all x ∈ X and n ∈ N . On the other hand, we can rewrite the functional equation (1.2) in the following form

f (x) +

1 1 1 1 f (5x + y) + f (5x − y) − f (4x + y) − f (4x − y) 4090 4090 2045 2045 3 3 1 + f (x + y) + f (x − y) − f (5x) = 0 , 4090 4090 2045

for all x ∈ X . By [19, Theorem 3.5 and Theorem 3.6] f is a general polynomial function of degree at most 6, that is, f is of the following form f (x) = A5 (x) + A4 (x) + A3 (x) + A2 (x) + A1 (x) + A0 (x) for all x ∈ X . Note that A0 (x) = A0 is an arbitrary element of Y and Ai (x) is the diagonal of the i-additive symmetric map Ai : X i → Y for i = 1, 2, 3, 4, 5 . Since f (0) = 0 and f is odd, we have A0 (x) = A0 = 0 and A4 (x) = A2 (x) = 0 . It follows that f (x) = A5 (x) + A3 (x) + A1 (x) , for all x ∈ X . By (2.1) and An (rx) = rn An (x) whenever x ∈ X and r ∈ Q , we obtain 45 A5 (x) + 43 A3 (x) + 4A1 (x) = f (4x) = 45 f (x) = 45 A5 (x) + 45 A3 (x) + 45 A1 (x) , 16 3 for all x ∈ X . Then A1 (x) = − 17 A (x) , for all x ∈ X . Hence A3 (x) = A1 (x) = 0 , for all x ∈ X . Thus f (x) = A5 (x) . Conversely, suppose f (x) = A5 (x) for all x ∈ X , where A5 (x) is the diagonal of the 5-additive symmetric map A5 : X 5 → Y . We note that

A5 (ax + by)

= a5 A5 (x) + b5 A5 (y) + 5a4 bA4,1 (x, y) + 10a3 b2 A3,2 (x, y) +

10a2 b3 A2,3 (x, y) + 5ab4 A1,4 (x, y) ,

for all x , y ∈ X and a , b ∈ Q . The remains of the proof can be easily checked.

111



D. Kang et al 110-120

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Dongseung Kang and Heejeong Koh

3

Theorem 2.2. Let σ(x) = −x , for all x ∈ X . A function f : X → Y is a solution of the functional equation (1.3) if and only if f is of the form f (x) = A5 (x) for all x ∈ X , where A5 (x) is the diagonal of the 5-additive symmetric map A5 : X 5 → Y . Proof. Suppose f satisfies the functional equation (1.3). Letting x = y = 0 in the equation (1.3), we have f (0) = 0 . Putting y = 0 in the equation (1.3), we get f (2x) = 25 f (x) , for all x ∈ X . The remains are similar to the proof of Theorem 2.1.  3. Hyers-Ulam-Rassias stability of (1.2) in Banach spaces In this section, we investigate the generalized Hyers-Ulam-Rassias stability problem for the functional equation (1.2). Throughout this section, we assume that X is a normed real linear space with norm k · kX and Y is a real Banach space with norm k · kY . We use the abbreviation for the given mapping f : X → Y as follows: Df (x, y) := f (5x+y)+f (5x−y)+3[f (x+y)+f (x−y)]−2[f (4x+y)+f (4x−y)]−2f (5x)+4090f (x) for all x, y ∈ X . Theorem 3.1. Suppose that there exists a mapping φ : X 2 → R+ := [0, ∞) for which a mapping f : X → Y satisfies f (0) = 0 , ||Df (x, y)||Y ≤ φ(x, y)

(3.1)

P∞

1 j j and the series j=0 45j φ(4 x, 4 y) converges for all x, y ∈ X . Then there exists a unique quintic mapping Q : X → Y which satisfies the equation (1.2) and the inequality ∞ 1 X 1 φ(4j x, 0) , ||f (x) − Q(x)||Y ≤ 6 4 j=0 45j

(3.2)

for all x ∈ X . Proof. By letting y = 0 in the inequality (3.1), we have ||Df (x, 0)||Y = 46 ||f (x) −

1 f (4x)||Y ≤ φ(x, 0) , 45

that is, 1 1 f (4x)||Y ≤ 6 φ(x, 0) , 45 4 for all x ∈ X . For any positive integer k replacing x by 4k x and multiplying ||f (x) −

(3.3) 1 45k

1 1 1 1 f (4k x) − 5(k+1) f (4k+1 x)||Y ≤ 6 5k φ(4k x, 0) , 5k 4 4 4 4 for all x ∈ X . For any positive integers n and m with n > m , ||

||

n−1 1 1 X 1 m n f (4 x) − f (4 x)|| ≤ φ(4j x, 0) , Y 45m 45n 46 j=m 45j

1

in the inequality (3.3) , (3.4)

(3.5)

1 f (4n x)} is for all x ∈ X . As n → ∞ , the right-hand side in the inequality (3.5) close to 0. Hence { 45n a Cauchy sequence in the Banach space Y . Thus we can define a mapping Q : X → Y by

Q(x) = lim

n→∞

1 f (4n x) , 45n

for all x ∈ X .

112

D. Kang et al 110-120

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Quintic Mapping

4

By letting m = 0 in the inequality (3.5), we have ||f (x) −

n−1 1 X 1 1 n f (4 x)|| ≤ φ(4j x, 0) , Y 45n 46 j=0 45j

(3.6)

for all x ∈ X , n ∈ N . As n → ∞ in the inequality (3.6), ||f (x) − Q(x)||Y ≤

∞ 1 X 1 φ(4j x, 0) , 46 j=0 45j

(3.7)

for all x ∈ X . It satisfies the inequality (3.2). Now, replacing x and y by 4n x and 4n y respectively and dividing by 45n in the inequality (3.1) , we have 1 1 ||DQ(x, y)||Y = 5n ||Df (4n x, 4n y)||Y ≤ 5n φ(4n x, 4n y) , 4 4 for all x, y ∈ X . By taking n → ∞ , the definition of Q implies that Q satisfies (1.2) for all x, y ∈ X , that is, Q is the quintic mapping. Next, it remains to show the uniqueness. Assume that there exists T : X → Y satisfying (1.2) and (3.2). The Theorem 2.1 implies that T (4n x) = 45n T (x) and Q(4n x) = 45n Q(x) , for all x ∈ X . Then 1 ||T (4n x) − Q(4n x)||Y ||T (x) − Q(x)||Y = 45n  1  ||T (4n x) − f (4n x)||Y + ||f (4n x) − Q(4n x)||Y ≤ 5n 4 ∞ 2 X 1 φ(4n+j x, 0) , ≤ 6 5(n+j) 4 j=0 4 for all x ∈ X . By letting n → ∞ , we immediately have the uniqueness of Q .



Corollary 3.2. Let θ , r be positive real numbers with r < 5 and let f : X → Y be a mapping with f (0) = 0 such that ||Df (x, y)||Y ≤ θ(||x||rY + ||y||rY ) (3.8) for all x, y ∈ X . Then there exists a unique quintic mapping Q : X → Y satisfying ||f (x) − Q(x)||Y ≤

θ||x||rY 4(45 − 4r )

for all x ∈ X . Proof. On taking φ(x, y) = θ(||x||rY + ||y||rY ) for all x, y ∈ X , it is easy to show that the inequality (3.8) holds. Similar to the proof of Theorem 3.1, we have ||f (x) − Q(x)||Y



∞ 1 X 1 φ(4j x, 0) 46 j=0 45j

=

∞ θ X 4r ||x||rY 46 j=0 45j

=

θ ||x||rY 1 4 45 − 4r

for all x ∈ X and r < 5 .



Now, we will investigate the stability of the given quintic functional equation (1.2) using the subadditive function method under the condition that the space Y is a p-Banach space. Before proceeding the proof, we will state the the basic definition of subadditive function. It follows from the reference [12].

113

D. Kang et al 110-120

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Dongseung Kang and Heejeong Koh

5

A function φ : A → B having a domain A and a codomain (B, ≤) that are both closed under addition is called (1) a subadditive function if φ(x + y) ≤ φ(x) + φ(y) , for all x, y ∈ A . (2) a contractively subadditive function if there exists a constant L with 0 < L < 1 such that φ(x + y) ≤ L(φ(x) + φ(y)) , for all x, y ∈ A . We note that φ satisfies the following properties φ(2x) ≤ 2Lφ(x) and so φ(2nx) ≤ (2L)nφ(x) . It follows by the contractively subadditive condition of φ that φ(λx) ≤ λLφ(x) , and so φ(λj x) ≤ (λL)j φ(x), i ∈ N , for all x ∈ A and all positive integer λ ≥ 2 . (3) a expansively superadditive function if there exists a constant L with 0 < L < 1 such that φ(x + y) ≥ L1 (φ(x) + φ(y)) , for all x, y ∈ A . We note that φ satisfies the following properties φ(x) ≤ L2 φ(2x) and so φ( 2xn ) ≤ 2Ln φ(x) . We observe that an expansively superadditive mapping φ satisfies the following properties L λ x φ(x) and so φ( j ) ≤ ( )j φ(x), j ∈ N, L λ λ for all x ∈ A and all positive integer λ ≥ 2 . φ(λx) ≥

Theorem 3.3. Suppose that there exists a mapping φ : X 2 → R+ := [0, ∞) for which a mapping f : X → Y satisfies f (0) = 0 and ||Df (x, y)||Y ≤ φ(x, y)

(3.9) 4L 45

< 1 . Then for all x, y ∈ X and the map φ is contractively subadditive with a constant L such that there exists a unique quintic mapping Q : X → Y which satisfies the equation (1.2) and the inequality φ(x, 0) ||f (x) − Q(x)||Y ≤ p , p 4 45p − (4L)p

(3.10)

for all x ∈ X . Proof. By the inequalities (3.3) and (3.5) of the proof of Theorem 3.1, we have 1 1 f (4m x) − 5n f (4n x)||pY 45m 4 n−1 1 X 1 1 ≤ 6p ||f (4j x) − 5 f (4j+1 x)||pY 5jp 4 j=m 4 4 ||



n−1 1 X 1 φ(4j x, 0)p 46p j=m 45jp



n−1 1 X 1 (4L)jp φ(x, 0)p 46p j=m 45jp

=

n−1 φ(x, 0)p X  4L jp , 46p j=m 45

that is, ||

n−1 1 φ(x, 0)p X  4L jp p m n f (4 x) − f (4 x)|| ≤ , Y 45m 45n 46p j=m 45

1

114

(3.11)

D. Kang et al 110-120

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Quintic Mapping

6

1 f (4n x)} is a Cauchy sequence in the space for all x ∈ X , and for all m and n with m < n . Hence { 45n Y . Thus we may define 1 Q(x) = lim 5n f (4n x) , n→∞ 4 for all x ∈ X . Now, we will show that the map Q : X → Y is a generalized quintic mapping. Then

||DQ(x, y)||pY

||Df (4n x, 4n y)||pY n→∞ 45pn n φ(4 x, 4n y)p ≤ lim n→∞ 45pn 4L ≤ lim φ(x, y)p ( 5 )pn = 0 , n→∞ 4

=

lim

for all x ∈ X . Hence the mapping Q is a quintic mapping. Note that the inequality (3.11) implies the inequality (3.10) by letting m = 0 and taking n → ∞ . Assume that there exists T : X → Y satisfying (1.2) and (3.10). We know that T (4n x) = 45n T (x) , for all x ∈ X . Then ||T (x) −

1 f (4n x)||pY 45n

1

=

45pn

||T (4n x) − f (4n x)||pY

φ(4n x, 0)p − (4L)p )  4L pn φ(x, 0)p , ≤ 5 p 4 4 (45p − (4L)p ) 1



45pn

4p (45p

that is, ||T (x) −

 4L n 1 φ(x, 0) p , f (4n x)||Y ≤ 5n 4 45 4 p 45p − (4L)p

for all x ∈ X . By letting n → ∞ , we immediately have the uniqueness of Q .



4. Counterexample In this section, we will present a counterexample to show that the functional equation (1.2) is not stable for r = 5 in Corollary 3.2. Example 4.1. Let φ : R → R be a mapping defined by  θx5 for |x| < 1 φ(x) = θ otherwise where θ > 0 is a constant and a mapping f : R → R by f (x) =

∞ X φ(k i x) i=0

k 5i

(4.1)

for all x ∈ R . Then the mapping f satisfies the inequality |Df (x, y)| ≤ 4092

415 θ (|x|5 + |y|5 ) 45 − 1

(4.2)

for all x ∈ R . Then there does not exist a quintic mapping Q : R → R and a constant β > 0 such that |f (x) − Q(x)| ≤ β|x|5

(4.3)

for all x ∈ R .

115

D. Kang et al 110-120

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Dongseung Kang and Heejeong Koh

7

Proof. The definitions of φ and f imply that ∞ ∞ X φ(4i x) X θ θ45 ≤ |f (x)| = = 45i 45i 45 − 1 i=0 i=0 5

5 5 for all x ∈ R . Hence f is bounded by 4θ4 5 −1 . If |x| + |y| ≥ 1 , then the inequality (4.2) holds. Now, we 5 5 suppose that 0 < |x| + |y| < 1 . Then there exists a positive integer t such that 1 1 ≤ |x|5 + |y|5 < 5(t+1) . (4.4) 45(t+2) 4 1 Since |x|5 + |y|5 < 45(t+1) we have

1 1 and 45t y 5 < 5 . 5 4 4

45t x5 < That is,

1 1 and 4t y < . 4 4 These imply that 4t−1 x, 4t−1 y, 4t−1 5x, 4t−1 (x + y), 4t−1 (x − y), 4t−1 (4x + y), 4t−1 (4x − y), 4t−1 (5x + y), 4t−1 (5x − y) ∈ (−1, 1) . Hence we obtain that 4j x, 4j y, 4j 5x, 4j (x + y), 4j (x − y), 4j (4x + y), 4j (4x − y), 4j (5x + y), 4j (5x − y) ∈ (−1, 1) for each j = 0, 1, · · · , t − 1 . Also, for each j = 0, 1, · · · , t − 1 , 4t x
0 satisfying the inequality (4.3). Since f is bounded and continuous for all x ∈ R, Q is bounded on any open interval containing the origin and continuous at the origin. In the view of Corollary 3.2, Q(x) must have the form Q(x) = γx5 for all x ∈ R . Hence we have that ≤ 4092θ

|f (x)| ≤ (β + |γ|)|x|5 .

(4.5) 1

5t

But we can choose a positive integer m with mθ > β + |γ| . If x ∈ (0 , 45(m−1) ) , then 4 t = 0, 1, · · · , m − 1 . For this x , we have f (x) =

∞ X φ(4i x) i=0

45i



m−1 X i=0

116

∈ (0 , 1) for all

θ(4i x)5 = mθx5 > (β + |γ|)x5 45i

D. Kang et al 110-120

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Quintic Mapping

8

This implies that it is a contradiction to the inequality (4.5). Therefore the quintic functional equation (1.2) is not stable.  5. Hyers-Ulam-Rassias stability with an involution via a fixed point method In this section, we will investigate the Hyers-ulam-Rassias stability of a quintic functional equation with a involution over a non-Archimedean normed space X . A non-Archimedean field is a field K equipped with a (valuation) function from K into [0, ∞) satisfying the following properties: (1) |a| ≥ 0 and equality holds if and only if a = 0 , (2) |ab| = |a| |b| , (3) |a + b| ≤ max{|a| , |b|} for all a, b ∈ K . Clearly |1| = | − 1| = 1 and |n| ≤ 1 for all n ∈ N . An example of a non-Archimedean valuation is the function | · | taking everything except 0 into 1 and |0| = 0 ; see [10]. Also, the most important examples of non-Archimedean spaces are p-adic numbers; see [8]. We will reproduce the following definitions due to Moslehian and Sadeghi [9] and Mirmostafaee and Moslehian [8]. Definition 5.1. [9] Let X be a linear space over a field K with a non-Archimedean valuation | · | . A function || · || : X × X −→ [0, ∞) is said to be a non-Archimedean norm if it satisfies the following properties: (1) ||x|| = 0 if and only if x = 0 (2) ||rx|| = |r| · ||x|| (r ∈ K) (3) ||x + y|| ≤ max {||x|| , ||y||} , for all x, y ∈ X and r ∈ K . Then (X , || · ||) is called a non-Archimedean normed space. Before proceed the proof, we will introduce a notion of an involution. For an additive mapping σ : X → X with σ(σ(x)) = x for all x ∈ X , then σ is called an involution of X ; see [3] and [17]. Let (Y, || · ||) be a non-Archimedean normed space. We use the abbreviation for the given mapping f : X −→ Y as follows: Dσ f (x, y)

:= f (3x + y) + f (3x + σ(y)) + 5[f (x + y) + f (x + σ(y))] −4[f (2x + y) + f (2x + σ(y))] − 2f (3x) + 246f (x)

for all x, y ∈ X . The following statements are relative to the alternative of fixed point; see [7] and [15]. By using this method, we will prove the Hyers-Ulam-Rassias stability. Theorem 5.2 ( The alternative of fixed point [7], [15] ). Suppose that we are given a complete generalized metric space (Ω, d) and a strictly contractive mapping T : Ω → Ω with Lipschitz constant l . Then for each given x ∈ Ω , either d(T n x, T n+1 x) = ∞ for all n ≥ 0 , or there exists a natural number n0 such that (1) d(T n x, T n+1 x) < ∞ for all n ≥ n0 ; (2) The sequence (T n x) is convergent to a fixed point y ∗ of T ; (3) y ∗ is the unique fixed point of T in the set 4 = {y ∈ Ω|d(T n0 x, y) < ∞} ; (4) d(y, y ∗ ) ≤

1 1−l

d(y, T y) for all y ∈ 4 .

117

D. Kang et al 110-120

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Dongseung Kang and Heejeong Koh

9

Theorem 5.3. Suppose that φ : X 2 → [0, 1) is a mapping and there exists a real number l with 0 < l < 1 such that φ(2x , 2y) ≤ |2|lφ(x , y) , φ(x + σ(x) , y + σ(y)) ≤ |2|lφ(x , y)

(5.1)

for all x , y ∈ X . Let f : X → Y be a mapping such that f (0) = 0 and ||Dσ f (x, y)|| ≤ φ(x , y)

(5.2)

for all x , y ∈ X . Then there exists a unique quintic mapping Q : X → Y with an involution such that ||f (x) − Q(x)|| ≤

1 + |2|3 l Φ(x) |2|8 (1 − l)

(5.3)

where Φ(x) = max{φ(x , 0) , φ(0 , x)} for all x ∈ X . Proof. We will consider the following set Ω = {g | g : X → X , g(0) = 0} . Then there is the generalized metric on Ω , d(g, h) = inf {λ ∈ (0, ∞) | k g(x) − h(x) k≤ λΦ(x) , for all x ∈ X } . It is not hard to prove that (Ω, d) is a complete space. A function T : Ω → Ω is defined by 1 {g(2x) + g(x + σ(x))} (5.4) 25 for all x ∈ X . We know that there is an arbitrary positive constant λ with d(g, h) ≤ λ , for all g, h ∈ Ω . Then T (g)(x) =

||g(2x) − h(2x)|| ≤ |2|λ lΦ(x) and ||g(x + σ(x)) − h(x + σ(x))|| ≤ |2|λ lΦ(x)

(5.5)

for all x ∈ X . Hence we have ||T (g)(x) − T (h)(x)|| = ≤ ≤

1 ||g(2x) − h(2x) + g(x + σ(x)) − h(x + σ(x))|| |2|5 1 max {||g(2x) − h(2x)|| , ||g(x + σ(x)) − h(x + σ(x))||} |2|5 l λΦ(x) ≤ l λΦ(x) , |2|4

for all x ∈ X . This implies that d(T (g) , T (h)) ≤ l d(g , h) for all g , h ∈ Ω and hence T is a strictly contractive mapping with Lipschitz constant 0 < l < 1 . Now, letting y = 0 and x = 0 in the inequality (5.2), respectively we have 1 ||f (2x) − 25 f (x)|| ≤ 3 φ(x, 0) (5.6) |2| and ||2f (y) + 2f (σ(y))|| ≤ φ(0, y)

(5.7)

for all x , y ∈ X . Replacing y by x + σ(x) in the inequality (5.7), we get ||f (x + σ(x))|| ≤

1 φ(0, x + σ(x)) ≤ l φ(0, x) |2|

(5.8)

for all x ∈ X . The inequalities (5.6) and (5.7) imply that ||T (f )(x) − f (x)|| =

1 1 + |2|3 l ||f (2x) − 25 f (x) + f (x + σ(x))|| ≤ Φ(x) 5 |2| |2|8

118

(5.9)

D. Kang et al 110-120

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Quintic Mapping

10

3

l < ∞ . By Theorem 5.2, there exits a mapping for all x ∈ X . Hence we have d(T (f ) , f ) ≤ 1+|2| |2|8 n Q : X → Y such that limn→∞ d(T (f ) , Q) = 0 . Using mathematical induction, we may define

1 {f (2n x) + (2n − 1)f (2n−1 (x + σ(x)))} 25n for all x ∈ X and n ∈ N . Since limn→∞ d(T n (f ) , Q) = 0 , there exists a sequence {λn } in R such that λn → 0 as n → ∞ and d(T n f , Q) ≤ λn for n ∈ N . The definition of d implies that T n (f )(x) = lim

n→∞

||T n (f )(x) − Q(x)|| ≤ λn Φ(x) for all x ∈ X . For each fixed x ∈ X , we have lim ||T n (f )(x) − Q(x)|| = 0 .

n→∞

Thus we may conclude that Q(x) = lim

n→∞

1 {f (2n x) + (2n − 1)f (2n−1 (x + σ(x)))} 25n

(5.10)

for all x ∈ X and n ∈ N . Then ||Dσ Q(x , y)||

1 max {φ(2n x , 2n y) , |2n − 1|φ(2n−1 (x + σ(x)) , 2n−1 (y + σ(y))} |2|5n ln max {φ(x , y) , |2n − 1|φ(x , y)} ≤ lim n→∞ |2|4n ≤ lim ln φ(x , y) = 0 ≤

lim

n→∞

n→∞

for all x , y ∈ X . The mapping Q satisfies the Theorem 2.2. This means that Q is a quintic mapping. By Theorem 5.2, we have 1 1 + |2|3 l d(f , Q) ≤ d(T (f ) , f ) ≤ 8 . 1−l |2| (1 − l) This implies that the inequality (5.3) holds for all x ∈ X . The uniqueness of the quintic mapping follows from (3) in Theorem 5.2. 

References [1] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan 2 (1950) 64–66. [2] J.-H. Bae and W.-G. Park, On the generalized Hyers-Ulam-Rassias stability in Banach modules over a C ∗ −algebra, J. Math. Anal. Appl. 294 (2004), 196–205. [3] B. Boukhalene, E. Elqorachi and Th. M. Rassias, On the generalized Hyers-Ulam stability of the quadratic functional equation with a general involution, Nonlinear Funct. Anal. Appl. 12 no 2 (2007), 247-262. [4] I.G. Cho, D. Kang and H. Koh, Stability Problems of Quintic Mappings in Quasi-β-Normed Spaces, Journal of Inequalities and Applications, Article ID 368981, 9 pages, 2010 (2010). [5] S. Czerwik, On the stability of the quadratic mapping in normed spaces, Abh. Math. Sem. Univ. Hamburg 62 (1992), 59–64. [6] D.H. Hyers, On the stability of the linear equation, Proc. Nat. Acad. Sci. U.S.A. 27 (1941), 222– 224. [7] B. Margolis and J.B. Diaz, A fixed point theorem of the alternative for contractions on a generalized complete metric space, Bull. Amer. Math. Soc. 126 (1968), 305–309. [8] A.K. Mirmostafaee and M.S.Moslehian, Stability of additive mappings in non-Archimedean fuzzy normed spaces, Fuzzy Sets and Sys. 160 (2009) 1643–1652. [9] M.S. Moslehian and G. Sadeghi, A Mazur-Ulam theorem in non-Archimedean normed spaces, Nonlinear Anal. 69 (2008), 3405–3408.

119

D. Kang et al 110-120

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Dongseung Kang and Heejeong Koh

11

[10] L. Narici and E. Beckenstein, Strange terran-non-Archimedean spaces, Amer. Math. Monthly 88 (1981) 667–676. [11] C. Park, J.L. Cui and M.E. Gordji, Orthogonality and quintic functional equations, Acta Mathematica Sinica, English Series, 29 no. 7 (2013), 1381–1390. [12] J.M. Rassias and H.-M. Kim Generalized Hyers.Ulam stability for general additive functional equations in quasi-β-normed spaces, J. Math. Anal. Appl. 356 (2009), 302–309. [13] Th.M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 (1978), 297–300. [14] Th.M. Rassias and K. Shibata, Variational problem of some quadratic functions in complex analysis, J. Math. Anal. Appl. 228 (1998), 234–253. [15] I.A. Rus, Principles and Appications of Fixed Point Theory, Ed. Dacia, Cluj-Napoca, (1979) (in Romanian). [16] P.K. Sahoo, A generalized cubic functional equation, Acta Math. Sinica 21 no. 5 (2005), 1159– 1166. [17] H. Stetkær, Functional equations on abelian groups with involution, Aequationes Math. 54 (1997), 144-172. [18] S.M. Ulam, Problems in Morden Mathematics, Wiley, New York (1960). [19] T.Z. Xu, J.M. Rassias and W.X. Xu, A generalized mixed quadratic-quartic functional equation, Bull. Malaysian Math. Scien. Soc. 35 no. 3 (2012), 633–649. [20] P. G˘ avruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings, J. Math. Anal. Appl. 184, no. 3 (1994) 431–436. [21] J. Tabor, stability of the Cauchy functional equation in quasi-Banach spaces, Ann. Polon. Math. 83 (2004), 243–255. Mathematics Education, Dankook University, 152, Jukjeon, Suji, Yongin, Gyeonggi, 16890, Korea E-mail address: [email protected]; [email protected]

120

D. Kang et al 110-120

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Comparisons of isolation numbers and semiring ranks of fuzzy matrices Seok-Zun Song1,∗ and Young Bae Jun2 1 2

Department of Mathematics, Jeju National University, Jeju 63243, Korea

Department of Mathematics Education, Gyeongsang National University, Jinju 52828, Korea

Abstract. Let F be the fuzzy semiring and A be an m × n fuzzy matrix over F. The semiring rank of a fuzzy matrix A is the smallest k such that A can be factored as an m × k fuzzy matrix times a k × n fuzzy matrix. The isolation number of A is the maximum number of nonzero entries in A such that no two are in any row or any column, and no two are in a 2 × 2 submatrix of all nonzero entries. We have that the isolation number of A is a lower bound on the semiring rank of A. We also compare the isolation number with the Boolean rank of the support of A, and determine the equal cases of them.

1. Introduction There are many papers on the study of rank of matrices over several semirings containing binary Boolean algebra, fuzzy semiring, semiring of nonegative integers, and so on ([2], [3], [6], and [7]). But there are few papers on isolation numbers of matrices. Gregory et al ([7]) introduced set of isolated entries and compared Boolean rank with biclique covering number. Recently Beasley ([2]) introduced isolation number of Boolean matrix and compare it with Boolean rank. In this paper, we investigate the possible isolation number of fuzzy matrix and compare it with semiring rank of fuzzy matrix and the Boolean rank of the support of the fuzzy matrix. 2. Preliminaries A semiring is a binary system (S, +, ·) such that (S, +) is an abelian monoid with identity 0, (S, ·) is a monoid with identity 1, · distributes over + from both sides and 0 · s = s · 0 = 0 for all s ∈ S and 1 6= 0. We use juxtaposition for · for convenience. If (S, ·) is abelian then we say S is commutative. If 0 is the only element of S that has an additive inverse then S is antinegative. Note that all rings with unity are semirings, but none are antinegative. The set, Z+ , of nonnegative integers with usual addition and multiplication is an example of combinatorially interesting antinegative semiring. Let Mm,n (S) denote the set of all m × n matrices with entries in S with matrix addition and multiplication following the usual rules. Let Mn (S) = Mm,n (S) if m = n, let Im denote the m × m identity matrix, Om,n denote the zero matrix in Mm,n (S), Jm,n denote the matrix of all ones in Mm,n (S). The subscripts are usually omitted if the order is obvious, and we write I, O, J.

0

2010 Mathematics Subject Classification: 15A23; 15A03; 15B15. Keywords: semiring rank; fuzzy semiring; chain semiring; isolation number. The corresponding author. 0 E-mail : [email protected] (S. Z. Song); [email protected] (Y. B. Jun) 0



121

Seok-Zun Song et al 121-129

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Seok-Zun Song and Young Bae Jun The matrix A ∈ Mm,n (S) is said to be of semiring rank k if there exist matrices B ∈ Mm,k (S) and C ∈ Mk,n (S) such that A = BC and k is the smallest positive integer that such a factorization exists. We denote rS (A) = k. We say that a matrix A dominates a matrix B if ai,j = 0 implies bi,j = 0. Given a matrix X, we let x(j) denote the j th column of X and x(i) denote the ith row. Now if rS (A) = k and A = BC is a factorization of A ∈ Mm,n (S), then A = b(1) c(1) + b(2) c(2) + · · · + b(k) c(k) . Since each of the terms b(i) c(i) is a semiring rank one matrix, the semiring rank of A is also the minimum number of semiring rank one matrices whose sum is A. Let S be any set of two or more elements. If S is totally ordered by 2. By Lemma 3.7, b(A) 6= 3, and hence b(A) ≥ 4. Thus we choose A such that if b(A) > rB (C) > 2 then ι(C) > 2. Suppose that A = A1 + A2 + · · · + Ak for k = b(A) where each Ai is Boolean rank one, i.e., k is the minimum k such that b(A) = k and ι(A) = 2. Suppose that A1 has the fewest number of nonzero rows of the Ai ’s. As in the proof of the above lemma 3.7, permute the rows of A so that A1 has nonzero rows 1, 2, · · · , r1 . For j = 1, · · · , r1 , let Bj be the matrix whose first j rows are the first j rows of A and whose last m − j rows are all zero. Let Cj be the matrix whose first j rows are all zero and whose last m − j rows are the last m − j rows of A. Then A = Bj + Cj . Further any set of isolated entries of Cj is a set of isolated entries for A. Now, from b(A) ≤ b(Bj ) + b(Cj ), and the fact that b(Cj ) = b(Cj−1 ) or b(Cj ) = b(Cj−1 ) − 1, there is some t such that b(Ct ) = b(A) − 1. Since b(Ct ) < k by the choice of A, for this t, we have that ι(Ct ) > 2 since b(Ct ) ≥ 3. That is, ι(A) = ι(A) > 2, a contradiction. Now, as we can see in the following example, there is a matrix A ∈ Mm,n (F) such that ι(A) = 3 and b(A) is relative large, depending on m and n. Example 3.9. For n ≥ 3, let Dn = J \ I ∈ Mn (B). Then, it is easily shown that ι(Dn ) = 3 while b(Dn ) = k    k where k = min k : n ≤ , see [6](Corollary 2). So, ι(D20 ) = 3 while b(D20 ) = 6. k 2

A tournament matrix [T ] ∈ Mn (B) is the adjacency matrix of a directed graph called a tournament, T . It is characterized by [T ] ◦ [T ]t = O and [T ] + [T ]t = J − I. Now, for each k = 1, 2, · · · , min{m, n}, can we characterize the matrices in Mm,n (F) for which ι(A) = b(A) ? Of course it is done if k = 1 or k = 2 in the above theorems, but only in those cases. For k = m we can also find a characterization: Theorem 3.10. Let 1 ≤ m ≤ n and A ∈ Mm,n (F). Then, ι(A) = b(A) = m if and only if there exist permutation matrices P ∈ Mm (B) and Q ∈ Mn (B) such that P AQ = [B|C] where B = Im + T ∈ Mm (B) where T ∈ Mm (B) is dominated by a tournament matrix. (There are no restrictions on C.) Proof. Suppose that ι(A) = m. Then we permute A by permutation matrices P and Q so that the set of isolated entries are in the (d, d) positions, d = 1, · · · , m. That is, if X = P AQ then I = {x1,1 , x2,2 , · · · , xm,m } is the set of isolated entries in X. Therefore X = [B|C], with bi,i = xi,i = 1 and bi,j · bj,i = 0 for every i and j 6= i from the definition of the isolated entries. Thus, B = Im + T where T is an m square matrix which is dominated by a tournament matrix. Thus, P AQ = [B|C] where B = Im + T and clearly there are no conditions on C. Conversely, if P AQ = [B|C] and B = Im + T where T is an m square matrix which is dominated by a tournament matrix, then the diagonal entries of B form a set of isolated entries for P AQ and hence A has a set of m isolated entries. Thus ι(A) = b(A) = m. Corollary 3.11. Let 1 ≤ m ≤ n and A ∈ Mm,n (F). If there exist permutation matrices P ∈ Mm (B) and Q ∈ Mn (B) such that P AQ = [B|C] where B ∈ Mm (F) is a diagonal matrix or a triangular matrix with nonzero diagonal entries, then ι(A) = b(A) = m. 128

Seok-Zun Song et al 121-129

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Comparisons of isolation numbers and semiring ranks of fuzzy matrices Acknowledgement This research was supported by Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education (No. 2016R1D1A1B02006812).

References [1] K. Akiko, Complexity of the sex-equal stable marriage problem (English summary), Japan J. Indust. Appl. Math., 10(1993), 1-19. [2] L. B. Beasley, Isolation number versus Boolean rank, Linear Algebra Appl., 436(2012), 3469-3474. [3] L. B. Beasley and N. J. Pullman, Nonnegative rank-preserving operators, Linear Algebra Appl., 65(1985), 207-223. [4] J. A. Bondy and U. S. R. Murty, Graph Theory, Graduate texts in Mathematics 244, Springer, New York, 2008. [5] R. Brualdi and H. Ryser, Combinatorial Matrix Theory, Cambridge University Press, New York, 1991. [6] D. de Caen, D.A. Gregory,and N. J. Pullman, The Boolean rank of zero-one matrices, Proceedings of the Third Caribbean Conference on Combinatorics and Computing (Bridgetown), 169-173, Univ. West Indies, Cave Hill Campus, Barbados, 1981 [7] D. Gregory, N. J. Pullman, K. F. Jones and J. R. Lundgren, Biclique coverings of regular bigraphs and minimum semiring ranks of regular matrices. J. Combin. Theory Ser. B, 51(1991), 73-89. [8] G. Markowsky, Ordering D-classes and computing the Schein rank is hard, Semigroup Forum, 44(1992), 373-375.

129

Seok-Zun Song et al 121-129

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Some properties of certain difference polynomials Yong Liu, Yuqing Zhang and Xiaoguang Qi Abstract This research is a continuation of a recent paper [16]. In this paper, we utilize Nevanlinna Pkvalue distribution theory to study some properties of difference polynomial Yn (z) = j=1 vj y(z + ηj ) − ay n (z). Keywords: Meromorphic functions; Difference; Fixed point; Finite order.

1

Introduction and main results

In this article, we assume familiarity with the basics of Nevanlinna theory (see, e.g., [12, 17]). In addition, we will use the notation σ(y) to denote the order of the meromorphic function y(z), and λ(f ) and λ( y1 ) to denote, respectively, the exponent of convergence of zeros and poles of y(z). In 1959, Hayman [11] obtained the following famous theorem. Theorem A [11]. Let y(z) be a transcendental meromorphic function and a = 6 0, b be n 0 finite complex constants. Then y (z) + ay (z) − b has infinitely many zeros for n ≥ 5. If y(z) is transcendental entire, this holds for n ≥ 3, resp. n ≥ 2, if b = 0. Recently, several articles (see, e.g., [1-3, 5-10, 13-15]) have focused on complex difference equations and difference analogues of Nevanlinna’s theory. In 2013, the first author and Yi [16] established partial difference polynomial counterparts of Theorem A, and obtained the following result: Theorem B [16]. Let y(z) be a transcendental entire function P of finite order ρ(y), let a, b, aj , cj (j = 1, 2, · · · , k) be complex constants. Set Yn (z) = kj=1 aj y(z + cj ) − ay n (z),

2010 Mathematics Subject Classification. Primary 30D35, 39B12. The work was supported by the NNSF of China (No.10771121, 11301220, 11401387, 11661052, 11626112), the NSF of Zhejiang Province, China (No.

LQ 14A010007), the NSF of Shandong Province, China

(No. ZR2012AQ020) and the Fund of Doctoral Program Research of Shaoxing College of Art and Science(20135018).

1

130

Yong Liu et al 130-139

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

where n ≥ 3 isP an integer. Then Yn (z) have infinitely many zeros and λ(Fn (z) − b) = ρ(f ) provided that kj=1 aj (z)y(z + cj ) 6≡ b. Theorem C [16]. Suppose that y(z) be a finite order transcendental entire function with a Borel exceptional value d. Let a(z)(6≡ 0), b(z), aj (z)(j = 1, 2, · · · , k) be polynomials, and P let cj (j = 1, 2, · · · , k) be complex constants. If either d = 0 and kj=1 aj (z)y(z + cj ) 6≡ 0, P P or, d 6= 0 and kj=1 daj (z) − d2 a(z) − b(z) 6≡ 0, then F2 (z) − b(z) = kj=1 aj (z)f (z + cj ) − a(z)y 2 (z) − b(z) has infinitely many zeros and λ(Y2 (z) − b(z)) = ρ(y). In this paper, we will improve the above results from entire functions to meromorphic functions. Theorem 1.1. Suppose y(z) is a transcendental meromorphic function with exponent of convergence of poles λ( y1 ) < ρ(y) < ∞, suppose ηj (j = 1, 2, · · · , k) are complex constants, and a(z), vj (j = 1, 2, · · · , k) be polynomials, and ϕ(z) be a meromorphic function, small P compared to y(z). Suppose Yn (z) = kj=1 vj y(z + ηj ) − ay n (z), where n ≥ 3 is an integer, P and kj=1 vj (z)y(z + ηj ) 6≡ ϕ(z). Then λ(Yn (z) − ϕ(z)) = ρ(y). In Theorem 1.1, we consider difference polynomial Yn (z) with n ≥ 3. The following result is about the case n = 2 : Theorem 1.2. Suppose that y(z) is a finite order transcendental meromorphic function with two Borel exceptional value d, ∞. Suppose a(z)(6≡ 0), vj (z)(j = 1, 2, · · · , k) are polynomials, ϕ(z) is a meromorphic function, small compared to y(z), and suppose ηj (j = 1, 2, · · · , k) Pk are complex constants. If either d = 0 and j=1 vj (z)y(z + ηj ) 6≡ 0, or, d 6= 0 and Pk 2 dvj (z) − d a(z) − ϕ(z) 6≡ 0, then λ(Y2 (z) − ϕ(z)) = ρ(y), where Y2 (z) − ϕ(z) = Pj=1 k 2 j=1 vj (z)y(z + ηj ) − a(z)y (z) − ϕ(z). Example 1.3. Let y(z) = exp{z}−1 exp{z}+1 , a(z) = −1, η1 = 3πi, η2 = πi, η3 = 0, η4 = 5πi, η5 = 7πi, v1 (z) = 1, v2 (z) = −3, v3 (z) = −1, v4 (z) = 2, v5 (z) = 1, v6 (z) = · · · = vk (z) = 0, ϕ(z) = −1. Then we have Y2 (z) − ϕ(z) =

k X

vj (z)y(z + ηj ) − a(z)y 2 (z) − ϕ(z) =

j=1

8 exp{z} . (exp{z} + 1)2 (exp{z} − 1)

Here y(z) has no two Borel exceptional values, but Y2 (z) − ϕ(z) has no zeros. Hence the condition that y(z) has two Borel exceptional value cannot be omitted in Theorem 1.2.

2

Preliminary lemmas

In order to prove Theorem 1.1 and Theorem 1.2, we need the following lemmas.The following lemma is a generalisation of Borel’s Theorem on linear combinations of entire functions. Lemma 2.1 [17, pp.79 − 80] Let fj (z)(j = 1, 2, · · · , n)(n ≥ 2) be meromorphic function, gj (z)(j = 1, 2, · · · , n) be entire functions, and let them satisfy (i) f1 (z)eg1 (z) + · · · + fk (z)egk (z) ≡ 0; 2

131

Yong Liu et al 130-139

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(ii) when 1 ≤ j < k ≤ n, then gj (z) − gk (z) is not a constant. (iii) when 1 ≤ j ≤ n, 1 ≤ h < k ≤ n, then T (r, fj ) = o{T (r, egh −gk )} (r → ∞, r 6∈ E), where E ⊂ (1, ∞) is of finite linear measure or finite logarithmic measure. Then fj ≡ 0(j = 1, · · · , n). Let cj , (j = 1, · · · , n) be a finite collection of complex numbers. Then a difference polynomial in f (z) is a function which is polynomial in f (z + cj ) with meromorphic coefficients aλ (z) such that T (r, aλ ) = S(r, f ) for all λ. As for difference counterparts of the Clunie lemma, see [4; Corollary 3.3]. The following lemma due to Laine and Yang [14] is a more general version. Lemma 2.2 [14] Let f (z) be a transcendental meromorphic solution of finite order of a difference equation of the form U (z, f )P (z, f ) = Q(z, f ), where U (z, f ), P (z, f ), and Q(z, f ) are difference polynomials such that the total degree deg U (z, f ) = n in f (z) and its shifts, and deg Q(z, f ) ≤ n. Moreover, we assume that U (z, f ) contains just one term of maximal total degree in f (z) and its shifts. Then m(r, P (z, f )) = o

T (r + |c|, f )  + o(T (r, f )). rδ

The following lemma is a difference analogue of the logarithmic derivative lemma. Lemma 2.3 [8, 10] Let f (z) be a meromorphic function of finite order and let c be a non-zero complex number. Then we have  f (z + c)  m r, = S(r, f ). f (z)

Lemma 2.4 [8, 10] If f (z) is a transcendental meromorphic function with exponent of convergence of poles λ( f1 ) = λ < ∞, and let c be a non-zero complex number. Then for each ε > 0, we have N (r, f (z + c)) = N (r, f ) + O(rλ−1+ε ) + O(log r).

3

132

Yong Liu et al 130-139

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

3

Proof of Theorem 1.1

Combining Lemma 2.3 and Yn (z) − ϕ(z) =

Pk

j=1 vj y(z

+ ηj ) − ay n (z) − ϕ(z), we have

nm(r, y(z)) = m(r, ay n (z)) + O(log r) k  X  = m r, vj y(z + ηj ) − ϕ(z) − (Yn (z) − ϕ(z)) + O(log r) j=1

Pk



≤ m r, y(z)

j=1 vj y(z

+ ηj ) 

y(z) + m(r, Yn (z) − ϕ(z)) + m(r, ϕ(z)) + O(log r) k k  y(z + η )  X X j ≤ m(r, y(z)) + m r, + m(r, vj (z)) y(z) j=1

(1)

j=1

+ m(r, Yn (z) − ϕ(z)) + O(log r) = m(r, y(z)) + m(r, Yn (z) − ϕ(z)) + S(r, y). By λ( y1 ) < ρ(y), we obtain N (r, y) = O(rρ−1+ε ).

(2)

Hence, by (1) and (2), we have (n − 1)T (r, y) ≤ m(r, Yn (z) − ϕ(z)) + O(rρ−1+ε ) + S(r, y). P On the other hand, Lemma 2.3 and Yn (z) − ϕ(z) = kj=1 vj y(z + ηj ) − ay n (z) − ϕ(z) imply that T (r, Yn (z) − ϕ(z)) = m(r, Yn (z) − ϕ(z)) + N (r, Yn (z) − ϕ(z)) k  X  = m r, vj y(z + ηj ) − ay n (z) − ϕ(z) j=1 k  X  + N r, vj y(z + ηj ) − ay n (z) − ϕ(z)

(3)

j=1

≤ m(r, y(z)) +

k X j=1

k  y(z + η )  X j + T (r, vj ) m r, y(z) j=1

n

+ m(r, ay (z)) + (k + n)N (r, y) + T (r, ϕ(z)) ≤ (k + n)T (r, y(z)) + S(r, y). Together (1) with (3), we can obtain ρ(y) = ρ(Yn − ϕ(z)). We next break the rest of the proof into two parts. Case 1. If ρ(y) = 0, then by 0 ≤ λ(Yn − ϕ(z)) ≤ ρ(Yn − ϕ(z)) = ρ(y) = 0, we have λ(Yn − ϕ(z)) = ρ(y), we have proved Theorem 1.1.

4

133

Yong Liu et al 130-139

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Case 2. If ρ(y) > 0, then we assume λ(Yn − ϕ(z)) < ρ(y). By this and ρ(Yn − ϕ(z)) = ρ(y), Yn (z) − ϕ(z) can be written as Yn (z) − ϕ(z) =

k X

vj y(z + ηj ) − ay n (z) − ϕ(z)

j=1

(4)

r1 (z) = exp{q(z)} = p(z) exp{q(z)}, r2 (z) where q(z) is a nonzero polynomial, r1 (z) is an entire function with ρ(r1 ) < ρ(y), and r2 (z) is the canonical product formed with the poles Yn (z) − ϕ(z). So ρ(r2 ) = λ(r2 ) = λ( p1 ) ≤ λ( y1 ) < ρ(y), and ρ(p) ≤ max{ρ(r1 ), ρ(r2 )} < ρ(y). Differentiating (3) and eliminating exp{q(z)}, we get   y (n−1) (z) anp(z)y 0 (z) − a(p0 (z) + q 0 (z)p(z))y(z) k k X X = p(z)[ vj y 0 (z + ηj ) − ϕ0 (z)] − {p0 (z) + p(z)q 0 (z)}[ vj y(z + ηj ) − ϕ(z)]. j=1

(5)

j=1

We assume that anp(z)y 0 (z) − a(p0 (z) + q 0 (z)p(z))y(z) ≡ 0.

(6)

y n (z) = dp(z) exp{q(z)},

(7)

Integrating (6)

where d ∈ C \ {0} is a constant. Therefore, by (4) and (7), we obtain that Yn (z) − ϕ(z) =

k X

vj y(z + ηj ) − ay n (z) − ϕ(z) =

j=1

1 n y (z), d

(8)

by computing (8), we have k X  d vj y(z + ηj ) − ϕ(z) = (ad + 1)y n (z).

(9)

j=1

P By the condition of theorem 1.1, we know kj=1 vj y(z + ηj ) 6≡ ϕ(z), hence we have ad 6= −1. Differentiating (9) and then dividing by y 0 (z), we obtain k X vj y 0 (z + ηj )  ϕ0 (z) −d 0 = n(ad + 1)y n−1 (z). d 0 y (z) y (z)

(10)

j=1

5

134

Yong Liu et al 130-139

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

We have from (10) and Lemma 2.3 that (n − 1)m(r, y) = m(r, (ad + 1)y n−1 (z)) + O(1) k X vj y 0 (z + ηj )  ϕ0 (z) − d ) + O(1) = m(r, d y 0 (z) y 0 (z) j=1



k X j=1

m(r,

vj y 0 (z + ηj ) 1 ) + m(r, ϕ0 (z)) + m(r, 0 ) + O(1) 0 y (z) y

= S(r, y 0 ) + m(r, ϕ0 ) + m(r,

1 ) ≤ S(r, y 0 ) + T (r, y 0 ) = S(r, y) + T (r, y), y0

On the other hand, by (7), we know that the poles of y(z) comes from the poles of p(z), hence we obtain (n − 1)N (r, y) ≤ O(N (r, p)) so (n − 2)T (r, y) ≤ O(T (r, p)) + S(r, y) we can obtain ρ(y) ≤ ρ(p), a contradiction, since n ≥ 3. Hence p(z, y) 6≡ 0. Since n ≥ 3, Lemma 2.2 and (5) imply that m(r, anp(z)y 0 (z) − a(p0 (z) + q 0 (z)p(z))y(z)) T (r + |c|, y)  =o + o(T (r, y)) + O(m(r, p(z))), rδ

(11)

m(r, y(z)(anp(z)y 0 (z) − a(p0 (z) + q 0 (z)p(z))y(z))) T (r + |c|, y)  + o(T (r, y)) + O(m(r, p(z))), =o rδ

(12)

and

for all r outside of an exceptional set of finite logarithmic measure. From (11) and (12), we obtain m(r, y) = o

T (r + |c|, y)  + o(T (r, y)) + O(m(r, p(z))) rδ

(13)

for all r outside of an exceptional set of finite logarithmic measure. (13) and N (r, y) ≤ O(N (r, p)) yield that ρ(y) ≤ ρ(p). A contradiction. So λ(Yn (z) − ϕ(z)) = ρ(y). The proof of Theorem 1.1 is complete.

4

Proof of Theorem 1.2

Since y(z) has a Borel exceptional value d, we see that y(z) takes the form y(z) = d +

x(z) exp{µz k }, q(z)

(14)

6

135

Yong Liu et al 130-139

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

where µ ∈ C \ {0}, k ∈ N \ {0}, and x(z) is an entire function such that x(z)(6≡ 0), ρ(x) < k, and q(z) is the canonical product formed with the poles of y(z) satisfying ρ(q) = λ(q) = λ( y1 ) < ρ(y). (14) implies that y(z + ηj ) = d +

x(z + ηj ) xj (z) exp{µz k }, (j = 1, 2, · · · , k) q(z + ηj )

(15)

where xj (z) are entire functions, and ρ(xj ) = k − 1. If Y2 (z) − ϕ(z) is a rational function, then k X

vj (z)y(z + ηj ) − a(z)y 2 (z) − ϕ(z) = p(z),

(16)

j=1

where p(z) is a rational function, we deduce from Lemma 2.3 and (16) k  X  m(r, a(z)y 2 (z)) = m r, vj (z)y(z + ηj ) − ϕ(z) − p(z) j=1

≤ m(r, y(z)) +

k X

 y(z + η )  j + m(r, ϕ(z)) m r, y(z)

j=1

+ m(r, p(z)) +

k X

(17)

m(r, vj (z)) + S(r, y)

j=1

= m(r, y(z)) + S(r, y), We obtain form Lemma 2.4 k  X  N (r, a(z)y (z)) = N r, vj (z)y(z + ηj ) − ϕ(z) − p(z) 2

(18)

j=1

= kN (r, y) + O(rλ−1+ε ) + S(r, y). Together (17) and (18), we have k  X  T (r, a(z)y (z)) = T r, vj (z)y(z + ηj ) − ϕ(z) − p(z) 2

(19)

j=1

≤ T (r, y) + (k − 1)N (r, y) + O(rλ−1+ε ) + S(r, y). (16), (19) and T (r, ay 2 ) = 2T (r, y(z)) + S(r, y) imply that T (r, y) ≤ (k − 1)N (r, y) + O(rλ−1+ε ) + S(r, y). A contradiction, since λ( y1 ) < ρ(y). Hence Y2 (z) − ϕ(z) is transcendental. (14) and (15) imply that k X x(z + ηj ) x(z) Y2 (z) − ϕ(z) = ( vj (z) xj (z) − 2da(z) ) exp{µz k } q(z + ηj ) q(z) j=1

k

(20)

X x2 (z) − a(z) 2 exp{2µz k } + dvj (z) − d2 a(z) − ϕ(z). q (z) j=1

7

136

Yong Liu et al 130-139

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

By

x(z) q(z)

6≡ 0, we obtain ρ(Y2 (z) − ϕ(z)) = ρ(y) = k. Suppose λ(Y2 (z) − ϕ(z)) < ρ(y). Then Y2 (z) − ϕ(z) =

l(z) exp{βz k } = l ∗ (z) exp{βz k }, m(z)

(21)

where β ∈ C \ {0}, l(z) is an entire function satisfying ρ(l) < k, and ρ(m) = λ(m) = λ( y1 ) < ρ(y) = k. We obtain from (14), (15) and (21) (

k X

vj (z)

j=1

x(z + ηj ) x(z) x2 (z) xj (z) − 2da(z) ) exp{µz k } − a(z) 2 exp{2µz k } q(z + ηj ) q(z) q (z) k

= l ∗ (z) exp{βz } +

k X

(22) 2

dvj (z) − d a(z) + ϕ(z).

j=1

We divided the discussion into the following three cases. Case I. β 6= µ and β 6= 2µ, Lemma 2.1 and (22) imply that we have y(z) ≡ d. A contradiction.

x2 (z) q 2 (z)

≡ 0, by (14) and this,

Case II. β = µ and β 6= 2µ. By Lemma 2.1 and (22), we can obtain the similar method as case I, we also get a contradiction.

x2 (z) q 2 (z)

≡ 0, we use

Case III. β = 2µ and β 6= µ, we divided this into the following two subcases. Subcase I. If d = 0, then we obtain from (14), (15) and (20) k X

vj (z)

j=1

Since

x(z) q(z)

k X j=1

x(z + ηj ) x2 (z) xj (z) exp{µz k } − a(z) 2 exp{2µz k } − ϕ(z) = l ∗ (z) exp{βz k }. (23) q(z + ηj ) q (z) 6≡ 0, (23) implies that β = 2µ. Hence we can write (22) as follows

vj (z)

x(z + ηj ) x2 (z) xj (z) exp{µz k } − (a(z) 2 + l ∗ (z)) exp{2µz k } − ϕ(z) = 0. q(z + ηj ) q (z)

Combing Lemma 2.1 and (24), we have P sicne kj=1 vj (z)y(z + ηj ) 6≡ 0.

Pk

j=1 vj (z)x(z

(24)

+ ηj )xj (z) ≡ 0. This is impossible,

that d 6= 0. Using the similar method as above, we also obtain Pk Subcase II. Suppose 2 j=1 dvj (z) − d a(z) − ϕ(z) ≡ 0, a contradiction. So λ(Y2 (z) − ϕ(z)) = k.

Acknowledgements The authors are also grateful to the referee for providing many comments and suggestions for helping us to improve the paper.

8

137

Yong Liu et al 130-139

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

References [1] W. Bergweiler and J. K. Langley, Zeros of differences of meromorphic functions, Math. Proc. Camb. Philos. Soc. 142 (2007), 133-147. [2] Z. X. Chen, On value distribution of difference polynimials of meromorphic functions. Abstract and Applied Analysis. doi:10.1155/2011/239853. [3] Z. X. Chen, Value distribution of products of meromorphic functins and their differences. Taiwanese J. Math. 15 (2011), 1411-1421. [4] J. Clunie, On integral and meromorphic functions, J. Lond. Math. Soc. 37 (1962), 17-27. [5] Y. M. Chiang and S. J. Feng, On the Nevanlinna characteristic of f (z+η) and difference equations in the complex plane. Ramanujan. J. 16 (2008), 105-129. [6] Y. M. Chiang and S. J. Feng, On the growth of logarithmic differences, difference equotients and logarithmic derivatives of meromorphic functions. Trans. Amer. Math. Soc. 361 (2009), 3767-3791. [7] R. G. Halburd and R. Korhonen, Difference analogue of the lemma on the logarithmic derivative with applications to difference equatons. J. Math. Appl. 314 (2006), 477-487. [8] R. G. Halburd and R. Korhonen, Nevanlinna theory for the difference operator. Ann. Acad. Sci. Fenn. Math. 94 (2006), 463-478. [9] R. G. Halburd, R. Korhonen, Finite order solutions and the discrete Painlev´e equations, Proc. Lond. Math. Soc. 94 (2007), 443-474. [10] R. G. Halburd, R. Korhonen, Meromorphic solutions of difference equations, integrability and the discrete Painlev´e equations. J. Phys. A. 40 (2007), 1-38. [11] W. K. Hayman, Picard values of meromorphic functions and their derivatives. Ann. Math. 70 (1959), 9-42. [12] W. Hayman, Meromorphic Functions, Clarendon Press, Oxford, 1964. [13] K. Ishizaki and N. Yanagihara, Wiman-Valiron method for difference equations. Nagoya Math. J. 175 (2004), 75-102. [14] I. Laine and C. C. Yang, Clunie theorems for difference and q-difference polynomials, J. Lond. Math. Soc. (3)76 (2007), 556-566. [15] K. Liu and I. Laine, A note on value distribution of difference polynomials, Bull. Aust. Math. Soc. 81 (2010), 353-360. [16] Y. Liu and H. X. Yi, Properties of some difference polynomials, Proc. Japan Acad, 89 (2013), 29-33.

9

138

Yong Liu et al 130-139

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[17] C. C. Yang and H. X. Yi, Uniqueness of meromorphic Functions, Kluwer, Dordrecht, 2003. Yong Liu Department of Mathematics, Shaoxing College of Arts and Sciences, Shaoxing, Zhejiang 312000, China E-mail address: [email protected] Yuqing Zhang Archives, Shaoxing College of Arts and Sciences, Shaoxing, Zhejiang 312000, China E-mail address:[email protected] Xiaoguang Qi University of Jinan, School of Mathematics, Jinan, Shandong, 250022, P. R. China E-mail address: [email protected] or [email protected]

10

139

Yong Liu et al 130-139

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Stability of ternary Jordan bi-derivations on C ∗ -ternary algebras for bi-Jensen functional equation Sedigheh Jahedi1 , Vahid Keshavarz1∗ , Choonkil Park2∗ and Sungsik Yun3∗ 1

Department of Mathematics, Shiraz University of Technology, P. O. Box 71555-313, Shiraz, Iran 2 3

Research Institute for Natural Sciences, Hanyang Universityl, Seoul 04763, Korea

Department of Financial Mathematics, Hanshin University, Gyeonggi-do 18101, Korea [email protected], [email protected], [email protected], [email protected]

Abstract. In this paper, we prove the Hyers-Ulam stability of ternary Jordan bi-derivations on C ∗ -ternary algebras for bi-Jensen functional equation. 1. Introduction and preliminaries The stability problem of functional equations had been first raised by Ulam [15]. In 1941, Hyers [8] gave a first affirmative answer to the question of Ulam for Banach spaces. The generalizations of this result have been published by Aoki [1] and Rassias [14] for additive mappings and linear mappings, respectively. Several stability problems for various functional equations have been investigated in [3, 4, 6, 7, 11, 12, 13]. Let A be a C ∗ -ternary algebra (see [16]). An additive mapping D : A → A is called a ternary ring derivation if D([x, y, z]) = [D(x), y, z] + [x, D(y), z] + [x, y, D(z)] for all x, y, z ∈ A. An additive mapping D : A → A is called a ternary Jordan ring derivation if D([x, x, x]) = [D(x), x, x] + [x, D(x), x] + [x, x, D(x)] for all x ∈ A. The following definition was defined by Eshaghi Gordji et al. [5]. Definition 1.1. ([5]) Let A be a C ∗ -ternary algebra. A bi-additive mapping D : A × A → A is called a ternary bi-derivation if it satisfies D([x, y, z], w)

=

[D(x, w), y, z] + [x, D(y, w∗ ), z] + [x, y, D(z, w)],

D(x, [y, z, w])

=

[D(x, y), z, w] + [y, D(x∗ , z), w] + [y, z, D(x, w)]

for all x, y, z, w ∈ A. A bi-additive mapping D : A × A → A is called a ternary Jordan bi-derivation if it satisfies D([x, x, x], w)

=

[D(x, w), x, x] + [x, D(x, w∗ ), x] + [x, x, D(x, w)],

D(x, [w, w, w])

=

[D(x, w), w, w] + [w, D(x∗ , w), w] + [w, w, D(x, w)]

for all x, w ∈ A. Let A and B be C ∗ -ternary   algebras. A mapping J : A → A is called a Jensen mapping if J satisfies the x+y functional equation 2J 2 = J(x) + J(y). For a given mapping f : A × A → B , we define Jf (x, y, z, w) = 4f

x + y z + w , − f (x, z) − f (x, w) − f (y, z) − f (y, w) 2 2

0

*Corresponding authors. Keywords: Hyers-Ulam stability; bi-Jensen mapping; C ∗ -ternary algebra; ternary Jordan bi-derivation. 0 Mathematics Subject Classification 2010: Primary 17A40, 39B52, 39B82, 47Jxx, 46K70, 46B99.

0

140

Sedigheh Jahedi et al 140-145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Ternary Jordan bi-derivations on C ∗ -ternary algebras for all x, y, z, w ∈ A. A mapping f : A × A → B is called a bi-Jensen mapping if f satisfies the equation Jf (x, y, z, w) = 0 and the functional equation Jf = 0 is called a bi-Jensen functional equation. For more details about the result concerning such problems, see ([2, 9]). In this paper, we prove the Hyers-Ulam stability of ternary Jordan bi-derivations on C ∗ -ternary algebras for the bi-Jensen functional equation. 2. Stability of ternary Jordan bi-derivations on C ∗ -ternary algebras for the bi-Jensen functional equation Throughout this section, assume that A is a ternary C ∗ -algebra. We need the following lemmas to prove the main theorems. The following lemma was proved in [7]. Lemma 2.1. ([7]) Let f : A → A be an additive mapping. Then f ([a, a, a], w)

=

[f (a, w), a, a] + [a, f (a, w∗ ), a] + [a, a, f (a, w)],

f (a, [w, w, w])

=

[f (a, w), a, a] + [a, f (a, w∗ ), a] + [a, a, f (a, w)]

hold for all a, w ∈ A if and only if f ([a, b, c] + [b, c, a] + [c, a, b], [w, w, w])

=

[f (a, w), b, c] + [a, f (b, w∗ ), c] + [a, b, f (c, w)] + [f (b, w), c, a]

+[b, f (c, w∗ ), a]

+

[b, c, f (a, w)] + [f (c, w), a, b] + [c, f (a, w∗ ), b] + [c, a, f (b, w)],

f ([a, a, a], [b, c, w] + [c, w, b] + [w, b, c])

=

[f (a, b), c, w] + [b, f (a∗ , c), w] + [b, c, f (a, w)] + [f (a, c), w, b]

+[c, f (a∗ , w), b]

+

[c, w, f (a, b)] + [f (a, w), b, c] + [w, f (a∗ , b), c] + [w, b, f (a, w)]

hold for all a, b, c, w ∈ A. The following lemma was proved in [10]. Lemma 2.2. ([10]) Let f : A × A → A be a bi-Jensen mapping and let n be a positive integer. Then the following are equivalent: (1)

f (x, y) =

1 1 1 1 f (2n x, 2n y) + ( n − n )(f (2n x, 0) + f (0, 2n y)) + (1 − n )2 f (0, 0) 4n 2 4 2

holds for all x, y ∈ A. (2)

f (x, y) =

1 1 f (2n x, 2n y) + (2n − 1)(f (2n x, 0) + f (0, 2n y)) + (2n+1 − 3 + n )2 f (0, 0) n 4 4

holds for all x, y ∈ A. (3)

f (x, y) = 4n f (

1 1 1 1 x, n y) + (2n − 4n )(f ( n x, 0) + f (0, n y)) + (2n − 1)2 f (0, 0) n 2 2 2 2

holds for all x, y ∈ A. (4)

f (x, y) =

1 1 1 1 f (2n x, y) + n (1 − n )f (0, 2n y)) + (1 − n )2 f (0, 0) 2n 2 2 2

holds for all x, y ∈ A. (5)

f (x, y) =

1 1 1 1 f (2n x, y) + n+1 (1 − n )(f (x, 2n y) + f (−x, 2n y)) + (1 − n )2 f (0, 0) 2n 2 2 2

holds for all x, y ∈ A.

141

Sedigheh Jahedi et al 140-145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S. Jahedi, V. Keshavarz, C. Park, S. Yun Theorem 2.3. Let p ∈ (0, 1) and θ > 0. Let f : A × A → A be a mapping such that kJf (x, y, z, w)k ≤ θ(kxkp + kykp + kzkp + kwkp ),

(2.1)

kf ([x, y, z] + [y, z, x] + [z, x, y], w) − [f (x, w), y, z] + [x, f (y, w∗ ), z] − [x, y, f (z, w)] − [f (y, w), z, x] −[y, f (z, w∗ ), x] − [y, z, f (x, w)] − [f (z, w), x, y] − [z, f (x, w∗ ), y] − [z, x, f (y, w)]k ∗

(2.2)



+kf (x, [y, z, w] + [z, w, y] + [w, y, z]) − [f (x, y), z, w] − [y, f (x , z), w] − [y, z, f (x , w)] −[f (x, z), w, y] − [z, f (x∗ , w), y] − [z, w, f (x, y)] − [f (x, w), y, z] − [w, f (x∗ , y), z] − [w, y, f (x, z)]k ≤ θ(kxkp + kykp + kzkp + kwkp ) for all x, y, z, w ∈ A. Then there exists a unique ternary Jordan bi-derivation D : A × A → A such that kf (x, y) − D(x, y)k ≤



2 · 2p  2p + θ(kxkp + kykp ) 2(2 − 2p ) 4 − 2p

(2.3)

for all x, y, z, w ∈ A with D(0, 0) = f (0, 0). The mapping D : A × A → A is given by D(x, y) := lim

j→∞

1 1 1 f (2j x, 2j y) + lim j f (2j x, 0) + lim j f (0, 2j y) + f (0, 0) j→∞ 2 j→∞ 2 4j

for all x, y ∈ A Proof. By the same reasoning as in the proof of [10, Theorem 2], there exists a unique bi-Jensen mapping D : A × A → A satisfying (2.3). The mapping D : A × A → A is given by 1 f (2n x, 2n y), n→∞ 4n

D(x, y) := lim

lim

n→∞

1 1 f (2n x, 0) = lim n f (0, 2n y) = 0 n→∞ 2 2n

for all x, y ∈ A. It follows from (2.2) that

D([x, y, z] + [y, z, x] + [z, x, y], w) − [D(x, w), y, z] − [x, D(y, w∗ ), z] − [x, y, D(z, w)]

−[D(y, w), z, x] − [y, D(z, w∗ ), x] − [y, z, D(x, w)] − [D(z, w), x, y] − [z, D(x, w∗ ), y] − [z, x, D(y, w)]

+ D(x, [y, z, w] + [z, w, y] + [w, y, z]) − [D(x, y), z, w] − [y, D(x∗ , z), w] − [y, z, D(x∗ , w)]

−[D(x, z), w, y] − [z, f (x∗ , w), y] − [z, w, f (x, y)] − [f (x, w), y, z] − [w, f (x∗ , y), z] − [w, y, f (x, z)]  1

= lim n f (23n [x, y, z] + 23n [y, z, x] + 23n [z, x, y], 2n w) n→∞ 16 1 1 1 n −[ n f (2 x, 2n w), y, z] − [x, n f (2n y, 2n w∗ ), z] − [x, y, n f (2n z, 2n w)] 4 4 4 1 1 1 n n n n ∗ −[ n f (2 y, 2 w), z, x] − [y, n f (2 z, 2 w ), x] − [y, z, n f (2n x, 2n w)] 4 4 4

 1 1 1

−[ n f (2n z, 2n w), x, y] − [z, n f (2n x, 2n w∗ ), y] − [z, x, n f (2n y, 2n w)] 4 4 4

142

Sedigheh Jahedi et al 140-145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Ternary Jordan bi-derivations on C ∗ -ternary algebras  1

+ lim n f (2n x, 23n [y, z, w] + 23n [z, w, y] + 23n [z, w, y]) n→∞ 16 1 1 1 n − [ n f (2 x, 2n y), z, w] − [y, n f (2n x∗ , 2n z), w] − [y, z, n f (2n x, 2n w)] 4 4 4 1 1 1 n n n ∗ n − [ n f (2 x, 2 z), w, y] − [z, n f (2 x , 2 w), y] − [z, w, n f (2n x, 2n y)] 4 4 4

 1 1 1

n n n ∗ n − [ n f (2 x, 2 w), y, z] − [w, n f (2 x , 2 y), z] − [w, y, n f (2n x, 2n z)] 4 4 4 2np ≤ lim θ(kxkp + kykp + kzkp + kwkp ) = 0 n→∞ 16n for all x, y, z, w ∈ A. So D([x, y, z] + [y, z, x] + [z, x, y], w) = [D(x, w), y, z] + [x, D(y, w∗ ), z] + [x, y, D(z, w)] + [D(y, w), z, x] + [y, D(z, w∗ ), x] + [y, z, D(x, w)] + [D(z, w), x, y] + [z, D(x, w∗ ), y] + [z, x, D(y, w)] and D(x, [y, z, w] + [z, w, y] + [w, y, z]) = [D(x, y), z, w] + [y, D(x∗ , z), w] + [y, z, D(x∗ , w)] + [D(x, z), w, y] + [z, f (x∗ , w), y][z, w, f (x, y)] + [f (x, w), y, z] + [w, f (x∗ , y), z] + [w, y, f (x, z)] for all x, y, z, w ∈ A. Therefore, the mapping D is a unique ternary Jordan bi-derivation satisfying (2.3).  Now we prove the Hyers-Ulam stability of ternary Jordan bi-derivations on C ∗ -ternary algebras for the bi-Jensen mapping for the case p > 2 in the following theorem. Theorem 2.4. Let p > 2 and θ > 0. Let f : A × A → A be a mapping satisfying (2.1) and (2.2). Then there exists a unique ternary Jordan bi-derivation D : A × A → A such that kf (x, y) − D(x, y)k ≤



2p 2 · 2p  + θ(kxkp + kykp ) 2(2p − 2) 2p − 4

(2.4)

for all x, y ∈ A. Proof. By the same reasoning as in the proof of [10, Theorem 2], there exists a unique bi-Jensen mapping D : A × A → A satisfying (2.4). By Lemma 2.2, the mapping D : A × A → A is given by  x y   x  x y D(x, y) := lim 4j f ( j , j ) − f ( j , 0) − f (0, j ) + f (0, 0) + lim 2j f ( j , 0) + f (0, 0) j→∞ j→∞ 2 2 2 2 2   y j + lim 2 f (0, j ) + f (0, 0) + f (0, 0) j→∞ 2 for all x, y ∈ A. It follows from (2.2) that

D([x, y, z] + [y, z, x] + [z, x, y], w) − [D(x, w), y, z] − [x, D(y, w∗ ), z] − [x, y, D(z, w)]

−[D(y, w), z, x] − [y, D(z, w∗ ), x] − [y, z, D(x, w)] − [D(z, w), x, y] − [z, D(x, w∗ ), y] − [z, x, D(y, w)]

+ D(x, [y, z, w] + [z, w, y] + [w, y, z]) − [D(x, y), z, w] − [y, D(x∗ , z), w] − [y, z, D(x∗ , w)]

−[D(x, z), w, y] − [z, f (x∗ , w), y] − [z, w, f (x, y)] − [f (x, w), y, z] − [w, f (x∗ , y), z] − [w, y, f (x, z)]

143

Sedigheh Jahedi et al 140-145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S. Jahedi, V. Keshavarz, C. Park, S. Yun  1

= lim n f (23n [x, y, z] + 23n [y, z, x] + 23n [z, x, y], 2n w) n→∞ 16 1 1 1 − [ n f (2n x, 2n w), y, z] − [x, n f (2n y, 2n w∗ ), z] − [x, y, n f (2n z, 2n w)] 4 4 4 1 1 1 n n n n ∗ − [ n f (2 y, 2 w), z, x] − [y, n f (2 z, 2 w ), x] − [y, z, n f (2n x, 2n w)] 4 4 4

 1 1 1

n n n n ∗ − [ n f (2 z, 2 w), x, y] − [z, n f (2 x, 2 w ), y] − [z, x, n f (2n y, 2n w)] 4 4 4  1

+ lim n f (2n x, 23n [y, z, w] + 23n [z, w, y] + 23n [z, w, y]) n→∞ 16 1 1 1 n − [ n f (2 x, 2n y), z, w] − [y, n f (2n x∗ , 2n z), w] − [y, z, n f (2n x, 2n w)] 4 4 4 1 1 1 − [ n f (2n x, 2n z), w, y] − [z, n f (2n x∗ , 2n w), y] − [z, w, n f (2n x, 2n y)] 4 4 4

 1 1 1

− [ n f (2n x, 2n w), y, z] − [w, n f (2n x∗ , 2n y), z] − [w, y, n f (2n x, 2n z)] 4 4 4 2np θ(kxkp + kykp + kzkp + kwkp ) = 0 ≤ lim n→∞ 16n for all x, y, z, w ∈ A. So D([x, y, z] + [y, z, x] + [z, x, y], w) = [D(x, w), y, z] + [x, D(y, w∗ ), z] + [x, y, D(z, w)] + [D(y, w), z, x] + [y, D(z, w∗ ), x] + [y, z, D(x, w)] + [D(z, w), x, y] + [z, D(x, w∗ ), y] + [z, x, D(y, w)] and D(x, [y, z, w] + [z, w, y] + [w, y, z]) = [D(x, y), z, w] + [y, D(x∗ , z), w] + [y, z, D(x∗ , w)] + [D(x, z), w, y] + [z, f (x∗ , w), y][z, w, f (x, y)] + [f (x, w), y, z] + [w, f (x∗ , y), z] + [w, y, f (x, z)] for all x, y, z, w ∈ A. Now, let δ : A × A → A be another bi-Jensen mapping satisfying (2.4). By Lemma 2.2 and D(0, 0) = f (0, 0) = δ(0, 0), we have

x y x y



D(x, y) − δ(x, y) = 4n D( j , j ) − δ( j , j ) 2 2 2 2

x y x y x y

x y

≤ 4n D( j , j ) − f ( j , j ) + f ( j , j ) − δ( j , j ) 2 2 2 2 2 2 2 2 8  4n θ  2 p p + (kxk + kyk ), ≤ (n−1)p p 2 − 2 2p − 4 2 which tends to zero as n → ∞ for all x, y ∈ A. So we can conclude that D(x, y) = δ(x, y) for all x, y ∈ A. Thus the bi-Jensen mapping D : A × A → A is unique.  Now we prove the Hyers-Ulam stability of ternary Jordan bi-derivations on C ∗ -ternary algebras for the bi-Jensen mapping for the case p ∈ (1, 2) in the following theorem. Theorem 2.5. Let p ∈ (1, 2) and θ > 0. Let f : A × A → A be a mapping satisfying (2.1) and (2.2). Then there exists a unique ternary Jordan bi-derivation D : A × A → A such that  2p 4 · 2p  kf (x, y) − D(x, y)k ≤ p + θ(kxkp + kykp ) 2 − 2 4 − 2p for all x, y ∈ A. Proof. The rest of the proof is similar to the proof of Theorem 2.3.



Finally, we prove the Hyers-Ulam stability of ternary Jordan bi-derivations on C ∗ -ternary algebras for the bi-Jensen mapping for the case p ∈ (0, 1) in the following theorem.

144

Sedigheh Jahedi et al 140-145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Ternary Jordan bi-derivations on C ∗ -ternary algebras Theorem 2.6. Let p ∈ (0, 1), θ > 0 and δ > 0. Let f : A × A → A be a mapping satisfying (2.1), (2.2) and D(0, 0) = f (0, 0). Then there exists a unique ternary Jordan bi-derivation D : A × A → A such that kf (x, y) − D(x, y)k ≤

2p θ 2p θ kxkp + ( + θ)kykp + δ p 2(2 − 2 ) 2(2 − 2p )

for all x, y ∈ A with D(0, 0) = f (0, 0). The mapping D : A × A → A is given by 1 D(x, y) := lim j (f (2j x, y) + f (0, 2j y)) + f (0, 0) j→∞ 2 for all x, y ∈ A. Proof. The rest of the proof is similar to the proof of Theorem 2.3.



References [1] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan 2 (1950), 64–66. [2] J. Bae and W. Park,, On the solution of a bi-Jensen functional equation and its stability, Bull. Korean Math. Soc. 43 (2006), 499–507. [3] J. Bae and W. Park, Approximate bi-homomorphisms and bi-derivations in C ∗ -ternary algebras, Bull. Korean Math. Soc. 47 (2010), 195–209. [4] A. Ebadian, N. Ghobadipour and H. Baghban, Stability of bi-θ-derivations on JB ∗ -triples, Int. J. Geom. Methods Mod. Phys. 9 (2012), No. 7, Art. ID 1250051, 12 pages. [5] M. Eshaghi Gordji, S. Bazeghi, C. Park and S. Jang, Ternary Jordan ring derivations on Banach ternary algebras: A fixed point approach, J. Comput. Anal. Appl. 21 (2016), 829–834. [6] M. Eshaghi Gordji, V. Keshavarz, J. Lee and D. Shin, Stability of ternary m-derivations on ternary Banach algebras, J. Comput. Anal. Appl. 21 (2016), 640–644. [7] M. Eshaghi Gordji, V. Keshavarz, C. Park and J. Lee, Approximate ternary Jordan bi-derivations on Banach Lie triple systems, J. Comput. Anal. Appl. 21 (2017), 45–51. [8] D. H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. U. S. A. 27 (1941), 222–224. [9] K. Jun, Y. Lee and M. Han, On the Hyers-Ulam-Rassias stability of the bi-Jensen functional equation, Kyungpook Math. J. 48 (2008), 705–720. [10] K. Jun, Y. Lee and J. Oh, On the Rassias stability of a bi-Jensen functional equation, J. Math. Inequal. 2 (2008), 366–375. [11] C. Park and M. Eshaghi Gordji, Comment on “Approximate ternary Jordan derivations on Banach ternary algebras [Bavand Savadkouhi et al., J. Math. Phys. 50 (2009), Art. ID 042303]”, J. Math. Phys. 51 (2010), Art. ID 044102. [12] C. Park, J. Lee and D. Shin, Stability of J ∗ -derivations, Int. J. Geom. Methods Mod. Phys. 9 (2012), No. 5, Art. ID 1220009, 10 pages. [13] C. Park and J.M. Rassias, Stability of the Jensen-type functional equation In C ∗ -algebras: A fixed point approach, Abs. Appl. Anal. 2009, Art. ID 360432, 17 pages, 2009. [14] Th.M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 (1978), 297–300. [15] S. M. Ulam, Problems in Modern Mathematics, Chapter VI, Science ed., Wiley, New York, 1940. [16] H. Zettl, A chararcterization of ternary rings of operators, Adv. Math. 48 (1983), 117–143.

145

Sedigheh Jahedi et al 140-145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1

A nonmonotone smoothing Newton algorithm for circular cone complementarity problems

Xiaoni Chia,† , Hongjin Weib , Zhongping Wanc and Zhibin Zhud a

School of Mathematics and Computing Science, Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin, Guangxi, China, 541004 b

School of Mathematics and Computer Science, the Key Disciplines for Operational

Research and Cybernetics of the Education Department of Guangxi Province, Guangxi Science & Technology Normal University, Laibin, Guangxi, China, 546100 c

School of Mathematics and Statistics, Wuhan University, Wuhan, Hubei, China, 430072

d

School of Mathematics and Computing Science, Guangxi Colleges and Universities Key

Laboratory of Data Analysis and Computation, Guilin University of Electronic Technology, Guilin, Guangxi, China, 541004

Abstract The circular cone complementarity problem (CCCP) is a particular nonsymmetric cone optimization problem, which is widely used in real engineering problems. In this paper, we first reformulate the CCCP as a nonlinear system of equations by a one-parametric class of smoothing functions, and then propose a nonmonotone smoothing Newton method for solving the CCCP. A new nonmonotone line search scheme is used in the proposed algorithm, which can help to improve the convergence speed of the algorithm and find the optimal solution more rapidly. Under suitable assumptions, the global convergence and local quadratic convergence are achieved. Finally, numerical results of the force optimization problem for a quadruped robot and random generated CCCPs illustrate the effectiveness of our new algorithm. † Corresponding author, E-mail: [email protected]. 146

Xiaoni Chi et al 146-162

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

Keywords circular cone complementarity problem, smoothing Newton method, nonmonotone line search, local quadratic convergence 2010 Mathematics Subject Classification: 90C25, 90C33 1

Introduction The circular cone (CC) [1] is a pointed closed convex cone having hyper-spherical sections orthogonal to its axis of revolution about which the cone is invariant to rotation. The ni dimensional circular cone Cθnii (i = 1, . . . , m) is given by Cθnii := {xi = (xi0 , xi1 ) ∈ R × Rni −1 | cos θi kxi k ≤ xi0 }

(1)

with the rotation angle θi ∈ (0, π2 ), where k·k represents the Euclidean norm. And (Cθnii )∗ (i = 1, . . . , m) is the dual cone of Cθnii (i = 1, . . . , m) defined by (Cθnii )∗ := {xi = (xi0 , xi1 ) ∈ R × Rni −1 | sin θi kxi k ≤ xi0 }. When θi = π4 , the circular cone Cθnii becomes the second-order cone (SOC) K ni (i = 1, . . . , m) [2] given by K ni := {xi = (xi0 , xi1 ) ∈ R × Rni −1 | kxi1 k ≤ xi0 }, (2) and the interior of the SOC K ni is expressed as (K ni )◦ := {xi = (xi0 , xi1 ) ∈ R × Rni −1 |kxi1 k < xi0 }. In this paper, we consider the circular cone complementarity problem (CCCP), that is to find a pair of vectors (x, y) ∈ Rn × Rn satisfying x ∈ Cθn , y = f (x) ∈ (Cθn )∗ , hx, yi = 0,

(3)

where h·, ·i refers to the Euclidean inner product, f : Rn → Rn is a continuously differentiable function, and Cθn ⊂ Rn is the Cartesian product of circular cones, i.e., Cθn = Cθn11 × Cθn22 × · · · × Cθnmm with n = n1 +n2 +· · ·+nm . Thus, the second-order cone complementarity problem (SOCCP) is a special class of the CCCP. Recently, the CCCP is widely used in real engineering problems. For example, it is easy to find that circular cone constraints are involved in force optimization problems for legged robots, the optimal grasping force manipulation for the multifingered hand-arm robot, and the control for quadruped robots [3, 4]. Furthermore, the nonsymmetric cone optimization plays an important role in combinatorial NP-hard problems and nonconvex quadratic problems [5]. Therefore, it is meaningful to study theories and algorithms for the CCCP. Zhou and Chen [6] studied the properties and spectral decomposition of the CC. In order to solve convex quadratic circular cone optimization problem, Wang et al. [7] proposed a primal-dual interior-point algorithm, and proved polynomial convergence of the proposed algorithm. Bai et al. [8] proposed interior-point methods for circular cone programming by kernel functions. Miao et al. [9] constructed some complementarity functions for the CCCP and proposed some merit functions for the CCCP. However, the algorithms for the CCCP are still rare at the moment. In contrast to nonsymmetric cone complementarity problems, there are many numerical methods [10-14] for solving symmetric cone complementarity problems, such as interior-point 147

Xiaoni Chi et al 146-162

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

3

methods [11], merit functions methods [12] and smoothing Newton methods [13, 14]. Among them, people pay more attention to smoothing Newton methods. Since Cθn and (Cθn )∗ in (3) are usually not the same cone with θ 6= 45◦ , we can not directly adopt smoothing Newton methods for the SOCCP to solve the CCCP (3). Note that in [6], for any xi = (xi0 , xi1 ) ∈ R × Rni −1 (i = 1, . . . , m) and y i = (y i0 , y i1 ) ∈ R × Rni −1 , the algebraic relationship between the CC and the SOC is as follows: xi ∈ K ni ⇔ Hi−1 xi ∈ Cθnii , y i ∈ K ni ⇔ Hi y i ∈ (Cθnii )∗ ,   tan θi where Hi =   0

(4)

 T

0

Ini −1

  , and H −1 denotes the inverse matrix of Hi . i 

Based on the algebraic relationship (4), the CCCP (3) can be rewritten as the SOCCP: find vectors (x, y) ∈ Rn × Rn satisfying x ∈ K n , y = H −1 f (H −1 x) ∈ K n , hx, yi = 0,

(5)

where K n = K n1 × K n2 × · · · × K nm with n = n1 + n2 + · · · + nm is the Cartesian product of SOCs, and H = H1 ⊕ H2 ⊕ · · · Hm . Thus a smoothing Newton method can be used to solve the SOCCP (5). Recently, in order to find the optimal solution more rapidly and improve the convergence speed of the algorithm, the nonmonotone line search has been adopted to solve symmetric cone complementarity problems [13, 14]. Therefore, we ask whether we can use a nonmonotone smoothing Newton method to solve the CCCP. We propose a nonmonotone smoothing Newton algorithm for solving the CCCP in this paper. Without restrictions regarding its starting point, the proposed algorithm performs one line search and solves one linear system of equations approximately at each iteration. The global convergence and local quadratic convergence are achieved without strict complementarity. Moreover, numerical results about the force optimization problem for a quadruped robot and random generated CCCPs illustrate the effectiveness of our new algorithm. For simplicity, in the following analysis, we assume that m = 1, i.e., Cθn = Cθn11 . This does not lose any generality, because we can easily extended our analysis to the general case. The organization of this paper is as follows. We briefly review the Euclidean Jordan algebra and some basic concepts in the next section. In Section 3, a smoothing function and its properties are given. In Section 4, we present a nonmonotone smoothing Newton method for solving the CCCP, and show its well-definedness under suitable assumptions. In Section 5, the global convergence and local quadratic convergence of the proposed algorithm are investigated. Some preliminary numerical results are reported in Section 6. Finally, we close this paper with some conclusions in Section 7. We use the following notations. Rn and R√denote the set of n-dimensional real column vectors and real numbers, respectively. kxk := xT x is the Euclidean norm for any x ∈ Rn . For convenience, we use x = (x0 , x1 ) instead of x = (x0 , (x1 )T )T ∈ R × Rn−1 . Given two matrices C and D, we define    C C ⊕D =  0

0  .  D 148

Xiaoni Chi et al 146-162

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

When % → 0, we write ν = o(%) (respectively, ν = O(%)) to mean that ν/% tends to zero (respectively, is uniformly bounded) for any ν, % > 0. 2

Preliminaries The Euclidean Jordan algebra associated with the SOC K n [2] plays an important role in this paper. For any x = (x0 , x1 ) ∈ R × Rn−1 and y = (y 0 , y 1 ) ∈ R × Rn−1 , we have the following Jordan algebra associated with the SOC K n x ◦ y = (xT y, x0 y 1 + y 0 x1 ). The unit element of this algebra is e = (1, 0, · · · , 0) ∈ Rn . For any x = (x0 , x1 ) ∈ R × Rn−1 , the symmetric matrix is defined by 



 x W(x) =  

0

x1

1 T

(x )

x0 In−1

 . 

It is easy to verify that x ◦ y = W(x)y = W(y)x, ∀x, y ∈ Rn . Furthermore, W(x) is invertible if and only if x ∈ (K n )◦ . Given x = (x0 , x1 ) ∈ R × Rn−1 , the spectral factorization of vectors in Rn associated with the SOC K n can be decomposed as x = λ1 (x)u(1) (x) + λ2 (x)u(2) (x), where λi (x) = x0 + (−1)i kx1 k, i = 1, 2, and

(i)

u (x) =

   

1 i x1 2 (1, (−1) kx1 k ),

if x1 6= 0,

  

1 i 2 (1, (−1) $),

otherwise,

i = 1, 2,

with any $ ∈ Rn−1 satisfying k$k = 1. Lemma 1 [11] Let a, b, r, g ∈ Rn and aK n 0, bK n 0, a ◦ bK n 0. If hr, gi ≥ 0 and a ◦ r + b ◦ g = 0, then r = g = 0. The concept of semismoothness is closely related to the local convergence of the proposed algorithm. Mifflin [15] originally introduced the concept of semismoothness for functionals. Then Qi and Sun [16] extended it to vector-valued functions. Definition 1 A locally Lipschitz function H : Rn → Rm , if H is directionally differentiable at x and for any V ∈ ∂H(x + ∆x), H(x + ∆x) − H(x) − V (∆x) = o(k∆xk),

149

Xiaoni Chi et al 146-162

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

5

where ∂H stands for the generalized Jacobian of H [17], then it is said to be semismooth at x. If H is semismooth at x and H(x + ∆x) − H(x) − V (∆x) = O(k∆xk2 ), then H is said to be strongly semismooth at x. Suppose a function H : Rn → Rm is (strongly) semismooth everywhere in Rn , then it is a (strongly) semismooth function. Next, we introduce the concept of a monotone function, which will be used in our subsequent analysis. Definition 2 [18] If a nonlinear mapping f : Rn → Rn for any x, y ∈ Rn with x 6= y satisfies hx − y, f (x) − f (y)i ≥ 0, then it is said to be a monotone function. Moreover, if there exists ξ > 0 such that hx − y, f (x) − f (y)i ≥ ξkx − yk2 , we say f is a strongly monotone function. When f is continuously differentiable, we have that f is monotone (respectively, strongly monotone) if and only if ∇f is positive-semidefinite (respectively, positive definite) for all x ∈ Rn . 3

A smoothing function and its properties Given any (x, y) ∈ Rn × Rn , we know that a one-parametric class of functions [12] p ϑτ (x, y) := x + y − (x − y)2 + 4τ (x ◦ y) (6)

with τ ∈ (0, 1) is an SOC complementarity function, i.e., ϑτ (x, y) = 0 ⇔ x ∈ K n , y ∈ K n , xT y = 0.

(7)

However, ϑτ (x, y) is not continuously differentiable at (0, 0) ∈ Rn × Rn , and thus it is nonsmooth. In this paper, we introduce the following smoothing function [19] of the SOC complementarity function (6) p ϑτ (µ, x, y) := x + y − (x − y)2 + 4τ (x ◦ y) + 4µ2 e, (8) where τ ∈ [0, 1) is a given constant. It is easy to see that (8) is continuously differentiable at any (µ, x, y) ∈ R++ × Rn × Rn . When τ = 0, ϑτ (µ, x, y) reduces to the well-known smoothing Chen-Harker-Kanzow-Smale function [20] p ϑ0 (µ, x, y) := x + y − (x − y)2 + 4µ2 e. When τ = 12 , ϑτ (µ, x, y) becomes the smoothing Fischer-Burmeister function [21] p ϑ 21 (µ, x, y) := x + y − x2 + y 2 + 4µ2 e.

(9)

Define Φτ (ω) by 



µ     Φτ (ω) :=  y − H −1 f (H −1 x)    ϑτ (µ, x, y) 150

       

(10)

Xiaoni Chi et al 146-162

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

with ω := (µ, x, y) ∈ R+ × Rn × Rn , where ϑτ (µ, x, y) is defined by (8). It follows from (3),(4),(5),(7) and (10) that Φτ (ω) = 0⇔(x, y) solves the SOCCP (5) ⇔(H −1 x, Hy) solves the CCCP (3). Therefore, when µ > 0, we can use the Newton’s method to solve the nonlinear system of equations Φτ (ω) = 0 approximately at each iteration. By driving kΦτ (ω)k → 0, we can find a solution of the SOCCP (5). Thus by the algebraic relationship (4), a solution of the CCCP (3) can be obtained. Theorem 1 Let the function Φτ (ω) be given as in (10). Then we have the following results. (i) Φτ (ω) is continuously differentiable at any ω = (µ, x, y) ∈ R++ × Rn × Rn with its Jacobian       Φ0τ (ω) =    

1

0

0

0

−H −1 f 0 (H −1 x)H −1

I

Cτ (ω)

Dτ (ω)

Eτ (ω)

    ,   

(11)

where Cτ (ω) = (ϑτ )0µ (ω) = −4µW −1 (ψτ )e, Dτ (ω) = (ϑτ )0x (ω) = I − W −1 (ψτ )W [x + (2τ − 1)y], (ϑτ )0y (ω)

−1

= I − W (ψτ )W [y + (2τ − 1)x], p ψ τ := (x − y)2 + 4τ (x ◦ y) + 4µ2 e.

Eτ (ω) =

(12) (13)

(ii) Suppose a function f is continuously differentiable and monotone, then Φ0τ (ω) is invertible for any ω = (µ, x, y) ∈ R++ × Rn × Rn . Proof (i) According to the proof of Proposition 2.1 [19], it is not difficult to see that (i) holds. (ii) Let an arbitrary vector ∆ω := (∆µ, ∆x, ∆y) ∈ R × Rn × Rn satisfy Φ0τ (ω)∆ω = 0. It is sufficient to show ∆ω = 0. By (11), Φ0τ (ω)∆ω = 0 gives ∆µ = 0,

(14)

−H −1 f 0 (H −1 x)H −1 ∆x + ∆y = 0,

(15)

Dτ (ω)∆x + Eτ (ω)∆y = 0.

(16)

Since f is a continuously differentiable and monotone function, we have by (15) h∆x, ∆yi = h∆x, H −1 f 0 (H −1 x)H −1 ∆xi = hH −1 ∆x, f 0 (H −1 x)H −1 ∆xi ≥ 0.

(17)

By (12), (13) and (16), we obtain {I − W −1 (ψτ )W [x + (2τ − 1)y]}∆x + {I − W −1 (ψτ )W [y + (2τ − 1)x]}∆y = 0.

(18)

Applying W (ψτ ) to both sides of (18) and using W (x)y = x ◦ y for any x, y ∈ Rn yield {ψτ − [x + (2τ − 1)y]} ◦ ∆x + {ψτ − [y + (2τ − 1)x]} ◦ ∆y = 0.

(19)

On the other hand, from the definition of ψτ , we have ψτ2 − [x + (2τ − 1)y]2 = 4τ (1 − τ )y 2 + 4µ2 eK n 0, 151

Xiaoni Chi et al 146-162

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

7

ψτ2 − [y + (2τ − 1)x]2 = 4τ (1 − τ )x2 + 4µ2 eK n 0. Thus it follows from Proposition 3.4 [21] that ψτ − [x + (2τ − 1)y]K n 0, {ψτ − [y + (2τ − 1)x]}K n 0.

(20)

Furthermore, note that {ψτ − [x + (2τ − 1)y]} ◦ {ψτ − [y + (2τ − 1)x]} (21) 2

2

= τ (ψτ − x − y) + 4(1 − τ )µ eK n 0. Therefore, from (17), (19)-(21) and Lemma 1, we have ∆x = ∆y = 0. The proof is completed. 4 A nonmonotone smoothing Newton algorithm for CCCP Let Φτ be defined by (10). We define

2

2 2 Ψτ (ω) := kΦτ (ω)k = µ2 + y − H −1 f (H −1 x) + kϑτ (µ, x, y)k .

(22)

Algorithm 1 (A nonmonotone smoothing Newton algorithm for CCCP) Step 0 Choose θ ∈ (0, π2 ), δ ∈ (0, 1), τ ∈ [0, 1), σ ∈ (0, 21 ) and µ0 > 0 . And choose γ ∈ (0, 1) such that γµ0 < 1. Let u := (µ0 , 0, 0) ∈ R++ × Rn × Rn and (x0 , y 0 ) ∈ Rn × Rn be an arbitrary point. Let ω 0 := (µ0 , x0 , y 0 ), Υ0 := Ψτ (ω 0 ) and φτ (ω 0 ) := γ min{1, Ψτ (ω 0 )}. Choose an integer

P ≥ 0.

Set k := 0, m(0) = 0. Step 1 If Φτ (ω k ) = 0, stop. Otherwise, let φτ (ω k ) := min γ{1, Ψτ (ω 0 ), ..., Ψτ (ω k )}.

(23)

Step 2 Compute ∆ω k := (∆µk , ∆xk , ∆y k ) ∈ R × Rn × Rn by Φτ (ω k ) + Φ0τ (ω k )∆ω k = φτ (ω k )u.

(24)

Step 3 Let λk = max{δ l | l = 0, 1, 2, . . .} such that Ψτ (ω k + λk ∆ω k ) ≤ [1 − 2σ(1 − γµ0 )λk ]Υk .

(25)

Step 4 Set ω k+1 := ω k + λk ∆ω k , k := k + 1. Step 5 Set m(k) = min {m(k − 1) + 1, P } and Ψτ (ω l(k) ) :=

max {Ψτ (ω k−j )}, Υk :=

0≤j≤m(k)

(k − m(k))Ψτ (ω l(k) ) + Ψτ (ω k ) . k − m(k) + 1

(26)

Go to Step 1. Remark 1 (i) In Algorithm 1, we employ a new nonmonotone line search, which can be used to find the optimal solution more rapidly and improve the convergence speed of the algorithm. If we choose P = 0 or P to be sufficiently large, then (25) is the monotone line search. (ii) If P is a given positive integer, there are the following two cases in the iteration process: (a) if k < P , then m(k) = k and Υk = Ψτ (ω k ), i.e., we use a monotone line search in Algorithm 1. In fact, smoothing Newton algorithms with a monotone line search possess

local fast convergence when Φτ (ω k ) is small enough [22]. So now it is not necessary to use the nonmonotone line search in Algorithm 1; 152

Xiaoni Chi et al 146-162

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

(b) if k ≥ P , then m(k) = P and Υk :=

(k − P )Ψτ (ω l(k) ) + Ψτ (ω k ) (k − P )Ψτ (ω l(k) ) Ψτ (ω k ) = + , k−P +1 k−P +1 k−P +1

(27)

i.e., we use a nonmonotone line search in Algorithm 1. Let φτ (ω) be given by (23), and denote Γ = {ω = (µ, x, y) ∈ R++ × Rn × Rn : µ ≥ φτ (ω)µ0 }.

(28)

Lemma 2 Suppose that a function f is continuously differentiable and monotone, and consider the sequence {ω k = (µk , xk , y k )} generated by Algorithm 1. Then (i) {φτ (ω k )} is monotonically decreasing. (ii) For any k ≥ 0, we have µk > 0 and ω k ∈ Γ. (iii) {µk } is monotonically decreasing. Proof The proof is similar to Lemma 4.1 [14]. We omit the details for brevity. Lemma 3 Suppose that a function f is continuously differentiable and monotone, and consider the sequence {ω k = (µk , xk , y k )} generated by Algorithm 1. Then we have Ψτ (ω k ) ≤ Υk ≤ Ψτ (ω l(k) ). Proof We obtain from (26) Υk =

(k − m(k))Ψτ (ω l(k) ) + Ψτ (ω l(k) ) (k − m(k))Ψτ (ω l(k) ) + Ψτ (ω k ) ≤ = Ψτ (ω l(k) ), k − m(k) + 1 k − m(k) + 1

and Υk =

(k − m(k))Ψτ (ω l(k) ) + Ψτ (ω k ) (k − m(k))Ψτ (ω k ) + Ψτ (ω k ) ≥ = Ψτ (ω k ). k − m(k) + 1 k − m(k) + 1

This completes the proof. Theorem 2 Assume that a function f is continuously differentiable and monotone, and consider the sequence {ω k = (µk , xk , y k )} generated by Algorithm 1. Then Algorithm 1 is well defined. Proof Since Φ0τ (ω) is invertible for any µ > 0 by Theorem 1, then Step 2 is well defined. Next we show that Step 3 is well defined. From the definition of φτ (ω k ) in (23), p we have φτ (ω k ) ≤ γ min{1, Ψτ (ω k )} for any k ≥ 0.pIf Ψτ (ω k ) ≥ 1, then φτ (ω k ) ≤ γ ≤ γ Ψτ (ω k ); If Ψτ (ω k ) < 1, then φτ (ω k ) ≤ γΨτ (ω k ) ≤ γ Ψτ (ω k ). Therefore, we obtain for any k ≥ 0, q

φτ (ω k ) ≤ γ Ψτ (ω k ) = γ Φτ (ω k ) . (29) For any λ ∈ (0, 1], denote rτk (λ) := Ψτ (ω k + λ∆ω k ) − Ψτ (ω k ) − λΨ0τ (ω k )∆ω k .

(30)

Since Ψτ (·) is continuously differentiable at any ω k ∈ R1+2n , we have |rτk (λ)| = o(λ).

153

(31)

Xiaoni Chi et al 146-162

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

9

It follows from (22), (24), (29)-(31) and Lemma 3 that = Ψτ (ω k ) + λΨ0τ (ω k )∆ω k + rτk (λ)

Ψτ (ω k + λ∆ω k )

= Ψτ (ω k ) + 2λΦτ T (ω k )Φτ 0 (ω k )∆ω k + o(λ)

2 = Ψτ (ω k ) + 2λΦτ T (ω k )φτ (ω k )u − 2λ Φτ (ω k ) + o(λ)

(32)

≤ (1 − 2λ)Ψτ (ω k ) + 2λγµ0 Ψτ (ω k ) + o(λ) ≤ [1 − 2(1 − γµ0 )λ]Υk + o(λ). ¯ ∈ (0, 1) such that for any λ ∈ (0, λ] ¯ and σ ∈ (0, 1 ), Since γµ0 < 1, there exists λ 2 Ψτ (ω k + λ∆ω k ) ≤ [1 − 2σ(1 − γµ0 )λ]Υk . This demonstrates that Step 3 is well defined. We complete the proof. Lemma 4 Assume that a function f is continuously differentiable and monotone, and consider the sequence {ω k = (µk , xk , y k )} generated by Algorithm 1. Then {Ψτ (ω l(k) )} is monotonically decreasing. Proof We have Υk ≤ Ψτ (ω l(k) ) for any k ≥ 0 by Lemma 3. Thus, it follows from (25) that Ψτ (ω k + λk ∆ω k ) ≤ [1 − 2σ(1 − γµ0 )λk ]Υk ≤ [1 − 2σ(1 − γµ0 )λk ]Ψτ (ω l(k) ).

(33)

Since γµ0 < 1, it follows from (33) that Ψτ (ω k+1 ) ≤ Ψτ (ω l(k) ). We obtain from (26) Ψτ (ω l(k+1) )

=

max

{Ψτ (ω k+1−j )}

0≤j≤m(k+1)



max

{Ψτ (ω k+1−j )} = max{Ψτ (ω l(k) ), Ψτ (ω k+1 )},

0≤j≤m(k)+1

Therefore, we have Ψτ (ω l(k+1) ) ≤ Ψτ (ω l(k) ) for any k ≥ 0. We complete the proof. 5

Convergence Analysis The global convergence and local quadratic convergence of Algorithm 1 will be analyzed in this section. In order to establish the global convergence of Algorithm 1, we first give the coerciveness of the function Ψτ (ω) given by (22). From the proof of Theorem 4.1 [22], we have the result as follows. Lemma 5 Let ϑτ (µ, x, y) be given by (8), and s, t ∈ R++ with s < t. Suppose that {ω k = (µk , xk , y k )} is a sequence satisfying (a) µk ∈ [s, t], and {(xk , y k )} is unbounded; and (b) there is a bounded sequence {(uk , v k )} such that {hxk − uk , y k − v k i} is bounded below. Then {ϑτ (µk , xk , y k )} is unbounded. By Lemma 5, it is not difficult to obtain the coerciveness of the function Ψτ (ω) given in (22).

154

Xiaoni Chi et al 146-162

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

Lemma 6 Assume that a function f is continuously differentiable and monotone, and consider the sequence Ψτ (ω) given by (22). Then Ψτ (µ, x, y) is coercive in (x, y) for each µ > 0, that is, limk(x,y)k→∞ Ψτ (µ, x, y) = +∞. Proof The proof is similar to Lemma 5.3 [22]. We omit it here for brevity. Theorem 3 Suppose that a function f is continuously differentiable and monotone, and consider {ω k = (µk , xk , y k )} generated by Algorithm 1. Then {µk } and {k Φτ (ω k ) k} converge to zero as k → ∞, and any accumulation point (H −1 x∗ , Hy ∗ ) is a solution of the CCCP (3). Proof From Lemma 2, we know that {φτ (ω k )} is convergent, i.e., there exists a scalar ¯ ¯ Suppose that β¯ > 0. Then it follows from Lemma 2 (ii) β ≥ 0 such that lim φτ (ω k ) = β. k→∞ that 0 < µ0 β¯ ≤ µ∗ = lim µk . By (22), Lemma 3 and Lemma 4, k→∞

µk 2 ≤ Ψτ (ω k ) ≤ Υk ≤ Ψτ (ω l(k) ) ≤ Ψτ (ω l(k−1) ) ≤ · · · ≤ Ψτ (ω 0 ).

(34)

Therefore we obtain from Lemma 6 that {ω k } is bounded, and hence there exists a convergent sequence {ω k }k∈J , where J ⊆ {0, 1, ..., k, ...}. Let ω ∗ := (µ∗ , x∗ , y ∗ ) = lim (µk , xk , y k ) such J3k→∞ ¯ It that Ψτ (ω ∗ ) = lim Ψτ (ω k ) = lim sup Ψτ (ω k ) and φτ (ω ∗ ) = lim φτ (ω k ) = β. k→∞

J3k→∞

J3k→∞

follows from (34) and β¯ > 0 that Ψτ (ω ) > 0. We now prove that Theorem 3 holds by considering the following two cases. (1) Assume that there is a constant ρ such that λk ≥ ρ > 0 for any k ∈ J. Then we obtain from (25) ∗

Ψτ (ω k + λk ∆ω k ) ≤ [1 − 2σ(1 − γµ0 )λk ]Υk ≤ [1 − 2σ(1 − γµ0 )ρ]Υk .

(35)

By letting J 3 k → ∞ in (35), we have Ψτ (ω ∗ ) ≤ [1 − 2σ(1 − γµ0 )ρ]Υ∗ .

(36)

It is not difficult to verify that Υ∗ := lim supJ3k→∞ Υk = Ψτ (z ∗ ) > 0 by (26). Thus we get 1 ≤ 1 − 2σ(1 − γµ0 )ρ, which contradicts the fact that γµ0 < 1. ˆ k := λk /δ does not satisfy (25) for (2) Suppose that lim λk = 0. Then the stepsize λ J3k→∞

any sufficiently large k ∈ J, i.e. ˆ k ∆ω k ) > [1 − 2σ(1 − γµ0 )λ ˆ k ]Υk ≥ [1 − 2σ(1 − γµ0 )λ ˆ k ]Ψτ (ω k ), Ψτ (ω k + λ which implies ˆ k ∆ω k ) − Ψτ (ω k ) Ψτ (ω k + λ ≥ −2σ(1 − γµ0 )Ψτ (ω k ). ˆk λ

(37)

Since 0 < µ0 φτ (ω ∗ ) ≤ µ∗ , we have that Ψτ (ω) is continuously differentiable at ω ∗ ∈ R1+2n . By taking the limit on both sides of (37), we obtain −2σ(1 − γµ0 )Ψτ (ω ∗ ) ≤ 2Φτ T (ω ∗ )Φ0τ (ω ∗ )∆ω ∗ = 2Φτ T (ω ∗ )[−Φτ (ω ∗ ) + φτ (ω ∗ )u] = −2Φτ T (ω ∗ )Φτ (ω ∗ ) + 2φτ (ω ∗ )Φτ T (ω ∗ )u ≤ −2(1 − γµ0 )Ψτ (ω ∗ ). 155

Xiaoni Chi et al 146-162

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

11

Since Ψτ (ω ∗ ) > 0 and γµ0 < 1, we have σ ≥ 1, which contradicts the fact that 0 < σ < 1 kn ¯ 2 . Thus we have β = 0. It follows from (23) that there is a sequence {ω } such that kn l(kn ) lim Ψτ (ω ) = 0 holds. By (26) and Lemma 4, we have lim Ψτ (ω ) = lim Ψτ (ω l(k) ) = kn →∞ Ψτ (ω l(∗) )

kn →∞

k→∞

= 0. Then, we obtain from (34) that lim Ψτ (ω k ) = Ψτ (ω ∗ ) = 0 and hence k→∞

kΦτ (ω ∗ )k = 0. Thus (H −1 x∗ , Hy ∗ ) is a solution of the CCCP (3). This completes the proof. Next the local convergence of Algorithm 1 will be analyzed. It is easy to see that Φτ (ω) is strongly semismooth at any ω ∈ R1+2n by Theorem 1. Then by the proof of Theorem 8 [23], we obtain the local quadratic convergence of Algorithm 1 for the CCCP. Lemma 7 Suppose that a function f is continuously differentiable and monotone, and the solution set of the CCCP is nonempty and bounded. Let the sequence {ω k } be generated by Algorithm 1 and ω ∗ := (µ∗ , x∗ , y ∗ ) be an accumulation point of {ω k }. If all V ∈ ∂Φτ (ω ∗ ) are nonsingular, then the sequence {ω k } converges to ω ∗ quadratically, i.e., kω k+1 − ω ∗ k = O(kω k − ω ∗ k2 ) and µk+1 = O((µk )2 ). 6

Numerical examples In this section, we have conducted some numerical experiments of Algorithm 1 for solving the CCCP. All the experiments were done on a PC with Intel(R) Celeron(R) CPU N2930 1.83 GHz×2 and 4.0 GB memory. Algorithm 1 was implemented in MATLAB 8.1.0.604 (R2013a). We chose the following parameters in all the numerical experiments: µ0 = 0.1, δ = 0.75, σ = 0.3, γ = 0.45, τ = 0.4. We used Ψτ (ω k ) ≤ 10−8 as the stopping criterion. In the following tables, n denote the size of problems; ACPU and AIter denote the CPU time in seconds and the number of iterations, respectively. Firstly, we use Algorithm 1 to solve the force optimization problem for a quadruped robot [4, 7], which can be expressed as the circular cone programming: (P ) min

 T c x : Ax = b, x ∈ Cθ12 ,

(38)

where c = (c1 , c2 , c3 , c4 ) ∈ R12 , and Cθ12 = Cθ3 × Cθ3 × Cθ3 × Cθ3 . The dual problem of (38) is defined by (D) max



bT s : AT s + y = c, y ∈ (Cθ12 )∗ .

If F ◦ (P ) × F ◦ (D) 6= ∅, then (x∗ , s∗ , y ∗ ) is the solution of (P ) and (D) if and only if it is the solution of Ax = b, x ∈ Cθ12 , y = c − AT s ∈ (Cθ12 )∗ , xT y = 0. (39) According to the algebraic relationship between the CC and the SOC (4), we reformulate (39) as AH −1 x = b, x ∈ K, AT s + Hy = c, y ∈ K, xT y = 0 (40)

156

Xiaoni Chi et al 146-162

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12

with K = K 3 × K 3 × K 3 × K 3 . Let 



µ      AH −1 x − b  Φτ (µ, x, s, y) :=    AT s + Hy − c    ϑτ (µ, x, y)

      .     

(41)

We adopt Algorithm 1 to solve Φτ (µ, x, s, y) = 0, where ϑτ (µ, x, y) is defined by (8). We use parameters: A1 = [5 1 1; 1 1 1; 4 6 3; 1 4 3; 3 3 5; 3 3 3]; A2 = [3 6 6; 1 6 2; 6 2 1; 5 4 1; 6 5 1; 4 3 4]; A3 = [4 3 6; 3 2 6; 2 5 1; 1 5 2; 5 6 5; 4 3 3]; A4 = [3 3 1; 6 1 2; 6 2 6; 5 2 5; 4 4 5; 6 1 6]; b = (43, 32, 51, 39, 54, 44)T ; ci = (2, 1, 0)T , i = 1, 2, 3, 4; The initial points are x0 = (1, 0, 0, 1, 0, 0, 1, 0, 0, 1, 0, 0)T and s0 = (0, 0, 0, 0, 0, 0)T . π Let θ = π4 , π5 , π8 , or 12 , respectively. Table 1 shows the value x∗ and the objective function value Z ∗ = (c∗ )T x∗ of the force optimization problem for a quadruped robot. Moreover, we solve the randomly generated linear CCCP with different problem sizes n and m = 1 by Algorithm 1. In details, let a random vector q = rand(n, 1) and a random matrix A = rand(n, n) be generated, and M := AT A. Since the matrix M is semidefinite positive, the generated problem (3) with f (x) = M x + q is the monotone CCCP, i.e, the generated problem (5) with H −1 f (H −1 x) = H −1 [M H −1 x + q] is the monotone SOCCP. The random problems of each size are generated 10 times. Choose initial points x0 = e ∈ Rn , y 0 = 0 ∈ Rn , and e denotes the unit element in K n . Table 2 reveals that the AIter and ACPU for the CCCP with different rotation angles and problem sizes. It shows that Algorithm 1 can be used efficiently to solve the CCCP with different rotational angles. Table 3 reveals that the AIter and ACPU of Algorithm 1 with a monotone line search or a nonmonotone line search for the SOCCP with different problem sizes. It shows that our algorithm usually works worse with the monotone line search than the nonmonotone line search. From the numerical results in Tables 1-3, we see that the nonmonotone smoothing Newton algorithm is successful for solving the CCCP. Moreover, we can use Algorithm 1 to solve the force optimization problem for a quadruped robot. Furthermore, we also find that our algorithm usually works worse with the monotone line search than the nonmonotone line search, in the sense that the former tends to require more AIter and more ACPU than the latter in most cases. 7

Conclusions In this paper, a smoothing Newton method for the CCCP with a new nonmonotone line is proposed. Under suitable assumptions, the global convergence and local quadratic convergence are achieved. From the numerical experiments, we can see that Algorithm 1 can effectively solve the CCCP with different problem sizes and different rotation angles, and also can be applied to real-world problems, such as the force optimization problem for a quadruped robot. And the nonmonotone smoothing Newton method is better than the 157

Xiaoni Chi et al 146-162

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

13

Table 1 Numerical results of the force optimization problem for a quadruped robot. θ

x∗

Z∗

θ=

π 4

θ=

π 5

θ=

π 8

θ=

π 12

















                                                

2.42056     2.27904      0.81553     1.34655      1.34503     −0.06425      1.21045     0.40717      1.13991      0.72928     0.08791     0.72395

                                                

2.41022     1.64542      0.59920     1.70622      1.23334     −0.12509      1.21569     0.28628      0.83560      1.22722     0.62921     0.63169

                                                

2.40052     0.76492      0.63521     2.52821      1.03455     −0.16275      1.22029     0.17841      0.47297      1.99630     0.82427     0.06585

                                                

2.10235     0.50586      0.24776     3.50136      0.91945     −0.18712      1.59579     0.14573      0.40209      2.22975     0.43971     −0.40467

15.53282

16.91290

19.09283

158

20.86925

Xiaoni Chi et al 146-162

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14

Table 2

Results for the CCCP with different θ and problem sizes. θ=

π 3

θ=

π 4

θ=

π 5

θ=

π 6

n

ACPU

AIter

ACPU

AIter

ACPU

AIter

ACPU

AIter

100

0.0700

5.0

0.0863

6.0

0.0900

6.2

0.0951

6.9

200

0.2783

5.0

0.3343

6.0

0.3804

7.0

0.4107

7.5

300

0.7516

5.9

0.9180

6.9

1.0528

8.0

1.0323

7.9

400

1.6756

6.0

1.9657

7.0

2.2717

8.1

2.5356

9.0

500

2.9128

6.0

3.4351

7.6

3.8557

8.2

4.3882

8.9

600

4.7698

6.0

5.7232

7.7

6.6746

9.0

7.2381

9.2

700

6.6911

6.0

8.9254

8.0

10.0183

9.0

10.5241

9.5

800

9.5330

6.0

12.6333

8.0

14.3293

9.3

16.4956

10.5

900

13.1500

6.2

16.7760

8.0

19.4508

9.3

22.5813

10.8

1000

18.4252

6.6

22.2793

8.0

26.5724

9.5

30.5843

11.0

1100

28.179

7.0

36.036

8.8

40.461

10.0

53.848

11.4

1200

37.528

7.0

48.298

9.0

63.445

10.2

67.497

11.2

1300

45.091

7.0

57.184

9.0

80.317

10.2

82.146

11.2

1400

54.362

7.0

71.051

9.0

89.219

10.0

103.418

11.0

1500

66.070

7.0

86.972

9.0

100.303

10.6

132.516

11.4

159

Xiaoni Chi et al 146-162

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

15

Table 3 Numerical results for SOCCP with a nonmonotone or monotone line search. P=3

P=0

n

ACPU

AIter

ACPU

AIter

100

0.0872

6.0

0.0882

6.0

200

0.3844

6.0

0.3961

6.1

300

1.0185

6.9

1.0305

7.0

400

2.2106

7.0

2.3637

7.4

500

4.0018

7.4

4.3376

8.0

600

6.4876

7.6

6.9378

8.1

700

8.9622

8.0

10.3067

8.8

800

12.7327

8.0

14.7962

9.0

900

16.8958

8.0

20.1800

9.2

1000

22.4432

8.0

29.7001

9.7

1100

34.8014

8.5

44.9750

9.9

1200

47.9557

9.0

57.4256

10.0

1300

57.1843

9.0

70.5862

10.0

160

Xiaoni Chi et al 146-162

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

16

monotone smoothing Newton method for solving the CCCP. Therefore, the smoothing Newton method with a nonmonotone line search is promising for solving the CCCP. Acknowledgements This research is supported by the Key Disciplines for Operational Research and Cybernetics of the Education Department of Guangxi Province, the National Natural Science Foundation of China (No. 11401126, 71471140, 11361018), Guangxi Natural Science Foundation (No. 2016GXNSFBA380102, 2014GXNSFFA118001), and Guangxi Key Laboratory of Cryptography and Information Security (No. GCIS201618), China. The authors are grateful to the editor and the anonymous referees for their valuable comments on this paper. References 1 J. Dattorro, Convex Optimization and Euclidean Distance Geometry, Meboo Publishing, California, 2005. 2 F. Alizadeh and D. Goldfarb, Second-order cone programming, Mathematical Programming, 95 (2003), 3-51 . 3 C. H. Ko and J. S. Chen, Optimal grasping manipulation for multifingered robots using semismooth Newton method, Mathematical Problems in Engineering, 2013(3) (2013), 206-226. 4 Z. J. Li et al, Contact-force distribution optimization and control for quadruped robots using both gradient and adaptive neural networks, IEEE Transactions on Neural Networks and Learning Systems, 25(8) (2014), 1460-1473 . 5 I. Bomze, Copositive optimization-recent developments and applications, European Journal of Operational Research, 216 (2012), 509-520 . 6 J. C. Zhou and J. S. Chen, Properties of circular cone and spectral factorization associated with circular cone, Journal of Nonlinear and Convex Analysis, 14(4) (2013), 1504-1509 . 7 G. Q. Wang et al, Primal-dual interior-point algorithms for convex quadratic circular cone optimization, Numerical Algebra, Control and Optimization, 5 (2015), 211-231. 8 Y. Q. Bai et al, A polynomial-time interior-point method for circular cone programming based on kernel functions, Journal of Industrial and Management Optimization, 12(2) (2016), 739-756. 9 X. H. Miao et al, Constructions of complementarity functions and merit functions for circular cone complementarity problem, Computational Optimization and Applications, 63 (2016), 495522. 10 C. Wang et al, An improved algorithm for linear complementarity problems with interval data,

161

Xiaoni Chi et al 146-162

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

17

Journal of Computational Analysis and Applications, 17(2) (2014), 372-388 . 11 A. Yoshise, Interior point trajectories and a homogeneous model for nonlinear complementarity problems over symmetric cones, SIAM Journal on Optimization, 17 (2006), 1129-1153. 12 J. S. Chen and S. H. Pan, A one-parametric class of merit functions for the symmetric cone complementarity problem, Journal of Mathematical Analysis and Applications, 355 (2009), 195-215. 13 J. Y. Tang et al, A smoothing-type algorithm for the second-order cone complementarity problem with a new nonmonotone line search, Optimization, 64(9) (2015), 1935-1955. 14 S. L. Hu et al, A nonmonotone smoothing Newton algorithm for solving nonlinear complementarity problems, Optimization Methods and Software, 24 (2009), 447-460 . 15 R. Mifflin, Semismooth and semiconvex functions in constrained optimization, SIAM Journal on Control and Optimization, 15 (1977), 957-972. 16 L. Q. Qi and J. Sun, A nonsmooth version of Newton’s method, Mathematical Programming, 58 (1993), 353-367. 17 F. H. Clarke, Optimization and nonsmooth analysis, John Wiley and Sons, New York (1983). 18 S. Hayashi et al, A combined smoothing and regularization method for monotone second-order cone complementarity problems, SIAM Journal on Optimization, 15(2) (2005), 593-615. 19 N. Lu and Z. H. Huang, Convergence of a non-interior continuation algorithm for the monotone SCCP, Acta Mathematicae Applicatae Sinica, 26(4) (2010), 543-556 . 20 Z. H. Huang et al, Convergence of a smoothing algorithm for symmetric cone complementarity problems with a nonmonotone line search, Science in China, 52(4) (2009), 833-848. 21 M. Fukushima et al, Smoothing functions for second-order-cone complementarity problems, SIAM Journal on Optimization, 12(2) (2001), 436-460. 22 Z. H. Huang and T. Ni, Smoothing algorithms for complementarity problems over symmetric cones, Computational Optimization and Applications, 45(3) (2010), 557-579. 23 L. Q. Qi et al, A new look at smoothing Newton methods for nonlinear complementarity problems and box constrained variational inequalities, Mathematical Programming, 87 (2000), 1-35.

162

Xiaoni Chi et al 146-162

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Duality in nondifferentiable multiobjective fractional programming problems involving second order (F, b, ϕ, ρ, θ)− univex functions Meraj Ali Khan, Amira A. Ishan, Falleh R. Al-Solamy Abstract In the present paper a nondifferentiable multiobjective fractional programming problem is considered in which every component of objective functions includes a term involving the support function of a compact convex set. Finally a second order Mond-weir type dual is formulated and weak, strong and converse duality results are proved under (F, b, ϕ, ρ, θ)− univexity types assumptions. 2000 AMS Mathematics Subject Classification: 26A51, 90C32, 49N15. Key words phrases: Univex functions, Minimax fractional programming, Support function, Duality.

1

Introduction

In recent years, the concept of convexity and generalized convexity is well recognized in optimization theory and play an imperative role in mathematical economics, management science and optimization theory. Therefore, the research on convexity and generalized convexity is one of the most important tool in mathematical programming. The differential convex function f : Rn → R is characterized by the following inequality f (x) − f (y) ≥ ∇f (y)t (x − y) for all x, y ∈ Rn , where ∇ denotes the gradient of f. In general a function f (x) is said to be convex on a convex set X ⊆ Rn if for any x, y ∈ X, λ ∈ [0, 1], f (x) satisfies the following inequality f (λx + (1 − λ)y) ≤ λf (x) + (1 − λ)f (y). In 1981, Hanson [15] generalized convex functions to introduce the concept of invex functions, which was a significant landmark in the optimization theory. Normally, a differentiable function f : Rn → R is said to be invex function if there exits a vector valued function η : Rn × Rn → Rn such that the following inequality f (x) − f (y) ≥ ∇f (y)η t (x, y) holds, for all x, y ∈ Rn . Consequently, several classes of generalized convexity and invexity have been introduced. More specifically, Preda [28] introduced the concept of (F, ρ)− convexity as an extension of F − convexity [14] and ρ− convexity [13] and he used this concept to investigate some duality for Wolfe vector dual, Mondweir dual and general Mond-weir dual for multiobjective programming problem. Gulati and Islam [26] and Ahmad [9] deliberate optimality and duality results for multiobjective programming problems involving F −convexity and (F, ρ)− convexity assumptions respectively.

163

Meraj Ali Khan et al 163-175

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Mangasarian [19] first formulated the second order dual for a nonlinear programming problem and obtained duality results under generalized convex type assumptions. Mond [3] reproved the second order duality results under some easier assumptions than those used by Mangasarian [19]. The class of (F, ρ)−convex functions was extended to the second order (F, ρ)−convex functions by [12] and they obtained the duality results for Mangasarian type, Mond-weir type and general Mond-weir type multiobjective programming problem. Motivated by different concepts of generalized convexity, Liang et al. [30, 31] formulated the (F, α, ρ, d)−convexity and acquired some optimality conditions and duality results for the multiobjective problems. Further, stimulated by Liang et al. [30] and Aghezzaf [4], I. Ahmad and Z. Husain [10] introduced the notion of second order (F, α, ρ, d)−convex functions and their generalization and they developed weak, strong and strict converse duality theorems for the second order Mond-weir type multiobjective dual. Moreover, Bector et al. [4] introduced the concept of univex functions and considered optimality and duality for multiobjective optimization problem. Rueda et al. [18] studied optimality and duality results for several mathematical programming problems by combining the concepts of type I and univex functions. A step ahead Zalmai [7] introduced the notion of second order (F, b, ϕ, ρ, θ)−univex functions and obtained optimality and duality results for multiobjective programming problems. On the other hand, the optimization problems in which the objective function is a ratio of two functions usually identified as fractional programming problems. Basically, these types of problems occur in design of electronic circuits, engineering design, portfolio selection problems [1, 6, 11, 20]. Due to the fact that minimax fractional problems has wide varieties of applications in real life problems, so it becomes a fascinating and interesting topic for research. Necessary and sufficient optimality conditions for minimax fractional programming problems first developed by Schmittendorf [29]. Tonimoto [25] used the necessary conditions formulated in [29] and construct a dual problem for minimax fractional programming problems. Recently, Ramu Dubey et al. [21] and S. K. Mishra et al. [22] taken up the nondifferentiable multi objective fractional problem and obtained the optimality and duality results under higher order (C, α, γ, ρ, d)− convexity and (C, α, ρ, d)− convexity type assumptions. More recently, many articles in this direction have been appeared in the literature [see 17, 23, 24, 27, 32]. In this paper, a class of nondifferentiable multiobjective fractional programming problem is considered in which the numerator as well as denominator of every component of objective function contains a term concerning the support functions. Further, we prove sufficient optimality conditions and duality theorems for nondifferentiable minimax fractional programming problems with support functions under the second order (F, b, ρ, α, θ)− univex functions.

2

Notations and Preliminaries

In this paper following generalized nondifferentiable multiobjective minimax fractional problem is considered (GMFP)

min sup

x∈Rn

y∈Y

f (x, y) + s(x|C) F (x, y) = min sup G(x, y) x∈Rn y∈Y g(x, y) − s(x|D)

164

Meraj Ali Khan et al 163-175

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Subject to hj (x) + s(x|Ej ) ≤ 0, j = 1, 2, . . . , m, where Y is a compact subset of Rm , f, g : Rn × Rm → R and hj : Rn → Rm (j = 1, 2, . . . , m) are continuously differentiable functions of Rn × Rm . C, D and Ej (j = 1, . . . , m) are compact convex sets of Rm and s(x|C), s(x|D) and s(x|Ej ), (j = 1, . . . , m) represent the support functions of the compact sets and f (x, y) + s(x|C) ≥ 0 and g(x, y) − s(x|D) > 0 for all feasible x. Let S be the set of all feasible solutions of (GMFP). We define the following sets for every x ∈ S. J(x) = {j ∈ J : hj (x) + s(x|Ej ) = 0}, Y (x) = {y ∈ Y :

f (x, z) + s(x|C) f (x, y) + s(x|C) = sup }. g(x, y) − s(x|D) z∈Y g(x, z) − s(x|D)

s m K(x) ∑s = {(s, t, y¯) ∈ N × R+ × R : 1 ≤ s ≤ n + 1, t = (t1 , t2 , . . . , ts } ∈ R+ with i=1 ti = 1, y¯ = (¯ y1 , . . . y¯s ) and y¯i ∈ Y (x), i = 1, 2, . . . s}.

Since f and g are continuously differentiable functions and Y is compact subset of Rm , it follows that for each x∗ ∈ S Y (x∗ ) ̸= ϕ. Thus for any y¯i ∈ Y (¯ x), we have a positive constant λ0 =

f (x∗ , y¯i ) + s(x∗ |C) . g(x∗ , y¯i ) − s(x∗ |D)

Definition 2.1 [2]. Let K be a compact convex set in Rn . The support function s(x|K) is defined as s(x|K) = max{xt y : y ∈ K}. The support function s(.|K) has a subdifferential. The subdifferential of s(.|K) at x is defined as ∂s(x|K) = {z ∈ K|z t x = s(x|K)}. Consistently, we can write z t x = s(x|K). Now we describe the generalized (F, b, ϕ, ρ, θ)− univex function in the following steps Definition 2.3. A function F : X × X × Rn → R, where X ⊆ Rn is said to be a sublinear in its third argument if for all x, x ¯ ∈ X, the following conditions are satisfied (i) F(x, x ¯, a1 + a2 ) ≤ F (x, x ¯, a1 ) + F(x, x ¯ , a2 ) (ii) F(x, x ¯, αa) = αF(x, x ¯, a), ∀ a1 , a2 , a ∈ Rn , α ∈ R+ . Definition 2.4 [7]. The function f (x) is said to be second order (F, b, ϕ, ρ, θ)− (strict) univex at z if there exist functions b : X × X → (0, ∞), ϕ : R → R, ρ : X × X → R, θ : X × X → Rn , and a sublinear function F(x, z; .) : Rn × Rn × Rn → R such that for each x ∈ X(x ̸= z) and p ∈ Rn , 1 ϕ(f (x)−f (z)+ pt ∇2 f (z)p)(>) = F (x, z; b(x, z)[∇f (z)+∇2 f (z)p])+ρ(x, z)∥θ(x, z)∥2 , 2

165

Meraj Ali Khan et al 163-175

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

where ∥.∥2 is a norm on Rn . A twice differentiable vector function f : X → Rk is said to be (F, b, ϕ, ρ, θ)− univex at x = z, if each of its components fi is (F, b, ϕ, ρ, θ)− univex at z. Now we define generalized second order (F, b, ϕ, ρ, θ)− univex functions. Definition 2.5. A twice differentiable function f, over X is said to be second order (F, b, ϕ, ρ, θ)− pseudo univex at z if there exist functions b : X × X → (0, ∞), ϕ : R → R, ρ : X × X → R, θ : X × X → Rn , and a sublinear function F(x, z; .) : Rn × Rn × Rn → R such that for each x ∈ X(x ̸= z) and p ∈ Rn , 1 ϕ(f (x) − f (z) + pT ∇2 f (z)p) < 0 2 ⇒ F (x, z; b(x, z)[∇f (z) + ∇2 f (z)p]) < −ρ(x, z)∥θ(x, z)∥2 . A twice differentiable vector function f : X → Rk is said to be second order (F, b, ϕ, ρ, θ)− pseudo univex at x = z, if each of its components fi is (F, b, ϕ, ρ, θ)− pseudo univex at z. Definition 2.6. A twice differentiable function f, over X is said to be second order (F, b, ϕ, ρ, θ)− strictly pseudo univex at z if there exist functions b : X × X → (0, ∞), ϕ : R → R, ρ : X × X → R, θ : X × X → Rn , and a sublinear function F(x, z; .) : Rn × Rn × Rn → R such that for each x ∈ X(x ̸= z) and p ∈ Rn , F (x, z; b(x, z)[∇f (z) + ∇2 f (z)p]) = −ρ(x, z)∥θ(x, z)∥2 . 1 ⇒ ϕ(f (x) − f (z) + pt ∇2 f (z)p) > 0, 2 or equivalently 1 ϕ(f (x) − f (z) + pt ∇2 f (z)p) = 0, 2 ⇒ F (x, z; b(x, z)[∇f (z) + ∇2 f (z)p]) < −ρ(x, z)∥θ(x, z)∥2 . A twice differentiable vector function f : X → Rk is said to be second order (F, b, ϕ, ρ, θ)− strictly pseudo univex at x = z, if each of its components fi is (F, b, ϕ, ρ, θ)− strictly pseudo univex at z. Definition 2.7. A twice differentiable function f over X is said to be second order (F, b, ϕ, ρ, θ)− quasi univex at z if there exist functions b : X × X → (0, ∞), ϕ : R → R, ρ : X × X → R, θ : X × X → Rn , and a sublinear function F(x, z; .) : Rn × Rn × Rn → R such that for each x ∈ X(x ̸= z) and p ∈ Rn , 1 ϕ(f (x) − f (z) + pt ∇2 f (z)p) = 0 2 ⇒ F (x, z; b(x, z)[∇f (z) + ∇2 f (z)p]) = −ρ(x, z)∥θ(x, z)∥2 . A twice differentiable vector function f : X → Rk is said to be second order (F, b, ϕ, ρ, θ)− quasi univex at x = z, if each of its components fi is

166

Meraj Ali Khan et al 163-175

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(F, b, ϕ, ρ, θ)− quasi univex at z. Definition 2.8. A twice differentiable function f, over X is said to be second order strong (F, b, ϕ, ρ, θ)− pseudo univex at z if there exist functions b : X × X → (0, ∞), ϕ : R → R, ρ : X × X → R, θ : X × X → Rn , and a sublinear function F(x, z; .) : Rn × Rn × Rn → R such that for each x ∈ X(x ̸= z) and p ∈ Rn , 1 ϕ(f (x) − f (z) + pT ∇2 f (z)p) ≤ 0 2 ⇒ F (x, z; b(x, z)[∇f (z) + ∇2 f (z)p]) ≤ −ρ(x, z)∥θ(x, z)∥2 . A twice differentiable vector function f : X → Rk is said to be second order strong (F, b, ϕ, ρ, θ)− pseudo univex at x = z, if each of its components fi is strong (F, b, ϕ, ρ, θ)− pseudo univex at z. Note 2.1. Now we have the following special cases (i) If ϕ(x) = x and θ(., .) = d(., .) : X × X → R, then the second order (F, b, ϕ, ρ, θ)−univexity becomes the second order (F, α, ρ, d)−convexity defined by I. Ahmad and Z. Husain [10] (ii) If ϕ(x) = x, b(x, z) = 1 and θ(., .) : X × X → R, then second order (F, b, ϕ, ρ, θ)− univexity becomes the second order (F, ρ)− convexity introduced by Zhang and Mond [12]. Moreover, if second order terms become zero i.e., p = 0, then it reduces to (F, ρ)−convexity defined in [9, 28]. Now we have the following necessary condition Theorem 2.1 (Necessary optimal condition). Let x∗ be an optimal solution for (GMFP) satisfying ⟨w, x⟩ > 0, ⟨v, x⟩ > 0 and if ∇(hj (x∗ ) + ⟨uj , x∗ ⟩), j ∈ J(x∗ ) are linearly independent. Then there exists (s, t∗ , y¯) ∈ K(x∗ ), λ0 ∈ R+ , w, v ∈ m such that Rn , uj ∈ Rm and µ∗j ∈ R+ s ∑

t∗i (∇(f (x∗ , y¯i ) + ⟨w, x∗ ⟩) − λ0 (∇(g(x∗ , y¯i ) − ⟨v, x∗ ⟩)))

i=1

+

m ∑

µ∗j ∇(hj (x∗ ) + ⟨uj , x∗ ⟩) = 0,

(2.1)

j=1

f (x∗ , y¯i ) + ⟨w, x∗ ⟩ − λ0 (∇(g(x∗ , y¯i ) − ⟨v, x∗ ⟩)) = 0, m ∑ µ∗j ∇(hj (x∗ ) + ⟨uj , x∗ ⟩) = 0,

(2.2) (2.3)

j=1

⟨w, x∗ ⟩ = s(x∗ |C) ∗







⟨v, x ⟩ = s(x |D) ⟨uj , x ⟩ = s(x |Ej ) s ∑ t∗i ≥ 0, i = 1, . . . s, ti = 1.

(2.4) (2.5) (2.6)

i=1

167

Meraj Ali Khan et al 163-175

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

3

Duality Model In this section, we consider the following Mond-weir type dual to (GMFP) max

sup

λ,

(DI)

(s,t,¯ y )∈K(z) (z,µ,λ,u,v,w,p)∈H1 (s,t,¯ y)



s ∑

ti (f (z, y¯i ) + ⟨w, z⟩ − λ(g(z, y¯i ) − ⟨v, z⟩)) + ∇2

i=1

s ∑

ti (f (z, y¯i ) + ⟨w, z⟩

i=1

−λ(g(z, y¯i )−⟨v, z⟩))p+∇

m ∑

µj (hj (z)+⟨uj , z⟩)+∇2

j=1

m ∑

µj (hj (z)+⟨uj , z⟩)p = 0,

j=1

(3.1) s 1 t 2∑ ti (f (z, y¯i ) + ⟨w, z⟩ − λ(g(z, y¯i ) − ⟨v, z⟩)) − p ∇ ti (f (z, y¯i ) + ⟨w, z⟩ 2 i=1 i=1

s ∑

−λ(g(z, y¯i ) − ⟨v, z⟩))p ≥ 0.

(3.2)

m ∑ 1 µj (hj (z) + ⟨uj , z⟩) − pt ∇2 µj (hj (z) + ⟨uj , z⟩)p ≥ 0. 2 j=1 j=1

(3.3)

m ∑

Theorem 3.1( Weak duality Theorem). Suppose that x and (z, µ, λ, v, w, u, p) are feasible solutions of (GMFP) and (DI) respectively. Let (i) hj (.) + ⟨uj , .⟩ is second order (F, b, ϕ, ρ, θ)−quasi univex at z, (ii) f (., y¯i ) + ⟨w, .⟩ and −g(., y¯i ) + ⟨v, .⟩ for i = 1, . . . , s are respectively strong (F, b, ϕ, ρ, θ)− pseudo univex at z with ρb + ρb11 = 0, (iii) u ≤ 0 ⇒ ϕ(u) ≤ 0 and v 5 0 ⇒ ϕ(v) 5 0, for all u, v ∈ Rn . Then sup y∈Y

f (x, y) + ⟨w, x⟩ ≥ λ. g(x, y) − ⟨v, x⟩

(3.4)

Proof. Suppose contrary to the result sup y∈Y

f (x, y) + ⟨w, x⟩ < λ. g(x, y) − ⟨v, x⟩

Then, we find f (x, y¯i ) + ⟨w, x⟩ − λ(g(x, y¯i ) − ⟨v, x⟩) < 0, for all y¯i ∈ Y. It follows ti ≥ 0, i = 1, . . . , s with

∑s

i=1 ti

= 1, that

ti (f (x, y¯i ) + ⟨w, x⟩ − λ(g(x, y¯i ) − ⟨v, x⟩)) ≤ 0, since t = (t1 , . . . , ts ) ̸= 0, then there is at least one strict inequality. Now we have the following s ∑

ti (f (x, y¯i ) + ⟨w, x⟩ − λ(g(x, y¯i ) − ⟨v, x⟩)) < 0 ≤

i=1

s ∑

ti (f (z, y¯i ) + ⟨w, z⟩

i=1

168

Meraj Ali Khan et al 163-175

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1 −λ(g(z, y¯i ) − ⟨v, z⟩) − pt ∇2 (f (z, yi ) + ⟨w, z⟩ − λ(g(z, y¯i ) − ⟨v, z⟩))p), 2 or

s ∑

ti (f (x, y¯i ) + ⟨w, x⟩ − λ(g(x, y¯i ) − ⟨v, x⟩) − (f (z, y¯i ) + ⟨w, z⟩

i=1

1 −λ(g(z, y¯i ) − ⟨v, z⟩)) + pt ∇2 (f (z, yi ) + ⟨w, z⟩ − λ(g(z, y¯i ) − ⟨v, z⟩))p) ≤ 0. 2 From the condition (iii), we get s ∑ ϕ( ti (f (x, y¯i ) + ⟨w, x⟩ − λ(g(x, y¯i ) − ⟨v, x⟩) − (f (z, y¯i ) + ⟨w, z⟩ i=1

1 −λ(g(z, y¯i ) − ⟨v, z⟩)) + pt ∇2 (f (z, yi ) + ⟨w, z⟩ − λ(g(z, y¯i ) − ⟨v, z⟩))p)) ≤ 0. 2 By the second order strong (F, b, ϕ, ρ, θ)− pseudo univexity of f (., y¯i ) + ⟨w, .⟩ and −g(.¯ yi ) + ⟨v, .⟩, we have F (x, z, b1 (x, z)(∇

s ∑

ti (f (z, y¯i ) + ⟨w, z⟩ − λ(g(z, y¯i ) − ⟨v, z⟩))

i=1

+∇2

s ∑

ti (f (z, y¯i ) + ⟨w, z⟩ − λ(g(z, y¯i ) − ⟨v, z⟩))p)) ≤ −ρ1 (x, z)∥θ(x, z)∥2 ,

i=1

or F (x, z, ∇

s ∑

ti (f (z, y¯i ) + ⟨w, z⟩ − λ(g(z, y¯i ) − ⟨v, z⟩))

i=1 2

+∇

s ∑

ti (f (z, y¯i ) + ⟨w, z⟩ − λ(g(z, y¯i ) − ⟨v, z⟩))p) ≤ −

i=1

ρ1 ∥θ(x, z)∥2 . b1

(3.5)

By use of the sublinearity on dual constraints (3.1), we get F (x, z; ∇

m ∑

µj (hj (z) + ⟨uj , z⟩) + ∇2

j=1

m ∑

µj (hj (z) + ⟨uj , z⟩)p

j=1

= −F (x, z; ∇

s ∑

ti (f (z, y¯i ) + ⟨w, z⟩ − λ(g(z, y¯i ) − ⟨v, z⟩))

i=1

+∇2

s ∑

ti (f (z, y¯i ) + ⟨w, z⟩ − λ(g(z, y¯i ) − ⟨v, z⟩))p).

i=1

Applying (3.5) in above inequality, we have F (x, z; ∇

m ∑ j=1

µj (hj (z) + ⟨uj , z⟩) + ∇

2

m ∑ j=1

µj (hj (z) + ⟨uj , z⟩)p) >

ρ1 ∥θ(x, z)∥2 b1 (3.6)

169

Meraj Ali Khan et al 163-175

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Let x and (z, µ, λ, u, v, w, p) are any feasible solutions of (GMFP) and (DI) m ∑

µj (hj (x)+⟨uj , x⟩) ≤ 0 ≤

j=1

m ∑

m ∑ 1 µj (hj (z)+⟨uj , z⟩)− pt ∇2 µj (hj (z)+⟨uj , z⟩)p. 2 j=1 j=1

(3.7) By using assumption (iii), equation (3.7) yields m m m ∑ ∑ ∑ 1 ϕ( µj (hj (x)+⟨uj , x⟩)− µj (hj (z)+⟨uj , z⟩)+ pt ∇2 µj (hj (z)+⟨uj , z⟩)p) ≤ 0. 2 j=1 j=1 j=1

Using the second order (F, b, ϕ, ρ, θ)− quasi univexity of we get F (x, z; b(x, z)(∇

m ∑

µj (hj (z)+⟨uj , z⟩)+∇2

j=1

m ∑

∑m j=1

µj (hj (.)+⟨uj , .⟩),

µj (hj (z)+⟨uj , z⟩)p)) 5 −ρ∥θ(x, z)∥2 .

j=1

(3.8) Since b(x, z) > 0, the above inequality with the sublinearity of F give F (x, z; ∇

m ∑

µj (hj (z) + ⟨uj , z⟩) + ∇2

j=1

m ∑

ρ µj (hj (z) + ⟨uj , z⟩)p) 5 − ∥θ(x, z)∥2 . b j=1 (3.9)

Now utilizing the assumption − ρb ≤ F (x, z; ∇

m ∑

ρ1 b1 ,

µj (hj (z) + ⟨uj , z⟩) + ∇2

j=1

the equation (3.9) provides

m ∑

µj (hj (z) + ⟨uj , z⟩)p) 5

j=1

ρ1 ∥θ(x, z)∥2 , b1 (3.10)

which contradict (3.6), hence (3.4) hold. Theorem 3.2 (Strong duality). Assume that x∗ is an efficient solution of (GMFP) and ∇hj (x∗ ) j ∈ J(x∗ ) are linearly independent. Then there exist (s∗ , t∗ , y¯∗ ) ∈ K(x∗ ) and (x∗ , µ∗ , λ∗ , u∗ , v ∗ , w∗ , p∗ = 0) ∈ H1 (s∗ , t∗ , u∗ ) such that (x∗ , µ∗ , λ∗ , u∗ , v ∗ , w∗ , p∗ = 0) is a feasible solution of (DI) and the two objectives have the same values. If in addition, the assumptions of weak duality (Theorem 3.1) hold for all feasible solutions of (GMFP) and (DI), then (x∗ , µ∗ , λ∗ , u∗ , v ∗ , w∗ , p∗ = 0) is an optimal solution of (DI). Proof. Since x∗ is an optimal solution of (GMFP) and ∇hj (x∗ ), j ∈ J(x∗ ) are linearly independent, by Theorem 2.1, there exist (s∗ , t∗ , y¯∗ ) ∈ K(x∗ ) and (x∗ , µ∗ , λ∗ , u∗ , v ∗ , w∗ , p∗ = 0) ∈ H1 (s∗ , t∗ , y¯∗ ) such that (x∗ , µ∗ , λ∗ , u∗ , v ∗ , w∗ , p∗ = 0) is a feasible solution of (DI) and the two objectives have the same value. Optimality of (x∗ , µ∗ , λ∗ , u∗ , v ∗ , w∗ , p∗ = 0) for DI follows from weak duality theorem (Theorem 3.1). ¯ u Theorem 3.3 (Strict converse duality). Let x ¯ and (¯ z, µ ¯, λ, ¯, v¯, w, ¯ y¯, p¯) be the efficient solutions of (GMFP) and (DI), respectively such that sup y∈Y

f (¯ x, y¯) + ⟨w, x ¯⟩ ¯ = λ. ¯⟩ g(¯ x, y¯) − ⟨v, x

(3.11)

Suppose

170

Meraj Ali Khan et al 163-175

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(i) hj (.) + ⟨uj , .⟩ is second order (F, b, ϕ, ρ, θ)−quasi univex at z (ii) f (., y¯i ) + ⟨w, .⟩ and −g(., y¯i ) + ⟨v, .⟩ for i = 1, . . . , s, are respectively strong (F, b, ϕ, ρ, θ)− pseudo univex at z with ρb + ρb11 = 0, (iii) u ≤ 0 ⇒ ϕ(u) ≤ 0 and v 5 0 ⇒ ϕ(v) 5 0, for all u, v ∈ Rn . Then x ¯ = z¯. ¯ u Proof. We assume that x ¯ ̸= z¯ and reach a contradiction, since x ¯ and (¯ z, µ ¯, λ, ¯, v¯, w, ¯ y¯, p¯) are the feasible solutions of (GMFP) and (DI) respectively, then we have m ∑

µ ¯j (hj (¯ x)+⟨¯ uj , x ¯⟩) ≤ 0 ≤

j=1

m ∑

m ∑ 1 µ ¯j (hj (¯ z )+⟨¯ uj , z¯⟩)− p¯∇2 µj (hj (¯ z )+⟨¯ uj , z¯⟩)¯ p, 2 j=1 j=1

(3.12) by assumption (iii) equation (3.12) yields m m ∑ 1 2∑ ϕ( µ ¯j (hj (¯ x) + ⟨¯ uj , x ¯⟩ − (hj (¯ z ) + ⟨¯ uj , z¯⟩)) + p∇ µ ¯j (hj (¯ z ) + ⟨¯ uj , z¯⟩)p) ≤ 0. 2 j=1 j=1

Utilizing second order (F, b, ϕ, ρ, θ)− quasi univexity of we get F (¯ x, z¯; b(¯ x, z¯)(∇

m ∑

µ ¯j (hj (¯ z )+⟨¯ uj , z¯⟩)+∇2

j=1

m ∑

∑m j=1

µ ¯j hj (.) + ⟨uj , .⟩,

µ ¯j (hj (¯ z )+⟨¯ uj , z¯⟩)¯ p)) 5 −ρ∥θ(¯ x, z¯)∥2 .

j=1

(3.13) Since b(¯ x, z¯) > 0, the above inequality with the sublinearity of F gives F (¯ x, z¯; ∇

m ∑

µ ¯j (hj (¯ z ) + ⟨¯ uj , z¯⟩) + ∇2

j=1

m ∑

ρ µ ¯j (hj (¯ z ) + ⟨uj , z¯⟩)¯ p) 5 − ∥θ(¯ x, z¯)∥2 . b j=1 (3.14)

Now utilizing the assumption − ρb ≤ F (¯ x, z¯; ∇

m ∑

ρ1 b1 ,

¯j (hj (¯ µ z ) + ⟨¯ uj , z¯⟩) + ∇

2

j=1

the inequality (3.14) yields

m ∑

¯j (hj (¯ µ z ) + ⟨uj , z¯⟩)¯ p) 5

j=1

ρ1 ∥θ(¯ x, z¯)∥2 . b1 (3.15)

Suppose (3.11) does not hold, then we have sup y∈Y

f (¯ x, y¯) + ⟨w, ¯ x ¯⟩ ¯ < λ. g(¯ x, y¯) − ⟨¯ v, x ¯⟩

It is straightforward to see that ¯ x, y¯i ) − ⟨¯ f (¯ x, y¯i ) + ⟨w, ¯ x ¯⟩ − λ(g(¯ v, x ¯⟩) < 0, for all y¯i ∈ Y. It follows ti ≥ 0, i = 1, . . . , s with

∑s

i=1 ti

= 1, that

¯ x, y¯i ) − ⟨¯ ti (f (¯ x, y¯i ) + ⟨w, ¯ x ¯⟩ − λ(g(¯ v, x ¯⟩)) ≤ 0,

171

Meraj Ali Khan et al 163-175

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

with at least one strict inequality, since t = (t1 , . . . , ts ) ̸= 0. Now we have s ∑

¯ x, y¯i ) − ⟨¯ ti (f (¯ x, y¯i ) + ⟨w, ¯ x ¯⟩ − λ(g(¯ v, x ¯⟩)) < 0 ≤

i=1

or

s ∑

ti (f (¯ z , y¯i ) + ⟨w, ¯ z¯⟩

i=1

1 ¯ z , y¯i ) − ⟨¯ ¯ z , y¯i ) − ⟨¯ −λ(g(¯ v , z¯⟩) − p¯t ∇2 (f (¯ z , y¯i ) + ⟨w, ¯ z¯⟩ − λ(g(¯ v , z⟩))¯ p), 2 s ∑

¯ x, y¯i ) − ⟨¯ ti (f (¯ x, y¯i ) + ⟨w, ¯ x ¯⟩ − λ(g(¯ v, x ¯⟩) − (f (¯ z , y¯i ) + ⟨w, ¯ z¯⟩

i=1

1 ¯ z , y¯i ) − ⟨¯ ¯ z , y¯i ) − ⟨¯ −λ(g(¯ v , z¯⟩)) + p¯t ∇2 (f (¯ z , y¯i ) + ⟨w, ¯ z¯⟩ − λ(g(¯ v , z¯⟩))¯ p) ≤ 0. 2 From the condition (iii), we get s ∑ ¯ x, y¯i ) − ⟨¯ ϕ( ti (f (¯ x, y¯i ) + ⟨w, ¯ x ¯⟩ − λ(g(¯ v, x ¯⟩) − (f (¯ z , y¯i ) + ⟨w, ¯ z¯⟩ i=1

1 ¯ z , y¯i ) − ⟨¯ ¯ z , y¯i ) − ⟨¯ z , y¯i ) + ⟨w, ¯ z¯⟩ − λ(g(¯ v , z¯⟩))¯ p)) ≤ 0. −λ(g(¯ v , z¯⟩)) + p¯t ∇2 (f (¯ 2 By the second order strong (F, b, ϕ, ρ, θ)− pseudo univexity of f (., y¯i ) + ⟨w, ¯ .⟩ and −g(., y¯i ) + ⟨¯ v , .⟩, we have F (¯ x, z¯, b1 (¯ x, z¯)(∇

s ∑

¯ z , y¯i ) − ⟨¯ ti (f (¯ z , y¯i ) + ⟨w, ¯ z¯⟩ − λ(g(¯ v , z¯⟩))

i=1

+∇2

s ∑

¯ z , y¯i ) − ⟨¯ ti (f (¯ z , y¯i ) + ⟨w, ¯ z¯⟩ − λ(g(¯ v , z¯⟩))¯ p)) ≤ −ρ1 (¯ x, z¯)∥θ(¯ x, z¯)∥2 ,

i=1

or F (¯ x, z¯, ∇

s ∑

¯ z , y¯i ) − ⟨¯ ti (f (¯ z , y¯i ) + ⟨w, ¯ z¯⟩ − λ(g(¯ v , z¯⟩))

i=1

+∇2

s ∑

ρ1 ¯ z , y¯i ) − ⟨¯ ti (f (¯ z , y¯i ) + ⟨w, ¯ z¯⟩ − λ(g(¯ v , z¯⟩))¯ p) ≤ − ∥θ(¯ x, z¯)∥2 . (3.16) b 1 i=1

Using sublinearity on dual constraints (3.1), we get F (¯ x, z¯; ∇

m ∑

µ ¯j (hj (¯ z ) + ⟨¯ uj , z¯⟩) + ∇2

j=1

m ∑

µ ¯j (hj (¯ z ) + ⟨¯ uj , z¯⟩)¯ p)

j=1

= −F (¯ x, z¯; ∇

s ∑

¯ z , y¯i ) − ⟨¯ ti (f (¯ z , y¯i ) + ⟨w, ¯ z¯⟩ − λ(g(¯ v , z¯⟩))

i=1

+∇2

s ∑

¯ z , y¯i ) − ⟨¯ ti (f (¯ z , y¯i ) + ⟨w, ¯ z¯⟩ − λ(g(¯ v , z¯⟩))¯ p).

i=1

Applying (3.16) in above inequality, we have F (¯ x, z¯; ∇

m ∑ j=1

µ ¯j (hj (¯ z ) + ⟨¯ uj , z¯⟩) + ∇2

m ∑ j=1

µ ¯j (hj (¯ z ) + ⟨¯ uj , z¯⟩)¯ p) >

ρ1 ∥θ(¯ x, z¯)∥2 , b1 (3.17)

which is a contradiction of (3.15). Hence the result follows immediately.

172

Meraj Ali Khan et al 163-175

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

Conclusion

On the basis of application point of view second order duality is very practical and competent as it provides tighter lower bounds. So it is very significant to generalize the existing results to second order environment. In the present study the notion of second order (F, b, ρ, α, θ)− univexity and its generalizations is considered. Many generalized convexity, invexity and univexity concepts are special cases of second order (F, b, ρ, α, θ)−univexity. This notion is appropriate to study the weak, strong and converse duality theorems for second order dual (DI) of a nondifferentiable fractional problem with support function (GMFP). The results proved in this paper can be further generalized for the following non-differentiable minimax fractional programming problem with square root terms i.e., f (x, y) + (xt Bx)1/2 min sup , t 1/2 y∈Y g(x, y) − (x Cx) subject to hj (x) ≤ 0, j = 1, 2, . . . , p, where Y is a compact subset of Rm , f (., .), g(., .) : Rn × Rm → R and h(.) : Rn → Rp are twice differentiable functions. B and C are n × n positive semi definite symmetric matrices. Acknowledgments: This project was funded by the Deanship of Scientific Research (DSR), University of Tabuk, , under grant No. (1437- S0214). The authors, therefore, acknowledge with thanks DSR technical and financial support.

References [1] A. L. Soyster, B. Lev, D. Loof, Conversative linear programming with mixed multiple objective, Omega 5 (1977) 193-205. [2] B. Mond, M. Schechter, Non differentiable symmetric duality, Bull. Aust. Math. Soc. 53 (1996) 177-188. [3] B. Mond, Second order duality for nonlinear programs, Opsearch 11 (2003) 1-25. [4] B. Aghezzaf, Second order mixed type duality in multiobjective programming problems, J. Math. Anal. Appl. 285 (2003) 97-106. [5] C. R. Bector, S. Chandra, S. Gupta, S. K. Suneja, Univex sets, functions and univex nonlinear programming, in: Lecture Notes in Economics and Mathematical system, vol. 405, Springer Verlag, Berlin, 1994, pp. 1-8. [6] D. Du, P. M. Pardalos, W. Z. Wu, Minimax and Applications, Kluwer Academic Publishers, The Netharlands, 1995. [7] G. J. Zalmai, Second order functions and generalized duality models for multiobjective programming problems containing arbitrary norms, J. Korean Math. Soc. 50 (2013), no. 4, 727-753.

173

Meraj Ali Khan et al 163-175

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[8] H. Kuk, G. M. Lee, D. S. Kim, Nonsmooth multiobjective programs with V − ρ−invexity, Ind. J. Pure. Appl. Math. 29 (1998), no. 2, 405-412. [9] I. Ahmad, Sufficiency and duality in multiobjective programming with generalized (F, ρ)- convexity, Journal of Applied Analysis 11 (2005) 19-33. [10] I. Ahmad, Z. Husain, Second order (F, α, ρ, d)− convexity and duality in multi objective programming, Info. Sci. 176 (2006) 3094-3103 [11] I. Barrodale, Best rational approximation and strict quasi convexity, SIAM Journal on Numerical Analysis 10 (1973) 8-12. [12] J. Zhang, B. Mond, Second order duality for multiobjective nonlinear programming involving generalized convexity, in: B. M. Glower, B. D. Cravan, D. Ralph (Eds.), Proceeding of the Optimization Miniconference III, University of Ballarat, (1997), 79-95 [13] J. P. Vial, Strong and weak convexity of sets and functions, Math. Oper. Res. 8 (1983) 231-259. [14] M. A. Hanson, B. Mond, Further generalizations of convexity in mathematical programming, J. Inform. optim. Sci. 3 (1982) 25-32. [15] M. A. Hanson, On sufficiency of the Kuhn-Tucker conditions, J. Math. Anal. Appl. 80 (1981) 545-550. [16] M. A. Hanson, Second order invexity and duality in mathematical programming, Opsearch 30 (1993) 311-320. [17] Pallavi Kharbanda, Divya Agrawal, Deepa Sinha, Multiobjective programming under (ϕ, d)−V −type I univexity, Opsearch 52 (2015), no. 1, 168-185. [18] N. G. Rueda, M. A. Hanson, C. Singh, Optimality and duality with generalized convexity, J. Optim. Theory Appl. 86 (1995) 491-500. [19] O. L. Mangasarian, Second and higher order duality in nonlinear programming, J. Math. Anal. Appl. 51 (1975) 607-620. [20] R. G. Schroedar, Linear programming solutions to ratio games, Operation Research 18 (1970) 300-305. [21] Ramu Dubey, Shiv K. Gupta, Meraj Ali Khan, Optimality and duality results for a nondifferentiable multiobjective fractional programming problem, Journal of inequalities and application, DOI:10.1186/s13660-015-08760. [22] S. K. Mishra, K. K. Lai, Vinay Singh, Optimality and duality for minimax fractional programming with support function under (C, α, ρ, d)− convexity, J. Comp. Appl. Math. 274 (2015) 1-10. [23] Saroj K. Pradhan, C. Nahak, Second order duality for invex composite optimization, J. Egyptian Math. Soc. 23 (2015) 149-154. [24] S. K. Gupta, D. Dangar, Generalized multiobjective symmetric duality under second order (F, α, ρ, d)-convexity, Acta Mathematicae Applicatae Sinicia, English Series 31 (2015), no. 2, 529-542.

174

Meraj Ali Khan et al 163-175

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[25] S. Tanimoto, Duality for a class of nondifferentiable mathematical programming problems, J. Math. Anal. App. 79 (1981) 283-294. [26] T. R. Gulati, M. A. Islam, Sufficiency and duality in multiobjective programming involving generalized F - convex functions, J. Math. Anal. Appl. 183 (1994) 181-195. [27] Thai Doan Chuong, D. Sang Kim, A class of nonsmooth fractional multiobjective optimization problems, Ann. Oper. Res. doi:10.1007/s10479-0162130-7. [28] V. Preda, On efficiency and duality for multiobjective programs, J. Math. Anal. 42 (1992), no. 3, 234-240. [29] W. E. Schmittendorf, Necessary and sufficient conditions for static minimax problems, J. Math. Anal. App. 57 (1977) 683-693. [30] Z. A. Liang, H. X. Huang, P. M. Pardalos, Efficiency conditions and duality for a class of multiobjective programming problems, J. Global Optim. 27 (2003) 1-25. [31] Z. A. Liang, H. X. Huang, P. M. Pardalos, Optimality conditions and duality for a class of nonlinear fractional programming problems, J. Optim. Theory Appl. 27 (2003) 1-25. [32] Z. Husain, I. Ahmad and Sarita Sharma, Second order duality for minimax fractional programming, Optimization Letters 3 (2009), no. 2, 277-286. Author’s addresses: Meraj Ali Khan, Department of Mathematics University of Tabuk Kingdom of Saudi Arabia E-mail:[email protected] Amira A. Ishan, Department of Mathematics Taif University Kingdom of Saudi Arabia E-mail:[email protected] F. R. Al-Solamy Department of Mathematics King Abdulaziz University P.O. Box 80015, Jeddah 21589, Kingdom of Saudi Arabia E-mail:[email protected]

175

Meraj Ali Khan et al 163-175

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

COUPLED COINCIDENCE POINT THEOREMS AND CONE b-METRIC SPACES OVER BANACH ALGEBRAS YOUNG-OH YANG* AND HONG JOON CHOI Abstract. In this paper, we obtain some coupled coincidence point results for two nonlinear contractive mappings in cone b-metric spaces over Banach algebras without assumption of normality by virtue of the properties of spectral radius. Also we give two examples as applications of the main results.

1. Introduction In 2007 the concept of cone metric space was introduced by Huang and Zhang in [4], where they generalized metric space by replacing the set of real numbers with an ordering Banach space, and proved some fixed point theorems for contractive mappings on these spaces. Recently, in ([1],[3], [4], [5], [6], [7], [9], [10]) some common fixed point theorems have been proved for contractive maps on cone metric spaces. Gnana Bhaskar and Lakshmikantham([2]) introduced the concept of coupled fixed point of a mapping F : X × X → X and investigated some coupled fixed point theorems in partially ordered sets. Since then this new concept is extended and used in various directions( [2]). In 2013, in order to generalize the Banach contraction principle to more general form, Liu and Xu([7]) introduced the concept of cone metric spaces over Banach algebras, by replacing Banach spaces with Banach algebras as the underlying spaces of cone metric spaces, and proved some fixed point theorems of generalized Lipschitz mappings with weaker and natural conditions on generalized Lipschitz constants by means of spectral radius. Furthermore, they gave an example to explain that the fixed point theorems in cone metric spaces over Banach algebras are not equivalent to those in metric spaces. Motivated by the above works, in this paper, we obtain some coupled coincidence point results for two nonlinear contractive mappings in cone b-metric spaces over Banach algebras without assumption of normality by virtue of the properties of spectral radius. Our main results extends the corresponding similar results in cone metric spaces. Also we give two examples as applications of the main results. 1991 Mathematics Subject Classification. 47H10, 54H25. Key words and phrases. cone metric spaces over Banach algebras, coupled fixed point, spectral radius. *Corresponding author: [email protected]. 1

176

YOUNG-OH YANG et al 176-188

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

YOUNG-OH YANG* AND HONG JOON CHOI

2

Let A always be a real Banach algebra. That is, A is a real Banach space in which an operation of multiplication is defined, subject to the following properties (for all x, y, z ∈ A, α ∈ R): (1) (2) (3) (4)

(xy)z = x(yz); x(y + z) = xy + xz and (x + y)z = xz + yz; α(xy) = (αx)y = x(αy); kxyk ≤ kxkkyk.

In this paper, we shall assume that A is a real Banach algebra with a unit (i.e., a multiplicative identity) e. An element x ∈ A is said to be invertible if there is an inverse element y ∈ A such that xy = yx = e. The inverse of x is denoted by x−1 . Let A be a real Banach algebra with a unit e and θ the zero element of A. A nonempty closed subset P of Banach algebra A is called a cone if (i) (ii) (iii) (iv)

{θ, e} ⊂ P ; αP + βP ⊂ P for all nonnegative real numbers α, β ; P2 = PP ⊂ P ; P ∩ (−P ) = {θ} i.e, x ∈ P and −x ∈ P imply x = θ.

For any cone P ⊆ A, we can define a partial ordering ¹ with respect to P by x ¹ y if and only if y − x ∈ P . x ≺ y stands for x ¹ y but x 6= y. Also, we use x ¿ y to indicate that y − x ∈ int P where int P denotes the interior of P . If int P 6= ∅ then P is called a solid cone. A cone P is called normal if there exists a number K such that for all x, y ∈ A, θ¹x¹y

implies kxk ≤ Kkyk.

(1.1)

The least positive number K satisfying condition (1.1) is called the normal constant of P . In the following we always assume that P is a solid cone of A and ¹ is the partial ordering with respect to P . Definition 1.1. Let X be a nonempty set, s ≥ 1 be a constant and A be a real Banach algebra. Suppose the mapping d : X × X → A satisfies the following conditions: (1) θ ¹ d(x, y) for all x, y ∈ X and d(x, y) = θ if and only if x = y ; (2) d(x, y) = d(y, x) for all x, y ∈ X ; (3) d(x, y) ¹ s[d(x, z) + d(z, y)] for all x, y, z ∈ X. Then d is called a cone b-metric on X, and (X, d) is called a cone b-metric space over the Banach algebra A. If s = 1,then every cone b-metric is a cone metric.

177

YOUNG-OH YANG et al 176-188

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

COUPLED COINCIDENCE POINT THEOREMS AND CONE b-METRIC SPACES

3

Example 1.2. Let A = C[a, b] be the set of continuous functions on [a, b] with the supremum. Define multiplication in the usual way. Then A is a Banach algebraa with a unit 1. Set P = {x ∈ A : x(t) ≥ 0, t ∈ [a, b]} and X = R. We define a mapping d : X × X → A by d(x, y)(t) = |x − y|p et for all x, y ∈ X and for each t ∈ [a, b], where p > 1 is a constant. This makes (X, d) into a cone b-metric space over Banach algebra with the coefficient s = 2p−1 . But it is not a cone metric space over Banach algebra since it does not satisfy the triangle inequality. Definition 1.3. Let (X, d) be a cone b-metric space over the Banach algebra A. Let {xn } be a sequence in X and x ∈ X. (1) If for every c ∈ A with θ ¿ c, there exists a natural number N such that d(xn , x) ¿ c for all n > N , then {xn } is said to be convergent and {xn } converges to x, and the point x is the limit of {xn }. We denote this by lim xn = x or xn → x (n → ∞).

n→∞

(2) If for all c ∈ A with θ ¿ c, there exists a positive integer N such that d(xn , xm ) ¿ c for all m, n > N , then {xn } is called a Cauchy sequence in X. (3) A cone b-metric space (X, d) is said to be complete if every Cauchy sequence in X is convergent. Definition 1.4. Let E be a real Banach space with a solid cone P . A sequence {xn } ⊂ P is called a c−sequence if for any c ∈ A with θ ¿ c, there exists a positive integer N such that xn ¿ c for all n ≥ N . Lemma 1.5. ([5], [7]) Let E be a real Banach space with a cone P . Then (p1 ) (p2 ) (p3 ) (p4 ) (p5 )

If a ¿ b and b ¿ c, then a ¿ c. If a ¹ b and b ¿ c, then a ¿ c. If a ¹ b + c for each θ ¿ c, then a ¹ b. If θ ¹ u ¿ c for each θ ¿ c, then u = θ. If {xn }, {yn } are sequences in E such that xn → x, yn → y and xn ¹ yn for all n ≥ 1, then x ¹ y.

Lemma 1.6. ([7]) Let A ba a real Banach algebra with a unit e and P be a solid cone in A. We define the spectral radius ρ(x) of x ∈ A by r(x) = lim kxn k1/n = inf kxn k1/n . n→∞

n≥1

178

YOUNG-OH YANG et al 176-188

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

YOUNG-OH YANG* AND HONG JOON CHOI

4

(1) If 0 ≤ r(x) < 1, then then e − x is invertible, (e − x)−1 =

∞ X

xi

and

r((e − x)−1 ) ≤

i=0

(2) (3) (4) (5) (6)

1 . 1 − r(k)

n

If r(x) < 1 then kx k → 0 as n → ∞. If x ∈ P and r(x) < 1, then (e − x)−1 ∈ P . If k, u ∈ P , r(k) < 1 and u ¹ ku, then u = θ. r(x) ≤ kxk for all x ∈ A. If x, y ∈ A and x, y commute, then the following holds: (a) r(xy) ≤ r(x)r(y) (b) r(x + y) ≤ r(x) + r(y) and (c) |r(x) − r(y)| ≤ r(x − y).

Lemma 1.7. ([5], [7]) Let (X, d) be a complete cone b-metric space over a Banach algebra A and let P be a solid cone in A. Let {xn } be a sequence in X. Then (1) (2) (3) (4)

If L kxn k → 0 as n → ∞, then {xn } is a c−sequence. If k ∈ P is any vector and {xn } is c−sequence in P , then {kxn } is a c−sequence. If x, y ∈ A, a ∈ P and x ¹ y, then ax ¹ ay. If {xn } converges to x ∈ X, then {d(xn , x)}, {d(xn , xn+p )} are c-sequences for any p ∈ N. 2. Main results

Gnana Bhaskar and Lakshmikantham([2]) introduced the concept of coupled fixed point of a mapping F : X × X → X and investigated some coupled fixed point theorems in partially ordered sets. Since then this new concept is extended and used in various directions. In this section, we establish some coupled coincidence point results for a mapping F : X × X → X satisfying certain contractive condition on cone metric spaces over Banach algebras without assumption of normality. Definition 2.1. ([2], [8]) Let (X, d) be a cone b-metric space over the Banach algebra A. (1) An element (x, y) ∈ X × X is called a coupled fixed point of F : X × X → X if x = F (x, y) and y = F (y, x). (2) An element (x, y) ∈ X × X is called a coupled coincidence point of mappings F : X × X → Xand g : X × X if g(x) = F (x, y) and g(y) = F (y, x), and (gx, gy) is called coupled point of coincidence; (3) An element (x, y) ∈ X × X is called a common coupled fixed point of mappings F : X × X → X and g : X → X if x = g(x) = F (x, y) and y = g(y) = F (y, x).

179

YOUNG-OH YANG et al 176-188

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

COUPLED COINCIDENCE POINT THEOREMS AND CONE b-METRIC SPACES

5

(4) The mappings F : X × X → X and g : X × X are called w-compatible if g(F (x, y)) = F (gx, gy) whenever g(x) = F (x, y) and g(y) = F (y, x). Note that if (x, y) is a coupled fixed point of F , then (y, x) is also a coupled fixed point of F . Theorem 2.2. Let (X, d) be a complete cone b-metric space over Banach algebra A with the coefficient s ≥ 1 and let P be a solid cone in A. Let F : X × X → X and g : X → X be mappings satisfying d(F (x, y), F (u, v)) ¹ a1 d(gx, gu) + a2 d(F (x, y), gx) + a3 d(gy, gv) + a4 d(F (u, v), gu) + a5 d(F (x, y), gu)

(2.1)

+ a6 d(F (u, v), gx) for all x, y, u, v ∈ X, where ai ∈ P , ai aj = aj ai (i = 1, 2, · · · , 6) and 2s(r(a1 ) + r(a3 )) + (s + 1)(r(a2 ) + r(a4 )) + (s2 + s)(r(a5 ) + r(a6 )) < 2. If F (X × X) ⊆ g(X) and g(X) is a complete subset of X, then F and g have a coupled coincidence point in X. Proof. Let x0 , y0 be any two arbitrary points in X. Set g(x1 ) = F (x0 , y0 ) and g(y1 ) = F (y0 , x0 ). This can be done because F (X × X) ⊆ g(X). Continuing this process we obtain two sequences {xn } and {yn } in X such that g(xn+1 ) = F (xn , yn ) and g(yn+1 ) = F (yn , xn ). From (2.1), we have d(gxn , gxn+1 ) = d(F (xn−1 , yn−1 ), F (xn , yn )) ¹ a1 d(gxn−1 , gxn ) + a2 d(F (xn−1 , yn−1 ), gxn−1 ) + a3 d(gyn−1 , gyn ) + a4 d(F (xn , yn ), gxn ) + a5 d(F (xn−1 , yn−1 ), gxn ) + a6 d(F (xn , yn ), gxn−1 ) = a1 d(gxn−1 , gxn ) + a2 d(gxn , gxn−1 ) + a3 d(gyn−1 , gyn ) + a4 d(gxn+1 , gxn ) + a5 d(gxn , gxn ) + a6 d(gxn+1 , gxn−1 ) ¹ a1 d(gxn−1 , gxn ) + a2 d(gxn , gxn−1 ) + a3 d(gyn−1 , gyn ) + a4 d(gxn+1 , gxn ) + sa6 [d(gxn+1 , gxn ) + d(gxn , gxn−1 )] = (a1 + a2 + sa6 )d(gxn−1 , gxn ) + a3 d(gyn−1 , gyn ) + (a4 + sa6 )d(gxn , gxn+1 ), and so we get (e − a4 − sa6 )d(gxn , gxn+1 ) ¹ (a1 + a2 + sa6 )d(gxn−1 , gxn ) + a3 d(gyn−1 , gyn )

180

(2.2)

YOUNG-OH YANG et al 176-188

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

YOUNG-OH YANG* AND HONG JOON CHOI

6

Similarly, we have (e − a4 − sa6 )d(gyn , gyn+1 ) ¹ (a1 + a2 + sa6 )d(gyn−1 , gyn ) + a3 d(gxn−1 , gxn ) (2.3) Because of the symmetry in (2.1), d(gxn+1 , gxn ) = d(F (xn , yn ), F (xn−1 , yn−1 )) ¹ a1 d(gxn , gxn−1 ) + a2 d(F (xn , yn ), gxn ) + a3 d(gyn , gyn−1 ) + a4 d(F (xn−1 , yn−1 ), gxn−1 ) + a5 d(F (xn , yn ), gxn−1 ) + a6 d(F (xn−1 , yn−1 ), gxn ) = a1 d(gxn , gxn−1 ) + a2 d(gxn+1 , gxn ) + a3 d(gyn , gyn−1 ) + a4 d(gxn , gxn−1 ) + a5 d(gxn+1 , gxn−1 ) + a6 d(gxn , gxn ) ¹ a1 d(gxn , gxn−1 ) + a2 d(gxn+1 , gxn ) + a3 d(gyn , gyn−1 ) + a4 d(gxn , gxn−1 ) + sa5 [d(gxn+1 , gxn ) + d(gxn , gxn−1 )] that is, (e − a2 − sa5 )d(gxn+1 , gxn ) ¹ (a1 + a4 + sa5 )d(gxn−1 , gxn ) + a3 d(gyn , gyn−1 ) (2.4) Similarly, (e − a2 − sa5 )d(gyn+1 , gyn ) ¹ (a1 + a4 + sa5 )d(gyn−1 , gyn ) + a3 d(gxn , gxn−1 ) (2.5) Let δn = d(gxn , gxn+1 ) + d(gyn , gyn+1 ). Now, by (2.2), (2.3),(2.4) and (2.5), we obtain that (e − a4 − sa6 )δn ¹ (a1 + a2 + a3 + sa6 )δn−1

(2.6)

(e − a2 − sa5 )δn ¹ (a1 + a3 + a4 + sa5 )δn−1

(2.7)

Finally, from (2.6) and (2.7) we have (2e − a2 − a4 − sa5 − sa6 )δn ¹ (2a1 + 2a3 + a2 + a4 + sa5 + sa6 )δn−1 By hypothesis and Lemma 1.6, r(a2 + a4 + sa5 + sa6 ) ≤ r(a2 ) + r(a4 ) + sr(a5 ) + sr(a6 ) < 1 and so 2e − (a2 + a4 + sa5 + sa6 ) is invertible by Lemma ??. Putting η = (2e − a2 − a4 − sa5 − sa6 )−1 (2a1 + 2a3 + a2 + a4 + sa5 + sa6 ), we have, by hypothesis, r(η) =

1 2r(a1 ) + 2r(a3 ) + r(a2 ) + r(a4 ) + sr(a5 ) + sr(a6 ) < , 2 − r(a2 ) − r(a4 ) − sr(a5 ) − sr(a6 ) s

and so δn ¹ ηδn−1 ,

r(η) < 1

181

(2.8)

YOUNG-OH YANG et al 176-188

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

COUPLED COINCIDENCE POINT THEOREMS AND CONE b-METRIC SPACES

7

Consequently, we have

θ ¹ δn ¹ ηδn−1 ¹ · · · ¹ η n δ0

(2.9)

If δ0 = θ then (x0 , y0 ) is a coupled coincidence point of F and g. So let θ ≺ δ0 . If m > n, we have

d(gxm , gxn )

¹

s[d(gxn , gxn+1 ) + d(gxn+1 , gxm )]

¹ .. .

sd(gxn , gxn+1 ) + s2 [d(gxn+1 , gxn+2 ) + d(gxn+2 , gxm )]

¹

sd(gxn , gxn+1 ) + s2 d(gxn+1 , gxn+2 ) + · · ·

(2.10)

+sm−n−1 d(gxm−2 , gxm−1 ) + sm−n d(gxm−1 , gxm )

and similarly

d(gym , gyn )

¹

sd(gyn , gyn+1 ) + s2 d(gyn+1 , gyn+2 ) + · · ·

(2.11)

+sm−n−1 d(gym−2 , gym−1 ) + sm−n d(gym−1 , gym )

Adding both the above inequalities, we get

d(gxm , gxn ) + d(gym , gyn ) ¹ sm−n δm−1 + sm−n−1 δm−2 + · · · sδn ¹ (sm−n η m−1 + sm−n−1 η m−2 + · · · + sη n )δ0 n

∞ X

¹ sη (

(sη)i )δ0 = sη n (e − sη)−1 δ0 → θ

i=0

as n → ∞. From Lemma 1.7, it follows that for θ ¿ c and large n, η n (1 − η)−1 δ0 ¿ c. Thus, according to (p2 ), d(gxn , gxm ) + d(gyn , gym ) ¿ c. Hence, by Definition, {d(gxn , gxm ) + d(gyn , gym )} is a Cauchy sequence. Since, d(gxn , gxm ) ¹ d(gxn , gxm ) + d(gyn , gym ) and d(gyn , gym ) ¹ d(gxn , gxm ) + d(gyn , gym ), then again by (p2 ), {gxn } and {gyn } are Cauchy sequences in g(X). Since g(X) is a complete subset of X, there exist x and y in X such that gxn → gx and gyn → gy.

182

YOUNG-OH YANG et al 176-188

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

YOUNG-OH YANG* AND HONG JOON CHOI

Now, we prove that F (x, y) = gx and F (y, x) = gy. For that we have d(F (x, y), gx) ¹ s[d(F (x, y), gxn+1 ) + d(gxn+1 , gx)] = s[d(F (x, y), F (xn , yn )) + d(gxn+1 , gx)] ¹ sa1 d(gx, gxn ) + sa2 d(F (x, y), gx) + sa3 d(gy, gyn ) + sa4 d(F (xn , yn ), gxn ) + sa5 d(F (x, y), gxn ) + sa6 d(F (xn , yn ), gx) + sd(gxn+1 , gx) = sa1 d(gx, gxn ) + sa2 d(F (x, y), gx) + sa3 d(gy, gyn ) + sa4 d(gxn+1 , gxn ) + sa5 d(F (x, y), gxn ) + sa6 d(gxn+1 , gx) + sd(gxn+1 , gx) ¹ sa1 d(gx, gxn ) + sa2 d(F (x, y), gx) + sa3 d(gy, gyn ) + s2 a4 d(gxn+1 , gx) + s2 a4 d(gx, gxn ) + s2 a5 [d(F (x, y), gx) + d(gx, gxn )] + sa6 d(gxn+1 , gx) + sd(gxn+1 , gx) which further implies that d(F (x, y), gx) ¹ (e − sa2 − s2 a5 )−1 (sa1 + s2 (a4 + a5 ))d(gxn , gx)

(2.12)

+ (e − sa2 − s2 a5 )−1 (e + s2 a4 + sa6 )d(gxn+1 , gx) + (e − sa2 − s2 a5 )−1 sa3 d(gyn , gy). since e − sa2 − s2 a5 is invertible. Since gxn → gx and gyn → gy, then for any θ ¿ c there exists N ∈ N such that for all n ≥ N , (1 − sr(a2 ) − s2 r(a5 ))c (1 − sr(a2 ) − s2 r(a5 ))c d(gxn , gx) ¿ , d(gxn+1 , gx) ¿ 3(sr(a1 ) + s2 r(a4 ) + s2 r(a5 )) 3(s + s2 r(a4 ) + sr(a6 )) and (1 − sr(a2 ) − s2 r(a5 ))c . d(gyn , gy) ¿ 3sr(a3 ) Thus, for all n ≥ N , c c c (2.13) d(F (x, y), gx) ¿ + + = c. 3 3 3 Now, according to (p4 ), it follows that d(F (x, y), gx) = θ and so F (x, y) = gx. Similarly, F (y, x) = gy. Hence (x, y) is a coupled coincidence point of the mappings F and g. ¤ Corollary 2.3. Let (X, d) be a complete cone metric space over Banach algebra A and let P be a solid cone in A. Let F : X × X → X and g : X → X be mappings satisfying d(F (x, y), F (u, v)) ¹ a1 d(gx, gu) + a2 d(F (x, y), gx) + a3 d(gy, gv) + a4 d(F (u, v), gu) + a5 d(F (x, y), gu) + a6 d(F (u, v), gx)

183

YOUNG-OH YANG et al 176-188

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

COUPLED COINCIDENCE POINT THEOREMS AND CONE b-METRIC SPACES

9

P

for all x, y, u, v ∈ X, where ai ∈ P , ai aj = aj ai (i = 1, 2, · · · , 6) and 6i=1 r(ai ) < 1. If F (X × X) ⊆ g(X) and g(X) is a complete subset of X, then F and g have a coupled coincidence point in X. Proof. Taking s = 1 in Theorem 2.2, we get the required result.

¤

Corollary 2.4. Let (X, d) be a complete cone b-metric space over Banach algebra A with the coefficient s ≥ 1 and let P be a solid cone in A. Let F : X × X → X be mappings satisfying d(F (x, y), F (u, v)) ¹ a1 d(x, u) + a2 d(F (x, y), x) + a3 d(y, v) + a4 d(F (u, v), u) + a5 d(F (x, y), u) + a6 d(F (u, v), x) for all x, y, u, v ∈ X, where ai ∈ P and ai aj = aj ai (i = 1, 2, · · · , 6) If 2s(r(a1 ) + r(a3 )) + (s + 1)(r(a2 ) + r(a4 )) + (s2 + s)(r(a5 ) + r(a6 )) < 2, then F has a coupled fixed point in X. Proof. Taking g = IX , identity mapping of X in Theorem 2.2, we get the required result. ¤ Corollary 2.5. Let (X, d) be cone b-metric space over Banach algebra A with the coefficient s ≥ 1 and let P be a solid cone in A. Suppose that two mappings F : X × X → X and g : X → X satisfy d(F (x, y), F (u, v)) ¹ a[d(gx, gu) + d(F (x, y), gx)] + b[d(gy, gv) + d(F (u, v), gu)] + c[d(F (x, y), gu) + d(F (u, v), gx)] for all x, y, u, v ∈ X, where a, b, c ∈ P commute and (3s + 1)[r(a) + r(b)] + 2(s2 + s)r(c) < 2. If F (X × X) ⊆ g(X) and g(X) is complete subset of X, then F and g have a coupled coincidence point in X. Proof. Taking a1 = a2 = a, a3 = a4 = b, a5 = a6 = c in Theorem 2.2, we get the required result. ¤ Corollary 2.6. Let (X, d) be a complete cone b-metric space over Banach algebra A and let P be a solid cone in A. Suppose that F : X × X → X satisfies the following contractive condition for all x, y, u, v ∈ X : d(F (x, y), F (u, v)) ¹ kd(x, u) + ld(y, v)

184

YOUNG-OH YANG et al 176-188

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

YOUNG-OH YANG* AND HONG JOON CHOI

where k, l ∈ P commute and s[r(k) + r(l)] < 1. Then F has a unique coupled fixed point. Proof. Taking a1 = k, a3 = l, a2 = a4 = a5 = a6 = θ and g = IX in Theorem 2.2, we get the required result. ¤ Corollary 2.7. Let (X, d) be a complete cone b-metric space over Banach algebra A and let P be a solid cone in A. Suppose F : X × X → X satisfies the following contractive condition for all x, y, u, v ∈ X: d(F (x, y), F (u, v)) ¹ kd(F (x, y), x) + ld(F (u, v), u) where k, l ∈ P commute and (s + 1)[r(k) + r(l)] < 2. Then F has a unique coupled fixed point. Proof. Taking a2 = k, a4 = l, a1 = a3 = a5 = a6 = θ and g = IX in Theorem 2.2, we get the required result. ¤ Corollary 2.8. Let (X, d) be a complete cone b-metric space over Banach algebra A and let P be a solid cone in A. Suppose F : X × X → X satisfies the following contractive condition for all x, y, u, v ∈ X: d(F (x, y), F (u, v)) ¹ kd(F (x, y), u) + ld(F (u, v), x) where k, l ∈ P commute and (s2 + s)[r(k) + r(l)] < 2. Then F has a unique coupled fixed point. Proof. Taking a5 = k, a6 = l, a1 = a2 = a3 = a5 = θ and g = IX in Theorem 2.2, we get the required result. ¤ Now we present two examples showing that Theorem 2.2 is a proper extension of known results. In this example, the conditions of Theorem 2.2 are fulfilled. Example 2.9. (The case of non-normal cone) Let A = CR1 [0, 1] and define a norm on A by kxk = kxk∞ + kx0 k∞ for x ∈ A. Define multiplication in A as just pointwise multiplication. Then A is a real Banach algebra with unit e = 1(e(t) = 1 for all t ∈ [0, 1]). The set P = {x ∈ A : x ≥ 0} is a cone in A. Moreover, P is not normal. Let X = {1, 2, 3}. Define d : X × X → A by d(1, 2)(t) = d(2, 1)(t) = d(2, 3)(t) = d(3, 2)(t) = et , d(1, 3)(t) = d(3, 1)(t) = 3et , d(x, x)(t) = θ for all t ∈ [0, 1] and for each x ∈ X. Then (X, d) is a solid cone b-metric space over Banach algebra with the coefficient s = 23 . But it is not a cone metric space over Banach algebra since it does not satisfy the triangle inequality.

185

YOUNG-OH YANG et al 176-188

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

COUPLED COINCIDENCE POINT THEOREMS AND CONE b-METRIC SPACES

11

Define two mappings F : X × X → X by   3, F (x, y) =  2,

(x, y) = (3, 1) otherwise

and g : X → X by g1 = 3, g2 = 2, g3 = 1. Then F (X × X) = {2, 3} ⊂ {1, 2, 3} = g(X). Let a1 , a2 , a3 , a4 , a5 , a6 ∈ P defined with a1 (t) = a3 (t) = 0.03, a2 (t) = 0.02, a4 (t) = 0.25, a5 (t) = a6 (t) = 0.154 for all t ∈ [0, 1]. Then, by definition of spectral radius, r(a1 ) = r(a3 ) = 0.03, r(a2 ) = 0.02, r(a4 ) = 0.25, r(a5 ) = r(a6 ) = 0.15 and so 2s(r(a1 ) + r(a3 )) + (s + 1)(r(a2 ) + r(a4 )) + (s2 + s)(r(a5 ) + r(a6 )) = 1.89 < 2. Since d(F (x, y), F (3, 1))(t) = d(2, 3)(t) = et for any x, y ∈ X, by careful calculations, we can get that for any x, y, u, v ∈ X, F and g satisfy the contractive condition (2.1) of Theorem 2.2. Hence the hypotheses are satisfied and so by Theorem 2.2, F and g have a coupled coincidence point in a complete cone b-metric space X over Banach algebra. Since F (2, 2) = 2 = g2, F and g are w-compatible and (2, 2) is the unique coupled coincidence point of F and g. Example 2.10. (The case of normal cone) Let A = R2 and define a norm on A by k(x1 , x2 )k = |x1 | + |x2 | for x = (x1 , x2 ) ∈ A. Define the multiplication in A by (x1 , x2 )(y1 , y2 ) = (x1 y1 , x2 y2 ). Put P = {x = (x1 , x2 ) ∈ A : x1 , x2 ≥ 0}. Then P is a normal cone and A is a real Banach algebra with unit e = (1, 1). Let X = [0, ∞). Define a mapping d : X × X → A by d(x, y) = (|x − y|2 , |x − y|2 ) for each x, y ∈ X. Then (X, d) is a complete cone b-metric space over Banach algebra with the coefficient s = 2. But it is not a cone metric space over Banach algebra since it does not satisfy the triangle inequality. Consider the mappings F : X × X → X and g : X → X defined by | sin y| F (x, y) = x + 2 and g(x) = 3x. Then F (X × X) ⊆ g(X) = X. Let a1 , a2 , a3 , a4 , a5 , a6 ∈ P defined with 1 2 a1 = ( , 0), a3 = ( , 0), a2 = a4 = (0, 0), a5 = a6 = (0.07, 0). 9 18 1 , r(a2 ) = r(a4 ) = Then, by definition of spectral radius, r(a1 ) = 92 , r(a3 ) = 18 0, r(a5 ) = r(a6 ) = 0.07, and so 4(r(a1 ) + r(a3 )) + 3(r(a2 ) + r(a4 )) + 6(r(a5 ) + r(a6 )) < 2.

186

YOUNG-OH YANG et al 176-188

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

YOUNG-OH YANG* AND HONG JOON CHOI

12

By careful calculations, it is easy to verify that for any x, y, u, v ∈ X, F and g satisfy the contractive condition (2.1) of Theorem 2.2. Thus by Theorem 2.2, F and g have a coupled coincidence point in a complete cone b-metric space X over Banach algebra. Since F (0, 0) = g0 = 0, (0, 0) is the common coupled coincidence point of F and g. Theorem 2.11. Let F : X × X → X and g : X → X be two mappings which satisfy all the conditions of Theorem 2.2. If F and g are w-compatible, then F and g have unique common coupled fixed point. Moreover, common fixed point of F and g is of the form (u, u) for some u ∈ X. Proof. First we claim that coupled point of coincidence is unique. Suppose that (x, y), (x∗ , y ∗ ) ∈ X × X with g(x) = F (x, y), g(y) = F (y, x) and g(x∗ ) = F (x∗ , y ∗ ), g(y ∗ ) = F (y ∗ , x∗ ). Using (2.1), we get d(gx, gx∗ ) ¹ d(F (x, y), F (x∗ , y ∗ )) ¹ a1 d(gx, gx∗ ) + a2 d(F (x, y), gx) + a3 d(gy, gy ∗ ) + a4 d(F (x∗ , y ∗ ), gx∗ ) + a5 d(F (x, y), gx∗ ) + a6 d(F (x∗ , y ∗ ), gx) = (a1 + a5 + a6 )d(gx, gx∗ ) + a3 d(gy, gy ∗ ) and so d(gx, gx∗ ) ¹ (a1 + a5 + a6 )d(gx, gx∗ ) + a3 d(gy, gy ∗ ).

(2.14)

d(gy, gy ∗ ) ¹ (a1 + a5 + a6 )d(gy, gy ∗ ) + a3 d(gx, gx∗ ).

(2.15)

Similarly

Thus d(gx, gx∗ ) + d(gy, gy ∗ ) ¹ (a1 + a3 + a5 + a6 )(d(gx, gx∗ ) + d(gy, gy ∗ )). Since s ≥ 1 and r(a1 ) + r(a3 ) + r(a5 ) + r(a6 ) < 1, therefore by Lemma 1.6(4), we have d(gx, gx∗ ) + d(gy, gy ∗ ) = θ, which implies that gx = gx∗ and gy = gy ∗ . Similarly we prove that gx = gy ∗ and gy = gx∗ . Thus gx = gy. Therefore (gx, gx) is unique coupled point of coincidence of F and g. Now, let g(x) = u. Then we have u = g(x) = F (x, x). By w- compatibility of F and g, we have g(u) = g(g(x)) = g(F (x, x)) = F (gx, gx) = F (u, u).

(2.16)

Then (gu, gu) is a coupled point of coincidence of F and g. Consequently gu = gx. Therefore u = gu = F (u, u). Hence (u, u) is unique common coupled fixed point of F and g. ¤

187

YOUNG-OH YANG et al 176-188

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.1, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

COUPLED COINCIDENCE POINT THEOREMS AND CONE b-METRIC SPACES

13

References [1] M. Abbas and G. Jungck, Common fixed point results for noncommuting mappings without continuity in cone metric spaces, J. Math. Anal. Appl. 341 (2008) 416-420. [2] T. G. Bhaskar and V. Lakshmikantham, Fixed point theorems in partially ordered metric spaces and applications, Nonlinear Analysis 65 (2006) 1379-1393 [3] Y.J. Cho, R. Saadati, and Sh. Wang, Common fixed point theorems on generalized distance in ordered cone metric spaces, Comput Math Appl. 61 (2011) 1254-1260. doi:10.1016/j.camwa.2011.01.004 [4] L.G. Huang and X. Zhang, Cone metric spaces and fixed point theorems of contractive mappings, J. Math. Anal. Appl., 332 (2007) 1468-1476 [5] S. Radenovic and B. E. Rhoades, Fixed Point Theorem for two non-self mappings in cone metric spaces, Computers and Mathematics with Applications 57 (2009) 1701-1707 [6] S. Wang and B. Guo, Distance in cone metric spaces and common fixed point theorems, Applied Mathematical Letters. 24 (2011) 1735-1739 [7] S. Xu and S. Radenovic, Fixed point theorems of generalized Lipschitz mappings on cone metric spaces over Banach algebras without assumption of normality, Fixed Point Theory and Applications 2014, 2014:102 [8] P. Yan, J. Yin, Q. Leng, Some coupled fixed point results on cone metric spaces over Banach algebras and applications, J. Nonlinear Sci. Appl. 9 (2016) 5661-5671 [9] Y.O.Yang and H.J. Choi, Common fixed point theorems on cone metric spaces, Far East J. Math. Sci(FJMS), 100(7) (2016) 1101-1117 [10] Y.O.Yang and H.J. Choi, Fixed point theorems in ordered cone metric spaces, Journal of nonlinear science and applications, 9(6) (2016) 4571-4579 Young-Oh Yang, Department of Mathematics, Jeju National University, Jeju 690756, Korea E-mail address: [email protected] Hong Joon Choi, Department of Mathematics, Jeju National University, Jeju 690756, Korea E-mail address: [email protected]

188

YOUNG-OH YANG et al 176-188

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO. 1, 2019

An application of Binomial distribution series on certain analytic functions, Waqas Nazeer, Qaisar Mehmood, Shin Min Kang, and Absar Ul Haq,……………………………………11 Soft rough approximation operators via ideal, Heba.I. Mustafa,…………………………...18 Stability of C*-ternary quadratic 3-homomorphisms, Hossein Piri, S. H. Aslani, V. Keshavarz, Choonkil Park, and Sun Young Jang,………………………………………………………36 Stability of functional equations in Šerstnev probabilistic normed spaces, Choonkil Park, V. Arasu, and M. Angayarkanni,………………………………………………………………42 New subclass of analytic functions in conic domains associated with q - Sălăgean differential operator involving complex order, R. Vijaya, T. V. Sudharsan, M. Govindaraj, and S. Sivasubramanian,…………………………………………………………………………….50 Fourier series of sums of products of ordered Bell and Genocchi Functions, Taekyun Kim, Dae San Kim, Lee Chae Jang, and D. V. Dolgy,…………………………………………………..58 Two transformation formulas on the bilateral basic hypergeometric series, Qing Zou,………73 The p-moment exponential estimates for neutral stochastic functional differential equations in the G-framework, Faiz Faizullah, A.A. Memom, M.A. Rana, and M. Hanif,…………………81 Generalized contractions with triangular 𝛼𝛼-orbital admissible mappings with respect to 𝜂𝜂 on partial rectangular metric spaces, Suparat Baiya and Anchalee Kaewcharoen,………………..91 On stability problems of a functional equation deriving from a quintic function, D. Kang and H. Koh,…………………………………………………………………………………………….110 Comparisons of isolation numbers and semiring ranks of fuzzy matrices, Seok-Zun Song and Young Bae Jun,…………………………………………………………………………………121 Some properties of certain difference polynomials, Yong Liu, Yuqing Zhang, and Xiaoguang Qi,……………………………………………………………………………………………….130 Stability of ternary Jordan bi-derivations on C*-ternary algebras for bi-Jensen functional equation, Sedigheh Jahedi, Vahid Keshavarz, Choonkil Park, and Sungsik Yun,……………..140

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO. 1, 2019 (continued)

A nonmonotone smoothing Newton algorithm for circular cone complementarity problems, Xiaoni Chi, Hongjin Wei, Zhongping Wan, and Zhibin Zhu,…………………………………146 Duality in nondifferentiable multiobjective fractional programming problems involving second order (F, b, ϕ, 𝜌𝜌, 𝜃𝜃) – univex functions, Meraj Ali Khan, Amira A. Ishan, and Falleh R. AlSolamy,…………………………………………………………………………………………163 Coupled coincidence point theorems and cone b-metric spaces over Banach algebras, Young-Oh Yang and Hong Joon Choi,…………………………………………………………………….176

Volume 26, Number 2 ISSN:1521-1398 PRINT,1572-9206 ONLINE

February 2019

Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC

Journal of Computational Analysis and Applications ISSNno.’s:1521-1398 PRINT,1572-9206 ONLINE SCOPE OF THE JOURNAL An international publication of Eudoxus Press, LLC (fifteen times annually) Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152-3240, U.S.A [email protected] http://www.msci.memphis.edu/~ganastss/jocaaa The main purpose of "J.Computational Analysis and Applications" is to publish high quality research articles from all subareas of Computational Mathematical Analysis and its many potential applications and connections to other areas of Mathematical Sciences. Any paper whose approach and proofs are computational,using methods from Mathematical Analysis in the broadest sense is suitable and welcome for consideration in our journal, except from Applied Numerical Analysis articles. Also plain word articles without formulas and proofs are excluded. The list of possibly connected mathematical areas with this publication includes, but is not restricted to: Applied Analysis, Applied Functional Analysis, Approximation Theory, Asymptotic Analysis, Difference Equations, Differential Equations, Partial Differential Equations, Fourier Analysis, Fractals, Fuzzy Sets, Harmonic Analysis, Inequalities, Integral Equations, Measure Theory, Moment Theory, Neural Networks, Numerical Functional Analysis, Potential Theory, Probability Theory, Real and Complex Analysis, Signal Analysis, Special Functions, Splines, Stochastic Analysis, Stochastic Processes, Summability, Tomography, Wavelets, any combination of the above, e.t.c. "J.Computational Analysis and Applications" is a peer-reviewed Journal. See the instructions for preparation and submission of articles to JoCAAA. Assistant to the Editor: Dr.Razvan Mezei,[email protected], Madison,WI,USA.

Journal of Computational Analysis and Applications(JoCAAA) is published by EUDOXUS PRESS,LLC,1424 Beaver Trail Drive,Cordova,TN38016,USA,[email protected] http://www.eudoxuspress.com. Annual Subscription Prices:For USA and Canada,Institutional:Print $800, Electronic OPEN ACCESS. Individual:Print $400. For any other part of the world add $160 more(handling and postages) to the above prices for Print. No credit card payments. Copyright©2019 by Eudoxus Press,LLC,all rights reserved.JoCAAA is printed in USA. JoCAAA is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH. It is strictly prohibited the reproduction and transmission of any part of JoCAAA and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes no responsibility for the content of published papers.

192

Editorial Board Associate Editors of Journal of Computational Analysis and Applications Francesco Altomare Dipartimento di Matematica Universita' di Bari Via E.Orabona, 4 70125 Bari, ITALY Tel+39-080-5442690 office +39-080-3944046 home +39-080-5963612 Fax [email protected] Approximation Theory, Functional Analysis, Semigroups and Partial Differential Equations, Positive Operators.

Fractional Differential Equations Nonlinear Analysis, Fractional Dynamics Carlo Bardaro Dipartimento di Matematica e Informatica Universita di Perugia Via Vanvitelli 1 06123 Perugia, ITALY TEL+390755853822 +390755855034 FAX+390755855024 E-mail [email protected] Web site: http://www.unipg.it/~bardaro/ Functional Analysis and Approximation Theory, Signal Analysis, Measure Theory, Real Analysis.

Ravi P. Agarwal Department of Mathematics Texas A&M University - Kingsville 700 University Blvd. Kingsville, TX 78363-8202 tel: 361-593-2600 [email protected] Differential Equations, Difference Equations, Inequalities

Martin Bohner Department of Mathematics and Statistics, Missouri S&T Rolla, MO 65409-0020, USA [email protected] web.mst.edu/~bohner Difference equations, differential equations, dynamic equations on time scale, applications in economics, finance, biology.

George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis, TN 38152,U.S.A Tel.901-678-3144 e-mail: [email protected] Approximation Theory, Real Analysis, Wavelets, Neural Networks, Probability, Inequalities.

Jerry L. Bona Department of Mathematics The University of Illinois at Chicago 851 S. Morgan St. CS 249 Chicago, IL 60601 e-mail:[email protected] Partial Differential Equations, Fluid Dynamics

J. Marshall Ash Department of Mathematics De Paul University 2219 North Kenmore Ave. Chicago, IL 60614-3504 773-325-4216 e-mail: [email protected] Real and Harmonic Analysis

Luis A. Caffarelli Department of Mathematics The University of Texas at Austin Austin, Texas 78712-1082 512-471-3160 e-mail: [email protected] Partial Differential Equations George Cybenko Thayer School of Engineering

Dumitru Baleanu Department of Mathematics and Computer Sciences, Cankaya University, Faculty of Art and Sciences, 06530 Balgat, Ankara, Turkey, [email protected]

193

Dartmouth College 8000 Cummings Hall, Hanover, NH 03755-8000 603-646-3843 (X 3546 Secr.) e-mail:[email protected] Approximation Theory and Neural Networks

011-49-203-379-3542 e-mail: [email protected] Approximation Theory, Computer Aided Geometric Design John R. Graef Department of Mathematics University of Tennessee at Chattanooga Chattanooga, TN 37304 USA [email protected] Ordinary and functional differential equations, difference equations, impulsive systems, differential inclusions, dynamic equations on time scales, control theory and their applications

Sever S. Dragomir School of Computer Science and Mathematics, Victoria University, PO Box 14428, Melbourne City, MC 8001, AUSTRALIA Tel. +61 3 9688 4437 Fax +61 3 9688 4050 [email protected] Inequalities, Functional Analysis, Numerical Analysis, Approximations, Information Theory, Stochastics.

Weimin Han Department of Mathematics University of Iowa Iowa City, IA 52242-1419 319-335-0770 e-mail: [email protected] Numerical analysis, Finite element method, Numerical PDE, Variational inequalities, Computational mechanics

Oktay Duman TOBB University of Economics and Technology, Department of Mathematics, TR06530, Ankara, Turkey, [email protected] Classical Approximation Theory, Summability Theory, Statistical Convergence and its Applications

Tian-Xiao He Department of Mathematics and Computer Science P.O. Box 2900, Illinois Wesleyan University Bloomington, IL 61702-2900, USA Tel (309)556-3089 Fax (309)556-3864 [email protected] Approximations, Wavelet, Integration Theory, Numerical Analysis, Analytic Combinatorics

Saber N. Elaydi Department Of Mathematics Trinity University 715 Stadium Dr. San Antonio, TX 78212-7200 210-736-8246 e-mail: [email protected] Ordinary Differential Equations, Difference Equations

Margareta Heilmann Faculty of Mathematics and Natural Sciences, University of Wuppertal Gaußstraße 20 D-42119 Wuppertal, Germany, [email protected] Approximation Theory (Positive Linear Operators)

J .A. Goldstein Department of Mathematical Sciences The University of Memphis Memphis, TN 38152 901-678-3130 [email protected] Partial Differential Equations, Semigroups of Operators

Xing-Biao Hu Institute of Computational Mathematics AMSS, Chinese Academy of Sciences Beijing, 100190, CHINA [email protected]

H. H. Gonska Department of Mathematics University of Duisburg Duisburg, D-47048 Germany

194

Computational Mathematics Ram N. Mohapatra Department of Mathematics University of Central Florida Orlando, FL 32816-1364 tel.407-823-5080 [email protected] Real and Complex Analysis, Approximation Th., Fourier Analysis, Fuzzy Sets and Systems

Jong Kyu Kim Department of Mathematics Kyungnam University Masan Kyungnam,631-701,Korea Tel 82-(55)-249-2211 Fax 82-(55)-243-8609 [email protected] Nonlinear Functional Analysis, Variational Inequalities, Nonlinear Ergodic Theory, ODE, PDE, Functional Equations.

Gaston M. N'Guerekata Department of Mathematics Morgan State University Baltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'[email protected] [email protected] Nonlinear Evolution Equations, Abstract Harmonic Analysis, Fractional Differential Equations, Almost Periodicity & Almost Automorphy

Robert Kozma Department of Mathematical Sciences The University of Memphis Memphis, TN 38152, USA [email protected] Neural Networks, Reproducing Kernel Hilbert Spaces, Neural Percolation Theory Mustafa Kulenovic Department of Mathematics University of Rhode Island Kingston, RI 02881,USA [email protected] Differential and Difference Equations

M.Zuhair Nashed Department Of Mathematics University of Central Florida PO Box 161364 Orlando, FL 32816-1364 e-mail: [email protected] Inverse and Ill-Posed problems, Numerical Functional Analysis, Integral Equations, Optimization, Signal Analysis

Irena Lasiecka Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

Mubenga N. Nkashama Department OF Mathematics University of Alabama at Birmingham Birmingham, AL 35294-1170 205-934-2154 e-mail: [email protected] Ordinary Differential Equations, Partial Differential Equations

Burkhard Lenze Fachbereich Informatik Fachhochschule Dortmund University of Applied Sciences Postfach 105018 D-44047 Dortmund, Germany e-mail: [email protected] Real Networks, Fourier Analysis, Approximation Theory

Vassilis Papanicolaou Department of Mathematics National Technical University of Athens Zografou campus, 157 80 Athens, Greece tel:: +30(210) 772 1722 Fax +30(210) 772 1775 [email protected] Partial Differential Equations, Probability

Hrushikesh N. Mhaskar Department Of Mathematics California State University Los Angeles, CA 90032 626-914-7002 e-mail: [email protected] Orthogonal Polynomials, Approximation Theory, Splines, Wavelets, Neural Networks

195

Choonkil Park Department of Mathematics Hanyang University Seoul 133-791 S. Korea, [email protected] Functional Equations

Anfithea - Paleon Faliron GR-175 64 Athens, Greece [email protected] Numerical Analysis H. M. Srivastava Department of Mathematics and Statistics University of Victoria Victoria, British Columbia V8W 3R4 Canada tel.250-472-5313; office,250-4776960 home, fax 250-721-8962 [email protected] Real and Complex Analysis, Fractional Calculus and Appl., Integral Equations and Transforms, Higher Transcendental Functions and Appl.,q-Series and q-Polynomials, Analytic Number Th.

Svetlozar (Zari) Rachev, Professor of Finance, College of Business, and Director of Quantitative Finance Program, Department of Applied Mathematics & Statistics Stonybrook University 312 Harriman Hall, Stony Brook, NY 11794-3775 tel: +1-631-632-1998, [email protected] Alexander G. Ramm Mathematics Department Kansas State University Manhattan, KS 66506-2602 e-mail: [email protected] Inverse and Ill-posed Problems, Scattering Theory, Operator Theory, Theoretical Numerical Analysis, Wave Propagation, Signal Processing and Tomography

I. P. Stavroulakis Department of Mathematics University of Ioannina 451-10 Ioannina, Greece [email protected] Differential Equations Phone +3-065-109-8283

Tomasz Rychlik Polish Academy of Sciences Instytut Matematyczny PAN 00-956 Warszawa, skr. poczt. 21 ul. Śniadeckich 8 Poland [email protected] Mathematical Statistics, Probabilistic Inequalities

Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock, Germany [email protected] Numerical Fourier Analysis, Fourier Analysis, Harmonic Analysis, Signal Analysis, Spectral Methods, Wavelets, Splines, Approximation Theory

Boris Shekhtman Department of Mathematics University of South Florida Tampa, FL 33620, USA Tel 813-974-9710 [email protected] Approximation Theory, Banach spaces, Classical Analysis

Roberto Triggiani Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

T. E. Simos Department of Computer Science and Technology Faculty of Sciences and Technology University of Peloponnese GR-221 00 Tripolis, Greece Postal Address: 26 Menelaou St.

Juan J. Trujillo University of La Laguna Departamento de Analisis Matematico C/Astr.Fco.Sanchez s/n 38271. LaLaguna. Tenerife. SPAIN Tel/Fax 34-922-318209 [email protected]

196

Fractional: Differential EquationsOperators-Fourier Transforms, Special functions, Approximations, and Applications

Ahmed I. Zayed Department of Mathematical Sciences DePaul University 2320 N. Kenmore Ave. Chicago, IL 60614-3250 773-325-7808 e-mail: [email protected] Shannon sampling theory, Harmonic analysis and wavelets, Special functions and orthogonal polynomials, Integral transforms

Ram Verma International Publications 1200 Dallas Drive #824 Denton, TX 76205, USA [email protected] Applied Nonlinear Analysis, Numerical Analysis, Variational Inequalities, Optimization Theory, Computational Mathematics, Operator Theory

Ding-Xuan Zhou Department Of Mathematics City University of Hong Kong 83 Tat Chee Avenue Kowloon, Hong Kong 852-2788 9708,Fax:852-2788 8561 e-mail: [email protected] Approximation Theory, Spline functions, Wavelets

Xiang Ming Yu Department of Mathematical Sciences Southwest Missouri State University Springfield, MO 65804-0094 417-836-5931 [email protected] Classical Approximation Theory, Wavelets

Xin-long Zhou Fachbereich Mathematik, Fachgebiet Informatik Gerhard-Mercator-Universitat Duisburg Lotharstr.65, D-47048 Duisburg, Germany e-mail:[email protected] Fourier Analysis, Computer-Aided Geometric Design, Computational Complexity, Multivariate Approximation Theory, Approximation and Interpolation Theory

Xiao-Jun Yang State Key Laboratory for Geomechanics and Deep Underground Engineering, China University of Mining and Technology, Xuzhou 221116, China Local Fractional Calculus and Applications, Fractional Calculus and Applications, General Fractional Calculus and Applications, Variable-order Calculus and Applications, Viscoelasticity and Computational methods for Mathematical [email protected]

Jessada Tariboon Department of Mathematics, King Mongkut's University of Technology N. Bangkok 1518 Pracharat 1 Rd., Wongsawang, Bangsue, Bangkok, Thailand 10800 [email protected], Time scales, Differential/Difference Equations, Fractional Differential Equations

Richard A. Zalik Department of Mathematics Auburn University Auburn University, AL 36849-5310 USA. Tel 334-844-6557 office 678-642-8703 home Fax 334-844-6555 [email protected] Approximation Theory, Chebychev Systems, Wavelet Theory

197

Instructions to Contributors Journal of Computational Analysis and Applications An international publication of Eudoxus Press, LLC, of TN.

Editor in Chief: George Anastassiou Department of Mathematical Sciences University of Memphis Memphis, TN 38152-3240, U.S.A.

1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves.

2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.

198

4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corollaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,

199

name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990).

Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986.

Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495.

11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears.

15. This journal will consider for publication only papers that contain proofs for their listed results.

200

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FOURIER SERIES OF SUMS OF PRODUCTS OF ORDERED BELL AND EULER FUNCTIONS TAEKYUN KIM1 , DAE SAN KIM2 , GWAN-WOO JANG3 , AND JIN-WOO PARK4,∗

Abstract. In this paper, we will study three types of sums of products of ordered Bell and Euler functions and derive their Fourier series expansions. In addition, we will express those functions in terms of Bernoulli functions.

1. Introduction As a natural companion to ordered Bell numbers, the ordered Bell polynomials bn (x) were defined by the generating function (see [8]) ∞ ∑ 1 tm xt e = bm (x) . t 2−e m! m=0

(1.1)

The first few ordered Bell polynomials are as follows: b0 (x) = 1, b1 (x) = x + 1, b2 (x) = x2 + 2x + 3, b3 (x) = x3 + 3x2 + 9x + 13, b4 (x) = x4 + 4x3 + 18x2 + 52x + 75, b5 (x) = x5 + 5x4 + 30x3 + 130x2 + 375x + 541. The ordered Bell numbers bm = bm (0) were introduced already in 1859 work of Cayley and have been studied in many counting problems in enumerative combinatorics and number theory (see [2-5,11,13,14]). They are all positive integers, as we can see, for example, from bm

∞ ∑ nm = n!S2 (m, n) = , (m ≥ 0). 2n+1 n=0 n=0 m ∑

The ordered Bell polynomial bm (x) has degree m by (1.1) and is a monic polynomial with integral coefficients, as we see from m−1 ∑ ( m) m b0 (x) = 1, bm (x) = x + bl (x), (m ≥ 1). l l=0

From (1.1), we can derive d bm (x) = mbm−1 (x), (m ≥ 1), dx −bm (x + 1) + 2bm (x) = xm , (m ≥ 0). 2010 Mathematics Subject Classification. 11B68, 11B83, 42A16. Key words and phrases. Fourier series, ordered Bell polynomial, Euler polynomial. ∗ Corresponding author. 1

201

T.KIM ET AL 201-215

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

Fourier series of sums of products of ordered Bell and Euler functions

In turn, from these we obtain −bm (1) + 2bm = δm,0 , (m ≥ 0),



1

1 (bm+1 (1) − bm+1 ) m+1 1 = bm+1 . m+1

bm (x)dx = 0

The Euler polynomials Em (x) are given by the generating function ∞ ∑ 2 tm xt e = Em (x) . t e +1 m! n=0

We recall here that the Euler polynomials satisfy Em (x + 1) + Em (x) = 2xm , (m ≥ 0), and hence Em (1) + Em = 2δm,0 , (m ≥ 0). The Bernoulli polynomials Bm (x) are defined by the generating function ∞ ∑ t tm xt e = Bm (x) . t e −1 m! m=0

For any real number x, we let ⟨x⟩ = x − ⌊x⌋ ∈ [0, 1) denote the fractional part of x. In this paper, we will study three types of sums of products of ordered Bell and Euler functions and derive their Fourier series expansions. In addition, we will express those functions in terms of Bernoulli functions. ∑m (1) αm (⟨x⟩) = ∑ k=1 bk (⟨x⟩)Em−k (⟨x⟩), (m ≥ 1); m 1 (2) βm (⟨x⟩) = k=1 k!(m−k)! bk (⟨x⟩)Em−k (⟨x⟩), (m ≥ 1); ∑m−1 1 (3) γm (⟨x⟩) = k=1 k(m−k) bk (⟨x⟩)Em−k (⟨x⟩), (m ≥ 2). The reader may refer to any book (for example, see [1,12,15]) for elementary facts about Fourier analysis. For later use, we recall the following facts about Bernoulli functions Bm (⟨x⟩): (a) for m ≥ 2, Bm (⟨x⟩) = −m!

∞ ∑

e2πinx , (2πin)m n=−∞ n̸=0

(b) for m = 1, −

{ ∞ ∑ e2πinx B1 (⟨x⟩), for x ∈ / Z, = 0 for x ∈ Z. 2πin n=−∞ n̸=0

Finally, the reader may refer to the recent works [6,7,9,10] related with this paper.

202

T.KIM ET AL 201-215

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G. W. Jang, J.-W. Park

3

2. Fourier series of functions of the first type Let αm (x) =

m ∑

bk (x)Em−k (x), (m ≥ 1).

k=0

Then we will investigate the function

αm (⟨x⟩) =

m ∑

bk (⟨x⟩)Em−k (⟨x⟩), (m ≥ 1),

k=0

defined on R, which is periodic with period 1. The Fourier series of αm (⟨x⟩) is ∞ ∑

2πinx A(m) , n e

n=−∞

where ∫

1

= A(m) n

αm (⟨x⟩)e−2πinx dx

0

∫ =

1

αm (x)e−2πinx dx.

0

Before proceeding further, we observe the following. ′ (x) = αm

m ∑

{kbk−1 (x)Em−k (x) + (m − k)bk (x)Em−k−1 (x)}

k=0

=

m ∑

kbk−1 (x)Em−k (x) +

m−1 ∑

k=1

=

(m − k)bk (x)Em−k−1 (x)

k=0

m−1 ∑

(k + 1)bk (x)Em−1−k (x) +

k=0

m−1 ∑

(m − k)bk (x)Em−1−k (x)

k=0

=(m + 1)αm−1 (x). From this, we have (

αm+1 (x) m+2

)′ = αm (x),

and ∫

1

αm (x)dx = 0

1 (αm+1 (1) − αm+1 (0)) . m+2

203

T.KIM ET AL 201-215

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

Fourier series of sums of products of ordered Bell and Euler functions

For m ≥ 1, we set ∆m = αm (1) − αm (0) = = =

m ∑

(bk (1)Em−k (1) − bk Em−k )

k=0 m ∑

{(2bk − δk,0 )(−Em−k + 2δm,k ) − bk Em−k }

k=0 m ∑

(−3bk Em−k + 4bk δm,k + δk,0 Em−k − 2δk,0 δm,k )

k=0

=−3

m ∑

bk Em−k + 4bm + Em

k=0

=−3

m−1 ∑

bk Em−k + bm + Em .

k=0

Now, αm (0) = αm (1) ⇐⇒ ∆m = 0, and



1

1 αm (x)dx = ∆m+1 m +2 0 ( ) m ∑ 1 −3 bk Em+1−k + bm+1 + Em+1 . = m+2 k=0

(m)

Next, we want to determine the Fourier coefficients An . Case 1 : n ̸= 0. ∫ 1 (m) An = αm (x)e−2πinx dx 0

]1 1 [ 1 =− αm (x)e−2πinx 0 + 2πin 2πin



1 m+1 (αm (1) − αm (0)) + 2πin 2πin m + 1 (m−1) 1 = A − ∆m , 2πin n 2πin from which by induction we can show that

1

′ αm (x)e−2πinx dx

0



1

=−

αm−1 (x)e−2πinx dx

0

1 ∑ (m + 2)j ∆m−j+1 . m + 2 j=1 (2πin)j m

A(m) =− n Case 2 : n = 0.



1

1 ∆m+1 . m +2 0 αm (⟨x⟩), (m ≥ 1) is piecewise C ∞ . Moreover, αm (⟨x⟩) is continuous for those positive integers with ∆m = 0 and discontinuous with jump discontinuities at integers for those positive integers with ∆m ̸= 0. (m) A0

=

αm (x)dx =

204

T.KIM ET AL 201-215

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G. W. Jang, J.-W. Park

5

Assume first that m is a positive integer with ∆m = 0. Then αm (0) = αm (1). Hence αm (⟨x⟩) is piecewise C ∞ , and continuous. Thus the Fourier series of αm (⟨x⟩) converges uniformly to αm (⟨x⟩), and   ∞ m ∑ ∑ 1 1 (m + 2) j − ∆m+1 + ∆m−j+1  e2πinx αm (⟨x⟩) = j m+2 m + 2 (2πin) n=−∞ j=1 n̸=0

=

=

1 1 ∆m+1 + m+2 m+2

) m ( ∑ m+2 j

j=1

  ∆m−j+1 −j!

 ∞ ∑

2πinx

e   j (2πin) n=−∞ n̸=0

m ( ∑

) m+2 ∆m−j+1 Bj (⟨x⟩) j

1 1 ∆m+1 + m+2 m + 2 j=2 { B1 (⟨x⟩), for x ∈ / Z, + ∆m × 0, for x ∈ Z.

Now, we can state our first theorem. Theorem 2.1. For each positive integer l, we let ∆l = −3

l−1 ∑

bk El−k + bl + El .

k=0

Assume that ∆m = 0, for a positive integer m, Then we have the following. ∑m (a) k=0 bk (⟨x⟩)Em−k (⟨x⟩) has the Fourier series expansion m ∑

bk (⟨x⟩)Em−k (⟨x⟩)

k=0

  ∞ m ∑ ∑ 1 1 (m + 2) j − = ∆m=1 + ∆m−j+1  e2πinx , j m+2 m + 2 (2πin) n=−∞ j=1 n̸=0

for all x ∈ R, where the convergence is uniform. (b) m ∑ k=0

) m ( 1 1 ∑ m+2 bk (⟨x⟩)Em−k (⟨x⟩) = ∆m−j+1 Bj (⟨x⟩), ∆m+1 + m+2 m + 2 j=2 j for all x ∈ R, where Bj (⟨x⟩) i s the Bernoulli function.

Assume next that ∆m ̸= 0, for a positive integer m. Then αm (0) ̸= αm (1). Thus αm (⟨x⟩) is piecewise C ∞ , and discontinuous with jump discontinuities at integers. The Fourier series of αm (⟨x⟩) converges pointwise to αm (⟨x⟩), for x ∈ / Z, and converges to 1 1 (αm (0) + αm (1)) = αm (0) + ∆m , 2 2 for x ∈ Z. Next, we can state our second theorem.

205

T.KIM ET AL 201-215

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

Fourier series of sums of products of ordered Bell and Euler functions

Theorem 2.2. For each positive integer l, we let ∆l = −3

l−1 ∑

bk El−k + bl + El .

k=0

Assume that ∆m ̸= 0, for a positive integer m, Then we have the following. (a)

  ∞ m ∑ ∑ 1 1 2) (m + j − ∆m+1 + ∆m−j+1  e2πinx j m+2 m + 2 (2πin) n=−∞ j=1 n̸=0

{ ∑m bk (⟨x⟩)Em−k (⟨x⟩), ∑k=0 = m 1 k=0 bk Em−k + 2 ∆m ,

for x ∈ / Z, for x ∈ Z.

(b) ) m ( 1 1 ∑ m+2 ∆m+1 + ∆m−j+1 Bj (⟨x⟩) m+2 m + 2 j=1 j =

m ∑

bk (⟨x⟩)Em−k (⟨x⟩), for x ∈ / Z;

k=0

) m ( 1 1 ∑ m+2 ∆m+1 + ∆m−j+1 Bj (⟨x⟩) m+2 m + 2 j=2 j =

m ∑ k=0

1 / Z. bk Em−k + ∆m , for x ∈ 2

3. Fourier series of functions of the second type Let βm (x) =

m ∑ k=0

1 bk (x)Em−k (x), (m ≥ 1). k!(m − k)!

Then we will consider the function m ∑ 1 βm (⟨x⟩) = bk (⟨x⟩)Em−k (⟨x⟩), (m ≥ 1), k!(m − k)! k=0

defined on R, which is periodic with period 1. Fourier series of βm (⟨x⟩) is ∞ ∑

Bn(m) e2πinx ,

n=−∞

where

∫ Bn(m)

1

=

βm (⟨x⟩)e−2πinx dx

0

∫ =

1

βm (x)e−2πinx dx.

0

206

T.KIM ET AL 201-215

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G. W. Jang, J.-W. Park

7

We need to note the following before proceeding further. ′ βm (x)

=

m { ∑ k=0

=

m ∑ k=1

=

m−1 ∑ k=0

} m−k k bk−1 (x)Em−k (x) + bk (x)Em−k−1 (x) k!(m − k)! k!(m − k)!

m−1 ∑ 1 1 bk−1 (x)Em−k (x) + bk (x)Em−k−1 (x) (k − 1)!(m − k)! k!(m − k − 1)! k=0

1 bk (x)Em−1−k (x) + k!(m − 1 − k)!

m−1 ∑ k=0

1 bk (x)Em−1−k (x) k!(m − 1 − k)!

=2βm−1 (x). From this, we obtain (

and



βm+1 (x) 2

1

βm (x)dx = 0

)′ = βm (x),

1 (βm+1 (1) − βm+1 (0)) . 2

For m ≥ 1, we put Ωm =βm (1) − βm (0) = = =

m ∑ k=0 m ∑ k=0 m ∑ k=0

=−3

1 (bk (1)Em−k (1) − bk Em−k ) k!(m − k)! 1 ((2bk − δk,0 ) (−Em−k + 2δm,k ) − bk Em−k ) k!(m − k)! 1 (−3bk Em−k + 4bk δm,k + δk,0 Em−k − 2δk,0 δm,k ) k!(m − k)! m ∑ k=0

=−3

m−1 ∑ k=0

4 1 2 1 bk Em−k + bm + Em − δm,0 k!(m − k)! m! m! m! 1 1 1 bk Em−k + bm + Em . k!(m − k)! m! m!

From this, we get βm (0) = βm (1) ⇐⇒ Ωm = 0, and



1

βm (x)dx = 0

1 Ωm+1 . 2 (m)

Next, we would like to determine the Fourier coefficients Bn . Case 1 : n ̸= 0.

207

T.KIM ET AL 201-215

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

Fourier series of sums of products of ordered Bell and Euler functions

∫ Bn(m) =

1

βm (x)e−2πinx dx

0

=−

]1 1 [ 1 βm (x)e−2πinx 0 + 2πin 2πin

1 2 =− (βm (1) − βm (0)) + 2πin 2πin 2 1 Bn(m−1) − Ωm , = 2πin 2πin

∫ ∫

1

′ −2πinx βm e dx

0 1

βm−1 (x)e−2πinx dx

0

from which by induction we can easily show Bn(m) = − Case 2 : n = 0.

∫ (m)

B0

m ∑ 2j−1 Ωm−j+1 . (2πin)j j=1

1

=

βm (x)dx = 0

1 Ωm+1 . 2

βm (⟨x⟩), (m ≥ 1) is piecewise C ∞ . Further, βm (⟨x⟩) is continuous for those positive integers m with Ωm = 0 and discontinuous with jump discontinuities at integers for those positive integers with Ωm ̸= 0. Assume first that m is a positive integer with Ωm = 0. Then βm (0) = βm (1). Hence βm (⟨x⟩) is piecewise C ∞ , and continuous. Thus the Fourier series of βm (⟨x⟩) converges uniformly to βm (⟨x⟩), and   ∞ m j−1 ∑ ∑ 1 2  e2πinx − βm (⟨x⟩) = Ωm+1 + Ω j m−j+1 2 (2πin) n=−∞ j=1 n̸=0



 ∞ ∑

m ∑

1 2j−1 e2πinx   = Ωm+1 + Ωm−j+1 −j!  2 j! (2πin)j n=−∞ j=1 n̸=0 m ∑ 2j−1

1 = Ωm+1 + Ωm−j+1 Bj (⟨x⟩) + Ωm × 2 j! j=2

{

B1 (⟨x⟩), 0,

for x ∈ / Z, for x ∈ Z.

Now, we are ready to state our first result. Theorem 3.1. For each positive integer l, l−1 ∑

Ωl = −3

k=0

1 1 1 bk El−k + bl + El . k!(l − k)! l! l!

Assume that Ωm = 0, for a positive integer m. Then we have the following. (a) m ∑ k=0

1 bk (⟨x⟩)Em−k (⟨x⟩) k!(m − k)!

208

T.KIM ET AL 201-215

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G. W. Jang, J.-W. Park

9

has the Fourier series expansion m ∑

1 bk (⟨x⟩)Em−k (⟨x⟩) k!(m − k)! k=0   ∞ m j−1 ∑ ∑ 1 2 −  e2πinx , = Ωm+1 + Ω j m−j+1 2 (2πin) n=−∞ j=1 n̸=0

for all x ∈ R, where the converges is uniform. (b) m ∑ k=0

m ∑ 1 2j−1 1 bk (⟨x⟩)Em−k (⟨x⟩) = Ωm+1 + Ωm−j+1 Bj (⟨x⟩), k!(m − k)! 2 j! j=2

for all x ∈ R, where Bj (⟨x⟩) is the Bernoulli function. Assume next that Ωm ̸= 0, for a positive integer m. Then βm (0) ̸= βm (1). So βm (⟨x⟩) is piecewise C ∞ , and discontinuous with jump discontinuities at integers. The Fourier series of βm (⟨x⟩) converges pointwise to βm (⟨x⟩), for x ∈ / Z, and converges to 1 1 (βm (0) + βm (1)) = βm (0) + Ωm , 2 2 for x ∈ Z. Now, we are ready to state our second result. Theorem 3.2. For each positive integer l, we let Ωl = −3

l−1 ∑ k=0

1 1 1 bk El−k + bl + El . k!(l − k)! l! l!

Assume that Ωm ̸= 0, for a positive integer m. Then we have the following. (a)   ∞ m j−1 ∑ ∑ 1 2 −  e2πinx Ωm+1 + Ω j m−j+1 2 (2πin) n=−∞ j=1 { ∑m ∑k=0 = m

n̸=0

1 k!(m−k)! bk (⟨x⟩)Em−k (⟨x⟩), 1 1 k=0 k!(m−k)! bk Em−k + 2 Ωm ,

for x ∈ / Z, for x ∈ Z.

(b) m m ∑ ∑ 1 2j−1 1 Ωm+1 + Ωm−j+1 Bj (⟨x⟩) = bk (⟨x⟩)Em−k (⟨x⟩), for x ∈ / Z; 2 j! k!(m − k)! j=1 m ∑ 2j−1

k=0 m ∑

1 Ωm+1 + Ωm−j+1 Bj (⟨x⟩) = 2 j! j=2

k=0

209

1 1 bk Em−k + Ωm , for x ∈ Z. k!(m − k)! 2

T.KIM ET AL 201-215

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

Fourier series of sums of products of ordered Bell and Euler functions

4. Fourier series of functions of the third type Let γm (x) =

m−1 ∑ k=1

1 bk (x)Em−k (x), (m ≥ 2). k(m − k)

Then we will investigate the function

γm (⟨x⟩) =

m−1 ∑ k=1

1 bk (⟨x⟩)Em−k (⟨x⟩), (m ≥ 2), k(m − k)

defined on R, which is periodic with period 1. The Fourier series of γm (⟨x⟩) is ∞ ∑

Cn(m) e2πinx ,

n=−∞

where ∫ Cn(m)

1

= ∫

γm (⟨x⟩)e−2πinx dx

0 1

=

γm (x)e−2πinx dx.

0

Before proceeding further, we need to observe the following. ′ γm (x) =

m−1 ∑ k=1

m−1 ∑ 1 1 bk−1 (x)Em−k (x) + bk (x)Em−k−1 (x) m−k k

m−2 ∑

k=1

m−1 ∑

1 1 bk (x)Em−1−k (x) + bk (x)Em−1−k (x) m−1−k k k=0 k=1 ) m−2 ∑( 1 1 1 1 = + bk (x)Em−1−k (x) + Em−1 (x) + bm−1 (x) m−1−k k m−1 m−1

=

k=1

=(m − 1)γm−1 (x) +

1 1 Em−1 (x) + bm−1 (x). m−1 m−1

Thus ′ γm (x) = (m − 1)γm−1 (x) +

1 1 Em−1 (x) + bm−1 . m−1 m−1

From this, we see that (

1 m

( γm+1 (x) −

))′ 1 1 Em+1 (x) − bm+1 (x) = γm (x). m(m + 1) m(m + 1)

210

T.KIM ET AL 201-215

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G. W. Jang, J.-W. Park



11

1

γm (x)dx 0

]1 [ 1 1 1 γm+1 (x) − Em+1 (x) − bm+1) (x) m m(m + 1) m(m + 1) 0 ( 1 1 γm+1 (1) − γm+1 (0) − (Em+1 (1) − Em+1 (0)) = m m(m + 1) ) 1 (bm+1 (1) − bm+1 (0)) − m(m + 1) ( ) 2 1 1 γm+1 (1) − γm+1 (0) + Em+1 − bm+1 . = m m(m + 1) m(m + 1) For m ≥ 2, we put =

Λm = γm (1) − γm (0) =

m−1 ∑ k=1

=

m−1 ∑ k=1

=−3

1 (bk (1)Em−1 (1) − bk Em−k ) k(m − k) 1 ((2bk − δk,0 ) (−Em−k + 2δm,k ) − bk Em−k ) k(m − k)

m−1 ∑ k=1

1 bk Em−k . k(m − k)

From this, we have γm (0) = γm (1) ⇐⇒ Λm = 0, and



1

γm (x)dx = 0

1 m

( Λm+1 +

) 2 1 Em+1 − bm+1 . m(m + 1) m(m + 1) (m)

Next, we would like to determine the Fourier coefficients Cn . For this, we first note that { ∑ ∫ 1 l (l)k−1 2 k=1 (2πin) for n ̸= 0, k El−k+1 , −2πinx El (x)e dx = −2 for n = 0, 0 l+1 El+1 , { ∑ ∫ 1 l (l)k−1 − k=1 (2πin) for n ̸= 0, k bl−k+1 , bl (x)e−2πinx dx = 1 b , for n = 0. 0 l+1 l+1 Case 1 : n ̸= 0. ∫ 1 (m) γm (x)e−2πinx dx Cn = 0

∫ 1 ] 1 [ 1 −2πinx 1 =− γm (x)e + γ ′ (x)e−2πinx dx 0 2πin 2πin 0 m 1 (γm (1) − γm (0)) =− 2πin } ∫ 1{ 1 1 1 + Em−1 (x) + bm−1 (x) e−2πinx dx (m − 1)γm−1 (x) + 2πin 0 m−1 m−1 m − 1 (m−1) 1 2 1 Φm , = C − Λm + Θm − 2πin n 2πin 2πin(m − 1) 2πin(m − 1)

211

T.KIM ET AL 201-215

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12

Fourier series of sums of products of ordered Bell and Euler functions

where Θm =

m−1 ∑ k=1

Φm =

m−1 ∑ k=1

(m − 1)k−1 Em−k , (2πin)k (m − 1)k−1 bm−k . (2πin)k

From the recurrence relation m − 1 (m−1) 2 1 1 Cn Λm + Θm − Cn(m) = − Φm , 2πin 2πin 2πin(m − 1) 2πin(m − 1) and by induction on m, we can easily show that Cn(m) = −

m−1 ∑ j=1

m−1 m−1 ∑ (m − 1)j−1 ∑ (m − 1)j−1 (m − 1)j−1 Λ +2 Θ − Φm−j+1 . m−j+1 m−j+1 (2πin)j (2πin)j (m − j) (2πin)j (m − j) j=1 j=1

We note here that m−1 ∑ j=1

=

m−1 ∑ j=1

=

m−1 ∑

m−1 ∑ j=1

=

m−j (m − 1)j−1 ∑ (m − j)k−1 Em−j−k+1 (2πin)j (m − j) (2πin)k k=1

j=1

=

(m − 1)j−1 Θm−j+1 (2πin)j (m − j)

1 m−j

m−j ∑ k=1

(m − 1)j+k−2 Em−j−k+1 (2πin)j+k

m ∑ 1 (m − 1)s−2 Em−s+1 m − j s=j+1 (2πin)s

m ∑ (m − 1)s−2

(2πin)s

s=2

Em−s+1

s−1 ∑ j=1

1 m−j

m 1 ∑ (m)s Hm−1 − Hm−s = Em−s+1 . m s=1 (2πin)s m − s + 1

Putting everything altogether, we have { } m 1 ∑ (m)s Hm−1 − Hm−s (m) Cn = − Λm−s+1 + (−2Em−s+1 + bm−s+1 ) . m s=1 (2πin)s m−s+1 Case 2 : n = 0. (m)

C0



1

=

γm (x)dx ( ) 2 1 1 Λm+1 + Em+1 − bm+1 . = m m(m + 1) m(m + 1) 0

γm (⟨x⟩), (m ≥ 2) is piecewise C ∞ . Moreover, γm (⟨x⟩) is continuous for those integers m ≥ 2 with Λm = 0 and discontinuous with jump discontinuities at integers for those positive integers m ≥ 2 with Λm ̸= 0.

212

T.KIM ET AL 201-215

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G. W. Jang, J.-W. Park

13

Assume first that Λm = 0. Then γm (0) = γm (1). Hence γm (⟨x⟩) is piecewise C ∞ , and continuous. Thus the Fourier series of γm (⟨x⟩) converges uniformly to γm (⟨x⟩), and γm (⟨x⟩) ( ) 2 1 1 Λm+1 + Em+1 − bm+1 = m m(m + 1) m(m + 1) { ( )} ∞ m ∑ 1 ∑ (m)s Hm−1 − Hm−s + − Λm−s+1 + (−2Em−s+1 + bm−s+1 ) e2πinx s m (2πin) m − s + 1 n=−∞ s=1 n̸=0

1 = m +

( Λm+1 + 1 m

m ( ∑ s=1

m s

2 1 Em+1 − bm+1 m(m + 1) m(m + 1) )(

)

  ) ∞ 2πinx ∑ e Hm−1 − Hm−s   (−2Em−s+1 + bm−s+1 ) −s! Λm−s+1 + s m−s+1 (2πin) n=−∞

) m ( )( Hm−1 − Hm−s 1 ∑ m = Λm−s+1 + (−2Em−s+1 + bm−s+1 ) Bs (⟨x⟩) m s=0 s m−s+1 s̸=1

{

+ Λm ×

B1 (⟨x⟩), 0,

n̸=0

for x ∈ / Z, for x ∈ Z.

Now, we are ready to state our first result. Theorem 4.1. For each integer l ≥ 2, we let Λl = −3

l−1 ∑ k=1

1 bk El−k , k(l − k)

with Λ1 = 0. Assume that Λm = 0, for an integer m ≥ 2. Then we have the following. ∑m−1 1 (a) k=1 k(m−k) bk (⟨x⟩)Em−k (⟨x⟩) has Fourier series expansion m−1 ∑ k=1

=

1 bk (⟨x⟩)Em−k (⟨x⟩) k(m − k)

( ) 2 1 Λm+1 + Em+1 − bm+1 m(m + 1) m(m + 1) { )} ( ∞ m ∑ Hm−1 − Hm−s 1 ∑ (m)s e2πinx , + − Λm−s+1 + (−2Em−s+1 + bm−s+1 ) s m (2πin) m − s + 1 n=−∞ s=1

1 m

n̸=0

for all x ∈ R, where the convergence is uniform. (b) m−1 ∑

1 bk (⟨x⟩)Em−k (⟨x⟩) k(m − k) k=1 ) m ( )( 1 ∑ m Hm−1 − Hm−s = Λm−s+1 + (−2Em−s+1 + bm−s+1 ) Bs (⟨x⟩), m s=0 s m−s+1 s̸=1

213

T.KIM ET AL 201-215

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14

Fourier series of sums of products of ordered Bell and Euler functions

for all x ∈ R, where Bs (⟨x⟩) is the Bernoulli function. Assume next that m is an integer ≥ 2 with Λm ̸= 0. Then γm (0) ̸= γm (1). Hence γm (⟨x⟩) is piecewise C ∞ , and discontinuous with jump discontinuities at integers. Thus the Fourier series of γm (⟨x⟩) converges pointwise to γm (⟨x⟩), for x ∈ / Z, and converges to 1 1 (γm (0) + γm (1)) = γm (0) + Λm , 2 2 for x ∈ Z. Now, we are ready to state our second result. Theorem 4.2. For each integer l ≥ 2, we let Λl = −3

l−1 ∑ k=1

1 bk El−k , k(l − k)

with Λ1 = 0. Assume that Λm ̸= 0, for an integer m ≥ 2. Then we have the following. (a) ( ) 1 2 1 Λm+1 + Em+1 − bm+1 m m(m + 1) m(m + 1) { ( )} m ∞ ∑ Hm−1 − Hm−s 1 ∑ (m)s Λm−s+1 + (−2Em−s+1 + bm−s+1 ) e2πinx + − s m (2πin) m − s + 1 n=−∞ s=1 n̸=0

{ ∑m−1 1 / Z, k(m−k) bk (⟨x⟩)Em−k (⟨x⟩), for x ∈ ∑k=1 = m−1 1 1 b E + Λ , for x ∈ Z. k=1 k(m−k) k m−k 2 m (b)

) m ( )( 1 ∑ m Hm−1 − Hm−s (−2Em−s+1 + bm−s+1 ) Bs (⟨x⟩) Λm−s+1 + m s=0 s m−s+1

=

m−1 ∑

1 bk (⟨x⟩)Em−k (⟨x⟩), for x ∈ / Z; k(m − k) k=1 ) m ( )( 1 ∑ m Hm−1 − Hm−s Λm−s+1 + (−2Em−s+1 + bm−s+1 ) Bs (⟨x⟩) m s=0 s m−s+1 s̸=1

=

m−1 ∑ k=1

1 1 bk Em−k + Λm , for x ∈ Z. k(m − k) 2 References

[1] M. Abramowitz, IA. Stegun, Handbook of Mathematical Functions, Dover, New York, 1970. [2] A. Cayley, On the analytical forms called trees, Second part, Philosophical Magazine, Series IV 18 (1859), no. 121, 374–378. [3] L. Comtet, ”Advanced Combinatorics, The Art of Finite and Infinite Expansions”, D. Reidel Publishing Co., 1974, page 228. [4] J. Good, The number of orderings of n candidates when ties are permitted, Fibonacci Quart., 13, (1975), 11-18. [5] O. A. Gross, Preferential arrangements, Amer. Math. Monthly, 69 (1962), 4-8.

214

T.KIM ET AL 201-215

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G. W. Jang, J.-W. Park

15

[6] G.-W. Jang, D. S. Kim, T. Kim, T. Mansour, Fourier series of functions related to Bernoulli polynomials, Adv. Stud. Contemp. Math., 27(2017), no.1, 49-62. [7] D. S. Kim, T. Kim, Fourier series of higher-order Euler functions and their applications, to appear in Bull. Korean Math. Soc. [8] T. Kim and D.S. Kim, Some formulas of ordered Bell numbers and polynomials arising from umbral calculus, preprint. [9] T. Kim, D. S. Kim, G.-W. Jang, J. Kwon, Fourier series of sums of products of Genocchi functions and their applications, to appear in J. Nonlinear Sci.Appl. [10] T. Kim, D. S. Kim, S.-H. Rim and D.-V. Dolgy, Fourier series of higher-order Bernoulli functions and their applications, J. Inequal. Appl. 2017 (2017), 2017:8. [11] A. Knopfmacher and M.E. Mays, A survey of factorization counting functions, Int. J. Number Theory 1:4 (2005) 563–581. [12] J. E. Marsden, Elementary classical analysis, W. H. Freeman and Company, 1974. [13] M. Mor and A.S. Fraenkel, Cayley permutations, Discr. Math. 48:1 (1984) 101–112. [14] A. Sklar, On the factorization of sqare free integers, Proc. Amer. Math. Soc., 3 (1952), 701-705. [15] D. G. Zill, M. R. Cullen, Advanced Engineering Mathematics, Jones and Bartlett Publishers 2006. 1

Department of Mathematics, College of Science Tianjin Polytechnic University, Tianjin 300160, China, Department of Mathematics, Kwangwoon University, Seoul 139701, Republic of Korea. E-mail address: [email protected] 2

Department of Mathematics, Sogang University, Seoul 121-742, Republic of Korea. E-mail address: [email protected] 3 Department of Mathematics, Kwangwoon University, Seoul 139-701, Republic of Korea. E-mail address: [email protected] 4 Department of Mathematics Education, Daegu University, Gyeongsan-si, Gyeongsangbukdo, 712-714, Republic of Korea. E-mail address: [email protected]

215

T.KIM ET AL 201-215

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

¨ PROBLEM FOR SOME SUBCLASSES OF FEKETE SZEGO MULTIVALENT NON-BAZILEVICˇ FUNCTION USING DIFFERENTIAL OPERATOR C. RAMACHANDRAN, D. KAVITHA, AND WASIM UL-HUQ Abstract. In this paper we derive the famous Fekete-Szeg¨o inequality for the class of p−valent non-bazileviˇ c function using differential operator. 2010 Mathematics Subject Classification: 30C45,30C50 Keywords: Analytic functions, Multivalent functions, NonBazileviˇ c functions, Starlike functions, Convex functions, Subordination, Fekete-Szeg¨o Inequality.

1. Introduction and preliminaries Let Ap be the class of normalized analytic functions f (z) in the open unit disc U = {z : z ∈ C : |z| < 1} is of the form: ∞ X p f (z) = z + an z n (z ∈ U, p ∈ N = 1, 2, . . .). (1.1) n=p+1

Further, let A1 = A , S be the subclass of A consisting of all univalent functions in U. For the two analytical functions f (z) and g(z) in U, the function f (z) is subordinate to g(z), written f (z) ≺ g(z), if there exits a Schwartz function ω(z), analytic in U with ω(0) = 0 and |ω(z)| < 1 (z ∈ U) such that f (z) = g(ω(z)), z ∈ U. In particular, if the function g(z) is univalent in U, the above subordination is equivalent to f (0) = g(0) and f (U) ⊂ g(U). Mohammed and Darus[5] defined the operator, 0

Dλ f (z) = (1 + pλ)f (z) + λzf (z),

λ ≥ −p, f ∈ Ap .

Dλ0 f (z) = f (z) Dλ1 f (z) = Dλ f (z) Dλ2 f (z) = Dλ (Dλ1 f (z)) 1

216

C. RAMACHANDRAN ET AL 216-222

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

C. RAMACHANDRAN, D. KAVITHA, AND WASIM UL-HUQ

and in general, k Dλ,p f (z)

p

=z +

∞ X

(1 + λp + nλ)k an z n ,

λ > −p; k ∈ N0 = N ∪ {0} and p ∈ N.

n=p+1

(1.2) Obradovic[6] introduced the Non-Bazileviˇ c type class of functions as (  α+1 ) z 0 R f (z) > 0, z ∈ U. f (z) We can refer[1, 3, 7, 10] for the brief history of Non-Bazileviˇ c type for the various subclasses of analytic functions. Now, using the differential operator (1.2), we define the generalized p−valent Non-Bazileviˇ c class of function as follows: k Definition 1. A function f ∈ Ap is said to be in the class Nλ,p (α, µ, A, B) if it satisfies the inequality, !µ ! !µ 0 k f (z)) zp α z(Dλ,p zp 1 + Az (1−α) + ≺ , z ∈ U, (1.3) k k k p 1 + Bz Dλ,p f (z) Dλ,p f (z) Dλ,p f (z)

where α ∈ C; 0 < µ < 1; −1 ≤ B ≤ 1, A 6= B, A ∈ R. k We note that, if λ = 0, k = 0 and p = 1 then the class Nλ,p (α, µ, A, B) will be reduced as the class defined by Wang el. at[10]. If α = 1, λ = 0, k = 0 and k (α, µ, A, B) reduced to the class defined by Obradovic[6]. p = 1 then the class Nλ,p k If α = 1, λ = 0, k = 0, A = 1 − δ, B = −1 and p = 1 then the class Nλ,p (α, µ, A, B) reduces to the class of non-Bazilevic functions of order δ, (0 ≤ δ < 1) which was studied by Tuneski and Darus[9].

By motivating the results of Goyal,Jiang and Seoudy[2, 3, 8], in this paper, we derive the classical Fekete Szeg¨ o results for the function f (z) belongs to the subclass k Nλ,p (α, µ, A, B). As a special consequences of our results, we derive some of the corollaries for various values of the parameters involving in this class. We now giving the basic lemma which is essential to prove our main results. Lemma 1. [4] If suppose Ω denotes the class of analytic functions of the form ω(z) = ω1 z + ω2 z 2 + ω3 z 3 + . . . and satisfying the condition ω(0) = 0 and |ω(z)| < 1, z ∈ U then for any complex number t, |ω2 − tω12 | ≤ max {1, |t|}.

217

C. RAMACHANDRAN ET AL 216-222

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

ˇ FUNCTION . . . MULTIVALENT NON-BAZILEVIC

3

the result is sharp for the functions ω(z) = z 2 and ω(z) = z. 2. main results Our main result is stated in this following theorem. k Theorem 1. If the function f (z) is given by (1.1) belongs to the class Nλ,p (α, µ, A, B) and η be the complex number, then

(A − B)p |2α − pµ|(1 + λp + (p + 2)λ)k      k µ + 1 (1 + λp + (p + 2)λ) (A − B)p(2α − pµ) . +η max 1, B − (α − pµ)2 2 (1 + λp + (p + 1)λ)2k

|ap+2 − ηa2p+1 | ≤

and the result is sharp. k Proof. if f ∈ Nλ,p (α, µ, A, B), then there exist a Schwarz function ω(z) with ω(0) = 0 and |ω(z)| < 1 which is analytic in the open unit disk such that !µ ! !µ 0 k f (z)) zp zp α z(Dλ,p 1 + Aω(z) (1 − α) (2.1) + = k k k p 1 + Bω(z) Dλ,p f (z) Dλ,p f (z) Dλ,p f (z)

Now, it is a well known fact that 1 + Aω(z) = 1 + (A − B)ω1 z + [(A − B)ω2 − B(A − B)ω12 ]z 2 + . . . 1 + Bω(z)

(2.2)

let us find, !µ ! !µ 0 k f (z)) zp α z(Dλ,p zp (1 − α) + = k k k p Dλ,p f (z) Dλ,p f (z) Dλ,p f (z)   α 1+ − µ (1 + λp + (p + 1)λ)k ap+1 z p      µ+1 2α k 2k 2 − µ (1 + λp + (p + 2)λ) ap+2 − (1 + λp + (p + 1)λ) ap+1 z 2 + . . . + p 2 (2.3) From equations (2.1),(2.2) and (2.3) we get, ap+1 =

(A − B)pω1 (α − pµ)(1 + λp + (p + 1)λ)k

and ap+2

(A − B)p = (2α − pµ)(1 + λp + (p + 2)λ)k

      µ + 1 (A − B)p(2α − pµ) 2 ω2 − B − ω1 . 2 (α − pµ)2

218

C. RAMACHANDRAN ET AL 216-222

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

C. RAMACHANDRAN, D. KAVITHA, AND WASIM UL-HUQ

For any complex number η, we can derive |ap+2 − ηa2p+1 | =

(A − B)p |ω2 − tω12 | k |2α − pµ|(1 + λp + (p + 2)λ)

where,    µ+1 (1 + λp + (p + 2)λ)k (A − B)p(2α − pµ) +η |t| = B − B(α − pµ)2 2 (1 + λp + (p + 1)λ)2k Now the result is follow from Lemma 1, (A − B)p |2α − pµ|(1 + λp + (p + 2)λ)k      k (A − B)p(2α − pµ) µ + 1 (1 + λp + (p + 2)λ) . max 1, B − +η (α − pµ)2 2 (1 + λp + (p + 1)λ)2k

|ap+2 − ηa2p+1 | ≤

The result is sharp for the functions dened by µ  µ  0 α z(Dλk f (z)) 1 + Az 2 zp zp + = (1 − α) p 1 + Bz 2 Dλk f (z) Dλk f (z) Dλk f (z) or  µ  µ 0 α z(Dλk f (z)) 1 + Az zp zp + = (1 − α) k k k p 1 + Bz Dλ f (z) Dλ f (z) Dλ f (z)  Now we are finding the coefficient bounds and Fekete Szeg¨ o results for different values of parameters in the following corollaries. Corollary 1. Let λ = 0 , k = 0 and for any complex number η, we obtain (A − B)pω1 , (α − pµ)       (A − B)p µ + 1 (A − B)p(2α − pµ) 2 = ω2 − B − ω1 (2α − pµ) 2 (α − pµ)2 ap+1 =

ap+2 and |ap+2 −

ηa2p+1 |

(A − B)p max ≤ |2α − pµ|

    (A − B)p(2α − pµ) µ + 1 + 2η . 1, B − (α − pµ)2 2

Corollary 2. Put p = 1 in corollary 1 and for any complex number η, we obtain (A − B)ω1 , (α − µ)       (A − B) µ + 1 (A − B)(2α − pµ) 2 ω2 − B − ω1 a3 = (2α − µ) 2 (α − µ)2 a2 =

219

C. RAMACHANDRAN ET AL 216-222

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

ˇ FUNCTION . . . MULTIVALENT NON-BAZILEVIC

5

and |a3 −

ηa22 |

(A − B) ≤ max |2α − µ|

    (A − B)(2α − µ) µ + 1 + 2η 1, B − . (α − µ)2 2

Corollary 3. Put α = 1 in corollary 1 and for any complex number η, we obtain (A − B)pω1 ap+1 = , (1 − pµ)       (A − B)p µ + 1 (A − B)p(2 − pµ) 2 ap+2 = ω2 − B − ω1 (2 − pµ) 2 (1 − pµ)2 and     (A − B)p (A − B)p(2 − pµ) µ + 1 + 2η 2 |ap+2 − ηap+1 | ≤ max 1, B − + . |2 − pµ| (1 − pµ)2 2 Corollary 4. Put p = 1 in corollary 3 and for any complex number η, we obtain (A − B)ω1 a2 = , (1 − µ)       (A − B) µ + 1 (A − B)(2 − µ) 2 a3 = ω2 − B − ω1 (2 − µ) 2 (1 − µ)2 and     (A − B)(2 − µ) µ + 1 + 2η (A − B) 2 max 1, B − + . |a3 − ηa2 | ≤ |2 − µ| (1 − µ)2 2 Corollary 5. Let A = 1 , B = −1 in corollary 1 and for any complex number η, we obtain 2pω1 ap+1 = , (α − pµ)     (µ + 1)p(2α − pµ) 2 2p ω2 + 1 + ω1 ap+2 = (2α − pµ) (α − pµ)2 and   2p p(2α − pµ) . |ap+2 − ηa2p+1 | ≤ max 1, 1 + (µ + 1 − η) |2α − pµ| (α − pµ)2 Corollary 6. Let p = 1 in corollary 5 and for any complex number η, we obtain 2ω1 a2 = , (α − µ)     2 (µ + 1)(2α − µ) 2 ω1 a3 = ω2 + 1 + (2α − µ) (α − µ)2 and   2 (2α − µ) 2 . |a3 − ηa2 | ≤ max 1, 1 + (µ + 1 − η) |2α − µ| (α − µ)2

220

C. RAMACHANDRAN ET AL 216-222

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

C. RAMACHANDRAN, D. KAVITHA, AND WASIM UL-HUQ

Corollary 7. Let α = 1 in corollary 5 and for any complex number η, we obtain 2pω1 , (1 − pµ)

ap+1 =

ap+2

2p = (2 − pµ)





  (µ + 1)p(2 − pµ) 2 ω2 + 1 + ω1 (1 − pµ)2

and |ap+2 −

ηa2p+1 |

2p ≤ max |2 − pµ|

  p(2 − pµ) 1, 1 + (µ + 1 − η) . (1 − pµ)2

Corollary 8. Let p = 1 in corollary 7 and for any complex number η, we obtain a2 = 2 a3 = (2 − µ)



2ω1 , (1 − µ)



  (µ + 1)(2 − µ) 2 ω2 + 1 + ω1 (1 − µ)2

and |a3 −

ηa22 |

2 max ≤ |2 − µ|

  (2 − pµ) . 1, 1 + (µ + 1 − η) (1 − µ)2

References [1] G. Bao, L. Guo, Y. Ling, Some starlikeness criterions for analytic functions, Journal of Inequalities and Applications (2010), Article ID: 175369. [2] S. P. Goyal, S. Kumar, Fekete-Szego problem for a class of complex order related to Salagean operator, Bull. Math. Anal. Appl. 3, (4)(2011), 240246. [3] X. Jiang, L. Guo, Fekete-Szeg¨ o functional for some subclass of analytic functions, International Journal of Pure and Applied Mathematics, Vol. 92(1)(2014), 125-131. [4] F.R. Keogh, E.P Merkes, A coefficient inequality for certain classes of analytic functions, Proc. Amer. Math. Soc., 20(1969), 8-12. [5] Mohammed Aabed, and Maslina Darus, Notes On Generalized Integral Operator Includes Product Of p-valent Meromorphic Functions, Advances in Mathematics, 2(2015), 183-194. [6] M. Obradovic, A class of univalent functions, Hokkaido Math. J., 27(2) (1998), 329335. [7] P. Sahoo, S. Singh, Y. Zhu, Some starlikeness conditions for the analytic functions and integral transforms, Journal of Nonlinear Analysis and Applications (2011), Article ID: jnaa-00091. [8] T. M. Seoudy, Fekete-Szeg problems for certain class of non-Bazileviˇ c functions involving the Dziok-Srivastava operator, Romai J., vol.10, no.1(2014), 175186. [9] N. Tuneski, M. Darus, Fekete-Szeg o functional for non-Bazilevic functions, Acta Math. Acad. Paed. Ny‘regyhaa‘ziensis, 18 (2002), 63-65. [10] Z. Wang, C. Gao And M. Liao, On certain generalized class of non-Bazileviˇ c functions, Acta Mathematica Academia Paedagogicae Nyiregyhaziensis, 21 (2005), 147154.

221

C. RAMACHANDRAN ET AL 216-222

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

ˇ FUNCTION . . . MULTIVALENT NON-BAZILEVIC

7

Department of Mathematics, University College of Engineering Villupuram,Kakuppam, Villupuram 605103, Anna University, Tamilnadu, India E-mail address: [email protected] Department of Mathematics, IFET College of Engineering, Villupuram 605108, Tamilnadu, India E-mail address: [email protected] Department of Mathematics, College of Science in Al-Zulfi, Majmaah University, Al-Zulfi, Saudi Arabia E-mail address: [email protected]

222

C. RAMACHANDRAN ET AL 216-222

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A NEW INTERPRETATION OF HERMITE-HADAMARD’S TYPE INTEGRAL INEQUALITIES BY THE WAY OF TIME SCALES SAEEDA FATIMA TAHIR, MUHAMMAD MUSHTAQ, AND MUHAMMAD MUDDASSAR *

A BSTRACT. The concept of convex functions has been generalized by using the Time Scales in [4] by C. Dinu which is unifying integral and differential calculus with the calculus of finite differences, offering a formalism for studying hybrid discretecontinuous dynamical systems. Cristaian Dinu in his article [5] established some Ostrowski type inequalities on Time Scales. R. P. Agarwal et.al. in [1] discussed inequalities on time scales. In this article, using the concept of time scale, we generalized some of the Hermite-Hadamard type integral inequalities.

1. I NTRODUCTION Let us rephrase some concept of Time scales already defined in [2]. A nonempty closed subset T of the set of real numbers R has been called a time scale by Stefan Hilger. Thus R itself, Z the set of integers , the set of non-negative integers No , a singleton subset of R, any finite subset of R, any closed interval in R and are all the examples of time scales discussed in [11]. However, Q, Qc = R \ Q, C and any open interval of R are not time scales. A neighborhood of a point t0 ∈ T will be taken as the set T ∩ ]to − δ, to + δ[ for any δ > 0. If T = Z then neighborhood of each t ∈ T is the point t itself. The mapping σ : T → T is called forward jump operator if it is defined as σ(t) = inf {s ∈ T : s > t}. The backward jump operator ρ : T → T is defined by ρ(t) = sup{s ∈ T : s < t}. The function µ : T → [0, ∞[ defined by µ(t) = σ(t) − t is referred to as graininess function. If f : T → R then the function f σ : T → R is defined by f σ (t) = f (σ(t))∀t ∈ T, i.e, f σ = f ◦ σ. A function f : T → R is said to be continuous at to ∈ T if for every  > 0 there exists a Date: March 14, 2017. 2010 Mathematics Subject Classification. 26D15, 26A51, 26A33. Key words and phrases. Hermite- Hadamard inequality; convex functions; H older inequality; Time Scales. * Corresponding Author. 1

223

SAEEDA FATIMA TAHIR ET AL 223-233

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

S. FATIMA, M. MUSHTAQ, AND M. MUDDASSAR

δ > 0 such that for all t ∈ T ∩ ]to − δ, to + δ[ |f (t) − f (to )| <  The function f ∆ : Tk → R is called the delta (or Hilger) derivative of the function f : T → R at a point to ∈ Tk if for every  > 0 there is a neighborhood N = T ∩ ]to − δ, to + δ[ of to such that [f (t) − f σ (to )] − f ∆ (to ) [t − σ(to )] ≤  |t − σ(to )|, ∀t ∈ N . The function f is said to be delta (or Hilger) differentiable on Tk provided f ∆ exists for all t ∈ Tk [2]. Theorem 1 (Bohner, 2001). let t ∈ T (1) If f : T → R is differentiable at t then f is continuous at t. (2) If t is right-scattered and f : T → R is continuous at t, then f is differentiable at t with f ∆ (t) =

f σ (t) − f (t) µ(t)

Definition 1 (Bohner, 2001). The function f : T → R is refereed as an rd-continuous at every t ∈ T, if f is continuous at right-dense point t ∈ T. It is denoted by f ∈ Crd (T, R) Definition 2 (Bohner, 2001). Let f ∈ Crd . Then f : T → R is known as anti-derivative of f on T if it s differentiable on T provided that f ∆ (t) = F (t) is valid for t ∈ Tk , the integral of f is distinct by ; Z

b

f (t)∆t = F (b) − F (a), ∀ t ∈ T a

In recent years there have been many extensions, generalizations and similar results of the Hermite-Hadamard inequality studied in [3, 6, 7, 10, 11]. In this article, we obtain some new inequalities of Hermite-Hadamard type for functions on time scales which is actually a generalization of Hermite-Hadamard type inequalities. We also found some related results as well. Recent references that are available online are mentioned as well [8, 12, 13, 14].

2. M AIN R ESULTS In [1], Barani et al. established inequalities for twice differentiable P-convex functions which are connected with Hadamard’s inequality, and they used the following lemma to prove their results:

224

SAEEDA FATIMA TAHIR ET AL 223-233

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A NEW INTERPRETATION OF HERMITE-HADAMARD’S TYPE INTEGRAL INEQUALITIES BY THE WAY OF TIME SCALES 3

Lemma 1. Let T be a time scale and I = [a, b], Let f : I ⊆ T → R be a delta differentiable mapping on I o (I o is the interior of I) with a < b. If f ∆ (t) ∈ Crd then we have f (a) + f (b) 1 − 2 b−a

b

Z

f σ (x)∆x =

a

b−a 2

1

Z

(1 − 2t)f ∆ (ta + (1 − t)b)∆t

(2.1)

0

Theorem 2. Let f : I ⊆ T → R be a differentiable mapping on I 0 , a, b ∈ I with a < b and f ∆ ∈ Crd . If the mapping |f ∆ | is convex, then the following inequality holds   Z b f (a) + f (b) b−a 1 1 σ f (x)∆x ≤ − [f ∆ (a) + f ∆ (b)] 1 − 4h2 ( , 0) . 2 b−a a 4 2 (2.2) Proof. From lemma 1 , we have Z b b−aZ 1 f (a) + f (b) 1 σ f (x)∆x ≤ |(1 − 2t)||f ∆ (ta + (1 − t)b)|∆t − 2 b−a a 2 0 since |f ∆ | is convex , therefore Z b f (a) + f (b) b−aZ 1 1 σ − f (x)∆x ≤ |(1 − 2t)||tf ∆ (a) + (1 − t)f ∆ (b)|∆t 2 b−a a 2 0 Here Z I=

1

|(1 − 2t)|{|tf ∆ (a) + (1 − t)f ∆ (b)|}∆t

0

Z

1 2

I=

(1 − 2t){tf ∆ (a) + (1 − t)f ∆ (b)}∆t −

Z

1

(1 − 2t){tf ∆ (a) + (1 − t)f ∆ (b)}∆t 1 2

0

using the following results Z

1 2

1

Z 1∆t =

∆t = 1 2

0 1 2

1 2

 1 t∆t = h2 ,0 2 0   Z 1 1 1 t∆t = − h2 ,0 1 2 2 2 Z



we get ( ∆

I = −f (a) ( ∆

+f (b)

1 2

)      Z 12 Z 12 1 1 1 1 2 2 ,0 − 2 t ∆t − + h2 , 0 + 1 − 4h2 ,0 + 2 t ∆t h2 2 2 2 2 0 0 )       Z 12 Z 21 1 1 3 1 1 2 2 − 3h2 ,0 + 2 t ∆t − + − 3h2 , 0 − 1 + 4h2 ,0 − 2 t ∆t 2 2 2 2 2 0 0 

225

SAEEDA FATIMA TAHIR ET AL 223-233

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

S. FATIMA, M. MUSHTAQ, AND M. MUDDASSAR

This leads to       Z b f (a)+f (b) b−a  1 1 1 σ ∆ ∆ f (x)∆x ≤ − f (a) 1−4h2 ,0 +f (b) 1−4h2 ,0 2 b−a a 4 2 2 This completes the proof. Remark 1. If we consider T = R then σ(t) = t and   Z 1 Z 21 2 t2 1 1 (t − 0)∆t = (t − 0)dt = |02 h2 ,0 = 2 2 0 0 Then from (2.2), we have       Z b f (a)+f (b) b−a 1 1 0 f 0 (a) 1−4 1 f (x)dx ≤ − +f (b) 1−4 2 b−a a 4 8 8  0  f (a) + f 0 (b) = (b − a) 8 This is a well-known result for Hermite-Hadamard inequality in R Lemma 2. Let f : T → R be a differentiable mapping, a, b ∈ T with a < b, f ∆ ∈ Crd ,then the following equality holds; Z b 1 f (a){1 − h2 (1, 0)} + f (b)h2 (1, 0) − f σ (x)∆x b−a a Z Z b−a 1 1 ∆ [f (ta + (1 − t)b) − f ∆ (sa + (1 − s)b)](s − t)∆t∆s (2.3) = 2 0 0 Proof. Consider Z Z  b−a 1 1 ∆ f (ta + (1 − t)b) − f ∆ (sa + (1 − s)b (s − t)∆t∆s 2 0 0

(2.4)

And let Z

1

Z

1

I1 = Z

0 1

Z

I2 = 0

[f ∆ (ta + (1 − t)b)](s − t)∆s∆t

0 1

[f ∆ (sa + (1 − s)b)](s − t)∆t∆s

0

Then by integrating and using the formula Z b Z ∆ f (t)g (t)∆t = (f g)(a) − a

b

f ∆ (t)g(σ(t))∆t

a

Z I1 = f (a){1 − h2 (1, 0)} + f (b)h2 (1, 0) −

1

f σ (ta + (1 − t)b)∆

(2.5)

0

Z I2 = f (a)h2 (1, 0) − f (b)h2 (1, 0) +

1

f σ (sa + (1 − s)b)∆s

(2.6)

0

226

SAEEDA FATIMA TAHIR ET AL 223-233

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A NEW INTERPRETATION OF HERMITE-HADAMARD’S TYPE INTEGRAL INEQUALITIES BY THE WAY OF TIME SCALES 5

By putting the values of I1 and I2 from (2.5) and (2.6) in (2.4), we get (2.3). Remark 2. If we consider the case T = R then σ(x) = x , and Z 1 1 h2 (1, 0) (t − 0)dt = 2 0 thus (2.3) becomes f (a)+f (b) 1 − 2 b−a

Z

b

f (x)dx = a

b−a 2

Z 1Z 0

1

[f 0 (ta+(1−t)b)−f 0 (sa+(1−s)b)](s−t)dtds

0

Lemma 3. Let f : I o ⊆ T → R be delta differentiable on I o , a, b ∈ Io with a < b. If f ∆ ∈ Crd ([a, b], R), then the following equality holds :   Z b 1 a+b f f σ (x)∆x − 2 b−a a Z Z  b−a 1 1 ∆ f (ta+(1−t)b)−f ∆ (sa+(1−s)b) (m(s)−m(t))∆t∆s (2.7) = 2 0 0 with m(.) :=

    t, t ∈ 0, 1 2  t − 1, t ∈ ( 1 , 1] 2

Proof. By definition of m(.), it follows that 1Z 1  f ∆ (ta + (1 − t)b) − f ∆ (sa + (1 − s)b) × (m(t) − m(s))∆t∆s

Z 0

0

Z 1Z

1

f ∆ (ta+(1−t)b)(m(t)−m(s))∆t∆s −

= 0

Z 1Z

0

0 1 2

Z 1Z

f ∆ ((ta+(1−t)b)(t−m(s)))∆t∆s+

=

Z 1Z

0

0

1 2



0 1

f ∆ ((ta+(1−t)b)(t−1−m(s))∆t)∆s

Z 1Z



f ∆ (sa+(1−s)b)(m(t)−m(s))∆t∆s

1 2

0

Z 1Z

1

1

f ∆ (sa+(1−s)b)(t−1−m(s))∆t∆s

f (sa+(1−s)b)(t−m(s))∆t∆s +

Z

0

0

1 2

(Z

1 2

0

)

1 2

Z



1

(Z

f (ta+(1−t)b)(t − s)∆t ∆s +

= 0

)

1

0

Z 21(Z



1 2

1 2



f (ta+(1 − t)b)(t − s − 1)∆t ∆t 1 2

0

Z 21(Z

1 2

)

Z 1(Z



f (sa+(1 − s)b)(t − s)∆t ∆s +

+ 0

Z 12(Z

)

1 ∆

1 2

) ∆

f (sa+(1 − s)b)(t − s + 1)∆t ∆s 1 2

0

)

1

f (ta+(1 − t)b)(t − s)∆t ∆s +

+



f (ta+(1 − t)b)(t − s + 1)∆t ∆s 1 2

0

Z 1(Z

)

1 2

0

Z

1

(Z



f (sa+(1 − s)b)(t − s − 1)∆t ∆s +

+ 0

1 2

)

1

f (sa + (1 − s)b)(t − s)∆t ∆s 1 2

1 2

= I1 + I2 + I3 + I4 + I5 + I6 + I7 + I8

227

SAEEDA FATIMA TAHIR ET AL 223-233

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

S. FATIMA, M. MUSHTAQ, AND M. MUDDASSAR

by integrating, we can state, ) Z 12 (Z 12 I1 = f ∆ (ta + (1 − t)(t − s)∆t) ∆s 0

0

     Z a+b 2 f 2 f a+b 1 f (b) 1 1 2 f σ (x)∆x = − h2 ,0 + h2 ,0 − 4(a − b) a−b 2 a−b 2 2(a − b)2 0 ) Z 1 (Z 12 I2 = f ∆ (ta + (1 − t)b)(t − s + 1)∆t ∆s  a+b

1 2

0

     Z a+b 2 f 2 f a+b 1 f (b) 1 1 2 = − h2 ,0 − h2 ,0 − f σ (x)∆x 4(a − b) a−b 2 a−b 2 2(a − b)2 b  a+b

Z

1 2

(Z

)

1 ∆

f (ta + (1 − t)b)(t − s − 1)∆t ∆s

I3 = 1 2

0

      Z a f a+b f a+b f (a) 1 1 1 2 2 − h2 ,0 − h2 ,0 − f σ (x)∆x = 4(a − b) a − b 2 a−b 2 (a − b)2 a+b 2 1

Z

(Z

)

1 ∆

f (ta + (1 − t)b)(t − s)∆s ∆s

I4 = 1 2

1 2

      Z a f a+b f a+b f (a) 1 1 1 2 2 f σ (x)∆x = + h2 ,0 − h2 ,0 − 4(a − b) a − b 2 a−b 2 (a − b)2 a+b 2 ) Z 12 (Z 12 ∆ I5 = f (sa + (1 − s)b)(t − s)∆t ∆s 0

0

 a+b

     Z a f 2 f a+b f (b) 1 1 1 2 =− − h2 ,0 + h2 ,0 − f σ (x)∆x 4(a − b) a − b 2 a−b 2 2(a − b)2 a+b 2 ) Z 1 (Z 12 f ∆ (sa + (1 − s)b)(t − s + 1)∆t ∆s I6 = 0

0 a+b 2



f f (a) =− + h2 4(a − b) a − b 1 2

Z

(Z



    Z a f a+b 1 1 1 2 f σ (x)∆x ,0 − h2 ,0 − 2 a−b 2 2(a − b)2 a+b 2 )

1 ∆

f (sa(1 − s)b)(t − s − 1)∆t ∆s

I7 = 1 2

0

      Z a f a+b f a+b f (a) 1 1 1 2 2 =− + h2 ,0 − h2 ,0 − f σ (x)∆x 4(a − b) a − b 2 a−b 2 2(a − b)2 a+b 2 ) Z 1 (Z 1 I8 = f ∆ (sa + (1 − s)b)(t − s)∆t ∆s 1 2

1 2

 a+b

f 2 f (a) =− − h2 4(a − b) a − b



    Z a f a+b 1 1 1 2 ,0 − h2 ,0 − f σ (x)∆x 2 a−b 2 2(a − b)2 a+b 2

228

SAEEDA FATIMA TAHIR ET AL 223-233

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A NEW INTERPRETATION OF HERMITE-HADAMARD’S TYPE INTEGRAL INEQUALITIES BY THE WAY OF TIME SCALES 7

Adding I1 , I2 , I3 , I4 , I5 , I6 , I7 and I8 and rewriting we easily deduce, ( Z a+b ) Z a 2 2 σ σ =2 + − f (x)∆x − f (x)∆x a+b a−b (a − b)2 b 2  Z b f a+b 2 2 = f σ (x)∆x + 4(a − b) (a − b)2 a f

a+b 2



This leads to the required result.if we consider T = R and σ(t) = t.Then we will come to a well-known result for Hermite-Hadamard inequality in R. Theorem 3. Let f : I ⊆ T → R be a delta differentiability function I o , where a, b ∈ I with a < b if f ∆ ∈ Crd then the following inequality holds Z b (b − x)f (b) + (x − a)f (a) 1 f σ (u)∆u − b−a b−a a Z Z (x−a)2 1 (b − x)2 1 = (t − 1)f ∆ (tx+(1 − t)a)∆t+ (1 − t)f ∆ (tx+(1 − t)b)∆t(2.8) b−a 0 b−a 0 Proof. Let f (tx + (1 − t)a) 1 − 0 x−a Z x σ f (a) 1 f (u) = − ∆u x−a x−a a x−a

Z

f (tx + (1 − t)b) 1 I2 = (1 − t) |0 − x−b Z x σ f (b) f (u) + =− ∆u 2 x−b b (x − b)

Z

1

I1 = (t − 1)

(1) 0

f σ (tx + (1 − t)a) ∆t x−a

1

(−1) 0

f σ (tx + (1 − t)b) ∆t x−b

By substituting the values of I1 and I2 in (2.8) we get, (x − a)2 b−a 1 = b−a

Z

1

(t − 1)f ∆ (tx + (1 − t)a)∆t +

0

 Z (x − a)f (a) −

Z

1

(1 − t)f ∆ (tx + (1 − t)b)∆t

0

x

x

Z

σ

(x − a)f (a) + (b − x)f (b) 1 − b−a b−a

 f (u)∆u σ

f (u)∆u + (b − x)f (b) +

a

(x − a)f (a) + (b − x)f (b) 1 = − b−a b−a =

(b − x)2 b−a

b x

Z

σ

Z

f (u)∆u + a

Z

x

 f 6σ(u)∆u

b

b

f σ (u)∆u

a

which leads to the required result.

229

SAEEDA FATIMA TAHIR ET AL 223-233

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

S. FATIMA, M. MUSHTAQ, AND M. MUDDASSAR

Lemma 4. let f : I ⊆ T → R be delta differentiable on I o , with a, b ∈ I and a < b and λ, µ ∈ R. If f ∆ ∈ Crd , then Z b 1 f σ (x)∆x b−a a # "Z 1 Z 1 2 ∆ ∆ (λ − t)f (ta + (1 − t)b)∆t + (µ − t)f (ta + (1 − t)b)∆t (2.9) = (b − a) 

(1 − u)f (a) + λf (b) + (µ − λ)f

a+b 2





1 2

0

Proof. Choosing from R.H.S Z 21 (λ − t)f ∆ (ta + (1 − t)b)∆t I1 = 0

 =

1 λ− 2



f

a+b 2

a−b

 −

λf (b) 1 + a−b b−a

Z

1 2

f σ (ta + (1 − t)b)∆t

0

and Z

1

(µ − t)f ∆ (ta + (1 − t)b)∆t

I2 = 1 2

   Z 12 f (a) 1 f a+b 1 2 = (µ−1) − µ− + f σ (ta+(1 − t)b)∆t a−b 2 a−b b−a 0 Filling I1 and I2 in right hand side of (2.9) which completes the proof. Lemma 5. Letf : I ⊆ T → R be a delta differentiable function on I o , the interior of I where a, b ∈ I with a < b. If f ∆ ∈ Crd and λ, µ ∈ R then the following inequality holds   Z b λf (a) + µf (b) (2 − µ − λ) a+b 1 + f − f σ (x)∆x 2 2 2 b−a a  Z 1    (b−a) a+b a+b +(1−t)b ∆t(2.10) = (1−λ−t)f ∆ ta+(1−t) +(µ−t)f ∆ t 4 2 2 0 Proof. Replacing λ and µ respectively by α2 and 1 − β2 in lemma 4 yields, " #   Z b βf (a) + αf (b) (2 − α − β) a+b 1 1 σ + f − f (x)∆x b−a 2 2 2 b−a a  Z 1 Z 12   α β ∆ = − t f (ta + (1 − t)b)∆t + 1 − − t f ∆ (ta + (1 − t)b)∆t (2.11) 1 2 2 0 2 simple calculations resulting   Z 21  Z  α 1 1 u 2−u ∆ ∆ − t f (ta + (1 − t)b)∆t = (α − u)f a+ b ∆u 2 4 0 2 2 0   Z 1 1 a+b ∆ = (α − u)f u + (1 − u)b ∆u (2.12) 4 0 2

230

SAEEDA FATIMA TAHIR ET AL 223-233

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A NEW INTERPRETATION OF HERMITE-HADAMARD’S TYPE INTEGRAL INEQUALITIES BY THE WAY OF TIME SCALES 9

Z

1

β 1 (1− −t)f ∆ (ta+(1−t)b)∆t = 1 2 4 2

Z

1

(1−β−u)f ∆ (

0

  1+u 1−u a+ b )∆u (2.13) 2 2

utilizing (2.11), (2.12) and (2.13), leads to   Z b βf (a) + αf (b) (2 − α − β) a+b 1 f σ (x)∆x + f − 2 2 2 b−a a       Z  a+b b−a 1 1+u 1−u ∆ ∆ (α−u)f = u+(1 − u)b +(1 − β − u)f a+ b ∆u 4 2 2 2 0 This is the required result. Corollary 1. By taking λ =

l m ,µ

=

m−l m

for m 6= 0 in lemma 5 , we have the following

identities. # "   Z b l (m − 2l) a+b 1 σ f (x)∆x f (a) + f (b) + f − m m 2 b−a a   Z 1 Z 1 l m−l = (b−a) −t f ∆ (ta+(1−t)b)∆t+ −t f ∆ (ta+(1 − t)b)∆t(2.14) 1 m m 0 2 In particular we have # "   Z b a+b 1 σ f (x)∆x f − 2 b−a a Z 12 Z = (b − a) (1 − t)f ∆ (ta + (1 − t)b)∆t + 1 f (a) + f (b) − b−a

tf ∆ (ta + (1 − t)b)∆t

(2.15)

1 2

0

"

1

Z

#

b

Z

σ

f (x)∆x = (b − a) a

1

(1 − 2t)f ∆ (ta + (1 − t)b)∆t(2.16)

0

" #   Z b a+b 1 1 f (a) + f (b) + f − f σ (x)∆x 3 2 b−a a   Z 12 Z 1 1 2 = (b−a) −t f ∆ (ta+(1 − t)b)∆t+ −t f ∆ (ta + (1 − t)b)∆t (2.17) 1 3 3 0 2 " #   Z b a+b 1 1 σ f (a) + f (b) + f − f (x)∆x 2 2 b−a a   Z 1 Z 12 1 3 ∆ −t f (ta+(1 − t)b)∆t+ −t f ∆ (ta+(1 − t)b)∆t (2.18) = (b−a) 1 4 4 0 2 " #   Z b 1 a+b 1 σ f (a) + f (b) + 3f − f (x)∆x 5 2 b−a a   Z 12 Z 1 1 4 = (b−a) −t f ∆ (ta+(1 − t)b)∆t+ −t f ∆ (ta+(1 − t)b)∆t (2.19) 1 5 5 0 2

231

SAEEDA FATIMA TAHIR ET AL 223-233

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

S. FATIMA, M. MUSHTAQ, AND M. MUDDASSAR

" #   Z b 1 a+b 1 σ f (x)∆x 2{f (a) + f (b)} + f − 5 2 b−a a   Z 12 Z 1 2 3 ∆ = (b−a) −t f (ta+(1−t)b)∆t+ −t f ∆ (ta+(1 − t)b)∆t (2.20) 1 5 5 0 2 # "   Z b a+b 1 1 σ f (a) + f (b) + 4f f (x)∆x − 6 2 b−a a   Z 12 Z 1 1 5 ∆ = (b−a) −t f (ta+(1 − t)b)∆t+ −t f ∆ (ta+(1 − t)b)∆t (2.21) 1 6 6 0 2 3. ACKNOWLEDGMENT This research paper is made possible through the help and support from HEC, Pakistan and Department of Mathematics, Univ. of the Engg. & Tech. Lahore, Pakistan. We gratefully acknowledge the time and expertise devoted to reviewing papers by the advisory editors, the members of the editorial board, and the referees. R EFERENCES [1] R. P. Agarwal, M. Bohner and A. Peterson, ”Inequalities on Time Scales: A Survey, Mathematical Inequalities and Applications”, Volume 4, Number 4 (2001), 537 - 557. [2] M. Bohner, A. Peterson, ”Dynamics Equations on Time Scale: An introduction with Application”, ISBN 0-8176-4225-0 (2001). [3] M. Bohner, Rui A. C. Ferreira & Delfim F. M. Torres, ”Integral Inequalities and their Application to the Calculus of Variation on Time Scale”, Mathematical Inequalities & Applications, Volume 13, Number 3 (2010), 511 - 522. [4] C. Dinu, ”Convex Functions on Time Scales”, Annals of University of Craiva vol 35,2008, pages 87-96. [5] C. Dinu, ”Ostrowski type inequalities on time scales”, An. Univ. Craiova Ser. Mat. Inform. 34 (2007), 431758. [6] S. S. Dragomir, C. E. M. Pearce, Selected topics on Hermite-Hadamard inequalities and applications, RGMIA monographs, Victoria University, 2000. [Online:http://ajmaa.org/RGMIA/monographs.php]. [7] A. Eroglu, ”New integral inequality on Time Scales”, Applied Mathematical Sciences, Vol. 4, 2010, no. 33, 1607 - 1616. [8] F. Qi, T. Zhang, and B. Xi,”Hermite-Hadamard type Integral Inequalities for Functions whose first Derivatives are of Convexity”, arXiv:1305.5933v1 [math.CA] 25 May 2013. [9] B. Karpuz and U. M. Ozkan, Generalized Ostrowskis inequality on time scales, JIPAM. J. Inequal. Pure Appl. Math. 9 (2008), no. 4, Article 112, 7pp. [10] M. Muddassar, M. I. Bhatti and M. Iqbal, Some new s-Hermite-Hadamard type inequalities for differentiable functions and their applications, proceedings of the Pakistan Academy of Sciences 49(1)(2012),pp.917.

232

SAEEDA FATIMA TAHIR ET AL 223-233

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A NEW INTERPRETATION OF HERMITE-HADAMARD’S TYPE INTEGRAL INEQUALITIES BY THE WAY OF TIME SCALES 11

[11] M. Muddassar, W. Irshad, Some Ostrowski type integral inequalities for double integrals on time scales, J. Comp. Analy. Appl. ISSN 1521-1398 Vol. 20. Issue 05(2016) PP914-927. [12] U. M. Ozkan and H. Yildirim, ”Steffensen’s integral inequality on Time Scales”, Hindawi Publishing Corporation, Journal of Inequalities and Applications, Volume 2007, Article ID 46524, 10 pages. [13] A. Saglam, M. Z. Sarikaya, and H. Yildirim, ”Some New Inequalities of Hermite-Hadamard’s Type”, Kyungpook Math. J. 50(2010), 399-410. [14] R. Xu, F. Meng, & C. Song, ”On Some Integral Inequalities on Time Scales and Their Applications”, J. Inequal. Appl. (2010) 2010: 464976. doi:10.1155/2010/464976. E-mail address: [email protected] D EPARTMENT

OF

M ATHEMATICS , U NIVERSITY

OF

E NGINEERING

AND

T ECHNOLOGY, L AHORE - PAK -

OF

E NGINEERING

AND

T ECHNOLOGY, L AHORE - PAK -

E NGINEERING

AND

T ECHNOLOGY, TAXILA - PAK -

ISTAN

E-mail address: [email protected] D EPARTMENT

OF

M ATHEMATICS , U NIVERSITY

ISTAN

E-mail address: [email protected] D EPARTMENT

OF

M ATHEMATICS , U NIVERSITY

OF

ISTAN

233

SAEEDA FATIMA TAHIR ET AL 223-233

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

The general solution and Ulam stability of inhomogeneous Euler-Cauchy dynamic equations on time scales Yonghong Shen1∗, Deming He1 1

School of Mathematics and Statistics, Tianshui Normal University, Tianshui 741001, P.R. China

December 24, 2017 Abstract: In the present paper, we find the general solution of the inhomogeneous EulerCauchy dynamic equation tσ(t)y ∆∆ (t) + αty ∆ (t) + βy(t) = f (t) on the time scale with the constant graininess function and the linear variable graininess function, respectively. And then, we study the Ulam stability problem of the forgoing equation on different types of time scales. Our results can be viewed as a unfication and extension of the results of Mortici et al. [C. Mortici, T.M. Rassias, S.M. Jung, The inhomogeneous Euler equation and its Hyers-Ulam stability, Appl. Math. Lett. 40 (2015) 23-28]. Keywords: General solution; Ulam stability; Euler-Cauchy dynamic equations; Time scales; Graininess function

1

Introduction and preliminary

The Ulam stability originated from a question proposed by S.M. Ulam [12] in 1940, which was concerned with the stability of group homomorphisms. In the next year, Hyers [5] partially solved this question in a Banach space. Many years later, Ulam’s question was generalized and partially solved by Rassias [10]. In 1993, Obloza [9] initiated the study of the Ulam stability of differential equations. Afterwards, Alsina and Ger [1] studied the Ulam stability of the differential equation y 0 = y on any real interval. Soon after, Miura and Takahasi et al. [6, 7, 11] deeply investigated the Ulam stability of the differential equation y 0 = λy in various abstract spaces. Since then, the theory of Ulam stability of differential equations is gradually formed and extensively studied. In 2009, Jung and Min[4] discussed the general solution of inhomogeneous Euler equations by using the power series method. However, they only obtained the local Ulam stability of the Euler equation due to the limitation of the radius of convergence. Recently, Mortici et al. [8] obtained the general solution of inhomogeneous Euler equations by using the integration method. Meantime, they proved that the inhomogeneous Euler equation is Hyers-Ulam stable on a bounded domain. Undoubtedly, these results can be regarded as an extension of the results obtained by Jung and Min[4]. ∗ Corresponding

author. E-mail: [email protected]

234

Yonghong Shen ET AL 234-241

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Inspired by the idea of Mortici et al.[8], in this paper, we shall consider the general solution and Ulam stability of the inhomogeneous Euler-Cauchy dynamic equation tσ(t)y ∆∆ (t) + αty ∆ (t) + βy(t) = f (t)

(1)

on a time scale T with α, β ∈ R, where f : T → R is a rd-continuous function. Throughout this paper, we assume that T ⊂ (0, ∞) is a time scale with the constant graininess function µ(t) = µ or the linear variable graininess function µ(t) = ηt, η is a constant. Indeed, several common time scales are included in these two cases (see Appendix A, Table 1). Here, we briefly recall some basic notions related to the time scale. For more details, we recommend two excellent monographs [2, 3] written by Bohner and Peterson. Let R and R+ denote the set of all real numbers and the set of all positive real numbers, respectively. A time scale T is a nonempty closed subset of R. For t ∈ T, the forward jump operator σ and the back jump operator ρ are defined as σ(t) := inf{s ∈ T : s > t} and ρ(t) := inf{s ∈ T : s < t}, respectively. Especially, inf ∅ = sup T, sup ∅ = inf T. A point t ∈ T is said to be right-scattered, right-dense, left-scattered and left-dense if σ(t) > t, σ(t) = t, ρ(t) < t and ρ(t) = t, respectively. Given a time scale T, the graininess function µ : T → [0, ∞) is defined by µ(t) = σ(t) − t. The set Tκ is derived from the time scale T. If T has 2 a left-scattered maximum γ, then Tκ = T − {γ}. Otherwise, Tκ = T. Successively, Tκ = (Tκ )κ . A function f : T → R is called rd-continuous provided it is continuous at right-dense points in T and its left-sided limits exist (finite) at left-dense points in T. A function f : T → R is called regressive provided 1 + µ(t)f (t) 6= 0 for all t ∈ Tκ . Denote by R the set of all regressive and rd-continuous functions f : T → R.

2

The general solution of (1)

In this section, we shall solve the inhomogeneous Euler-Cauchy dynamic equation (1) based on the time scale with different graininess functions.

2.1

The constant graininess function µ(t) = µ

The associated characteristic equation of Eq.(1) is r2 + (α − 1)r + β = 0.

(2)

Now, we assume that the following two regressivity conditions are satisfied: tσ(t) − αtµ(t) + βµ2 (t) 6= 0,

(3)

σ(t) + λµ(t) 6= 0,

(4)

where t ∈ Tκ , λ is a characteristic root of Eq.(2). Under these two conditions, we know that λ λ t , σ(t) ∈ R. Let λ be a root of (2). Setting x(t) = e λ (t, 0). Replacing the unknown function y(t) of Eq.(1) t by u(t)x(t). Then, we have y ∆ (t) = u(t)x∆ (t) + u∆ (t)xσ (t). (5)

235

Yonghong Shen ET AL 234-241

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Furthermore, we can obtain y ∆∆ (t) = u(t)x∆∆ (t) + u∆ (t)x∆σ (t) + u∆ (t)xσ∆ (t) + u∆∆ (t)xσσ (t).

(6)

According to the definition of the exponential function e λ (t, t0 ), we get t

x∆ (t) =

λ λ e λ (t, t0 ) = x(t). t t t

(7)

Using the formula xσ = x + µx∆ , it follows that  λ xσ (t) = 1 + µ x(t). t

(8)

Moreover, we can infer that x∆σ (t) = (x∆ )σ (t) = (x∆ )(σ(t)) =

λ λ σ λ  1 + µ x(t), x (t) = σ(t) σ(t) t

 µλ µλ  ∆ µλ λ µλ  x(t) + 1 + x (t) = − x(t) + 1+ x(t), tσ(t) σ(t) tσ(t) t σ(t)   µλ  σ µλ  µλ  xσσ (t) = (xσ )σ (t) = 1 + x (t) = 1 + 1+ x(t), σ(t) t σ(t)

xσ∆ (t) = (xσ )∆ (t) = −

x∆∆ (t) = −

λ ∆ λ λ2 λ x(t) + x (t) = − x(t) + x(t). tσ(t) σ(t) tσ(t) tσ(t)

(9) (10) (11) (12)

Therefore, it follows from (5)-(12) that tσ(t)y ∆∆ (t) + αty ∆ (t) + βy(t) = u(t)(λ2 − λ)x(t) + u∆ (t)[λ(t + µλ)]x(t) + u∆ (t)[λ(σ(t) + µλ) − µλ]x(t) + u∆∆ (t)[(σ(t) + µλ)(t + µλ)]x(t) + αu∆ (t)(t + µλ)x(t) + αλu(t)x(t) + βu(t)x(t) = u∆∆ (t)[(σ(t) + µλ)(t + µλ)]x(t) + u∆ (t)[(α + 2λ)(t + µλ)]x(t)

(13)

+ u(t)[λ2 + (α − 1)λ + β]x(t) = u∆∆ (t)[(σ(t) + µλ)(t + µλ)]x(t) + u∆ (t)[(α + 2λ)(t + µλ)]x(t) = f (t). Multiplying both sides of the last equality of (13) by e λ (t, 0), we have t

∆∆

[(σ(t) + µλ)(t + µλ)]u

(t) + [(α + 2λ)(t + µλ)]u∆ (t) = e λ (t, 0)f (t). t

(14)

λ Since λt , σ(t) ∈ R, we obtain that (σ(t) + µλ)(t + µλ) 6= 0. Dividing both sides of (14) by (σ(t) + µλ)(t + µλ), we have that

u∆∆ (t) +

α + 2λ ∆ f (t) u (t) = e λ (t, 0) . t σ(t) + µλ (σ(t) + µλ)(t + µλ)

236

(15)

Yonghong Shen ET AL 234-241

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Letting u∆ (t) = z(t). From (15), we get z ∆ (t) = −

α + 2λ f (t) z(t) + e λ (t, 0) . t σ(t) + µλ (σ(t) + µλ)(t + µλ)

α+2λ For simplicity, we put m(t) = − σ(t)+µλ , p(t) =

λ t.

By the regressivity condition (3), if λ1 and

λ2 are two roots of the characteristic equation (2), then 1 + µ · m(t) =

(16)

λ1 λ2 t , t

∈ R. Thus, it is easy to verify that

t + µ(1 − α − λ) t + µ(1 − α − λ) = 6= 0, t + µ(λ + 1) σ(t) + µλ

λ since σ(t) ∈ R and 1−α−λ is another root of the characteristic equation (2). Then, the exponential function em (t, t0 ) (t0 = inf T) is well-defined. Note that the equation (16) is a first order linear dynamic equation, the general solution is given by Z t e p (τ, 0)f (τ ) 1 ∆τ z(t) = c1 em (t, t0 ) + em (t, τ ) 1 + µm(τ ) (σ(τ ) + µλ)(τ + µλ) t0 (17) Z t em (t, τ )f (τ ) ∆τ, = c1 em (t, t0 ) + t0 ep (τ, 0)(τ + µλ)(σ(τ ) + µλ)

where c1 is an arbitrary constant. Integrating both sides of (17) from t0 to t with respect to ω, we have Z t Z tZ ω em (ω, τ )f (τ ) u(t) = c2 + c1 em (ω, t0 )∆ω + ∆τ ∆ω, (18) e (τ, 0)(τ + µλ)(σ(τ ) + µλ) p t0 t0 t0 where c2 is an arbitrary constant. Multiplying both sides of (18) by ep (t, 0), we conclude that Z

t

y(t) = c2 ep (t, 0) + c1 ep (t, 0)

Z tZ

ω

em (ω, t0 )∆ω + t0

t0

t0

ep (t, τ )em (ω, τ )f (τ ) ∆τ ∆ω. (τ + µλ)(σ(τ ) + µλ)

(19)

Through the above argument, we can obtain the following result: Theorem 2.1. Let T ⊂ (0, ∞) be a time scale with the constant graininess function µ. Let α, β ∈ R such that (α − 1)2 − 4β ≥ 0. Assume that f : T → R is a rd-continuous function. If λ is a root of the characteristic equation (2) and the regressivity conditions (3) and (4) are satisfied, then the function y(t) defined by (19) is the general solution of the inhomogeneous Euler-Cauchy equation (1).

2.2

The linear variable graininess function µ(t) = ηt

In fact, the formulas (5)-(12) are still valid except (10). In this case, the formula (8) is simplified as xσ (t) = (1 + ηλ)x(t) (20) Then, we deduce that xσ∆ (t) = (xσ )∆ (t) = (1 + ηλ)x∆ (t) =

237

λ(1 + ηλ) x(t). t

(21)

Yonghong Shen ET AL 234-241

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Analogously, we can infer that tσ(t)y ∆∆ (t) + αty ∆ (t) + βy(t) = u∆∆ (t)[(σ(t) + ηλt)(t + ηλt)]x(t) + u∆ (t)[(1 + ηλ)(λt + σ(t)λ + αt)]x(t) + u(t)[λ2 + (α − 1)λ + β]x(t)

(22)

∆∆



= u (t)[(σ(t) + ηλt)(t + ηλt)]x(t) + u (t)[(1 + ηλ)(λt + σ(t)λ + αt)]x(t) = f (t). Notice that

λ λ σ(t) , t

∈ R implies (σ(t) + ηλt)(t + ηλt) 6= 0. Thus, it follows that u∆∆ (t) = −

λ+α+η+1 ∆ e p (t, 0)f (t) . u (t) + (η + 1 + ηλ)t (η + 1 + ηλ)(1 + ηλ)t2

(23)

λ+α+η+1 Setting n(t) = − (η+1+ηλ)t . If we assume that η 2 − αη − 1 6= 0, then we have

1 + µ(t)n(t) = 1 −

1 − αη − η 2 η(λ + α + η + 1) = 6= 0. η + 1 + ηλ η + 1 + ηλ

Consequently, the exponential function en (t, t0 ) is well-defined. Letting u∆ (t) = z(t). we know that (23) is a first order linear dynamic equation. And then, the general solution is given by Z

t

z(t) = c1 en (t, t0 ) +

en (t, τ )

1 e p (τ, 0)f (τ ) ∆τ 1 + µ(τ )n(τ ) (η + 1 + ηλ)(1 + ηλ)τ 2

en (t, τ )

e p (τ, 0)f (τ ) ∆τ, (1 − αη − η 2 )(1 + ηλ)τ 2

t0 t

Z = c1 en (t, t0 ) +

t0

(24)

where c1 is an arbitrary constant. Integrating both sides of (24) from t0 to t with respect to ω, we can infer that Z t Z tZ ω en (ω, τ )f (τ ) u(t) = c2 + c1 en (ω, t0 )∆ω + ∆τ ∆ω, (25) 2 2 t0 t0 t0 ep (τ, 0)(1 − αη − η )(1 + ηλ)τ where c2 is an arbitrary constant. Multiplying both sides of (25) by ep (t, 0), we have that Z

t

y(t) = c2 ep (t, 0) + c1 ep (t, 0)

Z tZ

ω

en (ω, t0 )∆ω + t0

t0

t0

ep (t, τ )en (ω, τ )f (τ ) ∆τ ∆ω. (1 − αη − η 2 )(1 + ηλ)τ 2

(26)

Based on the foregoing analysis, the following theorem can be formulated. Theorem 2.2. Let T ⊂ (0, ∞) be a time scale with the linear variable graininess function µ(t) = ηt, η is a constant. Let α, β ∈ R such that (α−1)2 −4β ≥ 0 and η 2 −αη−1 6= 0. Assume that f : T → R is a rd-continuous function. If λ is a root of the characteristic equation (2) and the regressivity conditions (3) and (4) are satisfied, then the function y(t) defined by (26) is the general solution of the inhomogeneous Euler-Cauchy equation (1).

238

Yonghong Shen ET AL 234-241

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

3

Ulam stability of (1)

In this section, we shall prove the Ulam stability of the inhomogeneous Euler-Cauchy dynamic equation (1) on the time scale with different graininess functions. Theorem 3.1. Let ϕ : T → R+ be a function such that the integral Z t Z ω ep (t, τ )em (ω, τ ) ϕ(τ ) (τ + µλ)(σ(τ ) + µλ) ∆τ ∆ω t t 0

(27)

0

exists for any t ∈ Tκ . Under the hypothesis of Theorem 2.1, if a twice rd-continuously differential function yϕ : T → R satisfies the following inequality (28) tσ(t)yϕ∆∆ (t) + αtyϕ∆ (t) + βyϕ (t) − f (t) ≤ ϕ(t) 2

for all t ∈ Tκ , then there exists a solution y : T → R of the inhomogeneous Euler-Cauchy dynamic equation (1) such that Z t Z ω ep (t, τ )em (ω, τ ) ϕ(τ ) ∆τ ∆ω |yϕ (t) − y(t)| ≤ (29) t0 t0 (τ + µλ)(σ(τ ) + µλ) 2

for all t ∈ Tκ . Proof. For the sake of convenience, we write tσ(t)yϕ∆∆ (t) + αtyϕ∆ (t) + βyϕ (t) := fϕ (t).

(30)

|fϕ (t) − f (t)| ≤ ϕ(t)

(31)

From (28), we get 2

for all t ∈ Tκ . By Theorem 2.1 and (30), there exists c1 , c2 ∈ R such that Z t Z tZ ω ep (t, τ )em (ω, τ )fϕ (τ ) yϕ (t) = c2 ep (t, 0) + c1 ep (t, 0) em (ω, t0 )∆ω + ∆τ ∆ω, t0 t0 t0 (τ + µλ)(σ(τ ) + µλ) where m and p are given as in Section 2.1. Define Z t Z tZ y(t) := c2 ep (t, 0) + c1 ep (t, 0) em (ω, t0 )∆ω + t0

t0

ω

t0

ep (t, τ )em (ω, τ )f (τ ) ∆τ ∆ω (τ + µλ)(σ(τ ) + µλ)

(32)

(33)

2

for all t ∈ Tκ . From (31), (32) and (33), it follows that Z t Z ω e (t, τ )e (ω, τ )(f (τ ) − f (τ )) p m ϕ |yϕ (t) − y(t)| ≤ ∆τ ∆ω (τ + µλ)(σ(τ ) + µλ) t0 t0 Z t Z ω ep (t, τ )em (ω, τ ) |fϕ (τ ) − f (τ )| ≤ ∆τ ∆ω (τ + µλ)(σ(τ ) + µλ) t0 t0 Z tZ ω e (t, τ )em (ω, τ ) ϕ(τ ) p ≤ (τ + µλ)(σ(τ ) + µλ) ∆τ ∆ω. t t 0

0

The proof of the theorem is now completed.

239

Yonghong Shen ET AL 234-241

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

In particular, Theorem 3.1 implies the Hyers-Ulam stability of the inhomogeneous Euler-Cauchy dynamic equation (1) when the time scale is bounded and has a constant graininess function. Corollary 3.2. Let T ⊂ (0, ∞) be a bounded time scale with the constant graininess function µ and let inf T = t0 , sup T = b. Under the hypothesis of Theorem 2.1, for a given ε > 0, if a twice rd-continuously differential function yε : T → R satisfies the following inequality (34) tσ(t)yϕ∆∆ (t) + αtyϕ∆ (t) + βyϕ (t) − f (t) ≤ ε 2

for all t ∈ Tκ , then there exists a solution y : T → R of the inhomogeneous Euler-Cauchy dynamic equation (1) such that |yε (t) − y(t)| ≤ Kε (35) 2

for all t ∈ Tκ , where Z

b

Z

b

K= t0

t0

.

ep (t, τ )em (ω, τ ) (τ + µλ)(σ(τ ) + µλ) ∆τ ∆ω.

Theorem 3.3. Let ϕ : T → R+ be a function such that the integral Z t Z ω ep (t, τ )en (ω, τ ) ϕ(τ ) ∆τ ∆ω 2 2 t0 t0 (1 − αη − η )(1 + ηλ) τ exists for any t ∈ Tκ . Under the hypothesis of Theorem 2.2, if a twice rd-continuously differential 2 function yϕ : T → R satisfies the inequality (28) for all t ∈ Tκ , then there exists a solution y : T → R of the inhomogeneous Euler-Cauchy dynamic equation (1) such that Z t Z ω ep (t, τ )en (ω, τ ) ϕ(τ ) ∆τ ∆ω |yϕ (t) − y(t)| ≤ 2 2 t0 t0 (1 − αη − η )(1 + ηλ) τ 2

for all t ∈ Tκ . Proof. According to Theorem 2.2, this theorem can be proved by the same method as employed in Theorem 3.1. From Theorem 3.3, we can obtain the Hyers-Ulam stability of the inhomogeneous Euler-Cauchy dynamic equation (1) if the time scale is bounded and has a linear graininess function. Corollary 3.4. Let T ⊂ (0, ∞) be a bounded time scale with the linear variable graininess function µ(t) = ηt and let inf T = t0 , sup T = b. Under the hypothesis of Theorem 2.2, for a given ε > 0, if 2 a twice rd-continuously differential function yε : T → R satisfies the inequality (34) for all t ∈ Tκ , then there exists a solution y : T → R of the inhomogeneous Euler-Cauchy dynamic equation (1) such that |yε (t) − y(t)| ≤ Lε 2

for all t ∈ Tκ , where Z

b

Z

b

L= .

t0

t0

ep (t, τ )en (ω, τ )

(1 − αη − η 2 )(1 + ηλ) τ 2 ∆τ ∆ω.

240

Yonghong Shen ET AL 234-241

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Appendix A. Several common time scales and the corresponding graininess functions are given below (see Table 1). T R Z hZ qN 2N

σ(t) t t+1 t+h qt 2t

µ(t) 0 1 h (q − 1)t t

Attribute of µ Constant Constant Constant Linearity Linearity

Table 1: Time scales and graininess functions

Acknowledgement This work was supported by the National Natural Science Foundation of China (No. 11701425).

References [1] C. Alsina, R. Ger, On some inequalities and stability results related to the exponential function, J. Inequal. Appl. 2 (1998) 373-380. [2] M. Bohner, A. Peterson, Dynamic Equations on Time Scales: An Introduction with Applications, Birkh¨ auser Boston Inc., Boston, MA, 2001. [3] M. Bohner, A. Peterson, Advances in Dynamic Equations on Time Scales, Birkh¨auser, Boston, 2003. [4] S.M. Jung, S. Min, On approximate Euler differential equations, Abstr. Appl. Anal. 2009 (2009). Article ID 537963. [5] D.H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. USA 27 (1941) 222-224. [6] T. Miura, S.E. Takahasi, H. Choda, On the Hyers-Ulam stability of real continuous function valued differentiable map, Tokyo J. Math. 24 (2001) 467-476. [7] T. Miura, On the Hyers-Ulam stability of a differentiable map, Sci. Math. Japan 55 (2002) 17-24. [8] C. Mortici, T.M. Rassias, S.M. Jung, The inhomogeneous Euler equation and its Hyers-Ulam stability, Appl. Math. Lett. 40 (2015) 23-28. [9] M. Obloza, Hyers stability of the linear differential equation. Rocznik Nauk.-Dydakt. Prace Mat. 13 (1993) 259-270. [10] T.M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Am. Math. Soc. 72 (1978) 297-300. [11] S.E. Takahasi, T. Miura and S. Miyajima, On the Hyers-Ulam stability of the Banach spacevalued differential equation y = λy, Bull. Korean Math. Soc. 39 (2002) 309-315. [12] S.M. Ulam, Problems in Modern Mathematics, Wiley, New York, 1960.

241

Yonghong Shen ET AL 234-241

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Some existence theorems of generalized vector variational-like inequalities in fuzzy environment Jiraprapa Munkonga,1 , Ali Farajzadehb , Kasamsuk Ungchittrakoola,c,∗ a Department

of Mathematics, Faculty of Science, Naresuan University, Phitsanulok 65000, Thailand b Department of Mathematics, Razi University, Kermanshah, 67149, Iran c Research Center for Academic Excellence in Mathematics, Faculty of Science, Naresuan University, Phitsanulok 65000, Thailand

Abstract In this paper, we establish two versions of the existence theorems of solutions set of generalized vector variational-like inequalities in fuzzy environment by using two different notions; the first one by using affineness and the second by using the notion of vector O-diagonally convexity. Moreover, an example is established in order to illustrate the main problem. The results of this paper can be viewed as a significant improvement and refinement of several other previously existing known results. Keywords: Generalized vector variational-like inequality; KKM-mapping; Vector O-diagonally convex; Affine mapping; Fuzzy upper semicontinuous mapping

1. Introduction Variational inequality theory has appeared as an effective and powerful tool to study and investigate a wide class of problems arising in pure and applied sciences including elasticity, optimization, economics, transportation, and structural analysis, see for instance, [5, 7, 20, 23] and the references therein. It seems this theory began by Browder [8] in 1966, by formulating and proving some basic existence theorems of solutions to a class of nonlinear variational inequalities. Since then, Liu et al. [29], Zhao et al. [26] and Ahmad et al. [1] extended Browder’s results to more generalized nonlinear variational inequalities. In 2010, Xiao et al. [36] extended the results of Zhao et al. to generalized vector nonlinear variational-like inequalities with set-valued mappings. In 1965, the concept of fuzzy sets were introduced by Zadeh [9] to manipulate data and information possessing nonstatistical uncertainties. The applications of fuzzy set theory can be found in many branches of mathematical and engineering sciences including artificial intelligence, management science, control engineering, computer science, see e.g. [37]. Heilpern [22] introduced the concept of fuzzy mapping and proved a fixed point theorem for fuzzy contraction mapping which is ananalogue of Nadler’s fixed point theorem for multi-valued mappings. In 1989, Chang and Zhu [10] introduced the concept of variational inequalities for fuzzy mappings in abstract spaces and investigated the existence problem for solutions of some classes of inequalities for fuzzy mappings. Recently Chang et al. [13] introduced and studied a new class of generalized vector variationallike inequalities in fuzzy environment and generalized vector variational inequalities in fuzzy environment. They obtained some existence results for the problems. Several kinds of variational ∗ Corresponding

author. Tel.:+66 55963250; fax:+66 55963201. Email addresses: [email protected] (Kasamsuk Ungchittrakool), [email protected] (Jiraprapa Munkong), [email protected] (Ali Farajzadeh) 1 Supported by The Royal Golden Jubilee Project Grant no. PHD/0219/2556, Thailand.

242

Jiraprapa Munkong ET AL 242-255

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

inequalities and complementarity problems for fuzzy mapping were studied by Chang et al. [11], Chang and Salahuddin [12], Anastassiou and Salahuddin [4], Ahmad et al. [3], Verma and Salahuddin [35], Lee et al. [25, 28], Park et al. [31], Khan et al. [21], Ding et al. [18] and Lan and Verma [24]. Motivated and inspired by ongoing research in this direction, the purpose of this paper is to present two versions of the existence theorems for the generalized vector variational-like inequalities in fuzzy environment. The paper can be viewed as an alternative version which related to [13] by providing some new suitable conditions and methods for proving the main results. 2. Preliminaries Let X be a nonempty set. We recall that a fuzzy set A in X is characterized by a function µA : X → [0, 1], called membership function of A, “which associates with each point x in X a real number in the interval [0, 1], with the value of µA at x representing the grade of membership of x in A”: see [9, p.339]. Obviously, any crisp subset A of X can be viewed as a fuzzy set, where µA is such that µA (x) = 1 when x ∈ A and µA (x) = 0 otherwise. Let E be a nonempty subset of a vector space V and D be a nonempty set. A mapping F from D into the collection F(E), of all fuzzy sets of E, is called a fuzzy mapping. If F : D → F(E) is a fuzzy mapping, then F (y), for each y ∈ D, is a fuzzy set in F(E). So, the fuzzy mapping F can be identified with the function from E × D to [0, 1] which assigns with each (x, y) ∈ E × D the degree of membership of x in the fuzzy set F (y), that is the number F (x, y) = µF (y) (x). Let A ∈ F(E) and α ∈ [0, 1], then the set (A)α = {x ∈ E : A(x) ≥ α} is called an α-cut set of A. In the sequel, we assume that Z and E are Hausdorff topological vector spaces. We denote by L(E, Z) the space of all continuous linear operators from E into Z and ⟨l, x⟩, the evaluation of l ∈ L(E, Z) at x ∈ E. We consider each topology on L(E, Z) such that L(E, Z) becomes a topological vector space and the bilinear mapping is continuous. Denote by intA and coA the interior and convex hull of a set A, respectively. Let K be a nonempty convex subset of a Hausdorff topological vector space E and C : K → 2Z be a set-valued mapping such that C(x) ̸= Z and intC(x) ̸= ∅, for each x ∈ K. Let θ : K × K → E and g : K → K be the vector-valued mappings. Let M, S, T : K → F(L(E, Z)) be the fuzzy mappings and a, b, c : K → [0, 1] are the mappings. It is clear that the convex cone C(x) of Z induces an ordering on Z which is denoted by ≤C(x) and defined as follows y1 ≤C(x) y2 if and only if y2 − y1 ∈ C(x), where y1 , y2 ∈ Z. The rest of this section will deal with some definitions and basic results which are needed in the sequeul. In this paper we are interested in studying the following problem. Problem: [13] The “so called”Generalized vector variational-like inequality problem in fuzzy environment (GVVLIFE) (2.1) is to find an x ∈ K, u ∈ (M (x))a(x) , v ∈ (S(x))b(x) and w ∈ (T (x))c(x) such that ⟨N (u, v, w), θ(y, g(x))⟩ + η(g(x), y) * −intC(x), ∀y ∈ K,

(2.1)

where M, S, T : K → F(L(E, Z)) are fuzzy mappings, a, b, c : K → [0, 1], θ : K × K → E, η : K × K → 2Z , g : K → K and N : L(E, Z) × L(E, Z) × L(E, Z) → 2L(E,Z) are mappings. The following example is provided to illustrate Problem (2.1).

243

Jiraprapa Munkong ET AL 242-255

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Example 2.1. Let E = Z = R, K = [0, +∞), C(x) = [0, +∞), ∀x ∈ K. Define M, S, T : K → F(L(R, R) ≡ R) by  1  , if x ∈ [0, 1] , 1+(u−1)2 µM (x) (u) = 1  if x ∈ (1, +∞) , 2, 1+x(u−2)

  µS(x) (v) =

  

µT (x) (w) =

1 , 1+(v−1)2

if

x ∈ [0, 1] ,

1 , 2+x(v−2)2

if

x ∈ (1, +∞) ,



1 , 1+(w−1)2

if x ∈ [0, 1] ,

1 , 3+x(w−2)2

if x ∈ (1, +∞) ,

and a, b, c : K → [0, 1] as { 1 , if x ∈ [0, 1] , a(x) = 2 1 1+x , if x ∈ (1, +∞) , { b(x) = { c(x) =

1 2, 1 2+x ,

if x ∈ [0, 1] ,

1 2, 1 3+x ,

if

x ∈ [0, 1] ,

if

x ∈ (1, +∞) .

if x ∈ (1, +∞) ,

It is not hard to check that for any x ∈ [0, 1], we have { (M (x))a(x) = (M (x)) 1 = u ∈ R µM (x) (u) ≥ 2

{ (S(x))b(x) = (S(x)) 1 = v ∈ R µS(x) (v) ≥ 2

1 2

{ (T (x))c(x) = (T (x)) 1 = w ∈ R µM (x) (w) ≥ 2

} 1 2

1 2

}

{ = u ∈ R

{ = v ∈ R }

1 1+(u−1)2

1 1+(v−1)2

{ = w ∈ R



1 1+(w−1)2

≥ 1 2

1 2

} = [0, 2],

}



= [0, 2], 1 2

} = [0, 2],

whereas x ∈ (1, ∞), we have { (M (x))a(x) = (M (x)) 1 = u ∈ R µM (x) (u) ≥ 1+x { } 2 = u ∈ R (u − 2) ≤ 1 = [1, 3],

1 1+x

}

{ 1 = u ∈ R 1+x(u−2) 2 ≥

1 1+x

}

{ } { } 1 1 1 = v ∈ R 2+x(v−2) (S(x))b(x) = (S(x)) 1 = v ∈ R µS(x) (v) ≥ 2+x 2 ≥ 2+x 2+x } { 2 = v ∈ R (v − 2) ≤ 1 = [1, 3], { } { } 1 1 1 (T (x))c(x) = (T (x)) 1 = w ∈ R µT (x) (v) ≥ 3+x = w ∈ R 3+x(w−2) 2 ≥ 3+x 3+x { } 2 = w ∈ R (w − 2) ≤ 1 = [1, 3], Now, we define N : L(E, Z) × L(E, Z) × L(E, Z) → 2L(E,Z) by N (u, v, w) = {u + v + w} for all u, v, w ∈ L(E, Z)(= L(R, R) ≡ R),

244

Jiraprapa Munkong ET AL 242-255

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

g : K → K by g(x) = x2 , ∀ x ∈ K, θ : K × K → E by θ(x, y) =

x 2

− y, ∀x, y ∈ K,

and η : K × K → 2Z by { } η(x, y) = y2 − x , ∀x, y ∈ K. Then, let us consider in the following 2 cases: Case I, x ∈ [0, 1], u ∈ (M (x)) 12 = [0, 2], v ∈ (S(x)) 12 = [0, 2] and w ∈ (T (x)) 12 = [0, 2]. ⟨ ( x )⟩ (x ) ⟨N (u, v, w), θ(y, g(x))⟩ + η(g(x), y) = u + v + w, θ y, +η ,y ( y 2x ) ( y 2 x ) − + − = (u + v + w) 2 ( 2 2 2 y x) = (u + v + w + 1) − . 2 2 Thus, (u + v + w + 1)

(y 2



x) ≥0⇔y−x≥0 2 ⇔ x ≤ y, ∀y ∈ K.

This implies that x = 0 is a solution of the generalized vector variational-like inequality problem in fuzzy environment (GVVLIFE) (2.1). Case II, x ∈ (1, +∞), u ∈ (M (x))

1 1+x

= [1, 3], v ∈ (S(x))

1 2+x

= [1, 3] and w ∈ (T (x))

1 3+x

= [1, 3].

⟨ ( x )⟩ (x ) ⟨N (u, v, w), θ(y, g(x))⟩ + η(g(x), y) = u + v + w, θ y, +η ,y ( y 2x ) ( y 2 x ) = (u + v + w) − + − 2 ( 2 2 2 ) y x = (u + v + w + 1) − . 2 2 Thus, (u + v + w + 1)

(y 2



x) ≥0⇔y−x≥0 2 ⇔ x ≤ y, ∀y ∈ K.

This implies that in the Case II, there is no solution for (GVVLIFE) (2.1). Therefore, from the Case I, we obtain that generalized vector variational-like inequality problem in fuzzy environment (GVVLIFE) (2.1) has a solution and a solution set is {0}. Some special cases of GVVLIFE: f, S, e Te : K → 2L(E,Z) be classical set-valued mappings. If the fuzzy sets M (x), S(x) (i) Let M and T (x) as in the previous problem become the characteristic functions XM and e f(x) , XS(x) XTe(x) , respectively. Together with a(x) = b(x) = c(x) = 1, for all x ∈ K and g : K → K an identity mapping, then Problem (2.1) reduces to generalized nonlinear vector variational-like

245

Jiraprapa Munkong ET AL 242-255

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

f(x), v ∈ S(x), e inequality problems (GNVVLIP, in short): finding x ∈ K, u ∈ M w ∈ Te(x) such that ⟨N (u, v, w), θ(y, x)⟩ + η(x, y) * −intC(x), ∀y ∈ K.

(2.2)

This kind of problem was in considered and studied by Xiao et al. [36]. (ii) If θ(y, g(x)) = y − g(x), then (2.1) is equivalent to the problem of finding an x ∈ K, u ∈ (M (x))a(x) , v ∈ (S(x))b(x) , w ∈ (T (x))c(x) such that ⟨N (u, v, w), y − g(x)⟩ + η(g(x), y) * −intC(x), ∀y ∈ K.

(2.3)

This kind of problem was introduced and studied by Chang et al. [13]. (iii) If E is a Banach space and K is a nonempty convex subset of E, let Z = R, E ∗ = L(E, Z), b : K × K → R be a real valued mapping and M, S, T : K → E ∗ be the single valued mappings. For a given w∗ ∈ E ∗ , N (u, v, w) = N (T (x), S(x)) − M (x) + w∗ , η(x, y) = b(x, y) − b(x, x), C(x) = R+ for all x ∈ K, then (2.2) is equivalent to the problem of finding x ∈ K such that ⟨N (T (x), S(x)) − M (x) + w∗ , θ(y, x)⟩ + b(x, y) − b(x, x) ≥ 0, ∀y ∈ K. This problem was considered by Zhao et al. [26]. (iv) Let E is a real Hilbert space and K is a nonempty convex subset of E. Let Z = R, C(x) = R+ for all x ∈ K, η(x, y) = ϕ(y, x) − ϕ(x, x) and T (x) = ∅ for all x ∈ K, then (2.2) is equivalent to finding x ∈ K, u ∈ M (x) and v ∈ S(x) such that ⟨N (u, v), θ(y, x)⟩ + ϕ(x, y) − ϕ(x, x) ≥ 0, ∀y ∈ K.

(2.4)

(v) If N (u, v) = M (x) − S(x), where M, S are single valued mappings, then (2.4) collapses to finding x ∈ K such that ⟨M (x) − S(x), θ(y, x)⟩ + ϕ(x, y) − ϕ(x, x) ≥ 0, ∀y ∈ K. This kind of problem was introduced and studied by Ding [16]. (vi) If N (u, v) = u, then (2.4) reduces to the problem of finding x ∈ K, u ∈ M (x) such that ⟨u, θ(y, x)⟩ + ϕ(x, y) − ϕ(x, x) ≥ 0, ∀y ∈ K.

(2.5)

This kind of problem was studied by Ding [17]. (vii) If ϕ ≡ 0, then (2.5) reduces to the problem of finding x ∈ K and u ∈ M (x) such that ⟨u, θ(y, x)⟩ ∈ / −intC(x), ∀y ∈ K.

(2.6)

This problem was considered by Ding et al. [19]. If, in addition, M is a single valued mapping, then it is equivalent to finding x ∈ K, such that ⟨M (x), θ(y, x)⟩ ∈ / −intC(x), ∀y ∈ K, which was studied by Salahuddin [32]. (viii) Moreover, if θ(y, x) = y − x, then (2.6) reduces to finding x ∈ K such that ⟨u, y − x⟩ ∈ / −intC(x), ∀y ∈ K, which was studied by Lee et al. [27]. Clearly, generalized vector variational-like inequality problem in fuzzy environment includes many variational inequalities problems in the recent past.

246

Jiraprapa Munkong ET AL 242-255

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Definition 2.2 ([13]). A mapping f : K → Z is C(x)-convex if for any x1 , x2 ∈ K and t ∈ [0, 1], f (tx1 + (1 − t)x2 ) ≤C(x) tf (x1 ) + (1 − t)f (x2 ), that is, tf (x1 ) + (1 − t)f (x2 ) − f (tx1 + (1 − t)x2 ) ∈ C(x). Remark 2.3. (i) In the case of C(x) = C, for all x ∈ K where C is a convex in Z. Then Definition 2.2 reduces the usual definition of the vector convexity for the mapping f , i.e., f : K → Z is convex if for any x1 , x2 ∈ K and t ∈ [0, 1], f (tx1 + (1 − t)x2 ) ≤C tf (x1 ) + (1 − t)f (x2 ), that is tf (x1 ) + (1 − t)f (x2 ) − f (tx1 + (1 − t)x2 ) ∈ C. (ii) By taking Z = R and C = [0, +∞) in (i), Definition 2.2 reduces to the definition of the convex function, i.e., a mapping f : K → R is convex if for any x1 , x2 ∈ K and t ∈ [0, 1], tf (x1 ) + (1 − t)f (x2 ) − f (tx1 + (1 − t)x2 ) ≥ 0. Definition 2.4 ([36]). Let X, Y be two topological spaces, T : X → 2Y be a set-valued mapping. T is said to be: (i) Upper semicontinuous, if for each x ∈ X and each open set V in Y with T (x) ⊆ V , then there exists an open neighborhood U of x in X such that T (u) ⊆ V , for each u ∈ U . (ii) Closed, if for any net {xα } in X such that xα → x and any net {yα } in Y such that yα → y and yα ∈ T (xα ) for any α, we have y ∈ T (x), or equivalently, T is said to have a closed graph, if the graph of T, Gr(T ) = {(x, y) ∈ X × Y : y ∈ T (x)} is closed in X × Y . Lemma 2.5 ([33]). Let X, Y be two topological spaces and T : X → 2Y be an upper semicontinuous set-valued mapping with compact values. Suppose {xα } is a net in X such that xα → x0 . If yα ∈ T (xα ) for each α, then there exist y0 ∈ T (x0 ) and a subnet {yβ } of {yα } such that yβ → y0 . Lemma 2.6 (Aubin [6]). Let X and Y be two topological spaces. If T : X → 2Y is an upper semicontinuous set-valued mapping with closed values, then T is closed. Definition 2.7 ([25]). Let X, Y be topological spaces and T : X → F(Y ) be a fuzzy mapping. T is said to have fuzzy set-valued, if Tx (y) is upper semicontinuous on X × Y as a real ordinary function. Remark 2.8. If A is a closed subset of a topological space X, then the characteristic function XA of A, XA (x) = 1 if x ∈ A otherwise XA (x) = 0, is an upper semicontinuous function. Lemma 2.9 ([21]). Let K be a nonempty closed convex subset of a real Hausdorff topological space X, E be a nonempty closed convex subset of real Hausdorff topological space Y and a : X → [0, 1] be a lower semicontinuous function. Let T : K → F(E) be a fuzzy mapping with (T (x))a(x) ̸= ∅ for all x ∈ X and Te : K → 2E be a set-valued defined by Te(x) = (T (x))a(x) . If T is a closed set-valued mapping, then Te is a closed set-valued mapping. Definition 2.10 ([14, 30]). Let K be a convex subset of a topological vector space E, and Z be a topological vector space. Let C : K → 2Z be a set-valued mapping. For any given finite subset n n ∑ ∑ Ω = {x1 , x2 , ..., xn } of K, and any x = ti xi with ti ≥ 0 for i = 1, 2, ..., n and ti = 1, i=1

i=1

247

Jiraprapa Munkong ET AL 242-255

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(i) a single valued mapping h : K × K → Z is said to be vector O-diagonally convex in the second variable, if n ∑

ti h(x, xi ) ∈ / −intC(x),

i=1

(ii) a set-valued mapping h : K × K → 2Z is said to be generalized vector O-diagonally convex in the second variable if n ∑ ti u i ∈ / −intC(x), ∀ui ∈ h(x, xi ), i = 1, 2, ..., n. i=1

Definition 2.11 ([2]). Let K be a nonempty of convex subset of a vector space X. A mapping g : K → K is said to be affine if for all x1 , x2 , ..., xm ∈ K and λi ≥ 0 for all i = 1, 2, ..., m with n ∑ λi = 1 such that i=1 ( n ) n ∑ ∑ g λi xi = λi g(xi ). i=1

i=1

The following examples show that notion of affine and vector O-diagonally convex are independent functions. Example 2.12. Let K = Z = R. Define the function h : K × K → Z by { −1, if x ∈ Q, h(x, y) = 0, if x ∈ Qc , where Q and Qc are rational numbers and irrational numbers respectively. It is clear that h is affine but it is not vector O-diagonally convex in the second variable. Example 2.13. Let K = Z = R. Define the function h : K × K → Z by h(x, y) = y 2 . It is easy to see that h is vector O-diagonally convex in the second variable but h is not affine. From the above examples, it is noticed that Affine ; Vector O-diagonally convex in the second variable and Vector O-diagonally convex in the second variable ; Affine . In order to prove our main results we need the following. Definition 2.14 ([15]). Let K be a subset of a topological vector space X. A set-valued mapping T : K → 2X is called Knaster-Kuratowski-Mazurkiewieg mapping (KKM Mapping), if for each n ∪ nonempty finite subset {x1 , x2 , ..., xn } ⊆ K, we have Co{x1 , x2 , ..., xn } ⊆ T (xi ). i=1

Lemma 2.15 ([31, 34], Maximal Element Lemma). Let X be a nonempty convex subset of a Hausdorff topological vector space E. Let S : X → 2X be a set-valued mapping satisfying the following conditions: (i) for each x ∈ X, x ∈ / coS(x) and for each y ∈ X, S −1 (y) is open-valued in X; (ii) there exist a nonempty compact subset A of X and a nonempty compact convex subset B ⊆ X such that co(S(x)) ∩ B ̸= ∅, ∀x ∈ X \ A. Then there exists x0 ∈ X such that S(x0 ) = ∅.

248

Jiraprapa Munkong ET AL 242-255

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

3. Main results In this section, two versions of the existence results of generalized vector variational-like inequalities in fuzzy environment are established by employing the Lemma 2.15. Before stating the main results, we need the following preliminary facts. Lemma 3.1. Let X be a topological vector space and C ⊆ X be a cone. If 0 ∈ intC, then C = X. Proof. Let x ∈ X be an arbitrary element. Then there exists t > 0 such that tx ∈ intC, (note  0 ∈ intC). Since C is a cone, we observe that x = 1t (tx) ∈ C. Thus C = X. Lemma 3.2. Let Z be a topological vector space, K be a nonempty convex subset of a Hausdorff f, S, e Te : K → 2L(E,Z) be upper semicontinuous set-valued maptopological vector space E. Let M pings with nonempty compact values and induced by fuzzy mappings M, S, T : K → F(L(E, Z)), respectively, i.e., f(x) = (M (x)) e e M a(x), S(x) = (S(x))b(x), T (x) = (T (x))c(x), ∀x ∈ K. Let N : L(E, Z) × L(E, Z) × L(E, Z) → 2L(E,Z) and η : K × K → 2Z be two set-valued mappings. Let θ : K × K → E and g : K → K be two single valued mappings. Let P : K → 2K be a multifunction defined by P (x) = {y ∈ K : ⟨N (u, v, w), θ(y, g(x))⟩ + η(g(x), y) ⊆ −intC(x), f(x) = (M (x)) e e ∀u ∈ M a(x) , v ∈ S(x) = (S(x))b(x) , w ∈ T (x) = (T (x))c(x) }, ∀x ∈ K, where η and θ are affine in second and first variable respectively. Then P (x) is convex, for each x ∈ K. Proof.

Let x ∈ K be an arbitrary element. If y1 , y2 ∈ P (x) and λ ∈ (0, 1), then

⟨N (u, v, w), θ(yi , g(x))⟩ + η(g(x), yi ) ⊆ −intC(x), ∀i = 1, 2. Hence ⟨N (u, v, w), λθ(y1 , g(x))⟩ + λη(g(x), y1 ) ⊆ λ(−intC(x)),

(3.1)

⟨N (u, v, w), (1 − λ)θ(y2 , g(x))⟩ + (1 − λ)η(g(x), y2 ) ⊆ (1 − λ)(−intC(x)).

(3.2)

By (3.1), (3.2) and since intC(x) is convex cone, we have ⟨N (u, v, w), λθ(y1 , g(x)) + (1 − λ)θ(y2 , g(x))⟩ + λη(g(x), y1 ) + (1 − λ)η(g(x), y2 ) ⊆ −intC(x). Since θ is affine in the first variable and η is affine in the second variable, we have ⟨N (u, v, w), θ(λy1 + (1 − λ)y2 , g(x))+⟩ + η(g(x), λy1 + (1 − λ)y2 ) ⊆ −intC(x). So we get λy1 + (1 − λ)y2 ∈ P (x). This completes the proof.



Now, we are ready to state the first version of the existence result for GVVLIFE (2.1). Theorem 3.3. Let Z be a topological vector space, K be a nonempty convex subset of a Hausdorff f, S, e Te : K → 2L(E,Z) topological vector space E, and L(E, Z) be a topological vector space. Let M be upper semicontinuous set-valued mappings with nonempty compact values and induced by fuzzy mappings M, S, T : K → F(L(E, Z)), respectively, i.e., f(x) = (M (x)) e e M a(x) , S(x) = (S(x))b(x) , T (x) = (T (x))c(x) , ∀x ∈ K. Let N : L(E, Z) × L(E, Z) × L(E, Z) → 2L(E,Z) and η : K × K → 2Z be two set-valued mappings. Let θ : K × K → E and g : K → K be two single valued mappings. If the following conditions are satisfied:

249

Jiraprapa Munkong ET AL 242-255

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(ia ) η and θ are affine in second and first variable respectively, with η(g(x), x) = 0 and θ(x, g(x)) = 0 for all x ∈ K; (iia ) For each y ∈ K, the set-valued mapping Gy (u, v, w, x) = ⟨N (u, v, w), θ(y, g(x))⟩ + η(g(x), y) ∩ Z\(−intC(x)) is upper semicontinuous with compact value; (iiia ) C : K → 2Z is a set-valued mapping with convex values such that C(x) ̸= Z for all x ∈ K; (iva ) there exist a nonempty compact subset A of K and a nonempty compact convex subset B of K such that for each x ∈ K\A, ∃¯ y ∈ B such that ⟨N (u, v, w), θ(¯ y , g(x))⟩ + η(g(x), y¯) ⊆ −intC(x), f(x) = (M (x)) e e ∀u ∈ M a(x) , v ∈ S(x) = (S(x))b(x) , w ∈ T (x) = (T (x))c(x) ; then the solution set of GVVLIFE (2.1) is a nonempty compact subset of A. Proof.

Let P : K → 2K be a set-valued mapping defined by

P (x) = {y ∈ K : ⟨N (u, v, w), θ(y, g(x))⟩ + η(g(x), y) ⊆ −intC(x), f(x) = (M (x)) e e ∀u ∈ M a(x) , v ∈ S(x) = (S(x))b(x) , w ∈ T (x) = (T (x))c(x) } ∀x ∈ K. Firstly, we wish to show that for all x ∈ K, x ∈ / P (x). Suppose to the contrary, there is x ˆ ∈ K such that x ˆ ∈ P (ˆ x). Then {0} = ⟨N (u, v, w), θ(ˆ x, g(ˆ x))⟩ + η(g(ˆ x), x ˆ) ⊆ −intC(ˆ x). We get 0 ∈ intC(ˆ x), and then Lemma 3.1 allows C(ˆ x) = Z which is contradicted by (iiia ). Hence for each x ∈ K, x ∈ / P (x). By Lemma 3.2, P (x) is convex, that is P (x) = coP (x). Thus x ∈ / coP (x) for all x ∈ K. Next, we intend to prove that for each y ∈ K, P −1 (y) is an open set. To prove this c goal, it is sufficient to prove that the complement (P −1 (y)) of P −1 (y) is closed in K. It is not hard to verity that P −1 (y) = {x ∈ K : ⟨N (u, v, w), θ(y, g(x))⟩ + η(g(x), y) ⊆ −intC(x), f(x) = (M (x)) e e ∀u ∈ M a(x) , v ∈ S(x) = (S(x))b(x) , w ∈ T (x) = (T (x))c(x) }, and c

(P −1 (y)) = {x ∈ K : ⟨N (u, v, w), θ(y, g(x))⟩ + η(g(x), y) ∩ Z\(−intC(x)) ̸= ∅, f(x) = (M (x)) e e ∃u ∈ M a(x) , v ∈ S(x) = (S(x))b(x) , w ∈ T (x) = (T (x))c(x) }. Let {xα } be a net in (P −1 (y))c such that xα → x∗ . We wish to show that x∗ ∈ (P −1 (y))c . Since f(xα ) = (M (xα )) e {xα } ⊆ (P −1 (y))c , there exist uα ∈ M a(xα ) , vα ∈ S(xα ) = (S(xα ))b(xα ) , and wα ∈ Te(xα ) = (T (xα )) such that c(xα )

⟨N (uα , vα , wα ), θ(y, g(xα ))⟩ + η(g(xα ), y) ∩ Z\(−intC(xα )) ̸= ∅. Thus, we can let a net {zα } ⊆ ⟨N (uα , vα , wα ), θ(y, g(xα ))⟩ + η(g(xα ), y) ∩ Z\(−intC(xα )). f, S, e Te : K → 2L(E,Z) are upper semicontinuous mappings with compact values. Thus, Notice that M it follows from Lemma 2.5 that {uα }, {vα }, {wα } have convergent subnets, {uαβ }, {vαβ }, {wαβ }, f(x∗ ), v ∗ ∈ S(x e ∗ ) and w∗ ∈ Te(x∗ ). Since with limits say u∗ , v ∗ , w∗ , respectively, and u∗ ∈ M

250

Jiraprapa Munkong ET AL 242-255

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Gy (·, ·, ·, ·) is upper semicontinuous with compact values, it can be applied by Lemma 2.5 to produce a subnet {zαβ } of {zα } such that zαβ → z ∗ and z ∗ ∈ Gy (u∗ , v ∗ , w∗ , x∗ ) = ⟨N (u∗ , v ∗ , w∗ ), θ(y, g(x∗ ))⟩ + η(g(x∗ ), y) ∩ Z\(−intC(x∗ )). This shows that x∗ ∈ (P −1 (y))c . Therefore (P −1 (y))c contains all its limit points and then it is closed in K. Thus P −1 (y) is an open for each y ∈ K. The desired result is proved. Next, by employing Lemma 2.15 and condition (iva ) to ensure the existence of (GVVLIFE) (2.1). By condition (iva ), we assert that for each x ∈ K\A there exists a nonempty compact convex f(x) = subset B of K such that y¯ ∈ B and ⟨N (u, v, w), θ(¯ y , g(x))⟩ + η(g(x), y¯) ⊆ −intC(x), ∀u ∈ M e e (M (x))a(x) , v ∈ S(x) = (S(x))b(x) , w ∈ T (x) = (T (x))c(x) . This means that y¯ ∈ B ∩ P (x). We know from Lemma 3.2 that P (x) is convex, so we have that y¯ ∈ coP (x). This implies that y¯ ∈ coP (x) ∩ B and then coP (x) ∩ B ̸= ∅. This shows that P satisfies all the conditions of Lemma 2.15, so there f(¯ exists x ¯ ∈ K such that P (¯ x) = ∅, this means there exists x ¯ ∈ K, u ∈ M x) = (M (¯ x))a(¯x) , v ∈ e x) = (S(¯ S(¯ x)) , w ∈ Te(¯ x) = (T (¯ x)) such that b(¯ x)

c(¯ x)

⟨N (u, v, w), θ(y, g(¯ x))⟩ + η(g(¯ x), y) * −intC(¯ x), ∀y ∈ K. Therefore x ¯ ∈ Ω where Ω is the solution set of the generalized vector variational-like inequality in fuzzy environment (GVVLIFE) (2.1). Thus, Ω ̸= ∅. To show that Ω is a subset of compact set A. Let x ∈ Ω. Assume that x ∈ / A, by condition (iva ), there exists y¯ ∈ B such that ⟨N (u, v, w), θ(¯ y , g(x))⟩ + η(g(x), y¯) ⊆ −intC(x), f(x) = (M (x)) e e ∀u ∈ M a(x) , v ∈ S(x) = (S(x))b(x) , w ∈ T (x) = (T (x))c(x) , which means that x is not a solution of the problem, that is x ∈ / Ω. This is a contradiction. Hence x ∈ A and we obtain that Ω ⊆ A. Finally, we show that Ω is a compact subset of A. One can observe that Ω = (P −1 (y))c . In fact, Ω = {x ∈ K : ⟨N (u, v, w), θ(y, g(x))⟩ + η(g(x), y) * −intC(¯ x), f(x) = (M (x)) e e ∃u ∈ M a(x) , v ∈ S(x) = (S(x))b(x) , w ∈ T (x) = (T (x))c(x) } = {x ∈ K : ⟨N (u, v, w), θ(y, g(x))⟩ + η(g(x), y) ∩ Z\(−intC(x)) ̸= ∅, f(x) = (M (x)) e e ∃u ∈ M a(x) , v ∈ S(x) = (S(x))b(x) , w ∈ T (x) = (T (x))c(x) } = (P −1 (y))c . Since we have already proved that (P −1 (y))c is closed in K, so we can conclude that Ω is a closed in K. Therefore Ω is a compact subset of A. This completes the proof of Theorem 3.3.  Remark 3.4. It can be observed that Theorem 3.3 is as an alternative version of Theorem 3.1 in [13] by replacing vector O-diagonally convexity with the affineness of η. Moreover, some assumptions are not necessary given in Theorem 3.3, for instance, continuity of θ, continuity and affineness of g. Next, we will present the second version of the existence result of GVVLIFE (2.1). Before doing that we will provide the following lemma in order to be utilized in proving for the next version of the existence result. Lemma 3.5. Let Z be a topological vector space, K be a nonempty convex subset of a Hausdorff f, S, e Te : K → 2L(E,Z) topological vector space E, and L(E, Z) be a topological vector space. Let M be upper semicontinuous set-valued mappings with nonempty compact values and induced by fuzzy mappings M, S, T : K → F(L(E, Z)), respectively, i.e., f(x) = (M (x)) e e M a(x) , S(x) = (S(x))b(x) , T (x) = (T (x))c(x) , ∀x ∈ K.

251

Jiraprapa Munkong ET AL 242-255

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Let N : L(E, Z)×L(E, Z)×L(E, Z) → 2L(E,Z) and η : K ×K → 2Z be two set-valued mappings. Let θ : K × K → E and g : K → K be two single valued mappings and P : K → 2K be a multifunction defined by P (x) = {y ∈ K : ⟨N (u, v, w), θ(y, g(x))⟩ + η(g(x), y) ⊆ −intC(x), f(x) = (M (x)) e e ∀u ∈ M a(x) , v ∈ S(x) = (S(x))b(x) , w ∈ T (x) = (T (x))c(x) } ∀x ∈ K. If the following conditions are satisfied: (ib ) η is generalized vector O-diagonally convex in the second argument; (iib ) θ is affine in the first variable with θ(x, g(x)) = 0, ∀x ∈ K. Then for all x ∈ K, x ∈ / coP (x). Proof. We shall show that x ∈ / coP (x) for all x ∈ K. Suppose to the contrary, there exists x ¯ ∈ K such that x ¯ ∈ coP (¯ x). Then there exists a finite set {y1 , y2 , · · · , yn } ⊆ P (¯ x) such that x ¯ ∈ co{y1 , y2 , · · · , yn }, hence we have ⟨N (u, v, w), θ(yi , g(¯ x))⟩ + η(g(¯ x), yi ) ⊆ −intC(¯ x), i = 1, 2, · · · , n f(¯ e x) = (S(¯ ∀u ∈ M x) = (M (¯ x))a(¯x) , v ∈ S(¯ x))b(¯x) , w ∈ Te(x) = (T (¯ x))c(¯x) . Since intC(¯ x) is a convex set and θ is affine in the first variable, for x ¯ = ti ≥ 0, i = 1, 2, · · · , n with ⟨

(

N (u, v, w), θ

n ∑

ti yi ∈ K, where

i=1

ti = 1, we have

i=1 n ∑

n ∑

)⟩

ti yi , g(¯ x)

+

i=1

= ⟨N (u, v, w), θ(¯ x, g(¯ x))⟩ +

n ∑

ti η(g(¯ x), yi )

i=1 n ∑

ti η(g(¯ x), yi ) ⊆ −intC(¯ x).

i=1

Since θ(¯ x, g(¯ x)) = 0 by condition (iib ), we have n ∑

ti η(g(¯ x), yi ) ⊆ −intC(¯ x),

i=1

that is,

n ∑

ti ui ∈ −intC(¯ x),

∀ui ∈ η(g(¯ x), yi ), i = 1, 2, · · · , n,

i=1

which contradicts condition (ib ). Therefore x ∈ / coP (x) for all x ∈ K.



The following result is the second alternative version of Theorem 3.3 by applying the notion of O-diagonally convexity and uppersemicontinuity of the set-valued mapping G. Theorem 3.6. Let Z be a topological vector space, K be a nonempty convex subset of a Hausdorff f, S, e Te : K → 2L(E,Z) topological vector space E, and L(E, Z) be a topological vector space. Let M be upper semicontinuous set-valued mappings with nonempty compact values and induced by fuzzy mappings M, S, T : K → F(L(E, Z)), respectively, i.e., f(x) = (M (x)) e e M a(x) , S(x) = (S(x))b(x) , T (x) = (T (x))c(x) , ∀x ∈ K. Let N : L(E, Z) × L(E, Z) × L(E, Z) → 2L(E,Z) and η : K × K → 2Z be two set-valued mappings. Let θ : K × K → E and g : K → K be two single valued mappings. If the following conditions are satisfied:

252

Jiraprapa Munkong ET AL 242-255

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(ic ) η is generalized vector O-diagonally convex in the second argument; (iic ) θ is affine in the first variable with θ(x, g(x)) = 0, ∀x ∈ K; (iiic ) For each y ∈ K, the set-valued mapping Gy (u, v, w, x) = ⟨N (u, v, w), θ(y, g(x))⟩ + η(g(x), y) ∩ Z\(−intC(x)) is upper semicontinuous with compact value; (ivc ) C : K → 2Z is a set-valued mapping with convex values; (vc ) there exist a nonempty compact subset A of K and a nonempty compact convex subset B of K such that for each x ∈ K\A, ∃¯ y ∈ B such that ⟨N (u, v, w), θ(¯ y , g(x))⟩ + η(g(x), y¯) ⊆ −intC(x), f(x) = (M (x)) e e ∀u ∈ M a(x) , v ∈ S(x) = (S(x))b(x) , w ∈ T (x) = (T (x))c(x) ; then the solution set of GVVLIFE (2.1) is a nonempty compact subset of A. Proof.

Let P : K → 2K be a set-valued mapping defined by

P (x) = {y ∈ K : ⟨N (u, v, w), θ(y, g(x))⟩ + η(g(x), y) ⊆ −intC(x), f(x) = (M (x)) e e ∀u ∈ M a(x) , v ∈ S(x) = (S(x))b(x) , w ∈ T (x) = (T (x))c(x) }

∀x ∈ K.

From Lemma 3.5, we obtain that x ∈ / coP (x) for all x ∈ K. To show the remaining of the proof, one can show step by step based on the proof in Theorem 3.3. and then the desired results are obtained. 

4. Conclusion In this paper two versions of the existence theorems of generalized vector variational-like inequalities in fuzzy environment are proved by using two different notions, the first one by using affineness and the second one by using the notion of vector O-diagonally convexity. Moreover, an example is established to illustrate the main problem. The results presented in the paper can be viewed as alternative versions of [13] by providing a new method of proving the main theorems and an improvement of corresponding result given in Xiao et al. [36], Zhao et al. [26], Ding et al. [16, 17, 19], Salahuddin [32], Lee et al. [27, 28] and several authors.

Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper. Acknowledgements The third author would like to thank Naresuan University and The Thailand Research Fund for financial support. Moreover, J. Munkong is also supported by Naresuan University and The Royal Golden Jubilee Program under Grant PHD/0219/2556, Thailand. References [1] M. K. Ahmad, S. S. Irfan, On generalized nonlinear variational-like inequality problems, Appl. Math. Lett. 19 (2006) 294-297. [2] S. A. Al-Mezel, F. R. M. Al-Solamy, Q. H. Ansari, Fixed Point Theory, Variational Analysis, and Optimization, CRC Press. (2014).

253

Jiraprapa Munkong ET AL 242-255

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[3] M. K. Ahmad, Salahuddin, R. U. Verma, Existence theorem for fuzzy mixed vector F -variational inequalities, Adv. Nonlinear Var. Inequal. 16 (1) (2013) 53-59. [4] G. A. Anastassiou, Salahuddin, Weakly set-valued generalized vector variational inequalities, J. Comput. Anal. Appl. 15 (4) (2013) 622-632. [5] Q. H. Ansari, J. C. Yao, On nondifferentiable and nonconvex vector optimization problems, J. Optim. Theory. Appl. 106(3) (2000) 487-500. [6] J. P. Aubin, Applied Functional Analysis, John Wiley and Sons, 2000. [7] J. P. Aubin, I. Ekeland, Applied Nonlinear Analysis, John Wiley and Sons, Inc, New York, 1984. [8] F. E. Browder, Existence and approximation of solutions of nonlinear viational inequalities, Department of Mathematics, University of Chicago, 13(1966) 1080-1086. [9] L. A. Zadeh, Fuzzy sets, Inf. Control 8 (1965) 338-353. [10] S. S. Chang, Y. G. Zhu, On variational inequalities for fuzzy mappings, Fuzzy Sets Syst. 32 (1989) 359-367. [11] S. S. Chang, G. M. Lee, B. S. Lee, Vector quasi variational inequalities for fuzzy mappings (II), Fuzzy Sets Syst. 102 (1999) 333-344. [12] S. S. Chang, Salahuddin, Existence theorems for vector quasi variational-like inequalities for fuzzy mappings, Fuzzy Sets Syst. 233 (2013) 89-95. [13] S. S. Chang, Salahuddin, M. K. Ahmad, X. R. Wang, Generalized vector variational-like inequalities in fuzzy environment, Fuzzy Sets Syst. 265 (2015) 110-120. [14] Y. Chiang, O. Chadli, J. C. Yao, Generalized vector equilibrium problems with trifunctions, J. Glob. Optim. 30 (2004) 135-154. [15] R. D. Mauldin, The Scottish Book: Mathematics from The Scottish Caf´e, with Selected Problems from The New Scottish Book, Birkh¨auser, 2015. [16] X. P. Ding, Generalal gorithm for nonlinear variational-like inequalities in Banach spaces, J. Pure Appl. Math. 29 (1998) 109-120. [17] X. P. Ding, E. Tarafdar, Generalized variational-like inequalities with pseudo-monotone setvalued mappings, Arch Math. 74 (2000) 302-313. [18] X. P. Ding, M. K. Ahmad, Salahuddin, Fuzzy generalized vector variational inequalities and complementarity problem, Nonlinear Funct. Anal. Appl. 13 (2) (2008) 253-263. [19] X. P. Ding, W. K. Kim, K. K. Tan, A minimax inequality with applcations to existence of equilibrium point and fixed point theorems. Colloquium Mathematicum 63(2) (1992) 233-247. [20] X. P. Ding, K. K. Tan, A selection theorem and its applications, Bull. Aust. Math. Soc. 46 (1992) 205-212. [21] M. F. Khan, S. Husain, Salahuddin, A fuzzy extension of generalized multivalued η-mixed vector variational-like inequalities on locally convex Hausdorff topological vector spaces, Bull. Calcutta Math. Soc. 100 (1) (2008) 27-36. [22] S. Heilpern, Fuzzy mappings and fixed point theorem, J. Math. Anal. Appl. 83 (1981) 566-569.

254

Jiraprapa Munkong ET AL 242-255

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[23] D. Kinderlehrer, G. Stampacchia, An Introduction to Variational Inequalities and Their Applications, in: Pure and Applied Mathematics, vol. 88. Academic Press, New York, 1980. [24] H. Y. Lan, R. U. Verma, Iterative algorithms for nonlinear fuzzy variational inclusions with (A, η)-accretive mappings in Banachspaces, Adv. Nonlinear Var. Inequal. 11 (1) (2008) 15-30. [25] G. M. Lee, D. S. Kim, B. S. Lee, Vector variational inequality for fuzzy mappings, Nonlinear Anal. Forum 4 (1999) 119-129. [26] Y. L. Zhao, Z. Q. Xia, Z. Q. Liu, S. M. Kang, Existence of solutions for generalized nonlinear mixed variational-like inequalities in Banach spaces, Int. J. Math. Math. Sci. (2006) 115, Article ID-36278. [27] B. S. Lee, S. J. Lee, Vector variational type inequalities for set-valued mappings, Appl. Math. Lett. 13 (2000) 57-62. [28] B. S. Lee, G. M. Lee, D. S. Kim, Generalized vector valued variational inequalities and fuzzy extensions, J. Korean Math. Soc. 33 (1996) 609-624. [29] Z. Liu, J. S. Ume, S. M. Kang, Generalized nonlinear variational-like inequalities in reflexive Banach spaces, J. Optim. Theory. Appl. 126(1) (2005) 157-174. [30] Q. M. Liu, L. Y. Fan, G. H. Wang, Generalized vector quasi equilibrium problems with setvalued mappings, Appl. Math. Lett. 21 (2008) 946-950. [31] S. Park, B. S. Lee, G. M. Lee, A general vector valued variational inequality and its fuzzy extension, Int. J. Math. Math. Sci. 21 (1998) 637-642. [32] Salahuddin, Some aspects of variational inequalities, Ph.D. Thesis, Department of Mathematics, Aligarh Muslim University, Aligarh, India, 2000. [33] C. H. Su, V. M. Sehgal, Some fixed point theorems for condensing multifunctions in locally convex spaces, Proc. Natl. Acad. Sci. USA 50 (1975) 150-154. [34] G. X. Z. Yuan, KKM Theory and Applications in Nonlinear Analysis, Marcel Dekker, Inc., New York, Basel, 1999. [35] R. U. Verma, Salahuddin, A common fixed point theorem for fuzzy mappings, Trans. Math. Prog. Appl. 1 (1) (2013) 59-68. [36] G. Xiao, Zhiqiang Fan, Riaogang Qi, Existence results for generalized nonlinear vector variational-like inequalities with set-valued mapping, Appl. Math. Lett. 23 (2010) 44-47. [37] H. J. Zimmermann, Fuzzy set Theory and Its Applications, Kluwer Academic Plublishers, Dordrecht, 1988.

255

Jiraprapa Munkong ET AL 242-255

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

STRONG DIFFERENTIAL SUPERORDINATION AND SANDWICH THEOREM OBTAINED WITH SOME NEW INTEGRAL OPERATORS GEORGIA IRINA OROS

Abstract. In this paper we study certain strong differential superordinations, obtained by using a new integral operator introduced in [13].

Keywords. Analytic function, univalent function, convex function, strong differential superordination, best dominant, best subordinant. 2000 Mathematical Subject Classification: 30C80, 30C20, 30C45, 34C40. 1. Introduction and preliminaries The concept of differential subordination was introduced in [2], [3] and developed in [4], by S.S. Miller and P.T. Mocanu. The concept of differential superordination was introduced in [5], like a dual problem of the differential superordination by S.S. Miller and P.T. Mocanu. The concept of strong differential subordination was introduced in [1] by J.A. Antonino and S. Romaguera and developed in [7], [11], [12]. The concept of strong differential superordination was introduced in [8], like a dual concept of the strong differential subordination and developed in [9] and [10]. In [11] the author defines the following classes: Let H(U × U ) denote the class of analytic function in U × U , U = {z ∈ C : |z| < 1}, U = {z ∈ C : |z| ≤ 1}, ∂U = {z ∈ C : |z| = 1}. For a ∈ C and n ∈ N∗ , let Hζ[a, n] = {f (z, ζ) ∈ H(U × U ) : f (z, ζ)=a + an (ζ)z n + . . . +an+1 (ζ)z n+1 + . . .} with z ∈ U , ζ ∈ U , ak (ζ) holomorphic functions in U , k ≥ n, Aζn = {f (z, ζ) ∈ H(U × U ) : f (z, ζ) = z + an+1 (ζ)z n+1 + an+2 (ζ)z n+2 + . . .} with z ∈ U , ζ ∈ U , ak (ζ) holomorphic functions in U , k ≥ n + 1 so Aζ1 = Aζ, Hζu (U ) = {f (z, ζ) ∈ Hζ[a, n](U × U ) : f (z, ζ) univalent in U, for all ζ∈ U }, Sζ = {f (z, ζ) ∈ Aζ, f (z, ζ) univalent in U, for all ζ ∈ U }, denote the class of univalent functions in U × U ,   zf 0 (z, ζ) S ∗ ζ = f (z, ζ) ∈ Aζ : Re > 0, z ∈ U, for all ζ ∈ U , f (z, ζ) denote the class of normalized starlike functions in U × U ,   00   zf (z, ζ) Kζ = f (z, ζ) ∈ Aζ : Re + 1 > 0, z ∈ U, for all ζ ∈ U , f 0 (z, ζ) denote the class of normalized convex functions in U × U . For r ∈ N, let A(r)ζ denote the subclass of the functions f (z, ζ) ∈ H(U × U ) of the form r

f (z, ζ) = z +

∞ X

ak (ζ)z k , r ∈ N, z ∈ U, ζ ∈ U and set A(1)ζ = Aζ.

k=r+1

To prove our main results, we need the following definitions and lemmas: Definition 1.1. [9], [11] Let f (z, ζ) and F (z, ζ) be member of H(U × U ). The function f (z, ζ) is said to be strongly subordinated to F (z, ζ), or F (z, ζ) is said to be strongly superordinated to f (z, ζ), if there exists a function w analytic in U with w(0) = 0 and |w(z)| < 1, such that f (z, ζ) = F (w(z), ζ). In such a case we write f (z, ζ) ≺≺ F (z, ζ). If F (z, ζ) is univalent then f (z, ζ) ≺≺ F (z, ζ) if and only if f (0, ζ) = F (0, ζ) and f (U × U ) ⊂ F (U × U ). Remark 1.2. If f (z, ζ) ≡ f (z) and F (z, ζ) ≡ F (z), then the strong differential subordination or strong differential superordination becomes the usual notion of differential subordination or differential superordination. 1

256

GEORGIA IRINA OROS 256-261

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Definition 1.3. [5], [11] We denote by Qζ the set of functions q(z, ζ) that are analytic and injective as functions of z on U \ E(q(z, ζ)), where   E(q(z, ζ)) = ξ ∈ ∂U : lim q(z, ζ) = ∞ z→ξ

0

and are such that q (ξ, ζ) 6= 0, for ξ ∈ ∂U \ E(q(z, ζ)). The class of Qζ for which q(0, ζ) = a, is denoted by Qζ (a). We mention that all the derivatives which appear in this paper are considered with respect to variable z. Let ψ : C3 × U × U → C and let h(z, ζ) be univalent in U , for all ζ ∈ U . If p(z, ζ) is analytic in U × U and satisfies the (second-order) strong differential subordination (1.1)

ψ(p(z, ζ), zp0 (z, ζ), z 2 p00 (z, ζ); z, ζ) ≺≺ h(z, ζ), z ∈ U, ζ ∈ U

then p(z, ζ) is called a solution of the strong differential subordination. The univalent function q(z, ζ) is called a dominant of the solutions of the strong differential subordination or simply a dominant, if p(z, ζ) ≺≺ q(z, ζ) for all p(z, ζ) satisfying (1.1). A dominant qe(z, ζ) that satisfies qe(z, ζ) ≺≺ q(z, ζ) for all dominants q(z, ζ) of (1.1) is said to be the best dominant of (1.1). (Note that the best dominant is unique up to a rotation of U ). Let ϕ : C3 × U × U → C and let h(z, ζ) be analytic in U × U . If p(z, ζ) and ϕ(p(z, ζ), zp0 (z, ζ), z 2 p00 (z, ζ); z, ζ) are univalent in U , for all ζ ∈ U and satisfy the (second-order) strong differential superordination h(z, ζ) ≺≺ ϕ(p(z, ζ), zp0 (z, ζ), z 2 p00 (z, ζ); z, ζ)

(1.2)

then p(z, ζ) is called a solution of the strong differential superordination. An analytic function q(z, ζ) is called a subordinant of the solutions of the differential superordination, or more simply a subordinant, if q(z, ζ) ≺≺ p(z, ζ) for all p(z, ζ) satisfying (1.2). A univalent subordinant qe(z, ζ) that satisfies q(z, ζ) ≺≺ qe(z, ζ) for all subordinants of (1.2) is said to be the best subordinant. (Note that the best subordinant is unique up to a rotation of U ). We rewrite the integral operators defined in [13] using the classes we have shown earlier. Definition 1.4. [13] For f (z, ζ) ∈ Aζn , n ∈ N∗ , m ∈ N, γ ∈ C, let Lγ be the integral operator given by Lγ : Aζn → Aζn L0γ f (z, ζ) = f (z, ζ), . . . Z γ + 1 z m−1 Lm f (z, ζ) = Lγ f (z, ζ)tγ−1 dt. γ zγ 0 By using Definition 1.4, we can prove the following properties for this integral operator: For f (z, ζ) ∈ Aζn , n ∈ N∗ , m ∈ N, γ ∈ C, we have ∞ X (γ + 1)m (1.3) Lm ak (ζ)z k , z ∈ U, ζ ∈ U and γ f (z, ζ) = z + (γ + k)m k=n+1

(1.4)

0 m−1 z[Lm f (z, ζ) − γLm γ f (z, ζ)]z = (γ + 1)Lγ λ f (z, ζ), z ∈ U, ζ ∈ U .

Definition 1.5. [13] For p ∈ N, f (z, ζ) ∈ A(p)ζ, let H be the integral operator given by H : A(p)ζ → A(p)ζ H 0 f (z, ζ) = f (z, ζ), . . . Z p + 1 z m−1 m H f (z, ζ) = H f (t, ζ)dt, z ∈ U, ζ ∈ U . z 0 From Definition 1.5 we have (1.5)

∞ X (p + 1)m H f (z, ζ) = z + ak (ζ)z k , and (p + k)m m

p

k=p+1

(1.6)

z[H m f (z, ζ)]0z = (p + 1)H m−1 f (z, ζ) − H m f (z, ζ), z ∈ U, ζ ∈ U .

We rewrite the following lemmas for the classes seen earlier in this paper. The proofs are similar to those given for the original lemmas which can be found in [4] and [5]. Lemma A. [5, Corollary 6.1] Let h1 (z, ζ) and h2 (z, ζ) be convex in U , for all ζ ∈ U Z, with h1 (0, ζ) = h2 (0, ζ) = a. z α Let α 6= 0, with Re α ≥ 0, and let the functions qi (z, ζ) be defined by qi (z, ζ) = α hi (t, ζ)tα−1 dt for i = 1, 2. z 0 zp0 (z, ζ) is univalent in U , for all ζ ∈ U , then If p(z, ζ) ∈ H[a, 1] ∩ Qζ and p(z, ζ) + p(z, ζ) h1 (z, ζ) ≺≺ p(z, ζ) +

zp0 (z, ζ) ≺≺ h2 (z, ζ) p(z, ζ)

257

GEORGIA IRINA OROS 256-261

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

implies q1 (z, ζ) ≺≺ p(z, ζ) ≺≺ q2 (z, ζ). The functions q1 (z, ζ) and q2 (z, ζ) are convex and they are respectively the best subordinant and best dominant. Lemma B. [6, Theorem 2] Let h1 (z, ζ) and h2 (z, ζ) be convex in U , for all ζ ∈ U , with h1 (0, ζ) = h2 (0, ζ) = a and θ, ϕ ∈ H(D), where D ⊂ C is a domain. Let p(z, ζ) ∈ H[a, 1] ∩ Qζ and suppose that θ(p(z, ζ)) + zp0 (z, ζ)φ(p(z, ζ)) is univalent in U , for all ζ ∈ U . If the differential equations θ(qi (z, ζ)) + zqi0 (z, ζ)φ(qi (z, ζ)) = hi (z, ζ), have the univalent solutions qi (z, ζ) that satisfy qi (0, ζ) = a, qi (U × U ) ⊂ D, and θ(qi (z, ζ)) ≺≺ hi (z, ζ), for i = 1, 2, then h1 (z, ζ) ≺≺ θ(p(z, ζ)) + zp0 (z, ζ)φ(p(z, ζ)) ≺≺ h2 (z, ζ) implies q1 (z, ζ) ≺≺ p(z, ζ) ≺≺ q2 (z, ζ), z ∈ U, ζ ∈ U . The functions q1 (z, ζ) and q2 (z, ζ) are the best subordinant and the best dominant respectively. Lemma C. [6, Corollary 9.2] Let h1 (z, ζ) and h2 (z, ζ) be starlike in U , for all ζ ∈ U and f (z, ζ) be univalent in U , for all ζ ∈ U , with h1 (0, ζ) = h2 (0, ζ) = f (0, ζ) = 0. If h1 (z, ζ) ≺≺ f (z, ζ) ≺≺ h2 (z, ζ) then Z z Z z Z z h1 (t, ζ) f (t, ζ) h2 (t, ζ) dt ≺≺ dt ≺≺ dt t t t 0 0 0 when the middle integral is univalent. 2. Main results 2z 2zζ Theorem 2.1. Let h1 (z, ζ) = and h2 (z, ζ) = be convex in U , for all ζ ∈ U , with h1 (0, ζ) = ζ −z 1−z Z z α 2t α−1 2αζ h2 (0, ζ) = 0. Let α 6= 0, with Re α ≥ 0 and let the functions q1 (z, ζ) = α t dt = −2 + α · σ1 (z, ζ), z 0 ζ −t z where σ1 (z, ζ) given by Z z α−1 t (2.1) σ1 (z, ζ) = dt 0 ζ −t Z z α 2αζ 2ζt α−1 and q2 (z, ζ) = α t dt = −2ζ + α σ2 (z, ζ), where σ2 (z, ζ) given by z 0 1−t z Z z α−1 t dt. (2.2) σ2 (z, ζ) = 0 1−t 0 00 0 [Lm z[Lm [Lm γ f (z, ζ)] − 1 γ f (z, ζ)] γ f (z, ζ)] − 1 ∈ H[0, 1] ∩ Q and + − n + 1 is univalent in U , for all ζ 0 z n−1 z n−1 [Lm γ f (z, ζ)] − 1 ζ ∈ U , then

If

(2.3)

0 00 [Lm zLm 2z 2zζ γ f (z, ζ)] − 1 γ f (z, ζ)] ≺≺ + − n + 1 ≺≺ 0−1 ζ −z z n−1 [Lm f (z, ζ)] 1 −z γ

implies 0 [Lm 2αζ 2αζ γ f (z, ζ)] − 1 σ (z, ζ) ≺≺ ≺≺ −2ζ + α σ2 (z, ζ), 1 zα z n−1 z where σ1 (z, ζ) is given by (2.1) and σ2 (z, ζ) is given by (2.2). The functions q1 (z, ζ) and q2 (z, ζ) are convex and they are respectively the best subordinant and the best dominant.

−2 +

Proof. We let (2.4)

p(z, ζ) =

0 [Lm γ f (z, ζ)] − 1 , z ∈ U, ζ ∈ U . z n−1

Using (1.3) ˆın (2.4), we have 1+ p(z, ζ) =

∞ X (γ + 1)m ak (ζ)kz k−1 − 1 (γ + k)m

k=n+1

=

z n−1

∞ X (γ + 1)m ak (ζ)kz k−n . (γ + k)m

k=n+1

Since p(0, ζ) = 0, we obtain p(z, ζ) ∈ H[0, 1]ζ ∩ Qζ . Differentiating (2.4) and after a short calculus we obtain (2.5)

p(z, ζ) +

0 00 [Lm z[Lm zp0 (z, ζ) γ f (z, ζ)] − 1 γ f (z, ζ)] = + − n + 1. 0 p(z, ζ) z n−1 [Lm γ f (z, ζ)] − 1

258

GEORGIA IRINA OROS 256-261

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Using (2.5) in (2.3), we obtain 2z zp0 (z, ζ) 2zζ ≺≺ p(z, ζ) + ≺≺ , z ∈ U, ζ ∈ U . ζ −z p(z, ζ) 1−z

(2.6) Using Lemma A, we have

0 [Lm 2αζ 2αζ γ f (z, ζ)] − 1 σ (z, ζ) ≺≺ ≺≺ −2ζ + α σ2 (z, ζ), 1 α n−1 z z z where σ1 (z, ζ) is given by (2.1) and σ2 (z, ζ) is given by (2.2). The functions 2αζ 2αζ q1 (z, ζ) = −2 + α σ1 (z, ζ) and q2 (z, ζ) = −2ζ + α σ2 (z, ζ) z z are convex and they are respectively the best subordinant and the best dominant. P∞ Example 2.2. Let α = 2, γ = 2, m = 1, n = 2, f (z, ζ) = z + k=3 ak (ζ)z k , # Z z" ∞ ∞ X 3 3 X 1 k L2 f (z, ζ) = 2 t+ ak (ζ)t tdt = z + ak (ζ)z k , z 0 k+2

−2 +

k=3

p(z, ζ) =

[L12 f (z, ζ)]0



k=3

−1

z Z z

=

3k k+2

∞ X

ak (ζ)z k−2 ,

k=3

 Z z 2 2t 2ζ 2 2 4ζ q1 (z, ζ) = 2 −2t − 2ζ + tdt = 2 dt = −2 − − 4ζ 2 ln(ζ − z), z 0 ζ −t z 0 ζ −t z  Z z Z z 2ζt2 2 2ζ 4ζ 4ζ 2 dt = 2 −2ζt − 2ζ + dt = −2ζ − − 2 ln(1 − z). q2 (z, ζ) = 2 z 0 1−t z 0 1−t z z Hence from the sharp form of Theorem 2.1 we obtain the following result. ∞ X 3 ak (ζ)k(k − 1)z k−2 ∞ k + 2 X 2z 3 2zζ ≺≺ ak (ζ)kz k−2 + k=3 ∞ − 1 ≺≺ X 3 ζ −z k+2 1 −z k=3 ak (ζ)kz k−2 k+2 k=3

implies ∞

−2 −

3 X 4ζ 4ζ 4ζ − 4ζ 2 ln(ζ − z) ≺≺ ak (ζ)kz k−2 ≺≺ −2ζ − − 2 ln(1 − z), z ∈ U, ζ ∈ U . z k+2 z z k=3

Theorem 2.3. Let h1 (z, ζ) and h2 (z, ζ) be convex for all ζ ∈ U , with h1 (0, ζ) = h2 (0, ζ) = a = r − 1. Let z[H m f (z, ζ)]0 z[H m f (z, ζ)]00 − 1 ∈ H[r − 1, 1] ∩ Qζ and suppose that + 1 is univalent in U , for all ζ ∈ U . m H f (z, ζ) [H m f (z, ζ)]0 If the differential equations θ(qi (z, ζ)) + zqi0 (z, ζ)φ(qi (z, ζ)) = hi (z, ζ),

(2.7)

have the univalent solutions qi (z, ζ) that satisfy qi (0, ζ) = r − 1, qi (U × U ) ⊂ D, and θ(qi (z, ζ)) ≺≺ hi (z, ζ), for i = 1, 2, then h1 (z, ζ) ≺≺

(2.8)

z[H m f (z, ζ)]00 + 1 ≺≺ h2 (z, ζ), [H m f (z, ζ)]0

implies z[H m f (z, ζ)]0 − 1 ≺≺ q2 (z, ζ), z ∈ U, ζ ∈ U . H m f (z, ζ) The functions q1 (z, ζ) and q2 (z, ζ) are the best subordinant and the best dominant respectively. q1 (z, ζ) ≺≺

Proof. We let (2.9)

p(z, ζ) =

z[H m f (z, ζ)]0 − 1, z ∈ U, ζ ∈ U . H m f (z, ζ)

Using (1.5) in (2.9) we obtain " z rz

r−1

∞ X (r + 1)m + ak (ζ)kz k−1 (r + k)m

p(z, ζ) = zr +

k=r+1 ∞ X

k=r+1

(r + 1)m ak (ζ)z k (r + k)m

259

# − 1.

GEORGIA IRINA OROS 256-261

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Since p(0, ζ) = r − 1, we have p(z, ζ) ∈ H[r − 1, 1]ζ ∩ Qζ . Differentiating (2.9), and after a short calculus, we obtain (2.10)

p(z, ζ) + 1 +

zp0 (z, ζ) z[H m f (z, ζ)]00 . =1+ p(z, ζ) + 1 [H m f (z, ζ)]0

Using (2.10) ˆın (2.8), we have h1 (z, ζ) ≺≺ p(z, ζ) + 1 +

(2.11)

zp0 (z, ζ) ≺≺ h2 (z, ζ), z ∈ U, ζ ∈ U . p(z, ζ) + 1

In order to prove the theorem, we shall use Lemma B. For that, we show that the necessary conditions are satisfied. Let the functions θ : C → C and ϕ : C → C, with (2.12)

θ(w) = w + 1, and

1 , ϕ(w) 6= 0. w+1 We check the conditions from the hypothesis of Lemma B. Using (2.12), we have

(2.13)

ϕ(w) =

(2.14)

θ(p(z, ζ)) = p(z, ζ) + 1

and (2.15)

θ(q1 (z, ζ)) = q1 (z, ζ) + 1,

θ(q2 (z, ζ)) = q2 (z, ζ) + 1.

Using (2.13), we have (2.16)

(2.17)

ϕ(q1 (z, ζ)) =

ϕ(p(z, ζ)) =

1 and p(z, ζ) + 1

1 , q1 (z, ζ) + 1

ϕ(q2 (z, ζ)) =

1 . q2 (z, ζ) + 1

Using (2.14) and (2.16), we have θ(p(z, ζ)) + zp0 (z, ζ)ϕ(p(z, ζ)) = p(z, ζ) + 1 +

(2.18)

h1 (z, ζ) = q1 (z, ζ) + 1 +

zp0 (z, ζ) , p(z, ζ) + 1

zq10 (z, ζ) and q1 (z, ζ) + 1

h2 (z, ζ) = q2 (z, ζ) + 1 +

zq20 (z, ζ) . q2 (z, ζ) + 1

Using (2.10) and (2.12), (2.8) becomes (2.19)

q1 (z, ζ) + 1 +

zq10 (z, ζ) zp0 (z, ζ) zq20 (z, ζ) ≺≺ p(z, ζ) + 1 + ≺≺ q2 (z, ζ) + 1 + , z ∈ U, ζ ∈ U . q1 (z, ζ) + 1 p(z, ζ) + 1 q2 (z, ζ) + 1

We can apply Lemma B and we obtain q1 (z, ζ) ≺≺ p(z, ζ) ≺≺ q2 (z, ζ), i.e., q1 (z, ζ) ≺≺

z[H m f (z, ζ)]0 −1 ≺≺ H m f (z, ζ)

q2 (z, ζ), z ∈ U, ζ ∈ U . The functions q1 (z, ζ) and q2 (z, ζ) are the best subordinant and the best dominant respectively. z ζz and h2 (z, ζ) = be starlike in U , for all ζ ∈ U , ζ −z ζ +z with h1 (0, ζ) = h2 (0, ζ) = 0, f (z, ζ) ∈ A(r)ζ with f (0, ζ) = 0 and z[Hγm f (z, ζ)]0 Hγm f (z, ζ) be univalent in U for all ζ ∈ U . If Theorem 2.4. Let m ∈ N, r ∈ N, γ ∈ C, h1 (z, ζ) =

(2.20)

z ζz ≺≺ z[Hγm f (z, ζ)]0 Hγm f (z, ζ) ≺≺ ζ −z ζ +z

then (2.21) when the function

ζ ln

[Hγm f (z, ζ)]2 ζ ζ +z ≺≺ ≺≺ ln ζ −z 2 ζ

[Hγm f (z, ζ)]2 is univalent in U , for all ζ ∈ U . 2 260

GEORGIA IRINA OROS 256-261

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. In order to prove the theorem, we shall use Lemma C. We let (2.22)

g(z, ζ) = z[Hγm f (z, ζ)]0 Hγm f (z, ζ), z ∈ U, ζ ∈ U

and (2.21) becomes (2.23)

ζz z ≺≺ g(z, ζ) ≺≺ , ζ −z ζ +z

ζz z , h2 (z, ζ) = are starlike and g(z, t) given by (2.22) is univalent in U , for all ζ ∈ U . ζ −z ζ +z Using Lemma C, we have Z z Z z Z z ζ 1 [Hγm f (t, ζ)]0 Hγm f (t, ζ)dt ≺≺ dt ≺≺ dt 0 ζ −t 0 ζ +t 0 and after a short calculus we obtain [Hγm f (z, ζ)]2 ζ +z ζ ≺≺ ≺≺ ln , z ∈ U, ζ ∈ U .  ζ ln ζ −z 2 ζ

where h1 (z, ζ) =

References [1] J.A. Antonino, S. Romaguera, Strong differential subordination to Briot-Bouquet differential equations, Journal of Differential Equations, 114(1994), 101-105. [2] S. S. Miller, P. T. Mocanu, Second order differential inequalities in the complex plane, J. Math. Anal. Appl., 65(1978), 298-305. [3] S. S. Miller, P. T. Mocanu, Differential subordinations and univalent functions, Michig. Math. J., 28(1981), 157-171. [4] S. S. Miller, P. T. Mocanu, Differential subordinations. Theory and applications, Marcel Dekker, Inc., New York, Basel, 2000. [5] S. S. Miller, P. T. Mocanu, Subordinants of differential superordinations, Complex Variables, 48(10)(2003), 815-826. [6] S. S. Miller, P. T. Mocanu, Briot-Bouquet differential superordinations and sandwich theorems, J. Math. Anal. Appl., 329(2007), no. 1, 327-335. [7] G.I. Oros, Gh. Oros, Strong differential subordination, Turkish Journal of Mathematics, 33(2009), 249-257. [8] G.I. Oros, Strong differential superordination, Acta Universitatis Apulensis, 19(2009), 110-116. [9] G.I. Oros, An application of the subordination chains, Fractional Calculus and Applied Analysis, 13(2010), no. 5, 521-530. [10] Gh. Oros, Briot-Bouquet strong differential superordinations and sandwich theorems, Math. Reports, 12(62)(2010), no. 3, 277-283. [11] G.I. Oros, On a new strong differential subordination, Acta Univ. Apulensis, 32(2012), 243-250. [12] G.I. Oros, Briot-Bouquet, strong differential subordination, Journal of Computational Analysis and Applications, 14(2012), no. 4, 733-737. [13] G.I. Oros, Gh. Oros, R. Diaconu, Differential subordinations obtained with some new integral operators, J. Computational Analysis and Application, 19(2015), no. 5, 904-910.

Department of Mathematics University of Oradea Str. Universit˘a¸tii, No.1 410087 Oradea, Romania E-mail: georgia oros [email protected]

261

GEORGIA IRINA OROS 256-261

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Weighted composition operators from Zygmund-type spaces to weighted-type spaces Yanhua Zhang Abstract. In this paper, we investigate the boundedness and compactness of weighted composition operators from Zygmund-type spaces to weighted-type spaces and little weighted-type spaces in the unit ball of Cn . MSC 2000: 47B35, 30H05 Keywords: Weighted composition operator, Zygmund-type space, weighted-type space.

1 Introduction A positive continuous function µ on [0, 1) is called normal if there exist positive numbers a and b, 0 < a < b, and δ ∈ [0, 1) such that (see [13]) µ(r) µ(r) is decreasing on [δ, 1) and lim = 0; r→1 (1 − r)a (1 − r)a µ(r) µ(r) is increasing on [δ, 1) and lim = ∞. r→1 (1 − r)b (1 − r)b ( β )β eα with α ∈ (0, ∞) and β ∈ [0, ∞) is For example, µ(r) = (1 − r2 )α log 1−r 2 normal. Let B be the unit ball of Cn and H(B) the space of all holomorphic functions on B. Let A(B) denote the ball algebra consisting of all functions in H(B) that are continuous up to the boundary of B. Let z = (z1 , . . . , zn ) and w = (w1 , . . . , wn ) be points in Cn , we write √ ⟨z, w⟩ = z1 w1 + · · · + zn wn , |z| = |z1 |2 + · · · + |zn |2 . Let µ be normal on [0, 1). The weighted-type space, denoted by Hµ∞ = Hµ∞ (B), is the space of all f ∈ H(B) such that (see, e.g., [15, 16]). ∥f ∥Hµ∞ = sup µ(|z|) |f (z)| < ∞. z∈B

Hµ∞

is a Banach space with the norm ∥ · ∥Hµ∞ . The little weighted-type space, denote ∞ by Hµ,0 , is the subspace of Hµ∞ consisting of those f ∈ Hµ∞ such that lim µ(|z|)|f (z)| = 0.

|z|→1

1

262

Yanhua Zhang 262-269

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

∞ ∞ When µ(r) = (1−r2 )α , Hµ∞ and Hµ,0 will be denoted by Hα∞ and Hα,0 , respectively. ∞ ∞ Let H = H (B) denote the space of all bounded holomorphic functions on B. For f ∈ H(B), let ℜf denote the radial derivative of f, that is

ℜf (z) =

n ∑ j=1

zj

∂f (z). ∂zj

We write ℜ f = ℜ(ℜf ). The Zygmund space, denote by Z = Z (B), is the space consisting of all f ∈ H(B) such that 2

sup(1 − |z|2 )|ℜ2 f (z)| < ∞. z∈B

It is well known that f ∈ Z if and only if f ∈ A(B) and there exists a constant C > 0 such that |f (ζ + h) + f (ζ − h) − 2f (ζ)| < Ch, for all ζ ∈ ∂B and ζ ± h ∈ ∂B (see [19, p. 261]). Let ω be normal on [0, 1). An f ∈ H(B) is said to belong to the Zygmund-type space, denoted by Zω = Zω (B), if (see [10, 11, 17]) ∥f ∥Zω = |f (0)| + sup ω(|z|) ℜ2 f (z) < ∞. z∈B

It is easy to check that Zω is a Banach space under the norm ∥ · ∥Zω . See [2, 3, 7, 8, 12] for more details on the Zygmund space in the unit disk. Let φ be a holomorphic self-map of B and u ∈ H(B). The weighted composition operator, denoted by uCφ , is defined by (uCφ f )(z) = u(z)f (φ(z)), f ∈ H(B),

z ∈ B.

When u = 1, the operator uCφ is just the composition operator, denoted by Cφ . For more information about the theory of composition operator, see [1] and the references therein. In the setting of B, Stevi´c studied weighted composition operators between Hα∞ and mixed norm spaces in [14]. In [9], Li and Stevi´c studied weighted composition operators between H ∞ and α-Bloch spaces. In [5], Gu studied weighted composition operators from generalized weighted Bergman spaces to Hµ∞ . In [20], Zhu studied weighted composition operators from F (p, q, s) spaces to Hµ∞ . In [16], the operator norm of the weighted composition operator from the Bloch space to Hµ∞ was studied. In [15], the essential norm of weighted composition operators from α-Bloch spaces to Hµ∞ was studied. In [18], Yang studied weighted composition operators from Bloch type spaces with normal weight to Hµ∞ In this paper, we study the boundedness and compactness of uCφ : Zω → Hµ∞ and ∞ uCφ : Zω → Hµ,0 . Some necessary and sufficient conditions for uCφ to be bounded or compact are provided. Throughout this paper C will denote constants, they are positive and may differ from one occurrence to the other. a . b means that there is a positive constant C such that a ≤ Cb. If both a . b and b . a hold, then one says that a ≈ b. 2

263

Yanhua Zhang 262-269

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2 Main results and proofs In order to prove our main results, we need some auxiliary results which are incorporated in the following lemmas. The following lemma can be found in [17]. Lemma 1. Assume that ω is normal on [0, 1). If f ∈ Zω , then (



|z|

|f (z)| ≤ C 1 +



0

or

t

0

( ∫ |f (z)| ≤ C 1 +

|z|

0

) ds dt ∥f ∥Zω ω(s)

) |z| − t dt ∥f ∥Zω ω(t)

for some C independent of f . ∞ Lemma 2. [20] Assume that µ is normal on [0, 1). A closed set K in Hµ,0 is compact if and only if it is bounded and satisfies

lim sup µ(|z|)|f (z)| = 0.

|z|→1 f ∈K

By standard arguments similar to those outlined in Proposition 3.11 of [1], the following lemma follows. We omit the details. Lemma 3. Assume that ω and µ are normal on [0, 1), u ∈ H(B) and φ is a holomorphic self-map of B. Then uCφ : Zω → Hµ∞ is compact if and only if uCφ : Zω → Hµ∞ is bounded and for any bounded sequence (fk )k∈N in Zω which converges to zero uniformly on compact subsets of B as k → ∞, we have ∥uCφ fk ∥Hµ∞ → 0 as k → ∞. ∫ 1 1−t Lemma 4. [17] Assume that ω is normal and 0 ω(t) dt < ∞. Then for every bounded sequence (fk )k∈N ⊂ Zω converging to 0 uniformly on compact subsets of B, we have that lim sup |fk (z)| = 0. k→∞ z∈B

Lemma 5. [6] Assume that ω is normal. Then exists a function g is holomorphic on the unit disk D, g(r) is increasing on [0, 1) and 0 < C1 = inf ω(r)g(r) ≤ sup ω(r)g(r) ≤ C2 < ∞. r∈[0,1)

r∈[0,1)

Now we are in a position to state and prove our main results is this paper. Theorem 1. Assume that µ and ω are normal on [0, 1), u ∈ H(B) and φ is a holomorphic self-map of B. Then uCφ : Zω → Hµ∞ is bounded if and only if ( ∫ sup µ(|z|)|u(z)| 1 + z∈B

|φ(z)| 0

|φ(z)| − t dt ω(t)

) < ∞.

(1)

3

264

Yanhua Zhang 262-269

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Moreover, when uCφ : Zω → Hµ∞ is bounded, then ( ∫ ≈ sup µ(|z|)|u(z)| 1 +

∥uCφ ∥Zω →Hµ∞

z∈B

|φ(z)| 0

) |φ(z)| − t dt . ω(t)

(2)

Proof. Assume that uCφ : Zω → Hµ∞ is bounded. Taking f (z) ≡ 1 ∈ Zω , we get u ∈ Hµ∞ and ∥u∥Hµ∞ = ∥uCφ (1)∥Hµ∞ ≤ ∥uCφ ∥Zω →Hµ∞ .

(3)

Let b ∈ B. Define ∫

⟨z,b⟩



fb (z) =

η

z ∈ B,

g(t)dtdη, 0

(4)

0

where g is defined in Lemma 5. It is easy to check that there is a positive constant C such that supb∈B ∥fb ∥Zω ≤ C and hence fb ∈ Zω . Therefore, for every w ∈ B, sup µ(|z|)|fφ(w) (φ(z))u(z)|

= sup µ(|z|)|(uCφ fφ(w) )(z)|

z∈B

z∈B

= ∥uCφ fφ(w) ∥Hµ∞ ≤ C∥uCφ ∥Zω →Hµ∞ .

(5)

By Lemma 5 we get ∫

|φ(w)|2

sup µ(|w|)|u(w)| w∈B

0

|φ(w)|2 − t dt ≤ C∥uCφ ∥Zω →Hµ∞ < ∞. ω(t)

(6)

After a calculation, we get ∫

|φ(w)|2

0



|φ(w)|2 − t dt ≈ ω(t)

|φ(w)|

0

|φ(w)| − t dt. ω(t)

(7)

From (6), (7) and the fact that u ∈ Hµ∞ , we see that (1) holds. Conversely, suppose that (1) holds. For any f ∈ Zω , by Lemma 1 we have ∥uCφ f ∥Hµ∞

=

sup µ(|z|)|(uCφ f )(z)| z∈B

=

sup µ(|z|)|f (φ(z))||u(z)| z∈B

( ∫ ≤ C∥f ∥Zω sup µ(|z|)|u(z)| 1 + z∈B

|φ(z)| 0

) |φ(z)| − t dt . ω(t)

(8)

Therefore (1) implies that uCφ : Zω → Hµ∞ is bounded. Moreover ∥uCφ ∥Zω →Hµ∞

( ∫ ≤ C sup µ(|z|)|u(z)| 1 + z∈B

From (3), (6), (7) and (9), (2) follows.

0

|φ(z)|

) |φ(z)| − t dt . ω(t)

(9)

 4

265

Yanhua Zhang 262-269

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Theorem 2. Assume that µ and ω are normal on [0, 1), u ∈ H(B) and φ is a holomor∫ 1 1−t phic self-map of B. If 0 ω(t) dt < ∞, then uCφ : Zω → Hµ∞ is compact if and only ∞ if u ∈ Hµ . Proof. Assume that uCφ : Zω → Hµ∞ is compact. Then it is clear that uCφ : Zω → Hµ∞ is bounded. Taking f (z) ≡ 1, we see that u ∈ Hµ∞ . ∫ 1 1−t Conversely, suppose that u ∈ Hµ∞ . Since 0 ω(t) dt < ∞, then ∫

|φ(z)|

sup µ(|z|)|u(z)| z∈B

0

|φ(z)| − t dt ≤ sup µ(|z|)|u(z)| ω(t) z∈B



1

0

1−t dt < ∞. ω(t)

(10)

For every f ∈ Zω , from (10) we obtain µ(|z|)|(uCφ f )(z)|

= µ(|z|)|f (φ(z))||u(z)|

( ∫ ≤ C∥f ∥Zω sup µ(|z|)|u(z)| 1 + z∈B

|φ(z)|

0

≤ C∥f ∥Zω ∥u∥Hµ∞ < ∞,

) |φ(z)| − t dt ω(t) (11)

which implies that uCφ : Zω → Hµ∞ is bounded. Let (fk )k∈N be any bounded sequence in Zω and fk → 0 uniformly on compact subsets of B as k → ∞. By Lemma 4 we obtain lim ∥uCφ fk ∥Hµ∞

k→∞

= ≤

lim sup µ(|z|)|fk (φ(z))u(z)|

k→∞ z∈B

∥u∥Hµ∞ lim sup |fk (φ(z))| = 0. k→∞ z∈B

By Lemma 3, we see that uCφ : Zω → Hµ∞ is compact.



Theorem 3. Assume that µ and ω are normal on [0, 1), u ∈ H(B), φ is a holomorphic ∫ 1 1−t self-map of B. Assume that 0 ω(t) dt = ∞. Then uCφ : Zω → Hµ∞ is compact if and ∞ only if uCφ : Zω → Hµ is bounded and lim

|φ(z)|→1

( ∫ µ(|z|)|u(z)| 1 +

|φ(z)|

0

) |φ(z)| − t dt = 0. ω(t)

(12)

Proof. Assume that uCφ : Zω → Hµ∞ is compact. To prove (12), we only need to prove that ∫ |φ(z)| |φ(z)| − t lim µ(|z|)|u(z)| dt = 0, (13) ω(t) |φ(z)|→1 0 since they are equivalent. Let (zk )k∈N be a sequence in B such that |φ(zk )| → 1 as k → ∞ (if such a sequence does not exist then condition (12) is vacuously satisfied). For k ∈ N, we define ( ∫ |φ(zk )|2 ∫ η )−1 ( ∫ ⟨z,φ(zk )⟩ ∫ η )2 fk (z) = g(t)dtdη g(t)dtdη . 0

0

0

0

5

266

Yanhua Zhang 262-269

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

It is easy to see that fk ∈ Zω for every k ∈ N, supk∈N ∥fk ∥Zω ≤ C and fk converges to 0 uniformly on compact subsets of B as k → ∞. By the assumption and Lemma 3 we see that limk→∞ ∥uCφ fk ∥Hµ∞ = 0. Thus ∫

|φ(zk )|2

|φ(zk )|2 − t dt k→∞ ω(t) 0 = lim µ(|zk |)|u(zk )| |fk (φ(zk ))| lim µ(|zk |)|u(zk )|

k→∞



lim sup µ(|z|)|(uCφ fk )(z)| = lim ∥uCφ fk ∥Hµ∞ = 0,

k→∞ z∈B

k→∞

which implies ∫

|φ(zk )|

lim µ(|zk |)|u(zk )|

k→∞

0

|φ(zk )| − t dt = 0. ω(t)

From this we obtain (12). Conversely, suppose that uCφ : Zω → Hµ∞ is bounded and (12) holds. Suppose that (fk )k∈N is a sequence in Zω such that supk∈N ∥fk ∥Zω ≤ Ω and fk → 0 uniformly on compact subsets of B as k → ∞. By Lemma 3 we only need to show that limk→∞ ∥uCφ fk ∥Hµ∞ = 0. From (12), for every ε > 0, there is a constant s ∈ (0, 1), such that ( ∫ µ(|z|)|u(z)| 1 +

|φ(z)|

0

) |φ(z)| − t dt < ε ω(t)

when s < |φ(z)| < 1. By Lemma 1, ∥uCφ fk ∥Hµ∞ = sup µ(|z|)|(uCφ fk )(z)| z∈B

=

sup µ(|z|)|u(z)||fk (φ(z))| z∈B



sup µ(|z|)|u(z)||fk (φ(z))| + C

|φ(z)|≤s

(



) |φ(z)| − t dt ∥fk ∥Zω ω(t) sup |fk (φ(z))| + CΩε.

|φ(z)|

1+ 0

≤ ∥u∥Hµ∞

sup µ(|z|)|u(z)| |φ(z)|>s

|φ(z)|≤s

Since fk → 0 uniformly on compact subsets of B as k → ∞, we obtain lim sup sup |fk (φ(z))| = 0. k→∞ |φ(z)|≤η

Hence lim supk→∞ ∥uCφ fk ∥Hµ∞ ≤ CΩε. By the arbitrary of ε we obtain that lim ∥uCφ fk ∥Hµ∞ = 0.

k→∞

Hence uCφ : Zω → Hµ∞ is compact by Lemma 3.



6

267

Yanhua Zhang 262-269

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Theorem 4. Assume that µ and ω are normal on [0, 1), u ∈ H(B) and φ is a holomor∞ phic self-map of B. Then uCφ : Zω → Hµ,0 is compact if and only if ( ) ∫ |φ(z)| |φ(z)| − t lim µ(|z|)|u(z)| 1 + dt = 0. (14) ω(t) |z|→1 0 ∞ Proof. Assume that uCφ : Zω → Hµ,0 is compact. Taking f (z) ≡ 1 and using the ∞ boundedness of uCφ : Zω → Hµ,0 , we get

lim µ(|z|)|u(z)| = 0.

(15)

|z|→1

∫1

< ∞, then (14) follows by (15). ∫ 1 1−t Now we consider the case 0 ω(t) dt = ∞. From the assumption, it is obvious that uCφ : Zω → Hµ∞ is compact. By Theorem 2, we get ( ) ∫ |φ(z)| |φ(z)| − t lim µ(|z|)|u(z)| 1 + dt = 0. (16) ω(t) |φ(z)|→1 0

When

1−t dt 0 ω(t)

By (16), for every ε > 0, there exists a η ∈ (0, 1), such that ( ) ∫ |φ(z)| |φ(z)| − t µ(|z|)|u(z)| 1 + dt < ε ω(t) 0 when η < |φ(z)| < 1. By (15), for the above ε, there is a s ∈ (0, 1), such that ( )−1 ∫ η η−t µ(|z|)|u(z)| < 1 + dt ε 0 ω(t) when s < |z| < 1. Hence, if s < |z| < 1 and η < |φ(z)| < 1, we obtain ( ) ∫ |φ(z)| |φ(z)| − t µ(|z|)|u(z)| 1 + dt < ε. ω(t) 0

(17)

If s < |z| < 1 and |φ(z)| ≤ η, we get ( ) ( ) ∫ |φ(z)| ∫ η |φ(z)| − t η−t µ(|z|)|u(z)| 1 + dt ≤ 1 + dt µ(|z|)|u(z)| < ε. (18) ω(t) 0 0 ω(t) From (17) and (18), we see that (14) holds. ∞ is compact, Conversely, assume that (14) holds. To prove that uCφ : Zω → Hµ,0 by Lemma 2 we only need to prove that lim

sup

|z|→1 ∥f ∥Z ≤1 ω

µ(|z|)|(uCφ f )(z)| = 0.

Applying Lemma 1, we obtain

( ∫ µ(|z|)|(uCφ f )(z)| ≤ Cµ(|z|)|u(z)| 1 + 0

|φ(z)|

(19)

) |φ(z)| − t dt ∥f ∥Zω . ω(t)

(20)

Taking the supremum in (20) over the the unit ball in the space Zω , then letting |z| → 1 and applying (14) we get the desired result. 

7

268

Yanhua Zhang 262-269

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

References [1] C. Cowen and B. MacCluer, Composition Operators on Spaces of Analytic Functions, Studies in Advanced Math., CRC Press, Boca Raton, 1995. [2] J. Du, S. Li and Y. Zhang, Essential norm of generalized composition operators on Zygmund type spaces and Bloch type spaces, Annales Polo. Math. 119 (2017), 107–119. [3] P. Duren, Theory of H p Spaces, Academic Press, New York, (1970). [4] X. Fu and X. Zhu, Weighted composition operators on some weighted spaces in the unit ball, Abstr. Appl. Anal. Vol. 2008, Article ID 605807, (2008), 8 pages. [5] D. Gu, Weighted composition operators from generalized weighted Bergman spaces to weighted-type space, J. Inequal. Appl. Vol. 2008, Article ID 619525, (2008), 14 pages. [6] Z. Hu, Composition operators between Bloch-type spaces in the polydisc, Sci. China, Ser. A 48(Supp)(2005), 268-282. [7] S. Li and S. Stevi´c, Volterra type operators on Zygmund spaces, J. Inequal. Appl. 2007 (2007), 10 pages. [8] S. Li and S. Stevi´c, Generalized composition operators on Zygmund spaces and Bloch type spaces, J. Math. Anal. Appl. 338 (2008), 1282–1295. [9] S. Li and S. Stevi´c, Weighted composition operators between H ∞ and α-Bloch spaces in the unit ball, Taiwanese J. Math. 12 (2008), 1625–1639. [10] S. Li and S. Stevi´c, Ces`aro type operators on some spaces of analytic functions on the unit ball, Appl. Math. Comput. 208 (2009), 378–388. [11] S. Li and S. Stevi´c, Integral-type operators from Bloch-type spaces to Zygmund-type spaces, Appl. Math. Comput. 215 (2009), 464–473. [12] S. Li and S. Stevi´c, Products of composition and differentiation operators from Zygmund spaces to Bloch spaces and Bers spaces, Appl. Math. Comput. 217 (2010), 3144–3154. [13] A. Shields and D. Williams, Bounded projections, duality, and multipliers in spaces of analytic functions, Trans. Amer. Math. Soc. 162 (1971), 287–302. ∞ spaces in the unit [14] S. Stevi´c, Weighted composition operators between mixed norm spaces and Hα ball, J. Inequal. Appl. Vol 2007, Article ID 28629, (2007), 9 pages.

[15] S. Stevi´c, Essential norms of weighted composition operators from the α-Bloch space to a weightedtype space on the unit ball, Abstr. Appl. Anal. Vol. 2008, Aticle ID 279691, (2008), 10 pages. [16] S. Stevi´c, Norm of weighted composition operators from Bloch space to Hµ∞ on the unit ball, Ars. Combin. 88 (2008), 125–127. [17] S. Stevi´c, On an integral-type operator from Zygmund-type Spaces to mixed-norm spaces on the unit ball, Abstr. Appl. Anal. Vol. 2010 (2010), Article ID 198608, 7 pages. [18] W. Yang, Weighted composition operators from Bloch-type spaces to weighted-type spaces, Ars. Combin. 93 (2009), 265–274. [19] K. Zhu, Spaces of Holomorphic Functions in the Unit Ball, Springer, New York, 2005. [20] X. Zhu, Weighted composition operators from F (p, q, s) spaces to Hµ∞ spaces, Abstr. Appl. Anal. Vol. 2009, Article ID 290978, (2009), 12 pages. Yanhua Zhang: Department of Mathematics, Qufu Normal University, 273165, Qufu, ShanDong, China Email: [email protected]

8

269

Yanhua Zhang 262-269

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Positive solutions for a singular semipositone boundary value problem of nonlinear fractional differential equations ∗ Xiaofeng Zhang 1 , Hanying Feng 1

2†

Department of Mathematics, Shijiazhuang Mechanical Engineering College Shijiazhuang 050003, Hebei, P. R. China

2

Department of Mathematics, Nantong Institute of Technology, Nantong 226002, Jiangsu, P. R. China

Abstract: In this paper, we consider the existence of positive solutions to a singular semipositone boundary value problem of nonlinear fractional differential equations. By using Krasnoselskii’s fixed point theorem, some sufficient conditions for the existence of positive solutions and the eigenvalue intervals on which there exists a positive solution are obtained. In addition, two examples are presented to demonstrate the application of our main results. Keywords: Fractional differential equation, Singular semipositone boundary value problem, Positive solution, fixed point theorem, Eigenvalue. 2010 Mathematics Subject Classification: 34B15, 34B16, 34B18

1

Introduction In this paper, we discuss the following singular semipositone boundary value problem (BVP for short):  α 0 < t < 1,  D0+ u(t) = λf (t, u(t), v(t)) , α v(t) = µg (t, u(t), v(t)) , 0 < t < 1, D0+ (1.1)  u(0) = u(1) = u′ (0) = u′ (1) = v(0) = v(1) = v ′ (0) = v ′ (1) = 0,

α is the standard Riemann-Liouville fractional derivative, λ, µ are where 3 < α ≤ 4 is a real number, D0+ positive parameters, and f, g : (0, 1) × [0, +∞) × [0, +∞) → (−∞, +∞) are given continuous functions. f, g may be singular at t = 0 and/or t = 1 and may take negative values. By using Krasnoselskii’s fixed point theorem, some sufficient conditions for the existence of positive solutions and the eigenvalue intervals on which there exists a positive solution are established. Singular boundary value problems arise from many fields in physics, biology, chemistry and economics, and play a very important role in both theoretical development and application. Recently, some work has been done to study the existence of solutions or positive solutions of nonlinear singular semipositone boundary value problems by the use of techniques of nonlinear analysis such as Leray-Schauder theory, fixed point index theorem, etc[1, 3, 4, 8, 10, 11]. In [8], Wang, Liu and Wu have discussed the existence of positive solutions of the following nonlinear fractional differential equation boundary value problem with changing sign nonlinearity: { α D0+ u(t) + λf (t, u(t)) = 0, 0 < t < 1, u(0) = u′ (0) = u(1) = 0, α where 2 < α ≤ 3 is a real number, D0+ is the standard Riemann-Liouville fractional derivative, λ is a positive parameter, f may change sign and may be singular at t = 0 and/or t = 1 and may take negative values. In [6], Henderson and Luca have considered the existence of positive solutions for the system of nonlinear fractional differential equations: { α D0+ u(t) + λf (t, u(t), v(t)) = 0, t ∈ (0, 1), β D0+ v(t) + µg (t, u(t), v(t)) = 0, t ∈ (0, 1), ∗ Supported

by NNSF of China (11371368) and HEBNSF of China (A2014506016). author. E-mail address: [email protected] (H. Feng).

† Corresponding

1

270

Xiaofeng Zhang ET AL 270-279

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

with the coupled integral boundary conditions { u(0) = u′ (0) = · · · = u(n−2) (0) = 0, v(0) = v ′ (0) = · · · = v (n−2) (0) = 0,

∫1 u′ (1) = 0 v(s)dH(s), ∫ 1 v ′ (1) = 0 u(s)dK(s),

β α where α ∈ (n−1, n], β ∈ (m−1, m], n, m ∈ N, n, m ≥ 3, D0+ , D0+ denote the standard Riemann-Liouville fractional derivatives, f, g are sign-changing continuous functions and may be nonsingular or singular at t = 0 and/or t = 1. Motivated by the above work, we consider the existence of positive solutions for the system of fractional order singular semipositone BVP (1.1). This paper is organized as follows. In Section 2, we present some basic definitions and properties from the fractional calculus theory. In Section 3, based on the Krasnoselskii’s fixed point theorem, we prove existence theorems of the positive solutions for boundary value problem (1.1). In section 4, two examples are presented to illustrate the main results.

2

Preliminaries

In this section, we present here the necessary definitions and properties from fractional calculus theory. These definitions and properties can be found in the recent literature [2, 5, 7, 9, 10, 12]. Definition 2.1. The Riemann-Liouville fractional integral of order α > 0 of a function f : (0, +∞) → R is given by ∫ t 1 α f (t) = I0+ (t − s)α−1 f (s)ds, t > 0, Γ(α) 0 provided the right-hand side is pointwise defined on (0, +∞). Definition 2.2. The Riemann-Liouville fractional derivative of order α > 0 for a function f : (0, +∞) → R is given by ( )n ( )n ∫ t ( n−α ) d 1 d f (s) α D0+ f (t) = I0+ f (t) = t > 0, α−n+1 ds, dt Γ(n − α) dt 0 (t − s) where n = [α] + 1, [α] denotes the integer part of the number α, provided that the right-hand side is pointwise defined on (0, +∞). Lemma 2.1. Let α > 0. If we assume u ∈ C(0, 1) ∩ L(0, 1), then the fractional differential equation α D0+ u(t) = 0

has solutions u(t) = C1 tα−1 + C2 tα−2 + · · · + Cn tα−n , Ci ∈ R, i = 1, 2, · · ·, n, n = [α] + 1. Lemma 2.2. Assume that u ∈ C(0, 1) ∩ L(0, 1) with a fractional derivative of order α(α > 0) that belongs to C(0, 1) ∩ L(0, 1), then α α I0+ D0+ u(t) = u(t) + C1 tα−1 + C2 tα−2 + · · · + Cn tα−n ,

for some Ci ∈ R, i = 1, 2, · · ·, n, n = [α] + 1. In the following, we present Green’s function of the fractional differential equation boundary value problem. Lemma 2.3. ([9]) Let y ∈ C(0, 1) ∩ L(0, 1) and 3 < α ≤ 4, the unique solution of problem { α D0+ u(t) = y(t), 0 < t < 1, (2.1) u(0) = u(1) = u′ (0) = u′ (1) = 0, is



1

u(t) =

G(t, s)y(s)ds, 0

where

 (t − s)α−1 + (1 − s)α−2 tα−2 [(s − t) + (α − 2)(1 − t)s]   , 0 ≤ s ≤ t ≤ 1,  Γ(α) G(t, s) = tα−2 (1 − s)α−2 [(s − t) + (α − 2)(1 − t)s]   , 0 ≤ t ≤ s ≤ 1.  Γ(α)

(2.2)

2

271

Xiaofeng Zhang ET AL 270-279

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Here G(t, s) is called the Green’s function of BVP (2.1). Lemma 2.4. ([9, 10]) The function G(t, s) defined by (2.2) possesses the following properties: (1)G(t, s) > 0, for t, s ∈ (0, 1); (2)G(t, s) = G(1 − s, 1 − t), for t, s ∈ (0, 1); (3)tα−2 (1 − t)2 q(s) ≤ G(t, s) ≤ (α − 1)q(s), for t, s ∈ (0, 1); (4)tα−2 (1 − t)2 q(s) ≤ G(t, s) ≤ ((α − 1)(α − 2)/Γ(α)) tα−2 (1 − t)2 , for t, s ∈ (0, 1), where q(s) = ((α − 2)/Γ(α)) s2 (1 − s)α−2 . Lemma 2.5. The function q(1 − t) has the property: ( ) 4(α − 2)α−1 2 = . max q(1 − t) = q α Γ(α)αα t∈(0,1) α−2 α−2 Proof. From Lemma 2.4, we can easily get q(1 − t) = Γ(α) t (1 − t)2 . Let F (t) = tα−2 (1 − t)2 , then α−2 F ′ (t) = (1 − t)tα−3 [−αt + (α − 2)] , for t ∈ (0, 1). Let F ′ (t) = 0, we get t0 = . α α−2 Since 3 < α ≤ 4, we can know 0 < t0 < 1. So, the function F (t) achieve the maximum when t = . α ( ) ( ) α−2 α−1 4(α − 2) 4(α − 2) α−2 2 Therefore max F (t) = F = , thus, max q(1 − t) = q = . α αα α Γ(α)αα t∈(0,1) t∈(0,1) Lemma 2.6. Let pi ∈ C(0, 1) ∩ L(0, 1) with pi (t) ≥ 0, i = 1, 2, then the boundary value problem { α D0+ u(t) = pi (t), 0 < t < 1, (2.3) u(0) = u(1) = u′ (0) = u′ (1) = 0, ∫1 has a unique solution wi (t) = 0 G(t, s)pi (s)ds with ∫ 1 (2.4) wi (t) ≤ (α − 1)q(1 − t) pi (s)ds, t ∈ [0, 1], i = 1, 2. 0

∫1 Proof. By Lemma 2,3 and Lemma 2.4, we have wi (t) = 0 G(t, s)pi (s)ds is the unique solution of (2.3) and ∫ 1 ∫ 1 wi (t) = G(t, s)pi (s)ds ≤ (α − 1)q(1 − t) pi (s)ds, i = 1, 2. 0

0

The proof is completed. ∗ For any x ∈ C[0, 1], we define a function [x(·)] : [0, 1] → [0, +∞) by { x(t), x(t) ≥ 0, ∗ [x(·)] = 0, x(t) < 0. In order to overcome the difficulty associated with semipositone, we consider the following approximately singular nonlinear differential system:  α [ ( ] ∗ ∗) 0 < t < 1,  D0+ u(t) = λ [ f ( t, [u(t) − λw1 (t)] , [v(t) − µw2 (t)] ) + p1 (t)] , ∗ ∗ α v(t) = µ g t, [u(t) − λw1 (t)] , [v(t) − µw2 (t)] + p2 (t) , 0 < t < 1, (2.5) D0+  u(0) = u(1) = u′ (0) = u′ (1) = v(0) = v(1) = v ′ (0) = v ′ (1) = 0, where wi (t)(i = 1, 2) are defined in Lemma 2.6. It is well-known that the problem (2.5) can be written equivalently as the following nonlinear system of integral equations  ∫ 1 [ ( ]  ∗ ∗)  G(t, s) f s, [u(s) − λw1 (s)] , [v(s) − µw2 (s)] + p1 (t) ds, 0 ≤ t ≤ 1,  u(t) = λ ∫ 01 (2.6) [ ( ]  ∗ ∗)   v(t) = µ G(t, s) g s, [u(s) − λw1 (s)] , [v(s) − µw2 (s)] + p2 (t) ds, 0 ≤ t ≤ 1. 0

We consider the Banach space X = C[0, 1] with the norm ∥u∥ = max |u(t)|, and the Banach space 0≤t≤1

Y = X × X with the norm ∥(u, v)∥ = max {∥u∥ , ∥v∥}. We define the { cone P ⊂ Y by } c1 tα−2 (1 − t)2 c2 tα−2 (1 − t)2 ∥(u, v)∥ , v(t) ≥ ∥(u, v)∥ , t ∈ [0, 1] . P = (u, v) ∈ Y |u(t) ≥ α−1 α−1 3

272

Xiaofeng Zhang ET AL 270-279

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

For λ, µ > 0, we define the operators T1 , T2 : Y → X and T : Y → Y as follows:  ∫ 1 [ ( ]  ∗ ∗)  G(t, s) f s, [u(s) − λw1 (s)] , [v(s) − µw2 (s)] + p1 (t) ds, 0 ≤ t ≤ 1,  T1 (u, v)(t) = λ ∫0 1 [ ( ]  ∗ ∗)   T2 (u, v)(t) = µ G(t, s) g s, [u(s) − λw1 (s)] , [v(s) − µw2 (s)] + p2 (t) ds, 0 ≤ t ≤ 1, 0

and T (u, v) = (T1 (u, v), T2 (u, v)) , (u, v) ∈ Y. Thus, the solutions of our problem (2.5) are the fixed points of the operator T . Lemma 2.7. ([5]) Let E be a Banach space, and let P ⊂ E be a cone in E. Assume Ω1 , Ω2 be two open subsets of E with θ ∈ Ω1 ⊂ Ω1 ⊂ Ω2 , and let T : P → P be a completely continuous operator such that either (i) ∥T w∥ ≤ ∥w∥ , w ∈ P ∩ ∂Ω1 , ∥T w∥ ≥ ∥w∥ , w ∈ P ∩ ∂Ω2 , or (ii) ∥T w∥ ≥ ∥w∥ , w ∈ P ∩∂Ω1 , ∥T w∥ ≤ ∥w∥ , w ∈ P ∩∂Ω2 holds. Then T has a fixed point in P ∩ Ω2 \Ω1 .

3

Main results and proof

For convenience, throughout the rest of the paper, we make the following assumptions: (H1 ) f, g ∈ C ((0, 1) × [0, +∞) × [0, +∞), (−∞, +∞)) and there exist functions pi , ai , k ∈ L ((0, 1), [0, + ∞)) ∩ C ((0, 1), [0, +∞)) and h ∈ C ([0, +∞) × [0, +∞), [0, +∞)) such that a1 (t)h(x, y) ≤ f (t, x, y) + p1 (t) ≤ k(t)h(x, y), a2 (t)h(x, y) ≤ g(t, x, y) + p2 (t) ≤ k(t)h(x, y), where ai (t) ≥ ci k(t) a.e. t ∈ (0, 1), 0 < ci ≤ 1, i = 1, 2, ∀(t, x, y) ∈ (0, 1) × [0, +∞) × [0, +∞). (H2 ) There exists (a, b) ⊂ [0, 1] such that f (t, x, y) = +∞, or x g(t, x, y) lim min = +∞. x→+∞ t∈[a,b] x lim

min

x→+∞ t∈[a,b]

(H3 ) There exists (c, d) ⊂ [0, 1] such that lim

min f (t, x, y) >

2(α − 1)2 (α − 2)r1 , or ∫d c1 c2 (1 − d)2 Γ(α) c q(s)ds

lim

min g(t, x, y) >

2(α − 1)2 (α − 2)r2 , ∫d c2 c2 (1 − d)2 Γ(α) c q(s)ds

x→+∞ t∈[c,d]

x→+∞ t∈[c,d]

where r1 =

∫1 0

p1 (s)ds, r2 =

∫1 0

p2 (s)ds, and lim

x,y→+∞

h(x, y) = 0. x

Lemma 3.1. T : P → P is a completely continuous operator. Proof. Let (u, v) ∈ P be an arbitrary element. From Lemma 2.4 and (H1 ), we can get ∥T1 (u, v)∥ = max |T1 (u, v)(t)| 0≤t≤1 ∫ 1 [ ( ] ∗ ∗) ≤ (α − 1)q(s) f s, [u(s) − λw1 (s)] , [v(s) − µw2 (s)] + p1 (t) ds 0



1

≤(α − 1)

( ∗ ∗) q(s)k(s)h [u(s) − λw1 (s)] , [v(s) − µw2 (s)] ds,

0

4

273

Xiaofeng Zhang ET AL 270-279

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

∥T2 (u, v)∥ = max |T2 (u, v)(t)| 0≤t≤1 ∫ 1 [ ( ] ∗ ∗) ≤ (α − 1)q(s) g s, [u(s) − λw1 (s)] , [v(s) − µw2 (s)] + p2 (t) ds 0



( ∗ ∗) q(s)k(s)h [u(s) − λw1 (s)] , [v(s) − µw2 (s)] ds,

1

≤(α − 1) 0

Hence, we obtain ∫ ∥T (u, v)∥ ≤ (α − 1)

1

[ ( ∗ ∗ )] q(s) k(s)h [u(s) − w1 (s)] , [v(s) − w2 (s)] ds.

(3.1)

0

By (H1 ) and (3.1), we have ∫ T1 (u, v)(t) ≥t

α−2

(1 − t)

1

[ ( ] ∗ ∗) q(s) f s, [u(s) − λw1 (s)] , [v(s) − µw2 (s)] + p1 (t) ds

1

( ∗ ∗) q(s)a1 (s)h [u(s) − λw1 (s)] , [v(s) − µw2 (s)] ds

2 0

∫ ≥tα−2 (1 − t)2

0



≥c1 t

α−2

(1 − t)

2

1

( ∗ ∗) q(s)k(s)h [u(s) − λw1 (s)] , [v(s) − µw2 (s)] ds

0

c1 tα−2 (1 − t)2 ∥T (u, v)∥ . ≥ α−1 In the similar manner, we deduce T2 (u, v)(t) ≥

c2 tα−2 (1 − t)2 ∥T (u, v)∥ . α−1

Thus T (u, v) ∈ P, that is T (P ) ⊂ P. According to the Arzela-Ascoli theorem, we can easily get that T : P → P is a completely continuous operator. The proof is completed. Theorem 3.1. If (H1 ) and (H2 ) hold, then there exists η > 0 such that the BVP (1.1) has at least one positive solution for any λ,{µ ∈ (0, η). } 2 (α−2)ri Proof. Choose R1 = max (α−1) , i = 1, 2 . Let ci Γ(α) { η = min 1, where

Γ(α)αα R1 4(α − 1)(α − 2)α−1 h∗ (R1 ) h∗ (R1 ) =

max

} ∫1 0

k(s)ds

h(x, y).

(3.2)

x,y∈[0,R1 ]

Suppose λ, µ ∈ (0, η), let PR1 = {(u, v) ∈ P, ∥(u, v)∥ < R1 }, for any (u, v) ∈ ∂PR1 , that is ∥(u, v)∥ = R1 . Noticing that c1 tα−2 (1 − t)2 c1 tα−2 (1 − t)2 ∥(u, v)∥ = R1 , α−1 α−1 c2 tα−2 (1 − t)2 c2 tα−2 (1 − t)2 ∥(u, v)∥ = R1 , v(t) ≥ α−1 α−1

u(t) ≥

and



t ∈ [0, 1], t ∈ [0, 1],

1

w1 (t) ≤ (α − 1)q(1 − t)

p1 (s)ds = (α − 1)q(1 − t)r1 , 0

∫ w2 (t) ≤ (α − 1)q(1 − t)

1

p2 (s)ds = (α − 1)q(1 − t)r2 , 0

for any t ∈ [0, 1], we get that ] [ c1 Γ(α)R1 0≤ − (α − 1)r1 q(1 − t) ≤ u(t) − λw1 (t) ≤ R1 , (α − 1)(α − 2) [ ] c2 Γ(α)R1 0≤ − (α − 1)r2 q(1 − t) ≤ v(t) − µw2 (t) ≤ R1 . (α − 1)(α − 2)

(3.3)

5

274

Xiaofeng Zhang ET AL 270-279

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Then from (H1 ) and Lemma 2.5, we have ∫ 1 T1 (u, v)(t) =λ G(t, s) [f (s, u(s) − λw1 (s), v(s) − µw2 (s)) + p1 (s)] ds 0



1

≤λ(α − 1)q(1 − t)

k(s)h (u(s) − λw1 (s), v(s) − µw2 (s)) ds 0

≤λ(α − 1)q(1 − t)h∗ (R1 )



1

k(s)ds 0

4λ(α − 1)(α − 2)α−1 h∗ (R1 ) Γ(α)αα ≤R1 .



1



k(s)ds 0

In the similar manner, we deduce ∫ 1 T2 (u, v)(t) =µ G(t, s) [g (s, u(s) − λw1 (s), v(s) − µw2 (s)) + p2 (s)] ds 0



1

≤µ(α − 1)q(1 − t)

k(s)h (u(s) − λw1 (s), v(s) − µw2 (s)) ds 0

≤µ(α − 1)q(1 − t)h∗ (R1 )



1

k(s)ds 0

4µ(α − 1)(α − 2)α−1 h∗ (R1 ) Γ(α)αα ≤R1 .



1



k(s)ds 0

Thus ∥T (u, v)∥ ≤ ∥(u, v)∥ , ∀(u, v) ∈ ∂PR1 . On the other hand, choose a constant L > 0 such that L≥

6 c1

λa4 (1

− b)4

∫b a

.

(3.4)

q(s)ds

By (H2 ), there exists a constant N > 0 such that for any t ∈ [a, b], x ≥ N, we have f (t, x, y) > L. x { R2 > max 2R1 ,

Select

6N 2 c1 a (1 − b)2

(3.5) } .

Then for any (u, v) ∈ ∂PR2 , we have u(t) − λw1 (t) ≥ 0, v(t) − µw2 (t) ≥ 0, t ∈ [0, 1]. Moreover, by R2 > 2R1 , we have (α − 1)(α − 2)r1 c1 R2 < , Γ(α) 2(α − 1) thus for any t ∈ [a, b], noticing 2 < α − 1 ≤ 3, c1 tα−2 (1 − t)2 (α − 1)(α − 2) α−2 R2 − t (1 − t)2 r1 α−1 Γ(α) [ ] c1 R2 (α − 1)(α − 2)r1 α−2 2 ≥t (1 − t) − (α − 1) Γ(α) [ ] c 1 R2 c1 R2 α−2 2 ≥a (1 − b) − (α − 1) 2(α − 1) aα−2 (1 − b)2 c1 R2 > 2(α − 1) 2 a (1 − b)2 c1 R2 ≥ . 6

u(t) − λw1 (t) ≥

6

275

Xiaofeng Zhang ET AL 270-279

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

noticing R2 >

6N c1 a2 (1−b)2 ,

we have u (t) − λw1 (t) ≥

a2 (1 − b)2 c1 R2 > N. 6

Hence from (3.5) and Lemma 2.5, we get ∫

1

G(t, s) [f (s, u(s) − λw1 (s), v(s) − µw2 (s)) + p1 (s)] ds

T1 (u, v)(t) =λ 0



b

≥λ

G(t, s)f (s, u(s) − λw1 (s), v(s) − µw2 (s)) ds a



b

G(t, s) [u(s) − λw1 (s)] ds

>λL a

c1 a2 (1 − b)2 λLR2 > 6



b

G(t, s)ds a

∫ b c1 a2 (1 − b)2 λLR2 α−2 2 q(s)ds ≥ t (1 − t) 6 a ∫ { } c1 a2 (1 − b)2 λLR2 b ≥ q(s)ds min tα−2 (1 − t)2 6 t∈[a,b] a ∫ c1 a4 (1 − b)4 λLR2 b > q(s)ds 6 a ≥R2 Thus ∥T (u, v)∥ ≥ ∥(u, v)∥ , ∀(u, v) ∈ ∂PR2 . g(t, x, y) = +∞. x By using Lemma 2.7, we conclude that T has a fixed point (u, v) such that R1 ≤ ∥(u, v)∥ ≤ R2 . Notice that (u(t), v(t)) is a solution of system (2.5) and wi (t)(i = 1, 2) are solutions of system (2.3). Thus (u(t) − λw1 (t), v(t) − µw2 (t)) is a positive solution of the singular semipositone BVP (1.1). Theorem 3.2. If (H1 ) and (H3 ) hold, then there exists η > 0 such that BVP (1.1) has at least one positive solution for any λ, µ ∈ (η, +∞). Proof. By the first of (H3 ), we have that there exists a constant N > 0 such that for any t ∈ [c, d], u ≥ N , we have 2(α − 1)2 (α − 2)r1 f (t, u, v) ≥ . ∫d c1 c2 (1 − d)2 Γ(α) c q(s)ds In the similar manner, we can get the same result when lim

min

x→+∞ t∈[a,b]

Select η=

N Γ(α) . c2 (1 − d)2 (α − 1)(α − 2)r1

In the following of the proof, we suppose λ, µ > η. Let 2λ(α − 1)2 (α − 2)r1 R3 = . c1 Γ(α) PR3 = {(u, v) ∈ P, ∥(u, v)∥ < R3 }, for any (u, v) ∈ ∂PR3 , that is ∥(u, v)∥ = R3 . Then c1 tα−2 (1 − t)2 λ(α − 1)(α − 2) α−2 R3 − t (1 − t)2 r1 α−1 Γ(α) [ ] c1 R3 λ(α − 1)(α − 2)r1 ≥tα−2 (1 − t)2 − (α − 1) Γ(α) λ(α − 1)(α − 2)r 1 ≥tα−2 (1 − t)2 Γ(α)

u(t) − λw1 (t) ≥

7

276

Xiaofeng Zhang ET AL 270-279

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC



tα−2 (1 − t)2 N cα−2 (1 − d)2

>N . Hence for (u, v) ∈ ∂PR3 , t ∈ [c, d], we have ∫ 1 T1 (u, v)(t) =λ G(t, s) [f (s, u(s) − λw1 (s), v(s) − µw2 (s)) + p1 (s)] ds 0



d

≥λ

G(t, s)f (s, u(s) − λw1 (s), v(s) − µw2 (s)) ds c

2(α − 1)2 (α − 2)r1 ≥λ ∫d c1 c2 (1 − d)2 Γ(α) c q(s)ds



d

G(t, s)ds c

2(α − 1)2 (α − 2)r1 tα−2 (1 − t)2 ∫d c1 c2 (1 − d)2 Γ(α) c q(s)ds R3 = 2 tα−2 (1 − t)2 c (1 − d)2 >R3 .



d

≥λ

q(s)ds c

Thus ∥T (u, v)∥ ≥ ∥(u, v)∥ , ∀(u, v) ∈ ∂PR3 . In the similar manner, we can get the same result when lim

min g(t, x, y) >

x→+∞ t∈[c,d]

2(α − 1)2 (α − 2)r2 . ∫d c2 c2 (1 − d)2 Γ(α) c q(s)ds

On the other hand, h(t) is continuous on [0, +∞) × [0, +∞), from the limit of (H3 ), we known h∗ (z) = 0, z→+∞ z

(3.6)

lim

where h∗ (z) is defined by (3.2). For ε=

Γ(α)αα 4(α − 1)(α − 2)α−1 max {λ, µ}

∫1 0

k(s)ds

e > 0 such that when z ≥ N e , we have h∗ (z) ≤ εz. there exists N { } e , then for (u, v) ∈ ∂PR , we get Select R4 ≥ max R3 , N 4 ∫

1

G(t, s) [f (s, u(s) − λw1 (s), v(s) − µw2 (s)) + p1 (s)] ds

T1 (u, v)(t) =λ 0



1

k(s)h (u(s) − λw1 (s), v(s) − µw2 (s)) ds

≤λ(α − 1)q(1 − t) 0





1

≤λ(α − 1)q(1 − t)h (R4 )

k(s)ds 0

4λ(α − 1)(α − 2)α−1 εR4 Γ(α)αα ≤R4 .



1



k(s)ds 0

In the similar manner, we deduce ∫ 1 T2 (u, v)(t) =µ G(t, s) [g (s, u(s) − λw1 (s), v(s) − µw2 (s)) + p2 (s)] ds 0



≤µ(α − 1)q(1 − t)

1

k(s)h (u(s) − λw1 (s), v(s) − µw2 (s)) ds 0

8

277

Xiaofeng Zhang ET AL 270-279

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC





1

≤λ(α − 1)q(1 − t)h (R4 )

k(s)ds 0

4µ(α − 1)(α − 2)α−1 εR4 Γ(α)αα ≤R4 .





1

k(s)ds 0

Thus ∥T (u, v)∥ ≤ ∥(u, v)∥ , ∀(u, v) ∈ ∂PR4 . Therefore, applying Lemma 2.7, we conclude that T has a fixed point (u, v) such that R3 ≤ ∥(u, v)∥ ≤ R4 . Notice that (u(t), v(t)) is a solution of system (2.5) and wi (t)(i = 1, 2) are solutions of system (2.3). Thus (u(t) − λw1 (t), v(t) − µw2 (t)) is a positive solution of the singular semipositone BVP (1.1). Remark 3.1. The conclusion of Theorem 3.1 is valid if (H2 ) is replaced by (H∗2 ) There exists (a, b) ⊂ [0, 1] such that f (t, x, y) + p1 (t) ≥ L, or y g(t, x, y) + p1 (t) ≥ L. lim min y→+∞ t∈[a,b] y lim

min

y→+∞ t∈[a,b]

where L ≥

6

. ∫b c2 − b)4 a q(s)ds Remark 3.2. The conclusion of Theorem 3.2 is valid if (H3 ) is replaced by (H∗3 ) There exists (c, d) ⊂ [0, 1] such that µa4 (1

lim

min f (t, x, y) = +∞, or

lim

min g(t, x, y) = +∞,

x→+∞ t∈[c,d] x→+∞ t∈[c,d]

and lim

x,y→+∞

4

h (x, y) = 0. x

Examples Now, we present two examples to illustrate the main results. Example 4.1. Consider the following system of fractional differential equations  7 ) 1 1 1 1( 2  u(t) = t− 3 u2 + v 2 − t− 4 , 0 < t < 1,  D0+  6 8 7 ) 1 −1 1 −1 ( 2 2 2 3 D0+ v(t) = t u + v − t 2 , 0 < t < 1,   3 ′ 2  u(0) = u(1) = u (0) = u′ (1) = v(0) = v(1) = v ′ (0) = v ′ (1) = 0. In BVP (4.1), α =

7 2

(4.1)

and ) 1 1 1 −1 ( 2 t 3 u + v 2 − t− 4 , 6 8 ) 1 −1 1 −1 ( 2 2 g (t, u, v) = t 3 u + v − t 2 , 3 2 f (t, u, v) =

for t ∈ [0, 1], u, v ≥ 0. 1 1 1 1 We deduce p1 (t) = 18 t− 4 , p2 (t) = 21 t− 2 , k(t) = 31 t− 3 , ai (t) = 19 t− 3 , ci = 13 , i = 1, 2. h(u, v) = u2 + v 2 , and f (t, u, v) = +∞. lim min u→+∞ t∈[ 1 , 3 ] u 4 4 So all conditions of Theorem 3.1 are satisfied. Hence it follows from Theorem 3.1 that BVP (4.1) has at least one positive solution. 9

278

Xiaofeng Zhang ET AL 270-279

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Example 4.2. Consider the following system of fractional differential equations  ( ) 7 1 1 1 1 −1  2  5 D t ln(1 + u) + − t− 8 , 0 < t < 1, u(t) =    0+ 10 ( v + 1) 16 7 1 1 1 1 1 2 D0+ v(t) = t− 5 ln(1 + u) + − t− 4 , 0 < t < 1,    5 v + 1 4   u(0) = u(1) = u′ (0) = u′ (1) = v(0) = v(1) = v ′ (0) = v ′ (1) = 0. In BVP (4.2), α =

7 2

(4.2)

and

( ) 1 1 1 1 −1 5 ln(1 + u) + f (t, u, v) = t − t− 8 , 10 v+1 16 ( ) 1 1 1 1 −1 5 ln(1 + u) + g (t, u, v) = t − t− 4 , 5 v+1 4

for t ∈ [0, 1], u, v ≥ 0. We deduce p1 (t) = 1 , and ln(1 + u) + v+1

1 − 18 , p2 (t) 16 t

=

lim

1 − 14 , k(t) 4t

=

1 − 51 , ai (t) 5t

=

1 − 15 , ci 15 t

=

1 3, i

= 1, 2. h(u, v) =

min f (t, u, v) = +∞,

u→+∞ t∈[ 1 , 3 ] 4 4

h(u, v) lim = 0. u,v→+∞ u So all conditions of Remark 3.2 are satisfied. Hence it follows from Corollary 3.2 that BVP (4.2) has at least one positive solution.

References [1] R.P. Agarwal, D. ORegan, A coupled system of boundary value problems, Appl. Anal. 69 (1998) 381-385. [2] Z. Bai, H. L¨ u, Positive solutions for boundary value problem of nonlinear fractional differential equation, J. Math. Anal. Appl. 311 (2005) 495-505. [3] C. Bai, Positive solutions for nonlinear fractional differential equations with cofficient that changes sign, Nonlinear Anal. 64 (2006) 677-685. [4] X. Feng, H. Feng, H. Tan, Y. Du, Positive solutions for systems of a nonlinear fourth-order singular semipositone Sturm-Liouville boundary value problem, J. Appl. Math. Comput. 41 (2013) 269-282. [5] D. Guo, V. Lakshmikantham, Nonlinear Problems in Abstract Cones, Academic Press Inc, New York, 1988. [6] J. Henderson, R. Luca, Existence of positive solutions for a system of semipositone fractional boundary value problems, Electron. J. Qual. Theory Differ. Equ. 22 (2016) 1-28. [7] I. Podlubny, Fractional Differential Equations, Academic Press, SanDiego, 1999. [8] Y. Wang, L. Liu, Y. Wu, Positive solutions for a class of fractional boundary value problem with changing sign nonlinearity, Nonlinear Anal. 74 (2011) 6434-6441. [9] X. Xu, D. Jiang, C.Yuan, Multiple positive solutions for the boundary value problem of a nonlinear fractional differential equation, Nonlinear Anal. 71 (2009) 4676-4688. [10] C. Yuan, D. Jiang, X. Xu, Singular positone and semipositone boundary value problems of nonlinear fractional differential equations, Math. Probl. Eng. 2009 (2009) 1-17. Article ID 535209. [11] F. Zhu, L. Liu, Y. Wu, Positive solutions for systems of a nonlinear fourth-order singular semipositone boundary value problems, Appl. Math. Comput. 216 (2010) 448-457. [12] S. Zhang, Positive solutions for boundary value problems of nonlinear fractional differential equations, Electron. J. Diff. Equ. 36 (2006) 1-12.

10

279

Xiaofeng Zhang ET AL 270-279

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Existence and uniqueness of positive solutions of fractional differential equations with infinite-point boundary value conditions∗ Qianqian Leng, Jiandong Yin†, Pinghua Yan Department of Mathematics, Nanchang University, Nanchang 330031, PR China. E-mail: [email protected](Q. Leng); [email protected](J. Yin); [email protected] (P. Yan).

Abstract In this work, we consider the following nonlinear fractional differential equation with infinite-point boundary value condition  Dα x(t) + r(t)f (t, x(t)) + q(t) = 0, t ∈ (0, 1),      x(0) = x0 (0) = · · · = xn−2 (0) = 0, (0.1) ∞ X   xi (1) =  α x(ξ ), j j  j=1

where α > 2, n − 1 < α < n, i ∈ [0, n − 2] is a fixed integer, αj ≥ 0, 0 < ξ1 < ξ2 < · · · < ξj−1 < ξj < · · · < 1(j = 1, 2, . . .), ∆−

∞ X

αj ξjα−1 > 0 and

j=1

( ∆=

1, i = 0, (α − 1)(α − 2) · · · (α − i), i ∈ (0, n − 2].

(0.2)

By the Lipschitz constant related to the first eigenvalue corresponding to the relevant operator and a µ0 bounded positive operator, we prove the existence and uniqueness of the positive solution of the fractional differential equation(0.1). Finally an example is given to illustrate the effectiveness of our result.

Keywords: fractional differential equations; µ0 -bounded positive operators; the first eigenvalues; Green functions; completely continuous operators

1

Introduction

In recent years, boundary value problems of nonlinear fractional differential equations have been studied extensively in resent works [1–8]. Most of the results have at least one and multiple positive solutions by the theory of nonlinear analysis. For example, the authors [1] considered the existence of multiple positive solutions of the following fractional differential equation  Dα x(t) + q(t)f (t, x(t)) = 0, t ∈ (0, 1),      x(0) = x0 (0) = · · · = xn−2 (0) = 0, (1.1) ∞ X   i  αj x(ξj ),  x (1) = j=1

∗ The

work was supported by the Foundation of Department of Education of Jiangxi Province(No. GJJ1520008). author

† Corresponding

1

280

Qianqian Leng ET AL 280-287

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

where Dα is the standard Riemann-Liouville derivative α > 2, n − 1 < α < n and i ∈ [1, n − 2] is a ∞ X fixed integer, αj ≥ 0, 0 < ξ1 < ξ2 < · · · < ξj−1 < ξj < · · · < 1(j = 1, 2, . . .), ∆ − αj ξjα−1 > 0, j=1

∆ = (α − 1)(α − 2) · · · (α − i). They established the existence results by introducing height function and Guo-Krasnosel’skii fixed point theorem of cone expansion-compression and obtained several local existence and multiplicity of positive solutions. In [2] the authors studied the existence of solutions of the following fractional differential equation: ( − Dα x(t) = q(t)f (t, x(t)) − p(t), 0 < t < 1, (1.2) x(0) = x0 (0) = x(1) = 0, where Dα is the standard Riemann-Liouville derivative, 2 < α ≤ 3 is a real number, p : (0, 1) → [0, +∞) is Lebesgue integrable and may be singular at some zero measure set of (0, 1). They obtained that the existence and multiplicity of positive solutions by Krasnosel’skii fixed point theorem. In [3] the authors studied the fractional differential equation ( − Dα x(t) = q(t)f (t, x(t)) + p(t), 0 < t < 1, (1.3) x(0) = x0 (0) = x(1) = 0, where 2 < α ≤ 3 is a real number, and got the uniqueness of solution under the assumption that f (t, x) is a Lipschitz continuous function. Some similar results of the existence and multiplicity of positive solutions can refer to [5, 7–10, 12, 13]. But the uniqueness of positive solutions of fractional differential equations are seldom considered in recent works. Motivated by the above results, we study the existence and uniqueness of the positive solution of the fractional differential equation (0.1) under the assumption that f (t, x) is a Lipschitz continuous function. Then we obtain some results by the basic properties of µ0 -bounded positive operators. Our results extend the corresponding results of [1, 3, 4]. For the sake of description, we list three conditions as follows: (L1) q : (0, 1) → R is continuous and Lebesgue integrable; (L2) r : (0, 1) → [0, +∞) is a continuous function which does not vanish identically on any subinterval of (0, 1) and satisfies Z 1 0< r(s)ds < +∞; 0

(L3) f : [0, 1] × R → [0, +∞) is continuous.

2

Preliminaries

For the convenience of the reader, we present the necessary definitions and lemmas from fractional calculus theory. These definitions and lemmas can be found in monographs [1–6, 10]. Definition 2.1. ([10]) The Riemann-Liouville fractional integral of order α > 0 of a function f : (0, +∞) → R is given by Z t 1 (t − s)(α−1) f (s)ds, I α f (t) = Γ(α) 0 provided that the right-hand side is point wise defined on (0, +∞). Definition 2.2. ([10]) The Riemann-Liouville fractional derivative of order α > 0 of a continuous function f : (0, +∞) → R is given by Z 1 d n t α D f (t) = ( ) (t − s)(n−α−1) f (s)ds, Γ(n − α) dt 0 where n − 1 ≤ α < n, provided that the right-hand side is point wise defined on (0, +∞). 2

281

Qianqian Leng ET AL 280-287

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Lemma 2.1. ([10]) Assume that x ∈ C(0, 1)

T

L(0, 1) with a fractional derivative of order α > 0, then

I α Dα x(t) = x(t) + c1 tα−1 + c2 tα−2 + · · · + cn tα−n , where ci ∈ R(i = 1, 2, · · · , n), n is the smallest integer greater than or equal to α. In this paper the norm of E = C[0, 1] is defined by kxk = max |x(t)| and P = {x ∈ E|x(t) ≥ 0, t ∈ [0, 1]} t∈[0,1]

is a cone of E. The following conceptions come from Krasnosel’skill [12] and [1]. Definition 2.3. ([4]) A bounded linear operator T : E → E is called a µ0 -bounded positive operator if there exists µ0 ∈ E \ (−P ) such that for each x ∈ E \ (−P ), there exist a natural number n and positive constants α(x), β(x) such that α(x)µ0 ≤ T n x ≤ β(x)µ0 . Lemma 2.2. ([4]) Suppose that T : E → E is a completely continuous µ0 -bounded positive operator and T (P ) ⊂ P . If there exist ψ ∈ E \ (−P ) and a constant c > 0 such that cT ψ ≥ ψ, then the spectral radius r(T ) 6= 0 and T has only one positive eigenfunction ϕ corresponding to its first eigenvalue λ1 = (r(T ))−1 , i.e. ϕ = λ1 T ϕ. T Lemma 2.3. Given y ∈ C[0, 1] L[0, 1], then the unique solution of the following equation:  Dα x(t) + y(t) = 0, t ∈ (0, 1),      x(0) = x0 (0) = · · · = xn−2 (0) = 0, (2.1) ∞ X   i  αj x(ξj ),  x (1) = j=1

is Z x(t) =

1

G(t, s)y(s)ds, 0

where G(t, s) is Green’s function given by ( α−1 t p(s)(1 − s)α−1−i − p(0)(t − s)α−1 , 0 ≤ s ≤ t ≤ 1, 1 G(t, s) = p(0)Γ(α) tα−1 p(s)(1 − s)α−1−i , 0 ≤ t ≤ s ≤ 1, here p(s) = ∆ −

P

s≤ξj

(2.2)

ξ −s

j αj ( 1−s )α−1 (1 − s)i .

Proof. The proof is similar to that of Lemma 2.2 of [4], so we omit the details. Lemma 2.4. (1)The function p(s) in Lemma 2.3 satisfies that p(s) > 0 and p(s) is increasing on [0, 1]; (2)For each s ∈ [0, 1], we have m1 s + p(0) ≤ p(s) ≤ M1 + p(0), where M1 = sup 0 0 such that T (|x1 − x0 |)(t) ≤ βµ0 (t), ∀t ∈ [0, 1]. For all m ∈ N we have |xm+1 − xm | = |Axm (t) − Axm−1 (t)| Z 1 Z 1 G(t, s)[r(s)f (s, xm−1 (s)) + q(s)]ds G(t, s)[r(s)f (s, xm (s)) + q(s)]ds − = 0 0 Z 1 ≤ G(t, s)r(s)|f (s, xm (s) − f (s, xm−1 (s))|ds ≤ kλ1 T (|xm − xm−1 |)(t) 0



m m m m−1 · · · ≤ k m λm µ0 = k m λ1 βµ0 . 1 T (|x1 − x0 |)(t) ≤ k λ1 βT

Then for any n ≥ m ∈ N, |xn − xm | = |xn − xn−1 + xn−1 − xn−2 + xn−2 + · · · + xm−1 − xm | ≤ |xn − xn−1 | + |xn−1 − xn−2 | + · · · + |xm−1 − xm | km ≤ βλ1 [k n−1 + k n−2 + · · · + k m ]µ0 ≤ βλ1 µ0 . 1−k m

k So kxn − xm k ≤ βλ1 1−k kµ0 k → 0(m → ∞). By the completeness of E, there exists x∗ ∈ E such that ∗ lim xn = x . Due to xn = Axn−1 and noting that A is continuous, we obtain that x∗ = Ax∗ (n → ∞). In n→∞ other words, x∗ is a fixed point of A. Suppose y ∗ is another fixed point of A and x∗ 6= y ∗ . From Lemma 2.5 and Definition 2.3, there exists β = β(|x∗ − y ∗ |) > 0 such that T (|x∗ − y ∗ |)(t) ≤ βµ0 , ∀t ∈ [0, 1].

For all n ∈ N we have

|x∗ (t) − y ∗ (t)| = |An x∗ (t) − An y ∗ (t)| ≤ k n βλ1 µ0 ,

so kx∗ (t) − y ∗ (t)k ≤ k n βλ1 kµ0 k → 0(n → ∞) which implies x∗ = y ∗ . This means that A has a unique fixed point. Theorem 3.2. Suppose that (L1) − (L3) hold and there exist k ∈ [0, 1) and x0 ∈ E such that (1) Dα x0 (t) + r(t)f (t, x0 (t)) + q(t) ≥ 0, t ∈ (0, 1); (2) x0 (0) = x00 (0) = · · · = xn−2 (0) ≥ 0; 0 ∞ X (3) xi0 (1) ≥ αj x0 (ξj ) and j=1

(4) |f (t, u) − f (t, v)| ≤ kλ1 |u − v|, ∀t ∈ [0, 1], u(t), v(t) ∈ Ω, where f (t, x) is non-descending in x, Ω = {x ∈ E|x ≤ x0 } and λ1 is the first eigenvalue of T . Then the equation (0.1) has a unique positive solution x∗ in Ω. Proof. According to Lemma 2.3 we can get that A is decreasing on Ω, Ax0 ≤ x0 and A(Ω) ⊂ Ω. Let xn = Axn−1 (n = 1, 2, · · · ), then we have x0 ≥ x1 ≥ · · · xn ≥ · · · . According to Definition 2.3, there exists β > 0 such that T (x0 − x1 ) ≤ βµ0 (t). Then for each n ∈ N and t ∈ [0, 1], 0 ≤ xn (t) − xn+1 (t) = Axn−1 (t) − Axn (t) ≤ kλ1 T (xn−1 − xn )(t) ≤ · · · ≤ (kλ1 T )n (x0 − x1 )(t) ≤ βk n λ1 µ0 (t). 6

285

Qianqian Leng ET AL 280-287

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Then for every n ≥ m ∈ N, |xn − xm | = |xn − xn−1 + xn−1 − xn−2 + xn−2 + · · · + xm−1 − xm | ≤ |xn − xn−1 | + |xn−1 − xn−2 | + · · · + |xm−1 − xm | km ≤ βλ1 [k n−1 + k n−2 + · · · + k m ]µ0 ≤ βλ1 µ0 . 1−k m

k kµ0 k → 0(m → ∞). By the completeness of E, there exists x∗ ∈ E such that So kxn − xm k ≤ βλ1 1−k ∗ lim xn = x . Furthermore, x∗ is a fixed point of A in Ω. n→∞ Suppose y ∗ ∈ Ω is another fixed point of A. By Lemma 2.5 and Definition 2.3, there exists β1 = β1 (x0 − y ∗ ) > 0 such that T (x0 − y ∗ )(t) ≤ β1 µ0 (t), ∀t ∈ [0, 1].

For all n ∈ N we have y ∗ ≤ xn ≤ x0 , so y ∗ ≤ x∗ ≤ xn ≤ x0 . Then we have |y ∗ (t) − x∗ (t)|

≤ |y ∗ (t) − xn (t)| + |xn (t) − x∗ (t)| ≤ 2|y ∗ (t) − xn (t)| = |An y ∗ (t) − An x0 (t)| ≤ 2k n β1 µ0 (t).

Thus y ∗ = x∗ which implies that A has a unique fixed point in Ω. Theorem 3.3. Suppose that (L1) − (L3) hold and there exist k ∈ [0, 1) and x0 ∈ E such that (1) Dα x0 (t) + r(t)f (t, x0 (t)) + q(t) ≤ 0, t ∈ (0, 1); (2) x0 (0) = x00 (0) = · · · = xn−2 (0) ≤ 0; 0 ∞ X (3) xi0 (1) ≤ αj x0 (ξj ) and j=1

(4) |f (t, u) − f (t, v)| ≤ kλ1 |u − v|, ∀t ∈ [0, 1], u(t), v(t) ∈ Ω, where f (t, x) is non-decreasing in x, Ω = {x ∈ E|x ≥ x0 } and λ1 is the first eigenvalue of T . Then the equation (0.1) has a unique positive solution x∗ in Ω. Proof. The proof is similar to that of Theorem 3.2, so we omit it. Example 3.1 Consider the following equation  7 2 2 2  2   D x(t) + λ(1 − t) ( 5 x(t) + 1 − sinx(t)) + t = 0, t ∈ [0, 1]    x(0) = x0 (0) = x00 (0) = 0, ∞  X  1 1  0   x (1) = ( )j x(1 − ( )j ),  2 2

(3.1)

j=1

where 0 ≤ λ ≤ λ1 , λ1 is the first eigenvalue of T , α = 27 , n = 4, i = 1, ∆ = 52 , r(t) = (1 − t)2 , f (t, x) = ( 25 x(t) + 1 − sinx(t)), q(t) = t2 , αj = ( 21 )j , ξj = 1 − ( 12 )j . By a careful calculation we get ∞ X 9 ∆− αj ξjα−1 > 0 and |f (t, u) − f (t, v)| ≤ 10 λ1 |u − v|. From Theorem 3.1, equation (3.1) has a unique j=1

solution. Example 3.2 Consider the following equation  5 1 7 9 λ 9   (1 − t) 4 ( x(t) + 1 + cosx(t)) + t 2 = 0, t ∈ [0, 1]  D 2 x(t) +  λ + 1 2 20    x(0) = x0 (0) = x00 (0) = x000 (0),  ∞  X  1 1   x(1) = (2j − 1)( )j+1 x(1 − ( )j ),   2 2

(3.2)

j=1

7

286

Qianqian Leng ET AL 280-287

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

5 4

where 0 ≤ λ ≤ λ1 , λ1 is the first eigenvalue of T , α = 92 , n = 5, i = 0, ∆ = 1, r(t) = (1−t) 1+λ , f (t, x) = 7 1 9 1 j+1 1 j 2 λ( 2 x(t) + 1 + 20 cosx(t)), q(t) = t , αj = (2j − 1)( 2 ) , ξj = 1 − ( 2 ) . By a careful calculation we get ∞ X ∆− αj ξjα−1 > 0 and |f (t, u) − f (t, v)| ≤ 19 20 λ1 |u − v|. From Theorem 3.1, equation (3.2) has a unique j=1

solution.

References [1] X. Zhang. Positive solutions for a class of singular fractional differential equation with infinite-point boundary value conditions[J]. Appl. Math. Lett., 39(2015)22-27. [2] X. Zhang, L. Liu, Y. Wu. Multiple positive solutions of a singular fractional differential equation with negatively perturbed term[J]. Math. Comput. Modelling., 55(2012)1263-1274. [3] Y. Cui. Uniqueness of solution for boundary value problems for fractional differential equations[J]. Appl. Math. Lett., 51(2016)48-54. [4] X. Lu, X. Zhang, L. Wang. Existence of positive solutions for a class of fractional differential equations with m-pointboundary value conditions[J]. J. Sys. Sci.& Math., 34(2)(2014)1-13. [5] X. Zhang, L. Liu, Y. Wu. The eigenvalue problem for a singular higher order fractional differential equation involving fractional derivatives[J]. Appl. Math. Comput., 218(2012)8526-8536. [6] X. Zhang, L. Liu, Y. Wu. The uniqueness of positive solution for a singular fractional differential system involving derivatives[J]. Commun. Nonlinear Sci. Numer. Simul., 18(2013)1400-1409. [7] A. A. Kilbas, H. M. Srivastava, J. J. Trujillo. Theory and Applications of Fractional Differential Equations[M]. Elsevier, Amsterdam. 2006. [8] V. Lakshmikantham, S. Lee, J. Vasundhara. Theory of Fractional Dynamic Systems[M]. Cambridge Academic Publishers, Cambridge, 2009. [9] B. Ahmad, J. J. Nieto. Existence results for a coupled system of nonlinear fractional differential equations with three-point boundary conditions[J]. Appl. Math. Comput., 58(2009)1838-1843. [10] S. G. Samko, A. A. Kilbas, O. I. Marichev. Fractional Integrals and Derivatives[M]. Theory and Applications, Gordonand Breach, Yverdon. 1993. [11] R. P. Agarwal, M. Benchohra, S. Hamani. A survey on existence results for boundary value problems of nonlinear fractional differential equations and inclusions[J]. Acta. Appl. Math., 109(2010)973-1033. [12] M. Krasnosel’skii. Positive Solutions of Operator Equations(M. A. Krasnosel’skii). Siam Review. 1966. [13] C. Li, X. Luo, Y. Zhou. Existence of positive solutions of the boundary value problem for nonlinear fractional differential equations[J]. Comput. Math. Appl.,59(2010)1363-1375.

8

287

Qianqian Leng ET AL 280-287

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

DYNAMICAL ANALYSIS OF A NON-LINEAR DIFFERENCE EQUATION Erkan Ta¸sdemir1 , Yüksel Soykan2 1 K¬rklareli University, P¬narhisar Vocational School of Higher Education, 39300, K¬rklareli, Turkey. [email protected] 2 Bülent Ecevit University, Art and Science Faculty, Department of Mathematics, 67100, Zonguldak, Turkey. [email protected] Abstract In this article, we investigate the dynamics of the solutions of the following non-linear di¤erence equation xn+1 = xn

2 xn 3

1; n 2 N0

with arbitrary initial conditions x 2; x 1; x0 . Besides, we have studied periodic behaviours of related di¤erence equation especially asymptotic periodicity and eventually periodicity. Then, we have researched unbounded solutions of di¤erence equation. Key Words : Di¤erence equation, equilibrium point, periodicity, asymptotic periodicity, unbounded. Mathematics Subject Classi…cation : 39A10, 39A23.

1

Introduction

Recently, the di¤erence equations became a very popular topic among mathematicians. Di¤erence equations have applications in many …elds of science such as biology in [12], [8] and [10], economics in [1] and so forth. Up to the present, many authors investigated to dynamics of various forms of di¤erence equation xn+1 = xn k xn l 1; n 2 N0 such as k = 0, l = 1 in [4]; k = 0, l = 2 in [6]; k = 1, l = 2 in [5]; k = 0, l = 3 in [7]. Besides, Stevi´c and Iriµcanin have obtained some results regarding the general form of the related di¤erence equation in [18]. In this work we will study dynamic behaviours of the di¤erence equation xn+1 = xn

2 xn 3

1; n 2 N0 .

(1)

The Di¤. Eq.(1) belongs to the class of equations of the form xn+1 = xn

k xn l

1; n 2 N0 ,

(2)

with speci…c selection of k and l, where k; l 2 N0 . 1

288

Erkan Ta¸sdemir ET AL 288-301

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

This work can be considered as a continuance of our systematic analysis of Di¤. Eq.(2). There are two equilibrium points of Di¤. Eq.(1) respectively: p p 5 1 1+ 5 x1 = ; x2 = . (3) 2 2 Note that this equilibrium points are the Golden Number and its conjugate.

2

Existence of Periodicity of Di¤. Eq.(1)

In this section, we show that Di¤. Eq.(1) has minimal prime periodic solutions with period seven. Also Di¤. Eq.(1) has eventually periodic solutons with period seven. Theorem 1 Di¤ . Eq.(1) has no eventually constant solutions. Proof. If fxn g1 n= 3 is eventually constant solutions of Di¤ . Eq.(1), hence xN = xN +1 = xN +2 = xN +3 = x, for some N 2 N0 , where x is an equilibrium point. However, Di¤ . Eq.(1) gives xN +3 = xN xN 1 1, which implies xN

1

=

x+1 xN +3 + 1 = x. = xN x

Repetition the procedure, we get that xn = x for proof is completed.

3

n

N + 3. Then, the

Theorem 2 There are no nontrivial nor eventually period-two solutions of Di¤ . Eq.(1). Proof. Suppose that xN = xN +2k and xN +1 = xN +2k+1 ; for all k 2 N0 , and some N 1, with xN 6= xN +1 . Therefore, we have xN +4

= = = =

xN +1 xN xN 1 xN xN 1 xN xN 3 xN

1 1 = xN +3 1 = xN +2 2 1 = xN +1 2

(4) (5) (6) (7)

From (5)-(7) and since xN +4 = xN we arrive a contradiction, as desired. Theorem 3 Di¤ . Eq.(1) has no minimal prime period-three solutions. Proof. Let fxn g1 n= 3 be a prime period-three solution of Di¤. Eq.(1). Then, x3n 3 = a; x3n 2 = b; x3n 1 = c and x3n = a for all n 2 N0 and a; b and c 2 R such that at least two are di¤erent from each other. From Di¤. Eq.(1), we have x1 x2 x3

= x 2 x 3 1 = ba 1 = b = x 1 x 2 1 = cb 1 = c = x0 x 1 1 = ac 1 = a

(8) (9) (10)

2

289

Erkan Ta¸sdemir ET AL 288-301

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

From (8)-(10) we obtain that a = b = c = x1 or a = b = c = x2 : Thus, the proof is completed. Theorem 4 Di¤ . Eq.(1) has no minimal prime period-four solutions. Proof. Let fxn g1 n= 3 be a prime period-four solution of Di¤. Eq.(1). Then, x4n 3 = a; x4n 2 = b; x4n 1 = c and x4n = d for all n 2 N0 and a; b; c and d 2 R such that at least two of them are di¤erent. From Di¤. Eq.(1), we have x1 x2 x3 x4

= = = =

x 2 x 3 1 = ba 1 = a x 1 x 2 1 = cb 1 = b x0 x 1 1 = dc 1 = c x1 x0 1 = ad 1 = d:

(11) (12) (13) (14)

From (11)-(14) we obtain that a = b = c = d = x1 or a = b = c = d = x2 as desired. Theorem 5 Di¤ . Eq.(1) has no minimal prime period-…ve solutions. Proof. Let fxn g1 n= 3 be a periodic solution of Di¤. Eq.(1) with minimal prime period-…ve. Then, x5n 3 = a; x5n 2 = b; x5n 1 = c; x5n = d and x5n+1 = e for all n 2 N0 and a; b; c; d and e 2 R such that at least two of them are di¤erent. From Di¤. Eq.(1), we obtain x1 x2 x3 x4 x5

= = = = =

x 2 x 3 1 = ba 1 = e x 1 x 2 1 = cb 1 = a x0 x 1 1 = dc 1 = b x1 x0 1 = ed 1 = c x2 x1 1 = ae 1 = d:

(15) (16) (17) (18) (19)

From (15)-(19) we have a = b = c = d = e = x1 or a = b = c = d = e = x2 as desired. 3

290

Erkan Ta¸sdemir ET AL 288-301

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Theorem 6 Di¤ . Eq.(1) has no period solutions with minimal prime periodsix. 1

Proof. Let fxn gn= 3 x6n 3 = a; x6n 2 = b; f = bd 1 for all n 2 them are di¤erent. We

be a prime period-six solution of Di¤. Eq.(1). Then, x6n 1 = c; x6n = d; x6n+1 = e = ac 1 and x6n+2 = N0 and a; b; c; d; e and f 2 R such that at least two of have

x1 x2 x3 x4 x5 x6

= = = = = =

x 2 x 3 1 = ab 1 = e x 1 x 2 1 = bc 1 = f x0 x 1 1 = cd 1 = a x1 x0 1 = de 1 = b x2 x1 1 = ef 1 = c x3 x2 1 = f a 1 = d.

(20) (21) (22) (23) (24) (25)

From (20)-(25) we obtain a = b = c = d = e = f = x1 or a = b = c = d = e = f = x2 as desired. Theorem 7 There are periodic solutions of Di¤ . Eq.(1) with minimal prime period-seven if and only if (i) x

3

= 0; x

(ii) x

3

=

1; x

2

= m; x

(iii) x

3

=

1; x

2

=

(iv) x

3

= m; x

(v) x

3

=

2

= m; x

2

1; x

= 2

1

= 1

1; x 1; x

=

1; x

1;

= 0; x0 = 0; 1

1

1; x0 =

=

= 1

1; x0 = m; 1; x0 =

1;

= m; x0 = 0;

where m is arbitrary. 1

Proof. Let fxn gn= 3 be a periodic solution of Di¤. Eq.(1) with minimal prime period-seven. Then, x7n 3 = a; x7n 2 = b; x7n 1 = c; x7n = d; x7n+1 = e = ac 1; x7n+2 = f = bc 1 and x7n+3 = g = cd 1 for all n 2 N0 and a; b; c; d; e; f and g 2 R such that at least two are di¤erent from each other. We have x1 x2 x3 x4 x5 x6 x7

= = = = = = =

x 2 x 3 1 = ab 1 = e x 1 x 2 1 = bc 1 = f x0 x 1 1 = cd 1 = g x1 x0 1 = de 1 = a x2 x1 1 = ef 1 = b x3 x2 1 = f g 1 = c x4 x3 1 = ga 1 = d: 4

291

Erkan Ta¸sdemir ET AL 288-301

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Thus, the following equalities are obtained: x4 x5 x6 x7

= = = =

d(ab 1) 1 = a (ab 1)(bc 1) 1 = b (bc 1)(cd 1) 1 = c (cd 1)a 1 = d:

(26) (27) (28) (29)

From (26)-(29), then by direct calculation we have Case 1 a = 0; c =

1; d =

1;

Case 2 a =

1; c = 0; d = 0;

Case 3 a =

1; b =

1; c =

1;

Case 4 b =

1; c =

1; d =

1;

Case 5 a =

1; b =

1; d = 0;

and so, x

3

x

= 0; x

3

=

3

=

x

3

= m; x

3

1; x

=

= m; x

1; x

x

x

2

2

2 2

1; x

1

=

= m; x

1

=

1; x

=

1; x =

2

1 1

1; x

1; x0 =

1

= 0; x0 = 0

=

1; x0 = m

=

1; x0 =

1

1

= m; x0 = 0

where m is arbitrary as desired. Consequently, all minimal prime period-seven solutions are of the forms; Case 1 If x

3

= 0; x

Case 2 If x

3

=

1; x

2

= m; x

Case 3 If x

3

=

1; x

2

=

Case 4 If x

3

= m; x

Case 5 If x

3

=

2

1; x

= m; x

2

= 2

=

1

= 1

1; x 1; x 1; x

1, then ( 1; m 1; 0; 0; m; 1; 1; :::);

= 0; x0 = 0, then ( m 1; 1; 1; 1; m; 0; 0; :::); 1

1

1; x0 =

=

= 1

1; x0 = m, then (0; 0; m 1; 1; 1; 1; m; :::); 1; x0 =

1, then ( m 1; 0; 0; m; 1; 1; 1; :::);

= m; x0 = 0, then (0; m 1; 1; 1; 1; m; 0; :::).

From now on, we will refer to any one of these seven periodic solution of Di¤. Eq.(1) as :::; 1; 1; 1; m; 0; 0; m 1; ::: (30) where m is arbitrary.

5

292

Erkan Ta¸sdemir ET AL 288-301

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Theorem 8 There are eventually periodic solutions with minimal period-seven and they have two forms, respectively: Form 1: (x

3 ; x 2 ; x 1 ; x0 ; :::; xN ; xN +1 ; xN +2 ; xN +3 ;

1; 1; 1; m; 0; 0; m

where, N 3, xN +1 xN = 0; xN +2 xN +1 = 0; xN +3 xN +2 = 0, and, if N 6= xn 2 = (xn+1 + 1) =xn 3 for 0 n N . Form 2: (x

3 ; x 2 ; x 1 ; x0 ; :::; xN ; xN +1 ; xN +2 ; xN +3 ; 0; 0;

m

1; :::)

3,

1; 1; 1; 1; m; :::)

where, N 3, xN +1 xN = 1; xN +2 xN +1 = 1, and, if N 6= (xn+1 + 1) =xn 3 for 0 n N .

3, xn

2

=

1

Proof. Form 1: Let fxn gn= 3 be a solution of Di¤. Eq.(1) that is eventually periodic with prime period-seven. Then by Theorem 7, there is an N 3 such that xN +4 = 1; xN +5 = 1 and xN +6 = 1. Then, 1 = xN +4 = xN xN +1 1 and consequently xN xN +1 = 0. Hence, 1 = xN +5 = xN +2 xN +1 1 and then xN +2 xN +1 = 0. Hence, 1 = xN +6 = xN +3 xN +2 1 and so xN +3 xN +2 = 0: Therefore, xN +7 xN +8 xN +9 xN +10 xN +11

= = = = =

xN +4 xN +3 xN +5 xN +4 xN +6 xN +5 xN +7 xN +6 xN +8 xN +7

1=m 1=0 1=0 1= m 1 = 1.

1

From Di¤. Eq.(1), if N 6= 3, we get xn 1 = (xn+1 + 1) =xn 3 , for 0 n N , as desired. 1 Form 2: Let fxn gn= 3 be a solution of Di¤. Eq.(1) that is eventually periodic with prime period-seven. Then by Theorem 7, there is an N 3 such that xN +4 = 0; xN +5 = 0 and xN +6 = m 1. Then, 0 = xN +4 = xN xN +1 1 and consequently xN xN +1 = 1. Hence, 0 = xN +5 = xN +2 xN +1 1 and then xN +2 xN +1 = 1. Hence, m 1 = xN +6 = xN +3 xN +2 1 and so xN +3 xN +2 = m: Therefore, xN +7 xN +8 xN +9 xN +10 xN +11 From Di¤. Eq.(1), if N 6= as desired.

= = = = =

xN +4 xN +3 xN +5 xN +4 xN +6 xN +5 xN +7 xN +6 xN +8 xN +7

3, we get xn

1

1= 1 1= 1 1= 1 1=m 1 = 0.

= (xn+1 + 1) =xn

1

3,

Remark 9 Let fxn gn= 3 be a solution of Di¤ . Eq.(1). If x x 1 x0 = 1, then xn converges to period-seven cycle as ; 0; 0; 0; 1; 1; 1; 1;

.

for 0 3x 2

n

N,

= 1 and (31)

6

293

Erkan Ta¸sdemir ET AL 288-301

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. Let x From Eq.(1),

3

= a; x

2

= 1=a; x

x1 x2 x3 x4

= x

1

= b and x0 = 1=b for a 6= 0 and b 6= 0.

2x 3

1=0 b = x 1x 2 1 = a = x0 x 1 1 = 0 = x1 x0 1 = 1.

1

Hence, by induction Di¤. Eq.(1) converges to period-seven cycle as (31). The proof is completed.

3

Asymptotically Periodic Solution of Di¤. Eq.(1)

In this section, we study the existence of asymptotic periodic solutions of Di¤. Eq.(1). Di¤. Eq.(1) has the seven-periodic solutions as (30) for the initial conditions x 3 ; x 2 ; x 1 ; x0 2 ( 1; 0). Focus on the asymptotically seven-periodic solu(0) (1) (2) (3) tions, we get uk = xn+7k ; uk = xn+7k 1 ; uk = xn+7k 2 ; uk = xn+7k 3 ; (4) (5) (6) uk = xn+7k 4 ; uk = xn+7k 5 and uk = xn+7k 6 . Now, we make the ansatz as in [11]: (0)

uk

(1)

uk

(2)

uk

(3)

uk

(4)

uk

(5)

uk

(6)

uk

= = = = = = =

1 X

v=0 1 X v=0 1 X

v=0 1 X v=0 1 X v=0 1 X v=0 1 X

av pv tvk ; a0 = m;

(32)

bv pv tvk ; b0 = 0;

(33)

cv pv tvk ; c0 = 0;

(34)

dv pv tvk ; d0 =

m

ev pv tvk ; e0 =

1;

(36)

fv pv tvk ; f0 =

1;

(37)

gv pv tvk ; g0 =

1;

(38)

1;

(35)

v=0

with arbitrary p and m 2 ( 1; 0). We choose p > 0 and from Eq.(1), it

7

294

Erkan Ta¸sdemir ET AL 288-301

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

follows that: (0)

uk

(3) (4)

1

(2) (3) uk uk (1) (2) uk uk (0) (1) uk uk (6) (0) uk+1 uk (5) (6) uk+1 uk+1 (4) (5) uk+1 uk+1

1

= uk uk

(6) uk+1 (5) uk+1 (4) uk+1 (3) uk+1 (2) uk+1 (1) uk+1

= = = = = =

1 1 1 1 1:

Substitution of (32)-(38) into these equations. Hence, when we compare the coe¢ cients, we obtain that a1 a2

= b1 = c1 = d1 = e1 = f1 = g1 = 0 = b2 = c2 = d2 = e2 = f2 = g2 = 0

and by induction, an = bn = cn = dn = en = fn = gn = 0; for all n > 0. P1 (0) Therefore xn+7k = uk = v=0 av pv tvk = m + 0 + 0 + :::, so xn+7k converges to m: Similarly, xn+7k 1 converges to 0, xn+7k 2 converges to 0; xn+7k 3 converges to m 1; xn+7k 4 converges to 1; xn+7k 5 converges to 1 and xn+7k 6 converges to 1. Hence, the proof is complete.

4

Stability of Di¤. Eq.(1)

In this section, we examine the stability of the two equilibria of Di¤. Eq.(1). Theorem 10 The positive equilibrium point of Di¤ . Eq.(1), x2 , is unstable. Proof. The characteristic equation of equilibria of Di¤. Eq.(1) is the following: 4

x2

x2 = 0

with eigenvalues 1 2 3;

Therefore, j 1 j < 1 and j saddle point.

4

0; 7756; 1; 4044; 0; 3142 1; 1773i:

2j ; j 3j ; j 4j

> 1. Herewith, x2 is unstable, which is a

Theorem 11 The negative equilibrium point of Di¤ . Eq.(1), x1 , is unstable. 8

295

Erkan Ta¸sdemir ET AL 288-301

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. The characteristic equation of equilibria of Eq.(1) is the following: 4

x1

x1 = 0

with eigenvalues

Therefore, j 1 j ; j saddle point.

5

2j

1;

2

3;

4

0; 6412 0; 6412

< 1 and j

3j ; j 4j

0; 4125i 0; 8075i:

> 1. So, x1 is unstable and which is a

Existence of Unbounded Solutions of Di¤. Eq.(1)

Now, we work the existence of unbounded solutions of Di¤. Eq.(1). 1

Theorem 12 Let fxn gn= x2 =

p 1+ 5 2 ,

(i) x

2

3

be a solution of Di¤ . Eq.(1). If x

3 ; x 2 ; x 1 ; x0

>

the following statements hold true:

< x1 < x4
1+2 5 , we have x 1 1 < 1+2p5 = 1

2p 1+ 5

1.

> x0 + 1. Therefore, x0 x

1

1 > x0 .

9

296

Erkan Ta¸sdemir ET AL 288-301

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Since x1 > x

2

>

p 1+ 5 2 ,

1+

we have

1 1 + x11 . Hence, x1 x0 > x1 + 1. Therefore, x1 x0 x1 < x4 . Hence, by induction it easily follows that x x

2 1

x0

< x1 < x4 < < x2 < x5 < < x3 < x6
x1 . Thus,

(39) (40) (41)

.

(ii) Suppose one of (39)-(41) subsequences given in (i) is bounded. Hence, from Di¤. Eq.(1), we obtain xn

3

=

1 + xn+1 ; n 2 N0 : xn 2 1

1

1

Therefore, the subsequences (x3n )n=0 ; (x3n 1 )n=0 and (x3n 2 )n=0 must be convergent. Thereby, there are two situations for whole solution of Di¤. Eq.(1). Then, in the …rst case, all solution of Di¤. Eq.(1) converges to a periodic solution with period three. But this is not possible. Because, there are not nontrivial period three solution of Di¤. Eq.(1). In the other case, all solution of Di¤. Eq.(1) converge to an equilibria. Unfortunately, this is impossible. Because the initial conditions x 3 ; x 2 ; x 1 and x0 are bigger then the largest equilibria. This is a contradiction, as desired.

6

Numerical Examples

In this section, we present graphs of the some results. Example 13 If the initial conditions are x 3 = 1; x 2 = 1; x 1 = 1, x0 = m and m = 2, then Di¤ . Eq.(1) has periodic solutions with minimal

10

297

Erkan Ta¸sdemir ET AL 288-301

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

prime period-seven as (30). The following graph shows this status.

x

Graph 1: The initial conditions are x 3 = 1; 1; x 1 = 1; x0 = m and m = 2 for Di¤ . 2 = Eq.(1).

122625 Example 14 If the initial conditions are x 3 = 1376256 ; x 2 = 21504 1125 ; x 1 = 64 225 and x = , then Di¤ . Eq.(1) has eventually seven-periodic solutions as 0 1024 9 Theorem 8. The next graph illustrates this condition.

122625 Graph 2: The initial conditions are x 3 = 1376256 ; 21504 225 64 x 2 = 1125 ; x 1 = 1024 and x0 = 9 for Di¤ . Eq.(1).

Example 15 If the initial conditions are x 3 = 23 ; x 2 = 23 ; x 1 = 15 and x0 = 5, then Di¤ . Eq.(1) converges to seven-periodic solutions as Remark 9.

11

298

Erkan Ta¸sdemir ET AL 288-301

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

The following graph shows this situation.

Graph 3: The initial conditions are x 3 = 32 ; x 2 = 32 ; x 1 = 15 and x0 = 5 for Di¤ . Eq.(1). Example 16 If the initial conditions are x 3 = 0:45; x 2 = 0:55; x 1 = 0:7 and x0 = 0:75, then Di¤ . Eq.(1) has asymptotically seven-periodic solutions. The next graph illustrates this condition.

Graph 4: The initial conditions are x x 2 = 0:55; x 1 = 0:7 and x0 = Di¤ . Eq.(1).

3

= 0:45; 0:75 for

Example 17 If the initial conditions are x 3 = 1:63; x 2 = 1:64; x 1 = 1:62 and x0 = 1:63, then Di¤ . Eq.(1) has unbounded solutions as Theorem 12. The

12

299

Erkan Ta¸sdemir ET AL 288-301

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

following graph illustrates this case.

Graph 5: The initial conditions are x 3 = 1:63; x 2 = 1:64; x 1 = 1:62 and x0 = 1:63 for Di¤ . Eq.(1).

References [1] A.A. Elsadany, A dynamic cournot duopoly model with di¤ erent strategies, J. Egyptian Math. Soc., 23(1) (2015), pp. 56-61. [2] A.M. Amleh, E. Camouzis, and G. Ladas, On the dynamics of a rational di¤ erence equation, Part I, Int. J. Di¤erence Equ., 3(1) (2008), pp. 1-35. [3] A.M. Amleh, E. Camouzis, and G. Ladas, On the dynamics of a rational di¤ erence equation, Part 2, Int. J. Di¤erence Equ., 3(2) (2008), pp. 195225. [4] C.M. Kent, W. Kosmala, M.A. Radin, and S. Stevi´c, Solutions of the difference equation xn+1 = xn xn 1 1, Abstr. Appl. Anal., (2010), pp. 1-13. doi:10.1155/2010/469683 [5] C.M. Kent, W. Kosmala, and S. Stevi´c, Long-term behavior of solutions of the di¤ erence equation xn+1 = xn 1 xn 2 1, Abstr. Appl. Anal., (2010), pp. 1-17. doi:10.1155/2010/152378 [6] C.M. Kent, W. Kosmala, and S. Stevi´c, On the di¤ erence equation xn+1 = xn xn 2 1, Abstr. Appl. Anal., (2011), pp. 1-15. doi:10.1155/2011/815285 [7] C.M. Kent and W. Kosmala, On the nature of solutions of the di¤ erence equation xn+1 = xn xn 3 1, IJNAA, 2(2) (2011), pp. 24-43. [8] C. Qian, Global attractivity in a nonlinear di¤ erence equation and applications to a biological model, Int. J. Di¤erence Equ., 9(2) (2014), pp. 233-242. 13

300

Erkan Ta¸sdemir ET AL 288-301

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[9] E.M. Elsayed, and M.M. El-Dessoky, Dynamics and global behavior for a fourth-order rational di¤ erence equation, Hacet. J. Math. Stat., 42(5) (2013), pp. 479-494. [10] G. Papaschinopoulos, C.J. Schinas and G. Ellina, On the dynamics of the solutions of a biological model, J. Di¤erence Equ. Appl., 20(5-6) (2014), pp. 694-705. [11] L. Berg, On the asymptotics of nonlinear di¤ erence equations, Z. Anal. Anwend. 21(4) (2002). pp. 1061-1074. [12] M. Bohner and R. Chieochan, The Beverton-Holt q-di¤ erence equation, J. Biol. Dyn., 7(1) (2013), pp.86-95. [13] M. Gümü¸s, The periodicity of positive solutions of the nonlinear di¤ erence equation xn+1 = + xpn k =xqn , Discrete Dyn. Nat. Soc., 2013. pp. 1-3. doi:10.1155/2013/742912 [14] M. Gümü¸s and Ö. Öcalan, Global asymptotic stability of a Nnonautonomous di¤ erence equation. J. Appl. Math., 2014, pp. 1-5. doi:10.1155/2014/395954 [15] Ö. Öcalan, H. Ögünmez, and M. Gümü¸s, Global behavior test for a nonlinear di¤ erence equation with a period-two coe¢ cient, Dyn. Contin. Discrete Impuls. Syst. Ser. A Math. Anal., 21(3-4) (2014), pp. 307-316. [16] S. Elaydi, An introduction to di¤ erence equations, ence+Business Media, Inc., New York, 2005. [17] S. Stevic, On the di¤ erence equation xn+1 = Appl., 56 (2008), pp. 1159-1171.

+ xn

1 =xn ,

Springer SciComput. Math.

[18] S. Stevi´c and B. Iriµcanin, Unbounded solutions of the di¤ erence equation xn+1 = xn l xn k 1, Abstr. Appl. Anal., (2011), pp. 1-8. doi:10.1155/2011/561682 [19] S. Stevic, M.A. Alghamdi, and A. Alotaibi, Boundedness character of the Yk a recursive sequence xn+1 = + x j , Appl. Math. Lett., 50 (2015), j=1 n j pp. 83-90. [20] S. Stevic, J. Diblik, B. Iricanin, and Z. Smarda, Z. Solvability of nonlinear di¤ erence equations of fourth order, Electron. J. Di¤erential Equations, 264 (2014), pp. 1-14. [21] W.A. Kosmala, A period 5 di¤ erence equation, IJNAA, 2(1) (2011), pp. 82-84.

14

301

Erkan Ta¸sdemir ET AL 288-301

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A new fixed point theorem in cones and applications to elastic beam equations Wei Long, Jing-Yun Zhao College of Mathematics and Information Science, Jiangxi Normal University Nanchang, Jiangxi 330022, People’s Republic of China

Abstract In this paper, we first establish a new fixed point theorem in cones of Banach spaces. Then, we apply the fixed point theorem to study the existence and uniqueness of monotone positive solutions for an elastic beam equation u(4) (t) = f (t, u(t), u0 (t)) with superlinear boundary conditions. An example is given to illustrate our main result. Compared with some earlier results (cf. [10]), the biggest differences are that we consider such equation with superlinear boundary conditions and remove some restrictive conditions. Keywords: cone, fixed point theorem, monotone positive solutions, elastic beam equations.

1

Introduction and preliminaries

In this paper, we consider the existence and uniqueness of monotone positive solutions for the following fourth-order two-point boundary value problem:  (4) 0   u (t) = f (t, u(t), u (t)), 0 < t < 1, (1.1) u(0) = u0 (0) = 0,    00 u (1) = 0, u(3) (1) = g(u(1)), where f : [0, 1] × [0, +∞) × [0, +∞) → [0, +∞) and g : [0, +∞) → (−∞, 0] are continuous (for full assumptions on f and g, see Section 2). In fact, equation (1.1) models an elastic beam problem (for more details and backgrounds, we refer to reader to [1,3] and references therein. Recently, there has been of great interest for many authors to study fourth-order boundary value problems such as (1.1) and related problems (see, e.g., [1-5,9-14]). Especially, several authors utilize fixed point theorems on cones to investigate the existence and uniqueness of monotone positive solutions for equation (1.1). For example, Li and Zhang [9] utilized a fixed point theorem

302

Wei Long ET AL 302-317

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

of generalized concave operators to study problem (1.1) and established the existence and uniqueness of monotone positive solutions. In [10], Li and Zhai obtain the existence and uniqueness of monotone positive solutions for a fourth-order boundary value problem via two fixed point theorems of mixed monotone operators with perturbation. However, in most of works using fixed point theorems on cones to study equation (1.1), the following assumption on g is assumed: (H0) g(λx) ≤ λg(x),

λ ∈ (0, 1), x ≥ 0.

In this paper, we aim to consider equation (1.1) without the assumption (H0). That is the main motivation of this work. Next, Let us recall some basic notations about cone (for more details, we refer the reader to [6]). Let E be a real Banach space, and θ be the zero element in E. A closed and convex set P in E is called a cone if the following two conditions are satisfied: (i) if x ∈ P , then λx ∈ P for every λ ≥ 0; (ii) if x ∈ P and −x ∈ P , then x = θ. A cone P induces a partial ordering ≤ in E by x≤y

if and only if

y − x ∈ P.

If x ≤ y and x 6= y, then we denote x < y or y > x. For any given u, v ∈ P with u ≤ v, [u, v] := {x ∈ X|u ≤ x ≤ v}. A cone P is called normal if there exists a constant k > 0 such that θ≤x≤y

implies that ||x|| ≤ k||y||.

We denote by P o the interior of P . A cone P is called a solid cone if P o 6= ∅. An operator T : P → P is called increasing if θ ≤ x ≤ y implies T x ≤ T y, and is called decreasing if θ ≤ x ≤ y implies T x ≥ T y. For all x, y ∈ E, the notation x ∼ y means that there exist λ > 0 and µ > 0 such that λx ≤ y ≤ µx. Clearly, ∼ is an equivalence relation. Given h > θ, we denote by Ph = {x ∈ E : x ∼ h}. It is easy to see that Ph ⊂ P is convex and rPh = Ph for all r > 0. Definition 1.1. (see [7,8]) An operator A : P × P → P is said to be a mixed monotone operator if A(x, y) is increasing in x and decreasing in y, i.e., ui , vi (i = 1, 2) ∈ P, u1 ≤ u2 , v1 ≥ v2 implies A(u1 , v1 ) ≤ A(u2 , v2 ). An element x ∈ P is called a fixed point of A if A(x, x) = x.

303

Wei Long ET AL 302-317

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Definition 1.2. Let n ≥ 1. An operator D : P → P is said to be n-superlinear if it satisfies D(tx) ≥ tn Dx, t > 0, x ∈ P. (1.2)

2

Main results

2.1

Cone and fixed point theorems

In order to study equation (1.1), we first consider the following operator equation on an ordered Banach space: B(x, x) + Dx = x, (2.1) where B is a mixed monotone operator, D is an increasing and superlinear operator. If there is no special statements, we always assume that E is a real Banach space with a partial order introduced by a normal cone P of E, h ∈ P is a nonzero element, and Ph is given as in the preliminaries. Lemma 2.1. [13] Let P be a normal cone in E. Assume that T : P × P → P is a mixed monotone operator and satisfies: (A1) there exists h ∈ P with h 6= θ such that T (h, h) ∈ Ph ; (A2) for any u, v ∈ P and t ∈ (0, 1), there exists ϕ(t) ∈ (t, 1] such that T (tu, t−1 v) ≥ ϕ(t)T (u, v). Then (1) T : Ph × Ph → Ph ; (2) there exist u0 , v0 ∈ Ph and r ∈ (0, 1) such that rv0 ≤ u0 < v0 , u0 ≤ T (u0 , v0 ) ≤ T (v0 , u0 ) ≤ v0 ; (3) T has a unique fixed point x∗ in Ph ; (4) for any initial values x0 , y0 ∈ Ph , constructing successively the sequences xn = T (xn−1 , yn−1 ),

yn = T (yn−1 , xn−1 ),

n = 1, 2, . . . ,

we have xn → x∗ and yn → x∗ as n → ∞. By using the above lemma, we establish a new fixed point theorem in the following : Theorem 2.2. Let n ≥ 1, B : P × P → P be a mixed monotone operator, and D : P → P be an increasing and n-superlinear operator. Assume that (D1) there exists h0 ∈ Ph such that B(h0 , h0 ) ∈ Ph and Dh0 ∈ Ph ; (D2) there exists a constant δ0 > 0 such that B(x, y) ≥ δ0 Dx for all x, y ∈ P ; (D3) there exists a function φ : (0, 1) → (0, +∞) such that for all x, y ∈ P and t ∈ (0, 1), B(tx, t−1 y) ≥ φ(t)B(x, y), (2.2)

304

Wei Long ET AL 302-317

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

and φ(t) > t +

1 (t − tn ). δ0

(2.3)

Then (1) B : Ph × Ph → Ph and D : Ph → Ph ; (2) there exist u0 , v0 ∈ Ph and r ∈ (0, 1) such that rv0 ≤ u0 < v0 ,

u0 ≤ B(u0 , v0 ) + Du0 ≤ B(v0 , u0 ) + Dv0 ≤ v0 ;

(3) the operator equation B(x, x) + Dx = x has a unique fixed point x∗ in Ph ; (4) for any initial values x0 , y0 ∈ Ph , constructing successively the sequences xn = B(xn−1 , yn−1 ) + Dxn−1 ,

yn = B(yn−1 , xn−1 ) + Dyn−1 ,

n = 1, 2, . . . ,

we have xn → x∗ and yn → x∗ as n → ∞. Proof. It follows from (1.2) and (2.2) that for all t ∈ (0, 1) and x, y ∈ P ,     1 1 1 1 B x, ty ≤ B(x, y) and D x ≤ n Dx. t φ(t) t t

(2.4)

Since h0 ∈ Ph and B(h0 , h0 ) ∈ Ph , there exist constants λ, α ∈ (0, 1) such that λh ≤ h0 ≤

1 h λ

and

αh ≤ B(h0 , h0 ) ≤

1 h. α

Since B is a mixed monotone operator, combing (2.2) and (2.4), we have   h0 1 1 1 B(h, h) ≤ B , λh0 ≤ B(h0 , h0 ) ≤ · h, λ φ(λ) φ(λ) α and

  h0 B(h, h) ≥ B λh0 , ≥ φ(λ)B(h0 , h0 ) ≥ φ(λ) · αh. λ

Thus, B(h, h) ∈ Ph . Taking x, y ∈ Ph , there exist γ1 , γ2 ∈ (0, 1) such that γ1 h ≤ x ≤

1 h γ1

and

γ2 h ≤ y ≤

1 h. γ2

Let γ = min{γ1 , γ2 }. Then γ ∈ (0, 1). It follows from (2.2) and (2.4) that     1 1 1 B(x, y) ≤ B h, γ2 h ≤ B h, γh ≤ B(h, h), γ1 γ φ(γ) and

    1 1 B(x, y) ≥ B γ1 h, h ≥ B γh, h ≥ φ(γ)B(h, h). γ2 γ

305

Wei Long ET AL 302-317

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Then, we have B(x, y) ∈ Ph since B(h, h) ∈ Ph . This completes the proof of B : Ph ×Ph → Ph . Since Dh0 ∈ Ph , there exists β ∈ (0, 1) such that βh ≤ Dh0 ≤

1 h. β

Next we show D : Ph → Ph . For any x0 ∈ Ph , we can choose a sufficiently small number γ 0 ∈ (0, 1) such that 1 γ 0 h ≤ x0 ≤ 0 h. γ Since D is increasing, by using (1.2) and (2.4), we have     h0 1 1 1 1 1 1 0 h ≤ 0 n Dh ≤ 0 n D ≤ 0 n n Dh0 ≤ 0 n n · h, Dx ≤ D 0 γ (γ ) (γ ) λ (γ ) λ (γ ) λ β and Dx0 ≥ D(γ 0 h) ≥ (γ 0 )n Dh ≥ (γ 0 )n D(λh0 ) ≥ (γ 0 )n λn Dh0 ≥ (γ 0 )n λn · βh. which means that Dx0 ∈ Ph , and thus D : Ph → Ph . So the conclusion (1) holds. Now, we define an operator T by T (x, y) = B(x, y) + Dx,

x ∈ P.

Then, T : P × P → P is a mixed monotone operator and T (h, h) ∈ Ph . Moreover, By using (D2) and (D3), for all t ∈ (0, 1) and x, y ∈ P , T (tx, t−1 y) = B(tx, t−1 y) + D(tx) ≥ φ(t)B(x, y) + tn Dx = tT (x, y) + [φ(t) − t] B(x, y) + (tn − t)Dx 1 ≥ tT (x, y) + [φ(t) − t] B(x, y) + (tn − t)B(x, y) δ0   1 = tT (x, y) + φ(t) − t − (t − tn ) B(x, y) δ0   δ0 1 n ≥ tT (x, y) + φ(t) − t − (t − t ) T (x, y) 1 + δ0 δ0 = ϕ(t)T (x, y), where ϕ is defined by   δ0 1 n ϕ(t) = t + φ(t) − t − (t − t ) , 1 + δ0 δ0

t ∈ (0, 1).

By (2.3), we have ϕ(t) > t for all t ∈ (0, 1). In addition, T (h, h) ≥ T (th, t−1 h) ≥ ϕ(t)T (h, h),

306

t ∈ (0, 1)

Wei Long ET AL 302-317

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

yields that ϕ(t) ≤ 1 for all t ∈ (0, 1). Hence the conclusion (A2) in Lemma 2.1 is satisfied. Then, the conclusions (2)-(4) follows from Lemma 2.1. In the proof of our existence result, we will use the following corollary of Theorem 2.2: Corollary 2.3. Let n > 1, B : P → P be an increasing operator, and D : P → P be an increasing and n-superlinear operator. Assume that the following conditions hold: (B1) there is h0 ∈ Ph such that Bh0 ∈ Ph and Dh0 ∈ Ph ; (B2) there exists a constant δ0 > 0 such that Bx ≥ δ0 Dx for all x ∈ P ; (B3) there exists a function ϕ : (0, 1) → (0, +∞) such that for all x ∈ P and λ ∈ (0, 1), B(λx) ≥ ϕ(λ)Bx, and ϕ(λ) > λ +

(2.5)

1 (λ − λn ). δ0

(2.6)

Then (1) B : Ph → Ph and D : Ph → Ph ; (2) there exist u0 , v0 ∈ Ph and r ∈ (0, 1) such that rv0 ≤ u0 < v0 ,

u0 ≤ Bu0 + Du0 ≤ Bv0 + Dv0 ≤ v0 ;

(3) the operator equation Bx + Dx = x has a unique fixed point x∗ in Ph ; (4) for any initial value x0 ∈ Ph , constructing successively the sequence xn = Bxn−1 + Dxn−1 ,

n = 1, 2, . . . ,

we have xn → x∗ as n → ∞.

2.2

Existence and uniqueness

Firstly, In order to use Corollary 2.3 to study problem (1.1), we need to clarify some symbols. In this section, we denote the Banach space E = C 1 [0, 1] equipped with the norm ||u|| = max{ max |u(t)|, max |u0 (t)|}. 0≤t≤1

0≤t≤1

Let P = {u ∈ E : u(t) ≥ 0, u0 (t) ≥ 0, ∀ t ∈ [0, 1]}. It is not difficult to verify that P is a normal cone in E. Also, P induces an order relation ˙ in E by defining u≤v ˙ if and only if v − u ∈ P . ≤ Let G(t, s) be the Green function of the linear problem u(4) (t) = 0 with the boundary conditions in problem (1.1). It follows from [3] that   s2 (3t−s) , 0 ≤ s ≤ t ≤ 1, 6 G(t, s) = t2 (3s−t) (2.7)  , 0 ≤ t ≤ s ≤ 1. 6

307

Wei Long ET AL 302-317

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Thus, equation (1.1) is equivalent to the following integral equation 1

Z u(t) =

 G(t, s)f s, u(s), u0 (s) ds − g (u(1)) φ(t),

t ∈ [0, 1],

0

where φ(t) = 21 t2 − 16 t3 for all t ∈ [0, 1]. The following properties of the Green function G(t, s) and φ(t) will be used in our proof. Lemma 2.4. [9, 10] For all t, s ∈ [0, 1], we have 1 2 2 1 s t ≤ G(t, s) ≤ st2 , 3 2 and

1 2 ∂G(t, s) s t≤ ≤ st, 2 ∂t

1 2 1 t ≤ φ(t) ≤ t2 , 3 2 1 t ≤ φ0 (t) ≤ 2t. 2

Now, we are ready to present our existence and uniqueness theorem. Theorem 2.5. Let n ≥ 1. Assume that (H1) f : [0, 1] × [0, +∞) × [0, +∞) → [0, +∞) is continuous, g : [0, +∞) → (−∞, 0] is continuous, and inf f (t, x, y) > 0, inf g(x) > −∞; x≥0

t∈[0,1],x,y≥0

(H2) g is decreasing on [0, +∞), for every t ∈ [0, 1] and x ≥ 0, f (t, x, ·) is increasing on [0, +∞), and for every t ∈ [0, 1] and y ≥ 0 f (t, ·, y) is increasing on [0, +∞); (H3) g(λx) ≤ λn g(x) for all λ ∈ (0, 1) and x ∈ [0, +∞); moreover, there exists a function ϕ : (0, 1) → (0, +∞) such that f (t, λx, λy) ≥ ϕ(λ)f (t, x, y), and

t ∈ [0, 1], λ ∈ (0, 1), x, y ∈ [0, +∞),

sup −g(x) ϕ(λ) > λ +

x≥0

inf

f (t, x, y)

· 3(λ − λn ),

λ ∈ (0, 1).

(2.8)

t∈[0,1],x,y≥0

˙ 0 0. 12 311

Wei Long ET AL 302-317

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Noting that c1 h(t) ≤ Bh(t) ≤ c2 h(t),

t ∈ [0, 1],

and (c1 h)0 (t) = c1 h0 (t) ≤ (Bh)0 (t) ≤ c2 h0 (t) = (c2 h)0 (t),

t ∈ [0, 1],

˙ ˙ 2 h. Thus, Bh ∈ Ph . we conclude c1 h≤Bh ≤c Similarly, it follows from (H1), (H2) and Lemma 2.4 that for all t ∈ [0, 1], there hold 1 1 Dh(t) = −g (h(1)) φ(t) ≤ −g(1) · t2 = − g(1) · h(t), 2 2 1 1 Dh(t) = −g (h(1)) φ(t) ≥ −g(1) · t2 = − g(1) · h(t), 3 3 (Dh)0 (t) = −g (h(1)) φ0 (t) ≤ −g(1) · 2t = −g(1) · h0 (t), and

1 1 (Dh)0 (t) = −g (h(1)) φ0 (t) ≥ −g(1) · t = − g(1) · h0 (t). 2 4 Combing the above four inequalities, we can obtain Dh ∈ Ph . Step 3. The assumption (B2) of Corollary 2.3 holds. For every u ∈ P and t ∈ [0, 1], we have 1

Z Bu(t) =

 G(t, s)f s, u(s), u0 (s) ds

0 1

Z ≥

G(t, s)ds ·

≥ ≥ ≥ =

inf

f (t, x, y)

t∈[0,1],x,y≥0

0

φ(t) · inf f (t, x, y) 3 t∈[0,1],x,y≥0 inf t∈[0,1],x,y≥0 f (t, x, y) · φ(t) sup −g(x) 3 supx≥0 −g(x) x≥0 inf t∈[0,1],x,y≥0 f (t, x, y) · −g[u(1)]φ(t) 3 supx≥0 −g(x) inf t∈[0,1],x,y≥0 f (t, x, y) · Du(t), 3 supx≥0 −g(x)

where Z

1

Z G(t, s)ds =

0

t

Z

1

G(t, s)ds +

G(t, s)ds Z t 2 Z 1 2 s (3t − s) t (3s − t) = ds + ds 6 6 0 t 1 2 1 3 1 t − t + t4 = 4 6 24 0

t

312

Wei Long ET AL 302-317

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1 2 2t



− 61 t3 φ(t) = , 3 3

t ∈ [0, 1].

In addition, we have (Bu)0 (t) =

Z

1

 Gt (t, s)f s, u(s), u0 (s) ds

0

Z

≥ ≥ =

1

Gt (t, s)ds ·



0 φ0 (t)

inf

f (t, x, y)

t∈[0,1],x,y≥0

· inf f (t, x, y) 3 t∈[0,1],x,y≥0 inf t∈[0,1],x,y≥0 f (t, x, y) · −g[u(1)]φ0 (t) 3 supx≥0 −g(x) inf t∈[0,1],x,y≥0 f (t, x, y) · (Du)0 (t), 3 supx≥0 −g(x)

where Z

Z 1 t2 s2 ds + (st − )ds 2 t 0 2 1 1 1 t − t2 + t3 2 2 6 1 2 t − 2t φ0 (t) = , t ∈ [0, 1]. 3 3

1

Z Gt (t, s)ds =

0

= ≥ Let δ0 =

t

inf t∈[0,1],x,y≥0 f (t, x, y) . 3 supx≥0 −g(x)

Then Bu(t) ≥ δ0 Du(t), (Bu)0 (t) ≥ δ0 (Du)0 (t),

t ∈ [0, 1], u ∈ P,

˙ 0 Du for all u ∈ P . i.e., Bu≥δ Step 4. The assumption (B3) of Corollary 2.3 holds. For every λ ∈ (0, 1), t ∈ [0, 1] and u ∈ P , by (H3), we have Z 1  B(λu)(t) = G(t, s)f s, λu(s), λu0 (s) ds 0 Z 1  ≥ G(t, s)ϕ(λ)f s, u(s), u0 (s) ds 0

= ϕ(λ)Bu(t), and 0

Z

(B(λu)) (t) =

1

 Gt (t, s)f s, λu(s), λu0 (s) ds

0

313

Wei Long ET AL 302-317

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1

Z ≥

 Gt (t, s)ϕ(λ)f s, u(s), u0 (s) ds

0

= ϕ(λ)(Bu)0 (t). ˙ Thus, B(λu)≥ϕ(λ)Bu for all λ ∈ (0, 1) and u ∈ P . Moreover, it follows from (2.8) that ϕ(λ) > λ +

1 (λ − λn ), δ0

λ ∈ (0, 1).

Now, we have verified all the assumptions of Corollary 2.3. Then, the conclusions (1)-(3) follows from Corollary 2.3. This completes the proof. Remark 2.6. Compared with some earlier results (see, e.g., [10]), the biggest difference are that we consider equation u(4) (t) = f (t, u(t), u0 (t)) with superlinear boundary conditions, and remove some restrictive conditions, for example, we do not assume that f (t, x, y) ≥ sup −g(x).

inf t∈[0,1],x,y≥0

x≥0

Moreover, in Theorem 2.5, for convenience, we only consider the case of f (t, x, y) being increasing about the second and the third argument. In fact, by a similar proof to that of Theorem 2.5, one can also consider the case of f (t, x, y) being increasing about the second argument and decreasing about the third argument. In addition, Theorem 2.2 can also be applied to other problems (see, e.g., [15]).

2.3

Example

In this section, we give an example to illustrate how Theorem 2.5 can be used. Example 2.7. Let 33 n= , 32



√ y x √ + f (t, x, y) = √ + 1, 1+ x 1+ y

where ε=

33

2x 32

g(x) = −

1 2 1032 −

. 1 It is easy to verify that (H1) and (H2) hold. Moreover, inf

33

− ε,

1 + x 32

(2.9)

sup −g(x) = 2 + ε.

f (t, x, y) = 1,

t∈[0,1],x,y≥0

x≥0

It remains to verify the assumption (H3). For every λ ∈ (0, 1), t ∈ [0, 1], and x, y ∈ [0, +∞), we have 33

g(λx) = −

2(λx) 32 33

−ε

1 + (λx) 32 314

Wei Long ET AL 302-317

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

33

≤ − ≤ −

33

1 + x 32 33 33 2λ 32 x 32 1+x

and

33

2λ 32 x 32

33 32

−ε 33

33

− λ 32 ε = λ 32 g(x),



√ √ λx λy √ + 1 ≥ λf (t, x, y) = ϕ(λ)f (t, x, y), √ + f (t, λx, λy) = 1 + λx 1 + λy √ where ϕ(λ) := λ for λ ∈ (0, 1). We claim that √ 33 ϕ(λ) = λ > λ + 16(λ − λ 32 ), λ ∈ (0, 1). In fact, for every λ ∈ (0, 1), we have   1 1 1 2 2 λ 1 − λ 2 λ −λ   = 33 1 λ − λ 32 λ 1 − λ 32   1 16  1 − λ 32 1 = 1 · 1 λ2  1 − λ 32  1 2  1 15  1 1 32 32 1+λ + λ = + · · · + λ 32 1 λ2 1 1 1 1 = 1 + 15 + 14 + · · · + 1 λ2 λ 32 λ 32 λ 32 > 16. Combining this with 3 supx≥0 −g(x) = 3(2 + ε) < 16, inf t∈[0,1],x,y≥0 f (t, x, y) we know that (2.8) holds. This shows that (H3) holds. Then, by applying Theorem 2.5, the following fourth-order boundary value problem: √ √ 0  u(t) u (t) (4)   u (t) = √ + √ 0 + 1, 0 < t < 1,   1+ u(t) 1+ u (t)  (2.10) u(0) = u0 (0) = 0,  33   u00 (1) = 0, u(3) (1) = − 2[u(1)] 32 − ε,  33 1+[u(1)] 32

admits a monotone positive solution. Remark 2.8. In Example 2.7, the function g does not satisfy the (H0) condition: g(λx) ≤ λg(x),

315

λ ∈ (0, 1), x ≥ 0.

Wei Long ET AL 302-317

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

In fact, letting λ0 =

 1 32 10

and x0 = 1, we have g(λ0 x0 ) = −

2 − ε, 1033 + 1

and λ0 g(x0 ) = −

1+ε . 1032

Then, by a direct calculation, we can obtain g(λ0 x0 ) > λ0 g(x0 ).

3

Acknowledgment

The work was partially supported by Excellent Youth Foundation of Jiangxi Province (20171BCB23030), NSFC (11461034), the NSF of Jiangxi Province, and the Foundation of Jiangxi Provincial Education Department (GJJ150343).

References [1] R.P. Agarwal, On fourth-order boundary value problems arising in beam analysis, Differential Integral Equations 2 (1989) 91-110. [2] R.P. Agarwal, Y.M. Chow, Iterative methods for a fourth order boundary value problem, Journal of Computational and Applied Mathematics 10 (1984) 203-217. [3] E. Alves, T.F. Ma, M.L. Pelicer, Monotone positive solutions for a fourth order equation with nonlinear boundary conditions, Nonlinear Analysis 71 (2009) 3834-3841. [4] J. Caballero, J. Harjani, K. Sadarangani, Uniqueness of positive solutions for a class of fourth-order boundary value problems, Abstract and Applied Analysis, Volume 2011, Article ID 543035, 13 pages. [5] F. Cianciaruso, G. Infante, P. Pietramala, Solutions of perturbed Hammerstein integral equations with applications, Nonlinear Analysis: Real World Applications 33 (2017), 317-347. [6] K. Deimling, Nonlinear Functional Analysis, Springer-Verlag, New York, 1985. [7] D.J. Guo, V. Lakshmikantham, Nonlinear problems in abstract cones, Notes and Reports in Mathematics in Science and Engineering, Volume 5, Academic Press Inc., Boston, 1988.

316

Wei Long ET AL 302-317

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[8] D.J. Guo, V. Lakshmikantham, Coupled fixed points of nonlinear operators with applications, Nonlinear Analysis 11 (5) (1987) 623-632. [9] S.Y. Li, X.Q. Zhang, Existence and uniqueness of monotone positive solutions for an elastic beam equation with nonlinear boundary conditions, Computers and Mathematics with Applications 63 (2012) 1355-1360. [10] S.Y. Li, C.B. Zhai, New existence and uniqueness results for an elastic beam equation with nonlinear boundary conditions, Boundary Value Problems 2015, No. 104, 12 pages. [11] M.H. Pei, S.K. Chang, Monotone iterative technique and symmetric positive solutions for a fourth-order boundary value problem, Mathematical and Computer Modelling 51 (2010) 1260-1267. [12] W.X. Wang, Y.P. Zheng, H. Yang, J.X. Wang, Positive solutions for elastic beam equations with nonlinear boundary conditions and a parameter, Boundary Value Problems 2014, No. 80, 17 pages. [13] C.B. Zhai, L.L. Zhang, New fixed point theorems for mixed monotone operators and local existence-uniqueness of positive solutions for nonlinear boundary value problems, Journal of Mathematical Analysis and Applications 382 (2011) 594-614. [14] C.B. Zhai, C.R. Jiang, Existence of nontrivial solutions for a nonlinear fourth-order boundary value problem via iterative method, Journal of Nonlinear Sciences and Applications 9 (2016), 4295-4304. [15] J.Y. Zhao, H.S. Ding, G.M. N’Gu´er´ekata, Positive almost periodic solutions to integral equations with superlinear perturbations via a new fixed point theorem in cones, Electronic Journal of Differential Equations, Vol. 2017 (2017), No. 02, pp. 1-10.

317

Wei Long ET AL 302-317

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A SEPTENDECIC FUNCTIONAL EQUATION IN MATRIX NORMED SPACES MURALI RAMDOSS1 , CHOONKIL PARK2∗ , VITHYA VEERAMANI3 , YOUNG CHO4

1,3 Department 2 Research

of Mathematics, Sacred Heart College, Tirupattur - 635 601, TamilNadu, India Institute for Natural Sciences, Hanyang University, Seoul 04763, Republic of Korea 4 Faculty of Electrical and Electronics Engineering Ulsan College West Campus, Ulsan 680-749, Republic of Korea

Abstract. In this paper, we study the septendecic functional equation and prove the Hyers-Ulam stability for the septendecic functional equation in matrix normed spaces by using the fixed point technique.

1. Introduction and preliminaries The abstract characterization given for linear spaces of bounded Hilbert space operators in terms of matricially normed spaces [28] implies that quotients, mapping spaces and various tensor products of operator spaces may be treated as operator spaces. Owing this result, the theory of operator spaces is having a increasingly significant effect on operator algebra theory (see [9]). The proof given in [28] appealed to the theory of ordered operator spaces [6]. Effros and Ruan [10] showed that one can give a purely metric proof of this important theorem by using a technique of Pisier [22] and Haagerup [12] (as modified in [8]). We will use the following notations: ej = (0, · · · , 0, 1, 0, · · · , 0); Eij is that (i, j)-component is 1 and the other components are zero; Eij ⊗ x is that (i, j)-component is x and the other components are zero; For x ∈ Mn (X), y ∈ Mk (X),   x 0 . x⊕y = 0 y Note that (X, {k · kn }) is a matrix normed space if and only if (Mn (X), k · kn ) is a normed space for each positive integer n and kAxBkk ≤ kAkkBkkxkn holds for A ∈ Mk,n , x = (xij ) ∈ Mn (X) and B ∈ Mn,k , and that (X, {k · kn }) is a matrix Banach space if and only if X is a Banach space and (X, {k · kn }) is a matrix normed space. Let E, F be vector spaces. For a given mapping h : E → F and a given positive integer n, define hn : Mn (E) → Mn (F ) by hn ([xij ]) = [h(xij )] for all [xij ] ∈ Mn (E). In 1940, an interesting topic was presented by S. M. Ulam [30] triggered the study of stability problems for various functional equations. He addressed a question concerning the stability of homomorphism. In the following year, 1941, D. H. Hyers [13] was able to give a partial solution to Ulam’s question. The result of Hyers was then generalized by Aoki [1] for additive mappings. 2010 Mathematics Subject Classification. 39B52; 46L07; 47H10; 47L25. Key words and phrases. Hyers-Ulam stability, fixed point, septendecic functional equation, matrix normed space. ∗ Corresponding author.

318

MURALI RAMDOSS ET AL 318-333

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

M. Ramdoss, C. Park, V. Veeramani

In 1978, Th. M. Rassias [25] succeeded in extending the result of Hyers theorem by weakening the condition for the Cauchy difference. The stability phenomenon that was presented by Th. M. Rassias is called the Hyers-Ulam stability. In 1994, a generalization of the Rassias theorem was obtained by Gavruta [11] by replacing the unbounded Cauchy difference by a general control function. The result of Rassias has furnished a lot of influence during the past thirty eight years in the development of the Hyers-Ulam cocepts. Further, the generalized Hyers-Ulam stability of functional equations and inequalities in matrix normed spaces has been studied by number of authors [15, 16, 17, 18, 21, 31]. Now, we introduce the following new functional equation f (x + 9y) − 17f (x + 8y) + 136f (x + 7y) − 680f (x + 6y) + 2380f (x + 5y) − 6188f (x + 4y) +12376f (x + 3y) − 19448f (x + 2y) + 24310f (x + y) − 24310f (x) +19448f (x − y) − 12376f (x − 2y) + 6188f (x − 3y) − 2380f (x − 4y) (1.1)

+ 680f (x − 5y) − 136f (x − 6y) + 17f (x − 7y) − f (x − 8y) = 17!f (y),

where 17! = 355687428100000 in matrix normed spaces. The above functional equation is said to be septendecic functional equation since the function f (x) = cx17 is its solution. Let X be a set. A function d : X × X → [0, ∞] is called a generalized metric on X if d satisfies (1) d(x, y) = 0 if and only if x = y; (2) d(x, y) = d(y, x) for all x, y ∈ X; (3) d(x, z) ≤ d(x, y) + d(y, z) for all x, y, z ∈ X. We recall a fundamental result in fixed point theory. Theorem 1. [3, 7] Let (X, d) be a complete generalized metric space and let J : X → X be a strictly contractive mapping with Lipschitz constant α < 1. Then for each given element x ∈ X, either d(J n x, J n+1 x) = ∞ for all nonnegative integers n or there exists a positive integer n0 such that (1) d(J n x, J n+1 x) < ∞, ∀n ≥ n0 ; (2) the sequence {J n x} converges to a fixed point y ∗ of J; (3) y ∗ is the unique fixed point of J in the set Y = {y ∈ X | d(J n0 x, y) < ∞}; 1 (4) d(y, y ∗ ) ≤ 1−α d(y, Jy) for all y ∈ Y . In 1996, G. Isac and Th.M. Rassias [14] were the first to provide applications of stability theory of functional equations for the proof of new fixed point theorems with applications. By using fixed point methods, the stability problems of several functional equations have been extensively investigated by a number of authors (see [2, 4, 5, 20, 23, 24, 26, 27, 29, 32]). In Section 2, we study the septendecic functional equation (1.1). In Section 3, using the fixed point technique, we prove the Hyers-Ulam stability of the functional equation (1.1) in matrix normed spaces. 2. Septendecic functional equation (1.1) In this section, we study the septendecic functional equation (1.1). For this, let us consider A and B be real vector spaces. Theorem 2. If a mapping f : A → B satisfies the functional equation (1.1) for all x, y ∈ A, then f (2x) = 217 f (x) for all x ∈ A. Proof. Letting (x, y) = (0, 0) in (1.1), we get f (0) = 0. Replacing (x, y) by (0, x) in (1.1) and using f (0) = 0, we get f (9x) − 17f (8x) + 136f (7x) − 680f (6x) + 2380f (5x) − 6188f (4x)

319

MURALI RAMDOSS ET AL 318-333

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Septendecic functional equation in matrix normed spaces

+ 12376f (3x) − 19448f (2x) + 24310f (x) − 24310f (0) + 19448f (−x) − 12376f (−2x) + 6188f (−3x) − 2380f (−4x) (2.1)

+ 680f (−5x) − 136f (−6x) + 17f (−7x) − f (−8x) = 17!f (x)

for all x ∈ A. Replacing (x, y) by (−x, x) in (1.1) and using f (0) = 0, we get f (−8x) − 17f (−7x) + 136f (−6x) − 680f (−5x) + 2380f (−4x) − 6188f (−3x) + 12376f (−2x) − 19448f (−x) + 24310f (0) − 24310f (x) + 19448f (2x) − 12376f (3x) + 6188f (4x) − 2380f (5x) (2.2)

+ 680f (6x) − 136f (7x) + 17f (8x) − f (9x) = 17!f (−x)

for all x ∈ A. By (2.1) and (2.2), we get f (−x) = −f (x) for all x ∈ A. So f is an odd mapping. Replacing (x, y) by (0, 2x) in (1.1), we get f (18x) − 16f (16x) + 119f (14x) − 544f (12x) + 1700f (10x) (2.3)

− 3808f (8x) + 6188f (6x) − 7072f (4x) + (4862 − 17!)f (2x) = 0

for all x ∈ A. Replacing (x, y) by (9x, x) in (1.1), we obtain f (18x) − 17f (17x) + 136f (16x) − 680f (15x) + 2380f (14x) − 6188f (13x) + 12376f (12x) − 19448f (11x) + 24310f (10x) − 24310f (9x) + 19448f (8x) − 12376f (7x) + 6188f (6x) − 2380f (5x) (2.4)

+ 680f (4x) − 136f (3x) + 17f (2x) − (1 + 17!)f (x) = 0

for all x ∈ A. Subtracting from (2.3) to (2.4), we obtain 17f (17x) − 152f (16x) + 680f (15x) − 2261f (14x) + 6188f (13x) − 12920f (12x) + 19448f (11x) − 22610f (10x) + 24310f (9x) − 23256f (8x) + 12376f (7x) + 2380f (5x) (2.5)

−7752f (4x) + 136f (3x) + (4845 − 17!)f (2x) + 17!f (x) = 0

for all x ∈ A. Replacing (x, y) by (8x, x) in (1.1), we obtain f (17x) − 17f (16x) + 136f (15x) − 680f (14x) + 2380f (13x) − 6188f (12x) + 12376f (11x) − 19448f (10x) + 24310f (9x) − 24310f (8x) + 19448f (7x) − 12376f (6x) + 6188f (5x) − 2380f (4x) (2.6)

+ 680f (3x) − 136f (2x) + (17 − 17!)f (x) = 0

for all x ∈ A. Multiplying (2.6) by 17, we get 17f (17x) − 289f (16x) + 2312f (15x) − 11560f (14x) + 40460f (13x) − 105196f (12x) + 210392f (11x) − 330616f (10x) + 413270f (9x) − 413270f (8x) + 330616f (7x) − 210392f (6x) + 105196f (5x) − 40460f (4x) (2.7)

+11560f (3x) − 2312f (2x) − 17(17!)f (x) = 0

for all x ∈ A. Subtracting from (2.5) to (2.7), we obtain 137f (16x) − 1632f (15x) + 9299f (14x) − 34272f (13x)

320

MURALI RAMDOSS ET AL 318-333

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

M. Ramdoss, C. Park, V. Veeramani

− 190944f (11x) + 308006f (10x) − 388960f (9x) + 390014f (8x) − 318240f (7x) + 210392f (6x) − 102816f (5x) + 32708f (4x) (2.8)

− 11424f (3x) + 92276f (12x) + (7157 − 17!)f (2x) + 18(17!)f (x) = 0

for all x ∈ A. Replacing (x, y) by (7x, x) in (1.1), we get f (16x) − 17f (15x) + 136f (14x) − 680f (13x) + 2380f (12x) − 6188f (11x) + 12376f (10x) − 19448f (9x) + 24310f (8x) − 24310f (7x) + 19448f (6x) (2.9)

− 12376f (5x) + 6188f (4x) − 2380f (3x) + 680f (2x) − (135 + 17!)f (x) = 0

for all x ∈ A. Multiplying (2.9) by 137 , we get 137f (16x) − 2329f (15x) + 18632f (14x) − 93160f (13x) + 326060f (12x) − 847756f (11x) + 1695512f (10x) − 2664376f (9x) + 3330470f (8x) − 3330470f (7x) + 2664376f (6x) − 1695512f (5x) + 847756f (4x) (2.10)

−326060f (3x) + 93160f (2x) − 137(17!)f (x) = 0

for all x ∈ A. Subtracting from (2.8) to (2.10), we obtain 697f (15x) − 9333f (14x) + 58888f (13x) − 233784f (12x) + 656812f (11x) − 1387506f (10x) + 2275416f (9x) − 2940456f (8x) + 3012230f (7x) − 2453984f (6x) + 1592696f (5x) − 815048f (4x) + 314636f (3x) (2.11)

− (86003 + 17!)f (2x) + 155(17!)f (x) = 0

for all x ∈ A. Replacing (x, y) by (6x, x) in (1.1), we get f (15x) − 17f (14x) + 136f (13x) − 680f (12x) + 2380f (11x) − 6188f (10x) + 12376f (9x) − 19448f (8x) + 24310f (7x) − 24310f (6x) (2.12)

+19448f (5x) − 12376f (4x) + 6188f (3x) − 2379f (2x) + (663 − 17!)f (x) = 0

for all x ∈ A. Multiplying (2.12) by 697, we get 697f (15x) − 11849f (14x) + 94792f (13x) − 473960f (12x) + 1658860f (11x) − 4313036f (10x) + 8626072f (9x) − 13555256f (8x) + 16944070f (7x) − 16944070f (6x) + 13555256f (5x) − 8626072f (4x) + 4313036f (3x) (2.13)

− 1658163f (2x) − 697(17!)f (x) = 0

for all x ∈ A. Subtracting from (2.11) to (2.13), we get 2516f (14x) − 35904f (13x) + 240176f (12x) − 1002048f (11x) + 2925530f (10x) − 6350656f (9x) + 10614800f (8x) − 13931840f (7x) + 14490086f (6x) − 11962560f (5x) + 7811024f (4x) (2.14)

− 3998400f (3x) + (1572160 − 17!)f (2x) + 852(17!)f (x) = 0

for all x ∈ A. Replacing (x, y) by (5x, x) in (1.1), we obtain f (14x) − 17f (13x) + 136f (12x) − 680f (11x) + 2380f (10x) − 6188f (9x) + 12376f (8x) − 19448f (7x) + 24310f (6x) − 24310f (5x) (2.15)

+19448f (4x) − 12375f (3x) + 6171f (2x) − (2244 + 17!)f (x) = 0

for all x ∈ A.

321

MURALI RAMDOSS ET AL 318-333

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Septendecic functional equation in matrix normed spaces

Multiplying (2.15) by 2516, we get 2516f (14x) − 42772f (13x) + 342176f (12x) − 1710880f (11x) + 5988080f (10x) − 15569008f (9x) + 31138016f (8x) − 48931168f (7x) + 61163960f (6x) − 61163960f (5x) + 48931168f (4x) − 31135500f (3x) + 15526236f (2x) (2.16)

− 2516(17!)f (x) = 0

for all x ∈ A. Subtracting from (2.14) to (2.16), we obtain 6868f (13x) − 102000f (12x) + 708832f (11x) − 3062550f (10x) + 9218352f (9x) − 20523216f (8x) + 34999328f (7x) − 46673874f (6x) + 49201400f (5x) − 41120144f (4x) + 27137100f (3x) (2.17)

− (13954076 + 17!)f (2x) + 3368(17!)f (x) = 0

for all x ∈ A. Replacing (x, y) by (4x, x) in (1.1), we get f (13x) − 17f (12x) + 136f (11x) − 680f (10x) + 2380f (9x) − 6188f (8x) + 12376f (7x) − 19448f (6x) + 24310f (5x) − 24309f (4x) (2.18)

+ 19431f (3x) − 12240f (2x) + (5508 − 17!)f (x) = 0

for all x ∈ A. Multiplying (2.18) by 6868, we obtain 6868f (13x) − 116756f (12x) + 934048f (11x) − 4670240f (10x) + 16345840f (9x) − 42499184f (8x) + 84998368f (7x) − 133568864f (6x) + 166961080f (5x) (2.19)

−166954212f (4x) + 133452108f (3x) − 84064320f (2x) − 6868(17!)f (x) = 0

for all x ∈ A. Subtracting from (2.17) to (2.19), we get 14576f (12x) − 225216f (11x) + 1607690f (10x) − 7127488f (9x) + 21975968f (8x) − 49999040f (7x) + 86894990f (6x) − 117759680f (5x) + 125834068f (4x) (2.20)

−106315008f (3x) + (70110244 − 17!)f (2x) + 10236(17!)f (x) = 0

for all x ∈ A. Replacing (x, y) by (3x, x) in (1.1), we get f (12x) − 17f (11x) + 136f (10x) − 680f (9x) + 2380f (8x) − 6188f (7x) + 12376f (6x) − 19447f (5x) + 24293f (4x) − 24174f (3x) (2.21)

+ 18768f (2x) − (9996 + 17!)f (x) = 0

for all x ∈ A. Multiplying (2.21) by 14756, we obtain 14756f (12x) − 250852f (11x) + 2006816f (10x) − 10034080f (9x) + 35119280f (8x) − 91310128f (7x) + 182620256f (6x) − 286959932f (5x) + 358467508f (4x) (2.22)

−356711544f (3x) + 276940608f (2x) − 14756(17!)f (x) = 0

for all x ∈ A. Subtracting from (2.20) to (2.22), we get 25636f (11x) − 399126f (10x) + 2906592f (9x) − 13143312f (8x) + 41311088f (7x) − 95725266f (6x) + 169200252f (5x) − 232633440f (4x) + 250396536f (3x) (2.23)

− (206830364 + 17!)f (2x) + 24992(17!)f (x) = 0

for all x ∈ A.

322

MURALI RAMDOSS ET AL 318-333

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

M. Ramdoss, C. Park, V. Veeramani

Replacing (x, y) by (2x, x) in (1.1), we get f (11x) − 17f (10x) + 136f (9x) − 680f (8x) + 2380f (7x) − 6187f (6x) + 12359f (5x) (2.24)

−19312f (4x) + 23630f (3x) − 21930f (2x) + (13260 − 17!)f (x) = 0

for all x ∈ A. Multiplying (2.24) by 25636, we obtain 25636f (11x) − 435812f (10x) + 3486496f (9x) − 17432480f (8x) + 61013680f (7x) − 158609932f (6x) + 316835324f (5x) − 495082432f (4x) + 605778680f (3x) (2.25)

− 562197480f (2x) − 25636(17!)f (x) = 0

for all x ∈ A. Subtracting from (2.23) to (2.25), we get 36686f (10x) − 579904f (9x) + 4289168f (8x) − 19702592f (7x) + 62884666f (6x) − 147635072f (5x) + 262448992f (4x) − 355382144f (3x) (2.26)

+ (355367116 − 17!)f (2x) + 50628(17!)f (x) = 0

for all x ∈ A. Replacing (x, y) by (x, x) in (1.1), we get f (10x) − 17f (9x) + 136f (8x) − 679f (7x) + 2363f (6x) − 6052f (5x) (2.27)

+11696f (4x) − 17068f (3x) + 18122f (2x) − (11934 + 17!)f (x) = 0

for all x ∈ A. Multiplying (2.27) by 36686, we obtain 36686f (10x) − 623662f (9x) + 4989296f (8x) − 24909794f (7x) + 86689018f (6x) − 222023672f (5x) + 429079456f (4x) − 626156648f (3x) + 664823692f (2x) − 36686(17!)f (x) = 0

(2.28)

for all x ∈ A. Subtracting from (2.26) to (2.28), we get 43758f (9x) − 700128f (8x) + 5207202f (7x) − 23804352f (6x) + 74388600f (5x) (2.29)

−166630464f (4x) + 270774504f (3x) − (309456576 + 17!)f (2x) + 87314(17!)f (x) = 0

for all x ∈ A. Replacing (x, y) by (0, x) in (1.1), we get f (9x) − 16f (8x) + 119f (7x) − 544f (6x) + 1700f (5x) − 3808f (4x) (2.30)

+ 6188f (3x) − 7072f (2x) + (4862 − 17!)f (x) = 0

for all x ∈ A. Multiplying (2.30) by 43758, we obtain 43758f (9x) − 700128f (8x) + 5207202f (7x) − 23804352f (6x) + 74388600f (5x) − 166630464f (4x) + 270774504f (3x) (2.31)

− 309456576f (2x) − 43758(17!)f (x) = 0

for all x ∈ A. Subtracting from (2.29) to (2.31), we get − 17!f (2x) + 131072(17!)f (x) = 0 and so f (2x) = 217 f (x) for all x ∈ A.



323

MURALI RAMDOSS ET AL 318-333

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Septendecic functional equation in matrix normed spaces

3. Stability of the septendecic functional equation in matrix normed spaces Throughout this section, let (X, k.kn ) be a matrix normed space, (Y, k.kn ) be a matrix Banach space and let n be a fixed non-negative integer. In this section, we prove the stability of the septendecic functional equation (1.1) in matrix normed spaces by using the fixed point method. For a mapping f : X → Y , define Gf : X 2 → Y and Gfn : Mn (X 2 ) → Mn (Y ) by Gf (a, b) = f (a + 9b) − 17f (a + 8b) + 136f (a + 7b) − 680f (a + 6b) + 2380f (a + 5b) − 6188f (a + 4b) + 12376f (a + 3b) − 19448f (a + 2b) + 24310f (a + b) − 24310f (a) + 19448f (a − b) − 12376f (a − 2b) + 6188f (a − 3b) − 2380f (a − 4b) + 680f (a − 5b) − 136f (a − 6b) + 17f (a − 7b) − f (a − 8b) − 17!f (b), Gfn ([xij ], [yij ]) = fn ([xij + 9yij ]) − 17fn ([xij + 8yij ]) + 136fn ([xij + 7yij ]) − 680fn ([xij + 6yij ]) + 2380fn ([xij + 5yij ]) − 6188fn ([xij + 4yij ]) + 12376fn ([xij + 3yij ]) − 19448fn ([xij + 2yij ]) + 24310fn ([xij + yij ]) − 24310fn ([xij ]) + 19448fn ([xij − yij ]) − 12376fn ([xij − 2yij ]) + 6188fn ([xij − 3yij ]) − 2380fn ([xij − 4yij ]) + 680fn ([xij − 5yij ]) − 136fn ([xij − 6yij ]) + 17fn ([xij − 7yij ]) − fn ([xij − 8yij ]) − 17!fn ([yij ]) for all a, b ∈ X and all x = [xij ], y = [yij ] ∈ Mn (X). Theorem 3. Assume that l = ±1 be fixed and let ψ : X 2 → [0, ∞) be a function such that there exists an η < 17 with a b (3.1) ψ(a, b) ≤ 217l ηψ( l , l ) 2 2 for all a, b ∈ X. Let f : X → Y be a mapping satisfying n X (3.2) kGfn ([xij ], [yij ])kn ≤ ψ(xij , yij ) i,j=1

for all x = [xij ], y = [yij ] ∈ Mn (X). Then there exists a unique septendecic mapping SD : X → Y such that 1−l n X η 2 ψ(xij ), (3.3) kfn ([xij ]) − SDn ([yij ])kn ≤ 217 (1 − η) i,j=1

where 1 [ψ(0, 2xij ) + ψ(9xij , xij ) + 17ψ(8xij , xij ) + 137ψ(7xij , xij ) 17! + 697ψ(6xij , xij ) + 2516ψ(5xij , xij ) + 6868ψ(4xij , xij ) + 14756ψ(3xij , xij ) + 25636ψ(2xij , xij ) + 36686ψ(xij , xij ) + 43758ψ(0, xij )]

ψ(xij ) =

Proof. Letting n = 1 in (3.2), we obtain kGf (a, b)k ≤ ψ(a, b)

(3.4)

Replacing (a, b) by (0, 2a) in (3.4), we get kf (18a) − 16f (16a) + 119f (14a) − 544f (12a) + 1700f (10a) (3.5)

−3808f (8a) + 6188f (6a) − 7072f (4a) + (4862 − 17!)f (2a)k ≤ ψ(0, 2a)

for all a ∈ X.

324

MURALI RAMDOSS ET AL 318-333

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

M. Ramdoss, C. Park, V. Veeramani

Replacing (a, b) by (9a, a) in (3.4), we obtain kf (18a) − 17f (17a) + 136f (16a) − 680f (15a) + 2380f (14a) −6188f (13a) + 12376f (12a) − 19448f (11a) + 24310f (10a) −24310f (9a) + 19448f (8a) − 12376f (7a) + 6188f (6a) − 2380f (5a) +680f (4a) − 136f (3a) + 17f (2a) − (1 + 17!)f (a)k ≤ ψ(9a, a)

(3.6)

for all a ∈ X. It follows from (3.5) and (3.6) that k17f (17a) − 152f (16a) + 680f (15a) − 2261f (14a) +6188f (13a) − 12920f (12a) + 19448f (11a) − 22610f (10a) +24310f (9a) − 23256f (8a) + 12376f (7a) + 2380f (5a) (3.7)

−7752f (4a) + 136f (3a) + (4845 − 17!)f (2a) + 17!f (a)k ≤ ψ(0, 2a) + ψ(9a, a)

for all a ∈ X. Replacing (a, b) by (8a, a) in (3.4), we obtain kf (17a) − 17f (16a) + 136f (15a) − 680f (14a) + 2380f (13a) −6188f (12a) + 12376f (11a) − 19448f (10a) + 24310f (9a) −24310f (8a) + 19448f (7a) − 12376f (6a) + 6188f (5a) − 2380f (4a) (3.8)

+680f (3a) − 136f (2a) + (17 − 17!)f (a)k ≤ ψ(8a, a)

for all a ∈ X. Multiplying (3.8) by 17, we get k17f (17a) − 289f (16a) + 2312f (15a) − 11560f (14a) + 40460f (13a) −105196f (12a) + 210392f (11a) − 330616f (10a) + 413270f (9a) −413270f (8a) + 330616f (7a) − 210392f (6a) + 105196f (5a) − 40460f (4a) (3.9)

+11560f (3a) − 2312f (2a) − 17(17!)f (a)k ≤ 17ψ(8a, a)

for all a ∈ X. It follows from (3.7) and (3.9) that k137f (16a) − 1632f (15a) + 9299f (14a) − 34272f (13a) −190944f (11a) + 308006f (10a) − 388960f (9a) + 390014f (8a) −318240f (7a) + 210392f (6a) − 102816f (5a) + 32708f (4a) −11424f (3a) + 92276f (12a) + (7157 − 17!)f (2a) + 18(17!)f (a)k (3.10)

≤ ψ(0, 2a) + ψ(9a, a) + 17ψ(8a, a)

for all a ∈ X. Replacing (a, b) by (7a, a) in (3.4), we get kf (16a) − 17f (15a) + 136f (14a) − 680f (13a) + 2380f (12a) −6188f (11a) + 12376f (10a) − 19448f (9a) + 24310f (8a) −24310f (7a) + 19448f (6a) − 12376f (5a) + 6188f (4a) (3.11)

−2380f (3a) + 680f (2a) − (135 + 17!)f (a)k ≤ ψ(7a, a)

for all a ∈ X. Multiplying (3.11) by 137, we get k137f (16a) − 2329f (15a) + 18632f (14a) − 93160f (13a) + 326060f (12a) −847756f (11a) + 1695512f (10a) − 2664376f (9a) + 3330470f (8a) −3330470f (7a) + 2664376f (6a) − 1695512f (5a) + 847756f (4a) (3.12)

−326060f (3a) + 93160f (2a) − 137(17!)f (a)k ≤ 137ψ(7a, a)

for all a ∈ X.

325

MURALI RAMDOSS ET AL 318-333

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Septendecic functional equation in matrix normed spaces

It follows from (3.10) and (3.12) that k697f (15a) − 9333f (14a) + 58888f (13a) − 233784f (12a) + 656812f (11a) −1387506f (10a) + 2275416f (9a) − 2940456f (8a) + 3012230f (7a) −2453984f (6a) + 1592696f (5a) − 815048f (4a) +314636f (3a) − (86003 + 17!)f (2a) + 155(17!)f (a)k (3.13)

≤ ψ(0, 2a) + ψ(9a, a) + 17ψ(8a, a) + 137ψ(7a, a)

for all a ∈ X. Replacing (a, b) by (6a, a) in (3.4), we get kf (15a) − 17f (14a) + 136f (13a) − 680f (12a) + 2380f (11a) − 6188f (10a) +12376f (9a) − 19448f (8a) + 24310f (7a) − 24310f (6a) + 19448f (5a) (3.14)

−12376f (4a) + 6188f (3a) − 2379f (2a) + (663 − 17!)f (a)k ≤ ψ(6a, a)

for all a ∈ X. Multiplying (3.14) by 697, we get k697f (15a) − 11849f (14a) + 94792f (13a) − 473960f (12a) + 1658860f (11a) −4313036f (10a) + 8626072f (9a) − 13555256f (8a) + 16944070f (7a) −16944070f (6a) + 13555256f (5a) − 8626072f (4a) + 4313036f (3a) (3.15)

−1658163f (2a) − 697(17!)f (a)k ≤ 697ψ(6a, a)

for all a ∈ X. It follows from (3.13) and (3.15) that k2516f (14a) − 35904f (13a) + 240176f (12a) − 1002048f (11a) + 2925530f (10a) −6350656f (9a) + 10614800f (8a) − 13931840f (7a) + 14490086f (6a) −11962560f (5a) + 7811024f (4a) − 3998400f (3a) +(1572160 − 17!)f (2a) + 852(17!)f (a)k (3.16)

≤ ψ(0, 2a) + ψ(9a, a) + 17ψ(8a, a) + 137ψ(7a, a) + 697ψ(6a, a)

for all a ∈ X. Replacing (a, b) by (5a, a) in (3.4), we obtain kf (14a) − 17f (13a) + 136f (12a) − 680f (11a) + 2380f (10a) − 6188f (9a) +12376f (8a) − 19448f (7a) + 24310f (6a) − 24310f (5a) + 19448f (4a) (3.17)

−12375f (3a) + 6171f (2a) − (2244 + 17!)f (a)k ≤ ψ(5a, a)

for all a ∈ X. Multiplying (3.17) by 2516, we get k2516f (14a) − 42772f (13a) + 342176f (12a) − 1710880f (11a) + 5988080f (10a) −15569008f (9a) + 31138016f (8a) − 48931168f (7a) + 61163960f (6a) −61163960f (5a) + 48931168f (4a) − 31135500f (3a) + 15526236f (2a) (3.18)

−2516(17!)f (a)k ≤ 2516ψ(5a, a)

for all a ∈ X. It follows from (3.16) and (3.18) that k6868f (13a) − 102000f (12a) + 708832f (11a) − 3062550f (10a) + 9218352f (9a) −20523216f (8a) + 34999328f (7a) − 46673874f (6a) + 49201400f (5a) −41120144f (4a) + 27137100f (3a) − (13954076 + 17!)f (2a) +3368(17!)f (a)k ≤ ψ(0, 2a) + ψ(9a, a) + 17ψ(8a, a) (3.19)

+ 137ψ(7a, a) + 697ψ(6a, a) + 2516ψ(5a, a)

for all a ∈ X.

326

MURALI RAMDOSS ET AL 318-333

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

M. Ramdoss, C. Park, V. Veeramani

Replacing (a, b) by (4a, a) in (3.4), we get kf (13a) − 17f (12a) + 136f (11a) − 680f (10a) + 2380f (9a) − 6188f (8a) +12376f (7a) − 19448f (6a) + 24310f (5a) − 24309f (4a) (3.20)

+19431f (3a) − 12240f (2a) + (5508 − 17!)f (a)k ≤ ψ(4a, a)

for all a ∈ X. Multiplying (3.20) by 6868, we obtain k6868f (13a) − 116756f (12a) + 934048f (11a) − 4670240f (10a) + 16345840f (9a) −42499184f (8a) + 84998368f (7a) − 133568864f (6a) + 166961080f (5a) −166954212f (4a) + 133452108f (3a) − 84064320f (2a) (3.21)

−6868(17!)f (a)k ≤ 6868ψ(4a, a)

for all a ∈ X. It follows from (3.19) and (3.21) that k14576f (12a) − 225216f (11a) + 1607690f (10a) − 7127488f (9a) + 21975968f (8a) −49999040f (7a) + 86894990f (6a) − 117759680f (5a) + 125834068f (4a) −106315008f (3a) + (70110244 − 17!)f (2a) + 10236(17!)f (a)k ≤ ψ(0, 2a) + ψ(9a, a) + 17ψ(8a, a) + 137ψ(7a, a) (3.22)

+ 697ψ(6a, a) + 2516ψ(5a, a) + 6868ψ(4a, a)

for all a ∈ X. Replacing (a, b) by (3a, a) in (3.4), we get kf (12a) − 17f (11a) + 136f (10a) − 680f (9a) + 2380f (8a) − 6188f (7a) +12376f (6a) − 19447f (5a) + 24293f (4a) − 24174f (3a) (3.23)

+18768f (2a) − (9996 + 17!)f (a)k ≤ ψ(3a, a)

for all a ∈ X. Multiplying (3.23) by 14756, we obtain k14756f (12a) − 250852f (11a) + 2006816f (10a) − 10034080f (9a) + 35119280f (8a) −91310128f (7a) + 182620256f (6a) − 286959932f (5a) + 358467508f (4a) (3.24)

−356711544f (3a) + 276940608f (2a) − 14756(17!)f (a)k ≤ 14756ψ(3a, a)

for all a ∈ X. It follows from (3.22) and (3.24) that k25636f (11a) − 399126f (10a) + 2906592f (9a) − 13143312f (8a) +41311088f (7a) − 95725266f (6a) + 169200252f (5a) − 232633440f (4a) +250396536f (3a) − (206830364 + 17!)f (2a) + 24992(17!)f (a)k ≤ ψ(0, 2a) + ψ(9a, a) + 17ψ(8a, a) + 137ψ(7a, a) + 697ψ(6a, a) (3.25)

+ 2516ψ(5a, a) + 6868ψ(4a, a) + 14756ψ(3a, a)

for all a ∈ X. Replacing (a, b) by (2a, a) in (3.4), we get kf (11a) − 17f (10a) + 136f (9a) − 680f (8a) + 2380f (7a) − 6187f (6a) + 12359f (5a) (3.26)

−19312f (4a) + 23630f (3a) − 21930f (2a) + (13260 − 17!)f (a)k ≤ ψ(2a, a)

for all a ∈ X. Multiplying (3.26) by 25636, we obtain k25636f (11a) − 435812f (10a) + 3486496f (9a) − 17432480f (8a) +61013680f (7a) − 158609932f (6a) + 316835324f (5a) − 495082432f (4a) (3.27)

+605778680f (3a) − 562197480f (2a) − 25636(17!)f (a)k ≤ 25636ψ(2a, a)

327

MURALI RAMDOSS ET AL 318-333

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Septendecic functional equation in matrix normed spaces

for all a ∈ X. It follows from (3.25) and (3.27) that k36686f (10a) − 579904f (9a) + 4289168f (8a) − 19702592f (7a) + 62884666f (6a) −147635072f (5a) + 262448992f (4a) − 355382144f (3a) + 50628(17!)f (a) +(355367116 − 17!)f (2a)k ≤ ψ(0, 2a) + ψ(9a, a) + 17ψ(8a, a) + 137ψ(7a, a) (3.28)

+697ψ(6a, a) + 2516ψ(5a, a) + 6868ψ(4a, a) + 14756ψ(3a, a) + 25636ψ(2a, a)

for all a ∈ X. Replacing (a, b) by (a, a) in (3.4), we get kf (10a) − 17f (9a) + 136f (8a) − 679f (7a) + 2363f (6a) − 6052f (5a) (3.29)

+11696f (4a) − 17068f (3a) + 18122f (2a) − (11934 + 17!)f (a)k ≤ ψ(a, a)

for all a ∈ X. Multiplying (3.29) by 36686, we obtain k36686f (10a) − 623662f (9a) + 4989296f (8a) − 24909794f (7a) + 86689018f (6a) −222023672f (5a) + 429079456f (4a) − 626156648f (3a) + 664823692f (2a) −36686(17!)f (a)k ≤ 36686ψ(a, a)

(3.30)

for all a ∈ X. It follows from (3.28) and (3.30) that k43758f (9a) − 700128f (8a) + 5207202f (7a) − 23804352f (6a) + 74388600f (5a) −166630464f (4a) + 270774504f (3a) − (309456576 + 17!)f (2a) +87314(17!)f (a)k ≤ ψ(0, 2a) + ψ(9a, a) + 17ψ(8a, a) + 137ψ(7a, a) + 697ψ(6a, a) (3.31)

+2516ψ(5a, a) + 6868ψ(4a, a) + 14756ψ(3a, a) + 25636ψ(2a, a) + 36686ψ(a, a)

for all a ∈ X. Replacing (a, b) by (0, a) in (3.4), we get kf (9a) − 16f (8a) + 119f (7a) − 544f (6a) + 1700f (5a) − 3808f (4a) +6188f (3a) − 7072f (2a) + (4862 − 17!)f (a)k ≤ ψ(0, a)

(3.32)

for all a ∈ X. Multiplying (3.32) by 43758, we obtain k43758f (9a) − 700128f (8a) + 5207202f (7a) − 23804352f (6a) + 74388600f (5a) −166630464f (4a) + 270774504f (3a) − 309456576f (2a) −43758(17!)f (a)k ≤ 43758ψ(0, a)

(3.33)

for all a ∈ X. It follows from (3.31) and (3.33) that k−17!f (2a) + 131072(17!)f (a)k ≤ ψ(0, 2a) + ψ(9a, a) + 17ψ(8a, a) + 137ψ(7a, a) + 697ψ(6a, a) + 2516ψ(5a, a) + 6868ψ(4a, a) (3.34)

+14756ψ(3a, a) + 25636ψ(2a, a) + 36686ψ(a, a) + 43758ψ(0, a)

for all a ∈ X. By (3.34)

17

2 f (a) − f (2a) ≤ ψ(a)

(3.35) for all a ∈ X, where

1 [ψ(0, 2a) + ψ(9a, a) + 17ψ(8a, a) + 137ψ(7a, a) + 697ψ(6a, a) 17! + 2516ψ(5a, a) + 6868ψ(4a, a) + 14756ψ(3a, a) + 25636ψ(2a, a) + 36686ψ(a, a) + 43758ψ(0, a)].

ψ(a) =

328

MURALI RAMDOSS ET AL 318-333

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

M. Ramdoss, C. Park, V. Veeramani

Thus

1−l

η( 2 ) 1 l

f (a) −

≤ ψ(a) f (2 a)

217 217l

(3.36)

∀ a ∈ X.

We consider the set M = {f : X → Y } and introduce the generalized metric on M as follows:  ρ(f, g) = inf µ ∈ R+ : kf (a) − g(a)k ≤ µψ(a), ∀a ∈ X , It is easy to check that (M, ρ) is complete (see the proof of [[19], Lemma 2.1]). Define the mapping P : M → M by 1 Pf (a) = 17l f (2l a) ∀ a ∈ X. 2 Let f, g ∈ M be an arbitrary constant with ρ(f, g) = ν. Then kf (a) − g(a)k ≤ νψ(a) for all a ∈ X. Utilizing (3.1), we find that

1

1 l l

kPf (a) − Pg(a)k = 17l f (2 a) − 17l g(2 a)

≤ ηνψ(a) for all a ∈ X. 2 2 Hence it holds that ρ(Pf, Pg) ≤ ην, that is, ρ(Pf, Pg) ≤ ηρ(f, g) for all f, g ∈ M. 1−l η( 2 ) It follows from (3.36) that ρ(f, Pf ) ≤ . 217 According to [3, Theorem 2.2], there exists a mapping SD : X → Y which satisfying: (1) SD is a unique fixed point of P in the set S = {g ∈ M : ρ(f, g) < ∞}, which is satisfied SD (2l a) = 217l SD (a)

∀ a ∈ X.

In other words, there exists a µ satisfying kf (a) − g(a)k ≤ µψ(a) (2)

ρ(P k f, SD )

∀ a ∈ X.

→ 0 as k → ∞. This implies that 1 lim 17kl f (2kl a) = SD (a) k→∞ 2

∀ a ∈ X.

1−l η( 2 ) 1 (3) ρ(f, SD ) ≤ ρ(f, Pf ), which implies the inequality ρ(f, SD ) ≤ 17 . 1−η 2 (1 − η)

(3.37)

So

1−l η( 2 ) kf (a) − SD (a)k ≤ 17 ψ(a) 2 (1 − η)

∀ a ∈ X.

It follows from (3.1) and (3.4) that 1

lim 17kl f (2kl (a + 9b)) − 17f (2kl (a + 8b)) + 136f (2kl (a + 7b)) k→∞ 2 −680f (2kl (a + 6b)) + 2380f (2kl (a + 5b)) − 6188f (2kl (a + 4b)) +12376f (2kl (a + 3b)) − 19448f (2kl (a + 2b)) + 24310f (2kl (a + b)) −24310f (2kl (a)) + 19448f (2kl (a − b)) − 12376f (2kl (a − 2b)) +6188f (2kl (a − 3b)) − 2380f (2kl (a − 4b)) + 680f (2kl (a − 5b))

−136f (2kl (a − 6b)) + 17f (2kl (a − 7b)) − f (2kl (a − 8b)) − 17!f (2kl (b)) ≤ lim

1

k→∞ 217kl

ψ(2kl a, 2kl b) = 0

329

MURALI RAMDOSS ET AL 318-333

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Septendecic functional equation in matrix normed spaces

and so SD (a + 9b) − 17SD (a + 8b) + 136SD (a + 7b) − 680SD (a + 6b) + 2380SD (a + 5b) −6188SD (a + 4b) + 12376SD (a + 3b) − 19448SD (a + 2b) + 24310SD (a + b) −24310SD (a) + 19448SD (a − b) − 12376SD (a − 2b) + 6188SD (a − 3b) −2380SD (a − 4b) + 680SD (a − 5b) − 136SD (a − 6b) + 17SD (a − 7b) −SD (a − 8b) = 17!SD (b) for all a, b ∈ X. Therefore, the mapping SD : X → Y is septendecic mapping. It follows from [17, Lemma 2.1] and (3.37) that kfn ([xij ]) − SDn ([xij ])kn ≤

n X

kf (xij ) − SD (xij )k ≤

i,j=1

n X i,j=1

1−l η( 2 ) ψ(xij ) 217 (1 − η)

for all x = [xij ] ∈ Mn (X), where 1 [ψ(0, 2xij ) + ψ(9xij , xij ) + 17ψ(8xij , xij ) + 137ψ(7xij , xij ) 17! + 697ψ(6xij , xij ) + 2516ψ(5xij , xij ) + 6868ψ(4xij , xij ) + 14756ψ(3xij , xij ) + 25636ψ(2xij , xij ) + 36686ψ(xij , xij ) + 43758ψ(0, xij )]

ψ(xij ) =

for all x = [xij ] ∈ Mn (X). Thus SD : X → Y is a unique septendecic mapping satisfying (3.3).



Corollary 1. Assume that l = ±1 be fixed and let t,  be positive real numbers with t 6= 17. Let f : X → Y be a mapping such that kGfn ([xij ], [yij ])kn ≤

(3.38)

n X

(kxij kt + kyij kt )

i,j=1

for all x = [xij ], y = [yij ] ∈ Mn (X). Then there exists a unique septendecic mapping SD : X → Y such that n P s kxij kt kfn ([xij ]) − SDn ([xij ])kn ≤ 17 t) l(2 − 2 i,j=1 for all x = [xij ] ∈ Mn (X), where  [43758 + 36687(2t ) + 25636(3t ) + 14756(4t ) + 6868(5t ) 17! + 2516(6t ) + 697(7t ) + 137(8t ) + 17(9t ) + (10)t )].

s =

Proof. The proof follows from Theorem 3 by taking ψ(a, b) = (kakt + kbkt ) for all a, b ∈ X. Then we can choose η = 2l(t−17) , and we can obtain the required result.  Now we will give an example to illustrate that the functional equation (1.1) is not stable for t = 17 in Corollary 1. Example 4. Let ψ : R → R be a function defined by ( x17 , if |x| < 1, ψ(x) = , otherwise,

330

MURALI RAMDOSS ET AL 318-333

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

M. Ramdoss, C. Park, V. Veeramani

where  > 0 is a constant, and define a function f : R → R by f (x) =

∞ X ψ(2n x) n=0

217n

for all x ∈ R. Then f satisfies the inequality kf (x + 9y) − 17f (x + 8y) + 136f (x + 7y) − 680f (x + 6y) + 2380f (x + 5y) −6188f (x + 4y) + 12376f (x + 3y) − 19448f (x + 2y) + 24310f (x + y) −24310f (x) + 19448f (x − y) − 12376f (x − 2y) + 6188f (x − 3y) −2380f (x − 4y) + 680f (x − 5y) − 136f (x − 6y) + 17f (x − 7y) (355687428200000) (131072)2 (|x|17 + |y|17 ) 131071 for all x, y ∈ R. Then there do not exist a septendecic function SD : R → R and a constant λ > 0 such that

(3.39)

−f (x − 8y) − 17!f (y)k ≤

|f (x) − SD (x)| ≤ λ |x|17

(3.40) for all x ∈ R. Solution. Now |f (x)| ≤

∞ X |ψ(2n x)| n=0

|217n |

∞ X  131072 = = . 17n 2 131071 n=0

Thus f is bounded. Next we show that f satisfies (3.39). If x = y = 0, then (3.39) is trivial. If (355687428200000)(131072) |x|17 + |y|17 ≥ 2117 , then L.H.S of (3.39) is less than . 131071 17 17 Suppose that 0 < |x| + |y| < 2117 . Then there exists a non-negative integer k such that (3.41)

1 217(k+1)

≤ |x|17 + |y|17
0 satisfying (3.40). Since f is bounded and continuous for all x ∈ R, SD is bounded on any open interval containing the origin and continuous at origin. In view of Theorem 3, SD must have the form SD (x) = cx17 for any x ∈ R. Thus we obtain that |f (x)| ≤ (λ + |c|) |x|17 .

(3.42)

But we can choose a non-negative integer m with m > λ + |c| . 1 If x ∈ (0, 2m−1 ), then 2n x ∈ (0, 1) for all n = 0, 1, 2, · · · , m − 1. For this x, we get f (x) =

∞ X ψ(2n x) n=0

217n



m−1 X n=0

(2n x)17 = mx17 > (λ + |c|) |x|17 , 217n

which contradicts to (3.42). Thus the septendecic functional equation (1.1) is not stable for t = 17. 4. Conclusions In this investigation, we identified the septendecic functional equation and establised the Ulam-Hyers stability of this functional equation in matrix normed spaces by using the fixed point method and also provided an example for non-stability. References [1] T. Aoki , On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan 2 (1950), 64-66. [2] M. Arunkumar, A. Bodaghi, J. M. Rassias, E. Sathiya, The general solution and approximations of a decic type functional equation in various normed spaces, J. Chungcheong Math. Soc. 29 (2016), 287-328. [3] L. C˘ adariu, V. Radu, Fixed points and the stability of Jensen’s functional equation, J. Inequal. Pure Appl. Math. 4 (2003), no. 1, Art. ID 4. [4] L. C˘ adariu, V. Radu, On the stability of the Cauchy functional equation: a fixed point approach, Grazer Math. Ber. 346 (2004), 43-52. [5] L. C˘ adariu, V. Radu, Fixed point methods for the generalized stability of functional equations in a single variable, Fixed Point Theory Appl. 2008 (2008), Art. ID 749392. [6] M.-D. Choi, E. Effros, Injectivity and operator spaces, J. Funct. Anal. 24 (1977), 156-209. [7] J. Diaz, B. Margolis, A fixed point theorem of the alternative for contractions on a generalized complete metric space, Bull. Am. Math. Soc. 74 (1968), 305-309. [8] E. Effros, On multilinear completely bounded module maps, Contemp. Math. 62, Am. Math. Soc.. Providence, RI, 1987, pp. 479-501. [9] E. Effros, Z.-J. Ruan, On approximation properties for operator spaces, Int.. J. Math. 1 (1990), 163-187. [10] E. Effros, Z.-J. Ruan, On the abstract characterization of operator spaces, Proc. Am. Math. Soc. 119 (1993), 579-584. [11] P. Gˇ avruta, A generalization of the Hyers-Ulam Rassias stability of approximately additive mappings, J. Math. Anal. Appl. 184 (1994), 431-436. [12] U. Haagerup, Decomp. of completely bounded maps, unpublished manuscript. [13] D. H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. USA 27 (1941), 222-224.

332

MURALI RAMDOSS ET AL 318-333

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

M. Ramdoss, C. Park, V. Veeramani

[14] G. Isac, Th. M. Rassias, Stability of ψ-additive mappings: Applications to nonlinear analysis, Internat. J. Math. Math. Sci. 19 (1996), 219-228. [15] J. Lee, D. Shin, C. Park, An additive functional inequality in matrix normed spaces, Math. Inequal. Appl. 16 (2013), 1009-1022. [16] J. Lee, D. Shin, C. Park, An AQCQ- functional equation in matrix normed spaces, Result. Math. 64 (2013), 305-318. [17] J. Lee, D. Shin, C. Park, Hyers-Ulam stability of functional equations in matrix normed spaces, J. Inequal. Appl. 2013, 2013:22. [18] J. Lee, C. Park, D. Y. Shin, Functional equations in matrix normed spaces, Proc. Indian Acad. Sci. 125 (2015), 399-412. [19] D. Mihet, V. Radu, On the stability of the additive Cauchy functional equation in random normed spaces, J. Math. Anal. Appl. 343 (2008), 567-572. [20] M. Mirzavaziri, M.S. Moslehian, A fixed point approach to stability of a quadratic equation, Bull. Braz. Math. Soc. 37 (2006), 361-376. [21] R. Murali, V. Vithya, Hyers-Ulam-Rassias stability of functional equations in matrix normed spaces: A fixed point approach, Asian J. Math. Comput. Research 4 (2015), 155-163. [22] G. Pisier, Grothendieck’s Theorem for non-commutative C ∗ -algebras with an appendix on Grothendieck’s constants, J. Funct. Anal. 29 (1978), 397-415. [23] V. Radu, The fixed point alternative and the stability of functional equations, Fixed Point Theory 4 (2003), 91-96. [24] J. M. Rassias, M. Eslamian, Fixed points and stability of nonic functional equation in quasi β-normed spaces, Contemporary Anal. Appl. Math. 3 (2015), 293-309. [25] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Am. Math. Soc. 72 (1978), 297-300. [26] K. Ravi, J. M. Rassias, S. Pinelas, S. Suresh, General solution and stability of quattuordecic functional equation in quasi β-normed spaces, Adv. Pure Math. 6 (2016), 921-941. [27] K. Ravi, J. M. Rassias, B. V. S. Kumar, Ulam-Hyers stability of undecic functional equation in quasi-beta normed spaces fixed point method, Tbilisi Math. Sci. 9 (2016), 83-103. [28] Z.-J. Ruan, Subspaces of C ∗ -algebras, J. Funct. Anal. 76 (1988), 217-230. [29] Y. Shen, W. Chen, On the stability of septic and octic functional equations, J. Comput. Anal. Appl. 18 (2015), 277-290. [30] S. M. Ulam, Problems in Modern Mathematics, Science Editions, Wiley, New York, 1964. [31] Z. Wang, P. K. Sahoo, Stability of an ACQ- functional equation in various matrix normed spaces, J. Nonlinear Sci. Appl. 8 (2015), 64-85. [32] T. Z. Xu , J. M. Rassias, M. J. Rassias, W. X. Xu, A fixed point approach to the stability of quintic and sextic functional equations in quasi-β normed spaces, J. Inequal. Appl. 2010 (2010), Art. ID 423231.

333

MURALI RAMDOSS ET AL 318-333

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A novel similarity measure for pseudo-generalized fuzzy rough sets Zhan-hong Shi∗ , Ding-hai Zhang College of Science, Gansu Agricultural University, Lanzhou 730070, P.R. China

Abstract: Various fuzzy generalizations of rough approximations have been made over the years. In this paper, the pseudo-generalized fuzzy rough sets are presented and some properties of the pseudo fuzzy rough approximation operators are investigated. It is necessary to measure the similarity between two pseudo-generalized fuzzy rough sets in some practical cases, such as pattern recognition, image processing and fuzzy reasoning. A novel similarity measure between two pseudo-generalized fuzzy rough sets is proposed in this paper. At the same time, we show that the similarity measure between two pseudo-generalized fuzzy rough sets can be given according to the pseudo-operation. Keywords: Pseudo-operations; Fuzzy rough sets; Approximation operators; Similarity measure

1. Introduction The theory of rough set[27] as a mathematical approach to handle imprecision, vagueness and uncertainty in data analysis. However, in Pawlak’s rough set model[27], the equivalence relation is a key and primitive notion. This equivalence relation may limit the application domain of the rough set model. Generalizations of rough set theory were considered by scholars in order to deal with complex practical problems [6,13,32,36,38,43]. There are at least two approaches for the development of definitions of lower and upper approximation operators, namely, the constructive and axiomatic approaches. In the constructive approach, some authors have extended equivalence relation to tolerance relations [21,33], similarity relations [34], ordinary binary relations [42,43], and others [16,28,48]. Meanwhile, some authors have relaxed the partition of universe to the covering and obtain the covering-based rough sets [29,32,40,45-47]. In addition, generalizations of rough sets to the fuzzy environment have also been made [5,6,9,12,36]. By introducing the lower and upper approximations in fuzzy set theory, Dubois and Prade [4] formulated rough fuzzy sets and fuzzy rough sets, they constructed a pair of lower and upper approximation operators for fuzzy sets with respect to fuzzy similarity relation by using the t-norm Min and its dual conorm Max. By using a residual implication (for short, R-implication) to define the lower approximation operator, Morsi and Yakout [19] generalized the fuzzy ∗ Corresponding author. E-mail: [email protected] (Z.H. Shi)

334

Zhan-hong Shi et al 334-347

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

rough sets in the sense of Dubois and Prade. Later, Radzikowska and Kerre [30] proposed a more general approach to the fuzzification of a rough set. This approach is based on a border implication I (not necessarily a R-implication) and a triangular norm T . In the axiomatic approaches, a set of axioms is used to characterize the approximations. Lin and Liu [14] proposed six axioms on a pair of abstract operators on the power set of universe in the framework of topological spaces. Under these axioms, there exists an equivalence relation such that the lower and upper approximations are the same as the abstract operators. The most important axiomatic studies for crisp rough sets were made by Yao [41-43]. Recently, the research of the axiomatic approach has also been extended to approximation operators in the fuzzy environment [15,18,19,31,37,39]. In some problems with uncertainty in the theory of probabilistic metric spaces, fuzzy logics and fuzzy measures, the pseudo-operations such as pseudo-additions and pseudomultiplications are usually used [7,11,24]. Pseudo-analysis [7,8,10,11,22-26,35] has been applied in different fields, e.g., measure theory, integration, convolution, Laplace transform, optimization, nonlinear differential and difference equations, economics, game theory, etc. Interestingly, by using the Aczel’s theorem [1], the pseudo-additions and pseudomultiplications could be transferred into the corresponding results of reals such as the addition operator and multiplication operator. This can bring us the convenience of calculation. We note that there are some literatures about pseudo integrals [7,8,10,25,35], but little literatures about rough set model based on pseudo-operations. In order to present the rough set model based on pseudo-operations, a general framework for the study of fuzzy rough approximation operators based on pseudo-operations are studied by Shi and Gong[31]. In [31], by using the pseudo-operations, the pseudo-lower and pseudo-upper approximation operators are defined. Meanwhile, some properties of the proposed pseudo fuzzy rough approximation operators are investigated. Compared with the previous rough set models based on triangular norms [18,19,30,39], the pseudo-generalized fuzzy rough sets[31] have its advantages to calculate its lower and upper approximations conveniently. In recent years, various similarity measure between generalized fuzzy sets are given[2,3,17,20]. It is necessary to measure the similarity between two pseudo-generalized fuzzy rough sets in some practical cases, such as pattern recognition, image processing and fuzzy reasoning. In this paper, we will present a novel similarity measure between two pseudo-generalized fuzzy rough sets. We show that the similarity measure between two pseudo-generalized fuzzy rough sets can be given according to the pseudo-operation. The remainder of this paper is organized as follows. In section 2, we recall some basic concepts of rough sets, fuzzy sets, fuzzy relation and pseudo-operations. In section 3, the pseudo-generalized fuzzy rough sets are presented. Some properties of the proposed pseudo fuzzy rough approximation operators are also investigated in this section. In Section 4, the similarity measure between pseudo-generalized fuzzy rough sets is proposed. Section 5 presents conclusions.

335

Zhan-hong Shi et al 334-347

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2. Preliminaries 2.1 Pawlak rough sets In traditional Pawlak rough set theory, the pair (U, R) is called an approximation space (it is also called Pawlak approximation space), where U is a finite and non-empty set called the universe and R is an equivalence relation on U , i.e., R is reflexive, symmetrical and transitive. The relation R decomposes the set U into a disjoint class in such a way that two elements x and y are in the same class iff (x, y) ∈ R. Suppose R is an equivalence relation on U . With respect to R, we can define an equivalence class of an element x in U as follows: [x]R = {y| (x, y) ∈ R}. The quotient set of U by the relation R is denoted by U/R, and U/R = {X1 , X2 , · · · , Xm }. where Xi (i = 1, 2, · · · , m) is an equivalence class of R. Given an arbitrary set X ⊆ U , it may not be possible to describe X precisely in the approximation space (U, R). One may characterize X by a pair of lower and upper approximations defined as follows: ∪ RX = {x ∈ U | [x]R ⊆ X} = {Y ∈ U/R| Y ⊆ X}; ∪ RX = {x ∈ U | [x]R ∩ X ̸= ∅} = {Y ∈ U/R| Y ∩ X ̸= ∅}. The pair (RX, RX) is referred to as a rough set of X. 2.2 Fuzzy sets Let U be a universe. Fuzzy set A is a mapping from U into the unit interval [0, 1]: A : U → [0, 1], where for each x ∈ U , we call A(x) the membership degree of x in A. If U = {x1 , x2 , · · · , xn }, then the fuzzy set A on U can be expressed by

n ∑

A(xi )/xi .

i=1

Additionally, the fuzzy power set, i.e., the set of all fuzzy sets in the universe U is denoted by F(U ) [44]. For fuzzy sets A, B ∈ F(U ), A ⊆ B ⇔ A(x) ≤ B(x); (A ∩ B)(x) = A(x) ∧ B(x) = min{A(x), B(x)}; (A ∪ B)(x) = A(x) ∨ B(x) = max{A(x), B(x)}; (∼ A)(x) = 1 − A(x), where ∼ A is the complement of A. 2.3 Fuzzy relation 336

Zhan-hong Shi et al 334-347

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Let U and W be two nonempty sets. The Cartesian product of U and W is denoted by U × W. A fuzzy relation R from U to W is a fuzzy subset of U × W , i.e., R ∈ F (U × W ), and R(x, y) is called the degree of relation between x and y. In particular, if U = W , we call R a fuzzy relation on U . Usually, a fuzzy relation can be expressed by a fuzzy matrix. 2.4 Pseudo-operations Throughout this paper, we only consider the case of pseudo-addition and present the fuzzy generalized rough sets using pseudo-addition. For the case of pseudo-multiplication, the discussion can be given similarly. Definition 2.1 An operation ⊕ : [0, ∞]2 → [0, ∞] is called a pseudo-addition if it satisfies the following axioms: (1) Associativity: a ⊕ (b ⊕ c) = (a ⊕ b) ⊕ c for all a, b, c ∈ [0, ∞]. (2) Monotonicity: a ⊕ b ≤ c ⊕ d whenever 0 ≤ a ≤ c ≤ ∞, 0 ≤ b ≤ d ≤ ∞. (3) 0 is neutral element: a ⊕ 0 = 0 ⊗ a = a for all a ∈ [0, ∞]. (4) Continuity: for any sequences (an )n∈N , (bn )n∈N in [0, ∞]N such that lim an = a n→∞ and lim bn = b it holds lim an ⊕ bn = a ⊕ b. n→∞

n→∞

From [11], we know that each pseudo-addition is also commutative, i.e., it satisfies (5) Commutativity: a ⊕ b = b ⊕ a for all a, b ∈ [0, ∞]. Lemma 2.1 (Aczel’s theorem) Let g be a positive strictly monotone function defined on [a, b] ⊆ (−∞, +∞) such that 0 ∈ Ran(g). The generalized generated pseudo-addition ⊕ and the generalized generated pseudo-multiplication ⊙ are given by x ⊕ y = g −1 (g(x) + g(y)), x ⊙ y = g −1 (g(x)g(y)), where g −1 is pseudo-inverse function for function g: g −1 (y) = sup{x ∈ [a, b]|g(x) < y} if g is a non-decreasing function and g −1 (y) = sup{x ∈ [a, b]|g(x) > y} if g is a non-increasing function. Example 2.1 Suppose that g(x) = 1 − x (x ∈ [0, 1]), then its pseudo-inverse is { 1 − x, x ∈ [0, 1], g −1 (x) = 0, x ∈ [1, +∞). And x ⊕ y = g −1 (g(x) + g(y)) = max{0, x + y − 1}, this is Lukasiewicz t-norm. 3. Construction of pseudo fuzzy rough approximation operators Definition 3.1 Let (U, W, R) be a fuzzy approximation space, where U and W are two nonempty sets, R is a fuzzy relation from U to W . g : [0, 1] → [0, +∞) is a strictly decreasing function such that g(1) = 0 and g(x) + g(y) ∈ Ran(g) ∪ [g(0+ ), +∞) for all (x, y) ∈ [0, 1]2 . Then for any A ∈ F(W ), the pseudo-lower approximation R⊕ (A) and the pseudo-upper approximation R⊕ (A) of A are defined as follows, respectively: 337

Zhan-hong Shi et al 334-347

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

R⊕ (A)(x) =



{1−R(x, y)⊕(1−A(y))} =

y∈W

U; R⊕ (A)(x) =

∨ y∈W



{1−g −1 (g(R(x, y))+g(1−A(y)))}, x ∈

y∈W

{R(x, y) ⊕ A(y)} =



{g −1 (g(R(x, y)) + g(A(y)))}, x ∈ U.

y∈W

The pair (R⊕ (A), R⊕ (A)) is called a pseudo-generalized fuzzy rough set. R⊕ and R⊕ are referred to as the pseudo-lower and pseudo-upper fuzzy rough approximation operators, respectively. Remark 3.1 If R is a crisp binary relation from U to W , then the pseudo fuzzy rough approximation operators defined in Definition 3.1 are degenerated into the approximation operators defined in [37]. That is, for every A ∈ F (W ), x ∈ U, R⊕ (A)(x) = sup{A(y)|y ∈ Rs (x)}, R⊕ (A)(x) = inf{A(y)|y ∈ Rs (x)}, where Rs (x) = {y ∈ W |(x, y) ∈ R}. In fact, R⊕ (A)(x) ∨ = {g −1 (g(R(x, y)) + g(A(y)))} y∈W ∨ = sup{g −1 (g(1) + g(A(y)))|y ∈ Rs (x)} sup{g −1 (g(0) + g(A(y)))|y ∈ / Rs (x)} = sup{g −1 (g(1) + g(A(y)))|y ∈ Rs (x)} = sup{g −1 (0 + g(A(y)))|y ∈ Rs (x)} = sup{A(y)|y ∈ Rs (x)}, R⊕ (A)(x) ∧ = {1 − g −1 (g(R(x, y)) + g(1 − A(y)))} y∈W

= inf{1−g −1 (g(1)+g(1−A(y)))|y ∈ Rs (x)}



inf{1−g −1 (g(0)+g(1−A(y)))|y ∈ /

Rs (x)} = inf{1 − g −1 (g(1) + g(1 − A(y)))|y ∈ Rs (x)} = inf{1 − g −1 (0 + g(1 − A(y)))|y ∈ Rs (x)} = inf{A(y)|y ∈ Rs (x)}. Remark 3.2 If R is a crisp binary relation on U and A is a crisp set on U , then the pseudo fuzzy rough approximation operators defined in Definition 3.1 are degenerated into the approximation operators defined in [43]. That is, for any A ∈ P (U ), x ∈ U, R⊕ (A) = {x ∈ U |Rs (x) ∩ A ̸= ϕ}, R⊕ (A) = {x ∈ U |Rs (x) ⊆ A}. where Rs (x) = {y ∈ U |(x, y) ∈ R}. In fact, by Remark 3.2, we know that if A ∈ P (U ) then for any x ∈ U, x ∈ R⊕ (A) ⇔ R⊕ (A)(x) = 1 ⇔ ∃ y ∈ Rs (x) such that A(y) = 1, i.e., y ∈ A ⇔ Rs (x) ∩ A ̸= ϕ, x ∈ R⊕ (A) ⇔ R⊕ (A)(x) = 1 ⇔ A(y) = 1 for every y ∈ Rs (x), i.e., y ∈ A ⇔ Rs (x) ⊆ A.

338

Zhan-hong Shi et al 334-347

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Remark 3.3 If R is a crisp equivalence relation on U and A is a fuzzy set on U , then the pseudo fuzzy rough approximation operators defined in Definition 3.1 are degenerated into the approximation operators defined in [4]. That is, for every A ∈ F (U ), x ∈ U, R⊕ (A)(x) = sup{A(y)|y ∈ [x]R }, R⊕ (A)(x) = inf{A(y)|y ∈ [x]R }. In fact, if R is a crisp equivalence relation on U , then Rs (x) = [x]R . Remark 3.4 If R is a crisp equivalence relation on U and A is a crisp set on U , then the pseudo fuzzy rough approximation operators defined in Definition 3.1 are degenerated into the approximation operators defined in [27]. That is, for any A ∈ P (U ), x ∈ U, R⊕ (A) = {x ∈ U |[x]R ∩ A ̸= ϕ}, R⊕ (A) = {x ∈ U |[x]R ⊆ A}. Theorem 3.1 Let R be a fuzzy relation from U to W . Then the pseudo-lower fuzzy rough approximation operator R⊕ and the pseudo-upper fuzzy rough approximation operator R⊕ satisfy the following properties: for any A, B ∈ F (W ), x ∈ U , y ∈ W , (1) R⊕ (A) =∼ R⊕ (∼ A), R⊕ (A) =∼ R⊕ (∼ A); (2) R⊕ (W ) = U, R⊕ (ϕ) = ϕ; (3) R⊕ (A ∩ B) = R⊕ (A) ∩ R⊕ (B), R⊕ (A ∪ B) = R⊕ (A) ∪ R⊕ (B); (4) A ⊆ B ⇒ R⊕ (A) ⊆ R⊕ (B), A ⊆ B ⇒ R⊕ (A) ⊆ R⊕ (B); (5) R⊕ (A ∪ B) ⊇ R⊕ (A) ∪ R⊕ (B), R⊕ (A ∩ B) ⊆ R⊕ (A) ∩ R⊕ (B). Proof ∨ (1) R⊕ (∼ A)(x) = {g −1 (g(R(x, y)) + g(1 − A(y)))} y∈W



= 1−

{1 − g −1 (g(R(x, y)) + g(1 − A(y)))}

y∈W

= 1 − R⊕ (A)(x) = ∼ R⊕ (A)(x). It follows that R⊕ (A) =∼ R⊕ (∼ A). Similarly, R⊕ (A) =∼ R⊕ (∼ A) can be verified. ∧ (2) R⊕ (W )(x) = {1 − g −1 (g(R(x, y)) + g(1 − W (y)))} y∈W

=



{1 − g −1 (g(R(x, y) + 1))}

y∈W

= 1. Therefore, R⊕ (W ) = U . R⊕ (ϕ) = ϕ can be verified in a similar way.

339

Zhan-hong Shi et al 334-347

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(3) R⊕ (A ∩ B)(x) =



{1 − g −1 (g(R(x, y)) + g(1 − min{A(y), B(y)}))}

y∈W

=



{1 − g −1 (g(R(x, y)) + min{g(A(y)), g(B(y))})}

y∈W

=



{1 − g −1 (min{g(R(x, y) + g(A(y))), g(R(x, y) + g(B(y)))})}

y∈W

= min{



{1 − g −1 (g(R(x, y)) + g(A(y))),

y∈W



{1 − g −1 (g(R(x, y))

y∈W

+g(B(y)))} = min{R⊕ (A)(x), R⊕ (B)(x)}. That is, R⊕ (A ∩ B) = R⊕ (A) ∩ R⊕ (B). Similarly, R⊕ (A ∪ B) = R⊕ (A) ∪ R⊕ (B) is also hold. (4) A ⊆ B ⇔ A(y) ≤ B(y) ⇔ 1 − A(y) ≥ 1 − B(y), it implies that ∧ R⊕ (A)(x) = {1 − g −1 (g(R(x, y)) + g(1 − A(y)))} y∈W





{1 − g −1 (g(R(x, y)) + g(1 − B(y)))}

y∈W

= R⊕ (B)(x). That is, A ⊆ B ⇒ R⊕ (A) ⊆ R⊕ (B). Similarly, A ⊆ B ⇒ R⊕ (A) ⊆ R⊕ (B). (5) R∧ ⊕ (A ∪ B)(x) = {1 − g −1 (g(R(x, y)) + g(1 − max{A(y), B(y)}))} ∧

y∈W

=

{1 − g −1 (g(R(x, y)) + max{g(1 − A(y)), g(1 − B(y))})}

y∈W

≥ max{



{1−g −1 (g(R(x, y))+g(1−A(y)))},

y∈W



{1−g −1 (g(R(x, y))+g(1−B(y)))}}

y∈W

= max{R⊕ (A)(x), R⊕ (B)(x)} Thus R⊕ (A ∪ B) ⊇ R⊕ (A) ∪ R⊕ (B). Similarly, R⊕ (A ∩ B) ⊆ R⊕ (A) ∩ R⊕ (B).



4. Similarity measure between pseudo-generalized fuzzy rough sets It is necessary to measure the similarity between two pseudo-generalized fuzzy rough sets in some practical cases, such as pattern recognition, image processing and fuzzy reasoning. In this section, we will show that in a fuzzy approximation space, similarity measure between two pseudo-generalized fuzzy rough sets can be given according to the pseudo-operation. Let (U, R) be a fuzzy approximation space, where R is a fuzzy relation on U . Suppose there are two pseudo-generalized fuzzy rough sets (R⊕ (A), R⊕ (A)) and (R⊕ (B), R⊕ (B)).

340

Zhan-hong Shi et al 334-347

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Definition 4.1 Let U be a universe of discourse. A real function D : F(U )×F(U ) → [0, 1] is called an inclusion degree on F(U ) if for any A, B, C ∈ F (U ), D satisfies the following properties: (1)0 ≤ D(B/A) ≤ 1; (2)A ⊆ B ⇒ D(B/A) = 1; (3)A ⊆ B ⊆ C ⇒ D(A/C) ≤ D(A/B). In particular, let (X, ≤) be a partially ordered set, a real function D : X ×X → [0, 1] is called an inclusion degree on X if for any x, y, z ∈ X, D satisfies the following properties: (1)0 ≤ D(y/x) ≤ 1; (2)x ≤ y ⇒ D(y/x) = 1; (3)x ≤ y ≤ z ⇒ D(x/z) ≤ D(x/y). Theorem 4.1 Let g be a strictly decreasing function on [0, 1] such that g(1) = 0. For any a, b ∈ [0, 1], we define ′

θ (b/a) = sup{c ∈ [0, 1]| a ⊕ c ≤ b}. ′

Then θ is an inclusion degree on [0, 1]. Proof It follows immediately from Definition 4.1.  Theorem 4.2 Let (U, R) be a fuzzy approximation space. For any A, B ∈ F(U ), (R⊕ (A), R⊕ (A)) and (R⊕ (B), R⊕ (B)) are two pseudo-generalized fuzzy rough sets on U . Then n 1∑ ′ θ(B/A) = θ (R⊕ (B)(xi )/R⊕ (A)(xi )) (4.1) n i=1 and

1∑ ′ θ(B/A) = θ (R⊕ (B)(xi )/R⊕ (A)(xi )) n i=1 n

(4.2)

are inclusion degree on F(U ). Proof We need only to prove that θ determined by formula (4.1) is an inclusion degree on F(U ). ′ ′ (1) By the definition of θ , 0 ≤ θ (R⊕ (B)(xi )/R⊕ (A)(xi )) ≤ 1 is obvious. Therefore 0 ≤ θ(B/A) ≤ 1. (2) If A ⊆ B, by Theorem 3.1, we know that R⊕ (A) ⊆ R⊕ (B), i.e., R⊕ (A)(x) ≤ R⊕ (B)(x), x ∈ U. Thus, ′

θ (R⊕ (B)(xi )/R⊕ (A)(xi )) = 1. 341

Zhan-hong Shi et al 334-347

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Therefore θ(B/A) = 1. (3) If A ⊆ B ⊆ C (A, B, C ∈ F(U )), then by Theorem 3.1, R⊕ (A) ⊆ R⊕ (B) ⊆ R⊕ (C), i.e., R⊕ (A)(x) ≤ R⊕ (B)(x) ≤ R⊕ (C)(x) for every x ∈ U . Thus, we can obtain θ(A/C) ≤ θ(A/B).  Definition 4.2 A real function S : F(U ) × F(U ) → [0, 1] is called a similarity measure on F(U ) if for any A, B, C ∈ F(U ), S satisfies the following properties: (1) 0 ≤ S(A, B) ≤ 1, S(A, A) = 1; (2) S(A, B) = S(B, A); (3) A ⊆ B ⊆ C ⇒ S(A, C) ≤ S(A, B). Theorem 4.3 Let (U, R) be a fuzzy approximation space. For any A, B ∈ F(U ), (R⊕ (A), R⊕ (A)) and (R⊕ (B), R⊕ (B)) are two pseudo-generalized fuzzy rough sets on U . Then 1 S(A, B) = [θ(B/A) ⊕ θ(A/B) + θ(B/A) ⊕ θ(A/B)] 2 is a similarity measure between (R⊕ (A), R⊕ (A)) and (R⊕ (B), R⊕ (B)), where x ⊕ y = g −1 (g(x) + g(y)) and g : [0, 1] → [0, +∞) is a strictly decreasing function such that g(1) = 0. Proof (1) By g −1 : [0, +∞) → [0, 1], we have 0 ≤ θ(B/A) ⊕ θ(A/B) ≤ 1, 0 ≤ θ(B/A) ⊕ θ(A/B) ≤ 1. Thus, 0 ≤ S(A, B) ≤ 1. And by θ(A/A) = 1 and θ(A/A) = 1, we get S(A, A) = 1. (2) By x ⊕ y = y ⊕ x, we have S(A, B) = S(B, A). (3) If A ⊆ B ⊆ C (A, B, C ∈ F(U )), by θ and θ are inclusion degree on F(U ), we obtain that θ(A/C) ≤ θ(A/B), θ(A/C) ≤ θ(A/B). On the other hand, 1 [θ(C/A) ⊕ θ(A/C) + θ(C/A) ⊕ θ(A/C)] 2 1 = [1 ⊕ θ(A/C) + 1 ⊕ θ(A/C)] 2 1 = [θ(A/C) + θ(A/C)], 2

S(A, C) =

342

Zhan-hong Shi et al 334-347

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1 [θ(B/A) ⊕ θ(A/B) + θ(B/A) ⊕ θ(A/B)] 2 1 [1 ⊕ θ(A/B) + 1 ⊕ θ(A/B)] = 2 1 = [θ(A/B) + θ(A/B)]. 2

S(A, B) =

Hence S(A, C) ≤ S(A, B). This completes the proof.  Example 4.1 Let U = {x1 , x2 , x3 } be a universe of discourse, R be a fuzzy relation on U (see Table 1). Table 1: A fuzzy U x1 x1 1 x2 0.4 x3 0.6

relation on U x2 x3 0.4 0.6 1 0.7 0.7 1

Suppose that A = 0.3/x1 + 0.4/x2 + 0.8/x3 , B = 0.2/x1 + 0.7/x2 + 0.8/x3 , and g(x) = 1 − x (x ∈ [0, 1]). Then the pseudo-lower and pseudo-upper approximations of A and B can be computed as follows: In one hand, R⊕ (A)(x1 ) = min{1 − g −1 (0 + 0.3), 1 − g −1 (0.6 + 0.4), 1 − g −1 (0.4 + 0.8)} = 0.3; R⊕ (A)(x2 ) = min{1 − g −1 (0.6 + 0.3), 1 − g −1 (0 + 0.4), 1 − g −1 (0.3 + 0.8)} = 0.4; R⊕ (A)(x3 ) = min{1 − g −1 (0.4 + 0.3), 1 − g −1 (0.3 + 0.4), 1 − g −1 (0 + 0.8)} = 0.7; R⊕ (A)(x1 ) = max{g −1 (0 + 0.7), g −1 (0.6 + 0.6), g −1 (0.4 + 0.2)} = 0.4; R⊕ (A)(x2 ) = max{g −1 (0.6 + 0.7), g −1 (0 + 0.6), g −1 (0.3 + 0.2)} = 0.5; R⊕ (A)(x3 ) = max{g −1 (0.4 + 0.7), g −1 (0.3 + 0.6), g −1 (0 + 0.2)} = 0.8. That is, R⊕ (A) = 0.3/x1 + 0.4/x2 + 0.7/x3 , R⊕ (A) = 0.4/x1 + 0.5/x2 + 0.8/x3 . On the other hand, R⊕ (B)(x1 ) = min{1 − g −1 (0 + 0.2), 1 − g −1 (0.6 + 0.7), 1 − g −1 (0.4 + 0.8)} = 0.2; R⊕ (B)(x2 ) = min{1 − g −1 (0.6 + 0.2), 1 − g −1 (0 + 0.7), 1 − g −1 (0.3 + 0.8)} = 0.7; R⊕ (B)(x3 ) = min{1 − g −1 (0.4 + 0.2), 1 − g −1 (0.3 + 0.7), 1 − g −1 (0 + 0.8)} = 0.6; R⊕ (B)(x1 ) = max{g −1 (0 + 0.8), g −1 (0.6 + 0.3), g −1 (0.4 + 0.2)} = 0.4; 343

Zhan-hong Shi et al 334-347

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

R⊕ (B)(x2 ) = max{g −1 (0.6 + 0.8), g −1 (0 + 0.3), g −1 (0.3 + 0.2)} = 0.7; R⊕ (B)(x3 ) = max{g −1 (0.4 + 0.8), g −1 (0.3 + 0.3), g −1 (0 + 0.2)} = 0.8. That is, R⊕ (B) = 0.2/x1 + 0.7/x2 + 0.6/x3 , R⊕ (B) = 0.4/x1 + 0.7/x2 + 0.8/x3 . ′

Since g(x) = 1 − x, so θ (b/a) = sup{c ∈ [0, 1]| a ⊕ c ≤ b} = 1 ∧ (1 − a + b). Therefore 1∑ ′ 1 28 θ(B/A) = θ (R⊕ (B)(xi )/R⊕ (A)(xi )) = (0.9 + 1 + 0.9) = , 3 i=1 3 30 3

1∑ ′ 1 27 θ(A/B) = θ (R⊕ (A)(xi )/R⊕ (B)(xi )) = (1 + 0.7 + 1) = , 3 i=1 3 30 3

1 1∑ ′ θ (R⊕ (B)(xi )/R⊕ (A)(xi )) = (1 + 1 + 1) = 1, θ(B/A) = 3 i=1 3 3

1∑ ′ 1 28 θ(A/B) = θ (R⊕ (A)(xi )/R⊕ (B)(xi )) = (1 + 0.8 + 1) = , 3 i=1 3 30 3

and θ(B/A) ⊕ θ(A/B) = g −1 [g(θ(B/A)) + g(θ(A/B))] = g −1 [1 −

28 27 5 +1− ]= , 30 30 6

θ(B/A) ⊕ θ(A/B) = g −1 [g(θ(B/A)) + g(θ(A/B))] = g −1 [1 − 1 + 1 −

28 14 ]= . 30 15

Thus, the similarity measure between (R⊕ (A), R⊕ (A)) and (R⊕ (B), R⊕ (B)) can be given as follows: 1 5 14 1 53 S(A, B) = [θ(B/A) ⊕ θ(A/B) + θ(B/A) ⊕ θ(A/B)] = ( + ) = . 2 2 6 15 60 5. Conclusions It is interesting to combine pseudo-operations and rough set in order to expand the application domain of pseudo-analysis and rough set. In this paper, we presented a generalized fuzzy rough set model based on pseudo-operation, constructed pseudo fuzzy rough approximation operations. Because it is necessary to measure the similarity between two fuzzy rough sets in some practical cases, using the pseudo-operations, the similarity measure between pseudo-generalized fuzzy rough sets are given in this paper. The results of this paper may be applied to some practical problems about pattern recognition or fuzzy reasoning. 344

Zhan-hong Shi et al 334-347

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Acknowledgement This work is supported by the National Natural Science Foundation of China (No. 41661022). References [1] J. Aczel, Lectures on Functional Equations and their Applications, Academic Press, New York, 1966. [2] S.M. Chen, S.H. Cheng, and T.C. Lan, A novel similarity measure between intuitionistic fuzzy sets based on the centroid points of transformed fuzzy numbers with applications to pattern recognition, Information Sciences. 343, 15-40 (2016) . [3] P, Chazara, S. Negny, and L. Montastru, Flexible knowledge representation and new similarity measure: Application on case based reasoning for waste treatment, Expert Systems with Applications. 58, 143–154 (2016). [4] D. Dubois and H. Prade, Rough fuzzy sets and fuzzy rough sets, International Journal of Gerneral Systems. 17, 191-208 (1990). [5] T. Feng and J.S. Mi, Variable precision multigranulation decision-theoretic fuzzy rough sets, Knowledge-Based Systems. 91, 93–101 (2016). [6] Z.T. Gong, B.Z. Sun, and D.G. Chen, Rough set theory for the interval-valued fuzzy information systems, Information Sciences. 178, 1968-1985 (2008). [7] H. Ichihashi, M. Tanaka, and K. Asai, Fuzzy integrals based on pseudo-additions and multiplications, Journal of Mathematical Analysis and Applications. 130, 354-364 (1988). [8] S.P. Ivana, G. Tatjana, and D. Martina, Riemann-Stieltjes type integral based on generated pseudo-operations, Novi Sad Journal of Mathematics. 36, 111-124 (2006). [9] L.I. Kuncheva, Fuzzy rough set: application to feature selection, Fuzzy Sets and Systems. 51, 147-153 (1992). [10] K. Lendelova, On the pseudo-Lebesgue-Stieltjes integral, Novi Sad Journal of Mathematics. 36, 125-136 (2006). [11] J. Li, M. Radko, and S. Peter, Pseudo-optimal measures, Information Sciences. 180,40154021 (2010) . [12] T.J. Li, Y. Leung, and W.X. Zhang, Generalized fuzzy rough approximation operators based on fuzzy coverings, International Journal of Approximate Reasoning. 48, 836-856 (2008). [13] T.Y. Lin, Neighborhood systems and relational database, In Proceedings of 1988 ACM sixteenth annual computer science conference, February (1998) 23-25. [14] T.Y. Lin and Q. Liu, Rough approximate operators: axiomatic rough set theory, in: W. Ziarko (Ed.), Rough Sets, Fuzzy Sets and Knowledge Discovery, Springer, Berlin, 1994, pp. 256-260. [15] G.L. Liu, Axiomatic systems for rough sets and fuzzy rough sets, International Journal of Approximation Reasoning. 48, 857-867 (2008). 345

Zhan-hong Shi et al 334-347

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[16] G.L. Liu, Generalized rough sets over fuzzy lattices, Information Sciences. 178, 1651-1662 (2008). [17] P. Muthukumara, G. Sai, and S. Krishnan, A similarity measure of intuitionistic fuzzy soft sets and its application in medical diagnosis, Applied Soft Computing. 41, 148–156 (2016). [18] J.S. Mi, Y. Leung, H.Y. Zhao, and T. Feng, Generalized fuzzy rough sets determined by a triangular norm, Information Sciences. 178, 3203-3213 (2008). [19] N.N. Morsi and M.M. Yakout, Axiomatics for fuzzy rough sets, Fuzzy Sets and Systems. 100, 327-342 (1998). [20] H. Nguyen, A novel similarity/dissimilarity measure for intuitionistic fuzzy sets and its application in pattern recognition, Expert Systems with Applications 45, 97–107 (2016). [21] Y. Ouyang, Z.D. Wang, and H.P. Zhang, On fuzzy rough sets based on tolerance relations, Information Sciences. 180, 532-542 (2010). [22] E. Pap and N. Ralevic, Pseudo-Laplace transform, Nonlinear Analysis. 33, 533-550 (1998). [23] E. Pap and I. Stajner, Generalized pseudo-convolution in the theory of probabilistic metric spaces, information, fuzzy numbers, optimization, system theory, Fuzzy Sets and Systems. 102, 393-415 (1999). [24] E. Pap, Pseudo-additive measures and their applications, in: E. Pap (Ed.), Handbook of Measure Theory, Elsevier, North-Holland, Amsterdam, 2002, 1237-1260. [25] E. Pap, Generalization of the Jensen inequality for pseudo-integral, Information Sciences. 180, 543-548 (2010). [26] E. Pap, Generalized real analysis and its applications, International Journal of Approximate Reasoning. 47, 368-386 (2008). [27] Z. Pawlak, Rough Sets, International Journal of Computer and Information Sciences. 11, 341-356 (1982) . [28] Z. Pawlak and Skowron A, Rough sets: Some extension, Information Sciences. 177, 28-40 (2006). [29] K. Qin, Y. Gao, and Z. Pei, On covering rough sets, in: The Second International Conference on Rough Sets and Knowledge Technology (RSKT 2007), Lecture Notes in Computer Science. 4481, 34-41 (2007). [30] A.M. Radzikowska, and E.E. Kerre, A comparative study of fuzzy rough sets, Fuzzy Sets and Systems. 126, 137-155 (2002). [31] Z.H. Shi and Z.T. Gong, Measuring fuzziness of generalized fuzzy rough sets induced by pseudo-operations, Journal of Computational Analysis and Applications. 16, 56-66 (2014). [32] Z.H. Shi and Z.T. Gong, The further investigation of covering-based rough sets: uncertainty characterization, similarity measure and generalized models, Information Sciences. 180, 3745-3763 (2010). [33] A. Skowron and J. Stepaniuk, Tolerance approximation spaces, Fundamenta Informaticae. 27, 245-253 (1996). [34] R. Slowinski and D. Vanderpooten, A generalized definition of rough approximations based on similarity, IEEE Transactions on Knowledge and Data Engineering. 2, 331-336 (2000). 346

Zhan-hong Shi et al 334-347

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[35] M. Sugeno and T. Murofushi, Pseudo-additive measures and integrals, Journal of Mathematical Analysis and Applications. 122, 197-222 (1987). [36] B.Z. Sun, Z.T. Gong, and D.G. Chen, Fuzzy-rough set theory for the interval-valued fuzzy information systems, Information Sciences. 178, 2794-2815 (2008). [37] W.Z. Wu, J.S. Mi, and W.X. Zhang, Generalized fuzzy rough sets, Information Sciences. 151, 263-282 (2003). [38] W.Z. Wu and W.X. Zhang, Constructive and axiomatic approaches of fuzzy approximation operators, Information Sciences. 159, 233-254 (2004). [39] W.Z. Wu, Y. Leung, and J.S. Mi, On characterizations of (I,T)-fuzzy rough approximation operators, Fuzzy Sets and Systems. 154, 76-102 (2005). [40] W.H. Xu and W.X. Zhang, Measuring roughness of generalized rough sets induced by a covering, Fuzzy Sets and Systems. 158, 2443-2455 (2007). [41] Y.Y. Yao, A comparative study of fuzzy sets and rough sets, Information Sciences. 109, 227-242 (1998). [42] Y.Y. Yao, Relational interpretations of neighborhood operators and rough set approximation operators, Information Sciences. 111, 239-259 (1998). [43] Y.Y. Yao, Constructive and algebraic method of rough sets, Information Sciences. 109, 21-47 (1998). [44] L.A. Zadeh, Fuzzy sets, Information and Control. 8, 338-353 (1965). [45] W. Zakowski, Approximations in the space (U, Π), Demonstratio Mathematica. 16, 761-769 (1983). [46] W.Y. Zeng, Y.B. Zhao, and Y.D. Gu, Similarity measure for vague sets based on implication functions, Knowledge-Based Systems. 94, 124–131 (2016). [47] W. Zhu and F.Y. Wang, Reduction and axiomization of covering generalized rough sets, Information Sciences. 152, 217-230 (2003). [48] W. Zhu, Generalized rough sets based on relations, Information Sciences. 177, 4997-5011 (2007).

347

Zhan-hong Shi et al 334-347

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FOURIER SERIES OF FUNCTIONS INVOLVING HIGHER-ORDER EULER POLYNOMIALS TAEKYUN KIM, DAE SAN KIM, LEE CHAE JANG, AND GWAN-WOO JANG

Abstract. In this paper, we consider three types of functions involving higher-order Euler polynomials and derive their Fourier series expansions. In addition, we express each of them in terms of Bernoulli functions.

1. Introduction (r)

For each positive integer r, Euler polynomials Em (x) of order r are given by the generating function  r ∞ X 2 tm xt (r) , (see [2 − 4, 11 − 13, 17, 19]), e = E (x) (1.1) m et + 1 m! m=0 (r)

(r)

(1)

When x = 0, Em = Em (0) are called Euler numbers of order r. For r = 1, Em (x) = Em (x) and (1) Em = Em are called Euler polynomials and numbers, respectively. From (1.1), we see that d (r) (r) E (x) = mEm−1 (x), (m ≥ 0), dx m (r) (r) (r−1) Em (x + 1) + Em (x) = 2Em (x), (m ≥ 0).

(1.2)

(r) (r−1) (r) Em (1) = 2Em − Em , (m ≥ 0).

(1.3)

In turn, these imply that

and 1

Z

(r) Em (x)dx =

0

2 (r−1) (r) (E − Em+1 ), (m ≥ 0). m + 1 m+1

(1.4)

For any real number x, we let < x >= x − [x] ∈ [0, 1) denote the fractional part of x. The Bernoulli polynomials Bm (x) are defined by the generating function ∞ X t tm xt e = B (x) , m et + 1 m! m=0

(see [2 − 4, 11, 17]).

(1.5)

We will need the following facts about Bernoulli functions Bm (< x >) for later use: (a) for m ≥ 2, ∞ X

Bm (< x >) = −m!

n=−∞,n6=0

e2πinx , (2πin)m

(1.6)

2010 Mathematics Subject Classification. 11B68, 11B83, 42A16. Key words and phrases. Fourier series, higher-order Euler polynomials, Bernoulli functions. 1

348

T. KIM ET AL 348-361

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

Fourier series of functions involving higher-order Euler polynomials

(b) for m = 1, −

∞ X n=−∞,n6=0

e2πinx = 2πin



B1 (< x >), for x ∈ Zc , 0, for x ∈ Z,

(1.7)

where Zc = R − Z. In this paper, we will consider the following three types of functions αm (< x >), βm (< x >), and γm (< x >) involving higher-order Euler polynomials and derive their Fourier series expansions. Further, we will express each of them in terms of Bernoulli functions: Pm (r) (1) αm (< x >) = k=0 Ek (< x >) < x >m−k , (m ≥ 1); Pm (r) 1 Ek (< x >) < x >m−k , (m ≥ 1); (2) βm (< x >) = k=0 k!(m−k)! Pm−1 (r) 1 Ek (< x >) < x >m−k , (m ≥ 2). (3) γm (< x >) = k=1 k(m−k) For elementary facts about Fourier analysis, the reader may refer to any book (for example, see [1,16,20]). As to γm (< x >), we note that the polynomial identity (1.8) follows immediately from Theorems 4.1 and 4.2 which is in turn derived from the Fourier series expansion of γm (< x >). m−1 X

1 (r) E (x)xm−k k(m − k) k k=1 m    Hm−1 − Hm−s  1 X m (r−1) (r) Λm−s+1 + = 1 + 2(Em−s+1 − Em−s+1 ) Bs (x), m s=0 s m−s+1

(1.8)

Pm Pl−1 (r−1) (r) 1 (2Ek − Ek ), for l ≥ 2, with Λ1 = 0, and Hm = j=1 1j are the harmonic where Λl = k=1 k(l−k) numbers. The obvious polynomial identities can be derived also for αm (< x >) and βm (< x >) from Theorems 2.1 and 2.2, andP Theorems 3.1 and 3.2, respectively. It is remarkable that from the Fourier series m−1 1 expansion of the function k=1 k(m−k) Bk (< x >)Bm−k (< x >) we can derive the Faber-PandharipandeZagier identity (see [6-9]) and the Miki’s identity (see [5,7-9,18]). For recent related works, we refer the reader to [10,14,15].

2. Fourier series of functions of the first type involving higher-order Euler polynomials In this section, we will study the Fourier series of functions of the first type involving higher-order Pm (r) Euler polynomials. Let αm (x) = k=0 Ek (x)xm−k , (m ≥ 1). Then we will consider the function αm (< x >) =

m X

(r)

Ek (< x >) < x >m−k , (m ≥ 1).

(2.1)

k=0

defined on R which is periodic with period 1. The Fourier series of αm (< x >) is ∞ X

2πinx A(m) , n e

(2.2)

n=−∞

where A(m) n

Z

1

αm (< x >)e−2πinx dx

= 0

Z =

(2.3)

1 −2πinx

αm (x)e

dx.

0

349

T. KIM ET AL 348-361

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, G.-W. Jang

3

To proceed further, we need to observe the following. 0 αm (x) =

m X

(r)

(r)

{kEk−1 (x)xm−k + (m − k)Ek (x)xm−k−1 }

k=0

=

m X

(r)

kEk−1 (x)xm−k +

k=1

=

m−1 X

(r)

(m − k)Ek (x)xm−k−1

k=0

m−1 X

(k +

(r) 1)Ek (x)xm−1−k

+

m−1 X

(r)

(m − k)Ek (x)xm−1−k

k=0

(2.4)

k=0

= (m + 1)

m−1 X

(r)

Ek (x)xm−1−k

k=0

= (m + 1)αm−1 (x). From this, we obtain 

αm+1 (x) m+2

0 (2.5)

= αm (x),

and Z

1

αm (x)dx = 0

1 (αm+1 (1) − αm+1 (0)). m+2

(2.6)

For m ≥ 1, we set ∆m = αm (1) − αm (0) m   X (r) (r) = Ek (1) − Ek δm,k k=0 m  X

=

k=0 m X

=

(r−1)

2Ek

(r−1)

(2Ek

(r)

(r)

− Ek − Ek δm,k



(2.7)

(r)

(r) − Ek ) − Em .

k=0

We now note that αm (0) = αm (1) ⇐⇒ ∆m = 0,

(2.8)

and Z

1

αm (x)dx = 0

1 ∆m+1 . m+2

(2.9)

(m)

We are now ready to determine the Fourier coefficients An .

350

T. KIM ET AL 348-361

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

Fourier series of functions involving higher-order Euler polynomials

Case 1 : n 6= 0. A(m) = n

1

Z

αm (x)e−2πinx dx

0

=−

1 1  1 αm (x)e−2πinx 0 + 2πin 2πin

1

Z

1 m+1 =− (αm (1) − αm (0)) + 2πin 2πin m + 1 (m−1) 1 = A ∆m , − 2πin n 2πin

0 αm (x)e−2πinx dx

0

(2.10)

1

Z

−2πinx

αm−1 (x)e

dx

0

from which by induction we can deduce m

A(m) =− n

1 X (m + 2)j ∆m−j+1 . m + 2 j=1 (2πin)j

(2.11)

Case 2: n = 0. (m)

A0

1

Z

αm (x)dx = −

= 0

1 ∆m+1 . m+2

(2.12)

αm (< x >), (m ≥ 1) is piecewise C ∞ . Moreover, αm (< x >) is continuous for those positive integers m with ∆m = 0, and discontinuous with jump discontinuities at integers for those positive integers m with ∆m 6= 0 . Assume first that m is a positive integer with ∆m = 0. Then αm (0) = αm (1). Hence αm (< x >) is piecewise C ∞ , and continuous. Thus the Fourier series of αm (< x >) converges uniformly to αm (< x >), and αm (< x >) 

 m X 1 (m + 2) j − ∆m−j+1  e2πinx m + 2 j=1 (2πin)j n=−∞,n6=0    m  ∞ 2πinx X 1 X m+2 e 1  ∆m+1 + ∆m−j+1 −j! = j m+2 m + 2 j=1 (2πin)j ∞ X

1 = ∆m+1 + m+2

(2.13)

n=−∞,n6=0

 m  1 1 X m+2 = ∆m+1 + ∆m−j+1 Bj (< x >) m+2 m + 2 j=2 j  B1 (< x >), for x ∈ Zc , + ∆m × 0, for x ∈ Z. Now, we can state our first result. Theorem 2.1. For each positive integer l, we put ∆l =

l X

(r−1)

(2Ek

(r)

(r)

− Ek ) − El .

(2.14)

k=0

Assume that ∆m = 0, for a positive integer m. Then we have the following.

351

T. KIM ET AL 348-361

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, G.-W. Jang

(a)

Pm

5

(r)

k=1

Ek (< x >) < x >m−k has the Fourier series expansion m X

(r)

Ek (< x >) < x >m−k

k=0

1 ∆m+1 + = m+2

 m X 1 (m + 2) j − ∆m−j+1  e2πinx , m + 2 j=1 (2πin)j 

∞ X n=−∞,n6=0

(2.15)

for all x ∈ R, where the convergence is uniform. (b) m X

(r)

Ek (< x >) < x >m−k

k=0

=

 m  1 X m+2 1 ∆m−j+1 Bj (< x >), ∆m+1 + j m+2 m + 2 j=2

(2.16)

for all x ∈ R, where Bj (< x >) is the Bernoulli function. Assume next that ∆m 6= 0, for a positive integer m. Then αm (1) 6= αm (0). Hence αm (< x >) is piecewise C ∞ and discontinuous with jump discontinuities at integers. The Fourier series of αm (< x >) converges pointwise to αm (< x >), for x ∈ Zc , and converges to 1 1 (αm (0) + αm (1)) = αm (0) + ∆m , 2 2 for x ∈ Z. We can now state our second result.

(2.17)

Theorem 2.2. For each positive inetger l, we set ∆l =

l X

(r−1)

(2Ek

(r)

(r)

− Ek ) − El .

(2.18)

k=0

Assume that ∆m 6= 0 , for a positive integer m, Then we have the following. (a)   ∞ m X X 1 1 (m + 2) j − ∆m+1 + ∆m−j+1  e2πinx m+2 m + 2 j=1 (2πin)j n=−∞,n6=0 ( P (r) m m−k , for x ∈ Zc , k=0 Ek (< x >) < x > = (r) 1 Em + 2 ∆m , for x ∈ Z.

(2.19)

(b)  m  m X 1 X m+2 (r) ∆m−j+1 Bj (< x >) = Ek (< x >) < x >m−k , x ∈ Zc ; m + 2 j=0 j k=0   m X 1 m+2 1 (r) ∆m−j+1 Bj (< x >) = Em + ∆m , for x ∈ Z. m+2 j 2

(2.20)

j=0,j6=1

352

T. KIM ET AL 348-361

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

Fourier series of functions involving higher-order Euler polynomials

3. Fourier series of functions of the second type involving higher-order Euler polynomials Let βm (x) =

(r) 1 m−k , k=0 k!(m−k)! Ek (x)x

Pm

βm (< x >) =

m X k=0

(m ≥ 1). Then we will consider the function 1 (r) E (< x >) < x >m−k , k!(m − k)! k

(3.1)

defined on R, which is periodic with period 1. The Fourier series of βm (< x >) is ∞ X

Bn(m) e2πinx ,

(3.2)

n=−∞

where Bn(m) =

Z

1

βm (< x >)e−2πinx dx

0

Z

(3.3)

1 −2πinx

=

βm (x)e

dx.

0

To proceed further, we need to observe the following.  m  X m−k k (r) (r) m−k m−k−1 0 E (x)x + E (x)x βm (x) = k!(m − k)! k−1 k!(m − k)! k k=0

=

m X k=1

=

m−1 X k=0

m−1 X 1 1 (r) (r) Ek−1 (x)xm−k + E (x)xm−k−1 (k − 1)!(m − k)! k!(m − k − 1)! k k=0

1 (r) E (x)xm−1−k + k!(m − 1 − k)! k

m−1 X k=0

(3.4)

1 (r) E (x)xm−1−k k!(m − 1 − k)! k

= 2βm−1 (x). From this, we obtain 

βm+1 (x) 2

0 = βm (x),

(3.5)

and Z

1

βm (x)dx = 0

1 (βm+1 (1) − βm+1 (0)). 2

(3.6)

From m ≥ 1, we set Ωm = βm (1) − βm (0) =

m X k=0

= =

m X k=0 m X k=0

  1 (r) (r) Ek (1) − Ek δm,k k!(m − k)!

1 (r−1) (r) (r) (2Ek − Ek − Ek δm,k ) k!(m − k)!

(3.7)

1 1 (r) (r−1) (r) (2Ek − Ek ) − E . k!(m − k)! m! m

From this, we now see that, βm (0) = βm (1) ⇐⇒ Ωm = 0,

353

(3.8)

T. KIM ET AL 348-361

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, G.-W. Jang

7

and 1

Z

βm (x)dx = 0

1 Ωm+1 . 2

(3.9)

(m)

We now would like to determine the Fourier coefficients Bn . Case 1: n 6= 0. Z 1 (m) Bn = βm (x)e−2πinx dx 0

=−

1 1 1  βm (x)e−2πinx 0 + 2πin 2πin

1 2 =− (βm (1) − βm (0)) + 2πin 2πin 1 2 B (m−1) − Ωm , = 2πin n 2πin from which by induction we can derive Bn(m) = −

Z

1 0 βm (x)e−2πinx dx

0 Z 1

(3.10) βm−1 (x)e

−2πinx

dx

0

m X 2j−1 Ωm−j+1 . (2πin)j j=1

(3.11)

Case 2: n = 0. (m)

B0

1

Z =

βm (x)dx = 0

1 Ωm+1 . 2

(3.12)

βm (< x >), (m ≥ 1) is piecewise C ∞ . Moreover, βm (< x >) is continuous for those positive integers m with Ωm = 0 and discontinuous with jump discontinuities at integers for those positive integers m with Ωm 6= 0. Assume first that Ωm = 0, for a positive integer m. Then βm (0) = βm (1). Hence βm (< x >) is piecewise C ∞ , and continuous. Thus the Fourier series of βm (< x >) converges uniformly to βm (< x >), and βm (< x >)  m j−1 X 1 2 −  e2πinx = Ωm+1 + Ω j m−j+1 2 (2πin) j=1 n=−∞,n6=0   m ∞ j−1 2πinx X X 1 2 e  = Ωm+1 + Ωm−j+1 −j! j 2 j! (2πin) j=1 ∞ X



(3.13)

n=−∞,n6=0

=

m X

2j−1 1 Ωm+1 + Ωm−j+1 Bj (< x >) + Ωm × 2 j! j=2



B1 (< x >), for x ∈ Zc , 0, for x ∈ Z.

We are now ready to state our first result. Theorem 3.1. For each positive integer l, we let Ωl =

l X k=0

1 1 (r) (r−1) (r) (2Ek − Ek ) − El . k!(l − k)! l!

(3.14)

Assume that Ωm = 0, for a positive integer m. Then we have the following.

354

T. KIM ET AL 348-361

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

Fourier series of functions involving higher-order Euler polynomials

(a)

(r) 1 k=0 k!(m−k)! Ek (
) < x >m−k has the Fourier series expansion

m X

1 (r) E (< x >) < x >m−k k!(m − k)! k k=0   ∞ m j−1 X X 1 2  e2πinx , − = Ωm+1 + Ω j m−j+1 2 (2πin) j=1

(3.15)

n=−∞,n6=0

for all x ∈ R, where the convergence is uniform. (b) m X k=0

1 (r) E (< x >) < x >m−k k!(m − k)! k m X

=

j=0,j6=1

2j−1 Ωm−j+1 Bj (< x >), j!

(3.16)

for all x ∈ R, where Bj (< x >) is the Bernoulli function. Assume next that Ωm 6= 0, for a positive integer m. Then βm (0) 6= βm (1). Hence βm (< x >) is piecewise C ∞ and discontinuous with jump discontinuities at integers. Thus the Fourier series of βm (< x >) converges pointwise to βm (< x >), for x ∈ Zc , and converges to 1 1 (3.17) (βm (0) + βm (1)) = βm (0) + Ωm , 2 2 for x ∈ Z. Now we are ready to state our second result. Theorem 3.2. For each positive integer l, we let Ωl =

l X k=0

1 (r) 1 (r−1) (r) (2Ek − Ek ) − El . k!(l − k)! l!

Assume that Ωm 6= 0, for a positive integer m. Then we have the following. (a)   ∞ m j−1 X X 1 2 −  e2πinx Ωm+1 + Ω j m−j+1 2 (2πin) j=1 n=−∞,n6=0 ( P (r) m 1 m−k , for x ∈ Zc , k=0 k!(m−k)! Ek (< x >) < x > = (r) 1 1 for x ∈ Z. m! Em + 2 Ωm ,

(3.18)

(3.19)

(b) m X 2j−1 j=0

j!

Ωm−j+1 Bj (< x >) =

m X k=0

1 (r) E (< x >) < x >m−k , k!(m − k)! k

(3.20)

for x ∈ Zc ; m X j=0,j6=1

2j−1 1 (r) 1 Ωm−j+1 Bj (< x >) = E + Ωm , j! m! m 2

(3.21)

for x ∈ Z.

355

T. KIM ET AL 348-361

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, G.-W. Jang

9

4. Fourier series of functions of the third type involving higher-order Euler polynomials Let γm (x) =

(r) 1 m−k , k=1 k(m−k) Ek (x)x

Pm−1

γm (< x >) =

m−1 X k=1

(m ≥ 2). Then we will consider the function 1 (r) E (< x >) < x >m−k , k(m − k) k

(4.1)

defined on R, which is periodic of period 1. The Fourier series of γm (< x >) is ∞ X

Cn(m) e2πinx ,

(4.2)

n=−∞,n6=0

where Cn(m) =

Z

1

γm (< x >)e−2πinx dx =

0

Z

1

γm (x)e−2πinx dx.

(4.3)

0

We need to observe the following to proceed further. 0 γm (x) =

m−1 X k=1

n o 1 (r) (r) kEk−1 (x)xm−k + (m − k)Ek (x)xm−k−1 k(m − k) m−1

m−2 X

X 1 (r) 1 (r) Ek (x)xm−1−k + E (x)xm−1−k m−1−k k k k=1 k=0   m−2 X 1 1 1 1 (r) (r) + Ek (x)xm−1−k + xm−1 + E (x) = m−1−k k m−1 m − 1 m−1 =

(4.4)

k=1

= (m − 1)

m−2 X k=1

1 1 1 (r) (r) E (x)xm−1−k + xm−1 + E (x) k(m − 1 − k) k m−1 m − 1 m−1

= (m − 1)γm−1 (x) +

1 1 (r) xm−1 + E (x). m−1 m − 1 m−1

Thus, 0 γm (x) = (m − 1)γm−1 (x) +

1 1 (r) xm−1 + E (x), m−1 m − 1 m−1

from which we see that   0 1 1 1 (r) m+1 (x) = γm (x). γm+1 (x) − x − E m m(m + 1) m(m + 1) m+1 This implies that Z

(4.5)

(4.6)

1

γm (x)dx   1 1 1 (r) (r) = γm+1 (1) − γm+1 (0) − − (E (1) − Em+1 ) m m(m + 1) m(m + 1) m+1   1 1 2 (r−1) (r) = γm+1 (1) − γm+1 (0) − − (E − Em+1 ) . m m(m + 1) m(m + 1) m+1 0

356

(4.7)

T. KIM ET AL 348-361

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

Fourier series of functions involving higher-order Euler polynomials

For m ≥ 2, we put Λm = γm (1) − γm (0) =

m−1 X k=1

=

m−1 X k=1

1 (r) (r) (E (1) − Ek δm,k ) k(m − k) k (4.8) 1 (r−1) (r) (2Ek − Ek ). k(m − k)

We now notice that γm (1) = γm (0) ⇐⇒ Λm = 0, and Z 0

1

1 γm (x)dx = m

 Λm+1 −

 1 2 (r−1) (r) − (E − Em+1 ) . m(m + 1) m(m + 1) m+1

(4.9)

(4.10)

(m)

We are now ready to determine the Fourier coefficients Cn . Case 1: n 6= 0. Z 1 (m) Cn = γm (x)e−2πinx dx 0

1 1 [γm (x)e−2πinx ]10 + =− 2πin 2πin 1 1 =− (γm (1) − γm (0)) + 2πin 2πin =

1

Z

0 γm (x)e−2πinx dx Z 1 (m − 1)γm−1 (x) + 0

0

m − 1 (m−1) 1 1 C − Λm + 2πin n 2πin 2πin(m − 1) Z 1 1 (r) + E (x)e−2πinx dx. 2πin(m − 1) 0 m−1

 1 1 (r) m−1 x + E (x) e−2πinx dx m−1 m − 1 m−1

1

Z

xm−1 e−2πinx dx

0

(4.11) We can show that Z

(

1 l −2πinx

xe

dx =

0



Pl

(l)k−1 k=1 (2πin)k ,

1 l+1 ,

for n 6= 0, for n = 0.

Also, from [ ], we have ( Pl Z 1 (r) (r+1) 2(l)k−1 (r) k=1 (2πin)k (El−k+1 − El−k+1 ), for n 6= 0, El (x)e−2πinx dx = (r−1) (r) 2 − El+1 ), for n = 0. 0 l+1 (El+1 From (4.11), (4.12), and (4.13), we get m − 1 (m−1) 1 1 1 Cn(m) = C − Λm − Φm − Θm , 2πin n 2πin 2πin(m − 1) 2πin(m − 1)

(4.12)

(4.13)

(4.14)

where Φm =

m−1 X k=1

Θm =

m−1 X k=1

(m − 1)k−1 (2πin)k (4.15) 2(m − 1)k−1 (r−1) (r) (Em−k − Em−k ). (2πin)k

357

T. KIM ET AL 348-361

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, G.-W. Jang

11

Thus we have shown that Cn(m) =

m − 1 (m−1) 1 1 1 C − Λm − Φm − Θm , 2πin n 2πin 2πin(m − 1) 2πin(m − 1)

(4.16)

from which by induction on m we can easily show that Cn(m)

=−

m−1 X j=1

m−1 m−1 X (m − 1)j−1 X (m − 1)j−1 (m − 1)j−1 Λ − Φ − Θm−j+1 . m−j+1 m−j+1 (2πin)j (2πin)j (m − j) (2πin)j (m − j) j=1 j=1

(4.17) Here we note that m−1 X j=1

=

(m − 1)j−1 Θm−j+1 (2πin)j (m − j)

m−1 X j=1

=

k=1

m−1 X j=1

=

m−1 X j=1

=

m−j (m − 1)j−1 X 2(m − j)k−1 (r−1) (r) (Em−j−k+1 − Em−j−k+1 ) (2πin)j (m − j) (2πin)k

1 m−j

m−j X k=1

2(m − 1)j+k−2 (r−1) (r) (Em−j−k+1 − Em−j−k+1 ) (2πin)j+k (4.18)

m X 1 2(m − 1)s−2 (r−1) (r) (Em−s+1 − Em−s+1 ) m − j s=j+1 (2πin)s

m X 2(m − 1)s−2

(2πin)s

s=2

(r−1)

(r)

(Em−s+1 − Em−s+1 )

s−1 X j=1

1 m−j

m 2 X (m)s Hm−1 − Hm−s (r−1) (r) = (E − Em−s+1 ) , m s=1 (2πin)s m−s+1 m−s+1

where Hm =

Pm

1 j=1 j

are the harmonic numbers. Similarly, we can show that m−1 X j=1

m

(m − 1)j−1 1 X (m)s Hm−1 − Hm−s Φm−j+1 = . j (2πin) (m − j) m s=1 (2πin)s m − s + 1

(4.19)

Putting everything altogether, m

Cn(m)

  Hm−1 − Hm−s  (r−1) (r) Λm−s+1 + 1 + 2(Em−s+1 − Em−s+1 ) . m−s+1

1 X (m)s =− m s=1 (2πin)s

(4.20)

Case 2: n = 0. (m)

C0 =

1 m

Z = 

1

γm (x)dx 0

Λm+1 −

 1 2 (r−1) (r) − (Em+1 − Em+1 ) . m(m + 1) m(m + 1)

(4.21)

γm (< x >), (m ≥ 2) is piecewise C ∞ . Moreover, γm (< x >) is continuous for those integers m ≥ 2 with Λm = 0, and discontinuous with jump discontinuities at integers for those integers m ≥ 2 with Λm 6= 0.

358

T. KIM ET AL 348-361

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12

Fourier series of functions involving higher-order Euler polynomials

Assume first that Λm = 0, for an integer m ≥ 2 . Then γm (0) = γm (1). Hence γm (< x >) is piecewise C ∞ , and continuous. Thus the Fourier series of γm (< x >) converges uniformly to γm (< x >), and γm (< x >)   1 1 2 (r−1) (r) = Λm+1 − − (E − Em+1 ) m m(m + 1) m(m + 1) m+1 (  ) m ∞ X Hm−1 − Hm−s 1 X (m)s (r−1) (r) Λm−s+1 + + (1 + 2(Em−s+1 − Em−s+1 ) − e2πinx m s=1 (2πin)s m−s+1 n=−∞,n6=0   1 2 1 (r−1) (r) Λm+1 − − (E = − Em+1 ) m m(m + 1) m(m + 1) m+1   m   ∞  2πinx (4.22) X Hm−1 − Hm−s  e 1 X m (r−1) (r)  1 + 2(Em−s+1 − Em−s+1 ) −s! Λm−s+1 + + m s=1 s m−s+1 (2πin)s n=−∞,n6=0   1 2 1 (r−1) (r) = − (E − Em+1 ) Λm+1 − m m(m + 1) m(m + 1) m+1 m    1 X m Hm−1 − Hm−s  (r−1) (r) + 1 + 2(Em−s+1 − Em−s+1 ) Bs (< x >) Λm−s+1 + m s=2 s m−s+1  B1 (< x >), for x ∈ Zc , + Λm × 0, for x ∈ Z. Now, we are going to state our first result. Theorem 4.1. For each integer l ≥ 2, we let Λl =

l−1 X k=1

1 (r−1) (r) (2Ek − Ek ), k(l − k)

(4.23)

with Λ1 = 0. Assume that Λm = 0, for an integer m ≥ 2, Then we have the following. Pm−1 (r) 1 (a) k=1 k(m−k) Ek (< x >) < x >m−k has the Fourier expansion m−1 X

1 (r) E (< x >) < x >m−k k(m − k) k k=1   1 1 2 (r−1) (r) = Λm+1 − − (Em+1 − Em+1 ) (4.24) m m(m + 1) m(m + 1) ( )  ∞ m X 1 X (m)s Hm−1 − Hm−s (r−1) (r) e2πinx , + − Λm−s+1 + (1 + 2(Em−s+1 − Em−s+1 ) m s=1 (2πin)s m−s+1 n=−∞,n6=0

for all x ∈ R, where the convergence is uniform. (b) m−1 X

1 (r) E (< x >) < x >m−k k(m − k) k k=1    m 1 X m Hm−1 − Hm−s (r−1) (r) = Λm−s+1 + (1 + 2(Em−s+1 − Em−s+1 )) Bs (< x >), m s m−s+1

(4.25)

s=0,s6=1

for all x ∈ R, where Bs (< x >) is the Bernoulli function.

359

T. KIM ET AL 348-361

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, G.-W. Jang

13

Assume next that Λm 6= 0, for an integer m ≥ 2. Then γm (0) 6= γm (1). Hence γm (< x >) is piecewise C ∞ , and discontinuous with jump discontinuities at integers. Thus the Fourier series of γm (< x >) converges pointwise to γm (< x >), for x ∈ Zc , and converges to 1 1 (4.26) (γm (0) + γm (1)) = γm (0) + Λm , 2 2 for x ∈ Z. Next, we are going to state our second result. Theorem 4.2. For each integer l ≥ 2, we let Λl =

l−1 X k=1

1 (r−1) (r) (2Ek − Ek ), k(l − k)

(4.27)

with Λ1 = 0. Assume that Λm 6= 0, for an integer m ≥ 2. Then we have the following. (a)   1 2 1 (r−1) (r) Λm+1 − − (E − Em+1 ) m m(m + 1) m(m + 1) m+1 ( )  ∞ m X 1 X (m)s Hm−1 − Hm−s (r−1) (r) + − (1 + 2(Em−s+1 − Em−s+1 ) e2πinx(4.28) Λm−s+1 + m s=1 (2πin)s m−s+1 n=−∞,n6=0 ( P (r) m−1 1 m−k , for x ∈ Zc , k=1 k(m−k) Ek (< x >) < x > = 1 for x ∈ Z. 2 Λm , (b) m    1 X m Hm−1 − Hm−s  (r−1) (r) 1 + 2(Em−s+1 − Em−s+1 ) Bs (< x >) Λm−s+1 + m s=0 s m−s+1

=

m−1 X k=1

(4.29)

1 (r) E (< x >) < x >m−k , k(m − k) k

for x ∈ Zc ; 1 m

  m  X m Hm−1 − Hm−s  (r−1) (r) 1 + 2(Em−s+1 − Em−s+1 ) Bs (< x >) Λm−s+1 + s m−s+1

s=0,s6=1

(4.30)

1 = Λm , 2 for x ∈ Z. References 1. 2. 3. 4. 5. 6. 7. 8. 9.

M. Abramowitz, I. A. Stegun Handbook of mathematical functions, Dover, New York, 1970. A. Bayad, T. Kim, Higher recurrences for Apostol-Bernoulli-Euler numbers, Russ. J. Math. Phys., 19(1) (2012), 1-10. L. Carlitz, Some formulas for the Bernoulli and Euler polynomials, Math. Nachr. 25(1963), 223–231. D. Ding, J. Yang, Some identities related to the Apostol-Euler and Apostol-Bernoulli polynomials, Adv. Stud. Contemp. Math. (Kyungshang), 20(1)(2010), 7-21. G. V. Dunne, C. Schubert, Bernoulli number identities from quantum field theory and topological string theory, Commun. Number Theory Phys., 7(2)(2013), 225-249. C. Faber, R. Pandharipande, Hodge integrals and Gromov-Witten theory, Invent. Math. 139(1)(2000), 173-199. D.S. Kim, T. Kim, Identities arising from higher-order Daehee polynomial bases, Open Math. 13(2015), 196-208. D.S. Kim, T. Kim, Euler basis, identities, and their applications, Int. J. Math. Math. Sci. 2012, Art. ID 343981. D.S. Kim, T. Kim, Some identities of higher order Euler polynomials arising from Euler basis, Integral Transforms Spec. Funct., 24(9) (2013), 734-738.

360

T. KIM ET AL 348-361

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14

Fourier series of functions involving higher-order Euler polynomials

10. D. S. Kim, T. Kim, Fourier series of higher-order Euler functions and their applications, to appear in Bull. Korean Math. Soc. 11. D.S. Kim, T. Kim, S.-H. Lee, D.V. Dolgy, S.-H. Rim, Some new identities on the Bernoulli and Euler numbers, Discrete Dyn. Nat. Soc. 2011, Art. ID 856132. 12. T. Kim, Note on the Euler numbers and polynomials, Adv. Stud. Contemp. Math. (Kyungshang), 17(2008), no. 2, 131–136. 13. T. Kim, Euler numbers and polynomials associated with zeta functions, Abstr. Apol. Anal., 2008 Art. ID 581582. 11 pp. 14. T. Kim, D. S. Kim, G.-W. Jang, J. Kwon, Fourier series of sums of products of Genocchi functions and their applications, to appear in J. Nonlinear Sci.Appl. 15. T. Kim, D.S. Kim, S.-H. Rim, D.-V. Dolgy, Fourier series of higher-order Bernoulli functions and their applications, J. Inequal. Appl. 2017, 2017:8, 7pp. 16. J. E. Marsden, Elementary classical analysis, W. H. Freeman and Company, 1974. 17. F. R. Olson, Some determinants involving Bernoulli and Euler numbers of higher order, Pacific J. Math., 5(1955), 259–268. 18. K. Shiratani, S. Yokoyama, An application of p-adic convolutions, Mem. Fac. Sci. Kyushu Univ. Ser. A 36(1)(1982), 7383. 19. Y. Simsek, Interpolation functions of the Eulerian type polynomials and numbers, Adv. Stud. Contemp. Math. (Kyungshang), 23(2013), no. 2, 301–307. 20. D. G. Zill, M. R. Cullen, Advanced Engineering Mathematics, Jones and Bartlett Publishers 2006. Department of Mathematics, College of Science, Tianjin Polytechnic University, Tianjin 300160, China, Department of Mathematics, Kwangwoon University, Seoul 139-701, Republic of Korea E-mail address: [email protected] Department of Mathematics, Sogang University, Seoul 121-742, Republic of Korea E-mail address: [email protected] Graduate School of Education, Konkuk University, Seoul 143-701, republic of Korea E-mail address: [email protected] Department of Mathematics, Kwangwoon University, Seoul 139-701, Republic of Korea E-mail address: [email protected]

361

T. KIM ET AL 348-361

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FERMAT TYPE EQUATIONS OR SYSTEMS WITH COMPOSITE FUNCTIONS KAI LIU AND LEI MA

Abstract. In this paper, we give some necessary conditions on the existence of meromorphic solutions on Fermat type difference equations. We also consider the properties of transcendental entire solutions on the systems of Fermat type differential-difference equations.

AMS Subject Classification: 30D35; 39A10. Keywords: Fermat type equations; meromorphic solutions; composite functions. 1. Introduction and Results Fermat type equations in functional field (1.1)

f n + gn = 1

and its generalizations have been considered by many mathematicians in the last century, where n is an integer. We recall the following results. Iyer [10] proved (1.1) has no entire solutions when n ≥ 3, Gross [6] obtained that (1.1) has no meromorphic solutions when n ≥ 4. Some related results on (1.1) also can be found in [9]. For the case of n = 2, Iyer [10] concluded the following result. Theorem A. If n = 2, then (1.1) has the entire solutions f (z) = sin(h(z)) and g(z) = cos(h(z)), where h(z) is any entire function, no other solutions exist. Recent investigations on (1.1) are to explore the precise expressions on f (z) when g(z) has a special relationship with f (z). We mainly recall the following different references on the meromorphic solutions when n = 2 in (1.1). ⋆ Some results on g(z) takes a differential operator of f (z) can be found in [21, 20, 24]. ⋆ Some results on g(z) is a shift operator that is g(z) = f (z + c) or difference operator that is g(z) = f (z + c) − f (z) can be seen in [12, 13, 11, 16]. ⋆ The case that g(z) = f (qz) was considered in [15]. ⋆ The case that g(z) is a differential-difference operator such as g(z) = f (k) (z +c) was considered in [14, 5]. We agree to say that a meromorphic function f (z) in the complex plane is properly meromorphic if f (z) has at least one pole. Fermat type differential equations, for example f (z)2 + f (k) (z)2 = 1 has no properly meromorphic solutions, it means that all meromorphic solutions are transcendental entire. In addition, the same conclusion is valid for f (z)2 +f (k) (z +c)2 = 1, where c is a non-zero constant. However, the situation is different for Fermat type difference equations. There exist properly meromorphic solutions with finite order or infinite order for f (z)2 + f (z + c)2 = 1 and f (z)2 + f (qz)2 = 1, we cite the examples [16] as follows for the readers.

362

KAI LIU ET AL 362-372

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

K LIU AND L MA √ + i tan z

√ 1

Example 1. Let c = π2 . The function f (z) = i tan z 2 properly meromorphic solution of f (z)2 + f (z + π2 )2 = 1.

is a finite order

√ −i tan(e4zi +z)+ √

1 4zi +z)

−i tan(e Example 2. Let c = π2 . The function f (z) = 2 π 2 2 infinite order properly meromorphic solution of f (z) + f (z + 2 ) = 1. z 4n z + e z −1 4n −1 ez

Example 3. If q = −i, then f (z) = meromorphic solution of f (z)2 + f (−iz)2 = 1.

2

z 4n ee −1 z + 4n z z −1 ee

Example 4. If q = −i, then f (z) = 2 meromorphic solution of f (z)2 + f (−iz)2 = 1.

is an

is a finite order properly

is an infinite order properly

We assume that the reader is familiar with the basic notations and results on Nevanlinna theory [8] as well as the uniqueness theory of entire and meromorphic functions [23]. Some necessary conditions for the existence of meromorphic solutions on Fermat differential-difference equations of certain types can be found in Section 2. Section 2 also includes the discussions on composite function with Fermat type equations. In Section 3, we mainly explore the entire solutions on the systems of Fermat type differential-difference equations. In Section 4, we will discuss the meromorphic solutions on the systems of Fermat type difference equations. 2. Necessary conditions for the existence Let L(f ) be a differential-difference polynomial of f (z) with rational coefficients. From the cited references and examples in Section 1, a basic fact is when considering the existence of meromorphic solutions on the equations (2.1)

f (z)2 + {L[f (g(z))]}2 = 1,

then g(z) always has the form g(z) = Az + B, where A is a non-zero constant and B is a constant. We first to explain the reasons below. We will consider an improvement of (2.1) as follows (2.2)

a(z)f (z)n + {L[f (g(z))]}n = c(z),

where a(z), c(z) are rational functions. Yang [22] investigated a generalization of the Fermat type functional equation (1.1) as (2.3)

a(z)f (z)m + b(z)g(z)n = 1,

where T (r, a(z)) = S(r, f ), T (r, b(z)) = S(r, g) and obtained the following result. Theorem B. If a(z), b(z), f (z), g(z) are meromorphic functions, m ≥ 3, n ≥ 3 are 1 integers, then (2.3) cannot hold unless m = n = 3. If m + n1 < 1, then there are no transcendental entire solutions f (z) and g(z) satisfy (2.3). Theorem B shows that n ≤ 3 in (2.2) provided that (2.2) admits meromorphic solutions. Theorem 2.1. Let g(z) be an entire function in (2.2). The necessary condition of the existence of transcendental entire solutions on (2.2) is g(z) = Az + B, where |A| = 1 and B is a constant. For the proof of Theorem 2.1, we need the following lemmas on the properties of composite functions. We recall the following result [4, Corollary 1].

363

KAI LIU ET AL 362-372

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FERMAT TYPE EQUATIONS OR SYSTEMS WITH COMPOSITE FUNCTIONS

3

Lemma 2.2. Assume that f (z) is a transcendental meromorphic function, and g(z) is a transcendental entire function, then lim sup r→+∞

T (r, f (g)) = +∞. T (r, f )

The proof of the following lemma is included in the proof of Lemma 4 in [7]. Lemma 2.3. Let g(z) = ak z k +ak−1 z k−1 +· · ·+a1 z +a0 , ak ̸= 0 be a non-constant polynomial of degree k and let f be a transcendental meromorphic function. Given 0 < ϱ < |ak |, denote ζ = |ak | + ϱ and η = |ak | − ϱ. Then, given ε > 0, we have (1 − ε)T (ηrk , f ) ≤ T (r, f (g)) ≤ (1 + ε)T (ζrk , f ) for all r large enough. Combining the above two lemmas on composite functions with the definitions of order and type of meromorphic functions, we have the following result. Lemma 2.4. Let f (z) be a transcendental function and g(z) be a polynomial of degree k and the leading coefficient ak ̸= 0. Let F = f (g). Then ρ(F ) = kρ(f ) and τ (F ) = |ak |ρ(f ) τ (f ), where ρ(f ) is the order of f (z) and τ (f ) is the type of f (z). Proof of Theorem 2.1. Assume that f (z) is a transcendental meromorphic solution on (2.2), then we see that T (r, L(f (g(z)))) = T (r, f (z)) + O(1). From Lemma 2.2, we get g(z) should be a polynomial. Since L(f ) is a differentialdifference polynomial of f (z), then it implies that at least one of f (k) (g(z + c)) (c, k are constants, may take zero) satisfies T (r, f (k) (g(z + c))) = T (r, f (z)) + S(r, f ), we have g(z) must be a polynomial with degree one and g(z) = Az + B, where |A| = 1 by Lemma 2.4. We proceed to consider Fermat type equation with composite functions such as (2.4)

f (h(z))2 + f (g(z))2 = 1,

where h(z) and g(z) are two non-constant polynomials. Based on Theorem 2.1, we guess that g(z) = Ah(z) + B provided that there exist meromorphic solutions on (2.4). However, the above result is false by Remark 2.7 below. We need the following lemmas on factorization theory [2, 3]. Lemma 2.5. [3] If f (z) is a non-constant entire function, and p(z), q(z) are nonconstant polynomials satisfying f (p(z)) = f (q(z)), then one of the following cases holds: (i) there exist a root of unity λ and a constant β such that p(z) = λq(z) + β; (ii) there exist a polynomial r(z) and constants c, k such that p(z) = (r(z))2 + k, q(z) = (r(z) + c)2 + k. Lemma 2.6. [2] Let f be non-constant meromorphic and p(z), q(z) non-constant polynomials such that f (p(z)) = f (q(z)). Then there exist a constant k, a positive integer m, a polynomial r(z) and a linear map L(z) = λz + β where λ is a root of unit, such that p(z) = (L(r(z)))m + k, q(z) = r(z)m + k.

364

KAI LIU ET AL 362-372

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

K LIU AND L MA

( )2 Remark 2.7. Let G(z) = f (z)2 − 12 . From (2.4), we have G(h(z)) = G(g(z)). Using Lemma 2.5, we have h(z) = λg(z) + β or there exist a polynomial r(z) and 2 constants c, k such that h(z) = (r(z))2 + k and g(z) = (r(z) + √c) + k. The 1second case may happen, for example, the entire function f (z) = cos z with order 2 , then f (z) solves f (r(z)2 )2 + f ((r(z) + c)2 )2 = 1, where c = π2 . In the following, we will focus on complex difference equations a(z)f (z)2 + b(z)f (Az + B)2 = c(z)

(2.5)

where a(z), b(z), c(z) are non-zero polynomials, and A, B are constants. Theorem 2.8. The necessary condition of the existence on transcendental entire c( z−B c(z) A ) solutions with finite order on (2.5) is a(z) . = b z−B ( A ) Proof. Let G(z) = f (z)2 . Thus G(Az + B) = f (Az + B)2 and (2.6)

a(z)G(z) + b(z)G(Az + B) = c(z).

So we have (2.7)

( a

z−B A

)

( G

z−B A

)

( =c

z−B A

)

( −b

z−B A

) G(z).

c(z) From the expression of G(z) and (2.6), (2.7), we have the zeros of G(z), G(z)− a(z) , z−B z−B c( A ) c(z) c( A ) G(z) − b z−B are multiple except possibly finite many zeros. If 0, a(z) , b z−B are ( A ) ( A ) distinct, using the second main theorem for small functions, then    

2 T (r, G) ≤ N (r, G) + N (r, +S(r, G) ≤



1 1 ) + N r, G G(z) −

1 1 1 1 N (r, ) + N r, 2 G 2 G(z) −

c(z) a(z)

+N r,







c(z) a(z)

 + 1N  r, 2

1 G(z) −

c( z−B A )

 

b( z−B A )

 1 G(z) −

c( z−B A )

  + S(r, G)

b( z−B A )

3 T (r, G) + S(r, G), 2

which is a contradiction. Thus,

c(z) a(z)

=

c( z−B A ) b( z−B A )



.

Remark 2.9. (1) If a(z) = b(z) are non-zero constants and A = 1, B ̸= 0, then 2 2 c(z) reduces √ to a constant πc. Thus (2.5) reduces to f (z) + f (z + B) = c, obviously, f (z) = c sin z and B = 2 satisfies the above equation. If a(z) = b(z) are non-zero constants and |A| = 1, A ̸= 1, B = 0, then c(z) can be an even polynomial. For example zez+ 4 i + ze−z− 4 i , 2 π

(2.8)

f (z) =

π

solves f (z)2 + f (−z)2 = z 2 .

365

KAI LIU ET AL 362-372

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FERMAT TYPE EQUATIONS OR SYSTEMS WITH COMPOSITE FUNCTIONS

5

(2) Consider f (z)2 + f (Az + B)2 = 1, where |A| = 1 and B is a constant, Theorem A shows that f (z) = sin h(z) and f (Az + B) = cos h(z), thus h(Az + B) = h(z) + π2 + 2kπ or h(Az + B) = −h(z) + π2 + 2kπ where k is an integer. If f (z) is of finite order, then h(z) is a polynomial. Combining Lemma 2.10 below, if h(Az + B) = h(z) + π2 + 2kπ, we have the following two cases: Case 1: If |A| = 1 and A ̸= 1, then B = 0. There is no any polynomial h(z) satisfy h(Az + B) = h(z) + π2 + 2kπ; Case 2: If A = 1 and B ̸= 0, then h(z) is a linear polynomial. If h(Az + B) = −h(z) + π2 + 2kπ, we have the following two cases: Case 1: If |A| = 1 and A ̸= 1, then B = 0, h(z) must be a polynomial with h(z) = an1 z n1 + an2 z n2 + · · · + ant z nt + π4 + kπ where Ant = −1; Case 2: If A = 1 and B ̸= 0, then there is no any polynomial h(z) satisfy h(Az + B) = −h(z) + π2 + 2kπ. Lemma 2.10. Let h(z) be a non-constant polynomial with degree n and a, b, c be constants, a ̸= 0. (1) The equation h(az + b) = h(z) + c is valid for two cases as follows: (1a) b ̸= 0, a = 1 and h(z) is a linear polynomial. (1b) b = 0, c = 0 and h(az) = h(z), thus h(z) = am1 z m1 +am2 z m2 +· · ·+amk z mk , where amj = 1. (2) The equation h(az + b) + h(z) = c is valid for two cases as follows: (2a) b ̸= 0, a = −1 and h(z) is a linear polynomial. (2b) b = 0, c = 2h(0), thus h(z) = an1 z n1 + an2 z n2 + · · · + ank z nk + a0 , where nj a = −1. Proof. Let h(z) = an z n + · · · + a1 z + a0 , where an ̸= 0. It is easy to see (1b) is true, we next prove (1a). We have an (az + b)n + an−1 (az + b)n−1 + · · · + a1 (az + b) + a0 = (an z n + · · · + a0 ) + c. Thus, an = 1. If an−1 ̸= 0, then an nan−1 b + an−1 an−1 = an−1 = an−1 an , n nb thus a = 1 + aan−1 . Since |a| = 1, then b = 0 follows, which is a contradiction. Thus, an−1 = 0. Using the similar method as the above, we get an−k = 0, k = 2, · · · , n−1. So h(z) = an z n + a0 , then n = 1 follows, thus a = 1. It is easy to see (2b) can happen. Next we prove (2a). We have

an (az + b)n + an−1 (az + b)n−1 + · · · + a1 (az + b) + a0 + (an z n + · · · + a0 ) = c. Thus, an = −1. If an−1 ̸= 0, then an nan−1 b + an−1 an−1 = −an−1 = −an−1 an , n nb thus a = −1 − aan−1 . Since |a| = 1, then b = 0 follows, which is a contradiction. Thus, an−1 = 0. Using the similar method as the above, we get an−k = 0, k = 2, · · · , n − 1. So h(z) = an z n + a0 , then n = 1 follows, thus a = −1. 

Using the similar method as the proof of Theorem 2.8, we get the following result. Theorem 2.11. The necessary condition on the existence of transcendental meromorphic solutions on (2.9)

a(z)f (z)3 + b(z)f (Az + B)3 = c(z)

366

KAI LIU ET AL 362-372

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

is

K LIU AND L MA c(z) a(z)

=

c( z−B A ) b( z−B A )

.

Baker [1] proved an important result as follows. Theorem C. Any functions F (z) and G(z), which are meromorphic in the plane and satisfy F 3 + G3 = 1, have the form F (z) = f (h(z)), G(z) = ηg(h(z)) = ηf (−h(z)) = f (−η 2 h(z)), 1+

φ′ (z) √

1−

φ′ (z) √

where f (z) = 21 φ(z)3 and g(z) = 21 φ(z)3 , h(z) is an entire function of z and η is a cube-root of unity, where φ(z) is the Weierstrass φ-function that satisfies the differential equation (φ′ (z))2 = 4φ3 (z) − 1.

(2.10)

Recently, L¨ u and Han [17] proved that if a(z) = b(z) = c(z) and A = 1 in (2.9), then the equation f (z)3 + f (z + c)3 = 1 has no transcendental meromorphic solutions with finite order. We will discuss the meromorphic solutions for f (z)3 + f (Az + B)3 = 1.

(2.11)

From Theorem C, if there exist meromorphic solutions on (2.11), then A = −η 2 , B = 0. It means that (2.11) reduces to f (z)3 + f (−η 2 z)3 = 1. However, we are interested into another equations as follows. If φ(z) is the Weierstrass function, can we give more details for a polynomial h(z) satisfies 1+ (2.12)

φ′ (h(Az+B)) √ 3

φ(h(Az + B))

φ′ (−η 2 h(z)) √ 3 2 φ(−η h(z))

1+ =

which is from (2.11) and Theorem C. We affirm that the polynomial h(z) should be a linear polynomial in (2.12). From Lemma 2.6, we have (i) h(Az + B) ≡ −λη 2 h(z) + β, (ii)h(Az + B) = r(z)m + k and −η 2 h(z) = (λr(z) + β)m + k, where m ≥ 2. If (i) happens, since h(z) is a polynomial, assume that h(z) = an z n +· · ·+a1 z+a0 with an ̸= 0. If n ≥ 2, we have an (Az +B)n +an−1 (Az +B)n−1 +· · ·+a1 (Az +B)+a0 = −λη 2 (an z n +· · ·+a0 )+β. So, we have An = −λη 2 . If an−1 ̸= 0, we have an nAn−1 B + an−1 An−1 = −λη 2 an−1 = An an−1 , so A=1+

an nB , an−1

since |A| = 1, thus B = 0 and A = 1. If an−1 = 0, using the same method, we have an−k = 0. Thus h(z) = an z n + a0 , then we have h(z) must be a linear polynomial. We get A = −λη 2 . r(z)+β m m If (ii) happens, then we see that [r( z−B ] = t, where cm = −η 2 A )] − [ c 1 and t = k(−1 − η2 ). The above equation is impossible when m ≥ 2.

367

KAI LIU ET AL 362-372

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FERMAT TYPE EQUATIONS OR SYSTEMS WITH COMPOSITE FUNCTIONS

7

3. The entire solutions on differential-difference systems Differential-difference equations always can not solved easily. For some linear differential-difference equations, the properties are not known clearly, for example the existence on entire solutions with infinite order of f ′ (z) = f (z + c) is not clear, where c is a non-zero constant. Naftalevich [19] ever obtained partial results on differential-difference equations using operator theory. Recently, Fermat type differential-difference equations or systems also be investigated using Nevanlinna theory. Liu, Cao and Cao [13] considered the transcendental entire solutions on (3.1)

f ′ (z)2 + f (z + c)2 = 1

and obtained the following result. Theorem D. The transcendental entire solutions with finite order of (3.1) must satisfy f (z) = sin(z ± Bi), where B is a constant and c = 2kπ or c = 2kπ + π. Gao [18] considered the systems of complex differential-difference equations { ′ 2 f1 (z) + [f2 (z + c)]2 = 1 (3.2) f2′ (z)2 + [f1 (z + c)]2 = 1. Assume that there exists a properly meromorphic solution on (3.2), let z0 be a pole of f1 (z) with multiplicity k. Thus we have z0 + 2mc is also a pole of f1 (z) with multiplicity k + 2m, m is a positive integer, so λ( f1 ) ≥ 2. Unfortunately, we can not give examples to show the existence of meromorphic solutions. Considering the transcendental entire solutions of finite order, Gao [18] obtained the following result. Theorem D. Let (f1 (z), f2 (z)) be the transcendental entire solution with finite order of (3.2), then (f1 (z), f2 (z)) = (sin(z − bi), sin(z − b1 i)) and c = kπ, where b, b1 are constants. If g(z) is a non-constant polynomial and { ′ 2 f1 (z) + [f2 (g(z))]2 = 1 (3.3) f2′ (z)2 + [f1 (g(z))]2 = 1 admits transcendental meromorphic solutions, then g(z) should be a linear polynomial g(z) = Az + c and |A| = 1, which can be proved by Lemma 2.2 and Lemma 2.4 and the following basic fact. From (3.3), we have T (r, f1 (g(z))) ≤ 2T (r, f2 (z)) + S(r, f2 (z)) and T (r, f2 (g(g(z)))) = T (r, f1′ (g(z))) + O(1) ≤ 2T (r, f1 (g(z))) + S(r, f1 (g(z))) ≤ 4T (r, f2 (z)) + S(r, f2 (z)). We proceed to consider { ′ 2 f1 (z) + [f2 (Az + c)]2 = 1 (3.4) f2′ (z)2 + [f1 (Az + c)]2 = 1 and obtain the following result.

368

KAI LIU ET AL 362-372

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

K LIU AND L MA

Theorem 3.1. Let (f1 (z), f2 (z)) be a transcendental entire solution with finite order of (3.4), then we have two cases: Case 1: If A2 = 1, then (f1 (z), f2 (z)) = (sin(z + b′ ), sin(z + b′′ )), Case 2: If A2 = −1, then (f1 (z), f2 (z)) = (sin(iz + b′ ), sin(iz + b′′ )), where b′ , b′′ are constants may different values at different occasions. Corollary 3.2. The finite order transcendental entire solutions of (3.4) should have order one. For the proof of Theorem 3.1, we need the following lemmas. Lemma 3.3. [23, Theorem 1.56] Let fj (z), (j = 1, 2, 3) be meromorphic functions, ∑3 f1 be not a constant. If j=1 fj = 1 and 3 ∑

N (r,

j=1

3 ∑ 1 )+2 N (r, fj ) < (λ + o(1))T (r), fj j=1

where λ < 1, T (r) = max1≤j≤3 {T (r, fj )}, then f2 (z) ≡ 1 or f3 (z) ≡ 1. Lemma 3.4. If sin(h1 (z)) = p(z) sin(h2 (z)) holds, then p(z) should be a constant p and p2 = 1, where h1 (z), h2 (z) are non-constant polynomials. Proof. From sin(h1 (z)) = p(z) sin(h2 (z)), we have eih1 (z) − e−ih1 (z) = p(z)eih2 (z) − p(z)e−ih2 (z) , thus, eih1 (z)+ih2 (z) eih2 (z)−ih1 (z) + + e2ih2 (z) = 1. −p(z) p(z) Obviously, e2ih2 (z) ̸≡ 1, Lemma 3.3 implies

eih1 (z)+ih2 (z) −p(z)

≡ 1 or

so we have p(z) should be a constant. Furthermore, if eih2 (z)−ih1 (z)

+ e2ih2 (z) p(z) ih2 (z)−ih1 (z) If e p(z) ≡ 1,

eih2 (z)−ih1 (z) p(z)

eih1 (z)+ih2 (z) −p(z)

≡ 1,

≡ 1, then

= 0 follows, thus p(z)2 = 1. then

eih1 (z)+ih2 (z) −p(z)

+ e2ih2 (z) = 0 follows, thus p(z)2 = 1.



Proof of Theorem 3.1. From Theorem A, we obtain { f1′ (z) = sin h1 (z) f2 (Az + c) = cos h1 (z) and

{

f2′ (z) = sin h2 (z) f1 (Az + c) = cos h2 (z). If f1 (z) and f2 (z) are transcendental entire functions with finite order, then h1 (z), h2 (z) are polynomials. Combining with the above two systems, we have { ′ f1 (Az + c) = sin h1 (Az + c) −h′ (z) f1′ (Az + c) = A2 sin h2 (z) and { ′ f2 (Az + c) = sin h2 (Az + c) −h′ (z) f2′ (Az + c) = A1 sin h1 (z). Thus, we have −h′2 (z) sin h2 (z). sin h1 (Az + c) = A

369

KAI LIU ET AL 362-372

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FERMAT TYPE EQUATIONS OR SYSTEMS WITH COMPOSITE FUNCTIONS

9

and (3.5)

sin h2 (Az + c) =

−h′1 (z) sin h1 (z). A

The above two equations imply to h′2 (Az + c)h′1 (z) sin h1 (z). A2 From Lemma 3.4, we have h′2 (Az + c)h′1 (z) = ±A2 . Since h1 (z), h2 (z) are nonconstant polynomials, so h1 (z) = a1 z + b1 and h2 (z) = a2 z + b2 . If h′2 (Az + c)h′1 (z) = A2 = a1 a2 A, since (3.6) implies that sin h1 (A2 z + Ac + c) =

(3.6)

sin h1 (A2 z + Ac + c) = sin h1 (z), so h1 (A2 z + Ac + c) − h1 (z) = 2kπ. We have A2 = 1 by h1 (z) = a1 z + b1 . Case 1: If Ac + c ̸= 0, it implies that A = 1, c = kπ. Then (3.5) reduces to sin h2 (z + c) = −a1 sin h1 (z), a21

we have = 1 follows by Lemma 3.4. Subcase (1): If a1 = 1, then h1 (z) = z + b1 and h2 (z) = z + b2 and c = kπ. So π f1 (z + c) = cos(z + b2 ) = sin(z + b2 + + 2k1 π) ⇒ f1 (z) := sin(z + b′ ), 2 where b′ = b2 + π2 + 2k1 π − kπ. Also π f2 (z + c) = cos(z + b1 ) = sin(z + b1 + + 2k2 π) ⇒ f2 (z) := sin(z + b′′ ), 2 where b′ = b1 + π2 + 2k2 π − kπ. Subcase (2): If a1 = −1, then h1 (z) = −z + b1 and h2 (z) = −z + b2 and c = kπ. One can get f1 (z) := sin(z + b′ ), f2 (z) := sin(z + b′′ ) also only modify the value b′ , b′′ by cos z is even. Case 2: If Ac + c = 0, thus two cases happen. Subcase (1): A = −1, c is any non-zero constant. Thus, a1 a2 = −1. We also can get f1 (z) := sin(z + b′ ), f2 (z) := sin(z + b′′ ) using the similar discussions as the above with cos z is even. Subcase (2): A = −1 and c = 0, from (3.5), we also have a1 , a2 take 1 or −1, then we can get f1 (z) := sin(z + b′ ), f2 (z) := sin(z + b′′ ). If h′2 (Az + c)h′1 (z) = −A2 = a1 a2 A, since (3.6) implies that sin h1 (A2 z + Ac + c) = − sin h1 (z), so h1 (A2 z + Ac + c) + h1 (z) = 2kπ. It implies that A2 = −1 by h1 (z) = a1 z + b1 . 1 Case 1: If A = i, then c = 2kπ−2b a1 (i+1) . Then (3.5) reduces to sin h2 (z + c) =

−a1 sin h1 (z), A

we have a21 = −1 follows by Lemma 3.4. Subcase (1): If a1 = i, then h1 (z) = iz + b1 and h2 (z) = −iz + b2 so π f1 (z + c) = cos(iz + b2 ) = sin(iz + b2 + + 2k1 π) ⇒ f1 (z) := sin(iz + b′ ), 2 where b′ = b2 + π2 + 2k1 π − kπ. Also π f2 (z + c) = cos(−iz + b1 ) = sin(iz − b1 + + 2k2 π) ⇒ f2 (z) := sin(iz + b′′ ), 2 where b′ = −b1 + π2 + 2k2 π − kπ.

370

KAI LIU ET AL 362-372

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

K LIU AND L MA

Subcase (2): If a1 = −i, then h1 (z) = −iz + b1 and h2 (z) = iz + b2 . One can get f1 (z) := sin(iz + b′ ), f2 (z) := sin(iz + b′′ ) also by modifying the value b′ , b′′ with cos z is even. Case 2: If A = −i, one can get f1 (z) := sin(iz + b′ ), f2 (z) := sin(iz + b′′ ) also by modifying the value b′ , b′′ with cos z is even. 4. Meromorphic solutions on Fermat type difference system We will consider the meromorphic solutions on Fermat type difference system { f1 (z)2 + [f2 (Az + c)]2 = 1 (4.1) f2 (z)2 + [f1 (Az + c)]2 = 1 where A is a non-zero constant and c is a constant. Firstly, if f1 is transcendental meromorphic and satisfy f1 (z)2 + f1 (Az + c)2 = 1, we see that f1 (z) = ±f2 (z) is the solution on (4.1). From the introduction of the paper, we know that the transcendental meromorphic solutions are exist indeed. Secondly, considering the transcendental entire solutions with finite order, we get the following properties. Theorem 4.1. The finite order transcendental entire solutions on (4.1) have order one except that c = 0 and A2mj = −1, mj are integers. Proof. Using Theorem A, we have { f1 (z) = sin(h1 (z)) f2 (Az + c) = cos(h1 (z)) and

{

f2 (z) = sin(h2 (z)) f1 (Az + c) = cos(h2 (z))

where h1 (z) and h2 (z) are non-constant polynomials. Combining with the above two systems, we obtain π ). 2 + 2kπ, where k is an integer. We also can

f1 (Az + c) = sin(h1 (Az + c)) = cos(h2 (z)) = sin(±h2 (z) + Thus, we have h1 (Az + c) = ±h2 (z) + get

π 2

f2 (Az + c) = sin(h2 (Az + c)) = cos(h1 (z)) = sin(±h1 (z) + thus h2 (Az + c) = ±h1 (z) +

π 2

π ), 2

+ 2nπ, where n is an integer, hence

h1 (A2 z + Ac + c) = ±h1 (z) + π + 2mπ, where m is an integer. Since h1 (z) is a polynomial, using Lemma 2.10, we have two cases as follows. Case 1: h1 (A2 z + Ac + c) = h1 (z) + π + 2mπ. If c = 0, the above equation is impossible. If c ̸= 0 and A = −1, the above equation is also impossible. if c ̸= 0 and A ̸= −1, then we should have h1 (z) = az + b, where a is a non-zero constant and b is a constant. Case 2: h1 (A2 z + Ac + c) = −h1 (z) + π + 2mπ. In this case, if c = 0, h(z) is a polynomial h(z) = am1 z m1 + am2 z m2 + · · · + amk z mk + π2 + kπ, where A2mj = −1. If c ̸= 0 and A = −1, then h(z) is a constant, which is a contradiction. If c ̸= 0 and A ̸= −1, we have h(z) should be a linear polynomial. 

371

KAI LIU ET AL 362-372

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FERMAT TYPE EQUATIONS OR SYSTEMS WITH COMPOSITE FUNCTIONS

11

Acknowledgements. This work was partial supported by the NSFC (No.11661052, 11301260), the NSF of Jiangxi (No. 20161BAB211005). References [1] I. N. Baker, On a class of meromorphic functions, Proc. Amer. Math. Soc. 17(1966), 819–822. [2] I. N. Baker, On factorizing meromorphic functions, Aequat. Math. 54(1997), 87–101. [3] I. N. Baker and F. Gross, On factorzing entire functions, Proc. London Math. Soc. 18 (1968), no. 3, 69–76. [4] W. Bergweiler, On the growth rate of composite meromorphic functions, Complex Variable. 14(1990), no. 3, 187–196. [5] M. F. Chen and Z. S. Gao, Entire solutions of differential-difference equations and Fermat type q-difference differential equations, Commun. Korean Math. Soc. 30(2015), no. 4, 447– 456. [6] F. Gross, On the equation f n + g n = 1, Bull. Amer. Math. Soc. 72(1966), 86–88. [7] R. Goldstein, Some results on factorization of meromorphic functions, J. Lond. Math. Soc. 4(1971), 357–364. [8] W. K. Hayman, Meromorphic Functions. Oxford at the Clarendon Press, 1964. [9] W. K. Hayman, Waring’s Problem f¨ ur analytische Funktionen, Bayer. Akad. Wiss. Math.Natur. kl. Sitzungsber, 1984 (1985), 1–13. [10] G. Iyer, On certain functional equations, J. Indian. Math. Soc. 3(1939), 312–315. [11] C. P, Li, F. L¨ u and J. F. Xu, Entire solutions of nonlinear differential-difference equations, SpringerPlus (2016) 5: 609. 907–921. [12] K. Liu, Meromorphic functions sharing a set with applications to difference equations, J. Math. Anal. Appl. 359(2009), 384–393. [13] K. Liu, T. B. Cao and H. Z. Cao, Entire solutions of Fermat type differential-difference equations, Arch. Math. 99(2012), 147–155. [14] K. Liu and L. Z. Yang, On entire solutions of some differential-difference equations, Comput. Methods Funct. Theory. 13(2013), 433–447. [15] K. Liu and T. B. Cao, Entire solutions of Fermat type q-difference-differential equations, Electron. J. Diff. Equ. 2013(2013), No. 59, 1–10. [16] K. Liu and L. Z. Yang, A note on meromorphic solutions of Fermat types equations, accepted by An. S ¸ tiint¸. Univ. Al. I. Cuza Ia¸si. Mat. (N.S.) [17] F. L¨ u and Q. Han, On the Fermat-type equation f (z)3 + f (z + c)3 = 1, Aequat. Math. (2016). doi:10.1007/s00010-016-0443-x. [18] L. Y. Gao, Entire solutions of two types of systems of complex differential-difference equations, Acta. Math. Sin, chinese series. 59(2016), 677–684. [19] A. Naftalevich, On a differential-difference equation, Michigan Math. J. 22(1976), 205–223. [20] J. F. Tang and L. W. Liao, The transcendental meromorphic solutions of a certain type of nonlinear differential equations, J. Math. Anal. Appl. 334(2007), 517–527. [21] C. C. Yang and P. Li, On the transcendental solutions of a certain type of nonlinear differential equations, Arch. Math. 82(2004), 442–448. [22] C. C. Yang, A generalization of a theorem of P. Montel on entire functions, Proc. Amer. Math. Soc. 26(1970), 332–334. [23] C. C. Yang and H. X. Yi, Uniqueness Theory of Meromorphic Functions, Kluwer Academic Publishers, 2003. [24] X. Zhang and L. W. Liao, On a certain type of nonlinear differential equations admitting transcendental meromorphic solutions, Sci. China Math. 56(2013), 2025–2034. Kai Liu Department of Mathematics, Nanchang University, Nanchang, Jiangxi, 330031, P. R. China E-mail address: [email protected], [email protected] Lei Ma Department of Mathematics, Nanchang University, Nanchang, Jiangxi, 330031, P. R. China E-mail address: [email protected]

372

KAI LIU ET AL 362-372

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

ON SHARED VALUE PROPERTIES OF DIFFERENCE ´ EQUATIONS PAINLEVE XIAOGUANG QI AND JIA DOU Abstract. In this paper, we study some shared value properties for finite order meromorphic solutions of difference Painlev´e I-III equations. Keywords: Meromorphic functions; Difference Painlev´e equation; Value sharing. MSC 2010: Primary 39A05; Secondary 30D35

1. Introduction A century ago, Painlev´e [9, 10], Fuchs [3] and Gambier [4] classified a large class of second order differential equations of the Painlev´e type of the form w00 (z) = F (z, w, w0 ), where F is rational in w and w0 and (locally) analytic in z. In the past two decades, the interest in nonlinear analytic difference equations has increased, especially in response to programme of finding some kind of an analogue of Painlev´e property of differential equations for difference equations. Recently, Halburd and Korhonen [5], Ronkainen [11] studied the following complex difference equations f (z + 1) + f (z − 1) = R(z, f )

(1.1)

and f (z + 1)f (z − 1) = R(z, f ), (1.2) where R(z, f ) is rational in f and meromorphic in z. They obtained that if (1.1) or (1.2) has an admissible meromorphic solution of finite order(or hyper order less than 1), then either f satisfies a difference Riccati equation, or (1.1) and (1.2) can be transformed by a linear change in f to some difference equations, which include the difference Painlev´e I-III equations c az + b + 2 , (PI ) f (z + 1) + f (z − 1) = f f (1.3) (az + b)f + c f (z + 1) + f (z − 1) = , (PII ) 1 − f2 af 2 − bf + c , (PIII ) (f − 1)(f − d) (1.4) af 2 − bf f (z + 1)f (z − 1) = , (PIII ) f −1 where a, b, c, d are small functions of f (z). Some results about properties of finite order transcendental meromorphic solutions of (1.3) and (1.4), can f (z + 1)f (z − 1) =

The work was supported by the NNSF of China (No.11301220, 11661052, 11626112). 1

373

XIAOGUANG QI ET AL 373-379

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

XIAOGUANG QI AND JIA DOU

be found in [1, 2, 13]. In 2007, Lin and Tohge [7] studied some shared value properties of the first, the second and the fourth Painlev´e differential equations f 00 = z + 6f 2 f 00 = 2f 3 + zf + a, 00

0 2

4

α∈C

(1.5)

3

2

2

2f f = (f ) + 3f + 8zf = 4(z − α)f + β,

α, β ∈ C

They obtained the following result Theorem A. Let f (z) be an arbitrary nonconstant solution of one of the equations (1.5), and g(z) be a nonconstant meromorphic function which shares four distinct values aj IM with f (z), where j = 1, 2, 3, 4. Then f (z) ≡ g(z). Remark. We assume that the reader is familiar with standard symbols and fundamental results of Nevanlinna Theory [12]. As usual, the abbreviation CM stands for ”counting multiplicities”, while IM means ”ignoring multiplicities”. A natural question is: what is the uniqueness result for finite order meromorphic solutions of difference Painlev´e equations. Corresponding to this question, we consider shared value properties of equations (1.3) and (1.4). Set Θ1 (z, f ) = (f (z + 1) + f (z − 1))f 2 − (az + b)f − c and Θ2 (z, f ) = (f (z + 1) + f (z − 1))(1 − f 2 ) − (az + b)f − c. Then we can get a uniqueness theorem for finite order meromorphic solutions of difference PI , PII equations. Theorem 1.1. Let f (z) be a finite order transcendental meromorphic solution of (1.3), let e1 , e2 be two distinct finite numbers such that Θi (z, e1 ) 6≡ 0, Θi (z, e2 ) 6≡ 0, i = 1, 2. If f (z) and another meromorphic function g(z) share the values e1 , e2 and ∞ CM, then f (z) ≡ g(z). Regarding shared value properties of difference PIII equations, we have Theorem 1.2. Let f (z) be a finite order transcendental meromorphic solution of af 2 − bf + c f (z + 1)f (z − 1) = . (1.6) (f − 1)(f − d) And let e1 , e2 be two distinct finite numbers such that Φ(z, e1 ) 6≡ 0, Φ(z, e2 ) 6≡ 0, where Φ(z, f ) = f (z + 1)f (z − 1)(f − 1)(f − d) − af 2 + bf − c. If f (z) and another meromorphic function g(z) share the values e1 , e2 and ∞ CM, then f (z) ≡ g(z). Theorem 1.3. Let f (z) be a finite order transcendental meromorphic solution of af 2 − bf f (z + 1)f (z − 1) = . f −1

374

XIAOGUANG QI ET AL 373-379

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

´ EQUATIONS ON SHARED VALUE PROPERTIES OF DIFFERENCE PAINLEVE

3

And let e1 , e2 be two distinct finite numbers such that Ψ(z, e1 ) 6≡ 0, Ψ(z, e2 ) 6≡ 0, where Ψ(z, f ) = f (z + 1)f (z − 1)(f − 1) − af 2 + bf . If f (z) and another meromorphic function g(z) share the values e1 , e2 and ∞ CM, then f (z) ≡ g(z). Remarks. (1) By Lemma 2.4 below, we can get Theorem 1.1 easily. And using similar methods as the proof of Theorem 1.2, we can prove Theorem 1.3. Here, we omit the details. (2) Some ideas of this paper come from [8]. 2. Some Lemmas Lemma 2.1. [6, Theorem 2.2] Let f (z) be a transcendental meromorphic solution with finite order σ(f ) of a difference equation of the form H(z, f )P (z, f ) = Q(z, f ), where H(z, f ) is a difference product of total degree n in f (z) and its shifts, and where P (z, f ), Q(z, f ) are difference polynomials such that the total degree of Q(z, f ) is at most n. Then for each ε > 0, m(r, P (z, f )) = O(rσ(f )−1+ε ) + o(T (r, f )) possibly outside of an exceptional set of finite logarithmic measure. Lemma 2.2. [6, Theorem 2.4] Let f (z) be a transcendental meromorphic solution with finite order σ(f ) of the difference equation L(z, f ) = 0, where L(z, f ) is a difference polynomial in f (z) and its shifts. If L(z, a) 6≡ 0 for slowly moving target a(z). Then for each ε > 0, 1 ) = O(rσ(f )−1+ε ) + o(T (r, f )) m(r, f −a outside of a possible exceptional set of finite logarithmic measure. Lemma 2.3. [12, Theorem 1.51] Suppose that fj (z) (j = 1, . . . n) (n ≥ 2) are meromorphic functions and gj (z) (j = 1, . . . , n) are entire functions satisfying the following conditions. Pn gj (z) ≡ 0. (1) j=1 fj (z)e (2) 1 ≤ j < k ≤ n, gj (z) − gk (z) are not constants for 1 ≤ j < k ≤ n. (3) For 1 ≤ j ≤ n, 1 ≤ h < k ≤ n, T (r, fj ) = o{T (r, egh −gk )},

r → ∞, r 6∈ E,

where E ⊂ (1, ∞) is of finite linear measure. Then fj (z) ≡ 0. Lemma 2.4. [8, Theorem 1.1] Let f (z) be a finite order transcendental meromorphic solution of Pp n j X P (z, f ) j=0 bj f ai f (z + ci ) = = Pq , k Q(z, f ) k=0 dk f i=1

where ai (6≡ 0), bj , dk , are small functions of f , cj (6= 0) are pairwise distinct constants. And let e1 , e2 be two distinct finite numbers such that Θ(z, e1 ) 6≡

375

XIAOGUANG QI ET AL 373-379

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

XIAOGUANG QI AND JIA DOU

Pn 0, Θ(z, e2 ) 6≡ 0, p ≤ q = n, where Θ(z, f ) = i=1 ai f (z + ci )Q(z, f ) − P (z, f ). If f (z) and another meromorphic function g(z) share the values e1 , e2 and ∞ CM, then f (z) ≡ g(z). 3. Proof of Theorem 1.2 Suppose that f (z) is a finite order transcendental meromorphic solution of Eq. (1.6). Then we get f 2 f (z +1)f (z −1) = (d+1)f f (z +1)f (z −1)−df (z +1)f (z −1)+af 2 −bf +c. Applying Lemma 2.1, we obtain m(r, f ) = S(r, f ).

(3.1)

From Lemma 2.2 and the assumption that Φ(z, e1 ) 6≡ 0, Φ(z, e2 ) 6≡ 0, we know 1 1 m(r, ) = S(r, f ), m(r, ) = S(r, f ). (3.2) f − e1 f − e2 By the assumption that f (z) and g(z) share the values e1 , e2 and ∞ CM, we have that 1 1 T (r, f ) ≤ N (r, f ) + N (r, ) + N (r, ) + S(r, f ) f − e1 f − e2 1 1 ≤ N (r, g) + N (r, ) + N (r, ) + S(r, f ) g − e1 g − e2 ≤ 3T (r, g) + S(r, f ). Similarly, we can get T (r, g) ≤ 3T (r, f ) + T (r, f ). Hence, T (r, g) = T (r, f ) + S(r, f ).

(3.3)

Moreover, from the assumption that f (z) and g(z) share the values e1 , e2 and ∞ CM, we see f − e1 = eA(z) , g − e1

f − e2 = eB(z) , g − e2

(3.4)

where A(z) and B(z) are two polynomials. Clearly, when eA(z) = 1, or eB(z) = 1, or eB(z)−A(z) = 1, The conclusion f (z) ≡ g(z) holds. In the following, we suppose that eA(z) 6= 1, eB(z) 6= 1 and eB(z)−A(z) 6= 1 at the same time. Combining (3.3) and (3.4), we obtain T (r, eA ) ≤ 2T (r, f ) + S(r, f ), T (r, eB ) ≤ 2T (r, f ) + S(r, f ).

(3.5)

Rewrite above Eq. (3.4) as the following forms eB(z) − 1 , eC(z) − 1

(3.6)

eA(z) − 1 C(z) e , eC(z) − 1

(3.7)

f (z) = e1 + (e2 − e1 ) or f (z) = e2 + (e2 − e1 ) where C(z) = B(z) − A(z).

376

XIAOGUANG QI ET AL 373-379

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

´ EQUATIONS ON SHARED VALUE PROPERTIES OF DIFFERENCE PAINLEVE

5

Next we prove that deg A(z) = deg B(z) = deg C(z) > 0. Assume that the largest common factor of eB(z) − 1 and eC(z) − 1 is D(z), hence eB(z) − 1 = D(z)B1 (z),

eC(z) − 1 = D(z)C1 (z),

where B1 (z), C1 (z) and D(z) are entire functions. Substituting above equations into (3.6), we conclude that f (z) = e1 + (e2 − e1 )

B1 (z) . C1 (z)

This, together with (3.1) and (3.2), it follows that 1 1 1 ) + N (r, ) + S(r, f ) = N (r, ) + S(r, f ) T (r, f ) = m(r, f − e1 f − e1 B1 and 1 T (r, f ) = m(r, f ) + N (r, f ) = N (r, ) + S(r, f ). C1 Furthermore, we have 1 1 1 T (r, eB ) = N (r, B ) + S(r, f ) = N (r, ) + N (r, ) + S(r, f ) e −1 B1 D and 1 1 1 T (r, eC ) = N (r, C ) + S(r, f ) = N (r, ) + N (r, ) + S(r, f ). e −1 C1 D Observing four equations above, we see T (r, eC ) = T (r, eB ) + S(r, f ).

(3.8)

Using the same way to deal with Eq. (3.7), we get T (r, eC ) = T (r, eA ) + S(r, f ).

(3.9)

This, together with (3.7) and (3.8), deg A(z) = deg B(z) = deg C(z) = k > 0 follows. On the other hand, Substituting (3.6) into (1.6), we have eB(z+1) − 1 eB(z−1) − 1 )(e + (e − e ) ) 1 2 1 eC(z+1) − 1 eC(z−1) − 1 eB − 1 eB − 1 (e1 + (e2 − e1 ) C − 1)(e1 + (e2 − e1 ) C − d) e −1 e −1 eB − 1 2 eB − 1 ) − b(e1 + (e2 − e1 ) C ) + c. = a(e1 + (e2 − e1 ) C e −1 e −1 (e1 + (e2 − e1 )

(3.10)

Both sides of Eq. (3.10) multiplied by (eC(z+1) − 1)(eC(z−1) − 1)(eC − 1)2 , we get    e1 (eC(z+1) − 1) + (e2 − e1 )(eB(z+1) − 1) e1 (eC(z−1) − 1) + (e2 − e1 )(eB(z−1) − 1)   (e1 − 1)(eC − 1) + (e2 − e1 )(eB − 1) (e1 − d)(eC − 1) + (e2 − e1 )(eB − 1) = (eC(z+1) − 1)(eC(z−1) − 1)(a(e1 (eC − 1) + (e2 − e1 )(eB − 1))2 − b(e1 (eC − 1)2 + (e2 − e1 )(eB − 1)(eC − 1)) + c(eC − 1)2 ). (3.11)

377

XIAOGUANG QI ET AL 373-379

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

XIAOGUANG QI AND JIA DOU

Set B(z + 1) = B(z) + s1 (z),

B(z − 1) = B(z) + s2 (z),

C(z + 1) = C(z) + t1 (z), C(z − 1) = C(z) + t2 (z), where si , ti are polynomials of degrees at most k − 1. Then Eq. (3.11) can be represented as the following form: 4 X 4 X

Mµ,λ eµB+λC = 0,

(3.12)

µ=0 λ=0

where Mµ,λ is either 0 or polynomial in a, b, c, d, e1 , e2 and esi , eti . Especially, we have M0,0 = e22 (e2 − 1)(e2 − d) − (ae22 − be2 + c) = Φ(z, e2 ) 6≡ 0.

(3.13)

Finally, we prove that deg(µ∗ B + λ∗ C) = deg(µ∗ B − λ∗ C) = k,

1 ≤ µ∗ ≤ 4, 1 ≤ λ∗ ≤ 4.

Suppose, contrary to the assertion, that deg(µ∗ B + λ∗ C) < k or deg(µ∗ B − λ∗ C) < k. ∗ B+λ∗ C

If deg(µ∗ B + λ∗ C) < k, then eµ by (3.5), (3.8) and (3.9). Hence, ∗ B+λ∗ C

T (r, eµ

· e−µ

∗A

is a small function of eA and f (z)

) = T (r, e−µ

∗A

) = µ∗ T (r, eA ) + S(r, f ).

Moreover, ∗ B+λ∗ C

T (r, eµ

· e−µ

∗A

) = T (r, e(µ

∗ +λ∗ )C

) = (µ∗ + λ∗ )T (r, eA ) + S(r, f ).

Since λ∗ 6= 0, comparing two equations above, we get a contradiction. If deg(µ∗ B + λ∗ C) < k, then we have T (r, eµ

∗ B−λ∗ C

· e−µ

∗A

) = T (r, e−µ

∗A

) = µ∗ T (r, eA ) + S(r, f ),

and ∗ B−λ∗ C

T (r, eµ

· e−µ

∗A

) = T (r, e(µ

∗ −λ∗ )C

) = (µ∗ − λ∗ )T (r, eA ) + S(r, f ).

As λ∗ 6= 0, we can get a contradiction as well. Therefore, we know ∗ B+λ∗ C)

T (r, Mµ,λ ) = S(r, e±(µ

),

∗ B−λ∗ C)

T (r, Mµ,λ ) = S(r, e±(µ

),

where µ∗ and λ∗ are not equal to zero at the same time. This, together with Lemma 2.3, it follows that Mµ,λ ≡ 0, which contradicts Eq. (3.13), and the conclusion follows. References [1] Z. X. Chen and K. H. Shon, Value distribution of meromorphic solutions of certain difference Painlev´e equations, J. Math. Anal. Appl. 364 (2010), 556-566. [2] Z. X. Chen, On properties of meromorphic solutions for some difference equations, Kodai Math. 34 (2011), 244-256. [3] L. Fuchs, Sur quelques ´equations diff´erentielles lin´eares du second ordre, C. R. Acad. Sci. Paris 141 (1905), 555-558. [4] B. Gambier, Sur les e´quations diff´ erentielles du second ordre et du premier degr´ e dont l’int´ egrale g´ en´ erale est a `points critiques fixes, Acta Math. 33 (1910), 1-55. [5] R. G. Halburd and R. J. Korhonen, Finite order solutions and the discrete Painlev´e equations, Proc. London Math. Soc. 94 (2007), 443-474.

378

XIAOGUANG QI ET AL 373-379

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.2, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

´ EQUATIONS ON SHARED VALUE PROPERTIES OF DIFFERENCE PAINLEVE

7

[6] I. Laine and C. C. Yang, Clunie theorem for difference and q-difference polynomials, J. London. Math. Soc. 76 (2007), 556-566. [7] W. C. Lin and K. Tohge, On shared-value properties of Painlev´e transcendents, Comput. Methods Funct. Theory 7 (2007), 477-499. [8] F. L¨ u, Q. Han and W. R. L¨ u, On unicity of meromorphic solutions to difference equations of Malmquist type, Bull. Aust. Math. soc. 93 (2016), 92-98. [9] P. Painlev´e, M´emoire sur les ´equations diff´erentielles dont l’int´egrale g´en´erale est uniforme, Bull. Soc. Math. France 28 (1900), 201-261. [10] P. Painlev´e, Sur les ´equations diff´erentielles du second ordre et d’ordre sup´erieur dont l’integrale g´en´erale est uniforme, Acta Math. 25 (1902), 1-85 [11] O. Ronkainen, Meromorphic solutions of difference Painlev´e equations, Doctoral Dissertation, Helsinki, 2010. [12] C. C. Yang and H. X. Yi, Uniqueness Theory of Meromorphic Functions, Kluwer Academic Publishers, Dordrecht, 2003. [13] J. L. Zhang and L. Z. Yang, Meromorphic solutions of Painlev´e III difference equations, Acta Math. Sinica A 57 (2014), 181-188. Xiaoguang, Qi University of Jinan, School of Mathematics, Jinan, Shandong, 250022, P. R. China E-mail address: [email protected] or [email protected] Jia Dou Quancheng Middle School, Jinan, Shandong, 250000, P. R. China E-mail address: [email protected]

379

XIAOGUANG QI ET AL 373-379

380

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO. 2, 2019

Fourier series of sums of products of ordered Bell and Euler functions, Taekyun Kim, Dae San Kim, Gwan-Woo Jang, and Jin-Woo Park,…………………………………………………201 Fekete Szegö problem for some subclasses of multivalent non-bazilevič function using differential operator, C. Ramachandran, D. Kavitha, and Wasim Ul-Huq,………………….216 A new interpretation of Hermite-Hadamard’s type integral inequalities by the way of time scales, Saeeda Fatima Tahir, Muhammad Mushtaq, and Muhammad Muddassar,………………….223 The general solution and Ulam stability of inhomogeneous Euler-Cauchy dynamic equations on time scales, Yonghong Shen and Deming He,………………………………………………..234 Some existence theorems of generalized vector variational-like inequalities in fuzzy environment, Jiraprapa Munkong, Ali Farajzadeh, and Kasamsuk Ungchittrakool,………….242 Strong differential superordination and sandwich theorem obtained with some new integral operators, Georgia Irina Oros,…………………………………………………………………256 Weighted composition operators from Zygmund-type spaces to weighted-type spaces, Yanhua Zhang,………………………………………………………………………………………….262 Positive solutions for a singular semipositone boundary value problem of nonlinear fractional differential equations, Xiaofeng Zhang and Hanying Feng,……………………………………270 Existence and uniqueness of positive solutions of fractional differential equations with infinitepoint boundary value conditions, Qianqian Leng, Jiandong Yin, and Pinghua Yan,………….280 Dynamical analysis of a non-linear difference equation, Erkan Tașdemir and Yüksel Soykan,288 A new fixed point theorem in cones and applications to elastic beam equations, Wei Long and Jing-Yun Zhao,…………………………………………………………………………………302 A septendecic functional equation in matrix normed spaces, Murali Ramdoss, Choonkil Park, Vithya Veeramani, and Young Cho,……………………………………………………………318 A novel similarity measure for pseudo-generalized fuzzy rough sets, Zhan-hong Shi and Dinghai Zhang,………………………………………………………………………………………334

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO. 2, 2019 (continued)

Fourier series of functions involving higher-order Euler polynomials, Taekyun Kim, Dae San Kim, Lee Chae Jang, and Gwan-Woo Jang,……………………………………………………348 Fermat type equations or systems with composite functions, Kai Liu and Lei Ma,……………362 On shared value properties of difference Painlevé equations, Xiaoguang Qi and Jia Dou,……373

Volume 26, Number 3 ISSN:1521-1398 PRINT,1572-9206 ONLINE

March 2019

Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC

Journal of Computational Analysis and Applications ISSNno.’s:1521-1398 PRINT,1572-9206 ONLINE SCOPE OF THE JOURNAL An international publication of Eudoxus Press, LLC (fifteen times annually) Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152-3240, U.S.A [email protected] http://www.msci.memphis.edu/~ganastss/jocaaa The main purpose of "J.Computational Analysis and Applications" is to publish high quality research articles from all subareas of Computational Mathematical Analysis and its many potential applications and connections to other areas of Mathematical Sciences. Any paper whose approach and proofs are computational,using methods from Mathematical Analysis in the broadest sense is suitable and welcome for consideration in our journal, except from Applied Numerical Analysis articles. Also plain word articles without formulas and proofs are excluded. The list of possibly connected mathematical areas with this publication includes, but is not restricted to: Applied Analysis, Applied Functional Analysis, Approximation Theory, Asymptotic Analysis, Difference Equations, Differential Equations, Partial Differential Equations, Fourier Analysis, Fractals, Fuzzy Sets, Harmonic Analysis, Inequalities, Integral Equations, Measure Theory, Moment Theory, Neural Networks, Numerical Functional Analysis, Potential Theory, Probability Theory, Real and Complex Analysis, Signal Analysis, Special Functions, Splines, Stochastic Analysis, Stochastic Processes, Summability, Tomography, Wavelets, any combination of the above, e.t.c. "J.Computational Analysis and Applications" is a peer-reviewed Journal. See the instructions for preparation and submission of articles to JoCAAA. Assistant to the Editor: Dr.Razvan Mezei,[email protected], Madison,WI,USA.

Journal of Computational Analysis and Applications(JoCAAA) is published by EUDOXUS PRESS,LLC,1424 Beaver Trail Drive,Cordova,TN38016,USA,[email protected] http://www.eudoxuspress.com. Annual Subscription Prices:For USA and Canada,Institutional:Print $800, Electronic OPEN ACCESS. Individual:Print $400. For any other part of the world add $160 more(handling and postages) to the above prices for Print. No credit card payments. Copyright©2019 by Eudoxus Press,LLC,all rights reserved.JoCAAA is printed in USA. JoCAAA is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH. It is strictly prohibited the reproduction and transmission of any part of JoCAAA and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes no responsibility for the content of published papers.

384

Editorial Board Associate Editors of Journal of Computational Analysis and Applications Francesco Altomare Dipartimento di Matematica Universita' di Bari Via E.Orabona, 4 70125 Bari, ITALY Tel+39-080-5442690 office +39-080-3944046 home +39-080-5963612 Fax [email protected] Approximation Theory, Functional Analysis, Semigroups and Partial Differential Equations, Positive Operators.

Fractional Differential Equations Nonlinear Analysis, Fractional Dynamics Carlo Bardaro Dipartimento di Matematica e Informatica Universita di Perugia Via Vanvitelli 1 06123 Perugia, ITALY TEL+390755853822 +390755855034 FAX+390755855024 E-mail [email protected] Web site: http://www.unipg.it/~bardaro/ Functional Analysis and Approximation Theory, Signal Analysis, Measure Theory, Real Analysis.

Ravi P. Agarwal Department of Mathematics Texas A&M University - Kingsville 700 University Blvd. Kingsville, TX 78363-8202 tel: 361-593-2600 [email protected] Differential Equations, Difference Equations, Inequalities

Martin Bohner Department of Mathematics and Statistics, Missouri S&T Rolla, MO 65409-0020, USA [email protected] web.mst.edu/~bohner Difference equations, differential equations, dynamic equations on time scale, applications in economics, finance, biology.

George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis, TN 38152,U.S.A Tel.901-678-3144 e-mail: [email protected] Approximation Theory, Real Analysis, Wavelets, Neural Networks, Probability, Inequalities.

Jerry L. Bona Department of Mathematics The University of Illinois at Chicago 851 S. Morgan St. CS 249 Chicago, IL 60601 e-mail:[email protected] Partial Differential Equations, Fluid Dynamics

J. Marshall Ash Department of Mathematics De Paul University 2219 North Kenmore Ave. Chicago, IL 60614-3504 773-325-4216 e-mail: [email protected] Real and Harmonic Analysis

Luis A. Caffarelli Department of Mathematics The University of Texas at Austin Austin, Texas 78712-1082 512-471-3160 e-mail: [email protected] Partial Differential Equations George Cybenko Thayer School of Engineering

Dumitru Baleanu Department of Mathematics and Computer Sciences, Cankaya University, Faculty of Art and Sciences, 06530 Balgat, Ankara, Turkey, [email protected]

385

Dartmouth College 8000 Cummings Hall, Hanover, NH 03755-8000 603-646-3843 (X 3546 Secr.) e-mail:[email protected] Approximation Theory and Neural Networks

011-49-203-379-3542 e-mail: [email protected] Approximation Theory, Computer Aided Geometric Design John R. Graef Department of Mathematics University of Tennessee at Chattanooga Chattanooga, TN 37304 USA [email protected] Ordinary and functional differential equations, difference equations, impulsive systems, differential inclusions, dynamic equations on time scales, control theory and their applications

Sever S. Dragomir School of Computer Science and Mathematics, Victoria University, PO Box 14428, Melbourne City, MC 8001, AUSTRALIA Tel. +61 3 9688 4437 Fax +61 3 9688 4050 [email protected] Inequalities, Functional Analysis, Numerical Analysis, Approximations, Information Theory, Stochastics.

Weimin Han Department of Mathematics University of Iowa Iowa City, IA 52242-1419 319-335-0770 e-mail: [email protected] Numerical analysis, Finite element method, Numerical PDE, Variational inequalities, Computational mechanics

Oktay Duman TOBB University of Economics and Technology, Department of Mathematics, TR06530, Ankara, Turkey, [email protected] Classical Approximation Theory, Summability Theory, Statistical Convergence and its Applications

Tian-Xiao He Department of Mathematics and Computer Science P.O. Box 2900, Illinois Wesleyan University Bloomington, IL 61702-2900, USA Tel (309)556-3089 Fax (309)556-3864 [email protected] Approximations, Wavelet, Integration Theory, Numerical Analysis, Analytic Combinatorics

Saber N. Elaydi Department Of Mathematics Trinity University 715 Stadium Dr. San Antonio, TX 78212-7200 210-736-8246 e-mail: [email protected] Ordinary Differential Equations, Difference Equations

Margareta Heilmann Faculty of Mathematics and Natural Sciences, University of Wuppertal Gaußstraße 20 D-42119 Wuppertal, Germany, [email protected] Approximation Theory (Positive Linear Operators)

J .A. Goldstein Department of Mathematical Sciences The University of Memphis Memphis, TN 38152 901-678-3130 [email protected] Partial Differential Equations, Semigroups of Operators

Xing-Biao Hu Institute of Computational Mathematics AMSS, Chinese Academy of Sciences Beijing, 100190, CHINA [email protected]

H. H. Gonska Department of Mathematics University of Duisburg Duisburg, D-47048 Germany

386

Computational Mathematics Ram N. Mohapatra Department of Mathematics University of Central Florida Orlando, FL 32816-1364 tel.407-823-5080 [email protected] Real and Complex Analysis, Approximation Th., Fourier Analysis, Fuzzy Sets and Systems

Jong Kyu Kim Department of Mathematics Kyungnam University Masan Kyungnam,631-701,Korea Tel 82-(55)-249-2211 Fax 82-(55)-243-8609 [email protected] Nonlinear Functional Analysis, Variational Inequalities, Nonlinear Ergodic Theory, ODE, PDE, Functional Equations.

Gaston M. N'Guerekata Department of Mathematics Morgan State University Baltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'[email protected] [email protected] Nonlinear Evolution Equations, Abstract Harmonic Analysis, Fractional Differential Equations, Almost Periodicity & Almost Automorphy

Robert Kozma Department of Mathematical Sciences The University of Memphis Memphis, TN 38152, USA [email protected] Neural Networks, Reproducing Kernel Hilbert Spaces, Neural Percolation Theory Mustafa Kulenovic Department of Mathematics University of Rhode Island Kingston, RI 02881,USA [email protected] Differential and Difference Equations

M.Zuhair Nashed Department Of Mathematics University of Central Florida PO Box 161364 Orlando, FL 32816-1364 e-mail: [email protected] Inverse and Ill-Posed problems, Numerical Functional Analysis, Integral Equations, Optimization, Signal Analysis

Irena Lasiecka Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

Mubenga N. Nkashama Department OF Mathematics University of Alabama at Birmingham Birmingham, AL 35294-1170 205-934-2154 e-mail: [email protected] Ordinary Differential Equations, Partial Differential Equations

Burkhard Lenze Fachbereich Informatik Fachhochschule Dortmund University of Applied Sciences Postfach 105018 D-44047 Dortmund, Germany e-mail: [email protected] Real Networks, Fourier Analysis, Approximation Theory

Vassilis Papanicolaou Department of Mathematics National Technical University of Athens Zografou campus, 157 80 Athens, Greece tel:: +30(210) 772 1722 Fax +30(210) 772 1775 [email protected] Partial Differential Equations, Probability

Hrushikesh N. Mhaskar Department Of Mathematics California State University Los Angeles, CA 90032 626-914-7002 e-mail: [email protected] Orthogonal Polynomials, Approximation Theory, Splines, Wavelets, Neural Networks

387

Choonkil Park Department of Mathematics Hanyang University Seoul 133-791 S. Korea, [email protected] Functional Equations

Anfithea - Paleon Faliron GR-175 64 Athens, Greece [email protected] Numerical Analysis H. M. Srivastava Department of Mathematics and Statistics University of Victoria Victoria, British Columbia V8W 3R4 Canada tel.250-472-5313; office,250-4776960 home, fax 250-721-8962 [email protected] Real and Complex Analysis, Fractional Calculus and Appl., Integral Equations and Transforms, Higher Transcendental Functions and Appl.,q-Series and q-Polynomials, Analytic Number Th.

Svetlozar (Zari) Rachev, Professor of Finance, College of Business, and Director of Quantitative Finance Program, Department of Applied Mathematics & Statistics Stonybrook University 312 Harriman Hall, Stony Brook, NY 11794-3775 tel: +1-631-632-1998, [email protected] Alexander G. Ramm Mathematics Department Kansas State University Manhattan, KS 66506-2602 e-mail: [email protected] Inverse and Ill-posed Problems, Scattering Theory, Operator Theory, Theoretical Numerical Analysis, Wave Propagation, Signal Processing and Tomography

I. P. Stavroulakis Department of Mathematics University of Ioannina 451-10 Ioannina, Greece [email protected] Differential Equations Phone +3-065-109-8283

Tomasz Rychlik Polish Academy of Sciences Instytut Matematyczny PAN 00-956 Warszawa, skr. poczt. 21 ul. Śniadeckich 8 Poland [email protected] Mathematical Statistics, Probabilistic Inequalities

Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock, Germany [email protected] Numerical Fourier Analysis, Fourier Analysis, Harmonic Analysis, Signal Analysis, Spectral Methods, Wavelets, Splines, Approximation Theory

Boris Shekhtman Department of Mathematics University of South Florida Tampa, FL 33620, USA Tel 813-974-9710 [email protected] Approximation Theory, Banach spaces, Classical Analysis

Roberto Triggiani Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

T. E. Simos Department of Computer Science and Technology Faculty of Sciences and Technology University of Peloponnese GR-221 00 Tripolis, Greece Postal Address: 26 Menelaou St.

Juan J. Trujillo University of La Laguna Departamento de Analisis Matematico C/Astr.Fco.Sanchez s/n 38271. LaLaguna. Tenerife. SPAIN Tel/Fax 34-922-318209 [email protected]

388

Fractional: Differential EquationsOperators-Fourier Transforms, Special functions, Approximations, and Applications

Ahmed I. Zayed Department of Mathematical Sciences DePaul University 2320 N. Kenmore Ave. Chicago, IL 60614-3250 773-325-7808 e-mail: [email protected] Shannon sampling theory, Harmonic analysis and wavelets, Special functions and orthogonal polynomials, Integral transforms

Ram Verma International Publications 1200 Dallas Drive #824 Denton, TX 76205, USA [email protected] Applied Nonlinear Analysis, Numerical Analysis, Variational Inequalities, Optimization Theory, Computational Mathematics, Operator Theory

Ding-Xuan Zhou Department Of Mathematics City University of Hong Kong 83 Tat Chee Avenue Kowloon, Hong Kong 852-2788 9708,Fax:852-2788 8561 e-mail: [email protected] Approximation Theory, Spline functions, Wavelets

Xiang Ming Yu Department of Mathematical Sciences Southwest Missouri State University Springfield, MO 65804-0094 417-836-5931 [email protected] Classical Approximation Theory, Wavelets

Xin-long Zhou Fachbereich Mathematik, Fachgebiet Informatik Gerhard-Mercator-Universitat Duisburg Lotharstr.65, D-47048 Duisburg, Germany e-mail:[email protected] Fourier Analysis, Computer-Aided Geometric Design, Computational Complexity, Multivariate Approximation Theory, Approximation and Interpolation Theory

Xiao-Jun Yang State Key Laboratory for Geomechanics and Deep Underground Engineering, China University of Mining and Technology, Xuzhou 221116, China Local Fractional Calculus and Applications, Fractional Calculus and Applications, General Fractional Calculus and Applications, Variable-order Calculus and Applications, Viscoelasticity and Computational methods for Mathematical [email protected]

Jessada Tariboon Department of Mathematics, King Mongkut's University of Technology N. Bangkok 1518 Pracharat 1 Rd., Wongsawang, Bangsue, Bangkok, Thailand 10800 [email protected], Time scales, Differential/Difference Equations, Fractional Differential Equations

Richard A. Zalik Department of Mathematics Auburn University Auburn University, AL 36849-5310 USA. Tel 334-844-6557 office 678-642-8703 home Fax 334-844-6555 [email protected] Approximation Theory, Chebychev Systems, Wavelet Theory

389

Instructions to Contributors Journal of Computational Analysis and Applications An international publication of Eudoxus Press, LLC, of TN.

Editor in Chief: George Anastassiou Department of Mathematical Sciences University of Memphis Memphis, TN 38152-3240, U.S.A.

1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves.

2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.

390

4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corollaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,

391

name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990).

Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986.

Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495.

11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears.

15. This journal will consider for publication only papers that contain proofs for their listed results.

392

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Nonlinear evolution equations with delays satisfying a local Lipschitz condition Jin-Mun Jeong1 and Ah-ran Park2 1,2

Department of Applied Mathematics, Pukyong National University Busan 608-737, Korea

Abstract In this paper, we establish the maximal regularity for the nonlinear functional differential equations with time delay and establish a variation of constant formula for solutions of the given equations. We make use of the regularity of the linear differential equations that appears on given Gelfand triple spaces. Keywords: Nonlinear evolution equation, regularity, local Lipschtiz continuity, delay, analytic semigroup AMS Classification Primary 35K58; Secondary 76B03

1

Introduction

In this paper, we consider the following nonlinear functional differential equation with time delays in a Hilbert space H: ( R0 0 x (t) + Ax(t) = −h g(t, s, x(t), x(t + s))µ(ds) + k(t), 0 < t ≤ T, (1.1) x(0) = g 0 , x(s) = g 1 (s) s ∈ [−h, 0). Here, k is a forcing term, and A0 is the operator associated with a sesquilinear form defined on V × V satisfying G˚ arding’s inequality, where V is another Hilbert space such ∗ that V ⊂ H ⊂ V . The nonlinear term g, which is a locally Lipschitz continuous operator from L2 (−h, T ; V ) to L2 (0, T ; H), is a semilinear version of the quasilinear one considered in Yong and Pan [13]. Precise assumptions are given in the next section. It is well known that the future state realistic models in the natural sciences, biology economics and engineering depends not only on the present but also on the past state. Such applications are used to study the stability, controllability and the time optimal control problems of hereditary systems. The regular problems the semilinear functional Email: 1 [email protected]( Corresponding author), 2 [email protected] This work was supported by a Research Grant of Pukyong National University(2017Year).

1

393

Jin-Mun Jeong ET AL 393-403

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2 differential equations with unbounded delays has been surveyed in Vrabie [12] and Jeong et al. [8]. As for the regularity results for a class of nonlinear evolution equations with the nonlinear operator A were developed in many references [1-4]. Ahmed and Xiang [1] gave some existence results for the initial value problem in case where the nonlinear term is not monotone, which improved Hirano’s result [7]. In this paper, we will establish a variation of constant formula for solutions of the given equation with a general condition of the local Lipschitz continuity of the nonlinear operator , which is reasonable and widely used in case of the nonlinear system. The main research direction is to find conditions on the nonlinear term such that the regularity result of (1.1) is preserved under perturbation. In order to prove the solvability of the initial value problem (1.1) in Section 3, we establish necessary estimates applying the result of Di Blasio et al. [6] to (1.1) considered as an equation in H as well as in V ∗ in Section 2. The important technique used is a successive approach method using the regularity and a variation of solutions of the corresponding linear equations without nonlinear terms.

2

Preliminaries and Assumptions

If H is identified with its dual space we may write V ⊂ H ⊂ V ∗ densely and the corresponding injections are continuous. The norm on V , H and V ∗ will be denoted by || · ||, | · | and || · ||∗ , respectively. The duality pairing between the element v1 of V ∗ and the element v2 of V is denoted by (v1 , v2 ), which is the ordinary inner product in H if v1 , v2 ∈ H. For l ∈ V ∗ we denote (l, v) by the value l(v) of l at v ∈ V . The norm of l as element of V ∗ is given by |(l, v)| ||l||∗ = sup . v∈V ||v|| Therefore, we assume that V has a stronger topology than H and, for brevity, we may regard that ||u||∗ ≤ |u| ≤ ||u||, ∀u ∈ V. (2.1) Let a(·, ·) be a bounded sesquilinear form defined in V × V and satisfying G˚ arding’s inequality Re a(u, u) ≥ ω1 ||u||2 − ω2 |u|2 , (2.2) where ω1 > 0 and ω2 is a real number. Let A be the operator associated with this sesquilinear form: (Au, v) = a(u, v), u, v ∈ V. Then −A is a bounded linear operator from V to V ∗ by the Lax-Milgram Theorem. The realization of A in H which is the restriction of A to D(A) = {u ∈ V : Au ∈ H} is also denoted by A. From the following inequalities ω1 ||u||2 ≤ Re a(u, u) + ω2 |u|2 ≤ C|Au| |u| + ω2 |u|2 ≤ max{C, ω2 }||u||D(A) |u|,

394

Jin-Mun Jeong ET AL 393-403

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

3 where ||u||D(A) = (|Au|2 + |u|2 )1/2 is the graph norm of D(A), it follows that there exists a constant C0 > 0 such that 1/2

||u|| ≤ C0 ||u||D(A) |u|1/2 .

(2.3)

Thus we have the following sequence D(A) ⊂ V ⊂ H ⊂ V ∗ ⊂ D(A)∗ ,

(2.4)

where each space is dense in the next one which continuous injection. Lemma 2.1. With the notations (2.3), (2.4), we have (V, V ∗ )1/2,2 = H, (D(A), H)1/2,2 = V, where (V, V ∗ )1/2,2 denotes the real interpolation space between V and V ∗ ([5], Section 1.3.3 of [11], ). It is also well known that A generates an analytic semigroup S(t) in both H and V For the sake of simplicity we assume that ω2 = 0 and hence the closed half plane {λ : Re λ ≥ 0} is contained in the resolvent set of A. If X is a Banach space, L2 (0, T ; X) is the collection of all strongly measurable square integrable functions from (0, T ) into X and W 1,2 (0, T ; X) is the set of all absolutely continuous functions on [0, T ] such that their derivative belongs to L2 (0, T ; X). C([0, T ]; X) will denote the set of all continuously functions from [0, T ] into X with the supremum norm. If X and Y are two Banach space, L(X, Y ) is the collection of all bounded linear operators from X into Y , and L(X, X) is simply written as L(X). Let the solution spaces W(T ) and W1 (T ) of strong solutions be defined by ∗.

W(T ) = L2 (0, T ; D(A)) ∩ W 1,2 (0, T ; H), W1 (T ) = L2 (0, T ; V ) ∩ W 1,2 (0, T ; V ∗ ). Here, we note that by using interpolation theory, we have W(T ) ⊂ C([0, T ]; V ),

W1 (T ) ⊂ C([0, T ]; H).

Thus, there exists a constant M0 > 0 such that ||x||C([0,T ];V ) ≤ M0 ||x||W(T ) ,

||x||C([0,T ];H) ≤ M0 ||x||W1 (T ) .

(2.5)

The semigroup generated by −A is denoted by S(t) and there exists a constant M such that |S(t)| ≤ M, ||S(t)||∗ ≤ M. The following Lemma is from Lemma 3.6.2 of [10].

395

Jin-Mun Jeong ET AL 393-403

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4 Lemma 2.2. There exists a constant M > 0 such that the following inequalities hold for all t > 0 and every x ∈ H or V ∗ : |S(t)x| ≤ M t−1/2 ||x||∗ ,

||S(t)x|| ≤ M t−1/2 |x|.

First of all, consider the following linear system ( 0 x (t) + Ax(t) = k(t), x(0) = x0 .

(2.6)

By virtue of Theorem 3.3 of [6](or Theorem 3.1 of [8], [10]), we have the following result on the corresponding linear equation of (2.6). Lemma 2.3. Suppose that the assumptions for the principal operator A stated above are satisfied. Then the following properties hold: 1) For x0 ∈ V = (D(A), H)1/2,2 (see Lemma 2.1) and k ∈ L2 (0, T ; H), T > 0, there exists a unique solution x of (2.6) belonging to W(T ) ⊂ C([0, T ]; V ) and satisfying ||x||W(T ) ≤ C1 (||x0 || + ||k||L2 (0,T ;H) ),

(2.7)

where C1 is a constant depending on T . 2) Let x0 ∈ H and k ∈ L2 (0, T ; V ∗ ), T > 0. Then there exists a unique solution x of (2.6) belonging to W1 (T ) ⊂ C([0, T ]; H) and satisfying ||x||W1 (T ) ≤ C1 (|x0 | + ||k||L2 (0,T ;V ∗ ) ),

(2.8)

where C1 is a constant depending on T .

Lemma 2.4. Suppose that k ∈ L2 (0, T ; H) and x(t) = Then there exists a constant C2 such that

and

Rt 0

S(t − s)k(s)ds for 0 ≤ t ≤ T .

||x||L2 (0,T ;D(A)) ≤ C1 ||k||L2 (0,T ;H) ,

(2.9)

||x||L2 (0,T ;H) ≤ C2 T ||k||L2 (0,T ;H) ,

(2.10)

√ ||x||L2 (0,T ;V ) ≤ C2 T ||k||L2 (0,T ;H) .

(2.11)

Proof. The assertion (2.9) is immediately obtained by (2.7). Since ||x||2L2 (0,T ;H) =

RT Rt RT Rt 2 2 0 | 0 S(t − s)k(s)ds| dt ≤ M 0 ( 0 |k(s)|ds) dt RT Rt 2 RT ≤ M 0 t 0 |k(s)|2 dsdt ≤ M T2 0 |k(s)|2 ds

it follows that ||x||L2 (0,T ;H) ≤ T

p

M/2||k||L2 (0,T ;H) .

396

Jin-Mun Jeong ET AL 393-403

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

5 From (2.3), (2.9), and (2.10) it holds that p ||x||L2 (0,T ;V ) ≤ C0 C1 T (M/2)1/4 ||k||L2 (0,T ;H) . So, if we take a constant C2 > 0 such that p p C2 = max{ M/2, C0 C1 (M/2)1/4 }, the proof is complete.

3

Semilinear differential equations

In this Section, we consider the maximal regularity of the following nonlinear functional differential equation ( R0 0 x (t) + Ax(t) = −h g(t, s, x(t), x(t + s))µ(ds) + k(t), 0 < t ≤ T, (3.1) x(0) = g 0 , x(s) = g 1 (s) s ∈ [−h, 0), where A is the operator mentioned in Section 2. We need to impose the following conditions. Assumption (F). Let L and B be the Lebesgue σ-field on [0, ∞) and the Borel σ-field on [−h, 0], respectively. Let µ be a Borel measure on [−h, 0] and g : [0, ∞)×[−h, 0]×V ×V → H be a nonlinear mapping satisfying the following: (i)

For any x, y ∈ V the mapping g(·, ·, x, y) is strongly L × B-measurable.

(ii) g(t, s, x, y) is locally Lipschitz continuous in x and y, uniformly in (t, s) ∈ [0, ∞) × [−h, 0], i.e., there exist positive constants L0 , L1 (r) and L2 such that |g(t, s, x, y) − g(t, s, x ˆ, yˆ)| ≤ L1 (r)|x − x ˆ| + L2 ||y − yˆ||, for all (t, s) ∈ [0, ∞) × [−h, 0], y, yˆ ∈ V , |x| ≤ r and |ˆ x| ≤ r. (iii)

There exists a real number L0 such that |g(t, s, x, y)| ≤ L0 (1 + |x| + |y|),

|g(t, s, 0, 0)| ≤ L0 ,

for any (t, s) ∈ [0, ∞) × [−h, 0], x ∈ H, and y ∈ V. Remark 3.1. The above operator g is the semilinear case of the nonlinear part of quasilinear equations considered by Yong and Pan [13]. For x ∈ L2 (−h, T ; V ), T > 0 we set Z 0 G(t, x) = g(t, s, x(t), x(t + s))µ(ds).

(3.2)

−h

Here, as in [13] we consider the Borel measurable corrections of x(·). Let U be a Banach space and the controller operator B be a bounded linear operator from the Banach space L2 (0, T ; U ) to L2 (0, T ; H).

397

Jin-Mun Jeong ET AL 393-403

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6 Lemma 3.1. Let x ∈ L2 (−h, T ; V ), T > 0 and ||x||C([0,T ],H) ≤ r. Then the nonlinear term G(·, x) defined by (3.2) belongs to L2 (0, T ; H) and  √ kG(·, x)kL2 (0,T ;H) ≤ µ([−h, 0]) L0 T +(L1 (r)+L2 )kxkL2 (0,T ;V ) +L2 kg 1 kL2 (−h,0;V ) (3.3) Moreover, if x1 , x2 ∈ L2 (−h, T ; V ), then kG(·, x1 ) − G(·, x2 )kL2 (0,T ;H) ≤ µ([−h, 0])  × (L1 (r) + L2 )kx1 − x2 kL2 (0,T ;V ) + L2 kx1 − x2 kL2 (−h,0;V ) (3.4) Proof. From (ii) of Assumption (F), it is easily seen that  √ kG(·, x)kL2 (0,T ;H) ≤ µ([−h, 0]) L0 T + L1 (r)kxkL2 (0,T,V ) + kxkL2 (−h,T,V )  √ ≤ µ([−h, 0]) L0 T + (L1 (r) + L2 )kxkL2 (0,T,V ) + L2 kxkL2 (−h,0;v) . The proof of (3.4) is similar. From now on, we establish the following results on the local solvability of (3.1) represented by ( 0 x (t) + Ax(t) = G(t, x) + k(t), t ∈ (0, T ] x(0) = g 0 , x(s) = g 1 (s), s ∈ [−h, 0].

Theorem 3.1. Let Assumption (F) be satisfied. Assume that (g 0 , g 1 ) ∈ H × L2 (−h, 0; V ), k ∈ L2 (0, T ; V ∗ ). Then, there exists a time T0 ∈ (0, T ) such that the equation (3.1) admits a solution x ∈ L2 (−h, T0 ; V ) ∩ W 1,2 (0, T0 ; V ∗ ) ⊂ C([0, T0 ]; H). (3.5) Proof. For a solution of (3.1) in the wider sense, we are going to find a solution of the following integral equation Z t 0 x(t) = S(t)g + S(t − s){G(s, x) + k(s)}ds. (3.6) 0

To prove a local solution, we will use the successive iteration method. First, put Z t x0 (t) = S(t)g 0 + S(t − s)k(s)ds 0

and define xj+1 (t) as Z

t

S(t − s)G(·, xj )ds.

xj+1 (t) = x0 (t) +

(3.7)

0

By virtue of Lemma 2.3, we have x0 (·) ∈ W1 (t), so that ||x0 ||W1 (t) ≤ C1 (|x0 | + ||k||L2 (0,t;V ∗ ) ),

398

Jin-Mun Jeong ET AL 393-403

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

7 where C1 is a constant in Lemma 2.3. Choose r > C1 M0−1 (|x0 | + ||k||L2 (0,t;V ∗ ) ), where M0 Rt is the constant of (2.5). Putting p(t) = 0 S(t − s)G(·, x0 )ds, by (2.11) of Lemma 2.4, we have √ ||p||L2 (0,t;V ) ≤ C2 t||G(·, x0 )||L2 (0,t;H) √ √ ≤ C2 t µ([−h, 0])L0 t + (L1 (r) + L2 )kxkL2 (0,T ;V ) + L2 kg 1 kL2 (−h,0;V )  √ = C2 µ([−h, 0])L0 t + C2 µ([−h, 0]) (L1 (r) + L2 )kxkL2 (0,T ;V ) + L2 kg 1 kL2 (−h,0;V ) t. (3.8) So that, from(3.5) and (3.6), ||x1 ||L2 (0,t;V )

√ ≤ r + C2 µ([−h, 0])t + C2 µ([−h, 0]){(L1 (r) + L2 )kxkL2 (0,T ;V ) + L2 kg 1 kL2 (−h,0;V ) } t

≤ 3r for any m = min{r(C2 µ([−h, 0]))−1 ,  r{(C2 µ([−h, 0])) (L1 (r) + L2 )kxkL2 (0,T ;v) + kg 1 kL2 (−h,0;V ) }−2 }, 0 ≤ t ≤ m. By induction, it can be shown that for all j = 1, 2, ... ||xj ||L2 (0,t;V ) ≤ 3r,

0 ≤ t ≤ m.

(3.9)

Hence, from the equation Z

t

xj+1 (t) − xj (t) =

S(t − s){G(t, xj ) − G(t, xj−1 )}ds 0

From (2.11), (3.7) and Assumption (F), we can observe that the inequality √ ||xj+1 − xj ||L2 (0,t;V ) ≤ C2 t||G(·, xj ) − G(·, xj−1 )||L2 (0,t;H) √ j  C2 µ([−h, 0])(L1 (3r) + L2 ) t ≤ ||x1 − x0 ||L2 (0,t;V ) j! holds for any 0 ≤ t ≤ m. Choose T0 > 0 satisfying T0 < min{m , {C2 µ([−h, 0])(L1 (3r) + L2 )}−2 }.

(3.10)

Then {xj } is strongly convergent to a function x in L2 (0, T0 ; V ) uniformly on 0 ≤ t ≤ T0 . By letting j → ∞ in (3.7), we obtain (3.6). Next, we prove the uniqueness of the solution. Let  > 0 be given. For  ≤ t ≤ T0 , set Z t−  0 x (t) = S(t)g + S(t − s){G(s, x ) + k(s)}ds. (3.11) 0

399

Jin-Mun Jeong ET AL 393-403

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8 Then we have x ∈ W1 (T0 ) and for x , y  ∈ Br (T0 ) which is a ball with radius r in L2 (0, T0 ; V ), since Z t S(t − s){G(s, x) − G(s, x )}ds x(t) − x (t) = 0 Z t S(t − s){G(s, x ) + k(s)}ds, + t−

with aid of Lemma 2.4, p ||x − x ||L2 (0,T0 ;V ) ≤ C2 µ([−h, 0])(L1 (r) + L2 ) T0 ||x − x ||L2 (0,T0 ;V ) √ √ √ + C2 µ([−h, 0]){(L0 T 0 + (L1 + L2 )||x||L2 (0,T0 ;V ) + T 0 ||k||L2 (0,T0 ;H) }. we have x → x as  → 0 in L2 (0, T0 ; V ). Suppose y is another solution of (3.1) and y is defined as (3.11) with the initial data (g 0 , g 1 ). Let x , y  ∈ Br . Then From Lemma 2.2, it follows that Z Z s−  T0 1/2 ||x − y  ||L2 (0,T0 ;V ) ≤ || S(s − τ ){(G(·, x ) − G(·, y  ))}dτ ||2 ds 0 0 Z Z s−  T0 2 1/2 ≤M (s − τ )−1/2 |G(·, x ) − G(·, y  )|dτ ds 0 0 Z s− Z Z 1/2  T0 s− −1 (s − τ ) dτ ||x (τ ) − y  (τ )||2 dτ ds ≤ M µ([−h, 0])L1 (r) 0 0 0 Z T0 T0 ≤ M µ([−h, 0])L1 (r) log ||x − y  ||L2 (0,s;V ) ds,  0 so that by using Gronwall’s inequality, independently of , we get x = y  in L2 (0, T0 ; V ), which proves the uniqueness of solution of (3.1) in W1 (T0 ). From now on, we give a norm estimation of the solution of (3.3) and establish the global existence of solutions with the aid of norm estimations. Theorem 3.2. Under the Assumption (F) for the nonlinear mapping G, there exists a unique solution x of (3.1) such that x ∈ W1 (T ) ⊂ C([0, T ]; H).

(3.12)

for any (g 0 , g 1 ) ∈ H × L2 (0, T ; V ), k ∈ L2 (0, T ; V ∗ ). Moreover, there exists a constant C3 such that ||x||W1 ≤ C3 (|x0 | + ||k||L2 (0,T ;V ∗ ) ), (3.13) where C3 is a constant depending on T . Proof. Let y ∈ Br be the solution of the following linear functional differential equation parabolic type; ( 0 y (t) + Ay(t) = k(t), t ∈ (0, T1 ]. y(0) = g 0 .

400

Jin-Mun Jeong ET AL 393-403

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

9 Let the constant T1 satisfy (3.10) and the following inequality: T1 1 C0 C1 ( √ ) 2 µ([−h, 0])(L1 (r) + L2 ) < 1. 2

(3.14)

Then we have (

d(x − y)(t)/dt + A((x − y)(t)) = G(t, x), (x − y)(0) = 0.

t ∈ (0, T1 ].

Hence, in view of (F) and Lemmas 2.3 and 3.1, ||x − y||L2 (0,T1 ;D(A))∩W 1,2 (0,T1 ;H) ≤ C1 ||G(·, x)||L2 (0,T1 ;H)  p ≤ C1 µ([−h, 0]) L0 T1 + (L1 (r) + L2 )kxkL2 (0,T1 ;V ) + L2 kg 1 kL2 (−h,0;V )  ≤ C1 µ([−h, 0])(L1 (r) + L2 ) ||x − y||L2 (0,T1 :V ) + ||y||L2 (0,T1 ;V ) p  + C1 µ([−h, 0]) L0 T1 + L2 kg 1 kL2 (−h,0;V ) . Thus, by the above inequality and arguing and (2.3), 1

1

||x − y||L2 (0,T1 ;V ) ≤ C0 ||x − y||L2 2 (0,T1 ;D(A)) ||x − y||L2 2 (0,T1 ;H) 1 1 T1 ≤ C0 ||x − y||L2 2 (0,T1 ;D(A)) { √ ||x − y||W 1,2 (0,T1 ;H) } 2 2 T1 1 ≤ C0 ( √ ) 2 ||x − y||L2 (0,T1 ;D(A))∩W 1,2 (0,T1 ;H) 2 T1 1  ≤ C0 ( √ ) 2 C1 µ([−h, 0])(L1 (r) + L2 )||y||L2 (0,T1 ;V ) 2 p  + C1 µ([−h, 0]) L0 T1 + L2 kg 1 kL2 (−h,0;V ) T1 1 + C0 C1 ( √ ) 2 µ([−h, 0])(L1 (r) + L2 )||x − y||L2 (0,T1 :V ) . 2

Therefore, since 1

||x − y||L2 (0,T1 ;V ) ≤

T1 2 ) µ([−h, 0])(L1 (r) + L2 ) C0 C1 ( √ 2

||y||L2 (0,T1 ;V ) T1 12 1 − C0 C1 ( √ ) µ([−h, 0])(L (r) + L ) 1 2 2  √ 1 T C0 C1 ( √12 ) 2 µ([−h, 0]) L0 T1 + L2 kg 1 kL2 (−h,0;V ) + , T1 12 1 − C0 C1 ( √ ) µ([−h, 0])(L (r) + L ) 1 2 2

we have ||x||L2 (0,T1 ;V ) ≤

1

||y||L2 (0,T1 ;V ) T1 12 1 − C0 C1 ( √ ) µ([−h, 0])(L (r) + L ) 1 2 2  √ 1 T 1 C0 C1 ( √2 ) 2 µ([−h, 0]) L0 T1 + L2 kg 1 kL2 (−h,0;V ) , T1 12 1 − C0 C1 ( √ ) µ([−h, 0])(L (r) + L ) 1 2 2

401

Jin-Mun Jeong ET AL 393-403

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10 and hence, with the aid of (2.8) in Lemma 2.3 and Lemma 3.1, we obtain ||x||L2 (0,T1 ;V )∩W 1,2 (0,T1 ;V ∗ )

(3.15)

0

≤C1 (|g | + ||G(·, x)||L2 (0,T1 ;V ∗ ) + ||k||L2 (0,T1 :V ∗ ) )   p ≤C1 |g 0 | + µ([−h, 0]) L0 T1 + (L1 (r) + L2 )kxkL2 (0,T1 ;V ) + L2 kg 1 kL2 (−h,0;V )  + ||k||L2 (0,T1 :V ∗ ) ≤C3 (|g 0 | + ||k||L2 (0,T1 :V ∗ ) ). for some constant C3 . Now from (2.5) and (3.15), it follows that |x(T1 )| ≤ ||x||C([0,T1 ];H) ≤ M0 C3 (|g 0 | + ||k||L2 (0,T1 ;V ∗ ) ).

(3.16)

So, we can solve the equation in [T1 , 2T1 ] with the initial data (x(T1 ), xT1 ), and obtain an analogous estimate to (3.15). Since the condition (3.14) is independent of initial values, the solution of (3.1) can be extended the internal [0, nT1 ] for a natural number n, i.e., for the initial u(nT1 ) in the interval [nT1 , (n + 1)T1 ], as analogous estimate (3.15) holds for the solution in [0, (n + 1)T1 ]. By the similar way to Theorems 3.1 and 3.2, we also obtain the following results for (3.1) under Assumption (F) corresponding to 1) of Lemma 2.3. Corollary 3.1. Let (g 0 , g 1 ) ∈ V ×L2 (−h, 0; D(A)) and k ∈ L2 (0, T ; H). Then there exists a unique solution x of (3.1) such that x ∈ L2 (0, T ; D(A)) ∩ W 1,2 (0, T ; H) ⊂ C([0, T ]; V ). Moreover, there exists a constant C3 such that ||x||L2 (0,T ;D(A)∩W 1,2 (0,T ;H) ≤ C3 (||g 0 || + ||k||L2 (0,T ;H) ), where C3 is a constant depending on T .

References [1] N. U. Ahmed and X. Xiang, Existence of solutions for a class of nonlinear evolution equations with nonmonotone perturbations, Nonlinear Analysis, T. M. A. 22(1) (1994), 81-89. [2] J. P. Aubin,Un th`eor´eme de compacit´e, C. R. Acad. Sci. 256(1963), 5042-5044. [3] V. Barbu, Nonlinear Semigroups and Differential Equations in Banach space, Nordhoff Leiden, Netherlands, 1976 [4] H. Br´ezis, Op´erateurs Maximaux Monotones et Semigroupes de Contractions dans un Espace de Hilbert, North Holland, 1973.

402

Jin-Mun Jeong ET AL 393-403

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

11 [5] P. L. Butzer and H. Berens, Semi-Groups of Operators and Approximation, Springerverlag, Belin-Heidelberg-NewYork, 1967. [6] G. Di Blasio, K. Kunisch and E. Sinestrari, L2 −regularity for parabolic partial integrodifferential equations with delay in the highest-order derivatives, J. Math. Anal. Appl. 102 (1984), 38–57. [7] N. Hirano, Nonlinear evolution equations with nonmonotonic perturbations, Nonlinear Analysis, T. M. A. 13(6) (1989), 599-609. [8] J. M. Jeong, Y. C. Kwun and J. Y. Park, Approximate controllability for semilinear retarded functional differential equations, J. Dynamics and Control Systems 5(3) 1999, 329-346. [9] K. Naito, Controllability of semilinear control systems dominated by the linear part, SIAM J. Control Optim. 25 (1987), 715-722. [10] H. Tanabe, Equations of Evolution, Pitman-London, 1979. [11] H. Triebel, Interpolation Theory, Function Spaces, Differential Operators, NorthHolland, 1978. [12] I. I. Vrabie, An existence result for a class of nonlinear evolution equations in Banach spaces, Nonlinear Analysis, T. M. A. 7 (1982), 711-722. [13] J. Yong and L. Pan, Quasi-linear parabolic partial differential equations with delays in the highest order spartial derivatives, J. Austral. Math. Soc. 54 (1993), 174-203.

403

Jin-Mun Jeong ET AL 393-403

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Investigation of α-C-class functions with applications Aftab Hussaina , Arslan Hojat Ansarib , Sumit Chandokc , Dong Yun Shind∗ and Choonkil Parke∗ Abstract: In this paper, we introduce the new idea of α-C-class function and establish new fixed point results in a complete metric space. It can be stated that the results that have come into being give substantial generalizations and improvements of several well known results in the existing comparable literature.

1

Introduction and preliminaries

In 1973, Geraghty [7] studied a generalization of Banach contraction principle. In 2012, Samet et al. [20] introduced a concept of α-ψ-contractive type mappings and established various fixed point theorems for mappings in complete metric spaces. The notion of an α-admissible mapping has been characterized in many direction. For details, see [2, 4, 8, 9, 10, 11, 12, 14, 16, 17, 18, 21, 22, 23] and references therein. Now, we give some basic definitions, examples and fundamental results which play an essential role in proving our results. Definition 1 [20] Let S : X → X be a self mapping and let α : X × X → [0, ∞) be a function. We say that S is α-admissible if x, y ∈ X with α(x, y) ≥ 1 ⇒ α(Sx, Sy) ≥ 1. Example 2 [15] Consider X = [0, ∞) and define S : X → X and α : X × X → [0, ∞) by Sx = 2x and ( y ex , x ≥ y, x 6= 0, α (x, y) = 0, x < y. Then S is α-admissible. Definition 3 [1] Let S, T : X → X be self mappings and let α : X × X → [0, +∞) be a function. We say that the pair (S, T ) is α-admissible if x, y ∈ X such that α(x, y) ≥ 1, then we have α(Sx, T y) ≥ 1 and α(T x, Sy) ≥ 1. Example 4 Let X = [0, ∞) and define a pair of self mappings S, T : X → X and α : X × X → [0, ∞) by Sx = 2x, T x = x2 and ( exy , x, y ≥ 0, α (x, y) = 0, otherwise. Then a pair (S, T ) is α-admissible. Definition 5 [13] Let S : X → X be a self mapping and let α : X × X → [0, +∞) be a function. We say that S is triangular α-admissible if x, y ∈ X with α(x, z) ≥ 1 and α(z, y) ≥ 1 ⇒ α(x, y) ≥ 1. Example 6 [13] Let X = [0, ∞), Sx = x2 + ex and ( 1, x, y ∈ [0, 1], α (x, y) = 0, otherwise. Hence S is a triangular α-admissible mapping. 0 *Corresponding

authors. fixed point; contraction type mapping; α-C-class function; metric space. 0 Mathematics Subject Classification 2010: Primary 46S40; 47H10; 54H25.

0 Keywords:

404

Aftab Hussain ET AL 404-414

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Definition 7 [13] Let S : X → X be a self mapping and let α : X × X → R be a function. We say that S is a triangular α-admissible mapping if (T1) α(x, y) ≥ 1 implies α(Sx, Sy) ≥ 1, x, y ∈ X; (T2) α(x, z) ≥ 1 and α(z, y) ≥ 1 imply α(x, y) ≥ 1, x, y, z ∈ X. √ Example 8 [13] Let X = R, Sx = 3 x and α(x, y) = ex−y . Then S is a triangular α-admissible mapping. Indeed, if α(x, y) = ex−y ≥ 1, then x ≥ y which implies Sx ≥ Sy. That is, α(Sx, Sy) = eSx−Sy ≥ 1. Also, if α(x, z) ≥ 1 and α(z, y) ≥ 1, then x − z ≥ 0, z − y ≥ 0. That is, x − y ≥ 0 and so α(x, y) = ex−y ≥ 1. Definition 9 [1] Let S, T : X → X be self mappings and let α : X × X → R be a function. We say that a pair (S, T ) is triangular α-admissible if (T1) α(x, y) ≥ 1 implies α(Sx, T y) ≥ 1 and α(T x, Sy) ≥ 1, x, y ∈ X; (T2) α(x, z) ≥ 1 and α(z, y) ≥ 1 imply α(x, y) ≥ 1, x, y, z ∈ X. Example 10 Let X = R and define a pair of self mappings S, T : X → X and α : X × X → R by Sx = T x = x2 and α(x, y) = exy for all x, y ∈ X. Then a pair (S, T ) is a triangular α-admissible mapping.

√ x,

Definition 11 [19] Let S : X → X be a self mapping and let α, η : X × X → [0, +∞) be two functions. We say that S is an α-admissible mapping with respect to η if x, y ∈ X with α(x, y) ≥ η(x, y) ⇒ α(Sx, Sy) ≥ η(Sx, Sy). Note that if we take η(x, y) = 1, then this definition reduces to the definition in [20]. Also if we take α(x, y) = 1, then we say that S is an η-subadmissible mapping. Example 12 Let X = [0, ∞) and S : X → X be defined by Sx = x2 . Define α, η : X × X → [0, +∞) by α(x, y) = 3 and η(x, y) = 1 for all x, y ∈ X. Then S is an α-admissible mapping with respect to η. Lemma 13 [6] Let S : X → X be a triangular α-admissible mapping. Assume that there exists x0 ∈ X such that α(x0 , Sx0 ) ≥ 1. Define a sequence {xn } by xn+1 = Sxn . Then we have α(xn , xm ) ≥ 1 for all m, n ∈ N ∪ {0} with n < m. Lemma 14 Let S, T : X → X be a pair of triangular α-admissible. Assume that there exists x0 ∈ X such that α(x0 , Sx0 ) ≥ 1. Define a sequence x2i+1 = Sx2i , and x2i+2 = T x2i+1 , where i = 0, 1, 2, · · ·. Then we have α(xn , xm ) ≥ 1 for all m, n ∈ N ∪ {0} with n < m. We denote by Ω the family of all functions β : [0, +∞) → [0, 1) such that, for any bounded sequence {tn } of positive reals, β(tn ) → 1 implies tn → 0. Theorem 15 [7] Let (X, d) be a metric space. Let S : X → X be a self mapping. Suppose that there exists β ∈ Ω such that, for all x, y ∈ X, d(Sx, Sy) ≤ β (d(x, y)) d(x, y). Then S has a fixed unique point p ∈ X and {S n x} converges to p for each x ∈ X. In 2014, Ansari [3] introduced the concept of C-class functions which cover a large class of contractive conditions. Definition 16 [3] A continuous function f : [0, ∞)2 → R is called a C-class function if for all s, t ∈ [0, ∞), the following conditions hold: (1) f (s, t) ≤ s; (2) f (s, t) = s implies that either s = 0 or t = 0.

405

Aftab Hussain ET AL 404-414

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

An extra condition on f that f (0, 0) = 0 could be imposed in some cases if required. The letter C will denote the class of all C-class functions. Example 17 [3] The following examples show that the class C is nonempty: 1. f (s, t) = s − t. 2. f (s, t) = ms for some m ∈ (0, 1). 3. f (s, t) =

s (1+t)r

for some r ∈ (0, ∞).

4. f (s, t) = log(t + as )/(1 + t) for some a > 1. 5. f (s, t) = ln(1 + as )/2 for e > a > 1. Indeed, f (s, t) = s implies that s = 0. r

6. f (s, t) = (s + l)(1/(1+t) ) − l, l > 1 for r ∈ (0, ∞). 7. f (s, t) = s logt+a a for a > 1. t 8. f (s, t) = s − ( 1+s 2+s )( 1+t ).

9. f (s, t) = sβ(t), where β : [0, ∞) → [0, 1) is continuous. 10. f (s, t) = s −

t k+t .

11. f (s, t) = s − ϕ(s), where ϕ : [0, ∞) → [0, ∞) is a continuous function such that ϕ(t) = 0 if and only if t = 0. 12. f (s, t) = sh(s, t), where h : [0, ∞) × [0, ∞) → [0, ∞) is a continuous function such that h(t, s) < 1 for all t, s > 0. 2+t )t. 13. f (s, t) = s − ( 1+t p 14. f (s, t) = n ln(1 + sn ).

15. f (s, t) = φ(s), where φ : [0, ∞) → [0, ∞) is a upper semicontinuous function such that φ(0) = 0 and φ(t) < t for t > 0. 16. f (s, t) =

s (1+s)r ,

r ∈ (0, ∞).

Let Φu denote the class of functions ϕ : [0, ∞) → [0, ∞) which satisfy the following conditions: (a) ϕ is continuous; (b) ϕ(t) > 0, t > 0 and ϕ(0) ≥ 0. Lemma 18 [5] Suppose (X, d) is a metric space. Let {xn } be a sequence in X such that d(xn , xn+1 ) → 0 as n → ∞. If {xn } is not a Cauchy sequence, then there exist an ε > 0 and sequences of positive integers {m(k)} and {n(k)} with m(k) > n(k) > k such that d(xm(k) , xn(k) ) ≥ ε, d(xm(k)−1 , xn(k) ) < ε and (i) limk→∞ d(xm(k)−1 , xn(k)+1 ) = ε; (ii) limk→∞ d(xm(k) , xn(k) ) = ε; (iii) limk→∞ d(xm(k)−1 , xn(k) ) = ε. We can also show that limk→∞ d(xm(k)+1 , xn(k)+1 ) = ε and limk→∞ d(xm(k) , xn(k)−1 ) = ε.

406

Aftab Hussain ET AL 404-414

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

Main results

In this section, we prove some fixed point theorems satisfying α-Geraghty contraction type mappings in a complete metric space. Let (X, d) be a metric space and α : X × X → R be a function. Two self mappings S, T : X → X are called a pair of generalized α-Geraghty contraction type mappings if there exists β ∈ Ω such that, for all x, y ∈ X, α(x, y)d(Sx, T y) ≤ β (M (x, y)) M (x, y), where

  d(y, Sx) + d(x, T y) M (x, y) = max d(x, y), d(x, Sx), d(y, T y), . 2

If S = T , then T is called a generalized α-Geraghty contraction type mapping if there exists β ∈ Ω such that, for all x, y ∈ X, α(x, y)d(Sx, T y) ≤ β (N (x, y)) N (x, y), where

  d(x, T y) + d(y, T x) . N (x, y) = max d(x, y), d(x, T x), d(y, T y), 2

Let (X, d) be a metric space and let α : X × X → R be a function. Two self mappings S, T : X → X are called a pair of generalized α-C-class function contraction type mappings if there exists F ∈C such that, for all x, y ∈ X, α(x, y)d(Sx, T y) ≤ F (M (x, y), ϕ(M (x, y))), (1) where

  d(y, Sx) + d(x, T y) M (x, y) = max d(x, y), d(x, Sx), d(y, T y), . 2

If S = T , then T is called a generalized α-C-class function contraction type mapping if there exists F ∈C such that, for all x, y ∈ X, α(x, y)d(T x, T y)) ≤ F (N (x, y), ϕ(N (x, y))), where

  d(x, T y) + d(y, T x) N (x, y) = max d(x, y), d(x, T x), d(y, T y), . 2

Theorem 19 Let (X, d) be a complete metric space and let α : X × X → R be a function. Let S, T : X → X be two self mappings. Suppose that the following hold: (i) (S, T ) is a pair of generalized α-C-class function contraction type mappings; (ii) (S, T ) is triangular α-admissible; (iii) there exists x0 ∈ X such that α(x0 , Sx0 ) ≥ 1; (iv) S and T are continuous. Then (S, T ) has a common fixed point. Proof. Let x1 ∈ X be such that x1 = Sx0 and x2 = T x1 . Continuing this process, we construct a sequence xn of points in X such that x2i+1 = Sx2i and x2i+2 = T x2i+1 , where i = 0, 1, 2, · · · . By assumption, α(x0 , x1 ) ≥ 1 and a pair (S, T ) is α-admissible. By Lemma 14, we have α(xn , xn+1 ) ≥ 1 f or all n ∈ N ∪ {0}.

407

Aftab Hussain ET AL 404-414

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Then we have d(x2i+1 , x2i+2 )

= d(Sx2i , T x2i+1 ) ≤ α(x2i , x2i+1 )d(Sx2i , T x2i+1 ) ≤ F (M (x2i , x2i+1 ), ϕ(M (x2i , x2i+1 )))≤M (x2i , x2i+1 )

for all i ∈ N ∪ {0}. Now M (x2i , x2i+1 )

  d(x2i , T x2i+1 ) + (x2i+1 , Sx2i ) max d(x2i , x2i+1 ), d(x2i , Sx2i ), d(x2i+1 , T x2i+1 ), 2   d(x2i , x2i+2 ) = max d(x2i , x2i+1 ), d(x2i , x2i+1 ), d(x2i+1 , x2i+2 ), 2   d(x2i , x2i+1 ) + d(x2i+1 , x2i+2 ) ≤ max d(x2i , x2i+1 ), d(x2i+1 , x2i+2 ), 2 = max {d(x2i , x2i+1 ), d(x2i+1 , x2i+2 )} . =

Thus d(x2i+1 , x2i+2 ) ≤ F (M (x2i , x2i+1 ), ϕ(M (x2i , x2i+1 ))) ≤ F (d(x2i , x2i+1 ), ϕ(d(x2i , x2i+1 ))) ≤ d(x2i , x2i+1 ),

(2)

which implies that d(xn+1 , xn+2 ) ≤ d(xn , xn+1 ) ∪ {0} for all n ∈ N. So the sequence {d(xn , xn+1 )} is nonnegative and nonincreasing. Now, we prove that d(xn , xn+1 ) → 0. It is clear that {d(xn , xn+1 )} is a decreasing sequence. Therefore, there exists some positive number r such that limn→∞ d(xn , xn+1 ) = r. From (2), by taking limit n → ∞, we have r ≤ F (r, ϕ(r)), that is, r = 0 or

ϕ(r) = 0.

Therefore, we have lim d(xn , xn+1 ) = 0.

n→∞

(3)

Now, we show that the sequence {xn } is a Cauchy sequence. Suppose on contrary that {xn } is not a Cauchy sequence. Then there exist  > 0 and sequences {xmk } and {xnk } such that, for all positive integers k, we have mk > nk > k such that d(xmk , xnk ) ≥  and d(xmk , xnk−1 ) < . By the triangle inequality, we have  ≤ d(xmk , xnk ) ≤ d(xmk , xnk−1 ) + d(xnk−1 , xnk )
0. Letting k → ∞ in the above inequality, we have d(p, T p) ≤ F (d(p, T p), ϕ(d(p, T p))) and so we obtain that d(p, T p) = 0, which is a contradiction. Thus we find that d(p, T p) = 0 implies p = T p. Similarly, p = Sp. Thus n p = T p = Sp. o If M (x, y) = max d(x, y), d(x, Sx), d(y, Sy), d(y,Sx)+d(x,Sy) and S = T in Theorems 19 and 20, then 2 we have the following corollaries. Corollary 21 Let (X, d) be a complete metric space and let S be an α-admissible mapping such that the following hold: (i) S is a generalized α-Geraghty contraction type mapping; (ii) S is triangular α-admissible; (iii) there exists x0 ∈ X such that α(x0 , T0 ) ≥ 1; (iv) S is continuous. Then S has a fixed point p ∈ X, and S is a Picard operator, that is, {S n x0 } converges to p. Corollary 22 Let (X, d) be a complete metric space and let S be an α-admissible mapping such that the following hold: (i) S is a generalized α-Geraghty contraction type mapping; (ii) S is triangular α-admissible; (iii) there exists x0 ∈ X such that α(x0 , Sx0 ) ≥ 1; (iv) if {xn } is a sequence in X such that α(xn , xn+1 ) ≥ 1 for all n ∈ N ∪ {0} and xn → p ∈ X as n → +∞, then there exists a subsequence {xnk } of {xn } such that α(xnk , p) ≥ 1 for all k. Then S has a fixed point p ∈ X, and S is a Picard operator, that is, {S n x0 } converges to p. If M (x, y) = max {d(x, y), d(x, Sx), d(y, Sy)} and S = T in Theorems 19 and 20, then we obtain the following corollaries. Corollary 23 [6] Let (X, d) be a complete metric space and let α : X ×X → R be a function. Let S : X → X be a mapping. Suppose that the following hold: (i) S is a generalized α-Geraghty contraction type mapping; (ii) S is triangular α-admissible; (iii) there exists x0 ∈ X such that α(x0 , Sx0 ) ≥ 1; (iv) S is continuous. Then S has a fixed point p ∈ X, and S is a Picard operator, that is, {S n x0 } converges to p. Corollary 24 [6] Let (X, d) be a complete metric space and let α : X ×X → R be a function. Let S : X → X be a mapping. Suppose that the following hold: (i) S is a generalized α-Geraghty contraction type mapping; (ii) S is triangular α-admissible; (iii) there exists x0 ∈ X such that α(x0 , Sx0 ) ≥ 1; (iv) if {xn } is a sequence in X such that α(xn , xn+1 ) ≥ 1 for all n ∈ N ∪ {0} and xn → p ∈ X as n → +∞, then there exists a subsequence {xnk } of {xn } such that α(xnk , p) ≥ 1 for all k. Then S has a fixed point p ∈ X, and S is a Picard operator, that is, {S n x0 } converges to p. Let (X, d) be a metric space and α, η : X × X → R be two functions. Two self mappings S, T : X → X are called a pair of generalized α-η-Geraghty contraction type mappings if there exists β ∈ Ω such that, for all x, y ∈ X, α(x, y) ≥ η(x, y) ⇒ d(Sx, T y) ≤ β (M (x, y)) M (x, y),

410

Aftab Hussain ET AL 404-414

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

where

  d(y, Sx) + d(x, T y) M (x, y) = max d(x, y), d(x, Sx), d(y, T y), . 2

Let (X, d) be a metric space and α, η : X × X → R be two functions. Two self mappings S, T : X → X are called a pair of generalized α-η-C-class function contraction type mappings if there exists F ∈ C such that, for all x, y ∈ X, α(x, y) ≥ η(x, y) ⇒ d(Sx, T y) ≤ F (M (x, y), ϕ(M (x, y)), where

  d(y, Sx) + d(x, T y) . M (x, y) = max d(x, y), d(x, Sx), d(y, T y), 2

Theorem 25 Let (X, d) be a complete metric space. Let S be an α-admissible mapping with respect to η such that the following hold: (i) (S, T ) is a pair of generalized α-η-C-class function contraction type mappings; (ii) (S, T ) is triangular α-admissible; (iii) there exists x0 ∈ X such that α(x0 , Sx0 ) ≥ η(x0 , Sx0 ); (iv) S and T are continuous. Then (S, T ) has a common fixed point. Proof. Let x1 in X be such that x1 = Sx0 and x2 = T x1 . Continuing this process, we construct a sequence xn of points in X such that x2i+1 = Sx2i , and x2i+2 = T x2i+1 , wherei = 0, 1, 2, . . . . By assumption α(x0 , x1 ) ≥ η(x0 , x1 ) and a pair (S, T ) is α-admissible with respect to η, we have, α(Sx0 , T x1 ) ≥ η(Sx0 , T x1 ) from which we deduce that α(x1 , x2 ) ≥ η(x1 , x2 ) which also implies that α(T x1 , Sx2 ) ≥ η(T x1 , Sx2 ). Continuing in this way we obtain α(xn , xn+1 ) ≥ η(xn , xn+1 ) for all n ∈ N ∪ {0}. d(x2i+1 , x2i+2 )

= d(Sx2i , T x2i+1 ) ≤ α(x2i , x2i+1 )d(Sx2i , T x2i+1 ) ≤ F (M (x2i , x2i+1 ), ϕ(M (x2i , x2i+1 ))

for all i ∈ N ∪ {0}. Now M (x2i , x2i+1 )

= = ≤ =

  d(x2i , T x2i+1 ) + (x2i+1 , Sx2i ) max d(x2i , x2i+1 ), d(x2i , Sx2i ), d(x2i+1 , T x2i+1 ), 2   d(x2i , x2i+2 ) max d(x2i , x2i+1 ), d(x2i , x2i+1 ), d(x2i+1 , x2i+2 ), 2   d(x2i , x2i+1 ) + d(x2i+1 , x2i+2 ) max d(x2i , x2i+1 ), d(x2i+1 , x2i+2 ), 2 max {d(x2i , x2i+1 ), d(x2i+1 , x2i+2 )} .

Therefore, we have d(x2i+1 , x2i+2 ) ≤ F (M (x2i , x2i+1 ), ϕ(M (x2i , x2i+1 )) ≤ F (d(x2i , x2i+1 ), ϕ(d(x2i , x2i+1 )) ≤ d(x2i , x2i+1 ). This implies that d(xn+1 , xn+2 ) ≤ d(xn , xn+1 ), f oralln ∈ N ∪ {0}. The rest of the proof follows from similar lines of Theorem 19. Hence p is a common fixed point of S and T.

411

Aftab Hussain ET AL 404-414

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Theorem 26 Let (X, d) be a complete metric space and let (S, T ) be a pair of α-admissible mappings with respect to η such that the following hold: (i) (S, T ) is a pair of generalized α-C-class function contraction type mappings; (ii) (S, T ) is triangular α-admissible; (iii) there exists x0 ∈ X such that α(x0 , Sx0 ) ≥ η(x0 , Sx0 ); (iv) if {xn } is a sequence in X such that α(xn , xn+1 ) ≥ η(xn , xn+1 ) for all n ∈ N ∪ {0} and xn → p ∈ X as n → +∞, then there exists a subsequence {xnk } of {xn } such that α(xnk , p) ≥ η(xnk , p) for all k. Then S and T have a common fixed point. Proof. The proof follows o n from similar lines of Theorem 20. and S = T in Theorems 25 and 26, then If M (x, y) = max d(x, y), d(x, Sx), d(y, Sy), d(y,Sx)+d(x,Sy) 2 we get the following corollaries. Corollary 27 Let (X, d) be a complete metric space and let S be an α-admissible mapping with respect to η such that the following hold: (i) S is a generalized α-Geraghty contraction type mapping; (ii) S is triangular α-admissible; (iii) there exists x0 ∈ X such that α(x0 , Sx0 ) ≥ η(x0 , Sx0 ); (iv) S is continuous. Then S has a fixed point p ∈ X, and S is a Picard operator, that is, {S n x0 } converges to p. Corollary 28 Let (X, d) be a complete metric space and let S be an α-admissible mapping with respect to η such that the following hold: (i) S is a generalized α-Geraghty contraction type mapping; (ii) S is triangular α-admissible; (iii) there exists x0 ∈ X such that α(x0 , Sx0 ) ≥ η(x0 , Sx0 ); (iv) if {xn } is a sequence in X such that α(xn , xn+1 ) ≥ η(xn , xn+1 ) for all n ∈ N ∪ {0} and xn → p ∈ X as n → +∞, then there exists a subsequence {xnk } of {xn } such that α(xnk , p) ≥ η(xnk , p) for all k. Then S has a fixed point p ∈ X and S is a Picard operator, that is, {S n x0 } converges to p. Example 29 Let X = {a, b, c} with metric   0 if     5 if 7 d(x, y) =  1 if     4 if 7 ( α (x, y) =

1 0

x=y x, y ∈ X − {b} x, y ∈ X − {c} x, y ∈ X − {a}. if x, y ∈ X . otherwise

Define a mapping T : X → X as follows: ( T (x) =

a if x 6= b c if x = b

and β : [0, +∞) → [0, 1). Then α(x, y)d(T x, T y)  β(M (x, y))M (x, y).

412

Aftab Hussain ET AL 404-414

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Indeed, let x = b and y = c. Then   d(b, T (c)) + d(c, T (b)) M (b, c) = max d(b, c), d(b, T (b)), d(c, T (c)), 2   4 4 5 1 5 = max , , , = . 7 7 7 2 7 [6, Theorem 2.1] is not valid to get a fixed point of T , since α(b, c)d (T (b), T (c))  β(M (b, c))M (b, c). Now, we prove that Theorem 19 can be applied to a common fixed point of S and T. Now, consider a mapping S : X → X be such that Sx = a for each x ∈ X, where   d(b, T (c)) + d(c, S(b)) M (b, c) = max d(b, c), d(b, S(b)), d(c, T (c)), 2   5 12 4 , 1, , = max = 1, 7 7 14 d(Sb, T c) = d(a, a) = 0, α(x, y)d(Sx, T y) ≤ F (M (x, y)), ϕ (M (x, y)) ≤ M (x, y). Hence the hypothesis of Theorem 19 is satisfied, So S and T have a common fixed point.

References [1] T. Abdeljawad, Meir-Keeler α-contractive fixed and common fixed point theorems, Fixed Point Theory Appl. 2013, 2013:19. [2] M.U. Ali, T. Kamran and Q. Kiran, Fixed point theorem for (α,ψ,φ)-contractive mappings on spaces with two metrics, J. Adv. Math. Stud. 7 (2) (2014), 8–11. [3] A.H. Ansari, Note on “ϕ-ψ-contractive type mappings and related fixed point,” The 2nd Regional Conference onMathematics And Applications, Payame Noor University, 2014, pp.377–380. [4] M. Arshad, Fahimuddin, A. Shoaib and A. Hussain, Fixed point results for α-ψ-locally graphic contraction in dislocated qusai metric spaces, Math Sci. 8 (3) (2014), 79–85. [5] G.V.R. Babu and P.D. Sailaja, A fixed point theorem of generalized weakly contractive maps in orbitally complete metric spaces,Thai J. Math. 9 (1) (2011), 1–10. [6] S. Cho, J. Bae and E. Karapinar, Fixed point theorems for α-Geraghty contraction type maps in metric spaces, Fixed Point Theory Appl. 2013, 2013:329. [7] M. Geraghty, On contractive mappings, Proc. Amer. Math. Soc. 40 (1973), 604–608. [8] R. H. Haghi, S. Rezapour and N. Shahzad, Some fixed point generalizations are not real generalizations, Nonlinear Anal. 74 (2011), 1799–1803. [9] N. Hussain, M. Arshad, A. Shoaib and Fahimuddin, Common fixed point results for α-ψ-contractions on a metric space endowed with graph, J. Inequal. Appl. 2014, 2014:136.

413

Aftab Hussain ET AL 404-414

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[10] N. Hussain, E. Karapınar, P. Salimi and F. Akbar, α-admissible mappings and related fixed point theorems, J. Inequal. Appl. 2013, 2013:114. [11] N. Hussain, E. Karapınar, P. Salimim and P. Vetro, Fixed point results for Gm -Meir-Keeler contractive and G-(α, ψ)-Meir-Keeler contractive mappings, Fixed Point Theory Appl. 2013, 2013:34. [12] N. Hussain, P. Salimi and A. Latif, Fixed point results for single and set-valued α-η-ψ-contractive mappings, Fixed Point Theory Appl. 2013, 2013:212. [13] E. Karapınar, P. Kumam and P. Salimi, On α-ψ-Meir-Keeler contractive mappings, Fixed Point Theory Appl. 2013, 2013:94. [14] E. Karapınar and B. Samet, Generalized (α, ψ) contractive type mappings and related fixed point theorems with applications, Abstr. Appl. Anal. 2012 (2012), Article ID 793486. [15] M. A. Kutbi, M. Arshad and A. Hussain, On modified α-η-contractive mappings, Abstr. Appl. Anal. 2014 (2014), Article ID 657858. [16] M.A. Miandaragh, M. Postolache and S. Rezapour, Some approximate fixed point results for generalized (α, ψ)-contractive mappings, U. Politeh. Buch. Ser. A 75 (2) (2013), 3–10. [17] B. Mohammadi and S. Rezapour, On modified α-φ-contractions, J. Adv. Math. Stud. 6 (2) (2013), 162–166. [18] S. Rezapour and M E. Samei, Some fixed point results for α-ψ-contractive type mappings on intuitionistic fuzzy metric spaces, J. Adv. Math. Stud. 7 (1) (2014), 176–181. [19] P. Salimi, A. Latif and N. Hussain, Modified α-ψ-contractive mappings with applications, Fixed Point Theory Appl. 2013, 2013:151. [20] B. Samet, C. Vetro and P. Vetro, Fixed point theorems for α-ψ-contractive type mappings, Nonlinear Anal. 75 (2012), 2154–2165. [21] A. Shoaib, α-η dominated mappings and related common fixed point results in closed ball, J. Concrete Appl. Math. 13 (2015), 152–170. [22] A. Shoaib, M. Arshad, M. A. Kutbi, Common fixed points of a pair of Hardy Rogers type mappings on a closed ball in ordered partial metric spaces, J. Comput. Anal. Appl. 17 (2014), 255–264. [23] T. Sistani and M. Kazemipour, Fixed point theorems for α-ψ-contractions on metric spaces with a graph, J. Adv. Math. Stud. 7 (1) (2014), 65–79. (a)

Department of Basic Sciences & Humanities, Khawaja Fareed University of Engineering & Information Technology, Rahim yar Khan - 64200, Pakistan; Department of Mathematics, International Islamic University, H-10, Islamabad - 44000, Pakistan E-mail: [email protected]; [email protected] (b) Department of Mathematics, Karaj Branch, Islamic Azad University, Karaj, Iran E-mail: [email protected], [email protected]. (c) School of Mathematics, Thapar University, Patiala 147-004, Punjab, India E-mail: [email protected] (d) Department of Mathematics, University of Seoul, Seoul 02504, Republic of Korea E-mail: [email protected] (e) Research Institute for Natural Sciences, Hanyang University, Seoul 04763, Republic of Korea E-mail: [email protected]

414

Aftab Hussain ET AL 404-414

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Generalizations of Hua’s inequality in Hilbert C*-modules F. G. Gao∗, G. Q. Hong† College of Mathematics and Information Science Henan Normal University, Xinxiang 453007, China April 8, 2017

Abstract We establish a new extended Hua’s inequality in the setting of Hilbert C*-modules. As for its application, we get several generalizations of norm Hua’s inequality and more generalized inequalities of the Hua inequality type.

Keywords: Hilbert C*-module, Hua’s inequality, C*-algebra, norm inequality. AMS 2010 Mathematics Subject Classification: 26D07, 46L08, 47A63

1

Introduction and Preliminaries

The classical Hua’s inequality states that for any α, δ > 0 and real numbers x1 , x2 , · · · , xn , (δ − x1 − · · · − xn )2 + α(x21 + · · · + x2n ) ≥

α δ2 , n+α

(1)

δ and the equality holds iff x1 = x2 = · · · = xn = n+α . This inequality has been generalized by Wang [14] as follows. If α, δ > 0 and p ≥ 1, then

(δ − x1 − · · · − xn )p + αp−1 (xp1 + · · · + xpn ) ≥ (

α p−1 p ) δ n+α

(2)

for all non-negative numbers x1 , x2 , · · · , xn with x1 + · · · + xn ≤ δ. A number of researchers discussed the above inequality from different angles [1, 2, 6–15]. In [8], the Hua’s inequality for real convex function was given. Dragomir and ∗ The research is supported by the National Natural Science Foundation of China (11301155), (11271112), IRTSTHN (14IRTSTHN023) and the Natural Science Foundation of the Department of Education, Henan Province (16A110003). † Corresponding author e-mail address: [email protected]

1

415

F. G. Gao ET AL 415-420

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Yang [1] have proved Hua’s inequality in the framework of real inner product spaces. Their result was generalized by Peˇcari´c [9]. Drnovˇsek [2] give an operator version of Hua’s inequality for positive conjugate exponents p, q ∈ R. We also ˇ c [10] of this type. In particular, infer to another interesting Radas and Siki´ Moslehian [6] extended an operator Hua’s inequality in Hilbert C*-modules, which is equivalent to operator convexity of given continuous real function. In recent years, Su, Miao and Li [11] generalize a new Hua’s inequality and apply it to proof the boundedness of composition operator. Moslehian and Fujii [7] have shown another type of Hua’s operator inequality. There are other interpretation of Hua’s inequality [13] and references therein. In this paper, we establish an extended Hua’s inequality in the setting of Hilbert C*-modules. As for its application, we get several generalizations of norm Hua’s inequality and more generalized inequalities of the Hua inequality type. For this purpose, we first set up some notations. Throughout the paper, we assume that X and Y are Hilbert A-modules. The notations B(X , Y) denote the space of all bounded linear operators from X to Y. Let g : [0, ∞) → (0, ∞) be a function such that g(t) ≥ t + M for some M > 0. Recall that an element a ∈ A is positive if a is selfadjoint with a positive real spectrum or a is the form of u∗ u for some u ∈ A. We write a ≥ 0 if a is positive. For more information on the theory of C*-algebra and Hilbert C*-module the reader is referred to [5] and [4], respectively.

2

Hua type inequality in Hilbert C*-modules

Before prove the main results, we need following auxiliary result. Lemma 1. [12] Let (G, +) be a semigroup, and let ϕ and ψ be nonnegative functions on G. Suppose ϕ is subadditive on G and there is a positive constant λ such that ϕ(x) ≤ λψ(x) for x ∈ G. If f is a nondecreasing convex function on [0, ∞), then f (ϕ(a)) + λf (ψ(b)) ≥ (1 + λ)f (

ϕ(a + b) ) 1+λ

(3)

holds for any a, b ∈ G. When f is strictly convex, the equality holds in (3) iff ϕ(a + b) = ϕ(a) + ϕ(b), ϕ(b) = λψ(b), ϕ(a) = ψ(b). We now state our main result, which is an extended Hua’s inequality in the setting of Hilbert C*-modules. Theorem 1. Let p, q > 1 be conjugate components. Then 1

kδ − x(g(c) − c) 2 kp + kckp−1 kxkp ≥ (

kck p−1 kδkp q ) kck + k(g(c) − c)k 2

(4)

2

416

F. G. Gao ET AL 415-420

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

for all x, δ ∈ X and all positive c ∈ A. The equality holds iff q−1

kδkkg(c) − ck 2 . kx(g(c) − c) k = kxkkg(c) − ck , kxk = q kg(c) − ck 2 + kck 1 2

1 2

Proof. By the functional calculus, g(c) − c is positive and invertible. Put G = 1 X . Let’s define ϕ : X → C by ϕ(x) = kx(g(c) − c) 2 k and ψ : X → C by 1−q 1 ψ(x) = kckkg(c) − ck 2 kxk for any x ∈ X . So ϕ(x) = kx(g(c) − c) 2 k ≤ q 2

. Moreover, putting f (t) = tp (t ≥ 0), clear λψ(x)(x ∈ X ), where λ = kg(c)−ck kck f is nondecreasing and convex on [0, ∞). Hence, Lemma 1 yields that 1 kck p−1 k(a + b)(g(c) − c) 2 kp q ) kck + k(g(c) − c)k 2 ] (5) holds for a, b ∈ X . The equality holds iff 1

ka(f (c) − c) 2 kp + kckp−1 kbkp ≥ (

1

1

1

k(a + b)(g(c) − c) 2 k = ka(g(c) − c) 2 k + kb(g(c) − c) 2 k, 1

(6)

1

kb(g(c) − c) 2 k = kbkkg(c) − ck 2 , 1

ka(g(c) − c) 2 k = kckkbkkg(c) − ck

(7)

1−q 2

.

(8)

1 2

By choosing z ∈ X such that z(g(c) − c) = δ and replacing a and b by z − x and x, therefore we can get (4). The equality holds in (4) iff 1

1

kδk = kδ − x(g(c) − c) 2 k + kx(g(c) − c) 2 k, 1

(9)

1

kx(g(c) − c) 2 k = kxkkg(c) − ck 2 , 1

kδ − x(g(c) − c) 2 k = kckkxkkg(c) − ck Observe that an easy computation shown that kxk =

(10) 1−q 2

.

(11)

q−1 kδkkg(c)−ck 2 q kg(c)−ck 2 +kck

from above

three equations. Consequently, we have q−1

1

1

kx(g(c) − c) 2 k = kxkkg(c) − ck 2 , kxk =

kδkkg(c) − ck 2 . q kg(c) − ck 2 + kck

(12)

The simple computation shows that (12) implies (9), (10) and (11). Now this observation completes the proof. Example 1. Let H and K be Hilbert spaces, then B(H, K) becomes a B(H)module via hT, Si = T ∗ S. Replacing x, δ in (4) by T, S and taking p=2 we get 1

1

k(S − T (g(c) − c) 2 )∗ (S − T (g(c) − c) 2 )k + ckT ∗ T k ≥

c kS ∗ Sk g(c)

for all c > 0 and all T, S ∈ B(H, K). The equality holds iff kT k =

kSk g(c) .

3

417

F. G. Gao ET AL 415-420

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

If X is a Hilbert space H, which is a Hilbert C-module, then we have the following corollary. Corollary 1. Let p, q > 1 be conjugate components. Then 1

kδ − (g(c) − c) 2 xkp + cp−1 kxkp ≥ (

c p−1 kδkp q ) c + (g(c) − c) 2

(13)

for any c > 0, x, δ ∈ H. We also have the following extension of Hua’s inequality in the framework of Hilbert C*-module. Theorem 2. Let p, q > 1 be conjugate components. Then 1

kδ −T (x)(g(c)−c) 2 kp +kckp−1 kT kp kxkp ≥ (

kck p−1 kδkp (14) q ) kck + k(g(c) − c)k 2

for all x ∈ X , δ ∈ Y, all positive c ∈ A, and all operators T ∈ B(X , Y). Proof. Substituting T (x) for x in (4) we get 1

kδ − T (x)(g(c) − c) 2 kp + kckp−1 kT xkp ≥ (

kck p−1 kδkp q ) kck + k(g(c) − c)k 2

utilizing the facts that kT (x)k ≤ kT kkxk we obtain 1

kδ − T (x)(g(c) − c) 2 kp + kckp−1 kT kp kxkp ≥ (

kck p−1 kδkp . q ) kck + k(g(c) − c)k 2

N Recall that the operator T = u v is defined by T (x) = uhv, xi(u, v, x ∈ X ) and noting the fact that kT k = kukkvk we get the following corollary. Corollary 2. Let p, q > 1 be conjugate components. Then 1

kδ −uhv, xi(g(c)−c) 2 kp +kckp−1 kukp kvkp kxkp ≥ (

kck p−1 kδkp q ) kck + k(g(c) − c)k 2 (15)

for all x, δ, u, v ∈ X and all positive c ∈ A. p

When X and Y are normed spaces, let A ∈ B(X , Y), g(t) = t+1, c = kAk 1−p , δ = y, the Theorem 2 reduces to Theorem 2 of [2]. Corollary 3. Let p, q > 1 with p1 + 1q = 1. Let X and Y be normed spaces, and let A be a bounded operator from X to Y. If x ∈ X and y ∈ Y, then ky − A(x)kp + kxkp ≥

kykp . (1 + kAkq )p−1

4

418

F. G. Gao ET AL 415-420

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1

If we set p = q=2 and take δ = y(g(c)−c)− 2 in Theorem 2 then the following corollary is obtained. Corollary 4. Let p, q > 1 be conjugate components. Then 1

1

1

ky(g(c) − c)− 2 − T (x)(g(c) − c) 2 k2 + kckkT k2 kxk2 ≥

kckky(g(c) − c)− 2 k2 kck + k(g(c) − c)k

for all x ∈ X , y ∈ Y, all positive c ∈ A and all operators T ∈ B(X , Y). Next consider inner spaces H and K, then A = C. Let A ∈ B(H, K), α g(t) = t + 1 and c = kAk 2 , then we deduce the main result of [10] from Corollary 4 as follows. Corollary 5. Suppose that H and K are inner product spaces, A: H → K is a bounded linear operator and α > 0. Then ky − Axk2 + αkxk2 ≥

αkyk2 kAk2 + α

(16)

for all x ∈ H and y ∈ K. Remark 1. Applying Corollary 5 for elements of the n-fold inner product space Hn , then inequality 16 can be restated as the following form which is, as noted in [6], a generalization of the main theorem of [1]. ky −

n X i=1

wi xi k2 + α

n X 2 αkyk2 (|wi |2 kxi k ) ≥ Pn , 2 i=1 |wi | + α i=1

Pn Pn where wi ∈ C(1 ≤ i ≤ n), A(x1 , · · · , xn ) = i=1 wi xi and kAk2 = i=1 |wi |2 . The special case, where H = C and wi = 1(1 ≤ i ≤ n), give rise to the classical Hua’s inequality.

References [1] S. S. Dragomir and G. S. Yang, On Hua’s inequality in real inner product spaces, Tamkang J. Math., 27(1996), 227-232. [2] R. Drnovsek, An Operator Generalization of the Lo-Keng Hua Inequality, J. Math. Anal. Appl., 196(1995), 1135-1138. [3] L. K. Hua, Additive theory of prime numbers, Amer. Math. Soc., 1965. [4] E. C. Lance, Hilbert C ∗ -modules: a toolkit for operator algebraists, London Mathematical Society Lecture Note Series 210, Cambridge University Press, 1995. [5] G. J. Murphy, C ∗ -Algebras and Operator Theory, Academic Press, 1990.

5

419

F. G. Gao ET AL 415-420

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[6] M. S. Moslehian, Operator extensions of Hua’s inequality, Linear Algebra Appl., 430(2009), 1131-1139. [7] S. S. Moslehian and J. I. Fujii, Operator inequalities related to weak 2positivity, J. Math. Inequal., 7(2012), 175-182. [8] C. E. M. Pearce and J. E. Pe˘cari´c, A Remark on the Lo-Keng Hua Inequality, J. Math. Anal. Appl., 188(1994), 700-702. [9] J. Pe˘cari´c, On Hua’s inequality in real inner product spaces, Tamkang J. Math., 33(2002), 265-268. ˘ c, A note on the generalization of Hua’s inequality, [10] S. Radas and T. Siki´ Tamkang J. Math., 28(1997), 321-323. [11] J. Su, X. N. Miao and H. A. Li, Generalization of Hua’s inequalities and an application, J. Math. Inequal., 9(2015), 27-45. [12] H. Takagi, T. Miura, T. Kanzo and S. E. Takahasi, A reconsideration of Hua’s inequality, J. Inequal. Appl., (2005), 15-23. [13] H. Takagi, T. Miura, T. Kanzo and S. E. Takahasi, A reconsideration of Hua’s inequality. II, J. Inequal. Appl. Art. ID 21540. 8 pp (2006). [14] C. L. Wang,Lo-Keng Hua inequality and dynamic programming, J. Math. Anal. Appl., 166(1992), 345-350. [15] G. S. Yang and B. K. Han, A note on Hua’s inequality for complex number, Tamkang J. Math., 27(1996), 99-102.

6

420

F. G. Gao ET AL 415-420

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FOURIER SERIES OF FUNCTIONS RELATED TO HIGHER-ORDER GENOCCHI POLYNOMIALS TAEKYUN KIM1 , DAE SAN KIM2 , GWAN-WOO JANG3 , AND JONGKYUM KWON4,∗

Abstract. In this paper, we consider three types of functions related to higher-order Genocchi functions and derive their Fourier series expansions. In addition, we express each of them in terms of Bernoulli functions.

1. Introduction

(r)

The Genocchi polynomials Gn (x) of order r (r ∈ Z>0 ) are defined by the generating function ( )r ∞ ∑ 2t tm xt e = G(r) , (see [2-5,8,16,17,20,22]). (1.1) m (x) t e +1 m! m=0 (r)

(r)

When x = 0, Gm = Gm (0) are called the Genocchi numbers of order r. For (1) (1) r = 1, Gm (x) = Gm (x), and Gm = Gm are called the Genocchi polynomials and Genocchi numbers, respectively. (r)

(r)

Clearly, Gm (x) = 0, for 0 ≤ m ≤ r − 1, and Gr (x) = r!. Thus we will assume (r) (r) (r) m! that m ≥ r + 1 ≥ 2. Also, as Gm (x) = (m−r)! Em−r (x), (m ≥ r), deg Gm (x) = (r)

m − r, (m ≥ r) , and Gm = From (1.1), we see that

(r) m! (m−r)! Em−r .

d (r) (r) G (x) = mGm−1 (x), (m ≥ 0), dx m (r−1) (r) G(r) m (x + 1) = 2mGm−1 (x) − Gm (x), (m ≥ 0).

(1.2)

In turn, these imply that (r−1)

(r) G(r) m (1) = 2mGm−1 − Gm , (m ≥ 0), ∫ 1 ) 2 ( (r) (m + 1)G(r−1) − Gm+1 , (m ≥ 0). G(r) m m (x)dx = m+1 0

(1.3)

2010 Mathematics Subject Classification. 11B68, 11B83, 42A16. Key words and phrases. Fourier series, Bernoulli functions, higher-order Genocchi polynomials. ∗ corresponding author. 1

421

T. KIM ET AL 421-437

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

Fourier series of functions involving higher-order Genocchi polynomials

We also recall from [14] that, for 0 ̸= n ∈ Z, ∫

1

−2πinx G(r) dx m (x)e

0

=−

m−1 ∑ k=1

(1.4)

) 2(m)k−1 ( (r−1) (r) (m − k + 1)Gm−k − Gm−k+1 . k (2πin)

For any real number x, we let < x >= x − ⌊x⌋ ∈ [0, 1),

(1.5)

denote the fractional part of x. The Bernoulli polynomials Bm (x) are defined by the generating function ∞ ∑ t tm xt e = Bm (x) . t e −1 m! m=0

(1.6)

We are going to use the following facts about Bernoulli functions Bm (< x >) later: (a) for m ≥ 2, Bm (< x >) = −m!

∞ ∑ n=−∞,n̸=0

e2πinx , (2πin)m

(1.7)

(b) for m = 1,



∞ ∑ n=−∞,n̸=0

e2πinx = 2πin

{

B1 (< x >), 0,

for x ∈ / Z, for x ∈ Z.

(1.8)

Here we will consider the following three types of functions αm (< x >), βm (< x >), and γm (< x >) involving higher-order Genocchi polynomials. We will derive their Fourier series expansions and in addition express them in terms of Bernoulli functions. ∑m (r) (1) αm (< x >) = k=r Gk (< x >) < x >m−k , (m ≥ r + 1); ∑m (r) 1 (2) βm (< x >) = k=r k!(m−k)! Gk (< x >) < x >m−k , (m ≥ r + 1); ∑m−1 (r) 1 (3) γm (< x >) = k=r k(m−k) Gk (< x >) < x >m−k , (m ≥ r + 1). The reader may refer to any book for elementary facts about Fourier analysis (for example, see [1,18,23]). As to γm (< x >), we note that the polynomial identity (1.9) follows immediately from Theorems 4.1 and 4.2, which is in turn derived from the Fourier series expansion of γm (< x >).

422

T. KIM ET AL 421-437

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G.-W. Jang, J. Kwon

3

m−1 ∑

1 (r) G (x)xm−k k(m − k) k k=r m−r ( ) 1 ∑ m { 1 (r) (r−1) G = 2(Gm−s − ) m s=0 s m − s + 1 m−s+1 } × (Hm−1 − Hm−s ) + Λm−s+1 Bs (x) m−1 ∑ (m) (r−1) 1 2 (r) (Hm−1 − Hr−1 ) (Gm−s − Gm−s+1 )Bs (x), + m s m − s + 1 s=m−r+1

(1.9)

( ∑m ∑l−1 (r−1) 1 2kGk−1 − where Hm = j=1 1j are the harmonic numbers and Λl = k=r k(l−k) ) (r) Gk . The obvious polynomial identities can be derived also for αm (< x >) and βm (< x >) from Theorems 2.1 and 2.2, and Theorems 3.1 and 3.2, respectively. ∑m−1 It 1is remarkable that from the Fourier series expansion of the function k=1 k(m−k) Bk (⟨x⟩)Bm−k (⟨x⟩) we can derive the Faber-Pandharipande-Zagier identity (see [7,12,13]) and the Miki’s identity (see [6,9,12,13,19,21]). Recent works on Fourier series expansions for analogous functions can be found in the papers [10,11,15]. From now on, we will assume that r ≥ 2.

2. The function αm (< x >) Let αm (x) = function

∑m k=r

(r)

Gk (x)xm−k , (m ≥ r + 1). Then we will consider the m ∑

αm (< x >) =

(r)

Gk (< x >) < x >m−k ,

(2.1)

k=r

defined on R, which is periodic with period 1. The Fourier series of αm (< x >) is ∞ ∑

2πinx A(m) , n e

(2.2)

n=−∞

where ∫ A(m) n

1

=

αm (< x >)e−2πinx dx

0

∫ =

(2.3)

1

αm (x)e

−2πinx

dx.

0

423

T. KIM ET AL 421-437

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

Fourier series of functions involving higher-order Genocchi polynomials

Before proceeding further, we need to observe the following. m ( ) ∑ (r) (r) ′ αm (x) = kGk−1 (x)xm−k + (m − k)Gk (x)xm−k−1 k=r m ∑

=

(r)

kGk−1 (x)xm−k +

k=r+1

=

m−1 ∑

m−1 ∑

(r)

(m − k)Gk (x)xm−k−1

k=r (r)

(k + 1)Gk (x)xm−1−k +

k=r

m−1 ∑

(2.4)

(r)

(m − k)Gk (x)xm−1−k

k=r

= (m + 1)αm−1 (x). From this, we obtain

and



(

αm+1 (x) m+2

1

αm (x)dx = 0

)′ (2.5)

= αm (x),

1 (αm+1 (1) − αm+1 (0)) . m+2

(2.6)

For m ≥ r + 1, we put ∆m = αm (1) − αm (0) m ( ) ∑ (r) (r) = Gk (1) − Gk δm,k = =

k=r m ( ∑ k=r m ( ∑

(r−1)

(r)

(r−1)

(r)

(r)

2kGk−1 − Gk − Gk δm,k 2kGk−1 − Gk

)

)

(2.7)

− G(r) m .

k=r

Now, we see that αm (1) = αm (0) ⇐⇒ ∆m = 0,

(2.8)

and ∫

1

αm (x)dx = 0

1 ∆m+1 . m+2

(2.9)

(m)

Now, we would like to determine the Fourier coefficients An . Case 1 : n ̸= 0. ∫ 1 A(m) = αm (x)e−2πinx dx n 0

1 1 =− [αm (x)e−2πinx ]10 + 2πin 2πin



1 0

1 m+1 =− (αm (1) − αm (0)) + 2πin 2πin m + 1 (m−1) 1 = A − ∆m , 2πin n 2πin

424

′ αm (x)e−2πinx dx



1

(2.10) αm−1 (x)e−2πinx dx

0

T. KIM ET AL 421-437

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G.-W. Jang, J. Kwon

5

from which by induction on m, we can easily show A(m) =− n

m−r ∑ j=1

(m + 1)j−1 ∆m−j+1 (2πin)j (2.11)

m−r 1 ∑ (m + 2)j ∆m−j+1 . =− m + 2 j=1 (2πin)j

Case 2 : n = 0.



1

1 ∆m+1 . (2.12) m+2 αm (< x >), (m ≥ r +1) is piecewise C ∞ . Moreover, αm (< x >) is continuous for those integers m ≥ r + 1 with ∆m = 0, and discontinuous with jump discontinuities at integers for those integers m ≥ r + 1 with ∆m ̸= 0. (m)

A0

=

αm (x)dx =

0

Assume first that ∆m = 0, for an integer m ≥ r + 1. Then αm (0) = αm (1). Hence αm (< x >) is piecewise C ∞ , and continuous. Thus the Fourier series of αm (< x >) converges uniformly to αm (< x >) , and 

∞ ∑

(m + 2)j ∆m−j+1  e2πinx j (2πin) j=1 n=−∞,n̸=0   ) m−r ( ∞ 2πinx ∑ 1 e 1 ∑ m+2  = ∆m−j+1 −j! ∆m+1 + j m+2 m + 2 j=1 (2πin)j

αm (< x >) =

1 ∆m+1 + m+2

−

1 m+2



m−r ∑

n=−∞,n̸=0

m−r ∑(

) m+2 ∆m−j+1 Bj (< x >) j

1 1 ∆m+1 + m+2 m + 2 j=2 { B1 (< x >), for x ∈ / Z, + ∆m × 0, for x ∈ Z. =

(2.13) Now, we can state our first result. Theorem 2.1. For each integer l ≥ r + 1, we put l ( ) ∑ (r−1) (r) (r) ∆l = 2kGk−1 − Gk − Gl . k=r

Assume that ∆m = 0 , for an integer m ≥ r + 1. Then we have the following. ∑m (r) (a) k=r Gk (< x >) < x >m−k has the Fourier series expansion m ∑

(r)

Gk (< x >) < x >m−k

k=r

1 = ∆m+1 + m+2

∞ ∑ n=−∞,n̸=0



 m−r ∑ (m + 2)j 1 − ∆m−j+1  e2πinx , m + 2 j=1 (2πin)j

425

(2.14)

T. KIM ET AL 421-437

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

Fourier series of functions involving higher-order Genocchi polynomials

for all x ∈ R, where the convergence is uniform. (b)

m ∑

(r) Gk (
) < x >

m−k

k=r

1 = m+2

m−r ∑ j=0,j̸=1

( ) m+2 ∆m−j+1 Bj (< x >), j (2.15)

for all x in R, where Bj (< x >) is the Bernoulli function. Assume next that ∆m ̸= 0, for an integer m ≥ r + 1. Then αm (0) ̸= αm (1). Hence αm (< x >) is piecewise C ∞ , and discontinuous with jump discontinuities at integers. The Fourier series of αm (< x >) converges pointwise to αm (< x >) , for x ∈ / Z, and converges to 1 1 (αm (0) + αm (1)) = αm (0) + ∆m , (2.16) 2 2 for x ∈ Z. We now state our second result. Theorem 2.2. For each integer l ≥ r + 1, we put ∆l =

l ( ∑

(r−1)

(r)

2kGk−1 − Gk

)

(r)

− Gl .

k=r

Assume that ∆m ̸= 0 , for an integer m ≥ r + 1. Then we have the following.   ∞ m−r ∑ ∑ 1 (m + 2)j − 1 (a) ∆m+1 + ∆m−j+1  e2πinx m+2 m + 2 j=1 (2πin)j n=−∞,n̸=0 (2.17) {∑ (r) m m−k G (< x >) < x > , for x ∈ / Z, k=r k = (r) Gm + 12 ∆m , for x ∈ Z. ) m−r ( m ∑ 1 ∑ m+2 (r) (b) ∆m−j+1 Bj (< x >) = Gk (< x >) < x >m−k , f or x ∈ / Z; m + 2 j=0 j k=r

(2.18) 1 m+2

m−r ∑ j=0,j̸=1

( ) m+2 1 ∆m−j+1 Bj (< x >) = G(r) m + ∆m , f or x ∈ Z. j 2

(2.19)

3. The function βm (< x >) Let βm (x) = the function

∑m

(r) 1 m−k , k=r k!(m−k)! Gk (x)x

βm (< x >) =

m ∑ k=r

(m ≥ r + 1). Then we will consider

1 (r) G (< x >) < x >m−k , k!(m − k)! k

defined on R, which is periodic with period 1.

426

T. KIM ET AL 421-437

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G.-W. Jang, J. Kwon

7

The Fourier series of βm (< x >) is ∞ ∑

Bn(m) e2πinx ,

n=−∞

where ∫

1

Bn(m) =

βm (< x >)e−2πinx dx =

0



1

βm (x)e−2πinx dx.

0

To proceed further, we need to observe the following. } m { ∑ k (m − k) (r) (r) ′ m−k m−k−1 G (x)x + G (x)x βm (x) = k!(m − k)! k−1 k!(m − k)! k k=r

=

m ∑ k=r+1

=

m−1 ∑ k=r

m−1 ∑ 1 1 (r) (r) Gk−1 (x)xm−k + G (x)xm−k−1 (k − 1)!(m − k)! k!(m − k − 1)! k k=r

1 (r) G (x)xm−1−k + k!(m − 1 − k)! k

m−1 ∑ k=r

1 (r) G (x)xm−1−k k!(m − 1 − k)! k

= 2βm−1 (x). (3.1) From this, we get

and

(



βm+1 (x) 2

1

βm (x)dx = 0

)′ = βm (x),

) 1( βm+1 (1) − βm+1 (0) . 2

For m ≥ r + 1, we let Ωm = βm (1) − βm (0) = = =

m ∑ k=r m ∑ k=r m ∑ k=r

( (r) ) 1 (r) G (1) − Gk δm,k k!(m − k)! k { } 1 (r−1) (r) (r) 2kGk−1 − Gk − Gk δm,k k!(m − k)!

(3.2)

( ) 1 (r) 1 (r−1) (r) 2kGk−1 − Gk − G . k!(m − k)! m! m

From this, we now see that βm (0) = βm (1) ⇐⇒ Ωm = 0,

(3.3)

and ∫

1

βm (x)dx = 0

427

1 Ωm+1 . 2

(3.4)

T. KIM ET AL 421-437

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

Fourier series of functions involving higher-order Genocchi polynomials (m)

We are now ready to determine the Fourier coefficients Bn . Case 1:n ̸= 0 ∫ 1 Bn(m) = βm (x)e−2πinx dx 0

∫ 1 ]1 1 [ 1 βm (x)e−2πinx + β ′ (x)e−2πinx dx 2πin 2πin 0 m 0 ∫ 1 ) 1 ( 2 =− βm (1) − βm (0) + βm−1 (x)e−2πinx dx 2πin 2πin 0 2 1 = Bn(m−1) − Ωm , 2πin 2πin from which by induction on m we can easily derive =−

Bn(m) = −

m−r ∑ j=1

2j−1 Ωm−j+1 . (2πin)j

Case 2: n = 0 ∫ (m)

B0

1

=

βm (x)dx = 0

1 Ωm+1 . 2

βm (< x >), (m ≥ r+1) is piecewise C ∞ . Moreover, βm (< x >) is continuous for those integers m ≥ r + 1 with Ωm = 0 and discontinuous with jump discontinuities at integers for those integers m ≥ r + 1 with Ωm ̸= 0 . Assume first that Ωm = 0, for an integer m ≥ r+1. Then βm (0) = βm (1). Hence βm (< x >) is piecewise C ∞ , and continuous. Thus the Fourier series of βm (< x >) converges uniformly to βm (< x >), and βm (< x >) 1 = Ωm+1 + 2 1 = Ωm+1 + 2

(

∞ ∑ n=−∞,n̸=0 m−r ∑ j=1 m−r ∑

j−1

2

j!



m−r ∑ j=1

) 2j−1 e2πinx Ω m−j+1 (2πin)j (

Ωm−j+1 −j!

∞ ∑ n=−∞,n̸=0

e2πinx ) (2πin)j

j−1

1 2 Ωm+1 + Ωm−j+1 Bj (< x >) 2 j! j=2 { B1 (< x >), for x ∈ / Z, + Ωm × 0, for x ∈ Z. =

Now, we are going to state our first result. Theorem 3.1. For each positive integer l ≥ r + 1 , we set Ωl =

l ∑ k=r

( ) 1 1 (r−1) (r) (r) 2kGk−1 − Gk − Gl . k!(l − k)! l!

Assume that Ωm = 0, for an integer m ≥ r + 1 . Then we have the following.

428

T. KIM ET AL 421-437

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G.-W. Jang, J. Kwon

(a)

∑m

(r) 1 k=r k!(m−k)! Gk (< m ∑ k=r

9

x >) < x >m−k has the Fourier series expansion

1 (r) G (< x >) < x >m−k k!(m − k)! k

1 = Ωm+1 + 2

∞ ∑ n=−∞,n̸=0

(



m−r ∑ j=1

(3.5)

) 2j−1 Ωm−j+1 e2πinx , j (2πin)

for all x ∈ R, where the convergence is uniform. (b)

m ∑ k=r

1 (r) G (< x >) < x >m−k k!(m − k)! k (3.6)

m−r ∑ 2j−1 1 = Ωm+1 + Ωm−j+1 Bj (< x >), 2 j! j=2

for all x ∈ R, where Bj (< x >) is the Bernoulli function. Assume next that Ωm ̸= 0, for an integers m ≥ r + 1 . Then, βm (0) ̸= βm (1). Hence βm (< x >) is piecewise C ∞ and discontinuous with jump discontinuities at integers. Thus the Fourier series of βm (< x >) converges pointwise to βm (< x >), for x ∈ / Z, and convergence to 1 1 (βm (0) + βm (1)) = βm (0) + Ωm , 2 2 for x ∈ Z. Now, we are going to state our second result. Theorem 3.2. For each positive integer l ≥ r + 1 , we set l ( ) 1 ∑ 1 (r−1) (r) (r) Ωl = 2kGk−1 − Gk − Gl . k!(l − k)! l! k=r

Assume that Ωm ̸= 0, for an integer m ≥ r + 1 . Then we have the following.

(a)

(b)

∞ ( m−r ) ∑ ∑ 2j−1 1 Ωm+1 + − Ωm−j+1 e2πinx j 2 (2πin) j=1 n=−∞,n̸=0 {∑m (r) 1 m−k , for x ∈ / Z, k!(m−k)! Gk (< x >) < x > = 1 k=r (r) 1 for x ∈ Z. m! Gm + 2 Ωm , m−r ∑

2j−1 Ωm−j+1 Bj (< x >) j!

j=0 m ∑

=

k=r m−r ∑

1 (r) G (< x >) < x >m−k , k!(m − k)! k

j=0,j̸=1

=

for x ∈ / Z;

2j−1 Ωm−j+1 Bj (< x >) j!

1 (r) 1 G + Ωm , m! m 2

for x ∈ Z.

429

T. KIM ET AL 421-437

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

Fourier series of functions involving higher-order Genocchi polynomials

4. The function γm (< x >) Let γm (x) = the function

∑m−1

(r) 1 m−k , k=r k(m−k) Gk (x)x

γm (< x >) =

m−1 ∑ k=r

(m ≥ r + 1). Then we will consider

1 (r) G (< x >) < x >m−k , k(m − k) k

defined on R, which is periodic with period 1. The Fourier series of γm (< x >) is ∞ ∑

Cn(m) e2πinx ,

n=−∞

∫1

where = 0 γm (< x >)e−2πinx dx = further, we need to observe the following. (m) Cn

′ γm (x) =

m−1 ∑ k=r+1

=

m−2 ∑ k=r

=

0

γm (x)e−2πinx dx. Before proceeding

m−1 ∑ 1 (r) 1 (r) Gk−1 (x)xm−k + G (x)xm−k−1 m−k k k k=r

1 (r) G (x)xm−1−k + m−1−k k

m−2 ∑( k=r

∫1

m−1 ∑ k=r

1 (r) G (x)xm−1−k k k

1)

1 1 (r) (r) (x) + Gk (x)xm−1−k + G m−1−k k m − 1 m−1

= (m − 1)γm−1 (x) +

1 (r) G (x), m − 1 m−1

from which we see that (

)′ 1 1 (r) (γm+1 (x) − G (x)) = γm (x). m m(m + 1) m+1

(4.1)

This entails that ∫ 1 ) 1( 1 (r) (r) γm (x)dx = γm+1 (1) − γm+1 (0) − (Gm+1 (1) − Gm+1 ) m m(m + 1) 0 ) 1( 2 (r) = γm+1 (1) − γm+1 (0) − ((m + 1)G(r−1) − Gm+1 ) . m m m(m + 1) For m ≥ r + 1, we put Λm = γm (1) − γm (0) =

m−1 ∑ k=r

=

m−1 ∑ k=r

=

m−1 ∑ k=r

( ) 1 (r) (r) Gk (1) − Gk δm,k k(m − k) ( ) 1 (r−1) (r) (r) 2kGk−1 − Gk − Gk δm,k k(m − k) ( ) 1 (r−1) (r) 2kGk−1 − Gk . k(m − k)

430

T. KIM ET AL 421-437

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G.-W. Jang, J. Kwon

11

Note here that γm (0) = γm (1) ⇔ Λm = 0, and ∫

1 0

1 γm (x)dx = m

(

) 2 (r) (r−1) − Gm+1 ) . Λm+1 − ((m + 1)Gm m(m + 1) (m)

We are now ready to determine the Fourier coefficients Cn . Case 1: n ̸= 0 ∫ Cn(m)

1

=

γm (x)e−2πinx dx

0

∫ 1 ]1 1 [ 1 γm (x)e−2πinx + γ ′ (x)e−2πinx dx 2πin 2πin 0 m 0 ) ∫ 1( ) 1 ( 1 1 (r) =− γm (1) − γm (0) + Gm−1 (x) e−2πinx dx (m − 1)γm−1 (x) + 2πin 2πin 0 m−1 ∫ 1 1 1 m − 1 (m−1) (r) C − Λm + G (x)e−2πinx dx = 2πin n 2πin 2πin(m − 1) 0 m−1 1 1 m − 1 (m−1) − Cn Λm − Θm , = 2πin 2πin 2πin(m − 1)

=−

where Θm =

m−2 ∑ k=1

) 2(m − 1)k−1 ( (r−1) (r) (m − k)G − G . m−k−1 m−k (2πin)k

By proceeding induction on m we can show that Cn(m) = −

m−r ∑ j=1

m−r ∑ (m − 1)j−1 (m − 1)j−1 Λ − Θm−j+1 . m−j+1 j (2πin) (2πin)j (m − j) j=1

Here we note that m−r ∑ j=1

=

m−r ∑ j=1

=

m−r ∑ j=1

=

m−r ∑ j=1

(m − 1)j−1 Θm−j+1 (2πin)j (m − j) m−j−1 ) ∑ 2(m − j)k−1 ( (m − 1)j−1 (r−1) (r) (m − j − k + 1)G − G m−j−k m−j−k+1 (2πin)j (m − j) (2πin)k k=1

1 m−j 1 m−j

m−j−1 ∑ k=1

) 2(m − 1)j+k−2 ( (r−1) (r) (m − j − k + 1)Gm−j−k − Gm−j−k+1 j+k (2πin)

) 2(m − 1)s−2 ( (r−1) (r) (m − s + 1)Gm−s − Gm−s+1 s (2πin) s=j+1 m−1 ∑

(4.2)

431

T. KIM ET AL 421-437

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12

Fourier series of functions involving higher-order Genocchi polynomials

=

m−r ∑ s=1

) 2(m − 1)s−2 ( (r−1) (r) (m − s + 1)G − G (Hm−1 − Hm−s ) m−s m−s+1 (2πin)s

) 2(m − 1)s−2 ( (r−1) (r) (m − s + 1)Gm−s − Gm−s+1 (Hm−1 − Hr−1 ) s (2πin) s=m−r+1 (4.3) ( ) m−r 1 ∑ 2(m)s 1 (r−1) (r) Gm−s − G = (Hm−1 − Hm−s ) m s=1 (2πin)s m − s + 1 m−s+1 ( ) m−1 ∑ 1 1 2(m)s (r−1) (r) + Gm−s − G (Hm−1 − Hr−1 ) . m s=m−r+1 (2πin)s m − s + 1 m−s+1 m−1 ∑

+

Also, we note that m−r ∑ j=1

(m − 1)j−1 Λm−j+1 (2πin)j (4.4)

m−r 1 ∑ (m)s Λm−s+1 . = m s=1 (2πin)s

Putting everything altogether, we have: m−r 1 ∑ (m)s ( 1 (r−1) (r) ) 2(Gm−s − G s m s=1 (2πin) m − s + 1 m−s+1 ) × (Hm−1 − Hm−s ) + Λm−s+1 ( ) m−1 ∑ 1 2(m)s 1 (r−1) (r) − G − G (Hm−1 − Hr−1 ) . m−s m s=m−r+1 (2πin)s m − s + 1 m−s+1

Cn(m) = −

(4.5)

Case 2: n = 0 ∫ (m)

C0

=

1

γm (x)dx = 0

1 m

( Λm+1 −

) 2 (r) ((m + 1)G(r−1) − G ) . m m+1 m(m + 1)

γm (< x >), (m ≥ r +1) is piecewise C ∞ . Moreover, γm (< x >) is continuous for those integers m ≥ r + 1 with Λm = 0, and discontinuous with jump discontinuities at integers for those integer m ≥ r + 1 with Λm ̸= 0. Assume first that Λm = 0, for an integer m ≥ r +1. Then γm (0) = γm (1). Hence γm (< x >) is piecewise C ∞ and continuous. Thus the Fourier series of γm (< x >)

432

T. KIM ET AL 421-437

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G.-W. Jang, J. Kwon

13

converges uniformly to γm (< x >), and γm (< x >) ( ) 2 1 (r) = Λm+1 − ((m + 1)G(r−1) − G ) m m+1 m m(m + 1) ∞ { 1 m−r ∑ ∑ (m)s ( 1 (r−1) (r) 2(Gm−s − G + − ) m s=1 (2πin)s m − s + 1 m−s+1 n=−∞,n̸=0 )} × (Hm−1 − Hm−s ) + Λm−s+1 e2πinx ( ) ∞ { 1 m−1 ∑ ∑ 2(m)s 1 (r−1) (r) Gm−s − G + − m s=m−r+1 (2πin)s m − s + 1 m−s+1 n=−∞,n̸=0 } × (Hm−1 − Hr−1 ) e2πinx ( ) 1 2 (r) = Λm+1 − ((m + 1)G(r−1) − G ) m m+1 m m(m + 1) m−r ( ) 1 1 ∑ m { (r−1) (r) 2(Gm−s − ) + G m s=1 s m − s + 1 m−s+1 }( × (Hm−1 − Hm−s ) + Λm−s+1 −s!

∞ ∑ n=−∞,n̸=0

e2πinx ) (2πin)s

( ) 2 1 m (r) (r−1) + (Hm−1 − Hr−1 ) Gm−s+1 ) (Gm−s − m m − s + 1 s s=m−r+1 m−1 ∑

( × −s!

∞ ∑ n=−∞,n̸=0

e2πinx ) (2πin)s

) ( 1 2 (r) = − G ) Λm+1 − ((m + 1)G(r−1) m m+1 m m(m + 1) m−r ( ) 1 ∑ m { 1 (r−1) (r) + 2(Gm−s − G ) m s=2 s m − s + 1 m−s+1 } × (Hm−1 − Hm−s ) + Λm−s+1 Bs (< x >) m−1 ∑ (m) (r−1) 2 1 (r) + (Hm−1 − Hr−1 ) (Gm−s − Gm−s+1 )Bs (< x >) m s m − s + 1 s=m−r+1 { B1 (< x >), for x ∈ / Z, + Λm × 0, for x ∈ Z ( ) m−r 1 ∑ m { 1 (r−1) (r) = 2(Gm−s − G ) m s m − s + 1 m−s+1 s=0,s̸=1 } × (Hm−1 − Hm−s ) + Λm−s+1 Bs (< x >) m−1 ∑ (m) (r−1) 2 1 (r) + (Hm−1 − Hr−1 ) (Gm−s − Gm−s+1 )Bs (< x >) m s m − s + 1 s=m−r+1

433

T. KIM ET AL 421-437

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14

Fourier series of functions involving higher-order Genocchi polynomials

{ B1 (< x >), + Λm × 0,

for x ∈ / Z, for x ∈ Z.

Now, we get the following theorem. Theorem 4.1. For each integer l ≥ r + 1 , we let Λl =

l−1 ∑ k=r

( ) 1 (r−1) (r) 2kGk−1 − Gk . k(l − k)

Assume that Λm = 0, for an integer m ≥ r + 1 . Then we have the following. (a)

∑m−1

(r) 1 k=r k(m−k) Gk (
) < x >m−k has the Fourier series expansion

m−1 ∑

1 (r) G (< x >) < x >m−k k(m − k) k k=r ( ) 1 2 (r) − G ) = Λm+1 − ((m + 1)G(r−1) m m+1 m m(m + 1) ∞ { 1 m−r ∑ ∑ (m)s ( 1 (r−1) (r) + − ) 2(Gm−s − G m s=1 (2πin)s m − s + 1 m−s+1 n=−∞,n̸=0 )} × (Hm−1 − Hm−s ) + Λm−s+1 e2πinx ( ) ∞ { 1 m−1 ∑ ∑ 1 2(m)s (r−1) (r) + − Gm−s − G m s=m−r+1 (2πin)s m − s + 1 m−s+1 n=−∞,n̸=0 } × (Hm−1 − Hr−1 ) e2πinx ,

(4.6)

for all x ∈ R, where the convergence is uniform.

(b)

m−1 ∑

1 (r) G (< x >) < x >m−k k(m − k) k k=r ( ) 1 2 (r) = Λm+1 − ((m + 1)G(r−1) − G ) m m+1 m m(m + 1) ( ) m−r 1 1 ∑ m { (r−1) (r) + 2(Gm−s − G ) m s m − s + 1 m−s+1 s=0,s̸=1 } × (Hm−1 − Hm−s ) + Λm−s+1 Bs (< x >) m−1 ∑ (m) (r−1) 2 1 (r) + (Hm−1 − Hr−1 ) (Gm−s − Gm−s+1 )Bs (< x >), m s m − s + 1 s=m−r+1 (4.7)

for all x ∈ R, where Bs (< x >) is the Bernoulli function. Assume next that Λm ̸= 0, for an integer m ≥ r + 1 . Then γm (0) ̸= γm (1). Hence γm (< x >) is piecewise C ∞ , and discontinuous with jump discontinuities at

434

T. KIM ET AL 421-437

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G.-W. Jang, J. Kwon

15

integers. Thus the Fourier series of γm (< x >) converges pointwise to γm (< x >), for x ∈ / Z, and converges to 1 1 (γm (0) + γm (1)) = γm (0) + Λm , 2 2 for x ∈ Z. Now, we have the following theorem. Theorem 4.2. For each integer l ≥ r + 1 , we let Λl =

l−1 ∑ k=r

( ) 1 (r−1) (r) 2kGk−1 − Gk . k(l − k)

Assume that Λm ̸= 0, for an integer m ≥ r + 1 . Then we have the following. ) ( 1 2 (r) (r−1) − Gm+1 ) (a) Λm+1 − ((m + 1)Gm m m(m + 1) ∞ { 1 m−r ∑ ∑ (m)s ( 1 (r−1) (r) + − 2(Gm−s − G ) m s=1 (2πin)s m − s + 1 m−s+1 n=−∞,n̸=0 )} × (Hm−1 − Hm−s ) + Λm−s+1 e2πinx ( ) ∞ { 1 m−1 ∑ ∑ 1 2(m)s (r−1) (r) + − − G G m−s m s=m−r+1 (2πin)s m − s + 1 m−s+1 n=−∞,n̸=0 } × (Hm−1 − Hr−1 ) e2πinx {∑m−1 (r) 1 G (< x >) < x >m−k , for x ∈ / Z, = 1 k=r k(m−k) k Λ , for x ∈ Z. 2 m (b)

m−r ( ) 1 ∑ m { 1 (r−1) (r) 2(Gm−s − G ) m s=0 s m − s + 1 m−s+1 } × (Hm−1 − Hm−s ) + Λm−s+1 Bs (< x >) m−1 ∑ (m) (r−1) 2 1 (r) + (Hm−1 − Hr−1 ) (Gm−s − Gm−s+1 )Bs (< x >) m s m − s + 1 s=m−r+1 m−1 ∑

1 (r) G (< x >) < x >m−k , for x ∈ / Z; k(m − k) k k=r m−r ( ){ 1 ∑ m 1 (r−1) (r) 2(Gm−s − G ) m s m − s + 1 m−s+1 s=0,s̸=1 } × (Hm−1 − Hm−s ) + Λm−s+1 Bs (< x >) m−1 ∑ (m) (r−1) 2 1 (r) + (Hm−1 − Hr−1 ) (Gm−s − Gm−s+1 )Bs (< x >) m s m − s + 1 s=m−r+1 =

=

1 Λm , for x ∈ Z. 2

435

T. KIM ET AL 421-437

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

16

Fourier series of functions involving higher-order Genocchi polynomials

References [1] M. Abramowitz, and I.A. Stegun, Handbook of Mathematical functions with formulas, Graphs, and Mathematical Tables, Dover publications inc., New York, 1992, Reprint of the 1972 edition. [2] A. Bayad, Special values of Lerch zeta function and their Fourier expansions, Adv. Stud. Contemp. Math. (Kyungshang)21(2011), no. 1, 1–4. [3] G. V. Dunne, C. Schubert, Bernoulli number identities from quantum field theory and topological string theory, Commun. Number Theory Phys., 7(2)(2013), 225–249. [4] C. Faber, R. Pandharipande, Hodge integrals and Gromov-Witten theory, Invent. Math. 139(1)(2000), 173–199. [5] A. Guven, D. M. Israfilov, Approximation by means of Fourier trigonometric series in weighted Orlicz spaces, Adv. Stud. Contemp. Math. (Kyungshang) 19(2009), no. 2, 283– 295. [6] S.Gaboury, R.Tremblay, B.-J. Fugere, Some explicit formulas for certain new classes of Bernoulli, Euler and Genocchi polynomials, Proc. Jangjeon Math. Soc. 17(2014), no. 1, 115–123. [7] Y. He, T. Kim, General convolution identities for Apostol-Bernoulli Euler and Genocchi polynomials, J. Nonlinear Sci. Appl., 9(2016), no.6, 4780-4797. [8] T. Kim, D. S. Kim, Nonlinear differential equations arising from Boole numbers and their applications, Filomat 31(2017), 2441-2448. [9] G.-W. Jang, D. S. Kim, T. Kim, T. Mansour, Fourier series fuctions related Bernoulli polynomials, Adv. Stud. Contemp. Math. (Kyungshang) 27(2017), no.1, 49–62. [10] D. S. Kim, T. Kim, On degenerate Bell numbers and polynomials,Rev. R. Acad. Cienc. Exactas Fs. Nat. Ser. A Math. RACSAM, 111(2017), 435-446. [11] D. S. Kim, T. Kim, Fourier series of higher-order Euler functions and their applications, to appear in Bull. Korean Math. Soc. [12] D.S. Kim, T. Kim, Identities arising from higher-order Daehee polynomial bases, Open Math. 13(2015), 196–208. [13] D.S. Kim, T. Kim, Bernoulli basis and the product of several Bernoulli polynomials, Int. J. Math. Math. Sci. 2012, Art. ID 463659. [14] T. Kim, D. S. Kim, Fourier series of higher-order Genocchi functions and their applications, preprint. [15] T. Kim, D. S. Kim, S. H. Rim, D. V. Dolgy, Fourier series of higher-order Bernoulli functions and their applications, J. Inequal. Appl. 2017 (2017), 2017:8, p.7. [16] T. Kim, D. S. Kim, On λ-Bell polynomials associated with umbral calculus, Russ. J. Math. Phys., 24(2017), 69-78. [17] T. Kim, Euler numbers and polynomials associated with zeta functions, Abstr. Appl. Anal. 2008, Art. ID 581582, 11 pp. [18] T. Kim, On the multiple q-Genocchi and Euler numbers, Russ. J. Math. Phys. 15(2008), 481-486. 297-302. [19] J. E. Marsden, Elementary classical analysis, W. H. Freeman and Company, 1974. [20] S.-H. Rim, S. J. Lee, E. J. Moon, J. H. Jin, On the q-Genocchi numbers and polynomials associated with q-zeta function, Proc. Jangjeon Math. Soc. 12(2009), no. 3, 261–267. [21] K. Shiratani, S. Yokoyama, An application of p-adic convolutions, Mem. Fac. Sci. Kyushu Univ. Ser. A 36(1)(1982), 73–83. [22] H. M. Srivastava, T. Kim, Y. Simsek q-Bernoulli numbers and polynomials associated with multiple q-zeta functions and basic L-series, Russ. J. Math. Phys, 12 (2005), no. 2, 241-268. [23] D. G. Zill, M. R. Cullen, Advanced Engineering Mathematics, Jones and Bartlett Publishers 2006.

436

T. KIM ET AL 421-437

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G.-W. Jang, J. Kwon

17

1 Department of Mathematics, College of Science, Tianjin Polytechnic University, Tianjin 300160, China, Department of Mathematics, Kwangwoon University, Seoul, 139701, Republic of Korea. E-mail address: [email protected] 2

Department of Mathematics, Sogang University, Seoul, 121-742, Republic of Korea. E-mail address: [email protected] 3 Department of Mathematics, Kwangwoon University, Seoul, 139-701, Republic of Korea. E-mail address: [email protected] 4,∗ Department of Mathematics Education and RINS, Gyeongsang National University, Jinju, Gyeongsangnamdo, 52828, Republic of Korea E-mail address: [email protected]

437

T. KIM ET AL 421-437

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Value distribution and uniqueness of certain types of q-difference polynomials ∗ Yunfei Du †, Zongsheng Gao, Minfeng Chen, Ming Zhao LMIB-School of Mathematics and Systems Science, Beihang University, Beijing, 100191, China

Abstract: In this paper, we consider certain types of q-difference polynomials in the complex plane by using the Nevanlinna’s theory. Some results about the value distribution and uniqueness are obtained, which are the counterparts of the properties of the general difference polynomials. Keywords: Value distribution; q-Difference; Share fixed-points. AMS Mathematics Subject Classification(2010): 30D35; 34A20.

1. Introduction and Results Throughout this paper, we assume f (z), g(z) be non-constant meromorphic (or entire) functions in the complex plane and use the basic notations of the Nevanlinna’s theory [1,2,12]. In particular, the order of growth of f (z) is represented by σ(f ) and the exponent of convergence of the zeros of f (z) is represented by λ(f ). In addition, S(r, f ) represents any quantify which satisfies S(r, f ) = o(T (r, f ))( r → ∞), possibly outside a set of finite logarithmic measure. If f (z) − 1 and g(z) − 1 assume the same zeros with the same multiplicities, then we say that f (z) and g(z) share 1 CM. If f (z) − z and g(z) − z assume the same zeros with the same multiplicities, then we say that f (z) and g(z) share z CM, or say that f (z) and g(z) have the same fixed-points[9]. In the past decade, many scholars have focused on complex difference and difference equations and presented many results[3-5] on value distribution theory of meromorphic functions. Meanwhile, q-difference is also becoming an important topic in complex analysis, so the research of it is very meaningful. The aim of this paper is to investigate the value distribution and uniqueness of certain types of q-difference polynomials. We now introduce some related results. Liu and Laine [3] discussed the problem when a difference polynomial assumes a nonzero small function, and showed the following result. Theorem A Let f (z) be a transcendental entire function of finite order, not of period c, where c is a nonzero complex constant, and let s(z) be a nonzero function, small compared ∗

This research was supported by the National Natural Science Foundation of China, under grant No.11171013 and No.11371225. † The corresponding author. Email address: [email protected].

1

438

Yunfei Du ET AL 438-448

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

to f (z). Then the difference polynomial f (z)n + f (z + c) − f (z) − s(z) has infinitely many zeros in the complex plane, provided that n ≥ 3. Chen [4] investigated the value distribution of a certain difference and obtained the following theorem. Theorem B Let f (z) be a transcendental entire function of finite order, and let a, c ∈ C \ {0} be constants, with such that f (z + c) ̸≡ f (z). Set ψn (z) = ∆f (z) − af (z)n , where ∆f (z) = f (z + c) − f (z) and n ≥ 3 is an integer. Then ψn (z) assumes all finite values infinitely often, and for every b ∈ C one has λ(ψn (z) − b) = σ(f ). Laine and Yang [5] analyzed the difference f (z)n f (z + c), and presented the following result. Theorem C Let f (z) be a transcendental entire function of finite order and c be non-zero complex constant. Then for n ≥ 2, f (z)n f (z + c) assumes every non-zero value a ∈ C infinitely often. In this paper, we first prove the analogous results in q-difference type as follows. Theorem 1 Let f (z) be a transcendental meromorphic (entire) function of zero order and let α(z) be a non-zero function, small compared to f (z), q is a non-zero complex constant. Then for n ≥ 6(n ≥ 2), f (z)n f (qz) − α(z) has infinitely many zeros in the complex plane. Corollary 1 Let f (z) be a transcendental meromorphic (entire) function of zero order and q is a non-zero complex constant. Then for n ≥ 6(n ≥ 2), f (z)n f (qz) = 1 has infinitely many solutions in the complex plane. Corollary 2 Let f (z) be a transcendental meromorphic (entire) function of zero order and q is a non-zero complex constant. Then for n ≥ 6(n ≥ 2), the f (z)n f (qz) has infinitely many fixed-points in the complex plane. Theorem 2 Let f (z) be a transcendental entire function of zero order, and let α(z) be a non-zero function, small compared to f (z). q ∈ C \ {0} is a complex constant. Set ψn (z) = f (z)n + ∆q f (z), where ∆q f (z) = f (qz) − f (z) and n ≥ 2 is an integer. Then ψn (z) − α(z) has infinitely zeros in the complex plane and λ(ψn (z) − α(z)) = 0. We now recall the following Theorem D[6]. Theorem D Let f (z) and g(z) be two nonconstant meromorphic(entire) functions, n ≥ 11(n ≥ 6) a positive integer. If f (z)n f (z)′ and g(z)n g(z)′ share z CM, then either f (z) = 2 2 c1 ecz , g(z) = c2 e−cz , where c1 , c2 and c are three constants satisfying 4(c1 c2 )n+1 c2 = −1 or f (z) ≡ tg(z) for a constant such that tn+1 = 1. Naturally, we ask whether there is a corresponding uniqueness theorem in q-difference polynomials. In this paper we give an affirmative answer to this question, and obtain the following results. Theorem 3 Let f (z) and g(z) be two transcendental meromorphic (entire) functions of zero order. Suppose that q is a non-zero complex constant and n is an integer n ≥ 8(n ≥ 4). If f (z)n f (qz) and g(z)n g(qz) share z CM, then f (z) ≡ tg(z) for tn+1 = 1. Theorem 4 Let f (z) and g(z) be two transcendental meromorphic (entire) functions of zero order. Suppose that q is a non-zero complex constant and n is an integer n ≥ 8(n ≥ 4). If f (z)n (f (z) − 1)f (qz) and g(z)n (g(z) − 1)g(qz) share z CM, then f (z) ≡ g(z).

2

439

Yunfei Du ET AL 438-448

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2. Some Lemmas In this section, we summarize some lemmas, which will be used to prove our main results. Lemma 2.1[7] Let f (z) be a non-constant zero-order meromorphic function and q ∈ C \ {0}. Then ( ) f (qz) m r, (2.1) = o(T (r, f (z))). f (z) on a set of logarithmic density 1. Lemma 2.2[8] Let f (z) be a non-constant zero-order meromorphic function and q ∈ C \ {0}. Then T (r, f (qz)) = (1 + o(1))T (r, f (z)). (2.2) on a set of logarithmic density 1. Remark 2.1 Equation (2.2) implies that T (r, f (qz)) = T (r, f (z)) + S(r, f ).

(2.3)

Lemma 2.3[8] Let f (z) be a non-constant zero-order meromorphic function and q ∈ C \ {0}. Then N (r, f (qz)) = (1 + o(1))N (r, f (z)). (2.4) on a set of logarithmic density 1. Lemma 2.4 Let f (z) be a transcendental entire function of zero order and q be non-zero complex constant. Then for n ≥ 2, f (z)n f (qz) is not a constant. c Proof Let F (z) = f (z)n f (qz). If F (z) is a constant c. Then f (z)n = f (qz) . From the Lemma 2.2 and an identity due to Valiron-Mohon’ko [10, 11], we get nT (r, f (z)) = T (r, f (z)n ) ( ) c = T r, f (qz) = T (r, f (z)) + S(r, f ), which is a contradiction for n ≥ 2. Therefore F (z) is not a constant.

3. Proof of Theorem 1 Proof Denote F (z) = f (z)n f (qz). We claim that F (z) − α(z) is transcendental if n ≥ 2. Otherwise, we suppose that F (z) − α(z) = β(z), where β(z) is a rational function. Combining Lemma 2.2 and the identity of Valiron-Mohon’ko, we have nT (r, f (z)) = T (r, f (z)n ) ( ) α(z) + β(z) = T r, f (qz) ≤ T (r, α(z)) + T (r, β(z)) + T (r, f (qz)) + S(r, f ) = T (r, f (z)) + S(r, f ). 3

440

Yunfei Du ET AL 438-448

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

This contradicts the fact that n ≥ 2. Hence F (z) − α(z) is transcendental. Then, we consider the following two cases. Case 1. Suppose that f (z) is a meromorphic function. From Lemma 2.2, Lemma 2.3 and the second main Theorem for three small targets [2], we get nT (r, f (z)) = T (r, f (z)n ) (z) ) = T (r, fF(qz) ≤ T (r, F (z)) + T (r, + S(r, ( f) ( f (z)) ) ≤ N (r, F (z)) + N r, + T (r, f (z)) + S(r, f ),

1 F (z)

N (r, F (z)) = ≤ = ≤ and

( N r,

1 F (z)

)

+ N r,

1 F (z)−α(z)

)

N (r, f (z)n f (qz)) N (r, f (z)n ) + N (r, f (qz)) N (r, f (z)) + N (r, f (qz)) 2T (r, f (z)) + S(r, f ), (

1 f (z)n f (qz))

(3.1)

(3.2)

)

= N r, ) ) ( ( 1 1 + N r, f (qz) ≤ N r, f (z) ( ) ( ) 1 1 ≤ T r, f (z) + T r, f (qz) = 2T (r, f (z)) + S(r, f ).

(3.3)

It follows from (3.1), (3.2) and (3.3) that ( ) 1 N r, ≥ (n − 5)T (r, f (z)) + S(r, f ). F (z) − α(z) The assertion follows by n ≥ 6. Case 2. Suppose that f (z) is an entire function. Applying Lemma 2.1 − 2.3 and the second main Theorem for three small targets, we obtain (n + 1)T (r, f (z)) = T (r, f (z)n+1 ) n+1 = m(r, ( f (z) ) ) (z) ≤ m r, ff(qz) + m(r, F (z)) + S(r, f ) = T (r, F (z)) + S(r,( f ) ) (

(3.4)

) 1 1 ≤ N (r, F (z)) + N r, F (z) + N r, F (z)−α(z) + S(r, f ),

Since f (z) is a zero-order entire function, F (z) = f (z)n f (qz) is an entire function with zero-order, then N (r, F (z)) = 0. (3.5) It follows from (3.3) − (3.5) that ( ) 1 N r, + S(r, f ) ≥ (n − 1)T (r, f (z)). F (z) − α(z) This holds for n ≥ 2. The proof of Theorem 1 is completed. 4

441

Yunfei Du ET AL 438-448

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4. Proof of Theorem 2 Proof We claim that ψn (z) − α(z) is transcendental if n ≥ 2. On the contrary, we suppose that ψn (z) − α(z) = β(z), here β(z) is a rational function. Then f (z)n = α(z) + β(z) − ∆q (z). An application of Lemma 2.1 and the identity due to Valiron-Mohon’ko yields T (r, f (z)n ) = nT (r, f (z)) + S(r, f ) = T (r, α(z) + β(z) − ∆q (z)) ≤ T (r, α(z)) + T (r, β(z)) + T (r, f (qz) − f (z)) + S(r, f ) ( ) f (qz) − f (z) ≤ m r, + m(r, f (z)) + S(r, f ) f (z) = T (r, f (z)) + S(r, f ). This contradicts the fact that n ≥ 2. Hence ψn (z) − α(z) is transcendental. Thus we discuss the following two cases. Case 1. Suppose that α(z) is an entire function. Clearly, ψn (z)−α(z) is a transcendental entire function for n ≥ 2. Case 2. Suppose that α(z) is a meromorphic function. Set α(z) = h(z) , where g(z) and g(z) h(z) are entire functions with T (r, g(z)) = o(T (r, f (z))) and T (r, h(z)) = o(T (r, f (z))), respectively. Then ψn (z) − α(z) = f (z)n + f (qz) − f (z) −

h(z) (f (z)n + f (qz) − f (z))g(z) − h(z) = . g(z) g(z)

If ψn (z) − α(z) has finitely many zeros, then (f (z)n + f (qz) − f (z))g(z) − h(z) must be a polynomial. Denote by p(z) = (f (z)n + f (qz) − f (z))g(z) − h(z), where p(z) is a polynomial. From Lemma 2.1 , we have T (r, f (z)n ) = nT (r, f (z)) + S(r, f ) ( ) p(z) + h(z) = T r, − f (qz) + f (z) g(z) ≤ T (r, p(z)) + T (r, g(z)) + T (r, α(z)) + T (r, f (qz) − f (z)) ( ) f (qz) − f (z) ≤ m r, + m(r, f (z)) + S(r, f ) f (z) = T (r, f (z)) + S(r, f ), which gives a contradiction since n ≥ 2. Hence ψn (z) − α(z) has infinitely many zeros in the complex plane. Moreover, by the fact 0 ≤ λ(ψn (z) − α(z)) ≤ σ(f (z)) = 0, it follows that λ(ψn (z) − α(z)) = 0. We finish the proof of Theorem 2.

5

442

Yunfei Du ET AL 438-448

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

5. Proof of Theorem 3 n

n

Proof From f (z)n f (qz) and g(z)n g(qz) share z CM, we know that f (z) zf (qz) and g(z) zg(qz) share 1 CM. By the assumption of Theorem 3, there exists an entire function p(z) such that f (z)n f (qz) z g(z)n g(qz) z

−1 −1

= ep(z) .

(5.1)

Since the order of f (z) and g(z) is of zero, then ep(z) is a non-zero constant, let it be c. Rewriting the equation (5.1), it follows that f (z)n f (qz) g(z)n g(qz) = − 1 + c. c z z n

(5.2)

n

Denote F (z) = f (z) zf (qz) and G(z) = g(z) zg(qz) . First, assume that c ̸= 1. We take into account the following two cases. Case 1. Suppose that f (z) and g(z) are meromorphic functions. Combing Lemma 2.2, Lemma 2.3 and equation (5.2), we obtain ( ) ( ) 1 1 T (r, F (z)) ≤ N (r, F (z)) + N r, + N r, + S(r, f ), (5.3) F (z) F (z) − 1 + c ) ( n N (r, F (z)) = N r, f (z) zf (qz) ( ) ≤ N (r, f (z)n ) + N (r, f (qz)) + N r, z1 (5.4) = N (r, f (z)) + N (r, f (qz)) + S(r, f ) < 2T (r, f (z)) + S(r, f ), and

( ) ( ) 1 N r, F (z) = N r, f (z)nzf (qz) ) ) ( ( 1 1 ≤ N r, f (z) + + N (r, z) N r, n ( ) ( f (qz)) 1 1 = N r, f (z) + N r, f (qz) < 2T (r, f (z)) + S(r, f ).

(5.5)

Similarly, ( N r,

1 F (z) − 1 + c

)

( = N r,

1 cG(z)

) ≤ 2T (r, g(z)) + S(r, g).

(5.6)

By substituting (5.4) − (5.6) into (5.3), it follows that T (r, F (z)) ≤ 4T (r, f (z)) + 2T (r, g(z)) + S(r, f ) + S(r, g).

(5.7)

6

443

Yunfei Du ET AL 438-448

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On the other hand, from Lemma 2.2, we have T (r, f (z)n ) = nT (r, f (z)) + S(r, f ) ( ) zF (z) = T r, f (qz)

( ≤ T (r, z) + T (r, F (z)) + T r,

1 f (qz) = T (r, f (qz)) + T (r, F (z)) + S(r, f ) = T (r, f (z)) + T (r, F (z)) + S(r, f ),

)

which means (n − 1)T (r, f (z)) ≤ T (r, F (z)) + S(r, f ).

(5.8)

Substituting (5.8) into (5.7), we have (n − 5)T (r, f (z)) ≤ 2T (r, g(z)) + S(r, f ) + S(r, g).

(5.9)

Similarly, we can get (n − 5)T (r, g(z)) ≤ 2T (r, f (z)) + S(r, f ) + S(r, g).

(5.10)

Combining the above two inequalities (5.9) and (5.10), we obtain (n − 7)(T (r, f (z)) + T (r, g(z))) ≤ S(r, f ) + S(r, g), which contradicts with the assumption n ≥ 8. Case 2. Suppose that f (z) and g(z) are entire functions. From N (r, f (z)) = N (r, g(z)) = 0, then we have ( ) ( ) f (z)n f (qz) 1 n N (r, F (z)) = N r, ≤ N (r, f (z) ) + N (r, f (qz)) + N r, = S(r, f ). z z (5.11) Substituting (5.11), (5.5), (5.6) into (5.3), we obtain T (r, F (z)) ≤ 2T (r, f (z)) + 2T (r, g(z)) + S(r, f ) + S(r, g).

(5.12)

On the other hand, by using Lemma 2.1 to obtain T (r, f (z)n+1 ) = (n + 1)T (r, f (z)) + S(r, f ) = m(r, f (z)n+1 ) ( ) f (z) = m r, zF (z) f (qz) ( ) f (z) ≤ m(r, F (z)) + m r, + S(r, f ) f (qz) ≤ T (r, F (z)) + S(r, f ), which implies (n + 1)T (r, f (z)) ≤ T (r, F (z)) + S(r, f ).

(5.13)

7

444

Yunfei Du ET AL 438-448

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

By substituting (5.13) into (5.12), we get (n − 1)T (r, f (z)) ≤ 2T (r, g(z)) + S(r, f ) + S(r, g).

(5.14)

Similarly, we can obtain (n − 1)T (r, g(z)) ≤ 2T (r, f (z)) + S(r, f ) + S(r, g).

(5.15)

Combining (5.14) and (5.15) yields (n − 3)(T (r, f (z)) + T (r, g(z))) ≤ S(r, f ) + S(r, g), this is impossible when n ≥ 4. Then, assume that c = 1. From (5.2), we can get g(z)n g(qz) f (z)n f (qz) = . z z Let h(z) =

f (z) , g(z)

then we have h(z)n h(qz) = 1.

(5.16)

From Lemma 2.2, we obtain ( T (r, h(z) ) = nT (r, h(z)) + S(r, h) = T r, n

1 h(qz)

) = T (r, h(z)) + S(r, h).

So h(z) must be constant from n ≥ 4. Suppose that h(z) ≡ t. We conclude that tn+1 = 1 from (5.16). Thus, Theorem 3 is proved.

6. Proof of Theorem 4 Proof From f (z)n (f (z) − 1)f (qz) and g(z)n (g(z) − 1)g(qz) share z CM, we know that n f (z)n (f (z)−1)f (qz) and g(z) (g(z)−1)g(qz) share 1 CM. z z Denote F (z) =

f (z)n (f (z) − 1)f (qz) z

and G(z) =

g(z)n (g(z) − 1)g(qz) . z

(6.1)

It follows from Lemma 2.1 that T (r, f (z)n+1 (f (z) − 1)) = (n + 2)T (r, f (z)) + S(r, f ) = m(r, f (z)n+1 (f (z) − 1)) ( ) f (z) = m r, zF (z) f (qz) ( ) f (z) ≤ m(r, F (z)) + m r, + S(r, f ) f (qz) ≤ T (r, F (z)) + S(r, f ), 8

445

Yunfei Du ET AL 438-448

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

which implies (n + 2)T (r, f (z)) ≤ T (r, F (z)) + S(r, f ).

(6.2)

Since F (z) and G(z) share 1 CM, then by the same arguments in the proof of Theorem 3, there exists a non-zero constant c such that F (z) − 1 = c(G(z) − 1).

(6.3)

Assume that c ̸= 1. By using Lemma 2.2, Lemma 2.3, (6.1), (6.3) and the second main theorem to F (z), we deduce that ( ( ) ) 1 1 T (r, F (z)) ≤ N (r, F (z)) + N r, (6.4) + N r, + S(r, f ), F (z) F (z) − 1 + c ( ) n (qz) N (r, F (z)) = N r, f (z) (f (z)−1)f z ( ) n (6.5) ≤ N (r, f (z) ) + N (r, f (z) − 1) + N (r, f (qz)) + N r, 1 z

= S(r, f ), and

( ( ) ) 1 z N r, F (z) = N r, f (z)n (f (z)−1)f ( ) ((qz) ) ( ) 1 1 1 ≤ N r, f (z)n + N r, f (qz) + N (r, z) + N r, f (z)−1 ≤ 3T (r, f (z)) + S(r, f ).

Similarly, we can get ( ( ) ) 1 1 N r, = N r, ≤ 3T (r, g(z)) + S(r, g). F (z) − 1 + c cG(z)

(6.6)

(6.7)

Substituting (6.5) − (6.7) into (6.4), we have T (r, F (z)) ≤ 3T (r, f (z)) + 3T (r, g(z)) + S(r, f ) + S(r, g).

(6.8)

It follows from (6.2) and (6.8) that (n − 1)T (r, f (z)) ≤ 3T (r, g(z)) + S(r, f ) + S(r, g).

(6.9)

(n − 1)T (r, g(z)) ≤ 3T (r, f (z)) + S(r, f ) + S(r, g).

(6.10)

Similarly, Combing (6.9) and (6.10) yields (n − 4)(T (r, f (z)) + T (r, g(z))) ≤ S(r, f ) + S(r, g). Clearly, it isn’t established for n ≥ 6. Assume that c = 1, this means g(z)n (g(z) − 1)g(qz) f (z)n (f (z) − 1)f (qz) = . z z 9

446

Yunfei Du ET AL 438-448

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Denote h(z) =

f (z) , g(z)

we obtain g(z)(h(z)n+1 h(qz) − 1) = h(z)n h(qz) − 1.

(6.11)

Assume h(z) is not a constant. By using Lemma 2.4, we know that h(z)n+1 h(qz) is also not a constant. If there exists a point z0 such that h(z0 )n+1 h(qz0 ) = 1. Combing (6.11) and g(z) is an entire function, we obtain h(z0 )n h(qz0 ) = 1. Hence h(z0 ) = 1, then it follows that ( ( ) ) 1 g(z) N r, = N r, h(z)n+1 h(qz) − 1 h(z)n h(qz) − 1 ( ) 1 ≤ N (r, g(z)) + N r, h(z)n h(qz) − 1 ( ) 1 ≤ N r, h(z) − 1 ≤ T (r, h(z)) + S(r, h), i.e.,

( N r,

) 1 (6.12) ≤ T (r, h(z)) + S(r, h). h(z)n+1 h(qz) − 1 We now set H(z) = h(z)n+1 h(qz). Applying the second main Theorem to H(z), we have ( ) ( ) 1 1 T (r, H(z)) ≤ N (r, H(z)) + N r, + N r, + S(r, h). (6.13) H(z) H(z) − 1 Combing Lemma 2.2 and Lemma 2.3 yields N (r, H(z)) ≤ 2T (r, h(z)) + S(r, h)

(6.14)

( N r,

) 1 ≤ 2T (r, h(z)) + S(r, h). H(z) Substituting (6.12), (6.14), (6.15) into (6.13), we get and

(6.15)

T (r, H(z)) ≤ 5T (r, h(z)) + S(r, h).

(6.16)

It follows from Lemma 2.2 and (6.16) that T (r, h(z)n+1 ) = (n + 1)T (r, h(z)) + S(r, h) ( ) H(z) = T r, h(qz) ≤ T (r, H(z)) + T (r, h(z)) + S(r, h) ≤ 6T (r, h(z)) + S(r, h). Obviously, it is a contradiction with the assumption n ≥ 6. Thus, h(z) is a constant, let it be t. Then, substituting it into (6.11), we have g(z)(tn+2 − 1) = tn+1 − 1.

(6.17)

Since g(z) is a transcendental entire function, from (6.17), we know that tn+2 = 1 and tn+1 = 1, which means t = 1. Consequently, f (z) ≡ g(z). The proof of Theorem 4 is completed. 10

447

Yunfei Du ET AL 438-448

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

References [1] Yang, L.: Value distribution theory and its new research (in Chinese). Beijing: Science Press (1982) [2] Hayman, W.K.: Meromorphic functions. Oxford: Clarendon Press (1964) [3] Liu, K., Laine, I.: A note on value distribution of difference polynomials. J. Bulletin of the Australian Mathematical Society. 81(3), 353-360 (2010) [4] Chen, Z.X.: On value distribution of difference polynomials of meromorphic functions, Abstract & Applied Analysis, 2011(2), 1826-1834 (2011) [5] Laine, I., Yang, C.C.: Value distribution of difference polynomials. J. Proc Japan Acad Ser A Math Sci. 83, 148-151 (2007) [6] Fang, M. L., Qiu, H.L.: Meromorphic functions that share fixed-points. J. Math Anal Appl. 268, 426-439 (2000) [7] Barnett D. C., Halburd R. G., Korhonen R. J., Morgan W.: Nevanlinna theory for the q-difference operator and meromorphic solutions of q-difference equations. J. Proceedings of the Royal Society of Edinburgh. 137(A), 457-474 (2007) [8] Zhang, J.L., Korhonen, R.J.: On the Nevanlinna characteristic of f (qz) and its applications. J. Math Anal Appl. 369, 537-544 (2010) [9] Yi, H.X., Yang, C.C.: Uniqueness theory of meromorphic functions. Beijing: Science Press (1995) [10] Mohon’ko, A.Z.: The Nevanlinna characteristics of certain meromorphic functions. J. Tero Funktsi˘i Funktsional Anal i Prilozhen. 14, 83-87 (1971) [11] Valiron, G.: Sur la d´ eriv´ ee des functions alg´ ebro¨ıdes. J. Bullentin de la Soci´ et´ e Math´ ematique de France. 59, 17-39 (1931) [12] Laine, I.: Nevanlinna theory and complex differential equations. Walter de Gruyter, Berlin (1993)

11

448

Yunfei Du ET AL 438-448

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

New Exact Penalty Function Methods with ϵ-approximation and Perturbation Convergence for Solving Nonlinear Bilevel Programming Problems Qiang Tuo and Heng-you Lan



College of Mathematics and Statistics, Sichuan University of Science & Engineering, Zigong, Sichuan 643000, PR China

Abstract. In this paper, in order to solve a class of nonlinear bilevel programming problems, we equivalently transform the nonlinear bilevel programming problems into corresponding single level nonlinear programming problems by using the Karush-Kuhn-Tucker optimality condition. Then, based on penalty function theory, we construct a smooth approximation method for obtaining optimal solutions of classic l1 -exact penalty function optimality problems, which is equivalent to the single level nonlinear programming problems. Furthermore, using ϵ-approximate optimal solution theory, we prove convergence of a simple ϵ-approximate optimal algorithm. Finally, through adding parameters in the constraint set of objective function, we prove some perturbation convergence results for solving the nonlinear bilevel programming problems. Key Words and Phrases: Nonlinear bilevel programming problem, new exact penalty function method, smooth approximation, ϵ-approximate algorithm, perturbation convergence. AMS Subject Classification: 49K30, 65K05, 90C30, 90C59.

1

Introduction

Since 1980s, bilevel programming problems had been very widely used in supply chain management, engineering design, network planning and other fields [1]. The theory and algorithms for bilevel programming problems have been deeply explored by many researchers. See, for example, [2, 3] and the reference therein. Recently, there are quite mature theoretical support and algorithm design on how to solve bilevel programming problems. For instance, by using the most famous pole search method, the global optimal solution of the problems can ultimately be obtained (see [4]). Zheng et al. [5] pointed out that a class of exact penalty function methods to solve the weak linear bilevel programming problem is feasible. But the present research to nonlinear bilevel programming problems is mainly focused on some special structure problems, and the proposed methods for solving the problems are mostly applied to aim at some particular examples which are of special properties or structure. In 2010, replacing the lower level problem with its Kuhn-Tucker optimality condition, Pan et al. [6] transformed a class of nonlinear bilevel programming problems into normal nonlinear programming problems with the complementary slackness constraint condition, and introduced and studied a penalty function method to solve the problems. Through appending the duality gap of the lower level problem to the upper level objective with a penalty and obtaining a penalized problem, Lv [7] presented an exact penalty function method for finding solutions of a class of special nonlinear bilevel programs, i.e. the lower level problem is linear programs. Gupta et al. [8] provided a fuzzy goal programming approach to solve a multivariate stratified population problem which was turned out to be a non-linear bilevel programming problem. ∗ The

corresponding author: [email protected] (H.Y. Lan)

1

449

Qiang Tuo ET AL 449-458

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Very recently, based on definition of partial calmness for a single level optimization problem, L¨ u and Wan [9] constructed an exact penalized problem of a semi-vectorial bilevel programming problem by using the dual theory of linear programming. Based on approximate approach, Hosseini [10] attempted to develop an effective method for solving a nonlinear bilevel programming problem in virtue of transforming the nonlinear bilevel programming problem into a smooth single problem via using the Karush-Kuhn-Tucker conditions and Fischer-Burmeister functions. Hosseini and Kamalabadi [11] proposed a modified genetic algorithm combining particle swarm optimization using a heuristic function and constructed an effective hybrid approach, which is a fast approximate method for solving the non-linear bilevel programming problems. Based on a novel coding scheme, Li [12] developed a genetic algorithm with global convergence to solve a class of nonlinear bilevel programming problems where the follower is a linear fractional program. Moreover, Miao et al. [13] introduced and studied a bilevel genetic algorithms to solve a class of particular mixed integer nonlinear bilevel programming problems, which have been widely appeared in product family problems. Based on exact penalty function method, Di Pillo [14] proposed an efficient derivative-free unconstrained global minimization technique and proved that for every global minimum point, there exists a neighborhood of attraction for the local search under suitable assumptions. By using a simple exact penalty function method, Gao [15] studied an optimal control problem subject to the terminal state equality constraint and continuous inequality constraints on the control and the state. However, a general method to solve nonlinear bilevel programming problems has not yet been dealt with in the literature. Motivated and inspired by the above works and this work is organized as follows: In Section 2, a class of nonlinear bilevel programming problems are equivalently transformed into corresponding single level nonlinear programming problems by using the Karush-Kuhn-Tucker optimality condition. Further, based on penalty function theory, we construct a smooth approximation method for obtaining optimal solutions of classic l1 -exact penalty function optimality problems. By using ϵ-approximate optimal solution theory, convergence of a simple ϵ-approximate optimal algorithm is proved in Section 3. In Section 4, by adding parameters in the constraint set of objective function, we discuss some perturbation convergence results for solving the nonlinear bilevel programming problems.

2

Smooth approximation method

In this section, by using penalty function theory and Karush-Kuhn-Tucker optimality condition, we shall construct a smooth approximation method for solving a class of nonlinear bilevel programming problems. In this paper, we consider the following nonlinear bilevel programming problem: min

f (x, y)

min

F (x, y)

(x,y)∈Rn+m (x,y)∈Rn+m

s.t.

(2.1)

gi (x, y) ≤ 0,

i = 1, 2, · · · , l,

where f (x, y), F (x, y), gi (x, y) : Rn+m → R are continuously differentiable mappings for i = 1, 2, · · · , l. By using Karush-Kuhn-Tucker optimality condition (see [16]), the lower level programming problem in (2.1) can be rewritten as follows: ∇y F (x, y) +

l ∑

λi ∇y gi (x, y) = 0,

i=1 l ∑

λi gi (x, y) = 0,

i=1

gi (x, y) ≤ 0, λi ≥ 0,

i = 1, 2, · · · , l

i = 1, 2, · · · , l. 2

450

Qiang Tuo ET AL 449-458

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Thus the problem (2.1) can be expressed as the following single level nonlinear programming problem: min

(x,y)∈Rn+m

f (x, y)

gi (x, y) ≤ 0,

s.t.

i = 1, 2, · · · , l, l ∑

∇y F (x, y) +

(2.2)

λi ∇y gi (x, y) = 0,

i=1

i = 1, 2, · · · , l,

λi gi (x, y) = 0,

− λi ≤ 0 i = 1, 2, · · · , l. Let z = (x, y, λ1 , λ2 , ...λl ) ∈ Rn+m+l . Then we have h1 (z) : = ∇y F (x, y) +

l ∑

λi ∇y gi (x, y) = 0,

i=1

h1+i (z) : = λi gi (x, y) = 0, h1+l+i (z) : = gi (x, y) ≤ 0, h1+2l+i (z) : = −λi ≤ 0,

i = 1, 2, · · · , l i = 1, 2, · · · , l

(2.3)

i = 1, 2, · · · , l.

It follows from (2.3) that the problem (2.2) can be stated as min

z∈Rn+m+l

f (z) (2.4)

i = 1, 2, · · · , 1 + l,

s.t. hi (z) = 0, hj (z) ≤ 0,

j = 1, 2, · · · , 2l,

where f (z) : Rn+m+l → R is a continuously differentiable mapping. Let D = {z|hj (z) ≤ 0} be the feasible set of the single level nonlinear programming problem (2.4). According to theory of the penalty function, we give the following l1 -exact penalty function programming problem: min

(z,µ)∈Rn+m+l ×R+

l1 (z, µ) = f (z) + µ

1+3l ∑

+

[hj (z)] ,

(2.5)

j=1 +

where µ is called a penalty factor and [hj (z)] = max {0, hj (z)} for j = 1, 2, · · · , 1 + 3l. Now we prove that the problem (2.5) is equivalent to the problem (2.4). Theorem 2.1 Suppose that (z ∗ , µ) ∈ Rn+m+l × R+ is optimal solution of the l1 -exact penalty function programming problem (2.5), where R+ = (0, +∞) and µ is large enough. Then, z ∗ must be the optimal solution of the single level nonlinear programming problem (2.4). Proof. Let z1∗ be an optimal solution of the problem (2.4), and (z2∗ , µz2∗ ) be an optimal solution of the problem (2.5), where penalty parameter µz2∗ ∈ R+ must exist. Then we get [hj (z1∗ )] = 0,

(2.6)

l1 (z2∗ , µz2∗ ) ≤ l1 (z1∗ , µz2∗ ).

(2.7)

+

and

By (2.7) and (2.5), now we know that f (z2∗ ) +

1+3l ∑

µz2∗ [hj (z2∗ )] ≤ f (z1∗ ) + +

j=1

and so it follows from (2.6) that

1+3l ∑

µz2∗ [hj (z1∗ )] , +

j=1

f (z2∗ ) ≤ f (z1∗ ).

(2.8)

3

451

Qiang Tuo ET AL 449-458

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

If z2∗ ∈ D, then we have

f (z1∗ ) ≤ f (z2∗ ).

(2.9)



Otherwise, there must exists a j ∈ J such that hj ′ (z2∗ ) > 0 holds. Thus, we have µhj ′ (z2∗ ) → +∞ with µ → +∞. Hence, z2∗ may not be an optimal solution of the single level nonlinear programming problem (2.4). Therefore, z2∗ ∈ D must be satisfied. Combining (2.8) and (2.9), we know that the result of Theorem 2.1 is right. It completes the proof. Next, we establish a new smooth function for equivalently approximating the l1 -exact penalty function in (2.5). Theorem 2.2 Give the following programming problem: min

(z,µ,r)∈Rn+m+l ×R+ ×R+

L(z, µ, r) = f (z) +

1+3l ∑

[ ]r µhj (z) r ln 1 + e ,

(2.10)

j=1

where µ, r > 0 are two parameters. Then smooth approximation of optimal solution for the L-exact penalty function programming problem (2.10) is the optimal solution of the l1 -exact penalty function programming problem (2.5) as r → 0. Proof. For all j = 1, 2, · · · , 3l, if hj (z) ≤ 0, then +

[hj (z)] = 0,

(2.11)

+

where [hj (z)] is the same as in (2.5). Further, letting t = 1r , then we have t → +∞ as r → 0+ and [ lim ln 1 + e

µhj (z) r

r→0+

]r

[ ] ln 1 + etµhj (z) = lim = 0. t→+∞ t

(2.12)

By (2.11) and (2.12), one can see that the optimal solution of the problem (2.10) is equivalent to the optimal solution of the problem (2.5) as r → 0+ . If hj (z) > 0, then taking r = 1t , and we get [ lim ln 1 + e

r→0+

µhj (z) r

]r

[ ] ln 1 + etµhj (z) = lim t→+∞ t ] [ 1 = µhj (z) · lim 1 − t→+∞ 1 + etµhj (z) = µhj (z) > 0.

(2.13)

[ ] µhj (z) r + + Thus, it follows from (2.13) that ln 1 + e r = µ [hj ] as r → 0+ , where [hj ] is the same as in (2.5), and so limr→0+ L(z, µ, r) = l1 (z, µ). From the above, it completes the proof.

3

ϵ-approximation algorithm

In this section, we shall construct an ϵ-approximation algorithm to solve the nonlinear bilevel programming problem (2.1) via using ϵ-approximate optimal solution theory. Definition 3.1 Let z¯ be an optimal solution of the nonlinear bilevel programming problem (2.1). Then a point z0 is called ϵ-approximate optimal solution of the problem (2.1), if for given constant ϵ > 0, the following inequality holds: f (¯ z ) − f (z0 ) < ϵ, (3.1) where f (z) is defined as in (2.4) for any z ∈ Rn+m+l . 4

452

Qiang Tuo ET AL 449-458

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

∑1+3l

Lemma 3.2 Let φ(z, µ) = limr→0+

j=1

[ ] µhj (z) r ln 1 + e r be a nonlinear function for all z ∈

Rn+m+l and µ ∈ R+ , and let (¯ z, µ ¯) be an optimal solution of the l1 -exact penalty function programming problem (2.5) with enough large µ ¯. If there exists (z ∗ , µ∗ ) ∈ Rn+m+l × R+ such that for each ϵ > 0, φ(z ∗ , µ∗ ) < ϵ, (3.2) then z ∗ must be an ϵ-approximate optimal solution of the nonlinear bilevel programming problem (2.1). Proof. Since (¯ z, µ ¯) is an optimal solution of the problem (2.5), we have l1 (¯ z, µ ¯) ≤ l1 (z ∗ , µ∗ ), i.e., f (¯ z) + µ ¯

1+3l ∑

[hj (¯ z )] ≤ f (z ∗ ) + µ∗ +

j=1

1+3l ∑

[hj (z ∗ ] . +

(3.3)

j=1

By Theorem 2.1, we have µ ¯

1+3l ∑

+

[hj (¯ z )] = 0.

(3.4)

j=1

Thus, it follows from Theorem 2.2 and (3.2) that ∗

µ

1+3l ∑



+

[hj (z )] = lim+ r→0

j=1

1+3l ∑

[ ln 1 + e

µ∗ hj (z ∗ ) r

]r

= φ(z ∗ , µ∗ ) < ϵ.

(3.5)

j=1

Combining (3.4) and (3.5) into (3.3), we get f (¯ z ) − f (z ∗ ) < ϵ,

(3.6)

which implies that the point z ∗ is an ϵ-approximate optimal solution of the nonlinear bilevel programming problem (2.1). By Lemma 3.2, now we propose the following ϵ-approximation algorithm. Algorithm 3.3 Step 1. Give a constant ϵ > 0, initial points µ1 > 0 and r1 ∈ (0, 0.01), a positive integer N > 1, k := 1. Step 2. Find optimal solution of the following smooth programming problem with the gradient descent method for (µk , rk ), and denote by (z k , µk , rk ): k

min

(z,µ,r)∈Rn+m+l ×R+ ×R+

Step 3. Let φ(z, ¯ µ, r) =

∑1+3l j=1

k

L(z, µ , r ) = f (z) +

1+3l ∑

[ ln 1 + e

µk hj (z) rk

]r k .

(3.7)

j=1

[ ] µhj (z) r ln 1 + e r . If the point (z k , µk , rk ) satisfies

φ(z ¯ k , µk , rk ) − φ(z, ¯ µk , rk ) ≤ ϵ, ∀ z ∈ D, ( )N and µk+1 = N µk , k := k + 1, and go to Step 2. then stop. Otherwise, let rk+1 = rk Theorem 3.4 Assume that {(z k , µk , rk )} is a sequence generated by Algorithm 3.3, and the feasible region D = {z|hj (z) ≤ 0, j = 1, 2, ..., 1 + 3l} of the single level nonlinear programming problem (2.4) is nonempty. Then the following results hold: (i) If z k ∈ D, then L(z k , µk , rk ) ≥ L(z k+1 , µk+1 , rk+1 ). (ii) when z k ̸∈ D, we have

lim L(z k , µk , rk ) → +∞.

k→∞

5

453

Qiang Tuo ET AL 449-458

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. By Algorithm 3.3, we know that z k and z k+1 are the minimum points of the L-exact penalty function (3.7) with respect to (µk , rk ) and (µk+1 , rk+1 ), respectively. Thus, we have L(z

k+1



k+1

,r

k+1

)

= f (z

k+1

)+

1+3l ∑

[ ln 1 + e

µk+1 hj (z k+1 ) r k+1

]rk+1

j=1

≤ f (z ) + k

1+3l ∑

[ ln 1 + e

k=1

= f (z k ) + rk+1

1+3l ∑

µk+1 hj (z k ) r k+1

]rk+1

[ ] µk+1 hj (z k ) . ln 1 + e rk+1

(3.8)

j=1

Let φ(z, ¯ µ, r) =

∑1+3l j=1

ln[1 + e

µhj (z) r

]r . For z ∈ D, it follows that −

] [ ] [ µhj (z) µhj (z) ln 1 + e r − 1+e r ∂ φ(z, ¯ µ, r) = µhj (z) ∂r 1+e r

µhj (z) r

> 0 and

µhj (z) µhj (z) e r r

(3.9)

> 0.

Further, if z k ∈ D, then it follows from rk+1 < rk , (3.9) and µk+1 > µk that for any j = 1, 2, · · · , 1 + 3l, hj (z k ) < 0, µk+1 hj (z k ) < µk hj (z k ) and 1+3l ∑

f (z k ) + rk+1

j=1 1+3l ∑

≤ f (z k ) + rk

j=1 1+3l ∑

≤ f (z k ) + rk

j=1 k

k

] [ µk+1 hj (z k ) ln 1 + e rk+1 [ ] µk+1 hj (z k ) ln 1 + e rk [ ] µk hj (z k ) ln 1 + e rk

k

= L(z , µ , r ).

(3.10)

Thus, by (3.8) and (3.10), we know that for z k ∈ D, L(z k+1 , µk+1 , rk+1 ) ≤ L(z k , µk , rk ).

(3.11)

Moreover, if z k ̸∈ D, then there must exists a positive integer ja ∈ {1, 2, ..., 1 + 3l} such that hja (z k ) > 0. It follows from Theorem 2.2 that rk → 0 and µk → +∞ as k → ∞, and   ]rk  1+3l  µk hj (z k ) ∑ [ lim L(z k , µk , rk ) = lim f (z k ) + ln 1 + e rk  k→∞ k→∞  j=1

= lim f (z k ) + lim k→∞

k→∞

1+3l ∑

[ ]r k µk hj (z k ) ln 1 + e rk

j=1

] [ ≥ lim f (z ) + lim µk hja (z k ) k

k→∞

k→∞

= +∞.

(3.12)

It completes the proof. From Theorem 3.4, we have the following result. Theorem 3.5 Let the feasible region of the single level nonlinear programming problem (2.4) denoted by D = {z|hj (z) ≤ 0} be nonempty. Let {(z k , µk , rk )} be a sequence generated by Algorithm 3.3. Then there must exists a subsequence of sequence {(z k , µk , rk )} to converge to an optimal solution of the nonlinear bilevel programming problem (2.1). 6

454

Qiang Tuo ET AL 449-458

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. Let f (z) ≥ 0 always hold. Otherwise, let f (z) := ef (z) + 1. Let {(z kt , µkt , rkt )} be a subsequence of the sequence {(z k , µk , rk )} with z kt ∈ D. Thus, from Theorem 3.4, it follows that L(z kt , µkt , rkt ) is monotone and bounded. Let z ∗ be an optimal solution of the nonlinear bilevel programming problem (2.1). Since rk > 0 and ln[1 + e j = 1, 2, · · · , 1 + 3l, we have rk ln[1 + e L(z kt , µkt , rkt )

µk hj (z k ) rk

µk hj (z k ) rk

] > ln1 = 0 for every k ≥ 1 and

] > 0 and

= f (z kt ) +

1+3l ∑

] [ µkt hj (z kt ) rkt ln 1 + e rkt

j=1

> f (z ) ≥ f (z ∗ ). kt

(3.13)

From (2.12), we have for rkt → 0+ as kt → +∞ and lim

1+3l ∑

r kt →0+

[ ln 1 + e

µkt hj (z kt ) r kt

]r k t = 0.

(3.14)

j=1

It follows from (i) of Theorem 3.4 that L(z kt , µkt , rkt ) is monotone decreasing and bounded for all z kt ∈ D. Combining (3.13) and (3.14), we get kt

kt

kt

lim L(z , µ , r )

kt →∞

kt

= lim f (z ) + lim kt →∞

r kt →0+

1+3l ∑

[ ln 1 + e

µkt hj (z kt ) r kt

]r k t

j=1

= lim f (z kt ) = f (z ∗ ). kt →∞

(3.15)

Thus, from the above, we have that L(z kt , µkt , rkt ) and z kt converge to f (z ∗ ) and z ∗ as kt → ∞, respectively. Combining the equivalence relation between the single level nonlinear programming problem (2.4) and the nonlinear bilevel programming problem (2.1), it completes the proof.

4

Perturbation theorem

By adding parameters in the constraint set of objective function, we will discuss some perturbation convergence results for solving the nonlinear bilevel programming problems (2.1) in this section. Let Ωα be a set defined by Ωα = {z ∈ Rn+m+l |hj (z) ≤ α}, (4.1) where α ≥ 0. If α = 0, we can obtain that Ω0 is a feasible set of the single level nonlinear programming problem (2.4). Let ϕf (α) be perturbation function of the single level nonlinear programming problem (2.4) defined as follows ϕf (α) = inf f (z), ∀α > 0, z∈Ωα

(4.2)

where f is the same function as in (2.4). By (4.2), we know that ϕf (α) is monotone decreasing at α > 0, and so ϕf (α) is a upper semi-continuous function at α = 0+ . Denote ϕf (0) = inf f (z),

(4.3)

ψf (0) = min f (z).

(4.4)

z∈Ω0

and z∈Ω0

It is easy to see that the optimization problem (4.4) is equivalent to the single level nonlinear programming problem (2.4). Theorem 4.1 If ϕf (α) defined in (4.2) is a lower semi-continuous function at α = 0+ , then (4.3) is equivalent to the nonlinear bilevel programming problem (2.1). 7

455

Qiang Tuo ET AL 449-458

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. From (4.1) and (4.2), it follows that ϕf (α) is a upper semi-continuous function at α = 0+ . If ϕf (α) is also a lower semi-continuous function at α = 0+ , then ϕf (α) is continuous at α = 0+ . Hence, ϕf (0) = ψf (0). On the other hand, the optimization problem (4.4) is equivalent to the single level nonlinear programming problem (2.4). Combining the equivalence relation between the nonlinear bilevel programming problem (2.1) and the single level nonlinear programming problem (2.4), we know that (4.3) is equivalent to the original programming problem (2.1). It completes the proof. Theorem 4.2 Let {(z k , µk , rk )} be a sequence generated by Algorithm 3.3. Assume that feasible n+m+l set D = {z R |hj (z) ≤ 0} of the single level nonlinear programming problem (2.4) is nonempty. Then, there must exists a subsequence {(z kp , µkp , rkp )} of the sequence {(z k , µk , rk )} such that for z kp ∈ D [ ]rkp k k 1+3l µ p hj (z p ) ∑ = 0. (4.5) lim ln 1 + e rkp kp →∞

j=1

Proof. By (3.9), we know that for z ∈ D, ∂ φ(z, ¯ µ, r) > 0. ∂r

(4.6)

Let {(z kp , µkp , rkp )} be a subsequence of the sequence {(z k , µk , rk )} generated by Algorithm 3.3 with z kp ∈ D. From (4.6), one can know that for each z kp , kp

k

k

φ(z ¯ ,µ ,r )

=

1+3l ∑

[ ln 1 + e

k µk hj (z p ) rk

]r k

j=1

>

1+3l ∑

[ ln 1 + e

k µk+1 hj (z p ) r k+1

]rk+1

j=1

= φ(z ¯ kp , µk+1 , rk+1 ).

(4.7)

Since φ(z ¯ kp , µk+1 , rk+1 ) > 0 holds invariably, it follows from (4.7) that lim φ(z ¯ kp , µk , rk ) = 0.

k→∞

(4.8)

Taking µk := µkp and rk := rkp , then it follows from (4.8) that lim φ(z ¯ kp , µkp , rkp ) = 0,

kp →∞

and so lim

kp →∞

1+3l ∑

[ ln 1 + e

k µ p k r p

]r k p = 0.

j=1

It completes the proof. Theorem 4.3 If ϕf (α) defined in (4.2) is a lower semi-continuous function at α = 0+ , and a subsequence {z kp , µkp , rkp } is the same as in Theorem 4.2, then z kp converges to an optimal solution of the nonlinear bilevel programming problem (2.1). Proof. If there exists a subsequence {z kp , µkp , rkp } satisfying (4.5), then we know that for each z ∈ D, lim φ(z ¯ kp , µkp , rkp ) = lim φ(z, ¯ µkp , rkp ) = 0, kp →∞

kp →∞

and so for any positive number ϵ, there exists a positive integer M such that when kp ≥ M , we have φ(z, ¯ µkp , rkp ) − φ(z ¯ kp , µkp , rkp ) ≤ ϵ.

(4.9)

8

456

Qiang Tuo ET AL 449-458

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

By (3.7), we know for each z ∈ D L(z kp , µkp , rkp ) ≤ L(z, µkp , rkp ), i.e., f (z kp ) + φ(z ¯ kp , µkp , rkp ) ≤ f (z) + φ(z, ¯ µkp , rkp ).

(4.10)

Combining (4.9) into (4.10), we have for kp ≥ M , f (z kp )

≤ f (z) + φ(z, ¯ µkp , rkp ) − φ(z ¯ kp , µkp , rkp ) ≤ f (z) + ϵ.

(4.11)

If ϕf (α) is a lower semi-continuous function at α = 0+ , from Theorem 4.1, it follows that inf z∈D f (z) = ϕf (0). Let f (z) = ϕf (0). By (4.11), now we know that f (z kp ) ≤ ϕf (0) + ϵ, which implies ϕf (0) ≤ f (z kp ) ≤ ϕf (0) + ϵ.

(4.12)

Thus, when ϵ → 0, it follows from (4.12) that there exists an accumulation zˆ for the sequence {z kp } such that f (ˆ z ) = ϕf (0). Hence, from Theorem 4.1, we know that z kp converges to an optimal solution of the nonlinear bilevel programming problem (2.1).

Acknowledgements This work was partially supported by the Innovation Fund of Postgraduate, Sichuan University of Science & Engineering (y2015017) and the Scientific Research Project of Sichuan University of Science & Engineering (2017RCL54).

References [1] S. Dempe, V. Kalashnikov, N. Kalashnikova, G.A. perez-Valdes and P. Raskolnikova, Bilevel Programming Problems: Theory, Algorithms and Applications to Energy Networks, Energy Systems, Springer Berlin Heidelberg, 2015. [2] Y. Zheng, J. Liu and Z. Wan, Interactive fuzzy decision making method for solving bilevel programming problem, Appl. Math. Model. 38(13) (2014), 3136-3141. [3] S. Dempe and A.B. Zemkoho, The bilevel programming problem: reformulations, constraint qualifications and optimality conditions, Math. Program. 138(1) (2013), 447-473. [4] Y.B. Lv, An exact penalty function approach for solving the linear bilevel multiobjective programming problem, Filomat 29(4) (2015), 773-779. [5] Y. Zheng, Z. Wan, K. Sun and T. Zhang, An exact penalty method for weak linear bilevel programming problem, J. Appl. Math. Comput. 42(1) (2013), 41-49. [6] Q. Pan, Z. An and H. Qi, Exact penalty method for the nonlinear bilevel programming problem, Wuhan Univ. J. Nat. Sci. 15(6) (2010), 471-475. [7] Y. Lv, An exact penalty function method for solving a class of nonlinear bilevel programs, J. Appl. Math. Inform. 29(5) (2011), 1533-1539. [8] N. Gupta, Shafiullah, S. lftekhar and A. Bari, Fuzzy goal programming approach to solve non-linear bi-level programming problem in stratified double sampling desing in presence of non-response, Int. J. Sci. Eng. Res. 3(10) (2012), 1-9. [9] Y.B. L¨ u, and Z.P. Wan, Exact penalty function method for solving a class of semivectorial bilevel programming problems, J. Systems Sci. Math. Sci. 36(6) (2016), 800-809.

9

457

Qiang Tuo ET AL 449-458

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[10] E. Hosseini and I.N. Kamalabadi, Taylor approach for solving non-linear bi-level programming problem, Adv. Comput. Sci. 3(5) (2015), 91-97. [11] E. Hosseini and I.N. Kamalabadi, Combining a continuous search algorithm with a discrete search algorithm for solving non-linear bi-level programming problem, J. Sci. Res. Reports 6(7) (2015), 549-559. [12] H. Li, A genetic algorithm using a finite search space for solving nonlinear/linear fractional bilevel programming problems, Ann. Oper. Res. 235(1) (2015), 543-558. [13] C.L. Miao, G. Du, Y. Xia and D.P. Wang, Genetic Algorithm for mixed integer nonlinear bilevel programming and applications in product family design, Math. Probl. Eng. 2016 (2016), Art. ID 1379315, 15pp. [14] G. Di Pillo, S. Lucidi and F. Rinaldi, A derivative-free algorithm for constrained global optimization based on exact penalty functions, J. Optim. Theory Appl. 164(3) (2015), 862-882. [15] X.Y. Gao, X. Zhang and Y.T. Wang, A simple exact penalty function method for optimal control problem with continuous inequality constraints, Abstr. Appl. Anal. 2014 (2014), Art. ID 752854, 12 pp. [16] Y. Chalco-Cano, W.A. Lodwick, R. Osuna-G´ omez and A. Rufi´ an-Lizana, The Karush-Kuhn-Tucker optimality conditions for fuzzy optimization problems, Fuzzy Optim. Decis. Mak. 15(1) (2016), 57-73.

10

458

Qiang Tuo ET AL 449-458

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

APPROXIMATE n-JORDAN ∗-DERIVATIONS ON INDUCED FUZZY C ∗ -ALGEBRAS GANG LU, JINCHENG XIN, CHOONKIL PARK∗ , AND YUANFENG JIN Abstract. Using the fixed point alternative theorem, we investigate the Hyers-Ulam stability of of n-Jordan ∗-derivations on induced fuzzy C ∗ -algebras associated with the following functional equation f (x − y + z) + f (x − z) + f (2x + y) = f (4x).

1. Introduction and preliminaries The stability problem of functional equations originated from a question of Ulam [39] concerning the stability of group homomorphisms. Hyers [19] gave a first affirmative partial answer to the question of Ulam for Banach spaces. Hyers’ Theorem was generalized by Aoki [1] for additive mappings and by Rassias [34] for linear mappings by considering an unbounded Cauchy difference. Those results have been recently complemented in [7]. A generalization of the Aoki and Rassias theorem was obtained by G˘avruta [18], who used a more general function controlling the possibly unbounded Cauchy difference in the spirit of Rassias’ approach. The stability problems for several functional equations or inequalities have been extensively investigated by a number of authors and there are many interesting results concerning this problem (see [6, 12, 13], [20]–[28], [35]–[37]). We recall a fundamental result in fixed point theory. Let X be a set. A function d : X × X → [0, ∞] is called a generalized metric on X if d satisfies (1) d(x, y) = 0 if and only if x = y; (2) d(x, y) = d(y, x) for all x, y ∈ X; (3) d(x, z) ≤ d(x, y) + d(y, z) for all x, y, z ∈ X. Theorem 1.1 (see [11, 15]). Let (X, d) be a complete generalized metric space and let J : X → X be a strictly contractive mapping with Lipschitz constant L < 1. Then for each given element x ∈ X, either d(J n x, J n+1 x) = ∞ for all nonnegative integers n or there exists a positive integer n0 such that (1) (2) (3) (4)

d(J n x, J n+1 x) < ∞, for all n ≥ n0 ; the sequence {J n x} converges to a fixed point y ∗ of J; y ∗ is the unique fixed point of J in the set Y = {y ∈ X|d(J n0 x, y) < ∞}; 1 d(y, y ∗ ) ≤ 1−L d(y, Jy) for all y ∈ Y .

2010 Mathematics Subject Classification. Primary 39B62, 39B52, 47H10, 46B25. Key words and phrases. Fuzzy normed space; additive functional equation; Hyers-Ulam stability; fixed point alternative; induced fuzzy C ∗ -algebra. ∗ Corresponding author.

459

GANG LU ET AL 459-468

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

G. LU, J.XIN, C. PARK, AND Y. JIN

By using the fixed point method, the stability problems of several functional equations have been extensively investigated by a number of authors (see [8, 10, 11, 9, 16, 25, 29, 30, 33, 42]). In 1984, Katsaras [24] defined a fuzzy norm on a linear space and at the same year Wu and Fang [40] also introduced a notion of fuzzy normed space and gave the generalization of the Kolmogoroff normalized theorem for fuzzy topological linear space. In [5], Biswas defined and studied fuzzy inner product spaces in linear space. Since then some mathematicians have defined fuzzy metrics and norms on a linear space from various points of view [4, 17, 27, 38, 41]. In 1994, Cheng and Mordeson introduced a definition of fuzzy norm on a linear space in such a manner that the corresponding induced fuzzy metric is of Kramosil and Michalek type [26]. In 2003, Bag and Samanta [4] modified the definition of Cheng and Mordeson [14] by removing a regular condition. They also established a decomposition theorem of a fuzzy norm into a family of crisp norms and investigated some properties of fuzzy norms (see [3]). Following [2], we give the employing notion of a fuzzy norm. Let X be a real linear space. A function N : X × R → [0, 1](the so-called fuzzy subset) is said to be a fuzzy norm on X if for all x, y ∈ X and all a, b ∈ R: (N1 ) N (x, a) = 0 for a ≤ 0; (N2 ) x = 0 if and only if N (x, a) = 1 for all a > 0; b (N3 ) N (ax, b) = N (x, |a| ) if a 6= 0; (N4 ) N (x + y, a + b) ≥ min{N (x, a), N (y, b)}; (N5 ) N (x, .) is a non-decreasing function on R and lima→∞ N (x, a) = 1; (N6 ) For x 6= 0, N (x, .) is (upper semi) continuous on R. The pair (X, N ) is called a fuzzy normed linear space. One may regard N (x, a) as the truth value 0 of the statement the norm of x is less than or equal to the real number a . Definition 1.2. Let (X, N ) be a fuzzy normed linear space. Let xn be a sequence in X. Then xn is said to be convergent if there exists x ∈ X such that limn→∞ N (xn − x, a) = 1 for all a > 0. In that case, x is called the limit of the sequence xn and we denote it by N -limn→∞ xn = x. Definition 1.3. A sequence xn in X is called Cauchy if for each  > 0 and each a > 0 there exists n0 such that for all n ≥ n0 and all p > 0, we have N (xn+p − xn , a) > 1 − . It is known that every convergent sequence in fuzzy normed space is Cauchy. If each Cauchy sequence is convergent, then the fuzzy norm is said to be complete and the fuzzy normed space is called a fuzzy Banach space. We say that a mapping f : X → Y between fuzzy normed vector space X, Y is continuous at point x0 ∈ X if for each sequence {xn } converging to x0 in X, then the sequence {f (xn )} converges to f (x0 ). If f : X → Y is continuous at each x ∈ X, then f : X → Y is said to be continuous on X (see [2]) Definition 1.4. [32] Let X be a ∗-algebra and (X, N ) a fuzzy normed space. (1) The fuzzy normed space (X, N ) is called a fuzzy normed ∗-algebra if N (xy, st) ≥ N (x, s) · N (y, t)

and N (x∗ , t) = N (x, t).

(2) A complete fuzzy normed ∗-algebra is called a fuzzy Banach ∗-algebra.

460

GANG LU ET AL 459-468

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

APPROXIMATE n-JORDAN ∗-DERIVATIONS ON INDUCED FUZZY C ∗ -ALGEBRAS

Example 1.5. Let (X, k.k) be a normed ∗-algebra. Let  a a+kxk , a > 0 , x ∈ X, N (x, a) = 0, a ≤ 0, x ∈ X. Then N (x, t) is a fuzzy norm on X and (X, N (x, t)) is a fuzzy normed ∗-algebra. Definition 1.6. Let (X, k · k) be a C ∗ -algebra and N a fuzzy norm on X. (1) The fuzzy normed ∗-algebra (X, N ) is called an induced fuzzy normed ∗-algebra. (2) The fuzzy Banach ∗-algebra (X, N ) is called an induced fuzzy C ∗ -algebra. Definition 1.7. Let (X, k · k) be an induced fuzzy normed ∗-algebra. Then a C-linear mapping D : (X, N ) → (X, N ) is called a fuzzy n-Jordan ∗-derivation if D(xn ) = D(x)xn−1 + xD(x)xn−2 + · · · + xn−2 D(x)x + xn−1 D(x), D(x∗ ) = D(x)∗ for all x ∈ X. Throughout this paper, assume that (X, N ) is an induced fuzzy C ∗ -algebra. 2. Main results Lemma 2.1. Let (Z, N ) be a fuzzy normed vector space and f : X → Z be a mapping such that   t N (f (x − y + z) + f (x − z) + f (2x + y) , t) ≥ N f (4x) , (2.1) 2 for all x, y, z ∈ X and all t > 0. Then f is additive. Proof. Letting x = y = z = 0 in (2.1), we get     t t ≥ N f (0), N (3f (0), t) = N f (0), 3 2 for all t > 0. By (N5 ) and (N6 ), N (f (0), t) = 1 for all t > 0. It follows from (N2 ) that f (0) = 0. Letting x = y = 0 in (2.1), we get   t N (f (z) + f (−z) + f (0), t) ≥ N f (0), =1 2 for all t > 0. It follows from (N2 ) that f (−z) + f (z) = 0 for all z ∈ X. Thus f (−z) = −f (z) for all z ∈ X. Letting x = 0 in (2.1), we get N (f (z − y) + f (−z) + f (y), t) ≥ N

  t f (0), =1 2

for all t > 0. It follows from (N2 ) that f (y) + f (−z) + f (−y + z) = 0 for all y, z ∈ X. Thus f (y + z) = f (y) + f (z) for all y, z ∈ X, as desired.



461

GANG LU ET AL 459-468

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

G. LU, J.XIN, C. PARK, AND Y. JIN

Theorem 2.2. Let φ : X 3 → [0, ∞) be a function such that there exists an L < 1 with x y z  L φ , , ≤ φ(x, y, z) 2 2 2 2 for all x, y, z ∈ X. Let f : X → X be a mapping such that N (f (µ(x − y + z)) + f (µ(x − z)) + f (µ(2x + y)) − µf (4x) , t) t ≥ , t + φ(x, y, z) N f (wn ) − f (w)wn−1 − wf (w)wn−2 − · · · − wn−2 f (w)w − wn−1 f (w) t +f (v ∗ ) − f (v)∗ , t) ≥ t + φ(w, v, 0)

(2.2)

(2.3)

(2.4)

for all x, y, z, w, v ∈ X, all t > 0 and all µ ∈ T1 := {c ∈ C : |c| = 1}. Then the limit A(x) = N − limn→∞ 2n f 2xn exists for each x ∈ X and the mapping A : X → X is a fuzzy n-Jordan ∗-derivation satisfying 2(1 − L)t N (f (x) − A(x), t) ≥ (2.5) 2(1 − L)t + Lφ (x, 0, x) for all x ∈ X and all t > 0. Proof. Letting µ = 1, y = 0 , z = x in (2.3), we have N (2f (x) − f (2x), t) ≥

t t+φ

x x 2 , 0, 2

(2.6)



and so  x  t t ≥ N 2f − f (x), t ≥ x x L 2 t + φ 4 , 0, 4 t + 4 φ (x, 0, x) for all x ∈ X. Thus     x L N 2f − f (x), t ≥ 2 4

L 4t L 4t

+

L 4 φ (x, 0, x)

=

t t + φ (x, 0, x)

(2.7)

for all x ∈ X. Consider the set G := {g : X → X} and introduce the generalized metric on G: d(g, h) := inf{a ∈ R+ : N (g(x) − h(x), at) ≥

t t+φ

x x 2 , 0, 2

}

for all x ∈ X and all t > 0, where inf φ = +∞. It is easy to show that (S, d) is complete (see the proof of [?, Lemma 2.1] Now, we consider the linear mapping Q : G → G such that x Qg(x) := 2g 2 for all x ∈ X. Let g, h ∈ G be given such that d(g, h) = ε. Then t N (g(x) − h(x), εt) ≥ t + φ (x, 0, x)

462

GANG LU ET AL 459-468

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

APPROXIMATE n-JORDAN ∗-DERIVATIONS ON INDUCED FUZZY C ∗ -ALGEBRAS

for all x ∈ X and all t > 0. Hence     x x  x L  x N (Qg(x) − Qh(x), Lεt) = N 2g − 2h , Lεt = N g −h , εt 2 2 2 2 2 ≥ =

Lt 2

+

Lt 2  φ x2 , 0, x2



Lt 2 Lt 2

+ L2 φ (x, 0, x)

t t + φ (x, 0, x)

for all x ∈ X and all t > 0. Thus d(g, h) = ε implies that d(Qg, Qh) ≤ Lε. This means that d(Qg, Qh) ≤ Ld(g, h) for all g, h ∈ G. It follows from (2.7) that d(f, Qf ) ≤ L4 . By Theorem 1.1, there exists a mapping A : X → X satisfying the following: (1) A is a fixed point of Q, i.e., x 1 = A(x) A 2 2 for all x ∈ X. The mapping A is a unique fixed point of Q in the set

(2.8)

M = {g ∈ G : d(f, g) < ∞}. This implies that A is a unique mapping satisfying (2.8) such that there exists an a ∈ (0, ∞) satisfying N (f (x) − A(x), at) ≥

t t + φ (x, 0, x)

for all x ∈ X. (2) d(Qk f, A) → 0 as k → ∞. This implies the equality x N − lim 2k f k = A(x) k→∞ 2 for all x ∈ X; (3) d(f, A) ≤

1 1−L d(f, Qf ),

which implies the inequality d(f, A) ≤

L . 4(1 − L)

This implies that the inequality (2.5) holds. Next we show that A is additive. It follows from (2.2) that ∞ X

2k φ

k=0

x y z x y z  x y z 2 , , = φ(x, y, z) + 2φ , , + 2 φ , , + ··· 2 2 2 22 22 22 2k 2k 2k ≤ φ(x, y, z) + Lφ(x, y, z) + L2 φ(x, y, z) + · · · 1 = φ(x, y, z) < ∞ 1−L

for all x, y, z ∈ X.

463

GANG LU ET AL 459-468

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

G. LU, J.XIN, C. PARK, AND Y. JIN

By (2.3),           x−z 2x + y 4 x−y+z k k k k +2 f µ k +f µ − 2 µf x ,2 t N 2 f µ 2k 2 2k 2k t  ≥ x y t + φ 2k , 2k , 2zk and so  N

k



2 f



t 2k

x−y+z µ 2k





t 2k  x y , , z 2k 2k 2k

k



+2 f =

x−z µ k 2



k

+2 f



2x + y µ 2k





k

− 2 µf

  4 x ,t 2k

t t+

2k φ

for all x, y, z ∈ X, all t > 0 and all µ ∈

 x y . , z 2k 2k 2k T1 . Since limk→∞

t+2k φ

 t

x y , , z 2k 2k 2k



= 1 for all x, y, z ∈ X

and all t > 0, N (A (µ(x − y + z)) + A (µ(x − z)) + A (µ(2x + y)) − µA (4x) , t) = 1 for all x, y, z ∈ X, all t > 0 and all µ ∈ T1 . So A (µ(x − y + z)) + A (µ(x − z)) + A (µ(2x + y)) = µA (4x)

(2.9)

for all x, y, z ∈ X, all t > 0 and all µ ∈ T1 . Letting x = y = z = 0 in (2.9), we have A(0) = 0. Let µ = 1, x = 0 in (2.9), by the same reasoning as in the proof of Lemma 2.1, one can easily show that A is additive. Letting y = 2x, z = 0 in (2.9), we get  x µA(x) = 2A µ = A(µx) 2 for all x ∈ X and µ ∈ T1 . The mapping A : X → X is C-linear by [31, Theorem 2.1]. By (2.4) and letting v = 0 in (2.4), we get   n  w   w n−1  w   w n−2 w nk nk w nk N 2 f − 2 − ··· − 2 f f 2nk 2k 2k 2k 2k 2k   w n−2  w   w n−1  w  t −2nk k f k w − 2nk k f k , 2nk t ≥ t + φ( 2wk , 0, 0) 2 2 2 2 for all w ∈ X and all t > 0. Thus   n  w   w n−1  w   w n−2 w nk nk w N 2nk f − 2 f − 2 f − ··· 2nk 2k 2k 2k 2k 2k t  w n−2  w   w n−1  w   2nk −2nk k f k w − 2nk k f k ,t ≥ t 2 2 2 2 + φ( 2wk , 0, 0) 2nk t ≥ n−1 t + (2 L)k φ(w, 0, 0) for all w ∈ X and all t > 0. Since limk→∞

t t+(2n−1 L)k φ(w,0,0)

= 1 for all w ∈ X and all t > 0, we get

N (D(wn ) − D(w)wn−1 − wD(w)wn−2 − · · · − wn−2 D(w)w − wn−1 D(w), t) = 1 for all x ∈ X and all t > 0. So D(wn ) − D(w)wn−1 − wD(w)wn−2 − · · · − wn−2 D(w)w − wn−1 D(w) = 0

464

GANG LU ET AL 459-468

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

APPROXIMATE n-JORDAN ∗-DERIVATIONS ON INDUCED FUZZY C ∗ -ALGEBRAS

for all w ∈ X. Letting w = 0 in (2.4), similarly, we get D(v ∗ ) − D(v)∗ = 0 for all v ∈ X. Therefore, the mapping D : X → X is a fuzzy n-Jordan ∗-derivation.



Corollary 2.3. Let p be a real number with p > 1 , θ ≥ 0, and X be a normed vector space with norm k · k. Let f : X → X be a mapping satisfying N (f (µ(x − y + z)) + f (µ(x − z)) + f (µ(2x + y)) − µf (4x) , t) t ≥ , t + θ(kxkp + kykp + kzkp )

(2.10)

N f (wn ) − f (w)wn−1 − wf (w)wn−2 − · · · − wn−2 f (w)w − wn−1 f (w) t +f (v ∗ ) − f (v)∗ , t) ≥ t + θ(kwkp + kvkp )

(2.11)

 for all x, y, w, v ∈ X, all t > 0 and all µ ∈ T1 . Then the limit A(x) = N − limn→∞ 2n f 2xn exists for each x ∈ X and the mapping A : X → X is a fuzzy n-Jordan ∗-derivation satisfying (2p − 2)t N (f (x) − A(x), t) ≥ p (2 − 2)t + θkxkp for all x ∈ X and all t > 0. Proof. The proof follows from Theorem 2.2 by taking φ(x, y, z) = θ(kxkp + kykp + kzkp ) and L = 31−p .



Theorem 2.4. Let φ : X 3 → [0, ∞) be a function such that there exists an L < 1 with x y z  3Lφ , , ≤ φ(x, y, z) 2 2 2 for all x, y, z ∈ X. Let f : X → X be a mapping satisfying (2.3) and (2.4). Then the limit A(x) = N − limn→∞ 21n f (2n x) exists for each x ∈ X and the mapping A : X → X is a fuzzy n-Jordan ∗-derivation satisfying 2(1 − L)t N (f (x) − A(x), t) ≥ (2.12) 2(1 − L)t + φ (x, 0, x) for all x ∈ X and all t > 0. Proof. Let (G, d) be a generalized metric space defined in the proof of Theorem 2.2. Consider the linear mapping Q : G → G such that 1 Qg(x) := g(2x) 2 for all x ∈ X. It follow from (2.6) that   1 1 t N f (x) − f (2x), t ≥ 2 2 t + φ (x, 0, x) for all x ∈ X and all t > 0. Thus d(f, Qf ) ≤ 12 . Hence 1 d(f, A) ≤ , 2(1 − L)

465

GANG LU ET AL 459-468

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

G. LU, J.XIN, C. PARK, AND Y. JIN

which implies that the inequality (2.12) holds. The rest of the proof is similar to the proof of Theorem 2.2.



Corollary 2.5. Let θ ≥ 0 and let p be a positive real number with p < 1. Let X be a normed vector space with normed k · k. Let f : X → X be a mapping satisfying (2.10) and (2.11). Then A(x) = N − limn→∞ 31n f (3n x) exists for each x ∈ X and defines a fuzzy n-Jordan ∗-derivation A : X → X such that (2 − 2p )t N (f (x) − A(x), t) ≥ (2 − 2p )t + θkxkp for all x ∈ X and all t > 0. Proof. The proof follows from Theorem 2.4 by taking φ(x, y, z) = θ(kxkp + kykp + kzkp ) and L = 3p−1 .

 Acknowledgments

G. Lu was supported by the Project Sponsored by Natural Science Foundation of Liaoning Province (No.201602547). Y.jin was supported by National Natural Science Foundation of China(11361066); and the Department of Science and Technology of JiLin Province(No.20170101052JC); and the Education Department of Jilin Province. References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16]

T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan 2 (1950), 64–66. T. Bag and S .K. Samanta, Finite dimensional fuzzy normed linear spaces, J. Fuzzy Math. 11 (2003), 687–705. T. Bag and S. K. Samanta, Fuzzy bounded linear operators, Fuzzy Sets Syst. 151 (2005), 513–547. V. Balopoulos, A. G. Hatzimichailidis and B. K. Papadopoulos, Distance and similarity measures for fuzzy operators, Inform. Sci. 177 (2007), 2336–2348. R. Biswas, Fuzzy inner product spaces and fuzzy norm functions, Inform. Sci. 53 (1991), 185–190. N. Brillou¨et-Belluot, J. Brzd¸ek and K. Ciepli´ nski, On some recent developments in Ulam’s type stability, Abs. Appl. Anal. 2012, Article ID 716936 (2012). J. Brzdek, Hyperstability of the Cauchy equation on restricted domains, Acta Math. Hungarica 141 (2013), 58–67. J. Brzd¸ek, J. Chudziak and Zs. P´ ales, A fixed point approach to stability of functional equations, Nonlinear Anal.–TMA 74 (2011), 6728–6732. K. Ciepli´ nski, Applications of fixed point theorems to the Hyers-Ulam stability of functional equations–a survey, Ann. Funct. Anal. 3 (2012), 151–164. L. C˘ adariu, L. G˘ avruta and P. G˘ avruta, Fixed points and generalized Hyers-Ulam stability, Abs. Appl. Anal. 2012, Article ID 712743 (2012). L. C˘ adariu and V. Radu, Fixed points and the stability of Jensen’s functional equation, J. Inequal. Pure Appl. Math. 4 (2003), No. 1, Article ID 4. A. Chahbi and N. Bounader, On the generalized stability of d’Alembert functional equation, J. Nonlinear Sci. Appl. 6 (2013), 198–204. I. Chang, M. Eshaghi Gordji, H. Khodaei and H. Kim, Nearly quartic mappings in β-homogeneous F -spaces, Results Math. 63 (2013), 529–541. S. C. Cheng and J. N. Mordeson, Fuzzy linear operator and fuzzy normed linear spaces, Bull. Calcutta Math. Soc. 86 (1994), 429–436. J.B. Diaz and B. Margolis, A fixed point theorem of the alternative for contractions on a generalized complete metric space, Bull. Amer. Math. Soc. 44 (1968), 305–309. M. Eshaghi Gordji, H. Khodaei, Th. M. Rassias and R. Khodabakhsh, J ∗ -homomorphisms and J ∗ -derivations on J ∗ -algebras for a generalized Jensen type functional equation, Fixed Point Theory 13 (2012), 481–494.

466

GANG LU ET AL 459-468

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

APPROXIMATE n-JORDAN ∗-DERIVATIONS ON INDUCED FUZZY C ∗ -ALGEBRAS

[17] C. Felbin, Finite dimensional fuzzy normed linear space, Fuzzy Sets Syst. 48 (1992), 239–248. [18] P. Gˇ avruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings, J. Math. Anal. Appl. 184 (1994), 431–436. [19] D. H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. USA 27 (1941), 222–224. [20] D. H. Hyers, G. Isac and Th. M. Rassias, Stability of Functional Equations in Several Variables, Birkh¨ auser, Basel, 1998. [21] G. Isac and Th.M. Rassias, On the Hyers-Ulam stability of ψ-additive mappings, J. Approx. Theory 72 (1993), 131–137. [22] W. Jablo´ nski, Sum of graphs of continuous functions and boundedness of additive operators, J. Math. Anal. Appl. 312 (2005), 527–534. [23] S. Jung, Hyers-Ulam-Rassias Stability of Functional Equations in Nonlinear Analysis, Springer, New York, 2011. [24] A. K. Katsaras, Fuzzy topological vector spaces II, Fuzzy Sets Syst. 12 (1984), 143–154. [25] H. Khodaei, R. Khodabakhsh and M. Eshaghi Gordji, Fixed points, Lie ∗-homomorphisms and Lie ∗-derivations on Lie C ∗ -algebras, Fixed Point Theory 14 (2013), 387–400. [26] I. Kramosil and J. Michalek, Fuzzy metric and statistical metric spaces, Kybernetica 11 (1975), 326–334. [27] S. V. Krishna and K. K. M. Sarma, Separation of fuzzy normed linear spaces, Fuzzy Sets Syst. 63 (1994), 207–217. [28] G. Lu and C. Park, Hyers-Ulam stability of additive set-valued functional equations, Appl. Math. Lett. 24 (2011), 1312–1316. [29] F. Moradlou and M. Eshaghi Gordji, Approximate Jordan derivations on Hilbert C ∗ -modules, Fixed Point Theory 14 (2013), 413–425. [30] C. Park, Fixed points and Hyers-Ulam-Rassias stability of Cauchy-Jensen functional equations in Banach algebras, Fixed Point Theory Appl. 2007, Article ID 50175 (2007). [31] C.Park, Homomorphisms between Poisson JC ∗ -algebras, Bull. Braz. Math. Soc. 36 (2005), 79–97. [32] C. Park, K. Ghasemi and S. Ghaleh, Fuzzy n-Jordan ∗-derivations on induced fuzzy C ∗ -algebras, J. Comput. Anal. Appl. 16 (2014), 494–502. [33] C. Park and J. M. Rassias, Stability of the Jensen-type functional equation in C ∗ -algebras: A fixed point approach, Abs. Appl. Anal. 2009, Article ID 360432 (2009). [34] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 (1978), 297–300. [35] Th. M. Rassias (Ed.), Functional Equations and Inequalities, Kluwer Academic, Dordrecht, 2000. [36] Th. M. Rassias, On the stability of functional equations in Banach spaces, J. Math. Anal. Appl. 251 (2000), 264–284. [37] Th .M. Rassias, On the stability of functional equations and a problem of Ulam, Acta Math. Appl. 62 (2000), 23–130. [38] B. Shieh, Infinite fuzzy relation equations with continuous t-norms, Inform. Sci. 178 (2008), 1961–1967. [39] S.M. Ulam, Problems in Modern Mathematics, Chapter VI, Science ed., Wiley, New York, 1940. [40] C. Wu and J. Fang, Fuzzy generalization of Klomogoroff ’s theorem, J. Harbin Inst. Technol. 1 (1984), 1–7. [41] J. Z. Xiao and X.-H. Zhu, Fuzzy normed spaces of operators and its completeness, Fuzzy Sets Syst. 133 (2003), 389–399. [42] T. Z. Xu, J. M. Rassias and W. X. Xu, A fixed point approach to the stability of a general mixed additive-cubic functional equation in quasi fuzzy normed spaces, Internat. J. Phys. Sci. 6 (2011), 313–324.

467

GANG LU ET AL 459-468

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

G. LU, J.XIN, C. PARK, AND Y. JIN

Gang Lu Department of Mathematics, Zhejiang University, Hangzhou 310027, People’s Republic of China Department of Mathematics, School of Science, ShenYang University of Technology, Shenyang 110178, People’s Republic of China E-mail address: [email protected] Jincheng Xin DDepartment of Mathematics, School of Science, ShenYang University of Technology, Shenyang 110178, People’s Republic of China E-mail address: [email protected] Choonkil Park Department of Mathematics, Research Institute for Natural Sciences, Hanyang University, Seoul 04763, Republic of Korea E-mail address: [email protected] Jincheng Xin Department of Mathematics, Yanbian University , Yanji 133001, People’s Republic of China E-mail address: [email protected]

468

GANG LU ET AL 459-468

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

RECURRENCE FORMULAS FOR EULERIAN POLYNOMIALS OF TYPE B AND TYPE D DAN-DAN SU AND YUAN HE

Abstract. We perform a further investigation for the Eulerian polynomials of type B and type D. By making use of the generating function methods and Pad´ e approximation techniques, we establish some new recurrence formulas for the Eulerian polynomials of type B and type D. Some of these results presented here are the corresponding extensions of some known formulas.

1. Introduction When computing values of the alternating ζ-function (also called Dirichlet eta function) η(s) =

∞ X (−1)n−1 1 1 1 = 1 − s + s − s + ··· s n 2 3 4 n=1

(Re(s) > 0)

(1.1)

at negative integers, Leonhard Euler introduced the Eulerian polynomials An (t) given by the following generating function ∞ X t−1 xn = An (t) , x(t−1) n! t−e n=0

(1.2)

and determined η(−n) = 2−n−1 An (−1) for positive integer n. It is interesting to point out that the Eulerian polynomials can be computed by the recurrence relation (see, e.g., [7]) A0 (t) = 1,

An (t) = [1 + (n − 1)t]An−1 (t) + t(1 − t)

∂ (An−1 (t)) ∂t

(n ≥ 1), (1.3)

and some classical polynomials and numbers can be expressed by the Eulerian polynomials (see [15] for details). The Eulerian polynomials are also called the Eulerian polynomials of type A, and various combinatorial identities for them have been explored by many authors (see, e.g., [8, 10, 12, 13, 14, 15, 16, 20]). Perhaps the best known result is Leonhard Euler’s recurrence formula (see, e.g., [7]) A0 (t) = 1,

An (t) =

n−1 X k=0

 n Ak (t)(t − 1)n−1−k k

(n ≥ 1).

(1.4)

2010 Mathematics Subject Classification. 11B83; 05A19. Keywords. Eulerian polynomials of type B; Eulerian polynomials of type D; Pad´ e approximants; Recurrence formulas. 1

469

DAN-DAN SU ET AL 469-483

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

DAN-DAN SU AND YUAN HE

We now turn to the Eulerian polynomials of type B and the Eulerian polynomials of type D, which are defined by means of the generating function (see, e.g., [3, 6])

and

∞ X (1 − t)ex(1−t) xn = Bn (t) , 2x(1−t) n! 1 − te n=0

(1.5)

∞ X (1 − t)ex(1−t) − xt(1 − t)e2x(1−t) xn = Dn (t) , 2x(1−t) n! 1 − te n=0

(1.6)

respectively. Like the recurrence relation (1.3) of the Eulerian polynomials of type A, the Eulerian polynomials of type B satisfy the recurrence relation (see, e.g., [3]) ∂ (Bn−1 (t)) (n ≥ 1), (1.7) ∂t and the Eulerian polynomials of type D obey the recurrence relation (see, e.g., [6]): D0 (t) = D1 (t) = 1, Bn (t) = [1+ (2n − 1)t]Bn−1 (t) + 2(t − t2 )

B0 (t) = 1,

∂ (Dn+1 (t)) ∂t +[(1 − t)2 − n(1 + 3t)2 − 4n(n − 1)t(1 + 2t)]Dn (t) ∂ ∂2 −[4nt(1 − t)(1 + 3t) + 4t(1 − t)2 ] (Dn (t)) − 4t2 (1 − t)2 2 (Dn (t)) ∂t ∂ t +[2n(n − 1)t(3 + 2t + 3t2 ) − 4n(n − 1)(n − 2)t2 (1 + t)]Dn−1 (t) ∂ +[2nt(1 − t)2 (3 + t) + 8n(n − 1)t2 (1 − t)(1 + t)] (Dn−1 (t)) ∂t ∂2 +4nt2 (1 − t)2 (1 + t) 2 (Dn−1 (t)) (n ≥ 1). (1.8) ∂ t In the year 2016, Hyatt [11] discovered the corresponding recurrence formulas analogous to (1.4) for the Eulerian polynomials of type B and type D, as follows, n−1−k n−1 n−1 X n X n  1  1 Bn (t) = Bk (t)(t − 1)n−1−k + tn Bk −1 k k t t Dn+2 (t)

=

[n(1 + 5t) + 4t]Dn+1 (t) + 4t(1 − t)

k=0

k=0

n

= Pn (t) + t Pn (1/t)

(n ≥ 1),

(1.9)

and Dn (t)

=

n−1 X k=0

n−1−k  n−1 X n  1  1 n n−1−k n −1 Dk (t)(t − 1) +t Dk t t k k

= Qn (t) + tn Qn (1/t)

k=0

(n ≥ 2),

(1.10)

say, and interpreted them combinatorially. It is worth mentioning that the polynomials Pn (t), tn Pn (1/t), Qn (t), tn Qn (1/t) were introduced by Savage and Visontai [21] and used to prove Brenti’s [3] conjecture that the Eulerian polynomials of type D have only real roots. See also [11] for a further exploration for Pn (t), tn Pn (1/t), Qn (t), tn Qn (1/t). Motivated and inspired by the work of Hyatt [11], in this paper we establish some new recurrence formulas for the Eulerian polynomials of type B and type D by making use of the generating function methods and Pad´e approximation techniques. Some of these results presented here are the corresponding extensions of Hyatt’s recurrence formulas (1.9) and (1.10).

470

DAN-DAN SU ET AL 469-483

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FORMULAS FOR EULERIAN POLYNOMIALS OF TYPE B AND TYPE D

3

This paper is organized as follows. In the second section, we recall Pad´e approximation to general series and their expression in the case of the exponential function. In the third section, we give some recurrence formulas for Eulerian polynomials of type B, and show the recurrence formula (1.9) is obtained as a special case. In the fourth section, we establish some recurrence formulas for Eulerian polynomials of type D, by virtue of which the recurrence formula (1.10) is deduced. ´ approximants 2. Pade It is well known that Pad´e approximants provide rational approximations to functions formally defined by a power series expansion, and have played important roles in many fields of mathematics, physics and engineering (see, e.g., [4, 17]). We here recall the definition of Pad´e approximation to general series and their expression in the case of the exponential function. Let m, n be non-negative integers and let Pk be the set of all polynomials of degree ≤ k. Given a function f with a Taylor expansion ∞ X f (t) = ck t k (2.1) k=0

in a neighborhood of the origin, a Pad´e form of type (m, n) is a pair (P, Q) such that m n X X P = pk tk ∈ Pm , Q = qk tk ∈ Pn (Q 6≡ 0), (2.2) k=0

k=0

and Qf − P = O(tm+n+1 ) as t → 0. (2.3) It is clear that every Pad´e form of type (m, n) for f (t) always exists and satisfies the same rational function, and the uniquely determined rational function P/Q is called the Pad´e approximant of type (m, n) for f (t); see for example, [1, 5]. For nonnegative integers m, n, the Pad´e approximant of type (m, n) for the exponential function et is the unique rational function (see, e.g., [9, 18]) Rm,n (t) =

Pm (t) Qn (t)

(Pm ∈ Pm , Qn ∈ Pn , Qn (0) = 1),

(2.4)

which obeys the property et − Rm,n (t) = O(tm+n+1 )

as t → 0.

(2.5)

In fact, the explicit formulas for Pm and Qn can be expressed as follows (see, e.g., [2, 19]): m X (m + n − k)! · m! tk Pm (t) = · , (2.6) (m + n)! · (m − k)! k! k=0

n X (m + n − k)! · n! (−t)k Qn (t) = · , (m + n)! · (n − k)! k!

(2.7)

k=0

and

Z 1 tm+n+1 Qn (t)e − Pm (t) = (−1) xn (1 − x)m ext dx, (2.8) (m + n)! 0 where Pm (t) and Qn (t) is called the Pad´e numerator and denominator of type (m, n) for et , respectively. t

n

471

DAN-DAN SU ET AL 469-483

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

DAN-DAN SU AND YUAN HE

We shall use the above properties of Pad´e approximants to the exponential function to establish some new recurrence formulas for the Eulerian polynomials of type B and type D in next sections. 3. Recurrence formulas for Eulerian polynomials of type B Let m, n be non-negative integers. It is easily seen that if we denote the right hand side of (2.8) by Sm,n (t) then we have et =

Pm (t) + Sm,n (t) . Qn (t)

(3.1)

By multiplying the numerator and denominator in the left hand side of (1.5) by ex(t−1) and then respectively substituting x(t − 1) and x(1 − t) for t in (3.1), we discover  Pm (x(t − 1)) + Sm,n (x(t − 1)) Qn (x(t − 1)) ∞ xn Pm (x(1 − t)) + Sm,n (x(1 − t)) X Bn (t) = 1 − t, (3.2) −t Qn (x(1 − t)) n! n=0 which means [Pm (x(t − 1)) + Sm,n (x(t − 1))]Qn (x(1 − t))

∞ X n=0

Bn (t)

xn n!

− t[Pm (x(1 − t)) + Sm,n (x(1 − t))]Qn (x(t − 1))

∞ X

Bn (t)

n=0

xn n!

= (1 − t)Qn (x(t − 1))Qn (x(1 − t)). (3.3) P∞ We now apply the exponential series ext = k=0 xk tk /k! in the right hand side of (2.8). With the help of the beta function, we obtain ∞ k Z 1 m+n+1 X t n t xn+k (1 − x)m dx Sm,n (t) = (−1) (m + n)! k! 0 k=0

=

∞ X k=0

(−1)n · m! · (n + k)! tm+n+k+1 · . (m + n)! · (m + n + k + 1)! k!

(3.4)

Let pm,n;k , qm,n;k and sm,n;k be the coefficients of the polynomials Pm (t), Qn (t) and Sm,n (t) given by Pm (t) =

m X

pm,n;k tk ,

Qn (t) =

k=0

n X

qm,n;k tk ,

k=0

Sm,n (t) =

∞ X

sm,n;k tm+n+k+1 .

k=0

(3.5) It follows from (2.6), (2.7) and (3.4) that pm,n;k =

m! · (m + n − k)! , k! · (m + n)! · (m − k)!

and sm,n;k =

qm,n;k =

(−1)k · n! · (m + n − k)! , k! · (m + n)! · (n − k)!

(−1)n · m! · (n + k)! . k! · (m + n)! · (m + n + k + 1)!

472

(3.6)

(3.7)

DAN-DAN SU ET AL 469-483

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FORMULAS FOR EULERIAN POLYNOMIALS OF TYPE B AND TYPE D

5

If we apply (3.5) to (3.3) then we get X m

i

i

pm,n;i x (t − 1) +

i=0

×

∞ X

n X

X m

qm,n;j xj (1 − t)j i

i

pm,n;i x (1 − t) +

n X

∞ X

Bk (t)

k=0

i=0

×

m+n+i+1



(t − 1)

i=0

j=0

−t

sm,n;i x

m+n+i+1

qm,n;j xj (t − 1)j

j=0

∞ X

xk k!

sm,n;i x

i=0 ∞ X

Bk (t)

k=0

m+n+i+1

m+n+i+1



(1 − t)

xk k!

X X  n n i i j j = (1 − t) qm,n;i x (t − 1) qm,n;j x (1 − t) , i=0

(3.8)

j=0

which together with the Cauchy product yields ∞ X

X

pm,n;i (t − 1)i qm,n;j (1 − t)j

l=0 i+j+k=l i,j,k≥0 ∞ X

+

X

sm,n;i (t − 1)m+n+i+1 qm,n;j (1 − t)j

l=0 i+j+k=l−m−n−1 i,j,k≥0 ∞ X X

pm,n;i (1 − t)i qm,n;j (t − 1)j

−t

−t

Bk (t) l x k!

l=0 i+j+k=l i,j,k≥0 ∞ X X

Bk (t) l x k!

sm,n;i (1 − t)m+n+i+1 qm,n;j (t − 1)j

l=0 i+j+k=l−m−n−1 i,j,k≥0 ∞ X X

qm,n;i (t − 1)i qm,n;j (1 − t)j xl .

= (1 − t)

Bk (t) l x k!

Bk (t) l x k!

(3.9)

l=0 i+j=l i,j≥0

Comparing the coefficients of xl in (3.9) gives that for non-negative integer l with 0 ≤ l ≤ m + n, X

pm,n;i (t − 1)i qm,n;j (1 − t)j

i+j+k=l i,j,k≥0

−t

X

pm,n;i (1 − t)i qm,n;j (t − 1)j

i+j+k=l i,j,k≥0

= (1 − t)

Bk (t) k!

X

Bk (t) k!

qm,n;i (t − 1)i qm,n;j (1 − t)j .

(3.10)

i+j=l i,j≥0

473

DAN-DAN SU ET AL 469-483

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

DAN-DAN SU AND YUAN HE

Observe that 1

(1 − 1t )ext(1− t ) (1 − t)ex(1−t) = . 1 1 − te2x(1−t) 1 − 1t e2xt(1− t )

(3.11)

It follows from (1.5) and (3.11) that   1 Bn (t) = t Bn t n

(n ≥ 0).

(3.12)

By applying (3.12) to (3.10), we get X Bk (t) (−1)j pm,n;i qm,n;j (t − 1)i+j k! i+j+k=l i,j,k≥0

−tl+1

X

(−1)j pm,n;i qm,n;j

i+j+k=l i,j,k≥0

= −(t − 1)l+1

X



1 −1 t

i+j

Bk ( 1t ) k!

(−1)j qm,n;i qm,n;j .

(3.13)

i+j=l i,j≥0

Thus, applying (3.6) to (3.13) gives the following result. Theorem 3.1. Let m, n be non-negative integers. Then, for non-negative integer l with 0 ≤ l ≤ m + n, X mn Bk (t) (m + n − i)! · (m + n − j)! · (t − 1)i+j k! i j i+j+k=l i,j,k≥0

X

− tl+1

i+j+k=l i,j,k≥0

    i+j Bk ( 1t ) m n 1 (m + n − i)! · (m + n − j)! · −1 t k! i j

= −(t − 1)l+1

 l   X n n (−1)i (m + n − i)! · (m + n + i − l)!. (3.14) i l − i i=0

We next discuss some special cases of Theorem 3.1. By taking l = m + n in Theorem 3.1, we have Corollary 3.2. Let m, n be non-negative integers. Then    X m n Bk (t) (m + n − i)! · (m + n − j)! · (t − 1)i+j k! i j i+j+k=m+n i,j,k≥0

− tm+n+1

X i+j+k=m+n i,j,k≥0

    i+j Bk ( 1t ) m n 1 (m + n − i)! · (m + n − j)! · −1 i j t k!

= −(t − 1)m+n+1

m+n X i=0

n i



 n (−1)i (m + n − i)! · i!. (3.15) m+n−i

If we take n = 0 in Theorem 3.1 then we have

474

DAN-DAN SU ET AL 469-483

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FORMULAS FOR EULERIAN POLYNOMIALS OF TYPE B AND TYPE D

7

Corollary 3.3. Let m be non-negative integer. Then, for non-negative integer l with 0 ≤ l ≤ m, i  X m X m Bk ( 1t ) Bk (t) 1 (m − i)! · (t − 1)i − tl+1 −1 (m − i)! · i k! t k! i

i+k=l i,k≥0

i+k=l i,k≥0

= −(t − 1)l+1

  0 · (m − l)!. (3.16) l

In particular, by taking l = m and substituting n for m in Corollary 3.3, we have Corollary 3.4. Let n be a positive integer. Then n−k   n   n   X X n 1 n 1 n−k n+1 . Bk (t)(t − 1) −1 =t Bk k t t k k=0

(3.17)

k=0

The above Corollary 3.4 can be easily used to give Hyatt’s recurrence formula (1.9). For example, by multiplying the both sides of (3.17) by 1/(t − 1), we get that for positive integer n,   n−1−k n   n   X X n n 1 1 n−1−k n Bk (t)(t − 1) = −t Bk −1 , (3.18) k k t t k=0

k=0

which means n−1   Bn (t) X n + Bk (t)(t − 1)n−1−k t−1 k k=0 n−1−k n+1   n−1 X n  1  1 t 1 n Bk −1 + Bn = −t . (3.19) k t t t−1 t k=0

Hence, applying (3.12) to (3.19) gives the recurrence formula (1.9) immediately. We next consider the case l being a positive integer with l ≥ m + n + 1 in (3.9). By comparing the coefficients of xl in (3.9), we obtain X

pm,n;i (t − 1)i qm,n;j (1 − t)j

i+j+k=l i,j,k≥0

X

+

Bk (t) k!

sm,n;i (t − 1)m+n+i+1 qm,n;j (1 − t)j

i+j+k=l−m−n−1 i,j,k≥0

−t

X

pm,n;i (1 − t)i qm,n;j (t − 1)j

i+j+k=l i,j,k≥0

X

−t

Bk (t) k!

sm,n;i (1 − t)m+n+i+1 qm,n;j (t − 1)j

i+j+k=l−m−n−1 i,j,k≥0

= (1 − t)

X

Bk (t) k!

qm,n;i (t − 1)i qm,n;j (1 − t)j ,

Bk (t) k! (3.20)

i+j=l i,j≥0

475

DAN-DAN SU ET AL 469-483

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

DAN-DAN SU AND YUAN HE

which together (3.12) gives X

(−1)j pm,n;i qm,n;j (t − 1)i+j

i+j+k=l i,j,k≥0

X

+(t − 1)m+n+1

Bk (t) k!

(−1)j sm,n;i qm,n;j (t − 1)i+j

i+j+k=l−m−n−1 i,j,k≥0

X

l+1

−t



j

(−1) pm,n;i qm,n;j

i+j+k=l i,j,k≥0

−tl+1



m+n+1 1 −1 t

= −(t − 1)l+1

X

1 −1 t

X

i+j

Bk (t) k!

Bk ( 1t ) k!

(−1)j sm,n;i qm,n;j



i+j+k=l−m−n−1 i,j,k≥0

1 −1 t

i+j

(−1)j qm,n;i qm,n;j .

Bk ( 1t ) k! (3.21)

i+j=l i,j≥0

Thus, by taking l = m + n + 1 and applying (3.6) and (3.7) to (3.21), in view of B0 (t) = 1, we get the following result. Theorem 3.5. Let m, n be non-negative integers with m ≥ n. Then    X m n Bk (t) (m + n − i)! · (m + n − j)! · (t − 1)i+j i j k! i+j+k=m+n+1 i,j,k≥0

−t

m+n+2

X i+j+k=m+n+1 i,j,k≥0

    i+j Bk ( 1t ) m n 1 (m + n − i)! · (m + n − j)! · −1 i j t k! = −[(−1)m t + (−1)n ](t − 1)m+n+1

m! · n! . (3.22) m+n+1

If we take n = 0 and substitute n for m in Theorem 3.5, we have Corollary 3.6. Let n be a non-negative integer. Then n   X n Bk+1 (t) k=0

k

k+1

n−k

(t − 1)

−t

n+2

 n   X n Bk+1 ( 1 ) 1 t

k=0

k

k+1

t

n−k −1

= −[(−1)n t + 1]

(t − 1)n+1 . (3.23) n+1

If we multiply the both sides of (3.23) by 1/(t − 1), we get that for non-negative integer n, n   X n Bk+1 (t) k=0

k

k+1

(t − 1)n−1−k + tn+1

 n   X n Bk+1 ( 1 ) 1 t

k=0

k

k+1

t

n−1−k −1

= −[(−1)n t + 1]

476

(t − 1)n , (3.24) n+1

DAN-DAN SU ET AL 469-483

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FORMULAS FOR EULERIAN POLYNOMIALS OF TYPE B AND TYPE D

9

which implies n−1 X k=0

 n−1−k n−1 X n Bk+1 ( 1 )  1 n Bk+1 (t) t (t − 1)n−1−k + tn+1 −1 k k+1 k k+1 t k=0

n+2

=

t · t−1

Bn+1 ( 1t ) n+1



1 Bn+1 (t) (t − 1)n · − [(−1)n t + 1] . (3.25) t−1 n+1 n+1

It follows from (3.12) and (3.25) that n−1   Bn+1 (t) X n Bk+1 (t) = (t − 1)n−1−k n+1 k k+1 k=0 n−1−k n−1 X n Bk+1 ( 1 )  1 t + tn+1 −1 k k+1 t k=0

+ [(−1)n t + 1]

(t − 1)n n+1

(n ≥ 1), (3.26)

which can be regarded as an analogous version to Hyatt’s recurrence formula (1.9).

4. Recurrence formulas for Eulerian polynomials of type D We now multiply the numerator and denominator in the left hand side of (1.6) by ex(t−1) , we have ∞ X (1 − t) − xt(1 − t)ex(1−t) xn Dn (t) , = x(t−1) x(1−t) n! e − te n=0

(4.1)

which together with (3.1) gives 

Pm (x(t − 1)) + Sm,n (x(t − 1)) Qn (x(t − 1)) −t

∞ Pm (x(1 − t)) + Sm,n (x(1 − t)) X xn Dn (t) Qn (x(1 − t)) n! n=0 = (1 − t) − xt(1 − t)

Pm (x(1 − t)) + Sm,n (x(1 − t)) . (4.2) Qn (x(1 − t))

It is obvious that (4.2) can be rewritten as [Pm (x(t − 1)) + Sm,n (x(t − 1))]Qn (x(1 − t))

∞ X n=0

Dn (t)

xn n!

− t[Pm (x(1 − t)) + Sm,n (x(1 − t))]Qn (x(t − 1))

∞ X n=0

Dn (t)

xn n!

= (1 − t)Qn (x(t − 1))Qn (x(1 − t)) − xt(1 − t)[Pm (x(1 − t)) + Sm,n (x(1 − t))]Qn (x(t − 1)). (4.3)

477

DAN-DAN SU ET AL 469-483

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

DAN-DAN SU AND YUAN HE

If we apply (3.5) to (4.3) then we have X m

pm,n;i xi (t − 1)i +

i=0

∞ X

sm,n;i xm+n+i+1 (t − 1)m+n+i+1



i=0 n X

×

qm,n;j xj (1 − t)j

j=0

∞ X

Dk (t)

k=0

xk k!

X  m ∞ X i i m+n+i+1 m+n+i+1 −t pm,n;i x (1 − t) + sm,n;i x (1 − t) i=0 n X

×

qm,n;j xj (t − 1)j

j=0

i=0 ∞ X

Dk (t)

k=0

xk k!

X X  n n i i j j = (1 − t) qm,n;i x (t − 1) qm,n;j x (1 − t) i=0

j=0

 X m ∞ X i i m+n+i+1 m+n+i+1 pm,n;i x (1 − t) + sm,n;i x (1 − t) −xt(1 − t) i=0 n X

×

i=0

qm,n;j xj (t − 1)j .

(4.4)

j=0

It follows from (4.4) and the Cauchy product that ∞ X

X

pm,n;i (t − 1)i qm,n;j (1 − t)j

l=0 i+j+k=l i,j,k≥0 ∞ X

+

X

sm,n;i (t − 1)m+n+i+1 qm,n;j (1 − t)j

l=0 i+j+k=l−m−n−1 i,j,k≥0 ∞ X X

pm,n;i (1 − t)i qm,n;j (t − 1)j

−t

−t

Dk (t) l x k!

l=0 i+j+k=l i,j,k≥0 ∞ X X

Dk (t) l x k!

Dk (t) l x k!

sm,n;i (1 − t)m+n+i+1 qm,n;j (t − 1)j

l=0 i+j+k=l−m−n−1 i,j,k≥0 ∞ X X

Dk (t) l x k!

qm,n;i (t − 1)i qm,n;j (1 − t)j xl

= (1 − t)

l=0 i+j=l i,j≥0 ∞ X X

−t(1 − t)

−t(1 − t)

pm,n;i (1 − t)i qm,n;j (t − 1)j xl

l=0 i+j=l−1 i,j≥0 ∞ X X

sm,n;i (1 − t)m+n+i+1 qm,n;j (t − 1)j xl . (4.5)

l=0 i+j=l−m−n−2 i,j,k≥0

478

DAN-DAN SU ET AL 469-483

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FORMULAS FOR EULERIAN POLYNOMIALS OF TYPE B AND TYPE D

11

By comparing the coefficients of xl in (4.5), we get that for non-negative integer l with 0 ≤ l ≤ m + n, X Dk (t) pm,n;i (t − 1)i qm,n;j (1 − t)j k! i+j+k=l i,j,k≥0

−t

X

pm,n;i (1 − t)i qm,n;j (t − 1)j

i+j+k=l i,j,k≥0

= (1 − t)

X

Dk (t) k!

qm,n;i (t − 1)i qm,n;j (1 − t)j

i+j=l i,j≥0

−t(1 − t)

X

pm,n;i (1 − t)i qm,n;j (t − 1)j .

(4.6)

i+j=l−1 i,j≥0

Observe that (1 − t)ex(1−t) − xt(1 − t)e2x(1−t) (1 − t)ex(1−t) t−1 = − xt . 2x(1−t) 2x(1−t) 1 − te 1 − te t − e2x(t−1) Applying (1.2), (1.5) and (1.6) to (4.7) gives

(4.7)

Dn (t) = Bn (t) − n2n−1 tAn−1 (t)

(4.8)

(n ≥ 0).

It follows from (3.12) and (4.8) that     1 1 Dn (t) = tn Dn +n2n−1 tn−1 An−1 −n2n−1 tAn−1 (t) t t

(n ≥ 0).

(4.9)

Hence, in light of (4.9), we can rewrite (4.6) as X Dk (t) (−1)j pm,n;i qm,n;j (t − 1)i+j k! i+j+k=l i,j,k≥0 l+1

−t

X



j

(−1) pm,n;i qm,n;j

i+j+k=l i,j,k≥0

=t

X

1 −1 t

(−1)j pm,n;i qm,n;j (1 − t)i+j

i+j+k=l i,j,k≥0

−(t − 1)l+1

X

i+j

k2k−1 (tk−1 Ak−1 ( 1t ) − tAk−1 (t)) k!

(−1)j qm,n;i qm,n;j − t(1 − t)l

i+j=l i,j≥0

=t

X

i+j+k=l−1 i,j,k≥0

X

X

(−1)j pm,n;i qm,n;j

i+j=l−1 i,j≥0

(−1)j pm,n;i qm,n;j (1 − t)i+j

−(t − 1)l+1

Dk ( 1t ) k!

2k (tk Ak ( 1t ) − tAk (t)) k!

(−1)j qm,n;i qm,n;j

i+j=l i,j≥0

−t(1 − t)l

X

(−1)j pm,n;i qm,n;j .

(4.10)

i+j=l−1 i,j≥0

479

DAN-DAN SU ET AL 469-483

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12

DAN-DAN SU AND YUAN HE

Noticing that from (1.2) we have (1 − t)ex(t−1) t(1 − t)ex(1−t) − ex(t−1) − tex(1−t) ex(t−1) − tex(1−t)     n ∞ X 1 x n n = (2t) An −2 tAn (t) , t n! n=0

1−t =

which implies     1 20 t0 A0 −tA0 (t) = 1 − t, t

    1 2n tn An −tAn (t) = 0 t

(4.11)

(n ≥ 1).

(4.12)

So from (4.10) and (4.12), we obtain X Dk (t) (−1)j pm,n;i qm,n;j (t − 1)i+j k! i+j+k=l i,j,k≥0 l+1

−t

X



j

(−1) pm,n;i qm,n;j

i+j+k=l i,j,k≥0

= −(t − 1)l+1

X

i+j Dk ( 1t ) 1 −1 t k!

(−1)j qm,n;i qm,n;j .

(4.13)

i+j=l i,j≥0

Thus, applying (3.6) to (4.13) gives the following result. Theorem 4.1. Let m, n be non-negative integers. Then, for non-negative integer l with 0 ≤ l ≤ m + n, X mn Dk (t) (m + n − i)! · (m + n − j)! · (t − 1)i+j k! i j i+j+k=l i,j,k≥0

−t

X

l+1

i+j+k=l i,j,k≥0

i+j     Dk ( 1t ) m n 1 −1 (m + n − i)! · (m + n − j)! · t k! i j

= −(t − 1)l+1

 l   X n n (−1)i (m + n − i)! · (m + n + i − l)!. (4.14) i l − i i=0

It becomes obvious that taking l = m + n in Theorem 4.1 gives the following result. Corollary 4.2. Let m, n be non-negative integers. Then    X m n Dk (t) (m + n − i)! · (m + n − j)! · (t − 1)i+j i j k! i+j+k=m+n i,j,k≥0 m+n+1

−t

    i+j Dk ( 1t ) m n 1 −1 (m + n − i)! · (m + n − j)! · i j t k!

X i+j+k=m+n i,j,k≥0

m+n+1

= −(t − 1)

m+n X i=0

n i



 n (−1)i (m + n − i)! · i!. (4.15) m+n−i

480

DAN-DAN SU ET AL 469-483

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FORMULAS FOR EULERIAN POLYNOMIALS OF TYPE B AND TYPE D

13

If we take n = 0 in Theorem 4.1 then we have Corollary 4.3. Let m be non-negative integer. Then, for non-negative integer l with 0 ≤ l ≤ m,  i X m X m Dk ( 1t ) 1 Dk (t) (m − i)! · (t − 1)i − tl+1 (m − i)! · −1 i k! i t k! i+k=l i,k≥0

i+k=l i,k≥0

= −(t − 1)l+1

  0 · (m − l)!. (4.16) l

In particular, by taking l = m and substituting n for m in Corollary 4.3, we have Corollary 4.4. Let n be a positive integer. Then n−k   n   n   X X 1 n n 1 n−k n+1 . −1 Dk (t)(t − 1) =t Dk t t k k k=0

(4.17)

k=0

We now use Corollary 4.4 to give Hyatt’s recurrence formula (1.10). By multiplying the both sides of (4.17) by 1/(t − 1), we get that for positive integer n,   n−1−k n   n   X X n n 1 1 n−1−k n Dk (t)(t − 1) = −t Dk −1 , (4.18) k k t t k=0

k=0

which is equivalent to n−1   Dn (t) X n + Dk (t)(t − 1)n−1−k t−1 k k=0 n−1−k n+1   n−1 X n  1  1 t 1 n = −t Dk −1 + Dn . (4.19) k t t t−1 t k=0

Noticing that from (4.9) and (4.12) we have   1 n Dn (t) = t Dn (n ≥ 2). t

(4.20)

Hence, applying (4.20) to (4.19) gives Hyatt’s recurrence formula (1.10) immediately. We next consider the case l = m + n + 1 in (4.5). By taking l = m + n + 1 in (4.5), in view of D0 (t) = 1, we discover X Dk (t) pm,n;i (t − 1)i qm,n;j (1 − t)j + (t − 1)m+n+1 sm,n;0 qm,n;0 k! i+j+k=m+n+1 i,j,k≥0

−t

X

pm,n;i (1 − t)i qm,n;j (t − 1)j

i+j+k=m+n+1 i,j,k≥0

X

= (1 − t)

Dk (t) − t(1 − t)m+n+1 sm,n;0 qm,n;0 k!

qm,n;i (t − 1)i qm,n;j (1 − t)j

i+j=m+n+1 i,j≥0

−t(1 − t)

X

pm,n;i (1 − t)i qm,n;j (t − 1)j .

(4.21)

i+j=m+n i,j≥0

481

DAN-DAN SU ET AL 469-483

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14

DAN-DAN SU AND YUAN HE

So if we apply (4.9) to (4.21), in light of (4.12), we get X Dk (t) (−1)j pm,n;i qm,n;j (t − 1)i+j k! i+j+k=m+n+1 i,j,k≥0

X

−tm+n+2

(−1)j pm,n;i qm,n;j



i+j+k=m+n+1 i,j,k≥0

X

= −(t − 1)m+n+2

i+j Dk ( 1t ) 1 −1 t k!

(−1)j qm,n;i qm,n;j

i+j=m+n+1 i,j≥0

+t(1 − t)m+n+1 sm,n;0 qm,n;0 − (t − 1)m+n+1 sm,n;0 qm,n;0 .

(4.22)

Thus, applying (3.6) and (3.7) to (4.22) gives the following result. Theorem 4.5. Let m, n be non-negative integers with m ≥ n. Then    X m n Dk (t) (m + n − i)! · (m + n − j)! · (t − 1)i+j k! j i i+j+k=m+n+1 i,j,k≥0

X

− tm+n+2

i+j+k=m+n+1 i,j,k≥0

 i+j    Dk ( 1t ) 1 m n (m + n − i)! · (m + n − j)! · −1 j i t k! = −[(−1)m t + (−1)n ](t − 1)m+n+1

m! · n! . (4.23) m+n+1

If we take n = 0 and substitute n for m in Theorem 4.5, we have Corollary 4.6. Let n be a non-negative integer. Then  n−k n   n   X X n Dk+1 (t) n Dk+1 ( 1t ) 1 n−k n+2 (t − 1) −t −1 k k+1 k k+1 t k=0

k=0

= −[(−1)n t + 1]

(t − 1)n+1 . (4.24) n+1

We now multiply the both sides of (4.24) by 1/(t − 1) to obtain that for nonnegative integer n, n−1−k n−1 n−1 X n Dk+1 (t) X n Dk+1 ( 1 )  1 t (t − 1)n−1−k + tn+1 −1 k k+1 k k+1 t k=0

k=0

n+2

Dn+1 ( 1t )

t 1 Dn+1 (t) (t − 1)n · − · − [(−1)n t + 1] . (4.25) t−1 n+1 t−1 n+1 n+1 It follows from (4.20) and (4.25) that =

n−1−k n−1   n−1 X n Dk+1 ( 1 )  1 Dn+1 (t) X n Dk+1 (t) n−1−k n+1 t = (t − 1) +t −1 n+1 k k+1 k k+1 t k=0

k=0

(t − 1)n n+1 which is very analogous to Hyatt’s recurrence formula (1.10). + [(−1)n t + 1]

482

(n ≥ 1), (4.26)

DAN-DAN SU ET AL 469-483

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FORMULAS FOR EULERIAN POLYNOMIALS OF TYPE B AND TYPE D

15

Acknowledgement The second author was supported by the Foundation for Fostering Talents in Kunming University of Science and Technology (Grant No. KKSY201307047) and the National Natural Science Foundation of China (Grant No. 11326050). References [1] G.A. Baker, P.R. Graves-Morris, Pad´ e Approximants, 2nd Edition, in: Encyclopedia of Mathematics and its Applications, vol. 59, Cambridge Univ. Press, Cambridge, (1996). [2] L. Baratchart, E.B. Saff, F. Wielonsky, Rational interpolation of the exponential function, Canadian J. Math., 47 (1995), 1121–1147. [3] F. Brenti, q-Eulerian polynomials arising from coxeter groups, European J. Combin., 15 (1994), 417–441. [4] C. Brezinski, Pad´ e-Type Approximation and General Orthogonal Polynomials, Birkh¨ auser, Basel, (1980). [5] C. Brezinski, History of Continued Fractions and Pad´ e Approximants, Springer-Verlag, Berlin, (1991). [6] C.-O. Chow, On the Eulerian polynomials of type D, European J. Combin., 24 (2003), 391–408. [7] D. Foata, Eulerian polynomials: from Euler’s time to the present, in The Legacy of Alladi Ramarkrishnan in the Mathematical Sciences, pp. 253–273, Springer, New York, NY, USA, (2010). [8] Y. He, Y. Yu, Some formulae of products of Frobenius-Euler polynomials with applications, Adv. Math. (China), 45 (2016), 520–532. [9] C. Hermite, Sur lafonction exponentielle, C. R. Acad. Sci. Paris, 77 (1873), 18–24, 74–79, 226–233, 285–293. [10] L.C. Hsu, P.J.-S. Shiue, On certain summation problems and generalizations of Eulerian polynomials and numbers, Discrete Math., 204 (1999), 237–247. [11] M. Hyatt, Recurrences for Eulerian polynomials of type B and type D, Ann. Combin., 20 (2016), 869–881. [12] T. Kim, Identities involving Frobenius-Euler polynomials arising from non-linear differential equations, J. Number Theory, 2012 (132), 2854–2865. [13] T. Kim, T. Mansour, Umbral calculus associated with Frobenius-type Eulerian polynomials, Russ. J. Math. Phys., 21 (2014), 484–493. [14] T. Kim, D.S. Kim, Some identities of Eulerian polynomials arising from nonlinear differential equations, Iran. J. Sci. Technol. Trans. Sci., DOI: 10.1007/s40995-016-0073-0. [15] D.S. Kim, T. Kim, W.J. Kim, D.V. Dolgy, A note on Eulerian polynomials, Abstr. Appl. Anal., 2012 (2012), Article ID 269640, 10 pages. [16] D.S. Kim, T. Kim, H.Y. Lee, p-adic q-integral on Zp associated with Frobenius-type Eulerian polynomials and umbral calculus, Adv. Stud. Contemp. Math. (Kyungshang), 23 (2013), 243– 251. [17] L. Komzsik, Approximation Techniques for Engineers, CRC Press, Taylor and Francis Group, Boca Raton, (2007). [18] H. Pad´ e, C.B. Oeuvres (ed.), Librairie Scientifique et Technique, A. Blanchard, Paris, (1984). [19] O. Perron, Die Lehre von den Kettenbriichen, 3rd Edition, Teubner 2, Stuttgart, (1957). [20] C.S. Ryoo, H.I. Kwon, J. Yoon, Y.S. Jang, Representation of higher-order Euler numbers using the solution of Bernoulli equation, J. Comput. Anal. Appl., 19 (2015), 570–577. [21] C.D. Savage, M. Visontai, The s-Eulerian polynomials have only real roots, Trans. Amer. Math. Soc., 367 (2015), 1441–1466. Department of Mathematics, Foshan Polytechnic, Foshan, Guangdong 528137, People’s Republic of China E-mail address: [email protected] Faculty of Science, Kunming University of Science and Technology, Kunming, Yunnan 650500, People’s Republic of China E-mail address: [email protected], [email protected]

483

DAN-DAN SU ET AL 469-483

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

CERTAIN SUBCLASSES OF BI-UNIVALENT FUNCTIONS OF COMPLEX ORDER ASSOCIATED WITH THE GENERALIZED MEIXNER-POLLACZEK POLYNOMIALS C. RAMACHANDRAN1 , T. SOUPRAMANIEN2 , AND NAK EUN CHO3

A BSTRACT. In the present paper, we introduce and investigate two new subclasses of the function class Σ of bi-univalent functions of complex order defined in the open unit disk, which are associated with the one of the orthogonal polynomial namely Generalized Meixner-Pollaczek polynomials, and satisfying subordinate conditions. Taylor-MacLaurin coefficients |a2 | and |a3 | were estimated for functions in new subclass. Furthermore, several known consequences are also investigated.

1. I NTRODUCTION Let A denote the class of all functions f (z) of the form f (z) = z +

∞ X

an z n

(1.1)

n=2

which are analytic in the open unit disk U = {z ∈ C : |z|< 1}. Let S be the class of functions which are subclass of A and is univalent in U. Some of the essential and well-scrutinized subclasses of the class S include, for example, the class S ∗ (α) of starlike functions of order α in U, and the class K(α) of convex functions of order α in U, with 0 ≤ α < 1. It is prominent that every function f ∈ S has an inverse f −1 , defined by f −1 (f (z)) = z

(z ∈ U)

and f (f

−1

(w)) = w

  1 |w|< r0 (f ), r0 (f ) ≥ , 4

2010 Mathematics Subject Classification. Primary 30C45, 33C50; Secondary 30C80. Key words and phrases. Analytic functions, Univalent functions, Bi-univalent functions, Bi-starlike functions, Bi-convex functions, Generalized Meixner-Pollaczek polynomials, Gaussian hypergeometric function. 1

484

C. RAMACHANDRAN ET AL 484-498

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

C. RAMACHANDRAN, T. SOUPRAMANIEN, AND NAK EUN CHO

where g(w) = f −1 (w) = w − a2 w2 + (2a22 − a3 )w3 − (5a32 − 5a2 a3 + a4 )w4 + · · ·

(1.2)

A function f ∈ A is said to be bi-univalent in U if f (z) and f −1 (w) are univalent in U, and let Σ denote the class of bi-univalent functions in U. The convolution or Hadamard product of two function f, h ∈ A is denoted by f ∗ h, and is defined by ∞ X (f ∗ h)(z) := z + an bn z n , n=2

where f is given by (1.1) and h(z) = z +

∞ X

bn z n .

n=2

For complex numbers αi (i = 1, 2, . . . , p) and βj (j = 1, 2, . . . , q) where βj 6= 0, −1, −2, . . . ; j = 1, 2, . . . , q, the generalized hypergeometric function p Fq (z) is defined by p Fq (z)

=p Fq (α1 , . . . , αp ; β1 , . . . , βq ; z) =

∞ X (α1 )n . . . (αp )n z n n=0

(β1 )n . . . (βq )n n!

,

(1.3)

where p ≤ q + 1, (λ)n =

 1

Γ(λ + n) = λ(λ + 1)(λ + 2) . . . (λ + n − 1) Γ(n)

if n = 0 if n ∈ N = {1, 2, . . . }.

The series given by (1.3) converges absolutely for |z|< ∞ if p < q + 1 and for z in the open unit disk U = {z : |z|< 1} if p = q + 1. For relevant values αi and βj , the class of hypergeometric functions p Fq is proximately cognate to classes of analytic and univalent functions. It is well-known that hypergeometric and univalent functions play significant roles in a large variety of problems undergone in applied mathematics, probability and statistics, operations research, signal theory, moment problems, and other areas of science (e.g., see Exton [6, 7], Miller and Mocanu [16] and R¨onning [23]). In this sequel, we construct a new pathway for studying the connection between classes of hypergeometric and analytic univalent functions and also derive some new bounds for their respected Fekete-Szeg¨o coefficients.

2. PRELIMINARIES For p = q + 1 = 2, the series defined by (1.3) gives rise to the Gaussian hypergeometric series 2 2 F1 (a, b; c; z). This reduces to the elementary Gaussian geometric series 1 + z + z + · · · if (i)

485

C. RAMACHANDRAN ET AL 484-498

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

CERTAIN SUBCLASSES OF BI-UNIVALENT FUNCTION OF COMPLEX ORDER

3

a = c and b = 1 or (ii) a = 1 and b = c. For 0, we obtain Z 1 b−1 t (1 − t)c−b−1 Γ(c) F (a, b; c; z) = dt. 2 1 Γ(b)Γ(c − b) 0 (1 − tz)a As a special case, we observe that Z 2 F1 (1, 1; a; z)

= (a − 1) 0

1 b−1

t

(1 − t)a−2 dt 1 − tz

and 2 F1 (a, 1; 1; z)

=

1 (1 − z)a

so that 2 F1 (a, 1; 1; z)

∗ 2 F1 (a, 1; 1; z) =

1 = 2 F1 (1, 1; 1; z). 1−z

The classical Koebe function is a function holomorphic in U = {z ∈ C : |z|< 1} and given by the formula ( ) 2 1 1+z z = − 1 = z + 2z 2 + 3z 3 + . . . , z ∈ U. k2 (z) = 2 (1 − z) 4 1−z The important function k2 (z) follows from extremality for the famous Bieberbach conjecture. The Koebe function is univalent and starlike in U and maps the unit disk U onto the complex  plane minus a slit −∞, − 41 . Certain generalizations of k2 were appeared in the literature. Robertson [22] proved that z k2(1−α) (z) = (0 ≤ α < 1) (1 − z)2(1−α) is the extremal function for the functions starlike of order α. The function  α  1 1+z kα (z) = −1 (α ∈ R\{0}, z ∈ U) 2α 1−z was widely studied by Pommerenke [21], who investigated a universal invariant family Uα . The definition of kα was extended for a non-zero complex number α by Yamashita [27]. From the classical result of Hille [11], we see that kα is univalent in U if and only if α 6= 0 is the union A of the closed disks {|z + 1|≤ 1} and {|z − 1|≤ 1}. Making use of the geometric properties, Yamashita [27] described how kα tends to be univalent in the whole U as α tends to each boundary point of A from outside. On the other hand, The properties of log kc0 , where  c    1 1+z 1 1+z kc (z) = − 1 (c ∈ C\{0}) and k0 (z) = log (z ∈ U), (2.1) 2c 1−z 2 1−z

486

C. RAMACHANDRAN ET AL 484-498

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

C. RAMACHANDRAN, T. SOUPRAMANIEN, AND NAK EUN CHO

were studied by Campbell and Pflatzgraff [4]. Pommerenke [21] studied the special case of (2.1), that is, ( ) iγ 1 1+z kiγ (z) = −1 (γ > 0, z ∈ U), 2iγ 1−z for which 1

0 (z) = kiγ

. (1 + − z)1−iγ An obvious and consequential extension of (2.1) was given by the following formula.  c  1 1 − zeiθ kc (θ, ψ; z) = iψ − 1 (c ∈ C\{0}, eiθ 6= eiψ , θ, ψ ∈ R, z ∈ U) iθ iψ (e − e ) c 1 − ze z)1−iγ (1

and for the case when c = 0, 1 log k0 (θ, ψ; z) = iψ (e − eiθ )



1 − zeiθ 1 − zeiψ



(eiθ 6= eiψ , θ, ψ ∈ R, z ∈ U).

We have kc0 (θ, ψ; z) =

(1 −

1 (c ∈ C). (1 − zeiψ )1+c

zeiθ )1−c

Comparing 0 kiγ (θ, ψ; z) =

(1 −

1 (1 − zeiψ )1+iγ

zeiθ )1−iγ

with the generating function for Meixner-Pollaczek polynomial Pnλ (x; θ) [13], we obtain 1

λ

G (x; θ, −θ; z) =

(1 −

zeiθ )λ−iγ

(1 −

ze−iθ )λ+iγ

=

∞ X

Pnλ (x; θ)z n ,

n=0

where λ > 0, θ ∈ (0, π) and x ∈ R. Definition 2.1. For λ > 0, θ ∈ (0, π) and x ∈ R z

λ

zG (x; θ, −θ; z) = = =

(1 − ∞ X n=0 ∞ X

zeiθ )λ−iγ

(1 −

ze−iθ )λ+iγ

=

∞ X

Pnλ (x; θ)z n+1

n=0

 (2λ)n inθ e 2 F1 −n, λ + ix, 2λ; 1 − e−2iθ z n+1 n! Fn+1 z n+1

n=0

= z+

∞ X

Fn z n ,

(2.2)

n=2

where Fn+1 =

(2λ)n inθ e 2 F1 n!

 −n, λ + ix, 2λ; 1 − e−2iθ and z ∈ U

487

C. RAMACHANDRAN ET AL 484-498

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

CERTAIN SUBCLASSES OF BI-UNIVALENT FUNCTION OF COMPLEX ORDER

5

To note the significance of the class, we list the following special cases for various values of λ, x and θ: (1) (2) (3) (4)

 x = lim Pn − , φ , called the Laguerre polynomial. φ→0 2φ ! √ −n x λ − λ cos φ Hn (x) = lim n! λ 2 Pnλ , φ , called the Hermite polynomial. λ→∞ sin φ   x φ λ Un (x) = lim Pn , , called the symmetric Meixner-Pollaczek polynomial. λ→0 2 2 Pn0 (x) = lim Pnλ (x), shows that these polynomials are orthogonal polynomials in a strip α+1 2

Lαn (x)



λ→0

−1 ≤ =(z) ≤ 1.  3 x π (5) Wn (x) = lim Pn4 , , arises as the the Mellin transform of the odd Hermite orthogλ→0 2 2 onal functions. For λ > 0, θ ∈ (0, π) and x ∈ R, using the Generalised Meixner-Pollaczek polynomial (2.2), λ : A → A, by we introduce convolution operator Fx,θ ∞ X  λ F n an z n , Fx,θ f (z) := zGλ (x; θ, −θ; z) ∗ f (z) = z +

(2.3)

n=2

where Fn =

 (2λ)(n−1) i(n−1)θ −2iθ e (z ∈ U). 2 F1 −(n − 1), λ + ix, 2λ; 1 − e (n − 1)!

(2.4)

Let f be the class of analytic functions w, normalized by w(0) = 0, satisfying the condition |w(z)|< 1. For analytic functions f and g, we say that f is subordinate to g in U, denoted by f ≺ g, if there exists a function w ∈ f so that f (z) = g(w(z)) in U. In particular, if g is univalent in U, then f ≺ g ⇔ f (0) = g(0) and f (U) ⊂ g(U). Recently there has been triggering interest to study bi-univalent function class Σ and obtained non-sharp coefficient estimates on the first two coefficients |a2 | and |a3 | of (1.1). But the coefficient problem for each of the following Taylor-MacLaurin coefficients |an | ((n ≥ 3) is still an open problem (see [2, 1, 3, 14, 17, 26]). Many researchers (see [8, 10, 15, 24]) have recently introduced and investigated several interesting subclasses of the bi-univalent function class Σ and they have found non-sharp estimates on the first two Taylor-MacLaurin coefficients |a2 | and |a3 |. In [18], the authors defined the classes of functions Pm (β) as follows:

488

C. RAMACHANDRAN ET AL 484-498

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

C. RAMACHANDRAN, T. SOUPRAMANIEN, AND NAK EUN CHO

Definition 2.2. [18] Let Pm (β), with m ≥ 2 and 0 ≤ β < 1, denote the class of univalent analytic functions P , normalized with P (0) = 1, and satisfying Z 2π ReP (z) − β dθ ≤ mπ, 1−β 0 where z = reiθ ∈ U. For β = 0, we denote Pm := Pm (0), hence the class Pm represents the class of functions p analytic in U, normalized with p(0) = 1, and having the representation Z 2π 1 − zeit p(z) = dµ(t), 1 + zeit 0 where µ is a real-valued function with bounded variation, which satisfies Z 2π Z 2π |dµ(t)|≤ m, m ≥ 2. dµ(t) = 2π and 0

0

Remark that P := P2 is the well-known class of Carath´eodory functions, i.e. the normalized functions with positive real part in the open unit disk U. Motivated by the earlier work of Deniz [5], Peng et al. [20] (see also [19, 25]) and Goswami et al. [9], in the present paper, we introduce new subclasses of the function class Σ of complex λ order γ ∈ C∗ := C\{0}, involving Generalised Meixner-Pollaczek polynomial operator Fx,θ , and we find estimates on the coefficients |a2 | and |a3 | for the functions that belong to these new subclasses of functions of the class Σ. Several related classes are also considered, and connection to earlier known results are made. Definition 2.3. For 0 ≤ α ≤ 1 and 0 ≤ β < 1, a function f ∈ Σ is said to be in the class SΣλ,x,θ (γ, α, β) if the following two conditions are satisfied: " # 0 λ z Fx,θ f (z) 1 − 1 ∈ Pm (β) (2.5) 1+ λ γ (1 − α)z + αFx,θ f (z) and

# " 0 λ w Fx,θ g(w) 1 − 1 ∈ Pm (β), 1+ λ γ (1 − α)w + αFx,θ g(w)

(2.6)

where γ ∈ C∗ , the function g is given by (1.2), and z, w ∈ U. Definition 2.4. For 0 ≤ α ≤ 1 and 0 ≤ β < 1, a function f ∈ Σ is said to be in the class KΣλ,x,θ (γ, α, β) if the following two conditions are satisfied: " # 0 00 λ λ f (z) + z 2 Fx,θ f (z) 1 z Fx,θ 1+ (2.7) 0 − 1 ∈ Pm (β) λ γ (1 − α)z + αz Fx,θ f (z)

489

C. RAMACHANDRAN ET AL 484-498

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

CERTAIN SUBCLASSES OF BI-UNIVALENT FUNCTION OF COMPLEX ORDER

7

and

" # 00 0 λ λ g(w) g(w) + w2 Fx,θ 1 w Fx,θ 1+ 0 − 1 ∈ Pm (β), λ γ g(w) (1 − α)w + αw Fx,θ where γ ∈ C∗ , the function g is given by (1.2), and z, w ∈ U.

(2.8)

On specializing the parameters α, one can state the various new subclasses of Σ as illustrated in the following examples. Thus, taking α = 1 in the above two definitions, we obtain: Example 2.1. Suppose that 0 ≤ β < 1 and γ ∈ C∗ . (i) A function f ∈ Σ is said to be in the class SΣλ,x,θ (γ, β) if the following conditions are satisfied: " # " # 0 0 λ λ f (z) g(w) 1 z Fx,θ 1 w Fx,θ 1+ − 1 ∈ Pm (β) and 1 + − 1 ∈ Pm (β), λ λ γ γ f (z) g(w) Fx,θ Fx,θ where g = f −1 and z, w ∈ U. (ii) A function f ∈ Σ is said to be in the class KΣλ,x,θ (γ, β) if the following conditions are satisfied: " " 00 # 00 # λ λ f (z) g(w) 1 z Fx,θ 1 w Fx,θ 1+ ∈ Pm (β) 0 ∈ Pm (β) and 1 + 0 λ λ γ γ Fx,θ f (z) Fx,θ g(w) where g = f −1 and z, w ∈ U. Taking α = 0 in the previous two definitions, we obtain the next special cases: Example 2.2. Suppose that 0 ≤ β < 1 and γ ∈ C∗ . λ,x,θ (i) A function f ∈ Σ is said to be in the class HΣ (γ, β) if the following conditions are satisfied: i i 0 0 1h λ 1h λ Fx,θ f (z) − 1 ∈ Pm (β) and 1 + Fx,θ g(w) − 1 ∈ Pm (β) 1+ γ γ

where g = f −1 and z, w ∈ U. (ii) A function f ∈ Σ is said to be in the class Qλ,x,θ (γ, β) if the following conditions are Σ satisfied: i 0 00 1h λ λ 1+ Fx,θ f (z) + z Fx,θ f (z) − 1 ∈ Pm (β), γ and i 0 00 1h λ λ g(w) − 1 ∈ Pm (β) 1+ Fx,θ g(w) + w Fx,θ γ −1 where g = f and z, w ∈ U.

490

C. RAMACHANDRAN ET AL 484-498

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

C. RAMACHANDRAN, T. SOUPRAMANIEN, AND NAK EUN CHO

In order to derive our main results, we shall need the following lemma. Lemma 2.1. [9] Let the function Φ(z) = 1 +

∞ X

hn z n (z ∈ U), such that Φ ∈ Pm (β). Then,

n=1

|hn |≤ m(1 − β) (n ≥ 1). By employing the techniques which used earlier by Deniz [5], in the following section, we find estimates of the coefficients |a2 | and |a3 | for functions of the above-defined subclasses SΣλ,x,θ (γ, α, β) and KΣλ,x,θ (γ, α, β) of the function class Σ. 3. C OEFFICIENT B OUNDS FOR THE F UNCTION C LASS SΣλ,x,θ (γ, α, β) We begin by finding the estimates on the coefficients |a2 | and |a3 | for the functions f given by (1.1) belonging to the class SΣλ,x,θ (γ, α, β). Supposing that the functions p, q ∈ Pm (β), with p(z) = 1 +

∞ X

pk z k

(z ∈ U)

(3.1)

qk w k

(w ∈ U),

(3.2)

k=1

and q(w) = 1 +

∞ X k=1

from Lemma 2.1, it follows that |pk | ≤ m(1 − β) and

(3.3)

|qk | ≤ m(1 − β) (for all k ≥ 1).

(3.4)

Theorem 3.1. If the function f given by (1.1) belongs to the class SΣλ,x,θ (γ, α, β), then (s ) m|γ|(1 − β) m|γ|(1 − β) |a2 |≤ min ; |(α2 − 2α)F22 + (3 − α)F3 | (2 − α)F2

(3.5)

and  |a3 | ≤ min

m|γ|(1 − β) m|γ|(1 − β) + ; 2 (3 − α)F3 |(α − 2α)F22 + (3 − α)F3 |   m|γ|(1 − β) α 1 + m|γ|(1 − β) ; (3 − α)F3 2−α   m|γ|(1 − β) |(α2 − 2α)F22 + 2(3 − α)F3 | 1 + m|γ|(1 − β) , (3.6) (3 − α)F3 (2 − α)2 F22

where F2 and F3 are given by (2.4).

491

C. RAMACHANDRAN ET AL 484-498

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

CERTAIN SUBCLASSES OF BI-UNIVALENT FUNCTION OF COMPLEX ORDER

9

Proof. Since f ∈ SΣλ,x,θ (γ, α, β), from the definition relations (2.5) and (2.6), it follows that # " 0 λ z Fx,θ f (z) 1 −1 1+ λ γ (1 − α)z + αFx,θ f (z)  2  2−α α − 2α 2 2 3 − α =1+ F 2 a2 z + F 2 a2 + F3 a3 z 2 + · · · =: p(z) (3.7) γ γ γ and " # 0 λ w Fx,θ g(w) 1 1+ −1 λ γ (1 − α)w + αFx,θ g(w)   2 2−α α − 2α 2 2 3 − α 2 F 2 a2 w + F 2 a2 + F3 (2a2 − a3 ) w2 + · · · =: q(w), (3.8) =1− γ γ γ where p, q ∈ Pm (β), and are of the form (3.1) and (3.2), respectively. Now, equating the coefficients in (3.7) and (3.8), we get 2−α F 2 a2 γ α2 − 2α 2 2 3 − α F 2 a2 + F 3 a3 γ γ 2−α − F 2 a2 γ α2 − 2α 2 2 3 − α F 2 a2 + F3 (2a22 − a3 ) γ γ

= p1 ,

(3.9)

= p2 ,

(3.10)

= q1 ,

(3.11)

= q2 .

(3.12)

From (3.9) and (3.11), we find that γp1 −γq1 = , (2 − α)F2 (2 − α)F2

a2 =

(3.13)

which implies |γ|m(1 − β) . (2 − α)F2 Adding (3.10) and (3.12), by using (3.13) we obtain   2 2(α − 2α)F22 + 2(3 − α)F3 a22 = γ(p2 + q2 ). |a2 |≤

(3.14)

Now, by using (3.3) and (3.4), we get |a2 |2 = and hence

|(α2

s |a2 |≤

m|γ|(1 − β) , − 2α)F22 + (3 − α)F3 |

m|γ|(1 − β) , |(α2 − 2α)F22 + (3 − α)F3 |

492

C. RAMACHANDRAN ET AL 484-498

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

C. RAMACHANDRAN, T. SOUPRAMANIEN, AND NAK EUN CHO

which gives the bound on |a2 | as asserted in (3.5). Next, in order to find the upper-bound for |a3 |, by subtracting (3.12) from (3.10), we get 2(3 − α)F3 a3 = γ(p2 − q2 ) + 2(3 − α)F3 a22 .

(3.15)

It follows from (3.3), (3.4), (3.14) and (3.15), that |a3 |≤

m|γ|(1 − β) m|γ|(1 − β) . + 2 (3 − α)F3 |(α − 2α)F22 + (3 − α)F3 |

From (3.9) and (3.10), we have 1 a3 = (3 − α)F3



γ 2 (α2 − 2α)p21 γp2 − (2 − α)2

 .

and hence   m|γ|(1 − β) α |a3 |≤ 1 + m|γ|(1 − β) . (3 − α)F3 (2 − α) Further, from (3.9) and (3.12) we deduce that   m|γ|(1 − β) |(α2 − 2α)F22 + 2(3 − α)F3 | |a3 |≤ 1 + m|γ|(1 − β) , (3 − α)F3 (2 − α)2 F22 

and thus we obtain the conclusion (3.6) of our theorem.

For the special cases α = 1 and α = 0, Theorem 3.1 reduces to the following corollaries, respectively: Corollary 3.1. If the function f given by (1.1) belongs to the class SΣλ,x,θ (γ, β), then ) (s m|γ|(1 − β) m|γ|(1 − β) ; |a2 |≤ min |2F3 − F22 | F2 and  |a3 | ≤ min

m|γ|(1 − β) m|γ|(1 − β) m|γ|(1 − β) + ; (1 + m|γ|(1 − β)) ; |2F3 − F22 | 2F3 2F3   m|γ|(1 − β)|4F3 − F22 | m|γ|(1 − β) 1+ , 2F3 F22

where F2 and F3 are given by (2.4). Corollary 3.2. If the function f given by (1.1) belongs to the class GΣλ,x,θ (γ, β), then s   m|γ|(1 − β) m|γ|(1 − β)  |a2 |≤ min ;   3F3 2F2

493

C. RAMACHANDRAN ET AL 484-498

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

CERTAIN SUBCLASSES OF BI-UNIVALENT FUNCTION OF COMPLEX ORDER

11

and 

m|γ|(1 − β) m|γ|(1 − β) m|γ|(1 − β) |a3 |≤ min 2 ; ; 3F3 3F3 3F3

  6F3 , 1 + m|γ|(1 − β) 2 4F2

where F2 and F3 are given by (2.4).

4. C OEFFICIENT B OUNDS FOR THE F UNCTION C LASS KΣλ,x,θ (γ, α, β) Theorem 4.1. If the function f given by (1.1) belongs to the class KΣλ,x,θ (γ, α, β), then (s ) m|γ|(1 − β) m|γ|(1 − β) |a2 |≤ min ; |4(α2 − 2α)F22 + 3(3 − α)F3 | 2(2 − α)F2

(4.1)

and  |a3 | ≤ min

  m|γ|(1 − β) α 1 + m|γ|(1 − β) ; 3(3 − α)F3 2−α m|γ|(1 − β) m|γ|(1 − β) ; + 2 3(3 − α)F3 |4(α − 2α)F22 + 3(3 − α)F3 |   m|γ|(1 − β) m2 |γ|2 (1 − β)2 α 3(3 − α)F3 + + , (4.2) 3(3 − α)F3 3(3 − α)F3 2 − α 2(2 − α)2 F22

where F2 and F3 are given by (2.4). Proof. Since f ∈ KΣλ,x,θ (γ, α, β), from the definition relations (2.7) and (2.8), it follows that # " 0 00 λ λ f (z) + z 2 Fx,θ f (z) 1 z Fx,θ 1+ 0 − 1 λ γ (1 − α)z + αz Fx,θ f (z)   2(2 − α) 4(α2 − 2α) 2 2 3(3 − α) =1+ F 2 a2 z + F 2 a2 + F3 a3 z 2 + · · · =: p(z) (4.3) γ γ γ and " # 0 00 λ λ g(w) + w2 Fx,θ g(w) 1 w Fx,θ 1+ 0 − 1 λ γ (1 − α)w + αw Fx,θ g(w)   2(2 − α) 4(α2 − 2α) 2 2 3(3 − α) 2 =1− F 2 a2 w + F2 a2 + F3 (2a2 − a3 ) w2 + · · · =: q(w), γ γ γ (4.4) where p, q ∈ Pm (β), and are of the form (3.1) and (3.2), respectively.

494

C. RAMACHANDRAN ET AL 484-498

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12

C. RAMACHANDRAN, T. SOUPRAMANIEN, AND NAK EUN CHO

Now, equating the coefficients in (4.3) and (4.4), we get 2(2 − α) F2 a2 = p1 , γ  1 2 4(α − 2α)F22 a22 + 3(3 − α)F3 a3 = p2 , γ 2(2 − α) − F2 a2 = q1 , γ  1 2 4(α − 2α)F22 a22 + 3(3 − α)F3 (2a22 − a3 ) = q2 . γ

(4.5) (4.6) (4.7) (4.8)

From (4.5) and (4.7), we find that −γq1 γp1 = , 2(2 − α)F2 2(2 − α)F2

a2 =

(4.9)

which implies |γ|m(1 − β) . 2(2 − α)F2 Adding (4.6) and (4.8), by using (4.9), we obtain  2  8(α − 2α)F22 + 6(3 − α)F3 a22 = γ(p2 + q2 ). |a2 |≤

(4.10)

Now, by using (3.3) and (3.4), we get |a2 |2 = and hence

|4(α2

m|γ|(1 − β) , − 2α)F22 + 3(3 − α)F3 |

s |a2 |≤

|4(α2

m|γ|(1 − β) , − 2α)F22 + 3(3 − α)F3 |

which gives the bound on |a2 | as asserted in (4.1). Next, in order to find the upper-bound for |a3 |, by subtracting (4.8) from (4.6), we get 6(3 − α)F3 a3 = γ(p2 − q2 ) + 6(3 − α)F3 a22 .

(4.11)

It follows from (3.3), (3.4), (4.10) and (4.11), that |a3 |≤

m|γ|(1 − β) m|γ|(1 − β) + . 2 3(3 − α)F3 |4(α − 2α)F22 + 3(3 − α)F3 |

From (4.5) and (4.6), we have 1 a3 = 3(3 − α)F3 and hence

m|γ|(1 − β) |a3 |≤ 3(3 − α)F3

  γ 2 (α2 − 2α)p21 γp2 − . (2 − α)2   α 1 + m|γ|(1 − β) . 2−α

495

C. RAMACHANDRAN ET AL 484-498

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

CERTAIN SUBCLASSES OF BI-UNIVALENT FUNCTION OF COMPLEX ORDER

13

Further, from (4.5) and (4.8), we deduce that    α 3(3 − α)F3 m|γ|(1 − β) , 1 + m|γ|(1 − β) + |a3 |≤ 3(3 − α)F3 2 − α 2(2 − α)2 F22 

and thus we obtain the conclusion (4.2) of our theorem.

For the special cases α = 1 and α = 0, the Theorem 4.1 reduces to the following corollaries, respectively: Corollary 4.1. If the function f given by (1.1) belongs to the class KΣλ,x,θ (γ, β), then (s ) m|γ|(1 − β) m|γ|(1 − β) |a2 |≤ min ; |6F3 − 4F22 | 2F2 and  |a3 | ≤ min

m|γ|(1 − β) m|γ|(1 − β) m|γ|(1 − β) + ; (1 + m|γ|(1 − β)) ; |6F3 − 4F22 | 6F3 6F3    m|γ|(1 − β) 6F3 1 + m|γ|(1 − β) 1 + , 6F3 2F22

where F2 and F3 are given by (2.4). Corollary 4.2. If the function f given by (1.1) belongs to the class Qλ,x,θ (γ, β), then Σ  s  m|γ|(1 − β) m|γ|(1 − β)  ; |a2 |≤ min   9F3 4F2 and    m|γ|(1 − β) m|γ|(1 − β) m|γ|(1 − β) 9F3 |a3 |≤ min 2 ; ; m|γ|(1 − β) 2 , 9F3 9F3 9F3 4F2 where F2 and F3 are given by (2.4). Remark that, various other interesting corollaries and consequences of our main results, which are asserted by Theorem 3.1 and Theorem 4.1 above, can be derived similarly. The details involved may be left as exercises for the interested reader.

ACKNOWLEDGEMENTS This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No. 2016R1D1A1A09916450).

496

C. RAMACHANDRAN ET AL 484-498

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14

C. RAMACHANDRAN, T. SOUPRAMANIEN, AND NAK EUN CHO

R EFERENCES [1] D. A. Brannan and J. G. Clunie (Editors), Aspects of Contemporary Complex Analysis, Academic Press, London, 1980. [2] D. A. Brannan, J. Clunie and W. E. Kirwan, Coefficient estimates for a class of star-like functions, Canad. J. Math. 22 (1970), 476-485. [3] D. A. Brannan and T. S. Taha, On some classes of bi-univalent functions, Studia Univ. Babes-Bolyai Math. 31 (1986), no. 2, 70-77. [4] D. M. Campbell and J. A. Pfaltzgraff, Mapping properties of log g 0 (z), Colloq. Math. 32 (1974), 267–276. [5] E. Deniz, Certain subclasses of bi-univalent functions satisfying subordinate conditions, J. Class. Anal. 2 (2013), no. 1, 49-60. [6] H. Exton, Multiple hypergeometric functions and applications, Ellis Horwood Ltd. (Chichester), 1976. [7] H. Exton, Handbook of hypergeometric integrals: theory, applications, tables, computer programs, Ellis Horwood Ltd. (Chichester), 1978. [8] B. A. Frasin and M. K. Aouf, New subclasses of bi-univalent functions, Appl. Math. Lett. 24 (2011), 15691573. [9] P. Goswami, B. S. Alkahtani and T. Bulboaca, Estimate for initial MacLaurin coefficients of certain subclasses of bi-univalent functions, arXiv:1503.04644v1 [math.CV] March (2015). [10] T. Hayami and S. Owa, Coefficient bounds for bi-univalent functions, PanAmer. Math. J. 22 (2012), no. 4, 15-26. [11] E. Hille, Remarks on a paper by Zeev Nehari, Bull. Am. Math. Soc. 55 (1949), 552-553. [12] S. Kanas and A. Tatarczak, Generalized Meixner-Pollaczek polynomials, Adv. Diff. Eqn. 2013, 2013:131. [13] R, Koekoek and R. F. Swarttouw, The Askey-scheme of hypergeometric orthogonal polynomials and its qanalogue Report 98–17, Delft University of Technology (1998). [14] M. Lewin, On a coefficient problem for bi-univalent functions, Proc. Amer. Math. Soc. 18 (1967), 63-68. [15] X.-F. Li and A.-P. Wang, Two new subclasses of bi-univalent functions, Internat. Math. Forum 7 (2012), 1495-1504. [16] S. S. Miller and P. T. Mocanu, Univalence of Gaussian and confluent hypergeometric functions, Proc. Amer. Math. Soc. 110 (1990), no. 2, 333–342. [17] E. Netanyahu, The minimal distance of the image boundary from the origin and the second coefficient of a univalent function in |z|< 1, Arch. Ration. Mech. Anal. 32 (1969), 100-112. [18] K. Padmanabhan and R. Parvatham, Properties of a class of functions with bounded boundary rotation, Ann. Polon. Math. 31 (1975), 311-323. [19] T. Panigarhi and G. Murugusundaramoorthy, Coefficient bounds for bi-univalent functions analytic functions associated with Hohlov operator, Proc. Jangjeon Math. Soc. 16 (2013), no. 1, 91–100. [20] Z. Peng, G. Murugusundaramoorthy and T. Janani, Coefficient estimate of bi-univalent functions of complex order associated with the Hohlov operator, J. Complex Anal. 2014, Article ID 693908, 6 pp. [21] C. Pommerenke, Linear-invariant Familien analytischer Funktionen Math. Ann. 155 (1964), 108–154. [22] M. S. Robertson, On the theory of univalent functions, Ann. Math. 37 (1936), 374–408. [23] F. Rønning, PC-fractions and Szego polynomials associated with starlike univalent functions, Numerical Algorithms 3 (1992), no. 1-4, 383–391. [24] H. M. Srivastava, A. K. Mishra and P. Gochhayat, Certain subclasses of analytic and bi-univalent functions, Appl. Math. Lett. 23 (2010), 1188-1192.

497

C. RAMACHANDRAN ET AL 484-498

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

CERTAIN SUBCLASSES OF BI-UNIVALENT FUNCTION OF COMPLEX ORDER

15

[25] H. M. Srivastava, G. Murugusundaramoorthy and N. Magesh, Certain subclasses of bi-univalent functions associated with the Hohlov operator, Global Journal of Mathematical Analysis 1 (2013), no. 2, 67-73. [26] T. S. Taha, Topics in Univalent Function Theory, Ph.D. Thesis, University of London, 1981. [27] S. Yamashita, Nonunivalent generalized Koebe function, Proc. Jpn. Acad. Ser. A Math. Sci. 79 (2003), no. 1, 9–10.

1

D EPARTMENT OF M ATHEMATICS , U NIVERSITY C OLLEGE OF E NGINEERING V ILLUPURAM , A NNA U NIVER SITY, V ILLUPURAM - 605 602, TAMILNADU , I NDIA .

E-mail address: [email protected]

2

D EPARTMENT OF M ATHEMATICS , IFET C OLLEGE OF E NGINEERING , G ANGARAMPALAYAM , V ILLUPURAM - 605 108, TAMILNADU , I NDIA .

E-mail address: [email protected]

3

C ORRESPONDING AUTHOR , D EPARTMENT OF A PPLIED M ATHEMATICS , C OLLEGE OF NATURAL S CIENCES , P UKYONG NATIONAL U NIVERSITY, B USAN 608-737, KOREA .

E-mail address: [email protected]

498

C. RAMACHANDRAN ET AL 484-498

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Integral Inequalities of Simpson’s Type for Strongly Extended (s, m)-Convex Functions Jun Zhang1 1

Zhi-Li Pei1

Feng Qi2,3,†

College of Mathematics, Inner Mongolia University for Nationalities, Tongliao, Inner Mongolia, 028043, China

2

Department of Mathematics, College of Science, Tianjin Polytechnic University, Tianjin, 300387, China

3

Institute of Mathematics, Henan Polytechnic University, Jiaozuo, Henan, 454010, China †

Corresponding author: [email protected]

Abstract In the paper, the authors introduce a new concept “strongly extended (s, m)-convex function” and establish some integral inequalities of Simpson’s type for strongly extended (s, m)convex functions. 2010 Mathematics Subject Classification: Primary 26A51; Secondary 26D15, 41A55. Key words and phrases: strongly extended (s, m)-convex function; integral inequality of Simpson’s type; H¨ older integral inequality.

1

Introduction

The following definitions are well known in the literature. Definition 1.1. A function f : I ⊆ R = (−∞, ∞) → R is said to be convex if the inequality f (tx + (1 − t)y) ≤ tf (x) + (1 − t)f (y) holds for all x, y ∈ I and t ∈ [0, 1]. Definition 1.2 ([13]). For f : [0, b] → R with b > 0 and m ∈ (0, 1], if f (tx + m(1 − t)y) ≤ tf (x) + m(1 − t)f (y) is valid for all x, y ∈ [0, b] and t ∈ [0, 1], then we say that f is an m-convex function on [0, b]. Definition 1.3 ([6]). Let s ∈ (0, 1] be a real number. A function f : R → R0 = [0, ∞) is said to be s-convex (in the second sense) if the inequality f (λx + (1 − λ)y) ≤ λs f (x) + (1 − λ)s f (y) holds for all x, y ∈ I and λ ∈ [0, 1].

499

Jun Zhang ET AL 499-508

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

If s = 1, the s-convex function becomes a convex function on R0 . Definition 1.4 ([15]). For some s ∈ [−1, 1], a function f : I ⊆ R → R is said to be extended s-convex if f (λx + (1 − λ)y) ≤ λs f (x) + (1 − λ)s f (y) is valid for all x, y ∈ I and λ ∈ (0, 1). Definition 1.5 ([9]). A function f : [a, b] → R is said to be strongly convex with modulus c > 0 if f (tx + (1 − t)y) ≤ tf (x) + (1 − t)f (y) − ct(1 − t)(x − y)2 is valid for all x, y ∈ [a, b] and t ∈ [0, 1]. Definition 1.6 ([5]). A function f : I ⊆ R → R0 is said to be strongly s-convex with modulus c > 0 and s ∈ (0, 1] if f (tx + (1 − t)y) ≤ ts f (x) + (1 − t)s f (y) − ct(1 − t)(x − y)2 is valid for all x, y ∈ I and t ∈ [0, 1]. The following theorems for some kinds of convex functions were obtained in recent years. Theorem 1.1 ([2, Theorem 2.2]). Let f : I ◦ ⊆ R → R be a differentiable mapping on I ◦ and a, b ∈ I ◦ with a < b. If |f 0 | is convex on [a, b], then Z b f (a) + f (b) (b − a)(|f 0 (a)| + |f 0 (b)|) 1 ≤ − f (x) d x . 2 b−a a 8 Theorem 1.2 ([8, Theorems 1 and 2]). Let f : I ⊆ R → R be differentiable on I ◦ and a, b ∈ I with a < b. If |f 0 |q is convex on [a, b] and q ≥ 1, then   Z b f (a) + f (b) b − a |f 0 (a)|q + |f 0 (b)|q 1/q 1 ≤ − f (x) d x 2 b−a a 4 2 and     Z b b − a |f 0 (a)|q + |f 0 (b)|q 1/q a+b 1 f − f (x) d x ≤ . 2 b−a a 4 2 Theorem 1.3 ([1, Theorems 2.2 to 2.3]). Let f : I ⊆ R → R be differentiable on I ◦ , a, b ∈ I with a < b, and f 0 ∈ L1 ([a, b]). 1. If |f 0 | is s-convex on [a, b] for some s ∈ (0, 1], then       Z b a+b 0 a+b 1 b−a 0 0 ≤ f f − f (x) d x |f (a)| + |f (b)| + 2(s + 1) 4(s + 1)(s + 2) 2 b−a a 2   22−s + 1 (b − a)  0 ≤ |f (a)| + |f 0 (b)| . 4(s + 1)(s + 2)

500

Jun Zhang ET AL 499-508

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2. If |f 0 |p/(p−1) is s-convex on [a, b] for p > 1 and some fixed s ∈ (0, 1], then    1/p  2/q n Z b b−a a+b  1−s  1 1 1 ≤ f f (x) d x − 2 + s + 1 |f 0 (a)|q 2 b−a a 4 p+1 s+1    1/q o 1/q + 21−s |f 0 (b)|q + 21−s |f 0 (a)|q + 21−s + s + 1 |f 0 (b)|q , where

1 p

+

1 q

= 1.

Theorem 1.4 ([5, Theorems 3.1]). Let f : I ⊆ R → R be a 2-times differentiable function on I ◦ and a, b ∈ I ◦ with a < b such that f 00 ∈ L1 ([a, b]). If |f 00 |q is strongly s-convex on [a, b] for q ≥ 1 and s ∈ (0, 1], then       Z b 1 f (a) + 2f 2a + b + 2f a + 2b + f (b) − 1 f (x) d x 6 3 3 b−a a  1/q 2 s+2 s+2 6 (b − a) (s − 3)3 + (s + 7)2 1 ≤ |f 00 (a)|q + |f 00 (b)|q 324 (s + 1)(s + 2)(s + 3)3s (s + 2)(s + 3)3s 1/q    11c(b − a)2 1/q (s − 1)2s+2 + s + 5 c(b − a)2 00 q 00 q + |f (a)| + |f (b)| − − 45 (s + 1)(s + 2)(s + 3)3s 270  1/q  s+2 s+2 1 (s − 3)3 + (s + 7)2 c(b − a)2 00 q 00 q + |f (a)| + |f (b)| − . (s + 2)(s + 3)3s (s + 1)(s + 2)(s + 3)3s 45 For more information on this topic, please refer to the papers [3, 4, 5, 7, 10, 11, 12, 14, 16, 17] and the closely related references therein. In this paper, we will introduce a new concept “strongly extended (s, m)-convex function” and establish some integral inequalities of the Hermite-Hadamard type for strongly extended (s, m)convex functions.

2

Definition and Lemmas

Now we give a definition of strongly extended (s, m)-convex functions. Definition 2.1. A function f : [0, b∗ ] ⊆ R0 → R0 is said to be strongly extended (s, m)-convex with modulus c > 0 and (s, m) ∈ [−1, 1] × (0, 1] if f (tx + m(1 − t)y) ≤ ts f (x) + m(1 − t)s f (y) − ct(1 − t)(x − y)2 is valid for all x, y ∈ [0, b∗ ] and t ∈ (0, 1). Remark 1. If f is strongly extended (s, m)-convex on [0, b∗ ] and m = 1, then we say that f is strongly extended s-convex on [0, b∗ ]. If f is strongly extended s-convex on [0, b∗ ] and s ∈ (0, 1], then it is strongly s-convex on [0, b∗ ]. To establish new Hermite-Hadamard type inequalities for strongly extended (s, m)-convex functions, we need the following lemmas.

501

Jun Zhang ET AL 499-508

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Lemma 2.1. Let f : I ⊆ R → R be n-times differentiable function on I ◦ , a, b ∈ I ◦ with a < b, and n ∈ N+ . If f (n) ∈ L1 ([a, b]), then   Z b n X (b − a)k−1 f (k−1) (a) + (−1)k−1 f (k−1) (b) 1 f (x) d x − b−a a 2(k!) k=1 Z  (b − a)n 1  n = t + (t − 1)n f (n) (ta + (1 − t)b) d t. 2(n!) 0 Proof. By integration by parts, it follows that Z (b − a)n+1 1 n (n) t f (ta + (1 − t)b) d t 2(n!) 0 Z 1 (b − a)n (n−1) (b − a)n =− tn−1 f (n−1) (ta + (1 − t)b) d t f (a) + 2(n!) 2[(n − 1)!] 0 Z (b − a)n−1 (n−2) (b − a)n−1 1 n−2 (n−2) (b − a)n (n−1) t f (ta + (1 − t)b) d t f (a) − f (a) + =− 2(n!) 2[(n − 1)!] 2[(n − 2)!] 0 n−1 X (b − a)k+1 f (k) (a) (b − a)2 Z 1 =− + tf 0 (ta + (1 − t)b) d t 2[(k + 1)!] 2 0 k=1 Z n X (b − a)k f (k−1) (a) 1 b =− + f (x) d x 2(k!) 2 a k=1

and (b − a)n+1 2(n!)

Z

1

(t − 1)n f (n) (ta + (1 − t)b) d t

0

Z 1 (b − a)n (b − a)n (−1)n f (n−1) (b) + (t − 1)n−1 f (n−1) (ta + (1 − t)b) d t 2(n!) 2[(n − 1)!] 0 (b − a)n (b − a)n−1 = (−1)n f (n−1) (b) + (−1)n−1 f (n−2) (b) 2(n!) 2[(n − 1)!] Z (b − a)n−1 1 (t − 1)n−2 f (n−2) (ta + (1 − t)b) d t + 2[(n − 2)!] 0 Z n X (−1)k (b − a)k f (k−1) (b) 1 b = + f (x) d x. 2(k!) 2 a

=

k=1

Adding these two equations leads to Lemma 2.1. Lemma 2.2. Let f : I ⊆ R → R be n-times differentiable function on I ◦ , a, b ∈ I ◦ with a < b, and n ∈ N+ . If f (n) ∈ L1 ([a, b]), then    Z b n  X 1 + (−1)k−1 (b − a)k−1 (k−1) a + b 1 f (x) d x − f b−a a 2k−1 (k!) 2 k=1 Z  Z 1 1/2 (b − a)n = (−t)n f (n) ((1 − t)a + tb) d t + (1 − t)n f (n) (ta + (1 − t)b) d t . n! 0 1/2

502

Jun Zhang ET AL 499-508

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. This follows from integration by parts immediately.

3

Some new integral inequalities of Simpson’s type

In this section, we establish integral inequalities of Simpson’s type for strongly extended (s, m)convex functions. Theorem 3.1. Let f : [0, b∗ ] ⊆ R0 → R0 be n-times differentiable on [0, b∗ ], a, b ∈ [0, b∗ ] with b a < b, and f (n) ∈ L1 ([a, b]). If |f (n) |q is strongly extended (s, m)-convex on 0, m for c ≥ 0, (s, m) ∈ (−1, 1] × (0, 1], and q ≥ 1, then Z 1 b − a

a

b

   1−1/q n X (b − a)k−1 f (k−1) (a) + (−1)k−1 f (k−1) (b) (b − a)n 2 ≤ 2(k!) 2(n!) n+1 k=1   q    2 1/q  (n) b 2c b 1 − nB(n, s + 1) (n) q f (a) + m f −a , − × n+s+1 m (n + 2)(n + 3) m f (x) d x −

where B(α, β) denotes the well known beta function which can be defined by Z B(α, β) =

1

tα−1 (1 − t)β−1 d t,

α, β > 0.

0

 b Proof. Since |f (n) |q is strongly extended (s, m)-convex on 0, m , from Lemma 2.1 and H¨older’s integral inequality, it follows that  (k−1)  Z b n k−1 k−1 (k−1) X 1 (b − a) f (a) + (−1) f (b) f (x) d x − b − a 2(k!) a k=1 Z  (b − a)n 1  n t + (1 − t)n f (n) (ta + (1 − t)b) d t ≤ 2(n!) 0 1/q Z 1 1−1/q Z 1 q n  n  (b − a)n n n (n) t + (1 − t) d t t + (1 − t) f (ta + (1 − t)b) d t ≤ 2(n!) 0 0  1−1/q Z 1  n  s (n) q (b − a)n 2 n ≤ t + (1 − t) t f (a) 2(n!) n+1 0  2  1/q   q b b −ct(1 − t) − a dt + m(1 − t)s f (n) m m  1−1/q      (n) b q (b − a)n 2 1 − nB(n, s + 1) (n) q = f (a) + m f 2(n!) n+1 n+s+1 m  2 1/q 2c b − −a . (n + 2)(n + 3) m The proof of Theorem 3.1 is thus completed. Corollary 3.1.1. Under conditions of Theorem 3.1,

503

Jun Zhang ET AL 499-508

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1. when q = 1, we have   n X (b − a)k−1 f (k−1) (a) + (−1)k−1 f (k−1) (b) 2(k!) a k=1       2  (n) b (b − a)n 1 − nB(n, s + 1) (n) 2c b ≤ f (a) + m f − −a ; 2(n!) n+s+1 m (n + 2)(n + 3) m

Z 1 b − a

b

f (x) d x −

2. when q = 1 and m = 1, we have   n X (b − a)k−1 f (k−1) (a) + (−1)k−1 f (k−1) (b) f (x) d x − 2(k!) a k=1    2c (b − a)n 1 − nB(n, s + 1)  (n) (n) 2 ≤ f (a) + |f (b)| − (b − a) . 2(n!) n+s+1 (n + 2)(n + 3)

Z 1 b − a

b

Corollary 3.1.2. Under conditions of Theorem 3.1, 1. when s = 1, we have Z 1 b − a

  n X (b − a)k−1 f (k−1) (a) + (−1)k−1 f (k−1) (b) 2(k!) k=1   q   2 1/q 0 b 2c(n + 1) b (b − a)n 0 q − |f (a)| + m f −a ; ≤ 1/q m (n + 2)(n + 3) m 2 [(n + 1)!]

b

f (x) d x −

a

2. when s = 0, we have Z 1 b − a

a

b

  n X (b − a)k−1 f (k−1) (a) + (−1)k−1 f (k−1) (b) f (x) d x − 2(k!) k=1   q   2 1/q 0 b c(n + 1) b (b − a)n 0 q − |f (a)| + m f −a . ≤ (n + 1)! m (n + 2)(n + 3) m

Theorem 3.2. Let f : [0, b∗ ] ⊆ R0 → R0 be n-times differentiable on [0, b∗ ], a, b ∈ [0, b∗ ] with b a < b, and f (n) ∈ L1 ([a, b]). If |f (n) |q is strongly extended (s, m)-convex on 0, m for c ≥ 0, (s, m) ∈ (−1, 1] × (0, 1], and q > 1, then Z 1 b − a

a

b

  n X (b − a)k−1 f (k−1) (a) + (−1)k−1 f (k−1) (b) f (x) d x − 2(k!) k=1   1−1/q  (n) q  2 1/q b q f (a) + m f (n) m (b − a)n 2 c b ≤ − −a . (3.1) 2(n!) n+1 s+1 6 m

Proof. From Lemma 2.1 and H¨ older’s integral inequality, it follows that   Z b n X 1 (b − a)k−1 f (k−1) (a) + (−1)k−1 f (k−1) (b) f (x) d x − b − a 2(k!) a

k=1

504

Jun Zhang ET AL 499-508

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC



(b − a)n 2(n!) n

(b − a) ≤ 2(n!)

1

Z

 tn + (1 − t)n f (n) (ta + (1 − t)b) d t

0

Z

1

n

 n q/(q−1)

t + (1 − t)

1−1/q Z dt

1

(n) f (ta + (1 − t)b) q d t

.

0

0

Since tn + (1 − t)n ≤ 1 for t ∈ [0, 1], we have Z 1 Z 1  n n  n q/(q−1) t + (1 − t)n d t = t + (1 − t) dt ≤ 0

1/q

0

2 . n+1

(n) q

Since |f | is a strongly extended (s, m)-convex function, it follows that    q 2  Z 1 Z 1 (n) q b b f (ta + (1 − t)b) q d t ≤ −ct(1 − t) ts f (n) (a) + m(1 − t)s f (n) − a dt m m 0 0 (n) q   2 f (a) + m f (n) b q c b m − −a . = s+1 6 m Substituting the last two inequalities into the first inequality above and rearranging yield the inequality (3.1). The proof of Theorem 3.2 is thus complete. Corollary 3.2.1. Under the assumptions of Theorem 3.2, we have 1. if s = 1, then   Z b n X 1 (b − a)k−1 f (k−1) (a) + (−1)k−1 f (k−1) (b) f (x) d x − b − a 2(k!) a k=1   2 1/q 1/q (n) q  (b − a)n f (a) + m f (n) b q − c b − a n+1 ; ≤ (n + 1)! m 3 m 2. if s = 0, then   Z b n X 1 (b − a)k−1 f (k−1) (a) + (−1)k−1 f (k−1) (b) f (x) d x − b − a 2(k!) a k=1  1−1/q   2 1/q (n) q  (b − a)n 2 f (a) + m f (n) b q − c b − a ≤ . 2(n!) n+1 m 6 m Theorem 3.3. Let f : [0, b∗ ] ⊆ R0 → R0 be n-times differentiable on [0, b∗ ], a, b ∈ [0, b∗ ] with b a < b, and f (n) ∈ L1 ([a, b]). If |f (n) |q is strongly extended (−1, m)-convex on 0, m for c ≥ 0, m ∈ (0, 1] and q ≥ 1, then   Z b n X 1 (b − a)k−1 f (k−1) (a) + (−1)k−1 f (k−1) (b) f (x) d x − b − a 2(k!) a k=1 " !  1−1/q n−1 X q 1 1 2(b − a)n + ln 2 f (n) (a) ≤ n! 2n+1 (n + 1) 2k+1 (k + 1) k=0  2 #1/q   q 1 (n) b b c(n + 4) + m n f − −a . 2 n m 2n+3 (n + 2)(n + 3) m

505

Jun Zhang ET AL 499-508

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. Using Lemma 2.2 and H¨ older’s integral inequality and considering that |f (n) |q is the strongly extended (−1, m)-convex function, it follows that    Z b n  X 1 1 + (−1)k−1 (b − a)k−1 (k−1) a + b f (x) d x − f b − a 2k−1 (k!) 2 a k=1  Z 1/2 Z 1 (b − a)n ≤ tn |f (n) ((1 − t)a + tb)| d t + (1 − t)n |f (n) (ta + (1 − t)b)| d t d t n! 0 1/2  Z  Z 1−1/q 1/2 1/2 q (b − a)n tn (1 − t)−1 f (n) (a) ≤ tn d t n! 0 0    q 2  1/q b b −1 (n) −ct(1 − t) + mt f −a dt m m Z 1 1−1/q Z 1  q n n (1 − t) d t (1 − t) t−1 f (n) (a) + 1/2

1/2

   q 2  1/q  b b −1 (n) −ct(1 − t) + m(1 − t) f −a dt m m  1−1/q  n−1  X (n) q 2(b − a)n 1 1 f (a) = + ln 2 n+1 k+1 n! 2 (n + 1) 2 (k + 1) k=0   q  2 1/q 1 (n) b c(n + 4) b + m n f − −a . 2 n m 2n+3 (n + 2)(n + 3) m The proof of Theorem 3.3 is thus complete. Theorem 3.4. Let f : [0, b∗ ] ⊆ R0 → R0 be n-times differentiable on [0, b∗ ], a, b ∈ [0, b∗ ] with b a < b, and f (n) ∈ L1 ([a, b]). If |f (n) |q is strongly extended (−1, m)-convex on 0, m for c ≥ 0, m ∈ (0, 1], and q > 1, then   n X (b − a)k−1 f (k−1) (a) + (−1)k−1 f (k−1) (b) 2(b − a)n f (x) d x − ≤ 2(k!) n! a k=1 !1−1/q    q  2 1/q 5c b ln 4 − 1 (n) q m (n) b q−1 − f (a) + f −a . (n+1)q−2 2 2 m 192 m 2 q−1 [(n + 1)q − 2]

Z 1 b − a ×

b

Proof. Using Lemma 2.2 and H¨ older’s integral inequality and considering that |f (n) |q is strongly extended (−1, m)-convex, it follows that    Z b n  X 1 1 + (−1)k−1 (b − a)k−1 (k−1) a + b f (x) d x − f b − a 2k−1 (k!) 2 a k=1 Z 1/2 1−1/q Z 1/2  q nq−1 (b − a)n ≤ t q−1 d t t (1 − t)−1 f (n) (a) n! 0 0  2  1/q   q b b −1 (n) −ct(1 − t) −a dt + mt f m m

506

Jun Zhang ET AL 499-508

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Z

1

(1 − t)

+

nq−1 q−1

1−1/q Z dt

1/2

1

 q (1 − t) t−1 f (n) (a)

1/2

   q 2  1/q  b b −1 (n) −ct(1 − t) + m(1 − t) f −a dt m m !1−1/q 2(b − a)n q−1 = (n+1)q−2 n! 2 q−1 [(n + 1)q − 2]   q  2 1/q  5c b ln 4 − 1 (n) q m (n) b − f (a) + f −a . × 2 2 m 192 m The proof of Theorem 3.4 is thus completed.

Acknowledgements This work was partially supported by the National Natural Science Foundation of China (Grant No. 61672301 and No. 11361038).

References [1] M. W. Alomari, M. Darus, and U. S. Kirmaci, Some inequalities of Hermite-Hadamard type for s-convex functions, Acta Math. Sci. Ser. B Engl. Ed. 31 (2011), no. 4, 1643–1652; Available online at http://dx.doi.org/10.1016/S0252-9602(11)60350-0. [2] S. S. Dragomir and R. P. Agarwal, Two inequalities for differentiable mappings and applications to special means of real numbers and to trapezoidal formula, Appl. Math. Lett. 11 (1998), no. 5, 91–95; Available online at http://dx.doi.org/10.1016/S0893-9659(98)00086-X. [3] S. S. Dragomir and G. Toader, Some inequalities for m-convex functions, Studia Univ. Babe¸sBolyai Math. 38 (1993), no. 1, 21–28. [4] J. Hua, B.-Y. Xi, and F. Qi, Inequalities of HermiteCHadamard type involving an s-convex function with applications, Appl. Math. Comput. 246 (2014), 752–760; Available online at http://dx.doi.org/10.1016/j.amc.2014.08.042. [5] J. Hua, B.-Y. Xi, and F. Qi, Some new inequalities of Simpson type for strongly s-convex functions, Afr. Mat. 26 (2015), no. 5-6, 741–752; Available online at http://dx.doi.org/10. 1007/s13370-014-0242-2. [6] H. Hudzik and L. Maligranda, Some remarks on s-convex functions, Aequationes Math. 48 (1994), no. 1, 100–111; Available online at http://dx.doi.org/10.1007/BF01837981. [7] U. S. Kirmaci, Inequalities for differentiable mappings and applications to special means of real numbers to midpoint formula, Appl. Math. Comput. 147 (2004), no. 1, 137–146; Available online at http://dx.doi.org/10.1016/S0096-3003(02)00657-4. [8] C. E. M. Pearce and J. Peˇcariˇc, Inequalities for differentiable mappings with application to special means and quadrature formulae, Appl. Math. Lett. 13 (2000), no. 2, 51–55; Available online at http://dx.doi.org/10.1016/S0893-9659(99)00164-0.

507

Jun Zhang ET AL 499-508

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[9] B. T. Polyak, Existence theorems and convergence of minimizing sequences in extremum problems with restictions, Soviet Math. Dokl. 7 (1966), 72–75. [10] F. Qi and B.-Y. Xi, Some Hermite–Hadamard type inequalities for geometrically quasi-convex functions, Proc. Indian Acad. Sci. Math. Sci. 124 (2014), no. 3, 333–342; Available online at http://dx.doi.org/10.1007/s12044-014-0182-7. [11] F. Qi, T.-Y. Zhang, and B.-Y. Xi, Hermite–Hadamard-type integral inequalities for functions whose first derivatives are convex, Ukrainian Math. J. 67 (2015), no. 4, 625–640; Available online at http://dx.doi.org/10.1007/s11253-015-1103-3. ¨ [12] M. Z. Sarikaya, E. Set, and M. E. Ozdemir, On new inequalities of Simpson’s type for sconvex functions, Comput. Math. Appl. 60 (2010), no. 8, 2191–2199; Availble online at http: //dx.doi.org/10.1016/j.camwa.2010.07.033. [13] G. Toader, Some generalizations of the convexity, in: Proceedings of the Colloquium on Approximation and Optimization (Cluj-Napoca, 1985), Univ. Cluj-Napoca, Cluj, 1985, 329–338. [14] B.-Y. Xi and F. Qi, Hermite–Hadamard type inequalities for geometrically r-convex functions, Studia Sci. Math. Hungar. 51 (2014), no. 4, 530–546; Available online at http://dx.doi.org/ 10.1556/SScMath.51.2014.4.1294. [15] B.-Y. Xi and F. Qi, Inequalities of Hermite-Hadamard type for extended s-convex functions and applications to means, J. Nonlinear Convex Anal. 16 (2015), no. 5, 873–890. [16] B.-Y. Xi, F. Qi, and T.-Y. Zhang, Some inequalities of Hermite–Hadamard type for mharmonic-arithmetically convex functions, ScienceAsia 41 (2015), no. 5, 357–361; Available online at http://dx.doi.org/10.2306/scienceasia1513-1874.2015.41.357. [17] B.-Y. Xi, S.-H. Wang, and F. Qi, Some inequalities for (h, m)-convex functions, J. Inequal. Appl. 2014, 2014:100, 12 pages; Available online at http://dx.doi.org/10.1186/ 1029-242X-2014-100.

508

Jun Zhang ET AL 499-508

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FIXED POINTS OF MULTIVALUED NONEXPANSIVE MAPPINGS IN KOHLENBACH HYPERBOLIC SPACE ¼ BIROL GUNDUZ, EBRU AYDO GDU, AND HALIS AYGÜN Abstract. In this paper, we give a multivalued version of Picard-Mann hybrid iterative process of Khan [4] in Kohlenbach hyperbolic space. This process converges faster than all of Picard, Mann and Ishikawa iterative processes. By using an idea of Shahzad and Zegeye [8] which removes a restriction on the mapping and the method of direct construction of Cauchy sequence as illustrated by Song and Cho [9], we obtain strong and -convergence theorems of this process for a multivalued mapping. Our results improve corresponding results of Shazad and Zegeye [8], Song and Cho [9] and many other in the contemporary literature in terms of faster iteration, more general space and weaker condition on mapping T .

1. Introduction and Preliminaries Throughout the paper, we denote the set of positive integers by N. Let (E; d) be a metric space and K be a nonempty subset of E. Then K is called proximinal if for each x 2 E; there exists an element k 2 K such that d(x; k) = inffd(x; y) : y 2 Kg = d(x; K) We shall denote the closed and bounded subsets, compact subsets and proximinal bounded subsets of K by CB(K), C(K) and P (K), respectively. Let H be a Hausdor¤ metric induced by the metric d of E, that is H(A; B) = maxfsup d(x; B); sup d(y; A)g x2A

y2B

for every A; B 2 CB(E): A multivalued mapping T : K ! P (K) is said to be a contraction if there exists a constant k 2 [0; 1) such that for any x; y 2 K; H(T x; T y)

kd(x; y);

and T is said to be nonexpansive if H(T x; T y)

d(x; y)

for all x; y 2 K: A point x 2 K is called a …xed point of T if x 2 T x: Denote the set of all …xed points of T by F (T ) and PT (x) = fy 2 T x : d(x; y) = d(x; T x)g. Markin [1] started the study of …xed points for multivalued contractions and nonexpansive mappings using the Hausdor¤ metric (see also [2]). Moreover, Lim [26] proved the existence of …xed points for multivalued nonexpansive mappings under suitable conditions in uniformly convex Banach spaces. Later on, an interesting and rich …xed point theory for such maps was developed which has applications in 2010 Mathematics Subject Classi…cation. 47H10, 54H25. Key words and phrases. common …xed point, hyperbolic space, multivalued nonexpansive map, strong convergence, -convergence. 1

509

BIROL GUNDUZ ET AL 509-519

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

¼ BIROL GUNDUZ, EBRU AYDO GDU, AND HALIS AYGÜN

2

control theory, convex optimization, di¤erential inclusion and economics (see, [3] and references cited therein). Since then di¤erent authors have discussed on the existence and convergence of …xed points for this class of maps in convex metric spaces. For example, Shimizu and Takahashi [18] generalized result of Lim [26] given above from uniformly convex Banach spaces to convex metric spaces. On the other hand, given x0 in K (a subset of Banach space), we know that Picard, Mann and Ishikawa iteration processes for a single valued map T : K ! K de…ned as follows: (Picard)

xn+1 = T xn ;

(Mann)

xn+1 = (1

n ) xn

+

n T xn ;

xn+1 = (1 yn = (1

n ) xn n ) xn

+ +

n T xn

and (Ishikawa)

n T yn

where f n g and f n g are in (0; 1). Very recently, Khan [4] introduced a new iterative process which can be seen as a hybrid of Picard and Mann iterative processes. He also proved that the new process converges faster than all of Picard, Mann and Ishikawa iterative processes for contractions. Iteration scheme of Khan [4] de…ned as follows: xn+1 = T yn yn = (1 n )xn +

(1.1)

n T xn

where f n g is a sequence in (0; 1). It is well know that the theory of multivalued nonexpansive mappings is harder than according to the theory of single valued nonexpansive mappings. Sastry and Babu [5] de…ned Mann and Ishikawa iterative processes for a multivalued mapping as follows: Let K be a nonempty convex subset of E and T : K ! P (K) a multivalued mapping with p 2 T p. (i) Mann iterate sequence is de…ned by x1 2 K; xn+1 = (1

an )xn + an yn ;

where yn 2 T xn is such thatPkyn pk = d(p; T xn ); and fan g is a sequence in (0; 1) satisfying lim an = 0 and an = 1: n!1

(ii) Ishikawa iterate sequence is de…ned by x1 2 K, ( yn = (1 bn )xn + bn zn ; xn+1 = (1 an )xn + an un ;

where zn 2 T xn ; un 2 T yn are such that kzn pk = d(p; T xn ) and kun pk = d(p; T yn ); and fan g; fbn g are real sequences with 0 an ; bn < 1 satisfying lim bn = n!1 P 0 and an bn = 1: Sastry and Babu [5] proved that these iterates converge to a …xed point q of T under certain conditions. Moreover, they illustrated that …xed point q may be di¤erent from p. The following is a useful Lemma due to Nadler [2]. Lemma 1.1. Let A; B 2 CB (E) and a 2 A. If that d (a; b) H (A; B) + .

510

> 0, then there exists b 2 B such

BIROL GUNDUZ ET AL 509-519

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FIXED POINTS OF M ULTIVALUED NONEXPANSIVE M APPINGS

3

In 2007, Panyanak [6] proved a convergence theorem of Mann iterates for a mapping de…ned on a noncompact domain and generalized results of Sastry and Babu [5] to uniformly convex Banach spaces. Furthermore, he gave an open question which was answered by Song and Wang [7]. Later, Shahzad and Zegeye [8] proved strong convergence theorems for the Ishikawa iteration scheme involving quasi-nonexpansive multivalued maps. They also removed compactness of the domain of T and constructed an iteration scheme which removes the restriction of T , namely, T p = fpg for any p 2 F (T ). To achieve this, they de…ned PT (x) = fy 2 T x : d(x; y) = d(x; T x)g for a multivalued mapping T : K ! P (K): They also proved strong convergence results using Ishikawa type iteration process. In this paper, we …rst de…ne a multivalued version of the faster iteration scheme of Khan (1.1) in Kohlenbach hyperbolic spaces and then use weaker condition PT (x) = fy 2 T x : d(x; y) = d(x; T x)g instead of T p = fpg for any p 2 F (T ) due to Shahzad and Zegeye [8] to approximate …xed points of a multivalued nonexpansive mapping T: Moreover, we use the method of direct construction of Cauchy sequence as indicated by Song and Cho [9] (and opposed to [8]) but used also by many other authors including [10],[11] and [13]. The algorithm we use in this paper read as under. Let E be a Kohlenbach hyperbolic space and K be a nonempty convex subset of E. Let T : K ! P (K) be a multivalued map and PT (x) = fy 2 T x : d(x; y) = d(x; T x)g. Choose x0 2 K and de…ne fxn g as ( xn+1 = vn ; (1.2) yn = W (un ; xn ; n ) where un 2 PT (xn ); vn 2 PT (yn ) = PT (W (un ; xn ; n )) and f n g is a real sequence such that 0 < a b < 1 for all n 2 N: The iterative sequence n (1.2) is called the modifed Picard-Mann hybrid iterative process for a multivalued nonexpansive mapping in a Kohlenbach hyperbolic space. In this way, we compute …xed points of a multivalued nonexpansive mapping by modifed Picard-Mann hybrid iterative process in a Kohlenbach hyperbolic space. Our results improve corresponding results of Shazad and Zegeye [8], Song and Cho [9] and many other in the contemporary literature in terms of faster iteration, more general space and weaker condition on mapping T . Di¤erent de…nitions of hyperbolic space can be found in the literature, we refer the readers to [14] for a detailed discussion. We will study under more general setup Kohlenbach hyperbolic spaces which introduced by Kohlenbach [15] as follows: De…nition 1.2. A metric space (E; d) is said to be Kohlenbach hyperbolic space if there exists a map W : E 2 [0; 1] ! E satisfying: W1. W2. W3. W4.

d (u; W (x; y; )) (1 ) d (u; x) + d (u; y) d (W (x; y; ) ; W (x; y; )) = j j d (x; y) W (x; y; ) = W (y; x; (1 )) d (W (x; z; ) ; W (y; w; )) (1 ) d (x; y) + d (z; w)

for all x; y; z; w 2 E and ; 2 [0; 1]. A metric space (E; d) is called a convex metric space introduced by Takahashi [16] if it satis…eses only W1. Every normed space (and Banach space) is a special

511

BIROL GUNDUZ ET AL 509-519

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

¼ BIROL GUNDUZ, EBRU AYDO GDU, AND HALIS AYGÜN

convex metric space, but the converse of this statement is not true, in general (see [11]). In the sequel, we shall use the term hyperbolic space instead of Kohlenbach hyperbolic space in view of simplicity. The class of hyperbolic spaces includes normed spaces and convex subsets thereof, the Hilbert ball (see [17] for a book treatment) as well as CAT (0)-spaces. A hyperbolic space (E; d; W ) is said to be uniformly convex [18] if for all u; x; y 2 E, r > 0 and " 2 (0; 2], there exists a 2 (0; 1] such that 9 d (x; u) r = 1 d (y; u) r ;u (1 ) r: ) d W x; y; ; 2 d (x; y) "r A map : (0; 1) (0; 2] ! (0; 1] which provides such a = (r; ") for given r > 0 and " 2 (0; 2], is called modulus of uniform convexity. We call monotone if it decreases with r (for a …xed "). A subset K of a hyperbolic space E is convex if W (x; y; ) 2 K for all x; y 2 K and 2 [0; 1]: Now, we discourse concept of -convergence which coined by Lim [19] in general metric spaces. To give the de…nition of -convergence, we …rst recall the notions of asymptotic radius and asymptotic center. Let fxn g be a bounded sequence in a metric space E. For x 2 E, de…ne a continuous functional r (:; fxn g) : E ! [0; 1) by r (x; fxn g) = lim supn!1 d (x; xn ) : Then the asymptotic radius = r (fxn g) of fxn g is given by = inf fr (x; fxn g) : x 2 Eg and the asymptotic center of a bounded sequence fxn g with respect to a subset K of E is de…ned as follows: AK (fxn g) = fx 2 E : r (x; fxn g)

r (y; fxn g) for any y 2 Kg :

The set of all asymptotic centers of fxn g is denoted by A(fxn g). It has been shown in [22] that bounded sequences have unique asymptotic center with respect to closed convex subsets in a complete and uniformly convex hyperbolic space with monotone modulus of uniform convexity. A sequence fxn g in E is said to -converge to x 2 E if x is the unique asymptotic center of fun g for every subsequence fun g of fxn g [20]. In this case, we write -limn xn = x. We want to point out that convergence coincides with weak convergence in Banach spaces with Opial’s property [23]. Kirk and Panyanak [20] specialized this concept to CAT(0) spaces and showed that many Banach space results involving weak convergence have precise analogs in this setting. Dhompongsa and Panyanak [21] continued to work in this direction and studied the -convergence of Picard, Mann and Ishikawa iterates in CAT (0) spaces (Theorems 3.1, 3.2 and 3.3 respectively in [21]). Khan et al. [24] was studied this concept in hyperbolic spaces and they gave a couple of helpful lemma as follows. Lemma 1.3. [24] Let (E; d; W ) be a uniformly convex hyperbolic space with monotone modulus of uniform convexity . Let x 2 E and f n g be a sequence in [b; c] for some b; c 2 (0; 1). If fxn g and fyn g are sequences in E such that lim supn!1 d (xn ; x) r; lim supn!1 d (yn ; x) r and limn!1 d (W (xn ; yn ; n ) ; x) = r for some r 0, then limn!1 d (xn ; yn ) = 0: Lemma 1.4. [24] Let K be a nonempty closed convex subset of a uniformly convex hyperbolic space and fxn g be a bounded sequence in K such that A (fxn g) = fyg and

512

BIROL GUNDUZ ET AL 509-519

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FIXED POINTS OF M ULTIVALUED NONEXPANSIVE M APPINGS

5

r (fxn g) = . If fym g is another sequence in K such that limm!1 r (ym ; fxn g) = , then limm!1 ym = y. The following useful lemma can be found in [9] gives some properties of PT in metric (and hence hyperbolic) spaces. Lemma 1.5. [9] Let T : K ! P (K) be a multivalued mapping and PT (x) = fy 2 T x : d(x; y) = d(x; T x)g :Then the following are equivalent. (1) x 2 F (T ); that is, x 2 T x, (2) PT (x) = fxg, that is, x = y for each y 2 PT (x), (3) x 2 F (PT ), that is, x 2 PT (x): Moreover, F (T ) = F (PT ):

2. Main Results Before giving our main results, we show that the modifed Picard-Mann hybrid iterative process (1.2) can be employed for the approximation of …xed points of a multivalued nonexpansive mapping in hyperbolic spaces. De…ne f : K ! K by f (x) = v for some v 2 PT (y) = PT (W (u; x0 ; 0 )) and for some u 2 PT (x). Suppose that PT is nonexpansive multivalued mappings on K. Existence of x1 is guaranteed if f has a …xed point. For any m; n 2 K, let z 2 PT (m), z 0 2 PT (n) such that d(z; z 0 ) = d(z; T n); and y 2 PT (W (z; x0 ; 0 )), y 0 2 PT (W (z 0 ; x0 ; 0 )) such that d(y; y 0 ) = d(y; T (W (z 0 ; x0 ; 0 ))): On using de…nition of condition W4 in hyperbolic sapaces, we have d (f (m); f (n))

= d(y; y 0 ) H (PT (W (z; x0 ; 0 )) ; PT (W (z 0 ; x0 ; d (W (z; x0 ; 0 ); W (z 0 ; x0 ; 0 )) 0 (1 0 )d(z; z ) = (1 0 )d(z; T n) (1 0 )d(z; PT (n)) (1 0 )H(PT (m); PT (n)) (1 0 )d(m; n):

0 )))

Since n 2 (0; 1); f is a contraction. By Banach contraction principle, f has a unique …xed point. Thus the existence of x1 is established. Similarly, the existence of x2 ; x3 ; : : : is established. Thus the modifed Picard-Mann hybrid iterative process (1.2) is well de…ned. We start with the following couple of important lemmas. Lemma 2.1. Let K be a nonempty closed convex subset of a hyperbolic space E and let T : K ! P (K) be a multivalued map such that PT is a nonexpansive map and F 6= ;. Then for the modifed Picard-Mann hybrid iterative process fxn g in (1:2), limn!1 d (xn ; p) exists for each p 2 F .

513

BIROL GUNDUZ ET AL 509-519

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

¼ BIROL GUNDUZ, EBRU AYDO GDU, AND HALIS AYGÜN

6

Proof. Let p 2 F . Then p 2 PT (p) = fpg. Using (1.2) and Lemma 1.5, we have (2.1)

d (xn+1 ; p)

= d (vn ; p) H (PT (yn ) ; PT (p)) d (yn ; p) = d (W (un ; xn ; n ); p) n d (p; un ) + (1 n ) d (p; xn ) d (x ; p) + (1 n n n ) d (xn ; p) = d (xn ; p)

That is, d (xn+1 ; p)

d (xn ; p) :

Hence limn!1 d (xn ; p) exists. Lemma 2.2. Let K be a nonempty closed convex subset of a uniformly convex hyperbolic space E with monotone modulus of uniform convexity and let T : K ! P (K) be a multivalued map such that PT is a nonexpansive map and F 6= ;. Let f n g satisfy 0 < a b < 1. Then for the modifed Picard-Mann hybrid iteran tive process fxn g in (1:2), we have limn!1 (xn ; PT (xn )) = limn!1 (xn ; PT (yn )) = 0. Proof. By Lemma 2.1, limn!1 d (xn ; p) exists for each p 2 F . Assume that lim d (xn ; p) = c for some c 0. For c = 0, the result is trivial. Suppose c > 0. n!1

Now limn!1 d (xn+1 ; p) = c can be rewritten as limn!1 d (vn ; p) = c. Since PT is nonexpansive, we have d (un ; p)

= d (un ; PT (p)) H (PT (xn ) ; PT (p)) d (xn ; p) :

Hence (2.2)

lim sup d (un ; p)

n!1

c

Next d (vn ; p)

= d (vn ; PT (p)) H (PT (yn ) ; PT (p)) d (yn ; p) = d (W (un ; xn ; n ) ; p) (1 n ) d (un ; p) + n d (xn ; p) (1 n ) H (PT (xn ) ; PT (p)) + (1 n ) d (xn ; p) + n d (xn ; p) = d (xn ; p)

n d (xn ; p)

and so lim sup d (vn ; p)

n!1

514

c:

BIROL GUNDUZ ET AL 509-519

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FIXED POINTS OF M ULTIVALUED NONEXPANSIVE M APPINGS

7

Further d (W (un ; xn ;

n ); p)

(1 n ) d (un ; p) + (1 n ) d (xn ; p) + = d (xn ; p) :

n d (xn ; p) n d (xn ; p)

Taking lim sup, we have lim sup d (W (un ; xn ;

n!1

n ); p)

c.

Now (2.1) can be rewritten as d (xn+1 ; p)

d (W (un ; xn ;

n ) ; p)

and so c

lim inf d (W (un ; xn ;

n!1

n ) ; p) :

Hence (2.3)

lim d (W (un ; xn ;

n!1

n ) ; p)

= c:

From limn!1 d (xn ; p) = c, (2.2), (2.3) and Lemma 1.3, it follows lim d (xn ; un ) = 0:

n!1

Similarly we can show that lim d (xn ; vn ) = 0:

n!1

Since d (x; PT (x)) = inf z2PT (x) d (x; z) ; therefore d (xn ; PT (xn ))

d (xn ; un ) ! 0:

d (xn ; PT (yn ))

d (xn ; vn ) ! 0:

Similarly

Now we approximate …xed points of the mapping T through -convergence of the modifed Picard-Mann hybrid iterative process de…ned in (1:2). Theorem 2.3. Let K be a nonempty closed and convex subset of a uniformly convex hyperbolic space E with monotone modulus of uniform convexity . Let T; PT and f n g be as in Lemma 2.2. Then the modifed Picard-Mann hybrid iterative process fxn g -converges to a …xed point of T (or PT ). Proof. Let p 2 F (T ) = F (PT ): From the proof of Lemma 2.1, lim d (xn ; p) exn!1

ists and fxn g is bounded. Thus fxn g has a unique asymptotic center. Therefore A(fxn g) = fxg. Let fvn g be any subsequence of fxn g such that A(fvn g) = fvg. By Lemma 2.2, we have limn!1 (xn ; PT (xn )) = 0. We claim that v is a …xed point of PT .

515

BIROL GUNDUZ ET AL 509-519

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

¼ BIROL GUNDUZ, EBRU AYDO GDU, AND HALIS AYGÜN

8

To prove this, take fzm g in PT (v). Then r(zm ; fvn g)

=

lim sup d(zm ; vn )

n!1

lim sup fd(zm ; PT (vn )) + d(PT (vn ) ; vn )g

n!1

lim sup H(PT (v); PT (vn ))

n!1

lim sup d (v; vn )

n!1

= r (v; fvn g) :

This gives jr(zm ; fvn g r (v; fvn g)j ! 0 as m ! 1. By Lemma 1:4; we get limm!1 zm = v. Note that T v 2 P (K) being proximinal is closed, hence PT (v) is closed. Moreover, PT (v) is bounded. Consequently limm!1 zm = v 2 PT (v). Hence v 2 F (PT ) and so v 2 F (T ): Since limn!1 d(xn ; v) exists from Lemma 2:1, therefore by the uniqueness of asymptotic center, we have lim sup d (vn ; v)
n: Then it follows (along the lines similar to Lemma 2.1) that d(xm ; p) for all p 2 F . Thus we have

d (xm ; xn )

d (xn ; p)

d (xm ; p) + d (p; xn )

516

2d (xn ; p) :

BIROL GUNDUZ ET AL 509-519

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FIXED POINTS OF M ULTIVALUED NONEXPANSIVE M APPINGS

9

Taking inf on the set F , we have d (xm ; xn ) d (xn ; F (T )). On letting m ! 1; n ! 1 the inequality d (xm ; xn ) d (xn ; F (T )) shows that fxn g is a Cauchy sequence in K and hence converges, say to q 2 K. Now it is left to show that q 2 F (T ). Indeed, by d (xn ; F (PT )) = inf y2F (PT ) d (xn ; y) : So for each " > 0, (") there exists pn 2 F (PT ) such that, " d xn ; p(") < d (xn ; F (PT )) + : n 2 (")

" 2:

This implies limn!1 d xn ; pn follows that

(")

From d pn ; q

(")

d xn ; pn

+ d (xn ; q) it

" : 2

lim d p(") n ;q

n!1

Finally, d (PT (q) ; q)

d q; p(") + d p(") n n ; PT (q) d q; p(") + H PT p(") ; PT (q) n n 2d p(") n ;q

yields d (PT (q) ; q) < ". Since " is arbitrary, therefore d (PT (q) ; q) = 0. Since F is closed, q 2 F as required. As appropriate our goal, we give the following de…nitions. The …rst is the multivalued version of condition (I) of Senter and Dotson [25] and second is semi-compact map. De…nition 2.5. A multivalued nonexpansive mappings T : K ! CB(K) where K a subset of E; are said to satisfy condition (I) if there exists a nondecreasing function f : [0; 1) ! [0; 1) with f (0) = 0; f (r) > 0 for all r 2 (0; 1) such that d(x; T x) f (d(x; F )) for all x 2 K: De…nition 2.6. A map T : K ! P (K) is called semi-compact if any bounded sequence fxn g satisfying d(xn ; T xn ) ! 0 as n ! 1 has a convergent subsequence. We now obtain the following theorem by applying the above theorem in a complete and uniformly convex hyperbolic space where T : K ! P (K) satis…es condition (I): Theorem 2.7. Let K be a nonempty closed convex subset of a complete and uniformly convex hyperbolic space E with monotone modulus of uniform convexity and, T; PT and f n g be as in Lemma 2.2. Suppose that PT satisfy condition (I), then the modifed Picard-Mann hybrid iterative process fxn g de…ned in (1:2) converges strongly to p 2 F . Proof. By Lemma 2.1; limn!1 d (xn ; p) exists for all p 2 F (T ). We call it c for some c 0: If c = 0; there is nothing to prove. Assume c > 0: Now d (xn+1 ; p) d (xn ; p) gives that inf

p2F (T )

d (xn+1 ; p)

517

inf

p2F (T )

d (xn ; p) ;

BIROL GUNDUZ ET AL 509-519

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

¼ BIROL GUNDUZ, EBRU AYDO GDU, AND HALIS AYGÜN

10

which means that d(xn+1 ; F (T ))

d(xn ; F (T )):Hence lim d(xn ; F (T )) exists. n!1

By using condition (I) and Lemma 2:2;we get lim f (d(xn ; F (T )))

n!1

lim d(xn ; T xn ) = 0:

n!1

and so lim f (d(xn ; F (T ))) = 0:

n!1

By properties f; we obtain that lim d(xn ; F (T )) = 0: Finally applying Theorem n!1 2:4, we get the result. The proof of follow theorem is also easy and omitted. Theorem 2.8. Let K be a nonempty closed convex subset of a uniformly convex hyperbolic space E with monotone modulus of uniform convexity and, T; PT and f n g be as in Lemma 2.2. Suppose that PT is semi-compact, then the modifed Picard-Mann hybrid iterative process fxn g de…ned in (1:2) converges strongly to p 2 F. Remark 2.9. (1) Theorem 2.4 and Theorem 2.7 extends the corresponding results Khan [4] in three ways: (i) from single valued maps to multivalued maps (ii) from bounded domain to unbounded domain (ii) from uniformly convex Banach space to general setup of uniformly convex hyperbolic spaces. (2) Our theorems sets analogue corresponding results of Khan [4], for multivalued nonexpansive maps on unbounded domain in a uniformly convex hyperbolic space X: (3) Since Picard-Mann hybrid iterative process converges faster than Mann and Ishikawa iterative processes, our theorems are better than results of Fukhar-ud-din et al. [27]. (4) Since CAT(0)-spaces are uniformly convex hyperbolic spaces with a ’nice’ 2 monotone modulus of uniform convexity (r; ") := "8 ; then our results valid in CAT(0) spaces besides Banach spaces. (5) Iteration process (1:2) has not been studied in CAT(0) spaces and Banach spaces for multivalued nonexpansive map so far. Due to hyperbolic spaces are more general than CAT(0) spaces as well as Banach spaces, the iteration process (1:2) does not need to be studied for this class of mappings in CAT(0) spaces or Banach spaces. References [1] J. T. Markin, Continuous dependence of …xed point sets, Proc. Amer. Math. Soc., 38 (1973), 545-547. [2] S. B. Nadler, Jr., Multivalued contraction mappings, Paci…c J. Math., 30 (1969), 475-488. [3] L. Gorniewicz, Topological …xed point theory of multivalued mappings, Kluwer Academic Pub., Dordrecht, Netherlands, 1999. [4] S.H. Khan, Picard-Mann hybrid iterative process, Fixed Point Theory and Applications, 2013, 2013:69. [5] K. P. R. Sastry and G. V. R. Babu, Convergence of Ishikawa iterates for a multivalued mapping with a …xed point, Czechoslovak Math. J., 55 (2005), 817-826. [6] B. Panyanak, Mann and Ishikawa iterative processes for multivalued mappings in Banach spaces, Comp. Math. Appl., 54 (2007), 872-877. [7] Y. Song and H. Wang, Erratum to "Mann and Ishikawa iterative processes for multivalued mappings in Banach spaces", [Comp. Math. Appl., 54(2007), 872-877]. Comp. Math. Appl., 55(2008), 2999-3002.

518

BIROL GUNDUZ ET AL 509-519

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FIXED POINTS OF M ULTIVALUED NONEXPANSIVE M APPINGS

11

[8] N. Shahzad and H. Zegeye, On Mann and Ishikawa iteration schemes for multi-valued maps in Banach spaces, Nonlinear Anal. 71 (2009), no. 3-4, 838-844. [9] Y. Song and Y.J. Cho, Some notes on Ishikawa iteration for multivalued mappings, Bull. Korean. Math. Soc., 48 (2011), No. 3, pp. 575-584. DOI 10.4134/BKMS.2011.48.3.575 [10] S. H. Khan, M. Abbas and B.E. Rhoades, A new one-step iterative scheme for approximating common …xed points of two multivalued nonexpansive mappings, Rend. del Circ. Mat., 59 (2010), 149-157. [11] B. Gunduz and S. Akbulut, Strong convergence of an explicit iteration process for a …nite family of asymptotically quasi-nonexpansive mappings in convex metric spaces, Miskolc Mathematical Notes, 14 (3) (2013), 905-913. [12] B. Gunduz, S. H. Khan, S. Akbulut, On convergence of an implicit iterative algorithm for non self asymptotically non expansive mappings, Hacettepe Journal of Mathematics and Statistics, 43 (3) (2014), 399-411. [13] B. Gunduz and S. Akbulut, Strong and -convergence theorems in hyperbolic spaces, Miskolc Mathematical Notes, 14 (3) (2013), 915-925. [14] U. Kohlenbach and L. Leustean, Applied Proof Theory: Proof Interpretations and Their Use in Mathematics, Springer Monographs in Mathematics. Springer, Berlin, 2008. [15] U. Kohlenbach, Some logical metatheorems with applications in functional analysis, Trans. Amer. Math. Soc., 357 (2005), 89-128. [16] W. Takahashi, A convexity in metric spaces and nonexpansive mappings, Kodai Math Sem Rep. 22 (1970), 142-149. [17] K. Goebel, S. Reich, Uniform convexity, hyperbolic geometry, and nonexpansive mappings, Monographs and Textbooks in Pure and Applied Mathematics, vol. 83, Marcel Dekker Inc., 1984. [18] T. Shimizu and W. Takahashi, Fixed points of multivalued mappings in certain convex metric spaces, Topol Methods Nonlinear Anal. 8 (1996), 197–203. [19] T.C. Lim, Remarks on some …xed point theorems, Proc. Amer. Math. Soc. 60 (1976), 179–182, . [20] W.A. Kirk and B. Panyanak, A concept of convergence in geodesic spaces, Nonlinear Anal. 68 (2008), 3689–3696. [21] S. Dhompongsa and B. Panyanak, On -convergence theorems in CAT(0) spaces, Comput. Math. Appl. 56 (2008), 2572–2579. [22] L. Leu¸stean, Nonexpansive iterations in uniformly convex W-hyperbolic spaces, Contemp. Math., 513 (2010), 193-210. [23] T. Kuczumow, An almost convergence and its applications, Ann. Univ. Mariae CurieSklodowska, Sect. A, 32 (1978), 79-88. [24] A.R. Khan, H. Fukhar-ud-din and M.A.A. Khan, An implicit algorithm for two …nite families of nonexpansive maps in hyperbolic spaces, Fixed Point Theory and Applications 2012, 54 (2012). [25] H.F. Senter and W.G. Dotson, Approximatig …xed points of nonexpansive mappings, Proc. Amer. Math. Soc., 44(2) (1974), 375–380. [26] T.C. Lim, A …xed point theorem for multivalued nonexpansive mappings in a uniformly convex Banach spaces, Bull. Amer. Math. Soc., 80 (1974), 1123-1126. [27] H. Fukhar-ud-din, A.R. Khan and M. Ubaid-ur-rehman, Ishikawa type algorithm of two multi-valued quasi-nonexpansive maps on nonlinear domains, Ann. Funct. Anal. 4 (2) (2013), 97-109. Department of Mathematics, Faculty of Science and Art, Erzincan University, Erzincan, 24000, Turkey. E-mail address : [email protected] Department of Mathematics, Kocaeli University, Kocaeli, Turkey. E-mail address : [email protected] Department of Mathematics, Kocaeli University, Kocaeli, Turkey. E-mail address : [email protected]

519

BIROL GUNDUZ ET AL 509-519

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Double-framed soft sets with applications in BE -algebras Jeong Soon Han1 and Sun Shin Ahn2,∗ 1 2

Department of Applied Mathematics, Hanyang Uiversity, Ansan, 15588, Korea

Department of Mathematics Education, Dongguk University, Seoul 04620, Korea

Abstract. The notions of double-framed soft subalgebras/filters in BE-algebras are introduced and related properties are investigated. We consider characterizations of double-framed soft subalgebras/filters, and establish a new doubleframed soft subalgebra/filter from old one. Also, we show that the int-uni double-framed soft of two double framed soft subalgebras/filters is a double framed soft subalgebra/filter.

1. Introduction In 1966, Imai and Is´eki [3] and Is´eki [4] introduced two classes of abstract algebras: BCKalgebras and BCI-algebras. It is known that the class of BCK-algebras is a proper subclass of the class of BCI-algebras. As a generalization of a BCK-algebra, Kim and Kim [10] introduced the notion of a BE-algebra, and investigated several properties. In [2], Ahn and So introduced the notion of ideals in BE-algebras. They gave several descriptions of ideals in BE-algebras. Molodtsov [12] introduced the concept of soft set as a new mathematical tool for dealing with uncertainties that is free from the difficulties that have troubled the usual theoretical approaches. Molodtsov pointed out several directions for the applications of soft sets. Worldwide, there has been a rapid growth in interest in soft set theory and its applications in recent years. Evidence of this can be found in the increasing number of high-quality articles on soft sets and related topics that have been published in a variety of international journals, symposia, workshops, and international conferences in recent years. Maji et al. [11] described the application of soft set theory to a decision making problem. Jun and Park [9] studied applications of soft sets in ideal theory of BCK/BCI-algebras. Jun et al. [8] introduced the notion of intersectional soft sets, and considered its applications to BCK/BCI-algebras. Also, Jun [5] discussed the union soft sets with applications in BCK/BCI-algebras. Jun et al. [6] introduced the notion of double-framed soft sets, and applied it to BCK/BCI-algebras. They discussed double-frame soft algebras and investigated related properties. Jun et al. [7] studied applications of soft sets in BE-algebras. Ahn et al. [1] introduced the notion of int-soft filters of BE-algebras and investigated related properties. 0

2010 Mathematics Subject Classification: 06F35; 03G25; 06D72. Keywords: Double framed soft set, Double framed soft subalgebra (filter), Int-uni double framed soft subalgebra (filter), BE-algebra. ∗ The corresponding author. Tel: +82 2 2260 3410, Fax: +82 2 2266 3409 0 E-mail: [email protected] (J. S. Han); [email protected] (S. S. Ahn) 0

520

Jeong Soon Han ET AL 520-531

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Jeong Soon Han and Sun Shin Ahn

In this paper, we introduce the notions of double-framed soft subalgebras/filters in BE-algebras and investigated related properties. We consider characterizations of double-framed soft subalgebras/filters, and establish a new double-framed soft subalgebra/filter from old one. Also, we show that the int-uni double-framed soft of two double framed soft subalgebras/filters is a double framed soft subalgebra/filter. 2. Preliminaries We recall some definitions and results discussed in [10]. An algebra (X; ∗, 1) of type (2, 0) is called a BE-algebra if (BE1) (BE2) (BE3) (BE4)

x ∗ x = 1 for all x ∈ X; x ∗ 1 = 1 for all x ∈ X; 1 ∗ x = x for all x ∈ X; x ∗ (y ∗ z) = y ∗ (x ∗ z) for all x, y, z ∈ X (exchange)

We introduce a relation “≤” on a BE-algebra X by x ≤ y if and only if x ∗ y = 1. A non-empty subset S of a BE-algebra X is said to be a subalgebra of X if it is closed under the operation “ ∗ ”. Noticing that x ∗ x = 1 for all x ∈ X, it is clear that 1 ∈ S. Definition 2.1. Let (X; ∗, 1) be a BE-algebra and let F be a non-empty subset of X. Then F is called a filter of X if (F1) 1 ∈ F ; (F2) x ∗ y ∈ F and x ∈ F imply y ∈ F for all x, y ∈ X. Proposition 2.2. Let (X; ∗, 1) be a BE-algebra and let F be a filter of X. If x ≤ y and x ∈ F for any y ∈ X, then y ∈ F . A soft set theory is introduced by Molodtsov [12]. In what follows, let U be an initial universe set and X be a set of parameters. Let P(U ) denotes the power set of U and A, B, C, · · · ⊆ X. Definition 2.3. A soft set (f, A) of X over U is defined to be the set of ordered pairs (f, A) := {(x, f (x)) : x ∈ X, f (x) ∈ P(U )} , where f : X → P(U ) such that f (x) = ∅ if x ∈ / A. 3. Double-framed soft subalgebras In what follows, we take E = X, as a set of parameters, which is a BE-algebra unless otherwise specified. Definition 3.1. A double-framed pair ⟨(α, β); X⟩ is called a double-framed soft set over U, where α and β are mappings from X to P(U ). 521

Jeong Soon Han ET AL 520-531

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Double-framed soft sets with applications in BE-algebras

Definition 3.2. A double-framed soft set ⟨(α, β); X⟩ over U is called a double-framed soft subalgebra over U if it satisfies : (3.1) (∀x, y ∈ X) (α(x ∗ y) ⊇ α(x) ∩ α(y), β(x ∗ y) ⊆ β(x) ∪ β(y)) . Example 3.3. Let X be the set of parameters where X := {1, a, b, c, d} is a BE-algebra [7] with the following Cayley table: ∗ 1 a b c d 1 1 a b c d a 1 1 b c d b 1 a 1 c c c 1 1 b 1 1 d 1 1 1 1 1 Let ⟨(α, β); X⟩ be a double-framed soft set over U defined as follows:   τ3 α : X → P(U ), x 7→ τ  1 τ2 and

  γ3 β : X → P(U ), x 7→ γ  1 γ2

if x = 1, if x ∈ {a, c, d}, if x = b, if x = 1, if x ∈ {a, c, d}, if x = b

where τ1 , τ2 , τ3 , γ1 , γ2 and γ3 are subsets of U with τ1 ⊊ τ2 ⊊ τ3 and γ1 ⊋ γ2 ⊋ γ3 It is routine to verify that ⟨(α, β); X⟩ is a double-framed soft subalgebra over U. Lemma 3.4. Every double-framed soft subalgebra ⟨(α, β); X⟩ over U satisfies the following condition: (3.2) (∀x ∈ X) (α(x) ⊆ α(1), β(x) ⊇ β(1)) . □

Proof. Straightforward.

Proposition 3.5. For a double-framed soft subalgebra ⟨(α, β); X⟩ over U, the following are equivalent: (i) (∀x ∈ X) (α(x) = α(1), β(x) = β(1)) . (ii) (∀x, y ∈ X) (α(y) ⊆ α(y ∗ x), β(y) ⊇ β(y ∗ x)) . Proof. Assume that (ii) is valid. Taking y := 1 in (ii) and using (BE3), we have α(1) ⊆ α(1 ∗ x) = α(x) and β(1) ⊇ β(1 ∗ x) = β(x). It follows from Lemma 3.4 that α(x) = α(1) and β(x) = β(1). Conversely, suppose that α(x) = α(1) and β(x) = β(1) for all x ∈ X. Using (3.1), we have α(y) = α(y) ∩ α(1) = α(y) ∩ α(x) ⊆ α(y ∗ x), β(y) = β(y) ∪ β(1) = β(y) ∪ β(x) ⊇ β(y ∗ x) for all x, y ∈ X. This completes the proof.

□ 522

Jeong Soon Han ET AL 520-531

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Jeong Soon Han and Sun Shin Ahn

For two double-framed soft sets ⟨(α, β); X⟩ and ⟨(f, g); X⟩ over U, the double-framed soft int˜ f, β ∪ ˜ g); X⟩ uni set of ⟨(α, β); X⟩ and ⟨(f, g); X⟩ is defined to be a double-framed soft set ⟨(α∩ where ˜ f : X → P(U ), x 7→ α(x) ∩ f (x), α∩ ˜ g : X → P(U ), x 7→ β(x) ∪ g(x). β∪ ˜ f, β ∪ ˜ g); X⟩ . It is denoted by ⟨(α, β); X⟩ ⊓ ⟨(f, g); X⟩ = ⟨(α∩ Theorem 3.6. The double-framed soft int-uni set of two double-framed soft subalgebras ⟨(α, β); X⟩ and ⟨(f, g); X⟩ over U is a double-framed soft subalgebra over U. Proof. For any x, y ∈ X, we have ˜ f )(x ∗ y) =α(x ∗ y) ∩ f (x ∗ y) ⊇ (α(x) ∩ α(y)) ∩ (f (x) ∩ f (y)) (α∩ ˜ f )(x) ∩ (α∩ ˜ f )(y) =(α(x) ∩ f (x)) ∩ (α(y) ∩ f (y)) = (α∩ and ˜ g)(x ∗ y) =β(x ∗ y) ∪ g(x ∗ y) ⊆ (β(x) ∪ β(y)) ∪ (g(x) ∪ g(y)) (β ∪ ˜ g)(x) ∪ (β ∪ ˜ g)(y). =(β(x) ∪ g(x)) ∪ (β(y) ∪ g(y)) = (β ∪ Therefore ⟨(α, β); X⟩ ⊓ ⟨(f, g); X⟩ is a double-framed soft subalgebra over U.



For two double-framed soft sets ⟨(α, β); X⟩ and ⟨(f, g); X⟩ over U, the double-framed soft uni˜ f, β ∩ ˜ g); X⟩ int set of ⟨(α, β); X⟩ and ⟨(f, g); X⟩ is defined to be a double-framed soft set ⟨(α∪ where ˜ f : X → P(U ), x 7→ α(x) ∪ f (x), α∪ ˜ g : X → P(U ), x 7→ β(x) ∩ g(x). β∩ ˜ f, β ∩ ˜ g); X⟩ . It is denoted by ⟨(α, β); X⟩ ⊔ ⟨(f, g); X⟩ = ⟨(α∪ The following example shows that the double-framed soft uni-int set of two double-framed soft subalgebras ⟨(α, β); X⟩ and ⟨(f, g); X⟩ over U may not be a double-framed soft subalgebra over U. Example 3.7. Let X be the set of parameters where X := {1, a, b, c, d} is a BE-algebra [2] with the following Cayley table: ∗ 1 a b c

1 1 1 1 1

a a 1 1 1 523

b b a 1 a

c c a a 1 Jeong Soon Han ET AL 520-531

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Double-framed soft sets with applications in BE-algebras

Let ⟨(α, β); X⟩ and ⟨(f, g); X⟩ be double-framed soft sets over U defined, respectively, as follows:  τ5 if x = 1,    τ2 if x = a, α : X → P(U ), x 7→ τ if x = b,    1 τ3 if x = c,  γ5    γ2 β : X → P(U ), x 7→ γ    1 γ3

if if if if

 τ4    τ2 f : X → P(U ), x 7→ τ    3 τ1 and

 γ4    γ2 g : X → P(U ), x 7→ γ    3 γ1

x = 1, x = a, x = b, x = c, if if if if

if if if if

x = 1, x = a, x = b, x = c,

x = 1, x = a, x = b, x = c,

where γ1 , γ2 , γ3 , γ4 , γ5 , τ1 , τ2 , τ3 , τ4 and τ5 are subsets of U with τ1 ⊊ τ2 ⊊ τ3 ⊊ τ4 ⊊ τ5 and γ1 ⊋ γ2 ⊋ γ3 ⊋ γ4 ⊋ γ5 . It is routine to verify that ⟨(α, β); X⟩ and ⟨(f, g); X⟩ are double-framed ˜ f, β ∩ ˜ g); X⟩ is not a double-framed soft soft subalgebras over U. But ⟨(α, β); X⟩⊔⟨(f, g); X⟩ = ⟨(α∪ ˜ f )(c ∗ b) = (α∪ ˜ f )(a) = α(a) ∪ f (a) = τ2 ⊉ τ3 = (α∪ ˜ f )(c) ∩ (α∪ ˜ f )(b) subalgebra over U , since (α∪ ˜ g)(c ∗ b) = (β ∩ ˜ g)(a) = β(a) ∩ g(a) = γ2 ⊈ γ3 = (β ∩ ˜ g)(c) ∪ (β ∩ ˜ g)(b). and/or (β ∩ For a double-framed soft set ⟨(α, β); X⟩ over U and two subsets γ and δ of U, the γ-inclusive set and the δ-exclusive set of ⟨(α, β); X⟩, denoted by iX (α; γ) and eX (β; δ), respectively, are defined as follows: iX (α; γ) := {x ∈ X | γ ⊆ α(x)} and eX (β; δ) := {x ∈ X | δ ⊇ β(x)} , respectively. The set DFX (α, β)(γ,δ) := {x ∈ X | γ ⊆ α(x), δ ⊇ β(x)} is called a double-framed including set of ⟨(α, β); X⟩ . It is clear that DFX (α, β)(γ,δ) = iX (α; γ) ∩ eX (β; δ). Theorem 3.8. For a double-framed soft set ⟨(α, β); X⟩ over U, the following are equivalent: (i) ⟨(α, β); X⟩ is a double-framed soft subalgebra over U. (ii) For every subsets γ and δ of U with γ ∈ Im(α) and δ ∈ Im(β), the γ-inclusive set and the δ-exclusive set of ⟨(α, β); X⟩ are subalgebras of X. Proof. Assume that ⟨(α, β); X⟩ is a double-framed soft subalgebra over U. Let x, y ∈ X be such that x, y ∈ iX (α; γ) and x, y ∈ eX (β; δ) for every subsets γ and δ of U with γ ∈ Im(α) and δ ∈ Im(β). It follows from (3.1) that α(x ∗ y) ⊇ α(x) ∩ α(y) ⊇ γ and β(x ∗ y) ⊆ β(x) ∪ β(y) ⊆ δ. 524

Jeong Soon Han ET AL 520-531

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Jeong Soon Han and Sun Shin Ahn

Hence x ∗ y ∈ iX (α; γ) and x ∗ y ∈ eX (β; δ), and therefore iX (α; γ) and eX (β; δ) are subalgebras of X. Conversely, suppose that (ii) is valid. Let x, y ∈ X be such that α(x) = γx , α(y) = γy , β(x) = δx and β(y) = δy . Taking γ = γx ∩ γy and δ = δx ∪ δy imply that x, y ∈ iX (α; γ) and x, y ∈ eX (β; δ). Hence x ∗ y ∈ iX (α; γ) and x ∗ y ∈ eX (β; δ), which imply that α(x ∗ y) ⊇ γ = γx ∩ γy = α(x) ∩ α(y) and β(x ∗ y) ⊆ δ = δx ∪ δy = β(x) ∪ β(y). Therefore ⟨(α, β); X⟩ is a double-framed soft subalgebra over U. □ Corollary 3.9. If ⟨(α, β); X⟩ is a double-framed soft subalgebra over U, then the double-framed including set of ⟨(α, β); X⟩ is a subalgebra of X. For any double-framed soft set ⟨(α, β); X⟩ over over U defined by { α(x) ∗ α : X → P(U ), x 7→ η { β(x) β ∗ : X → P(U ), x 7→ ρ

U, let ⟨(α∗ , β ∗ ); X⟩ be a double-framed soft set if x ∈ iX (α; γ), otherwise, if x ∈ eX (β; δ), otherwise,

where γ, δ, η and ρ are subsets of U with η ⊊ α(x) and ρ ⊋ β(x). Theorem 3.10. If ⟨(α, β); X⟩ is a double-framed soft subalgebra over U, then so is ⟨(α∗ , β ∗ ); X⟩ . Proof. Assume that ⟨(α, β); X⟩ is a double-framed soft subalgebra over U. Then iX (α; γ) and eX (β; δ) are subalgebras of X for every subsets γ and δ of U with γ ∈ Im(α) and δ ∈ Im(β), by Theorem 3.8. Let x, y ∈ X. If x, y ∈ iX (α; γ), then x ∗ y ∈ iX (α; γ). Thus α∗ (x ∗ y) = α(x ∗ y) ⊇ α(x) ∩ α(y) = α∗ (x) ∩ α∗ (y). If x ∈ / iX (α; γ) or y ∈ / iX (α; γ), then α∗ (x) = η or α∗ (y) = η. Hence α∗ (x ∗ y) ⊇ η = α∗ (x) ∩ α∗ (y). Now, if x, y ∈ eX (β; δ), then x ∗ y ∈ eX (β; δ). Thus β ∗ (x ∗ y) = β(x ∗ y) ⊆ β(x) ∪ β(y) = β ∗ (x) ∪ β ∗ (y). If x ∈ / eX (β; δ) or y ∈ / eX (β; δ), then β ∗ (x) = ρ or β ∗ (y) = ρ. Hence β ∗ (x ∗ y) ⊆ ρ = β ∗ (x) ∪ β ∗ (y). Therefore ⟨(α∗ , β ∗ ); X⟩ is a double-framed soft subalgebra over U.



Let ⟨(α, β); X⟩ and ⟨(α, β); Y ⟩ be double-framed soft sets over U, where X, Y are BE-algebras. The (α∧ , β∨ )-product of ⟨(α, β); X⟩ and ⟨(α, β); Y ⟩ is defined to be a double-framed soft set ⟨(αX∧Y , βX∨Y ); X × Y ⟩ over U in which αX∧Y : X × Y → P(U ), (x, y) 7→ α(x) ∩ α(y), βX∨Y : X × Y → P(U ), (x, y) 7→ β(x) ∪ β(y). 525

Jeong Soon Han ET AL 520-531

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Double-framed soft sets with applications in BE-algebras

Theorem 3.11. For any BE-algebras X and Y as sets of parameters, let ⟨(α, β); X⟩ and ⟨(α, β); Y ⟩ be double-framed soft subalgebras over U. Then the (α∧ , β∨ )-product of ⟨(α, β); X⟩ and ⟨(α, β); Y ⟩ is also a double-framed soft subalgebra over U. Proof. Note that (X × Y, ⊛; (1, 1)) is a BE-algebra. For any (x, y), (a, b) ∈ X × Y, we have αX∧Y ((x, y) ⊛ (a, b)) = αX∧Y (x ∗ a, y ∗ b) = α(x ∗ a) ∩ α(y ∗ b) ⊇ (α(x) ∩ α(a)) ∩ (α(y) ∩ α(b)) = (α(x) ∩ α(y)) ∩ (α(a) ∩ α(b)) = αX∧Y (x, y) ∩ αX∧Y (a, b) and βX∨Y ((x, y) ⊛ (a, b)) = βX∨Y (x ∗ a, y ∗ b) = β(x ∗ a) ∪ β(y ∗ b) ⊆ (β(x) ∪ β(a)) ∪ (β(y) ∪ β(b)) = (β(x) ∪ β(y)) ∪ (β(a) ∪ β(b)) = βX∨Y (x, y) ∪ βX∨Y (a, b) Hence ⟨(αX∧Y , βX∨Y ); E × F ⟩ is a double-framed soft subalgebra over U.



4. Double-framed soft filters Definition 4.1. A double-framed soft set ⟨(α, β); X⟩ over U is called a double-framed soft filter over U if it satisfies : (4.1) (∀x ∈ X) (α(1) ⊇ α(x), β(1) ⊆ β(x)) . (4.2) (∀x, y ∈ X) (α(x ∗ y) ∩ α(x) ⊆ α(y), β(y) ⊆ β(x ∗ y) ∪ β(x)) . Example 4.2. Let E = X be the set of parameters where X := {1, a, b, c} is a BE-algebra [1] with the following Cayley table: ∗ 1 a b c 1 1 a b c a 1 1 a a b 1 1 1 a c 1 a a 1 Let ⟨(α, β); X⟩ be a double-framed soft set over U defined, respectively, as follows: { γ2 if x ∈ {1, c}, α : X → P(U ), x 7→ γ1 if x ∈ {a, b}, and

{ β : X → P(U ), x 7→

τ2 τ1

if x ∈ {1, c}, if x ∈ {a, b},

where γ1 , γ2 , τ1 and τ2 are subsets of X with γ1 ⊊ γ2 and τ2 ⊊ τ1 . Then ⟨(α, β); X⟩ is a doubleframed soft filter of X over U . 526

Jeong Soon Han ET AL 520-531

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Jeong Soon Han and Sun Shin Ahn

Example 4.3. Let E = X be the set of parameters where X := {1, a, b, c} is a BE-algebra with the following Cayley table: ∗ 1 a b c 1 1 a b c a 1 1 a a b 1 1 1 c c 1 a b 1 Let ⟨(α, β); X⟩ be a double-framed soft set over U defined as follows: { τ2 if x ∈ {1, a}, α : X → P(U ), x 7→ τ1 if x ∈ {b, c}, and

{ β : X → P(U ), x 7→

δ1 δ2

if x ∈ {1, a}, if x ∈ {b, c},

where τ1 , τ2 , δ1 and δ2 are subsets of U with τ1 ⊊ τ2 and δ1 ⊊ δ2 . Then ⟨(α, β); X⟩ is a doubleframed soft subalgebra over U . But ⟨(α, β); X⟩ is not a double-framed soft filter of X over U , since α(a ∗ b) ∩ α(a) = τ2 ⊈ τ1 = α(b) and/or β(b) = δ2 ⊈ δ1 = β(a ∗ b) ∪ β(a). Theorem 4.4. For a double-framed soft set ⟨(α, β); X⟩ over U, the following are equivalent: (i) ⟨(α, β); X⟩ is a double-framed soft filter over U. (ii) For every subsets γ and δ of U with γ ∈ Im(α) and δ ∈ Im(β), the γ-inclusive set and the δ-exclusive set of ⟨(α, β); X⟩ are filters of X. Proof. Assume that ⟨(α, β); X⟩ is a double-framed soft filter over U. Let x, y ∈ X be such that x ∗ y, x ∈ iX (α; γ) and x ∗ y, x ∈ eX (β; δ) for every subsets γ and δ of U with γ ∈ Im(α) and δ ∈ Im(β). It follows from Definition 4.1 that α(1) ⊇ α(x) ⊇ γ, δ ⊇ β(x) ⊇ β(1), α(y) ⊇ α(x ∗ y) ∩ α(x) ⊇ γ and β(y) ⊆ β(x ∗ y) ∪ β(x) ⊆ δ. Hence 1, y ∈ iX (α; γ) and 1, y ∈ eX (β; δ), and therefore iX (α; γ) and eX (β; δ) are filters of X. Conversely, suppose that iX (α; γ) and eX (β; δ) are filters of X for all γ, δ ∈ P(U ) with iX (α; γ) ̸= ∅ and eX (β; δ) ̸= ∅. Put α(x) = γ for any x ∈ X. Then x ∈ iX (α; γ). Since iX (α; γ) is a filter of X, we have 1 ∈ iX (α; γ) and so α(x) = γ ⊆ α(1). For any x, y ∈ X, let α(x ∗ y) = γx∗y and α(x) = γx . Take γ = γx∗y ∩ γx . Then x ∗ y ∈ iX (α; γ) and x ∈ iX (α; γ) which imply y ∈ iX (α; γ). Hence α(y) ⊇ γ = γx∗y ∩ γx = α(x ∗ y) ∩ α(x). For any x ∈ X, let β(x) = δ. Then x ∈ eX (β; δ). Since eX (β; δ) is a filter of X, we have 1 ∈ eX (β; δ) and so β(x) = δ ⊇ β(1). For any x, y ∈ X, let β(x ∗ y) = δx∗y and β(x) = δx . Take δ = δx∗y ∪ δx . Then x ∗ y ∈ eX (β; δ) and x ∈ eX (β; δ) which imply y ∈ eX (β; δ). Hence β(y) ⊆ δ = δx∗y ∪ δx = β(x ∗ y) ∪ β(x). Therefore ⟨(α, β); X⟩ is a double-framed soft filter over U. □ 527

Jeong Soon Han ET AL 520-531

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Double-framed soft sets with applications in BE-algebras

Proposition 4.5. Every double-framed soft filter ⟨(α, β); X⟩ over U satisfies the following condition: (i) (∀x, y ∈ X) (x ≤ y ⇒ α(x) ⊆ α(y), β(x) ⊇ β(y)) , (ii) (∀a, x ∈ X) (α(a) ⊆ α((a ∗ x) ∗ x), β(a) ⊇ β((a ∗ x) ∗ x)) . Proof. (i) Assume that x ≤ y for all x, y ∈ X. Then x ∗ y = 1. Hence we have α(x) = α(1) ∩ α(x) = α(x ∗ y) ∩ α(x) ⊆ α(y) and β(x) = β(1) ∪ β(x) = β(x ∗ y) ∪ β(x) ⊇ β(y). (ii) Taking y := (a ∗ x) ∗ x and x := a in Definition 4.1, we have α((a ∗ x) ∗ x) ⊇ α(a ∗ ((a ∗ x) ∗ x)) ∩ α(a) = α((a∗x)∗(a∗x))∩α(a) = α(1)∩α(a) = α(a) and β((a∗x)∗x) ⊆ β(a∗((a∗x)∗x))∪β(a) = β((a ∗ x) ∗ (a ∗ x)) ∪ β(a) = β(1) ∪ β(a) = β(a). □ Theorem 4.6. Let ⟨(α, β); X⟩ be a double-framed soft set over U. Then ⟨(α, β); X⟩ is a doubleframed soft filter over U if and only if it satisfies the following condition: (4.3) (∀x, y, z ∈ X)(z ≤ x ∗ y ⇒ α(y) ⊇ α(x) ∩ α(z) and β(y) ⊆ β(x) ∪ β(z)). Proof. Assume that ⟨(α, β); X⟩ is a double-framed soft filter over U . Let x, y, z ∈ X be such that z ≤ x ∗ y. By Proposition 4.5(i), we have α(y) ⊇ α(x ∗ y) ∩ α(x) ⊇ α(z) ∩ α(x) and β(y) ⊆ β(x ∗ y) ∪ β(x) ⊆ β(z) ∪ β(x). Conversely, suppose that ⟨(α, β); X⟩ satisfies (4.3). By (BE2), we have x ≤ x ∗ 1 = 1. Using (4.3), we obtain α(1) ⊇ α(x) and β(1) ⊆ β(x) for all x ∈ X. By (BE1) and (BE4), we get x ≤ (x ∗ y) ∗ y for all x, y ∈ X. It follows from (4.3) that α(y) ⊇ α(x ∗ y) ∩ α(x) and β(y) ⊆ β(x ∗ y) ∩ β(x). Therefore ⟨(α, β); X⟩ is a double-framed soft filter over U . □ For any double-framed soft set ⟨(α, β); X⟩ over over U defined by { α(x) ∗ α : X → P(U ), x 7→ ∅ { β(x) β ∗ : X → P(U ), x 7→ U

U, let ⟨(α∗ , β ∗ ); X⟩ be a double-framed soft set if x ∈ iX (α; γ), otherwise, if x ∈ eX (β; δ), otherwise,

where γ, δ are nonempty subsets of U . Theorem 4.7. If ⟨(α, β); X⟩ is a double-framed soft filter over U, then so is ⟨(α∗ , β ∗ ); X⟩ . Proof. Assume that ⟨(α, β); E⟩ is a double-framed soft filter over U. Then iX (α; γ)(̸= ∅) and eX (β; δ)(̸= ∅) are filters of X for every subsets γ and δ of U with γ ∈ Im(α) and δ ∈ Im(β), by Theorem 4.4. Hence 1 ∈ iX (α; γ), 1 ∈ eX (β; δ) and so α∗ (1) = α(1) ⊇ α(x) = α∗ (x), β ∗ (1) = β(1) ⊆ β(x) = β ∗ (x) for all x ∈ X. Let x, y ∈ X. If x ∗ y ∈ iX (α; γ) and x ∈ iX (α; γ), then y ∈ iX (α; γ). Hence α∗ (y) = α(y) ⊇ α(x ∗ y) ∩ α(x) = α∗ (x ∗ y) ∩ α∗ (x). If x ∗ y ∈ / iX (α; γ) or ∗ ∗ x∈ / iX (α; γ), then α (x ∗ y) = ∅ or α (x) = ∅. Therefore α∗ (y) ⊇ ∅ = α∗ (x ∗ y) ∩ α∗ (x). 528

Jeong Soon Han ET AL 520-531

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Jeong Soon Han and Sun Shin Ahn

Now, if x ∗ y, x ∈ eX (β; δ), then y ∈ eX (β; δ). Thus β ∗ (y) = β(y) ⊆ β(x ∗ y) ∪ β(x) = β ∗ (x ∗ y) ∪ β ∗ (x). If x ∗ y ∈ / eX (β; δ) or x ∈ / eX (β; δ), then β ∗ (x ∗ y) = U or β ∗ (x) = U. Hence β ∗ (y) ⊆ β ∗ (x ∗ y) ∪ β ∗ (x). Therefore ⟨(α∗ , β ∗ ); X⟩ is a double-framed soft filter over U.



Theorem 4.8. A double-framed soft set ⟨(α, β); X⟩ over U is a double-framed soft filter over U if and only if it satisfies the following conditions: (i) (∀x, y ∈ X)(α(y ∗ x) ⊇ α(x), β(y ∗ x) ⊆ β(x)), (ii) (∀x, a, b ∈ X)(α((a ∗ (b ∗ x)) ∗ x) ⊇ α(a) ∩ α(b), β((a ∗ (b ∗ x)) ∗ x) ⊆ β(a) ∩ β(b)). Proof. Assume that ⟨(α, β); X⟩ is a double-framed soft filter algebra over U . It follows from Definition 4.1 that α(y ∗ x) ⊇ α(x ∗ (y ∗ x)) ∩ α(x) = α(1) ∩ α(x) = α(x) and β(y ∗ x) ⊆ β(x ∗ (y ∗ x)) ∪ β(x) = β(1) ∪ β(x) = β(x) for all x, y ∈ X. Using Proposition 4.5(ii), we have α((a ∗ (b ∗ x)) ∗ x) ⊇ α(b ∗ ((a ∗ (b ∗ x)) ∗ x)) ∩ α(b) = α((a ∗ (b ∗ x)) ∗ (b ∗ x)) ∩ α(b) ⊇ α(a) ∩ α(b) and β((a ∗ (b ∗ x)) ∗ x) ⊆ β(b ∗ ((a ∗ (b ∗ x)) ∗ x)) ∪ β(b) = β((a ∗ (b ∗ x)) ∗ (b ∗ x)) ∪ β(b) ⊆ β(a) ∪ β(b) for any a, b, x ∈ X. Conversely, let ⟨(α, β); X⟩ be a double-framed soft set over U satisfying conditions (i) and (ii). If y := x in (i), then α(1) = α(x ∗ x) ⊇ α(x) and β(x ∗ x) = β(1) ⊆ β(x) for all x ∈ X. Using (ii), we have α(y) = α(1 ∗ y) = α(((x ∗ y) ∗ (x ∗ y)) ∗ y) ⊇ α(x ∗ y) ∩ α(x) and β(y) = β(1 ∗ y) = β(((x ∗ y) ∗ (x ∗ y)) ∗ y) ⊆ β(x ∗ y) ∩ α(x) for all x, y ∈ X. Hence ⟨(α, β); X⟩ is a double-framed soft filter of X. □ Theorem 4.9. The double-framed soft int-uni set of two double-framed soft filters ⟨(α, β); X⟩ and ⟨(f, g); X⟩ over U is a double-framed soft filter over U. ˜ f )(1) = α(1) ∩ f (1) ⊇ α(x) ∩ f (x) = (α∩ ˜ f )(x), (β ∪ ˜ g)(1) = Proof. For any x, y ∈ X, we have (α∩ ˜ g)(x) and β(1) ∪ g(1) ⊆ β(x) ∪ g(x) = (β ∪ ˜ f )(y) =α(y) ∩ f (y) (α∩ ⊇(α(x ∗ y) ∩ α(x)) ∩ (f (x ∗ y) ∩ f (x)) =(α(x ∗ y) ∩ f (x ∗ y)) ∩ (α(x) ∩ f (x)) ˜ f )(x ∗ y) ∩ (α∩ ˜ f )(x) =(α∩ and ˜ g)(y) =β(y) ∪ g(y) (β ∪ ⊆(β(x ∗ y) ∪ β(x)) ∪ (g(x ∗ y) ∪ g(x)) =(β(x ∗ y) ∪ g(x ∗ y)) ∪ (β(x) ∪ g(x)) ˜ g)(x ∗ y) ∪ (β ∪ ˜ g)(x). =(β ∪ Therefore ⟨(α, β); X⟩ ⊓ ⟨(f, g); X⟩ is a double-framed soft filter over U. 529

Jeong Soon Han ET AL 520-531



J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Double-framed soft sets with applications in BE-algebras

The following example shows that the double-framed soft uni-int set of two double-framed soft filter ⟨(α, β); X⟩ and ⟨(f, g); X⟩ over U may not be a double-framed soft filter over U. Example 4.10. Let E = X be the set of parameters where X := {1, a, b, c, d, 0} is a BE-algebra [2] with the following Cayley table: ∗ 1 a b c d 0

1 1 1 1 1 1 1

a a 1 1 a 1 1

b b a 1 b a 1

c c c c 1 1 1

d d c c a 1 1

0 0 d c b a 1

Let ⟨(α, β); X⟩, ⟨(f, g); X⟩ be double-framed soft sets over U defined as follows: { γ3 if x ∈ {1, c}, α : X → P(U ), x 7→ γ1 if x ∈ {a, b, d, 0}, {

τ3 τ1

β : X → P(U ), x 7→ { f : X → P(U ), x 7→ and

{ g : X → P(U ), x 7→

if x ∈ {1, c}, if x ∈ {a, b, d, 0},

γ4 γ2

if x ∈ {1, a, d}, if x ∈ {c, d, 0},

τ4 τ2

if x ∈ {1, a, b}, if x ∈ {c, d, 0},

where γ1 , γ2 , γ3 , γ4 , τ1 , τ2 , τ3 and τ4 are subsets of U with γ1 ⊊ γ2 ⊊ γ3 ⊊ γ4 and τ1 ⊋ τ2 ⊋ τ3 ⊋ τ4 . Then ⟨(α, β); X⟩, ⟨(f, g); X⟩ are double-framed soft filters over U . But ⟨(α, β); X⟩ ⊔ ⟨(f, g); X⟩ = ˜ f, β ∩ ˜ g); X⟩ is not a double-framed soft filter over U , since ⟨(α∪ ˜ f )(c ∗ d) ∩ (α∪ ˜ f )(c) =(α∪ ˜ f )(a) ∩ (α∪ ˜ f )(c) (α∪ =(α(a) ∪ f (a)) ∩ (α(c) ∪ f (c)) =γ4 ∩ γ3 = γ3 ⊈ γ2 = γ1 ∪ γ2 ˜ f )(d) =α(d) ∪ f (d) = (α∪ and/or ˜ g)(c ∗ d) ∪ (β ∩ ˜ g)(c) =(β ∩ ˜ g)(a) ∪ (β ∩ ˜ g)(c) (β ∩ =(β(a) ∩ g(a)) ∪ (β(c) ∩ g(c)) =(τ1 ∩ τ4 ) ∪ (τ3 ∩ τ2 ) = τ4 ∪ τ3 = τ3 ˜ g)(d). ⊉τ2 = τ1 ∩ τ2 = β(d) ∩ g(d) = (β ∩ 530

Jeong Soon Han ET AL 520-531

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Jeong Soon Han and Sun Shin Ahn

References [1] S. S. Ahn, O. Alshehri and Y. B. Jun, Int-soft filters of BE-algebras, Discrete Dyn. Nat. Soc. (2013), 1-8. [2] S. S. Ahn and K. S. So, On ideals and upper sets in BE-algerbas, Sci. Math. Jpn. 68 (2008), 279–285. [3] Y. Imai and K. Is´eki, On axiom systems of propositional calculi XIV, Proc. Japan Academy 42 (1966), 19–22. [4] K. Is´eki, An algebra related with a propositional calculus, Proc. Japan Academy 42 (1966), 26–29. [5] Y. B. Jun, Union soft sets with applications in BCK/BCI-algebras, Bull. Korean Math. Soc. 50 (2013), no. 6, 1937-1956. [6] Y. B Jun and S. S. Ahn, Double-framed soft sets with applications in BCK/BCI-algebras, J. Appl. Math. (2012), 1-15. [7] Y. B. Jun and S. S. Ahn, Applications of soft sets in BE-algebras, Algebra, (2013), 1-8. [8] Y. B. Jun, K. J. Lee and E. H. Roh, Intersectional soft BCK/BCI-ideals, Ann. Fuzzy Math. Inform. 4(1) (2012) 1–7. [9] Y. B. Jun and C. H. Park, Applications of soft sets in ideal theory of BCK/BCI-algebras, Inform. Sci. 178 (2008) 2466–2475. [10] H. S. Kim and Y. H. Kim, On BE-algerbas, Sci. Math. Jpn. 66 (2007), no. 1, 113–116. [11] P. K. Maji, A. R. Roy and R. Biswas, An application of soft sets in a decision making problem, Comput. Math. Appl. 44 (2002) 1077–1083. [12] D. Molodtsov, Soft set theory - First results, Comput. Math. Appl. 37 (1999) 19–31.

531

Jeong Soon Han ET AL 520-531

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

HYERS-ULAM STABILITY OF ADDITIVE FUNCTION EQUATIONS IN PARANORMED SPACES CHOONKIL PARK, SU MIN KWON, AND JUNG RYE LEE∗ Abstract. In this paper, we prove the Hyers-Ulam stability of the following additive functional equations   1 1 x+y +z+w = f (x) + f (y) + f (z) + f (w), f 2 2 2   x+y+z 1 1 1 f +w = f (x) + f (y) + f (z) + f (w) 3 3 3 3 in paranormed spaces.

1. Introduction and preliminaries The concept of statistical convergence for sequences of real numbers was introduced by Fast [5] and Steinhaus [23] independently and since then several generalizations and applications of this notion have been investigated by various authors (see [6, 9, 11, 12, 18]). This notion was defined in normed spaces by Kolk [10]. We recall some basic facts concerning Fr´ echet spaces. Definition 1.1. [25] Let X be a vector space. A paranorm P : X → [0, ∞) is a function on X such that (1) P (0) = 0; (2) P (−x) = P (x) ; (3) P (x + y) ≤ P (x) + P (y) (triangle inequality) (4) If {tn } is a sequence of scalars with tn → t and {xn } ⊂ X with P (xn − x) → 0, then P (tn xn − tx) → 0 (continuity of multiplication). The pair (X, P ) is called a paranormed space if P is a paranorm on X. The paranorm is called total if, in addition, we have (5) P (x) = 0 implies x = 0. A Fr´ echet space is a total and complete paranormed space. The stability problem of functional equations originated from a question of Ulam [24] concerning the stability of group homomorphisms. Hyers [8] gave a first affirmative partial answer to the question of Ulam for Banach spaces. Hyers’ Theorem was generalized by Aoki [1] for additive mappings and by Th.M. Rassias [16] for linear mappings by considering an unbounded Cauchy difference. A generalization of the Th.M. Rassias theorem was obtained by G˘avruta [7] by replacing the unbounded Cauchy difference by a general control function in the spirit of Th.M. Rassias’ approach. See [2, 3, 4, 13, 14, 15, 17, 19, 20, 21, 22] for more information on the stability problems of functional equations. 2010 Mathematics Subject Classification. Primary 35A17; 39B52; 39B72. Key words and phrases. Hyers-Ulam stability, paranormed space; functional equation. ∗ Corresponding author.

532

CHOONKIL PARK ET AL 532-538

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

C. PARK, S.M. KWON, AND J. R. LEE

Using the direct method, we prove the Hyers-Ulam stability of the following additive functional equations x+y f +z+w = 2   x+y+z f +w = 3 

1 f (x) + 2 1 f (x) + 3



1 f (y) + f (z) + f (w), 2 1 1 f (y) + f (z) + f (w) 3 3

(1.1) (1.2)

in paranormed spaces. Throughout this paper, assume that (X, P ) is a Fr´ echet space and that (Y, k · k) is a Banach space. 2. Hyers-Ulam stability of the functional equation (1.1) In this section, we prove the Hyers-Ulam stability of the functional equation (1.1) in paranormed spaces. Note that P (3x) ≤ 3P (x) for all x ∈ Y . Theorem 2.1. Let r, θ be positive real numbers with r > 1, and let f : Y → X be an odd mapping such that  

P f

x+y 1 1 + z + w − f (x) − f (y) − f (z) − f (w) 2 2 2 ≤ θ(kxkr + kykr + kzkr + kwkr ) 



(2.1)

for all x, y, w, z ∈ Y . Then there exists a unique additive mapping A : Y → X such that 4θ kxkr 3r − 3

P (f (x) − A(x)) ≤

(2.2)

for all x ∈ Y . Proof. Letting w = z = y = x in (2.1), we get P (f (3x) − 3f (x)) ≤ 4θkxkr for all x ∈ Y . So 

x 3

 

P f (x) − 3f



4 θkxkr 3r

for all x ∈ Y . Hence 

P 3l f



x 3l



− 3m f



x 3m





m−1 X j=l



P 3j f



x 3j



− 3j+1 f



x 3j+1





X 3j 4 m−1 θkxkr (2.3) 3r j=l 3rj

for all nonnegative integers m and l with m > l and all x ∈ Y . It follows from (2.3) that the sequence {3n f ( 3xn )} is a Cauchy sequence for all x ∈ Y . Since X is complete, the sequence {3n f ( 3xn )} converges. So one can define the mapping A : Y → X by A(x) := lim 3n f ( n→∞

x ) 3n

for all x ∈ Y . Moreover, letting l = 0 and passing the limit m → ∞ in (2.3), we get (2.2).

533

CHOONKIL PARK ET AL 532-538

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FUNCTION EQUATIONS IN PARANORMED SPACES

It follows from (2.1) that x+y 1 1 + z + w − A(x) − A(y) − A(z) − A(w) 2 2 2             x+y z+w 1 x 1 y z w = lim P 3n f + − f − f − f − f n→∞ 2 · 3n 3n 2 3n 2 3n 3n 3n            x+y z+w 1 1 z w x y ≤ lim 3n P f + − − − f − f f f n→∞ 2 · 3n 3n 2 3n 2 3n 3n 3n 3n θ ≤ lim nr (kxkr + kykr + kzkr + kwkr ) = 0 n→∞ 3 







P A





1 1 for all x, y, z, w ∈ Y . Hence A x+y 2 + z + w = 2 A(x)+ 2 A(y)+A(z)+A(w) for all x, y, z, w ∈ Y and so the mapping A : Y → X is additive. Now, let T : Y → X be another additive mapping satisfying (2.2). Then we have

x x P 3 A n −T 3 3n      x x 3n P A n − T 3 3n            x x x x n +P T −f 3 P A n −f n n 3 3 3 3n n 8·3 θkxkr , r (3 − 3)3nr 

P (A(x) − T (x)) = ≤ ≤ ≤

n











which tends to zero as n → ∞ for all x ∈ Y . So we can conclude that A(x) = T (x) for all x ∈ Y . This proves the uniqueness of A. Thus the mapping A : Y → X is a unique additive mapping satisfying (2.2).  Theorem 2.2. Let r be a positive real number with r < 1, and let f : X → Y be an odd mapping such that

 

f x + y + z + w − 1 f (x) − 1 f (y) − f (z) − f (w) ≤ P (x)r + P (y)r + P (z)r + P (w)r (2.4)

2 2 2

for all x, y, w, z ∈ X. Then there exists a unique additive mapping A : X → Y such that kf (x) − A(x)k ≤

4 P (x)r 3 − 3r

(2.5)

for all x ∈ X. Proof. Letting w = z = y = x in (2.4), we get k3f (x) − f (3x)k ≤ 4P (x)r and so



f (x) − 1 f (3x) ≤ 4 P (x)r

3 3

for all x ∈ X. Hence

m−1

m−1 X X 3rj

1

1

f (3l x) − 1 f (3m x) ≤

f (3j x) − 1 f (3j+1 x) ≤ 4 P (x)r

3l

3j

j+1 j 3m 3 3 3 j=l j=l

534

(2.6)

CHOONKIL PARK ET AL 532-538

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

C. PARK, S.M. KWON, AND J. R. LEE

for all nonnegative integers m and l with m > l and all x ∈ X. It follows from (2.6) that the sequence { 31n f (3n x)} is a Cauchy sequence for all x ∈ X. Since Y is complete, the sequence { 31n f (3n x)} converges. So one can define the mapping A : X → Y by 1 f (3n x) 3n for all x ∈ X. Moreover, letting l = 0 and passing the limit m → ∞ in (2.6), we get (2.5). It follows from (2.4) that





A x + y + z + w − 1 A(x) − 1 A(y) − A(z) − A(w)

2 2 2

 



1 1 1 n x+y n n n n

= lim n f 3 +z+w − f (3 x) − f (3 y) − f (3 z) − f (3 w)

n→∞ 3 2 2 2 nr 3 ≤ lim n (P (x)r + P (y)r + P (z)r + P (w)r ) = 0 n→∞ 3 A(x) := lim

n→∞





1 1 for all x, y, z, w ∈ X. Thus A x+y 2 + z + w = 2 A(x)+ 2 A(y)+A(z)+A(w) for all x, y, z, w ∈ X and so the mapping A : X → Y is additive. Now, let T : X → Y be another additive mapping satisfying (2.5). Then we have 1 kA (3n x) − T (3n x)k kA(x) − T (x)k = 3n 1 ≤ (kA (3n x) − f (3n x)k + kT (3n x) − f (3n x)k) 3n 8 · 3nr ≤ P (x)r , (3 − 3r )3n

which tends to zero as n → ∞ for all x ∈ X. So we can conclude that A(x) = T (x) for all x ∈ X. This proves the uniqueness of A. Thus the mapping A : X → Y is a unique additive mapping satisfying (2.5).  Similarly, one obtains the following. Theorem 2.3. Let r, θ be positive real numbers with r > 14 , and let f : Y → X be an odd mapping such that     x+y 1 1 P f + z + w − f (x) − f (y) − f (z) − f (w) ≤ θkxkr kykr kzkr kwkr 2 2 2 for all x, y, z, w ∈ Y . Then there exists a unique additive mapping A : Y → X such that θ P (f (x) − A(x)) ≤ r kxk4r 81 − 3 for all x ∈ Y . Theorem 2.4. Let r be a positive real number with r < 14 , and let f : X → Y be an odd mapping such that





f x + y + z + w − 1 f (x) − 1 f (y) − f (z) − f (w) ≤ P (x)r P (y)r P (z)r P (w)r

2 2 2 for all x, y, w, z ∈ X. Then there exists a unique additive mapping A : X → Y such that 1 kf (x) − A(x)k ≤ P (x)4r 3 − 81r for all x ∈ X.

535

CHOONKIL PARK ET AL 532-538

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FUNCTION EQUATIONS IN PARANORMED SPACES

3. Hyers-Ulam stability of the functional equation (1.2) In this section, we prove the Hyers-Ulam stability of the functional equation (1.2) in paranormed spaces. Note that P (2x) ≤ 2P (x) for all x ∈ Y . Theorem 3.1. Let r, θ be positive real numbers with r > 1, and let f : Y → X be an odd mapping such that     x+y+z 1 1 1 P f + w − f (x) − f (y) − f (z) − f (w) 3 3 3 3 r r r r ≤ θ(kxk + kyk + kzk + kwk ) (3.1) for all x, y, w, z ∈ Y . Then there exists a unique additive mapping A : Y → X such that 4θ P (f (x) − A(x)) ≤ r kxkr 2 −2 for all x ∈ Y . Proof. Letting w = z = y = x in (3.1), we get P (f (2x) − 2f (x)) ≤ 4θkxkr for all x ∈ Y . So 

x 2

 

P f (x) − 2f



4 θkxkr 2r

for all x ∈ Y . Hence 

P 2l f



x 2l



− 2m f



x 2m





m−1 X j=l



P 2j f



x 2j



− 2j+1 f



x 2j+1





X 2j 4 m−1 θkxkr 2r j=l 2rj

for all nonnegative integers m and l with m > l and all x ∈ Y . The rest of the proof is similar to the proof of Theorem 2.1.  Theorem 3.2. Let r be a positive real number with r < 1, and let f : X → Y be an odd mapping such that





f x + y + z + w − 1 f (x) − 1 f (y) − 1 f (z) − f (w) ≤ P (x)r + P (y)r + P (z)r + P (w)r(3.2)

3 3 3 3 for all x, y, w, z ∈ X. Then there exists a unique additive mapping A : X → Y such that 4 kf (x) − A(x)k ≤ P (x)r 2 − 2r for all x ∈ X. Proof. Letting w = z = y = x in (3.2), we get k2f (x) − f (2x)k ≤ 4P (x)r and so



f (x) − 1 f (2x) ≤ 2P (x)r

2

for all x ∈ X. Hence

m−1

m−1 X 1 X 2rj

1

f (2l x) − 1 f (2m x) ≤

f (2j x) − 1 f (2j+1 x) ≤ 2 P (x)r

2l

2j j+1 j 2m 2 2 j=l j=l

for all nonnegative integers m and l with m > l and all x ∈ X. The rest of the proof is similar to the proof of Theorem 2.2.

536



CHOONKIL PARK ET AL 532-538

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

C. PARK, S.M. KWON, AND J. R. LEE

Similarly, one obtains the following. Theorem 3.3. Let r, θ be positive real numbers with r > mapping such that

1 4,

and let f : Y → X be an odd

1 1 1 x+y+z + w − f (x) − f (y) − f (z) − f (w) ≤ θkxkr kykr kzkr kwkr P f 3 3 3 3 for all x, y, z, w ∈ Y . Then there exists a unique additive mapping A : Y → X such that  





P (f (x) − A(x)) ≤

θ kxk4r −2

16r

for all x ∈ Y . Theorem 3.4. Let r be a positive real number with r < mapping such that

1 4,

and let f : X → Y be an odd

 

f x + y + z + w − 1 f (x) − 1 f (y) − 1 f (z) − f (w)

3 3 3 3

≤ P (x)r P (y)r P (z)r P (w)r for all x, y, w, z ∈ X. Then there exists a unique additive mapping A : X → Y such that 1 kf (x) − A(x)k ≤ P (x)4r 2 − 16r for all x ∈ X. References [1] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan 2 (1950), 64–66. [2] L. C˘ adariu, L. G˘ avruta, P. G˘ avruta, On the stability of an affine functional equation, J. Nonlinear Sci. Appl. 6 (2013), 60–67. [3] A. Chahbi, N. Bounader, On the generalized stability of d’Alembert functional equation, J. Nonlinear Sci. Appl. 6 (2013), 198–204. [4] G. Z. Eskandani, P. Gˇ avruta, Hyers-Ulam-Rassias stability of pexiderized Cauchy functional equation in 2-Banach spaces, J. Nonlinear Sci. Appl. 5 (2012), 459–465. [5] H. Fast, Sur la convergence statistique, Colloq. Math. 2 (1951), 241–244. [6] J.A. Fridy, On statistical convergence, Analysis 5 (1985), 301–313. [7] P. Gˇ avruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings, J. Math. Anal. Appl. 184 (1994), 431–436. [8] D.H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. U.S.A. 27 (1941), 222–224. [9] S. Karakus, Statistical convergence on probabilistic normed spaces, Math. Commun. 12 (2007), 11–23. [10] E. Kolk, The statistical convergence in Banach spaces, Tartu Ul. Toime. 928 (1991), 41–52. [11] M. Mursaleen, λ-statistical convergence, Math. Slovaca 50 (2000), 111–115. [12] M. Mursaleen, S.A. Mohiuddine, On lacunary statistical convergence with respect to the intuitionistic fuzzy normed space, J. Computat. Anal. Math. 233 (2009), 142–149. [13] C. Park, Orthogonal stability of a cubic-quartic functional equation, J. Nonlinear Sci. Appl. 5 (2012), 28–36. [14] C. Park, K. Ghasemi, S. G. Ghale, S. Jang, Approximate n-Jordan ∗-homomorphisms in C ∗ -algebras, J. Comput. Anal. Appl. 15 (2013), 365–368.  [15] C. Park, A. Najati, S. Jang, Fixed points and fuzzy stability of an additive-quadratic functional equation, J. Comput. Anal. Appl. 15 (2013), 452–462. [16] Th.M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 (1978), 297–300. [17] K. Ravi, E. Thandapani, B. V. Senthil Kumar, Solution and stability of a reciprocal type functional equation in several variables, J. Nonlinear Sci. Appl. 7 (2014), 18–27. ˇ at, On the statistically convergent sequences of real numbers, Math. Slovaca 30 (1980), 139–150. [18] T. Sal´

537

CHOONKIL PARK ET AL 532-538

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FUNCTION EQUATIONS IN PARANORMED SPACES

[19] S. Shagholi, M. Bavand Savadkouhi, M. Eshaghi Gordji, Nearly ternary cubic homomorphism in ternary Fr´echet algebras, J. Comput. Anal. Appl. 13 (2011), 1106–1114. [20] S. Shagholi, M. Eshaghi Gordji, M. B. Savadkouhi, Stability of ternary quadratic derivation on ternary Banach algebras, J. Comput. Anal. Appl. 13 (2011), 1097–1105. [21] D. Shin, C. Park, Sh. Farhadabadi, On the superstability of ternary Jordan C ∗ -homomorphisms, J. Comput. Anal. Appl. 16 (2014), 964–973. [22] D. Shin, C. Park, Sh. Farhadabadi, Stability and superstability of J ∗ -homomorphisms and J ∗ -derivations for a generalized Cauchy-Jensen equation, J. Comput. Anal. Appl. 17 (2014), 125–134. [23] H. Steinhaus, Sur la convergence ordinaire et la convergence asymptotique, Colloq. Math. 2 (1951), 33-34. [24] S.M. Ulam, A Collection of the Mathematical Problems, Interscience Publ. New York, 1960. [25] A. Wilansky, Modern Methods in Topological Vector Space, McGraw-Hill International Book Co., New York, 1978. Choonkil Park Department of Mathematics, Research Institute for Natural Sciences, Hanyang University, Seoul 04763, Korea E-mail address: [email protected] Su Min Kwon Department of Mathematics, Hanyang University, Seoul 04763, Korea E-mail address: [email protected] Jung Rye Lee Department of Mathematics, Daejin University, Kyeonggi 11159, Korea E-mail address: [email protected]

538

CHOONKIL PARK ET AL 532-538

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

New Uzawa-type method for nonsymmetric saddle point problems Shu-Xin Miao1 Juan Li College of Mathematics and Statistics,Northwest Normal University, Lanzhou, 730070, China

Abstract In this paper, based on the Hermitian and skew-Hermitian splitting of the non-Hermitian positive definite (1, 1)block of the saddle point matrix, a new Uzawa-type iteration method is proposed for solving a class of nonsymmetric saddle point problems. The convergence properties of this iteration method are analyzed. Numerical results verify the effectiveness and robustness of the proposed method. Keywords: Saddle-point problem, Uzawa-type iteration method, Convergence 2000 MSC: 65F10, 65F50

1. Introduction Consider the nonsymmetric saddle point problems of the form [ ][ ] [ ] A B x f Au = = = b, B∗ 0 y g

(1)

where A ∈ Cn×n is a non-Hermitian positive definite matrix, B ∈ Cn×m is a rectangular matrix of full column rank, f ∈ Cn and g ∈ Cm are given vectors, with m ≤ n. The saddle point problem (1) arises in a variety of scientific and engineering applications, such as computational fluid dynamics, constrained optimization, optimal control, weighted least squares problems, electronic networks and computer graphics, and typically result from mixed or hybrid finite element approximation of second-order elliptic problems or the Stokes equations; see [1, 12] and the references therein. Since matrix blocks A and B are large and sparse, (1) is suitable for being solved by the iterative methods. Most efficient iterative methods have been studied in many literatures, including Uzawa-type methods [10, 11, 14, 16], Hermitian and skew-Hermitian splitting (HSS) iterative method and its variant schemes [3, 5, 6, 7, 9, 17], preconditioned Krylov subspace iterative methods [3, 15] and so on. See [1, 12] and the references therein for a comprehensive survey about iterative methods and preconditioning techniques. Within these methods, Uzawa method received wide attention and obtained considerable achievements in recent years. The iteration scheme of Uzawa method can be described, for a positive parameter τ, as { xk+1 = A−1 ( f − Byk ), yk+1 = yk + τ(B∗ xk+1 − g). Note that there is a linear system Ax = q needs to be solved at each step of Uzawa method, we prefer to use iterative method to approximate its solution since matrix A is always large and sparse. When A is Hermitian positive definite, by using classical splitting iteration to approximate xk+1 in each step of Uzawa method, a class of Uzawa-type iteration methods for solving the Hermitian saddle-point problems are studied in [21, 22]. When A is no-Hermitian positive definite, we can split A as 1 1 A = H + S , with H = (A + A∗ ), S = (A − A∗ ), (2) 2 2 1 Corresponding

author. Email: [email protected].

539

Shu-Xin Miao ET AL 539-544

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

and then approximate xk+1 in each step of Uzawa method by using the efficient HSS method [7], then the Uzawa-HSS method for solving nonsingular non-Hermitian saddle point problem is propsed; see [19, 20]. The HSS method received much attentions as it is an efficient and robust method for solving non-Hermitian positive definite systems of linear equations; see for example [2, 4, 7, 8, 9, 13, 18]. There are two linear subsystems with αIn + H and αIn + S needs to be solved at each step of the HSS method. Here and in the sequence of the paper Ii denotes the identity matrix with order i. The solution of linear subsystem with αIn + H can be easily obtained by CG method, however, the solution of linear subsystem with αIn + S is not easy to obtain. To avoid solving a shift skew-Hermitian linear subsystem with αIn + S , based on the splitting (2), a new iteration method is presented for solving non-Hermitian positive definite system of linear equations [18] recently. The iteration scheme of new method used for solving Ax = q can be written as { Hxk+1/2 = −S xk + q, (3) (αIn + H)xk+1 = (αIn − S )xk+1/2 + q. Theoretical analysis as well as numerical experiments show that the new method (3) is also an efficient and robust method for solving non-Hermitian positive definite and normal linear system with strong Hermitian parts [18]. In this paper, to avoid solving a shift skew-Hermitian linear subsystem at each step of Uzawa method, we use the iteration (3) to approximate xk+1 , then a new Uzawa-type method is established. The convergence properties of this novel method for saddle point problem (1) will be carefully analyzed. In addition, we test the effectiveness and robustness of the proposed method by comparing its iteration number and elapsed CPU time with those of the Uzawa-HSS [19, 20] and the GMRES methods. 2. A Uzawa-type method The iteration scheme (3) in [18] used for solving non-Hermitian positive definite and normal linear system Ax = q can be written equivalently as xk+1 = T (α)xk + N(α)q, here α is a positive iteration parameter,   T (α)          N(α)    

= (αIn + H)−1 (αIn − S )H −1 (−S ) −1 = (αIn + H)−1 H ( (αIn − S )(−S ) ) = (αIn + H)−1 In + (αIn − S )H −1 = (αIn + H)−1 H −1 (αIn + H − S ).

In this paper, we assumption that the (1, 1)-block matrix A of (1) is normal, i.e., AA∗ = A∗ A. Introducing a Hermitian positive definite preconditioning matrix Q for the iteration scheme, and using iteration (3) to approximate xk+1 , then we present the following Uzawa-type method for solving the saddle point problem (1): Method 2.1. (New Uzawa-type method). Given initial guesses x0 ∈ Cn and y0 ∈ Cm , for k = 0, 1, 2 · · ·, until xk and yk convergence (i) compute xk+1 from iteration scheme xk+1 = T (α)xk + N(α)( f − Byk ); (ii) compute yk+1 from iteration scheme yk+1 = yk + τQ−1 (B∗ xk+1 − g). The Method 2.1 can be equivalently written in matrix-vector form as: [ ] [ ] [ ] xk+1 xk f = G(α, τ) + M(α, τ) . yk+1 yk g [

where G(α, τ) =

T (α) τQ−1 B∗ T (α)

is the iteration matrix of Method 21 and M(α, τ) =

[

− N(α)B Im − τQ−1 B∗ N(α)B

N(α) τQ−1 B∗ N(α)

540

0 − τQ−1

(4) ] (5)

] .

Shu-Xin Miao ET AL 539-544

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Notice that Method 2.1 possess the same iteration scheme as the Uzawa-HSS method [20, 19], hence the efficiency and robustness of the Uzawa-HSS method may be followed by Method 2.1. Moreover, Method 2.1 use iteration (3) to approximate xk+1 , the solution of the shift skew-Hermitian subsystem is avoided, we may hope that Method 2.1 uses less CPU time and iteration number comparing with the Uzawa-HSS method. 3. Convergence of Method 2.1 In this section, we study the convergence of Method 2.1 used for solving saddle-point problem (1). It is well known that Method 2.1 is convergent if and only if the spectral radius of G(α, τ) is less than 1, i.e., ρ(G(α, τ)) < 1. Let λ be an eigenvalue of G(α, τ) and [u∗ , v∗ ]∗ be the corresponding eigenvector. Then we have { (αIn − S )(−S )u − (αIn + H − S )Bv = λH(αIn + H)u, (6) λB∗ u − λτ Qv = − 1τ Qv. To study the convergence of Method 2.1, a lemma is given first. Lemma 3.1. [11] Both roots of the complex quadratic equation λ2 − ϕλ + ψ = 0 have modulus less than one if and only if |ϕ − ϕψ| + |ψ|2 < 1, where ϕ denotes the conjugate complex of ϕ. For the convergence of Method 2.1, we have the following results. Lemma 3.2. Let A be non-Hermitian positive definite and normal, and B be of full column rank. If λ is an eigenvalue of iteration matrix G(α, τ), and [u∗ , v∗ ]∗ is the corresponding eigenvector with u ∈ Cn and v ∈ Cm , then λ , 1 and u , 0. Proof. If λ = 1, noticing that τ is a positive parameter, then from (6) we have { Au + Bv = 0, B∗ u = 0. [ ] A B It is easy to see that the coefficient matrix is nonsingular, hence we have u = 0 and v = 0, which contradicts B∗ 0 ∗ ∗ ∗ the assumption that [u , v ] is an eigenvector of the iteration matrix G(α, τ), so λ , 1. If u = 0 then the first equality in (6) reduce to Bv = 0. Because B is a matrix of full column rank, we can obtain v = 0, which is a contradiction. Hence u , 0.  Theorem 3.1. Let A be non-Hermitian positive definite and normal, B be of full column rank, Q be Hermitian positive definite. Then Method 2.1 used for solving nonsingular saddle-point problem (1) is convergent if and only if parameters α and τ satisfy √    3   −ω + µ2n (ω4n + µ2n ω2n − µ41 )     1    , when ω21 > µ2n α > max  , 0    2 2   ω − µn     1

or 0 0, when ω2 = µ2 and 0 0, and (8) can be rewritten as ω=

λ2 − ϕλ + ψ = 0, where ϕ=

(9)

αω + ω2 − µ2 − ατt − ωτt + (αµ − τµt)i αµi − µ2 , ψ = . αω + ω2 αω + ω2

It follows from Lemma 3.1 that |λ| < 1 if and only if |ϕ − ϕψ| + |ψ|2 < 1. After some careful calculations we have √ ζ1 (α) + ζ2 (α, τ) 2 |ϕ − ϕψ| + |ψ| = , ζ3 (α) where

ζ1 (α) ζ2 (α, τ) ζ3 (α)

= (αµ)2 + (µ2 )2 , = [(αω + ω2 )2 − µ4 − α2 µ2 − (ατt + ωτt)(αω + ω2 ) − µ2 ωτt]2 + [α2 µτt − ω2 µτt + µ3 τt]2 , = (αω + ω2 )2 .

Therefore, |ϕ − ϕψ| + |ψ|2 < 1 if and only if {

Solving (10) yields

ζ3 (α) − ζ1 (α) > 0, ζ2 (α, τ) < [ζ3 (α) − ζ1 (α)]2 .

√   3  −ω + µ2n (ω4n + µ2n ω2n − µ41 )    1 α > max  ,   ω21 − µ2n  

or 0 µ2n 0    

, when ω21 < µ2n

or α > 0, when ω2 = µ2 and 0 0, the proof is completed. 

542

Shu-Xin Miao ET AL 539-544

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4. Numerical results In this section, we verify the feasibility and efficiency of the Method 2.1 used for solving nonsingular saddle point problems. In the implementation, all the tested methods are started from zero vector and terminated once the current iterate xk satisfies √ ∥ f − Axk − Byk ∥22 + ∥g − B∗ xk ∥22 < 10−6 . (11) RES = ∥ f ∥22 + ∥g∥22 All codes were run in MATLAB [version 7.11.0.584 (R2010b)] in double precision and all experiments were performed on a personal computer with 3.10 GHz central processing unit [Intel(R) Core(TM) i5-2400] and 4.00G memory. To test the efficiency of Method 2.1, we compare the numerical results including iteration steps (denoted as IT), elapsed CPU time in seconds (denoted as CPU) and relative residuals (denoted as RES) of Method 2.1 with those of the Uzawa-HSS method and the GMRES method. The parameters α and τ involved in the Uzawa-HSS method and Method 2.1 are chosen to be the experimentally found optimal ones, which result in the least number of iteration steps of iteration methods. In actual computations, we choose right-hand-side vector [ f ∗ , g∗ ]∗ such that the exact solution of (1) is x∗ with all elements 1. Example 4.1. Let us consider the nonsingular saddle-point problem (1) with coefficient matrix as [ ] 2 2 I ⊗ T + T ⊗ Il 0 A= l ∈ R2l ×2l 0 Il ⊗ T + T ⊗ Il [

and B=

Il ⊗ F F ⊗ Il

] ∈ R2l

2

×l2

,

where

1 1 1 tridiag(−1, 2, 1) + tridiag(−1, 0, 1) ∈ Rl×l , F = tridiag(−1, 1, 0) ∈ Rl×l , 2h h h2 ⊗ denotes the Kronecker product symbol and h = 1/(l + 1) is the discretization mesh-size, see [10]. T=

Table 1: Numerical results for Example 4 with Q = tridiag(B∗ diag(A)−1 B)

Method l = 16 l = 32 l = 64

Method 2.1 Uzawa–HSS GMRES Method 2.1 Uzawa–HSS GMRES Method 2.1 Uzawa–HSS GMRES

α

τ

IT

CPU

RES

2.33 466.67 – 0.33 966.67 – 0.33

0.55 0.35 – 0.50 0.20 – 0.50

0.2184 0.2184 0.2184 0.9204 2.1060 5.7720 5.1012

9.7244e-7 9.2829e-7 9.3640e-7 9.6381e-7 9.9231e-7 9.1950e-7 9.7577e-7





75 130 140 126 363 280 191 > 1000 579

63.2116

9.9990e-7

In Table 1, we report the numerical results for Example 4, respectively. The experimentally optimal parameters, α and τ of Method 21 and Uzawa-HSS method, the iteration steps, the elapsed CPU time in seconds and the relative residuals, of Method 21, the Uzawa-HSS method and GMRES methods are listed. From Table 1, we see that all of the three testing methods can converge to the approximate solution of saddle point problem (1). The Uzawa-HSS and GMRES methods needs more iteration steps and CPU time than Method 2.1 to converges. The proposed method, i.e., Method 2.1, is the most efficient one, which use least iteration steps and CPU times than the Uzawa-HSS and GMRES methods to achieve stopping criterion (11).

543

Shu-Xin Miao ET AL 539-544

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

5. Conclusions In this work, based on the Hermitian and skew-Hermitian splitting of the non-Hermitian positive (1, 1)-block of the saddle point matrix, we propose a new Uzawa-type iteration method to solve nonsymmetric saddle point problems (1). We demonstrate the convergence properties of the proposed method for saddle point problem (1) when the parameters satisfy some moderate conditions. Numerical results verified the effectiveness of the proposed method. However, the proposed method involves two iteration parameters α and τ. The choices of the two parameters was not discussed in this work since it is a very difficult and complicated task. Considering that the efficiency of the proposed method largely depends on the choices of the two parameters, how to determine efficient and easy calculated parameters should be a direction for future research. References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22]

Z.-Z. Bai, Structured preconditioners for nonsingular matrices of block two-by-two structures, Math. Comput., 75 (2006), 791–815. Z.-Z. Bai, Splitting iteration methods for non-Hermitian positive definite systems of linear equations, Hokkaido Math. J., 36 (2007) 801–814. Z.-Z. Bai, Optimal parameters in the HSS-like methods for saddle-point problems, Numer. Linear Algebra Appl., 16 (2009) 447–479. Z.-Z. Bai, On semi-convergence of Hermitian and skew-Hermitian splitting methods for singular linear systems, Computing, 89 (2010) 171–197. Z.-Z. Bai, G.H. Golub, Accelerated Hermitian and skew-Hermitian splitting iteration methods for saddle-point problems, IMA J. Numer. Anal., 27 (2007) 1–23. Z.-Z. Bai, G.H. Golub and C.-K. Li, Optimal parameter in Hermitian and skew-Hermitian splitting method for certain two-by-two block matrices, SIAM J. Sci. Comput., 28 (2006) 583–603. Z.-Z. Bai, G.H. Golub, M.K. Ng, Hermitian and skew-Hermitian splitting methods for non-Hermitian positive definite linear systems, SIAM J. Matrix Anal. Appl., 24 (2003) 603–626. Z.-Z. Bai, G.H. Golub, M.K. Ng, On inexact Hermitian and skew-Hermitian splitting methods for non-Hermitian positive definite linear systems, Linear Algebra Appl., 428 (2008) 413–440. Z.-Z. Bai, G.H. Golub, L.-Z. Lu, J.-F. Yin, Block triangular and skew-Hermitian splitting methods for positive-definite linear systems, SIAM J. Sci. Comput., 26 (2005) 844–863. Z.-Z. Bai, B.N. Parlett, Z.-Q. Wang, On generalized successive overrelaxation methods for augmented linear systems, Numer. Math., 102 (2005) 1–38. Z.-Z. Bai, Z.-Q. Wang, On parameterized inexact Uzawa methods for generalized saddle point problems, Linear Algebra Appl., 28 (2008) 2900–2932. M. Benzi, G. H. Golub, J. Liesen, Numerical solution of saddle point problems, Acta. Numer., 14 (2005), 1–137. D. Bertaccini, G.H. Golub, S.S. Capizzano, C.T. Possio, Preconditioned HSS methods for the solution of non-Hermitian positive definite linear systems and applications to the discrete convection-diffusion equation, Numer. Math., 99 (2005) 441–484. Y.-H. Cao, Y.-Q. Lin, Y.-M. Wei, Nolinear Uzawa methods for sloving nonsymmetric saddle point problems, J. Appl. Math. Comput., 21 (2006) 1–21. Y. Cao, M.-Q. Jiang, Y.-L. Zheng, A splitting preconditioner for saddle point problems, Numer. Linear Algebra Appl., 18 (2011) 875–895. G.H. Golub, X. Wu, J.-Y. Yuan, SOR-like methods for augmented systems, BIT Numer. Math., 41 (2001) 71–85. M.-Q. Jiang, Y. Cao, On local Hermitian and skew-Hermitian splitting iteration methods for generalized saddle point problems, J. Comput. Appl. Math., 231 (2009) 973–982. H. Noormohammadi Pour, H. Sadeghi Goughery, New Hermitian and skew-Hermitian splitting methods for non-Hermitian positive-definite linear systems, Numer Algor., 69 (2015) 207–225. A.-L. Yang, X.-L. Y.-J. Wu, On semi-convergence of the Uzawa-HSS method for singular saddle-point problems, Appl. Math. Comput., 252 (2015) 88–98. A.-L. Yang, Y.-J. Wu, The Uzawa-HSS method for saddle-point problems, Appl. Math. Lett., 38 (2014) 38–42. J.-J. Zhang, J.-J. Shang, A class of Uzawa-SOR methods for saddle point problems, Appl. Math. Comput., 216 (2010) 2163–2168. J.-H. Yun, Variants of Uzawa method for saddle point problems, Comput. Appl. Math., 65 (2013) 1037–1046.

544

Shu-Xin Miao ET AL 539-544

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FUZZY HYERS-ULAM STABILITY FOR GENERALIZED ADDITIVE FUNCTIONAL EQUATIONS SUNG JIN LEE, HASSAN AZADI KENARY AND CHOONKIL PARK∗

Abstract. In this paper, we prove the Hyers-Ulam stability of the following additive functional equation   m−2 m ∑ ∑ (m − 1)2 ∑ x + x i j f + xkl  = f (xi ) 2 2 i=1 1≤i 0 and 0 ≤ p < 1. Then the limit L(x) = n limn→∞ f (22n x) exists for all x ∈ E and L : E → E ′ is the unique additive mapping which satisfies 2ϵ ∥x∥p 2 − 2p for all x ∈ E. Also, if for each x ∈ E the function f (tx) is continuous in t ∈ R, then L is linear. ∥f (x) − L(x)∥ ≤

In this paper, we consider the following functional equation   m−2 m ∑ ∑ x + x (m − 1)2 ∑ i j f + x kl  = f (xi ) 2 2 1≤i 0. Then { αt αt+β∥x∥ t > 0, x ∈ X N (x, t) = 0 t ≤ 0, x ∈ X is a fuzzy norm on X. Definition 2.3. ([1, 17, 18]) Let (X, N ) be a fuzzy normed vector space. A sequence {xn } in X is said to be convergent or converge if there exists an x ∈ X such that limt→∞ N (xn − x, t) = 1 for all t > 0. In this case, x is called the limit of the sequence {xn } in X and we denote it by N − limt→∞ xn = x.

546

SUNG JIN LEE ET AL 545-558

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Fuzzy Hyers-Ulam stability for generalized additive functional equations

Definition 2.4. ([1, 17, 18]) Let (X, N ) be a fuzzy normed vector space. A sequence {xn } in X is called Cauchy if for each ϵ > 0 and each t > 0 there exists an n0 ∈ N such that for all n ≥ n0 and all p > 0, we have N (xn+p − xn , t) > 1 − ϵ. It is well known that every convergent sequence in a fuzzy normed vector space is Cauchy. If each Cauchy sequence is convergent, then the fuzzy norm is said to be complete and the fuzzy normed vector space is called a fuzzy Banach space. We say that a mapping f : X → Y between fuzzy normed vector spaces X and Y is continuous at a point x ∈ X if for each sequence {xn } converging to x0 ∈ X, then the sequence {f (xn )} converges to f (x0 ). If f : X → Y is continuous at each x ∈ X, then f : X → Y is said to be continuous on X (see [2]). Definition 2.5. Let X be a set. A function d : X × X → [0, ∞] is called a generalized metric on X if d satisfies the following conditions: (1) d(x, y) = 0 if and only if x = y for all x, y ∈ X; (2) d(x, y) = d(y, x) for all x, y ∈ X; (3) d(x, z) ≤ d(x, y) + d(y, z) for all x, y, z ∈ X. Theorem 2.6. ([4]) Let (X, d) be a complete generalized metric space and J : X → X be a strictly contractive mapping with Lipschitz constant L < 1. Then, for all x ∈ X, either d(J n x, J n+1 x) = ∞ for all nonnegative integers n or there exists a positive integer n0 such that (1) d(J n x, J n+1 x) < ∞ for all n0 ≥ n0 ; (2) the sequence {J n x} converges to a fixed point y ∗ of J; (3) y ∗ is the unique fixed point of J in the set Y = {y ∈ X : d(J n0 x, y) < ∞}; 1 d(y, Jy) for all y ∈ Y . (4) d(y, y ∗ ) ≤ 1−L 3. Fuzzy stability of the functional equation (1): a direct method In this section, using the direct method, we prove the Hyers-Ulam stability of the functional equation (1) in fuzzy Banach spaces. Throughout this section, we assume that X is a linear space, (Y, N ) is a fuzzy Banach space and (Z, N ′ ) is a fuzzy normed space. Moreover, we assume that N (x, .) is a left continuous function on R. Theorem 3.1. Assume that a mapping f : X → Y satisfies the inequality     m−2 m 2 ∑ ∑ ∑ xi + xj (m − 1) N f xkl  − + f (xi ), t 2 2 1≤i 0 and φ : X m → Z is a mapping for which there is a constant r ∈ R 1 such that satisfying 0 < |r| < m−1 ( ( ) ) ( ) t x1 x2 xm ′ ′ N φ , ,··· , , t ≥ N φ(x1 , · · · , xm ), (4) m−1 m−1 m−1 |r| for all x1 , · · · , xm ∈ X and all t > 0. Then there is a unique additive mapping A : X → Y satisfying (1) and the inequality ( ) 2|r|φ(x, x, · · · , x) ′ N (f (x) − A(x), t) ≥ N ,t (5) m(m − 1)(1 − |r|(m − 1))

547

SUNG JIN LEE ET AL 545-558

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S. Lee, H. A.Kenary, C. Park

for all x ∈ X and all t > 0. Proof. It follows from (4) that ( ( ) ) ( ) x1 x2 xm t ′ ′ j−1 N φ , ,··· , ,t ≥ N r φ(x1 , · · · , xm ), (m − 1)j (m − 1)j (m − 1)j |r| ( ) t = N ′ φ(x1 , x2 , · · · , xm ), j , |r| and so

( ( N φ ′

x1 x2 xm , ,··· , j j (m − 1) (m − 1) (m − 1)j

)

) , |r| t j

≥ N ′ (φ(x1 , x2 , · · · , xm ), t)

for all x1 , · · · , xm ∈ X and all t > 0. Substituting x1 = x2 = · · · = xm = x in (3), we obtain ( ) m(m − 1) m(m − 1)2 N f ((m − 1)x) − f (x), t ≥ N ′ (φ(x, x, · · · , x), t), 2 2 and so

( ( N f (x) − (m − 1)f

x m−1

)

2t , m(m − 1)

for all x ∈ X and all t > 0. Replacing x by

)

( ( ≥N φ

x (m−1)j



(6)

x x x , ,··· , m−1 m−1 m−1

) ) ,t

(7)

(8)

in (8), we have

( ( ) ) ( ) x x 2(m − 1)j−1 t j+1 j N (m − 1) f (9) − (m − 1) f , (m − 1)j+1 (m − 1)j m ( ( ) ) ( ) x t x x ′ ′ ≥N φ , t ≥ N φ(x, x, · · · , x), j+1 , ,··· , (m − 1)j+1 (m − 1)j+1 (m − 1)j+1 |r| for all x ∈ X, all t > 0 and all integer j ≥ 0. So   ( ) n−1 ∑ 2(m − 1)j |r|j+1 t x  N f (x) − (m − 1)n f , (m − 1)n m(m − 1) j=0   [ ( ) ( )] n−1 n−1 ∑ ∑ 2(m − 1)j |r|j+1 t x x  =N (m − 1)j+1 f − (m − 1)j f , (m − 1)j+1 (m − 1)j m(m − 1) j=0 j=0 { ( ( ) ( ) )} x x 2(m − 1)j |r|j+1 t j+1 j ≥ min N (m − 1) f − (m − 1) f , 0≤j≤n−1 (m − 1)j+1 (m − 1)j m(m − 1) ′ ≥ N (φ(x, x, · · · , x), t) which implies 

 ) n−1 j+p j+1 ∑ x x 2(m − 1) |r| t  N (m − 1)n+p f − (m − 1)p f , n+p p (m − 1) (m − 1) m(m − 1) j=0 ( ( ) ) ( ) x x x t ′ ′ ≥N φ , ,··· , , t ≥ N φ(x, x, · · · , x), p (m − 1)p (m − 1)p (m − 1)p |r| (

)

(

548

SUNG JIN LEE ET AL 545-558

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Fuzzy Hyers-Ulam stability for generalized additive functional equations

for all x ∈ X, t > 0 and all integers n > 0, p ≥ 0. So  N (m − 1)n+p f

(

x (m − 1)n+p

)

( − (m − 1)p f

 ) n−1 j+p j++p+1 ∑ x 2(m − 1) |r| t , (m − 1)p m(m − 1) j=0



≥ N (φ(x, x, · · · , x), t) for all x ∈ X, t > 0 and all integers n > 0, p ≥ 0. Hence one obtains ( ( ) ( ) ) x x p n+p − (m − 1) f ,t N (m − 1) f (m − 1)n+p (m − 1)p ( ) t ′ ≥ N φ(x, x, · · · , x), 2(m−1)p−1 |r|p+1 ∑n−1 j j j=0 (m − 1) |r| m for all x ∈ X, t > 0 and all integers n > 0, p ≥ 0. Since the series

(10)

∑∞

− 1)j |r|j is a convergent { ( )} x series, we see by taking the limit p → ∞ in the last inequality that a sequence (m−1)n f (m−1) n is a Cauchy sequence in the fuzzy Banach space (Y, N ) and so it converges in Y . ( ) x Therefore, a mapping A : X → Y defined by A(x) := N − limn→∞ (m − 1)n f (m−1) is well n defined for all x ∈ X. It means that ) ) ( ( x ,t = 1 (11) lim N A(x) − (m − 1)n f n→∞ (m − 1)n j=0 (m

for all x ∈ X and all t > 0. In addition, it follows from (10) that ( ( N f (x) − (m − 1)n f

x (m − 1)

 ) ) , t ≥ N ′ φ(x, x, · · · , x), n

 2|r| m(m−1)

t ∑n−1

j j j=0 (m − 1) |r|



for all x ∈ X and all t > 0. So N (f (x) − A(x), t) { ( ( ( ) ) ( ) )} x x n n ≥ min N f (x) − (m − 1) f , (1 − ϵ)t , N A(x) − (m − 1) f , ϵt (m − 1)n (m − 1)n   t  ≥ N ′ φ(x, x, · · · , x), 2|r| ∑n−1 j j j=0 (m − 1) |r| m(m−1) ( ) m(m − 1)(1 − |r|(m − 1))ϵt ′ ≥ N φ(x, x, · · · , x), 2|r| for sufficiently large n and for all x ∈ X, t > 0 and ϵ with 0 < ϵ < 1. Since ϵ is arbitrary and N ′ is left continuous, we obtain ( ) m(m − 1)(1 − |r|(m − 1))t N (f (x) − A(x), t) ≥ N φ(x, x, · · · , x), 2|r| ′

549

SUNG JIN LEE ET AL 545-558

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S. Lee, H. A.Kenary, C. Park

for all x ∈ X and t > 0. It follows from (3) that ( [ n N (m − 1)





( )] ) m 2 ∑ xkl xi  − (m − 1) f ,t (m − 1)n 2 (m − 1)n i=1 1≤i 0 and all n ∈ N. Since ( ′ lim N φ(x1 , x2 , · · · , xm ), n→∞

(

[





N (m − 1)n

1≤i 0. Therefore, we obtain, in view of (11), 





m−2 ∑



m 1)2 ∑



xi + xj (m − xkl  − + A(xi ), t 2 2 i=1 1≤i 0 and any integer n > 0. So   ( ) n f ((m − 1) x) t  N f (x) − ≥ N ′ φ(x, x, · · · , x), ∑n−1 ,t 2|r|j (m − 1)n j=0 m(m−1)j+2 ) ( m(m − 1)(m − 1 − |r|)t ′ . ≥ N φ(x, x, · · · , x), 2

(17) □

The rest of the proof is similar to the proof of Theorem 3.1.

Corollary 3.4. Let X be a normed spaces and (R, N ′ ) a fuzzy Banach space. Assume that there ∑ exist real numbers θ ≥ 0 and 0 < p = m j=1 pj < 2 such that a mapping f : X → Y satisfies the following inequality         m−2 m m 2 ∑ ∑ ∑ ∏ xi + xj (m − 1) xkl  − N f + f (xi ), t ≥ N ′ θ  ∥xj ∥pj  , t 2 2 1≤i 0. Then there is a unique additive mapping A : X → Y that satisfying (1) and the inequality ( ) 2θ∥x∥p ′ N (f (x) − A(x), t) ≥ N ,t m(m − 1) (∏ ) m pj and r = m − 2. Applying Theorem 3.3, we get the Proof. Let φ(x1 , x2 , · · · , xm ) := θ ∥x ∥ j j=1 desired result. □ 4. Fuzzy stability of the functional equation (1): a fixed point method In this section, using the fixed point alternative approach, we prove the Hyers-Ulam stability of the functional equation (1) in fuzzy Banach spaces. Throughout this paper, assume that X is a vector space and that (Y, N ) is a fuzzy Banach space. Theorem 4.1. Let φ : X m → [0, ∞) be a function such that there exists an L < 1 with ) ( x2 xm Lφ(x1 , x2 , · · · , xm ) x1 , ,··· , ≤ φ m−1 m−1 m−1 m−1

552

SUNG JIN LEE ET AL 545-558

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Fuzzy Hyers-Ulam stability for generalized additive functional equations

for all x1 , x2 , · · · , xm ∈ X. Let f : X → Y with f (0) = 0 be a mapping satisfying     m−2 m 2 ∑ ∑ ∑ x + x (m − 1) t i j N f + x kl  − f (xi ), t ≥ 2 2 t + φ(x1 , x2 , · · · , xm ) 1≤i 0. Then the limit

(

A(x) := N - lim (m − 1) f n

n→∞

x (m − 1)n

)

exists for each x ∈ X and defines a unique additive mapping A : X → Y such that N (f (x) − A(x), t) ≥

(m(m − 1)2 − m(m − 1)2 L)t . (m(m − 1)2 − m(m − 1)2 L)t + 2Lφ(x, x, · · · , x)

Proof. Putting x1 = x2 = · · · = xm = x in (18), we have ( ) m(m − 1)f ((m − 1)x) m(m − 1)2 f (x) t N − ,t ≥ 2 2 t + φ(x, x, · · · , x)

(19)

(20)

for all x ∈ X and t > 0. Consider the set S := {g : X → Y ; g(0) = 0} and the generalized metric d in S defined by } { t , ∀x ∈ X, t > 0 , d(f, g) = inf µ ∈ R+ : N (g(x) − h(x), µt) ≥ t + φ(x, x, · · · , x) where inf ∅ = +∞. It is easy to show that (S, d) is complete (see [16, Lemma 2.1]). Now we consider a linear mapping J : S → S such that ( ) x Jg(x) := (m − 1)g m−1 for all x ∈ X. Let g, h ∈ S be such that d(g, h) = ϵ. Then N (g(x) − h(x), ϵt) ≥

t t + φ(x, x, · · · , x)

for all x ∈ X and t > 0. Hence

( ( ) ( ) ) x x N (Jg(x) − Jh(x), Lϵt) = N (m − 1)g − (m − 1)h , Lϵt m−1 m−1 ( ( ) ( ) ) x x Lϵt = N g −h , m−1 m−1 m−1 ≥ ≥

Lt m−1

Lt m−1

( +φ

+

Lt m−1 x x m−1 , m−1 , · · ·

Lt m−1 Lφ(x1 ,x2 ,··· ,xm ) m−1

=

x , m−1

)

t t + φ(x, x, · · · , x)

for all x ∈ X and t > 0. Thus d(g, h) = ϵ implies that d(Jg, Jh) ≤ Lϵ. This means that d(Jg, Jh) ≤ Ld(g, h) for all g, h ∈ S. It follows from (20) that ( ) m(m − 1) [f ((m − 1)x) − (m − 1)f (x)] t N ,t ≥ . 2 t + φ(x, x, · · · , x)

553

SUNG JIN LEE ET AL 545-558

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S. Lee, H. A.Kenary, C. Park

So

( ( N f (x) − (m − 1)f

x m−1

)

2t , m(m − 1)

) ≥

≥ Therefore,

( N

( f (x) − (m − 1)f

x m−1

)

( t+φ

t x x m−1 , m−1 , · · ·

t t+

Lφ(x,x,··· ,x) m−1

2Lt , m(m − 1)2

) ≥

=

x , m−1

) (m−1)t L

(m−1)t L

+ φ(x, x, · · · , x)

t . t + φ(x, x, · · · , x)

(21)

.

(22)

This means that

2L . m(m − 1)2 By Theorem 2.6, there exists a mapping A : X → Y satisfying the following: (1) A is a fixed point of J, that is, ( ) x A(x) A = (23) m−1 m−1 for all x ∈ X. The mapping A is a unique fixed point of J in the set Ω = {h ∈ S : d(g, h) < ∞}. This implies that A is a unique mapping satisfying (23) such that there exists µ ∈ (0, ∞) satisfying t N (f (x) − A(x), µt) ≥ t + φ(x, x, · · · , x) for all x ∈ X and t > 0. (2) d(J n f, A) → 0 as n → ∞. This implies the equality ( ) x n N - lim (m − 1) f = A(x) n→∞ (m − 1)n d(f, Jf ) ≤

for all x ∈ X. ) (3) d(f, A) ≤ d(f,Jf 1−L with f ∈ Ω, which implies the inequality d(f, A) ≤

m(m −

1)2

2L . − m(m − 1)2 L

This implies that the inequality (19) holds. Furthermore, since     m−2 m 2 ∑ ∑ ∑ x + x (m − 1) i j xkl  − N A + A(xi ), t 2 2 i=1 1≤i 0, we deduce that     m−2 m 2 ∑ ∑ ∑ x + x 1) (m − i j N A + x kl  − A(xi ), t = 1 2 2 l=1,kl ̸=i,j

1≤i 0. Thus the mapping A : X → Y is additive, as desired.



Corollary 4.2. Let θ ≥ 0 and let p be a real number with p > 1. Let X be a normed vector space with norm ∥.∥. Let f : X → Y with f (0) = 0 be a mapping satisfying the following inequality     m−2 m 2 ∑ ∑ ∑ x + x (m − 1) t i j ∑m N f + xkl  − f (xi ), t ≥ 2 2 t + θ ( i=1 ∥xi ∥p ) l=1,kl ̸=i,j

1≤i 0. Then the limit A(x) := N - lim (m − 1) f n

n→∞

(

x (m − 1)n

)

exists for each x ∈ X and defines a unique additive mapping A : X → Y such that N (f (x) − A(x), t) ≥

((m − 1)p − 1)t ((m − 1)p − 1)t + 2(m − 1)−2 θ∥x∥p

for all x ∈ X.

∑ p Proof. The proof follows from Theorem 4.1 by taking φ(x1 , x2 , · · · , xm ) := θ ( m i=1 ∥xi ∥ ) for all x1 , x2 , · · · , xm ∈ X. Then we can choose L = (m − 1)−p and we get the desired result. □ Theorem 4.3. Let φ : X m → [0, ∞) be a function such that there exists an L < 1 with ( ) x x2 xm φ(x1 , x2 , · · · , xm ) ≤ (m − 1)Lφ , ,··· , m−1 m−1 m−1 for all x1 , x2 , · · · , xm ∈ X. Let f : X → Y be a mapping with f (0) = 0 satisfying (18). Then f ((m − 1)n x) n→∞ (m − 1)n

A(x) := N - lim

exists for each x ∈ X and defines a unique additive mapping A : X → Y such that N (f (x) − A(x), t) ≥

m(m − 1)2 (1 − L)t m(m − 1)2 (1 − L)t + 2φ(x, x, · · · , x)

(24)

for all x ∈ X and all t > 0. Proof. Let (S, d) be the generalized metric space defined as in the proof of Theorem 4.1. Consider the linear mapping J : S → S such that Jg(x) := g((m−1)x) for all x ∈ X. Let g, h ∈ S be such that m−1 d(g, h) = ϵ. Then t N (g(x) − h(x), ϵt) ≥ t + φ(x, x, · · · , x)

555

SUNG JIN LEE ET AL 545-558

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S. Lee, H. A.Kenary, C. Park

for all x ∈ X and t > 0 . Hence

(

N (Jg(x) − Jh(x), Lϵt) = N

) g((m − 1)x) h((m − 1)x) − , Lϵt m−1 m−1

( ) = N g((m − 1)x) − h((m − 1)x), (m − 1)Lϵt ≥ ≥

(m − 1)Lt (m − 1)Lt + φ((m − 1)x, , (m − 1)x, · · · , (m − 1)x) (m − 1)Lt t = (m − 1)Lt + (m − 1)Lφ(x, x, · · · , x) t + φ(x, x, · · · , x)

for all x ∈ X and t > 0. Thus d(g, h) = ϵ implies that d(Jg, Jh) ≤ Lϵ. This means that d(Jg, Jh) ≤ Ld(g, h) for all g, h ∈ S. It follows from (20) that ( [ ] ) m(m − 1)2 f ((m − 1)x) t N − f (x) , t ≥ 2 m−1 t + φ(x, x, · · · , x)

(25)

for all x ∈ X and t > 0. So ( ) f ((m − 1)x) 2t t N − f (x), . ≥ 2 m−1 m(m − 1) t + φ(x, x, · · · , x) Therefore, 2 . m(m − 1)2 By Theorem 2.6, there exists a mapping A : X → Y satisfying the following: (1) A is a fixed point of J, that is, d(f, Jf ) ≤

(m − 1)A(x) = A((m − 1)x)

(26)

for all x ∈ X. The mapping A is a unique fixed point of J in the set Ω = {h ∈ S : d(g, h) < ∞}. This implies that A is a unique mapping satisfying (26) such that there exists µ ∈ (0, ∞) satisfying t N (f (x) − A(x), µt) ≥ t + φ(x, x, · · · , x) for all x ∈ X and t > 0. (2) d(J n f, A) → 0 as n → ∞. This implies A(x) = N - limn→∞ (3) d(f, A) ≤

d(f,Jf ) 1−L

f ((m−1)n x) (m−1)n

for all x ∈ X.

with f ∈ Ω, which implies the inequality d(f, A) ≤

2 . m(m − 1)2 (1 − L)

This implies that the inequality (24) holds. The rest of the proof is similar to that of the proof of Theorem 4.1.



1 Corollary 4.4. Let θ ≥ 0 and let p be a real number with 0 < p < m . Let X be a normed vector space with norm ∥.∥. Let f : X → Y be a mapping with f (0) = 0 satisfying     m−2 m 2 ∑ ∑ ∑ xi + xj (m − 1) t ∏ N f + x kl  − f (xi ), t ≥ p 2 2 t+θ( m i=1 ∥xi ∥ ) 1≤i 0. Then f ((m − 1)n x) n→∞ (m − 1)n

A(x) := N - lim

exists for each x ∈ X and defines a unique additive mapping A : X → Y such that N (f (x) − A(x), t) ≥

m((m − 1)p+2 − (m − 1)2 )t . m((m − 1)p+2 − (m − 1)2 )t + 2(m − 1)p θ∥x∥mp

for all x ∈ X.

∏ p Proof. The proof follows from Theorem 4.2 by taking φ(x1 , x2 , · · · , xm ) := θ ( m i=1 ∥xi ∥ ) for all x1 , x2 , · · · , xm ∈ X. Then we can choose L = (m − 1)−p and we get the desired result. □ References [1] T. Bag and S.K. Samanta, Finite dimensional fuzzy normed linear spaces, J. Fuzzy Math. 11 (2003), 687–705. [2] T. Bag and S.K. Samanta, Fuzzy bounded linear operators, Fuzzy Sets and Systems 151 (2005), 513–547. [3] S.C. Cheng and J.N. Mordeson, Fuzzy linear operators and fuzzy normed linear spaces, Bull. Calcutta Math. l Soc. 86 (1994), 429–436. [4] J. Diaz and B. Margolis, A fixed point theorem of the alternative for contractions on a generalized complete metric space, Bull. Amer. Math. Soc. 74 (1968), 305–309. [5] M. Eshaghi Gordji and M. B. Savadkouhi, Stability of mixed type cubic and quartic functional equations in random normed spaces, J. Inequal. Appl. 2009 (2009), Article ID 527462, 9 pages. [6] M. Eshaghi Gordji and M. B. Savadkouhi and C. Park, Quadratic-quartic functional equations in RN -spaces, J. Inequal. Appl. 2009 (2009), Article ID 868423, 14 pages. [7] M. Eshaghi Gordji, S. Zolfaghari, J.M. Rassias and M.B. Savadkouhi, Solution and stability of a mixed type cubic and quartic functional equation in quasi-Banach spaces, Abst. Appl. Anal. 2009 (2009), Article ID 417473, 14 pages. [8] C. Felbin, Finite-dimensional fuzzy normed linear space, Fuzzy Sets and Systems 48 (1992), 239–248. [9] P. Gˇ avruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings, J. Math. Anal. Appl. 184 (1994), 431–436. [10] M.B. Ghaemi, M. Choubin, R. Saadati, C. Park and D. Shin, A fixed point approach to the stability of EulerLagrange sextic (a, b)-functional equations in Archimdean and non-Archimedean Banach spaces, J. Comput. Anal. Appl. 21 (2016), 170–181. [11] D.H. Hyers, On the stability of the linear functional equation, Proc. Nat. Acad. Sci. U.S.A. 27 (1941), 222–224. [12] S. Jung, Hyers-Ulam-Rassias Stability of Functional Equations in Mathematical Analysis, Hadronic Press, Palm Harbor, 2001. [13] I. Karmosil and J. Michalek, Fuzzy metric and statistical metric spaces, Kybernetica 11 (1975), 326–334. [14] A.K. Katsaras, Fuzzy topological vector spaces, Fuzzy Sets and Systems 12 (1984), 143–154. [15] S.V. Krishna and K.K.M. Sarma, Separation of fuzzy normed linear spaces, Fuzzy Sets and Systems 63 (1994), 207–217. [16] D. Mihet and V. Radu, On the stability of the additive Cauchy functional equation in random normed spaces, J. Math. Anal. Appl. 343 (2008), 567–572. [17] A.K. Mirmostafaee, M. Mirzavaziri and M.S. Moslehian, Fuzzy stability of the Jensen functional equation, Fuzzy Sets and Systems 159 (2008), 730–738. [18] A.K. Mirmostafaee and M.S. Moslehian, Fuzzy versions of Hyers-Ulam-Rassias theorem, Fuzzy Sets and Systems 159 (2008), 720–729. [19] E. Movahednia, M. Eshaghi Gordji, C. Park and D. Shin, A quadratic functional equation in intuitionistic fuzzy 2-Banach spaces, J. Comput. Anal. Appl. 21 (2016), 761–768. [20] A. Najati and A. Ranjbari, Stability of homomorphisms for a 3D Cauchy-Jensen functional equation on C ∗ -ternary algebras, J. Math. Anal. Appl. 341 (2008), 62–79. [21] C. Park, On the stability of the linear mapping in Banach modules, J. Math. Anal. Appl. 275 (2002), 711–720. [22] C. Park, Modefied Trif ’s functional equations in Banach modules over a C ∗ -algebra and approximate algebra homomorphism, J. Math. Anal. Appl. 278 (2003), 93–108. [23] C. Park, Generalized Hyers-Ulam-Rassias stability of n-sesquilinear-quadratic mappings on Banach modules over C ∗ -algebras, J. Comput. Appl. Math. 180 (2005), 279–291.

557

SUNG JIN LEE ET AL 545-558

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S. Lee, H. A.Kenary, C. Park

[24] C. Park, Fixed points and Hyers-Ulam-Rassias stability of Cauchy-Jensen functional equations in Banach algebras, Fixed Point Theory Appl. 2007, Art. ID 50175 (2007). [25] C. Park, Generalized Hyers-Ulam-Rassias stability of quadratic functional equations: a fixed point approach, Fixed Point Theory Appl. 2008, Art. ID 493751 (2008). [26] C. Park, Fuzzy stability of a functional equation associated with inner product spaces, Fuzzy Sets and Systems 160 (2009), 1632–1642. [27] J. M. Rassias and H. Kim, Generalized Hyers-Ulam stability for grnrral additive functional equations in quasi-βnormed spaces, J. Math. Anal. Appl., 356 (2009), 302–309. [28] Th.M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 (1978), 297–300. [29] Th.M. Rassias, On the stability of the quadratic functional equation and it’s application, Studia Univ. Babes-Bolyai XLIII (1998), 89–124. [30] Th.M. Rassias, On the stability of functional equations in Banach spaces, J. Math. Anal. Appl. 251 (2000), 264–284. ˇ [31] Th.M. Rassias and P. Semrl, On the Hyers-Ulam stability of linear mappings, J. Math. Anal. Appl. 173 (1993), 325–338. [32] R. Saadati and C. Park, Non-Archimedean L-fuzzy normed spaces and stability of functional equations (in press). [33] R. Saadati, M. Vaezpour and Y. Cho, A note to paper “On the stability of cubic mappings and quartic mappings in random normed spaces”, J. Inequal. Appl. 2009 (2009), Article ID 214530, doi: 10.1155/2009/214530. [34] R. Saadati, M. M. Zohdi and S. M. Vaezpour, Nonlinear L-random stability of an ACQ functional equation, J. Inequal. Appl. 2011 (2011), Article ID 194394, 23 pages, doi:10.1155/2011/194394. [35] S.M. Ulam, Problems in Modern Mathematics, John Wiley and Sons, New York, NY, USA, 1964. Sung Jin Lee, Department of Mathematics, Daejin University, Kyunggi 11159, Korea E-mail address: [email protected] Hassan Azadi Kenary, Department of Mathematics, College of Sciences, Yasouj University, Yasouj 75914-353, Iran E-mail address: [email protected] Choonkil Park, Research Institute for Natural Sciences, Hanyang University, Seoul 04763, Korea E-mail address: [email protected]

558

SUNG JIN LEE ET AL 545-558

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

n-JORDAN ∗-DERIVATIONS ON INDUCED C ∗ -ALGEBRAS YINHUA CUI, GANG LU, XIAOHONG ZHANG, AND CHOONKIL PARK∗ Abstract. Using the fixed point alternative theorem, we investigate the Hyers-Ulam stability of of n-Jordan ∗-derivations on induced fuzzy C ∗ -algebras associated with the following functional equation f (my − x) + f (x − mz) + mf (x − y + z) = f (mx), where m is a fixed integer greater than 1.

1. Introduction and preliminaries The stability problem of functional equations originated from a question of Ulam [42] concerning the stability of group homomorphisms. Hyers [16] gave a first affirmative partial answer to the question of Ulam for Banach spaces. Hyers’ Theorem was generalized by Aoki [1] for additive mappings and by Rassias [33] for linear mappings by considering an unbounded Cauchy difference. A generalization of the Aoki and Rassias theorem was obtained by G˘ avruta [15], who used a more general function controlling the possibly unbounded Cauchy difference in the spirit of Rassias’ approach. The stability problems for several functional equations or inequalities have been extensively investigated by a number of authors and there are many interesting results concerning this problem (see [8, 9], [17]–[25], [30, 31], [34]–[38], [40, 41]). We recall a fundamental result in fixed point theory. Let X be a set. A function d : X × X → [0, ∞] is called a generalized metric on X if d satisfies (1) d(x, y) = 0 if and only if x = y; (2) d(x, y) = d(y, x) for all x, y ∈ X; (3) d(x, z) ≤ d(x, y) + d(y, z) for all x, y, z ∈ X. Theorem 1.1 (see [7, 12]). Let (X, d) be a complete generalized metric space and let J : X → X be a strictly contractive mapping with Lipschitz constant L < 1. Then for each given element x ∈ X, either d(J n x, J n+1 x) = ∞ for all nonnegative integers n or there exists a positive integer n0 such that (1) d(J n x, J n+1 x) < ∞, for all n ≥ n0 ; (2) the sequence {J n x} converges to a fixed point y ∗ of J; (3) y ∗ is the unique fixed point of J in the set Y = {y ∈ X|d(J n0 x, y) < ∞}; 1 (4) d(y, y ∗ ) ≤ 1−L d(y, Jy) for all y ∈ Y . By using the fixed point method, the stability problems of several functional equations have been extensively investigated by a number of authors (see [6, 7, 11, 13, 22, 27, 32]). 2010 Mathematics Subject Classification. Primary 39B62, 39B52, 46B25. Key words and phrases. Fuzzy normed space; additive functional equation; Hyers-Ulam stability; induced fuzzy C ∗ -algebra. ∗ Corresponding author.

559

YINHUA CUI ET AL 559-567

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Y. CUI, G. LU, X. ZHANG, AND C. PARK

In 1984, Katsaras [21] defined a fuzzy norm on a linear space and at the same year Wu and Fang [43] also introduced a notion of fuzzy normed space and gave the generalization of the Kolmogoroff normalized theorem for fuzzy topological linear space. In [5], Biswas defined and studied fuzzy inner product spaces in linear space. Since then some mathematicians have defined fuzzy metrics and norms on a linear space from various points of view [4, 14, 24, 39, 44]. In 1994, Cheng and Mordeson introduced a definition of fuzzy norm on a linear space in such a manner that the corresponding induced fuzzy metric is of Kramosil and Michalek type [23]. In 2003, Bag and Samanta [4] modified the definition of Cheng and Mordeson [10] by removing a regular condition. They also established a decomposition theorem of a fuzzy norm into a family of crisp norms and investigated some properties of fuzzy norms (see [3]). Following [2], we give the employing notion of a fuzzy norm. Let X be a real linear space. A function N : X × R → [0, 1](the so-called fuzzy subset) is said to be a fuzzy norm on X if for all x, y ∈ X and all a, b ∈ R: (N1 ) N (x, a) = 0 for a ≤ 0; (N2 ) x = 0 if and only if N (x, a) = 1 for all a > 0; b (N3 ) N (ax, b) = N (x, |a| ) if a 6= 0; (N4 ) N (x + y, a + b) ≥ min{N (x, a), N (y, b)}; (N5 ) N (x, .) is a non-decreasing function on R and lima→∞ N (x, a) = 1; (N6 ) For x 6= 0, N (x, .) is (upper semi) continuous on R. The pair (X, N ) is called a fuzzy normed linear space. One may regard N (x, a) as the truth value 0 of the statement the norm of x is less than or equal to the real number a . Definition 1.2. Let (X, N ) be a fuzzy normed linear space. Let xn be a sequence in X. Then xn is said to be convergent if there exists x ∈ X such that limn→∞ N (xn − x, a) = 1 for all a > 0. In that case, x is called the limit of the sequence xn and we denote it by N -limn→∞ xn = x. Definition 1.3. A sequence xn in X is called Cauchy if for each  > 0 and each a > 0 there exists n0 such that for all n ≥ n0 and all p > 0, we have N (xn+p − xn , a) > 1 − . It is known that every convergent sequence in fuzzy normed space is Cauchy. If each Cauchy sequence is convergent, then the fuzzy norm is said to be complete and the fuzzy normed space is called a fuzzy Banach space. We say that a mapping f : X → Y between fuzzy normed vector space X, Y is continuous at point x0 ∈ X if for each sequence {xn } converging to x0 in X, then the sequence {f (xn )} converges to f (x0 ). If f : X → Y is continuous at each x ∈ X, then f : X → Y is said to be continuous on X(see [2]). Definition 1.4. [29] Let X be a ∗-algebra and (X, N ) a fuzzy normed space. (1) The fuzzy normed space (X, N ) is called a fuzzy normed ∗-algebra if N (xy, st) ≥ N (x, s) · N (y, t)

and N (x∗ , t) = N (x, t).

(2) A complete fuzzy normed ∗-algebra is called a fuzzy Banach ∗-algebra. Example 1.5. Let (X, k.k) be a normed ∗-algebras. Let  a a+kxk , a > 0 , x ∈ X, N (x, a) = 0, a ≤ 0, x ∈ X. Then N (x, t) is a fuzzy norm on X and (X, N (x, t)) is a fuzzy normed ∗-algebra.

560

YINHUA CUI ET AL 559-567

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

n-JORDAN ∗-DERIVATIONS ON FUZZY C ∗ -ALGEBRAS

Definition 1.6. Let (X, k · k) be a C ∗ -algebra and N a fuzzy norm on X. (1) The fuzzy normed ∗-algebra (X, N ) is called an induced fuzzy normed ∗-algebra. (2) The fuzzy Banach ∗-algebra (X, N ) is called an induced fuzzy C ∗ -algebra. Definition 1.7. Let (X, k · k) be an induced fuzzy normed ∗-algebra. Then a C-linear mapping D : (X, N ) → (X, N ) is called a fuzzy n-Jordan ∗-derivation if D(xn ) = D(x)xn−1 + xD(x)xn−2 + · · · + xn−2 D(x)x + xn−1 D(x), D(x∗ ) = D(x)∗ for all x ∈ X. Throughout this paper, assume that (X, N ) is an induced fuzzy C ∗ -algebra and that m is a fixed integer greater than 1. 2. Main results Lemma 2.1. Let (Z, N ) be a fuzzy normed vector space and f : X → Z be a mapping such that   t N (f (my − x) + f (x − mz) + mf (x − y + z) , t) ≥ N f (mx) , (2.1) 2 for all x, y, z ∈ X and all t > 0. Then f is additive. Proof. Letting x = y = z = 0 in (2.1), we get  N ((m + 2)f (0), t) = N f (0),

t m+2



  t ≥ N f (0), 2

for all t > 0. By (N5 ) and (N6 ), N (f (0), t) = 1 for all t > 0. It follows from (N2 ) that f (0) = 0. Letting x = 0 and y = z in (2.1), we get   t N (f (my) + f (−my), t) ≥ N f (0), =1 2 for all t > 0. It follows from (N2 ) that f (my) + f (−my) = 0 for all y ∈ X. Thus f (−y) = −f (y) for all y ∈ X. Letting x = z = 0 in (2.1), we get N (f (my) − mf (y), t) = N (f (my) + mf (−y), t) ≥ N

  t f (0), =1 2

for all t > 0. So f (my) = mf (y) for all y ∈ X. Letting x = 0 and replacing z by −z in (2.1), we get   t N (f (my) + f (mz) + mf (−y − z), t) = N (mf (y) + mf (z) − mf (y + z), t) ≥ N f (0), =1 2 for all t > 0. It follows from (N2 ) that mf (y) + mf (z) − mf (y + z) = 0 for all y, z ∈ X. Thus f (y + z) = f (y) + f (z) for all y, z ∈ X, as desired.



561

YINHUA CUI ET AL 559-567

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Y. CUI, G. LU, X. ZHANG, AND C. PARK

Theorem 2.2. Let φ : X 3 → [0, ∞) be a function such that there exists an L < 1 with x y z L φ , , ≤ φ(x, y, z) m m m m for all x, y, z ∈ X. Let f : X → X be an odd mapping such that N (f (µ(my − x)) + f (µ(x − mz)) + mf (µ(x − y + z)) − µf (mx) , t) ≥

t , t + φ(x, y, z)

N f (wn ) − f (w)wn−1 − wf (w)wn−2 − · · · − wn−2 f (w)w − wn−1 f (w) t +f (v ∗ ) − f (v)∗ , t) ≥ t + φ(w, v, 0)

(2.2)

(2.3)

(2.4)

for all x, y, z, w, v ∈ X, all µ ∈ T1 := {c ∈ C : |c| = 1} and all t > 0. Then the limit D(x) = N − limn→∞ mn f mxn exists for each x ∈ X and the mapping D : X → X is a fuzzy n-Jordan ∗-derivation satisfying N (f (x) − D(x), t) ≥

m(1 − L)t m(1 − L)t + Lφ (x, 0, 0)

(2.5)

for all x ∈ X and all t > 0. Proof. Since f is odd, f (0) = 0 and f (−x) = −f (x) for all X. Letting µ = 1 and y = z = 0 in (2.3), we have N (mf (x) − f (mx), t) ≥

t t + φ (x, 0, 0)

(2.6)

and so  x  t = N mf − f (x), t ≥ x m , 0, 0 t+φ m t+ for all x ∈ X and all t > 0. Thus   x L − f (x), t ≥ N mf m m

L mt

+

L mt L m φ (x, 0, 0)

=

t L m φ (x, 0, 0)

t t + φ (x, 0, 0)

(2.7)

for all x ∈ X and all t > 0. Consider the set G := {g : X → X} and introduce the generalized metric on G: d(g, h) := inf{a ∈ R+ : N (g(x) − h(x), at) ≥

t } t + φ (x, 0, 0)

for all x ∈ X and all t > 0, where inf φ = +∞. It is easy to show that (S, d) is complete (see the proof of [26, Lemma 2.1]  x for all x ∈ X. Now, we consider the linear mapping Q : G → G such that Qg(x) := mg m Let g, h ∈ G be given such that d(g, h) = ε. Then N (g(x) − h(x), εt) ≥

562

t t + φ (x, 0, 0)

YINHUA CUI ET AL 559-567

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

n-JORDAN ∗-DERIVATIONS ON FUZZY C ∗ -ALGEBRAS

for all x ∈ X and all t > 0. Hence     x x  x L  x N (Qg(x) − Qh(x), Lεt) = N mg − mh , Lεt = N g −h , εt m m m m m ≥

Lt m

+

Lt m  x φ m , 0, 0



Lt m Lt m

+

L m φ (x, 0, 0)

=

t t + φ (x, 0, 0)

for all x ∈ X and all t > 0. Thus d(g, h) = ε implies that d(Qg, Qh) ≤ Lε. This means that d(Qg, Qh) ≤ Ld(g, h) for all g, h ∈ G. L It follows from (2.7) that d(f, Qf ) ≤ m . By Theorem 1.1, there exists a mapping D : X → X satisfying the following: (1) D is a fixed point of Q, i.e., x 1 D = D(x) m m for all x ∈ X. The mapping D is a unique fixed point of Q in the set

(2.8)

M = {g ∈ G : d(f, g) < ∞}. This implies that D is a unique mapping satisfying (2.8) such that there exists an a ∈ (0, ∞) satisfying t N (f (x) − D(x), at) ≥ t + φ (x, 0, 0) for all x ∈ X. (2) d(Qk f, D) → 0 as k → ∞. This implies the equality  x  N − lim mk f = D(x) k→∞ mk for all x ∈ X; 1 (3) d(f, D) ≤ 1−L d(f, Qf ), which implies the inequality d(f, D) ≤

L . m(1 − L)

This implies that the inequality (2.5) holds. Next we show that D is additive. It follows from (2.2) that ∞  x y x y z  x y z  X z  2 mk φ , , = φ(x, y, z) + mφ , , + m φ , , + ··· m m m m2 m2 m2 mk mk mk k=0

≤ φ(x, y, z) + Lφ(x, y, z) + L2 φ(x, y, z) + · · · =

1 φ(x, y, z) < ∞ 1−L

for all x, y, z ∈ X. By (2.3),         m  my − x x − mz x−y+z k k k+1 k k N m f µ +m f µ +m f µ − m µf x ,m t mk mk mk mk t  ≥ x t + φ mk , myk , mzk

563

YINHUA CUI ET AL 559-567

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Y. CUI, G. LU, X. ZHANG, AND C. PARK

and so        m   my − x x − mz x−y+z k k k k N m f µ +m f µ +m·m f µ − m µf x ,t mk mk mk mk ≥

t mk



t mk  x , y , z mk mk mk

=

t t+

mk φ

 x . y , z mk mk mk

for all x, y, z ∈ X, all µ ∈ T1 and all t > 0. Since limk→∞

t+mk φ

 t

x , y , z mk mk mk



= 1 for all x, y, z ∈ X

and all t > 0, N (D (µ(my − x)) + D (µ(x − mz)) + mD (µ(x − y + z)) − µD (mx) , t) = 1 for all x, y, z ∈ X, all µ ∈ T1 and all t > 0. So D (µ(my − x)) + D (µ(x − mz) + mD (µ(x − y + z)) = µD (mx))

(2.9)

for all x, y, z ∈ X and all µ ∈ T1 . Let µ = 1 in (2.9). By the same reasoning as in the proof of Lemma 2.1, one can easily show that D is additive. Since f is odd, it is easy to show that D is odd. Letting µ = 1 and y = z = 0 in (2.9), we get mD(x) = D(mx) for all x ∈ X. Letting y = z = 0 in (2.9), we get mD(µx) = µD(mx) = mµD(x) and so D(µx) = µD(x) for all x ∈ X and all µ ∈ T1 . Thus the mapping D : X → X is C-linear by [28, Theorem 2.1]. By (2.4) and letting v = 0 in (2.4), we get   n   w   w n−1  w   w n−2 w nk nk w nk − m f − m f − ··· N m f mnk mk mk mk mk mk   w n−2  w   w n−1  w  t nk nk −mnk w − m , m t ≥ f f t + φ( mwk , 0, 0) mk mk mk mk for all w ∈ X and all t > 0. Thus   n   w   w n−1  w   w n−2 w nk nk nk w N m f − m f − m f − ··· mnk mk mk mk mk mk t  w n−2  w   w n−1  w   nk nk mnk −m f w − m f , t ≥ t mk mk mk mk + φ( mwk , 0, 0) mnk t ≥ n−1 t + (m L)k φ(w, 0, 0) for all w ∈ X and all t > 0. Since limk→∞ get

t t+(mn−1 L)k φ(w,0,0)

= 1 for all w ∈ X and all t > 0, we

N (D(wn ) − D(w)wn−1 − wD(w)wn−2 − · · · − wn−2 D(w)w − wn−1 D(w), t) = 1 for all x ∈ X and all t > 0. So D(wn ) − D(w)wn−1 − wD(w)wn−2 − · · · − wn−2 D(w)w − wn−1 D(w) = 0 for all w ∈ X. Similarly, letting w = 0 in (2.4), we get D(v ∗ ) − D(v)∗ = 0 for all v ∈ X. Therefore, the mapping D : X → X is a fuzzy n-Jordan ∗-derivation.

564



YINHUA CUI ET AL 559-567

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

n-JORDAN ∗-DERIVATIONS ON FUZZY C ∗ -ALGEBRAS

Corollary 2.3. Let p be a real number with p > 1, θ ≥ 0, and X be a normed vector space with norm k · k. Let f : X → X be an odd mapping satisfying N (f (µ(my − x)) + f (µ(x − mz)) + mf (µ(x − y + z)) − µf (mx) , t) t ≥ , p t + θ(kxk + kykp + kzkp ) N f (wn ) − f (w)wn−1 − wf (w)wn−2 − · · · − wn−2 f (w)w − wn−1 f (w) t +f (v ∗ ) − f (v)∗ , t) ≥ t + θ(kwkp + kvkp )

(2.10)

(2.11)

for all x, y, w, v ∈ X, all µ ∈ T1 and all t > 0. Then the limit D(x) = N − limn→∞ mn f mxn exists for each x ∈ X and the mapping D : X → X is a fuzzy n-Jordan ∗-derivation satisfying N (f (x) − D(x), t) ≥



(mp − m)t (mp − m)t + θkxkp

for all x ∈ X and all t > 0. Proof. The proof follows from Theorem 2.2 by taking φ(x, y, z) = θ(kxkp + kykp + kzkp ) and L = m1−p .



Theorem 2.4. Let φ : X 3 → [0, ∞) be a function such that there exists an L < 1 with x y z ≤ φ(x, y, z) (2.12) , , mLφ m m m for all x, y, z ∈ X. Let f : X → X be an odd mapping satisfying (2.3) and (2.4). Then the limit D(x) = N − limn→∞ m1n f (mn x) exists for each x ∈ X and the mapping D : X → X is a fuzzy n-Jordan ∗-derivation satisfying N (f (x) − D(x), t) ≥

m(1 − L)t m(1 − L)t + φ (x, 0, 0)

(2.13)

for all x ∈ X and all t > 0. Proof. Let (G, d) be generalized metric space defined in the proof of Theorem 2.2. Consider the linear mapping Q : G → G such that 1 Qg(x) := g(mx) m for all x ∈ X. It follow from (2.6) that   1 1 t N f (x) − f (mx), t ≥ m m t + φ (x, 0, 0) for all x ∈ X and all t > 0. Thus d(f, Qf ) ≤

1 m.

d(f, D) ≤

Hence 1 , m(1 − L)

which implies that the inequality (2.13) holds. The rest of the proof is similar to the proof of Theorem 2.2.

565



YINHUA CUI ET AL 559-567

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Y. CUI, G. LU, X. ZHANG, AND C. PARK

Corollary 2.5. Let θ ≥ 0 and let p be a positive real number with p < 1. Let X be a normed vector space with normed k · k. Let f : X → X be an odd mapping satisfying (2.10) and (2.11). Then D(x) = N − limn→∞ m1n f (mn x) exists for each x ∈ X and defines a fuzzy n-Jordan ∗-derivation D : X → X such that (m − mp )t N (f (x) − D(x), t) ≥ (m − mp )t + θkxkp for every x ∈ X and all t > 0. Proof. The proof follows from Theorem 2.4 by taking φ(x, y, z) = θ(kxkp + kykp + kzkp ) and L = mp−1 .



References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23]

T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan 2 (1950), 64–66. T. Bag and S .K. Samanta, Finite dimensional fuzzy normed linear spaces, J. Fuzzy Math. 11 (2003), 687–705. T. Bag and S. K. Samanta, Fuzzy bounded linear operators, Fuzzy Sets Syst. 151 (2005), 513–547. V. Balopoulos, A. G. Hatzimichailidis and B. K. Papadopoulos, Distance and similarity measures for fuzzy operators, Inform. Sci. 177 (2007), 2336–2348. R. Biswas, Fuzzy inner product spaces and fuzzy norm functions, Inform. Sci. 53 (1991), 185–190. L. C˘ adariu, L. G˘ avruta and P. G˘ avruta, Fixed points and generalized Hyers-Ulam stability, Abs. Appl. Anal. 2012, Article ID 712743 (2012). L. C˘ adariu and V. Radu, Fixed points and the stability of Jensen’s functional equation, J. Inequal. Pure Appl. Math. 4 (2003), No. 1, Article ID 4. A. Chahbi and N. Bounader, On the generalized stability of d’Alembert functional equation, J. Nonlinear Sci. Appl. 6 (2013), 198–204. I. Chang, M. Eshaghi Gordji, H. Khodaei and H. Kim, Nearly quartic mappings in β-homogeneous F -spaces, Results Math. 63 (2013), 529–541. S. C. Cheng and J. N. Mordeson, Fuzzy linear operator and fuzzy normed linear spaces, Bull. Calcutta Math. Soc. 86 (1994), 429–436. K. Ciepli´ nski, Applications of fixed point theorems to the Hyers-Ulam stability of functional equations–a survey, Ann. Funct. Anal. 3 (2012), 151–164. J.B. Diaz and B. Margolis, A fixed point theorem of the alternative for contractions on a generalized complete metric space, Bull. Amer. Math. Soc. 44 (1968), 305–309. M. Eshaghi Gordji, H. Khodaei, Th. M. Rassias and R. Khodabakhsh, J ∗ -homomorphisms and J ∗ -derivations on J ∗ -algebras for a generalized Jensen type functional equation, Fixed Point Theory 13 (2012), 481–494. C. Felbin, Finite dimensional fuzzy normed linear space, Fuzzy Sets Syst. 48 (1992), 239–248. P. Gˇ avruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings, J. Math. Anal. Appl. 184 (1994), 431–436. D. H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. USA 27 (1941), 222–224. D. H. Hyers, G. Isac and Th. M. Rassias, Stability of Functional Equations in Several Variables, Birkh¨ auser, Basel, 1998. G. Isac and Th.M. Rassias, On the Hyers-Ulam stability of ψ-additive mappings, J. Approx. Theory 72 (1993), 131–137. W. Jablo´ nski, Sum of graphs of continuous functions and boundedness of additive operators, J. Math. Anal. Appl. 312 (2005), 527–534. S. Jung, Hyers-Ulam-Rassias Stability of Functional Equations in Nonlinear Analysis, Springer, New York, 2011. A. K. Katsaras, Fuzzy topological vector spaces II, Fuzzy Sets Syst. 12 (1984), 143–154. H. Khodaei, R. Khodabakhsh and M. Eshaghi Gordji, Fixed points, Lie ∗-homomorphisms and Lie ∗derivations on Lie C ∗ -algebras, Fixed Point Theory 14 (2013), 387–400. I. Kramosil and J. Michalek, Fuzzy metric and statistical metric spaces, Kybernetica 11 (1975), 326–334.

566

YINHUA CUI ET AL 559-567

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.3, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

n-JORDAN ∗-DERIVATIONS ON FUZZY C ∗ -ALGEBRAS

[24] S. V. Krishna and K. K. M. Sarma, Separation of fuzzy normed linear spaces, Fuzzy Sets Syst. 63 (1994), 207–217. [25] G. Lu and C. Park, Hyers-Ulam stability of additive set-valued functional equations, Appl. Math. Lett. 24 (2011), 1312–1316. [26] D. Mihet and V. Radu, On the stability of the additive Cauchy functional equation in random normed spaces, J. Math. Anal. Appl. 343 (2008), 567–572. [27] F. Moradlou and M. Eshaghi Gordji, Approximate Jordan derivations on Hilbert C ∗ -modules, Fixed Point Theory 14 (2013), 413–425. [28] C. Park, Homomorphisms between Poisson JC ∗ -algebras, Bull. Braz. Math. Soc. 36 (2005), 79–97. [29] C. Park, K. Ghasemi and S. Ghaleh, Fuzzy n-Jordan ∗-derivations on induced fuzzy C ∗ -algebras, J. Comput. Anal. Appl. 16 (2014), 494–502. [30] C. Park, S. Kim, J. Lee and D. Shin, Quadratic ρ-functional inequalities in β-homogeneous normed spaces, Int. J. Nonlinear Anal. Appl. 6 (2015), no. 2, 21–26. [31] C. Park and A. Najati, Generalized additive functional inequalities in Banach algebras, Int. J. Nonlinear Anal. Appl. 1 (2010), no. 2, 54–62. [32] C. Park and J. M. Rassias, Stability of the Jensen-type functional equation in C ∗ -algebras: A fixed point approach, Abs. Appl. Anal. 2009, Article ID 360432 (2009). [33] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 (1978), 297–300. [34] Th. M. Rassias (Ed.), Functional Equations and Inequalities, Kluwer Academic, Dordrecht, 2000. [35] Th. M. Rassias, On the stability of functional equations in Banach spaces, J. Math. Anal. Appl. 251 (2000), 264–284. [36] Th .M. Rassias, On the stability of functional equations and a problem of Ulam, Acta Math. Appl. 62 (2000), 23–130. [37] S. Shagholi, M. Bavand Savadkouhi, M. Eshaghi Gordji, Nearly ternary cubic homomorphism in ternary Fr´echet algebras, J. Comput. Anal. Appl. 13 (2011), 1106–1114. [38] S. Shagholi, M. Eshaghi Gordji and M. B. Savadkouhi, Stability of ternary quadratic derivation on ternary Banach algebras, J. Comput. Anal. Appl. 13 (2011), 1097–1105. [39] B. Shieh, Infinite fuzzy relation equations with continuous t-norms, Inform. Sci. 178 (2008), 1961–1967. [40] D. Shin, C. Park and Sh. Farhadabadi, On the superstability of ternary Jordan C ∗ -homomorphisms, J. Comput. Anal. Appl. 16 (2014), 964–973. [41] D. Shin, C. Park and Sh. Farhadabadi, Stability and superstability of J ∗ -homomorphisms and J ∗ -derivations for a generalized Cauchy-Jensen equation, J. Comput. Anal. Appl. 17 (2014), 125–134. [42] S.M. Ulam, Problems in Modern Mathematics, Chapter VI, Science ed., Wiley, New York, 1940. [43] C. Wu and J. Fang, Fuzzy generalization of Klomogoroff ’s theorem, J. Harbin Inst. Technol. 1 (1984), 1–7. [44] J. Z. Xiao and X.-H. Zhu, Fuzzy normed spaces of operators and its completeness, Fuzzy Sets Syst. 133 (2003), 389–399. Yinhua Cui Department of Mathematics, Yanbian University, Yanji 133001, P.R. China E-mail address: [email protected] Gang Lu Department of Mathematics, Zhejiang University, Hangzhou 310027, People’s Republic of China; Department of Mathematics, School of Science, ShenYang University of Technology, Shenyang 110178, P. R. China E-mail address: [email protected] Xiaohong Zhang Department of Mathematics, Shanghai Maritime University, Shanghai 201306, P. R. China E-mail address: [email protected] Choonkil Park Department of Mathematics, Research Institute for Natural Sciences, Hanyang University, Seoul 04763, Republic of Korea E-mail address: [email protected]

567

YINHUA CUI ET AL 559-567

568

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO. 3, 2019

Nonlinear evolution equations with delays satisfying a local Lipschitz condition, Jin-Mun Jeong and Ah-ran Park,……………………………………………………………………………393 Investigation of 𝛼𝛼-C-class functions with applications, Aftab Hussain, Arslan Hojat Ansari, Sumit Chandok, Dong Yun Shin, and Choonkil Park,………………………………………404 Generalizations of Hua's inequality in Hilbert C*-modules, F. G. Gao and G. Q. Hong,……415 Fourier series of functions related to higher-order Genocchi polynomials, Taekyun Kim, Dae San Kim, Gwan-Woo Jang, and Jongkyum Kwon,……………………………………………….421 Value distribution and uniqueness of certain types of q-difference polynomials, Yunfei Du, Zongsheng Gao, Minfeng Chen, and Ming Zhao,…………………………………………….438 New Exact Penalty Function Methods with ϵ-approximation and Perturbation Convergence for Solving Nonlinear Bilevel Programming Problems, Qiang Tuo and Heng-you Lan,…………449 Approximate n-Jordan *-derivations on induced fuzzy C*-algebras, Gang Lu, Jincheng Xin, Choonkil Park, and Yuanfeng Jin,…………………………………………………………….459 Recurrence formulas for Eulerian polynomials of type B and type D, Dan-Dan Su and Yuan He,…………………………………………………………………………………………….469 Certain subclasses of bi-univalent functions of complex order associated with the generalized Meixner-Pollaczek polynomials, C. Ramachandran, T. Soupramanien, and Nak Eun Cho,…484 Integral Inequalities of Simpson's Type for Strongly Extended (s,m)-Convex Functions, Jun Zhang, Zhi-Li Pei, and Feng Qi,………………………………………………………………499 Fixed points of multivalued nonexpansive mappings in Kohlenbach hyperbolic space, Birol Gunduz, Ebru Aydoğdu, and Halis Aygün,……………………………………………………509 Double-framed soft sets with applications in BE–algebras, Jeong Soon Han and Sun Shin Ahn,…………………………………………………………………………………………….520 Hyers-Ulam stability of additive function equations in paranormed spaces, Choonkil Park, Su Min Kwon, and Jung Rye Lee,…………………………………………………………………532 New Uzawa-type method for nonsymmetric saddle point problems, Shu-Xin Miao , Juan Li,539

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO. 3, 2019 (continued)

Fuzzy Hyers-Ulam stability for generalized additive functional equations, Sung Jin Lee, Hassan Azadi Kenary, and Choonkil Park,…………………………………………………………545 n-Jordan *-derivations on induced C*-algebras, Yinhua Cui, Gang Lu, Xiaohong Zhang, and Choonkil Park,………………………………………………………………………………559

Volume 26, Number 4 ISSN:1521-1398 PRINT,1572-9206 ONLINE

April 2019

Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC

Journal of Computational Analysis and Applications ISSNno.’s:1521-1398 PRINT,1572-9206 ONLINE SCOPE OF THE JOURNAL An international publication of Eudoxus Press, LLC (fifteen times annually) Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152-3240, U.S.A [email protected] http://www.msci.memphis.edu/~ganastss/jocaaa The main purpose of "J.Computational Analysis and Applications" is to publish high quality research articles from all subareas of Computational Mathematical Analysis and its many potential applications and connections to other areas of Mathematical Sciences. Any paper whose approach and proofs are computational,using methods from Mathematical Analysis in the broadest sense is suitable and welcome for consideration in our journal, except from Applied Numerical Analysis articles. Also plain word articles without formulas and proofs are excluded. The list of possibly connected mathematical areas with this publication includes, but is not restricted to: Applied Analysis, Applied Functional Analysis, Approximation Theory, Asymptotic Analysis, Difference Equations, Differential Equations, Partial Differential Equations, Fourier Analysis, Fractals, Fuzzy Sets, Harmonic Analysis, Inequalities, Integral Equations, Measure Theory, Moment Theory, Neural Networks, Numerical Functional Analysis, Potential Theory, Probability Theory, Real and Complex Analysis, Signal Analysis, Special Functions, Splines, Stochastic Analysis, Stochastic Processes, Summability, Tomography, Wavelets, any combination of the above, e.t.c. "J.Computational Analysis and Applications" is a peer-reviewed Journal. See the instructions for preparation and submission of articles to JoCAAA. Assistant to the Editor: Dr.Razvan Mezei,[email protected], Madison,WI,USA.

Journal of Computational Analysis and Applications(JoCAAA) is published by EUDOXUS PRESS,LLC,1424 Beaver Trail Drive,Cordova,TN38016,USA,[email protected] http://www.eudoxuspress.com. Annual Subscription Prices:For USA and Canada,Institutional:Print $800, Electronic OPEN ACCESS. Individual:Print $400. For any other part of the world add $160 more(handling and postages) to the above prices for Print. No credit card payments. Copyright©2019 by Eudoxus Press,LLC,all rights reserved.JoCAAA is printed in USA. JoCAAA is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH. It is strictly prohibited the reproduction and transmission of any part of JoCAAA and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes no responsibility for the content of published papers.

572

Editorial Board Associate Editors of Journal of Computational Analysis and Applications Francesco Altomare Dipartimento di Matematica Universita' di Bari Via E.Orabona, 4 70125 Bari, ITALY Tel+39-080-5442690 office +39-080-3944046 home +39-080-5963612 Fax [email protected] Approximation Theory, Functional Analysis, Semigroups and Partial Differential Equations, Positive Operators.

Fractional Differential Equations Nonlinear Analysis, Fractional Dynamics Carlo Bardaro Dipartimento di Matematica e Informatica Universita di Perugia Via Vanvitelli 1 06123 Perugia, ITALY TEL+390755853822 +390755855034 FAX+390755855024 E-mail [email protected] Web site: http://www.unipg.it/~bardaro/ Functional Analysis and Approximation Theory, Signal Analysis, Measure Theory, Real Analysis.

Ravi P. Agarwal Department of Mathematics Texas A&M University - Kingsville 700 University Blvd. Kingsville, TX 78363-8202 tel: 361-593-2600 [email protected] Differential Equations, Difference Equations, Inequalities

Martin Bohner Department of Mathematics and Statistics, Missouri S&T Rolla, MO 65409-0020, USA [email protected] web.mst.edu/~bohner Difference equations, differential equations, dynamic equations on time scale, applications in economics, finance, biology.

George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis, TN 38152,U.S.A Tel.901-678-3144 e-mail: [email protected] Approximation Theory, Real Analysis, Wavelets, Neural Networks, Probability, Inequalities.

Jerry L. Bona Department of Mathematics The University of Illinois at Chicago 851 S. Morgan St. CS 249 Chicago, IL 60601 e-mail:[email protected] Partial Differential Equations, Fluid Dynamics

J. Marshall Ash Department of Mathematics De Paul University 2219 North Kenmore Ave. Chicago, IL 60614-3504 773-325-4216 e-mail: [email protected] Real and Harmonic Analysis

Luis A. Caffarelli Department of Mathematics The University of Texas at Austin Austin, Texas 78712-1082 512-471-3160 e-mail: [email protected] Partial Differential Equations George Cybenko Thayer School of Engineering

Dumitru Baleanu Department of Mathematics and Computer Sciences, Cankaya University, Faculty of Art and Sciences, 06530 Balgat, Ankara, Turkey, [email protected]

573

Dartmouth College 8000 Cummings Hall, Hanover, NH 03755-8000 603-646-3843 (X 3546 Secr.) e-mail:[email protected] Approximation Theory and Neural Networks

011-49-203-379-3542 e-mail: [email protected] Approximation Theory, Computer Aided Geometric Design John R. Graef Department of Mathematics University of Tennessee at Chattanooga Chattanooga, TN 37304 USA [email protected] Ordinary and functional differential equations, difference equations, impulsive systems, differential inclusions, dynamic equations on time scales, control theory and their applications

Sever S. Dragomir School of Computer Science and Mathematics, Victoria University, PO Box 14428, Melbourne City, MC 8001, AUSTRALIA Tel. +61 3 9688 4437 Fax +61 3 9688 4050 [email protected] Inequalities, Functional Analysis, Numerical Analysis, Approximations, Information Theory, Stochastics.

Weimin Han Department of Mathematics University of Iowa Iowa City, IA 52242-1419 319-335-0770 e-mail: [email protected] Numerical analysis, Finite element method, Numerical PDE, Variational inequalities, Computational mechanics

Oktay Duman TOBB University of Economics and Technology, Department of Mathematics, TR06530, Ankara, Turkey, [email protected] Classical Approximation Theory, Summability Theory, Statistical Convergence and its Applications

Tian-Xiao He Department of Mathematics and Computer Science P.O. Box 2900, Illinois Wesleyan University Bloomington, IL 61702-2900, USA Tel (309)556-3089 Fax (309)556-3864 [email protected] Approximations, Wavelet, Integration Theory, Numerical Analysis, Analytic Combinatorics

Saber N. Elaydi Department Of Mathematics Trinity University 715 Stadium Dr. San Antonio, TX 78212-7200 210-736-8246 e-mail: [email protected] Ordinary Differential Equations, Difference Equations

Margareta Heilmann Faculty of Mathematics and Natural Sciences, University of Wuppertal Gaußstraße 20 D-42119 Wuppertal, Germany, [email protected] Approximation Theory (Positive Linear Operators)

J .A. Goldstein Department of Mathematical Sciences The University of Memphis Memphis, TN 38152 901-678-3130 [email protected] Partial Differential Equations, Semigroups of Operators

Xing-Biao Hu Institute of Computational Mathematics AMSS, Chinese Academy of Sciences Beijing, 100190, CHINA [email protected]

H. H. Gonska Department of Mathematics University of Duisburg Duisburg, D-47048 Germany

574

Computational Mathematics Ram N. Mohapatra Department of Mathematics University of Central Florida Orlando, FL 32816-1364 tel.407-823-5080 [email protected] Real and Complex Analysis, Approximation Th., Fourier Analysis, Fuzzy Sets and Systems

Jong Kyu Kim Department of Mathematics Kyungnam University Masan Kyungnam,631-701,Korea Tel 82-(55)-249-2211 Fax 82-(55)-243-8609 [email protected] Nonlinear Functional Analysis, Variational Inequalities, Nonlinear Ergodic Theory, ODE, PDE, Functional Equations.

Gaston M. N'Guerekata Department of Mathematics Morgan State University Baltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'[email protected] [email protected] Nonlinear Evolution Equations, Abstract Harmonic Analysis, Fractional Differential Equations, Almost Periodicity & Almost Automorphy

Robert Kozma Department of Mathematical Sciences The University of Memphis Memphis, TN 38152, USA [email protected] Neural Networks, Reproducing Kernel Hilbert Spaces, Neural Percolation Theory Mustafa Kulenovic Department of Mathematics University of Rhode Island Kingston, RI 02881,USA [email protected] Differential and Difference Equations

M.Zuhair Nashed Department Of Mathematics University of Central Florida PO Box 161364 Orlando, FL 32816-1364 e-mail: [email protected] Inverse and Ill-Posed problems, Numerical Functional Analysis, Integral Equations, Optimization, Signal Analysis

Irena Lasiecka Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

Mubenga N. Nkashama Department OF Mathematics University of Alabama at Birmingham Birmingham, AL 35294-1170 205-934-2154 e-mail: [email protected] Ordinary Differential Equations, Partial Differential Equations

Burkhard Lenze Fachbereich Informatik Fachhochschule Dortmund University of Applied Sciences Postfach 105018 D-44047 Dortmund, Germany e-mail: [email protected] Real Networks, Fourier Analysis, Approximation Theory

Vassilis Papanicolaou Department of Mathematics National Technical University of Athens Zografou campus, 157 80 Athens, Greece tel:: +30(210) 772 1722 Fax +30(210) 772 1775 [email protected] Partial Differential Equations, Probability

Hrushikesh N. Mhaskar Department Of Mathematics California State University Los Angeles, CA 90032 626-914-7002 e-mail: [email protected] Orthogonal Polynomials, Approximation Theory, Splines, Wavelets, Neural Networks

575

Choonkil Park Department of Mathematics Hanyang University Seoul 133-791 S. Korea, [email protected] Functional Equations

Anfithea - Paleon Faliron GR-175 64 Athens, Greece [email protected] Numerical Analysis H. M. Srivastava Department of Mathematics and Statistics University of Victoria Victoria, British Columbia V8W 3R4 Canada tel.250-472-5313; office,250-4776960 home, fax 250-721-8962 [email protected] Real and Complex Analysis, Fractional Calculus and Appl., Integral Equations and Transforms, Higher Transcendental Functions and Appl.,q-Series and q-Polynomials, Analytic Number Th.

Svetlozar (Zari) Rachev, Professor of Finance, College of Business, and Director of Quantitative Finance Program, Department of Applied Mathematics & Statistics Stonybrook University 312 Harriman Hall, Stony Brook, NY 11794-3775 tel: +1-631-632-1998, [email protected] Alexander G. Ramm Mathematics Department Kansas State University Manhattan, KS 66506-2602 e-mail: [email protected] Inverse and Ill-posed Problems, Scattering Theory, Operator Theory, Theoretical Numerical Analysis, Wave Propagation, Signal Processing and Tomography

I. P. Stavroulakis Department of Mathematics University of Ioannina 451-10 Ioannina, Greece [email protected] Differential Equations Phone +3-065-109-8283

Tomasz Rychlik Polish Academy of Sciences Instytut Matematyczny PAN 00-956 Warszawa, skr. poczt. 21 ul. Śniadeckich 8 Poland [email protected] Mathematical Statistics, Probabilistic Inequalities

Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock, Germany [email protected] Numerical Fourier Analysis, Fourier Analysis, Harmonic Analysis, Signal Analysis, Spectral Methods, Wavelets, Splines, Approximation Theory

Boris Shekhtman Department of Mathematics University of South Florida Tampa, FL 33620, USA Tel 813-974-9710 [email protected] Approximation Theory, Banach spaces, Classical Analysis

Roberto Triggiani Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

T. E. Simos Department of Computer Science and Technology Faculty of Sciences and Technology University of Peloponnese GR-221 00 Tripolis, Greece Postal Address: 26 Menelaou St.

Juan J. Trujillo University of La Laguna Departamento de Analisis Matematico C/Astr.Fco.Sanchez s/n 38271. LaLaguna. Tenerife. SPAIN Tel/Fax 34-922-318209 [email protected]

576

Fractional: Differential EquationsOperators-Fourier Transforms, Special functions, Approximations, and Applications

Ahmed I. Zayed Department of Mathematical Sciences DePaul University 2320 N. Kenmore Ave. Chicago, IL 60614-3250 773-325-7808 e-mail: [email protected] Shannon sampling theory, Harmonic analysis and wavelets, Special functions and orthogonal polynomials, Integral transforms

Ram Verma International Publications 1200 Dallas Drive #824 Denton, TX 76205, USA [email protected] Applied Nonlinear Analysis, Numerical Analysis, Variational Inequalities, Optimization Theory, Computational Mathematics, Operator Theory

Ding-Xuan Zhou Department Of Mathematics City University of Hong Kong 83 Tat Chee Avenue Kowloon, Hong Kong 852-2788 9708,Fax:852-2788 8561 e-mail: [email protected] Approximation Theory, Spline functions, Wavelets

Xiang Ming Yu Department of Mathematical Sciences Southwest Missouri State University Springfield, MO 65804-0094 417-836-5931 [email protected] Classical Approximation Theory, Wavelets

Xin-long Zhou Fachbereich Mathematik, Fachgebiet Informatik Gerhard-Mercator-Universitat Duisburg Lotharstr.65, D-47048 Duisburg, Germany e-mail:[email protected] Fourier Analysis, Computer-Aided Geometric Design, Computational Complexity, Multivariate Approximation Theory, Approximation and Interpolation Theory

Xiao-Jun Yang State Key Laboratory for Geomechanics and Deep Underground Engineering, China University of Mining and Technology, Xuzhou 221116, China Local Fractional Calculus and Applications, Fractional Calculus and Applications, General Fractional Calculus and Applications, Variable-order Calculus and Applications, Viscoelasticity and Computational methods for Mathematical [email protected]

Jessada Tariboon Department of Mathematics, King Mongkut's University of Technology N. Bangkok 1518 Pracharat 1 Rd., Wongsawang, Bangsue, Bangkok, Thailand 10800 [email protected], Time scales, Differential/Difference Equations, Fractional Differential Equations

Richard A. Zalik Department of Mathematics Auburn University Auburn University, AL 36849-5310 USA. Tel 334-844-6557 office 678-642-8703 home Fax 334-844-6555 [email protected] Approximation Theory, Chebychev Systems, Wavelet Theory

577

Instructions to Contributors Journal of Computational Analysis and Applications An international publication of Eudoxus Press, LLC, of TN.

Editor in Chief: George Anastassiou Department of Mathematical Sciences University of Memphis Memphis, TN 38152-3240, U.S.A.

1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves.

2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.

578

4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corollaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,

579

name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990).

Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986.

Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495.

11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears.

15. This journal will consider for publication only papers that contain proofs for their listed results.

580

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

¨ SOME COMPANIONS OF QUASI GRUSS TYPE INEQUALITIES FOR COMPLEX FUNCTIONS DEFINED ON UNIT CIRCLE JIAN ZHU AND QIAOLING XUE

Abstract. Several companions of quasi Gr¨ uss type inequalities for the Riemann-Stieltjes integral of continuous complex valued integrands defined on the complex unit circle C(0, 1) are given. Our results in special cases recapture some known results, and moreover, give a smaller estimator than that of these known results.

1. Introduction



b

Riemann-Stieltjes integral

f (t)du(t), where f is called the integrand and u the integrator, is an ∫ b important concept in Mathematics. One can approximate the Riemann-Stieltjes integral f (t)du(t) a

a

with the following simpler quantity (see [13, 14]): (1.1)

u(b) − u(a) b−a



b

f (t)dt. a

In order to provide a priory sharp bounds for the approximation error, Dragonir and Fedotov established the following functional in [13]: ∫ b ∫ u(b) − u(a) b (1.2) D(f ; u) := f (t)du(t) − f (t)dt b−a a a and proved the following inequality of Gr¨ uss type for Riemann-Stieltjes integral ∨ 1 K(b − a) (u), 2 a b

|D(f ; u)| ≤

where u is of bounded variation on [a, b] and f is Lipschitzian with the constant K > 0, the constant 1 2 is sharp in the sense that it cannot be replaced by a smaller quantity. In [1], the author studied a companion functional of (1.2). Introducing the functional ( ) ∫ a+b ∫ 2 u a+b − u(a) b f (x) + f (a + b − x) 2 (1.3) GS(f ; u) := du(x) − f (t)dt, 2 b−a a a ∫ b ∫ a+b 2 f (x) + f (a + b − x) du(x) and the Riemann integral f (t)dt provided that the Stieltjes integral 2 a a exist, the author proved several bounds for GS(f ; u). More specifically, the integrand f is assumed to be of r − H-H¨older’s type and the integrator u is of bounded variation, Lipschitzian and monotonic, respectively. For continuous functions f : C(0, 1) → C, where C(0, 1) is the unit circle from C centered in O and u : [a, b] ⊆ [0, 2π] → C a function of bounded variation on [a, b]. In [15], Dragomir developed some quasi Gr¨ uss type inequalities for the Riemann-Stieltjes integral of continuous complex valued integrands defined on the complex unit circle C(0, 1). 2010 Mathematics Subject Classification. 26D15. Key words and phrases. Gr¨ uss type inequalities, Riemann-Stieltjes integral, unit circle.

581

JIAN ZHU ET AL 581-588

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

JIAN ZHU AND QIAOLING XUE

Theorem 1.1. Assume that f : C(0, 1) → C satisfies the following H¨ older’s type condition r

|f (a) − f (b)| ≤ H |a − b|

(1.4)

for any a, b ∈ C(0, 1), where H > 0 and r ∈ (0, 1] are given. If [a, b] ⊆ [0, 2π] and the function u : [a, b] → C is a function of bounded variation on [a, b], then ∫ ∫ b b ( ) ∨ u(b) − u(a) b ( it ) 2r H it (1.5) f e dt ≤ max Br (a, b; t) (u) f e du(t) − a b − a t∈[a,b] b−a a a for any t ∈ [a, b], where

( ) ) ( ∫ t ∫ b r t−s r s−t ds. Br (a, b; t) := sin ds + sin 2 2 a t

For other inequalities for the Riemann-Stieltjes integral see [2]-[12], [16]-[26] and the references therein. Motivated by the above facts, we consider in the present paper the problem of approximating the com∫ a+b 2 f (eit ) + f (ei(a+b−t) ) du(t). We denote the following functional panions of Riemann-Stieltjes integral 2 a of companions of quasi Gr¨ uss type: ( ) ∫ a+b ∫ 2 u a+b − u(a) b f (eit ) + f (ei(a+b−t) ) 2 (1.6) Dc (f ; u, a, b) := du(t) − f (eit )dt. 2 b−a a a In this paper we establish some bounds for the magnitude of Dc (f ; u, a, b) when the integrand f : C(0, 1) → C satisfies some H¨older’s type conditions on the circle C(0, 1) while the integrator u is of bounded variation, Lipschitzian and monotonic, respectively. 2. The case of bounded variation integrators Theorem 2.1. Let f : C(0, 1) → C satisfy an H-r-H¨ older’s type condition on the circle C(0, 1), where H > 0 and r ∈ (0, 1] are given. If u : [a, b] ⊆ [0, 2π] → C is a function of bounded variation on [a, b], then a+b

(2.1)

2 ∨ 2r H |Dc (f ; u, a, b)| ≤ max Br (a, b; t) (u) b − a t∈[a, a+b 2 ] a a+b

2 ∨ H ≤ (b − a)r (u), r+1 a

where (2.2)

) ( ) ∫ b t−s s−t r Br (a, b; t) := sin ds + ds sin 2 2 a t 1 (t − a)r+1 + (b − t)r+1 ≤ r 2 r+1 ∫

(

t

r

for any t ∈ [a, a+b 2 ]. In particular, if f is Lipschitzian with the constant L > 0, and [a, b] ⊂ [0, 2π] with b − a ̸= 2π, then we have the simpler inequality (2.3)

8L |Dc (f ; u, a, b)| ≤ sin2 b−a

(

b−a 4

) a+b 2 ∨ a

a+b

2 ∨ 1 (u) ≤ L(b − a) (u). 2 a

If a = 0 and b = 2π and f is Lipschitzian with the constant L > 0, then 4L ∨ (u). π 0 π

(2.4)

|Dc (f ; u, 0, 2π)| ≤

582

JIAN ZHU ET AL 581-588

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

¨ SOME COMPANIONS OF QUASI GRUSS TYPE INEQUALITIES

Proof. We have

] ∫ b f (eit ) + f (ei(a+b−t) ) 1 is Dc (f ; u, a, b) = − f (e )ds du(t) 2 b−a a a (∫ [ ] ) ∫ a+b b 2 1 f (eit ) + f (ei(a+b−t) ) is = − f (e ) ds du(t). b−a a 2 a ∫

(2.5)

a+b 2

[

It is known that if p : [c, d] → C is a continuous function and v : [c, d] → C is of bounded variation, then ∫ d the Riemann-Stieltjes integral p(t)dv(t) exists and the following inequality holds c

(2.6)

∫ d d ∨ p(t)dv(t) ≤ max |p(t)| (v). c t∈[c,d] c

Utilising this property and (2.5), we have ∫ a+b (∫ [ ] ) b 2 f (eit ) + f (ei(a+b−t) ) 1 is − f (e ) ds du(t) (2.7) |Dc (f ; u, a, b)| = b−a a 2 a ∫ [ a+b ] ∨ 2 b f (eit ) + f (ei(a+b−t) ) 1 is max − f (e ) ds (u). ≤ a a b − a t∈[a, a+b 2 2 ] Utilising the properties of the Riemann integral and the fact that f is of H-r-H¨older’s type on the circle C(0, 1) we have ∫ [ ] b f (eit ) + f (ei(a+b−t) ) is − f (e ) ds (2.8) a 2 ∫ b f (eit ) − f (eis ) f (ei(a+b−t) − f (eis ) ds + ≤ 2 2 a ∫ b ∫ b it 1 i(a+b−t) f (e ) − f (eis ) ds + 1 − f (eis ) ds ≤ f (e 2 a 2 a (∫ ) ∫ b r b H r is it is i(a+b−t) e − e ds + ≤ e − e ds . 2 a a From [15], we have (2.9)

( ) r is e − eit r = 2r sin s − t 2

for any s, t ∈ R. Therefore ∫ b ∫ b r it i(a+b−t) e − eis r ds + − eis ds e a a (∫ ( r ) ) r ∫ b b s − t s + t − a − b sin ds + sin( =2r ) ds 2 2 a a (∫ ( ) ( ) ∫ b t t−s s−t =2r sinr ds + sinr ds 2 2 a t ( ( ) ) ) ∫ b ∫ a+b−t s + t − a − b a + b − t − s sinr ds + sinr ds . + 2 2 a a+b−t

583

JIAN ZHU ET AL 581-588

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

JIAN ZHU AND QIAOLING XUE

Utilising the variable substitution u = a + b − s, we have ( ( ) ) ∫ a+b−t ∫ b a+b−t−s s−t r r sin ds = sin ds 2 2 a t and



(

b

sin a+b−t

So



b

(2.10)

it e − eis r ds +

a

for any t ∈ [a,

∫ a

b

r

s+t−a−b 2

)



(

t r

ds =

sin a

t−s 2

) ds.

[∫ ( ( ) ) ] ∫ b r t s − t t − s i(a+b−t) ds + sinr ds − eis ds = 2r+1 sinr e 2 2 t a

a+b 2 ].

Making use of (2.8) and (2.10), we have ∫ [ ] b f (eit ) + f (ei(a+b−t) ) is max − f (e ) ds ≤ 2r H max Br (a, b; t) 2 ] t∈[a, a+b t∈[a, a+b a 2 2 ]

and the first inequality in (2.1) is proved. Utilising the elementary inequality |sin(x)| ≤ |x|, x ∈ R, we have )r )r ∫ t( ∫ b( t−s 1 (t − a)r+1 + (b − t)r+1 s−t (2.11) Br (a, b; t) ≤ ds + ds = r 2 2 2 r+1 a t for any t ∈ [a, a+b 2 ], and the inequality (2.2) is proved. If we consider the auxiliary function φ : [a, a+b 2 ] → R, φ(t) = (t − a)r+1 + (b − t)r+1 , r ∈ (0, 1], then φ′ (t) = (r + 1)[(t − a)r − (b − t)r ] and φ′′ (t) = (r + 1)r[(t − a)r−1 + (b − t)r−1 ]. a+b a+b ′ ′′ We have φ′ (t) = 0 iff t = a+b 2 and φ (t) < 0 for t ∈ (a, 2 ). We also have φ (t) > 0 for any t ∈ (a, 2 ), which shows that φ is strictly decreasing on (a, a+b 2 ). In addition, we have ( ) a+b (b − a)r+1 min φ(t) = φ = 2 2r t∈[a, a+b 2 ]

and max φ(t) = φ(a) = (b − a)r+1 .

t∈[a, a+b 2 ]

Taking the maximum over t ∈ [a, a+b 2 ] in (2.11) we deduce the second inequality in (2.1). For r = 1 we have ( ) ( ) [ ] ∫ t ∫ b t−s s−t 2 t−a 2 b−t sin sin B(a, b; t) := ds + ds = 4 sin ( ) + sin ( ) 2 2 4 4 a t for any t ∈ [a, a+b 2 ]. Now, if we take the derivative in the first equality, we have ( ) ( ) ( ) ( ) t − a+b t−a b−t b−a ′ 2 B (a, b; t) = sin − sin = 2 sin cos , 2 2 2 4 for [a, b] ⊂ [0, 2π] and b − a ̸= 2π.

584

JIAN ZHU ET AL 581-588

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

¨ SOME COMPANIONS OF QUASI GRUSS TYPE INEQUALITIES

We observe that B ′ (a, b; t) = 0 iff t = B(a, b; t) is given by

a+b 2 ,

B ′ (a, b; t) < 0 for t ∈ (a, a+b 2 ). The second derivation of (

′′

B (a, b; t) = cos

t−

a+b 2

)

2

( cos

b−a 4

)

and we observe that B ′′ (a, b; t) > 0 for t ∈ (a, a+b 2 ). Therefore the function B(a, b; t) is strictly decreasing on (a, a+b 2 ). It is also a strictly convex function a+b on (a, 2 ). We have ( ( ) ) b−a a+b 2 min B(a, b; t) = B a, b; = 8 sin 2 8 t∈[a, a+b 2 ] and

( max B(a, b; t) = B(a, b; a) = 4 sin2

t∈[a, a+b 2 ]

b−a 4

) .

This proves the bound (2.3). If a = 0 and b = 2π, then

( ) ( [ )] t 2π − t B(0, 2π; t) := 4 sin2 + sin2 =4 4 4

and by (2.1) we get (2.4). The proof is complete.

 3. The case of Lipschitzian integrators

The following result also holds. Theorem 3.1. Let f : C(0, 1) → C satisfy an H-r-H¨ older’s type condition on the circle C(0, 1), where H > 0 and r ∈ (0, 1] are given. If u : [a, b] ⊆ [0, 2π] → C is a function of Lipschitz type with the constant K > 0 on [a, b], then (3.1)

|Dc (f ; u, a, b)| ≤

where (3.2)



a+b 2



sin a



(

t r

Cr (a, b) := a

2r HK HK(b − a)r+1 Cr (a, b) ≤ , b−a (r + 1)(r + 2) t−s 2

)



a+b 2



a

(

b

sinr

dsdt + t

s−t 2

) dsdt

(b − a)r+2 . + 1)(r + 2)

2r (r

In particular, if f is Lipschitzian with the constant L > 0, then we have the simpler inequality [ ( )] 8LK b − a b−a (3.3) |Dc (f ; u, a, b)| ≤ − sin b−a 2 2 2 LK(b − a) ≤ . 6 Proof. It is known that if p : [c, d] → C is a Riemann integrable function and v : [c, d] → C is Lipschitzian ∫ d with the constant M > 0, then the Riemann-Stieltjes integral p(t)dv(t) exists and the following inequality holds (3.4)

c

∫ ∫ d d |p(t)| d(t). p(t)dv(t) ≤ M c c

585

JIAN ZHU ET AL 581-588

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

JIAN ZHU AND QIAOLING XUE

Utilising the equality (2.5) and this property, we have ∫ a+b (∫ ) b 2 1 f (eit ) + f (ei(a+b−t) ) is |Dc (f ; u, a, b)| = [ − f (e )]ds du(t) (3.5) b−a a 2 a a+b ] [ ∫ 2 ∫ b K f (eit ) + f (ei(a+b−t) ) − f (eis ) ds dt. ≤ a b−a a 2 From (2.8) and (2.10) we have ∫ [ ] b f (eit ) + f (ei(a+b−t) ) − f (eis ) ds (3.6) a 2 [∫ ( ( ) ) ] ∫ b t s−t t−s r r r ds + sin ds , ≤2 H sin 2 2 t a and by (3.5) we deduce the first part of (3.1). By (2.11) we have [∫ ( )r )r ] ∫ a+b ∫ b( t 2 t−s s−t Cr (a, b) ≤ ds + ds dt 2 2 a a t ∫ a+b 2 (t − a)r+1 + (b − t)r+1 1 (b − a)r+2 = r dt = r , 2 a r+1 2 (r + 1)(r + 2) which proves the inequality (3.2). For r = 1 we have [∫ ( ) ( ) ] ∫ a+b ∫ b t 2 t−s s−t C1 (a, b) := sin ds + sin ds dt 2 2 a a t [ ( ) ( )] [ ( )] ∫ a+b 2 t−a b−t b−a b−a 4 − 2 cos − 2 cos dt = 4 − sin , = a a 2 2 a 

which by (3.1) produces the desired inequality (3.3). Remark 1. For the case a = 0 and b = 2π the inequality (3.3) is deduced to the simple inequality |Dc (f ; u, 0, 2π)| ≤ 4Lk.

(3.7)

4. The case of monotonic integrators Theorem 4.1. Let f : C(0, 1) → C satisfy an H-r-H¨ older’s type condition on the circle C(0, 1), where H > 0 and r ∈ (0, 1] are given. If u : [a, b] ⊆ [0, 2π] → C is a monotonically nondecreasing function on [a, b], then ∫ a+b 2 [ ] 2r H H |Dc (f ; u, a, b)| ≤ (4.1) Dr (a, b) ≤ (t − a)r+1 + (b − t)r+1 du(t) b−a (r + 1)(b − a) a [ ( ) ] H a+b ≤ (b − a)r u − u(a) , r+1 2 where ∫ (4.2)

a+b 2

Dr (a, b) :=

Br (a, b; t)du(t) a

and Br (a, b; t) is given by (2.2).

586

JIAN ZHU ET AL 581-588

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

¨ SOME COMPANIONS OF QUASI GRUSS TYPE INEQUALITIES

In particular, if f is Lipschitzian with the constant L > 0, then we have the simpler inequality ( [ ( ) )] ∫ a+b 2 t−a b−t 8L 2 2 sin (4.3) |Dc (f ; u, a, b)| ≤ + sin du(t) b−a a 4 4 [ ( ) ] a+b ≤2L(b − a) u − u(a) . 2 Proof. It is well known that if p : [c, d] → C is a continuous function and v : [c, d] → R is monotonically ∫ d nondecreasing on [c, d], then the Riemann-Stieltjes integral p(t)dv(t) exists and the following inequality c

holds

∫ ∫ d d p(t)dv(t) ≤ |p(t)| dv(t). c c

(4.4)

Utilising this property and the identities (2.5) and (2.10) we have ∫ a+b (∫ [ ] ) b 2 f (eit ) + f (ei(a+b−t) ) 1 is − f (e ) ds du(t) (4.5) |Dc (f ; u, a, b)| = b−a a 2 a ∫ [ ] ∫ a+b b f (eit ) + f (ei(a+b−t) ) 2 1 − f (eis ) ds du(t) ≤ a b−a a 2 ∫ a+b 2 2r H 2r H Br (a, b; t)du(t) = Dr (a, b) ≤ b−a a b−a ∫ a+b 2 H (t − a)r+1 + (b − t)r+1 ≤ du(t) b−a a r+1 and the first part of the inequality (4.1) is proved. Since max [(t − a)r+1 + (b − t)r+1 ] = (b − a)r+1 , the last part of (4.1) is also proved. t∈[a, a+b 2 ]

For r = 1 we have





a+b 2

D1 (a, b) :=

a+b 2

B1 (a, b; t)du(t) = 4 a

a

[ ( ) ( )] t−a b−t sin2 + sin2 du(t), 4 4 

and the inequality (4.3) is obtained. Remark 2. For the case a = 0, b = 2π the inequality (4.3) can be stated as |Dc (f ; u, 0, 2π)| ≤

(4.6)

4L [u(π) − u(0)]. π

Indeed, by (4.3) we have

( ) ( )] ∫ [ 8L π t 2π − t 2 2 |Dc (f ; u, 0, 2π)| ≤ sin + sin du(t) 2π 0 4 4 ∫ π 4L 4L = du(t) = [u(π) − u(0)]. π 0 π References

[1] M. W. Alomari, A companion of Gr¨ uss type inequality for Riemann-Stieltjes integral and applications, Mat. Vesnik 66 (2014), no. 2, 202–212. MR3194427 ∫ [2] M. W. Alomari, A companion of Ostrowski’s inequality for the Riemann-Stieltjes integral ab f (t)du(t), where f is of bounded variation and u is of r-H-H¨ older type and applications, Appl. Math. Comput. 219 (2013), no. 9, 4792–4799. MR3001528 [3] M. W. Alomari, Some Gr¨ uss type inequalities for Riemann-Stieltjes integral and applications, Acta Math. Univ. Comenian. (N.S.) 81 (2012), no. 2, 211–220. MR2975287

587

JIAN ZHU ET AL 581-588

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

JIAN ZHU AND QIAOLING XUE

[4] G. A. Anastassiou, Gr¨ uss type inequalities for the Stieltjes integral, Nonlinear Funct. Anal. Appl. 12 (2007), no. 4, 583–593. MR2391977 [5] G. A. Anastassiou, Chebyshev-Gr¨ uss type and comparison of integral means inequalities for the Stieltjes integral, Panamer. Math. J. 17 (2007), no. 3, 91–109. MR2335475 [6] G. A. Anastassiou, A new expansion formula, Cubo Mat. Educ. 5 (2003), no. 1, 25–31. MR1957705 [7] T. M. Apostol, Mathematical analysis, second edition, Addison-Wesley Publishing Co., Reading, MA, 1974. MR0344384 [8] N. S. Barnett et al., Ostrowski and trapezoid type inequalities for the Stieltjes integral with Lipschitzian integrands or integrators, Comput. Math. Appl. 57 (2009), no. 2, 195–201. MR2488376 [9] P. Cerone and S. S. Dragomir, A refinement of the Gr¨ uss inequality and applications, Tamkang J. Math. 38 (2007), no. 1, 37–49. MR2321030 [10] P. Cerone, S. S. Dragomir and C. E. M. Pearce, A generalized trapezoid inequality for functions of bounded variation, Turkish J. Math. 24 (2000), no. 2, 147–163. MR1796667 [11] W.-S. Cheung and S. S. Dragomir, Two Ostrowski type inequalities for the Stieltjes integral of monotonic functions, Bull. Austral. Math. Soc. 75 (2007), no. 2, 299–311. MR2312572 [12] S. S. Dragomir, Ostrowski’s type inequalities for complex functions defined on unit circle with applications for unitary operators in Hilbert spaces, Arch. Math. (Brno) 51 (2015), no. 4, 233–254. MR3434605 [13] S. S. Dragomir and I. A. Fedotov, An inequality of Gr¨ uss’ type for Riemann-Stieltjes integral and applications for special means, Tamkang J. Math. 29 (1998), no. 4, 287–292. MR1648534 [14] S. S. Dragomir and I. Fedotov, A Gr¨ uss type inequality for mappings of bounded variation and applications to numerical analysis, Nonlinear Funct. Anal. Appl. 6 (2001), no. 3, 425–438. MR1875552 [15] S. S. Dragomir, Quasi Gr¨ uss type inequalities for complex functions defined on unit circle with applications for unitary operators in Hilbert spaces, Extracta Math. 31 (2016), no. 1, 47–67. MR3585949 [16] S. S. Dragomir, The Ostrowski’s integral inequality for Lipschitzian mappings and applications, Comput. Math. Appl. 38 (1999), no. 11-12, 33–37. MR1729802 [17] S. S. Dragomir, Inequalities of Gr¨ uss type for the Stieltjes integral and applications, Kragujevac J. Math. 26 (2004), 89–122. MR2126003 [18] S. S. Dragomir, Inequalities for Stieltjes integrals with convex integrators and applications, Appl. Math. Lett. 20 (2007), no. 2, 123–130. MR2283898 [19] S. S. Dragomir et al., A generalization of the trapezoidal rule for the Riemann-Stieltjes integral and applications, Nonlinear Anal. Forum 6 (2001), no. 2, 337–351. MR1891719 [20] G. Helmberg, Introduction to spectral theory in Hilbert space, North-Holland Series in Applied Mathematics and Mechanics, Vol. 6, North-Holland, Amsterdam, 1969. MR0243367 [21] W. J. Liu, X. Y. Gao and Y. Q. Wen, Approximating the finite Hilbert transform via some companions of Ostrowski’s inequalities, Bull. Malays. Math. Sci. Soc. 39 (2016), no. 4, 1499–1513. MR3549977 [22] W. J. Liu and N. Lu, Approximating the finite Hilbert transform via Simpson type inequalities and applications, Politehn. Univ. Bucharest Sci. Bull. Ser. A Appl. Math. Phys. 77 (2015), no. 3, 107–122. MR3452569 [23] W. J. Liu and J. Park, Some perturbed versions of the generalized trapezoid inequality for functions of bounded variation, J. Comput. Anal. Appl. 22 (2017), no. 1, 11–18. MR3615977 [24] W. J. Liu and J. Park, A companion of Ostrowski like inequality and applications to composite quadrature rules, J. Comput. Anal. Appl. 22 (2017), no. 1, 19–24. MR3615978 [25] Z. Liu, Refinement of an inequality of Gr¨ uss type for Riemann-Stieltjes integral, Soochow J. Math. 30 (2004), no. 4, 483–489. MR2106067 [26] Q. Xue, J. Zhu and W. Liu, A new generalization of Ostrowski-type inequality involving functions of two independent variables, Comput. Math. Appl. 60 (2010), no. 8, 2219–2224. MR2725311 (J. Zhu) College of Mathematics and Statistics, Nanjing University of Information Science and Technology, Nanjing 210044, China E-mail address: [email protected] (Q. Xue) College of Mathematics and Statistics, Nanjing University of Information Science and Technology, Nanjing 210044, China

588

JIAN ZHU ET AL 581-588

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A FIXED POINT APPROACH TO THE STABILITY OF QUADRATIC (ρ1 , ρ2 )-FUNCTIONAL INEQUALITIES SUNGSIK YUN Abstract. In this paper, we introduce and solve the following quadratic (ρ1 , ρ2 )-functional inequalities kf (x + y) + f (x − y) − 2f (x) − 2f (y)k

      x−y x+y

+ 2f − f (x) − f (y) ≤ ρ1 2f 2 2

    x+y

+ ρ2 4f + f (x − y) − 2f (x) − 2f (y) , 2 where ρ1 and ρ2 are fixed nonzero complex numbers with

|ρ1 | 2

(0.1)

+ |ρ2 | < 1, and

kf (x + y) + f (x − y) − 2f (x) − 2f (y)k

      x+y x−y

≤ ρ1 2f + 2f − f (x) − f (y) 2 2 + kρ2 (2f (x + y) + 2f (x − y) − f (2x) − f (2y))k ,

(0.2)

where ρ1 and ρ2 are fixed nonzero complex numbers with |ρ21 | + 2|ρ2 | < 1. Using the fixed point method, we prove the Hyers-Ulam stability of the quadratic (ρ1 , ρ2 )functional inequalities (0.1) and (0.2) in complex Banach spaces.

1. Introduction and preliminaries The stability problem of functional equations originated from a question of Ulam [29] concerning the stability of group homomorphisms. The functional equation f (x + y) = f (x) + f (y) is called the Cauchy equation. In particular, every solution of the Cauchy equation is said to be an additive mapping. Hyers [12] gave a first affirmative partial answer to the question of Ulam for Banach spaces. Hyers’ Theorem was generalized by Aoki [2] for additive mappings and by Rassias [21] for linear mappings by considering an unbounded Cauchy difference. A generalization of the Rassias theorem was obtained by G˘avruta [11] by replacing the unbounded Cauchy difference by a general control function in the spirit of Rassias’ approach. The stability of quadratic functional equation was proved by Skof [28] for mappings f : E1 → E2 , where E1 is a normed space and E2 is a Banach space. Cholewa [8] noticed that the theorem of Skof is still true if the relevant domain E1 is replaced by an Abelian group. Park [16, 17] defined additive ρ-functional inequalities and proved the Hyers-Ulam stability of the additive ρ-functional inequalities in Banach spaces and non-Archimedean Banach spaces. The stability problems of various functional equations have been extensively investigated by a number of authors (see [1, 3, 7, 10, 15, 18, 19, 22, 23, 24, 25, 26, 27, 30]). We recall a fundamental result in fixed point theory. Theorem 1.1. [4, 9] Let (X, d) be a complete generalized metric space and let J : X → X be a strictly contractive mapping with Lipschitz constant α < 1. Then for each given element x ∈ X, either d(J n x, J n+1 x) = ∞ 2010 Mathematics Subject Classification. Primary 39B62, 47H10, 39B52. Key words and phrases. Hyers-Ulam stability; quadratic (ρ1 , ρ2 )-functional inequality; fixed point; Banach space.

589

SUNGSIK YUN 589-596

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S. YUN

for all nonnegative integers n or there exists a positive integer n0 such that (1) d(J n x, J n+1 x) < ∞, ∀n ≥ n0 ; (2) the sequence {J n x} converges to a fixed point y ∗ of J; (3) y ∗ is the unique fixed point of J in the set Y = {y ∈ X | d(J n0 x, y) < ∞}; 1 (4) d(y, y ∗ ) ≤ 1−α d(y, Jy) for all y ∈ Y . In 1996, Isac and Rassias [13] were the first to provide applications of stability theory of functional equations for the proof of new fixed point theorems with applications. By using fixed point methods, the stability problems of several functional equations have been extensively investigated by a number of authors (see [5, 6, 20]). In Section 2, we solve the quadratic (ρ1 , ρ2 )-functional inequality (0.1) and prove the HyersUlam stability of the quadratic (ρ1 , ρ2 )-functional inequality (0.1) in Banach spaces by using the fixed point method. In Section 3, we solve the quadratic (ρ1 , ρ2 )-functional inequality (0.2) and prove the HyersUlam stability of the quadratic (ρ1 , ρ2 )-functional inequality (0.2) in Banach spaces by using the fixed point method. Throughout this paper, let X be a real or complex normed space with norm k · k and Y a complex Banach space with norm k · k. 2. Quadratic (ρ1 , ρ2 )-functional inequality (0.1) Throughout this section, assume that ρ1 and ρ2 are fixed nonzero complex numbers with + |ρ2 | < 1. In this section, we solve and investigate the quadratic (ρ1 , ρ2 )-functional inequality (0.1) in complex Banach spaces. |ρ1 | 2

Lemma 2.1. If a mapping f : X → Y satisfies f (0) = 0 and kf (x + y) + f (x − y) − 2f (x) − 2f (y)k

     

x+y x−y

≤ ρ1 2f + 2f − f (x) − f (y)

2 2

   

x+y + + f (x − y) − 2f (x) − 2f (y)

ρ2 4f

2

(2.1)

for all x, y ∈ X, then f : X → Y is quadratic. Proof. Assume that f : X → Y satisfies (2.1). Letting y = x in (2.1), we get kf (2x) − 4f (x)k ≤ 0 and so f (2x) = 4f (x) for all x ∈ X. Thus x 2

 

f

1 = f (x) 4

(2.2)

for all x ∈ X. It follows from (2.1) and (2.2) that kf (x + y) + f (x − y) − 2f (x) − 2f (y)k

     

x+y x−y

≤ ρ 2f + 2f − f (x) − f (y)

1

2 2

   

x+y + f (x − y) − 2f (x) − 2f (y) +

ρ2 4f 2

ρ1

=

2 (f (x + y) + f (x − y) − 2f (x) − 2f (y)) + kρ2 (f (x + y) + f (x − y) − 2f (x) − 2f (y))k   |ρ1 | + |ρ2 | kf (x + y) + f (x − y) − 2f (x) − 2f (y)k = 2

590

SUNGSIK YUN 589-596

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

QUADRATIC (ρ1 , ρ2 )-FUNCTIONAL INEQUALITY

for all x, y ∈ X. Since f is quadratic.

|ρ1 | 2

+ |ρ2 | < 1, f (x + y) + f (x − y) = 2f (x) + 2f (y) for all x, y ∈ X. Thus 

Using the fixed point method, we prove the Hyers-Ulam stability of the quadratic (ρ1 , ρ2 )functional inequality (2.1) in complex Banach spaces. Theorem 2.2. Let ϕ : X 2 → [0, ∞) be a function such that there exists an L < 1 with x y L ≤ ϕ (x, y) , 2 2 4 for all x, y ∈ X. Let f : X → Y be a mapping satisfying f (0) = 0 and 



ϕ

(2.3)

kf (x + y) + f (x − y) − 2f (x) − 2f (y)k

     

x+y x−y

≤ ρ1 2f + 2f − f (x) − f (y)

2 2

   

x+y + + f (x − y) − 2f (x) − 2f (y)

ρ2 4f

+ ϕ(x, y) 2 for all x, y ∈ X. Then there exists a unique quadratic mapping Q : X → Y such that L kf (x) − Q(x)k ≤ ϕ (x, x) 4(1 − L)

(2.4)

for all x ∈ X. Proof. Letting y = x in (2.4), we get kf (2x) − 4f (x)k ≤ ϕ(x, x)

(2.5)

for all x ∈ X. Consider the set S := {h : X → Y, h(0) = 0} and introduce the generalized metric on S: d(g, h) = inf {µ ∈ R+ : kg(x) − h(x)k ≤ µϕ (x, x) , ∀x ∈ X} , where, as usual, inf φ = +∞. It is easy to show that (S, d) is complete (see [14]). Now we consider the linear mapping J : S → S such that   x Jg(x) := 4g 2 for all x ∈ X. Let g, h ∈ S be given such that d(g, h) = ε. Then kg(x) − h(x)k ≤ εϕ (x, x) for all x ∈ X. Hence

     

x x x x L

kJg(x) − Jh(x)k = 4g − 4h ≤ 4εϕ , ≤ 4ε ϕ (x, x) = Lεϕ (x, x)

2 2 2 2 4 for all x ∈ X. So d(g, h) = ε implies that d(Jg, Jh) ≤ Lε. This means that d(Jg, Jh) ≤ Ld(g, h) for all g, h ∈ S. It follows from (2.5) that

   

f (x) − 4f x ≤ ϕ x , x ≤ L ϕ(x, x)

2 2 2 4

for all x ∈ X. So d(f, Jf ) ≤ L4 . By Theorem 1.1, there exists a mapping Q : X → Y satisfying the following: (1) Q is a fixed point of J, i.e.,   x Q (x) = 4Q 2 for all x ∈ X. The mapping Q is a unique fixed point of J in the set

(2.6)

M = {g ∈ S : d(f, g) < ∞}.

591

SUNGSIK YUN 589-596

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S. YUN

This implies that Q is a unique mapping satisfying (2.6) such that there exists a µ ∈ (0, ∞) satisfying kf (x) − Q(x)k ≤ µϕ (x, x) for all x ∈ X;  (2) d(J l f, Q) → 0 as l → ∞. This implies the equality liml→∞ 4n f 2xn = Q(x) for all x ∈ X; 1 (3) d(f, Q) ≤ 1−L d(f, Jf ), which implies kf (x) − Q(x)k ≤

L ϕ (x, x) 4(1 − L)

for all x ∈ X. It follows from (2.3) and (2.4) that kQ(x + y) + Q(x − y) − 2Q(x) − 2Q(y)k

       

x+y x−y x y n

+ f − 2f − 2f = lim 4 f n n n n→∞ 2 2 2 2n

       

x+y x−y x y n

2f ≤ lim 4 |ρ1 | + 2f − f − f

n+1 n+1 n n→∞ 2 2 2 2n

         

x+y x−y x y n

+ lim 4n ϕ x , y 4f + lim 4 |ρ2 | + f − 2f − 2f

n→∞ 2n+1 2n 2n 2n n→∞ 2n 2n

     

x+y x−y + 2Q − Q(x) − Q(y) =

ρ1 2Q 2 2

   

x+y + + Q (x − y) − 2Q(x) − 2Q(y)

ρ2 4Q

2 for all x, y ∈ X. So kQ(x + y) + Q(x − y) − 2Q(x) − 2Q(y)k

     

x+y x−y

≤ ρ 2Q + 2Q − Q(x) − Q(y)

1

2 2

   

x+y + + Q (x − y) − 2Q(x) − 2Q(y)

ρ2 4Q

2 for all x, y ∈ X. By Lemma 2.1, the mapping Q : X → Y is quadratic.



Corollary 2.3. Let r > 2 and θ be nonnegative real numbers, and let f : X → Y be a mapping satisfying f (0) = 0 and kf (x + y) + f (x − y) − 2f (x) − 2f (y)k

     

x+y x−y

≤ ρ 2f + 2f − f (x) − f (y)

1

2 2

   

x+y r r + + f (x − y) − 2f (x) − 2f (y)

ρ2 4f

+ θ(kxk + kyk ) 2

(2.7)

for all x, y ∈ X. Then there exists a unique quadratic mapping Q : X → Y such that kf (x) − Q(x)k ≤

2θ kxkr −4

2r

for all x ∈ X. Proof. The proof follows from Theorem 2.2 by taking ϕ(x, y) = θ(kxkr + kykr ) for all x, y ∈ X. Choosing L = 22−r , we obtain the desired result.  Theorem 2.4. Let ϕ : X 2 → [0, ∞) be a function such that there exists an L < 1 with 

ϕ (x, y) ≤ 4Lϕ

592

x y , 2 2



SUNGSIK YUN 589-596

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

QUADRATIC (ρ1 , ρ2 )-FUNCTIONAL INEQUALITY

for all x, y ∈ X. Let f : X → Y be a mapping satisfying f (0) = 0 and (2.4). Then there exists a unique quadratic mapping Q : X → Y such that kf (x) − Q(x)k ≤

1 ϕ (x, x) 4(1 − L)

for all x ∈ X. Proof. Let (S, d) be the generalized metric space defined in the proof of Theorem 2.2. Now we consider the linear mapping J : S → S such that 1 Jg(x) := g (2x) 4 for all x ∈ X. It follows from (2.5) that



f (x) − 1 f (2x) ≤ 1 ϕ(x, x)

4 4

for all x ∈ X. The rest of the proof is similar to the proof of Theorem 2.2.



Corollary 2.5. Let r < 2 and θ be positive real numbers, and let f : X → Y be a mapping satisfying f (0) = 0 and (2.7). Then there exists a unique quadratic mapping Q : X → Y such that 2θ kxkr kf (x) − Q(x)k ≤ 4 − 2r for all x ∈ X. Proof. The proof follows from Theorem 2.4 by taking ϕ(x, y) = θ(kxkr + kykr ) for all x, y ∈ X. Choosing L = 2r−2 , we obtain the desired result.  Remark 2.6. If ρ is a real number such that all the assertions in this section remain valid.

|ρ1 | 2

+ |ρ2 | < 1 and Y is a real Banach space, then

3. Quadratic (ρ1 , ρ2 )-functional inequality (0.2) Throughout this section, assume that ρ1 and ρ2 are fixed nonzero complex numbers with + 2|ρ2 | < 1. In this section, we solve and investigate the quadratic (ρ1 , ρ2 )-functional inequality (0.2) in complex Banach spaces. |ρ1 | 2

Lemma 3.1. If a mapping f : X → Y satisfies f (0) = 0 and kf (x + y) + f (x − y) − 2f (x) − 2f (y)k

     

x+y x−y

≤ ρ1 2f + 2f − f (x) − f (y)

2 2 + kρ2 (2f (x + y) + 2f (x − y) − f (2x) − f (2y))k

(3.1)

for all x, y ∈ X, then f : X → Y is quadratic. Proof. Assume that f : X → Y satisfies (3.1). Letting y = x in (3.1), we get kf (2x) − 4f (x)k ≤ 0 and so f (2x) = 4f (x) for all x ∈ X. Thus x 2

 

f

1 = f (x) 4

(3.2)

for all x ∈ X.

593

SUNGSIK YUN 589-596

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S. YUN

It follows from (3.1) and (3.2) that kf (x + y) + f (x − y) − 2f (x) − 2f (y)k

     

x+y x−y

≤ ρ1 2f + 2f − f (x) − f (y)

2 2 + kρ2 (2f (x + y) + 2f (x − y) − f (2x) − f (2y))k

ρ1

= (f (x + y) + f (x − y) − 2f (x) − 2f (y))

2 + k2ρ2 (f (x + y) + f (x − y) − 2f (x) − 2f (y))k   |ρ1 | = + 2|ρ2 | kf (x + y) + f (x − y) − 2f (x) − 2f (y)k 2 for all x, y ∈ X. Since Thus f is quadratic.

|ρ1 | 2

+ 2|ρ2 | < 1, f (x + y) + f (x − y) = 2f (x) + 2f (y) for all x, y ∈ X. 

Using the fixed point method, we prove the Hyers-Ulam stability of the quadratic (ρ1 , ρ2 )functional inequality (3.1) in complex Banach spaces. Theorem 3.2. Let ϕ : X 2 → [0, ∞) be a function such that there exists an L < 1 with 

ϕ

x y , 2 2





L ϕ (x, y) 4

for all x, y ∈ X. Let f : X → Y be a mapping satisfying f (0) = 0 and kf (x + y) + f (x − y) − 2f (x) − 2f (y)k

     

x+y x−y

≤ ρ1 2f + 2f − f (x) − f (y)

2 2 + kρ2 (2f (x + y) + 2f (x − y) − f (2x) − f (2y))k + ϕ(x, y)

(3.3)

for all x, y ∈ X. Then there exists a unique quadratic mapping Q : X → Y such that kf (x) − Q(x)k ≤

L ϕ (x, x) 4(1 − L)

for all x ∈ X. Proof. Letting y = x in (3.3), we get kf (2x) − 4f (x)k ≤ ϕ(x, x)

(3.4)

for all x ∈ X. Let (S, d) be the generalized metric space defined in the proof of Theorem 2.2. Now we consider the linear mapping J : S → S such that x 2

 

Jg(x) := 4g

for all x ∈ X. The rest of the proof is similar to the proof of Theorem 2.2.



Corollary 3.3. Let r > 2 and θ be nonnegative real numbers, and let f : X → Y be a mapping satisfying f (0) = 0 and kf (x + y) + f (x − y) − 2f (x) − 2f (y)k

     

x+y x−y

≤ ρ 2f + 2f − f (x) − f (y)

1 2 2 + kρ2 (2f (x + y) + 2f (x − y) − f (2x) − f (2y))k + θ(kxkr + kykr )

594

(3.5)

SUNGSIK YUN 589-596

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

QUADRATIC (ρ1 , ρ2 )-FUNCTIONAL INEQUALITY

for all x, y ∈ X. Then there exists a unique quadratic mapping Q : X → Y such that 2θ kxkr kf (x) − Q(x)k ≤ r 2 −4 for all x ∈ X. Proof. The proof follows from Theorem 3.2 by taking ϕ(x, y) = θ(kxkr + kykr ) for all x, y ∈ X. Choosing L = 22−r , we obtain the desired result.  Theorem 3.4. Let ϕ : X 2 → [0, ∞) be a function such that there exists an L < 1 with   x y ϕ (x, y) ≤ 4Lϕ , 2 2 for all x, y ∈ X. Let f : X → Y be a mapping satisfying f (0) = 0 and (3.3). Then there exists a unique quadratic mapping Q : X → Y such that 1 kf (x) − Q(x)k ≤ ϕ (x, x) 4(1 − L) for all x ∈ X. Proof. Let (S, d) be the generalized metric space defined in the proof of Theorem 2.2. Now we consider the linear mapping J : S → S such that 1 Jg(x) := g (2x) 4 for all x ∈ X. It follows from (3.4) that



f (x) − 1 f (2x) ≤ 1 ϕ(x, x)

4 4 for all x ∈ X. The rest of the proof is similar to the proof of Theorem 2.2.



Corollary 3.5. Let r < 2 and θ be positive real numbers, and let f : X → Y be a mapping satisfying f (0) = 0 and (3.5). Then there exists a unique quadratic mapping Q : X → Y such that 2θ kxkr kf (x) − Q(x)k ≤ 4 − 2r for all x ∈ X. Proof. The proof follows from Theorem 3.4 by taking ϕ(x, y) = θ(kxkr + kykr ) for all x, y ∈ X. Choosing L = 2r−2 , we obtain the desired result.  Remark 3.6. If ρ is a real number such that |ρ21 | + 2|ρ2 | < 1 and Y is a real Banach space, then all the assertions in this section remain valid. Acknowledgments This research was supported by Hanshin University Research Grant. References [1] M. Adam, On the stability of some quadratic functional equation, J. Nonlinear Sci. Appl. 4 (2011), 50–59. [2] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan 2 (1950), 64–66. [3] L. C˘ adariu, L. G˘ avruta, P. G˘ avruta, On the stability of an affine functional equation, J. Nonlinear Sci. Appl. 6 (2013), 60–67. [4] L. C˘ adariu, V. Radu, Fixed points and the stability of Jensen’s functional equation, J. Inequal. Pure Appl. Math. 4, no. 1, Art. ID 4 (2003). [5] L. C˘ adariu, V. Radu, On the stability of the Cauchy functional equation: a fixed point approach, Grazer Math. Ber. 346 (2004), 43–52.

595

SUNGSIK YUN 589-596

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S. YUN

[6] L. C˘ adariu, V. Radu, Fixed point methods for the generalized stability of functional equations in a single variable, Fixed Point Theory Appl. 2008, Art. ID 749392 (2008). [7] A. Chahbi, N. Bounader, On the generalized stability of d’Alembert functional equation, J. Nonlinear Sci. Appl. 6 (2013), 198–204. [8] P. W. Cholewa, Remarks on the stability of functional equations, Aequationes Math. 27 (1984), 76–86. [9] J. Diaz, B. Margolis, A fixed point theorem of the alternative for contractions on a generalized complete metric space, Bull. Amer. Math. Soc. 74 (1968), 305–309. [10] G. Z. Eskandani, P. Gˇ avruta, Hyers-Ulam-Rassias stability of pexiderized Cauchy functional equation in 2-Banach spaces, J. Nonlinear Sci. Appl. 5 (2012), 459–465. [11] P. Gˇ avruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings, J. Math. Anal. Appl. 184 (1994), 431–436. [12] D. H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. U.S.A. 27 (1941), 222–224. [13] G. Isac, Th. M. Rassias, Stability of ψ-additive mappings: Appications to nonlinear analysis, Internat. J. Math. Math. Sci. 19 (1996), 219–228. [14] D. Mihet¸, V. Radu, On the stability of the additive Cauchy functional equation in random normed spaces, J. Math. Anal. Appl. 343 (2008), 567–572. [15] C. Park, Orthogonal stability of a cubic-quartic functional equation, J. Nonlinear Sci. Appl. 5 (2012), 28–36. [16] C. Park, Additive ρ-functional inequalities and equations, J. Math. Inequal. 9 (2015), 17–26. [17] C. Park, Additive ρ-functional inequalities in non-Archimedean normed spaces, J. Math. Inequal. 9 (2015), 397–407. [18] C. Park, K. Ghasemi, S. G. Ghaleh, S. Jang, Approximate n-Jordan ∗-homomorphisms in C ∗ -algebras, J. Comput. Anal. Appl. 15 (2013), 365–368. [19] C. Park, A. Najati, S. Jang, Fixed points and fuzzy stability of an additive-quadratic functional equation, J. Comput. Anal. Appl. 15 (2013), 452–462. [20] V. Radu, The fixed point alternative and the stability of functional equations, Fixed Point Theory 4 (2003), 91–96. [21] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 (1978), 297–300. [22] K. Ravi, E. Thandapani, B. V. Senthil Kumar, Solution and stability of a reciprocal type functional equation in several variables, J. Nonlinear Sci. Appl. 7 (2014), 18–27. [23] S. Schin, D. Ki, J. Chang, M. Kim, Random stability of quadratic functional equations: a fixed point approach, J. Nonlinear Sci. Appl. 4 (2011), 37–49. [24] S. Shagholi, M. Bavand Savadkouhi, M. Eshaghi Gordji, Nearly ternary cubic homomorphism in ternary Fr´echet algebras, J. Comput. Anal. Appl. 13 (2011), 1106–1114. [25] S. Shagholi, M. Eshaghi Gordji, M. Bavand Savadkouhi, Stability of ternary quadratic derivation on ternary Banach algebras, J. Comput. Anal. Appl. 13 (2011), 1097–1105. [26] D. Shin, C. Park, Sh. Farhadabadi, On the superstability of ternary Jordan C ∗ -homomorphisms, J. Comput. Anal. Appl. 16 (2014), 964–973. [27] D. Shin, C. Park, Sh. Farhadabadi, Stability and superstability of J ∗ -homomorphisms and J ∗ -derivations for a generalized Cauchy-Jensen equation, J. Comput. Anal. Appl. 17 (2014), 125–134. [28] F. Skof, Propriet locali e approssimazione di operatori, Rend. Sem. Mat. Fis. Milano 53 (1983), 113–129. [29] S. M. Ulam, A Collection of the Mathematical Problems, Interscience Publ. New York, 1960. [30] C. Zaharia, On the probabilistic stability of the monomial functional equation, J. Nonlinear Sci. Appl. 6 (2013), 51–59. Sungsik Yun Department of Financial Mathematics, Hanshin University, Gyeonggi-do 18101, Korea E-mail address: [email protected]

596

SUNGSIK YUN 589-596

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A COMPARISON BETWEEN CAPUTO AND CANAVATI FRACTIONAL DERIVATIVES AMMAR KHANFER We investigate some properties of Caputo and Canavati fractional derivatives, and study some connections and comparisons between them. It turns out that the Canavati-type denition works more eciently than the Caputo-type, and overcomes all the pitfalls of Caputo-type.

Abstract.

1.

Introduction

The purpose of this paper is to make a comparison study between two of the important fractional derivatives, namely the Caputo derivative and the Canavati derivative. The Caputo-type has been proposed by Caputo and has been used in a wide spectrum of research for a long time and became popular among researchers due to some of its nice properties. The Canavati type has been proposed by Canavati [6], and has appeared in the work of Anastassiou [1,2,3] and in the work of M. Andric et al [4,5], and others. 2.

Denition 1. of

f

Background

Riemann - Liouville derivative

: For

n−1 ≤ α < n, the αth derivative

is dened as

1 dn D f (x) = · n Γ(n − α) dx

ˆx

α

where

Γ

a

f (t) dt, (x − t)α−n+1

is the gamma function.

For simplicity, throughout this paper we will consider

a = 0.

backs of the R-L derivative are summarized into the following: 1.

D3/2 1 ̸= 0. 2. Taking the Laplace transform of the derivative n ∑ α α gives L{D f } = S F (s) − sn−k [Dα−n+k−1 f (t)](0). So the initial conditions ac-

0,

i.e.

D1/2 1 ̸= 0

The major drawxα Γ(1−α) ̸=

Dα (1) =

and

k=1 company the fractional dierential equations of R-L type are usually expressed in terms of fractional derivatives, which have no obvious physical interpretation.

Denition 2. dened as

Caputo derivative C

: For

n − 1 ≤ α < n,

1 D f (x) = Γ(n − α)

ˆx

α

0

the

αth

derivative of

f

is

f (n) (t) dt. (x − t)α−n+1

Key words and phrases. fractional derivative, Canavati-type denition, Caputo-type denition, fractional dierential equations. 1

597

AMMAR KHANFER 597-603

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A COMPARISON BETWEEN CAPUTO AND CANAVATI FRACTIONAL DERIVATIVES

2

One of the advantages of this derivative, is that taking the Laplace transform n ∑ C α α gives: L{ D f } = S F (s) − sα−k f (k−1) (0), i.e., the initial conditions are exk=1 pressed in terms of derivatives of integer order, which is fortunate to the physicists and engineers in their applications.

However, the following are the major issues

with the Caputo derivative: (1) The Caputo denition nds the for

α < n,

αth

derivative in terms of the

nth

derivative

i.e. we need to obtain the higher order derivatives in order to

obtain the lower derivatives, which is the backward direction opposite to the natural process of dierentiation. This also presumes the n- dierentiability th of f , so if n − 1 < α < n then f needs to be n dierentiable in order to th be α dierentiable. C 0 (2) It's not always correct that D f (x) = f (x), unless f (0) = 0. For example, C 0 2 2 D (x + 1) = x . This is due to the fact that the Caputo derivative obeys C α the formula lim D f = f (n−1) (t)−f (n−1) (0) for any n−1 < α < n ∈ N. α→n−1 Nevertheless, subtracting from the function the value of the function at the lower terminal means that the function can be recovered with a dierence by a constant term. C α D 1 = 0 for all α ≥

(3)

not the case for

Denition 3. α < n.

. Let

αth



(2.1)

where

f

Although this may be fortunate when

Canavati derivative

Then the

(n−1)

0. α < 1.

derivative of

n≥1

1 d D f (x) = Γ(n − α) dx th

be an integer number, and

it's

n−1≤

is given by

ˆx

α

(n − 1)

is the

f (x)

α ≥ 1,

derivative of

0

f.

f (n−1) (t) dt, (x − t)α−n+1 In the next section we will see that

this denition overcomes all the aforementioned issues. 3.

Properties

We state some results that discuss properties and relations between the three types of derivatives.

Proposition 4. (1)



(2)



Proof. If both

Assume that f has sucient regularity on [a, b]. Then

Dα 1 = 0 for all α ≥ 1. d C α ( D f (x)). Dα (f ′ (x)) = dx

Dα f

and

C

(3.1)

Dα f

C

exist, then is well known in the literature that

Dα f (t) = Dα f (t) −

n−1 ∑ k=0

for



Immediate consequence from the denitions of derivatives.

n−1 ≤ α < n

and

t > 0.

tk−α f (k) (0), Γ(k + 1 − α)

The proof can be found in [8] and [10]. Formula (4.1)

shows that the R-L derivative and Caputo derivative are identical if the derivatives th of the function up to (n − 1) derivative are vanished at zero or whatever the lower

598

AMMAR KHANFER 597-603

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A COMPARISON BETWEEN CAPUTO AND CANAVATI FRACTIONAL DERIVATIVES

3

terminal of the denition is. The next result gives a simple sucient condition for the existence of Canavati derivative and it's connection with the Caputo derivative.

Let n − 1 ≤ α < n and f ∈ A f exist a.e., and

Theorem 5.

and

C

D

α

n



(3.2)

Proof.

Dα f (x) = [0, b], then

Let

uous on

Dα f (x) =C Dα f (x) +



1 d Γ(n−α) dx

d 1 D f= Γ(n − α) dx

(n−1)

(0)

exists. Then



Dα f

f (n−1) (0) 1 · α−n+1 . Γ(n − α) x

´x

f (n−1) (t) dt. Since 0 (x−t)α−n+1

ˆx

α

with f

[0, b]

f (n−1 )

is absolutely contin-

ˆt [f

(n−1)

f (n) (u)du](x − t)n−α−1 dt

(0) +

0

0

But this is just equal to



1 f (n−1) (0) 1 d D f= + α−n+1 Γ(n − α) x Γ(n − α) dx

ˆx ˆt f (n) (u)(x − t)n−α−1 dudt.

α

0

0

Interchanging the order of integration using Fubini's theorem, this gives



1 f (n−1) (0) 1 d D f= + Γ(n − α) xα−n+1 Γ(n − α) dx

ˆx ˆx f (n) (u)(x − t)n−α−1 dtdu.

α

=

1 f (n−1) (0) 1 d + α−n+1 Γ(n − α) x Γ(n − α) dx

0

u

ˆx f (n) (u) 0

(x − u)n−α dtdu. n−α

We then use Leibniz integral formula in the integral or results from classical



measure theory, and this completes the proof.

An immediate corollary which can be proved using (4.1) and (4.2) is the following.

Corollary 6.

Let n − 1 ≤ α < n. Then ⋆

(3.3)

D f (t) = D f (t) − α

α

n−2 ∑ k=0

Example 7.

tk−α f (k) (0). Γ(k + 1 − α)

f (x) = x + x + 1. Then f ′ (x) = 2x + 1. Consider the following C 1/2 two cases: First, let α = 1/2, then n = 1. We calculate D f using each one x ´ 2t+1 1 C 1/2 of the denitions, we get D f = Γ(1/2) (x−t)1/2 dt. Performing integration by Let

2

0

√ 1 8 3/2 parts, gives √ ·(2 x+ x ). Similarly, K D1/2 f 3 π

=

1 d Γ(1/2) · dx

´x 0

t2 +t+1 dt (x−t)1/2

= D1/2 f.

√ 1/2 8 3/2 1 Performing integration by parts gives: √ .(2 x+ x + √1x ) = DC f + √1πx . Note 3 π (n−1) f (0) 1 that the second term is in the form of Γ(n−α) · xα−n+1 which is indeed the second th term in (3.2). Let α = 3/2. We calculate the α derivative of f using all three

599

AMMAR KHANFER 597-603

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A COMPARISON BETWEEN CAPUTO AND CANAVATI FRACTIONAL DERIVATIVES

4

√ √ 4 x 4 x 1 √ 1 √ x−3/2 K α α denitions, we obtain D f = Γ(1/2) + Γ(1/2) x + Γ(−1/2) , D f = Γ(1/2) + Γ(1/2) x , √ 4 x C α . It's clear that all three derivatives satisfy (3.1) and (3.2). and D f = Γ(1/2) Another property that needs to be discussed is the compatibility condition. The Dα f (x) → f (n) (x) as α → n for any α ≥ 0. If n = 0 then the 0 condition reduces to the identity condition: D f (x) → f (x) as α ↓ 0. The property condition reads:

is essential in the theory as it demonstrates that the fractional derivative is the natural extension of the classical derivative.

Let f be such that D

Theorem 8.

α

f (x)

exists, and n − 1 ≤ α < n. Then

lim C Dα f (x) = f (n) (x), and lim C Dα f (x) = f (n−1) (x) α→n α→n−1 ⋆ α (n) (2) lim D f (x) = f (x), and lim ⋆ Dα f (x) = f (n−1) (x). α→n α→n−1 (1)

Proof.

− f (n−1) (0).

For (1) see [7] or [8]. To prove (2), we perform integration by parts in the ⋆ α D to obtain

denition of

(3.4)



1 d D f (x) = [(n − α) · f (n−1) (0) · xn−α−1 + Γ(n − α + 1) dx

ˆx

α

Take

α → n,

we get

lim ⋆ Dα f (x) α→n Also, take

0

f (n) (t) dt. (x − t)α−n

α→n−1 ⋆

d (n) [f (x) − f (n−1) (0)] = f (n) (x). dx

=

in (3.4) to get

α

D f (x) = f

(n−1)

d (0) + dx

ˆx (x − t)f (n) (t)dt. 0

Perform integration by parts in the integral in the right hand side of the equation, then dierentiate with respect to

x



gives the result.

The theorem shows that the R-L and Canavati denitions works better than the Caputo type in terms of backward compatibility.

Denition 9. some

r ∈ R,

r be a function, and D be a derivative operator. If D f = 0 for r r0 r then we say that D is an  f − . If D f = 0 and D f ̸= 0 Let

f

annihilator the least order of annihilator of least order

for every r < r0 , then the number r and D 0 is called:  f −

r0

is called: 

f−

.

annihilator

The following theorem discusses the least order of an annihilator.

Theorem 10.



.

D f ̸= 0 α

Proof.

Let f ∈ C and n − 1 ≤ α < n. If f n

Suppose on the contrary that

ˆx (3.5)

0



Dα f ≡ 0.

(n−1)

̸= 0

, and f

(n)

= 0,

,

then

Then

f (n−1) (t) dt = c (x − t)α−n+1

600

AMMAR KHANFER 597-603

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A COMPARISON BETWEEN CAPUTO AND CANAVATI FRACTIONAL DERIVATIVES for some constant

c ∈ R.

Performing integration by parts, and taking into account (n−1) (0)xn−α (t) ≡ 0, we obtain f n−α = c, which is impossible unless f (n−1) (0) = (n−1) but this implies from (3.5) that f ≡ 0, contradicting the fact that

(n)

f c = 0, f (n−1) ̸= 0.

that

5



Example 11.

Let

f (x) = 1.

Then

√1 , but C D 1/2 1 = 0. Let πx δ δ−1 . Taking the limit as Γ(δ+1) t

D1/2 1 =⋆ D1/2 1 =

1 δ−1 t = α = 1−δ, for some δ > 0. Then ⋆ D1−δ 1 = Γ(δ) ⋆ 1 δ ↓ 0, we obtain D 1 = 0. So, the order 1 serves as the least order of f −annihilator. C α Recall that D 1 = 0, and ∗ D3/2 1 =C D3/2 1 = 0, while D3/2 1 = 2√−1 for the πx3/2 R-L type. Theorem 10 shows that in the



D

case, the least order of a function annihilator

cannot be noninteger, so it must be of integer order. This is not the case in the Caputo type. Another result that supports this idea is the following:

Let f ∈ C [a, b], f be integrable, and n − 1 ≤ α < n. Then D f (x)(0) = 0 if and only if f Proof. D f (x)(0) = 0 Theorem 12. Let



n



α



exists on [a, b] for

Dα f (x) (0) = 0.

(n−1)

. Multiply both sides of (3.4) by

f (n−1) (0) xα−n+1 d + Γ(n − α) Γ(n − α + 1) dx

0= Letting

(n)

α

x→0

ˆx 0

xα−n+1

f (n) (t) dt. (x − t)α−n

f (n−1) (0) = 0. For the other direction, (3.4) and taking x → 0 gives the result.

gives

Then substituting in

we obtain

let

f (n−1) (0) = 0. 

α The corresponding result for the R-L type is that D f (x)(0) = 0 if and only (k) if f (0) = 0 for k = 0, 1, · · · , n − 1 (See [11] for the details of the proof ). This explains why the derivative of a nonzero constant function is not zero in the R-L type. 4.

Applications to FDEs Eα,β (t) =

The Mittag-Leer function is dened to be

∞ ∑

tk Γ(αk+β) . The follow-

k=0 ing is well known in the literature (See for example [7], [8], [10], [11], or [12]) α−1 L−1 { ssα −λ } = Eα,1 (λtα ), from which one can derive the following

sα−β } = tβ−1 Eα,β (λtα ). sα − λ L{f (x); s} = F (s). L−1 {

(4.1)

Proposition 13.

Let

Then

L{⋆ Dα f } = S α F (s) −

n−1 ∑

sα−k f (k−1) (0).

k=1

Proof.

Let

g(x) =

´x

f (n−1) (t) · (x − t)n−α−1 dt.

Taking the Laplace transform of

g

0

(n−1) gives: L{g(x)} = L{f (x)} · L{xn−α−1 }. Applying the n−Laplacian transform th n−α−1 for n derivative function, and the fact that L{t } = Γ(n−α) sn−α , we obtain (4.2)

L{g ′ (x)} = sL{g(x)} − g(0) = sα F (s) − sα−1 f (0) − · · · sα−n+1 f (n−2) (0).

601

AMMAR KHANFER 597-603

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A COMPARISON BETWEEN CAPUTO AND CANAVATI FRACTIONAL DERIVATIVES Performing the calculations, taking into account that

g(0) = 0,

6

we obtain the



result. It is worth mentioning the following two observations. (1) To nd a solution of a fractional initial value problem of order

n−1

and

n

using the Laplace transform, we need

n−1

α

between

conditions to

perform the Canavati derivative while n conditions is required to perform C α α Caputo derivative. Let 1 < α < 2, then we obtain L{ D f } = s F (s) − α−1 α−2 ′ ⋆ α α α−1 s f (0) − s f (0), and L{ D f } = s F (s) − s f (0). This shows that ′ the Laplace transform for both denitions coincide when f (0) = f (0) = 0. Otherwise, we need two conditions for the Caputo and one condition for Canavati denition. This gives two fundamental solutions for the Caputo type and only one solution for Canavati type for the case 1 < α < 2. This is ⋆ α C α due to the fact that D 1 ̸= 0 and D 1 = 0. This shows that we need less conditions to employ the Canavati denition. In fact, we need no conditions

0 < α < 1. n − 1 < α < n then according

for the case (2) If

to Theorem 8 we can study convergence of

not α → n − 1. In case of Canavati ⋆ α derivative, we can study convergence for α → n − 1 so that L{ D f } → ⋆ n−1 L{ D f }. The advantage of Canavati derivative comes from the fact the Caputo solution in the case

α → n,

that we cannot study convergence of the Caputo solution when

α → 0.

For the sake of simplicity, we denote the solution to a fractional dierential equation C by yf , the solution with respect to Caputo type by yf , and the solution with ⋆ respect to Canavati type by yf .

Example 14.

Let

D4/3 y = 0, y(0) = 1.

Applying the Laplace transform for the 1 Canavati denition, making use of (4.1), we obtain Y (s) = s from which we get ⋆ yf (t) = 1. To apply the Caputo derivative we need another initial condition, say t−1/3 y ′ (0) = 1. Then y(t) = Γ(−1/3) + 1. In general, let Dα y = 0 for 1 < α < 2. Then ⋆ yf (t) = 1 and C yf (t) = t + 1. As shown above, Theorem 8 suggests that letting α → 1 won't lead to a convergence of C yf (t) to the solution of the classical equation y ′ = 0. If ⋆ Dα y = 0 for 0 < α < 1, then sα Y = 0, which implies that ⋆ yf (t) = 0. α α−1 For the Caputo type we need the condition y(0) = 1, then we have s Y − s = 0, C which implies that yf (t) = 1. The Canavati solution in the 0 < α < 1 case doesn't require any initial conditions.

Example 15.

Let

Example 16.

Consider the fractional equation

Dα y = λy

y(0) = a for 0 < α < 1. Applying Laplace sα−1 C transform for the Caputo type we have Y (s) = c α yf (t) = s −λ . Thus we have α a.Eα,1 (λt ), where E is the Mittag-Leer function. Taking α → 1 for the Caputo C case, we get yf → y where y is the solution to the classical equation y ′ = λy. Theorem 8 won't allow the convergence α → 0. Now we apply the Laplace transform ⋆ th for Canavati type to get yf (t) = 0. This shows that no function can be the α derivative of itself for any α < 1 in Canavati type. Let α → 0, we get the algebraic equation y = λy which has the solution y = 0 as well. and

with the zeroth initial conditions.

Dα y + y = xe−x

for

1 < α < 2

Applying Laplace transform for the Canavati

type and then taking the Laplace inverse gives

602

AMMAR KHANFER 597-603

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A COMPARISON BETWEEN CAPUTO AND CANAVATI FRACTIONAL DERIVATIVES

7

´x

K(x − t)te−t dt, where K(x) = xα−1 Eα,α (−xα ), which is in full 0 agreement with the result with respect to the R-L derivative shown by [13]. Now ⋆

yf (x) =

consider the nonhomogeneous problem, i.e. the same equation with y(0) = a and ´x y ′ (0) = b. We obtain ⋆ yf (x) = a.Eα,1 (−xα ) + 0 K(x − t)te−t dt, where K(x) = xα−1 Eα,α (−xα ). To study convergence, let α → 1, then K(x) → e−x , which implies x2 −x +ae−x which is the solution to the classical dierential equation that yf (x) → 2 e ′ −x ⋆ y + y = xe . Let α → 2 then initial conditions to get yf (x) = ´ x we use both α α −t a.Eα,1 (−x ) + bx.Eα,2 (−x ) + 0 K(x − t)te dt, ´ x −t and so K(x) → sin x, and yf (x) → a cos x + b sin x + te sin(x − t)dt, which 0 is the solution to the corresponding classical equation of order 2.

References [1] G.A. Anastassiou, Fractional Dierentiation Inequalities, Research Monograph, Springer, New York, 2009. [2] G.A. Anastassiou, On Right Fractional Calculus, Chaos, Solitons and Fractals, 42, 365-376, 2009. [3] G.A. Anastassiou, Intelligent Comparisons: Analytic Inequalities, Springer International Publishing, 2015. [4] M. Andric, J. Pecaric, and I. Peric, Improvements of composition rule for the Canavati fractional derivatives and applications to Opial-type inequalities, Dynamic Systems and Applications, 20, 383-394, 2011 [5] M. Andric, J. Pecaric, and I. Peric, General multiple Opial-type inequalities for the Canavati fractional derivatives, Ann. Funct. Anal, 4 (1), 149-162, 2013. [6] J.A. Canavati, The Riemann-Liouville Integral, Nieuw Archief Voor Wiskunde, 5 (1), 53-75, 1987. [7] K. Diethelm, The Analysis of Fractional Dierential Equations, Springer-Verlag Berlin Heidelberg, 2010. [8] M. K. Ishteva, L Boyadjiev, R Scherer, On the Caputo operator of fractional calculus and C-Laguerre functions, Mathematical Sciences Research Journal , 9 (6), 161, 2005. [9] A. A. Kilbas, H. Srivastava, J. Trujillo, Theory and Applications of Fractional Dierential Equations, Elsevier, 2006. [10] Y Luchko, R Goreno, An operational method for solving fractional dierential equations with the Caputo derivatives, Acta Mathematica Vietnamica, 24 (2), 207-233, 1999. [11] I Podlubny, Fractional Dierential Equations, Academic Press, San Diego-Boston-New YorkLondon-Tokyo-Toronto, 1999. [12] V. V. Uchaikin, Fractional Derivatives for Physicists and engineers I: Background and Theory, Higher Education Press, Beijing and Springer-Verlag Berlin Heidelberg, 2013. Al-Imam University, Department of mathematics and statistics, Al-Riyadh, Saudi Arabia.

E-mail address : [email protected].

603

AMMAR KHANFER 597-603

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On the Asymptotic Behavior Of Some Nonlinear Difference Equations A. M. Alotaibi1 , M. S. M. Noorani1 and M. A. El-Moneam2 1 School of Mathematical Sciences, Faculty of Science and Technology, Universiti Kebangsaan Malaysia, Malaysia. 2 Mathematics Department, Faculty of Science, Jazan University, Kingdom of Saudi Arabia. E-mail: [email protected] E-mail: [email protected] E-mail: [email protected] December 30, 2017

Abstract In this paper, some qualitative properties are discussed such as the boundedness, the periodicity and the global stability of the positive solutions of the nonlinear difference equation ym+1 = Aym +

α1 ym−1 + α2 ym−2 + α3 ym−3 + α4 ym−4 + α5 ym−5 , β1 ym−1 + β2 ym−2 + β3 ym−3 + β4 ym−4 + β5 ym−5

where the coefficients A, αi , βi ∈ (0, ∞), i = 1, ..., 5, while the initial conditions y−5 ,y−4 ,y−3 ,y−2 , y−1 , y0 are arbitrary positive real numbers. Some numerical examples will be given to illustrate our results.

Keywords and Phrases: Difference equations, prime period two solution, boundedness character, locally asymptotically stable, global attractor, global stability, high orders. AMS subject classifications:39A10,39A11,39A99,34C99.

1

Introduction

The study of difference equations is a diverse field that affects most aspects of mathematics including both applied and pure. Every dynamical system an+1 = f (an ) determines a difference equation and vice versa. 1

604

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Recently, there has been a significant increase in the study of difference equation. One of the reasons for this is a necessity for some techniques which can be used in investigating equations arising in mathematical models describing real life situations in population biology, economic, probability theory, genetics and psychology [2,3,21,24]. Note that most of these equation often show increasingly complex behavior such as the existence of a bounded. In particular, there has been a huge development in studying of the boundedness character, the global attractivity and the periodicity nature of nonlinear difference equations. For example, in the articles [1, 6–9], closely related global convergence results were obtained which can be applied to nonlinear difference equations in proving that every solution of these equations converges to a period two solution. For other closely related results, (see [10–15 ]) and the references are cited therein. The study of these equations is challenging and rewarding and still actively investigated by researchers. Note that these results for nonlinear difference equations can be used to prove similar results for the case of non-linear rational difference equations. The main focus of this article is to discuss some qualitative behavior of the solutions of the nonlinear difference equation ym+1 = Aym +

α1 ym−1 + α2 ym−2 + α3 ym−3 + α4 ym−4 + α5 ym−5 , β1 ym−1 + β2 ym−2 + β3 ym−3 + β4 ym−4 + β5 ym−5

m = 0, 1, 2, ...,

(1.1) where the coefficients A, αi , βi ∈ (0, ∞), i = 1, ..., 5, while the initial conditions y−5 ,y−4 ,y−3 ,y−2 , y−1 , y0 are arbitrary positive real numbers. Note that the special case of Eq.(1.1) has been discussed in [4] when α3 = β3 = α4 = β4 = α5 = β5 = 0 and Eq.(1.1) has been studied in [8] in the special case when α4 = β4 = α5 = β5 = 0 and Eq.(1.1) has been discussed in [5] in the special case when α5 = β5 = 0. Aboutaleb et al. [1] studied the global attractivity of the positive equilibrium of the rational recursive equation ym+1 =

A − βym , P + ym−1

m = 0, 1, 2, ...,

where the coefficients A, β, P are non-negative real numbers. E. M. Elabbasy et al. [2] investigated the periodic character and the global stability of all positive solutions of the equation ym+1 = aym −

bym , cym − dym−1

m = 0, 1, 2, ...,

2

605

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

where the parameters a, b, c and d and the initial conditions y−1 , y0 are positive real numbers. E. M. Elabbasy et al. [3] investigated the periodic character and the global stability of all positive solutions of the equation ym+1 =

αym−l + βym−k , Aym−l + Bym−k

m = 0, 1, 2, ...,

where the parameters α, β, A and B are positive real numbers and the initial conditions y−r ,y−r+1 , ..., y−1 and y0 ∈ (0, ∞) where r = max {l, k} . Li and Sun [7] investigated the periodic character and the global stability of all positive solutions of the equation ym+1 =

pym + ym−k , q + ym−k

m = 0, 1, 2, ...,

where the parameters p and q and the initial conditions y−k ,..., y−1 , y0 are positive real numbers, k = {1, 2, 3, ...} . M. Saleh et al. [9] investigated the periodic character and the global stability of all positive solutions of the equation ym+1 =

βym + γym−k , Bym + Cym−k

m = 0, 1, 2, ...,

where the parameters β, γ and B, C and the initial conditions y−k ,..., y−1 , y0 are positive real numbers, k = {1, 2, 3, ...} . Our main current objective is to examine the behavior of the solutions of Eq.(1.1) (for related work, (see [16-25])). Definition 1 Let H : V k+1 → V, where H is a continuously differentiable function. Then, for every set of initial conditions y−k ,y−k+1 , ..., y−1 , y0 ∈ V, the difference equation of order (k + 1) is an equation of the form ym+1 = H(ym , ym−1 , ...., ym−k ),

m = 0, 1, 2, ...

(1.2)

and it has a unique solution {ym }∞ e of Eq.(1.2) is m=−k . An equilibrium point y a point that satisfies the condition ye = H (e y , ye, ...., ye) . That is, the constant sequence {ym } with ym = ye f or all m ≥ 0 is a solution of Eq.(1.2) or equivalently, ye is a fixed point of H.

3

606

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Definition 2 Let ye ∈ V, be an equilibrium point of Eq.(1.2). Then, we have (i) An equilibrium point ye of Eq.(1.2) is called locally stable if for every ε > 0 there exists δ > 0 such that, if y−k ,y−k+1 , ..., y−1 , y0 ∈ V with |y−k − ye| + |y−k+1 − ye| + ... + |y−1 − ye| + |y0 − ye| < δ, then |ym − ye| < ε for all m ≥ −k. (ii) An equilibrium point ye of Eq.(1.2) is called locally asymptotically stable if it is locally stable and there exists γ > 0 such that, if y−k ,y−k+1 , ..., y−1 , y0 ∈ V with |y−k − ye| + |y−k+1 − ye| + ... + |y−1 − ye| + |y0 − ye| < γ, then lim ym = ye.

m→∞

(iii) An equilibrium point ye of Eq.(1.2) is called a global attractor if for every y−l , ...,y−k , ..., y−1 , y0 ∈ (0, ∞) we have lim ym = ye.

m→∞

(iv) An equilibrium point ye of Eq.(1.2) is called globally asymptotically stable if it is locally stable and a global attractor. (v) An equilibrium point ye of Eq.(1.2) is called unstable if it is not locally stable. Definition 3 A sequence {ym }∞ m=−k is said to be periodic with period r if ym+r = ym for all m ≥ −p. A sequence {ym }∞ m=−k is said to be periodic with prime period r if r is the smallest positive integer having this property. Definition 4 Eq.(1.2) is called permanent and bounded if there exists numbers n and N with 0 < n < N < ∞ such that for any initial conditions y−k ,y−k+1 , ..., y−1 , y0 ∈ V there exists a positive integer M which depends on these initial conditions such that n ≤ ym ≤ N

f or all

m ≥ M.

Definition 5 The linearized equation of Eq.(1.2) about the equilibrium point ye is defined by the equation zm+1 = ρ0 zm + ρ1 zm−1 + ρ2 zm−2 + ρ3 zm−3 + ... = 0,

(1.3)

where ∂H(e y , ye, ..., ye) ∂H(e y , ye, ..., ye) ∂H(e y , ye, ..., ye) ∂H(e y , ye, ..., ye) ρ0 = , ρ1 = , ρ2 = , ρ3 = , ... ∂ym ∂ym−1 ∂ym−2 ∂ym−3 4

607

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Theorem 1 ([6]). Assume that pi ∈ R, i = 1, 2, ..., k . Then, k X

|pi | < 1,

(1.4)

i=1

is a sufficient condition for the asymptotic stability of the difference equation ym+k + p1 ym+k−1 + ..... + pk ym = 0,

m = 0, 1, 2, ....

(1.5)

Theorem 2 ([6]). Let H : [a, b]k+1 → [a, b] be a continuous function, where k is a positive integer, and where [a, b] is an interval of real numbers. Consider the difference equation (1.2). Suppose that H satisfies the following conditions: 1. For each integer i with 1 ≤ i ≤ k + 1; the function H(z1 , z2 , ..., zk+1 ) is weakly monotonic in zi for fixed z1 , z2 , ..., zi−1 , zi+1 , ..., zk+1 . 2. If (d, D) is a solution of the system d = H(d1 , d2 , ..., dk+1 )

and

D = H(D1 , D2 , ..., Dk+1 ),

then d = D, where for each i = 1, 2, ..., k + 1, we set  d if F is non − decreasing in zi di = D if F is non − increasing in zi and

 Di =

D if F is non − decreasing in zi d if F is non − increasing in zi .

Then there exists exactly one equilibrium ye of Eq.(1.2), and every solution of Eq.(1.2) converges to ye.

2

The local stability of the solutions

In this section, the local stability of the solutions of Eq.(1.1) is investigated. The equilibrium point ye of Eq.(1.1) is the positive solution of the equation P5

ye = Ae y + Pi=1 5

αi

i=1 βi

.

(2.6)

5

608

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Then, the only positive equilibrium point ye of Eq.(1.1) is given by P5 αi i=1  , ye = P5 (1 − A) i=1 βi

(2.7)

provided that A < 1. Now, let us introduce a continuous function (0, ∞)6 −→ (0, ∞) which is defined by P5

H(u0 , ..., u5 ) = Au0 + Pi=1 5

(αi ui )

i=1 (βi ui )

H :

.

(2.8)

Therefore, it follows that  H(u0 ,...,u5 ) = A,   ∂u0     P P   α1 [ 5i=2 (βi ui )] − β1 [ 5i=2 (αi ui )]  H(u0 ,...,u5 )  = ,  P 2  ∂u1  ( 5i=1 (βi ui ))      P P   α2 [β1 u1 + 5i=3 (βi ui )] − β2 [α1 u1 + 5i=3 (αi ui )] H(u0 ,...,u5 )   , = P  2 ∂u2  ( 5i=1 (βi ui ))                            

H(u0 ,...,u5 ) ∂u3

=

α3

H(u0 ,...,u5 ) ∂u4

P2

[

i=1 (βi ui )+

P5

P2 P5 i=4 (βi ui ) − β3 i=1 (αi ui )+ i=4 (αi ui ) P5 2 i=1 (βi ui )

]

(

=

α4

H(u0 ,...,u5 ) ∂u5

[

P3

]

P3 i=1 (βi ui )+β5 u5 − β4 i=1 (αi ui )+α5 u5 P5 2 (β u ) i=1 i i

]

(

=

[ )

α5

P4

[

[ )

P4 i=1 (βi ui ) − β5 i=1 (αi ui ) P5 2 (β u ) i i i=1

]

(

[ )

]

]

. ,

,

,

6

609

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Consequently, we get  ∂H(e y ,...,e y) = A = − ρ5 ,   ∂u0      P5 P5  (1−A)[α1 (  ∂H(e y ,...,e y) i=2 βi ) − β1 ( i=2 αi )]  P P = − ρ4 , =  5 5  ∂u1 αi )( βi ) (  i=1 i=1      P P5   (1−A)[α2 ( β1 + 5i=3 βi ) − β2 (α1 + ∂H(e y ,...,e y) i=3 αi )]  P P  = = − ρ3 , 5 5  ∂u2 α β  ( )( ) i i i=1 i=1                          

∂H(e y ,...,e y) ∂u3

=

(1−A)[α3

∂H(e y ,...,e y) ∂u4

(

i=1

(1−A)[α4

=

∂H(e y ,...,e y) ∂u4

=

P P5 P βi + 5i=4 βi ) − β3 ( 2i=1 αi + i=4 αi )] P5 P5 ( i=1 αi )( i=1 βi )

P2

(β5 + 3i=1 βi ) P ( 5i=1 αi )( P

(1−A)[α5

(

(α5 + β i=1 i )

− β4 P5

P5

i=3

P P ( 4 βi ) − β5 ( 4i=1 αi )] P5 i=1 P5 i=1 αi )( i=1 βi )

αi )]

= − ρ2 ,

= − ρ1 ,

= − ρ0 . (2.9)

Hence, the linearized equation of Eq.(1.1) about ye takes the form ym+1 + ρ5 ym + ρ4 ym−1 + ρ3 ym−2 + ρ2 ym−3 + ρ1 ym−4 + ρ0 ym−5 = 0,

(2.10)

where ρ0 , ρ1 , ρ2 , ρ3 , ρ4 and ρ5 are given by (2.9). The characteristic equation associated with Eq.(2.10) is λ6 + ρ5 λ5 + ρ4 λ4 + ρ3 λ3 + ρ2 λ2 + ρ1 λ + ρ0 = 0, Theorem 3 Let A < 1 and ! ! 5 5 X X βi − β1 αi + α2 α 1 i=2

α3

+ α 5

β1 +

i=2

2 X i=1

βi +

5 X

! βi

− β3

i=4

! 3 X + α 4 β 5 + βi − β4 i=1 ! ! 4 4 X X βi − β5 αi < i=1

i=1

5 X

! βi

− β2

i=3

α1 +

5 X i=3

! 2 5 X X αi + αi i=1 i=4 ! 5 X α5 + αi i=3 ! ! 5 5 X X αi βi , i=1

(2.11)

! αi +

(2.12)

i=1

then the positive equilibrium point (2.7) of Eq.(1.1) is locally asymptotically stable. 7

610

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

proof: It follows by Theorem 1 that Eq.(2.10) is asymptotically stable if P all roots of Eq.(2.11) lie in the open disk is |λ| < 1 that is if 5i=0 |pi | < 1, i  P h P 5 5 (1 − A) α α β − β i i 1 1 i=2 i=2   P P |A| + 5 5 i=1 βi i=1 αi h    i P P5 (1 − A) α β1 + 5i=3 βi − β2 α1 + 2 i=3 αi P  P  + 5 5 α β i=1 i i=1 i h P  P i P5 P5 2 2 (1 − A) α β + β − β α + α 3 i i 3 i i i=1 i=4 i=1 i=4 P  P  + 5 5 i=1 αi i=1 βi h    i P3 P5 (1 − A) α β + β − β α α + 4 5 4 5 i=1 i i=3 i , P  P  + 5 5 α β i=1 i i=1 i h P  P i 4 4 (1 − A) α β − β α 5 i 5 i i=1 i=1 < 1. P  P  + 5 5 i=1 αi i=1 βi and so

h P  P i 5 5 (1 − A) α − β1 1 i=2 βi i=2 αi P  P  5 5 α β i=1 i i=1 i i   h  P5 P (1 − A) α α β1 + 5i=3 βi − β2 α1 + i 2 i=3 P  P  + 5 5 i=1 αi i=1 βi h P  P i P5 P5 2 2 (1 − A) α β + β − β α + α 3 3 i=1 i i=4 i i=1 i i=4 i P  P  + 5 5 α β i i i=1 i=1 h    i P P5 (1 − A) α β5 + 3i=1 βi − β4 α5 + α 4 i i=3 , P  P  + 5 5 i=1 αi i=1 βi h P  P i 4 4 (1 − A) α β − β α 5 5 i=1 i i=1 i (1 − A) , P  P  + A < 1, 5 5 α β i i i=1 i=1 8

611

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

or α1

5 X

! βi

− β1

5 X i=2

i=2

α 3

! αi + α2

β1 +

5 X

! βi

− β2

α1 +

5 X i=3

i=3

! αi +

! 2 2 5 5 X X X X βi + αi + βi − β3 αi i=1 i=1 i=4 i=4 ! ! 5 3 X X αi + α4 β5 + β i − β 4 α5 + i=1 i=3 ! ! ! ! 4 4 5 5 X X X X + α 5 βi − β5 αi < αi βi . !

i=1

i=1

i=1

i=1

Thus, the proof is complete.

3

Boundedness of the solutions

In this section, the boundedness of the positive solutions of Eq.(1.1) is determined. Theorem 4 Every solution of Eq.(1.1) is bounded if A < 1. proof Let {ym }∞ m=−5 be a solution of Eq.(1.1). It follows from Eq.(1.1) that α1 ym−1 + α2 ym−2 + α3 ym−3 + α4 ym−4 + α5 ym−5 β1 ym−1 + β2 ym−2 + β3 ym−3 + β4 ym−4 + β5 ym−5 α1 ym−1 = Aym + β1 ym−1 + β2 ym−2 + β3 ym−3 + β4 ym−4 + β5 ym−5 α2 ym−2 + β1 ym−1 + β2 ym−2 + β3 ym−3 + β4 ym−4 + β5 ym−5 α3 ym−3 + β1 ym−1 + β2 ym−2 + β3 ym−3 + β4 ym−4 + β5 ym−5 α4 ym−4 + β1 ym−1 + β2 ym−2 + β3 ym−3 + β4 ym−4 + β5 ym−5 α5 ym−5 + . β1 ym−1 + β2 ym−2 + β3 ym−3 + β4 ym−4 + β5 ym−5

ym+1 = Aym +

Then ym+1 ≤ Aym +

α1 ym−1 α2 ym−2 α3 ym−3 α4 ym−4 α5 ym−5 + + + + = β1 ym−1 β2 ym−2 β3 ym−3 β4 ym−4 β5 ym−5 9

612

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Aym +

α1 α2 α3 α4 α5 + + + + β1 β2 β3 β4 β5

f or all

m ≥ 1.

By using a comparison, we can write the right hand side as follows ym+1 = Aym +

α1 α2 α3 α4 α5 + + + + . β1 β2 β3 β4 β5

then ym = am y0 + constant, and this equation is locally asymptotically stable because A < 1, and converges to the equilibrium point ye =

α1 β2 β3 β4 β5 + α2 β1 β3 β4 β5 + α3 β1 β2 β4 β5 + α4 β1 β2 β3 β5 + α5 β1 β2 β3 β4 . β1 β2 β3 β4 β5 (1 − A)

Therefore, lim sup ym ≤

m→∞

α1 β2 β3 β4 β5 + α2 β1 β3 β4 β5 + α3 β1 β2 β4 β5 + α4 β1 β2 β3 β5 + α5 β1 β2 β3 β4 . β1 β2 β3 β4 β5 (1 − A)

Thus, the solution of Eq.(1.1) is bounded and the proof is complete. Theorem 5 Every solution of Eq.(1.1) is unbounded if A > 1. proof: Let {yn }∞ n=−5 be a solution of Eq.(1.1). Then from Eq.(1.1) we see that yn+1 = Ayn +

α1 yn−1 + α2 yn−2 + α3 yn−3 + α4 yn−4 + α5 yn−5 > Ayn β1 yn−1 + β2 yn−2 + β3 yn−3 + β4 yn−4 + β5 yn−5

f or all n ≥ 1.

We can see that the right hand side can be written as follows xn+1 = axn ⇒ xn = an x0 , and this equation is unstable because A > 1, and lim xn = ∞.

n→∞

Then, by using the ratio test {yn }∞ n=−5 is unbounded from above. Thus, the proof is now obtained.

10

613

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

Periodic solutions

The following theorem states the necessary and sufficient conditions for the equation to have periodic solutions of prime period two. Theorem 6 If (α1 + α3 + α5 ) > (α2 + α4 ) and (β1 + β3 + β5 ) > (β2 + β4 ) , then the necessary and sufficient condition for Eq.(1.1) to have positive solutions of prime period two is that the inequality [(A + 1) ((β1 + β3 + β5 ) − (β2 + β4 ))] [(α1 + α3 + α5 ) − (α2 + α4 )]2 +4 [(α1 + α3 + α5 ) − (α2 + α4 )] [(β1 + β3 + β5 ) (α2 + α4 ) + A (β2 + β4 ) (α1 + α3 + α5 )] > 0. (4.13) is valid. proof: Suppose there exist positive distinctive solutions of prime period two ......., P, Q, P, Q, ........ of Eq.(1.1). From Eq.(1.1) we have ym+1 = Aym + P = AQ+

α1 ym−1 + α2 ym−2 + α3 ym−3 + α4 ym−4 + α5 ym−5 β1 ym−1 + β2 ym−2 + β3 ym−3 + β4 ym−4 + β5 ym−5

(α1 + α3 + α5 ) P + (α2 + α4 ) Q , (β1 + β3 + β5 ) P + (β2 + β4 ) Q

Q = AP +

(α1 + α3 + α5 ) Q + (α2 + α4 ) P . (β1 + β3 + β5 ) Q + (β2 + β4 ) P (4.14)

Consequently, we get (β1 + β3 + β5 ) P 2 + (β2 + β4 ) P Q = A (β1 + β3 + β5 ) P Q + A (β2 + β4 ) Q2 + (α1 + α3 + α5 ) P + (α2 + α4 ) Q, (4.15) and (β1 + β3 + β5 ) Q2 + (β2 + β4 ) P Q = A (β1 + β3 + β5 ) P Q + A (β2 + β4 ) P 2 + (α1 + α3 + α5 ) Q + (α2 + α4 ) P. (4.16) By subtracting (4.15) from (4.16), we obtain  [(β1 + β3 + β5 ) + A (β2 + β4 )] P 2 − Q2 = [(α1 + α3 + α5 ) − (α2 + α4 )] (P − Q) . 11

614

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Since P 6= Q, it follows that P +Q=

[(α1 + α3 + α5 ) − (α2 + α4 )] , [(β1 + β3 + β5 ) + A (β2 + β4 )]

(4.17)

while, by adding (4.15) and (4.16) and by using the relation P 2 + Q2 = (P + Q)2 − 2P Q

f or all

P, Q ∈ R,

we have [(α1 + α3 + α5 ) − (α2 + α4 )] [(β1 + β3 + β5 ) (α2 + α4 ) + A (β2 + β4 ) (α1 + α3 + α5 )] [(β1 + β3 + β5 ) + A (β2 + β4 )]2 [((β2 + β4 ) − (β1 + β3 + β5 )) (A + 1)] (4.18) Let P and Q are two distinct real roots of the quadratic equation

PQ =

t2 − ( P + Q) t + P Q = 0. [(β1 + β3 + β5 ) + A (β2 + β4 )] t2 − [(α1 + α3 + α5 ) − (α2 + α4 )] t [(α1 + α3 + α5 ) − (α2 + α4 )] [(β1 + β3 + β5 ) (α2 + α4 ) + A (β2 + β4 ) (α1 + α3 + α5 )] + [(β1 + β3 + β5 ) + A (β2 + β4 )] [((β2 + β4 ) − (β1 + β3 + β5 )) (A + 1)] = 0, (4.19) and so [(α1 + α3 + α5 ) − (α2 + α4 )]2 4 [(α1 + α3 + α5 ) − (α2 + α4 )] [(β1 + β3 + β5 ) (α2 + α4 ) + A (β2 + β4 ) (α1 + α3 + α5 )] > 0, [((β2 + β4 ) − (β1 + β3 + β5 )) (A + 1)] or [(α1 + α3 + α5 ) − (α2 + α4 )]2 −

4 [(α1 + α3 + α5 ) − (α2 + α4 )] [(β1 + β3 + β5 ) (α2 + α4 ) + A (β2 + β4 ) (α1 + α3 + α5 )] > 0. [((β1 + β3 + β5 ) − (β2 + β4 )) (A + 1)] (4.20) From (4.20), we get

+

[((β1 + β3 + β5 ) − (β2 + β4 )) (A + 1)] [(α1 + α3 + α5 ) − (α2 + α4 )]2 +4 [(α1 + α3 + α5 ) − (α2 + α4 )] [(β1 + β3 + β5 ) (α2 + α4 ) + A (β2 + β4 ) (α1 + α3 + α5 )] > 0. Therefore, the condition (4.13) is valid. Alternatively, if we imagine that the condition (4.13) is valid where (α1 + α3 + α5 ) > (α2 + α4 ) and (β1 + β3 + β5 ) > (β2 + β4 ) . Then, we can immediately discover that the inequality stands. 12

615

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

There exist two positive distinctive real numbers P and Q representing two positive roots of Eq.(4.19) such that P =

[(α1 + α3 + α5 ) − (α2 + α4 )] + δ 2 [(β1 + β3 + β5 ) + A (β2 + β4 )]

(4.21)

Q=

[(α1 + α3 + α5 ) − (α2 + α4 )] − δ 2 [(β1 + β3 + β5 ) + A (β2 + β4 )]

(4.22)

and

where

q δ=

[(α1 + α3 + α5 ) − (α2 + α4 )]2 − η,

and η=

4 [(α1 + α3 + α5 ) − (α2 + α4 )] [(β1 + β3 + β5 ) (α2 + α4 ) + A (β2 + β4 ) (α1 + α3 + α5 )] . [((β2 + β4 ) − (β1 + β3 + β5 )) (A + 1)]

Now, let us prove that P and Q are positive solutions of prime period two of Eq.(1.1). To this end, we assume that y−5 = P, y−4 = Q, y−3 = P, y−2 = Q, y−1 = P, y0 = Q. Now, we are going to show that y1 = P and y2 = Q. From Eq.(1.1) we deduce that y1 = Ay0 +

α1 y−1 + α2 y−2 + α3 y−3 + α4 y−4 + α5 y−5 β1 y−1 + β2 y−2 + β3 y−3 + β4 y−4 + β5 y−5

= AQ +

(α1 + α3 + α5 ) P + (α2 + α4 ) Q . (β1 + β3 + β5 ) P + (β2 + β4 ) Q

(4.23)

13

616

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Substituting (4.21) and (4.22) into (4.23) we deduce that y1 − P

(α1 + α3 + α5 ) P + (α2 + α4 ) Q −P (β1 + β3 + β5 ) P + (β2 + β4 ) Q [A (β1 + β3 + β5 ) − (β2 + β4 )]P Q + A (β2 + β4 ) Q2 − (β1 + β3 + β5 ) P 2 = (β1 + β3 + β5 ) P + (β2 + β4 ) Q (α1 + α3 + α5 ) P + (α2 + α4 ) Q + (β1 + β3 + β5 ) P + (β2 + β4 ) Q  

= AQ +

=

[A(β1 +β3 +β5 )−(β2 +β4 )][S1 ][(β1 +β3 +β5 )(α2 +α4 )+A(β2 +β4 ) (α1 +α3 +α5 )] [(β1 +β3 +β5 )+A(β2 +β4 )]2 [((β2 +β4 )−(β1 +β3 +β5 ))(A+1)]

    [(α1 +α3 +α5 )−(α2 +α4 )]−δ 1 +α3 +α5 )−(α2 +α4 )]+δ + (β + β ) (β1 + β3 + β5 ) [(α 2 4 2[(β1 +β3 +β5 )+A(β2 +β4 )] 2[(β1 +β3 +β5 )+A(β2 +β4 )]  2 2  [(α1 +α3 +α5 )−(α2 +α4 )]+δ 1 +α3 +α5 )−(α2 +α4 )]−δ A (β2 + β4 ) [(α − (β + β + β ) 1 3 5 2[(β1 +β3 +β5 )+A(β2 +β4 )] 2[(β1 +β3 +β5 )+A(β2 +β4 )]     + [(α1 +α3 +α5 )−(α2 +α4 )]+δ [(α1 +α3 +α5 )−(α2 +α4 )]−δ (β1 + β3 + β5 ) 2[(β1 +β3 +β5 )+A(β2 +β4 )] + (β2 + β4 ) 2[(β1 +β3 +β5 )+A(β2 +β4 )]     [(α1 +α3 +α5 )−(α2 +α4 )]−δ 1 +α3 +α5 )−(α2 +α4 )]+δ (α1 + α3 + α5 ) [(α + (α + α ) 2 4 2[(β1 +β3 +β5 )+A(β2 +β4 )] 2[(β1 +β3 +β5 )+A(β2 +β4 )]     + [(α1 +α3 +α5 )−(α2 +α4 )]+δ [(α1 +α3 +α5 )−(α2 +α4 )]−δ (β1 + β3 + β5 ) 2[(β1 +β3 +β5 )+A(β2 +β4 )] + (β2 + β4 ) 2[(β1 +β3 +β5 )+A(β2 +β4 )] (4.24)

Multiplying the denominator and numerator of (4.24) by 4 [(β1 + β3 + β5 ) + A (β2 + β4 )]2 we get y1 − P =

4[A(β1 +β3 +β5 )−(β2 +β4 )][S1 ][(β1 +β3 +β5 )(α2 +α4 )+A(β2 +β4 ) (α1 +α3 +α5 )] [((β2 +β4 )−(β1 +β3 +β5 ))(A+1)]

S

A (β2 + β4 ) (S1 − δ)2 − (β1 + β3 + β5 ) (S1 + δ)2 S 2[(β1 + β3 + β5 ) + A (β2 + β4 )] (α1 + α3 + α5 ) (S1 + δ) + S 2[(β1 + β3 + β5 ) + A (β2 + β4 )] (α2 + α4 ) (S1 − δ) + S +

=

4[A(β1 +β3 +β5 )−(β2 +β4 )][S1 ][(β1 +β3 +β5 )(α2 +α4 )+A(β2 +β4 ) (α1 +α3 +α5 )] [((β2 +β4 )−(β1 +β3 +β5 ))(A+1)]

S 2

+

A (β2 + β4 ) [S1 ] − (β1 + β3 + β5 ) [S1 ]2 S +

[A (β2 + β4 ) − (β1 + β3 + β5 )]δ 2 S 14

617

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2[(β1 + β3 + β5 ) + A (β2 + β4 )] (α2 + α4 ) [S1 ] S 2[(β1 + β3 + β5 ) + A (β2 + β4 )] (α1 + α3 + α5 ) [S1 ] + S 2A (β2 + β4 ) [(α1 + α3 + α5 ) − (α2 + α4 )] δ + 2 (β1 + β3 + β5 ) [S1 ] δ − S 2[(β1 + β3 + β5 ) + A (β2 + β4 )] (α1 + α3 + α5 ) δ − 2[(β1 + β3 + β5 ) + A (β2 + β4 )] (α2 + α4 ) δ + S +

=

4[A(β1 +β3 +β5 )−(β2 +β4 )][S1 ][(β1 +β3 +β5 )(α2 +α4 )+A(β2 +β4 )(α1 +α3 +α5 )] [((β2 +β4 )−(β1 +β3 +β5 ))(A+1)]

S −

4[S1 ][(β1 +β3 +β5 )(α2 +α4 )+A(β2 +β4 )(α1 +α3 +α5 )][A(β2 +β4 )−(β1 +β3 +β5 )] [((β2 +β4 )−(β1 +β3 +β5 ))(A+1)]

S A (β2 + β4 ) [S1 ] − (β1 + β3 + β5 ) [S1 ]2 + S [A (β2 + β4 ) − (β1 + β3 + β5 )] [S1 ]2 + S 2[(β1 + β3 + β5 ) + A (β2 + β4 )] (α2 + α4 ) [S1 ] + S 2[(β1 + β3 + β5 ) + A (β2 + β4 )] (α1 + α3 + α5 ) [S1 ] + S 2 [S1 ] [(β1 + β3 + β5 ) + A (β2 + β4 )]δ − S 2 [S1 ] [(β1 + β3 + β5 ) + A (β2 + β4 )]δ + S 2

4 [S1 ] [(β1 + β3 + β5 ) (α2 + α4 ) + A (β2 + β4 ) (α1 + α3 + α5 )] S 4 [S1 ] [(β1 + β3 + β5 ) (α2 + α4 ) + A (β2 + β4 ) (α1 + α3 + α5 )] − S 2[(α1 + α3 + α5 ) − (α2 + α4 )][(β1 + β3 + β5 ) + A (β2 + β4 )]δ − S 2[(α1 + α3 + α5 ) − (α2 + α4 )][(β1 + β3 + β5 ) + A (β2 + β4 )]δ + S = 0.

=

where S = 2 [(β1 + β3 + β5 ) + A (β2 + β4 )] × [(β1 + β3 + β5 ) (S1 + δ) + (β2 + β4 ) (S1 − δ)] 15

618

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

and S1 = [(α1 + α3 + α5 ) − (α2 + α4 )]. Similarly, we can show that y2 = Ay1 +

α1 y0 + α2 y−1 + α3 y−2 + α4 y−3 + α5 y−4 (α1 + α3 + α5 ) Q + (α2 + α4 ) P = AP + = Q. β1 y0 + β2 y−1 + β3 y−2 + β4 y−3 + β5 y−4 (β1 + β3 + β5 ) Q + (β2 + β4 ) P

By using the mathematical induction, we have ym = P Q, m ≥ −5.

5

and ym+1 =

Global stability

In this section, the global asymptotic stability of the positive solutions of Eq.(1.1) is discussed. P5 αi Theorem 7 For any values of the quotient i=1 βi , If A < 1, then the positive equilibrium point ye of Eq.(1.1) is a global attractor and the following conditions hold α1 β2 ≥ α2 β1 , α1 β3 ≥ α3 β1 , α1 β4 ≥ α4 β1 , α1 β5 ≥ α5 β1 , α2 β3 ≥ α3 β2 , α2 β4 ≥ α4 β2 , α2 β5 ≥ α5 β2 , α3 β4 ≥ α4 β3 , α3 β5 ≥ α5 β3 , α4 β5 ≥ α5 β4 and α5 ≥ (α1 + α2 + α3 + α4 ) . (5.25) proof: Let {ym }∞ m=−5 be a positive solution of Eq.(1.1). and let H : 6 (0, ∞) −→ (0, ∞) be a continuous function which is defined by P5 (αi ui ) . H(u0 , ..., u5 ) = Au0 + Pi=1 5 i=1 (βi ui ) By differentiating the function H(u0 , ..., u5 ) with respect to ui (i = 0, ..., 5), we obtain Hu0 = A, (5.26) (α1 β2 − α2 β1 ) u2 + (α1 β3 − α3 β1 ) u3 + (α1 β4 − α4 β1 ) u4 + (α1 β5 − α5 β1 ) u5 , 2 P 5 i=1 (βi ui ) (5.27) − (α1 β2 − α2 β1 ) u1 + (α2 β3 − α3 β2 ) u3 + (α2 β4 − α4 β2 ) u4 + (α2 β5 − α5 β2 ) u5 = , P 2 5 i=1 (βi ui ) (5.28)

Hu1 =

Hu2

16

619

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

− (α1 β3 − α3 β1 ) u1 − (α2 β3 − α3 β2 ) u2 + (α3 β4 − α4 β3 ) u4 + (α3 β5 − α5 β3 ) u4 , P 2 5 (β u ) i=1 i i (5.29) − (α1 β4 − α4 β1 ) u1 − (α2 β4 − α4 β2 ) u2 − (α3 β4 − α4 β3 ) u3 + (α4 β5 − α5 β4 ) u5 = , 2 P 5 (β u ) i=1 i i (5.30)

Hu3 =

Hu4

and − (α1 β5 − α5 β1 ) u1 − (α2 β5 − α5 β2 ) u2 − (α3 β5 − α5 β3 ) u3 − (α4 β5 − α5 β4 ) u4 . P 2 5 i=1 (βi ui ) (5.31) It is observed that the function H(u0 , ..., u5 ) is non-decreasing in u0 ,u1 and non-increasing in u5 . Now, we consider four cases: Case 1. Let the function H(u0 , ..., u5 ) is non-decreasing in u0 ,u1 ,u2 ,u3 ,u4 and non-increasing in u5 . Suppose that (d, D) is a solution of the system

Hu5 =

D = H(D, D, D, D, D, d)

and

d = H(d, d, d, d, d, D).

Then we get D = AD+

α1 d + α2 d + α3 d + α4 d + α5 D α1 D + α2 D + α3 D + α4 D + α5 d and d = Ad+ , β1 D + β2 D + β3 D + β4 D + β5 d β1 d + β2 d + β3 d + β4 d + β5 D

or D (1 − A) =

(α1 + α2 + α3 + α4 ) D + α5 d (α1 + α2 + α3 + α4 ) d + α5 D and d (1 − A) = . (β1 + β2 + β3 + β4 ) D + β5 d (β1 + β2 + β3 + β4 ) d + β5 D

From which we have (α1 + α2 + α3 + α4 ) D+α5 d−(1 − A) (β1 + β2 + β3 + β4 ) D2 = (1 − A) β5 Dd (5.32) and (α1 + α2 + α3 + α4 ) d+α5 D−(1 − A) (β1 + β2 + β3 + β4 ) d2 = (1 − A) β5 Dd (5.33) From (5.32) and (5.33), we obtain (d − D) {[(α1 + α2 + α3 + α4 ) − α5 ] − (1 − A) (β1 + β2 + β3 + β4 ) (d + D)} = 0. (5.34) Since A < 1 and α5 ≥ (α1 + α2 + α3 + α4 ) , we deduce from (5.34) that D = d. It follows by Theorem 2, that ye of Eq.(1.1) is a global attractor. 17

620

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Case 2. Let the function H(u0 , ..., u5 ) is non-decreasing in u0 ,u1 and non-increasing in u2 , u3 , u4 , u5 . Suppose that (d, D) is a solution of the system D = H(D, D, d, d, d, d)

and

d = H(d, d, D, D, D, D).

Then we get D = AD+

α1 D + α2 d + α3 d + α4 d + α5 d α1 d + α2 D + α3 D + α4 D + α5 D and d = Ad+ , β1 D + β2 d + β3 d + β4 d + β5 d β1 d + β2 D + β3 D + β4 D + β5 D

or D (1 − A) =

α1 D + (α2 + α3 + α4 + α5 ) d α1 d + (α2 + α3 + α4 + α5 ) D and d (1 − A) = . β1 D + (β2 + β3 + β4 + β5 ) d β1 d + (β2 + β3 + β4 + β5 ) D

From which we have α1 D+(α2 + α3 + α4 + α5 ) d−β1 (1 − A) D2 = (1 − A) (β2 + β3 + β4 + β5 ) Dd (5.35) and α1 d+(α2 + α3 + α4 + α5 ) D−β1 (1 − A) d2 = (1 − A) (β2 + β3 + β4 + β5 ) Dd. (5.36) From (5.35) and (5.36), we obtain (d − D) {[α1 − (α2 + α3 + α4 + α5 )] − β1 (1 − A) (d + D)} = 0.

(5.37)

Since A < 1 and (α2 + α3 + α4 + α5 ) ≥ α1 , we deduce from (5.37) that D = d. It follows by Theorem 2, that ye of Eq.(1.1) is a global attractor. Case 3. Let the function H(u0 , ..., u5 ) is non-decreasing in u0 ,u1 ,u2 and non-increasing in u3 , u4 , u5 . Suppose that (d, D) is a solution of the system D = H(D, D, D, d, d, d)

and

d = H(d, d, d, D, D, D).

Then we get D = AD+

α1 D + α2 D + α3 d + α4 d + α5 d α1 d + α2 d + α3 D + α4 D + α5 D and d = Ad+ , β1 D + β2 D + β3 d + β4 d + β5 d β1 d + β2 d + β3 D + β4 D + β5 D

or D (1 − A) =

(α1 + α2 ) D + (α3 + α4 + α5 ) d (α1 + α2 ) d + (α3 + α4 + α5 ) D and d (1 − A) = (β1 + β2 ) D + (β3 + β4 + β5 ) d (β1 + β2 ) d + (β3 + β4 + β5 ) D 18

621

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

From which we have (α1 + α2 ) D + (α3 + α4 + α5 ) d−(1 − A) (β1 + β2 ) D2 = (1 − A) (β3 + β4 + β5 ) Dd (5.38) and (α1 + α2 ) d + (α3 + α4 + α5 ) D−(1 − A) (β1 + β2 ) d2 = (1 − A) (β3 + β4 + β5 ) Dd (5.39) From (5.38) and (5.39), we obtain (d − D) {[(α1 + α2 ) − (α3 + α4 + α5 )] − (1 − A) (β1 + β2 ) (d + D)} = 0. (5.40) Since A < 1 and (α3 + α4 + α5 ) ≥ (α1 + α2 ) , we deduce from (5.40) that D = d. It follows by Theorem 2, that ye of Eq.(1.1) is a global attractor. Case 4. Let the function H(u0 , ..., u5 ) is non-decreasing in u0 ,u1 ,u3 and non-increasing in u2 , u4 , u5 . Suppose that (d, D) is a solution of the system D = H(D, D, d, D, d, d)

and

d = H(d, d, D, d, D, D).

Then we get D = AD+

α1 D + α2 d + α3 D + α4 d + α5 d α1 d + α2 D + α3 d + α4 D + α5 D and d = Ad+ , β1 D + β2 d + β3 D + β4 d + β5 d β1 d + β2 D + β3 d + β4 D + β5 D

or D (1 − A) =

(α1 + α3 ) d + (α2 + α4 + α5 ) D (α1 + α3 ) D + (α2 + α4 + α5 ) d and d (1 − A) = (β1 + β3 ) D + (β2 + β4 + β5 ) d (β1 + β3 ) d + (β2 + β4 + β5 ) D

From which we have (α1 + α3 ) D + (α2 + α4 + α5 ) d−(1 − A) (β1 + β3 ) D2 = (1 − A) (β2 + β4 + β5 ) Dd (5.41) and (α1 + α3 ) d + (α2 + α4 + α5 ) D−(1 − A) (β1 + β3 ) d2 = (1 − A) (β2 + β4 + β5 ) Dd (5.42) From (5.41) and (5.42), we obtain (d − D) {[(α1 + α3 ) − (α2 + α4 + α5 )] − (1 − A) (β1 + β3 ) (d + D)} = 0. (5.43) Since A < 1 and (α2 + α4 + α5 ) ≥ (α1 + α3 ) , we deduce from (5.43) that D = d. It follows by Theorem 2, that ye of Eq.(1.1) is a global attractor. It follows by Theorem 2, that ye of Eq.(1.1) is a global attractor and the proof is now completed. 19

622

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

Numerical examples

Some numerical examples are stated in this section in order to strengthen our theoretical results. These examples represent different types of qualitative behavior of solutions of Eq.(1.1). Example 1. Figure 1, shows that the solution of Eq.(1.1) is unbounded if y−5 = 1, y−4 = 2, y−3 = 3, y−2 = 4, y−1 = 5, y0 = 6, A = 1.1, α1 = 10, α2 = 1, α3 = 12, α4 = 4, α5 = 6, β1 = 2, β2 = 3, β3 = 40, β4 = 50, β5 = 60. 8

10

plot of y(n+1)=W*y(n)+(((A*y(n−1)+B*y(n−2)+C*y(n−3)+D*y(n−4)+E*y(n−5))/(a*y(n−1)+b*y(n−2)+c*y(n−3)+d*y(n−4)+e*y(n−5))))

x 10

9

8

solution of y(n+1)

7

6

5

4

3

2

1

0

0

20

40

60

80

Figure 1: (ym+1 = 1.1ym +

100 n−iteration

120

140

160

180

200

10ym−1 +ym−2 +12ym−3 +4ym−4 +6ym−5 2ym−1 +3ym−2 +40ym−3 +50ym−4 +60ym−5 )

solution of y(n+1)=((A*y(n)+B*y(n−1)+C*y(n−2))/(a*y(n)+b*y(n−1)+c*y(n−2)))

Example 2. Figure 2, shows that Eq.(1.1) has prime period two solutions if y−5 = y−3 = y−1 ' 0.519, y−4 = y−2 = y0 ' −0.0938, A = 1, α1 = 10, α2 = 3, α3 = 30, α4 = 8, α5 = 45, β1 = 20, β2 = 5, β3 = 40, β4 = 9, β5 = 100. plot of y(n+1)=((A*y(n)+B*y(n−1)+C*y(n−2))/(a*y(n)+b*y(n−1)+c*y(n−2))) 0.6

0.5

0.4

0.3

0.2

0.1

0

−0.1

1

2

Figure 2: (ym+1 = ym +

3

4

5

6

n−iteration

10ym−1 +3ym−2 +30ym−3 +8ym−4 +45ym−5 20ym−1 +5ym−2 +40ym−3 +9ym−4 +100ym−5 )

20

623

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Example 3. Figure 3, shows that Eq.(1.1) is globally asymptotically stable if y−5 = 1, y−4 = 2, y−3 = 3, y−2 = 4, y−1 = 5, y0 = 6, A = 0.5, α1 = 10, α2 = 1, α3 = 12, α4 = 4, α5 = 30, β1 = 2, β2 = 3, β3 = 40, β4 = 50, β5 = 400. plot of y(n+1)=W*y(n)+(((A*y(n−1)+B*y(n−2)+C*y(n−3)+D*y(n−4)+E*y(n−5))/(a*y(n−1)+b*y(n−2)+c*y(n−3)+d*y(n−4)+e*y(n−5)))) 6

solution of y(n+1)

5

4

3

2

1

0

0

50

Figure 3: (ym+1 = 0.5ym +

100 n−iteration

150

200

10ym−1 +ym−2 +12ym−3 +4ym−4 +30ym−5 2ym−1 +3ym−2 +40ym−3 +50ym−4 +400ym−5 )

Example 4. Figure 4, shows that Eq.(1.1) is not globally asymptotically stable if y−5 = 1, y−4 = 2, y−3 = 3, y−2 = 4, y−1 = 5, y0 = 6, A = 100, α1 = 10, α2 = 1, α3 = 12, α4 = 4, α5 = 6, β1 = 2, β2 = 3, β3 = 40, β4 = 50, β5 = 400. 306 plot of y(n+1)=W*y(n)+(((A*y(n−1)+B*y(n−2)+C*y(n−3)+D*y(n−4)+E*y(n−5))/(a*y(n−1)+b*y(n−2)+c*y(n−3)+d*y(n−4)+e*y(n−5)))) x 10 7

6

solution of y(n+1)

5

4

3

2

1

0

0

50

Figure 4: (ym+1 = 100ym +

100 n−iteration

150

200

10ym−1 +ym−2 +12ym−3 +4ym−4 +6ym−5 2ym−1 +3ym−2 +40ym−3 +50ym−4 +400ym−5 )

21

624

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

7

Conclusion

We have discussed some properties of the nonlinear rational difference equation (1.1), such as the periodicity, the boundedness and the global stability of the positive solutions of this equation. We gave some figures to illustrate the behavior of these solutions, as generalization of the results obtained in Refs.[4,5,8]. Note that example 1 illustrates Theorem 5 which shows that the solution of Eq.(1.1) is unbounded and example 2 illustrates Theorem 6 which shows that Eq.(1.1) has prime period two solutions, while example 3 illustrates Theorems 3 and 7 which shows that Eq.(1.1) is globally asymptotically stable. But example 4 shows that Eq.(1.1) is not globally asymptotically stable if A > 1.

8

Acknowledgement

This work is financially supported by UKM Grant : DIP-2017-011 and Ministry of Education Malaysia Grant FRGS/1/2017/STG06/UKM/01/1.

References [1] M. T. Aboutaleb, M. A. El-Sayed and A. E. Hamza, Stability of the recursive sequence xn+1 = (α−βxn )/(γ +xn−1 ), J. Math. Anal. Appl., 261(2001), 126-133. [2] E. M. Elabbasy, H. El- Metwally and E. M. Elsayed, On the difference equation xn+1 = axn − bxn / (cxn − dxn−1 ) , Advances in Difference Equations, Volume 2006, Article ID 82579, pages 1-10, doi: 10.1155/2006/82579. [3] E. M. Elabbasy, H. El- Metwally and E. M. Elsayed, On the difference equation xn+1 = (αxn−l + βxn−k ) / (Axn−l + Bxn−k ) , Acta Mathematica Vietnamica, 33(2008), No.1, 85-94. [4] E. M. Elsayed, On the global attractivity and periodic character of a recursive sequence, Opuscula Mathematica, 30(2010), 431-446. [5] M. A. El-Moneam and S. O. Alamoudy, On study of the asymptotic behavior of some rational difference equations, DCDIS Series A: Mathematical Analysis, 21(2014), 89-109.

22

625

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[6] E. A. Grove and G. Ladas, Periodicities in nonlinear difference equations, Vol.4, Chapman & Hall / CRC, 2005. [7] W. T. Li and H. R. Sun, Dynamics of a rational difference equation, Appl. Math. Comput., 163(2005), 577-591. [8] M. A. Obaid, E. M. Elsayed, and M. M. El-Dessoky, Global attractivity and periodic character of difference equation of order four, Discrete Dynamics in Nature and Society, Volume 2012, Article ID 746738, 20 pages. [9] M. Saleh and S. Abu-Baha, Dynamics of a higher order rational difference equation, Appl. Math. Comput; 181(2006), 84-102. [10] E. M. E. Zayed and M. A. El-Moneam, On the rational recursive sequence xn+1 = (D + αxn + βxn−1 + γxn−2 )/(Axn + Bxn−1 + Cxn−2 ), Comm. Appl. Nonlinear Analysis, 12(2005), 15-28. [11] E. M. E. Zayed and M. A. El-Moneam, On the rational recursive sequence xn+1 = (αxn +βxn−1 +γxn−2 +δxn−3 )/(Axn +Bxn−1 +Cxn−2 + Dxn−3 ), J. Appl. Math. & Computing, 22(2006), 247-262. [12] E. M. E. Zayed and  M.PA. El-Moneam,  P On the rational recursive sek quence xn+1 = A + i=0 αi xn−i / ki=0 βi xn−i , Mathematica Bohemica, 133(2008), No.3, 225-239. [13] E. M. E. Zayed and A. El-Moneam, the rational recursive   On P  M. P k sequence xn+1 = A + i=0 αi xn−i / B + ki=0 βi xn−i , Int. J. Math. & Math. Sci., Volume 2007, Article ID 23618, 12 pages, doi: 10.1155/2007/23618. [14] E. M. E. Zayed and M. A. El-Moneam, On the rational recursive sequence xn+1 = axn − bxn / (cxn − dxn−k ) , Comm. Appl. Nonlinear Analysis, 15(2008), 47-57. [15] E. M. E. Zayed and M. A. El-Moneam, On the Rational Recursive Sequence xn+1 = (α + βxn−k ) / (γ − xn ), J. Appl. Math. & Computing, 31(2009) 229-237. [16] E. M. E. Zayed and M. A. El-Moneam, On the rational recursive sequence xn+1 = Axn + (βxn + γxn−k ) / (Cxn + Dxn−k ) , Comm. Appl. Nonlinear Analysis, 16(2009), 91-106.

23

626

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[17] E. M. E. Zayed and M. A. El-Moneam, On the Rational Recursive Sequence xn+1 = γxn−k + (axn + bxn−k ) / (cxn − dxn−k ), Bulletin of the Iranian Mathematical Society, 36(2010) 103-115. [18] E. M. E. Zayed and M. A. El-Moneam, On the rational recursive sequence xn+1 = (α0 xn + α1 xn−l + α2 xn−k ) / (β0 xn + β1 xn−l + β2 xn−k ) , Mathematica Bohemica, 135(2010), 319-336. [19] E. M. E. Zayed and M. A. El-Moneam, On the rational recursive sequence xn+1 = Axn + Bxn−k + (βxn + γxn−k ) / (Cxn + Dxn−k ) , Acta Appl. Math., 111(2010), 287-301. [20] E. M. E. Zayed and M. A. El-Moneam, On the rational recursive two sequences xn+1 = axn−k + bxn−k / (cxn + δdxn−k ) , Acta Math. Vietnamica, 35(2010), 355-369. [21] E. M. E. Zayed and M. A. El-Moneam, On the global attractivity of two nonlinear difference equations, J. Math. Sci., 177(2011), 487-499. [22] E. M. E. Zayed and M. A. El-Moneam, On the rational recursive sequence xn+1 = (A + α0 xn + α1 xn−σ ) / (B + β0 xn + β1 xn−τ ) , Acta Math. Vietnamica, 36(2011), 73-87. [23] E. M. E. Zayed and M. A. El-Moneam, On the global asymptotic stability for a rational recursive sequence, Iranian Journal of Science and Technology (IJST Transaction A- Science), (2011), A4: 333-339. [24] E. M. E. Zayed and M. A. El-Moneam, On the rational recursive seα x +α x +α2 xn−m +α3 xn−k quence xn+1 = β00 xnn +β11 xn−l , WSEAS Transactions on n−l +β2 xn−m +β3 xn−k Mathematics, Issue 5, Vol. 11, (2012), 373-382. [25] E. M. E. Zayed and M. A. El-Moneam, On the qualitative study of the αxn−σ , Fasciculi Mathematici, nonlinear difference equation xn+1 = β+γx p n−τ

50(2013), 137-147.

24

627

A. M. Alotaibi ET AL 604-627

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On sequential fractional di¤erential equations with nonlocal integral boundary conditions N.I. Mahmudov and M. Awadalla Department of Mathematics Eastern Mediterranean University Gazimagusa, Mersin 10, Turkey Abstract This article develops the existence theory for sequential fractional di¤erential equations involving Caputo fractional derivative of order 1 < 2 with nonlocal integral boundary conditions. An example is given to demonstrate application of our results.

Keywords: fractional di¤erential equations; mixed boundary value problem; …xed point theorem. 2010 AMS Subject Classi…cation: 34A08; 34B

1

Introduction

The theory of fractional-order di¤erential equations involving di¤erent kinds of boundary conditions has been a …eld of interest in pure and applied sciences. In addition to the classical two-point boundary conditions, great attention is paid to non-local multipoint and integral boundary conditions. Nonlocal conditions are used to describe certain features of physical, chemical or other processes occurring in the internal positions of the given region, while integral boundary conditions provide a plausible and practical approach to modeling the problems of blood ‡ow. For more details and explanation, see, for instance [2], [1]. Some recent results on fractional-order boundary value problem can be found in a series of papers [3]-[20] and the references cited therein. Sequential fractional di¤erential equations have also received considerable attention, for instance see [4]-[9]. To the best of our knowledge, the study of sequential fractional di¤erential equations supplemented with nonlocal integral fractional boundary conditions has yet to be initiated. We study the following nonlinear sequential fractional di¤erential equation subject to nonseparated nonlocal integral fractional boundary conditions 8 C D + C D 1 u (t) = f (t; u (t)) ; 1< 2; 0 t T; > < R u ( ) + u (T ) = u (s) ds; (1) 1 1 1 0 RT > : C 1 C 1 D u( ) + 2 D u (T ) = 2 u (s) ds; 2

where 0 < < T; 0 < < < T; 2 R+ ; 1 ; 2 ; 1 ; 2 ; 1 ; 2 2 R: The rest of the paper is organized as follows. In Section 2, we recall some basic concepts of fractional calculus and obtain the integral solution for the linear variants of the given problems. Section 3 contains the existence results for problem (1) obtained by applying Leray-Schauder’s nonlinear alternative, Banach’s contraction mapping principle and Krasnoselskii’s …xed point theorem. In Section 4, the main result is illustrated with the aid of an example.

628

N.I. Mahmudov ET AL 628-638

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

Preliminaries

De…nition 1 The Riemann-Liouville fractional integral of order > 0 for a function f : [0; +1) ! R is de…ned as Zt 1 I0+ f (t) = (t s) 1 f (s)ds; ( ) 0

provided that the right hand side of the integral is pointwise de…ned on (0; +1) and De…nition 2 The Caputo derivative of order

> 0 for a function f : [0; +1) ! R is written as 1

D0+ f (t) =

is the gamma function.

(n

)

Zt

s)n

(t

1 (n)

f

(s)ds;

0

where n = [ ] + 1; [ ] is integral part of Lemma 3 Let

:

> 0: Then the di¤ erential equation D0+ f (t) = 0 has solutions f (t) = c0 + c1 t + c2 t2 + ::: + cn

1t

n 1

;

and I0+ D0+ f (t) = f (t) + c0 + c1 t + c2 t2 + ::: + cn

1t

n 1

;

where ci 2 R and i = 1; 2; :::; n = [ ] + 1: In what follows we use the following notations: a11 := a21 := a22 := '1 (t) = K1 (t; s) =

1e

2 2

+ (2

)

(T

a21

);

Z

(

1)

(

1 1

s)

; a12 := s

e

:= a11 a22

t

; '2 (t) =

Z

e

ds +

2

a12 a21 ; a11

t

e

(t r)

(r

t

a12 e 2

s)

1

(2

0

a22 e 1

1

T

1e

+ )

6= 0;

1

Z

;

1 T

1

(T

s)

e

s

ds +

0

2

Z

T

e

t

dt;

;

dr; K2 (t; r) =

s

1 (2

)

Z

t

(t

1

s)

K1 (s; r) ds:

r

It is clear that j'1 (t)j j'2 (t)j

a22 e j j

T

max

ja21 a22 j a21 ; j j

a12 e j j

T

max

ja11 a12 j a11 ; j j

! !

:=

1;

:=

2;

and

1 (2

)

Z

0

t

(t

1

s)

Z

Z

t

e

(t r)

1

I

h (r) dr =

0

t

K1 (t; s) h (s) ds;

0

s

e

Z

(s r)

I

0

1

h (r) drds =

Z

t

K2 (t; r) h (r) dr:

0

629

N.I. Mahmudov ET AL 628-638

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Lemma 4 Let h 2 C ([0; T ] ; R) : The the following boundary value problem 8 C D + C D 1 u (t) = h (t) ; 1< 2; > < R u ( ) + u (T ) = u (s) ds; 1 1 1 0 RT > : C D 1 u ( ) + 2 C D 1 u (T ) = 2 u (s) ds; 2 is equivalent to the fractional integral equation Z t u (t) = K1 (t; s) h (s) ds 0

+

1 '1

(t)

Z

K1 ( ; s) h (s) ds +

0

1 '1

(t)

Z

+

2 '2

(t)

(t)

Z

r

K1 (r; s) h (s) dsdr

Z

2 '2

0

h (s) ds +

2 '2

(t)

1

T; (2)

K1 (T; s) h (s) ds

2 '2

K2 ( ; s) h (s) ds

t

T

(t)

0

0

Proof. Applying I

(t)

0

Z

0

2 '2

1 '1

Z

0

Z

(t)

Z

Z

T

t

K1 (t; s) h (s) dsdt

0

T

K2 (T; s) h (s) ds

0

Z

T

h (s) ds:

(3)

0

to both sides of (2) we get 1 C

I

D

1

(D + ) u (t) = I

(D + ) u (t)

c0 = I

1

h (t) ;

1

h (t) :

We solve the above linear di¤erential equation u (t) = (u (0) t

u (t) = c1 e

t

c0 ) e

+ c0 +

t (t s)

e

1

I

h (s) ds;

0

Z

+ c0 +

Z

t

e

(t s)

e

s

1

I

h (s) ds:

(4)

0

It is clear that C

D

1

c1

u (t) =

(2

)

1

+

(2

)

Z

t

1

(t

0 Z t

s)

1

(t

s)

ds 1

I

Z

h (s)

0

s

e

(s r)

I

1

h (r) dr ds:

0

The …rst boundary condition implies that 1u (

=

)+

1 u (T )

1 c1 e

+

1 c0 +

1

Z

(

e

s)

1

I

h (s) ds

0

+

1 c1 e

=

Z

1

T

+

1 c0

+

1 c1

T

e

(T

s)

e

(r s)

1

I

h (s) ds

0

c1 e

r

+ c0 +

0

=

1

Z

Z

r

0

1

e

+

1 c0

+

1

Z

0

630

1

I

Z

h (s) ds dr

r

e

(r s)

I

1

h (s) dsdr;

0

N.I. Mahmudov ET AL 628-638

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1e

=

1

+ Z Z

1

T

1e

1

c1 + ( Z

e

r (r s)

e

1

I

h (s) dsdr

1

) c0

1

(

e

1

0

0

+

1

s)

1

I

h (s) ds

1

0

Z

T (T

e

s)

I

1

h (s) ds:

0

The second boundary condition implies that 2

= +

(2

)

Z

1 2

(2

) 1

2

(2

)

1

(

s)

s

e

ds +

2

(2

0

Z

Z

1

(

s)

I

1

Z

) Z

h (s)

0

T

1

(T

s)

e

s

ds +

2

0

s

(s r)

e

1

I

Z

1

(T

s)

I

1

Z

h (s)

0

s (s r)

e

1

I

t

e

dt c1 +

2

(T

) c0

h (r) dr ds

0

T

!

T

h (r) dr ds

2

0

Z

T

Z

t

e

(t s)

I

1

h (s) dsdt:

0

Thus a11 c1 + a12 c0 =

1

a21 c1 + a22 c0 =

2

Z

Z

Z

0

r

K1 (r; s) h (s) dsdr

0

h (s) ds +

Z

2

0

2

Z

1

K1 ( ; s) h (s) ds

0

T

h (s) ds

0

T

Z

K2 (T; s) h (s) ds

2

0

2

Z

T

Z

Z

1

T

K1 (T; s) h (s) ds;

0

Z

K2 ( ; s) h (s) ds

0

t

K1 (t; s) h (s) dsdt:

0

Solving the above system of equations for c0 and c1 , we get c0 =

a11 2

Z

h (s) ds +

a11 2

0

a11

Z

2

a21 1

Z

a22 1

a12 2

0

T

+

2

2

r

K1 (r; s) h (s) dsdr +

Z

2 T

a21 1

Z

0

r

a22

K1 (r; s) h (s) dsdr

0

h (s) ds Z

Z

Z

K2 ( ; s) h (s) ds

0

t

K1 (t; s) h (s) dsdt

0

Z

K1 ( ; s) h (s) ds +

Z

a21 1

0

a12 2

0

a12

a11

K2 (T; s) h (s) ds Z

a11

h (s) ds

0

Z

Z

T

0

0

c1 =

Z

Z

1

h (s) ds +

0

T

K2 (T; s) h (s) ds +

a12 2

0

Z

T

Z

a22

K1 ( ; s) h (s) ds

a12 2

Z

K1 (T; s) h (s) ds

0

0

T

T

Z

1

Z

T

K1 (T; s) h (s) ds

0

K2 ( ; s) h (s) ds

0

t

K1 (t; s) h (s) dsdt:

0

Inserting c0 and c1 in (4) we obtain the desired formula (3). Conversely, assume that u satis…es (3). By a direct computation, it follows that the solution given by (3) satis…es (2). Lemma 5 For any g; h 2 C ([0; T ] ; R) we have Z

t

K1 (t; s) g (s) ds

0

Z

0

Z

t

K1 (t; s) h (s) ds

t

K2 (t; s) g (s) ds

t

K2 (t; s) h (s) ds

0

631

1

( )

0

Z

1

t t

1

e

e t

kg

t

kg

hkC ;

hkC :

N.I. Mahmudov ET AL 628-638

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. Indeed, Z

Z

t

K1 (t; s) g (s) ds

0

t

K1 (t; s) h (s) ds

0

Z t K1 (t; s) ds kg hkC K1 (t; s) jg (s) h (s)j ds 0 0 Z t Z t 1 2 e (t r) (r s) dr ds kg hkC ( 1) 0 s Z tZ r 1 2 = e (t r) (r s) dsdr kg hkC ( 1) 0 0 t 1 1 e t kg hkC ( 1) ( 1) T 1 1 e T kg hkC : ( ) Z

t

On the other hand Z t K2 (t; s) g (s) ds 0

1

=

(2

=

)

Z

s)

0

1)

1) (2

K2 (t; s) h (s) ds

1

(t

1 (

t

0

t

1 ) (

(2

Z

Z

Z

=

t

) (

=

(

=

(

= =

( t

1

e

t

kg

Z

1

(t

s)

0

1) (2 ) ( 1 e t 1) (2 ) ( t 1 e t 1) (2 ) ( 1 e t t 1) (2 ) ( 1 e t t 1) (2 ) (

(

(s r)

e

0

1)

1 (

s

1)

1) 1)

(s r)

e

s)

s

1

(t

s)

r

(r (s r)

Z

1

s

0

t

1

(t

s)

(1

s)

1

s

0 1

1

e

) kg

( ) (2 (2)

)

ds kg

1

s

0

B ( ;2

2

l)

(g (l)

h (l)) dldrds

r

1

drds kg

hkC

s

0

Z Z

Z

e

0

t

h (r)) drds

0

Z

1

(t

0

Z

1)

t

(g (r)

s

0

Z

1)

1

I

ds kg

(s r)

drds kg

hkC

hkC hkC

hkC kg

hkC

hkC :

632

N.I. Mahmudov ET AL 628-638

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

3

Main results

We introduce a …xed point problem associated with the problem as follows: Z t (Fu) (t) = K1 (t; s) f (s; u (s)) ds 0

+

1 '1

(t)

Z

K1 ( ; s) f (s; u (s)) ds +

0

1 '1 (t)

Z

Z

+

2 '2

(t)

(t)

Z

Z

(t)

T

Z

K1 (T; s) f (s; u (s)) ds

0

r

K1 (r; s) f (s; u (s)) dsdr

2 '2 (t)

0

0

2 '2

1 '1

K2 ( ; s) f (s; u (s)) ds

2 '2

0

f (s; u (s)) ds +

2 '2

(t)

0

Z

(t)

Z

Z

T

Z

t

K1 (t; s) f (s; u (s)) dsdt

0

T

K2 (T; s) f (s; u (s)) ds

0

T

f (s; u (s)) ds:

(5)

0

Let 1

( )

+j

1

+ j 2j

2

R := R

2j

Z

+ j 1j

1

( ) T

1

1

( ) T

1 1

e

1

+ j 1j t

e

T

e

1

( )

T

e

1

t

2

T

1

T

e

T

1j

+ j

Theorem 6 Let f: [0; T ]

1

T

R :=

+ j 2j T

( ) Z

1

1

( )

0

+j

1

r

1

dt + j 2 j 2

e

2j

1

2

r

e

dr

e

2 T;

:

R ! R be a continuous function such that the following conditions hold:

(A1 ) there exists Lf > 0 such that jf (t; u)

f (t; v)j

Lf ju

vj ; 8 (t; u) ; (t; v) 2 [0; T ]

R;

(A2 ) Lf R < 1: Then the problem (1) has a unique solution in C ([0; T ] ; R) : Proof. Consider a ball Br := fu 2 C ([0; T ] ; R) : kukC with r

Mf R 1 Lf R ,

where Mf := sup fjf (t; 0)j : 0 jf (t; u)j

t

rg

T g : It is clear that

Lf juj + Mf ; u 2 R:

633

N.I. Mahmudov ET AL 628-638

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Using this inequality and Lemma 5 from (5) it follows that t

j(Fu) (t)j

1

( ) +j

1 j j'1

(t)j

+ j 2 j j'2 (t)j + j

e

t

T

1

1

2 j j'2

1

( )

Z

T

T

1

(Lf r + Mf ) R

e

T

1 T

e

( )

1

kf ( ; u ( ))kC + j 1 j j'1 (t)j

1

t

( )

(t)j

This shows that FBr

1

kf ( ; u ( ))kC + j 1 j j'1 (t)j

t

e

e Z

kf ( ; u ( ))kC 1

r

1

( )

0

dt kf ( ; u ( ))kC + j 2 j j'2 (t)j

1

e

r

e

kf ( ; u ( ))kC + j 2 j j'2 (t)j kf ( ; u ( ))kC + j

dr kf ( ; u ( ))kC kf ( ; u ( ))kC

2 j j'2

(t)j T kf ( ; u ( ))kC

r:

Br . Next, using the condition (A1 ), we obtain FvkC

kFu

Lf R ku

vkC :

By (A2 ) the operator F is a contraction. Thus by the Banach …xed point theorem has F a unique …xed point in C ([0; T ] ; R). Theorem 7 Let f: [0; T ] (A3 ) there exists

R ! R be a continuous function such that the following condition holds:

2 C ([0; T ] ; R+ ) and a nondecreasing function jf (t; u)j

(t)

: R+ ! R+ such that

(juj) ; 8 (t; u) 2 [0; T ]

R:

(A4 ) There exists M > 0 such that M > 1: (M ) k kC R Then the BVP (1) has at least one solution. Proof. Step 1: Show that F : C ([0; T ] ; R) ! C ([0; T ] ; R) maps bounded sets into bounded sets and is continuous. Let Br be a bounded set in C ([0; T ] ; R) :Then jf (t; u (t))j k k (ju (t)j) k k (r) and by Lemma 5 t

j(Fu) (t)j

1

( ) +j

1 j j'1

(t)j

+ j 2 j j'2 (t)j + j

2 j j'2

k kC

e

t

T

1

1

Z

(t)j

( ) T

t

1

kf ( ; u ( ))kC + j 1 j j'1 (t)j 1 1

( ) T

1

e

T

e

1 T

e

( )

1

kf ( ; u ( ))kC + j 1 j j'1 (t)j t

e Z

kf ( ; u ( ))kC t

0

dt kf ( ; u ( ))kC + j 2 j j'2 (t)j

1

1

( ) 1

e e

kf ( ; u ( ))kC + j 2 j j'2 (t)j kf ( ; u ( ))kC + j

t

dt kf ( ; u ( ))kC kf ( ; u ( ))kC

2 j j'2

(t)j T kf ( ; u ( ))kC

(r) R:

Step 2: Next we show that F maps bounded sets into equicontinuous sets of C ([0; T ] ; R) :

634

N.I. Mahmudov ET AL 628-638

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Let t1 ; t2 2 [0; T ] with t1 < t2 and u 2 Br . Then we obtain j(Fu) (t1 ) (Fu) (t2 )j Z Z t1 (K1 (t1 ; s) K2 (t1 ; s)) f (s; u (s)) ds +

t2

K2 (t1 ; s) f (s; u (s)) ds

t1

0

1

+ j 1 j (j'1 (t1 )

'1 (t2 )j)

+j

(t1 )

'1 (t2 )j)

+ j 1 j (j'1 (t1 )

'1 (t2 )j)

1 j (j'1

+ j 2 j j'2 (t1 )

'2 (t2 )j

Z

+ j 2 j j'2 (t1 )

'2 (t2 )j

+ j

'2 (t2 )j

2 j j'2

(t1 )

+ j 2 j j'2 (t1 )

( )

1

e

1

e

T

1

e

1

T

( )

Z

( ) 1

t

( ) 1

e

1

e

T

'2 (t2 )j k kC

(r)

k kC

(r)

1

r

0 T

k kC

1

r

t

e k kC

T

k kC

(r) + T j

dr k kC dt k kC

(r) (r)

(r) (r)

2 j j'2

(t1 )

'2 (t2 )j k kC

(r) :

Obviously, the right-hand side of the above inequality tends to zero independently of u 2 Br as t1 ! t2 .As F satis…es the above assumptions, therefore it follows by the Arzelá-Ascoli theorem that F : C ([0; T ] ; R) ! C ([0; T ] ; R) is completely continuous. The result will follow from the Leray-Schauder nonlinear alternative once we have proved the boundedness of the set of all solutions to equations u = Fu for 0 1. Let u be a solution. Then using the computations employed in proving that F is bounded, we have ju (t)j = j(Fu) (t)j

k kC

(kukC ) R:

Consequently, we have k kC

kukC (kukC ) R

1:

In view of (A4 ), there exists M such that kukC 6= M . Let us set U = fu 2 C ([0; T ] ; R) : kukC < M g : Note that the operator F : U ! C ([0; T ] ; R) is continuous and completely continuous. From the choice of U, there is no u 2 @U such that u = Fu for some 0 < < 1. Consequently, by the nonlinear alternative of Leray-Schauder type, we deduce that F has a …xed point u 2 U which is a solution of problem (1). This completes the proof. Now, we result based on the Krasnoselskii theorem. Theorem 8 Let f: [0; T ]

R ! R be a continuous function such that the following conditions hold:

(A1 ) there exists Lf > 0 such that jf (t; u) (A5 ) there exists

f (t; v)j

Lf ju

vj ; 8 (t; u) ; (t; v) 2 [0; T ]

R;

2 C ([0; T ] ; R+ ) such that jf (t; u)j

(t) ; 8 (t; u) 2 [0; T ]

635

R:

N.I. Mahmudov ET AL 628-638

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(A6 ) Lf R < 1: Then the boundary value problem (1) has at least one solution in C ([0; T ] ; R) : Proof. Consider the closed set Br := fu 2 C ([0; T ] ; R) : kukC rg with r operators F1 and F2 on Br as follows: Z t (F1 u) (t) := K1 (t; s) f (s; u (s)) ds;

R k kC and de…ne the

0

(F2 u) (t) :=

1 '1 (t)

1 '1 (t)

Z

Z

K1 ( ; s) f (s; u (s)) ds +

0

0

2 '2

+

(t)

2 '2 (t)

Z

Z

Z

1 '1 (t)

Z

T

K1 (T; s) f (s; u (s)) ds

0

r

K1 (r; s) f (s; u (s)) dsdr

2 '2 (t)

0

K2 ( ; s) f (s; u (s)) ds

2 '2

0

f (s; u (s)) ds +

2 '2 (t)

0

Z

(t)

Z

Z

T

Z

t

K1 (t; s) f (s; u (s)) dsdt

0

T

K2 (T; s) f (s; u (s)) ds

0

T

f (s; u (s)) ds:

0

For u; v 2 Br , it is easy to verify that kF1 u + F2 vkC that kF2 u F2 vkC

R k kC : Thus, F1 u + F2 v 2 Br . One can easily show Lf R ku

vkC :

By (A6 ) F2 is contraction. On the other hand, (i) continuity of f implies that the operator F1 is continuous, (ii) F1 is uniformly bounded on Br : kF1 ukC

1

T

( )

1

T

e

k kC ;

(iii) F1 is equicontinuous on Br . These imply that F1 is compact on Br . Thus all the assumptions of Krasnoselskii‘s theorem are satis…ed. In consequence, It follows from the conclusion of Krasnoselskii‘s theorem that the problem (1) has at least one solution on [0; T ].

4

Examples

Example 1. Consider the following problem 8 3 1 C > D 2 + 2 C D 2 u (t) = pt21+49 t sin49u(t) + e < R2 2u (1) + 3u (4) = u (s) ds; 0 > R2 : C 1 1 C D 2 u (1) + 5 D 2 u (4) = u (s) ds; 0

where f (t; u) = pt21+49 5; = 1; = 2; = 3;

t sin u 49

+e = 2:

t

cos t ; T = 4;

636

= 32 ;

1

= 2;

t

cos t ; 0

t

4; (6)

2

= 1;

1

= 3;

2

= 5;

1

=

1;

2

N.I. Mahmudov ET AL 628-638

=

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A simple calculations show that

a21 = +

2

Z

2

(2

T

e

t

dt

2

(2

)

Z

a11 = Z

1e

(

s)

)

+

1e

1

(

s)

1

T

s

e

ds +

2

2

0 1

e

s

ds +

2

(2

0

a22 =

1

(T

) = 5; a12 =

'1 = max '2 = max

1

+

e (2 )

Z

T

e

1

s

ds

0

(T

1

s)

e

s

ds +

0

1

24:8 5 24:8 5e ; 145 145 0:76 6 0:76 6e ; 145 145

)

= 0:761; Z T 1 (T s)

= 6;

=

145

2

Z

T

e

t

dt = 24:8;

8

= 0:17; 8

= 0:036;

R < 2:083: To apply Theorem 6 we need to show conditions (A1 )and (A2 ) are satis…ed. Indeed, t 1 (sin u sin v) vj ; (A1 ) jf (t; u) f (t; v)j = pt21+49 49 49 ju 1 (A2 ) Lf R < 49 2:083 < 0:043 < 1: Therefore, according to Theorem 6 the BVP (6) has a unique solution on [0; 4] :

References [1] Podlubny I., Fractional di¤erential equations, Academic Press, San Diego, 1999. [2] Kilbas A.A., Srivastava H.M., Trujillo J.J., Theory and applications of fractional di¤erential equations, North-Holland Mathematics Studies, 204. Elsevier Science B.V., Amsterdam, 2006 [3] Agarwal R.P., O’Regan D., Hristova S., Stability of Caputo fractional di¤erential equations by Lyapunov functions, Appl. Math., 2015, 60, 653-676 [4] Bai C., Impulsive periodic boundary value problems for fractional di¤erential equation involving Riemann-Liouville sequential fractional derivative, J. Math. Anal. Appl., 2011, 384, 211-231 [5] Ahmad B., Nieto J.J., Sequential fractional di¤erential equations with three-point boundary conditions, Comput. Math. Appl., 2012, 64, 3046-3052. [6] Ahmad B., Nieto J.J., Boundary value problems for a class of sequential integrodi¤erential equations of fractional order, J. Funct. Spaces Appl., 2013, Art. ID 149659, 8pp [7] Ahmad B., Ntouyas S.K., Existence results for a coupled system of Caputo type sequential fractional di¤erential equations with nonlocal integral boundary conditions, Appl. Math. Comput., 2015, 266, 615-622 [8] Aqlan M. H. ,Alsaedi A. , AhmadB., and Nieto J. J. , Existence theory for sequential fractional di¤erential equations with anti-periodic type boundary conditions, Open Math. 2016; 14: 723–735 [9] Klimek M., Sequential fractional di¤erential equations with Hadamard derivative, Commun. Nonlinear Sci. Numer. Simul., 2011, 16, 4689-4697 [10] Ye H., Huang, R., On the nonlinear fractional di¤erential equations with Caputo sequential fractional derivative, Adv. Math. Phys., 2015, Art. ID 174156, 9 pp

637

N.I. Mahmudov ET AL 628-638

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[11] Alsaedi A., Sivasundaram S., Ahmad B., On the generalization of second order nonlinear anti-periodic boundary value problems, Nonlinear Stud., 2009, 16, 415-420 [12] Ahmad B., Nieto J.J., Anti-periodic fractional boundary value problems, Comput. Math. Appl., 2011, 62, 1150-1156. [13] Ahmad B., Losada J., Nieto J.J., On antiperiodic nonlocal three-point boundary value problems for nonlinear fractional di¤erential equations, Discrete Dyn. Nat. Soc., 2015, Art. ID 973783, 7 pp [14] Zhang L., Ahmed B., Wang G., Existence and approximation of positive solutions for nonlinear fractional integro-di¤erential boundary value problems on an unbounded domain, Appl. Comput. Math., V.15, N.2, 2016, pp.149-158 [15] Mahmudov, N. I.; Unul, S. On existence of BVP’s for impulsive fractional di¤erential equations. Adv. Di¤erence Equ. 2017, 2017:15, 16 pp. [16] Mahmudov, N. I.; Unul, S. Existence of solutions of (2; 3] order fractional three-point boundary value problems with integral conditions. Abstr. Appl. Anal. 2014, Art. ID 198632, 12 pp. [17] Mahmudov, N. I.; Mahmoud, H. Four-point impulsive multi-orders fractional boundary value problems, Journal of Computational Analysis and Applications, Volume: 22 Issue: 7 Pages: 1249-1260 [18] Huangi Y., Liu Z., Wang R., Quasilinearization for higher order impulsive fractional di¤erential equations, Appl. Comput. Math., V.15, N.2, 2016, pp.159-171 [19] Wang J.R., Wei W., Feckan M., Nonlocal Cauchy problems for fractional evolution equations involving Volterra-Fredholm type integral operators, Miskolc Math. Notes, 2012, 13, 127-147 [20] Wang J.R., Zhou Y., Feckan M., On the nonlocal Cauchy problem for semilinear fractional order evolution equations, Cent. Eur. J. Math., 2104, 12, 911-922

638

N.I. Mahmudov ET AL 628-638

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Bieberbach-de Branges and Fekete-Szeg¨o inequalities for certain families of q− convex and q− close-to-convex functions Om P. Ahuja1 , Asena C ¸ etinkaya2,∗ , Ya¸sar Polato˜glu3 1

2,3

Department of Mathematical Sciences, Kent State University, Ohio, 44021, U.S.A

e-mail: [email protected] ˙ ˙ Department of Mathematics and Computer Sciences, Istanbul K¨ ult¨ ur University, Istanbul, Turkey Corresponding Author∗ e-mail: [email protected] e-mail: 3 [email protected]

December 28, 2017 Abstract In this paper, we investigate q− analogues of Bieberbach- de Branges theorems and FeketeSzeg¨ o inequalities for certain families of q− convex and q−close-to-convex functions. Key words and phrases: q− close-to-convex function, q− convex function, coefficient inequality and Fekete-Szeg¨ o inequality. 2010 Mathematics Subject Classification: 30C45

1

Introduction

Let A be the class of functions f , defined by f (z) = z + a2 z 2 + a3 z 3 + · · · , that are analytic in the open unit disc D = {z : |z| < 1} and Ω be the family of functions w which are analytic in D and satisfy the conditions w(0) = 0, |w(z)| < 1 for all z ∈ D. If f1 and f2 are analytic functions in D, then we say that f1 is subordinate to f2 , written as f1 ≺ f2 if there exists a Schwarz function w ∈ Ω such that f1 (z) = f2 (w(z)), z ∈ D. We also note that if f2 univalent in D , then f1 ≺ f2 if and only if f1 (0) = f2 (0), f1 (D)P ⊂ f2 (D) implies f1 (Dr ) ⊂ f2 (D Pr∞), where Dr = {z : |z| < r, 0 < r < 1} ∞ (see [7]). Let f1 (z) = z + n=2 an z n and f2 (z) = z + n=2 bn z n be elements in A. Then the convolution of these functions is defined by f1 (z) ∗ f2 (z) = z +

∞ X

an bn z n .

(1.1)

n=2

Denote by P the family of functions p of the form p(z) = 1 + c1 z + c2 z 2 + c3 z 3 + · · · , analytic in D such that p is in P if and only if p(z) ≺

1+z 1 + w(z) ⇔ p(z) = , 1−z 1 − w(z)

z∈D

(1.2)

1

639

Om P. Ahuja ET AL 639-649

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

for some function w ∈ Ω and for all z ∈ D. It is well known that a function f in A is called starlike (f ∈ S ∗ ), convex (f ∈ C) and close-to-convex (f ∈ CC) if there exists a function p in P such that p may be expressed, respectively, by the following relations: p(z) = z

f 0 (z) f 00 (z) f 0 (z) , p(z) = 1 + z 0 , p(z) = 0 f (z) f (z) g (z)

for all z ∈ D. For definitions and properties of these classes, one may refer to [1] and [7]. The problem of maximizing the absolute value of a3 − µa22 is called Fekete-Szeg¨o problem [3] when µ is a real number. Later, Pfluger [14] considered the problem when µ is complex. Many authors have considered the Fekete-Szeg¨o problem for various subclasses of A (see [5, 12, 16]). In 1909 and 1910, Jackson [8, 9, 10] initiated a study of q− difference operator Dq defined by Dq f (z) =

f (z) − f (qz) (1 − q)z

for z ∈ B{0},

(1.3)

where B is a subset of complex plane C, called q− geometric set if qz ∈ B, whenever z ∈ B. Note that if a subset B of C is q− geometric, then it contains all geometric sequences {zq n }∞ 0 , zq ∈ B. Obviously, Dq f (z) → f 0 (z) as q → 1− . The q− difference operator (1.3) is also called Jackson q− difference operator. Note that such an operator plays an important role in the theory of hypergeometric series and quantum physics (see for instance [2, 4, 6, 11]). Also, note that Dq f (0) → f 0 (0) as q → 1− and Dq2 f (z) = Dq (Dq f (z)). In fact, q− calculus is ordinary classical calculus without the notion of limits. Recent interest in q− calculus is because of its applications in various branches of mathematics and physics. For definition and properties of q− difference operator and q− calculus, one may refer to [2, 4, 6, 11]. In particular, we recall the following definitions and properties: Since 1 − q n n−1 Dq z n = z = [n]q z n−1 , 1−q where [n]q =

1−q n 1−q ,

it follows that for any f ∈ A we have Dq f (z) = 1 +

∞ X

[n]q an z n−1 ,

(1.4)

n=2

Dq (zDq f (z)) = 1 +

∞ X

[n]2q an z n−1 .

(1.5)

n=2

The q− analogue of the factorial function is defined for positive integer n by [n]q ! =

n Y

[k]q ,

k=1

where q ∈ (0, 1). Clearly, as q → 1− , [n]q → n and [n]q ! → n!. For notations, one may refer to [6]. We introduce a new generalized class of q− convex functions as follows: Definition 1.1. A function f ∈ A is said to be in the Cq such that     Dq (zDq f (z)) Cq = f ∈ A : Re > 0, q ∈ (0, 1), z ∈ D . Dq f (z) When q → 1− in the limiting sense, then the class Cq reduces to the traditional class C. 2

640

Om P. Ahuja ET AL 639-649

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

We also introduce a new generalized class of q− close-to-convex functions associated with q− convex functions in D. Definition 1.2. A function f ∈ A is said to be in the CC q if there exists a function g in class Cq such that   Dq f (z) Re > 0, (1.6) Dq g(z) where q ∈ (0, 1), z ∈ D. As Dq f (z) → f 0 (z) and Dq g(z) → g 0 (z), when q → 1− in the limiting sense, then the inequality (1.6) reduces to the traditional class CC. Definition 1.1 and Definition 1.2 are equivalent to the following classes     Dq (zDq f (z)) 1+z Cq = f ∈ A : ≺ , q ∈ (0, 1), z ∈ D , Dq f (z) 1−z     Dq f (z) 1+z CC q = f ∈ A : ≺ , g(z) ∈ Cq . Dq g(z) 1−z In this paper, we investigate the Bieberbach-de Branges inequalities for the class Cq and CC q . We also obtain the Fekete-Szeg¨ o inequalities for both these classes.

2

The Bieberbach-De Branges Theorems

In order to find the Bieberbach-de Branges theorem for the class Cq , we need the following result: P∞ Lemma 2.1. [7](Caratheodory’s lemma) If p ∈ P and p(z) = 1 + n=1 cn z n , then |cn | ≤ 2 for n ≥ 1. This inequality is sharp for each n. Theorem 2.2. If f ∈ Cq and f (z) = z + |an | ≤

P∞

n=2

an z n , then

 n−2  2 1 Y [k]q + . [n]q ! q

(2.1)

k=0

This result is sharp for all n ≥ 2. Proof. In view of Definition 1.1 and subordination principle, we can write Dq (zDq f (z)) = p(z) Dq f (z) where p ∈ P, p(0) = 1 and Rep(z) > 0. In view of (1.4), (1.5) and p(z) = 1 + c1 z + c2 z 2 + ..., we get      ∞ ∞ ∞ X X X 1+ [n]2q an z n−1 = 1 + [n]q an z n−1 1+ cn z n . n=2

n=2

n=1

This equation yields, 1 + [2]2q a2 z + [3]2q a3 z 2 + ... = 1 + ([2]q a2 + c1 )z + ([3]q a3 + [2]q a2 c1 + c2 )z 2 + ...

(2.2)

3

641

Om P. Ahuja ET AL 639-649

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Comparing the coefficients of z n on both sides, we obtain [n + 1]q ([n + 1]q − 1)an+1 = [n]q an c1 + [n − 1]q an−1 c2 + ... + [2]q a2 cn−1 + cn or equivalently q[n]q [n + 1]q an+1 = [n]q an c1 + [n − 1]q an−1 c2 + ... + [2]q a2 cn−1 + cn . In view of Lemma 2.1, we get   q[n]q [n + 1]q |an+1 | ≤ 2 [n]q |an | + [n − 1]q |an−1 | + ... + [2]q |a2 | + 1 . This shows that we have X  n q[n]q [n + 1]q |an+1 | ≤ 2 [k]q |ak | , |a1 | = 1. k=1

This inequality is equivalent to   n−1 X [k]q |ak | , |a1 | = 1 q[n − 1]q [n]q |an | ≤ 2

(2.3)

k=1

or 2 |an | ≤ q[n − 1]q [n]q

  n−1 X [k]q |ak | , |a1 | = 1.

(2.4)

k=1

In order to prove (2.1), we will use the process of iteration. We first plug-in n = 2 and use our assumption |a1 | = 1 in (2.4). On simplification, we get |a2 | ≤

1 2 . [2]q ! q

(2.5)

This is equivalent to |a2 | ≤

 2−2  1 Y 2 [k]q + . [2]q ! q k=0

Next by substituting n = 3 and using the output (2.5) in (2.4), we obtain |a3 | ≤

2 1 2 (1 + ). [3]q ! q q

This is equivalent to |a3 | ≤

 3−2  1 Y 2 [k]q + . [3]q ! q

(2.6)

k=0

By repeating the above process by letting n = 4 and in view of (2.4), it is a routine process to prove |a4 | ≤

1 2 2 2 (1 + )(1 + q + ), [4]q ! q q q 4

642

Om P. Ahuja ET AL 639-649

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

that is,  4−2  1 Y 2 |a4 | ≤ [k]q + . [4]q ! q

(2.7)

k=0

By continuing the process of iterations, we get (2.1). The result in (2.1) is sharp for the functions R − 2 1−q f (z) = (1 − z) q logq−1 dq z. Remark 2.3. If we take limit for q → 1− in inequality (2.1), we get |an | ≤ 1 for all n ≥ 2. This is the well known coefficient inequality for convex functions. Theorem 2.2 helps us to establish the Bieberbach-de Branges theorem for the class CC q in the next result. P∞ Theorem 2.4. If f ∈ CC q and f (z) = z + n=2 an z n , then  n−2 n−1  n−r−2 Y 1 Y 2 X 1 |an | ≤ A(k, q) + [n − r]q A(k, q) , [n]q ! [n]q r=1 [n − r]q ! k=0

where A(k, q) = [k]q +

2 q

(2.8)

k=−1

 . Extremal function is given by Z f (z) =

1+z − 2 1−q (1 − z) q logq−1 dq z. 1−z

Proof. In view of Definition 1.2 and subordination principle, we can write Dq f (z) = p(z) Dq g(z)

(2.9)

P∞ n for some g ∈ Cq , where g(z) P∞= z + n n=2 bn z , z ∈ D. Since p(0) = 1 and Rep(z) > 0, it shows that p ∈ P, where p(z) = 1 + n=1 cn z . In view of (1.4), we have Dq f (z) = 1 +

∞ X

[n]q an z

n−1

and Dq g(z) = 1 +

n=2

∞ X

[n]q bn z n−1 .

n=2

Therefore, (2.9) is equivalent to      ∞ ∞ ∞ X X X 1+ [n]q an z n−1 = 1 + [n]q bn z n−1 1+ cn z n . n=2

n=2

n=1

This equation yields, 1 + [2]q a2 z + [3]q a3 z 2 + ... = 1 + ([2]q b2 + c1 )z + ([3]q b3 + [2]q b2 c1 + c2 )z 2 + ...

(2.10)

Comparing the coefficients of z n−1 on both sides, we obtain [n]q an = [n]q bn + [n − 1]q bn−1 c1 + [n − 2]q bn−2 c2 + ... + [2]q b2 cn−2 + cn−1 . 5

643

Om P. Ahuja ET AL 639-649

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Using Lemma 2.1, we get   [n]q |an | ≤ [n]q |bn | + 2 [n − 1]q |bn−1 | + ... + [2]q |b2 | + 1 or equivalently,  n−1  X [n]q |an | ≤ [n]q |bn | + 2 [n − r]q |bn−r | , |b1 | = 1.

(2.11)

r=1

Using Theorem 2.2, (2.11) yields, |an | ≤

  n−2  n−1  n−r−2 Y  1 Y 2 2 X 1 2 [k]q + + [n − r]q [k]q + . [n]q ! q [n]q r=1 [n − r]q ! q k=0

k=−1

This inequality gives (2.8), where A(k, q) = [k]q +

2 q

 . Thus the proof is completed.

Remark 2.5. If we take limit for q → 1− in inequality (2.8), we get |an | ≤ n for all n ≥ 2. This is the well known coefficient inequality for close-to-convex functions.

3

Fekete-Szeg¨ o Inequalities

We now investigate Fekete-Szeg¨ o inequalities for the class Cq and CC q . For our main theorems we need the following result: Lemma 3.1. ([15]) If p ∈ P with p(z) = 1 + c1 z + c2 z 2 + ..., then 2 2 c2 − c1 ≤ 2 − |c1 | . 2 2 Theorem 3.2. If f belongs to the class Cq , then 2 , [2]q q   2 2 |a3 | ≤ 1+ , [3]q [2]q q q 2 a3 − [2]q a22 ≤ . [3]q [3]q [2]q q |a2 | ≤

(3.1)

(3.2) (3.3)

These results are sharp. Proof. Using equation (2.2), we obtain a2 =

c1 c1 = [2]q ([2]q − 1) [2]q [1]q q

(3.4)

6

644

Om P. Ahuja ET AL 639-649

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

and

    c21 1 c21 1 a3 = c2 + = c2 + . [3]q ([3]q − 1) [2]q − 1 [3]q [2]q q q Taking into account Lemma 2.1 and Lemma 3.1, we obtain c1 ≤ 2 |a2 | = [2]q q [2]q q

and

(3.5)

    1 2 c2 2 |a3 | = c2 + 1 ≤ 1+ . [3]q [2]q q q [3]q [2]q q q

Furthermore, using (3.4) and (3.5), we obtain 2 a3 − [2]q a22 = c2 ≤ . [3]q [3]q [2]q q [3]q [2]q q These results are sharp for the functions Z 1+z Dq (zDq f (z)) − 2 1−q = ⇒ f (z) = (1 − z) q logq−1 dq z, Dq f (z) 1−z Z 1−q 2 Dq (zDq f (z)) 1 + z2 2 − [2]q q logq−1 = ⇒ f (z) = (1 − z ) dq z. Dq f (z) 1 − z2

(3.6) (3.7)

In fact, Theorem 3.2 gives a special case of Fekete-Szeg¨o problem for real µ = [2]q /[3]q which obtain the naturally and simple estimate. Thus the proof is completed. Motivated by the above-mentioned special case of Fekete-Szeg¨o problem, we now find the next estimate of |a3 − µa22 | for complex µ. Theorem 3.3. Let µ be a nonzero complex number and let f ∈ Cq , then     2 2 [3]q |a3 − µa22 | ≤ max 1, 1 + 1− µ . [3]q [2]q q q [2]q

(3.8)

This result is sharp. Proof. Applying (3.4) and (3.5), we have  1 c2 − a3 − µa22 = [3]q [2]q q  1 c2 − = [3]q [2]q q

 c21 c2 + 1 1+ 2 2  c21 c21 + 1+ 2 2

c21 ([2]q )2 q 2   2 [3]q [2]q q 1− µ q ([2]q )2 q 2 q



−µ

In view of Lemma 2.1 and Lemma 3.1, we get      1 |c1 |2 |c1 |2 2 [3]q |a3 − µa22 | ≤ 2− + 1 + 1 − µ [3]q [2]q q 2 2 q [2]q      1 |c1 |2 2 [3]q = 2+ 1+ 1− µ − 1 [3]q [2]q q 2 q [2]q     2 2 [3]q ≤ max 1, 1 + 1− µ . [3]q [2]q q q [2]q 7

645

Om P. Ahuja ET AL 639-649

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1−q R R − 2 1−q − 2 This result is sharp for the functions f (z) = (1−z) q logq−1 dq z and f (z) = (1−z 2 ) [2]q q logq−1 dq z.

We next consider the case, when µ is real. Then we have: Theorem 3.4. If f belongs to the class Cq , then for µ ∈ R, we have

|a3 − µa22 | ≤

   

2 [3]q [2]q q

  

2 [3]q [2]q q

[3]q  2 q 1 − [2]q µ , 2 [3]q [2]q q ,  2 2 [3]q q [2]q µ − 1 − q ,

[2]q [3]q q(2+ q2 )[2]q ≤ 2[3]q q(2+ q2 )[2]q 2[3]q

µ≤

1+

[2]q [3]q

≤µ µ≥

These results are sharp. Proof. First, let µ ≤

[2]q [3]q .

In this case (3.4), (3.5), Lemma 2.1 and Lemma 3.1 give  1 2− [3]q [2]q q  2 ≤ 1+ [3]q [2]q q

|a3 − µa22 | ≤

Let, now

[2]q [3]q

≤µ≤

q(2+ q2 )[2]q . 2[3]q

  |c1 |2 |c1 |2 2 2 [3]q + 1+ − µ 2 2 q q [2]q   2 [3]q µ . 1− q [2]q

Then using the above calculations, we have |a3 − µa22 | ≤

Finally, if µ ≥

q(2+ q2 )[2]q , 2[3]q

|a3 −

2 . [3]q [2]q q

then µa22 |

   1 |c1 |2 |c1 |2 2 [3]q 2 ≤ 2− + µ−1− [3]q [2]q q 2 2 q [2]q q    2 1 |c1 | 2 [3]q 2 ≤ 2+ µ−2− [3]q [2]q q 2 q [2]q q   2 2 [3]q 2 ≤ . µ−1− [3]q [2]q q q [2]q q

Equality is attained for the second case on choosing c1 = 0, c2 = 2 in (3.6) and for the first and third case on choosing c1 = 2, c2 = 2, c1 = 2i, c2 = −2 in (3.7), respectively. Thus the proof is completed. Remark 3.5. Taking q → 1− in Theorem 3.4, we get Fekete-Szeg¨ o inequality for convex functions which was found by Keogh and Merkes [13]. Theorem 3.6. If f belongs to the class CC q , then |a2 | ≤

2 1 (1 + ), [2]q q

(3.9)

8

646

Om P. Ahuja ET AL 639-649

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

  2 2 |a3 | ≤ 1+ , [2]q q q a3 − 1 a22 ≤ 2 . [2]q [2]q q

(3.10) (3.11)

These results are sharp. Proof. Using equation (2.10), we obtain c1 [2]q

(3.12)

c2 [2]q b2 c1 + . [3]q [3]q

(3.13)

a2 = b2 + and a3 = b3 +

Since b2 , b3 ∈ Cq , applying equations (3.4) and (3.5) in (3.12) and (3.13), respectively, we get c1 c1 + [2]q q [2]q

(3.14)

  1 c2 c2 + 1 . [2]q q q

(3.15)

a2 = and a3 =

Taking into account Lemma 2.1 and Lemma 3.1, we obtain c1 c1 2 1 + ≤ (1 + ) |a2 | = [2]q q [2]q [2]q q and

  1 2 c21 2 ≤ |a3 | = c2 + (1 + ). [2]q q q [2]q q q

Furthermore, using (3.14) and (3.15), we obtain a3 − 1 a22 = c2 ≤ 2 . [2]q [2]q q [2]q q These results are sharp for the functions Z Dq f (z) 1+z 1+z − 2 1−q = ⇒ f (z) = (1 − z) q logq−1 dq z, Dq g(z) 1−z 1−z Z 1−q 1 + z2 Dq f (z) 1 + z2 − 2 = ⇒ f (z) = (1 − z 2 ) [2]q q logq−1 dq z. 2 2 Dq g(z) 1−z 1−z

(3.16) (3.17)

This completes the proof. Theorem 3.7. Let µ be a nonzero complex number and let f ∈ CC q , then     2 2 |a3 − µa22 | ≤ max 1, 1 + 1 − [2]q µ . [2]q q q

(3.18)

This result is sharp. 9

647

Om P. Ahuja ET AL 639-649

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. Applying (3.14) and (3.15), we have  1 c2 − [2]q q  1 = c2 − [2]q q

a3 − µa22 =

 c21 c2 + 1 1+ 2 2  2 c1 c2 + 1 1+ 2 2

 2 c1 c1 −µ + [2]q q [2]q   2 [2]q q 1− µ q q 2 q



In view of Lemma 2.1 and Lemma 3.1, we obtain      2 |c1 |2 |c1 |2 1 2 2− + |a3 − µa2 | ≤ 1 + q 1 − [2]q µ [2]q q 2 2      1 2 |c1 |2 = 2+ 1 + q 1 − [2]q µ − 1 [2]q q 2     2 2 ≤ max 1, 1 + 1 − [2]q µ . [2]q q q This result is sharp for the functions given in (3.16) and (3.17). Thus the proof is completed. Remark 3.8. Taking q → 1− in Theorem 3.3 and Theorem 3.7, we obtain |a3 − µa22 | ≤

1 3 max{1, |1 + 2(1 − µ)|}, 3 2

|a3 − µa22 | ≤ max{1, |1 + 2(1 − 2µ)|}. These results are sharp.

References [1] O. P. Ahuja, The Bieberbach conjecture and its impact on the developments in geometric function theory, Math. Chronicle, 15 (1986), 1-28. [2] G. E. Andrews, Applications of basic hypergeometric functions, SIAM Rev. 16 (1974), 441-484. [3] M. Fekete and G. Szeg¨ o, Eine bemerkung uber ungerade schlichte Funktionen, J. Lond. Math. Soc. 8 (1933), 85-89. [4] N. J. Fine, Basic hypergeometric series and applications, Math. Surveys Monogr. 1988. [5] B. A. Frasin and M. Darus, On the Fekete-Szeg¨o problem, Int. J. Math. Math. Sci. 24 (2000), 577-581. [6] G. Gasper and M. Rahman, Basic hypergeometric series, Cambridge University Press, 2004. [7] A. W. Goodman, Univalent functions, Volume I and Volume II, Polygonal Pub. House, 1983. [8] F. H. Jackson, On q− functions and a certain difference operator, Trans. Roy. Soc. Edinburgh, 46 (1909), 253-281. [9] F. H. Jackson, On q− difference integrals, Quart. J. Pure Appl. Math. 41 (1910), 193-203. 10

648

Om P. Ahuja ET AL 639-649

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[10] F. H. Jackson, q− difference equations, Amer. J. Math. 32 (1910), 305-314. [11] V. Kac and P. Cheung, Quantum calculus, Springer, 2001. [12] S. Kanas and H. E. Darwish, Fekete-Szeg¨o problem for starlike and convex functions of complex order, Appl. Math. Lett. 23 (2010), 777-782. [13] S. R. Keogh and E. P. Merkes, A coefficient inequality for certain classes of analytic functions, Proc. Amer. Math. Soc. 20 (1969), 8-12. [14] A. Pfluger, Fekete-Szeg¨ o inequality for complex parameters, Complex Variables Theory Appl. 7 (1986), 149-160. [15] C. Pommerenke, Univalent Functions, Studia Mathematica Mathematische Lehrbucher, Vandenhoeck and Ruprecht, 1975. [16] T. M. Seoudy and M. K. Aouf, Coefficient estimates of new classes of q− starlike and q− convex functions of complex order, J. Math. Inequal. 10 (2016), no. 1, 135-145.

11

649

Om P. Ahuja ET AL 639-649

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Bilinear θ-Type Calder´ on-Zygmund Operators on Non-homogeneous Generalized Morrey Spaces Guanghui Lu, Shuangping Tao∗

(College of Mathematics and Statistics, Northwest Normal University, Lanzhou, Gansu, 730070, P.R. China)

Abstract: Let (X , d, µ) be a non-homogeneous metric measure space which satisfies the geometrically doubling and the upper doubling conditions in the sense of Hyt¨onen. In this paper, the authors prove that the bilinear θ-type Calder´on-Zygmund operator and its corresponding commutator are bounded on the generalized Morrey space Lp,φ (µ) for 1 < p < ∞. As an application, the authors also obtain that the bilinear θ-type Calder´ on-Zygmund operator and its commutator are bounded on the Morrey space Mpq (µ). Keywords: Non-homogeneous metric measure space, commutator, bilinear θ-type Calder´ on-Zygmund operator, RBMO(µ), generalized Morrey space. 2010 MR Subject Classification: 42B20, 42B35, 30L99.

1

Introduction

As we all know, in 2010, Hyt¨ onen [7] firstly introduced the non-homogeneous metric measure spaces including the upper doubling and the geometrically doubling conditions (see Definitions 1.1 and 1.2, respectively), to unify the homogeneous type spaces (see [1-3]) and the non-doubling measure spaces [9, 16, 18-22, 24, 27]. Since then, some properties for various of the singular integral operators and function spaces on non-homogeneous metric measure spaces have been obtained by researchers, for example, see [4-6, 8, 10-13, 17, 23, 25, 28-29] and their references. In 1985, Yabuta [26] gave out the definition of the θ-type Calder´on-Zygmund operator. Later, some researchers paid much attention to study the properties of the operator on different function spaces, for example, Ri and Zhang [16, 17] obtained the boundedness of the θ-type Calder´ on-Zygmund on Hardy spaces with non-doubling measures and non-homogeneous metric measure spaces, respectively. Besides, in 2009, Maldonado and Naibo [14] developed a theory of the bilinear Calder´on-Zygmund operator of type ω(t) and generalized the consequences of Yabuta [26]. About the further development of the bilinear Calder´on-Zygmund operator of type ω(t), we can see [28-29]. *Corresponding author and Email: [email protected] (by S. Tao); [email protected] (by G. Lu).

1

650

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

Guanghui Lu, Shuangping Tao

In this paper, let (X , d, µ) be a non-homogeneous metric measure space in the sense of Hyt¨onen [7]. The definition of the generalized Morrey space on (X , d, µ) was given out by Lu and Tao in [11], furthermore, we also obtained the boundedness of some classical singular integral operators on generalized Morrey space. In [25], Xie et al. got the boundedness of the commutators generated by the bilinear θ-type Calder´on-Zygmund operator and the spaces RBMO(µ). Inspired by this, we will study the boundedness of the bilinear θ-type Calder´on-Zygmund operator and its commutator on generalized Morrey space. Moreover, as an application, we also study the boundedness of the bilinear θ-type Calder´ on-Zygmund operator and its commutator on Morrey space. Before stating the main results of this article, we first recall some necessary notions. In [7], Hyt¨ onen originally introduced the following definition of the upper doubling metric measure space. Definition 1.1. A metric measure space (X , d, µ) is said to be upper doubling if µ is a Borel measure on X and there exist a dominating function λ : X × (0, ∞) → (0, ∞) and a positive constant Cλ such that, for each x ∈ X , r → λ(x, r) is non-decreasing and, for all x ∈ X and r ∈ (0, ∞), r µ(B(x, r)) ≤ λ(x, r) ≤ Cλ λ(x, ). (1.1) 2 ˜ such that Hyt¨onen et al. [10] have showed that, there is another dominating function λ ˜ λ ≤ λ, Cλ˜ ≤ Cλ and ˜ r) ≤ C ˜ λ(y, ˜ r), λ(x, (1.2) λ where x, y ∈ X and d(x, y) ≤ r. If there is no special instruction in this article, we always assume λ that in (1.1) satisfies (1.2). Coifaman and Weiss in [2] firstly introduced the notion of the geometrically doubling as follows, which is well known in analysis on metric spaces. Definition 1.2. A metric space (X , d) is said to be geometrically doubling, if there exists some N0 ∈ N such that, for any ball B(x, r) ⊂ X , there exists a finite ball covering {B(xi , 2r )}i of B(x, r) such that the cardinality of this covering is at most N0 . Assume (X , d) is a metric space. In [7], Hyt¨onen proved the following statements are mutually equivalent: (1) (X , d) is geometrically doubling. (2) For any  ∈ (0, 1) and any ball B(x, r) ⊂ X , there is a finite ball covering {B(xi , r)}i of B(x, r) such that the cardinality of this covering is at most N0 −n , where n := log2 N0 . (3) For any  ∈ (0, 1), any ball B(x, r) ⊂ X contains at most N0 −n centers of disjoint balls {B(xi , r)}i . (4) There is M ∈ N such that any ball B(x, r) ⊂ X contains at most M centers {xi }i of disjoint balls {B(xi , 4r )}M i=1 . Now we recall the definition of the coefficient KB,S given in [7], which is analogous to the number KQ,R introduced by Tolsa in [20, 21], i.e., for any two balls B ⊂ S in X , set Z 1 KB,S := 1 + dµ(x), (1.3) 2S\B λ(cB , d(x, cB )) 651

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

3 where cB is the center of the ball B. Though the measure doubling condition is not assumed uniformly for all balls on (X , d, µ), it was showed in [7] that there are many balls satisfying the property of the (α, η)doubling, i.e., a ball B ⊂ X is said to belong to (α, η)-doubling if µ(αB) ≤ ηµ(B), for α, η > 1. In the latter of this paper, unless α and ηα are specified, otherwise, by an (α, ηα )3 log 6 doubling ball we mean a (6, β6 )-doubling ball with a fixed number η6 > max{Cλ 2 , 6n }, where n := log2 N0 is viewed as a geometric dimension of the space. In addition, the ˜ 6 , and B ˜ 6 is smallest (6, η6 )-doubling ball of the from 6j B with j ∈ N is denoted by B ˜ simply denoted by B. Now we need to recall the following definition of RBMO(µ) from [7]. Definition 1.3. Let ρ ∈ (1, ∞). A function f ∈ L1loc (µ) is said to be in the space RBMO(µ) if there exist a positive constant and, for any ball B ⊂ X , a number fB such that Z 1 |f (x) − fB |dµ(x) ≤ C (1.4) µ(ρB) B and, for any two balls B and S such that B ⊂ S |fB − fS | ≤ CKB,S .

(1.5)

The infimum of the positive constants C satisfying both (1.4) and (1.5) is defined to be the RBMO(µ) norm of f and denoted by kf kRBMO(µ) . The following notion of the bilinear θ-type Calder´on-Zygmund operator is given in [25]. Definition 1.4. Let θ be a non-negative and non-decreasing function on (0, ∞) satisfying Z 1 θ(t) dt < ∞. t 0 A kernel K(·, ·, ·) ∈ L1loc (X 3 \ {(x, y1 , y2 ) : x = y1 = y2 }) is called the bilinear θ-type Calder´on-Zygmund kernel if it satisfies the following conditions: (1) for all (x, y1 , y2 ) ∈ X 3 with x 6= yi for i = 1, 2, " 2 #−2 X |K(x, y1 , y2 )| ≤ C λ(x, d(x, yi )) ; (1.6) i=1

(2) there exists a positive constant C such that, for all x, x0 , y1 , y2 ∈ X with Cd(x, x0 ) ≤ max1≤i≤2 d(x, yi ), !" 2 #−2 0) X d(x, x |K(x, y1 , y2 ) − K(x0 , y1 , y2 )| ≤ θ P2 λ(x, d(x, yi )) . (1.7) i=1 d(x, yi ) i=1 ∞ Let L∞ b (µ) be the space of all L (µ) functions with bounded support. A bilinear operator Tθ is called a bilinear θ-type Calder´ on-Zygmund operator with kernel K satisfying T2 (1.6) and (1.7) if, for all f1 , f2 ∈ L∞ (µ) and x ∈ / suppf i, i=1 b Z Z Tθ (f1 , f2 )(x) := K(x, y1 , y2 )f1 (y1 )f2 (y2 )dµ(y1 )dµ(y2 ). (1.8) X

X

652

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

Guanghui Lu, Shuangping Tao

The commutator closely related to the bilinear θ-type Calder´on-Zygmund operator Tθ and b1 , b2 ∈ RBMO(µ) is defined by [b1 , b2 , Tθ ](f1 , f2 )(x) := b1 (x)b2 (x)Tθ (f1 , f2 )(x) − b1 (x)Tθ (f1 , b2 f2 )(x) −b2 (x)Tθ (b1 f1 , f2 )(x) + Tθ (b1 f1 , b2 f2 )(x).

(1.9)

Also, [b1 , Tθ ] and [b2 , Tθ ] are defined as follows, respectively: [b1 , Tθ ](f1 , f2 )(x) = b1 (x)Tθ (f1 , f2 )(x) − Tθ (b1 f1 , f2 )(x),

(1.10)

[b2 , Tθ ](f1 , f2 )(x) = b2 (x)Tθ (f1 , f2 )(x) − Tθ (f1 , b2 f2 )(x).

(1.11)

Now we recall the definition of the generalized Morrey space Lp,φ (µ) from [11]. Definition 1.5. Let κ > 1 and 1 ≤ p < ∞. Suppose that φ : (0, ∞) → (0, ∞) is an increasing function. Then the generalized Morrey space Lp,φ (µ) is defined by Lp,φ (µ) := {f ∈ Lploc (µ) : kf kLp,φ (µ) < ∞}, where kf kLp,φ (µ) := sup B

1 φ(µ(κB))

Z

!1

p

|f (x)|p dµ(x)

.

(1.12)

B

From [11, Remark 1.7], it follows that the generalized Morrey space Lp,φ (µ) is independent of the choice of κ > 1. The following definition of the -weak reverse doubling condition is from [5]. Definition 1.6. Let  ∈ (0, ∞). A dominating function λ is said to satisfy the -weak reverse doubling condition if, for all s ∈ (0, 2diam(X )) and a ∈ (1, 2diam(X )/s), there exists a number C(a) ∈ [1, ∞), depending only a and X , such that, λ(x, as) ≥ C(a)λ(x, s), x ∈ X ,

(1.13)

and, moreover, ∞ X k=1

1 < ∞. [C(ak )]

(1.14)

Now we can state the main theorems of this article as follows. Theorem 1.7. Let 1 < p1 , p2 < ∞, p1 = p11 + p12 , K satisfy (1.6) and (1.7), λ satisfy the -weak reverse doubling condition, and let φ : (0, ∞) → (0, ∞) be an increasing function. Suppose that Tθ is a bilinear Calder´ on-Zygmund operator and is bounded from L1 (µ) × 1 φ(t) L1 (µ) to L 2 ,∞ (µ), the mapping t 7→ t is almost decreasing and there is a constant C > 0 such that φ(t) φ(s) ≤C (1.15) t s 653

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

5 for s ≥ t, in addition, φ also satisfies the following condition Z ∞ φ(t) dt φ(r) ≤C , for all r > 0. t t r r Then there exists a positive constant C, such that, for all fi ∈ Lpi ,φ (µ) with i = 1, 2, kTθ (f1 , f2 )kLp,φ (µ) ≤ Ckf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) . Theorem 1.8. Under the same assumption of Theorem 1.7. Suppose that b1 , b2 ∈ RBMO(µ), and [b1 , b2 , Tθ ](f1 , f2 ) is as in (1.9). Then there is a positive constant C, such that, for all fi ∈ Lpi ,φ (µ) with i = 1, 2, k[b1 , b2 , Tθ ](f1 , f2 )kLp,φ (µ) ≤ Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) . 1− p

In particular, if we take φ(t) = t q with 1 ≤ p ≤ q < ∞ and t > 0 in Definition 1.5, the generalized Morrey space is just Morrey space which was established by Cao and Zhou in [4], that is, for k > 1 and 1 ≤ p ≤ q < ∞, the Morrey space Mpq (µ) is defined as Mpq (µ) := {f ∈ Lploc (µ) : kf kMpq (µ) < ∞} with the norm kf kMpq (µ) := sup[µ(kB)]

!1

p

Z

1 − p1 q

B

|f (x)|p dµ(x)

.

(1.16)

B

Furthermore, based on the results of Theorems 1.7-1.8, it is not hard to find that the bilinear θ-type Calder´on-Zygmund operator also holds on the Morrey space Mpq (µ). Theorem 1.9. Assume that Tθ is a bilinear θ-type Calder´ on-Zygmund operator, and K satisfies (1.6) and (1.7). Suppose that Tθ is a bounded operator from L1 (µ) × L1 (µ) to 1 L 2 ,∞ (µ), then there exists a positive constant C, such that, for all fi ∈ Mpqii (µ) with i = 1, 2, kTθ (f1 , f2 )kMpq (µ) ≤ Ckf1 kMpq1 (µ) kf2 kMpq2 (µ) , 1

where 1 < pi ≤ qi and

1 p

=

1 p1

+

1 p2

and

1 q

=

1 q1

+

2

1 q2 .

Theorem 1.10. Let b1 , b2 ∈ RBMO(µ), K satisfy (1.6) and (1.7). Assume λ satisfy the -weak reverse doubling condition, f1 ∈ Mpq11 (µ) and f2 ∈ Mpq22 (µ). If Tθ is a bounded 1 operator from L1 (µ) × L1 (µ) to L 2 ,∞ (µ), then there is a constant C > 0 such that k[b1 , b2 , Tθ ](f1 , f2 )kMpq (µ) ≤ Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kMpq1 (µ) kf2 kMpq2 (µ) . 1

where 1 < pi ≤ qi < ∞ for i = 1, 2,

1 p

=

1 p1

+

1 p2

and

1 q

=

1 q1

+

2

1 q2 .

Throughout the paper C will denote a positive constant whose value may change at each appearance. For a µ-measurable set E, χE denotes its characteristic function. For any p ∈ [1, ∞], we denote by p0 its conjugate index, that is, p1 + p10 = 1. 654

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

2

Guanghui Lu, Shuangping Tao

Preliminaries

In this section, we need to recall some preliminary lemmas which will be used in the proofs of our main theorems. Firstly, we recall the following useful properties of KB,S from [7]. Lemma 2.1. (1) For all balls B ⊂ R ⊂ S, it holds true that KB,R ≤ KB,S . (2) For any ξ ∈ [1, ∞), there exists a positive constant Cξ , depending on ξ, such that, for all balls B ⊂ S with rS ≤ ξrB , KB,S ≤ Cξ . (3) For any % ∈ (1, ∞), there exists a positive constant C% , depending on %, such that, for all balls B,KB,Be % ≤ C% . (4) There is a positive constant c such that, for all balls B ⊂ R ⊂ S,KB,S ≤ KB,R + cKR,S . In particular, if B and R are concentric, then c = 1. (5) There exists a positive constant e c such that, for all balls B ⊂ R ⊂ S,KB,R ≤ e cKB,S ; moreover, if B and R are concentric, then KR,S ≤ KB,S . Next, we need recall the boundedness of the bilinear θ-type Calder´on-Zygmund Tθ and its commutator [b1 , b2 , Tθ ](f1 , f2 ) on Lebesgue space Lp (µ), see [28, 25], respectively. Lemma 2.2. Let K satisfy (1.6) and (1.7), 1 < p1 , p2 < ∞,

1 p

1

=

1 p1

+ p12 , f1 ∈ Lp1 (µ) and

f2 ∈ Lp2 (µ). If Tθ is bounded from L1 (µ) × L1 (µ) to L 2 ,∞ (µ), then there exists a positive constant C such that kTθ (f1 , f2 )kLp (µ) ≤ Ckf1 kLp1 (µ) kf2 kLp2 (µ) . Lemma 2.3. Let 1 < p1 , p2 < ∞, p1 = p11 + p12 , b1 , b2 ∈ RBMO(µ). Assume that R R fR1 ∈ Lp1 (µ), f2 ∈ Lp2 (µ) with RX Tθ (f1 , f2 )(x)dµ(x) = 0, X [b1 , Tθ ](f1 , f2 )(x)dµ(x) = 0, X [b2 , Tθ ](f1 , f2 )(x)dµ(x) = 0, X [b1 , b2 , Tθ ](f1 , f2 )(x)dµ(x) = 0 if kµk < ∞. If Tθ is a 1 bounded from L1 (µ) × L1 (µ) to L 2 ,∞ (µ), then there exists a constant C > 0 such that k[b1 , b2 , Tθ ](f1 , f2 )kLp (µ) ≤ Ckf1 kLp1 (µ) kf2 kLp2 (µ) . Nakai [15] introduced the following lemma which ensures that the integrability of the functions can be boostered automatically. Lemma 2.4. Suppose that ψ : (0, ∞) → (0, ∞) be a function satisfying Z



ψ(s) r

ds ≤ Cψ(r) for all r > 0. s

R∞ Then there exists ε > 0 such that r ψ(s)sε ds ≤ Cψ(r)rε for all r > 0. In particular, for R∞s η every η ≤ 1, there exists c > 0 such that r [ψ(s)]η ds s ≤ C[ψ(r)] for all r > 0. Finally, we recall the following equivalent characterization of RBMO(µ) in [6]. 655

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

7 Lemma 2.5. Suppose that 1 ≤ r < ∞ and 1 < ρ < ∞. Then f ∈ RBMO(µ) if and only if for any ball B ⊂ X , !r Z 1 r |f (x) − mBe (f )| dµ(x) ≤ CkbkRBMO(µ) , (2.1) µ(ρB) B and for any doubling B ⊂ S, |mB (f ) − mS (f )| ≤ Ckf kRBMO(µ) ,

(2.2)

where mB (f ) is the mean value of f on B, namely, Z 1 mB (f ) := f (x)dµ(x). µ(B) B Moreover, the infimum of the positive constants C satisfying both (2.1) and (2.2) is an equivalent RBMO(µ) norm of f .

3

Proofs of the main results

Proof of Theorem 1.7. Without loss of generality, we may assume that κ = 6 in (1.12). Fix a doubling ball B ∈ X , and decompose each fi as fi = fi0 + fi∞ for i = 1, 2, where fi0 := fi χ6B and fi∞ := fi χX \6B . Then, by Minkowski inequality, we have 1 φ(µ(6B)) ≤

!1

p

Z

p

|Tθ (f1 , f2 )(x)| dµ(x) B

1 φ(µ(6B))

1 + φ(µ(6B))

!1

p

Z

|Tθ (f10 , f20 )(x)|p dµ(x)

+

B

!1

p

Z

|Tθ (f1∞ , f20 )(x)|p dµ(x)

+

B

!1

p

1 φ(µ(6B))

Z

1 φ(µ(6B))

Z

|Tθ (f10 , f2∞ )(x)|p dµ(x)

B

!1

p

|Tθ (f1∞ , f2∞ )(x)|p dµ(x)

B

=: D1 + D2 + D3 + D4 . By applying Lemma 2.2 and Definition 1.5, one has D1 =

1 φ(µ(6B))

Z

!1

p

|Tθ (f10 , f20 )(x)|p dµ(x)

B

1

≤C

1 + p1 p1 2

kf10 kLp1 (µ) kf20 kLp2 (µ)

[φ(µ(6B))] ≤ Ckf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) . Now let us turn to estimate D2 . For any x ∈ B, y1 ∈ 6B and y2 ∈ X \ 6B, we have λ(x, d(x, y1 )) ≤ λ(x, d(x, y2 )). By (1.6), (1.12), H¨ older inequality and (1.13), one has Z Z |Tθ (f10 , f2∞ )(x)| ≤ |f1 (y1 )| |K(x, y1 , y2 )||f2 (y)|dµ(y2 )dµ(y1 ) 6B

X \6B

656

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

Guanghui Lu, Shuangping Tao

Z

Z

≤C

|f1 (y1 )| X \6B

6B

Z

Z |f1 (y1 )|

≤C

X \6B

6B

|f2 (y)| dµ(y2 )dµ(y1 ) [λ(x, d(x, y1 )) + λ(x, d(x, y2 ))]2 |f2 (y)| dµ(y2 )dµ(y1 ) [λ(x, d(x, y2 ))]2

|f2 (y)| dµ(y2 )dµ(y1 ) [λ(x, d(x, y2 ))]2 X \6B 6B ! Z ∞ Z X |f2 (y)| ≤C |f1 (y1 )|dµ(y1 ) dµ(y2 ) 2 k+1 B\6k B [λ(x, d(x, y2 ))] 6B 6 k=1 !1 Z Z

Z

|f1 (y1 )|

≤C

p1

p1

≤C

|f1 (y1 )| dµ(y1 )

1− p1

[µ(6B)]

1

6B

( ×

∞ X k=1

1 [λ(x, 6k r)]2

!

Z

|f2 (y)|p2 dµ(y2 )

1 p2

1− p1

[µ(6k+1 B)]

)

2

6k+1 B

!1 Z p1 1 1− 1 ≤C |f1 (y1 )|p1 dµ(y1 ) [µ(6B)] p1 λ(x, r) 6B ( ∞ !1 ) Z p2 X 1 1 1− p1 p2 k+1 |f2 (y)| dµ(y2 ) [µ(6 B)] 2 × [C(6k )] λ(x, 6k r) k+1 B 6 k=1 " #1 φ(µ(6B)) p1 ≤ Ckf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) µ(6B) ( ∞ #1) " X 1 φ(µ(6k+2 B)) p2 × , [C(6k )] µ(6k+2 B) k=1

further, by condition (1.14), (1.15) and

1 p

=

1 p1

+

1 p2 ,

it follows that

#1 " #1 µ(6B) p φ(µ(6B)) p1 D2 ≤ Ckf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) φ(µ(6B)) µ(6B) ( ∞ " #1) X 1 φ(µ(6k+2 B)) p2 × [C(6k )] µ(6k+2 B) "

k=1

≤ Ckf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) . With an argument similar to that used in the proof of D2 , we can easily obtain D3 ≤ Ckf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) . It remains to estimate D4 . Firstly, consider |Tθ (f1∞ , f2∞ )(x)|, for any x ∈ B, by condition (1.6), we have Z Z ∞ ∞ |Tθ (f1 , f2 )(x)| ≤ |K(x, y1 , y2 )||f1∞ (y1 )||f2∞ (y2 )|dµ(y1 )dµ(y2 ) X

X

657

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

9 |f1 (y1 )||f2 (y2 )| dµ(y1 )dµ(y2 ) 2 X \6B X \6B [λ(x, d(x, y1 )) + λ(x, d(x, y2 ))] ! ∞ Z ∞ Z X X |f1 (y1 )||f2 (y2 )| ≤C dµ(y1 ) dµ(y2 ) 2 k+1 B\6k B j+1 B\6j B [λ(x, d(x, y1 )) + λ(x, d(x, y2 ))] j=1 6 k=1 6 ! ∞ Z k−1 Z X X |f2 (y2 )| ≤C |f1 (y1 )|dµ(y1 ) dµ(y2 ) 2 k+1 B\6k B [λ(x, d(x, y2 ))] j+1 B\6j B j=1 6 k=1 6 ! ∞ Z ∞ Z X X |f1 (y1 )| +C |f2 (y2 )| dµ(y1 ) dµ(y2 ) 2 6k+1 B\6k B 6j+1 B\6j B [λ(x, d(x, y1 ))] Z

Z

≤C

k=1

j=k

=: E1 + E2 . For E1 . By applying the H¨older inequality and (1.12), we have ! k−1 Z ∞ Z X X |f1 (y1 )| |f2 (y2 )| dµ(y1 ) dµ(y2 ) E1 ≤ C j+1 B\6j B λ(x, d(x, y1 )) k+1 B\6k B λ(x, d(x, y2 )) j=1 6 k=1 6 ! Z k−1 ∞ Z X X |f2 (y2 )| 1 |f1 (y1 )|dµ(y1 ) dµ(y2 ) ≤C λ(x, 6j r)) 6j+1 B\6j B 6k+1 B\6k B λ(x, d(x, y2 )) j=1

k=1

≤C

∞ X k=1

1 λ(x, 6k B)

( k−1 X × j=1

!

Z

p2

1 p2

|f2 (y2 )| dµ(y2 )

1− p1

[µ(6k+1 B)]

2

6k+1 B

1 λ(x, 6j r))

!

Z

p1

j+1

|f1 (y1 )| dµ(y1 ) [µ(6

1− p1

B)]

)

1

6j+1 B

( ≤ Ckf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ)

" # 1 )( k−1 " #1) ∞ X X φ(µ(6j+1 B)) p1 φ(µ(6k+1 B)) p2 µ(6j+1 B) µ(6k+1 B) j=1

k=1

#1"

∞ X φ(µ(6k+1 B)) p2 φ(µ(6k+1 B)) ≤ Ckf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) µ(6k+1 B) µ(6k+1 B) k=1 ( ∞ " #1 ) X φ(µ(6k+1 B)) p ≤ Ckf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) µ(6k+1 B)

(

"

#1) p1

k=1

An argument similar to that used in the above proof, it is not difficult to obtain ( ∞ " #1 ) X φ(µ(6k+1 B)) p E2 ≤ Ckf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) . µ(6k+1 B) k=1

R∞

Moreover, by applying the assumption r " #1 ∞ X φ(µ(6k+1 B)) p k=1

µ(6k+1 B)

φ(t) dt t t

≤ C φ(r) r and Lemma 2.4, lead to " #1 φ(µ(62 B)) p ≤C , µ(62 B)

658

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

Guanghui Lu, Shuangping Tao

combining the estimates for E1 and E2 , and condition (1.15), it follows that #1 (

" #1 ) ∞ X φ(µ(6k+1 B)) p D4 ≤ Ckf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) µ(6k+1 B) k=1 #1 " #1 " µ(6B) p φ(µ(62 B)) p ≤ Ckf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) φ(µ(6B)) µ(62 B) "

µ(6B) φ(µ(6B))

p

≤ Ckf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) , which, summing up the estimates for D1 , D2 and D3 , the proof of Theorem 1.7 is finished. Proof of Theorem 1.8. We decompose fi as fi = fi0 + fi∞ in the proof of Theorem 1.7, where fi0 := fi χ6B , i = 1, 2. Then 1 φ(µ(6B)) ≤

!1

p

Z

p

|[b1 , b2 , Tθ ](f1 , f2 )(x)| dµ(x) B

1 φ(µ(6B))

!1

p

Z

|[b1 , b2 , Tθ ](f10 , f20 )(x)|p dµ(x)

B

1 + φ(µ(6B))

Z

1 + φ(µ(6B))

Z

1 + φ(µ(6B))

Z

!1

p

|[b1 , b2 , Tθ ](f10 , f2∞ )(x)|p dµ(x)

B

!1

p

|[b1 , b2 , Tθ ](f1∞ , f20 )(x)|p dµ(x)

B

!1

p

|[b1 , b2 , Tθ ](f1∞ , f2∞ )(x)|p dµ(x)

B

=: F1 + F2 + F3 + F4 . From Lemma 2.3, Definition 1.5 and

1 p

=

1 p1

+

1 p2 ,

it follows that,

1

F1 ≤ Ckb1 kRBMO(µ) kb2 kRBMO(µ)

1 p

kf10 kLp1 (µ) kf20 kLp2 (µ)

[φ(µ(6B))] ≤ Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) .

In order to estimate F2 , we firstly consider [b1 , b2 , Tθ ](f10 , f2∞ )(x). For any x ∈ B, write |[b1 , b2 , Tθ ](f10 , f2∞ )(x)| Z Z ≤ |b1 (x) − b1 (y1 )||f1 (y1 )| 6B

Z ≤C

|K(x, y1 , y2 )||b2 (x) − b2 (y2 )||f2 (y2 )|dµ(y2 )dµ(y1 )

X \6B

Z |b1 (x) − b1 (y1 )||f1 (y1 )|

6B

X \6B

|b2 (x) − b2 (y2 )||f2 (y2 )| dµ(y2 )dµ(y1 ) [λ(x, d(x, y1 )) + λ(x, d(x, y2 ))]2 659

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

11 Z ≤C

|b1 (x) − b1 (y1 )||f1 (y1 )| 6B

∞ Z X 6k+1 B\6k B

k=1

! |b2 (x) − b2 (y2 )||f2 (y2 )| dµ(y2 ) dµ(y1 ) [λ(x, d(x, y2 ))]2

≤ C|b1 (x) − m6B f (b1 )||b2 (x) − m6B f (b2 )| ! Z Z ∞ X |f2 (y2 )| |f1 (y1 )| × dµ(y2 ) dµ(y1 ) 2 6B 6k+1 B\6k B [λ(x, d(x, y2 ))] k=1

+C|b1 (x) − m6B f (b1 )| Z ∞ Z X |f1 (y1 )| × 6B

k=1

6k+1 B\6k B

! |b2 (y2 ) − m6B f (b2 )||f2 (y2 )| dµ(y2 ) dµ(y1 ) [λ(x, d(x, y2 ))]2

+C|b2 (x) − m6B f (b2 )| Z ∞ Z X × |b1 (y1 ) − m6B f (b1 )||f1 (y1 )| 6B

k=1

6k+1 B\6k B

! |f2 (y2 )| dµ(y2 ) dµ(y1 ) [λ(x, d(x, y2 ))]2

Z +C ×

|b1 (y1 ) 6B ∞ Z X k=1

− m6B f (b1 )||f1 (y1 )|

6k+1 B\6k B

! |b2 (y2 ) − m6B f (b2 )||f2 (y2 )| dµ(y2 ) dµ(y1 ) [λ(x, d(x, y2 ))]2

=: G1 + G2 + G3 + G4 . With an argument similar to that used in the proof of D2 in Theorem 1.7, it follows that G1 ≤ Ckf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) |b1 (x) − m6B f (b1 )||b2 (x) − m6B f (b2 )| " #1( ∞ #1) " φ(µ(6B)) p1 X 1 φ(µ(6k+2 B)) p2 × . µ(6B) [C(6k )] µ(6k+2 B) k=1

By applying the H¨older inequality, (1.14), (2.1), we have Z 1 G2 ≤ C|b1 (x) − m6B |f1 (y1 )|dµ(y1 ) f (b1 )| λ(x, r) 6B ! Z ∞ X 1 1 × |b2 (y2 ) − m6B f (b2 )||f2 (y2 )|dµ(y2 ) [C(6k )] λ(x, 6k r)) 6k+1 B k=1 !1 Z − p1

≤ C|b1 (x) − m6B f (b1 )|[µ(12B)] " ×

∞ X k=1

1 1 [C(6k )] λ(x, 6k r))

|f1 (y1 )|p1 dµ(y1 )

1

p1

6B

Z 6k+1 B

|b2 (y2 ) − m ^ (b2 )| k+1 6

!

B

#

+|m ^ (b2 ) − m6B f (b2 )| |f2 (y2 )|dµ(y2 ) k+1 6

B

660

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12

Guanghui Lu, Shuangping Tao

#1" ∞ φ(µ(12B)) p1 X 1 1 ≤ Ckf1 kLp1 ,φ (µ) |b1 (x) − m6B f (b1 )| k  µ(12B) [C(6 )] λ(x, 6k r)) k=1 ! # Z × |b2 (y2 ) − m ^ (b2 )| + kkb2 kRBMO(µ) |f2 (y2 )|dµ(y2 ) k+1 "

6

6k+1 B

B

"

φ(µ(12B)) ≤ Ckf1 kLp1 ,φ (µ) |b1 (x) − m6B f (b1 )| µ(12B) " Z !1 Z p2

×

#1( p1

∞ X k=1

1 1 k  [C(6 )] λ(x, 6k r)) !

p2

|f2 (y2 )| dµ(y2 ) 6k+1 B

6k+1 B

p02

|b2 (y2 ) − m ^ (b2 )| dµ(y2 ) k+1 6

1 p02

B

! 1 #) k+1 B)) p2 φ(µ(6 +kkb2 kRBMO(µ) kf2 kLp2 ,φ (µ) µ(6k+1 B) µ(6k+1 B) " #1" ∞ φ(µ(12B)) p1 X k + 1 1 ≤ Ckf1 kLp1 ,φ (µ) |b1 (x) − m6B f (b1 )| k  µ(12B) [C(6 )] λ(x, 6k r)) k=1 !1# φ(µ(6k+1 B)) p2 k+1 ×kb2 kRBMO(µ) kf2 kLp2 ,φ (µ) µ(6 B) µ(6k+1 B) " #1 φ(µ(12B)) p1 ≤ Ckb2 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) |b1 (x) − m6B f (b1 )| µ(12B) !1# " ∞ X k+1 φ(µ(6k+1 B)) p2 × , [C(6k )] µ(6k+1 B) k=1

where we have used the following fact that |m ^ (b2 ) − m6B f (b2 )| ≤ C(k + 1)kb2 kRBMO(µ) . k+1 6

(3.1)

B

By applying (1.12), the H¨older inequality, (1.14) and (2.1), one has Z 1 G3 ≤ C|b2 (x) − m6B |b1 (y1 ) − m6B f (b2 )| f (b1 )||f1 (y1 )|dµ(y1 ) λ(x, r) 6B ! Z ∞ X 1 1 × |f2 (y2 )|dµ(y2 ) [C(6k )] λ(x, 6k r) 6k+1 B k=1 " #1 φ(µ(12B)) p1 ≤ Ckb1 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) |b2 (x) − m6B f (b2 )| µ(12B) " ∞ !1# X 1 φ(µ(6k+1 B)) p2 × . [C(6k )] µ(6k+1 B) k=1

661

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

13 It remains to estimate G4 . By (1.12), the H¨older inequality, (1.14), (2.1) and (3.1), we have Z 1 G4 ≤ C |b1 (y1 ) − m6B f (b1 )||f1 (y1 )|dµ(y1 ) λ(x, r) 6B ! Z ∞ X 1 1 |b2 (y2 ) − m6B × f (b2 )||f2 (y2 )|dµ(y2 ) [C(6k )] λ(x, 6k r) 6k+1 B k=1 " #1 φ(µ(12B)) p1 ≤ Ckb1 kRBMO(µ) kf1 kLp1 ,φ (µ) µ(12B) " ∞ Z X 1 1 × |b2 (y2 ) − m ^ (b2 )||f2 (y2 )|dµ(y2 ) k  6k+1 B [C(6 )] λ(x, 6k r) 6k+1 B k=1 !# Z +|m ^ (b2 ) − m6B |f2 (y2 )|dµ(y2 ) f (b2 )| k+1 6

B

6k+1 B

"

φ(µ(12B)) µ(12B)

#

1 p1

"

φ(µ(12B)) µ(12B)

#

1 p1

≤ Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) ∞ X k + 1 µ(6k+1 B) × [C(6k )] λ(x, 6k r)

"

k=1

φ(µ(6k+1 B)) µ(6k+1 B)

!1# p2

≤ Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) ∞ X k+1 × [C(6k )]

"

k=1

φ(µ(6k+1 B)) µ(6k+1 B)

!1# p2

.

Thus, by applying the estimates of G1 , G2 , G3 and G4 , the H¨older inequality and the fact φ(s) that φ(t) t ≤ C s with s ≥ t, it follows that

F2 =

1 φ(µ(6B))

!1

p

Z

|[b1 , b2 , Tθ ](f10 , f2∞ )(x)|p dµ(x)

B

!1

p

Z ≤ Ckf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) − p1

×[φ(µ(6B))]

"

p

B

φ(µ(6B)) µ(6B)

p

|b1 (x) − m6B f (b1 )| |b2 (x) − m6B f (b2 )| dµ(x)

#1( p1

∞ X k=1

" #1) 1 φ(µ(6k+2 B)) p2 [C(6k )] µ(6k+2 B)

+Ckb2 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ)

1 φ(µ(6B))

662

Z B

!1

p

p |b1 (x) − m6B f (b1 )| dµ(x)

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14

Guanghui Lu, Shuangping Tao

"

φ(µ(12B)) × µ(12B)

#1" p1

∞ X k+1 [C(6k )] k=1

φ(µ(6k+1 B)) µ(6k+1 B)

!1# p2

!1 Z p 1 p +Ckb1 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) |b2 (x) − m6B (b )| dµ(x) 2 f φ(µ(6B)) B " #1" ∞ !1# φ(µ(6k+1 B)) p2 φ(µ(12B)) p1 X k + 1 × µ(12B) [C(6k )] µ(6k+1 B) k=1 #1 " µ(6B) p +Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) φ(µ(6B)) !1# " #1" ∞ φ(µ(6k+1 B)) p2 φ(µ(12B)) p1 X k + 1 × µ(12B) [C(6k )] µ(6k+1 B) k=1 " #1 µ(6B) p ≤ Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) φ(µ(6B)) #1( ∞ " #1) " 1 φ(µ(6k+2 B)) p2 φ(µ(6B)) p1 X × µ(6B) [C(6k )] µ(6k+2 B) k=1 " #1 µ(6B) p +Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) φ(µ(6B)) #1" ∞ !1# " φ(µ(12B)) p1 X k + 1 φ(µ(6k+1 B)) p2 × µ(12B) [C(6k )] µ(6k+1 B) k=1

≤ Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) , where p1 = p11 + p12 . Similarly, it is not difficult to obtain F3 ≤ Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) . Now let us turn to estimate F4 . For any x ∈ B, write |[b1 , b2 , Tθ ](f1∞ , f2∞ )(x)| ≤ |b1 (x) − mBe (b1 )||b2 (x) − mBe (b2 )||Tθ (f1∞ , f2∞ )(x)| +|b1 (x) − mBe (b1 )||Tθ (f1∞ , (b2 − mBe (b2 )f2∞ )(x)|

+|b2 (x) − mBe (b2 )||Tθ ((b1 − mBe (b1 )f1∞ , f2∞ )(x)| +|Tθ ((b1 − mBe (b1 )f1∞ , (b2 − mBe (b2 )f2∞ )(x)|

=: H1 + H2 + H3 + H4 . 663

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

15 An argument similar to that used in the proof of D4 in the Theorem 1.7, we have ( H1 ≤ C|b1 (x) − mBe (b1 )||b2 (x) − mBe (b2 )|kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ)

" #1 ) ∞ X φ(µ(6k+1 B)) p . µ(6k+1 B) k=1

With a slight modified argument similar to that used in the proof of J21 in [25], it is not difficult to obtain that #1 φ(µ(6B)) p H2 + H3 + H4 ≤ C|b1 (x) − mBe (b1 )|kb2 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) µ(6B) #1 " φ(µ(6B)) p +C|b2 (x) − mBe (b2 )|kb1 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) µ(6B) " #1 φ(µ(6B)) p . +Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) µ(6B) "

Further, by applying the H¨older inequality, Definition 1.5 and (2.1), we can deduce that ( F4 ≤ Ckf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ)

" #1 ) ∞ X φ(µ(6k+1 B)) p µ(6k+1 B) k=1

1 × φ(µ(6B))

Z B

!1

p

p

p

|b1 (x) − mBe (b1 )| |b2 (x) − mBe (b2 )| dµ(x) "

+Ckb2 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) 1 × φ(µ(6B))

Z B

B

p

p

+Ckb1 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) Z

#1

|b1 (x) − mBe (b1 )|p dµ(x) "

1 × φ(µ(6B))

φ(µ(6B)) µ(6B) !1

φ(µ(6B)) µ(6B) !1

#1

p

p

|b1 (x) − mBe (b1 )|p dµ(x) "

+Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ)

φ(µ(6B)) µ(6B)

#1 " p

φ(µ(6B)) µ(6B)

#− 1

p

≤ Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kLp1 ,φ (µ) kf2 kLp2 ,φ (µ) . Which, combining the estimates of F1 , F2 and F3 , the proof of Theorem 1.8 is finished.

664

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

16

Guanghui Lu, Shuangping Tao

Remark 3.1. With an argument similar to those used in the proof of Theorem 1.6 in [28] and Remarks 6-7 in [25], it is not difficult to obtain Theorem 1.9. Thus, we omit the details in this article. Proof of Theorem 1.10. Without loss of generality, we assume that k = 6 in (1.16), and decompose f1 as fi = fi0 + fi∞ as in Theorem 1.7, where fi0 := fi χ6B . Then

[µ(6B)]

!1

p

Z

1 − p1 q

|[b1 , b2 , Tθ ](f1 , f2 )(x)|p dµ(x)

B

≤ [µ(6B)]

!1

p

Z

1 − p1 q

|[b1 , b2 , Tθ ](f10 , f20 )(x)|p dµ(x)

B

+[µ(6B)]

1 − p1 q

Z

!1

p

|[b1 , b2 , Tθ ](f10 , f2∞ )(x)|p dµ(x)

B

+[µ(6B)]

1 − p1 q

Z

!1

p

|[b1 , b2 , Tθ ](f1∞ , f20 )(x)|p dµ(x)

B

+[µ(6B)]

1 − p1 q

Z

!1

p

|[b1 , b2 , Tθ ](f1∞ , f2∞ )(x)|p dµ(x)

B

=: I1 + I2 + I3 + I4 . By applying Lemma 2.3,

1 p

=

1 p1

+

1 p2

and

1 q

=

1 q1

1

− p1

kf10 kLp1 (µ) kf20 kLp2 (µ)

I1 ≤ Ckb1 kRBMO(µ) kb2 kRBMO(µ) [µ(6B)] q

+

1 q2 ,

we have

1

≤ Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kMpq1 (µ) kf2 kMpq2 (µ) [µ(6B)] q 1

− p1

1

[µ(6B)] p

− 1q

2

≤ Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kMpq1 (µ) kf2 kMpq2 (µ) . 1

2

To estimate I2 . For any x ∈ B, we firstly consider |[b1 , b2 , Tθ ](f10 , f2∞ )(x)|. Write |[b1 , b2 , Tθ ](f10 , f2∞ )(x)| ≤ |b1 (x) − mBe (b1 )||b2 (x) − mBe (b2 )||Tθ (f10 , f2∞ )(x)| +|b1 (x) − mBe (b1 )||Tθ (f10 , (b2 − mBe (b2 )f2∞ )(x)| +|b2 (x) − mBe (b2 )||Tθ ((b1 − mBe (b1 )f10 , f2∞ )(x)| +|Tθ ((b1 − mBe (b1 )f10 , (b2 − mBe (b2 )f2∞ )(x)| =: J1 + J2 + J3 + J4 . With an argument similar to that used in the proof of H2 in [28], it is not difficult to obtain that − 1q

J1 ≤ C|b1 (x) − mBe (b1 )||b2 (x) − mBe (b2 )|kf1 kMpq1 (µ) kf2 kMpq2 (µ) [µ(6B)] 1

665

.

2

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

17 By applying (1.6), (1.13), (1.14), the H¨ older inequality, (2.1) and (3.1), we can deduce Z J2 ≤ C|b1 (x) − mBe (b1 )|

|b2 (y1 ) − mBe (b2 )||f2 (y2 )| dµ(y2 )dµ(y1 ) [λ(x, d(x, y2 ))]2

Z |f1 (y1 )| X \6B

6B

Z |f1 (y1 )|dµ(y1 )

≤ C|b1 (x) − mBe (b1 )|

6B

∞ Z X

! |b2 (y1 ) − mBe (b2 )||f2 (y2 )| × dµ(y2 ) [λ(x, d(x, y2 ))]2 k+1 B\6k B k=1 6 Z 1 |f1 (y1 )|dµ(y1 ) ≤ C|b1 (x) − mBe (b1 )| λ(x, r) 6B ! Z ∞ X 1 1 × |b2 (y1 ) − mBe (b2 )||f2 (y2 )|dµ(y2 ) [C(6k )] λ(x, 6k r) 6k+1 B k=1 ( ∞ X 1 1 − q1 ≤ Ckf1 kMpq1 (µ) |b1 (x) − mBe (b1 )|[µ(6B)] 1 1 [C(6k )] λ(x, 6k r) k=1 ) Z × [|b2 (y1 ) − m ^ (b2 )| + |m ^ (b2 ) − mBe (b2 )|]|f2 (y2 )|dµ(y2 ) k+1 k+1 6

6k+1 B

B

6

B

− q1 1

(

≤ Ckf1 kMpq1 (µ) kf2 kMpq2 (µ) |b1 (x) − mBe (b1 )|[µ(6B)] 1

∞ X

2

k=1 1− q1

×(k + 1)kb2 kRBMO(µ) [µ(6k+1 B)]

1 1 k  [C(6 )] λ(x, 6k r)

)

2

− 1q

≤ Ckb2 kRBMO(µ) kf1 kMpq1 (µ) kf2 kMpq2 (µ) |b1 (x) − mBe (b1 )|[µ(6B)] 1

2

Similarly, we have − 1q

J3 ≤ Ckb1 kRBMO(µ) kf1 kMpq1 (µ) kf2 kMpq2 (µ) |b2 (x) − mBe (b2 )|[µ(6B)] 1

.

2

Now let us turn to estimate J4 . With (1.6), (1.13), (1.14), the H¨older inequality, (2.1) and (3.1), lead to |Tθ ((b1 − mBe (b1 )f10 , (b2 − mBe (b2 )f2∞ )(x)| Z Z |b2 (y2 ) − mBe (b2 )||f2 (y2 )| dµ(y2 )dµ(y1 ) ≤C |b1 (y1 ) − mBe (b1 )||f1 (y1 )| [λ(x, d(x, y2 ))]2 6B X \6B !1 Z 1− p1

≤ Ckb1 kRBMO(µ) [µ(6B)]

|f1 (y1 )|p1 dµ(y1 )

1

p1

6B

( ×

∞ X k=1

1 [λ(x, 6k r)]2

)

Z 6k+1 B

|b2 (y2 ) − mBe (b2 )||f2 (y2 )|dµ(y2 )

666

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

18

Guanghui Lu, Shuangping Tao

(

∞ X

"Z 1 1 ≤ Ckb1 kRBMO(µ) kf1 kMpq1 (µ) [µ(6B)] 1 |f2 (y2 )| 1 [C(6k )] λ(x, 6k r) 6k+1 B k=1 #) Z ×|b2 (y2 ) − m ^ (b2 )|dµ(y2 ) + (k + 1)kb2 kRBMO(µ) |f2 (y2 )|dµ(y2 ) k+1 − q1

6

B

6k+1 B − 1q

≤ Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kMpq1 (µ) kf2 kMpq2 (µ) [µ(6B)] 1

.

2

Combining the estimates of J1 , J2 , J3 and J4 , we have !1 Z 1

I2 = [µ(6B)] q

p

− p1

|[b1 , b2 , Tθ ](f10 , f2∞ )(x)|p dµ(x)

B 1

≤ Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kMpq1 (µ) kf2 kMpq2 (µ) [µ(6B)] p − p1

+Ckb1 kRBMO(µ) kf1 kMpq1 (µ) kf2 kMpq2 (µ) [µ(6B)] 2

1

− p1

+Ckb2 kRBMO(µ) kf1 kMpq1 (µ) kf2 kMpq2 (µ) [µ(6B)] 1

2

− p1

1

[µ(6B)] q

− p1

!1

p

Z 6B

2

6B

|b2 (x) − mBe (b2 )|p dµ(x) !1

p

Z

p

6B

|b1 (x) − mBe (b1 )| dµ(x) !1

p

Z

+Ckf1 kMpq1 (µ) kf2 kMpq2 (µ) [µ(6B)] 1

− 1q

2

1

p

p

|b2 (x) − mBe (b2 )| |b1 (x) − mBe (b1 )| dµ(x) − p1

≤ Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kMpq1 (µ) kf2 kMpq2 (µ) + Ckf1 kMpq1 (µ) kf2 kMpq2 (µ) [µ(6B)] 1 2 1 2 ( Z !p Z ! p )1 × 6B

|b1 (x) − mBe (b1 )|p1 dµ(x)

p1

6B

|b2 (x) − mBe (b2 )|p2 dµ(x)

p2

p

≤ Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kMpq1 (µ) kf2 kMpq2 (µ) . 1

2

By an argument similar to that used in the I2 , we have I3 ≤ Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kMpq1 (µ) kf2 kMpq2 (µ) . 1

2

It remains to estimate I4 . For any x ∈ B, write |[b1 , b2 , Tθ ](f1∞ , f2∞ )(x)| ≤ |b1 (x) − mBe (b1 )||b2 (x) − mBe (b2 )||Tθ (f1∞ , f2∞ )(x)| +|b1 (x) − mBe (b1 )||Tθ (f1∞ , (b2 − mBe (b2 )f2∞ )(x)|

+|b2 (x) − mBe (b2 )||Tθ ((b1 − mBe (b1 )f1∞ , f2∞ )(x)| +|Tθ ((b1 − mBe (b1 )f1∞ , (b2 − mBe (b2 )f2∞ )(x)| =: U1 + U2 + U3 + U4 . For U1 , U2 , U3 and U4 , by some arguments similar to those used in the proofs of H4 in [28] and U02 and U002 in [23], we can obtain U1 + U2 + U3 + U4 ≤ C|b1 (x) − mBe (b1 )||b2 (x) − mBe (b2 )|kf1 kMpq1 (µ) kf2 kMpq2 (µ) 1

667

2

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

19 − 1q

+Ckb2 kRBMO(µ) kf1 kMpq1 (µ) kf2 kMpq2 (µ) |b1 (x) − mBe (b1 )|[µ(6B)] 1

2

− 1q

+Ckb1 kRBMO(µ) kf1 kMpq1 (µ) kf2 kMpq2 (µ) |b2 (x) − mBe (b2 )|[µ(6B)] 1

2

− 1q

+Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kMpq1 (µ) kf2 kMpq2 (µ) [µ(6B)] 1

.

2

Further, by a way similar to that used in the estimate of I2 , we can deduce I4 ≤ Ckb1 kRBMO(µ) kb2 kRBMO(µ) kf1 kMpq1 (µ) kf2 kMpq2 (µ) . 1

2

Combining the estimates I1 − I4 , we complete the proof of Theorem 1.10. Conflict of interest The authors declare that there is no conflict of interests regarding the publication of this paper. Authors’ contributions All authors contributed equally to the writing of this paper. All authors read and approved the final manuscript. Acknowledgments This work is supported by the National Natural Science Foundation of China (Grant No. 11561062).

References BD

CW1

CW2 CZ FYY1

FYY2

H HLYY

[1] T. Bui and X. Duong, Hardy spaces, regularized BMO and the boundedness of Calde´rn-Zymgund operators on homogeneous spaces, Journal of Geometric Analysis, 23(2), 895-932 (2013). [2] R. R. Coifman and G. Weiss, Analyse Harmonique Non-commutative sur certain Espaces Homog`enes, Lecture Notes in Mthematics 242, Springer-Verlag, Berlin-New York, 1971. [3] R. R. Coifman and G. Weiss, Extensions of Hardy spaces and their use in analysis, Bull. Amer. Math. Soc., 83(4), 569-645 (1977). [4] Y. Cao and J. Zhou, Morrey spaces for nonhomogeneous metric measure spaces, Abstract and Applied Analysis, 2013, 1-8 (2013). [5] X. Fu, D. Yang and W. Yuan, Generalized fractional integrals and their commutators over non-homogeneous metric measure spaces, Taiwanese J. Math., 18(2), 509-557 (2014). [6] X. Fu, D. Yang and W. Yuan, Boundedness of multilinear commutators of Calder´onZygmund operators on Orlicz spaces over non-homogeneous metric measure spaces, Taiwanese J. Math., 16(6), 2203-2238 (2012). [7] T. Hyt¨onen, A framework for non-homogeneous analysis on metric spaces, and the RBMO space of Tolsa, Publ. Mat., 54, 485-504 (2010). [8] T. Hty¨onen, S. Liu, Da. Yang and Do. Yang, Boundedness of Calder´on-Zygmund operators on non-homogeneous metric measure spaces, J. Geom. Anal. 22, 1071-1107 (2012). 668

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

20

HM HYY LT1 LT2 LYY

MN

N

RZ1

RZ2

S ST T1 T2 T3 TW

XS XSS

Y

Guanghui Lu, Shuangping Tao

[9] G. Hu and Y. Meng, Calder´on-Zygmund operators with non-doubling measures, Advances in Mathematics, 42(4), 417-440 (2013). [10] T. Hyt¨onen, Da. Yang and Do. Yang, The Hardy space H 1 on non-homogeneous metric measure spaces, Math. Proc. Cambridge Philos. Soc., 153(1), 9-31 (2012). [11] G. Lu and S. Tao, Generalized Morrey spaces over non-homogeneous metric measure spaces, Journal of the Australian Mathematical Society, 103(2): 268-278, 2017. [12] G. Lu and S. Tao, Fractional type Marcinkieicz integrals on non-homogeneous metric measure spaces, Journal of Inequalities and Applications, 259(1), 1-15 (2016). [13] S. Liu, Da. Yang and Do. Yang, Boundedness of Calder´on-Zygmund operators on non-homogeneous metric measure spaces: equivalent characterizations, Journal of Mathematical Analysis and Applications, 386(1), 258-272 (2012). [14] D. Maldonado and V. Naibo, Weighted norm inequalities for paraproducts and bilinear pseudodifferential operators with mild regularity, J. Fourier Anal. Appl., 15(2), 218-261 (2009). [15] E. Nakai, Generalized fractional integrals on Orlicz-Morrey spaces, Proceedings of the International Symposium on Banach and Function spaces, Yokohama Publishers, 232-333( 2004). [16] C. Ri and Z. Zhang, Boundedness of θ-type Calder´on-Zygmund operaors on Hardy spaces with non-doubling measures, Journal of Inequalities and Applications, 323, 1-10 (2015). [17] C. Ri and Z. Zhang, Boundedness of θ-type Calder´on-Zygmund operaors on nonhomogeneous metric measure spaces, Frontiers of Mathematics in China, 11(1), 141153 (2016). [18] Y. Sawano, Generalized Morrey spaces for non-doubling measues, Nonlinear Differ. Equ. Appl., 15(4), 413-425 (2008). [19] Y. Sawano and H. Tanaka, Morrey spaces for non-doubling measures, Acta. Mathematica Sinica, 21(6), 1535-1544 (2005). [20] X. Tolsa, Littlewood-Paley theory and the T (1) theorem with non doubling measures, Adv. Math., 164, 57-116 (2001). [21] X. Tolsa, The space H 1 for nondoubling measures in terms of a grand maximal operator, Trans. Amer. Math. Soc., 355, 315-348 (2003). [22] X. Tolsa, BMO, H 1 , and Calder´on-Zygmund operators for non-doubling measures, Math. Ann., 319, 89-149 (2001). [23] S. Tao and P. Wang, Boundedness of Calder´on-Zygmund operators and commutators on Morrey spaces associated with non-homogeneous metric measure spaces, Journal of Jilin University(Science Edition), 53(6), 1073-1080 (2015). [24] R. Xie and L. Shu, Θ-type Calder´on-Zygmund operators with non-doubling measures, Acta Mathematicae Applicatae Sinica, English Series, 29(2), 263-280 (2013). [25] R. Xie, L. Shu and A. Sun, Boundedness for commutators of bilinear θ-type Calder´onZygmund operators on non-homogeneous metric measure spaces, Journal of Function Spaces, 2017, 1-10 (2017). [26] K. Yabuta, Generalization of Calder´on-Zygmund operators, Studia Mathematica, 82(1), 17-31 (1985). 669

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

21

YY ZTW ZWX

[27] Da. Yang and Do. Yang, Boundedness of Calder´on-Zygmund operators with finite non-doubling measures, Front. Math. China, 8(4), 961-971 (2013). [28] T. Zheng, X. Tao and X. Wu, Bilinear Calder´on-Zygmund operators of type ω(t) on non-homogeneous spaces, Journal of Inequalities and Applications, 113, 1-18 (2014). [29] T. Zheng, Z. Wang and W. Xiao, Maximal bilinear Calder´ on-Zygmund operators of type ω(t) on non-homogeneous spaces, Annals of Functional Analysis, 6(4), 134-154 (2015).

670

Guanghui Lu ET AL 650-670

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On Ulam-Hyers stability of decic functional equation in non-Archimedean spaces Yali Ding1 , Tian-Zhou Xu 1,∗, John Michael Rassias2 (1. School of Mathematics and Statistics, Beijing Institute of Technology, Beijing 100081, P. R. China) (2. Pedagogical Department E.E., Section of Mathematics and Informatics, National and Capodistrian University of Athens, 4, Agamemnonos Str., Aghia Paraskevi, Athens 15342, Greece)

Abstract In the current work, using the fixed point theorems due to Brzd¸ek and Ciepli´ nski, we give some Ulam-Hyers stability results for the decic functional equation in non-Archimedean spaces. Keywords Ulam-Hyers stability; decic functional equation; decic mapping; non-Archimedean space; fixed point method. Mathematics Subject Classification Primary 39B82; Secondary 39B52, 47H10.

1

Introduction and preliminaries Throughout this paper, N stands for the set of all positive integers, R+ := [0, ∞) and N0 := N ∪ {0}.

Let us recall (see, for instance, [9]) some basic definitions and facts concerning non-Archimedean normed spaces. A non-Archimedean valuation on a field K is a function | · | : K → R such that (1) |r| ≥ 0 and equality holds if and only if r = 0; (2) |rs| = |r||s|,

r, s ∈ K;

(3) |r + s| ≤ max{|r|, |s|},

r, s ∈ K.

Any field endowed with a non-Archimedean valuation is said to be a non-Archimedean field. In any nonArchimedean field we have |1| = | − 1| = 1 and |n| ≤ 1 for n ∈ N0 . The most important examples of nonArchimedean fields are p-adic numbers which have gained the interest of physicists for their research in some problems coming from quantum physics, p-adic strings and superstrings (see [9]). Let X be a linear space over a field K with a non-Archimedean valuation | · |. A function ∥ · ∥ : X → R+ is a non-Archimedean norm if it satisfies the following conditions: (1) ∥x∥ = 0 if and only if x = 0; (2) ∥rx∥ = |r|∥x∥ for all r ∈ K and x ∈ X; (3) ∥x + y∥ ≤ max{∥x∥, ∥y∥} for all x, y ∈ X. Then (X, ∥ · ∥) is called a non-Archimedean normed space. Let X be a non-Archimedean normed space and {xn } be a sequence in X. Then {xn } is said to be convergent ∗ Corresponding

author. E-mail: [email protected]

671

Yali Ding ET AL 671-677

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

if there exists x ∈ X such that lim ∥xn − x∥ = 0. In that case, x is called the limit of the sequence {xn } and n→∞

we denote it by lim xn = x. A sequence {xn } in X is said to be a Cauchy sequence if lim ∥xn+p − xn ∥ = 0 for n→∞ n→∞ all p = 1, 2, . . .. Due to the fact that ∥xn − xm ∥ ≤ max{∥xj+1 − xj ∥ : m ≤ j ≤ n − 1} (n > m) a sequence {xn } is Cauchy if and only if {xn+1 − xn } converges to zero in a non-Archimedean normed space. The first work on the Ulam-Hyers stability of functional equations in complete non-Archimedean normed spaces is [10]. After it, a lot of papers on the stability for various classes of functional equations in such spaces have been published, and there are many interesting results concerning this problem, see for instance [2–8,12–15] and the references therein. The fixed point method is one of the most effective tools in studying these problems. In this paper, we consider the decic functional equations which was introduced in [1, 11] as follows: f (x + 5y) − 10f (x + 4y) + 45f (x + 3y) − 120f (x + 2y) + 210f (x + y) − 252f (x) +210f (x − y) − 120f (x − 2y) + 45f (x − 3y) − 10f (x − 4y) + f (x − 5y) = 10!f (y).

(1.1)

Since f (x) = x10 is a solutions of (1.1), we say that it is a decic functional equation. Every solution of the decic functional equation is said to be a decic mapping. Indeed, general solution of the equation (1.1) was found in [11]. In this paper, we study some stability results concerning the functional equation (1.1) in the setting of non-Archimedean normed spaces.

2

Stability of the decic functional equation (1.1) In this section, we show the generalized Ulam-Hyers stability of equation (1.1) in complete non-Archimedean

normed spaces (its stability in quasi-β-Banach spaces was proved in [11]). The proof of our main resut is based on the following fixed point result obtained in [5, Theorem 1] (see also [2, Theorem 2.3] and [3, Theorem 2.2]). Theorem 2.1 Let the following three hypotheses be valid : (H1) E is a nonempty set, Y is a complete non-Archimedean normed space over a non-Archimedean field of the characteristic different from 2, j ∈ N, f1 , . . . , fj : E → E and L1 , . . . , Lj : E → R+ ; (H2) T : Y E → Y E is an operator satisfying the inequality ∥T ξ(x) − T µ(x)∥ ≤

max i∈{1,...,j}

Li (x)∥ξ(fi (x)) − µ(fi (x))∥,

ξ, µ ∈ Y E , x ∈ E;

(2.1)

E (H3) Λ : RE + → R+ is an operator defined by

Λδ(x) :=

max i∈{1,...,j}

δ ∈ RE + , x ∈ E.

Li (x)δ(fi (x)),

(2.2)

Assume that the functions ε : E → R+ and φ : E → Y fulfill the following two conditions : ∥T φ(x) − φ(x)∥ ≤ ε(x),

x ∈ E,

(2.3)

and lim Λl ε(x) = 0,

l→∞

x ∈ E.

(2.4)

Then there exists a unique fixed point ψ of T with ∥φ(x) − ψ(x)∥ ≤ sup Λl ε(x),

x ∈ E.

(2.5)

l∈N0

672

Yali Ding ET AL 671-677

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Moreover, ψ(x) := lim T l φ(x), l→∞

x ∈ E.

(2.6)

Let (X, +) is a commutative group and Y is a complete non-Archimedean normed space. Given f : X → Y, x, y ∈ X, put D10 (f )(x, y) := f (x + 5y) − 10f (x + 4y) + 45f (x + 3y) − 120f (x + 2y) + 210f (x + y) − 252f (x) +210f (x − y) − 120f (x − 2y) + 45f (x − 3y) − 10f (x − 4y) + f (x − 5y) − 10!f (y).

(2.7)

Theorem 2.2 Assume that X be a commutative group uniquely divisible by 2 and let Y be a complete nonArchimedean normed space over a non-Archimedean field of the characteristic different from 210. Let f : X → Y and φ : X 2 → R+ be mappings satisfying the inequality ∥D10 (f )(x, y)∥ ≤ φ(x, y),

x, y ∈ X.

(2.8)

Assume also that there is an s ∈ {−1, 1} such that ( lim

l→∞

1 |2|10s

)l

( ) φ 2sl x, 2sl y = 0,

x, y ∈ X.

Then there exists a decic mapping F : X → Y such that ( )l s−1 1 1 ∥f (x) − F (x)∥ ≤ sup 5(s+1) δ(2sl+ 2 x), 10s |2| l∈N0 |2|

(2.9)

x ∈ X,

(2.10)

where 1 max {|252|φ(0, x), |252|A(5x), |11340|A(3x), D(x)} , |10!| D(x) = max {|90|φ(3x, x), |240|φ(2x, x), |420|φ(x, x), |420|A(4x), |240|A(3x), |4200|A(3x), δ(x) =

|90|A(2x), |2400|A(2x), B(x)} ,

(2.11)

B(x) = max {|2|φ(5x, x), |20|φ(4x, x), φ(0, 2x), |2|C, A(10x), |10|A(8x), |45|A(6x), |120|A(4x), |210|A(2x), |20|A(x)} , 1 1 A(x) = C= max{φ(x, x), φ(x, −x)}, φ(0, 0). |10!| |10!| Proof.

Replacing x = y = 0 in (2.8), we get ∥f (0)∥ ≤

1 φ(0, 0) := C. |10!|

(2.12)

Replacing x and y by x and x in (2.8), respectively, we get ∥f (6x) − 10f (5x) + 45f (4x) − 120f (3x) + 210f (2x) − 252f (x) +210f (0) − 120f (−x) + 45f (−2x) − 10f (−3x) + f (−4x) − 10!f (x)∥ ≤ φ(x, x)

(2.13)

for all x ∈ X. Replacing x and y by x and −x in (2.8), respectively, we have ∥f (−4x) − 10f (−3x) + 45f (−2x) − 120f (−x) + 210f (0) − 252f (x) + 210f (2x) −120f (3x) + 45f (4x) − 10f (5x) + f (6x) − 10!f (−x)∥ ≤ φ(x, −x)

(2.14)

for all x ∈ X. By (2.13) and (2.14), we obtain ∥f (x) − f (−x)∥ ≤

1 max{φ(x, x), φ(x, −x)} := A(x) |10!|

673

Yali Ding ET AL 671-677

(2.15)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

for all x ∈ X. Replacing x and y by 0 and 2x in (2.8), respectively, and using (2.12) and (2.15), we find ∥2f (10x) − 20f (8x) + 90f (6x) − 240f (4x) − (10! − 420)f (2x)∥ ≤ max {φ(0, 2x), A(10x), |10|A(8x), |45|A(6x), |120|A(4x), |210|A(2x), |252|C}

(2.16)

for all x ∈ X. Replacing x and y by 5x and x in (2.8), respectively, we get ∥f (10x) − 10f (9x) + 45f (8x) − 120f (7x) + 210f (6x) − 252f (5x) + 210f (4x) −120f (3x) + 45f (2x) − (10! + 10)f (x)∥ ≤ max {φ(5x, x), C}

(2.17)

for all x ∈ X. By (2.16) and (2.17), we obtain ∥20f (9x) − 110f (8x) + 240f (7x) − 330f (6x) + 504f (5x) − 660f (4x) +240f (3x) − (10! − 330)f (2x) + (2 · 10! + 20)f (x)∥

(2.18)

≤ max {|2|φ(5x, x), φ(0, 2x), |2|C, A(10x), |10|A(8x), |45|A(6x), |120|A(4x), |210|A(2x)} for all x ∈ X. Replacing x and y by 4x and x in (2.8), respectively, and using (2.12) we have ∥f (9x) − 10f (8x) + 45f (7x) − 120f (6x) + 210f (5x) − 252f (4x) + 210f (3x) −120f (2x) − (10! − 46)f (x)∥ ≤ max {φ(4x, x), |10|C, A(x)}

(2.19)

for all x ∈ X. By (2.18) and (2.19), we get ∥90f (8x) − 660f (7x) + 2070f (6x) − 3696f (5x) + 4380f (4x) −3960f (3x) − (10! − 2730)f (2x) + (22 · 10! − 900)f (x)∥ ≤ max {|2|φ(5x, x), |20|φ(4x, x), φ(0, 2x), |2|C, A(10x), |10|A(8x),

(2.20)

|45|A(6x), |120|A(4x), |210|A(2x), |20|A(x)} := B(x) for all x ∈ X. Replacing x and y by 3x and x in (2.8), respectively, then using (2.12) and (2.15), we have ∥f (8x) − 10f (7x) + 45f (6x) − 120f (5x) + 210f (4x) − 252f (3x) + 211f (2x) − (10! + 130)f (x)∥ ≤ max {φ(3x, x), |45|C, A(2x), |10|A(x)}

(2.21)

for all x ∈ X. By (2.20) and (2.21), we get ∥240f (7x) − 1980f (6x) + 7104f (5x) − 14520f (4x) +18720f (3x) − (10! + 16260)f (2x) + (112 · 10! + 10800)f (x)∥

(2.22)

≤ max {|90|φ(3x, x), |90|A(2x), B(x)} for all x ∈ X. Replacing x and y by 2x and x in (2.8), respectively, then using (2.12) and (2.15), we have ∥f (7x) − 10f (6x) + 45f (5x) − 120f (4x) + 211f (3x) − 262f (2x) − (10! − 255)f (x)∥ ≤ max {φ(2x, x), A(3x), |10|A(2x), |45|A(x), |120|C}

(2.23)

for all x ∈ X. By (2.22) and (2.23), we get ∥420f (6x) − 3696f (5x) + 14280f (4x) − 31920f (3x) − (10! − 46620)f (2x) +(352 · 10! − 50400)f (x)∥

(2.24)

≤ max {|90|φ(3x, x), |240|φ(2x, x), |240|A(3x), |90|A(2x), |2400|A(2x), B(x)}

674

Yali Ding ET AL 671-677

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

for all x ∈ X. Replacing x and y by x and x in (2.8), respectively, then using (2.12) and (2.15), we have ∥f (6x) − 10f (5x) + 46f (4x) − 130f (3x) + 255f (2x) − (10! + 372)f (x)∥

(2.25)

≤ max {φ(x, x), |210|C, |120|A(x), |45|A(2x), |10|A(3x), A(4x)} for all x ∈ X. By (2.24) and (2.25), we get ∥504f (5x) − 5040f (4x) + 22680f (3x) − (10! + 60480)f (2x) + (772 · 10! + 105840)f (x)∥ ≤ max {|90|φ(3x, x), |240|φ(2x, x), |420|φ(x, x), |420|A(4x), |240|A(3x), |4200|A(3x),

(2.26)

|90|A(2x), |2400|A(2x), B(x)} := D(x) for all x ∈ X. Replacing x and y by 0 and x in (2.8), respectively, then using (2.12) and (2.15), we have ∥2f (5x) − 20f (4x) + 90f (3x) − 240f (2x) − (10! − 420)f (x)∥

(2.27)

≤ max {φ(0, x), |252|C, A(5x), |10|A(4x), |45|A(3x), |120|A(2x), |210|A(x)} for all x ∈ X. By (2.26) and (2.27), we get ∥f (2x) − 210 f (x)∥ ≤ for all x ∈ X. Thus

Similarly,

1 max{|252|φ(0, x), |252|A(5x), |11340|A(3x), D(x)} := δ(x) |10!|



1

1

210 f (2x) − f (x) ≤ |2|10 δ(x),

(x) (x)

10 − f (x) ≤ δ ,

2 f 2 2

Fix an x ∈ X and write

(2.28)

x ∈ X.

(2.29)

x ∈ X.

(2.30)

1 ξ(2s x), 210s  1   δ(x), 10 |2| ε(x) := (x)   δ , 2

ξ ∈ Y X,

∥T f (x) − f (x)∥ ≤ ε(x),

x ∈ X.

(2.33)

η ∈ RX + , x ∈ X.

(2.34)

T ξ(x) :=

(2.31)

if s = 1, (2.32)

if s = −1.

Then, by (2.29) and (2.30), we obtain

Next, put Λη(x) :=

1 η(2s x), |2|10s

It is easily seen that Λ has the form described in (H3) with E = X, j = 1 and f1 (x) = 2s x, L1 (x) = x ∈ X. Moreover, for any ξ, µ ∈ Y X and x ∈ X we have

1

1 s s

∥T ξ(x) − T µ(x)∥ = 10s ξ(2 x) − 10s µ(2 x) 2 2 ≤ L1 (x)∥ξ(f1 (x)) − µ(f1 (x))∥,

1 |2|10s

for

(2.35)

so hypothesis (H2) is also valid. Finally, using induction, one can check that for any l ∈ N0 and x ∈ X we have ( )l 1 Λl ε(x) = ε(2sl x) 10s |2| ( )( )l s−1 1 1 = ε(2sl+ 2 x), s+1 10s 10 |2| |2| 2

675

(2.36)

Yali Ding ET AL 671-677

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

which, together with (2.9), shows that all assumptions of Theorem 2.1 are satisfied. Therefore, there exists a function F : X → Y such that

( F (x) =

1 |2|10s

)l x ∈ X,

F (2sl x),

(2.37)

and (2.10) holds. Moreover, F (x) = lim T l f (x),

x ∈ X.

l→∞

(2.38)

One can now show, by induction, that ( ∥D10 (T f )(x, y)∥ ≤ l

1 |2|10s

)l φ(2sl x, 2sl y)

(2.39)

for l ∈ N0 , x, y ∈ X. Letting l → ∞ in (2.39) and using (2.9), we obtain D10 (f )(x, y) = 0,

(2.40)

which means that the function F satisfies equation (1.1). Thus the mapping T : X → Y is decic.



Theorem 2.2 with φ(x, y) = ϵ > 0, ϵ(∥x∥p + ∥y∥p ), ϵ∥x∥p · ∥y∥q , respectively, and s = −1 yields the following results. Corollary 2.1 Let ϵ be a positive real number, X be a commutative group uniquely divisible by 2 and Y be a complete non-Archimedean normed space over a non-Archimedean field of the characteristic different from 210 such that |2| < 1. If f : X → Y be a mapping satisfying ∥D10 (f )(x, y)∥ ≤ ϵ

(2.41)

for x, y ∈ X, then there exists a decic mapping F : X → Y such that ϵ ∥f (x) − F (x)∥ ≤ |10!|2

(2.42)

for all x ∈ X. Corollary 2.2 Let p, ϵ be positive real numbers with p < 10, X be a non-Archimedean normed space and Y be a complete non-Archimedean normed space over a non-Archimedean field of the characteristic different from 210 such that |2| < 1. If f : X → Y be a mapping satisfying ∥D10 (f )(x, y)∥ ≤ ϵ(∥x∥p + ∥y∥p )

(2.43)

for x, y ∈ X, then there exists a decic mapping F : X → Y such that ∥f (x) − F (x)∥ ≤

2ϵ∥x∥p |10!|2

(2.44)

for all x ∈ X. Corollary 2.3 Let p, q, ϵ be positive real numbers with p + q < 10, X be a non-Archimedean normed space and Y be a complete non-Archimedean normed space over a non-Archimedean field of the characteristic different from 210 such that |2| < 1. If f : X → Y be a mapping satisfying ∥D10 (f )(x, y)∥ ≤ ϵ∥x∥p · ∥y∥q

(2.45)

for x, y ∈ X, then there exists a decic mapping F : X → Y such that ∥f (x) − F (x)∥ ≤

ϵ∥x∥p+q |10!|2

(2.46)

for all x ∈ X.

676

Yali Ding ET AL 671-677

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

References [1] M. Arunkumar, A. Bodaghi, J.M. Rassias, E. Sathya, The general solution and approximations of a decic type function equation in various normed spaces, J. of the Chungcheong Math. Soc., 29(2016), 287–328. [2] A. Bahyrycz, K. Ciepli´ nski, On an equation characterizing multi-Jensen-quadratic mappings and its HyersUlam stability via a fixed point method, J. Fixed Point Theory Appl., 18(2016), 737–751. [3] A. Bahyrycz, K. Ciepli´ nski, J. Olko, On Hyers-Ulam stability of two functional equations in non-Archimedean spaces, J. Fixed Point Theory Appl., 18(2016), 433–444. [4] K. Ciepli´ nski, Stability of multi-additive mappings in non-Archimedean normed spaces, J. Math. Anal. Appl., 373(2011), 376–383. [5] J. Brzd¸ek, K. Ciepli´ nski, A fixed point approach to the stability of functional equations in non-Archimedean metric spaces, Nonlinear Analysis, 74(2011), 6861–6867. [6] K. Ciepli´ nski, A. Surowczyk, On the Hyers-Ulam stability of an equation characterizing multi-quadratic mappings, Acta Math. Sci. Ser. B Engl. Ed., 35(2015), 690–702. [7] J. Brzd¸ek, K. Ciepli´ nski, A fixed point theorem and the Hyers-Ulam stability in non-Archimedean spaces, J. Math. Anal. Appl., 400(2013), 68–75. [8] H.A. Kenary, S.Y. Jang, C. Park, A fixed point approach to the Hyers-Ulam stability of a functional equation in various normed spaces, Fixed Point Theory Appl., 2011(2011), Article ID 67, 14 Pages. [9] A. Khrennikov, Non-Archimedean Analysis: Quantum Paradoxes, Dynamical Systems and Biological Models, Kluwer Academic Publishers, Dordrecht, 1997. [10] M.S. Moslehian, Th.M. Rassias, Stability of functional equations in non-Archimedean spaces, Appl. Anal. Discrete Math., 1(2007), 325–334. [11] K. Ravi, J. Rassias, S. Pinelas, S. Sabarinathan, A fixed point approach to the stability of decic functional fquation in quasi-β-normed spaces, PanAmerican Math. J., 26(2016), 1–21. [12] R. Saadati, S.M. Vaezpour, C. Park, The stability of the cubic functional equation in various spaces, Math. Commun., 16(2011), 131–145. [13] T.Z. Xu, Stability of multi-Jensen mappings in non-Archimedean normed spaces, J. Math. Phys., 53 (2012), 023507, 9 pages. [14] T.Z. Xu, C. Wang, Th.M. Rassias, On the stability of multi-additive mappings in non-Archimedean normed spaces, Journal of Computational Analysis and Applications, 18(2015), 1102–1110. [15] T.Z. Xu, Y.L. Ding, J.M. Rassias, A fixed point approach to the stability of nonic functional equation in non-Archimedean spaces, Journal of Computational Analysis and Applications, 22(2017), 359–368.

677

Yali Ding ET AL 671-677

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Existence of positive solution for fully third-order boundary value problems



Yongxiang Li and Elyasa Ibrahim Department of Mathematics, Northwest Normal University, Lanzhou 730070, People’s Republic of China e-mail: [email protected],

[email protected]

Abstract In this paper, we are concerned with the existence of positive solutions of the fully third-order boundary value problem ( −u000 (t) = f (t, u(t), u0 (t), u00 (t)), 0

t ∈ [0, 1],

0

u(0) = u (0) = u (1) = 0, where f : [0, 1] × R+ × R+ × R → R is continuous. Some inequality conditions on f to guarantee the existence of positive solution are presented. These inequality conditions allow that f (t, x, y, z) may be superlinear or sublinear growth on x, y and z as |(x, y, z)| → 0 and |(x, y, z)| → ∞. Key Words: fully third-order boundary value problem; Nagumo-type growth condition; positive solution; cone; fixed point index. AMS Subject Classification: 34B18; 47H11; 47N20.

1

Introduction

In this paper we discuss existence of positive solution for third-order boundary value problem(BVP) with fully nonlinear term ( −u000 (t) = f (t, u(t), u0 (t), u00 (t)), t ∈ [0, 1], (1.1) u(0) = u0 (0) = u0 (1) = 0, where f : [0, 1] × R+ × R+ × R → R+ is continuous. ∗

Research supported by NNSFs of China (11661071, 11261053, 11361055).

1

678

Yongxiang Li ET AL 678-696

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

The boundary value problems of third order ordinary differential equations arise in a variety of different areas of applied mathematics and physics, as the deflection of a curved beam having a constant or varying cross section, three layer beam, electromagnetic waves or gravity driven flows and so on [1,2]. These problems have attracted many authors’ attention and concern, and some theorems and methods of nonlinear functional analysis have been applied to research the solvability of these problem, such as the topological transversality [3], the monotone iterative technique [4-6], the method of upper and lower solutions[7-9], Leray-Schauder degree [10-13], the fixed point theory of increasing operator[14,15]. Especially, in recent years the fixed-point theorem of Krasnoselskii’s cone expansion or compression type have been availably applied to some special third-order boundary problems that nonlinearity f doesn’t contain derivative terms u0 and u00 , and some results of existence and multiplicity of positive solutions have been obtained, see [16-18]. However, few people consider the existence of the positive solutions for the more general third-order boundary problems that nonlinearity explicitly contains first-order or second-order derivative term. The purpose of this paper is to obtain existence result of positive solution for BVP (1.1) with full nonlinearity. We will use the fixed point index theory in cones to discuss this problem. We present some inequality conditions on f to guarantee the existence of positive solution. These inequality conditions allow that f (t, x, y, z) may be superlinear or sublinear growth on x, y and z as |(x, y, z)| → 0 and |(x, y, z)| → ∞, p where |(x, y, z)| = x2 + y 2 + z 2 . For the superlinear growth case as |(x, y, z)| → ∞, a Nagumo-type condition is presented to restrict the growth of f on z. We choose a proper cone K in the work space C 2 [0, 1] and convert the BVP(1.1) to a fixed point problem of a completely continuous cone mapping A : K → K, then apply the fixed point index theory in cones and a-priori estimates in C 2 [0, 1] to prove our existence results. Let I = [0, 1], G = I × R+ × R+ × R. Our main results as follows: Theorem 1.1 Let f : I × R+ × R+ × R → R+ be continuous and satisfy the following conditions (F1) There exist constants a, b, c ≥ 0 and δ > 0, 0 < f (t, x, y, z) ≤ a x + b y + c |z|,

+

b π2

+

c π

< 1, such that

for (t, x, y, z) ∈ G such that (x, y, z)| < δ;

(F2) there exists constants a1 , b1 ≥ 0 and H > δ, f (t, x, y, z) ≥ a1 x + b1 y,

√a 2π 2

a1 12π 2

+

2b1 π4

> 1, such that

for (t, x, y, z) ∈ G such that |(x, y, z)| > H;

2

679

Yongxiang Li ET AL 678-696

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(F3) Given any M > 0, there is a positive continuous function gM (ρ) on R+ satisfying Z +∞ ρ dρ = +∞, (1.2) gM (ρ) + 1 0 such that f (t, x, y, z) ≤ gM (|z|),

(t, x, y, z) ∈ [0, 1] × [0, M ] × [0, M ] × R.

(1.3)

Then BVP(1.1) has at least one positive solution. Theorem 1.2 Let f : I × R+ × R+ × R → R+ be continuous and satisfy the following conditions (F4) there exists constants a, b ≥ 0 and δ > 0, f (t, x, y, z) ≥ a x + b y,

a 12π 2

+

2b π4

> 1, such that

for (t, x, y, z) ∈ G such that |(x, y, z)| < δ;

(F5) There exist constants a1 , b1 , c1 ≥ 0 and H > δ, 0 < f (t, x, y, z) ≤ a1 x + b1 y + c1 |z|,

√a1 2π 2

+

b1 π2

+ cπ1 < 1, such that

for (t, x, y, z) ∈ G such that |(x, y, z)| > H;

Then BVP(1.1) has at least one positive solution. In Theorem 1.1, the condition (F1) and (F2) allow that f (t, x, y, z) is superlinear growth on x, y and z as |(x, y, z)| → 0 and |(x, y, z)| → ∞, respectively. The condition (F3) is a Nagumo type growth condition on z which restricts the growth of f on z is quadric. For example, the power function f (t, x, y, z) = |x|α + |y|β + |z|γ

(1.4)

satisfies Condition (F1) and (F2) when α, β, γ > 1. But only when γ ≤ 2, Condition (F3) holds. In Theorem 2.2, the condition (F4) and (F5) allow that f (t, x, y, z) is sublinear growth on on x, y and z as |(x, y, z)| → 0 and |(x, y, z)| → ∞, respectively. For example, the power function defined by (1.4) satisfies Condition (F4) and (F5) when 0 < α, β, γ < 1. The conditions (F1)-(F2) and (F4)-(F5) also allow that f may be asymptotically linear on x, y and z as |(x, y, z)| → 0 and |(x, y, z)| → ∞. Indeed, we have the following results: Corollary 1.3 Let f : I × R+ × R+ × R → R+ be continuous and satisfy the following conditions 3

680

Yongxiang Li ET AL 678-696

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(H1) There exist constants a, b, c ≥ 0,

√a 2π 2

+

b π2

+

c π

< 1, such that

f (t, x, y, z) = a x + b y + c |z| + o(|(x, y, z)|), (H2) there exists constants a1 , b1 , c1 > 0,

a1 12π 2

+

2b1 π4

as |(x, y, z)| → 0;

> 1, such that

f (t, x, y, z) = a1 x + b1 y + c1 |z| + o(|(x, y, z)|),

as |(x, y, z)| → ∞.

Then BVP(1.1) has at least one positive solution. Corollary 1.4 Let f : I × R+ × R+ × R → R+ be continuous and satisfy the following conditions (H4) There exist constants a, b, c > 0,

a 12π 2

+

2b π4

> 1, such that

f (t, x, y, z) = a x + b y + c |z| + o(|(x, y, z)|), (H5) There exist constants a1 , b1 , c1 ≥ 0,

√a1 2π 2

+

b1 π2

+

c2 π

as |(x, y, z)| → 0; < 1, such that

f (t, x, y, z) = a1 x + b1 y + c1 |z| + o(|(x, y, z)|),

as |(x, y, z)| → ∞.

Then BVP(1.1) has at least one positive solution. In (H2) and (H5), o(|(x, y, z)|) denote a term of f which is less than |(x, y, z)| as |(x, y, z)| → ∞, that is, lim|(x,y,z)|→∞ o(|(x,y,z)|) |(x,y,z)| = 0. We can easily obtain the following facts: (H1) =⇒ (F1) holds, (H2) =⇒ (F2) and (F3) hold; (H4) =⇒ (F4) holds,

(H5) =⇒ (F5) holds.

Hence, by Theorem 1.1 and Theorem 1.2, the conclusions of Corollary 1.3 and 1.4 hold. The proofs of Theorem 1.1 and 1.2 will be given in Section 3. Some preliminaries to discuss BVP(1.1) are presented in Section 2. In section 4, we use Theorem 1.1 and 1.2 to induce two new existence results.

2

Preliminaries

Let C(I) denote the Banach space of all continuous function u(t) on I with the norm kukC = maxt∈I |u(t)|. Generally, for n ∈ N, we use C n (I) to denote the Banach space of all nth-order continuous differentiable function on I with the norm kukC n = max{ kukC , ku0 kC , · · · , ku(n) kC }. Let C + (I) be the cone of nonnegative functions in C(I). Let H = L2 (I) be the usual Hilbert space with the inner product (u, v) = 4

681

Yongxiang Li ET AL 678-696

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1/2 R1 2 u(t)v(t)dt and the norm kuk2 = . Let H n (I) be the usual Sobolev 0 |u(t)| dt space. u ∈ H n (I) means that u ∈ C n−1 (I), u(n−1) (t) is absolutely continuous on I and u(n) ∈ L2 (I). In H n (I), we use the norm kukH n = max{ kuk2 , ku0 k2 , · · · , ku(n) k2 }.

R1 0

To discuss BVP(1.1), we firstly consider the corresponding linear boundary value problem (LBVP) ( −u000 (t) = h(t) , t ∈ I, (2.1) u(0) = u0 (0) = u0 (1) = 0 , where h ∈ L2 (I). Lemma 2.1 For every h ∈ L2 (I), LBVP(2.1) has a unique solution u := Sh ∈ H 3 (I), which satisfies 1 1 1 kuk2 ≤ √ ku0 k2 , ku0 k2 ≤ ku00 k2 , ku00 k2 ≤ ku000 k2 . π π 2

(2.2)

Moreover, the solution operator S : L2 (I) → H 3 (I) is a bounded linear operator. When h ∈ C(I), the solution u = Sh ∈ C 3 (I), and the solution operator S : C(I) → C 2 (I) is completely continuous. Proof. Let h ∈ H 2 (I). It is well-known the linear second-order boundary value problem ( −v 00 (t) = h(t) , t ∈ [0, 1], (2.3) v(0) = v(1) = 0 , has a unique solution v ∈ H 2 (I) given by Z 1 v(t) = G(t, s) h(s) ds,

(2.4)

0

where G(t, s) is the corresponding Green function ( t(1 − s), 0 ≤ t ≤ s ≤ 1, G(t, s) = s(1 − t), 0 ≤ s ≤ t ≤ 1.

(2.5)

Hence, Z u(t) =

t

Z tZ

1

v(τ )dτ = 0

G(τ, s)h(s)dsdτ := Sh(t) 0

(2.6)

0

belongs to H 3 (I) and is a unique solution of LBVP(2.1). Since sine system { sin kπt | k ∈ N } is a complete orthogonal system of L2 (I), every h ∈ L2 (I) can be expressed by the Fourier series expansion h(t) =

∞ X

bk sin kπt ,

(2.7)

k=1

5

682

Yongxiang Li ET AL 678-696

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

where bk = 2

R1 0

h(s) sin kπs ds, k = 1, 2, · · · , and the Paserval equality ∞

khk2 2 =

1X |bk |2 2

(2.8)

k=1

holds. Since u = Sh ∈ H 3 (I), u0 and u000 belong to L2 (I) and they can also be expressed by the Fourier series expansion of the sine system. Since u000 = −h, by the integral formula of Fourier coefficient, we have u0 (t) =

∞ X k=1

bk 2 k π2

sin kπt .

(2.9)

On the other hand, since cosine system { cos kπt | k = 0, 1, 2, · · · } is another complete orthogonal system of L2 (I), every w ∈ L2 (I) can be expressed by the cosine series expansion ∞ a0 X + ak cos kπt , w(t) = 2 k=1

R1

where ak = 2 0 w(s) cos kπs ds, k = 0, 1, 2, · · · . For the u00 ∈ L2 (I), by the integral formula of the coefficient of cosine series, we obtain its cosine series expansion: u00 (t) =

∞ X bk cos kπt . kπ

(2.10)

k=1

By (2.7), (2.9), (2.10) and Paserval equality, we obtain that ∞

0

ku k2

2

1X = 2 k=1

ku00 k2

2

∞ X bk 2 bk 2 ≤ 1 = 1 ku00 k2 2 , k2 π2 kπ 2π 2 π2 k=1

∞ ∞ 1 X bk 2 1 1 1 X 2 = ≤ |bk |2 = 2 khk2 2 = 2 ku000 k2 . 2 2 kπ 2π π π k=1

In addition, since u(t) = 2

Z

kuk2 = 0

Rt 0

k=1

u0 (s)ds, by H¨older inequality,

1 Z t



0

Z 2 u (s)ds dt ≤ 0

0

1

Z t 0

t

1 2 |u(s)|2 dsdt ≤ ku0 k2 . 2

Hence (2.2) holds. By the expression (2.6) of the solution u = Sh, S : L2 (I) → H 3 (I) is a bounded linear operator. When h ∈ C(I), by (2.4) and (2.6), u ∈ C 3 (I) and the solution operator S : C(I) → C 3 (I) is bounded. By the compactness of the embedding C 3 (I) ,→ C 2 (I), S : C(I) → C 2 (I) is completely continuous. 2 6

683

Yongxiang Li ET AL 678-696

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Lemma 2.2 Let h ∈ C + (I). Then the solution u of LBVP(2.1) belongs to C 3 (I) and has the following properties: (1) u ≥ 0, u0 ≥ 0, u000 ≤ 0 and kukC ≤ ku0 kC ≤ ku00 k; 3 R1 (2) u0 (t) ≥ t(1 − t) ku0 kC , ∀ t ∈ I; ku0 kC ≤ π4 0 u0 (t) sin πt dt; R1 (3) u(t) ≥ 16 t2 (3 − 2t) ku0 kC , ∀ t ∈ I; ku0 kC ≤ 6π 0 u(t) sin πt dt; (4) there exists ξ ∈ (0, 1) such that u00 (ξ) = 0, u00 (t) ≥ 0 for t ∈ [0, ξ] and u00 (t) ≤ 0 for t ∈ [ξ, 1]. Moreover, ku00 kC = max{u00 (0), −u00 (1)}. Proof. Let h ∈ C + (I) and u = Sh be the unique solution of BVP(2.1). By Lemma 2.1, u ∈ C 3 (I) and u000 = −h ≤ 0. Set v = u0 , then v ∈ C 2 (I) is a unique solution of R1 LBVP(2.3) and given by (2.4). Hence, v ≥ 0. For every t ∈ I, we have u(t) = 0 v(s)ds ≥ 0, and Z t

|u(t)| =

v(s) ds ≤ t kvkC ≤ ku0 kC .

0

ku0 ||C .

Hence, kukC ≤ By the boundary conditions of LBVP(2.1), there exists ξ ∈ (0, 1) Rt 00 such that u (ξ) = 0, and for every t ∈ I, u0 (t) = ξ u00 (s) ds. Hence, Z t |u0 (t)| = u00 (s) ds ≤ |t − ξ| ku00 kC ≤ ku00 kC , ξ

so we have ku0 kC ≤ ku00 kC . Hence, the conclusion of Lemma 2.2(1) holds. From the expression (2.5) we easily see that the Green function G(t, s) has the following properties (i) 0 ≤ G(t, s) ≤ G(s, s)

∀ t, s ∈ I ;

(ii) G(t, s) ≥ G(t, t) G(s, s),

∀ t, s ∈ I .

For every t ∈ I, by (2.4) and the property (i) of G we have Z 1 Z 1 v(t) = G(t, s) h(s) ds ≤ G(s, s) h(s) ds. 0

0

Hence Z kvkC ≤

1

G(s, s) h(s) ds. 0

By the property (ii) of G and this inequality, we have Z 1 Z 1 v(t) = G(t, s) h(s) ds ≥ G(t, t) G(s, s) h(s) ds 0

0

≥ G(t, t) kvkC = t(1 − t) kvkC ,

t ∈ I.

(2.11)

7

684

Yongxiang Li ET AL 678-696

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Multiplying this inequality by sin πt and integrating on I, we have Z 1 Z 1 4 t(1 − t) sin πt dt = 3 kvkC . v(t) sin πt dt ≥ kvkC π 0 0 Thus, the conclusion (2) holds. By (2.11), we have Z t Z t 1 s(1 − s)kvkC ds = t2 (3 − 2t)ku0 kC , v(s) ds ≥ u(t) = 6 0 0

t ∈ I.

Multiplying this inequality by sin πt and integrating on I, we obtain that Z 1 Z 1 ku0 kC ku0 kC u(t) sin πt dt ≥ t2 (3 − 2t) sin πt dt = . 6 6π 0 0 Hence, the conclusion (3) holds. Since u0 ≥ 0, from the boundary conditions of LBVP(2.1) we see that u00 (0) ≥ 0 and u00 (1) ≥ 0. Since u000 (t) = −h(t) ≥ 0 for every t ∈ I, it follows that u00 (t) is a monotone increasing function on I. From these we conclude that, there exists ξ ∈ (0, 1) such that u00 (ξ) = 0, u00 (t) ≥ 0 for t ∈ [0, ξ] and u00 (t) ≥ 0 for t ∈ [ξ, 1]. Moreover ku00 kC = maxt∈I |u00 (t)| = max{u00 (0), −u00 (1)}. Hence, the conclusion of Lemma2.2(4) holds. 2 Now, we define a closed convex cone K in C 2 (I) by  K = u ∈ C 2 (I) : u(t) ≥ 0, u0 (t) ≥ 0, ∀ t ∈ I .

(2.12)

By Lemma 2.2(1), we have that S(C + (I)) ⊂ K. Let f : I × R+ × R+ × R → R+ be continuous. For every u ∈ K, set F (u)(t) := f (t, u(t), u0 (t), u00 (t)),

t ∈ I.

(2.13)

Then F : K → C + (I) is continuous and it maps every bounded in K into a bounded set in C + (I). Define a mapping A : K → K by A = S ◦ F.

(2.14)

By Lemma 2.1, A : K → K is a completely continuous mapping. By the definitions of S and K, the positive solution of BVP(1.1) is equivalent to the nonzero fixed point of A. We will find the nonzero fixed point of A by using the fixed point index theory in cones. Let E be a Banach space and K ⊂ E be a closed convex cone in E. Assume Ω is a bounded open subset of E with boundary ∂Ω, and K ∩ Ω 6= ∅. Let A : K ∩ Ω → K be a completely continuous mapping. If Au 6= u for any u ∈ K ∩ ∂Ω, then the fixed point index i (A, K ∩ Ω, K) is well defined. The following lemmas in [19, 20] are needed in our discussion. 8

685

Yongxiang Li ET AL 678-696

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Lemma 2.3 Let Ω be a bounded open subset of E with θ ∈ Ω, and A : K ∩ Ω → K a completely continuous mapping. If µ Au 6= u for every u ∈ K ∩ ∂Ω and 0 < µ ≤ 1, then i (A, K ∩ Ω, K) = 1. Lemma 2.4 Let Ω be a bounded open subset of E and A : K ∩ Ω → K a completely continuous mapping. If there exists v0 ∈ K \ {θ} such that u − Au 6= τ v0 for every u ∈ K ∩ ∂Ω and τ ≥ 0, then i (A, K ∩ Ω, K) = 0. Lemma 2.5 Let Ω be a bounded open subset of E, and A, A1 : K ∩ Ω → K be two completely continuous mappings. If (1 − s)Au + sA1 u 6= u for every u ∈ K ∩ ∂Ω and 0 ≤ s ≤ 1, then i (A, K ∩ Ω, K) = i (A1 , K ∩ Ω, K).

3

Proof of the Main Results

In this section, we use the fixed point index theory in cones to prove Theorem 1.1 and 1.2. Let E = C 2 (I), K ⊂ C 2 (I) be the closed convex cone defined by (2.12) and A : K → K be the completely continuous mapping defined by (2.14). Then the positive solution of BVP(1.1) is equivalent to the nontrivial fixed point of A. We use Lemma 2.3-2.5 to find the nontrivial fixed point of A. Proof of Theorem 1.1. Let 0 < r < R < +∞ and set Ω2 = {u ∈ C 2 (I) | kukC 2 < R}.

Ω1 = {u ∈ C 2 (I) | kukC 2 < r},

(3.1)

We show that A has a fixed point in K ∩ (Ω2 \ Ω1 ) when r is small enough and R large enough. √ Choose r ∈ (0, δ/ 3), where δ is the positive constant in Condition (F1). We prove that A satisfies the condition of Lemma 2.5 in K ∩ ∂Ω1 , namely µ Au 6= u,

∀ u ∈ K ∩ ∂Ω1 , 0 < µ ≤ 1.

(3.2)

In fact, if (3.2) doesn’t hold, there exist u0 ∈ K ∩ ∂Ω1 and 0 < µ0 ≤ 1 such that µ0 Au0 = u0 . Since u0 = S(µ0 F (u0 )), by the definition of S, u0 ∈ C 3 (I) is the unique solution of LBVP(2.1) for h = µ0 F (u0 ) ∈ C + (I). Hence, u0 ∈ C 2 (I) satisfies the differential equation ( −u0 000 (t) = µ0 f (t, u0 (t), u0 0 (t), u0 00 (t)), t ∈ [0, 1], (3.3) u0 (0) = u0 0 (0) = u0 0 (1) = 0 . Since u0 ∈ K ∩ ∂Ω1 , by the definitions of K and Ω1 , we have (t, u0 (t), u0 0 (t), u0 00 (t)) ∈ G,

|(u0 (t), u0 0 (t), u0 00 (t))| < δ,

t ∈ I.

9

686

Yongxiang Li ET AL 678-696

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Hence by Condition (F1), we have 0 ≤ f (t, u0 (t), u0 0 (t), u0 00 (t)) ≤ a u0 (t) + b u0 0 (t) + c |u0 00 (t)|,

t ∈ I,

Combining this inequality with Equation (3.3), we obtain that |u0 000 (t)| = µ0 f (t, u0 (t), u0 0 (t), u0 00 (t)) ≤ f (t, u0 (t), u0 0 (t), u0 00 (t)) ≤ a |u0 (t)| + b |u0 0 (t)| + c |u0 00 (t)|,

t ∈ I.

From this inequality and Lemma 2.1 it follows that  a c b 000 0 00 √ ku0 k2 ≤ aku0 k2 + bku0 k2 + cku0 k2 ≤ + 2+ ku0 000 k2 . 2 π π 2π

(3.4)

Since ku0 kC 2 > 0, from boundary condition in Equation (3.3) we easily see that ku0 000 k2 > c a b 0. Hence by (3.5) we obtain that √2π 2 + π 2 + π ≥ 1, which contradicts the assumption in Condition (F1). Hence (3.2) holds, namely A satisfies the condition of Lemma 2.3 in K ∩ ∂Ω1 . By Lemma 2.3, we have i (A, K ∩ Ω1 , K) = 1.

(3.5)

Set C0 = max{ |f (t, x, y, z)−(a1 x+b1 y)| : (t, x, y, z) ∈ G, |(x, y, z)| ≤ H}+1, where H is the constant in Condition (F2). By Condition (F2), we have f (t, x, y, z) ≥ a1 x + b1 y − C0 ,

∀ (t, x, y, z) ∈ G.

(3.6)

Define a mapping F1 : K → C + (I) by F1 (u)(t) := f (t, u(t), u0 (t), u00 (t)) + C0 = F (u)(t) + C0 ,

t ∈ I,

(3.7)

and set A1 = S ◦ F1 .

(3.8)

Then A1 : K → K is a completely continuous mapping. Let R > δ. We show that A1 satisfies that i (A1 , K ∩ Ω2 , K) = 0.

(3.9)

Choose v0 = 1 − cos πt and w0 = π 3 sin πt. since −v0 000 (t) = π 3 sin πt = w0 , by the definition of S and Lemma 2.2(1), v0 = S(w0 ) ∈ K \ {θ}. We show that A1 satisfies the condition of Lemma 2.4 in K ∩ ∂Ω2 , namely u − A1 u 6= τ v0 ,

∀ u ∈ K ∩ ∂Ω2 ,

τ ≥ 0.

(3.10)

10

687

Yongxiang Li ET AL 678-696

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

In fact, if (3.10) doesn’t hold, there exist u1 ∈ K ∩ ∂Ω2 and τ1 ≥ 0 such that u1 − A1 u1 = τ1 v0 . Since u1 = A1 u1 + τ1 v0 = S(F (u1 ) + C0 + τ1 w0 ), by the definition of S, u1 is the unique solution of LBVP(2.1) for h = F (u1 ) + C0 + τ1 w0 ∈ C + (I). Hence, u1 ∈ C 3 (I) satisfies the differential equation ( −u1 000 (t) = f (t, u1 (t), u1 0 (t), u1 00 (t)) + C0 + τ1 w0 (t), t ∈ I, (3.11) u1 (0) = u1 0 (0) = u1 0 (1) = 0 . Since u1 ∈ K ∩ ∂Ω2 , by the definition of K, (t, u1 (t), u1 0 (t), u1 00 (t)) ∈ G, t ∈ I. Hence by (3.6), we have f (t, u1 (t), u1 0 (t), u1 00 (t)) ≥ a1 u1 (t) + b1 u1 0 (t) − C0 ,

t ∈ I.

From this inequality and Equation (3.11), we conclude that −u1 000 (t) = f (t, u1 (t), u1 0 (t), u1 00 (t)) + C0 + τ1 w0 (t) ≥ a1 u1 (t) + b1 u1 0 (t) + τ1 w0 (t) ≥ a1 u1 (t) + b1 u1 0 (t),

t ∈ I.

Multiplying this inequality by sin πt and integrating on I, then using integration by parts for the left side, we have Z 1 Z 1 Z 1 2 0 π u1 (t) sin πt dt ≥ a1 u1 (t) sin πt dt + b1 u1 0 (t) sin πt dt. (3.12) 0

0

0

By Lemma 2.2 (2) and (3), Z 1 Z 1 1 4 0 u1 (t) sin πt dt ≥ ku1 kC , u1 0 (t) sin πt dt ≥ 3 ku1 0 kC . 6π π 0 0 R 1 Since π 2 0 u1 0 (t) sin πt dt ≤ 2πku1 0 kC , from (3.12) and (3.13) it follows that Z 1 0 2 u1 0 (t) sin πt dt 2πku1 kC ≥ π

(3.13)

0

Z ≥ a1

1

Z u1 (t) sin πt dt + b1

0



a

1



1

u1 0 (t) sin πt dt

0

+

4b1  ku1 0 kC . π3

a1 2b1 Since ku1 0 kC > 0, by this inequality we obtain that 12π 2 + π 4 ≤ 1, which contradicts the assumption in (F2). Hence (3.10) holds, namely A1 satisfies the condition of Lemma 2.4 in K ∩ ∂Ω2 . By Lemma 2.4, (3.9) holds.

11

688

Yongxiang Li ET AL 678-696

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Next, we show that A and A1 satisfy the condition of Lemma 2.5 in K ∩ ∂Ω2 when R is large enough, namely (1 − s)Au + sA1 u 6= u,

∀ u ∈ K ∩ ∂Ω2 ,

0 ≤ s ≤ 1.

(3.14)

If (3.14) is not valid, there exist u2 ∈ K ∩ ∂Ω2 and s0 ∈ [0, 1], such that (1 − s0 )Au2 + s0 A1 u2 = u2 . Since u2 = S((1 − s0 ) F (u2 ) + s0 F1 (u2 )), by the definition of S, u2 is the unique solution of LBVP(2.1) for h = (1 − s0 ) F (u2 ) + s0 F1 (u2 ) = F (u2 ) + s0 C0 ∈ C + (I). Hence, u2 ∈ C 3 (I) satisfies the differential equation ( t ∈ I, −u2 000 (t) = f (t, u2 (t), u2 0 (t), u2 00 (t)) + s0 C0 , (3.15) u2 (0) = u2 0 (0) = u2 0 (1) = 0 . Since u2 ∈ K ∩ ∂Ω2 , by the definition of K, (t, u2 (t), u2 0 (t), u2 00 (t)) ∈ G, t ∈ I. Hence by (3.6), we have f (t, u2 (t), u2 0 (t), u2 00 (t)) ≥ a1 u2 (t) + b1 u2 0 (t) − C0 ,

t ∈ I.

From this inequality and Equation (3.15), we obtain that −u2 000 (t) = f (t, u2 (t), u2 0 (t), u2 00 (t)) + s0 C0 ≥ a1 u2 (t) + b1 u2 0 (t) − (1 − s0 ) C0 , ≥ a1 u2 (t) + b1 u2 0 (t) − C0 ,

t ∈ I.

Multiplying this inequality by sin πt and integrating on I, then using integration by parts for the left side, we have Z 1 Z 1 Z 1 2C0 2 0 π u2 (t) sin πt dt ≥ a1 u2 (t) sin πt dt + b1 u2 0 (t) sin πt dt − . π 0 0 0 Using this inequality and Lemma 2.2 (2) and (3), we obtain that Z 1 0 2 2πku2 kC ≥ π u2 0 (t) sin πt dt 0

Z ≥ a1

1

Z u2 (t) sin πt dt + b1

0



a

1



1

u2 0 (t) sin πt dt −

0

+

2C0 π

4b1  2C0 ku2 0 kC − . 3 π π

From this inequality it follows that ku2 0 kC ≤

C0 a1 ( 12π 2

+

2b1 π4

− 1)π 2

:= M .

12

689

Yongxiang Li ET AL 678-696

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Hence, by Lemma 2.2(1) we obtain that ku2 kC ≤ ku2 0 kC ≤ M.

(3.16)

For this M > 0, by Assumption (F3), there is a positive continuous function gM (ρ) on satisfying (1.2) such that (1.3) holds. By (3.16) and definition of K, 0 ≤ u2 (t) ≤ M , 0 ≤ u2 0 (t) ≤ M , t ∈ I. Hence from (1.3) it follows that

R+

f (t, u2 (t), u2 0 (t), u2 00 (t)) ≤ gM (|u2 00 (t)|),

t ∈ I.

Combining this inequality with Equation (3.15), we obtain that −u2 000 (t) ≤ gM (|u2 00 (t)|) + C0 , From (1.3) we easily obtain that Z +∞ 0

t ∈ I.

(3.17)

ρ dρ = +∞. gM (ρ) + C0

Hence there exists a positive constant M1 ≥ M such that Z 0

M1

ρ dρ > M. gM (ρ) + C0

(3.18)

By Lemma 2.2(4), there exists ξ ∈ (0, 1) such that u2 00 (ξ) = 0, u2 00 (t) ≥ 0 for t ∈ [0, ξ], u2 00 (t) ≤ 0 for t ∈ [ξ, 1], and ku2 00 kC = max{u2 00 (0), −u2 00 (1)}. Hence ku2 00 kC = u2 00 (0) or ku2 00 kC = −u2 00 (1). We only consider the case of that ku2 00 kC = u2 00 (0), and the other case can be treated with a same way. Since u2 00 (t) ≥ 0 for t ∈ [0, ξ], multiplying both sides of the inequality (3.17) by u2 00 (t), we obtain that −u2 000 (t) u2 00 (t) ≤ u2 00 (t), gM (u2 00 (t)) + C0

t ∈ [0, ξ].

Integrating both sides of this inequality on [0, ξ] and making the variable transformation ρ = u2 00 (t) for the left side, we have Z 0

u2 00 (0)

ρ dρ ≤ u2 0 (ξ) − u2 0 (0) ≤ ku2 0 kC . gM (ρ) + C0

Since ku2 00 kC = u2 00 (0), from this inequality and (3.16) it follows that Z 0

ku2 00 kC

ρ dρ ≤ M. gM (ρ) + C0 13

690

Yongxiang Li ET AL 678-696

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Using this inequality and (3.18), we conclude that ku2 00 kC ≤ M1 .

(3.19)

Hence, from this inequality and (3.16) it follows that ku2 kC 2 ≤ M1 .

(3.20)

Let R > max{M1 , δ}. Since u2 ∈ K ∩∂Ω2 , by the definition of Ω2 , ku2 kC 2 = R > M1 . This contradicts (3.20). Hence, (3.14) holds, namely A and A1 satisfy the condition of Lemma 2.5 in K ∩ ∂Ω2 . By Lemma 2.5, we have i (A, K ∩ Ω2 , K) = i (A1 , K ∩ Ω2 , K).

(3.21)

Hence, from (3.21) and (3.9) it follows that i (A, K ∩ Ω2 , K) = 0.

(3.22)

Now using the additivity of the fixed point index, from (3.5) and (3.22), we conclude that i (A, K ∩ (Ω2 \ Ω1 ), K) = i (A, K ∩ Ω2 , K) − i (A, K ∩ Ω1 , K) = −1. Hence A has a fixed point in K ∩ (Ω2 \ Ω1 ), which is a positive solution of BVP(1.1). The proof of Theorem 1.1 is completed. 2 Proof of Theorem 1.2. Let Ω1 , Ω2 ⊂ C 2 (I) be defined by (3.1). We prove that the completely continuous mapping A : K → K defined by (2.14) has a fixed point in K ∩ (Ω2 \ Ω1 ) when r is small enough and R large enough. √ Let r ∈ (0, δ/ 3), where δ is the positive constant in Condition (F4). Choose v0 = 1 − cosπt and w0 = π 3 sin πt. Then S(w0 ) = v0 , and v0 ∈ K \ {θ}. We show that A satisfies the condition of Lemma 2.4 in K ∩ ∂Ω1 , namely u − Au 6= τ v0 ,

∀ u ∈ K ∩ ∂Ω1 ,

τ ≥ 0.

(3.23)

In fact, if (3.23) is not valid, there exist u0 ∈ K∩∂Ω1 and τ0 ≥ 0 such that u0 −Au0 = τ0 v0 . Since u0 = Au0 + τ0 v0 = S(F (u0 ) + τ0 w0 ), by definition of S, u0 is the unique solution of LBVP(2.1) for h = F (u0 ) + τ0 w0 ∈ C + (I). Hence u0 ∈ C 3 (I) satisfies the differential equation ( −u0 000 (t) = f (t, u0 (t), u0 0 (t), u0 00 (t)) + τ0 w0 (t), t ∈ I, (3.24) u0 (0) = u0 0 (0) = u0 0 (1) = 0 . Since u0 ∈ K ∩ ∂Ω1 , by the definitions of K and Ω1 , we have (t, u0 (t), u0 0 (t), u0 00 (t)) ∈ G,

|(u0 (t), u0 0 (t), u0 00 (t))| < δ,

t ∈ I.

14

691

Yongxiang Li ET AL 678-696

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Hence by Condition (F5) we have f (t, u0 (t), u0 0 (t), u0 00 (t)) ≥ a u0 (t) + b u0 0 (t),

t ∈ I.

From this inequality and Equation (3.24) it follows that −u0 000 (t) ≥ a u0 (t) + b u0 0 (t),

t ∈ I.

Multiplying this inequality by sin πt and integrating on I, then using integration by parts for the left side, we have Z 1 Z 1 Z 1 0 2 u0 0 (t) sin πt dt. u0 (t) sin πt dt + b u0 (t) sin πt dt ≥ a π 0

0

0

Using this inequality and Lemma 2.2 (2) and (3), we obtain that Z 1 0 2 u0 0 (t) sin πt dt 2πku0 kC ≥ π 0

Z ≥ a1

1

Z u0 (t) sin πt dt + b1

0

1

u0 0 (t) sin πt dt

0

a

4b1  1 ≥ + 3 ku0 0 kC . 6π π 2b1 a1 Since ku0 kC > 0, from this inequality it follows that 12π 2 + π 4 ≤ 1, which contradicts the assumption in (F4). Hence (3.23) holds, namely A satisfies the condition of Lemma 2.4 in K ∩ ∂Ω1 . By Lemma 2.4, we have

i (A, K ∩ Ω1 , K) = 0.

(3.25)

Let R > δ be large enough. We show that A satisfies the condition of Lemma 2.3 in K ∩ ∂Ω2 , namely µ Au 6= u, ∀ u ∈ K ∩ ∂Ω2 , 0 < µ ≤ 1. (3.26) In fact, if (3.26) is not valid, there exist u1 ∈ K ∩ ∂Ω2 and 0 < µ1 ≤ 1 such that µ1 Au1 = u1 . Since u1 = S(µ1 F (u1 )), by the definition of S, u1 ∈ C 3 (I) is the unique solution of LBVP(2.1) for h = µ1 F (u1 ) ∈ C + (I). Hence u1 ∈ C 3 (I) satisfies the differential equation ( −u1 000 (t) = µ1 f (t, u1 (t), u1 0 (t), u1 00 (t)), t ∈ I, (3.27) u1 (0) = u1 0 (0) = u1 0 (1) = 0 . Set C1 = max{|f (t, x, y, z) − (a1 x + b1 y + c1 |z|)| : (t, x, y, z) ∈ G, |(x, y, z)| ≤ H} + 1, where H is the constant in Condition (F5). Then by Condition (F5), we have f (t, x, y, z) ≤ a1 x + b1 y + c1 |z| + C1 ,

∀ (t, x, y, z) ∈ G.

(3.28)

15

692

Yongxiang Li ET AL 678-696

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Since u1 ∈ K ∩ ∂Ω2 , by the definition of K, (t, u1 (t), u1 0 (t), u1 00 (t)) ∈ G, t ∈ I. Hence by (3.28), we have f (t, u1 (t), u1 0 (t), u1 00 (t)) ≤ a1 u1 (t) + b1 u1 0 (t) + c1 |u1 00 (t)| + C1 ,

t ∈ I.

From this inequality with Equation (3.3), we obtain that |u1 000 (t)| = µ1 f (t, u1 (t), u1 0 (t), u1 00 (t)) ≤ f (t, u1 (t), u1 0 (t), u1 00 (t)) ≤ a1 u1 (t) + b1 u1 0 (t) + c1 |u1 00 (t)| + C1 ,

t ∈ I.

Using this inequality and Lemma 2.1, we have ku1 000 k2 ≤ a1 ku1 k2 + b1 ku1 0 k2 + c1 ku1 00 k2 + C1  a b1 c1  1 ≤ √ ku1 000 k2 + C1 . + 2+ π π 2π 2 Consequently, ku1 000 k2 ≤

1−

C1 +

√a1 2π 2

b1 π2

+

c1 π

 := R1 .

Hence by (2.2), we have ku1 kH 3 = max{ku1 k2 , ku1 0 k2 , ku1 00 k2 , ku1 000 k2 } = ku1 000 k2 ≤ R1 . By this estimate and the boundedness of Sobolev embedding H 3 (I) ,→ C 2 (I), we have ku1 kC 2 ≤ C ku1 kH 3 ≤ CR1 := R2 ,

(3.29)

where C is the Sobolev embedding constant. Choose R > max{R2 , δ}. Since u1 ∈ K ∩ ∂Ω2 , by the definition of Ω2 , we see that ku1 kC 2 = R > R2 , which contradicts (3.29). Hence, (3.26) holds, namely A satisfies the condition of Lemma 2.3 in K ∩ ∂Ω2 . By Lemma 2.3, we have i (A, K ∩ Ω2 , K) = 1.

(3.30)

Now, from (3.25) and (3.30) it follows that i (A, K ∩ (Ω2 \ Ω1 ), K) = i (A, K ∩ Ω2 , K) − i (A, K ∩ Ω1 , K) = 1. Hence A has a fixed-point in K ∩ (Ω2 \ Ω1 ), which is a positive solution of BVP(1.1). The proof of Theorem 1.2 is completed. 2 16

693

Yongxiang Li ET AL 678-696

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

Applications

In Theorem 1.1 and Theorem 1.2, we use the inequality conditions to describe the growth of the nonlinearity f as |(x, y, z)| → 0 and |(x, y, z)| → ∞. These inequality conditions can be replaced by the following upper and lower limits: f0 = lim inf

min

|(x,y,z)|→0 t∈I

f∞

f (t, x, y, z) , |(x, y, z)|

f 0 = lim sup max |(x,y,z)|→0

f (t, x, y, z) = lim inf min , |(x, y, z)| |(x,y,z)|→∞ t∈I

Set

f



t∈I

f (t, x, y, z) , |(x, y, z)|

f (t, x, y, z) = lim sup max . t∈I |(x, y, z)| |(x,y,z)|→∞ √ 12 3π 4 B= 2 . π +6

√ 2 2π √ , A= 1 + 2(1 + π)

(4.1)

(4.2)

By the definition (4.1), we can verify that f0 < A

=⇒ (F1) holds;

f∞ > B

=⇒ (F2) holds;

f0 > B

=⇒ (F4) holds;

f ∞ < A =⇒ (F5) holds. We only show the third assertion, and the other assertions can be showed with a similar way. Since f0 > B, we may choose positive constant σ > 0 such that f0 > B + σ. By definition f0 , there exists δ > 0 such that f (t, x, y, z) > B + σ, |(x, y, z)|

t ∈ I,

0 < |(x, y, z)| < δ.

This implies that f (t, x, y, z) >

B+σ √ (|x| + |y| + |z|), 3

√ . Then a 2 + 2b4 = Choose a = b = B+σ 12π π 3 that (F4) holds for these a, b and δ.

t ∈ I,

2 +6 π√ (B + σ) 12 3π 4

0 < |(x, y, z)| < δ.

> 1. The above inequality means

Hence, by Theorem 1.1 and Theorem 1.2, we obtain that Theorem 4.1 Let f : I × R+ × R+ × R → R+ be continuous. If f satisfies Assumption (F3) and the following condition (C1) f 0 < A, f∞ > B, then BVP(1.1) has at least one positive solution. 17

694

Yongxiang Li ET AL 678-696

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Theorem 4.2 Let f : I × R+ × R+ × R → R+ be continuous and satisfy the following condition (C2) f0 > B, f ∞ < A. Then BVP(1.1) has at least one positive solution. Example 4.1 Consider the superlinear third-order boundary value problem ( −u000 (t) = u4 (t) + (u0 (t))4 + (u000 (t))2 , t ∈ [0, 1], (4.3)

u(0) = u0 (0) = u0 (1) = 0 . We easily verify that the corresponding nonlinearity f (t, x, y, z) = z 4 + y 4 + z 2

satisfies the conditions (F3) and (C1). By Theorem 4.1, the equation (4.3) has at least one positive solution. Example 4.2 Consider the sublinear third-order boundary value problem  q  −u000 (t) = 3 |u(t)|2 + |u0 (t)|2 + |u00 (t)|2 , t ∈ [0, 1],

(4.4)

 u(0) = u0 (0) = u0 (1) = 0 . It is easy to see that the corresponding nonlinearity p f (t, x, y, z) = 3 |x|2 + |y|2 + |z|2 satisfies the condition (C2). By Theorem 4.2, the equation (4.4) has at least one positive solution.

References [1] M. Gregus, Third Order Linear Differential Equations, Reidel, Dordrecht, 1987. [2] M. Gregus, Two sorts of boundary-value problems of nonlinear third order differential equations, Arch. Math. 30(1994), 285-292. [3] D. J. O’Regan, Topological transversality: Application to third-order boundary value problem, SIAM J. Math. Anal. 19 (1987), 630-641. [4] P. Omari, M. Trombetta, Remarks on the lower and upper solutions method for second and third-order periodic boundary value problems, Appl. Math. Comput. 50(1992), 1-21. [5] A. Cabada, The method of lower and upper solutions for second, third, forth, and higher order boundary value problems, J. Math. Anal. Appl. 185(1994), 302-320.

18

695

Yongxiang Li ET AL 678-696

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[6] A. Cabada, The method of lower and upper solutions for third-order periodic boundary value problems, J. Math. Anal. Appl. 195(1995), 568-589. [7] A. Cabada, S. Lois, Existence of solution for discontinuous third order boundary value problems, J. Comput. Appl. Math. 110 (1999) 105-114. [8] A. Cabada, M.R. Grossinho, F. Minhos, On the solvability of some discontinuous third order nonlinear differential equations with two point boundary conditions, J. Math. Anal. Appl. 285(2003), 174-190. [9] M. R. Grossinho, F. Minhos, Existence result for some third order separated boundary value problems, Nonlinear Anal. 47(2001), 2407-2418. [10] M. Grossinho, F. Minhos, A. I. Santos, Solvability of some third-order boundary value problems with asymmetric unbounded nonlinearities, Nonlinear Analysis, 62(2005), 12351250. [11] M. Grossinho, F. Minhos, A. I. Santos, Existence result for a third-order ODE with nonlinear boundary conditions in presence of a sign-type Nagumo control, J. Math. Anal. Appl. 309(2005), 271-283. [12] Z. Du, W. Ge, X. Lin, Existence of solutions for a class of third-order nonlinear boundary value problems, J. Math. Anal. Appl. 294(2004), 104-112. [13] A. Benmezai, J. Henderson, M. Meziani, A third order boundary value problem with jumping nonlinearities, Nonlinear Analysis, 77 (2013), 33-44. [14] Q. Yao, Y. Feng, The existence of solutions for a third order two-point boundary value problem, Appl. Math. Lett. 15(2002), 227-232. [15] Y. Feng, S. Liu, Solvability of a third-order two-point boundary value problem, Appl. Math. Lett. 18 (2005), 1034-1040. [16] S. H. Li, Positive solutions of nonlinear singular third-order two-point boundary value problem, J. Math. Anal. Appl. 323(2006), 413-425. [17] Y. P. Sun, Positive solutions of singular third-order three-point boundary value problem, J. Math. Anal. Appl. 306(2005), 589-603. [18] Z. Liu, J. S. Ume, S. M. Kang, Positive solutions of a singular nonlinear third order two-point boundary value problem, J. Math. Anal. Appl. 326(2007), 589-601. [19] K. Deimling, Nonlinear Functional Analysis, Springer-Verlag, New York, 1985. [20] D. Guo, V. Lakshmikantham, Nonlinear Problems in Abstract Cones, Academic Press, New York, 1988.

19

696

Yongxiang Li ET AL 678-696

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Alghamdi et al. Iteration Scheme for Hemicontractive Operators in Arbitrary Banach Spaces Shin Min Kang1,2 , Arif Rafiq3 , Young Chel Kwun4,∗ and Faisal Ali5 1

Department of Mathematics and RINS, Gyeongsang National University, Jinju 52828, Korea e-mail: [email protected] 2 3

Center for General Education, China Medical University, Taichung 40402, Taiwan

Department of Mathematics and Statistics, Virtual University of Pakistan, Lahore 54000, Pakistan e-mail: [email protected] 4

5

Department of Mathematics, Dong-A University, Busan 49315, Korea e-mail: [email protected]

Center for Advanced Studies in Pure and Applied Mathematics, Bahauddin Zakariya University, Multan 60800, Pakistan e-mail: [email protected] Abstract The purpose of this paper is to characterize the conditions for the convergence of the iterative scheme in the sense of Alghamdi et al. [The implicit midpoint rule for nonexpansive mappings, Fixed Point Theory Appl., 2014 (2014), Article ID 96, 9 pages] associated with φ-hemicontractive mappings in a nonempty convex subset of an arbitrary Banach space. 2010 Mathematics Subject Classification: 47H10, 47J25 Key words and phrases: Modified iterative schemes, φ-hemicontractive mappings, Banach spaces

1

Introduction and Preliminaries

Let K be a nonempty subset of an arbitrary Banach space X and X ∗ be its dual space. The symbols D(T ) and F (T ) stand for the domain and the set of fixed points of T (for a single-valued map T : X → X, x ∈ X is called a fixed point of T iff T x = x). We denote ∗ by J the normalized duality mapping from E to 2E defined by J(x) = {f ∗ ∈ E ∗ : hx, f ∗ i = kxk2 = kf ∗ k2 }. ∗

Corresponding author

1 697

Shin Min Kang ET AL 697-706

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Let T : D(T ) ⊆ X → X be an operator. Definition 1.1. T is called Lipshitzian if there exists L > 1 such that kT x − T yk 6 L kx − yk , for all x, y ∈ K. If L = 1, then T is called non-expansive and if 0 6 L < 1, T is called contraction. Definition 1.2. ( [2, 4, 6]) (1) T is said to be strongly pseudocontractive if there exists a t > 1 such that for each x, y ∈ D(T ), there exists j(x − y) ∈ J(x − y) satisfying Re hT x − T y, j(x − y)i ≤

1 kx − yk2 . t

(2) T is said to be strictly hemicontractive if F (T ) 6= ∅ and if there exists a t > 1 such that for each x ∈ D(T ) and q ∈ F (T ), there exists j(x − y) ∈ J(x − y) satisfying Re hT x − q, j(x − q)i ≤

1 kx − qk2 . t

(3) T is said to be φ-strongly pseudocontractive if there exists a strictly increasing function φ : [0, ∞) → [0, ∞) with φ(0) = 0 such that for each x, y ∈ D(T ), there exists j(x − y) ∈ J(x − y) satisfying Re hT x − T y, j(x − y)i ≤ kx − yk2 − φ(kx − yk) kx − yk . (4) T is said to be φ-hemicontractive if F (T ) 6= ∅ and if there exists a strictly increasing function φ : [0, ∞) → [0, ∞) with φ(0) = 0 such that for each x ∈ D(T ) and q ∈ F (T ), there exists j(x − y) ∈ J(x − y) satisfying Re hT x − q, j(x − q)i ≤ kx − qk2 − φ(kx − qk) kx − qk . Clearly, each strictly hemicontractive operator is φ-hemicontractive. For a nonempty convex subset K of a normed space X, T : K → K is an operator (a) the Mann iteration scheme [9] is defined by the following sequence {xn } : ( x1 ∈ K, xn+1 = (1 − bn) xn + bn T xn ,

where {bn } is a sequence in [0, 1]. (b) the sequence {xn } defined by    x1 ∈ K, yn = (1 − b0n ) xn + b0n T xn ,   x n+1 = (1 − bn ) xn + bnT yn ,

n ≥ 1,

n ≥ 1,

where {bn } and {b0n } are sequences in [0, 1] is known as the Ishikawa iteration scheme [4]. 2 698

Shin Min Kang ET AL 697-706

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Chidume [2] established that the Mann iteration sequence converges strongly to the unique fixed point of T in case T is a Lipschitz strongly pseudo-contractive mapping from a bounded closed convex subset of Lp (or lp ) into itself. Afterwards, several authors generalized this result of Chidume in various directions [3, 5–8, 11, 12, 15, 16]. For a finite family of nonexpansive mappings {Ti : i ∈ {1, 2, . . ., N }} with a real sequence {tn } ∈ (0, 1), and %0 ∈ X, where X is an arbitrary Banach space, the following implicit iteration process is due to Xu and Ori [14]: x1 = (1 − t1 )x0 + t1 T1 x1 , x2 = (1 − t2 )x1 + t2 T2 x2 , .. . xN = (1 − tN )xN −1 + tN TN xN , xN +1 = (1 − tN +1 )xN + tN +1 TN +1 xN +1 , ... which can be written in the following compact form: xn = (1 − tn )xn−1 + tn Tn xn , for all n ≥ 1,

(XO)

where Tn = Tn(mod N ∈{1,2,...,N }) . For the common fixed point of the finite family of nonexpansive mappings defined in a Hilbert space, Xu and Ori [14] proved the weak convergence of the implicit iteration process. Lately Alghamdi et al. [1] introduced the following iteration process in a Hilbert space H: Algorithm 1.3. Initialize x0 ∈ H arbitrarily and define   xn + xn+1 xn+1 = (1 − tn )xn + tn T , 2 where tn ∈ (0, 1) for all n ∈ N ∪ {0} For the approximation of fixed points of nonexpansive mappings under the setting of Hilbert spaces, they proved the following results: Lemma 1.4. Let {xn } be the sequence generated by Algorithm 1.3. Then (i) kxn+1 − pk ≤ kxn − pk for all n ≥ 0 and p ∈ F (T ), P (ii) ∞ tn kxn − xn+1 k2 < ∞, Pn=1 ∞ n+1 (iii) n=1 tn (1 − tn )kxn − T ( xn +x )k2 < ∞. 2

Lemma 1.5. Let {xn } be the sequence generated by Algorithm 1.3. Suppose that t2n+1 ≤ atn for all n ≥ 0 and a > 0. Then lim kxn+1 − xn k = 0.

n→∞

3 699

Shin Min Kang ET AL 697-706

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Lemma 1.6. Assume that (i) t2n+1 ≤ atn for all n ≥ 0 and a > 0, (ii) lim inf n→∞ tn > 0. Then the sequence {xn } generated by Algorithm 1.3 satisfies the property lim kxn − T xn k = 0.

n→∞

Theorem 1.7. Let H be a Hilbert space and T : H → H be a nonexpansive mapping with F (T ) 6= ∅. Assume that {xn } is generated by Algorithm 1.3, where the sequence {tn } of parameters satisfies the conditions (i) and (ii) of Lemma 1.6. Then {xn } converges weakly to a fixed point of T . The purpose of this paper is to characterize conditions for the convergence of the iterative scheme in the sense of Alghamdi et al. [1] associated with φ-hemicontractive mappings in a nonempty convex subset of an arbitrary Banach space. Our results improve and generalize most results in recent literature [1–3, 6–8, 15, 16].

2

Main results

The following result is now well known. Lemma 2.1. [13] For all x, y ∈ X and j(x + y) ∈ J(x + y), kx + yk2 ≤ kxk2 + 2Re hy, j(x + y)i . Now we prove our main results. Theorem 2.2. Let K be a nonempty closed and convex subset of an arbitrary Banach space X and T : K → K be continuous φ-hemicontractive mappings. For any x1 ∈ K, define the sequence {xn }∞ n=1 inductively as follows:   xn−1 + xn xn = (1 − tn )xn−1 + tn T , n ≥ 1, (2.1) 2 where {tn }∞ n=1 is a sequence in [0, 1] satisfying the following conditions (i) limn→∞ tn = 0 and P (ii) ∞ n=1 tn = ∞. Then the following conditions are equivalent: (a) {xn }∞ strongly to the fixed point q of T . n=1 converges   ∞ (b) T xn−12+xn n=1 is bounded.

Proof. First we prove that (a) implies (b). Since T is φ-hemicontractive, it follows that F (T ) is a singleton. Let F (T ) = {q} for some q ∈ K. Suppose that limn→∞ xn = q. Then the continuity of T yield that   xn−1 + xn lim T = q. n→∞ 2 4 700

Shin Min Kang ET AL 697-706

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

 Therefore T

xn−1 +xn  ∞ 2 n=1

is bounded.

Second we need to show that (b) implies (a). Put

 

xn−1 + xn

− q M1 = kx0 − qk + sup T

. 2 n≥1

Obviously M1 < ∞. It is clear that kx0 − qk ≤ M1 . Let kxn−1 − qk ≤ M1 . Next we will prove that kxn − qk ≤ M1 . Consider

 

xn−1 + xn

kxn − qk = (1 − tn )xn−1 + tn T − q

2

 

x + x n−1 n − q) =

(1 − tn )(xn−1 − q) + tn (T 2

 

xn−1 + xn − q ≤ (1 − tn ) kxn−1 − qk + tn

T 2 ≤ (tn + (1 − tn ))M1 = M1 .

So, from the above discussion, we can conclude that the sequence {xn − p}n≥0 is bounded. Thus there is a constant M2 > 0 satisfying





x + x n−1 n M2 = sup kxn − qk + sup − q

T

. 2 n≥1

(2.2)

n≥1

Denote M = M1 + M2 . Obviously M < ∞.

 Let wn = T xn − T xn−12+xn for each n ≥ 1. The continuity of T ensures that lim wn = 0,

n→∞

(2.3)

because



xn − xn−1 + xn = 1 kxn−1 − xn k

2 2

  xn−1 + xn 1

= tn xn−1 − T

2 2 ≤ M tn

→0

as n → ∞. 5 701

Shin Min Kang ET AL 697-706

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

By virtue of Lemma 3 and (2.1), we infer that

 

xn−1 + xn 2

kxn − qk = (1 − tn )xn−1 + tn T − q

2

2

 

xn−1 + xn

− q) = (1 − tn )(xn−1 − q) + tn (T

2     xn−1 + xn ≤ (1 − tn )2 kxn−1 − qk2 + 2tn Re T − q, j(xn − q) 2     xn−1 + xn 2 2 , j(xn − q) ≤ (1 − tn ) kxn−1 − qk + 2tn Re T xn − T (2.4) 2 + 2tn Re hT xn − q, j(xn − q)i

 

xn−1 + xn 2 2

kxn − qk ≤ (1 − tn ) kxn−1 − qk + 2tn T xn − T

2 + 2tn kxn − qk2 − 2tn φ(kxn − qk) kxn − qk

≤ (1 − tn )2 kxn−1 − qk2 + 2M tn wn + 2tn kxn − qk2 − 2tn φ(kxn − qk) kxn − qk . Also

2  

x + x n−1 n kxn − qk = − q

(1 − tn )xn−1 + tn T

2

2

 

x + x n−1 n − q) =

(1 − tn )(xn−1 − q) + tn (T 2

2

  

x + x n−1 n − p ≤ (1 − tn ) kxn−1 − pk + tn

T 2

 

2

xn−1 + xn

− p ≤ (1 − tn ) kxn−1 − pk2 + tn T

2 2

(2.5)

≤ (1 − tn ) kxn−1 − pk2 + M 2 tn ,

where the second inequality holds by the convexity of k·k2 . By substituting (2.5) in (2.4), we get  kxn − qk2 ≤ (1 − tn )2 + 2tn (1 − tn ) kxn−1 − pk2 + 2M tn (wn + M tn ) − 2tn φ(kxn − qk) kxn − qk  = 1 − t2n kxn−1 − pk2 + 2M tn (wn + M tn ) − 2tn φ(kxn − qk) kxn − qk

(2.6)

≤ kxn−1 − pk2 + 2M tn (wn + M tn ) − 2tn φ(kxn − qk) kxn − qk = kxn−1 − qk2 + tn ln − 2tn φ(kxn − qk) kxn − qk , where ln = 2M (wn + M tn ) → 0

(2.7)

as n → ∞. 6 702

Shin Min Kang ET AL 697-706

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Let δ = inf{kxn − qk : n ≥ 0}. We claim that δ = 0. Otherwise δ > 0. Thus (2.7) implies that there exists a positive integer N1 > N0 such that ln < φ(δ)δ for each n ≥ N1 . In view of (2.6), we conclude that kxn − qk2 ≤ kxn−1 − qk2 − φ(δ)δtn , which implies that φ(δ)δ

∞ X

n ≥ N1 ,

tn ≤ kxN1 − qk2 ,

(2.8)

n=N1

which contradicts (ii). Therefore δ = 0. Thus there exists a subsequence {xni }∞ n=1 of ∞ {xn }n=1 such that lim xni = q. (2.9) i→∞

Let  > 0 be a fixed number. By virtue of (2.7)and (2.9), we can select a positive integer i0 > N1 such that

xn − q < , ln < φ(), n ≥ ni . (2.10) i0 0 Let p = ni0 . By induction, we show that

kxp+m − qk < ,

m ≥ 1.

(2.11)

Observe that (2.6) means that (2.11) is true for m = 1. Suppose that (2.11) is true for some m ≥ 1. If kxp+m − qk ≥ , by (2.6) and (2.10) we know that 2 ≤ kxp+m − qk2 ≤ kxp+m−1 − qk2 + tp+m lp+m − 2tp+m φ(kxp+m − qk) kxp+m − qk < 2 + tp+m φ() − 2tp+m φ() = 2 − tp+m φ() < 2 , which is impossible. Hence kxp+m − qk < . That is, (2.11) holds for all m ≥ 1. Thus (2.11) ensures that limn→∞ xn = q. This completes the proof. Taking xn−1 ' xn in Theorem 2.2, we get Theorem 2.3. Let K be a nonempty closed and convex subset of an arbitrary Banach space X, T : K → K be continuous φ-hemicontractive mapping. For any x1 ∈ K, define the sequence {xn }∞ n=1 inductively as follows: xn = (1 − tn )xn−1 + tn T xn ,

n ≥ 1,

where {tn }∞ n=1 is a sequence in [0, 1] satisfying the conditions (i) and (ii) of Theorem 2.2. Then the following conditions are equivalent: (a) {xn }∞ n=1 converges strongly to the fixed point q of T . (b) {T xn }∞ n=1 is bounded. 7 703

Shin Min Kang ET AL 697-706

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Remark 2.4. 1. All the results can also be proved for the same iterative scheme with error terms. 2. The known results for strongly pseudocontractive mappings are weakened by the φ-hemicontractive mappings. 3. Our results hold in arbitrary Banach spaces, where as other known results are restricted for Lp (or lp ) spaces and q-uniformly smooth Banach spaces. 4. Theorem 2.2 is more general in comparison to the results of Alghamdi et al. [1] and Sahu et al. [10] in the context of the class of φ-hemicontractive mappings.

3

Applications

Theorem 3.1. Let X be an arbitrary real Banach space and let T : X → X be continuous φ-strongly accretive operators. For any x1 ∈ X, define the sequence {xn }∞ n=1 inductively as follows: xn = (1 − tn )xn−1 + tn (f + (I − T )xn ), n ≥ 1, where {tn }∞ n=1 be the sequence in [0, 1] satisfying the conditions (i) and (ii) of Theorem 2.2. Then the following conditions are equivalent: (a) {xn }∞ n=1 converges strongly to the solution of the system f = T x. (b) {(I − T )xn }∞ n=1 is bounded. Proof. Suppose that x∗ is the solution of the system f = T x. Define G : X → X by Gx = f + (I − S)x. Then x∗ is the fixed point of G. Thus Theorem 3.1 follows from Theorem 2.2. Example 3.2. Let X = R be the reals with the usual norm and K = [0, 1]. Define T : K → K by T x = x − tan x for all x ∈ K. By mean value theorem, we have |T x − T y| ≤ sup |T 0 c||x − y| for all x, y ∈ K. c∈(0,1)

Noticing that T 0 c = c − sec2 c and 1 < supc∈(0,1) |T 0 c| = 2.4255. Hence |T x − T y| ≤ L|x − y| for all x, y ∈ K, where L = 2.4255. It is easy to verify that T is φ-hemicontractive mapping with φ : [0, ∞) → [0, ∞) defined by φ(t) = tan t for all t ∈ [0, ∞). Moreover, 0 is the fixed point of T.

Acknowledgement This work was supported by the Dong-A University research fund, Korea. 8 704

Shin Min Kang ET AL 697-706

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

References [1] M. A. Alghamdi, M. A. Alghamdi, N. Shahzad. and H.-K. Xu, The implicit midpoint rule for nonexpansive mappings, Fixed Point Theory Appl., 2014 (2014), Article ID 96, 9 pages. [2] C. E. Chidume, Iterative approximation of fixed point of Lipschitz strictly pseudocontractive mappings, Proc. Amer. Math. Soc., 99 (1987), 283–288. [3] L. B. Ciric and J. S. Ume, Ishikawa iterative process for strongly pseudocontractive operators in Banach spaces, Math. Commun., 8 (2003), 43–48. [4] S. Ishikawa, Fixed point by a new iteration method, Proc. Amer. Math. Soc., 44 (1974), 147–150. [5] L. S. Liu, Ishikawa and Mann iterative process with errors for nonlinear strongly accretive mappings in Banach spaces, J. Math. Anal. Appl., 194 (1995), 114–125. [6] L. W. Liu, Approximation of fixed points of a strictly pseudocontractive mapping, Proc. Amer. Math. Soc., 125 (1997), 1363–1366. [7] Z. Liu, J. K. Kim and S. M. Kang, Necessary and sufficient conditions for convergence of Ishikawa iterative schemes with errors to φ-hemicontractive mappings, Commun. Korean Math. Soc., 18 (2003), 251–261. [8] Z. Liu, Y. Xu and S. M. Kang, Almost stable iteration schemes for local strongly pseudocontractive and local strongly accretive operatorsin real uniformly smooth Banach spaces, Acta Math. Univ. Comenian., 77 (2008), 285–298. [9] W. R. Mann, Mean value methods in iteraiton, Proc. Amer. Math. Soc., 4 (1953), 506–510. [10] D. R. Sahu, K. K. Singh and V. K. Singh, Some Newton-like methods with sharper error estimates for solving operator equations in Banach spaces, Fixed Point Theory Appl., 2012 (2012), Article ID 78, 20 pages. [11] K. K. Tan and H. K. Xu, Iterative solutions to nonlinear equations of strongly accretive operators in Banach spaces, J. Math. Anal. Appl., 178 (1993), 9–21. [12] Y. Xu, Ishikawa and Mann iterative processes with errors for nonlinear strongly accretive operator equations, J. Math. Anal. Appl., 224 (1998), 91–101. [13] H. K. Xu, Inequality in Banach spaces with applications, Nonlinear Anal., 16 (1991) 1127–1138. [14] H. K. Xu and R. Ori, An implicit iterative process for nonexpansive mappings, Numer. Funct. Anal. Optim. 22 (2001), 767–773. [15] Z. Xue, Iterative approximation of fixed point for φ-hemicontractive mapping without Lipschitz assumption, Int. J. Math. Math. Sci., 17 (2005), 2711–2718. 9 705

Shin Min Kang ET AL 697-706

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[16] H. Y. Zhou and Y. J. Cho, Ishikawa and Mann iterative processes with errors for nonlinear φ-strongly quasi-accretive mappings in normed linear spaces, J. Korean Math. Soc., 36 (1999), 1061–1073.

10 706

Shin Min Kang ET AL 697-706

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Lyapunov-type inequalities for fractional differential equations under multi-point boundary conditions Youyu Wang B and Qichao Wang Department of Mathematics, Tianjin University of Finance and Economics, Tianjin 300222, P. R. China

Abstract. In this work, we establish new Lyapunov-type inequalities for fractional differential equations with multi-point boundary conditions. Our conclusions cover many results in the literature. Keywords: Lyapunov inequality, fractional differential equation, multi-point boundary value problem, Green’s function. 2010 Mathematics Subject Classification: 34A40, 26A33, 34B05.

1

Introduction

The well-known result of Lyapunov [9] states that if u(t) is a nontrivial solution of the differential system u00 (t) + r (t)u(t) = 0, t ∈ ( a, b), (1.1) u ( a ) = 0 = u ( b ), where r (t) is a continuous function defined in [ a, b], then Z b a

|r (t)|dt >

4 , b−a

(1.2)

and the constant 4 cannot be replaced by a larger number. Lyapunov inequality (1.2) is a useful tool in various branches of mathematics including disconjugacy, oscillation theory, and eigenvalue problems. Many improvements and generalizations of the inequality (1.2) have appeared in the literature. A thorough literature review of continuous and discrete Lyapunov-type inequalities and their applications can be found in the survey articles by Cheng [3], Brown and Hinton [1] and Tiryaki [12]. The study of Lyapunov-type inequalities for the differential equation depends on a fractional differential operator was initiated by Rui A. C. Ferreira [4]. He first obtained a Lyapunovtype inequality when the differential equation depends on the Riemann-Liouville fractional derivative, the main result is as follows. Theorem 1.1. If the following fractional boundary value problem

( Daα+ u)(t) + q(t)u(t) = 0,

a < t < b, 1 < α ≤ 2,

u ( a ) = 0 = u ( b ),

(1.4)

has a nontrivial solution, where q is a real and continuous function, then µ ¶ α −1 Z b 4 |q(s)|ds > Γ(α) . b−a a B Corresponding

(1.3)

(1.5)

author. Email: [email protected]

707

Youyu Wang ET AL 707-716

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

Y. Wang, Q. Wang

Recently, some Lyapunov-type inequalities were obtained for different fractional boundary value problems. In this direction, we refer to Ferreira [5], Jleli and Samet [6, 7], O’Regan and Samet [10], Rong and Bai [11] and Cabrera, Sadarangani, and Samet [2]. For example, Cabrera, Sadarangani, and Samet [2] obtain some Lyapunov-type inequalities for a higher-order nonlocal fractional boundary value problem, they give the following Lyapunov inequalities. Theorem 1.2. If the fractional boundary value problem

( Daα+ u)(t) + q(t)u(t) = 0, 0

a < t < b, 2 < α ≤ 3,

(1.6)

0

u( a) = u ( a) = 0,

u (b) = βu(ξ ),

(1.7)

has a nontrivial solution, where q is a real and continuous function, a < ξ < b, 0 ≤ β(ξ − a)α−1 < (α − 1)(b − a)α−2 , then Z b a

µ

(b − s)α−2 (s − a)|q(s)|ds ≥

β ( b − a ) α −1 (α − 1)(b − a)α−2 − β(ξ − a)α−1

1+

¶ −1 Γ ( α ).

(1.8)

Theorem 1.3. If the fractional boundary value problem

( Daα+ u)(t) + q(t)u(t) = 0, 0

u( a) = u ( a) = 0,

a < t < b, 2 < α ≤ 3,

(1.9)

0

u (b) = βu(ξ ),

(1.10)

has a nontrivial solution, where q is a real and continuous function, a < ξ < b, 0 ≤ β(ξ − a)α−1 < (α − 1)(b − a)α−2 , then Z b a

Γ(α)(α − 1)α−1 |q(s)|ds ≥ ( b − a ) α −1 ( α − 2 ) α −2

µ

β ( b − a ) α −1 1+ (α − 1)(b − a)α−2 − β(ξ − a)α−1

¶ −1 .

(1.11)

Motivated by [2], in this paper, we study the problem of finding some Lyapunov-type inequalities for the fractional differential equations with multi-point boundary conditions.

( Daα+ u)(t) + q(t)u(t) = 0, u( a) = u0 ( a) = 0,

β +1

a < t < b, 2 < α ≤ 3, m −2

( Da+ u)(b) =



i =1

(1.12)

β

bi ( Da+ u)(ξ i ),

(1.13)

where Daα+ denotes the standard Riemann-Liouville fractional derivative of order α, α > β + 2, 0 ≤ β < 1, a < ξ 1 < ξ 2 < · · · < ξ m−2 < b, bi ≥ 0(i = 1, 2, · · · , m − 2), 0 ≤ ∑im=−12 bi (ξ i − a)α− β−1 < (α − β − 1)(b − a)α− β−2 and q : [ a, b] → R is a continuous function.

2

Preliminaries

In this section, we recall the concepts of the Riemann-Liouville fractional integral, the RiemannLiouville fractional derivative of order α ≥ 0. Definition 2.1. [8] Let α ≥ 0 and f be a real function defined on [ a, b]. The Riemann-Liouville fractional integral of order α is defined by ( Ia0+ f ) ≡ f and

( Iaα+ f )(t) =

1 Γ(α)

Z t a

(t − s)α−1 f (s)ds,

708

α > 0, t ∈ [ a, b].

Youyu Wang ET AL 707-716

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Lyapunov-type inequalities under multi-point boundary conditions

3

Definition 2.2. [8] The Riemann-Liouville fractional derivative of order α ≥ 0 is defined by ( Da0+ f ) ≡ f and

( Daα+

f )(t) =

( D m Iam+−α f )(t)

³ d ´m 1 = Γ(m − α) dt

Z t a

(t − s)m−α−1 f (s)ds,

for α > 0, where m is the smallest integer greater or equal to α. Lemma 2.3. [8] Assume that u ∈ C ( a, b) ∩ L( a, b) with a fractional derivative of order α > 0 that belongs to C ( a, b) ∩ L( a, b). Then Iaα+ ( Daα+ u)(t) = u(t) + c1 (t − a)α−1 + c2 (t − a)α−2 + · · · + cn (t − a)α−n , where ci ∈ R, i = 1, 2, · · · , n, and n = [α] + 1. Lemma 2.4. For 2 < α ≤ 3, 0 ≤ β < 1, we have Γ(α) ( t − a ) α − β −1 , Γ(α − β) Γ(α) β +1 ( Da+ (s − a)α−1 )(t) = ( t − a ) α − β −2 . Γ ( α − β − 1) β

( Da+ (s − a)α−1 )(t) =

3

Main Results

We begin by writing problems (1.12)-(1.13) in its equivalent integral form. Lemma 3.1. We have that u ∈ C [ a, b] is a solution to the boundary value problem (1.12)-(1.13) if and only if u satisfies the integral equation à ! Z Z u(t) =

b

a

G (t, s)q(s)u(s)ds + T (t)

b

a

m −2



bi H (ξ, s)q(s)u(s)

where G (t, s), H (t, s) and T (t) defined by  ( t − a ) α −1 ( b − s ) α − β −2 − ( t − s ) α −1 , a ≤ 1  ( b − a ) α − β −2 G (t, s) = α −1 s ) α − β −2 Γ(α)  (t−a) (bα− , a≤ ( b − a ) − β −2  ( t − a ) α − β −1 ( b − s ) α − β −2 − ( t − s ) α − β −1 , 1  ( b − a ) α − β −2 H (t, s) = α − β −1 ( b − s ) α − β −2 Γ ( α )  (t− a) , ( b − a ) α − β −2 T (t) =

ds,

(3.1)

i =1

s ≤ t ≤ b, t ≤ s ≤ b. a ≤ s ≤ t ≤ b, a ≤ t ≤ s ≤ b,

( t − a ) α −1 , t ≥ a. (α − β − 1)(b − a)α− β−2 − ∑im=−12 bi (ξ i − a)α− β−1

Proof. From Lemma 2.3, u ∈ C [ a, b] is a solution to the boundary value problem (1.12)-(1.13) if and only if u(t) = c1 (t − a)α−1 + c2 (t − a)α−2 + c3 (t − a)α−3 − ( Iaα+ qu)(t), for some real constants c1 , c2 , c3 . Using the boundary condition u( a) = u0 ( a) = 0, we obtain c2 = c3 = 0. Thus u(t) = c1 (t − a)α−1 − ( Iaα+ qu)(t).

709

Youyu Wang ET AL 707-716

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

Y. Wang, Q. Wang

Applying Lemma 2.4, we obtain Γ(α) α− β (t − a)α− β−1 − ( Ia+ qu)(t), Γ(α − β) Γ(α) β +1 α − β −1 ( Da+ u)(t) = c1 ( t − a ) α − β −2 − ( Ia + qu)(t), Γ ( α − β − 1) β

( Da+ u)(t) = c1

β +1

β

the boundary condition ( Da+ u)(b) = ∑im=−12 bi ( Da+ u)(ξ i ) imply that Z

b 1 Γ(α) ( b − a ) α − β −2 − (b − s)α− β−2 q(s)u(s)ds Γ ( α − β − 1) Γ ( α − β − 1) a ¸ Z ξi m −2 · Γ(α) 1 α − β −1 α − β −1 (ξ i − s) q(s)u(s)ds , = ∑ bi c 1 (ξ i − a) − Γ(α − β) Γ(α − β) a i =1

c1

thus c1 =

α−β−1 [(α − β − 1)(b − a)α− β−2 − ∑im=−12 bi (ξ i − a)α− β−1 ]Γ(α)



Z b a

(b − s)α− β−2 q(s)u(s)ds

m −2 1 ∑ bi [(α − β − 1)(b − a)α− β−2 − ∑im=−12 bi (ξ i − a)α− β−1 ]Γ(α) i=1

Z ξi a

(ξ i − s)α− β−1 q(s)u(s)ds.

By the relation 1

(α − β − 1)(b − +

(α − β − 1)(b −

we obtain c1 =

1 Γ(α)

+ −

Z b ( b − s ) α − β −2 a

q(s)u(s)ds ( b − a ) α − β −2 R b ( ξ − a ) α − β −1 ( b − s ) α − β −2 q(s)u(s)ds ∑im=−12 bi a i (b−a)α−β−2

[(α − β − 1)(b − a)α− β−2 − ∑im=−12 bi (ξ i − a)α− β−1 ]Γ(α) Rξ ∑im=−12 bi a i (ξ i − s)α− β−1 q(s)u(s)ds [(α − β − 1)(b − a)α− β−2 − ∑im=−12 bi (ξ i − a)α− β−1 ]Γ(α)

therefore u ( t ) = c 1 ( t − a ) α −1 −

=

( t − a ) α −1 Γ(α)

1 Γ(α)

Z b (b a

Z t

(b − a)

q(s)u(s)ds − α − β −2

Rb

1 Γ(α)

Z t a

(t − s)α−1 q(s)u(s)ds

( ξ i − a ) α − β −1 ( b − s ) α − β −2 q(s)u(s)ds ( b − a ) α − β −2 + [(α − β − 1)(b − a)α− β−2 − ∑im=−12 bi (ξ i − a)α− β−1 ]Γ(α) Rξ (t − a)α−1 ∑im=−12 bi a i (ξ i − s)α− β−1 q(s)u(s)ds − [(α − β − 1)(b − a)α− β−2 − ∑im=−12 bi (ξ i − a)α− β−1 ]Γ(α) Ã ! Z b Z b m −2 a

,

(t − s)α−1 q(s)u(s)ds

a − s ) α − β −2

(t − a)α−1 ∑im=−12 bi

=

1

=

(α − β − 1)(b − a)α− β−2 − ∑im=−12 bi (ξ i − a)α− β−1 ∑im=−12 bi (ξ i − a)α− β−1 , a)α− β−2 [(α − β − 1)(b − a)α− β−2 − ∑im=−12 bi (ξ i − a)α− β−1 ]

a ) α − β −2

a

G (t, s)q(s)u(s)ds + T (t)

a



bi H (ξ, s)q(s)u(s)

ds,

i =1

which concludes the proof.

710

Youyu Wang ET AL 707-716

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Lyapunov-type inequalities under multi-point boundary conditions

5

Lemma 3.2. The function G defined in Lemma 3.1 satisfy the following properties: (i) G (t, s) ≥ 0, for all (t, s) ∈ [ a, b] × [ a, b]; (ii) G (t, s) is non-decreasing with respect to the first variable; (iii) 0 ≤ G ( a, s) ≤ G (t, s) ≤ G (b, s) = Γ(1α) (b − s)α− β−2 [(b − a) β+1 − (b − s) β+1 ], (t, s) ∈ [ a, b] × [ a, b]. (iv) For any s ∈ [ a, b], β+1 · max G (b, s) = α−1 s∈[ a,b]

µ

α−β−2 α−1

¶ α−β+β−1 2

( b − a ) α −1 . Γ(α)

Proof. Let us define two functions

( t − a ) α −1 ( b − s ) α − β −2 − (t − s)α−1 , a ≤ s ≤ t ≤ b, ( b − a ) α − β −2 ( t − a ) α −1 ( b − s ) α − β −2 g2 (t, s) = , a ≤ t ≤ s ≤ b. ( b − a ) α − β −2

g1 (t, s) =

(i) It is clear that for a ≤ t ≤ s ≤ b, G (t, s) = a ≤ s ≤ t ≤ b, by the relation

b−s b− a



t−s t− a , β

1 g (t, s) Γ(α) 2

≥ 0. On the other hand, for

≥ 0, α > 2, we obtain

Γ(α) G (t, s) = g1 (t, s)

( t − a ) α −1 ( b − s ) α − β −2 − ( t − s ) α −1 ( b − a ) α − β −2 "µ ¶ µ ¶ # b − s α − β −2 t − s α −1 α −1 = (t − a) − b−a t−a "µ ¶ µ ¶ µ ¶ # t − s α −1 b − a β +1 b − s α −1 α −1 − = (t − a) b−s b−a t−a "µ # ¶ µ ¶ t − s α −1 b − s α −1 α −1 ≥ (t − a) − b−a t−a =

≥ 0. Then (i) is proved. (ii) For a ≤ t ≤ s ≤ b, we have Γ(α)

∂G (t, s) ∂g2 (t, s) (α − 1)(t − a)α−2 (b − s)α− β−2 = = ≥ 0. ∂t ∂t ( b − a ) α − β −2

´ α − β −2 ³ t−s −s b−s For a ≤ s ≤ t ≤ b, by the relation bb− ≥ , β ≥ 0, α − 2 > 0, we − have a t− a b− a ¡ t − s ¢ α −2 ³ b − a ´ β ³ b − s ´ α −2 ¡ t − s ¢ α −2 ³ b − s ´ α −2 ¡ t − s ¢ α −2 = b−s − t− a ≥ b− a − t− a ≥ 0, so we obtain t− a b− a ∂g (t, s) ∂G (t, s) = 1 = ( α − 1) Γ(α) ∂t ∂t



b−s b−a

#

¶ α − β −2

= (α − 1)(t − a)α−2

(t − a) "µ

b−s b−a

α −2

− (t − s)

¶ α − β −2

µ



t−s t−a

α −2

¶ α −2 #

≥ 0.

711

Youyu Wang ET AL 707-716

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

Y. Wang, Q. Wang

Then we proved that G (t, s) is non-decreasing with respect to the first variable t. (iii) The result follows immediately from (ii). (iv) Let ϕ(s) = Γ(α) G (b, s) = (b − a) β+1 (b − s)α− β−2 − (b − s)α−1 , s ∈ [ a, b]. We have ϕ0 (s) = −(α − β − 2)(b − a) β+1 (b − s)α− β−3 + (α − 1)(b − s)α−2

= (b − s)α− β−3 [(α − 1)(b − s) β+1 − (α − β − 2)(b − a) β+1 ]. Moreover,

α−β−2 ( b − a ) β +1 . α−1 It is not difficult to observe that ϕ0 (s) ≥ 0, if s ≤ s∗ and ϕ0 (s) < 0, if s > s∗ . Therefore, µ ¶ α − β −2 α − β − 2 β +1 β+1 ∗ ( b − a ) α −1 . max ϕ(s) = ϕ(s ) = · α − 1 α − 1 s∈[ a,b] ϕ0 (s) = 0, s ∈ ( a, b) ⇔ (b − s∗ ) β+1 =

Lemma 3.3. The function H defined in Lemma 3.1 satisfy the following properties: (i) H (t, s) ≥ 0, for all (t, s) ∈ [ a, b] × [ a, b]; (ii) H (t, s) is non-decreasing with respect to the first variable; (iii) 0 ≤ H ( a, s) ≤ H (t, s) ≤ H (b, s) = Γ(1α) (b − s)α− β−2 (s − a), (t, s) ∈ [ a, b] × [ a, b]. (iV) µ ¶ α − β −1 ( α − β − 2 ) α − β −2 b−a ∗ max H (b, s) = H (b, s ) = . Γ(α) α−β−1 s∈[ a,b] where s∗ =

α − β −2 α − β −1 a

+

1 α− β−1 b.

Proof. Let us define two functions

( t − a ) α − β −1 ( b − s ) α − β −2 − (t − s)α− β−1 , a ≤ s ≤ t ≤ b, ( b − a ) α − β −2 ( t − a ) α − β −1 ( b − s ) α − β −2 h2 (t, s) = , a ≤ t ≤ s ≤ b. ( b − a ) α − β −2

h1 (t, s) =

(i) It is clear that for a ≤ t ≤ s ≤ b, H (t, s) = a ≤ s ≤ t ≤ b, by the relation

b−s b− a



t−s t− a , β

1 h (t, s) Γ(α) 2

≥ 0. On the other hand, for

≥ 0, α > β + 2, we obtain

Γ(α) H (t, s) = h1 (t, s)

( t − a ) α − β −1 ( b − s ) α − β −2 − ( t − s ) α − β −1 ( b − a ) α − β −2 "µ # ¶ µ ¶ t − s α − β −1 b − s α − β −2 α − β −1 − = (t − a) b−a t−a "µ # ¶µ ¶ µ ¶ b−a b − s α − β −1 t − s α − β −1 α − β −1 = (t − a) − b−s b−a t−a "µ ¶ α − β −1 µ ¶ α − β −1 # b − s t − s ≥ ( t − a ) α − β −1 − b−a t−a =

≥ 0.

712

Youyu Wang ET AL 707-716

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Lyapunov-type inequalities under multi-point boundary conditions

7

Then (i) is proved. (ii) For a ≤ t ≤ s ≤ b, we have Γ(α)

∂h2 (t, s) (α − β − 1)(t − a)α− β−2 (b − s)α− β−2 ∂H (t, s) = = ≥ 0. ∂t ∂t ( b − a ) α − β −2

For a ≤ s ≤ t ≤ b, by the relation

b−s b− a



t−s t− a , β

∂h (t, s) ∂H (t, s) = 1 = ( α − β − 1) Γ(α) ∂t ∂t



≥ 0, α − β − 2 > 0, we obtain b−s b−a

¶ α − β −2 "µ

= (α − β − 1)(t − a)α− β−2

#

( t − a ) α − β −2 − ( t − s ) α − β −2

b−s b−a

¶ α − β −2

µ



t−s t−a

¶ α − β −2 #

≥ 0. Then we proved that H (t, s) is non-decreasing with respect to the first variable t. (iii) The result follows immediately from (ii). (iv) Let ψ(s) = Γ(α) H (b, s) = (b − s)α− β−2 (s − a), s ∈ [ a, b]. We have ψ0 (s) = −(α − β − 2)(b − s)α− β−3 (s − a) + (b − s)α− β−2

= (b − s)α− β−3 [(b − s) − (α − β − 2)(s − a)]. Moreover,

α−β−2 1 a+ b. α−β−1 α−β−1

ψ0 (s) = 0, s ∈ ( a, b) ⇔ s = s∗ =

It is not difficult to observe that ψ0 (s) ≥ 0, if s ≤ s∗ and ψ0 (s) < 0, if s > s∗ . Therefore, µ ∗

max ψ(s) = ψ(s ) = (α − β − 2)

α − β −2

s∈[ a,b]

b−a α−β−1

¶ α − β −1 .

Now, we are ready to prove our first Lyapunov-type inequality. Theorem 3.4. If a nontrivial continuous solution of the fractional boundary value problem

( Daα+ u)(t) + q(t)u(t) = 0, u( a) = u0 ( a) = 0,

a < t < b, 2 < α ≤ 3, m −2

β +1

( Da+ u)(b) =



i =1

β

bi ( Da+ u)(ξ i ),

exists, then Z b a

"

( b − s ) α − β −2 ( b − a ) β +1 − ( b − s ) β +1 +

m −2



# bi T (b)(s − a) |q(s)|ds ≥ Γ(α),

i =1

where T (b) =

( b − a ) α −1 . (α − β − 1)(b − a)α− β−2 − ∑im=−12 bi (ξ i − a)α− β−1

713

Youyu Wang ET AL 707-716

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

Y. Wang, Q. Wang

Proof. Let B = C [ a, b] be the Banach space endowed with norm kuk = supt∈[a,b] |u(t)|. It follows from Lemma 3.1 that a solution u to the boundary value problem satisfies the integral equation à ! u(t) =

Z b a

G (t, s)q(s)u(s)ds + T (t)

Z b

m −2

a

i =1



bi H (ξ, s)q(s)u(s)

ds.

Now, using Lemma 3.2, we obtain

kuk ≤ kuk

Z b a

m −2



G (b, s)|q(s)|ds + kuk

bi T ( b )

i =1

which yields

kuk ≤ kuk

Z b

Ã

a

Z b a

!

m −2

G (b, s) +



H (b, s)|q(s)|ds,

bi T (b) H (b, s)

|q(s)|ds,

i =1

as "

#

m −2

Γ(α) G (b, s) +



bi T (b) H (b, s)

i =1

= ( b − a ) β +1 ( b − s ) α − β −2 − ( b − s ) α −1 +

m −2



bi T (b)(b − s)α− β−2 (s − a)

i =1

"

= ( b − s ) α − β −2 ( b − a ) β +1 − ( b − s ) β +1 +

#

m −2



bi T (b)(s − a) ,

i =1

therefore, if u is a nontrivial continuous solution to (1.12)-(1.13), we have " # Z b

a

( b − s ) α − β −2 ( b − a ) β +1 − ( b − s ) β +1 +

m −2



bi T (b)(s − a) |q(s)|ds ≥ Γ(α).

i =1

Now, from Theorem 3.4 and Lemma 3.2 (iv), Lemma 3.3 (iv), we have " # m −2

Γ(α) G (b, s) +



bi T (b) H (b, s)

i =1

"

≤ Γ(α) max G (b, s) + s∈[ a,b]

=

#

m −2

β+1 · α−1

µ



i =1

α−β−2 α−1



α − β −2 β +1

bi T (b) max H (b, s) s∈[ a,b]

( b − a ) α −1 +

m −2



µ bi T (b)(α − β − 2)α− β−2

i =1

b−a α−β−1

¶ α − β −1 .

So, if problem (1.12)-(1.13) has a nontrivial continuous solution, then we have the following result. Corollary 3.5. If a nontrivial continuous solution of the fractional boundary value problem

( Daα+ u)(t) + q(t)u(t) = 0, u( a) = u0 ( a) = 0,

β +1

a < t < b, 2 < α ≤ 3,

( Da+ u)(b) =

714

m −2



i =1

β

bi ( Da+ u)(ξ i ),

Youyu Wang ET AL 707-716

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Lyapunov-type inequalities under multi-point boundary conditions

9

exists, then Z b a

Γ(α)

|q(s)|ds ≥ β +1 α −1

³

·

α − β −2 α −1

´ α−β+β−1 2

(b −

a ) α −1

+ ∑im=−12 bi T (b)(α

−β

− 2 ) α − β −2

³

b− a α − β −1

´ α − β −1 .

Let β = 0 in Theorem 3.4, we obtain Corollary 3.6. If a nontrivial continuous solution of the fractional boundary value problem

( Daα+ u)(t) + q(t)u(t) = 0, u( a) = u0 ( a) = 0,

u0 (b) =

a < t < b, 2 < α ≤ 3, m −2



bi u ( ξ i ) ,

i =1

exists, then Z b a

≥ =

(b − s)α−2 (s − a)|q(s)|ds Γ(α) 1 + ∑im=−12 bi T (b)

(α − β − 1)(b − a)α− β−2 − ∑im=−12 bi (ξ i − a)α− β−1 Γ ( α ). (α − β − 1)(b − a)α− β−2 − ∑im=−12 bi (ξ i − a)α− β−1 + ∑im=−12 bi (b − a)α−1

Let β = 0 in Corollary 3.5, we have the following result. Corollary 3.7. If a nontrivial continuous solution of the fractional boundary value problem

( Daα+ u)(t) + q(t)u(t) = 0, u( a) = u0 ( a) = 0,

u0 (b) =

a < t < b, 2 < α ≤ 3, m −2



bi u ( ξ i ) ,

i =1

exists, then Z b a

=

|q(s)|ds ≥

( α − 1 ) α −1 Γ(α) · 1 + ∑im=−12 bi T (b) (b − a)α−1 (α − 2)α−2

(α − β − 1)(b − a)α− β−2 − ∑im=−12 bi (ξ i − a)α− β−1 Γ(α)(α − 1)α−1 . · m − 2 m − 2 (α − β − 1)(b − a)α− β−2 − ∑i=1 bi (ξ i − a)α− β−1 + ∑i=1 bi (b − a)α−1 (b − a)α−1 (α − 2)α−2

Remark 3.8. Let b1 = δ, b2 = b3 = · · · = bm−2 = 0, ξ 1 = ξ in Corollary 3.6, we obtain (1.8), let b1 = δ, b2 = b3 = · · · = bm−2 = 0, ξ 1 = ξ in Corollary 3.7, we obtain (1.11).

References [1] R. C. Brown, D. B. Hinton, Lyapunov inequalities and their applications, in Survey on Classical Inequalities, T. M. Rassias, Ed. Kluwer Academic Publishers, Dordrecht, The Netherlands, 2000, 1-25. [2] I. Cabrera, K. Sadarangani and B. Samet, Hartman-Wintner-type inequalities for a class of nonlocal fractional boundary value problems, Math. Meth. Appl. Sci., 40, (2017) 129-136.

715

Youyu Wang ET AL 707-716

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

Y. Wang, Q. Wang

[3] S. Cheng, Lyapunov inequalities for differential and difference equations, Fasc. Math. 23 (1991) 25-41. [4] R. A. C. Ferreira, A Lyapunov-type inequality for a fractional boundary value problem, Fract. Calc. Appl. Anal. 16, No 4 (2013), 978-984. [5] R. A. C. Ferreira, On a Lyapunov-type inequality and the zeros of a certain Mittag-Leffler function, J. Math. Anal. Appl. 412, No 2 (2014), 1058-1063. [6] M. Jleli and B. Samet, Lyapunov-type inequalities for a fractional differential equation with mixed boundary conditions, Math. Inequal. Appl. 18, No 2 (2015), 443-451. [7] M. Jleli, L. Ragoub and B. Samet, Lyapunov-type inequality for a fractional differential equation under a Robin boundary conditions, J. Func. Spaces. 2015, Article ID 468536, 5 pages. [8] A. A. Kilbas, H. M. Srivastava and J. J. Trujillo, Theory and applications of fractional differential equations, North-Holland Mathematics Studies 204 Elsevier, Amsterdam, The Netherlands, 2006. [9] A. M. Lyapunov, Probleme g´en´eral de la stabilit´e du mouvement, (French Translation of a Russian paper dated 1893), Ann. Fac. Sci. Univ. Toulouse 2 (1907)27-247 (Reprinted as Ann. Math. Studies, No. 17, Princeton Univ. Press, Princeton, NJ, USA, 1947). [10] D. O’Regan, B. Samet, Lyapunov-type inequalities for a class of fractional differential equations, Journal of Inequalities and Applications, 2015 2015(247):1-10. [11] J. Rong , C. Bai, Lyapunov-type inequality for a fractional differential equation with fractional boundary conditions, Advances in Difference Equations 2015 2015 (82): 1-10. [12] A. Tiryaki, Recent development of Lyapunov-type inequalities, Adv. Dyn. Syst. Appl., 5 No 2 (2010), 231-248.

716

Youyu Wang ET AL 707-716

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On a new generalized integral-type operator from mixed-norm spaces to Bloch-type spaces Fang Zhang

1

Yongmin Liu2∗

1. Department of Applied Mathematics, Changzhou University, Changzhou 213164, China 2. School of Mathematics and Statistics, Jiangsu Normal University, Xuzhou, 221116, China

Abstract Let ϕ be an analytic self-map of unit disk D, H(D) the space of analytic functions on D, and g ∈ H(D). For an analytic function P∞ [β] f (z) = n=0 an z n on D, the generalized integral-type operator Cϕ,g is defined by Z z   [β] Cϕ,g f (z) = f [β] (ϕ(w))g(w)dw, z ∈ D, 0

where β ≥ 0,

f [β] (z) =

∞ P

n=0

Γ(n+1+β) n Γ(n+1) an z

and f [0] (z) = f (z).

[β]

The boundedness and compactness of Cϕ,g from mixed-norm spaces H(p, q, µ) to Bloch-type spaces Bω are discussed in this paper. Keywords. Generalized integral-type operator; Mixed-norm space; Bloch-type space 2010 Mathematics Subject Classification. 47G10, 46E15; 47B38.

1

Introduction

Let D = {z : |z| < 1} be the open unit disk in the complex plane C, and H(D) the set of all analytic functions on D. The Pochhammer’s symbol/shifted factorial is defined by (a)n := a(a + 1) · · · (a + n − 1) =

Γ(a + n) , n ∈ N, Γ(a)

and (a)0 = 1 for a 6= 0. Here a is a complex number such that a 6= −m, m = 0, 1, 2, . . . . The classical/Gaussian hypergeometric series is defined by the power series expansion F (a, b; c; z) = ∗ Corresponding

∞ X (a)n (b)n n z , |z| < 1. (c)n (1)n n=0

author. Email: [email protected]

1

717

Fang Zhang ET AL 717-727

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

On a new generalized integral-type operator

P∞ P∞ For two analytic functions f (z) = n=0 an z n , g(z) = n=0 bn z n in |z| < R, the Hadamard product (or convolution) of f and g denoted by f ∗ g and is defined as follows ∞ X (f ∗ g)(z) = an bn z n , |z| < R2 . n=0

Furthermore,

(f ∗ g)(z) =

1 2πi

Z

f (w)g

|w|=ρ

 z  dw w

w

, |z| < ρR < R2 .

In particular, if f, g ∈ H(D), we have Z 2π 1 f (ρeit )g(ze−it )dt, 0 < ρ < 1, (f ∗ g)(ρz) = 2π 0 (see, e.g. [1]).P ∞ If f (z) = n=0 an z n ∈ H(D) and β > 0, then the fractional derivative f [β] of order β which introduced by Hardy and Littlewood [4], is defined as follows f [β] (z) =

∞ X Γ(n + 1 + β) an z n . Γ(n + 1) n=0

It is easy to check that f [β] (z) = Γ(1 + β) (f (z) ∗ F (1, 1 + β; 1; z)) . For β = 0, we defined f [0] (z) = f (z). It is obvious to find that the fractional derivative and the ordinary derivative satisfy f [k] (z) =

 dk z k f (z) , k = 0, 1, 2, . . . . k dz

A positive continuous function µ on the interval [0,1) is called normal (see, e.g. [22]) if there exist positive numbers s, t (0 < s < t) and δ ∈ [0, 1), such that µ(r) µ(r) is decreasing for δ ≤ r < 1 and lim = 0; s r→1 (1 − r) (1 − r)s µ(r) µ(r) is increasing for δ ≤ r < 1 and lim = ∞. t r→1 (1 − r)t (1 − r) From now on we always assume that µ is a normal function on [0, 1). Let 0 ≤ r < 1, f ∈ H(D), we set Mq (f, r) =



1 2π

Z

2π iθ

q

|f (re )| dθ

0

1/q

, 0 < q < ∞,

M∞ (f, r) = sup |f (reiθ )|. 0≤θ≤2π

718

Fang Zhang ET AL 717-727

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

3

On a new generalized integral-type operator

For 0 < p, q ≤ ∞, a function f ∈ H(D) is said to belong to the mixed-norm space H(p, q, µ) if kf kH(p,q,µ) =

1

Z

0

µp (r) dr Mqp (f, r) 1−r

1/p

< ∞.

The Bloch-type space (or ω-Bloch space), denoted by Bω = Bω (D), consists of those functions f ∈ H(D) such that Bω (f ) = sup ω(z)|f ′ (z)| < ∞, z∈D

where ω(z) is a continuous nonincreasing function such that ω(z) = ω(|z|), z ∈ D and lim ω(z) = 0. |z|→1

(1.1)

Functions ω that satisfy condition (1.1) are called almost classic weights. With the norm kf kBω = |f (0)|+Bω (f ), the ω-Bloch space becomes a Banach ω space. The little ω-Bloch space Bω 0 is the subspace of B consisting of those ω f ∈ B such that lim ω(z)|f ′ (z)| = 0. |z|→1

For ω(z) = (1 − |z|2 )α , α > 0, ω-Bloch space becomes the α-Bloch space (see, e.g. [6, 19, 23, 29]). Let u ∈ H(D) and ϕ be an analytic self-map of D. For β ≥ 0, we introduce [β] a new generalized integral-type operator Cϕ,g as follows: Z z   [β] Cϕ,g f (z) = f [β] (ϕ(w))g(w)dw, z ∈ D, f ∈ H(D). 0

[β]

n The operator Cϕ,g is a generalization of the operator Cϕ,g , which is defined as

 n Cϕ,g f (z) =

Z

z

f (n) (ϕ(w))g(w)dw, f ∈ H(D). 0

n The operator Cϕ,g was introduced in [32] and studied in [3, 5, 14, 20, 21, 28]. When n = 1, then Z z   1 g Cϕ,g f (z) = Cϕ f (z) = f ′ (ϕ(ξ))g(ξ)dξ, 0

which is the generalized composition operator defined by Li and Stevi´c in [11, 13], and studied in [9, 10, 12, 13, 24, 25, 26, 27, 30, 31, 33]. When n = 0, [β] 0 then Cϕ,g = Cϕ,g is the Volterra composition operator defined by Li in [7], and studied in [8, 12, 15, 16]. In [17], Long and Wu characterized the boundedness n and compactness of the integral-type operator Cϕ,g from mixed-norm spaces

719

Fang Zhang ET AL 717-727

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

On a new generalized integral-type operator

to the ω-Bloch spaces. Besides, Borgohain and Naik [2] initiated a generalized integral type operator as follows: Z z  β Cϕ,g f (z) = f β (ϕ(ξ))g(ξ)dξ, 0

β

where f is the fractional derivative of order β (β > 0) defined as f β (z) =

∞ X

Γ(n + 1) an z n−β . Γ(n + 1 − β) n=0

β They discussed the boundedness and compactness of the operator Cϕ,g from Zygmund spaces to Bloch type spaces in [2]. β In [1], Borgohain and Naik defined an operator Dϕ,u , called a weighted fractional differentiation composition operator, by  β Dϕ,u f (z) = u(z)f [β](ϕ(z)).

β They discussed the boundedness and compactness of Dϕ,u from mixed-norm space H(p, q, φ) to weighted-type space Hµ∞ . Motivated by [1, 2, 17, 32], we consider the boundedness and compactness of [β] the operator Cϕ,g from mixed-norm spaces to the ω-Bloch spaces in this paper. Our results can be viewed as generalizations of the results in [17]. Throughout this paper, we will use the symbol C to denote a finite positive number, and it may differ from one occurrence to another.

2

Auxiliary results

In order to formulate our main results, we need some auxiliary results which are incorporated in the following lemmas. The fisrt lemma is important. It gave an estimate which involves fractional derivative f [β] of f ∈ H(p, q, µ). Lemma 2.1 ([1]) Assume 0 < p ≤ ∞, 1 ≤ q ≤ ∞, µ is normal, and f ∈ H(p, q, µ). Then for every β ≥ 0, there is a positive constant C independent of f such that kf kH(p,q,µ) [β] , ∀z ∈ D. f (z) ≤ C (1 − |z|2 )β+1/q µ(|z|) The following lemma, can be proved in a standard way (see, e.g. [18]).

Lemma 2.2 Assume β ≥ 0, 0 < p ≤ ∞, 1 ≤ q ≤ ∞, g ∈ H(D), µ is normal, [β] ω is a almost classic weight, and ϕ is an analytic self-map of D. Then Cϕ,g : [β] H(p, q, µ) → Bω is compact if and only if Cϕ,g : H(p, q, µ) → Bω is bounded and for any bounded sequence fk in H(p, q, µ) which converges to zero uniformly on [β] compact subsets of D as k → ∞, we have kCϕ,g fk kBω → 0 as k → ∞.

720

Fang Zhang ET AL 717-727

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

5

On a new generalized integral-type operator

Lemma 2.3 ([24]) Assume that ω is an almost classic weight. A closed set K in Bω 0 is compact if and only if it is bounded and satisfies lim sup ω(z)|f ′ (z)| = 0.

|z|→1 f ∈K

3

Main results and proofs

In this section we consider the boundedness and the compactness of the operator [β] Cϕ,g : H(p, q, µ) → Bω (or Bω 0 ). Theorem 3.1 Assume β ≥ 0, 0 < p ≤ ∞, 1 ≤ q ≤ ∞, g ∈ H(D), µ is normal, ω is an almost classic weight, and ϕ is an analytic self-map of D. Then [β] Cϕ,g : H(p, q, µ) → Bω is bounded if and only if sup z∈D

ω(z)|g(z)| < ∞. µ(|ϕ(z)|)(1 − |ϕ(z)|2 )β+1/q

(3.1)

Proof Suppose that (3.1) holds. For any z ∈ D and f ∈ H(p, q, µ), by Lemma 2.1 we have  [β] ′ ω(z) Cϕ,g f (z) = ω(z)|g(z)| f [β] (ϕ(z)) ≤

[β]

Ckf kH(p,q,µ)

ω(z)|g(z)| , µ(|ϕ(z)|)(1 − |ϕ(z)|2 )β+1/q

[β]

and (Cϕ,g f )(0) = 0. This shows that Cϕ,g is bounded. [β] Conversely, assume that Cϕ,g : H(p, q, µ) → Bω is bounded. Fix a ∈ D, we take the test functions (1 − |a|2 )t+1 F ( 1q + β + t + 1, 1; 1 + β; az) , (3.2) fa (z) = µ(|a|) where the constant t is from the definition of the function µ. By elementary calculations similar to those outlined in Theorem 5 of [1], we see that fa ∈ H(p, q, µ). In addition, fa[β] (z) =

Γ(1 + β)(1 − |a|2 )t+1 . µ(|a|)(1 − az)β+t+1+1/q

(3.3)

[β]

By the boundedness of Cϕ,g , for every λ ∈ D, we get ∞ > ≥ ≥ ≥ =

[β] CkCϕ,g kH(p,q,µ)→Bω [β] kCϕ,g fϕ(λ) kBω  ′ [β] sup ω(z) Cϕ,g fϕ(λ) (z) z∈D

Γ(1 + β)ω(λ)|g(λ)|(1 − |ϕ(λ)|2 )t+1 µ(|ϕ(λ)|)(1 − |ϕ(λ)|2 )β+t+1+1/q Γ(1 + β)ω(λ)|g(λ)| . µ(|ϕ(λ)|)(1 − |ϕ(λ)|2 )β+1/q

721

Fang Zhang ET AL 717-727

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

On a new generalized integral-type operator

Therefore sup z∈D

ω(z)|g(z)| < ∞. µ(|ϕ(z)|)(1 − |ϕ(z)|2 )β+1/q

Theorem 3.2 Assume β ≥ 0, 0 < p ≤ ∞, 1 ≤ q ≤ ∞, g ∈ H(D), µ is normal, ω is an almost classic weight, and ϕ is an analytic self-map of D. Then [β] [β] ω Cϕ,g : H(p, q, µ) → Bω is 0 is bounded if and only if Cϕ,g : H(p, q, µ) → B bounded and lim ω(z)|g(z)| = 0.

(3.4)

|z|→1 [β]

Proof Suppose that Cϕ,g : H(p, q, µ) → Bω is bounded and (3.4) holds. For each polynomial p(z), we get  [β] ′ ω(z) Cϕ,g p (z) = ω(z)|g(z)| p[β] (ϕ(z)) . Let p(z) =

Pk

n=0

an z n , k ∈ N. From the proof of Theorem 7 in [1], we see that ! k X (1 + β)n n an z . p (z) = Γ(1 + β) (1)n n=0 [β]

[β]

Then we have p[β] (z) is bounded in |z| < 1. From (3.4), we see that Cϕ,g p ∈ Bω 0 . Since the set of all polynomials is dense in H(p, q, µ), we have that for every f ∈ H(p, q, µ), there is a sequence of polynomials (pk )k∈N such that kf − [β] pk kH(p,q,µ) → 0 as k → ∞. Hence by the boundedness of the operator Cϕ,g : ω H(p, q, µ) → B , we have [β] [β] [β] kCϕ,g f − Cϕ,g pk kBω ≤ kCϕ,g kH(p,q,µ)→Bω kf − pk kH(p,q,µ) → 0, [β]

ω ω as k → ∞. Since Bω 0 is the closed subset of B , we see that Cϕ,g f ∈ B0 , and [β] [β] ω ω consequently Cϕ,g (H(p, q, µ)) ⊂ B0 , so Cϕ,g : H(p, q, µ) → B0 is bounded. [β] For the converse, suppose that Cϕ,g : H(p, q, µ) → Bω 0 is bounded. It is [β] ω clear that Cϕ,g : H(p, q, µ) → B is bounded. We take the test functions 1 ∈ H(p, q, µ) for z ∈ D, it follows that f (z) = Γ(1+β)

f [β] (z) =

Γ(1 + β) (f (z) ∗ F (1, 1 + β; 1, z)) ! ∞ X (1 + β)n n 1 ∗ z = Γ(1 + β) Γ(1 + β) n=0 (1)n   (1 + β)0 1 = Γ(1 + β) · Γ(1 + β) (1)0 = 1.

722

Fang Zhang ET AL 717-727

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

7

On a new generalized integral-type operator

By the assumption, we have  [β] ′ lim ω(z) Cϕ,g f (z) |z|→1 = lim ω(z)|g(z)| f [β] (ϕ(z)) |z|→1

= lim ω(z)|g(z)| |z|→1

= 0. Theorem 3.3 Assume β ≥ 0, 0 < p ≤ ∞, 1 ≤ q ≤ ∞, g ∈ H(D), µ is normal, ω is an almost classic weight, and ϕ is an analytic self-map of D. Then [β] [β] Cϕ,g : H(p, q, µ) → Bω is compact if and only if Cϕ,g : H(p, q, µ) → Bω is bounded and ω(z)|g(z)| = 0. |ϕ(z)|→1 µ(|ϕ(z)|)(1 − |ϕ(z)|2 )β+1/q lim

(3.5)

[β]

Proof. Assume that Cϕ,g : H(p, q, µ) → Bω is bounded and (3.5) holds. Let {fn } be a bounded sequence in H(p, q, µ) with kfn kH(p,q,µ) ≤ 1 and fn → 0 uniformly on compact subsets of D. In light of Lemma 2.2, we only need to show that [β] kCϕ,g fn kBω → 0, (n → ∞). From (3.5), we have that for every ε > 0, there exists a constant δ, 0 < δ < 1, such that δ < |ϕ(z)| < 1 implies ω(z)|g(z)| < ε. µ(|ϕ(z)|)(1 − |ϕ(z)|2 )β+1/q [β]

Since Cϕ,g : H(p, q, µ) → Bω is bounded, taking f (z) = M1 = sup ω(z)|g(z)| < ∞. Since

1 Γ(1+β) ,

we see that

z∈D

 [β] ′ sup ω(z) Cϕ,g fn (z) z∈D ≤ sup w(zn )|g(zn )| fn[β] (ϕ(zn )) + {|ϕ(z)|≤δ}

≤ M1

sup

{|ϕ(z)|≤δ}

< M1

sup {|ϕ(z)|≤δ}

sup {|ϕ(z)|>δ}

[β] fn (ϕ(zn )) + Ckfn kH(p,q,µ)

[β] fn (ϕ(zn )) + Cε.

w(zn )|g(zn )| fn[β] (ϕ(zn ))

ω(z)|g(z)| 2 β+1/q {|ϕ(z)|>δ} µ(|ϕ(z)|)(1 − |ϕ(z)| ) sup

[β]

From the proof of Theorem 10 in [1], {fn } converges uniformly to 0 on compact subsets of D. Then [β] kCϕ,g fn kBω → 0 as n → ∞.

723

Fang Zhang ET AL 717-727

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

On a new generalized integral-type operator [β]

Conversely, suppose that Cϕ,g is compact from H(p, q, µ) to Bω . From which [β] we can easily obtain the boundedness of Cϕ,g : H(p, q, µ) → Bω . Next we only need to show that (3.5) holds. Let {zn } be a sequence in D such that |ϕ(zn )| → 1 as n → ∞. We now consider the function   (1 − |ϕ(zn )|2 )t+1 F β + t + 1 + 1/q, 1; 1 + β; ϕ(zn )z . (3.6) hn (z) = µ(|ϕ(zn )|) It is easy to check that hn ∈ H(p, q, µ). Moreover, from (3.3) [β]

h[β] n (ϕ(zn )) = fϕ(zn ) (ϕ(zn )) =

Γ(1 + β)(1 − |ϕ(zn )|2 )t+1 µ(|ϕ(zn )|)(1 − ϕ(zn )z)t+1+1/q

.

(3.7)

It is easy to show that {hn } converges to 0 uniformly on compact subsets of D [β] as n → ∞. Therefore, using Lemma 2.2, we have lim kCϕ,g hn kBω = 0. From n→∞ this and since  [β] ′ [β] ω kCϕ,g hn kB ≥ sup ω(z) Cϕ,g hn (z) z∈D ≥ w(zn )|g(zn )| h[β] (ϕ(z )) n n =

it follows that lim

|ϕ(z)|→1

Γ(1 + β)ω(zn )|g(zn )| , µ(|ϕ(zn )|)(1 − |ϕ(zn )|2 )β+1/q

ω(z)|g(z)| = 0. µ(|ϕ(z)|)(1 − |ϕ(z)|2 )β+1/q

Theorem 3.4 Assume β ≥ 0, 0 < p ≤ ∞, 1 ≤ q ≤ ∞, g ∈ H(D), ω is [β] an almost classic weight, and ϕ is an analytic self-map of D. Then Cϕ,g : ω H(p, q, µ) → B0 is compact if and only if ω(z)|g(z)| = 0. |z|→1 µ(|ϕ(z)|)(1 − |ϕ(z)|2 )β+1/q

(3.8)

lim

[β]

Proof Suppose that (3.8) holds. Then, from Lemma 2.3, Cϕ,g : H(p, q, µ) → Bω 0 is compact if and only if  [β] ′ lim sup ω(z) Cϕ,g f (z) = 0. (3.9) |z|→1 kf kH(p,q,µ) ≤1

For any z ∈ D and f ∈ H(p, q, µ), by Lemma 2.1 we have  [β] ′ ω(z)|g(z)| ω(z) Cϕ,g f (z) ≤ Ckf kH(p,q,µ) . µ(|ϕ(z)|)(1 − |ϕ(z)|2 )β+1/q

724

(3.10)

Fang Zhang ET AL 717-727

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On a new generalized integral-type operator

9

From (3.9) and (3.10), the implication follows. [β] [β] Conversely, assume that Cϕ,g : H(p, q, µ) → Bω 0 is compact. Then Cϕ,g : [β] H(p, q, µ) → Bω is compact, and Cϕ,g : H(p, q, µ) → Bω 0 is bounded. Hence, by Theorems 3.2 and 3.3, we see that (3.4) and (3.5) hold. By (3.5), for every ε > 0 there exists an r ∈ (0, 1) such that ω(z)|g(z)| < ε, µ(|ϕ(z)|)(1 − |ϕ(z)|2 )β+1/q when r < |ϕ(z)| < 1. By (3.4), there exists a δ ∈ (0, 1) such that ω(z)|g(z)| < ε inf µ(t)(1 − t2 )β+1/q , t∈[0,δ]

when σ < |z| < 1. Therefore, when σ < |z| < 1 and r < |ϕ(z)| < 1, we have that ω(z)|g(z)| < ε. µ(|ϕ(z)|)(1 − |ϕ(z)|2 )β+1/q

(3.11)

If σ < |z| < 1 and |ϕ(z)| ≤ r, then we obtain ω(z)|g(z)| ω(z)|g(z)| < < ε. µ(|ϕ(z)|)(1 − |ϕ(z)|2 )β+1/q inf t∈[0,δ] µ(t)(1 − t2 )β+1/q

(3.12)

Combining (3.11) with (3.12), we obtain (3.9). Authors’ contributions All authors contributed equally to the writing of this paper. They also read and approved the final manuscript. Funding This work was supported by the National Natural Science Foundation of China (Grant numbers 11171285, 11771184, 11771188 and 11501055), the Foundation Research Project of Jiangsu Province of China (Grant number BK20161158), the Natural Science Foundation of the Jiangsu Higher Education Institutions of China (Grant number 15KJB110001).

References [1] D. Borgohain, S. Naik, Weighted fractional differentiation composition operators from mixed-norm spaces to weighted-type spaces, Int. J. Anal., 2014, Art. ID 301709, 9 pp(2014). [2] D. Borgohain, S. Naik, Boundedness and compactness of integral type operator on analytic function spaces, J. Anal., 23, 21-31(2015). [3] J. Guo, Y. Liu, Generalized integration operators from mixed-norm to Zygmund-type spaces, Bull. Malays. Math. Sci. Soc., 39, 1043-1057 (2016).

725

Fang Zhang ET AL 717-727

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On a new generalized integral-type operator

10

[4] G. H. Hardy, J. E. Littlewood, Some properties of fractional integrals, Mathematische Zeitschrift, 34, 403-439(1932). [5] Z. He, G. C, Generalized integration operators between Bloch-type spaces and F(p,q,s) spaces, Taiwanese J. Math., 17, 1211-1225(2013). [6] S. Li, Derivative-free characterizations of Bloch spaces, J. Comput. Anal. Appl, 10, 253-258(2008). [7] S. Li, Volterra composition operators between weighted Bergman spaces and Bloch type spaces, J. Korean Math. Soc., 45, 229-248(2008). [8] S. Li, S. Stevi´c, Volterra-type operators on Zygmund spaces, J. Inequal. Appl., 2007, Article ID 32124, 10 pp(2007). [9] S. Li, S. Stevi´c, Products of composition and integral type operators from H ∞ to the Bloch space, Complex Var. Elliptic Equ., 53, 463-474(2008). [10] S. Li, S. Stevi´c, Weighted composition operators from Zygmund spaces into Bloch spaces, Appl. Math. Comput., 206, 825-831(2008). [11] S. Li, S. Stevi´c, Generalized composition operators on Zygmund spaces and Bloch type spaces, J. Math. Anal. Appl., 338, 1282-1295(2008). [12] S. Li, S. Stevi´c, Products of Volterra type operator and composition operator from H ∞ and Bloch spaces to Zygmund spaces, J. Math. Anal. Appl., 345, 40-52(2008). [13] S. Li, S. Stevi´c, Products of integral-type operators and composition operators between Bloch-type spaces, J. Math. Anal. Appl.. 349, 596-610(2009). [14] S. Li, On an integral-type operator from the Bloch space into the QK (p, q) space, Filomat, 26, 331-339(2012). [15] Y. Liu, H. Liu, Volterra-type composition operators from mixed norm spaces to Zygmund spaces (Chinese), Acta Math. Sinica Chin. Ser., 54, 381-396(2011). [16] Y. Liu, Y. Yu, Volterra composition operators from mixted norm spaces to little Zygmund spaces (Chinese), Acta Math. Sci. Ser. A Chin. Ed., 35, 210-217(2015). [17] J. Long, P. Wu, A class of integral-type operators from mixed norm spaces to Bloch-type spaces (Chinese), Adv. Math. (China), 44, 765-772(2015). [18] K. Madigan, A. Matheson, Compact composition operators on the Bloch space, Trans. Amer. Math. Soc., 347, 2679-2687(1995). [19] S. Ohno, K. Stroethoff, R. Zhao, Weighted composition operators between Bloch-type spaces, Rocky Mountain J. Math., 33, 191-215(2003).

726

Fang Zhang ET AL 717-727

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On a new generalized integral-type operator

11

[20] C. Pan, On an integral-type operator from QK (p, q) spaces to α-Bloch space, Filomat, 25, 163-173(2011). [21] Y. Ren, An integral-type operator from QK (p, q) spaces to Zygmund-type spaces, Appl. Math. Comput., 236, 27-32(2014). [22] A. Shields and D. Williams, Bounded projections, duality, and multipliers in spaces of analytic functions, Trans. Amer. Math. Soc., 162, 287-302(1971). [23] S. Stevi´c, On an integral operator on the unit ball in Cn , J. Inequal. Appl., 2005, 81-88(2005). [24] S. Stevi´c, Generalized composition operators between mixed-norm and some weighted spaces, Numer. Funct. Anal. Optim., 29, 959-978(2008). [25] S. Stevi´c, Generalized composition operators from logarithmic Bloch spaces to mixed-norm spaces, Util. Math., 77, 167-172(2008). [26] S. Stevi´c, Products of integral-type operators and composition operators from the mixed-norm space to Bloch-type spaces, Sib. Math. J., 50, 726736(2009). [27] S. Stevi´c, A. Sharma, Integral-type operators from Bloch-type spaces to QK spaces, Abstr. Appl. Anal., 2011, Article ID 698038, 16 pp(2011). [28] S. Stevi´c, A. Sharma, S. Sharma, Generalized integration operators from the space of integral transforms into Bloch-type spaces, J. Comput. Anal. Appl., 14, 1139-1147(2012). [29] S. Yamashita, Gap series and α-Bloch functions, Yokohama Math. J., 28, 31-36(1980). [30] Y. Yu, Y. Liu, On a Li-Stevi´c integral-type operators between different weighted Bloch-type spaces, J. Inequal. Appl., 2008, Article ID 780845, 14 pp(2008). [31] F. Zhang, Y. Liu, Generalized composition operators from Bloch type spaces to QK type spaces, J. Funct. Spaces Appl., 8, 55-66(2010). [32] X. Zhu, An integral-type operator from H ∞ to Zygmund-type spaces, Bull. Malays. Math. Sci. Soc., 35, 679-686(2012). [33] X. Zhu, Generalized composition operators from generalized weighted Bergman spaces to Bloch type spaces, J. Korean Math. Soc., 46, 12191232(2009).

727

Fang Zhang ET AL 717-727

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Conformal automorphisms for exact locally ˜ 2 -structures conformally callibrated G Mobeen Munir1, Waqas Nazeer2, Asma Ashraf3 and Shin Min Kang4,5,∗

4

1

Division of Science and Technology, University of Education, Lahore 54000, Pakistan e-mail: [email protected]

2

Division of Science and Technology, University of Education, Lahore 54000, Pakistan e-mail: [email protected]

3

Division of Science and Technology, University of Education, Lahore 54000, Pakistan e-mail: [email protected]

Department of Mathematics and RINS, Gyeongsang National University, Jinju 52828, Korea e-mail: [email protected] 5

Center for General Education, China Medical University, Taichung 40402, Taiwan Abstract

First we characterize a conformal automorphism for exact locally conformally cal˜ 2 -structures and give Lie derivative of the fundamental 3-form defining G ˜ 2ibrated G structures for this class of manifolds. In the end we prove some nice properties for this class. 2010 Mathematics Subject Classification: 53C15, 53C10 Key words and phrases: conformal automorphism, locally conformally calibrated ˜ G2 -manifolds, lie derivative.

1

Introduction

Recently, the theory of special G-structures on smooth manifolds has been an astonishing success story among mathematicians and physicist as they exhibit some nice properties. For example G2 -structure can be geometric models in the theory of super strings with torsion [19]. Also Donaldson and Segal [10] suggested recently that manifolds with nonvanishing torsion G2 -structure can be the right framework for guage theory in dimension 7. Main computable models for manifolds with G2 -structure are homogeneous spaces having co-homogeneity one [9, 25, 29]. ∗

Corresponding author

728

Mobeen Munir ET AL 728-737

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Historically the first sign of g2C (remarkable exceptional simple Lie algebra) appeared in 1884, when Killing gave a proof of its existence. In 1907, Reichel [28], a student of Engel [11], proved that Lie groups G2 and G˜2 are two real forms of GC 2 . In 1914, Cartan ˜ proved that G2 and G2 can be regarded as the automorphism group of octonions and splitoctonions respectively in 1914. Later these groups appeared in the Bereger’s celebrated list of potential holonomy of pseudo-Riemannian mertic (see [2]). Quest for examples of metrics having holonomy G2 and G˜2 remained unsuccessful until 1989 when Bryant and Salamon [6] constructed first complete but non-compact Riemannian manifolds having holonomy G2 . The construction of first compact example by Joyce [20] in 1994 was a huge breakthrough. We recall that a smooth manifold M 7 is said to have a G˜2 -structure if it has a section of the bundle F (M 7 )/G˜2 on M 7 , where F (M 7 ) is the frame bundle on M 7 . It is noted that the automorphism group of a 3-form ϕ˜ over R7 is G˜2 which is called a 3-form of G˜2 -type [15]. It is known that GL(R7 )-orbit of ϕ˜ is an open orbit of the GL(R7 )-action on Λ3 (R7 ). A 3-form in that open orbit is known as indefinite 3-form. The presence of a G˜2 -structure on a manifold M 7 is equivalent to the presence of an indefinite differential 3-form ϕ ˜ over 7 M . A G˜2 -structure ϕ˜ on a manifold is called parallel if ∇ϕ˜ = 0 or dϕ˜ = d ∗ ϕ˜ = 0 and almost parallel or calibrated if dϕ˜ = 0, locally conformal calibrated if dϕ˜ = θ ∧ ϕ˜ with a differential 1-form θ on M and θ = 41 (∗(∗dϕ˜ ∧ ϕ) ˜ [4, 8, 12, 13]. We say that a locally conformal calibrated G2 -structure is dθ -exact with ϕ˜ = dθ ω = dω − θ ∧ ω, where θ is 1-form and ω is a 2-form on M . Manifold carrying these special structure have been extensively studies for some nice properties. In [1] Bangaya described locally conformal symplectic manifolds. In [14] authors discussed locally conformal calibrated G2 -manifolds. Fern´ andez and Gray [15] classified all G2 -structures in 16 classes in 1982 by decomposing the covariant derivative of the 3-form defining the G2 -structures in 4 irreducible components. A lot has already been said about these different classes. For example, in [18] Friedrich et al. discussed special properties of nearly parallel G2 -structures and proved that they carry Einstein metrics. In [16] Fern´ andez and Ugrate gave a differential sub-copmlex ˜ 2 -manifolds and determined its of de Rham complex for locally conformal calibrated G ellipticity. A deep insight about these classes were described by Cabrera et al. [8]. In [7] Cabrrera discussed the inclusion relations of these classes and discovered strict inclusion in particular two classes. Kath [21] started the study of psudo-Riemannian 7-manifolds ˜ 2 -structure. Munir and Nizami in [27] gave classification of G˜2 -structures based with a G on intrinsic torsion with sixteen classes of algebraic types of G˜2 -structures and also proved some strict inclusion relations among the classes of these structures. Generally speaking, manifold with G˜2 -structures are relatively less understood as compared to those admitting G2 . To our knowledge there are only a few papers discussing about them, (see for example [5, 21, 22, 23, 25, 27]). In this paper, we study manifolds endowed with a locally conformal calibrated G˜2 structure which constitute the class W2 ⊕ W4 of [27]. We focus on its subspace where we

729

Mobeen Munir ET AL 728-737

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

have exact locally conformal calibrated G˜2 -structure. However it is worth mentioning that we study these manifolds for two particular reasons. First, they have striking similarities with those admitting a G2 -structure and secondly, because of their interesting class in pseudo-Riemannian geometry, see [7, 30].

2

˜ 2 -structure Locally conformal calibrated G

˜ 2 -manifolds. Then we give simple Here we first introduce the basic representations for G ˜ 2 -manifolds. These results are known characterizations of locally conformal calibrated G facts see for example [25, 27]. These fact will help a lot to prove our main results in next part. Let Λq (M ) be the space of differential q-forms on M and Bq (M ) is the subspace of Λq (M ) defined by Bq (M ) = {βΛq (M ) | β ∧ ϕ˜ = 0}. A G˜2 -manifold is defined as a 7-dimensional Riemannian manifold M (in which a Riemannian metric gϕ˜ = (1, 1, 1, −1, −1, −1, −1) is defined) endowed with a 2-fold vector cross product P satisfying the following axioms 1. hP (X1 , X2 ), X1i = hP (X1 , X2), X2 i = 0, 2. kP (X1 , X2 )k2 = kX1 k2 kX2 k2 − hX1 , X2i2 for X1 , X2 ∈ X(M ). The fundamental 3-form on M is then defined as ϕ(X ˜ 1 , X2, X3 ) = hP (X1 , X2 ), X3i for X1 , X2, X3 ∈ X(M ) and inner product for x, y ∈ ∧q (M ) is defined as hx, yiVM = x ∧ ∗y,

(2.1)

where VM is the volume form on M . It is proved that ∧q (M ) splits orthogonally into G˜2 irreducible components ∧ql of dimension l [4]. An isometry known as Hodge star operator defined as ∗ : ∧q (M ) −→ ∧7−q (M ) make two irreducible component isomorphic. For ˜ 2 on ∧1 (M ) and ∧7 (M ) are isomorphic. So it is sufficient example the representation of G ˜ 2 on ∧2 (M ) and ∧3 (M ) as follows to describe the representation of G   ∧27 (M ) = {∗(α ∧ ∗ϕ) ˜ | α ∈ ∧1 (M )}      2 2   ∧14 (M ) = {β ∈ ∧ (M ) | β ∧ ∗ϕ˜ = 0} ∧31 (M ) = {f ϕ˜ | f ∈ F(M )}     ∧3 (M ) = {∗(α ∧ ϕ) ˜ | α ∈ ∧1 (M )}    7  ∧3 (M ) = {γ ∈ ∧3 (M ) | γ ∧ ϕ˜ = γ ∧ ∗ϕ˜ = 0. 27

(2.2)

From above, it is easy to compute

∧31 (M ) ⊕ ∧327 (M ) = {γ ∈ ∧3 (M ) | γ ∧ ϕ˜ = 0}.

730

(2.3)

Mobeen Munir ET AL 728-737

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

∧47 (M ) ⊕ ∧427 (M ) = {λ ∈ ∧4 (M ) | λ ∧ ϕ˜ = 0}.

(2.4)

˜ 2 -structure can be distinguished by a globally defined 3-form ϕ, For M 7 , most general G ˜ which has local representation ϕ˜ = e123 + e145 + e167 + e246 − e257 + e347 + e356

(2.5)

with respect to some local co frame e1 , e2 , ..., e7 see [3]. It induces gϕ˜ and dVgϕ˜ on M given by 1 gϕ˜ (X, Y ) = iX ϕ˜ ∧ iY ϕ˜ ∧ ϕ˜ 6 for all vector fields X, Y on M , where gϕ˜ is a Riemannian metric and dVgϕ˜ is a volume form. Now we have the following result. Proposition 2.1. Let M be a manifold endowed a G˜2 -structure ϕ. ˜ Then (1) For any differential 1-form α on M , ∗(∗(α ∧ ϕ) ˜ ∧ ϕ) ˜ = 4α (2) If there is a differential 1-form η on M such that dϕ˜ = η ∧ ϕ, ˜ then η = 41 (∗(∗dϕ∧ ˜ ϕ) ˜ and M is locally conformal calibrated. Proof. (1) Let ϕ ˜ be 3-form given as in (2.5), and α = simple computation it can be easily verified that

P7

i i=1 e

be a 1-form on M then from

∗(∗(α ∧ ϕ) ˜ ∧ ϕ) ˜ = 4α. (2) Let η be a differential 1-form on M and dϕ˜ = η ∧ ϕ˜ then ∗dϕ˜ = ∗(η ∧ ϕ). ˜ By taking wedge product by ϕ, ˜ we get ∗dϕ˜ ∧ ϕ˜ = ∗(η ∧ ϕ) ˜ ∧ ϕ. ˜ Applying ∗ on both sides ∗(∗dϕ˜ ∧ ϕ) ˜ = ∗(∗(η ∧ ϕ) ˜ ∧ ϕ) ˜ = 4η. From above η =

1 4

∗ (∗dϕ˜ ∧ ϕ), ˜ which implies M is locally conformal calibrated.

˜ 2 manifold having 3-form ϕ. ˜ For each l, 0 ≤ l ≤ 7, we Definition 2.2. Let M be a G l l denote the space B (M ) = {λ ∈ Λ (M )|λ ∧ ϕ˜ = 0}. Also, the orthogonal compliment of Bl (M ) in Λq (M ) is denoted by Al (M ). ˜ 2 -manifold. Then we have the following Lemma 2.3. Let M be a G Bl (M ) = {0}

for 0 ≤ l ≤ 2,

B3 (M ) = Λ31 (M ) ⊕ Λ327(M ), B4 (M ) = Λ47 (M ) ⊕ Λ427(M ), Bl (M ) = Λl (M )

731

for 5 ≤ l ≤ 7.

Mobeen Munir ET AL 728-737

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Therefore, Al (M ) = Λl (M ) 3

A (M ) = A4 (M ) =

for 0 ≤ l ≤ 2,

Λ37 (M ), Λ41 (M ),

Aq (M ) = {0} for 5 ≤ l ≤ 7. ˜ 2 manifold endowed with fundamental 3-form ϕ. Proposition 2.4. Let M be a G ˜ Then M is locally conformal calibrated if and only if for any differential 3-form ρ ∈ Λ31 (M ) ⊕ Λ327 (M ), the exterior differential dρ ∈ Λ47 (M ) ⊕ Λ427 (M ). Proof. Let M be a locally conformal calibrated G2 and dϕ˜ = θ ∧ ϕ. ˜ Also let ρ ∈ Λ31 (M ) ⊕ 3 Λ27 (M ). From equation (2.4) follows that dρ ∧ ϕ˜ = d(ρ ∧ ϕ) ˜ − ρ ∧ dϕ˜ = −ρ ∧ θ ∧ ϕ˜ = 0 using equation (2.4) dρ ∈ Λ47 (M ) ⊕ Λ427 (M ). Conversely, let dϕ˜ ∈ Λ47 (M ) ⊕ Λ427 (M ) because ϕ ˜ ∈ Λ31 (M ). Also we have ϕ˜ = θ ∧ ϕ˜ ∧ ∗ρ,

(2.6)

where θ ∧ ϕ˜ ∈ Λ47 (M ) and ρ ∈ Λ327 (M ). Thus dρ ∧ ϕ˜ = 0, and we deduce that ρ ∧ dϕ˜ = dρ ∧ ϕ˜ − d(ρ ∧ ϕ) ˜ =0

(2.7)

Taking wedge product by y in equation (2.6), and using equation (2.7), we get 0 = y ∧ dϕ˜ = y ∧ θ ∧ ϕ˜ + y ∧ ∗y = y ∧ ∗y, which implies that y = 0. Then equation (2.6) becomes dϕ˜ = θ ∧ ϕ, ˜ which, by Proposition 2.1, proves that M is locally conformal calibrated.

3

˜ 2 -structure Exact locally conformal calibrated G

In this part we mainly use the concept developed in previous section. In [1] on locally conformally symplectic manifolds, authors found some characterizations, so on following ˜ 2 -structures ϕ similar track we find for dθ -exact locally conformal calibrated G ˜ having 1form θ, called Lee form. Then we give some characterization of conformal automorphisms for exact locally conformal calibrated G˜2 -structures and derive some new useful properties for these manifolds. We already know that Y ∈ X(M ), smooth vector fields on M is a conformal infinitesimal automorphism of ϕ˜ iff there exists a function ρY which is smooth on M satisfying L ϕ˜ = ρY ϕ˜ and vector field Y is said to be conformal automorphism of ϕ˜ if ρY ≡ 0. First we have the following proof.

732

Mobeen Munir ET AL 728-737

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proposition 3.1. Let ϕ˜ be a G˜2 -structure on M 7 . Let Y ∈ X(M ) be a vector field and ω (a 2-form) satisfying ω = iY ϕ. ˜ Then we have |ω|2 = 3|Y |2 Proof. The identity implies that ϕ˜ ∧ (iY ϕ) ˜ = 2 ∗ (iY ϕ),our ˜ case becomes ϕ ˜ ∧ ω = 2 ∗ ω and |ω|2 ∗ 1 = ω ∧ ∗ω 1 = ω ∧ ϕ˜ ∧ ω 2 1 ˜ ∧ (iY ϕ) ˜ ∧ ϕ˜ = (iY ϕ) 2 = 3|Y |2 ∗ 1.

Which leads to the desired conclusion. ˜ 2 -structure having Lee ˜ be a locally conformal calibrated G Proposition 3.2. Let (M, ϕ) form θ. (1) A vector field Y ∈ X(M ) is a conformal infinitesimal automorphism of ϕ˜ if and only if there exists a function which is smooth fY ∈ C ∞ (M ) satisfying dθ ω = fY ϕ, ˜ where ω = iY ϕ. ˜ (2) For M to be connected, fY is constant. Proof. (1) Here we have by the following expression LY ϕ = d(iY ϕ) ˜ + iY (dϕ) ˜ = dω + iY (θ ∧ ϕ) ˜ = dω + θ(Y )ϕ˜ − θ ∧ (iY ϕ) ˜ = dω − θ ∧ ω + θ(Y )ϕ˜ = dθω + θ(Y )ϕ, ˜ where ω = iY ϕ. ˜ Hence, Y is a conformal infinitesimal automorphism of ϕ˜ with LY ϕ˜ = ρY ϕ˜ iff dθ ω = fY ϕ, ˜ where fY = a function which is smooth on M and fY = ρY + θ(Y ). (2) If we take M be a connected and Y a conformal infinitesimal automorphism of ϕ. ˜ ∞ As dθ ω = fY ϕ˜ for some fY ∈ C (M ). We have 0 = dθ (dθω ) = dθ (fY ϕ) ˜ = d(fY ϕ) ˜ θ ∧ (fY ϕ) ˜ = dfY ∧ ϕ˜ + fY dϕ˜ − fY (θ ∧ ϕ) ˜ = dfY ∧ ϕ˜ + fY dϕ˜ − fY dϕ˜ = dfY ∧ ϕ. ˜ As we know that the mapping ∧ϕ˜ : Λ1 (M ) → Λ4 (M ) is a linear injective mapping and we obtain dfY = 0 consequently as M is connected so fY is constant.

733

Mobeen Munir ET AL 728-737

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proposition 3.3. If Y be a conformal infinitesimal automorphism of ϕ˜ with fY 6= 0, then ϕ˜ is dθ -exact. Proof.   1 ω ϕ˜ = dθ ω = dθ . fY fY So ϕ˜ is dθ -exact. Now we give an important result that can evaluate some integrals of a conformal infinitesimal automorphism of ϕ. ˜ We have Z Z LY ϕ˜ ∧ ∗f ϕ˜ = −3 df ∧ ∗Y b M

M

for a compact M 7 ,f ∈ C ∞ (M ), Y as a conformal infinitesimal automorphism of ϕ˜ with LY ϕ˜ = ρY ϕ. ˜ Proposition 3.4. Let Y be a conformal infinitesimal automorphism of ϕ˜ with LY ϕ˜ = ρY ϕ˜ R we have M fY dVgϕ˜ = 0 Proof. For the case of G˜2 -structure we modify the result of [26], that says, for a compact ˜ where φ˜ is any general G ˜ 2 -structure with manifold (M 7 , φ) Z Z LY ϕ˜ ∧ ∗f ϕ˜ = −3 df ∧ ∗Y b M

M

where f ∈ C ∞ (M ), Y as a conformal infinitesimal automorphism of ϕ˜ with LY ϕ˜ = ρY ϕ. ˜ Take f ≡ 1, we arrive at Z ρY dVgϕ˜ = 0.

M

Using Proposition 3.3, we get Z Z θ(Y )dVgϕ˜ = M

fY dVgϕ˜ = fY V ol(M ) M

this confirms the constancy of Riemann integeral of θ(Y ) over M . As the consequences of above results, now we are able to give important characteriza˜ 2 -structures. tions of exact locally conformal calibrated G ˜ 2 -manifold Proposition 3.5. Let (M 7 , ϕ) ˜ be a connected locally conformal calibrated G and θ be associated Lee form. Let gϕ˜ be a dual vector field of θ denoted by Y satisfying θ(·) = gϕ˜ (Y, ·), and ω := iY ϕ, ˜ where ω is a 2-form. Then we have the following results (1) LY ϕ˜ = 0 if and only if θ(Y )ϕ˜ = dθ ω. (2) If LY ϕ˜ = 0, then θ(Y ) = |Y |2 6= 0 (a constant).

734

Mobeen Munir ET AL 728-737

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. (1) Here it is LY ϕ˜ = d(iY ϕ) ˜ + iY dϕ˜ = dω + iY (θ ∧ ϕ) ˜ = dω + θ(Y )ϕ˜ − θ ∧ ω. Hence, LY ϕ˜ vanishes if and ony if θ(Y )ϕ˜ = −dθ ω. (2) From Proposition 3.2, If LY ϕ˜ = 0 then θ(Y ) = |Y |2 6= 0 (a constant). Since θ(Y )ϕ˜ = dθ ω and Y = θt , where the map t : Λ1 (M ) → Y(M ) is an isomorphism.

References [1] A. Banyaga, On the geometry of locally conformal symplectic manifolds, Infinite dimensional Lie groups in geometry and representation theory (Washington, DC, 2000), 79–91, World Sci. Publ., River Edge, NJ, 2002. [2] M. Berger, Sur les groupes d’holonomie homog`ene des vari´et´es `a connexion affine et des vari´et´es riemanniennes, Bull. Soc. Math. France, 83 (1955), 279–330. [3] T. Bouche, La cohomologie coeffective d’une vari´et´e symplectique, (French) [The coeffective cohomology of a symplectic manifold], Bull. Sci. Math., 114 (1990), 115– 122. [4] R. L. Bryant, Metrics with exceptional holonomy, Ann. Math., 126 (1987), 525–576. [5] R. L. Bryant, Some remarks on G2 -structures. Proceedings of Gokova GeometryTopology Conference 2005, 75–109, Gokova Geometry/Topology Conference, Gokova, 2006. [6] R. L. Bryant and S. M. Salamon, On the construction of some complete metrics with exceptional holonomy, Duke Math. J., 58 (1989), 829–850. [7] F. M. Cabrera, On Riemannian manifolds with G2 -structures, Boll. Unione Mat. Ital., 7 (1996), 99–112. [8] F. M. Cabrera, M. D. Monar and A. F. Swann, Classification of G2 -structures, J. London Math. Soc., 53 (1996), 407–416. [9] R. Cleyton, A. F. Swann, Cohomogeneity-one G2 -structures, J. Geom. Phys., 44 (2002), 202–220. [10] S. Donaldson and E. Segal, Gauge theory in higher dimension, II, arXiv:0902.3239 [math.DG]. [11] F. Engel, Ein neues, dem linearen Komplexe analoges Gebilde, Leipz. Ber., 52 (1900), 220–239.

735

Mobeen Munir ET AL 728-737

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[12] M. Fern´andez, An example of a compact calibrated manifold associated with the exceptional Lie group G2 , J. Differential Geom., 26 (1987), 367–370. [13] M. Fern´andez, A family of compact solvable G2 -calibrated manifolds, Tohoku Math. J., 39 (1987), 287–289. [14] M. Fern´andez, A. Finno and A. Raffero, Locally conformal calibrated G2 -manifolds, Ann. Mat. Pura Appl., 195 (2016), 1721–1736. [15] M. Fern´andez and A. Gray, Riemannian manifolds with structure group G2 , Ann. Mat. Pura Appl., 132 (1982), 19–45. [16] M. Fern´andez and L. Ugrate, A differential complex for locally conformal calibrated G2 -manifolds, Illinois J. Math., 44 (2000), 363–390. [17] A. Fino and A. Raffero, Einstein locally conformal calibrated G2 -structure, arXiv:1303.6137 [math.DG]. [18] Th. Friedrich, I. Kath, A. Moroianu and U. Semmelmann, On nearly parallel G2 structures, J. Geom. Phys., 23 (1997), 259–286. [19] J. Gauntlett, D. Martelli and S. Pakis, Superstrings with intrinsic torsion, Phys, Rev. D, 69 (2004), 086002. [20] D. D. Joyce, Compact manifolds with special holonmy, Oxford University Press, 2000. [21] I. Kath, G2(2)-structures on pseudo-Riemannian manifolds, J. Geom. Phys., 27 (1998), 155–177. [22] H. V. Lˆe, The existence of closed arXiv:math/0603182 [math.DG].

3-forms of

G˜2 -type

on

7-manifolds,

[23] H. V. Lˆe, Manifolds admitting a G˜2 -stucture, arXiv:0704.0503 [math.AT]. [24] H. V. Lˆe, Geometric structures associated with a simple Cartan 3-form, J. Geom. Phys., 70 (2013), 205–223. [25] H. V. Lˆe and M. Munir, Classification of compact homogeneous spaces with invariant G2 -structures, Adv. Geom., 12 (2012), 303–328. [26] C. Lin, Laplacian solutions and symmetry in G2 -geometry, J. Geom. Phys., 64 (2013), 111–119. [27] M. Munir and A. R. Nizami, On classification of algebraic types of G2 -structures, J. Geom. Topol., 14 (2013), 39–60. [28] W. Reichel, Uber trilineare alternierende Formen in sechs und sieben Veranderlichen und die durch sie denierten geometrischen Gebilde, Dissertation Greiswald, 1907.

736

Mobeen Munir ET AL 728-737

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[29] F. Reidegeld, Spaces admitting homogeneous G2 -structures, Differential Geom. Appl., 28 (2010), 301–312. [30] S. M. Salamon, Riemannian geometry and holonomy groups, Pitman Research Notes in Mathematics Series, vol. 201, Longman Scientific & Technical, Harlow; copublished in the United States with John Wiley & Sons, Inc., New York, 1989. [31] I. Vaisman, Locally conformal sympletic manifolds, Internat. J. Math. Math. Sci., 8 (1985), 521–536.

737

Mobeen Munir ET AL 728-737

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FOURIER SERIES OF FINITE PRODUCTS OF BERNOULLI AND EULER FUNCTIONS TAEKYUN KIM1,2 , DAE SAN KIM3 , DMITRY V. DOLGY4 , AND JIN-WOO PARK5,∗

Abstract. In this paper, we will consider three types of sums of finite products of Bernoulli and Euler functions, and derive the Fourier series expansions of them. In addition, we will express each of them in terms of Bernoulli functions.

1. Introduction Let Bm (x) be the Bernoulli polynomials given by the generating function ∞ X tm t xt e = B (x) , (see [7, 13, 23]). m et − 1 m! m=0

For x = 0, Bm = Bm (0) are called Bernoulli numbers. Also, let Em (x) be the Euler polynomials defined by he generating function ∞ X 2 tm xt e = E (x) , (see [4, 19, 23]). m et + 1 m! m=0

For x = 0, Em = Em (0) are called Euler numbers. It is well known that the Bernoulli and Euler polynomials have the following properties d d Bm (x) = mBm−1 (x), Em (x) = mEm−1 (x), (m ≥ 1), dx dx Bm (1) = Bm + δ1,m , Em (1) = −Em + 2δ0,m , (m ≥ 0). For any real number x, we let hxi = x − bxc ∈ [0, 1) denote the fractional part of x. We will need the following facts about Bernoulli functions Bm (hxi) : (i) for m ≥ 2, Bm (hxi) = −m!

∞ X

e2πinx , (2πin)m n=−∞ n6=0

2010 Mathematics Subject Classification. 11B68, 42A16. Key words and phrases. Fourier series, Bernoulli polynomial, Bernoulli function, Euler polynomial, Euler function. ∗ Corresponding author. 1

738

T. KIM ET AL 738-755

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

Fourier series of finite products of Bernoulli and Euler functions

(ii) for m = 1, −

 ∞ X e2πinx B1 (hxi), for x ∈ / Z, = 0, for x ∈ Z. 2πin n=−∞ n6=0

Throughout this paper, we will assume that r, s are nonnegative integers with r + s ≥ 1. Here we will consider three types of sums of finite products of Bernoulli and Euler functions αm (hxi), βm (hxi), and γm (hxi) and derive the Fourier series expansions of them. In addition, we will express each of them in terms of Bernoulli functions. (1) X αm (hxi) = Bi1 (hxi) · · · Bir (hxi) i1 +···+ir +j1 +···+js =m

×Ej1 (hxi) · · · Ejs (hxi), (m ≥ 1); (2) X

βm (hxi) =

i1 +···+ir +j1 +···+js

1 Bi1 (hxi) · · · Bir (hxi) i ! · · · i !j 1 r 1 ! · · · js ! =m

×Ej1 (hxi) · · · Ejs (hxi), (m ≥ 1); (3) X

βm (hxi) =

i1 +···+ir +j1 +···+js

1 Bi (hxi) · · · Bir (hxi) i · · · i j1 · · · js 1 1 r =m

×Ej1 (hxi) · · · Ejs (hxi), (m ≥ r + s). Here the sums for (1) and (2) are over all nonnegative integers i1 , . . . , ir , j1 , . . . , js with i1 + · · · + ir + j1 + · · · + js = m, and the sums for (3) are over all positive integers i1 , . . . , ir , j1 , . . . , js with i1 + · · · + ir + j1 + · · · + js = m. For elementary facts about Fourier analysis, the reader may refer to any book (for example, see [1,20,24]). As to αm (hxi), we note that the polynomial identity (1.1) follows immediately from Theorems 2.1 and 2.2, which is in turn derived from the Fourier series expansion of αm (hxi): X

Bi1 (x) · · · Bir (x)Ej1 (x) · · · Ejs (x)

i1 +···+ir +j1 +···+js =m m  X

=

1 m+r+s

j=0

 m+r+s ∆m−j+1 Bj (x), j

where, for each positive integer l, X r s ∆l = (−1)c 2s−c a c 0≤a≤r 0≤c≤s r−l≤a≤r



X

X

(1.1)

Bi1 · · · Bia Ej1 · · · Ejc

i1 +···+ia +j1 +···+jc =a+l−r

Bi1 · · · Bir Ej1 · · · Ejs .

i1 +···+ir +j1 +···+js =m

The obvious polynomial identities can be derived also for βm (hxi) from Theorems 3.1 and 3.2. It is noteworthy that from the Fourier series expansion of the

739

T. KIM ET AL 738-755

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J.-W. Park

3

Pm−1 1 function k=1 k(m−k) Bk (hxi)Bm−k (hxi) we can derive the Faber-PandharipandeZagier identity (see [5,6,9-12,21,22]) and the Miki’s identity (see [3,9-12]). The reader may refer to the recent papers [8,14-16,18] for the related results. 2. Sums of finite products of Bernoulli and Euler functions of the first type Let X

αm (x) =

Bi1 (x) · · · Bir (x)Ej1 (x) · · · Ejs (x), (m ≥ 1),

i1 +···+ir +j1 +···+js =m

where the sum runs over all nonnegative integers i1 , . . . , ir , j1 , . . . , js satisfying i1 + · · · + ir + j1 + · · · + js = m. Then we will consider the function X αm (hxi) = Bi1 (hxi) · · · Bir (hxi)Ej1 (hxi) · · · Ejs (hxi), i1 +···+ir +j1 +···+js =m

defined on R which is periodic with period 1. The Fourier series of αm (hxi) is ∞ X

2πinx A(m) , n e

n=−∞

where A(m) n

Z

1 −2πinx

=

αm (hxi)e 0

Z dx =

1

αm (x)e−2πinx dx.

0

To continue our discussion, we need to observe the following. 0 αm (x)

X

=

i1 Bi1 −1 (x)Bi2 (x) · · · Bir (x)Ej1 (x) · · · Ejs (x)

i1 +···+ir +j1 +···+js =m i1 ≥1

X

+ ··· +

Bi1 (x) · · · Bir−1 (x)ir Bir −1 (x)Ej1 (x) · · · Ejs (x)

i1 +···+ir +j1 +···+js =m ir ≥1

X

+

Bi1 (x)Bi2 (x) · · · Bir (x)j1 Ej1 −1 (x)Ej2 (x) · · · Ejs (x)

i1 +···+ir +j1 +···+js =m j1 ≥1

X

+ ··· +

Bi1 (x) · · · Bir (x)Ej1 (x) · · · Ejs−1 (x)js Ejs −1 (x)

i1 +···+ir +j1 +···+js =m js ≥1

X

=

(i1 + 1)Bi1 (x) · · · Bir (x)Ej1 (x) · · · Ejs (x)

i1 +···+jr +j1 +···+js =m−1

X

+ ··· +

(ir + 1)Bi1 (x) · · · Bir (x)Ej1 (x) · · · Ejs (x)

i1 +···+jr +j1 +···+js =m−1

X

+

(j1 + 1)Bi1 (x) · · · Bir (x)Ej1 (x) · · · Ejs (x)

i1 +···+jr +j1 +···+js =m−1

+ ··· +

X

(js + 1)Bi1 (x) · · · Bir (x)Ej1 (x) · · · Ejs (x)

i1 +···+jr +j1 +···+js =m−1

=(m + r + s − 1)αm−1 (x).

740

T. KIM ET AL 738-755

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

Fourier series of finite products of Bernoulli and Euler functions

From this, we obtain  and

1

Z

0

αm+1 (x) m+r+s

αm (x)dx = 0

= αm (x),

1 (αm+1 (1) − αm+1 (0)) . m+r+s

For m ≥ 1, we set ∆m = αm (1) − αm (0) X = (Bi1 (1) · · · Bir (1)Ej1 (1) · · · Ejs (1) − Bi1 · · · Bir Ej1 · · · Ejs ) i1 +···+ir +j1 +···+js =m

X

=

(Bi1 + δ1,i1 ) · · · (Bir + δ1,ir )(−Ej1 + 2δ0,j1 ) · · · (−Ejs + 2δ0,js )

i1 +···+ir +j1 +···+js =m

X



Bi1 · · · Bir Ej1 · · · Ejs

i1 +···+ir +j1 +···+js =m

X

=

0≤a≤r 0≤c≤s r−m≤a≤r



   r s (−1)c 2s−c a c i

X

Bi1 · · · Bia Ej1 · · · Ejc

1 +···+ia +j1 +···+jc =a+m−r

X

Bi1 · · · Bir Ej1 · · · Ejs .

i1 +···+ir +j1 +···+js =m

Note here that the sum over all i1 + · · · + ir + j1 + · · · + js = m of any term with a of Bie , r − a of δ1,if (1 ≤ e, f ≤ r), c of −Eju , and s − c of 2δ0,jv (1 ≤ u, v ≤ s) all give the same sum X Bi1 · · · Bia δ1,ia+1 · · · δ1,ir (−Ej1 ) · · · (−Ejc )(2δ0,jc+1 ) · · · (2δ0,js ) i1 +···+ir +j1 +···+js =m

X

=

(−1)c 2s−c Bi1 · · · Bia Ej1 · · · Ejc ,

i1 +···+ia +j1 +···+jc =m+a−r

which is not an empty sum as long as m + a − r ≥ 0. We now see that αm (0) = αm (1) ⇐⇒ ∆m = 0, and Z

1

αm (x)dx = 0

1 ∆m+1 . m+r+s (m)

We are now going to determine the Fourier coefficients An . Case 1 : n 6= 0. Z 1 A(m) = αm (x)e−2πinx dx n 0

1 1  1 =− αm (x)e−2πinx 0 + 2πin 2πin

Z

1 0 αm (x)e−2πinx dx

0

1 m+r+s−1 =− (αm (1) − αm (0)) + 2πin 2πin m + r + s − 1 (m−1) 1 = An − ∆m , 2πin 2πin

741

Z

1

αm−1 (x)e−2πinx dx

0

T. KIM ET AL 738-755

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J.-W. Park

5

from which by induction we can easily deduce A(m) =− n

m X (m + r + s − 1)j−1

(2πin)j

j=1

∆m−j+1

m

=−

X (m + r + s)j 1 ∆m−j+1 . m + r + s j=1 (2πin)j

Case 2 : n = 0. (m)

A0

Z =

1

αm (x)dx = 0

1 ∆m+1 . m+r+s

αm (hxi), (m ≥ 1) is piecewise C ∞ . In addition, αm (hxi) is continuous for those positive integers with ∆m = 0 and discontinuous with jump discontinuities at integers for those positive integers with ∆m 6= 0. Assume first that m is a positive integer with ∆m = 0. Then αm (0) = αm (1). Hence αm (hxi) is piecewise C ∞ and continuous. Thus the Fourier series of αm (hxi) converges uniformly to αm (hxi), and αm (hxi)   ∞ m X X 1 (m + r + s) 1 j − ∆m+1 + ∆m−j+1  e2πinx = j m+r+s m + r + s (2πin) n=−∞ j=1 n6=0

   m  ∞ 2πinx X X 1 1 m+r+s e   ∆m+1 + = ∆m−j+1 −j! j m+r+s m + r + s j=1 (2πin) j n=−∞ n6=0

=

m  X

1 1 ∆m+1 + m+r+s m + r + s j=2  B1 (hxi), for x ∈ / Z, + ∆m × 0, for x ∈ Z.

 m+r+s ∆m−j+1 Bj (hxi) j

Now, we are ready to state our first result. Theorem 2.1. For each positive integer l, we let X r s X ∆l = (−1)c 2s−c a c 0≤a≤r 0≤c≤s r−l≤a≤r



Bi1 · · · Bia Ej1 · · · Ejc

i1 +···+ia +j1 +···+jc =a+l−r

X

Bi1 · · · Bir Ej1 · · · Ejs .

i1 +···+ir +j1 +···+js =l

Assume that m is a positive integer with ∆m = 0. Then we have the following. (a) X

Bi1 (hxi) · · · Bir (hxi)Ej1 (hxi) · · · Ejs (hxi)

i1 +···+ir +j1 +···+js =m

742

T. KIM ET AL 738-755

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

Fourier series of finite products of Bernoulli and Euler functions

has the Fourier expansion X Bi1 (hxi) · · · Bir (hxi)Ej1 (hxi) · · · Ejs (hxi) i1 +···+ir +j1 +···+js =m

=

∞ X



1 1 − ∆m+1 + m+r+s m + r+s n=−∞

m X (m + r + s)j j=1

(2πin)j

 ∆m−j+1  e2πinx ,

n6=0

for all x ∈ R, where the convergence is uniform. (b) X

Bi1 (hxi) · · · Bir (hxi)Ej1 (hxi) · · · Ejs (hxi)

i1 +···+ir +j1 +···+js =m

=

 m  X 1 1 m+r+s ∆m+1 + ∆m−j+1 Bj (hxi), m+r+s m + r + s j=2 j

for all x ∈ R, where Bj (hxi) is the Bernoulli function. Assume next that ∆m 6= 0, for a positive integer m. Then αm (0) 6= αm (1). Hence αm (hxi) is piecewise C ∞ and discontinuous with jump discontinuities at integers. The Fourier series of αm (hxi) converges pointwise to αm (hxi), for x ∈ / Z, and converges to 1 1 (αm (0) + αm (1)) = αm (0) + ∆m , 2 2 for x ∈ Z. We are now ready to state our second result. Theorem 2.2. For each positive integer l, we let X r s X ∆l = (−1)c 2s−c a c 0≤a≤r 0≤c≤s r−l≤a≤r



Bi1 · · · Bia Ej1 · · · Ejc

i1 +···+ia +j1 +···+jc =a+l−r

X

Bi1 · · · Bir Ej1 · · · Ejs .

i1 +···+ir +j1 +···+js =l

Assume that m is a positive integer with ∆m 6= 0. Then we have the following. (a)   ∞ m X X 1 (m + r + s) 1 j − ∆m+1 + ∆m−j+1  e2πinx j m+r+s m + r + s (2πin) n=−∞ j=1 n6=0

 P =

Bi1 (hxi) · · · Bir (hxi)Ej1 (hxi) · · · Ejs (hxi), for x ∈ / Z, 1 B ∆ , for x ∈ Z. · · · B E · · · E + ir j 1 js i1 +···+ir +j1 +···+js =m i1 2 m

i1 +···+i P r +j1 +···+js =m

(b)  m  X 1 m+r+s ∆m−j+1 Bj (hxi) m + r + s j=0 j X = Bi1 (hxi) · · · Bir (hxi)Ej1 (hxi) · · · Ejs (hxi), for x ∈ / Z; i1 +···+ir +j1 +···+js =m

743

T. KIM ET AL 738-755

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J.-W. Park

1 m+r+s

m  X j=0 j6=1

X

=

7

 m+r+s ∆m−j+1 Bj (hxi) j

i1 +···+ir +j1 +···+js

1 Bi1 · · · Bir Ej1 · · · Ejs + ∆m , for x ∈ Z. 2 =m

3. Sums of finite products of Bernoulli and Euler functions of the second type Let X

βm (x) =

i1 +···+ir +j1 +···+js

1 Bi1 (x) · · · Bir (x)Ej1 (x) · · · Ejs (x), i ! · · · i !j 1 r 1 ! · · · js ! =m

(m ≥ 1), where the sum runs over all nonnegative integers i1 , . . . , ir , j1 , . . . , js satisfying i1 + · · · + ir + j1 + · · · + js = m. Then we consider function X 1 βm (hxi) = Bi (hxi) · · · Bir (hxi) i ! · · · ir !j1 ! · · · js ! 1 i +···+i +j +···+j =m 1 1

r

1

s

× Ej1 (hxi) · · · Ejs (hxi), defined on R, which is periodic with period 1. The Fourier series of βm (hxi) is ∞ X

Bn(m) e2πinx ,

n=−∞

where Bn(m) =

Z

1

βm (hxi)e−2πinx dx =

0

Z

1

βm (x)e−2πinx dx.

0

To proceed further, we need to observe the following. X 1 0 Bi −1 (x)Bi2 (x) · · · Bir (x) βm (x) = (i − 1)!i ! · · · ir !j1 ! · · · js ! 1 1 2 i +···+i +j +···+j =m 1

r

1

i1 ≥1

× Ej1 (x) · · · Ejs (x) X + ··· + i1 +···+ir +j1 +···+js ir ≥1

× Ej1 (x) · · · Ejs (x) X + i1 +···+ir +j1 +···+js j1 ≥1

s

1 Bi (x) · · · Bir−1 (x)Bir −1 (x) i ! · · · ir−1 !(ir − 1)!j1 ! · · · js ! 1 =m 1

1 Bi (x) · · · Bir (x) i ! · · · i !(j − 1)!j2 ! · · · js ! 1 1 r 1 =m

× Ej1 −1 (x)Ej2 (x) · · · Ejs (x) X + ··· + i1 +···+ir +j1 +···+js js ≥1

1 Bi (x) · · · Bir (x) i ! · · · i !j ! · · · js−1 !(js − 1)! 1 r 1 =m 1

× Ej1 (x) · · · Ejs−1 (x)Ejs −1 (x)

744

T. KIM ET AL 738-755

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

Fourier series of finite products of Bernoulli and Euler functions

X

=

i1 +···+ir +j1 +···+js

1 Bi (x) · · · Bir (x)Ej1 (x) · · · Ejs (x) i ! · · · ir !j1 ! · · · js ! 1 =m−1 1 X

+ ··· +

i1 +···+ir +j1 +···+js

× Ej1 (x) · · · Ejs (x) X + i1 +···+ir +j1 +···+js

1 Bi1 (x) · · · Bir (x)Ej1 (x) · · · Ejs (x) i ! · · · i !j r 1 ! · · · js ! =m−1 1

X

+ ··· +

1 Bi (x) · · · Bir (x) i ! · · · ir !j1 ! · · · js ! 1 =m−1 1

i1 +···+ir +j1 +···+js

1 Bi1 (x) · · · Bir (x) i ! · · · i !j 1 r 1 ! · · · js ! =m−1

× Ej1 (x) · · · Ejs (x) =(r + s)βm−1 (x). From this, we have 

βm+1 (x) r+s

0 = βm (x),

and 1

Z

βm (x)dx = 0

1 (βm+1 (1) − βm+1 (0)) . r+s

For m ≥ 1, we put Ωm = βm (1) − βm (0) X 1 = i ! · · · i !j 1 r 1 ! · · · js ! i +···+i +j +···+j =m 1

r

1

s

× (Bi1 (1) · · · Bir (1)Ej1 (1) · · · Ejs (1) − Bi1 · · · Bir Ej1 · · · Ejs ) X 1 = i ! · · · ir !j1 ! · · · js ! i +···+i +j +···+j =m 1 1

r

1

s

× (Bi1 + δ1,i1 ) · · · (Bir + δ1,ir )(−Ej1 + 2δ0,j1 ) · · · (−Ejs + 2δ0,js ) X Bi1 · · · Bir Ej1 · · · Ejs − i1 ! · · · ir !j1 ! · · · js ! i1 +···+ir +j1 +···+js =m    X X r s Bi1 · · · Bia Ej1 · · · Ejc = (−1)c 2s−c a c i1 ! · · · ia !j1 ! · · · jc ! i +···+i +j +···+j =m+a−r 0≤a≤r 0≤c≤s r−m≤a≤r



X i1 +···+ir +j1 +···+js

1

a

1

c

Bi1 · · · Bir Ej1 · · · Ejs . i1 ! · · · ir !j1 ! · · · js! =m

We now see that βm (0) = βm (1) ⇐⇒ Ωm = 0, and Z

1

βm (x)dx = 0

1 Ωm+1 . r+s (m)

Now, we would like to determine the Fourier coefficients Bn .

745

T. KIM ET AL 738-755

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J.-W. Park

9

Case 1 : n 6= 0. Bn(m) =

Z

1

βm (x)e−2πinx dx

0

=−

1 1 1  βm (x)e−2πinx 0 + 2πin 2πin

Z

1

0

βm (x)e−2πinx dx

0

Z 1 r+s 1 =− βm−1 (x)e−2πinx dx (βm (1) − βm (0)) + 2πin 2πin 0 r + s (m−1) 1 = Bn Ωm , − 2πin 2πin from which we can deduce that m X (r + s)j−1 Ωm−j+1 . Bn(m) = (2πin)j j=1 Case 2 : n = 0. Z

1

1 Ωm+1 . r + s 0 βm (hxi), (m ≥ 1) is piecewise C ∞ . Furthermore, βm (hxi) is continuous for those positive integers m with Ωm = 0, and discontinuous with jump discontinuities at integers for those positive integers m with Ωm 6= 0. Assume first that Ωm = 0, for a positive integer m. Then βm (0) = βm (1). Hence βm (hxi) is piecewise C ∞ , and continuous. Thus the Fourier series of βm (hxi) converges uniformly to βm (hxi), and   m ∞ j−1 X X (r + s) 1 − Bn(m) = Ωm+1 + Ωm−j+1  e2πinx j r+s (2πin) n=−∞ j=1 (m) B0

βm (x)dx =

=

n6=0

=

m X (r + s)j−1

1 Ωm+1 + r+s j=1

j!

  Ωm−j+1 −j!

∞ X

 2πinx

e  j (2πin) n=−∞ n6=0

=

m X (r + s)j−1

1 Ωm+1 + Ωm−j+1 Bj (hxi) r+s j! j=2  B1 (hxi), for x ∈ / Z, + Ωm × 0, for x ∈ Z.

Now, we are ready to state our first result. Theorem 3.1. For each positive integer l, we let X  r s X (−1)c 2s−c Ωl = u c 0≤a≤r 0≤c≤s r−l≤a≤r



i1 +···+ia +i1 +···+jc =l+a−r

X i1 +···+ir +j1 +···+js =l

Bi1 · · · Bia Ej1 · · · Ejc i1 ! · · · ia !j1 ! · · · jc !

Bi1 · · · Bir Ej1 · · · Ejs . i1 ! · · · ir !j1 ! · · · js !

Assume that m is a positive integer with Ωm = 0. Then we have the following.

746

T. KIM ET AL 738-755

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

Fourier series of finite products of Bernoulli and Euler functions

(a) X i1 +···+ir +j1 +···+js

1 Bi1 (hxi) · · · Bir (hxi)Ej1 (hxi) · · · Ejs (hxi) i ! · · · i !j 1 r 1 ! · · · js ! =m

has the Fourier series expansion X 1 Bi1 (hxi) · · · Bir (hxi)Ej1 (hxi) · · · Ejs (hxi) i ! · · · i !j 1 r 1 ! · · · js ! i1 +···+ir +j1 +···+js =m   ∞ m j−1 X X 1 (r + s) − = Ωm−j+1  e2πinx , Ωm+1 + j r+s (2πin) n=−∞ j=1 n6=0

for all x ∈ R, where the convergence is uniform. (b) X

=

i1 +···+ir +j1 +···+js m j−1 X j=0 j6=1

(r + s) j!

1 Bi1 (hxi) · · · Bir (hxi)Ej1 (hxi) · · · Ejs (hxi) i ! · · · i !j r 1 ! · · · js ! =m 1

Ωm−j+1 Bj (hxi),

for all x ∈ R, where Bj (hxi) is the Bernoulli function. Assume next that m is a positive integer with Ωm 6= 0. Then βm (0) 6= βm (1). Hence βm (hxi) is piecewise C ∞ , and discontinuous with jump discontinuities at integers. Thus the Fourier series of βm (hxi) converges pointwise to βm (hxi), for x∈ / Z, and converges to 1 1 (βm (0) + βm (1)) = βm (0) + Ωm , 2 2 for x ∈ Z. Now, we are ready to state our second result. Theorem 3.2. For each positive integer l, we let X  r s X Ωl = (−1)c 2s−c u c 0≤a≤r 0≤c≤s r−l≤a≤r

i1 +···+ia +i1 +···+jc =l+a−r

X



i1 +···+ir +j1 +···+js =l

Bi1 · · · Bia Ej1 · · · Ejc i1 ! · · · ia !j1 ! · · · jc !

Bi1 · · · Bir Ej1 · · · Ejs . i1 ! · · · ir !j1 ! · · · js !

Assume that m is a positive integer with Ωm 6=0, for a positive integer m. Then we have the following. (a) m X (r + s)j−1 j=0

=

j!

Ωm−j+1 Bj (hxi)

X i1 +···+ir +j1 +···+js

1 Bi1 (hxi) · · · Bir (hxi)Ej1 (hxi) · · · Ejs (hxi), i ! · · · i !j r 1 ! · · · js ! =m 1

for x ∈ / Z;

747

T. KIM ET AL 738-755

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J.-W. Park m X (r + s)j−1 j=0 j6=1

j!

Ωm−j+1 Bj (hxi)

X

=

11

i1 +···+ir +j1 +···+js

1 Bi1 · · · Bir Ej1 · · · Ejs + Ωm , for x ∈ Z. i ! · · · i !j ! · · · j ! 2 1 r 1 s =m

(b)   ∞ m j−1 X X 1 (r + s) − Ωm−j+1  e2πinx Ωm+1 + j r+s (2πin) n=−∞ j=1 n6=0

 P 1  i1 +···+ir +j1 +···+js =m i1 !···ir !j1 !···js ! Bi1 (hxi) · · · Bir (hxi)Ej1 (hxi) · · · Ejs (hxi),   for x ∈ / Z, P = Bi1 ···Bir Ej1 ···Ejs  + 12 Ωm ,  i1 +···+ir +j1 +···+js =m i1 !···ir !j1 !···js !  for x ∈ Z.

4. Sums of finite products of Bernoulli and Euler functions of the Third type Let X

γr,s,m (x) =

i1 +···+ir +j1 +···+js

1 Bi1 (x) · · · Bir (x)Ej1 (x) · · · Ejs (x), i · · · i r j1 · · · js =m 1

(m ≥ r + s), where the sum runs over all positive integers i1 , · · · ir , j1 , · · · js satisfying i1 +· · · ir + j1 · · · + js = m. Then we consider function γr,s,m (hxi) X

=

i1 +···+ir +j1 +···+js

1 Bi (hxi) · · · Bir (hxi)Ej1 (hxi) · · · Ejs (hxi), i · · · ir j1 · · · js 1 =m 1

defined on R, which is periodic with period 1. The Fourier series of γr,s,m (hxi) is ∞ X

Cn(r,s,m) (x)e2πinx ,

n=−∞

where Cn(r,s,m)

Z =

1 −2πinx

γm (hxi)e 0

Z dx =

1

γm (x)e−2πinx dx.

0

748

T. KIM ET AL 738-755

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12

Fourier series of finite products of Bernoulli and Euler functions

To continue our discussion, we need to observe the following. X 1 0 γr,s,m (x) = Bi −1 (x)Bi2 (x) · · · Bir (x) i · · · ir j1 · · · js 1 i +···+i +j +···+j =m 2 1

r

1

× Ej1 (x) · · · Ejs (x) X + ··· + i1 +···+ir +j1 +···+js

× Ej1 (x) · · · Ejs (x) X + i1 +···+ir +j1 +···+js

s

1 Bi1 (x) · · · Bir−1 (x)Bir −1 (x) i · · · i r−1 j1 · · · js =m 1

1 Bi1 (x) · · · Bir (x) i · · · i r j2 · · · js =m 1

× Ej1 −1 (x)Ej2 (x) · · · Ejs (x) X + ··· + i1 +···+ir +j1 +···+js

1 Bi (x) · · · Bir (x) i · · · ir j1 · · · js−1 1 =m 1

× Ej1 (x) · · · Ejs−1 (x)Ejs −1 (x) X 1 = Bi (x) · · · Bir (x)Ej1 (x) · · · Ejs (x) i · · · ir j1 · · · js 2 i +···+i +j +···+j =m−1 2 2

r

1

s

X

+

i1 +···+ir +j1 +···+js

1 Bi1 (x) · · · Bir (x)Ej1 (x) · · · Ejs (x) i · · · i r j1 · · · js =m−1 2

X

+ ··· +

i1 +···+ir−1 +j1 +···+js

× Ej1 (x) · · · Ejs (x) X + i1 +···+ir +j1 +···+js

X

+

i1 +···+ir +j2 +···+js

i1 +···+ir +j1 +···+js

+ ··· +

1 Bi (x) · · · Bir (x)Ej1 (x) · · · Ejs (x) i · · · i j1 · · · js 1 1 r−1 =m−1

1 Bi (x) · · · Bir (x)Ej2 (x) · · · Ejs (x) i · · · ir j2 · · · js 1 =m−1 1

X

+

1 Bi1 (x) · · · Bir−1 (x) i · · · i r−1 j1 · · · js =m−1 1

1 Bi (x) · · · Bir (x)Ej1 (x) · · · Ejs (x) i · · · ir j2 · · · js 1 =m−1 1

X i1 +···+ir +j1 +···+js−1

1 Bi1 (x) · · · Bir (x) i · · · i j r 1 · · · js−1 =m−1 1

× Ej1 (x) · · · Ejs−1 (x) X + i1 +···+ir +j1 +···+js

1 Bi1 (x) · · · Bir (x)Ej1 (x) · · · Ejs (x) i · · · i j r 1 · · · js−1 =m−1 1

=rγr−1,s,m−1 (x) + sγr,s−1,m−1 (x)  X 1 1 + ··· + + i · · · i j · · · j i · · · i 2 r 1 s 1 r−1 j1 · · · js−1 i1 +···+ir +j1 +···+js =m−1  1 1 + + ··· + Bi1 (x) · · · Bir (x) i1 · · · ir j2 · · · js i1 · · · ir j1 · · · js−1 × Ej1 (x) · · · Ejs (x) =rγr−1,s,m−1 (x) + sγr,s−1,m−1 (x) + (m − 1)γr,s,m−1 (x).

749

T. KIM ET AL 738-755

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J.-W. Park

13

So we obtained that 0 γr,s,m (x) = rγr−1,s,m−1 (x) + sγr,s−1,m−1 (x) + (m − 1)γr,s,m−1 (x),

(4.1)

with γr,s,r+s−1 (x) = 0. For m ≥ r + s, let us put Λr,s,m = γr,s,m (1) − γr,s,m (0) X 1 = i · · · ir j1 · · · js i +···+i +j +···+j =m 1 1

r

1

s

× (Bi1 (1) · · · Bir (1)Ej1 (1) · · · Ejs (1) − Bi1 · · · Bir Ej1 · · · Ejs ) X 1 = ((Bi1 + δ1,i1 ) · · · (Bir + δ1,ir ) i · · · i r j1 · · · js i +···+i +j +···+j =m 1 1

r

1

s

× (−Ej1 + 2δ0,j1 ) · · · (−Ejs + 2δ0,js ) − Bi1 · · · Bir Ej1 · · · Ejs ) r   X X r (−1)s = Bi · · · Bia Ej1 · · · Ejs a i +···+i +j +···+j =m+a−r i1 · · · ia j1 · · · js 1 a=0 1

a

1

X



i1 +···+ir +j1 +···+js

s

1 Bi · · · Bir Ej1 · · · Ejs . i · · · ir j1 · · · js 1 =m 1

Note here that m + a − r ≥ a + s and hence that none of the inner sum for each a (0 ≤ a ≤ r) are empty. R1 Let us denote 0 γr,s,m (x)dx by ar,s,m . Then. from (4.1) we have γr,s,m (x) = −

s 1 0 r γr−1,s,m (x) − γr,s−1,m (x) + γr,s,m+1 (x), m m m

and hence obtain ar,s,m = −

r s 1 ar−1,s,m − ar,s−1,m + Λr,s,m+1 . m m m

(4.2)

In [2], we showed that 1

Z ar,0,m =

γr,0,m (x)dx = 0

r X (−1)j−1 (r)j−1

mj

j=1

Λr−j+1,0,m+1 , (r ≥ 1).

(4.3)

Λ0,s−j+1,m+1 , (s ≥ 1).

(4.4)

Also, in [17], we derived that Z a0,s,m =

1

γ0,s,m (x)dx = 0

s X (−1)j−1 (s)j−1

mj

j=1

We now observe that (4.2) together with (4.3) and (4.4) determines ar,s,m recursively for all r, s, m, with m ≥ r + s ≥ 1. Also, we note that γr,s,m (0) = γr,s,m (1) ⇐⇒ Λr,s,m = 0. (r,s,m)

Now, we would like to determine the Fourier coefficients Cn

750

.

T. KIM ET AL 738-755

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14

Fourier series of finite products of Bernoulli and Euler functions

Case 1 : n 6= 0. Note that Cn(r,s,r+s) =

Z

1

γr,s,r+s (x)e−2πinx dx

0 1

Z

B1 (x)r E1 (x)s e−2πinx dx

= 0

r+s 1 = x− e−2πinx dx (4.5) 2 0 " # 1 r+s r+s−1 Z  1 1 1 r+s 1 =− x− x− e−2πinx + e−2πinx dx 2πin 2 2πin 0 2 0  r+s  r+s ! r+s−1 Z  1 1 1 1 r+s 1 − − x− e−2πinx dx, =− + 2πin 2 2 2πin 0 2 Z

1



Cn(r−1,s,r+s−1)

=

Cn(r,s−1,r+s−1)

1

Z = 0

 r+s−1 1 x− e−2πinx dx, 2

(4.6)

and r

s

Λr,s,r+s = B1 (x) E1 (x) −

B1r E1s

r+s  r+s  1 1 − − . = 2 2

(4.7)

By (4.5), (4.6) and (4.7), Cn(r,s,m) =

Z

1

γr,s,m (x)e−2πinx dx

0

Z 1  1  1 −2πinx 1 =− γr,s,m (x)e + γ0 (x)e−2πinx dx 0 2πin 2πin 0 r,s,m 1 (γr,s,m (1) − γr,s,m (0)) =− 2πin Z 1 1 + {rγr−1,s,m−1 (x) + sγr,s−1,m−1 (x) + (m − 1)γr,s,m−1 (x)} e−2πinx dx 2πin 0  1 1  (r−1,s,m−1) =− Λr,s,m + rCn + sCn(r,s−1,m−1) + (m − 1)Cn(r,s,m−1) 2πin 2πin r s 1 m − 1 (r,s,m−1) C + C (r−1,s,m−1) + C (r,s−1,m−1) − Λr,s,m = 2πin n 2πin n 2πin n 2πin  r s m − 1 m − 1 (r,s,m−2) C + C (r−1,s,m−2) + C (r,s−1,m−2) = 2πin 2πin n 2πin n 2πin n  1 r s 1 − Λr,s,m−1 + C (r−1,s,m−1) + C (r,s−1,m−1) − Λr,s,m 2πin 2πin n 2πin n 2πin 2 (m − 1)2 (r,s,m−2) X r(m − 1)j − 1 (r−1,s,m−j) = C + Cn (2πin)2 n (2πin)j j=1 +

2 X s(m − 1)j−1 j=1

(2πin)j

Cn(r,s−1,m−j) −

2 X (m − 1)j−1 j=1

751

(2πin)j

Λr,s,m−j+1

T. KIM ET AL 738-755

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J.-W. Park

15

=··· =

(m − 1)m−(r+s) (r,s,r+s) C + (2πin)m−(r+s) n m−(r+s)

+

X j=1

m−(r+s)+1

X

=

j=1

X j=1

r(m − 1)j−1 (r−1,s,m−j) Cn (2πin)j

s(m − 1)j−1 (r,s−1,m−j) Cn − (2πin)j r(m − 1)j−1 (r−1,s,m−j) Cn + (2πin)j

m−(r+s)+1

X



m−(r+s)

j=1

m−(r+s)

X j=1

(m − 1)j−1 Λr,s,m−j+1 (2πin)j

m−(r+s)+1

X j=1

s(m − 1)j−1 (r,s−1,m−j) Cn (2πin)j

(m − 1)j−1 Λr,s,m−j+1 . (2πin)j

So we have shown that m−(r+s)+1

Cn(r,s,m)

X

=

j=1 m−(r+s)+1

+

X j=1

r(m − 1)j−1 (r−1,s,m−j) Cn (2πin)j m−(r+s)+1

s(m − 1)j−1 (r,s−1,m−j) Cn − (2πin)j

X j=1

(4.8) (m − 1)j−1 Λr,s,m−j+1 . (2πin)j

Also, we recall from [2] and [17] that Cn(r,0,m) =

m−r+1 X j=1

m−r+1 X (m − 1)j−1 r(m − 1)j−1 (r−1,0,m−j) C − Λr,0,m−j+1 , (r ≥ 2), n j (2πin) (2πin)j j=1

(4.9) Cn(1,0,m) = − Cn(0,s,m) =

m−s+1 X j=1

(m − 1)! , (2πin)m

(4.10)

m−s+1 X (m − 1)j−1 s(m − 1)j−1 (0,s−1,m−j) C − Λ0,s,m−j+1 , (s ≥ 2), n j (2πin) (2πin)j j=1

(4.11) Cn(0,1,m) = (r,s,m)

Now, we see that Cn (4.8)-(4.12). Case 2 : n = 0.

2 m

m X j=1

(m)j−1 Em−j+1 . (2πin)j

(4.12)

(n 6= 0) can be determined for all m ≥ r + s ≥ 1 from

(r,s,m) C0

Z =

1

γr,s,m (x)dx 0

can be determined for all m ≥ r + s ≥ 1 from (4.2)-(4.4). γr,s,m (hxi), (m ≥ r + s ≥ 1) is piecewise C ∞ . In addition, γr,s,m (hxi) is continuous for those r, s, m with Λr,s,m = 0 and discontinuous with jump discontinuities at integers for those r, s, m with Λr,s,m 6= 0.

752

T. KIM ET AL 738-755

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

16

Fourier series of finite products of Bernoulli and Euler functions

Assume first that Λr,s,m = 0, for some integers r, s, m with m ≥ r + s ≥ 1. Then γr,s,m (0) = γr,s,m (1). γr,s,m (hxi) is piecewise C ∞ , and continuous. So the Fourier series of γr,s,m (hxi) converges uniformly to γr,s,m (hxi), and γr,s,m (hxi) =

(r,s,m) C0

∞ X

+

Cn(r,s,m) e2πinx ,

n=−∞ n6=0 (r,s,m)

(r,s,m)

where C0 are determined by (4.2)-(4.4) and Cn Now, we are ready to state our first result.

(n 6= 0) by (4.8)-(4.12).

Theorem 4.1. For all integers r, s, l with l ≥ r + s ≥ 1, we let r   X X r (−1)s Λr,s,l = B1 · · · Bia Ej1 · · · Ejs i1 · · · ia j1 · · · js a a=0 i1 +···+ia +j1 +···+js =l+a−r

X



i1 +···+ir +j1 +···+js =l

1 Bi · · · Bir Ej1 · · · Ejs . i1 · · · ir j1 · · · js 1

Assume that Λr,s,m = 0, for some integers r, s, m with m ≥ r + s ≥ 1. Then we have the following. X 1 Bi (hxi) · · · Bir (hxi)Ej1 (hxi) · · · Ejs (hxi) i · · · ir j1 · · · js 1 i +···+i +j +···+j =m 1 1

r

1

s

has the Fourier series expansion X 1 Bi1 (hxi) · · · Bir (hxi)Ej1 (hxi) · · · Ejs (hxi) i · · · i r j1 · · · js i +···+i +j +···+j =m 1 1

r

(r,s,m)

=C0

1

+

s

∞ X

Cn(r,s,m) e2πinx ,

n=−∞ n6=0 (r,s,m)

(r,s,m)

where C0 are determined by (4.2)-(4.4) and Cn Here the convergence is uniform.

(n 6= 0) by (4.8)-(4.12).

Next, assume that Λr,sm 6= 0, for some integers r, s, m with m ≥ r + s ≥ 1. Then γr,1,m (0) 6= γr,s,m (1). Hence γr,s,m (hxi) is piecewise C ∞ and discontinuous with jump discontinuities at integers. Then the Fourier series of γr,s,m (hxi) converges pointwise to γr,s,m (hxi), for x ∈ / Z, and converges to 1 1 (γr,s,m (0) + γr,s,m (1)) = γr,s,m (0) + Λr,s,m , 2 2 for x ∈ Z. Now, we can state our second result. Theorem 4.2. For all integers r, s, l with l ≥ r + s ≥ 1, we let r   X X r (−1)s Λr,s,l = B1 · · · Bia Ej1 · · · Ejs a i1 · · · ia j1 · · · js a=0 i1 +···+ia +j1 +···+js =l+a−r



X i1 +···+ir +j1 +···+js =l

1 Bi · · · Bir Ej1 · · · Ejs . i1 · · · ir j1 · · · js 1

753

T. KIM ET AL 738-755

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J.-W. Park

17

Assume that Λr,s,m 6= 0, for some integers r, s, m with m ≥ r + s ≥ 1. Then we have the following. ∞ X r,s,m) C0 + Cn(r,s,m) e2πinx n=−∞ n6=0

 P 1  i1 +···+ir +j1 +···+js =m i1 ···ir j1 ···js Bi1 (hxi) · · · Bir (hxi)Ej1 (hxi) · · · Ejs (hxi),   for x ∈ / Z, P = 1 1 B  i1 +···+ir +j1 +···+js =m i1 ···ir j1 ···js i1 · · · Bir Ej1 · · · Ejs + 2 Λr,s,m ,   for x ∈ Z, (r,s,m)

where C0

(r,s,m)

are determined by (4.2)-(4.4) and Cn

(n 6= 0) by (4.8)-(4.12).

5. Acknowledgment This research was supported by the Daegu University Research Grant, 2017. References [1] M. Abramowitz, IA. Stegun, Handbook of Mathematical Functions, Dover, New York, 1970. [2] R. P. Agarwal, D. S. Kim, T. Kim, J. Kwon Sums of finite products of Bernoulli functions, Preprint. [3] D. Ding, J. Yang, Some identities related to the Apostol-Euler and Apostol-Bernoulli polynomials, Adv. Stud. Contemp. Math. (Kyungshang), 20(1)(2010), 7–21. [4] G. V. Dunne, C. Schubert, Bernoulli number identities from quantum field theory and topological string theory, Commun. Number Theory Phys., 7(2)(2013), 225–249. [5] C. Faber, R. Pandharipande, Hodge integrals and Gromov-Witten theory, Invent. Math. 139(1)(2000), 173–199. [6] S.Gaboury, R.Tremblay, B.-J. Fugere, Some explicit formulas for certain new classes of Bernoulli, Euler and Genocchi polynomials, Proc. Jangjeon Math. Soc. 17(2014), no. 1, 115–123. [7] G.-W. Jang, T. Kim, D.S. Kim, T. Mansour, Fourier series of functions related to Bernoulli polynomials, Adv. Stud. Contemp. Math., 27(2017), no.1, 49–62. [8] D.S. Kim, T. Kim, Bernoulli basis and the product of several Bernoulli polynomials, Int. J. Math. Math. Sci. 2012, Art. ID 463659. [9] D.S. Kim, T. Kim, Some identities of higher order Euler polynomials arising from Euler basis, Integral Transforms Spec. Funct., 24(9) (2013), 734–738. [10] D.S. Kim, T. Kim, Identities arising from higher-order Daehee polynomial bases, Open Math. 13(2015), 196–208. [11] D.S. Kim, T. Kim, Euler basis, identities, and their applications, Int. J. Math. Math. Sci. 2012, Art. ID 343981. [12] T. Kim, Euler numbers and polynomials associated with zeta functions, Abstr. Appl. Anal., 2008(20008),Art. ID 581582, 11 pp. [13] T. Kim, Some identities for the Bernoulli, the Euler and the Genocchi numbers and polynomials, Adv. Stud. Contemp. Math. (Kyungshang), 20(1)(2010), 23–28. [14] T. Kim, D.S. Kim, D.Dolgy, and J.-W. Park, Fourier series of sums of products of polyBernoulli functions and their applications, J. Nonlinear Sci. Appl., 10(2017), no.4, 2384– 2401. [15] T. Kim, D.S. Kim, D.Dolgy, and J.-W. Park, Fourier series of sums of products of ordered Bell and poly-Bernoulli functions, J. Inequal. Appl., 2017 Article ID 13660, 17 pages,(2017). [16] T. Kim, D.S. Kim, G.-W. Jang, and J. Kwon, Fourier series of sums of products of Genocchi functions and their applications, J. Nonlinear Sci. Appl., 10(2017), no.4, 1683–1694. [17] T. Kim, D. S. Kim, B. Lee, J. Kwon, Sums of finite products of Euler functions. Preprint. [18] T. Kim, D.S. Kim, S.-H. Rim, and D.Dolgy, Fourier series of higher-order Bernoulli functions and their applications, J. Inequal. Appl., 2017 Article ID 71452, 8 pages,(2017). [19] T. Kim, D. S. Kim, On λ-Bell polynomials associated with umbral calculus, Russ. J. Math. Phys. 24(1)(2017), 69–78.

754

T. KIM ET AL 738-755

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

18

Fourier series of finite products of Bernoulli and Euler functions

[20] H. Liu, and W. Wang, Some identities on the the Bernoulli, Euler and Genocchi poloynomials via power sums and alternate power sums, Disc. Math., 309(2009), 3346–3363. [21] J. E. Marsden, Elementary classical analysis, W. H. Freeman and Company, San Francisco, 1974. [22] K. Shiratani, S. Yokoyama, An application of p-adic convolutions, Mem. Fac. Sci. Kyushu Univ. Ser. A 36(1)(1982), 73-83. [23] H. M. Srivastava, Some generalizations and basic extensions of the Bernoulli, Euler and Genocchi polynomials, Appl. Math. and Inf. Sci., 5(2011), no. 3, 390–414. [24] D. G. Zill, M. R. Cullen, Advanced Engineering Mathematics, Jones and Bartlett Publishers, Ontario, 2006. 1

Department of Mathematics, College of Science, Tianjin Polytechnic University, Tianjin, 300160, China 2 Department of Mathematics, Kwangwoon University, Seoul 139-701, Republic of Korea. E-mail address: [email protected] 3

Department of Mathematics, Sogang University, Seoul 121-742, Republic of Korea. E-mail address: [email protected] 4

Hanrimwon, Kwangwoon University, Seoul 139-701, Republic of Korea. E-mail address: [email protected] 5 Department of Mathematics Education, Daegu University, Gyeongsan-si, Gyeongsangbukdo, 712-714, Republic of Korea. E-mail address: [email protected]

755

T. KIM ET AL 738-755

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A NOTE ON APPELL-TYPE DEGENERATE q-BERNOULLI POLYNOMIALS AND NUMBERS JONGKYUM KWON AND JIN-WOO PARK2,∗

Abstract. Recently, several researchers have studied for Appell-type of various polynomials (see [18-20,22]). In this paper, we consider some families of Appell-type q-Bernoulli polynomials and numbers. In particular, we derive some interesting identities for the Appell-type degenerate q-Bernoulli polynomials by using the some properties of those polynomials.

1. Introduction Let p be a fixed prime number. Throughout this paper, Zp , Qp and Cp will denote the ring of p-adic integers, the field of p-adic rational numbers and the completion of algebraic closure of Qp . The p-adic norm | · |p is normalized as 1 |p|p = p1 . Let q be an indeterminate in Cp such that |q − 1|p < p− p−1 . The x

q-analogue of number x is defined as [x]q = 1−q 1−q . Note that limq→1 [x]q = x. As is well known, the Bernoulli polynomials are defined by the generating function to be   ∞ X tn t xt B (x) e = , (see [1-10,12-17,21,23,24]). (1.1) n et − 1 n! n=0 When x = 0, Bn = Bn (0) are called Bernoulli numbers. Let U D(Zp ) be the space of uniformly differentiable functions on Zp . For f ∈ U D(Zp ), the p-adic q-integral on Zp is defined by Z Iq (f ) =

f (x)dµq (x) = lim Zp

N →∞

1 [pN ]q

N pX −1

f (x)q x , (see [4,7-13]),

(1.2)

x=0

2010 Mathematics Subject Classification. 11B68; 11S80. Key words and phrases. Appell-type polynomials, Appell-type degenerate q-Bernoulli polynomials and numbers. ∗ corresponding author. 1

756

JONGKYUM KWON ET AL 756-763

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

Jongkyum Kwon, Jin-Woo Park

where [x]q =

1−q x 1−q .

From (1.2), we note that q n I−q (fn ) − I−q (f ) = (q − 1)

n−1 X

q l f (l) +

n−1 q−1 X 0 f (l)q l , log q

(1.3)

l=0

l=0

L. Carlitz considered the degenerate Bernoulli polynomials which are defined by the generating function to be t

x

1 λ

(1 + λt) − 1

(1 + λt) λ =

∞ X n=0

βn (x | λ)

tn , (see [2-4]) n!

(1.4)

when x = 0, βn (0|λ) = βn (λ) are called Carlitz’s q-Bernoulli numbers. In [15], T. Kim introduced the degenerate Carlitz q-Bernoulli polynomials which are defined by the generating function to be Z ∞ X 1 tn (1.5) βn,q (x | λ) , (1 + λt) λ [x+y]q dµq (y) = n! Zp n=0 when x = 0, βn,q (0|λ) = βn,q (λ) are called the degenerate Carlitz’s q-Bernoulli numbers. It is well known that the Bell polynomials are defined by the generating function to be ∞ X t tn ex(e −1) = Beln (x) , (see [22]). (1.6) n! n=0 As is well known, the Apostol-Bernoulli polynomials are defined by the generating function to be   ∞ X t tn xt e = B (x | q) , (see [5]). (1.7) n qet − 1 n! n=0 When x = 0, Bn = Bn (0 | q) are called Apostol-Bernoulli numbers. The Stirling numbers of the second kind are defined by (et − 1)n = n!

∞ X l=n

tl S2 (n, l) , (see [20]). l!

(1.8)

The gamma and beta function are defined by the following definite integrals: for (α > 0, β > 0), Z ∞ Γ(α) = e−t tα−1 dt (1.9) 0

757

JONGKYUM KWON ET AL 756-763

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A note on Appell-type degenerate q-Bernoulli polynomials and numbers

3

and Z

1

tα−1 (1 − t)β−1 dt

B(α, β) = 0

Z



= 0

(1.10)

tα−1 dt, (see [22]). (1 + t)α+β

Thus by (1.9) and (1.10), we get Γ(α + 1) = αΓ(α),

B(α, β) =

Γ(α)Γ(β) . Γ(α + β)

(1.11)

Recently, several researchers have studied for Appell-type of various polynomials (see [18-20,22]). In this paper, we consider the Appell-type degenerate q-Bernoulli polynomials and derive some properties of those polynomials.

2. The Appell-type degenerate q-Bernoullli polynomials In this section, we define the Appell-type degenerate q-Bernoulli polynomials which are given by t 1 λ

q(1 + λt) − 1

ext =

∞ X

n

en,λ,q (x) t , B n! n=0

(2.1)

en,λ = when x = 0, the Appell-type degenerate degenerate Bernoulli numbers B e Bn,λ (0) are equal to the degenerate q-Bernoulli numbers. From (2.1), we have n   X n e Bm,λ,q xn−m . m m=0

(2.2)

d e en−1,λ,q (x), n ≥ 1. Bn,λ,q (x) = nB dx

(2.3)

em,λ,q (x) = B By (2.2), we obtain

From (2.3), we show that Z 1 en,λ,q (x)dx = B 0

Z 1 1 d e Bn+1,λ,q (x)dx n + 1 0 dx  1 e en+1,λ,q . = Bn+1,λ,q (1) − B n+1

758

(2.4)

JONGKYUM KWON ET AL 756-763

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

Jongkyum Kwon, Jin-Woo Park

We observe that Z 1 Z 1 n   X n e ne y Bn,λ,q (x + y)dy = Bn−m,λ,q (x) y n+m dy m 0 0 m=0 n   e X n Bn−m,λ,q (x) . = m n+m+1 m=0

(2.5)

On the other hand, we derive Z 1 Z 1 n   X n e ne y n (1 − y)m dy y Bn,λ,q (x + y)dy = Bn−m,λ,q (x + 1)(−1)m m 0 0 m=0 n   X n e Γ(n + 1)Γ(m + 1) = Bn−m,λ,q (x + 1)(−1)m Γ(n + m + 2) m m=0   n X n n! m! en−m,λ,q (x + 1)(−1)m B = . m (n + m + 1)! m=0 (2.6) Therefore, by (2.5) and (2.6), we obtain the following theorem. Theorem 2.1. For n ∈ N, we have n   e n   X X n Bn−m,λ,q (x) n e n! m! Bn−m,λ,q (x + 1)(−1)m = , m n + m + 1 m (n + m + 1)! m=0 m=0 when, x = 0,

 en−m,λ,q n B m=0 m n+m+1

Pn

=

Pn

n m=0 m

 en−m,λ,q (1)(−1)m n! m! . B (n+m+1)!

We also observe that Z 1 en,λ,q (x + y)dy yn B 0

Z 1 en,λ,q (x + 1) n B en−1,λ,q (x + y)dy − y n+1 B = n+1 n+1 0 en,λ,q (x + 1) en−1,λ,q (x + 1) B n B = − n+1 n+1 n+2 Z 1 n(n − 1) en−2,λ,q (x + y)dy + (−1)2 y n+2 B (n + 1)(n + 2) 0 en,λ,q (x + 1) nB en−1,λ,q (x + 1) en−2,λ,q (x + 1) B n(n − 1)B = − + (−1)2 n+1 (n + 1)(n + 2) (n + 1)(n + 2)(n + 3) Z 1 n(n − 1)(n − 2) en−3,λ,q (x + y)dy. + (−1)3 y n+3 B (n + 1)(n + 2)(n + 3) 0

759

(2.7)

JONGKYUM KWON ET AL 756-763

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A note on Appell-type degenerate q-Bernoulli polynomials and numbers

5

Continuing this process, we get Z 1 e1,λ,q (x + y)dy y 2n−1 B 0

Z 1 e1,λ,q (x + 1) B 1 e0,λ (x + y)dy = y 2n B − 2n 2n 0 e1,λ,q (x + 1) B 1 1 = − . 2n 2n 2n + 1

(2.8)

Therefore, by (2.7) and (2.8), we obtain the following theorem. Theorem 2.2. For n ∈ N, we have n   e n X X n Bn−m,λ,q (x) n(n − 1) · · · (n − m + 1) en−m,λ,q (x + 1). = (−1)m B n + m + 1 (n + 1)(n + 2) · · · (n + m) m m=0 m=0 For n ∈ N, we have Z 1 en,λ,q (x + y)dy yn B 0

Z 1 en+1,λ,q (x + 1) B n en+1,λ,q (x + y)dy = − y n−1 B n+1 n+1 0 Z en+2,λ,q (x + 1) en+1,λ,q (x + 1) n B n n − 1 1 n−2 e B − + (−1)2 y Bn+2,λ,q (x + y)dy = n+1 n+1 n+2 n+1n+2 0  Z 1 n+1  en+1,λ,q (x + 1) n X n+1 e B Bn+1−m,λ,q (x + 1)(−1)m − y n−l (1 − y)m dy = m n+1 n + 1 m=0 0  n+1  en+1,λ,q (x + 1) B n X n+1 e Bn+1−m,λ,q (x + 1)(−1)m B(n, m + 1), = − m n+1 n + 1 m=0 (2.9) where B(n, m + 1) is a beta function. Therefore, by (2.5) and (2.9), we obtain the following theorem. Theorem 2.3. For n ∈ N, we have n   e X n Bn−m,λ,q (x) m n+m+1 m=0  n+1  en+1,λ,q (x + 1) B n X n+1 e = − Bn+1−m,λ,q (x + 1)(−1)m B(n, m + 1). n+1 n + 1 m=0 m

760

JONGKYUM KWON ET AL 756-763

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

Jongkyum Kwon, Jin-Woo Park

Now, we observe that

1

Z

em,λ,q (x)B en,λ,q (x)dx B 0 n  X

 Z 1 m   X n e m e m−k = Bl,λ,q Bk,λ,q (1)(−1) xn−l (1 − x)m−k dx l k 0 l=0 k=0 (2.10) n X m    X n m ek,λ,q (1)B el,λ,q B(n − l + 1, m − k + 1) = (−1)m−k B l k l=0 k=0   n m X X n m ek,λ,q (1)B el,λ,q Γ(n − l + 1)Γ(m − k + 1) . = (−1)m−k B Γ(n + m − l − k + 2) l k l=0 k=0

On the other hand,

Z

1

em,λ,q (x)B en,λ,q (x)dx = B 0

n X m    e X en−l,λ,q n m Bm−k,λ,q B l=0 k=0

l

k

k+l+1

.

(2.11)

Therefore, by (2.10) and (2.11), we obtain the following theorem.

Theorem 2.4. For n ∈ N, we have

n X m    X n m l=0 k=0

=

l

k

ek,λ,q (1)B el,λ,q Γ(n − l + 1)Γ(m − k + 1) (−1)m−k B Γ(n + m − l − k + 2)

n X m    e X en−l,λ,q n m Bm−k,λ,q B l=0 k=0

l

k

k+l+1

761

.

JONGKYUM KWON ET AL 756-763

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A note on Appell-type degenerate q-Bernoulli polynomials and numbers

By replacing t by q(1 +

1 λt λ (e λt

7

− 1) in (2.1), we get

1 λ (e − 1) 1 λ λ1 (eλt − 1)) λ

1

−1

λt

ex λ (e

−1)

1 λt (e − 1) x (eλt −1) eλ =λ t qe − 1    λt  t e − 1  1 x(eλt −1)  = eλ qet − 1 λt  ! ∞ ! ∞ ∞ X tn X j tj  X x λm tm = Bn (x | q) Belm ( ) λ n! j! λ m! n=0 m=0 j=0 ! ∞ n X m    X X tn m n n−l x . = λ Bl (x | q)Beln−m ( ) λ n! l m n=0 m=0

(2.12)

l=0

On the other hand, ∞ ∞ ∞ X X X λn tn em,λ,q (x) 1 1 (eλt − 1)m = em,λ,q (x) 1 B B S2 (n, m) m m m! λ λ n=m n! m=0 m=0 ! ∞ n X X tn n−m e Bm,λ,q (x)λ S2 (n, m) = . n! n=0 m=0 (2.13) where S2 (n, m) is the Stirling numbers of the second kind. Therefore, by (2.12) and (2.13), we obtain the following theorem. Theorem 2.5. For n ∈ N, we have m    n X n X X m n n−l x n−m e λ Bl (x | q)Beln−m ( ). Bm,λ,q (x)λ S2 (n, m) = l m λ m=0 m=0 l=0

References 1. A. Bayad, T. Kim, Identities for the Bernoulli, the Euler and the Genocchi numbers and polynomials, Adv. Stud. Contemp. Math.(Kyungshang) 20 (2010), no. 2, 247-253. 2. L. Carlitz, q-Bernoulli numbers and polynomials, Duke Math.J. 15 (1948), 987-1000. 3. L. Carlitz, q-Bernoulli and Eulerian numbers, Trans. Amer. Math. Soc. 76 (1954), 332-350. 4. J. Choi, T. Kim, Y.H. Kim, A note on the extended q-Bernoulli numbers and polynomials, Adv. Stud. Contemp. Math.(Kyungshang) 21 (2011), no. 4, 351-354. 5. D.Ding, J. Yang, Some identites related to the Apostol-Euler and Apostol-Bernoulli polynomials, Adv. Stud. Contemp. Math.(Kyungshang) 20 (2010), no. 1, 7-21.

762

JONGKYUM KWON ET AL 756-763

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.4, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

Jongkyum Kwon, Jin-Woo Park

6. D.V. Dolgy, T. Kim,H.-I. Kwon, J.-J. Seo, On the modified degenerate Bernoulli polynomials, Adv. Stud. Contemp. Math.(Kyungshang) 26 (2016), no. 1, 1-9. 7. D. Kang, S.J.Lee, J.-W. Park, S.-H. Rim, On the twisted weak weight q-Bernoulli polynomials and numbers, Proc. Jangjeon Math. Soc. 16 (2013), no. 2, 195-201. 8. D. S. Kim, T. Kim, Some identities of symmetry for Carlitz q-Bernoulli polynomials invariant under S4 , Ars Combin. 123 (2015), 283-289. 9. D. S. Kim, T. Kim, Some identities of symmetry for q-Bernoulli polynomials under symmetric group of degree n, Ars Combin. 126 (2016), 435-441. 10. T. Kim, On p-adic q-Bernoulli numbers, J. korean Math. Soc. 37 2000, no. 1. 21-30. 11. T. Kim, q-Volkenborn intergration, Russ. J. Math. Phys. 9 2002, no. 3. 288-299. 12. T. Kim, q-Bernoulli numbers and polynomials associated with Gaussian binomial coefficients, Russ. J. Math. Phys. 15 2008, no. 1. 51-57. 13. T. Kim, On the weighted q-Bernoulli numbers and polynomials, Adv. Stud. Contemp. Math. 21 (2011), no. 2, 201-215. 14. T. Kim, Symmetric identities of degenerate Bernoulli polynomials, Proc. Jangjeon Math. Soc. 18 (2015), no. 4, 593-599. 15. T. Kim, On degenerate q-Bernoulli polynomials, Bull. korean Math. Soc. 53 2016, no. 4. 1149-1156. 16. T. Kim, D. S. Kim, H. I. Kwon, Some identites relating to degenerate Bernoulli polynomials , Filomat. 30 (2016), no.4, 905-912. 17. T. Kim, Y.-H. Kim, B. Lee, A note on Carlitz’s q-Bernoulli measure , J. Comput. Anal. Appl. 13 (2011), no.3, 590-595. 18. J.K. Kwon, S.-H.Rim, J.-W. Park, A note on the Appell-type Daehee polynomials, Glob. J. Pure and Appl. Math. 11 (2015), no.5, 2745-2753. 19. J.G. Lee, L.-C. Jang, J.-J. Seo, S.-K. Choi, H.I. Kwon, On Appell-type Changhee polynomials and numbers, Adv. Diff. Equ. 2016 (2016:160). 20. D.K. Lim, F. Qi, On the Appell type λ-Changhee polynomials, J. Nonlinear Sci. Appl. 9 (2016), 1872-1876. 21. J.-W. Park, New approach to q-Bernoulli polynomials with weight or weak weight, Adv. Stud. Contemp. Math. 24 (2014), no. 1, 39-44. 22. F. Qi, L.-C. Jang, H.I. Kwon Some new and explicit identities related with the Appell-type degenerate q-Changhee polynomials, Adv. Diff. Equ. 2016 (2016:180). 23. J.-J. Seo, S.-H. Rim, S.-H. Lee, D.V. Dolgy, T. Kim, q-Bernoulli numbers and polynomials related to p-adic invariant integral on Zp , Proc. Jangjeon Math. Soc. 16 (2013), no. 3, 321-326. 24. A. Sharma, q-Bernoulli and Euler numbers of higher order, Duke Math.J. 25 (1958), 343-353. Department of Mathematics Education and RINS, Gyeongsang National University, Jinju, Gyeongsangnamdo, 52828, Republic of Korea E-mail address: [email protected] 2,∗

Department of Mathematics Education, Daegu University, Gyeongsan-si, Kyungsangbukdo, 38453, Republic of Korea E-mail address: [email protected]

763

JONGKYUM KWON ET AL 756-763

764

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO. 4, 2019

Some companions of quasi Grüss type inequalities for complex functions defined on unit circle, Jian Zhu and Qiaoling Xue,……………………………………………………………………581 A fixed point approach to the stability of quadratic (𝜌𝜌1 , 𝜌𝜌2 )-functional inequalities, Sungsik Yun,…………………………………………………………………………………………..589 A comparison between Caputo and Canavati fractional derivatives, Ammar Khanfer,……..597 On the Asymptotic Behavior Of Some Nonlinear Difference Equations, A. M. Alotaibi, M. S. M. Noorani, and M. A. El-Moneam,…………………………………………………………….604 On sequential fractional differential equations with nonlocal integral boundary conditions, N.I. Mahmudov and M. Awadalla,………………………………………………………………..628 Bieberbach-de Branges and Fekete-Szegö inequalities for certain families of q-convex and qclose-to-convex functions, Om P. Ahuja, Asena Çetinkaya, Yaşar Polatoğlu,……………….639 Bilinear 𝜃𝜃-Type Calderón-Zygmund Operators on Non-homogeneous Generalized Morrey Spaces, Guanghui Lu and Shuangping Tao,……………………………………………………650 On Ulam-Hyers stability of decic functional equation in non-Archimedean spaces, Yali Ding, Tian-Zhou Xu, and John Michael Rassias,…………………………………………………….671 Existence of positive solution for fully third-order boundary value problems, Yongxiang Li and Elyasa Ibrahim,…………………………………………………………………………………678 Alghamdi et al. Iteration Scheme for Hemicontractive Operators in Arbitrary Banach Spaces, Shin Min Kang, Arif Rafiq, Young Chel Kwun, and Faisal Ali,………………………………697 Lyapunov-type inequalities for fractional differential equations under multi-point boundary conditions, Youyu Wang and Qichao Wang,…………………………………………………..707 On a new generalized integral-type operator from mixed-norm spaces to Bloch-type spaces, Fang Zhang and Yongmin Liu,………………………………………………………………………717 Conformal automorphisms for exact locally conformally callibrated 𝐺𝐺�2-structures, Mobeen Munir, Waqas Nazeer, Asma Ashraf, and Shin Min Kang,……………………………………728

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO. 4, 2019 (continued)

Fourier series of finite products of Bernoulli and Euler functions, Taekyun Kim, Dae San Kim, Dmitry V. Dolgy, and Jin-Woo Park,………………………………………………………738 A note on Appell-type degenerate q-Bernoulli polynomials and numbers, Jongkyum Kwon and Jin-Woo Park,……………………………………………………………………………….756

Volume 26, Number 5 ISSN:1521-1398 PRINT,1572-9206 ONLINE

May 2019

Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC

Journal of Computational Analysis and Applications ISSNno.’s:1521-1398 PRINT,1572-9206 ONLINE SCOPE OF THE JOURNAL An international publication of Eudoxus Press, LLC (fifteen times annually) Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152-3240, U.S.A [email protected] http://www.msci.memphis.edu/~ganastss/jocaaa The main purpose of "J.Computational Analysis and Applications" is to publish high quality research articles from all subareas of Computational Mathematical Analysis and its many potential applications and connections to other areas of Mathematical Sciences. Any paper whose approach and proofs are computational,using methods from Mathematical Analysis in the broadest sense is suitable and welcome for consideration in our journal, except from Applied Numerical Analysis articles. Also plain word articles without formulas and proofs are excluded. The list of possibly connected mathematical areas with this publication includes, but is not restricted to: Applied Analysis, Applied Functional Analysis, Approximation Theory, Asymptotic Analysis, Difference Equations, Differential Equations, Partial Differential Equations, Fourier Analysis, Fractals, Fuzzy Sets, Harmonic Analysis, Inequalities, Integral Equations, Measure Theory, Moment Theory, Neural Networks, Numerical Functional Analysis, Potential Theory, Probability Theory, Real and Complex Analysis, Signal Analysis, Special Functions, Splines, Stochastic Analysis, Stochastic Processes, Summability, Tomography, Wavelets, any combination of the above, e.t.c. "J.Computational Analysis and Applications" is a peer-reviewed Journal. See the instructions for preparation and submission of articles to JoCAAA. Assistant to the Editor: Dr.Razvan Mezei,[email protected], Madison,WI,USA.

Journal of Computational Analysis and Applications(JoCAAA) is published by EUDOXUS PRESS,LLC,1424 Beaver Trail Drive,Cordova,TN38016,USA,[email protected] http://www.eudoxuspress.com. Annual Subscription Prices:For USA and Canada,Institutional:Print $800, Electronic OPEN ACCESS. Individual:Print $400. For any other part of the world add $160 more(handling and postages) to the above prices for Print. No credit card payments. Copyright©2019 by Eudoxus Press,LLC,all rights reserved.JoCAAA is printed in USA. JoCAAA is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH. It is strictly prohibited the reproduction and transmission of any part of JoCAAA and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes no responsibility for the content of published papers.

768

Editorial Board Associate Editors of Journal of Computational Analysis and Applications Francesco Altomare Dipartimento di Matematica Universita' di Bari Via E.Orabona, 4 70125 Bari, ITALY Tel+39-080-5442690 office +39-080-3944046 home +39-080-5963612 Fax [email protected] Approximation Theory, Functional Analysis, Semigroups and Partial Differential Equations, Positive Operators.

Fractional Differential Equations Nonlinear Analysis, Fractional Dynamics Carlo Bardaro Dipartimento di Matematica e Informatica Universita di Perugia Via Vanvitelli 1 06123 Perugia, ITALY TEL+390755853822 +390755855034 FAX+390755855024 E-mail [email protected] Web site: http://www.unipg.it/~bardaro/ Functional Analysis and Approximation Theory, Signal Analysis, Measure Theory, Real Analysis.

Ravi P. Agarwal Department of Mathematics Texas A&M University - Kingsville 700 University Blvd. Kingsville, TX 78363-8202 tel: 361-593-2600 [email protected] Differential Equations, Difference Equations, Inequalities

Martin Bohner Department of Mathematics and Statistics, Missouri S&T Rolla, MO 65409-0020, USA [email protected] web.mst.edu/~bohner Difference equations, differential equations, dynamic equations on time scale, applications in economics, finance, biology.

George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis, TN 38152,U.S.A Tel.901-678-3144 e-mail: [email protected] Approximation Theory, Real Analysis, Wavelets, Neural Networks, Probability, Inequalities.

Jerry L. Bona Department of Mathematics The University of Illinois at Chicago 851 S. Morgan St. CS 249 Chicago, IL 60601 e-mail:[email protected] Partial Differential Equations, Fluid Dynamics

J. Marshall Ash Department of Mathematics De Paul University 2219 North Kenmore Ave. Chicago, IL 60614-3504 773-325-4216 e-mail: [email protected] Real and Harmonic Analysis

Luis A. Caffarelli Department of Mathematics The University of Texas at Austin Austin, Texas 78712-1082 512-471-3160 e-mail: [email protected] Partial Differential Equations George Cybenko Thayer School of Engineering

Dumitru Baleanu Department of Mathematics and Computer Sciences, Cankaya University, Faculty of Art and Sciences, 06530 Balgat, Ankara, Turkey, [email protected]

769

Dartmouth College 8000 Cummings Hall, Hanover, NH 03755-8000 603-646-3843 (X 3546 Secr.) e-mail:[email protected] Approximation Theory and Neural Networks

011-49-203-379-3542 e-mail: [email protected] Approximation Theory, Computer Aided Geometric Design John R. Graef Department of Mathematics University of Tennessee at Chattanooga Chattanooga, TN 37304 USA [email protected] Ordinary and functional differential equations, difference equations, impulsive systems, differential inclusions, dynamic equations on time scales, control theory and their applications

Sever S. Dragomir School of Computer Science and Mathematics, Victoria University, PO Box 14428, Melbourne City, MC 8001, AUSTRALIA Tel. +61 3 9688 4437 Fax +61 3 9688 4050 [email protected] Inequalities, Functional Analysis, Numerical Analysis, Approximations, Information Theory, Stochastics.

Weimin Han Department of Mathematics University of Iowa Iowa City, IA 52242-1419 319-335-0770 e-mail: [email protected] Numerical analysis, Finite element method, Numerical PDE, Variational inequalities, Computational mechanics

Oktay Duman TOBB University of Economics and Technology, Department of Mathematics, TR06530, Ankara, Turkey, [email protected] Classical Approximation Theory, Summability Theory, Statistical Convergence and its Applications

Tian-Xiao He Department of Mathematics and Computer Science P.O. Box 2900, Illinois Wesleyan University Bloomington, IL 61702-2900, USA Tel (309)556-3089 Fax (309)556-3864 [email protected] Approximations, Wavelet, Integration Theory, Numerical Analysis, Analytic Combinatorics

Saber N. Elaydi Department Of Mathematics Trinity University 715 Stadium Dr. San Antonio, TX 78212-7200 210-736-8246 e-mail: [email protected] Ordinary Differential Equations, Difference Equations

Margareta Heilmann Faculty of Mathematics and Natural Sciences, University of Wuppertal Gaußstraße 20 D-42119 Wuppertal, Germany, [email protected] Approximation Theory (Positive Linear Operators)

J .A. Goldstein Department of Mathematical Sciences The University of Memphis Memphis, TN 38152 901-678-3130 [email protected] Partial Differential Equations, Semigroups of Operators

Xing-Biao Hu Institute of Computational Mathematics AMSS, Chinese Academy of Sciences Beijing, 100190, CHINA [email protected]

H. H. Gonska Department of Mathematics University of Duisburg Duisburg, D-47048 Germany

770

Computational Mathematics Ram N. Mohapatra Department of Mathematics University of Central Florida Orlando, FL 32816-1364 tel.407-823-5080 [email protected] Real and Complex Analysis, Approximation Th., Fourier Analysis, Fuzzy Sets and Systems

Jong Kyu Kim Department of Mathematics Kyungnam University Masan Kyungnam,631-701,Korea Tel 82-(55)-249-2211 Fax 82-(55)-243-8609 [email protected] Nonlinear Functional Analysis, Variational Inequalities, Nonlinear Ergodic Theory, ODE, PDE, Functional Equations.

Gaston M. N'Guerekata Department of Mathematics Morgan State University Baltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'[email protected] [email protected] Nonlinear Evolution Equations, Abstract Harmonic Analysis, Fractional Differential Equations, Almost Periodicity & Almost Automorphy

Robert Kozma Department of Mathematical Sciences The University of Memphis Memphis, TN 38152, USA [email protected] Neural Networks, Reproducing Kernel Hilbert Spaces, Neural Percolation Theory Mustafa Kulenovic Department of Mathematics University of Rhode Island Kingston, RI 02881,USA [email protected] Differential and Difference Equations

M.Zuhair Nashed Department Of Mathematics University of Central Florida PO Box 161364 Orlando, FL 32816-1364 e-mail: [email protected] Inverse and Ill-Posed problems, Numerical Functional Analysis, Integral Equations, Optimization, Signal Analysis

Irena Lasiecka Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

Mubenga N. Nkashama Department OF Mathematics University of Alabama at Birmingham Birmingham, AL 35294-1170 205-934-2154 e-mail: [email protected] Ordinary Differential Equations, Partial Differential Equations

Burkhard Lenze Fachbereich Informatik Fachhochschule Dortmund University of Applied Sciences Postfach 105018 D-44047 Dortmund, Germany e-mail: [email protected] Real Networks, Fourier Analysis, Approximation Theory

Vassilis Papanicolaou Department of Mathematics National Technical University of Athens Zografou campus, 157 80 Athens, Greece tel:: +30(210) 772 1722 Fax +30(210) 772 1775 [email protected] Partial Differential Equations, Probability

Hrushikesh N. Mhaskar Department Of Mathematics California State University Los Angeles, CA 90032 626-914-7002 e-mail: [email protected] Orthogonal Polynomials, Approximation Theory, Splines, Wavelets, Neural Networks

771

Choonkil Park Department of Mathematics Hanyang University Seoul 133-791 S. Korea, [email protected] Functional Equations

Anfithea - Paleon Faliron GR-175 64 Athens, Greece [email protected] Numerical Analysis H. M. Srivastava Department of Mathematics and Statistics University of Victoria Victoria, British Columbia V8W 3R4 Canada tel.250-472-5313; office,250-4776960 home, fax 250-721-8962 [email protected] Real and Complex Analysis, Fractional Calculus and Appl., Integral Equations and Transforms, Higher Transcendental Functions and Appl.,q-Series and q-Polynomials, Analytic Number Th.

Svetlozar (Zari) Rachev, Professor of Finance, College of Business, and Director of Quantitative Finance Program, Department of Applied Mathematics & Statistics Stonybrook University 312 Harriman Hall, Stony Brook, NY 11794-3775 tel: +1-631-632-1998, [email protected] Alexander G. Ramm Mathematics Department Kansas State University Manhattan, KS 66506-2602 e-mail: [email protected] Inverse and Ill-posed Problems, Scattering Theory, Operator Theory, Theoretical Numerical Analysis, Wave Propagation, Signal Processing and Tomography

I. P. Stavroulakis Department of Mathematics University of Ioannina 451-10 Ioannina, Greece [email protected] Differential Equations Phone +3-065-109-8283

Tomasz Rychlik Polish Academy of Sciences Instytut Matematyczny PAN 00-956 Warszawa, skr. poczt. 21 ul. Śniadeckich 8 Poland [email protected] Mathematical Statistics, Probabilistic Inequalities

Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock, Germany [email protected] Numerical Fourier Analysis, Fourier Analysis, Harmonic Analysis, Signal Analysis, Spectral Methods, Wavelets, Splines, Approximation Theory

Boris Shekhtman Department of Mathematics University of South Florida Tampa, FL 33620, USA Tel 813-974-9710 [email protected] Approximation Theory, Banach spaces, Classical Analysis

Roberto Triggiani Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

T. E. Simos Department of Computer Science and Technology Faculty of Sciences and Technology University of Peloponnese GR-221 00 Tripolis, Greece Postal Address: 26 Menelaou St.

Juan J. Trujillo University of La Laguna Departamento de Analisis Matematico C/Astr.Fco.Sanchez s/n 38271. LaLaguna. Tenerife. SPAIN Tel/Fax 34-922-318209 [email protected]

772

Fractional: Differential EquationsOperators-Fourier Transforms, Special functions, Approximations, and Applications

Ahmed I. Zayed Department of Mathematical Sciences DePaul University 2320 N. Kenmore Ave. Chicago, IL 60614-3250 773-325-7808 e-mail: [email protected] Shannon sampling theory, Harmonic analysis and wavelets, Special functions and orthogonal polynomials, Integral transforms

Ram Verma International Publications 1200 Dallas Drive #824 Denton, TX 76205, USA [email protected] Applied Nonlinear Analysis, Numerical Analysis, Variational Inequalities, Optimization Theory, Computational Mathematics, Operator Theory

Ding-Xuan Zhou Department Of Mathematics City University of Hong Kong 83 Tat Chee Avenue Kowloon, Hong Kong 852-2788 9708,Fax:852-2788 8561 e-mail: [email protected] Approximation Theory, Spline functions, Wavelets

Xiang Ming Yu Department of Mathematical Sciences Southwest Missouri State University Springfield, MO 65804-0094 417-836-5931 [email protected] Classical Approximation Theory, Wavelets

Xin-long Zhou Fachbereich Mathematik, Fachgebiet Informatik Gerhard-Mercator-Universitat Duisburg Lotharstr.65, D-47048 Duisburg, Germany e-mail:[email protected] Fourier Analysis, Computer-Aided Geometric Design, Computational Complexity, Multivariate Approximation Theory, Approximation and Interpolation Theory

Xiao-Jun Yang State Key Laboratory for Geomechanics and Deep Underground Engineering, China University of Mining and Technology, Xuzhou 221116, China Local Fractional Calculus and Applications, Fractional Calculus and Applications, General Fractional Calculus and Applications, Variable-order Calculus and Applications, Viscoelasticity and Computational methods for Mathematical [email protected]

Jessada Tariboon Department of Mathematics, King Mongkut's University of Technology N. Bangkok 1518 Pracharat 1 Rd., Wongsawang, Bangsue, Bangkok, Thailand 10800 [email protected], Time scales, Differential/Difference Equations, Fractional Differential Equations

Richard A. Zalik Department of Mathematics Auburn University Auburn University, AL 36849-5310 USA. Tel 334-844-6557 office 678-642-8703 home Fax 334-844-6555 [email protected] Approximation Theory, Chebychev Systems, Wavelet Theory

773

Instructions to Contributors Journal of Computational Analysis and Applications An international publication of Eudoxus Press, LLC, of TN.

Editor in Chief: George Anastassiou Department of Mathematical Sciences University of Memphis Memphis, TN 38152-3240, U.S.A.

1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves.

2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.

774

4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corollaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,

775

name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990).

Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986.

Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495.

11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears.

15. This journal will consider for publication only papers that contain proofs for their listed results.

776

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Stability of a within-host Chikungunya virus dynamics model with latency Ahmed. M. Elaiw, Taofeek O. Alade and Saud M. Alsulami Department of Mathematics, Faculty of Science, King Abdulaziz University, P.O. Box 80203, Jeddah 21589, Saudi Arabia. Email: a m [email protected] (A. Elaiw) Abstract This paper studies the stability of a mathematical model for within-host Chikungunya virus (CHIKV) infection. The model incorporates (i) two types of infected monocytes, latently infected monocytes which do not generate CHIKV until they have been activated and actively infected monocytes, (ii) antibody immune response, and (iii) saturated incidence rate. We derive a biological threshold number R0 . Using the method of Lyapunov function, we established the global stability of the steady states of the model. We have proven that, when R0 ≤ 1, then Q0 is globally asymptotically stable and when R0 > 1, the endemic equilibrium Q1 is globally asymptotically stable. The theoretical results have been supported by numerical simulations. Keywords: Chikungunya virus infection; Latency; Lyapunov function; Global stability.

1

Introduction

In recent past, many mathematicians have been presented and developed mathematical models in order to describe the interaction between viruses (such as HIV, HCV, HBV, HTLV and Chikungunya virus) and human cells (see e.g. [1]-[22]) Mathematical models of human viruses can lead to develop antiviral drugs and to understand the virus-host interaction. Moreover it can help to predict the disease progression. Studying the stability analysis of the models is also important to understand the behavior of the virus. Chikungunya virus (CHIKV) is an alphavirus and is transmitted to humans by Aedes aegypti and Aedes albopictus mosquitos. In the CHIKV literature, most of the mathematical models have been presented to describe the disease transmission in mosquito and human populations (see e.g. [23]-[30]). However, only few works have devoted for mathematical modeling of the dynamics of the CHIKV within host. In 2017, Wang and Liu [22] have presented a mathematical model for in host CHIKV infection model as: S˙ = µ − dS − bSV, I˙ = bSV − I,

(1)

V˙ = mI − rV − qBV, B˙ = η + cBV − δB,

(3)

(2)

(4)

where S, I, V , and B are the concentrations of uninfected monocytes, infected monocytes, CHIKV particles and B cells, respectively. Parameters d and µ represent the death rate and birth rate constants of the uninfected monocytes, respectively. The uninfected monocytes become infected at rate bSV , where b is rate constant of the CHIKV-target incidence. The infected monocytes and free CHIKV particles die are rates I and rV ,

777

Elaiw ET AL 777-790

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

respectively. An actively infected monocytes produces an average number m of CHIKV particles. The CHIKV particles are attacked by the B cells at rate qV B. The B cells are produced at constant rate η, proliferated at rate cBV and die at rate δB. In system (1)-(4) it is assumed that when the CHIKV contacts the uninfected monocytes it becomes infected and viral producer in the same time. However, this is unrealistic assumption. Therefore our objective in the present paper is to incorporate such delay by adding latently infected monocytes as another compartment to model (1)-(4). Moreover, we replace the bilinear incidence by saturated incidence which is suitable to model the nonlinear dynamics of the CHIKV especially when its concentration is high. We investigate the nonnegativity and boundedness of the solutions of the CHIKV dynamics model. We show that the CHIKV dynamics is governed by one bifurcation parameter (the basic reproduction numbers R0 ).We use Lyapunov direct method to establish the global stability of the model’s steady states.

2

The CHIKV dynamics model

We cosider the following within-host CHIKV dynamics model with latently infected monocytes and saturated incidence rate: bSV , S˙ = µ − dS − 1 + πV bSV L˙ = (1 − p) − (θ + λ)L, 1 + πV bSV I˙ = p + λL − I, 1 + πV V˙ = mI − rV − qBV, B˙ = η + cBV − δB,

(5) (6) (7) (8) (9)

where L is the concentration of latently infected monocytes, while I is the concentration of the actively infected monocytes. A fraction (1 − p) of infected monocytes is assumed to be latently infected monocytes and the remaining p becomes actively infected monocytes, where 0 < p < 1. The latently infected monocytes are transmitted to actively infected monocytes at rate λL and die at rate θL.

3

Properties of solutions

The nonnegativity and boundedness of the solutions of model (5)-(9) are established in the following lemma: Lemma 1. There exist M1 , M2 , M3 > 0, such that the following compact set is positively invariant for system (5)-(9) Φ = {(S, L, I, V, B) ∈ R5≥0 : 0 ≤ S, L, I ≤ M1 , 0 ≤ V ≤ M2 , 0 ≤ B ≤ M3 } Proof. Since S˙ = µ > 0, S=0 bSV =p I˙ + λL ≥ 0 for all S, V.L ≥ 0, 1 + πV I=0 B˙ = η > 0.

L˙ V˙

= (1 − p) L=0

bSV ≥ 0 for all S, V ≥ 0, 1 + πV

= mI ≥ 0 for all I ≥ 0,

V =0

B=0

Then, R5≥0 = {(x1 , x2 , ..., x5 , ) ∈ R, xi ≥ 0, i = 1, 2, ..., 5} is positively invariant for system (5)-(9).

778

Elaiw ET AL 777-790

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

We consider T1 (t) = S(t) + L(t) + I(t), q T2 (t) = V (t) + B(t), c

(10)

then from Eqs. (5)-(9) we get T˙1 (t) = µ − dS − θL − I ≤ µ − σ1 T1 where σ1 = min{d, θ, }. Hence T1 (t) ≤ M1 , if T1 (0) ≤ M1 , where M1 = σµ1 . The non-negativity of S(t), L(t) and I(t) implies that 0 ≤ S(t), L(t), I(t) ≤ M1 if 0 ≤ S(0) + L(0) + I(0) ≤ M1 . Moreover, we have δq q q q q T˙2 (t) = mI − rV + η − B ≤ mM1 + η − σ2 (V + B) = mM1 + η − σ2 T2 , c c c c c mM + q η

1 c where σ2 = min{r, δ}. Hence T2 (t) ≤ M2 , if T2 (0) ≤ M2 , where M2 = . We have V (t) ≥ 0 and B(t) ≥ 0, σ2 q 2 therefore, 0 ≤ V (t) ≤ M2 and 0 ≤ B(t) ≤ M3 if 0 ≤ V (0) + c B(0) ≤ M2 , where M3 = cM q .

3.1

Steady States

System (5)-(9) always admits a virus-free steady state Q0 = (S0 , L0 , I0 , V0 , B0 ) = ( µd , 0, 0, 0, ηδ ). To calculate the other steady states we let the R.H.S of system (5)-(9) be equal zero bSV , 1 + πV bSV 0 = (1 − p) − (θ + λ)L, 1 + πV pbSV + λL − I, 0= 1 + πV 0 = mI − rV − qV B, 0 = µ − dS −

(11) (12) (13) (14)

0 = η + cBV − δB.

(15)

From Eq. (11)-(15) we obtain S=

µ (1 + πV ) (1 − p)bSV bSV (λ + θp) η , L= , I= , B= . bV + d (1 + πV ) (1 + πV ) (θ + λ)  (1 + πV ) (θ + λ) δ − cV

Substituting Eq. (16) into Eq. (14) we have   mpbµ mλ(1 − p)bµ qη + −r− V = 0. (bV + d (1 + πV )) (bV + d (1 + πV )) (θ + λ) δ − cV If V 6= 0, then P1 V 2 − P2 V + P3 = 0, where P1 = rc(θ + λ)(b + πd), P2 = −rcd(θ + λ) + mbµc(λ + θp) + (rδ) (θ + λ)(b + πd) + (qη)(θ + λ)(b + πd), P3 = mbµδ(λ + θp) − d (rδ + qη) (θ + λ).

779

Elaiw ET AL 777-790

(16)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

P1 , P2 and P3 can be re-written as: P1 = (rc) (θ + λ)(b + πd), cd (rδ + qη) (θ + λ) (R0 − 1) + (rδ) (θ + λ)(b + πd) + (qη)(θ + λ)(b + πd) δ cd (qη) (θ + λ) + , δ P3 = d (rδ + qη) (θ + λ)(R0 − 1),

P2 =

where R0 =

bmδµ(λ + θp) . d(rδ + qη)(θ + λ)

Let F (V ) = P1 V 2 − P2 V + P3 = 0.

(17)

If R0 > 1, then we have F (0) = d (rδ + qη) (θ + λ)(R0 − 1) > 0,     (b + πd)δ δ = −(qη)(θ + λ) + d < 0, F c c 

cd (rδ + qη) (θ + λ) (1 − R0 ) − (rδ) (θ + λ)(b + πd) − (qη)(θ + λ)(b + πd) − F (0) = δ 0

Then, Eq. (17) has two positive roots p P2 − P22 − 4P1 P3 δ V1 = < 2P1 c

and V2 =

P2 +

cd (qη) (θ + λ) δ

 < 0.

p P22 − 4P1 P3 δ > . 2P1 c

η If V = V2 , then from Eq. (16) we get B2 = δ−cV < 0. Thus, if R0 > 1, then system (5)-(9) has a unique 2 endemic steady state Q1 = (S1 , L1 , I1 , V1 , B1 ), where

µ (1 + πV1 ) (1 − p)bµV1 (λ + θp)bµV1 , L1 = , I1 = , bV1 + d (1 + πV1 ) (θ + λ)(bV1 + d (1 + πV1 )) (θ + λ)(bV1 + d (1 + πV1 )) p P2 − P22 − 4P1 P3 η V1 = , B1 = . 2P1 δ − cV1

S1 =

Therefore, R0 represents the basic reproduction number of system (5)-(9). Clearly Q0 ∈ Φ. From Eqs. (11)-(13) we have dS1 + θL1 + I1 = µ. ⇒ S1
0 and H(1) = 0. Theorem 1. Suppose that R0 ≤ 1, then Q0 is globally asymptotically stable (GAS) in Φ. Proof. Construct a Lyapunov function W0 as:     S λ θ+λ (θ + λ) q(θ + λ) B W0 (S, L, I, V, B) = S0 H + L+ I+ V + B0 H . S0 λ + θp λ + θp m(λ + θp) mc(λ + θp) B0

(18)

dW0 Note that, W0 (S, L, I, V, B) > 0 for all S, L, I, V, B > 0 and W0 (S0 , 0, 0, 0, B0 ) = 0. Calculating along the dt trajectories of (5)-(9) we get      dW0 S0 bSV λ bSV = 1− µ − dS − + (1 − p) − (θ + λ)L dt S 1 + πV λ + θp 1 + πV   (θ + λ) θ+λ pbSV + λL − I + (mI − rV − qV B) + λ + θp 1 + πV m(λ + θp)   q(θ + λ) B0 + 1− (η + cBV − δB) mc(λ + θp) B   (S − S0 )2 bS0 V (θ + λ)rV (θ + λ)qB0 V q(θ + λ) B0 = −d + − − + 1− (δB0 − δB) S 1 + πV m(λ + θp) m(λ + θp) mc(λ + θp) B   q(θ + λ)δ (B − B0 )2 (rδ + qη)(θ + λ) bmδµ(λ + θp) (S − S0 )2 − + −1 V = −d S mc(λ + θp) B mδ(λ + θp) d(rδ + qη)(θ + λ)(1 + πV ) q(θ + λ)δ (B − B0 )2 (rδ + qη)(θ + λ)R0 πV 2 (rδ + qη)(θ + λ) (S − S0 )2 − − + (R0 − 1)V. = −d S mc(λ + θp) B mδ(λ + θp)(1 + πV ) mδ(λ + θp) (19) dW0 dW0 ≤ 0 holds if R0 ≤ 1. Furthermore, = 0 if and only if S = S0 , B = B0 , V = 0. The solutions dt dt dW0 of system (5)-(9) converge to Γ, the largest invariant set of {(S, L, I, V, B) : = 0}. For any element in Γ dt ˙ satisfies V (t) = V (t) = 0. Then from Eq. (8) we have I(t) = 0, and from Eq. (7) we get L(t) = 0. By the

Therefore,

LaSalle’s invariance principle, Q0 is GAS.  Theorem 2. Suppose that R0 > 1, then Q1 is GAS in ˚ Φ. Proof. Construct a Lyapunov function       S λ L θ+λ I W1 (S, L, I, V, B) = S1 H + L1 H + I1 H S1 λ + θp L1 λ + θp I1     (θ + λ) V q(θ + λ) B + V1 H + B1 H . m(λ + θp) V1 mc(λ + θp) B1 dW1 We have W1 (S, L, I, V, B) > 0 for all S, L, I, V, B > 0 and W1 (S1 , L1 , I1 , V1 , B1 ) = 0. Calculating along dt the trajectories of (5)-(9) we get       dW1 S1 bSV λ L1 bSV = 1− µ − dS − + 1− (1 − p) − (θ + λ)L dt S 1 + πV λ + θp L 1 + πV      θ+λ I1 pbSV (θ + λ) V1 1− + λL − I + 1− (mI − rV − qV B) + λ + θp I 1 + πV m(λ + θp) V   q(θ + λ) B1 + 1− (η + cBV − δB) . (20) mc(λ + θp) B

781

Elaiw ET AL 777-790

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Applying µ = dS1 +

bS1 V1 , η = δB1 − cB1 V1 , 1 + πV1

we obtain    S1 bS1 V1 S1 bS1 V λ(1 − p)bSV L1 1− (dS1 − dS) + 1− + − S 1 + πV1 S 1 + πV (λ + θp)(1 + πV )L (θ + λ)pbSV I1 λ(θ + λ)LI1 (θ + λ)I1 (θ + λ)IV1 λ(θ + λ)L1 − − + − + (λ + θp) (λ + θp)(1 + πV )I (λ + θp)I (λ + θp) (λ + θp)V   r(θ + λ)V r(θ + λ)V1 q(θ + λ)BV1 q(θ + λ) B1 − + + + 1− (δB1 − δB) m(λ + θp) m(λ + θp) m(λ + θp) mc(λ + θp) B   q(θ + λ)B1 V q(θ + λ)B1 V1 q(θ + λ)B1 V1 B1 − − + . m(λ + θp) m(λ + θp) m(λ + θp) B

dW1 = dt



Using the steady state conditions for Q1 : (1 − p)

bS1 V1 pbS1 V1 = (θ + λ)L1 , + λL1 = I1 , mI1 = rV1 + qB1 V1 , 1 + πV1 1 + πV1

we get bS1 V1 (θ + λ) pbS1 V1 λ(1 − p) bS1 V1 (θ + λ)I1 = + , = (λ + θp) 1 + πV1 (λ + θp) (1 + πV1 ) (λ + θp) (1 + πV1 ) bS1 V1 r(θ + λ)V1 q(θ + λ)B1 V1 = − . m(λ + θp) 1 + πV1 m(λ + θp) and     (S − S1 )2 λ(1 − p) bS1 V1 dW1 S1 (θ + λ) pbS1 V1 S1 = −d + 1− + 1− dt S (λ + θp) (1 + πV1 ) S (λ + θp) (1 + πV1 ) S   bS1 V1 (1 + πV1 )V V λ(1 − p) bS1 V1 SV L1 (1 + πV1 ) + − − 1 + πV1 (1 + πV )V1 V1 (λ + θp) 1 + πV1 S1 V1 L(1 + πV ) λ(1 − p) bS1 V1 (θ + λ) pbS1 V1 SV I1 (1 + πV1 ) λ(1 − p) bS1 V1 I1 L + − − (λ + θp) (1 + πV1 ) (λ + θp) 1 + πV1 S1 V1 I(1 + πV ) (λ + θp) 1 + πV1 L1 I λ(1 − p) bS1 V1 (θ + λ) pbS1 V1 λ(1 − p) bS1 V1 IV1 + + − (λ + θp) (1 + πV1 ) (λ + θp) (1 + πV1 ) (λ + θp) 1 + πV1 I1 V (θ + λ) pbS1 V1 IV1 λ(1 − p) bS1 V1 (θ + λ) pbS1 V1 − + + (λ + θp) 1 + πV1 I1 V (λ + θp) (1 + πV1 ) (λ + θp) (1 + πV1 )   q(θ + λ)BV1 q(θ + λ)B1 V1 B1 q(θ + λ)δ (B − B1 )2 2q(θ + λ)B1 V1 − + + − . m(λ + θp) m(λ + θp) m(λ + θp) B mc(λ + θp) B Eq. Eq.(21) can be simplified as   dW1 (S − S1 )2 bS1 V1 (1 + πV1 )V V 1 + πV = −d + −1 + − + dt S 1 + πV1 (1 + πV )V1 V1 1 + πV1   λ(1 − p) bS1 V1 S1 (1 + πV1 )SV L1 I1 L IV1 1 + πV + 5− − − − − (λ + θp) (1 + πV1 ) S (1 + πV )S1 V1 L L1 I I1 V 1 + πV1   S1 (1 + πV1 )SV I1 IV1 1 + πV (θ + λ) pbS1 V1 + 4− − − − (λ + θp) (1 + πV1 ) S (1 + πV )S1 V1 I I1 V 1 + πV1   q(θ + λ)δ (B − B1 )2 q(θ + λ)B1 V1 B B1 − 2− , − − mc(λ + θp) B m(λ + θp) B1 B

782

Elaiw ET AL 777-790

(21)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

and then q(θ + λ)η (B − B1 )2 dW1 (S − S1 )2 πbS1 (V − V1 )2 − = −d − 2 dt S (1 + πV )(1 + πV1 ) mc(λ + θp)B1 B   λ(1 − p) bS1 V1 S1 (1 + πV1 )SV L1 LI1 IV1 1 + πV + 5− − − − − (λ + θp) (1 + πV1 ) S (1 + πV )S1 V1 L L1 I I1 V 1 + πV1   (θ + λ) pbS1 V1 S1 (1 + πV1 )SV I1 IV1 1 + πV + 4− − − − . (λ + θp) (1 + πV1 ) S (1 + πV )S1 V1 I I1 V 1 + πV1

(22)

The relation between the geometrical mean and the arithmetical mean implies that S1 (1 + πV1 )SV L1 LI1 IV1 1 + πV + + + + , S (1 + πV )S1 V1 L L1 I I1 V 1 + πV1 (1 + πV1 )SV I1 IV1 1 + πV S1 + + + . 4≤ S (1 + πV )S1 V1 I I1 V 1 + πV1 5≤

dW1 dW1 ≤ 0 and = 0 if and only if S = S1 , L = L1 , I = I1 , V = V1 and B = B1 . It follows from dt dt LaSalle’s invariance principle, Q1 is GAS in ˚ Φ. 

Then

4

Numerical simulations

In order to illustrate our theoretical results, we perform numerical simulations for system (5)-(9) with parameters values given in Table 1. In the figures we show the evolution of the five states of the system S, L, I, V and B. We have used MATLAB for all computations. • Effect of b on the stability of steady states: To show the global stability results we consider three different initial conditions as: IC1: S(0) = 2.0, L(0) = 0.2, I(0) = 0.4, V (0) = 0.4 and B(0) = 1.0, IC2: S(0) = 1.7, L(0) = 0.4, I(0) = 0.6, V (0) = 0.6 and B(0) = 1.6, IC3: S(0) = 1.4, L(0) = 0.6, I(0) = 0.8, V (0) = 0.8 and B(0) = 2.4. We fix the value p = 0.5 and consider two sets of the values of parameter b as follows: Set (I): We choose b = 0.1. Using these data, we compute R0 = 0.5469 < 1, then the system has one steady state Q0 . From Figures 1-5 we can see that, the concentrations of the uninfected monocytes and B cells return to their values S0 = µd = 2.2885 and B0 = ηδ = 1.1207, respectively. On the other hand, the concentrations of latently infected monocytes, actively infected monocytes and CHIKV particles are decaying and approaching zero for all the three initial conditions IC1-IC3. It means that, Q0 is GAS and the CHIKV will be removed. This result support the result of Theorem 1. Set (II): We take b = 0.5. Then, we calculate R0 = 2.7347 > 1. Then the system has two positive steady states Q0 and Q1 . It is clear from Figures 1-5 that, both the numerical results and the theoretical results given in Theorem 2 are consistent. It is seen that, the solutions of the system converge to the steady state Q1 = (1.67881, 0.405396, 0.638994, 0.6152, 2.77721) for all the three initial conditions IC1-IC3.

783

Elaiw ET AL 777-790

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Table 1: The value of the parameters of model (5)-(9). Parameter

Value

Parameter

Parameter

µ

1.826

m

2.02

π

varied

q

0.5964

c

1.2129

r

0.4418

d

0.79791

η

1.402

θ

0.5

δ

1.251

λ

0.1

b

varied



0.4441

p

varied

2.3 Set (I) 2.2 2.1

Uninfected monocytes

2 1.9 1.8 1.7 Set (II) 1.6 1.5 1.4 1.3 0

5

10

15

20

25

30

35

Time

Figure 1: The Evolution of uninfected monocytes. • Effect of the saturation infection on the CHIKV dynamics In this case, we fix the values p = 0.5 and b = 0.5. We note that, the value of R0 does not depend on the value of the saturation parameter π. This means that, saturation can play a significant role in reducing the infection progress but do not play a role in clearing the CHIKV from the body. The simulation were performed using the initial condition IC2. Figures 6-10 show the effect of saturation infection. We observe that, as π is increased, the incidence rate of infection is decreased, and then the concentration of the uninfected monocytes are increased, while the concentrations of latently infected monocytes, actively infected monocytes, free CHIKV particles and B cells are decreased. • Effect of p on the basic reproduction number: In this case we take π = 0.1 and b = 0.3. From Figure 11, we can observed that as p is increased then R0 is increased. Let pcr be the critical value of the parameter p, such that R0 =

bmδµ(θpcr + λ) = 1. d(rδ + qη)(θ + λ)

Using the data given in Table 1 we obtain pcr = 0.226612, and we get the following: (i) 0 < p ≤ 0.226612. Then the trajectory of the system will converge to Q0 and this will suppress the CHIKV replication and clear the CHIKV from the body.

784

Elaiw ET AL 777-790

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

0.7

0.6

Latently infected monocytes

0.5 Set (II) 0.4

0.3

0.2

0.1 Set (I) 0 0

5

10

15

20

25

30

35

Time

Figure 2: The Evolution of latently infected monocytes.

0.8

Actively infected monocytes

0.7

Set(II)

0.6 0.5 0.4 0.3 0.2 0.1 Set(I) 0 0

10

20

30

40

50

Time

Figure 3: The Evolution of actively infected monocytes.

Vir_1-eps Figure 4: The Evolution of free CHIKV particles.

785

Elaiw ET AL 777-790

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

3.5

3 Set (II)

B cells

2.5

2

1.5 Set (I) 1 0

5

10

15

20

25

30

35

Time

Figure 5: The Evolution of B cells.

2.3 2.2 π=5.0

Uninfected monocytes

2.1 π=2.0 2 π=1.0 1.9 π=0.5 1.8 1.7 π=0.0 1.6 1.5 0

10

20

30

40

50

Time

Figure 6: The concentration of uninfected monocytes.

0.5

Latently infected monocytes

0.45

π=0.0

0.4 0.35

π=0.5

0.3 π=1.0 0.25 0.2

π=2.0

0.15 π=5.0

0.1 0.05 0

10

20

30

40

50

Time

Figure 7: The concentration of latently infected monocytes.

786

Elaiw ET AL 777-790

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

0.8 π=0.0

Actively infected monocytes

0.7 0.6

π=0.5 0.5 π=1.0 0.4 0.3

π=2.0

0.2

π=5.0

0.1 0

10

20

30

40

50

Time

Figure 8: The concentration of actively infected monocytes.

0.9

Free CHIKV particles

0.8 0.7 π=0.0 0.6 π=0.5 0.5

π=1.0

0.4

π=2.0

0.3 π=5.0 0.2 0

10

20

30

40

50

Time

Figure 9: The concentration of free CHIKV particles.

3 π=0.0 2.8 2.6 π=0.5

B cells

2.4 2.2

π=1.0

2 π=2.0

1.8 1.6

π=5.0 1.4 0

10

20

30

40

50

Time

Figure 10: The concentration of B cells.

787

Elaiw ET AL 777-790

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

3

2.5 E0 E

R0

2

1

is unstable is stable

1.5 R0=1

1

0.5

0 0

E0 E1 0.2

is stable does not exits 0.4

0.6

0.8

1

p

Figure 11: Effect of p on the basic reproduction number. (ii) 0.226612 < p < 1. Then the trajectory will converge to Q1 and then the infection will be chronic. It means that, the factor 1 − p plays the role of a controller which can be applied to stabilize the system around Q0 . From a biological point of view, the factor 1 − p plays a similar role as the drug dose of antiviral treatment which can be used to eliminate the CHIKV. We observe that, sufficiently small p will suppress the CHIKV replication and clear the CHIKV. This gives us some suggestions on new drugs to decrease the fraction p.

5

Acknowledgment

This article was funded by the Deanship of Scientific Research (DSR) at King Abdulaziz University, Jeddah. The authors, therefore, acknowledge with thanks DSR for technical and financial support.

References [1] M. A. Nowak and C. R. M. Bangham, Population dynamics of immune responses to persistent viruses, Science, 272 (1996) 74-79. [2] A. M. Elaiw, A. A. Raezah and A. S. Alofi, Stability of delay-distributed virus dynamics model with cell-tocell transmission and CTL immune response, Journal of Computational Analysis and Applications, 25(8) (2018), 1518-1531. [3] A. M. Elaiw, A. M. Althiabi, M. A. Alghamdi and N. Bellomo, Dynamical behavior of a general HIV-1 infection model with HAART and cellular reservoirs, Journal of Computational Analysis and Applications, 24(4) (2018), 728-743. [4] C. Connell McCluskey, Y. Yang, Global stability of a diffusive virus dynamics model with general incidence function and time delay, Nonlinear Analysis: Real World Applications, 25 (2015), 64-78. [5] S. Liu, and L. Wang, Global stability of an HIV-1 model with distributed intracellular delays and a combination therapy, Mathematical Biosciences and Engineering, 7(3) (2010), 675-685. [6] X. Li and S. Fu, Global stability of a virus dynamics model with intracellular delay and CTL immune response, Mathematical Methods in the Applied Sciences, 38 (2015), 420-430.

788

Elaiw ET AL 777-790

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[7] A. M. Elaiw and S.A. Azoz, Global properties of a class of HIV infection models with Beddington-DeAngelis functional response, Mathematical Methods in the Applied Sciences, 36 (2013), 383-394. [8] A. M. Elaiw, Global properties of a class of HIV models, Nonlinear Analysis: Real World Applications, 11 (2010), 2253-2263. [9] A. M. Elaiw, and N. A. Almuallem, Global dynamics of delay-distributed HIV infection models with differential drug efficacy in cocirculating target cells, Mathematical Methods in the Applied Sciences, 39 (2016), 4-31. [10] G. Huang, Y. Takeuchi and W. Ma, Lyapunov functionals for delay differential equations model of viral infections, SIAM J. Appl. Math., 70(7) (2010), 2693-2708. [11] B. Li, Y. Chen, X. Lu and S. Liu, A delayed HIV-1 model with virus waning term, Mathematical Biosciences and Engineering, 13 (2016), 135-157. [12] D. Huang, X. Zhang, Y. Guo, and H. Wang, Analysis of an HIV infection model with treatments and delayed immune response, Applied Mathematical Modelling, 40(4) (2016), 3081-3089. [13] K. Wang, A. Fan, and A. Torres, Global properties of an improved hepatitis B virus model, Nonlinear Analysis: Real World Applications, 11 (2010), 3131-3138. [14] C. Monica and M. Pitchaimani, Analysis of stability and Hopf bifurcation for HIV-1 dynamics with PI and three intracellular delays, Nonlinear Analysis: Real World Applications, 27 (2016), 55-69. [15] A. U. Neumann, N. P. Lam, H. Dahari, D. R. Gretch, T. E. Wiley, T. J, Layden, and A. S. Perelson, Hepatitis C viral dynamics in vivo and the antiviral efficacy of interferon-alpha therapy, Science, 282 (1998), 103-107. [16] L. Wang, M. Y. Li, and D. Kirschner, Mathematical analysis of the global dynamics of a model for HTLV-I infection and ATL progression, Mathematical Biosciences, 179 (2002) 207-217. [17] X. Shi, X. Zhou, and X. Son, Dynamical behavior of a delay virus dynamics model with CTL immune response, Nonlinear Analysis: Real World Applications, 11 (2010), 1795-1809. [18] H. Shu, L. Wang and J. Watmough, Global stability of a nonlinear viral infection model with infinitely distributed intracellular delays and CTL imune responses, SIAM Journal of Applied Mathematics, 73(3) (2013), 1280-1302. [19] J. Wang, J. Lang, X. Zou, Analysis of an age structured HIV infection model with virus-to-cell infection and cell-to-cell transmission, Nonlinear Analysis: Real World Applications, 34 (2017), 75-96. [20] A. M. Elaiw and N. H. AlShamrani, Global stability of humoral immunity virus dynamics models with nonlinear infection rate and removal, Nonlinear Analysis: Real World Applications, 26, (2015), 161-190. [21] A. M. Elaiw and N. H. AlShamrani, Stability of a general delay-distributed virus dynamics model with multi-staged infected progression and immune response, Mathematical Methods in the Applied Sciences, 40(3) (2017), 699-719. [22] Y. Wang, X. Liu, Stability and Hopf bifurcation of a within-host chikungunya virus infection model with two delays, Mathematics and Computers in Simulation, 138 (2017), 31-48.

789

Elaiw ET AL 777-790

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[23] Y. Dumont, F. Chiroleu, Vector control for the chikungunya disease, Mathematical Biosciences and Engineering, 7 (2010), 313-345. [24] Y. Dumont, J. M. Tchuenche, Mathematical studies on the sterile insect technique for the chikungunya disease and aedes albopictus, Journal of Mathematical Biology 65(5) (2012), 809-854. [25] Y. Dumont, F. Chiroleu, C. Domerg, On a temporal model for the chikungunya disease: modeling, theory and numerics, Mathematical Biosciences, 213, (2008), 80-91. [26] D. Moulay, M. Aziz-Alaoui, M.Cadivel, The chikungunya disease: modeling, vector and transmission global dynamics, Mathematical Biosciences, 229 (2011) 50-63. [27] D. Moulay, M. Aziz-Alaoui, H. D. Kwon, Optimal control of chikungunya disease: larvae reduction, treatment and prevention, Mathematical Biosciences and Engineering, 9 (2012), 369-392. [28] C. A. Manore, K. S. Hickmann, S. Xu, H. J. Wearing, J. M. Hyman, Comparing dengue and chikungunya emergence and endemic transmission in A. aegypti and A. albopictus, Journal of Theoretical Biology 356 (2014), 174-191. [29] L. Yakob, A.C. Clements, A mathematical model of chikungunya dynamics and control: the major epidemic on Reunion Island, PLoS One, 8 (2013), e57448. [30] X. Liu, and P. Stechlinski, Application of control strategies to a seasonal model of chikungunya disease, Applied Mathematical Modelling, 39 (2015), 3194-3220.

790

Elaiw ET AL 777-790

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Quotient B-algebras induced by an int-soft normal subalgebra Jeong Soon Han1 and Sun Shin Ahn2,∗ 1 2

Department of Applied Mathematics, Hanyang Uiversity, Ansan, 15588, Korea

Department of Mathematics Education, Dongguk University, Seoul 04620, Korea

Abstract. The notions of an intersectional soft subalgebra and an intersectional soft normal subalgebra of a B-algebra are introduced, and related properties are investigated. A quotient structure of a B-algebra using an intersectional soft normal subalgebra is constructed. The fundamental homomorphism of a quotient B-algebra is established.

1. Introduction Molodtsov [11] introduced the concept of soft set as a new mathematical tool for dealing with uncertainties that is free from the difficulties that have troubled the usual theoretical approaches. Molodtsov pointed out several directions for the applications of soft sets. Worldwide, there has been a rapid growth in interest in soft set theory and its applications in recent years. Evidence of this can be found in the increasing number of high-quality articles on soft sets and related topics that have been published in a variety of international journals, symposia, workshops, and international conferences in recent years. Maji et al. [10] described the application of soft set theory to a decision making problem. Jun [5] discussed the union soft sets with applications in BCK/BCI-algebras. We refer the reader to the papers [3, 4, 14] for further information regarding algebraic structures/properties of soft set theory. On the while, Y. B. Jun, E. H. Roh and H. S. Kim [6] introduced a new notion, called a BH-algebra. J. Neggers and H. S. Kim [12] introduced a new notion, called a B-algebra. C. B. Kim and H. S. Kim [8] introduced the notion of a BG-algebra which is a generalization of B-algebras. S. S. Ahn and H. D. Lee [1] classified the subalgebras by their family of level subalgebras in BG-algebras. In this paper, we discuss applications of the an intersectional soft set in a (normal) subalgebra of a B-algebra. We introduce the notion of an intersectional (normal) soft subalgebra of a B-algebra, and investigated related properties. We consider a new construction of a quotient B-algebra induced by an int-soft normal subalgebra. Also we establish the fundamental homomorphism of a quotient B-algebra. 2. Preliminaries 0

2010 Mathematics Subject Classification: 06F35; 03G25; 06D72. Keywords: γ-inclusive set, int-soft (normal) subalgebra, B-algebra. The corresponding author. Tel: +82 2 2260 3410, Fax: +82 2 2266 3409 0 E-mail: [email protected] (J. S. Han); [email protected] (S. S. Ahn) 0



791

Jeong Soon Han ET AL 791-802

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Jeong Soon Han and Sun Shin Ahn

A B-algebra ([12]) is a non-empty set X with a constant 0 and a binary operation “∗” satisfying axioms: (B1) x ∗ x = 0, (B2) x ∗ 0 = x, (B) (x ∗ y) ∗ z = x ∗ (z ∗ (0 ∗ y)) for any x, y, z in X. For brevity we call X a B-algebra. In X we can define a binary relation “ ≤ ” by x ≤ y if and only if x ∗ y = 0. An algebra (X; ∗, 0) of type (2, 0) is called a BH-algebra if it satisfies (B1), (B2) and (BH) x ∗ y = y ∗ x = 0 imply x = y for any x, y ∈ X. An algebra (X; ∗, 0) of type (2, 0) is called a BG-algebra if it satisfies (B1), (B2) and (BG) (x ∗ y) ∗ (0 ∗ y) = x for any x, y ∈ X. Proposition 2.1.([2, 12]) Let (X; ∗, 0) be a B-algebra. Then (i) (ii) (iii) (iv) (v)

the left cancellation law holds in X, i.e., x ∗ y = x ∗ z implies y = z, if x ∗ y = 0, then x = y for any x, y ∈ X, if 0 ∗ x = 0 ∗ y, then x = y for any x, y ∈ X, 0 ∗ (0 ∗ x) = x, for all x ∈ X, x ∗ (y ∗ z) = (x ∗ (0 ∗ z)) ∗ y for all x, y, z ∈ X.

Theorem 2.2.([8]) If (X; ∗, 0) is a B-algebra, then it is a BG-algebra. Proposition 2.3.([8]) Every BG-algebra is a BH-algebra. Let (X; ∗X , 0X ) and (Y ; ∗Y , 0Y ) be B-algebras. A mapping φ : X → Y is called a homomorphism if φ(x ∗X y) = φ(x) ∗Y φ(y) for any x, y ∈ X. A homomorphism φ : X → Y is called an isomorphism if φ is a bijection, and denote it by X ∼ = Y . Let φ : X → Y be a homomorphism. Then the subset {x ∈ X|φ(x) = 0Y } of X is called the kernel of the homomorphism φ, and denote it by Ker φ. A non-empty subset S of X is called a subalgebra of X if x ∗ y ∈ S for any x, y ∈ X. A non-empty subset N of X is said to be normal if (x ∗ a) ∗ (y ∗ b) ∈ N for any x ∗ y, a ∗ b ∈ N . Then any normal subset N of a B-algebra X is a subalgebra of X, but the converse need not be true ([13]). A non-empty subset X of a B-algebra X is a called a normal subalgebra of X if it is both a subalgebra and normal. Let X be a B-algebra and let N be a normal subalgebra of X. Define a relation ∼N on X by x ∼N y if and only if x ∗ y ∈ N , where x, y ∈ X. Then it is a congruence relation on X ([13]). Denote the equivalence class containing x by [x]N , i.e., [x]N := {y ∈ X|x ∼N y} and let X/N := {[x]N |x ∈ X}.

792

Jeong Soon Han ET AL 791-802

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Quotient B-algebras induced by an int-soft normal subalgebra

Theorem 2.4.([13]) Let N be a normal subalgebra of a B-algebra X. Then X/N is a B-algebra. The B-algebra X/N is discussed in Theorem 2.4 is called the quotient B-algebra of X by N . Theorem 2.5.([13]) Let N be a normal subalgebra of a B-algebra X. Then the mapping γ : X → X/N given by γ(x) := [x]N is a surjective homomorphism, and Kerγ = N . Theorem 2.6.([13]) Let φ : X → Y be a homomorphism of B-algebras. Then Kerφ is a normal subalgebra of X. Theorem 2.7.([13]) Let φ : X → Y be a homomorphism of B-algebras. Then X/Kerφ ∼ = Imφ. ∼ In particular, if φ is surjective, then X/Kerφ = Y . Molodtsov [12] defined the soft set in the following way: Let U be an initial universe set and let E be a set of parameters. We say that the pair (U, E) is a soft universe. Let P(U ) denotes the power set of U and A, B, C, · · · ⊆ E. A fair (f˜, A) is called a soft set over U , where f˜ is a mapping given by f˜ : X → P(U ). In other words, a soft set over U is parameterized family of subsets of the universe U . For ε ∈ A, f˜(ε) may be considered as the set of ε-approximate elements of the set (f˜, A). A soft set over U can be represented by the set of ordered pairs: (f˜, A) = {(x, f˜(x))|x ∈ A, f˜(x) ∈ P(U )}, where f˜ : X → P(U ) such that f˜(x) = ∅ if x ∈ / A. Clearly, a soft set is not a set. ˜ For a soft set (f , A) of X and a subset γ of U , the γ-inclusive set of (f˜, A), defined to be the set iA (f˜; γ) := {x ∈ A|γ ⊆ f˜(x)}. 3. Int-soft subalgebra In what follows let X denote a B-algebra X unless otherwise specified. Definition 3.1. A soft set (f˜, X) over U is called an intersectional soft subalgebra (briefly, int-soft subalgebra) of a B-algebra X if it satisfies: (3.1) f˜(x) ∩ f˜(y) ⊆ f˜(x ∗ y) for all x, y ∈ X. Proposition 3.2. Every int-soft subalgebra (f˜, X) of a B-algebra X satisfies the following inclusion: (3.2) f˜(x) ⊆ f˜(0) for all x ∈ X. Proof. Using (3.1) and (B1), we have f˜(x) = f˜(x) ∩ f˜(x) ⊆ f˜(x ∗ x) = f˜(0) for all x ∈ X.

793

Jeong Soon Han ET AL 791-802



J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Jeong Soon Han and Sun Shin Ahn

Example 3.3. Let (U = Z, X) where X table: ∗ 0 1 2 3

= {0, 1, 2, 3} is a B-algebra ([9]) with the following 0 0 1 2 3

1 2 0 3 1

2 1 3 0 2

3 3 2 1 0

Let (f˜, X) be a soft set over U defined as follows:   Z if x = 0, f˜ : X → P(U ), x 7→ 3Z if x = 3,  9Z if x ∈ {1, 2}. It is easy to check that (f˜, X) is an int-soft subalgebra over U . Theorem 3.4. A soft set (f˜, X) of a B-algebra X over U is an int-soft subalgebra of X over U if and only if the γ-inclusive set iX (f˜; γ) is a subalgebra of X for all γ ∈ P(U ) with iX (f˜; γ) ̸= ∅. Proof. Assume that (f˜, X) is an int-soft subalgebra over U . Let x, y ∈ X and γ ∈ P(U ) be such that x, y ∈ iX (f˜; γ). Then γ ⊆ f˜(x) and γ ⊆ f˜(y). It follows from (3.1) that γ ⊆ f˜(x) ∩ f˜(y) ⊆ f˜(x ∗ y) Hence x ∗ y ∈ iX (f˜; γ). Thus iX (f˜; γ) is a subalgebra of X. Conversely, suppose that iX (f˜; γ) is a subalgebra X for all γ ∈ P(U ) with iX (; γ) ̸= ∅. Let x, y ∈ X, be such that f˜(x) = γx and f˜(y) = γy . Take γ = γx ∩ γy . Then x, y ∈ iX (f˜; γ) and so x ∗ y ∈ iX (f˜; γ) by assumption. Hence f˜(x) ∩ f˜(y) = γx ∩ γy = γ ⊆ f˜(x ∗ y). Thus (f˜, X) is an int-soft subalgebra over U . □ Theorem 3.5. Every subalgebra of a B-algebra can be represented as a γ-inclusive set of an int-soft subalgebra. Proof. Let A be a subalgebra of a B-algebra X. For a subset γ of U , define a soft set (f˜, X) over U by { γ if x ∈ A, ˜ f : X → P(U ), x 7→ ∅ if x ∈ / A. Obviously, A = iX (f˜; γ). We now prove that (f˜; γ) is an int-soft subalgebra over U . Let x, y ∈ X. If x, y ∈ A, then x ∗ y ∈ A because A is a subalgebra of X. Hence f˜(x) = f˜(y) = f˜(x ∗ y) = γ, and so f˜(x) ∩ f˜(y) ⊆ f˜(x ∗ y). If x ∈ A and y ∈ / A, then f˜(x) = γ and f˜(y) = ∅ which imply that f˜(x) ∩ f˜(y) = γ ∩ ∅ = ∅ ⊆ f˜(x ∗ y). Similarly, if x ∈ / A and y ∈ A, then f˜(x) ∩ f˜(y) ⊆ f˜(x ∗ y). Obviously, if x ∈ / A and y ∈ / A, then f˜(x) ∩ f˜(y) ⊆ f˜(x ∗ y). Therefore (f˜, X) is an int-soft subalgebra over U . □

794

Jeong Soon Han ET AL 791-802

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Quotient B-algebras induced by an int-soft normal subalgebra

Any subalgebra of a B-algebra X may not be represented as a γ-inclusive set of an int-soft subalgebra (f˜, X) over U in general (see Example 3.6). Example 3.6. Let E = X be the set of parameters, and let U = X be the initial universe set where X = {0, 1, 2, 3} is a B-algebra with the following table: ∗ 0 1 2 3

0 0 1 2 3

1 1 0 3 2

2 2 3 0 1

3 3 2 1 0

Consider a soft set (f˜, X) which is given by { f˜ : X → P(U ), x 7→

{0, 2} if x = 0, {2} if x ∈ {1, 2, 3}.

It is easy to show that (f˜, X) is an int-soft subalgebra over U . The γ-inclusive set of (f˜, X) are described as follows:   if γ ∈ {∅, {2}},  X ˜ iX (f ; γ) = {0} if γ ∈ {{0}, {0, 2}},   ∅ otherwise. The subalgebra {0, 1} cannot be a γ-inclusive set iX (f˜; γ) since there is no γ ⊆ U such that iX (f˜; γ) = {0, 1}. Definition 3.7. A soft set (f˜, X) over U is said to be intersectional soft normal (briefly, int-soft normal) of a B-algebra X if it satisfies: (3.3) f˜(x ∗ y) ∩ f˜(a ∗ b) ⊆ f˜((x ∗ a) ∗ (y ∗ b)) for all x, y, a, b ∈ X. A soft set (f˜, X) over U is called an intersectional soft normal subalgebra (briefly, int-soft normal subalgebra) of a B-algebra X if it satisfies (3.1) and (3.3). Example 3.8. Let (U = Z, X) where X = {0, 1, 2, 3} is a B-algebra as in Example 3.3. Let (f˜, X) be a soft set over U defined as follows: { f˜ : X → P(U ), x 7→

Z if x ∈ {0, 3}, 7Z if x ∈ {1, 2}.

It is easy to check that (f˜, X) is int-soft normal over U . Proposition 3.9. Every int-soft normal (f˜, X) of a B-algebra X is an int-soft subalgebra of X.

795

Jeong Soon Han ET AL 791-802

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Jeong Soon Han and Sun Shin Ahn

Proof. Put y := 0, b := 0 and a := y in (3.3). Then f˜(x ∗ 0) ∩ f˜(y ∗ 0) ⊆ f˜((x ∗ y) ∗ (0 ∗ 0)) for any x, y ∈ X. Using (B2) and (B1), we have f˜(x) ∩ f˜(y) ⊆ f˜(x ∗ y). Hence (f˜, X) is an int-soft subalgebra of X. □ The converse of Proposition 3.9 may not be true in general (see Example 3.10). Example 3.10. Let E = X be the set of parameters, and let U = X be the initial universe set, where X = {0, 1, 2, 3, 4, 5} is a B-algebra ([13]) with the following table: ∗ 0 1 2 3 4 5

0 0 1 2 3 4 5

1 2 0 1 4 5 3

2 1 2 0 5 3 4

3 3 4 5 0 1 2

4 4 5 3 2 0 1

5 5 3 4 1 2 0

Let (f˜, X) be a soft set over U defined as follows:   γ3 if x = 0, ˜ f : X → P(U ), x 7→ γ if x = 5,  2 γ1 if x ∈ {1, 2, 3, 4}. where γ1 , γ2 and γ3 are subsets of U with γ1 ⊊ γ2 ⊊ γ3 . It is easy to check that (f˜, X) is an int-soft subalgebra over U . But it is not int-soft normal over U since f˜(1 ∗ 4) ∩ f˜(3 ∗ 2) = f˜(5) ∩ f˜(5) = γ2 ⊈ γ1 = f˜(1) = f˜((1 ∗ 3) ∗ (4 ∗ 2)). Theorem 3.11. A soft set (f˜, X) of a B-algebra X over U is an int-soft normal subalgebra of X over U if and only if the γ-inclusive set iX (f˜; γ) is a normal subalgebra of X for all γ ∈ P(U ) with iX (f˜; γ) ̸= ∅. □

Proof. Similar to Theorem 3.4.

Proposition 3.12. Let a soft set (f˜, X) over U of a B-algebra X be int-soft normal. Then f˜(x ∗ y) = f˜(y ∗ x) for any x, y ∈ X. Proof. Let x, y ∈ X. By (B1) and (B2), we have f˜(x∗y) = f˜((x∗y)∗(x∗x)) ⊇ f˜(x∗x)∩ f˜(y ∗x) = f˜(0) ∩ f˜(y ∗ x) = f˜(y ∗ x). Interchanging x with y, we obtain f˜(y ∗ x) ⊇ f˜(x ∗ y), which proves the proposition. □ Theorem 3.13. Let (f˜, X) be an int-soft normal subalgebra of a B-algebra X. Then the set Xf˜ = {x ∈ X|f˜(x) = f˜(0)} is a normal subalgebra of X.

796

Jeong Soon Han ET AL 791-802

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Quotient B-algebras induced by an int-soft normal subalgebra

Proof. It is sufficient to show that Xf˜ is normal. Let a, b, x, y ∈ X be such that x ∗ y ∈ Xf˜ and a ∗ b ∈ Xf˜. Then f˜(x ∗ y) = f˜(0) = f˜(a ∗ b). Since (f˜, X) is an int-soft normal subalgebra of X, we have f˜((x ∗ a) ∗ (y ∗ b)) ⊇ f˜(x ∗ y) ∩ f˜(a ∗ b) = f˜(0). Using (3.2), we conclude that f˜((x ∗ a) ∗ (y ∗ b)) = f˜(0). Hence (x ∗ a) ∗ (y ∗ b) ∈ Xf˜. This completes the proof. □ Theorem 3.14. The intersection of any set of an int-soft normal subalgebra of a B-algebra X is also an int-soft normal subalgebra. Proof. Let {f˜α |α ∈ Λ} be a family of int-soft normal subalgebras of a B-algebra X and let a, b, x, y ∈ X. Then ∩α∈Λ f˜α ((x ∗ a) ∗ (y ∗ b)) = inf f˜α ((x ∗ a) ∗ (y ∗ b)) α∈Λ

≥ inf {f˜α (x ∗ y) ∩ f˜α (a ∗ b)} α∈Λ

=[ inf f˜α (x ∗ y)] ∩ [ inf f˜α (a ∗ b)] α∈Λ

α∈Λ

=((∩α∈Λ f˜α )(x ∗ y)) ∩ ((∩α∈Λ f˜α )(a ∗ b)) which shows that ∩α∈Λ f˜α is int-soft normal. By Proposition 3.9, ∩α∈Λ f˜α is an int-soft normal subalgebra of X. □ The union of any set of int-soft normal subalgebra of a B-algebra X need not be an int-soft normal subalgebra of X. Example 3.15. Let X := {0, 1, 2, 3, 4, 5} be a B-algebra as in Example 3.10. Let (f˜, X) and (˜ g , X) be soft sets over U := Z defined as follows: { f˜ : X → P(U ), x 7→ and

{ g˜ : X → P(U ), x 7→

Z if x ∈ {0, 4}, 7Z if x ∈ {1, 2, 3, 5}, Z if x ∈ {0, 5}, 2Z if x ∈ {1, 2, 3, 4}.

It is easy to check that (f˜, X) and (˜ g , X) are int-soft subalgebras over U . But f˜ ∪ g˜ is not an int-soft subalgebra of X because (f˜ ∪ g˜)(4) ∩ (f˜ ∪ g˜)(5) =(f˜(4) ∪ g˜(4)) ∩ (f˜(5) ∪ g˜(5)) =(Z ∪ 2Z) ∩ (7Z ∪ Z) = Z ⊈7Z ∪ 2Z = f˜(2) ∪ g˜(2) =(f˜ ∪ g˜)(2) = (f˜ ∪ g˜)(4 ∗ 5).

797

Jeong Soon Han ET AL 791-802

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Jeong Soon Han and Sun Shin Ahn

Since every int-soft normal of a B-algebra X is an int-soft subalgebra of X, the union of int-soft normal subalgebra need not be an int-soft normal subalgebra of a B-algebra. 4. Quotient B-algebras induced by an int-soft normal subalgebra Let (f˜, X) be an int-soft normal subalgebra of a B-algebra X. For any x, y ∈ X, we define a ˜ binary operation “ ∼f ” on X as follows: ˜ x ∼f y ⇔ f˜(x ∗ y) = f˜(0). ˜

Lemma 4.1. The operation “ ∼f ” is an equivalence relation on a B-algebra X. ˜ Proof. Obviously, it is reflexive. Let x ∼f y. Then f˜(x ∗ y) = f˜(0). It follows from Proposition ˜ ˜ 3.12 that f˜(0) = f˜(x ∗ y) = f˜(y ∗ x). Hence ∼f is symmetric. Let x, y, z ∈ X be such that x ∼f y ˜ and y ∼f z. Then f˜(x ∗ y) = f˜(0) and f˜(y ∗ z) = f˜(0). Using Proposition 3.12, (3.3), (B1), (B2) and (3.2), we have

f˜(0) = f˜(x ∗ y)∩f˜(y ∗ z) = f˜(x ∗ y) ∩ f˜(z ∗ y) ⊆f˜((x ∗ z) ∗ (y ∗ y)) =f˜((x ∗ z) ∗ 0) = f˜(x ∗ z) ⊆ f˜(0). ˜

˜

Hence f˜(x ∗ z) = f˜(0), i.e., ∼f is transitive. Therefore “ ∼f ” is an equivalence relation on X. □ ˜

˜

˜

Lemma 4.2. For any x, y, p, q ∈ X, if x ∼f y and p ∼f q, then x ∗ p ∼f y ∗ q. ˜ ˜ Proof. Let x, y, p, q ∈ X be such that x ∼f y and p ∼f q. Then f˜(x ∗ y) = f˜(y ∗ x) = f˜(0) and f˜(p ∗ q) = f˜(q ∗ p) = f˜(0). Using (3.3) and (3.2), we have

f˜(0) =f˜(x ∗ y) ∩ f˜(p ∗ q) ⊆f˜((x ∗ p) ∗ (y ∗ q)) ⊆ f˜(0). Hence f˜((x ∗ p) ∗ (y ∗ q)) = f˜(0). By similar way, we get f˜((y ∗ q) ∗ (x ∗ p)) = f˜(0). Therefore ˜ ˜ x ∗ p ∼f y ∗ q. Thus “ ∼f ” is a congruence relation on X. □ Denote by f˜x and X/f˜ the equivalent class containing x and the set of all equivalent classes of X, respectively, i.e., ˜ f˜x := {y ∈ X|y ∼f x} and X/f˜ := {f˜x |x ∈ X}. Define a binary relation • on X/f˜ as follows: f˜x • f˜y := f˜x∗y for all f˜x , f˜y ∈ X/f˜. Then this operation is well-defined by Lemma 4.2. Theorem 4.3. If (f˜, X) is an int-soft normal subalgebra of a B-algebra X, then the quotient X/f˜ := (X/f˜, •, f˜0 ) is a B-algebra.

798

Jeong Soon Han ET AL 791-802

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Quotient B-algebras induced by an int-soft normal subalgebra



Proof. Straightforward.

Proposition 4.4. Let µ : X → Y be a homomorphism of B-algebras. If (f˜, Y ) is an int-soft normal subalgebra of Y , then (f˜ ◦ µ, X) is an int-soft normal subalgebra of X. Proof. For any x, y, a, b ∈ X, we have (f˜ ◦ µ)((x ∗ a) ∗ (y ∗ b)) =f˜(µ((x ∗ a) ∗ (y ∗ b))) =f˜((µ(x) ∗ µ(a)) ∗ (µ(y) ∗ µ(b))) ⊇f˜(µ(x) ∗ µ(y)) ∩ f˜(µ(a) ∗ µ(b)) =f˜(µ(x ∗ y)) ∩ f˜(µ(a ∗ b)) =(f˜ ◦ µ)(x ∗ y) ∩ (f˜ ◦ µ)(a ∗ b). Hence f˜ ◦ µ is int-soft normal. By Proposition 3.9, (f˜ ◦ µ, X) is an int-soft normal subalgebra of X. □ Proposition 4.5. Let (f˜, X) be an int-soft normal subalgebra of a B-algebra X. The mapping γ : X → X/f˜, given by γ(x) := f˜x , is a surjective homomorphism, and Kerγ = {x ∈ X|γ(x) = f˜0 } = Xf˜. Proof. Let f˜x ∈ X/f˜. Then there exists an element x ∈ X such that γ(x) = f˜x . Hence γ is surjective. For any x, y ∈ X, we have γ(x ∗ y) = f˜x∗y = f˜x • f˜y = γ(x) • γ(y). ˜ Thus γ is a homomorphism. Moreover, Ker γ = {x ∈ X|γ(x) = f˜0 } = {x ∈ X|x ∼f 0} = {x ∈ X|f˜(x) = f˜(0)} = Xf˜. □

Example 4.6. Let E = X be the set of parameters, and let U := Z be the initial universe set where X = {0, 1, 2, 3} is a B-algebra ([7]) with the following table: ∗ 0 1 2 3

0 0 1 2 3

1 1 0 1 2

2 2 3 0 1

3 3 2 3 0

Let (f˜, X) be a soft set over U := Z defined as follows: { f˜ : X → P(U ), x 7→

Z if x ∈ {0, 2}, 5Z if x ∈ {1, 3}.

˜ It is easy to show that Xf˜ = {x ∈ X|f˜(x) = f˜(0)} = {0, 2}. Define x ∼f y if and only if ˜ f˜(x ∗ y) = f˜(0). Then f˜0 = {x ∈ X|x ∼f 0} = {x ∈ X|f˜(x ∗ 0) = f˜(0)} = {0, 2} and f˜1 = {x ∈

799

Jeong Soon Han ET AL 791-802

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Jeong Soon Han and Sun Shin Ahn ˜ X|x ∼f 1} = {x ∈ X|f˜(x∗1) = f˜(0)} = {1, 3} Hence X/f˜ = {f˜0 , f˜1 }. Let φ : X → X/f˜ be a map defined by φ(0) = φ(2) = f˜0 and φ(1) = φ(3) = f˜1 . It is easy to check that φ is a homomorphism ˜ and Kerφ = {x ∈ X|φ(x) = f˜0 } = {x ∈ X|x ∼f 0} = {x ∈ X|f˜(x) = f˜(0)} = Xf˜.

Theorem 4.7. Let X := (X; ∗X , 0X ) be a B-algebra and Y := (Y ; ∗Y , 0Y ) be a B-algebra and let µ : X → Y be an epimorphism. If (f˜, Y ) is an int-soft normal subalgebra of Y , then the quotient algebra X/(f˜ ◦ µ) := (X/(f˜ ◦ µ), •X , (f˜ ◦ µ)0X ) is isomorphic to the quotient algebra Y /f˜ := (Y /f˜, •Y , f˜0Y ). Proof. By Theorem 4.3 and Proposition 4.4, X/f˜ ◦ µ : (X/(f˜ ◦ µ), •X , (f˜ ◦ µ)0X ) is a B-algebra and Y /f˜ := (Y /f˜, •Y , f˜0Y ) is a B-algebra. Define a map η : X/(f˜ ◦ µ) → Y /f˜, (f˜ ◦ µ)x 7→ f˜µ(x) for all x ∈ X. Then the function η is well-defined. In fact, assume that (f˜ ◦ µ)x = (f˜ ◦ µ)y for all x, y ∈ X. Then we have f˜(µ(x) ∗Y µ(y)) =f˜(µ(x ∗X y)) = (f˜ ◦ µ)(x ∗X y) =(f˜ ◦ µ)(0X ) = f˜(µ(0X )) = f˜(0Y ). Hence f˜µ(x) = f˜µ(y) , by Proposition 2.1(ii). For any (f˜ ◦ µ)x , (f˜ ◦ µ)y ∈ X/(f˜ ◦ µ), we have η((f˜ ◦ µ)x •X (f˜ ◦ µ)y ) =η((f˜ ◦ µ)x∗y ) = f˜µ(x∗X y) =f˜µ(x)∗ µ(y) = f˜µ(x) • f˜µ(y) Y

=η((f˜ ◦ µ)x ) •Y η((f˜ ◦ µ)y )). Therefore η is a homomorphism. Let f˜a ∈ Y /f˜. Then there exists x ∈ X such that µ(x) = a since µ is surjective. Hence η((f˜ ◦ µ)x ) = f˜µ(x) = f˜a and so η is surjective. Let x, y ∈ X be such that f˜µ(x) = f˜µ(y) . Then we have (f˜ ◦ µ)(x ∗X y) =f˜(µ(x ∗X y)) = f˜(µ(x) ∗Y µ(y)) =f˜(0Y ) = f˜(µ(0X )) = (f˜ ◦ µ)(0X ). It follows that (f˜ ◦ µ)x = (f˜ ◦ µ)y . Thus η is injective. This completes the proof.



The homomorphism π : X → X/f˜, x → f˜X , is called the natural homomorphism of X onto X/f˜. In Theorem 4.7, if we define natural homomorphisms πX : X → X/f˜◦ µ and πY : Y → Y /f˜ then it is easy to show that η ◦ πX = πY ◦ µ, i.e., the following diagram commutes.

800

Jeong Soon Han ET AL 791-802

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Quotient B-algebras induced by an int-soft normal subalgebra

X   πX y

µ

−−−→

Y   πY y

η X/(f˜ ◦ µ) −−−→ Y /f˜.

Proposition 4.8. Let a soft set (f˜, X) over U of a B-algebra X be an int-soft normal subalgebra of X. If J is a normal subalgebra of X, then J/f˜ is a normal subalgebra of X/f˜. Proof. Let a soft set (f˜, X) over U of a B-algebra X be an int-soft normal subalgebra of X and let J be a normal subalgebra of X. Then for any x, y ∈ J, x ∗ y ∈ J. Let f˜x , f˜y ∈ J/f˜. Then f˜x • f˜y = f˜x∗y ∈ J/f˜. Hence J/f˜ = {f˜x |x ∈ J} is a subalgebra of X/f˜. For any x ∗ y, a ∗ b ∈ J, (x ∗ a) ∗ (y ∗ b) ∈ J, so for any f˜x • f˜y , f˜a • f˜b ∈ J/f˜, we have (f˜x • f˜a ) • (f˜y • f˜b ) = f˜x∗a • f˜y∗b = f˜(x∗a)∗(y∗b) ∈ J/f˜. Thus J/f˜ is a normal subalgebra of X/f˜. □ Theorem 4.9. If J ∗ is a normal subalgebra of a B-algebra X/f˜, then there exists a normal subalgebra J = {x ∈ X|f˜x ∈ J ∗ } in X such that J/f˜ = J ∗ . Proof. Since J ∗ is a normal subalgebra of X/f˜, so f˜x • f˜y = f˜x∗y ∈ J ∗ for any f˜x , f˜y ∈ J ∗ . Thus x ∗ y ∈ J for any x, y ∈ J. And f˜x∗a • f˜y∗b = f˜(x∗a)∗(y∗b) ∈ J ∗ for any f˜x∗y , f˜a∗b ∈ J ∗ . Thus (x ∗ a) ∗ (y ∗ b) ∈ J for any x ∗ y, a ∗ b ∈ J. Therefore J is a normal subalgebra of X. By Proposition 4.5, we have J/f˜ ={f˜j |j ∈ J} ˜ ={f˜j |∃f˜x ∈ J ∗ such that j ∼f x} ={f˜j |∃f˜x ∈ J ∗ such that f˜x = f˜j } ={f˜j |f˜j ∈ J ∗ } = J ∗ .

□ Theorem 4.10. Let a soft set (f˜, X) over U be an int-soft normal subalgebra of a B-algebra X. X/f˜ ∼ If J is a normal subalgebra of X, then = X/J. J/f˜ X/f˜ X/f˜ = {[f˜x ]J/f˜|f˜x ∈ X/f˜}. If we define φ : → X/J by φ([f˜x ]J/f˜) = ˜ ˜ J/f J/f [x]J = {y ∈ X|x ∼J y}, then it is well defined. In fact, suppose that [f˜x ]J/f˜ = [f˜y ]J/f˜. Then ˜ f˜x ∼J/f f˜y and so f˜x∗y = f˜x • f˜y ∈ J/f˜. Hence x ∗ y ∈ J. Therefore x ∼J y, i.e., [x]J = [y]J . Proof. Note that

801

Jeong Soon Han ET AL 791-802

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Jeong Soon Han and Sun Shin Ahn

Given [f˜x ]J/f˜, [f˜y ]J/f˜ ∈

X/f˜ , we have J/f˜ φ([f˜x ] ˜ • [f˜y ] J/f

J/f˜)

=φ([f˜x • f˜y ]J/f˜) =[x ∗ y]J = [x]J ∗ [y]J =φ([f˜x ]J/f˜) ∗ φ([f˜y ]J/f˜).

Hence φ is a homomorphism. Obviously, φ is onto. Finally, we show that φ is one-to-one. If φ([f˜x ]J/f˜) = φ([f˜y ]J/f˜), then ˜ [x]J = [y]J , i.e., x ∼J y. If f˜a ∈ [f˜x ]J/f˜, then f˜a ∼J/f f˜x and hence f˜a∗x ∈ J/f˜. It follows that a ∗ x ∈ J, i.e., a ∼J x. Since ∼J is an equivalence relation, a ∼J y and so Ja = Jy . Hence ˜ a ∗ y ∈ J and so f˜a∗y ∈ J/f˜. Therefore f˜a ∼J/f f˜y . Hence f˜a ∈ [f˜y ]J/f˜. Thus [f˜x ]J/f˜ ⊆ [f˜y ]J/f˜. Similarly, we obtain [f˜y ]J/f˜ ⊆ [f˜x ]J/f˜. Therefore [f˜x ]J/f˜ = [f˜y ]J/f˜. It is completes the proof. □ References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14]

S. S. Ahn and H. D. Lee, Fuzzy subalgebras of BG-algebras, Comm. Kore. Math. Soc. 19 (2004), 243-251. J. R. Cho and H. S. Kim, On B-algebras and Related Systems, 8(2001), 1-6. F. Feng, Y. B. Jun and X. Zhao, Soft semirings, Comput. Math. Appl. 56 (2008) 2621-2628. Y. B. Jun, Soft BCK/BCI-algebras, Comput. Math. Appl. 56 (2008) 1408-1413. Y. B. Jun, Union soft sets with applications in BCK/BCI-algebras, Bull. Korean Math. Soc. 50 (2013), 1937-1956. Y. B. Jun, E. H. Roh and H. S. Kim, On BH-algebras, Sci. Mathematica 1 (1998), 347-354. Y. B. Jun, E. H. Roh and H. S. Kim, On fuzzy B-algebras, Czech. Math. J. 52 (2002), 375-384. C. B. Kim and H. S. Kim, On BG-algebras, Demon. Math. 41 (2008), 497-505. Y. H. Kim and S. J. Yeom, Qutient B-algebras via fuzzy normal B-algebras, Honam Math. J. 30 (2008), 21-32. P. K. Maji, A. R. Roy and R. Biswas, An application of soft sets in a decision making problem, Comput. Math. Appl. 44 (2002) 1077-1083. D. Molodtsov, Soft set theory - First results, Comput. Math. Appl. 37 (1999) 19-31. J. Neggers and H. S. Kim, On B-algebras, Mate. Vesnik 54(2002), 21-29. J. Neggers and H. S. Kim, A fundamental theorem of B-homomorphism for B-algebras, Intern. Math. J. 2(2002), 207-214. K. S. Yang and S. S. Ahn, Union soft q-ideals in BCI-algebras, Applied Mathematical Scineces 8(2014), 2859-2869.

802

Jeong Soon Han ET AL 791-802

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Fixed point theorems for rational type contractions in partially ordered S-metric spaces Mi Zhou1,∗ , Xiao-lan Liu2∗, A.H. Arsari3 , B. Damjanovi´c4 , Yeol Je Cho5,6

Abstract: In this paper, we develop some fixed point theorems by using auxiliary functions for maps satisfying a rational type contractive condition in partially ordered S−metric spaces. Conditions for uniqueness of fixed point are also discussed. Our results generalize some existing results in the literature of S-metric spaces. MSC: 47H10; 54H25. Keywords: Fixed point; rational type contraction; partially ordered set; S-metric space

1.

Introduction and Preliminaries

Fixed point theory is one of the most powerful and most important tools in nonlinear analysis and applied sciences. Its core subject is concerned with the conditions for the existence of one or more fixed points of a mapping T from a nonempty set X into itself, that is, to find a point x ∈ X such that T x = x. In 1922, Banach’s contraction principle [1] ensures the existence and uniqueness of a unique fixed point for a self-mapping satisfying a contractive condition, which is called Banach’s contractive mapping. After that, many authors have extended, improved and generalized Banach’s contraction principle in several ways. Especially, Banach’s contractive mapping is continuous, which is used to prove Banach’s contraction principle. Thus it is natural to consider the following question: Do there exist some contractive conditions which do not force the mapping T to be continuous? In 1968, Kannan [4] gave the positive answer for this question and he proved the following fixed point theorem for the following contractive condition: Theorem K. Let (E, d) be a complete metric space and T : E → E be a mapping such that there exists a number h ∈ (0, 12 ) such that d(T x, T y) ≤ h[d(T x, x) + d(T y, y)] for all x, y ∈ X. Then T has a unique fixed point in E. Also, some authors have introduced some kinds of contractive mappings, for example, Meir-Keeler ∗ Corresponding

Author.

Full list of author information is available at the end of the article.

803

Mi Zhou ET AL 803-818

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

contraction, Caristi’s contraction, Hardy-Roages contractions, Chatterjea’s contraction, Berinde’s con´ c’s contraction and others (see [2]-[9]). traction, Reich’s contraction, Ciri´ Another one to study Banach’s contraction principle in metric spaces is to extend Banach’s contraction principle to the classes of various kinds of metric spaces. Recently, some authors have introduced some extensions of metric spaces in several ways and have studied fixed point theory and its applications, for example, 2-metric spaces [10], D-metric spaces [11], G-metric spaces [12], D∗ -metric spaces [13], S-metric spaces [14]-[17] and some others. On the other hand, Ran and Reurings [18], Bhaskar and Lakshmikantham [19], Lakshmikantham ´ c [20], Neito and Lop´ez [21], Harjani et al. [22], Harjani et al. [23] and Zhou et al. [24]-[25] and Ciri´ studied fixed point problem in partially ordered sets. Definition 1.1. [14] Let X be a nonempty set. A S-metric on X is a mapping S : X 3 7→ [0, ∞) that satisfies the following conditions: for all x, y, z, a ∈ X, (S1) S(x, y, z) ≥ 0; (S2) S(x, y, z) = 0 if and only if x = y = z; (S3) S(x, y, z) ≤ S(x, x, a) + S(y, y, a) + S(z, z, a). The pair (X, S) is called an S-metric space. Immediate examples of such S−metric spaces are as follows: (1) Let R be a real line and define S(x, y, z) = |x − z| + |y − z| for all x, y, z ∈ R. Then S is an S-metric on R. This S-metric is called the usual S-metric on R. (2) Let X = R+ with a norm k · k and define S(x, y, z) = k2x + y − 3zk + kx − zk for all x, y, z ∈ X. Then S is an S-metric on X. (3) Let X be a nonempty set and d be the ordinary metric on X. If we define Sd (x, y, z) = d(x, z) + d(y, z) for all x, y, z ∈ X, then S is an S-metric on X. Definition 1.2. [14] Let (X, S) be an S-metric space. (1) A sequence {xn } in X is said to convergent to a point x ∈ X if S(xn , xn , x) → 0 as n → ∞, that is, for any  > 0, there exists n0 ∈ N such that, for all n ≥ n0 , S(xn , xn , x) < . (2) A sequence {xn } in X is called a Cauchy sequence if S(xn , xn , xm ) → 0 as n, m → ∞, that is, for any  > 0, there exists n0 ∈ N such that, for all n, m ≥ n0 , S(xn , xn , xm ) < . (3) An S-metric space (X, S) is said to be complete if every Cauchy sequence in X converges to a point in X. Lemma 1.1. [14] Let (X, S) be an S-metric space. Then S(x, x, y) = S(y, y, x), for all x, y ∈ X. Lemma 1.2. [14] Let (X, S) be an S-metric space. Then S(x, x, z) ≤ 2S(x, x, y) + S(y, y, z) for all x, y, z ∈ X. Lemma 1.3. [14] Let (X, S) be an S-metric space. If a sequence {xn } in X converges to a point x ∈ X, then {xn } is a Cauchy sequence.

804

Mi Zhou ET AL 803-818

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Lemma 1.4. Let (X, S) be an S-metric space. Then, for all x, y, z ∈ X, it follows that (1) S(x, y, y) ≤ S(x, x, y); (2) S(x, y, x) ≤ S(x, x, y); (3) S(x, y, z) ≤ S(x, x, z) + S(y, y, z); (4) S(x, y, z) ≤ S(y, y, z) + S(x, x, z); (5) S(x, y, z) ≤ S(y, y, x) + S(z, z, x); (6) S(x, x, z) ≤ 32 [S(y, y, z) + S(y, y, x)]; (7) S(x, y, z) ≤ 23 [S(x, x, y) + S(y, y, z) + S(z, z, x)]. Proof. It follows from (S3) and Lemma 1.2, one can easily obtain (1)-(5). Now, we prove (6) and (7) also hold. By Lemma 1.1 and Lemma 1.2, we have 2S(x, x, z) = S(x, x, z) + S(z, z, x) ≤ [2S(x, x, y) + S(y, y, z)] + [2S(z, z, y) + S(x, x, y)] = 3[S(y, y, z) + S(y, y, x)] and hence S(x, x, z) ≤ 32 [S(y, y, z) + S(y, y, x)]. Thus (6) holds. By virtue of (3)-(5) and Lemma 1.2, we have 3S(x, y, z) = 2[S(x, x, y) + S(y, y, z) + S(z, z, x)], which implies (7) holds. This completes the proof. Lemma 1.5. [15] Let (X, S) be an S-metric space and {xn } be a sequence in X such that lim S(xn+1 , xn+1 , xn ) = 0.

n→∞

If {xn } is not a S-Cauchy sequence, then there exists  > 0 and two sequences {mk } and {nk } of positive integers with nk > mk > k such that the following sequences tend to  when k → ∞: S(xmk , xmk , xnk ), S(xmk , xmk , xnk +1 ), S(xmk −1 , xmk −1 , xnk ), S(xmk −1 , xmk −1 , xnk +1 ), S(xmk +1 , xmk +1 , xnk +1 ). Definition 1.3. [26] A mapping F : [0, ∞)2 → R is called a C-class function if it is continuous and satisfies the following conditions: (C1) F (s, t) ≤ s for all s, t ∈ [0, ∞); (C2) F (s, t) = s implies that either s = 0 or t = 0. Let C denote the set of C-class functions. Example 1.1. [26] The following functions F : [0, ∞)2 7→ R are elements of C. For each s, t ∈ [0, ∞), 1. F (s, t) = s − t. 2. F (s, t) = ms for some m ∈ (0, 1). 3. F (s, t) =

s (1+t)r

for some r ∈ (0, ∞).

4. F (s, t) = log(t + as )/(1 + t) for some a > 1. 805

Mi Zhou ET AL 803-818

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

5. F (s, t) = ln(1 + as )/2 if e > a > 1. Indeed, f (s, t) = s implies that s = 0. r

6. F (s, t) = (s + l)(1/(1+t) ) − l if l > 1 and r ∈ (0, ∞). 7. F (s, t) = s logt+a a for all a > 1. t 8. F (s, t) = s − ( 1+s 2+s )( 1+t ).

9. F (s, t) = sβ(s) if a function β : [0, ∞) → [0, 1) and is continuous. 10. F (s, t) = s −

t k+t .

11. F (s, t) = s − ϕ(s) if ϕ : [0, ∞) → [0, ∞) is a continuous function such that ϕ(t) = 0 if and only if t = 0. 12. F (s, t) = sh(s, t) if h : [0, ∞) × [0, ∞) → [0, ∞) is a continuous function such that h(t, s) < 1 for all t, s > 0. 13. F (s, t) = s − ( 2+t 1+t )t. p 14. F (s, t) = n ln(1 + sn ). 15. F (s, t) = φ(s), where φ : [0, ∞) → [0, ∞) is a upper semicontinuous function such that φ(0) = 0 and φ(t) < t for all t > 0. 16. F (s, t) =

s (1+s)r

for all r ∈ (0, ∞).

Definition 1.4. [27] A function ψ : [0, ∞) → [0, ∞) is called an altering distance function if the following conditions are satisfied: (AD1) ψ is strictly increasing and continuous, (AD2) ψ(t) = 0 for all t ∈ [0, ∞) if and only if t = 0. Let Φ denote the class of all continuous and strictly increasing functions φ : [0, ∞) 7→ [0, ∞) and Ψ the set of all functions such that lim ψ(t) > 0 for all r > 0 and ψ(t) = 0 if and only if t = 0. t→r

In [28], Mashina proved the following results: Theorem 1.1. [28] Let (X, ) be a partial ordered set and (X, S) be a complete S-metric space. Let T : X 7→ X be a continuous and nondecreasing mapping with respect to  such that S(T x, T x, T y) ≤ α ·

S(x, x, T x) · S(y, y, T y) + β · S(x, x, y) S(x, x, y)

(1)

for all x, y ∈ X with x 6= y and for some α, β ∈ [0, 1) with α + β < 1. If there exists x0  T x0 , then T has a unique fixed point in X. Theorem 1.2. [28] Let (X, ) be a partial ordered set and (X, S) is a complete S-metric space. Assume that X satisfies the following condition: (C1) If {xn } is a nondecreasing sequence such that xn → x with x∗ = supn≥1 {xn } with respect to .

806

Mi Zhou ET AL 803-818

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Let T : X 7→ X be a nondecreasing mapping with respect to  such that S(T x, T x, T y) ≤ α ·

S(x, x, T x) · S(y, y, T y) + β · S(x, x, y) S(x, x, y)

for all x, y ∈ X with x 6= y and for some α, β ∈ [0, 1) with α + β < 1. If there exists x0  T x0 , then T has a unique fixed point in X. Also, Mashina [28] added the following assumption to Theorem 1.1 and Theorem 1.2 to guarantee the uniqueness of the fixed point of the given mapping. (C2) For all x, y ∈ X, there exists u ∈ X which is comparable to x and y. The main aim of this paper is to generalize the results of Mashina [28] by using the auxiliary functions in the setting of S-metric spaces.

2.

Main Results

Now, we give one definition for our main results in this paper. Definition 2.1. Let (X, ) be a partially ordered set and T : X 7→ X. We say that T is a nondecreasing mapping with respect to  if for x, y ∈ X, x  y ⇒ T x  T y. Theorem 2.1. Let (X, ) be a partial ordered set and (X, S) is a complete S-metric space. Let T : X → X be a continuous and nondecreasing mapping with respect to  satisfying the following condition: φ(S(T x, T x, T y)) i   1 h S(x, x, T x) · S(y, y, T y) α· + β · S(x, x, y) , ≤ F φ α+β S(x, x, y)  1 h S(x, x, T x) · S(y, y, T y) i ψ α· + β · S(x, x, y) α+β S(x, x, y)

(2)

for all x, y ∈ X with x 6= y, for some α, β ∈ [0, ∞) with α + β > 0 and F ∈ C, φ ∈ Φ, ψ ∈ Ψ. If there exists x0  T x0 , then T has a fixed point in X. Proof. Let x0 ∈ X such that x0  T x0 . Since T is nondecreasing with respect to , by induction, we obtain x0  T x0  T 2 x0  · · ·  T n x0  T n+1 x0  · · · . Let xn+1 = T xn for each n ≥ 1. If there exists n0 ≥ 1 such that xn0 +1 = xn0 , then xn0 +1 = T xn0 = xn0 and so xn0 is a fixed point of T . So, we assume that xn+1 6= xn for each n ∈ {0} ∪ N. Putting x = xn+1 and y = xn for each n ≥ 1

807

Mi Zhou ET AL 803-818

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

in (2.1), we have φ(S(xn+1 , xn+1 , xn )) = φ(S(T xn , T xn , T xn−1 ))   1 h S(x , x , T x ) · S(x i n n n n−1 , xn−1 , T xn−1 ) ≤ F φ α + βS(xn , xn , xn−1 ) , α+β S(xn , xn , xn−1 )  1 h S(x , x , T x ) · S(x i n n n n−1 , xn−1 , T xn−1 ) ψ α + βS(xn , xn , xn−1 ) α+β S(xn , xn , xn−1 )   1  = F φ [αS(xn , xn , xn+1 ) + βS(xn , xn , xn−1 )] , α+β   1 [αS(xn , xn , xn+1 ) + βS(xn , xn , xn−1 )] ψ α+β   1 [αS(xn , xn , xn+1 ) + βS(xn , xn , xn−1 )] . ≤ φ α+β Since φ is strictly increasing, we have S(xn+1 , xn+1 , xn ) ≤ S(xn , xn , xn−1 ) for all n ≥ 1. Hence the sequence {S(xn , xn , xn+1 )} is a monotone decreasing and bounded below. Therefore, there exists r ≥ 0 such that lim S(xn , xn , xn−1 ) = r. n→∞

Now, we prove that r = 0. Assume that r > 0. Using Definition 1.3, we know that, when F (s, t) = s, then s = 0 or t = 0 and F (s, t) < s when s > 0 and t > 0. Using the properties of φ and ψ, we have φ(r) > φ(0) ≥ 0 and lim φ(S(xn , xn , xn−1 )) > 0. Therefore, by taking the limit as n→∞

n → ∞ and using the properties of F , we have    1 [α · r + β · r] , φ(r) ≤ F φ α+β  1  lim ψ [αS(xn , xn , xn+1 ) + βS(xn , xn , xn−1 )] n→∞ α+β < φ(r), which is a contradiction. Thus we have r = 0 and lim S(xn , xn , xn−1 ) = 0.

n→∞

Next, we prove that {S(xn , xn , xn−1 ) is a Cauchy sequence. Suppose that a sequence {S(xn , xn , xn−1 )} is not a Cauchy sequence. From Lemma 1.5, there exists  > 0 and {mk } and {nk } of positive integers such that lim S(xmk , xnk , xnk ) = .

k→∞

808

Mi Zhou ET AL 803-818

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Putting x = xmk and y = xnk for each k ≥ 1 in (2.1), we have φ(S(xmk +1 , xmk +1 , xnk +1 )) = φ(S(T xmk , T xmk , T xnk ))   1 h S(x , x , T x ) · S(x , x , T x ) mk mk mk nk nk nk α· ≤ F φ α+β S(xmk , xmk , xnk ) i +β · S(xmk , xmk , xnk ) ,  1 h S(x , x , T x ) · S(x , x , T x ) mk mk mk nk nk nk α· ψ α+β S(xmk , xmk , xnk ) i +β · S(xmk , xmk , xnk )   1 h S(x , x , x mk mk mk +1 ) · S(xnk , xnk , xnk +1 ) α· = F φ α+β S(xmk , xmk , xnk ) i +β · S(xmk , xmk , xnk ) ,  1 h S(x , x , x mk mk mk +1 ) · S(xnk , xnk , xnk +1 ) α· ψ α+β S(xmk , xmk , xnk ) i +β · S(xmk , xmk , xnk ) . Using the properties of φ and ψ, we have φ() > 0 and lim ψ

k→∞

1 h S(xmk , xmk , xmk +1 ) · S(xnk , xnk , xnk +1 ) α· α+β S(xmk , xmk , xnk ) i +β · S(xmk , xmk , xnk ) > 0.



Taking the limit k → ∞ in the above inequality, we have  βε    βε   βε  ,ψ 0 and φ(t) = t for all t > 0 in Theorem 2.1, then Theorem 2.1 reduces to Theorem 1.1 of [28]. (2) In Theorem 2.1, we use the auxiliary function F ∈ C and C is a class of more general functions than the gauge function used in Theorem 2.1 and 2.2 of [23]. Indeed, the gauge function F (s, t) = s−t in Theorem 2.1 and 2.2 of [23] is an element of C. (3) We note that, if ψ is an alerting distance function, then ψ ∈ Ψ. But the reverse is not true in general. Taking F (s, t) = s − t in Theorem 2.1, we obtain the following: Corollary 2.1. Let (X, ) be a partial ordered set and (X, S) be a complete S-metric space. Let T : X → X be a continuous and nondecreasing mapping with respect to  satisfying the following 809

Mi Zhou ET AL 803-818

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

condition:   S(x, x, T x) · S(y, y, T y) + b · S(x, x, y) φ(S(T x, T x, T y)) ≤ φ a · S(x, x, y)  S(x, x, T x) · S(y, y, T y)  −ψ a · + b · S(x, x, y) S(x, x, y) for all x, y ∈ X with x 6= y, for some a, b ∈ [0, 1) with a + b < 1 and φ ∈ Φ, ψ ∈ Ψ. If there exists x0  T x0 , then T has a fixed point in X. In addition, taking φ(t) = kt for all t > 0 and ψ(t) = (k − 1)t for all t > 0 with k > 1 in Corollary 2.1, we have the following: Corollary 2.2. Let (X, ) be a partial ordered set and (X, S) be a complete S-metric space. Let T : X 7→ X be a continuous and nondecreasing mapping with respect to  satisfying the following condition: S(T x, T x, T y) ≤ a ·

S(x, x, T x) · S(y, y, T y) + b · S(x, x, y) S(x, x, y)

for all x, y ∈ X with x 6= y, some a, b ∈ [0, 1) with a + b < 1 . If there exists x0  T x0 . Then T has a fixed point in X. Now, we present some examples to verify Theorem 2.1 and Corollary 2.2. Example 2.1. Let X = [0, ∞) with the S-metric defined by S(x, y, z) = |x − z| + |y − z| for all x, y, z ∈ X and ≤ be the natural ordering of real numbers. Then X is a complete S-metric space. Let T : X → X be a mapping defined by T x = 81 (1 + x) and φ ∈ Φ, ψ ∈ Ψ be defined by 1 φ(t) = t + , 4

ψ(t) =

t . 2

Define a mapping F ∈ C by F (s, t) = s − t and take α = 3 and β = 1. First, we note that, for all x0 ∈ [0, 17 ], we have x0 ≤ T x0 . Second, we verify the condition (2.1). Without loss of generality, we assume that x > y. Then we have φ(S(T x, T x, T y))

= φ(2(T x − T y)) i  h1 1 = φ 2 (1 + x) − (1 + y) 8 8 1  = φ (x − y) 4 1 1 = (x − y) + . 4 4

On the other hand, we have i  1 h S(x, x, T x)S(y, y, T y) φ α· + βS(x, x, y) α+β S(x, x, y)  1 h 4[x − 1 (1 + x)][y − 1 (1 + y)] i 8 8 = φ 3 + 2(x − y) 4 2(x − y)  1 h 6( 7 x − 1 )( 7 y − 1 ) i 8 8 8 8 = φ + 2(x − y) 4 (x − y) 6( 78 x − 81 )( 78 y − 18 ) 1 1 = + (x − y) + . 4(x − y) 2 4 810

Mi Zhou ET AL 803-818

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

and i 1 h S(x, x, T x)S(y, y, T y) α· + βS(x, x, y) α+β S(x, x, y) i  1 h 4[x − 1 (1 + x)][y − 1 (1 + y)] 8 8 3 + 2(x − y) = ψ 4 2(x − y)  1 h 6( 7 x − 1 )( 7 y − 1 ) i 8 8 8 8 = ψ + 2(x − y) 4 (x − y) i 1 h 6( 78 x − 18 )( 78 y − 81 ) + 2(x − y) . = 8 (x − y) ψ



Thus we have F (φ, ψ) =

1 6( 87 x − 18 )( 78 y − 18 ) 1 1 + (x − y) + . 8 (x − y) 4 4

Hence the condition (2.1) holds for y < x ≤ satisfied and, further, x =

1 7

1 7.

Therefore, all the assumptions of Theorem 2.1 are

is the fixed point of T .

Example 2.2. Let X = [1, ∞) be an S-metric space with the S-metric defined by S(x, y, z) = |x − y| + |y − z| for all x, y, z ∈ X and ≤ be the natural ordering of real numbers. Then (X, S) is a complete S-metric space. For 0 < k < 1, consider the self-mapping T : X → X defined by T x =

3x+2 2x+3

for all x ∈ X.

First, there exists x0 = 1 ∈ X such that x0 ≤ T x0 . Second, we have 3x + 2 3y + 2 − S(T x, T x, T y) = 2x + 3 2y + 3 5|x − y| = (2x + 3)(2y + 3) |x − y| ≤ 5 1 = S(x, x, y). 5 So, we have S(T x, T x, T y) ≤ a ·

S(x, x, T x) · S(y, y, T y) + b · S(x, x, y) S(x, x, y)

for all x, y ∈ X with x 6= y and a ∈ [0, 45 ) and b = 15 . Hence all the assumptions of Corollary 2.2 are satisfied. Therefore, T has a fixed point in X and, further, x = 1 is a fixed point of T . In the next theorem, we omit the continuity of T and assume that the following condition, which has been stated in [22]. (C1) If {xn } is a nondecreasing sequence such that xn → x∗ with x∗ = sup{xn } with respect to . Theorem 2.2. Let (X, ) be a partial ordered set and (X, S) be a complete S-metric space. Assume that X satisfies the condition (C1). Let T : X → X be a nondecreasing mapping with respect to  satisfying the condition (2.1). If there exists x0  T x0 , then T has a fixed point in X.

811

Mi Zhou ET AL 803-818

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. Following the proof of Theorem 2.1, we only need to verify T x∗ = x∗ . Since {xn } is a nondecreasing sequence in X and xn → x∗ , by the condition (C1), it follows that xn  x∗ . Since T is a nondecreasing mapping with respect to , we have T xn = xn+1  T x∗ for all n ∈ N. Moreover, since x0  T x0  T x∗ and x∗ = sup{xn }, we have x∗  T x∗ . Using the similar arguments as in the proof of Theorem 2.1, for x∗  T x∗ , it follows that {T n x∗ } is a nondecreasing sequence and lim T n x∗ = z for some z ∈ X. Again, using the condition (C1), we n→∞

have z = sup{T n x∗ }. Moreover, from x0  x∗ , we have xn = T n x0  T n x∗ for each n ≥ 1. Applying x = xn and y = x∗ for each n ≥ 1 in (2.1), we have φ(S(xn+1 , xn+1 , T n+1 x∗ )) = φ(S(T xn , T xn , T (T n x∗ )))   1 h S(x , x , T x ) · S(T n x∗ , T n x∗ , T (T n x∗ )) n n n α· ≤ F φ α+β S(xn , xn , T n x∗ ) i +β · S(xn , xn , T n x∗ ) ,  1 h S(x , x , T x ) · S(T n x∗ , T n x∗ , T (T n x∗ )) n n n ψ α· α+β S(xn , xn , T n x∗ ) i +β · S(xn , xn , T n x∗ )   1 h S(x , x , x n ∗ n ∗ n ∗ n n n+1 ) · S(T x , T x , T (T x )) = F φ α· α+β S(xn , xn , T n x∗ ) i +β · S(xn , xn , T n x∗ ) ,  1 S(xn , xn , xn+1 ) · S(T n x∗ , T n x∗ , T (T n x∗ )) [α · ψ α+β S(xn , xn , T n x∗ ) i +β · S(xn , xn , T n x∗ ) . Letting the limit n → ∞ in the above inequality, by the properties of φ, ψ, F , we have   αS(x∗ , x∗ , z)   βS(x∗ , x∗ , z)   βS(x∗ , x∗ , z)  φ(S(x∗ , x∗ , z)) ≤ F φ ,ψ ≤φ , α+β α+β α+β   ∗ ∗ ∗ ∗ ,x ,z) ,x ,z) = 0. Thus we have S(x∗ , x∗ , z) = 0. Especially, which yields βS(xα+β = 0 or ψ βS(xα+β x∗ = z = sup{xn } and so T x∗  x∗ , which is a contradiction. Hence x∗ = T x∗ . This completes the proof. Taking F (s, t) = s − t in Theorem 2.2, we obtain the following: Corollary 2.3. Let (X, ) be a partial ordered set and (X, S) be a complete S-metric space. Assume that X satisfies the condition (C1). Let T : X → X be a nondecreasing mapping with respect to  satisfying the following condition:  S(x, x, T x) · S(y, y, T y)  φ(S(T x, T x, T y)) ≤ φ a · + b · S(x, x, y) S(x, x, y)  S(x, x, T x) · S(y, y, T y)  −ψ a · + b · S(x, x, y) S(x, x, y) for all x, y ∈ X with x 6= y, for some a, b ∈ [0, 1) with a + b < 1 and φ ∈ Φ, ψ ∈ Ψ. If there exists x0  T x0 , then T has a fixed point in X.

812

Mi Zhou ET AL 803-818

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

In addition, taking φ(t) = kt for all t > 0 and ψ(t) = (k − 1)t for all t > 0 with k > 1 in Corollary 2.3, we have the following: Corollary 2.4. Let (X, ) be a partial ordered set and (X, S) be a complete S-metric space. Assume that X satisfies the condition (C1). Let T : X → X be a nondecreasing mapping with respect to  satisfying the following condition: S(T x, T x, T y) ≤ a ·

S(x, x, T x) · S(y, y, T y) + b · S(x, x, y) S(x, x, y)

for all x, y ∈ X with x 6= y and for some a, b ∈ [0, 1) with a + b < 1. If there exists x0  T x0 , then T has a fixed point in X. Now, we give an example to illustrate Theorem 2.2. Example 2.3. Let X = [0, ∞) with the S-metric S defined by S(x, y, z) = |x − z| + |y − z| for all x, y, z ∈ X and ≤ be the natural ordering of real numbers. Then X is a complete S-metric space. Let T : X → X be a mapping defined by T x = 4 −

1 2x

for all x ∈ X and φ ∈ Φ, ψ ∈ Ψ be

defined by

t 1 φ(t) = t + , ψ(t) = , 4 2 respectively. Define a mapping F ∈ C by F (s, t) = s − t and take α = 3 and β = 1. First, we note that there exists x0 ∈ [0,

√ 2+1 2 ]

⊆ [0, ∞) such that x0 ≤ T x0 . It is easily to verify

that the sequence {xn } defined by xn = T xn−1 with x0 = ∗

x =

√ 3+ 14 2

√ 2+1 2

is nondecreasing and converges to



with x = supn≥1 {xn } with respect to ≤. Second, we verify the condition (2.1). Without

loss of generality, we assume that x > y. Then we have φ(S(T x, T x, T y))

= φ(2(T x − T y))  h 1   1 i = φ 2 4− − 4− 2x 2y 1 1 − = φ y x 1 1 1 = − + . y x 4

On the other hand, we have  1 h S(x, x, T x)S(y, y, T y) i φ α· + βS(x, x, y) α+β S(x, x, y)  1 h 6(x + 1 − 4)(y + 1 − 4) i 2x 2y = φ + 2(x − y) 4 (x − y) 1 1 6(x + 2x − 4)(y + 2y − 4) 1 1 = + (x − y) + , 4(x − y) 2 4 i 1 h S(x, x, T x)S(y, y, T y) α· + βS(x, x, y) α+β S(x, x, y)  1 h 6(x + 1 − 4)(y + 1 − 4) i 2x 2y = ψ + 2(x − y) 4 (x − y) 1 1 1 6(x + 2x − 4)(y + 2y − 4) 1 = + (x − y) 8 (x − y) 4 ψ



813

Mi Zhou ET AL 803-818

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

and F (φ, ψ) =

1 6(x + 8

1 2x

− 4)(y + (x − y)

Hence the condition (2.1) holds for y < x ∈ [0, are satisfied and, further, x =

√ 3+ 14 2

1 2y

√ 2+1 2 ].

− 4)

1 1 + (x − y) + . 4 4

Therefore, all the assumptions of Theorem 2.2

is the fixed point of T .

For the uniqueness of the fixed point, we consider the following condition stated in [22]. (C2) For all x, y ∈ X, there exists u ∈ X which is comparable to x and y. Theorem 2.3. If you give the condition (C2) to the hypotheses of Theorem 2.1 (or Theorem 2.2), then the fixed point of the mapping T is unique. Proof. Suppose that x∗ and y ∗ ∈ X are fixed points of the mapping T . Then we consider two cases. Case 1: If x∗ and y ∗ are comparable and x∗ 6= y ∗ , then, using the condition (2.1), we have φ(S(x∗ , x∗ , y ∗ )) = φ(S(T x∗ , T x∗ , T y ∗ )) i   1 h S(x∗ , x∗ , T x∗ ) · S(y ∗ , y ∗ , T y ∗ ) ∗ ∗ ∗ α + βS(x , x , y ) , ≤ F φ α+β S(x∗ , x∗ , y ∗ )  1 h S(x∗ , x∗ , T x∗ ) · S(y ∗ , y ∗ , T y ∗ ) i ψ + βS(x∗ , x∗ , y ∗ ) α ∗ ∗ ∗ α+β S(x , x , y )   β   β  = F φ S(x∗ , x∗ , y ∗ ) , ψ S(x∗ , x∗ , y ∗ ) α+β α+β  β  ≤ φ S(x∗ , x∗ , y ∗ ) , α+β β ∗ ∗ ∗ α+β S(x , x , y ) ∗ ∗

which yields

β = 0 or ψ( α+β S(x∗ , x∗ , y ∗ )) = 0. Thus we have S(x∗ , x∗ , y ∗ ) = 0.

Therefore, x = y .

Case 2: If x∗ is not comparable to y ∗ , then, by the condition (C2), there exists u ∈ X comparable to x∗ and y ∗ . The monotonicity implies that T n u is comparable to T n x∗ = x∗ and T n y ∗ = y ∗ for each n ≥ 0. If there exists n0 ≥ 1 such that T n0 u = x∗ , then, since x∗ is a fixed point of T , the sequence {T n u : n ≥ n0 } is constant and so lim T n u = x∗ . n→∞

On the other hand, if T n u 6= x∗ for each n ≥ 1, then, using the condition (2.1), it follows that, for

814

Mi Zhou ET AL 803-818

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

each n ≥ 2, φ(S(T n u, T n u, x∗ )) = φ(S(T n u, T n u, T n x∗ ))   1 h S(T n−1 u, T n−1 u, T n u) · S(T n−1 x∗ , T n−1 x∗ , T n x∗ ) α ≤ F φ α+β S(T n−1 u, T n−1 u, T n−1 x∗ ) i +βS(T n−1 u, T n−1 u, T n−1 x∗ ) ,  1 h S(T n−1 u, T n−1 u, T n u) · S(T n−1 x∗ , T n−1 x∗ , T n x∗ ) ψ α α+β S(T n−1 u, T n−1 u, T n−1 x∗ ) i +βS(T n−1 u, T n−1 u, T n−1 x∗ )   1 h S(T n−1 u, T n−1 u, T n u) · S(x∗ , x∗ , x∗ ) = F φ α α+β S(T n−1 u, T n−1 u, T n−1 x∗ ) i +βS(T n−1 u, T n−1 u, x∗ ) ,  1 h S(T n−1 u, T n−1 u, T n u) · S(x∗ , x∗ , x∗ ) ψ α α+β S(T n−1 u, T n−1 u, T n−1 x∗ ) i +βS(T n−1 u, T n−1 u, x∗ )   1    = F φ βS(T n−1 u, T n−1 u, x∗ ) , ψ βS(T n−1 u, T n−1 u, x∗ ) α+β  1  ≤ φ βS(T n−1 u, T n−1 u, x∗ ) α+β < φ(S(T n−1 u, T n−1 u, x∗ )), which implies that S(T n u, T n u, x∗ ) < S(T n−1 u, T n−1 u, x∗ ). Therefore, the sequence {S(T n u, T n u, x∗ )} is monotone decreasing, bounded below and converges to d ≥ 0. Taking the limit as n → ∞ in the above inequality, we have   φ(d) ≤ F φ which yields

β α+β d

= 0 or φ



β α+β d



  β  β d ,φ d < φ(d), α+β α+β

= 0. Thus we have d = 0 and lim T n u = x∗ .

n→∞

It can be shown that lim T n u = y ∗ by the similar arguments mentioned above. Thus we can conclude n→∞

that x∗ = y ∗ and hence fixed point of the mapping T is unique. This completes the proof. Taking F (s, t) = s − t in Theorem 2.3, we obtain the following: Corollary 2.5. Let (X, ) be a partial ordered set and (X, S) be a complete S-metric space. Assume that X satisfies the condition (C2). Let T : X → X be a nondecreasing mapping with respect to  satisfying the following condition:  S(x, x, T x) · S(y, y, T y)  φ(S(T x, T x, T y)) ≤ φ a · + b · S(x, x, y) S(x, x, y)  S(x, x, T x) · S(y, y, T y)  −ψ a · + b · S(x, x, y) S(x, x, y) for all x, y ∈ X with x 6= y, for some a, b ∈ [0, 1) with a + b < 1 and φ ∈ Φ, ψ ∈ Ψ. If there exists x0  T x0 , then T has a unique fixed point in X. 815

Mi Zhou ET AL 803-818

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

In addition, taking φ(t) = kt for all t > 0 and ψ(t) = (k − 1)t for all t > 0 with k > 1 in Corollary 2.5, we have the following: Corollary 2.6. Let (X, ) be a partial ordered set and (X, S) be a complete S-metric space. Assume that X satisfies the condition (C2). Let T : X → X be a nondecreasing mapping with respect to  satisfying the following condition: S(T x, T x, T y) ≤ a ·

S(x, x, T x) · S(y, y, T y) + b · S(x, x, y) S(x, x, y)

for all x, y ∈ X with x 6= y and for some a, b ∈ [0, 1) with a + b < 1. If there exists x0  T x0 , then T has a unique fixed point in X.

Acknowledgements. Mi Zhou was supported by Scientific Research Fund of Hainan Province Education Department (Grant No.Hnjg2016ZD-20). Xiao-lan Liu was partially supported by National Natural Science Foundation of China (Grant No. 61573010), Artificial Intelligence of Key Laboratory of Sichuan Province (No. 2015RZJ01), Science Research Fund of Science and Technology Department of Sichuan Province (No. 2017JY0125), Scientific Research Fund of Sichuan Provincial Education Department (No. 16ZA0256), Scientific Research Fund of Sichuan University of Science and Engineering (No. 2014RC01, No. 2014RC03, No.2017RCL54). Yeol Je Cho was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT and future Planning (2014R1A2A2A01002100).

References [1] S. Banach, Surles operations dans les ensembles abatraits et leur application aux equations itegrales, Fund. Math., 3 (1922), 133–181. [2] A. Meir, E. Keeler, A theorem on contraction mappings, J. Math. Anal. Appl., 28(1969), 326–329. [3] J. Caristi, Fixed point theorems for mappings satisfying inwardness conditions, Trans. Amer. Math. Soc., 215(1976), 241–251. [4] R. Kannan, Some results on fixed points, Bull. Cal. Math. Soc., 62(1968), 71–76. [5] S.K. Chatterjea, Fixed point theorems, C.R. Acad. Bulgare Sci., 25(1972), 727–730. [6] G.E. Hary, T.D. Rogers, A generalization of a fixed point theorem of Reich, Canad. Math. Bull. 16(1973), 201–206. [7] V. Berinde, Approximating fixed points of weak contractions using the Picard iteration, Nonlinear Anal. Forum, 9(2004), 45–53. [8] S. Reich, Some remarks concerning contraction mappings, Canad. Math. Bull., 14(1971),121–124. ´ c, Generalized contractions and fixed-point theorems, Publ. Inst. Math., 12(26)(1971), 19–26. [9] C.L. Ciri´ [10] S. G¨ aahle, 2-metric raume und ihre topologische strukture, Maths. Nachr., 26(1963), 115–148. [11] B.C. Dhage, A study of some fixed point theorems, Ph.D. Thesis, Marathwada Univ. Aurangabada, India 1984. [12] Z. Mustafa, B. Sims, A new appraoch to generalize metric space, J. Roy. Nonlinear Convex Anal., 7(2006), 289–297.

816

Mi Zhou ET AL 803-818

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[13] S. Sedghi, N. Shobe, H. Zhou, A common fixed point theorem D∗ -metric spaces, Fixed Point Theory Appl., 2007, 2007, Article ID 027906. [14] S. Sedghi, N. Shobe, A. Aliouche, A generalization of fixed point theorem in S-metric spaces, Mat. Vesnik, 64(2012), 258–266. [15] S. Sedghi, M.M. Rezaee, T. Doˇsenovi´c, S. Radenovi´c, Common fixed point theorems for contractive mappings satisfying Φ−maps in S-metric spaces, Acta Univ. Sapientiae, Math., 8(2016), 298–311. [16] S. Sedghi, N.V. Dung, Fixed point theorems on S-metric spaces, Mat. Vesnik, 66(2014), 113–124. [17] S. Sedghi, N. Shobe, T. Doˇsenovi´c, Fixed point results in S-metric spaces, Nonlinear Functl. Anal. Appl., 20(2015), 55–67. [18] A.C.M. Ran, M.C.B. Reurings, A fixed point theorem in partially ordered sets and some applications to metric equations, Proc. Amer. Math. Soc., 132(2004), 1435–1443. [19] T.G. Bhaskar, V. Lakshmikantham, Fixed point theorems in partially ordered metric spaces and applications, Nonlinear Anal., 65(2006), 1379–1393. ´ c, Coupled fixed point theorems for nonlinear contractions in partially ordered [20] V. Lakshmikantham, L. Ciri´ metric spaces, Nonlinear Anal., 70(2009), 4341–4349. [21] J.J. Nieto, R.R. Lop´ez, Existence and uniqueness of fixed point in partially ordered sets and applications to ordianry differential equations, Acta Mats. Sinica (Engl. Ser.), 23(2007), 2205–2212. [22] J. Harjani, B. Lop´ez, K. Sadarangani, A fixed point theorems for mappings satisfying a contractive condition of rational type on a partially ordered metric space, Abstr. Appl. Anal., 2010, 2010, Articale ID 190701. [23] J. Harjani, K. Sadarangani, Genralized contractions in partially ordered metric spaces and applications to ordinary differential equations, Nonlinear Anal., 72(3-4)(2010), 1188–1197. [24] M. Zhou, X.L. Liu, On coupled common fixed point theorems for nonlinear contractions with the mixed weakly monotone property in partially ordered S-metric spaces, J. Function Spaces, 2016, 2016, Article ID 7529523, 9 pages. [25] M. Zhou, X. L. Liu, D. D. Diana, B. Damjanovi´c, Coupled coincidence point results for Geraghty-type contraction by using monotone property in partially ordered S-metric spaces, J. Nonlinear Sci. Appl., 9(2016),5950-5969. [26] A.H. Ansari, Note on ϕ-ψ-contractive type mappings and related fixed point, The 2nd Regional Conference on Mathematics And Applications, Payame Noor University, 2014, 2014, 377–380. [27] M.S. Khan, M. Swaleh, S. Sessa, Fixed point theorems by altering distances between the points, Bull. Aust. Math. Soc., 30(1984), 1–9. [28] M.S. Mashina, On a fixed point theorem for mappings satisfying a contractive condition of rational type on a partially ordered S-metric space, Internat. J. Advanced Research in Math., 4(2016), 8–13. Author details. 1

School of Science and Technology, University of Sanya, Sanya, Hainan 572000, China.

E-mail: [email protected] 2

College of Science, Sichuan University of Science and Engineering, Zigong, Sichuan 643000, China.

E-mail: [email protected] 3

Department of Mathematics, Karaj Brancem Islamic Azad University, Karaj, Iran.

E-mail: [email protected] 4

Faculty of Agriculture, University of Belgrade, Kraljice Marije 16, Belgrade 11120, Serbia.

E-mail: [email protected] 817

Mi Zhou ET AL 803-818

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

5,6

Department of Mathematics Education and RINS, Gyeongsang National University, Gajwa-dong 900,

Jinju 52828, Korea. Center for General Education, China Medical University, Taichung 40402, Taiwan. E-mail: [email protected]

818

Mi Zhou ET AL 803-818

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On stochastic pantograph differential equations in the G-framework Faiz Faizullah



Department of Basic Sciences and Humanities, College of Electrical and Mechanical Engineering, National University of Sciences and Technology (NUST) Pakistan January 4, 2018

Abstract The purpose of this research is to study the stochastic pantograph differential equations (SPDEs) in the G-framework. We determine that any solution Z(t) of stochastic pantograph 2 ([0, T ]; Rn ). differential equation in the G-framework is bounded i.e., in particular Z(t) ∈ MG Subject to growth and Lipschitz conditions, we prove that SPDEs in the G-framework admit unique solution. Some useful inequalities, such as the H¨ older’s inequality, Doobs martingale’s inequality, Burkholder-Davis-Gundy’s (BDG) inequalities and Gronwall’s inequality are utilized to derive our results. In addition, we obtain the asymptotic estimates for the solutions to SPDEs in the G-framework. Keywords: Existence, uniqueness, asymptotic estimates, G-Brownian motion, stochastic pantograph differential equations. MSC2010 Classification: 60G10, 60G17, 60G20, 60H05, 60H10, 60H20.

1

Introduction

The stochastic differential equations (SDEs) theory is used in different disciplines of engineering and sciences. For instance, in physics, SDEs are used to study and model the influence of random changes on various physical phenomena. These equations describe the transport of cosmic rays in space. The percolation of fluid through absorbent structures and water catchment can be modeled by SDEs [15]. They are used to find out the problems of stochastic volatility and risk measures in finance and economics. In biology, they model the accomplishment of stochastic changes in reproduction on populations procedures [32, 33]. The weather and climate can also be modeled by these equations. A huge literature is available on the applications of SDEs in various discipline of engineering such as mechanical engineering [25, 27, 28], wave processes [26], stability theory [24] and random vibrations [3, 23]. In general, we can not find the explicit solutions for non-linear SDEs, ∗

Author e-mail: faiz [email protected] ¯

1

819

Faiz Faizullah 819-831

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

so we have to present and study the analysis for the solutions of these equations. By virtue of the Lipschitz and growth conditions, the existence theory for solutions to SDEs in the G-framework was given by Peng [20, 21] and later by Gao [14]. The said theory with integral Lipschitz coefficients was developed by Bai and Lin [1]. While Faizullah generalized the existence of solutions for SDEs in the G-framework with discontinuous coefficients [10]. In view of the Picard approximation technique, the existence-uniqueness results for stochastic functional differential equations (SFDEs) in the G-framework were commenced by Ren, Bi and Sakthivel [22]. The stated theory with Caratheodory approximation scheme was developed by Faizullah [9]. He presented the pth moment estimates for the solutions to SFDEs in the G-framework [6, 7]. Recently, Faizullah generalized the existence theory for SFDEs in the G-framework with non-Lipschitz conditions [5]. The pantograph differential equations arise in different fields such as quantum mechanics, number theory, dynamical systems, electrodynamics and probability. These equations were utilized by Taylor and Ockendon to investigate the collection of electric current [19]. The stochastic version of pantograph differential equations were introduced by Backer and Buckwar [2]. They studied the existence theory for linear stochastic pantograph differential equations (SPDEs). While Xiao, Song and Liu determined that the Euler scheme for linear SPDEs is convergent [30]. The existence theory for solutions to nonlinear SPDEs were developed by Fan, Liu and Cao [11], in which the convergence of Euler scheme was established by Xiao and Zhang [31]. However, up to the best of our knowledge, no one has studied SPDEs in the G-framework. The current paper will fill the mentioned gap. Consider an mdimensional G-Brownian motion W (t) = (W1 (t)), W2 (t)), W3 (t)), ..., Wm (t))T defined on a complete probability space (Ω, Ft , P ). Let W (t) is adopted to the filtration {Ft ; t ≥ 0} and fulfilling the usual conditions. Assume 0 ≤ t0 ≤ t ≤ T < ∞. Suppose the coefficients κ, λ and µ be Borel measurable such that κ : [0, T ]×Rd ×Rd → Rd , λ : [0, T ]×Rd ×Rd → Rd×m and µ : [0, T ]×Rd ×Rd → Rd×m . We study the following d-dimensional stochastic pantograph differential equation in the G-framework dZ(t) = κ(t, Z(t), Z(qt))dt+λ(t, Z(t), Z(qt))dhW, W i(t)+µ(t, Z(t), Z(qt))dW (t), 0 ≤ t ≤ T, (1.1) where q ∈ (0, 1), the initial condition Z0 ∈ Rd is given and κ, λ, µ are given mappings satisfying κ, λ, µ ∈ MG2 ([0, T ]; Rd ). We denote the quadratic variation process of G-Brownian motion {W (t)}t≥0 by {hW, W i(t)}t≥0 . The integral form of equation (1.1) is given as the following Z Z(t) = Z0 +

t

Z

Z λ(s, Z(s), Z(qs))dhW, W i(s) +

κ(s, Z(s), Z(qs))ds + 0

t

0

t

µ(s, Z(s), Z(qs))dW (s). 0

(1.2) Definition 1.1. Let t ∈ [0, T ]. A stochastic process Z(t) ∈ Rd is known as solution of problem (1.1) if the below characteristics hold. (i) {Z(t)}0≤t≤T is Ft -adapted and continuous. (ii) The coefficients κ(t, Z(t), Z(qt)) ∈ L1 ([0, T ]; Rd ), λ(t, Z(t), Z(qt)) ∈ L2 ([0, T ]; Rd×m ) and µ(t, Z(t), Z(qt)) ∈ L2 ([0, T ]; Rd×m ). (iii) For each t ∈ [0, T ], equation (1.2) holds q.s. 2

820

Faiz Faizullah 819-831

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A solution Z(t) of problem (1.1) is said to be unique if for any other solution Y (t) of (1.1) we have E[ sup | Z(t) − Y (t) |2 ] = 0, 0≤t≤T

which means that Z(t) and Y (t) are identical. For all t ∈ [t0 , T ] and all z, y, u, v ∈ Rn , throughout the current paper the following two conditions are assumed. |κ(t, z, y)|2 + |λ(t, z, y)|2 + |µ(t, z, y)|2 ≤ C(1 + |z|2 + |y|2 ),

(1.3)

where C is a positive constant. This condition (1.3) is known as a linear growth condition and the below (1.4) is called the Lipschitz condition. |κ(t, z, y) − κ(t, u, v)|2 + |λ(t, z, y) − λ(t, u, v)|2 + |µ(t, z, y) − µ(t, u, v)|2 ≤ C(| z − u |2 + | y − v |2 ),

(1.4)

where C is a positive constant. We organize the present article in the forthcoming fashion. Section 2 presents several fundamental notions, definitions and results, which are required for our research work. In section 3 we determine that Z(t) is bounded and belongs to the space MG2 ([0, T ]; Rn ). This section also contains the existence and uniqueness theorem for the solutions to SPDEs in the G-framework. Finally, we derive the path-wise estimates for the solutions to the said equations in section 4.

2

Preliminaries

Building on the previous notions of G-Brownian motion theory, this section presents the fundamental definitions and results required for the further discussion of the subject. For more details on the concepts briefly discussed, readers are suggested to consult the more depth oriented papers [8, 13, 17, 20, 21]. Let Ω be a given fundamental non-empty set. Suppose H be a space of linear real functions defined on Ω satisfying that (i) 1 ∈ H (ii) for every d ≥ 1, X1 , X2 , ..., Xd ∈ H and ϕ ∈ Cb.Lip (Rd ) it holds ϕ(X1 , X2 , ..., Xd ) ∈ H i.e., with respect to Lipschitz bounded functions, H is stable. Then (Ω, H, E) is a sub-expectation space, where E is a sub-expectation defined as the following. Definition 2.1. A functional E : H → R satisfying the below four features is known as a subexpectation. Let Z, Y ∈ H, then (1) E[Z] ≤ E[Y ] if Z ≤ Y . (2) E[K] = K, for all K ∈ R. (3) E[αZ] = αE[Z], for all α ∈ R+ . (4) E[Z] + E[Y ] ≥ E[Z + Y ].

3

821

Faiz Faizullah 819-831

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

The above properties (1), (2), (3) and (4) are known as monotonicity, constant preserving, positive homogeneity and sub-additivity respectively. Moreover, let Ω be the space of all Rd -valued continuous paths (wt )t≥0 starting from zero. Also, suppose that associated with the below distance, Ω is a metric space ∞ X 1 1 2 ( max |w1 − wt2 | ∧ 1). ρ(w , w ) = 2i t∈[0,k] t i=1

Fix T ≥ 0 and set L0ip (ΩT ) = {φ(Bt1 , Bt2 , ..., Btm ) : m ≥ 1, t1 , t2 , ..., tm ∈ [0, T ], φ ∈ Cb.Lip (Rm×d ))}, 0 where B is the canonical process, L0ip (Ωt ) ⊆ L0ip (ΩT ) for t ≤ T and L0ip (Ω) = ∪∞ n=1 Lip (Ωn ). The 1

completion of L0ip (Ω) under the Banach norm E[|.|p ] p , p ≥ 1 is denoted by LpG (Ω), where LpG (Ωt ) ⊆ LpG (ΩT ) ⊆ LpG (Ω) for 0 ≤ t ≤ T < ∞. We indicate the filtration generated by the canonical process {W (t)}t≥0 , as Ft = σ{Ws , 0 ≤ s ≤ t} and F = {Ft }t≥0 . Suppose πT = {t0 , t1 , ..., tN }, 0 ≤ t0 ≤ t1 ≤ ... ≤ tN ≤ ∞ be a partition of [0, T ]. Set p ≥ 1, then MGp,0 (0, T ) indicates a collection of the below type processes N −1 X αt (w) = βi (w)I[ti ,ti+1 ] (t), (2.1) i=0

LpG (Ωti ),

where βi ∈ i = 0, 1, ..., N − 1. Furthermore, the completion of MGp,0 (0, T ) with the below given norm is indicated by MGp (0, T ), p ≥ 1 T

Z

E[|αs |p ]ds}1/p .

kαk = { 0

Definition 2.2. A stochastic process {W (t)}t≥0 of d-dimensional satisfying the below properties is called a G-Brownian motion (1) W (0) = 0. (2) For any t, m ≥ 0, the increment Wt+m − Wt is G-normally distributed and independent from Wt1 , Wt2 , ........Wtn , for n ∈ N and 0 ≤ t1 ≤ t2 ≤, ..., ≤ tn ≤ t, Definition 2.3. Let αt ∈ MG2,0 (0, T ) having the form (2.1). Then the G-quadratic variation process {hW it }t≥0 and G-Itˆo’s integral I(α are respectively defined by hW it =

Wt2

Z −2

t

Ws dWs , 0

Z I(α) =

T

αs dWs =

N −1 X

0

βi (Wti+1 − Wti ).

i=0

The below two results are taken from the book [18]. They are called as H¨ older’s and Gronwall’s inequalities respectively, .

4

822

Faiz Faizullah 819-831

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Lemma 2.4. Assume m, n > 1 such that Z

b

1 m

+

1 n

= 1 and ξ ∈ L2 then ηξ ∈ L1 and

b

Z

m

ηξ ≤

 m1 Z

b n

|η|

a

|ξ|

a

 n1 .

a

Lemma 2.5. Let η(t) ≥ 0 and ξ(t) be continuous real functions defined on [a, b]. If for all t ∈ [a, b], Z b ξ(t) ≤ K + η(s)ξ(s)ds, a

where K ≥ 0, then Rt

ξ(t) ≤ Ke

a

η(s)ds

,

for all t ∈ [a, b]. Definition 2.6. Suppose that the group of entire probability measures on (Ω, B(Ω) is indicated by P. The capacity is denoted by Cˆ and is given by ˆ C(D) = sup P (D), P ∈P

where D ∈ B(Ω) is Borel σ-algebra of Ω. Definition 2.7. A set D ∈ B(Ω) is called polar if ˆ C(D) = 0. A characteristic fulfills quasi-surely (in short q.s.) if it fulfills outer a polar set. Now we state the following result [4]. Theorem 2.8. Let Z ∈ L2 . Then for every  > 0, E[|Z|2 ] 2 ˆ C(|Z| > ) ≤ .  The following lemma, known as Doob’s martingale inequality, can be found in [14]. Lemma 2.9. Assume [a, b] be a bounded interval of R+ . Consider an Rd valued G-martingale {Z(t)}t≥0 . Then p p ) E[|Z(b)|P ], E[ sup |Z(t)|p ] ≤ ( p − 1 a≤t≤b where p > 1 and Z(t) ∈ LpG (Ω, Rd ). In particular, if p = 2 then E[supa≤t≤b |Z(t)|2 ] ≤ 4E[|Z(b)|2 ]. The following lemma, known as Banach contraction mapping principle, is borrowed from the book [12]. Lemma 2.10. Assume Z is a complete metric space. Let L : Z → Z is a contraction mapping. Then L holds a unique fixed point in Z. 5

823

Faiz Faizullah 819-831

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

3

Existence and uniqueness results

Firstly, we demonstrate a useful lemma. This lemma will be utilized in the upcoming existenceuniqueness result. This will also be used in the proof of path wise asymptotic estimates for the solutions to SPDEs in the G-framework. Lemma 3.1. Let equation (1.1) admits a solution Z(t). Suppose (1.3) holds. Then  E[ sup |Z(s)|2 ] ≤ 1 + 4E|Z0 |2 e16C(T +2)T , 0≤s≤T

where the constant C > 0 is already defined. Proof. Let k ≥ 1 be an arbitrary integer. Set the following stopping time τk = T ∧ inf{t ∈ [0, T ] :k Z(t) k≥ k} and Z k (t) = Z(t ∧ τk ). Clearly, τk ↑ T a.s. as k → ∞ and Z k (t) satisfies the following equation Z t Z t Z k (t) = Z0 + κ(s, Z k (s), Z k (qs))I[0,τk ] ds + λ(s, Z k (s), Z k (qs))I[0,τk ] dhW, W i(s) 0 0 Z t + µ(s, Z k (s), Z k (qs))I[0,τk ] dW (s). 0

By virtue of the basic inequality |

P4

i+1 ci |

2

≤4

P4

2 i+1 |ci | ,

we have

Z t 2 Z t 2 k k k k |Z (t)| ≤ 4|Z0 | + 4 κ(s, Z (s), Z (qs))I[0,τk ] ds + 4 λ(s, Z (s), Z (qs))I[0,τk ] dhW, W i(s) 0 0 2 Z t + 4 µ(s, Z k (s), Z k (qs))I[0,τk ] dW (s) . k

2

2

0

Taking sub-expectation on both sides, we have Z t 2 k k E[ sup |Z (s)| ] ≤ 4E|Z0 | + 4E[ sup κ(s, Z (s), Z (qs))I[0,τk ] ds ] 0≤s≤t 0≤s≤t 0 Z t 2 k k + 4E[ sup λ(s, Z (s), Z (qs))I[0,τk ] dhW, W i(s) ] k

2

2

0≤s≤t

0

Z t 2 k k + 4E[ sup µ(s, Z (s), Z (qs))I[0,τk ] dW (s) ]. 0≤s≤t 0

Use the H¨ older’s, Doob’s martingale’s and Burkholder-Davis-Gundy’s (BDG) inequalities [14].

6

824

Faiz Faizullah 819-831

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Then by applying condition (1.4) we get k

2

2

E[ sup |z (s)| ] ≤ 4E|Z0 | + 4T C 0≤s≤t

Z t

 1 + E|Z k (s)|2 + E|Z k (qs)|2 ds

0

+ 4T C

Z t

 1 + E|Z k (s)|2 + E|Z k (qs)|2 ds

0

Z t

 1 + E|Z k (s)|2 + E|Z k (qs)|2 ds 0  Z t 1 + 2E[ sup E|Z k (r)|2 ] ds, ≤ 4E|Z0 |2 + 8C(T + 2)

+ 16C

0≤r≤s

0

which yields k

2

Z t

2

1 + E[ sup |Z (s)| ] ≤ 1 + 4E|Z0 | + 8C(T + 2) 0≤s≤t

k

2



1 + 2E[ sup E|Z (r)| ] ds 0≤r≤s

0

 Z t 2 k 2 ≤ 1 + 4E|Z0 | + 16C(T + 2) 1 + E[ sup E|Z (r)| ] ds. 0

0≤r≤s

In view of the Gronwall inequality we obtain  1 + E[ sup |Z k (s)|2 ] ≤ 1 + 4E|Z0 |2 e16C(T +2)T . 0≤s≤T

Consequently,  E[ sup |Z(s)|2 ] ≤ 1 + 4E|Z0 |2 e16C(T +2)T . 0≤s≤T

The proof stands completed. Remark 3.2. Lemma 3.1 indicates that if problem (1.1) admits a solution Z(t), then it must be bounded i.e. in particular Z(t) ∈ MG2 ([0, T ]; Rn ). Theorem 3.3. Let (1.3) and (1.4) hold. Then equation (1.1) admits at most one solution Z(t) ∈ MG2 ([0, T ]; Rd ). Proof. Assume T > 0, 12KT (T + 2) < 1 and Z(t) ∈ MG2 ([0, T ]; Rd ). Define the mapping Z t Z t (LZ)(t) = Z0 + κ(s, Z(s), Z(qs))ds + λ(s, Z(s), Z(qs))dhW, W i(s) 0 0 Z t + µ(s, Z(s), Z(qs))dW (s), 0

t ∈ [0, T ]. It is clear that LZ is a continuous measurable {Ft }-adapted process. Taking sub-

7

825

Faiz Faizullah 819-831

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

expectation on both sides Z t E[ sup |(LZ)(t)| ] = E|Z0 + sup ( κ(s, Z(s), Z(qs))ds) 2

0≤t≤T

0≤t≤T

0

Z t + sup ( λ(s, Z(s), Z(qs))dhW, W i(s)) 0≤t≤T

0

Z t + sup ( µ(s, Z(s), Z(qs))dW (s))|2 0≤t≤T

0

Z

2

t

≤ 4E|Z0 | + 4E[ sup | 0≤t≤T

0

t

Z

λ(s, Z(s), Z(qs))dhW, W i(s)|2 ]

+ 4E[ sup | 0≤t≤T

κ(s, Z(s), Z(qs))ds|2 ]

0 t

Z

µ(s, Z(s), Z(qs))dW (s)|2 ].

+ 4E[ sup | 0≤t≤T

0

Use H¨ older’s, Doob martingale and BDG [14] inequalities. Then apply (1.4) to obtain t

Z

E[ sup |(LZ)(t)|2 ] ≤ 4E|Z0 |2 + 4T C 0≤t≤T

 1 + E|Z(s)|2 + E|Z(qs)|2 ds

0

Z

t

 1 + E|Z(s)|2 + E|Z(qs)|2 ds

+ 4T C Z

0 t

 1 + E|Z(s)|2 + E|Z(qs)|2 ds

+ 16C 0

!

t

Z

2

≤ 4E|Z0 | + 8C(T + 2)

1 + 2 sup E|Z(t)|

2

ds

0≤t≤T

0

Z

2

≤ 4E|Z0 | + 8C(T + 2)T + 8C(T + 2) 0

t

E[ sup |Z(t)|2 ]ds 0≤t≤T

2

 ≤ 4E|Z0 | + 4CT (2T + 1) + 8CT (2T + 1) 1 + 4E|Z0 |2 e8C(T +2)T < ∞. Thus kLZk < ∞ and LZ ∈ MG2 ([0, T ]; Rd ). This shows that L is a function from MG2 ([0, T ]; Rd ) to itself. Now we have to derive that L is a contraction function. Let Z, Y ∈ MG2 ([0, T ]; Rd ), then E[ sup |(LY )(t) − (LZ)(t)|2 ] = E( sup | 0≤t≤T

[κ(s, Y (s), Y (qs)) − κ(s, Z(s), Z(qs))]ds

0≤t≤T

Z

t

Z 0

t

[λ(s, Y (s), Y (qs)) − λ(s, Z(s), Z(qs))]dhW, W i(s)

+ 0

Z +

t

[µ(s, Y (s), Y (qs)) − µ(s, Z(s), Z(qs))]dW (s)|2 )

0

By the basic inequality |

P3

2 i=1 ci |

≤ 3

P3

i=1 |ci |

2

and monotonic property of sub-expectation we

8

826

Faiz Faizullah 819-831

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

obtain 2

E[ sup |(LY )(t) − (LZ)(t)| ] ≤ 3E 0≤t≤T

2 ! Z t sup [κ(s, Y (s), Y (qs)) − κ(s, Z(s), Z(qs))]ds

0≤t≤T

+ 3E + 3E

0

Z t 2 ! sup [λ(s, Y (s), Y (qs)) − λ(s, Z(s), Z(qs))]dhW, W i(s) 0≤t≤T 0 Z t 2 ! sup [µ(s, Y (s), Y (qs)) − µ(s, Z(s), Z(qs))]dW (s) .

0≤t≤T

0

Next we use the H¨ older’s inequality, BDG inequalities [14], Doob’s martingale inequality and Lipschitz condition (1.4) as follows Z t  2 2 E[ sup |(LY )(t) − (LZ)(t)| ] ≤≤ 3T E |κ(s, Y (s), Y (qs)) − κ(s, Z(s), Z(qs))| ds 0≤t≤T

0

Z

t

 + 3T E |λ(s, Y (s), Y (qs)) − λ(s, Z(s), Z(qs))| ds 0 Z t  2 + 12E |µ(s, Y (s), Y (qs)) − µ(s, Z(s), Z(qs))| ds 0 Z t ≤ 3T K E(|Y (s) − Z(s)|2 + |Y (qs) − Z(qs)|2 )ds 0 Z t + 3T K E(|Y (s) − Z(s)|2 + |Y (qs) − Z(qs)|2 )ds 0 Z t + 12K E(|Y (s) − Z(s)|2 + |Y (qs) − Z(qs)|2 )ds 0 Z t = 6K(T + 2) E(|Y (s) − Z(s)|2 + |Y (qs) − Z(qs)|2 )ds 0 Z t ≤ 12K(T + 2) E( sup |Y (t) − Z(t)|2 )ds 2

0

0≤t≤T

≤ 12KT (T + 2)E( sup |Y (t) − Z(t)|2 ) 0≤t≤T

In view of 12KT (T + 2) < 1 and lemma 2.10, the function L admits a unique fixed point in MG2 ([0, T ]; Rd ), i.e., there is a unique stochastic process Z(t, w), which fulfills E( sup |Y (t) − Z(t)|2 ) = 0. 0≤t≤T

Thus problem (1.1) admits a unique solution Z(t) in [0, T ]. Assume T0 = T , Tj = min{T + T 2 d Tj−1 , j−1 q }, where j = 1, 2, 3, ... Then it is clear that Tj → ∞ as j → ∞ and MG ([Tj−1 , Tj ]; R ) is a Banach space. Now suppose that (1.1) admits a unique solution ψj−1 (t) in [0, Tj−1 ], let Z ∈ MG2 ([Tj−1 , Tj ]; Rd ) and define Z t Z t (LZ)(t) = ψj−1 (Tj−1 ) + κ(s, Z(s), ψj−1 (qs))ds + λ(s, Z(s), ψj−1 (qs))dhW, W i(s) Tj−1

Z

Tj−1

t

+

µ(s, Z(s), ψj−1 (qs))dW (s), Tj−1

9

827

Faiz Faizullah 819-831

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

t ∈ [Tj−1 , Tj ]. Obviously, LZ ∈ MG2 ([Tj−1 , Tj ]; Rd ). Using identical arguments as above one can derive that E[sup0≤t≤T |(LY )(t) − (LZ)(t)|2 ] ≤ 12KT (T + 2)E(sup0≤t≤T |Y (t) − Z(t)|2 ) i.e., the mapping L admits a fixed point Z in MG2 ([Tj−1 , Tj ]; Rd ) and Z(Tj−1 ) = ψj−1 (Tj−1 ). Thus ( ψj−1 (t), if t ∈ [0, Tj−1 ) ; ψj (t) = Z(t), if t ∈ [Tj−1 , Tj ]

is the solution of problem (1.1) in [0, Tj ]. Hence by induction, the proof stands completed.

4

Path-wise asymptotic estimate

This section presents the path-wise asymptotic estimate for the solution to problem (1.1). We use 1 lemma 3.1 to determine that the second moment of Lyapunov exponent lim sup log|Z(t)| [16] is t→∞ t bounded. Theorem 4.1. Let the linear growth condition (1.3) is satisfied. Then 1 lim sup log|Z(t)| ≤ 8C(T + 2), q.s. t

t→∞

Proof. Using lemma 3.1, for each j = 1, 2, ..., E( sup

|Z(t)|2 ) ≤ K1 eK2 j ,

j−1≤t≤j

 where K1 = 1 + 4E|X0 |2 and K2 = 16C(T + 2). For any arbitrary  > 0, in view of theorem 2.8 we obtain ˆ : C(w

sup

|Z(t)|2 > e(K2 +)j ) ≤

j−1≤t≤j

E[supj−1≤t≤j |Z(t)|2 ] e(K2 +)j

K1 eK2 j e(K2 +)j = K1 e−j . ≤

For almost all w ∈ Ω, the Borel-Cantelli lemma follows that a random integer j0 = j0 (w) exists such that sup |Z(t)|2 ≤ e(K2 +)j whenever j ≥ j0 , j−1≤t≤j

which yields, K2 +  1 lim sup log|Z(t)| ≤ t→∞ t 2 1  = [16C(T + 2)] + 2 2  = 8C(T + 2) + , q.s. 2 10

828

Faiz Faizullah 819-831

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

But  is arbitrary, so 1 lim sup log|Z(t)| ≤ 8C(T + 2), q.s. t

t→∞

The proof stands completed.

5

Conclusion

The current investigation presents the study of stochastic pantograph differential equations in the G-framework. The Gronwall’s, Burkholder-Davis-Gundy’s (in short BDG), Doobs martingale and H¨ older’s inequalities are utilized to obtain the results. By virtue of the growth condition, it is revealed that solutions of the stated equations are bounded. The existence and uniqueness results for G-SPDEs are derived. In addition, the path-wise asymptotic estimates for the solutions to SPDEs in the G-framework are determined. The results of the current paper open several new research directions. For example, what are the p-moment estimates for SPDEs in the Gframework? How to develop the existence-uniqueness results with non-linear and non-Lipschitz conditions? What about the stability of solutions for these equations? etc. We hope this article will play a key role to provide framework for the concepts briefly discussed.

6

Acknowledgements

The financial support of TWAS-UNESCO Associateship-Ref. 3240290714 at Centro de Investigacin en Matemticas, A.C. (CIMAT) Jalisco S/N Valenciana A.P. 402 36000 Guanajuato, GTO Mexico, is deeply appreciated and acknowledged. We are grateful to NUST research directorate for providing publication charges and awards.

References [1] X. Bai, Y. Lin, On the existence and uniqueness of solutions to stochastic differential equations driven by G-Brownian motion with Integral-Lipschitz coefficients, Acta Mathematicae Applicatae Sinica, English Series, 3(30) (2014) 589-610. [2] C. T.H. Baker and E. Buckwar, Continuous Θ-methods for the stochastic stochastic pantograph equation, Electronic Transactions on Numerical Analysis, 11 (2000) 131-151. [3] V.V Bolotin, Random vibrations of elastic systems, Martinus Nijhoff,The Hague (1984). [4] L. Denis, M. Hu, S. Peng, Function spaces and capacity related to a sublinear expectation: Application to G-Brownian motion paths, Potential Anal., 34 (2010) 139–161. [5] F. Faizullah, Existence and uniqueness of solutions to SFDEs driven by G-Brownian motion with non-Lipschitz conditions, Journal of Computational Analysis and Applications, 2(23) (2017) 344-354. 11

829

Faiz Faizullah 819-831

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[6] F. Faizullah, On the pth moment estimates of solutions to stochastic functional differential equations in the G-framework, SpringerPlus, 5(872) (2016) 1-11. [7] F. Faizullah, A note on p-th moment estimates for stochastic functional differential equations in the framework of G-Brownian motion, Iranian Journal of Science and Technology, Transaction A: Science, 3(40) (2016) 1-8. [8] F. Faizullah, Existence results and moment estimates for NSFDEs driven by G-Brownian motion, Journal of Computational and Theoretical Nanoscience, 7(13) (2016) 1-8. [9] F. Faizullah, Existence of solutions for G-SFDEs with Cauchy-Maruyama Approximation Scheme, Abstract and Applied Analysis, http://dx.doi.org/10.1155/2014/809431, (2014) 1– 8. [10] F. Faizullah, Existence of solutions for stochastic differential equations under G-Brownian motion with discontinuous coefficients, Zeitschrift fr Naturforschung A., 67A (2012) 692–698. [11] Z. Fan, M. Liu and W. Cao, Existence and uniqueness of the solutions and convergence of semi-implicit Euler methods for stochastic pantograph equations, J. Math. Anal. Appl., 325 (2007) 11421159. [12] J.K. Hale, Introduction to Functional Differential Equations, Springer, New York, 1993. [13] M. Hu, S. Peng, Extended conditional G-expectations and related stopping times, arXiv:1309.3829v1[math.PR] 16 Sep 2013. [14] F. Gao, Pathwise properties and homeomorphic flows for stochastic differential equations driven by G-Brownian motion, Stochastic Processes and thier Applications, 2 (2009) 3356– 3382. [15] lyas Khan, F. Ali, N. A. Shah, Interaction of magnetic field with heat and mass transfer in free convection flow of a Walters-B fluid, The European Physical Journal Plus, 131(77) (2016) 1-15. [16] Y.H. Kim, On the pth moment estimates for the solution of stochastic differential equations, J. Inequal. Appl., 395 (2014) 1-9. [17] X. Li, S. Peng, Stopping times and related Ito’s calculus with G-Brownian motion, Stochastic Processes and thier Applications, 121 (2011) 1492–1508. [18] X. Mao, Stochastic Differential Equations and their Applications, Horwood Publishing Chichester, 1997. [19] J.R. Ockendon and A.B. Taylor, The dynamics of a current collection system for an electric locomotive, Proc. Roy. Soc. A, 322 (1971) 447468. [20] S. Peng, G-expectation, G-Brownian motion and related stochastic calculus of Ito’s type, The abel symposium 2005, Abel symposia 2, edit. benth et. al., Springer-vertag., (2006) 541-567. 12

830

Faiz Faizullah 819-831

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[21] S. Peng, Multi-dimentional G-Brownian motion and related stochastic calculus under Gexpectation, Stochastic Processes and thier Applications, 12 (2008) 2223–2253. [22] Y. Ren, Q. Bi, R. Sakthivel, Stochastic functional differential equations with infinite delay driven by G-Brownian motion, Mathematical Methods in the Applied Sciences, 36(13) (2013) 1746–1759. [23] J.B Roberts, P.D. Spanos, Random vibration and statistical linearization, Dover, New York (2003). [24] B. Skalmierski, A. Tylikowski, Stability of dynamical systems, Polish Scientific Editors, Warsaw (1973). [25] B. Skalmierski, A. Tylikowski, Stochastic processes in dynamics, Polish Scientific editors, Warsaw (1982). [26] K. Sobezyk, Stochastic waive propagation, Polish Scientific editors, Warsaw (1984). [27] K. Sobezyk, Stochastic differential equations with applications to Physics and Engineering, Kluwer Academic, Dordrecht (1991). [28] K. Sobezyk, Jr. B.F. Spencer, Random Fatigue: Frome data to theory Academic Press, Boston (1992). [29] F. Wei, Y. Cai, Existence, uniqueness and stability of the solution to neutral stochastic functional differential equations with infinite delay under non-Lipschitz conditions, Advances in Difference Equations, 151 (2013) 1–12. [30] Y. Xiao, M. Song and M. Liu, Convergence and stability of semi-implicit Euler method with variable stepsize for a linear stochastic pantograph differential equation, International Journal of Numerical Analysis and Modeling, 2(8) (2011) 214225. [31] Y. Xiao, H.Y. Zhang, A note on convergence of semi-implicit Euler methods for stochastic pantograph equations, Computers and Mathematics with Applications, 59 (2010) 1419-1424. [32] G. Zamana, Y. H. Kang, I. H. Jung, Stability analysis and optimal vaccination of an SIR epidemic model, BioSystems, 93 (2008) 240-249. [33] G. Zaman, Y. H. Kang, G. Cho, I. H. Jung, Optimal strategy of vaccination & treatment in an SIR epidemic model, Mathematics and Computers in Simulation, 136 (2017) 63-77.

13

831

Faiz Faizullah 819-831

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On dual partial metric topology and a fixed point theorem Muhammad Nazam1 , Choonkil Park2∗ , Muhammad Arshad3 and Sungsik Yun4 1,3

Department of Mathematics and Statistics, International Islamic University, H-10, Islamabad, Pakistan e-mail: [email protected]; [email protected] 2

Research Institute for Natural Sciences, Hanyang University, Seoul 04763, Korea e-mail: [email protected] 4 Department of Financial Mathematics, Hanshin University, Gyeonggi-do 18101, Korea e-mail: [email protected] Abstract. In this paper, we present some properties of dual partial metric (abbreviation, pmetric) topology and investigate a fixed point result for self mappings in dual pmetric space. This result generalizes Banach contraction principle in a different way than in the known results from the literature. The article includes an example which shows the validity of our result.

1. Introduction Metric spaces are inevitably Hausdorff and so cannot, for example, be used to study non-Hausdorff topologies such as those required in the Tarskian approach to programming language semantics. Matthews [3] presented a symmetric generalized metric for such topologies, an approach which sheds new light on how metric tools such as Banach’s Theorem can be extended to non-Hausdorff topologies. Matthews [3] defined the partial metric (pmetric) p on nonempty set X (p : X × X → [0, ∞)) and generalized Banach fixed point theorem (see [2, 7]). Essentially, the partial metric generalization is that the distance of a point from itself is not necessarily zero anymore. The axioms were first introduced in [3], where the range of a pmetric was restricted to [0, ∞). Neill [5] extended the range to (−∞, ∞) and called this functional a dual partial metric denoted by p∗ , since this is both natural (in that there is no difficulty in extending the results from [3]) and essential for a natural dual pmetric. The natural context in which to view a partial metric space (X, p) is as a bitopological space (X, τ (p), τ (d)). Neill [5] showed that successive conditions on a valuation can ensure that the pmetric topology is first of all order consistent (with the underlying poset), then equivalent to the Scott topology, and finally that the induced metric topology is equivalent to the patch topology. Neill also established some topological properties of functional p∗ but did not give any fixed point result in p∗ . However, Oltra et al. [4] established the criteria of convergence of sequences and completeness in p∗ and generalized the fixed point result presented by Matthews. In this paper, we present some more topological properties of p∗ and establish fixed point results for self mappings in dual pmetric space. These results generalize Banach contraction principle in a different way than in the known results from the literature. The article includes an example which shows the validity of our results. 2. Valuation and dual pmetric Throughout this paper the letters R+ 0 , R and N will represent the set of nonnegative real numbers, real numbers and natural numbers, respectively. Definition 1. (Consistent Semilattice) Let (X, ) be a poset such that (1) for all x, y ∈ X x ∧ y ∈ X, 02010

Mathematics Subject Classification: 47H09; 47H10; 54H25 fixed point, dual pmetric topology; complete dual pmetric space. ∗ Corresponding author: Choonkil Park (email: [email protected]) 0Keywords:

832

Nazam ET AL 832-840

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(2) if {x, y} ⊆ X is consistent, then x ∨ y ∈ X. Then (X, ) with (1) and (2) is called a consistent semilattice. Definition 2. (Valuation Space) A valuation space is a consistent semilattice (X, ) and a function µ : X → R, called valuation, such that (1) if x  y and x 6= y, µ(x) < µ(y) and (2) if {x, y} ⊆ X is consistent, then µ(x) + µ(y) = µ(x ∧ y) + µ(x ∨ y). Matthews pmetric is defined as follws. Definition 3. [3] Let X be a nonempty set and p : X × X → R+ 0 satisfy the following properties: for all x, y, z ∈ X (p1 ) x = y ⇔ p (x, x) = p (x, y) = p (y, y) , (p2 ) p (x, x) ≤ p (x, y) , (p3 ) p (x, y) = p (y, x) , (p4 ) p (x, z) + p (y, y) ≤ p (x, y) + p (y, z) . Then p is called a pmetric. Definition 4. Let p be a pmetric defined on a nonempty set X. The functional p∗ : X × X → R defined by p∗ (x, y) = p(x, y) − p(x, x) − p(y, y) for all x, y ∈ X is called a dual partial metric (dual pmetric) on X and (X, p∗ ) is known as a dual partial metric space. Moreover, it can easily be proved that the expression d∗ (x, y) = 2p∗ (x, y) − p∗ (x, x) − p∗ (y, y) defines a metric on X. Note that the function p : X × X → R+ 0 satisfies (p1 ) − (p4 ), that is, ∗ ∗ ∗ ∗ (p1 ) x = y ⇔ p (x, x) = p (x, y) = p (y, y) , (p∗2 ) p∗ (x, x) ≤ p∗ (x, y) , (p∗3 ) p∗ (x, y) = p∗ (y, x) , (p∗4 ) p∗ (x, z) + p∗ (y, y) ≤ p∗ (x, y) + p∗ (y, z). Unlike other generalized metrics (such as the quasimetrics) this duality is not a consequence of a lack of symmetry in the axioms. Indeed it is perhaps one of the strengths of the partial metric generalization that symmetry is preserved as an axiom. Remark 1. We observe that, as in the metric case, if p∗ is a dual pmetric then p∗ (x, y) = 0 implies x = y but converse may not be true. p∗ (x, x) referred to as the size or weight of x, is a feature used to describe the amount of information contained in x. It is obvious that if p is a partial metric then p∗ is a dual partial metric but converse is not true. Note that p∗ (x, x) ≤ p∗ (x, y) does not imply p (x, x) ≤ p (x, y). Nevertheless, the restriction of p∗ to R+ 0 is a partial metric. Lemma 1. Suppose that (X, , µ) is a valuation space. Then p∗ (x, y) = µ(x ∨ y) defines a dual pmetric on X. Proof. The axioms (p∗2 ) and (p∗3 ) are immediate. For (p∗1 ), we proceed as if p∗ (x, x) = p∗ (x, y) = p∗ (y, y) , then µ(x ∨ y) = µ(x) = µ(y) implies x = y. The converse is obvious. We prove (p∗4 ): p∗ (x, z) + p∗ (y, y)

= ≤ = =

µ(x ∨ z) + µ(y) µ(x ∨ y ∨ z) + µ[(x ∨ y) ∧ (y ∨ z)] µ(x ∨ y ∨ z) + µ(x ∨ y) + µ(y ∨ z) − µ(x ∨ y ∨ z) µ(x ∨ y) + µ(y ∨ z) = p∗ (x, y) + p∗ (y, z), 833

Nazam ET AL 832-840

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

as desired.



Example 1. Let p be a pmetric defined on a nonempty set X = {[a, b] ; a ≤ b}. The functional p∗ : X × X → R defined by  c − d if max {b, d} = b, min {a, c} = a ∗ p ([a, b] , [c, d]) = a − b if max {b, d} = d, min {a, c} = c defines a daul pmetric on X. Example 2. Let d be a metric and p be a pmetric defined on a nonempty set X and c > 0 be a real number. The functional p∗ : X × X → R defined by p∗ (x, y) = d(x, y) − c for all x, y ∈ X is a dual pmetric on X. For a partial metric space (X, p), we immediately have a natural definition (although slightly different from the one given in [3]) for the open balls: B (x; p) = {y ∈ X|p(x, y) < p(x, x) + } for all x ∈ X. > 0.

(2.1)

The set T [p] = {B (x; p), x ∈ X. > 0} defines a pmetric topology on X. It can easily be seen that T [p] is a T0 topology. The equation (2.1) naturally implies that B∗ (x; p∗ ) = {y ∈ X|p∗ (x, y) < p∗ (x, x) + } for all x ∈ X,  > 0, which gives a structure for open balls in dual pmetric space (X, p∗ ). Unlike their metric counterpart, some dual pmetric open balls may be empty. For example, if p∗ (x, x) 6= 0, then Bp∗∗ (x,x) (x; p∗ )

= {y ∈ X|p∗ (x, y) < 2p∗ (x, x)} = {y ∈ X|p(x, y) − p(x, x) − p(y, y) < −2p(x, x)} = {y ∈ X|p(x, y) + p(x, x) < p(y, y)} = Φ.

We prove that the set {B∗ (x; p∗ ); for all x ∈ X,  > 0} of open balls forms the basis for dual pmetric topology denoted by T [p∗ ]. Each dual pmetric topology is T0 topology and every open ball in a dual pmetric space is an open set. Theorem 1. The set {B∗ (x; p∗ ); for all x ∈ X,  > 0} of open balls forms the basis for dual pmetric topology denoted by T [p∗ ]. Proof. It is obvious that X = ∪x∈X B∗ (x; p∗ ) and for any two open balls B∗ (x; p∗ ) and Bδ∗ (y; p∗ ), we note that B∗ (x; p∗ ) ∩ Bδ∗ (y; p∗ ) = ∪ {Bκ∗ (c; p∗ )| c ∈ B∗ (x; p∗ ) ∩ Bδ∗ (y; p∗ )} where, κ = p∗ (c, c) + min { − p∗ (x, c), δ − p∗ (y, c)} , as desired.



Theorem 2. Each dual pmetric topology is a T0 topology. Proof. Suppose p∗ : X × X → R is a dual pmetric and x 6= y. Then without loss of generality, we have p∗ (x, x) < p∗ (x, y) for all x, y ∈ X. Choose  = p∗ (x, y) − p∗ (x, x). Since p∗ (x, x) < p∗ (x, x) +  = p∗ (x, y) , x ∈ B∗ (x; p∗ ) and y ∈ / B∗ (x; p∗ ) because otherwise we obtain an absurdity (p∗ (x, y) < p∗ (x, y)).



Theorem 3. Every open ball in a dual pmetric space is an open set. 834

Nazam ET AL 832-840

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. Let (X, p∗ ) be a dual pmetric space and B∗ (v; p∗ ) be an open ball, centered at v, of radius  > 0. We show that for x 6= v, x ∈ Bδ∗ (x; p∗ ) ⊆ B∗ (v; p∗ ). Suppose that x ∈ B∗ (v; p∗ ). Using (p∗1 ) and (p∗2 ), we have p∗ (x, x) < p∗ (x, v) < p∗ (v, v) + . ∗







Take δ =  + p (v, v) − p (x, x). (2.2) implies p (x, x) < p (x, x) + δ. Thus x ∈ Next we show that Bδ∗ (x; p∗ ) ⊆ B∗ (v; p∗ ). Suppose that y ∈ Bδ∗ (x; p∗ ). Then

(2.2) Bδ∗ (x; p∗ ).

p∗ (x, y) < p∗ (x, x) + δ, p∗ (x, y) < p∗ (x, x) +  + p∗ (v, v) − p∗ (x, x) =  + p∗ (v, v), which implies that y ∈ B∗ (v; p∗ ).



Remark 2. (1) To see in what sense p∗ is dual to p, we recall that the specialization order induced by a T0 -topology T , is defined by x T y if and only if for all O ∈ T , x ∈ O implies y ∈ O. Then, for a partial metric space (X, p), it is not difficult to check that: x T [p] y

⇔ p(x, y) = p(x, x) ⇔ p∗ (x, y) = p∗ (x, x) ⇔ y T [p∗ ] x.

It is also clear that p∗∗ = p. Now if (X, p) is a partial metric space, then d(x, y) = p(x, y) + p∗ (x, y), for all x, y ∈ X, defines a metric on X, which we call the induced metric. If we denote the metric topology by T [d], then T [d] = T [p] ∨ T [p∗ ]. (2) For complete valuation space T [p] = σp = Scott topology, moreover, if the valuation space is compact then T [p∗ ] = σp∗ = dual Scott topology. If (X, p∗ ) is a dual pmetric space, then the function dp∗ : X × X → R+ 0 defined by dp∗ (x, y) = p∗ (x, y) − p∗ (x, x),

(2.3)

is a quasi metric on X such that T [p∗ ] = T [dp∗ ] where B (x; dp∗ ) = {y ∈ X|dp∗ (x, y) < }. In this case, dsp∗ (x, y) = max{dp∗ (x, y), dp∗ (y, x)} defines a metric on X, known as induced metric. A dual pmetric p∗ can quantify the amount of information in an object x using the numerical measure p∗ (x, x) and also that p∗ has an open ball topology. This would not be of much use in Computer Science without a partial ordering. Therefore, we define a partial ordering and obtain some related results. Definition 5. Let (X, p∗ ) be a dual pmetric space. We define the relation p∗ on X 2 such that ∀x, y ∈ X, x p∗ y if and only if p∗ (x, x) = p∗ (x, y). Lemma 2. For each dual pmetric p∗ , p∗ is a partial ordering. Proof. We prove that p∗ is reflexive, antisymmetric and transitive. (O1) Since, p∗ (x, x) = p∗ (x, x) for all x ∈ X, x p∗ x. (O2) Suppose that x p∗ y and y p∗ x. Then p∗ (x, x) = p∗ (x, y) and p∗ (y, y) = p∗ (y, x). Using (p∗3 ), we have p∗ (x, x) = p∗ (x, y) = p∗ (y, y) and then by (p∗1 ) we obtain x = y. 835

Nazam ET AL 832-840

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(O3) For all x, y, z ∈ X, assume that x p∗ y and y p∗ z then p∗ (x, x) = p∗ (x, y) and p∗ (y, y) = p∗ (y, z). Due to (p∗4 ) we have p∗ (x, z) ≤ p∗ (x, y) + p∗ (y, z) − p∗ (y, y) = p∗ (x, x) + p∗ (y, y) − p∗ (y, y) , ∗ p (x, z) ≤ p∗ (x, x) , but also due to (p∗2 ) we have p∗ (x, x) ≤ p∗ (x, z). Thus p∗ (x, x) = p∗ (x, z) which implies that x p∗ z. Hence (O1), (O2) and (O3) ensure that p∗ defines a partial order on X.  Theorem 4. For each dual pmetric p∗ , T [p∗ ] is weakly order consistent topology over p∗ . Proof. We show that T [p∗ ] ⊆ T [p∗ ]. For this purpose it is sufficient to show that for all x ∈ X and >0 B∗ (x; p∗ ) = ∪ {{z|y p∗ z} |y ∈ B∗ (x; p∗ )} . Suppose that x, y, z ∈ X and  > 0 are such that y p∗ z and y ∈ B∗ (x; p∗ ). Consider p∗ (x, z) ≤ p∗ (x, y) + p∗ (y, z) − p∗ (y, y) by (p∗4 ) = p∗ (x, y), since y p∗ z, < p∗ (x, x) + , since y ∈ B∗ (x; p∗ ). This shows that z ∈ B∗ (x; p∗ ), which completes the proof.



Thus T [p∗ ] is a dual Scott-like topology over p∗ if each chain X has a least upper bound l and if lim p∗ (xn , xn ) = p∗ (l, l).

n→∞

Now we present a theorem containing conditions under which T [p∗ ] = T [p∗ ]. Theorem 5. Let p∗ : X 2 → R be a dual pmetric. Then T [p∗ ] = T [p∗ ] ⇔ ∀ x ∈ X, ∃  > 0 such that B∗ (x; p∗ ) = {y|x p∗ y} . Proof. Suppose that B∗ (x; p∗ ) = {y|x p∗ y} for all x ∈ X,  > 0 and for all U ∈ T [p∗ ], we have U = ∪x∈U {y|x p∗ y} = ∪x∈U B∗ (x; p∗ ) ∈ T [p∗ ]. Thus T [p∗ ] ⊆ T [p∗ ]. Using Theorem 4, we conclude that T [p∗ ] = T [p∗ ]. Conversely, suppose that T [p∗ ] = T [p∗ ]. Then for all x ∈ X {y|x p∗ y} ∈ T [p∗ ]. Thus there exists  > 0 such that x ∈ B∗ (x; p∗ ) ⊆ {y|x p∗ y}. Now if x ∈ B∗ (x; p∗ ), then {y|x p∗ y} ⊆ B∗ (x; p∗ ). As a result, B∗ (x; p∗ ) = {y|x p∗ y}.  3. Convergence criteria in dual pmetric space The following definition and lemma describe the convergence criteria established by Oltra et al. [4]. Definition 6. [4] Let (X, p∗ ) be a dual partial metric space. (1) A sequence {xn }n∈N in (X, p∗ ) is called a Cauchy sequence if limn,m→∞ p∗ (xn , xm ) exists and is finite. (2) A dual partial metric space (X, p∗ ) is said to be complete if every Cauchy sequence {xn }n∈N in X converges, with respect to T [p∗ ], to a point υ ∈ X such that p∗ (x, x) =

lim p∗ (xn , xm ).

n,m→∞

Lemma 3. [4] (1) Every Cauchy sequence in (X, dsp∗ ) is also a Cauchy sequence in (X, p∗ ). (2) A dual partial metric (X, p∗ ) is complete if and only if the metric space (X, dsp∗ ) is complete. 836

Nazam ET AL 832-840

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(3) A sequence {xn }n∈N in X converges to a point υ ∈ X with respect to T [(dsp∗ )] if and only if lim p∗ (υ, xn ) = p∗ (υ, υ) = lim p∗ (xn , v).

n→∞

n→∞



(4) If limn→∞ xn = υ such that p (υ, υ) = 0, then limn→∞ p∗ (xn , k) = p∗ (υ, k) for every k ∈ X. 4. Fixed point theorem In this section, by establishing Theorem 8 in dual pmetric space, we show that Banach’s contraction mapping theorem can be generalized to many T0 topologies for applications in program verification and domain theory. Let B denote the set of all functions β : [0, ∞) → [0, 1) which satisfy the condition: lim β(tn ) = 1 implies lim tn = 0.

n→∞

n→∞

The following generalization of Banach’s contraction principle, proved in 1973, is due to Geraghty [1]. Theorem 6. [1] Let (M, d) be a complete metric space and T : M → M be a mapping. If there exists β ∈ B such that, for all j, k ∈ M , d(T (j), T (k)) ≤ β(d(j, k))d(j, k). Then T has a unique fixed point υ ∈ M and, for any choice of the initial point j0 ∈ M , the sequence {jn } defined by jn = T (jn−1 ) for each n ≥ 1 converges to the point υ. In [6], La Rosa and Vetro extended the notion of Geraghty contraction mappings to the context of partial metric spaces and proved partial metric version of Theorem 6, stated below: Theorem 7. [6, Theorem 3.5] Let (M, p) be a complete partial metric space. If the self mapping T : M → M is a Cir´ıc type Geraghty contraction, then T has a unique fixed point j ∈ M and the Picard iterative sequence {T n (j0 )}n∈N converges to υ with respect to τ (ps ), for any j0 ∈ M . Moreover, p(υ, υ) = 0. We prove the same in dual pmetric space. Theorem 8. Let (M, p∗ ) be a complete dual pmetric space and T : M → M be a mapping such that for all j, k ∈ M and β ∈ B |p∗ (T (j), T (k))| ≤ β (Q(j, k)) Q(j, k), (4.1) where Q(j, k) = max {|p∗ (j, k)| , |p∗ (j, T (j))| , |p∗ (k, T (k))|} . Then T has a unique fixed point υ ∗ in M . Proof. Let j0 be an initial point in M and jn = T (jn−1 ), n ≥ 1, an iterative sequence starting with j0 . If there exists a positive integer r such that jr+1 = jr , then jr is the fixed point of T and it completes the proof. Suppose that jn 6= jn+1 for all n ∈ N and by (4.1), we have |p∗ (jn+1 , jn+2 )| = ≤ = |p∗ (jn+1 , jn+2 )|
0, then from (4.3) we have |p∗ (jn+1 , jn+2 )| ≤ β(|p∗ (jn , jn+1 )|)|p∗ (jn , jn+1 )|, 837

Nazam ET AL 832-840

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

which implies that ∗ p (jn+1 , jn+2 ) ∗ p∗ (jn , jn+1 ) ≤ β(|p (jn , jn+1 )|). Taking limit we have lim β(|p∗ (jn , jn+1 )|) = 1.

n→∞

Since β ∈ B, limn→∞ |p∗ (jn , jn+1 )| = 0 entails α1 = 0. Hence lim p∗ (jn , jn+1 ) = 0.

n→∞

Similarly, using (4.1) we can prove that lim p∗ (jn , jn ) = 0.

n→∞

Now since dp∗ (jn , jn+1 ) = p∗ (jn , jn+1 ) − p∗ (jn , jn ), we deduce that limn→∞ dp∗ (jn , jn+1 ) = 0 for all n ≥ 1. Now, we show that the sequence {jn } is a Cauchy sequence in (M, dsp∗ ). Suppose on contrary that {jn } is not a Cauchy sequence. Then given  > 0, we will construct a pair of subsequences {jmr } and {jnr } violating the following condition for least integer nr such that mr > nr > r where r ∈ N dp∗ (jmr , jnr ) ≥ .

(4.4)

In addition, upon choosing the smallest possible mr , we may assume that dp∗ (jmr , jnr−1 ) < . By the triangle inequality, we have 

≤ dp∗ (jmr , jnr ) ≤ dp∗ (jmr , jnr−1 ) + dp∗ (jnr−1 , jnr ) <  + dp∗ (jnr−1 , jnr ).

That is,  <  + dp∗ (jnr−1 , jnr ) for all r ∈ N. In the view of (4.5) and (2.3), we have

(4.5)

lim dp∗ (jmr , jnr ) = .

(4.6)

r→∞

Again using the triangle inequality, we have dp∗ (jmr , jnr ) ≤ dp∗ (jmr , jmr+1 ) + dp∗ (jmr+1 , jnr+1 ) + dp∗ (jnr+1 , jnr ) and dp∗ (jmr+1 , jnr+1 ) ≤ dp∗ (jmr+1 , jmr ) + dp∗ (jmr , jnr ) + dp∗ (jnr , jnr+1 ). Taking limit as r → +∞ and using (2.3) and (4.6), we obtain lim dp∗ (jmr+1 , jnr+1 ) = .

r→+∞

Now from contractive condition (4.1), we have |p∗ (jnr+1 , jmr+2 )| = |p∗ (T (jnr ), T (jmr+1 ))|, ≤ β(|p∗ (jnr , jmr+1 )|)|p∗ (jnr , jmr+1 )|. We conclude that

∗ p (jnr+1 , jmr+2 ) ∗ p∗ (jn , jm ) ≤ β(|p (jnr , jmr+1 )|). r r+1 By using (2.3), letting r → +∞ in the above inequality, we obtain lim β(|p∗ (jnr , jmr+1 )|) = 1.

r→∞

Since β ∈ B, limr→∞ |p∗ (jnr , jmr+1 )| = 0 and hence limr→∞ dp∗ (jnr , jmr+1 ) = 0 <  which contradicts our assumption (4.4). Arguing like above, we can have limr→∞ dp∗ (jmr , jnr+1 ) = 0 < . Hence {jn } is 838

Nazam ET AL 832-840

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

a Cauchy sequence in (M, dsp∗ ), that is, limn,m→∞ dsp∗ (jn , jm ) = 0. Since (M, dsp∗ ) is a complete metric space, {jn } converges to a point υ in M , i.e., limn→∞ dsp∗ (jn , υ) = 0. Then from Lemma 3, we get lim p∗ (υ, jn ) = p∗ (υ, υ) =

n→∞

lim p∗ (jn , jm ) = 0.

(4.7)

n,m→∞

We are left to prove that υ is a fixed point of T . For this purpose, using contractive condition (4.2) and (4.7), we get |p∗ (jn+1 , T (υ))| = |p∗ (T (jn ), T (υ))| ≤ β(|p∗ (jn , υ)|)|p∗ (jn , υ)|, ∗ lim |p (jn+1 , T (υ))| ≤ lim β(p∗ (jn , υ))p∗ (jn , υ).

n→∞ ∗

n→∞

This shows that p (υ, T (υ)) = 0. So from point of T . Uniqueness is obvious.

(p∗1 )

and (p∗2 ) we deduce that υ = T (υ) and hence υ is a fixed 

Corollary 1. Let (M, p) be a complete partial metric space and T : M → M be a mapping. If for any j, k ∈ M and β ∈ B, T satisfies the condition p(T (j), T (k)) ≤ β (Q(j, k)) Q(j, k),

(4.8) ∗

where Q(j, k) = max {p(j, k), p(j, T (j)), p(k, T (k))}, then T has a unique fixed point υ in M . ∗ Proof. Since the restriction of p∗ to R+ 0 , that is, p |R+ , is a partial metric p, the result is obvious. 0



The following example illustrates Theorem 8 and shows that condition (4.1) in dual pmetric space is more general than contractivity condition (4.8) in partial metric space. This example also emphasis the use of absolute value function in contractive condition (4.1). Example 3. Let M = [−1, 0] and define the functional p∗ ∨ : M × M → M by p∗ ∨ (j, k) = max{j, k} for all j, k ∈ M . Then (X, p∗ ∨ ) is a complete dualistic partial metric space. Define the mapping T : X → X and β by j 9 T (j) = and β(|j|) = , for all j ∈ M . 2 10 Without loss of generality we may assume that j ≥ k and then, j k j |p∗ ∨ (T (j), T (k))| = ∨ = , 2 2 2 |p∗ ∨ (j, k)| = |j| , j j ∗ |p ∨ (j, T (j))| = j ∨ = , 2 2 k k |p∗ ∨ (k, T (k))| = k ∨ = . 2 2  Thus Q(j, k) = max |j|, k2 and consider |p∗ ∨ (T (j), T (k))| ≤ β (Q(j, k)) Q(j, k) j ≤ β(|j|)|j| if Q(j, k) = |j| 2   j ≤ β k k if Q(j, k) = k . 2 2 2 2 The above inequalities are true for all j, k ∈ X. Therefore, the contractive condition (4.1) holds true. Thus all the conditions of Theorem 8 are satisfied by the mapping T . Note that j = 0 is the unique fixed point of T . Moreover, the contractive condition (4.8) in the statement of Corollary 1 does not exist for this particular case and hence the contractive condition (4.1) cannot be replaced with contractive condition (4.8) in Theorem 8 and as a result, Corollary 1 fails to ensure the fixed point of T . 839

Nazam ET AL 832-840

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

References [1] M. Geraghty, On contractive mappings, Proc. Am. Math. Soc. 40 (1973), 604–608. [2] H. Isik, D. Tukroglu, Some fixed point theorems in ordered partial metric spaces, J. Inequal. Special Functions 4 (2013), No. 2, 13–18. [3] S.G. Matthews, Partial metric topology, in Proceedings of the 11th Summer Conference on General Topology and Applications, 728 (1995), 183–197, New York Acad. Sci., New York. [4] S. Oltra, O. Valero, Banach’s fixed point theorem for partial metric spaces, Rend. Ist. Mat. Univ. Trieste 36 (2004), 17–26. [5] S.J. O’Neill, Partial metric, valuations and domain theory. Ann. New York Acad. Sci. 806 (1996), 304–315, New York Acad. Sci., New York. [6] V. L. Rosa, P. Vetro. Fixed points for Geraghty-contractions in partial metric spaces, J. Nonlinear Sci. Appl. 7 (2014), 1–10. [7] A. Shoaib, M. Arshad, M. A. Kutbi, Common fixed points of a pair of Hardy Rogers type mappings on a closed ball in ordered partial metric spaces, J. Comput. Anal. Appl. 17 (2014), 255–264.

840

Nazam ET AL 832-840

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

The approximation on analytic functions of infinite order represented by Laplace-Stieltjes transforms convergent in the half plane ∗ Xia Shen1 , and Hong Yan Xu2



1. College of Science, Jiujiang University, JiuJiang, 332005, China 2. Department of Informatics and Engineering, Jingdezhen Ceramic Institute, Jingdezhen, Jiangxi, 333403, China

Abstract One purpose of this paper is to investigate the growth of analytic function represented by Laplace-Stieltjes transform which is of infinite order and converges in the half plane, and a necessary and sufficient conditions on the growth of Laplace-Stieltjes transforms of finite XU order was obtained. Besiders, we further investigate the error in approximating on LaplaceStieltjes transform of finite XU -order, and obtained some relations between the error and growth of Laplace-Stieltjes transforms of finite XU -order. Key words: approximation, XU -order, Laplace-Stieltjes transform. 2010 Mathematics Subject Classification: 44A10, 30E10.

1

Introduction and basic notes Laplace-Stieltjes transform Z G(s) =

+∞

e−sx dα(x),

s = σ + it,

(1)

0

where α(x) is a bounded variation on any finite interval [0, Y ](0 < Y < +∞), and σ and t are real variables, named for Pierre-Simon Laplace and Thomas Joannes Stieltjes, is an integral transform similar to the Laplace transform. It can be used in many fields of mathematics, such as functional analysis, and certain areas of theoretical and applied probability. For Laplace-Stieltjes transform (1), Widder in [18] pointed out that G(s) can become the classical Laplace integral form Z ∞

e−st ϕ(t)dt,

G(s) = 0

when α(t) is absolutely continuous. Moreover, if α(t) is a step-function, we can choose a sequence {λn }∞ 0 satisfying 0 ≤ λ1 < λ2 < · · · < λn < · · · , λn → ∞ as n → ∞, (2) ∗ The

authors were supported by the National Natural Science Foundation of China (11561033, 61662037), the Natural Science Foundation of Jiangxi Province in China (20132BAB211001,20151BAB201008), and the Foundation of Education Department of Jiangxi (GJJ150902, GJJ160914) of China. † Corresponding author

1

841

Xia Shen ET AL 841-854

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

and

 a1 + a2 + · · · + an , λn ≤ x < λn+1 ;    0, 0 ≤ x < λ1 ; α(x) =    α(x+) + α(x−) , x > 0, 2 by Theorem 1 in [18, Page 36], then G(s) becomes a Dirichlet series G(s) =

∞ X

an e−λn s ,

s = σ + it.

(3)

n=1

(σ, t are real variables), an are nonzero complex numbers. Yu J. R. in 1963 [25] first investigated the growth and value distribution of Laplace-Stieltjes transform (1), and obtained the Valiron-Knopp-Bohr formula of the associated abscissas of bounded convergence, absolute convergence and uniform convergence and the Borel line of Laplace-Stieltjes transforms. After his works, many mathematicians further studied some properties on the growth and value distribution of Laplace-Stieltjes transforms, and there were a number of results about this subject, such as: Batty C. J. K., M. N. Sheremeta, Kong Y. Y., Sun D. C., Huo Y. Y. and Xu H. Y. investigated the growth of analytic functions with kinds of order defined by LaplaceStieltjes transforms (see [1, 3, 4, 5, 6, 19, 22]), and Yu J. R., Shang L. N., Gao Z. S., and Xu H. Y. investigated the value distribution of such functions (see [11, 20, 21, 25]). Moreover, as for Dirichlet series (3), a special form of Laplace-Stieltjes transform, considerable attention has been paid to the growth and the value distribution of analytic functions defined by Dirichlet series and lots of interesting results can be founded in (see [2, 9, 10, 12, 15, 16, 17, 23, 24]). Luo and Kong [7, 8] in 2012 and 2014 studied the growth of the following form of LaplaceStieltjes transform Z +∞

esx dα(x),

F (s) =

s = σ + it,

(4)

0

where α(x) is stated as in (1), and {λn } satisfy (2) and lim sup(λn+1 − λn ) = h < +∞,

lim sup

n→+∞

n→∞

Set A∗n =

Z ,−∞ 0 such that τX = J + 5η, then for any n ∈ N+ and sufficiently small σ(< 0), from (11) and (20), and by Lemma 2.1 we have   1 log+ A∗n eλn σ ≤ log Mu (σ, F ) + 2 log 2 < W (J + η) log U (− ) , (21) σ and from (20), there exists a subsequence {n(ν)} such that X(log+ A∗n(ν) ) > (τX − η) log U (

λn(ν) log+ A∗n(ν)

).

(22)

Take the sequence {σν } such that   log+ A∗n(ν) 1 W (J + η) log U (− ) = λ λ σν 1 + log U ( log+n(ν) ) log2 log U ( log+n(ν) A∗ A∗ n(ν)

.

(23)

)

n(ν)

Thus, it follows form (21)-(23) that log+ A∗n(ν) eλn(ν) σν
0. Thus, we have X(log+ A∗n ) X(log Mu (σ, f )) = lim sup = τX . lim sup λn log U (− σ1 ) ) n→+∞ log U ( σ→0− log+ A∗ n

Therefore, this completes the proof of the sufficiency of Theorem 1.3. By using the similar argument as in the above discussion, we can prove the necessity of Theorem 1.3. Hence, this completes the proof of Theorem 1.3.

3

Proofs of Theorem 1.6 and Theorem 1.7

Here we only give the proof of Theorem 1.7 because the proof of Theorem 1.6 is similarly.

3.1

The Proof of Theorem 1.7

First of all, we prove ” ⇐= ” of Theorem 1.7. Next, we will divide into two steps as follows. Step One. For convenience, hereinafter let En−1 := En−1 (F, β). Suppose that lim sup Ψn (F, β, λn ) = lim sup n→+∞

n→+∞

X(log+ [En−1 e−βλn ])   = τX . λn log U log+ [En−1 −βλ n] e

(26)

Then for sufficiently large positive integer n and any positive real number  > 0, we have    λn . log+ [En−1 e−βλn ] < W (τX + ) log U log+ [En−1 e−βλn ] By using the same argument as in the proof of Theorem 1.3, we have !    −1 1 + + (σ−β)λn −βλn log [En−1 e ] ≤ λn V exp X(log [En−1 e ]) +σ . τX + 

(27)

For any fixed and sufficiently small σ < 0, set G=W

(τX + ) log U

1 1  − − σ σ log2 U − σ1

!! ,

that is, 1 1  =V + 2 −σ −σ log U − σ1

  exp

 1 X(G) . τX + 

(28)

9

849

Xia Shen ET AL 841-854

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

If log+ [En−1 e−βλn ] ≤ G, for sufficiently large positive integer n, let    1 + −βλn V exp X(log [En−1 e ]) ≥ 1, τX +  since σ < 0, and from (27),(28) and the definition of U (x), we have +

log [En−1 e

(σ−β)λn

! −1 1 + −βλn +σ ] ≤ λn ]) X(log [En−1 e τX +  !! 1 1  ≤ G = W (τX + ) log U − − σ σ log2 U − σ1     1 ≤ W (τX + ) log (1 + o(1))U − . σ    V exp

(29)

If log+ [En−1 e−βλn ] > G, it follows from (27) and (28) that ! −1 1 +σ X(G) log+ [En−1 e(σ−β)λn ] ≤ λn τX +    !−1 1 1  ≤ λn  + + σ  < 0. −σ −σ log2 U − σ1    V exp

(30)

Hence, it follows from (29) and (30) that for sufficiently large positive integer n     1 log+ [En−1 e(σ−β)λn ] ≤ W (τX + ) log (1 + o(1))U − . σ

(31)

For any β < 0, then from the definition of Ek (F, β), there exists p1 ∈ Πn−1 satisfying kF − p1 k ≤ 2En−1 .

(32)

And since A∗n

Z x exp{ity}dα(y) exp{βλn } exp{βλn } = sup λn l and all x ∈ X. It follows from (4.13) that the sequence { 41n f (2n x)} is a Cauchy sequence for all x ∈ X. Since Y is complete, the sequence { 41n f (2n x)} converges. So one can define the mapping h : X → Y by 1 f (2n x) 4n for all x ∈ X. Moreover, letting l = 0 and passing the limit m → ∞ in (4.13), we get (4.12). The rest of the proof is similar to the proof of Theorem 3.3.  h(x) := lim

n→∞

Corollary 4.6. Let r < 2 and θ be nonnegative real numbers, and let f : X → Y be an even mapping satisfying (4.9). Then there exists a unique quadratic mapping h : X → Y such that 1 kf (x) − h(x)k ≤ θkxkr (4.14) 4 − 2r

872

CHOONKIL PARK ET AL 863-874

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

QUADRATIC ρ-FUNCTIONAL INEQUALITIES

for all x ∈ X. By the triangle inequality, we have kf (x + y + z) + f (x − y − z) + f (y − x − z) + f (z − x − y) − 4f (x) − 4f (y) − 4f (z)k x−y−z y−x−z +f 2 2 2   

z−x−y − f (x) − f (y) − f (z) +f

2 ≤ kf (x + y + z) + f (x − y − z) + f (y − x − z) + f (z − x − y) − 4f (x) − 4f (y) − 4f (z)

  

x+y+z



ρ f









+f

x−y−z y−x−z +f 2 2   

z−x−y +f − f (x) − f (y) − f (z)

. 2 As corollaries of Theorems 4.3 and 4.5, we obtain the Hyers-Ulam stability results for the quadratic ρ-functional equation (4.3) in complex Banach spaces.  

−ρ f

x+y+z 2











+f

Corollary 4.7. Let ϕ : X 3 → [0, ∞) be a function and let f : X → Y be an even mapping satisfying (4.4) and kf (x + y + z) + f (x − y − z) + f (y − x − z) + f (z − x − y) − 4f (x) − 4f (y) − 4f (z)  

−ρ f

x+y+z 2





+f

x−y−z 2



y−x−z z−x−y +f +f 2 2 −f (x) − f (y) − f (z))k ≤ ϕ(x, y, z) 







(4.15)

for all x, y, z ∈ X. Then there exists a unique quadratic mapping h : X → Y satisfying (4.6). Corollary 4.8. Let r > 2 and θ be nonnegative real numbers, and let f : X → Y be an even mapping such that kf (x + y + z) + f (x − y − z) + f (y − x − z) + f (z − x − y) − 4f (x) − 4f (y) − 4f (z)  

−ρ f

x+y+z 2





+f

x−y−z y−x−z z−x−y +f +f (4.16) 2 2 2 −f (x) − f (y) − f (z))k ≤ θ(kxkr + kykr + kykr ) 









for all x, y, z ∈ X. Then there exists a unique quadratic mapping h : X → Y satisfying (4.10). Corollary 4.9. Let ϕ : X 3 → [0, ∞) be a function with ϕ(0, 0, 0) = 0 and let f : X → Y be an even mapping satisfying (4.11) and (4.15). Then there exists a unique quadratic mapping h : X → Y satisfying (4.12). Corollary 4.10. Let r < 2 and θ be positive real numbers, and let f : X → Y be an even mapping satisfying (4.16). Then there exists a unique quadratic mapping h : X → Y satisfying (4.14). Remark 4.11. If ρ is a real number such that −4 < ρ < 4 and Y is a real Banach space, then all the assertions in this section remain valid.

873

CHOONKIL PARK ET AL 863-874

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

C. PARK, Y. HYUN, AND J. R. LEE

References [1] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan 2 (1950), 64–66. [2] P. W. Cholewa, Remarks on the stability of functional equations, Aequationes Math. 27 (1984), 76–86. [3] W. Fechner, Stability of a functional inequalities associated with the Jordan-von Neumann functional equation, Aequationes Math. 71 (2006), 149–161. [4] P. Gˇ avruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings, J. Math. Anal. Appl. 184 (1994), 431–43. [5] A. Gil´ anyi, Eine zur Parallelogrammgleichung a ¨quivalente Ungleichung, Aequationes Math. 62 (2001), 303– 309. [6] A. Gil´ anyi, On a problem by K. Nikodem, Math. Inequal. Appl. 5 (2002), 707–710. [7] D. H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. U.S.A. 27 (1941), 222–224. [8] M. Mursaleen and S.A. Mohiuddine, On lacunary statistical convergence with respect to the intuitionistic fuzzy normed space, J. Computat. Anal. Math. 233 (2009), 142–149. [9] C. Park, Orthogonal stability of a cubic-quartic functional equation, J. Nonlinear Sci. Appl. 5 (2012), 28–36. [10] C. Park, Y. Cho and M. Han, Functional inequalities associated with Jordan-von Neumann-type additive functional equations, J. Inequal. Appl. 2007 (2007), Article ID 41820, 13 pages. [11] C. Park, K. Ghasemi, S. G. Ghale and S. Jang, Approximate n-Jordan ∗-homomorphisms in C ∗ -algebras, J. Comput. Anal. Appl. 15 (2013), 365–368.  [12] C. Park, A. Najati and S. Jang, Fixed points and fuzzy stability of an additive-quadratic functional equation, J. Comput. Anal. Appl. 15 (2013), 452–462. [13] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 (1978), 297–300. [14] J. R¨ atz, On inequalities associated with the Jordan-von Neumann functional equation, Aequationes Math. 66 (2003), 191–200. [15] S. Shagholi, M. Bavand Savadkouhi and M. Eshaghi Gordji, Nearly ternary cubic homomorphism in ternary Fr´echet algebras, J. Comput. Anal. Appl. 13 (2011), 1106–1114. [16] S. Shagholi, M. Eshaghi Gordji and M. B. Savadkouhi, Stability of ternary quadratic derivation on ternary Banach algebras, J. Comput. Anal. Appl. 13 (2011), 1097–1105. [17] D. Shin, C. Park and Sh. Farhadabadi, On the superstability of ternary Jordan C ∗ -homomorphisms, J. Comput. Anal. Appl. 16 (2014), 964–973. [18] D. Shin, C. Park and Sh. Farhadabadi, Stability and superstability of J ∗ -homomorphisms and J ∗ -derivations for a generalized Cauchy-Jensen equation, J. Comput. Anal. Appl. 17 (2014), 125–134. [19] F. Skof, Propriet locali e approssimazione di operatori, Rend. Sem. Mat. Fis. Milano 53 (1983), 113–129. [20] S. M. Ulam, A Collection of the Mathematical Problems, Interscience Publ., New York, 1960. Choonkil Park Research Institute for Natural Sciences, Hanyang University, Seoul 04763, Korea E-mail address: [email protected] Yuntak Hyun Department of Mathematics, Hanyang University, Seoul 04763, Korea E-mail address: [email protected] Jung Rye Lee Department of Mathematics, Daejin University, Kyeonggi 11159, Korea E-mail address: [email protected]

874

CHOONKIL PARK ET AL 863-874

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

ON A SUBCLASS OF p -VALENT ANALYTIC FUNCTIONS OF COMPLEX ORDER INVOLVING A LINEAR OPERATOR N. E. CHO 1,∗ AND A. K. SAHOO 2

b Abstract. Using the linear operator Lp (a, c) , we introduce a class Rp,n (µ, a, c, A, B) of multivalent analytic functions with complex order. For this class, a sufficient condition in terms of the coefficients for f is obtained, the Fekete-Szego problem and determination of sharp upper bound for the second Hankel determinant is completely solved. Relevant connections of the results presented here with those obtained in earlier works are pointed out.

1. Introduction and preliminaries We denote by Ap (n) the family of functions of the form: f (z) = z p +

∞ X

ap+k z p+k

(p, n ∈ N = {1, 2, . . . })

(1.1)

k=n

which are analytic and p -valent in the unit disk U = {z ∈ C : |z| < 1} . For n = 1 and n = 1, p = 1 , we symbolise the above class by Ap and A , respectively. For the functions f1 and f2 analytic in U , we say that f1 is subordinate to f2 , written as f1 ≺ f2 or f1 (z) ≺ f2 (z) (z ∈ U) if there exists a Schwarz function ω , which (by defintion) is analytic in U with ω(0) = 0, |ω(z)| < 1 and f1 (z) = f2 (ω(z)) for z ∈ U . If the function f2 is univalent in U , then we have the following equivalence relation (cf., e.g., [23]; see also [24]). f1 (z) ≺ f2 (z) ⇐⇒ f1 (0) = f2 (0) and f1 (U) ⊂ f2 (U). P k If we have two functions hj (z) = ∞ k=0 ak,j z (j = 1, 2) which are analytic in U , we define the Hadamard product (or convolution) of f1 and f2 by (h1 ? h2 )(z) =

∞ X

ak,1 ak,2 z k = (h2 ? h1 )(z)

(z ∈ U).

k=0

2010 Mathematics Subject Classification. 30C45. Key words and phrases. p -valent analytic functions, Complex order, Inclusion relationships, Hadamard product, Subordination, Neighborhood. ∗ Corresponding author. 1

875

CHO ET AL 875-888

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

N. E. CHO AND A. K. SAHOO

∗ (b, ρ) and C The classes Sp,n p,n (b, ρ) are called p -valently starlike and convex of complex order b and type ρ which consists f of Ap (n) and f satisfies the following inequalities, respectively:    1 zf 0 (z) Re p + −p > ρ (b ∈ C∗ = C \ {0}, 0 ≤ ρ < p; z ∈ U), (1.2) b f (z)    zf 00 (z) 1 1+ 0 −p > ρ (b ∈ C∗ = C \ {0}, 0 ≤ ρ < p; z ∈ U). (1.3) Re p + b f (z)

From (1.1) and (1.3), it follows that zf 0 (z) ∗ ∈ Sp,n (b, ρ). p

f ∈ Cp,n (b, ρ) ⇐⇒

∗ (b, ρ) and C ∗ In particular, for p = n = 1 , the classes Sp,n p,n (b, ρ) reduces to the classes S (b, ρ) and C(b, ρ) of starlike functions of complex order b and type ρ , and convex function of complex order b and type ρ (b ∈ C∗ ; 0 ≤ ρ < p) , respectively, which were introduced by Frasin [8].

Setting ρ = 0 in S ∗ (b, ρ) and C(b, ρ) , we get the classes S ∗ (b) and C(b) . These classes of starlike and convex functions of order b were considered earlier by Nasr and Aouf [27] and ∗ (1, ρ) = S ∗ (ρ) Wiatrowski [37], respectively (see also [5] and [36]). We further observe that Sp,1 p and Cp,1 (1, ρ) = Cp (ρ) are, respectively, the classes of p -valently starlike and p -valently convex functions of order ρ (0 ≤ ρ < p) in U . Also, we note that S1∗ (ρ) = S ∗ (ρ) and C1 (ρ) = C(ρ) are the usual classes of starlike and convex functions of order ρ (0 ≤ ρ < 1) in U . In the special cases, S ∗ (0) = S ∗ and C(0) = C are the familiar classes of starlike and convex functions in U . Furthermore, let Rp,n (b, ρ) denote the class of functions in Ap (n) satisfying the condition:    1 f 0 (z) −p > ρ (b ∈ C∗ = C \ {0}, 0 ≤ ρ < p; z ∈ U). Re p + b z p−1 We note that Rp,n (1, ρ) is a subclass of p -valently close-to-convex functions of order ρ (0 ≤ ρ < p) in the unit disk U. Let ϕp be the incomplete beta function defined by ϕp (a, c; z) = z p +

∞ X (a)k k=1

(c)k

z p+k

(z ∈ U),

(1.4)

− where a ∈ R, c ∈ R \ Z− 0 , Z0 = {0, −1, −2, . . . } and the symbol (x)k denotes the Pochhammer symbol (or shifted factorial) given by ( 1, (k = 0, x ∈ C∗ = C \ {0}) (x)k = x(x + 1) · · · (x + k − 1), (k ∈ N, x ∈ C).

With the aid of the function ϕp , given by (1.4) and the Hadamard product, we consider the linear operator Lp (a, c) : Ap (n) −→ Ap (n) defined by Lp (a, c)f (z) = ϕp (a, c; z) ? f (z)

876

(z ∈ U).

(1.5)

CHO ET AL 875-888

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A SUBCLASS OF p -VALENT ANALYTIC FUNCTIONS OF COMPLEX ORDER

3

If f is given by (1.1), then from (1.5), it readily follows that ∞ X (a)k Lp (a, c)f (z) = z + ap+k z p+k (c)k p

(z ∈ U).

(1.6)

k=n

The linear operator Lp (a, c) on the class Ap was introduced and studied by Saitoh [33], which generalizes the linear operator L1 (a, c) = L(a, c) introduced by Carlson and Shaffer [4] in their systematic investigations of certain interesting subclasses of starlike, convex and prestarlike hypergeometric functions. We also note that for f ∈ Ap , (i) Lp (a, a)f (z) = f (z) ; (ii) Lp (p + 1, p)f (z) = z 2 f 00 (z) + 2zf 0 (z)/p(p + 1) ; (iii) Lp (p + 2, p)f (z) = zf 0 (z)/p ; (iv) Lp (m + p, 1)f (z) = Dm+p−1 f (z) (m ∈ Z, m > −p) , the operator studied by Goel and Sohi [9]. In the case p = 1 , Dm f is the familiar Ruscheweyh derivative [32] of f ∈ A . (v) Lp (ν + p, 1)f (z) = Dν,p f (z) (ν > −p) , the extended linear derivative operator of Rusheweyh type introduced by Raina and Srivastava [31]. In particular, when ν = m , we get operator Dm+p−1 f (z) (m ∈ Z, m > −p) , studied by Goel and Sohi [9]. (vi) Lp (p + 1, m + p)f (z) = Im,p f (z) (m ∈ Z, m > −p), the extended Noor integral operator considered by Liu and Noor [19]. (λ,p)

(vii) Lp (p + 1, p + 1 − λ)f (z) = Ωz f (z) (−∞ < λ < p + 1) , the extended fractional differintegral operator considered by Patel and Mishra [30]. Note that

1,p Ω0,p z f (z) = f (z), Ωz f (z) =

zf 0 (z) z 2 f 00 (z) and Ω2,p (p ≥ 2; z ∈ U). z f (z) = p p(p − 1)

Now, by using the operator Lp (a, c) , we introduce the following new subclasses of p -valent analytic functions in the unit disk U . b (µ, a, c, A, B) is the subclass of analytic p− valent functions, which conDefinition 1.1. Rp,n sists of f given in the form of (1.1) and satisfies the subordination condition:

1 1+ b



Lp (a, c)f (z) (Lp (a, c)f )0 (z) p(1 − µ) + µ −p zp z p−1

 ≺

1 + Az , 1 + Bz

(1.7)

where −1 ≤ B < A ≤ 1, p ∈ N , b ∈ C∗ , 0 ≤ µ ≤ 1 and z ∈ U . Equivalently, we say f ∈ Ap (n) b (µ, a, c, A, B) , if is a member of Rp,n p(1 − µ)Lp (a, c)f (z) + µz(Lp (a, c)f )0 (z) − pz p (1.8) b(A − B)z p − B {p(1 − µ)Lp (a, c)f (z) + µz(Lp (a, c)f )0 (z) − pz p )} < 1 (z ∈ U).

877

CHO ET AL 875-888

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

N. E. CHO AND A. K. SAHOO

For n = 1 we denote the class by Rpb (µ, a, c, A, B) . It may be noted that by suitably choosing b (a, c, λ, ρ) extends several subclasses of the parameters involved in Definition 1.1, the class Rp,n p -valent analytic functions in U . Example 1.1. For n = 1, b = pe−iθ cos θ, A = 1 − 2ρ/p, B = −1 in Definition 1.1, we get   2ρ −iθ Rppe cos θ µ, a, c, 1 − , −1 = Rp (µ, a, c, θ, ρ) p      Lp (a, c)f (z) (Lp (a, c)f )0 (z) iθ = f ∈ Ap : Re e p(1 − µ) +µ > ρ cos θ , zp z p−1 where 0 ≤ ρ < p, |θ| < π/2 and z ∈ U . • Putting µ = 0, p = 1, a = α and c = β in Example 1.1, we get the class Rα,β (θ, ρ) considered by Mishra and Kund [26]. • Taking a = c in Example 1.1, we get      f 0 (z) f (z) iθ > ρ cos θ . Rp (µ, a, c, θ, ρ) = Rp (µ, θ, ρ) = f ∈ Ap : Re e p(1 − µ) p + µ p−1 z z We write  Rp (0, θ, ρ) = Rp,θ (ρ) =

    f (z) ρ f ∈ Ap : Re eiθ > cos θ zp p

and  Rp (1, θ, ρ) = Rp,θ (ρ) =





f ∈ Ap : Re e



(f )0 (z) z p−1



 ρ > cos θ , p

where (0 ≤ ρ < p, |θ| < π/2, z ∈ U) which reduces to the class R (see, MacGregor [21]) for p = 1 and θ = ρ = 0. • Taking a = p + 1, c = p + 1 − λ in Example 1.1, we obtain   2ρ pe−iθ cos θ Rp µ, p + 1, p + 1 − λ, 1 − , −1 = Rp,λ (µ, θ, ρ) p !# ) ( " 0 (Ωλ,p Ωλ,p z (a, c)f (z) z (a, c)f ) (z) iθ = f ∈ Ap : Re e p(1 − µ) +µ > ρ cos θ , zp z p−1 where 0 ≤ ρ < p, −∞ < λ < p + 1, |θ| < π/2 and z ∈ U . We write Rp,λ (0, θ, ρ) = Rp,λ (θ, ρ) and the class R1,λ (θ, ρ) = Rλ (θ, ρ) was investigated by Mishra and Gochhayat [25]. • −iθ cos θ 2pβ (1− α p )e θ, µ 1+β Rp (µ, p + 1, p, 1, −β) = Rp,α,β (0 ≤ α < p, 0 ≤ β < 1, |θ| < π/2) ( ) (1 − µ + µp )f 0 (z) + µp zf 00 (z) − pz p−1 = f ∈ Ap : < β; z ∈ U . (1 − µ + µp )f 0 (z) + µp zf 00 (z) − pz p−1 + 2(p − α)e−iθ cos θ z p−1 θ,0 θ is the subclass of A investigated by Makowka [22], We note that R1,α,β = Rα,β 0,0 0,0 R1,α,β = R(α, β) is the class studied by Juneja and Mogra [12] and R1,0,β = R(β) is the class considered by Padmanabhan [29] (see also [3]).

878

CHO ET AL 875-888

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A SUBCLASS OF p -VALENT ANALYTIC FUNCTIONS OF COMPLEX ORDER

5

Example 1.2. For µ = 0, n = 1 and replacing b by bp , we get subclass Rpb (a, c, A, B) of Ap which satisfies the following subordination condition:   1 Lp (a, c)f (z) 1 + Az 1+ −1 ≺ (z ∈ U), (1.9) b zp 1 + Bz  − where a ∈ R, c ∈ R \ Z− 0 , Z0 = {..., −2, −1, 0} and 0 6= b ∈ C . The sub class of Rpb (a, c, A, B) is recently studied by Sahoo and Patel [35]. Recently, Janteng et al. [11], Mishra and Gochhayat [25] and Mishra and Kund [26] have obtained sharp upper bounds to the second Hankel determinant H2 (2) for the families R, Rλ (θ, ρ) and Rα,β (θ, ρ) , respectively. Further, taking A = p − ρ, B = 0 in Definition 1.1, we get the following subclass of Ap (n) studied by Sahoo and Patel [34] b (µ, a, c, ρ) , if it satisfies the following • A function f ∈ Ap (n) is said to be in the class Rp,n inequality:   0 1 L (a, c)f (z) (L (a, c)f ) (z) p p +µ − p < p − ρ (1.10) b p(1 − µ) p p−1 z z b (µ, a, c, ρ) Rp,n

(b ∈ C∗ , 0 ≤ µ ≤ 1, 0 ≤ ρ < p; z ∈ U). b (µ, p + 1, p + 1 − λ, ρ) = Rb (µ, λ, ρ) (b ∈ C∗ , −∞ < λ < p, 0 ≤ µ) , which yields the class • Rp,n p,n considered by Aouf [2] for ρ = p − β (0 < β ≤ 1, 0 ≤ ρ < p). b (µ, λ, ρ) yields the following Special cases of the parameters p, λ and ρ in the class Rp,n subclasses of Ap . b (µ, 0, ρ) = Rb (µ, ρ) (i) Rp,n p,n     1 f (z) f 0 (z) = f ∈ Ap : p(1 − µ) p + µ p−1 − p < p − ρ, µ ≥ 0, 0 ≤ ρ < p; z ∈ U . b z z b (µ, 1, ρ) = P b (µ, ρ) (ii) Rp,n p,n     1 f 00 (z) f 0 (z) (µ + µ(1 − p)) p−1 + µ p−2 − p < p − ρ, µ ≥ 0, 0 ≤ ρ < p; z ∈ U . = f ∈ Ap : b pz pz b (µ, 1, 1 − β) = Rb (µ, β) (iii) R1,n n   1 0  00 = f ∈ Ap : f (z) + µzf (z) − 1 < β, µ ≥ 0, 0 < β ≤ 1; z ∈ U . b

The class Rnb (µ, β) was studied by Altintas et al. [1]. Let P denote the class of analytic functions φ normalized by φ(z) = 1 + p1 z + p2 z 2 + · · ·

(z ∈ U)

(1.11)

such that Re{φ(z)} > 0 in U .

879

CHO ET AL 875-888

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

N. E. CHO AND A. K. SAHOO

Noonan and Thomas [28] defined the q -th Hankel determinant of a sequence an , an+1 , an+2 , · · · of real or complex numbers by an an+1 · · · an+q−1 an+1 an+2 · · · an+q Hq (n) = . (n ∈ N, q ∈ N \ {1}). .. .. .. .. . . . a n+q−1 an+q · · · an+2q−2 This determinant has been studied by several authors with the subject of inquiry ranging from the rate of growth of Hq (n) (as n → ∞) to the determination of precise bounds with specific values of n and q for certain subclasses of analytic functions in the unit disk U . Ehrenborg [6] studied the Hankel determinant of exponential polynomials. The Hankel transform of an integer sequence and some of its properties were discussed by Layman [16]. In particular, when n = 1, q = 2, a1 = 1 and n = q = 2 , the Hankel determinant simplifies to H2 (1) = |a3 − a22 | and H2 (2) = |a2 a4 − a23 |. We refer to H2 (2) as the second Hankel determinant. It is known [5] that if f (z) = z +

∞ X

ak z k

(z ∈ U)

(1.12)

k=2

is analytic and univalent in U , then the sharp inequality H2 (1) = |a3 − a22 | ≤ 1 holds. For a family F of analytic functions of the form (1.7), the more general problem of finding the sharp upper bounds for the functionals |a3 − µ a22 | (µ ∈ R/C) is popularly known as Fekete-Szeg¨ o problem for the class F . The Fekete-Szeg¨o problem for the known classes of univalent functions, starlike functions, convex functions and close-to-convex functions has been completely settled [7, 10, 13, 14, 15]. Recently, Janteng et al. [11], Mishra and Gochhayat [25] and Mishra and Kund [26] have obtained sharp upper bounds on the second Hankel determinant H2 (2) for the families R, Rλ (θ, ρ) and Rα,β (θ, ρ) , respectively. In our present investigation, by following the techniques devised by Libera and Zlotkiewicz [17, 18], we derive sharp upper bound for the Fekete-Szeg¨o problem and for the second Hankel determinant as well of the functions belonging to the class Rpb (µ, a, c, A, B) . Relevant connections of the results obtained here with some earlier known work are also pointed out. To establish our main results, we shall need the followings lemmas. Lemma 1.1. [5, 17, 18, 20] Let the function φ , given by (1.2) be a member of the class P . Then (i) |pk | ≤ 2 (k ≥ 1) and the estimate is sharp for the function t(z) =

1+z 1−z

(z ∈ U).

(ii) p2 − ν p21 ≤ 2 max{1, |2ν − 1|}, where ν ∈ C and the result is sharp for the functions

880

CHO ET AL 875-888

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A SUBCLASS OF p -VALENT ANALYTIC FUNCTIONS OF COMPLEX ORDER

7

given by q(z) =

1 + z2 1 − z2

and

s(z) =

1+z 1−z

(z ∈ U).

(iii) p2 =

1 2 p1 + (4 − p21 )x 2

and

1 3 p1 + 2(4 − p21 )p1 x − (4 − p21 )p1 x2 + 2(4 − p21 )(1 − |x|2 )z 4 for some complex numbers x, z satisfying |x| ≤ 1 and |z| ≤ 1. p3 =

2. Main results Unless otherwise mentioned, we assume throughout the sequel that b ∈ C∗ , 0 ≤ µ ≤ 1, p ∈ N, a > 0, c > 0, −1 ≤ B < A ≤ 1, z ∈ U and the powers appearing in different expression are understood as principal values. At the outset, we obtain a sufficient condition for a function f ∈ Ap to be in the class b (µ, a, c, A, B) . Rp,n

Theorem 2.1. If f given by (1.1) satisfies ∞ X (a)k |b|(A − B) |ap+k |(p + µk) ≤ , (c)k (1 + |B|)

(2.1)

k=n b (µ, a, c, A, B) . then f ∈ Rp,n

b (µ, a, c, A, B) , it need to satisfy (1.8). Proof. To prove that f given by (1.1) is a member of Rp,n For |z| = 1 , we have p(1 − µ)Lp (a, c)f (z) + µz(Lp (a, c)f )0 (z) − pz p b(A − B)z p − B {p(1 − µ)Lp (a, c)f (z) + µz(Lp (a, c)f )0 (z) − pz p )} P∞ (a)k k a (p + µk)z p+k k=n (c)k = P b(A − B) − B ∞ (a)k |ap+k |(p + µk)z k k=n (c)k P∞ (a)k |ap+k |(p + µk)z k k=n (c)k ≤ (z ∈ U). P∞ (a)k k |b|(A − B) − |B| k=n |ap+k |(p + µk)z (c)k

The last expression is needed to be bounded above by 1 , which requires ∞ X (a)k |b|(A − B) |ap+k |(p + µk) ≤ (c)k (1 + |B|) k=n

Thus by maximum modulus theorem the assertion (1.8) is satisfied for z ∈ U and the proof of Theorem 2.1 is completed. 

881

CHO ET AL 875-888

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

N. E. CHO AND A. K. SAHOO

Remark 2.1. Putting n = 1, µ = 0 in Theorem 2.1, we get Theorem 1 of Sahoo and Patel [35]. Taking n = 1, b = pe−iθ , we get following result. P∞ (a)k |ap+k |(p + µk) ≤ (p − ρ) cos θ is k=1 (c)k the sufficient condition to be a member of Rp (µ, θ, a, c, ρ) . Corollary 2.1. For f ∈ Ap , |θ|
1. 2 (p + 2µ) + B(p + µ)z

(p + µ) a(c + 1)

This completes the proof of Theorem 3.1.



For λ to be real, we get the following result. Corollary 3.1. If the function f ∈ Ap , belongs to the class Rpb (µ, a, c, A, B), then for any λ∈R  |b|(A − B) (c)2 −(1 + B)(p + µ)2 a(c + 1) (1 − B)(p + µ)2 a(c + 1)   , for ≤λ≤  (p + 2µ) (a)2  b(A − B)(p + 2µ)c(a + 1)  b(A − B)(p + 2µ) |ap+2 −λa2p+1 | ≤ |b|(A − B) (c) λb(A − B)(p + 2µ) c(a + 1)  2  B+ , Otherwise.  (p + 2µ) (a)2 (p + µ)2 a(c + 1) Remark 3.1. Taking µ = 0 and substituting b by bp in Theorem 3.1, we get Theorem 3 of Sahoo and Patel [35]. Putting b = pe−iθ cos θ, A = 1 − 2ρ/p, B = −1 in Theorem3.1, we get the following result. 2ρ , −1), then p   2λe−iθ cos θ(p − ρ)(p + 2µ) c(a + 1) 2(p − ρ) cos θ (c)2 2 . |ap+2 − λap+1 | ≤ max 1, − 1 (p + 2µ) (a)2 (p + µ)2 a(c + 1)

pe Corollary 3.2. If f ∈ Rp,

−iθ

cos θ

(µ, a, c, 1 −

The estimate is sharp. Theorem 3.2. If f ∈ Rpb (µ, a, c, A, B) and a ≥ c > 0 , then   |b|(A − B)(c)2 2 2 |ap+3 ap+1 − ap+2 | ≤ . (p + 2µ)(a)2

884

(3.7)

CHO ET AL 875-888

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A SUBCLASS OF p -VALENT ANALYTIC FUNCTIONS OF COMPLEX ORDER

11

Proof. Using equation (3.4), (3.5) and (3.6), we get  1 c+2 b2 (A − B)2 c(c)2 (c + 1) 2 ap+3 ap+1 − ap+2 = q2 q1 q3 − 4 a(a)2 (p + 3µ)(p + µ) a + 2 (a + 1)(p + 2µ)2 2   (c + 1) 1 c+2 + − (1 + B)q12 q2 (a + 1)(p + 2µ)2 (p + 3µ)(p + µ) a + 2 )    1 c+2 1+B 2 4 (c + 1) + − q1 . (p + 3µ)(p + µ) a + 2 (a + 1)(p + 2µ)2 2 Also,from Lemma 1.1, we get ap+3 ap+1 − a2p+2 =   b2 (A − B)2 c(c)2 1 c+2  4 q1 + 2(4 − q12 )q12 x − (4 − q12 )q12 x2 + 2q1 (4 − q12 )(1 − |x|2 z) 4 a(a)2 4(p + 3µ)(p + µ) a + 2  4  (c + 1) − q1 + 2(4 − q12 )q12 x + (4 − q12 )x2 2 (a + 1)(p + 2µ)    (c + 1) 1 c + 2 (1 + B)  4 + − q1 + (4 − q12 )q12 x 2 (a + 1)(p + 2µ) (p + 3µ)(p + µ) a + 2 2 )    1 c+2 (c + 1) 1+B 2 4 + − q1 . (p + 3µ)(p + µ) a + 2 (a + 1)(p + 2µ)2 2 For simplicity in the expression, we put α=

c+2 b2 (A − B)2 c(c)2 , β= 4 a(a)2 4(p + 3µ)(p + µ)(a + 2)

and Γ=

(c + 1) . 4(a + 1)(p + 2µ)2

Then by simple calculation, it can be observed that 0 < Γ < β < 2Γ . Using above notation and triangle inequality, we can write  1 2 [(β − Γ)(8 + B(1 + B))] q14 |ap+3 ap+1 − ap+2 | ≤ |α| 8 1 + [(β − Γ)(15 − B)] (4 − q12 )q12 x 8  + βq12 + Γ(4 − q12 ) (4 − q12 )x2  + 2βq1 (4 − q12 )(1 − x2 ) . (3.8) Since the functions φ(z) and φ(eiθ z) (θ ∈ R) belong to the class P , we can assume q1 > 0 , by which generality is not lost. Taking x = v, q1 = u in (3.8), we get the the function T (u, v) (say)  1 1 T (u, v) =|α| [(β − Γ)(8 + B(1 + B))] u4 + [(β − Γ)(15 − B)] (4 − u2 )u2 v 8 8   2 2 2 2 + βu + Γ(4 − u ) (4 − u )v + 2βu(4 − u2 )(1 − v 2 ) .

885

CHO ET AL 875-888

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12

N. E. CHO AND A. K. SAHOO

We need to find maximum value of T (u.v) in the interval 0 ≤ u ≤ 2, 0 ≤ v ≤ 1 . We can see by using the fact 0 < Γ < β < 2Γ ,   ∂T 1 = |α|(4 − u2 ) [(β − Γ)(15 − B)] + 2(β − Γ)u2 v + 4(2Γ − βu)v > 0 (0 ≤ u ≤ 2, 0 ≤ v ≤ 1). ∂v 8 So T (u, v) can not attain its maximum value within 0 < u < 2, 0 < v < 1 . Moreover, for fixed u ∈ [0, 2] ,  1 M (u) = max T (u, v) = T (u, 1) = |α| [(β − Γ)(8 + B(1 + B))] u4 0≤v≤1 8   1 2 2 2 2 2 + [(β − Γ)(15 − B)] (4 − u )u + βu + Γ(4 − u ) (4 − u ) 8 and

  2  3 1 M (u) = |α| (β − Γ) B + 2B − 15 u + ((β − Γ)(23 − B) − 8Γ) u . 2 Since M 0 (u) > 0 , the maximum value occurs at u = 0, v = 1 . Therefore   |b|(A − B)(c)2 2 2 |ap+3 ap+1 − ap+2 | ≤ . (p + 2µ)(a)2 0



 Taking b = pe−iθ cos θ, A = 1 − 2ρ/p, B = −1 in Theorem3.2 we get the following result. pe Corollary 3.3. If f ∈ Rp,

−iθ

cos θ

(µ, a, c, 1 − 2ρ/p, −1), then   2 cos θ(p − ρ)(c)2 2 2 |ap+3 ap+1 − ap+2 | ≤ . (p + 2µ)(a)2

(3.9)

The estimate (3.9) is sharp. Remark 3.2. Taking µ = 0, p = 1, a = α, b = β in Corollary3.3, we get the result of Theorem 3.1 of Mishra and Kund [26]. Putting a = p + 1, c = p + 1 + λ in Corollary 3.3, we get following result. Corollary 3.4. If f ∈ Rp,λ (µ, θ, ρ), then |ap+3 ap+1 −

a2p+2 |

 ≤

2 cos θ(p − ρ)(p + 1 − λ)2 (p + 2µ)(p + 1)2

2 .

(3.10)

The estimate (3.10) is sharp. Remark 3.3. Putting µ = 0, p = 1, θ = α in Corollary 3.4, we get the result obtained in theorem 3.1 of Mishra and Gochhayat [25] Acknowledgements This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No. 2016R1D1A1A09916450).

886

CHO ET AL 875-888

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A SUBCLASS OF p -VALENT ANALYTIC FUNCTIONS OF COMPLEX ORDER

13

References ¨. O ¨ zkan and H.M. Srivastava, Neighborhoods of a certain family of multivalent functions with [1] O. Altinta ¸s , O negative coefficients, Comput. Math. Appl. 47 (10-11) (2004), 1667-1672. [2] M.K. Aouf, Neighborhoods of a certain family of multivalent functions defined by using a fractional derivative operator, Bull. Belg. Math. Soc. Simon Stevin 16 (2009), 31-40. [3] T.R. Caplinger and W.M. Causey, A class of univalent functions, Proc. Amer. Math. Soc. 39 (1973), 357-361. [4] B.C. Carlson and D.B. Shaffer, Starlike and prestarlike hypergeometric functions, SIAM J. Math. Anal. 15 (1984), 737-745. [5] P.L. Duren, Univalent Functions, A Series of Comprehensive Studies in Mathematics, Vol. 259, SpringerVerlag, New York, Berlin, Heidelberg, and Tokyo, 1983. [6] R. Ehrenborg, The Hankel determinant of exponential polynomials, Amer. Math. Monthly 107 (2000), 557560. [7] M. Fekete and G. Szeg¨ o, Eine bemerkung u ¨ber ungerede schlichte funktionen, J. London Math. Soc. 8 (1933), 85-89. [8] B.A. Frasin, Family of analytic functions of complex order, Acta Math. Acad. Paedagog. Nyh´ azi.(N.S.) 22 (2006), 179-191. [9] R.M. Goel and N.S. Sohi, A new criterion for p -valent functions, Proc. Amer. Math. Soc. 78 (1980), 353-357. [10] A. Janteng, S.A. Halim and M. Darus, Coefficient inequality for a function whose derivative has a positive real part, J. Inequal. Pure Appl. Math. 7 (2006), Art. 50. [11] A. Janteng, S.A. Halim and M. Darus, Estimate on the second Hankel functional for functions whose derivative has a positive real part, J. Quality Measurement and Analysis 4 (2008), 189-195. [12] O.P. Juneja and M.L. Mogra, A class of univalent functions, Bull. Sci. Math. S´erie 103 (1979), 435-447. [13] F.R. Keogh and E.P. Merkes, A coefficient inequality for certain classes of analytic functions, Proc. Amer. Math. Soc. 20 (1969), 8-12. [14] W. Koepf, On the Fekete-Szeg¨ o problem for close-to-convex functions-II, Arch. Math. 49 (1987), 420-433. [15] W. Koepf, On the Fekete-Szeg¨ o problem for close-to-convex functions, Proc. Amer. Math. Soc. 101 (1987), 89-95. [16] J.W. Layman, The Hankel transform and some of its properties, J. Integer Seq. 4 (2001), 1-11. [17] R.J. Libera and E.J. Zlotkiewicz, Early coefficient of the inverse of a regular convex function, Proc. Amer. Math. Soc. 85 (2) (1982), 225-230. [18] R.J. Libera and E.J. Zlotkiewicz, Coefficient bounds for the inverse of a function with derivative in P , Proc. Amer. Math. Soc. 87 (2) (1983), 251-257. [19] J.-L. Liu and K.I. Noor, Some properties of Noor integral operator, J. Natur. Geom. 21 (2002), 81-90. [20] W. C. Ma and D. Minda, A unified treatment of some special classes of univalent functions, Proceedings of the Conference on Complex Analysis (Tianjin, 1992), Z. Li, F. Ren, L. Yang and S. Zhang (Eds.), Int. Press, Cambridge, MA, 1994, 157-169. [21] T.H. MacGregor, Functions whose derivative has a positive real part, Trans. amer. Math. Soc. 104 (1962), 532-537. [22] B. Makowaka, On some subclasses of univalent functions, Zesz. Nauk. Polit. Lodzkiejnr 254(1977), 71-76. [23] S.S. Miller and P.T. Mocanu, Differential subordinations and univalent functions, Mich. math. J. 28 (1981), 157-171. [24] S.S. Miller and P.T. Mocanu, Differential Subordinations, Theory and Applications, Series on Monographs and Textbooks in Pure and Appl. Math., Vol. 225, Marcel Dekker Inc., New York / Basel 2000. [25] A.K. Mishra and P. Gochhayat, Second Hankel determinant for a class of functions defined by fractional derivative, Int. J. Math. Math. Sci. Article ID 153280 (2008), 1-10. [26] A.K. Mishra and S.N. Kund, The second Hankel determinant for a class of analytic functions associated with the Carlson-Shaffer operator, Tamkang J. Math. 44(1) (2013), 73-82. [27] M.A. Nasr and M.K. Aouf, Starlike functions of complex order, J. Natur. Sci. Math. 25 (1985), 1-12. [28] J.W. Noonan and D.K. Thomas, On the second Hankel determinant of areally mean p -valent functions, Trans. Amer. Math. Soc. 223 (1976), 337-346.

887

CHO ET AL 875-888

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14

N. E. CHO AND A. K. SAHOO

[29] K.S. Padmanabhan, On certain class of functions whose derivatives have a positive real part, Ann. Polon. Math. 23 (1970), 73-81. [30] J. Patel and A.K. Mishra, On certain multivalent functions associated with an extended fractional differintegral operator, J. Math. Anal. Appl. 332 (2007), 109-122. [31] R.K. Raina and H.M. Srivastava, Inclusion and neighborhood properties of some analytic and multivalent functions, J. Inequal. Pure Appl. Math. 7 (1) (2006), Art. 5. [32] St. Ruscheweyh, New criteria for univalent functions, Proc. Amer. Math. Soc. 49 (1975), 109-115. [33] H. Saitoh, A linear operator and its application of first order differential subordinations, Math. Japonica 44 (1996), 31-38. [34] A.K. Sahoo and J. Patel, Inclusion and neighborhood properties of certain subclasses of p-valent analytic functions of complex order involving a linear operator, Bull. Korean Math. Soc. 51 (6) (2014), pp. 1625-1647. [35] A.K. Sahoo and J. Patel, On certain subclasses of multivalent analytic functions with complex order involving a linear operator, Vietnam J. Math. 43 (3) (2015), 645-661. [36] H.M. Srivastava and S. Owa(Eds.), Current Topics in Analytic Function Theory, World Scientific Publishing Company, Singapore, New Jersey, London and Hong Kong, 1992. [37] P. Wiatrowski, Onthe coefficients of some family of holomorphic functions, Zeszyty Nauk. Uniw. L´ o dz Nauk. Mat.-Przyrod. 39 (2) (1970), 75-85. 1

Department of Applied Mathematics, Pukyong National University, Pusan 608-737, Republic of Korea. E-mail address: [email protected] 2

Department of Mathematics, VSS University of Technology, Sidhi Vihar, Burla, Sambalpur768017,India. E-mail address: [email protected]

888

CHO ET AL 875-888

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A GENERALIZATION OF SOME RESULTS FOR APPELL POLYNOMIALS TO SHEFFER POLYNOMIALS TAEKYUN KIM, DAE SAN KIM, GWAN-WOO JANG, AND LEE-CHAE JANG

Abstract. Recently, Mihoubi and Taharbouchet gave some interesting method of obtaining certain identities for Appell polynomials of arbitrary orders starting from the given identities for Appell polynomials of fixed orders. In addition, they illustrated their method with several examples. The purpose of this paper is to note that their method can be generalized so as to include any Sheffer polynomials. Also, we will provide many examples that illustrate our results.

1. Introduction and Preliminaries Here we will go over very briefly some basic facts about umbral calculus. The reader is advised to refer to [12] for a complete treatment. Let F be the algebra of all formal power series in the variable t with the coefficients in the field C of complex numbers: { } ∞ ∑ tk F = f (t) = ak ak ∈ C . (1) k! k=0

Let P = C[x] be the ring of polynomials in x with coefficients in C, and let P∗ denote the vector space of all linear functionals on P. For L ∈ P∗ , p(x) ∈ P, < L|p(x) > denotes the action of the linear functional L on p(x). The linear functional < f (t)|· > on P is defined by ∑∞

< f (t)|xn >= an , (n ≥ 0),

tk k=0 ak k! ∈ F. For L fL (t)|xn >=< L|xn >,

(2) ∑∞

tk k!

where f (t) = ∈ P∗ , let us set fL (t) = k=0 < L|xk > ∈ F. Then we see that < and the map L 7−→ fL (t) is a vector space isomorphism from P∗ to F. Thus F may be viewed as the vector space of all linear functionals on P as well as the algebra of formal power series in t, and so an element f (t) ∈ F will be thought of as both a formal power series and a linear functional on P. F is called the umbral algebra, the study of which is the umbral calculus(see [1-12]). The order ◦(f (t)) of 0 ̸= f (t) ∈ F is the smallest integer k such that the coefficient of tk does not vanish. In particular, 0 ̸= f (t) ∈ F is called an invertible series if ◦(f (t)) = 0 and a delta series if ◦(f (t)) = 1. For f (t), g(t) ∈ F with ◦(g(t)) = 0, ◦(f (t)) = 1, there exists a unique sequence sn (x) (deg sn (x) = n) such that < g(t)f (t)k |sn (x) >= n!δn,k , for n, k ≥ 0. Such a sequence is called the Sheffer sequence for the Sheffer pair (g(t), f (t)), which is denoted by sn (x) ∼ (g(t), f (t)). Further, it is known that sn (x) ∼ (g(t), f (t)) if and only if ∞ ∑ 1 tn exf (t) = sn (x) , (see[ 1-12]), n! g(f (t)) n=0

(3)

2010 Mathematics Subject Classification. 05A19, 05A40, 11B83. Key words and phrases. Appell polynomials, Sheffer polynomials, umbral calculus. 1

889

T. KIM ET AL 889-898

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

A generalization of some results for Appell polynomials to Sheffer polynomials

where f (t) is the compositional inverse of f (t) satisfying f (f (t)) = f (f (t)) = t. In particular, sn (x) is called the Appell sequence for g(t) if sn (x) ∼ (g(t), t). Assume now that sn (x) ∼ (g(t), f (t)). Thus sn (x) is the Sheffer sequence for the Sheffer pair (g(t), f (t)), and ∞ ∑

sn (x)

n=0

tn 1 = exf (t) , (see [12, 13]). n! g(f (t))

(4)

Here we will assume that g(0) = 1, though it is not necessary. So, for any α ∈ C and g(t) = 1 +

∞ ∑

ak

k=1

g(t)α =

∞ ∑

(∑ (α)n

xk , k!

∞ k=1

(5) k

ak tk!

)n

n!

n=0

,

(6) (α)

where (α)n = α(α − 1) · · · (α − n + 1) for n ≥ 1, and (α)0 = 1. Let sn (x) ∼ (g(t)α , f (t)). Then ( )α ∞ ∑ 1 tn = s(α) (x) exf (t) . (7) n n! g(f (t)) n=0 Also, we set α sen (x) ∼ (g(t), t), se(α) n (x) = (g(t) , t).

(8)

(α)

Thus sen (x) and sen (x) are Appell polynomials and ∞ ∑

sen (x)

tn n!

=

se(α) n (x)

tn n!

=

n=0

∞ ∑

n=0

We observe here that ∞ ∑ (f (t))n sen (x) n! n=0 ∞ ∑ (f (t))n se(α) n (x) n! n=0

1 xt e , g(t) ( )α 1 ext . g(t)

∞ ∑ 1 tn exf (t) = sn (x) , n! g(f (t)) n=0 ( )α ∞ ∑ 1 tn = exf (t) = s(α) . n (x) n! g(f (t)) n=0

=

Adopting the conventional notation used in [10], we let then an = An . Moreover, ∞ ∑ n=0

sen (x)

(9)

1 g(t)

= eAt . So if

∞ ∑ tn tn = e(A+x)t = (A + x)n , n! n! n=0

1 g(t)

(10) =

∑∞ n=0

n

an tn! ,

(11)

so that sen (x) = (A + x)n . Recently, Mihoubi and Taharbouchet [10] gave some interesting method of obtaining certain identities for Appell polynomials of arbitrary orders starting from the given identities for Appell polynomials of fixed orders. In addition, they illustrated their method with several examples. The purpose of this paper is to note that their method can be generalized so as to include any Sheffer polynomials. Also, we will provide many examples that illustrate our results.

890

T. KIM ET AL 889-898

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Taekyun Kim, Dae San Kim, Gwan-Woo Jang and Lee-Chae Jang

3

2. Main results We will prove Theorem 2, which includes Propositions 2 and 3 in [10] as special cases, after showing a lemma corresponding to Lemma 1 in [10]. Lemma 2.1. Let sn (x) ∼ (g(t), f (t)), and let α ∈ C.

where

1 ′ f (t)

(a)

(α+1) s(α) (x), n (A + x) = sn

(b)

(α + 1)(A + x)s(α) n (A + x) =

=

n ( ) ∑ n (α+1) θn−l sl+1 (x) + αxs(α+1) (x), n l

∑∞

tn n=0 θn n! ,



with f (t) =

d dt f (t).

Proof. (a) ∞ ∑

s(α) n (A

n=0

(

tn + x) n!

)α 1 e(A+x)f (t) g(f (t)) )α ( 1 eAf (t) exf (t) g(f (t)) ( )α 1 1 exf (t) g(f (t)) g(f (t)) ( )α+1 1 exf (t) g(f (t)) ∞ ∑ tn s(α+1) . n n! n=0

= = = = =

(b) Using Lemma 1 of [10] and replacing t by f (t), we obtain ∞ ∑ (f (t))n (A + x) (A + x)e s(α) n n! n=0 } { ∞ ∑ (f (t))n αx (α+1) 1 (α+1) (x) = sen+1 (x) + sen . α+1 α+1 n! n=0 The LHS of (14) is obviously equal to ∞ ∑ tn (A + x)s(α) . n (A + x) n! n=0 Applying

d dt

(12)

l=0

(13)

(14)

(15)

on both sides of ∞ ∑

(x) se(α+1) n

n=0

∞ ∑ (f (t))n tn = (x) , s(α+1) n n! n! n=0

we get ∞ ∑ n=0

(f (t)) (α+1) sen+1 (x)

n

(

n!

d f (t) dx

) =

∞ ∑

(α+1)

sn+1 (x)

n=0

(16)

tn . n!

(17)



Noting that f (t) is invertiable, we have ∞ ∑ (f (t))n (α+1) = sen+1 (x) n! n=0

∞ ∑

1 ′

f (t)

l=0

891

(α+1)

sl+1 (x)

tl l!

T. KIM ET AL 889-898

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

A generalization of some results for Appell polynomials to Sheffer polynomials

(

)( ∞ ) ∑ (α+1) tm tl = θm sl+1 (x) m! l! m=0 l=0 ( n ( ) ) ∞ ∑ ∑ n tn (α+1) . = θn−l sl+1 (x) n! l n=0 ∞ ∑

(18)

l=0

In view of (18), we now see that the RHS of (14) is { } ∞ n ( ) ∑ 1 ∑ n αx (α+1) tn (α+1) θn−l sl+1 (x) + sn (x) . α+1 l α+1 n! n=0

(19)

l=0

 For the next theorem, we keep the notations in Proposition 2 of [8]. Theorem 2.2. Let n, a, b ∈ Z≥0 , sn (x) ∼ (g(t), f (t)), and let (uk ), (vk ), (U (n, k) : 0 ≤ k ≤ n), (V (n, k) : 0 ≤ k ≤ n) be sequences of complex numbers. Assume that n ∑

(a) U (n, k)sk (x

+ uk ) =

k=0

n ∑

(b)

V (n, k)sk (x + vk ).

(20)

k=0

Then, for any α ∈ C, we have (a) n ∑

(α+a−b)

U (n, k)sk

(x + uk ) =

k=0

(b)

n ∑

(α)

V (n, k)sk (x + vk ).

(21)

k=0

{

} k ( ) ∑ k (α+a−b) (α+a−b) U (n, k) α θk−l sl+1 (x + uk ) + ((a − b − 1)x − αuk )sk (x + uk ) l k=0 l=0 { } n k ( ) ∑ ∑ k (α) (α) = V (n, k) (α + a − b) θk−l sl+1 (x + vk ) − (x + (α + a − b)vk )sk (x + vk ) , l k=0 l=0 (22) ∑ n ′ ∞ d f (t). where f ′1(t) = n=0 θn tn! , with f (t) = dt n ∑

(α)

Proof. (a) As was shown in [1], sen (x) is a polynomial in α of degree α ≤ n. Since n ∑∞ (α) ∑∞ (α) (α) tn en (x) = (f (t)) = is also a polynomial in α of degree ≤ n. n=0 s n=0 sn (x) n! , sn n! Let n n ∑ ∑ (α+a−b) (α) Φ(α) = U (n, k)sk (x + uk ) − V (n, k)sk (x + vk ). (23) k=0

By assumption, Φ(b) = 0. In 0 = Φ(b) = replace x by A + x. Then 0=

n ∑

∑n

(a)

(a)

U (n, k)sk (x+uk )−

U (n, k)sk (A + x + uk ) −

k=0

=

k=0

k=0

n ∑

(a+1) U (n, k)sk (x

n ∑

k=0

(b)

V (n, k)sk (x+vk ),

(b)

V (n, k)sk (A + x + vk )

k=0 n ∑

+ uk ) −

k=0

∑n

(24) V

(b+1) (n, k)sk (x

+ vk ).

k=0

892

T. KIM ET AL 889-898

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Taekyun Kim, Dae San Kim, Gwan-Woo Jang and Lee-Chae Jang

5

Thus Φ(b + 1) = 0. Proceeding inductively, we see that Φ(m) = 0, for all integers m ≥ b. As Φ(α) is a polynomial in α of degree ≤ n, Φ(α) is identically zero as a polynomial in α. This shows (a). (b) Replacing α by α − 1 in (a), multiplying both sides by x, substituting A + x for x, and multiplying the resulting equation by α(α + a − b), we obtain α(α + a − b)

n ∑

{ } (α+a−b−1) (α+a−b−1) U (n, k) (A + x + uk )sk (A + x + uk ) − uk sk (A + x + uk )

k=0

= α(α + a − b)

n ∑

{ } (α−1) (α−1) V (n, k) (A + x + vk )sk (A + x + vk ) − vk sk (A + x + vk ) .

k=0

(25) Using (a) and (b) of Lemma 1, (26) becomes { k ( ) n ∑ ∑ k (α+a−b) U (n, k) α θk−l sl+1 (x + uk ) l k=0

l=0

(α+a−b)

=

(α+a−b)

+α(α + a − b − 1)(x + uk )sk (x + uk ) − α(α + a − b)uk sk { ( ) n k ∑ ∑ k (α) V (n, k) (α + a − b) θk−l sl+1 (x + vk ) l

k=0

} (x + uk )

} (α) (α) +(α + a − b)(α − 1)(x + vk )sk (x + vk ) − α(α + a − b)vk sk (x + vk ) . l=0

(26)

Substracting n { 2 } ∑ (α+a−b) α + (α − 1)(a − b − 1) x U (n, k)sk (x + uk )

(27)

k=0 n { } ∑ (α) = α2 + (α − 1)(a − b − 1) x V (n, k)sk (x + vk )

(28)

k=0



from both sides of (27), we get the desired result.

Remark 2.3. When a = b = 0, the assumption in Theorem 2 n ∑

(0)

U (n, k)sk (x + uk ) =

k=0

n ∑

(0)

V (n, k)sk (x + vk )

(29)

k=0

depends only on f (t), since ∞ ∑ n=0

s(0) n (x)

tn = exf (t) . n!

(30)

Thus we have, for any sn (x) ∼ (g(t), f (t)), with any g(t) but with the same f (t), n ∑ k=0

(α)

U (n, k)sk (x + uk ) =

n ∑

(α)

V (n, k)sk (x + vk ),

(31)

k=0

893

T. KIM ET AL 889-898

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

A generalization of some results for Appell polynomials to Sheffer polynomials n ∑

{

k ( ) ∑ k

} (α) θk−l sl+1 (x

(α) αuk )sk (x

+ uk ) − (x + + uk ) l { k ( ) } n ∑ ∑ k (α) (α) = V (n, k) α θk−l sl+1 (x + vk ) − (x + αvk )sk (x + vk ) . l U (n, k) α

k=0

l=0

k=0

l=0

(32)

3. Examples Here we will illustrate our results with many interesting examples. Example 3.1. Let sn (x) ∼ (g(t), f (t) = et − 1), for some invertible series g(t). Here f (t) = log(1 + t), and hence f ′1(t) = 1 + t. So, θ0 = θ1 = 1, and θm = 0, for m ≥ 2. Observe here (0)

that sn (x) = (x)n . This applies to many special polynomials. • Bernoulli polynomials of the second kind bn (x) given by (see [9]) ( ) ∞ ∑ t t tn x t ,e − 1 . (1 + t) = bn (x) , bn (x) ∼ log(1 + t) n! et − 1 n=0

(33)

. • Daehee polynomials of the first kind Dn (x) given by (see [5]) ( t ) ∞ ∑ log(1 + t) tn e −1 t x (1 + t) = ,e − 1 . Dn (x) , Dn (x) ∼ t n! t n=0 b n (x) given by (see [5]) • Daehee polynomials of the second kind D ( t ) ∞ ∑ (1 + t)log(1 + t) tn b e −1 t x b (1 + t) = ,e − 1 . Dn (x) , Dn (x) ∼ t n! tet n=0

(34)

(35)

• Boole polynomials Bln,λ (x) given by (see [6]) λ −1

(1 + (1 + t) )

x

(1 + t) =

∞ ∑ n=0

Bln,λ (x)

( ) tn , Bln,λ (x) ∼ 1 + eλt , et − 1 . n!

(36)

(α)

Note here that the higher-order Boole polynomials Bln,λ (x) are called Peters polynomials. • Korobov polynomials of the first kind Kn (λ, x) given by (see [2]) ( λt ) ∞ ∑ λt e −1 t tn x (1 + t) = , K (λ, x) ∼ , e − 1 . (37) K (λ, x) n n (1 + t)λ − 1 n! λ(et − 1) n=0 • degenerate poly-Bernoulli polynomials of the second kind Bn,k (λ, x) with the index k given by (see [3]) ( ) ∞ ∑ tn eλt − 1 λLik (1 − e−t ) x t (1 + t) = Bn,k (λ, x) , Bn,k (λ, x) ∼ , e − 1 , (38) (1 + t)λ − 1 n! λLik (1 − e−(et −1) ) n=0 ∑∞ where Lik (x) = m=1 function for k ≤ 0.

xm mk

is the kth polylogarithmic function for k ≥ 1 and a rational

894

T. KIM ET AL 889-898

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Taekyun Kim, Dae San Kim, Gwan-Woo Jang and Lee-Chae Jang

• λ-Daehee polynomials of the first kind Dn,λ (x) given by (see [8]) ( λt ) ∞ ∑ λlog(1 + t) tn e −1 t x (1 + t) = D (x) , D (x) ∼ , e − 1 . n,λ n,λ (1 + t)λ − 1 n! λt n=0

7

(39)

• The polynomials IAn (x) given by (see [12]) ∞ ∑

(1 + t)−1 (1 + t)x =

IAn (x)

n=0

( ) tn , IAn (x) ∼ et , et − 1 . n!

(α)

(α)

(40) (α)

Note here that IAn (x) is the inverse, under umbral composition, of an (−x), where an (x) (α) is the actuarial polynomial with an (x) ∼ ((1 − t)−α , log(1 − t)). (a) We recall Gould’s identity 640 from [11], page 10: n ∑ (−1)k

k!

k=0

(x)k =

(−1)n (x − 1)n . n!

(41)

From Theorem 2, we have the following identities n ∑ (−1)k

k!

k=0

(α)

sk (x) = n ∑ (−1)k k=0

k!

(−1)n (α) s (x − 1), n! n (α)

(42)

(α)

(αsk+1 (x) − (x − αk)sk (x))

(−1)n (α) = (αsn+1 (x − 1) − (x − (n + 1)α)s(α) n (x − 1)), (n ≥ 0). n! (b) The Vandermonde convolution formula can be written as n ( ) ∑ n (y)n−k (x)k = (x + y)n . k

(43)

(44)

k=0

Then Theorem 2 implies the following identities n ( ) ∑ n (α) (α) (y)n−k sk (x) = sk (x + y), k

(45)

k=0

n ( ) ∑ n (α) (α) (y)n−k (αsk+1 (x) − (x − αk)sk (x)) k

k=0 (α)

= αsn+1 (x + y) − (x + (y − n)α)s(α) n (x + y), (n ≥ 0). (c) For any sn (x) ∼ (g(t), e − 1), the Sheffer identity says n ( ) ∑ n sn (x + y) = sn−k (y)(x)k . k

(46)

t

(47)

k=0

From Theorem 2 with a = 1, b = 0,, we obtain the following identities n ( ) ∑ n (α) s(α+1) (x + y) = sn−k (y)sk (x), n k

(48)

k=0

(α+1)

αsn+1 (x + y) + α(n − y)s(α+1) (x + y) n

895

T. KIM ET AL 889-898

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

A generalization of some results for Appell polynomials to Sheffer polynomials n ( ) ∑ n (α) (α) = sn−k (y)((α + 1)sk+1 (x) + ((α + 1)k − x)sk (x)), (n ≥ 0). k

(49)

k=0

(d) Let A(n, k)(0 ≤ k ≤ n) be the Eulerian numbers determined by ∞ n ∑ ∑ 1−t xn , A (t) = A (t) = A(n, k)tk , n n n! e(t−1)x − t n=0 k=0

(50)

Worpitzky’s identity is given by xn =

n−1 ∑ k=0

which can be rewritten as n ∑

S2 (n, k)(x)k =

k=0

n ∑ k=0

( ) x+k A(n, k) , n

(51)



 ( ) n−1 ∑ 1 j   (x)k , A(n, j) k! j=0 n−k

(52)

with S2 (n, k) denoting the Stirling numbers of the second kind. Now, Theorem 2 yields the following identities ( ) n n n−1 ∑ ∑ 1 ∑ j (α) (α) S2 (n, k)sk (x) = (53) A(n, j) s (x), k! j=0 n−k k k=0

k=0

n ∑

(α)

(α)

S2 (n, k)(αsk+1 (x) − (x − αk)sk (x))

k=0

( ) n−1 n ∑ 1 ∑ j (α) (α) = A(n, j) (αsk+1 (x) − (x − αk)sk (x)), (n ≥ 0). k! j=0 n−k

(54)

k=0

Example 3.2. Let sn (x) ∼ (g(t), λ1 (eλt − 1)), for some invertiable series g(t). Here f (t) = 1 1 λ log(1 + λt), and hence f ′ (t) = 1 + λt. Thus θ0 = 1, θ1 = λ, and θm = 0, for m ≥ 2. (0)

Observe here that sn (x) = (x|λ)n , where (x|λ)n = x(x − λ) · · · (x − (n − 1)λ), for n ≥ 1, and (x|λ)0 = 1. This includes many special polynomials: • degenerate Bernoulli polynomials βn (λ, x) given by (see [1]) ( ) ∞ ∑ x t tn λ(et − 1) 1 λt λ = (1 + λt) β (λ, x) ∼ , β (λ, x) , (e − 1) . (55) n n 1 n! eλt − 1 λ (1 + λt) λ − 1 n=0 • degenerate Euler polynomials En (λ, x) given by (see [1]) ( t ) ∞ ∑ x e + 1 1 λt 2 tn λ , (e − 1) . (1 + λt) = En (λ, x) , En (λ, x) ∼ 1 n! 2 λ (1 + λt) λ + 1 n=0 • degenerate poly-Bernoulli polynomials βn,k (λ, x) given by (see [7]) ∑∞ n x Lik (1−e−t ) (1 + λt) λ = n=0 βn,k (λ, x) tn! , 1 (1+λt) λ −1 ( ) et −1 1 λt βn,k (λ, x) ∼ , (e − 1) . 1 λt − (e −1) λ Lik (1−e

)

λ

(a) For any sn (x) ∼ (g(t), λ1 (eλt − 1)), the Sheffer identity says n ( ) ∑ n sn (x + y) = sn−k (y)(x|λ)k k

(56)

(57)

(58)

k=0

896

T. KIM ET AL 889-898

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Taekyun Kim, Dae San Kim, Gwan-Woo Jang and Lee-Chae Jang

9

From Theorem 2, we get the following identities. ∑n ( ) (α+1) (α) sn (x + y) = k=0 nk sn−k (y)sk (x), (α+1) (α+1) αsn+1 (x + y) + α(nλ − y)sn (x + y) ∑n (n) (α) (α) = k=0 k sn−k (y)((α + 1)sk+1 (x) + ((α + 1)kλ − x)sk (x)), (n ≥ 0). y λ

x λ

(59)

x+y λ

(b) From the identity (1 + λt) (1 + λt) = (1 + λt) , we have the convolution formula ( ) n ∑ n (y|λ)n−k (x|λ)k = (x + y|λ)n (60) k k=0

We can deduce the following identities from Theorem 2. n ( ) ∑ n (α) (y|λ)n−k sk (x) = s(α) n (x + y), k

(61)

k=0

n ( ) ∑ n (α) (α) (y|λ)n−k (αsk+1 (x) − (x − αkλ)sk (x)) k

k=0 (α)

= αsn+1 (x + y) − (x + (y − nλ)α)s(α) n (x + y), (n ≥ 0).

(62)

(c) In [4], Hsu and Shiue introdued Stirling-type pair {S(n, k; α, β, r), S(n, k; β, α, −r)} by the inverse relations n ∑ (x|α)n = S(n, k; α, β, r)(x − r|β)k , (63) k=0

(x|β)n =

n ∑

S(n, k; β, α, −r)(x + r|α)k .

(64)

k=0

They showed that S(n, k) = S(n, k; α, β, r) satisfies the recurrence relation S(n + 1, k) = S(n, k − 1) + (kβ − nα + r)S(n, k), (n ≥ k ≥ 1),

(65)

which together with the obvious facts S(n, 0) = (r|α)n , S(n, n) = 1, (n ≥ 0), completely ( ) determines S(n, k). Clearly, S1 (n, k) = S(n, k; 1, 0, 0), S2 (n, k) = S(n, k; 0, 1, 0), nk = S(n, k; 0, 0, 1), and hence the Stirling-type pair are nothing but far-reaching generalization of the classical Stirling numbers of the first kind and of the second kind. Remark 3.1. We now apply Theorem 2 by choosing α = β = λ. Then n ∑ (x|λ)n = S(n, k; λ, λ, r)(x − r|λ)k ,

(66)

k=0

where S(n, k) = S(n, k; λ, λ, r) satisfies the relation S(n + 1, k) = S(n, k − 1) + ((k − n)λ + r)S(n, k), (n ≥ k ≥ 1),

(67)

S(n, 0) = (r|λ)n , S(n, n) = 1, (n ≥ 0).

(68)

Applying Theorem 2 to (66), we obtain the following identities s(α) n (x) =

n ∑

(α)

S(n, k; λ, λ, r)sk (x − r),

k=0 (α)

αsn+1 (x) − (x − nλα)s(α) n (x) n ∑ (α) (α) = S(n, k; λ, λ, r)(αsk+1 (x − r) − (x − (r + kλ)α)sk (x − r)), (n ≥ 0).

(69)

k=0

897

T. KIM ET AL 889-898

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

A generalization of some results for Appell polynomials to Sheffer polynomials

Acknowledgements: One of the authors of the present paper came to know the results in [10] while reviewing that paper. We would like to give sincere thanks to the authors of [10]. References [1] L. Carlitz, Degenerate Stirling, Bernoulli and Eulerian numbers, Util. Math. 15 (1979), 51-88. [2] D. V. Dolgy, D. S. Kim, T. Kim, Korobov polynomials of the first kind, Sb. Math. 208(1) (2017), 67-74. [3] D. V. Dolgy, D. S. Kim, T. Kim, T. Mansour, Degenerate poly-Bernoulli polynomials of the second kind, J. Comput. Anal. Appl. 21(5) (2016), 954-966. [4] L. C. Hsu, P. J.-S. Shiue, A unified approach to generalized Stirling numbers, Adv. Appl. Math. 20(3) (1998), 366-384. [5] D. S. Kim, T. Kim, Daehee numbers and polynomials, Appl. Math. Sci. 7(120) (2013), 5967-5976. [6] D. S. Kim, T. Kim, A note on Boole polynomials, Integral Transforms Spec. Funct. 25(8) (2014), 60-74. [7] D. S. Kim, T. Kim, A note on degenerate poly-Bernoulli numbers and polynomials, Adv. Difference Equ. (2015), 2015:258. [8] D. S. Kim, T. Kim, S.-H. Lee, J.-J. Seo, A note on the lambda-Daehee polynomials, Internat. J. Math. Anal. 7(62) (2013), 3069-3080. [9] T. Kim, D. S. Kim, D .V. Dolgy, J.-J. Seo, Bernoulli polynomials of the second kind and their identities arising from umbral calculus, J. Nonlinear Sci. Appl. 9 (2016), 860-869. [10] M. Micouhi, S. Taharbouchet, Some applications of the Appell polynomials, Preprint . [11] J. Quaintance, H. W. Gould, Combinatorial identities for Stiring numbers, World Scientific Publishing Co. Pte. Ltd , Singapore, 2016. [12] S. Roman, The umbral calculus, Pure and Applied Mathematics Vol. 111 Academic Press , Inc. [Harcourt Brace Jovanovich, Publishers, New York, 1984. [13] T. Kim, D. S. Kim, On λ-Bell polynomials associated with umbral calculus, Russ. J. Math. Phys. 24 (2017), 69–78. Department of Mathematics, Kwangwoon University, Seoul 139-701, Republic of Korea E-mail address: [email protected] Department of Mathematics, Sogang University, Seoul 121-742, Republic of Korea E-mail address: [email protected] Department of Mathematics, Kwnagwoon University, Seoul 139-701, Republic of Korea E-mail address: [email protected] Graduate School of Education, Konkuk University, Seoul 143-701, Republic of Korea E-mail address: [email protected]

898

T. KIM ET AL 889-898

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

New Two-step Viscosity Approximation Methods of Fixed Points for Set-valued Nonexpansive Mappings Associated with Contraction Mappings in CAT(0) Spaces Ting-jian Xiong and Heng-you Lan



College of Mathematics and Statistics, Sichuan University of Science & Engineering, Zigong, Sichuan 643000, PR China

Abstract. The purpose of this paper is to introduce and study a class of new two-step viscosity iteration methods for approximating fixed points of set-valued nonexpansive mappings in CAT(0) spaces. Here, the fixed point is unique solution of a variational inequality with a contraction mapping. Further, we prove strong convergence theorem of the two-step viscosity iterations with some general conditions in a complete CAT(0) space. The presented results improve and unify the corresponding results in the literature. Key Words and Phrases: New two-step viscosity approximation method, fixed point, strong convergence, set-valued nonexpansive mapping, CAT(0) space. AMS Subject Classification: 47H09, 47H10, 54E70.

1

Introduction

As all we know, Kirk [1] first introduced and studied fixed point theory in CAT(0) spaces, and showed that every (single-valued) nonexpansive mapping on a bounded closed convex subset of a complete CAT(0) space (called also Hadamard space) always has a fixed point. On the other hand, fixed point theory for set-valued mappings has many useful applications in applied sciences, game theory and optimization theory. Since then, fixed point theory of single-valued and set-valued mapping in CAT(0) spaces has been rapidly developed, and it is natural and particularly meaningful to extend research of the known fixed point results for single-valued mappings to the setting of set-valued mappings. Recalled that a mapping f : X → X on a metric space (X, d) is said to be a contraction if there exists a constant k ∈ (0, 1] such that d(f (x), f (y)) ≤ kd(x, y) for all x, y ∈ X.

(1.1)

Here, f is called nonexpansive when k = 1 in (1.1). Denote by F ix(f ) the set of all fixed points of f , i.e., F ix(f ) = {x| x = f (x)}. Further, a set-valued mapping T : E → BC(X) is said to be nonexpansive if and only if H(T x, T y) ≤ d(x, y), where E is a nonempty subset of X, BC(X) is the family of nonempty bounded closed subsets of X, and H(·, ·) is Hausdorff distance on BC(X), i.e., for any A, B ∈ BC(X), H(A, B) = max{sup inf d(a, b), sup inf d(b, a)}. b∈B a∈A

a∈A b∈B

If x ∈ T x for all x ∈ E, then x is called a fixed point of set-valued mapping T . We shall denote by F (T ) the set of all fixed points of T . A set-valued mapping T is said to satisfy endpoint condition ∗ The

corresponding author: [email protected] (H.Y. Lan)

1

899

Ting-jian Xiong ET AL 899-909

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

C (see [2]) if F (T ) ̸= ∅ and T x = {x} for any x ∈ F (T ). We note that Panyanak and Suantai [3] pointed out “the condition C must be needed for set-valued mapping in the CAT(0) spaces”. Indeed, using contractions to approximate nonexpansive mappings is a classical way for studying a nonexpansive mapping g : X → X. More precisely, take α ∈ (0, 1) and define a contraction gα : E → E by gα (x) = αu + (1 − α)g(x), ∀x ∈ E, where u ∈ E ⊆ X is an arbitrary fixed element. By Banach′ s contraction mapping principle, gα has a unique fixed point xα ∈ E. It is unclear, in general, what the behavior of xα is as α → 0, even if g has a fixed point. However, in the case of g having a fixed point, Browder [4] proved that xα converges strongly to a fixed point of g, which is nearest to u in the frame work of Hilbert spaces. Further, Reich [5] extended Browder′ s result in [4] to the setting of Banach spaces and proved that xα converges strongly to a fixed point of g in a uniformly smooth Banach space, and the limit defines the unique sunny nonexpansive retraction from E onto F ix(g). Halpern [6] introduced and investigated the following explicit iterative scheme {xn } for a nonexpansive mapping g on a nonempty subset E of a Hilbert space: for any taken points u, x1 ∈ E, and every αn ∈ (0, 1), xn+1 = αn u + (1 − αn )g(xn ).

(1.2)

In 2010, Saejung [7] studied some convergence theorems of the following Halpern′ s iterations for a nonexipansive mapping g : E → E in a Hadamard space: xα = αu ⊕ (1 − α)g(xα )

(1.3)

xn+1 = αn u ⊕ (1 − αn )g(xn ), n ≥ 1,

(1.4)

and where u is an any fixed element, x1 ∈ E are arbitrarily chosen and αn ∈ (0, 1), and xα ∈ E is called the unique fixed point of the contraction x 7→ αu ⊕ (1 − α)g(x) for all α ∈ (0, 1). In [7], Saejung showed that {xα } and {xn } converges strongly to x ˜ ∈ F ix(g) as α → 0 and n → ∞ under certain appropriate conditions on {αn }, respectively. Here, x ˜ is nearest to u, i.e. x ˜ = PF ix(g) u, here PE : X → E is a metric projection from X onto E, i.e., PE (x) = x0 ∈ E, where x0 is satisfied with d(x, x0 ) < d(x, y) for any y ∈ E and y ̸= x0 and E is a nonempty closed convex subset of (X, d). Moreover, Shi and Chen [8] first studied convergence theorems of the following M oudaf i′ s viscosity iterative methods for a nonexpansive mapping g : E → E with F ix(g) ̸= ∅ and a contraction mapping f : E → E in CAT(0) space X: xα = αf (xα ) ⊕ (1 − α)g(xα ),

(1.5)

xn+1 = αn f (xn ) ⊕ (1 − αn )g(xn ), n ≥ 1,

(1.6)

and where α ∈ (0, 1), αn ∈ (0, 1), x1 is an any given element in a nonempty closed convex subset E ⊆ X. xα ∈ E is called unique fixed point of contraction x 7→ αf (x)⊕(1−α)g(x). We remark that (1.5) and (1.6) is a extension case of (1.3) and (1.4), respectively. Shi and Chen [8] proved that {xα } defined by (1.5) converges strongly as α → 0 to x ˜ ∈ F ix(g) such that x ˜ = PF ix(g) f (˜ x) in the framework of CAT(0) space (X, d) satisfying the following property P: For every x, u, y1 , y2 ∈ X, d(x, m1 )d(x, y1 ) ≤ d(x, m2 )d(x, y2 ) + d(x, u)d(y1 , y2 ), where mi = P[x,yi ] u for i = 1, 2. Furthermore, the authors also found that the sequence {xn } generated by (1.6) converges strongly to x ˜ ∈ F ix(g) under certain appropriate conditions imposing on {αn }. By using the concept of quasi-linearization due to Berg and Nikolaev [9], Wangkeeree and Preechasilp [10] studied strong convergence theorems for (1.5) and (1.6) in CAT(0) spaces without 2

900

Ting-jian Xiong ET AL 899-909

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

the property P, and presented that the iterative processes (1.5) and (1.6) converge strongly to x ˜ ∈ F ix(g), where x ˜ = PF ix(g) f (˜ x) is unique solution of variational inequality −−−→ − → ⟨x ˜f (˜ x), x˜ x⟩ ≥ 0, x ∈ F ix(g). Recently, Panyanak and Suantai [3] extended (1.5) and (1.6) to T being a set-valued nonexpansive mapping from E to BC(X). That is, for each α ∈ (0, 1), let a set-valued contraction Gα on E define by Gα (x) = αf (x) ⊕ (1 − α)T x, ∀x ∈ E. By N adler′ s theorem [11], one can easy to see that Gα has a (not necessarily unique) fixed point xα ∈ E such that xα ∈ αf (xα ) ⊕ (1 − α)T xα , i.e., for each xα , there exists yα ∈ T xα such that xα = αf (xα ) ⊕ (1 − α)yα .

(1.7)

Correspondingly, there is an explicit approximation method. More precisely, let T : E → C(E) be a nonexpansive mapping, where C(E) denotes the family of nonempty compact subsets of E, f : E → E be a contraction and {αn } ⊆ (0, 1). For any given x1 ∈ E and y1 ∈ T x1 , let x2 = α1 f (x1 ) ⊕ (1 − α1 )y1 . By the definition of Hausdorff distance and the nonexpansiveness of T , one can choose y2 ∈ T x2 such that d(y1 , y2 ) ≤ d(x1 , x2 ). Inductively, we obtain xn+1 = αn f (xn ) ⊕ (1 − αn )yn , yn ∈ T (xn ),

(1.8)

and d(yn , yn+1 ) ≤ d(xn , xn+1 ) for all n ∈ N. Then, Panyanak and Suantai [3] proved strong convergence of one-step viscosity approximation method defined by (1.7) and (1.8) for set-valued nonexpansive mapping T in CAT(0) spaces when the contraction constant coefficient of f is k ∈ [0, 21 ) 1 ) satisfying some suitable conditions. Further, Chang et al.[12] affirmatively and {αn } ⊂ (0, 2−k answered the open question [3, Question 3.6] proposed by Panyanak and Suantai:“If k ∈ [0, 1) and {αn } ⊂ (0, 1) satisfying the same conditions, does {xn } converge to x ˜ = PF (T ) f (˜ x)?” Moreover, Kaewkhao et al. [13] proved strong convergence of a two-step viscosity iteration method in complete CAT(0) spaces defined as follows: yn = αn f (xn ) ⊕ (1 − αn )g(xn ), xn+1 = βn xn ⊕ (1 − βn )yn , ∀ n ≥ 1,

(1.9)

where x1 ∈ E is an arbitrary fixed element and {αn }, {βn } ⊆ (0, 1). (1.9) is also considered and studied by Chang et al.[14] when the property P is not satisfied and k ∈ [0, 1), which dues to the open questions in [13]. Motivated and inspired mainly by Panyanak and Suantai [3] and Kaewkhao et al. [13], The purpose of this paper is to consider the following two-step viscosity iteration approximation for setvalued nonexpansive mapping T : E → C(E) on a nonempty closed convex subset E of a complete CAT(0) space (X, d): xn+1 = βn xn ⊕ (1 − βn )yn , (1.10) yn = αn f (xn ) ⊕ (1 − αn )zn , ∀ n ≥ 1, where x1 ∈ E is an arbitrary fixed element and {αn }, {βn } ⊆ (0, 1), f : E → E is a contraction mapping and zn ∈ T (xn ) satisfying d(zn , zn+1 ) ≤ d(xn , xn+1 ) for all n ∈ N, which can be inducted from the definition of Hausdorff distance and the nonexpansiveness of T (see [11]). We shall prove the sequence {xn } proposed by (1.10) converges strongly to fixed points x ˜ ∈ F (T ), where x ˜ = PF (T ) f (˜ x) is unique solution of the following variational inequality: −−−→ − → ⟨x ˜f (˜ x), x˜ x⟩ ≥ 0, ∀x ∈ F (T ). Remark 1.1. (i) When T is a nonexpansive single-valued mapping g, then (1.10) is equivalent to (1.9). (ii) However, (1.9) can not becomes (1.8), unless βn = 0. 3

901

Ting-jian Xiong ET AL 899-909

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

Preliminaries

In the sequel, (X, d) delegates a metric space. A geodesic path joining x ∈ X to y ∈ X (or, more briefly, a geodesic from x to y) is a map ξ from a closed interval [0, l] ⊆ R to X such that ξ(0) = x, ξ(l) = y, and d(ξ(s), ξ(t)) = |s − t| for any s, t ∈ [0, l]. In particular, ξ is a isometry and d(x, y) = l. The image of ξ is said to be a geodesic segment (or metric) joining x and y if unique is denoted by [x, y]. The space (X, d) is called a geodesic space when every two points in X are joined by a geodesic, and X is said to be uniquely geodesic if there is exactly one geodesic joining x and y for all x, y ∈ X. A subset E of X is said to be convex if E includes every geodesic segment joining any two of its points. A geodesic triangle △(p, q, r) in a geodesic space (X, d) consists of three points p, q, r in X (vertices of △) and a choice of three geodesic segments [p, q], [q, r], [r, p] (edge of △) joining them. A comparison triangle for geodesic triangle △(p, q, r) in X is a triangle △(¯ p, q¯, r¯) in Euclidean plane R2 such that dR2 (¯ p, q¯) = d(p, q), dR2 (¯ q , r¯) = d(q, r), dR2 (¯ r, p¯) = d(r, p). A point u ¯ ∈ [¯ p, q¯] is said to be a comparison point for u ∈ [p, q] if d(p, u) = dR2 (¯ p, u ¯). Similarly, we can give the definitions to comparison points on [¯ q , r¯] and [¯ r, p¯]. Recalled that a geodesic space is called CAT(0) space if all geodesic triangles of appropriate size satisfy the following comparison axiom: Let △ be a geodesic triangle in (X, d) and △ be a comparison triangle for △. Then △ is said to satisfy CAT(0) inequality if for any u, v ∈ △ and for their comparison points u ¯, v¯ ∈ △, d(u, v) ≤ dR2 (¯ u, v¯). Complete CAT(0) spaces are often called Hadamard spaces (see [15]). For other equivalent definitions and basic properties of CAT(0) spaces, we refer to [16]. It is well known that every CAT(0) space is uniquely geodesic and any complete, simply connected Riemannina manifold having non-positive sectional curvature is a CAT(0) space. Other examples for CAT(0) spaces include Pre-Hilbert spaces [16], R−trees [17], Euclidean buildings [18] and complex Hilbert ball with a hyperbolic metric [19] as special case . Let E be a nonempty closed convex subset of a complete CAT(0) space (X, d). It follows from Proposition 2.4 of [16] that for each x ∈ X, there exists a unique point x0 ∈ E such that d(x, x0 ) = inf{d(x, y) : y ∈ E}. In this case, x0 is called unique nearest point of x in E. Let (X, d) be a CAT(0) space. For each x, y ∈ X and t ∈ [0, 1], by Lemma 2.1 of Phompongsa and Panyanak [20], there exists a unique point z ∈ [x, y] such that d(x, z) = (1 − t)d(x, y) and d(y, z) = td(x, y).

(2.1)

We shall denote by tx ⊕ (1 − t)y unique point z satisfying (2.1). Now, we collect some elementary facts about CAT(0) spaces which will be used in proof of our main results. Lemma 2.1. ([1, 20]) Assume that (X, d) is a CAT(0) space. Then for any x, y, z ∈ X and α ∈ [0, 1], d(αx ⊕ (1 − α)y, z) ≤ αd(x, z) + (1 − α)d(y, z), d2 (αx ⊕ (1 − α)y, z) ≤ αd2 (x, z) + (1 − α)d2 (y, z) − α(1 − α)d2 (x, y), d(αx ⊕ (1 − α)z, αy ⊕ (1 − α)z) ≤ αd(x, y). Lemma 2.2. ([21]) Let (X, d) be a CAT(0) space. If for any x, y ∈ X and α, β ∈ [0, 1], then d(αx ⊕ (1 − α)y, βx ⊕ (1 − β)y) ≤ |α − β|d(x, y). Lemma 2.3. ([22]) Let {xn } and {yn } be bounded sequences in a CAT(0) space (X, d) and let {βn } be a sequence in [0, 1] with 0 < lim inf n βn ≤ lim supn βn < 1. If xn+1 = βn xn ⊕ (1 − βn )yn for all n ∈ N and lim sup (d(yn+1 , yn ) − d(xn+1 , xn )) ≤ 0, n→∞

4

902

Ting-jian Xiong ET AL 899-909

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

then limn→∞ d(xn , yn ) = 0. Lemma 2.4. ([23, Lemma 2.1]) Let {un } be a sequence of non-negative real numbers satisfying un+1 ≤ (1 − αn )un + αn βn , ∀ n ≥ 1, ∑∞ where ∑∞ {αn } ⊂ [0, 1] and {βn } ⊂ R such that (i) n=1 αn = ∞ and (ii) lim supn→∞ βn ≤ 0 or n=1 |αn βn | < ∞. Then {un } converges to zero as n → ∞. Lemma 2.5. ([24, Lemma 3.1]) Let E be a closed convex subset of a complete CAT(0) space (X, d) and T : E → BC(X) be a nonexpansive mapping. If T satisfies endpoint condition C, then F (T ) is closed and convex. The concept of quasi-linearization was introduced by Berg and Nikolaev [9]. Let us denote a pair − → (a, b) in X ×X by ab and call it a vector. The quasi-linearization is a map ⟨·, ·⟩: (X ×X)×(X ×X) → R defined by ] − → − → 1[ 2 ⟨ab, cd⟩ = d (a, d) + d2 (b, c) − d2 (a, c) − d2 (b, d) for all a, b, c, d ∈ X. 2 − → − → → − → − − → − → − → − → → − → − − → → − − → → It is easy to see that ⟨ab, cd⟩ = ⟨cd, ab⟩, ⟨ab, cd⟩ = −⟨ba, cd⟩, ⟨ab, cd⟩ + ⟨ad, bc⟩ = ⟨− ac, bd⟩ and → − → − → − → − → → − ⟨− ax, cd⟩ + ⟨xb, cd⟩ = ⟨ab, cd⟩ for all a, b, c, d, x ∈ X. We say that a geodesic metric space (X, d) satisfies Cauchy-Schwarz inequality if − → → − ⟨ab, cd⟩ ≤ d(a, b)d(c, d) for all a, b, c, d ∈ X. It is known from [9, Corollary 3] that a geodesic space (X, d) is a CAT(0) space if and only if X satisfies Cauchy-Schwarz inequality. Some other properties of quasi-linearization are included as follows. Lemma 2.6. ([25, Theorem 2.4]) Let E be a nonempty closed convex subset of a complete CAT(0) space (X, d), u ∈ X and x ∈ E. Then → − → ≥ 0, ∀y ∈ E. x = PE u if and only if ⟨− xu, yx⟩ Lemma 2.7. ([10, Lemma 2.9]) Let (X, d) be a CAT(0) space. Then → − → d2 (x, u) ≤ d2 (y, u) + 2⟨− xy, xu⟩,

∀u, x, y ∈ X.

Lemma 2.8. ([10, Lemma 2.10]) Let u and v be two points in a CAT(0) space (X, d). For each α ∈ [0, 1], setting uα = αu ⊕ (1 − α)v, then, for each x, y ∈ X, we have → −−→ − → −−→ − → −−→ (i) ⟨− u− α x, uα y⟩ ≤ α⟨ux, uα y⟩ + (1 − α)⟨vx, uα y⟩; − − → − → − → − → − → → and ⟨− → − → − → − → − → − → (ii) ⟨uα x, uy⟩ ≤ α⟨ux, uy⟩ + (1 − α)⟨vx, − uy⟩ u− α x, vy⟩ ≤ α⟨ux, vy⟩ + (1 − α)⟨vx, vy⟩. Lemma 2.9. ([13, Lemma 2.10]) Let (X, d) be a CAT(0) space. If for any x, y, z ∈ X and α ∈ [0, 1], then → − → d2 (αx ⊕ (1 − α)y, z) ≤ α2 d2 (x, z) + (1 − α)2 d2 (y, z) + 2α(1 − α)⟨− xz, yz⟩. Recalled that a continuous linear functional µ is said to be Banach limit on ℓ∞ , if ∥µ∥ = µ(1, 1, · · · ) = 1 and µn (un ) = µn (un+1 ) for all {un } ∈ ℓ∞ . Lemma 2.10. ([26, Proposition 2]) Let α be a real number and let (u1 , u2 , · · · ) ∈ ℓ∞ satisfy µn (un ) ≤ α for all Banach limits µ and lim supn (un+1 − un ) ≤ 0. Then lim supn un ≤ α.

3

Main theorem

In this section, we will prove strong convergence theorem of a class of new two-step viscosity iterations for approximating fixed points of set-valued nonexpansive mappings with some general conditions in a complete CAT(0) space. 5

903

Ting-jian Xiong ET AL 899-909

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Lemma 3.1. ([3, Theorem 3.1]) Let E be a nonempty closed convex subset of a complete CAT(0) space (X, d), T : E → C(E) be a nonexpansive mapping satisfying endpoint condition C, and f : E → E be a contraction with k ∈ [0, 1). Then the following statements hold: (i) {xα } defined by (1.7) converges strongly to x ˜ as α → 0, where x ˜ = PF (T ) f (˜ x). (ii) If {xn } is a bounded sequence in E such that limn→∞ d(xn , T (xn )) = 0, Then for any Banach limits µn , d2 (f (˜ x), x ˜) ≤ µn d2 (f (˜ x), xn ). Now, we are ready to prove our main theorem. Theorem 3.1. Let E be a nonempty closed convex subset of a complete CAT(0) space (X, d), T : E → C(E) be a nonexpansive mapping satisfying endpoint condition C. Let f : E → E be a contraction with k ∈ [0, 1), and {αn } be a sequence in (0, 1 − k), and {βn } be a sequences in (0, 1) satisfying the following conditions: (C1 ) ∑ limn→∞ αn = 0; ∞ (C2 ) n=1 αn = ∞; (C3 ) 0 < lim inf n→∞ βn ≤ lim supn→∞ βn < 1. Then the sequence {xn } defined by (1.10) converges strongly to x ˜, which satisfies −−−→ − → x ˜ = PF (T ) f (˜ x), ⟨x ˜f (˜ x), x˜ x⟩ ≥ 0, ∀x ∈ F (T ). Proof. We divide proof into three steps. Step 1. We show that {xn }, {zn }, {yn } and {f (xn )} are bounded sequences. Let p ∈ F (T ). By Lemma 2.1, we have ≤ αn d(f (xn ), p) + (1 − αn )dist(zn , T (p))

d(yn , p)

≤ αn d(f (xn ), p) + (1 − αn )H(T (xn ), T (p)) ≤ αn d(f (xn ), p) + (1 − αn )d(xn , p) ≤ αn d(f (xn ), f (p)) + αn d(f (p), p) + (1 − αn )d(xn , p) ≤ [1 − (1 − k)αn ]d(xn , p) + αn d(f (p), p), and ≤ βn d(xn , p) + (1 − βn )d(yn , p)

d(xn+1 , p)

≤ [1 − (1 − k)(1 − βn )αn ]d(xn , p) + (1 − k)(1 − βn )αn { } d(f (p), p) ≤ max d(xn , p), . 1−k By induction, we also have

d(f (p), p) 1−k

{ } d(f (p), p) d(xn , p) ≤ max d(x1 , p), . 1−k

Hence, {xn } is bounded and so are {zn }, {yn } and {f (xn )}. Step 2. limn→∞ dist(xn , T (xn )) = limn→∞ d(zn , xn ) = limn→∞ d(xn , xn+1 ) = 0. In fact, by applying Lemmas 2.1 and 2.2, we obtain d(yn , yn+1 ) ≤ ≤

d(αn f (xn ) ⊕ (1 − αn )zn , αn+1 f (xn+1 ) ⊕ (1 − αn+1 )zn+1 ) d(αn f (xn ) ⊕ (1 − αn )zn , αn f (xn ) ⊕ (1 − αn )zn+1 ) +d(αn f (xn ) ⊕ (1 − αn )zn+1 , αn f (xn+1 ) ⊕ (1 − αn )zn+1 ) +d(αn f (xn+1 ) ⊕ (1 − αn )zn+1 , αn+1 f (xn+1 ) ⊕ (1 − αn+1 )zn+1 )

≤ ≤

αn d(f (xn ), f (xn+1 )) + (1 − αn )d(zn , zn+1 ) +|αn − αn+1 |d(f (xn+1 ), zn+1 ) αn kd(xn , xn+1 ) + (1 − αn )d(xn , xn+1 )



+|αn − αn+1 |d(f (xn+1 ), zn+1 ) (1 − αn (1 − k))d(xn , xn+1 ) + |αn − αn+1 |d(f (xn+1 ), zn+1 ), 6

904

Ting-jian Xiong ET AL 899-909

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

which implies d(yn , yn+1 ) − d(xn , xn+1 ) ≤ |αn − αn+1 |d(f (xn+1 ), zn+1 ) − (1 − k)αn d(xn , xn+1 ). Since limn→∞ αn = 0, lim supn→∞ [d(yn+1 , yn ) − d(xn+1 , xn )] ≤ 0. By Lemma 2.3, we know that limn→∞ d(xn , yn ) = 0. Thus, dist(xn , T (xn )) ≤ d(xn , zn ) ≤ d(xn , yn ) + αn d(f (xn ), zn ) → 0 as

n → ∞.

(3.1)

By (3.1), now we know that lim d(zn , xn ) = 0.

(3.2)

n→∞

Moreover, d(xn , xn+1 ) = (1 − βn )d(xn , yn ) → 0 as

n → ∞.

Step 3. {xn } converges strongly to x ˜ which satisfies x ˜ = PF (T ) f (˜ x) and −−−→ − → ⟨x ˜f (˜ x), x˜ x⟩ ≥ 0, x ∈ F (T ). Above all, since T (x) is compact for any x ∈ E, T (x) ∈ BC(X). It follows from Lemma 2.5 that F (T ) is closed and convex. This implies that PF (T ) u is well defined for any u ∈ X. By Lemma 3.1 (i), we know that {xα } defined by (1.7) converges strongly to x ˜ as α → 0, where x ˜ = PF (T ) f (˜ x). Thus applying Lemma 2.6, one can see that x ˜ is unique solution of the following variational inequatity −−−→ − → ⟨x ˜f (˜ x), x˜ x⟩ ≥ 0, x ∈ F (T ). Next, by using Lemma 3.1 (ii), we have d2 (f (˜ x), x ˜) ≤ µn d2 (f (˜ x), xn ) for each Banach limit µn , and so µn (d2 (f (˜ x), x ˜) − d2 (f (˜ x), xn )) ≤ 0. Moreover, since limn→∞ d(xn , xn+1 ) = 0, lim sup[(d2 (f (˜ x), x ˜) − d2 (f (˜ x), xn+1 )) − (d2 (f (˜ x), x ˜) − d2 (f (˜ x), xn ))] = 0. n→∞

It follows from Lemma 2.10 that lim sup(d2 (f (˜ x), x ˜) − d2 (f (˜ x), xn )) ≤ 0.

(3.3)

n→∞

Finally, we show xn → x ˜ as n → ∞. It follows from Lemma 2.1 and Lemmas 2.7-2.9 that d2 (xn+1 , x ˜)

≤ βn d2 (xn , x ˜) + (1 − βn )d2 (yn , x ˜) [ ] 2 ≤ βn d (xn , x ˜) + (1 − βn ) αn2 d2 (f (xn ), x ˜) + (1 − αn )2 d2 (zn , x ˜) −−−−→ −−→ +2αn (1 − αn )(1 − βn )⟨f (xn )˜ x, zn x ˜⟩ 2 2 ≤ βn d (xn , x ˜) + (1 − βn )(1 − αn ) dist2 (zn , T (˜ x)) [ −−−−→ −−−−→ ] 2 2 +αn (1 − βn ) d (xn+1 , f (xn )) + 2⟨x ˜xn+1 , x ˜f (xn )⟩ [ −−−−→ −−−−→ −−→ ] −→ +2αn (1 − αn )(1 − βn ) ⟨f (xn )˜ x, − z− x, xn x ˜⟩ n xn ⟩ + ⟨f (xn )˜ ≤ βn d2 (xn , x ˜) + (1 − βn )(1 − αn )2 H 2 (T (xn ), T (˜ x)) −−−−→ −−−−→ 2 2 2 +αn (1 − βn )d (xn+1 , f (xn )) + 2αn (1 − βn )⟨x ˜xn+1 , x ˜f (xn )⟩ −−−−→ −−−→ +2αn (1 − αn )(1 − βn )⟨f (xn )˜ x, zn xn ⟩ −−−−→ −−→ +2αn (1 − αn )(1 − βn )⟨f (xn )˜ x, xn x ˜⟩ 7

905

Ting-jian Xiong ET AL 899-909

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

≤ βn d2 (xn , x ˜) + (1 − βn )(1 − αn )2 d(xn , x ˜) +αn2 (1 − βn )d2 (xn+1 , f (xn )) [ −−−−−−−→ −−−−→ −−−→ −−−−→ ] +2αn2 (1 − βn ) ⟨f (xn )f (˜ x), xn+1 x ˜⟩ + ⟨f (˜ x)˜ x, xn+1 x ˜⟩ −−−−→ −−−→ +2αn (1 − αn )(1 − βn )⟨f (xn )˜ x, zn xn ⟩ [ −−−−−−−→ −−→ −−−→ −−→ ] +2αn (1 − αn )(1 − βn ) ⟨f (xn )f (˜ x), xn x ˜⟩ + ⟨f (˜ x)˜ x, xn x ˜⟩ [ ] ≤ βn + (1 − βn )(1 − αn )2 d2 (xn , x ˜) + αn2 (1 − βn )d2 (xn+1 , f (xn )) [ −−−−−−−→ −−−−→ −−−→ −−−−→ ] +2αn2 (1 − βn ) ⟨f (xn )f (˜ x), xn+1 x ˜⟩ + ⟨f (˜ x)˜ x, xn+1 x ˜⟩ −−−−→ −−−→ +2αn (1 − αn )(1 − βn )⟨f (xn )˜ x, zn xn ⟩ [ −−−−−−−→ −−→ −−−→ −−→ ] +2αn (1 − αn )(1 − βn ) ⟨f (xn )f (˜ x), xn x ˜⟩ + ⟨f (˜ x)˜ x, xn x ˜⟩ [ ] 2 2 2 2 ≤ βn + (1 − βn )(1 − αn ) d (xn , x ˜) + αn (1 − βn )d (xn+1 , f (xn )) +2αn2 (1 − βn )d(f (xn ), f (˜ x))d(xn+1 , x ˜) − − − → − − − − → +2αn2 (1 − βn )⟨f (˜ x)˜ x, xn+1 x ˜⟩ +2αn (1 − αn )(1 − βn )d(f (xn ), x ˜)d(zn , xn ) +2αn (1 − αn )(1 − βn )d(f (xn ), f (˜ x))d(xn , x ˜) −−−→ −−→ +2αn (1 − αn )(1 − βn )⟨f (˜ x)˜ x, xn x ˜⟩ [ ] ≤ βn + (1 − βn )(1 − αn )2 d2 (xn , x ˜) + αn2 (1 − βn )d2 (xn+1 , f (xn )) +2kαn2 (1 − βn )d(xn , x ˜)d(xn+1 , x ˜) [ ] +αn2 (1 − βn ) d2 (xn+1 , x ˜) + d2 (f (˜ x), x ˜) − d2 (f (˜ x), xn+1 ) +2αn (1 − αn )(1 − βn )d(f (xn ), x ˜)d(zn , xn ) +2kαn (1 − αn )(1 − βn )d2 (xn , x ˜) [ ] +αn (1 − αn )(1 − βn ) d2 (xn , x ˜) + d2 (f (˜ x), x ˜) − d2 (f (˜ x), xn ) [ ] ≤ βn + (1 − βn )(1 − αn )2 d2 (xn , x ˜) + αn2 (1 − βn )d2 (xn+1 , f (xn )) [ ] +kαn2 (1 − βn ) d2 (xn , x ˜) + d2 (xn+1 , x ˜) [ ] +αn2 (1 − βn ) d2 (xn+1 , x ˜) + d2 (f (˜ x), x ˜) − d2 (f (˜ x), xn+1 ) +2αn (1 − αn )(1 − βn )d(f (xn ), x ˜)d(zn , xn ) 2 +2kαn (1 − αn )(1 − βn )d (xn , x ˜) [ 2 ] +αn (1 − αn )(1 − βn ) d (xn , x ˜) + d2 (f (˜ x), x ˜) − d2 (f (˜ x), xn ) . This implies that [

d2 (xn+1 , x ˜)

Thus,



] βn + (1 − βn )(1 − αn ) + kαn (1 − βn )(2 − αn ) 2 d (xn , x ˜) 1 − (1 + k)αn2 (1 − βn ) αn2 (1 − βn ) + d2 (xn+1 , f (xn )) 1 − (1 + k)αn2 (1 − βn ) 2αn (1 − αn )(1 − βn ) + d(f (xn ), x ˜)d(zn , xn ) 1 − (1 + k)αn2 (1 − βn ) αn2 (1 − βn ) + (d2 (f (˜ x), x ˜) − d2 (f (˜ x), xn+1 )) 1 − (1 + k)αn2 (1 − βn ) αn (1 − αn )(1 − βn ) + (d2 (f (˜ x), x ˜) − d2 (f (˜ x), xn )). 1 − (1 + k)αn2 (1 − βn ) d2 (xn+1 , x ˜) ≤ (1 − αn′ )d2 (xn , x ˜) + αn′ βn′ ,

(3.4)

8

906

Ting-jian Xiong ET AL 899-909

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

where αn′ =

2αn (1−βn )(1−k−αn ) 1−(1+k)α2n (1−βn )

βn′

=

and

αn 1 − αn d2 (xn+1 , f (xn )) + d(f (xn ), x ˜)d(zn , xn ) 2(1 − k − αn ) 1 − k − αn αn + (d2 (f (˜ x), x ˜) − d2 (f (˜ x), xn+1 )) 2(1 − k − αn ) 1 − αn (d2 (f (˜ x), x ˜) − d2 (f (˜ + x), xn )). 2(1 − k − αn )

Since k ∈ [0, 1) and αn ∈ (0, 1 − k), then αn′ ∈ (0, 1). Applying Lemma 2.4 to the inequality (3.4) (also combining (3.2) and (3.3)), we have xn → x ˜ as n → ∞. This completes the proof. 2 From Theorem 3.1, we have the following result. Theorem 3.2. Let E be a nonempty closed convex subset of a complete CAT(0) space (X, d), T : E → C(E) be a nonexpansive mapping satisfying endpoint condition C. Suppose that u, x1 ∈ E are arbitrarily given elements and {xn } is defined by yn = αn u ⊕ (1 − αn )zn , xn+1 = βn xn ⊕ (1 − βn )yn , ∀ n ≥ 1, where zn ∈ T (xn ) such that d(zn , zn+1 ) ≤ d(xn , xn+1 ) for all n ∈ N, and {αn }, {βn } ⊆ (0, 1) satisfying (C1 ), (C2 ) and (C3 ) in Theorem 3.1. Then the sequence {xn } converges strongly to unique nearest point x ˜ of u in F (T ); i.e., x ˜ = PF (T ) u and x ˜ also satisfies − → − → ⟨x ˜u, x˜ x⟩ ≥ 0, x ∈ F (T ). Proof. We define f : E → E by f (x) = u for all x ∈ E, then f is a contrction with k = 0. The conclusion follows immediately from Theorem 3.1. 2 If T : E → C(E) be a nonexpansive mapping satisfying endpoint condition C, then, replacing by g : E → E be a nonexpansive singie-valued mapping with F ix(g) ̸= ∅, and we have the following two corollaries. Corollary 3.1. Let E be a nonempty closed convex subset of a complete CAT(0) space (X, d), g : E → E be a nonexpansive mapping with F ix(g) ̸= ∅. Let f : E → E be a contraction with k ∈ [0, 1), and {αn } be a sequence in (0, 1 − k), and {βn } be a sequences in (0, 1) satisfying (C1 ), (C2 ) and (C3 ) in Theorem 3.1. Then sequence {xn } defined by (1.9) converges strongly to x ˜ such that x ˜ = PF ix(g) f (˜ x) and x ˜ also satisfies −−−→ − → ⟨x ˜f (˜ x), x˜ x⟩ ≥ 0, x ∈ F ix(g). Corollary 3.2. ([3, Theorem 3.3]) Let E be a nonempty closed convex subset of a complete CAT(0) space (X, d), T : E → C(E) be a nonexpansive mapping satisfying ( endpoint ) condition C. [ ) 1 Let f : E → E be a contraction with k ∈ 0, 21 , and {αn } be a sequence in 0, 2−k satisfying (C1 ) and (C2 )∑ in Theorem 3.1 and the following condition: ∞ n (C4 ) n=1 |αn −αn+1 | < ∞ or limn→∞ ααn+1 = 1. Then sequence {xn } defined by (1.8) converges strongly to x ˜, where x ˜ = PF (T ) f (˜ x) and x ˜ also satisfies −−−→ − → ⟨x ˜f (˜ x), x˜ x⟩ ≥ 0, x ∈ F (T ). By corollary 3.1, the following result can be obtained. Corollary 3.3. Let E be a nonempty closed convex subset of a complete R−tree (X, d), and T : E → BCC(E) be a nonexpansive mapping with F (T ) ̸= ∅, where BCC(E) is the family of nonempty bounded closed convex subsets of E. Let f : E → E be a contraction with k ∈ [0, 1), and {αn } be a sequence in (0, 1 − k), and {βn } be a sequences in (0, 1) satisfying (C1 ), (C2 ) and (C3 ) in Theorem 3.1.Then sequence {xn } defined by (1.10) converges strongly to x ˜ such that x ˜ = PF (T ) f (˜ x) and x ˜ also satisfies −−−→ − → ⟨x ˜f (˜ x), x˜ x⟩ ≥ 0, x ∈ F (T ). 9

907

Ting-jian Xiong ET AL 899-909

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. By Theorem 4.1 given by Aksoy and Khamsi [27], there exists a single-valued nonexpansive mapping h : E → E such that h(x) ∈ T (x) and d(h(x), h(y)) ≤ H(T (x), T (y)) for all x, y ∈ E. Hence, zn = h(xn ) ∈ T (x) for (1.10). Again, it follows from [27, Theorem 4.2] (also Theorem 4.2 in [3]) that F ix(h) = F (T ) ̸= ∅. The conclusion follows from Corollary 3.1. 2 Remark 3.1. The results presented in this paper improve and unify corresponding results in Panyanak and Suantai [3], Kaewkhao et al. [13] and many others. In this regard, we show as follows: (i) Corollary 3.1 extends Theorem 3.2 of [13] from k ∈ [0, 21 ) to k ∈ [0, 1). (ii) When T in Theorem 3.1 is a single-value mapping, then our main results in Theorem [ 1 )3.1 become to corresponding results of Theorem 3.3 in [3] for a contraction f from k ∈ 0, 2 to ) ( 1 k ∈ [0, 1), and αn ∈ 0, 2−k

to αn ∈ (0, 1 − k). Further, the condition (C4 ) is not needed.

) ( 1 as αn ∈ (0, 1 − k), then Theorem 4.2 of (iii) If we add condition (C4 ), and change αn ∈ 0, 2−k [3] happens to be Corollary 3.3.

Acknowledgements This work was partially supported by the Scientific Research Fund of Sichuan Provincial Education Department (16ZA0256), Sichuan Province Cultivation Fund Project of Academic and Technical Leaders, the Scientific Research Project of Sichuan University of Science & Engineering (2017RCL54).

References [1] W.A. Kirk, Geodesic geometry and fixed point theory II. In: International Conference on Fixed Point Theory and Applications, pp. 113-142. Yokohama Publ., Yokohama Japan, 2004. [2] S. Dhompongsa, A. Kaewkhao and B. Panyanak, Browder′ s convergence theorem for multivalued mappings without endpoint condition, Topol. Appl. 159 (2012), 2757-2763. [3] B. Panyanak and S.Suantai, Viscosity approximation methods for multivalued nonexpansive mappings in geodesic spaces,Fixed Point Theory Appl. 2015:114 (2015), 14 pp. [4] F.E. Browder, Fixed point theorems for noncompact mappings in Hilbert spaces, Proc. Natl. Acad. Sci. USA 53 (1965), 1272-1276. [5] S. Reich, Strong convergence theorems for resolvents of accretive operators in Banach spaces, J. Math. Anal. Appl. 75 (1980), 287-292. [6] B. Halpern, Fixed Points of nonexpanding maps, Bull. Am. Math. Soc. 73 (1967), 957-961. [7] S. Saejung, Halpern′ s iteration in CAT(0) spaces, Fixed Point Theory Appl. 2010, Art. ID 471781, 13 pp. [8] L.Y. Shi and R.D. Chen, Strong convergence of viscosity approximation methods for nonexpansive mappings in CAT(0) spaces, J. Appl. Math. 2012, Art. ID 421050, 11 pp. [9] I.D. Berg and I.G. Nikolaev, Quasilinearization and curvature of Alexandrov spaces, Geom. Dedic. 133 (2008), 195-218. [10] R. Wangkeeree and P. Preechasilp, Viscosity approximation methods for nonexpansive mappings in CAT(0) spaces, J. Inequal. Appl. 2013:93 (2013), 15 pp. [11] S.B. Nadler, Multi-valued contraction mappings, Pac. J. Math. 30 (1969), 475-488. [12] S.S. Chang, L. Wang, J.C. Yao and L. Yang, An affirmative answer to Panyanak and Suantai′ s open questions on the viscosity approximation methods for a nonexpansive multi-mapping in CAT(0) spaces, J. Nonlinear Sci. Appl. 10 (2017), 2719-2726. [13] A. Kaewkhao, B. Panyanak and S. Suantai, Viscosity iteration method in CAT(0) spaces without the nice projection property, J. Inequal. Appl. 2015:278 (2015), 9 pp.

10

908

Ting-jian Xiong ET AL 899-909

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[14] S.S. Chang, L. Wang, G. Wang and L.J. Qin, An affirmative answer to the open questions on the viscosity approximation methods for nonexpansive mappings in CAT(0) spaces, J. Nonlinear Sci. Appl. 9 (2016), 4563-4570. [15] M.A. Khamsi and W.A. Kirk, An introduction to metric spaces and Fixed Point Theory, Pure Appl. Math. Wiley-interscience, New York, 2001. [16] M. Bridson and A. Haefliger, Metric Spaces of Non-Positive Curvature, Springer, Berlin, 1999. [17] W.A. Kirk, Fixed point theorems in CAT(0) spaces and R-trees, Fixed Point Theory Appl. 2004(4) (2004), 309-316. [18] K.S. Brown, Buildings, Springer, New York, 1989. [19] K. Goebel and S. Reich, Uniform Convexity, Hyperbolic Geometry, and Nonexpansive Mappings, Monographs and Textbooks in Pure and Applied Mathematics, Vol.83, Marcel Dekker, New York, 1984. [20] S, Dhompongsa and B. Panyanak, On ∆−convergence theorems in CAT(0) spaces, Comput. Math. Appl. 56 (2008), 2572-2579. [21] P. Chaoha and A. Phon-on, A note on fixed point sets in CAT(0) spaces, J. Math. Anal. Appl. 320(2) (2006), 983-987. [22] T. Suzuki, Strong convergence theorems for infinite families of nonexpansive mappings in general Banach spaces, Fixed Point Theory Appl. 2005(1) (2005), 103-123. [23] H.K. Xu, An iterative approach to quadratic optimization, J. Optim. Theory Appl. 116 (2003), 659-678. [24] S. Dhompongsa, A. Kaewkhao and B. Panyanak, On Kirk ′ s strong convergence theorem for multivalued nonexpansive mappings on CAT(0) spaces, Nonlinear Anal. 75(2012), 459-468. [25] H. Dehghan and J. Rooin, A characterization of metric projection in CAT(0) spaces. In: Proceedings of Interational Conference on Functional Equation, Geometric Functions and Applications, Payame Noor University, Tabriz, Iran, 10-12 May 2012, pp.41-43, 2012. [26] N. Shioji and W. Takahasi, Strong convergence of approximated sequences for nonexpansive mappings in Banach spaces, Proc. Am. Math. Soc. 125 (1997), 3641-3645. [27] A.G. Aksoy and M.A. Khamsi, A selection theorem in metric trees, Proc. Am. Math. Soc. 134 (2006), 2957-2966.

11

909

Ting-jian Xiong ET AL 899-909

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Generalized Partial ToDD’s Difference Equation in n-dimensional space Tarek F. Ibrahim Department of Mathematics Faculty of Science, Mansoura University Mansoura, EGYPT [email protected] May 31, 2017 Abstract In this paper we introduce a generalized form of the well known ToDD’s difference equation and give the closed form expressions for this generalized form . In other words , we have the following nonlinear rational partial difference equation T hX1 , X2 , X3 , ..., Xn i =

1 + T hX1 − 1, X2 − 1, ..., Xn − 1i + T hX1 − 2, X2 − 2, ..., Xn − 2i T hX1 − 3, X2 − 3, X3 − 3, ..., Xn − 3i

where X1 , X2 , ...., Xn ∈ N,and the initial values T hp1 , p2 , ...., pn i ,T hp2 , p1 , p3 , p4 , ..., pn i ,T hp2 , p3 , p1 , p4 , ..., pn i,... ...,T hp2 , p3 , p4 , ...p1 , pn i,T hp2 − 3, p3 − 3, p4 − 3, ...pn − 3, p1 i are real numbers with p1 ∈ {0, −1, −2} and p2 , p3 , ..., pn ∈ N such that T hp1 , p2 , ...., pn i 6= 0 ,T hp2 , p1 , p3 , p4 , ..., pn i 6= 0 , T hp2 , p3 , p1 , p4 , ..., pn i 6= 0,...,T hp2 − 3, p3 − 3, p4 − 3, ...pn − 3, p1 i 6= 0. We will use a novel technique to prove the results by using what we call ‘piecewise n-dimensional mathematical induction’ which we introduce here for the first time . We will obvious that this new concept represents generalized form for many types of mathematical induction . As a direct consequences , we investigate and drive the explicit solutions for the well known ordinary ToDD’s difference Equation . AMS Subject Classification: 39A10, 39A14. Key Words and Phrases: (partial)difference equations, solutions , piecewise n-dimesional mathematical induction.

910

Ibrahim 910-926

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

1

Introduction

We know that the studying of ordinary difference equations has been widely treated in the past . However , partial difference equations (P∆Es) have not received the same full attentiveness . Both of ordinary and partial difference equations may be found in the study of dynamics ,probability and other branches of mathematical physics .Moreover,partial difference equations arise in applications involving finite difference schemes ,population dynamics with spatial migrations and chemical reactions . Indeed Lagrange and Laplace took into consideration the solution of partial difference equations in their treatises of dynamics and probability. An example can get if we suppose initially, the probability of finding a particle at one of the integral coordinates j of the x-axis is P (j, 0). At the end of each time interval, the particle makes a decision to stay at its present position or move one unit in the positive direction along the x-axis. Assume that the probability that the particle does not move in a given unit of time is p, and the probability that the particle moves in a given unit of time is q. Let is P (j, t)be the probability that the particle is at the point is x = j at the end of the t-th interval of time. Then by Bayes’ formula, it is easy to see that the following partial difference equation holds: P (j, t) = pP (j, t − 1) + P (j − 1, t − 1) An another example of a partial difference equation is the following well known relation (n−1) (n) (n−1) Bm = Bm−1 + Bm , 1 ≤ m < n. The solution of this equation is the celebrated binomial coefficient function (n) Bm defined by n! (n) , 0 ≤ m < n. Bm = m!(n − m)! Some authors investigate the closed form solutions for certain partial difference equations . For instance , Heins [[2] ] considered the solution of the partial difference equation y(p + 1, q) + y(p − 1, q) = 2y(p, q + 1) under some conditions Ibrahim in [[10]] studied the closed form solution for higher order nonlinear rational partial difference equation in the form S{n, m} =

S{n − r, m − r} r Q Ψ+ S{n − i, m − i} i=1

911

Ibrahim 910-926

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

3 where n, m ∈ N and the initial values S{n, t},S{t, m − r} are real numbers r−1 Q with t ∈ {0, −1, −2, ......, −r + 1} such that S{j − r + 1, i + j − r + 1} 6= −Ψ j=0

and

r−1 Q

S{i + j − r + 2, j − r + 1} 6= −Ψ , i ∈ N0 .

j=0

For more results about partial difference equations we refer to ( [1], [3],[4], [5]-[9],[11]-[15]). In this paper we introduce a generalized form of the well known ToDD’s difference equation and give the closed form expressions for this generalized form. In other words , we have the following nonlinear rational partial difference equation T hX1 , X2 , X3 , ..., Xn i =

1 + T hX1 − 1, X2 − 1, ..., Xn − 1i + T hX1 − 2, X2 − 2, ..., Xn − 2i T hX1 − 3, X2 − 3, X3 − 3, ..., Xn − 3i

(1)

where X1 , X2 , ...., Xn ∈ N,and the initial values T hp1 , p2 , ...., pn i , T hp2 , p1 , p3 , p4 , ..., pn i ,T hp2 , p3 , p1 , p4 , ..., pn i,... ...,T hp2 , p3 , p4 , ...p1 , pn i,T hp2 − 3, p3 − 3, p4 − 3, ...pn − 3, p1 i are real numbers with p1 ∈ {0, −1, −2} and p2 , p3 , ..., pn ∈ N such that T hp1 , p2 , ...., pn i 6= 0 ,T hp2 , p1 , p3 , p4 , ..., pn i 6= 0 , T hp2 , p3 , p1 , p4 , ..., pn i 6= 0,...,T hp2 − 3, p3 − 3, p4 − 3, ...pn − 3, p1 i 6= 0. We,ll use a novel technique to prove the results by using what we call ‘piecewise n-dimesional mathematical induction’ which we introduce here for the first time . We’ll obvious that this new concept represents generalized form for many types of mathematical induction . As a direct consequences , we investigate and drive the explicit solutions for the well known ToDD’s ordinary Difference Equation . Now let us firstly introduce some important concepts . Ibrahim [10] constructed a new concept who call it “’piecewise double mathematical induction’ which represented a generalization for some kinds of inductions. The definition was formulated as the following form: Definition 1. (Piecewise Double Mathematical Induction of r-pieces) Let S(m, n) be a statement involving two positive integer variables m and n. Beside , we suppose that the statement S(m, n) is piecewise with r-pieces . Then the statement S(m, n) holds if 1. S(k1 + α, k2 + β) 2. If S(m, k2 + β) , then S(m + r, k2 + β) 3. If S(m, n) , then S(m, n + r) where α, β ∈ {0, 1, 2, .......r − 1} and k1 and k2 are the smallest values of m and n . 912

Ibrahim 910-926

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4 We briefly call this concept “r-double mathematical induction” .We can call this concept “’piecewise two-dimesional mathematical induction’ Here we will construct an another notion which we call it ‘piecewise triple mathematical induction’ or ‘piecewise three-dimensional mathematical induction’ which offer an another generalization for some kinds of inductions . Definition 2. (Piecewise Triple Mathematical Induction of r-pieces) Let H(n, m, l) be a statement involving three positive integer variables n, m and l. Beside , we suppose that the statement H(n, m, l) is piecewise with r-pieces . Then the statement H(n, m, l) holds if 1. H(α1 + β1 , α2 + β2 , α3 + β3 ) 2. If H(α1 + β1 , m, l) , then H(α1 + β1 , m + r, l) If H(n, m, α3 + β3 ) , then H(n + r, m, α3 + β3 ) 3. If H(n, m, l) , then H(n, m, l + r) where β1 , β2 , β3 ∈ {0, 1, 2, .......r − 1} and α1 ,α2 and α3 are the smallest values of n , m and l respectively . We briefly call this concept “r-triple mathematical induction” Remark 1. We can see that the previous concept contains many types of mathematical induction. For instances , 1. If r = 1 , we have β1 = β2 = β3 = 0 , thus we have a triple mathematical induction . 2. If r = 2 , we have β1 , β2 , β3 ∈ {0, 1} , thus we have the odd-even triple mathematical induction . 3. If we put n = m = l we have a special case of the above definition which introduce an another new concept. This type of mathematical induction called “Piecewise single Mathematical Induction of r-pieces” . In this case , if we put r = 1 with n = m = l we easily get the basic mathematical induction . Also if we put r = 2 with n = m = l,we get easily the odd-even mathematical induction . Finally we can introduce a generalized concept ‘piecewise n-dimesional mathematical induction’ as a generalization for the above definitions . Definition 3. (Piecewise n-dimesional Mathematical Induction of rpieces) Let H(N1 , N2 , ..., Nn ) be a statement involving positive integer variables N1 , N2 , ..., Nn . Beside , we suppose that the statement H(N1 , N2 , ..., Nn ) is piecewise with r-pieces . Then the statement H(N1 , N2 , ..., Nn ) holds if 913

Ibrahim 910-926

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

5 1. H(α1 + β1 , α2 + β2 , ......, αn + βn ) 2. If H(α1 + β1 , N2 , N3 , ..., Nn ) , then H(α1 + β1 , N2 + r, N3 , ..., Nn ) If H(N1 , α2 + β2 , N3 , ..., Nn ) , then H(N1 , α2 + β2 , , N3 + r, ..., Nn ) . . . If H(N1 , N2 , ..., αn−1 +βn−1 , Nn ) , then H(N1 , N2 , ..., αn−1 +βn−1 , Nn +r) 3. If H(N1 , N2 , ..., Nn ) , then H(N1 + r, N2 , ..., Nn ) where βi ∈ {0, 1, 2, .......r − 1} ,i ∈ {1, 2, .......n} and αi are the smallest values of N1 , N2 , ..., Nn respectively . We briefly call this concept “(r,n)-dimensional mathematical induction” Remark 2. We can easy see that both of r-double mathematical induction and r-triple mathematical induction are special cases of “(r,n)-dimensional mathematical induction” .

2

Forms of Solutions

In this section we shall give explicit forms of solutions of the partial difference equation (1) of order three .

2.1

Form of Solutions for P∆E (1) when n = 2

In this subsection we introduce a generalized form of ToDD’s difference equation with two discrete variables X1 and X2 and give the closed form expressions for this generalized form . In other words , we have the following nonlinear rational partial difference equation T hX1 , X2 i =

1 + T hX1 − 1, X2 − 1i + T hX1 − 2, X2 − 2i T hX1 − 3, X2 − 3i

(2)

Here we give the closed form solution of the partial difference equation (2). Theorem 4. Let {T hX1 , X2 i}∞ X1 ,X2 =−k be a solution of the partial difference equation (2) , where X1 , X2 ∈ N ,and the initial values T hp, qi and T hq, p − 3i are real numbers with q ∈ {0, −1, −2} and p ∈ N such that T hp, qi 6= 0 and T hq, p − 3i 6= 0 . Then, the form of solutions of (2) ,for X1 ≤ X2 are as follows:

914

Ibrahim 910-926

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

T hX1 , X2 i =

                                                          

1+T h−1,X2 −(X1 +1)i+T h0,X2 −X1 i , X1 T h−2,X2 −(X1 +2)i

= L1 ;

1+T h−1,X2 −(X1 +1)i+T h0,X2 −X1 i+T h−2,X2 −(X1 +2)i(1+T h0,X2 −X1 i) , X1 T h−1,X2 −(X1 +1)iT h−2,X2 −(X1 +2)i

= L2 ;

(1+T h−1,X2 −(X1 +1)i+T h−2,X2 −(X1 +2)i)(1+T h−1,X2 −(X1 +1)i+T h0,X2 −X1 i) , X1 T h0,X2 −X1 i)T h−1,X2 −(X1 +1)iT h−2,X2 −(X1 +2)i 1+T h−1,X2 −(X1 +1)i+T h0,X2 −X1 i+T h−2,X2 −(X1 +2)i(1+T h0,X2 −X1 i) , X1 T h−1,X2 −(X1 +1)iT h0,X2 −X1 i 1+T h−1,X2 −(X1 +1)i+T h−2,X2 −(X1 +2)i , X1 T h0,X2 −X1 i

= L3 ;

= L4 ;

= L5 ;

T h−2, X2 − (X1 + 2)i , X1 = L6 ; T h−1, X2 − (X1 + 1)i , X1 = L7 ; T h0, X2 − X1 i , X1 = L8 ; (3)

T hX2 , X1 i =

                                                          

1+T hX2 −(X1 +1),−1i+T hX2 −X1 ,0i , X1 T hX2 −(X1 +2),−2i

= L1 ;

1+T hX2 −(X1 +1),−1i+T hX2 −X1 ,0i+T hX2 −(X1 +2),−2i(1+T hX2 −X1 ,0i) , X1 T hX2 −(X1 +1),−1iT hX2 −(X1 +2),−2i

= L2 ;

(1+T hX2 −(X1 +1),−1i+T hX2 −(X1 +2),−2i)(1+T hX2 −(X1 +1),−1i+T hX2 −X1 ,0i) , X1 T hX2 −X1 ,0i)T hX2 −(X1 +1),−1iT hX2 −(X1 +2),−2i 1+T hX2 −(X1 +1),−1i+T hX2 −X1 ,0i+T hX2 −(X1 +2),−2i(1+T hX2 −X1 ,0i) , X1 T hX2 −(X1 +1),−1iT hX2 −X1 ,0i 1+T hX2 −(X1 +1),−1i+T hX2 −(X1 +2),−2i , X1 T hX2 −X1 ,0i

= L3 ;

= L4 ;

= L5 ;

T hX2 − (X1 + 2), −2i , X1 = L6 ; T hX2 − (X1 + 1), −1i , X1 = L7 ; T hX2 − X1 , 0i , X1 = L8 ; (4)

where Li = 8k + i , 1 ≤ i ≤ 8 , i ∈ N. Proof. We shall use the principle of piecewise double mathematical induction defined in definition (1) . Firstly , we shall prove that the relations (3) 915

Ibrahim 910-926

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

7 and (4) hold for T hp, qi. where p, q ∈ {1, 2, , ...8} . From equation (2)we can see T h1, 1i =

1 + T h0, 0i + T h−1, −1i 1 + T h0, 1 − 1i + T h−1, 1 − (1 + 1)i = T h−2, −2i T h−2, 1 − (1 + 2)i T h2, 2i = =

=

1 + T h0, 0i + T h−1, −1i + T h−2, −2i (1 + T h0, 0i) T h−2, −2i T h−1, −1i

1 + T h0, 2 − 2i + T h−1, 2 − (2 + 1)i + T h−2, 2 − (2 + 2)i (1 + T h0, 2 − 2i) T h−2, 2 − (2 + 2)i T h−1, 2 − (2 + 1)i T h1, 2i =

1 + T h0, 1i + T h−1, 0i 1 + T h0, 2 − 1i + T h−1, 2 − (1 + 1)i = T h−2, −1i T h−2, 2 − (1 + 2)i T h2, 3i =

1 + T h1, 2i + T h0, 1i T h−1, 0i

1 + T h0, 1i + T h−1, 0i + T h−2, −1i (1 + T h0, 1i) T h−2, −1i T h−1, 0i

= =

1 + T h1, 1i + T h0, 0i T h−1, −1i

1 + T h0, 3 − 2i + T h−1, 3 − (2 + 1)i + T h−2, 3 − (2 + 2)i (1 + T h0, 3 − 2i) T h−2, 3 − (2 + 2)i T h−1, 3 − (2 + 1)i

Similarly we can prove the remaining values for p and q . Now suppose that the relations (3) and (4) hold for X1 = 1, 2, .., 8 with X2 ∈ N. We try to prove that relations (3) and (4) hold for X1 = 1, 2, ..., 8 with X2 + 8. T hX2 + 8, 1i = =

1 + T hX2 + 8 − 1, 1 − 1i + T hX2 + 8 − 2, 1 − 2i T hX2 + 8 − 3, 1 − 3i

1 + T hX2 + 8 − (1), 0i + T hX2 + 8 − (1 + 1), −1i T hX2 + 8 − (1 + 2), −2i

T hX2 + 8, 2i =

1 + T hX2 + 8 − 1, 2 − 1i + T hX2 + 8 − 2, 2 − 2i T hX2 + 8 − 3, 2 − 3i

=

=

1 + T hX2 + 7, 1i + T hX2 + 6, 0i T hX2 + 5, −1i

hX2 +6,0i 1 + ( 1+T hX2T+5,−1i+T ) + T hX2 + 6, 0i hX2 +4,−2i

T hX2 + 5, −1i

1 + T hX2 + 8 − (2 + 1), −1i + T hX2 + 8 − 2, 0i T hX2 + 8 − (2 + 1), −1i T hX2 + 8 − (2 + 2), −2i 916

Ibrahim 910-926

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

+

T hX2 + 8 − (2 + 2), −2i (1 + T hX2 + 8 − 2, 0i) T hX2 + 8 − (2 + 1), −1i T hX2 + 8 − (2 + 2), −2i

Similarly we can prove the other cases for for X1 = 3, ..., 8 with X2 + 8. . Finally , we suppose that relations (3) and (4) hold for X2 , X1 ∈ N . We shall prove that relations (3) and (4) hold for X2 , X1 + 8 ∈ N . From equation (2)we have T hX2 , X1 + 8i = =

1 + T hX2 − 1, X1 + 8 − 1i + T hX2 − 2, X1 + 8 − 2i T hX2 − 3, X1 + 8 − 3i

1 + T hX2 − 1, X1 + 7i + T hX2 − 2, X1 + 6i T hX2 − 3, X1 + 5i

There are sixteen cases : (1) When X2 > 8(k + 1) + i , i = 1, 2, ...., 8 . We take the cases when i = 3 and i = 7 .The other cases for i = 1, 2, 4, 5, 6, 8 can be given by the same way . In order to simplify the calculations we consider the following notations: T hX2 − X1 − 8, 0i = T h0i , T hX2 − X1 − 9, −1i = T h−1i , T hX2 − X1 − 10, −2i = T h−2i , Now if X2 > 8(k + 1) + 3 : T hX2 , X1 + 8i = 1+ = =

1 + T hX2 − 1, X1 + 7i + T hX2 − 2, X1 + 6i T hX2 − 3, X1 + 5i

1+T h−1i+T h0i+T h−2i(1+T h0i) T h−1iT h−2i

+

1+T h−1i+T h0i T h−2i

T h0i

(1 + T h−1i)2 + T h0i (1 + T h−1i) + T h−2i (1 + T h0i + T h−1i) T h0i T h−1i T h−2i =

(1 + T h−1i + T h−2i)(1 + T h−1i + T h0i) T h0i)T h−1i T h−2i

If X2 > 8(k + 1) + 7 we have : T hX2 , X1 + 8i =

1 + T hX2 − 1, X1 + 7i + T hX2 − 2, X1 + 6i T hX2 − 3, X1 + 5i

1+T h−1i+T h−2i T h0i 1+T h−1i+T h0i+T h−2i(1+T h0i) T h−1iT h0i

1 + T h−2i + =

917

= T h−1i

Ibrahim 910-926

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

9 (2) When X2 < 8(k + 1) + i , i = 1, 2, ...., 8 . We take the cases when i = 4 and i = 6 .The other cases for i = 1, 2, 3, 5, 7, 8 can be given by the same way. In order to simplify the calculations we consider the following notations: T h0, X1 − X2 + 8i = T h0i∗ , T h−1, X1 − X2 + 7i = T h−1i∗ , T h−2, X1 − X2 + 6i = T h−2i∗ , Now if X2 < 8(k + 1) + 4 : T hX2 , X1 + 8i = 1+ =

1 + T hX2 − 1, X1 + 7i + T hX2 − 2, X1 + 6i T hX2 − 3, X1 + 5i

∗ h0i∗ +T h−2i∗ (1+T h0i∗ ) (1+T h−1i∗ +T h−2i∗ )(1+T h−1i∗ +T h0i∗ ) + 1+T h−1i +T T h0i∗ T h−1i∗ T h−2i∗ T h−1i∗ T h−2i∗ 1+T h−1i∗ +T h0i∗ T h−2i∗

(1 + T h−1i∗ + T h0i∗ )(1 + T h−1i∗ + T h0i∗ + T h−2i∗ (1 + T h0i∗ )) = (1 + T h−1i∗ + T h0i∗ )(T h−1i∗ T h0i∗ ) 1 + T h−1i∗ + T h0i∗ + T h−2i∗ (1 + T h0i∗ ) = T h−1i∗ T h0i∗ If X2 < 8(k + 1) + 8 we have : T hX2 , X1 + 8i =

=

1 + T hX2 − 1, X1 + 7i + T hX2 − 2, X1 + 6i T hX2 − 3, X1 + 5i

1 + T h−1i∗ + T h−2i∗ 1+T h−1i∗ +T h−2i∗ T h0i∗

= T h0i∗

Remark 3. If we take into account that X1 = X2 = n in equation (2), we have the ordinary ToDD’s difference equation in the form T hni =

1 + T hn − 1i + T hn − 2i T hn − 3i

(5)

We can obtain the solutions for equation (5) from theorem (4) and we will formulate the closed form solutions in the following corollary . Corollary 5. Let {T hni}∞ n=−k be a solution of the ordinary difference equation (5) , where n ∈ N ,and the initial values T hqi and are real numbers with q ∈ {0, −1, −2} such that T hqi 6= 0 . Then, the form of solutions of (5)

918

Ibrahim 910-926

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10 are as follows:

T hni =

                                                          

1+T h−1i+T h0i , X1 T h−2i

= L1 ;

1+T h−1i+T h0i+T h−2i(1+T h0i) , X1 T h−1iT h−2i

= L2 ;

(1+T h−1i+T h−2i)(1+T h−1i+T h0i) , X1 T h0i)T h−1iT h−2i 1+T h−1i+T h0i+T h−2i(1+T h0i) , X1 T h−1iT h0i 1+T h−1i+T h−2i , X1 T h0i

= L3 ;

= L4 ;

= L5 ;

T h−2i , X1 = L6 ; T h−1i , X1 = L7 ; T h0i , X1 = L8 ;

where Li = 8k + i , 1 ≤ i ≤ 8 , i ∈ N. Remark 4. period eight.

2.2

It is easy to see that all solutions of (5) are periodic with

Form of Solutions for P∆E (1) when n = 3

In this subsection we introduce a generalized form of ToDD’s difference equation with three discrete variables X1 ,X2 and X3 and give the closed form expressions for this generalized form . In other words , we have the following nonlinear rational partial difference equation 1 + T hX1 − 1, X2 − 1, X3 − 1i + T hX1 − 2, X2 − 2, X3 − 2i T hX1 − 3, X2 − 3, X3 − 3i (6) where X1 , X2 , X3 ∈ N . Here we give the closed form solution of the partial difference equation (6).

T hX1 , X2 , X3 i =

Theorem 6. Let {T hX1 , X2 , X3 i}∞ X1 ,X2 ,X3 =−k be a solution of the partial difference equation (6) ,where X1 , X2 , X3 ∈ N,and the initial values T hp1 , p2 , p3 i ,T hp2 , p3 , p1 i and T hp2 − 3, p1 , p3 − 3i are real numbers with p1 ∈ {0, −1, −2} and p2 , p3 ∈ N such that T hp1 , p2 , p3 i 6= 0 ,T hp2 , p1 , p3 i 6= 0 and T hp2 − 3, p3 − 3, p1 i 6= 0 . Then, the form of solutions of (6) , for X1 ≤ X2 ≤ X3 are as follows: 919

Ibrahim 910-926

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

11

T hX1 , X2 , X3 i =

                                                          

T hX1 , X3 , X2 i =

                                                          

1+T3 h(−1)23i+T3 h(0)23i , X1 T3 h(−2)23i

= L1 ;

1+T3 h(−1)23i+T3 h(0)23i+T3 h(−2)23i(1+T3 h(0)23i) , X1 T3 h(−1)23iT3 h(−2)23i

= L2 ;

(1+T3 h(−1)23i+T3 h(−2)23i)(1+T3 h(−1)23i+T3 h(0)23i) , X1 T3 h(0)23i)T3 h(−1)23iT3 h(−2)23i 1+T3 h(−1)23i+T3 h(0)23i+T3 h(−2)23i(1+T3 h(0)23i) , X1 T3 h(−1)23iT3 h(0)23i 1+T3 h(−1)23i+T3 h(−2)23i , X1 T3 h(0)23i

= L3 ;

= L4 ;

= L5 ;

T3 h(−2)23i , X1 = L6 ; T3 h(−1)23i , X1 = L7 ; T3 h(0)23i , X1 = L8 ;

1+T3 h(−1)32i+T3 h(0)32i , X1 T3 h(−2)32i

= L1 ;

1+T3 h(−1)32i+T3 h(0)32i+T3 h(−2)32i(1+T3 h(0)32i) , X1 T3 h(−1)32iT3 h(−2)32i

= L2 ;

(1+T3 h(−1)32i+T3 h(−2)32i)(1+T3 h(−1)32i+T3 h(0)32i) , X1 T3 h(0)32i)T3 h(−1)32iT3 h(−2)32i 1+T3 h(−1)32i+T3 h(0)32i+T3 h(−2)32i(1+T3 h(0)32i) , X1 T3 h(−1)32iT3 h(0)32i 1+T3 h(−1)32i+T3 h(−2)32i , X1 T3 h(0)32i

= L3 ;

= L4 ;

= L5 ;

T3 h(−2)32i , X1 = L6 ; T3 h(−1)32i , X1 = L7 ; T3 h(0)32i , X1 = L8 ;

920

Ibrahim 910-926

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12

T hX3 , X1 , X2 i =

                                                          

T hX3 , X2 , X1 i =

                                                          

1+T3 h3(−1)2i+T3 h3(0)2i , X1 T3 h3(−2)2i

= L1 ;

1+T3 h3(−1)2i+T3 h3(0)2i+T3 h3(−2)2i(1+T3 h3(0)2i) , X1 T3 h3(−1)2iT3 h3(−2)2i

= L2 ;

(1+T3 h3(−1)2i+T3 h3(−2)2i)(1+T3 h3(−1)2i+T3 h3(0)2i) , X1 T3 h3(0)2i)T3 h3(−1)2iT3 h3(−2)2i 1+T3 h3(−1)2i+T3 h3(0)2i+T3 h3(−2)2i(1+T3 h3(0)2i) , X1 T3 h3(−1)2iT3 h3(0)2i 1+T3 h3(−1)2i+T3 h3(−2)2i , X1 T3 h3(0)2i

= L3 ;

= L4 ;

= L5 ;

T3 h3(−2)2i , X1 = L6 ; T3 h3(−1)2i , X1 = L7 ; T3 h3(0)2i , X1 = L8 ;

1+T3 h32(−1)i+T3 h32(0)i , X1 T3 h32(−2)i

= L1 ;

1+T3 h32(−1)i+T3 h32(0)i+T3 h32(−2)i(1+T3 h32(0)i) , X1 T3 h32(−1)iT3 h32(−2)i

= L2 ;

(1+T3 h32(−1)i+T3 h32(−2)i)(1+T3 h32(−1)i+T3 h32(0)i) , X1 T3 h32(0)i)T3 h32(−1)iT3 h32(−2)i 1+T3 h32(−1)i+T3 h32(0)i+T3 h32(−2)i(1+T3 h32(0)i) , X1 T3 h32(−1)iT3 h32(0)i 1+T3 h32(−1)i+T3 h32(−2)i , X1 T3 h32(0)i

= L3 ;

= L4 ;

= L5 ;

T3 h32(−2)i , X1 = L6 ; T3 h32(−1)i , X1 = L7 ; T3 h32(0)i , X1 = L8 ;

921

Ibrahim 910-926

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

13

T hX2 , X1 , X3 i =

                                                          

T hX2 , X3 , X1 i =

                                                          

1+T3 h2(−1)3i+T3 h2(0)3i , X1 T3 h2(−2)3i

= L1 ;

1+T3 h2(−1)3i+T3 h2(0)3i+T3 h2(−2)3i(1+T3 h2(0)3i) , X1 T3 h2(−1)3iT3 h2(−2)3i

= L2 ;

(1+T3 h2(−1)3i+T3 h2(−2)3i)(1+T3 h2(−1)3i+T3 h2(0)3i) , X1 T3 h2(0)3i)T3 h2(−1)3iT3 h2(−2)3i 1+T3 h2(−1)3i+T3 h2(0)3i+T3 h2(−2)3i(1+T3 h2(0)3i) , X1 T3 h2(−1)3iT3 h2(0)3i 1+T3 h2(−1)3i+T3 h2(−2)3i , X1 T3 h2(0)3i

= L3 ;

= L4 ;

= L5 ;

T3 h2(−2)3i , X1 = L6 ; T3 h2(−1)3i , X1 = L7 ; T3 h2(0)3i , X1 = L8 ;

1+T3 h23(−1)i+T3 h23(0)i , X1 T3 h23(−2)i

= L1 ;

1+T3 h23(−1)i+T3 h23(0)i+T3 h23(−2)i(1+T3 h23(0)i) , X1 T3 h23(−1)iT3 h23(−2)i

= L2 ;

(1+T3 h23(−1)i+T3 h23(−2)i)(1+T3 h23(−1)i+T3 h23(0)i) , X1 T3 h23(0)i)T3 h23(−1)iT3 h23(−2)i 1+T3 h23(−1)i+T3 h23(0)i+T3 h23(−2)i(1+T3 h23(0)i) , X1 T3 h23(−1)iT3 h23(0)i 1+T3 h23(−1)i+T3 h23(−2)i , X1 T3 h23(0)i

= L3 ;

= L4 ;

= L5 ;

T3 h23(−2)i , X1 = L6 ; T3 h23(−1)i , X1 = L7 ; T3 h23(0)i , X1 = L8 ;

where T3 h(0)23i = T h0, X2 − X1 , X3 − X1 i , T3 h(−1)23i = T h−1, X2 − (X1 + 1), X3 − (X1 + 1)i , T3 h(−2)23i = T h−2, X2 − (X1 + 2), X3 − (X1 + 2)i , 922

Ibrahim 910-926

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14 T3 h(0)32i = T h0, X3 − X1 , X2 − X1 i , T3 h(−1)32i = T h−1, X3 − (X1 + 1), X2 − (X1 + 1)i T3 h(−2)32i = T h−2, X3 − (X1 + 2), X2 − (X1 + 2)i T3 h3(0)2i = T hX3 − X1 , 0, X2 − X1 i , T3 h3(−1)2i = T hX3 − (X1 + 1), −1, X2 − (X1 + 1)i T3 h3(−2)2i = T hX3 − (X1 + 2), −2, X2 − (X1 + 2)i T3 h32(0)i = T hX3 − X1 , X2 − X1 , 0i , T3 h32(−1)i = T hX3 − (X1 + 1), X2 − (X1 + 1), −1i T3 h32(−2)i = T hX3 − (X1 + 2), X2 − (X1 + 2), −2i T3 h2(0)3i = T hX2 − X1 , 0, X3 − X1 i , T3 h2(−1)3i = T hX2 − (X1 + 1), −1, X3 − (X1 + 1)i T3 h2(−2)3i = T hX2 − (X1 + 2), −2, X3 − (X1 + 2)i T3 h23(0)i = T hX2 − X1 , X3 − X1 , 0i , T3 h23(−1)i = T hX2 − (X1 + 1), X3 − (X1 + 1), −1i T3 h23(−2)i = T hX2 − (X1 + 2), X3 − (X1 + 2), −2i ,Li = 8k + i , 1 ≤ i ≤ 8 , i ∈ N.

, , , , , , , , , ,

Proof. We can prove this theorem by using the concept of piecewise triple mathematical induction which stated in definition (2) similar to what has been done in theorem (4) by using piecewise double mathematical induction stated in definition (1) .

2.3

Form of Solutions for P∆E (1) for any value n

In this subsection we introduce the generalized form of ToDD’s difference equation with n discrete variables X1 , X2 , ..., Xn and give the closed form expressions for it . Theorem 7. Let {T hX1 , X2 , ..., Xn i}∞ X1 ,X2 ,...Xn =−k be a solution of the partial difference equation (1) ,where X1 , X2 , ...., Xn ∈ N,and the initial values T hp1 , p2 , ...., pn i ,T hp2 , p1 , p3 , p4 , ..., pn i ,T hp2 , p3 , p1 , p4 , ..., pn i,... ...,T hp2 , p3 , p4 , ...p1 , pn i,T hp2 − 3, p3 − 3, p4 − 3, ...pn − 3, p1 i are real numbers with p1 ∈ {0, −1, −2} and p2 , p3 , ..., pn ∈ N such that T hp1 , p2 , ...., pn i 6= 0 ,T hp2 , p1 , p3 , p4 , ..., pn i 6= 0 ,T hp2 , p3 , p1 , p4 , ..., pn i 6= 0,..., T hp2 − 3, p3 − 3, p4 − 3, ...pn − 3, p1 i 6= 0 . Then, the form of solutions of (1) ,for X1 ≤ X2 ≤ X3 ≤ ... ≤ Xn are as follows:

923

Ibrahim 910-926

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

15

q p Tn

=

                                  

(0) +qp Tn (−2) q p Tn (−1)

1+qp Tn

(−1)

1+qp Tn

(−2)

(0)

+qp Tn +qp Tn

, X1 = L1 ; (0)

(1+qp Tn )

q (−1) q (−2) .p Tn p Tn (−1)

(1+qp Tn

(−2)

+qp Tn

(−1)

)(1+qp Tn

(0)

+qp Tn )

q (0) q (−1) q (−2) .p Tn p Tn .p Tn (−1)

1+qp Tn

(0)

(−2)

+qp Tn +qp Tn

(−1)

1+qp Tn

, X1 = L4 ;

(−2)

+qp Tn

q (0) p Tn

, X1 = L5 ;

q (−2) , X1 p Tn

= L6 ;

q (−1) , X1 p Tn

= L7 ;

q (0) p Tn , X1

where

, X1 = L3

(0)

(1+qp Tn )

q (−1) q (0) .p Tn p Tn

                                 

, X1 = L2

= L8 ;

* q p Tn

=T

+ X , Xi2 , .., X1 , .., Xin } | i1 {z p−times

* q (0) p Tn

=T

+

Xi1 , Xi2 , .., 0, .., Xin | {z } p−times

* q (−1) p Tn

=T

+ X , X , .., (−1), .., Xin | i1 i2{z } p−times

* q (−2) p Tn

=T

+ X , X , .., (−2), .., Xin | i1 i2{z } p−times

i1 , i2 , i3 , ..., in ∈ {1, 2, 3....n}, , p = 1, 2, ....n , q = 1, 2, ....n − 1 ,Li = 8k + i , 1 ≤ i ≤ 8 , i ∈ N. Proof. We can prove this theorem by using the concept of piecewise ndimensional mathematical induction which stated in definition (3) similar to what has been done in theorem (4) by using piecewise double mathematical induction stated in definition (1) . 924

Ibrahim 910-926

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

16 Remark 5. we can note that the the number of equations for solutions is n! . For example , if n = 2 we find that p = 1, 2 , q = 1 and then the number of equations for solutions is 2!=2 (see theorem (4) ). That is 1 1 1 T2 = T hX1 , X2 i and 2 T2 = T hX2 , X1 i . So if we put n = 2 in theorem (7) we can get the solutions of equation (2) Another example , if n = 3 we find that p = 1, 2, 3 , q = 1, 2 and then the number of equations for solutions is 3!=6 (see theorem (6) ). That is 1 1 1 1 T3 = T hX1 , X2 , X3 i, 2 T3 = T hX3 , X1 , X2 i, 3 T3 = T hX3 , X2 , X1 i , 2 2 2 1 T3 = T hX1 , X3 , X2 i, 2 T3 = T hX2 , X1 , X3 i and 3 T3 = T hX2 , X3 , X1 i . So if we put n = 3 in theorem (7) we can get the solutions of equation (6). q p Tn

Acknowledgment The results of this paper were obtained while the author has worked in King Khalid University, Abha (Saudi Arabi).

References [1] L. Carlitz, A partial difference equation related to the Fibonacci numbers, Fibonacci Quarterly, 2 ,No3 (1964), pp. 185–196. [2] A. E. Heins , On the Solution of Partial Difference Equations , American Journal of Mathematics , Vol. 63, No. 2 (1941), pp. 435-442 . [3] M. J. Ablowitz and J. F. Ladik , On the Solution of a Class of Nonlinear Partial Difference Equations , Studies in Applied Mathematics , Volume 57, Issue 1,(1977), pages 1-12 . [4] F.G. Boese , Asymptotical stability of partial difference equations with variable coefficients, Journal of Mathematical Analysis and Applications , Volume 276, Issue 2, (2002), PP 709-722 [5] S. Sun Cheng , Partial Difference Equations, Taylor & Francis, London, 2003. [6] R.Courant, K. Friedrichs, H. Lewy , On the Partial Difference Equations of Mathematical Physics, IBM Journal of Research and Development Volume:11 , Issue: 2 ,(1967), 215-234 . [7] W. Dahmen, C. A. Micchelli, On the Solution of Certain Systems of Partial Difference Equations and Linear Dependence of Translates of Box Splines , Transactions of the American Mathematical Society, Vol. 292, No. 1 (1985), pp. 305-320

925

Ibrahim 910-926

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

17 [8] B. J. Daly, The Stability Properties of a Coupled Pair of Non-Linear Partial Difference Equations , Mathematics of Computation, Vol. 17, No. 84 (1963), pp. 346-360 [9] L. Flatto, Partial Differential Equations and Difference Equations, Proceedings of the American Mathematical Society, Vol. 16, No. 5 (1965), pp. 858-863 [10] T. F. Ibrahim,”Behavior of Some Higher Order Nonlinear Rational Partial Difference Equations “Journal of the Egyptian Mathematical Society , Volume 24, Issue 4, Pages 532-537, October 2016 . [11] F. Koehler, C. M. Braden, An Oscillation Theorem for Solutions of a Class of Partial Difference Equations , Proceedings of the American Mathematical Society, Vol. 10, No. 5 (1959), pp. 762-766 [12] A. C. Newell , Finite Amplitude Instabilities of Partial Difference Equations , SIAM Journal on Applied Mathematics, Vol. 33, No. 1 (1977), pp. 133-160 . [13] C. Raymond Adams, Existence Theorems for a Linear Partial Difference Equation of the Intermediate Type , Transactions of the American Mathematical Society, Vol. 28, No. 1 (1926), pp. 119-128 [14] I. P. Van den Berg , On the relation between elementary partial difference equations and partial differential equations , Annals of Pure and Applied Logic 92 (3),(1998),235-265 [15] D. Zeilberger, Binary Operations in the Set of Solutions of a Partial Difference Equation , Proceedings of the American Mathematical Society, Vol. 62, No. 2 (1977), pp. 242-244

926

Ibrahim 910-926

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Meromorphic Solutions of Some Types of Systems of Complex Differential-Difference Equations ∗ WANG Yue ZHAO Xiuheng LIANG Jianying WANG Guocheng (College of Mathematics and Statistics, Hebei University of Economics and Business, Shijiazhuang, 050061, China)

Abstract: Using Nevanlinna theory of the value distribution of meromorphic functions, we investigate the problem of the existence of meromorphic solutions of some types of systems of complex differentialdifference equations and some properties of meromorphic solutions, and we obtain some results, which are the improvements and extensions of some results in references. Example shows that our results are precise. Key words: value distribution; meromorphic solutions; systems of complex differential-difference equation 2010 MR Subject Classification: 30D35.

1 Introduction and Notation Throughout the article, we assume that the reader is familiar with the standard notation and basic results of the Nevanlinna theory of meromorphic functions, see, for example [1-3]. Let w(z) be a non-constant meromorphic function of finite order, if meromorphic function g(z) satisfies T (r, g) = o {T (r, w)} Z = S(r, w), for all r outside of a possible exceptional dr set E with finite logarithmic measure < ∞, then g(z) is called small function of w(z). E r Using the Nevanlinna theory of the distribution of meromophic functions, many authors investigate solutions of some types of complex differential equations, and obtain some results, see [4-8]. Especially, J Malmquist has investigated the problem of existence of complex differential equation and has obtained a result as follows. Theorem A (Malmquist Theorem) (see [1]) Let P (z, w(z)) and Q (z, w(z)) are relatively prime polynomials in w(z). If the complex differential equation p X

dw P (z, w) = R(z, w) = = k=0 q X dz Q(z, w)

ak (z)wk bj (z)wj

j=0 ∗

The project is supported by the National Natural Science Foundation of China (11171013, 11461054), Natural Science Foundation of Hebei Province (A2015207007), and Key Project of Science and Research of Hebei University of Economics and Business(2017KYZ04).

1 927

WANG Yue ET AL 927-942

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

with coefficients of rational functions a0 (z), . . . , ap (z), b0 (z), . . . , bq (z), admits a transcendental meromorphic solution, then q = 0, p ≤ 2. X a(i) (z)wi0 (w0 )i1 · · · (w(n) )in , P (z, w(z)) and Theorem B (see [1]) Let Ω(z, w) = (i)∈I

Q (z, w(z)) are relatively prime polynomials in w(z). If w(z) is a transcendental meromorphic solution of the complex differential equation p X

Ω(z, w) = R(z, w) =

P (z, w) = k=0 q X Q(z, w)

ak (z)wk bj (z)wj

j=0

with coefficients a(i) (z)((i) ∈ I), ak (z)(k = 0, 1, . . . , p) and bj (z)(j = 0, 1, . . . , q), which are rational functions, where I is a finite index set, then q = 0, p ≤ min{4, λ + µ(1 − Θ(∞))}, where ∆ = max{

n X

(α + 1)iα }, λ = max{

α=0

n X

iα }, µ = max{

α=0

n X

αiα }, Θ(∞) = 1 −

α=1

lim N (r,w) . r→∞ T (r,w) Recently, meromorphic solutions of complex difference equations have become a subject of great interest. Many authors, such as I Laine, R Korhonen, Chiang Y M, Chen Zongxuan and Gao Lingyun, investigate complex difference equations, and obtain many results, see [9-24]. Especially, in 2000, M J Ablowitz, R Halburd and B Herbst have investigated the problem of existence of meromorphic solutions of complex difference equations and have obtained a result as follows. Theorem C (see [9]) If the complex difference equation w(z + 1) + w(z − 1) =

a0 (z) + a1 (z)w(z) + · · · + ap (z)wp (z) , b0 (z) + b1 (z)w(z) + · · · + bq (z)wq (z)

with polynomial coefficients ai (z)(i = 0, 1, . . . , p) and bj (z)(j = 0, 1, . . . , q), admits a transcendental meromorphic solution of finite order, then d = max{p, q} ≤ 2. I Laine, J Rieppo and H Silvennoinen generalized the above result, and obtained the following result. Theorem D (see [22]) Let c1 , c2 , . . . , cn be distinct nonzero complex numbers. If w(z) is a finite order transcendental meromorphic solution of the following complex difference equation X {J}

αJ (z)(

Y

j∈J

w(z + cj )) =

a0 (z) + a1 (z)w(z) + · · · + ap (z)wp (z) , b0 (z) + b1 (z)w(z) + · · · + bq (z)wq (z) 2 928

WANG Yue ET AL 927-942

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

with coefficients αJ (z), ai (z)(i = 0, 1, . . . , p) and bj (z)(j = 0, 1, . . . , q), which are small functions relative to w(z), where J is a collection of all subsets of {1, 2, . . . , n}, then d = max{p, q} ≤ n. In [22], I Laine, J Rieppo and H Silvennoinen also obtained the following result. Theorem E (see [22]) Suppose that c1 , c2 , . . . , cn are distinct, non-zero complex numbers, and that w(z) is a transcendental meromorphic solution of n X

αj (z)w(z + cj ) = R(z, w(z)) =

j=1

P (z, w(z)) , Q(z, w(z))

where the coefficients αj (z) are non-vanishing small functions relative to w(z), and where P (z, w(z)), Q(z, w(z)) are relatively prime polynomials in w(z) over the field of small functions relative to w(z). Moreover, we assume that q = degQ w > 0, n = max{p, q} := max{degPw , degQ w }, and that, without restricting generality, Q(z, w(z)) is a monic polynomial. If there exists α ∈ [0, n) such that for all r sufficiently large, N (r,

n X

αj (z)w(z + cj )) ≤ αN (r + c, w(z)) + S(r, w),

j=1

where c = max{|c1 |, |c2 |, . . . , |cn |}, then either the order ρ(w) = +∞, or Q(z, w(z)) ≡ (w(z) + h(z))q , where h(z) is a small meromorphic function relative to w(z). Further, I Laine, J Rieppo and H Silvennoinen also obtained the following Theorem. Theorem F (see [22]) Suppose that w(z) is a transcendental meromorphic solution of the equation X Y αJ (z)( w(z + cj )) = w(p(z)) {J}

j∈J

where p(z) is a polynomial of degree k ≥ 2, J is a collection of all subsets of {1, 2, . . . , n}. Moreover, we assume that the coefficients αJ (z) are small functions relative to w(z) and that n ≥ k. Then T (r, w) = O((log r)α+ε ), log n , ε > 0 is arbitrarily small. log k After some authors investigate complex difference equations, solutions of system of complex difference equations are also investigated, naturally, see [13]. Let c1 , c2 , . . . , cn are distinct non-zero complex numbers, differential-difference polynomials Ω1 (z, w1 ), Ω2 (z, w1 ), Ω3 (z, w2 ), Ω4 (z, w2 ) can be expressed as X (t) (t) (t) Ω1 (z, w1 ) = ai1 (z)(w1 (z + c1 ))li1 ,1 (w1 (z + c2 ))li1 ,2 . . . (w1 (z + cn ))li1 ,n , t ≥ 1, t ∈ N, where α =

i1 ∈I1

3 929

WANG Yue ET AL 927-942

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(t)

X

Ω2 (z, w1 ) =

(t)

(t)

bj1 (z)(w1 (z+c1 ))mj1 ,1 (w1 (z+c2 ))mj1 ,2 . . . (w1 (z+cn ))mj1 ,n , t ≥ 1, t ∈ N,

j1 ∈J1

Ω3 (z, w2 ) =

(t)

X

(t)

(t)

ci2 (z)(w2 (z + c1 ))li2 ,1 (w2 (z + c2 ))li2 ,2 . . . (w2 (z + cn ))li2 ,n , t ≥ 1, t ∈ N,

i2 ∈I2 (t)

X

Ω4 (z, w2 ) =

(t)

(t)

dj2 (z)(w2 (z+c1 ))mj2 ,1 (w2 (z+c2 ))mj2 ,2 . . . (w2 (z+cn ))mj2 ,n , t ≥ 1, t ∈ N,

j2 ∈J2

where coefficients {ai1 (z)}, {bj1 (z)} are small functions relative to w1 , coefficients {ci2 (z)}, {dj2 (z)} are small functions relative to w2 . I1 = {i1 = (li1 ,1 , li1 ,2 , . . . , li1 ,n ) : li1 ,k ∈ N, k = 1, 2, . . . , n}, J1 = {j1 = (mj1 ,1 , mj1 ,2 , . . . , mj1 ,n ) : mj1 ,k ∈ N, k = 1, 2, . . . , n}, I2 = {i2 = (li2 ,1 , li2 ,2 , . . . , li2 ,n ) : li2 ,k ∈ N, k = 1, 2, . . . , n}, J2 = {j2 = (mj2 ,1 , mj2 ,2 , . . . , mj2 ,n ) : mj2 ,k ∈ N, k = 1, 2, . . . , n} are four finite index sets. Existence of solutions of complex differential-difference equations is investigated, see[16]. In this article, we will investigate the problem of the existence of solutions of some types of systems of complex differential-difference equations. The remainder of the article is organized as follows. In §2, we study meromorphic solutions of systems of complex differential-difference equations, and obtain three theorems. Example that we give shows that our results in §2 are precise. In §3, we give a series of lemmas for the proof of theorems 2.1-2.3. In §4, we prove theorems 2.1-2.3 for systems of complex differential-difference equations by lemma given in §3.

2 Main results We obtain the following results about systems of complex differential-difference equations. Theorem 2.1. Let (w1 (z), w2 (z)) be a finite order transcendental meromorphic solution of  Ω1 (z, w1 ) P1 (z, w2 )   = R1 (z, w2 ) = ,  Ω2 (z, w1 ) Q1 (z, w2 ) (2.1) Ω3 (z, w2 ) P2 (z, w1 )   = R (z, w ) = ,  2 1 Ω4 (z, w2 ) Q2 (z, w1 ) where P1 (z, w2 ), Q1 (z, w2 ) are relatively prime polynomials in w2 over the field of small functions relative to w2 , P2 (z, w1 ), Q2 (z, w1 ) are relatively prime polynomials in w1 over the field of small functions relative to w1 . Then max{p1 , q1 } max{p2 , q2 } ≤ (t + 1)2 λ1 λ2 , where λ1k =

max

i1 ∈I1 ,j1 ∈J1 n X

1, 2, . . . , n. λ1 =

{li1 ,k , mj1 ,k }, k = 1, 2, . . . , n. λ2k =

λ1k , λ2 =

k=1

n X

max

i2 ∈I2 ,j2 ∈J2

{li2 ,k , mj2 ,k }, k =

P1 P2 1 λ2k , p1 = degw , q1 = degQ w2 , p2 = degw1 , q2 = 2

k=1

2 degQ w1 . Example 2.1 shows the upper in Theorem 2.1 can be reached.

4 930

WANG Yue ET AL 927-942

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Example 2.1. (w1 (z), w2 (z)) = (e−z + z 2 , ez + z) is a finite order transcendental meromorphic solution of the following system of complex differential-difference equations    w0 (z + 1) = P1 (z, w2 ) ,  1 Q1 (z, w2 ) P2 (z, w1 )   ,  w20 (z + 1) = Q2 (z, w1 ) where P1 (z, w2 ) = (2z + 2)w22 (z) − (8z 2 + 8z + e−1 )w2 (z) − z 2 (2z + 2) + z(8z 2 + 8z + e−1 ) + 2ze−1 , Q1 (z, w2 ) = w22 (z) − 4zw2 (z) + 3z 2 , P2 (z, w1 ) = w12 (z) − [2z 2 − e − 3z + 1]w1 (z) + z 4 − z 2 (e + 3z − 1) + (3z − 1)e, Q2 (z, w1 ) = w12 (z) − [2z 2 − 3z + 1]w1 (z) + z 4 − z 2 (3z − 1). In this case max{p1 , q1 } = 2, max{p2 , q2 } = 2, t = 1, λ1 = λ2 = 1. Thus max{p1 , q1 } max{p2 , q2 } = 4 = (t + 1)2 λ1 λ2 . Theorem 2.2. Suppose that (w1 (z), w2 (z)) is a transcendental meromorphic solution of the following system of complex differential-difference equations  Ω1 (z, w1 ) P1 (z, w2 )   = R1 (z, w2 ) = ,  Ω2 (z, w1 ) Q1 (z, w2 ) (2.1) P2 (z, w1 ) Ω3 (z, w2 )   = R2 (z, w1 ) = ,  Ω4 (z, w2 ) Q2 (z, w1 ) where P1 (z, w2 ), Q1 (z, w2 ) are relatively prime polynomials in w2 over the field of small functions relative to w2 , P2 (z, w1 ), Q2 (z, w1 ) are relatively prime polynomials in w1 over 1 the field of small functions relative to w1 . Moreover, we assume that q1 = degQ w2 > 0, Q2 P1 P2 q2 = degw1 > 0, p1 = degw2 , p2 = degw1 , Q1 (z, w2 ) and Q2 (z, w1 ) are respectively monic polynomials. λ1 (t + 1) = max{p1 , q1 }, λ2 (t + 1) = max{p2 , q2 }, λ0 = min{λ1 , λ2 }, c = max{|c1 |, |c2 |, . . . , |cn |}. If there exists α, β ∈ [0, λ0 (t+1)), such that for all r sufficiently large,  Ω1 (z, w1 )   ) ≤ αN (r + c, w1 (z)) + S(r, w1 ),  N (r, Ω2 (z, w1 ) (2.2) Ω3 (z, w2 )   ) ≤ βN (r + c, w2 (z)) + S(r, w2 ),  N (r, Ω4 (z, w2 ) and

 n X    λ1k (t + 1)N (r, w1 (z + ck )) ≤ αN (r + c, w1 (z)) + S(r, w1 ),   k=1

n X    λ2k (t + 1)N (r, w2 (z + ck )) ≤ βN (r + c, w2 (z)) + S(r, w2 ).  

(2.3)

k=1

5 931

WANG Yue ET AL 927-942

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Then, either at least one of ρ(w1 ) = +∞, ρ(w2 ) = +∞ will be true, or at least one of Q1 (z, w2 ) ≡ (w2 (z) + h2 (z))q1 , Q2 (z, w1 ) ≡ (w1 (z) + h1 (z))q2 will be true, where h1 (z) is a small meromorphic function relative to w1 (z), h2 (z) is a small meromorphic function relative to w2 (z). Theorem 2.3. Suppose that (w1 (z), w2 (z)) is a transcendental meromorphic solution of the following system of complex differential-difference equations  Ω1 (z, w1 )   = w2 (p(z)),  Ω2 (z, w1 ) (2.4) Ω3 (z, w2 )   = w1 (p(z)),  Ω4 (z, w2 ) where p(z) is a polynomial of degree d ≥ 2. λ1k = λ2k =

max

i2 ∈I2 ,j2 ∈J2

{li2 ,k , mj2 ,k }, k = 1, 2, . . . , n. λ1 =

max

i1 ∈I1 ,j1 ∈J1 n X

{li1 ,k , mj1 ,k }, k = 1, 2, . . . , n.

λ1k , λ2 =

k=1

n X

λ2k , λ = max{λ1 , λ2 }.

k=1

Moreover, we assume that λ(t + 1)2 ≥ d. Then T (r, w1 ) = O((log r)α+ε ), T (r, w2 ) = O((log r)α+ε ), where α =

log λ(t + 1)2 , and ε > 0 is arbitrarily small. log d

3 Some Lemmas for the Proof of Theorems We need the following lemmas to proof theorems. Lemma 3.1 (see [23]) Let R (z, w(z)) =

a0 (z) + a1 (z)w(z) + · · · + ap (z)wp (z) b0 (z) + b1 (z)w(z) + · · · + bq (z)wq (z)

be an irreducible rational function in w(z) with the meromorphic coefficients {ai (z)} and {bj (z)}. If w(z) is a meromorphic function, then X X T (r, R(z, w(z))) = max{p, q}T (r, w(z)) + O{ T (r, ai (z)) + T (r, bj (z))}. Lemma 3.2 (see [3]) Let w(z) be a transcendental meromorphic function, then T (r, w(k) ) ≤ (k + 1)T (r, w) + S(r, w). Lemma 3.3 (see [11]) Let w(z) be a non-constant meromorphic function of finite order, c is a non-zero complex constant, then T (r, w(z + c)) = T (r, w) + S(r, w), 6 932

WANG Yue ET AL 927-942

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

for all r outside of a possible exceptional set with finite logarithmic measure. Lemma 3.4 (see [6]) Let f1 , f2 , . . . , fp be distinct meromorphic functions and X k f1k1 f2k2 · · · fp p P (z) K∈K . F (z) = = X0 i i i Q(z) f 1 f 2 · · · fpp 1

2

I∈I0

If sv = max{ max kv , max iv }, v = 1, 2, . . . , p. Then K∈K0

I∈I0

m(r, F ) ≤

p X

sv m(r, fv ) + N (r, Q) − N (r,

v=1

T (r, F ) ≤

p X

1 ) + O(1), Q

sv T (r, fv ) + O(1),

v=1

S where Q(z) 6= 0, K0 =S{K = (k1 , k2 , . . . , kp ) : kv ∈ N {0}, v = 1, 2, . . . , p}, I0 = {I = (i1 , i2 , . . . , ip ) : iv ∈ N {0}, v = 1, 2, . . . , p} are two finite index sets. Lemma 3.5 (see [24]) Let w(z) be a meromorphic function and let Φ be given by Φ = wn + an−1 wn−1 + · · · + a0 , T (r, aj ) = S(r, w), j = 0, 1, ..., n − 1. Then either Φ ≡ (w +

an−1 n ) , n

or

1 ) + N (r, w) + S(r, w). Φ Lemma 3.6 (see [22]) Let w(z) be a non-constant meromorphic function and let P (z, w), Q(z, w) be two polynomials in w(z) with meromorphic coefficients small relative to w(z). If P (z, w) and Q(z, w) have no common factors of positive degree in w(z) over the field of small functions relative to w(z), then T (r, w) ≤ N (r,

N (r,

1 P (z, w) ) ≤ N (r, ) + S(r, w). Q(z, w) Q(z, w)

Lemma 3.7 (see [21]) Let T : [0, +∞) → [0, +∞) be a non-decreasing continuous function, δ ∈ (0, 1), s ∈ (0, +∞). If T is of finite order, i.e lim

r→∞

log T (r) = ρ < ∞, log r

then

T (r) ), rδ outside an exceptional set of finite logarithmic measure. Lemma 3.8 (see [14]) Let w(z) be a transcendental meromorphic function, and p(z) = ak z k + ak−1 z k−1 + · · · + a1 z + a0 , ak 6= 0, be a non-constant polynomial of degree T (r + s) = T (r) + o(

7 933

WANG Yue ET AL 927-942

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

k. Given 0 < δ < |ak |, denote λ = |ak | + δ and µ = |ak | − δ. Then given ε > 0 and a ∈ C ∪ {∞}, we have kn(µrk , a, w) ≤ n(r, a, w(p(z))) ≤ kn(λrk , a, w), N (µrk , a, w) + O(log r) ≤ N (r, a, w(p(z))) ≤ N (λrk , a, w) + O(log r), (1 − ε)T (µrk , w) ≤ T (r, w(p(z))) ≤ (1 + ε)T (λrk , w). Lemma 3.9 (see [2]) Let g : (0, +∞) → R, h : (0, +∞) → R be monotone increasing functions such that g(r) ≤ h(r) outside of an exceptional set E of finite linear measure. Then, for any α > 1, there exists r0 > 0 such that g(r) ≤ h(αr) for all r > r0 . Lemma 3.10 (see [15]) Let φi : [r0 , +∞) → (0, +∞)(i = 1, 2) be positive and bounded in every finite interval, and suppose that φ1 (µrm ) ≤ A1 φ1 (r) + B1 φ2 (r) + d1 , φ2 (µrm ) ≤ A2 φ1 (r) + B2 φ2 (r) + d2 , holds for all r large enough, where µ > 0, m > 1, Ai > 1, Bi > 1, (i = 1, 2), and d1 , d2 are real constants. Then φ1 (r) = O((log r)α ), φ2 (r) = O((log r)α ) where α =

log 2A , A = max{Ai , Bi }. i=1,2 log m

4 Proof of Theorems 2.1-2.3 Proof of Theorem 2.1. Suppose that (w1 (z), w2 (z)) is a set of finite order transcendental meromorphic solution of system of complex differential-difference equations (2.1). Using Lemma 3.1, Lemma 3.2, Lemma 3.3 and Lemma 3.4, we obtain max{p1 , q1 }T (r, w2 ) = T (r, R1 (z, w2 )) + S(r, w2 ) Ω1 (z, w1 ) = T (r, ) + S(r, w2 ) Ω2 (z, w1 ) n X (t) ≤ λ1k T (r, w1 (z + ck )) + S(r, w1 ) + S(r, w2 ) k=1



n X

λ1k (t + 1)T (r, w1 (z + ck )) + S(r, w1 ) + S(r, w2 )

k=1

=

n X

λ1k (t + 1)T (r, w1 (z)) + S(r, w1 ) + S(r, w2 )

k=1

= λ1 (t + 1)T (r, w1 ) + S(r, w1 ) + S(r, w2 ). Thus, we have max{p1 , q1 }T (r, w2 ) ≤ λ1 (t + 1)T (r, w1 ) + S(r, w1 ) + S(r, w2 ).

(4.1)

Similarly, we obtain max{p2 , q2 }T (r, w1 ) ≤ λ2 (t + 1)T (r, w2 ) + S(r, w1 ) + S(r, w2 ).

(4.2)

8 934

WANG Yue ET AL 927-942

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

It follows from (4.1) and (4.2) that max{p1 , q1 } max{p2 , q2 } ≤ (t + 1)2 λ1 λ2 . Theorem 2.1 is proved. Proof of Theorem 2.2. Suppose that (w1 (z), w2 (z)) is a set of transcendental meromorphic solution of (2.1) and the second alternative of the conclusion is not true. It follows from Lemma 3.5, Lemma 3.6, (2.1) and (2.2) that 1 ) + N (r, w2 ) + S(r, w2 ) Q1 (z, w2 ) P1 (z, w2 ) ≤ N (r, ) + N (r, w2 ) + S(r, w2 ) Q1 (z, w2 ) Ω1 (z, w1 ) = N (r, ) + N (r, w2 ) + S(r, w2 ) Ω2 (z, w1 ) ≤ αN (r + c, w1 ) + N (r, w2 ) + S(r, w1 ) + S(r, w2 ).

T (r, w2 ) ≤ N (r,

Thus, we obtain T (r, w2 ) − N (r, w2 ) ≤ αN (r + c, w1 ) + S(r, w1 ) + S(r, w2 ).

(4.3)

where α ∈ [0, λ0 (t+1)), λ0 = min{λ1 , λ2 }, λ1 (t+1) = max{p1 , q1 }, λ2 (t+1) = max{p2 , q2 }. Similarly, we have T (r, w1 ) − N (r, w1 ) ≤ βN (r + c, w2 ) + S(r, w1 ) + S(r, w2 ).

(4.4)

where β ∈ [0, λ0 (t+1)), λ0 = min{λ1 , λ2 }, λ1 (t+1) = max{p1 , q1 }, λ2 (t+1) = max{p2 , q2 }. Assuming, contrary to the assertion, that ρ(wi ) < +∞, i = 1, 2. Then it implies that S(r, wi (z + ck )) = S(r, wi (z)), i = 1, 2, k = 1, 2, . . . , n. By (4.3) and (4.4), we obtain T (r, w2 (z + ck )) − N (r, w2 (z + ck )) ≤ αN (r + c, w1 (z + ck )) + S(r, w1 ) + S(r, w2 ). (4.5) T (r, w1 (z + ck )) − N (r, w1 (z + ck )) ≤ βN (r + c, w2 (z + ck )) + S(r, w1 ) + S(r, w2 ). (4.6) where k = 1, 2, . . . , n. Applying Lemma 3.1, Lemma 3.2, Lemma 3.4 and Lemma 3.7, and using (2.3) and

9 935

WANG Yue ET AL 927-942

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(4.6), we conclude that λ1 (t + 1)T (r, w2 ) = T (r, ≤

n X

Ω1 (z, w1 ) ) + S(r, w2 ) Ω2 (z, w1 ) (t)

λ1k T (r, w1 (z + ck )) + S(r, w1 ) + S(r, w2 )

k=1

≤ =

n X k=1 n X

λ1k (t + 1)T (r, w1 (z + ck )) + S(r, w1 ) + S(r, w2 ) λ1k (t + 1)[T (r, w1 (z + ck )) − N (r, w1 (z + ck ))] +

n X

λ1k (t + 1)N (r, w1 (z + ck ))

k=1

k=1

+S(r, w1 ) + S(r, w2 ) n X ≤ λ1k (t + 1)βN (r + c, w2 (z + ck )) + αN (r + c, w1 (z)) + S(r, w1 ) + S(r, w2 ) k=1

≤ ≤

n X k=1 n X

λ1k (t + 1)βN (r + 2c, w2 (z)) + αN (r + c, w1 (z)) + S(r, w1 ) + S(r, w2 ) λ1k (t + 1)βN (r + 2c, w2 (z)) + αN (r + 2c, w1 (z)) + S(r, w1 ) + S(r, w2 )

k=1

≤ λ1 (t + 1)βN (r + 2c, w2 (z)) + αN (r + 2c, w1 (z)) + S(r, w1 ) + S(r, w2 ). Therefore, we have α N (r + 2c, w1 ) λ1 (t + 1) −N (r, w2 ) + S(r, w1 ) + S(r, w2 ).

T (r, w2 ) − N (r, w2 ) ≤ βN (r + 2c, w2 ) +

(4.7)

Similarly, applying Lemma 3.1, Lemma 3.2, Lemma 3.4 and Lemma 3.7, and using (2.3) and (4.5), we conclude that β N (r + 2c, w2 ) λ2 (t + 1) −N (r, w1 ) + S(r, w1 ) + S(r, w2 ).

T (r, w1 ) − N (r, w1 ) ≤ αN (r + 2c, w1 ) +

(4.8)

Applying Lemma 3.7, and using (4.8), we obtain λ1 (t + 1)T (r, w2 ) ≤

n X

λ1k (t + 1)[T (r, w1 (z + ck )) − N (r, w1 (z + ck ))] +

k=1

n X

λ1k (t + 1)N (r, w1 (z + ck ))

k=1

+S(r, w1 ) + S(r, w2 ) n X ≤ λ1k (t + 1)[αN (r + 3c, w1 ) + k=1

β N (r + 3c, w2 ) − N (r − c, w1 )] λ2 (t + 1)

+αN (r + c, w1 (z)) + S(r, w1 ) + S(r, w2 ) λ1 β ≤ λ1 α(t + 1)N (r + 3c, w1 ) + N (r + 3c, w2 ) − λ1 (t + 1)N (r − c, w1 ) λ2 +αN (r, w1 (z)) + S(r, w1 ) + S(r, w2 ). Namely, β T (r, w2 ) ≤ αN (r + 3c, w1 ) + N (r + 3c, w2 ) − N (r, w1 ) λ2 (t + 1) α + N (r, w1 (z)) + S(r, w1 ) + S(r, w2 ). λ1 (t + 1) 10 936

WANG Yue ET AL 927-942

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Thus, we obtain β N (r + 3c, w2 ) − N (r, w1 ) T (r, w2 ) − N (r, w2 ) ≤ αN (r + 3c, w1 ) + λ2 (t + 1) α + N (r, w1 (z)) − N (r, w2 ) + S(r, w1 ) + S(r, w2 ). λ1 (t + 1) Similarly, applying Lemma 3.7, and using (4.8), we have T (r, w1 ) − N (r, w1 ) ≤ βN (r + 3c, w2 ) + +

α N (r + 3c, w1 ) − N (r, w1 ) λ1 (t + 1)

β N (r, w2 (z)) − N (r, w2 ) + S(r, w1 ) + S(r, w2 ). λ2 (t + 1)

This implies that  β   N (r + 3c, w2 ) − N (r, w1 ) T (r, w2 ) − N (r, w2 ) ≤ αN (r + 3c, w1 ) +   λ2 (t + 1)   α   + N (r, w1 (z)) − N (r, w2 ) + S(r, w1 ) + S(r, w2 ),  λ1 (t + 1) α  T (r, w1 ) − N (r, w1 ) ≤ βN (r + 3c, w2 ) + N (r + 3c, w1 ) − N (r, w1 )   λ1 (t + 1)     β   + N (r, w2 (z)) − N (r, w2 ) + S(r, w1 ) + S(r, w2 ). λ2 (t + 1) (4.9) We now proceed, inductively, to prove  mβ   N (r + (2m + 1)c, w2 ) − mN (r, w1 ) T (r, w2 ) − N (r, w2 ) ≤ αN (r + (2m + 1)c, w1 ) +   λ (t + 1) 2   mα   + N (r, w1 (z)) − mN (r, w2 ) + S(r, w1 ) + S(r, w2 ),  λ1 (t + 1) mα  T (r, w1 ) − N (r, w1 ) ≤ βN (r + (2m + 1)c, w2 ) + N (r + (2m + 1)c, w1 ) − mN (r, w1 )   λ (t  1 + 1)    mβ   + N (r, w2 (z)) − mN (r, w2 ) + S(r, w1 ) + S(r, w2 ). λ2 (t + 1) (4.10) The case m = 1 has been proved. We assume that (4.10) holds when m = l. λ1 (t + 1)T (r, w2 ) ≤

n X

λ1k (t + 1)[T (r, w1 (z + ck )) − N (r, w1 (z + ck ))]

k=1

+

n X

λ1k (t + 1)N (r, w1 (z + ck )) + S(r, w1 ) + S(r, w2 )

k=1



n X

λ1k (t + 1)[βN (r + (2l + 1)c, w2 (z + ck )) +

k=1

lα N (r + (2l + 1)c, w1 (z + ck )) λ1 (t + 1)

lβ N (r, w2 (z + ck )) − lN (r, w2 (z + ck ))] λ2 (t + 1) +αN (r + c, w1 (z)) + S(r, w1 ) + S(r, w2 ) lα ≤ λ1 (t + 1)[βN (r + (2l + 2)c, w2 (z)) + N (r + (2l + 2)c, w1 (z)) λ1 (t + 1) lβ −lN (r − c, w1 (z)) + N (r + c, w2 (z)) − lN (r − c, w2 (z))] λ2 (t + 1) +αN (r + c, w1 (z)) + S(r, w1 ) + S(r, w2 ). −lN (r, w1 (z + ck )) +

11 937

WANG Yue ET AL 927-942

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Therefore T (r, w2 ) ≤ βN (r + (2l + 2)c, w2 (z)) +

lα N (r + (2l + 2)c, w1 (z)) λ1 (t + 1)

lβ N (r, w2 (z)) − lN (r, w2 (z)) −lN (r, w1 (z)) + λ2 (t + 1) α + N (r, w1 (z)) + S(r, w1 ) + S(r, w2 ). λ1 (t + 1) Namely, T (r, w2 ) − N (r, w2 ) ≤ βN (r + (2l + 2)c, w2 (z)) +

lα N (r + (2l + 2)c, w1 (z)) λ1 (t + 1)

lβ N (r, w2 (z)) − lN (r, w2 (z)) λ2 (t + 1) α −N (r, w2 ) + N (r, w1 (z)) + S(r, w1 ) + S(r, w2 ). λ1 (t + 1) −lN (r, w1 (z)) +

Similarly, T (r, w1 ) − N (r, w1 ) ≤ αN (r + 2(l + 1)c, w1 (z)) +

lβ N (r + 2(l + 1)c, w2 (z)) λ2 (t + 1)

lα N (r, w1 (z)) − lN (r, w1 (z)) λ1 (t + 1) β −N (r, w1 ) + N (r, w2 (z)) + S(r, w1 ) + S(r, w2 ). λ2 (t + 1) −lN (r, w2 (z)) +

λ1 (t + 1)T (r, w2 ) ≤

n X

λ1k (t + 1)[T (r, w1 (z + ck )) − N (r, w1 (z + ck ))]

k=1

+

n X

λ1k (t + 1)N (r, w1 (z + ck )) + S(r, w1 ) + S(r, w2 )

k=1



n X

λ1k (t + 1)[αN (r + 2(l + 1)c + c, w1 (z)) +

k=1

−lN (r − c, w2 (z)) + +

lβ N (r + 2(l + 1)c + c, w2 (z)) λ2 (t + 1)

lα N (r + c, w1 (z)) − lN (r − c, w1 (z)) − N (r − c, w1 (z)) λ1 (t + 1)

β N (r + c, w2 (z))] + αN (r + c, w1 ) + S(r, w1 ) + S(r, w2 ). λ2 (t + 1)

This implies that T (r, w2 ) ≤ αN (r + [2(l + 1) + 1]c, w1 ) +

(l + 1)β N (r + [2(l + 1) + 1]c, w2 ) λ2 (t + 1)

(l + 1)α N (r, w1 (z)) − (l + 1)N (r, w1 (z)) λ1 (t + 1) +S(r, w1 ) + S(r, w2 ).

−lN (r, w2 ) +

Thus T (r, w2 ) − N (r, w2 ) ≤ αN (r + [2(l + 1) + 1]c, w1 ) +

(l + 1)β N (r + [2(l + 1) + 1]c, w2 ) λ2 (t + 1)

(l + 1)α N (r, w1 (z)) − (l + 1)N (r, w1 (z)) λ1 (t + 1) +S(r, w1 ) + S(r, w2 ).

−(l + 1)N (r, w2 ) +

12 938

WANG Yue ET AL 927-942

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Similarly, T (r, w1 ) − N (r, w1 ) ≤ βN (r + [2(l + 1) + 1]c, w2 ) +

(l + 1)α N (r + [2(l + 1) + 1]c, w1 ) λ1 (t + 1)

(l + 1)β N (r, w2 (z)) − (l + 1)N (r, w1 (z)) λ2 (t + 1) +S(r, w1 ) + S(r, w2 ).

−(l + 1)N (r, w2 ) +

The above two inequalities shows that (4.10) holds for m = l + 1. We complete the induction. Applying Lemma 3.7, and using (4.10), we obtain  α α β  )N (r, w1 ) + N (r, w2 ) + S(r, w1 ) + S(r, w2 ),  N (r, w1 ) + N (r, w2 ) ≤ ( + m λ1 (t + 1) λ2 (t + 1) β β α   N (r, w1 ) + N (r, w2 ) ≤ ( + )N (r, w2 ) + N (r, w1 ) + S(r, w1 ) + S(r, w2 ). m λ2 (t + 1) λ1 (t + 1) (4.11) Noting that α, β ∈ [0, λ0 (t + 1)), λ0 = min{λ1 , λ2 }. Let m be large enough such that α α 1 1 1 := + = α( + ) < 1, η1 m λ1 (t + 1) m λ1 (t + 1)

β < 1. λ2 (t + 1)

1 β β 1 1 := + = β( + ) < 1, η2 m λ2 (t + 1) m λ2 (t + 1)

α < 1. λ1 (t + 1)

By (4.11), we have  1 β  )N (r, w2 ) ≤ S(r, w1 ) + S(r, w2 ),  (1 − )N (r, w1 ) + (1 − η1 λ2 (t + 1) 1 α   (1 − )N (r, w2 ) + (1 − )N (r, w1 ) ≤ S(r, w1 ) + S(r, w2 ). η2 λ1 (t + 1)

(4.12)

Using (4.12), for m large enough, we conclude that N (r, w1 ) = S(r, w1 ) + S(r, w2 ). N (r, w2 ) = S(r, w1 ) + S(r, w2 ). Applying Lemma 3.7, and using (4.3) and (4.4), we have T (r, w1 ) = S(r, w1 ) + S(r, w2 ). T (r, w2 ) = S(r, w1 ) + S(r, w2 ). Thus [1 + o(1)]T (r, w1 ) = S(r, w2 ). [1 + o(1)]T (r, w2 ) = S(r, w1 ). Therefore [1 + o(1)]T (r, w1 )T (r, w2 ) = S(r, w1 )S(r, w2 ). Then we obtain 1 = 0, which is a contradiction. Therefore, we conclude that at least one of ρ(w1 ) = +∞, ρ(w2 ) = +∞ will be true. 13 939

WANG Yue ET AL 927-942

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

This completes the proof of Theorem 2.2. Proof of Theorem 2.3. Suppose that (w1 (z), w2 (z)) is a set of transcendental meromorphic solution of (2.4). Applying Lemma 3.2, Lemma 3.4 and Lemma 3.8, and the first equation of (2.4), we have (1 − ε2 )T (µrd , w2 ) ≤ T (r, w2 (pz)) Ω1 (z, w1 ) = T (r, ) Ω2 (z, w1 ) n X (t) ≤ λ1k T (r, w1 (z + ck )) + S(r, w1 ) k=1

≤ ≤

n X k=1 n X

λ1k (t + 1)T (r, w1 (z + ck )) + S(r, w1 ) λ1k (t + 1)T (r + c, w1 (z)) + S(r, w1 ),

k=1

where ε2 > 0 is arbitrarily small. For every β1 > 1, and for r large enough, we obtain T (r + c, w1 ) ≤ T (β1 r, w1 ). Suppose that r to be large enough, outside of a possible exceptional set with finite logarithmic measure, we conclude that (1 − ε2 )T (µrd , w2 ) ≤ λ1 (t + 1)(1 + ε1 )T (β1 r, w1 ), where ε1 > 0 is arbitrarily small. By Lemma 3.9, whenever γ1 > 1, for all r large enough, we obtain (1 − ε2 )T (µrd , w2 ) ≤ λ1 (t + 1)(1 + ε1 )T (β1 γ1 r, w1 ).

(4.13)

(1 − ε1 )T (µrd , w1 ) ≤ λ2 (t + 1)(1 + ε2 )T (β2 γ2 r, w2 ).

(4.14)

Similarly, Denote β = max{β1 , β2 }, γ = max{γ1 , γ2 }, ε = max{ε1 , ε2 , ε1 , ε2 }. Then (4.13), (4.14) may become (1 − ε)T (µrd , w2 ) ≤ λ1 (t + 1)(1 + ε)T (βγr, w1 ). (4.15) (1 − ε)T (µrd , w1 ) ≤ λ2 (t + 1)(1 + ε)T (βγr, w2 ).

(4.16)

Let t = βγr, then the above two inequalities become T(

T(

µ (βγ)d µ (βγ)d

d

λ1 (t + 1)(1 + ε) T (t, w1 ). 1−ε

(4.17)

d

λ2 (t + 1)(1 + ε) T (t, w2 ). 1−ε

(4.18)

t , w2 ) ≤

t , w1 ) ≤

14 940

WANG Yue ET AL 927-942

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Noting that λ = max{λ1 , λ2 }, by means of Lemma 3.10, we obtain T (r, w1 ) = O((log r)s ), T (r, w2 ) = O((log r)s ), 2

λ(1+ε) log (t+1)1−ε

log(t + 1)2 λ log(t + 1)2 λ + o(1). Let α = . log d log d log d This completes the proof of Theorem 2.3.

where s =

=

References [1] He Yuzan, Xiao Xiuzhi. Algebroid functions and ordinary differential equations[M]. Beijing: Science Press, 1988. [2] Laine I. Nevanlinna theory and complex differential equations[M]. Berlin: Walter de Gruyter, 1993. [3] Yi Hongxun, Yang C C. Theory of the uniqueness of meromorphic functions(in Chinese)[M]. Beijing: Science Press, 1995. [4] Gao Lingyun. Expression of meromorphic solutions of systems of algebraic differential equations with exponential coeffents[J]. Acta Mathematica Scientia, 2011, 31B(2): 541-548. [5] Gao Lingyun. Transcendental solutions of systems of complex differential equations[J]. Acta Mathematica Sinica, Chinese Series, 2015, 58(1): 41-48. [6] Mohon’ko A Z, Mokhon’ko V D. Estimates for the Nevanlinna characteristics of some classes of meromorphic functions and their applications to differential equations[J]. Siirskii Matematicheskii Zhurnal, 1974, 15: 1305-1322. [7] Toda N. On algebroid solutions of some binomial differential equations in the complex plane[J]. Proc.Japan Acad.,Ser. A, 1988, 64(3): 61-64. [8] Tu Zhenhan, Xiao Xiuzhi. On the meromorphic solutions of system of higher order algebraic differential equations[J]. Complex variables, 1990, 15(3): 197-209. [9] Ablowitz M J , Halburd R, Herbst B. On the extension of the Painleve property to difference equations[J]. Nonlinearity., 2000, 13(3): 889-905. [10] Chen Zongxuan. On difference equations relating to Gamma function[J]. Acta Mathematica Scientia, 2011, 31B(4): 1281-1294. [11] Chiang Y M, Feng S J. On the Nevanlinna characteristic of f (z + η) and difference equations in the complex plane[J]. Ramanujan Journal, 2008, 16(1): 105-129. [12] Gao Lingyun. On meromorphic solutions of a type of difference equations[J]. Chinese Ann.Math., 2014, 35A(2): 193-202. [13] Gao Lingyun. Systems of complex difference equations of Malmquist type[J]. Acta Mathematica Sinica, 2012, 55(2): 293-300. 15 941

WANG Yue ET AL 927-942

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[14] Goldstein R. Some results on factorisation of meromorphic functions[J]. J.London Math. Soc., 1971, 4(4): 357-364. [15] Zhang Xia, Liao Liangwen. Meromorphic solutions of complex difference and differential equations and their properties[D]. Nanjing, Nanjing University, 2014. [16] Li Haichou. On existence of solutions of differential-difference equations[J]. Math. Meth. Appl. Sci., 2016, 39(1): 144-151. [17] Wang Yue, Zhang Qingcai. Admissible solutions of two types of systems of complex diference equations[J]. Acta Mathematicae Applicatae Sinica, 2015, 38(1): 80-88. [18] Wang Yue. Solutions of complex difference and q-difference equations[J]. Advances in Difference Equations, 2016, 98, 22 pages. [19] Halburd R G, Korhonen R J. Difference analogue of the lemma on the logarithmic derivative with applications to difference equations[J]. Journal of Mathematical Analysis and Applications, 2006, 314(2): 477-487. [20] Heittokangas J, Korhonen, R, Laine I, Rirppo J, Tohge K. Complex difference equations of Malmquist type[J]. Computational Methods and Theory, 2001, 1(1): 27-39. [21] Korhonen R. A new Clunie type theorem for difference polynomials[J]. Difference Equ. Appl., 2011, 17(3): 387-400. [22] Laine I, Rieppo J, Silvennoinen H. Remarks on complex difference equations[J]. Computational Methods and Function Theory, 2005, 5(1): 77-88. [23] Mohon’ko A Z. The Nevanlinna characteristics of certain meromorphic functions[J]. Teor. Funktsional. Anal. I Prilozhen., 1971, 14(14): 83-87 (in Russian). [24] Weissenborn G. On the theorem of Tumura and Clunie[J]. Bull London Math Soc, 1986, 18(4): 371-373.

16 942

WANG Yue ET AL 927-942

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A note on a certain kind of nonlinear difference equations Jie Zhang, Hai Yan Kang



College of Mathematics, China University of Mining and Technology, Xuzhou 221116, PR China Email: [email protected], [email protected]

Liang Wen Liao Department of Mathematics, Nanjing University, Nanjing 210093, PR China Email: [email protected]

June 6, 2017 Abstract: In this paper, we mainly investigate a certain type of difference equation of the form f n (z) + p(z)(∆f )m = r(z)eq(z) , where p(z), r(z), q(z) are nonzero polynomials and n, m are two positive integers satisfying n > m. Some examples are also structured to show that our results are sharp. Key words and phrases: meromorphic; difference equation; small function. 2000 Mathematics Subject Classification: 30D35; 34M10.

1

Introduction and main results

In this paper, a meromorphic function always means it is meromorphic in the whole complex plane C. We assume that the reader is familiar with the standard notations in the Nevanlinna theory. We use the following standard notations in value distribution theory (see [5, 7, 11, 12]): T (r, f ), m(r, f ), N (r, f ), N (r, f ), · · · . And we denote by S(r, f ) any quantity satisfying S(r, f ) = o{T (r, f )}, as r → ∞, possibly outside of a set E with finite linear or logarithmic measure, not necessarily the same at each occurrence. A polynomial Q(z, f ) is called a difference polynomial in f if Q is a polynomial in f , its derivatives and shifts with small meromorphic coefficients, say {aλ |λ ∈ I}, such that T (r, aλ ) = S(r, f ) for all λ ∈ I. We define the difference operator ∆f = f (z + 1) − f (z). One of the most important results in the value distribution theory is the following theorem due to Hayman. ∗ Corresponding author. This research was supported by the Fundamental Research Funds for the Central Universities (No. 2015QNA52).

1

943

Jie Zhang ET AL 943-951

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Theorem 1 If g is a transcendental meromorphic function, then either g itself assumes every finite complex value infinitely often, or g (k) assumes every finite non-zero value infinitely often. As a consequence of Theorem 1, we have Theorem 2 If f is a transcendental entire function, then f 2 +af 0 has infinitely many zeros for each finite non-zero complex value a. In fact, if f is an entire function, then g = f1 has not any zero. It follows from Theorem 1 that g 0 − a1 has infinitely many zeros, namely f 2 + af 0 has infinitely many zeros. It is well known that ∆f can be considered as the difference counterpart of f 0 . The difference analogue of the lemma on the logarithmic derivative and Nevanlinna theory for the difference operator have been established recently (see [1, 2, 3, 4, 6], which brings about a number of papers focusing on difference topics. And so here one nature question arise, that is what can be said if we replace f 2 + af 0 with f 2 + a∆f in Theorem 2? Here we shall deal with this problem and obtain the following main result. Theorem 3 If f is a transcendental entire solution of finite order of the following non-linear difference equation f 2 (z) + p(z)∆f = r(z)eq(z) ,

(1)

where p(z), r(z), q(z) are nonzero polynomials such that deg p(z) ≤ 1, then ∆f ≡ 0, and f must be of the form f (z) = ce2kπiz , where c 6= 0 and k ∈ Z. Example 1 For the following non-linear difference equation 2 f 2 (z) + (z − 1)2 ∆f = z(z − 1) e4πiz , it admits a finite order transcendental entire solution f (z) = z(z − 1)e2πiz − (z − 1). But ∆f 6≡ 0. This example shows that the assumption deg p(z) ≤ 1 is necessary for our result in Theorem 3. And from Theorem 3, we also obtain the following corollary corresponding to Theorem 2. 2

944

Jie Zhang ET AL 943-951

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Corollary 1 Let f be a transcendental entire function of finite order and ∆f 6≡ 0, then f 2 (z) + p(z)∆f has infinitely many zeros, where p(z) is a nonzero polynomial whose degree is at most 1. This corollary can be regarded as the general case of the following result (see Theorem 1.1 in [9]) due to Liu and Laine in some sense. Theorem 4 [9] Let f be a transcendental entire function of finite order ρ, not of period c, where c is a nonzero complex constant. Then the difference polynomial f n (z) + f (z + c) − f (z) has infinitely many zeros in the complex plane, provided that n ≥ 2. In 1970, C. C. Yang [13] obtained the following well known theorem. 1 Theorem 5 Let m, n be two positive integers satisfying m + n1 < 1. Then there are no transcendental entire solutions f (z) and g(z) satisfying the equation

a(z)f n (z) + b(z)g m (z) = 1 with a(z), b(z) being small functions of f (z). People have obtained quite a number of results by considering special functions f, g in Theorem 5. For example, J. Zhang [14] obtained the following result. Theorem 6 For the following difference equation f n (z) + f m (z + 1) = p(z), where p(z) is a nonzero polynomial with deg p(z) = k , suppose it admits a transcendental entire function f (z) of finite order. Then holds (i) m = n = 2, p(z) is a nonzero constant and f (z) has form of f (z) = aeAz + be−Az , where eA = −i and a, b are two constants such that 4ab = p. (ii) m = n = 1 and f (k+1) (z) is a periodic entire function with period 2. Here we consider the non-linear difference equation of the following form f n (z) + p(z)(∆f )m = r(z)eq(z) ,

(2)

where p(z), r(z), q(z) are nonzero polynomials and n > m, and obtain the following theorem, which can be considered as the more general case in Theorem 3. Theorem 7 If equation (2) admits a transcendental entire solution f with finite order such that ∆f 6≡ 0 , then n = 2 and m = 1. Example 2 For the following non-linear difference equation f (z) + ∆f = eez , it admits a finite order transcendental entire solution f (z) = ez . But ∆f 6≡ 0. 3

945

Jie Zhang ET AL 943-951

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Example 3 For the following non-linear difference equation 1 f (z) − (∆f )2 = eπiz , 4 it admits a finite order transcendental entire solution f (z) = e2πiz + eπiz . But ∆f 6≡ 0. Examples 2-3 show that the assumption n > m is necessary for our result in Theorem 7. Combining Theorem 3 and Theorem 7, we can obtain the following corollary. Corollary 2 For the non-linear difference equation of the form f n (z) + p(z)(∆f )m = r(z)eq(z) ,

(3)

where p(z), r(z), q(z) are nonzero polynomials satisfying deg p(z) ≤ 1 and n, m are two positive integers satisfying n > m, the equation (3) admits no finite order transcendental entire solution f such that ∆f 6≡ 0.

2

Some lemmas

To prove our results, we need some lemmas as follows. Lemma 1 (see[1]) Let f (z) be a transcendental meromorphic function with finite order σ. Then for each ε > 0, we have m r,

f (z + c)  = O(rσ−1+ε ). f (z)

Lemma 1 has another form as follows. Lemma 2 (see [3]) Let f be a meromorphic function with a finite order σ, and η be a nonzero constant. Then m(r,

f (z + η) ) = S(r, f ). f (z)

Lemma 3 (see [10]) Let f be a transcendental meromorphic function and F = an f n + an−1 f n−1 + · · · + a0 (an 6≡ 0) be a polynomial in f with coefficients being small functions of f . Then either F = an (f +

an−1 n 1 ) or T (r, f ) ≤ N (r, ) + N (r, f ) + S(r, f ). nan F 4

946

Jie Zhang ET AL 943-951

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Lemma 4 (see[8]) Let f (z) be a transcendental meromorphic solution of finite order σ of a difference equation of the form H(z, f )P (z, f ) = Q(z, f ), where H(z, f ), P (z, f ), Q(z, f ) are difference polynomials in f (z) such that the total degree of H(z, f ) in f (z) and its shifts is n and that the corresponding total degree of Q(z, f ) is at most n. If H(z, f ) just contains one term of maximal total degree, then for any ε > 0, m(r, P (z, f )) = O(rσ−1+ε ) + S(r, f ) holds possibly outside of an exceptional set of finite logarithmic measure.  Remark 1 From Lemmas 1-2, we can obtain m r, P (z, f ) = S(r, f ) in Lemma 4.

3

The proofs of main theorems

1. Proof of theorem 3. First of all, suppose equation (1) admits a transcendental entire solution f with finite order. We may assume q(z) is not any constant. Otherwise if q(z) is a constant, then we rewrite equation (1) as the following form f 2 = req − p∆f. By Lemma 2, we see 2T (r, f ) = m(r, f 2 ) = m(r, ∆f ) + S(r, f ) ≤ m(r, f ) + S(r, f ), which is impossible. By differentiating equation (1) and eliminating eq(z) , we obtain f [2f 0 − (

r0 r0 + q 0 )f ] + p∆f 0 + p0 ∆f − p( + q 0 )∆f = 0. r r

(4)

0

Set H = 2f 0 − Bf , where B = rr + q 0 . Since q(z) is not any constant, we see B is a nonzero rational function with deg∞ B ≥ 0, specially, lim B(z) is nonzero z→∞

constant or ∞. Thus we rewrite equation (4) as the following form. f H + p∆f 0 + (p0 − Bp)∆f = 0.

(5)

By applying Lemma 4 to equation (5), we see m(r, H) = S(r, f ), which means T (r, H) = S(r, f ). From the definition of H, we get f0 =

1 (H + Bf ). 2

(6)

5

947

Jie Zhang ET AL 943-951

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

It follows equation (6) that ∆f 0 =

1 [∆H + B(z + 1)∆f + ∆B · f ]. 2

(7)

From equation (5), we see 1 ∆f 0 = − [Hf + (p0 − pB)∆f ]. p

(8)

If pB(z + 1) + 2(p0 − pB) ≡ 0, then 1←

p0 1 B(z + 1) = 2(1 − ) → 2, as z → ∞, B pB

which is impossible. Thus we can assume pB(z + 1) + 2(p0 − pB) 6≡ 0. By eliminating ∆f 0 in equations (7)- (8), we get ∆f = a1 f + a0 ,

(9)

where a1 = −

2H + p∆B p∆H and a0 = − pB(z + 1) + 2(p0 − pB) pB(z + 1) + 2(p0 − pB)

are two small functions of f . Substituting equation (9) into equation (1), we get f 2 (z) + p(z)a1 (z)f + p(z)a0 (z) = r(z)eq(z) . That is to say f 2 (z) + p(z)a1 (z)f + p(z)a0 (z) has just only finitely many zeros. It follows from Lemma 3 that there exists a small function β with respect to f such that f 2 (z) + p(z)a1 (z)f + p(z)a0 (z) = (f + β)2 = r(z)eq(z) .

(10)

2

From equation (10), we get pa1 = 2β, pa0 = β and f = ReQ − β, √

(11)

q 2

where R = r and Q = are two nonzero polynomials. Thus from (11), we get β is an entire function and ∆f = [R(z + 1)e∆Q − R]eQ − ∆β.

(12)

Thus from (9), (11) and (12), we obtain 2βR Q β2 ]e = ∆β − . p p

[R(z + 1)e∆Q − R −

(13)

It is obvious that T (r, f ) = T (r, eQ ) + S(r, f ) from equation (11), which means β2 Q R(z + 1)e∆Q − R − 2βR p and ∆β − p are small functions of e . Therefore from equation (13), we see 6

948

Jie Zhang ET AL 943-951

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

∆β −

β2 2βR = R(z + 1)e∆Q − R − = 0. p p

(14)

Thus p∆β = β 2 , where β = ReQ −f is an entire function. If β is a transcendental entire function, then from Lemma 2, we see 2T (r, β) = m(r, β 2 ) = m(r, ∆β) + S(r, β) ≤ m(r, β) + S(r, β), which is impossible. If β is a polynomial, then 2 deg β = deg β 2 = deg(p∆β) = deg p + deg ∆β = deg p + deg β − 1, which implies deg β = deg p − 1 ≤ 0. Thus it follows from equation (14) that β ≡ 0 and R(z + 1)e∆Q = R. It means e∆Q is a constant, which leads to Q(z) = mz + n. Then em = e∆Q =

R → 1, as z → ∞. R(z + 1)

Therefore R(z) = R(z + 1), that is to say R is a constant. By pa1 = 2β, pa0 = β 2 , we see a1 = a0 = 0, which means ∆f = 0 from equation (9). Thus we have f = emz+n = cemz and then ∆f = c(em − 1)emz , which implies m = 2kπi, k ∈ Z. The proof of Theorem 3 is completed. 2. The Proof of Theorem 7. First of all, suppose equation (2) admits a transcendental entire solution f with finite order. We may assume q(z) is not any constant. Otherwise if q(z) is a constant, then we rewrite equation (2) as the form f n = req − p(∆f )m . By Lemma 2, we see nT (r, f ) = m(r, f n ) = mm(r, ∆f ) + S(r, f ) ≤ mm(r, f ) + S(r, f ), which is impossible when n > m. By differentiating equation (2) and eliminating eq(z) , we obtain f n−1 [nf 0 − Bf ] = (Bp − p0 )(∆f )m − mp(∆f )m−1 ∆f 0 ,

(15)

0

where B is defined as same as in Theorem 3. Set H = nf − Bf . If H ≡ 0, then f must be form of f (z) = cR(z)eQ(z) , √ where R = n r and Q =

q n

(16)

are two polynomials. From equation (16), we see ∆f = AeQ(z) ,

(17)

7

949

Jie Zhang ET AL 943-951

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

 where A = c R(z + 1)e∆Q − R . It is obvious that T (r, A) = S(r, eQ ). By our assumption ∆f 6≡ 0, we see A 6≡ 0. Substituting equations (16)-(17) into equation (2), we see (cn − 1)Rn = −pAm e(m−n)Q , which contradicts our assumption that q is a nonconstant polynomial. Thus H 6≡ 0. Next we shall consider the following two cases separately to our discussion. Case 1 n > m + 1. By applying Lemma 4 to equation (15), we see m(r, H) = S(r, f ) and m(r, Hf ) = S(r, f ), From the two equations above, we obtain T (r, f ) = m(r, f ) ≤ m(r, Hf ) + m(r,

1 ) ≤ S(r, f ) + m(r, H) = S(r, f ), H

which is impossible. Case 2 n=m+1. We rewrite equation (2) as the following form m q n q 1 p f e− n + e− m ∆f = 1. r r If m > 1, then 1 1 1 1 1 1 + = + ≤ + < 1. m n m m+1 2 3 q

q

From Theorem 4, we obtain that f e− n and e− m ∆f are two polynomials. Thus q

f = se n

(18)

and q

∆f = te m ,

(19)

where s, t are two nonzero polynomials. From equation (18), we see ∆f = s(z + 1)e

∆q n

 q − s en .

(20)

It follows from equations (19)-(20) that s(z + 1)e

∆q n

1

1

− s = te( m − n )q ,

which is impossible. Thus m = 1 and n = 2. The proof of Theorem 7 is completed.

8

950

Jie Zhang ET AL 943-951

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

References [1] Y. M. Chiang, S. J. Feng, On the Nevanlinna characteristic of f (z + η) and difference equations in the complex plane, Ramanujian J, 16 (2008), 105-129. [2] Y. M. Chiang, S. J. Feng, On the growth of logarithmic differences, difference quotients and logarithmic derivatives of meromorphic functions, Trans. Amer. Math. Soc, 361 (2009), 3767-3791. [3] R. G. Halburd and R. J. Korhonen Nevanlinna theory for the difference operator, Ann. Acad. Sci. Fenn. Math, 31(2) 2006, 463-478. [4] R. G. Halburd and R. J. Korhonen, Difference analogue of the lemma on the logarithmic derivative with applications to the difference equations, J. Math. Anal. Appl, 314 (2006), 477-487. [5] W. K. Hayman, Meromorphic Functions, Clarendon Press, Oxford, 1964. [6] J. Heittokangas, R. Korhonen, I. Laine, J. Rieppo, J. Zhang, Value sharing results for shifts of meromorphic functions, and sufficient conditions for periodicity, J. Math. Anal. Appl, 355 (2009), 352-363. [7] I. Laine, Nevanlinna theory and complex differential equations, Studies in Math, vol 15, de Gruyter, Berlin, 1993. [8] I. Laine, C. C. Yang, Clunie theorem for difference and q-difference polynomials, J. London Math. Soc, 76(3), 2007, 556-566. [9] K. Liu, I. Laine, A note on a value distribution of difference polynomials, Bull. Aust. Math. Soc, 81 (2010), 353-360. [10] G. Weissenborn, On the theorem of Tumura and Clunie, Bull. London Math. Soc, (18), 1986, 371-373. [11] C. C. Yang and H. X. Yi, Uniqueness theory of meromorphic functions, Science Press, Beijing, Second Printed in 2006. [12] L. Yang, Value Distribution Theory, Springer-Verlag & Science Press, Berlin, 1993. [13] C. C. Yang, A generalization of a theorem of P. Montel on entire functions, Proc. Amer. Math. Soc, (26), 1970, 332-334. [14] J. Zhang, Existence of entire solution of some certain type difference equation, Houston. J. Math, 39(2), 2013, 625-635.

9

951

Jie Zhang ET AL 943-951

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A FIXED POINT APPROACH TO THE STABILITY OF QUADRATIC (ρ1 , ρ2 )-FUNCTIONAL INEQUALITIES IN MATRIX BANACH SPACES AFSHAN BATOOL, TAYYAB KAMRAN, CHOONKIL PARK∗ , AND DONG YUN SHIN∗ Abstract. By using the fixed point method, we solve the Hyer-Ulam stability of the following quadratic (ρ1 , ρ2 )-functional inequalities kf (x + y) + f (x − y) − 2f (x) − 2f (y)k

      x+y x−y

+ 2f − f (x) − f (y) ≤ ρ1 2f 2 2

    x+y

+ ρ2 4f + f (x − y) − 2f (x) − 2f (y) , 2 where ρ1 and ρ2 are fixed nonzero complex numbers with

|ρ1 | 2

+ |ρ2 | < 1, and

kf (x + y) + f (x − y) − 2f (x) − 2f (y)k

      x+y x−y

≤ ρ1 2f + 2f − f (x) − f (y) 2 2 + kρ2 (2f (x + y) + 2f (x − y) − f (2x) − f (2y))k , where ρ1 and ρ2 are fixed nonzero complex numbers with

|ρ1 | 2

(0.1)

(0.2)

+ 2|ρ2 | < 1, in matrix Banach spaces.

1. Introduction and preliminaries The stability problem of functional equations originated from a question of Ulam [30] concerning the stability of group homomorphisms. The functional equation f (x+y) = f (x)+f (y) is called the Cauchy equation. In particular, every solution of the Cauchy equation is said to be an additive mapping. Hyers [12] gave a first affirmative partial answer to the question of Ulam for Banach spaces. Hyers’ Theorem was generalized by Aoki [2] for additive mappings and by Rassias [22] for linear mappings by considering an unbounded Cauchy difference. A generalization of the Rassias theorem was obtained by G˘avruta [11] by replacing the unbounded Cauchy difference by a general control function in the spirit of Rassias’ approach. The stability of quadratic functional equation was proved by Skof [29] for mappings f : E1 → E2 , where E1 is a normed space and E2 is a Banach space. Cholewa [8] noticed that the theorem of Skof is still true if the relevant domain E1 is replaced by an Abelian group. Park [17, 18] defined additive ρ-functional inequalities and proved the Hyers-Ulam stability of the additive ρ-functional inequalities in Banach spaces and non-Archimedean Banach spaces. The stability problems of various functional equations have been extensively investigated by a number of authors (see [1, 3, 7, 10, 16, 19, 20, 23, 24, 25, 26, 27, 28, 31, 32]). We recall a fundamental result in fixed point theory. Theorem 1.1. [4, 9] Let (X, d) be a complete generalized metric space and let J : X → X be a strictly contractive mapping with Lipschitz constant α < 1. Then for each given element x ∈ X, 2010 Mathematics Subject Classification. Primary 39B62, 47H10, 39B52, 46L07, 47L25. Key words and phrases. Hyers-Ulam stability; quadratic (ρ1 , ρ2 )-functional inequality; fixed point; matrix Banach space. ∗ Corresponding authors.

952

AFSHAN BATOOL ET AL 952-961

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A. BATOOL, T. KAMRAN, C. PARK, AND D. SHIN

either d(J n x, J n+1 x) = ∞ for all nonnegative integers n or there exists a positive integer n0 such that (1) d(J n x, J n+1 x) < ∞, ∀n ≥ n0 ; n (2) the sequence {J x} converges to a fixed point y ∗ of J; (3) y ∗ is the unique fixed point of J in the set Y = {y ∈ X | d(J n0 x, y) < ∞}; 1 (4) d(y, y ∗ ) ≤ 1−α d(y, Jy) for all y ∈ Y . In 1996, G. Isac and Th.M. Rassias [13] were the first to provide applications of stability theory of functional equations for the proof of new fixed point theorems with applications. By using fixed point methods, the stability problems of several functional equations have been extensively investigated by a number of authors (see [5, 6, 21]). We will use the following notations: Mn (X) is the set of all n × n-matrices in X; ej ∈ M1,n (C) is that j-th component is 1 and the other components are zero; Eij ∈ Mn (C) is that (i, j)-component is 1 and the other components are zero; Eij ⊗ x ∈ Mn (X) is that (i, j)-component is x and the other components are zero; For x ∈ Mn (X), y ∈ Mk (X), 

x⊕y =

x 0 0 y



.

Note that (X, {k · kn }) is a matrix normed space if and only if (Mn (X), k · kn ) is a normed space for each positive integer n and kAxBkk ≤ kAkkBkkxkn holds for A ∈ Mk,n (C), x = (xij ) ∈ Mn (X) and B ∈ Mn,k (C), and that (X, {k · kn }) is a matrix Banach space if and only if X is a Banach space and (X, {k · kn }) is a matrix normed space. A matrix Banach space (X, {k · kn } is called a matrix Banach algebra if X is an algebra. A matrix normed space (X, {k · kn }) is called an L∞ -matrix normed space if kx ⊕ ykn+k = max{kxkn , kykk } holds for all x ∈ Mn (X) and all y ∈ Mk (X). Let E, F be vector spaces. For a given mapping h : E → F and a given positive integer n, define hn : Mn (E) → Mn (F ) by hn ([xij ]) = [h(xij )] for all [xij ] ∈ Mn (E) (see [14]). Lemma 1.2. ([14]) Let (X, {k.kn }) be a matrix normed space. (1) kEkl ⊗ xkn = kxk for x ∈ X. P (2) kxkl k ≤ k[xij ]kn ≤ ni,j=1 kxij k for [xij ] ∈ Mn (X). (3) limn→∞ xn = x if and only if limn→∞ xnij = xij f or xn = [xnij ], x = [xij ] ∈ Mk (X). In Section 2, we solve the quadratic (ρ1 , ρ2 )-functional inequality (0.1) and prove the Hyers-Ulam stability of the quadratic (ρ1 , ρ2 )-functional inequality (0.1) in matrix Banach spaces by using the fixed point method. In Section 3, we solve the quadratic (ρ1 , ρ2 )-functional inequality (0.2) and prove the Hyers-Ulam stability of the quadratic (ρ1 , ρ2 )-functional inequality (0.2) in matrix Banach spaces by using the fixed point method. Throughout this paper, let X be a real or complex matrix normed space with norm k · kn and Y a complex matrix Banach space with norm k · kn .

953

AFSHAN BATOOL ET AL 952-961

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

QUADRATIC (ρ1 , ρ2 )-FUNCTIONAL INEQUALITY

2. Quadratic (ρ1 , ρ2 )-functional inequality (0.1) in matrix normed spaces Throughout this section, assume that ρ1 and ρ2 are fixed nonzero complex numbers with |ρ21 | + |ρ2 | < 1. In this section, we solve and investigate the quadratic (ρ1 , ρ2 )-functional inequality (0.1) in matrix Banach spaces. Lemma 2.1. If a mapping f : X → Y satisfies f (0) = 0 and kf (x + y) + f (x − y) − 2f (x) − 2f (y)k

     

x−y x+y

≤ ρ1 2f + 2f − f (x) − f (y)

2 2

   

x+y + + f (x − y) − 2f (x) − 2f (y)

ρ2 4f

2 for all x, y ∈ X, then f : X → Y is quadratic.

(2.1)

Proof. Letting y = x in (2.1), we get kf (2x) − 4f (x)k ≤ 0 and so f (2x) = 4f (x) for all x ∈ X. Thus   x 1 f = f (x) (2.2) 2 4 for all x ∈ X. It follows from (2.1) and (2.2) that

     

x+y x−y

kf (x + y) + f (x − y) − 2f (x) − 2f (y)k ≤ ρ1 2f + 2f − f (x) − f (y)

2 2

   

x+y + + f (x − y) − 2f (x) − 2f (y)

ρ2 4f

2

ρ1

=

2 (f (x + y) + f (x − y) − 2f (x) − 2f (y))

+ kρ2 (f (x + y) + f (x − y) − 2f (x) − 2f (y))k   |ρ1 | = + |ρ2 | kf (x + y) + f (x − y) − 2f (x) − 2f (y)k 2 for all x, y ∈ X. Since f is quadratic.

|ρ1 | 2

+ |ρ2 | < 1, f (x + y) + f (x − y) = 2f (x) + 2f (y) for all x, y ∈ X. Thus 

Using the fixed point method, we prove the Hyers-Ulam stability of the quadratic (ρ1 , ρ2 )functional inequality (0.1) in matrix Banach spaces. Theorem 2.2. Let ϕ : X 2 → [0, ∞) be a function such that there exists an L < 1 with x y ϕ , 2 2 





L ϕ (x, y) 4

(2.3)

for all x, y ∈ X. Let f : X → Y be a mapping satisfying f (0) = 0 and kfn ([xij + yij ]) + fn ([xij − yij ]) − 2fn ([xij ]) − 2fn ([yij ])kn (2.4)

     

[xij + yij ] [xij − yij ] ≤ + 2fn − fn ([xij ]) − fn ([yij ])

ρ1 2fn

2 2 n

    n X

[x + y ] ij ij

+ f ([x − y ]) − 2f ([x ]) − 2f ([y ]) + ϕ(xij , yij ) + ρ 4f ij ij ij n ij n ij n

2 2 n i,j=1

954

AFSHAN BATOOL ET AL 952-961

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A. BATOOL, T. KAMRAN, C. PARK, AND D. SHIN

for all x = [xij ], y = [yij ] ∈ Mn (X). Then there exists a unique quadratic mapping Q : X → Y such that n X L kfn ([xij ]) − Qn ([xij ])kn ≤ ϕ (xij , xij ) 4(1 − L) i,j=1 for all x = [xij ] ∈ Mn (X). Proof. Putting n = 1 in (2.4), we get kf (x + y) + f (x − y) − 2f (x) − 2f (y)k

     

x+y x−y

+ 2f − f (x) − f (y) ≤ ρ1 2f

2 2

   

x+y + + f (x − y) − 2f (x) − 2f (y)

ρ2 4f

+ ϕ(x, y) 2

(2.5)

for all x, y ∈ X. Letting y = x in (2.5), we get kf (2x) − 4f (x)k ≤ ϕ(x, x)

(2.6)

for all x ∈ X. Consider the set S := {h : X → Y, h(0) = 0} and introduce the generalized metric on S: d(g, h) = inf {µ ∈ R+ : kg(x) − h(x)k ≤ µϕ (x, x) , ∀x ∈ X} , where, as usual, inf φ = +∞. It is easy to show that (S, d) is complete (see [15]). Now we consider the linear mapping J : S → S such that   x Jg(x) := 4g 2 for all x ∈ X. Let g, h ∈ S be given such that d(g, h) = ε. Then kg(x) − h(x)k ≤ εϕ (x, x) for all x ∈ X. Hence

x x

≤ 4εϕ x , x ≤ 4ε L ϕ (x, x) = Lεϕ (x, x) − 4h 2 2 2 2 4 for all x ∈ X. So d(g, h) = ε implies that d(Jg, Jh) ≤ Lε. This means that  

 





kJg(x) − Jh(x)k =

4g

d(Jg, Jh) ≤ Ld(g, h) for all g, h ∈ S. It follows from (2.6) that

   

f (x) − 4f x ≤ ϕ x , x ≤ L ϕ(x, x)

2 2 2 4

for all x ∈ X. So d(f, Jf ) ≤ L4 . By Theorem 1.1, there exists a mapping Q : X → Y satisfying the following: (1) Q is a fixed point of J, i.e.,   x Q (x) = 4Q 2

955

(2.7)

AFSHAN BATOOL ET AL 952-961

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

QUADRATIC (ρ1 , ρ2 )-FUNCTIONAL INEQUALITY

for all x ∈ X. The mapping Q is a unique fixed point of J in the set M = {g ∈ S : d(f, g) < ∞}. This implies that Q is a unique mapping satisfying (2.7) such that there exists a µ ∈ (0, ∞) satisfying kf (x) − Q(x)k ≤ µϕ (x, x) for all x ∈ X; (2) d(J l f, Q) → 0 as l → ∞. This implies the equality lim 4n f

l→∞

for all x ∈ X; (3) d(f, Q) ≤

1 1−L d(f, Jf ),



x 2n



= Q(x)

which implies kf (x) − Q(x)k ≤

L ϕ (x, x) 4(1 − L)

(2.8)

for all x ∈ X. It follows from (2.3) and (2.5) that kQ(x + y) + Q(x − y) − 2Q(x) − 2Q(y)k

       

x−y x y x+y

+ f − 2f − 2f = lim 4m f

m→∞ 2m 2m 2m 2m

       

x+y x−y x y

≤ lim 4m |ρ1 | 2f + 2f − f − f

m→∞ 2m+1 2m+1 2m 2m

         

x+y x−y x y

+ lim 4m ϕ x , y + lim 4m |ρ2 | 4f + f − 2f − 2f

m→∞ 2m+1 2m 2m 2m m→∞ 2m 2m

     

x+y x−y = + 2Q − Q(x) − Q(y)

ρ1 2Q

2 2

   

x+y + + Q (x − y) − 2Q(x) − 2Q(y)

ρ2 4Q

2 for all x, y ∈ X. So kQ(x + y) + Q(x − y) − 2Q(x) − 2Q(y)k

     

x+y x−y

≤ ρ1 2Q + 2Q − Q(x) − Q(y)

2 2

   

x+y + + Q (x − y) − 2Q(x) − 2Q(y)

ρ2 4Q

2 for all x, y ∈ X. By Lemma 2.1, the mapping Q : X → Y is quadratic. It follows from Lemma 1.2 and (2.8) that kfn ([xij ]) − Qn ([xij ])kn ≤

n X

kf (xij ) − Q(xij )k ≤

i,j=1

for all x = [xij ] ∈ Mn (X).

n X

L ϕ (xij , xij ) 4(1 − L) i,j=1 

956

AFSHAN BATOOL ET AL 952-961

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A. BATOOL, T. KAMRAN, C. PARK, AND D. SHIN

Corollary 2.3. Let r > 2 and θ be nonnegative real numbers, and let f : X → Y be a mapping satisfying f (0) = 0 and kfn ([xij + yij ]) + fn ([xij − yij ]) − 2fn ([xij ]) − 2fn ([yij ])kn (2.9)

     

[xij + yij ] [xij − yij ] ≤ + 2fn − fn ([xij ]) − fn ([yij ])

ρ1 2fn

2 2 n

    n X

[xij + yij ]

4f ρ + + θ(kxij kr + kyij kr ) + f ([x − y ]) − 2f ([x ]) − 2f ([y ]) n n ij ij n ij n ij

2

2 n i,j=1 for all x = [xij ], y = [yij ] ∈ Mn (X). Then there exists a unique quadratic mapping Q : X → Y such that n X 2θ kfn ([xij ]) − Qn ([xij ])kn ≤ kxij kr r 2 − 4 i,j=1 for all x = [xij ] ∈ Mn (X). Proof. The proof follows from Theorem 2.2 by taking ϕ(x, y) = θ(kxkr + kykr ) for all x, y ∈ X. Choosing L = 22−r , we obtain the desired result.  Theorem 2.4. Let ϕ : X 2 → [0, ∞) be a function such that there exists an L < 1 with   x y ϕ (x, y) ≤ 4Lϕ , 2 2 for all x, y ∈ X. Let f : X → Y be a mapping satisfying f (0) = 0 and (2.3). Then there exists a unique quadratic mapping Q : X → Y such that kfn ([xij ]) − Qn ([xij ])kn ≤

n X

1 ϕ (xij , xij ) 4(1 − L) i,j=1

for all x = [xij ] ∈ Mn (X). Proof. Let (S, d) be the generalized metric space defined in the proof of Theorem 2.2. Now we consider the linear mapping J : S → S such that 1 Jg(x) := g (2x) 4 for all x ∈ X. It follows from (2.5) that



f (x) − 1 f (2x) ≤ 1 ϕ(x, x)

4 4 for all x ∈ X. The rest of the proof is similar to the proof of Theorem 2.2.



Corollary 2.5. Let r < 2 and θ be positive real numbers, and let f : X → Y be a mapping satisfying f (0) = 0 and (2.7). Then there exists a unique quadratic mapping Q : X → Y such that kfn ([xij ]) − Qn ([xij ])kn ≤

n X

2θ kxij kr r 4 − 2 i,j=1

for all x = [xij ] ∈ Mn (X). Proof. The proof follows from Theorem 2.4 by taking ϕ(x, y) = θ(kxkr + kykr ) for all x, y ∈ X. Choosing L = 2r−2 , we obtain the desired result. 

957

AFSHAN BATOOL ET AL 952-961

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

QUADRATIC (ρ1 , ρ2 )-FUNCTIONAL INEQUALITY

Remark 2.6. If ρ is a real number such that |ρ21 | + |ρ2 | < 1 and Y is a real matrix Banach algebra, then all the assertions in this section remain valid. 3. Quadratic (ρ1 , ρ2 )-functional inequality (0.2) in matrix normed spaces Throughout this section, assume that ρ1 and ρ2 are fixed nonzero complex numbers with |ρ21 | + 2|ρ2 | < 1. In this section, we solve and investigate the quadratic (ρ1 , ρ2 )-functional inequality (0.2) in matrix Banach spaces. Lemma 3.1. If a mapping f : X → Y satisfies f (0) = 0 and kf (x + y) + f (x − y) − 2f (x) − 2f (y)k

     

x+y x−y

+ 2f − f (x) − f (y) ≤ ρ1 2f

2 2 + kρ2 (2f (x + y) + 2f (x − y) − f (2x) − f (2y))k

(3.1)

for all x, y ∈ X, then f : X → Y is quadratic. Proof. Letting y = x in (3.1), we get kf (2x) − 4f (x)k ≤ 0 and so f (2x) = 4f (x) for all x ∈ X. Thus   x 1 f = f (x) (3.2) 2 4 for all x ∈ X. It follows from (3.1) and (3.2) that

     

x−y x+y

+ 2f − f (x) − f (y) kf (x + y) + f (x − y) − 2f (x) − 2f (y)k ≤ ρ1 2f

2 2 + kρ2 (2f (x + y) + 2f (x − y) − f (2x) − f (2y))k



ρ1

= (f (x + y) + f (x − y) − 2f (x) − 2f (y))

2 + k2ρ2 (f (x + y) + f (x − y) − 2f (x) − 2f (y))k   |ρ1 | = + 2|ρ2 | kf (x + y) + f (x − y) − 2f (x) − 2f (y)k 2 for all x, y ∈ X. Since

|ρ1 | 2

+ 2|ρ2 | < 1, f (x + y) + f (x − y) = 2f (x) + 2f (y) for all x, y ∈ X.



Using the fixed point method, we prove the Hyers-Ulam stability of the quadratic (ρ1 , ρ2 )functional inequality (0.2) in matrix Banach spaces. Theorem 3.2. Let ϕ : X 2 → [0, ∞) be a function such that there exists an L < 1 with L x y ϕ , ≤ ϕ (x, y) 2 2 4 for all x, y ∈ X. Let f : X → Y be a mapping satisfying f (0) = 0 and 



kfn ([xij + yij ]) + fn ([xij − yij ]) − 2fn ([xij ]) − 2fn ([yij ])kn

     

[xij + yij ] [xij − yij ]

≤ + 2f − f ([x ]) − f ([y ]) ρ 2f n n n ij n ij

1

2 2 n + kρ2 (2fn ([xij + yij ]) + 2fn ([xij − yij ]) − fn (2[xij ]) − fn (2[yij ]))kn +

(3.3)

n X

ϕ(xij , yij )

i,j=1

958

AFSHAN BATOOL ET AL 952-961

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A. BATOOL, T. KAMRAN, C. PARK, AND D. SHIN

for all x = [xij ], y = [yij ] ∈ Mn (X). Then there exists a unique quadratic mapping Q : X → Y such that kfn ([xij ]) − Qn ([xij ])kn ≤

n X

L ϕ (xij , xij ) 4(1 − L) i,j=1

for all x = [xij ] ∈ Mn (X). Proof. Putting n = 1 in (3.3), we get kf (x + y) + f (x − y) − 2f (x) − 2f (y)k

     

x−y x+y

+ 2f − f (x) − f (y) ρ 2f ≤

1 2 2 + kρ2 (2f (x + y) + 2f (x − y) − f (2x) − f (2y))k + ϕ(x, y)

(3.4)

for all x, y ∈ X. Letting y = x in (3.4), we get kf (2x) − 4f (x)k ≤ ϕ(x, x)

(3.5)

for all x ∈ X. Let (S, d) be the generalized metric space defined in the proof of Theorem 2.2. Now we consider the linear mapping J : S → S such that x 2

 

Jg(x) := 4g

for all x ∈ X. The rest of the proof is similar to the proof of Theorem 2.2.



Corollary 3.3. Let r > 2 and θ be nonnegative real numbers, and let f : X → Y be a mapping satisfying f (0) = 0 and kfn ([xij + yij ]) + fn ([xij − yij ]) − 2fn ([xij ]) − 2fn ([yij ])kn

     

[xij + yij ] [xij − yij ]

≤ ρ1 2fn + 2fn − fn ([xij ]) − fn ([yij ])

2 2 n + kρ2 (2fn ([xij + yij ]) + 2fn ([xij − yij ]) − fn (2[xij ]) − fn (2[yij ]))kn +

(3.6)

n X

θ(kxij kr + kyij kr )

i,j=1

for all x = [xij ], y = [yij ] ∈ Mn (X). Then there exists a unique quadratic mapping Q : X → Y such that kfn ([xij ]) − Qn ([xij ])kn ≤

n X i,j=1

2θ kxij krn −4

2r

for all x = [xij ] ∈ Mn (X). Proof. The proof follows from Theorem 3.2 by taking ϕ(x, y) = θ(kxkr + kykr ) for all x, y ∈ X. Choosing L = 22−r , we obtain the desired result.  Theorem 3.4. Let ϕ : X 2 → [0, ∞) be a function such that there exists an L < 1 with x y ϕ (x, y) ≤ 4Lϕ , 2 2 

959



AFSHAN BATOOL ET AL 952-961

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

QUADRATIC (ρ1 , ρ2 )-FUNCTIONAL INEQUALITY

for all x, y ∈ X. Let f : X → Y be a mapping satisfying f (0) = 0 and (3.3). Then there exists a unique quadratic mapping Q : X → Y such that kfn ([xij ]) − Qn ([xij ])kn ≤

n X

1 ϕ (xij , xij ) 4(1 − L) i,j=1

for all x = [xij ] ∈ Mn (X). Proof. Let (S, d) be the generalized metric space defined in the proof of Theorem 2.2. Now we consider the linear mapping J : S → S such that 1 Jg(x) := g (2x) 4 for all x ∈ X. It follows from (3.5) that



f (x) − 1 f (2x) ≤ 1 ϕ(x, x)

4 4 for all x ∈ X. The rest of the proof is similar to the proof of Theorem 2.2.



Corollary 3.5. Let r < 2 and θ be positive real numbers, and let f : X → Y be a mapping satisfying f (0) = 0 and (3.6). Then there exists a unique quadratic mapping Q : X → Y such that kfn ([xij ]) − Qn ([xij ])kn ≤

n X

2θ kxij krn r 4 − 2 i,j=1

for all x = [xij ] ∈ Mn (X). Proof. The proof follows from Theorem 3.4 by taking ϕ(x, y) = θ(kxkr + kykr ) for all x, y ∈ X. Choosing L = 2r−2 , we obtain the desired result.  Remark 3.6. If ρ is a real number such that all the assertions in this section remain valid.

|ρ1 | 2

+ 2|ρ2 | < 1 and Y is a real Banach space, then

References [1] M. Adam, On the stability of some quadratic functional equation, J. Nonlinear Sci. Appl. 4 (2011), 50–59. [2] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan 2 (1950), 64–66. [3] L. C˘ adariu, L. G˘ avruta, P. G˘ avruta, On the stability of an affine functional equation, J. Nonlinear Sci. Appl. 6 (2013), 60–67. [4] L. C˘ adariu, V. Radu, Fixed points and the stability of Jensen’s functional equation, J. Inequal. Pure Appl. Math. 4, no. 1, Art. ID 4 (2003). [5] L. C˘ adariu, V. Radu, On the stability of the Cauchy functional equation: a fixed point approach, Grazer Math. Ber. 346 (2004), 43–52. [6] L. C˘ adariu, V. Radu, Fixed point methods for the generalized stability of functional equations in a single variable, Fixed Point Theory Appl. 2008, Art. ID 749392 (2008). [7] A. Chahbi, N. Bounader, On the generalized stability of d’Alembert functional equation, J. Nonlinear Sci. Appl. 6 (2013), 198–204. [8] P. W. Cholewa, Remarks on the stability of functional equations, Aequationes Math. 27 (1984), 76–86. [9] J. Diaz, B. Margolis, A fixed point theorem of the alternative for contractions on a generalized complete metric space, Bull. Amer. Math. Soc. 74 (1968), 305–309. [10] G. Z. Eskandani, P. Gˇ avruta, Hyers-Ulam-Rassias stability of pexiderized Cauchy functional equation in 2Banach spaces, J. Nonlinear Sci. Appl. 5 (2012), 459–465. [11] P. Gˇ avruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings, J. Math. Anal. Appl. 184 (1994), 431–436. [12] D. H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. U.S.A. 27 (1941), 222–224.

960

AFSHAN BATOOL ET AL 952-961

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.5, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A. BATOOL, T. KAMRAN, C. PARK, AND D. SHIN

[13] G. Isac, Th. M. Rassias, Stability of ψ-additive mappings: Applications to nonlinear analysis, Int.. J. Math. Math. Sci. 19 (1996), 219–228. [14] J. Lee, D. Shin, C. Park, An AQCQ- functional equation in matrix normed spaces, Result. Math. 64 (2013), 305–318. [15] D. Mihet¸, V. Radu, On the stability of the additive Cauchy functional equation in random normed spaces, J. Math. Anal. Appl. 343 (2008), 567–572. [16] C. Park, Orthogonal stability of a cubic-quartic functional equation, J. Nonlinear Sci. Appl. 5 (2012), 28–36. [17] C. Park, Additive ρ-functional inequalities and equations, J. Math. Inequal. 9 (2015), 17–26. [18] C. Park, Additive ρ-functional inequalities in non-Archimedean normed spaces, J. Math. Inequal. 9 (2015), 397–407. [19] C. Park, K. Ghasemi, S. G. Ghaleh, S. Jang, Approximate n-Jordan ∗-homomorphisms in C ∗ -algebras, J. Comput. Anal. Appl. 15 (2013), 365–368. [20] C. Park, A. Najati, S. Jang, Fixed points and fuzzy stability of an additive-quadratic functional equation, J. Comput. Anal. Appl. 15 (2013), 452–462. [21] V. Radu, The fixed point alternative and the stability of functional equations, Fixed Point Theory 4 (2003), 91–96. [22] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 (1978), 297–300. [23] K. Ravi, E. Thandapani, B. V. Senthil Kumar, Solution and stability of a reciprocal type functional equation in several variables, J. Nonlinear Sci. Appl. 7 (2014), 18–27. [24] S. Schin, D. Ki, J. Chang, M. Kim, Random stability of quadratic functional equations: a fixed point approach, J. Nonlinear Sci. Appl. 4 (2011), 37–49. [25] S. Shagholi, M. Bavand Savadkouhi, M. Eshaghi Gordji, Nearly ternary cubic homomorphism in ternary Fr´echet algebras, J. Comput. Anal. Appl. 13 (2011), 1106–1114. [26] S. Shagholi, M. Eshaghi Gordji, M. Bavand Savadkouhi, Stability of ternary quadratic derivation on ternary Banach algebras, J. Comput. Anal. Appl. 13 (2011), 1097–1105. [27] D. Shin, C. Park, Sh. Farhadabadi, On the superstability of ternary Jordan C ∗ -homomorphisms, J. Comput. Anal. Appl. 16 (2014), 964–973. [28] D. Shin, C. Park, Sh. Farhadabadi, Stability and superstability of J ∗ -homomorphisms and J ∗ -derivations for a generalized Cauchy-Jensen equation, J. Comput. Anal. Appl. 17 (2014), 125–134. [29] F. Skof, Propriet locali e approssimazione di operatori, Rend. Sem. Mat. Fis. Milano 53 (1983), 113–129. [30] S. M. Ulam, A Collection of the Mathematical Problems, Interscience Publ. New York, 1960. [31] C. Zaharia, On the probabilistic stability of the monomial functional equation, J. Nonlinear Sci. Appl. 6 (2013), 51–59. [32] S. Zolfaghari, Approximation of mixed type functional equations in p-Banach spaces, J. Nonlinear Sci. Appl. 3 (2010), 110–122. Afshan Batool Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan E-mail address: [email protected] Tayyab Kamran Department of Mathematics, Quaid-i-Azam University, Islamabad, Pakistan E-mail address: [email protected] Choonkil Park Research Institute for Natural Sciences, Hanyang University, Seoul 04763, Republic of Korea E-mail address: [email protected] Dong Yun Shin Department of Mathematics, University of Seoul, Seoul 02504, Republic of Korea E-mail address: [email protected]

961

AFSHAN BATOOL ET AL 952-961

962

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO. 5, 2019

Stability of a within-host Chikungunya virus dynamics model with Latency, Ahmed. M. Elaiw, Taofeek O. Alade, and Saud M. Alsulami, …………………………………………………777 Quotient B-algebras induced by an int-soft normal subalgebra, Jeong Soon Han and Sun Shin Ahn,………………………………………………………………………………………… 791 Fixed point theorems for rational type contractions in partially ordered S-metric spaces, Mi Zhou, Xiao-lan Liu, A.H. Arsari, B. Damjanović, and Yeol Je Cho,……………………….803 On stochastic pantograph differential equations in the G-framework, Faiz Faizullah,……..819 On dual partial metric topology and a fixed point theorem, Muhammad Nazam, Choonkil Park, Muhammad Arshad, and Sungsik Yun,………………………………………………………832 The approximation on analytic functions of infinite order represented by Laplace-Stieltjes transforms convergent in the half plane, Xia Shen and Hong Yan Xu,………………………841 q-analogue of modified degenerate Changhee polynomials and numbers, Jongkyum Kwon and Jin-Woo Park,…………………………………………………………………………………855 Quadratic 𝜌𝜌-functional inequalities in Banach spaces, Choonkil Park, Yuntak Hyun, and Jung Rye Lee,……………………………………………………………………………………….863 On a subclass of p-valent analytic functions of complex order involving a linear operator, N. E. Cho and A. K. Sahoo,…………………………………………………………………………875 A generalization of some results for Appell polynomials to Sheffer polynomials, Taekyun Kim, Dae San Kim, Gwan-Woo Jang, and Lee-Chae Jang,…………………………………………889 New Two-step Viscosity Approximation Methods of Fixed Points for Set-valued Nonexpansive Mappings Associated with Contraction Mappings in CAT(0) Spaces, Ting-jian Xiong and Hengyou Lan,………………………………………………………………………………………899 Generalized Partial ToDD's Difference Equation in n-dimensional space, Tarek F. Ibrahim,910 Meromorphic Solutions of Some Types of Systems of Complex Differential-Difference Equations, Wang Yue Zhao Xiuheng Liang Jianying Wang Guocheng,……………………927

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO. 5, 2019 (continued)

A note on a certain kind of nonlinear difference Equations, Jie Zhang, Hai Yan Kang, and Liang Wen Liao,…………………………………………………………………………………943 A fixed point approach to the stability of quadratic (𝜌𝜌1 , 𝜌𝜌2 )-functional inequalities in matrix Banach spaces, Afshan Batool, Tayyab Kamran, Choonkil Park, and Dong Yun Shin,….952

Volume 26, Number 6 ISSN:1521-1398 PRINT,1572-9206 ONLINE

Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC

June 1st, 2019

Journal of Computational Analysis and Applications ISSNno.’s:1521-1398 PRINT,1572-9206 ONLINE SCOPE OF THE JOURNAL An international publication of Eudoxus Press, LLC (fifteen times annually) Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152-3240, U.S.A [email protected] http://www.msci.memphis.edu/~ganastss/jocaaa The main purpose of "J.Computational Analysis and Applications" is to publish high quality research articles from all subareas of Computational Mathematical Analysis and its many potential applications and connections to other areas of Mathematical Sciences. Any paper whose approach and proofs are computational,using methods from Mathematical Analysis in the broadest sense is suitable and welcome for consideration in our journal, except from Applied Numerical Analysis articles. Also plain word articles without formulas and proofs are excluded. The list of possibly connected mathematical areas with this publication includes, but is not restricted to: Applied Analysis, Applied Functional Analysis, Approximation Theory, Asymptotic Analysis, Difference Equations, Differential Equations, Partial Differential Equations, Fourier Analysis, Fractals, Fuzzy Sets, Harmonic Analysis, Inequalities, Integral Equations, Measure Theory, Moment Theory, Neural Networks, Numerical Functional Analysis, Potential Theory, Probability Theory, Real and Complex Analysis, Signal Analysis, Special Functions, Splines, Stochastic Analysis, Stochastic Processes, Summability, Tomography, Wavelets, any combination of the above, e.t.c. "J.Computational Analysis and Applications" is a peer-reviewed Journal. See the instructions for preparation and submission of articles to JoCAAA. Assistant to the Editor: Dr.Razvan Mezei,[email protected], Madison,WI,USA.

Journal of Computational Analysis and Applications(JoCAAA) is published by EUDOXUS PRESS,LLC,1424 Beaver Trail Drive,Cordova,TN38016,USA,[email protected] http://www.eudoxuspress.com. Annual Subscription Prices:For USA and Canada,Institutional:Print $800, Electronic OPEN ACCESS. Individual:Print $400. For any other part of the world add $160 more(handling and postages) to the above prices for Print. No credit card payments. Copyright©2019 by Eudoxus Press,LLC,all rights reserved.JoCAAA is printed in USA. JoCAAA is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH. It is strictly prohibited the reproduction and transmission of any part of JoCAAA and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes no responsibility for the content of published papers.

966

Editorial Board Associate Editors of Journal of Computational Analysis and Applications Francesco Altomare Dipartimento di Matematica Universita' di Bari Via E.Orabona, 4 70125 Bari, ITALY Tel+39-080-5442690 office +39-080-3944046 home +39-080-5963612 Fax [email protected] Approximation Theory, Functional Analysis, Semigroups and Partial Differential Equations, Positive Operators.

Fractional Differential Equations Nonlinear Analysis, Fractional Dynamics Carlo Bardaro Dipartimento di Matematica e Informatica Universita di Perugia Via Vanvitelli 1 06123 Perugia, ITALY TEL+390755853822 +390755855034 FAX+390755855024 E-mail [email protected] Web site: http://www.unipg.it/~bardaro/ Functional Analysis and Approximation Theory, Signal Analysis, Measure Theory, Real Analysis.

Ravi P. Agarwal Department of Mathematics Texas A&M University - Kingsville 700 University Blvd. Kingsville, TX 78363-8202 tel: 361-593-2600 [email protected] Differential Equations, Difference Equations, Inequalities

Martin Bohner Department of Mathematics and Statistics, Missouri S&T Rolla, MO 65409-0020, USA [email protected] web.mst.edu/~bohner Difference equations, differential equations, dynamic equations on time scale, applications in economics, finance, biology.

George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis, TN 38152,U.S.A Tel.901-678-3144 e-mail: [email protected] Approximation Theory, Real Analysis, Wavelets, Neural Networks, Probability, Inequalities.

Jerry L. Bona Department of Mathematics The University of Illinois at Chicago 851 S. Morgan St. CS 249 Chicago, IL 60601 e-mail:[email protected] Partial Differential Equations, Fluid Dynamics

J. Marshall Ash Department of Mathematics De Paul University 2219 North Kenmore Ave. Chicago, IL 60614-3504 773-325-4216 e-mail: [email protected] Real and Harmonic Analysis

Luis A. Caffarelli Department of Mathematics The University of Texas at Austin Austin, Texas 78712-1082 512-471-3160 e-mail: [email protected] Partial Differential Equations George Cybenko Thayer School of Engineering

Dumitru Baleanu Department of Mathematics and Computer Sciences, Cankaya University, Faculty of Art and Sciences, 06530 Balgat, Ankara, Turkey, [email protected]

967

Dartmouth College 8000 Cummings Hall, Hanover, NH 03755-8000 603-646-3843 (X 3546 Secr.) e-mail:[email protected] Approximation Theory and Neural Networks

011-49-203-379-3542 e-mail: [email protected] Approximation Theory, Computer Aided Geometric Design John R. Graef Department of Mathematics University of Tennessee at Chattanooga Chattanooga, TN 37304 USA [email protected] Ordinary and functional differential equations, difference equations, impulsive systems, differential inclusions, dynamic equations on time scales, control theory and their applications

Sever S. Dragomir School of Computer Science and Mathematics, Victoria University, PO Box 14428, Melbourne City, MC 8001, AUSTRALIA Tel. +61 3 9688 4437 Fax +61 3 9688 4050 [email protected] Inequalities, Functional Analysis, Numerical Analysis, Approximations, Information Theory, Stochastics.

Weimin Han Department of Mathematics University of Iowa Iowa City, IA 52242-1419 319-335-0770 e-mail: [email protected] Numerical analysis, Finite element method, Numerical PDE, Variational inequalities, Computational mechanics

Oktay Duman TOBB University of Economics and Technology, Department of Mathematics, TR06530, Ankara, Turkey, [email protected] Classical Approximation Theory, Summability Theory, Statistical Convergence and its Applications

Tian-Xiao He Department of Mathematics and Computer Science P.O. Box 2900, Illinois Wesleyan University Bloomington, IL 61702-2900, USA Tel (309)556-3089 Fax (309)556-3864 [email protected] Approximations, Wavelet, Integration Theory, Numerical Analysis, Analytic Combinatorics

Saber N. Elaydi Department Of Mathematics Trinity University 715 Stadium Dr. San Antonio, TX 78212-7200 210-736-8246 e-mail: [email protected] Ordinary Differential Equations, Difference Equations

Margareta Heilmann Faculty of Mathematics and Natural Sciences, University of Wuppertal Gaußstraße 20 D-42119 Wuppertal, Germany, [email protected] Approximation Theory (Positive Linear Operators)

J .A. Goldstein Department of Mathematical Sciences The University of Memphis Memphis, TN 38152 901-678-3130 [email protected] Partial Differential Equations, Semigroups of Operators

Xing-Biao Hu Institute of Computational Mathematics AMSS, Chinese Academy of Sciences Beijing, 100190, CHINA [email protected]

H. H. Gonska Department of Mathematics University of Duisburg Duisburg, D-47048 Germany

968

Computational Mathematics Ram N. Mohapatra Department of Mathematics University of Central Florida Orlando, FL 32816-1364 tel.407-823-5080 [email protected] Real and Complex Analysis, Approximation Th., Fourier Analysis, Fuzzy Sets and Systems

Jong Kyu Kim Department of Mathematics Kyungnam University Masan Kyungnam,631-701,Korea Tel 82-(55)-249-2211 Fax 82-(55)-243-8609 [email protected] Nonlinear Functional Analysis, Variational Inequalities, Nonlinear Ergodic Theory, ODE, PDE, Functional Equations.

Gaston M. N'Guerekata Department of Mathematics Morgan State University Baltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'[email protected] [email protected] Nonlinear Evolution Equations, Abstract Harmonic Analysis, Fractional Differential Equations, Almost Periodicity & Almost Automorphy

Robert Kozma Department of Mathematical Sciences The University of Memphis Memphis, TN 38152, USA [email protected] Neural Networks, Reproducing Kernel Hilbert Spaces, Neural Percolation Theory Mustafa Kulenovic Department of Mathematics University of Rhode Island Kingston, RI 02881,USA [email protected] Differential and Difference Equations

M.Zuhair Nashed Department Of Mathematics University of Central Florida PO Box 161364 Orlando, FL 32816-1364 e-mail: [email protected] Inverse and Ill-Posed problems, Numerical Functional Analysis, Integral Equations, Optimization, Signal Analysis

Irena Lasiecka Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

Mubenga N. Nkashama Department OF Mathematics University of Alabama at Birmingham Birmingham, AL 35294-1170 205-934-2154 e-mail: [email protected] Ordinary Differential Equations, Partial Differential Equations

Burkhard Lenze Fachbereich Informatik Fachhochschule Dortmund University of Applied Sciences Postfach 105018 D-44047 Dortmund, Germany e-mail: [email protected] Real Networks, Fourier Analysis, Approximation Theory

Vassilis Papanicolaou Department of Mathematics National Technical University of Athens Zografou campus, 157 80 Athens, Greece tel:: +30(210) 772 1722 Fax +30(210) 772 1775 [email protected] Partial Differential Equations, Probability

Hrushikesh N. Mhaskar Department Of Mathematics California State University Los Angeles, CA 90032 626-914-7002 e-mail: [email protected] Orthogonal Polynomials, Approximation Theory, Splines, Wavelets, Neural Networks

969

Choonkil Park Department of Mathematics Hanyang University Seoul 133-791 S. Korea, [email protected] Functional Equations

Anfithea - Paleon Faliron GR-175 64 Athens, Greece [email protected] Numerical Analysis H. M. Srivastava Department of Mathematics and Statistics University of Victoria Victoria, British Columbia V8W 3R4 Canada tel.250-472-5313; office,250-4776960 home, fax 250-721-8962 [email protected] Real and Complex Analysis, Fractional Calculus and Appl., Integral Equations and Transforms, Higher Transcendental Functions and Appl.,q-Series and q-Polynomials, Analytic Number Th.

Svetlozar (Zari) Rachev, Professor of Finance, College of Business, and Director of Quantitative Finance Program, Department of Applied Mathematics & Statistics Stonybrook University 312 Harriman Hall, Stony Brook, NY 11794-3775 tel: +1-631-632-1998, [email protected] Alexander G. Ramm Mathematics Department Kansas State University Manhattan, KS 66506-2602 e-mail: [email protected] Inverse and Ill-posed Problems, Scattering Theory, Operator Theory, Theoretical Numerical Analysis, Wave Propagation, Signal Processing and Tomography

I. P. Stavroulakis Department of Mathematics University of Ioannina 451-10 Ioannina, Greece [email protected] Differential Equations Phone +3-065-109-8283

Tomasz Rychlik Polish Academy of Sciences Instytut Matematyczny PAN 00-956 Warszawa, skr. poczt. 21 ul. Śniadeckich 8 Poland [email protected] Mathematical Statistics, Probabilistic Inequalities

Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock, Germany [email protected] Numerical Fourier Analysis, Fourier Analysis, Harmonic Analysis, Signal Analysis, Spectral Methods, Wavelets, Splines, Approximation Theory

Boris Shekhtman Department of Mathematics University of South Florida Tampa, FL 33620, USA Tel 813-974-9710 [email protected] Approximation Theory, Banach spaces, Classical Analysis

Roberto Triggiani Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

T. E. Simos Department of Computer Science and Technology Faculty of Sciences and Technology University of Peloponnese GR-221 00 Tripolis, Greece Postal Address: 26 Menelaou St.

Juan J. Trujillo University of La Laguna Departamento de Analisis Matematico C/Astr.Fco.Sanchez s/n 38271. LaLaguna. Tenerife. SPAIN Tel/Fax 34-922-318209 [email protected]

970

Fractional: Differential EquationsOperators-Fourier Transforms, Special functions, Approximations, and Applications

Ahmed I. Zayed Department of Mathematical Sciences DePaul University 2320 N. Kenmore Ave. Chicago, IL 60614-3250 773-325-7808 e-mail: [email protected] Shannon sampling theory, Harmonic analysis and wavelets, Special functions and orthogonal polynomials, Integral transforms

Ram Verma International Publications 1200 Dallas Drive #824 Denton, TX 76205, USA [email protected] Applied Nonlinear Analysis, Numerical Analysis, Variational Inequalities, Optimization Theory, Computational Mathematics, Operator Theory

Ding-Xuan Zhou Department Of Mathematics City University of Hong Kong 83 Tat Chee Avenue Kowloon, Hong Kong 852-2788 9708,Fax:852-2788 8561 e-mail: [email protected] Approximation Theory, Spline functions, Wavelets

Xiang Ming Yu Department of Mathematical Sciences Southwest Missouri State University Springfield, MO 65804-0094 417-836-5931 [email protected] Classical Approximation Theory, Wavelets

Xin-long Zhou Fachbereich Mathematik, Fachgebiet Informatik Gerhard-Mercator-Universitat Duisburg Lotharstr.65, D-47048 Duisburg, Germany e-mail:[email protected] Fourier Analysis, Computer-Aided Geometric Design, Computational Complexity, Multivariate Approximation Theory, Approximation and Interpolation Theory

Xiao-Jun Yang State Key Laboratory for Geomechanics and Deep Underground Engineering, China University of Mining and Technology, Xuzhou 221116, China Local Fractional Calculus and Applications, Fractional Calculus and Applications, General Fractional Calculus and Applications, Variable-order Calculus and Applications, Viscoelasticity and Computational methods for Mathematical [email protected]

Jessada Tariboon Department of Mathematics, King Mongkut's University of Technology N. Bangkok 1518 Pracharat 1 Rd., Wongsawang, Bangsue, Bangkok, Thailand 10800 [email protected], Time scales, Differential/Difference Equations, Fractional Differential Equations

Richard A. Zalik Department of Mathematics Auburn University Auburn University, AL 36849-5310 USA. Tel 334-844-6557 office 678-642-8703 home Fax 334-844-6555 [email protected] Approximation Theory, Chebychev Systems, Wavelet Theory

971

Instructions to Contributors Journal of Computational Analysis and Applications An international publication of Eudoxus Press, LLC, of TN.

Editor in Chief: George Anastassiou Department of Mathematical Sciences University of Memphis Memphis, TN 38152-3240, U.S.A.

1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves.

2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.

972

4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corollaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,

973

name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990).

Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986.

Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495.

11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears.

15. This journal will consider for publication only papers that contain proofs for their listed results.

974

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Some identities involving generalized degenerate tangent polynomials arising from differential equations C. S. Ryoo Department of Mathematics, Hannam University, Daejeon 306-791, Korea

Abstract : In this paper, we study differential equations arising from the generating functions of generalized degenerate tangent polynomials. We give explicit identities for the generalized degenerate tangent polynomials arising from differential equations. Key words : Differential equations, tangent numbers, higher-order tangent numbers, degenerate tangent polynomials, generalized degenerate tangent polynomials. 2000 Mathematics Subject Classification : 05A19, 11B83, 34A30, 65L99. 1. Introduction Recently, many mathematicians have studied in the area of the degenerate Euler numbers, degenerate Bernoulli numbers, degenerate Genocchi numbers, and degenerate tangent numbers(see [1, 2, 3, 5, 6, 7, 8, 9, 10, 11]). We first give the definitions of the tangent numbers and polynomials. It should be mentioned that the definition of tangent numbers Tn and polynomials Tn (x) can be found in [5, 6]. The tangent numbers Tn and polynomials Tn (x) are defined by means of the generating functions: ∞ ∑ 2 tn = , T n e2t + 1 n=0 n!

(

2 e2t + 1

) ext =

∞ ∑

Tn (x)

n=0

tn . n!

(1.1)

Generalized tangent polynomials Tn (x)(n ≥ 0), were introduced by Ryoo. The generalized tangent polynomials Tn (x) are defined by the generating function: ( )x ∑ ∞ 2 tn = . T (x) n e2t + 1 n! n=0

(1.2)

Degenerate tangent numbers Tn,λ and polynomials, Tn,λ (x)(n ≥ 0), were introduced by Ryoo(see [8]). The degenerate tangent numbers Tn,λ are defined by the generating function: ∞ ∑ tn 2 = Tn,λ . 2/λ n! (1 + λt) + 1 n=0

(1.3)

The generalized degenerate tangent polynomials Tn,λ (x) are defined by means of the following generating function )x ∑ ( ∞ tn 2 = Tn,λ (x) . (1.4) 2/λ n! (1 + λt) +1 n=0 We recall that the classical Stirling numbers of the first kind S1 (n, k) and S2 (n, k) are defined by the relations(see [11]) (x)n =

n ∑

S1 (n, k)xk and xn =

k=0

n ∑

S2 (n, k)(x)k ,

k=0

975

Ryoo 975-984

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

respectively. Here (x)n = x(x − 1) · · · (x − n + 1) denotes the falling factorial polynomial of order n. The symbol < x >n is used for the rising factorial: < x >n = x(x + 1) · · · (x + n − 1). The generalized falling factorial (x|λ)n with increment λ is defined by (x|λ)n =

n−1 ∏

(x − λk)

(1.5)

k=0 (N )

for positive integer n, with the convention (x|λ)0 = 1. The generalized rising factorial < x|λ >n is defined by n−1 ∏ ) < x|λ >(N = (x + (N − k)λ) (1.6) n k=0 (N )

for positive integer n, with the convention < x|λ >0 = 1. We also need the binomial theorem: for a variable x, ∞ ∑ tn (1 + λt)x/λ = (x|λ)n . (1.7) n! n=0 Many mathematicians have studied in the area of the linear and nonlinear differential equations arising from the generating functions of special polynomials in order to give explicit identities for special polynomials(see [3, 7, 9]). In this paper, we study differential equations arising from the generating functions of generalized degenerate tangent polynomials. We give explicit identities for the generalized degenerate tangent polynomials. 2. Differential equations associated with generalized degenerate tangent polynomials In this section, we study differential equations arising from the generating functions of generalized degenerate tangent polynomials. Let ( )x 2 F = F (t, x, λ) = . (2.1) (1 + λt)2/λ + 1 Then, by (2.1), we have F

and F (2) =

(1)

( )x ∂ ∂ 2 = F (t, x, λ) = ∂t ∂t (1 + λt)2/λ + 1 ( )x−1 ( ) x 2 −4(1 + λt)2/λ = 1 + λt (1 + λt)2/λ + 1 (1 + λt)2/λ + 1 xF (t, x + 1, λ) − 2xF (t, x, λ) = 1 + λt

(2.2)

) ∂ (1) ( (1) F = xF (t, x + 1, λ) − 2xF (1) (t, x, λ) (1 + λt)−1 ∂t − λ (xF (t, x + 1, λ) − 2xF (t, x, λ)) (1 + λt)−2 =

x(x + 1)F (t, x + 2, λ) (4x2 + 2x + λx)F (t, x, λ) − (1 + λt)2 (1 + λt)2 2 (4x + 2xλ)F (t, x, i) + , (1 + λt)2

(2.3)

Continuing this process, we can guess that ( )N ∂ (N ) F = F (t, x, λ) ∂t =

N ∑

(2.4) −N

ai (N, x, λ)F (t, x + i, λ)(1 + λt)

,

(N = 0, 1, 2, . . .).

i=0

976

Ryoo 975-984

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Taking the derivative with respect to t in (2.4), we have ( )N +1 ∂ (N +1) F = F (t, x, λ) ∂t =

N ∑

ai (N, x, λ)(−N λ)F (t, x + i, λ)(1 + λt)−N −1

i=0

+

N ∑

ai (N, x, λ)F (1) (t, x + i, λ)(1 + λt)−N

i=0

=

N ∑

ai (N, x, λ)(−N λ)(t, x + i, λ)(1 + λt)−N −1

(2.5)

i=0

+

N ∑

ai (N, x, λ) [(x + i)F (t, x + i + 1, λ) − 2(x + i)F (t, x + i, λ)] (1 + λt)−N

i=0 N ∑ = (−2x − 2i − N λ)ai (N, x, λ)F (t, x + i, λ)(1 + λt)−N −1 i=0

+

N +1 ∑

(x + i − 1)ai−1 (N, x, λ)F (t, x + i, λ)(1 + λt)−N −1 .

i=1

On the other hand, by replacing N by N + 1 in (2.4), we get F

(N +1)

=

N +1 ∑

ai (N + 1, x, λ)F (t, x + i, λ)(1 + λt)−N −1 .

(2.6)

i=0

By (2.5) and (2.6), we have N ∑ (−2x − 2i − N λ)ai (N, x, λ)F (t, x + i, λ)(1 + λt)−N −1 i=0

+

N +1 ∑

(x + i − 1)ai−1 (N, x, λ)F (t, x + i, λ)(1 + λt)−N −1

(2.7)

i=1

=

N +1 ∑

ai (N + 1, x, λ)F (t, x + i, λ)(1 + λt)−N −1 .

i=0

Comparing the coefficients on both sides of (2.7), we obtain a0 (N + 1, x, λ) = −(2x + N λ)a0 (N, x, λ),

(2.8)

aN +1 (N + 1, x, λ) = (x + N )aN (N, x, λ), and ai (N + 1, x, λ) = (−1)(2x + 2i + N λ)ai (N, x, λ) + (x + i − 1)ai−1 (N, x, λ),

(2.9)

(1 ≤ i ≤ N ).

In addition, by (2.2) and (2.4), we get F = F (0) = a0 (0, x, λ)F (t, x, λ) = F (t, x, λ).

(2.10)

a0 (0, x, λ) = 1.

(2.11)

Thus, by (2.10), we obtain It is not difficult to show that xF (t, x + 1, λ)(1 + λt) =

1 ∑

−1

− 2xF (t, x, λ)(1 + λt)

−1

−1

(2.12)

ai (1, x, λ)F (t, x + i, λ)(1 + λt)

i=0

= a0 (1, x, λ)F (t, x, λ)(1 + λt)

−1

+ a1 (1, x, λ)F (t, x + 1, λ)(1 + λt)

977

−1

.

Ryoo 975-984

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Thus, by (2.12), we also get a0 (1, x, λ) = −2x,

a1 (1, x, λ) = x.

(2.13)

From (2.8), we note that (N )

a0 (N + 1, x, λ) = −(2x + N λ)a0 (N, x, λ) = · · · = (−1)N +1 < 2x|λ >N +1 , and aN +1 (N + 1, x, λ) = (x + N )aN (N, x, λ) = · · · = xa0 (0, x, λ) =< x >N +1 .

(2.14)

For i = 1, 2, 3 in (2.9), we get a1 (N + 1, α, x) = x

N ∑

(N )

(−1)k < 2x + 2|λ >k

a0 (N − k, x, λ),

k=0 N ∑

a2 (N + 1, x, λ) = (x + 1)

(N )

(−1)k < 2x + 4|λ >k

a1 (N − k, x, λ), and

k=0 N −2 ∑

a3 (N + 1, x, λ) = (x + 2)

(N )

(−1)k < 2x + 6|λ) >k

a2 (N − k, x, λ).

k=0

Continuing this process, we can deduce that, for 1 ≤ i ≤ N, ai (N + 1, x, λ) = (X + i − 1)

N∑ −i+1

(N )

(−1)k < 2x + 2i|λ) >k

ai−1 (N − k, x, λ).

(2.15)

k=0

Note that, here the matrix ai (j, x, λ)0≤i,j≤N +1 is given by 

1 −2x  0 < x > 1  0 0   0 0  . .. . . . 0 0

(2x)(2x + λ) · < x >2

−(2x)(2x + λ)(2x + 2λ) · ·

··· ··· ···

0 .. . 0

< x >3 .. . 0

··· .. .

(N )  (−1)N +1 < 2x|λ >N +1  ·    ·   ·   ..   .

···

< x >N +1

Now, we give explicit expressions for ai (N + 1, x, λ). By (2.14) and (2.15), we get a1 (N + 1, x, λ) = x

N ∑

(N )

(−1)k1 < 2x + 2|λ >k1 a0 (N − k1 , x, λ)

k1 =0

=x

N ∑

(N −k −1)

(N )

(−1)N < 2x + 2|λ >k1 < 2x|λ >N −k11

k1 =0

=< x >1

N ∑

(N −k −1)

(N )

(−1)N < 2x + 2|λ >k1 < 2x|λ >N −k11

,

k1 =0

a2 (N + 1, x, λ) = (x + 1)

N −1 ∑

(N )

(−1)k2 < 2x + 4|λ >k2 a1 (N − k2 , x, λ)

k2 =0

=< x >2

N −1 N −k 2 −1 ∑ ∑ k2 =0

(−1)N −1 < 2x + 4|λ >k2

(N )

k1 =0 (N −k2 −1)

× < 2x + 2|λ >k1

978

(N −k −k −2)

< 2x|λ >N −k22−k11−1 ,

Ryoo 975-984

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

and a3 (N + 1, x, λ) = (x + 2)

N −2 ∑

(N )

(−1)k3 < 2x + 6|λ >k3 a2 (N − k3 , x, λ)

k3 =0

=< x >3

N −2 N −k 3 −2 N −k∑ 3 −k2 −2 ∑ ∑

(−1)N −2 < 2x + 6|λ >k3

k3 =0

k2 =0

× < 2x + 4|λ

(N )

k1 =0 (N −k −1) >k2 3
k1

(N −k −k −k −3)

< 2x|λ >N −k33−k22−k11−2 .

Continuing this process, we obtain ai (N + 1, x, λ) =< x >i

N∑ −i+1 N −k i −i+1 ∑ ki =0

···

N −ki −···−k ∑ 2 −i+1

ki−1 =0

(−1)N −i+1 < 2x + 2i|λ >ki

(N )

(2.16)

k1 =0 (N −k −k

(N −ki −1)

× < 2x + 2(i − 1)|λ >ki−1

−···−k −k −i)

i−1 2 1 · · · < 2x|λ >N −ki i−ki−1 −···−k2 −k1 −i+1 .

Therefore, by (2.16), we obtain the following theorem. Theorem 1. For N = 0, 1, 2, . . . , the functional equation F (N ) =

N ∑

ai (N, x, λ)F (t, x + i, λ)(1 + λt)−N

i=0

(

has a solution F = F (t, x, λ) =

2 (1 + λt)2/λ + 1

)x ,

where (N −1)

a0 (N, x, λ) = (−1)N < 2x|λ >N

,

aN (N, x, λ) =< x >N , ai (N, x, λ) = (−1)i < α >i (ζq h )i

N −i N −k ∑ ∑i −i

···

N −ki −···−k ∑ 2 −i

ki =0 ki−1 =0

× < 2x + 2(i − 1)|λ

(N −1)

(−1)N −i < 2x + 2i|λ >ki

k1 =0

(N −k −2) >ki−1 i

(N −k −k

−···−k −k −i−1)

i−1 2 1 · · · < 2x|λ >N −ki i−ki−1 −···−k2 −k1 −i

,

(1 ≤ i ≤ N − 1). Here is a plot of the surface for this solution. We choose λ = 1/10. The viewing windows is {(t, x) : −4 ≤ t ≤ 10, 0 ≤ x ≤ 15}. In Figure 1(left), we plot of the surface for this solution. In Figure 1(right), we shows a higher-resolution density plot of the solution. From (1.1), we note that ( F (N ) =

∂ ∂t

)N ∑ ∞



Tn,λ (x)

n=0

∑ tn tk = Tn+N,λ (x) . n! k!

(2.17)

k=0

From Theorem 1, (1.3), and (2.17), we can derive the following equation:

979

Ryoo 975-984

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14

12

10

8

6

4

2

0 -4

-2

0

2

4

6

8

10

Figure 1: The surface for the solution F (t, x, λ)

∞ ∑

∑ tn = F (N ) = ai (N, x, λ)F (t, x + i, λ)(1 + λt)−N n! n=0 i=0 ( )x+i N ∑ 2 −N = ai (N, x, λ)(1 + λt) (1 + λt)2/λ + 1 i=0 ( ) ( ) N ∞ n ( ) ∑ ∑ ∑ n tn l N +l−1 = ai (N, x, λ) (−λ) l!Tn−l,λ (x + i) n! l N −1 n=0 l=0 i=0 ) ( ) ∞ N ∑ n ( )( ∑ ∑ tn n N +l−1 = . (−λ)l l!ai (N, x, λ)Tn−l,λ (x + i) n! l N −1 n=0 i=0 N

Tn+N,λ (x)

(2.18)

l=0

By comparing the coefficients on both sides of (2.18), we obtain the following theorem. Theorem 2. For k = 0, 1, . . . , and N = 0, 1, 2, . . . , we have Tn+N,λ (x) =

) N ∑ n ( )( ∑ n N +l−1 (−λ)l l!ai (N, x, λ)Tn−l,λ (x + i), l N − 1 i=0

(2.19)

l=0

where (N −1)

a0 (N, x, λ) = (−1)N < 2x|λ >N

,

aN (N, x, λ) =< x >N , ai (N, x, λ) = (−1)i < α >i (ζq h )i

N −i N −k ∑ ∑i −i

···

N −ki −···−k ∑ 2 −i

ki =0 ki−1 =0

× < 2x + 2(i − 1)|λ

(N −1)

(−1)N −i < 2x + 2i|λ >ki

k1 =0

(N −k −2) >ki−1 i

(N −k −k

−···−k −k −i−1)

i−1 2 1 · · · < 2x|λ >N −ki i−ki−1 −···−k2 −k1 −i

,

(1 ≤ i ≤ N − 1). Let us take n = 0 in (2.19). Then, we have the following corollary. Corollary 3. For N = 0, 1, 2, . . . , we have TN,λ (x) =

N ∑

ai (N, x, λ)T0,λ (x + i).

i=0

980

Ryoo 975-984

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

3. Zeros of the generalized degenerate tangent polynomial This section aims to demonstrate the benefit of using numerical investigation to support theoretical prediction and to discover new interesting pattern of the zeros of the generalized degenerate tangent polynomial Tn,λ (x). By using computer, the generalized degenerate tangent polynomials Tn,λ (x) can be determined explicitly. The first few of them are T0,λ (x) = 1, T1,λ (x) = −x, T2,λ (x) = −x + λx + x2 , T3,λ (x) = 3λx − 2λ2 x + 3x2 − 3λx2 − x3 , T4,λ (x) = 2x − 11λ2 x + 6λ3 x + 3x2 − 18λx2 + 11λ2 x2 − 6x3 + 6λx3 + x4 , T5,λ (x) = −20λx + 50λ3 x − 24λ4 x − 10x2 − 30λx2 + 105λ2 x2 − 50λ3 x2 − 15x3 + 60λx3 − 35λ2 x3 + 10x4 − 10λx4 − x5 , T6,λ (x) = −16x + 170λ2 x − 274λ4 x + 120λ5 x − 30x2 + 150λx2 + 255λ2 x2 − 675λ3 x2 + 274λ4 x2 + 15x3 + 225λx3 − 510λ2 x3 + 225λ3 x3 + 45x4 − 150λx4 + 85λ2 x4 − 15x5 + 15λx5 + x6 . We investigate the beautiful zeros of the generalized degenerate tangent polynomials Tn,λ (x) by using a computer. We plot the zeros of the Tn,λ (x) for n = 20, λ = 15/10, 10/10, 5/10, 1/10, and x ∈ C(Figure 2). In Figure 2(top-left), we choose n = 20 and λ = 15/10. In Figure 2(top-right), we choose n = 20 and λ = 10/10. In Figure 2(bottom-left), we choose n = 20 and λ = 5/10. In Figure 2(bottom-right), we choose n = 20and λ = 1/10. Prove that Tn,λ (x), x ∈ C, has Im(x) = 0 reflection symmetry analytic complex functions(see Figure 2). Stacks of zeros of the generalized degenerate tangent polynomials Tn,λ (x) for 1 ≤ n ≤ 20, λ = 1/10 from a 3-D structure are presented(Figure 3). Our numerical results for approximate solutions of real zeros of the generalized degenerate tangent polynomials Tn,λ (x) = 0, λ = 15/10 are displayed(Tables 1, 2). Table 1. Numbers of real and complex zeros of Tn,λ (x) degree n

real zeros

complex zeros

1

1

0

2

2

0

3

3

0

4

4

0

5

3

2

6

4

2

7

3

4

8

4

4

9

3

6

10

4

6

11

3

8

12

4

8

13

3

10

14

4

10

981

Ryoo 975-984

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Im(x)

10

10

5

5

0

-5

-10 -20

0

Im(x)

-5

0

20

40

-10 -20

60

0

20

Re(x)

40

60

Re(x) 3

10

2

5 1

Im(x)

0

Im(x)

0

-1

-5 -2

-10 -20

-3

0

20

40

60

0

Re(x)

20

40

60

80

100

Re(x)

Figure 2: Zeros of Tn,λ (x)

Plot of real zeros of Tn,λ (x) for 1 ≤ n ≤ 20 structure are presented(Figure 4). We observe a remarkably regular structure of the complex roots of the generalized degenerate tangent polynomials Tn,λ (x). We hope to verify a remarkably regular structure of the complex roots of the generalized degenerate tangent polynomials Tn,λ (x) (Table 1). Next, we calculated an

982

Ryoo 975-984

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Figure 3: Stacks of zeros of Tn,λ (x), 1 ≤ n ≤ 20

Figure 4: Real zeros of Tn,λ (x) for 1 ≤ n ≤ 20 approximate solution satisfying Tn,λ (x) = 0, λ = 15/10, x ∈ R. The results are given in Table 2. Table 2. Approximate solutions of Tn,λ (x) = 0, x ∈ R degree n

x

1

0 −0.50000,

2 3 4 5 6 7 8 9

−1.5000, −2.0000,

−3.5000,

983

0.7247,

0

0

4.8524,

−6.0000,

0

0

2.6128,

3.6997,

−4.8845,

6.0575,

0

1.6113,

−3.3258,

−4.5000, −5.0001,

0,

−1.7247,

−3.0000,

0

0

0 Ryoo 975-984

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Finally, we shall consider the more general problems. How many zeros does Tn,λ (x) have? Tn,λ (x) = 0 has not n distinct solutions(see Table 2). Find the numbers of complex zeros CTn,λ (x) of Tn,λ (x), Im(x) ̸= 0. Since n is the degree of the polynomial Tn,λ (x), the number of real zeros RTn,λ (x) lying on the real line Im(x) = 0 is then RTn,λ (x) = n − CTn,λ (x) , where CTn,λ (x) denotes complex zeros. See Table 1 for tabulated values of RTn,λ (x) and CTn,λ (x) . The author has no doubt that investigations along this line will lead to a new approach employing numerical method in the research field of the generalized degenerate tangent polynomials Tn,λ (x) to appear in mathematics and physics. Acknowledgement: This work was supported by the National Research Foundation of Korea(NRF) grant funded by the Korea government(MEST) (No. 2017R1A2B4006092).

REFERENCES 1. G.E. Andrews, R. Askey, R. Roy, Special Functions, 71, Combridge Press, Cambridge, UK 1999. 2. N.S. Jung, C.S. Ryoo, A research on a new approach to Euler polynomials and Bernstein polynomials with variable [x]q , J. Appl. Math. & Informatics, 35 (2017), 205-215. 3. T. Kim, D.S. Kim, Identities involving degenerate Euler numbers and polynomials arising from non-linear differential equations, J. Nonlinear Sci. Appl., 9 (2016), 2086-2098. 4. A. M. Robert, A Course in p-adic Analysis, Graduate Text in Mathematics, Vol. 198, Springer, 2000. 5. H. Ozden, Y. Simsek, A new extension of q-Euler numbers and polynomials related to their interpolation functions, Appl. Math. Letters, 21 (2008), 934-938. 6. C.S. Ryoo, A numerical investigation on the zeros of the tangent polynomials, J. Appl. Math. & Informatics, 32 (2014), 315-322. 7. C.S. Ryoo, Differential equations associated with tangent numbers, J. Appl. Math. & Informatics, 34 (2016), 487-494. 8. C.S. Ryoo, On degenerate q-tangent polynomials of higher order, J. Appl. Math. & Informatics 35 (2017), 113-120. 9. C. S. Ryoo, R. P. Agarwal and J. Y. Kang, Differential equations arising from Bell-Carlitz polynomials and computation of their zeros, Neural Parallel Sci. Comput., 24 (2016), 453-462. 10. H. Shin, J. Zeng, The q-tangent and q-secant numbers via continued fractions, European J. Combin., 31 (2010), 1689-1705. 11. P. T. Young, Degenerate Bernoulli polynomials, generalized factorial sums, and their applications, Journal of Number Theorey., 128 (2008), 738-758.

984

Ryoo 975-984

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Some New Inequalities of the Hermite–Hadamard Type for Extended s-Convex Functions Jian Sun1 1

Bo-Yan Xi1,†

Feng Qi2,3

College of Mathematics, Inner Mongolia University for Nationalities, Tongliao, Inner Mongolia, 028043, China 2

Department of Mathematics, College of Science,

Tianjin Polytechnic University, Tianjin, 300387, China 3

Institute of Mathematics, Henan Polytechnic University, Jiaozuo, Henan, 454010, China



Corresponding author: [email protected], [email protected]

Abstract In the paper, the authors establish several new inequalities of the Hermite–Hadamard type for functions whose derivatives are extended s-convex in the absolute value and present some applications to special means of positive real numbers. 2010 Mathematics Subject Classification: Primary 26A51; Secondary 26D15, 26D20, 26E60, 41A55. Key words and phrases: integral inequality of the Hermite–Hadamard type; extended sconvex function; application; mean.

1

Introduction

The following definitions are well known in the literature. Definition 1.1. Let I be an interval in R = (−∞, ∞). Then a function f : I → R is said to be convex if f (tx + (1 − t)y) ≤ tf (x) + (1 − t)f (y) holds for all x, y ∈ I and t ∈ [0, 1]. It is famous that, for any convex function f defined on [a, b], the Hermite–Hadamard inequality   Z b a+b 1 f (a) + f (b) f ≤ f (x) d x ≤ 2 b−a a 2 holds true. Definition 1.2 ([3, 6]). Let s ∈ (0, 1] be a real number. A function f : R0 = [0, ∞) → R0 is said to be s-convex (in the second sense) if f (tx + (1 − t)y) ≤ ts f (x) + (1 − t)s f (y) holds for all x, y ∈ I and t ∈ [0, 1]. Definition 1.3 ([12]). A function f : R → R is said to be extended s-convex if f (tx + (1 − t)y) ≤ ts f (x) + (1 − t)s f (y) holds for all x, y ∈ I and t ∈ (0, 1) and for some fixed s ∈ [−1, 1].

985

Jian Sun ET AL 985-996

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

In recent decades, a lot of integral inequalities of the Hermite–Hadamard type for various kinds of convex functions have been established. Some of them can be recited as follows. Theorem 1.1 ([1, Theorem 6]). Let f : I ⊆ R → R be a differentiable function on I ◦ and a, b ∈ I ◦ with a < b such that f 0 ∈ L1 ([a, b]). If |f 0 |q is s-convex on [a, b] for s ∈ (0, 1], then Z b f (a) + rf (b) b−a 1 f (x) d x ≤ − r+1 b−a a (r + 1)(s + 1)(s + 2)      2 2rs+2 0 0 |f (a)| + r(s + 1) − 1 + |f (b)| . (1.1) × s−r+1+ (r + 1)s+1 (r + 1)s+1 Theorem 1.2 ([4, Theorem 3.1]). Let f : I ⊆ R0 → R be differentiable on I ◦ , a, b ∈ I with a < b, and f 0 ∈ L1 ([a, b]). If |f 0 | is s-convex on [a, b] for some s ∈ (0, 1], then Z f (λa+(1−λ)b)− 1 b−a

a

b

f (x) d x ≤

   b−a (1−λ)2 |f 0 (a)|+(s+1) f 0 (λa+(1−λ)b) (s + 1)(s + 2)   + λ2 |f 0 (b)| + (s + 1) f 0 (λa + (1 − λ)b) . (1.2)

Theorem 1.3 ([5, Theorem 2.2]). Let f : I ◦ ⊆ R → R be a differentiable mapping on I ◦ and a, b ∈ I ◦ with a < b. If |f 0 | is convex on [a, b], then Z b f (a) + f (b) (b − a)(|f 0 (a)| + |f 0 (b)|) 1 − f (x) d x ≤ . 2 b−a a 8 Theorem 1.4 ([7, Theorems 4]). Let f : I ⊆ R0 → R be differentiable on I ◦ , a, b ∈ I with a < b, and f 0 ∈ L1 ([a, b]). If |f 0 |q is s-convex on [a, b] for some fixed s ∈ (0, 1] and q > 1, then    1/q  1/p Z b a+b b−a 1 1 1 f f (x) d x ≤ − 2 b−a a 4 (s + 1)(s + 2) 2     q 1/q     0 a + b q 1/q a + b 0 q f + |f (b)| + (s + 1) , × |f 0 (a)|q + (s + 1) f 0 2 2 where

1 p

+

1 q

= 1.

Theorem 1.5 ([8, Theorems 1 and 3]). Let f : I ⊆ R0 → R be differentiable on I ◦ and a, b ∈ I with a < b. If |f 0 (x)|q is s-convex on [a, b] for some fixed s ∈ (0, 1] and q ≥ 1, then    1/q Z b f (a) + f (b) b − a 1 1−1/q  0 1/q 1 2 + 1/2s − . f (x) d x ≤ |f (a)|q + |f 0 (b)|q 2 b−a a 2 2 (s + 1)(s + 2) Theorem 1.6 ([9, Theorems 1 and 2]). Let f : I ⊆ R → R be differentiable on I ◦ and a, b ∈ I with a < b. If |f 0 |q is convex on [a, b] for q ≥ 1, then   Z b f (a) + f (b) b − a |f 0 (a)|q + |f 0 (b)|q 1/q 1 − f (x) d x ≤ 2 b−a a 4 2 and

    Z b a+b b − a |f 0 (a)|q + |f 0 (b)|q 1/q 1 f − f (x) d x ≤ . 2 b−a a 4 2

986

Jian Sun ET AL 985-996

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Theorem 1.7 ([12, Theorems 3.1(2) and 3.2]). Let 0 ≤ λ, µ ≤ 1 and f : I ⊆ R → R be a differentiable function on I ◦ , a, b ∈ I with a < b, and f 0 ∈ L1 [a, b] such that |f 0 (x)|q for q ≥ 1 is extended s-convex on [a, b] for some fixed s ∈ [−1, 1]. 1. If −1 < s ≤ 1, then    1/q Z b b−a λf (a) + µf (b) 2 − λ − µ a+b 1 1 ≤ f (x) d x + f − 2 2 2 b−a a 4 (s + 1)(s + 2)  1−1/q   1 × − λ + λ2 2(1 − λ)s+2 + (s + 2)λ − 1 |f 0 (a)|q + 2λs+2 + s + 1 2   q 1/q  1−1/q   1 a + b 2 + − (s + 2)λ f 0 − µ + µ 2µs+2 + s + 1 2 2  1/q   q  0  a + b s+2 q + 2(1 − µ) + (s + 2)µ − 1 |f (b)| ; (1.3) − (s + 2)µ f 0 2 2. If s = −1, we have   Z b a+b 1 f − f (x) d x 2 b−a a 1/q  0 1/q o b − a n ≤ 3−2/q (2 ln 2 − 1)|f 0 (a)|q + |f 0 (b)|q + |f (a)|q + (2 ln 2 − 1)|f 0 (b)|q . (1.4) 2 For recent generalizations of the Hermite–Hadamard type inequalities, please refer to [2, 10, 11, 13] and the references cited therein. The main aim of this paper is to establish new inequalities of the Hermite–Hadamard type for the class of functions whose derivatives to certain powers are extended s-convex functions.

2

Lemmas

In order to prove our main results, we need the following lemmas. Lemma 2.1. Let f : I ⊆ R → R be differentiable on I ◦ and a, b ∈ I with a < b. If f 0 ∈ L1 ([a, b]), λ, µ ∈ R, and ξ ∈ [0, 1], then Z b 1 λf (a) + µf (b) 2 − λ − µ + f (ξa + (1 − ξ)b) − f (x) d x 2 2 b−a a  Z 1 b−a = (1 − ξ) (2(1 − ξ)t − λ)f 0 (t(ξa + (1 − ξ)b) + (1 − t)a) d t 2 0  Z 1 0 +ξ (µ − 2ξt)f (t(ξa + (1 − ξ)b) + (1 − t)b) d t . 0

In particular, when ξ = 0, 1, 1 λf (a) + (1 − λ)f (b) − b−a

Z

b

Z f (x) d x = (b − a)

a

1

(t − λ)f 0 ((1 − t)a + tb) d t.

0

987

Jian Sun ET AL 985-996

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. Integrating by part and changing variables of integration yield  Z 1 b−a (1 − ξ) (2(1 − ξ)t − λ)f 0 (t(ξa + (1 − ξ)b) + (1 − t)a) d t 2 0  Z 1 0 (µ − 2ξt)f (t(ξa + (1 − ξ)b) + (1 − t)b) d t +ξ 0

 Z ξa+(1−ξ)b 1 2 = f (x) d x (2 − 2ξ − λ)f (ξa + (1 − ξ)b) + λf (a) − 2 b−a a  Z b 2 + (2ξ − µ)f (ξa + (1 − ξ)b) + µf (b) − f (x) d x b − a ξa+(1−ξ)b   Z b λf (a) + µf (b) 2 − λ − µ 1 = f (x) d x. + f ξa + (1 − ξ)b − 2 2 b−a a This completes the proof. Lemma 2.2. Let λ ∈ R and s > −1. Then  (s + 1) − (s + 2)λ   ,    (s + 1)(s + 2)  Z 1  s+2 2λ − (s + 2)λ + (s + 1) |λ − t|ts d t = ,  (s + 1)(s + 2) 0    (s + 2)λ − (s + 1)   ,  (s + 1)(s + 2) and Z 0

1

 (1 − λ)s+1 − (−λ)s+1 , 1  s+1 s |λ − t| d t = λ + (1 − λ)s+1 , s+1  s+1 λ − (λ − 1)s+1 ,

λ ≤ 0, 0 ≤ λ ≤ 1, λ≥1

λ ≤ 0, 0 ≤ λ ≤ 1, λ ≥ 1.

Proof. These follow from straightforward computation of definite integrals.

3

Main results

We are now in a position to establish some new integral inequalities of the Hermite–Hadamard type for differentiable and extended s-convex functions. Theorem 3.1. Let 0 ≤ λ, µ, ξ ≤ 1 and f : I ⊆ R → R be a differentiable function on I ◦ , a, b ∈ I with a < b, and f 0 ∈ L1 ([a, b]) such that |f 0 |q for q ≥ 1 is extended s-convex on [a, b] for some fixed s ∈ [−1, 1]. 1. If ξ ∈ (0, 1) and s ∈ (−1, 1], then Z b λf (a) + µf (b) 2 − λ − µ b − an 1 + f (ξa + (1 − ξ)b) − f (x) d x ≤ (1 − ξ) 2 2 b−a a 2  1/q × [E(1 − ξ, λ, 0)]1−1/q E(1 − ξ, 2 − 2ξ − λ, s)|f 0 (a)|q + E(1 − ξ, λ, s)|f 0 (ξa + (1 − ξ)b)|q  1/q o + ξ[E(ξ, µ, 0)]1−1/q E(ξ, µ, s)|f 0 (ξa + (1 − ξ)b)|q + E(ξ, 2ξ − µ, s)|f 0 (b)|q ; (3.1)

988

Jian Sun ET AL 985-996

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2. If ξ ∈ (0, 1) and s = −1, we have Z b  b−a  f (ξa + (1 − ξ)b) − 1 f (x) d x ≤ 1−1/q (1 − ξ)2−2/q (ξ − 1 − ln ξ)|f 0 (a)|q b−a a 2 1/q 2−2/q  0 1/q +ξ ξ|f (a)|q − (ξ + ln(1 − ξ))|f 0 (b)|q ; + (1 − ξ)|f 0 (b)|q

(3.2)

3. If ξ = 0, 1 and s 6= −1, we have  1/q Z b 1 ≤ b−a λf (a) + (1 − λ)f (b) − 1 f (x) d x (2λ2 − 2λ + 1)1−1/q 21−1/q (s + 1)(s + 2) b−a a 1/q    , (3.3) × 2(1 − λ)s+2 + (s + 2)λ − 1 |f 0 (a)|q + 2λs+2 − (s + 2)λ + s + 1 |f 0 (b)|q where Z E(ξ, λ, s) =

1

|2ξt − λ|ts d t.

0

Proof. For ξ ∈ (0, 1) and s ∈ (−1, 1], from Lemma 2.1, using H¨older’s integral inequality and extended s-convexity of |f 0 |q , we have Z b λf (a) + µf (b) 2 − λ − µ 1 + f (ξa + (1 − ξ)b) − f (x) d x 2 2 b−a a  Z 1 b−a ≤ (1 − ξ) |2(1 − ξ)t − λ||f 0 (t(ξa + (1 − ξ)b) + (1 − t)a)| d t 2 0  Z 1 +ξ |µ − 2ξt||f 0 (t(ξa + (1 − ξ)b) + (1 − t)b)| d t 0

 Z 1 1−1/q b−a (1 − ξ) ≤ |2(1 − ξ)t − λ| d t 2 0 Z 1 1/q 0 q × |2(1 − ξ)t − λ||f (t(ξa + (1 − ξ)b) + (1 − t)a)| d t

(3.4)

0

1−1/q Z

1

Z

|µ − 2ξt| d t

+ξ 0

1

|µ − 2ξt||f 0 (t(ξa + (1 − ξ)b) + (1 − t)b)|q d t

1/q 

0

 Z 1 1−1/q Z 1 b−a ≤ (1 − ξ) |2(1 − ξ)t − λ| d t |2(1 − ξ)t − λ| 2 0 0 1/q Z 1 1−1/q  s 0 q s 0 q × t |f (ξa + (1 − ξ)b)| + (1 − t) |f (a)| d t +ξ |µ − 2ξt| d t 0

Z ×

1

 |µ − 2ξt| ts |f 0 (ξa + (1 − ξ)b)|q + (1 − t)s |f 0 (b)|q d t

1/q  .

0

From Lemma 2.2, we have Z 1 |2ξt − µ| d t = E(ξ, µ, 0), 0

1

Z

|2ξt − µ|ts d t = E(ξ, µ, s),

(3.5)

0

989

Jian Sun ET AL 985-996

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

and 1

Z

|2ξt − µ|(1 − t)s d t = E(ξ, 2ξ − µ, s).

(3.6)

0

By virtue of (3.5) to (3.6) in (3.4), we obtain (3.1). For ξ ∈ (0, 1) and s = −1, since |f 0 |q is extended s-convex, by Lemma 2.1 and H¨older’s integral inequality, we have Z b ≤ (b − a)(1 − ξ)2 f (ξa + (1 − ξ)b) − 1 f (x) d x b−a a Z 1 Z 1 0 2 t|f 0 (tξa + (1 − tξ)b)| d t t|f ((tξ + 1 − t)a + (t − tξ)b)| d t + (b − a)ξ × 0

0

≤ (b − a)(1 − ξ)2

Z

1

1−1/q Z tdt

2

+ (b − a)ξ

1−1/q Z

1

1/q

1/q

1 0

q

t|f (tξa + (1 − tξ)b)| d t

tdt 0



t|f 0 ((tξ + 1 − t)a + (t − tξ)b)|q d t

0

0

Z

1

0

 Z 1 1/q  b−a −1 0 2 −1 0 q q (1 − ξ) t tξ + 1 − t) |f (a)| + t t − tξ) |f (b)| d t 21−1/q 0 Z 1 1/q   + ξ2 t tξ)−1 |f 0 (a)|q + t(1 − tξ)−1 |f 0 (b)|q d t . 0

We thus deduce the inequality (3.2). For ξ = 0, 1 and s 6= −1, by Lemma 2.1, H¨older’s integral inequality, and extended s-convexity of |f 0 |q , we have Z b Z 1 λf (a) + (1 − λ)f (b) − 1 ≤ (b − a) f (x) d x |t − λ||f 0 ((1 − t)a + tb)| d t b−a a 0 Z 1 1−1/q Z 1 1/q 0 q ≤ (b − a) |t − λ| d t |t − λ||f ((1 − t)a + tb)| d t 0

Z ≤ (b − a)

0

1−1/q Z

1

s

|t − λ| d t

0

1/q

1 0

q

s

0

q

|t − λ| (1 − t) |f (a)| + t |f (b)|



dt

.

0

We arrive at the inequality (3.3). Theorem 3.1 is proved. Corollary 3.1.1. When ξ ∈ (0, 1) and q = 1 in Theorem 3.1, 1. if −1 < s ≤ 1, we have Z b λf (a) + µf (b) 2 − λ − µ 1 + f (ξa + (1 − ξ)b) − f (x) d x 2 2 b−a a b − a ≤ (1 − ξ)E(1 − ξ, 2 − 2ξ − λ, s)|f 0 (a)| 2   + (1 − ξ)E(1 − ξ, λ, s) + ξE(ξ, µ, s) |f 0 (ξa + (1 − ξ)b)| + ξE(ξ, 2ξ − µ, s)|f 0 (b)| ;

990

Jian Sun ET AL 985-996

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2. if s = −1, we have Z b f (ξa + (1 − ξ)b) − 1 f (x) d x b−a a ≤ (b − a)[(2ξ − 1 − ln ξ)|f 0 (a)| + (1 − 2ξ − ln(1 − ξ))|f 0 (b)|]. Corollary 3.1.2. Under conditions of Theorem 3.1, 1. if −1 < s ≤ 1, then       Z b 1 b−a f (a) + 2f 2a + b + 2f a + 2b + f (b) − 1 f (x) d x ≤ 6 3 3 b−a a 18(s + 1)(s + 2)       0 a + 2b 0 2a + b 0 0 × (s + 5)|f (a)| + (4s + 5) f + (4s + 5) f + (s + 5)|f (b)| ; 3 3 2. if s = −1, then      Z b 1 b−a 1 f 2a + b + f a + 2b − f (x) d x ≤ (2 ln 3 − ln 2)(|f 0 (a)| + |f 0 (b)|). 2 3 3 b−a a 2 Proof. Since        Z b 1 1 1 f (a) + 2f 2a + b + 2f a + 2b + f (b) − 1 f (x) d x ≤ f (a) 6 3 3 b−a a 2 3       Z b Z b 1 1 2a + b 1 a + 2b 1 + 2f − + f (b) − f (x) d x + 2f f (x) d x 3 b−a a 2 3 3 b−a a ≤

0 a+2b 0 (b − a)[(s + 5)|f 0 (a)| + (4s + 5)|f 0 ( 2a+b 3 )| + (4s + 5)|f ( 3 )| + (s + 5)|f (b)|] 18(s + 1)(s + 2)

and        Z b Z b 1 1 2a + b 1 1 f 2a + b + f a + 2b − f (x) d x ≤ f − f (x) d x 2 3 3 b−a a 2 3 b−a a   Z b b−a 1 a + 2b 1 (2 ln 3 − ln 2)(|f 0 (a)| + |f 0 (b)|). + f − f (x) d x ≤ 2 3 b−a 2 a

Corollary 3.1.2 is thus proved. Remark 3.1. The inequality (1.2) can be deduced from (3.1) applied to λ = µ = 0, q = 1, and 0 < s ≤ 1. The inequalities (1.3) and (1.4) can be deduced from (3.1) and (3.3) applied to ξ = 2−1 . If we take q = 1 and λ = (r + 1)−1 for r ∈ [0, 1] in (3.3), then the inequality (3.3) becomes (1.1). These show that Theorem 3.1 and its corollaries generalize some main results in [1, 4, 12]. Theorem 3.2. Let s ∈ (−1, 1], λ, µ, ξ ∈ [0, 1], f : I ⊆ R → R be a differentiable function on I ◦ , a, b ∈ I with a < b, and f 0 ∈ L1 ([a, b]). When |f 0 |q for q > 1 is extended s-convex on [a, b],

991

Jian Sun ET AL 985-996

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1. if ξ ∈ (0, 1), then Z b λf (a) + µf (b) 2 − λ − µ 1 f (x) d x + f (ξa + (1 − ξ)b) − 2 2 b−a a    1−1/q 1/q  0 b−a q |f (a)|q + |f 0 (ξa + (1 − ξ)b)|q ≤ (1 − ξ) F 1 − ξ, λ, 1/q q−1 2(s + 1)   1−1/q   0  q q 0 q 1/q + ξ F ξ, µ, |f (b)| + |f (ξa + (1 − ξ)b)| ; (3.7) q−1 2. if ξ = 0, 1, then λf (a) + (1 − λ)f (b) −

1 b−a

Z

b

a

f (x) d x ≤

b−a (s + 1)1/q



q−1 2q − 1

1−1/q

 1−1/q 0 [|f (a)|q + |f 0 (b)|q ]1/q , (3.8) × λ(2q−1)/(q−1) + (1 − λ)(2q−1)/(q−1) where Z F (ξ, λ, s) =

1

|2ξt − λ|s d t.

0

Proof. For ξ ∈ (0, 1), by Lemma 2.1, H¨older’s integral inequality, and the extended s-convexity of |f 0 |q , we have Z b λf (a) + µf (b) 2 − λ − µ 1 + f (ξa + (1 − ξ)b) − f (x) d x 2 2 b−a a  Z 1 b−a ≤ (1 − ξ) |2(1 − ξ)t − λ||f 0 (t(ξa + (1 − ξ)b) + (1 − t)a)| d t 2 0  Z 1 +ξ |µ − 2ξt||f 0 (t(ξa + (1 − ξ)b) + (1 − t)b)| d t 0

 Z 1 1−1/q Z 1 1/q b−a (1 − ξ) |2t(1 − ξ) − λ|q/(q−1) d t |f 0 (t(ξa + (1 − ξ)b) + (1 − t)a)|q d t ≤ 2 0 0 Z 1 1−1/q Z 1 1/q  q/(q−1) 0 q +ξ |µ − 2ξt| dt |f (t(ξa + (1 − ξ)b) + (1 − t)b)| d t 0

0

 Z 1 1−1/q b−a (1 − ξ) |2t(1 − ξ) − λ|q/(q−1) d t ≤ 2 0 Z 1 1/q Z  × ts |f 0 (ξa + (1 − ξ)b)|q + (1 − t)s |f 0 (a)|q d t +ξ 0

Z ×

1

|µ − 2ξt|q/(q−1) d t

1−1/q

0 1

1/q   s 0 q s 0 q t |f (ξa + (1 − ξ)b)| + (1 − t) |f (b)| d t .

0

From Lemma 2.2, we derive the inequality (3.7). For ξ = 0, 1, since |f 0 |q is extended s-convex, from Lemma 2.1 and by H¨ older’s integral inequality, we have

992

Jian Sun ET AL 985-996

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Z 1 Z b ≤ (b − a) λf (a) + (1 − λ)f (b) − 1 |t − λ||f 0 ((1 − t)a + tb)| d t f (x) d x b−a a 0 Z 1 1−1/q Z 1 1/q q/(q−1) 0 q |t − λ| |f ((1 − t)a + tb)| d t ≤ (b − a) dt 0

0

1−1/q Z

1

Z ≤ (b − a)

q/(q−1)

|t − λ|

b−a (s + 1)1/q



q−1 2q − 1

0

q

s

0

q



dt

0

0

=

s

(1 − t) |f (a)| + t |f (b)|

dt

1/q

1

1−1/q

λ(2q−1)/(q−1) + (1 − λ)(2q−1)/(q−1)

1−1/q

(|f 0 (a)|q + |f 0 (b)|q )1/q .

Hence, we acquire the inequality (3.8). The proof of Theorem 3.2 is complete. Theorem 3.3. Let f : I ⊆ R → R be a differentiable function on I ◦ , a, b ∈ I with a < b, and f 0 ∈ L1 ([a, b]). Let 0 ≤ ξ ≤ 1 and 0 ≤ `, r ≤ 1. If |f 0 |q for q > 1 is extended s-convex on [a, b] for s ∈ (−1, 1], then   1−1/q Z b q−1 2 f (ξa + (1 − ξ)b) − 1 f (x) d x ≤ (b − a) (1 − ξ) b−a a (2 − l)q − 1  1−1/q   q−1 0 q −1 0 q 1/q 2 × B(`q + 1, s + 1)|f (a)| + (`q + s + 1) |f (ξa + (1 − ξ)b)| +ξ (2 − r)q − 1    −1 0 q 0 q 1/q × (rq + s + 1) |f (ξa + (1 − ξ)b)| + B(rq + 1, s + 1)|f (b)| , where Z B(α, β) =

1

tα−1 (1 − t)β−1 d t,

α, β > 0

0

is the noted beta function. Proof. Since |f 0 |q is extended s-convex, from Lemma 2.1, using H¨older’s integral inequality, we have Z b f (ξa + (1 − ξ)b) − 1 f (x) d x b−a a Z 1 1−1/q Z 2 (1−`)q/(q−1) ≤ (b − a)(1 − ξ) t dt 0

+ (b − a)ξ 2

Z

1

t(1−r)q/(q−1) d t

0

1

1/q t |f (t(ξa + (1 − ξ)b) + (1 − t)a)| d t `q

0

q

0

1−1/q Z

1

trq |f 0 (t(ξa + (1 − ξ)b) + (1 − t)b)|q d t

1/q

0

1−1/q Z 1 1/q  q−1 2 `q s 0 q s 0 q ≤ (b − a)(1 − ξ) t t |f (ξa + (1 − ξ)b)| + (1 − t) |f (a)| d t (2 − `)q − 1 0  1−1/q Z 1 1/q  q−1 2 rq s 0 q s 0 q + (b − a)ξ t t |f (ξa + (1 − ξ)b)| + (1 − t) |f (b)| d t . (2 − r)q − 1 0 

Theorem 3.3 is thus proved.

993

Jian Sun ET AL 985-996

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

Applications to means

In this final section, we apply some inequalities of the Hermite–Hadamard type for extended sconvex functions to construct some inequalities for means. For two positive numbers a, b > 0 and s ∈ [−1, 1], define A(a, b) = and

a+b , 2

Aξ (a, b) = ξa + (1 − ξ)b,

ξ ∈ [0, 1]

 1/s  bs+1 − as+1   , a 6= b, s 6= 0, −1;    (s + 1)(b − a)     b−a , a 6= b, s = −1; Ls (a, b) = lnb −  ln a 1/(b−a)  b  1 b   , a 6= b, s = 0;    e aa   a, a = b.

These means are respectively called the arithmetic, weighted arithmetic, and generalized logarithmic means of two positive number a and b. s+1 Let f (x) = xs+1 for x > 0, −1 < s ≤ 1, and q ≥ 1. If 0 ≤ sq ≤ 1, we have |f 0 (λx + (1 − λ)y)|q ≤ λsq xsq + (1 − λ)sq y sq ≤ λs |f 0 (x)|q + (1 − λ)s |f 0 (y)|q for x, y > 0 and λ ∈ (0, 1). If −1 < sq ≤ 0, we have |f 0 (λx + (1 − λ)y)|q ≤ (xsq )λ (y sq )1−λ ≤ λs |f 0 (x)|q + (1 − λ)s |f 0 (y)|q for x, y > 0 and λ ∈ (0, 1). These mean that, when −1 < sq ≤ 1, the function |f 0 (x)|q = xsq is extended s-convex on R+ = (0, ∞). Consequently, applying the inequality (3.3) to xsq yields Theorem 4.1. Let b > a > 0, q ≥ 1, −1 < s ≤ 1, −1 < sq ≤ 1, and 0 ≤ ξ ≤ 1. Then  1/q  1−1/q  1 Aξ as+1 , bs+1 − Ls+1 (a, b) ≤ b − a (s + 1)(2ξ 2 − 2ξ + 1) s+1 21−1/q s + 2    1/q × 2(1 − ξ)s+2 + (s + 2)ξ − 1 asq + 2ξ s+2 − (s + 2)ξ + s + 1 bsq . In particular, if ξ = 21 , then  A as+1 , bs+1 − Ls+1 (a, b) ≤ s+1

b−a



22+(s−2)/q

1 s+2

1/q

 1/q (s + 1)1−1/q (2s s + 1)A(asq , bsq ) .

s+1

Taking f (x) = xs+1 for x > 0, −1 < s ≤ 1 and q ≥ 1 in Corollary 3.1.2 derives the following inequalities for means. Theorem 4.2. Let b > a > 0 and −1 < s ≤ 1. Then  s+1  s+1   2a + b a + 2b s+1 A as+1 , bs+1 + 2A , − 3Ls+1 (a, b) 3 3   s  s  b−a 2a + b a + 2b s s ≤ (s + 5)A(a , b ) + (4s + 5)A , . 3(s + 2) 3 3

994

Jian Sun ET AL 985-996

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Applying the inequality (3.8) to xsq yields Theorem 4.3. Let b > a > 0, q > 1, −1 < s ≤ 1, −1 < sq ≤ 1, and 0 ≤ ξ ≤ 1. Then  1−1/q  Aξ as+1 , bs+1 − Ls+1 (a, b) ≤ 21/q (b − a) (s + 1)(q − 1) s+1 2q − 1  (2q−1)/(q−1) 1−1/q  1/q × ξ + (1 − ξ)(2q−1)/(q−1) A(asq , bsq ) . Furthermore, if ξ = 21 , we have 1−1/q   A as+1 , bs+1 − Ls+1 (a, b) ≤ (b − a) (s + 1)(q − 1) [A(asq , bsq )]1/q . s+1 2(2q − 1)

Acknowledgements This work was partially supported by the National Natural Science Foundation of China (Grant No. 11361038) and by the Foundation of the Research Program of Science and Technology at Universities of Inner Mongolia Autonomous Region (Grant No. NMDSS1729).

References [1] M. W. Alomari, S. S. Dragomir, and U. S. Kirmaci, Generalizations of the Hermite-Hadamard type inequalities for functions whose derivatives are s-convex, Acta Comment. Univ. Tartu. Math. 17 (2013), no. 2, 157–169; Available online at http://dx.doi.org/10.12697/ACUTM. 2013.17.14. [2] R.-F. Bai, F. Qi, and B.-Y. Xi, Hermite–Hadamard type inequalities for the m-and (α, m)logarithmically convex functions, Filomat 27 (2013), no. 1, 1–7; Available online at http: //dx.doi.org/10.2298/FIL1301001B. [3] W. W. Breckner, Stetigkeitsaussagen f¨ ur eine Klasse verallgemeinerter konvexer Funktionen in topologischen linearen R¨ aumen, Publ. Inst. Math. (Beograd) (N.S.) 23(37) (1978), 13–20. [4] F.-X. Chen and Y.-M. Feng, New inequalities of Hermite-Hadamard type for functions whose first derivatives absolute values are s-convex, Ital. J. Pure Appl. Math. 32 (2014), 213–222. [5] S. S. Dragomir and R. P. Agarwal, Two inequalities for differentiable mappings and applications to special means of real numbers and to trapezoidal formula, Appl. Math. Lett. 11 (1998), no. 5, 91–95; Available online at http://dx.doi.org/10.1016/S0893-9659(98)00086-X. [6] H. Hudzik and L. Maligranda, Some remarks on s-convex functions, Aequationes Math. 48 (1994), no. 1, 100–111; Available online at http://dx.doi.org/10.1007/BF01837981. [7] S. Hussain, M. I. Bhatti, and M. Iqbal, Hadamard-type inequalities for s-convex functions, I, Punjab Univ. J. Math. (Lahore) 41 (2009), 51–60. ¨ [8] U. S. Kirmaci, M. Klariˇci´c Bakula, M. E.Ozdemir, and J. Peˇcari´c, Hadamard-type inequalities for s-convex functions, Appl. Math. Comput. 193 (2007), no. 1, 26–35; Available online at http://dx.doi.org/10.1016/j.amc.2007.03.030.

995

Jian Sun ET AL 985-996

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[9] C. E. M. Pearce and J. Peˇcari´c, Inequalities for differentiable mappings with application to special means and quadrature formulae, Appl. Math. Lett. 13 (2000), no. 2, 51–55; Available online at http://dx.doi.org/10.1016/S0893-9659(99)00164-0. [10] F. Qi, Z.-L. Wei, and Q. Yang, Generalizations and refinements of Hermite–Hadamard’s inequality, Rocky Mountain J. Math. 35 (2005), no. 1, 235–251; Available online at http: //dx.doi.org/10.1216/rmjm/1181069779. [11] B.-Y. Xi, R.-F. Bai, and F. Qi, Hermite–Hadamard type inequalities for the m-and (α, m)geometrically convex functions, Aequationes Math. 84 (2012), no. 3, 261–269; Available online at http://dx.doi.org/10.1007/s00010-011-0114-x. [12] B.-Y. Xi and F. Qi, Inequalities of Hermite–Hadamard type for extended s-convex functions and applications to means, J. Nonlinear Convex Anal. 16 (2015), no. 5, 873–890. [13] B.-Y. Xi and F. Qi, Some Hermite–Hadamard type inequalities for differentiable convex functions and applications, Hacet. J. Math. Stat. 42 (2013), no. 3, 243–257.

996

Jian Sun ET AL 985-996

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On non-convex hybrid algorithm for a family of countable quasi-Lipschitz mappings in Hilbert spaces Muhammad Saeed Ahmad1 , Shin Min Kang2,3,∗ , Waqas Nazeer4 and Samina Kausar5

1

Department of Mathematics, Government Muhammadan Anglo Oriental College, Lahore 54000, Pakistan e-mail: [email protected] 2

Department of Mathematics and RINS, Gyeongsang National University, Jinju 52828, Korea e-mail: [email protected] 3

Center for General Education, China Medical University, Taichung 40402, Taiwan

4

Division of Science and Technology, University of Education, Lahore 54000, Pakistan e-mail: [email protected]

5

Division of Science and Technology, University of Education, Lahore 54000, Pakistan e-mail: [email protected] Abstract

We can find many convex iterative algorithms for common fixed points for a uniformly closed asymptotically family of countable quasi-Lipschitz mappings in the domains of Hilbert spaces and there are only few non-convex iterative algorithms. In this report, we present a new non-convex hybrid iteration algorithm concerning Suantai iterative scheme. We also establish strong convergence theorems of common fixed points for a uniformly closed asymptotically family of countable quasi-Lipschitz mappings in the domains of Hilbert spaces. 2010 Mathematics Subject Classification: 47H05, 47H09, 47H10 Key words and phrases: hybrid algorithm, nonexpansive mapping, quasi-Lipschitz mapping, quasi-nonexpansive mapping

1

Introduction

Fixed point theory of special mappings like nonexpansive, asymptotically nonexpansive, contractive and other mappings is an active area of interest and finds applications in many related fields like image recovery, signal processing and geometry of objects. From time to time, some versions of theorems relating to fixed points of functions of special nature keep on appearing in almost in all branches of mathematics. Consequently, we apply them in industry, toy making, finance, aircrafts and manufacturing of new model cars. For example, a fixed-point iteration scheme has been applied in intensity modulated radiation ∗

Corresponding author

997

Ahmad ET AL 997-1005

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

therapy optimization to pre-compute dose-deposition coefficient matrix, see [21]. Because of its vast range of applications almost in all directions, the research in it is moving rapidly and an immense literature is present currently. The construction of fixed point theorems (e.g., Banach fixed point theorem) which not only claim the existence of a fixed point but yield an algorithm, too (in the Banach case fixed point iteration xn+1 = f (xn )). Any equation that can be written as x = f (x) for some map f that is contracting with respect to some (complete) metric on X will provide such a fixed point iteration. Mann’s iteration method was the stepping stone in this regard and is invariably used in most of the occasions see [11]. But it only ensures weak convergence, see [3] but, we require strong convergence in many real world problems relating to Hilbert spaces, see [1]. So mathematician are in search for the modifications of the Mann’s process to control and ensure the strong convergence, (see [2, 5, 7–9, 14–19], and references therein). Most probably the first noticeable modification of Mann’s Iteration process was proposed by Nakajo and Takahashi [13] in 2003. They introduced this modification for only one nonexpansive mapping in a Hilbert space where as Kim and Xu [6] introduced a modification for asymptotically nonexpansive mapping in the Hilbert space in 2006. In the same year Martinez-Yanes and Xu [12] introduced a modification of the Ishikawa Iteration process for a nonexpansive mapping for a Hilbert space. They also gave modification of Halpern iteration method in Hilbert space. Su and Qin. [20] gave a monotone hybrid iteration process for nonexpansive mapping in a Hilbert space. Liu et al. [10] gave a novel iteration method for finite family of quasi-asymptotically pseudo-contractive mapping in a Hilbert space. Hence, we can find many iterative methods for finding fixed point of different type of mappings in literature. If we talk about the iterative algorithms for common fixed points of a uniformly closed asymptotically family of countable quasi-Lipschitz mappings in the domains of Hilbert spaces, Let H be the fixed notation for Hilbert space and C be nonempty, closed and convex subset of it. First we recall some basic definitions that will accompany us throughout this paper. Let Pc (·) be the metric projection onto C. A mapping T : C → C is said to be non-expensive if kT x − T yk ≤ kx − yk for all x, y ∈ C. And T : C → C is said to be quasi-Lipschitz if F ix(T ) 6= φ and For all p ∈ F ix(T ), kT x − pk ≤ Lkx − pk, where L is a constant 1 ≤ L < ∞. If L = 1, then T is known as quasi-nonexpansive. It is well-known that T is said to be closed if for n → ∞, xn → x and kT xn − xn k → 0 implies T x = x. T is said to be weak closed if xn * x and kT xn − xn k → 0 implies T x = x. as n → ∞. It is admitted fact that a mapping which is weak closed should be closed but converse is no longer true. Let {Tn } be a sequence of mappings having a non-empty fixed points set F . Then {Tn } is defined to be uniformly closed if for all convergent sequences {zn } ⊂ C with conditions kTnzn − zn k → 0, n → ∞ implies the limit of {zn } belongs to F. In 1953 [11], Mann proposed an iterative scheme given as: xn+1 = (1 − αn )xn n + αn T (xn ),

n = 0, 1, 2, . . . .

Guan et al. in [4] established the following non-convex hybrid iteration algorithm corresponding to Mann iterative scheme:    x0 ∈ C = Q0 , choosen arbitrarily,    yn = (1 − αn )xn + αn Tn xn , n ≥ 0, Cn = {z ∈ C : kyn − zk ≤ (1 + (Ln − 1)αn )kxn − zk ∩ A, n ≥ 0,    Qn = {z ∈ Qn−1 : hxn − z, x0 − xn i ≥ 0}, n ≥ 1,    x n+1 = PcoCn ∩Qn x0 .

998

Ahmad ET AL 997-1005

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

In [4] Guan et al. established non-convex hybrid iteration algorithm and proved some strong convergence results relating to common fixed points for a uniformly closed asymptotic family of countable quasi-Lipschitz mappings in H. They applied their results for the finite case to obtain fixed points. In this article, we establish a non-convex hybrid algorithms corresponding to Karakaya iteration scheme. Then we also establish strong convergence theorems with proofs about common fixed points related to a uniformly closed asymptotically family of countable quasi-Lipschitz mappings in the realm of Hilbert spaces. An application of this algorithm is also given. We fix coCn for closed convex closure of Cn for all n ≥ 1, A = {z ∈ H : kz − PF x0 k ≤ 1}, Tn for countable quasi-Ln -Lipschitz mappings from C into itself, and T be closed quasi-nonexpansive mapping from C into itself to avoid redundancy. We also present an application of our algorithm.

2

Main results

In this part we formulate our main results. We start with some basic definitions. Definition 2.1. Let {Tn } be a family of countable quasi-Ln -Lipschitz mappings from C into itself, where C is a closed convex subset of a Hilbert space H. Then {Tn } is said to be asymptotic if limn→∞ Ln = 1. Proposition 2.2. Let C be a closed convex subset of a Hilbert space H. Then for x ∈ H and z ∈ C, z = PC x if and only if we have hx − z, z − yi ≥ 0 for all y ∈ C. Proposition 2.3. Let {Tn} be a family of countable quasi-Ln -Lipschitz mappings from C into itself, where C is a closed convex subset of a Hilbert space H. Then the common fixed point set F is closed and convex. Proposition 2.4. Let C be a closed convex subset of a Hilbert space H. Then for any given x0 ∈ H, we have p = PC x0 if and only if hp − z, x0 − pi ≥ 0, ∀z ∈ C. Theorem 2.5. Let C be a closed convex subset of a Hilbert space H, and let {Tn } be uniformly closed asymptotically family of countable quasi-Ln -Lipschitz mappings from C into itself. SupposePthat αn , βn , γn , an and bn ∈ [0, 1], αn + βn ∈ [0, 1] and an + bn ∈ [0, 1] for all n ∈ N and ∞ n=0 (αn + βn ) = ∞. Then {xn } generated by   x0 ∈ C = Q0 , choosen arbitrarily,     yn = (1 − αn − βn )xn + αn Tn zn + βn Tn tn , n ≥ 0,      z n ≥ 0,  n = (1 − an − bn )xn + an Tn tn + bn Tn xn ,     tn = (1 − γn )xn + γn Tn xn , n ≥ 0, Cn = {z ∈ C : kyn − zk ≤ [1 + (Ln (1 − an − bn )    +L2n ((1 − γn )an + bn )an γn L3n − 1)αn      +(Ln (1 − γn ) − 1) + γn L2n )βn ]kxn − zk} ∩ A,     Qn = {z ∈ Qn−1 : hxn − z, x0 − xn i ≥ 0}, n ≥ 1,    xn+1 = PcoCn ∩Qn x0

n ≥ 0,

converges strongly to PF x0 .

Proof. We give our proof in following steps.

999

Ahmad ET AL 997-1005

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Step 1. We know that coCn and Qn are closed and convex for all n ≥ 0. Next, we show that F ∩ A ⊂ coCn for all n ≥ 0. Indeed, for each p ∈ F ∩ A, we have kyn − pk = k(1 − αn − βn )xn + αn Tn zn + βn Tn tn − pk = k(1 − αn − βn )xn + αn Tn ((1 − an − bn )xn + an Tn tn + bn Tn xn ) + βn Tn tn − pk = k(1 − αn − βn )xn + αn Tn [(1 − an − bn )xn + an Tn ((1 − γn )xn + γn Tn xn ) + bn Tn xn ] + βn Tn [(1 − γn )xn + γn Tn xn ] − pk = k(1 − αn − βn )(xn − p) + (αn − an αn − bn αn + βn − βn γn )(Tn xn − p) + (an αn − an αn γn + bn αn + βn γn )(Tn2 xn − p) + an αn γn )(Tn3 xn − p)k ≤ (1 − αn − βn )kxn − pk + (αn − an αn − bn αn + βn − βn γn )Ln kTn xn − pk + (an αn − an αn γn + bn αn + βn γn )L2n kTn2 xn − pk + an αn γn )L3n kTn3 xn − pk = [1 + (Ln (1 − an − bn ) + L2n ((1 − γn )an + bn )an γn L3n − 1)αn + (Ln (1 − γn ) − 1) + γn L2n )βn ]kxn − pk, and p ∈ A, so p ∈ Cn which implies that F ∩A ⊂ Cn for all n ≥ 0. therefore, F ∩A ⊂ coCn for all n ≥ 0. Step 2. We show that F ∩ A ⊂ coCn ∩ Qn for all n ≥ 0. it suffices to show that F ∩ A ⊂ Qn , for all n ≥ 0. We prove this by mathematical induction. For n = 0 we have F ∩ A ⊂ C = Q0 . Assume that F ∩ A ⊂ Qn . Since xn+1 is the projection of x0 onto coCn ∩ Qn , from Proposition 2.2, we have hxn+1 − z, xn+1 − x0 i ≤ 0,

∀z ∈ coCn ∩ Qn ,

as F ∩ A ⊂ coCn ∩ Qn , the last inequality holds, in particular, for all z ∈ F ∩ A. This together with the definition of Qn+1 implies that F ∩ A ⊂ Qn+1 . Hence the F ∩ A ⊂ coCn ∩ Qn holds for all n ≥ 0. Step 3. We prove {xn } is bounded. Since F is a nonempty, closed, and convex subset of C, there exists a unique element z0 ∈ F such that z0 = PF x0 . From xn+1 = PcoCn ∩Qn x0 , we have kxn+1 − x0 k ≤ kz − x0 k for every z ∈ coCn ∩ Qn . As z0 ∈ F ∩ A ⊂ coCn ∩ Qn , we get kxn+1 − x0 k ≤ kz0 − x0 k for each n ≥ 0. This implies that {xn } is bounded. Step 4. We show that {xn } converges strongly to a point of C (we show that {xn } is a cauchy sequence). As xn+1 = PcoCn ∩Qn x0 ⊂ Qn and xn = PQn x0 (Proposition 2.4), we have kxn+1 − x0 k ≥ kxn − x0 k for every n ≥ 0, which together with the boundedness of kxn −x0 k implies that there exsists the limit of kxn −x0 k. On the other hand, from xn+m ∈ Qn , we have hxn −xn+m , xn −x0 i ≤ 0 and hence kxn+m − xn k2 = k(xn+m − x0 ) − (xn − x0 )k2 ≤ kxn+m − x0 k2 − kxn − x0 k2 − 2hxn+m − xn , xn − x0 i ≤ kxn+m − x0 k2 − kxn − x0 k2 → 0,

1000

n→∞

Ahmad ET AL 997-1005

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

for any m ≥ 1. Therefore {xn } is a cauchy sequence in C, then there exists a point q ∈ C such that limn→∞ xn = q. Step 5. We show that yn → q, as n → ∞. Let Dn = {z ∈ C : kyn − zk2 ≤ kxn − zk2 + (L3n + 2L2n − Ln − 2)(L3n + 2L2n − Ln )}. From the definition of Dn , we have Dn = {z ∈ C : hyn − z, yn − zi ≤ hxn − z, xn − zi + (L3n + 2L2n − Ln − 2)(L3n + 2L2n − Ln )} = {z ∈ C : kyn k2 − 2hyn , zi + kzk2 ≤ kxn k2 − 2hxn, zi + kzk2 + (L3n + 2L2n − Ln − 2)(L3n + 2L2n − Ln )} = {z ∈ C : 2hxn − yn , zi ≤ kxn k2 − kyn k2 + (L3n + 2L2n − Ln − 2)(L3n + 2L2n − Ln )}. This shows that Dn is convex and closed, n ∈ Z+ ∪ {0}. Next, we want to prove that Cn ⊂ Dn , n ≥ 0. In fact, for any z ∈ Cn , we have kyn − zk2 ≤ [1 + (Ln (1 − an − bn ) + L2n ((1 − γn )an + bn )an γn L3n − 1)αn + (Ln (1 − γn ) − 1) + γn L2n )βn ]2 kxn − zk2 = kxn − zk2 + 2[(Ln(1 − an − bn ) + L2n ((1 − γn )an + bn )an γn L3n − 1)αn + (Ln (1 − γn ) − 1) + γn L2n )βn ] + [(Ln (1 − an − bn ) + L2n ((1 − γn )an + bn )an γn L3n − 1)αn + (Ln (1 − γn ) − 1) + γn L2n )βn ]2 kxn − zk2 ≤ kxn − zk2 + [2(L3n + 2L2n − Ln − 2) + (L3n + 2L2n − Ln − 2)2 ]kxn − zk2 = kxn − zk2 + (L3n + 2L2n − Ln − 2)(L3n + 2L2n − Ln )kxn − zk2 . From Cn = {z ∈ C : kyn − zk ≤ [1 + (Ln (1 − an − bn ) + L2n ((1 − γn )an + bn )an γn L3n − 1)αn + (Ln (1 − γn ) − 1) + γn L2n )βn ]kxn − zk} ∩ A,

n ≥ 0,

we have Cn ⊂ A, n ≥ 0. Since A is convex, we also have coCn ⊂ A, n ≥ 0. Consider xn ∈ coCn−1 , we know that kyn − zk ≤ kxn − zk2 + (L3n + 2L2n − Ln − 2)(L3n + 2L2n − Ln )kxn − zk2 ≤ kxn − zk2 + (L3n + 2L2n − Ln − 2)(L3n + 2L2n − Ln ). This implies that z ∈ Dn and hence Cn ⊂ Dn , n ≥ 0. Sinnce Dn is convex, we have co(Cn ) ⊂ Dn , n ≥ 0. Therefore kyn − xn+1 k2 ≤ kxn − xn+1 k2 + (L3n + 2L2n − Ln − 2)(L3n + 2L2n − Ln ) → 0 as n → ∞. That is, yn → q as n → ∞. Step 6. We show that q ∈ F . From the definition of yn , we have (αn + an αn Tn + bn αn Tn + βn + βn γn Tn + an αn γn Tn2 )kTnxn − xn k = kyn − xn k → 0

1001

Ahmad ET AL 997-1005

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

as n → ∞. Since αn ∈ (a, 1] ⊂ [0, 1], from the above limit we have lim kTn xn − xn k = 0.

n→∞

Since {Tn } is uniformly closed and xn → q, we have q ∈ F . Step 7. We claim that q = z0 = PF x0 , if not, we have that kx0 − pk > kx0 − z0 k. There must exist a positive integer N , if n > N, then kx0 − xn k > kx0 − z0 k, which leads to kz0 − xn k2 = kz0 − xn + xn − x0 k2 = kz0 − xn k2 + kxn − x0 k2 + 2hz0 − xn , xn − x0 i. It follows that hz0 − xn , xn − x0 i < 0, which implies that z0 ∈ Qn , so that z0 ∈ F , this is a contradiction. This completes the proof. Now, we present an example of Cn which does not involve a convex subset. Example 2.6. Take H = R2 , and a sequence of mappings Tn : R2 → R2 given by 1  Tn : (t1 , t2 ) 7→ t1 , t2 , ∀(t1 , t2 ) ∈ R2 , n ≥ 0. 8 It is clear that {Tn } satisfies the desired definition of with F = {(t1 , 0) : t1 ∈ (−∞, +∞)} common fixed point set. Take x0 = (4, 0), a0 = 76 , we have  1 6 1 4 6  y0 = x0 + T0 x0 = 4 × + × , 0 = (1, 0). 7 7 7 8 7 q Take 1 + (L0 − 1)a0 = 52 , we have n

2

C0 = z ∈ R : ky0 − zk ≤

r

o 5 kx0 − zk . 2

It is easy to show that z1 = (1, 3), z2 = (−1, 3) ∈ C0 . But z0 =

1 1 z1 + z2 = (0, 3)∈C0 , 2 2

since ky0 − zk = 2, kx0 − zk = 1. Therefore C0 is not convex. Corollary 2.7. Let C be a closed convex subset of a Hilbert space H, and let T be a closed quasi-nonexpansive mapping from C into itself. Assume that Pαn , βn , γn , an and bn ∈ [0, 1], αn + βn ∈ [0, 1] and an + bn ∈ [0, 1] for all n ∈ N and ∞ n=0 (αn + βn ) = ∞. Then {xn } generated by  x0 ∈ C = Q0 , choosen arbitrarily,      yn = (1 − αn − βn )xn + αn T zn + βn T tn , n ≥ 0,      zn = (1 − an − bn )xn + an T tn + bn T xn , n ≥ 0, tn = (1 − γn )xn + γn T xn , n ≥ 0,    Cn = {z ∈ C : kyn − zk ≤ kxn − zk} ∩ A, n ≥ 0,      Qn = {z ∈ Qn−1 : hxn − z, x0 − xn i ≥ 0}, n ≥ 1,    xn+1 = PCn ∩Qn x0 converges strongly to PF x0 .

1002

Ahmad ET AL 997-1005

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. Take Tn = T , Ln = 1 in Theorem 2.5, in this case, Cn is convex and closed and , for all n ≥ 0, by using Theorem 2.5, we obtain Corollary 2.7. Corollary 2.8. Let C be a closed convex subset of a Hilbert space H, and let T be a nonexpansive mapping from C into itself. Assume thatPαn , βn , γn , an and bn ∈ [0, 1], αn + βn ∈ [0, 1] and an + bn ∈ [0, 1] for all n ∈ N and ∞ n=0 (αn + βn ) = ∞. Then {xn } generated by  x0 ∈ C = Q0 , choosen arbitrarily,     yn = (1 − αn − βn )xn + αn T zn + βn T tn , n ≥ 0,      zn = (1 − an − bn )xn + an T tn + bn T xn , n ≥ 0, tn = (1 − γn )xn + γn T xn , n ≥ 0,    Cn = {z ∈ C : kyn − zk ≤ kxn − zk} ∩ A, n ≥ 0,      Qn = {z ∈ Qn−1 : hxn − z, x0 − xn i ≥ 0}, n ≥ 1,    xn+1 = PCn ∩Qn x0 converges strongly to PF (T )x0 .

3

Applications

Here, we give an application of our result for the following case of finite family of asymp−1 totically quasi-nonexpansive mappings {Tn }N n=0 . Let kTij x − pk ≤ ki,j kx − pk,

∀x ∈ C, p ∈ F,

−1 where F is common fixed point sets of {Tn}N n=0 and limj→∞ ki,j = 1 for all 0 ≤ i ≤ N − 1. −1 The finite family of asymptotically quasi-nonexpansive mappings {Tn}N n=0 is uniformly L-Lipschitz if kTij x − Tij yk ≤ Li,j kx − yk, ∀x, y ∈ C,

for all i ∈ {0, 1, 2, ..., N − 1}, j ≥ 1, where L ≥ 1. −1 Theorem 3.1. Let C be a closed convex subset of a Hilbert space H, and let {Tn}N n=0 be a finite uniformly L-Lipschitz family of asymptotically quasi-nonexpansive mappings with the nonempty common fixed point set F . Assume thatPαn , βn , γn , an and bn ∈ [0, 1], αn + βn ∈ [0, 1] and an + bn ∈ [0, 1] for all n ∈ N and ∞ n=0 (αn + βn ) = ∞. Then {xn } generated by  x0 ∈ C = Q0 , arbitrarily,    j(n) j(n)   yn = (1 − αn − βn )xn + αn Ti(n) zn + βn Ti(n) tn , n ≥ 0,     j(n) j(n)   zn = (1 − an − bn )xn + an Ti(n) tn + bn Ti(n) xn , n ≥ 0,    j(n)   tn = (1 − γn )xn + γn Ti(n) xn , n ≥ 0, Cn = {z ∈ C : kyn − zk ≤ [1 + (ki(n),j(n) (1 − an − bn )    2 3  +ki(n),j(n) ((1 − γn )an + bn )an γn ki(n),j(n) − 1)αn     2  +(ki(n),j(n)(1 − γn ) − 1) + γn ki(n),j(n))βn ]kxn − zk} ∩ A, n ≥ 0,      Qn = {z ∈ Qn−1 : hxn − z, x0 − xn i ≥ 0}, n ≥ 1,    xn+1 = PcoCn ∩Qn x0

converges strongly to PF x0 .

1003

Ahmad ET AL 997-1005

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. We can drive the prove from the following two conclusions. N −1 ∞ Conclusion 1 {Tn=0 }n=0 is a uniformly closed asymptotically family of countable quasi-Ln -Lipschitz mappings from C into itself. Conclusion 2 T TN j(n) F = n=0 F (Tn ) = ∞ n=0 F (Ti(n) ), where F (Tn ) denotes the fixed point set of the mappings Tn . Corollary 3.2. Let C be a closed convex subset of a Hilbert space H, and let T be a L-Lipschitz asymptotically quasi-nonexpansive mapping with the nonempty common fixed point set F . Assume P that αn , βn , γn , an and bn ∈ [0, 1], αn +βn ∈ [0, 1] and an +bn ∈ [0, 1] for all n ∈ N and ∞ n=0 (αn + βn ) = ∞. Then {xn } generated by   x0 ∈ C = Q0 , arbitrarily,     yn = (1 − αn − βn )xn + αn T n zn + βn T n tn , n ≥ 0,      zn = (1 − an − bn )xn + an T n tn + bn T n xn , n ≥ 0,     n  tn = (1 − γn )xn + γn T xn , n ≥ 0, Cn = {z ∈ C : kyn − zk ≤ [1 + (Kn (1 − an − bn )    +Kn2 ((1 − γn )an + bn )an γn Kn3 − 1)αn      +(Kn (1 − γn ) − 1) + γn Kn2 )βn ]kxn − zk} ∩ A,      Qn = {z ∈ Qn−1 : hxn − z, x0 − xn i ≥ 0}, n ≥ 1,    xn+1 = PcoCn ∩Qn x0

n ≥ 0,

converges strongly to PF x0 .

Proof. Take Tn = T in Theorem 3.1, we get the desired result.

References [1] H. H. Bauschke and P. L. Combettes, A weak-to-strong convergence principle for Fej´ermonotone methods in Hilbert spaces, Math. Oper. Res., 26 (2001), 248–264. [2] S. Y. Cho, A. A. Shahid, W. Nazeer, and S. M. Kang, Fixed point results for fractal generation in Noor orbit and s-convexity, SpringerPlus, 5 (2016), Article ID 1843, 16 pages. [3] A. Genel and J. Lindenstrass, An example concerning fixed points, Israel. J. Math., 22 (1975), 81–86. [4] J. Guan, Y. Tang, P. Ma, Y. Xu and Y. Su, Non-convex hybrid algorithm for a family of countable quasi-Lipscitz mappings and applications, Fixed Point Theory Appl., 2015 (2015), Article ID 214, 11 pages. [5] S. M. Kang, W. Nazeer, M. Tanveer and A. A. Shahid, New fixed point results for fractal generation in Jungck Noor orbit with-Convexity, J. Funct. Spaces, 2015 (2015), Article ID 963016, 7 pages. [6] T. H. Kim and H. K. Xu, Strong convergence of modified Mann iterations for asymptotically mappings and semigroups, Nonlinear Anal., 64 (2006), 1140–1152.

1004

Ahmad ET AL 997-1005

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[7] Y. C. Kwun, M. Munir, W. Nazeer and S. M. Kang, Some fixed points results of quadratic functions in split quaternions, J. Funct. Spaces, 2016 (2016), Article ID 3460257, 5 pages. [8] Y. C. Kwun, W. Nazeer, M. Munir and S. M. Kang, Explicit viscosity rules and applications of nonexpansive mappings, J. Comput. Anal. Appl., 24 (2018), 1541–1552. [9] Y. C. Kwun, W. Nazeer, M. Munir and S. M. Kang, Applications and strong convergence theorems of asymptotically nonexpansive non-self mappings, J. Comput. Anal. Appl., 24 (2018), 1553–1564. [10] Y. Liu, L. Zheng, P. Wang and H. Zhou, Three kinds of new hybrid projection methods for a finite family of quasi-asymptotically pseudocontractive mappings in Hilbert spaces, Fixed Point Theory Appl., 2015 (2015), Article ID 118, 13 pages. [11] W. R. Mann, Mean value methods in iteration, Proc. Amer. Math. Soc., 4 (1953), 506–510. [12] C. Martinez-Yanes and H. K. Xu, Strong convergence of the CQ method for fixed point iteration processes, Nonlinear Anal., 64 (2006), 2400–2411. [13] K. Nakajo and W. Takahashi, Strong convergence theorems for nonexpansive mappings and nonexpansive semigroups, J. Math. Anal. Appl., 279 (2003), 372–379. [14] S. F. A. Naqvi and M. S. Khan, On the viscosity rule for common fixed points of two nonexpansive mappings in Hilbert spaces, Open J. Math. Sci., 1 (2017), 110–125. [15] W. Nazeer, S. M. Kang, M. Munir and S. Kausar, Strong convergence theorems of non-convex hybrid algorithm for quasi-Lipschitz mappings, J. Comput. Anal. Appl., 24 (2018), 1313–1321. [16] W. Nazeer, S. M. Kang, M. Munir and S. Kausar, Strong convergence theorems for a non-convex hybrid method for quasi-Lipschitz mappings and applications, J. Comput. Anal. Appl., 24 (2018), 1455–1463. [17] W. Nazeer, S. M. Kang, M. Tanveer and A. A. Shahid, Fixed point results in the generation of Julia and Mandelbrot sets, J. Inequal. Appl., 2015 (2015), Article ID 298, 16 pages. [18] W. Nazeer, M. Munir and S. M. Kang, An intermixed algorithm for three strict pseudo-contractions in Hilbert spaces, J. Comput. Anal. Appl., 24 (2018), 1322–1333. [19] W. Nazeer, M. Munir, A. R. Nizami, S. Kausar and S. M. Kang, Non-convex hybrid algorithms for a family of countable quasi-lipschitz mappings corresponding to Khan iterative process and applications, J. Appl. Math. Inform., 35 (2017), 313–321. [20] Y. Su and X. Qin, Monotone CQ iteration processes for nonexpansive semigroups and maximal monotone operators, Nonlinear Anal., 68 (2008), 3657–3664. [21] Z. Tian, M. Zarepisheh, X. Jia and S. B. Jiang The fixed-point iteration method for IMRT optimization with truncated dose deposition coefficient matrix, arXiv:1303.3504 [physics.med-ph], 2013, 16 pages.

1005

Ahmad ET AL 997-1005

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Some Results of The Class of Functions with Bounded Radius Rotation Ya¸sar Polato˜glu1 , Yasemin Kahramaner2,∗ and Arzu Yemi¸sci S¸en3 1,3

˙ ˙ Department of Mathematics and Computer Sciences, Istanbul K¨ ult¨ ur University, Istanbul, Turkey 2

e-mail: 1 [email protected], e-mail:3 [email protected] ˙ ˙ Department of Mathematics, Istanbul Ticaret University, Istanbul, Turkey e-mail:[email protected]

Abstract Let A be the family of functions f (z) = z + a2 z 2 + ... which are analytic in the open unit disc D = {z : |z| < 1}, and denote by P of functions p(z) = z + p1 z + p2 z 2 + ... analytic in D such that p(z) is in P if and only if p(z) ≺

1 + φ(z) 1+z ⇔ p(z) = , 1−z 1 − φ(z)

for some Schwarz function φ(z) and every z ∈ D. Let f (z) be an element of A, and satisfies the condition     f 0 (z) k 1 k 1 z = + p1 (z) − − p2 (z) f (z) 4 2 4 2 where p1 (z), p2 (z) ∈ P and k ≥ 2, then f (z) is called function with bounded radius rotation. The class of such functions is denoted by Rk . This class is generalization of starlike functions. The main purpose is to give some properties of the class Rk .

1

Introduction

Let Ω be the family of functions φ(z) which are analytic in D and satisfy the conditions φ(0) = 0, |φ(z)| < 1 for all z ∈ D. If f1 (z) and f2 (z) are analytic functions in D, then we say that f1 (z) is subordinate to f2 (z), written as f1 (z) ≺ f2 (z) if there exists a Schwarz function φ ∈ Ω such that f1 (z) = f2 (φ(z)), z ∈ D. We also note that if f2 univalent in D , then f1 (z) ≺ f2 (z) if and only if f1 (0) = f2 (0), f1 (D) ⊂ f2 (D) implies f1 (Dr ) ⊂ f2 (Dr ), where Dr = {z : |z| < r, 0 < r < 1} (see [2]). Denote by P the family of functions p(z) = 1 + p1 z + p2 z 2 + p3 z 3 + · · · analytic in D such that p is in P if and only if 1 + φ(z) 1+z ⇔ p(z) = ,z ∈ D (1.1) p(z) ≺ 1−z 1 − φ(z) 2010 Mathematics Subject Classification: 30C45 Key words and phrases: Bounded radius rotation, bounded boundary rotation, distortion theorem, growth theorem and coefficient inequality. Corresponding Author∗

1

1006

Yasar Polatoglu ET AL 1006-1013

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Let f (z) be an element of A. Then f (z) is called convex or starlike if it maps D onto a convex or starlike region, respectively. Corresponding classes are denoted by C and S ∗ . It is well known that C ⊂ S ∗ , that both are subclasses of the univalent functions and have the following analytical representations.   f 00 (z) > 0, z ∈ D (1.2) f (z) ∈ C ⇐⇒ Re 1 + z 0 f (z) and

 0  f (z) > 0, f (z) ∈ S ⇐⇒ Re z f (z) ∗

z∈D

(1.3)

More on these classes can be found in [2]. Let f (z) be an element of A. If there is a function g(z) in C such that  0  f (z) Re 0 > 0, z ∈ D (1.4) g (z) then f (z) is called close-to-convex function in D and the class of such functions are denoted by CC. A function analytic and locally univalent in a given simply connected domain is said to be of bounded boundary rotation if its range has bounded boundary rotation which is defined as the total variation of the direction angle of the tangent to the boundary curve under a complete circuit. Let Vk denote the class of functions f (z) ∈ A which maps D conformally onto an image domain of boundary rotation at most kπ. The class of functions of bounded boundary rotation was introduced by Loewner [3] in 1917 and was developed by Paatero [5, 6] who systematically developed their properties and made an exhaustive study of the class Vk . Paatero has shown that f (z) ∈ Vk if and only if  Z 2π   0 −it f (z) = Exp − log 1 − ze dµ(t) , (1.5) 0

where µ(t) is real-valued function of bounded variation for which Z 2π Z 2π dµ(t) = 2 and |dµ(t)| ≤ k 0

(1.6)

0

for fixed k ≥ 2 it can also be expressed as Z 2π (zf 0 (z))0 Re dθ ≤ 2kπ, f 0 (z) 0

z = reiθ .

(1.7)

Clearly, if k1 < k2 then Vk1 ⊂ Vk2 that is the class Vk obviously expands on k increases. V2 is the class of C of convex univalent functions. Paatero showed that V4 ⊂ S, where S is the class of normalized univalent functions. Later Pinchuk proved that Vk is close-to convex functions in D if 2 ≤ k ≤ 4 [7]. Let Rk denote the class of analytic functions f of the form f (z) = z + a2 z 2 + a3 z 3 + ... having the representation  Z 2π   −it f (z) = zExp − log 1 − ze dµ(t) , (1.8) 0

where µ(t) is given in (1.6). We note that the class Rk was introduced by Pinchuk and Pinchuk showed that Alexander type relation between the classes Vk and Rk exist, f ∈ Vk ⇔ zf 0 (z) ∈ Rk

(1.9)

2

1007

Yasar Polatoglu ET AL 1006-1013

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Rk consists of those function f (z) which satisfy Z 2π 0 iθ Re(reiθ f (re ) ) dθ ≤ kπ, z = reiθ . f (reiθ ) 0

(1.10)

Geometrically, the condition is that the total variation of angle between radius vector f (reiθ ) makes with positive real axis is bounded kπ. Thus, Rk is the class of functions of bounded radius rotation bounded by kπ, therefore Rk generalizes the starlike functions. Pk denote the class of functions p(0) = 1 analytic in D and having representation Z 1 2π 1 + ze−it p(z) = dµ(t) (1.11) 2 0 1 − ze−it where µ(t) is given in (1.6). Clearly, P2 = P where P is the class of analytic functions with positive real part. For more details see [7]. From (1.11), one can easily find that p(z) ∈ Pk can also written by     k 1 k 1 + − p1 (z) − p2 (z), z ∈ D (1.12) p(z) = 4 2 4 2 where p1 (z), p2 (z) ∈ P. Pinchuk [7] has shown that the classes Vk and Rk can be defined by using the class Pk as gives below (zf 0 (z))0 f ∈ Vk ⇔ ∈ Pk (1.13) f 0 (z) and zf 0 (z) f ∈ Rk ⇔ ∈ Pk (1.14) f (z) At the same time, we note that Vk generalizes of convex functions.

2

Main Results

Lemma 2.1. Let p(z) be an element of Pk , then 2 p(z) − 1 + r ≤ kr 1 − r2 1 − r2

(2.1)

Proof. Let f (z) be an element of Vk . Using (1.13), we can write p(z) = 1 +

f 00 (z) , p(z) ∈ Pk f 0 (z)

On the other hand M.S. Robertson [8] proved that if f (z) ∈ Vk , then 00 f (z) 2r2 kr z − ≤ f 0 (z) 1 − r2 1 − r2 Therefore the relation can be written in the following form, 00 2 (1 + z f (z) ) − 1 + r ≤ kr f 0 (z) 1 − r2 1 − r2

(2.2)

(2.3)

(2.4)

Using the definition of the class Vk , we obtain (2.1). 3

1008

Yasar Polatoglu ET AL 1006-1013

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Theorem 2.2. Let f (z) be an element of Rk , then r (1 − r)

2−k 2

(1 + r)

2+k 2

1 − kr + r2 (1 −

k r)2− 2 (1

+

k r)2+ 2

≤ |f (z)| ≤

≤ |f 0 (z)| ≤

r (1 − r)

2+k 2

(1 + r)

(2.5)

2−k 2

1 + kr + r2 k

k

(1 − r)2+ 2 (1 + r)2− 2

Proof. Using the definition of Rk , then we can write 0 f (z) 1 + r2 kr z f (z) − 1 − r2 ≤ 1 − r2

(2.6)

(2.7)

This inequality can be written in the following form, 1 − kr + r2 f 0 (z) 1 + kr + r2 ≤ Rez ≤ 1 − r2 f (z) 1 − r2 On the other hand, we have Rez Thus we have

∂ f 0 (z) = r. log|f (z)| f (z) ∂r

1 − kr + r2 ∂ 1 + kr + r2 ≤ log|f (z)| ≤ 2 r(1 − r ) ∂r r(1 − r2 )

(2.8)

(2.9)

(2.10)

Integrating both sides (2.10), we get (2.5). The inequality (2.7) can be written in the form 0 f (z) 1 + kr + r2 1 − kr + r2 z ≤ (2.11) f (z) ≤ 2 1−r 1 − r2 In this step, if we use (2.5), we obtain (2.6). Corollary 2.3. For k = 2 in (2.5), we obtain r r ≤ |f (z)| ≤ (1 + r)2 (1 − r)2 This is well known growth theorem for starlike functions [2]. Corollary 2.4. For k = 2 in (2.6), we obtain 1−r 1+r ≤ |f 0 (z)| ≤ 3 (1 + r) (1 − r)3 This is well known distortion theorem for starlike functions [2]. Corollary 2.5. The radius of starlikeness of Rk is √ k − k2 − 4 RS ∗ = ,k ≥ 2 2

(2.12)

4

1009

Yasar Polatoglu ET AL 1006-1013

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. Since  0  f (z) 1 − kr + r2 Re z > f (z) 1 − r2

Hence for R < RS ∗ the left hand side of the preceding inequality is positive which implies (2.12). We note that all results are sharp because of extremal function is k

z(1 − z) 2 −1

f∗ (z) =

k

(1 + z) 2 +1

Indeed, f 0 (z) 1 − kz + z 2 = z ∗ = f∗ (z) 1 − z2



k 1 + 4 2



1+z − 1−z



k 1 − 4 2



1−z 1+z

Thus, f∗ (z) ∈ Rk and f∗ (z) is extremal function. Lemma 2.6. Let p(z) = 1 + p1 z + p2 z 2 + ... be an element of Pk , then |pn | ≤ k Proof. Method I. Since p(z) ∈ Pk , then we have     k 1 k 1 p(z) = + − p1 (z) − p2 (z) 4 2 4 2     k 1 k 1 2 + (1 + a1 z + a2 z + ...) − − (1 + b1 z + b2 z 2 + ...) = 4 2 4 2 Then we have

 pn =



k 1 + 4 2

 an −

k 1 − 4 2

 bn

Thus     k 1 k 1 + − |pn | = an − bn 4 2 4 2     k 1 k 1 ≤ + |an | + − |bn | 4 2 4 2     k 1 k 1 ≤ + 2+ − 2 4 2 4 2

This shows that, |pn | ≤ k Method II. Since p(z) ∈ Pk , then p(z) can be written in the form 1 p(z) = 2π

Z



0

1 + ze−it dµ(t) 1 − ze−it

5

1010

Yasar Polatoglu ET AL 1006-1013

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

and Z



Z dµ(t) = 2π



|dµ(t)| ≤ kπ.

and 0

0

Then p(z) = 1 + p1 z + p2 z 2 + ... =

1 2π

Z



0

1 + ze−it dµ(t) 1 − ze−it



1 + ze−it − ze−it + ze−it dµ(t) 1 − ze−it 0  Z 2π  1 2ze−it = 1− dµ(t) 2π 0 1 − ze−it Z 2π 1 |dµ(t)| ≤ k |pn | ≤ π 0 1 = 2π

Z

is obtained. We note that this lemma was proved first by K.I. Noor [4] (Method II). Theorem 2.7. Let f (z) be an element of Rk , then |an | ≤

n−2 Y 1 (k + ν) (n − 1)! ν=0

Proof. Since f (z) ∈ Rk , then we have z where p(z) ∈ Pk . Thus

(2.13)

f 0 (z) = p(z) f (z)

zf 0 (z) = f (z)p(z)

Comparing the coefficients in both sides of zf 0 (z) = f (z)p(z), we obtain the recursion formula an =

n−1 1 X pn−ν aν , n − 1 ν=1

n≥2

and therefore by Lemma 2.6, |an | = Induction shows that |an | ≤

n−1 k X |aν | n − 1 ν=1

n−2 Y 1 (k + ν). (n − 1)! ν=0

Corollary 2.8. For k = 2, we obtain |an | ≤ n. This inequality is well known coefficient inequality for starlike functions.

6

1011

Yasar Polatoglu ET AL 1006-1013

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Indeed, |an | ≤

n−2 Y 1 k(k + 1)(k + 2)...(k + (n − 2)) (k + ν) = . (n − 1)! ν=0 (n − 1)!

If we take k = 2, |an | ≤

2.3.4...(n − 2).(n − 1).n =n (n − 1)!

Corollary 2.9. Let f (z) be an element of Vk , then |an | ≤

n−2 1 Y (k + ν) n! ν=0

(2.14)

Proof. Using the theorem of Pinchuk f (z) ∈ Vk ⇔ zf 0 (z) ∈ Rk we get (2.14). Corollary 2.10. For k = 2, we obtain |an | ≤ 1. This inequality is well known coefficient inequality for convex functions. We note that all these inequalities are sharp because extremal function is, k

f∗ (z) =

z(1 − z) 2 −1 k

(1 + z) 2 +1

.

References [1] D.A. Brannan, On functions bounded boundary rotation I, Proc. Edinburg Math. Soc. 16 (1969), 339-347. [2] A.W. Goodman, Univalent functions Volume I and Volume II, Mariner Pub. Co. Inc. Tampa Florida, 1984. [3] C.Loewner, Untersuchungen u ¨ber die Verzerrung bei konformen Abbildungen des Einheitskreises |z| < 1, die durch Funktionen mit nicht verschwindender Ableitung geliefert werden, Ber. Verh. S¨achs. Gess. Wiss. Leipzig, 69 (1917), 89-106. [4] K.I. Noor, On generalization of close-to-convexity, International Journal of Mathematics and Mathematical Sciences Volume 6 (1983), Issue 2, 327-333. ¨ [5] V.Paatero, Uber die konforme Abbildung von Gebieten deren R¨ ander von beschr¨ ankter Drehung sind, Ann. Acad. Sci. Fenn. Ser., A 33, (1931), 1-77. ¨ [6] V.Paatero, Uber Gebiete von beschr¨ ankter Randdrehung, Ann. Acad. Sci. Fenn. Ser., A 37, (1933), 1-20. [7] B. Pinchuk, Functions with bounded boundary rotation, Isr. J. Math., 10 (1971), 7-16.

7

1012

Yasar Polatoglu ET AL 1006-1013

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[8] M.S. Robertson , Coefficients of functions with bounded boundary rotation, Canad. J. Math., 21 (1969), 1477-1482

8

1013

Yasar Polatoglu ET AL 1006-1013

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

POLY-GENOCCHI POLYNOMIALS WITH UMBRAL CALCULUS VIEWPOINT TAEKYUN KIM1 , DAE SAN KIM2 , GWAN-WOO JANG3 , AND JONGKYUM KWON4,∗

Abstract. In this paper, we would like to exploit umbral calculus in order to derive explicit expressions, some properties, recurrence relations and identities for poly-Genocchi polynomials.

1. Review on umbral calculus The purpose of this paper is to use umbral calculus in order to derive some new and interesting expressions, recurrence relations and identities for poly-Genocchi polynomials. To do that we first recall the umbral calculus very briefly. For more details, the reader may refer to [11, 12]. We denote the algebra of polynomials in a single variable x over C by P and the vector space of all linear functionals on P by P∗ . The action of a linear functional L on a polynomial p(x) is denoted by hL|p(x)i. We define the vector space structure on P∗ by hcL+c0 L0 |p(x)i = chL|p(x)i+c0 hL0 |p(x)i, where c, c0 ∈ C. We define the algebra of formal power series in a single variable t to be     X tk F = f (t) = ak | ak ∈ C . (1.1)   k! k≥0

A power series f (t) ∈ F defines a linear functional on P by setting hf (t)|xn i = an , for all n ≥ 0.

(1.2)

By (1.1) and (1.2), we have htk |xn i = n!δn,k , for all n, k ≥ 0, (1.3) P n where δn,k is the Kronecker’s symbol. Let fL (t) = n≥0 hL|xn i tn! . From (1.2), we have hfL (t)|xn i = hL|xn i. So, the map L 7→ fL (t) is a vector space isomorphism from P∗ onto F. Thus, F is thought of as set of both formal power series and linear functionals. We call F the umbral algebra. The umbral calculus is the study of umbral algebra. The order O(f (t)) of the non-zero power series f (t) ∈ F is the smallest integer k for which the coefficient of tk does not vanish. Suppose that f (t), g(t) ∈ F such that O(f (t)) = 1 and O(g(t)) = 0, then there exists a unique sequence sn (x) of polynomials such that hg(t)(f (t))k |sn (x)i = n!δn,k ,

(1.4)

2010 Mathematics Subject Classification. 11B83, 42A16. Key words and phrases. Poly-Genocchi polynomials, umbral calculus. ∗ corresponding author. 1

1014

T. KIM ET AL 1014-1031

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

Fourier series of finite products of Bernoulli and Genocchi functions

where n, k ≥ 0. The sequence sn (x) is called the Sheffer sequence for (g(t), f (t)) which is denoted by sn (x) ∼ (g(t), f (t)) (see [11, 12]). In particular, if sn (x) ∼ (g(t), t), then sn (x) is called the Appell sequence for g(t). For f (t) ∈ F and p(x) ∈ P, we have heyt |p(x)i = p(y), hf (t)g(t)|p(x)i = hg(t)|f (t)p(x)i and X X tn xn f (t) = hf (t)|xn i , p(x) = htn |p(x)i . (1.5) n! n! n≥0

n≥0

From (1.5), we obtain htk |p(x)i = p(k) (0) and h1|p(k) (x)i = p(k) (0), where p(k) (0) denotes the k-th derivative of p(x) with respect to x at x = 0. So, we get that dk tk p(x) = p(k) (x) = dx k p(x), for all k ≥ 0. Let sn (x) ∼ (g(t), f (t)). Then we have X tn 1 y f¯(t) s (y) e = , (1.6) n n! g(f¯(t)) n≥0

for all y ∈ C, where f¯(t) is P the compositional inverse of f (t) satisfying f (f¯(t)) = n ¯ f (f (t)) = t. Let sn (x) = k=0 cn,k rk (x), for sn (x) ∼ (g(t), f (t)) and rn (x) ∼ (h(t), `(t)). Then we have   1 h(f¯(t)) ¯(t)))k |xn , (`( f (1.7) cn,k = k! g(f¯(t)) (see [11, 12]). For sn (x) ∼ (g(t), f (t)), we have the recurrence relation   1 g 0 (t) sn (x). sn+1 (x) = x − 0 g(t) f (t)

(1.8)

Finally, for any h(t) ∈ F and p(x) ∈ P, we have the following. hh(t)|xp(x)i = h∂t h(t)|p(x)i.

(1.9)

2. Introduction Let r be any integer. We recall here that ∞ X xn , Lir (x) = nr n=1

(2.1)

is the rth polylogarithm function for r ≥ 1, and a rational function for r ≤ 0. It is immediate to see that d 1 (Lir+1 (x)) = Lir (x). dx x (r) The Poly-Genocchi polynomials Gn (x) of index r are given by ∞ 2Lir (1 − e−t ) xt X (r) tn e = Gn (x) . t e +1 n! n=0 (r)

(2.2)

(2.3)

(r)

For x = 0, Gn = Gn (0) are called poly-Genocchi numbers of index r. In (1) particular, if r = 1, Gn (x) = Gn are the ’classical’ Genocchi polynomials defined by ∞ 2t xt X tn e = G (x) , (see [8]). (2.4) n et + 1 n! n=0

1015

T. KIM ET AL 1014-1031

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G.-W. Jang, J. Kwon

3

(r)

The Poly-Genocchi polynomials Gn (x) were first introduced in [3], even though they were called poly-Euler polynomials and denoted by E(r) n (x). For the obvious reason, it seems more appropriate to call them poly-Genocchi polynomials rather than poly-Euler polynomials. There are other definitions for poly-Euler numbers (r) and poly-Euler polynomials. Indeed, in [10, 13] the poly-Euler numbers Em are defined by ∞ m X Lir (1 − e−4t ) (r) t = . Em 4t cosht m! m=0

(2.5) (r)

For poly-Euler polynomials, see [2]. The poly-Bernoulli polynomials Bn (x) of index r are given by ∞ Lir (1 − e−t ) xt X (r) tn e , (see [1, 4, 6]). (2.6) = B (x) n et − 1 n! n=0 (r)

(r)

When x = 0, Bn = Bn (0) are called poly-Bernoulli numbers of index r. In (1) particular, if r = 1, Bn (x) = Bn are the Bernoulli polynomials defined by ∞ X tn t xt e = B (x) . n et − 1 n! n=0

(2.7)

The Euler polynomials En (x) are given by ∞ X 2 tn xt e = E (x) . n et + 1 n! n=0

(2.8)

As is well knwon, 1 Gn+1 (x), (n ≥ 0). (2.9) n+1 P∞ P∞ n n Writing Lir (1 − e−t ) = n=1 an tn! = t + n=2 an tn! , from (2.3) and (2.7) we see that ! ∞ n−1 ∞ n X X n X tn t an−l El (x) G(r) = . (2.10) n (x) l n! n=1 n! n=0 En (x) =

l=0

This implies that (r)

(r)

G0 (x) = 0, G1 (x) = 1, deg G(r) n (x) = n − 1, (n ≥ 1).

(2.11)

In this paper, we would like that to exploit umbral calculus in order to derive explicit expressions, some properties, recurrence relations and identities for polyGenocchi polynomials.

3. Explicit expressions It is important to observe that sometimes we can not directly apply the umbral calculus techniques to the generating function (2.3) of poly-Genocchi polynomials, −t ) since 2Lire(1−e is a delta series, and hence is not invertible. Instead, we have to t +1 use the next generating function for (2.10).

Gn+1 (x) n+1 , (n

1016

≥ 1), which follows from (2.3) and

T. KIM ET AL 1014-1031

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

Fourier series of finite products of Bernoulli and Genocchi functions

(r) ∞ 2Lir (1 − e−t ) xt X Gn+1 (x) tn e = . t(et + 1) n + 1 n! n=0 (r)

We see from (2.11) that

Gn+1 (x) n+1

is the Appell sequence for

(3.1)

t(et +1) 2Lir (1−e−t ) ,

namely

  (r) Gn+1 (x) t(et + 1) ∼ g(t) = , f (t) = t . (3.2) n+1 2Lir (1 − e−t ) D E −t ) n+1 We will compute Lir (1−e | x in four different ways in order to get intert esting identities. Firstly, we have   Lir (1 − e−t ) n+1 |x t + * ∞ −t − 1)m n+1 1 X m (e |x (−1) = t m=1 mr   n+2 X 1 1 −t m m! m n+1 = (−1) (e − 1) |x mr t m! m=1 * ∞ + (3.3) n+2 X X (−1)j j−1 n+1 m m! (−1) = S (j, m) t |x 2 mr j=m j! m=1 =

n+2 X

(−1)m

m=1

=

n+2 (−1)j m! X S2 (j, m) (n + 1)!δn+1,j−1 r m j=m j!

n+2 1 X m! (−1)m+n r S2 (n + 2, m). n + 2 m=1 m

Secondly, we get  Lir (1 − e−t ) n+1 |x t  t  e − 1 Lir (1 − e−t ) n+1 = | x t et − 1 * + ∞ et − 1 X (r) tm n+1 Bm = | x t m! m=0  t  n+1 X n + 1  e − 1 n−m+1 (r) |x = Bm m t m=0 Z 1 n+1 X n + 1  (r) = Bm un−m+1 du m 0 m=0 n+1 X n + 1  1 (r) = Bm . m n−m+2 m=0 

1017

(3.4)

T. KIM ET AL 1014-1031

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G.-W. Jang, J. Kwon

5

Thirdly, we obtain  Lir (1 − e−t ) n+1 |x t   Z t 1 (Lir (1 − e−s ))0 ds|xn+1 = t 0  Z t  (Lir−1 (1 − e−s )) 1 n+1 = ds|x t 0 es − 1 

* Z ∞ + 1 t X (r−1) sm B = ds|xn+1 t 0 m=0 m m!   Z t ∞ X 1 m n+1 (r−1) 1 s ds|x = Bm m! t 0 m=0 = =

∞ X m=0 ∞ X

(r−1) Bm

m n+1 1 t |x (m + 1)!

(r−1) Bm

1 (n + 1)!δn+1,m (m + 1)!

m=0

=

(3.5)

1 (r−1) B . n + 2 n+1

Lastly, in [7] we showed that Lir (1 − e−t ) =

∞ X

···

tj1 +···+jr−1 +1

jr−1 =0

j1 =0

×

∞ X

r−1 Y i=1

(3.6)

Bji , (r ≥ 2), ji !(j1 + · · · + ji + 1)

which follows from the well-known integral representation Z t Z y Z y Z y 1 1 1 y Lik (1 − e−t ) = · · · dy · · · dydydy, (3.7) y y y y e −1 0 e −1 0 e −1 0 e −1 0 {z } | (k−2) times Now, 

=

Lir (1 − e−t ) n+1 |x t

∞ X

···

j1 =0

=

∞ X

∞ r−1 X Y jr−1 =0 i=1

···

j1 =0

=(n + 1)!

∞ r−1 X Y jr−1 =0 i=1

X



j1 +···+jr−1 n+1 Bji t |x ji !(j1 + · · · + ji + 1) Bji (n + 1)!δn+1,j1 +···+jr−1 ji !(j1 + · · · + ji + 1) r−1 Y

j1 +···+jr−1 =n+1 i=1

(3.8)

Bji . ji !(j1 + · · · + ji + 1)

1018

T. KIM ET AL 1014-1031

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

Fourier series of finite products of Bernoulli and Genocchi functions

Theorem 3.1. For all integers r ≥ 2, and n ≥ −1, we have the following.   Lir (1 − e−t ) n+1 |x t n+2 m! 1 X (−1)m+n r S2 (n + 2, m) = n + 2 m=1 m n+1 X n + 1  1 (r) = Bm m n−m+2 m=0

=

1 (r−1) B n + 2 n+1 X

=(n + 1)!

r−1 Y

j1 +···+jr−1 =n+1 i=1

Bj i . ji !(j1 + · · · + ji + 1)

Similarly, the following was derived in [7] except for the first one which is left as an exercise to the reader. Theorem 3.2. For all integers r ≥ 2, and n ≥ −1, we have the following.

Lir (1 − e−t )|xn+1 = =

n+1 X

(−1)m+n+1

m=1 n  X m=0

m! S2 (n + 1, m) mr

 n+1 (r) Bm m

=Bn(r−1) X

=(n + 1)!

r−1 Y

j1 +···+jr−1 =n i=1

Bj i . ji !(j1 + · · · + ji + 1)

The following is also immediate from (2.3). However, we derive it by using umbral calculus. * ∞ + X tm n (r) (r) Gn (y) = Gm (y) |x m! m=0   2Lir (1 − e−t ) yt n = e |x et + 1 * + ∞ 2Lir (1 − e−t ) X y l l n = | tx (3.9) et + 1 l! l=0  n    X n l 2Lir (1 − e−t ) n−l = y |x et + 1 l l=0 n   X n l (r) = y Gn−l . l l=0

1019

T. KIM ET AL 1014-1031

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G.-W. Jang, J. Kwon

7

Thus we have shown G(r) n (x)

n   X n

=

l=0

l

(r)

Gn−l xl .

Next, in order to express poly-Genocchi polynomials in terms of Euler polynomials, we first observe the following.  2Lir (1 − e−t ) yt n e |x = et + 1   2 −t yt n = Lir (1 − e )| t e x e +1 * + ∞ X tl n −t = Lir (1 − e )| El (y) x l! l=0   n X

n = El (y) Lir (1 − e−t )|xn−l l G(r) n (y)



(3.10)

l=0

From this and Theorem 1.2, after simple manipulations, we obtain the following (r) explicit expressions for Gn (x), as linear combinations of Euler polynomials. Theorem 3.3. For any integer n ≥ 0, we have n X l   X n m! (r) Gn (x) = (−1)l+m r S2 (l, m)En−l (x) m l l=1 m=1    l−1 n X X n l (r) Bm En−l (x) = l m l=1 m=0 n   X n (r−1) = Bl−1 En−l (x) l l=1

=

n X

X

(n)l

l=1 j1 ,··· ,jr−1 ≥0,j1 +···+jr−1 =l−1

r−1 Y i=1

Bji En−l (x). ji !(j1 + · · · + ji + 1)

This time we want to express poly-Genocchi polynomials in terms of Genocchi polynomials. For this, we first observe the following.   2Lir (1 − e−t ) yt n (r) Gn (y) = e |x et + 1   Lir (1 − e−t ) 2t yt n = | t e x t e +1 * + ∞ (3.11) tl n Lir (1 − e−t ) X | Gl (y) x = t l! l=0   n   X n Lir (1 − e−t ) n−l = Gl (y) |x l t l=0

From this and Theorem 1.1, after simple manipulations, we get the following (r) explicit expressions for Gn (x), as linear combinations of Genocchi polynomials.

1020

T. KIM ET AL 1014-1031

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

Fourier series of finite products of Bernoulli and Genocchi functions

Theorem 3.4. For any integer n ≥ 0, we have n−1 l+1 XX

  1 n m! (−1)l+m−1 r S2 (l + 1, m)Gn−l (x) l + 1 l m l=0 m=1    n−1 l XX 1 n l (r) = Bm Gn−l (x) l − m + 1 l m l=0 m=0 n−1 X 1 n (r−1) = Bl Gn−l (x) l+1 l G(r) n (x) =

l=0

=

n−1 X

X

(n)l

l=0 j1 ,··· ,jr−1 ≥0,j1 +···+jr−1 =l

r−1 Y i=1

Bji Gn−l (x). ji !(j1 + · · · + ji + 1)

As a final remark in this section, we mention the following Appell identity. n   X n (r) Bn(r) (x + y) = Bj (y)xn−j . (3.12) j j=0 4. Recurrence relations From (1.9), for sn (x) ∼ (g(t), t) we have   g 0 (t) sn (x). sn+1 (x) = x − g(t)

(4.1)

Here we apply this recurrence relation to   (r) Gn+1 (x) t(et + 1) ∼ g(t) = ,t . n+1 2Lir (1 − e−t )

(4.2)

Then (r)

Gn+2 (x) 1 g 0 (t) 1 (r) (r) = xGn+1 (x) − G (x). n+2 n+1 g(t) n + 1 n+1

(4.3)

Observe first that g 0 (t) = (log g(t))0 g(t) 1 et (Lir (1 − e−t ))0 = + t − t e +1 Lir (1 − e−t ) t 1 e 1 Lir−1 (1 − e−t ) = + t − t e + 1 Lir (1 − e−t ) et − 1   1 t t Lir−1 (1 − e−t ) = 1+t− t − t e + 1 Lir (1 − e−t ) et − 1  −t −t 1 2Lir (1 − e ) 2Lir (1 − e ) 1 2 2Lir (1 − e−t ) = + − t t(et + 1) et + 1 2 et + 1 et + 1 −t  t 2 Lir−1 (1 − e ) t(e + 1) − t . e +1 et − 1 2Lir (1 − e−t )

1021

(4.4)

T. KIM ET AL 1014-1031

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G.-W. Jang, J. Kwon

9

Now, g 0 (t) 1 (r) G (x) g(t) n + 1 n+1 1  2Lir (1 − e−t ) 2Lir (1 − e−t ) 1 2 2Lir (1 − e−t ) = + − t t(et + 1) et + 1 2 et + 1 et + 1 2 Lir−1 (1 − e−t )  n x . − t e +1 et − 1 1  2Lir (1 − e−t ) 2Lir (1 − e−t ) 1 2 2Lir (1 − e−t ) = + − n+1 t(et + 1) et + 1 2 et + 1 et + 1 −t  2 Lir−1 (1 − e ) n+1 − t x . e +1 et − 1 Note here that the expression in bracket of (4.5) has order ≥ 1, and

(4.5)

(r)

xn =

t(et + 1) Gn+1 (x) . 2Lir (1 − e−t ) n + 1

(4.6)

We now compute the four pieces in the expression of (??): (r) ∞ 2Lir (1 − e−t ) n+1 X Gl+1 tl n+1 x = x t(et + 1) l + 1 l! l=0 n+1 X 1 n + 1 (r) Gl+1 xn+1−l , = l+1 l

(4.7)

∞ 2Lir (1 − e−t ) n+1 X (r) tl n+1 x = Gl x et + 1 l! l=0 n+1 X n + 1 (r) = Gl xn+1−l , l

(4.8)

 n+1  2 X n+1 2 2Lir (1 − e−t ) n+1 (r) x = t Gl xn+1−l et + 1 et + 1 e +1 l l=0 n+1 X n + 1 (r) 2 xn+1−l = Gl t l e +1 l=0 n+1 X n + 1 (r) = Gl En+1−l (x), l

(4.9)

l=0

l=0

l=0



2 Lir−1 (1 − e−t ) n+1 2 X (r−1) tl n+1 x = t Bl x t t e +1 e −1 e +1 l! l=0  n+1  2 X n+1 (r−1) n+1−l = t Bl x e +1 l l=0 n+1 X n + 1 (r−1) = Bl En+1−l (x). l

(4.10)

l=0

1022

T. KIM ET AL 1014-1031

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

Fourier series of finite products of Bernoulli and Genocchi functions

Putting everything altogether, we arrive at the following theorem. Theorem 4.1. For any integer n ≥ 0, we have  (r) n+1  Gn+2 (x) 1 1  X n + 1 1 (r) (r) = xGn+1 (x) + ( Gl n+2 n+1 n+1 l 2 l=0 n+1  X n + 1 G(r) (r−1) (r) + Bl )En+1−l (x) − ( l+1 + Gl )xn+1−l . l l+1 l=0

Assume that n ≥ 1,   2Lir (1 − e−t ) yt n e |x G(r) (y) = n et + 1     2Lir (1 − e−t )  yt n−1 2Lir (1 − e−t ) yt n−1 = ∂t e |x + (∂ e )|x t et + 1 et + 1

(4.11)

(r)

It is easy to see that the second term in (4.11) is equal to yGn (y). For the first term, we observe that  2Li (1 − e−t )  r ∂t et + 1 −t

=

(1−e 2 Lir−1 1−e−t

) −t

e (et + 1) − 2Lir (1 − e−t )et

(et + 1)2 2 Lir−1 (1 − e−t ) 2Lir (1 − e−t ) 1 2 2Lir (1 − e−t ) = t − + e +1 et − 1 et + 1 2 et + 1 et + 1 So the first term can be written as three sums:     2 Lir−1 (1 − e−t ) yt n−1 2Lir (1 − e−t ) yt n−1 e |x − e | x et + 1 et − 1 et + 1   1 2 2Lir (1 − e−t ) yt n−1 + e |x . t 2 e +1 et + 1 We now compute the three terms in (4.13):   2 Lir−1 (1 − e−t ) yt n−1 e |x et + 1 et − 1   2 Lir−1 (1 − e−t ) yt n−1 = | e x et + 1 et − 1 * + ∞ X 2 tl n−1 (r−1) = | Bl (y) x et + 1 l! l=0     n−1 X n−1 2 (r−1) n−1−l = Bl (y) |x l et + 1 l=0 n−1 X n − 1 (r−1) = Bl (y)En−1−l , l

(4.12)

(4.13)

(4.14)

l=0



2Lir (1 − e−t ) yt n−1 e |x et + 1

1023



(r)

= Gn−1 (y),

(4.15)

T. KIM ET AL 1014-1031

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G.-W. Jang, J. Kwon

 2 2Lir (1 − e−t ) yt n−1 e |x et + 1 et + 1   2 2Lir (1 − e−t ) yt n−1 = | e x et + 1 et + 1 * + ∞ X 2 tl n−1 (r) | Gl (y) x = et + 1 l! l=0     n−1 X n−1 2 (r) n−1−l = |x Gl (y) et + 1 l l=0 n−1 X n − 1 (r) = Gl (y)En−1−l . l

11



(4.16)

l=0

Putting everything altogether, we have the following theorem. Theorem 4.2. For any integer n ≥ 1, we have the following recursive relation. (r)

(1 − x)G(r) n (x) + Gn−1 (x)  n−1 X n − 1 1 (r) (r−1) = En−1−l (Bl (x) + Gl (x)). 2 l l=0

5. Connections with other families of polynomials In this section, we will exploit (1.7) in order to express poly-Genocchi polynomials as linear combinations of well known families of polynomials. To express poly-Genocchi polynomials in terms of Bernoulli polynomials, with noting that (r)

Gn+1 (x) ∼ n+1 (r)

we let

Gn+1 (x) n+1

=

Pn

Cn,k

k=0



   t t(et + 1) e −1 , t , B (x) ∼ , t , n 2Lir (1 − e−t ) t

(5.1)

Cn,k Bk (x). Then

  1 et − 1 2Lir (1 − e−t ) k n t |x = k! t t(et + 1)   t  n e − 1 2Lir (1 − e−t ) n−k = | x k t t(et + 1) +  * t (r) ∞ n e − 1 X Gl+1 tl n−k = | x k t l + 1 l! l=0   n−k    t  n X 1 n−k e − 1 n−k−l (r) = Gl+1 |x k l+1 l t

(5.2)

l=0

1024

T. KIM ET AL 1014-1031

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12

Fourier series of finite products of Bernoulli and Genocchi functions

  n−k   Z 1 n X 1 n−k (r) = un−k−l du Gl+1 k l+1 l 0 l=0   n−k   X n n−k 1 (r) = Gl+1 k (l + 1)(n − k − l + 1) l l=0 n−k X n + 1 n − l  (r) 1 = Gl+1 . (n + 1)k l+1 k−1

(5.3)

l=0

Thus we get the following result. Theorem 5.1. For any integer n ≥ 0, we have the following. n n−k X X 1 n + 1 n − l  (r) (r) Gn+1 (x) = Gl+1 Bk (x). k l+1 k−1 k=0 l=0

Write

(r) Gn+1 (x)

n+1

=

Pn

Cn,k (x)n , with    t(et + 1) ∼ , t , (x)n ∼ 1, et − 1 , 2Lir (1 − e−t )

k=0

(r) Gn+1 (x)

n+1

(5.4)

where (x)n are the lower factorial polynomials. Then  2Lir (1 − e−t ) t k n (e − 1) |x t(et + 1)  2Lir (1 − e−t ) 1 t k n | (e − 1) x = t(et + 1) k! * + ∞ 2Lir (1 − e−t ) X tl n | S2 (l, k) x = t(et + 1) l! l=k     n X n 2Lir (1 − e−t ) n−l = S2 (l, k) |x l t(et + 1) l=k (r) n   X G n = S2 (l, k) n−l+1 l n−l+1 l=k   n 1 X n+1 (r) = S2 (l, k)Gn−l+1 . n+1 l

Cn,k =

1 k! 



(5.5)

l=k

Thus we obtain the following theorem. Theorem 5.2. For any integer n ≥ 0, we have the following.  n X n  X n+1 (r) (r) Gn+1 (x) = S2 (l, k)Gn−l+1 (x)k . l k=0 l=k

Let Obn (x) denote the ordered Bell polynomials given by ∞ X 1 tn xt e = Ob (x) . n 2 − et n! n=0

1025

(5.6)

T. KIM ET AL 1014-1031

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G.-W. Jang, J. Kwon

13

The ordered Bell polynomials have been of great use in number theory and enumerative combinatorics. Here we would like to express the poly-Genocchi polynomials in terms of ordered Bell polynomials. With observing that (r)

Gn+1 (x) ∼ n+1 (r)

we let

Gn+1 (x) n+1

=

Pn

Cn,k

k=0



  t(et + 1) , t , Obn (x) ∼ 2 − et , t , −t 2Lir (1 − e )

(5.7)

Cn,k Obk (x). Then

  −t 1 t 2Lir (1 − e ) k n = (2 − e ) t |x k! t(et + 1)    −t n t 2Lir (1 − e ) n−k x = 2−e | t(et + 1) k * +   (r) ∞ X Gl+1 tl n−k n t = 2−e | x k l + 1 l! l=0    n−k (r)  n X Gl+1 n − k

2 − et |xn−k−l = l+1 l k l=0   n−k  (r)  n X Gl+1 n − k = (2δn−k , l − 1) k l+1 l l=0   n−k  1 X n+1 n−l (r) Gl+1 (2δn−k,l − 1). = n+1 l+1 k

(5.8)

l=0

Thus we get the following result. Theorem 5.3. For any integer n ≥ 0, we have the following.

(r) Gn+1 (x)

n n−k X X n + 1n − l (r) = Gl+1 (2δn−k,l − 1)Obk (x). l+1 k k=0 l=0

We recall here that the Bernoulli polynomials of the second kind bn (x) are given by ∞ X t tn x (1 + t) = bn (x) , (see [9]). log(1 + t) n! n=0

(5.9)

With noting that (r)

Gn+1 (x) ∼ n+1



   t(et + 1) t t , t , bn (x) ∼ ,e − 1 , 2Lir (1 − e−t ) et − 1

1026

(5.10)

T. KIM ET AL 1014-1031

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14

Fourier series of finite products of Bernoulli and Genocchi functions (r)

we let

Gn+1 (x) n+1

Pn

=

k=0

Cn,k bk (x). Then

 t 2Lir (1 − e−t ) t k n (e − 1) |x et − 1 t(et + 1)  t 2Lir (1 − e−t ) 1 t k n = | (e − 1) x et − 1 t(et + 1) k! + * ∞ tl n t 2Lir (1 − e−t ) X | = S2 (l, k) x et − 1 t(et + 1) l! l=k     n X n t 2Lir (1 − e−t ) n−l = S2 (l, k) | x l et − 1 t(et + 1) l=k * + (r) n   ∞ X X Gm+1 tm n−l n t = S2 (l, k) | x l et − 1 m=0 m + 1 m! l=k   (r)  n   n−l X X Gm+1 n − l t n n−l−m |x = S2 (l, k) m+1 m et − 1 l m=0 l=k   n n−l  1 X X n+1 n−m (r) = S2 (l, k)Gm+1 Bn−l−m . n+1 m + 1 l m=0

Cn,k =

1 k! 



(5.11)

l=k

Thus we deduced the following theorem. Theorem 5.4. For any integer n ≥ 0, we have the following. (r)

Gn+1 (x) =

  n X n X n−l  X n+1 n−m (r) S2 (l, k)Gm+1 Bn−l−m bk (x). m + 1 l m=0

k=0 l=k

The exponential polynomials φn (x)(also called Bell or Touchard polynomials) are given by ex(e

t

−1)

=

∞ X

φn (x)

n=0

tn . n!

(5.12)

With noting that (r)

Gn+1 (x) ∼ n+1 (r)

we write

Gn+1 (x) n+1

=

Pn



k=0

Cn,k

 t(et + 1) , t , φn (x) ∼ (1, log(1 + t)) , 2Lir (1 − e−t )

(5.13)

Cn,k φk (x). Then

  1 2Lir (1 − e−t ) k n = (log(1 + t)) |x k! t(et + 1)   2Lir (1 − e−t ) 1 k n = | (log(1 + t)) x t(et + 1) k! * + ∞ −t X 2Lir (1 − e ) tl n = | S1 (l, k) x t(et + 1) l!

(5.14)

l=k

1027

T. KIM ET AL 1014-1031

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G.-W. Jang, J. Kwon

  n   X n 2Lir (1 − e−t ) n−l = S1 (l, k) |x l t(et + 1) l=k (r) n   X Gn−l+1 n = S1 (l, k) l n−l+1 l=k   n 1 X n+1 (r) = S1 (l, k)Gn−l+1 . n+1 l

15

(5.15)

l=k

Thus we have the following result. Theorem 5.5. For any integer n ≥ 0, we have the following. (r)

Gn+1 (x) =

 n X n  X n+1 k=0 l=k

l

(r)

S1 (l, k)Gn−l+1 φk (x).

The Daehee polynomials Dn (x) are given by ∞ X tn log(1 + t) (1 + t)x = Dn (x) . t n! n=0 (r)

Let

Gn+1 (x) n+1

=

Pn

k=0

(r)

(5.16)

Cn,k Dk (x), with noting that   t  t(et + 1) e −1 t , t , Dn (x) ∼ ,e − 1 . 2Lir (1 − e−t ) t

(5.17)

 et − 1 2Lir (1 − e−t ) t k n (e − 1) |x t t(et + 1)  et − 1 2Lir (1 − e−t ) 1 t k n = | (e − 1) x t t(et + 1) k! + * ∞ −t X t tl n e − 1 2Lir (1 − e ) = | S2 (l, k) x t t(et + 1) l! l=k     n X n et − 1 2Lir (1 − e−t ) n−l = S2 (l, k) | x l t t(et + 1) l=k * + (r) n   ∞ X n et − 1 X Gm+1 tm n−l = S2 (l, k) | x l t m + 1 m! m=0 l=k  t  (r)  n   n−l X X Gm+1 n − l n e − 1 n−l−m = S2 (l, k) |x l m+1 m t m=0 l=k Z 1 (r)  n   n−l X X Gm+1 n − l n = S2 (l, k) un−l−m du l m + 1 m 0 m=0

(5.18)

Gn+1 (x) ∼ n+1



Then we have

Cn,k =

1 k! 



l=k

1028

T. KIM ET AL 1014-1031

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

16

Fourier series of finite products of Bernoulli and Genocchi functions

  (r) Gm+1 n−l l (m + 1)(n − l − m + 1) m m=0 l=k    n n−l 1 XX 1 n+1 n−m+1 (r) = S2 (l, k)Gm+1 . n+1 m + 1 m l m=0 =

n   X n

S2 (l, k)

n−l X

(5.19)

l=k

Thus we derived the following result. Theorem 5.6. For any integer n ≥ 0, we have the following. (r)

Gn+1 (x) =

n X n X n−l X k=0 l=k

   1 n+1 n−m+1 (r) S2 (l, k)Gm+1 Dk (x). m + 1 m l m=0

The Mittag-Leffler polynomials Mn (x) are given by 

(r)

Write

Gn+1 (x) n+1

=

Pn

k=0

(r)

1+t 1−t

x =

∞ X n=0

Mn (x)

tn . n!

(5.20)

Cn,k Mk (x), with observing that

Gn+1 (x) ∼ n+1



   t(et + 1) et − 1 , t , M (x) ∼ 1, . n 2Lir (1 − e−t ) et + 1

(5.21)

Then we have * +  k 1 2Lir (1 − e−t ) et − 1 |xn Cn,k = k! t(et + 1) et + 1   −t 2 −k k 2Lir (1 − e ) 1 t k n =2 ( t ) | (e − 1) x e +1 t(et + 1) k! + * ∞ −t X tl n 2 k 2Lir (1 − e ) −k ) | S2 (l, k) x =2 ( t e +1 t(et + 1) l! l=k     n −t X n 2 −k k 2Lir (1 − e ) n−l =2 S2 (l, k) ( t ) | x l e +1 t(et + 1) l=k * + (r) n   ∞ X X Gm+1 tm n−l n 2 −k k =2 S2 (l, k) ( t ) | x l e + 1 m=0 m + 1 m! l=k   (r)  n   n−l X X Gm+1 n − l n 2 =2−k S2 (l, k) ( t )k |xn−l−m l m+1 m e +1 m=0 l=k     (r) n n−l X X Gm+1 n − l n (k) =2−k S2 (l, k) En−l−m l m + 1 m m=0 l=k   n X n−l  −k X 2 n+1 n−m (r) (k) = S2 (l, k)Gm+1 En−l−m . n+1 m + 1 l m=0

(5.22)

l=k

1029

T. KIM ET AL 1014-1031

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, G.-W. Jang, J. Kwon (k)

Here En

are the Euler numbers of order k given by  k X ∞ 2 tn = En(k) . t e +1 n! n=0

17

(5.23)

Thus we deduced the following theorem. Theorem 5.7. For any integer n ≥ 0, we have the following.    n X n X n−l X n−m (r) (r) (k) −k n + 1 Gn+1 (x) = 2 S2 (l, k)Gm+1 En−l−m Mk (x). m + 1 l m=0 k=0 l=k

The Boole polynomials Bln (x) are given by ∞ X tn 1 x (1 + t) = Bln (x) . λ 1 + (1 + t) n! n=0

(5.24)

To express the poly-Genocchi polynomials in terms of Boole polynomials, we let Pn = k=0 Cn,k Blk (x), with noting that   (r)  Gn+1 (x) t(et + 1) ∼ , t (5.25) , Bln (x) ∼ 1 + eλt , et − 1 . −t n+1 2Lir (1 − e ) Then   −t 1 k n λt 2Lir (1 − e ) t Cn,k = (e − 1) |x (1 + e ) k! t(et + 1)   −t λt 2Lir (1 − e ) 1 t k n = (1 + e ) | (e − 1) x t(et + 1) k! * + ∞ −t X tl n λt 2Lir (1 − e ) S2 (l, k) x = (1 + e ) | t(et + 1) l! l=k     n −t X n λt 2Lir (1 − e ) n−l = S2 (l, k) 1 + e | x l t(et + 1) l=k * + (r) n   ∞ X X (5.26) Gm+1 tm n−l n λt = S2 (l, k) 1 + e | x l m + 1 m! m=0 l=k  (r)  n   n−l X X Gm+1 n − l

n = S2 (l, k) 1 + eλt |xn−l−m l m+1 m m=0 l=k  (r)  n   n−l X X Gm+1 n − l n (δn−l,m + λn−l−m ) = S2 (l, k) m + 1 m l m=0 l=k    n n−l 1 X X n+1 n−m (r) = S2 (l, k)Gm+1 (δn−l,m + λn−l−m ). n+1 m + 1 l m=0

(r)

Gn+1 (x) n+1

l=k

So we obtained the following theorem. Theorem 5.8. For any integer n ≥ 0, we have the following.   n X n X n−l  X n+1 n−m (r) (r) Gn+1 (x) = S2 (l, k)Gm+1 (δn−l,m + λn−l−m )Blk (x). m + 1 l m=0 k=0 l=k

1030

T. KIM ET AL 1014-1031

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

18

Fourier series of finite products of Bernoulli and Genocchi functions

References 1. A. Bayad and Y. Hamahata, Arakawa-Kaneko L-functions and generalized poly-Bernoulli polynomials, J. Number Theory, 131(2011), 1020–1036. 2. Y. Hamahata, Poly-Euler polynomials and Arakawa-Kaneko type zeta functions, Funct. Approx. Comment. Math., 51(2014), no.1, 7–22. 3. H. Jolany, M. Aliabadi, R. B. Corcino and M. R. Darafsheh, A note on multi poly-Euler numbers and Bernoulli polynomials, Gen. Math., 20(2012), no. 2-3, 122–134. 4. M. Kaneko, Poly-Bernoulli numbers, J. Theorie de Nombres, 9(1997), 221–228. 5. D.S. Kim, T. Kim, Higher-order Bernoulli and poly-Bernoulli mixed type polynomials, Georgian Math. J., 22(2015), no.1, 26–33. 6. D.S. Kim, T. Kim, A note on poly-Bernoulli and higher-order poly-Bernoulli polynomials, Russ. J. Math. Phys., 22(2015), no.1, 26–33. 7. D. S. Kim, T. Kim, H. I. Kwon and T. Mansour, Degenerate poly-Bernoulli with umbral calculus viewpoint, J. Inequal. Appl., 2015 215:228. 8. T. Kim, Some identities for the Bernoulli, the Euler and Genocchi numbers and polynomials, Adv. Stud. Contemp. Math., 20(2010), no.1, 23–28. 9. T. Kim, D.S. Kim, D.Dolgy, and J.-J. Seo, Bernoulli polynomials of the second kind and their identities arising from umbral calculus, J. Nonlinear Sci. Appl., 9(2016), no.4, 860–869. 10. Y. Ohno and Y. Sasaki, On the parity of poly-Euler numbers, RIMS kokyuroku, Bessatsu, B32(2012), 271–278. 11. S. Roman, The Umbral Calculus, Pure and Applied Mathematics, vol.111 Academic Press, Inc. [Harcourt Brace Jovanovich, Publishers], New York, 1984. 12. S. Roman, More on the umbral calculus, with emphasis on the q-umbral calculus, J. Math. Anal. Appl., 107(1985), 222–254. 13. Y. Sasaki, On generalized poly-Bernoulli numbers and related L-functions, J. Number Theory, 132(2012), 156–170. 1 Department of Mathematics, Kwangwoon University, Seoul, 139-701, Republic of Korea, Department of Mathematics, College of Science, Tianjin Polytechnic University, Tianjin 300160, China. E-mail address: [email protected] 2

Department of Mathematics, Sogang University, Seoul, 121-742, Republic of Korea. E-mail address: [email protected] 3 Department of Mathematics, Kwangwoon University, Seoul, 139-701, Republic of Korea. E-mail address: [email protected] 4,∗

Department of Mathematics Education and RINS, Gyeongsang National University, Jinju, Gyeongsangnamdo, 52828, Republic of Korea E-mail address: [email protected]

1031

T. KIM ET AL 1014-1031

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On a class of certain dynamic inequalities in three independent variables on time scales Zareen. A. Khan Department of Mathematics Princess Nourah bint Abdul Rahman University, Saudi Arabia [email protected] December 23, 2017 Abstract The objective of this paper is to investigate and extend some Pachpatte type dynamic inequalities on time scales in three independent variables which provide explicit bounds on unknown functions and their derivatives. Some applications are also discussed here in order to illustrate the usefulness of our results.

Keywords and phrases: Time scales, integral inequality, dynamic inequality, explicit estimates . 2010 Mathematics Subject Classification: 26E70, 26D10, 34N05.

1

Introduction

The theory of time scales was created by Hilger [11] in order to unify the theories of differential equations and of difference equations and in order to extend those theories to other kinds of the so-called ”dynamic equations”. The two main features of the calculus on time scales are unification and extension of continuous and discrete analysis. Since then, many authors have studied different aspects of dynamic and integral inequalities on time scales by using various techniques(for example, see[1-22] and the references therein). Our work is related to the explicit bounds of Pachpatte [15], [19] in the form of dynamic inequalities with three variables which can be used as handy 1

1032

Khan 1032-1046

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

tools to study the properties of certain differential and dynamic equations on time scales. We hope the results given here will assure greater importance in near future.

2

Notations and Preliminaries on Time Scales

Here, we begin by giving some necessary material for our study. Throughout this paper, we assume that a time scale T is an arbitrary nonempty closed subset of R where R denotes the set of real numbers and R+ = [0, ∞). Also T1 and T2 be two time scales with atleast two points and Φ = T1 × T2 and N = Φ × I, where J = [a, b]. Furthermore f : T −→ R is rd-continuous provided f is continuous right dense point T and has a finite left sided limit at each left dense point of T and will be denoted by Crd . The partial delta derivative of z(x, y) for (x, y) ∈ N with respect to x is denoted by z 41 (x, y). Before giving our main results, we introduce the following lemma which is required in our theorems. Lemma[8]: Let u, a, f ∈ Crd (T1 × T2 , R) and a is nondecreasing in each of the variables. If Z xZ y u(x, y) ≤ a(x, y) + f (s, t)u(s, t)4t4s, (2.1) x0

y0

for (x, y) ∈ T1 × T2 , then u(x, y) ≤ a(x, y)eC(x,y) (x, x0 ), where

Z

(2.2)

y

C(x, y) =

f (x, t)4t,

(2.3)

y0

for (x, y) ∈ T1 × T2 .

3

Results and discussion

Our main results are based on the following theorems of integral inequalities with three independent variables which can be used in certain situations. Theorem 3.1. Let u(x, y, z), f (x, y, z) and g(x, y, z) ∈Crd (N, R+ ) and c be a nonnegative constant. If Z xZ yZ bh i 2 2 2 u (x, y, z) ≤ c +2 f (s, t, r)u (s, t, r)+g(s, t, r)u(s, t, r) 4r4t4s, x0

y0

a

(3.1) 2

1033

Khan 1032-1046

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

for (x,y,z) ∈ N, then u(x, y, z) ≤ p(x, y, z)eW (x,y) (x, x0 ),

(3.2)

where x

Z

y

Z

b

Z

g(s, t, r)4r4t4s,

p(x, y, z) = c + x0

and Z

y0 y

b

Z

f (x, t, r)4r4t,

W (x, y) = y0

(3.3)

a

(3.4)

a

for (x, y, z) ∈ N . Proof. Let c > 0 and define a function z(x, y) by the right hand side of (3.1), then √ z(x0 , y) = c2 , u(x, y, z) ≤ z(x, y), (3.5) and

Z

2

x

Z

y

z(x, y) = c + 2

E(s, t)4t4s, x0

(3.6)

y0

where Z bh i 2 E(x, y) = f (x, y, r)u (x, y, r) + g(x, y, r)u(x, y, r) 4r.

(3.7)

a

From (3.5), (3.6) and (3.7), we notice that Z y 41 z (x, y) = 2 E(x, t), y0

which implies z 41 (x, y) √ ≤2 z(x, y)

Z

y

y0

Z bh

i √ f (x, t, r) z(x, t) + g(x, t, r) 4r4t.

(3.8)

a

Now from (3.8) above we have by taking delta integral Z xZ yZ b √ √ z(x, y) ≤ p(x, y, z) + f (s, t, r) z(s, t)4r4t4s, x0

y0

(3.9)

a

where p(x, y, z) be defined as in (3.3). Clearly p(x, y, z) is nonnegative, continuous and nondecreasing (x, y, z) ∈ N . We assume that p(x, y, z) > 0 for (x, y, z) ∈ N . From (3.9), it is easy to observe that √ √ Z xZ yZ b z(x, y) z(s, t) ≤1+ f (s, t, r) 4r4t4s. (3.10) p(x, y, z) p(s, t, r) x0 y0 a 3

1034

Khan 1032-1046

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Define a function v(x, y) by Z xZ v(x, y) = 1 + x0

y

Z

y0

a

b

√ z(s, t) f (s, t, r) 4r4t4s, p(s, t, r)

it follows from (3.10) and (3.11) that √ v(x0 , y) = 1, z(x, y) ≤ p(x, y, z)v(x, y),

(3.11)

(3.12)

now from (3.11) and delta derivative with respect to x yields v 41 (x, y) ≤ W (x, y), v(x, y)

(3.13)

where W (x, y) be defined as in (3.4). Keeping y fixed and set x = s and delta integrate the resulting inequality with respect to s from x0 to x for (x, y, z) ∈ N and using (3.12), we have v(x, y) ≤ eW (x,y) (x, x0 ).

(3.14)

The desired inequality in (3.2) follows by using (3.14) and (3.12) in (3.5). Remark1: If we take f = 0 and T1 = T2 = R, then Theorem 3.1 reduces to [18] Theorem 1(a3 ). Remark2: It is interesting to note that the inequalities established in Theorem 3.1 with three variables become the inequalities of Theorem 1 (a1 )and Theorem 4 (b1 )withT1 = T2 = R and T1 = T2 = Z of one variable respectively given in [19]. Remark3: Theorem 3.1 reduces to [18] Theorem 2 (b3 ) with T1 = T2 = Z and f = 0. Theorem 3.2. Let u(x, y, z), f (x, y, z), g(x, y, z), h(x, y, z) and m(x, y, z) ∈Crd (N, R+ ). If Z xZ yZ bh i u(x, y, z) ≤ g(x, y, z)+h(x, y, z) f (s, t, r)u(s, t, r)+m(s, t, r) 4r4t4s, x0

y0

a

(3.15) for (x, y, z) ∈ N , then u(x, y, z) ≤ g(x, y, z) + h(x, y, z)p1 (x, y, z)eW ? (x,y) (x, x0 ), where ?

Z

y

Z

W (x, y) =

b

f (x, t, r)h(x, t, r)4r4t, y0

(3.16)

a

4

1035

Khan 1032-1046

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Z

x

Z

y

p1 (x, y, z) = x0

Z bh

y0

i f (s, t, r)g(s, t, r) + m(s, t, r) 4r4t4s,

(3.17)

a

for (x, y, z) ∈ N . Proof. Define a function z(x, y) by Z xZ yZ bh i f (s, t, r)u(s, t, r) + m(s, t, r) 4r4t4s, z(x, y) = x0

y0

(3.18)

a

then z(x0 , y) = 0, u(x, y, z) ≤ g(x, y, z) + h(x, y, z)z(x, y), and

Z

x

Z

y

E(s, t)4t4s,

z(x, y) = x0

where

(3.19) (3.20)

y0

Z bh i E(x, y) = f (x, y, r)u(x, y, r) + m(x, y, r) 4r.

(3.21)

a

From (3.19), (3.20) and (3.21), we notice that Z y 41 z (x, y) = 2 E(x, t), y0

z

41

Z

y

(x, y) ≤ y0

Z

y

+ y0

Z bh

i f (s, t, r)g(s, t, r) + m(s, t, r) 4r4t

a

Z bh i f (x, t, r)h(x, t, r)z(x, t) 4r4t, a

which implies Z

x

Z

y

z(x, y) ≤ p1 (x, y, z) + x0

y0

Z bh

i f (s, t, r)h(s, t, r)z(s, t) 4r4t4s,

a

where p1 (x, y, z) be defined as in (3.17). The remaining proof can be completed by following a suitable modifications at the proof of Theorem 3.1 given above. Here we omit the details. Remark4: By taking m=0, it is easy to observe that the bound obtained in Theorem 3.2 reduces to the bound obtained in Theorem 2.1 given in [15]. Remark5: Theorem 3.2 with T1 = T2 = R and m=0 reduces to Theorem 1(a2 ) given in [18]. Remark6: If we take T1 = T2 = Z and m=0, then Theorem 3.2 takes the form of Theorem 2(b2 ) given in [18]. 5

1036

Khan 1032-1046

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Theorem 3.3. Let u(x, y, z), f (x, y, z), g(x, y, z) and c be defined as in Theorem 3.1. If u2 (x, y, z) ≤ Z xZ yZ bh 2 f (s, t, r)u(s, t, r) c +2 d

Z sZ tZ u(s, t, r)+ s0

t0

a

y0

x0





i g(σ, ς, τ )u(σ, ς, τ )4τ 4ς4σ +h(s, t, r)u(s, t, r) 4r4t4s,

c

(3.22) for (x, y, z) ∈ N , then u(x, y, z) ≤ p2 (x, y, z)eW1 (x,y) (x, x0 ),

(3.23)

where Z

x

y

Z

b

Z

p2 (x, y, z) = c +

h(s, t, r)4r4t4s, x0

and Z

y

W1 (x, y) = y0

y0

(3.24)

a

Z bh i f (x, t, r) + g(x, t, r) 4r4t,

(3.25)

a

for (x, y, z) ∈ N . Proof. Let c > 0 and define a function z(x, y) by the right hand side of (3.22), then √ z(x0 , y) = c2 , u(x, y, z) ≤ z(x, y), (3.26) and 2

Z

x

Z

y

z(x, y) = c + 2

E(s, t)4t4s, x0

(3.27)

y0

where E(x, y) = Z bh Z xZ yZ  f (x, y, r)u(x, y, r) u(x, y, r) + a

x0

y0

d

g(s, t, τ )u(, t, τ )4τ 4t4s



c

i +h(x, y, r)u(x, y, r) 4r.

(3.28)

From (3.26), (3.27) and (3.28), we notice that Z y 41 z (x, y) = 2 E(x, t), y0

6

1037

Khan 1032-1046

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

which implies z 41 (x, y) √ ≤2 z(x, y) Z

xZ tZ

+ t0

x0

d

Z

y

Z bh

√ f (x, t, r) z(x, t)

a

y0

 i √ g(s, ς, τ ) z(s, ς)4τ 4ς4s + h(x, t, r) 4r4t,

(3.29)

c

now from (3.29) above we have by taking delta integral √ z(x, y) ≤ p2 (x, y, z) Z xZ yZ bh Z sZ tZ d √ i √ + f (s, t, r) z(s, t)+ g(σ, ς, τ ) z(σ, ς)4τ 4ς4σ 4r4t4s, x0

y0

a

s0

t0

c

(3.30) where p2 (x, y, z) be defined as in (3.24). Clearly p2 (x, y, z) is nonnegative, continuous and nondecreasing (x, y, z) ∈ N . We assume that p2 (x, y, z) > 0 for (x, y, z) ∈ N . From (3.30), it is easy to observe that √ Z xZ yZ bh  √z(s, t) z(x, y) f (s, t, r) ≤1+ p2 (x, y, z) p2 (s, t, r) x0 y0 a √ Z sZ tZ d i z(σ, ς) g(σ, ς, τ ) 4τ 4ς4σ 4r4t4s. (3.31) + p2 (σ, ς, τ ) s0 t0 c Define a function v(x, y) by Z xZ yZ bh  √z(s, t) v(x, y) = 1 + f (s, t, r) p2 (s, t, r) x0 y0 a √ Z sZ tZ d i z(σ, ς) + g(σ, ς, τ ) 4τ 4ς4σ 4r4t4s, (3.32) p2 (σ, ς, τ ) s0 t0 c it follows from (3.31) and (3.32) that √ v(x0 , y) = 1, z(x, y) ≤ p2 (x, y, z)v(x, y). (3.33) Now from (3.33) and delta derivative with respect to x yields v 41 (x, y) ≤ W1 (x, y), v(x, y)

(3.34)

where W1 (x, y) be defined as in (3.25). Keeping y fixed and set x = s and delta integrate the resulting inequality with respect to s from x0 to x for (x, y, z) ∈ N and using (3.33), we have v(x, y) ≤ eW1 (x,y) (x, x0 ).

(3.35)

The desired inequality in (3.23) follows by using (3.33) and (3.35) in (3.26).

7

1038

Khan 1032-1046

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Remark7: We note that Theorem 3.3 is the further extension of Theorem 1(a2 ) given in [19] with three variables. Remark8: Theorem 3.3 with f=0 and T1 = T2 = R converted into Theorem 1(a3 ) given in [18]. Remark9: By taking g=0 and T1 = T2 = R in Theorem 3.3, it reduces to Theorem 1(a1 ) given in [19] with three variables. Remark10: If we put g=0 and T1 = T2 = Z in Theorem 3.3, then it reduces to Theorem 4(b1 ) given in [19] with three variables. Theorem 3.4. Let u(x, y, z), f (x, y, z), g(x, y, z) and c be defined as in Theorem 3.1. Let L ∈ Crd (N, R+ ) which satisfies the condition 0 ≤ L(x, y, z, v) − L(x, y, z, w) ≤ k(x, y, z, w)(v − w),

(3.36)

for (x, y, z) ∈ N and v ≥ w ≥ 0 where k ∈ Crd (N, R+ ). If 2

x

Z

2

y

Z

u (x, y, z) ≤ c + 2 x0

y0

Z bh f (s, t, r)u(s, t, r)L(s, t, r, u(s, t, r)) a

i +g(s, t, r)u(s, t, r) 4r4t4s,

(3.37)

u(x, y, z) ≤ p(x, y, z) + q(x, y, z)eW2 (x,y) (x, x0 ),

(3.38)

for (x, y, z) ∈ N , then

where p(x,y,z) be defined as in (3.3) and Z

x

y

Z

b

Z

q(x, y, z) = c + x0

y0

Z

y

Z

W2 (x, y) = y0

f (s, t, r)L(s, t, r, p(s, t, r))4r4t4s,

(3.39)

f (x, t, r)k(x, t, r, p(x, t, r))4r4t,

(3.40)

a b

a

for (x, y, z) ∈ N . Proof. Let c > 0 and define a function z(x, y) by the right hand side of (3.37), then √ z(x0 , y) = c2 , u(x, y, z) ≤ z(x, y), (3.41) and 2

Z

x

Z

y

z(x, y) = c + 2

E(s, t)4t4s, x0

(3.42)

y0

8

1039

Khan 1032-1046

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

where E(x, y) =

Z bh

i f (x, y, r)u(x, y, r)L(x, y, r, u(x, y, r)) + g(x, y, r)u(x, y, r) 4r.

a

(3.43) From (3.41), (3.42) and (3.43), we notice that Z y 41 E(x, t), z (x, y) = 2 y0

which implies z 41 (x, y) √ ≤2 z(x, y)

y

Z

Z bh

y0

f (x, t, r)L(x, t, r,



i z(x, t)) + g(x, t, r) 4r4t. (3.44)

a

Now from (3.44) above we have by taking delta integral Z xZ yZ b √ √ z(x, y) ≤ p(x, y, z) + f (s, t, r)L(s, t, r z(s, t))4r4t4s, (3.45) x0

y0

a

where p(x, y, z) be defined as in (3.3). Let Z xZ yZ b √ f (s, t, r)L(s, t, r, z(s, t))4r4t4s, v(x, y) = x0

y0

(3.46)

a

it follows from (3.45) and (3.46) that √ v(x0 , y) = 0, z(x, y) ≤ p(x, y, z) + v(x, y).

(3.47)

Now from (3.46), (3.47) and (3.36), we observe that Z xZ yZ b f (s, t, r)k(s, t, r, p(s, t, r))v(s, t)4r4t4s, v(x, y) ≤ q(x, y, z) + x0

y0

a

(3.48) where q(x, y, z) be defined as in (3.39). Clearly q(x, y, z) is nonnegative, continuous and nondecreasing (x, y, z) ∈ N . We assume that q(x, y, z) > 0 for (x, y, z) ∈ N . From (3.48), it is easy to observe that v(x, y) ≤ R(x, y), q(x, y, z)

(3.49)

where Z

x

Z

y

Z

R(x, y) ≤ 1+

b

f (s, t, r)k(s, t, r, p(s, t, r)) x0

y0

a

v(s, t) 4r4t4s, (3.50) q(s, t, r)

9

1040

Khan 1032-1046

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

and R(x0 , y) = 1.

(3.51)

Now from (3.50) and delta derivative with respect to x yields R41 (x, y) ≤ W2 (x, y), R(x, y)

(3.52)

where W2 (x, y) be defined as in (3.40). Keeping y fixed and set x = s and delta integrate the resulting inequality with respect to s from x0 to x for (x, y, z) ∈ N and using (3.51), we have R(x, y) ≤ eW2 (x,y) (x, x0 ).

(3.53)

The desired inequality in (3.38) follows by using (3.47), (3.49) and (3.53) in (3.41).

4

Some Applications

In this section, we present some applications of the Theorem 3.2. Consider the following dynamic integral equation of the form Z xZ yZ b F (x, y, z, s, t, r, u(s, t, r))4r4t4s, (4.1) u(x, y, z) = d(x, y, z) + x0

y0

a

where (x, y, z) ∈ N and d ∈ Crd (N, R), F ∈ Crd (N 2 × R, R). First, we shall give the following theorem concerning the estimate on the solution of (4.1). Theorem 4.1. : Assume that the function F in (4.1) satisfies the condition h i | F (x, y, z, s, t, r, u(s, t, r)) |≤ q(x, y, z) f (s, t, r) | u | +h(s, t, r) , (4.2) where f, q, h ∈ Crd (N, R). If u(x, y, z) is a solution of (4.1), then | u(x, y, z) |≤ d(x, y, z) + q(x, y, z)B(x, y, z)eM (x,y) (x, x0 ), Z

x

Z

y

B(x, y, z) = x0

y0

(4.3)

Z bh i f (s, t, r) | d(s, t, r) + h(s, t, r) | 4r4t4s, (4.4) a

Z

y

Z

M (x, y) =

b

f (x, t, r)q(x, t, r)4r4t, y0

(4.5)

a

for (x, y, z) ∈ N . 10

1041

Khan 1032-1046

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. Let u ∈ Crd (N, R) be a solution of (4.1). Then from the hypotheses, we have Z xZ yZ b | F (x, y, z, s, t, r, u(s, t, r)) | 4r4t4s | u(x, y, z) |≤| d(x, y, z) | + x0

Z

x

Z

y0 y

≤| d(x, y, z) | +q(x, y, z) x0

a

Z bh

y0

(4.6) i f (s, t, r) | u(s, t, r) | +h(s, t, r) 4r4t4s,

a

(4.7) for (x, y, z) ∈ N . Now an application of the inequality given in Theorem 3.2 to (4.7) yields the desired estimate in (4.3). The next theorem gives the estimation on the solution of equation (4.1) assuming that the function F in equation (4.1) satisfies the Lipschitz type condition. Theorem 4.2. : Assume that the function F in (4.1) satisfies the condition h i | F (x, y, z, s, t, r, u)−F (x, y, z, s, t, r, v) |≤ q(x, y, z) f (s, t, r) | u−v | +h(s, t, r) , (4.8) where f, q, h ∈ Crd (N, R). If u(x, y, z) is a solution of (4.1), then | u(x, y, z) − d(x, y, z) |≤ k(x, y, z) + q(x, y, z)B1 (x, y, z)eM (x,y) (x, x0 ), (4.9) where M (x, y) be defined as in (4.5) and Z

x

Z

y

b

Z

| F (x, y, z, s, t, r, d(s, t, r)) | 4r4t4s,

k(x, y, z) = x0

Z

x

y0

Z

y

Z

B1 (x, y, z) = x0

y0

(4.10)

a b

h i f (s, t, r) | k(s, t, r) + h(s, t, r) | 4r4t4s, (4.11)

a

for (x, y, z) ∈ N . Proof. Let u ∈ Crd (N, R) be a solution of (4.1). Then from the hypotheses, we have Z xZ yZ b | u(x, y, z) − d(x, y, z) |≤ | F (x, y, z, s, t, r, u(s, t, r)) | 4r4t4s x0

Z

x

Z

y

Z



y0

a

b

| F (x, y, z, s, t, r, u(s, t, r))−F (x, y, z, s, t, r, d(s, t, r)) | 4r4t4s x0

y0

a

11

1042

Khan 1032-1046

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

x

Z

y

Z

b

Z

| F (x, y, z, s, t, r, d(s, t, r)) | 4r4t4s

+ x0

y0

a

Z

x

Z

y

≤ k(x, y, z)+q(x, y, z) x0

Z bh i f (s, t, r) | u(s, t, r)−d(s, t, r) | +h(s, t, r) 4r4t4s,

y0

a

(4.12) for (x, y, z) ∈ N . Now an application of the inequality given in Theorem 3.2 to (4.12) yields the desired estimate in (4.9). We next consider the equation (4.1) and also the following integral equation Z xZ yZ b v(x, y, z) = g(x, y, z) + L(x, y, z, s, t, r, v(s, t, r))4r4t4s, (4.13) x0

y0

a

for g ∈ Crd (N, R), L ∈ Crd (N 2 × R, R). Theorem 4.3. : Suppose that the function F in (4.1) satisfies the condition (4.8). Then for every solution v ∈ Crd (N, R) of (4.13) and u ∈ Crd (N, R) a solution of equation (4.1), we have the estimates | u(x, y, z)−v(x, y, z) |≤ [d1 (x, y, z)+k1 (x, y, z)]+q(x, y, z)B2 (x, y, z)eM (x,y) (x, x0 ), (4.14) where M (x, y) be defined as in (4.5) and d1 (x, y, z) =| d(x, y, z) − g(x, y, z) |, Z

x

Z

y

(4.15)

b

Z

| F (x, y, z, s, t, r, v(s, t, r))−L(x, y, z, s, t, r, v(s, t, r)) | 4r4t4s,

k1 (x, y, z) = x0

Z

y0 x

Z

a y

Z

B2 (x, y, z) = x0

y0

b

(4.16) h i f (s, t, r) d(s, t, r) + k(s, t, r) + h(s, t, r) 4r4t4s,

a

(4.17) for (x, y, z) ∈ N . Proof. Since u(x, y, z) and v(x, y, z) are respectively solutions of (4.1) and (4.13) we have | u(x, y, z) − v(x, y, z) |≤| d(x, y, z) − g(x, y, z) | Z

x

Z

y

Z

b

| F (x, y, z, s, t, r, u(s, t, r))−F (x, y, z, s, t, r, v(s, t, r)) | 4r4t4s

+ x0

y0

a

12

1043

Khan 1032-1046

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Z

x

Z

y

Z

b

| F (x, y, z, s, t, r, v(s, t, r))−L(x, y, z, s, t, r, v(s, t, r)) | 4r4t4s,

+ x0

y0

a

(4.18) | u(x, y, z) − v(x, y, z) |≤ d1 (x, y, z) + k1 (x, y, z) Z xZ yZ bh i +q(x, y, z) f (s, t, r) | u − v | +h(s, t, r) 4r4t4s, x0

y0

(4.19)

a

for (x, y, z) ∈ N . Now an application of Theorem 3.2 to (4.19) yields (4.14). Conflict: There is no conflict of interest regarding the publication of this manuscript. Acknowledgment: The author is very grateful to the editor and referee for their valuable evaluations.

References [1] George. A. Anastassiou., Time scales inequalities, Int. J. Diff. Equa., Vol.5, no.1, (2010), pp. 1-23. [2] Douglas. R. Anderson., Dynamic double integral inequalities in two independent variables on time scales, J. Math. Inequal., Vol.2 , no.2, (2008), pp. 163-184. [3] M. Bohner and A. Peterson., Dynamic equations on time scales, An introduction with Applications, Birkhauer Basel, 2001. [4] E. A. Bohner., M. Bohner and F. Akin., Pachpatte inequalities on on time scales , J. Inequal. Pure. Appl. Math., 6(1), (2005), Art. 6. [5] K. Boukerrioua., Note on some nonlinear integral inequalities in two independent variables on time scales and applications, Int. J. Open. Problems. Compt. Math., Vol.5, no.3, (2012), pp. 111-122. [6] Sung. Kyu. Choi., Namjip .Koo., On some nonlinear integral inequalities on time scales, J. Chungcheong. Math. Soc., Vol.28, no.1 ,(2013), pp. 71-84. [7] Ahmet. Eroglu., New integral inequality on time scales, Appl. Math. Sci., Vol.4, no.33 ,(2010), pp. 1607-1616.

13

1044

Khan 1032-1046

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[8] R. A. C. Ferreira., D. F. M. Torres., Some linear and nonlinear integral inequalities on time scales in two independent variables, Nonlinear Dynamics and Systems Theory., Vol.9, no.2, (2009), pp. 161-169. [9] R.A.C. Ferreira., D. F. M. Torres., Generalizations of Gronwall Bihari inequalities on time scales, J. Diff. Equ. Appl., Vol.15, no.6, (2009), pp. 529-539. [10] Juan. Gu., Some new nonlinear Volterra Fredholm type dynamic integral inequalities on time scales, Appl. Math. Comp., Vol.245 , Issue C, (2014), pp. 232-245. [11] S. Hilger., Analysis on Measure chain-A unified approach to continuous and discrete calculus, Results. Math.,18: (1990), 18-56. [12] Li. Wei. Nian., Bounds for certain new integral inequalities on time scales, Adv. Difference. Equ., Vol.2009, (2009), pp. 1-16. [13] Li. Wei. Nian., Some integral inequalities useful in the theory of certain partial dynamic equations on time scales, Comp. Math. Appl., Vol.61, (2011), pp. 1754-1759. [14] J. Pecaric., Some Hilbert type inequalities on time scales, Annal. Univ. Craiova. Math. Comp. Sci., Vol.40(2), (2013), pp. 249-254. [15] D. B. Pachpatte., Some new dynamic inequality on time scale in three variables, J. Taibah. Univ. Sci., (2016). https://doi.org/10.1016/j.jtusci.2017.02.007 [16] D. B. Pachpatte., Estimates of Certain Iterated dynamic inequalities on time scales , Qual. Theory. Dyn. Syst., Vol.13, no.2, (2014), 353-362. [17] D. B. Pachpatte., Integral Inequality for partial dynamic equations on time scales, Electron. J. Differential Equations, Vol.2012, (2012), no.50, 1-7. [18] B. G. Pachpatte., New integral and finite difference inequalities in three variables, Demonstratio. Mathematica., Vol. XLII, (2009), 341-351. [19] B. G. Pachpatte., On some new inequalities related to certain inequalities in the theory of differential equations, J. Math. Anal. Appl., Vol.189, (1995), 128-144.

14

1045

Khan 1032-1046

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[20] Feng. Qinghua., Meng. Fanwei., Gronwall Bellman type inequalities on time scales and their applications, Wseas. Trans. Math., Issue 7. Vol.10, (2011), pp. 239-247. [21] Y. Suna., T. Hassanb., Some nonlinear dynamic integral inequalities on time scales, Appl. Math. Comput., Vol.220, (2013), pp. 221-225. [22] Wang. Tonglin ., Xu. Run/, Some integral inequalities in two independent variables on time scales, J. Math. Inequa., Vol.6, no.1, (2012), pp. 107-118.

15

1046

Khan 1032-1046

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Divisibility of Generalized Catalan Numbers and Raney Numbers Jacob Bobrowski



Tian-Xiao He



and

Peter J.-S. Shiue



Abstract The Raney numbers, also called Fuss-Catalan numbers, are defined by Rk (n, r) =  r kn+r /(kn + r). A generalized Lobb numbers is introduced. The relationn ship between Raney numbers and generalized Lobb numbers and the relationship between generalized Lobb numbers and generalized Catalan numbers are given. Based on the relationships among Raney numbers, generalized Lobb numbers, and generalized Catalan numbers, we present the divisibility of a certain class of those numbers. AMS Subject Classification: 05A15, 65B10, 33C45, 39A70, 41A80. Key Words and Phrases: Raney numbers, Fuss-Catalan numbers, Lobb numbers, generalized Lobb numbers, generalized Catalan numbers, Catalan numbers, divisibility.

1

Introduction

The Fuss-Catalan numbers or Raney numbers are numbers of the form   r kn + r Rk (n, r) := , kn + r n

(1)

which are named after N. I. Fuss and E. C. Catalan (see [5, 6, 13, 15, 17]) and initially studied by Raney in [17]. The Fuss-Catalan numbers have several combinatorial applications. They count for example (see, for instance, [8]): (i) the number of ways of subdividing a convex polygon, with n(k − 1) + 2 vertices, into n disjoint k + 1-gons by means of nonintersecting diagonals, (ii) the number of sequences (a1 , a2 , ..., ank ), where ai ∈ {1, 1 − k}, with all partial sums a1 + ... + ak nonnegative and with a1 + ... + ank = 0, ∗ Department of Mathematical Sciences, University of Nevada, Las Vegas, Las Vegas, Nevada, 89154-4020, USA. † Department of Mathematics, Illinois Wesleyan University, Bloomington, Illinois 61702, USA ‡ Department of Mathematical Sciences, University of Nevada, Las Vegas, Las Vegas, Nevada, 89154-4020, USA. This work was completed while on sabbatical leave from University of Nevada, Las Vegas, and the author would like to thank UNLV for its support.

1

1047

Bobrowski ET AL 1047-1058

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

J. Bobrowski, T. X. He, and P. J.-S. Shiue

(iii) the number of noncrossing partitions π of 1, 2, ..., n(k − 1), such that k − 1 divides the cardinality of every block of π, (iv) the number of k-cacti formed of n polygons, etc. See [1, 3, 4, 6, 16, 18, 19] for more details and examples. The generating function Rk (t) for the Fuss-Catalan numbers, {Rk (n, 1)}n≥0 is called the generalized binomial series in [6], and it satisfies the function equation Rk (t) = 1 + tRk (t)k . Hence, from the Lambert’s formula for the Taylor expansion of the powers of Rk (t) (see [6]), we have   X kn + r n r t (2) Rkr ≡ Rk (t)r = mn + r n n≥0

for all r ∈ Z. Equation (2) implies the following formula of Rk (t): Rk (t) = 1 + tRkk (t).

(3)

Lobb [12] defines his Lobb numbers as Ln,m

  2n 2n + 1 := m+n+1 m+n

for n ≥ m ≥ 0, which have the following combinatorial interpretation: Let Ln,m be the number of sequences of length 2n with n + m of the terms equal 1 and n − m of the terms equal −1. It is natural to extend Lobb numbers to the number of sequences with (k − 1)n + m terms equal to 1 and n − m terms equal to 1 − k. We denote the extended Lobb numbers by Lkm,n and define them as   km + 1 kn Lkn,m := . (4) (k − 1)n + m + 1 n − m Generalized Lobb numbers include many number sequences as their special cases. For instance, when k = 2, L2n,m are classical Lobb numbers; when m = 0,   1 kn k Ln,0 = =: Ck (n) (5) (k − 1)n + 1 n are the generalized Catalan numbers; when k = 2 and m = 0, then   1 2n L2n,0 = =: C2 (n) ≡ C(n) n+1 n

(6)

are the classical Catalan numbers; when k = 1, then   n L1n,m = m are the binomial numbers. Other special cases can be seen in [7, 8]. The following relationship between generalized Lobb numbers and Raney numbers make us switch our results between the generalized Lobb numbers and the Raney numbers (see, for example, [9]): Lkn,m = Rk (n − m, km + 1), (7)

1048

Bobrowski ET AL 1047-1058

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Divisibility of Generalized Catalan Numbers and Raney Numbers

3

which can be proved below. From (1) and using the transformation n → n − m and r → km + 1, we have   km + 1 k(n − m) + km + 1 Rk (n − m, km + 1) = k(n − m) + km + 1 n−m   km + 1 kn + 1 km + 1 (kn + 1)! = = kn + 1 n − m kn + 1 ((k − 1)n + m + 1)!(n − m)!   km + 1 kn = = Lkn,m , (k − 1)n + m + 1 n − m or equivalently, Lkn+ r−1 , r−1 = Rk (n, r). k

(8)

k

This paper is arranged as follows. In next section, we discuss the relationship between the generalized Lobb numbers and Raney numbers and the relationship between the generalized Lobb numbers and Ballot numbers. Some properties and identities of the generalized Lobb numbers are given. In Section 3, we discuss the divisibilities of the generalized Lobb numbers, Raney numbers, and generalized Catalan numbers.

2

Properties of the generalized Lobb numbers and Raney numbers

Proposition 2.1 Let Lkn,m be defined by (4). Then Lkn,m

 =

   kn kn − (k − 1) . n−m n−m−1

(9)

Particularly, L2n,m

      2m + 1 2n 2n 2n = = − . n+m+1 n−m n−m n−m−1

(10)

For generalized Catalan numbers and Catalan numbers, there are Lkn,0 L2n,o



   kn kn = Ck (n) = − (k − 1) n n−1     2n 2n = C2 (n) = − . n n−1

and (11)

Formula (9) also shows L1n,m =

1049

  n . m

Bobrowski ET AL 1047-1058

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

J. Bobrowski, T. X. He, and P. J.-S. Shiue

Proof. The right-hand side of (9) generates     kn kn (k − 1)(n − m) RHS = − kn − n + m + 1) n − m n−m    (k − 1)(n − m) kn = 1− kn − n + m + 1) n−m   km + 1 kn = = Lkn,m . (k − 1)n + m + 1 n − m The results for special cases are straightforward from (9). Proposition 2.2 Let Lkn,m be defined by (4). Then it can be written as   km + 1 kn + 1 Lkn,m = . kn + 1 n − m

(12)

Particularly, L2n,m =

      2m + 1 2n + 1 2m + 1 2n 2m + 1 2n = = . 2n + 1 n − m n+m+1 n−m n+m+1 n+m

(13)

Proof. The right-hand side of (12) can be changed to (kn + 1)! km + 1 kn + 1 (n − m)!(kn − n + m + 1)! (kn)! km + 1 = Lkn,m . (k − 1)n + m + 1 (n − m)!((k − 1)n + m)!

RHS = =

The special case (13) follows from (12). Proposition 2.3 Let Lkn,m be defined by (4). Then Lkn−m, r−1 = Lkn−m, r−2 + Lkn−m−1, r−2 +1 . k

k

(14)

k

Proof. From Corollary 3 of [14], we have Rk (n, r) = Rk (n, r − 1) + Rk (n − 1, r + k − 1),

(15)

which implies (14) by using (8). Lobb numbers L2n,m are also related to Ballot numbers (see, for example, [6])     a−b a+b a−b a+b B(a, b) = = . (16) a+b a a+b b Proposition 2.4 Let Lkn,m and B(a, b) be defined by (4) and (16), respectively. Then L2n,m = B(n + m + 1, n − m), (17) or equivalently, B(n, m) = L2n+m−1 , n−m−1 . 2

(18)

2

Hence, L2n,m is a special case of Ballot numbers.

1050

Bobrowski ET AL 1047-1058

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Divisibility of Generalized Catalan Numbers and Raney Numbers

5

Proof. Substituting a = n + m + 1 and b = n − m yields   2m + 1 2n + 1 = L2n,m , B(n + m + 1, n − m) = 2n + 1 n − m where the last equation is from (12). Corollary 2.5 Let Lkn,m be defined by (4). Then L2n,m = L22n−1 , 2m−1 + L22n−1 , 2m+1 . 2

2

2

(19)

2

Proof. From [6], we have B(n, k) = B(n − 1, k) + B(n, k − 1). Thus, B(n + m + 1, n − m) = B(n + m, n − m) + B(n + m + 1, n − m − 1), which implies (19) by using (18).

3

Divisibility of generalized Catalan numbers, generalized Lobb numbers, and Raney numbers

We now consider the divisibility properties of generalized Lobb numbers, generalized Catalan numbers, and Raney numbers.  Theorem 3.1 Let Ck (n) := kn n /((k − 1)n + 1) (k ≥ 2), and let n = (k + 1)t + 1 (t = 0, 1, 2, . . .). Then (a) If k is odd, then ((k − 1)t + 1)| Ck (n). (20) (b) If k is even and t is even, then ((k − 1)t + 1)| Ck (n).

(21)

(c) If k is even and t is odd, then ((k − 1)t + 1)| 2Ck (n).

(22)

Proof. First, we express Lobb numbers Lkn,m in terms of generalized Catalan numbers Ck (n):   km + 1 kn Lkn,m = (k − 1)n + m + 1 n − m (kn)! = (km + 1) (n − m)!((k − 1)n + m + 1)! (kn)! n−j+1 = (km + 1) Πm j=1 n!((k − 1)n + 1)! (k − 1)n + j + 1 n−j+1 m = (km + 1)Ck (n)Πj=1 . (k − 1)n + j + 1

1051

Bobrowski ET AL 1047-1058

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

J. Bobrowski, T. X. He, and P. J.-S. Shiue

Therefore, for non-negative integer t Lk(k+1)t+1,1 = Ck ((k + 1)t + 1) = Ck ((k + 1)t + 1)

(k + 1)((k + 1)t + 1) (k − 1)((k + 1)t + 1) + 2

(k + 1)t + 1 . (k − 1)t + 1

(23)

Secondly, we consider different cases for k. In case (a), let k be odd, i.e., k = 2l + 1, l = 0, 1, 2, . . .. Then, (k − 1)t + 1 = 2lt + 1 and (k + 1)t + 1 = 2(l + 1)t + 1. Noting (k + 1)t + 1 = (k − 1)t + 1 + 2t, we have gcd [(k + 1)t + 1, (k − 1)t + 1] = gcd [2t, (k − 1)t + 1] = 1 because (k−1)t+1 is an odd integer. From (23), we have proved ((k − 1)t + 1)| Ck ((k+ 1)t + 1) when k is odd. In case (b), we assume k = 2l (l ∈ Z), an even number. Then (k − 1)t + 1 = (2l − 1)t + 1, (k + 1)t + 1 = (2l + 1)t + 1 = (2l − 1)t + 1 + 2t. Thus, gcd [(k + 1)t + 1, (k − 1)t + 1] = gcd [2t, (2l − 1)t + 1]. If t is even, then gcd [2t, (2l − 1)t + 1] = 1, which implies ((k − 1)t + 1)| Ck ((k + 1)t + 1). Finally, considering the case (c), where k is an even number 2l and t is an odd number 2u + 1 (l, u ∈ Z), we have gcd [2t, (2l − 1)t + 1] = gcd [2(2u + 1), (2l − 1)(2u + 1) + 1] = gcd [2(2u + 1), −2u] = 2 So that ((k − 1)t + 1)| 2Ck ((k + 1)t + 1), which completes the proof. Example 3.1 For k = 3 and t = 1, we have (k − 1)t + 1 = 3 and (k + 1)t + 1 = 5. C3 (5) = 273 and 3|C3 (5). For k = 3 and t = 2, we have (k − 1)t + 1 = 5 and (k+1)t+1 = 9. Thus 5|C3 (9) = 246675. For k = 2 and t = 2, we have (k−1)t+1 = 3 and (k + 1)t + 1 = 7, which implies 3|C2 (7) = 429. Example 3.2 For k = 3, from Theorem 3.1 there holds 2t + 1| C3 (4t + 1). Thus, 1| C3 (1), 3| C3 (5), 5| C3 (9), 7| C3 (13), 9| C3 (17), etc. Here, {2t + 1 : t = 0, 1, 2, . . .} and {4t + 1 : t = 0, 1, 2, . . .} form arithmetical sequences.

1052

Bobrowski ET AL 1047-1058

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Divisibility of Generalized Catalan Numbers and Raney Numbers

7

Remark From the expression of Lobb numbers Lkn,m in terms of generalized Catalan numbers Ck (n), we have   k+1 kn n k Ln,1 = = (k + 1)Ck (n) . (24) (k − 1)n + 2 n − 1 (k − 1)n + 2 Hence, provided gcd ((k + 1)n, (k − 1)n + 2) = 1, or equivalently, gcd ((k + 1)n, −2(n − 1)) = 1,

(25)

((k − 1)n + 2)|Ck (n).

(26)

we have Note (25) implies that (k + 1)n must be odd, or equivalently, n is odd and k is even. In other words, if k is even and t is even, Ck ((k + 1)t + 1) has two divisors (k − 1)t + 1 and (k 2 − 1)t + k + 1, which are given by (21) and (26) respectively. Example 3.3 If n = 3 and k = 2, then gcd ((k + 1)n, (k − 1)n + 2) = gcd (9.4) = 1. From (26), 5|C2 (3). Actually, C2 (3) = 5. Similarly, if n = 3 and k = 4, then gcd (11, 4) = 1, which implies 11|C4 (3). Actually, C4 (3) = 22. While n = 3 and k = 6 yield 17|C6 (3), where C6 (3) = 51, and n = 5 and k = 2 yield 7|C2 (5), where C2 (5) = 42. An non-example is given by n = 7 and k = 2, which yields gcd (21, −12) = 3 6= 1. Since C2 (7) = 429, which does not have divisor 21. Sury [20] proves if n 6= (pl − 1)/(p − 1) for any prime p ≥ 3, then p| Cp (n).

(27)

A natural question is what is a divisor of Cp ((pl − 1)/(p − 1)). We now apply Theorem 3.1 to answer this question. Corollary 3.2 Let Ck (n) be the generalized Catalan numbers defined by (5). Then for an odd integer l we have   l p −1 pl + 1 C (p ≥ 3). (28) p p+1 p−1 Proof. If k = p ≥ 3 and n = (k + 1)t + 1 = (pl − 1)/(p − 1), then  l  1 p −1 pl − p t= −1 = 2 , k+1 p−1 p −1 where t is an integer because l is odd. Thus (k − 1)t + 1 = (k + 1)t + 1 − 2t =

pl − 1 pl − p pl + 1 −2 2 = . p−1 p −1 p+1

Substituting k = p, n = (k+1)t+1 = (pl −1)/(p−1), and (k−1)t+1 = (pl +1)/(p+1) into (20) of Theorem 3.1, we obtain (28).

1053

Bobrowski ET AL 1047-1058

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

J. Bobrowski, T. X. He, and P. J.-S. Shiue

In [11, 10], the following result is given (2l+1 − 3) C2 (Ml ), where Ml are the Mersenne numbers, 2l − 1 (l = 0, 1, 2, . . .), and C2 (n) = L2n,0 are classical Catalan numbers. Thus, for l = 4 and 5, there are 29|C2 (M4 ) and 61|C2 (M5 ), respectively. We obtain the following corollary from Theorem 3.1, which extends the results shown in [11, 10]. Corollary 3.3 Let C2 (n) be the Catalan numbers. Then  2l + 1 C2 2l − 1 3

(29)

for l = 1, 3, 5, 7, . . .. Combining [11], C2 (Mk ) has two different divisors, 2l+1 − 3 and (2l + 1)/3, when odd l > 1. Furthermore, if l is odd and not a prime, then all of its divisors are divisors of C2 (2l − 1). Proof. Set (k + 1)t + 1 = 2l − 1. Then t = (2l − 2)/(k + 1). Let k = 2, we have t = (2l − 2)/3. Here t is even because 3t = 2l − 2 is even. Thus, 2l + 1 . 3 From Theorem 3.1 (b), for k = 2 and t = (2l − 2)/3 we obtain  2` + 1 = ((k − 1)t + 1) Ck ((k + 1)t + 1) = C 2l − 1 3 (k − 1)t + 1 = (2 − 1)t + 1 =

for l = 1, 3, 5, 7, . . .. To prove that C2 (Ml ) has two different divisors, 2l+1 − 3 and (2l + 1)/3, when odd l > 1, we only need to show 2l+1 − 3 6=

2l + 1 3

when l > 1. This is clearly true, otherwise, there is a contradiction 3 · 2l − 2l−1 = 5 for l > 1. Finally, from [2], we know that (2l + 1)/3 is a prime only if l is a prime. Hence, if l is not a prime number, then (2l + 1)/3 is a composite number. Additionally, when l is odd and not a prime, then all of the divisors of such composite number are also divisors of C2 (2l − 1) because of (29).  l Example 3.4 For l = 1, 3, 5, and 7, Corollary 3.3 generates 2 3+1 C2 2l − 1 for l = 1, 3, 5, and 7. For examples, 1|C2 (1), 3|C2 (7), 11|C2 (31), and 43|C2 (127).

1054

Bobrowski ET AL 1047-1058

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Divisibility of Generalized Catalan Numbers and Raney Numbers

9

Among the above results, the second and fourth are new. Actually, we may give infinitely many new results from Corollary 3.3. We now extend the result on Catalan numbers shown in Corollary 3.3 to generalized Catalan numbers. Theorem 3.4 Let Ck (n) := Lkn,0 be the generalized Catalan numbers defined by (5). If k is even and ` ≡ 1 (mod φ(k + 1)), where φ(n) is Euler’s totient function, then   2l − 2 (30) + 1 Ck (2l − 1). (k − 1) k+1 Proof. Let (k + 1)t + 1 = 2l − 1, the Mersenne numbers. Then t = (2l − 2)/(k + 1), where t is even because k is even, and 2l − 2 (k − 1)t + 1 = (k − 1) + 1. k+1 To prove (30), we need to show the right-hand side of the above equation is an integer, i.e., (k − 1)(2l − 2) ≡ 0 (mod k + 1). The last equation is equivalent to −4(2l−1 − 1) ≡ 0 (mod k + 1) because (k − 1)(2l − 2) = (k + 1)(2l − 2) − 4(2l−1 − 1). Therefore, if gcd (4, k + 1) = 1, then we need 2l−1 ≡ 1 (mod k + 1).

(31)

From Euler theorem, if gcd (2, k + 1) = 1; i.e., k is even, then 2φ(k+1) ≡ 1 (mod k + 1), where φ(n) is Euler’s totient function, i.e., the number of the positive integers less than or equal to n that are relatively prime to n. Comparing the above equation and equation (31), we should have l − 1 ≡ 0 (mod φ(k + 1)), or equivalently, ` = uφ(k + 1) + 1 for some integer u. Now, we assume that k is even and ` ≡ 1 (mod φ(k+1)), where φ is Euler’s totient function. Under the conditions, ((k−1)t+1 = (k−1)(2l −2)/(k+1) is an integer when t = (2l −2)/(k+1). Now k is even and t is even. Then by Theorem 3.1 (b)   2l − 2 + 1 Ck (2l − 1). (k − 1) k+1

1055

Bobrowski ET AL 1047-1058

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

J. Bobrowski, T. X. He, and P. J.-S. Shiue

Example 3.4 Let Ck (n) := Lkn,0 be the generalized Catalan numbers defined by (5). Since k = 4 is even, and φ(k + 1) = φ(5) = 4, from Theorem 3.4, for l ≡ 1 (mod 4), i.e., ` = 1, 5, 9, . . ., we have   2l − 2 + 1 C4 (2l − 1), (4 − 1) 4+1 which implies 3 · 2l − 1 l C4 (2 − 1) 5

(32)

for l = 1, 5, 9, . . .. In Theorem 3.4, the condition l ≡ 1 (mod φ(k + 1)) can be replaced by l ≡ 1 (mod k) when k + 1 is a prime number greater than 3. In this case, the condition of that k is even is automatically satisfied. Hence, we have the following corollary of Theorem 3.4. Corollary 3.5 Let Ck (n) := Lkn,0 be the generalized Catalan numbers defined by (5). If k + 1 is a prime number greater than 3, and ` ≡ 1 (mod k), then   2l − 2 (k − 1) (33) + 1 Ck (2l − 1). k+1 Proof. It is sufficient to note that if k + 1 is a prime number greater than 3, then k is an even number and φ(k + 1) = k. Hence, Theorem 3.4 implies the corollary. From the above discussion, the key to get divisibility of Ck (n) by using (23) is ((k − 1)t + 1)| (k + 1)t + 1. Hence, we may have a special case of Theorem 3.1, which is more easier to be applied. Example 3.6 Let Ck (n) := Lkn,0 be the generalized Catalan numbers defined by (5). If t is even, then (t + 1)| C2 (3t + 1)

and

(3t + 1)| C4 (5t + 1).

(34)

Thus, 1| C2 (1), 3| C2 (7), 5| C2 (13), 7| C2 (19), 9| C2 (25), etc. and 1| C4 (1), 7| C4 (11), 13| C4 (21), 19| C4 (31), 25| C4 (41), etc. In general, if t = 2m, then we have (2m + 1)| C2 (6m + 1), (6m + 1)| C4 (10m + 1), (10m + 1)| C6 (14m + 1), etc. for k = 2, 4, 6, etc. More generally, for k = 2u and t = 2m, we have (2(2u − 1)m + 1)| C2u (2(2u + 1)m + 1), where the sequences of {2(2u−1)m+1t = 0, 1, 2, . . .}, {2(2u−1)m+1m = 0, 1, 2, . . .}, {2(2u + 1)m + 1 t = 0, 1, 2, . . .}, and {2(2u + 1)m + 1 m = 0, 1, 2, . . .} are arithmetical sequences.

1056

Bobrowski ET AL 1047-1058

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Divisibility of Generalized Catalan Numbers and Raney Numbers

11

We now transfer the divisibility from the generalized Lobb numbers to Raney numbers and Ballot numbers. Theorem 3.6 Let Rk (n, m) be Raney numbers defined by (1). If k is an odd integer, then we have ((k − 1)t + 1)| Rk ((k + 1)t + 1, 1). (35) If k is an even integer and n = (k + 1)t + 1 is odd, then (35) holds. If both k and n = (k + 1)t + 1 are even, then ((k − 1)t + 1)| 2Rk ((k + 1)t + 1, 1)

(36)

holds. Proof. By using the relationship (7) between the generalized Lobb numbers and Raney numbers, we may establish Theorem 3.6 from Theorem 3.1. Theorem 3.7 Let B(a, b) be Ballot numbers defined by (16). If n = 3t + 1 is odd, then we have ((k − 1)t + 1)| B((k + 1)t + 2, (k + 1)t + 1). (37) If n = 3t + 1 is even, then t is odd and ((k − 1)t + 1)| 2B((k + 1)t + 2, (k + 1)t + 1)

(38)

holds. Proof. From the relationship between L2n,m and B(a, b) shown in (17) and Theorem 3.1, we may obtain (37) and (38).

References [1] D. Armstrong, Generalized Noncrossing Partitions and Combinatorics of Coxeter Groups, Memoirs of the American Mathematical Society, 202 (2009), 159 pp. [2] P. Berrizbeitia, F. Luca, and R. Melham, On a compositeness test for (2p + 1)/3, J. Integer Seq. 13 (2010), no. 1, Article 10.1.7, 6 pp. [3] M. Bousquet-M´elou and G. Schaeffer, Enumeration of planar constellations, Adv. in Appl. Math. 24 (2000), 337-368. [4] P. H. Edelman, Chain enumeration and non-crossing partitions, Discrete Math. 31 (1980), 171–180. [5] P. J. Forrester and D.-Z. Liu, Raney distributions and random matrix theory, J. Stat. Phys. 158 (2015), 1051–1082. [6] R. Graham, D. Knuth, and O. Patashnik, Concrete Mathematics, AddisonWesley, 1989.

1057

Bobrowski ET AL 1047-1058

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12

J. Bobrowski, T. X. He, and P. J.-S. Shiue

[7] T.-X. He, Parametric Catalan numbers and Catalan triangles, Linear Algebra Appl. 438 (2013), no. 3, 1467–1484. [8] T.-X. He and L. W. Shapiro, Fuss-Catalan Matrices, Their Weighted Sums, and Stabilizer Subgroups of the Riordan Group, Linear Algebra Appl. 2017, accepted. [9] T. Koshy, Lobb’s generalization of Catalan’s parenthesization problem, College Math. J. 40 (2009), no. 2, 99–107. [10] T. Koshy and Z. Gao, Some divisibility properties of Catalan numbers, Math. Gaz. 95.13 (2011), 96–102. [11] T. Koshy and Z. Gao, Catalan numbers with Mersenne subscripts, Math. Sci. 38 (2013), no. 2, 86–91. [12] A. Lobb, Deriving the nth Catalan number, Math. Gaz. 83 (1999), 109–110. [13] W. Mλotkowski, Fuss-Catalan numbers in noncommutative probability, Doc. Math. 15 (2010), 939–955. [14] C. H. Pah and M. R. Wahiddin, Combinatorial interpretation of Raney numbers and tree enumerations, Open J. Discrete Math. 5 (2015), no.1, 1-9. ˙ [15] K. A. Penson and K. Zyczkowski, Product of Ginibre matrices: Fuss-Catalan and Raney distributions, Phys. Rev. E, 83 (2011), 061118, 9 pp. [16] J. H. Przytycki and A. S. Sikora, Polygon Dissections and Euler, Fuss, Kirkman, and Cayley Numbers, J. Combina. Theory, Series A, 92 (2000), no. 1, 68–76. [17] G. N. Raney, Functional composition patterns and power series reversion, Trans. Amer. Math. Soc. 94 (1960), 441–451. [18] A. Schuetz and G. Whieldon, Polygonal Dissections and Reversions of Series, arXiv:1401.7194. [19] R. P. Stanley, Catalan Numbers, Cambridge University Press, New York, 2015. [20] B. Sury, Generalized Catalan numbers: linear recursion and divisibility, J. Integer Seq. 12 (2009), no. 7, Article 09.7.5, 7 pp.

1058

Bobrowski ET AL 1047-1058

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

COUPLED FIXED POINT THEOREMS FOR TWO MAPS IN CONE b-METRIC SPACES OVER BANACH ALGEBRAS YOUNG-OH YANG* AND HONG JOON CHOI Abstract. In this paper, we obtain some coupled fixed point results for two mappings satisfying some contractive conditions in cone b-metric spaces over Banach algebras with a solid cone by virtue of the properties of spectral radius. Also we give an example as an applications of one of the main results.

1. Introduction In 2007 the concept of cone metric space was introduced by Huang and Zhang in [4], where they generalized metric space by replacing the set of real numbers with an ordering Banach space, investigated the convergence in cone metric space and proved some fixed point theorems for contractive mappings on these spaces. Recently, in ([1],[3], [4], [6], [7], [8], [10], [11]) some common fixed point theorems have been proved for contractive maps on cone metric spaces. Gnana Bhaskar and Lakshmikantham([2]) introduced the concept of coupled fixed point of a mapping F : X × X → X and investigated some coupled fixed point theorems in partially ordered sets. Since then this new concept is extended and used in various directions([2], [5]). In 2013, in order to generalize the Banach contraction principle to more general form, Liu and Xu([8]) introduced the concept of cone metric spaces over Banach algebras, by replacing Banach spaces with Banach algebras as the underlying spaces of cone metric spaces, and proved some fixed point theorems of generalized Lipschitz mappings with weaker and natural conditions on generalized Lipschitz constants by means of spectral radius. Furthermore, they gave an example to explain that the fixed point theorems in cone metric spaces over Banach algebras are not equivalent to those in metric spaces. Motivated by the above works, in this paper, we obtain some coupled fixed point results for two mappings satisfying some contractive conditions in cone b-metric spaces over Banach algebras without the assumption of normal cones by virtue of the properties of spectral radius. Our main results generalize the corresponding main results 1991 Mathematics Subject Classification. 47H10, 54H25. Key words and phrases. cone metric spaces over Banach algebras, coupled fixed point, spectral radius. *The corresponding author: [email protected] (Young-Oh Yang). 1

1059

YOUNG-OH YANG ET AL 1059-1069

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

YANG AND CHOI

2

in cone metric spaces obtained by H.K. Nashie, Y. Rohen and C. Thokchom([5]. Also we give an example as an applications of one of the main results. Let A always be a real Banach algebra. That is, A is a real Banach space in which an operation of multiplication is defined, subject to the following properties (for all x, y, z ∈ A, α ∈ R): (1) (2) (3) (4)

(xy)z = x(yz); x(y + z) = xy + xz and (x + y)z = xz + yz; α(xy) = (αx)y = x(αy); kxyk ≤ kxkkyk.

In this paper, we shall assume that A is a real Banach algebra with a unit (i.e., a multiplicative identity) e. An element x ∈ A is said to be invertible if there is an inverse element y ∈ A such that xy = yx = e. The inverse of x is denoted by x−1 . Let A be a real Banach algebra with a unit e and θ the zero element of A. A nonempty closed subset P of Banach algebra A is called a cone if (i) (ii) (iii) (iv)

{θ, e} ⊂ P ; αP + βyP ⊂ P for all nonnegative real numbers α, β ; P2 = PP ⊂ P ; P ∩ (−P ) = {θ} i.e, x ∈ P and −x ∈ P imply x = θ.

For any cone P ⊆ A, we can define a partial ordering ¹ with respect to P by x ¹ y if and only if y − x ∈ P . x ≺ y stands for x ¹ y but x 6= y. Also, we use x ¿ y to indicate that y − x ∈ int P where int P denotes the interior of P . If int P 6= ∅ then P is called a solid cone. Definition 1.1. Let X be a nonempty set, s ≥ 1 be a constant and A be a real Banach algebra. Suppose the mapping d : X × X → A satisfies the following conditions: (1) θ ¹ d(x, y) for all x, y ∈ X and d(x, y) = θ if and only if x = y ; (2) d(x, y) = d(y, x) for all x, y ∈ X ; (3) d(x, y) ¹ s[d(x, z) + d(z, y)] for all x, y, z ∈ X. Then d is called a cone b-metric on X, and (X, d) is called a cone b-metric space over the Banach algebra A. If s = 1,then every cone b-metric is a cone metric space. Definition 1.2. Let (X, d) be a cone b-metric space over the Banach algebra A. Let {xn } be a sequence in X and x ∈ X. (1) If for every c ∈ A with θ ¿ c, there exists a natural number N such that d(xn , x) ¿ c for all n > N , then {xn } is said to be convergent and {xn }

1060

YOUNG-OH YANG ET AL 1059-1069

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

COUPLED FIXED POINT THEOREMS FOR TWO MAPS IN CONE b-METRIC SPACES

3

converges to x, and the point x is the limit of {xn }. We denote this by lim xn = x or xn → x (n → ∞).

n→∞

(2) If for all c ∈ A with θ ¿ c, there exists a positive integer N such that d(xn , xm ) ¿ c for all m, n > N , then {xn } is called a Cauchy sequence in X. (3) A cone b-metric space (X, d) is said to be complete if every Cauchy sequence in X is convergent. Definition 1.3. Let E be a real Banach space with a solid cone P . A sequens {xn } ⊂ P is called a c−sequence if for any c ∈ A with θ ¿ c, there exists a positive integer N such that xn ¿ c for all n ≥ N . Lemma 1.4. ([6], [8]) Let E be a real Banach space with a cone P . Then (p1 ) If a ¿ b and b ¿ c, then a ¿ c. (p2 ) If a ¹ b and b ¿ c, then a ¿ c. (p3 ) If a ¹ b + c for each θ ¿ c, then a ¹ b. (p4 ) If θ ¹ u ¿ c for each θ ¿ c, then u = θ. (p5 ) If {xn }, {yn } are sequences in E such that xn → x, yn → y and xn ¹ yn for all n ≥ 1, then x ¹ y. We define the spectral radius of x ∈ A by r(x) = lim kxn k1/n = inf kxn k1/n . n→∞

n≥1

Lemma 1.5. ([8]) Let x, y be vectors in the Banach algebra A. If x and y commute, then the spectral radius ρ satisfies the following properties : (1) r(xy) ≤ r(x)r(y); (2) r(x + y) ≤ r(x) + r(y); (3) |r(x) − r(y)| ≤ r(x − y). Lemma 1.6. ([8]) Let A ba a real Banach algebra with a unit e and x ∈ A. If 0 ≤ r(x) < 1, then P i (1) e − x is invertible, (e − x)−1 = ∞ i=0 x and r((e − x)−1 ) ≤ (1 − r(x))−1 . (2) kxn k → 0 as n → ∞. Lemma 1.7. ([6]) Let P be a solid cone in the Banach algebra A and kxn k → 0 as n → ∞, then {xn } is a c−sequence.

1061

YOUNG-OH YANG ET AL 1059-1069

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

YANG AND CHOI

Lemma 1.8. ([8]) Let P ba a solid cone in a Banach space A and and {xn } be a sequence in P . If k ∈ P is an arbitrarily given vector and {xn } is c−sequence in P , then {kxn } is a c−sequence. Lemma 1.9. ([8]) Let A be a Banach algebra with a unit e and let P be a solid cone in A. The following assertions hold true: (1) For any x, y ∈ A, a ∈ P with x ¹ y, we have ax ¹ ay. (2) For any sequences {xn }, {yn } ⊂ A with xn → x (n → ∞) and yn → y (n → ∞) where x, y ∈ A, we have xn yn → xy (n → ∞). Lemma 1.10. ([8]) Let (X, d) be a complete cone metric space over a Banach algebra A and let P be a solid cone in A. Let {xn } be a sequence in X. If {xn } converges to x ∈ X, then we have: (1) {d(xn , x)} is a c-sequence. (2) For any p ∈ N, {d(xn , xn+p )} is a c-sequence. Lemma 1.11. ([8]) Let P be a solid cone in a real Banach algebra A and k ∈ P . If r(k) < 1,then the following assertions hold true: (1) If u ∈ P and u ¹ ku, then u = θ. (2) If k º θ,then (e − k)−1 º θ. Definition 1.12. Let (X, d) be a cone b-metric space over the Banach algebra A. An element (x, y) ∈ X × X is called a coupled fixed point of F : X × X → X if x = F (x, y) and y = F (y, x). Note that if (x, y) is a coupled fixed point of F , then (y, x) is also a coupled fixed point of F .

2. Main results In the following, we always assume that (X, d) is a cone b-metric space over the Banach algebra A. In this section, we establish a common coupled fixed point results for two mappings S, T : X × X → X satisfying certain contractive condition on cone metric spaces over Banach algebras. The following results generalize the corresponding results in cone metric spaces obtained by H.K. Nashie, Y. Rohen and C. Thokchom([5]). Theorem 2.1. Let (X, d) be a complete cone b-metric space over the Banach algebra A with the coefficient s ≥ 1 and let P be a solid cone in A. Suppose that S, T :

1062

YOUNG-OH YANG ET AL 1059-1069

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

COUPLED FIXED POINT THEOREMS FOR TWO MAPS IN CONE b-METRIC SPACES

5

X × X → X are two mappings satisfying the condition d(S(x, y), T (u, v)) ¹ a1 d(x, u) + a2 d(S(x, y), x) + a3 d(y, v)

(2.2.1)

+ a4 d(T (u, v), u) + a5 d(S(x, y), u) + a6 d(T (u, v), x) for all x, y, u, v ∈ X, where ai ∈ P and ai aj = aj ai (i, j = 1, 2, 3, 4, 5, 6). If s[r(a1 ) + r(a2 ) + r(a3 )] + r(a4 ) + r(a5 ) + (s2 + s)r(a6 ) < 1, then S and T have a common coupled fixed point in X. Proof. Let x0 and y0 be any points X. Let x2k+1 = S(x2k , y2k ),

y2k+1 = S(y2k , x2k )

and x2k+2 = T (x2k+1 , y2k+1 ),

y2k+2 = T (y2k+1 , x2k+1 )

for k = 0, 1, 2, · · · . Then we have d(x2k+1 , x2k+2 ) = d(S(x2k , y2k ), T (x2k+1 , y2k+1 )) ¹ a1 d(x2k , x2k+1 ) + a2 d(S(x2k , y2k ), x2k ) + a3 d(y2k , y2k+1 ) + a4 d(T (x2k+1 , y2k+1 ), x2k+1 ) + a5 d(S(x2k , y2k ), x2k+1 ) + a6 d(T (x2k+1 , y2k+1 ), x2k ) = a1 d(x2k , x2k+1 ) + a2 d(x2k+1 , x2k ) + a3 d(y2k , y2k+1 ) + a4 d(x2k+2 , x2k+1 ) + a5 d(x2k+1 , x2k+1 ) + a6 d(x2k+2 , x2k ) ¹ a1 d(x2k , x2k+1 ) + a2 d(x2k+1 , x2k ) + a3 d(y2k , y2k+1 ) + a4 d(x2k+2 , x2k+1 ) + a5 · θ + sa6 [d(x2k , x2k+1 ) + d(x2k+1 , x2k+2 )]. which implies that (e − a4 − sa6 )d(x2k+1 , x2k+2 ) ¹ (a1 + a2 + sa6 )d(x2k , x2k+1 ) + a3 d(y2k , y2k+1 ). By hypothesis and Lemma 1.8, e − (a4 + sa6 ) is invertible. Putting α = (e − a4 − sa6 )−1 (a1 + a2 + sa6 ), β = (e − a4 − sa6 )−1 a3 , we have d(x2k+1 , x2k+2 ) ¹ αd(x2k , x2k+1 ) + βd(y2k , y2k+1 ).

1063

(2.2.2)

YOUNG-OH YANG ET AL 1059-1069

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

YANG AND CHOI

6

Similarly, d(y2k+1 , y2k+2 ) = d(S(y2k , x2k ), T (y2k+1 , x2k+1 )) ¹ a1 d(y2k , y2k+1 ) + a2 d(S(y2k , y2k ), y2k ) + a3 d(x2k , x2k+1 ) + a4 d(T (y2k+1 , x2k+1 ), y2k+1 ) + a5 d(S(y2k , x2k ), y2k+1 ) + a6 d(T (y2k+1 , x2k+1 ), y2k ) = a1 d(y2k , y2k+1 ) + a2 d(y2k+1 , y2k ) + a3 d(x2k , x2k+1 ) + a4 d(y2k+2 , y2k+1 ) + a5 d(y2k+1 , y2k+1 ) + a6 d(y2k+2 , y2k ) ¹ a1 d(y2k , y2k+1 ) + a2 d(y2k+1 , y2k ) + a3 d(x2k , x2k+1 ) + a4 d(y2k+2 , y2k+1 ) + a5 · θ + sa6 [d(y2k , y2k+1 ) + d(y2k+1 , y2k+2 )]. which implies that d(y2k+1 , y2k+2 ) ¹ αd(y2k , y2k+1 ) + βd(x2k , x2k+1 ).

(2.2.3)

Adding both inequalities, we have d(x2k+1 , x2k+2 ) + d(y2k+1 , y2k+2 ) ¹ (α + β)[d(x2k , x2k+1 ) + d(y2k , y2k+1 )] = h[d(x2k , x2k+1 ) + d(y2k , y2k+1 )] where h = α + β = (e − a4 − sa6 )−1 (a1 + a2 + a3 + sa6 ). Also we have d(x2k+2 , x2k+3 ) + d(y2k+2 , y2k+3 ) = h[d(x2k+1 , x2k+2 ) + d(y2k+1 , y2k+2 )]. Therefore d(xn , xn+1 ) + d(yn , yn+1 ) ¹ h[d(xn−1 , xn ) + d(yn−1 , yn )] ¹ · · · ¹ hn [d(x0 , x1 ) + d(y0 , y1 )] By hypothesis, Lemma 1.7 and Lemma 1.8, we have r(h) ≤ r((e − a4 − sa6 )−1 )r(a1 + a2 + a3 + sa6 ) 1 r(a1 ) + r(a2 ) + r(a3 ) + sr(a6 ) < ≤ 1 − r(a4 ) − sr(a6 ) s P

n n which means that e − h is invertible, (e − h)−1 = ∞ i=0 h and kh k → 0 as n → ∞. Now if δn = d(xn , xn+1 ) + d(yn , yn+1 ), then the above relation implies

δn ¹ hδn−1 ¹ · · · ¹ hn δ0 .

1064

YOUNG-OH YANG ET AL 1059-1069

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

COUPLED FIXED POINT THEOREMS FOR TWO MAPS IN CONE b-METRIC SPACES

7

For m > n, we have d(xn , xm ) + d(yn , ym ) ¹ δm−1 + δm−2 + · · · + δn ¹ (hm−1 + hm−2 + · · · + hn )δ0 = hn (1 + h + · · · + hm−n−1 )δ0 n

∞ X

¹ h (

hi )δ0

i=0

= (e − h)−1 hn δ0 since r(h) < 1 and P is closed. Since r(h) < 1, k(e − h)−1 hn δ0 k → 0 as n → ∞, and so for any c ∈ A with θ ¿ c, there exists N ∈ N such that for any n > m > N , we have d(xn , xm ) + d(yn , ym ) ¹ (e − h)−1 hn δ0 ¿ c. Thus {d(xn , xm ) + d(yn , ym )} is a c-sequence in P . Since θ ¹ d(xn , xm ), d(yn , ym ) ¹ d(xn , xm ) + d(yn , ym ), {d(xn , xm )} and {d(yn , ym )} are c-sequences and so Cauchy sequence in X. Since X is complete, there exists x ∈ X and y ∈ X such that xn → x and yn → y as n → ∞. Now we show that x = S(x, y) and y = S(y, x). On the contrary, let us assume that x 6= S(x, y) or y 6= S(y, x) so that d(x, S(x, y)) = k  θ and d(y, S(y, x)) = l  θ. Then we have k = d(x, S(x, y)) ¹ d(x, x2k+2 ) + d(x2k+2 , S(x, y)) = d(x, x2k+2 ) + d(T (x2k+1 , y2k+1 ), S(x, y)) ¹ d(x, x2k+2 ) + a1 d(x, x2k+1 ) + a2 d(S(x, y), x) + a3 d(y, y2k+1 ) + a4 d(T (x2k+1 , y2k+1 ), x2k+1 ) + a5 d(S(x, y), x2k+1 ) + a6 d(T (x2k+1 , y2k+1 ), x) = d(x, x2k+2 ) + a1 d(x, x2k+1 ) + a2 d(S(x, y), x) + a3 d(y, y2k+1 ) + a4 d(x2k+2 , x2k+1 ) + a5 d(S(x, y), x2k+1 ) + a6 d(x2k+2 , x) which implies that k = d(x, S(x, y)) ¹ (e + a6 )d(x, x2k+2 ) + a1 d(x, x2k+1 ) + a2 d(x, S(x, y)) + a3 d(y, y2k+1 ) + a4 d(x2k+2 , x2k+1 ) + a5 d(S(x, y), x2k+1 ). Taking n → ∞, by Lemma 1.6 and Lemma 1.10, we have k = d(x, S(x, y)) ¹ (e + a6 )θ + a1 · θ + a2 d(S(x, y), x) + a3 · θ + a4 · θ + a5 d(S(x, y), x) + a6 · θ and so d(x, S(x, y)) ¹ (a2 + a5 )d(x, S(x, y)). Since r(a2 + a5 ) < 1, by Lemma 1.11, d(x, S(x, y)) = θ. Therefore x = S(x, y). Similarly we can prove that y = S(y, x). It

1065

YOUNG-OH YANG ET AL 1059-1069

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

YANG AND CHOI

8

follows similarly that x = T (x, y) and y = T (y, x). Therefore (x, y) is a common coupled fixed point of S and T . In order to prove the uniqueness, let (x0 , y 0 ) ∈ X × X be another common coupled fixed point of S and T . Then d(x, x0 ) = d(S(x, y), T (x0 , y 0 )) ¹ a1 d(x, x0 ) + a2 d(S(x, y), x) + a3 d(y, y 0 ) + a4 d(T (x0 , y 0 ), x0 ) + a5 d(S(x, y), x0 ) + a6 d(T (x0 , y 0 ), x) = a1 d(x, x0 ) + a2 d(x, x) + a3 d(y, y 0 ) + a4 d(x0 , x0 ) + a5 d(x, x0 ) + a6 d(x0 , x) = (a1 + a5 + a6 )d(x0 , x) + a3 d(y, y 0 ) which implies that (e − a1 − a5 − a6 )d(x, x0 ) ¹ a3 d(y, y 0 ). Since r(a1 + a5 + a6 ) < 1, e − (a1 + a5 + a6 ) is invertible and d(x, x0 ) ¹ (e − a1 − a5 − a6 )−1 a3 d(y, y 0 ). Similarly we can prove that d(y, y 0 ) ¹ (e − a1 − a5 − a6 )−1 a3 d(x, x0 ). Adding both sides, we get d(x, x0 ) + d(y, y 0 ) ¹ (e − a1 − a5 − a6 )−1 a3 [d(x, x0 ) + d(y, y 0 )], Since r((e − a1 − a5 − a6 )−1 a3 ) < 1, by Lemma 1.11, we have d(x, x0 ) + d(y, y 0 ) = θ. Therefore x = x0 and y = y 0 . ¤ The following results generalize the corresponding results in cone metric spaces obtained by H.K. Nashie, Y. Rohen and C. Thokchom([5]). Corollary 2.2. (Theorem 2.1 of [5]) Let (X, d) be a complete cone metric space with a solid cone P . Suppose that S, T : X × X → X are two mappings satisfying the condition d(S(x, y), T (u, v)) ¹ a1 d(x, u) + a2 d(S(x, y), x) + a3 d(y, v) + a4 d(T (u, v), u) + a5 d(S(x, y), u) + a6 d(T (u, v), x) for all x, y, u, v ∈ X, where ai (i = 1, 2, 3, 4, 5, 6) are non-negative real numbers such P that 5i=1 ai + 2a6 < 1. Then S and T have a common coupled fixed point in X. Proof. Taking s = 1 and letting A as a real Banach space in Theorem 2.1, we get the required result. ¤

1066

YOUNG-OH YANG ET AL 1059-1069

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

COUPLED FIXED POINT THEOREMS FOR TWO MAPS IN CONE b-METRIC SPACES

9

Corollary 2.3. Let (X, d) be a complete cone metric space over the Banach algebra A and let P be a solid cone in A. Suppose that S, T : X × X → X are two mappings satisfying the condition d(S(x, y), T (u, v)) ¹ a1 d(x, u) + a2 d(S(x, y), x) + a3 d(y, v)

(2.2.4)

+ a4 d(T (u, v), u) + a5 d(S(x, y), u) + a6 d(T (u, v), x) for all x, y, u, v ∈ X, where ai ∈ P and ai aj = aj ai (i, j = 1, 2, 3, 4, 5, 6). If s(r(a1 ) + r(a2 ) + r(a3 )) + r(a4 ) + r(a5 ) + (s2 + s)r(a6 ) < 1, then S and T have a common coupled fixed point in X. Proof. Taking s = 1 in Theorem 2.1, we get the required result.

¤

Corollary 2.4. Let (X, d) be a complete cone b-metric space over the Banach algebra A with the coefficient s ≥ 1 and let P be a solid cone. Suppose that T : X × X → X is a mapping satisfying the condition d(T (x, y), T (u, v)) ¹ a1 d(x, u) + a2 d(T (x, y), x) + a3 d(y, v) + a4 d(T (u, v), u) + a5 d(T (x, y), u) + a6 d(T (u, v), x) for all x, y, u, v ∈ X, where ai ∈ P and ai aj = aj ai (i, j = 1, 2, 3, 4, 5, 6). If s(r(a1 ) + r(a2 ) + r(a3 )) + r(a4 ) + r(a5 ) + (s2 + s)r(a6 ) < 1, then T has a unique coupled fixed point in X. Corollary 2.5. Let (X, d) be a complete cone b-metric space over the Banach algebra A with the coefficient s ≥ 1 and let P be a solid cone. Suppose that S, T : X × X → X are two mappings satisfying the condition d(S(x, y), T (u, v)) ¹ ad(x, u) + bd(y, v) + c[d(S(x, y), x) + d(T (u, v), u)] + e[d(S(x, y), u) + d(T (u, v), x)] for all x, y, u, v ∈ X, where a, b, c, e ∈ P are commuting. If s(r(a) + r(b)) + (s + 1)r(c)) + (s2 + s + 1)r(e) < 1, then S and T have a unique common coupled fixed point in X. Corollary 2.6. Let (X, d) be a complete cone b-metric space over the Banach algebra A with the coefficient s ≥ 1 and let P be a solid cone. Suppose that S, T : X × X → X are two mappings satisfying the condition d(T (x, y), T (u, v)) ¹ ad(x, u) + bd(y, v) + c[d(T (x, y), x) + d(T (u, v), u)] + e[d(T (x, y), u) + d(T (u, v), x)]

1067

YOUNG-OH YANG ET AL 1059-1069

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

YANG AND CHOI

for all x, y, u, v ∈ X, where a, b, c, e ∈ P are commuting. If s(r(a) + r(b)) + (s + 1)r(c)) + (s2 + s + 1)r(e) < 1, then T has a unique coupled fixed point in X. Now we give an example showing that Theorem 2.1 is a proper extension of known results. In this example, the conditions of Theorem 2.1 are fulfilled. Example 2.7. Let A = CR1 [0, 1] and define a norm on A by kxk = kxk∞ + kx0 k∞ for x ∈ A. Define multiplication in A as just pointwise multiplication. Then A is a real Banach algebra with unit e = 1(e(t) = 1 for all t ∈ [0, 1]). The set P = {x ∈ A : x ≥ 0} is a cone in A. Moreover, P is not normal. Let X = {1, 2, 3}. Define d : X × X → A by d(1, 2)(t) = d(2, 1)(t) = d(2, 3)(t) = d(3, 2)(t) = et , d(1, 3)(t) = d(3, 1)(t) = 3et , d(x, x)(t) = θ for all t ∈ [0, 1] and for each x ∈ X. Then (X, d) is a solid cone b-metric space over Banach algebra with the coefficient s = 23 . But it is not a cone metric space over Banach algebra since it does not satisfy the triangle inequality. Define two mappings S, T : X × X → X by S(x, y) = 1 for any (x, y) ∈ X × X, and   2, T (x, y) =  1,

(x, y) = (3, 1) otherwise

Let a1 , a2 , a3 , a4 , a5 , a6 ∈ P defined with a1 (t) = a2 (t) = a3 (t) = 0.2, a4 (t) = 0.1, a5 (t) = 0.4, a6 (t) = 0.05 for all t ∈ [0, 1]. Then, by definition of spectral radius, r(a1 ) = r(a2 ) = r(a3 ) = 0.2, r(a4 ) = 0.1, r(a5 ) = 0.4, r(a6 ) = 0.05 and so s[r(a1 ) + r(a2 ) + r(a3 )] + r(a4 ) + r(a5 ) + (s2 + s)r(a6 ) = 0.9875 < 1. Since d(S(x, y), T (3, 1))(t) = d(1, 2)(t)) = et for any x, y ∈ X, by careful calculations, we can get that for any x, y, u, v ∈ X, S and T satisfy the contractive condition (2.2.4) of Theorem 2.1. Hence the hypotheses are satisfied and so by Theorem 2.1, S and T have a common coupled fixed point in X. Since S(1, 1) = 1 = T (1, 1), (1, 1) is the unique coupled fixed point of S and T . Acknowledgments. The first author was supported by the 2018 scientific promotion program funded by Jeju National University. References [1] M. Abbas and G. Jungck, Common fixed point results for noncommuting mappings without continuity in cone metric spaces, J. Math. Anal. Appl. 341 (2008) 416-420.

1068

YOUNG-OH YANG ET AL 1059-1069

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

COUPLED FIXED POINT THEOREMS FOR TWO MAPS IN CONE b-METRIC SPACES

11

[2] T. G. Bhaskar and V. Lakshmikantham, Fixed point theorems in partially ordered metric spaces and applications, Nonlinear Analysis 65 (2006) 1379-1393 [3] Y.J. Cho, R. Saadati, and Sh. Wang, Common fixed point theorems on generalized distance in ordered cone metric spaces, Comput Math Appl. 61 (2011) 1254-1260. doi:10.1016/j.camwa.2011.01.004 [4] L.G. Huang and X. Zhang, Cone metric spaces and fixed point theorems of contractive mappings, J. Math. Anal. Appl., 332 (2007) 1468-1476 [5] H.K. Nashie, Y. Rohen and C.Thokchom, Common coupled fixed point theorems of two mappings satisfying generalized contractive condition in cone metric space, International Journal of Pure and Applied Mathematics, Vol. 106 No. 3 (2016) 791-799 [6] S. Radenovic and B. E. Rhoades, Fixed Point Theorem for two non-self mappings in cone metric spaces, Computers and Mathematics with Applications 57 (2009) 1701-1707 [7] S. Wang and B. Guo, Distance in cone metric spaces and common fixed point theorems, Applied Mathematical Letters. 24 (2011) 1735-1739 [8] S. Xu and S. Radenovic, Fixed point theorems of generalized Lipschitz mappings on cone metric spaces over Banach algebras without assumption of normality, Fixed Point Theory and Applications 2014, 2014:102 [9] P. Yan, J. Yin, Q. Leng, Some coupled fixed point results on cone metric spaces over Banach algebras and applications, J. Nonlinear Sci. Appl. 9 (2016) 5661-5671 [10] Y.O.Yang and H.J. Choi, Common fixed point theorems on cone metric spaces, Far East J. Math. Sci(FJMS), 100(7) (2016) 1101-1117 [11] Y.O.Yang and H.J. Choi, Fixed point theorems in ordered cone metric spaces, Journal of nonlinear science and applications, 9(6) (2016) 4571-4579 Young-Oh Yang, Department of Mathematics, Jeju National University, Jeju 690-756, Korea E-mail address: [email protected] Hong Joon Choi, Department of Mathematics, Jeju National University, Jeju 690-756, Korea E-mail address: [email protected]

1069

YOUNG-OH YANG ET AL 1059-1069

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FOURIER SERIES OF SUMS OF PRODUCTS OF POLY-GENOCCHI FUNCTIONS TAEKYUN KIM1 , DAE SAN KIM2 , DMITRY V. DOLGY3 , AND JIN-WOO PARK4,∗

Abstract. Recently, some authors introduced poly-Genocchi polynomials as an analogy to poly-Bernoulli polynomials. In this paper, we will consider three types of sums of products of poly-Genocchi functions and derive their Fourier expansions. In addition, we will express each of them in terms of Bernoulli functions.

1. Introduction The Bernoulli polynomials Bm (x) are given by the generating function ∞ X t tm xt e = B (x) . m et − 1 m! m=0

When x = 0, Bm = Bm (0) are called Bernoulli numbers. The Genocchi polynomials Gm (x) are defined by the generating function ∞ X 2t xt tm e = Gm (x) . t e +1 m! m=0

For x = 0, Gm = Gm (0) are called Genocchi numbers. (r) Let r be any integer. The poly-Bernoulli polynomials Bm (x) of index r are given by ∞ X Lir (1 − e−t ) xt tm (r) e = B (x) , m et − 1 m! m=0 P∞ xm where Lir (x) = m=1 mr is the rth polylogarithm function for r ≥ 1, and a rational function for r ≤ 0. We note here that this definition of poly-Bernoulli polynomials are slightly different from the Kaneko’s original definition [1, 2, 3, 5]. ˜ (r) Indeed, if B m (x) denotes the Kaneko’s poly-Bernoulli polynomial of index r, then (r) (r) (r) (r) ˜ Bm (x) = Bm (x − 1). Also, for x = 0, Bm = Bm (0) are called poly-Bernoulli numbers of index r. Clearly, (r)

(0) m B(1) m (x) = Bm (x), B0 (x) = 1, Bm (x) = x ,

B(0) m = δm,0 ,

d (r) (r) B (x) = mBm−1 (x), (m ≥ 1). dx m

2010 Mathematics Subject Classification. 11B68, 11B83, 42A16. Key words and phrases. Fourier series, Bernoulli polynomial, Euler function, Genocchi polynomial, poly-Genocchi polynomial, poly-Bernoulli polynomial. ∗ Corresponding author. 1

1070

T. KIM ET AL 1070-1083

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

Fourier series of sums of products of poly-Genocchi functions

As an analogy to this construction of poly-Bernoulli polynomials, the poly-Genocchi (r) polynomials Gm (x) of index r are given by ∞ X 2Lir (1 − e−t ) xt tm (r) e . = G (x) m et + 1 m! m=0 (r)

(1.1)

(r)

When x = 0, Gm = Gm (0) are called poly-Genocchi numbers. Unfortunately, the poly-Genocchi polynomials were named as poly-Euler polynomials. But, as (1) we clearly have Gm (x) = Gm (x), it seems more appropriate to call them polyGenocchi polynomials (see [6]). There are other definitions for poly-Euler numbers (r) and polynomials. Indeed, in [7, 8], the poly-Euler numbers Em are defined by ∞ m X Lir (1 − e−4t ) (r) t = . Em 4t cosh t m! m=0

For poly-Euler polynomials, see [4]. As is known or one can see, d 1 (Lir+1 (x)) = Lir (x). dx x (r)

In addition, since Gm (x) are Appell polynomials, d (r) (r) G (x) = mGm−1 (x), (m ≥ 1). dx m Here we claim that (r)

G(r+1) (1) + G(r+1) (0) = 2Bm−1 , (m ≥ 1). m m

(1.2)

From (1.1), we clearly have ∞   tm X = 2Lir+1 (1 − e−t ). G(r+1) (1) + G(r+1) (0) m m m! m=0

(1.3)

Differentiation of LHS of (1.3) with respect to t gives ∞   tm X (r+1) (r+1) Gm+1 (1) + Gm+1 (0) . m! m=0 On the other hahd, differentiation of RHS of (1.3) with respect to t yields ∞ m X 2Lir (1 − e−t ) −t (r) t e = 2 B . m 1 − e−t m! m=0

From these, we get the desired result. Writing Lir (1 − e−t ) = P∞ n t + n=2 an tn! , from (1.1) we obtain ! ∞ ∞ m−1 m X X X m t tm G(r) = am−l El (x) , m (x) m! m=1 l m! m=0

P∞

n=1

n

an tn! =

l=0

where Em (x) are Euler polynomials given by ∞ X 2 tm xt e = E (x) . m et + 1 m! m=0

1071

T. KIM ET AL 1070-1083

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J.-W. Park

3

In particular, this implies that (r)

(r)

G0 (x) = 0, G1 (x) = 1, degG(r) m (x) = m − 1, for m ≥ 1. (r+1)

As a quick application of (1.2), we express Gm (x) as a linear combination of Euler polynomials. For this, we recall that, for a polynomial p(x) ∈ Q[x] with deg p(x) = m, m X p(x) = bj Ej (x), bj ∈ Q, j=0

where bj =

 1  (j) p (1) + p(j) (0) , j = 0, 1, . . . , m. 2j! (r+1)

We now apply this to the polynomial p(x) = Gm G(r+1) (x) = m

m X

(x), and let

bj Ej (x).

j=0

Then  (m)j  (r+1) (r+1) Gm−j (1) + Gm−j (0) 2j! (  (r) m j Bm−j−1 , for 0 ≤ j ≤ m − 1, = 0, for j = m

bj =

Thus G(r+1) (x) m

m−1 X

=

j=0

 m (r) Bm−j−1 Ej (x), (m ≥ 1). j

Also, for p(x) ∈ Q[x], with deg p(x) = m, p(x) =

m+1 X

bj Gj (x), bj ∈ Q,

j=1

where bj =

1 2j!

 p(j−1) (1) + p(j−1) (0) , for m = 1, . . . , m + 1. (r+1)

Applying this to p(x) = Gm ( bj =

1 m+1

(x), we see that  (r) m+1 Bm−j , for 1 ≤ j ≤ m, j 0, for j = m + 1.

Thus we obtain G(r+1) (x) m

 m  1 X m + 1 (r) Bm−j Gj (x), (m ≥ 1). = m + 1 j=1 j

For any real number x, we let hxi = x − bxc ∈ [0, 1) denote the fractional part of x. Here we will consider the following three types of sums of products of polyGenocchi functions αm (hxi), βm (hxi), and γm (hxi) and derive their Fourier expansions. In addition, we will express each of them in terms of Bernoulli functions. Pm−1 (r+1) (s+1) (a) αm (hxi) = k=1 Gk (hxi)Gm−k (hxi), (m ≥ 3);

1072

T. KIM ET AL 1070-1083

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

Fourier series of sums of products of poly-Genocchi functions (r+1) (s+1) 1 (hxi)Gm−k (hxi) k=1 k!(m−k)! Gk (r+1) (s+1) 1 (hxi)Gm−k (hxi), k=1 k(m−k) Gk

(b) βm (hxi) =

Pm−1

(m ≥ 3);

(c) γm (hxi) =

Pm−1

(m ≥ 3).

2. The sums of products of poly-Genocchi functions, type I For integers r, s, m, with m ≥ 3, let αm (x) =

m−1 X

(r+1)

Gk

(s+1)

(x)Gm−k (x).

k=1

0 αm (x)

=

m−1 Xn

(r+1)

(s+1)

(r+1)

kGk−1 (x)Gm−k (x) + (m − k)Gk

(s+1)

(x)Gm−k−1 (x)

o

k=1

=

m−1 X

(r+1)

(s+1)

kGk−1 (x)Gm−k (x) +

k=2

=

m−2 X

(r+1)

(m − k)Gk

(s+1)

(x)Gm−k−1 (x)

k=1

m−2 X

(r+1)

(k + 1)Gk

(s+1)

(x)Gm−k−1 (x) +

k=1

m−2 X

(r+1)

(m − k)Gk

(s+1)

(x)Gm−k−1 (x)

k=1

=(m + 1)αm−1 (x). From this, we have 

αm+1 (x) m+2

1

Z

αm (x)dx = 0

0 = αm (x),

1 (αm+1 (1) − αm+1 (0)) . m+2

For m ≥ 3, we put ∆m =∆m (r, s) = αm (1) − αm (0) =

m−1 X

(r+1)

Gk

(s+1)

(r+1)

(1)Gm−k (1) − Gk

(s+1)



Gm−k

k=1

=

m−1 X 

(r+1)

−Gk

(r)

+ 2Bk−1

   (s+1) (s) (r+1) (s+1) −Gm−k + 2Bm−k−1 − Gk Gm−k

k=1

=−2

m−1 X

(r+1)

Gk

 (s) (r) (s+1) (r) (s) Bm−k−1 + Bk−1 Gm−k − 2Bk−1 Bm−k−1 .

k=1

Thus αm (0) = αm (1) ⇐⇒∆m = 0 ⇐⇒

m−1 X

(r+1)

Gk

 (s) (r) (s+1) (r) (s) Bm−k−1 + Bk−1 Gm−k − 2Bk−1 Bm−k−1 = 0,

k=1

Z

1

αm (x)dx = 0

1073

1 ∆m+1 . m+2

T. KIM ET AL 1070-1083

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J.-W. Park

5

We are now going to consider the function αm (hxi) =

m−1 X

(r+1)

Gk

(s+1)

(hxi)Gm−k (hxi), (m ≥ 3),

k=1

defined on R, which is periodic with period 1. The Fourier series of αm (hxi) is ∞ X

2πinx A(m) , n e

n=−∞

where A(m) = n

1

Z

αm (hxi)e−2πinx dx =

1

Z

αm (x)e−2πinx dx.

0

0

(m)

Now, we would like to determine the Fourier coefficients An . Case 1 : n 6= 0. A(m) = n

1

Z

αm (x)e−2πinx dx

0

=−

1 1 1  αm (x)e−2πinx 0 + 2πin 2πin

1 m+1 =− (αm (1) − αm (0)) + 2πin 2πin m + 1 (m−1) 1 = A − ∆m , 2πin n 2πin from which we can easily deduce that A(m) =− n

1

Z

0 αm (x)e−2πinx dx

0

Z

1

αm−1 (x)e−2πnx dx

0

m−2 1 X (m + 2)j ∆m−j+1 . m + 2 j=1 (2πin)j

Case 2 : n = 0. (m)

A0

Z =

1

αm (x)dx = 0

1 ∆m+1 . m+2

We recall the following facts about Bernoulli functions Bm (hxi): (a) for m ≥ 2, Bm (hxi) = −m!

∞ X

e2πinx , (2πin)m n=−∞ n6=0

(b) for m = 1, −

 ∞ X e2πinx B1 (hxi), for x ∈ / Z, = 0, for x ∈ Z. 2πin n=−∞ n6=0

αm (hxi), (m ≥ 3) is piecewise C ∞ . Moreover, αm (hxi) is continuous for those integers m ≥ 3 with ∆m = 0, and discontinuous with jump discontinuities at integers for those integers m ≥ 3 with ∆m 6= 0.

1074

T. KIM ET AL 1070-1083

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

Fourier series of sums of products of poly-Genocchi functions

Assume first that m is an integer ≥ 3 with ∆m = 0. Then αm (0) = αm (1). Hence αm (hxi) is piecewise C ∞ , and continuous. Thus the Fourier series of αm (hxi) converges uniformly to αm (hxi), and αm (hxi) =

∞ X



1 − 1 ∆m+1 + m+2 m+2 n=−∞

m−2 X j=1

 (m + 2)j ∆m−j+1  e2πinx (2πin)j

n6=0

=

1 1 ∆m+1 + m+2 m+2

m−2 X j=1





∞ X

m+2 e2πinx   ∆m−j+1 −j!  j (2πin)j n=−∞ 

n6=0 m−2 X



1 1 m+2 ∆m+1 + ∆m−j+1 Bj (hxi) m+2 m + 2 j=2 j  B1 (hxi), for x ∈ / Z, +∆m × 0, for x ∈ Z. =

Now, we are ready to state our first theorem. Theorem 2.1. For each integer l ≥ 3, let ∆l = ∆l (r, s) = −2

l−1  X

(r+1)

Gk

 (s) (r) (s+1) (r) (s) Bl−k−1 + Bk−1 Gl−k − 2Bk−1 Bl−k−1 .

k=1

Assume that ∆m = 0, for an integer m ≥ 3. Then we have the following. Pm−1 (r+1) (s+1) (a) (hxi)Gm−k (hxi) has the Fourier series expansion k=1 Gk m−1 X

(r+1)

Gk

(s+1)

(hxi)Gm−k (hxi)

k=1

  ∞ m−2 X X (m + 2)j 1 1 − ∆m+1 + ∆m−j+1  e2πinx , = j m+2 m + 2 (2πin) n=−∞ j=1 n6=0

for all x ∈ R, where the convergence is uniform. (b) m−1 X

(r+1)

Gk

(s+1)

(hxi)Gm−k (hxi) =

k=1

 m−2  1 X m+2 ∆m−j+1 Bj (hxi), m + 2 j=0 j j6=1

for all x ∈ R. Assume next that m is an integer ≥ 3, with ∆m 6= 0. Then αm (0) 6= αm (1). Hence αm (hxi) is piecewise C ∞ , and discontinuous with jump discontinuities at integers. Thus the Foureir series of αm (hxi) converges pointwise to αm (hxi), for x∈ / Z, and converges to 1 1 (αm (0) + αm (1)) = αm (0) + ∆m , 2 2 for x ∈ Z. We are now ready to state our second theorem.

1075

T. KIM ET AL 1070-1083

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J.-W. Park

7

Theorem 2.2. For each integer l ≥ 3, we let l−1  X

∆l = ∆l (r, s) = −2

(r+1)

Gk

 (s) (r) (s+1) (r) (s) Bl−k−1 + Bk−1 Gl−k − 2Bk−1 Bl−k−1 .

k=1

Assume that ∆m 6= 0, for an integer m ≥ 3. Then we have the following (a)   m−2 ∞ X (m + 2)j X 1 1 − ∆m−j+1  e2πinx ∆m+1 + j m+2 m + 2 (2πin) n=−∞ j=1 n6=0

( =

Pm−1

(r+1)

(s+1)

Gk (hxi)Gm−k (hxi), for x ∈ / Z, Pm−1 k=1 (r+1) (s+1) 1 G G + ∆ , for x ∈ Z. k=1 k m−k 2 m

(b)  m−2  m−1 X (r+1) 1 X m+2 (s+1) ∆m−j+1 Bj (hxi) = Gk (hxi)Gm−k (hxi), for x ∈ / Z; m + 2 j=0 j k=1

1 m+2

m−2 X j=0 j6=1

m−1 X (r+1) (s+1) 1 m+2 ∆m−j+1 Bj (hxi) = Gk Gm−k + ∆m , for x ∈ Z. j 2



k=1

3. The sums of products of poly-Genocchi functions, type II Let βm (x) =

m−1 X k=1

0 βm (x)

=

m−1 X k=1

=

m−1 X k=2

=

m−2 X k=1

1 (r+1) (s+1) G (x)Gm−k (x), (m ≥ 3). k!(m − k)! k

 m−k k (r+1) (s+1) (r+1) (s+1) G (x)Gm−k (x) + G (x)Gm−k−1 (x) k!(m − k)! k−1 k!(m − k)! k

m−2 X 1 1 (r+1) (s+1) (r+1) (s+1) Gk−1 (x)Gm−k (x) + G (x)Gm−k−1 (x) (k − 1)!(m − k)! k!(m − k − 1)! k k=1

1 (r+1) (s+1) G (x)Gm−k−1 (x) + k!(m − k − 1)! k

m−2 X k=1

1 (r+1) (s+1) G (x)Gm−k−1 (x) k!(m − k − 1)! k

=2βm−1 (x). From this, we obtain that  Z

βm+1 (x) 2

1

βm (x)dx = 0

0 = βm (x)

1 (βm+1 (1) − βm+1 (0)) . 2

1076

T. KIM ET AL 1070-1083

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

Fourier series of sums of products of poly-Genocchi functions

For m ≥ 3, we let Ωm = Ωm (r, s) = βm (1) − βm (0) =

m−1 X k=1

=

m−1 X k=1

=−2

  1 (r+1) (s+1) (r+1) (s+1) Gk (1)Gm−k (1) − Gk Gm−k k!(m − k)!     1 (r+1) (r) (s+1) (s) (r+1) (s+1) −Gk + 2Bk−1 −Gm−k + 2Bm−k−1 − Gk Gm−k k!(m − k)!

m−1 X k=1

  1 (r+1) (s) (r) (s+1) (r) (s) Gk Bm−k−1 + Bk−1 Gm−k − 2Bk−1 Bm−k−1 . k!(m − k)!

Then βm (0) = βm (1) ⇐⇒ Ωm = 0 ⇐⇒

m−1 X k=1

  1 (r+1) (s) (r) (s+1) (r) (s) Gk Bm−k−1 + Bk−1 Gm−k − 2Bk−1 Bm−k−1 = 0, k!(m − k)! Z 1 1 βm (x)dx = Ωm+1 . 2 0

We now would like to consider the function βm (hxi) =

m−1 X k=1

1 (r+1) (s+1) G (hxi)Gm−k (hxi), (m ≥ 3), k!(m − k)! k

defined on R, which is periodic with period 1. The Fourier series of βm (hxi) is ∞ X

Bn(m) e2πinx ,

n=−∞

where Bn(m) =

1

Z

βm (hxi)e−2πinx dx =

0

1

Z

βm (x)e−2πinx dx.

0 (m)

Next, we want to determine the Fourier coefficients Bn . Case 1 : n 6= 0. Z 1 (m) Bn = βm (x)e−2πinx dx 0

1 1  1 =− βm (x)e−2πinx 0 + 2πin 2πin

Z

1 0 βm (x)e−2πinx dx

0

Z 1 1 2 (βm (1) − βm (0)) + βm−1 (x)e−2πinx dx 2πin 2πin 0 2 1 = B (m−1) − Ωm , 2πin n 2πin from which by induction we can easily deduce that =−

Bn(m) = −

m−2 1 X 2j Ωm−j+1 . 2 j=1 (2πin)j

1077

T. KIM ET AL 1070-1083

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J.-W. Park

9

Case 2 : n = 0. (m) B0

1

Z =

βm (x)dx = 0

1 Ωm+1 . 2

βm (hxi), (m ≥ 3) is piecewise C ∞ . Moreover, it is continuous for those integers m ≥ 3 with Ωm = 0, and discontinuous with jump discontinuities at integers for those integers m ≥ 3 with Ωm 6= 0. Assume first that m is an integer ≥ 3 with Ωm = 0. Then βm (0) = βm (1). Hence βm (hxi) is piecewise C ∞ , and continuous. Thus the Fourier series of βm (hxi) converges uniformly to βm (hxi), and βm (hxi)   m−2 ∞ j X X 1 2 1  e2πinx − Ω = Ωm+1 + j m−j+1 2 2 (2πin) n=−∞ j=1 n6=0

1 1 = Ωm+1 + 2 2

m−2 X j=1

 j

∞ X

 2πinx

2 e   Ωm−j+1 −j! j j! (2πin) n=−∞ n6=0

1 1 = Ωm+1 + 2 2

m−2 X j=2

j

2 Ωm−j+1 Bj (hxi) + Ωm × j!



B1 (hxi), for x ∈ / Z, 0, for x ∈ Z.

Now, we are ready to state our first theorem. Theorem 3.1. For each integer l ≥ 3, let Ωl = Ωl (r, s) = −2

l−1 X k=1

  1 (r+1) (s) (r) (s+1) (r) (s) Gk Bl−k−1 + Bk−1 Gl−k − 2Bk−1 Bl−k−1 . k!(l − k)!

Assume that Ωm = 0, for an integer m ≥ 3. Then we have the following. Pm−1 (r+1) (s+1) 1 (a) (hxi)Gm−k (hxi) has the Fourier series expansion k=1 k!(m−k)! Gk m−1 X

1 (r+1) (s+1) G (hxi)Gm−k (hxi) k!(m − k)! k k=1   ∞ m−2 j X X 1 2 1 −  e2πinx , = Ωm+1 + Ω j m−j+1 2 2 (2πin) n=−∞ j=1 n6=0

for all x ∈ R, where the convergence is uniform. (b) m−1 X k=1

m−2 1 X 2j 1 (r+1) (s+1) Gk (hxi)Gm−k (hxi) = Ωm−j+1 Bj (hxi), k!(m − k)! 2 j=0 j! j6=1

for all x ∈ R. Assume next that m is an integer ≥ 3 with Ωm 6= 0. Then βm (0) 6= βm (1), and hence βm (hxi) is piecewise C ∞ , and discontinuous with jump discontinuities

1078

T. KIM ET AL 1070-1083

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

Fourier series of sums of products of poly-Genocchi functions

at integers. Thus the Fourier series of βm (hxi) converges pointwise to βm (hxi), for x∈ / Z, and converges to 1 1 (βm (0) + βm (1)) = βm (0) + Ωm , 2 2 for x ∈ Z. We are now ready to state our second theorem. Theorem 3.2. For each integer l ≥ 3, let Ωl = Ωl (r, s) = −2

l−1 X k=1

  1 (r+1) (s) (r) (s+1) (r) (s) Gk Bl−k−1 + Bk−1 Gl−k − 2Bk−1 Bl−k−1 . k!(l − k)!

Assume Ωm 6= 0, for an integer m ≥ 3. Then we have the following (a) ∞ X



1 − 1 Ωm+1 + 2 2 n=−∞

m−2 X j=1



j

2 Ωm−j+1  e2πinx (2πin)j

n6=0

( Pm−1

(r+1)

1

k=1

Pm−1k!(m−k)! 1

=

Gk

(s+1)

(hxi)Gm−k (hxi), for x ∈ / Z,

(r+1) (s+1) Gm−k k=1 k!(m−k)! Gk

+ 12 Ωm ,

for x ∈ Z.

(b) m−2 m−1 X 1 1 X 2j (r+1) (s+1) Ωm−j+1 Bj (hxi) = G (hxi)Gm−k (hxi), for x ∈ / Z; 2 j=0 j! k!(m − k)! k k=1

1 2

m−2 X j=0 j6=1

m−1 X 2 1 1 (r+1) (s+1) Ωm−j+1 Bj (hxi) = G Gm−k + Ωm , for x ∈ Z. j! k!(m − k)! k 2 j

k=1

4. The sums of products of poly-Genocchi functions, type III Let γm (x) =

m−1 X k=1

0 γm (x) =

m−1 X k=1

1 (r+1) (s+1) G (x)Gm−k (x), (m ≥ 3). k(m − k) k

o n 1 (r+1) (s+1) (r+1) (s+1) kGk−1 (x)Gm−k (x) + (m − k)Gk (x)Gm−k−1 (x) k(m − k)

m−2 X 1 (r+1) 1 (r+1) (s+1) (s+1) Gk−1 (x)Gm−k (x) + G (x)Gm−1−k (x) m−k k k k=2 k=1   m−2 X 1 1 (r+1) (s+1) = + Gk (x)Gm−k−1 (x) m−k−1 k

=

m−1 X

k=1

=(m − 1)

m−2 X k=1

1 (r+1) (s+1) G (x)Gm−k−1 (x) k(m − k − 1) k

=(m − 1)γm−1 (x).

1079

T. KIM ET AL 1070-1083

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J.-W. Park

11

From this, we have 

γm+1 (x) m

0 = γm (x),

and 1

Z

γm (x)dx = 0

1 (γm+1 (1) − γm+1 (0)) . m

For m ≥ 3, we let Λm = Λm (r, s) = γm (1) − γm (0) =

m−1 X k=1

=

m−1 X k=1

=−2

  1 (r+1) (s+1) (r+1) (s+1) Gk (1)Gm−k (1) − Gk Gm−k k(m − k)     1 (r+1) (r) (s+1) (s) (r+1) (s+1) −Gk + 2Bk−1 −Gm−k + 2Bm−k−1 − Gk Gm−k k(m − k)

m−1 X k=1

  1 (r+1) (s) (r) (s+1) (r) (s) Gk Bm−k−1 + Bk−1 Gm−k − 2Bk−1 Bm−k−1 . k(m − k)

Then γm (0) = γm (1) ⇐⇒ Λm = 0, and Z 1 1 γm (x)dx = Λm+1 . m 0 We are now going to consider γm (hxi) =

m−1 X k=1

1 (r+1) (s+1) G (hxi)Gm−k (hxi), (m ≥ 3), k(m − k) k

defined on R, which is periodic with period 1. The Fourier series of γm (hxi) is ∞ X

Cn(m) e2πinx ,

n=−∞

where Cn(m) =

1

Z

γm (hxi)e−2πinx dx =

1

Z

0

γm (x)e−2πinx dx.

0 (m)

Now, we want to determine the Fourier coefficients Cn . Case 1 : n 6= 0. Cn(m) =

Z

1

γm (x)e−2πinx dx

0

1 1  1 =− γm (x)e−2πinx 0 + 2πin 2πin

Z

1 m−1 =− (γm (1) − γm (0)) + 2πin 2πin m − 1 (m−1) 1 = C − Λm , 2πin n 2πin

1080

1 0 γm (x)e−2πinx dx

0

Z

1

γm−1 (x)e−2πinx dx

0

T. KIM ET AL 1070-1083

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12

Fourier series of sums of products of poly-Genocchi functions

from which by induction on m we can deduce that Cn(m) = −

m−2 1 X (m)j ∧m−j+1 . m j=1 (2πin)j

Case 2 : n = 0. Z

1

1 Λm+1 . m 0 γm (hxi), (m ≥ 3) is piecewise C ∞ . Further, it is continuous for those integers m ≥ 3 with Λm = 0, and discontinuous with jump discontinuities at integers for those integers m ≥ 3 with Λm 6= 0. Assume first that m is an integer ≥ 3 with Λm = 0. Then γm (0) = γm (1). Hence γm (hxi) is piecewise C ∞ , and continuous. Thus the Fourier series of γm (hxi) converges uniformly to γm (hxi), and (m)

C0

=

γm (x)dx =

γm (hxi)   m−2 ∞ X (m)j X 1 1 −  e2πinx Λ = Λm+1 + j m−j+1 m m (2πin) n=−∞ j=1 n6=0

=

1 1 Λm+1 + m m

m−2 X j=1

   ∞ 2πinx X e m   Λm−j+1 −j! j j (2πin) n=−∞ n6=0

=

1 1 Λm+1 + m m

m−2 X j=2

  m B1 (hxi), for x ∈ / Z, Λm−j+1 Bj (hxi) + Λm × 0, for x ∈ Z. j

Now, we can state our first theorem. Theorem 4.1. For each integer l ≥ 3, let l−1   X 1 (r+1) (s) (r) (s+1) (r) (s) Λl = Λl (r, s) = −2 Gk Bl−k−1 + Bk−1 Gl−k − 2Bk−1 Bl−k−1 . k(l − k) k=1

Assume that Λm = 0, for an integer m ≥ 3. Then we have the following Pm−1 (r+1) (s+1) 1 (a) (hxi)Gm−k (hxi) has the Fourier series expansion k=1 k(m−k) Gk m−1 X

1 (r+1) (s+1) G (hxi)Gm−k (hxi) k(m − k) k k=1   ∞ m−2 X X (m)j 1 1 −  e2πinx , = Λm+1 + Λ j m−j+1 m m (2πin) n=−∞ j=1 n6=0

for all x ∈ R, where the convergence is uniform. (b) m−1 X k=1

m−2   1 X m 1 (r+1) (s+1) G (hxi)Gm−k (hxi) = Λm−j+1 Bj (hxi), k(m − k) k m j=0 j j6=1

for all x ∈ R.

1081

T. KIM ET AL 1070-1083

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J.-W. Park

13

Assume next that m is an integer ≥ 3 with ∧m 6= 0. Then γm (0) 6= γm (1), and hence γm (hxi) is piecewise C ∞ , and discontinuous with jump discontinuities at integers. Thus the Fourier series of γm (hxi) converges pointwise to γm (hxi), for x∈ / Z, and converges to 1 1 (γm (0) + γm (1)) = γm (0) + Λm . 2 2 We can now state our second theorem. Theorem 4.2. For each integer l ≥ 3, let Λl = Λl (r, s) = −2

l−1 X k=1

  1 (r+1) (s) (r) (s+1) (r) (s) Gk Bl−k−1 + Bk−1 Gl−k − 2Bk−1 Bl−k−1 . k(l − k)

Assume that Λm 6= 0, for an integer m ≥ 3. Then we have the following (a)   m−2 ∞ X X 1 (m)j  e2πinx − 1 Λ Λm+1 + j m−j+1 m m (2πin) n=−∞ j=1 n6=0

( Pm−1 k=1

1

Pm−1k(m−k) 1

=

(r+1)

Gk

(s+1)

(hxi)Gm−k (hxi), for x ∈ / Z,

(r+1) (s+1) Gm−k k=1 k(m−k) Gk

+ 21 Λm ,

for x ∈ Z.

(b) m−2   1 X m Λm−j+1 Bj (hxi) m j=0 j

=

m−1 X

1 (r+1) (s+1) G (hxi)Gm−k (hxi), for x ∈ / Z; k(m − k) k k=1 m−2   1 X m Λm−j+1 Bj (hxi) m j=0 j j6=1

=

m−1 X k=1

1 1 (r+1) (s+1) Gk Gm−k + Λm , for x ∈ Z. k(m − k) 2 References

[1] T. Arakawa and M. Kanoko, Multiple zeta values, poly-Bernoulli numbers, and relatd zeta functions, Nagoya Math. J., 153 (1999), 189-209. [2] A. Bayad and Y. Hamahata, Arakawa-Kaneko L-functions and generalized poly-Bernoulli polynomials, J. Number Theory, 131 (2011), 1020-1036. [3] A. Bayad and Y. Hamahata, Multiple polylogarithms and multi-poly-Bernoulli polynomials, Funct. Approx. Comment. Math., 46 (2012), no. 1,, 45-61. [4] Y. Hamahata, Poly-Euler polynomials and Arakawa-Kaneko type zeta functions, Funct. Approx. Comment. Math., 51 (2014), no. 1,, 7-22. [5] M. Kaneko, Poly-Bernoulli numbers, J. Theorie de Nombres, 9 (1997), 221-228. [6] H. Jolany, M. Aliabadi, R. B. Corcino and M. R. Darafsheh, A note on multi poly-Euler numbers and Bernoulli polynomials, Gen. Math., 20 (2012), no. 2-3, 122-134. [7] Y. Ohno and Y. Sasaki, On the parity of poly-Euler numbers, RIMS kokyuroku Bessatsu, B32 (2012), 271-278.

1082

T. KIM ET AL 1070-1083

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14

Fourier series of sums of products of poly-Genocchi functions

[8] Y. Sasaki, On generalized poly-Bernoulli numbers and related L-functions, J. Number Theory, 132 (2012), 156-170. 1

Department of Mathematics, Kwangwoon University, Seoul 139-701, Republic of Korea. E-mail address: [email protected] 2

Department of Mathematics, Sogang University, Seoul 121-742, Republic of Korea. E-mail address: [email protected] 3

Hanrimwon, Kwangwoon University, Seoul 139-701, Republic of Korea. E-mail address: [email protected] 4 Department of Mathematics Education, Daegu University, Gyeongsan-si, Gyeongsangbukdo, 712-714, Republic of Korea. E-mail address: [email protected]

1083

T. KIM ET AL 1070-1083

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Hesitant fuzzy normal subalgebras in B-algebras Jung Mi Ko1 and Sun Shin Ahn2,∗ 1

Department of Mathematics, Gangneung-Wonju National University, Gangneung 25457, Korea 2

Department of Mathematics Education, Dongguk University, Seoul 04620, Korea

Abstract. The notions of a hesitant fuzzy subalgebra and a hesitant fuzzy normal subalgebra of a B-algebra are introduced, and related properties are investigated. A quotient structure of a B-algebra using a hesitant fuzzy normal subalgebra is constructed. The fundamental homomorphism of a quotient B-algebra is established.

1. Introduction The notions of Atanassov’s intuitionistic fuzzy sets, type 2 fuzzy sets and fuzzy multisets etc. are a generalization of fuzzy sets. As another generalization of fuzzy sets, Torra [9] introduced the notion of hesitant fuzzy sets which are a very useful to express peoples hesitancy in daily life. The hesitant fuzzy set is a very useful tool to deal with uncertainty, which can be accurately and perfectly described in terms of the opinions of decision makers. Also, hesitant fuzzy set theory is used in decision making problem etc. [2, 3, 10, 11], and is applied to M T L-algebras [5]. On the while, J. Neggers and H. S. Kim [7] introduced the notion of B-algebra and investigated several properties. Y. B. Jun et al. [4] defined the notion of a fuzzy B-algebra and studied some related properties of it. In this paper, we discuss applications of a hesitant fuzzy set in a (normal) subalgebra of a B-algebra. We introduce the notion of hesitant fuzzy (normal) subalgebra of a B-algebra, and investigate some properties of it. Also we consider a new construction of a quotient Balgebra induced by a hesitant fuzzy normal subalgebra. Finally, we establish the fundamental homomorphism of B-algebra. 2. Preliminaries A B-algebra ([7]) is a non-empty set X with a constant 0 and a binary operation “ ∗ ” satisfying axioms: (B1) x ∗ x = 0, (B2) x ∗ 0 = x, (B) (x ∗ y) ∗ z = x ∗ (z ∗ (0 ∗ y)) 0

2010 Mathematics Subject Classification: 06F35, 03G25, 06D72. Keywords: γ-inclusive set; hesitant fuzzy (normal) subalgebra; B-algebra. The corresponding author. Tel.: +82 2 2260 3410, Fax: +82 2 2266 3409 (S. S. Ahn). 0 E-mail: [email protected] (J. M. Ko); [email protected] (S. S. Ahn). 0 This study was supported by Gangneung-Wonju National University. 0



1084

Jung Mi Ko ET AL 1084-1094

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Jung Mi Ko and Sun Shin Ahn

for any x, y, z in X. For brevity we call X a B-algebra. In X we can define a binary relation “ ≤ ” by x ≤ y if and only if x ∗ y = 0. Proposition 2.1.([1, 7]) Let (X; ∗, 0) be a B-algebra. Then (i) (ii) (iii) (iv) (v)

the left cancellation law holds in X, i.e., x ∗ y = x ∗ z implies y = z, if x ∗ y = 0, then x = y for any x, y ∈ X, if 0 ∗ x = 0 ∗ y, then x = y for any x, y ∈ X, 0 ∗ (0 ∗ x) = x, for all x ∈ X, x ∗ (y ∗ z) = (x ∗ (0 ∗ z)) ∗ y for all x, y, z ∈ X.

Let (X; ∗X , 0X ) and (Y ; ∗Y , 0Y ) be B-algebras. A mapping φ : X → Y is called a homomorphism if φ(x ∗X y) = φ(x) ∗Y φ(y) for any x, y ∈ X. A homomorphism φ : X → Y is called an isomorphism if φ is a bijection, and denote it by X ∼ = Y . Let φ : X → Y be a homomorphism. Then the subset {x ∈ X|φ(x) = 0Y } of X is called the kernel of the homomorphism φ, and denote it by Ker φ. A non-empty subset S of X is called a subalgebra of X if x ∗ y ∈ S for any x, y ∈ X. A non-empty subset N of X is said to be normal if (x ∗ a) ∗ (y ∗ b) ∈ N for any x ∗ y, a ∗ b ∈ N . Then any normal subset N of a B-algebra X is a subalgebra of X, but the converse need not be true ([8]). A non-empty subset X of a B-algebra X is a called a normal subalgebra of X if it is both a subalgebra and normal. Let X be a B-algebra and let N be a normal subalgebra of X. Define a relation ∼N on X by x ∼N y if and only if x ∗ y ∈ N , where x, y ∈ X. Then it is a congruence relation on X ([13]). Denote the equivalence class containing x by [x]N , i.e., [x]N := {y ∈ X|x ∼N y} and let X/N := {[x]N |x ∈ X}. Theorem 2.2.([8]) Let N be a normal subalgebra of a BG-algebra X. Then X/N is a B-algebra. The B-algebra X/N is discussed in Theorem 2.2 is called the quotient B-algebra of X by N . Theorem 2.3.([8]) Let N be a normal subalgebra of a B-algebra X. Then the mapping γ : X → X/N given by γ(x) := [x]N is a surjective homomorphism, and Kerγ = N . Theorem 2.4.([8]) Let φ : X → Y be a homomorphism of B-algebras. Then Kerφ is a normal subalgebra of X. Theorem 2.5.([8]) Let φ : X → Y be a homomorphism of B-algebras. Then X/Kerφ ∼ = Imφ. ∼ In particular, if φ is surjective, then X/Kerφ = Y . Definition 2.6.([9]) Let E be a reference set. A hesitant fuzzy set on E is defined in terms of a function that when applied to E returns a subset of [0, 1], which can be viewed as the following mathematical representation: HE := {(e, hE (e))|e ∈ E} where hE : E → P([0, 1]).

1085

Jung Mi Ko ET AL 1084-1094

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Hesitant fuzzy normal subalgebras in B-algebras

Definition 2.7.([2]) Given a non-empty subset A of a set X, a hesitant fuzzy set HX := {(x, hX (x))|x ∈ X} on satisfying the following condition: hX (x) = ∅ for all x ∈ / A (briefly, A-hesitant fuzzy set) on X, and is represented by HA := {(x, hA (x)) | x ∈ X}, where hA is a mapping from X to P([0, 1]) with hA (x) = ∅ for all x ∈ / A. For a hesitant fuzzy set HX := {(x, hX (x)) | x ∈ X} of a set X and a subset γ of [0, 1], the hesitant fuzzy γ-inclusive set of HX , denoted by HX (γ), is defined to be the set HX (γ) := {x ∈ X|γ ⊆ hX (x)}. For any hesitant fuzzy set HX = {(x, hX (x)|x ∈ X} and GX = {(x, gX (x))|x ∈ e X , if hX (x) ⊆ gX (x) for all X}, we call HX a hesitant fuzzy subset of GX , denoted by HX ⊆G e GX , is defined to be the hesitant x ∈ X. The hesitant fuzzy union of HX and GX , denoted by HX ∪ e gX )(x) = hX (x) ∪ gX (x) for all x ∈ X. The hesitant fuzzy intersection of HX and fuzzy set (hX ∪ e GX , is defined to be the hesitant fuzzy set (hX ∩ e gX )(x) = hX (x) ∩ gX (x) GX , denoted by HX ∩ for all x ∈ X. 3. Hesitant fuzzy normal subalgebra In what follows let X denote a B-algebra X unless otherwise specified. Definition 3.1. Let X be a B-algebra. Given a non-empty subset (subalgebra as much as possible) A of X, let HA := {(x, hA (x)) | x ∈ X} be an A-hesitant fuzzy set on X. Then HA := {(x, hA (x)) | x ∈ X} is called a hesitant fuzzy subalgebra of X related to A (briefly, A-hesitant fuzzy subalgebra of X) if it satisfies the following condition: (3.1) hA (x) ∩ hA (y) ⊆ hA (x ∗ y) for all x, y ∈ A. An A-hesitant fuzzy subalgebra of X with A = X is called a hesitant fuzzy subalgebra of X. Proposition 3.2. Every hesitant fuzzy subalgebra HX := {(x, hX (x))|x ∈ X} of a B-algebra X satisfies the following inclusion: (3.2) hX (x) ⊆ hX (0) for all x ∈ X. Proof. Using (3.1) and (B1), we have hX (x) = hX (x) ∩ hX (x) ⊆ hX (x ∗ x) = hX (0) for all x ∈ X. □ Example 3.3. Let X = {0, 1, 2, 3} is a B-algebra ([6]) with the following Cayley table: ∗ 0 1 2 3

0 0 1 2 3

1 2 0 3 1

2 1 3 0 2

3 3 2 1 0

Let HX := {(x, hX (x))|x ∈ X} be a hesitant fuzzy set on X defined by { } HX = (0, [0, 1]), (1, ( 38 , 85 )), (2, ( 38 , 85 ), (3, ( 41 , 34 ))) .

1086

Jung Mi Ko ET AL 1084-1094

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Jung Mi Ko and Sun Shin Ahn

It is easy to verify that HX := {(x, hX (x)) | x ∈ X} is a hesitant fuzzy subalgebra of X. Theorem 3.4. A hesitant fuzzy set HX := {(x, hX (x))|x ∈ X} of a B-algebra is a hesitant fuzzy subalgebra of X if and only if HX (γ) := {x ∈ X|γ ⊆ hX (x)} is a subalgebra of X for all γ ∈ P([0, 1]) whenever it is non-empty. Proof. Assume that HX := {(x, hX (x))|x ∈ X} is a hesitant fuzzy subalgebra of X. Let x, y ∈ X and γ ∈ P([0, 1]) be such that x, y ∈ HX (γ). Then γ ⊆ hX (x) and γ ⊆ hX (y). It follows from (3.1) that γ ⊆ hX (x) ∩ hX (y) ⊆ hX (x ∗ y) Hence x ∗ y ∈ hX (γ). Thus HX (γ) is a subalgebra of X. Conversely, suppose that HX (γ) is a subalgebra X for all γ ∈ P([0, 1]) with HX (γ) ̸= ∅. Let x, y ∈ X, be such that hX (x) = γx and hX (y) = γy . Take γ = γx ∩ γy . Then x, y ∈ HX (γ) and so x ∗ y ∈ HX (γ) by assumption. Hence hX (x) ∩ hX (y) = γx ∩ γy = γ ⊆ hX (x ∗ y). Thus HX := {(x, hX (x))|x ∈ X} is a hesitant fuzzy subalgebra of X. □ Theorem 3.5. Every subalgebra of a B-algebra can be represented as a γ-inclusive set of a hesitant fuzzy subalgebra. Proof. Let A be a subalgebra of a B-algebra X. For a subset γ of [0, 1], define a hesitant fuzzy set HX on X by { γ if x ∈ A hX : X → P([0, 1]), x 7→ ∅ if x ∈ /A Obviously, A = HX (γ). We now prove that HX is a hesitant fuzzy subalgebra of X. Let x, y ∈ X. If x, y ∈ A, then x∗y ∈ A because A is a subalgebra of X. Hence hX (x) = hX (y) = hX (x∗y) = γ, and so hX (x) ∩ hX (y) ⊆ hX (x ∗ y). If x ∈ A and y ∈ / A, then hX (x) = γ and hX (y) = ∅ which imply that hX (x) ∩ hX (y) = γ ∩ ∅ = ∅ ⊆ hX (x ∗ y). Similarly, if x ∈ / A and y ∈ A, then hX (x) ∩ hX (y) ⊆ hX (x ∗ y). Obviously, if x ∈ / A and y ∈ / A, then hX (x) ∩ hX (y) ⊆ hX (x ∗ y). Therefore HX is a hesitant fuzzy subalgebra of X. □ Any subalgebra of a B-algebra X may not be represented as a γ-inclusive set of a hesitant fuzzy subalgebra of X in general (see Example 3.6). Example 3.6. Let X = {0, 1, 2, 3} be a B-algebra with the following Cayley table: ∗ 0 1 2 3

0 0 1 2 3

1 1 0 3 2

2 2 3 0 1

3 3 2 1 0

Let HX := {(x, hX (x))|x ∈ X} be a hesitant fuzzy set on X defined by { } HX = (0, [0, 1]), (1, ( 37 , 75 )), (2, ( 37 , 75 ), (3, ( 73 , 57 ))) .

1087

Jung Mi Ko ET AL 1084-1094

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Hesitant fuzzy normal subalgebras in B-algebras

It is easy to verify that HX := {(x, hX (x)) | x ∈ X} is a hesitant fuzzy subalgebra of X. The γ-inclusive set of HX are described as follows:    {0} if γ ∈ {[0, 1]} HX (γ) = X if γ ∈ {S|∅ ⊆ S ⊆ ( 37 , 57 )}   ∅ otherwise. The subalgebra {0, 1} cannot be a γ-inclusive set HX (γ) since there is no γ ⊆ [0, 1] such that HX (γ) = {0, 1}. Definition 3.7. A hesitant fuzzy set HX := {(x, hX )|x ∈ X} on a B-algebra X is said to be hesitant fuzzy normal if it satisfies: (3.3) hX (x ∗ y) ∩ hX (a ∗ b) ⊆ hX ((x ∗ a) ∗ (y ∗ b)) for all x, y, a, b ∈ X. A hesitant fuzzy set HX on a B-algebra X is called a hesitant fuzzy normal subalgebra of X if it satisfies (3.1) and (3.3). Example 3.8. Let X = {0, 1, 2, 3} be a B-algebra as in Example 3.3. Let HX := {(x, hX )|x ∈ X} be a hesitant fuzzy set on X defined by { } HX = (0, [0, 1]), (1, ( 14 , 43 )), (2, ( 14 , 34 )), (3, [0, 1]) . It is easy to verify that HX := {(x, hX (x)) | x ∈ X} is hesitant fuzzy normal. Proposition 3.9. Every hesitant fuzzy normal HX of a B-algebra X is a hesitant fuzzy subalgebra of X. Proof. Put y := 0, b := 0 and a := y in (3.3). Then hX (x ∗ 0) ∩ hX (y ∗ 0) ⊆ hX ((x ∗ y) ∗ (0 ∗ 0)) for any x, y ∈ X. Using (B2) and (B1), we have hX (x) ∩ hX (y) ⊆ hX (x ∗ y). Hence HX is a hesitant fuzzy subalgebra of X. □ The converse of Proposition 3.9 may not be true in general (see Example 3.10). Example 3.10. Let X = {0, 1, 2, 3, 4, 5} be a B-algebra ([8]) with the following table:

Let HX

∗ 0 0 0 1 1 2 2 3 3 4 4 5 5 be a hesitant fuzzy set defined by

1 2 0 1 4 5 3

2 1 2 0 5 3 4

3 3 4 5 0 1 2

4 4 5 3 2 0 1

5 5 3 4 1 2 0

HX = {(0, γ3 ), (1, γ1 ), (2, γ1 ), (3, γ1 ), (4, γ1 ), (5, γ2 )} .

1088

Jung Mi Ko ET AL 1084-1094

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Jung Mi Ko and Sun Shin Ahn

where γ1 , γ2 and γ3 are subsets of [0, 1] with γ1 ⊊ γ2 ⊊ γ3 . It is easy to check that HX is a hesitant fuzzy subalgebra of X. But it is not hesitant fuzzy normal since hX (1 ∗ 4) ∩ hX (3 ∗ 2) = hX (5) ∩ hX (5) = γ2 ⊈ γ1 = hX (1) = hX ((1 ∗ 3) ∗ (4 ∗ 2)). Theorem 3.11. A hesitant fuzzy set HX := {(x, hX (x))|x ∈ X} of a B-algebra is a hesitant fuzzy normal subalgebra of X if and only if HX (γ) := {x ∈ X|γ ⊆ hX (x)} is a normal subalgebra of X for all γ ∈ P([0, 1]) whenever it is non-empty. □

Proof. Similar to Theorem 3.4.

Proposition 3.12. Let a hesitant fuzzy set HX of a B-algebra X be hesitant fuzzy normal. Then hX (x ∗ y) = hX (y ∗ x) for any x, y ∈ X. Proof. Let x, y ∈ X. By (B1) and (B2), we have hX (x ∗ y) = hX ((x ∗ y) ∗ (x ∗ x)) ⊇ hX (x ∗ x) ∩ hX (y ∗x) = hX (0)∩hX (y∗x) = hX (y∗x). Interchanging x with y, we obtain hX (y∗x) ⊇ hX (x∗y), which proves the proposition. □ Theorem 3.13. Let HX := {(x, hx (x))|x ∈ X} be a hesitant fuzzy normal subalgebra of a B-algebra X. Then the set XhX = {x ∈ X|hX (x) = hX (0)} is a normal subalgebra of X. Proof. It is sufficient to show that XhX is normal. Let a, b, x, y ∈ X be such that x ∗ y ∈ XhX and a ∗ b ∈ XhX . Then hX (x ∗ y) = hX (0) = hX (a ∗ b). Since HX is a hesitant fuzzy normal subalgebra of X, it follows that hX ((x ∗ a) ∗ (y ∗ b)) ⊇ hX (x ∗ y) ∩ hX (a ∗ b) = hX (0). Using (3.2), we conclude that hX ((x ∗ a) ∗ (y ∗ b)) = hX (0). Hence (x ∗ a) ∗ (y ∗ b) ∈ XhX . This completes the proof. □ Theorem 3.14. The intersection of any set of a hesitant fuzzy normal subalgebra of a B-algebra X is also a hesitant fuzzy normal subalgebra. Proof. Let {(HX )α |α ∈ Λ} be a family of hesitant fuzzy normal subalgebras of a B-algebra X and let a, b, x, y ∈ X. Then ∩α∈Λ (hX )α ((x ∗ a) ∗ (y ∗ b)) = inf (hX )α ((x ∗ a) ∗ (y ∗ b)) α∈Λ

≥ inf {(hX )α (x ∗ y) ∩ (hX )α (a ∗ b)} α∈Λ

=[ inf (hX )α (x ∗ y)] ∩ [ inf (hX )α (a ∗ b)] α∈Λ

α∈Λ

=((∩α∈Λ (hX )α )(x ∗ y)) ∩ ((∩α∈Λ (hX )α )(a ∗ b)) which shows that ∩α∈Λ (HX )α is hesitant fuzzy normal. By Proposition 3.9, ∩α∈Λ (HX )α is an int-soft normal subalgebra of X. □ The union of any set of hesitant fuzzy normal subalgebra of a B-algebra X need not be a hesitant fuzzy normal subalgebra of X.

1089

Jung Mi Ko ET AL 1084-1094

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Hesitant fuzzy normal subalgebras in B-algebras

Example 3.15. Let X := {0, 1, 2, 3, 4, 5} be a B-algebra as in Example 3.10. Let HX := {(x, hX (x))|x ∈ X} and GX := {(x, gX (x))|x ∈ X} be hesitant fuzzy sets of X defined as follows: { hX : X → P([0, 1]), x 7→ { gX : X → P([0, 1]), x 7→

γ3 if x ∈ {0, 4} γ1 if x ∈ {1, 2, 3, 5} γ3 if x ∈ {0, 5} γ2 if x ∈ {1, 2, 3, 4}

where γ1 ⊊ γ2 ⊊ γ3 ⊆ [0, 1]. It is easy to check that HX and GX are hesitant fuzzy subalgebras of X. But HX ∪ GX is not a hesitant fuzzy subalgebra of X because (hX ∪ gX )(4) ∩ (hX ∪ gX )(5) =(hX (4) ∪ gX (4)) ∩ (hX (5) ∪ gX (5)) =(γ3 ∪ γ2 ) ∩ (γ1 ∪ γ3 ) = γ3 ⊈γ2 = γ1 ∪ γ2 = hX (2) ∪ gX (2) =(hX ∪ gX )(2) = (hX ∪ gX )(4 ∗ 5). Since every hesitant fuzzy normal subalgebra of a B-algebra X is a hesitant fuzzy subalgebra of X, the union of hesitant fuzzy normal subalgebra need not be a hesitant fuzzy normal subalgebra of a B-algebra. 4. Quotient B-algebras induced by a hesitant fuzzy normal subalgebra Let HX := {(x, hX (x))|x ∈ X} be a hesitant fuzzy normal subalgebra of a B-algebra X. For any x, y ∈ X, we define a binary operation “ ∼hX ” on X as follows: x ∼hX y ⇔ hX (x∗y) = hX (0). Lemma 4.1. The operation ∼hX is an equivalence relation on a B-algebra X. Proof. Obviously, it is reflexive. Let x ∼hX y. Then hX (x∗y) = hX (0). It follows from Proposition 3.12 that hX (0) = hX (x ∗ y) = hX (y ∗ x). Hence ∼hX is symmetric. Let x, y, z ∈ X be such that x ∼hX y and y ∼hX z. Then hX (x ∗ y) = hX (0) and hX (y ∗ z) = hX (0). Using Proposition 3.12, (3.3), (B1), (B2) and (3.2), we have hX (0) = hX (x ∗ y) ∩ hX (y ∗ z) = hX (x ∗ y) ∩ hX (z ∗ y) ⊆ hX ((x ∗ z) ∗ (y ∗ y)) = hX ((x ∗ z) ∗ 0) = hX (x ∗ z) ⊆ hX (0). Hence hX (x ∗ z) = hX (0), i.e., ∼hX is transitive. Therefore “ ∼hX ” is an equivalence relation on X. □ Lemma 4.2. For any x, y, p, q ∈ X, if x ∼hX y and p ∼hX q, then x ∗ p ∼hX y ∗ q. Proof. Let x, y, p, q ∈ X be such that x ∼hX y and p ∼hX q. Then hX (x ∗ y) = hX (y ∗ x) = hX (0) and hX (p ∗ q) = hX (q ∗ p) = hX (0). Using (3.3) and (3.2), we have hX (0) = hX (x ∗ y) ∩ hX (p ∗ q) ⊆ hX ((x ∗ p) ∗ (y ∗ q)) ⊆ hX (0). Hence hX ((x ∗ p) ∗ (y ∗ q)) = hX (0). By similar way, we get hX ((y ∗ q) ∗ (x ∗ p)) = hX (0). Therefore x ∗ p ∼hX y ∗ q. Thus “ ∼hX ” is a congruence relation on X. □

1090

Jung Mi Ko ET AL 1084-1094

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Jung Mi Ko and Sun Shin Ahn

Denote (hX )x and X/hX the equivalence class containing x and the set of all equivalence classes of X, respectively, i.e., (hX )x := {y ∈ X|y ∼hX x} and X/hX := {(hX )x |x ∈ X}. Define a binary relation • on X/hX as follows: (hX )x • (hX )y = (hX )x∗y for all (hX )x , (hX )y ∈ X/hX . Then this operation is well-defined by Lemma 4.2. Theorem 4.3. If HX := {(x, hX (x))|x ∈ X} is a hesitant fuzzy normal subalgebra of a B-algebra X, then the quotient algebra X/hX := (X/hX , •, (hX )0 ) is a B-algebra. □

Proof. Straightforward.

Proposition 4.4. Let µ : X → Y be a homomorphism of B-algebras. If HY := {(y, hY (y))|y ∈ Y } is a hesitant fuzzy normal subalgebra of Y , then (hY ◦ µ, X) is a hesitant fuzzy normal subalgebra of X. Proof. For any x, y, a, b ∈ X, we have (hY ◦ µ)((x ∗X a) ∗X (y ∗X b)) =hY (µ((x ∗X a) ∗X (y ∗X b)) =hX ((µ(x) ∗Y µ(a)) ∗Y (µ(y) ∗Y µ(b))) ⊇hY (µ(x) ∗Y µ(y)) ∩ hY (µ(a) ∗Y µ(b)) =hY (µ(x ∗X y)) ∩ hY (µ(a ∗X b)) =(hY ◦ µ)(x ∗X y) ∩ (hY ◦ µ)(a ∗X b). Hence hY ◦ µ is hesitant fuzzy normal. By Proposition 3.9, (hY ◦ µ, X) is a hesitant fuzzy normal subalgebra of X. □ Proposition 4.5. Let HX be a hesitant fuzzy normal subalgebra of a B-algebra X. The mapping γ : X → X/hX , given by γ(x) := (hX )x , is a surjective homomorphism, and Kerγ = {x ∈ X|γ(x) = (hX )0 } = XhX . Proof. Let (hX )x ∈ X/hX . Then there exists an element x ∈ X such that γ(x) = (hX )x . Hence γ is surjective. For any x, y ∈ X, we have γ(x ∗ y) = (hX )x∗y = (hX )x • (hX )y = γ(x) • γ(y). Thus γ is a homomorphism. Moreover, Ker γ = {x ∈ X|γ(x) = (hX )0 } = {x ∈ X|x ∼hX 0} = {x ∈ X|hX (x) = hX (0)} = XhX . □ Example 4.6. Let X = {0, 1, 2, 3} be a B-algebra ([4]) with the following Cayley table: ∗ 0 1 2 3

0 0 1 2 3

1 1 0 1 2

1091

2 2 3 0 1

3 3 2 3 0

Jung Mi Ko ET AL 1084-1094

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Hesitant fuzzy normal subalgebras in B-algebras

Let HX be a hesitant fuzzy set defined by { hX : X → P(U ), x 7→

γ2 if x ∈ {0, 2} γ1 if x ∈ {1, 3}

where γ1 ⊊ γ2 ⊆ [0, 1]. It is easy to check that HX is a hesitant fuzzy normal subalgebras of X. Then XhX = {x ∈ X|hX (x) = hX (0)} = {0, 2}. Define x ∼hX y if and only if hX (x ∗ y) = hX (0). Then (hX )0 = {x ∈ X|x ∼hX 0} = {x ∈ X|hX (x ∗ 0) = hX (0)} = {0, 2} and (hX )1 = {x ∈ X|x ∼hX 1} = {x ∈ X|hX (x ∗ 1) = hX (0)} = {1, 3} Hence X/hX = {(hX )0 , (hX )1 }. Let φ : X → X/hX be a map defined by φ(0) = φ(2) = (hX )0 and φ(1) = φ(3) = (hX )1 . It is easy to check that φ is a homomorphism and Kerφ = {x ∈ X|φ(x) = (hX )0 } = {x ∈ X|x ∼hX 0} = {x ∈ X|hX (x) = hX (0)} = XhX . Theorem 4.7. Let X := (X; ∗X , 0X ) be a B-algebra and Y := (Y ; ∗Y , 0Y ) be a B-algebra and let µ : X → Y be an epimorphism. If HY := {(y, hY )|y ∈ Y } is a hesitant fuzzy normal subalgebra of Y , then the quotient algebra X/(hY ◦ µ) := (X/(hY ◦ µ), •X , (hY ◦ µ)0X ) is isomorphic to the quotient algebra Y /hX := (Y /hY , •Y , (hY )0Y ). Proof. By Theorem 4.3 and Proposition 4.4, X/hY ◦µ : (X/(hY ◦µ), •X , (hY ◦µ)0X ) is a B-algebra and Y /hY := (Y /hX , •Y , (hY )0Y ) is a B-algebra. Define a map η : X/(hY ◦ µ) → Y /hY , (hY ◦ µ)x 7→ (hY )µ(x) for all x ∈ X. Then the function η is well-defined. In fact, assume that (hY ◦ µ)x = (hY ◦ µ)y for all x, y ∈ X. Then we have hY (µ(x) ∗Y µ(y)) = hY (µ(x ∗X y)) = (hY ◦ µ)(x ∗X y) = (hY ◦ µ)(0X ) = hY (µ(0X )) = hY (0Y ). Hence (hY )µ(x) = (hY )µ(y) . For any (hY ◦ µ)x , (hY ◦ µ)y ∈ X/(hY ◦ µ), we have η((hY ◦ µ)x •X (hY ◦ µ)y ) = η((hY ◦ µ)x∗y ) = (hY )µ(x∗X y) = (hY )µ(x)∗Y µ(y) = (hY )µ(x) • (hY )µ(y) = η((hY ◦ µ)x ) •Y η((hY ◦ µ)y ). Therefore η is a homomorphism. Let (hY )a ∈ Y /hY . Then there exists x ∈ X such that µ(x) = a since µ is surjective. Hence η((hX ◦ µ)x ) = (hY )µ(x) = (hY )a and so η is surjective. Let x, y ∈ X be such that (hY )µ(x) = (hY )µ(y) . Then we have (hY ◦µ)(x∗X y) = hY (µ(x∗X y)) = hY (µ(x) ∗Y µ(y)) = hY (0Y ) = hY (µ(0X )) = (hY ◦ µ)(0X ). It follows that (hY ◦ µ)x = (hY ◦ µ)y . Thus η is injective. □ The homomorphism π : X → X/hX , x → (hX )x , is called the natural homomorphism of X onto X/hX . In Theorem 4.7, if we define natural homomorphisms πX : X → X/hY ◦ µ and πY : Y → Y /hY then it is easy to show that η ◦πX = πY ◦µ, i.e., the following diagram commutes.

1092

Jung Mi Ko ET AL 1084-1094

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Jung Mi Ko and Sun Shin Ahn

X   πX y

µ

−−−→

Y   πY y

η

X/(hY ◦ µ) −−−→ Y /hY . Proposition 4.8. Let HX be a hesitant fuzzy normal subalgebra of a B-algebras X. If J is a normal subalgebra of X, then J/hX is a normal subalgebra of X/hX . Proof. Let HX be a hesitant fuzzy normal subalgebra of a B-algebras X and let J be a normal subalgebra of X. Then for any x, y ∈ J, x∗y ∈ J. Let (hX )x , (hX )y ∈ J/hX . Then (hX )x •(hX )y = (hX )x∗y ∈ J/hX . Hence J/hX = {(hX )x |x ∈ J} is a subalgebra of X/hX . For any x ∗ y, a ∗ b ∈ J, (x ∗ a) ∗ (y ∗ b) ∈ J, so for any (hX )x • (hX )y , (hX )a • (hX )b ∈ J/hX , we have ((hX )x • (hX )a ) • ((hX )y • (hX )b ) = (hX )x∗a • (hX )y∗b = (hX )(x∗a)∗(y∗b) ∈ J/hX . Thus J/hX is a normal subalgebra of X/hX . □ Theorem 4.9. Let HX be a hesitant fuzzy normal subalgebra of a B-algebras X. If J ∗ is a normal subalgebra of a B-algebra X/hX , then there exists a normal subalgebra J = {x ∈ X|(hX )x ∈ J ∗ } in X such that J/hX = J ∗ . Proof. Since J ∗ is a normal subalgebra of X/hX , so (hX )x • (hX )y = (hX )x∗y ∈ J ∗ for any (hX )x , (hX )y ∈ J ∗ . Thus x ∗ y ∈ J for any x, y ∈ J. And (hX )x∗a • (hX )y∗b = (hX )(x∗a)∗(y∗b) ∈ J ∗ for any (hX )x∗y , (hX )a∗b ∈ J ∗ . Thus (x ∗ a) ∗ (y ∗ b) ∈ J for any x ∗ y, a ∗ b ∈ J. Therefore J is a normal subalgebra of X. By Proposition 4.5, we have J/hX ={(hX )j |j ∈ J} ={(hX )j |∃(hX )x ∈ J ∗ such that j ∼hX x} ={(hX )j |∃(hX )x ∈ J ∗ such that (hX )x = (hX )j } ={(hX )j |(hX )j ∈ J ∗ } = J ∗ . Theorem 4.10. Let HX be a hesitant fuzzy normal subalgebra of a B-algebra X. If J is a X/hX ∼ normal subalgebra of X, then = X/J. J/hX X/hX X/hX = {[(hX )x ]J/hX |hX ∈ X/hX }. If we define φ : → X/J by J/hX J/hX φ([(hX )x ]J/hX ) = [x]J = {y ∈ X|x ∼J y}, then it is well defined. In fact, suppose that [(hX )x ]J/hX = [(hX )y ]J/hX . Then (hX )x ∼J/hX (hX )y and so (hX )x∗y = (hX )x • (hX )y ∈ J/hX . X/hX , we Hence x ∗ y ∈ J. Therefore x ∼J y, i.e., [x]J = [y]J . Given [(hX )x ]J/hX , [(hX )y ]J/hX ∈ J/hX have φ([(hX )x ]J/hX • [(hX )y ]J/hX ) = φ([(hX )x • (hX )y ]J/hX ) = [x ∗ y]J = [x]J ∗ [y]J = φ([(hX )x ]J/hX ) ∗ φ([(hX )y ]J/hX ). Hence φ is a homomorphism. Proof. Note that

1093

Jung Mi Ko ET AL 1084-1094

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Hesitant fuzzy normal subalgebras in B-algebras

Obviously, φ is onto. Finally, we show that φ is one-to-one. If φ([(hX )x ]J/hX ) = φ([(hX )y ]J/hX ), then [x]J = [y]J , i.e., x ∼J y. If (hX )a ∈ [(hX )x ]J/hX , then (hX )a ∼J/hX (hX )x and hence (hX )a∗x ∈ J/hX . It follows that a ∗ x ∈ J, i.e., a ∼J x. Since ∼J is an equivalence relation, a ∼J y and so Ja = Jy . Hence a ∗ y ∈ J and so (hX )a∗y ∈ J/hX . Therefore (hX )a ∼J/hX (hX )y . Hence (hX )a ∈ [(hX )y ]J/hX . Thus [(hX )x ]J/hX ⊆ [(hX )y ]J/hX . Similarly, we obtain [(hX )y ]J/hX ⊆ [(hX )x ]J/hX . Therefore [(hX )x ]J/hX = [(hX )y ]J/hX . This completes the proof. □ References [1] J. R. Cho and H. S. Kim, On B-algebras and Related Systems, 8(2001), 1-6. [2] Y. B. Jun and S. S. Ahn, Hesitant fuzzy soft theory applied to BCK/BCI-algebras, J. Comput. Anal. Appl. 20 (2016), no.4, 635–646. [3] Y. B. Jun and S. S. Ahn, On hesitant fuzzy filters in BE-algebras, J. Comput. Anal. Appl. (to appear). [4] Y. B. Jun, E. H. Roh and H. S. Kim, On fuzzy B-algebras, Czech. Math. J. 52 (2002), 375-384. [5] Y. B. Jun and S. Z. Song, Hesitant fuzzy set theory applied to filters in M T L-algebras, Honam Math. J. 36 (2014), no.4, 813–830. [6] Y. H. Kim and S. J. Yeom, Qutient B-algebras via fuzzy normal B-algebras, Honam Math. J. 30 (2008), 21-32. [7] J. Neggers and H. S. Kim, On B-algebras, Mate. Vesnik 54(2002), 21-29. [8] J. Neggers and H. S. Kim, A fundamental theorem of B-homomorphism for B-algebras, Intern. Math. J. 2(2002), 207-214. [9] V. Torra, Hesitant fuzzy sets, Int. J. Intell. Syst. 25 (2010), 529–539. [10] M. Xia and Z. S. Xu, Hesitant fuzzy information aggregation in decision making, Internat. J. Approx. Reason. 52(3) (2011), 395–407. [11] Z. S. Xu and M. Xia, Distance and similarity measures for hesitant fuzzy sets, Inform. Sci. 181(11) (2011), 2128–2138.

1094

Jung Mi Ko ET AL 1084-1094

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

IMPULSIVE PERIODIC SOLUTIONS OF SECOND ORDER DIFFERENTIAL EQUATIONS WITH SINGULARITY SHENGJUN LI1,2 , YANHUA WANG1

Abstract. In this paper, we study the impulsive periodic solutions of second order singular ordinary differential equations. The proof of the main result relies on a nonlinear alternative principle of Leray-Schauder, together with a truncation technique and the result is applicable to the case of a strong singularity as well as the case of a weak singularity.

1. Introduction Impulsive effects occur widely in many evolution processes in which their states are changed abruptly at certain moments of time, for example, in population biology, the radiation of electromagnetic waves, the spread of heat, the diffusion of chemicals, the maintenance of a species through instantaneous stocking, harvesting. The impulsive diffferential equation is also an adequate apparatus for the mathematical simulation of such processes and phenomena. For the general aspects of impulsive differential equations, we refer the reader to the classical monograph [9]. In this paper, we study the existence of positive solution for the periodic boundary value problem with impulse effects:  00 x + a(t)x = f (t, x), t ∈ J0 , (1.1) x(0) − x(T ) = x0 (0) − x0 (T ) = 0, under the impulse conditions (1.2)

−∆x0 |t=tk = Ik (x(tk )),

k = 1, 2, . . . , p,

where J = [0, T ], t1 , t2 , . . . , tp ∈ J with 0 = t0 < t1 < · · · < tp < tp+1 = T , J0 = J \ {t1 , t2 , . . . , tp }; the nonlinearity f (t, x) is continuous in (t, x) ∈ J0 × R, − − 0 0 + f (t+ k , x), f (tk , x) exist, f (tk , x) = f (tk , x) and T −periodic in t; ∆x |t=tk = x (tk )− 0 − 0 ± 0 x (tk ) with x (tk ) = lim± x (t); a(t) is continuous, T −periodic function; the impult→tk

sive Ik : R → R(k = 1, . . . , p) are continuous functions. We are mainly interested in the case that f (t, x) presents a repulsive singularity at x = 0, which means that lim f (t, x) = +∞, uniformly in t.

x→0+

By an impulsive periodic solution of (1.1), we mean that x ∈ P C(J) satisfying (1.1). P C(J) denotes the class of the maps x : J → R such that x(t) is continuous at t 6= tk , and left continuous at t = tk , the right limit x(t+ k ) exists for k = 1, 2, . . . , p. Note that P C(J) is a Banach space with the norm kxkP C = supt∈J |x(t)|. 2010 Mathematics Subject Classification. 34C25. Key words and phrases. Periodic solution; Impulse; Singularity; Leray-Schauder alternative principle. 1

1095

SHENGJUN LI ET AL 1095-1103

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

SHENGJUN LI,

YANHUA WANG

Impulsive differential equations have been studied by many authors [3, 6, 16, 17, 20, 21, 22]. Some classical tools have been used to study such problems in the literature. These classical techniques include the obtention of a priori bounds for the possible solutions and then the applications of the coincidence degree theory of Mawhin [18], the method of upper and lower solutions with monotone technique [2] and some fixed point theorems [4] and variational methods [23, 24]. On the other hand, singular periodic problems without impulse effects have also been investigated extensively in the literature by variational methods [15], or topological methods [5, 8, 11, 12, 13], which were started with the pioneering paper of Lazer and Solimini [10], in this paper, they proved that a necessary and sufficient condition for the existence of a positive periodic solution for equation 1 + e(t) xλ is that the mean value of e is negative, e¯ < 0, here λ ≥ 1, which is a strong force condition in a terminology first introduced by Gordon [7]. Moreover, if 0 < λ < 1, which corresponds to a weak force condition, they found example of functions e with negative mean values and such that periodic solutions do not exist. Since then, the strong force condition became standard in the related works; see, for instance [26, 27]. The study of impulsive singular problems is more recent and the number of references is much smaller [14, 21]. In this paper, we will apply a nonlinear alternative principle of Leray-Schauder to study the impulsive periodic solutions of second-order singular differential equations (1.1) and (1.2). Our main aim is to obtain some new existence results for positive impulsive periodic solutions of the singular problem x00 (t) =

(1.3)

x00 (t) + a(t)x =

1 + µxβ , xα

−∆x0 |t=tk = ck x, k = 1, . . . , p, where α, β > 0 and µ ∈ R is a given parameter. Here we emphasize that new results are applicable to the case of a strong singularity as well as the case of a weak singularity. The rest of this paper is organized as follows. In Section 2, some preliminary results will be given. In Section 3, we will state and prove the main results. To illustrate the new results, some applications are also given. 2. preliminaries Let us consider the linear equation (2.1)

x00 + a(t)x = 0.

When (2.1) is nonresonant, i.e., its unique T -periodic solution is the trivial one, as a consequence of Fredholm’s alternative, the nonhomogeneous equation (2.2)

x00 + a(t)x = h(t)

admits a unique T -periodic solution which can be written as Z T x(t) = G(t, s)h(s)ds, 0

1096

SHENGJUN LI ET AL 1095-1103

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

IMPULSIVE PERIODIC SOLUTIONS OF SECOND ORDER DIFFERENTIAL EQUATIONS 3

where G(t, s) is the Green’s function of (2.1) associated with periodic boundary conditions (2.3)

x0 (0) = x0 (T ).

x(0) = x(T ),

Throughout this paper, we always assume that the following standing hypothesis is satisfied: (H) a(t) is a continuous T -function and the Green’s function of (2.1) is positive for all (t, s) ∈ [0, T ] × [0, T ]. In other words, the strict anti-maximum principle holds for (2.1)-(2.3). In order to guarantee the positivity of G(t, s), it is prove in [25] that if a(t) satisfies a  0 then the positivity of G(t, s) is equivalent to λ1 (a) > 0, where the notation a  0 means that a(t) ≥ 0 for all t ∈ [0, T ] and a(t) > 0 for t in a subset of positive measure, λ1 (a) denotes the first anti-periodic eigenvalue of x00 + (λ + a(t))x = 0 subject to the anti-periodic boundary conditions x0 (0) = −x0 (T ).

x(0) = −x(T ),

Now we make condition (H) clear. When a(t) ≡ k 2 , condition (H) is equivalent to saying that 0 < k 2 ≤ λ1 = (π/T )2 , where λ1 is the first eigenvalue of the homogeneous equation x00 + k 2 x = 0 with Dirichlet boundary conditions x(0) = x(T ) = 0. For a non-constant function a(t), there is an Lp -criterion proved in [25]. To describe these, we use k · kq to denote the usual Lq -norm over (0, T ) for any given exponent q ∈ [1, ∞]. The conjugate exponent of q is denoted by p : p1 + 1q = 1. Let M(q) denote the best Sobolev constant in the following inequality Ckuk2q ≤ ku0 k22

for all u ∈ H01 (0, T ).

The explicit formula for M(q) is (  1−2/q  2π

M(q) =

qT 1+2/q 4 T,

2 q+2

Γ(1/q) Γ(1/2+1/q)

2

,

for 1 ≤ q < ∞, for q = ∞,

where Γ(·) is the Gamma function of Euler. Lemma 2.1 [25] Assume that a  0 and a ∈ Lp [0, T ] for some 1 ≤ p ≤ +∞. If kakp < M(2q), then (2.1) satisfies the standing hypothesis (H), i.e, G(t, s) > 0 for all (t, s) ∈ [0, T ] × [0, T ]. When a(t) ≡ k 2 and 0 < k ≤≤ π/T , we have ( sin k(t−s)+sin k(T −t+s) , 0 ≤ s ≤ t ≤ T, 2k(1−cos kT ) G(t, s) = sin k(s−t)+sin k(T −s+t) , 0 ≤ t ≤ s ≤ T. 2k(1−cos kT ) Under hypothesis (H), we always denote M = max G(t, s), 0≤s,t≤T

m=

min G(t, s),

0≤s,t≤T

σ=

m . M

Thus M > m > 0 and 0 < σ < 1.

1097

SHENGJUN LI ET AL 1095-1103

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

SHENGJUN LI,

YANHUA WANG

Now, we define the operator T : P C(J) → P C(J) by Z T p X G(t, s)f (s, x(s))ds + G(t, tk )Ik (x(tk )). (T x)(t) = 0

k=1

Lemma 2.3 T is continuous and completely continuous. Moreover, x(t) is an impulsive periodic solution of (1.1) and (1.2) if and only if x(t) is a fixed point of T. Proof. The proof is similar to that of [1], and therefore we omit the detail. 3. Main results In this section, we state and prove the new existence results for (1.1). In order to prove our main results, the following nonlinear alternative of Leray-Schauder is RT need, which can be found in [19]. Let us define the function ω(x) = 0 G(x, s)ds and use k · k1 denote the usual L1 − norm over (0, T ), by k · k the supremum norm of C[0, T ]. Lemma 3.1 Assume Ω is a relatively compact subset of a convex set E in a normed space X. Let T : Ω → E be a compact map with 0 ∈ Ω. Then one of the following two conclusions holds: (i) T has at least one fixed point in Ω. (ii) There exist u ∈ ∂Ω and 0 < λ < 1 such that u = λT u. Now we present our main existence result of positive solution to problem (1.1). Theorem 3.2 Suppose that (1.1) satisfies (H). Furthermore, assume that there exists a constant r > 0 such that (H1 ) There exists a continuous function φr  0 such that f (t, x) ≥ φr (t) for all (t, x) ∈ [0, T ] × (0, r]. (H2 ) There exist continuous, non-negative functions g(x), h(x) and ψ(x) on (0, ∞) such that f (t, x) ≤ g(x) + h(x), Ik (x) > 0, k = 1, . . . , p,

for all (t, x) ∈ [0, T ] × (0, ∞),

p X

Ik (x) ≤ ψ(x)

for all x ∈ (0, ∞),

k=1

where g(x) > 0 is non-increasing, h(x)/g(x) and ψ(x) is non-decreasing. (H3 ) The following inequality holds r − M ψ(r) n o > kωk, g(σr) 1 + h(r) g(r) . Then (1.1) has at least one positive T -periodic solution x with 0 < kxk ≤ r. Proof. Since (H3 ) holds, let N0 = {n0 , n0 + 1, · · · }, we can choose n0 ∈ {1, 2, · · · } 1 < σr and such that n0   h(r) 1 kωkg(σr) 1 + + M ψ(r) + < r. g(r) n0 Consider the family of equations (3.1)

x00 (t) + a(t)x(t) = λfn (t, x(t)) +

1098

a(t) , n

SHENGJUN LI ET AL 1095-1103

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

IMPULSIVE PERIODIC SOLUTIONS OF SECOND ORDER DIFFERENTIAL EQUATIONS 5

associated with boundary conditions 0 + x0 (t− k ) = x (tk ) + Ik,n (x(tk )),

(3.2)

k = 1, . . . , p,

where λ ∈ [0, 1], n ∈ N0 and 

f (t, x) f (t, 1/n)



Ik (x) Ik (1/n)

fn (t, x) =

if x ≥ 1/n, if x ≤ 1/n.

and Ik,n (x) =

if x ≥ 1/n, if x ≤ 1/n.

Problem (3.1)-(3.2) is equivalent to the following fixed point of the operator equation T

Z (3.3)

x(t) = λ

G(t, s)fn (s, x(s))ds + 0

p X

G(t, tk )Ik,n (x(tk )) +

k=1

1 n

1 = λ(Tn x)(t) + . n Now we show kxk 6= r for any fixed point x of (3.3). If not, assume that x is a fixed point of (3.3) for some λ ∈ [0, 1] such that kxk = r. Note that 1 x(t) − = λ n

T

Z

G(t, s)fn (s, x(s))ds + 0 T

Z ≥ λm

fn (s, x(s))ds + m 0

G(t, tk )Ik,n (x(tk ))

k=1 p X

Ik,n (x(tk ))

k=1 T

Z = σM λ

fn (s, x(s))ds + σM 0

t∈[0,T ]

p X

Ik,n (x(tk ))

k=1

( Z ≥ σ max λ = σkx −

p X

T

G(t, s)fn (s, x(s))ds +

0

p X

) G(t, tk )Ik,n (x(tk ))

k=1

1 k. n

By the choice of n0 , 1/n ≤ 1/n0 < σr. Hence, we have   1 1 1 1 x(t) ≥ σkx − k + ≥ σ kxk − + ≥ σr, n n n n

1099

for all

0 ≤ x ≤ T.

SHENGJUN LI ET AL 1095-1103

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

SHENGJUN LI,

YANHUA WANG

Thus, from condition (H2 ) we have T

Z x(t) = λ

G(t, s)fn (s, x(s))ds + 0

G(t, s)f (s, x(s))ds +

=λ 0

Z

p X

G(t, tk )Ik (x(tk )) +

k=1

T



G(t, tk )Ik,n (x(tk )) +

k=1 T

Z

p X

G(t, s)f (s, x(s))ds + 0

p X

G(t, tk )Ik (x(tk )) +

k=1

1 n

1 n

1 n

T

  h(x(s)) 1 G(x, s)g(x(s)) 1 + ≤ ds + M ψ(x(tk )) + g(x(s)) n 0  Z T h(r) 1 ≤ g(σr) 1 + G(t, s)ds + M ψ(r) + g(r) n   0 h(r) 1 ≤ g(σr) 1 + kωk + M ψ(r) + . g(r) n0 Z

Therefore,   1 h(r) kωk + . r = kxk ≤ g(σr) 1 + g(r) n0 This is a contradiction to the choice of n0 , so kxk 6= r. Using Lemma 3.1, we know that x(t) = (Tn x)(t) +

1 n

has a fixed point, denoted by xn , in Br = {x ∈ P C(J) : kxk < r}, that is, the equation (3.4)

x00 (t) + a(t)x(t) = fn (t, x(t)) +

a(t) , n

has a periodic solution xn with kxn k < r. Since xn (t) ≥ 1/n for all t ∈ [0, T ] and xn is actually a positive solution of (3.4). Next we claim that these solutions xn have a uniform positive lower bound, i.e., there exists a constant δ > 0, independent of n ∈ N0 , such that min xn (t) ≥ δ

t∈[0,T ]

for all n ∈ N0 . To see this, we know from (H1 ) that there exists a function φr  0 such that f (t, x) ≥ φr (t) for (t, x) ∈ [0, T ] × (0, r]. Now let xr (t) be the unique periodic solution to the problem (2.2) with h = φr (t). Then Z T xr (t) = G(t, s)φr (s)ds ≥ M kφr k1 > 0. 0

Let   1 E = t ∈ [0, T ] : xn (t) ≥ , n

1100

E0 = [0, T ]\E.

SHENGJUN LI ET AL 1095-1103

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

IMPULSIVE PERIODIC SOLUTIONS OF SECOND ORDER DIFFERENTIAL EQUATIONS 7

So we have Z T p X 1 x(t) = G(t, s)fn (s, xn (s))ds + G(t, tk )Ik,n (x(tk )) + n 0 k=1   Z Z p X 1 1 = G(t, s)f (s, xn (s))ds + G(t, s)f s, ds + G(t, tk )Ik (x(tk )) + n n 0 E E k=1 Z Z ≥ G(t, s)φr ds + G(t, s)φr ds E0

E T

Z

G(t, s)φr (s)ds ≥ M kφr k1 =: δ.

= 0

In order to pass the solutions of the truncation equation (3.1) (with λ = 1) to that of the original equation (1.1), we need the fact kx0n k is bounded. Now we show that kx0n k ≤ H

(3.5)

for some constant H > 0 and for all n ≥ n0 . Integrating (3.1) from 0 to T (with λ = 1), we obtain  Z T Z T a(t) dt. a(t)xn (t)dt = fn (t, xn (t)) + n 0 0 Since x(0) = x(T ), there exists t0 ∈ [0, T ] such that x0n (t0 ) = 0, therefore Z t x00n (s)ds kx0n k = max |x0n (t)| = max 0≤t≤T 0≤t≤T t0 Z t   a(s) = max fn (s, xn (s)) + − a(s)xn (s) ds 0≤t≤T n t0 # Z T" Z T a(s) ≤ fn (s, xn (s)) + ds + a(s)xn (s) ds n 0 0 Z T =2 a(s)xn (s)ds = 2rkak1 =: H. 0

The fact kxn k < r and kx0n k ≤ H show that {xn }n∈N0 is a bounded and equi-continuous family on [0, T ]. Thus the Arzela-Ascoli Theorem guarantees that {xn }n∈N0 has a subsequence {xni }i∈N converging uniformly on [0, T ] to a function x ∈ C[0, T ]. f is uniformly continuous since xn satisfies δ ≤ xn (t) ≤ r for all t ∈ [0, T ]. Moreover, xni satisfies the integral equation Z T p X 1 xni (t) = G(t, s)f (s, xni (s))ds + G(t, ti )Ik (xni (t)) + . n i 0 i=1 Letting i → ∞, we arrive at Z T p X x(t) = G(t, s)f (s, x(s))ds + G(t, ti )Ik (x(t)). 0

i=1

Therefore, x is a positive periodic solution of (1.1) and satisfies 0 < kxk ≤ r. p P Corollary 3.3 Assume that α > 0, β ≥ 0, ck > 0, k = 1, 2, . . . , p, M ck < 1. k=1

1101

SHENGJUN LI ET AL 1095-1103

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

SHENGJUN LI,

YANHUA WANG

(i) if β < 1, then (1.3) has at least one positive periodic solution for each µ > 0. (ii) if β ≥ 1, then (1.3) has at least one positive periodic solution for each 0 < µ < µ∗ , where µ∗ is some positive constant. Proof. We will apply Theorem 3.2. To this end, the assumption (H1 ) is fulfilled with φr (t) = r−α . If we take g(x) = x−α ,

h(x) = µxβ ,

ψ(x) =

p X

ck x,

k=1

RT then conditions (H2 ) is satisfied. Let ω(t) = 0 G(t, s)ds. Now the existence condition (H3 ) becomes   p p P P r 1−M ck − M ck 1 k=1 k=1 µ< − α+β kωkrα+β (σr)−α r for some r > 0. So (1.3) has at least one positive periodic solution for   p p P P r 1−M ck − M ck 1 k=1 k=1 ∗ 0 < µ < µ := sup − α+β . α+β −α kωkr (σr) r r>0 Note that µ∗ = ∞ if Since M

p P

ck < 1, it is easy to see that µ∗ = ∞ if β < 1 and

k=1

µ∗ < ∞ if β ≥ 1. We have (i) and (ii). Acknowledgment This work is supported by the National Natural Science Foundation of China (Grant No.11461016), Hainan Natural Science Foundation(Grant No.117005), China Postdoctoral Science Foundation funded project (Grant No.2017M612577), Young Foundation of Hainan University (Grant No.hdkyxj201718). References 1. R.P.Agarwal, D. O’Regan, Multiple nonnegative solutions for second order impulsive differential equations, Appl. Math. Comput. 114(2000), 51-59. 2. D. D. Bainov, M. B. Dimitrova and A. B. Dishliev, Oscillation of the solutions of impulsive differential equations and inequalities with retarded argument, Rocky Mount. J. Math. 28(1998), 25-40. 3. D. Chen, B. Dai, Periodic solution of second order impulsive delay differential systems via variational method, Appl. Math. Lett. 38 (2014), 61-66. 4. L. Chen, C. C. Tisdell, R. Yuan, On the solvability of periodic boundary value problems with impulse. J. Math. Anal. Appl. 331(2007). 233-244. 5. J. Chu, S. Li, H. Zhu, Nontrivial periodic solutions of second order singular damped dynamical systems, Rocky Mountain J. Math., 45 (2015), 457C474. 6. B. Dai, D. Zhang, The existence and multiplicity of solutions for second-order impulsive differential equations on the half-line, Results Math. 63 (2013), 135-149. 7. W. B. Gordon, Conservative dynamical systems involving strong forces, Trans. Amer. Math. Soc. 204(1975), 113-135. 8. R. Hakl, P. J. Torres, On periodic solutions of second-order differential equations with attractive-repulsive singularities. J. Differential Equations 248 (2010), 111-126. 9. V. Lakshmikantham, D. D. Bainov and P. S. Simeonov, Theory of impulsive differential equations, World Scientific, Singapore, 1989.

1102

SHENGJUN LI ET AL 1095-1103

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

IMPULSIVE PERIODIC SOLUTIONS OF SECOND ORDER DIFFERENTIAL EQUATIONS 9

10. A.C. Lazer, S. Solimini, On periodic solutions of nonlinear differential equations with singularities. Proc. Amer. Math. Soc. 99 (1987), 109-114. 11. S. Li, F. Liao, W. Xing, Periodic solutions of Li´ enard differential equations with singularity, Electron. J. Differential Equations, 151 (2015), 1-12. 12. S. Li, W. Li, Y. Fu, Periodic orbits of singular radially symmetric systems, J. Comput. Anal. Appl. 22 (2017), 393-401. 13. S. Li, Y. Zhu, Periodic orbits of radially symmetric Keplerian-like systems with a singularity, J. Funct. Spaces, 2016, ID 7134135. 14. S. Li, X. Tian, H. Luo, Impulsive periodic solutions for a singular damped differential equation via variational methods, J. Comput. Anal. Appl. 24 (2018), 848-858. 15. J. Li, S. Li, Z. Zhang, Periodic solutions for a singular damped differential equation, Bound. Value Probl. 5 (2015). 16. R. Liang, Z. Liu, Nagumo type existence results of Sturm-Liouville BVP for impulsive differential equations, Nonlinear Anal. 74 (2011), 6676-6685. 17. J.J. Nieto, D. O’Regan, Variational approach to impulsive differential equations. Nonlinear Anal. Real World Appl. 10 (2009) , 680-690. 18. D. Qian, X. Li, Periodic solutions for ordinary differential equations with sublinear impulsive effects. J. Math. Anal. Appl. 303 (2005), 288-303. 19. D. O’Regan, Existence theory for nonlinear ordinary differential equations, Kluwer Academic, Dordrecht, 1997. 20. H. Shi, H. Chen, Multiplicity results for a class of boundary value problems with impulsive effects, Math. Nachr. 289 (2016), 718-726. 21. J. Sun, D. O’Regan, Impulsive periodic solutions for singular problems via variational methods. Bull. Aust. Math. Soc.86 (2012), 193-204. 22. J. Sun, H. Chen, J. J. Nieto, M. Otero-Novoa, Multiplicity of solutions for perturbed secondorder Hamiltonian systems with impulsive effects. Nonlinear Anal. 72 (2010), 4575-4586. 23. J. Sun, H. Chen, J. J. Nieto, Infinitely many solutions for second-order Hamiltonian system with impulsive effects. Math. Comput. Modelling. 54 (2011), 544-555. 24. Y. Tian, W. Ge, Applications of variational methods to boundary value problem for impulsive differential equation. Proc. Edin. Math. Soc. 51 (2008), 509-527. 25. P. J. Torres, Existence of one-signed periodic solutions of some second-order differential equations via a Krasnoselskii fixed point theorem, J. Differential Equations, 190 (2003), 643-662. 26. P. Yan, M. Zhang, Higher order nonresonance for differential equations with singularities, Math. Methods Appl. Sci. 26(2003), 1067-1074. 27. M. Zhang, Periodic solutions of equations of Ermakov-Pinney type, Adv. Nonlinear Stud. 6(2006), 57-67. 1 College of Information Sciences and Technology, Hainan University, Haikou, 570228, China 2 School of Mathematics and Statistics, Central South University, Changsha, Hunan, 410083, China E-mail address: [email protected] (S. Li) E-mail address: [email protected] (Y. Wang)

1103

SHENGJUN LI ET AL 1095-1103

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On Gauss diagrams of Knots: A modern approach Young Chel Kwun1 , Abdul Rauf Nizami2, Waqas Nazeer3, Mobeen Munir4 and Shin Min Kang5,6,∗

1

2

Department of Mathematics, Dong-A University, Busan 49315, Korea e-mail: [email protected]

Department of Mathematics, Faculty of Information Technology, University of Central Punjab, Lahore 54000, Pakistan e-mail: [email protected]

5

3

Division of Science and Technology, University of Education, Lahore 54000, Pakistan e-mail: [email protected]

4

Division of Science and Technology, University of Education, Lahore 54000, Pakistan e-mail: [email protected]

Department of Mathematics and RINS, Gyeongsang National University, Jinju 52828, Korea e-mail: [email protected] 6

Center for General Education, China Medical University, Taichung 40402, Taiwan Abstract

Gauss diagrams were introduced by Polyak and Viro as an appropriate device to describe finite-type invariants, which now appear as a very convenient way of coding knots in computer-recognizable form. 2010 Mathematics Subject Classification: 57M25, 57M27, 57M50 Key words and phrases: Gauss diagram, Gauss code, reidemeister move, braid knot

1

Introduction

Gauss diagrams were introduced by Polyak and Viro [14] as an appropriate device to describe finite type invariants in 1994. Planar diagrams are convenient for presenting knots graphically, while Gauss diagrams are suited better for coding knots in a computer-recognizable form. Goussarov [7] proved that any Vassiliev invariant can be calculated as a function of arrow polynomials on the knot diagram. Polyak used in [15] the notion of chord diagrams to define their representations in Gauss diagrams of plane curves. He also obtained invariants of generic plane and spherical curves in a systematic way via Gauss diagrams. Moreover, he proved that any Gauss diagram invariants are of finite degree. Fiedler showed in [6] that Gauss diagram invariants can be effectively used to show that a given knot is not isotopic to any closed braid. (Actually, it a well-known theorem of Alexander that each ∗

Corresponding author

1104

Young Chel Kwun ET 1104-1113

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

link in R3 is isotopic to a closed braid. But this is no longer the case for knots in the solid torus.) Mortier introduced in [10] decorated Gauss diagram as an efficient tool for recovering a knot diagram from it, and established characterization of the decorated Gauss diagrams of closed braids. Kauffman [9] gave a formula for Vassiliev invariants of a knot in terms of its chord diagram, which was related the Gauss diagram of the knot. Ochiai showed in [17] that the Gauss diagram formulas for the Kontsevich integral agree with the formulas for Vassiliev invariants which are introduced by Polyak and Viro [14]. Recently, Nizami [12] studied Kauffman bracket 2 and 3-strand braid links. Our main contribution in this regard is the answer to the question “What happens to the Gauss diagram if a knot is mirrored and what happens to it if a knot is reversed ?” We prove that the Gauss diagram remains unchanged if a knot is mirrored, and is mirrored if the knot is reversed. This paper is organized as follows: Section 2 includes basic, relevant material (including knots, braids, Gauss codes, Gauss diagrams, and Reidemeister moves) which is necessary to understand the results. We tried to make it interesting, particularly for a new reader. The results we got are presented in Section 3.

2

Preliminary Notions

This section is devoted to basic notions, relevant to Gauss diagrams.

2.1

Knots

A knot is an embedding of the unit circle S 1 in R3 . A link is an embedding of a disjoint union of such circles; each circle in a link is called a component. A 1-component link is actually a knot. Knots are usually studied via projecting them on a plan; a projection with extra information of overcrossing and undercrossing is called the knot diagram. overcrossing

undercrossing

Trefoil knot

Hopf link

Two knots are called isotopic if one of them can be transformed to the other by a diffeomorphism of the ambient space onto itself. A fundamental result about the isotopic knot diagrams is: Theorem 2.1. [18] Two knots K1 and K2 are equivalent if and only if a diagram of K1 can be transformed into a diagram of K2 by a finite sequence of ambient isotopies of the plane and local (Reidemeister) moves:

R1

R2

1105

Young Chel Kwun ET 1104-1113

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

R3

An oriented knot is an image of an embedding of S 1 into R3 together with the choice of one of the two possible directions on it. Each crossing of an oriented knot is either positive or negative:

positive crossing

negative crossing

The local writhe of a crossing is defined as +1 or -1 for positive or negative crossing, respectively. The writhe (or total writhe) of a diagram is the sum of all the local writhes, or, equivalently, the difference between the number of positive and negative crossings. 4

-

+

2

1

+

*

3

A knot with total writhe 0

The set of all knots that are equivalent to a knot K is called a class of K. Remark 2.2. By a knot K we shall always mean a class of the knot K.

2.2

Braids

An n-strand braid is a set of n non intersecting smooth paths connecting n points on a horizontal plane to n points exactly below them on another horizontal plane in an arbitrary order. The smooth paths are called strands of the braid. 1

1

2

2

3

3

A 3-strand braid

The product ab of two n-strand braids is defined by putting the braid b below the braid a and then gluing their common end points. A braid with only one crossing is called the elementary braid; the i th elementary braid xi with n strands is:

1106

Young Chel Kwun ET 1104-1113

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

i

1

i+1

...

1

n

...

i

n

i+1

xi

A useful property of elementary braids is that every braid can be written as a product of elementary braids. For instance, the above 3-strand braid is x1 x2 x1 x2 . The closure of a braid b is the link bb obtained by connecting the lower ends of b with the corresponding upper ends.

bb

b

Remark 2.3. 1. All braids are oriented from top to bottom. 2. By a braid b we shall mean the link bb. 3. By a braid knot we shall mean a knot obtained as a closure of a braid. An important result connecting knots and braids is by Alexander:

Theorem 2.4. ( [1]) Each link can be represented as the closure of a braid.

2.3

Gauss Diagram

Planar diagrams are convenient for presenting knots graphically, while Gauss diagrams are suited better for coding knots in a computer-recognizable form. A Gauss diagram is a diagrammatic representation of the classical Gauss code of the knot. The Gauss code is obtained from the oriented knot diagram by first labelling each crossing with a naming label (such as 1, 2, . . .) and also indicating the crossing type (+1 or −1). Then choose a basepoint on the knot diagram and begin walking along the diagram, recording the name of the crossings encountered, their sign and whether the walk takes you over or under that crossing. For example, if you go under crossing 1 whose sign is + then you will record it as U 1+. You may see the following knot along with its Gauss: 4

1

2

+

+

*

3

Gauss code: U 1 − O2 − U 3 + O4 + U 2 − O1 − U 4 + O3+

To form a Gauss diagram from a Gauss code, take an oriented circle with a basepoint chosen on the circle. Walk along the circle marking it with the labels for the crossings in the order of the Gauss code. Now draw chords between the points on the circle that have the same label. Orient each chord from overcrossing site to undercrossing site. Mark each

1107

Young Chel Kwun ET 1104-1113

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

chord with +1 or −1 according to the sign of the corresponding crossing in the Gauss code. The resulting labelled and basepointed graph is the (based) Gauss diagram for the knot. See, for instance, the knot and its Gauss diagram: 1

1

4

4 +

+

2

2 -

4

+

*

+

3

3

3 *

K

1

2

Gauss diagram of K

Remark 2.5. 1. A knot can be uniquely recovered from its Gauss diagrams and also from Gauss code. 2. Gauss diagrams are considered up to orientation-preserving homeomorphisms of the circle.

2.4

Reidemeister moves for Gauss diagrams

As we know, two oriented knot diagrams represent the same knot if and only if they are related by a sequence of oriented Reidemeister moves. The corresponding moves translated into the language of Gauss diagrams are:

V Ω1

A

B

V Ω2 +

-

+ C

+

+

-

+

-

-

V Ω3 (I)

3

D

+

+

-

V Ω3 (II)

The results

In this section we shall prove that the Gauss diagram remains unchanged if a knot is mirrored, and it is mirrored if the knot is reversed. Here we also show that the Reidemeister move V Ω3 for Gauss diagrams is a combination of the moves V Ω2 and V Ω03 , and that the move V Ω03 is a combination of the moves V Ω2 and V Ω3 .

1108

Young Chel Kwun ET 1104-1113

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Theorem 3.1. (a) The Gauss diagram remains the same if a knot is mirrored. In this case all the crossings switch their signs. (b) The Gauss diagram is mirrored if a knot is reversed. Proof. (a) In the mirror image K of a knot K the overcrossings remain overcrossings and undercrossings remain undercrossings. So, the sequence of over and under crossings in the Guass code of K remains the same as in the knot K. However, since the positive crossings change to negative and negative to positive in K, the signs of chords in the Gauss diagram of K change accordingly. You may observe some examples: 4

3

* -

-

1

5

1.

-

2

-

3

-

4

-

5

-

2

* 1

-

2

5

4

3

x51

Gauss diagram of x51

4 +

3

5

+

5 + +

4

+

3

+

2

+

1

1

-

2

* 1

1 + +

2

5 +

*

4

3

x51

Gauss diagram x51

1 * -

1

-

2

-

3

2.

6

-

-

2

-

4

*

-

5

1

-

6

-

5 3

4

Gauss diagram of x31 x32

1 +

6

+

5

+

2

2

+

1

6 5

+

+

+ 4

3

4

*

3

+

6

1 +

+

2

5

*

3

x31 x32

4

Gauss diagram of x31 x32

1

4

3.

1

2

2 -

+ +

4

4 +

-

*

4

-

2

6

x31 x32

+

5

3

+

3

3

3 *

K: Figure-eight knot

1

2

Gauss diagram of K

1109

Young Chel Kwun ET 1104-1113

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1

*

2 +

-

+

+

3

-

2

1

4

4

-

3

3 +

*

4

2

1

Gauss diagram of K

K

(b) The proof will be finished with just two reasons: When a knot K is reversed, the sign of each crossing remains unchanged, a positive crossing remains positive and a negative crossing remains negative. However, the Gauss code of −K reverses. Just have a look at the examples: 4

3

* -

-

1

5 -

1.

2

-

3

-

4

-

5

-

2

* 1

-

1

2

5

4

3

x51

Gauss diagram of x51 3

2

* -

-

1

1 -

2

-

3

-

4

4

-

* 5

-

4 -

1

-

5

3

−x51

1

-

2

-

3

-

2

2.

2

Gauss diagram of −x51 1

* -

6

-

-

4

*

-

5

1

6

-

5 3

4

Gauss diagram of x31 x32 3

-*

1

-

2

-

3

4

2

-

-

4

*

5

3

6

-

4

-

2

6

-

Gauss diagram of −x31 x32 1

4

3.

2

2 -

+ +

4

4 +

-

*

5 6

1

−x31 x32

-

5

1

-

4

-

2

6

x31 x32

1

5

3

-

5

-

+

3

3

3 *

K: Figure-eight knot

1

2

Gauss diagram of K

1110

Young Chel Kwun ET 1104-1113

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1

4

-

+

2

1

*

3 +

+

2 -

3 *

4

3

+ 4 2

1

Gauss diagram of −K

−K

We now show that in case of Gauss diagrams the second and third Reidemeister moves are related to two special moves, which we shall denote by V Ω03 : +

-

+

-

E

F

+

-

-

-

+

-

+

+

V Ω03 (I)

V Ω03 (II)

Theorem 3.2. (a) Each of the moves V Ω3 is a combination of the moves V Ω2 and V Ω03 . (b) Each of the moves V Ω03 is a combination of the moves V Ω2 and V Ω3 . Proof. (a) Here is the proof of the first part (which is denoted by C) of the V Ω3 : + +

+

-

+

-

+

B

A

2 + -

+

+

+

B

E

-

-

+ +

+

B

-

1 Now goes D: -

+

-

B

A

-

+

4 -

B

+

-

F

+

+

-

+

B

-

+

3

1111

Young Chel Kwun ET 1104-1113

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(b) Just see the step-by-step application of the concerned moves: -

-

-

A

+

-

D

+

-

A

6

-

5

F goes in a similar way: +

-

+

+

+

+

+

+

+

A

C

+

A 7

8

Acknowledgement This work was supported by the Dong-A University research fund.

References [1] J. Alexander, Topological invariants of Knots and links, Trans. Amer. Math. Soc., 20 (1923), 275–306. [2] E. Artin, Theory of braids, Ann. Math., 48 (1947), 101–126. [3] B. Berceanu and A. R. Nizami, A recurrence relation for the Jones polynomial, J. Korean Math. Soc., 51 (2014), 443–462. [4] S. Chmutov, S. Duzhin and J. Mostovoy, Introduction to vassiliev Knot invariants, arXiv:1103.5628v1 [math.GT], 2011. [5] T. Fiedler, Gauss diagram invariants for Knots and links, Mathematics and its Applications, 532, Kluwer Academic Publishers, Dordrecht, 2001. [6] T. Fiedler, Gauss diagram invariants for Knots which are not closed braids, Math. Proc. Cambridge Philos. Soc., 135 (2003), 335–348. [7] M. Goussarov, Finite type invariants are presented by Gauss diagram formulas, 1998, Translated from Russian by O. Viro. [8] L. H. Kauffman, Virtual Knot theory, European J. Combin., 20 (1999), 663–690. [9] L. H. Kauffman, Knot diagramatics, arXiv:math/0410329v5[math.GN], 2004. [10] A. Mortier, Gauss diagrams of real and virtual Knots in the solid torus, ArXiv eprints, 2012. [11] V. Manturov, Knot Theory, Chapman and Hall/CRC, Boca Raton, 2004.

1112

Young Chel Kwun ET 1104-1113

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[12] A. R. Nizami, Kauffman bracket of 2- and 3-strand braid links, Open J. Math. Sci., 1 (2017), 62–74. [13] A. R. Nizami, M. Munir and A. Usman, Khovanov homology of braid links, Rev. Un. Mat. Argentina, 57 (2016), 95–118. [14] M. Polyak and O. Viro, Gauss diagram formula for vassiliev invariants, Internat. Math. Res. Notices, 1994 (1994), 445–453. [15] M. Polyak, Invariants of curves and fronts via Gauss diagrams, Topology, 37 (1998), 989–1009 [16] T. Ochiai, The combinatorial Gauss diagram formula for Kontsevich integral, J. Knot Theory Ramifications, 10 (2001), 851–906. [17] T. Ochiai, Invariants of plane curves and Polyak-Viro type formulas for Vassiliev invariants, J. Math. Sci. Univ. Tokyo, 11 (2004), 155–175. [18] K. Reidemeister, Knotentheorie, Chelsea Pub. Co., New York, 1948.

1113

Young Chel Kwun ET 1104-1113

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

The Jones polynomial of graph links via the Tutte polynomial Young Chel Kwun1 , Abdul Rauf Nizami2, Waqas Nazeer3 and Shin Min Kang4,5,∗ 1

Department of Mathematics, Government Muhammadan Anglo Oriental College, Lahore 54000, Pakistan e-mail: [email protected]

2

Department of Mathematics, Faculty of Information Technology, University of Central Punjab, Lahore 54000, Pakistan e-mail: [email protected] 3

4

Division of Science and Technology, University of Education, Lahore 54000, Pakistan e-mail: [email protected]

Department of Mathematics and RINS, Gyeongsang National University, Jinju 52828, Korea e-mail: [email protected] 5

Center for General Education, China Medical University, Taichung 40402, Taiwan Abstract

We give the Jones polynomial of the alternating links that correspond to a family of positive-signed connected planar graphs. We first find the general form of the Tutte polynomial of the family of graphs and then specializes it to the Jones polynomial. Then we recover the flow and chromatic polynomials from it as special cases. Finally, we give useful combinatorial information about the graph by evaluating the Tutte polynomial at some special points. 2010 Mathematics Subject Classification: 05C31, 57M27 Key words and phrases: Tutte polynomial, Jones polynomial, flow polynomial, chromatic polynomial

1

Introduction

The Tutte polynomial was introduced by Tutte [21] in 1954 as a generalization of chromatic polynomials studied by Birkhoff [1] and Whitney [24]. This graph invariant became popular because of its universal property that any multiplicative graph invariant with a deletion/contraction reduction must be an evaluation of it, and because of its applications in computer science, engineering, optimization, physics, biology, and knot theory. In 1985, Jones [10] revolutionized knot theory by defining the Jones polynomial as a knot invariant via Von Neumann algebras. However, in 1987 Kauffman introduced in [13] a state-sum model construction of the Jones polynomial that was purely combinatorial and remarkably simple; we follow this construction. Our primary motivation to study the Tutte polynomial came from the remarkable connection between the Tutte and the Jones polynomials that up to a sign and multiplication ∗

Corresponding author

1114

Kwun ET AL 1114-1126

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

by a power of t the Jones polynomial VL (t) of an alternating link L is equal to the Tutte polynomial TG (−t, −t−1 ). For detail study about knot theory, we refer [9,12,15,16,18,19]. This paper is organized as follows: In Section 2 we give some basic notions about graphs and knots along with definitions of the Tutte and the Jones polynomials. Moreover, in this section we give the relation between graphs and knots, and the relation between the Tutte and the Jones polynomials. Then the main result is given in Section 3. Finally, in Section 4 we specialize the Tutte polynomial to the Jones and the chromatic polynomials, and in Section 5 we give interpretations of some evaluations of the Tutte polynomial.

2 2.1

Preliminary notions Basic concepts of graphs

A graph G is an ordered pair of disjoint sets (V, E) such that E is a subset of the set V 2 of unordered pairs of V . The set V is the set of vertices and E is the set of edges. If G is a graph, then V = V (G) is the vertex set of G, and E = E(G) is the edge set. An edge x, y is said to join the vertices x and y, and is denoted by xy; the vertices x and y are the end vertices of this edge. If xy ∈ E(G), then x and y are adjacent, or neighboring, vertices of G, and the vertices x and y are incident with the edge xy. Two edges are adjacent if they have exactly one common end vertex. We say that G0 = (V 0 , E 0) is a subgraph of G = (V, E) if V 0 ⊂ V and E 0 ⊂ E. In this case we write G0 ⊂ G. If G0 contains all edges of G that join two vertices in V 0 then G0 is said to be the subgraph induced or spanned by V 0 , and is denoted by G[V 0 ]. Thus, a subgraph G0 of G is an induced subgraph if G0 = G[V (G0 )]. If V = V 0 then G0 is said to be a spanning subgraph of G. Two graphs are isomorphic if there is a correspondence between their vertex sets that preserves adjacency. Thus, G = (V, E) is isomorphic to G0 = (V 0 , E 0), denoted G ' G0 , if there is a bijection ϕ : V → V 0 such that xy ∈ E if and only if ϕ(xy) ∈ E 0 . The dual notion of a cycle is that of cut or cocycle. If {V 1, V 2} is a partition of the vertex set, and the set C, consisting of those edges with one end in V1 and one end in V2 , is not empty, then C is called a cut. A cycle with one edge is called a loop and a cocycle with one edge is called a bridge. We refer to an edge that is neither a loop nor a bridge as ordinary. A graph is connected if there is a path from one vertex to any other vertex of the graph. A connected subgraph of a graph G is called the component of G. We denote by k(G) the number of connected components of a graph G, and by c(G) the number of non-trivial connected components, that is the number of connected components not counting isolated vertices. A graph is k-connected if at least k vertices must be removed to disconnect the graph. A tree is a connected graph without cycles. A forest is a graph whose connected components are all trees. (Spanning trees in connected graphs play a fundamental role in the theory of the Tutte polynomial.) Observe that a loop in a connected graph can be characterized as an edge that is in no spanning tree, while a bridge is an edge that is in every spanning tree. A graph is planar if it can be drawn in the plane without edges crossings. A drawing of a graph in the plane separates the plane into regions called faces. Every plane graph G has a dual graph, G∗ , formed by assigning a vertex of G∗ to each face of G and joining two vertices of G∗ by k edges if and only if the corresponding faces of G share k edges in their boundaries. Note that G∗ is always connected. If G is connected, then (G∗ )∗ = G. If G is planar, it may have many dual graphs.

1115

Kwun ET AL 1114-1126

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A graph invariant is a function f on the collection of all graphs such that f (G1 ) = f (G2 ) whenever G1 ∼ = G2 . A graph polynomial is a graph invariant where the image lies in some polynomial ring.

2.2

The Tutte polynomial

The following two operations are essential to understand the Tutte polynomial definition for a graph G. These are: edge deletion denoted by G0 = G − e, and edge contraction G00 = G/e.  

 

 

 

 

 

 

 

 

 

 

 







 

 

 

 

 

 







 

 

 

 

 

 







 

 

 

 

 

 







 

 

 

 

 





 

 

 

 

 





 

 

 



 

 

 

e 1

 

 

 

 

 

e3

e1



 



 



 







  

 

 

 

 

 

 

 

 

 

 

 







 

 

 







 

 

 







e2



 



G



 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

e

e

e

3

3

1

G/e 2

G - e2

The deletion and contraction operations

Definition 2.1. ([21–23]) The Tutte polynomial of a graph G is a two-variable polynomial TG (x, y) defined as follows:   1 if E is empty,   xT (G/e) if e is a bridge, TG (x, y) =  yT (G − e) if e is a loop,    T (G − e) + T (G/e) if e is neither a bridge nor a loop. e

Example 2.2. Here is the Tutte polynomial of the graph G = e

T(

e2

1

e3

) = T(

e

e2

1

= xT (

e

1

) + T(

e

1

e2

e2

1

e3

.

)

e

e

) + T( ) + T( ) 1

1

= x2 T ( ) + xT ( ) + y = x2 + x + y. Remark 2.3. The definition of the Tutte polynomial outlines a simple recursive procedure to compute it, but the order of the rules applied is not fixed.

2.3

Basic concepts of Knots

A knot is a circle embedded in R3 , and a link is an embedding of a union of such circles. Since knots are special cases of links, we shall often use the term link for both knots and links. Links are usually studied via projecting them on a plan; a projection with extra information of overcrossing and undercrossing is called the link diagram. overcrossing

undercrossing

Trefoil knot

Hopf link

Two links are called isotopic if one of them can be transformed to the other by a diffeomorphism of the ambient space onto itself. A fundamental result about the isotopic link diagrams is: Two unoriented links L1 and L2 are equivalent if and only if a diagram of L1 can be transformed into a diagram of L2 by a finite sequence of ambient isotopies of the plane and local (Reidemeister) moves of the following three types:

1116

Kwun ET AL 1114-1126

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

R1

R2

R3

The set of all links that are equivalent to a link L is called a class of L. By a link L we shall always mean a class of the link L.

2.4

The Jones polynomial

The main question of knot theory is Which two links are equivalent and which are not? To address this question one needs a knot invariant, a function that gives one value on all links in a single class and gives different values (but not always) on links that belong to different classes. In 1985, Jones revolutionized knot theory by defining the Jones polynomial as a knot invariant via Von Neumann algebras [10]. However, in 1987 Kauffman introduced in [13] a state-sum model construction of the Jones polynomial that was purely combinatorial and remarkably simple. Definition 2.4. [10,11,13]√The Jones polynomial VK (t) of an oriented link L is a Laurent polynomial in the variable t satisfying the skein relation t−1 VL+ (t) − tVL− (t) = (t1/2 − t−1/2 )VL0 (t), and that the value of the unknot is 1. Here L+ , L− , and L0 are three oriented links having diagrams that are isotopic everywhere except at one crossing where they differ as in the figure below:

L+

L−

L0

Example 2.5. The Jones polynomials of the Hopf link and the trefoil knot are respectively V(

2.5

) = −t−5/2 − t−1/2 and V ( ) = −t−4 + t−3 + t.

A connection between Knots and graphs

Corresponding to every connected link diagram we can find a connected signed planar graph and vice versa. The process is as follows: Suppose K is a knot and K 0 its projection. The projection K 0 divides the plane into several regions. Starting with the outermost region, we can color the regions either white or black. By our convention, we color the outermost region white. Now, we color the regions so that on either side of an edge the colors never agree.

K

K’

G

The graph G corresponding to the knot projection K

1117

0

Kwun ET AL 1114-1126

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Next, choose a vertex in each black region. If two black regions R and R0 have common crossing points c1 , c2 , . . ., cn , then we connect the selected vertices of R and R0 by simple edges that pass through c1 , c2, . . . , cn and lie in these two black regions. In this way, we obtain from K 0 a plane graph G [17]. However, in order for the plane graph to embody some of the characteristics of the knot, we need to use the regular diagram rather than the projection. So, we need to consider the under - and over -crossings. To this end, we assign to each edge of G either the sign + or − as you can see in the following figure. -

+

_

_ _ G(K)

K

A signed graph corresponding to a knot diagram

A signed plane graph that has been formed by means of the above process is said to be the graph of the knot K [17]. Conversely, corresponding to a connected signed planar graph, we can find a connected planar link diagram. The construction is clear from the following figure. -

+

+

+ G

K(G)

A knot diagram corresponding to a signed graph

The fundamental combinatorial result connecting knots and graphs is: Theorem 2.6. ([15]) The collection of connected planar link diagrams is in one-to-one correspondence with the collection of connected signed planar graphs.

2.6

Connection between the Tutte and the Jones polynomials

The primary motivation to study the Tutte polynomial came from the following remarkable connection between the Tutte and the Jones polynomials. Theorem 2.7. ([9, 15, 19]) (Thistlethwaite) Up to a sign and multiplication by a power of t the Jones polynomial VL(t) of an alternating link L is equal to the Tutte polynomial TG (−t, −t−1 ). For positive-signed connected graphs, we have the precise connection: Theorem 2.8. ([2]) Let G be the positive-signed connected planar graph of an alternating oriented link diagram L. Then the Jones polynomial of the link L is VL (t) = (−1)wr(L)t

b(L)−a(L)+3wr(L) 4

TG (−t, −t−1 ),

where a(L) is the number of vertices in G, b(L) is the number of vertices in the dual of G, and wr(L) is the writhe of L.

1118

Kwun ET AL 1114-1126

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Remark 2.9. In this paper, we shall compute Jones polynomials of links that correspond only to positive-signed graphs.

+

+ +

+

, we receive the right-

. It is easy to check, by definitions, that V ( ; t) = −t4 + t3 + t

handed trefoil knot L: and T (

+

+

Example 2.10. Corresponding to the positive-signed graph G:

; x, y) = x2 + x + y. Further note that the number of vertices in G is 3, number of G is 2, and withe of L is 3. Now notice that

of vertices in the dual

V ( ; t) = (−)3 t

2−3+3(3) 4

T(

+

+ +

; −t, −t−1 ) = −t2 (t2 − t − t−1 ),

which agrees with the known value.

3

The main result

In this section we give the general form of the Tutte polynomial of the following graph: For reference purposes, we denote this graph by G3,n , where n is the number of edges parallel to one of the edges, as you can observe in the figure.

n











G3,n

Theorem 3.1. The Tutte polynomial of the graph G3,n is TG3,n (x, y) = (x + x2 ) + (1 + x)

n X

y i + y n+1 .

i=1

Proof. We prove it by induction on n. For n = 1, we have  

 

vT (

 

) = T(

) + T(

)

= x2 + x + y + T (

) + T(

2

= x + x + y + xy + y

 

 

)

2

= x + x2 + (1 + x)y + y 2 2

= (x + x ) + (1 + x)

1 X

y i + y 1+1 .

i=1

Just for authentication, we check for two more values of n. So, for n = 2 we get  

 

 

 

T(

 

) = T(

) + T(

)

   

" #

" #

" #

" #

!

!

$ %

2

2

2

2

= x + x + (x + 1)y + y + T ( 2

= x + x + (x + 1)y + y + xy + y

) + T(

)

3

= x2 + x + (x + 1)(y + y 2 ) + y 3 2

= (x + x ) + (1 + x)

2 X

y i + y 2+1 .

i=1

1119

Kwun ET AL 1114-1126

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Similarly, if we take n = 3, then * +

T(

& '

( )

) = x2 + x + (x + 1)(y + y 2 + y 3 ) + y 4 2

= (x + x ) + (1 + x)

3 X

y i + y 3+1 .

i=1

We now suppose the result holds for n = k, that is, k

T(

) = (x + x2 ) + (1 + x)

k X

y i + y k+1 .

(3.1)

i=1

Now for n = k + 1 the Tutte polynomial becomes k+1 k+1

k

T(

) = T(

) + T(

).

(3.2)

Note that in the second term of equation (3.2) k + 1 loops are attached to the graph . Now applying the inductive step on the first term and definition on the second term of equation (3.2), we get k+1

T(

) = [(x + x2 ) + (1 + x) = [(x + x2 ) + (1 + x) = [(x + x2 ) + (1 + x)

k X

i=1 k X

i=1 k X

y i + y k+1 ] + y k+1 T ( ) y i + y k+1 ] + y k+1 [T ( ) + T ( )] y i + y k+1 ] + y k+1 [x + y]

i=1

= (x + x2 ) + (1 + x) = (x + x2 ) + (1 + x) = (x + x2 ) + (1 + x)

k X i=1 k X i=1 k+1 X

y i + y k+1 + xy k+1 + y k+2 y i + (1 + x)y k+1 + y k+2 y i + y k+2 ,

i=1

which is the desired result.

4

Specializations

In this section we specialize the Tutte polynomial TG3,n (x, y) to the chromatic and the Jones polynomials.

1120

Kwun ET AL 1114-1126

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4.1

The Jones polynomial

The alternating links L that correspond to the graphs G3,n are given in the following table. n

1

2 6 7

0 1

G

L a(L) b(L) wr(L)

3

6 7

3

, -

2

4 5

. /

3 3 0

< =

4 9

< =

8

8

? >

? >

5 @ A

@ A

F G

F G

···

6 H I

H I

L M

L M

N O

N O

2

: ;

4 5

3 4 5

: ;

B C

3 5 2

E D

3 6 7

3 7 4

J K

3 8 9

···

··· ··· ··· ···

Lemma 4.1. The number of vertices b(L) in the dual of G3,n is n + 2. Proof. Obvious from the table. Lemma 4.2. The writhe of the link L corresponding to the graph G3,n is ( n + 3, n is even, wr(L) = n − 1, n is odd. Proof. It is also obvious from the table. Proposition 4.3. The Jones polynomial of the alternating link L that corresponds to the planar graph G3,n, when n is a even, is n+4

VL (t) = −t

n+3

+t

n+2

−t

−2

n−1 X

(−t)n+2−i − t2 + t.

i=1

Proof. We prove it by specializing the Tutte polynomial of the graph G3,n using Theorem 2.3, which says that VL (t) = (−1)wr(L)t

b(L)−a(L)+3wr(L) 4

TG3,n (−t, −t−1 ). b(L)−a(L)+3wr(L)

4 Observe that, from Lemmas 4.1 and 4.2, the factor (−1)wr(L)t reduces to −tn+2 . Now using this factor and substituting x = −t and y = −t−1 in Theorem 3.1, we have n X   VL (t) = (−tn+2 ) − t + t2 + (1 − t) (−t)−i + (−t)−n−1

i=1 n X

= tn+3 − tn+4 + (tn+3 − tn+2 ) n+4

+t

n+3

i=1  n+2

 + (t −t ) − t−1 + t−2 − t−3 + · · · + t−n+2 − t−n+1 + t−n + t   = −tn+4 + tn+3 + − tn+2 + tn+1 − tn + · · · + t5 − t4 + t3   × tn+1 − tn + · · · − t4 + t3 − t2 + t   = −tn+4 + tn+3 − tn+2 + 2 tn+1 − tn + · · · + t5 − t4 + t3 − t2 + t, = −t

n+3

(−t)−i + t

which finally reduces to the desired result.

1121

Kwun ET AL 1114-1126

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proposition 4.4. The Jones polynomial of the alternating link L that corresponds to the planar graph G3,n, when n is odd, is VK (t) = tn+1 − tn + tn−1 + 2

n−1 X

(−t)n−1−i − t−1 + t−2 .

i=1

b(L)−a(L)+3wr(L) 4

Proof. In this case, the factor (−1)wr(L)t however similar to the proof of Proposition 4.3.

reduces to tn−1 . The proof is

With the understanding that span of VL (t) is the difference of the largest and smallest exponents of t, we have: Proposition 4.5. If L is the alternating link(corresponding to the planar graph G3,n, then n + 4, n is even, spanVL (t) = n + 3 (n ∈ N) and deg VL(t) = n + 1, n is odd. Proof. Obvious from Propositions 4.3 and 4.4.

4.2

The flow polynomial

The flow polynomial was investigated by Tutte in 1947 in [20] as a function which could count the number of flows in a connected graph. Definition 4.6. Let G be a graph with an arbitrary but fixed orientation, and let K be an Abelian group of order k and with 0 as its identity element. A K-flow is a mapping φ − → of the oriented edges E (G) into the elements of the group K such that: X X → → φ(− e)=0 (4.1) φ(− e)+ → − e =u→v

→ − e =u←v

for every vertex v, and where the first sum is taken over all arcs towards v and the second sum is over all arcs leaving v. A K-flow is nowhere zero if φ never takes the value 0. The relation (4.1) is called the conservation law (that is, the Kirchhoff’s law is satisfied at each vertex of G). It is well known [2, 3, 5] that the number of proper K-flows does not depend on the structure of the group, but rather only on its order, and this number is a polynomial function of k that we refer to as the flow polynomial. The following, due to Tutte [21], relates the Tutte polynomial of G with the number of nowhere zero flows of G over a finite Abelian group (which, in our case, is Zk ). Theorem 4.7. ([21]) Let G = (V, E) be a graph and K a finite Abelian group. If FG (k) denotes the number of nowhere zero K-flows then FG (k) = (−1)|E|−|V |+k(G) T (0, 1 − k), where |E| is the number of edges, |V | is the number of vertices, and k(G) is the number of connected components of G. Proposition 4.8. The flow polynomial of the graph G3,n is FG3,n (k) =

 (−1)n  (1 − k) (1 − k)n+1 − 1 . k

1122

Kwun ET AL 1114-1126

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. We prove it by specializing the Tutte polynomial to the flow polynomial by the relation FG3,n (k) = (−1)|E|−|V |+k(G) T (0, 1 − k).

Observe that in the graph G3,n , k(G) = 1, |E| = n + 3, and |V | = 3. Since the factors (−1)|E|−|V |+k(G) and T (0, 1 − k) reduces respectively to (−1)n+1 and Pn+1 i i=1 (1 − k) .

P i The sum of the geometric series n+1 i=1 (1 − k) (with first term (1 − k), common ratio n+1 − 1 . Finally, applying Theorem (1 − k), and number of terms n + 1) is (1−k) −k (1 − k) 4.7, we receive the desired result.

4.3

The chromatic polynomial

The chromatic polynomial, because of its theoretical and applied importance, has generated a large body of work. Chia [4] provides an extensive bibliography on the chromatic polynomial, and Dong, Koh, and Teo [6] give a comprehensive treatment. For positive integer λ, a λ-coloring of a graph G is a mapping of V (G) into the set {1, 2, 3, · · · , λ} of λ colors. Thus, there are exactly λn colorings for a graph on n vertices. If φ is a λ-coloring such that φ(u) 6= φ(v) for all uv ∈ E, then φ is called a proper (or admissible) coloring. Definition 4.9. The chromatic polynomial PG (λ) of a graph G is a one-variable graph invariant and is defined recursively by the following deletion-contraction relation: PG (λ) = P (G − e) − P (G/e) We wish to find the number of admissible λ-colorings of a graph G3,n. Since the chromatic polynomial counts the number of distinct ways to color a graph with λ colors, we recover it from the Tutte polynomial TG3,n (x, y). The following theorem gives the precise relation between these polynomials. Theorem 4.10. [2] The chromatic polynomial of a graph G = (V, E) is PG (λ) = (−1)|V |−k(G) λk(G) TG (1 − λ, 0), where k(G) denote the number of connected components of G. Proposition 4.11. The chromatic polynomial of the graph G3,n is PG3,n (λ) = λ3 − 3λ2 + 2λ.

1123

Kwun ET AL 1114-1126

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. Although one can directly compute the chromatic polynomial of G3,n by definition, we recover it from the Tutte polynomial.

Since |V | = 3 and k(G) = 1, the factor (−1)|V |−k(G) λk(G) reduces to λ. Also, the factor TG (1 − λ, 0) is λ2 − 3λ + 2 for every n ∈ {0, 1, 2, · · ·}, and the result is thus established.

5

Evaluations

In this section, we evaluate TG3,n (x, y) at some points, and give the corresponding useful combinatorial information about G3,n. Theorem 5.1. ([7]) If G = (V, E) is a connected graph, then 1. TG (1, 1) is the number of spanning trees of G. 2. TG (2, 1) equals the number of spanning forests of G. 3. TG (1, 2) is the number of spanning connected subgraphs of G. 4. TG (2, 2) equals 2|E|, and is the number of subgraphs of G. Proposition 5.2. The following statements hold for the connected, planar graph G3,n. 1. TG3,n (1, 1) = 2n + 3. 2. TG3,n (2, 1) = 3n + 7. 3. TG3,n (2, 2) = 2n+3 . 4. TG3,n (1, 2) = 3 · 2n+1 − 2. Proof. We prove it step by step using directly Theorem 3.1: 1. For different values of n, we get the following different values of T (1, 1). n T (1, 1)

1 5

2 7

3 9

4 11

··· ···

It is now clear that TG3,n (1, 1) = 2n + 3. 2. This result is similarly followed from the table: n T (2, 1)

1 10

2 13

3 16

4 19

··· ···

3. Since for the graph G3,n we have |E| = n + 3, the result follows from the Theorem 5.1.

1124

Kwun ET AL 1114-1126

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4. Directly substituting x = 1 and y = 2 in Theorem 3.1 we receive TG3,n (1, 2) = 2 + 2

n X

2i + 2n+1

i=1 2

= (2 + 2 + 23 + · · · + 2n+1 ) + 2n+1   1 − 2n+1 =2 + 2n+1 1−2 = −2(1 − 2n+1 ) + 2n+1 , which reduces to the desired result.

References [1] G. D. Birkhoff, A determinant formula for the number of ways of coloring a map, Ann. Math., 14(1912), 42–46. [2] B. Bollob´ as, Modern Graph Theory, Gratudate Texampleamplets in Mathematics, Springer, NewYork, 1998. [3] J. A. Bondy and U. S. R. Murty, Graph Theory, Graduate Texts in Mathematics, 244, Springer, New York, 2008. [4] G. L. Chia, A bibliography on chromatic polynomials, Discrete Math., 172 (1997), 175–191. [5] R. Diestel, Graph Theory, Graduate Texts in Mathematics, 173. Springer-Verlag, New York, 1997. [6] F. M. Dong, K. M. Koh and K. L. Teo, Chromatic Polynomials and Chromaticity of Graphs, World Scientific, New Jersey, 2005. [7] J. A. Ellis-Monaghan and C. Marino, Graph polynomials and their applications I, TheTutte polynomial, arXiv:0803.3079[math.CO], arXiv:0803.3079v2[math.CO], 2008. [8] S. Jablan, L. Radovic and R. Sazdanovic, Tutte and Jones polynomials of link families, arXiv:0902.1162[math.GT], 2009, arXiv:0902.1162v2[math.GT], 2010. [9] F. Jaeger, Tutte polynomials and link polynomials, Proc. Amer. Math. Soc., 103 (1988), 647–654. [10] V. F. R. Jones, A polynomial invariant for Knots via Von Neumann algebras, Bull. Amer. Math. Soc., 12 (1985), 103–111. [11] V. F. R. Jones, The Jones polynomial, Discrete Math., 294 (2005), 275–277. [12] S. M. Kang, A. R. Nizami, M. Munir, W. Nazeer and Y. C. Kwun, Tutte polynomials with applications, Global J. Pure Appl. Math., 12 (2016), 4781–4797. [13] L. H. Kauffman, State models and the Jones polynomial, Topology, 26 (1987), 395– 407.

1125

Kwun ET AL 1114-1126

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[14] L. H. Kauffman, New invariants in Knot theory, Amer. Math. Monthly, 95 (1988), 195–242. [15] L. H. Kauffman, A Tutte polynomial for signed graphs, Discrete Appl. Math., 25 (1989), 105–127. [16] Y. C. Kwun, A. R. Nizami, M. Munir, W. Nazeer and S. M. Kang, The Tutte and the Jones polynomials, Global J. Pure Appl. Math., 12 (2016), 4717–4740. [17] K. Murasugi, Knot Theory and Its Applications, Birkhauser, Boston, 1996. [18] A. R. Nizami, Kauffman bracket of 2- and 3-strand braid links, Open J. Math. Sci., 1 (2017), 62–74. [19] M. Thistlethwaite, A spanning tree expansion for the Jones polynomial. Topology 26 (1987), 297-309. [20] W. T. Tutte, A ring in graph theory, Proc. Comb. Phil. Soc., 43 (1947), 26–40. [21] W. T. Tutte, A contribution to the theory of chromatic polynomials, Canadian J. Math., 6 (1954), 80–91. [22] W. T. Tutte, On dichromatic polynomials, J. Combinatorial Theory, 2 (1967), pp. 301?320. [23] W. T. Tutte, Graph-polynomials, Special issue on the Tutte polynomial, Adv. in Appl. Math., 32 (2004), 5–9. [24] H. Whitney, Alogical expansion in mathematics, Bull.Amer. Math. Soc., 38 (1932), 572–579.

1126

Kwun ET AL 1114-1126

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FOURIER SERIES OF SUMS OF PRODUCT OF POLY-BERNOULLI AND EULER FUNCTIONS AND THEIR APPLICATIONS TAEKYUN KIM,1 DAE SAN KIM,2 GWAN-WOO JANG,3 and JONGKYUM KWON4∗ Abstract. We consider three types of functions given by sums of products of poly-Bernoulli and Euler functions and derive their Fourier series expansions. In addition, we will express each of them in terms of Bernoulli and Euler functions.

1. Introduction and preliminaries As is well known, the Euler polynomials Em (x) are given by the generating function ∞ ∑ 2 tm xt e = E (x) , (see [6,10,11,13,14,16,19]). (1.1) m et + 1 m! m=0 For any integer r, the poly-Bernoulli polynomials B(r) m (x) of index r are given by the generating function ∞ Lir (1 − e−t ) xt ∑ (r) tm e = B (x) , (see [1-3,5,7,9,12,15]), (1.2) m et − 1 m! m=0 ∑∞ x m w here Lir (x) = m=0 mr is the rth polylogarithmic function for r ≥ 1 and a rational function for r ≤ 0. Observe here that d 1 (Lir+1 (x)) = Lir (x). (1.3) dx x As to poly-Bernoulli polynomials, we note the following: d (r) (r) Bm (x) = mBm−1 (x), (m ≥ 1). (1.4) dx (r)

(0) m B(1) m (x) = Bm (x), B0 (x) = 1, Bm (x) = x ,

(1.5)

(r)

(r+1) B(0) (1) − B(r+1) (0) = Bm−1 (0), (m ≥ 1). m = δm,0 , Bm m

For any real number x, we let < x >= x − [x] ∈ [0, 1)

(1.6)

denote the fractional part of x. 2010 Mathematics Subject Classification. 42A16, 11B68, 11B83. Key words and phrases. Fourier series, poly-Bernoulli function, Euler function. ∗ corresponding author. 1

1127

T. KIM ET AL 1127-1145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

TAEKYUN KIM, DAE SAN KIM, GWAN-WOO JANG, and JONGKYUM KWON

Here we consider three types of functions given by sums of products of polyBernoulli and Euler functions and derive their Fourier series expansions. In addition, we will express each of them in terms of Bernoulli and Euler functions. ∑ (r+1) (1) αm (x) = m (x)Em−k (x), (m ≥ 1), k=0 Bk ∑m (r+1) 1 (2) βm (< x >) = k=0 k!(m−k)! Bk Em−k (< x >), (m ≥ 1), ∑ (r+1) 1 (3) γm (< x >) = m−1 Em−k (< x >), (m ≥ 2). k=1 k(m−k) Bk For elementary facts about Fourier analysis, the reader may refer to any book (for example, see [4,18,20]). Some related works about Fourier series expansion for higher-order Bernoulli functions can be found in the recent papers in [8,17]. 2. The function αm (< x >) For integers r, m with m ≥ 1, we let m ∑ (r+1) αm (x) = Bk (x)Em−k (x).

(2.1)

k=0

′ αm (x)

=

m ( ∑

(r+1)

(r+1)

kBk−1 (x)Em−k (x) + (m − k)Bk

) (x)Em−k−1 (x)

k=0

=

m ∑

(r+1) kBk−1 (x)Em−k (x)

+

(r+1)

(m − k)Bk

(x)Em−k−1 (x)

k=0

k=1

=

m−1 ∑

m−1 ∑

(r+1)

(k + 1)Bk

(x)Em−1−k (x) +

m−1 ∑

(r+1)

(m − k)Bk

(x)Em−1−k (x)

k=0

k=0

= (m + 1)

m−1 ∑

(r+1)

Bk

(x)Em−1−k (x)

k=0

= (m + 1)αm−1 (x). (2.2) ( ∫

αm+1 (x) m+2

1

αm (x)dx = 0

αm (1) − αm (0) = = +

m ( ∑

(r+1)

Bk

k=0 m (( ∑

)′ = αm (x).

1 (αm+1 (1) − αm+1 (0)) . m+2 (r+1)

(1)Em−k (1) − Bk

(r+1) Bk

)

+

(r) Bk−1

k=1 (r+1) B0 (1)Em (1)

− B0

1128

) Em−k

(−Em−k + 2δm,k ) −

(r+1)

(2.3)

(r+1) Bk Em−k

)

Em

T. KIM ET AL 1127-1145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FOURIER SERIES FOR POLY-BERNOULLI AND EULER FUNCTIONS

=

m ( ∑

(r+1)

−Bk

(r+1)

Em−k + 2Bk

(r)

(r)

(r+1)

δm,k − Bk−1 Em−k + 2Bk−1 δm,k − Bk

3

) Em−k

k=1

− 2Em + 2δm,0 m m ∑ ∑ (r+1) (r) (r) = −2 Bk Em−k − Bk−1 Em−k + 2B(r+1) + 2Bm−1 − 2Em m k=1

= −2

m−1 ∑

k=1 (r+1) Bk Em−k

k=0



m−1 ∑

(r)

(r)

Bk−1 Em−k + Bm−1

k=1

(2.4) For m ≥ 1, we put, ∆m = αm (1) − αm (0) = −2

m−1 ∑

(r+1) Bk Em−k



m−1 ∑

(r)

(r)

Bk−1 Em−k + Bm−1 .

(2.5)

k=1

k=0

Then αm (1) = αm (0) ⇐⇒ ∆m = 0, and ∫

1

αm (x)dx = 0

1 ∆m+1 . m+2

(2.6)

Now, we will consider the function ∑ (r+1) αm (< x >) = m (< x >)Em−k (< x >), (m ≥ 1) k=0 Bk defined on (−∞, ∞), which is periodic with period 1. The Fourier series of αm (< x >) is ∞ ∑

2πinx A(m) , n e

n=−∞

where ∫ A(m) n

1

=

αm (< x >)e−2πinx dx

0

∫ =

(2.7)

1

−2πinx

αm (x)e

dx.

0

1129

T. KIM ET AL 1127-1145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

TAEKYUN KIM, DAE SAN KIM, GWAN-WOO JANG, and JONGKYUM KWON (m)

Now, we would like to determine the Fourier coefficients An . Case1 : n ̸= 0. ∫ 1 (m) αm (x)e−2πinx dx An = 0 ∫ 1 ]1 1 [ 1 −2πinx ′ (x)e−2πinx dx =− αm (x)e + αm 2πin 2πin 0 0 ∫ 1 m+1 1 =− (αm (1) − αm (0)) + αm−1 (x)e−2πinx dx 2πin 2πin 0 m + 1 (m−1) 1 = An − ∆m 2πin ( 2πin ) m+1 m (m−2) 1 1 = An − ∆m−1 − ∆m 2πin 2πin 2πin 2πin (m + 1)m (m−2) m+1 1 = A − ∆ − ∆m m−1 n (2πin)2 (2πin)2 2πin ( ) 1 1 (m + 1)m m − 1 (m−3) m+1 = An − ∆m−2 − ∆m−1 − ∆m 2 2 (2πin) 2πin 2πin (2πin) 2πin 3 (m + 1)3 (m−3) ∑ (m + 1)j−1 = A − ∆m−j+1 (2πin)3 n (2πin)j j=1 = ··· (m + 1)m (0) ∑ (m + 1)j−1 = A − ∆m−j+1 (2πin)m n (2πin)j j=1 m

1 ∑ (m + 2)j =− ∆m−j+1 m + 2 j=1 (2πin)j m

(2.8) (0)

where An =

∫1 0

e−2πinx dx = 0.

Case2 : n = 0.

∫ (m) A0

=

1

αm (x)dx = 0

1 ∆m+1 . m+2

(2.9)

We recall the following facts about Bernoulli functions Bn (< x >) : (a) for m ≥ 2, ∞ ∑ e2πinx Bm (< x >) = −m! . (2πin)m n=−∞,n̸=0 (b) for m = 1, ∞ ∑

e2πinx − = 2πin n=−∞,n̸=0

{ B1 (< x >), 0,

1130

for x ∈ / Z, for x ∈ Z.

(2.10)

(2.11)

T. KIM ET AL 1127-1145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FOURIER SERIES FOR POLY-BERNOULLI AND EULER FUNCTIONS

5

αm (< x >), (m ≥ 1) is piecewise C ∞ . Moreover, αm (< x >) is continuous for those positive integers m with ∆m = 0 and discontinuous with jump discontinuities at integers for those positive integers m with ∆m ̸= 0. Assume first that m is a positive integer with ∆m = 0. Then αm (1) = αm (0). αm (< x >) is piecewise C ∞ , and continuous. So the Fourier series of αm (< x >) converges uniformly to αm (< x >), and ) ( ∞ m ∑ 1 1 ∑ (m + 2)j ∆m+1 + ∆m−j+1 e2πinx αm (< x >) = − j m+2 m + 2 j=1 (2πin) n=−∞,n̸=0 ) m ( 1 ∑ m+2 1 ∆m+1 + = ∆m−j+1 m+2 m + 2 j=1 j ) ( ∞ ∑ e2πinx × −j! (2πin)j n=−∞,n̸=0 ) m ( 1 1 ∑ m+2 = ∆m+1 + ∆m−j+1 × Bj (< x >) m+2 m + 2 j=1 j { B1 (< x >), for x ∈ / Z, + ∆m × 0, for x ∈ Z. (2.12) Now, we can state our first theorem. Theorem 2.1. For each positive integer l, let ∆l = −2

l−1 ∑

(r+1) Bk El−k



l−1 ∑

(r)

(r)

Bk−1 El−k + Bl−1 .

k=1

k=0

Assume that ∆m = 0, for a positive integer m. Then we have the following. (a)

∑m

(r+1)

k=0 m ∑

Bk

(r+1)

Bk

(< x >)Em−k (< x >) has the Fourier series expansion

(< x >)Em−k (< x >)

k=0

( ) ∞ m ∑ 1 1 ∑ (m + 2)j = − ∆m−j+1 e2πinx , ∆m+1 + j m+2 m + 2 j=1 (2πin) n=−∞,n̸=0

for all x ∈ (−∞, ∞), where the convergence is uniform. (b)

m ∑

(r+1)

Bk

(< x >)Em−k (< x >)

k=0

) m ( 1 1 ∑ m+2 = ∆m+1 + ∆m−j+1 Bj (< x >), m+2 m + 2 j=2 j

1131

T. KIM ET AL 1127-1145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

TAEKYUN KIM, DAE SAN KIM, GWAN-WOO JANG, and JONGKYUM KWON

for all x ∈ (−∞, ∞), where Bj (< x >) is the Bernoulli function. Assume next that m is a positive integer with ∆m ̸= 0. Then αm (1) ̸= αm (0). Thus αm (< x >) is piecewise C ∞ , and discontinuous with jump discontinuities at integers. The Fourier series of αm (< x >) converges pointwise to αm (< x >) , for x ∈ / Z, and converges to 1 1 (αm (0) + αm (1)) = αm (0) + ∆m 2 2 m ∑ 1 (r+1) = Bk Em−k + ∆m , 2 k=0

(2.13)

for x ∈ Z. Next, we can state the second theorem. Theorem 2.2. For each positive integer l, let ∆l = −2

l−1 ∑

(r+1) Bk El−k



l−1 ∑

(r)

(r)

Bk−1 El−k + Bl−1 .

k=1

k=0

Assume that ∆m ̸= 0, for a positive integer m. Then we have the following.

(a)

1 ∆m+1 m+2 ( ∞ ∑ − + n=−∞,n̸=0

1 ∑ (m + 2)j ∆m−j+1 m + 2 j=1 (2πin)j m

{∑ (r+1) m (< x >)Em−k (< x >), k=0 Bk = ∑m (r+1) Em−k + 21 ∆m , k=0 Bk

) e2πinx

for x ∈ / Z, for x ∈ Z.

) m ( 1 1 ∑ m+2 (b) ∆m+1 + ∆m−j+1 Bj (< x >) m+2 m + 2 j=1 j =

m ∑

(r+1)

Bk

(< x >)Em−k (< x >), f or x ∈ / Z,

k=0

) m ( 1 1 ∑ m+2 ∆m+1 + ∆m−j+1 Bj (< x >) m+2 m + 2 j=2 j =

m ∑ k=0

(r+1)

Bk

1 Em−k + ∆m , f or x ∈ Z. 2

1132

T. KIM ET AL 1127-1145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FOURIER SERIES FOR POLY-BERNOULLI AND EULER FUNCTIONS

7

3. The function βm (< x >) Let βm (x) =

∑m

(r+1) 1 (x)Em−k (x), k=0 k!(m−k)! Bk

′ (x) βm

(m ≥ 1).

m { ∑

k (r+1) Bk−1 (x)Em−k (x) k!(m − k)! k=0 } m−k (r+1) + B (x)Em−k−1 (x) k!(m − k)! k m ∑ 1 (r+1) = Bk−1 (x)Em−k (x) (k − 1)!(m − k)! k=1 =

+

m−1 ∑ k=0

=

m−1 ∑ k=0

+

m−1 ∑ k=0

1 (r+1) Bk (x)Em−k−1 (x) k!(m − k − 1)! 1 (r+1) Bk (x)Em−1−k (x) k!(m − 1 − k)! 1 (r+1) B (x)Em−1−k (x) k!(m − 1 − k)! k

= 2βm−1 (x). ′ So, βm (x) = 2βm−1 (x), and from this we obtain



(3.1)

1

βm (x)dx = 0

(

βm+1 (x) 2

)′

= βm (x).

) 1( βm+1 (1) − βm+1 (0) . 2

(3.2)

For m ≥ 1, we have Ωm = Ωm (r) = βm (1) − βm (0) m ∑ ( (r+1) ) 1 (r+1) = Bk (1)Em−k (1) − Bk Em−k k!(m − k)! k=0 m { } ∑ 1 (r+1) (r) (r+1) = (Bk + Bk−1 )(−Em−k + 2δm,k ) − Bk Em−k k!(m − k)! k=1 1 (−2Em + 2δm,0 ) m! m m (r) (r) (r+1) ∑ Bm−1 B(r+1) Em Bk Em−k ∑ Bk−1 Em−k m − +2 +2 −2 = −2 k!(m − k)! k!(m − k)! m! m! m! k=1 k=1

+

= −2

m−1 ∑ k=0

(3.3)

(r+1) Bk Em−k ∑ Bk−1 Em−k 1 (r) − + Bm−1 . k!(m − k)! k!(m − k)! m! k=1 m−1

(r)

Then βm (1) = βm (0) ⇐⇒ Ωm = 0.

1133

T. KIM ET AL 1127-1145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

TAEKYUN KIM, DAE SAN KIM, GWAN-WOO JANG, and JONGKYUM KWON

Also,

∫ 0

1

1 βm (x)dx = Ωm+1 . 2

Now, we are going to consider the function m ∑ 1 (r+1) βm (< x >) = Bk (< x >)Em−k (< x >), (m ≥ 1) k!(m − k)! k=0 which is defined on (−∞, ∞), and periodic with period 1. The Fourier series of βm (< x >) is ∞ ∑

Bn(m) e2πinx ,

n=−∞

where

∫ Bn(m)

=

1

βm (< x >)e

−2πinx



1

dx =

0

βm (x)e−2πinx dx.

0 (m)

We are going to determine the Fourier coefficients Bn . Case 1: n ̸= 0. ∫ Bn(m)

=

1

βm (x)e−2πinx dx

0

∫ 1 ]1 1 [ 1 −2πinx =− βm (x)e + β ′ (x)e−2πinx dx 2πin 2πin 0 m 0 ∫ 1 ) 1 ( 2 =− βm (1) − βm (0) + βm−1 (x)e−2πinx dx 2πin 2πin 0 1 2 = Bn(m−1) − Ωm 2πin 2πin ) 1 2 ( 2 1 (m−2) − = Bn Ωm−1 − Ωm 2πin 2πin 2πin 2πin ( 2 )2 2 1 Bn(m−2) − Ωm−1 − Ωm = 2 2πin (2πin) 2πin = ··· m ( 2 )m ∑ 2j−1 (0) = Bn − Ωm−j+1 2πin (2πin)j j=1

(0)

where Bn

(3.4)

m ∑ 2j−1 Ω , =− j m−j+1 (2πin) j=1 ∫ 1 −2πinx = 0 e dx = 0.

Case 2: n = 0.

1134

T. KIM ET AL 1127-1145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FOURIER SERIES FOR POLY-BERNOULLI AND EULER FUNCTIONS



9

1

1 (3.5) βm (x) = Ωm+1 . 2 0 βm (< x >), (m ≥ 1) is piecewise C ∞ . Moreover, βm (< x >) is continuous for those positive integers m with Ωm = 0 and discontinuous with jump discontinuities at integers for those positive integers m with Ωm ̸= 0. Assume first that m is a positive integer with Ωm = 0. Then βm (1) = βm (0). βm (< x >) is piecewise C ∞ , and continuous. Thus the Fourier series of βm (< x >) converges uniformly to βm (< x >), and (m) B0

=

βm (< x >) ∞ m ( ∑ ) ∑ 1 2j−1 = Ωm+1 + − Ω e2πinx j m−j+1 2 (2πin) j=1 n=−∞,n̸=0 m ∞ ( ∑ ∑ 2j−1 e2πinx ) 1 Ωm−j+1 × −j! = Ωm+1 + 2 j! (2πin)j j=1 n=−∞,n̸=0

(3.6)

m ∑

2j−1 1 = Ωm+1 + Ωm−j+1 Bj (< x >) 2 j! j=2 { B1 (< x >), for x ∈ / Z, + Ωm × 0, for x ∈ Z. Now, we are ready to state our first theorem. Theorem 3.1. For each positive integer l, let Ωl = −2

l−1 (r+1) ∑ B El−k k

k=0

k!(l − k)!



l−1 (r) ∑ Bk−1 El−k k=1

k!(l − k)!

+

1 (r) B . l! l−1

Assume that Ωm = 0, for a positive integer m. Then we have the following. ∑ (r+1) 1 (a) m (< x >)Em−k (< x >) has the Fourier series expansion k=0 k!(m−k)! Bk m ∑

1 (r+1) Bk (< x >)Em−k (< x >) k!(m − k)! k=0 ∞ m ( ∑ ) ∑ 1 2j−1 = Ωm+1 + − Ωm−j+1 e2πinx , j 2 (2πin) j=1 n=−∞,n̸=0

for all x ∈ (−∞, ∞), where the convergence is uniform. (b)

m ∑ k=0

m ∑ 1 1 2j−1 (r+1) Bk (< x >)Em−k (< x >) = Ωm+1 + Ωm−j+1 Bj (< x >), k!(m − k)! 2 j! j=2

for all x ∈ (−∞, ∞), where Bj (< x >) is the Bernoulli function. Assume next that m is a positive integer with Ωm ̸= 0. Then, βm (1) ̸= βm (0). Thus βm (< x >) is piecewise C ∞ and discontinuous with jump discontinuities at

1135

T. KIM ET AL 1127-1145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

TAEKYUN KIM, DAE SAN KIM, GWAN-WOO JANG, and JONGKYUM KWON

integers. The Fourier series of βm (< x >) converges pointwise to βm (< x >), for x∈ / Z, and converges to 1 1 (βm (0) + βm (1)) = βm (0) + Ωm 2 2 m ∑ 1 1 (r+1) Bk Em−k + Ωm , = k!(m − k)! 2 k=0

(3.7)

for x ∈ Z. Now, we can state our second theorem. Theorem 3.2. For each positive integer l, let Ωl = −2

l−1 (r+1) ∑ El−k B k

k=0

k!(l − k)!



l−1 (r) ∑ Bk−1 El−k k=1

k!(l − k)!

+

1 (r) B . l! l−1

Assume that Ωm ̸= 0, for a positive integer m. Then we have the following. m ∞ ( ∑ ) ∑ 2j−1 1 − (a) Ωm+1 + Ωm−j+1 e2πinx j 2 (2πin) j=1 n=−∞,n̸=0 {∑m (r+1) 1 / Z, (< x >)Em−k (< x >), for x ∈ k=0 k!(m−k)! Bk = ∑m (r+1) 1 1 Em−k + 2 Ωm , for x ∈ Z. k=0 k!(m−k)! Bk

Here the convergence is pointwise. (b) m ∑ 1 2j−1 Ωm+1 + Ωm−j+1 Bj (< x >) 2 j! j=1 =

m ∑ k=0

1 (r+1) B (< x >)Em−k (< x >), k!(m − k)! k

for x ∈ / Z,

∑ 2j−1 1 Ωm+1 + Ωm−j+1 Bj (< x >) 2 j! j=2 m

=

m ∑ k=0

1 1 (r+1) Bk Em−k + Ωm , k!(m − k)! 2

for x ∈ Z.

Here Bk (< x >) is the Bernoulli function.

4. The fuction γm (< x >) Let γm (x) =

∑m−1

(r+1) 1 (x)Em−k (x), k=1 k(m−k) Bk

1136

(m ≥ 2).

T. KIM ET AL 1127-1145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FOURIER SERIES FOR POLY-BERNOULLI AND EULER FUNCTIONS

′ γm (x) =

m−1 ∑ k=1

=

m−2 ∑ k=0

11

( ) 1 (r+1) (r+1) kBk−1 (x)Em−k (x) + (m − k)Bk (x)Em−k−1 (x) k(m − k)

∑ 1 (r+1) 1 (r+1) Bk (x)Em−1−k (x) + B (x)Em−1−k (x) m−1−k k k k=1 m−1

∑ 1 1 (r+1) = Em−1 (x) + Bk (x)Em−1−k (x) m−1 m−1−k k=1 m−2

∑ 1 (r+1) 1 (r+1) + Bm−1 (x) + Bk (x)Em−1−k (x) m−1 k k=1 m−2

=

1 m−1

m−2 ∑

1 1 1 (r+1) (r+1) Bk (x)Em−1−k (x) + Em−1 (x) + Bm−1 (x) k(m − 1 − k) m − 1 m − 1 k=1 ) ( (r+1) Bm−1 (x) + Em−1 (x) + (m − 1)γm−1 (x).

= (m − 1)

(4.1)

So, ′ γm (x) =

) 1 ( (r+1) Bm−1 (x) + Em−1 (x) + (m − 1)γm−1 (x). m−1

From this, we obtain ( ( ))′ 1 1 1 (r+1) γm+1 (x) − (x) − B Em+1 (x) = γm (x). m m(m + 1) m+1 m(m + 1) ∫

1

γm (x)dx ]1 1[ 1 1 (r+1) γm+1 (x) − B (x) − Em+1 (x) = m m(m + 1) m+1 m(m + 1) 0 ( ) 1 1( (r+1) (r+1) = γm+1 (1) − γm+1 (0) − B (1) − Bm+1 (0) m m(m + 1) m+1 ( )) 1 − Em+1 (1) − Em+1 (0) m(m + 1) 1( 1 = γm+1 (1) − γm+1 (0) − B(r) m m(m + 1) m ( )) 1 − −2Em+1 + 2δm+1,0 m(m + 1) ) 1( 1 2 = γm+1 (1) − γm+1 (0) − B(r) + E . m+1 m m(m + 1) m m(m + 1) 0

(4.2)

For m ≥ 2, we let

1137

T. KIM ET AL 1127-1145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12

TAEKYUN KIM, DAE SAN KIM, GWAN-WOO JANG, and JONGKYUM KWON

Λm = Λm (r) = γm (1) − γm (0) =

m−1 ∑ k=1

=

m−1 ∑ k=1

=

m−1 ∑ k=1

=−

( (r+1) ) 1 (r+1) Bk (1)Em−k (1) − Bk Em−k k(m − k) ( ) 1 (r+1) (r) (r+1) (Bk + Bk−1 )(−Em−k + 2δm,k ) − Bk Em−k k(m − k)

(4.3)

) ( 1 (r+1) (r) −2Bk Em−k − Bk−1 Em−k k(m − k)

m−1 ∑ k=1

( ) 1 (r+1) (r) 2Bk + Bk−1 Em−k . k(m − k)

So, γm (1) = γm (0) ⇔ Λm = 0.

(4.4)

Also, ∫ 0

1

1 γm (x)dx = m

( Λm+1 −

) 1 2 (r) B + Em+1 . m(m + 1) m m(m + 1)

(4.5)

We are now going to consider

γm (< x >) =

m−1 ∑ k=1

1 (r+1) Bk (< x >)Em−k (< x >), k(m − k)

(4.6)

which is defined on (−∞, ∞), and periodic with period 1. The Fourier series of γm (< x >) is ∞ ∑

Cn(m) e2πinx ,

(4.7)

n=−∞

where ∫ Cn(m)

=

1

γm (< x >)e

−2πinx

∫ dx =

0

1

γm (x)e−2πinx dx.

(4.8)

0

1138

T. KIM ET AL 1127-1145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FOURIER SERIES FOR POLY-BERNOULLI AND EULER FUNCTIONS

13

(m)

Now, we are ready to determine the Fourier coefficients Cn . Case 1: n ̸= 0. ∫ Cn(m)

1

=

γm (x)e−2πinx dx

0

∫ 1 ]1 1 [ 1 −2πinx γm (x)e γ ′ (x)e−2πinx dx =− + 2πin 2πin 0 m 0 ) 1 ( γm (1) − γm (0) =− 2πin ∫ 1( ) 1 1 1 (r+1) (m − 1)γm−1 (x) + Bm−1 (x) + Em−1 (x) e−2πinx dx + 2πin 0 m−1 m−1 1 m − 1 (m−1) =− Λm + C 2πin 2πin n ∫ 1 1 (r+1) + B (x)e−2πinx dx 2πin(m − 1) 0 m−1 ∫ 1 1 + Em−1 (x)e−2πinx dx. 2πin(m − 1) 0 (4.9) where, for l ≥ 1 and n ̸= 0, ∫

1

(r+1) Bl (x)e−2πinx dx

0



1

−2πinx

El (x)e 0

l ∑ (l)k−1 (r) =− B , (2πin)k l−k k=1

l ∑ (l)k−1 dx = 2 E . k l−k+1 (2πin) k=1

Thus m − 1 (m−1) 1 Cn − Λm 2πin 2πin 2 1 − Θm + Φm , 2πin(m − 1) 2πin(m − 1)

Cn(m) =

(4.10)

where, for m ≥ 2, Λm = γm (1) − γm (0) = −

m−1 ∑ k=1

Θm =

m−1 ∑ k=1

Φm =

m−1 ∑ k=1

( ) 1 (r+1) (r) 2Bk + Bk−1 Em−k , k(m − k)

(m − 1)k−1 (r) Bm−k−1 , (2πin)k

(4.11)

(m − 1)k−1 Em−k . (2πin)k

1139

T. KIM ET AL 1127-1145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14

TAEKYUN KIM, DAE SAN KIM, GWAN-WOO JANG, and JONGKYUM KWON

1 m − 1 (m−1) 1 2 Cn − Λm − Θm + Φm 2πin 2πin 2πin(m − 1) 2πin(m − 1) ) m − 1 ( m − 2 (m−2) 1 1 2 = Cn − Λm−1 − Θm−1 + Φm−1 2πin 2πin 2πin 2πin(m − 2) 2πin(m − 1) 1 1 2 Λm − Φm − Θm + 2πin 2πin(m − 1) 2πin(m − 1) (m − 1)(m − 2) (m−2) m−1 1 m−1 = C − Λ − Λ − Θm−1 m−1 m n (2πin)2 (2πin)2 2πin (2πin)2 (m − 2) 2(m − 1) 1 2 Θm + − Φm−1 + Φm 2 (2πin)(m − 1) (2πin) (m − 2) 2πin(m − 1) = ···

Cn(m) =

∑ (m − 1)j−1 (m − 1)! (1) ∑ (m − 1)j−1 C − Λ − Θ m−j+1 j j (m − j) m−j+1 (2πin)m−2 n (2πin) (2πin) j=1 j=1 m−1

=

+

m−1 ∑ j=1

=−

2(m − 1)j−1 Φm−j+1 (2πin)j (m − j)

m−1 ∑ j=1

+

m−1 ∑ j=1

m−1

∑ (m − 1)j−1 (m − 1)j−1 Λ − Θ m−j+1 j (m − j) m−j+1 (2πin)j (2πin) j=1 m−1

2(m − 1)j−1 Φm−j+1 , (2πin)j (m − j) (4.12)

(1) Cn

= 0. where Before proceeding further, we note the following.

m−1 ∑ j=1

=

m−1 ∑ j=1

=

2(m − 1)j−1 Φm−j+1 (2πin)j (m − j) 2(m − 1)j−1 ∑ (m − j)k−1 Em−j−k+1 (2πin)j (m − j) k=1 (2πin)k m−j

m−1 ∑ m−j ∑ j=1 k=1

=

m−1 ∑ j=1

2(m − 1)j+k−2 Em−j−k+1 (2πin)j+k (m − j)

(4.13)

m ∑ 1 2(m − 1)s−2 Em−s+1 m − j s=j+1 (2πin)s

1140

T. KIM ET AL 1127-1145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FOURIER SERIES FOR POLY-BERNOULLI AND EULER FUNCTIONS

=

m ∑ 2(m − 1)s−2

(2πin)s

s=2

=

2 m

m−1 ∑ j=1

=

m−1 ∑ j=1

=

m ∑ s=1

j=1

=

m−j

(m − 1)j+k−2 (r) B (2πin)j+k (m − j) m−j−k

m ∑ 1 (m − 1)s−2 (r) Bm−s m − j s=j+1 (2πin)s

m ∑ (m − 1)s−2 s=2

=

(m)s Hm−1 − Hm−s Em−s+1 . (2πin)s m − s + 1

(m − 1)j−1 ∑ (m − j)k−1 (r) Bm−j−k (2πin)j (m − j) k=1 (2πin)k

j=1 k=1

=

1 m

j=1

1 m−j

(m − 1)j−1 Θm−j+1 (2πin)j (m − j)

m−1 ∑ ∑ m−j

m−1 ∑

Em−s+1

s−1 ∑

15

(2πin)s

m ∑ s=1

(r) Bm−s

s−1 ∑ j=1

(4.14)

1 m−j

(m)s Hm−1 − Hm−s (r) Bm−s . (2πin)s m − s + 1

Putting everything together, we obtain 1 ∑ (m)s =− Λm−s+1 m s=1 (2πin)s m

Cn(m)

m m 1 ∑ (m)s Hm−1 − Hm−s (r) 2 ∑ (m)s Hm−1 − Hm−s − Bm−s + Em−s+1 m s=1 (2πin)s m − s + 1 m s=1 (2πin)s m − s + 1 ) ( m 1 ∑ (m)s Hm−1 − Hm−s (r) =− Λm−s+1 + (Bm−s − 2Em−s+1 ) . m s=1 (2πin)s m−s+1 (4.15) Case 2: n = 0. ( ) ∫ 1 1 1 2 (m) (r) C0 = γm (x)dx = Λm+1 − B + Em+1 . (4.16) m m(m + 1) m m(m + 1) 0

γm (< x >), (m ≥ 2) is piecewise C ∞ . Moreover, γm (< x >) is continuous for those positive integers m ≥ 2 with Λm = 0 and discontinuous with jump discontinuities at integers for those positive integers m ≥ 2 with Λm ̸= 0.

1141

T. KIM ET AL 1127-1145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

16

TAEKYUN KIM, DAE SAN KIM, GWAN-WOO JANG, and JONGKYUM KWON

Assume first that Λm = 0. Then γm (1) = γm (0). γm (< x >) is piecewise C ∞ and continuous. So the Fourier series of γm (< x >) converges uniformly to γm (< x >), and

γm (< x >) ) ( 2 1 1 (r) B + Em+1 = Λm+1 − m m(m + 1) m m(m + 1) ∞ m )) (1 ∑ ∑ (m)s ( Hm−1 − Hm−s (r) − Λ (B + − 2E ) e2πinx m−s+1 m−s+1 m−s s m (2πin) m − s + 1 s=1 n=−∞,n̸=0 ( ) 1 1 2 (r) = B + Em+1 Λm+1 − m m(m + 1) m m(m + 1) m ( ) ) Hm−1 − Hm−s (r) 1 ∑ m ( Λm−s+1 + (Bm−s − 2Em−s+1 ) + m s=1 s m−s+1 ∞ ( ∑ e2πinx ) × −s! (2πin)s n=−∞,n̸=0 ( ) 1 1 2 (r) = Λm+1 − B + Em+1 m m(m + 1) m m(m + 1) m ( ) ) Hm−1 − Hm−s (r) 1 ∑ m ( Λm−s+1 + + (Bm−s − 2Em−s+1 ) Bs (< x >) m s=2 s m−s+1 { B1 (< x >), for x ∈ / Z, + Λm × 0, for x ∈ Z, (4.17) ∑m 1 where Hm = k=1 k . Now, we are able to state our first theorem. Theorem 4.1. For each integer l ≥ 2, let

Λl = −

l−1 ∑ k=1

( ) 1 (r+1) (r) 2Bk + Bk−1 El−k , k(l − k)

with Λ1 = 0. Assume that Λm = 0, for the an integer m ≥ 2. Then we have the following.

1142

T. KIM ET AL 1127-1145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FOURIER SERIES FOR POLY-BERNOULLI AND EULER FUNCTIONS

(a)

∑m−1

(r+1) 1 (< k=1 k(m−k) Bk

17

x >)Em−k (< x >) has the Fourier series expansion

m−1 ∑

1 (r+1) Bk (< x >)Em−k (< x >) k(m − k) k=1 ) ( 2 1 1 (r) = B + Em+1 Λm+1 − m m(m + 1) m m(m + 1) ∞ m )) (1 ∑ ∑ Hm−1 − Hm−s (r) (m)s ( − Λ + (B − 2E ) e2πinx , m−s+1 m−s+1 m−s s m (2πin) m − s + 1 s=1 n=−∞,n̸=0

for all x ∈ (−∞, ∞). Here the convergence is uniform. (b) m−1 ∑

1 (r+1) Bk (< x >)Em−k (< x >) k(m − k) k=1 ( ) 1 1 2 (r) = Λm+1 − B + Em+1 m m(m + 1) m m(m + 1) m ( ) ) Hm−1 − Hm−s (r) 1 ∑ m ( Λm−s+1 + + (Bm−s − 2Em−s+1 ) Bs (< x >), m s=2 s m−s+1

for all x ∈ (−∞, ∞). Here Bk (< x >) is the Bernoulli function. Assume next that m is an integer ≥ 2 with Λm ̸= 0. Then, γm (1) ̸= γm (0). Hence γm (< x >) is piecewise C ∞ and discontinuous with jump discontinuities at integers. Thus the Fourier series of γm (< x >) converges pointwise to γm (< x >), for x ∈ / Z, and converges to m−1 ∑ 1 1 1 1 (r+1) (γm (0) + γm (1)) = γm (0) + Λm = Bk Em−k + Λm , (4.18) 2 2 k(m − k) 2 k=1

for x ∈ Z. Next, we can state our second theorem. Theorem 4.2. For each integer l ≥ 2, let Λl = −

l−1 ∑ k=1

( ) 1 (r+1) (r) 2Bk + Bk−1 El−k , k(l − k)

with Λ1 = 0. Assume that Λm ̸= 0, for an integer m ≥ 2. Then we have the following.

1143

T. KIM ET AL 1127-1145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

18

TAEKYUN KIM, DAE SAN KIM, GWAN-WOO JANG, and JONGKYUM KWON

(a) ) ( 2 1 1 (r) B + Em+1 Λm+1 − m m(m + 1) m m(m + 1) ∞ m (1 ∑ )) ∑ Hm−1 − Hm−s (r) (m)s ( − Λm−s+1 + (Bm−s − 2Em−s+1 ) e2πinx s m (2πin) m − s + 1 s=1 n=−∞,n̸=0 {∑m−1 (r+1) 1 B (< x >)Em−k (< x >), for x ∈ / Z, k(m−k) k = ∑k=1 (r+1) m−1 1 1 Em−k + 2 Λm , for x ∈ Z. k=1 k(m−k) Bk Here the convergence is pointwise. (b) ) ( 1 2 1 (r) B + Em+1 Λm+1 − m m(m + 1) m m(m + 1) m ( ) ) 1 ∑ m ( Hm−1 − Hm−s (r) + Λm−s+1 + (Bm−s − 2Em−s+1 ) Bs (< x >) m s=2 s m−s+1 =

m−1 ∑ k=1

1 (r+1) Bk (< x >)Em−k (< x >), for x ∈ / Z, k(m − k)

( Λm+1 −

) 1 2 (r) B + Em+1 m(m + 1) m m(m + 1) m ( ) ) Hm−1 − Hm−s (r) 1 ∑ m ( Λm−s+1 + (Bm−s − 2Em−s+1 ) Bs (< x >) + m s=2 s m−s+1

1 m

=

m−1 ∑ k=1

1 1 (r+1) Bk Em−k + Λm , for x ∈ Z. k(m − k) 2 References

1. T. Arakawa, M. Kaneko, On poly-Bernoulli numbers, Comment. Math. Univ. St. Paul. 48(1999), no. 2, 159–167. 2. A. Bayad, Y. Hamahata, Multiple polylogarithms and multi-poly-Bernoulli polynomials, Funct. Approx. Comment. Math.46(2012), part 1, 45–61. 3. D. V. Dolgy, D. S. Kim, T. Kim, T. Mansour, Degenerate poly-Bernoulli polynomials of the second kind, J. Comput. Anal. Appl. 21(2016), no.5, 954–966. 4. L. C. Jang, T. Kim, D. J. Kang, A note on the Fourier transform of fermionic p -adic integral on Zp , J. Comput. Anal. Appl., 11(3) (2009), 571-575. 5. M. Kaneko, Poly-Bernoulli numbers, J. Theor. Nombres Bordeaux 9(1997), no. 1, 221–228. 6. D.S. Kim, D. V. Dolgy, T. Kim, S.-H. Rim, Some Formulae for the Product of Two Bernoulli and Euler Polynomials, Abstr. Appl. Anal. 2012, Art. ID 784307. 7. D. S. Kim, T. Kim, A note on poly-Bernoulli and higher-order poly-Bernoulli polynomials, Russ. J. Math. Phys., 22(1) (2015), 26–33. 8. D.S. Kim, T. Kim, A note on higher-order Bernoulli polynomials, J. Inequal. Appl. 2013, 2013:111. 9. D. S. Kim, T. Kim, Higher-order Bernoulli and poly-Bernoulli mixed type polynomials, Georgian Math. J. 22(2015), no. 2, 265–272.

1144

T. KIM ET AL 1127-1145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FOURIER SERIES FOR POLY-BERNOULLI AND EULER FUNCTIONS

19

10. D.S. Kim, T. Kim, Some identities of higher order Euler polynomials arising from Euler basis, Integral Transforms Spec. Funct., 24(9) (2013), 734-738. 11. D.S. Kim, T. Kim, T. Mansour, Euler basis and the product of several Bernoulli and Euler polynomials, Adv. Stud. Contemp. Math., 24(2014), no.4, 535-547. 12. D. S. Kim, T. Kim, T. Mansour, J.-J. Seo, Fully degenerate poly-Bernoulli polynomials with a q parameter, Filomat 30(2016), no.4, 1029–1035. 13. T. Kim, Note on the Euler numbers and polynomials, Adv. Stud. Contemp. Math. (Kyungshang), 17(2008), 131–136. 14. T. Kim, Euler numbers and polynomials associated with zeta functions, Abstr. Appl. Anal. 2008, Art. ID 581582, 11 pp. 15. T. Kim, D. S. Kim, Fully degenerate poly-Bernoulli numbers and polynomials, Open Math. 14(2016), 545–556. 16. T. Kim, D. S. Kim, D. V. Dolgy, S.-H. Rim, Some identities on the Euler numbers arising from Euler basis polynomials, ARS Combinatoria 109(2013), 433–446. 17. T. Kim, D.S. Kim, S.-H. Rim, D.-V. Dolgy, Fourier series of higher-order Bernoulli functions and their applications, J. Inequalities and Applications 2017 (2017), 2017:8 Pages. 18. J. E. Marsden, Elementary classical analysis, W. H. Freeman and Company, 1974. 19. Y. Simsek, Interpolation functions of the Eulerian type polynomials and numbers, Adv. Stud. Contemp. Math. (Kyungshang), 23(2013), no. 2, 301?-307. 20. D. G. Zill, M. R. Cullen, Advanced Engineering Mathematics, Jones and Bartlett Publishers 2006. 1

Department of Mathematics, College of Science, Tianjin Polytechnic University, Tianjin 300160, China; Department of Mathematics, Kwangwoon University, Seoul, 139-701, Republic of Korea E-mail address: [email protected] 2

Department of Mathematics, Sogang University, Seoul, 121-742, Republic of Korea E-mail address: [email protected] 3

Department of Mathematics, Kwangwoon University, Seoul, 139-701, Republic of Korea E-mail address: [email protected] 4 Department of Mathematics Education and RINS, Gyeongsang National University, Jinju, Gyeongsangnamdo, 52828, Republic of Korea E-mail address: [email protected]

1145

T. KIM ET AL 1127-1145

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Ellipticity of co-effective complex for locally ˜ 2 -manifolds conformally calibrated G Mobeen Munir1, Waqas Nazeer2, Shin Min Kang3,4,∗ Abdul Rauf Nizami5, and Zakia Shahzadi6

3

1

Division of Science and Technology, University of Education, Lahore 54000, Pakistan e-mails: [email protected]

2

Division of Science and Technology, University of Education, Lahore 54000, Pakistan e-mails: [email protected]

Department of Mathematics and RINS, Gyeongsang National University, Jinju 52828, Korea e-mail: [email protected] 4

5

Center for General Education, China Medical University, Taichung 40402, Taiwan

Department of Mathematics, Faculty of Information Technology, University of Central Punjab, Lahore 54000, Pakistan e-mail: [email protected] 6 Division

of Science and Technology, University of Education, Lahore 54000, Pakistan e-mails: [email protected] Abstract

First we characterize a differential subcopmlex of de de Rham complex for lo˜ 2 -manifolds. Then we give co-effective complex for G ˜ 2cally conformally calibrated G manifolds and prove that in dimension different from 3 this complex is elliptic. 2010 Mathematics Subject Classification: 53C15, 53C10, 53C25, 53C30 ˜ 2 -manifolds, co-effective Key words and phrases: locally conformally calibrated G complex, ellipticity of co-effective complex

1

Introduction

Recently, the theory of special G-structures on smooth manifolds has enjoyed a lot of success among mathematicians and physicist as they exhibit some nice properties. For example G2 -structure can be geometric models in the theory of super strings with torsion [16]. Also Donaldson and Segal [9] suggested recently that manifolds with non-vanishing torsion G2 -structure can be the right framework for guage theory in dimension 7. Main computable models for manifolds with G2 -structure are homogeneous spaces having cohomogeneity one [8, 22, 26]. ∗

Corresponding author

1146

Mobeen Munir ET AL 1146-1156

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

In 1884 Killing exposed a vigorous proof of the presence of smallest of the remarkable simple lie algebra g2C . In 1907, Reichel [25], a student of Engel [10], succeeded in achieving the uniform geometric explanation of the Lie groups G2 and G˜2 , which are two real forms ˜ of GC 2 . In 1914, Cartan proved that G2 and G2 can be treated as the automorphism group of octonions and split-octonions respectively. Later these groups appeared in the Bereger’s celebrated list of potential holonomy of pseudo-Riemannian mertic see [1]. In 1989 Bryant and Salamon [5] gave construction of first complete but non-compact Riemannian manifolds having holonomy G2 , while the first compact example was given by Joyce [17] in 1994. Fern´ andez and Gray [13] classified all G2 -structures in 16 classes in 1982 by decomposing the covariant derivative in 4 irreducible components. A lot has already been said about these different classes. For example, in [24] Friedrich et all discussed special properties of nearly parallel G2 -structures and prove that they carry Einstein metric. Kath [18] ˜ 2 -structure. Munir and initialized the study of psudo-Riemannian 7-manifolds with a G Nizami [24] gave classification of G˜2 -structures using intrinsic torsion with sixteen classes of algebraic types of G˜2 -structures and also proved some strict inclusion relations among the classes of these structures. Manifold with G˜2 are relatively less explained as compared to those admitting G2 -structures. To our knowledge there are only a few papers discussing a few properties about them, see, for example, [4, 18–20, 22, 24].

We recall that a 7-dimensional smooth manifold M 7 is said to admit a G˜2 -structure if it has a section of the bundle F (M 7)/G˜2 on M 7 , where F (M 7 ) is the frame bundle on M 7 . It is noted that G˜2 is the automorphism group of a 3-form ϕ˜ over R7 which is called a 3-form of G˜2 -type [21]. It is known that GL(R7 )-orbit of ϕ˜ is an open orbit of the GL(R7 )-action on Λ3 (R7 ). A 3-form in that open orbit is known as indefinite 3-form. The presence of a G˜2 -structure on a manifold M 7 is equivalent to the presence of an indefinite differential 3-form ϕ˜ over M 7 . A manifold with a G˜2 -structure is said to be parallel if ∇ϕ˜ = 0 or dϕ˜ = d ∗ ϕ˜ = 0 and almost parallel or calibrated if dϕ˜ = 0, locally conformal calibrated if dϕ˜ = θ ∧ ϕ˜ where θ is the differential 1-form on M and θ = 41 (∗(∗dϕ˜ ∧ ϕ) ˜ [3, 7, 11, 12].

In this paper, we study manifolds with a locally confromally calibrated G˜2 -structure which constitute the class W2 ⊕ W4 of [24]. We first construct a differential sub-copmlex ˜ 2 -manifolds, then we have a coof de Rham complex for locally conformally calibrated G effective complex and determine its ellipticity. Bouche [2] constructed similar complex for symplectic manifolds where as Fern´andez and Ugrate [14] discussed the co-effective complex for G2 -manifolds. In Section 2 we describe some properties and representation of ˜ 2the group G˜2 and construct the co-effective complex for locally conformal calibrated G manifolds. We use this name as the complex is analogue to the complex developed by [2] for the case of symplectic manifolds. In Section 3 we discuss the ellipticity of this complex. However it is important to remark that we study these manifolds for two particular reasons. First, they having striking similarities with those admitting a G2 -structure and secondly, because of their interesting class in pseudo-Riemannian geometry, see [6, 27].

1147

Mobeen Munir ET AL 1146-1156

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

˜ 2Co-effective complex for locally conformal calibrated G manifolds

˜ 2 -manifolds. Then we give In this section first we introduce basic representations for G ˜ 2 -manifolds in the form of a simple characterizations of locally conformal calibrated G complex. Let Λq (M ) be the space of differential q-forms on M . Our main purpose is the study of those manifolds for which the sequence dˆ



· · · → Bq−1 (M ) − → Bq (M ) − → Bq+1 (M ) → · · ·

(2.1)

is a differential complex. Here Bq (M ) is the subspace of Λq (M ) defined by Bq (M ) = {β ∈ Λq (M ) | β ∧ ϕ˜ = 0} and dˆ denotes the restriction to Bq (M ) of the exterior differential d of M. A G˜2 -manifold is defined as a 7-dimensional Riemannian manifold M (in which a Riemannian metric gϕ˜ = (1, 1, 1, −1, −1, −1, −1) is defined) endowed with a 2-fold vector cross product P satisfying the following axioms 1. hP (X1 , X2 ), X1i = hP (X1 , X2), X2 i = 0 2. kP (X1 , X2 )k2 = kX1 k2 kX2 k2 − hX1 , X2i2 for X1 , X2 ∈ X(M ). The fundamental 3-form on M is then defined as ϕ(X ˜ 1 , X2, X3 ) = hP (X1 , X2 ), X3i for X1 , X2, X3 ∈ X(M ) and inner product for x, y ∈ ∧q (M ) is defined as hx, yiVM = x ∧ ∗y

(2.2)

where VM is the volume form on M . It is proved that ∧q (M ) splits orthogonally into G˜2 irreducible components ∧ql of dimension l [3]. An isometry known as Hodge star operator defined as ∗ : ∧q (M ) −→ ∧7−q (M ) make two irreducible component isomorphic. For ˜ 2 on ∧1 (M ) and ∧7 (M ) are isomorphic. So it is sufficient example the representation of G ˜ 2 on ∧2 (M ) and ∧3 (M ) as follows to describe the representation of G   ∧27 (M ) = {∗(α ∧ ∗ϕ) ˜ | α ∈ ∧1 (M )}     2 2   ∧14 (M ) = {β ∈ ∧ (M ) | β ∧ ∗ϕ˜ = 0} (2.3) ∧31 (M ) = {f ϕ˜ | f ∈ F(M )}    3 1  ∧7 (M ) = {∗(α ∧ ϕ) ˜ | α ∈ ∧ (M )}    ∧3 (M ) = {γ ∈ ∧3 (M ) | γ ∧ ϕ˜ = γ ∧ ∗ϕ˜ = 0. 27

From above, it is easy to compute

∧31 (M ) ⊕ ∧327 (M ) = {γ ∈ ∧3 (M )|γ ∧ ϕ˜ = 0}.

1148

(2.4)

Mobeen Munir ET AL 1146-1156

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

∧47 (M ) ⊕ ∧427 (M ) = {λ ∈ ∧4 (M )|λ ∧ ϕ˜ = 0}.

(2.5)

˜ 2 -structure on M can be distinguished by a For a seven dimensional manifold M , a G globally defined 3-form ϕ˜ which can be written at each point as ϕ˜ = e123 + e145 + e167 + e246 − e257 + e347 + e356 with respect to some local co frame e1 , e2 , ..., e7 see [5]. It induces a Riemannian metric gϕ˜ and volume form dVgϕ˜ on M given by gϕ˜ (X, Y ) =

1 iX ϕ˜ ∧ iY ϕ˜ ∧ ϕ˜ 6

for any pair of vector fields X, Y on M . Now we have the following result [23]. Proposition 2.1. Let M be a G˜2 -manifold with a fundamental 3-form ϕ. ˜ Then (1) For any differential 1-form α on M , ∗(∗(α ∧ ϕ) ˜ ∧ ϕ) ˜ = 4α. (2) If there is a differential 1-form η on M such that dϕ˜ = η ∧ ϕ, ˜ then η = 41 (∗(∗dϕ∧ ˜ ϕ) ˜ and M is locally conformal calibrated. ˜ 2 manifold having 3-form ϕ. Definition 2.2. Let M be a G ˜ For each l, 0 ≤ l ≤ 7, we l l denote the space B (M ) = {λ ∈ Λ (M )|λ ∧ ϕ˜ = 0}. Also, the orthogonal compliment of Bl (M ) in Λq (M ) is denoted by Al (M ). ˜ 2 -manifold. Then we have the following Lemma 2.3. Let M be a G Bl (M ) = {0} for 0 ≤ l ≤ 2, B3 (M ) = Λ31 (M ) ⊕ Λ327 (M ), B4 (M ) = Λ47 (M ) ⊕ Λ427 (M ), Bl (M ) = Λl (M )

for 5 ≤ l ≤ 7.

Al (M ) = Λl (M )

for 0 ≤ l ≤ 2,

Therefore, 3

A (M ) = A4 (M ) =

Λ37 (M ), Λ41 (M ),

Aq (M ) = {0} for 5 ≤ l ≤ 7. ˜ 2 manifold endowed with fundamental 3-form ϕ. Proposition 2.4. Let M be a G ˜ Then M is locally conformal calibrated if and only if for any differential 3-form ρ ∈ Λ31 (M ) ⊕ Λ327 (M ), the exterior differential dρ ∈ Λ47 (M ) ⊕ Λ427 (M ). In the following, we take B3 (M ) = Λ31 (M ) ⊕ Λ327 (M ) and B4 (M ) = Λ47 (M ) ⊕ Λ427 (M ). Here we give the co-effective complex for locally conformal calibrated G˜2 -manifold. ˜ 2 -manifold. Then M is locally conformal calibrated iff there Theorem 2.5. Let M be a G exist the complex dˆ



d

d

0 → Λ31 (M ) ⊕ Λ327 (M ) − → Λ47 (M ) ⊕ Λ427 (M ) − → Λ5 (M ) − → Λ6 (M ) − → Λ7 (M ) → 0,

(2.6)

where dˆ denotes the restriction to Bq (M )(q = 3, 4) of the exterior differential d of M

1149

Mobeen Munir ET AL 1146-1156

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. From Proposition 2.4 it is clear that (2.6) is a complex if M is locally conformal calibrated. To prove the converse, let us first show that for any f ∈ =(M ) and y ∈ B3 (M ) = Λ13 (M ) ⊕ Λ327 (M ) we have π4 od(f y) = f π4 od(y),

(2.7)

that is, the operator π4 od : B3 (M ) → A4 (M ) is tensorial, where π4 denotes the orthogonal projection of Λ4 (M ) onto A4 (M ) = Λ41 (M ). In fact, since y ∈ Λ31 (M ) ⊕ Λ327(M ), from equation (2.4) and equation (2.5) it follows that df ∧ y ∈ Λ47 (M ) ⊕ Λ427 (M ), that is, π4 (df ∧ y) = 0; thus π4 od(f y) = π4 (df ∧ y) + π4 (f dy) = f π4 (dy), ˆ = which shows equation (2.7) Now suppose that equation (2.6) is a complex, that is, d(dy) ˆ applying d to this equality we get 0 for any y ∈ B3 (M ). Since dy = π4 od(y) + dy, d(π4 od(y)) = 0

(2.8)

for any y ∈ B3 (M ). Therefore, if f is any function on M, from equation (2.7) and equation (2.8) we get 0 = d(π4 od(f y)) = d(f π4 od(y)) = df ∧ π4 od(y) . Since π4 od(y) ∈ Λ41 (M ), there is hy ∈ =(M ) such that π4 od(y) = hy ∗ ϕ˜ and thus hy (df ∧ ∗ϕ) ˜ = 0, for anyf ∈ =(M ). But α ∧ ∗α = 0 iff α = 0, for α ∈ Λ1 (M ), which implies that the function hy must be zero. Therefore, π4 od(y) = 0 for any y ∈ B3 (M ), that is, d(B3 (M )) ⊂ B4 (M ), and Proposition 2.4 implies that M is locally calibrated. ˜ 2 -manifold.For 0 ≤ q ≤ 3, the map d˘q : Aq (M ) → Aq+1 (M ) Definition 2.6. Let M be a G is defined by d˘q = πq+1 od (2.9) where πq+1 : Λq+1 (M ) → Aq+1 (M ) is the orthogonal projection of Λq+1 (M ) onto Aq+1 (M ). ˜ 2 -manifold with fundamental 3-form ϕ. Then M is locally Theorem 2.7. Let M be a G conformal calibrated if and if the sequence d



d



2 3 0 → Λ0 (M ) − → Λ1 (M ) − → Λ2 (M ) −→ Λ37 (M ) −→ Λ41 (M ) → 0

(2.10)

is a complex. Proof. consider α ∈ Λ1 (M ). From equation (2.9) we see that d˘2 (dα) = π3 od(dα) = 0. This proves that d˘2 od = 0. Now, let us suppose that M is locally conformal calibrated, and let β ∈ Λ2 (M ). Using the fact that Λ3 (M ) = Λ31 (M ) ⊕ Λ37 (M ) ⊕ Λ327 (M ), we have dβ = d˘2 β + y,

1150

(2.11)

Mobeen Munir ET AL 1146-1156

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

where d˘2 β ∈ A3 (M ) = Λ37 (M ) and y ∈ Λ31 (M ) ⊕ Λ327 (M ). Proposition 2.4 implies that dy ∈ Λ47 (M ) ⊕ Λ427 (M ). Then taking equation (2.11) the exterior differential d of M , we obtain 0 = d(d˘2 β) + dy which means that d(d˘2β) ∈ Λ47 (M ) ⊕ Λ427 (M ). Thus d˘3 (d˘2 β) = 0 because d˘3 (d˘2 β) is the image of d(d˘2 β) by the orthogonal projection π4 : Λ4 (M ) → A4 (M ) = Λ41 (M ). To prove the converse, let β be a 2-form on M . Therefore, the exterior differential dβ of β is dβ = d˘2 β + y,

(2.12)

where d˘2 β ∈ Λ37 (M ) and y ∈ Λ31 (M ) ⊕ Λ327 (M ). Appling exterior differential d of M on equation (2.12),we get 0 = d(d˘2 β) + dγ. (2.13) Applying the projection π4 to equation (2.13) and using equation (2.9) together with the hypothesis d˘3 od˘2 = 0, we obtain 0 = π4 (d(d˘2β)) + π4 (dγ) = d˘3 od˘2 (β) + π4 (dγ) = π4 (dγ), which implies that dγ ∈ Λ47 (M ) ⊕ Λ427 (M ). Moreover, using equation (2.7) we conclude that d(Λ31(M ) ⊕ Λ327 (M )) ⊂ Λ47 (M ) ⊕ Λ427 (M ). From Proposition 2.4 it follows that M is locally conformal calibrated.

3

Ellipticity of the coeffective complex

In this section we determine the ellipticity of the complex given in (2.6) and (2.10) ˘ in (2.10) is elliptic in degree q for any Theorem 3.1. The complex given (A∗ (M ), d) q 6= 2. ˘ is elliptic in degrees 0 and 1, because Proof. It is obvious that the complex (A∗ (M ), d) ∗ ˘ is elliptic in the de Rham complex (Λ (M ), d) of M is elliptic. The complex (A∗ (M ), d) degrees 3 and 4 if for any point m ∈ M and for any 1-form µ non-zero at m, the complex σµ (d˘2 )

σµ (d˘3 )

∗ ∗ ∗ Λ2 (Tm M ) −−−−→ Λ37 (Tm M ) −−−−→ Λ41 (Tm M) → 0 ∗ M is the cotangent space of M at m,and is exact in the steps 3 and 4, where Tm

σµ (d˘2 )(β) = π3 (µ ∧ β),

(3.1)

σπ (d˘3 (γ)) = π4 (µ ∧ γ),

1151

Mobeen Munir ET AL 1146-1156

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

∗ M ) and γ ∈ Λ3 (T ∗ M ). Therefore, to prove that the complex (A∗ (M ), d) ˘ is for β ∈ Λ2 (Tm 7 m elliptic in degree q = 3 it is sufficient to prove that

ker(σπ (d˘3 )) ⊂ Im(σπ (d˘2 )).

(3.2)

∗ Let γ ∈ Λ37 (Tm M ) be such that γ ∈ Ker(σπ (d˘3 )), or equivalently π4 (µ ∧ γ) = 0. This ∗ M ) ⊕ Λ4 (T ∗ M ), and so µ ∧ γ ∧ ϕ implies that µ ∧ γ ∈ Λ47 (Tm ˜m = 0. Since γ ∧ ϕ˜m ∈ 27 m 6 ∗ ∗ M) Λ (TmM ),from the ellipticity of the de Rham complex it follows that there is η ∈ Λ5 (Tm satisfying γ ∧ ϕ˜m = µ ∧ η. (3.3) ∗ M ) → Λ5 (T ∗ M ) given by Λϕ Now, we use the isomorphism Λϕ ˜m : Λ2 (Tm ˜m (β) = m 2 ∗ ∗ β ∧ ϕ˜m , for β ∈ Λ (Tm M ). This isomorphism implies that there is ν ∈ Λ2 (Tm M ) such that η = ν ∧ ϕ˜m . Thus equation (3.2) becomes

γ ∧ ϕ˜m = µ ∧ ν ∧ ϕ˜m = π3 (µ ∧ ν) ∧ ϕ˜m . Therefore, we have (γ − π3 (µ ∧ ν)) ∧ ϕ˜m = 0.

(3.4)

∗ M ) → Λ6 (T ∗ M ) and But the wedge product by ϕ˜m is also an isomorphism Λϕ ˜m : Λ37 (Tm m so, from equation (3.4), it follows that (γ − π3 (µ ∧ ν)) = 0, using equation (3.1),

γ = π3 (µ ∧ ν) = σπ (d˘2 )(ν), ˘ in degree which proves equation (3.2). To prove the ellipticity of the complex (A∗ (M ), d) q = 4, we show ∗ Λ41 (Tm M ) ⊂ Im(σπ (d˘3 )) ∗ ∗ Let λ ∈ Λ41 (Tm M ). Then λ ∧ ϕ˜m ∈ Λ7 (Tm M ). Now, from the ellipticity of the de Rham Complex of M , we conclude that

µ ∧ ω = λ ∧ ϕ˜m ,

(3.5)

∗ M ). Using the isomorphism Λϕ ∗ M ) → Λ6 (T ∗ M ) again, we for some ω ∈ Λ6 (Tm ˜m : Λ37 (Tm m ∗ obtain ω = γ ∧ ϕ˜m for some γ ∈ Λ37 (Tm M ). Then equation (3.5) becomes

λ ∧ ϕ˜m = µ ∧ γ ∧ ϕ˜m = π4 (µ ∧ γ) ∧ ϕ˜m , which implies that (λ − π4 (µ ∧ γ)) ∧ ϕ˜m = 0.

(3.6)

∗ ∗ But Λϕ ˜m : Λ41 (Tm M ) → Λ7 (Tm M ) is an isomorphism, and hence, from equation (3.6), we have λ = π4 (µ ∧ γ) = σµ (d˘3 )(γ).

Thus λ ∈ Im(σµ(d˘3 )). This completes the proof.

1152

Mobeen Munir ET AL 1146-1156

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Remark 3.2. As X

∗ (−1)q dim(Aq (Tm M )) = 1 − 7 + 21 − 7 + 1 = 9

q=0

˘ is not elliptic in degree q = 2. so the complex (A∗ (M ), d) ˆ given by (2.6) is elliptic in degree q for any q 6= 3. Theorem 3.3. The complex (B∗ (M ), d) ˆ is elliptic in degrees 6 and 7, because it Proof. It is obvious that the complex (B∗ (M ), d) ˆ is elliptic in degree q = 4, is the de Rham complex of M . Now we show that (B∗ (M ), d) we must prove that for m ∈ M and for non-zero µ ∈ T∗m (M ), the complex µ∧

µ∧

∗ ∗ ∗ ∗ ∗ Λ31 (Tm M ) ⊕ Λ327 (Tm M ) −−→ Λ47 (Tm M ) ⊕ Λ427 (Tm M ) −−→ Λ5 (Tm M)

(3.7)

∗ ∗ is exact in degree 4. λ ∈ Λ47 (Tm M ) ⊕ Λ427 (Tm M ) satisfy µ ∧ λ = 0. We must show that 3 ∗ 3 ∗ there is η ∈ Λ1 (Tm M ) ⊕ Λ27 (TmM ) such that λ = µ ∧ η. By the definition of ellipticity of ∗ the de Rham complex there exist η1 ∈ Λ3 (Tm M ) such that

λ = µ ∧ η1 ,

(3.8)

∗ M ) and η 00 ∈ Λ3 (T ∗ M ) ⊕ Λ3 (T ∗ M ) Now equation where η1 = η1 0 + η1 00 with η1 0 ∈ Λ37 (Tm 1 1 m 27 m (3.8) becomes λ = µ ∧ η1 = µ ∧ η1 0 + µ ∧ η1 00 . (3.9) ∗ M ) ⊕ Λ4 (T ∗ M ) hence π (µ ∧ η 0 ) = 0, which implies that But λ and µ ∧ η1 00 ∈ Λ47 (Tm 4 1 27 m 0 η1 ∈ Ker(σµ (dˇ3 )). From Theorem 1.8 it follows that η1 0 ∈ Im(σµ(dˇ2 ). This means that ∗ ∗ ∗ there exist ω ∈ Λ2 (Tm M ) such that η1 0 ∈ π3 (µ ∧ ω). Let ν ∈ Λ31 (Tm M ) ⊕ Λ327 (Tm M ) be 3 ∗ 3 ∗ 3 ∗ the image of µ ∧ ω by the orthogonal projection of Λ (Tm M ) onto Λ1 (TmM ) ⊕ Λ27 (Tm M ). Then we get 0 = µ ∧ (µ ∧ ω) = µ ∧ η1 0 + µ ∧ α

and we obtain λ = µ ∧ (−α + η1 00 ). Now implies that the form η = −α + η1 00 is such that ∗ ∗ η ∈ Λ31 (Tm M ) ⊕ Λ327 (Tm M ) and λ ∈= µ ∧ η. This proves that equation (3.7) is exact in degree 4. Finally, we must prove that the complex µ∧

µ∧

∗ ∗ ∗ ∗ Λ47 (Tm M ) ⊕ Λ427 (Tm M ) −−→ Λ5 (Tm M ) −−→ Λ6 (Tm M) ∗ M ) satisfy µ ∧ β = 0. We must find a 4-form is exact in degree 5. Let β ∈ Λ5 (Tm ∗ M ) ⊕ Λ4 (T ∗ M ) such that ξ ∈ Λ47 (Tm 27 m

β = µ ∧ ξ.

(3.10)

∗ M ) such By the ellipticity of the de Rham complex ofM we see that there is α = Λ4 (Tm that β = µ ∧ α. (3.11) ∗ ∗ ∗ ∗ ∗ Because Λ4 (Tm M ) = Λ41 (Tm M ) ⊕ Λ47 (Tm M ) ⊕ Λ427 (Tm M ) and α ∈ Λ4 (Tm M ) we have

α = α0 + α00 ,

1153

(3.12)

Mobeen Munir ET AL 1146-1156

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

∗ M ) and α00 ∈ Λ4 (T ∗ M ) ⊕ Λ4 (T ∗ M ). By Theorem 1.8 there exist where α0 ∈ Λ41 (Tm 7 m 27 m 3 ∗ η ∈ Λ7 (TmM ) such that α0 = π4 (µ ∧ η) (3.13)

from equation (3.13) it follows that 0 = µ ∧ (µ ∧ η) = µ ∧ α0 + µ ∧ υ,

(3.14)

∗ M ) onto subspace where υ is the image of ν ∧ η by the orthogonal projection of Λ4 (Tm ∗ M ) ⊕ Λ4 (T ∗ M ). The identity equation (3.14) implies that µ ∧ α0 = −µ ∧ υ. Thus Λ47 (Tm 27 m from equation (3.11) and equation (3.12) we conclude that

β = µ ∧ (−υ + α00 ) ∗ ∗ Consider η = −υ + α00 . Then ξ ∈ Λ47 (Tm M ) ⊕ Λ427(Tm M ), and moreover β = µ ∧ η. This proves equation (3.10) and completes the proof.

Remark 3.4.

7 X ∗ M )) = −28 + 34 − 21 + 7 − 1 (−1)q dim(Bq (Tm q=3

ˆ is not elliptic in degree q = 3. so complex (B∗ (M ), d)

References [1] M. Berger, Sur les groupes d’holonomie homog`ene des vari´et´es `a connexion affine et des vari´et´es riemanniennes, Bull. Soc. Math. France, 83 (1955), 279–330. [2] T. Bouche, La cohomologie coeffective d’une vari´et´e symplectique, (French) [The coeffective cohomology of a symplectic manifold], Bull. Sci. Math., 114 (1990), 115– 122. [3] R. L. Bryant, Metrics with exceptional holonomy, Ann. Math., 126 (1987), 525–576. [4] R. L. Bryant, Some remarks on G2 -structures. Proceedings of Gokova GeometryTopology Conference 2005, 75–109, Gokova Geometry/Topology Conference, Gokova, 2006. [5] R. L. Bryant and S. M. Salamon, On the construction of some complete metrics with exceptional holonomy, Duke Math. J., 58 (1989), 829–850. [6] F. M. Cabrera, On Riemannian manifolds with G2 -structures, Boll. Unione Mat. Ital., 7 (1996), 99–112. [7] F. M. Cabrera, M. D. Monar and A. F. Swann, Classification of G2 -structures, J. London Math. Soc., 53 (1996), 407–416. [8] R. Cleyton, A. F. Swann, Cohomogeneity-one G2 -structures, J. Geom. Phys., 44 (2002), 202–220.

1154

Mobeen Munir ET AL 1146-1156

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[9] S. Donaldson and E. Segal, Gauge theory in higher dimension, II, arXiv:0902.3239 [math.DG]. [10] F. Engel, Ein neues, dem linearen Komplexe analoges Gebilde, Leipz. Ber., 52 (1900), 220–239. [11] M. Fern´andez, An example of a compact calibrated manifold associated with the exceptional Lie group G2 , J. Differential Geom., 26 (1987), 367–370. [12] M. Fern´andez, A family of compact solvable G2 -calibrated manifolds, Tohoku Math. J., 39 (1987), 287–289. [13] M. Fern´andez and A. Gray, Riemannian manifolds with structure group G2 , Ann. Mat. Pura Appl., 132 (1982), 19–45. [14] M. Fern´andez and L. Ugrate, A differential complex for locally conformal calibrated G2 -manifolds, Illinois J. Math., 44 (2000), 363–390. [15] Th. Friedrich, I. Kath, A. Moroianu and U. Semmelmann, On nearly parallel G2 structures, J. Geom. Phys., 23 (1997), 259–286. [16] J. Gauntlett, D. Martelli and S. Pakis, Superstrings with intrinsic torsion, Phys, Rev. D, 69 (2004), 086002. [17] D. D. Joyce, Compact manifolds with special holonmy, Oxford University Press, 2000. [18] I. Kath, G2(2)-structures on pseudo-Riemannian manifolds, J. Geom. Phys., 27 (1998), 155–177. [19] H. V. Lˆe, The existence of closed arXiv:math/0603182 [math.DG].

3-forms of

G˜2 -type

on

7-manifolds,

[20] H. V. Lˆe, Manifolds admitting a G˜2 -stucture, arXiv:0704.0503 [math.AT]. [21] H. V. Lˆe, Geometric structures associated with a simple Cartan 3-form, J. Geom. Phys., 70 (2013), 205–223. [22] H. V. Lˆe and M. Munir, Classification of compact homogeneous spaces with invariant G2 -structures, Adv. Geom., 12 (2012), 303–328. [23] M. Munir, W. Nazeer, S. M. Kang and A. Ashraf, Conformal automorphisms for exact locally conformally callibrated G2 -structures, J. Comput. Anal. Appl., to appear. [24] M. Munir and A. R. Nizami, On classification of algebraic types of G2 -structures, J. Geom. Topol., 14 (2013), 39–60. [25] W. Reichel, Uber trilineare alternierende Formen in sechs und sieben Veranderlichen und die durch sie denierten geometrischen Gebilde, Dissertation Greiswald, 1907. [26] F. Reidegeld, Spaces admitting homogeneous G2 -structures, Differential Geom. Appl., 28 (2010), 301–312.

1155

Mobeen Munir ET AL 1146-1156

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.6, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[27] S. M. Salamon, Riemannian geometry and holonomy groups, Pitman Research Notes in Mathematics Series, vol. 201, Longman Scientific & Technical, Harlow; copublished in the United States with John Wiley & Sons, Inc., New York, 1989.

1156

Mobeen Munir ET AL 1146-1156

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO. 6, 2019

Some identities involving generalized degenerate tangent polynomials arising from differential equations, C. S. Ryoo,………………………………………………………………………975 Some New Inequalities of the Hermite-Hadamard Type for Extended s-Convex Functions, Jian Sun, Bo-Yan Xi, and Feng Qi,………………………………………………………………985 On non-convex hybrid algorithm for a family of countable quasi-Lipschitz mappings in Hilbert spaces, Muhammad Saeed Ahmad, Shin Min Kang, Waqas Nazeer, and Samina Kausar,…997 Some Results of The Class of Functions with Bounded Radius Rotation, Yaşar Polatoğlu, Yasemin Kahramaner, and Arzu Yemișci Șen,……………………………………………1006 Poly-Genocchi polynomials with umbral calculus viewpoint, Taekyun Kim, Dae San Kim, Gwan-Woo Jang, and Jongkyum Kwon,……………………………………………………1014 On a class of certain dynamic inequalities in three independent variables on time scales, Zareen. A. Khan,…………………………………………………………………………………….1032 Divisibility of Generalized Catalan Numbers and Raney Numbers, Jacob Bobrowski, Tian-Xiao He, and Peter J.-S. Shiue,……………………………………………………………………1047 Coupled fixed point theorems for two maps in cone b-metric spaces over Banach algebras, Young-Oh Yang and Hong Joon Choi,………………………………………………………1059 Fourier series of sums of products of poly-Genocchi functions, Taekyun Kim, Dae San Kim, Dmitry V. Dolgy, and Jin-Woo Park,…………………………………………………………1070 Hesitant fuzzy normal subalgebras in B-algebras, Jung Mi Ko and Sun Shin Ahn,…………1084 Impulsive periodic solutions of second order differential equations with singularity, Shengjun Li and Yanhua Wang,……………………………………………………………………………1095 On Gauss diagrams of Knots: A modern approach, Young Chel Kwun, Abdul Rauf Nizami, Waqas Nazeer, Mobeen Munir, and Shin Min Kang,…………………………………………1104 The Jones polynomial of graph links via the Tutte polynomial, Young Chel Kwun, Abdul Rauf Nizami, Waqas Nazeer, and Shin Min Kang,…………………………………………………1114

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO. 6, 2019 (continued)

Fourier series of sums of product of poly-Bernoulli and Euler functions and their applications, Taekyun Kim, Dae San Kim, Gwan-Woo Jang, and Jongkyum Kwon,……………………1127 Ellipticity of co-effective complex for locally conformally calibrated 𝐺𝐺�2 -manifolds, Mobeen Munir, Waqas Nazeer, Shin Min Kang, Abdul Rauf Nizami, and Zakia Shahzadi,…………1146

Volume 26, Number 7 ISSN:1521-1398 PRINT,1572-9206 ONLINE

Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC

June 15, 2019

Journal of Computational Analysis and Applications ISSNno.’s:1521-1398 PRINT,1572-9206 ONLINE SCOPE OF THE JOURNAL An international publication of Eudoxus Press, LLC (fifteen times annually) Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152-3240, U.S.A [email protected] http://www.msci.memphis.edu/~ganastss/jocaaa The main purpose of "J.Computational Analysis and Applications" is to publish high quality research articles from all subareas of Computational Mathematical Analysis and its many potential applications and connections to other areas of Mathematical Sciences. Any paper whose approach and proofs are computational,using methods from Mathematical Analysis in the broadest sense is suitable and welcome for consideration in our journal, except from Applied Numerical Analysis articles. Also plain word articles without formulas and proofs are excluded. The list of possibly connected mathematical areas with this publication includes, but is not restricted to: Applied Analysis, Applied Functional Analysis, Approximation Theory, Asymptotic Analysis, Difference Equations, Differential Equations, Partial Differential Equations, Fourier Analysis, Fractals, Fuzzy Sets, Harmonic Analysis, Inequalities, Integral Equations, Measure Theory, Moment Theory, Neural Networks, Numerical Functional Analysis, Potential Theory, Probability Theory, Real and Complex Analysis, Signal Analysis, Special Functions, Splines, Stochastic Analysis, Stochastic Processes, Summability, Tomography, Wavelets, any combination of the above, e.t.c. "J.Computational Analysis and Applications" is a peer-reviewed Journal. See the instructions for preparation and submission of articles to JoCAAA. Assistant to the Editor: Dr.Razvan Mezei,[email protected], Madison,WI,USA.

Journal of Computational Analysis and Applications(JoCAAA) is published by EUDOXUS PRESS,LLC,1424 Beaver Trail Drive,Cordova,TN38016,USA,[email protected] http://www.eudoxuspress.com. Annual Subscription Prices:For USA and Canada,Institutional:Print $800, Electronic OPEN ACCESS. Individual:Print $400. For any other part of the world add $160 more(handling and postages) to the above prices for Print. No credit card payments. Copyright©2019 by Eudoxus Press,LLC,all rights reserved.JoCAAA is printed in USA. JoCAAA is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH. It is strictly prohibited the reproduction and transmission of any part of JoCAAA and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes no responsibility for the content of published papers.

1160

Editorial Board Associate Editors of Journal of Computational Analysis and Applications Francesco Altomare Dipartimento di Matematica Universita' di Bari Via E.Orabona, 4 70125 Bari, ITALY Tel+39-080-5442690 office +39-080-3944046 home +39-080-5963612 Fax [email protected] Approximation Theory, Functional Analysis, Semigroups and Partial Differential Equations, Positive Operators.

Fractional Differential Equations Nonlinear Analysis, Fractional Dynamics Carlo Bardaro Dipartimento di Matematica e Informatica Universita di Perugia Via Vanvitelli 1 06123 Perugia, ITALY TEL+390755853822 +390755855034 FAX+390755855024 E-mail [email protected] Web site: http://www.unipg.it/~bardaro/ Functional Analysis and Approximation Theory, Signal Analysis, Measure Theory, Real Analysis.

Ravi P. Agarwal Department of Mathematics Texas A&M University - Kingsville 700 University Blvd. Kingsville, TX 78363-8202 tel: 361-593-2600 [email protected] Differential Equations, Difference Equations, Inequalities

Martin Bohner Department of Mathematics and Statistics, Missouri S&T Rolla, MO 65409-0020, USA [email protected] web.mst.edu/~bohner Difference equations, differential equations, dynamic equations on time scale, applications in economics, finance, biology.

George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis, TN 38152,U.S.A Tel.901-678-3144 e-mail: [email protected] Approximation Theory, Real Analysis, Wavelets, Neural Networks, Probability, Inequalities.

Jerry L. Bona Department of Mathematics The University of Illinois at Chicago 851 S. Morgan St. CS 249 Chicago, IL 60601 e-mail:[email protected] Partial Differential Equations, Fluid Dynamics

J. Marshall Ash Department of Mathematics De Paul University 2219 North Kenmore Ave. Chicago, IL 60614-3504 773-325-4216 e-mail: [email protected] Real and Harmonic Analysis

Luis A. Caffarelli Department of Mathematics The University of Texas at Austin Austin, Texas 78712-1082 512-471-3160 e-mail: [email protected] Partial Differential Equations George Cybenko Thayer School of Engineering

Dumitru Baleanu Department of Mathematics and Computer Sciences, Cankaya University, Faculty of Art and Sciences, 06530 Balgat, Ankara, Turkey, [email protected]

1161

Dartmouth College 8000 Cummings Hall, Hanover, NH 03755-8000 603-646-3843 (X 3546 Secr.) e-mail:[email protected] Approximation Theory and Neural Networks

011-49-203-379-3542 e-mail: [email protected] Approximation Theory, Computer Aided Geometric Design John R. Graef Department of Mathematics University of Tennessee at Chattanooga Chattanooga, TN 37304 USA [email protected] Ordinary and functional differential equations, difference equations, impulsive systems, differential inclusions, dynamic equations on time scales, control theory and their applications

Sever S. Dragomir School of Computer Science and Mathematics, Victoria University, PO Box 14428, Melbourne City, MC 8001, AUSTRALIA Tel. +61 3 9688 4437 Fax +61 3 9688 4050 [email protected] Inequalities, Functional Analysis, Numerical Analysis, Approximations, Information Theory, Stochastics.

Weimin Han Department of Mathematics University of Iowa Iowa City, IA 52242-1419 319-335-0770 e-mail: [email protected] Numerical analysis, Finite element method, Numerical PDE, Variational inequalities, Computational mechanics

Oktay Duman TOBB University of Economics and Technology, Department of Mathematics, TR06530, Ankara, Turkey, [email protected] Classical Approximation Theory, Summability Theory, Statistical Convergence and its Applications

Tian-Xiao He Department of Mathematics and Computer Science P.O. Box 2900, Illinois Wesleyan University Bloomington, IL 61702-2900, USA Tel (309)556-3089 Fax (309)556-3864 [email protected] Approximations, Wavelet, Integration Theory, Numerical Analysis, Analytic Combinatorics

Saber N. Elaydi Department Of Mathematics Trinity University 715 Stadium Dr. San Antonio, TX 78212-7200 210-736-8246 e-mail: [email protected] Ordinary Differential Equations, Difference Equations

Margareta Heilmann Faculty of Mathematics and Natural Sciences, University of Wuppertal Gaußstraße 20 D-42119 Wuppertal, Germany, [email protected] Approximation Theory (Positive Linear Operators)

J .A. Goldstein Department of Mathematical Sciences The University of Memphis Memphis, TN 38152 901-678-3130 [email protected] Partial Differential Equations, Semigroups of Operators

Xing-Biao Hu Institute of Computational Mathematics AMSS, Chinese Academy of Sciences Beijing, 100190, CHINA [email protected]

H. H. Gonska Department of Mathematics University of Duisburg Duisburg, D-47048 Germany

1162

Computational Mathematics Ram N. Mohapatra Department of Mathematics University of Central Florida Orlando, FL 32816-1364 tel.407-823-5080 [email protected] Real and Complex Analysis, Approximation Th., Fourier Analysis, Fuzzy Sets and Systems

Jong Kyu Kim Department of Mathematics Kyungnam University Masan Kyungnam,631-701,Korea Tel 82-(55)-249-2211 Fax 82-(55)-243-8609 [email protected] Nonlinear Functional Analysis, Variational Inequalities, Nonlinear Ergodic Theory, ODE, PDE, Functional Equations.

Gaston M. N'Guerekata Department of Mathematics Morgan State University Baltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'[email protected] [email protected] Nonlinear Evolution Equations, Abstract Harmonic Analysis, Fractional Differential Equations, Almost Periodicity & Almost Automorphy

Robert Kozma Department of Mathematical Sciences The University of Memphis Memphis, TN 38152, USA [email protected] Neural Networks, Reproducing Kernel Hilbert Spaces, Neural Percolation Theory Mustafa Kulenovic Department of Mathematics University of Rhode Island Kingston, RI 02881,USA [email protected] Differential and Difference Equations

M.Zuhair Nashed Department Of Mathematics University of Central Florida PO Box 161364 Orlando, FL 32816-1364 e-mail: [email protected] Inverse and Ill-Posed problems, Numerical Functional Analysis, Integral Equations, Optimization, Signal Analysis

Irena Lasiecka Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

Mubenga N. Nkashama Department OF Mathematics University of Alabama at Birmingham Birmingham, AL 35294-1170 205-934-2154 e-mail: [email protected] Ordinary Differential Equations, Partial Differential Equations

Burkhard Lenze Fachbereich Informatik Fachhochschule Dortmund University of Applied Sciences Postfach 105018 D-44047 Dortmund, Germany e-mail: [email protected] Real Networks, Fourier Analysis, Approximation Theory

Vassilis Papanicolaou Department of Mathematics National Technical University of Athens Zografou campus, 157 80 Athens, Greece tel:: +30(210) 772 1722 Fax +30(210) 772 1775 [email protected] Partial Differential Equations, Probability

Hrushikesh N. Mhaskar Department Of Mathematics California State University Los Angeles, CA 90032 626-914-7002 e-mail: [email protected] Orthogonal Polynomials, Approximation Theory, Splines, Wavelets, Neural Networks

1163

Choonkil Park Department of Mathematics Hanyang University Seoul 133-791 S. Korea, [email protected] Functional Equations

Anfithea - Paleon Faliron GR-175 64 Athens, Greece [email protected] Numerical Analysis H. M. Srivastava Department of Mathematics and Statistics University of Victoria Victoria, British Columbia V8W 3R4 Canada tel.250-472-5313; office,250-4776960 home, fax 250-721-8962 [email protected] Real and Complex Analysis, Fractional Calculus and Appl., Integral Equations and Transforms, Higher Transcendental Functions and Appl.,q-Series and q-Polynomials, Analytic Number Th.

Svetlozar (Zari) Rachev, Professor of Finance, College of Business, and Director of Quantitative Finance Program, Department of Applied Mathematics & Statistics Stonybrook University 312 Harriman Hall, Stony Brook, NY 11794-3775 tel: +1-631-632-1998, [email protected] Alexander G. Ramm Mathematics Department Kansas State University Manhattan, KS 66506-2602 e-mail: [email protected] Inverse and Ill-posed Problems, Scattering Theory, Operator Theory, Theoretical Numerical Analysis, Wave Propagation, Signal Processing and Tomography

I. P. Stavroulakis Department of Mathematics University of Ioannina 451-10 Ioannina, Greece [email protected] Differential Equations Phone +3-065-109-8283

Tomasz Rychlik Polish Academy of Sciences Instytut Matematyczny PAN 00-956 Warszawa, skr. poczt. 21 ul. Śniadeckich 8 Poland [email protected] Mathematical Statistics, Probabilistic Inequalities

Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock, Germany [email protected] Numerical Fourier Analysis, Fourier Analysis, Harmonic Analysis, Signal Analysis, Spectral Methods, Wavelets, Splines, Approximation Theory

Boris Shekhtman Department of Mathematics University of South Florida Tampa, FL 33620, USA Tel 813-974-9710 [email protected] Approximation Theory, Banach spaces, Classical Analysis

Roberto Triggiani Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

T. E. Simos Department of Computer Science and Technology Faculty of Sciences and Technology University of Peloponnese GR-221 00 Tripolis, Greece Postal Address: 26 Menelaou St.

Juan J. Trujillo University of La Laguna Departamento de Analisis Matematico C/Astr.Fco.Sanchez s/n 38271. LaLaguna. Tenerife. SPAIN Tel/Fax 34-922-318209 [email protected]

1164

Fractional: Differential EquationsOperators-Fourier Transforms, Special functions, Approximations, and Applications

Ahmed I. Zayed Department of Mathematical Sciences DePaul University 2320 N. Kenmore Ave. Chicago, IL 60614-3250 773-325-7808 e-mail: [email protected] Shannon sampling theory, Harmonic analysis and wavelets, Special functions and orthogonal polynomials, Integral transforms

Ram Verma International Publications 1200 Dallas Drive #824 Denton, TX 76205, USA [email protected] Applied Nonlinear Analysis, Numerical Analysis, Variational Inequalities, Optimization Theory, Computational Mathematics, Operator Theory

Ding-Xuan Zhou Department Of Mathematics City University of Hong Kong 83 Tat Chee Avenue Kowloon, Hong Kong 852-2788 9708,Fax:852-2788 8561 e-mail: [email protected] Approximation Theory, Spline functions, Wavelets

Xiang Ming Yu Department of Mathematical Sciences Southwest Missouri State University Springfield, MO 65804-0094 417-836-5931 [email protected] Classical Approximation Theory, Wavelets

Xin-long Zhou Fachbereich Mathematik, Fachgebiet Informatik Gerhard-Mercator-Universitat Duisburg Lotharstr.65, D-47048 Duisburg, Germany e-mail:[email protected] Fourier Analysis, Computer-Aided Geometric Design, Computational Complexity, Multivariate Approximation Theory, Approximation and Interpolation Theory

Xiao-Jun Yang State Key Laboratory for Geomechanics and Deep Underground Engineering, China University of Mining and Technology, Xuzhou 221116, China Local Fractional Calculus and Applications, Fractional Calculus and Applications, General Fractional Calculus and Applications, Variable-order Calculus and Applications, Viscoelasticity and Computational methods for Mathematical [email protected]

Jessada Tariboon Department of Mathematics, King Mongkut's University of Technology N. Bangkok 1518 Pracharat 1 Rd., Wongsawang, Bangsue, Bangkok, Thailand 10800 [email protected], Time scales, Differential/Difference Equations, Fractional Differential Equations

Richard A. Zalik Department of Mathematics Auburn University Auburn University, AL 36849-5310 USA. Tel 334-844-6557 office 678-642-8703 home Fax 334-844-6555 [email protected] Approximation Theory, Chebychev Systems, Wavelet Theory

1165

Instructions to Contributors Journal of Computational Analysis and Applications An international publication of Eudoxus Press, LLC, of TN.

Editor in Chief: George Anastassiou Department of Mathematical Sciences University of Memphis Memphis, TN 38152-3240, U.S.A.

1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves.

2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.

1166

4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corollaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,

1167

name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990).

Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986.

Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495.

11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears.

15. This journal will consider for publication only papers that contain proofs for their listed results.

1168

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Shift and invert weighted Golub-Kahan-Lanczos bidiagonalization algorithm for linear response eigenproblem Hong-xiu Zhong1 , Guo-liang Chen2 , Wan-qiang Shen3 . Abstract: Weighted Golub-Kahan-Lanczos bidiagonalization algorithm(wGKLu ) is used to solving the linear response eigenproblem. In this paper, we present an improvement to wGKLu based on the shift-and-invert strategy. Due to the interior eigenproblem being transformed to the exterior eigenproblem, our new algorithm saves lots of calculus. Numerical examples illustrates the behaviors. Keywords: Linear response eigenproblem, Golub-Kahan-Lanczos, Shift and invert. AMS classifications: 65F15, 15A18, 81Q15.

1

Introduction

In this paper, we consider the eigenvalue problem of the form [ ][ ] [ ] 0 K u u Hz = =λ = λz, M 0 v v

(1.1)

where K, M ∈ Cn×n , are hermitian positive definite. Such a problem is referred as the linear response eigenvalue problem(LREP)[1, 14, 20]. It arises from linear response problem that computes excitation states (energies) of physical systems in the study of collective motion of many particle systems [3, 9, 11, 14, 8]. In the linear response problem, although there are cases that one of K and M may be indefinite [12], however, usually both of them are positive definite [14]. So in this paper, we consider the case that both of K and M are positive definite. There are a great deal of excellent work in developing efficient numerical algorithms for linear response problem [1, 2, 10, 15, 16, 18, 20]. As we all known, the classical Lanczos method is efficient and easy to execute for symmetric eigenvalue problem [13]. In order to take advantage of the classical Lanczos method, in [20], Tsiper proposed a Lanczos-type method for the linear response problem, and based on reducing both K and M to tridiagonal matrices. While in [18], Teng and Li presented another Lanczostype method which can be viewed as a natural and elegant extension of the classical Lanczos method. It is based on reducing one of K and M to a tridiagonal matrix and the other to a diagonal matrix. We can see, both the above two methods reduce the original H to a unsymmetric matrix. Thus the calculation of its eigenpairs can not use any advantages from symmetric matrix eigenvalue calculation, consequently, it may generate extra computation and storage. Recently, to avoid this problem, the weighted Golub-Kahan-Lanczos(wGKL) [21] was proposed [for solving]LREP, denoted by wGKL-LREP. It aims to generate a projection matrix 0 Bk of H at kth iteration, where Bk is an upper or lower bidiagonal matrix. Due Bk = BkT 0 1

Corresponding author. School of Science, Jiangnan University, Wuxi, Jiangsu, 214122, P.R. China. E-mail: [email protected]. 2 Department of Mathematics, Shanghai Key Laboratory of PMMP, East China Normal University, Shanghai, 200241, P.R. China. E-mail: [email protected]. 3 School of Science, Jiangnan University, Wuxi, Jiangsu, 214122, P.R. China. E-mail: wq [email protected].

1 1169

ZHONG ET AL 1169-1178

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

to the symmetry of Bk , the eigenpairs of H can be constructed just from Bk , not the whole Bk . In the following discussion, we focus on Bk is an upper bidiagonal matrix, the corresponding algorithm of which is wGKLu -LREP, the lower case can be similarly discussed. Since often in linear response eigenvalue problem, the first l smallest positive eigenvalues λi for i = 1, 2, · · · , l are of interest. They lie in the middle of the spectrum of H, and often crowd together, thus it is not easy to get them with the above algorithms. Fortunately, we can apply the preconditioning technique, the notion of which is better known for linear systems than for eigenvalue problems. A typical preconditioned iterative method for linear systems amounts to replacing the original linear system Ax = b by the equivalent system P −1 Ax = P −1 b, where P is a matrix close to A in some sense. For eigenvalue problems, the best known preconditioning is the so-called shift-and-invert technique. If the shift σ is suitably chosen, the shifted and inverted matrix P = (A − σI)−1 will have a spectrum with much better separation properties than that of the original matrix A, and this will result in faster convergence. In this paper, we consider the shift-and-invert technique of weighted Golub-Kahan-Lanczos bidiagonalization algorithms. Since we are particularly interested in the smallest eigenvalues with the positive sign of H, thus σ = 0 is often an obvious choice. The paper is organized as follows. In section 2, we will give an outline of wGKLu -LREP. The shift-and-invert version of wGKLu -LREP will be described in section 3. In section 4, some numerical examples are illustrated the numerical behavior of our new algorithm. In the end, the conclusion will be given in section 5.

2

Preliminary

In this section, we will give some preliminary of the weighted Golub-Kahan-Lanczos upper bidiagonalization algorithm (wGKLu ) and its application algorithm (wGKLu -LREP) for Linear response eigenvalue problem. Lemma 2.1 [21] is the basic theory of the above algorithms. Lemma 2.1. Suppose 0 < K, M ∈ Cn×n . Then there exist an M -orthogonal matrix X ∈ Cn×n and a K-orthogonal matrix Y ∈ Cn×n such that KY = XB T ,

M X = Y B,

(2.1)

where B is upper bidiagonal. Let X = [x1 , · · · , xn ], Y = [y1 , · · · , yn ], and  α1 β1   α2 B=  

 .. ..

. . βn−1 αn

  ,  

then from Lemma 2.1, wGKLu can be described as follows. Algorithm 1 (wGKLu ). Choose x1 satisfying ∥x1 ∥M = 1, and set β0 = 1, y0 = 0. Compute g1 = M x1 . For j = 1, 2, · · · sj = gj /βj−1 − βj−1 yj−1 2 1170

ZHONG ET AL 1169-1178

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

fj = Ksj 1 αj = (sTj fj ) 2 yj = sj /αj tj+1 = fj /αj − αj xj gj+1 = M tj+1 1 βj = (tTj+1 gj+1 ) 2 xj+1 = tj+1 /βj End Suppose Algorithm 1 runs k iterations, we have the following relation M Xk = Yk Bk ,

KYk = Xk BkT + βk xk+1 eTk = Xk+1

[

Bk βk ek

]T

,

(2.2)

and XkH M Xk = Ik = YkH KYk . [

Define Xj =

Xj 0

0 Yj

]

[ Bj =

(2.3) BjT 0

0 Bj

] .

Then from (2.2) and (2.3), we obtain [ HXk = Xk Bk + βk

xk+1 0

] eT2k

(2.4)

[

] M 0 with = Ik , here M = . 0 K Consequently, the first l smallest positive eigenvalues of H together with their corresponding eigenvectors can be approximately constructed from Bk , which is obviously symmetric. Since K and M are hermitian positive definite, all eigenvalues of KM (and M K) are real and positive. Denote these eigenvalues by λ2i (1 ≤ i ≤ n) in descending order, i.e., XH k MXk

λ21 ≥ λ22 ≥ · · · ≥ λ2n ≥ 0, where all λi ≥ 0 and thus λ1 ≥ λ2 ≥ · · · ≥ λn ≥ 0. From Theorem 2.1 [1], we know the eigenvalues of H are ±λi , 1 ≤ i ≤ n. Suppose Bk has an SVD Bk = Φk Σk ΨTk , (2.5) where Φk = [ϕ1 , · · · , ϕk ] ∈ Rk×k , Ψk = [ψ1 , · · · , ψk ] ∈ Rk×k , Σk = diag(σ1 , · · · , σk ), with σ1 ≥ · · ·[≥ σk > 0, ] ΦTk Φk = Ik and ΨTk Ψk = Ik , then from (2.4), by using an orthogonal matrix Ik Ik J = √12 , the following equation is hold Ik −Ik 1 H√ 2

[

Xk Ψk Xk Ψk Yk Φk −Yk Φk

]

[ ][ ] 1 Xk Ψk Xk Ψk Σk 0 =√ 0 −Σk 2 Yk Φk −Yk Φk [ ] [ ] βk xk+1 Ψk Ψk +√ eT2k . 0 Φk −Φk 2

3 1171

ZHONG ET AL 1169-1178

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Thus we may take ±σ1 , · · · , ±σk as Ritz values of H and [ ] 1 Xk ψj ± ˆj = √ , j = 1, . . . , k z 2 ±Yk ϕj as corresponding M-orthonormal right Ritz vectors. Meanwhile, using the residual norm ˆ± ∥Hˆ z± j ± σj z j ∥M =

βk |ϕjk | √ 2

as the stopping criterion, here ϕjk is the kth component of ϕj . Algorithm 2 (wGKLu -LREP). 1. Run k steps of Algorithm 1 with an initial x1 satisfying ∥x1 ∥M = 1 and an appropriate integer k to generate Bk , Xk , and Yk ; 2. Compute an SVD of Bk as in (2.5), select l(≤ k) smallest singular value σj , and the associated left and[right singular vector ϕj and ψj , j = 1, · · · , l; ] X ψ k j ˆj = √12 , j = 1, · · · , l; 3. Form σj , z Y k ϕj 4. If βk = 0, break.

3

Shift and invert weighted Golub-Kahan-Lanczos bidiagonalization algorithm

Usually, the first l smallest positive eigenvalues λi of H for i = 1, 2, · · · , l are of interest. They lie in the middle of the spectrum of H, and often crowd together. Thus it is necessary to present an accelerating strategy for wGKLu when applying it for linear response eigenvalue problem. In this section, we will propose a shift-and-invert version of wGKLu for solving the eigenproblems of H. Choosing a shift σ, the shift-and-invert strategy is simply transformed the original problem Ax = λx into (A−σI)−1 x = αx. The simplest possible scheme is to run Arnoldi’s method on the matrix (A − σI)−1 . Thus, the eigenvalue of the original problem is λ = α1 + σ, the eigenvectors of A and (A − σI)−1 are identical. For linear response eigenvalue problem Hz = λz, where H is from (1.1). As the above discussion, using the shift-and-invert strategy, is running the weighted Golub-Kahan-Lanczos upper bidiagonalization algorithm(wGKLu ) on matrix (H − σI)−1 . Since we are interested in the smallest eigenvalues with the positive sign of[H, thus σ = 0] is often an obvious choice. It 0 M −1 is clear that the inverse matrix of H is H−1 = . Because K −1 and M −1 are −1 K 0 also both hermitian definite, thus we can directly apply wGKLu to H−1 . Theorem 3.1 gives the theoretical relations of our new algorithm. Here, we still use the same denotation without misunderstanding. Theorem 3.1. Suppose 0 < K, M ∈ Cn×n . Then there exist an M −1 -orthogonal matrix X ∈ Cn×n and a K −1 -orthogonal matrix Y ∈ Cn×n such that M −1 X = Y B,

K −1 Y = XB T ,

(3.1)

where B is upper bidiagonal. 4 1172

ZHONG ET AL 1169-1178

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. Since K, M > 0, then K −1 , M −1 > 0. Suppose K −1 = LLH , M −1 = RRH are the Cholesky decomposition of K −1 and M −1 . From [7], we can assume LH R = U BV H ,

(3.2)

where U, V ∈ Cn×n are unitary matrices, B is upper bidiagonal. Thus let X = R−H V , Y = L−H U , from (3.2), we have LH RRH X = LH Y B, RH LLH Y = RH XB T . By multiplying L−H and R−H , respectively, and (3.1) holds obviously. Clearly, X H M −1 X = I, Y H K −1 Y = I. From Theorem 3.1, we can get the following algorithm. Algorithm 3 (wGKLu on H−1 ). Choose x1 satisfying ∥x1 ∥M −1 = 1, and set β0 = 1, y0 = 0. Compute g1 = M −1 x1 . For j = 1, 2, · · · sj = gj /βj−1 − βj−1 yj−1 fj = K −1 sj 1 αj = (sTj fj ) 2 yj = sj /αj tj+1 = fj /αj − αj xj gj+1 = M −1 tj+1 1 βj = (tTj+1 gj+1 ) 2 xj+1 = tj+1 /βj End Remark 1. In Algorithm 3, we need to solve linear system Kf = s and M g = t. Here we use LU decomposition to solve it. After lots of experiments, we found it is not suitable to use iterative methods to solve these linear system, because iterative methods are not the exact methods generally. Even LU decomposition is an accurate method for linear system problems, but it will encounter some problems, such as more time and more memory, especially for large scale problems. Fortunately, because we transform the interior eigenproblem to the exterior eigenproblem, thus compared to the methods in the numerical examples, our algorithm still shows its superiority. Let Xk , Yk , Bk be generated by Algorithm 3 after k iterations, we have [ ]T M −1 Xk = Yk Bk , K −1 Yk = Xk BkT + βk xk+1 eTk = Xk+1 Bk βk ek , and

XkH M −1 Xk = Ik = YkH K −1 Yk . [

Define Yj =

Yj 0

0 Xj

]

[ Bj =

0 BjT

Bj 0

(3.3) (3.4)

] .

Then from (3.3) and (3.4), one has H

−1

[ Yk = Yk Bk + βk

0 xk+1

] eTk ,

(3.5)

5 1173

ZHONG ET AL 1169-1178

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[

] K −1 0 = I2k , where ek = I2k (:, k), K = with . 0 M −1 Similar as the discussion in section 2, suppose Bk has an SVD YkH KYk

Bk = Φk Σk ΨTk ,

(3.6)

where Φk = [ϕ1 , · · · , ϕk ], Ψk = [ψ1 , · · · , ψk ], Σk = diag{σ1 , · · · , σk }, with σ1 ≥ · · · ≥ σk > 0, ΦTk Φk = Ik , ΨTk Ψk = Ik . From (3.5), we may take ±σ1 , . . . , ±σk as Ritz values of H−1 , i.e., approximate eigenvalues of H−1 , [ ] 1 Y k ϕj ± ˆj = √ j = 1, . . . , k, z 2 ±Xk ψj as corresponding K-orthonormal Ritz vectors. Meanwhile, using the residual norm ˆ± ˆ± ∥H−1 z j ± σj z j ∥K =

βk |ψjk | √ 2

(3.7)

as the stopping criterion, here ψjk is the kth component of ψj . Consequently, ± σ11 , . . . , ± σ1k are ˆ± approximate eigenvalues of H, z j , j = 1, . . . , k, are the corresponding approximate eigenvectors. The following is the shift-and-invert version of wGKLu for solving LREP of H. Algorithm 4 (Shift-and-invert-wGKLu -LREP). 1. Run k steps of Algorithm 3 with an initial x1 satisfying ∥x1 ∥M −1 = 1 and an appropriate integer k to generate Bk , Xk , and Yk ; 2. Compute an SVD of Bk as in (3.6), select l(≤ k) largest singular value σj , and the associated left and[right singular vector ϕj and ψj , j = 1, · · · , l; ] Y ϕ k j ˆj = √12 , j = 1, · · · , l; 3. Form σ1j , z Xk ψ j 4. If βk = 0, break. ˆj ) of H−1 , but not H. Remark 2. Generally, (3.7) is hold for the approximate eigenpairs (σj , z While, we need to solve the approximate eigenpairs of H. Thus for fairness and accuracy, we don’t use (3.7) as the stopping criterion in actual algorithm, instead, we take normalized 1-norm of the residual. It will be elaborated in numerical examples.

4

Convergence analysis

5

Numerical examples and results

In this section, we test Algorithm 2 (wGKLu -LREP) and Algorithm 4 (Shift-and-invert-wGKLu LREP) with several numerical examples for solving the eigenvalue problem of H, where the initial vector are x1 /∥x1 ∥M and x1 /∥x1 ∥M −1 , respectively, here, x1 is randomly selected. The numerical results are labeled with Alg-3 and Alg-4 respectively. In fact, Alg-4 is Alg-3 added with the precondition strategy, it’s the accelerated version of Alg-3. For comparison we tested the first algorithm presented in [18] with the initial vector x1 /∥x1 ∥2 . The numerical results are labeled with Alg-TL. We also tested the block Chebyshev-Davidson method (BChevbyDLR) presented in [19], and the locally optimal block preconditioned 4-D CG method (LOBP4DCG) 6 1174

ZHONG ET AL 1169-1178

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

in [2]. The experiments have been carried out in double precision (Digits=64) floating point arithmetic in Matlab R2014a with a PC-Intel(R)Core(TM)i5-6200U CPU 2.4GHz, 8GB RAM. The same as in [19], for the LOBP4DCG method, we use the generic preconditioner ( ) 0 K −1 −1 Φ=H = . M −1 0 The preconditioned search vectors qi and pi in [2] are computed by using the linear CG method [5] with maximal 5 iterations. The initial block size in BChevbyDLR and LOBP4DCG are chosen to be l, the methods are denoted by BChevbyDLR(l), and LOBP4DCG(l), respectively. We only compute the approximate eigenvalues with positive sign. For illustrating the quality of computed approximations, we report the normalized residual 1-norms for the jth approximate ˆ+ eigenpair (σj , z j ): ˆ+ ∥Hˆ z+ j − σj z j ∥1 , r(σj ) := (∥H∥1 + σj )∥ˆ z+ j ∥1 ˆ+ if r(σj ) ≤ tol = 10−8 , the eigenpair (σj , z j ) is considered as converged. The “exact” eigenvalues λj are computed with MATLAB code eig. In this example, we tested the above algorithms with five problems. Table 1 lists the composed 5 problems. The matrices K and M of Test 1 come from the linear response analysis for Na2, which is generated by the turboTDDFT code in QUANTUM ESPRESSO-an electronic structure calculation code that implements density functional theory (DFT) using plane-waves as the basis set and pseudopotentials [6, 18]. The matrices K and M of the other test, are extracted from the University of Florida sparse matrix collection [4]. All K and M are symmetric positive definite. We compute the first 10 smallest approximate eigenvalues with positive sign. For block size l of BChebyDLR(l), we choose l as 5 and 10. For LOBP4DCG, we set 10 as the initial block size. The two algorithms are both applied with a deflation procedure. We report the total number of matrix-vetor products (denoted by “MV”), iteration number (denoted by “iter”), and CPU time in seconds. And we count the K −1 y or M −1 x in Alg.4 as one matrix-vector products. The numerical results are listed in Table 1 and 2. “–” denotes the algorithm didn’t converged in 1000 iterations. From Table 2, we can see, since Alg-3 and Alg-TL didn’t use any acceleration strategy, thus they can’t converge within 1000 iterations. Alg-4 converged faster than the other algorithms, because of the least number of matrix-vector products, and this phenomenon also happens in some other tests not reported here, where the matrices K and M have a relatively large condition number. However, we also observe that for some other problems not reported here, where most of the K and M are both well-conditioned, even though Alg-4 used the least number of matrixvector products, much lower than BChebyDLR and LOBP4DCG, it still converged slower than BChebyDLR and LOBP4DCG. There are three main reasons for this phenomenon. The first is that BChebyDLR and LOBP4DCG are both block type methods, while Alg-4 is not. Usually block type methods with relatively small block sizes are more competitive than non-block versions, especially when the desired eigenvalues have clusters or even multiples. The second reason is that we use Cholesky decomposition of K and M to solve K −1 y and M −1 x, while K and M are very sparse, their Cholesky factor may be a full lower triangular matrix, which will cost much time to solve. Thus in Alg-4, the CPU time used for one matrix-vector products must be more than the time 7 1175

ZHONG ET AL 1169-1178

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

used in BChebyDLR and LOBP4DCG. Consequently, it is necessary to consider a inverse free precondition strategy to accelerate Alg-3. The third reason is that BChebyDLR method refined the basis matrices at every step, which can make eigenvectors converge in fewer iterations [13, 17], since the refined basis matrices contains the information of the wanted eigenvectors. While in Alg-4, we don’t use any refined restart. Above all, Further reseach is required to make Alg-4 more effective. Table 1

Test problems

Problem

Test 1

Test 2

Test 3

Test 4

Test 5

n K M

1862 Na2 Na2

8032 bcsstk38 msc23052

9801 fv2 fv3

23052 bcsstk36 bcsstk36

73752 oilpan oilpan

Table 2

Test 1

Test 2

Test 3

Test 4

Test 5

MV iter CPU MV iter CPU MV iter CPU MV iter CPU MV iter CPU

Alg-4

BChebyshev(5)

BChebyshev(10)

LOBP4DCG(10)

Alg-3

Alg-TL

240 19 0.905 42 10 0.6080 42 10 0.5531 214 18 14.3342 42 10 45.4148

4680 18 3.3906 – – – 10920 42 1.5495 – – – – – –

6760 13 2.3696 – – – 24440 41 2.8754 – – – – – –

4592 47 8.7745 6824 40 3.5316 5114 50 2.2148 – – – – – –

– – – – – – – – – – – – – – –

– – – – – – – – – – – – – – –

Example 2: The number of matrix-vector products (MV), number of iterations (iter), and CPU time in seconds for computing 10 smallest positive eigenpairs. For BChebyDLR(l) the filter degree used is 25, and the block size is l = 5, 10. For LOBP4DCG(l) the initial block size l = 10. Here “–” stands for the algorithm does not converge within 1000 iterations.

6

Conclusion

We propose a shift-and-invert weighted Golub-Kahan-Lanczos bidiagonal algorithm for solving the linear response eigenproblem(LREP). This algorithm can effectively calculate the smallest positive eigenvalues and associated eigenvectors of LREP. Numerical examples show that our new algorithm can appears faster than Alg.TL, BChebyDLR and LOBP4DCG, especially for the case of K and M have a relatively large condition number. Acknowledgment. This work is supported by the Fundamental Research Funds for the Central Universities under grant JUSRP11719 and the National Science Foundation of China under grant 11471122 and 62402201. 8 1176

ZHONG ET AL 1169-1178

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

References [1] Z.-J. Bai, and R.C. Li, Minimization principles for the linear response eigenvalue problem I: Theory, SIAM J. Matrix Anal. Appl., 33:1075–1100, 2012. [2] Z.-J. Bai, and R.C. Li, Minimization principles for the linear response eigenvalue problem II: Computation, SIAM J. Matrix Anal. Appl., 34:392–416, 2013. [3] M. E. Casida, Time-dependent density-functional response theory for molecules, Recent Advances in Density Functional Methods, D. P. Chong, ed., World Scientific, Singapore, pp:155– 189, 1995. [4] T. Davis, and Y. Hu, The university of Florida sparse matrix collection, ACM Trans. Math. Software, 38:1–25, 2011. [5] J. W. Demmel, Applied numerical linear algebra, SIAM, Philadelphia, 1997. [6] P. Giannozzi, S. Baroni, N. Bonini, M. Calandra, R. Car, C. Cavazzoni, D. Ceresoli, G. L. Chiarotti, M. Cococcioni, I. Dabo, et al, QUANTUM ESPRESSO: a modular and opensource software project for quantum simulations of materials, J. Phys. Condens. Matter, 21(39):395502, 2009. [7] G. H. Golub, W. Kahan, Calculating the singular values and pseudo-inverse of a matrix. J. SIAM Ser. B Numer. Anal., 2:205224, 1965. [8] S. Liao and F. Fang, Stability analysis and optimal control of a cholera model with time delay, J. Comput. Anal. Appl., 22(6):1055-1073, 2017. [9] M. J. Lucero, A. M. N. Niklasson, S. Tretiak, M. Challacombe, Molecular-orbitalfree algorithm for excited states in time-dependent perturbation theory, J. Chem. Phys., 129(6):064114, 2008. [10] C. Mehl, V. Mehrmann, H.-G. Xu, On doubly structured matrices and pencils that arise in linear response theory, Linear Algebra Appl., 380:3–51, 2004. [11] G. Onida, L. Reining, A. Rubio, Electronic excitations: Density-functional versus manybody Green’s function approaches, Rev. Modern Phys., 74(2):601–659, 2002. [12] P. Papakonstantinou, Reduction of the RPA eigenvalue problem and a generalized Cholesky decomposition for real-symmetric matrices, Europhys. Lett., 78(1):12001, 2007. [13] B.N. Parlett, The Symmetric Eigenvalue Problem. SIAM, Philadelphia, 1998. [14] D. Rocca, Time-dependent density functional perturbation theory: new algorithms with applications to molecular spectra. Ph.D. Thesis, The International School for Advanced Studies, Trieste, Italy, 2007. [15] D. Rocca, D. Lu, G. Galli, Ab initio calculations of optical absorpation spectra: Solution of the Bethe-Salpeter equation within density matrix perturbation theory, J. Chem. Phys., 133:164109, 2010.

9 1177

ZHONG ET AL 1169-1178

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[16] Y. Saad, J. R. Chelikowsky, S. M. Shontz, Numerical methods for electronic structure calculations of materials, SIAM Rev., 52:3–54, 2010. [17] G. W. Stewart, Matrix algorithms, volume II: eigensystems. SIAM, Philadelphia, 2001. [18] Z.-M. Teng, R.-C. Li, Convergence analysis of Lanczos-type methods for the linear response eigenvalue problem, J. Comput. Appl. Math., 247:17–33, 2013. [19] Z.-M. Teng, Y.-k. Zhou, R.-C. Li, A block Chebyshev-Davidson method for linear response eigenvalue problems, Adv. Comput. Math., 42(5):1103–1128, 2016. [20] E. V. Tsiper, A classical mechanics technique for quantum linear response, J. Phys. B: At. Mol. Opt. Phys., 34(12):L401–L407, 2001. [21] H.-X. Zhong, H.-G. Xu, Weighted Golub-Kahan-Lanczos bidiagonalization algorithms available online from http://www.math.ku.edu/ xu/arch/archive.html.

10 1178

ZHONG ET AL 1169-1178

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Qualitative Study of Solution of Some Higher Order Di®erence Equations E. M. Elsayed1;2 , K. N. Alshabi1;3 and Faris Alzahrani1 1 Mathematics Department, Faculty of Science, King Abdulaziz University, P. O. Box 80203, Jeddah 21589, Saudi Arabia. 2 Department of Mathematics, Faculty of Science, Mansoura University, Mansoura 35516, Egypt. 3 Qassim University, Faculty of Science, Mathematics Department, Saudi Arabia. E-mails: [email protected], [email protected], [email protected]. ABSTRACT This paper is mindful with the solution of the nonlinear di¤erence equation xn+1 =

xn¡1 xn¡6 ; n = 0; 1; :::; xn¡4 (§1 § xn¡1 xn¡6 )

where the initial conditions x¡6 ; x¡5 ; x¡4 ; x¡3 ; x¡2 ; x¡1 ; x0 are arbitrary non zero real numbers and we study the behaviors of the solutions: Also, we gained the equilibrium points of the previous equations. Keywords: stability, periodicity, solution of di¤erence equation. Mathematics Subject Classi…cation: 39A10. ——————————————————————

1. INTRODUCTION In this paper we deal with the behavior of the solution of the following di¤erence equations xn+1 =

xn¡1 xn¡6 ; n = 0; 1; :::; xn¡4 (§1 § xn¡1 xn¡6 )

(1.1)

where the initial conditions x¡6 ; x¡5 ; x¡4 ; x¡3 ; x¡2 ; x¡1 ; x0 are arbitrary non zero real numbers: Here, we display some basic de…nitions and some theorems which will be bene…cial in our research. Let I be some interval of real numbers and let f : I k+1 ! I; be a continuously di¤erentiable function. Then for every set of initial conditions x¡k ; x¡k+1 ; :::; x0 2 I; the di¤erence equation xn+1 = f (xn ; xn¡1 ; :::; xn¡k ); n = 0; 1; :::;

(1.2)

has a unique solution fxn g1 n=¡k [39].

De…nition 1.1. (Equilibrium Point) A point x 2 I is called an equilibrium point of Eq.(1.2) if x = f (x; x; :::; x). That is, xn = x for n ¸ 0; is a solution of Eq.(1.2), or equivalently, x is a …xed point of f. De…nition 1.2. (Stability)

(i) The equilibrium point x of Eq.(1.2) is locally stable if for every ²> 0; there exists ± > 0 such that for all x¡k ; x¡k+1 ; :::; x¡1 ; x0 2 I with

1179

Elsayed ET AL 1179-1191

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

jx¡k ¡ xj + jx¡k+1 ¡ xj + ::: + jx0 ¡ xj < ±; we have jxn ¡ xj < ²

for all n ¸ ¡k:

(ii) The equilibrium point x of Eq.(1.2) is locally asymptotically stable if x is locally stable solution of Eq.(1.2) and there exists °> 0; such that for all x¡k ; x¡k+1 ; :::; x¡1 ; x0 2 I with jx¡k ¡ xj + jx¡k+1 ¡ xj + ::: + jx0 ¡ xj < °; we have lim xn = x:

n!1

(iii) The equilibrium point x of Eq.(1.2) is global attractor if for all x¡k ; x¡k+1 ; :::; x¡1 ; x0 2 I; we have lim xn = x:

n!1

(iv) The equilibrium point x of Eq.(1.2) is globally asymptotically stable if x is locally stable, and x is also a global attractor of Eq.(1.2). (v) The equilibrium point x of Eq.(1.2) is unstable if x is not locally stable. The linearized equation of Eq.(1.2) about the equilibrium x is the linear di¤erence equation yn+1 =

k X @f(x; x; :::; x) i=0

@xn¡i

yn¡i :

Theorem A [38]: Assume that p; q 2 R and k 2 f0; 1; 2; :::g. Then jpj + jqj < 1; is a su¢cient condition for the asymptotic stability of the di¤erence equation xn+1 + pxn + qxn¡k = 0; n = 0; 1; ::: : Remark: Theorem A can be easily extended to a general linear equations of the form xn+k + p1 xn+k¡1 + ::: + pk xn = 0; n = 0; 1; :::;

(1.3)

where p1 ; p2 ; :::; pk 2 R and k 2 f1; 2; :::g: Then Eq.(1.3) is asymptotically stable provided that k X i=1

jpi j < 1:

De…nition 1.3. (Periodicity) A sequence fxn g1 n=¡k is said to be periodic with period p if xn+p = xn for all n ¸ ¡k:

In recent years, the study of di¤erence equations has acquired a new signi…cance, due in large part to their use in the formulation and analysis of discrete-time systems and the study of deterministic chaos. However, there have not been any e¤ective general methods to deal with the global behavior of rational di¤erence equations of order greater than one so far. From the known work, one can see that it is so complicated to understand thoroughly the global behaviors of solutions of rational di¤erence equations although they have simple forms (or expressions). One can refer to [1], [5–14] for examples to illustrate this. Therefore, the study of rational di¤erence equations of order greater than one is worth further consideration. The behavior of solutions di¤erential equations has been studied by many researchers for example:

1180

Elsayed ET AL 1179-1191

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

El-Metwally and Elsayed [9] has obtained the solutions of the di¤erence equation xn+1 =

xn xn¡3 : xn¡2 (§1 § xn xn¡3 )

Elsayed [13] studied the behavior of the solutions of the di¤erence equation xn+1 =

xn¡7 : §1 § ®xn¡1 xn¡3 xn¡5 xn¡7

Cinar [2]-[3] has got the solutions of the following di¤erence equation xn¡1 : §1 + axn xn¡1

xn+1 =

In [4], Cinar and Yalcinkaya studied the behavior of the following di¤erence equation xn¡3 : 1 + xn¡1

xn+1 =

Elabbasy et al. [6] investigated the global stability, boundedness, periodicity character and gave the solution of some special cases of the di¤erence equation xn+1 =

®xn¡k : Q ¯+ ° ki=0 xn¡i

In [29] Erdogan and Uslu investigated the global behavior of the following recursive sequence 1 ¡ xn : k P A + xn¡i

xn+1 =

i=1

Karatas et al. [35] gave that the solution of the di¤erence equation xn+1 =

xn¡5 : 1 + xn¡2 xn¡5

See also [15]-[37]. Other related results on rational di¤erence equations can be found in refs. [40]–[51].

2. ON THE EQUATION XN +1 = XN ¡1 XN¡6 =(XN ¡4 (1 + XN¡1 XN ¡6 )) In this section we realize a form of the solutions of the equation xn+1 =

xn¡1 xn¡6 ; n = 0; 1; :::; xn¡4 (1 + xn¡1 xn¡6 )

(2.1)

where the initial values are arbitrary positive real numbers. Theorem 2.1. Let fxn g1 n=¡6 be a solution of Eq.(2.1). Then for n = 0; 1; 2; ::: an f n ( x10n¡6

= bn gn¡1 (

n Q

bn gn (

[(5i)bg + 1])

i=1 n Q

;

x10n¡5 =

[(5i ¡ 3)af + 1])

n¡1 Q

an f n e( x10n¡4

=

i=0 n¡1 Q

bn g n (

x10n¡3 =

[(5i + 1)af + 1])

i=0 n¡1 Q

an f n (

[(5i + 3)af + 1])

[(5i + 3)bg + 1])

n¡1 Q

bn gn d(

i=0

;

i=0

[(5i + 1)bg + 1]) ;

[(5i)af + 1])

i=0 n¡1 Q

an f n¡1 (

i=1

n¡1 Q

;

[(5i + 4)bg + 1])

i=0

1181

Elsayed ET AL 1179-1191

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

x10n¡2

=

x10n

=

x10n+2

=

µn ¶ Q [(5i ¡ 3)bg + 1] an f n c i=1 ¶; µn¡1 Q bn gn [(5i + 4)af + 1] i=0 ¶ µ n¡1 an+1 f n ¦ [(5i + 3)bg + 1] i=1 ¶ µ ; n n n b g ¦ [(5i)af + 1] i=1 ¶ µ n¡1 n+1 n+1 f ¦ [(5i + 4)bg + 1] a i=0 µ ¶ ; n n n b g d ¦ [(5i + 1)af + 1] i=0

¶ [(5i ¡ 3)af + 1] i=1 ¶ ; µ x10n¡1 = n Q n n a f [(5i)bg + 1] i=1 ¶ µ n¡1 bn+1 g n+1 ¦ [(5i + 3)af + 1] i=0 µ ¶ ; x10n+1 = n n n a f e ¦ [(5i + 1)bg + 1] i=0 ¶ µ n¡1 n+1 n+1 g ¦ [(5i + 4)af + 1] b i=0 µ ¶ ; x10n+3 = n n n a f c ¦ [(5i + 2)bg + 1] gn bn+1

µ

n Q

i=0

where x¡6 = g; x¡5 = f; x¡4 = e; x¡3 = d; x¡2 = c; x¡1 = b; x0 = a: Proof: For n = 0 the result holds. Now suppose that n > 0 and that our assumption holds for n ¡ 1. That is; ¶ µn¡2 f ¦ [(5i)bg + 1] a i=1 ¶; µ n¡1 bn¡1 gn¡2 ¦ [(5i ¡ 3)af + 1] i=1 µ ¶ n¡2 an¡1 f n¡1 e ¦ [(5i + 1)bg + 1] i=0 ¶; µ n¡2 n¡1 n¡1 b f ¦ [(5i + 3)af + 1] i=0 µ ¶ n¡1 n¡1 n¡1 f c ¦ [(5i ¡ 3)bg + 1] a i=1 ¶; µ n¡2 bn¡1 gn¡1 ¦ [(5i + 4)af + 1] n¡1 n¡1

x10n¡16

=

x10n¡14

=

x10n¡12

=

i=0

¶ µn¡2 g ¦ [(5i)af + 1] b i=1 ¶; µ x10n¡15 = n¡2 an¡1 f n¡2 ¦ [(5i + 3)bg + 1] i=0 µ ¶ n¡2 bn¡1 gn¡1 d ¦ [(5i + 1)af + 1] i=0 ¶; µ x10n¡13 = n¡2 n¡1 n¡1 a f ¦ [(5i + 4)bg + 1] i=0 ¶ µn¡1 n n¡1 ¦ [(5i ¡ 3)af + 1] b g i=1 ¶ ; µ x10n¡11 = n¡1 an¡1 f n¡1 ¦ [(5i)bg + 1] n¡1 n¡1

i=1

¶ ¶ µn¡2 µn¡2 n n ¦ [(5i + 3)bg + 1] ¦ [(5i + 3)af + 1] a f b g i=0 i=0 ¶ ; x10n¡9 = µ ¶; µ n¡1 n¡1 bn¡1 gn¡1 ¦ [(5i)af + 1] an¡1 f n¡1 e ¦ [(5i + 1)bg + 1] i=1 i=0 ¶ ¶ µ µ n¡2 n¡2 an f n bn g n ¦ [(5i + 4)bg + 1] ¦ [(5i + 4)af + 1] i=0 i=0 µ ¶ ; x10n¡7 = µ ¶: n¡1 n¡1 bn¡1 gn¡1 d ¦ [(5i + 1)af + 1] an¡1 f n¡1 c ¦ [(5i + 2)bg + 1] n n¡1

x10n¡10

=

x10n¡8

=

i=0

i=0

Now, it follows from Eq.(2.1) that x10n¡8 x10n¡13 x10n¡6 = x10n¡11 (1 + x10n¡8 x10n¡13 ) 0 µn¡2

µn¡2 ¶1 bn¡1 g n¡1 d ¦ [(5i+1)af +1] i=0 @ ¶A @ ¶A µn¡2 bn¡1 g n¡1 d ¦ [(5i+1)af+1] an¡1 f n¡1 ¦ [(5i+4)bg+1] i=0 i=0 ¶ 10 ¶ µn¡2 ¶1 µn¡1 µn¡2 n n¡1 n n b g ¦ [(5i¡3)af+1] a f ¦ [(5i+4)bg+1] bn¡1 g n¡1 d ¦ [(5i+1)af+1] i=1 i=0 i=0 ¶ A @1 + µ ¶ ¶A µ µ n¡1 n¡1 n¡2 an¡1 f n¡1 ¦ [(5i)bg+1] bn¡1 g n¡1 d ¦ [(5i+1)af +1] an¡1 f n¡1 ¦ [(5i+4)bg+1] an f n

=

0 @

¶ ¦ [(5i+4)bg+1]

i=0 µn¡1

i=1

1 0

i=0

1182

i=0

Elsayed ET AL 1179-1191

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

0 =

µ

=

µ

µn¡2 ¶1 af ¦ [(5i+1)af +1] i=0 @ µn¡1 ¶ A ¦ [(5i+1)af+1] i=0

bn g n¡1

µ

i=1

0

¶¶ @1 + ¦ [(5i ¡ 3)af + 1]

n¡1 i=1

0

µn¡2 ¶1 af ¦ [(5i+1)af +1] i=0 @ µn¡1 ¶ A ¦ [(5i+1)af+1]

bn g n¡1

µ

i=0

i=1

= bn gn¡1 0

¶ µn¡2 ¶1 µn¡1 ¦ [(5i+1)af+1] +af ¦ [(5i+1)af+1] i=0 i=0 A ¶ µn¡1 ¦ [(5i+1)af +1]

n¡2

i=1

¶µ

i=0

¶ ¦ [(5i + 1)af + 1] ¦ [(5i)bg + 1] i=0 i=1 ¶µ ¶ µ n¡1 n¡2 ¦ [(5i ¡ 3)af + 1] ¦ [(5i + 1)af + 1] ([5(n ¡ 1) + 1] af + 1 + af ) n¡1

i=0

i=0

µ

n¡1

a

f

n¡1

0 ¶¶ µ µ n¡1 @1 + ¦ [(5i ¡ 3)af + 1] bn gn¡1 i=1

µ

n¡1

¦ [(5i)bg + 1]

i=1

¶¶

µn¡2 ¶1 af ¦ [(5i+1)af +1] i=0 ¶ A µ n¡1 ¦ [(5i+1)af +1] i=0

¶ ¶ µ n¡1 n n n n a f a f ¦ [(5i)bg + 1] ¦ [(5i)bg + 1] i=1 i=1 ¶ ¶: µ µ = n¡1 n n n¡1 ¦ [(5i ¡ 3)af + 1] ((5n ¡ 3)af + 1 ) b g ¦ [(5i ¡ 3)af + 1] µ

n¡1

bn gn¡1

i=0

i=1

0

µ

µn¡2 ¶1 af ¦ [(5i+1)af+1] i=0 @ µn¡1 ¶ A ¦ [(5i+1)af+1]

=

µn¡2 ¶1 af ¦ [(5i+1)af+1] i=0 ¶ A µn¡1 ¦ [(5i+1)af+1]

µ ¶¶ µ n¡1 an¡1 f n¡1 ¦ [(5i)bg + 1]

¶¶ @ ¦ [(5i ¡ 3)af + 1]

n¡1

an f n

=

µ ¶¶ µn¡1 n¡1 n¡1 a f ¦ [(5i)bg + 1]

i=1

i=1

Similarly x10n¡5

=

=

x10¡7 x10n¡12 x10n¡10 (1 + x10¡7 x10n¡12 ) 0 µn¡2 ¶ @

an¡1

0 @

=

=

10 µn¡1 ¶1 ¦ [(5i+4)af +1] an¡1 f n¡1 c ¦ [(5i¡3)bg+1] i=0 i=1 µn¡2 µn¡1 ¶ A@ ¶A f n¡1 c ¦ [(5i+2)bg+1] bn¡1 g n¡1 ¦ [(5i+4)af+1]

bn g n

i=0

µn¡2 ¶ 1 an f n¡1 ¦ [(5i+3)bg+1] i=0 ¶ A (1 µn¡1 bn¡1 g n¡1 ¦ [(5i)af+1]

i=0

+

i=0

µn¡1 ¶ bg ¦ [(5i¡3)bg+1] i=1 ¶ ) µ n ¦ [(5i¡3)bg+1] i=1

¶ ¦ [(5i)af + 1] i=0 ¶ µ = n¡1 n n¡1 i=0 a f ¦ [(5i ¡ 2)bg + 1] ((5n ¡ 2)bg + 1) i=1 ¶ ¶ µ µ n¡1 n¡1 n n n n b g b g ¦ [(5i)af + 1] ¦ [(5i)af + 1] i=0 i=0 ¶ = ¶ : µ µ n n¡1 an f n¡1 ¦ [(5i ¡ 2)bg + 1] an f n¡1 ¦ [(5i + 3)bg + 1] ¶ n¡1 bn g n ¦ [(5i)af+1] i=0 µn¡2 ¶ n n¡1 a f ¦ [(5i+3)bg+1] ((5n¡2)bg+1) µ

i=1

bn g n

µ

n¡1

i=0

The other relations can be proved similarly. Hence, the proof is completed.

1183

Elsayed ET AL 1179-1191

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Theorem 2.2. Eq.(2.1) has a unique equilibrium point which is the number zero and this equilibrium point is not locally asymptotically stable. Proof: For the equilibrium points on Eq.(2.1), we can say x2 ; x(1 + x2 ) then, we get x4 = 0: Therefore, the equilibrium point of Eq.(2.1) is x = 0. Let f : (0; 1)3 ¡! (0; 1) be a uw : We see that function de…ned by f(u; v; w) = v(1+uw) x=

fu (u; v; w) =

w ; v(1 + uw)2

fv (u; v; w) = ¡

uw u ; fw (u; v; w) = : v2 (1 + uw) v(1 + uw)2

Consequently, fu (¹ x; x¹; x ¹) = 1; fv (¹ x; x¹; x¹) = 1; fw (u; v; w) = 1: The proof follows by using Theorem A.

Numerical Examples: For con…rming the results of this section, we consider numerical examples which represent di¤erent type of solutions to Eq. (2.1). Example 2.3. We take x¡6 = ¡7; x¡5 = 1:5; x¡4 = ¡3; x¡3 = 2; x¡2 = 12; x¡1 = 2=7; x0 = 9: (See …gure 1). Example 2.4. See …gure 2, since x¡6 = 2:1; x¡5 = 4; x¡4 = 3; x¡3 = :8; x¡2 = 1:2; x¡1 = 7; x0 = 4: plot of x(n+1)=x(n-1)x(n-6)/(x(n-4)(1+x(n-1)x(n-6)) 15 10

x(n)

5 0 -5 -10

0

10

20

30

40

50

60

70

80

90

70

80

90

n

Figure 1. plot of x(n+1)=x(n-1)x(n-6)/(x(n-4)(1+x(n-1)x(n-6)) 8

x(n)

6

4

2

0

0

10

20

30

40

50

60

n

Figure 2.

1184

Elsayed ET AL 1179-1191

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

3. ON THE EQUATION XN +1 = XN ¡1 XN¡6 =(XN ¡4 (1 ¡ XN¡1 XN ¡6 ))

In this section we obtain a speci…c form of the solution of the second equation in the following form : xn+1 =

xn¡1 xn¡6 ; n = 0; 1; :::; xn¡4 (1 ¡ xn¡1 xn¡6 )

(3.1)

where the initial values are arbitrary nonzero real numbers with x¡1 x¡6 6= 1.

Theorem 3.1. Let fxn g1 n=¡6 be a solution of Eq.(3.1). Then for n = 0; 1; 2; ::: n¡1

x10n¡6

n¡1

an f n (1 ¡ ¦ (5i)bg) i=1 n

=

;

bn gn (1 ¡ ¦ (5i)af )

x10n¡5 =

bn gn¡1 (1 ¡ ¦ (5i ¡ 3)af)

an

i=1

n¡1

x10n¡4

an f n e (1 ¡ ¦ (5i + 1)bg)

=

bn

x10n¡2

=

x10n

=

x10n+2

=

i=0 n¡1

gn

f n¡1 (

i=1 n¡1

;

1 ¡ ¦ (5i + 3)bg) i=0

n¡1

;

x10n¡3 =

bn gn d (1 ¡ ¦ (5i + 1)af ) i=1 n¡1

; ¡ ¦ (5i + 4)bg) i=0 ¶ µ n n n+1 1 ¡ ¦ (5i ¡ 3)af g b i=1 ¶ ; µ x10n¡1 = n an f n 1 ¡ ¦ (5i)bg i=1 ¶ µ n¡1 bn+1 gn+1 [1 ¡ ¦ (5i + 3)]af i=0 µ ¶ ; x10n+1 = n n n a f e [1 ¡ ¦ (5i + 1)]bg i=0 ¶ µ n¡1 n+1 n+1 g [1 ¡ ¦ [(5i + 4)]af b i=0 µ ¶ : x10n+3 = n an f n c [1 ¡ ¦ [(5i + 2)]bg an f n (1

(1 ¡ ¦ (5i + 3)af ) i=0 µ ¶ n n n a f c 1 ¡ ¦ (5i ¡ 3)bg i=1 ¶; µ n¡1 bn gn 1 ¡ ¦ (5i + 4)af i=0 ¶ µ n¡1 an+1 f n 1 ¡ ¦ (5i + 3)bg i=1 ¶ ; µ n n n b g 1 ¡ ¦ (5i)af i=1 ¶ µ n¡1 n+1 n+1 f [1 ¡ ¦ [(5i + 4)]bg a i=0 µ ¶ ; n bn gn d [1 ¡ ¦ [(5i + 1)]af i=0

i=0

Proof: The proof as in the previous section so it will be left to the readers. Theorem 3.2. Eq. (3.1) has a unique equilibrium point which is the number zero and this equilibrium point is not locally asymptotically stable. Example 3.3. We put x¡6 = 1:7; x¡5 = 8; x¡4 = 3; x¡3 = 9:8; x¡2 = 1:2; x¡1 = 7:2; x0 = 3:5: (See …gure 3). Example 3.4. See …gure 4, since x¡6 = 7; x¡5 = ¡2; x¡4 = 3; x¡3 = 2:5; x¡2 = 12; x¡1 = 5; x0 = ¡7: plot of x(n+1)=x(n-1)x(n-6)/(x(n-4)(1-x(n-1)x(n-6)) 10 8

x(n)

6 4 2 0 -2

0

10

20

30

40

50

60

70

80

90

n

Figure 3.

1185

Elsayed ET AL 1179-1191

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

plot of x(n+1)=x(n-1)x(n-6)/(x(n-4)(1-x(n-1)x(n-6)) 15

x(n)

10 5 0 -5 -10

0

10

20

30

40

50

60

70

80

90

n

Figure 4.

4. ON THE EQUATION XN+1 = XN¡1 XN¡6 =(XN¡4 (¡1 + XN ¡1 XN¡6 )) In this section we realize a form of the solutions of the equation xn+1 =

xn¡1 xn¡6 ; n = 0; 1; :::; xn¡4 (¡1 + xn¡1 xn¡6 )

(4.1)

where the initial values are arbitrary positive real numbers with x¡1 x¡6 6= 1.

Theorem 4.1. Let fxn g1 n=¡6 be a solution of Eq.(4.1). Then for n = 0; 1; 2; ::: x20n¡9

=

x20n¡6

=

x20n¡3

=

x20n

=

x20n+3

=

x20n+6

=

x20n+9

=

g2n b2n (af ¡ 1)n a2n f 2n (bg ¡ 1)n¡1 g 2n b2n (af ¡ 1)n¡1 ; x = ; x = ; 20n¡8 20n¡7 a2n¡1 f 2n¡1 e(bg ¡ 1)n b2n¡1 g 2n¡1 d(af ¡ 1)n a2n¡1 f 2n¡1 c(bg ¡ 1)n a2n f 2n (bg ¡ 1)n g2n b2n (af ¡ 1)n a2n f 2n e(bg ¡ 1)n ; x = ; x = ; 20n¡5 20n¡4 b2n g2n¡1 (af ¡ 1)n a2n f 2n¡1 (bg ¡ 1)n b2n g2n (af ¡ 1)n g2n b2n d(af ¡ 1)n a2n f 2n c(bg ¡ 1)n g2n b2n+1 (af ¡ 1)n ; x = ; x = ; 20n¡2 20n¡1 a2n f 2n (bg ¡ 1)n b2n g2n (af ¡ 1)n a2n f 2n (bg ¡ 1)n a2n+1 f 2n (bg ¡ 1)n g2n+1 b2n+1 (af ¡ 1)n a2n+1 f 2n+1 (bg ¡ 1)n ; x = ; x = ; 20n+1 20n+2 b2n g2n (af ¡ 1)n a2n f 2n e(bg ¡ 1)n+1 b2n g2n d (af ¡ 1)n+1 g2n+1 b2n+1 (af ¡ 1)n a2n+1 f 2n+1 (bg ¡ 1)n g2n+1 b2n+1 (af ¡ 1)n ; x = ; x = ; 20n+4 20n+5 a2n f 2n c(bg ¡ 1)n b2n+1 g2n (af ¡ 1)n a2n+1 f 2n (bg ¡ 1)n+1 a2n+1 f 2n+1 e(bg ¡ 1)n+1 g 2n+1 b2n+1 d (af ¡ 1)n+1 a2n+1 f 2n+1 c(bg ¡ 1)n ; x = ; x = ; 20n+7 20n+8 b2n+1 g 2n+1 (af ¡ 1)n+1 a2n+1 f 2n+1 (bg ¡ 1)n b2n+1 g2n+1 (af ¡ 1)n g2n+1 b2n+2 (af ¡ 1)n a2n+2 f 2n+1 (bg ¡ 1)n+1 ; x = : 20n+10 a2n+1 f 2n+1 (bg ¡ 1)n+1 b2n+1 g2n+1 (af ¡ 1)n+1

Proof: For n = 0 the result holds. Now suppose that n > 0 and that our assumption holds for n ¡ 1. That is; x20n¡17

=

x20n¡14

=

x20n¡11

=

g 2n¡1 b2n¡1 (af ¡ 1)n¡1 a2n¡1 f 2n¡1 (bg ¡ 1)n¡1 g 2n¡1 b2n¡1 (af ¡ 1)n¡1 ; x = ; x = ; 20n¡16 20n¡15 a2n¡2 f 2n¡2 c(bg ¡ 1)n¡1 b2n¡1 g2n¡2 (af ¡ 1)n¡1 a2n¡1 f 2n¡2 (bg ¡ 1)n a2n¡1 f 2n¡1 e(bg ¡ 1)n g2n¡1 b2n¡1 d(af ¡ 1)n a2n¡1 f 2n¡1 c(bg ¡ 1)n¡1 ; x = ; x = ; 20n¡13 20n¡12 b2n¡1 g 2n¡1 (af ¡ 1)n a2n¡1 f 2n¡1 (bg ¡ 1)n¡1 b2n¡1 g2n¡1 (af ¡ 1)n¡1 g 2n¡1 b2n (af ¡ 1)n¡1 a2n f 2n¡1 (bg ¡ 1)n ; x = : 20n¡10 a2n¡1 f 2n¡1 (bg ¡ 1)n b2n¡1 g2n¡1 (af ¡ 1)n

Now, it follows from Eq. (4.1), we get: x20n¡9 =

x20n¡11 x20n¡16 x20n¡14 (¡1 + x20n¡11 x20n¡16 )

1186

Elsayed ET AL 1179-1191

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

=

= Also, we obtain x20n¡8

=

=

³

³

³

g 2n¡1 b2n (af ¡1)n¡1 a2n¡1 f 2n¡1 (bg¡1)n

a2n¡1 f 2n¡1 e (bg¡1)n b2n¡1 g 2n¡1 (af¡1)n g 2n¡1 b2n (af ¡1)n¡1 a2n¡1 f 2n¡1 (bg¡1)n

³

a2n¡1 f b2n¡1 g

´

(¡1 + ´ ³ 2n a

2n¡1 e

(bg¡1)n

2n¡1

(af¡1)n

´

x20n¡10 x20n¡15 = x20n¡13 (¡1 + x20n¡10 x20n¡15 ) ³ ´ af a2n¡1 f 2n¡1 (bg ¡ 1)n¡1 af ¡1 g2n¡1 b2n¡1 d (af ¡ 1)n (¡1 +

f

b2n¡1

³

a2n¡1 f 2n¡1 (bg¡1)n¡1 b2n¡1 g 2n¡2 (af¡1)n¡1

g 2n¡1 b2n (af¡1)n¡1 a2n¡1 f 2n¡1 (bg¡1)n

2n¡1

g

´³

(bg¡1)n (af ¡1)n

2n¡1

(¡1 +

bg ) (bg¡1)

´

=

´³

´

a2n¡1 f 2n¡1 (bg¡1)n¡1 b2n¡1 g 2n¡2 (af ¡1)n¡1

b2n g

2n

(af ¡ 1)n : (bg ¡ 1)n

´ )

a2n¡1 f 2n¡1 e

µ

¶µ



a2n f 2n¡1 (bg¡1)n g2n¡1 b 2n¡1 (af ¡1)n¡1 b2n¡1 g 2n¡1 (af ¡1)n a2n¡1 f 2n¡2 (bg¡1) n ³ 2n¡1 2n¡1 ´ ³ ³ ´ ³ 2n¡1 2n¡1 g b d(af ¡1)n a2n f 2n¡1 (bg¡1)n g b (af ¡1)n¡1 ¡1+ 2n¡1 2n¡1 a2n¡1 f 2n¡1 (bg¡1)n¡1 b g (af ¡1) n a2n¡1 f 2n¡2 c(bg¡1)n

af af¡1 )

=

´´

a2n f 2n (bg ¡ 1)n¡1 : g2n¡1 b2n¡1 d (af ¡ 1)n

Thus, the proof of the other relations is similar. Theorem 4.2. Eq.(4.1) has a periodic solution of period ten i¤ af = bg = 2 and will be taken the form f 2e ; d2 ; 2c ; g; f; e; d; c; b; a; 2e ; d2 ; :::g:

Proof: First suppose that there exists a prime period twenty solution

2 2 2 2 2 ; ; ; g; f; e; d; c; b; a; ; ; :::; e d c e d of Eq.(4.1), we see from the form of the solution of Eq.(4.1) that g2n b2n (af ¡ 1)n ¡ 1)n a2n f 2n (bg ¡ 1)n 2n b g2n¡1 (af ¡ 1)n

a2n¡1 f 2n¡1 e(bg

2 2 2 a2n f 2n (bg ¡ 1)n¡1 g2n b2n (af ¡ 1)n¡1 = ; 2n¡1 2n¡1 = ; ; 2n¡1 2n¡1 n e b g d(af ¡ 1) d a f c(bg ¡ 1)n c 2n+2 2n+1 n+1 a f (bg ¡ 1) = g ; ::: ; 2n+1 2n+1 = a: b g (af ¡ 1)n+1 =

Then af = bg = 2: Second assume that af = bg = 2: Then we see from the form of the solution of Eq.(4.1) that

x20n¡9 x20n¡2

2 2 2 ; x20n¡8 = ; x20n¡7 = ; x20n¡6 = g; x20n¡5 = f; x20n¡4 = e; x20n¡3 = d; e d c 2 2 = c; x20n¡1 = b; x20n = a; x20n+1 = ; x20n+2 = ; :::; x20n+9 = b; x20n+10 = a: e d =

Thus we have a periodic solution of period ten and the proof is complete. Theorem 4.3. Eq.(4.1) has a periodic solution of period twenty i¤ af = bg = ¡2 and will be taken the form f ¡2 2 2 2 ¡2 b ¡2 ¡2 f ¡2 e ; d ; 3c ; g; f; e; d; c; b; a; 3e ; 3d ; c ; g; ¡3 ; e; ¡3d; c; ¡3 ; a; e ; d :::g: Proof: The proof as the proof of the previous theorem and so it will be omitted. p Theorem 4.4. Eq. (4.1) has three equilibrium points which are 0, § 2 and there equilibrium points are not locally asymptotically stable.

Example 4.5. See Figure 5 if we put x¡6 = 5; x¡5 = ¡:4; x¡4 = ¡3; x¡3 = 4:6; x¡2 = ¡6; x¡1 = ¡2=5; x0 = 5: (See …gure 5). Example 4.6. Figure 6 shows the solutions where x¡6 = 2:1; x¡5 = :4; x¡4 = ¡3; x¡3 = 4:6; x¡2 = 1:2; x¡1 = :6; x0 = 9:

1187

Elsayed ET AL 1179-1191

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

plot of x(n+1)=x(n-1)x(n-6)/(x(n-4)(-1+x(n-1)x(n-6)) 5

x(n)

0

-5

-10

-15

0

10

20

30

40

50

60

70

n

Figure 5. plot of x(n+1)=x(n-1)x(n-6)/(x(n-4)(-1+x(n-1)x(n-6)) 30 20

x(n)

10 0 -10 -20

0

20

40

60

80

100 n

120

140

160

180

200

Figure 6. The proof of the theorems in the following section as in this section so it will be left to the readers.

5. ON THE EQUATION XN+1 = XN¡1 XN¡6 =(XN¡4 (¡1 ¡ XN ¡1 XN¡6 ))

In this section we realize a form of the solutions of the equation xn+1 =

xn¡1 xn¡6 ; n = 0; 1; :::; xn¡4 (¡1 ¡ xn¡1 xn¡6 )

(5.1)

where the initial values are arbitrary positive real numbers. Theorem 5.1. Let fxn g1 n=¡6 be a solution of Eq.(5.1). Then for n = 0; 1; 2; ::: x20n¡9

=

x20n¡6

=

x20n¡3

=

x20n

=

x20n+3

=

x20n+6

=

g2n b2n (¡1 ¡ af )n a2n f 2n (¡1 ¡ bg)n¡1 g 2n b2n (¡1 ¡ af)n¡1 ; x = ; x = ; 20n¡8 20n¡7 a2n¡1 f 2n¡1 e(¡1 ¡ bg)n b2n¡1 g2n¡1 d(¡af ¡ 1)n a2n¡1 f 2n¡1 c(¡1 ¡ bg)n a2n f 2n (¡1 ¡ bg)n g2n b2n (¡1 ¡ af )n a2n f 2n e(¡1 ¡ bg)n ; x = ; x = ; 20n¡5 20n¡4 b2n g 2n¡1 (¡1 ¡ af )n a2n f 2n¡1 (¡1 ¡ bg)n b2n g 2n (¡1 ¡ af )n g 2n b2n d (¡1 ¡ af )n a2n f 2n c(¡1 ¡ bg)n g2n b2n+1 (¡1 ¡ af )n ; x = ; x = ; 20n¡2 20n¡1 a2n f 2n (¡1 ¡ bg)n b2n g 2n (¡1 ¡ af )n a2n f 2n (¡1 ¡ bg)n a2n+1 f 2n (¡1 ¡ bg)n g2n+1 b2n+1 (¡af ¡ 1)n a2n+1 f 2n+1 (¡bg ¡ 1)n ; x = ; x = ; 20n+1 20n+2 b2n g 2n (¡1 ¡ af )n a2n f 2n e(¡bg ¡ 1)n+1 b2n g 2n d (¡af ¡ 1)n+1 g2n+1 b2n+1 (¡1 ¡ af )n a2n+1 f 2n+1 (¡1 ¡ bg)n g2n+1 b2n+1 (¡1 ¡ af )n ; x = ; x = ; 20n+4 20n+5 a2n f 2n c(¡1 ¡ bg)n b2n+1 g 2n (¡1 ¡ af )n a2n+1 f 2n (¡1 ¡ bg)n+1 a2n+1 f 2n+1 e(¡1 ¡ bg)n+1 g2n+1 b2n+1 d(¡1 ¡ af )n+1 a2n+1 f 2n+1 c(¡1 ¡ bg)n ; x = ; x = ; 20n+7 20n+8 b2n+1 g 2n+1 (¡1 ¡ af)n+1 a2n+1 f 2n+1 (¡1 ¡ bg)n b2n+1 g 2n+1 (¡1 ¡ af )n

1188

Elsayed ET AL 1179-1191

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

x20n+9 =

g2n+1 b2n+2 (¡1 ¡ af )n ; f 2n+1 (¡1 ¡ bg)n+1

a2n+1

x20n+10 =

a2n+2 f 2n+1 (¡1 ¡ bg)n+1 : b2n+1 g 2n+1 (¡1 ¡ af )n+1

Theorem 5.2. Eq.(5.1) has a periodic solution of period ten i¤ af = bg = ¡2 and will be taken the form ¡2 ¡2 ¡2 ¡2 f ¡2 e ; d ; c ; g; f; e; d; c; b; a; e ; d ; :::g:

Theorem 5.3. Eq.(5.1) has a periodic solution of period twenty i¤ af = bg = 2 and will be taken the form f 2 ¡2 2 b 2 2 f 2e ; d2 ; ¡3c ; g; f; e; d; c; b; a; ¡2 3e ; 3d ; c ; g; ¡3 ; e; ¡3d; c; ¡3 ; a; e ; d :::g: Theorem 5.4. Eq. (5.1) has a unique equilibrium point which is the number zero, and this equilibrium point is not locally asymptotically stable.

Example 5.5. We take x¡6 = 3; x¡5 = 7:4; x¡4 = ¡2:3; x¡3 = ¡13; x¡2 = 6; x¡1 = ¡2; x0 = 2: (See …gure 7). plot of x(n+1)=x(n-1)x(n-6)/(x(n-4)(-1-x(n-1)x(n-6)) 200

x(n)

100 0 -100 -200 -300

0

10

20

30

40

50 n

60

70

80

90

100

Figure 7.

Acknowledgements This article was funded by the Deanship of Scienti…c Research (DSR), King Abdulaziz University, Jeddah. The authors, therefore, acknowledge with thanks DSR technical and …nancial support.

REFERENCES ®+¯xn +°xn¡1 1. A. M. Ahmed, and N. A. Eshtewy, Basin of attraction of the recursive sequence xn+1 = A+Bx ; n +Cxn¡1 Journal of Fractional Calculus and Applications, 5 (3S) (10) (2014), 1-8. xn¡1 ; Appl. Math. Comp., 2. C. Cinar, On the positive solutions of the di¤erence equation xn+1 = 1 + axn xn¡1 158 (3) (2004), 809-812. xn¡1 ; Appl. Math. Comp., 3. C. Cinar, On the positive solutions of the di¤erence equation xn+1 = ¡1 + axn xn¡1 158 (3) (2004), 793-797. xn¡3 ; Int. J. Contemp.Math.Sci, Volume 4. C.Cinar, I.Yalcinkaya , On the recursive sequence xn+1 = 1 + xn¡1 1(10)(2006),475–480. 5. Q. Din, Qualitative nature of a discrete predator-prey system, Contemporary Methods in Mathematical Physics and Gravitation, 1 (1) (2015), 27-42. ®xn¡k ; 6. E. M. Elabbasy, H. El-Metwally and E. M. Elsayed, On the di¤erence equations xn+1 = Qk ¯+ ° i=0 xn¡i J. Conc. Appl. Math., 5 (2) (2007), 101-113.

1189

Elsayed ET AL 1179-1191

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

7. E. M. Elabbasy, A. A. Elsadany, and S. Ibrahim, Qualitative behavior of rational di¤erence equations of higher order, Malaya J. Mat., 3 (4) (2015), 530–539. 8. M. M. El-Dessoky, and E. M. Elsayed, On the solutions and periodic nature of some systems of rational di¤erence equations, Journal of Computational Analysis and Applications, 18 (2) (2015), 206-218. 9. H. El-Metwally and E. M. Elsayed, Qualitative Study of Solutions of some Di¤erence Equations, Abstract and Applied Analysis, Volume 2012, Article ID 248291, 16 pages, doi:10.1155/2012/248291. 10. H. El-Metwally and E. M. Elsayed, Qualitative Behavior of some Rational Di¤erence Equations, Journal of Computational Analysis and Applications, 20 (2) (2016), 226-236. 11. H. El-Metwally and E. M. Elsayed, Form of solutions and periodicity for systems of di¤erence equations, Journal of Computational Analysis and Applications, 15(5) (2013), 852-857. 12. M. A. El-Moneam, and S. O. Alamoudy, On study of the asymptotic behavior of some rational di¤erence equations, Dynamics of Continuous, Discrete and Impulsive Systems Series A: Mathematical Analysis, 22 (2015) 157-176. 13. E. M. Elsayed, Solution and behavior of rational di¤erence equations, Acta Universitatis Apulensis, 23 (2010), 233–249 14. E. M. Elsayed, Solution and attractivity for a rational recursive sequence, Discrete Dynamics in Nature and Society, Volume 2011, Article ID 982309, 17 pages. 15. E. M. Elsayed, Solutions of Rational Di¤erence System of Order Two, Mathematical and Computer Modelling, 55 (2012), 378–384. 16. E. M. Elsayed, Behavior and expression of the solutions of some rational di¤erence equations, Journal of Computational Analysis and Applications 15 (1) (2013), 73-81. 17. E. M. Elsayed, On the solutions and periodic nature of some systems of di¤erence equations, International Journal of Biomathematics 7 (6) (2014), 1450067, (26 pages). 18. E. M. Elsayed, Dynamics and Behavior of a Higher Order Rational Di¤erence Equation, The Journal of Nonlinear Science and Applications, 9 (4) (2016), 1463-1474. 19. E. M. Elsayed, On the solutions and periodicity of some rational systems of di¤erence equations, Bulletin Mathématique de la Société des Sciences Mathématiques de Roumanie, Tome 60 (108) (2) (2017), 159–171. 20. E. M. Elsayed, and Abdul Khaliq, Global Attractivity and Periodicity Behavior of a Recursive Sequence, Journal of Computational Analysis and Applications, 22 (2) (2017), 369-379. 21. E. M. Elsayed and A. M. Ahmed, Dynamics of a three-dimensional systems of rational di¤erence equations, Mathematical Methods in The Applied Sciences, 39 (5) (2016), 1026–1038. 22. E. M. Elsayed and A. Alghamdi, Dynamics and Global Stability of Higher Order Nonlinear Di¤erence Equation, Journal of Computational Analysis and Applications, 21 (3) (2016), 493-503. 23. E. M. Elsayed and M. M. El-Dessoky, Dynamics and global behavior for a fourth-order rational di¤erence equation, Hacettepe Journal of Mathematics and Statistics 42 (5) (2013), 479–494. 24. E. M. Elsayed and H. El-Metwally, Stability and solutions for rational recursive sequence of order three, Journal of Computational Analysis and Applications, 17 (2) (2014), 305-315. 25. E. M. Elsayed and H. El-Metwally, Global behavior and periodicity of some di¤erence equations, Journal of Computational Analysis and Applications, 19 (2) (2015), 298-309. 26. E. M. Elsayed, M. Ghazel, and A. E. Matouk, Dynamical Analysis Of The Rational Di¤erence Equation xn+1 = Cxn¡3 =(A + Bxn¡1 xn¡3 ), Journal of Computational Analysis and Applications, 23 (3) (2017), 496-507. 27. E. M. Elsayed and T. F. Ibrahim, Solutions and periodicity of a rational recursive sequences of order …ve, Bulletin of the Malaysian Mathematical Sciences Society, 38 (1) (2015), 95-112. 28. E. M. Elsayed and T. F. Ibrahim, Periodicity and solutions for some systems of nonlinear rational di¤erence equations, Hacettepe Journal of Mathematics and Statistics, 44 (6) (2015), 1361–1390. 1 ¡ xn ; Journal of Life 29. M. Erdogan and K. Uslu, Behavior of a nonlinear di¤erence equation xn+1 = k P A + xn¡i i=1

Sciences, 10 (2016), 215-219.

1190

Elsayed ET AL 1179-1191

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

30. Y. Halim, global character of systems of rational di¤erence equations, Electronic Journal of Mathematical Analysis and Applications, 3 (1) (2015), 204-214. 31. Y. Halim, and M. Bayram, On the solutions of a higher-order di¤erence equation in terms of generalized Fibonacci sequences, Math. Meth. Appl. Sci., 39 (2016), 2974–2982. 32. Sk. Hassan, and E. Chatterjee, Dynamics of the equation in the complex plane , Cogent Mathematics, 2 (2015), 1-12. 33. T. F. Ibrahim, Behavior of some higher order nonlinear rational partial di¤erence equations, Journal of the Egyptian Mathematical Society, In Press, Available online 13 April 2016, doi:10.1016/j.joems.2016.03.004. 34. D. Jana and E. M. Elsayed, Interplay between strong Allee e¤ect, harvesting and hydra e¤ect of a single population discrete - time system, International Journal of Biomathematics, 9 (1) (2016), 1650004, (25 pages). xn¡5 ; 35. R. Karatas, C. Cinar and D. Simsek, On positive solutions of the di¤erence equation xn+1 = 1 + xn¡2 xn¡5 Int. J. Contemp. Math. Sci., 1 (10) (2006), 495-500. 36. A. Q. Khan, Q. Din, M. N. Qureshi, and T. F. Ibrahim, Global behavior of an anti-competitive system of fourth-order rational di¤erence equations, Computational Ecology and Software, 4 (1) (2014), 35-46. 37. H. Khatibzadeh and T. F. Ibrahim, Asymptotic stability and oscillatory behavior of a di¤erence equation, Electronic Journal of Mathematical Analysis and Applications, 4 (2) (2016), 227-233. 38. V. L. Kocic and G. Ladas, Global Behavior of Nonlinear Di¤erence Equations of Higher Order with Applications, Kluwer Academic Publishers, Dordrecht, 1993. 39. M. R. S. Kulenovic and G. Ladas, Dynamics of Second Order Rational Di¤erence Equations with Open Problems and Conjectures, Chapman & Hall / CRC Press, 2001. 40. R. Mostafaei and N. Rastegar, On a recurrence relation, QScience Connect, 10 (2014), 1-11. 41. M. Phong, A note on a system of two nonlinear di¤erence equations, Electronic Journal of Mathematical Analysis and Applications, 3 (1) (2015), 170 -179. 42. M. N. Qureshi, and A. Q. Khan, Local stability of an open-access anchovy …shery model, Computational Ecology and Software, 5 (1) (2015), 48-62. 43. D. Tollu, Y. Yazlik, and N. Taskara, The Solutions of Four Riccati Di¤erence Equations Associated with Fibonacci Numbers, Balkan journal of Mathematics, 2 (2014), 163-172. 44. N. Touafek and E. M. Elsayed, On a second order rational systems of di¤erence equation, Hokkaido Mathematical Journal, 44 (1) (2015), 29–45. 45. W. Wang, and H. Feng, On the dynamics of positive solutions for the di¤erence equation in a new population model, J. Nonlinear Sci. Appl., 9 (2016), 1748–1754. 46. I. Yalç¬nkaya, Global asymptotic stability in a rational equation, Selçuk Journal of Applied Mathematics, Summer-Autumn, 6 (2) (2005), 59-68. axn¡k ; Fasciculi Mathe47. I. Yalç¬nkaya, and C. Cinar, On the dynamics of the di¤erence equation xn+1 = b + cxpn matici, 42 (2009), 133–139. 48. Y. Yazlik, On the solutions and behavior of rational di¤erence equations, J. Comp. Anal. Appl., 17 (2014), 584–594. 49. Y. Yazlik, E. M. Elsayed and N. Taskara, On the Behaviour of the Solutions of Di¤erence Equation Systems, Journal of Computational Analysis and Applications, 16 (5) (2014), 932–941. p + xn¡k 50. E. M. E. Zayed, Qualitative behavior of the rational recursive sequence xn+1 = Axn + Bxn¡k + , qxn + xn¡k International Journal of Advances in Mathematics, 1 (1) (2014), 44-55. ® + ¯xn + °xn¡1 ; 51. E. M. E. Zayed and M. A. El-Moneam, On the rational recursive sequence xn+1 = A + Bxn + Cxn¡1 Communications on Applied Nonlinear Analysis, 12 (4) (2005), 15–28.

1191

Elsayed ET AL 1179-1191

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On some classes of nonlinear contractions in Fuzzy metric spaces ∗

Dangdang Wang, Chuanxi Zhu , Zhaoqi Wu Department of Mathematics, Nanchang University, Nanchang, 330031, P. R. China dangwang− [email protected] (D. D. Wang), [email protected] (C. X. Zhu), wuzhaoqi− [email protected]

Abstract In this paper, we, motivated by Mihet [2], give the concept of two nonlinear contractions ((φ, ε−λ)-contraction and (φ, bn )-contraction) in KM-fuzzy metric spaces, and obtained some fixed point theorems. We answer the open question posed by Mihet in [2, open question 2]. Finally, an example can be used to be exemplify our results. Keywords: Fuzzy metric space; fixed point; fuzzy contraction

1

Introduction and preliminaries In 1975, Kramosil and Michalek [6] gave a notion of fuzzy metric space (KM-fuzzy metric space),

which was modified later by George and Veeramani [4]. Since then, many authors have contributed to the study of these concepts of fuzzy metric, fixed point theory is one of the most important topics of research. The first attempt to extend the well-known Banach contraction theorem to KM-fuzzy metrics was done by Grabiec in [8]. Later, Gregori and Sapena [5] gave another notion of fuzzy contractive mapping and studied its applicability to fixed point theory in both contexts of fuzzy metrics above mentioned. In their study, the authors needed to demand additional conditions to the completeness of the fuzzy metric in order to obtain a fixed point theorem, which constitutes a significant difference with the classical theory. Later, this notion of fuzzy contractive mapping and others that appeared in the literature were generalized by D. Mihet in [7] introducing the concept of fuzzy ψ-contractive mapping and he obtained a fixed point theorem for the class of complete non-Archimedean KM-fuzzy metrics. † †

Corresponding author: Chuanxi Zhu. Email: [email protected]:+8613970815298. Supported by the National Natural Science Foundation of China (11361042,11071108,11461045) and the Provincial

Natural Science Foundation of Jiangxi, China (20132BAB201001,2010GZS0147,20142BAB211016) and the Scientific Program of the Provinical Education Department of Jiangxi(150008) and the Innovation Program of the Graduate student of Nanchang University(colonel-level project).

1 1192

Dangdang Wang ET AL 1192-1199

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Recently, D. Wardowski [9] has provided a new contribution to the study of fixed point theory in fuzzy metric spaces. In [9], the author introduced the concept of fuzzy H-contractive mappings, which constitutes a generalization of the concept given by V. Gregori and A. Sapena, and he obtained the next fixed point theorem for complete fuzzy metric spaces in the sense of George and Veeramani. In this paper, we, motivated by Mihet [2], give the definition of three nonlinear contractions ((φ, ε− λ)-contraction and (φ, bn )-contraction) in Km-fuzzy metric spaces, and obtained some fixed point theorems. Finally, an example can be used to be exemplify our main results. Throughout this paper, let R + := [0, +∞), N be the set of all positive integers, Φω :={for each t > 0, there exists r ≥ t such that limn→∞ φn (t) = 0}. A mapping F : R → R + is said to be a distribution function if it is non-decreasing and left continuous with inf t∈R F (t) = 0, supt∈R F (t) = 1. Let D + the set of all distribution functions, while H ∈ D + will always denote the specific distribution function defined by

H(t) =

  0, if t ≤ 0,  1, if t > 0.

A mapping ∆ : [0, 1] × [0, 1] → [0, 1] is called a triangular norm (for short, a t-norm) if the following conditions are satisfied: (a, 1) = a; (a, b) = (b, a); a ≥ b, c ≥ d ⇒ (a, c) ≥ (b, d); (a, (b, c)) = ((a, b), c). Definition 1.1 [11] A t-norm is said to be of H-type if the family of functions {∆m (t)}m∈N is equicontinuous at t = 1, where ∆1 (t) = ∆(t, t), ∆m (t) = ∆(t, ∆m−1 (t)).m = 1, 2, · · · , t ∈ [0, 1](∆0 (t) = t). Definition 1.2 [12] A fuzzy metric space in the sense of Kramosil and Michlek (briefly, a KM-fuzzy metric space) is a triple (X, M, ∆) where X is a nonempty set, ∆ is a t-norm and M is a fuzzy set on X 2 × [0, ∞) satisfying the following conditions for all x, y, z ∈ X ands, t > 0: (FM-1) M (x, y, 0) = 0; (FM-2) M (x, y, t) = 1, for t > 0 if and only if x = y; (FM-3) M (x, y, t) = M (y, x, t); (FM-4) M (x, z, t + s) ≥ ∆(M (x, y, t), M (y, z, s)); (FM-5) M (x, y, ) : R + → [0, 1] is left continuous. Lemma 1.1 [1] If (X, M, ∆) is a KM-fuzzy metric space satisfying the condition: (FM-6) limt→∞ M (x, y, t) = 1 for all x, y ∈ X, 2 1193

Dangdang Wang ET AL 1192-1199

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

then (X, F, ∆) is a Menger space, where F is defined by   M (x, y, t), if t ≥ 0, Fx,y (t) =  0, if t < 0.

(1.1)

On the other hand, if (X, M, ∆) is a Menger space, then (X, M, ∆) is a KM-fuzzy metric space with (FM-6), where M is defined by M (x, y, t) = Fx,y (t) for t ≥ 0. Definition 1.3 [1] Let (X, M, ∆) be a complete KM-fuzzy metric space with a t-norm ∆ of H-type, T : X → X be a mapping satisfied M (T x, T y, φ(t)) ≥ M (x, y, t) ∀ x, y ∈ X and t > 0

(1.2)

where φ ∈ Φω . Then T is said to be a fuzzy φ-contraction. Lemma 1.2 [1] Let (X, M, ∆) be a complete KM-fuzzy metric space with a t-norm ∆ of Htype, T : X → X be a mapping satisfied (1.2). Suppose that there exists some x0 ∈ X such that limt→∞ M (x0 , T x0 , t) = 1. Then T has a unique fixed point x∗ in Y0 = {y ∈ X| limt→∞ M (x0 , y, t) = 1}. In Fang [1] has given the definition of fuzzy φ-contraction and obtained some fixed point theorems in KM-fuzzy metric spaces. In this paper, we also obtain some fixed point results in KM-fuzzy metric spaces by cocerning nonliner contractions.

2

Fuzzy (φ, ε − λ)-contractions In this section, we give the definition of fuzzy (φ, ε − λ)-contraction in KM-fuzzy metric spaces and

obtain some fixed point theorems. Definition 2.1 Let (X, M, ∆) be a KM-fuzzy metric spaces. A mapping T : X → X is called a fuzzy contraction of (ε − λ)-type, if for some k ∈ (0, 1), M (x, y, ε) > 1 − λ ⇒ M (T x, T y, kε) > 1 − kλ, ∀ε > 0, ∀λ ∈ (0, 1). More generally one defines the concept of fuzzy (φ, ε − λ)-contraction. Definition 2.2 Let (X, M, ∆) be a KM-fuzzy metric spaces and φ ∈ Φw . A mapping T : X → X is said to be a fuzzy (φ, ε − λ)-contraction if the following implication holds: M (x, y, ε) > 1 − λ ⇒ M (T x, T y, φ(ε)) > 1 − φ(λ), ∀ε > 0, ∀λ ∈ (0, 1).

(2.1)

Theorem 2.1 Let (X, M, ∆) be a KM-fuzzy metric space with ∆ of H-type and φ : [0, ∞) → [0, ∞) be a function with the properties: 3 1194

Dangdang Wang ET AL 1192-1199

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

i) φ((0, 1)) ⊂ (0, 1); ii) limn→∞ φn (t) = 0, ∀ t > 0. Then every fuzzy (φ, ε − λ)-contraction on X have a unique fixed point. Proof We show that every fuzzy (φ, ε − λ)-contraction T : X → X with φ satisfying i) and ii)is a fuzzy φ-contraction. Indeed, let us assume by contradiction that T is a fuzzy (φ, ε − λ)-contraction, but it is not a fuzzy φ-contraction. Then M (T x, T y, φ(t)) < M (x, y, t), for some x, y ∈ X, t > 0, and φ(λ) > 1 − M (T x, T y, φ(t)), for every λ ∈ (1 − M (x, y, t), 1). In particular φ(λ) > 1 − M (T x, T y, φ(t)), ∀λ ∈ (1 − M (T x, T y, φ(t)), 1). Let α = 1 − M (T x, T y, φ(t)). From M (T x, T y, φ(t)) < M (x, y, t), it follows that α > 0 and from i) we obtain 0 < α < 1. Hence φ((0, 1)) ⊆ (0, 1), which contradicts ii). By Lemma 1.2, it follows that T have a unique fixed point. If the assumption φ((0, 1)) ⊂ (0, 1) in Theorem 2.1 is replaced by the stronger condition φ(t) < t, ∀t ∈ (0, 1), we can consider φ ∈ Φω . Theorem 2.2 Let (X, M, ∆) be a KM-fuzzy metric space with ∆ of H-type and φ : [0, ∞) → [0, ∞) be a function with the properties: i) φ : [0, ∞) → [0, ∞) ; ii) φ ∈ Φω . Then every fuzzy (φ, ε − λ)-contraction on X have a unique fixed point. For the proof it suffices to see that any fuzzy (φ, ε − λ)-contraction T satisfying i) is a fuzzy φcontraction: if we suppose that M (T x, T y, φ(ε)) < M (x, y, ε) for some x, y ∈ X, ε > 0, then we reach a contradiction by choosing λ ∈ (0, 1) such that M (T x, T y, φ(ε)) < 1 − λ < M (x, y, ε).

3

Fuzzy (φ, bn )-contractions Definition 3.1 Let (X, M, ∆) be a KM-fuzzy metric space and bn be an increasing sequence in

(0, 1) converging to 1. A mapping T : X → X is called a fuzzy bn -contraction if (∀n ∈ N , ∃kn ∈ (0, 1), ∀x, y ∈ X, t > 0) M (x, y, t) > bn ⇒ M (T x, T y, kn t) > bn . As a natural extension, we introduce the notion of fuzzy (φ, bn )-contraction. 4 1195

Dangdang Wang ET AL 1192-1199

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Definition 3.2 Let (X, M, ∆) be a KM-fuzzy metric space and bn be an increasing sequence in (0, 1) converging to 1, φ : [0, ∞) → [0, ∞) be a given function. A mapping T : X → X is said to be a fuzzy (φ, bn )-contraction if (∀n ∈ N , ∀x, y ∈ X, t > 0) M (x, y, t) ≥ bn ⇒ M (T x, T y, φ(t)) ≥ bn .

(3.1)

Lemma 3.1 Let (X, M, ∆) be a KM-fuzzy metric space and T be a fuzzy (φ, bn )-contraction on X with φ ∈ Φω . Let x0 ∈ X and (xn )n ⊂ X be defined by xn+1 = T xn for n ∈ N . Then limn→∞ M (xn , xn+1 , t) = 1 for all t > 0. Proof Let t > 0 and ε ∈ (0, 1) be given, m ∈ N be such that bm > 1 − ε. By the definition of fuzzy metric spaces, there exists s > 0 such that M (x0 , x1 , s) ≥ bm . As φ ∈ Φω , there exists r ≥ s with limn→∞ φn (r) = 0. By the monotonicity of M (x, y, ·), we get M (x0 , x1 , r) ≥ bm and, inductively, M (xn , xn+1 , φn (r)) ≥ bm , ∀n ∈ N . Let n0 ∈ N such that φn (r) < t for n > n0 . Then M (xn , xn+1 , t) ≥ M (xn , xn+1 , φn (r)) ≥ bm > 1 − ε, ∀n > n0 . So limn→∞ M (xn , xn+1 , t) = 1, concluding our proof. In Theorem 3.3 of Mihet [2], the t-norm is releated to the sequence (bn )n . Now, we consider △ is an arbitrary t-norm of H-type, whether the conclusion of Theorem 3.3 in [2] remain holds? we can see the following consequence. Lemma 3.2 [2] Let (X, F, ∆) be a probabilistic metric space and T be a probabilistic (φ, bn )contraction on X with φ ∈ Φω . Let x0 ∈ X and (xn )n ⊂ X be defined by xn+1 = T xn for n ∈ N . Then limn→∞ Fxn ,xn+1 (t) = 1 for all t > 0. Lemma 3.3 [1] Let (X, M, ∆) be a KM-fuzzy metric space, where the t-norm △ is continuous at (1, 1). Suppose that there exists x0 , x1 ∈ X such that limt→∞ M (x0 , x1 , t) = 1. Define Y0 = {y ∈ X| limt→∞ M (x0 , y, t) = 1}. Then (Y0 , F, △) is a Menger space, where F defined by (1.1). If (X, M, ∆) is complete, then (Y0 , F, △) is a Menger space. Theorem 3.1 Let (X, F, △) be a complete Menger PM space with a t-norm of H-type, and T : X → X be a probabilistic (φ, bn )-contraction, where bn ∈ (0, 1) and limn→∞ bn = 1,and φ ∈ Φω . Then T is a Picard mapping. Proof Because of in whole proof of Theorem 3.3 in [2], t-norm only be used to show that xn is a Cauchy sequence, so we only need to prove xn is a Cauchy sequence under the condition of Theorem 3.1. 5 1196

Dangdang Wang ET AL 1192-1199

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

For given ε > 0, by (PM-4) we get ε ε ε Fxn ,xn+p (t) ≥ △(Fxn ,xn+1 ( ), △(Fxn+1 ,xn+2 ( ), · · · , Fxn+p−1 ,xn+p ( ))), for x ∈ X. p p p By Lemma 3.2, we know limn→∞ Fxn ,xn+1 (t) = 1, for t > 0, n ∈ N . Therefore, Fxn ,xn+p (t) → 1, n → ∞, for n, p ∈ N , t > 0, so the sequence (xn )n is a Cauchy sequence. In fact, above Theorem improve the Theorem 3.3 in Mihet [2], at the same time, the reader could find in this Theorem a way of addressing the recent open question posed by Mihet in [2. open question 2]. Theorem 3.2 Let (X, M, ∆) be a complete KM-fuzzy metric space with a t-norm ∆ of H-type, T : X → X be a fuzzy (φ, bn )-contraction, where (bn )n ⊂ (0, 1) and limn→∞ bn = 1, φ ∈ Φω . Suppose that there exists some x0 ∈ X such that limt→∞ M (x0 , T x0 , t) = 1. Then T has a unique fixed point x∗ in Y0 = {y ∈ X| limt→∞ M (x0 , y, t) = 1}, and {T n (y0 )} converges to x∗ for each y0 ∈ Y0 . In particular, {T n x0 } converges to x∗ . Proof We define a mapping F : Y0 × Y0 → D + by (1.1). Since (X, M, ∆) be a complete KM-fuzzy metric space and there exists some x0 ∈ X such that limt→∞ M (x0 , T x0 , t) = 1, by Lemma 3.3 we know that (Y0 , M, △) is a complete Menger space. We can prove that (3.1) implies that M (T x, T y, t) ≥ bn .

(3.2)

In fact, since φ ∈ Φω , for each t > 0, there exists r ≥ t such that φ(r) < t and M (x, y, r) ≥ bn . By definition of fuzzy (φ, bn )-contraction, we get M (T x, T y, t) ≥ M (T x, T y, φ(r)) ≥ bn . It is not difficult to prove that T is a self-mapping on Y0 . In fact, if y ∈ Y0 , then limt→∞ M (x0 , y, 2t ) = 1. By the hypothesis limt→∞ M (x0 , T x0 , 2t ) = 1. In addition, using (FM-4), we get t t t M (x0 , T y, t) ≥ △(M (x0 , T x0 , ), M (T x0 , T y, )) ≥ △(M (x0 , T x0 , ), bn ). 2 2 2 Let n → ∞, t → ∞ in the above inequality. From the continuity of △ at (1, 1), we obtain limt→∞ M (x0 , T y, t) = 1. i.e.,T y ∈ Y0 . This show that T is a mapping of Y0 into itself. Clearly (3.1) implies that Fx,y (t) ≥ bn ⇒ FT x,T y (φ(t)) ≥ bn , for x, y ∈ Y0 , t > 0 and n ∈ N , where F is defined by (1.1). This show that T is a probabilistic (φ, bn )-contraction in (Y0 , F, △). Thus, by Theorem 3.1, we conclude that T has a unique fixed point x∗ in Y0 , and {T n (y0 )} converges to x∗ for each y0 ∈ Y0 . In particular, {T n x0 } converges to x∗ . This complete the proof. 6 1197

Dangdang Wang ET AL 1192-1199

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

An example Example 4.1 Let X = [0, ∞) and M (x, y, t) =

(X, M, △p ) is a complete KM-fuzzy metric space. Let function bn =

n−1 n ,

min{x,y} max{x,y} T x = x2

for all x, y ∈ X and t > 0. Then for x ∈ X, φ(t) =

t 2

for t > 0. Define

n∈N.

It is easy to see that (bn )n ⊂ (0, 1), limn→∞ bn = 1, φ ∈ Φω . T is a fuzzy (φ, bn )-contraction on X. In fact, since M (x, y, t) ≥ bn , so min{ x2 , y2 } x y t min{x, y} M (T x, T y, φ(t)) = M ( , , ) = ≥ bn . x y = 2 2 2 max{ 2 , 2 } max{x, y} By the Theorem 3.2, we know T has a unique fixed point. And 0 is the unique fixed point of T .

References [1] J. Fang, On φ-contractions in probabilistic and fuzzy metric spaces, Fuzzy Sets Syst. 267 (2015) 86-99. [2] D. Mihet, C. Zaharia, On some classes of nonlinear contractions in probabilistic metric spaces, Fuzzy Sets Syst. 300 (2016) 84-92. [3] V. Gregori, J. Minana, On probabilistic φ- contractions in Menger spaces, Fuzzy Sets Syst. 22/07 (2010) 1-5. [4] A. George, P. Veeramani, On some results in fuzzy metric spaces, Fuzzy Sets Syst. 64 (1994) 395-399. [5] V. Gregori, A. Sapena, On fixed-point theorems in fuzzy metric spaces, Fuzzy Sets Syst. 125 (2002) 245-252. [6] I. Kramosil, J. Michalek, Fuzzy metrics and statistical metric spaces, Kybernetika. 11 (1975) 326-334. [7] D. Mihet, Fuzzy ψ-contractive mappings in non-Archimedean fuzzy metric spaces, Fuzzy Sets Syst. 159 (2008) 739-744. [8] V. Gregori, S. Romaguera Characterizing completable fuzzy metric spaces, Fuzzy Sets Syst. 144 (2004) 411-420. [9] D. Wardowski, Fuzzy contractive mappings and fixed points in fuzzy metric spaces, Fuzzy Sets Syst. 222 (2013) 108-114.

7 1198

Dangdang Wang ET AL 1192-1199

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[10] J. Jachymski, On probabilistic φ- contractions on Menger spaces, Nonlinear Anal. 73 (2010) 2199-2203. [11] O. Hadc, Fixed point theorems for multi-valued mappings in probabilistic metric spaces, Mat. Vesn. 3 (1979) 125C133. [12] I. Kramosil, J. Michlek, Fuzzy metrics and statistical metric spaces, Kybernetika 11 (1975) 336344.

8 1199

Dangdang Wang ET AL 1192-1199

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

ON SUBCLASSES OF ANALYTIC FUNCTIONS WITH FIXED SECOND COEFFICIENTS A. Y. LASHIN1 AND F.Z. EL-EMAM2

Abstract. Let A be the class of analytic functions in the open unit disc U 0 with normalization f (0) = f (0) − 1 = 0. The purpose of the present paper is to obtain several sufficient conditions of starlikeness and strongly starlikeness for some subclasses of A with fixed second coefficients that satisfy certain conditions for the quotient of the representations of convexity and starlikeness.

AMS (2010) Subject Classification. 30 C45. Key Words. Univalent functions, Starlike functions, Convex functions, Strongly starlike functions, Fixed second coefficients. 1. Introduction Let A denote the class of all functions f which are analytic in the open unit disc 0 U = {z : |z| < 1} and normalized by the conditions f (0) = f (0) − 1 = 0. Further let ( ! ) 0 zf (z) ∗ S (α) := f ∈ A : < > α , 0 ≤ α < 1, z ∈ U , f (z) and

f ∈ A : arg

( S(α) :=

0

zf (z) f (z)

! ) π < α , 0 ≤ α < 1, z ∈ U , 2

be the subspaces of A consisting of starlike functions of order α and strongly starlike functions of order α, respectively. Note that S ∗ (0) = S(1) = S ∗ is the well-known space of normalized functions starlike (univalent) with respect to the origin. we denote by K, the family of all convex functions in U defined as: ( ) 00 0 zf (z) K := f ∈ A : f (0) 6= 0, 0, z ∈ U f (z) In [11] Silverman investigated an expression involving the quotient of the analytic representations of convex and starlike functions. Precisely, for 0 < b ≤ 1 he considered the class ( ) 1 + zf 00 (z)/f 0 (z) Gb := f ∈ A : − 1 < b , z ∈ U zf 0 (z)/f (z) √ and proved that Gb ⊂ S ∗ (2/(1+ 1 + 8b). Obradovic´ √ and Tuneski in [10] improved this result by showing Gb ⊆ S ∗ (h(z)) ⊆ S ∗ (2/(1+ 1 + 8b), where h(z) = 1/(1+bz). Tuneski in [14] gave a sufficient conditions for a function f ∈ Gb to be in the 1+Az class S ∗ ( 1+Bz ) and its subclasses, where −1 ≤ B < A ≤ 1. Sokol in [12] gave a generalization of main theorem contained in [14] . Further Obradovic and Owa [9], 1

1200

LASHIN ET AL 1200-1207

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A. Y. LASHIN1 AND F.Z. EL-EMAM2

2

Nunokawa [6, 7] and Kamali [3] obtained a sufficient conditions for starlikeness of functions which satisfies a certain conditions for the modulus of 00

0

1 + zf (z)/f (z) zf 0 (z)/f (z) Let A(β) consists of analytic functions f ∈ A of the form f (z) = z + βz 2 + a3 z 3 + ...,

(1.1)

where the second coefficient β ∈ C (C the complex plane) is fixed constant. Several authors have investigated functions with fixed second coefficient and these include, for example, by Ali et al. [1, 2] and Nagpal and Ravichandran [5]. In this paper, we prove several sufficient conditions for starlikeness and strongly starlikeness of some subclasses of A with fixed second coefficients that satisfy certain conditions for the quotient of the representations of convexity and starlikeness . To derive our main theorem, we need the following lemma due to Kwon [4], which is an extension of a very popular lemma of Nunokawa [8]. Lemma 1. Let p(z) = 1 + βz + p2 z 2 + ... be analytic in U , and p(z) 6= 0 (z ∈ U ). If there exists a point z0 ∈ U, such that π |arg (p(z))| < α for |z| < |z0 | 2 and π |arg (p(z0 ))| = α (α > 0), 2 then we have 0 z0 p (z0 ) = ikα, p(z0 ) where   2 1 π k ≥ a+ , when arg (p(z0 )) = α, 2 + |β| a 2   1 π 2 (1.2) a+ when arg (p(z0 )) = − α k ≤ − 2 + |β| a 2 1

with {p(z0 )} α = ±ia. 2. Main Results Theorem 1. If f ∈ A(β) defined by (1.1) satisfies ! 00 0 1 + zf (z)/f (z) π arg < δ, zf 0 (z)/f (z) 2 where 2 δ = arctan π





4η sin (π(1 − η)/2) 1

1

(2 + |β|) (1 − η) 2 (1−η) (1 + η) 2 (1+η) + 4η cos (π(1 − η)/2)

then we have arg

0

zf (z) f (z)

! π < η. 2

1201

LASHIN ET AL 1200-1207

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

ON SUBCLASSES OF ANALYTIC FUNCTIONS

3

0

Proof. Let p(z) =

zf (z) f (z)

= 1 + βz + p2 z 2 + ..., then we have 0

1+

00

0

zp (z) 1 + zf (z)/f (z) = . 2 p (z) zf 0 (z)/f (z)

If there exists a point z0 ∈ U, such that π |arg (p(z))| < η for |z| < |z0 | and 2

|arg (p(z0 ))| =

π η (η > 0), 2

then from Lemma 1, for the case arg (p(z0 )) = π2 η, ! !   0 00 0 z0 p (z0 ) iηk 1 + z0 f (z0 )/f (z0 ) = arg 1 + = arg 1 + arg z0 f 0 (z0 )/f (z0 ) p2 (z0 ) (ia)η     π(1−η) ηk aη sin 2   . = arctan  π(1−η) ηk 1 + aη cos 2 ηk aη

2η 2+|β|

 a1−η + a−1−η . Now, we define a function g : (0, ∞) → R by   0 1+η g(a) = a1−η + a−1−η , then g (a) = 2a1−η a2 − 1−η . Hence g(a) takes the miniη+2    12  1 (1−η)   1 (1+η)  1+η ηk 1+η 2 1−η 2 2η mum value at a = 1−η . Therefore aη ≥ 2+|β| + 1+η .Thus 1−η Since



we have arg

! 00 0 1 + z0 f (z0 )/f (z0 ) z0 f 0 (z0 )/f (z0 )    12 (1−η)

 12 (1+η) 

   π(1−η) sin 2     ≥ arctan   12 (1−η)   12 (1+η)     π(1−η) 1+η 1−η 2η + 1+η 1 + 2+|β| cos 1−η 2   4η sin (π(1 − η)/2) π = arctan = δ 1 1 (1−η) (1+η) 2 (2 + |β|) (1 − η) 2 (1 + η) 2 + 4η cos (π(1 − η)/2) 2η 2+|β|

1+η 1−η

+



1−η 1+η

This contradicts our condition in the theorem. For the case p(z0 ) = (−ia)η (a > 0), using the same method, we can obtain a contradiction to the assumption.  Theorem 2. If f ∈ A(β) defined by (1.1) satisfies 1 + zf 00 (z)/f 0 (z) 2 (2.1) − 1 , < 0 1 + |β| zf (z)/f (z) then we have 0

(2.2)

0 f (z)/zf (z) − 1 < 1

or


0.

Proof. Letting (2.3)

f (z) 1 − p(z) −1= , zf 0 (z) 1 + p(z)

1202

LASHIN ET AL 1200-1207

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A. Y. LASHIN1 AND F.Z. EL-EMAM2

4

we know that p(z) = 1 + 2βz + p2 z 2 + ..., analytic in U, P (0) = 1, P (z) 6= 0 (z ∈ U ) and f (z) 2 = , z ∈ U. 0 zf (z) 1 + p(z) Furthermore, we have 00

0

0

zp (z) 1 + zf (z)/f (z) 2p =1+ . 2 zf 0 (z)/f (z) (1 + p(z)) p(z) Suppose that there exists a point z0 ∈ U, such that < (p(z)) > 0 for |z| < |z0 | and

< (p(z0 )) = 0.

Then applying Lemma 1, we have, 0

z0 p (z0 ) = ik, p(z0 ) where k is real number and   1 1 k ≥ a+ , when p(z0 ) = ia (a > 0), 1 + |β| a   1 1 (2.4) k ≤ − a+ when p(z0 ) = −ia (a > 0). 1 + |β| a It follows that
. (1 + a2 )2 (1 + |β|)2

This contradicts the hypothesis (2.1) and therefore, we have < {p(z)} > 0 for |z| < 1. or 1 − p(z) 1 + p(z) < 1 for |z| < 1. Therefore, by (2.3) so we obtain (2.2). It completes the proof of Theorem 2.  Theorem 3. If f ∈ A(β) defined by (1.1) satisfies  zf 00 (z)/f 0 (z)  1 (2.5) , 0 < 1+ zf (z)/f (z) − 1 1 + |β|

1203

LASHIN ET AL 1200-1207

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

ON SUBCLASSES OF ANALYTIC FUNCTIONS

5

then we have 0 zf (z)/f (z) − 1 < 1

(2.6) Proof. The following equation

0

zf (z) 1 − p(z) −1= . f (z) 1 + p(z)

(2.7)

Defines the function p(z) = 1 − 2βz + p2 z 2 + ..., analytic in U, P (0) = 1, P (z) 6= 0 (z ∈ U ). Then it follows that 0

zf (z) 2 = , z ∈ U. f (z) 1 + p(z) Furthermore, we have 00

0

0

p zp (z) zf (z)/f (z) =1− . 0 zf (z)/f (z) − 1 1 − p(z) p(z) If there exists a point z0 ∈ U, such that < (p(z)) > 0 for |z| < |z0 | and

< (p(z0 )) = 0,

then Lemma 1, gives that, 0

z0 p (z0 ) = ik, p(z0 ) where the real number k is given by (2.4) and p(z0 ) = ±ia (a > 0). It follows that !     00 0 z0 f (z0 )/f (z0 ) ak ak < = < 1 ± = 1 ± , z0 f 0 (z0 )/f (z0 ) − 1 (1 ∓ ia) 1 + a2 and 00

=

0

z0 f (z0 )/f (z0 ) z0 f 0 (z0 )/f (z0 ) − 1

! =

a2 k . 1 + a2

Therefore,  2 z f 00 (z )/f 0 (z ) 2 2ak ak 0 0 0 2 = 1 ± + (1 + a ) . z0 f 0 (z0 )/f (z0 ) − 1 1 + a2 1 + a2 By (2.4) we get z f 00 (z )/f 0 (z ) 2 0 0 0 z0 f 0 (z0 )/f (z0 ) − 1

2 + (1 + a2 ) 1 + |β|  2 1 > 1+ 1 + |β|



> 1+

1 1 + |β|

2

This contradicts the hypothesis (2.5). And the proof completed as in Theorem 2.  Theorem 4. If f ∈ A(β) defined by (1.1) satisfies 00 ! 00 zf (z) zf (z) (2.8) < 1+ 0 > 2(1 + |β|) 0 , f (z) f (z)

1204

LASHIN ET AL 1200-1207

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A. Y. LASHIN1 AND F.Z. EL-EMAM2

6

then we have  0  < f (z) > 0

(2.9)

Proof. We define the function p(z) by 0

(2.10)

f (z) =

2p(z) . 1 + p(z)

Then we see that p(z) = 1 + 4βz + p2 z 2 + ..., is analytic in U, P (0) = 1, P (z) 6= 0 (z ∈ U ). If there exists a point z0 ∈ U, such that < (p(z)) > 0 for |z| < |z0 | and

< (p(z0 )) = 0.

Then applying Lemma 1, for the case p(z0 ) = ia and a > 0, we have 0

z0 p (z0 ) = ik, p(z0 )

(2.11) where k is real number and

1 k≥ 1 + 2 |β|

(2.12)



1 a+ a

 .

The calculations give   0 00 p(z0 ) p (z0 ) 1 − 1 + z0p(z 1 + z0ff0 (z(z)0 ) ) 1+p(z0 ) 00 0 = 0 0   . z0 f (z0 ) z0 p (z0 ) p(z0 ) f 0 (z0 ) p(z0 ) 1 − 1+p(z0 ) Therefore, by (2.11) and (2.12), we have     00 z0 f (z0 ) ia 1 + 0 1 + ik(1 − ) f (z )   1+ia  <  00 0  = <  z0 f (z0 ) ia f 0 (z0 ) ik(1 − 1+ia ) √   1 + a2 (1 + a2 ) + ak = (k > 0) |k| 1 + a2 √ a 1 + a2 2 (1 + |β|) a  √ < = √ < 2 (1 + |β|) 1 + 1 2 1+a 1 + a2 1+2|β| a + a This contradicts the hypothesis (2.8) and therefore, we have (2.13)

< (p(z)) > 0 f or |z| < 1.

Applying the same method as above, for the case p(z0 ) = −ia and a > 0, we can obtain,   00 √ z0 f (z0 )   1 + 0 1 + a2 (1 + a2 ) − ak f (z )   (k < 0) <  00 0  = z f (z ) |k| 1 + a2 0f 0 (z0 )0 √ a 1 + a2 +√ < 2 (1 + |β|) . = |k| 1 + a2 This contradicts the hypothesis (2.8) , So we have (2.13). Furthermore, !   0 zf (z) 2p(z) < =< >0 (see [13]) f (z) 1 + p(z)

1205

LASHIN ET AL 1200-1207

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

ON SUBCLASSES OF ANALYTIC FUNCTIONS

It completes the proof .

7



Theorem 5. If f ∈ A(β) defined by (1.1) satisfies !   0 0 zf (z) 2 + |β| zf (z) (2.14) < > − 1 , f (z) f (z) 4 then we have 
0

Proof. The following equation f (z) = p(z). z Defines the function p(z) = 1 + βz + p2 z 2 + ..., is analytic in U, P (0) = 1, P (z) 6= 0 (z ∈ U ) . If there exists a point z0 ∈ U, such that

(2.16)

< (p(z)) > 0 for |z| < |z0 | and

< (p(z0 )) = 0.

Then applying Lemma 1, for p(z0 ) = ±ia and a > 0, we have 0

z0 p (z0 ) = ik, p(z0 )

(2.17)

where the real number k is given by (1.2). The calculations give 0

0

z0 f (z0 ) f (z0 )

0 z0 f (z0 ) f (z0 )

1 + z0 p (z0 ) 1 + ik = 0p(z0 ) = . z0 p (z0 ) |k| − 1 p(z0 )

Therefore, by (2.17) and (1.2), we have   0 z0 f (z0 ) 1 f (z )  = <  0 0 < z0 f (z0 ) |k| − 1 f (z0 )

2 2+|β|

2 + |β| a < 2 4 (a + 1)

This contradicts the hypothesis (2.14) and therefore, we have < (p(z)) > 0 f or |z| < 1.  References [1] R. M. Ali, N. E. Cho, N. Jain and V. Ravichandran, Radii of starlikeness and convexity of functions defined by subordination with fixed second coefficients, Filomat 26(3)(2012), 553-561. [2] R. M. Ali, S. Nagpal and V. Ravichandran, Second-order differential subordination for analytic functions with fixed initial coefficient, Bull. Malays. Math. Sci. Soc. 34(3)(2011), 611– 629. [3] M. Kamali, A criterion for p-valently starlikeness, J. Ineq. Pure Appl. Math., 4(2) (2003), Art. 36, 5p. [4] O-S. Kwon, Some properties of analytic functions with the fixed second coefficients, Advances in Pure Math., 4 (2014), 194-202. [5] S. Nagpal and V. Ravichandran, Applications of theory of differential subordination for functions with fixed initial coefficient to univalent functions, Ann. Polon. Math.105(2012), 225– 238. [6] M. Nunokawa, On certain mulivalent functions, Math. Japon., 36 (1991), 67-70.

1206

LASHIN ET AL 1200-1207

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A. Y. LASHIN1 AND F.Z. EL-EMAM2

8

[7] M. Nunokawa, A certain class of starlike functions, in Current Topics in Analytic Function Theory, H.M. Srivastava and S. Owa (Editors), World Scientific Publishing Company, Singapore, New Jersey, London and Hongkong, 1992, p. 206-211, [8] M. Nunokawa , On the order of strongly starlikeness of strongly convex functions, Proc. Japan Acad. 69 (1993), 234-237. [9] M. Obradovic and S. owa, A criterion for starlikeness, Math. Nachr. 140(1989), 97-102. [10] M. Obradovic´ , N. Tuneski, On the starlike criteria defined by Silverman, Fol. Sci. Univ. Tech. Res. 181 (2000) 59-64. [11] H. Silverman, Convex and starlike criteria, Internat. J. Math. Math. Sci. 22 (1) (1999) 75-79. [12] J. Sokol, On sufficient condition to be in a certain subclass of starlike functions defined by subordination, Appl. Math. Comput. 190 (2007) 237–241. [13] J. Sokol, An improvement of Ozaki’s condition, Appl. Math. Comput. 219 (2013) 10768-10776. [14] N. Tuneski, On the quotient of the representations of convexity and starlikeness, Math. Nachr. 248–249 (2003) 200–203. 1 Department of Mathematics Faculty of Science, Mansoura University, Mansoura, 35516, EGYPT. E-mail address: [email protected] 2 Delta

Higher Institute for Engineering and Technology, Mansoura, Egypt. E-mail address: fatma [email protected]

1207

LASHIN ET AL 1200-1207

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On strong convergence theorem of hybrid algorithm for a countable family of quasi-Lipschitz mappings Muhammad Saeed Ahmad1 , Waqas Nazeer2, Mobeen Munir3, Shin Min Kang4,5,∗ and Samina Kausar6

1

Department of Mathematics, Government Muhammadan Anglo Oriental College, Lahore 54000, Pakistan e-mail: [email protected]

4

2

Division of Science and Technology, University of Education, Lahore 54000, Pakistan e-mails: [email protected]

3

Division of Science and Technology, University of Education, Lahore 54000, Pakistan e-mails: [email protected]

Department of Mathematics and RINS, Gyeongsang National University, Jinju 52828, Korea e-mail: [email protected] 5 6

Center for General Education, China Medical University, Taichung 40402, Taiwan

Division of Science and Technology, University of Education, Lahore 54000, Pakistan e-mail: [email protected] Abstract

The purpose of this article is to establish a kind of non-convex hybrid iteration algorithms and to prove relevant strong convergence theorems of common fixed points for a uniformly closed asymptotically family of countable quasi-Lipschitz mappings in Hilbert spaces. We establish a new non-convex hybrid algorithm and prove strong convergence theorem of common fixed points for a uniformly closed asymptotically family of countable quasi-Lipschitz mappings in the domains of Hilbert spaces. 2010 Mathematics Subject Classification: 47H05, 47H09, 47H10 Key words and phrases: hybrid algorithm, nonexpansive mapping, quasi-Lipschitz mapping, quasi-nonexpansive mapping

1

Introduction

In mathematics, a fixed point theorem is a result saying that a function f will have at least one fixed point (a point x for which f (x) = x), under some conditions on f that can be stated in general terms [3]. Results of this kind are amongst the most generally useful in mathematics [7]. ∗

Corresponding author

1208

Ahmad ET AL 1208-1216

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

The Banach fixed point theorem gives a general criterion guaranteeing that, if it is satisfied, the procedure of iterating a function yields a fixed point [6]. By contrast, the Brouwer fixed point theorem is a non-constructive result: it says that any continuous function from the closed unit ball in n-dimensional Euclidean space to itself must have a fixed point [24] but it doesn’t describe how to find the fixed point (See also Sperner’s lemma). For example, the cosine function is continuous in [−1, 1] and maps it into [−1, 1], and thus must have a fixed point. This is clear when examining a sketched graph of the cosine function; the fixed point occurs where the cosine curve y = cos(x) intersects the line y = x. Numerically, the fixed point is approximately x = 0.73908513321516 (thus x = cos(x) for this value of x). The Lefschetz fixed point theorem [11] (and the FenchelNielsen fixed point theorem) [4] from algebraic topology is notable because it gives, in some sense, a way to count fixed points. There are a number of generalisations to Banach fixed point theorem and further; these are applied in partial differential equation theory. See fixed point theorems in infinite-dimensional spaces. The collage theorem in fractal compression proves that, for many images, there exists a relatively small description of a function that, when iteratively applied to any starting image, rapidly converges on the desired image [1]. Fixed point theory of special mappings like nonexpansive, asymptotically nonexpansive, contractive and other mappings is an active area of interest and finds applications in many related fields like image recovery, signal processing and geometry of objects [23]. From time to time, some versions of theorems relating to fixed points of functions of special nature keep on appearing in almost in all branches of mathematics. Consequently, we apply them in industry, toy making, finance, aircrafts and manufacturing of new model cars. For example, a fixed point iteration scheme has been applied in intensity modulated radiation therapy optimization to pre-compute dose-deposition coefficient matrix, see [22]. Because of its vast range of applications almost in all directions, the research in it is moving rapidly and an immense literature is present currently. The Construction of fixed point theorems (e.g., Banach fixed point theorem) which not only claim the existence of a fixed point but yield an algorithm, too (in the Banach case fixed point iteration xn+1 = f (xn )). Any equation that can be written as x = f (x) for some map f that is contracting with respect to some (complete) metric on X will provide such a fixed point iteration. Mann’s iteration method was the stepping stone in this regard and is invariably used in most of the occasions see [?]. But it only ensures weak convergence, see [5] but more often then not, we require strong convergence in many real world problems relating to Hilbert spaces, see [2]. So mathematician are in search for the modifications of the Mann’s process to control and ensure the strong convergence, (see [10, 15, 17–20], and references therein). First noticeable modification of Mann’s Iteration process was suggested by Nakajo and Takahashi [16] in 2003. They introduced this modification for only one nonexpansive mapping in the context of Hilbert spaces where as Kim and Xu [9] introduced a variant for asymptotically nonexpansive mapping in the same context in 2006. In the same year Martinez-Yanes and Xu [14] introduced a variant of the Ishikawa Iteration process for a nonexpansive mapping. They also gave variant of Halpern iteration method. Su and Qin [21] proposed a monotone hybrid iteration process for nonexpansive mapping in a Hilbert space. Liu et al. [12] proposed a novel iteration method for finite family of quasi-asymptotically pseudo-contractive mapping in the realm of Hilbert spaces. Guan et

1209

Ahmad ET AL 1208-1216

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

al. [8] established the first non-convex hybrid algorithm and proved some strong convergence results relating to common fixed points for a uniformly closed asymptotic family of countable quasi-Lipschitz mappings in H. In this article, we establish a non-convex hybrid algorithms corresponding to Picard iteration scheme. Then we also establish strong convergence theorem of common fixed points for uniformly closed asymptotically family of countable quasi-Lipschitz mappings in Hilbert spaces. Applications of this algorithm is also given.

2

Preliminaries

Let H be the fixed notation for a Hilbert space and C be a nonempty closed convex subset of H. First we recall some basic definitions that will accompany us throughout this paper. Let Pc (·) be the metric projection onto C. A mapping T : C → C is said to be nonexpensive if kT x − T yk ≤ kx − yk for all x, y ∈ C. And T : C → C is said to be quasi-Lipschitz if F ix(T ) 6= φ and For all p ∈ F ix(T ), kT x − pk ≤ Lkx − pk, where L is a constant 1 ≤ L < ∞. If L = 1, then T is known as quasi-nonexpansive. It is well-known that T is said to be closed if for n → ∞, xn → x and kT xn − xn k → 0 implies T x = x. T is said to be weak closed if xn * x and kT xn − xn k → 0 implies T x = x as n → ∞. It is admitted fact that a mapping which is weak closed should be closed but converse is no longer true. Let {Tn } be a sequence of mappings having the nonempty fixed points set F . Then {Tn} is defined to be uniformly closed if for all convergent sequences {zn } ⊂ C with conditions kT nzn − zn k → 0, n → ∞ implies the limit of {zn } belongs to F. Definition 2.1. Let C be a closed convex subset of a Hilbert space H and let {Tn } be a family of countable quasi-Ln -Lipschitz mapping from C into itself. Then {Tn } is said to be asymptotic if limn→∞ Ln = 1. Lemma 2.2. Let C be a non-empty closed subset of a Hilbert space H. For x ∈ H and z ∈ C, z = PC x if and only if we have hx − z, z − yi ≥ 0 for all y ∈ C. Lemma 2.3. ([8]) Let C be a closed convex subset of a Hibbert space H and let {Tn } be a uniformly closed asymptotically family of countable quasi-Ln -Lipschitz mapping from C into itself. Then the common fixed point set F is closed and convex. Lemma 2.4. Let C be a closed convex subset of a Hilbert space H, for any given x ∈ H. Then we have p = PC x0 if and only if hp − z, x0 − pi ≥ 0 for all z ∈ C.

3

Main Results

This section contains main results. Theorem 3.1. Let C be a closed convex subset of a Hilbert space H and let {Tn } be uniformly closed asymptotically family of countable quasi-Ln -Lipschitz mappings from C into itself. Suppose that αn ∈ (0, 1], and βn ∈ [0, 1] for all n ∈ N . Then {xn } generated

1210

Ahmad ET AL 1208-1216

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

by   x ∈ C = Q0 , choosen arbitrarily,   0    yn = Tn zn , n ≥ 0,      zn = (1 − αn )Tn xn + αn Tn tn , n ≥ 0, tn = (1 − βn ) + βn Tn xn , n ≥ 0,   Cn = {z ∈ C : kyn − zk ≤ L2 (1 + (Ln − 1)αn βn )kxn − zk} ∩ A,  n    Qn = {z ∈ Qn−1 : hxn − z, x0 − xn i ≥ 0}, n ≥ 1,     xn+1 = PcoCn ∩Qn x0

n ≥ 0,

converges strongly to PF x0 , where coCn denotes the closed convex closure of Cn for all n ≥ 1 and A = {z ∈ H : kz − PF x0 k ≤ 1}. Proof. We give our proof in following steps. Step 1. We know that coCn and Qn are closed and convex for all n ≥ 0. Next, we show that F ∩ A ⊂ coCn for all n ≥ 0. Indeed, for each p ∈ F ∩ A, we have kyn − pk = kTn zn − pk = kTn [(1 − αn )Tnxn + αn Tn tn ] − pk = kTn [(1 − αn )Tnxn + αn Tn ((1 − βn ) + βn Tn xn )] − pk = k(1 − αn βn )(Tn2 xn − p) + (αn βn )(Tn3 xn )k ≤ (1 − αn βn )kTn2 xn − pk + (αn βn )kTn3 xn k = L2n (1 + (Ln − 1)αn βn )kxn − pk and p ∈ A, so p ∈ Cn which implies that F ∩A ⊂ Cn for all n ≥ 0. therefore, F ∩A ⊂ coCn for all n ≥ 0. Step 2. We show that F ∩ A ⊂ coCn ∩ Qn for all n ≥ 0. it suffices to show that F ∩ A ⊂ Qn for all n ≥ 0. We prove this by mathematical induction. For n = 0 we have F ∩ A ⊂ C = Q0 . Assume that F ∩ A ⊂ Qn . Since xn+1 is the projection of x0 onto coCn ∩ Qn , from Lemma 2.2, we have hxn+1 − z, xn+1 − x0 i ≤ 0,

∀z ∈ coCn ∩ Qn

as F ∩ A ⊂ coCn ∩ Qn , the last inequality holds, in particular, for all z ∈ F ∩ A. This together with the definition of Qn+1 implies that F ∩ A ⊂ Qn+1 . Hence the F ∩ A ⊂ coCn ∩ Qn holds for all n ≥ 0. Step 3. We prove {xn } is bounded. Since F is a nonempty, closed, and convex subset of C, there exists a unique element z0 ∈ F such that z0 = PF x0 . From xn+1 = PcoCn ∩Qn x0 , we have kxn+1 − x0 k ≤ kz − x0 k for every z ∈ coCn ∩ Qn . As z0 ∈ F ∩ A ⊂ coCn ∩ Qn , we get kxn+1 − x0 k ≤ kz0 − x0 k for each n ≥ 0. This implies that {xn } is bounded.

1211

Ahmad ET AL 1208-1216

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Step 4. We show that {xn } converges strongly to a point of C (we show that {xn } is a cauchy sequence). As xn+1 = PcoCn ∩Qn x0 ⊂ Qn and xn = PQn x0 (Lemma 2.4), we have kxn+1 − x0 k ≥ kxn − x0 k for every n ≥ 0, which together with the boundedness of kxn −x0 k implies that there exsists the limit of kxn −x0 k. On the other hand, from xn+m ∈ Qn , we have hxn −xn+m , xn −x0 i ≤ 0 and hence kxn+m − xn k2 = k(xn+m − x0 ) − (xn − x0 )k2 ≤ kxn+m − x0 k2 − kxn − x0 k2 − 2hxn+m − xn , xn − x0 i ≤ kxn+m − x0 k2 − kxn − x0 k2 → 0,

n→∞

for any m ≥ 1. Therefore {xn } is a cauchy sequence in C, then there exists a point q ∈ C such that limn→∞ xn = q. Step5. We show that yn → q, as n → ∞. Let Dn = {z ∈ C : kyn − zk2 ≤ kxn − zk2 + L4n (Ln − 1)(Ln + 1)}. From the definition of Dn , we have Dn = {z ∈ C : hyn − z, yn − zi ≤ hxn − z, xn − zi + L4n (Ln − 1)(Ln + 1)} = {z ∈ C : kyn k2 − 2hyn , zi + kzk2 ≤ kxn k2 − 2hxn , zi + kzk2 + L4n (Ln − 1)(Ln + 1)} = {z ∈ C : 2hxn − yn , zi ≤ kxn k2 − kyn k2 + L4n (Ln − 1)(Ln + 1)} This shows that Dn is convex and closed, n ∈ Z+ ∪ {0}. Next, we want to prove that Cn ⊂ Dn , n ≥ 0. In fact, for any z ∈ Cn , we have kyn − zk2 ≤ [L2n (1 + (Ln − 1)αn βn )]2 kxn − zk2 = kxn − zk2 L4n + L4n [2(Ln − 1)αn βn + (Ln − 1)2 α2n βn2 ]kxn − zk2 ≤ kxn − zk2 L4n + L4n [2(Ln − 1) + (Ln − 1)2 ]kxn − zk2 = kxn − zk2 L4n + L4n (Ln − 1)(Ln + 1)kxn − zk2 . From Cn = {z ∈ C : kyn − zk ≤ [L2n (1 + (Ln − 1)αn βn )]kxn − zk} ∩ A,

n ≥ 0,

we have Cn ⊂ A, n ≥ 0. Since A is convex, we also have coCn ⊂ A, n ≥ 0. Consider xn ∈ coCn−1 , we know that kyn − zk ≤ kxn − zk2 L4n + L4n (Ln − 1)(Ln + 1)kxn − zk2 ≤ kxn − zk2 + L4n (ln − 1)(Ln + 1). This implies that z ∈ Dn and hence Cn ⊂ Dn , n ≥ 0. Since Dn is convex, we have co(Cn ) ⊂ Dn , n ≥ 0. Therefore kyn − xn+1 k2 ≤ kxn − xn+1 k2 + L4n (Ln − 1)(Ln − 1) → 0

1212

Ahmad ET AL 1208-1216

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

as n → ∞. That is, yn → q as n → ∞. Step 6. We show that q ∈ F . From the definition of yn , we have (1 + αn βn Tn )kTn xn − xn k = kyn − xn k → 0 as n → ∞. Since αn ∈ (a, 1] ⊂ [0, 1], from the above limit we have lim → ∞kTn xn − xn k = 0. n

Since {Tn } is uniformly closed and xn → q, we have q ∈ F . Step 7. We claim that q = z0 = PF x0 , if not, we have that kx0 − pk > kx0 − z0 k. There must exist a positive integer N , if n > N then kx0 − xn k > kx0 − z0 k, which leads to kz0 − xn k2 = kz0 − xn + xn − x0 k2 = kz0 − xn k2 + kxn − x0 k2 + 2hz0 − xn , xn − x0 i. It follows that hz0 − xn , xn − x0 i < 0 which implies that z0∈Qn , so that z0 ∈F , this is a contradiction. This completes the proof. Now, we present an example of Cn which does not involve a convex subset. Corollary 3.2. Let C be a closed convex subset of a Hilbert space H, and let T be a closed quasi-nonexpansive mapping from C into itself. Assume that αn ∈ (0, 1], and βn ∈ [0, 1] for all n ∈ N . Then {xn } generated by   x ∈ C = Q0 , choosen arbitrarily,   0    yn = T zn , n ≥ 0,      zn = (1 − αn )T xn + αn T tn , n ≥ 0, tn = (1 − βn ) + βn T xn , n ≥ 0,   Cn = {z ∈ C : kyn − zk ≤ kxn − zk} ∩ A, n ≥ 0,     Qn = {z ∈ Qn−1 : hxn − z, x0 − xn i ≥ 0}, n ≥ 1,     xn+1 = PCn ∩Qn x0 converges strongly to PF x0 .

Proof. Take Tn ≡ T , Ln ≡ 1 in Theorem 3.1, in this case, Cn is convex and closed and , for all n ≥ 0, by using Theorem 3.1, we obtain Corollary 3.2. Corollary 3.3. Let C be a closed convex subset of a Hilbert space H, and let T be a nonexpansive mapping from C into itself. Assume that αn ∈ (0, 1], and βn ∈ [0, 1] for all n ∈ N . Then {xn } generated by   x ∈ C = Q0 , choosen arbitrarily,   0    y = T zn , n ≥ 0,   n    zn = (1 − αn )T xn + αn T tn , n ≥ 0, tn = (1 − βn ) + βn T xn , n ≥ 0,    Cn = {z ∈ C : kyn − zk ≤ kxn − zk} ∩ A, n ≥ 0,     Qn = {z ∈ Qn−1 : hxn − z, x0 − xn i ≥ 0}, n ≥ 1,     xn+1 = PCn ∩Qn x0 converges strongly to PF x0 .

1213

Ahmad ET AL 1208-1216

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

Applications

Here, we give an application of our result for the following case of finite family of asymp−1 totically quasi-nonexpansive mappings {Tn }N n=0 . Let kTij x − pk ≤ ki,j kx − pk,

∀x ∈ C, p ∈ F,

−1 {Tn}N n=0 ,

where F is common fixed point set of limj→∞ ki,j = 1 for all 0 ≤ i ≤ N − 1. −1 The finite family of asymptotically quasi-nonexpansive mappings {Tn}N n=0 is uniformly L-Lipschitz if kTij x − Tij yk ≤ Li,j kx − yk, ∀x, y ∈ C for all i ∈ {0, 1, 2, ..., N − 1}, j ≥ 1, where L ≥ 1. −1 Theorem 4.1. Let C be a closed convex subset of a Hilbert space H, and {Tn }N n=0 : C → C be finite uniformly L-Lipschitz family of asymptotically quasi-nonexpansive mappings with the nonempty common fixed point set F . Assume that αn ∈ (0, 1], and βn ∈ [0, 1] for all n ∈ N . Then {xn } generated by  x0 ∈ C = Q0 , choosen arbitrarily,     j(n)   yn = Ti(n) zn , n ≥ 0,    j(n) j(n)   zn = (1 − αn )Ti(n) xn + αn Ti(n) tn , n ≥ 0,     j(n) tn = (1 − βn ) + βn Ti(n) xn , n ≥ 0,   Cn = {z ∈ C : kyn − zk ≤ ki(n),j(n)      (1 + (ki(n),j(n) − 1)αn β)kxn − zk} ∩ A, n ≥ 0,      Qn = {z ∈ Qn−1 : hxn − z, x0 − xn i ≥ 0}, n ≥ 1,    xn+1 = PcoCn ∩Qn x0

converges strongly to PF x0 , where coCn denotes the closed convex closure of Cn for all n ≥ 1, n = (j(n) − 1)N + i(n) for all n ≥ 0 and A = {z ∈ H : kz − PF x0 k ≤ 1}.

Proof. We can drive the prove from the following two conclusions. N −1 ∞ Conclusion 1 {Tn=0 }n=0 is a uniformly closed asymptotically family of countable quasi-Ln -Lipschitz mappings from C into itself. Conclusion 2 T T j(n) F = N F (T ) = ∞ n n=0 n=0 F (Ti(n) ), where F (Tn ) denotes the fixed point set of the mappings Tn . Corollary 4.2. Let C be a closed convex subset of a Hilbert space H, and T : C → C be a L-Lipschitz asymptotically quasi-nonexpansive mapping with the nonempty common fixed point set F . Assume that αn ∈ (0, 1], and βn ∈ [0, 1] for all n ∈ N . Then {xn } generated by   x0 ∈ C = Q0 , choosen arbitrarily,     yn = T n zn , n ≥ 0,     zn = (1 − αn )T n xn + αn T n zn , n ≥ 0,  tn = (1 − βn ) + βn T n xn , n ≥ 0,    Cn = {z ∈ C : kyn − zk ≤ kn (1 + (kn − 1)αn β)kxn − zk} ∩ A, n ≥ 0,      Qn = {z ∈ Qn−1 : hxn − z, x0 − xn i ≥ 0}, n ≥ 1,     xn+1 = PcoCn ∩Qn x0 1214

Ahmad ET AL 1208-1216

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

converges strongly to PF x0 , where coCn denotes the closed convex closure of Cn for all n ≥ 1, A = {z ∈ H : kz − PF x0 k ≤ 1}. Proof. Take Tn ≡ T in Theorem 4.1, we get the desired result.

References [1] M. Barnsley, Fractals everywhere, Academic Press, Inc., Boston, MA, 1988. [2] H. H. Bauschke and P. L. Combettes, A weak-to-strong convergence principle for Fej´ermonotone methods in Hilbert spaces, Math. Oper. Res., 26 (2001), 248–264. [3] R. F. Brown, Fixed Point Theory and Its Applications, Amer. Math. Soc., Providence, 1988. [4] W. Fenchel and J. Nielsen, Discontinuous groups of isometries in the hyperbolic plane, De Gruyter Studies in Mathematics, vol. 29, Walter de Gruyter, 2003. [5] A. Genel and J. Lindenstrass, An example concerning fixed points, Israel. J. Math., 22 (1975), 81–86. [6] J. R. Giles, Introduction to the analysis of metric spaces, Australian Mathematical Society Lecture Series, vol. 3, Cambridge University Press, Cambridge, 1987. [7] A. Granas and J. Dugundji Fixed point theory, Springer Monographs in Mathematics, Springer-Verlag, New York, 2003. [8] J. Guan, Y. Tang, P. Ma, Y. Xu and Y. Su, Non-convex hybrid algorithm for a family of countable quasi-Lipscitz mappings and applications, Fixed Point Theory Appl., 2015 (2015), Article ID 214, 11 pages. [9] T. H. Kim and H. K. Xu, Strong convergence of modified Mann iterations for asymptotically mappings and semigroups, Nonlinear Anal., 64 (2006), 1140–1152. [10] Y. C. Kwun, W. Nazeer, M. Munir and S. M. Kang, Applications and strong convergence theorems of asymptotically nonexpansive non-self mappings, J. Comput. Anal. Appl., 24 (2018), 1553–1564. [11] S. Lefschetz, On the fixed point formula, Ann. Math., 38 (1037), 819–822. [12] Y. Liu, L. Zheng, P. Wang and H. Zhou, Three kinds of new hybrid projection methods for a finite family of quasi-asymptotically pseudocontractive mappings in Hilbert spaces, Fixed Point Theory Appl., 2015 (2015), Article ID 118, 13 pages. [13] W. R. Mann, Mean value methods in iteration, Proc. Amer. Math. Soc., 4 (1953), 506–510. [14] C. Martinez-Yanes and H. K. Xu, Strong convergence of the CQ method for fixed point iteration processes, Nonlinear Anal., 64 (2006), 2400–2411. [15] S. Y. Matsushita and W. Takahashi, A strong convergence theorem for relatively nonexpansive mappings in a Banach space, J. Approx Theory, 134 (2005), 257–266.

1215

Ahmad ET AL 1208-1216

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[16] K. Nakajo and W. Takahashi, Strong convergence theorems for nonexpansive mappings and nonexpansive semigroups, J. Math. Anal. Appl., 279 (2003), 372–379. [17] S. F. A. Naqvi and M. S. Khan, On the viscosity rule for common fixed points of two nonexpansive mappings in Hilbert spaces, Open J. Math. Sci., 1 (2017), 110–125. [18] W. Nazeer, S. M. Kang, M. Munir and S. Kausar, Strong convergence theorems of non-convex hybrid algorithm for quasi-Lipschitz mappings, J. Comput. Anal. Appl., 24 (2018), 1313–1321. [19] W. Nazeer, S. M. Kang, M. Munir and S. Kausar, Strong convergence theorems for a non-convex hybrid method for quasi-Lipschitz mappings and applications, J. Comput. Anal. Appl., 24 (2018), 1455–1463. [20] W. Nazeer, M. Munir, A. R. Nizami, S. Kausar and S. M. Kang, Non-convex hybrid algorithms for a family of countable quasi-lipschitz mappings corresponding to Khan iterative process and applications, J. Appl. Math. Inform., 35 (2017), 313–321. [21] Y. Su and X. Qin, Monotone CQ iteration processes for nonexpansive semigroups and maximal monotone operators, Nonlinear Anal., 68 (2008), 3657–3664. [22] Z. Tian, M. Zarepisheh, X. Jia and S. B. Jiang, The fixed-point iteration method for IMRT optimization with truncated dose deposition coefficient matrix, arXiv:1303.3504 [physics.med-ph], 2013, 16 pages. [23] D. C. Youla, Mathematical theory of image restoration by the method of convex projections, Image Recovery: Theory and Application, 1987, pp. 29–77. [24] E. Zeidler, Applied functional analysis, Main principles and their application, Applied Mathematical Sciences, Springer-Verlag New York, 1995.

1216

Ahmad ET AL 1208-1216

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

SOME COMMON FIXED POINT THEOREMS IN ω-ORBITALLY COMPLETE MODULAR METRIC SPACES VIA C-CLASS FUNCTIONS AND APPLICATION BAHMAN MOEINI1 , ARSLAN HOJAT ANSARI2 , CHOONKIL PARK3∗ Abstract. In this paper, some notions are introduced in modular metric spaces. Next some common fixed points are established in ω-orbitally complete modular metric spaces by employing C-class functions that extend and generalize the results of [10, 18]. Finally, for usibility of our results an application is provided to show the existence of solutions for certain system of integral equations.

1. Introduction In 1976, Jungck [8] initiated a study of common fixed points of commuting mappings. On the other hand, in 1982, Sessa [17] initiated the tradition of improving commutativity in fixed point theorems by introducing the notion of weakly commuting maps in metric spaces. After this, Jungck [7] gave the concept of weakly compatible mappings. In 2008, Chistyakov [5] introduced the notion of modular metric spaces generated by F modular and developed the theory of this space. In 2010, Chistyakov [6] defined the notion of modular on an arbitrary set and developed the theory of metric spaces generated by modular, which are called the modular metric spaces. Recently, Mongkolkeha et al. [11, 12] and Parya et al. [14] have introduced some notions and established some fixed point results in modular metric spaces. See [2, 4] for more information on fixed point results. In this paper, some notions such as “ω-orbit, ω-orbitally complete modular metris space, ω-asymptotically regular mapping” are introduced. Continuation, existence and uniqueness results are proved for common fixed points of three self-mappings in ω-orbitally complete modular metric spaces via C-class functions. Also, suitable examples are provided to demonstrate the usability of the hypotheses of our results. Finally, these results are applied to prove the existence of solutions of a system of integral equations. 2. Basic notions Definition 2.1. [14] Let X be a vector space over R (or C). A functional ρ : X → [0, ∞) is called a modular if it satisfies the following three conditions: (i) ρ(x) = 0 if and only if x = 0; (ii) ρ(αx) = ρ(x) for all scalar α with |α| = 1 and x, y ∈ X; (iii) ρ(αx + βy) ≤ ρ(x) + ρ(y), whenever α, β ≥ 0 and α + β = 1. If we replace (iii) by (iv) ρ(αx + βy) ≤ αs ρ(x) + β s ρ(y) whenever α, β ≥ 0 and αs + β s = 1 with an s ∈ (0, 1], Date: Received: xxxxxx; Revised: yyyyyy; Accepted: zzzzzz. ∗ Corresponding author. 2010 Mathematics Subject Classification. Primary 47H10; 54H25. Key words and phrases. ω-orbit, modular metric space, C-class function, common fixed point, system of integral equations.

1217

BAHMAN MOEINI ET AL 1217-1228

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

B. MOEINI, A.H. ANSARI, C. PARK

then the modular ρ is called an s-convex modular and if s = 1, then ρ is called a convex modular. If ρ is modular in X, then the set, defined by Xρ = {x ∈ X : ρ(λx) → 0 as λ → 0+ }, is called a modular space. Xρ is a vector subspace of X and it can be equipped with an F -norm defined by setting x kxkρ = inf{λ > 0 : ρ( ) ≤ λ}, x ∈ X. λ In addition, if ρ is convex, then the modular space Xρ coincides with Xρ∗ = {x ∈ X : ∃λ = λ(x) > 0 such that ρ(λx) < ∞}

(2.1)

and the functional kxk∗ρ = inf{λ > 0 : ≤ 1} is an ordinary norm on Xρ∗ which is equivalent to kxkρ (see [13]). Let X be a nonempty set and λ ∈ (0, ∞). A function ω : (0, ∞) × X × X → [0, ∞] will be written as ωλ (x, y) = ω(λ, x, y) for all λ > 0 and x, y ∈ X. ρ( λx )

Definition 2.2. [5] Let X be a nonempty set. A function ω : (0, ∞) × X × X → [0, ∞] is said to be a modular metric on X if it satisfies the following three axioms: (i) given x, y ∈ X, ωλ (x, y) = 0 for all λ > 0 if and only if x = y; (ii) ωλ (x, y) = ωλ (y, x) for all λ > 0 and x, y ∈ X; (iii) ωλ+µ (x, y) ≤ ωλ (x, z) + ωµ (z, y) for all λ > 0 and x, y, z ∈ X. If, instead of (i), we have the condition (i0 ) ωλ (x, x) = 0 for all λ > 0 and x ∈ X, then ω is said to be a (metric) pseudo modular on X. Assume that ω satisfies (i0 ), (iii) and (i00 ) given x, y ∈ X, if there exists a number λ > 0, possibly depending on x and y, such that ωλ (x, y) = 0, then x = y. Then ω is called a strict modular metric on X. A modular (pseudo modular, strict modular) on X is said to be convex if, instead of (iii), we replace the following condition: µ λ (iv) ωλ+µ (x, y)  λ+µ ωλ (x, z) + λ+µ ωµ (z, y) for all λ, µ > 0 and x, y, z ∈ X. Clearly, if ω is a strict modular metric, then ω is a modular metric, which in turn implies that ω is a pseudo modular metric on X, and similar implications hold for convex ω. The essential property of a (pseudo) modular metric ω on a set X is as follows: given x, y ∈ X, the function 0 < λ → ωλ (x, y) ∈ [0, ∞] is nonincreasing on (0, ∞). In fact, if 0 < µ < λ, then we have ωλ (x, y) ≤ ωλ−µ (x, x) + ωµ (x, y) = ωµ (x, y). It follows that at each point λ > 0 the right limit ωλ+0 (x, y) := limε→+0 ωλ+ε (x, y) and the left limit ωλ−0 (x, y) := limε→+0 ωλ−ε (x, y) exist in [0, ∞] and the following two inequalities hold: ωλ+0 (x, y) ≤ ωλ (x, y) ≤ ωλ−0 (x, y). It can be checked that if x0 ∈ X, then the set Xω = {x ∈ X : lim ωλ (x, x0 ) = 0} λ→∞

is a metric space, called a modular space, whose metric is given by d0ω = inf{λ > 0 : ωλ (x, y) ≤ λ} for all x, y ∈ Xω . Moreover, if ω is convex, then the modular set Xω is equal to Xω∗ = {x ∈ X : ∃ λ = λ(x) > 0 such that ωλ (x, x0 ) < ∞} and metrizable by d∗ω = inf{λ > 0 : ωλ (x, y) ≤ 1} for all x, y ∈ Xω∗ .

1218

BAHMAN MOEINI ET AL 1217-1228

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FIXED POINT THEOREMS IN ω-ORBITALLY MODULAR METRIC SPACES

We know that if X is a real linear space, ρ : X → [0, ∞) and x−y ωλ (x, y) = ρ( ) for all λ > 0 and x, y ∈ X, λ then ρ is modular (convex modular) on X if and only if ω is modular metric (convex modular metric, respectively) on X. On the other hand, assume that ω satisfies the following two conditions: (i) ωλ (µx, 0) = ω λ (x, 0) for all λ, µ > 0 and x ∈ X; µ

(ii) ωλ (x + z, y + z) = ωλ (x, y) for all λ > 0 and x, y, z ∈ X. If we set ρ(x) = ω1 (x, 0) with (2.1), x ∈ X, then Xρ = Xω is a linear subspace of X and the functional kxkρ = d0ω (x, 0), x ∈ Xρ , is an F -norm on Xρ . If ω is convex, then Xρ∗ ≡ Xω∗ = Xρ is a linear subspace of X and the functional kxkρ = d∗ω (x, 0), x ∈ Xρ∗ , is a norm on Xρ∗ . Similar assertions hold if we replace the word modular by pseudo modular. If ω is modular metric in X, then the set Xω is called a modular metric space. By the idea of property in metric spaces and modular spaces, we define the following: Definition 2.3. Let Xω be a modular metric space. (1) The sequence (xn )n∈N in Xω is said to be ω-convergent to x ∈ Xω if ωλ (xn , x) → 0 as n → ∞ for all λ > 0. (2) The sequence (xn )n∈N in Xω is said to be ω-Cauchy if ωλ (xm , xn ) → 0 as m, n → ∞ for all λ > 0. (3) A subset C of Xω is said to be ω-closed with if the limit of a convergent sequence of C always belongs to C. (4) A subset C of Xω is said to be ω-complete if any ω-Cauchy sequence in C is a convergent sequence and its limit is in C. (5) A subset C of Xω is said to be ω-bounded if for all λ > 0 δω (C) = sup{ωλ (x, y); x, y ∈ C} < ∞. Example 2.4. Let (X, k.k) be a norm space. Then a function ω : (0, ∞) × X × X → [0, ∞], defined by ωλ (x, y) = kx − yk, for all x, y ∈ X and λ > 0, is a modular metric. Example 2.5. Let (X, k.k) be a norm space. Then a function ω : (0, ∞) × X × X → [0, ∞] defined by x−y k ωλ (x, y) = k k , for all x, y ∈ X, k ≥ 1 and λ > 0, λ is a modular metric. Example 2.6. Let Z ϕ(v, |f (v)|)dµ(v),

ρ(f ) = Ω

where µ is a σ-finite measure on Ω and ϕ : Ω × [0, ∞) → [0, ∞) satisfies the following conditions: (i) ϕ(v, u) is a continuous even function of u which is nondecreasing for u > 0, such that ϕ(v, 0) = 0, ϕ(v, u) > 0 for u 6= 0 and ϕ(v, u) → ∞ as u → ∞. (ii) ϕ(v, u) is a measurable function of v for each u ∈ R. The corresponding modular space is called a Musielak-Orlicz (or a generalized Orlicz) modular function space and is denoted by Lϕ . If ϕ does not depend on the first variable, then Lϕ is called an Orlicz space. Then Lϕ is isomorphic to LP . An example of functions which satisfy the above conditions is given by ϕ(u) = |u|p , for p > 0.

1219

BAHMAN MOEINI ET AL 1217-1228

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

B. MOEINI, A.H. ANSARI, C. PARK

Now, if we define ω : (0, ∞) × X × X → [0, ∞] by Z ωλ (f, g) = ϕ(v, |f (v) − g(v)|)dµ(v), Ω

where µ and ϕ satisfy the above coditions, then ω is a modular metric. Also, if ω : (0, ∞) × X × X → [0, ∞] is defined by Z ϕ(v, |

ωλ (f, g) = Ω

f (v) − g(v) |)dµ(v), λ

then ω is a modular metric. In the following, we give some useful notions in modular metric space that will be needed to prove our results. Definition 2.7. Let Xω be a modular metric space. Let f, g be self-mappings of Xω . A point x in Xω is called a coincidence point of f and g if and only if f x = gx. We shall call w = f x = gx a point of coincidence of f and g. Let C(f, S) and P C(f, S) denote the set of coincidence points and points of coincidence, respectively, of the pair (f, S). Definition 2.8. Let Xω be a modular metric space. Two self-mappings f and g of Xω are said to be compatible if and only if limn→∞ ωλ (f Sxn , Sf xn ) = 0, whenever {xn } is a sequence in Xω such that limn→∞ f xn = limn→∞ Sxn = z for some z ∈ Xω . Definition 2.9. Let Xω be a modular metric space. Two self-mappings f and g of Xω are said to be weakly compatible if they commute at coincidence points. Lemma 2.10. Let Xω be a modular metric space and {yn } be a sequence in Xω such that limn→∞ ωλ (yn , yn+1 ) = 0 for each λ > 0. If {yn } is not an ω-Cauchy sequence in Xω , then there exist 0 > 0, λ0 > 0 and two sequences {mi } and {ni } of positive integers such that (i) mi > ni + 1 and ni → ∞ as i → ∞, (ii) ω2λ0 (ymi , yni ) > 0 and ω2λ0 (ymi −1 , yni ) ≤ 0 , i = 1, 2, 3, · · · . Proof. If {yn } is not an ω-Cauchy sequence in Xω , then there exist 0 > 0, λ0 > 0 such that for each positive integers i, there exist positive integers mi , ni with mi > ni such that ω2λ0 (ymi , yni ) > 0 .

(2.2)

For i = 1, 2, ..., let mi be the least positive integer exceeding ni satisfying (2.2), that is, for i = 1, 2, ..., ω2λ0 (ymi , yni ) > 0 , ω2λ0 (ymi −1 , yni ) ≤ 0 . Since limi→∞ ωλ (yni , yni +1 ) = 0 for all λ > 0, ω2λ0 (yni , yni +1 ) ≤ 0 and thus mi > ni + 1 and ni → ∞ as i → ∞.



In the following, we present C-class functions and some examples of them. Definition 2.11. [3] A mapping F : [0, ∞)2 → R is called a C-class function if it is continuous and satisfies the following axioms: (1) F (s, t) ≤ s; (2) F (s, t) = s implies that either s = 0 or t = 0 for all s, t ∈ [0, ∞). Note for some F we have that F (0, 0) = 0. We denote the set of C-class functions by C.

1220

BAHMAN MOEINI ET AL 1217-1228

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FIXED POINT THEOREMS IN ω-ORBITALLY MODULAR METRIC SPACES

Example 2.12. [3] The following functions F : [0, ∞)2 → R are elements of C, for all s, t ∈ [0, ∞): (1) F (s, t) = s − t, F (s, t) = s ⇒ t = 0; (2) F (s, t) = ms, 0 e, F (s, t) = s ⇒ s = 0; r (6) F (s, t) = (s + l)(1/(1+t) ) − l, l > 1, r ∈ (0, ∞), F (s, t) = s ⇒ t = 0; (7) F (s, t) = s logt+a a, a > 1, F (s, t) = s ⇒ s = 0 or t = 0; 1+s t (8) F (s, t) = s − ( 2+s )( 1+t ), F (s, t) = s ⇒ t = 0; (9) F (s, t) = sβ(s), β : [0, ∞) → [0, 1), and is continuous, F (s, t) = s ⇒ s = 0; t (10) F (s, t) = s − k+t , F (s, t) = s ⇒ t = 0; (11) F (s, t) = s − ϕ(s), F (s, t) = s ⇒ s = 0, here ϕ : [0, ∞) → [0, ∞) is a continuous function such that ϕ(t) = 0 ⇔ t = 0; (12) F (s, t) = sh(s, t), F (s, t) = s ⇒ s = 0, here h : [0, ∞)×[0, ∞) → [0, ∞) is a continuous function such that h(t, s) < 1 for all t, s > 0; 2+t (13) F (s, t) = s − ( 1+t )t, F (s, t) = s ⇒ t = 0; p (14) F (s, t) = n ln(1 + sn ), F (s, t) = s ⇒ s = 0; (15) F (s, t) = φ(s), F (s, t) = s ⇒ s = 0, here φ : [0, ∞) → [0, ∞) is a continuous function such that φ(0) = 0, and φ(t) < t for t > 0; s (16) F (s, t) = (1+s) r ; r ∈ (0, ∞), F (s, t) = s ⇒ s = 0. Definition 2.13. [9] A function ψ : [0, ∞) → [0, ∞) is called an altering distance function if the following properties are satisfied: (i) ψ is nondecreasing and continuous, (ii) ψ (t) = 0 if and only if t = 0. Remark 2.14. We denote by Ψ the set of altering distance functions. Definition 2.15. [3] An ultra altering distance function is a continuous, nondecreasing mapping ϕ : [0, ∞) → [0, ∞) such that ϕ(t) > 0, t > 0 and ϕ(0) ≥ 0. Remark 2.16. We denote by Φu the set of ultra altering distance functions. Definition 2.17. A tripled (ψ, ϕ, F ) where ψ ∈ Ψ, ϕ ∈ Φu and F ∈ C, is said to be monotone if for all x, y, z, t ∈ [0, ∞) x 6 y =⇒ F (ψ(x), ϕ(x)) 6 F (ψ(y), ϕ(y)). √ Example 2.18. Let F (s, t) = s − t, ϕ(x) = x and (√ x if 0 ≤ x ≤ 1, ψ(x) = 2 x if x > 1. Then (ψ, ϕ, F ) is monotone. Example 2.19. Let F (s, t) = s − t, ϕ(x) = x2 and (√ x if 0 ≤ x ≤ 1, ψ(x) = 2 x if x > 1. Then (ψ, ϕ, F ) is not monotone.

1221

BAHMAN MOEINI ET AL 1217-1228

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

B. MOEINI, A.H. ANSARI, C. PARK

3. Main results In this section, we present and introduce some notions in modular metric spaces which extend the same notions of Phaneendra [15], Sastry et al. [16], Aamri and Mountawaki [1]. Next by idea of Liu et al. [10] and Swatmaram et al. [18] and using C-class functions, some common fixed point theorems will be established in ω Definition 3.1. Let Xω be a modular metric space. For given x0 ∈ Xω and self-mappings f, S and T on Xω , if there exists a sequence {xn }∞ n=0 in Xω such that Sx2n = f x2n+1 , T x2n+1 = f x2n+2 , then O(S, T, f, x0 ) = {f xn : n = 0, 1, 2, · · · } is called an (S, T )-ω-orbit at x0 with respect to f. Definition 3.2. The space Xω is called ω-orbitally complete at x0 if and only if every ωCauchy sequence in O(S, T, f, x0 ) converges in Xω . Definition 3.3. The pair (S, T ) is ω-asymptotically regular at x0 with respect to f if there exists a sequence {xn }∞ n=0 in Xω such that Sx2n = f x2n+1 , T x2n+1 = f x2n+2 and ωλ (f xn , f xn+1 ) → 0 as n → ∞ for all λ > 0. Definition 3.4. Self-mappings f and S satisfy property (E.A) if there exists a sequence {xn }∞ n=1 in Xω such that limn→∞ ωλ (f xn , z) = limn→∞ ωλ (Sxn , z) = 0 for some z ∈ Xω and all λ > 0. Theorem 3.5. Let f, S and T be self-mappings on a modular metric space Xω satisfying the inequality   ψ(ωλ (Sx, T y) ≤ F ψ(M (x, y)), ϕ(W (M (x, y))) , ∀λ > 0, (3.1) for all x, y ∈ Xω , where ψ ∈ Ψ, ϕ ∈ Φu , F ∈ C, M (x, y) = max{ωλ (f x, f y), ωλ (f x, Sx), ωλ (f y, T y), ωλ (f x, T y), ωλ (f y, Sx)} and W : [0, ∞) → [0, ∞) is a continuous mapping such that W (t) < t for t > 0. Suppose that (a) either (f, S) or (f, T ) satisfies the property (E.A); (b) f (Xω ) is an ω-orbitally complete subspace of Xω ; (c) (f, S) or (f, T ) is weakly compatible. Then f, S and T have a unique common fixed point. Proof. By the property (E.A) for the pair (f, S), we have lim ωλ (f xn , z) = lim ωλ (Sxn , z) = 0, for some z ∈ Xρ and all λ > 0.

n→∞

n→∞

(3.2)

Let limn→∞ ωλ (T xn , p) = 0 for all λ > 0. Now we prove that p = z. By using (3.1) for x = xn and y = xn , we have  ψ(ωλ (Sxn , T xn ) ≤ F ψ(max{ωλ (f xn , f xn ), ωλ (f xn , Sxn ), ωλ (f xn , T xn ), ωλ (f xn , T xn ), ωλ (f xn , Sxn )}), ϕ(W (max{ωλ (f xn , f xn ), ωλ (f xn , Sxn ),  ωλ (f xn , T xn ), ωλ (f xn , T xn ), ωλ (f xn , Sxn )})) , ∀λ > 0.

1222

BAHMAN MOEINI ET AL 1217-1228

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FIXED POINT THEOREMS IN ω-ORBITALLY MODULAR METRIC SPACES

Applying the limit as n → ∞ and then using (3.2), we get   ψ(ωλ (z, p) ≤ F ψ(max{0, 0, ωλ (z, p), ωλ (z, p), 0}), ϕ(W (max{0, 0, ωλ (z, p), ωλ (z, p), 0)})   = F ψ(ωλ (z, p)), ϕ(W (ωλ (z, p)) ≤ ψ(ωλ (z, p)), ∀λ > 0 and so, for all λ > 0, ψ(ωλ (z, p)) = 0 or ϕ(W (ωλ (z, p))) = 0. Thus z = p and hence lim ωλ (f xn , z) = lim ωλ (Sxn , z) = lim ωλ (T xn , z) = 0, ∀λ > 0.

n→∞

n→∞

n→∞

(3.3)

(3.3) can also be obtained in similar lines whenever (f, T ) satisfies the property (E.A). From the ω-orbital completeness f (Xω ), we see that z ∈ f (Xω ) so that z = f u for some u ∈ Xω . Now, taking x = u and y = xn in (3.1), we get  ψ(ωλ (Su, T xn ) ≤ F ψ(max{ωλ (f u, f xn ), ωλ (f u, Su), ωλ (f xn , T xn ), ωλ (f u, T xn ), ωλ (f xn , Su)}), ϕ(W (max{ωλ (f u, f xn ), ωλ (f u, Su),  ωλ (f xn , T xn ), ωλ (f u, T xn ), ωλ (f xn , Su)})) , ∀λ > 0. Applying the limit as n → ∞ and then using (3.3) and f u = z, we get  ψ(ωλ (Su, f u) ≤ F ψ(max{0, ωλ (f u, Su), 0, 0, ωλ (f u, Su)}),  ϕ(W (max{0, ωλ (f u, Su), 0, 0, ωλ (f u, Su)})   = F ψ(ωλ (f u, Su)), ϕ(W (ωλ (f u, Su)) ≤ ψ(ωλ (f u, Su)), ∀λ > 0 and so, for all λ > 0, ψ(ωλ (f u, Su)) = 0 or ϕ(W (ωλ (f u, Su))) = 0. Therefore, f u = Su = z. Then from the weak compatibility of (f, S), we see that f Su = Sf u or f z = Sz. Again letting x = y = z in (3.1) and using f z = Sz, we obtain   ψ(ωλ (Sz, T z) ≤ F ψ(ωλ (Sz, T z)), ϕ(W (ωλ (Sz, T z)) ≤ ψ(ωλ (Sz, T z)), ∀λ > 0. That is, f z = Sz = T z.

(3.4)

Again, taking x = xn , y = z in (3.1), we get  ψ(ωλ (Sxn , T z) ≤ F ψ(max{ωλ (f xn , f z), ωλ (f xn , Sxn ), ωλ (f z, T z), d(f xn , T z), ωλ (f z, Sxn )}), ϕ(W (max{ωλ (f xn , f z), ωλ (f xn , Sxn ),  ωλ (f z, T z), ωλ (f xn , T z), ωλ (f z, Sxn )})) , ∀λ > 0. As n → ∞, this along with (3.3) and (3.4) implies that   ψ(ωλ (z, T z) ≤ F ψ(ωλ (z, T z)), ϕ(W (ωλ (z, T z)) ≤ ψ(ωλ (z, T z)), ∀λ > 0. That is, z = T z. Thus z is a common fixed point of self-mappings f, S and T .

1223

BAHMAN MOEINI ET AL 1217-1228

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

B. MOEINI, A.H. ANSARI, C. PARK

On the other hand, with minor changes in the above proof, we can prove that f u = T u = z. Suppose that the pair (f, T ) is weakly compatible. Then f T u = T f u or f z = T z. Proceeding as in the previous steps, we get that f z = T z = Sz = z. Let z, z 0 be two common fixed points of f, S and T . Then from (3.1) with x = z and y = z, we get  ψ(ωλ (z, z 0 ) = ψ(ωλ (Sz, T z 0 ) ≤ F ψ(max{ωλ (f z, f z 0 ), ωλ (f z, Sz), ωλ (f z 0 , T z 0 ), ωλ (f z, T z 0 ), ωλ (f z 0 , Sz)}), ϕ(W (max{ωλ (f z, f z 0 ), ωλ (f z, Sz),  ωλ (f z 0 , T z 0 ), ωλ (f z, T z 0 ), ωλ (f z 0 , Sz)})) , ∀λ > 0, and thus   ψ(ωλ (z, z 0 ) ≤ F ψ(ωλ (z, z 0 )), ϕ(W (ωλ (z, z 0 )) ≤ ψ(ωλ (z, z 0 )), ∀λ > 0, which implies that z = z 0 . Hence the fixed point is unique.



With the same proof of Theorem 3.5, we have the following corollaries. Corollary 3.6. If in Theorem 3.5, we replace (3.1) with   ψ(ωλ (Sx, T y)) ≤ F ψ(M (x, y) − W (M (x, y))), ϕ(M (x, y) − W (M (x, y))) , ∀λ > 0, then f, S and T have a unique common fixed point. Corollary 3.7. If in Theorem 3.5, we replace (3.1) with   ψ(ωλ (Sx, T y)) ≤ F ψ(M (x, y)), ϕ(M (x, y)) , ∀λ > 0, then f, S and T have a unique common fixed point. Theorem 3.8. Let f, S and T be self-mappings on a modular metric space Xω satisfying the inequality   ψ(ωλ (Sx, T y) ≤ F ψ(N (x, y)), ϕ(N (x, y)) , ∀λ > 0, (3.5) for all x, y ∈ Xω , where ψ ∈ Ψ, ϕ ∈ Φu , F ∈ C, such that (ψ, ϕ, F ) is monotone and N (x, y) = max{ω2λ (f x, f y), ω2λ (f x, Sx), ω2λ (f y, T y), ω2λ (f x, T y), ω2λ (f y, Sx)}. Suppose that at some x0 ∈ Xω , (a) the pair (S, T ) is ω-asymptotically regular with respect to f ; (b) the space Xω is ω-orbitally complete; (c) (f, S) or (f, T ) is a commuting pair. Then f, S and T have a unique common fixed point. Proof. Since (S, T ) is ω-asymptotically regular with respect to f at x0 , there exists a sequence {xn } in Xω such that Sx2n = f x2n+1 , T x2n+1 = f x2n+2 for n = 0, 1, 2, · · · and ωλn = ωλ (f xn , f xn+1 ) → 0 as n → ∞, ∀λ > 0.

(3.6)

We will show that {f xn } is an ω-Cauchy sequence. Suppose that the result is not true. Then there exist 0 > 0, λ0 > 0 and two sequences {mi } and {ni } of positive integers such that

1224

BAHMAN MOEINI ET AL 1217-1228

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FIXED POINT THEOREMS IN ω-ORBITALLY MODULAR METRIC SPACES

(A) mi > ni + 1 and ni → ∞ as i → ∞, (B) ω2λ0 (f xmi , f xni ) > 0 and ω2λ0 (f xmi −1 , f xni ) ≤ 0 , i = 1, 2, 3, · · · . We have ε0 < ω2λ0 (f xmi , f xni ) ≤ ωλ0 (f xmi , f xni +1 ) + ωλ0 (f xni +1 , f xni ).

(3.7)

ε0 ≤ ωλ0 (f xmi , f xni +1 ), as i → ∞.

(3.8)

Then Now consider ωλ0 (f xmi , f xni +1 ) in (3.7) and assume that both mi and ni are even. Then by (3.5), we get ψ(ωλ0 (f xni +1 , f xmi )) = ψ(ωλ0 (Sxni , T xmi −1 ))  ≤ F ψ(max{ω2λ0 (f xni , f xmi −1 ), ω2λ0 (f xni , Sxni ), ω2λ0 (f xmi −1 , T xmi −1 ), ω2λ0 (f xni , T xmi −1 ), ω2λ0 (f xmi −1 , Sxni )}), ϕ(max{ω2λ0 (f xni , f xmi −1 ), ω2λ0 (f xni , Sxni ), ω2λ0 (f xmi −1 , T xmi −1 ),  ω2λ0 (f xni , T xmi −1 ), ω2λ0 (f xmi −1 , Sxni )})  = F ψ(max{ω2λ0 (f xni , f xmi −1 ), ω2λ0 (f xni , f xni +1 ), ω2λ0 (f xmi −1 , f xmi ), ω2λ0 (f xni , f xmi ), ω2λ0 (f xmi −1 , f xni +1 )}), ϕ(max{ω2λ0 (f xni , f xmi −1 ), ω2λ0 (f xni , f xni +1 ), ω2λ0 (f xmi −1 , f xmi ),  ω2λ0 (f xni , f xmi ), ω2λ0 (f xmi −1 , f xni +1 )})  ≤ F ψ(max{ω2λ0 (f xni , f xmi −1 ), ω2λ0 (f xni , f xni +1 ), ω2λ0 (f xmi −1 , f xmi ), ωλ0 (f xni , f xni +1 ) + ωλ0 (f xni +1 , f xmi ), ωλ0 (f xmi −1 , f xmi ) + ωλ0 (f xni +1 , f xmi )}), ϕ(max{ω2λ0 (f xni , f xmi −1 ), ω2λ0 (f xni , f xni +1 ), ω2λ0 (f xmi −1 , f xmi ),  ωλ0 (f xni , f xni +1 ) + ωλ0 (f xni +1 , f xmi ), ωλ0 (f xmi −1 , f xmi ) + ωλ0 (f xni +1 , f xmi )}) . By (3.6), (B), (3.8) and taking limit as i → ∞, we get lim ψ(ωλ0 (f xni +1 , f xmi ))  ≤ lim F ψ(max{ε0 , 0, 0, ωλ0 (f xni +1 , f xmi ), ωλ0 (f xni +1 , f xmi )}), i→∞  ϕ(max{ε0 , 0, 0, ωλ0 (f xni +1 , f xmi ), ωλ0 (f xni +1 , f xmi )})   ≤ lim F ψ(ωλ0 (f xni +1 , f xmi )), ϕ(ωλ0 (f xni +1 , f xmi )) i→∞

i→∞

≤ lim ψ(ωλ0 (f xni +1 , f xmi )). i→∞

Thus lim ψ(ωλ0 (f xni +1 , f xmi )) = 0 or

i→∞

lim ϕ(ωλ0 (f xni +1 , f xmi )) = 0

i→∞

and so limi→∞ ωλ0 (f xni +1 , f xmi ) = 0 and then by (3.8) we conclude that ε0 = 0, which is a contradiction. Hence {f xn } is an ω-Cauchy sequence. Thus by the ω-orbital completeness of Xω at x0 , we can find some z ∈ Xω such that limn→∞ f x2n+1 = limn→∞ Sx2n = limn→∞ f x2n+2 = limn→∞ T x2n+1 = z, which immediately implies that the pairs (f, T ) and (S, T ) satisfy the property (E.A). Also every commuting pair is weakly compatible. Since

1225

BAHMAN MOEINI ET AL 1217-1228

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

B. MOEINI, A.H. ANSARI, C. PARK

the function 0 < λ → ωλ (x, y) ∈ [0, ∞] is nonincreasing on (0, ∞), N (x, y) ≤ M (x, y) for all x, y ∈ Xω and hence   ψ(ωλ (Sx, T y) ≤ F ψ(N (x, y)), ϕ(N (x, y))   ≤ F ψ(M (x, y)), ϕ(M (x, y)) , ∀λ > 0, for all x, y ∈ Xω . Therefore, by Corollary 3.7, f, S and T have a unique common fixed point.  Example 3.9. Let X = [0, 1) ∪ {2} and ω : (0, ∞) × X × X → [0, ∞] be defined by ωλ (x, y) = |x−y| for all λ > 0. λ Then Xω is an ω-complete modular metric space. Define f, S, T : Xω → Xω by Sx = T x = 31 x, f x = x for x ∈ X, F (s, t) = s − t, ψ(t) = 2t and ϕ(t) = t. Take x0 = 2 and w(t) = 21 t for t ≥ 0. Then O(x0 , S, T, f ) = { 32n : n = 0, 1, 2, · · · }, f (Xω ) = Xω is ω-orbitally complete at x0 , (f, S) or (f, T ) satisfy the property (E.A), (f, S) or (f, T ) is weakly compatible and for all x, y ∈ Xω , we have 3 2 2 1 1 2 |x − y| ≤ max{|x − y|, x, y, |x − y|, |y − x|} ψ(ωλ (Sx, T y)) = 3λ 2λ 3 3 3 3 = F ψ(M (x, y)), ϕ(W (M (x, y))) .

Therefore, all the conditions of Theorem 3.5 are satisfied and x = 0 is the unique common fixed point of f, S and T . 4. Application to systems of integral equations Consider the following system of integral equations: ( RA u(a) = 0 k1 (a, b, u(b))db + q(a), RA u(a) = 0 k2 (a, b, u(b))db + q(a),

(4.1)

a ∈ J = [0, A], where A > 0. The purpose of this section is to give an existence theorem for a solution of the system (4.1) by using Theorem 3.5. Let X := C(J, Rn ) with the usual supremum norm, i.e., kxkX = maxa∈J kx(a)k for x ∈ C(J, Rn ). Define ω : (0, ∞) × X × X → [0, ∞] by ωλ (x, y) = maxa∈J kx(a)−y(a)k . Then it can λ be checked that Xω is an ω-complete modular metric space. Define f, S, T : Xω → Xω by Z A f x(a) = x(a), Sx(a) = k1 (a, b, x(b))db + q(a), a ∈ [0, A], 0

and Z

A

k2 (a, b, x(b))db + q(a), a ∈ [0, A].

T x(a) = 0

Theorem 4.1. Consider the integral equations (4.1). Assume the following hypotheses: (i) K1 , K2 : [0, A] × [0, A] × Rn → Rn and q : [0, A] → Rn are continuous; (ii) There exists x ∈ X such that Z A x(a) = k1 (a, b, x(b))db + q(a), a, b ∈ [0, A], 0

or Z

A

k2 (a, b, x(b))db + q(a), a, b ∈ [0, A];

x(a) = 0

1226

BAHMAN MOEINI ET AL 1217-1228

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FIXED POINT THEOREMS IN ω-ORBITALLY MODULAR METRIC SPACES

(iii) There exists a sequence {xn } in X such that Z A lim xn (a) = lim k1 (a, b, xn (b))db + q(a) = z, a, b ∈ [0, A], z ∈ X , n→∞

n→∞ 0

or A

Z lim xn (a) = lim

n→∞

n→∞ 0

k1 (a, b, xn (b))db + q(a) = z, a, b ∈ [0, A], z ∈ X ;

(iv) For each a, b ∈ J and u, v ∈ Xω , Z A kk1 (a, b, u(b)) − k2 (a, b, v(b))kdb 0

3 max{ku(a) − v(a)k, ku(a) − Su(a)k, kv(a) − T v(a)k, ku(a) − T v(a)k, 4 kv(a) − Su(a)k}. ≤

Then the system of integral equations (4.1) has a unique solution u∗ in C(J, Rn )ω . Proof. By (i), f, S and T are self-mappings on Xω . By (ii), (f, S) or (f, T ) is weakly compatible, since f is the identity mapping on Xω . By (iii), either (f, S) or (f, T ) satisfies the property (E.A). Also for each u, v ∈ Xω , a, b ∈ J, by (iv), we have Z A kSu(a) − T v(a)k ≤ kk1 (a, b, u(b)) − k2 (a, b, v(b))kdb 0

3 ≤ max{ku(a) − v(a)k, ku(a) − Su(a)k, kv(a) − T v(a)k, ku(a) − T v(a)k, 4 kv(a) − Su(a)k} and so kSu(a) − T v(a)k λ 3 ku(a) − v(a)k ku(a) − Su(a)k kv(a) − T v(a)k ku(a) − T v(a)k ≤ max{ , , , , 4 λ λ λ λ kv(a) − Su(a)k }, ∀λ > 0. λ On routine calculations, we get   ψ(ωλ (Su, T v)) ≤ F ψ(M (u, v)), ϕ(W (M (u, v))) , ∀λ > 0, where ψ(t) = 2t, ϕ(t) = t, F (s, t) = s − t and W (t) = 12 t. Since Xω is an ω-complete modular metric space, every ω-Cauchy sequence in O(S, T, f, x0 ) = {xn : n = 0, 1, 2, · · · } (for some x0 ∈ Xω ) converges in Xω . Hence f (Xω ) = Xω is ω-orbitaly complete at x0 . Then Theorem 3.5 is applicable, where f is the identity mapping. So S and T have a common fixed point. Thus there exists a u∗ ∈ C(J, Rn )ω , a common fixed point of S and T , that is, u∗ is a unique solution to (4.1).  Acknowledgments This work was supported by Basic Science Research Program through the National Research Foundation of Korea funded by the Ministry of Education, Science and Technology (NRF-2017R1D1A1B04032937).

1227

BAHMAN MOEINI ET AL 1217-1228

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

B. MOEINI, A.H. ANSARI, C. PARK

References [1] M. Aamri and E.I. Mountawaki, Some new common fixed point theorems under strict contractive conditions, J. Math. Anal. Appl. 270 (2002), 181–188. [2] G.A. Anastassiou and I.K. Argyros, Approximating fixed points with applications in fractional calculus, J. Comput. Anal. Appl. 21 (2016), 1225–1242. [3] A.H. Ansari, Note on “ϕ-ψ-contractive type mappings and related fixed point”, The 2nd Regional Conference on Mathematics and Applications, Payame Noor University, 2014, pp. 377–380. [4] A. Batool, T. Kamran, S. Jang and C. Park, Generalized ϕ-weak contractive fuzzy mappings and related fixed point results on complete metric space, J. Comput. Anal. Appl. 21 (2016), 729–737. [5] V.V. Chistyakov, Modular metric spaces generated by F -modulars, Folia Math. 14 (2008), 3–25. [6] V.V. Chistyakov, Modular metric spaces I: basic concepts, Nonlinear Anal. 72 (2010), 1–14. [7] G. Jungck, Common fixed points for noncontinuous nonself maps on nonmetric spaces, Far East J. Math. Sci. 04 (1996), 199–215. [8] G. Jungck, Commuting mappings and fixed points, Amer. Math. Month. 73 (1976), 261–263. [9] M.S. Khan, M. Swaleh and S. Sessa, Fixed point theorems by altering distances between the points, Bull. Austral. Math. Soc. 30 (1984), 1–9. [10] Z. Liu, M.S. Khan and H.K. Pathak, On common fixed points, Georgian Math. J. 9 (2002), 325–330. [11] C. Mongkolkeha, W. Sintunavarat and P. Kumam, Fixed point theorems for contraction mappings in modular metric spaces, Fixed Point Theory Appl. 2011, 2011:93. [12] C. Mongkolkeha, W. Sintunavarat and P. Kumam, Fixed point theorems for contraction mappings in modular metric spaces, Fixed Point Theory Appl. 2012, 2012:103. [13] J. Musielak and W. Orlicz, On modular spaces, Studia Math. 18 (1959), 49–65. [14] A. Parya, P. Pathak, V.H. Badshah and N. Gupta, Common fixed point theorems for generalized contraction mappings in modular metric spaces, Adv. Inequal. Appl. 2017, 2017:9. [15] T. Phaneendra, Orbital continuity and common fixed point, Buletini Shkencor 3 (2011), 375–380. [16] K.P.R. Sastry, S.V.R. Naidu, I.H.N. Rao and K.P.R. Rao, Common fixed points for asymptotically regular mappings. Indian J. Pure Appl. Math. 15 (1984), 849–854. [17] S. Sessa, On a weak commutativity condition of mappings in fixed point considerations, Publ. Inst. Math. 32 (1982), 149–153. [18] Swatmaram, K.K. Swamy and T. Phaneendra, A common fixed point theorem without orbital continuity, Int. J. Appl. Eng. Research 11 (2016), 7622–7623. 1

Department of Mathematics, Hidaj Branch, Islamic Azad University, Hidaj, Iran E-mail address: [email protected] 2

Department of Mathematics, Karaj Branch, Islamic Azad University, Karaj, Iran E-mail address: [email protected] 3

Research Institute for Natural Sciences, Hanyang University, Seoul 04763, Korea E-mail address: [email protected]

1228

BAHMAN MOEINI ET AL 1217-1228

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Trapezoidal interval type-2 hesitant fuzzy sets associated with new operations N. O. Alshehri and H. A. Alshehri Departement of Mathematics, Faculty of Science, King Abdulaziz University, Jeddah, Saudi Arabia Abstract This paper proposes the concept of trapezoidal interval type-2 hesitant fuzzy set (TIT2HFS), which is a generalization of trapezoidal interval type-2 and hesitant fuzzy set. Also, we study some of its operation laws and corresponding proprties are discussed. Key words: Trapezoidal interval type-2 hesitant fuzzy set, Operation laws.

1

Introduction

Type-2 fuzzy set was proposed by Zadeh (1975) [19] which is an extension of Type-1 fuzzy set [18]. The principal di¤erence between the two kinds of fuzzy sets is that the memberships of a type-1 fuzzy set are crisp numbers while the memberships of a type-2 fuzzy set are type-1 fuzzy sets [14]; hence, type-2 fuzzy sets include more vulnerabilities than type-1 fuzzy sets. Since its presentation, type-2 fuzzy sets are getting increasingly consideration. Since the computational multifaceted nature of using general type-2 fuzzy sets is very high, to date , interval type-2 fuzzy sets [8] are the most widely used type-2 fuzzy sets and have been e¤ectively connected to numerous useful …elds [1; 3; 6; 7; 9; 10; 15; 16]: IT2FS [6] can be viewed as a special case of general T2FS where all the values of secondary membership are equal to 1: In particular, interval type-2 trapezoidal fuzzy numbers, as a special case of interval type-2 fuzzy sets, can pro…ciently express subjective assessments or evaluations. The concept of Hesitant fuzzy set was proposed by Torra (2010) [12] and Torra and Narukawa (2009) [13] to deal with the problems where membership of element to a give set includes several di¤erent values. In this paper, by proposing the concept of TIT2HFS based on HFS and IT2TFS. Furthermore, we introduce some operation laws and their properties are investigated.

2

Preliminaries

In this subsection, we brie‡y describe some fundamental ideas and essential operation laws identi…ed with HFSs that we need in our work.

1

1229

Alshehri ET AL 1229-1243

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2.1

Hesitant fuzzy set

De…nition 1: [12; 13] Let X be a reference set. A hesitant fuzzy set on X is de…ned in terms of a funcation h that returns a subset of [0; 1] : To make it understood easily, a HFS can be represented by a mathematical symbol : M := f< x; hM (x) >j x 2 Xg where hM (x) is a set of some valiues in [0; 1]; denoting the possible membership degrees of the element x 2 X to the set M . For convenience, [17]call h = hM (x) a hesitant fuzzy element (HFE) and H the set of all HFEs. De…nition 2: [12; 13] Let h; h1 and h2 be three HFEs then: (1) hc = [ f1 g: 2h

(2) h1 [ h2 = (3) h1 \ h2 =

[

max f 1 ;

2g :

[

min f 1 ;

2g :

1 2h1 ; 2 2h2 1 2h1 ; 2 2h2

De…nition 3: [17] Let h; h1 and h2 be three HFEs; and (1) h = [ : 2h

(2) h = [

2h

(3) h1

h2 =

(4) h1

h2 =

2.2

1

(1

)

:

[

f

1

[

f

1 2g :

1 2h1 ; 2 2h2 1 2h1 ; 2 2h2

> 0 then:

+

1 2g :

2

Interval type-2 fuzzy set

The theory of type-1 fuzzy set interdused by Zadeh [18] where the membership value of an element is a real value between 0 and 1. A trapezoidal type-1 fuzzy number A~ = (a1 ; a2 ; a3 ; a4 ; H1 (A); H2 (A)) in the universe of discourse, where 0 H1 (A) H2 (A) 1 is shown in Fig.1

Fig.1 Atrap ezoidal typ e-1 fuzzy numb er.

2

1230

Alshehri ET AL 1229-1243

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Type-2 fuzzy set were introduced as the extension of type-1 fuzzy set which is de…ned as follows. De…nition 4:[5; 7; 8] A type-2 fuzzy set A~ in the universe of discourse X can be represented by a type-2 membership function A~ , shown as follows: A~ = f((x; u) ; where 0 follows: A~ =

~ (x; u) A

R

R

~ (x; u)) j8x A

2 X; 8u 2 Jx

[0; 1]g ;

1: The type-2 fuzzy set A~ also can be represented as

~ (x; u)=(x; u) A

R

=

x2X u2Jx

x2X

"

R

u2Jx

~ (x; u)=u A

#

=x);

where x is the primary variable,R Jx [0; 1] is the primary membership of x; u is the secondary variable and ~ (x; u)=u is the secondary membership A u2Jx R function (MF) at x: Rdenotes union among P all admissible x and u: For discrete universe of discourse, is replaced by :

De…nition 5:[5; 8] Let A~ be a type-2 fuzzy set A~ in the universe of discourse X represented by the type-2 membership function A~ (x; u): If all A~ (x; u) = 1, then A~ is called an interval type-2 fuzzy set. An interval type-2 fuzzy set A~ can be regarded as a special case of a type-2 fuzzy set, shown as follows: " # R R R R 1=u =x); 1=(x; u) = A~ = x2X

x2X u2Jx

u2Jx

where x is the primary variable, R Jx [0; 1] is the primary membership of x; u is the secondary variable and 1=u is the secondary membership function u2Jx

(MF) at x: If X is a set of real numbers, then a type-2 fuzzy set and an interval type-2 fuzzy set in X are called a type-2 fuzzy number and an interval type-2 fuzzy number, respectively. De…nition 6:[5] Let A~i be a trapezoidal interval type-2 fuzzy number in the universe of discourse X. It can represented by ~L = A~i = A~U i ; Ai

U U U U U L L L L L L aU i1 ; ai2 ; ai3 ; ai4 ; H1 (Ai ); H2 (Ai ) ; ai1 ; ai2 ; ai3 ; ai4 ; H1 (Ai ); H2 (Ai )

L U U U U L L L L where AU i and Ai are T1FSs, ai1 ; ai2 ; ai3 ; ai4 ; ai1 ; ai2 ; ai3 and ai4 are the refU ~ erence points of the IT2FSs Ai ; Hj (Ai ) denotes the membership value of the U element aU j i(j+1) in the upper trapezoidal membership function Ai ; 1

3

1231

Alshehri ET AL 1229-1243

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

L 2; Hj (AL i ) denotes the membership value of the element ai(j+1) in the lower U L trapezoidal membership function AL j 2; H1 (AU i ;1 i ); H2 (Ai ); H1 (Ai ) and L H2 (Ai ) 2 [0; 1] ; 1 i n as shown in Fig.2

Fig.2 A trap ezoidal interval typ e-2 fuzzy numb er.

3 3.1

Trapezoidal interval type-2 hesitant fuzzy set The concept and operation laws of TIT2HFS

De…nition 7: Let X be a …xed set. A trapezoidal interval type-2 hesitant fuzzy set (TIT2HFS) on X is in terms of function that return of some trapezoidal interval type-2 fuzzy numbers (TIT2FNs) when applied to each x in X: To make it easily understood, we express the TIT2HFS by a mathematical symbol: n o ~ E (x) > jx 2 X E := < x; h

~ E (x) is a set of some TIT2FNs denoting the possible membership where h ~ E (x) = h ~= degrees of the element x 2 X to the set E: for convenience, we call h o n L L L L L U U U U U U ~ ~ ~ ))) Ai 2 hjAi = ai1 ; ai2 ; ai3 ; ai4 ; H1 (Ai ; H2 (Ai ); ai1 ; ai2 ; ai3 ; ai4 ; H1 (Ai ; H2 (AL i an trapezoidal interval type-2 hesitant fuzzy element (TIT2HFE). Example 8: A hesitant among di¤erent TIT2FNs for a decision making, he / she proviedes (0:35; 0:45; 0:55; 0:65; 1; 1) ; (0:4; 0:5; 0:6; 0:7; 0:8; 0:8) ; ~ ij = a TIT2HFS h : (0; 0; 0:2; 0:3; 0:8; 0:8) ; (0:72; 0:77; 0:78; 0:89; 1; 1)

4

1232

Alshehri ET AL 1229-1243

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

De…nition n 9: o ~ 1 = A~ 2 h ~ 1 jA~ = aU ; aU ; aU ; aU ; H1 (AU ; H2 (AU ); aL ; aL ; aL ; aL ; H1 (AL ; H2 (AL ))) Let h 1 2 3 4 1 2 3 4 n o U U U U U U L L L L ~ ~ ~ ~ and h2 = B 2 h2 jB = b1 ; b2 ; b3 ; b4 ; H1 (B ; H2 (B ); b1 ; b2 ; b3 ; b4 ; H1 (B L ; H2 (B L ))) are two TIT2HFEs. Then, we introduce the follow operations: ~ 1 and h ~ 2 which is denoted by h ~ 1[ h ~ 2 can be de…ned as: (1) The union of h 9 8 U U U U U U U U ; max a ; b max a ; b > > 2 2 ; max a3 ; b3 ; max a4 ; b4 ; 1 1 > ; > = < min H1 (AU ); H1 (B U ) ; min H2 (AU ); H2 (B U ) ~ ~ h1 [h2 = [ L L L L L L L max aL ~ 1 ;B2 ~2 > ~ h ~ h > > A2 1 ; b1 ; max a2 ; b2 ; max a3 ; b3 ; max a4 ; b4 ; > ; : L L L L min H1 (A ); H1 (B ) ; min H2 (A ); H2 (B ) ~ 1 and h ~ 2 which is denoted by h ~ 1\ h ~ 2 can be de…ned (2) The intersection of h as: 9 8 U U U U U U U min aU > > 1 ; b1 ; min a2 ; b2 ; min a3 ; b3 ; min a4 ; b4 ; > ; > = < min H1 (AU ); H1 (B U ) ; min H2 (AU ); H2 (B U ) ~ ~ h1 \h2 = [ L L L L L L L L min a1 ; b1 ; min a2 ; b2 ; min a3 ; b3 ; min a4 ; b4 ; ~ 1 ;B2 ~2 > ~ h ~ h > A2 > > ; : min H1 (AL ); H1 (B L ) ; min H2 (AL ); H2 (B L ) ~ 1 denoted by h ~ c can be de…ned as: (3) The complement of h 1 c ~ U U U ~ ~ A 2 h j A = 1 a ; 1 a ; 1 aU aU ; H2 (AU ); 1 1 2 3 ;1 4 ; H1 (A ~c = : h 1 L L L L L L 1 a1 ; 1 a2 ; 1 a3 ; 1 a4 ; H1 (A ; H2 (A ))) we note that can be replaced max and min by _ and ^ respectively. Example 10: ~ 1 = f(0:2; 0:3; 0:4; 0:5; 1; 1) ; (0:25; 0:35; 0:35; 0:45; 0:8; 0:8)g and h ~2 = Let h f(0:5; 0:6; 0:7; 0:8; 1; 1) ; (0:55; 0:65; 0:65; 0:75; 0:8; 0:8)g are two TIT2HFEs, then: ~1 [ h ~ 2 = f(0:5; 0:6; 0:7; 0:8; 1; 1) ; (0:55; 0:65; 0:65; 0:75; 0:8; 0:8)g : (1) h ~ ~ 2 = f(0:2; 0:3; 0:4; 0:5; 1; 1) ; (0:25; 0:35; 0:35; 0:45; 0:8; 0:8)g : (2) h1 \ h c ~ (3) h1 = f(0:8; 0:7; 0:6; 0:5; 1; 1) ; (0:75; 0:65; 0:65; 0:55; 0:8; 0:8)g Proposition 11: (De Morgan’s laws in TIT2HFS ) ~ 1 and h ~ 2 be two TIT2HFNs, then we have : Let h c ~1 [ h ~2 = h ~c \ h ~c : (1) h 1 2 ~1 \ h ~2 (2) h Proof:

c

~c [ h ~c : =h 1 2 8 > >
~ h ~ h A2 1 ; b1 ; max a2 ; b2 ; max a3 ; b3 ; max a4 ; b4 > : L L L L min H1 (A ); H1 (B ) ; min H2 (A ); H2 (B ) 8 U U U U U 1 max a ; b ; 1 max aU max aU max aU > 1 1 2 ; b2 ; 1 3 ; b3 ; 1 4 ; b4 > < U U U U min H1 (A ); H1 (B ) ; min H2 (A ); H2 (B ) = [ L L L L L 1 max a ; b1 ; 1 max aL max aL max aL ~ 1 ;B2 ~2 > ~ h ~ h A2 1 2 ; b2 ; 1 3 ; b3 ; 1 4 ; b4 > : L L L L min H1 (A ); H1 (B ) ; min H2 (A ); H2 (B )

5

1233

Alshehri ET AL 1229-1243

9c > ; > =

; ; ; ;

> > ; 9 > ; > = > > ;

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

=

[

~ 1 ;B2 ~2 ~ h ~ h A2

~c \ h ~c : =h 1 2

8 > > < > > :

min 1 aU bU aU bU 1 ;1 1 ; min 1 2 ;1 2 U U U min 1 a4 ; 1 b4 ; min H1 (A ); H1 (B U ) min 1 aL bL aL bL 1;1 1 ; min 1 2;1 2 L L L min 1 a4 ; 1 b4 ; min H1 (A ); H1 (B L )

~1 \ h ~2 Similarly, we can prove that h

c

; min ; min ; min ; min

1 aU bU 3 ;1 3 ; U H2 (A ); H2 (B U ) 1 aL bL 3;1 3 ; L H2 (A ); H2 (B L )

~c [ h ~c : =h 1 2

Hu et al.(2015) [2] proposed the concept of interval type-2 hesitant fuzzy set (IT2HFS). Also, de…ned operation laws and corresponding properties are discussed. In this subsection, we brie‡y review some de…nitions of t-norm and t-conorm. Moreover, some other relationships can be established.

3.2

Operation laws of TIT2HFEs based on Archimedean t-norm and Archimedean t-conorm can be de…ned as follows:

De…nition 12:[4; 11] A function T : [0; 1] [0; 1] ! [0; 1] is called a t-norm if it satis…es the following four conditions: (1) T (1; x) = x, for all x 2 [0; 1] : (2) T (x; y) = T (y; x), 8 x; y 2 [0; 1] : (3) T (x; T (y; z)) = T (T (x; y) ; z),8 x; y; z 2 [0; 1] : (4) If x x and y y , then T (x; y) T (x; y) : De…nition 13:[4; 11] A function S : [0; 1] [0; 1] ! [0; 1] is called a t-conorm if it satis…es the following four conditions: (1) S (0; x) = x, for all x 2 [0; 1] : (2) S (x; y) = T (y; x), 8 x; y 2 [0; 1] : (3) S (x; S (y; z)) = S (S (x; y) ; z),8 x; y; z 2 [0; 1] : (4) If x x and y y , then S (x; y) S (x; y) : De…nition 14:[4; 11] A t-norm function T (x; y) is called Archimedean t-norm if it is continuous and T (x; x) < x for all x 2 (0; 1) : An Archimedean t-norm is called strictly Archimedean t-norm if it is strictly increasing in each variable for x; y 2 (0; 1) : De…nition 15:[4; 11] A t-conorm function S (x; y) is called Archimedean t-conorm if it is continuous and S (x; x) > x for all x 2 (0; 1) : An Archimedean t-conorm is called strictly Archimedean t-conorm if it is strictly increasing in each variable for x; y 2 (0; 1) : It is well known [11]that a strict Archimedean t-norm is expressed via its additive generator k as T (x; y) = k 1 (k(x) + k(y)); and similarly applied to the t-conorm S (x; y) = l 1 (l(x) + l(y)) with l(t) = k(1 t): It is noted that an 6

1234

Alshehri ET AL 1229-1243

9 > > ; = > > ;

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

additive generator of a continuous Archimedean t-norm is a strictly decreasing function k : [0; 1] ! [0; 1] such that k(1) = 0: De…nition 16:[2] Suppose o n ~ 1 = A~1 2 h ~ 1 jA~1 = aU ; aU ; aU ; aU ; H1 (AU ; H2 (AU ); aL ; aL ; aL ; aL ; H1 (AL ; H2 (AL ))) h 1 11 12 13 14 1 1 11 12 13 14 1 n o ~ 2 = A~2 2 h ~ 2 jA~2 = aU ; aU ; aU ; aU ; H1 (AU ; H2 (AU ); aL ; aL ; aL ; aL ; H1 (AL ; H2 (AL ))) and h 21 22 23 24 2 2 21 22 23 24 2 2 are two IT2HFEs and > 0: On the basis of De…nition 15, we de…ne the operation laws of IT2HFEs as follows : 1 1 1 U U k 1 ( k(aU ( k(aU ( k(aU ( k(aU 11 ); k 12 ); k 13 ); k 14 ); H1 (A1 ; H2 (A1 ); ~ = [ (1) h 1 L 1 L 1 L 1 L L L 1 k ( k(a ); k ( k(a ); k ( k(a ); k ( k(a ); H (A ; H (A ~1 ~1 2h 1 2 A 11 12 13 14 1 1 ))) 1 U 1 U 1 U 1 U U U l ( l(a11 ); l ( l(a12 ); l ( l(a13 ); l ( l(a14 ); H1 (A1 ; H2 (A1 ); ~1 = [ (2) h : 1 1 L L l 1 ( l(aL ); l 1 ( l(aL ( l(aL ( l(aL ~1 ~1 2h A 12 ); l 13 ); l 14 ); H1 (A1 ; H2 (A1 ))) 8 11 9 U 1 U 1 U (l 1 (l(aU (l(aU (l(aU > > 11 ) + l(a21 )); l 12 ) + l(a22 )); l 13 ) + l(a23 )); > > < 1 = U U U U U U l (l(a ) + l(a )); min(H (A ); H (A )); min(H (A ); H (A ))) 1 1 2 2 14 24 1 2 1 2 ~ ~ (3) h1 h2 = [ : 1 L L 1 L L 1 L L (l (l(a11 ) + l(a21 )); l (l(a12 ) + l(a22 )); l (l(a13 ) + l(a23 )); ~ 1 ;A ~2 > ~1 2h ~2 2h > A > > : ; 1 L L L L L L 14 ) + l(a24 )); min(H1 (A1 ); H1 (A2 )); min(H2 (A1 ); H2 (A2 ))) 8 l (l(a 9 1 U U 1 U 1 U (k(aU (k(aU (k (k(a > > 11 ) + k(a21 )); k 12 ) + k(a22 )); k 13 ) + k(a23 )); > > < = U U U U U k 1 (k(aU 14 ) + k(a24 )); min(H1 (A1 ); H1 (A2 )); min(H2 (A1 ); H2 (A2 ))) ~ ~ (4) h1 h2 = [ : L 1 L 1 L (k 1 (k(aL (k(aL (k(aL ~ 1 ;A ~2 > ~1 2h ~2 2h > A 11 ) + k(a21 )); k 12 ) + k(a22 )); k 13 ) + k(a23 )); > > ; : L L L L L k 1 (k(aL 14 ) + k(a24 )); min(H1 (A1 ); H1 (A2 )); min(H2 (A1 ); H2 (A2 )))

Theoremn 17: o ~ 1 jA~1 = aU ; aU ; aU ; aU ; H1 (AU ; H2 (AU ); aL ; aL ; aL ; aL ; H1 (AL ; H2 (AL ))) ; ~ 1 = A~1 2 h Let h 11 12 13 14 1 1 11 12 13 14 1 1 n o ~ 2 = A~2 2 h ~ 2 jA~2 = aU ; aU ; aU ; aU ; H1 (AU ; H2 (AU ); aL ; aL ; aL ; aL ; H1 (AL ; H2 (AL ))) h 21 22 23 24 2 2 21 22 23 24 2 2 n o U U U U U U L L L L L ~ ~ ~ ~ and h3 = A3 2 h3 jA3 = a31 ; a32 ; a33 ; a34 ; H1 (A3 ; H2 (A3 ); a31 ; a32 ; a33 ; a34 ; H1 (A3 ; H2 (AL 3 ))) are three TIT2HFEs, then the associative for operations and are vaild as follows: ~1 ~2 h ~3 = h ~1 h ~2 ~3 (1) h h h ~1 (2) h

~2 h

~3 = h ~1 h

~2 h

~ 3: h

Proof: we prove part (1), similarly we can be proven (2) : ~1 (1) h

~2 h

~3 = h ~1 h

8 > > > > > >
~2 2h ~3 2h > A > L 1 L > l 1 (l(aL (l(aL > 24 + l(a34 )); 23 + l(a33 )); l > : L L L min H1 (A2 ; H1 (A3 )); min H2 (A2 ; H2 (AL 3 )))

9 > > > > > > = > > > > > > ;

7

1235

Alshehri ET AL 1229-1243

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

9 1 U 1 1 U (l(aU (l(aU (l(aU (l(aU > 11 ) + l l 21 + l(a31 )); l 12 ) + l(l 22 + l(a32 ))); > > 1 U 1 1 U > l 1 (l(aU (l(aU (l(aU (l(aU > 13 ) + l(l 23 + l(a33 ))); l 14 ) + l(l 24 + l(a34 )); > = U U U U U U min((H1 (A1 ); min H1 (A2 ; H1 (A3 ))); min((H1 (A1 ); min H2 (A2 ; H2 (A3 ))); =[ 1 L 1 1 L l 1 (l(aL (l(aL (l(aL (l(aL ~ 1 ;A ~ 2 ;A ~3 > ~1 2h ~2 2h ~3 2h > A 11 ) + l( l 21 + l(a31 )); l 12 ) + l(l 22 + l(a32 ))); > > > > 1 U 1 L L 1 U 1 L L > > l (l(a ) + l(l (l(a + l(a ))); l (l(a ) + l(l (l(a + l(a ))); > > 13 23 33 14 24 34 > > ; : L L L L L L ; H (A ))) ; H (A ))); min((H (A ); min H (A min((H (A ); min H (A 2 1 1 2 1 1 3 3 1 2 1 2 8 9 U U 1 U U l 1 (l(aU (l(aU > > 11 ) + l(a21 ) + l(a31 )); l 12 ) + l(a22 ) + l(a32 )); > > > > 1 U U U 1 U U U > > )); l (l(a ) + l(a ) + l(a )); l (l(a ) + l(a ) + l(a > > 13 23 33 14 24 34 > > < = U U U U U U min(H1 (A1 ); H1 (A2 ); H1 (A3 )); min(H1 (A1 ); H2 (A2 ); H2 (A3 )); =[ 1 L L L 1 L L L l (l(a11 ) + l(a21 ) + l(a31 )); l (l(a12 ) + l(a22 ) + l(a32 )); ~ 1 ;A ~ 2 ;A ~3 > ~1 2h ~2 2h ~3 2h > A > > > > 1 U L L 1 U L L > > l (l(a ) + l(a ) + l(a )); l (l(a ) + l(a ) + l(a )); > > 13 23 33 14 24 34 > > : ; L L L L L L min(H (A ); H (A ); H (A )); min(H (A ); H (A ); H (A )) 1 1 1 1 2 2 1 2 3 1 2 3 8 9 1 1 U U U 1 1 U U l (l(l l(a11 ) + l(a21 ))) + l(a31 )); l (l(l (l(a12 ) + l(a22 ))) + l(aU > > 32 )); > > > > U U 1 1 U U U > l 1 (l(l 1 (l(aU > )); ) + l(a ))) + l(a )); l (l(l (l(a ) + l(a ))) + l(a > > 13 23 33 14 24 34 > > < = U U U U U U min(min(H1 (A1 ); H1 (A2 )); H1 (A3 )); min(min(H1 (A1 ); H2 (A2 )); H2 (A3 )); =[ 1 1 L L L 1 1 L L L l (l(l (l(a11 ) + l(a21 ))) + l(a31 )); l (l(l (l(a12 ) + l(a22 ))) + l(a32 )); > ~ 1 ;A ~ 2 ;A ~3 > ~1 2h ~2 2h ~3 2h A > > > > L L 1 L L > l 1 (l(l 1 (l(aU > (l(l 1 (l(aU > > 13 ) + l(a23 ))) + l(a33 )); l 14 ) + l(a24 ))) + l(a34 )); > > : ; L L L L L L min(min(H1 (A1 ); H1 (A2 )); H1 (A3 )); min(min(H1 (A1 ); H2 (A2 )); H2 (A3 )) ~1 h ~2 ~ 3: = h h 8 > > > > > >
> < > > :

U U U max aU 11 ; a21 ; max a12 ; a22 U min H1 (A1 ); H1 (AU 2) L L L max aL 11 ; a21 ; max a12 ; a22 L min H1 (A1 ); H1 (AL 2)

8 > > > > > > > > > >
> ; = > > ;

1 U U 1 U U l 1 (l(max aU (l(max aU 11 ; a21 ) + l(a31 )); l 12 ; a22 ) + l(a32 )); U U 1 U U C B l 1 (l(max aU (l(max aU 14 ; a24 ) + l(a34 )); C 13 ; a23 + l(a33 )); l B U U U A; @ min(min H1 (A1 ); H1 (A2 ) ; H1 (A3 )); U U U min(min H2 (A1 ); H2 (A2 ) ; H2 (A3 )) 0 1 1 = [ L L 1 L L l (l(max aL (l(max aL ~ ~ ~ ~ ~ ~ > A1 2h1 ;A2 2h2 ;A3 2h3 > 11 ; a21 ) + l(a31 )); l 12 ; a22 ) + l(a32 )); > L L 1 L L > C B l 1 (l(max aL (l(max aL > 13 ; a23 ) + l(a33 )); l 14 ; a24 ) + l(a34 )); C > B > L L L > @ A min(min H (A ); H (A ) ; H (A )); > 1 1 1 1 2 3 > : L L L min(min H (A ); H (A ) ; H (A )) 2 2 2 1 2 3 8 0 1 9 U U U l 1 (maxfl(aU > > 11 ) + l(a31 ); l(a21 ) + l(a31 )g); > > > U U U B C > > > l 1 (maxfl(aU > > 12 ) + l(a32 ); l(a22 ) + l(a32 )g); B C > > > > 1 U U U U B C > > l (maxfl(a ) + l(a ); l(a ) + l(a )g); > > 13 33 23 33 B C > > ; > > 1 U U U U B C > > l (maxfl(a ) + l(a ); l(a ) + l(a )g); > > 14 34 24 34 B C > > > > U U U U > > @ A min(minfH (A ); H (A )g; minfH (A ); H (A )g); > > 1 1 1 1 1 3 2 3 > > = < U U U U min(minfH (A ); H (A )g; minfH (A ); H (A )g) 2 2 2 2 1 3 2 3 0 1 = [ 1 L L L L l (maxfl(a11 ) + l(a31 ); l(a21 ) + l(a31 )g); ~ 1 ;A ~ 2 ;A ~3 > ~1 2h ~2 2h ~3 2h > A > > > > 1 L L L L > > B C l (maxfl(a ) + l(a ); l(a ) + l(a )g); > > 12 31 22 32 > > C B > > 1 L L L L > > B C l (maxfl(a ) + l(a ); l(a ) + l(a )g); > > 13 33 23 33 > > B C > > 1 L L L L > > C B l (max l(a ) + l(a ); l(a ) + l(a )g); > > 14 34 24 34 > > B C > L L L L > > @ min(minfH1 (A1 ); H1 (A3 )g; minfH1 (A2 ); H1 (A3 )g); A > > > > > ; : L L L L min(minfH (A ); H (A )g; minfH (A ); H (A )g) 2 2 2 2 1 3 2 3 9 8 0 1 U 1 U maxfl 1 (l(aU (l(aU > > 11 ) + l(a31 )); l 21 ) + l(a31 ))g; > > > 1 U U 1 U B C > > > maxfl (l(a12 ) + l(a32 )); l (l(a22 ) + l(aU > > 32 ))g; B C > > > > 1 U U 1 U U B C > > maxfl (l(a13 ) + l(a33 )); l (l(a23 ) + l(a33 ))g; > > B C > > ; > > 1 U U 1 U U B C > > maxfl (l(a14 ) + l(a34 )); l (l(a24 ) + l(a34 ))g; > > B C > > > > U U U U > > @ A min(minfH1 (A1 ); H1 (A3 )g; minfH1 (A2 ); H1 (A3 )g); > > > > = < U U U U min(minfH (A ); H (A )g; minfH (A ); H (A )g) 2 2 2 2 1 3 2 3 0 1 = [ L 1 L maxfl 1 (l(aL (l(aL ~ 1 ;A ~ 2 ;A ~3 > ~1 2h ~2 2h ~3 2h > A 11 ) + l(a31 )); l 21 ) + l(a31 ))g; > > > 1 L L 1 L L > > B C > maxfl (l(a ) + l(a )); l (l(a ) + l(a > > 12 31 22 32 ))g; > > B C > > 1 L L 1 L L > > B C maxfl (l(a ) + l(a )); l (l(a ) + l(a ))g; > > 13 33 23 33 > > B C > > 1 L L 1 L L > > B C (l(a ) + l(a )); l (l(a ) + l(a ))g; maxfl > > 14 34 24 34 > > B C > > L L L L > > @ A )g; minfH (A ); H (A )g); min(minfH (A ); H (A > > 1 1 1 1 3 1 3 2 > > ; : L L L L min(minfH (A ); H (A )g; minfH (A ); H (A )g) 2 2 2 2 1 3 2 3 9 8 1 0 U U 1 l 1 (l(aU (l(aU > > 11 ) + l(a31 )); l 12 ) + l(a32 )); > > > 1 U U 1 U U > > A; > @ l (l(a ) + l(a )); l (l(a ) + l(a )); > > 13 33 14 34 > > = < U U U U ); H (A )g minfH (A ); H (A )g; minfH (A 1 1 2 2 3 1 3 1 1 0 = [ L 1 L l 1 (l(aL (l(aL ~ 1 ;A ~3 ~1 2h ~3 2h > > A 11 ) + l(a31 )); l 12 ) + l(a31 )); > > > 1 L L 1 L L > > A > @ l (l(a ) + l(a )); l (l(a ) + l(a )); > > 33 14 34 13 > > ; : L L L L minfH1 (A1 ); H1 (A3 )g; minfH2 (A1 ); H2 (A3 )g 0

9

1237

Alshehri ET AL 1229-1243

9 > > > > > > > > > > = > > > > > > > > > > ;

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8 > > > > > >
21 ) + l(a31 )); l 22 ) + l(a32 )); > U 1 U > @ A; > l 1 (l(aU (l(aU > 23 ) + l(a33 )); l 24 ) + l(a34 )); > = U U U U minfH (A ); H (A )g; minfH (A ); H (A )g 1 1 2 2 2 3 2 3 1 0 [ [ L 1 L l 1 (l(aL (l(aL ~ 2 ;A ~3 ~2 2h ~3 2h > > A 21 ) + l(a31 )); l 22 ) + l(a31 )); > > > 1 L L 1 L L > > A > @ l (l(a ) + l(a )); l (l(a ) + l(a )); > > 23 33 24 34 > > : ; L L L L minfH1 (A2 ); H1 (A3 )g; minfH2 (A2 ); H2 (A3 )g ~1 h ~3 [ h ~2 h ~3 : = h 0

~1 [ h ~2 (3) h [

~ 1 ;A ~2 ~1 2h ~2 2h A

~3 h

=

=

8 > > < > > :

~3 = h

U U U max aU 11 ; a21 ; max a12 ; a22 U min H1 (AU ); H (A 1 1 2) L L L max a11 ; a21 ; max a12 ; aL 22 L min H1 (AL 1 ); H1 (A2 )

[

~ 1 ;A ~ 2 ;A ~3 ~1 2h ~2 2h ~3 2h A

[

~ 1 ;A ~ 2 ;A ~3 ~1 2h ~2 2h ~3 2h A

8 > > > > > > > > > >
> > > > > > > > > : 8 > > > > > > > > > > > > > > > > > > < > > > > > > > > > > > > > > > > > > :

0

; max ; min ; max ; min

U U U aU 13 ; a23 ; max a14 ; a24 ; U H2 (AU ); H (A ) 2 1 2 L L L aL 13 ; a23 ; max a14 ; a24 ; L L H2 (A1 ); H2 (A2 )

9 > ; > = > > ;

1 U U 1 U U k 1 (k(max aU (k(max aU 11 ; a21 ) + k(a31 )); k 12 ; a22 ) + k(a32 )); U U 1 U U B k 1 (k(max aU C (k(max aU 13 ; a23 + k(a33 )); k 14 ; a24 ) + k(a34 )); C B U U U @ A; min(min H1 (A1 ); H1 (A2 ) ; H1 (A3 )); U U min(min H2 (AU 1 ); H2 (A2 ) ; H2 (A3 )) 0 1 1 L L L 1 L L k (k(max a11 ; a21 ) + k(a31 )); k (k(max a12 ; aL 22 ) + k(a32 )); L L 1 L L C B k 1 (k(max aL (k(max aL 13 ; a23 ) + k(a33 )); k 14 ; a24 ) + k(a34 )); C B L L L @ A min(min H1 (A1 ); H1 (A2 ) ; H1 (A3 )); L L L min(min H2 (A1 ); H2 (A2 ) ; H2 (A3 )) 0 1 9 U U U k 1 (maxfk(aU > 11 ) + k(a31 ); k(a21 ) + k(a31 )g); > > 1 U U U U B C > k (maxfk(a ) + k(a ); k(a ) + k(a )g); > 12 32 22 32 B C > > 1 U U U U B C > k (maxfk(a ) + k(a ); k(a ) + k(a )g); > 13 33 23 33 B C ; > > 1 U U U U B C > k (maxfk(a ) + k(a ); k(a ) + k(a )g); 14 34 24 34 B C > > > U U U U @ min(minfH1 (A1 ); H1 (A3 )g; minfH1 (A2 ); H1 (A3 )g); A > > > = U U U U min(minfH (A ); H (A )g; minfH (A ); H (A )g) 2 2 2 2 1 3 2 3 0 1 1 L L L L k (maxfk(a11 ) + k(a31 ); k(a21 ) + k(a31 )g); > > > 1 L L L L > B C k (maxfk(a ) + k(a ); k(a ) + k(a )g); > 12 31 22 32 > C B > 1 L L L L > B C k (maxfk(a ) + k(a ); k(a ) + k(a )g); > 13 33 23 33 > B C > 1 L L L L > C B k (max k(a ) + k(a ); k(a ) + k(a )g); > 14 34 24 34 > B C > L L L > @ min(minfH1 (AL A ); H (A )g; minfH (A ); H (A )g); > 1 1 1 1 3 2 3 > ; L L L L min(minfH2 (A1 ); H2 (A3 )g; minfH2 (A2 ); H2 (A3 )g)

10

1238

Alshehri ET AL 1229-1243

9 > > > > > > > > > > = > > > > > > > > > > ;

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8 > > > > > > > > > > > > > > > > > >
~1 2h ~2 2h ~3 2h A > > L 1 L > B maxfk 1 (k(aL (k(aL > 12 ) + k(a31 )); k 22 ) + k(a32 ))g; > B > 1 L L 1 L L > B ) + k(a33 )); k (k(a23 ) + k(a33 ))g; > > B maxfk 1 (k(a13 > 1 L > B maxfk (k(aL ) + k(aL (k(aL > 14 34 )); k 24 ) + k(a34 ))g; > B > L L L > @ min(minfH1 (A1 ); H1 (A3 )g; minfH1 (A2 ); H1 (AL > 3 )g); > : L L L L min(minfH (A ); H (A )g; minfH (A ); H (A )g) 2 2 2 2 1 3 2 8 0 1 93 1 U U 1 U U k (k(a ) + k(a )); k (k(a ) + k(a )); > > 11 31 12 32 > > > U 1 U > > @ k 1 (k(aU A; > (k(aU > > 13 ) + k(a33 )); k 14 ) + k(a34 )); > > = < U U U U minfH (A ); H (A )g; minfH (A ); H (A )g 1 1 2 2 1 3 1 3 0 1 [ = 1 L L 1 L L k (k(a11 ) + k(a31 )); k (k(a12 ) + k(a31 )); ~ 1 ;A ~3 ~1 2h ~3 2h > > A > > > > L 1 L L > > @ k 1 (k(aL A ) + k(a )); k (k(a ) + k(a )); > > 13 33 14 34 > > ; : L L L L minfH (A ); H (A )g; minfH (A ); H (A )g 1 1 2 2 1 3 1 3 9 8 0 1 1 U U 1 U U l (l(a21 ) + l(a31 )); l (l(a22 ) + l(a32 )); > > > > > > U 1 U U > > @ k 1 (k(aU A ) + k(a )); k (k(a ) + k(a )); ; > > 23 33 24 34 > > = < U U U U minfH (A ); H (A )g; minfH (A ); H (A )g 1 1 2 2 2 3 2 3 0 1 [ [ 1 L L 1 L L k (k(a21 ) + k(a31 )); k (k(a22 ) + k(a31 )); ~ 2 ;A ~3 ~2 2h ~3 2h > > A > > > > L 1 L L > > @ k 1 (k(aL A ) + k(a )); k (k(a ) + k(a )); > > 23 33 24 34 > > ; : L L L L minfH1 (A2 ); H1 (A3 )g; minfH2 (A2 ); H2 (A3 )g ~1 h ~3 [ h ~2 h ~3 : = h

1 9 > > C > > C > > C > > C; > > C > > C > > > A > > > = 1 > > > C > > C > > C > > C > > C > > C > > A > > > ;

Theorem 19: ~ 1 and h ~ 2 be two TIT2HFEs, then: Let h ~1 [ h ~2 ~1 \ h ~2 = h ~1 h ~ 2: (1) h h ~1 [ h ~2 (2) h

~1 \ h ~2 = h ~1 h

~ 2: h

Proof: (1) We know that for any two real numbers a and b, it follows that: max fa; bg + min fa; bg = a + b max fa; bg : min fa; bg = a:b Then we have: ~1 [ h ~2 (1) h 8 > > < [ ~ ~ ~ ~ > > :A1 2h1 ;A2 2h2

~1 \ h ~2 = h

U U U max aU 11 ; a21 ; max a12 ; a22 U min H1 (A1 ); H1 (AU 2) L L L ; max a ; a max aL ; a 11 21 12 22 L min H1 (A1 ); H1 (AL 2)

; max ; min ; max ; min

U U U aU 13 ; a23 ; max a14 ; a24 ; U U H2 (A1 ); H2 (A2 ) L L L aL 13 ; a23 ; max a14 ; a24 ; L L H2 (A1 ); H2 (A2 )

9 > ; > = > > ;

11

1239

Alshehri ET AL 1229-1243

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8 > >
> :A1 2h1 ;A2 2h2 8 > > > > > > > > > > > > > > < = [ ~ 1 ;A ~2 ~1 2h ~2 2h > A > > > > > > > > > > > > > : 8 > > > > > > > > > > > > > > < [ = ~ 1 ;A ~2 ~1 2h ~2 2h > A > > > > > > > > > > > > > : 8 > > > > > > < [ = ~ 1 ;A ~2 ~1 2h ~2 2h > A > > > > > :

U U U U U U U min aU 11 ; a21 ; min a12 ; a22 ; min a13 ; a23 ; min a14 ; a24 ; U U U U min H1 (A1 ); H1 (A2 ) ; min H2 (A1 ); H2 (A2 ) L L L L L L L min aL 11 ; a21 ; min a12 ; a22 ; min a13 ; a23 ; min a14 ; a24 ; L L L L min H1 (A1 ); H1 (A2 ) ; min H2 (A1 ); H2 (A2 ) 0 1 9 U U U l 1 (l(max aU > 11 ; a21 ) + l(min a11 ; a21 )); > > 1 U U U U C B > l (l(max a ; a ) + l(min a ; a )); > 12 22 12 22 B C > > 1 U U U U C B > l (l(max a ; a ) + l(min a ; a )); ; > 13 23 13 23 C B > 1 U U U U > A > @ l (l(max a14 ; a24 ) + l(min a14 ; a24 )); > > = U U U U min H (A ); H (A ) ; min H (A ); H (A ) 1 1 2 2 1 2 1 2 0 1 1 L L L L l (l(max a11 ; a21 ) + l(min a11 ; a21 )); > > > 1 L L L L > B C l (l(max a ; a ) + l(min a ; a )); > 12 22 12 22 > B C > 1 L L L L > B C l (l(max a ; a ) + l(min a ; a )) > 13 23 13 23 > B C 1 L L L L > @ A > ; l (l(max a14 ; a24 ) + l(min a14 ; a24 )); > > ; L L L min H1 (AL ); H (A ) ; min H (A ); H (A ) 1 2 2 1 2 1 2 9 0 1 U U U l 1 (max l(aU > 11 ); l(a21 ) + min l(a11 ); l(a21 ) ); > U U U B l 1 (max l(aU C > > > 12 ); l(a22 ) + min l(a12 ); l(a22 ) ); C B > > U U U C B l 1 (max l(aU > 13 ); l(a23 ) + min l(a13 ); l(a23 ) ); C ; > B > > U U U > @ l 1 (max l(aU A > 14 ); l(a24 ) + min l(a14 ); l(a24 ) ); > = U U U U min H (A ); H (A ) ; min H (A ); H (A ) 1 1 2 2 1 2 1 2 0 1 L L l 1 (max l(aL + min l aL ); > 11 ); l a21 11 ; l a21 > > L L > B l 1 (max l aL + min l a12 ; l aL ); C > 12 ; l a22 22 > B 1 C > L L L B l (max l aL C + min l a13 ; l a23 ); C > > 13 ; l a23 > B 1 > L L @ l (max l aL + min l aL ); A > > 14 ; l a24 14 ; l a24 > ; min H1 (AL ); H1 (AL ) ; min H2 (AL ); H2 (AL ) 1 2 1 2 9 0 1 U 1 U l 1 l(aU l(aU > 11 ) + l(a21 ) ; l 12 ) + l(a22 ) ; > 1 U U 1 U U > @ A; > l l(a13 ) + l(a23 ) ; l l(a14 ) + l(a24 ) ; > > = U U U U min H (A ); H (A ) ; min H (A ); H (A ) 1 1 2 2 1 2 1 2 0 1 1 L L 1 L L l l(a11 ) + l a21 ; l l a12 + l a22 ; > > > L 1 L L > @ l 1 l aL A + l a ; l l a + l a ; > 13 23 14 24 > ; L L L L min H1 (A1 ); H1 (A2 ) ; min H2 (A1 ); H2 (A2 )

9 > > ; = > > ;

~1 h ~ 2: =h Similarly, we can proven (2) :

Theorem 20: ~ 1 and h ~ 2 be two TIT2HFEs and Let h ~ ~2 = h ~1 [ h ~ 2: (1) h1 [ h (2)

> 0, then:

~1 \ h ~2 = h ~1 \ h ~ 2: h

~1 [ h ~2 (3) h

~ : ~ [h =h 1 2

~1 \ h ~2 (4) h

~ : ~ \h =h 1 2

Proof: In the following, we prove (1) and (3), the rest can be proven analogously:

12

1240

Alshehri ET AL 1229-1243

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(1) 8 > >
11 ; a21 ; max a12 ; a22 ; max a13 ; a23 ; max a14 ; a24 ; ; > = U U U min H1 (AU 1 ); H1 (A2 ) ; min H2 (A1 ); H2 (A2 ) [ L L L L L L L max aL ~ ~ ~ ~ > > 11 ; a21 ; max a12 ; a22 ; max a13 ; a23 ; max a14 ; a24 ; > > ; :A1 2h1 ;A2 2h2 L L L L min H (A ); H (A ) ; min H (A ); H (A ) 1 1 2 2 1 2 1 2 8 0 U U U U U U U max aU > 11 ; a21 ; max a12 ; a22 ; max a13 ; a23 ; max a14 ; a24 ; > < B U U U U min H1 (A1 ); H1 (A2 ) ; min H2 (A1 ); H2 (A2 ) =l 1 lB L L L L L L L L @A~ 2h~ [;A~ 2h~ max a > 11 ; a21 ; max a12 ; a22 ; max a13 ; a23 ; max a14 ; a24 ; 1 1 2 2 > : L L L L min H1 (A1 ); H1 (A2 ) ; min H2 (A1 );9 H2 (A2 ) 8 1 0 1 U U 1 U U l ( l(max a ; a ); l ( l(max a ; a ); > > 11 21 12 22 > > > U 1 U > > A; > @ l 1 ( l(max aU ( l(max aU > > 13 ; a23 ); l 14 ; a24 ); > > = < U U U U min H (A ); H (A ) ; min H (A ); H (A ) 1 1 2 2 1 2 1 2 0 1 = [ 1 L L 1 L L l ( l(max a11 ; a21 ); l ( l(max a12 ; a22 ); ~ 1 ;A ~2 ~1 2h ~2 2h > > A > > > > L 1 L L > > @ l 1 ( l(max aL A ; a ); l ( l(max a ; a ); > > 13 23 14 24 > > ; : L L L L min H (A ); H (A ) ; min H (A ); H (A ) 1 1 2 2 1 2 1 2 8 0 1 9 1 1 1 max l 1 ( l(aU ( l(aU ( l(aU ( l(aU > > 11 ); l 21 ) ; max l 12 ); l 22 ) ; > > > 1 1 1 > > @ max l 1 ( l(aU A; > ( l(aU ( l(aU ( l(aU > > 13 ); l 23 ) ; max l 14 ); l 24 ) ; > > = < U U U U min H (A ); H (A ) ; min H (A ); H (A ) 1 1 2 2 1 2 1 2 0 1 [ = 1 1 1 max l 1 ( l(aL ( l(aL ( l(aL ( l(aL ~ 1 ;A ~2 ~1 2h ~2 2h > > A 11 ); l 21 ) ; max l 12 ); l 22 ) ; > > > 1 L 1 L 1 L 1 > > @ A > max l ( l(a13 ); l ( l(a23 ) ; max l ( l(a14 ); l ( l(aL > > 24 ) ; > > ; : L L L L min H1 (A1 ); H1 (A2 ) ; min H2 (A1 ); H2 (A2 ) ~1 [ h ~ 2: = h

19 > ; C> = C A> > ;

~1 [ h ~2 = (3) h 8 9 U U U U U U U max aU > > 11 ; a21 ; max a12 ; a22 ; max a13 ; a23 ; max a14 ; a24 ; > ; > = < U U U min H1 (AU ); H (A ) ; min H (A ); H (A ) 1 2 2 1 2 1 2 [ L L L L L L L L max a11 ; a21 ; max a12 ; a22 ; max a13 ; a23 ; max a14 ; a24 ; ~ ~ ~ ~ > > > > :A1 2h1 ;A2 2h2 ; L L L L min H (A ); H (A ) ; min H (A ); H (A ) 1 1 2 2 1 2 1 2 8 0 19 U U U U U U U max a11 ; a21 ; max a12 ; a22 ; max a13 ; a23 ; max a14 ; aU > > 24 ; > ; C> = < B U U U min H1 (AU 1 1 ); H1 (A2 ) ; min H2 (A1 ); H2 (A2 ) B C [ k@ =k L L L L L L L L A> max a11 ; a21 ; max a12 ; a22 ; max a13 ; a23 ; max a14 ; a24 ; ~ 1 ;A ~2 ~1 2h ~2 2h > A > > ; : L L L L min H (A ); H (A ) ; min H (A ); H (A ) 1 1 2 2 1 2 1 2 9 8 1 0 U U 1 k 1 ( k(max aU ( k(max aU > > 11 ; a21 ); k 12 ; a22 ); > > > 1 U U 1 U U > > A; > @ k ( k(max a ; a ); k ( k(max a ; a ); > > 23 14 24 13 > > = < U U U U ) ; min H (A ); H (A ) min H (A ); H (A 2 2 1 1 2 1 2 1 0 1 = [ 1 L L ( k(max aL k 1 ( k(max aL ~ 1 ;A ~2 ~1 2h ~2 2h > > A 11 ; a21 ); k 12 ; a22 ); > > > 1 L L 1 L L > > @ A > ); k ( k(max a ; a ); k ( k(max a ; a > > 13 23 14 24 > > ; : L L L L ); H (A ) ; min H (A ); H (A ) min H (A 1 2 2 1 1 2 1 2 8 1 9 0 1 1 1 ( k(aU max k 1 ( k(aU ( k(aU ( k(aU > > 21 ) ; max k 12 ); k 22 ) ; 11 ); k > > > > 1 U 1 U 1 U > > A @ max k 1 ( k(aU ) ; max k ( k(a ); k ( k(a ) ; ); k ( k(a ; > > 24 13 23 14 > > = < U U U U ) min H (A ); H (A ) ; min H (A ); H (A 2 2 1 1 1 2 1 2 0 1 = [ 1 L 1 L 1 L 1 L max k ( k(a11 ); k ( k(a21 ) ; max k ( k(a12 ); k ( k(a22 ) ; ~ ~ ~ ~ > > > > > >A1 2h1 ;A2 2h2 @ 1 L 1 L 1 L 1 L > > A ); k ( k(a ) ; max k ( k(a ); k ( k(a ) ; max k ( k(a > > 23 14 24 13 > > ; : L L L L min H1 (A1 ); H1 (A2 ) ; min H2 (A1 ); H2 (A2 ) 13

1241

Alshehri ET AL 1229-1243

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

~ [h ~ : =h 1 2

4

Conclusions

We introduced the notions of Trapezoidal interval type-2 hesitant fuzzy set. At the same time, some operation laws of TIT2HFS were provided to complete its theory. Con‡ict of Interests The authors declare that there is no con‡ict of interest regarding the publication of this paper. Acknowledgment This work was supported by Deanship of Scienti…c Research (DSR), King Abdulaziz University, Jeddah, under grant No. (363-43-D1436). The authors, therefore, gratefully acknowledge the DSR technical and …nancial support.

References [1] J. R. Castro, O. Castillo, P. Melin and A. R. Diaz, A hybrid learning algorithm for a class of interval type-2 fuzzy neural networks, Information Sciences 179(2009), 2175-2193. [2] J. Hu, K. Xiao, X. Chen and Y. Liu, Interval type-2 hesitant fuzzy set and its application in multi-criteria decision making, Computers & Industrial Engineering 87(2015), 91-103. [3] E. A. Jammeh, M. Fleury, C. Wagener, H. Hagras and M. Ghanbari, Interval type-2 fuzzy logic congestion control for video streaming across IP networks, IEEE Transactions on Fuzzy Systems 17(2009), 1123-1142. [4] G. J. Klir and B. Yuan, Fuzzy sets and fuzzy logic: Theory and applications, Upper Saddle River, NJ: Prentice Hall, 1995, 200-207. [5] L. W. Lee and S. M. Chen, A new method for fuzzy multiple attributes group decision-making based on the arithmetic operations of interval type-2 fuzzy sets, Proceedings of 2008 International Conference on Machine Learning and Cybernetics, Vols. 1-7, IEEE, New York, 2008, 3084-3089. [6] Q. Liang and J. M. Mendel, Interval type-2 fuzzy logic systems: Theory and design, IEEE Transactions on Fuzzy Systems 8 (2000), 535-550. [7] J. M. Mendel, Uncertain Rule-Based Fuzzy Logic Systems: Introduction and New Directions, Upper Saddle River, Prentice-Hall, NJ,2001. [8] J. M. Mendel, R. I. John and F. Liu, Interval type-2 fuzzy logic systems made simple, IEEE Transactions on Fuzzy Systems 14 (6) (2006), 808-821. 14

1242

Alshehri ET AL 1229-1243

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[9] J. M. Mendel and H. W. Wu, Type-2 fuzzistics for symmetric interval type-2 fuzzy sets: part 1, forward problems, IEEE Transactions on Fuzzy Systems 14(2006), 781-792. [10] J. M. Mendel and H. W. Wu, Type-2 fuzzistics for symmetric interval type2 fuzzy sets: part 2, inverse problems, IEEE Transactions on Fuzzy Systems 15(2007), 301-308. [11] H. T. Nguyen and E. A. Walker, A …rst course in fuzzy logic, Chapman, Hall/CRC, 2005. [12] V. Torra, Hesitant fuzzy sets, Int. J. Intell. Syst. 25 (2010) 529-539. [13] V. Torra and Y. Narukawa, On hesitant fuzzy sets and decision, In Proceeding of 18th IEEE international conference on fuzzy systems, Jeju Island, Korea, 1378-1382. [14] D. R. Wu and J. M. Mendel, Aggregation using the linguistic weighted average and interval type-2 fuzzy sets, IEEE Transactions on Fuzzy Systems 15 (6) (2007),1145-1161. [15] D. R. Wu and J. M. Mendel, A vector similarity measure for linguistic approximation: interval type-2 and type-1 fuzzy sets, Information Sciences 178(2008) 381-402. [16] D. R. Wu and J. M. Mendel, A comparative study of ranking methods, similarity measures and uncertainy measures for interval type-2 fuzzy sets, Information Sciences 179(2009), 1169-1192. [17] M. M. Xia and Z. S. Xu , Hesitant fuzzy information aggreation in decision making, International Journal of Approximate Reasoning 52 (3) (2011),395407. [18] L. A. Zadah, Fuzzy sets, Inform. and Control 8 (1965) 338-353. [19] L. A. Zadah, The concept of linguisyic variable and its application to approximate reasoning-I , Information Sciences 8(1975),199-249.

15

1243

Alshehri ET AL 1229-1243

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

MENGER PROBABILISTIC NORMED RIESZ SPACES AND STABILITY OF LATTICE PRESERVING FUNCTIONAL EQUATION SEYED MOHAMMAD SADEGH MODARRES MOSADEGH, EHSAN MOVAHEDNIA, JUNG RYE LEE∗ , AND CHOONKIL PARK Abstract. The purpose of this paper is to introduce the concept of a Menger probabilistic normed Riesz space. We study some properties of these spaces and compare normed Riesz spaces with Menger probabilistic normed Riesz spaces. Next, we investigate the Hyers-Ulam stability of lattice homomorphisms in Menger probabilistic normed Riesz spaces.

1. Introduction Riesz spaces are named after Frigyes Riesz who first defined them in 1930 [20]. Riesz spaces are real vector spaces equipped with a partial order. Under this partial order the Riesz space must satisfy some axioms, including the axiom that it is a lattice. The theory of probabilistic normed spaces (briefly, PN spaces) was born as a “natural consequence of the theory of probabilistic metric spaces. For the basic theory of vector lattices (Riesz spaces) and Banach lattices and for unexplained terminology we refer to [2, 17, 27]. The theory of probabilistic metric spaces was introduced in 1951 by Menger [11]. He replaced the number d(p, q), which gives the distance between two points p and q in a nonempty set S, by a distribution function Fpq whose value Fp,q (t) at t ∈ [0, +∞) is interpreted as the probability that the distance between the points p and q is smaller than t. Menger’s idea was developed by the authors in [6, 7, 10]. The theory of PN spaces was introduced by Serstnev [23]. It were redefined by Alsina, Schweizer and Sklar [3, 4]. A classical question in the theory of functional equations is the following: When is it true that a function which approximately satisfies a functional equation D must be close to an exact solution of D? If the problem accepts a solution, we say that the equation D is stable. The first stability problem concerning group homomorphisms was raised by Ulam [26] in 1940. In 1941, Hyers [8] solved this stability problem for additive mappings subject to the Hyers condition on approximately additive mappings. The result of Hyers was generalized by Rassias [18] for linear mapping by considering an unbounded Cauchy difference. The stability problems of several functional equations have been extensively investigated by a number of authors, and there are many interesting results concerning this problem ([1, 9]). Recently, considerable attention has been increasing to the problem of fuzzy stability of functional equations. Several fuzzy stability results concerning Cauchy, Jensen, simple quadratic, and cubic functional equations have been investigated in [12, 13, 14, 15, 16, 19, 24, 25]. In this paper, Riesz fuzzy normed spaces are defined and the stability conditions are verified. 2010 Mathematics Subject Classification. 54A40, 46S40, 39B62, 39B52. Key words and phrases. Menger probabilistic normed Riesz space; Hyers-Ulam stability; lattice preserving functional equation; lattice homomorphism. ∗ Corresponding author.

1244

MOSADEGH ET AL 1244-1257

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S.M.S.M. MOSADEGH, E. MOVAHEDNIA, J. LEE, AND C. PARK

A nonempty set V with a relation “≤” is said to be an ordered set whenever the following conditions are satisfied: 1. x ≤ x for all x ∈ V. 2. x ≤ y and y ≤ x imply that x = y. 3. x ≤ y and y ≤ z imply that x ≤ z. If, in addition, for all x, y ∈ V either x ≤ y or y ≤ x, then V is called a totally ordered set. Let A be subset of an ordered set V . x ∈ V is called an upper bound of A if y ≤ x for all y ∈ A. z ∈ V is called a lower bound of A if y ≥ z for all y ∈ A. Moreover, if there is an upper bound of A, then A is said to be bounded from above. If there is a lower bound of A, then A is said to be bounded from below. If A is bounded from above and from below, then we will briefly say that A is order bounded. An order set (V, ≤) is called a lattice if any two elements x, y ∈ V have a least upper bound denoted by x ∨ y = sup{x, y} and a greatest lower bound denoted by x ∧ y = inf{x, y}. A real vector space V which is also an order set is an order vector space if the order and the vector space structure are compatible in the following sense: 1. If x, y ∈ V such that x ≤ y then x + z ≤ y + z for all z ∈ V. 2. If x, y ∈ V such that x ≤ y, then αx ≤ αy for all α ≥ 0. (V, ≤) is called a Riesz space if (V, ≤) is a lattice and an order vector space. A norm k · k on a Riesz space V is called a lattice norm if kxk ≤ kyk whenever |x| ≤ |y|. In the latter case, (V, k · k) is called a normed Riesz space. (V, k · k) is called a Banach lattice if for all x, y ∈ V 1. (V, k · k) is a Banach space; 2. V is a Riesz space; 3. k · k is a lattice norm. Let V be a Riesz space and the positive cone V + of V consist of all x ∈ V such that x ≥ 0. For every x ∈ V , let x+ = x ∨ 0, x− = −x ∨ 0, |x| = x ∨ −x. Let V be a Riesz space. For all x, y, z ∈ V , the following assertions hold: 1. x + y = x ∨ y + x ∧ y , −(x ∨ y) = −x ∧ −y; 2. x + (y ∨ z) = (x + y) ∨ (x + z) , x + (y ∧ z) = (x + y) ∧ (x + z); 3. |x| = x+ + x− , |x + y| ≤ |x| + |y|; 4. x ≤ y is equivalent to x+ ≤ y + and y − ≤ x− ; 5. (x ∨ y) ∧ z = (x ∧ y) ∨ (y ∧ z) , (x ∧ y) ∨ z = (x ∨ y) ∧ (y ∨ z). A Riesz space V is Archimedean if x ≤ 0 holds whenever the set {nx : n ∈ N } is bounded from above. Definition 1.1. [17] Let V be a Riesz space. The sequence {xn } is called uniformly bounded if there exist e ∈ V + and {an } ∈ l1 such that xn ≤ an · e. P Definition 1.2. [17] A Riesz space V is called uniformly complete if sup{ ni=1 xi : n ∈ N} exists for every uniformly bounded sequence {xn }, where xn ∈ V + . Definition 1.3. [17] Let V, W be Archimedean Riesz spaces. The function P : V → W is called positive if P (V + ) = {P (|x|) : x ∈ V } ⊂ W + . Theorem 1.1. [2] For a function P : V → W between two Riesz spaces, the following statements are equivalent: 1. P is a lattice homomorphism;

1245

MOSADEGH ET AL 1244-1257

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

MENGER PROBABILISTIC NORMED RIESZ SPACES

2. 3. 4. 5.

P (x+ ) = P (x)+ for all x ∈ V ; P (x ∧ y) = P (x) ∧ P (y); if x ∧ y = 0 in V , then P (x) ∧ P (y) = 0 holds in W ; P (|x|) = |P (x)|.

Definition 1.4. [1] Let V and W be Banach lattices and P : V → W a positive mapping. We define (P1 ) a lattice homomorphism functional equation: P (|x| ∨ |y|) = P (|x|) ∨ P (|y|); (P2 ) a semi-homogeneity: for all x ∈ V and every number α ∈ R+ P (α|x|) = αP (|x|). Remark 1.1. [1] Given two Banach lattices V and W and P : V → W be a positive function satisfying the property (P1 ). Then the following statements are valid. 1. P (|x ∨ y|) ≤ P (|x|) ∨ P (|y|) for all x, y ∈ V. 2. The semi-homogeneity implies that P (0) = 0. 3. P is an increasing operator, in the sense that if x, y ∈ V are such that |x| ≤ |y|, then P (|x|) ≤ P (|y|). A distance distribution function (briefly, d.d.f.) is a non-decreasing function F defined on R+ that satisfies F (0) = 0 and F (+∞) = 1, and is left continuous on (0, ∞). The set of all d.d.f’s will be denoted by ∆+ ; and the set of all F in ∆+ for which limx→+∞− F (x) = 1 by D+ . The elements of ∆+ are partially ordered via F ≤ G if and only if F (x) ≤ G(x) for all x ∈ R+ . The space ∆+ has both maximal element 0 and a minimal element ∞ defined by    0 if x ≤ 0  0 if x < +∞ 0 (x) = ∞ (x) =   1 if x > 0, 1 if x = ∞. Let [F, G; h] denote the condition  G(x) ≤ F (x + h) + h ∀x ∈

1 0, h

 .

For any F, G ∈ ∆+ and h in (0, 1], the function dL defined on ∆+ × ∆+ by dL (F, G) = inf {h | both [F, G; h] and [G, F ; h] hold } is called the modified levy metric on ∆+ . Convergence with respect to this metric is to week convergence of distribution function, i.e., for any sequence {Fn } in ∆+ and any F in ∆+ , we have dL (Fn , F ) → 0 if and only if the sequence {Fn (x)} converges to F (x) at each continuity point x of F . Moreover, the metric space (∆+ , dL ) is compact. If F and G are in ∆+ and F ≤ G, then dL (G, 0 ) ≤ dL (F, 0 ). The supremum of any set of d.d.f.’s in ∆+ is in ∆+ (see [5]). Definition 1.5. [5] A triangle norm (t-norm, for short) is a binary operation on the unit interval [0, 1], i.e., a function T : [0, 1] × [0, 1] → [0, 1] such that for all x, y, z ∈ [0, 1] the following four axioms are satisfied: (T 1) T (x, y) = T (y, x); (T 2) T (x, T (y, z)) = T (T (x, y), z); (T 3) T (x, y) ≤ T (x, z) whenever y ≤ z; (T 4) T (x, 1) = x.

1246

MOSADEGH ET AL 1244-1257

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S.M.S.M. MOSADEGH, E. MOVAHEDNIA, J. LEE, AND C. PARK

A t-norm T is continuous if and only if it is continuous in the first component, i.e., if for each y ∈ [0, 1] the one place function T (·, y) : [0, 1] → [0, 1],

x 7−→ T (x, y),

is continuous. A continuous t-conorm T ∗ is a continuous binary operation on [0, 1] which is related to the continuous t-norm T through T ∗ (x, y) = 1 − T (1 − x, 1 − y). A continuous t-norm T is Archimedean if T (x, x) < x for all x ∈ (0, 1) (see [21]). Definition 1.6. A triangle function is a binary operation on ∆+ , namely, a function τ : ∆+ × ∆+ → ∆+ that is associative, commutative, nondecreasing in each argument and which has 0 as unit, viz, for all F, G, H ∈ ∆+ , 1. τ (τ (F, G), H) = τ (F, τ (G, H)); 2. τ (F, G) = τ (G, F ); 3. F ≤ G ⇒ τ (F, H) ≤ τ (G, H); 4. τ (F, 0 ) = F. A triangle function τ is Archimedean on ∆+ if τ (F, G) < F for all F, G ∈ ∆+ and F 6= ∞ , G 6= 0 . Moreover, a triangle function is continuous if it is continuous in the metric space (∆+ , dL ). Typical continuous triangle functions are τT (F, G)(x) = sup T (F (s), G(t)) τT ∗ (F, G)(x) = inf s+t=x T ∗ (F (s), G(t)), s+t=x

T∗

where T and are t-norm and t-conorm respectively. If T and T ∗ are continuous t-norm and t-conorm, respectively, then τT and τT ∗ are uinformly continuous on (∆+ , dL ) (see [21]). Theorem 1.2. [21] Let T be an Archmidean continuous t-norm. Then τT is a triangle function having no nontrivial idempotent in ∆+ , that is, τT is Archimedean triangle function (there is a similar theorem for τT ∗ ). Definition 1.7. [5] A probabilistic normed space, which will henceforth be called briefly a PN space, is a quadruple (V, ν, τ, τ ∗ ), where V is a linear space, τ and τ ∗ are continuous triangle functions with τ ≤ τ ∗ , and the mapping ν : V → ∆+ satisfies, for all p and q in V , the conditions (N 1) νp = 0 if and only if p = θ (θ is the null vector in X); (N 2) ν−p = νp ; (N 3) νp+q ≥ τ (νp , νq ); (N 4) νp ≤ τ ∗ (ναp , ν(1−α)p ) for every α ∈ [0, 1]. The function ν is called the probabilistic norm, a PN space is called a Serstnev space if it satisfies (N 1), (N 3) and the following condition:   x ναp (x) = νp |α| ∗ holds for all α ∈ R \ {0} and x > 0. If τ = τT and τ = τT ∗ for some continuous t-norm T and its t-conorm T ∗ then (V, ν, τ, τ ∗ ) is denoted by (V, ν, T ) and is a Menger PN space. For p ∈ V and t > 0, the strong t-neighbourhood of p is defined by the set Np (t) = {q ∈ V : dL (νp−q , 0 ) < t} = {q ∈ V : νp−q (t) > 1 − t}. Since τ is continuous, the system of neighbourhood {Np (t) : p ∈ V and t > 0} determines a Hausdorff and first countable topology on V , called a strong topology.

1247

MOSADEGH ET AL 1244-1257

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

MENGER PROBABILISTIC NORMED RIESZ SPACES

A sequence {pn } in (V, ν, τ, τ ∗ ) is said to be strongly convergent (convergent with respect to PN

the probabilistic norm) to a point p in V , and we will write pn −−→ p, if for any t > 0, there PN

is a positive integer N such that pn is in Np (t) whenever n ≥ N . Thus pn −−→ p if and only if limn→∞ dL (νpn −p , 0 ) = 0. We will call p the strong limit of {pn }. A sequence {pn } in (V, ν, τ, τ ∗ ) is said to be strong Cauchy if for any t > 0, there is an integer N such that pn is in Npm (t) whenever n, m ≥ N . If every strong Cauchy sequence is strongly convergent to a point p in V , then we say that (V, ν, τ, τ ∗ ) is complete in the strong topology. Theorem 1.3. [5] Let (V, ν, τ, τ ∗ ) be a PN space in which τ ∗ is Archimedean and νp 6= ∞ for all p ∈ V . Then for every p ∈ V , the mapping R 3 α 7−→ αp is uniformly continuous. Theorem 1.4. [5] Let (V, ν, τ, τ ∗ ) be a PN space with τ continuous. If V is endowed with the strong topology and ∆+ with the topology of levy metric dL , then the probabilistic norm ν : V → ∆+ is uniformly continuous. Note that if T is an Archmidean continuous t-norm, we use the above theorems in Menger PN space (V, ν, T ). Definition 1.8. [22] Let (V, ≤) be a (real) Riesz space equipped with a probabilistic norm ν, and continuous triangle functions τ and τ ∗ such that τ ≤ τ ∗ . The probabilistic norm on V is a probabilistic Riesz norm provided that |x| ≤ |y| in V implies νx ≥ νy . Any Riesz space, equipped with probabilistic Riesz norm is a probabilistic normed Riesz space (PNR space, briefly). If a PNR space V is complete with respect to the strong topology, then V is a probabilistic Banach lattice (PBL, in short). Remark 1.2. In classical Riesz space theory, it is known that every normed Riesz space is Archimedean. In general, a PNR space V need not be Archimedean (see [22]). Nevertheless, if the condition that the triangle function τ ∗ of the PNR space V is Archimedean and νp 6= ∞ for all p ∈ V is satisfied, then V is also Archimedean (see [5]). 2. Main results Definition 2.1. A Menger probabilistic normed Riesz space (MPNR- space, for short) is a quaternary (V, ν, T, ≤) where (V, ≤) is a real Riesz space, T is a continuous t-norm and ν : V → D+ (for x ∈ V the distribution function ν(x) is denoted by νx and νx (t) is the value of νx at t ∈ R) satisfies the following conditions: (M1) νx (0) = 0 for all x ∈ V ; (M2) νx = 0 if and only if x = θ (θ is the null vector in V ); t ) for all x ∈ V and α ∈ R \ {0}; (M3) ναx (t) = νx ( |α| (M4) νx+y (t1 + t2 ) ≥ T (νx (t1 ), νy (t2 )), for all x, y ∈ V and t1 , t2 ∈ R+ ; (M5) norm Riesz Menger property: νx (t) ≥ νy (t) whenever |x| ≤ |y| for all x, y ∈ V and t ∈ R+ . Example 2.1. Let (V, k.k, ≤) be a normed Riesz space. Define ν : V → D+ by  t  if t > 0,  t + kxk νx (t) =   0 if t ≤ 0. Then (V, ν, T, ≤) is a Menger PN space. It is clear that (M 1) − (M 4) hold. Suppose that |x| ≤ |y| for all x, y ∈ V . Then kxk ≤ kyk since (V, k · k, ≤) is a normed Riesz space. Therefore,

1248

MOSADEGH ET AL 1244-1257

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S.M.S.M. MOSADEGH, E. MOVAHEDNIA, J. LEE, AND C. PARK

t t ≥ t + kxk t + kyk and so νx (t) ≥ νy (t) for all t > 0. Lemma 2.1. If (R, ν, T ) is a Menger PN-space, then (R, ν, T, ≤) is a Menger probabilistic normed Riesz space. We show that norm Riesz Menger property is satisfied in (R, ν, T, ≤). Let |x| ≤ |y| for x, y ∈ R \ {0}. Then ! t νx (t) = ν xy .y (t) = νy ≥ νy (t) | xy | for all t ∈ R+ . Definition 2.2. Let (V, ν, T, ≤) be an Menger probabilistic normed Riesz space. Let {xn } be a sequence in V . Then {xn } is said to be convergent if there exists x ∈ V such that lim νxn −x (t) = 1.

n→∞

In this case, x is called the limit of {xn }. Definition 2.3. The sequence {xn } in a Menger probabilistic normed Riesz space (V, ν, T, ≤) is called Cauchy if for each  > 0 and δ > 0, there exists some n0 such that νxn −xm (δ) > 1 −  for all m, n ≥ n0 . Clearly, every convergent sequence in a Menger probabilistic normed Riesz space is Cauchy. If each Cauchy sequence is convergent in a Menger probabilistic normed Riesz space (V, ν, T, ≤), then (V, ν, T, ≤) is called a Menger probabilistic Banach Riesz space (briefly, MPBR- space). Definition 2.4. A sequence {xn } in a Menger probabilistic normed Riesz space (V, ν, T, ≤) is called order Menger convergent to x as n → ∞ if there exists a sequence {yn } ↓ 0 as n → ∞ and νxn −x (t) ≥ νyn (t) for all n ∈ N and t > 0. We write x = OM − limn→∞ xn . Theorem 2.1. Let (V, ν, T, ≤) be a Menger probabilistic normed Riesz space. Then each lattice operator is continuous. Proof. Assume that lim νxn −x (t) = 1

n→∞

&

lim νyn −y (s) = 1

n→∞

for all t, s > 0. Then νxn ∧yn −x∧y (t + s) = νxn ∧yn −xn ∧y+xn ∧y−x∧y (t + s) ≥ T (νxn ∧yn −xn ∧y (t), νxn ∧y−x∧y (s)) ≥ T (νyn −y (t), νxn −x (s)) . As n → ∞, we have lim νxn ∧yn −x∧y (t + s) = 1.

n→∞

So lim xn ∧ yn = x ∧ y.

n→∞

It is easy to see that the other lattice operations are continuous.

1249



MOSADEGH ET AL 1244-1257

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

MENGER PROBABILISTIC NORMED RIESZ SPACES

Theorem 2.2. Let (V, ν, T, ≤) be a Menger PNR space and T be an Archimedean continuous t-norm and νx 6= ∞ for all x ∈ V . Then V is Archimedean Menger PNR space. Proof. Let (V, ν, T, ≤) be a Menger probabilistic normed Riesz space. Consider x, y ∈ V + such that nx ≤ y for all n ∈ N. Then νnx (t) ≥ νy (t),

∀t > 0

and so   t ≥ νy (t), νx n

∀t > 0.

Replacing t by nt, we get νx (t) ≥ νy (nt) = ν y (t) n

∀t > 0.

Since T is an Archimedean continuous t-norm and νx 6= ∞ , the probabilistic norm ν is continuous (see Theorem 1.3) and we have x = 0. Hence V has Archimedean property (see Theorems 1.4 and 1.2).  Throughout this article we will assume that Menger PN space (V, ν, T, ≤) has an Archimedean continuous t-norm T and νx 6= ∞ . Proposition 2.1. Assume that {xn } and {yn } are sequences in Menger probabilistic normed Riesz space (V, ν, T, ≤) such that xn → x and yn → y in order Menger as n → ∞. Then OM − lim (xn + yn ) = x + y, n→∞

OM − lim (xn ∨ yn ) = x ∨ y, n→∞

OM − lim (xn ∧ yn ) = x ∧ y. n→∞

Theorem 2.3. Let (V, ν, T, ≤) be a Menger probabilistic normed Riesz space. If xn → x (in order Menger or in norm) and xn ≥ y for all n, then x ≥ y. If xn → x and xn ≥ 0 for all n ∈ N, then x ≥ 0. This shows that the positive cone V + is closed. Proof. It may be assumed that y = 0. Since |x− − x− n | ≤ |x − xn |, νx− −x− (t) ≥ νx−xn (t) n and so the sequence {xn } converges to x as n → ∞. Thus νx− −x− (t) ≥ 1, which means that n − x = 0 and hence x ≥ 0.  Theorem 2.4. Let (V, ν, T, ≤) be a Menger probabilistic normed Riesz space. Every increasing convergent sequence {xn } ⊂ V is convergent to u = sup{xn : n ∈ N}. Proof. Suppose that {xn } is an increasing convergent sequence and lim νxn −x (t) = 1 for all t > 0 for all n ∈ N.

n→∞

Since for every m ≥ n, we have xm − xn ∈ V + , it follows from Theorem 2.3 that x ≥ xn and xn ≤ u ≤ x for all n ∈ N . So by (M 4) νu−xn (t) ≥ νx−xn (t) for all t > 0. Therefore, we have lim νxn −u (t) = 1 for all t > 0.

n→∞

Hence u = x.



1250

MOSADEGH ET AL 1244-1257

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S.M.S.M. MOSADEGH, E. MOVAHEDNIA, J. LEE, AND C. PARK

Theorem 2.5. Every Menger probabilistic Banach Riesz space is uniformly complete. Proof. Let (V, ν, T, ≤) be a Menger probabilistic Banach Riesz space and {xn } ⊂ V + be a se1 + quence Pnsuch that xn ≤ an e for a suitable sequence {an } ∈ l and some e ∈ V . We show that sup{ i=1 xi : n ∈ N } exists. Let yn = x1 + x2 + ... + xn and bn =

∞ X

aj .

j=n+1

By Theorem 2.1 and (P N 4), we have (t) = νbn ·e (t) νyn+p −yn (t) = νxn+1 +...+xn+p (t) ≥ νP∞ j=1 an+j .e for all t > 0. As n → ∞, we get lim νyn+p −yn (t) = 1.

n→∞

So {yn } is a Cauchy sequence in Menger probabilistic Banach Riesz space and therefore there exists y ∈ V such that yn → y. Since yn is increasing and convergence sequence, by Theorem 2.4, we have lim νy −∨yn (t) = 1, n→∞ n P∞ that is, yn → sup{ i=1 xi : n ∈ N }. Using a unique limit, we have ∞ X y = sup{ xi : n ∈ N }. i=1

Thus the proof is complete.



Definition 2.5. (i) Let (V, ν, T, ≤) be a Menger probabilistic normed Riesz space. The subset A of V is said to be solid if the following conditions hold: (1) x ∈ A if and only if |x| ∈ A; (2) 0 ≤ x ∈ A and y ∈ V + imply that x ∧ y ∈ A. (ii) The subset A of V is called an ideal in V if A is a solid linear subspace of V . (iii) An order Menger closed ideal A of V is called a band. Theorem 2.6. Let (V, ν, T, ≤) be a Menger probabilistic normed Riesz space. The closure solid subset of V is solid. Proof. Suppose that A ⊆ V is a solid and x ∈ A. Assume that {xn } ⊆ A is a sequence such that xn → x as n → ∞. It follows from (M 5) that ν|xn |−|x| (t) ≥ ν|xn −x| (t) = νxn −x (t). Therefore |xn | → |x| as n → ∞ and so |x| ∈ A, since A is a solid. On the other hand, suppose that |x| ∈ A. Then there exists xn ⊂ A+ such that xn → |x|. It follows from Theorem 2.1 that xn ∧ x → x ∧ |x| = x, as n → ∞ and hence x ∈ A. Finally, suppose that 0 ≤ x ∈ A and y ∈ V + . Then there exists xn ⊂ A+ such that xn → x as n → ∞. It follows from Theorem 2.1 that xn ∧ y → x ∧ y. Therefore, x ∧ y ∈ A. Thus the proof is complete.

1251



MOSADEGH ET AL 1244-1257

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

MENGER PROBABILISTIC NORMED RIESZ SPACES

Theorem 2.7. Let (V, ν, T, ≤) be a Menger probabilistic normed Riesz space. Then every band in V is closed. Proof. Suppose that B is a band and assume that {xn } ⊂ B is a sequence such that xn −→ x for some x ∈ V . It follows from Theorem 2.1 that |xn | ∧ |x| −→ |x| as n → ∞. For every n ∈ N, let yn = (|xn | ∨ ... ∨ |x1 |) ∧ |x|. Then {yn } is an increasing sequence and yn = (|xn | ∧ |x|) ∨ ... ∨ (|x1 | ∧ |x|) and so |xn | ∧ |x| ≤ yn ≤ |x|. By (M 4), we have ν|x|−yn (t) ≥ ν|x|−|xn |∧|x| (t) for all t > 0. Hence yn −→ |x| as n → ∞. Theorem 2.4 implies that |x| = sup{yn : n ∈ N } ∈ B. Hence x ∈ B.  Theorem 2.8. Let (V, ν, T, ≤) be a Menger probabilistic normed Riesz space. We define the function k · k by kxk = inf{t ≥ 0, νx (t) = 1} for all x ∈ V. Then k · k is a lattice norm on V and (E, k · k, ≤) is a normed Riesz space. Proof. It suffices to show that k · k satisfies the lattice norm conditions. (1) From (M 1) and (M 2) it is easy to see that kxk ≥ 0 and kxk = 0 if and only if x = 0. (2) From (M 3), for any α ∈ R \ {0},     t kαxk = inf{t ≥ 0, ναx (t) = 1} = inf t ≥ 0, νx =1 α = |α| inf{t ≥ 0, νx (t) = 1} = |α| · kxk, and if α = 0, then the above equality still holds. (3) By definition of k · k, for any  > 0, we have  ∃ t1 ∈ A such that t1 ≤ kxk + , 2 where A = {t ≥ 0; νx (t) = 1}. Therefore     νx kxk + = 1 , νy kyk + = 1. 2 2 Hence from (M 4) it follows that νx+y (kxk + kyk + ) = 1 ⇒ kxk + kyk +  ∈ A for all x, y ∈ V . By definition of A, kx + yk ≤ kxk + kyk + . Letting  → 0, we have kx + yk ≤ kxk + kyk. So k · k is a norm on V .

1252

MOSADEGH ET AL 1244-1257

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S.M.S.M. MOSADEGH, E. MOVAHEDNIA, J. LEE, AND C. PARK

(4) Finally, assume that |x| ≤ |y| for all x, y ∈ V . Then νx (t) ≥ νy (t). We define kxk = inf A2 = inf{t ≥ 0; νx (t) = 1}; kyk = inf A1 = inf{t ≥ 0; νy (t) = 1}. If t1 ∈ A1 , then νx (t1 ) = 1 and so A1 ⊆ A2 . Therefore kyk ≥ kxk. Thus the proof is complete.



Theorem 2.9. Let (V, ν, T, ≤) be a Menger probabilistic normed Riesz space. We define the function k · kα by kxkα = inf{t ≥ 0, νx (t) > 1 − α} for all x ∈ V , α ∈ (0, 1). Then k · kα is a lattice semi-norm. Proof. The proof is the same as in the proof of the above theorem.



Theorem 2.10. Let (E, k · kα , ≤) be a normed Riesz space. We define the function νx (t) by νx (t) = sup{α ∈ (0, 1) : kxkα ≤ t}. Then (V, ν, T, ≤) is a Menger probabilistic normed Riesz space, where T is a t-norm. Proof. The proof is the same as in the prrof of Theorem 2.8.



Corollary 2.1. Let (V, ν, T, ≤) be a Menger probabilistic Banach Riesz space, and k · k be defined in Theorem 2.8. If P : E → E is a positive linear operator then P is continuous. Proof. Assume that P fails to be continuous. Hence for every n ∈ N there exists xn ∈ V such that kxn k ≤ 2−n and n ≤ kP xn k, i.e., xn → θ but P xn 9 θ, where θ is a null vector in V . Since P is a positive linear operator, P x ≤ P |x| then νP x (t) ≥ νP |x| (t). So kP |x|k = inf{t ≥ 0, νP |x| (t) = 1} ≥ inf{t ≥ 0, νP x (t) = 1} = kP xk for all x ∈ V . We may assume that xn ≥ 0. Let X x= xn ∈ V + . n

Then x ≥ xn and so kP xk ≥ kP xn k ≥ n for all n ∈ N. This is a contradiction.



3. Hyers-Ulam stability of lattice homomorphisms in Menger PNR spaces Using the direct method, we investigate the Hyers-Ulam stability of lattice homomorphisms in Menger probabilistic normed Riesz spaces. Theorem 3.1. Let f be a positive function from a Menger probabilistic normed Riesz space (V, ν, T, ≤) to a Menger probabilistic Banach Riesz space (W, µ, T, ≤), where T is an Archimedean continuous t-norm and νp , µq 6= ∞ , for all p ∈ V and q ∈ W . Let (3.1)

µf (τ x∨ηy)−τ f (x)∨ηf (y) (t) ≥ νϕ(τ x∨ηy,τ x∧ηy) (t)

for all x, y ∈ V and t > 0. Here ϕ : V × V → V is a mapping such that α

(3.2)

ϕ(x, y) ≤ (τ η) 2 ϕ( xτ , ηy )

for all τ, η ≥ 1 and for some α ∈ [0, 1). Then there exists a unique positive function T : V → W which satisfies the properties (P 1),(P 2) and inequality   τ − τα µT(x)−f (x) (t) ≥ νϕ(x,x) t τα for all x ∈ V + .

1253

MOSADEGH ET AL 1244-1257

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

MENGER PROBABILISTIC NORMED RIESZ SPACES

Proof. Putting y = x and τ = η in (3.1), we have µf (τ x)−τ f (x) (t) ≥ νϕ(τ x,τ x) (t). By (M 5) and (3.2), we obtain (3.3)

µ1

τ f (τ x)−f (x)

(τ α−1 t) ≥ νϕ(x,x) (t).

Replacing x by τ x in (3.3) and using (3.2) and (M 5), we have µ1

2 τ f (τ x)−f (τ x)

(τ α−1 t) ≥ νϕ(τ x,τ x) (t) ≥ ντ α ϕ(x,x) (t) = νϕ(x,x) ( τtα ).

Hence µ

(3.4)

(τ 1 1 f (τ 2 x)− τ f (τ x) τ2

2α−2

t) ≥ νϕ(x,x) (t).

By comparing (3.3) and (3.4) and using (M 4), we have   α−1 2(α−1) µ1 (3.5) (τ + τ )t ≥ νϕ(x,x) (t). 2 τ2

f (τ x)−f (x)

Again, replacing x by τ x in (3.5), we get   α−1 2(α−1) (τ + τ )t ≥ νϕ(τ x,τ x) (t) ≥ ντ α ϕ(x,x) (t) ≥ νϕ(x,x) µ1 3 τ2

f (τ x)−f (τ x)

t τα



and so (3.6)

µ

 1 1 f (τ 3 x)− τ f (τ x) τ3

(τ 2(α−1) + τ 3(α−1) )t



≥ νϕ(x,x) (t).

By comparing (3.3) and (3.6), we obtain   µ1 (τ (α−1) + τ 2(α−1) + τ 3(α−1) )t ≥ νϕ(x,x) (t). 3 τ3

f (τ x)−f (x)

With this process, we have (3.7)

µ

1 n τ n f (τ x)−f (x)

n X

! τ

k(α−1)

≥ νϕ(x,x) (t)

t

k=1

for all n ∈ N. If m ∈ N and n > m, then n − m ∈ N. Replacing n by n − m in (3.7), we get ! n−m X k(α−1) µ 1 (3.8) τ t ≥ νϕ(x,x) (t). n−m τ n−m

Replacing x by (3.9)

τ mx

f (τ

x)−f (x)

k=1

in (3.8) and using (M 5), we obtain µ

1 1 n m τ n f (τ x)− τ m f (τ x)

n X

! τ k(α−1) t

≥ νϕ(x,x) (t).

k=m+1

Let c > 0 and  > 0 be given. Since νϕ(x,x) (t) ∈ D+ , limt→∞ νϕ(x,x) (t) = 1. Therefore, there is some t0 > 0 such that νϕ(x,x) (t0 ) ≥ 1 − . P∞ k(α−1) Fix some t ≥ t0 . The convergence of k=1 τ t guarantees that there exists some n0 ≥ 0 such that for each n > m > n0 , the inequality n X τ k(α−1) t < c k=m+1

1254

MOSADEGH ET AL 1244-1257

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S.M.S.M. MOSADEGH, E. MOVAHEDNIA, J. LEE, AND C. PARK

holds. It follows that µ

(c) 1 1 n m τ n f (τ x)− τ m f (τ x)

≥ µ

1 1 n m τ n f (τ x)− τ m f (τ x)

n X

! τ

k(α−1)

t0

k=m+1

≥ νϕ(x,x) (t0 ) ≥ 1 − . 

1 n τ n f (τ x)



is a Cauchy sequence in the Menger probabilistic Banach Riesz space (W, µ, T, ≤) So and thus this sequence converges to T(x) ∈ W . It means that lim µ

n→∞

(t) 1 n τ n f (τ x)−T(x)

= 1.

Furthermore, by putting m = 0 in (3.9), we obtain µ

1 n τ n f (τ x)−f (x)

n X

! τ

k(α−1)

t

≥ νϕ(x,x) (t).

k=1

So

 t . (t) ≥ νϕ(x,x) Pn µ1 n k(α−1) τ n f (τ x)−f (x) k=1 τ Since νp , µq 6= ∞ and T is an Archimedean continuous t-norm, norm probabilistic is continuous (see Theorems 1.3 and 1.4 ). Thus we have   τ − τα µT(x)−f (x) (t) ≥ νϕ(x,x) t . τα 

Next, we show that T satisfies (P 1). Putting τ = η = τ n in (3.1), we get  µf (τ n x∨τ n y)−τ n f (x)∨τ n f (y) (t) ≥ νϕ(τ n x∨τ n y,τ n x∧τ n y )(t) ≥ νϕ(x∨y,x∧y)



t τ nα

.

Replacing x by τ n x and y by τ n y in the last inequality, one can get 

t



µf (τ n (τ n x∨τ n y))−τ n f (τ n x)∨τ n f (τ n y) (t) ≥ νϕ(τ n x∨τ n y,τ n x∧τ n y ) τ nα   t ≥ νϕ(x∨y,x∧y) , 2nα τ which implies µ f (τ 2n (x∨y)) τ 2n

f (τ n x) f (τ n y) − τ nx ∨ τ n

(t) ≥ ντ 2n(α−1) ϕ(x∨y,x∧y) (t).

Since norm probabilistic is continuous, the term on the right-hand side of the above inequality tends to 1 as n → ∞. By Theorem 2.1, we obtain µT(x∨y)−T(x)∨T(y) (t) ≥ 1 for all x, y ∈ V . This means that T(x ∨ y) = T(x) ∨ T(y). Consequently, the property (P 1) holds. We show that T(τ x) = τ T(x) for all x ∈ V + and τ ≥ 1. In fact, in the inequality (3.1), we choose η = τ and y = 0 and substitute 2n τ for τ and consider Remark 1.1. Then (3.10)

µ(f (2n τ x)−2n τ f (x)) (t) ≥ νϕ(2n τ x,0) (t)

1255

MOSADEGH ET AL 1244-1257

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

MENGER PROBABILISTIC NORMED RIESZ SPACES

for all x ∈ V + . Now, replacing x by 2n x in (3.10), we obtain  µ f (4n τ x) τ f (2n x)  4tn ≥ νϕ(4n τ x,0) (t) ≥ ν4nα τ α ϕ(x,0) (t). 4n



2n

Therefore, µ f (4n τ x) 4n



τ f (2n x) 2n

(t) ≥ ν4n(α−1) τ α ϕ(x,0) (t).

Since norm probabilistic is continuous, the term on the right-hand side of the above inequality tends to 1 as n → ∞. Thus T(τ x) = τ T(x), as desired.  Corollary 3.1. Let f be a positive function from a Menger probabilistic normed Riesz space (V, ν, T, ≤) to a Menger probabilistic Banach Riesz space (W, µ, T, ≤), where T is an Archimedean continuous t-norm and νp , µq 6= ∞ , for all p ∈ V and q ∈ W . Let ρ : [0, ∞) → [0, ∞) be a continuous function, for which there are numbers η ∈ R and 0 ≤ r < 1 such that (3.11)

µ f (α|x|∨β|y|)−

αρ(α)f (|x|)∨βρ(β)f (|y|) ρ(α)∨ρ(β)

 (t)

≥ ν(η(xr ∨yr )) (t)

for all x, y ∈ V and α, β ∈ R+ . Then there exists an unique positive mapping T : V → W which satisfies the properties (P1 ), (P2 ) and the inequality µ(F (|x|)−T(|x|) (t) ≥ ν

2ηx 2−2r

 (t)

for all x ∈ V + . Proof. Putting α = β = 2 and x = y in (3.11), we get µ f (2|x|)−

2ρ(2)f (|x|)∨2ρ(2)f (|x|) ρ(2)∨ρ(2)

 (t)

≥ ν(ηxr ) (t)

for all x ∈ X and r ∈ [0, 1). Therefore, µ(f (2|x|)−2f (|x|)) (t) ≥ ν(ηxr ) (t), µ 1

2 f (2|x|)−f (|x|)

 (t)

≥ ν(ηxr ) (2t).

The rest of the proof is similar to the previous one.



References [1] N. K. Agbeko, Stability of maximum preserving functional equation on Banach lattice. Miskolc Math. Notes 13 (2012), 187–196. [2] C. D. Aliprantis and O. Burkinshaw, Positive Operators, Springer Science and Business Media, 2006. [3] C. Alsina, B. Schweizer and A. Sklar, On the definition of a probabilistic normed space, Aequationes Math. 46 (1993), 91–98. [4] C. Alsina, B. Schweizer and A. Sklar, Continuity properties of probabilistic norms, J. Math. Anal. Appl. 46 (1997), 446–452. [5] B. L. Guillen and P. Harikrishnan, Probabilistic Normed Spaces, Imperial College Press, London, 2014. [6] B. L. Guillen, B. R. Lallena and J. A. Sempi, A study of boundedness in probabilistic normed spaces, J. Math. Anal. Appl. 232 (1999), 183–196. [7] B. L. Guillen, B. R. Lallena and J. A. Sempi, Normability of probabilistic normed spaces, Note. Mat. 29 (2009), 99–111. [8] D. H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. USA 27 (1941), 222–224.

1256

MOSADEGH ET AL 1244-1257

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S.M.S.M. MOSADEGH, E. MOVAHEDNIA, J. LEE, AND C. PARK

[9] S. Jung, Hyers-Ulam-Rassias stability of Jensen’s equation and its application, Proc. Amer. Math. Soc. 126 (1998), 3137–3143. [10] D. C. Kent and G. D. Richardson, Ordered probabilistic spaces, J. Aust. Math. Soc. 46 (1989), 88–99. [11] K. Menger, Probabilistic geometry, Proc. Natl. Acad. Sci, USA 37 (1951), 226–229. [12] A. K. Mirmostafaee and M. S. Moslehian, Fuzzy almost quadratic functions, Results Math. 52 (2008), 161–177. [13] A. K. Mirmostafaee and M. S. Moslehian, A fixed point method to the stability of a Jensen functional equation in intuitionistic fuzzy 2-Banach spaces, J. Comput. Anal. Appl. 22 (2017), 546–557. [14] E. Movahednia, Fuzzy stability of quadratic functional equations in general cases, ISRN Math. Anal. 2011, Art. ID 503164 (2011). [15] E. Movahednia, S. M. S. M. Modarres, C. Park and D. Y. Shin, Stability of a lattice preserving functional equation on riesz space: fixed point alternative, J. Comput. Anal. Appl. 21 (2016), 83–89. [16] E. Movahednia and M. Mursaleen, Stability of a generalized quadratic functional equation in intuitionistic fuzzy 2-normed space, Filomat 30 (2016), 449-457. [17] P. M. Nieberg, Banach Lattice, Springer-Verlag, Berlin, Heidelberg, 1991. [18] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 (1978), 297–300. [19] K. Ravi, E. Thandapani and B. V. Senthil Kumar, Solution and stability of a reciprocal type functional equation in several variables, J. Nonlinear Sci. Appl. 7 (2014), 18–27. [20] F. Riesz, Sur la decomposition des oprations fonctionnelles linaires, Atti Congr. Internaz. Mat. Bologna 3 (1930), 143–148. [21] B. Schweizer and A. Sklar, Probabilistic Metric Spaces, North-Holland Series in Probability and Applied Mathematics, North-Holland Publishing Co., New York, 1983. [22] C. Sencimen and S. Pehlivan, Probabilistic normed Riesz spaces, Acta Math. Sinica, English Series 28 (2012), 1401–1410. [23] A. N. Serstnev, On the nation of a random normed spaces, Doki. Akad. Nauk. SSSR 149 (1963), 280–283. [24] D. Shin, C. Park and Sh. Farhadabadi, On the superstability of ternary Jordan C ∗ -homomorphisms, J. Comput. Anal. Appl. 16 (2014), 964–973. [25] D. Shin, C. Park and Sh. Farhadabadi, Stability and superstability of J ∗ -homomorphisms and J ∗ -derivations for a generalized Cauchy-Jensen equation, J. Comput. Anal. Appl. 17 (2014), 125–134. [26] S. M. Ulam, Problems in Modern Mathematics, Chapter 6, Wiley, New York, 1964. [27] C. Zaanen, Introduction to Operator Theory in Riesz Spaces, Springer Science and Business Media, 2012. Seyed Mohammad Sadegh Modarres Mosadegh Department of Mathematics, University of Yazd, P. O. Box 89195-741, Yazd, Iran E-mail address: [email protected] Ehsan Movahednia Department of Mathematics, Behbahan Khatam Al-Anbia University of Technology, Behbahan, Iran E-mail address: [email protected] Jung Rye Lee Department of Mathematics, Daejin University, Kyunggi 11159, Korea E-mail address: [email protected] Choonkil Park Research Institute for Natural Sciences, Hanyang University, Seoul 04763, Korea E-mail address: [email protected]

1257

MOSADEGH ET AL 1244-1257

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FOURIER SERIES OF SUMS OF PRODUCTS OF POLY-GENOCCHI AND POLY-BERNOULLI FUNCTIONS TAEKYUN KIM1 , DAE SAN KIM2 , DMITRY V. DOLGY3 , AND JONGKYUM KWON4,∗

Abstract. In this paper, we consider three types of functions given by the sums of products of poly-Genocchi and poly-Bernoulli functions and derive their Fourier series expansions. Moreover, we will express each of them in terms of Bernoulli functions.

1. Introduction Let r be any integer. The following series Lir (x) =

∞ ∑ xm mr m=1

(1.1)

is the rth polylogarithm function for r ≥ 1, and a rational function for r ≤ 0. Then it is easy to see that d 1 (Lir+1 (x)) = Lir (x). dx x

(1.2)

(r)

The poly-Bernoulli polynomials Bm (x) of index r are given by (see [5–7]) ∞ ∑ Lir (1 − e−t ) xt tm (r) e = Bm (x) . t e −1 m! m=0 (r)

(1.3)

(r)

When x = 0, Bm = Bm (0) are called poly-Bernoulli numbers of index r. In (1) particular, if r = 1, Bm (x) = Bm (x) are the Bernoulli polynomials defined by ∞ ∑ t tm xt e = Bm (x) . t e −1 m! m=0

(1.4)

We note here, in passing, that this definition of poly-Bernoulli polynomials are slightly different from the original definition (see [4–6]). As to poly-Bernoulli polynomials, we need to note the following: (r)

(0) (0) B0 (x) = 1, Bm (x) = xm , Bm = δm,0 ,

d (r) (r) (r) (r+1) (r+1) B (x) = mBm−1 (x), Bm (1) − Bm = Bm−1 , (m ≥ 1). dx m

(1.5)

2010 Mathematics Subject Classification. 11B83, 42A16. Key words and phrases. Fourier series, poly-Genocchi polynomial, poly-Bernoulli polynomial. ∗ corresponding author. 1

1258

T. KIM ET AL 1258-1275

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

Fourier series of sums of products of poly-Genocchi and poly-Bernoulli functions (r)

The poly-Genocchi polynomials Gm (x) of index r were introduced in [3] as an analogy to poly-Bernoulli polynomials and defined by (see [8–11]) ∞ ∑ 2Lir (1 − e−t ) xt tm e = G(r) . (1.6) m (x) t e +1 m! m=0 (r)

(r)

When x = 0, Gm = Gm (0) are called poly-Genocchi numbers of index r. In the (1) special case of r = 1, Gm (x) = Gm (x) are the Genocchi polynomials given by ∞ ∑ 2t xt tm e = G (x) . (1.7) m et + 1 m! m=0 We would like to mention here that the poly-Genocchi polynomials were named (r) as poly-Euler polynomials in [3] and denoted by Em . However, for the obvious reason it seems more appropriate to call them poly-Genocchi polynomials rather than poly-Euler polynomials. In fact, there are other definitions for poly-Euler numbers and polynomials. For these, the interested reader may refer to the papers [1, 16, 17]. As to poly-Genocchi polynomials, we need to note the following properties. d (r) (r) (r) = 2Bm−1 , (m ≥ 1), (1) + G(r+1) G (x) = mGm−1 (x), G(r+1) m m dx m (r) (r) G0 (x) = 0, G1 (x) = 1, deg G(r) m (x) = m − 1, (m ≥ 1).

(1.8)

The properties in (1.8) immediately follow from the identity (m−1 ( ) ) ∞ ∞ ∑ ∑ ∑ m tm tm (r) Gm (x) = , (1.9) am−l El (x) m! m=1 m! l m=0 l=0 ∑∞ ∑∞ tn tn where Lir (1 − e−t ) = n=1 an n! = t + n=2 an n! , and Em (x) are the Euler polynomials given by ∞ ∑ 2 tm xt e = . (1.10) E (x) m et + 1 m! m=0 For any real number x, we let < x >= x − [x] ∈ [0, 1)

(1.11)

denote the fractional part of x. We also need the following facts about Bernoulli functions Bm (< x >): (a) for m ≥ 2, ∞ ∑ e2πinx Bm (< x >) = −m! , (2πin)m

(1.12)

n=−∞,n̸=0

(b) for m = 1, −

∞ ∑ n=−∞,n̸=0

e2πinx = 2πin

{

B1 (< x >), 0,

for x ∈ / Z, for x ∈ Z.

(1.13)

Here we will consider the following three types of sums of products of polyGenocchi and poly-Bernoulli functions αm (< x >), βm (< x >), and γm (< x >), and derive their Fourier series expansions. In addition, we will express each of them in terms of Bernoulli functions.

1259

T. KIM ET AL 1258-1275

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J. Kwon

∑m−1

(1) αm (< x >) =

k=0 ∑m−1

(r+1)

Bk

3

(s+1)

(< x >)Gm−k (< x >), (m ≥ 2),

(r+1) (s+1) 1 (< x >)Gm−k (< x >), (m ≥ 2), k=0 k!(m−k)! Bk (r+1) (s+1) 1 (< x >)Gm−k (< x >), (m ≥ 2). k=1 k(m−k) Bk

(2) βm (< x >) =

∑m−1

(3) γm (< x >) = For related recent works, one may refer to the papers (see [2, 12–15]).

2. The function αm (< x >) Let αm (x) =

∑m−1 k=0

(r+1)

Bk

(s+1)

(x)Gm−k (x), (m ≥ 2).

Then we now consider the function αm (< x >) =

∑m−1 k=0

(r+1)

Bk

(s+1)

(< x >)Gm−k (< x >), (m ≥ 2),

defined on R, which is periodic with period 1. The Fourier series of αm (< x >) is ∞ ∑

2πinx A(m) , n e

(2.1)

n=−∞

where



1

A(m) = n

αm (< x >)e−2πinx dx =

0



1

αm (x)e−2πinx dx.

(2.2)

0

Before proceeding further, we need to observe the following.

′ (x) = αm

m−1 ∑(

(r+1)

(s+1)

(r+1)

kBk−1 (x)Gm−k (x) + (m − k)Bk

)

(s+1)

(x)Gm−k−1 (x)

k=0

=

m−1 ∑

(r+1)

(s+1)

kBk−1 (x)Gm−k (x) +

k=1

=

m−2 ∑

m−2 ∑

(r+1)

(m − k)Bk

(s+1)

(x)Gm−k−1 (x)

k=0 (r+1)

(k + 1)Bk

(s+1)

(x)Gm−k−1 (x) +

k=0

m−2 ∑

(r+1)

(m − k)Bk

(s+1)

(x)Gm−k−1 (x)

k=0 m−2 ∑

= (m + 1)

(r+1)

Bk

(s+1)

(x)Gm−1−k (x)

k=0

= (m + 1)αm−1 (x). (2.3) From this, we obtain

(

αm+1 (x) m+2

)′ = αm (x),

(2.4)

and ∫

1

αm (x)dx = 0

1 (αm+1 (1) − αm+1 (0)) . m+2

1260

(2.5)

T. KIM ET AL 1258-1275

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

Fourier series of sums of products of poly-Genocchi and poly-Bernoulli functions

For m ≥ 2, we put ∆m = αm (1) − αm (0) =

m−1 ∑(

(r+1)

(1)Gm−k (1) − Bk

(r+1)

(1)Gm−k (1) − Bk

Bk

(s+1)

(r+1)

Gm−k

(s+1)

(s+1)

(r+1)

Gm−k

)

k=0

=

m−1 ∑(

Bk

(s+1)

)

+ G(s+1) (1) − G(s+1) m m

k=1

=

m−1 ∑(

(r+1) (Bk

+

(r) (s+1) Bk−1 )(−Gm−k

+

(s) 2Bm−k−1 )



(r+1) (s+1) Bk Gm−k

(2.6)

)

k=1 (s)

− G(s+1) + 2Bm−1 − G(s+1) m m =

m−1 ∑

(r+1)

2Bk

(s+1)

(s)

(−Gm−k + Bm−k−1 ) +

k=0

m−1 ∑

(r)

(s+1)

(s)

Bk−1 (−Gm−k + 2Bm−k−1 ).

k=1

Clearly, we have αm (1) = αm (0) ⇐⇒ ∆m = 0,

(2.7)

and ∫

1

αm (x)dx = 0

1 ∆m+1 . m+2

(2.8) (m)

We are now going to determine the Fourier coefficients An . Case 1 : n ̸= 0. ∫ 1 A(m) = αm (x)e−2πinx dx n 0

]1 1 [ 1 =− αm (x)e−2πinx + 2πin 2πin 0



1

′ αm (x)e−2πinx dx

0

∫ 1 m+1 1 =− (αm (1) − αm (0)) + αm−1 (x)e−2πinx dx 2πin 2πin 0 m + 1 (m−1) 1 = − A ∆m 2πin n 2πin from which by induction on m we can show that A(m) =− n Case 2 : n = 0.

m−1 1 ∑ (m + 2)j ∆m−j+1 . m + 2 j=1 (2πin)j

∫ (m) A0

(2.9)

1

αm (x)dx =

= 0

1 ∆m+1 . m+2

(2.10)

αm (< x >), (m ≥ 2) is piecewise C ∞ . Moreover, αm (< x >) is continuous for those integers m ≥ 2 with ∆m = 0, and discontinuous with jump discontinuities at integers for those integers m ≥ 2 with ∆m ̸= 0.

1261

T. KIM ET AL 1258-1275

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J. Kwon

5

Assume first that ∆m = 0, for an integer m ≥ 2. Then αm (0) = αm (1). So αm (< x >) is piecewise C ∞ , and continuous. Thus the Fourier series of αm (< x >) converges uniformly to αm (< x >), and 1 ∆m+1 m+2  ∞ ∑ − +

αm (< x >) =

n=−∞,n̸=0

 m−1 1 ∑ (m + 2)j ∆m−j+1  e2πinx m + 2 j=1 (2πin)j m−1 (

1 ∑ 1 ∆m+1 + = m+2 m + 2 j=1   ∞ 2πinx ∑ e  × −j! (2πin)j

) m+2 ∆m−j+1 j (2.11)

n=−∞,n̸=0

) m−1 ( 1 1 ∑ m+2 = ∆m+1 + ∆m−j+1 Bj (< x >) m+2 m + 2 j=2 j { B1 (< x >), for x ∈ / Z, + ∆m × 0, for x ∈ Z. We can now state our first result. Theorem 2.1. For each integer l ≥ 2, let ∆l = 2

l−1 ∑

(r+1)

Bk

(s+1)

(s)

(−Gl−k + Bl−k−1 )

k=0

+

l−1 ∑

(2.12)

(r) (s+1) Bk−1 (−Gl−k

+

(s) 2Bl−k−1 ).

k=1

Assume that ∆m = 0, for an integer m ≥ 2. Then we have the following. (a)

∑m−1 k=0 m−1 ∑

(r+1)

(< x >)Gm−k (< x >) has the Fourier series expansion

(r+1)

(< x >)Gm−k (< x >)

Bk Bk

(s+1)

(s+1)

k=0

1 = ∆m+1 + m+2



∞ ∑ n=−∞,n̸=0

 m−1 ∑ (m + 2)j 1 − ∆m−j+1  e2πinx , m + 2 j=1 (2πin)j

for all x ∈ R, where the convergence is uniform. (b) m−1 ∑

(r+1)

Bk

(s+1)

(< x >)Gm−k (< x >)

k=0

=

) m−1 ( 1 1 ∑ m+2 ∆m+1 + ∆m−j+1 Bj (< x >), m+2 m + 2 j=2 j

1262

T. KIM ET AL 1258-1275

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

Fourier series of sums of products of poly-Genocchi and poly-Bernoulli functions

for all x ∈ R. Assume next that ∆m ̸= 0, for an integer m ≥ 2. Then αm (0) ̸= αm (1). Hence αm (< x >) is piecewise C ∞ , and discontinuous with jump discontinuities at integers. The Fourier series of αm (< x >) converges pointwise to αm (< x >) , for x∈ / Z, and converges to 1 1 (αm (0) + αm (1)) = αm (0) + ∆m , 2 2

(2.13)

for x ∈ Z. Now, we can state our second result. Theorem 2.2. For each integer l ≥ 2, let ∆l = 2

l−1 ∑

(r+1)

Bk

(s+1)

(s)

(−Gl−k + Bl−k−1 )

k=0

+

l−1 ∑

(2.14) (r)

(s+1)

(s)

Bk−1 (−Gl−k + 2Bl−k−1 ).

k=1

Assume that ∆m ̸= 0, for an integers m ≥ 2. Then we have the following. (a)

1 ∆m+1 m+2 ∞ ∑

+

 −

n=−∞,n̸=0

{∑

=

m−1

∑k=0 m−1 k=0

1 m+2

m−1 ∑ j=1

(r+1)

 (m + 2)j ∆m−j+1  e2πinx (2πin)j (s+1)

Bk (< x >)Gm−k (< x >), for x ∈ / Z, (r+1) (s+1) 1 Bk Gm−k + 2 ∆m , for x ∈ Z.

) m−1 ( 1 ∑ m+2 ∆m−j+1 Bj (< x >) (b) m + 2 j=0 j =

m−1 ∑

(r+1)

Bk

(s+1)

(< x >)Gm−k (< x >), f or x ∈ / Z,

k=0

1 m+2 =

m−1 ∑ j=0,j̸=1

m−1 ∑ k=0

(r+1)

Bk

( ) m+2 ∆m−j+1 Bj (< x >) j 1 (s+1) Gm−k + ∆m , f or x ∈ Z. 2

1263

T. KIM ET AL 1258-1275

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J. Kwon

7

3. The function βm (< x >) Let βm (x) =

∑m−1

(r+1) (s+1) 1 (x)Gm−k (x), k=0 k!(m−k)! Bk

(m ≥ 2).

Then we consider the function ∑m−1 (s+1) (r+1) 1 βm (< x >) = k=0 k!(m−k)! Bk (< x >)Gm−k (< x >), (m ≥ 2), defined on R, which is periodic with period 1. The Fourier series of βm (< x >) is ∞ ∑

Bn(m) e2πinx ,

(3.1)

n=−∞

where ∫

1

Bn(m) =

βm (< x >)e−2πinx dx =

0



1

βm (x)e−2πinx dx.

(3.2)

0

Before continuing our discussion, we need to note the following. ′ βm (x) =

m−1 ∑ k=0

=

m−1 ∑ k=1

+

m−2 ∑ k=0

=

m−2 ∑ k=0

+

m−2 ∑ k=0

(

) m−k k (r+1) (s+1) (r+1) (s+1) Bk−1 (x)Gm−k (x) + Bk (x)Gm−k−1 (x) k!(m − k)! k!(m − k)!

1 (r+1) (s+1) B (x)Gm−k (x) (k − 1)!(m − k)! k−1 1 (r+1) (s+1) B (x)Gm−k−1 (x) k!(m − 1 − k)! k 1 (r+1) (s+1) B (x)Gm−1−k (x) k!(m − 1 − k)! k 1 (r+1) (s+1) B (x)Gm−1−k (x) k!(m − 1 − k)! k

= 2βm−1 (x). (3.3) From this, we have (β

m+1 (x)

)′

2

= βm (x),

(3.4)

and ∫

1

βm (x)dx = 0

) 1( βm+1 (1) − βm+1 (0) . 2

1264

(3.5)

T. KIM ET AL 1258-1275

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

Fourier series of sums of products of poly-Genocchi and poly-Bernoulli functions

For m ≥ 2, we set Ωm = βm (1) − βm (0) =

m−1 ∑ k=0

=

m−1 ∑ k=1

( ) 1 (r+1) (s+1) (r+1) (s+1) Bk (1)Gm−k (1) − Bk Gm−k k!(m − k)! ( ) 1 (r+1) (s+1) (r+1) (s+1) Bk (1)Gm−k (1) − Bk Gm−k k!(m − k)!

1 (s+1) 1 (s+1) G (1) − G m! m m! m m−1 ( ) ∑ 1 (r+1) (r) (s+1) (s) (r+1) (s+1) = (Bk + Bk−1 )(−Gm−k + 2Bm−k−1 ) − Bk Gm−k k!(m − k)!

+

k=1

1 1 (s+1) (s) (−G(s+1) + 2Bm−1 ) − G m m! m! m m−1 ∑ 2 (r+1) (s+1) (s) = B (−Gm−k + Bm−k−1 ) k!(m − k)! k

+

k=0

+

m−1 ∑ k=1

1 (r) (s+1) (s) B (−Gm−k + 2Bm−k−1 ). k!(m − k)! k−1 (3.6)

Now, βm (0) = βm (1) ⇔ Ωm = 0,

(3.7)

and ∫

1

βm (x)dx = 0

1 Ωm+1 . 2

(3.8) (m)

We are now ready to determine the Fourier coefficients Bn . Case 1: n ̸= 0. ∫ Bn(m) =

1

βm (x)e−2πinx dx

0

∫ 1 ]1 1 [ 1 βm (x)e−2πinx + β ′ (x)e−2πinx dx 2πin 2πin 0 m 0 ∫ 1 ) 1 ( 2 =− βm (1) − βm (0) + βm−1 (x)e−2πinx dx 2πin 2πin 0 2 1 = Bn(m−1) − Ωm , 2πin 2πin from which by induction on m we can easily deduce that =−

Bn(m)

=−

m−1 ∑ j=1

2j−1 Ωm−j+1 . (2πin)j

(3.9)

(3.10)

Case 2: n = 0.

1265

T. KIM ET AL 1258-1275

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J. Kwon

∫ (m)

B0

1

=

βm (x) = 0

9

1 Ωm+1 . 2

(3.11)

βm (< x >), (m ≥ 2) is piecewise C ∞ . Moreover, βm (< x >) is continuous for those integers m ≥ 2 with ∆m = 0, and discontinuous at integers with jump discontinuities for those integers m ≥ 2 with ∆m ̸= 0. Assume first that ∆m = 0, for an integer m ≥ 2. Then βm (0) = βm (1). So βm (< x >) is piecewise C ∞ , and continuous. Thus the Fourier series of βm (< x >) converges uniformly to βm (< x >), and

βm (< x >) =

=

1 Ωm+1 + 2 1 Ωm+1 + 2

(

∞ ∑



j=1

n=−∞,n̸=0 m−1 ∑ j=1

m−1 ∑

) 2j−1 Ωm−j+1 e2πinx j (2πin)

( 2j−1 Ωm−j+1 × −j! j!

∞ ∑ n=−∞,n̸=0

e2πinx ) (2πin)j (3.12)

m−1 ∑

1 2j−1 = Ωm+1 + Ωm−j+1 Bj (< x >) 2 j! j=2 { B1 (< x >), for x ∈ / Z, + Ωm × 0, for x ∈ Z. Now, we can state our first theorem. Theorem 3.1. For each integer l ≥ 2, let Ωl =

l−1 ∑ k=0

+

l−1 ∑ k=1

2 (r+1) (s+1) (s) B (−Gl−k + Bl−k−1 ) k!(l − k)! k (3.13)

1 (r) (s+1) (s) B (−Gl−k + 2Bl−k−1 ). k!(l − k)! k−1

Assume that Ωm = 0, for an integer m ≥ 2. Then we have the following. (a)

∑m−1

(r+1) 1 (< k=0 k!(m−k)! Bk m−1 ∑ k=0

(s+1)

x >)Gm−k (< x >) has the Fourier series expansion

1 (r+1) (s+1) B (< x >)Gm−k (< x >) k!(m − k)! k

1 = Ωm+1 + 2

∞ ∑ n=−∞,n̸=0

(



m−1 ∑ j=1

) 2j−1 2πinx Ω , m−j+1 e (2πin)j

(3.14)

for all x ∈ R, where the convergence is uniform.

1266

T. KIM ET AL 1258-1275

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

Fourier series of sums of products of poly-Genocchi and poly-Bernoulli functions

(b)

m−1 ∑ k=0

1 (r+1) (s+1) B (< x >)Gm−k (< x >) k!(m − k)! k (3.15)

m−1 ∑ 2j−1 1 = Ωm+1 + Ωm−j+1 Bj (< x >), 2 j! j=2

for all x ∈ R. Assume next that Ωm ̸= 0, for all integer m ≥ 2. Then βm (0) ̸= βm (1). Thus βm (< x >) is piecewise C ∞ , and discontinuous with jump discontinuities at integers. The Fourier series of βm (< x >) converges pointwise to βm (< x >), for x ∈ / Z, and converges to 1 1 (βm (0) + βm (1)) = βm (0) + Ωm , (3.16) 2 2 for x ∈ Z. We can now state our second theorem. Theorem 3.2. For each integer l ≥ 2, let Ωl =

l−1 ∑ k=0

+

l−1 ∑ k=1

2 (r+1) (s+1) (s) B (−Gl−k + Bl−k−1 ) k!(l − k)! k (3.17)

1 (r) (s+1) (s) B (−Gl−k + 2Bl−k−1 ). k!(l − k)! k−1

Assume that Ωm ̸= 0, for an integer m ≥ 2. Then we have the following. ∞ ( m−1 ) ∑ ∑ 2j−1 1 (a) Ωm+1 + − Ω e2πinx m−j+1 j 2 (2πin) j=1 n=−∞,n̸=0 {∑m−1 (r+1) (s+1) 1 (< x >)Gm−k (< x >), for x ∈ / Z, k!(m−k)! Bk = ∑k=0 (r+1) (s+1) m−1 1 1 Gm−k + 2 Ωm , for x ∈ Z. k=0 k!(m−k)! Bk

(b) m−1 ∑ j=0

=

2j−1 Ωm−j+1 Bj (< x >) j!

m−1 ∑ k=0

1 (r+1) (s+1) B (< x >)Gm−k (< x >), k!(m − k)! k

m−1 ∑ j=0,j̸=1

=

m−1 ∑ k=0

for x ∈ / Z,

2j−1 Ωm−j+1 Bj (< x >) j! 1 1 (r+1) (s+1) B Gm−k + Ωm , k!(m − k)! k 2

1267

for x ∈ Z.

T. KIM ET AL 1258-1275

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J. Kwon

11

4. The function γm (< x >) ∑m−1 (r+1) (s+1) 1 Bk (x)Gm−k (x), (m ≥ 2). Let γm (x) = k=1 k(m−k) Then we are going to consider the function

γm (< x >) =

m−1 ∑ k=1

1 (r+1) (s+1) B (< x >)Gm−k (< x >), (m ≥ 2), k(m − k) k

(4.1)

defined on R, which is periodic with period 1. The Fourier series of γm (< x >) is ∞ ∑

Cn(m) e2πinx ,

(4.2)

n=−∞

where

∫ Cn(m) =

1

γm (< x >)e−2πinx dx =

0



1

γm (x)e−2πinx dx.

(4.3)

0

Before going further, we need to observe the following.

′ γm (x) =

m−1 ∑ k=1

=

m−2 ∑ k=0

+

m−1 ∑ k=1

=

( (r+1) ) 1 (s+1) (r+1) (s+1) kBk−1 (x)Gm−k (x) + (m − k)Bk (x)Gm−k−1 (x) k(m − k) 1 (r+1) (s+1) B (x)Gm−1−k (x) m−1−k k 1 (r+1) (s+1) B (x)Gm−1−k (x) k k

m−2 ∑ 1 1 (s+1) (r+1) (s+1) Gm−1 (x) + B (x)Gm−1−k (x) m−1 m−1−k k k=1

+

m−2 ∑ k=1

=

1 (r+1) (s+1) B (x)Gm−1−k (x) k k

m−2 ∑ 1 1 (s+1) (r+1) (s+1) Gm−1 (x) + (m − 1) B (x)Gm−1−k (x) m−1 k(m − 1 − k) k k=1

1 (s+1) = G (x) + (m − 1)γm−1 (x). m − 1 m−1

(4.4)

From this, we immediately see that (

1 1 (s+1) (γm+1 (x) − G (x)) m m(m + 1) m+1

1268

)′ = γm (x),

(4.5)

T. KIM ET AL 1258-1275

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12

Fourier series of sums of products of poly-Genocchi and poly-Bernoulli functions



1

γm (x)dx 0

1 1 (s+1) [γm+1 (x) − G (x)]10 m m(m + 1) m+1 ( ) 1 1 (s+1) (s+1) = γm+1 (1) − γm+1 (0) − (G (1) − Gm+1 (0)) m m(m + 1) m+1 ( ) 1 2 (s+1) (s) = γm+1 (1) − γm+1 (0) + (G − Bm ) . m m(m + 1) m+1 =

(4.6)

For m ≥ 2, we let

Λm = γm (1) − γm (0) =

m−1 ∑ k=1

=

m−1 ∑ k=1

=

m−1 ∑ k=1

+

m−1 ∑ k=1

( (r+1) 1 (s+1) (r+1) (s+1) ) B (1)Gm−k (1) − Bk Gm−k k(m − k) k ( (r+1) 1 (r) (s+1) (s) (r+1) (s+1) ) (Bk + Bk−1 )(−Gm−k + 2Bm−k−1 ) − Bk Gm−k k(m − k) 2 (r+1) (s+1) (s) B (−Gm−k + Bm−k−1 ) k(m − k) k 1 (r) (s+1) (s) B (−Gm−k + 2Bm−k−1 ) k(m − k) k−1 (4.7)

Now, γm (0) = γm (1) ⇔ Λm = 0,

(4.8)

and ∫

1

γm (x)dx = 0

1 m

( Λm+1 +

) 2 (s+1) (s) (Gm+1 − Bm ) . m(m + 1)

(4.9)

(m)

Now, we want to determine the Fourier coefficients Cn .

1269

T. KIM ET AL 1258-1275

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J. Kwon

13

Case 1: n ̸= 0. ∫

1

Cn(m) =

γm (x)e−2πinx dx

0

∫ 1 ]1 1 [ 1 −2πinx =− γm (x)e + γ ′ (x)e−2πinx dx 2πin 2πin 0 m 0 ) 1 ( γm (1) − γm (0) =− 2πin ∫ 1{ } 1 1 (s+1) + Gm−1 (x) + (m − 1)γm−1 (x) e−2πinx dx 2πin 0 m − 1 ∫ 1 m − 1 (m−1) 1 1 (s+1) Λm + Cn =− + G (x)e−2πinx dx 2πin 2πin 2πin(m − 1) 0 m−1 2 m − 1 (m−1) 1 C Λm + = − Φm , 2πin n 2πin 2πin(m − 1)

(4.10)

where Φm =

m−2 ∑ k=1

(m − 1)k−1 (s+1) (s) (Gm−k − Bm−k−1 ). (2πin)k

(4.11)

Here we can show that ∫

1 0

=

Gl (x)e−2πinx dx { ∑l−1 (l) (s+1) (s) k−1 2 k=1 (2πin) k (Gl−k+1 − Bl−k ), for n ̸= 0, (s+1)

(s+1) −2 l+1 (Gl+1

(s)

− Bl ), for n = 0.

From this, by induction on m we can show that

Cn(m) =

+

m−2 (m − 1)! (2) ∑ (m − 1)j−1 C − Λm−j+1 n (2πin)m−2 (2πin)j j=1 m−2 ∑ j=1

2(m − 1)j−1 Φm−j+1 . (2πin)j (m − j)

(4.12)

(2)

1 Further, we can easily show that Cn = − 2πin Λ2 . Thus we deduce that

Cn(m) = −

m−1 1 ∑ (m)j Λm−j+1 m j=1 (2πin)j

m−2 1 ∑ 2(m)j + Φm−j+1 . m j=1 (2πin)j (m − j)

1270

(4.13)

T. KIM ET AL 1258-1275

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14

Fourier series of sums of products of poly-Genocchi and poly-Bernoulli functions

Here we note that m−2 ∑ j=1

=

2(m)j Φm−j+1 (2πin)j (m − j)

m−2 ∑ j=1

=

m−j−1 ∑ (m − j)k−1 (s+1) 2(m)j (s) (Gm−j−k+1 − Bm−j−k ) (2πin)j (m − j) (2πin)k k=1

m−2 ∑ m−j−1 ∑ j=1

=2

m−2 ∑ j=1

=2

m−1 ∑ a=2

=2

m−1 ∑ a=2

=2

m−1 ∑ a=1

k=1

2(m)j+k−1 (s+1) (s) (G − Bm−j−k ) (2πin)j+k (m − j) m−j−k+1

m−1 ∑ (m)a−1 (s+1) 1 (s) (G − Bm−a ) m − j a=j+1 (2πin)a m−a+1

(4.14)

a−1 ∑ 1 (m)a−1 (s+1) (s) (G − B ) m−a m−a+1 (2πin)a m−j j=1

(m)a−1 (s+1) (s) (G − Bm−a )(Hm−1 − Hm−a ) (2πin)a m−a+1 (s+1)

(s)

(m)a Gm−a+1 − Bm−a (Hm−1 − Hm−a ). (2πin)a m−a+1

Putting everything altogether, we obtain Cn(m) = −

m−1 1 ∑ (m)a Λm−a+1 m a=1 (2πin)a

(s) (s+1) m−1 2 ∑ (m)a Gm−a+1 − Bm−a + (Hm−1 − Hm−a ). m a=1 (2πin)a m−a+1 m−1 1 ∑ (m)a =− m a=1 (2πin)a ( ) (s+1) (s) Gm−a+1 − Bm−a × Λm−a+1 − 2 (Hm−1 − Hm−a ) . m−a+1

Case 2: n = 0.

∫ 1 = γm (x)dx ( 0 ) 1 2 (s+1) (s) = Λm+1 + (G − Bm ) . m m(m + 1) m+1

(4.15)

(m)

C0

(4.16)

γm (< x >), (m ≥ 2) is piecewise C ∞ . Moreover, γm (< x >) is continuous for those integers m ≥ 2 with Λm = 0, and discontinuous with jump discontinuities at integers m ≥ 2 with Λm ̸= 0. Assume first that Λm = 0. Then γm (0) = γm (1). So γm (< x >) is piecewise C ∞ , and continuous. Thus the Fourier series of γm (< x >) converges uniformly to γm (< x >), and

1271

T. KIM ET AL 1258-1275

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J. Kwon

15

γm (< x >) ( ) ∞ ∑ ∑ (m)a (m−1 1 2 1 (s+1) (s) = Λm+1 + (Gm+1 − Bm ) − m m(m + 1) m (2πin)a n=−∞,n̸=0 a=1 ) ( (s) (s+1) Gm−a+1 − Bm−a × Λm−a+1 − 2 (Hm−1 − Hm−a ) e2πinx m−a+1 ( ) m−1 ( ) 2 1 1 ∑ m (s+1) (s) Λm+1 + (Gm+1 − Bm = ) + m m(m + 1) m a=1 a  ( ) (s+1) (s) ∞ 2πinx ∑ Gm−a+1 − Bm−a e  × Λm−a+1 − 2 (Hm−1 − Hm−a ) −a! m−a+1 (2πin)a n=−∞,n̸=0

( ) m−1 ( ) 1 2 1 ∑ m (s+1) (s) = Λm+1 + (G − Bm ) + m m(m + 1) m+1 m a=2 a ) ( (s) (s+1) Gm−a+1 − Bm−a (Hm−1 − Hm−a ) Ba (< x >) × Λm−a+1 − 2 m−a+1 { B1 (< x >), for x ∈ / Z, + Λm × 0, for x ∈ Z. (4.17) Now, we can state our first result. Theorem 4.1. For each integer l ≥ 2, let Λl =

l−1 ∑ k=1

+

l−1 ∑ k=1

2 (r+1) (s+1) (s) B (−Gl−k + Bl−k−1 ) k(l − k) k (4.18) 1 (r) (s+1) (s) B (−Gl−k + 2Bl−k−1 ). k(l − k) k−1

Assume that Λm = 0, for an integers m ≥ 2. Then we have the following. (a)

∑m−1

(r+1) 1 (< k=1 k(m−k) Bk

(s+1)

x >)Gm−k (< x >) has the Fourier series expansion

m−1 ∑

1 (r+1) (s+1) B (< x >)Gm−k (< x >) k(m − k) k k=1 ( ) 2 1 1 (s+1) (s) Λm+1 + (Gm+1 − Bm ) − = m m(m + 1) m

( × Λm−a+1 − 2

(s+1) Gm−a+1

(s) Bm−a

− m−a+1

∞ ∑ n=−∞,n̸=0

∑ (m)a (m−1 (2πin)a a=1

(4.19)

)) (Hm−1 − Hm−a ) e2πinx

for all x ∈ R, where the convergence is uniform.

1272

T. KIM ET AL 1258-1275

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

16

Fourier series of sums of products of poly-Genocchi and poly-Bernoulli functions

(b)

m−1 ∑

1 (r+1) (s+1) B (< x >)Gm−k (< x >) k(m − k) k k=1 ( ) (s+1) (s) m−1 ( ) (4.20) Gm−a+1 − Bm−a 1 ∑ m (Hm−1 − Hm−a ) = Λm−a+1 − 2 m m−a+1 a a=0,a̸=1

× Ba (< x >), for all x ∈ R. Assume next that Λm ̸= 0, for an integers m ≥ 2. Then γm (0) ̸= γm (1). So γm (< x >) is piecewise C ∞ , and discontinuous with jump discontinuities at integers. Hence the Fourier series of γm (< x >) converges pointwise to γm (< x >), for x ∈ / Z, and converges to 1 1 (γm (0) + γm (1)) = γm (0) + Λm , 2 2

(4.21)

for x ∈ Z. Next, we can state our second result. Theorem 4.2. For each integer l ≥ 2, let Λl =

l−1 ∑ k=1

+

l−1 ∑ k=1

2 (r+1) (s+1) (s) B (−Gl−k + Bl−k−1 ) k(l − k) k (4.22) 1 (r) (s+1) (s) B (−Gl−k + 2Bl−k−1 ). k(l − k) k−1

Assume that Λm ̸= 0, for an integers m ≥ 2. Then we have the following.

(a)

( Λm+1 +

1 m

) 1 2 (s+1) (s) ) − (Gm+1 − Bm m(m + 1) m

( × Λm−a+1 − 2 {∑m−1 1

(s+1) Gm−a+1

(s) Bm−a

− m−a+1

∞ ∑ n=−∞,n̸=0

)) (Hm−1 − Hm−a ) e2πinx

(r+1) (s+1) (< x >)Gm−k (< x >), for k=1 k(m−k) Bk (r+1) (s+1) 1 Gm−k + 12 Λm , for x ∈ Z. k=1 k(m−k) Bk

∑m−1

=

∑ (m)a (m−1 (2πin)a a=1

x∈ / Z,

(b) ( ) (s+1) (s) m−1 ( ) Gm−a+1 − Bm−a 1 ∑ m Λm−a+1 − 2 (Hm−1 − Hm−a ) m a=0 a m−a+1 × Ba (< x >) =

m−1 ∑ k=1

1 (r+1) (s+1) B (< x >)Gm−k (< x >), for x ∈ / Z, k(m − k) k

1273

T. KIM ET AL 1258-1275

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, D. V. Dolgy, J. Kwon

1 m

m−1 ∑ a=0,a̸=1

17

) ( )( (s+1) (s) Gm−a+1 − Bm−a m (Hm−1 − Hm−a ) Λm−a+1 − 2 m−a+1 a

× Ba (< x >) =

m−1 ∑ k=1

1 1 (r+1) (s+1) Bk Gm−k + Λm , for x ∈ Z. k(m − k) 2

References 1. J. M. Borwein, A. Straub, Relations for Nielsen polylogarithms, J. Approx. Theory, 193(2015), 74–88. 2. G.-W. Jang, T. Kim, D.S. Kim, T. Mansour, Fourier series of functions related to Bernoulli polynomials, Adv. Stud. Contemp. Math., 27(2017), no.1, 49-62. 3. H. Jolany, M. Aliabadi, R. B. Corcino and M. R. Darafsheh, A note on multi poly-Euler numbers and Bernoulli polynomials, Gen. Math., 20(2012), no. 2-3, 122–134. 4. T. Kim, D. S. Kim, J.-J. Seo Fully degenerate poly-Bernoulli numbers and polynomials, Open Math., 14(2016), 545–556. 5. D.S. Kim, T. Kim, Higher-order Bernoulli and poly-Bernoulli mixed type polynomials, Georgian Math. J., 22(1)(2015), 26-33. 6. D.S. Kim, T. Kim, A note on poly-Bernoulli and higher-order poly-Bernoulli polynomials, Russ. J. Math. Phys., 22(1)(2015), 26-33. 7. D.S. Kim, T. Kim, S.H. Lee, A note on poly-Bernoulli polynomials arising from umbral calculus, Adv. Stud. Theor. Phys., 7(2013), no. 15, 731-744. 8. T. Kim, On the Multiple q-Genocchi and Euler Numbers, Russ. J. Math. Phys., 15(2008), 481-486. 9. T. Kim, On the q-Extension of Euler and Genocchi Numbers, J. Math. Anal. Appl. 326(2007), 1458-1465. 10. T. Kim, Some identities for the Bernoulli, the Euler and Genocchi numbers and polynomials, Adv. Stud. Contemp. Math., 20(2015), no.1, 23-28. 11. T. Kim, Y.S. Jang, J.-J. Seo, A note on Poly-Genocchi numbers and polynomials, Appl. Math. Sci., 8(2014), no.96, 4775-4781. 12. T. Kim, D.S. Kim, D.Dolgy, and J.-W. Park, Fourier series of sums of products of polyBernoulli functions and their applications, J. Nonlinear Sci. Appl., 10(2017), no.4, 2384-2401. 13. T. Kim, D.S. Kim, D.Dolgy, and J.-W. Park, Fourier series of sums of products of ordered Bell and poly-Bernoulli functions, J. Inequalities and applications, 2017 Article ID 13660, 17pages,(2017). 14. T. Kim, D.S. Kim, G.-W. Jang, and J. Kwon, Fourier series of sums of products of Genocchi functions and their applications, J. Nonlinear Sci. Appl., 10(2017), no.4, 1683-1694. 15. T. Kim, D.S. Kim, S.-H. Rim, and D.Dolgy, Fourier series of higher-order Bernoulli functions and their applications, J. Inequalities and applications, 2017 Article ID 71452, 8pages,(2017). 16. I. N. Cangul, V. Kurt, H. Ozden, Y. Simsek, On the higher-order w-q-Genocchi numbers, Adv. Stud. Contemp. Math. (Kyungshang), 19(2009), no.1, 39–57 17. C. S. Ryoo, Calculating zeros of the twisted Genocchi polynomials, Adv. Stud. Contemp. Math. (Kyungshang), 17(2008), 147–159.

1274

T. KIM ET AL 1258-1275

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

18

Fourier series of sums of products of poly-Genocchi and poly-Bernoulli functions

1 Department of Mathematics, College of Science, Tianjin Polytechnic University, Tianjin 300160, China, Department of Mathematics, Kwangwoon University, Seoul, 139701, Republic of Korea. E-mail address: [email protected] 2 Department of Mathematics, Sogang University , Seoul, 121-742, Republic of Korea. E-mail address: [email protected] 3

Hanrimwon, Kwangwoon University , Seoul, 139-701, Republic of Korea. E-mail address: d [email protected] 4,∗ Department of Mathematics Education and RINS, Gyeongsang National University, Jinju, Gyeongsangnamdo, 52828, Republic of Korea. E-mail address: [email protected]

1275

T. KIM ET AL 1258-1275

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

ADDITIVE-QUADRATIC ρ-FUNCTIONAL EQUATIONS IN β-HOMOGENEOUS F -SPACES SUNGSIK YUN Abstract. Let M1 f (x, y) :

=

1 3 f (x + y) − f (−x − y) 4 4 1 1 + f (x − y) + f (y − x) − f (x) − f (y), 4 4

x+y x−y y−x +f +f 2 2 2 We solve the additive-quadratic ρ-functional equations M2 f (x, y) := 2f













− f (x) − f (y).

M1 f (x, y) = ρM2 f (x, y)

(0.1)

M2 f (x, y) = ρM1 f (x, y),

(0.2)

and where ρ is a fixed nonzero number with ρ 6= 1. Using the direct method, we prove the Hyers-Ulam stability of the additive-quadratic ρ-functional equations (0.1) and (0.2) in β-homogeneous F -spaces.

1. Introduction and preliminaries The stability problem of functional equations originated from a question of Ulam [23] concerning the stability of group homomorphisms. The functional equation f (x+y) = f (x)+f (y) is called the Cauchy equation. In particular, every solution of the Cauchy equation is said to be an additive mapping. Hyers [8] gave a first affirmative partial answer to the question of Ulam for Banach spaces. Hyers’ Theorem was generalized by Aoki [2] for additive mappings and by Rassias [14] for linear mappings by considering an unbounded Cauchy difference. A generalization of the Rassias theorem was obtained by G˘ avruta [7] by replacing the unbounded Cauchy difference by a general control function in the spirit of Rassias’ approach. The functional equation f (x+y)+f (x−y) = 2f (x)+2f (y) is called the quadratic functional equation. In particular, every solution of the quadratic functional equation is said to be a quadratic mapping. The stability of quadratic functional equation was proved by Skof [22] for mappings f : E1 → E2 , where E1 is a normed space and E2 is a Banach space. Cholewa [5] noticed that the theorem of Skof is still true if the relevant domain E1 is replaced by an Abelian group. The stability problems of various functional equations have been extensively investigated by a number of authors (see [1, 3, 4, 6, 9, 10, 11, 12, 13, 15, 17, 18, 19, 20, 21, 24, 25]). Definition 1.1. Let X be a linear space. A nonnegative valued function k · k is an F -norm if it satisfies the following conditions: (FN1 ) kxk = 0 if and only if x = 0; 2010 Mathematics Subject Classification. Primary 39B62, 39B72, 39B52, 39B82. Key words and phrases. Hyers-Ulam stability; additive-quadratic ρ-functional equation; β-homogeneous F -space.

1276

SUNGSIK YUN 1276-1285

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S. YUN

(FN2 ) kλxk = kxk for all x ∈ X and all λ with |λ| = 1; (FN3 ) kx + yk ≤ kxk + kyk for all x, y ∈ X; (FN4 ) kλn xk → 0 provided λn → 0; (FN5 ) kλxn k → 0 provided xn → 0. Then (X, k · k) is called an F ∗ -space. An F -space is a complete F ∗ -space. An F -norm is called β-homogeneous (β > 0) if ktxk = |t|β kxk for all x ∈ X and all t ∈ C (see [16]). In Section 2, we solve the additive-quadratic ρ-functional equation (0.1) and prove the Hyers-Ulam stability of the additive-quadratic ρ-functional equation (0.1) in β-homogeneous F -spaces. In Section 3, we solve the additive-quadratic ρ-functional equation (0.2) and prove the Hyers-Ulam stability of the additive-quadratic ρ-functional equation (0.2) in β-homogeneous F -spaces. Throughout this paper, let β1 , β2 be positive real numbers with β1 ≤ 1 and β2 ≤ 1. Assume that X is a β1 -homogeneous real or complex F ∗ -space with norm k · k and that Y is a β2 homogeneous complex F -space with norm k · k. Let ρ be a nonzero number with ρ 6= 1. 2. Additive-quadratic ρ-functional equation (0.1) in β-homogeneous F -spaces We solve and investigate the additive-quadratic ρ-functional equation (0.1) in β-homogeneous F ∗ -spaces. Lemma 2.1. (−x) (i) If a mapping f : X → Y satisfies M1 f (x, y) = 0, then f = fo +fe , where fo (x) := f (x)−f 2 (−x) is the Cauchy additive mapping and fe (x) := f (x)+f is the quadratic mapping. 2 (ii) If a mapping f : X → Y satisfies M2 f (x, y) = 0, then f = fo + fe , where fo (x) := f (x)−f (−x) (−x) is the Cauchy additive mapping and fe (x) := f (x)+f is the quadratic mapping. 2 2 Proof. (i) M1 fo (x, y) = fo (x + y) − fo (x) − fo (y) = 0 for all x, y ∈ X. So fo is the Cauchy additive mapping. 1 1 M1 fe (x, y) = fe (x + y) + fe (x − y) − fe (x) − fe (y) = 0 2 2 for all x, y ∈ X. So fo is the quadratic mapping. (ii)   x+y M2 fo (x, y) = 2fo − fo (x) − fo (y) = 0 2 for all x, y ∈ X. Since M2 f (0, 0) = 0, f (0) = 0 and fo is the Cauchy additive mapping. 

M2 fe (x, y) = 2fe

x+y 2





+ 2fe

x−y 2



− fe (x) − fe (y) = 0

for all x, y ∈ X. Since M2 f (0, 0) = 0, f (0) = 0 and fe is the quadratic mapping. Therefore, the mapping f : X → Y is the sum of the Cauchy additive mapping and the quadratic mapping.  (−x) From now on, for a given mapping f : X → Y , define fo (x) := f (x)−f and fe (x) := 2 f (x)+f (−x) for all x ∈ X. Then fo is an odd mapping and fe is an even mapping. 2

1277

SUNGSIK YUN 1276-1285

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

ADDITIVE-QUADRATIC ρ-FUNCTIONAL EQUATIONS

Lemma 2.2. If a mapping f : X → Y satisfies f (0) = 0 and M1 f (x, y) = ρM2 f (x, y)

(2.1)

for all x, y ∈ X, then f : X → Y is the sum of the Cauchy additive mapping fo and the quadratic mapping fe . Proof. Letting y = x in (2.1) for fo , we get fo (2x) − 2fo (x) = 0 and so fo (2x) = 2fo (x) for all x ∈ X. Thus   x 1 fo = fo (x) (2.2) 2 2 for all x ∈ X. It follows from (2.1) and (2.2) that x+y − fo (x) − fo (y) fo (x + y) − fo (x) − fo (y) = ρ 2fo 2 = ρ(fo (x + y) − fo (x) − fo (y)) 







and so fo (x + y) = fo (x) + fo (y) for all x, y ∈ X. Letting y = x in (2.1) for fe , we get 12 fe (2x) − 2fe (x) = 0 and so fe (2x) = 4fe (x) for all x ∈ X. Thus   x 1 fe = fe (x) (2.3) 2 4 for all x ∈ X. It follows from (2.1) and (2.3) that 1 1 fe (x + y) + fe (x − y) − fe (x) − fe (y) 2 2       x−y x+y + 2fe − fe (x) − fe (y) = ρ 2fe 2 2   1 1 fe (x + y) + fe (x − y) − fe (x) − fe (y) =ρ 2 2 and so fe (x + y) + fe (x − y) = 2fe (x) + 2fe (y) for all x, y ∈ X. Therefore, the mapping f : X → Y is the sum of the Cauchy additive mapping fo and the quadratic mapping fe .  We prove the Hyers-Ulam stability of the additive-quadratic ρ-functional equation (2.1) in β-homogeneous F -spaces. 2 Theorem 2.3. Let r > 2β β1 and θ be nonnegative real numbers and let f : X → Y be a mapping satisfying f (0) = 0 and

kM1 f (x, y) − ρM2 f (x, y)k ≤ θ(kxkr + kykr )

(2.4)

for all x, y ∈ X. Then there exist a unique additive mapping A : X → Y and a unique quadratic mapping Q : X → Y such that kfo (x) − A(x)k ≤

4θ 2β2 (2β1 r

1278

− 2β2 )

kxkr ,

(2.5)

SUNGSIK YUN 1276-1285

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S. YUN

kfe (x) − Q(x)k ≤

4θ kxkr − 4β2

(2.6)

4θ kxkr 2β2

(2.7)

2β1 r

for all x ∈ X. Proof. Letting y = x in (2.4) for fo , we get kfo (2x) − 2fo (x)k ≤ for all x ∈ X. So

 



fo (x) − 2fo x ≤ kxkr

β 2 2 2 +β1 r

for all x ∈ X. Hence

   

l

2 fo x − 2m fo x ≤

l m 2 2



m−1 X

j=l

2j fo

4θ 2β2 +β1 r



x 2j

m−1 X j=l



− 2j+1 fo



x



j+1 2

2β2 j kxkr 2β1 rj

(2.8)

for all nonnegative integers m and l with m > l and all x ∈ X. It follows from (2.8) that the sequence {2k fo ( 2xk )} is Cauchy for all x ∈ X. Since Y is complete, the sequence {2k fo ( 2xk )} converges. So one can define the mapping A : X → Y by   x A(x) := lim 2k fo k k→∞ 2 for all x ∈ X. Since fo is an odd mapping, A is an odd mapping. Moreover, letting l = 0 and passing the limit m → ∞ in (2.8), we get (2.5). It follows from (2.4) that

   

A(x + y) − A(x) − A(y) − ρ 2A x + y − A(x) − A(y)

2

      

n x+y x y 2 fo = lim − fo n − fo n

n n→∞ 2 2 2        β2 n

x y x+y

≤ 4θ lim 2 −2n ρ 2fo − f − f kxkr = 0 o o 2n+1 2n 2n 2β2 n→∞ 2β1 rn

for all x, y ∈ X. So x+y − A(x) − A(y) 2 for all x, y ∈ X. By Lemma 2.2, the mapping A : X → Y is additive. Now, let T : X → Y be another additive mapping satisfying (2.5). Then we have 







A(x + y) − A(x) − A(y) = ρ 2A

   

q x x q

− 2 T kA(x) − T (x)k = 2 A

q 2 2q

       

q

x x q

2q T x − 2q fo x

≤ 2 A q − 2 fo q +

q q 2 2 2 2



2β2 q kxkr , 2β2 (2β1 r − 2β2 ) 2β1 rq 8θ

which tends to zero as q → ∞ for all x ∈ X. So we can conclude that A(x) = T (x) for all x ∈ X. This proves the uniqueness of A.

1279

SUNGSIK YUN 1276-1285

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

ADDITIVE-QUADRATIC ρ-FUNCTIONAL EQUATIONS

Letting y = x in (2.4) for fe , we get

1

fe (2x) − 2fe (x) ≤ 4θ kxkr

2

2β2 for all x ∈ X. So

 

fe (x) − 4fe x ≤ 4θ kxkr

2 2β1 r for all x ∈ X. Hence

   

l

4 fe x − 4m fe x ≤

2l 2m



m−1 X

j=l

4j fe



x 2j

(2.9)



j+1

−4

X 4β2 j 4θ m−1 kxkr 2β1 r j=l 2β1 rj



fe

x



2j+1

(2.10)

for all nonnegative integers m and l with m > l and all x ∈ X. It follows from (2.10) that the sequence {4k fe ( 2xk )} is Cauchy for all x ∈ X. Since Y is complete, the sequence {4k fe ( 2xk )} converges. So one can define the mapping Q : X → Y by   x k Q(x) := lim 4 fe k k→∞ 2 for all x ∈ X. Since fe is an even mapping, Q is an even mapping. Moreover, letting l = 0 and passing the limit m → ∞ in (2.10), we get (2.6). It follows from (2.4) that

   

1

Q x + y + 1 Q x − y − Q(x) − Q(y)

2 2 2 2      

x+y x−y − ρ 2Q + 2Q − Q(x) − Q(y)

2 2

        

n 1 x+y 1 x−y x y 4 = lim f + f − f − f e e e e

n n n n→∞ 2 2 2 2 2 2n         

x+y x−y x y − 4n ρ 2fe + 2fe − fe n − fe n

n+1 n+1 2 2 2 2 4θ 4β2 n ≤ β2 lim β1 rn kxkr = 0 2 n→∞ 2 for all x, y ∈ X. So     1 x+y 1 x−y Q + Q − Q(x) − Q(y) 2 2 2 2       x+y x−y = ρ 2Q + 2Q − Q(x) − Q(y) 2 2 for all x, y ∈ X. By Lemma 2.2, the mapping Q : X → Y is quadratic. Now, let T : X → Y be another quadratic mapping satisfying (2.6). Then we have

   

q x x q

kQ(x) − T (x)k = − 4 T 4 Q

q 2 2q

       

q

q x x x x q q

≤ − 4 f + − 4 f 4 Q 4 T e e

q q q 2 2 2 2q 8θ 4 β2 q ≤ kxkr , 2β1 r − 4β2 2β1 rq

1280

SUNGSIK YUN 1276-1285

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S. YUN

which tends to zero as q → ∞ for all x ∈ X. So we can conclude that Q(x) = T (x) for all x ∈ X. This proves the uniqueness of Q, as desired.  Theorem 2.4. Let r < ββ21 and θ be nonnegative real numbers and let f : X → Y be a mapping satisfying f (0) = 0 and (2.4). Then there exist a unique additive mapping A : X → Y and a unique quadratic mapping Q : X → Y such that 4θ kxkr , (2.11) kfo (x) − A(x)k ≤ β2 β2 2 (2 − 2β1 r ) kfe (x) − Q(x)k ≤

4β2

4θ kxkr − 2 β1 r

(2.12)

for all x ∈ X. Proof. It follows from (2.7) that



fo (x) − 1 fo (2x) ≤ 4θ kxkr

2 4β2

for all x ∈ X. Hence

1

fo (2l x) − 1 fo (2m x) ≤

2l

m 2



m−1 X j=l

   

1 fo 2j x − 1 fo 2j+1 x

2j

j+1 2

X 2β1 rj 4θ m−1 kxkr 4β2 j=l 2β2 j

(2.13)

for all nonnegative integers m and l with m > l and all x ∈ X. It follows from (2.13) that the sequence { 21n fo (2n x)} is a Cauchy sequence for all x ∈ X. Since Y is complete, the sequence { 21n fo (2n x)} converges. So one can define the mapping A : X → Y by 1 fo (2n x) 2n for all x ∈ X. Moreover, letting l = 0 and passing the limit m → ∞ in (2.13), we get (2.11). It follows from (2.9) that



fe (x) − 1 fe (2x) ≤ 4θ kxkr

4 4 β2 for all x ∈ X. Hence A(x) := lim

n→∞



1

fe (2l x) − 1 fe (2m x) ≤

4l

m 4



m−1 X

j=l

   

1 fe 2j x − 1 fe 2j+1 x

4j

j+1 4

X 2β1 rj 4θ m−1 kxkr 4β2 j=l 4β2 j

(2.14)

for all nonnegative integers m and l with m > l and all x ∈ X. It follows from (2.14) that the sequence { 41n fe (2n x)} is a Cauchy sequence for all x ∈ X. Since Y is complete, the sequence { 41n fe (2n x)} converges. So one can define the mapping Q : X → Y by 1 fe (2n x) 4n for all x ∈ X. Moreover, letting l = 0 and passing the limit m → ∞ in (2.14), we get (2.12). The rest of the proof is similar to the proof of Theorem 2.3.  Q(x) := lim

n→∞

1281

SUNGSIK YUN 1276-1285

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

ADDITIVE-QUADRATIC ρ-FUNCTIONAL EQUATIONS

3. Additive-quadratic ρ-functional equation (0.2) in β-homogeneous F -spaces We solve and investigate the additive-quadratic ρ-functional equation (0.2) in β-homogeneous F ∗ -spaces. Lemma 3.1. If a mapping f : X → Y satisfies f (0) = 0 and M2 f (x, y) = ρM1 f (x, y)

(3.1)

for all x, y ∈ X, then f : X → Y is the sum of the Cauchy additive mapping fo and the quadratic mapping fe . Proof. Letting y = 0 in (3.1) for fo , we get x 2

 

fo

1 = fo (x) 2

(3.2)

for all x ∈ X. It follows from (3.1) and (3.2) that x+y − fo (x) − fo (y) 2 = ρ(fo (x + y) − fo (x) − fo (y)) 



fo (x + y) − fo (x) − fo (y) = 2fo

and so fo (x + y) = fo (x) + fo (y) for all x, y ∈ X. Letting y = 0 in (3.1) for fe , we get x 2

 

fe

1 = fe (x) 4

(3.3)

for all x ∈ X. It follows from (3.1) and (3.3) that 1 1 fe (x + y) + fe (x − y) − fe (x) − fe (y) 2 2     x+y x−y = 2fe + 2fe − fe (x) − fe (y) 2 2   1 1 =ρ fe (x + y) + fe (x − y) − fe (x) − fe (y) 2 2 and so fe (x + y) + fe (x − y) = 2fe (x) + 2fe (y) for all x, y ∈ X.



We prove the Hyers-Ulam stability of the additive-quadratic ρ-functional equation (3.1) in β-homogeneous F -spaces. 2 Theorem 3.2. Let r > 2β β1 and θ be nonnegative real numbers and let f : X → Y be a mapping satisfying f (0) = 0 and

kM2 f (x, y) − ρM1 f (x, y)k ≤ θ(kxkr + kykr )

(3.4)

for all x, y ∈ X. Then there exist a unique additive mapping A : X → Y and a unique quadratic mapping Q : X → Y such that kfo (x) − A(x)k ≤

2 · 2 β1 r θ kxkr , 2β2 (2β1 r − 2β2 )

1282

(3.5)

SUNGSIK YUN 1276-1285

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S. YUN

2 · 2β1 r θ kxkr 2β2 (2β1 r − 4β2 )

kfe (x) − Q(x)k ≤

(3.6)

for all x ∈ X. Proof. Letting y = 0 in (3.4) for fo , we get

 

fo (x) − 2fo x =

2

 

2fo x − fo (x) ≤ 2θ kxkr

2 2β2

(3.7)

for all x ∈ X. So

   

l

2 fo x − 2m fo x ≤

l m 2 2



m−1 X j=l

2j fo



x 2j



−2

j+1



fo

x



j+1 2

X 2β2 j 2θ m−1 kxkr β 2 2 j=l 2β1 rj

(3.8)

for all nonnegative integers m and l with m > l and all x ∈ X. It follows from (3.8) that the sequence {2k fo ( 2xk )} is Cauchy for all x ∈ X. Since Y is complete, the sequence {2k fo ( 2xk )} converges. So one can define the mapping A : X → Y by   x A(x) := lim 2k fo k k→∞ 2 for all x ∈ X. Since fo is an odd mapping, A is an odd mapping. Moreover, letting l = 0 and passing the limit m → ∞ in (3.8), we get (3.5). Letting y = 0 in (3.4) for fe , we get

   



fe (x) − 4fe x = 4fe x − fe (x) ≤ 2θ kxkr



2 2 2β2

(3.9)

for all x ∈ X. So

   

l

4 fe x − 4m fe x ≤

l m 2 2



m−1 X

j=l

4j fe



x 2j



j+1

−4

X 4β2 j 2θ m−1 kxkr 2β2 j=l 2β1 rj



fe

x



j+1 2

(3.10)

for all nonnegative integers m and l with m > l and all x ∈ X. It follows from (3.10) that the sequence {4k fe ( 2xk )} is Cauchy for all x ∈ X. Since Y is complete, the sequence {4k fe ( 2xk )} converges. So one can define the mapping Q : X → Y by   x Q(x) := lim 4k fe k k→∞ 2 for all x ∈ X. Since fe is an even mapping, Q is an even mapping. Moreover, letting l = 0 and passing the limit m → ∞ in (3.10), we get (3.6). The rest of the proof is similar to the proof of Theorem 2.3.  Theorem 3.3. Let r < ββ12 and θ be nonnegative real numbers and let f : X → Y be a mapping satisfying f (0) = 0 and (3.4). Then there exist a unique additive mapping A : X → Y and a unique quadratic mapping Q : X → Y such that kfo (x) − A(x)k ≤

2 · 2 β1 r θ kxkr , 2β2 (2β2 − 2β1 r )

1283

(3.11)

SUNGSIK YUN 1276-1285

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

ADDITIVE-QUADRATIC ρ-FUNCTIONAL EQUATIONS

kfe (x) − Q(x)k ≤

2 · 2β1 r θ kxkr 2β2 (4β2 − 2β1 r )

(3.12)

for all x ∈ X. Proof. It follows from (3.7) that

β1 r

fo (x) − 1 fo (2x) ≤ 2 · 2 θ kxkr

2 4β2

for all x ∈ X. Hence

1

fo (2l x) − 1 fo (2m x) ≤

2l

m 2



m−1 X

   

1 fo 2j x − 1 fo 2j+1 x

2j

j+1 2

j=l

X 2β1 rj 2 · 2β1 r θ m−1 kxkr β2 j 4 β2 2 j=l

(3.13)

for all nonnegative integers m and l with m > l and all x ∈ X. It follows from (3.13) that the sequence { 21n fo (2n x)} is a Cauchy sequence for all x ∈ X. Since Y is complete, the sequence { 21n fo (2n x)} converges. So one can define the mapping A : X → Y by A(x) := lim

n→∞

1 fo (2n x) 2n

for all x ∈ X. Moreover, letting l = 0 and passing the limit m → ∞ in (3.13), we get (3.11). It follows from (3.9) that

β1 r

fe (x) − 1 fe (2x) ≤ 2 · 2 θ kxkr

4 8 β2

for all x ∈ X. Hence



1

fe (2l x) − 1 fe (2m x) ≤

4l 4m



m−1 X

   

1 fe 2j x − 1 fe 2j+1 x

4j

4j+1

j=l

X 2β1 rj 2 · 2β1 r θ m−1 kxkr β2 j 8 β2 4 j=l

(3.14)

for all nonnegative integers m and l with m > l and all x ∈ X. It follows from (3.14) that the sequence { 41n fe (2n x)} is a Cauchy sequence for all x ∈ X. Since Y is complete, the sequence { 41n fe (2n x)} converges. So one can define the mapping Q : X → Y by Q(x) := lim

n→∞

1 fe (2n x) 4n

for all x ∈ X. Moreover, letting l = 0 and passing the limit m → ∞ in (3.14), we get (3.12). The rest of the proof is similar to the proof of Theorem 2.3.  Acknowledgments This research was supported by Hanshin University Research Grant.

1284

SUNGSIK YUN 1276-1285

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

S. YUN

References [1] M. Adam, On the stability of some quadratic functional equation, J. Nonlinear Sci. Appl. 4 (2011), 50–59. [2] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan 2 (1950), 64–66. [3] L. C˘ adariu, L. G˘ avruta and P. G˘ avruta, On the stability of an affine functional equation, J. Nonlinear Sci. Appl. 6 (2013), 60–67. [4] A. Chahbi and N. Bounader, On the generalized stability of d’Alembert functional equation, J. Nonlinear Sci. Appl. 6 (2013), 198–204. [5] P. W. Cholewa, Remarks on the stability of functional equations, Aequationes Math. 27 (1984), 76–86. [6] G. Z. Eskandani and P. Gˇ avruta, Hyers-Ulam-Rassias stability of pexiderized Cauchy functional equation in 2-Banach spaces, J. Nonlinear Sci. Appl. 5 (2012), 459–465. [7] P. Gˇ avruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings, J. Math. Anal. Appl. 184 (1994), 431–436. [8] D. H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. U.S.A. 27 (1941), 222–224. [9] C. Park, Orthogonal stability of a cubic-quartic functional equation, J. Nonlinear Sci. Appl. 5 (2012), 28–36. [10] C. Park, Additive ρ-functional inequalities and equations, J. Math. Inequal. 9 (2015), 17–26. [11] C. Park, Additive ρ-functional inequalities in non-Archimedean normed spaces, J. Math. Inequal. 9 (2015), 397–407. [12] C. Park, K. Ghasemi, S. G. Ghaleh and S. Jang, Approximate n-Jordan ∗-homomorphisms in C ∗ -algebras, J. Comput. Anal. Appl. 15 (2013), 365–368. [13] C. Park, A. Najati and S. Jang, Fixed points and fuzzy stability of an additive-quadratic functional equation, J. Comput. Anal. Appl. 15 (2013), 452–462. [14] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 (1978), 297–300. [15] K. Ravi, E. Thandapani and B. V. Senthil Kumar, Solution and stability of a reciprocal type functional equation in several variables, J. Nonlinear Sci. Appl. 7 (2014), 18–27. [16] S. Rolewicz, Metric Linear Spaces, PWN-Polish Scientific Publishers, Warsaw, 1972. [17] S. Schin, D. Ki, J. Chang and M. Kim, Random stability of quadratic functional equations: a fixed point approach, J. Nonlinear Sci. Appl. 4 (2011), 37–49. [18] S. Shagholi, M. Bavand Savadkouhi and M. Eshaghi Gordji, Nearly ternary cubic homomorphism in ternary Fr´echet algebras, J. Comput. Anal. Appl. 13 (2011), 1106–1114. [19] S. Shagholi, M. Eshaghi Gordji and M. Bavand Savadkouhi, Stability of ternary quadratic derivation on ternary Banach algebras, J. Comput. Anal. Appl. 13 (2011), 1097–1105. [20] D. Shin, C. Park and Sh. Farhadabadi, On the superstability of ternary Jordan C ∗ -homomorphisms, J. Comput. Anal. Appl. 16 (2014), 964–973. [21] D. Shin, C. Park and Sh. Farhadabadi, Stability and superstability of J ∗ -homomorphisms and J ∗ derivations for a generalized Cauchy-Jensen equation, J. Comput. Anal. Appl. 17 (2014), 125–134. [22] F. Skof, Propriet locali e approssimazione di operatori, Rend. Sem. Mat. Fis. Milano 53 (1983), 113–129. [23] S. M. Ulam, A Collection of the Mathematical Problems, Interscience Publ. New York, 1960. [24] C. Zaharia, On the probabilistic stability of the monomial functional equation, J. Nonlinear Sci. Appl. 6 (2013), 51–59. [25] S. Zolfaghari, Approximation of mixed type functional equations in p-Banach spaces, J. Nonlinear Sci. Appl. 3 (2010), 110–122. Department of Financial Mathematics, Hanshin University, Gyeonggi-do 18101, Korea E-mail address: [email protected]

1285

SUNGSIK YUN 1276-1285

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

DIFFERENTIAL SUBORDINATION FOR ANALYTIC FUNCTIONS ASSOCIATED WITH LEAF-LIKE DOMAINS S. Sivasubramanian1 , M. Govindaraj2 , G. Murugusundaramoorthy3 and N. E. Cho4,∗ 1,2 Department

of Mathematics, University College of Engineering Tindivanam Anna University, Tindivanam 604001, Tamil Nadu, India E-Mail: [email protected] E-Mail: [email protected]

3 Department

of Mathematics, School of Advanced Sciences VIT University, Vellore-632014,India E-Mail: [email protected] 4,∗ -Corresponding

author Department of Applied Mathematics, Pukyong National University Busan 608-737, Korea E-Mail:[email protected] Abstract In our present investigation, we obtain several differential subordination results involving leaf-like domains. Moreover, certain sharp coefficient estimates are investigated when the class of functions lies in leaf-like domains. 2010 Mathematics Subject Classification: 30C45; 30C50. Keywords and Phrases: Analytic function, Starlike function, Convex function, Leaf-like domain.

1. Introduction and Definitions Let A denote the class of all analytic functions f of the form ∞ X f (z) = z + an z n

(1.1)

n=2

in the open disk U = {z : |z| < 1} normalized by f (0) = 0 and f 0 (0) = 1. A function f is subordinate to the function g, written as f ≺ g or f (z) ≺ g(z), provided that there is an analytic function w(z) defined on U with w(0) = 0 and |w(z)| < 1 such that f (z) = g[w(z)] for z ∈ U. In particular, if the function g is univalent in U, then f ≺ g is equivalent to f (0) = g(0) and f (U) ⊂ g(U). For two functions f, g ∈ A, the Hadamard product is defined by ∞ X f (z) ∗ g(z) = z + an bn z n (z ∈ U), n=2

where an and bn are the coefficients of f and g, respectively.

1286

Sivasubramanian ET AL 1286-1301

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

S. Sivasubramanian et al.

Let P denote the class of analytic functions of the form p(z) = 1 + p1 z + p2 z 2 + · · · such that 0 in U. Let S denote the subclass of A consisting of univalent functions. Let S ∗ (γ) and K(γ) be the class of all starlike functions of order γ and convex functions of order γ(0 ≤ γ < 1), respectively. A function f ∈ A is in the class R(γ), if it satisfies the inequality: γ (z ∈ U, 0 ≤ γ < 1). We write R(0) = R, the familiar class of functions in A which are of bounded turning in U. It is well known that S ∗ 6⊂ R and R 6⊂ S ∗ (see [13]). The class of k-starlike functions is introduced and studied by Kanas and Wi´sniowska ([6], [7])(For more details, see [5],[8],[9],[10]) as defined by f ∈ k − ST , if and only if 0  0  zf (z) zf (z) > k < − 1 (0 ≤ k < ∞, z ∈ U). (1.2) f (z) f (z) One may be easily see that the conditions (1.2) may be rewritten into the form k|p(z) − 1| (z ∈ U). Also, it is easy to see that p(U) is a conical domain Ωk = {ω ∈ C : k|ω − 1|} , or

o n p Ωk = ω = u + iv : u > k (u − 1)2 + v 2 ,

where 0 ≤ k < ∞. For k > 1, the curve ∂Ωk is the ellipse defined by  ∂Ωk = ω = u + iv : u2 = k 2 (u − 1)2 + k 2 v 2 . √  For k ≥ 2 + 2, this ellipse lies entirely inside L, where L = ω ∈ C : ω 2 − 1 < 1 is the interior of the right √ half of the lemniscate of Bernoulli (u2 + v 2 )2 = 2(u2 − v 2 ). Therefore k − ST ⊂ SL∗ for k ≥ 2 + 2. Recently, Sok´ol and Stankiewicz [18] defined the class SL∗ given by  ( ) zf 0 (z) 2 SL∗ = f ∈ S : − 1 < 1, z ∈ U . f (z)

(1.3)

It is easy to see that f ∈ SL∗ ⇔

√ zf 0 (z) ≺ q0 (z) = 1 + z f (z)

(q0 (0) = 1)

√ √  and L ⊂ ω : ω − 2/2 < 2/2 . ˜ A function f ∈ S Analogous to the class SL∗ , recently Patel and Sahoo [16] defined a class R. ˜ is said to be in the class R, if it satisfies the condition n o ˜ = f ∈ S : (f 0 (z))2 − 1 < 1 (z ∈ U) . R (1.4) ˜ satisfies the suborIt follows from (1.4) and the definition of subordination that a function f ∈ R dinate relation √ f 0 (z) ≺ 1 + z (z ∈ U). (1.5)

1287

Sivasubramanian ET AL 1286-1301

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Differential subordination

3

Sok´ol and Paprocki [14] studied the class of analytic and univalent functions defined by  0 α   0 α  zf (z) zf (z) ∗ S (α, b) = f ∈ S : − b < b, = 1 (z ∈ U) , f (z) f (z) z=0

(1.6)

where α ≥ 1, b ≥ 21 . For the choice of α = 1, the class of S ∗ (1, b) investigated by Janowski [3]. For the choice of α = 2, b = 1, the class S ∗ (2, 1) investigated by Sok´ ol [14]. It is easy to see that f ∈ S ∗ (α, b) if and only if !1 α zf 0 (z) 1+z  ≺ q0 (z) = (q0 (0) = 1). (1.7) f (z) 1 + 1−b z b Note that the set,  Ω(α, b) =

1 π , α ≥ 1, b ≥ ω ∈ C : |ω − b| < b, | arg(ω)| ≤ 2α 2 α

 (1.8)

is connected with the class S ∗ (α, b) and is a leaf-like set. The concept of leaf-like domain was investigated by Sok´ol and Paprocki [14]. For more details related to the leaf-like domain, one may refer to the recent papers (see [1, 4, 17, 18, 19, 20, 21, 22, 23]). Motivated essentially by the work of Sok´ol and Paprocki [14] and Sahoo and Patel [16], we ˜ introduce the class R(α, b) related to the concept of leaf-like domain as given below. ˜ A function f ∈ S is said to be in the class R(α, b), if it satisfies the condition 0 α (f (z)) − b < b (z ∈ U). (1.9) Let 

 1 Q = ω ∈ C : 0 < σ4 (α, b),  2αb 2 αb 2b

1 2



, then

(3.18)

where σ3 (α, b) and σ4 (α, b) is given by     αb 3 2b − 1 1 σ3 (α, b) = − −1 2(2b − 1) 2 αb 2b

(3.19)

and

    3 2b − 1 1 αb − +1 . σ4 (α, b) = 2(2b − 1) 2 αb 2b The estimates in (3.18) are sharp.

(3.20)

Proof. From (1.7), it follows that, zf 0 (z) = f (z)

1 + ω(z)  1 + 1−b ω(z) b

!1

α

(z ∈ U),

(3.21)

where ω(z) is given by (3.1). From (3.21), we have         zf 0 (z) 2b − 1 2b − 1 2b − 1 2b − 1 1 =1+ d1 z + d2 + − d21 z 2 + · · · . (3.22) f (z) αb αb 2αb αb b Since zf 0 (z) = 1 + a2 z + (2a3 − a22 )z 2 + (3a4 + a32 − 3a3 a2 )z 3 + . . . , (3.23) f (z) comparing the coefficients of z and z 2 in (3.22) and (3.23), we reduce that   2b − 1 a2 = d1 (3.24) αb and      2b − 1 3 2b − 1 1 a3 = d2 + − d21 (3.25) 2αb 2 αb 2b Following a similar method adopted for Theorem 3.1, one can easily show that inequality (3.18) is satisfied and is sharp for the functions as in similar lines mentioned in Theorem 3.1.  Letting µ = 0 (or µ = 1, respectively) in Theorem 3.2, we get the following result. Corollary 3.5. If the function f given by (1.1) belong to the class S ∗ (α, b), then     2b − 1 2b − 1 1 2 |a3 | ≤ and |a3 − a2 | ≤ (α ≥ 1, b ≥ ). 2αb 2αb 2 The estimates in (3.26) are sharp for the function f0 ∈ A defined by !1 α 1 + z2 0  f0 (z) = (z ∈ U). 1 + 1−b z2 b

1299

(3.26)

(3.27)

Sivasubramanian ET AL 1286-1301

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Differential subordination

15

For the choice of α = 2, b = 1 in Theorem 3.2, we have the following result. Corollary 3.6. If the function f given by (1.1) belong to the class S ∗ (2, 1), then  1 − 4µ   , µ < −3  4  16    1 −3 |a3 − µa22 | ≤ (3.28) , 4 ≤ µ ≤ 54  4     4µ − 1   , µ > 54 . 16 If we take α = 2, b = 1 and µ = 0, and α = 2, b = 1 and µ = 1 in Theorem 3.2, then we have the following corollaries, respectively. Corollary 3.7. If the function f given by (1.1) belong to the class S ∗ (2, 1), then 1 |a3 | ≤ . 4 Corollary 3.8. If the function f given by (1.1) belong to the class S ∗ (2, 1), then 1 |a3 − a22 | ≤ . 4

(3.29)

(3.30)

Acknowledgements The work of the authors are supported by a grant from Department of Science and Technology, Government of India vide ref: SR/FTP/MS-022/2012 under fast track scheme and by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (No. 2016R1D1A1A09916450). References [1] R. M. Ali, N. E. Cho, V. Ravichandran and S. Sivaprasad Kumar, Differential subordination for functions associated with the lemniscate of Bernoulli, Taiwanese J. Math. 16 (3) (2012), 1017-1026. [2] I. S. Jack, Functions starlike and convex of order α, J. London Math. Soc. 3 (1971), 469-474. [3] W. Janowski, Extremal problems for a family of functions with positive real part and for some related families, Ann. Polon. Math. 23 (1970/1971), 159–177. [4] R. Jurasi´ nska and J. Sok´ ol, Some problems for certain family of starlike functions, Math. Comput. Modelling 55 (11-12) (2012), 2134–2140. [5] S. Kanas and A. Wi´sniowska, Conic regions and k-uniform convexity II, Zeszyty Nauk. Politech. Rzeszowskiej Mat. 170 (1998), 65–78. [6] S. Kanas and A. Wi´sniowska, Conic regions and k-uniform convexity, J. Comput. Appl. Math. 105 (1999), 327–336. [7] S. Kanas and A. Wi´sniowska, Conic regions and k-starlike functions, Rev. Roumaine Math. Pures Appl. 45 (2000), 647–657. [8] S. Kanas and T. Yaguchi, Subclasses of k-uniformly convex functions and starlike functions defined by generalized derivative I, Indian J. Pure Appl. Math. 32 (9) (2001), 1275 – 1282. [9] S. Kanas, Coefficient estimates in subclass of the Carath´eodory class related to conical domains, Acta Math. Univ. Comenian. (N.S.) 74 (2) (2005), 149–161. [10] S. Kanas and D. R˘ aducanu, Some class of analytic functions related to conic domains, Math. Slovaca 64 (5) (2014), 1183–1196. [11] F. R. Keogh and E. P. Merkes, A coefficient inequality for certain classes of analytic functions, Proc. Amer. Math. Soc. 20 (1969), 8–12.

1300

Sivasubramanian ET AL 1286-1301

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

16

S. Sivasubramanian et al.

[12] S. S. Miller and P. T. Mocanu, Differential subordinations, Monographs and Textbooks in Pure and Applied Mathematics, 225, Dekker, New York, 2000. [13] P. T. Mocanu, On a subclass of starlike functions with bounded turning, Rev. Roumaine Math. Pures Appl. 55 (5) (2010), 375-379 [14] E. Paprocki and J. Sok´ ol, The extremal problems in some subclass of strongly starlike functions, Zeszyty Nauk. Politech. Rzeszowskiej Mat. 20 (1996), 89–94. [15] M. Raza and S. N. Malik,Upper bound of the third Hankel determinant for a class of analytic functions related with lemniscate of Bernoulli, J. Inequal. Appl. 2013, 2013:412, 8 pp. [16] A. K. Sahoo and J. Patel, Hankel determinant for a class of analytic functions related with lemniscate of Bernoulli, Int J. Anal. Appl. 6 (2) (2014), 170–177. [17] J. Sok´ ol, On some subclass of strongly starlike functions, Demonstratio Math. 31 (1) (1998), 81–86. [18] J. Sok´ ol and J. Stankiewicz, Radius of convexity of some subclasses of strongly starlike functions, Zeszyty Nauk. Politech. Rzeszowskiej Mat. 19 (1996), 101–105. [19] J. Sok´ ol, Coefficient estimates in a class of strongly starlike functions, Kyungpook Math. J. 49 (2) (2009), 349–353. [20] J. Sok´ ol, On sufficient condition for starlikeness of certain integral of analytic function, J. Math. Appl. 28 (2006), 127–130. [21] J. Sok´ ol, On sufficient condition to be in a certain subclass of starlike functions defined by subordination, Appl. Math. Comput. 190 (1) (2007), 237–241. [22] J. Sok´ ol, Radius problems in the class SL∗ , Appl. Math. Comput. 214 (2) (2009), 569–573. [23] J. Sok´ ol, A certain class of starlike functions, Comput. Math. Appl. 62 (2) (2011), 611–619.

1301

Sivasubramanian ET AL 1286-1301

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On iterative approach to common fixed points of nonexpansive mappings in Hilbert spaces Muhammad Saeed Ahmad1 , Waqas Nazeer2, Shin Min Kang3,4,∗ and Syeed Fakhar Abbas Naqvi5 1

Department of Mathematics, Government Muhammadan Anglo Oriental College, Lahore 54000, Pakistan e-mail: [email protected] 2

3

Division of Science and Technology, University of Education, Lahore 54000, Pakistan e-mails: [email protected]

Department of Mathematics and RINS, Gyeongsang National University, Jinju 52828, Korea e-mail: [email protected] 4

Center for General Education, China Medical University, Taichung 40402, Taiwan 5

Department of Mathematics, Lahore Leads University, Lahore 54000, Pakistan e-mail: [email protected] Abstract

In this paper, we introduce a viscosity rule for common fixed points of two nonexpansive mappings in Hilbert spaces. The strong convergence of this technique is proved under certain assumptions imposed on the sequence of parameters. 2010 Mathematics Subject Classification: 47J25, 47N20, 34G20, 65J15 Key words and phrases: viscosity rule, Hilbert space, nonexpansive mappings, variational inequality

1

Introduction

Fixed points of special mappings like nonexpansive, asymptotically nonexpansive, contractive and other mappings has become a field of interest and has a variety of applications in related fields like image recovery, signal processing and geometry of objects. Almost in all branches of mathematics we see some versions of theorems relating to fixed points of functions of special nature. As a result we apply them in industry, toy making, finance, aircrafts and manufacturing of new model cars. A fixed-point iteration scheme has been applied in intensity modulated radiation therapy optimization to pre-compute dosedeposition coefficient matrix, see [15]. Because of its vast range of applications almost in all directions, the research in it is moving rapidly and an immense literature is present now. Constructive fixed point theorems (e.g., Banach fixed point theorem) which not only claim the existence of a fixed point but yield an algorithm, too (in the Banach case fixed point iteration xn+1 = f (xn )). Any equation that can be written as x = f (x) for some map f that is contracting with respect to some (complete) metric on X will provide such a fixed point iteration. Mann’s iteration method was the stepping stone in this regard and ∗

Corresponding author

1302

Muhammad Saeed Ahmad ET AL 1302-1308

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

is invariably used in most of the occasions see [6]. But it only ensures weak convergence, see [2] but more often then not, we require strong convergence in many real world problems relating to Hilbert spaces, see [1]. So mathematician are in search for the modifications of the Mann’s process to control and ensure the strong convergence. For literature review we refer to the readers (see [3, 4, 8–12], and references therein). In this paper, we shall take H as a real Hilbert space, h·, ·i as inner product, k · k as the induced norm, and C as a nonempty closed subset of H. Definition 1.1. Let T : H → H be a mapping. Then T is called nonexpansive if kT (x) − T (y)k ≤ kx − yk,

∀x, y ∈ H.

Definition 1.2. A mapping f : H → H is called a contraction if for all x, y ∈ H and θ ∈ [0, 1) kf (x) − f (y)k ≤ θkx − yk. Definition 1.3. Pc : H → C is called a metric projection if for every x ∈ H there exists a unique nearest point in C, denoted by Pc x, such that kx − Pc xk ≤ kx − yk, ∀y ∈ C. In order to verify the weak convergence of an algorithm to a fixed point of a nonexpansive mapping we need the demiclosedness principle: Theorem 1.4. ([5]) (The demiclosedness principle) Let C be a nonempty closed convex subset of the real Hilbert space H and T : C → C such that xn * x ∗ ∈ C

and

(I − T )xn → 0.

Then x∗ = T x∗ . Here → and *) denotes strong and weak convergence, respectively. Moreover, the following result gives the conditions for the convergence of a nonnegative real sequence. Theorem 1.5. Assume that {an } is a sequence of nonnegative real numbers such that an+1 ≤ (1 − γn )an + δn , ∀n ≥ 0, where {γn } is a sequence in (0, 1) and {δn } is a sequence with P (1) ∞ n=0 γn = ∞. P (2) limn→∞ sup γδnn ≤ 0 or ∞ n=0 |δn | < ∞. Then an → 0. The following strong convergence theorem, which is also called the viscosity approximation method, for non-expansive mappings in real Hilbert spaces is given by Moudafi [7] in 2000. Theorem 1.6. ([7]) Let C be a non-empty closed convex subset of the real Hilbert space H. Let T be a non-expansive mapping of C into itself such that F (T ) is nonempty. Let f be a contraction of C into itself. Consider the sequence xn+1 =

n 1 f (xn ) + T (xn ), 1 + n 1 + n

n ≥ 0,

where the sequence {n } in (0, 1) satisfies (1) P limn→∞ n = 0, (2) ∞ n=0 n = ∞, and 1303

Muhammad Saeed Ahmad ET AL 1302-1308

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

1 (3) limn→∞ | n+1 − 1n | = 0. Then {xn } converges strongly to a fixed point x∗ of the non-expansive mapping T , which is also the unique solution of the variational inequality

h(I − f )x, y − xi ≥ 0,

∀ ∈ F (T ).

In 2015, Xu et al. [13] applied viscosity method on the midpoint rule for nonexpansive mappings and give the generalized viscosity implicit rule: xn+1 = αn f (xn ) + (1 − αn )T



xn + xn+1 2



,

∀n ≥ 0.

They also proved that the sequence generated by the generalized viscosity implicit rule converges strongly to a fixed point of T . Ke et al. [14], motivated and inspired by the idea of Xu et al. [13], proposed two generalized viscosity implicit rules: xn+1 = αn f (xn ) + (1 − αn )T (sn xn + (1 − sn )xn+1 ) , xn+1 = αn xn + βf (xn ) + γn T (sn xn + (1 − sn )xn+1 ). In this paper, we give a viscosity approximation method for common fixed point of two nonexpansive mappings in Hilbert spaces. Our contribution in this direction is the following viscosity rule n+1 = αn f (n ) + βn S(n ) + γn T (n ).

(1.1)

We prove strong convergence of (1.1) under certain assumptions. We also solve some examples to check the validity of (1.1).

2

Main result

Following Theorem 2.1 is about convergence of our proposed viscosity technic. Theorem 2.1. Let S and T be two non-expansive mappings from a closed convex subset X of real Hilbert space H into X with U := F (T ) ∩ F (S) 6= ∅. Also let that f : X → X be a contraction with coefficient θ ∈ [0, 1). Assume that the sequence {n } in X is generated by (1.1), where {αn }, {βn } and {γn } are sequences in (0, 1) satisfying (1) αn + βn + γn = 1, (2) P limn→∞ αn = 0, P∞ (3) P∞ n=0 |αn+1 − αn | < ∞ and n=0 |βn+1 − βn | < ∞, (4) ∞ α = ∞, n=0 n (5) limn→∞ kT (n ) − S(n )k = 0. Then {n } converges strongly to ∗ ∈ U , which satisfy the variational inequality h∗ − f (∗ ), y − ∗ i ≥ 0,

∀y ∈ U.

Proof. We will prove this theorem into the following five steps.

1304

Muhammad Saeed Ahmad ET AL 1302-1308

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Step 1. In this step, we show n is bounded. Take ζ ∈ U arbitrarily, we have kn+1 − ζk = kαn f (n ) + βn S(n ) + γn T (n ) − ζk = kαn f (n ) + βn S(n ) + γn T (n ) − (αn + βn + γn )ζk ≤ αn kf (n ) − ζk + βn kS(n ) − ζk + γn kT (n ) − ζk = αn kf (n ) − f (ζ) + f (ζ) − ζk + βn kS(n ) − ζk + γn kT (n ) − ζk ≤ αn kf (n ) − f (ζ)k + αn kf (ζ) − ζk + βn kn − ζk + γn kn − ζk ≤ θαn kn − ζk + αn kf (ζ) − ζk + (βn + γn )kn − ζk = θαn kn − ζk + αn kf (ζ) − ζk + (1 − αn )kn − ζk = (1 − αn + αn θ)kn − ζk + αn kf (ζ) − ζk   1 = [1 − αn (1 − θ)]kn − ζk + αn (1 − θ) kf (ζ) − ζk . (1 − θ) Thus,  kn+1 − ζk ≤ max kn − ζk,

 1 kf (ζ) − ζk . 1−θ

Similarly    1 kn − ζk ≤ max kn−1 − ζk, kf (ζ) − ζk . 1−θ From this    1 kn+1 − ζk ≤ max kn − ζk, kf (ζ) − ζk 1−θ    1 ≤ max kn−1 − ζk, kf (ζ) − ζk 1−θ .. .    1 ≤ max k0 − ζk, kf (ζ) − ζk . 1−θ We obtain  kn+1 − ζk ≤ max k0 − ζk,

 1 kf (ζ) − ζk . 1−θ

Hence, we concluded that {n } is a bounded sequence. Consequently, {f (n )}, {S(n )} and {T (n )} are bounded. Step 2. Now, we prove that kn+1 − n k → 0 as n → ∞ kn+1 − n k = kαn f (n ) + βn S(n ) + γn T (n ) − {αn−1 f (n−1 ) + βn−1 S(n−1 ) + γn−1 T (n−1 )} k = kαn {f (n ) − f (n−1 )} + (αn − αn−1 )f (n−1 ) + βn (S(n ) − S(n−1 )) + (βn − βn−1 )S(n−1 ) + γn {T (n ) − T (n−1 )} + (γn − γn−1 )T (n−1 )k

1305

Muhammad Saeed Ahmad ET AL 1302-1308

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

= kαn {f (n ) − f (n−1 )} + (αn − αn−1 )f (n−1 ) + βn {S(n ) − S(n−1 )} + (βn − βn−1 )S(n−1 ) + γn {T (n ) − T (n−1 )} + (αn − αn−1 + βn − βn−1 )T (n−1 )k = kαn {f (n ) − f (n−1 )} + (αn − αn−1 ){f (n−1 ) − T (n−1 )} + βn {S(n ) − S(n−1 )} + (βn − βn−1 ){S(n−1 ) − T (n−1 )} + γn {T (n ) − T (n−1 )}k ≤ αn kf (n ) − f (n−1 )k + |αn − αn−1 |kf (n−1 ) − T (n−1 )k + βn kS(n ) − S(n−1 )k + |βn − βn−1 |kS(n−1 ) − T (n−1 )k + γn kT (n ) − T (n−1 )k ≤ αn θkn − n−1 k + βn kn − n−1 k + γn kn − n−1 k + (|αn − αn−1 | + |βn − βn−1 |)M2 = (αn θ + βn + γn )kn − n−1 k + (|αn − αn−1 | + |βn − βn−1 |)M2 = (αn θ + 1 − αn )kn − n−1 k + (|αn − αn−1 | + |βn − βn−1 |)M2 = (1 − αn (1 − θ))kn − n−1 k + (|αn − αn−1 | + |βn − βn−1 |)M2 , where

  M2 ≥ max sup kf (n ) − T (n )k , sup kS(n ) − T (n )k . n≥0

P∞

n≥0

P∞

P Note that n=0 |αn+1 − αn | < ∞, n=0 |βn+1 − βn | < ∞ and ∞ n=0 αn = ∞. Using Theorem 1.5, we have limn→∞ kn+1 − n k = 0. Step 3. Now, we will show that limn→∞ kn −S(n )k = 0 and limn→∞ kn −T (n )k = 0. Consider kn − S(n )k = kn − n+1 + n+1 − S(n )k ≤ kn − n+1 k + kn+1 − S(n )k = kn − n+1 k + kαn f (n ) + βn S(n ) + γn T (n ) − S(n )k = kn − n+1 k + kαn f (n ) + γn T (n ) − (1 − βn )S(n )k = kn − n+1 k + kαn f (n ) + γn T (n ) − (αn + γn )S(n )k ≤ kn+1 − n k + αn kf (n ) − S(n )k + γn kT (n ) − S(n )k. Then by limn→∞ αn = limn→∞ kT (n ) − S(n )k = 0, and limn→∞ kn+1 − n k → 0, we get kn − S(n )k → 0 as n → ∞. Now, consider kn − T (n )k = kn − n+1 + n+1 − T (n )k ≤ kn − n+1 k + kn+1 − T (n )k = kn − n+1 k + kαn f (n ) + βn S(n ) + γn T (n ) − T (n )k = kn − n+1 k + kαn f (n ) + βn S(n ) − (1 − γn )T (n )k = kn − n+1 k + kαn f (n ) + βn S(n ) − (αn + βn )T (n )k ≤ kn+1 − n k + αn kf (n ) − T (n )k + βn kT (n ) − S(n )k. Then by limn→∞ αn = limn→∞ kT (n ) − S(n )k = 0, and limn→∞ kn+1 − n k → 0, we get kn − T n k → 0 as n → ∞. Step 4. In this step, we will show that lim supn→∞ h∗ − f (∗ ), ∗ − n i ≤ 0, where ∗  = PU f (∗ ). Indeed, we take a subsequence {ni } of {n } which converges weakly to a fixed point ζ ∈ U = F (T ) ∩ F (S). From limn→∞ kn − S(n )k = 0 , limn→∞ kn − T (n )k = 0 and Theorem 1.4 we have ζ = Sζ and ζ = T ζ. This together with the property of the metric projection implies that lim suph∗ − f (∗ ), ∗ − n i = lim suph∗ − f (∗ ), ∗ − ni i n→∞

n→∞

= h∗ − f (∗ ), ∗ − ζi ≤ 0.

1306

Muhammad Saeed Ahmad ET AL 1302-1308

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Step 5. Finally, we show that limn→∞ n = ∗ as. Now we again take ∗ ∈ U is the unique fixed point of the contraction PU f . Consider kn+1 − n k2 = kαn f (n ) + βn S(n ) + γn T (n ) − ∗ k2 = kαn f (n ) + βn S(n ) + γn T (n ) − (αn + βn + γn )∗ k2 = kαn {f (n ) − ∗ } + βn {S(n ) − ∗ } + γn {T (n ) − ∗ }k2 = α2n kf (n ) − ∗ k2 + βn2 kS(n ) − ∗ k2 + γn2 kT (n ) − ∗ )k2 + 2αn βn hf (n ) − ∗ , S(n ) − ∗ i + 2αn γn hf (n ) − ∗ , T (n ) − ∗ i + 2βn γn hS(n ) − ∗ , T (n ) − ∗ i ≤ α2n kf (n ) − ∗ k2 + βn2 kn − ∗ k2 + γn2 kn − ∗ )k2 + 2αn βn hf (n ) − f (∗ ), S(n) − ∗ i + 2αn βn hf (∗ ) − ∗ , S(n ) − ∗ i + 2αn γn hf (n ) − f (∗ ), T (n) − ∗ i + 2αn γn hf (∗ ) − ∗ , T (n ) − ∗ i + 2βn γn hS(n ) − ∗ , T (n ) − ∗ i ≤ (βn2 + γn2 )kn − ∗ )k2 + 2αn βn kf (n ) − f (∗ )k · kS(n ) − ∗ k + 2αn γn kf (n ) − f (∗ )k · kT (n ) − ∗ k + 2βn γn kS(n ) − ∗ k · kT (n ) − ∗ k + Ln ≤ (βn2 + γn2 )kn − ∗ k2 + 2αn βn θkn − ∗ k · kn − ∗ k + 2αn γn θkn − ∗ k · kn − ∗ k + 2βn γn kn − ∗ k · kn − ∗ k + Ln = (βn2 + γn2 + 2βn γn + 2αn γn θ + 2αn βn θ)kn − ∗ k2 + Ln = [(βn + γn )2 + 2αn θ(γn + βn )]kn − ∗ k2 + Ln = (βn + γn )[βn + γn + 2αn θ]kn − ∗ k2 + Ln = (1 − αn )[1 − αn + 2αn θ]kn − ∗ k2 + Ln , where Ln = α2n kf (n ) − ∗ k2 + 2αn βn hf (∗ ) − ∗ , S(n) − ∗ i + 2αn γn hf (∗ ) − ∗ , T (n ) − ∗ i. Note that since αn θ < 1 (2αn θ < 2), 1 − αn + 2αn θ < 2 + 1 − αn < 3, using this in (1.1) we have kn+1 − ∗ k2 < 3(1 − αn )kn − ∗ k2 + Ln . (2.1) Also we get lim sup n→∞

Ln 1  2 = lim sup αn kf (n ) − ∗ k2 + 2αn βn hf (∗ ) − ∗ , S(n) − ∗ i αn n→∞ αn  +2αn γn hf (∗ ) − ∗ , T (n) − ∗ i  = lim sup αn kf (n ) − ∗ k2 + 2βn hf (∗ ) − ∗ , S(n) − ∗ i n→∞  + 2γn hf (∗ ) − ∗ , T (n ) − ∗ i ≤ 0.

(2.2)

From (2.1), (2.2) and Theorem 1.5 we have lim kn+1 − ∗ k2 = 0,

n→∞

which implies that n → ∗ as n → ∞. This completes the proof.

1307

Muhammad Saeed Ahmad ET AL 1302-1308

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

References [1] H. H. Bauschke and P. L. Combettes, A weak-to-strong convergence principle for Fej´ermonotone methods in Hilbert spaces, Math. Oper. Res., 26 (2001), 248–264. [2] A. Genel and J. Lindenstrass, An example concerning fixed points, Israel. J. Math., 22 (1975), 81–86. [3] Y. C. Kwun, W. Nazeer, M. Munir and S. M. Kang, Explicit viscosity rules and applications of nonexpansive mappings, J. Comput. Anal. Appl., 24 (2018), 1541–1552. [4] Y. C. Kwun, W. Nazeer, M. Munir and S. M. Kang, Applications and strong convergence theorems of asymptotically nonexpansive non-self mappings, J. Comput. Anal. Appl., 24 (2018), 1553–1564. [5] N. G. Lloyd, Topics in metric fixed point theory, Cambridge Studies in Advanced Mathematics 28, Cambridge University Press, 1990. [6] W. R. Mann, Mean value methods in iteration, Proc. Amer. Math. Soc., 4 (1953), 506–510. [7] A. Moudafi, Viscosity approximation methods for fixed-points problems, J. Math. Anal. Appl., 241 (2000), 46–55. [8] S. F. A. Naqvi and M. S. Khan, On the viscosity rule for common fixed points of two nonexpansive mappings in Hilbert spaces, Open J. Math. Sci., 1 (2017), 110–125. [9] W. Nazeer, S. M. Kang, M. Munir and S. Kausar, Strong convergence theorems of non-convex hybrid algorithm for quasi-Lipschitz mappings, J. Comput. Anal. Appl., 24 (2018), 1313–1321. [10] W. Nazeer, S. M. Kang, M. Munir and S. Kausar, Strong convergence theorems for a non-convex hybrid method for quasi-Lipschitz mappings and applications, J. Comput. Anal. Appl., 24 (2018), 1455–1463. [11] W. Nazeer, M. Munir and S. M. Kang, An intermixed algorithm for three strict pseudo-contractions in Hilbert spaces, J. Comput. Anal. Appl., 24 (2018), 1322–1333. [12] W. Nazeer, M. Munir, A. R. Nizami, S. Kausar and S. M. Kang, Non-convex hybrid algorithms for a family of countable quasi-lipschitz mappings corresponding to Khan iterative process and applications, J. Appl. Math. Inform., 35 (2017), 313–321. [13] H. K. Xu, M. A. Alghamdi and N. Shahzad, The viscosity technique for the implicit mid point rule of nonexpansive mappings in Hilbert spaces, Fixed point Theory Appl., 41 (2015), 12 pages. [14] Ke, Y., & Ma, C. (2015). The generalized viscosity implicit rules of nonexpansive mappings in Hilbert spaces. Fixed Point Theory and Applications, 2015(1), 190. [15] Tian, M. Zarepisheh, X. Jia and S. B. Jiang, The fixed-point iteration method for IMRT optimization with truncated dose deposition coefficient matrix, arXiv:1303.3504 [physics.med-ph], 2013, 16 pages.

1308

Muhammad Saeed Ahmad ET AL 1302-1308

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

BEST PROXIMITY POINTS INVOLVING F -CONTRACTION ON A CLOSED BALL AFTAB HUSSAIN AND CHOONKIL PARK∗ Abstract. In this paper, we introduce a new idea of best proximity point of F -contraction on a closed ball and obtain new theorems in a complete metric space. That is why this outcome becomes useful for contraction of a mapping on a closed ball instead of the whole space. At the same time, some comparative examples are constructed which establish the superiority of our results. Our results that have come into being give a proof of extension as well as substantial generalizations and improvements of several well known results in the existing comparable literature.

1. Introduction and preliminaries Let A and B be two nonempty subsets of a metric space (X, d) and T : A → B. A point x ∈ A is said to be a fixed point of T provided that T x = x. A point x∗ ∈ A, where inf{d(x, T x∗ ) : x ∈ A} is attained, is a best approximation to T x∗ ∈ B in A. Such a point is called an approximate fixed point of T . Clearly, T (A) ∩ A 6= ∅ is a necessary but not sufficient condition for the existence of a fixed point of T . If T (A) ∩ A = ∅, then d(x, T x) > 0 for all x ∈ A and hence an operator equation T x = x does not admit a solution. In such situations, it is a reasonable demand to settle down with a point x∗ in A which is closest to T x∗ in B. Thus instead of having d(x∗ , T x∗ ) = 0, one finds a point x∗ in A such that d(x∗ , T x∗ ) ≤ d(x, T x∗ ) holds for all x in A. Such point is called a best approximate point of T or approximate fixed point of T. The study of conditions that assure existence and uniqueness of approximate fixed point of a mapping T is an active area of research. Suppose that d(A, B) = inf({d(a, b) : a ∈ A, b ∈ B}) is the measure of a distance between two sets A and B. A point x∗ is called a best proximity point of T if d(x∗ , T x∗ ) = d(A, B). Thus a best proximity point problem defined by a mapping T and a pair of sets (A, B) is to find a point x∗ in A such that d(x∗ , T x∗ ) = d(A, B). As d(x, T x) ≥ d(A, B) holds for all x ∈ A, so the global minimum of the mapping x → d(x, T x) is attained at a best proximity point. If we take A = B, then a best proximity point problem reduces to fixed point problem. From this perspective, best proximity point problem can be viewed as a natural generalization of fixed point problem. The aim of best proximity point theory is to study sufficient conditions that assure the existence of best proximity points of mappings satisfying certain contractive conditions on its domain equipped with some distance structure. For more results in this direction, we refer to [1, 2, 4, 5, 6, 7, 9, 20] and references therein. Fixed point results of mappings satisfying certain contractive conditions on the entire domain have been at the centre of rigorous research activity and it has a wide range of applications in 2010 Mathematics Subject Classification. Primary 46S40; 47H10; 54H25. Key words and phrases. best proximity point; non-self-mapping; α-proximal F -contraction; closed ball. ∗ Corresponding author.

1309

AFTAB HUSSAIN ET AL 1309-1315

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A. HUSSAIN AND C. PARK

different areas such as nonlinear and adaptive control systems, and parameterized estimation problems, fractal image decoding, computing magnetostatic fields in a nonlinear medium and convergence of recurrent networks. From the application point of view, the situation is not yet completely satisfactory because it frequently happens that a mapping T is a contraction not on the entire space X. Arshad et al. [3] established fixed point results of a pair of contractive dominated mappings on a closed ball in an ordered complete dislocated metric space. Hussain et al. [10] introduced the concept of an α-admissible mappings with respect to η and modified (α, ψ)-contractive condition for a pair of mappings and established common fixed point results of four mappings on a closed ball in complete dislocated metric space. Jleli et al. [12] obtained best proximity point results of (α, ψ)-proximal contractive type mappings in complete metric space. For more work in this direction, we refer to [11, 14, 16, 17, 18, 19]. In this paper, we obtain best proximity point results of α-η-proximal F -contractive mappings on a closed ball in complete metric spaces. Our results extend, unify and generalize various comparable results in [5, 6, 12]. In the sequel, the letter N will denote the set of all natural numbers. The following definitions, notations and results will also be needed in the sequel. Let (X, d) be a metric space and A and B be nonempty subsets of X. For x0 ∈ X and ε > 0, the set B(x0 , ε) = {y ∈ X : d(x0 , y) ≤ ε} is a closed ball in X. In 2012, Wardowski [21] introduced a concept of F -contraction as follows: Definition 1. [21] Let (X, d) be a metric space. A self mapping T is said to be an F -contraction if there exists τ > 0 such that ∀x, y ∈ X, d(T x, T y) > 0 ⇒ τ + F (d(T x, T y)) ≤ F (d(x, y)) , where F : R+ → R is a mapping satisfying the following conditions: (F1) F is strictly increasing, i.e., for all x, y ∈ R+ such that x < y, F (x) < F (y); (F2) For each sequence {αn }∞ n=1 of positive numbers, limn→∞ αn = 0 if and only if limn→∞ F (αn ) = −∞; (F3) There exists κ ∈ (0, 1) such that lim α → 0+ αk F (α) = 0. We denote by ∆F the set of all functions satisfying the conditions (F1)-(F3). Suppose that A0 : = {a ∈ A : d(a, b) = d(A, B) for some b ∈ B} , B0 : = {b ∈ B : d(a, b) = d(A, B) for some a ∈ A} , and CB(B) is the set of all nonempty closed and bounded subsets of B. A point x ∈ X is said to be a best proximity point of T : A → CB(B) if d(x, T x) = dist(A, B). The set B is said to be approximatively compact with respect to the set A if each {vn } in B with d(x, vn ) → d(x, B) for some x in A has a convergent subsequence [8]. Definition 2. Let α, η : A × A → [0, ∞). A mapping T : A → B is (α-η)-proximal admissible if for any x1 , x2 , u1 , u2 ∈ A,   α(x1 , x2 ) ≥ η(x1 , x2 ) 

d(u1 , T x1 ) = d(A, B) d(u2 , T x2 ) = d(A, B)

imply that α(u1 , u2 ) ≥ η(u1 , u2 ),

1310

AFTAB HUSSAIN ET AL 1309-1315

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

BEST PROXIMITY POINTS INVOLVING F -CONTRACTION

Note that if A = B and T is (α-η)-proximal admissible then T is α-admissible with respect to η. Definition 3. [13] A mapping T : A → CB(B) is said to be an αF - proximal contraction of Ciric type if there exist two functions α : A × A → [0, ∞), F ∈ ∆F and τ > 0 such that for each x1 , x2 , u1 , u2 ∈ A and v1 ∈ T x1 , v2 ∈ T x2 with α(x1 , x2 ) ≥ 1 and d(u1 , v1 ) = dist(A, B) = d(u2 , v2 ) we have α(u1 , u2 ) ≥ 1 and τ + F (d(u1 , u2 )) ≤ F (M (x1 , x2 )) , whenever min {d(u1 , u2 ), M (x1 , x2 )} > 0, where d(x1 , u2 ) + d(x2 , u1 ) . M (x1 , x2 ) = max d(x1 , x2 ), d(x1 , u1 ), d(x2 , u2 ), 2 



Definition 4. A mapping T : A → CB(B) is said to be an α-η-proximal F -contraction of Ciric type on a closed ball if there exist two functions α : A × A → [0, ∞), F ∈ ∆F and r > 0, τ > 0 such that for each x1 , x2 , u1 , u2 ∈ A and v1 ∈ T x1 , v2 ∈ T x2 with α(x1 , x2 ) ≥ η(x1 , x2 ) and d(u1 , v1 ) = dist(A, B) = d(u2 , v2 ) we have α(u1 , u2 ) ≥ η(u1 , u2 ) and τ + F (d(u1 , u2 )) ≤ F (kM (x1 , x2 ))

(1.1)

for all x1 , x2 ∈ Y = B(x1 , r) and d(x1 , T x1 ) < (1 − k)r, where 0 ≤ k < 1,

(1.2)

whenever min {d(u1 , u2 ), M (x1 , x2 )} > 0, where d(x1 , u2 ) + d(x2 , u1 ) M (x1 , x2 ) = max d(x1 , x2 ), d(x1 , u1 ), d(x2 , u2 ), . 2 



2. Main results We start with the following result. Theorem 5. Let A and B be nonempty closed subsets of a complete metric space (X, d). Assume that A0 is nonempty and T : A → CB(B) is an α-η-proximal F -contraction of Ciric type mapping on a closed ball satisfying the following assertion: (i) for each x ∈ A0 , we have T x ⊆ B0 ; (ii) there exist x1 , x2 ∈ A0 and v1 ∈ T x1 such that α(x1 , x2 ) ≥ η(x1 , x2 ) and d(x2 , v1 ) = dist(A, B); (iii) T is continuous; (iv) B is approximatively compact with respect to A. Then there exists an element x∗ ∈ B(x0 , r) such that d (x∗ , T x∗ ) = dist(A, B). Proof. From (ii), there exist x1 , x2 in A0 and v1 ∈ T x1 such that α(x1 , x2 ) ≥ η(x1 , x2 ) and d(x2 , v1 ) = dist(A, B). Since v2 ∈ T x2 ⊆ B0 , there exists x3 ∈ A0 satisfying d(x3 , v2 ) = dist(A, B). From (1.1), we have α(x2 , x3 ) ≥ η(x2 , x3 ) and 



τ + F (d(x2 , x3 )) ≤ F k max d(x1 , x2 ), d(x1 , x2 ), d(x2 , x3 ),

d(x1 , x3 ) + d(x2 , x2 ) 2



≤ F (k max {d(x1 , x2 ), d(x2 , x3 )}) = F (kd(x1 , x2 )) .

(2.1)

1311

AFTAB HUSSAIN ET AL 1309-1315

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A. HUSSAIN AND C. PARK

Otherwise we have a contradiction. From above we get x2 , x3 ∈ A0 and v2 ∈ T x2 satisfying α(x2 , x3 ) ≥ η(x2 , x3 ) and d(x3 , v2 ) = dist(A, B). Since v3 ∈ T x3 ⊆ B0 , there exists x4 ∈ A0 satisfying d(x4 , v3 ) = dist(A, B). From (1.1), we can obtain α(x3 , x4 ) ≥ η(x3 , x4 ) and 



τ + F (d(x3 , x4 )) ≤ F k max d(x2 , x3 ), d(x2 , x3 ), d(x3 , x4 ),

d(x2 , x4 ) + d(x3 , x3 ) 2



≤ F (k max {d(x2 , x3 ), d(x3 , x4 )}) = F (kd(x2 , x3 )) .

(2.2)

Otherwise we have a contradiction. From (2.1) and (2.2), we have 



τ + F (d(x3 , x4 )) ≤ F k 2 d(x1 , x2 ) − 2τ. Continuing this way, we can obtain a sequence {xn } in A0 and v3 in B0 such that vn ∈ T xn , α(xn , xn+1 ) ≥ η(xn , xn+1 ), d(xn+1 , vn ) = dist(A, B) and it satisfies F (d(xn , xn+1 )) ≤ F (k n d(x1 , x2 )) − nτ for each n ∈ N \ {1}, which implies F (d(xn , xn+1 )) ≤ F (d(x1 , x2 )) − nτ for each n ∈ N \ {1}.

(2.3)

Now we show that xn ∈ B(x1 , r) for all n ∈ N. By (1.2), we have d(x1 , T x1 )) ≤ r and hence x1 ∈ B(x0 , r). Let x2 , · · · , xj ∈ B(x0 , r) for some j ∈ N. Note that α(xi−1 , xi ) ≥ η(xi−1 , xi−1 ) and T is an α-η-proximal F -contraction of Ciric type mapping on a closed ball. Since F is strictly increasing, d(x1 , xj+1 ) = d(x1 , x2 ) + d(x2 , x3 ) + d(x3 , x4 ) + ... + d(xj , xj+1 ) ≤ (1 − k)r + (1 − k)kr + (1 − k)k 2 r + ... + (1 − k)k j−1 r h

= (1 − k)r 1 + k + k 2 + · · · + k j−1

i

1 − kj = (1 − k)r ≤ r, (1 − k) 

which implies that xj+1 ∈ B(x1 , r) and hence xn ∈ B(x1 , r) for all n ∈ N \ {1}. From (2.3), we obtain limn→∞ F (d(xn , xn+1 )) = −∞. Since F ∈ ∆F , we have lim d(xn , xn+1 ) = 0.

(2.4)

n→∞

From (F 3), there exists K ∈ (0, 1) such that lim

n→∞





(d(xn , xn+1 ))K F (d(xn , xn+1 )) = 0.

(2.5)

From (2.3), for all n ∈ N, we obtain (d(xn , xn+1 ))K (F (d(xn , xn+1 )) − F (d(x0 , x1 ))) ≤ − (d(xn , xn+1 ))K nτ ≤ 0.

(2.6)

Using (2.4), (2.5) and letting n → ∞ in (2.6), we have lim

n→∞





n (d(xn , xn+1 ))K = 0.

(2.7)

By (2.7), there exists n1 ∈ N such that n (d(xn , xn+1 ))K ≤ 1 for all n ≥ n1 . So we get 1 d(xn , xn+1 ) ≤ 1 for all n ≥ n1 . nK

1312

(2.8)

AFTAB HUSSAIN ET AL 1309-1315

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

BEST PROXIMITY POINTS INVOLVING F -CONTRACTION

Now, m, n ∈ N such that m > n ≥ n1 . Then by the triangle inequality and from (2.8) we have d(xn , xm ) ≤ d(xn , xn+1 ) + d(xn+1 , xn+2 ) + d(xn+2 , xn+3 ) + ... + d(xm−1 , xm ) = ≤ The series

P∞

i=n

1 1

iK

m−1 X

d(xi , xi+1 ) ≤

i=n ∞ X

1

i=n

ik

∞ X

d(xi , xi+1 )

(2.9)

i=n 1

.

is convergent. By taking limit as n → ∞ in (2.9), we have limn,m→∞ d(xn , xm ) =

0. Hence {xn } is a Cauchy sequence in A. Since A is closed subset of a complete metric space, there exists x∗ in A and x∗ ∈ B(x1 , r) such that xn → x∗ as n → ∞. As d(xn+1 , vn ) = dist(A, B) we have limn→∞ d(x∗ , vn ) = dist(A, B). Since B is approximatively compact with respect to A, we get a subsequence {vnk } of {vn } with vnk ∈ T vnk that converges to v ∗ . Thus d(x∗ , v ∗ ) = lim d(xnk , vnk ) = dist(A, B). n→∞ v ∗ ∈ T x∗

By (iii), when T is continuous, we get and hence dist(A, B) ≤ d(x∗ , T x∗ ) ≤ d(x∗ , v ∗ ) = ∗ ∗ dist(A, B). Therefore, d(x , T x ) = dist(A, B).  In the following theorem, the assumption of continuity is replaced with the following suitable condition: (H) If {xn } is a sequence in A such that xn → x∗ ∈ A0 as n → ∞, and α(xn , xn+1 ) ≥ η(xn , xn+1 ) for all n, then we have α(xn , x∗ ) ≥ η(xn , x∗ ) for all n. Theorem 6. Let A and B be nonempty closed subsets of a complete metric space (X, d). Assume that A0 is nonempty and T : A → CB(B) is an α-η-proximal F -contraction of Ciric type mapping on a closed ball satisfying the following assertion: (i) for each x ∈ A0 , we have T x ⊆ B0 ; (ii) there exist x1 , x2 ∈ A0 and v1 ∈ T x1 such that α(x1 , x2 ) ≥ η(x1 , x2 ) and d(x2 , v1 ) = dist(A, B); (iii) (H) holds; (iv) B is approximatively compact with respect to A. Then there exists an element x∗ ∈ B(x0 , r) such that d (x∗ , T x∗ ) = dist(A, B). Proof. The proof follows from similar lines of Theorem 5. From the condition (H), assume that we have α(xn , x∗ ) ≥ η(xn , x∗ ) for all n ∈ N ∪ {1} and xn → x∗ ∈ B(x0 , r) as n → ∞. For each x∗ ∈ A0 , we have T x∗ ⊆ B0 . This implies that for z ∗ ∈ T x∗ , we have w∗ ∈ A0 such that d(w∗ , z ∗ ) = dist(A, B). Further note that d(xn+1 , vn ) = dist(A, B). We claim that d(w∗ , z ∗ ) = 0. On contrary assume that d(w∗ , z ∗ ) 6= 0. Now from (1.1), we get d(xn , w∗ ) + d(xn+1 , x∗ ) τ + F (d(xn+1 , w )) ≤ F k max d(xn , x ), d(xn , xn+1 ), d(x , w ), 2 Letting n → ∞, we obtain ∗













.

τ + F (d(x∗ , w∗ )) ≤ F (kd(x∗ , w∗ )) ≤ F (d(x∗ , w∗ )) .

1313

AFTAB HUSSAIN ET AL 1309-1315

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A. HUSSAIN AND C. PARK

This implies τ + F (d(x∗ , w∗ )) ≤ F (d(x∗ , w∗ )) , which is not possible. Hence d(x∗ , w∗ ) = 0. Thus we get dist(A, B) ≤ d(x∗ , T x∗ ) ≤ d(x∗ , z ∗ ) = dist(A, B) and hence d(x∗ , T x∗ ) = d(A, B).



If we take η(x, y) = 1 for all x, y ∈ X in Theorems 5 and 6, then we obtain the following results. Corollary 7. Let A and B be nonempty closed subsets of a complete metric space (X, d). Assume that A0 is nonempty and T : A → CB(B) is an αF -proximal F -contraction of Ciric type mapping on a closed ball satisfying the following assertion: (i) for each x ∈ A0 , we have T x ⊆ B0 ; (ii) there exist x1 , x2 ∈ A0 and v1 ∈ T x1 such that α(x1 , x2 ) ≥ 1 and d(x2 , v1 ) = dist(A, B); (iii) T is continuous; (iv) B is approximatively compact with respect to A. Then there exists an element x∗ ∈ B(x0 , r) such that d (x∗ , T x∗ ) = dist(A, B). Corollary 8. Let A and B be nonempty closed subsets of a complete metric space (X, d). Assume that A0 is nonempty and T : A → CB(B) is an αF -proximal F -contraction of Ciric type mapping on a closed ball satisfying the following assertion: (i) for each x ∈ A0 , we have T x ⊆ B0 ; (ii) there exist x1 , x2 ∈ A0 and v1 ∈ T x1 such that α(x1 , x2 ) ≥ η(x1 , x2 ) and d(x2 , v1 ) = dist(A, B); (iii) (H) holds; (iv) B is approximatively compact with respect to A. Then there exists an element x∗ ∈ B(x0 , r) such that d (x∗ , T x∗ ) = dist(A, B). Example 9. Let X = R×R be endowed with a metric d ((x1 , x2 ) , (y1 , y2 )) = |x1 − y1 |+|x2 − y2 | for each x, y ∈ B(x1 , r) ⊂ X. Define the mapping T : A → CB(B) by 

T (0, x) =

1, x3 , 1, x2 if x ≥ 0 (1, x) , 1, x2 otherwise, 



where A = {(0, x) : −1 ≤ x ≤ 1} and B = {(1, x) : −1 ≤ x ≤ 1}, and α, η : A × A → R+ 

α ((0, x), (0, y)) =

1 if x, y ∈ [0, 1] 0 otherwise.



and η((0, x), (0, y)) =

1 2

if x, y ∈ [0, 1] . 0 otherwise.

Take F (x) = ln x for each x ∈ R+ and τ = 32 . It is easy to see that T is an α-η-proximal F -contraction of Ciric type mapping on a closed ball. For each x ∈ A0 , we have T x ⊆ B0 . Also for x1 = (0, 12 ) ∈ A0 and v1 = (1, 14 ) ∈ T x1 , we have x2 = (0, 14 ) such that α(x1 , x2 ) ≥ η(x1 , x2 ) and d(x2 , v1 ) = dist(A, B).Moreover {xn } is a sequence in A such that xn → x ∈ A0 as n → ∞, and α(xn , xn+1 ) ≥ η(xn , xn+1 ) for all n, we have α(xn , x∗ ) ≥ η(xn , x∗ ) for all n. Further note that B is approximatively compact with respect to A. Therefore, all the conditions of Theorems 5 and 6 hold. Hence T has a best proximity point.

1314

AFTAB HUSSAIN ET AL 1309-1315

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

BEST PROXIMITY POINTS INVOLVING F -CONTRACTION

References [1] M. A. Al-Thagafi, N. Shahzad, Best proximity pairs and equilibrium pairs for Kakutani multimaps, Nonlinear Anal. 70 (2009), 1209–1216. [2] G.A. Anastassiou, I.K. Argyros, Approximating fixed points with applications in fractional calculus, J. Comput. Anal. Appl. 21 (2016), 1225–1242. [3] M. Arshad, A. Shoaib, I. Beg, Fixed point of a pair of contractive dominated mappings on a closed ball in an ordered complete dislocated metric space, Fixed Point Theory Appl. 2013, 2013:115. [4] C. D. Bari, T. Suzuki, C. Vetro, Best proximity points for cyclic Meir-Keeler contractions, Nonlinear Anal. 69 (2008), 3790–3794. [5] S. S. Basha, Extensions of Banach’s contraction principle, Numer. Funct. Anal. Optim. 31 (2010), 569–576. [6] S. S. Basha, Best proximity point theorems generalizing the contraction principle, Nonlinear Anal. 74 (2011), 5844–5850. [7] S. S. Basha, Best proximity point theorems: An exploration of a common solution to approximation and optimization problems, Appl. Math. Comput. 218 (2012), 9773–9780. [8] S. S. Basha, N. Shahzad, Best proximity point theorems for generalized proximal contractions, Fixed Point Theory Appl. 2012, 2012:42. [9] A. Batool, T. Kamran, S. Jang, C. Park, Generalized ϕ-weak contractive fuzzy mappings and related fixed point results on complete metric space, J. Comput. Anal. Appl. 21 (2016), 729–737. [10] N. Hussain, M. Arshad, A. Shoaib, Fahimuddin, Common fixed point results for α-ψ-contractions on a metric space endowed with graph, J. Inequal. Appl. 2014, 2014:136. [11] M. Jleli, E. Karapinar, B. Samet, A short note on the equivalence between best proximity points and fixed point results, J. Inequal. Appl. 2014, 2014:246. [12] M. Jleli, B. Samet, Best proximity points for α-ψ-proximal contractive type mappings and applications, Bull. Sci. Math. 137 (2013), 977–995. [13] T. Kamran, M. U. Ali, M. Postolache, A. Ghiura, M. Farheen, Best proximity points for a new class of generalized proximal mappings, Int. J. Anal. Appl. 13 (2017), 198-205. [14] J. B. Prolla, Fixed point theorems for set valued mappings and existence of best approximations, Numer. Funct. Anal. Optim. 5 (1982), 449–455. [15] V. S. Raj, A best proximity point theorem for weakly contractive non-self-mappings, Nonlinear Anal. 74 (2011), 4804–4808. [16] S. Reich, Approximate Selections, best approximations, fixed points and invariant sets, J. Math. Anal. Appl. 62 (1978), 104–113. [17] V. M. Sehgal, S. P. Singh, A generalization to multifunctions of Fan’s best approximation theorem, Proc. Amer. Math. Soc. 102 (1988), 534–537. [18] V. M. Sehgal, S. P. Singh, A theorem on best approximations, Numer. Funct. Anal. Optim. 10 (1989), 181–184. [19] V. Vetrivel, P. Veeramani, P. Bhattacharyya, Some extensions of Fan’s best approximation theorem, Numer. Funct. Anal. Optim. 13 (1992), 397–402. [20] C. Vetro, Best proximity points: convergence and existence theorems for p-cyclic mappings, Nonlinear Anal. 73 (2010), 2283–2291. [21] D. Wardowski, Fixed point theory of a new type of contractive mappings in complete metric spaces. Fixed Point Theory Appl. 2012, 2012:94. Aftab Hussain Department of Basic Sciences & Humanities, Khwaja Fareed University of Engineering & Information Technology, Abu Dhabi Road, Rahim Yar Khan- 64200, Pakistan E-mail address: [email protected]; [email protected] Choonkil Park Research Institute for Natural Sciences, Hanyang University, Seoul 04763, Korea E-mail address: [email protected]

1315

AFTAB HUSSAIN ET AL 1309-1315

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Asymptotic lines of a discrete Lotka-Volterra competition model Young-Hee Kima , Sang-Mok Choob,∗ a

Ingenium College of Liberal Arts-Mathematics, Kwangwoon University, Seoul 01897, Korea b Department of Mathematics, University of Ulsan, Ulsan 44610, Korea.

Abstract The Euler difference scheme for a two-dimensional Lotka-Volterra competition model is considered. Recently, we have shown that the difference scheme has positive and bounded solutions, and that the solutions of the scheme converge to the equilibrium points under some sufficient conditions. In this paper, we find asymptotic lines of the solutions of the Euler discrete scheme in two categories of partitions of domain. We present sufficient conditions under which the line between the two equilibrium points of the scheme is the asymptotic line of the solutions of the scheme in each category. Numerical examples are given to verify the results. Keywords: Euler difference scheme, competition model, asymptotic line

1. Introduction The two-dimensional Lokta-Volterra competition model is given by dx dy = x(t)(r1 − a11 x(t) − a12 y(t)), = y(t)(r2 − a21 x(t) − a22 y(t)), dt dt

(1)

where ri > 0 and aij > 0. Here x(t) and y(t) denote the population sizes or population density in two species x and y at time t, which are competing for a common resource. The parameters ri are the intrinsic growth rates and aii (i = 1, 2) measure the inhibiting effect on the two species x and y, respectively, where a12 and a21 are the interspecific acting coefficients. The dynamics of the model (1) is well-known [1–4]. Many reseachers have studied the Lokta-Volterra models; the solutions of (1) are positive and bounded, and the system (1) is stable. There are a number of works on investigating continuous time models [5–10]. But relatively few theoretical papers are published on their discretized models [11–14]. Recently, we have studied the global stability of the discrete-time Lokta-Volterra model. In [15], Choo has introduced a method to present global stability in the discrete Lokta-Volterra predator-prey model for the case that all species coexist at a unique equilibrium. In [16], we have shown the global stability of the Euler difference scheme for a three-dimensional predator-prey model using a new approach. ∗

Corresponding author Email addresses: [email protected] (Young-Hee Kim), [email protected] (Sang-Mok Choo)

1316

Young-Hee Kim ET AL 1316-1329

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

In this paper, we consider the Euler difference scheme for the two-dimensional LoktaVolterra competition model given by xn+1 = xn {1 + f (xn , yn )∆t}, yn+1 = yn {1 + g(xn , yn )∆t},

(2)

f (x, y) = r1 − a11 x − a12 y, g(x, y) = r2 − a21 x − a22 y,

(3)

where and ∆t is a time step size, xn = x0 + n∆t and yn = y0 + n∆t with (x0 , y0 ) = (x(0), y(0)). In [17], we have shown the Euler difference scheme has positive and bounded solutions, and have presented sufficient conditions for the global stability of the fixed points of the discrete competition model with two species. The main idea of our approach has been to divide the domain used for the boundedness of solutions of the discrete model and to describe how to trace the trajectories with respect to each partition. We have obtained −1 the following global convergences to (0, r2 a−1 22 ) in Figure 1-(a) and (r1 a11 , 0) in Figure −1 1-(b). In the numerical results the line between the two points (0, r2 a−1 22 ) and (r1 a11 , 0) −1 −1 −1 looks like the asymptotic line in the two cases: one is r1 a11 < r2 a21 and r1 a12 < r2 a−1 22 −1 −1 −1 as in Figure 1-(a), and the other is r1 a−1 > r a and r a > r a as in Figure 1-(b). 2 1 2 11 21 12 22

Figure 1: Trajectories for different initial points. (a) r1 = 1, a11 = 1, a12 = 2, r2 = 3.5, a21 = 3, a22 = 2. (b) r1 = 1, a11 = 1, a12 = 1, r2 = 1.5, a21 = 3, a22 = 5. The box and circle symbols denote initial and equilibrium points, respectively.

Therefore the goal of this paper is to find some conditions under which the line between the two points plays a role as the boundary dividing the convergence region surrounded by the four lines f (x, y) = 0, g(x, y) = 0, x = 0 and y = 0. The paper is organized as follows. In Section 2, we give some conditions under which the solutions of (2) are positive and bounded, and converge to equilibrium points of (2) starting in the partitioned regions of the domain. In Section 3, we have sufficient conditions under which the line between the two equilibrium points of the scheme (2) is the asymptotic line of the solutions of the scheme. In Section 4, some numerical examples are presented to verify our results. 2. Positivity, boundedness and stability of the discrete solutions For the positivity and boundedness of the solutions (xn , yn ) of (2), we assume ∆t < 1/ max{r1 , r2 }

1317

(4)

Young-Hee Kim ET AL 1316-1329

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

and consider constants x∗ and y ∗ such that ∗ ∗ −1 ∗ ∗ r1 a−1 11 ≤ x ≤ U1 (y ), r2 a22 ≤ y ≤ U2 (x ),

(5)

where

1 + r1 ∆t − a12 τ2 ∆t 1 + r2 ∆t − a21 τ1 ∆t , U2 (τ1 ) = . (6) 2a11 ∆t 2a22 ∆t Then we have the positivity and boundedness of (xn , yn ) using x∗ and y ∗ in (5) as follows (see [17]). U1 (τ2 ) =

Theorem 1. Let (xn , yn ) be the solution of (2). Assume that (4) and (5) hold. If (x0 , y0 ) ∈ (0, x∗ ) × (0, y ∗ ), then (xn , yn ) ∈ (0, x∗ ) × (0, y ∗ ) for all n. Let D = (0, x∗ ) × (0, y ∗ ) for x∗ and y ∗ defined in (5). To discuss the stability of the Euler difference scheme (2) for each initial position (x0 , y0 ) contained in D, we partition D by two lines f (x, y) = 0 and g(x, y) = 0 into the four regions I = {x ∈ D | f (x) ≥ 0, g(x) > 0}, II = {x ∈ D | f (x) < 0, g(x) ≥ 0}, III = {x ∈ D | f (x) ≤ 0, g(x) < 0}, IV = {x ∈ D | f (x) > 0, g(x) ≤ 0},

(7)

where x = (x, y), and f (x, y) and g(x, y) are given in (3). Since the location of the regions depends on the x and y-intercepts of the two lines, there are four categories Ci (1 ≤ i ≤ 4) of partition in D as in Figure 2; we use the −1 −1 −1 symbol C1 for the two conditions r1 a−1 11 < r2 a21 and r1 a12 < r2 a22 , the symbol C2 for −1 −1 −1 −1 −1 −1 −1 r1 a−1 11 > r2 a21 and r1 a12 > r2 a22 , the symbol C3 for r1 a11 > r2 a21 and r1 a12 < r2 a22 , −1 −1 −1 and finally the symbol C4 for r1 a−1 11 < r2 a21 and r1 a12 > r2 a22 . The magenta circles in Figure 2 denote the stable points of the difference model (2) in the categories. (a)

(b) f =0 g =0

1.5

f =0 g =0 1

y

y

1

III

III

II

0.5

0.5

IV

I 0

0

0.5

1

x

0

1.5

(c)

I 0

0.5

1

x

1.5

(d) f =0 g =0

1.5

f =0 g =0 1

y

y

II

1

IV

III

III

0.5 0.5

I 0

0

I

IV 0.5

x

1

0

1.5

0

II 0.5

x

1

1.5

Figure 2: Two lines f = 0 and g = 0 and regions with stable points. The values of the parameters are (a) r2 = 3.5, a21 = 3.0, a22 = 2 in the category C1 . (b) r2 = 1.5, a21 = 3, a22 = 5 in the category C2 . (c) r2 = 1.7, a21 = 3, a22 = 1 in the category C3 . (d) r2 = 3.5, a21 = 2.5, a22 = 5 in the category C4 .

For the stability we assume 1 > ∆t (a11 x∗ + a22 y ∗ + x∗ y ∗ |a12 a21 − a11 a22 |∆t) .

(8)

Then we have the following lemma (see [17]).

1318

Young-Hee Kim ET AL 1316-1329

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Lemma 1. Let (xn , yn ) be the solution of (2). Assume that (4), (5) and (8) hold. Then we have (i) (ii) (iii) (iv)

If If If If

(xk , yk ) ∈ I for some k, then (xk+1 , yk+1 ) is not contained in III. (xk , yk ) ∈ III for some k, then (xk+1 , yk+1 ) is not contained in I. (xk , yk ) ∈ II for some k, then (xn , yn ) ∈ II for all n ≥ k. (xk , yk ) ∈ IV for some k, then (xn , yn ) ∈ IV for all n ≥ k.

In the following theorem, we have the global stability of the solutions of (2) for the category C1 and C2 as in Figure 2-(a) and Figure 2-(b), respectively (see [17]). Theorem 2. Let (xn , yn ) be the solution of (2). Assume that (4), (5) and (8) hold. Then we have  −1 −1 −1 −1 (i) If r1 a−1 11 < r2 a21 and r1 a12 < r2 a22 , then 0, r2 a22  is globally stable. −1 −1 −1 −1 (ii) If r1 a−1 11 > r2 a21 and r1 a12 > r2 a22 , then r1 a11 , 0 is globally stable. Remark 1. Under the same conditions as in Theorem 2, we have the convergence of −1 the solutions (xn , yn ) of (2) for the category C3 as in Figure 2-(c). If r1 a−1 11 > r2 a21 −1 −1 −1 and r1 a−1 12 < r2 a22 , then the solutions converge with the limit (r1 a11 , 0) or (0, r2 a22 ). We have the global stability of the solutions for the category C4 as in Figure 2-(d) where each component of the equilibrium point is positive. If a11 a22 − a12 a21 6= 0, −1 −1 −1 r1 a−1 11 < r2 a21 and r1 a12 > r2 a22 , then (θ1 , θ2 ) is globally stable, where (θ1 , θ2 ) = −1 (a11 a22 − a12 a21 ) (r1 a22 − r2 a12 , −r1 a21 + r2 a11 ) with f (θ1 , θ2 ) = g(θ1 , θ2 ) = 0. See [17] in detail. Remark 2. Using the results in this section, we present the asymptotic lines of the discrete solutions in C1 and C2 in the next section. In the case of C3 and C4 , the corresponding asymptotic lines will be treated in the future work. 3. Asymptotic lines of the discrete solutions in C1 and C2 In this section, we give sufficient conditions under which the line between the two equilibrium points of the scheme (2) is the asymptotic line of the solutions of the scheme in the two categories C1 and C2 . First, we consider the category C1 as in Figure 1-(a), which is the case −1 −1 −1 r1 a−1 11 < r2 a21 , r1 a12 < r2 a22 .

(9)

By Theorem 2, (0, r2 a−1 22 ) is the unique equibrium point in this case. −1 Denote the line between the two points (r1 a−1 11 , 0) and (0, r2 a22 ) as h(x, y) = 0, where h(x, y) = r1 r2 − r2 a11 x − r1 a22 y.

(10)

The condition that (xk , yk ) is located between two lines h(x, y) = 0 and g(x, y) = 0 is equivalent that r1 r2 − r2 a11 xk − r1 a22 yk < 0 (11) and r2 − a21 xk − a22 yk > 0.

(12)

The equation (12) implies (xk , yk ) ∈ II, which gives (xk+1 , yk+1 ) ∈ II due to Lemma 1-(iii). Therefore r2 − a21 xk+1 − a22 yk+1 > 0. In this case, we have the following lemma.

1319

Young-Hee Kim ET AL 1316-1329

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Lemma 2. Assume that for some αk > 0 r1 r2 − r2 a11 xk − r1 a22 yk = −αk2 < 0.

(13)

Then we have  1  r1 r2 − r2 a11 xk+1 − r1 a22 yk+1 = αk2 {−1 + ∆t αk2 + p(xk ) } r1 (14) r2  {r1 a22 (a11 − a21 ) − r2 a11 (a12 − a22 )}(xk a11 − r1 ), + xk ∆t r1 a22 where  r2 a11 a12 2r2 a11 p(x) = − + a21 x + r2 . (15) r1 a22 r1 Proof. We have from (2) and (3) that r1 r2 − r2 a11 xk+1 − r1 a22 yk+1 = r1 r2 − r2 a11 xk − r1 a22 yk − r2 a11 xk ∆t(r1 − a11 xk − a12 yk ) − r1 a22 yk ∆t(r2 − a21 xk − a22 yk ).

(16)

Then, by (13) and (15), we have from (16) that r1 r2 − r2 a11 xk+1 − r1 a22 yk+1 r1 r2 − r2 a11 xk + αk2  r1 a22 −r2 a11 xk + αk2  − (r1 r2 − r2 a11 xk + αk2 )∆t − a21 xk − r1  1 a 1 12 = αk4 (∆t ) + αk2 {−1 − r2 a11 xk ∆t − − (r1 r2 − r2 a11 xk ) · − ∆t r1 r2 a22 r1 r2 a11 xk r r − r 1 2 2 a11 xk  − ∆t(−a21 xk + )} + αk0 {−r2 a11 xk ∆t r1 − a11 xk − a12 r1 r1 a22 r2 a11 xk )} − (r1 r2 − r2 a11 xk )∆t(−a21 xk + r1  1  = αk2 {−1 + ∆t αk2 + p(xk ) } + G(xk ). r1 = −αk2 − r2 a11 xk ∆t r1 − a11 xk − a12

(17)

Here the last term in (17) is r1 r2 − r2 a11 xk  r1 a22 r2 a11 xk  − (r1 r2 − r2 a11 xk )∆t − a21 xk + r1 r2 a11 a12 r2 a11  2 = xk {(−r2 a11 )∆t − a11 + ) − (−r2 a11 )∆t(−a21 + } r1 a22 r1 r2 a12  r2 a11  + xk {−r2 a11 ∆t r1 − − (r1 r2 )∆t − a21 + } a22 r1 1 a11  + r2 a11 ∆t (−r1 a21 + a11 r2 )} = x2k {(−r2 a11 )∆t r1 a22 r1 r2 a11  − xk ∆t {a11 (r1 a22 − r2 a12 ) + a22 (−r1 a21 + r2 a11 )} a22 r2  = xk ∆t {r1 a22 (a11 − a21 ) − r2 a11 (a12 − a22 )}(xk a11 − r1 ). r1 a22 Hence we obtain the result. G(xk ) = − r2 a11 xk ∆t r1 − a11 xk − a12

1320

(18)

Young-Hee Kim ET AL 1316-1329

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

In the following lemma, we consider the case that the point (xk , yk ) is located between two lines h(x, y) = 0 and f (x, y) = 0. It is equivalent to the case that (xk , yk ) satisfies r1 r2 − r2 a11 xk − r1 a22 yk > 0

(19)

r1 − a11 xk − a12 yk < 0.

(20)

and The equation (19) and (20) implie (xk , yk ) ∈ II, which gives (xk+1 , yk+1 ) ∈ II due to Lemma 1-(iii). Therefore r1 − a11 xk+1 − a12 yk+1 < 0. We have the following result in this case. Lemma 3. Assume that for some αk > 0 r1 r2 − r2 a11 xk − r1 a22 yk = αk2 > 0.

(21)

Then we have r1 r2 − r2 a11 xk+1 − r1 a22 yk+1 = αk2 {1 + ∆t[αk2

1 + q(xk )]} r1

(22) r2 + xk ∆t( ){r1 a22 (a11 − a21 ) − r2 a11 (a12 − a22 )}(xk a11 − r1 ), r1 a22 where q(x) = −

 r2 a11 a12 + a21 x − r2 . r1 a22

(23)

Proof. By a similar way in the proof of Lemma 2, we have from (16), (21), (23) and (18) that r1 r2 − r2 a11 xk+1 − r1 a22 yk+1 r1 r2 − r2 a11 xk − αk2  r1 a22 r2 a11 xk + αk2  − (r1 r2 − r2 a11 xk − αk2 )∆t − a21 xk + r1   1 1 a12 = αk4 ∆t − αk2 {−1 − r2 a11 xk ∆t − − (r1 r2 − r2 a11 xk ) · − ∆t (24) r1 r2 a22 r1 r2 a11 xk  r1 r2 − r2 a11 xk  − ∆t − a21 xk + } + αk0 {−r2 a11 xk ∆t r1 − a11 xk − a12 r1 r1 a22 r2 a11 xk  − (r1 r2 − r2 a11 xk )∆t − a21 xk + } r1  1  = αk2 {1 + ∆t αk2 + q(xk ) } + G(xk ). r1

= αk2 − r2 a11 xk ∆t r1 − a11 xk − a12

Hence we obtain the result. Since the solution (xk , yk ) of (2) and αk2 = |r1 r2 −r2 a11 xk −r1 a22 yk | in (13) and (21) are bounded by Theorem 1, it is possible to take ∆t so small, which satisfies the inequalities ∆t{αk2

1 1 + p(xk )} < 1, 1 + ∆t{αk2 + q(xk )} > 0. r1 r1

1321

(25)

Young-Hee Kim ET AL 1316-1329

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

We divide the region II based on the two lines h(x, y) = 0 and x = r1 a−1 11 , and then the region is partitioned into three parts II0 , IIu and IId (see Figure 3). II0 is the region with the three boundaries g(x, y) = 0, y = 0 and x = r1 a−1 11 . u II is the region with the three boundaries g(x, y) = 0, h(x, y) = 0 and x = r1 a−1 11 . IId is the region with the three boundaries f (x, y) = 0, h(x, y) = 0 and x = 0. In the following theorems, we have the results that if the solution (xn , yn ) of (2) starts at IIu or IId , it remains in the same region. Theorem 3. Let the conditions (4), (5), (8) and (25) hold. Let (xn , yn ) be the solution −1 −1 −1 of (2) with r1 a−1 11 < r2 a21 , r1 a12 < r2 a22 and r1 a22 (a11 − a21 ) − r2 a11 (a12 − a22 ) ≥ 0.

(26)

If for some k (xk , yk ) ∈ IIu , then for all i ≥ k (xi , yi ) ∈ IIu , where IIu is the the region with the three boundaries g(x, y) = 0, h(x, y) = 0 and x = r1 a−1 11 . Proof. Since xn > 0 and yn > 0 for all n in Theorem 1, g(x, y) = r2 − a21 x − a22 y and h(x, y) = r1 r2 − r2 a11 x − r1 a22 y, the inclusion (xk , yk ) ∈ IIu is equivalent to r2 − a21 xk − a22 yk > 0, r1 r2 − r2 a11 xk − r1 a22 yk < 0. Then it is enough to show that for all i ≥ k r2 − a21 xi − a22 yi > 0, r1 r2 − r2 a11 xi − r1 a22 yi < 0.

(27) (28)

Note that due to Lemma 1-(iii) if (xk , yk ) ∈ II, then (xi , yi ) ∈ II for all i ≥ k.

(29)

Since (xk , yk ) ∈ IIu and IIu ⊂ II, we have (xi , yi ) ∈ II for all i ≥ k due to (29), so that the definition of II yields the inequality (27). Now it remains to show the inequality (28), which can be proved using the equality (14) in Lemma 2: r1 r2 − r2 a11 xk+1 − r1 a22 yk+1 = αk2 {−1 + ∆t[αk2

1 + p(xk )]} r1

(30) r2 + xk ∆t( ){r1 a22 (a11 − a21 ) − r2 a11 (a12 − a22 )}(xk a11 − r1 ), r1 a22 where p(x) =

 r2 a11 a12 2r2 a11 − + a21 x + r2 r1 a22 r1

1322

Young-Hee Kim ET AL 1316-1329

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

and αk2 = −(r1 r2 − r2 a11 xk − r1 a22 yk ) > 0 due to r1 r2 −r2 a11 xk −r1 a22 yk < 0. Applying both (25) and (26) into (30) with xi < r1 a−1 11 for all i ≥ k obtained from (29), we have that r1 r2 − r2 a11 xk+1 − r1 a22 yk+1 < 0. Using mathematical induction, we can obtain the desired result. Theorem 4. Let the conditions (4), (5), (8) and (25) hold. Let (xn , yn ) be the solution −1 −1 −1 of (2) with r1 a−1 11 < r2 a21 , r1 a12 < r2 a22 and r1 a22 (a11 − a21 ) − r2 a11 (a12 − a22 ) ≤ 0.

(31)

If for some k (xk , yk ) ∈ IId , then for all i ≥ k (xi , yi ) ∈ IId , where IId is the the region with the three boundaries f (x, y) = 0, h(x, y) = 0 and x = 0. Proof. Since xn > 0 and yn > 0 for all n in Theorem 1, f (x, y) = r1 − a11 x − a12 y and h(x, y) = r1 r2 − r2 a11 x − r1 a22 y, the inclusion (xk , yk ) ∈ IId is equivalent to r1 − a11 xk − a12 yk < 0, r1 r2 − r2 a11 xk − r1 a22 yk > 0. Then it is enough to show that for all i ≥ k r1 − a11 xi − a12 yi < 0, r1 r2 − r2 a11 xi − r1 a22 yi > 0.

(32) (33)

Since (xk , yk ) ∈ IId and IId ⊂ II, we have (xi , yi ) ∈ II for all i ≥ k due to (29), so that the definition of II yields the inequality (32). Now it remains to show the inequality (33), which can be proved using the equality (22) in Lemma 3: r1 r2 − r2 a11 xk+1 − r1 a22 yk+1 = αk2 {1 + ∆t[αk2 + xk ∆t(

1 + q(xk )]} r1

(34) r2 ){r1 a22 (a11 − a21 ) − r2 a11 (a12 − a22 )}(xk a11 − r1 ), r1 a22

where q(x) = −

 r2 a11 a12 + a21 x − r2 r1 a22

and αk2 = r1 r2 − r2 a11 xk − r1 a22 yk > 0 due to r1 r2 −r2 a11 xk −r1 a22 yk > 0. Applying both (25) and (31) into (34) with xi < r1 a−1 11 for all i ≥ k obtained from (29), we have that r1 r2 − r2 a11 xk+1 − r1 a22 yk+1 > 0. Using mathematical induction, we can obtain the desired result.

1323

Young-Hee Kim ET AL 1316-1329

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Remark 3. In C1 , we have from Theorem 3 that if r1 a22 (a11 − a21 ) − r2 a11 (a12 − a22 ) ≥ 0 in (3), then the sequence (xk , yk ) in IIu defined by (2) remains in IIu as follows: (i) If (xk , yk ) ∈ I ∪ III for some k, then there exists a positive integer l such that (xk+l , yk+l ) ∈ II. (ii) If (xk , yk ) ∈ II for some k, then (xk+i , yk+i ) ∈ II for all i ≥ 1 and limk→∞ (xk , yk ) = (0, r2 a−1 22 ) by Lemma 1-(iii) and Theorem 2-(i). (iii) By (ii), if (xk , yk ) ∈ II, then there exists a nonnegative integer l such that (xk+l , yk+l ) ∈ IIu ∪ IId . If there exists m such that (xk+l+m , yk+l+m ) ∈ IIu , then (xk+l+i , yk+l+i ) ∈IIu (i ≥ m) by Theorem 3. Otherwise, (xk+l+i , yk+l+i ) ∈ IId for all i ≥ 1. Also we have from Theorem 4 that if r1 a22 (a11 − a21 ) − r2 a11 (a12 − a22 ) ≤ 0 in (3), then the sequence (xk , yk ) in IId defined by (2) remains in IId . In the case of C2 , we divide the region IV into two parts IVu and IVd by the line h(x, y) = 0 (see Figure 4). IVu is the region with the three boundaries f (x, y) = 0, h(x, y) = 0 and x = 0. IVd is the region with the three boundaries g(x, y) = 0, h(x, y) = 0 and y = 0. In the following theorems, we have the result that if the solution (xn , yn ) of (2) starts at any part of IV, it remains in the same part. Theorem 5. Let the conditions (4), (5), (8) and (25) hold. Let (xn , yn ) be the solution −1 −1 −1 of (2) with r1 a−1 11 > r2 a21 , r1 a12 > r2 a22 and r1 a22 (a11 − a21 ) − r2 a11 (a12 − a22 ) ≥ 0.

(35)

If for some k (xk , yk ) ∈ IVu , then for all i ≥ k (xi , yi ) ∈ IVu , where IVu is the the region with the three boundaries f (x, y) = 0, h(x, y) = 0 and x = 0. Proof. Since xn > 0 and yn > 0 for all n in Theorem 1, f (x, y) = r1 − a11 x − a12 y and h(x, y) = r1 r2 − r2 a11 x − r1 a22 y, the inclusion (xk , yk ) ∈ IVu is equivalent to r1 − a11 xk − a12 yk > 0, r1 r2 − r2 a11 xk − r1 a22 yk < 0. Then it is enough to show that for all i ≥ k r1 − a11 xi − a12 yi > 0, r1 r2 − r2 a11 xi − r1 a22 yi < 0.

(36) (37)

Note that due to Lemma 1-(iv) if (xk , yk ) ∈ IV, then (xi , yi ) ∈ IV for all i ≥ k.

(38)

Since (xk , yk ) ∈ IVu and IVu ⊂ IV, we have (xi , yi ) ∈ IV for all i ≥ k due to (38), so that the definition of IV yields the inequality (36).

1324

Young-Hee Kim ET AL 1316-1329

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

As in the proof of Theorem 3, we use the equality (14) in Lemma 2 with αk2 > 0 to show the inequality (37). Applying both (25) and (35) into (14) with xi < r1 a−1 11 for all i ≥ k obtained from (38), we have that r1 r2 − r2 a11 xk+1 − r1 a22 yk+1 < 0. Using mathematical induction, we can obtain the desired result. Theorem 6. Let the conditions (4), (5), (8) and (25) hold. Let (xn , yn ) be the solution −1 −1 −1 of (2) with r1 a−1 11 > r2 a21 , r1 a12 > r2 a22 and r1 a22 (a11 − a21 ) − r2 a11 (a12 − a22 ) ≤ 0.

(39)

If for some k (xk , yk ) ∈ IVd , then for all i ≥ k (xi , yi ) ∈ IVd , where IVd is the the region with the three boundaries g(x, y) = 0, h(x, y) = 0 and y = 0. Proof. Since xn > 0 and yn > 0 for all n in Theorem 1, g(x, y) = r2 − a21 x − a22 y and h(x, y) = r1 r2 − r2 a11 x − r1 a22 y, the inclusion (xk , yk ) ∈ IVd is equivalent to r2 − a21 xk − a22 yk < 0, r1 r2 − r2 a11 xk − r1 a22 yk > 0. Then it is enough to show that for all i ≥ k r1 − a11 xi − a12 yi < 0, r1 r2 − r2 a11 xi − r1 a22 yi > 0.

(40) (41)

Since (xk , yk ) ∈ IVd and IVd ⊂ IV, we have (xi , yi ) ∈ IV for all i ≥ k due to (38), so that the definition of IV yields the inequality (40). As in the proof of Theorem 4, we use the equality (22) in Lemma 3 with αk2 > 0 to show the inequality (41). Applying both (25) and (39) into (22) with xi < r1 a−1 11 for all i ≥ k obtained from (38), we have that r1 r2 − r2 a11 xk+1 − r1 a22 yk+1 > 0. Using mathematical induction, we can obtain the desired result. Remark 4. We have similar results as Remark 3. In the case of C2 , we have from Theorem 5 that if r1 a22 (a11 − a21 ) − r2 a11 (a12 − a22 ) ≥ 0 in (3), then the sequence (xk , yk ) defined by (2) remains in IVu as follows: (i) If (xk , yk ) ∈ I ∪ III for some k, then there exists l such that(xk+l , yk+l ) ∈ IV. (ii) If (xk , yk ) ∈ IV for some k, then (xk+i , yk+i ) ∈ IV for all i ≥ 1 and limk→∞ (xk , yk ) = (r1 a−1 11 , 0) by Lemma 1-(iv) and Theorem 2-(ii). (iii) By (ii), if (xk , yk ) ∈ IV, then (xk , yk ) ∈ IVu ∪ IVd . If there exists m such that (xk+m , yk+m ) ∈ IVu , then (xk+i , yk+i ) ∈IVu (i ≥ m) by Theorem 5. Otherwise, (xk+i , yk+i ) ∈ IVd for all i ≥ 1. As a similar way, we have from Theorem 6 that if r1 a22 (a11 − a21 ) − r2 a11 (a12 − a22 ) ≤ 0 in (3), then the sequence (xk , yk ) in IVd defined by (2) remains in IVd .

1325

Young-Hee Kim ET AL 1316-1329

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4. Numerical examples In this section, we provide simulations that illustrate our results in Theorem 3−1 Theorem 6 for the difference scheme (2) with ∆t = 0.001 and (x∗ , y ∗ ) = (r1 a−1 11 +50, r2 a22 + 50). The values of parameters used in the following examples satisfy the conditions in (4), (5), (8) and (25). From the following examples, we verify the result that the line h(x, y) = r1 r2 − r2 a11 x − r1 a22 y = 0 is the asymptotic line of the solutions (xn , yn ) of (2). Example 1. Let (r1 , a11 , a12 , r2 , a21 , a22 ) = (1, 0.5, 1, 4, 1, 2), which satisfies the three −1 −1 −1 conditions r1 a−1 11 < r2 a21 , r1 a12 < r2 a22 and r1 a22 (a11 − a21 ) − r2 a11 (a12 − a22 ) = 1 > 0 in Theorem 3. Then the solutions (xn , yn ) of (2) converge to (0, r2 a−1 22 = 2) as displayed u u in Figure 3-(a). The sequence of the solutions in II remains in II . Example 2. Let (r1 , a11 , a12 , r2 , a21 , a22 ) = (1, 1, 1, 5, 4, 2), which satisfies the condi−1 −1 −1 tions r1 a−1 11 < r2 a21 , r1 a12 < r2 a22 and r1 a22 (a11 − a21 ) − r2 a11 (a12 − a22 ) = −1 < 0 in Theorem 4. Then the solutions (xn , yn ) of (2) converge to (0, r2 a−1 22 = 2.5) as displayed d d in Figure 3-(b). The sequence of the solutions in II remains in II .

Figure 3: Trajectories for different initial points in the regions I, II, III in the category C1 with (a) r1 = 1, a11 = 0.5, a12 = 1, r2 = 4, a21 = 1, a22 = 2. (b) r1 = 1, a11 = 1, a12 = 1, r2 = 5, a21 = 4, a22 = 2. The box and circle symbols denote initial and equilibrium points, respectively. The green line segment is x = r1 a−1 11 in the region II.

Example 3. Let (r1 , a11 , a12 , r2 , a21 , a22 ) = (3, 1, 1.5, 1, 0.5, 1), which satisfies the three −1 −1 −1 conditions r1 a−1 11 < r2 a21 , r1 a12 < r2 a22 and r1 a22 (a11 − a21 ) − r2 a11 (a12 − a22 ) = 1 > 0 in Theorem 5. Then the solutions (xn , yn ) of (2) converge to (r1 a−1 11 = 3, 0) as displayed in Figure 4-(a). The sequence of the solutions in IVu remains in IVu .

1326

Young-Hee Kim ET AL 1316-1329

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Example 4. Let (r1 , a11 , a12 , r2 , a21 , a22 ) = (4, 1, 2, 1, 1, 1), which satisfies the condi−1 −1 −1 tions r1 a−1 11 < r2 a21 , r1 a12 < r2 a22 and r1 a22 (a11 − a21 ) − r2 a11 (a12 − a22 ) = −1 < 0 in Theorem 6. Then the solutions (xn , yn ) of (2) converge to (r1 a−1 11 = 4, 0) as displayed in Figure 4-(b). The sequence of the solutions in IVd remains in IVd .

Figure 4: Trajectories for different initial points in the regions I, III, IV in the category C2 with (a) r1 = 3, a11 = 1, a12 = 1.5, r2 = 1, a21 = 0.5, a22 = 1, (b) r1 = 4, a11 = 1, a12 = 2, r2 = 1, a21 = 1, a22 = 1. The box and circle symbols denote initial and equilibrium points, respectively.

Example 5. Let (r1 , a11 , a12 , r2 , a21 , a22 ) = (1, 1, 1, 2.5, 1, 1), which satisfies the three −1 −1 −1 conditions r1 a−1 11 < r2 a21 , r1 a12 < r2 a22 and r1 a22 (a11 − a21 ) − r2 a11 (a12 − a22 ) = 0 in Theorem 3 and Theorem 4. Then the solutions (xn , yn ) of (2) converge to (0, r2 a−1 22 = 2.5) as displayed in Figure 5-(a). For the trajectory of the solutions from III to II, if (xk , yk ) in IIu , then (xk+i , yk+i ) ∈ for all i ≥ 0 remains in IIu . Also for the trajectory of the solutions (xk , yk ) from I to II, if (xk , yk ) in IId , then (xk+i , yk+i ) ∈ for all i ≥ 0 remains in IId . Therefore the line h(x, y) = 0 is the asymptotic line of the solutions. Example 6. Let (r1 , a11 , a12 , r2 , a21 , a22 ) = (2.5, 1, 1, 1, 1, 1), which satisfies the condi−1 −1 −1 tions r1 a−1 11 > r2 a21 , r1 a12 > r2 a22 and r1 a22 (a11 − a21 ) − r2 a11 (a12 − a22 ) = 0 in Theorem 5 and Theorem 6. Then the solutions (xn , yn ) of (2) converge to (r1 a−1 11 = 2.5, 0) as displayed in Figure 5-(b). For the trajectory of the solutions from III to IV, the sequence of the solutions in IVu does not cross the line h(x, y) = 0, which is the asymptotic line of the solutions. Also for the trajectory of the solutions (xn , yn ) from I to IV, the sequence of the solutions in IVd remains in IVd .

1327

Young-Hee Kim ET AL 1316-1329

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Figure 5: (a) Trajectories for different initial points in the regions I, II, III with r1 = 1, a11 = 1, a12 = 1, r2 = 2.5, a21 = 1, a22 = 1 in the category C1 . The green line segment is x = r1 a−1 11 in the region II. (b) Trajectories for different initial points in the regions I, III, IV with r1 = 2.5, a11 = 1, a12 = 1, r2 = 1, a21 = 1, a22 = 1 in the category C2 . The box and circle symbols denote initial and equilibrium points, respectively.

5. Conclusions In this paper, we have found sufficient conditions under which the line h(x, y) = 0 between the two equilibrium points of the scheme (2) is the asymptotic line of the solutions of the scheme in C1 and C2 , respectively. In these conditions, the line h(x, y) = 0 plays a role as the boundary dividing the convergence region surrounded by the four lines f (x, y) = 0, g(x, y) = 0, x = 0 and y = 0, and the sequence of the solutions of (2) starting in the partitioned regions of the domain does not cross the line h(x, y) = 0. Some numerical examples are presented to verify our results. We have obtained the results in the two categories C1 and C2 , but the methods used in this paper can be applied to find the asymptotic lines of the solutions of (2) in the other categories C3 and C4 , which will be shown in the future work. Acknowledgments The present research has been conducted by the Research Grant of Kwangwoon University in 2017. References [1] L.J.S. Allen, Introduction to mathematical biology, Pearson/Prentice Hall, 2007. [2] C.V. Pao, Nonlinear Parabolic and Elliptic Equations, Plenum Press, 1992. [3] M. Townsend, C.R. Begon and J.D. Harper, Ecology: individuals, populations and communities, 1996. [4] S. Ahmad, On the nonautonomous Volterra-Lotka competition equations, Proceedings of the Americal Mathematical Society, 117:199–204, 1993.

1328

Young-Hee Kim ET AL 1316-1329

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.7, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

[5] S. Ahmad and A.C. Lazer, Average conditions for global asymptotic stability in a nonautonomous Lotka-Volterra system, Nonlinear Analysis: Theory, Methods & Applications, 40:37–49, 2000. [6] S.B. Hsu and T.W. Huang. Global stability for a class of predator-prey systems. SIAM J. Appl. Math., 55(3):763–783, 1995. [7] S. Ruan and D. Xiao. Global analysis in a predator-prey system with nonmonotonic functional response. SIAM J. Appl. Math., 61(4):1445–1472, 2000. [8] Y. Saito, J. Sugie, Y.-H. Lee, Global asymptotic stability for predator-prey models with environmental time-variations, Applied Mathematics Letters, 24(12):1973-1980, 2011. [9] H.B. Xiao. Global analysis of ivlevs type predator-prey dynamic systems. Applied Mathematics and Mechanics, 28(4):461–470, 2007. [10] J. Zhao, J. Jiang, A.C. Lazer, The permanence and global attractivity in a nonautonomous Lotka-Volterra system, Nonlinear Analysis: Real World Applications, 5:265–276, 2004. [11] D. Blackmore, J. Chen, J. Perez, and M. Savescu, Dynamical properties of discrete lotka–volterra equations, Chaos, Solitons & Fractals, 12(13):2553–2568, 2001. [12] Q. Din, Dynamics of a discrete Lotka-Volterra model, Adv. Difference Equ., pages 2013:95, 13, 2013. [13] L.-I. Roeger and R. Gelca, Dynamical consistent discrete-time lokta-volterra competition models, Discrete Cont. Dyn. Sys., (Supplement 2009):650–658, 2009. [14] T. Wu, Dynamic behaviors of a discrete two species predator-prey system incorporating harvesting, Discrete Dyn. Nat. Soc., pages Art. ID 429076, 12, 2012. [15] S.M. Choo, Global stability in n-dimensional discrete Lotka-Volterra predator-prey models, Adv. Difference Equ., pages 2014:11, 17, 2014. [16] Y.-H. Kim and S.M. Choo, A new approach to global stability in discrete LotkaVolterra predator-prey models, Discrete Dyn. Nat. Soc., pages Art. ID 674027, 11, 2015. [17] S.M. Choo. and Y.-H. Kim, Global stability in a discrete Lotka-Volterra competition model, J. Comput. Anal. Appl., 23(2):276–293, 2017.

1329

Young-Hee Kim ET AL 1316-1329

1330

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO. 7, 2019

Shift and invert weighted Golub-Kahan-Lanczos bidiagonalization algorithm for linear response eigenproblem, Hong-xiu Zhong, Guo-liang Chen, and Wan-qiang Shen,……………………1169 Qualitative Study of Solution of Some Higher Order Difference Equations, E. M. Elsayed, K. N. Alshabi, and Faris Alzahrani,…………………………………………………………………1179 On some classes of nonlinear contractions in Fuzzy metric spaces, Dangdang Wang, Chuanxi Zhu, and Zhaoqi Wu,…………………………………………………………………………1192 On subclasses of analytic functions with fixed second coefficients, A. Y. Lashin and F.Z. ElEmam,…………………………………………………………………………………………1200 On strong convergence theorem of hybrid algorithm for a countable family of quasi-Lipschitz mappings, Muhammad Saeed Ahmad, Waqas Nazeer, Mobeen Munir, Shin Min Kang, and Samina Kausar,………………………………………………………………………………1208 Some common fixed point theorems in 𝜔𝜔-orbitally complete modular metric spaces via C-class functions and application, Bahman Moeini, Arslan Hojat Ansari, and Choonkil Park,……1217 Trapezoidal interval type-2 hesitant fuzzy sets associated with new operations, N. O. Alshehri and H. A. Alshehri,…………………………………………………………………………1229 Menger probabilistic normed Riesz spaces and stability of lattice preserving functional equation, Seyed Mohammad Sadegh Modarres Mosadegh, Ehsan Movahednia, Jung Rye Lee, and Choonkil Park,………………………………………………………………………………1244 Fourier series of sums of products of poly-Genocchi and poly-Bernoulli functions, Taekyun Kim, Dae San Kim, Dmitry V. Dolgy, and Jongkyum Kwon,……………………………………1258 Additive-quadratic 𝜌𝜌-functional equations in 𝛽𝛽-homogeneous F-spaces, Sungsik Yun,….1276

Differential subordination for analytic functions associated with leaf-like domains, S. Sivasubramanian, M. Govindaraj, G. Murugusundaramoorthy, and N. E. Cho,………….1286 On iterative approach to common fixed points of nonexpansive mappings in Hilbert spaces, Muhammad Saeed Ahmad, Waqas Nazeer, Shin Min Kang, Syeed Fakhar Abbas Naqvi,1302 Best proximity points involving F-contraction on a closed ball, Aftab Hussain and Choonkil Park,………………………………………………………………………………………1309

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO. 7, 2019 (continued)

Asymptotic lines of a discrete Lotka-Volterra competition model, Young-Hee Kim and SangMok Choo,…………………………………………………………………………………1316

Volume 26, Number 8 ISSN:1521-1398 PRINT,1572-9206 ONLINE

Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC

July 1st, 2019

Journal of Computational Analysis and Applications ISSNno.’s:1521-1398 PRINT,1572-9206 ONLINE SCOPE OF THE JOURNAL An international publication of Eudoxus Press, LLC (fifteen times annually) Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152-3240, U.S.A [email protected] http://www.msci.memphis.edu/~ganastss/jocaaa The main purpose of "J.Computational Analysis and Applications" is to publish high quality research articles from all subareas of Computational Mathematical Analysis and its many potential applications and connections to other areas of Mathematical Sciences. Any paper whose approach and proofs are computational,using methods from Mathematical Analysis in the broadest sense is suitable and welcome for consideration in our journal, except from Applied Numerical Analysis articles. Also plain word articles without formulas and proofs are excluded. The list of possibly connected mathematical areas with this publication includes, but is not restricted to: Applied Analysis, Applied Functional Analysis, Approximation Theory, Asymptotic Analysis, Difference Equations, Differential Equations, Partial Differential Equations, Fourier Analysis, Fractals, Fuzzy Sets, Harmonic Analysis, Inequalities, Integral Equations, Measure Theory, Moment Theory, Neural Networks, Numerical Functional Analysis, Potential Theory, Probability Theory, Real and Complex Analysis, Signal Analysis, Special Functions, Splines, Stochastic Analysis, Stochastic Processes, Summability, Tomography, Wavelets, any combination of the above, e.t.c. "J.Computational Analysis and Applications" is a peer-reviewed Journal. See the instructions for preparation and submission of articles to JoCAAA. Assistant to the Editor: Dr.Razvan Mezei,[email protected], Madison,WI,USA.

Journal of Computational Analysis and Applications(JoCAAA) is published by EUDOXUS PRESS,LLC,1424 Beaver Trail Drive,Cordova,TN38016,USA,[email protected] http://www.eudoxuspress.com. Annual Subscription Prices:For USA and Canada,Institutional:Print $800, Electronic OPEN ACCESS. Individual:Print $400. For any other part of the world add $160 more(handling and postages) to the above prices for Print. No credit card payments. Copyright©2019 by Eudoxus Press,LLC,all rights reserved.JoCAAA is printed in USA. JoCAAA is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH. It is strictly prohibited the reproduction and transmission of any part of JoCAAA and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes no responsibility for the content of published papers.

1334

Editorial Board Associate Editors of Journal of Computational Analysis and Applications Francesco Altomare Dipartimento di Matematica Universita' di Bari Via E.Orabona, 4 70125 Bari, ITALY Tel+39-080-5442690 office +39-080-3944046 home +39-080-5963612 Fax [email protected] Approximation Theory, Functional Analysis, Semigroups and Partial Differential Equations, Positive Operators.

Fractional Differential Equations Nonlinear Analysis, Fractional Dynamics Carlo Bardaro Dipartimento di Matematica e Informatica Universita di Perugia Via Vanvitelli 1 06123 Perugia, ITALY TEL+390755853822 +390755855034 FAX+390755855024 E-mail [email protected] Web site: http://www.unipg.it/~bardaro/ Functional Analysis and Approximation Theory, Signal Analysis, Measure Theory, Real Analysis.

Ravi P. Agarwal Department of Mathematics Texas A&M University - Kingsville 700 University Blvd. Kingsville, TX 78363-8202 tel: 361-593-2600 [email protected] Differential Equations, Difference Equations, Inequalities

Martin Bohner Department of Mathematics and Statistics, Missouri S&T Rolla, MO 65409-0020, USA [email protected] web.mst.edu/~bohner Difference equations, differential equations, dynamic equations on time scale, applications in economics, finance, biology.

George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis, TN 38152,U.S.A Tel.901-678-3144 e-mail: [email protected] Approximation Theory, Real Analysis, Wavelets, Neural Networks, Probability, Inequalities.

Jerry L. Bona Department of Mathematics The University of Illinois at Chicago 851 S. Morgan St. CS 249 Chicago, IL 60601 e-mail:[email protected] Partial Differential Equations, Fluid Dynamics

J. Marshall Ash Department of Mathematics De Paul University 2219 North Kenmore Ave. Chicago, IL 60614-3504 773-325-4216 e-mail: [email protected] Real and Harmonic Analysis

Luis A. Caffarelli Department of Mathematics The University of Texas at Austin Austin, Texas 78712-1082 512-471-3160 e-mail: [email protected] Partial Differential Equations George Cybenko Thayer School of Engineering

Dumitru Baleanu Department of Mathematics and Computer Sciences, Cankaya University, Faculty of Art and Sciences, 06530 Balgat, Ankara, Turkey, [email protected]

1335

Dartmouth College 8000 Cummings Hall, Hanover, NH 03755-8000 603-646-3843 (X 3546 Secr.) e-mail:[email protected] Approximation Theory and Neural Networks

011-49-203-379-3542 e-mail: [email protected] Approximation Theory, Computer Aided Geometric Design John R. Graef Department of Mathematics University of Tennessee at Chattanooga Chattanooga, TN 37304 USA [email protected] Ordinary and functional differential equations, difference equations, impulsive systems, differential inclusions, dynamic equations on time scales, control theory and their applications

Sever S. Dragomir School of Computer Science and Mathematics, Victoria University, PO Box 14428, Melbourne City, MC 8001, AUSTRALIA Tel. +61 3 9688 4437 Fax +61 3 9688 4050 [email protected] Inequalities, Functional Analysis, Numerical Analysis, Approximations, Information Theory, Stochastics.

Weimin Han Department of Mathematics University of Iowa Iowa City, IA 52242-1419 319-335-0770 e-mail: [email protected] Numerical analysis, Finite element method, Numerical PDE, Variational inequalities, Computational mechanics

Oktay Duman TOBB University of Economics and Technology, Department of Mathematics, TR06530, Ankara, Turkey, [email protected] Classical Approximation Theory, Summability Theory, Statistical Convergence and its Applications

Tian-Xiao He Department of Mathematics and Computer Science P.O. Box 2900, Illinois Wesleyan University Bloomington, IL 61702-2900, USA Tel (309)556-3089 Fax (309)556-3864 [email protected] Approximations, Wavelet, Integration Theory, Numerical Analysis, Analytic Combinatorics

Saber N. Elaydi Department Of Mathematics Trinity University 715 Stadium Dr. San Antonio, TX 78212-7200 210-736-8246 e-mail: [email protected] Ordinary Differential Equations, Difference Equations

Margareta Heilmann Faculty of Mathematics and Natural Sciences, University of Wuppertal Gaußstraße 20 D-42119 Wuppertal, Germany, [email protected] Approximation Theory (Positive Linear Operators)

J .A. Goldstein Department of Mathematical Sciences The University of Memphis Memphis, TN 38152 901-678-3130 [email protected] Partial Differential Equations, Semigroups of Operators

Xing-Biao Hu Institute of Computational Mathematics AMSS, Chinese Academy of Sciences Beijing, 100190, CHINA [email protected]

H. H. Gonska Department of Mathematics University of Duisburg Duisburg, D-47048 Germany

1336

Computational Mathematics Ram N. Mohapatra Department of Mathematics University of Central Florida Orlando, FL 32816-1364 tel.407-823-5080 [email protected] Real and Complex Analysis, Approximation Th., Fourier Analysis, Fuzzy Sets and Systems

Jong Kyu Kim Department of Mathematics Kyungnam University Masan Kyungnam,631-701,Korea Tel 82-(55)-249-2211 Fax 82-(55)-243-8609 [email protected] Nonlinear Functional Analysis, Variational Inequalities, Nonlinear Ergodic Theory, ODE, PDE, Functional Equations.

Gaston M. N'Guerekata Department of Mathematics Morgan State University Baltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'[email protected] [email protected] Nonlinear Evolution Equations, Abstract Harmonic Analysis, Fractional Differential Equations, Almost Periodicity & Almost Automorphy

Robert Kozma Department of Mathematical Sciences The University of Memphis Memphis, TN 38152, USA [email protected] Neural Networks, Reproducing Kernel Hilbert Spaces, Neural Percolation Theory Mustafa Kulenovic Department of Mathematics University of Rhode Island Kingston, RI 02881,USA [email protected] Differential and Difference Equations

M.Zuhair Nashed Department Of Mathematics University of Central Florida PO Box 161364 Orlando, FL 32816-1364 e-mail: [email protected] Inverse and Ill-Posed problems, Numerical Functional Analysis, Integral Equations, Optimization, Signal Analysis

Irena Lasiecka Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

Mubenga N. Nkashama Department OF Mathematics University of Alabama at Birmingham Birmingham, AL 35294-1170 205-934-2154 e-mail: [email protected] Ordinary Differential Equations, Partial Differential Equations

Burkhard Lenze Fachbereich Informatik Fachhochschule Dortmund University of Applied Sciences Postfach 105018 D-44047 Dortmund, Germany e-mail: [email protected] Real Networks, Fourier Analysis, Approximation Theory

Vassilis Papanicolaou Department of Mathematics National Technical University of Athens Zografou campus, 157 80 Athens, Greece tel:: +30(210) 772 1722 Fax +30(210) 772 1775 [email protected] Partial Differential Equations, Probability

Hrushikesh N. Mhaskar Department Of Mathematics California State University Los Angeles, CA 90032 626-914-7002 e-mail: [email protected] Orthogonal Polynomials, Approximation Theory, Splines, Wavelets, Neural Networks

1337

Choonkil Park Department of Mathematics Hanyang University Seoul 133-791 S. Korea, [email protected] Functional Equations

Anfithea - Paleon Faliron GR-175 64 Athens, Greece [email protected] Numerical Analysis H. M. Srivastava Department of Mathematics and Statistics University of Victoria Victoria, British Columbia V8W 3R4 Canada tel.250-472-5313; office,250-4776960 home, fax 250-721-8962 [email protected] Real and Complex Analysis, Fractional Calculus and Appl., Integral Equations and Transforms, Higher Transcendental Functions and Appl.,q-Series and q-Polynomials, Analytic Number Th.

Svetlozar (Zari) Rachev, Professor of Finance, College of Business, and Director of Quantitative Finance Program, Department of Applied Mathematics & Statistics Stonybrook University 312 Harriman Hall, Stony Brook, NY 11794-3775 tel: +1-631-632-1998, [email protected] Alexander G. Ramm Mathematics Department Kansas State University Manhattan, KS 66506-2602 e-mail: [email protected] Inverse and Ill-posed Problems, Scattering Theory, Operator Theory, Theoretical Numerical Analysis, Wave Propagation, Signal Processing and Tomography

I. P. Stavroulakis Department of Mathematics University of Ioannina 451-10 Ioannina, Greece [email protected] Differential Equations Phone +3-065-109-8283

Tomasz Rychlik Polish Academy of Sciences Instytut Matematyczny PAN 00-956 Warszawa, skr. poczt. 21 ul. Śniadeckich 8 Poland [email protected] Mathematical Statistics, Probabilistic Inequalities

Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock, Germany [email protected] Numerical Fourier Analysis, Fourier Analysis, Harmonic Analysis, Signal Analysis, Spectral Methods, Wavelets, Splines, Approximation Theory

Boris Shekhtman Department of Mathematics University of South Florida Tampa, FL 33620, USA Tel 813-974-9710 [email protected] Approximation Theory, Banach spaces, Classical Analysis

Roberto Triggiani Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

T. E. Simos Department of Computer Science and Technology Faculty of Sciences and Technology University of Peloponnese GR-221 00 Tripolis, Greece Postal Address: 26 Menelaou St.

Juan J. Trujillo University of La Laguna Departamento de Analisis Matematico C/Astr.Fco.Sanchez s/n 38271. LaLaguna. Tenerife. SPAIN Tel/Fax 34-922-318209 [email protected]

1338

Fractional: Differential EquationsOperators-Fourier Transforms, Special functions, Approximations, and Applications

Ahmed I. Zayed Department of Mathematical Sciences DePaul University 2320 N. Kenmore Ave. Chicago, IL 60614-3250 773-325-7808 e-mail: [email protected] Shannon sampling theory, Harmonic analysis and wavelets, Special functions and orthogonal polynomials, Integral transforms

Ram Verma International Publications 1200 Dallas Drive #824 Denton, TX 76205, USA [email protected] Applied Nonlinear Analysis, Numerical Analysis, Variational Inequalities, Optimization Theory, Computational Mathematics, Operator Theory

Ding-Xuan Zhou Department Of Mathematics City University of Hong Kong 83 Tat Chee Avenue Kowloon, Hong Kong 852-2788 9708,Fax:852-2788 8561 e-mail: [email protected] Approximation Theory, Spline functions, Wavelets

Xiang Ming Yu Department of Mathematical Sciences Southwest Missouri State University Springfield, MO 65804-0094 417-836-5931 [email protected] Classical Approximation Theory, Wavelets

Xin-long Zhou Fachbereich Mathematik, Fachgebiet Informatik Gerhard-Mercator-Universitat Duisburg Lotharstr.65, D-47048 Duisburg, Germany e-mail:[email protected] Fourier Analysis, Computer-Aided Geometric Design, Computational Complexity, Multivariate Approximation Theory, Approximation and Interpolation Theory

Xiao-Jun Yang State Key Laboratory for Geomechanics and Deep Underground Engineering, China University of Mining and Technology, Xuzhou 221116, China Local Fractional Calculus and Applications, Fractional Calculus and Applications, General Fractional Calculus and Applications, Variable-order Calculus and Applications, Viscoelasticity and Computational methods for Mathematical [email protected]

Jessada Tariboon Department of Mathematics, King Mongkut's University of Technology N. Bangkok 1518 Pracharat 1 Rd., Wongsawang, Bangsue, Bangkok, Thailand 10800 [email protected], Time scales, Differential/Difference Equations, Fractional Differential Equations

Richard A. Zalik Department of Mathematics Auburn University Auburn University, AL 36849-5310 USA. Tel 334-844-6557 office 678-642-8703 home Fax 334-844-6555 [email protected] Approximation Theory, Chebychev Systems, Wavelet Theory

1339

Instructions to Contributors Journal of Computational Analysis and Applications An international publication of Eudoxus Press, LLC, of TN.

Editor in Chief: George Anastassiou Department of Mathematical Sciences University of Memphis Memphis, TN 38152-3240, U.S.A.

1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves.

2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.

1340

4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corollaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,

1341

name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990).

Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986.

Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495.

11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears.

15. This journal will consider for publication only papers that contain proofs for their listed results.

1342

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Existence and global attractiveness of pseudo almost periodic solutions to impulsive partial stochastic neutral functional differential equations Zuomao Yan∗ and Fangxia Lu January 5, 2018 Abstract: In this paper, we introduce a new concept of p-mean piecewise pseudo almost periodic for a stochastic process and establish a new composition theorem about pseudo almost periodic functions under non-Lipschitz conditions. Using this composition theorem, the analytic semigroup theory and fixed point strategy with stochastic analysis theory, we also study the existence and the global attractiveness for p-mean piecewise pseudo almost periodic mild solutions for impulsive partial neutral stochastic neutral functional differential equations. Moreover, an example is given to illustrate the general theorems. 2000 MR Subject Classification: 34A37; 60H10; 35B15; 34F05 Keywords: Impulsive partial stochastic functional differential equations; Pseudo almost periodic functions; Composition theorem; Analytic semigroup theory; Fixed point

1

Introduction

The concept of pseudo almost periodic functions introduced initially by Zhang [1] is an important generalization of the classical almost periodic functions. Since then, there has been an intense interest in studying several extensions of this concept such as asymptotic pseudo almost periodic functions and Stepanov-like pseudo almost periodic functions. Some contributions on pseudo almost periodic type solutions to abstract differential equations have recently been made [2-8] and the references therein. On the other hand, it should be pointed out that noise or stochastic perturbation is unavoidable and omnipresent in nature as well as that in man-made systems. Therefore, we must import the stochastic effects into the investigation of differential systems. The concept of almost periodicity is of great importance in probability for investigating stochastic processes. In fact, the existence of almost periodic, asymptotically almost periodic and pseudo almost periodic solutions for stochastic differential systems has been thoroughly investigated; see [9-18] and reference therein. In particular, Bezandry and Diagana [19,20] introduced the concepts of p-mean pseudo pseudo almost periodicity, and studied the existence of p-mean pseudo almost 1

1343

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

periodic mild solutions to partial stochastic differential equations. Diop et al. [21] obtained the existence, uniqueness and global attractiveness of an p-mean pseudo almost periodic solution for stochastic evolution equation driven by a fractional Brownian motion. The theory of impulsive differential equations is an important branch of differential equations, which has an extensively physical background [22]. Therefore, it seems interesting to study the various types of impulsive differential equations. The asymptotic properties of solutions of impulsive differential equations have been considered by many authors. For example, Henr´ıquez et al. [23], Liu and Zhang [24], Stamov et al. [25-27] discussed the piecewise almost periodic solutions of impulsive differential equations. Liu and Zhang [28], Ch´erif [29] established the existence and stability of piecewise pseudo almost periodic solutions to abstract impulsive differential equations. Bainov et al. [30] concerned with the asymptotic equivalence of impulsive differential equations. However, besides impulse effects and delays, stochastic effects likewise exist in real systems. In recent years, several interesting results on impulsive partial stochastic systems have been reported in [31-33] and the references therein. Further, Zhang [34] obtained the existence and uniqueness of almost periodic solutions for a class of impulsive stochastic differential equations with delay by mean of the Banach contraction principle. In [35], the authors investigated the existence and stability of square-mean piecewise almost periodic solutions for nonlinear impulsive stochastic differential equations by using Schauder’s fixed point theorem. Neutral differential equations arise in many areas of applied mathematics. For this reason, those equations have been of a great interest during the last few decades. The literature relative to partial neutral stochastic differential equations is quite extensive; for more on this topic and related applications we refer the reader to [36]. Similarly, for more on impulsive partial neutral stochastic functional differential equations we refer to [32,33,37,38]. In this paper, we study the existence and global attractiveness of p-mean piecewise pseudo almost periodic mild solutions to the following impulsive partial neutral stochastic neutral functional differential equations: d[x(t) − h(t, xt )] = [Ax(t) + g(t, xt )]dt + f (t, xt )dW (t), t ∈ R, t 6= ti , i ∈ Z, − ∆x(ti ) = x(t+ i ) − x(ti ) = Ii (x(ti )),

i ∈ Z,

(1)

(2)

where A is the infinitesimal generator of an exponentially stable analytic semigroup {T (t)}t≥0 on a Hilbert space Lp (P, H) and W (t) is a two-sided standard one-dimensional Brownian motion defined on the filtered probability space (Ω, F, P, Ft ), where Ft = σ{W (u) − W (v); u, v ≤ t}. The history xt ∈ D with q > 0, where xt being defined by xt (θ) = x(t + θ) for each θ ∈ [−q, 0]) and D = {ψ : [−q, 0] → Lp (P, H), ψ continuous everywhere except for a finite number of points at which ψ(s− ) and ψ(s+ ) exist and ψ(s− ) = ψ(s)}. The functions h, g, f, Ii , ti satisfy suitable conditions which will be established later. The no-

2

1344

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

− tations x(t+ i ), x(ti ) represent the right-hand side and the left-hand side limits of x(·) at ti , respectively. To the best of our knowledge, the existence and global attractiveness of p-mean piecewise pseudo almost periodic mild solutions for for nonlinear impulsive stochastic system (1)-(2) is an untreated original topic, which in fact is the main motivation of the present paper. Although the papers [34,35] studied the piecewise almost periodic mild solution of impulsive stochastic differential equations, besides the fact that [34,35] applies to the results under the Lipschitz conditions, the class of impulsive stochastic systems is also different from the one studied here. Further, many dynamical control systems arising from realistic models can be described as impulsive partial neutral stochastic functional differential systems. So it is natural to extend the concept of pseudo almost periodicity to dynamical systems represented by these impulsive systems. In the paper, we will introduce the notion of p-mean piecewise pseudo almost periodic for stochastic processes, which, in turn generalizes all the above-mentioned concepts, in particular, the notion of piecewise almost periodic. Then we will establish a new composition theorem for p-mean pseudo almost periodic functions under non-Lipschitz conditions. As an application, we study and obtain the existence and exponential stability of p-mean piecewise pseudo almost periodic mild solutions to system (1)-(2) by using the analytic semigroup theory and Krasnoselskii fixed point theorem with stochastic analysis theory. Such a result generalizes most of known results on the existence of almost periodic solutions of type system (1)-(2). It includes some results of almost periodic and pseudo almost periodic solutions to stochastic differential equations without impulse. Moreover, the results are also new for deterministic systems with impulse. The paper is organized as follows. In Section 2, we introduce some notations and necessary preliminaries. In Section 3, we give the existence of p-mean piecewise pseudo almost periodic mild solutions for (1)-(2). In Section 4, we establish the global attractiveness of p-mean piecewise pseudo almost periodic mild solutions for (1)-(2). Finally, an example is given to illustrate our results in Section 5.

2

Preliminaries

Throughout the paper, N, Z, R and R+ stand for the set of natural numbers, integers, real numbers, positive real numbers, respectively. We assume that (H, k · k), (K, k · kK ) are real separable Hilbert spaces and (Ω, F, P ) is supposed to be a filtered complete probability space. Define Lp (P, H), for p R≥ 1 to be the space of all H-valued random variables V such that E k V kp = Ω k V kp dP < ∞. Then Lp (P, H) is a Banach space when it is equipped with R its natural norm k · kp defined by k V kp = ( Ω E k V kp dP )1/p < ∞ for each V ∈ Lp (P, H). Let C(R, Lp (P, H)), BC(R, Lp (P, H)) stand for the collection of all continuous functions from R into Lp (P, H), the Banach space of all bounded continuous functions from R into Lp (P, H), equipped with the sup norm, respectively. We let L(K, H) be the space of all linear bounded operators 3

1345

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

from K into H, equipped with the usual operator norm k · kL(K,H) ; in particular, this is simply denoted by L(H) when K = H. Furthermore, L02 (K, H) denotes the space of all Q-Hilbert-Schmidt operators from K to H with the norm k ψ k2L0 = Tr(ψQψ ∗ ) < ∞ for any ψ ∈ L(K, H). 2 Definition 2.1 ([19]). A stochastic process x : R → Lp (P, H) is said to be continuous provided that for any s ∈ R, lim E k x(t) − x(s) kp = 0.

t→s

Definition 2.2 ([19]). A stochastic process x : R → Lp (P, H) is said to be stochastically bounded provided that lim lim sup{P k x(t) k> N } = 0.

N →∞

t∈R

Let T be the set consisting of all real sequences {ti }i∈Z such that γ = inf i∈Z (ti+1 − ti ) > 0, limi→∞ ti = ∞, and limi→−∞ ti = −∞. For {ti }i∈Z ∈ T, let P C(R, Lp (P, H)) be the space consisting of all stochastically bounded piecewise continuous functions f : R → Lp (P, H) such that f (·) is stochastically continuous at t for any t ∈ / {ti }i∈Z and f (ti ) = f (t− i ) for all i ∈ Z; let P C(R × Lp (P, K), Lp (P, H)) be the space formed by all stochastically piecewise continuous functions f : R × Lp (P, K) → Lp (P, H) such that for any x ∈ Lp (P, K), f (·, x) ∈ P C(R, Lp (P, H)) and for any t ∈ R, f (t, ·) is stochastically continuous at x ∈ Lp (P, K). Definition 2.3 ([19]). A function f ∈ C(R, Lp (P, H)) is said to be p-mean almost periodic if for each ε > 0, there exists an l(ε) > 0, such that every interval J of length l(ε) contains a number τ with the property that E k f (t + τ ) − f (t) kp < ε for all t ∈ R. Denote by AP (R, Lp (P, H)) the set of such functions. Definition 2.4 (Compare with [22]). A sequence {xn } is called p-mean almost periodic if for any ε > 0, there exists a relatively dense set of its ε-periods, i.e., there exists a natural number l = l(ε), such that for k ∈ Z, there is at least one number q˜ in [k, k + l], for which inequality E k xn+˜q − xn kp < ε holds for all n ∈ N. Denote by AP (Z, Lp (P, H))) the set of such sequences. Define l∞ (Z, Lp (P, H)) = {x : Z → Lp (P, H) :k x k= supn∈Z (E k x(n) kp 1/p ) < ∞}, and P AP0 (Z, Lp (P, H)) ½ ¾ n 1 X = x ∈ l∞ (Z, Lp (P, H)) : lim E k x(n) kp dt = 0 . n→∞ 2n j=−n Definition 2.5. A sequence {xn }n∈Z ∈ l∞ (Z, X) is called p-mean pseudo almost periodic if xn = x1n + x2n , where x1n ∈ AP (Z, Lp (P, H)), x2n ∈ P AP0 (Z, Lp (P, H)). Denote by P AP (Z, Lp (P, H)) the set of such sequences. Definition 2.6 (Compare with [22]). For {ti }i∈Z ∈ T, the function f ∈ P C(R, Lp (P, H)) is said to be p-mean piecewise almost periodic if the following conditions are fulfilled: 4

1346

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(i) {tji = ti+j − ti }, j ∈ Z, is equipotentially almost periodic, that is, for any ε > 0, there exists a relatively dense set Qε of R such that for each τ ∈ Qε there is an integer q˜ ∈ Z such that |ti+˜q − ti − τ | < ε for all i ∈ Z. ˜ (ii) For any ε > 0, there exists a positive number δ˜ = δ(ε) such that if the ˜ points t0 and t00 belong to a same interval of continuity of ϕ and |t0 −t00 | < δ, then E k f (t0 ) − f (t00 ) kp < ε. ˜ (iii) For every ε > 0, there exists a relatively dense set Ω(ε) in R such that if ˜ τ ∈ Ω(ε), then E k f (t + τ ) − f (t) kp < ε for all t ∈ R satisfying the condition |t − ti | > ε, i ∈ Z. The number τ is called ε-translation number of f. We denote by APT (R, Lp (P, H)) the collection of all the p-mean piecewise almost periodic functions. Obviously, the space APT (R, Lp (P, H)) endowed with the sup norm defined by k f k∞ = supt∈R (E k f (t) kp )1/p for any f ∈ APT (R, Lp (P, H)) is a Banach space. Let U P C(R, Lp (P, H)) be the space of all stochastic functions f ∈ P C(R, Lp (P, H)) such that f satisfies the condition (ii) in Definition 2.6. Definition 2.7. The function f ∈ P C(R × Lp (P, K), Lp (P, H)) is said to be p-mean piecewise almost periodic in t ∈ R uniform in x ∈ Lp (P, K) if for every compact subset K ⊆ Lp (P, K), {f (·, x) : x ∈ K} is uniformly bounded, and given ε > 0, there exists a relatively dense subset Ωε such that E k f (t + τ, x) − f (t, x) kp < ε for all x ∈ K, τ ∈ Ωε , and t ∈ R satisfying |t − ti | > ε. Denote by APT (R × Lp (P, K), Lp (P, H)) the set of all such functions. Similarly as the proof of [22, Lemma 35], one has Lemma 2.1. Assume that f ∈ APT (R, Lp (P, H)), the sequence {xi }i∈Z ∈ AP (Z, Lp (P, H)), and {tji }, j ∈ Z are equipotentially almost periodic. Then, for each ε > 0, there exist relatively dense sets Ωε of R and Ωε of Z such that (i) E k f (t + τ ) − f (t) kp < ε for all t ∈ R, |t − ti | > ε, τ ∈ Ωε and i ∈ Z. (ii) E k xi+˜q − xi kp < ε for all q˜ ∈ Ωε and i ∈ Z. (iii) E k xqi˜ − τ kp < ε for all q˜, τ ∈ Ωε and i ∈ Z. We need to introduce the new space of functions defined for each q > 0 by P CT0 (R, Lp (P, H), q) ½ µ p = f ∈ P C(R, L (P, H)) : lim t→∞

¶ sup

p

E k f (θ) k

¾ =0 ,

θ∈[t−q,t]

5

1347

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

P APT0 (R, Lp (P, H), q) =

½ f ∈ P C(R, Lp (P, H)) : ¶ ¾ Z r µ 1 sup E k f (θ) kp dt = 0 , lim r→∞ 2r −r θ∈[t−q,t]

P APT0 (R × Lp (P, K), Lp (P, H), q) ½ = f ∈ P C(R × Lp (P, K), Lp (P, H)) : ¶ Z r µ 1 p sup E k f (θ, x) k dt = 0 lim r→∞ 2r −r θ∈[t−q,t] ¯ uniformly with respect to x ∈ K,

¾ p ¯ where K is an arbitrary compact subset of L (P, K) .

Similar to [4], one has Lemma 2.2. The spaces P APT0 (R, Lp (P, H), q) and P APT0 (R×Lp (P, K), Lp (P, H), q) endowed with the uniform convergence topology are Banach spaces. Definition 2.8. A function f ∈ P C(R, Lp (P, H)) is said to be p-mean piecewise pseudo almost periodic if it can be decomposed as f = f1 + f2 , where f1 ∈ APT (R, Lp (P, H)) and f2 ∈ P APT0 (R, Lp (P, H), q). Denoted by P APT (R, Lp (P, H), q) the set of all such functions. P APT (R, Lp (P, H), q) is a Banach space with the sup norm k · k∞ . Similar to [1,28], one has Remark 2.1. (i) P APT0 (R, Lp (P, H), q) is a translation invariant set of P C(R, Lp (P, H))). (ii) P CT0 (R, Lp (P, H), q) ⊂ P APT0 (R, Lp (P, H), q). Lemma 2.3. Let {fn }n∈N ⊂ P APT0 (R, Lp (P, H), q) be a sequence of functions. If fn converges uniformly to f, then f ∈ P APT0 (R, Lp (P, H), q). One can refer to Lemma 2.5 in [6] for the proof of Lemma 2.3. Definition 2.9. A function f ∈ P C(R × Lp (P, K), Lp (P, H)) is said to be pmean piecewise pseudo almost periodic if it can be decomposed as f = f1 + f2 , where f1 ∈ APT (R × Lp (P, K), Lp (P, H)) and f2 ∈ P APT0 (R × Lp (P, K), Lp (P, H), q). Denoted by P APT (R × Lp (P, K), Lp (P, H), q) the set of all such functions. We need the following composition of p-mean pseudo almost periodic processes. Lemma 2.4. Assume f ∈ P APT (R × Lp (P, K), Lp (P, H), q). Suppose that f (t, x) satisfies E k f (t, x) − f (t, y) kp ≤ Λ(E k x − y kp )

(3)

for all t ∈ R, x, y ∈ Lp (P, K), where Λ is a concave and continuous nondecreasing function from R+ to R+ such that Λ(0) = 0, Λ(s) > 0 for s > 0 R R R +∞ ds and 0+ Λ(s) = +∞. Here, the symbol 0+ stands for limε→0+ ε . If φ(·) ∈ P APT (R, Lp (P, K), q) then f (·, φ(·)) ∈ P APT (R, Lp (P, H), q). 6

1348

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Proof. Assume that f = f1 + f2 , φ = φ1 + φ2 , where f1 ∈ APT (R × Lp (P, K), Lp (P, H)), f2 ∈ P APT0 (R×Lp (P, K), Lp (P, H), q), φ1 ∈ APT (R, Lp (P, H)), and φ2 ∈ P APT0 (R, Lp (P, H), q). Consider the decomposition f (t, φ(t)) = f1 (t, φ1 (t)) + [f (t, φ(t)) − f (t, φ1 (t))] + f2 (t, φ1 (t)). Since f1 (·, φ1 (·)) ∈ APT (R, Lp (P, H)), it remains to prove that both [f (·, φ(·))− f (·, φ1 (·))] and f2 (·, φ1 (·)) belong to P APT0 (R, Lp (P, H), q). Indeed, using (3), it follows that ¶ Z r µ 1 sup E k f (θ, φ(θ)) − f (θ, φ1 (θ)) kp dt 2r −r θ∈[t−q,t] ¶ Z r µ 1 p sup Λ(E k φ(θ) − φ1 (θ) k ) dt ≤ 2r −r θ∈[t−q,t] ¶ Z r µ 1 sup Λ(E k φ2 (θ) kp ) dt, = 2r −r θ∈[t−q,t] noting that Λ is a concave and continuous nondecreasing function and Λ(0) = 0, we deduce that Λ(E k φ2 (θ) kp ) ≤ Λ(supθ∈[t−q,t] E k φ2 (θ) kp ), and 1 2r

Z

r

µ sup

−r

¶ Λ(E k φ2 (θ) kp ) dt

θ∈[t−q,t] Z r

µ ¶ 1 p Λ sup E k φ2 (θ) k dt ≤ 2r −r θ∈[t−q,t] µ Z r µ ¶ ¶ 1 ≤Λ sup E k φ2 (θ) kp dt → 0 as 2r −r θ∈[t−q,t]

r → ∞,

which implies that [f (·, φ(·)) − f (·, φ1 (·))] ∈ P APT0 (R, Lp (P, H), q). Since φ1 (R) is relatively compact in Lp (P, K) and f1 is uniformly continuous on sets of the form R × K where K ⊂ Lp (P, K) is compact subset, for ε > 0 there exists ξ ∈ (0, ε) such that E k f1 (t, z) − f1 (t, z˜) kp ≤ ε, z, z˜ ∈ φ1 (R) Sn with |z− z˜| < ξ. Now, fix z1 , ..., zn ∈ φ1 (R) such that φ1 (R) ⊂ j=1 Bξ (zj , Lp (P, K)). Obviously, the sets Dj = φ−1 of R, and 1 (Bξ (zj )) form an open covering Sj−1 therefore using the sets B1 = D1 , B2 = D2 \D1 and Bj = Dj \ k=1 Dk one obtains a covering of R by disjoint open sets. For t ∈ Bj , φ1 (t) ∈ Bξ (zj ), E k f2 (t, φ1 (t)) kp ≤ 3p−1 E k f (t, φ1 (t)) − f (t, zj ) kp +3p−1 E k −f1 (t, φ1 (t)) + f1 (t, zj ) kp +3p−1 E k f2 (t, zj ) k ≤ 3p−1 Λ(E k φ1 (t) − zj kp ) + 3p−1 ε + 3p−1 E k f2 (t, zj ) k ≤ 3p−1 Λ(ε) + 3p−1 ε + 3p−1 E k f2 (t, zj ) k . 7

1349

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Now using the previous inequality it follows that ¶ Z r µ 1 sup E k f1 (θ, φ1 (θ)) kp dt 2r −r θ∈[t−q,t] ¶ µ n Z 1 X ≤ sup E k f1 (θ, φ1 (θ)) kp dt 2r j=1 Bj ∩[−r,r] θ∈[t−q,t] · µ n Z X p−1 1 ≤3 sup sup 2r j=1 Bj ∩[−r,r] j=1,...,n θ∈[t−q,t]∩Bj ¶¸ p ×E k f (θ, φ1 (θ)) − f (θ, zj ) k dt · µ n Z 1 X sup sup 2r j=1 Bj ∩[−r,r] j=1,...,n θ∈[t−q,t]∩Bj ¶¸ p ×E k f1 (θ, φ1 (θ)) − f1 (θ, zj ) k dt

+3p−1

· µ ¶¸ n Z 1 X p sup sup E k f2 (θ, zj ) k dt +3 2r j=1 Bj ∩[−r,r] j=1,...,n θ∈[t−q,t]∩Bj Z r 1 [Λ(ε) + ε]dt ≤ 3p−1 2r −r ¶ Z r µ n X 1 p−1 p +3 sup E k f2 (θ, zj ) k dt. 2r −r θ∈[t−q,t] j=1 p−1

In view of the above it is clear that f2 (·, φ1 (·)) belongs to P APT0 (R, Lp (P, H), q). This completes the proof. Lemma 2.5. Assume the sequence of vector-valued functions {Ii }i∈Z is pseudo almost periodic, and there is a concave nondecreasing function from R+ to R+ R ds such that Λi (0) = 0, Λi (s) > 0 for > 0 and 0+ Λi (s) = +∞, E k Ii (x) − Ii (y) kp ≤ Λi (E k x − y kp ) for all x, y ∈ Lp (P, K), i ∈ Z. If φ ∈ P APT (R, Lp (P, H), q) ∩ U P C(R, Lp (P, H)) such that R(φ) ⊂ Lp (P, K), then Ii (φ(ti )) is pseudo almost periodic. Proof. Assume that φ = φ1 + φ2 , where φ1 ∈ APT (R, Lp (P, H)), φ2 ∈ P APT0 (R, Lp (P, H), q). Fix φ ∈ P APT (R, Lp (P, H), q) ∩ U P C(R, Lp (P, H)), first we show φ(ti ) is pseudo almost periodic. One can refer to Lemma 37 in [22] that the sequence φ(ti ) is almost periodic. Next we need to show that φ(ti ) ∈ P AP0 (Z, Lp (P, H)). By the hypothesis, φ, φ1 ∈ U P C(R, Lp (P, H)), so φ2 ∈ U P C(R, Lp (P, H)). Let 0 < ε < 1, there exists 0 < ξ < min{1, γ} such that for t ∈ (ti − ξ, ti ), i ∈ Z, we have E k φ2 (t) kp ≤ (1 − ε)E k φ2 (ti ) kp , i ∈ Z. Since tji , i ∈ Z, j = 0, 1, ... are equipotentially almost periodic, {t1i } is an almost periodic sequence. Here we assume a bound of {t1i } is Mt and |ti | ≥ |t−i |; 8

1350

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

therefore, 1 2ti

Z

ti

µ

¶ sup

−ti







E k φ2 (θ) k

p

dt

θ∈[t−q,t]

1 2ti 1 2ti

Z i X

µ sup

¶ E k φ2 (θ) kp dt

θ∈[t−q,t]

tj −ξ

j=−i+1 i X

tj

ξ(1 − ε)E k φ2 (tj ) kp

j=−i+1

ξ(1 − ε) 1 Mt 2ti

i X

E k φ2 (tj ) kp .

j=−i+1

Since φ2 ∈ P APT0 (R, Lp (P, H), q), it follows from the inequality above that φ2 (ti ) ∈ P AP0 (Z, Lp (P, H)). Hence, φ(ti ) is pseudo almost periodic. Now, we show Ii (φ(ti )) is pseudo almost periodic. Let I(t, x) = (t − n)In (x), n ≤ t < n + 1, n ∈ Z, ϑ(t) = (t − n)φn (tn ), n ≤ t < n + 1, n ∈ Z. Since In , φ(tn ) are two pseudo almost periodic sequences, Refer to Lemma 1.7.12. in [39], we get that I ∈ P AP (R × Lp (P, K), Lp (P, H)), ϑ ∈ P AP (R, Lp (P, K)). For every t ∈ R, there exists a number n ∈ Z such that |t − n| ≤ 1, we have for x1 , x2 ∈ Lp (P, K), E k I(t, x1 ) − I(t, x2 ) kp ≤ E k In (x1 ) − In (x2 ) kp ≤ Λn (E k x1 − x2 kp ). Similar to the proof of Lemma 2.4, I(·, ϑ(·)) ∈ P AP (R, Lp (P, H)). Again, similarly as the proof of Lemma 1.7.12 in [39], we have that I(i, ϑ(i)) is a pseudo almost periodic sequence, that is, Ii (φ(ti )) is pseudo almost periodic. This completes the proof. Let 0 ∈ ρ(A), then it is possible to define the fractional power Aα , for 0 < α ≤ 1, as a closed linear operator on its domain D(Aα ). Furthermore, the subspace D(Aα ) is dense in H and the expression k x kα =k Aα x k, x ∈ D(Aα ), defines a norm on D(Aα ). Hereafter we denote by Hα the Banach space D(Aα ) with norm k x kα . Throughout the rest of this paper, we denote by k · kα,∞ the sup norm of the space P APT (R, Lp (P, Hα )). Lemma 2.6 ([40]). Let 0 < α ≤ β ≤ 1. Then the following properties hold: (a) Hβ is a Banach space and Hβ ,→ Hα is continuous. (b) The function s → Aβ T (s) is continuous in the uniform operator topology on (0, ∞) and there exists Mβ > 0 such that k Aβ T (t) k≤ Mβ e−δt t−β for each t > 0. 9

1351

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(c) For each x ∈ D(Aβ ) and t ≥ 0, Aβ T (t)x = T (t)Aβ x. (d) A−β is a bounded linear operator in H with D(Aβ ) = Im(A−β ). Next, we introduce a useful compactness criterion on P C(R, Lp (P, H), q). ˜ : R → R+ be a continuous function such that h(t) ˜ Let h ≥ 1 for all t ∈ R ˜ and h(t) → ∞ as |t| → ∞. Define P Ch˜0 (R, Lp (P, H), q) ½ µ = f ∈ P C(R, Lp (P, H)) : lim |t|→∞

E k f (θ) kp h(θ) θ∈[t−q,t]



sup

¾ =0

p

(θ)k endowed with the norm k f kh˜ = supt∈R (supθ∈[t−q,t] Ekfh(θ) ), it is a Banach ˜ space. Lemma 2.7. A set B ⊆ P Ch˜0 (R, Lp (P, H), q) is relatively compact if and only if it verifies the following conditions:

(i) lim (supθ∈[t−q,t] |t|→∞

Ekf (t)kp ) ˜ h(t)

= 0 uniformly for f ∈ B.

(ii) B(t) = {f (t) : f ∈ B} is relatively compact in Lp (P, H) for every t ∈ R. (iii) The set B is equicontinuous on each interval (ti , ti+1 )(i ∈ Z). One can refer to Lemma 4.1 in [28] for the proof of Lemma 2.7. Lemma 2.8 (Krasnoselskii’s Fixed Point Theorem [41]). Let D be a closed, bounded, and convex subset of a Banach space X. Let Ψ1 and Ψ2 be operators, defined on D satisfying the conditions: (a) Ψ1 x + Ψ2 y ∈ D when x, y ∈ D. (b) The operator Ψ1 is a contraction. (c) The operator Ψ2 is continuous and Ψ2 (D) is contained in a compact set. Then the equation Ψ1 x + Ψ2 x = x has a solution on D.

3

Existence

In this section, we investigate the existence of p-mean piecewise pseudo almost periodic mild solution for system (1)-(2). We begin introducing the followings concepts of mild solutions. Definition 3.1. An Ft -progressively measurable process x : [σ, σ +b) → H, b > 0 is called a mild solution of system (1)-(2) on [σ, σ + b), if xσ = ϕ ∈ D, the function s → AT (t − s)h(s, xs ) is integrable on [0, t) for every σ < t < σ + b, and σ 6= ti , i ∈ Z, Z t x(t) = T (t − σ)[ϕ(σ) − h(σ, ϕ)] + h(t, xt ) + AT (t − s)h(s, xs )ds σ

10

1352

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Z

Z

t

T (t − s)g(s, xs )ds + σ X + T (t − ti )Ii (x(ti )),

t

+

T (t − s)f (s, xs )dW (s) σ

t ∈ [σ, σ + b).

(4)

σ 0. (H2) There exist constants β, L > 0 such that 0 < β < 1, the function h ∈ P APT (R × D, Lp (P, Hβ ), q), and E k Aβ h(t1 , ψ1 ) − Aβ h(t2 , ψ2 ) kp ≤ L[|t1 − t2 |+ k ψ1 − ψ2 kpD ], t1 , t2 ∈ R, ψ1 , ψ2 ∈ D, E k Aβ h(t, ψ) kp ≤ L(k ψ kpD +1),

t ∈ R, ψ ∈ D.

(H3) The functions g ∈ P APT (R×D, Lp (P, H), q), f ∈ P APT (R×D, Lp (P, L02 ), q), and for each t ∈ R, ψ1 , ψ2 ∈ D, E k g(t, ψ1 ) − g(t, ψ2 ) kp +E k f (t, ψ1 ) − f (t, ψ2 ) kpL0 2

≤ Λ(E k ψ1 − ψ2 kpD ), where Λ is a concave and continuous nondecreasing function from R+ to R ds + R such that Λ(0) = 0, Λ(s) > 0 for s > 0 and 0+ Λ(s) = +∞. (H4) For any ρ1 > 0, there exist a constant µ > 0 and nondecreasing continuous function Θ : R+ → R+ such that, for all t ∈ R, and ψ ∈ D with E k x kpD > µ, E k g(t, ψ) kp +E k f (t, ψ) kpL0 ≤ ρ1 Θ(E k ψ kpD ). 2

p

(H5) The functions Ii ∈ P AP (Z, L (P, H)), and for each t ∈ R, x1 , x2 ∈ Lp (P, H), i ∈ Z, ˜ i (E k x1 − x2 kp ), E k Ii (x1 ) − Ii (x2 ) kp ≤ Λ ˜ i are concave and continuous nondecreasing functions from R+ to where Λ R + ˜ i (0) = 0, Λ ˜ i (s) > 0 for s > 0 and + ds = +∞. R such that Λ ˜ (s) 0 Λ i

(H6) For any ρ2 > 0, there exist a constant µ > 0 and nondecreasing continuous ˜ i : R+ → R+ , i ∈ Z, such that, for all t ∈ R, and x ∈ Lp (P, H) function Θ with E k x kp > µ, ˜ i (E k x kp ). E k Ii (x) kp ≤ ρ2 Θ

11

1353

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

To study the system (1)-(2) we need the following results. Lemma 3.1. Assume that (H1) holds. If h ∈ P APT (R, Lp (P, Hβ ), q) and if H is the function defined by Z t H(t) := AT (t − s)h(s)ds −∞

for each t ∈ R, then H ∈ P APT (R, Lp (P, H), q). Proof. Since h ∈ P APT (R, Lp (P, Hβ ), q), there exist h1 ∈ APT (R, Lp (P, Hβ )) and h2 ∈ P APT0 (R, Lp (P, Hβ ), q), such that h = h1 + h2 . Then H(t) can be decomposed as Z t Z t H(t) = AT (t − s)h1 (s)ds + AT (t − s)h2 (s)ds =: H1 (t) + H2 (t). −∞

−∞

Next we show that H1 (t) ∈ APT (R, Lp (P, H)) and H2 (t) ∈ P APT0 (R, Lp (P, H), q). Thus, the following verification procedure is divided into three steps. Step 1. H1 ∈ U P C(R, Lp (P, H)). Let t0 , t00 ∈ (ti , ti+1 ), i ∈ Z, t00 < t0 . By (H1), for any ε > 0, there exists 0 < ξ < ( 2h˜ε )1/pβ such that 0 < t0 − t00 < ξ, we have 1

δ˜1 ε , ˜1 2h

k T (t0 − t00 ) − I kp ≤

˜ 1 = 2p−1 M p (1 − p(1−β) )1−p k h1 kp , δ˜1 = (Γ(1 − where h β,∞ 1−β p−1 Using H¨older’s inequality, we have

p(1−β) p−1 −pβ δ . p−1 ))

E k H1 (t0 ) − H1 (t00 ) kp wp w Z t00 w w 00 0 00 p−1 w AT (t − s)[T (t − t ) − I]h1 (s)dsw ≤ 2 Ew w −∞ wp w Z t0 w w 0 w +2p−1 E w w 00 AT (t − s)h1 (s)dsw t

p ≤ 2p−1 M1−β k T (t0 − t00 ) − I kp µ Z t00 ¶p−1 p 00 (t00 − s)− p−1 (1−β) e−δ(t −s) ds ×

µZ ×

−∞ t00

¶ −δ(t00 −s)

e −∞

p−1

+2

µZ ×

t0 t0

p−1

≤2

µZ

p M1−β

t0

β

p

E k A h1 (s) k ds 0

p (1−β) −δ(t0 −s) − p−1

e

(t − s) t00

¶p−1 ds



0

e−δ(t −s) E k Aβ g1 (s) kp ds

p M1−β k T (t0 − t00 ) − I kp

12

1354

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

µ ¶p−1 p(1 − β) p(1−β) 1 −1 p−1 × Γ(1 − )δ sup E k h1 (s) kpβ p−1 δ s∈R µ Z t0 ¶p−1 p p − p−1 (1−β) p−1 0 +2 M1−β (t − s) (t0 − t00 ) sup E k h1 (s) kpβ s∈R

t00

¶p−1 µ δ˜1 ε p(1 − β) p δ −pβ ) < 2p−1 M1−β k h1 kpβ,∞ Γ(1 − ˜1 p−1 2h 1 ¸ µ ¶ pβ ¶1−p ·µ pβ p(1 − β) ε p p p−1 +2 M1−β 1 − k h1 kβ,∞ ˜1 p−1 2h ε ε < + = ε. 2 2 Consequently, H1 ∈ U P C(R, Lp (P, H)). Step 2. H1 ∈ APT (R, Lp (P, H)). Let ti < t ≤ ti+1 . For ε > 0, let Ωε be a relatively dense set of R formed by ε-periods of F. For τ ∈ Ωε and 0 < η < min{ε, γ/2}, we have E k H1 (t + τ ) − H1 (t) kp wZ t wp w w 1−β β β w ≤ Ew A T (t − s)[A h (s + τ ) − A h (s)]ds 1 1 w w −∞ µZ t ¶p−1 p p ≤ M1−β (t − s)− p−1 (1−β) e−δ(t−s) ds −∞

µZ ×

t



e−δ(t−s) E k Aβ h1 (s + τ ) − Aβ h1 (s) kp ds

−∞

µZ



p M1−β

t

+

tj+1 −η

j=−∞

tj +η

i−1 Z X

tj +η

j=−∞

Z

t

+

ds

e−δ(t−s) E k Aβ h1 (s + τ ) − Aβ h1 (s) kp ds

e−δ(t−s) E k Aβ h1 (s + τ ) − Aβ h1 (s) kp ds

tj

i−1 Z X j=−∞

e

(t − s)

¶p−1

−∞

· X i−1 Z ×

+

p (1−β) −δ(t−s) − p−1

tj+1

e−δ(t−s) E k Aβ h1 (s + τ ) − Aβ h1 (s) kp ds

tj+1 −η

¸ e−δ(t−s) E k Aβ h1 (s + τ ) − Aβ h1 (s) kp ds .

ti

Since h1 ∈ APT (R, Lp (P, Hβ )), one has E k Aβ h1 (t + τ ) − Aβ h1 (t) kp < ε for all t ∈ [tj + η, tj+1 − η], j ∈ Z, j ≤ i, and t − s ≥ t − ti + ti − (tj+1 − η) ≥

13

1355

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

t − ti + γ(i − 1 − j) + η. Then, i−1 Z X

tj+1 −η

e−δ(t−s) E k Aβ h1 (s + τ ) − Aβ h1 (s) kp

tj +η

j=−∞

≤ε

i−1 Z X j=−∞

i−1 Z X

tj +η

tj+1 −η

e−δ(t−s) ds

tj +η



i−1 ε X −δ(t−tj+1 +η) e δ j=−∞



i−1 ε X −δγ(i−j−1) e δ j=−∞



ε , δ(1 − e−δγ )

e−δ(t−s) E k Aβ h1 (s + τ ) − Aβ h1 (s) kp ds

tj

j=−∞

i−1 Z X

≤ 2p−1 sup E k Aβ h1 (s) kp s∈R

j=−∞ i−1 X

≤ 2p−1 k h1 kpβ,∞ εeδη

tj +η

e−δ(t−s) ds

tj

e−δ(t−tj )

j=−∞

≤ 2p−1 k h1 kpβ,∞ εeδη e−δ(t−ti )

i−1 X

e−δγ(i−j)

j=−∞



2

p−1

k h1 kpβ,∞ 1 − e−δγ

δγ/2

e

ε

.

Similarly, one has i−1 Z X

tj+1

˜ 1 ε, e−δ(t−s) E k Aβ h1 (s + τ ) − Aβ h1 (s) kp ds ≤ M

tj+1 −η

j=−∞

Z

t

˜ 2 ε, e−δ(t−s) E k Aβ h1 (s + τ ) − Aβ h1 (s) kp ds ≤ M

ti

˜ 1, M ˜ 2 are some positive constants. Therefore, we get that E k H1 (t + where M ¯1 ε for a positive constant N ¯1 . Hence, H1 ∈ APT (R, Lp (P, H)). τ ) − H1 (t) kp ≤ N 0 p Step 3. H2 ∈ P APT (R, L (P, H), q). In fact, for r > 0, one has Z r 1 sup E k H2 (θ) kp dt 2r −r θ∈[t−q,t] 14

1356

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

wZ θ wp w w w AT (θ − s)h2 (s)dsw sup E w w dt −∞ −r θ∈[t−q,t] wZ ∞ wp Z r w w 1 1−β β w dt A sup E w T (s)A h (θ − s)ds = 2 w w 2r −r θ∈[t−q,t] 0 ¶p−1 Z r µZ ∞ 1 p s−(1−β) e−δs ds ≤ M1−β 2r −r 0 Z ∞ −δs × e sup E k Aβ h2 (θ − s) kp dsdt 1 = 2r

Z

r

0

µZ

θ∈[t−q,t]

¶p−1 p = M1−β s−(1−β) e−δs ds Z r Z ∞ 0 1 sup E k Aβ h2 (θ − s) kp dt. × e−δs ds 2r −r θ∈[t−q,t] 0 ∞

Since h2 ∈ P APT0 (R, Lp (P, Hβ ), q), it follows that h2 (· − s) ∈ P APT0 (R, Lp (P, Hβ ), q) for each s ∈ R by Remark 2.1, hence 1 2r

Z

r

sup −r θ∈[t−q,t]

wZ w Ew w

θ

−∞

wp w AT (θ − s)h2 (s)dsw w dt → 0 as r → ∞

for all s ∈ R. Using the Lebesgue’s dominated convergence theorem, we have H2 ∈ P APT0 (R, Lp (P, H), q). This completes the proof. Lemma 3.2. Assume that (H1) holds. If g ∈ P APT (R, Lp (P, H), q) and if G is the function defined by Z t G(t) := T (t − s)g(s)ds −∞

for each t ∈ R, then G ∈ P APT (R, Lp (P, H), q). Proof. Since g ∈ P APT (R, Lp (P, H), q), there exist g1 ∈ APT (R, Lp (P, H)) and g2 ∈ P APT0 (R, Lp (P, H), q), such that g = g1 + g2 . Then G(t) can be decomposed as Z t Z t G(t) = T (t − s)g1 (s)ds + T (t − s)g2 (s)ds =: G1 (t) + G2 (t). −∞

−∞

Next we show that G1 (t) ∈ APT (R, Lp (P, H)) and G2 (t) ∈ P APT0 (R, Lp (P, H), q). Thus, the following verification procedure is divided into three steps. Step 1. G1 ∈ U P C(R, Lp (P, H)). Let t0 , t00 ∈ (ti , ti+1 ), i ∈ Z, t00 < t0 . By (H1), for any ε > 0, there exists 0 < ξ < ( 2˜gε1 )1/p such that 0 < t0 − t00 < ξ, we have k T (t0 − t00 ) − I kp ≤

δ˜1 ε , 2˜ g1

15

1357

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

where g˜1 = 2p−1 M p k g1 kp∞ , δ˜2 = δ −p . Using H¨older’s inequality, we have E k G1 (t0 ) − G1 (t00 ) kp w Z t00 wp w w p−1 w 00 0 00 ≤ 2 Ew T (t − s)[T (t − t ) − I]g1 (s)dsw w −∞ wp w Z t0 w w +2p−1 E w T (t0 − s)g1 (s)dsw w w t00

µZ

t00

≤ 2p−1 M p k T (t0 − t00 ) − I kp µZ ×

¶p−1 −s)

ds

−∞



t00

−δ(t00 −s)

e −∞

p−1

+2

00

e−δ(t

µZ

M

t0

p

p

E k g1 (s) k ds

−δ(t0 −s)

e

¶p−1 µ Z

t0

ds

¶ −δ(t0 −s)

e

t00

t0

≤ 2p−1 M p k T (t0 − t00 ) − I kp

p

E k g1 (s) k ds

1 sup E k g1 (s) kp δ p s∈R

+2p−1 M p (t0 − t00 )p sup E k g1 (s) kp s∈R

< 2p−1 M p k g1 kp∞
0, let Ωε be a relatively dense set of R formed by ε-periods of F. For τ ∈ Ωε and 0 < η < min{ε, γ/2}, we have E k G1 (t + τ ) − G1 (t) kp wp wZ t w w w T (t − s)[g1 (s + τ ) − g1 (s)]dsw ≤ Ew w −∞ µZ t ¶p−1 ≤ Mp e−δ(t−s) ds µZ × ≤ Mp

−∞ t



−δ(t−s)

e

−∞ µZ t

p

E k g1 (s + τ ) − g1 (s) k ds ¶p−1

e−δ(t−s) ds

−∞

· X i−1 Z ×

+

tj+1 −η

j=−∞

tj +η

Z

tj +η

i−1 X j=−∞

e−δ(t−s) E k g1 (s + τ ) − g1 (s) kp ds

e−δ(t−s) E k g1 (s + τ ) − g1 (s) kp ds

tj

16

1358

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

i−1 Z X

+

t

−δ(t−s)

+

e−δ(t−s) E k g1 (s + τ ) − g1 (s) kp ds

tj+1 −η

j=−∞

Z

tj+1

e

¸ E k g1 (s + τ ) − g1 (s) k ds . p

ti

Since g1 ∈ APT (R, Lp (P, H)), one has E k g1 (t + τ ) − g1 (t) kp < ε for all t ∈ [tj + η, tj+1 − η], j ∈ Z, j ≤ i, and t − s ≥ t − ti + ti − (tj+1 − η) ≥ t − ti + γ(i − 1 − j) + η. Then, i−1 Z X j=−∞

tj+1 −η

e−δ(t−s) E k g1 (s + τ ) − g1 (s) kp

tj +η

≤ε

i−1 Z X

tj +η

e−δ(t−s) ds

tj +η

j=−∞

i−1 Z X

tj+1 −η



i−1 ε X −δ(t−tj+1 +η) e δ j=−∞



i−1 ε X −δγ(i−j−1) e δ j=−∞



ε , δ(1 − e−δγ )

e−δ(t−s) E k g1 (s + τ ) − g1 (s) kp ds

tj

j=−∞

p−1

≤2

sup E k g1 (s) k

i−1 Z X

p

s∈R

j=−∞ i−1 X

≤ 2p−1 k g1 kp∞ εeδη

tj +η

e−δ(t−s) ds

tj

e−δ(t−tj )

j=−∞

≤ 2p−1 k g1 kp∞ εeδη e−δ(t−ti )

i−1 X

e−δγ(i−j)

j=−∞

2p−1 k g1 kp∞ eδγ/2 ε ≤ . 1 − e−δγ Similarly, one has i−1 Z X j=−∞

tj+1

˜ 3 ε, e−δ(t−s) E k g1 (s + τ ) − g1 (s) kp ds ≤ M

tj+1 −η

17

1359

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Z

t

˜ 4 ε, e−δ(t−s) E k g1 (s + τ ) − g1 (s) kp ds ≤ M

ti

˜ 3, M ˜ 4 are some positive constants. Therefore, we get that E k G1 (t + where M ¯2 ε for a positive constant N ¯2 . Hence, G1 ∈ APT (R, Lp (P, H)). τ ) − G1 (t) kp ≤ N 0 p Step 3. G2 ∈ P APT (R, L (P, H), q). In fact, for r > 0, one has Z r 1 sup E k G2 (θ) kp dt 2r −r θ∈[t−q,t] wZ θ wp Z r w w 1 w T (θ − s)g2 (s)dsw sup E = w dt 2r −r θ∈[t−q,t] w −∞ wZ ∞ wp Z r w w 1 w dt T (s)g sup E w (θ − s)ds = 2 w w 2r −r θ∈[t−q,t] 0 ¶p−1 Z r µZ ∞ 1 e−δs ds ≤ Mp 2r −r 0 Z ∞ −δs × e sup E k g2 (θ − s) kp dsdt θ∈[t−q,t]

0

µZ

= Mp 1 × 2r

Z



¶p−1 Z

e−δs ds

0 r



e−δs ds

0

sup

E k g2 (θ − s) kp dt.

−r θ∈[t−q,t]

Since g2 ∈ P APT0 (R, Lp (P, Hβ ), q), it follows that g2 (·−s) ∈ P APT0 (R, Lp (P, H), q) for each s ∈ R by Remark 2.1, hence wp wZ θ Z r w w 1 w sup E w T (θ − s)g2 (s)dsw w dt → 0 as r → ∞ 2r −r θ∈[t−p,t] −∞ for all s ∈ R. Using the Lebesgue’s dominated convergence theorem, we have G2 ∈ P APT0 (R, Lp (P, H), q). This completes the proof. Lemma 3.3. Assume that (H1) holds. If f ∈ P APT (R, Lp (P, L02 ), q) and if F is the function defined by Z t F (t) := T (t − s)f (s)ds −∞

for each t ∈ R, then F ∈ P APT (R, Lp (P, H), q). Proof. Since f ∈ P APT (R, Lp (P, L02 )), there exist f1 ∈ APT (R, Lp (P, L02 )) and f2 ∈ P APT0 (R, Lp (P, L02 ), q), such that f = f1 + f2 . Hence, Z t T (t − s)f1 (s)dW (s) F (t) = −∞ Z t

+

T (t − s)f2 (s)dW (s) =: F1 (t) + F2 (t). −∞

18

1360

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Next we show that F1 (t) ∈ APT (R, Lp (P, H)) and F2 (t) ∈ P APT0 (R, Lp (P, H), q). Thus, the following verification procedure is divided into three steps. Step 1. F1 ∈ U P C(R, Lp (P, H)). Let t0 , t00 ∈ (ti , ti+1 ), i ∈ Z, t00 < t0 . By (H4), for any ε > 0, there exists 0 < ξ < ( 2fε˜ )p/2(p−1) such that 0 < t0 − t00 < ξ, we have for p > 2, 1

k T (t0 − t00 ) − I kp ≤

δ˜3 ε , 2f˜1

pδ (p−2)/2 pδ where f˜1 = 2p−1 M p Cp k f1 kp∞ , δ˜3 = ( p−2 ) older’s inequality 2 . Using H¨ and the Ito integral [42], we have

E k F1 (t0 ) − F1 (t00 ) kp w Z t00 wp w w p−1 w 00 0 00 ≤ 2 Ew T (t − s)[T (t − t ) − I]f1 (s)dW (s)w w −∞ w Z t0 wp w w 0 w +2p−1 E w T (t − s)f (s)dW (s) 1 w 00 w t · Z t00 00 ≤ 2p−1 M p Cp E e−2δ(t −s) k T (t0 − t00 ) − I k2 −∞ ¸p/2

× k f1 (s) k2L0 ds 2

·Z +2p−1 M p Cp E

t0

t00

¸p/2

0

e−2δ(t −s) k f1 (s) k2L0 ds 2

µZ

≤ 2p−1 M p Cp k T (t0 − t00 ) − I kp µZ ×

00 −p 2 δ(t −s)

e

µZ

+2p−1 M p Cp t0

t0 t00

0 −p 2 δ(t −s)

e t00

p

00

e− p−2 δ(t

−s)

ds

ds sup k f1 (s) kpL0 2

s∈R

−∞

µZ ×

t

−∞



t00

¶ p−2 p

00

p

0

e− p−2 δ(t −s) ds

¶ p−2 p

¶ ds sup k f1 (s) kpL0 s∈R

2

p−2 ˜ µ pδ ¶ p pδ p−1 p p δ3 ε ≤ 2 M Cp k f1 k∞ 2 2f˜1 p − 2 ·µ ¶p/2(p−1) ¸2(p−2)/p ε +2p−1 M p Cp k f1 kp∞ 2f˜1 ε ε < + = ε. 2 2

19

1361

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

For p = 2. Let ε > 0, there exists 0 < ξ
0, let Ωε be a relatively dense set of R formed by ε-periods of F. For τ ∈ Ωε and 0 < η < min{ε, γ/2}, we have E k F1 (t + τ ) − F1 (t) kp wZ t wp w w w = Ew T (t − s)[f1 (s + τ ) − f1 (s)]dW (s)w w −∞ ·Z t ¸p/2 ≤ Cp E k T (t − s) k2 k f1 (s + τ ) − f1 (s) k2L0 ds 2

−∞

·Z

≤ Cp M p E

¸p/2

t

−∞

µZ

t

≤ Cp M p

e−2δ(t−s) k f1 (s + τ ) − f1 (s) k2L0 ds 2

p

e− p−2 δ(t−s) ds

¶ p−2 p

−∞

· X i−1 Z ×

+

j=−∞

tj +η

i−1 Z X

tj +η

tj

j=−∞

+

tj+1 −η

i−1 Z X

t

+ ti

2

p

e− 2 δ(t−s) E k f1 (s + τ ) − f1 (s) kpL0 ds

tj+1

tj+1 −η

j=−∞

Z

p

e− 2 δ(t−s) E k f1 (s + τ ) − f1 (s) kpL0 ds

2

p

e− 2 δ(t−s) E k f1 (s + τ ) − f1 (s) kpL0 ds 2

p

e− 2 δ(t−s) E k f1 (s + τ ) − f1 (s) kpL0 2

¸ ds .

20

1362

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Since f1 ∈ APT (R, Lp (P, L02 )), one has E k f1 (t + τ ) − f1 (t) kpL0 < ε 2

for all t ∈ [tj + η, tj+1 − η] and j ∈ Z, j ≤ i. Then, i−1 Z X j=−∞

tj+1 −η

tj +η

≤ε

p

e− 2 δ(t−s) E k f1 (s + τ ) − f1 (s) kpL0 ds 2

i−1 Z X

j=−∞

tj +η

p

e− 2 δ(t−s) ds

tj +η

j=−∞

i−1 Z X

tj+1 −η



i−1 2 X − p δ(t−tj+1 +η) e 2 δp j=−∞



i−1 2ε X − p δγ(i−j−1) e 2 δp j=−∞



2ε , δp(1 − e−δγ )

p

e− 2 δ(t−s) E k f1 (s + τ ) − f1 (s) kpL0 ds 2

tj

i−1 Z X

≤ 2p−1 sup E k f1 (s) kpL0 2

s∈R

j=−∞ p

tj+1 +η

tj p

≤ 2p−1 sup E k f1 (s) kpL0 εe 2 δη e− 2 δ(t−ti ) 2

s∈R

p

p−1

2



tj+1 −η

Z

t

ti

p

e− 2 δα(i−j)

p

2

i−1 X

p

e− 2 δγ(i−j)

j=−∞

k f1 kp∞ eδγ/4 ε . p 1 − e− 2 δγ

Similarly, one has i−1 Z tj+1 X j=−∞

i−1 X j=−∞

≤ 2p−1 sup E k f1 (s) kpL0 εe 2 δη e− 2 δ(t−ti ) s∈R

p

e− 2 δ(t−s) ds

p

˜ 5 ε, e− 2 δ(t−s) E k f1 (s + τ ) − f1 (s) kpL0 ds ≤ M 2

p ˜ 6 ε, e− 2 δ(t−s) E k f1 (s + τ ) − f1 (s) kpL0 ds ≤ M 2

˜ 5, M ˜ 6 are some positive constants. Therefore, we get that E k F1 (t + where M ¯3 ε for a positive constant N ¯3 . For p = 2, we have τ ) − F1 (t) kp ≤ N E k F1 (t + τ ) − F1 (t) k2 21

1363

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Z 2

t

≤M E −∞ i−1 X

· ≤ M2

j=−∞

+

i−1 Z X j=−∞

+

Z

t

+ ti

2

Z

tj+1 −η

tj +η

tj +η

tj

i−1 Z X j=−∞

e−2δ(t−s) k f1 (s + τ ) − f1 (s) k2L0 ds e−2δ(t−s) E k f1 (s + τ ) − f1 (s) k2L0 ds 2

e−2δ(t−s) E k f1 (s + τ ) − f1 (s) k2L0 ds 2

tj+1

tj+1 −η

e−2δ(t−s) E k f1 (s + τ ) − f1 (s) k2L0 ds 2

e−2δ(t−s) E k f1 (s + τ ) − f1 (s) k2L0 2

¸ ds .

¯4 ε for a positive constant N ¯4 . Similarly, we get that E k F1 (t + τ ) − F1 (t) k2 ≤ N p Hence, F1 ∈ APT (R, L (P, H)). Step 3. F2 ∈ P APT0 (R, Lp (P, H), q). In fact, for r > 0, one has for p > 2, Z r 1 sup E k F2 (θ) kp dt 2r −r θ∈[t−q,t] wZ θ wp Z r w w 1 w T (θ − s)f2 (s)dW (s)w = sup E w w dt 2r −r θ∈[t−q,t] −∞ wZ ∞ wp Z r w w 1 w dt = sup E w T (s)f (θ − s)dW (s) 2 w w 2r −r θ∈[t−q,t] 0 ·Z ∞ ¸p/2 Z r 1 ≤ Cp sup E e−2s k f2 (θ − s) k2L0 ds dt 2 2r −r θ∈[t−q,t] 0 ¶ p−2 Z r µZ ∞ p p 1 − p−2 δs p e ≤ M Cp ds 2r −r 0 Z ∞ p × e− 2 δs sup E k f2 (θ − s) kpL0 dsdt 0

2

θ∈[t−q,t]

µZ ∞ ¶ p−2 Z ∞ p p−2 p = M p Cp e− p δs ds e− 2 δs ds 0 Z r 0 1 × sup E k f2 (θ − s) kpL0 dt. 2 2r −r θ∈[t−q,t] For p = 2, we have wZ θ w2 Z r w w 1 w sup E T (θ − s)f2 (s)dW (s)w w dt 2r −r θ∈[t−q,t] w −∞ Z r Z ∞ 1 ≤ M2 e−2s sup E k f2 (θ − s) k2L0 dsdt 2 2r −r 0 θ∈[t−q,t] 22

1364

YAN ET AL 1343-1386

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

µZ



= M2 0

¶ e−2δs ds

1 2r

Z

r

sup −r θ∈[t−q,t]

E k f2 (θ − s) kpL0 dt. 2

Since f2 ∈ P APT0 (R, Lp (P, L02 ), q), it follows that f2 (·−s) ∈ P APT0 (R, Lp (P, L02 ), q) for each s ∈ R by Remark 2.1, hence wZ θ wp Z r w w 1 w dt → 0 as r → ∞ T (θ sup E w − s)f (s)dW (s) 2 w w 2r −r θ∈[t−q,t] −∞ for all s ∈ R. Using the Lebesgue’s dominated convergence theorem, we have F2 ∈ P APT0 (R, Lp (P, H), q). This completes the proof. Lemma 3.4. Assume that (H1) holds. If γi ∈ P AP (Z, Lp (P, H)), i ∈ Z and if γ˜i is the function defined by X Ri (t) := T (t − ti )γi ti 0. This means that A  B is quasihyponormal. Assume that A and B are p-quasihyponormal. Lemmas 1 and 3 together imply that (A  B)∗ ((A  B)∗ (A  B)) (A  B) p = (A∗  B ∗ ) (A∗ A  B ∗ B) (A  B) p

= A∗ (A∗ A)p A  B ∗ (B ∗ B)p B > A∗ (AA∗ )p A  B ∗ (BB ∗ )p B p = (A  B)∗ (AA∗  BB ∗ ) (A  B) = (A  B)∗ ((A  B)(A  B)∗ ) (A  B). p

This show that A  B is p-quasihyponormal. Kim [13] investigated the tensor product of log-hyponormal (reps. w-hyponormal, iw-hyponormal) operators. Now, we consider the case of Tracy-Singh products. Lemma 15 ([6]). Let S and T be positive invertible operators. Then log T > ( p p )1 log S if and only if T p > T 2 S p T 2 2 for all p > 0. Theorem 16. Let A ∈ B(H) and B ∈ B(K) be positive invertible operators. If A and B are log-hyponormal, then A  B is also log-hyponormal. Proof. Assume that A and B are log-hyponormal operators. Since A and B are invertible, Lemma 1 implies that A  B is invertible. Using Lemmas 1 and 3,

1407

Arnon Ploymukda ET AL 1401-1413

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Tracy-Singh Products and Classes of Operators

we obtain that for any p > 0, [(AB)∗ (A  B)]p = (A∗ A  B ∗ B)p = (A∗ A)p  (B ∗ B)p p

p

p

p

p

p

> [(A∗ A) 2 (AA∗ )p (A∗ A) 2 ] 2  [(B ∗ B) 2 (BB ∗ )p (B ∗ B) 2 ] 2 1

p

p

1

= [(A∗ A) 2 (AA∗ )p (A∗ A) 2  (B ∗ B) 2 (BB ∗ )p (B ∗ B) 2 ] 2 p

p

1

= [(A∗ A  B ∗ B) 2 (AA∗  BB ∗ ) (A∗ A  B ∗ B) 2 ] 2 p

p

1 p

= [((A  B)∗ (A  B)) 2 ((A  B)(A  B)∗ ) ((A  B)∗ (A  B)) 2 ] 2 . p

1

By Lemma 15, we have log(A  B)∗ (A  B) > log(A  B)(A  B)∗ . This means that A  B is log-hyponormal. Lemma 17 ([1]). An operator T ∈ B(H) is w-hyponormal if and only if |T | > ( 1 ) 12 ( ) 12 1 1 1 |T | 2 |T ∗ ||T | 2 and |T ∗ | 6 |T ∗ | 2 |T ||T ∗ | 2 . Theorem 18. Let A ∈ B(H) and B ∈ B(K). If A and B are w-hyponormal, then A  B is also w-hyponormal. Proof. Assume that A and B are w-hyponormal. By applying Lemmas 1 and 3, we have |A  B| = |A|  |B| ( 1 ) 12 ( 1 ) 12 1 1 > |A| 2 |A∗ ||A| 2  |B| 2 |B ∗ ||B| 2 ) 12 ( 1 1 1 1 = |A| 2 |A∗ ||A| 2  |B| 2 |B ∗ ||B| 2 [( 1 ) ( 1 )] 21 1 1 = |A| 2  |B| 2 (|A∗ |  |B ∗ |) |A| 2  |B| 2 ) 12 ( 1 1 . = |A  B| 2 |(A  B)∗ ||A  B| 2 Similarly, we get |(A  B)∗ | = |A∗ |  |B ∗ | ) 12 ( ) 12 ( 1 1 1 1 6 |A∗ | 2 |A||A∗ | 2  |B ∗ | 2 |B||B ∗ | 2 ( ) 12 1 1 1 1 = |A∗ | 2 |A||A∗ | 2  |B ∗ | 2 |B||B ∗ | 2 [( ) ( )] 12 1 1 1 1 = |A∗ | 2  |B ∗ | 2 (|A|  |B|) |A∗ | 2  |B ∗ | 2 ( ) 12 1 1 = |(A  B)∗ | 2 |A  B||(A  B)∗ | 2 . By Lemma 17, the operator A  B is w-hyponormal.

1408

Arnon Ploymukda ET AL 1401-1413

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A. Ploymukda, P. Chansangiam, W. Lewkeeratiyutkul

Corollary 19. Let A ∈ B(H) and B ∈ B(K) be invertible operators. If A and B are iw-hyponormal, then A  B is also iw-hyponormal. Proof. It follows from Lemma 1, Proposition 18 and the fact that every iwhyponormal operator is w-hyponormal and every invertible w-hyponormal operator is iw-hyponormal ([13]).

3.3

Paranormality

Consider the following paranormality of operators; see [2, 3, 14, 18]. Definition 20. Let M > 1 be a constant. An operator T ∈ B(H) is said to be • M -paranormal if M 2 T ∗2 T 2 − 2αT ∗ T + α2 I > 0 for all α > 0 ; • paranormal if T ∗2 T 2 − 2αT ∗ T + α2 I > 0 for all α > 0 ; • M ∗ -paranormal if M 2 T ∗2 T 2 − 2αT T ∗ + α2 I > 0 for all α > 0 ; • ∗-paranormal if T ∗2 T 2 − 2αT T ∗ + α2 I > 0 for all α > 0. Recall that an operator T ∈ B(H) is an isometry if T ∗ T = I; it is called an involution if T 2 = I. Proposition 21. Let A ∈ B(H), X ∈ B(K) and let M > 1 be a constant. If X is an isometry and A is M -paranormal (resp. paranormal), then A  X and X  A are M -paranormal (resp. paranormal). Proof. Assume that A is M -paranormal and X is an isometry. It follows that for any α > 0 we have M 2 (A  X)∗2 (A  X)2 − 2α(A  X)∗ (A  X) + α2 (I  I) = M 2 A∗2 A2  X ∗2 X 2 − 2αA∗ A  X ∗ X + α2 I  I = M 2 A∗2 A2  I − 2αA∗ A  I + α2 I  I ( ) = M 2 A∗2 A2 − 2αA∗ A + α2 I  I > 0. Thus A  X is M -paranormal. Similarly, the operator X  A is M -paranormal. The case of paranormality is just the case of M -paranormality when M = 1. Proposition 22. Let A ∈ B(H), X ∈ B(K) and let M > 1 be a constant. If X is a self-adjoint involution and A is an M ∗ -paranormal (resp. ∗-paranormal) operator, then A  X and X  A are M -paranormal (resp. ∗-paranormal). Proof. The proof is similar to that of Proposition 21. Ando [2] showed that for any paranormal operator A, the tensor products A ⊗ I and I ⊗ A are paranormal. The next result is an extension of this fact to the case of Tracy-Singh products. Corollary 23. Let A ∈ B(H) and let M > 1 be a constant. If A satisfies one of the following properties, then the same property hold for A  I and I  A: paranormal, M -paranormal, ∗-paranormal, M ∗ -paranormal.

1409

Arnon Ploymukda ET AL 1401-1413

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Tracy-Singh Products and Classes of Operators

4

Tracy-Singh products and operators of type nilpotent, Hermitian, and isometry

In this section, we discuss relationship between Tracy-Singh products and certain classes of operators, namely, nilpotent operators, (skew)-Hermitian operators, (co)isometry operators, and unitary operators. Recall that an operator T ∈ B(H) is said to be nilpotent if T k = 0 for some natural number k. Proposition 24. Let A ∈ B(H) and B ∈ B(K). Then A  B is nilpotent if and only if A or B is nilpotent. Proof. It follows directly from Lemmas 1 and 4. Recall that an operator T ∈ B(H) is Hermitian if T ∗ = T , and T is skewHermitian if T ∗ = −T . It follows from Lemma 1 that the Tracy-Singh product of Hermitian operators is also Hermitian. The Tracy-Singh product of two skew-Hermitian operators is Hermitian. The Tracy-Singh product between a Hermitian operator and a skew-Hermitian operator is skew-Hermitian. Proposition 25. Let A ∈ B(H) and B ∈ B(K) be nonzero operators. 1. Assume AB is Hermitian. Then A is Hermitian (resp. skew-Hermitian) if and only if B is Hermitian (resp. skew-Hermitian). 2. Assume A  B is skew-Hermitian. Then A is Hermitian (resp. skewHermitian) if and only if B is skew-Hermitian (resp. Hermitian). Proof. It follows directly from Lemmas 1 and 4. Recall that an operator T ∈ B(H) is a coisometry if T T ∗ = I. A unitary operator is an operator which is both an isometry and a coisometry. Stochel [21] gave a necessary and sufficient condition for A ⊗ B to be an isometry (resp. a coisometry, unitary). Now, we will extend this result to the case of Tracy-Singh products. n,n Proposition 26. Let A = [Aij ]m,m i,j=1 ∈ B(H) and B = [Bkl ]k,l=1 ∈ B(K) be operator matrices such that Aij and Bkl are nonzero operators for all i, j = 1, . . . , m and k, l = 1, . . . , n. Then A  B is an isometry (resp. a coisometry) if and only if so are αA and α−1 B for some α ∈ C \ {0}.

Proof. If αA and α−1 B are isometries, then by Lemma 1, (A  B)∗ (A  B) = A∗ A  B ∗ B = (αA)∗ (αA)  (α−1 B)∗ (α−1 B) = I  I. Suppose that A  B is an isometry. Then A∗ A  B ∗ B = I  I. Thus, by Proposition 6,√there exists β ∈ C \ {0} such that βA∗ A = I and β −1 B ∗ B = I. Setting α = β, we obtain (αA)∗ (αA) = I and (α−1 B)∗ (α−1 B) = I. Hence αA and α−1 B are isometries. The proof for the case of coisometry is similar to that of isometry.

1410

Arnon Ploymukda ET AL 1401-1413

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A. Ploymukda, P. Chansangiam, W. Lewkeeratiyutkul

n,n Theorem 27. Let A = [Aij ]m,m i,j=1 ∈ B(H) and B = [Bkl ]k,l=1 ∈ B(K) be operator matrices such that Aij and Bkl are nonzero operators for all i, j = 1, . . . , m and k, l = 1, . . . , n. Then A  B is unitary if and only if so are αA and α−1 B for some α ∈ C \ {0}.

Proof. If αA and α−1 B are unitary, then Lemma 1 implies (A  B)∗ (A  B) = A∗ A  B ∗ B = (αA)∗ (αA)  (α−1 B)∗ (α−1 B) = I. Similarly, we have (A  B)(A  B)∗ = I. Conversely, suppose that A  B is unitary. We know that A  B is both an isometry and a coisometry. By Proposition 26, there exist α, β ∈ C\{0} such that αA and α−1 B are isometries, and βA and β −1 B are coisometries. We have (αA)∗ (αA) = I = (βA)(βA)∗ and (α−1 B)∗ (α−1 B) = I = (β −1 B)(β −1 B)∗ . Since A  B is normal, so are A and B (Theorem 9). Then α2 AA∗ = α2 A∗ A = β 2 AA∗ and α−2 BB ∗ = α−2 B ∗ B = β −2 BB ∗ . Since α, β > 0, it comes to the conclusion that α = β. Hence αA and α−1 B are unitary.

5

Tracy-Singh products and class-A type operators

The following classes of operators bring attention to operator theorists; see more information in [8, 9, 11, 12, 20]. Definition 28. Let k ∈ N. An operator T ∈ B(H) is said to be • class A if |T 2 | > |T |2 ; ( ) 1 • class A(k) if T ∗ |T |2k T k+1 > |T |2 ; • quasi-class A if T ∗ |T 2 |T > T ∗ |T |2 T ; • quasi-class (A, k) if T ∗k |T 2 |T k > T ∗k |T |2 T k ; • ∗-class A if |T 2 | > |T ∗ |2 ; • quasi-∗-class A if T ∗ |T 2 |T > T ∗ |T ∗ |2 T ; • quasi-∗-class (A, k) if T ∗k |T 2 |T k > T ∗k |T ∗ |2 T k . The next theorem shows that such classes of operators are preserved under Tracy-Singh products. Theorem 29. Let A ∈ B(H), B ∈ B(K), and let k ∈ N. If both A and B satisfy one of the following properties, then the same property holds for A  B: class A(k), class A, quasi-class (A, k), quasi-class A, ∗-class A, quasi-∗-class A, quasi-∗-class (A, k).

1411

Arnon Ploymukda ET AL 1401-1413

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Tracy-Singh Products and Classes of Operators

Proof. Assume that A and B are class A(k). By Lemmas 1 and 3, we get [ ( ) ] 1 1 [(A  B)∗ |A  B|2k (A  B)] k+1 = (A∗  B ∗ ) |A|2k  |B|2k (A  B) k+1 ( ) 1 = A∗ |A|2k A  B ∗ |B|2k B k+1 ( ) 1 ( ) 1 = A∗ |A|2k A k+1  B ∗ |B|2k B k+1 > |A|2  |B|2 = |A  B|2 . Hence AB is a class A(k) operator. Now, assume that A and B are quasi-class A(k). Applying Lemmas 1 and 3, we get (A  B)k∗ |(A  B)2 |(A  B)k = (Ak∗  B k∗ )(|A2 |  |B 2 |)(Ak  B k ) = Ak∗ |A2 |Ak  B k∗ |B 2 |B k > Ak∗ |A|2 Ak  B k∗ |B|2 B k = (Ak∗  B k∗ )(|A|2  |B|2 )(Ak  B k ) = (A  B)k∗ |A  B|2 (A  B)k . Hence, A  B is a quasi-class A(k) operator. The proof for class A (resp. quasiclass A) is done by replacing k = 1 in the case of class A(k) (resp. quasi-class (A, k)). The proof for the case of quasi ∗-class (A, k) is similar to that of quasiclass (A, k). Similarly, the proof for ∗-class A (resp. quasi-∗-class A) is done by replacing k = 0 (resp. k = 1) in the case of quasi-∗-class (A, k). Acknowledgement. This research was supported by Thailand Research Fund grant no. MRG6080102.

References [1] A. Aluthge, D. Wang, w-hyponormal operators II. Integral Equations Operator Theory, 37, 324-331 (2000). [2] T. Ando, Operators with a norm condition. Acta Sci. Math. (Szeged), 33, 169-178 (1972). [3] S. C. Arora, J. K. Thukral, On a class of operators. Glasnik Math., 41, 381-386 (1986). [4] A. Bucar, Posinormality versus hyponormality for Ces´oro operators. Gen. Math., 11, 33-46 (2003). [5] B. P. Duggal, Tensor products of operators-strong stability and phyponormality. Glasg. Math. J., 42, 371-381 (2000). [6] M. Fujii, J. F. Jiang, E. Kamei, K. Tanahashi, A Characterization of Chaotic Order and a Problem. J. lnequal. Appl., 2, 149-156 (1998).

1412

Arnon Ploymukda ET AL 1401-1413

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

A. Ploymukda, P. Chansangiam, W. Lewkeeratiyutkul

[7] T. Furuta, Invitation to Linear Operators: From Matrices to Bounded Linear Operators on a Hilbert Space, Taylor & Francis, New York, 2001. [8] T. Furuta, M. Ito, T. Yamazaki, A subclass of paranormal operators including class of log-hyponormal and several related classes. Sci. Math., 1, 389-403 (1998). [9] A. Gupta, N. Bhatia, On (n, k)-quasiparanormal weighted composition operators. Int. J. Pure Appl. Math., 91, 23-32 (2014). [10] I. H. Jeon, B. P. Duggal, On operators with an absolute value condition. J. Korean Math. Soc., 41, 617-627 (2004). [11] I. H. Jeon, I. H. Kim, On operators satisfying T ∗ |T 2 |T > T ∗ |T |2 T , Linear Algebra Appl., 418, 854-862 (2006). [12] G. H. Kim, J. H. Jeon, A study on generalized quasi-class A operators. Korean J. Math., 17, 155-159 (2009). [13] I. H. Kim, Tensor products of log-hyponormal operators. Bull. Korean Math. Soc., 42, 269-277 (2005). [14] M. M. Kutkut, B. Kashkari, On the class of class M -paranormal (M ∗ paranormal) operators. M. Sci. Bull. (Nat. Sci), 20, 129-144 (1993). [15] A. Ploymukda, P. Chansangaim, W. Lewkeeratiyutkyl, Algebraic and order properties of Tracy-Singh product for operator matrices. J. Comput. Anal. Appl., 24, 656-664 (2018). [16] A. Ploymukda, P. Chansangaim, W. Lewkeeratiyutkyl, Analytic properties of Tracy-Singh product for operator matrices. J. Comput. Anal. Appl., 24, 665-674 (2018). [17] H. C. Rhaly, B. E. Rhoades, Posinormal factorable matrices with a constant main diagonal. Rev. Un. Mat. Argentina, 55, 19-24 (2014). [18] D. Senthilkumar, T. Prasad, M class Q composition operators. Sci. Magna, 6, 25-30 (2010). [19] A. Sekar, C. V. Seshaiah, D. Senthil Kumar, P. Maheswari Naik, Isolated points of spectrum for quasi-∗-class A operators. Appl. Math. Sci., 6, 67776786 (2012). [20] J. L. Shen, F. Zuo, C. S. Yang, On operators satisfying T ∗ |T 2 |T > T ∗ |T ∗ |2 T . Acta Math. Sinica (Eng. Ser.), 26, 2109-2116 (2010). [21] J. Stochel, Seminormality of operators from their tensor product. Proc. Amer. Math. Soc., 124, 135-140 (1996). [22] J. Zanni, C. S. Kubrsly, A note on compactness of tensor products. Acta Math. Univ. Comenian. (N.S.), 84, 59-62 (2015).

1413

Arnon Ploymukda ET AL 1401-1413

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On unicity theorems of difference of entire or meromorphic functions YONG LIU

ABSTRACT. In this article, we investigate the uniqueness problems of differences of meromorphic functions and obtain some results which can be viewed as discrete analogues of the results given by Yi. An example is given to show the results in this paper are best possible.

1

INTRODUCTION

In this paper, we assume that the reader is familiar with the fundamental results and the standard notations of the Nevanlinna theory (see, e.g., [7, 18]). Let f (z) and g(z) be two non-constant meromorphic functions in the complex plane. By S(r, f ), we denote any quantity satisfying S(r, f ) = o(T (r, f )) as r → ∞, possibly outside a set of r with finite linear measure. Then the meromorphic function α is called a small function of f (z), if T (r, α) = S(r, f ). If f (z) − α and g(z) − α have same zeros, counting multiplicity (ingoring multiplicity), then we say f (z) and g(z) share the small function α CM (IM). For a small function α related to f (z), we define ) ( 1 m r, f −α δ(α, f ) = lim inf . r→∞ T (r, f ) In 1976, Yang [17] proposed the following problem: Suppose that f (z) and g(z) are two entire functions such that f (z) and g(z) share 0 CM and f ′ (z) and g ′ (z) share 1 CM . What can be said about the relationship between f (z) and g(z)?

2010 Mathematics Subject Classification. Primary 30D35, 39B12. ∗

The work was supported by the NNSF of China (No.10771121, 11301220, 11401387, 11661052), the NSF of

Zhejiang Province, China (No. LQ 14A010007), the NSF of Shandong Province, China (No. ZR2012AQ020) and the Fund of Doctoral Program Research of Shaoxing College of Art and Science(20135018).

Key words:meromorphic functions, difference equations, uniqueness, finite order. 1

1414

YONG LIU 1414-1427

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

In [13], Yi answered the question posed by C. C. Y. These results may be stated as follows: Theorem A. Let f (z) and g(z) be two nonconstant entire functions. Assume that f (z) and g(z) share 0 CM , f ′ (z) and g ′ (z) share 1 CM and δ(0, f ) > 21 . Then f ′ (z)g ′ (z) ≡ 1 unless f (z) ≡ g(z).

Currently, there has been an increasing interest in studying difference equations in the complex plane. For example, Halburd and Korhonen [3, 4] established a version of Nevanlinna theory based on difference operators. Ishizaki and Yanagihara [7] deveploped a version of Wiman-Valiron theory for difference equations of entire functions of small growth. Also Chiang and Feng [1] has a difference version of Wiman-Valiron. The main purpose of this paper is to establish partial difference counterparts of Theorem A. Our results can be stated as follows: Theorem 1.1. Let cj , aj , bj (j = 1, 2, · · · , k) be complex constants, and let f (z) and g(z) be two nonconstant entire functions of finite ∑ ∑ order. Assume that f (z) and g(z) share 0 CM , L(f ) = ki=1 ai f (z + ci ) and L(g) = ki=1 bi g(z + ci ) share 1 CM and δ(0, f ) > 32 . Then L(f )L(g) ≡ 1 or L(f ) ≡ L(g). Theorem 1.2. Let c ∈ C \ {0}, and let f (z) and g(z) be two nonconstant meromorphic functions of finite order satisfying f (z + c) and g(z + c) share 1 CM, f (z) and g(z) share ∞ CM . If ( 1) ( 1) + N r, + 2N (r, f ) < (λ + o(1))T (r), (1.1) N r, f g where λ < 1 and T (r) = max{T (r, f ), T (r, g)}, then f (z)g(z) ≡ 1 or f (z) ≡ g(z). The following example shows that Theorem 1.2 is exact. Example 1.1. Let f (z) = e2z + ez , g(z) = e−2z − e−z . We have that f (z + c) and g(z + c) share 1 CM, f (z) and g(z) share ∞ CM and ( 1) ( 1) + N r, + 2N (r, f ) = (λ + o(1))T (r), N r, f g but f (z) ̸≡ g(z) and f (z)g(z) ̸≡ 1.

2

Proof of Theorem 1.1

In order to prove Theorem 1.1, we need the following lemmas. The following lemma is a difference analogue of the logarithmic derivative lemma. Lemma 2.1 [3] Let f (z) be a meromorphic function of finite order and let c be a non-zero

2

1415

YONG LIU 1414-1427

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

complex number. Then we have ( f (z + c) ) m r, = S(r, f ). f (z) Lemma 2.2 Let f (z) be a nonconstant entire function of finite order, and let ci , ai (i = 1, 2, · · · , k) be complex constants. Then k ( ∑ ) T r, ai f (z + ci ) ≤ T (r, f (z)) + S(r, f ), i=1

( 1 ) ≤ N r, + S(r, f ). f (z) i=1 ai f (z + ci )

( N r, ∑k

1

)

Proof of Lemma 2.2. By Lemma 2.1, we have ∑k k k ( ∑ ) ( ∑ ) ( ai f (z + ci ) ) T r, ai f (z + ci ) = m r, ai f (z + ci ) = m r, f (z) i=1 f (z) ≤

i=1 k ∑ ( i=1

i=1

f (z + ci ) ) m r, + m(r, f (z)) + O(1) = T (r, f (z)) + S(r, f ). f (z)

(2.1)

∑k ) ( ( ) ( 1 ) 1 1 i=1 ai f (z + ci ) +S(r, f ). m r, = m r, ∑k ≤ m r, ∑k f (z) f (z) a f (z + c ) a f (z + c ) i i i i i=1 i=1 (2.2) From the first main theory and (2.2), we obtain k ) ( ( ∑ ) ( 1 ) 1 + S(r, f ). (2.3) T (r, f (z)) − N r, ≤ T r, ai f (z + ci ) − N r, ∑k f (z) i=1 ai f (z + ci ) i=1

By (2.1) and (2.3), we deduce ( N r, ∑k

( 1 ) ≤ N r, + S(r, f ). f (z) i=1 ai f (z + ci ) 1

)

(2.4)

Lemma 2.3 Assume that the conditions of Theorem 1.1 are satisfied. Then k ( ) ∑ T (r, f (z)) = O T (r, ai f (z + ci )) for r ̸∈ E, i=1 k ( ) ∑ T (r, g(z)) = O T (r, ai f (z + ci )) for r ̸∈ E, i=1 k k ( ∑ ) ( ) ∑ T r, bi g(z + ci ) = O T (r, ai f (z + ci )) for r ̸∈ E, i=1

i=1

3

1416

YONG LIU 1414-1427

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

where E is a set of finite linear measure. Proof of Lemma 2.3. By the first main theory and (2.2), we have ( 1 ) (δ(0, f ) + o(1))T (r, f (z)) ≤ m r, + S(r, f ) f (z) k ) ( ∑ ( ) 1 + S(r, f ) ≤ T r, ≤ m r, ∑k ai f (z + ci ) + S(r, f ). i=1 ai f (z + ci ) i=1 And so T (r, f (z)) ≤

(

k ) ( ∑ ) 1 + o(1) T r, ai f (z + ci ) + S(r, f ). δ(0, f )

(2.5)

i=1

Hence, we have

k ( ) ∑ T (r, f (z)) = O T (r, ai f (z + ci ) r ̸∈ E. i=1

By the second main theorem, the first main theory, Lemma 2.2 and (2.5), we have k ( ∑ ) T r, bi g(z + ci ) i=1

( < N r, ∑k

1

)

( + N r, ∑k

1

i=1 bi g(z + ci ) i=1 bi g(z + ci ) − 1 ) ( ) ( 1 1 + S(r, g) ≤ N r, + N r, ∑k g(z) i=1 bi g(z + ci ) − 1 ( ) ( 1 ) 1 = N r, + S(r, g) + N r, ∑k f (z) i=1 ai f (z + ci ) − 1

)

k ( ∑ ) + S r, bi g(z + ci ) i=1

k ( ∑ ) ≤ (1 − δ(0, f ) + o(1))T (r, f (z)) + T r, ai f (z + ci ) + S(r, g) i=1



(

) ( 1 + o(1) T r, δ(0, f )

k ∑

) ai f (z + ci ) + S(r, f ) + S(r, g).

(2.6)

i=1

Using the method similar to the proof of (2.3), we have k ( ∑ ) ( 1 ) T (r, g(z)) − N r, ≤ T r, bi g(z + ci ) + S(r, g). g(z)

(2.7)

i=1

4

1417

YONG LIU 1414-1427

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

From (2.5)-(2.7), we obtain k ( ∑ ) ( 1 ) T (r, g(z)) ≤ N r, + T r, bi g(z + ci ) + S(r, g) g(z) i=1

(

k ) ( ∑ ) 1 ) ( 1 ≤ N r, + + o(1) T r, ai f (z + ci ) + S(r, g) f (z) δ(0, f ) i=1

≤ (1 − δ(0, f ) + o(1))T (r, f (z)) +

(

k ) ( ∑ ) 1 + o(1) T r, ai f (z + ci ) + S(r, g) δ(0, f ) i=1



(

) ( 2 − 1 + o(1) T r, δ(0, f )

that is

k ∑

) ai f (z + ci ) + S(r, g) + S(r, f ),

i=1

k ( ) ∑ T (r, g(z)) = O T (r, ai f (z + ci )) r ̸∈ E.

(2.8)

i=1

From Lemma 2.2 and (2.8), we get k k ( ∑ ) ( ) ∑ T r, bi g(z + ci ) = O T (r, ai f (z + ci )) r ̸∈ E. i=1

i=1

Lemma 2.3 thus is be proved. Lemma 2.4 [10] Let f1 , f2 and f3 be three entire functions satisfying 3 ∑

fi ≡ 1.

i=1

If f1 ̸≡ constant, and 3 ∑ i=1

( 1) N r, ≤ (λ + o(1))T (r) (r ̸∈ E), fi

where T (r) = max{T (r, fi )|i = 1, 2, 3)}, and λ < 1, then f2 ≡ 1 or f3 ≡ 1. Proof of Theorem 1.1. ∑k ∑ Since L(f ) = i=1 ai f (z + ci ) and L(g) = ki=1 bi g(z + ci ) share 1 CM, we have L(f ) − 1 = ep(z) , L(g) − 1

(2.9)

where p(z) is polynomial. Let f1 = L(f ), f2 = ep(z) , f3 = −ep(z) L(g), by (2.9) and Lemma 2.2, we have f1 + f2 + f3 ≡ 1, 5

1418

YONG LIU 1414-1427

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

( 1) ( 1) N r, ≤ N r, + S(r, f ), (2.10) f1 f ( 1 ) N (r, f2 ) = N r, p(z) = 0, (2.11) e ( ) ( ( 1) ( 1) 1 1 ) N (r, f3 ) = N r, = N r, ≤ N r, +S(r, g) = N r, +S(r, g). (2.12) −ep L(g) L(g) g f By Lemma 2.3, (2.5), (2.10)-(2.12) and δ(0, f ) > 23 , we have 3 ∑ i=1

( where λ = 2

1 δ(0,f )

( 1) ( 1) N r, ≤ 2N r, + S(r, f ) + S(r, g) fi f

≤ 2(1 − δ(0, f ) + o(1))T (r, f ) + S(r, f ) + S(r, g) ( 1 ) ≤2 − 1 + o(1) T (r, L(f )) + S(r, L(f )) δ(0, f ) = (λ + o(1))T (r, L(f )) r ̸∈ E, ) − 1 < 1. From Lemma 2.4, we have f2 ≡ 1 or f3 ≡ 1.

If f2 ≡ 1, by (2.9), we obtain

L(f )−1 L(g)−1

= ep(z) ≡ 1. Hence, we have L(f ) ≡ L(g).

If f3 ≡ 1, that is −ep(z) L(g) ≡ 1. So L(g) = −e−p(z) . By L(f ) + 1 + ep(z) = 1, we have L(f ) = −ep(z) . So L(f )L(g) ≡ 1. Theorem 1.1 thus is proved.

3

Proof of Theorem 1.2

In order to prove Theorem 1.2, we need the following lemmas. Lemma 3.1 [14] Let f1 and f2 be two nonconstant meromorphic functions, and let c1 , c2 and c3 be three nonzero constants. If c1 f1 + c2 f2 = c3 , then ( 1) ( 1) T (r, f1 ) < N r, + N r, + N (r, f1 ) + S(r, f1 ). f1 f2 Lemma 3.2 [12] Let f1 , f2 , · · · , fn be linearly independent meromorphic functions satisfying ∑ n i=1 fi ≡ 1. Then for j = 1, 2, · · · , n, we have T (r, fj )
0 and that our assumption holds for n − 1. That is x4n−7

=

x4n−5

=

y4n−7

=

y4n−5

=

z4n−7

=

z4n−5

=

t4n−7

=

t4n−5

=

x−3 , (−1+t0 z−1 y−2 x−3 )n−1 x−1 , (−1+y0 x−1 t−2 z−3 )n−1 y−3 , (−1+x0 t−1 z−2 y−3 )n−1 y−1 , (−1+z0 y−1 x−2 t−3 )n−1 z−3 , (−1+y0 x−1 t−2 z−3 )n−1 z−1 , (−1+t0 z−1 y−2 x−3 )n−1 t−3 , (−1+z0 y−1 x−2 t−3 )n−1 t−1 , (−1+x0 t−1 z−2 y−3 )n−1

x4n−6 = x−2 (−1 + z0 y−1 x−2 t−3 ) x4n−4 = x0 (−1 + x0 t−1 z−2 y−3 )

n−1

n−1

y4n−6 = y−2 (−1 + t0 z−1 y−2 x−3 )

,

,

n−1

,

y4n−4 = y0 (−1 + y0 x−1 t−2 z−3 )n−1 , z4n−6 = z−2 (−1 + x0 t−1 z−2 y−3 )n−1 , z4n−4 = z0 (−1 + z0 y−1 x−2 t−3 )n−1 , t4n−6 = t−2 (−1 + y0 x−1 t−2 z−3 ) t4n−4 = t0 (−1 + t0 z−1 y−2 x−3 )

n−1

n−1

,

.

It follows from System (3) that x4n−3

=

x4n−7 −1+t4n−4 z4n−5 y4n−6 x4n−7

=

(−1+t0 z−1 y−2 x−3 )n−1 [−1+t0 z−1 y−2 x−3 ]

=

y4n−6 −1+x4n−3 t4n−4 z4n−5 y4n−6

x−3

y4n−2

=

z4n−1

t4n

=

y−2 (−1+t0 z−1 y−2 x−3 )n−1 t0 z−1 y−2 x−3 −1+ (−1+t z y x ) 0 −1 −2 −3 z4n−5 −1+y4n−2 x4n−3 t4n−4 z4n−5

=

z−1 (−1+t0 z−1 y−2 x−3 )n−1 [−1+t0 z−1 y−2 x−3 ]

=

t4n−4 −1+z4n−1 y4n−2 x4n−3 t4n−4

=

t0 (−1+t0 z−1 y−2 x−3 )n−1 t0 z−1 y−2 x−3 −1+ (−1+t z y x ) 0 −1 −2 −3

=

x−3 (−1+t0 z−1 y−2 x−3 )n ,

=

=

x−3

(−1+t0 z−1 y−2 x−3 )n−1 t0 z−1 y−2 x−3 (−1+t0 z−1 y−2 x−3 )n−1 (−1+t0 z−1 y−2 x−3 )n−1 −1+ (−1+t0 z−1 y−2 x−3 )n−1 (−1+t0 z−1 y−2 x−3 )n−1

=

y−2 (−1+t0 z−1 y−2 x−3 )n−1 t0 z−1 y−2 x−3 (−1+t0 z−1 y−2 x−3 )n−1 (−1+t0 z−1 y−2 x−3 )n−1 −1+ (−1+t0 z−1 y−2 x−3 )n (−1+t0 z−1 y−2 x−3 )n−1

= y−2 (−1 + t0 z−1 y−2 x−3 )n , =

z−1 (−1+t0 z−1 y−2 x−3 )n−1 t0 z−1 y−2 x−3 (−1+t0 z−1 y−2 x−3 )n (−1+t0 z−1 y−2 x−3 )n−1 −1+ (−1+t0 z−1 y−2 x−3 )n (−1+t0 z−1 y−2 x−3 )n−1

z−1 (−1+t0 z−1 y−2 x−3 )n ,

=

t0 (1+t0 z−1 y−2 x−3 )n−1 t0 z−1 y−2 x−3 (−1+t0 z−1 y−2 x−3 )n (−1+t0 z−1 y−2 x−3 )n−1 −1+ (−1+t0 z−1 y−2 x−3 )n (−1+t0 z−1 y−2 x−3 )n

= t0 (−1 + t0 z−1 y−2 x−3 )n .

Also, we can prove the other relations similarly. The proof is complete. Theorem 2.4. If the sequences {xn , yn , zn , tn } are solutions of difference equation system (3) such that t0 z−1 y−2 x−3 = z0 y−1 x−2 t−3 = y0 x−1 t−2 z−3 = x0 t−1 z−2 y−3 = 2.Then all solutions of system (3) are periodic

1433

El-Dessoky ET AL 1428-1439

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

with period four and takes the form = = = =

x4n−3 y4n−3 z4n−3 t4n−3

x−3 , y−3 , z−3 , t−3 ,

x4n−2 = x−2 , x4n−1 = x−1 , x4n = x0 . y4n−2 = y−2 , y4n−1 = y−1 , y4n = y0 . z4n−2 = z−2 , z4n−1 = z−1 , z4n = z0 . t4n−2 = t−2 , t4n−1 = t−1 , t4n = t0 .

Or {xn } {yn } {zn } {tn }

= = = =

{x−3 , {y−3 , {z−3 , {t−3 ,

x−2 , x−1 , x0 , x−3 , x−2 , ...} . y−2 , y−1 , y0 , y−3 , y−2 , ...} . z−2 , z−1 , z0 , z−3 , z−2 , ...} . t−2 , t−1 , t0 , t−3 , t−2 , ...} .

Proof: The proof follows from the previous Theorem and will be omitted. The following theorems can be proved similarly.

3. OTHER SYSTEMS: In this section, we get the solutions of the following systems of the difference equations xn+1

=

zn+1

=

xn+1

=

zn+1

=

xn+1

=

zn+1

=

xn+1

=

zn+1

=

xn−3 1+xn−3 yn−2 zn−1 tn , zn−3 1+zn−3 tn−2 xn−1 yn ,

yn+1 =

xn−3 1+xn−3 yn−2 zn−1 tn , zn−3 1−zn−3 tn−2 xn−1 yn ,

yn+1 =

xn−3 1−xn−3 yn−2 zn−1 tn , zn−3 1+zn−3 tn−2 xn−1 yn ,

yn+1 =

tn+1 =

tn+1 =

tn+1 =

yn−3 1+yn−3 zn−2 tn−1 xn , tn−3 1−tn−3 xn−2 yn−1 zn .

(4)

yn−3 1+yn−3 zn−2 tn−1 xn tn−3 1−tn−3 xn−2 yn−1 zn .

(5)

yn−3 1−yn−3 zn−2 tn−1 xn , tn−3 1+tn−3 xn−2 yn−1 zn .

(6)

xn−3 yn−3 −1+xn−3 yn−2 zn−1 tn , yn+1 = 1+yn−3 zn−2 tn−1 xn , zn−3 tn−3 1−zn−3 tn−2 xn−1 yn , tn+1 = −1+tn−3 xn−2 yn−1 zn .

(7)

where n ∈ N0 and the initial conditions are arbitrary real numbers.

Theorem 3.1. If {xn , yn , zn , tn } are solutions of difference equation system (4). Then for n = 0, 1, 2, ..., x4n−3 x4n−1 y4n−3 y4n−1 z4n−3

= x−3 = x−1 = y−3 = y−1 = z−3

n−1 Q i=0 n−1 Q

x4n−2 = x−2

(1+(2i)y0 x−1 t−2 z−3 ) (1+(2i+1)y0 x−1 t−2 z−3 ) ,

(1+(2i+1)x0 t−1 z−2 y−3 ) (1+(2i+2)x0 t−1 z−2 y−3 ) , i=0 n−1 Q (1+(2+1)t0 z−1 y−2 x−3 ) y4n−2 = y−2 (1+(2i+2)t0 z−1 y−2 x−3 ) , i=0 n−1 Q (1+(2i+1)y0 x−1 t−2 z−3 ) y4n = y0 (1+(2i+2)y0 x−1 t−2 z−3 ) , i=0 n−1 Q (1+(2i+1)x0 t−1 z−2 y−3 ) z4n−2 = z−2 (1+(2i+2)x0 t−1 z−2 y−3 ) , i=0

i=0 n−1 Q

(1+(2i)x0 t−1 z−2 y−3 ) (1+(2i+1)x0 t−1 z−2 y−3 ) ,

i=0 n−1 Q

(1+(2i)y0 x−1 t−2 z−3 ) (1+(2i+1)y0 x−1 t−2 z−3 ) ,

i=0 n−1 Q i=0

n−1 Q

(1+(2i)t0 z−1 y−2 x−3 ) (1+(2i+1)t0 z−1 y−2 x−3 ) ,

(1+(2i)z0 y−1 x−2 t−3 ) (1+(2i+1)z0 y−1 x−2 t−3 ) ,

1434

x4n = x0

n−1 Q

i=0

(1+(2i−1)z0 y−1 x−2 t−3 ) (1+(2i)z0 y−1 x−2 t−3 ) ,

El-Dessoky ET AL 1428-1439

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

z4n−1 t4n−3 t4n−1 where

−1 Q

= z−1 = t−3 = t−1

n−1 Q

i=0 n−1 Q i=0 n−1 Q i=0

(1+(2i+2)t0 z−1 y−2 x−3 ) (1+(2i+3)t0 z−1 y−2 x−3 ) , (1+(2i)z0 y−1 x−2 t−3 ) (1+(2i−1)z0 y−1 x−2 t−3 ) , (1+(2i+2)x0 t−1 z−2 y−3 ) (1+(2i+1)x0 t−1 z−2 y−3 ) ,

n−1 Q

(1+(2i+1)z0 y−1 x−2 t−3 ) (1+(2i+4)z0 y−1 x−2 t−3 ) , i=0 n−1 Q (1+(2i+1)y0 x−1 t−2 z−3 ) t4n−2 = t−2 (1+(2i)y0 x−1 t−2 z−3 ) , i=0 n−1 Q (1+(2i+3)t0 z−1 y−2 x−3 ) t4n = t0 (1+(2i+2)t0 z−1 y−2 x−3 ) , i=0

z4n = z0

Bi = 1.

i=0

Theorem 3.2. The form of the solutions of system (5) are given by the following formulae: x4n−3

=

x4n−1

=

y4n−3

=

y4n−1

=

z4n−3

=

z4n−1

=

t4n−3

=

t4n−1

=

x−3 (1+t0 z−1 y−2 x−3 )n ,

x4n−2 = (−1)n x−2 (−1 + z0 y−1 x−2 t−3 )n ,

x−1 (−1+2y0 x−1 t−2 z−3 )n , (−1+y0 x−1 t−2 z−3 )n y−3 (1+x0 t−1 z−2 y−3 )n , y−1 (1+z0 y−1 x−2 t−3 )n ,

n

x4n = (−1)n x0 (−1 + x0 t−1 z−2 y−3 ) , y−2 (1+t0 z−1 y−2 x−3 )n (1+2t0 z−1 y−2 x−3 )n , n (−1)n y0 (−1 + y0 x−1 t−2 z−3 )

y4n−2 = y4n =

n

,

n

(−1) z−3 (−1+y0 x−1 t−2 z−3 )n ,

z4n−2 = z−2 (1 + x0 t−1 z−2 y−3 ) ,

z−1 (1+2t0 z−1 y−2 x−3 )n (1+t0 z−1 y−2 x−3 )n , (−1)n t−3 (−1+z0 y−1 x−2 t−3 )n ,

n

z4n = z0 (1 + z0 y−1 x−2 t−3 ) ,

t4n−2 =

(−1)n t−1 (−1+x0 t−1 z−2 y−3 )n ,

t−2 (−1+y0 x−1 t−2 z−3 )n (−1+2y0 x−1 t−2 z−3 )n ,

t4n = t0 (1 + t0 z−1 y−2 x−3 )n ,

where t0 z−1 y−2 x−3 6= −1, t0 z−1 y−2 x−3 6= − 12 , y0 x−1 t−2 z−3 6= 1, y0 x−1 t−2 z−3 6= 12 , z0 y−1 x−2 t−3 = x0 t−1 z−2 y−3 6= ±1. Theorem 3.3. Let {xn , yn , zn , tn } are solutions of difference equation system (6) with t0 z−1 y−2 x−3 6= 1, t0 z−1 y−2 x−3 6= 12 , x0 t−1 z−2 y−3 = z0 y−1 x−2 t−3 6= ±1, y0 x−1 t−2 z−3 6= −1, y0 x−1 t−2 z−3 6= − 12 ,then for n = 0, 1, 2, ..., x4n−3

=

x4n−1

=

y4n−3

=

y4n−1

=

z4n−3

=

(−1)n x−3 (−1+t0 z−1 y−2 x−3 )n ,

n

x4n−2 = x−2 (1 + z0 y−1 x−2 t−3 ) ,

x−1 (1+2y0 x−1 t−2 z−3 )n , (1+y0 x−1 t−2 z−3 )n (−1)n y−3 (−1+x0 t−1 z−2 y−3 )n ,

x4n = x0 (1 + x0 t−1 z−2 y−3 )n ,

y4n−2 =

y−2 (−1+t0 z−1 y−2 x−3 )n (−1+2t0 z−1 y−2 x−3 )n ,

n (−1)n y−1 (−1+z0 y−1 x−2 t−3 )n , y4n = y0 (1 + y0 x−1 t−2 z−3 ) , n z−3 n (1+y0 x−1 t−2 z−3 )n , z4n−2 = (−1) z−2 (−1 + x0 t−1 z−2 y−3 ) n

z4n−1

=

z−1 (−1+2t0 z−1 y−2 x−3 ) (−1+t0 z−1 y−2 x−3 )n

t4n−3

=

t4n−1

=

t−3 (1+z0 y−1 x−2 t−3 )n , t−1 (1+x0 t−1 z−2 y−3 )n ,

,

, z4n = (−1)n z0 (−1 + z0 y−1 x−2 t−3 )n ,

t4n−2 =

t−2 (1+y0 x−1 t−2 z−3 )n (1+2y0 x−1 t−2 z−3 )n ,

t4n = (−1)n t0 (−1 + t0 z−1 y−2 x−3 )n .

Theorem 3.4. Suppose that the initial conditions of the system (7) are arbitrary real numbers satisfies t0 z−1 y−2 x−3 6= 1, t0 z−1 y−2 x−3 6= 12 , x0 t−1 z−2 y−3 = z0 y−1 x−2 t−3 6= ±1, y0 x−1 t−2 z−3 6= 1, y0 x−1 t−2 z−3 6= 12 , and if {xn , yn , zn , tn } are solutions of system (7). Then for n = 0, 1, 2, ..., x4n−3

=

x4n−1

=

x−3 (−1+t0 z−1 y−2 x−3 )n ,

x4n−2 = x−2 (−1 + z0 y−1 x−2 t−3 )n ,

(−1)n x−1 (−1+2y0 x−1 t−2 z−3 )n , (−1+y0 x−1 t−2 z−3 )n

1435

x4n = x0 (−1 + x0 t−1 z−2 y−3 )n ,

El-Dessoky ET AL 1428-1439

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

y4n−3

=

y4n−1

=

z4n−3

=

z4n−1

=

t4n−3

=

t4n−1

=

y−3 (1+x0 t−1 z−2 y−3 )n , y−1 (1+z0 y−1 x−2 t−3 )n ,

y−2 (−1+t0 z−1 y−2 x−3 )n (−1+2t0 z−1 y−2 x−3 )n , n (−1)n y−2 (−1 + t0 z−1 y−2 x−3 )

y4n−2 = y4n =

n

(−1) z−3 (−1+y0 x−1 t−2 z−3 )n ,

n

z4n−2 = z−2 (1 + x0 t−1 z−2 y−3 ) ,

z−1 (−1+2t0 z−1 y−2 x−3 )n (−1+t0 z−1 y−2 x−3 )n , t−3 (−1+z0 y−1 x−2 t−3 )n , t−1 (−1+x0 t−1 z−2 y−3 )n ,

,

z4n = z0 (1 + z0 y−1 x−2 t−3 )n ,

(−1)n t−2 (−1+y0 x−1 t−2 z−3 )n , (−1+2y0 x−1 t−2 z−3 )n n t0 (−1 + t0 z−1 y−2 x−3 ) .

t4n−2 = t4n =

4. NUMERICAL EXAMPLES Here we consider some numerical examples for the previous systems to illustrate the results. Example 1. We consider the system (1) with the initial conditions x−3 = .16, x−2 = −.3, x−1 = 7, x0 = −1.3, y−3 = .2, y−2 = −.4, y−1 = .51, y0 = 1, z−3 = −.8, z−2 = .4, z−1 = 5, z0 = .74, t−3 = .18, t−2 = .64, t−1 = −.5 and t0 = 1.9. (See Fig. 1). Also, see Figure 2 to see the behavior of the solutions of System (1) with initials conditions x−3 = .16, x−2 = .3, x−1 = 0, x0 = 1.3, y−3 = .2, y−2 = .4, y−1 = .51, y0 = 1, z−3 = .8, z−2 = .4, z−1 = .5, z0 = .74, t−3 = .8, t−2 = .64, t−1 = .5 and t0 = 1.9. 7 x(n) y(n) z(n) t(n)

6

5

x(n),y(n),Z(n),T(n)

4

3

2

1

0

−1

−2

0

10

20

30

40 n

50

60

70

80

Figure 1. Plot of the system (1).

2 x(n) y(n) z(n) t(n)

1.8 1.6

x(n),y(n),z(n),t(n)

1.4 1.2 1 0.8 0.6 0.4 0.2 0

0

5

10

15

20

25 n

30

35

40

45

50

Figure 2. Draw the behavior of the solution of the system (1).

1436

El-Dessoky ET AL 1428-1439

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Example 2. See Figure (3) for an example for the system (2) with the initial values x−3 = .6, x−2 = .3, x−1 = .19, x0 = −.3, y−3 = .2, y−2 = .4, y−1 = .56, y0 = .91, z−3 = .28, z−2 = .4, z−1 = .65, z0 = .37, t−3 = .8, t−2 = .64, t−1 = .5 and t0 = .7. 4 x(n) y(n) z(n) t(n)

3

x(n),y(n),z(n),t(n)

2

1

0

−1

−2

−3

0

10

20

30 n

40

50

60

Figure 3. Sketch the behavior of the solution of the system (2).

Example 3. If we take the initial conditions as follows x−3 = .6, x−2 = .3, x−1 = −.19, x0 = −.3, y−3 = .2, y−2 = .04, y−1 = .56, y0 = .91, z−3 = .28, z−2 = −.4, z−1 = .49, z0 = .37, t−3 = −.8, t−2 = −.64, t−1 = .5 and t0 = .7, for the difference system (3), see Fig. 4.

1 x(n) y(n) z(n) t(n)

0.8 0.6

x(n),y(n),z(n),t(n)

0.4 0.2 0 −0.2 −0.4 −0.6 −0.8 −1

0

5

10

15

20

25 n

30

35

40

45

50

Figure 4. Plot of system (3). Example 4. Figure (5) shows the periodicity behavior of the solution of the difference system (3) with the initial conditions x−3 = 6, x−2 = −.3, x−1 = 9, x0 = −8, y−3 = 1/9, y−2 = −9, y−1 = 5, y0 = .1, z−3 = 20, z−2 = 6, z−1 = −.7, z0 = .2, t−3 = −20/3, t−2 = 1/9, t−1 = −3/8 and t0 = 10/189. 20 x(n) y(n) z(n) t(n)

15

x(n),y(n),z(n),t(n)

10

5

0

−5

−10

0

5

10

15 n

20

25

30

Figure 5. Plot the behavior of the solution of the difference system (3).

1437

El-Dessoky ET AL 1428-1439

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Acknowledgements This Project was funded by the Deanship of Scientific Research (DSR) at King Abdulaziz University, Jeddah, Saudi Arabia under grant no. (G - 572 - 130 - 38). The authors, therefore, acknowledge with thanks DSR for technical and financial support.

REFERENCES 1. R. P. Agarwal, Difference Equations and Inequalities, 1st edition, Marcel Dekker, New York, 1992, 2nd edition, 2000. 2. E. Camouzis and G. Ladas, Dynamics of Third-Order Rational Difference Equations; With Open Problems and Conjectures, Chapman and Hall/HRC Boca Raton, 2008. 3. Q. Din, M. N. Qureshi, A. Qadeer Khan, Dynamics of a fourth-order system of rational difference equations, Adv. Differ. Equ., 2012, (2012), 215 doi: 10.1186/1687-1847-2012-215. 4. M. M. El-Dessoky, The form of solutions and periodicity for some systems of third order rational difference equations, Math. Methods Appl. Sci., 39, (2016), 1076-1092. 5. I. Yalcinkaya, On the global asymptotic behavior of a system of two nonlinear difference equations, ARS Combinatoria, 95, (2010), 151-159. 6. X. Yang, Y. Liu, S. Bai, On the system of high order rational difference equations xn = a/yn−p , yn = byn−p /xn−q yn−q , Appl. Math. Comp., 171(2), (2005), 853-856. 7. M. R. S. Kulenovic, Z. Nurkanovic, Global behavior of a three-dimensional linear fractional system of difference equations, J. Math. Anal. Appl., 310, (2005), 673—689. 8. M. M. El-Dessoky, On the solutions and periodicity of some nonlinear systems of difference equations, J. Nonlinear Sci. Appl., 9(5), (2016), 2190-2207. 9. Qianhong Zhang, Jingzhong Liu, Zhenguo Luo, Dynamical Behavior of a System of Third-Order Rational Difference Equation, Discrete Dyn. Nat. Soc., 2015 (2015), Article ID 530453, 6 pages. 10. Q. Din, Asymptotic behavior of an anti-competitive system of second-order difference equations, J. Egyptian Math. Soc., 24, (2016), 37-43. 11. M. M. El-Dessoky, E. M. Elsayed, On a solution of system of three fractional difference equations, J. Comput. Anal. Appl., 19, (2015), 760-769. 12. I. Yalcinkaya, C. Cinar, On the Solutions of a System of Difference Equations, Int. J. Math. Stat., Autumn, 9(A11) (2011), 62-67. 13. H. El-Metwally, E. M. Elsayed, E. M. Elabbasy, On the solutions of difference equations of order four, Rocky Mountain J. Math., 43(3), (2013), 877-894. 14. Battaloglu N, Cinar C, Yalcinkaya I. The dynamics of the difference equation, ARS Combinatoria, 97, (2010), 281-288. 15. Lin-Xia Hu and Xiu-Mei Jia, Global Asymptotic Stability of a Rational System, Abstr. Appl. Anal., 2014, (2014), Article ID 286375, 6 pages. 16. O. ÖZkan, A. S. Kurbanli, On a system of difference equation, Discrete Dyn. Nat. Soc., 2013, (2013), Article ID 970316, 7 pages. 17. C. Cinar and I. Yalcinkaya, On the positive solutions of difference equation system xn+1 = z1n , yn+1 = 1 1 xn−1 yn−1 , zn+1 = xn−1 , Int. Math. J., 5(5), (2004), 517-519. 18. C. Cinar, I. Yalcinkaya, On the positive solutions of the difference equation system xn+1 = 1/zn , yn+1 = yn /xn−1 yn−1 , zn+1 = 1/xn−1 , J. Inst. Math. Comp. Sci., 18, (2005), 91-93. 19. S. E. Das, M. Bayram, On a system of rational difference equations, World Appl. Sci. J., 10(11), (2010), 1306—1312. 20. A. S. Kurbanli, On the behavior of solutions of the system of rational difference equations: xn+1 = xn−1 /xn−1 yn − 1, yn+1 = yn−1 /yn−1 xn − 1, zn+1 = zn−1 /zn−1 yn − 1, Discrete Dyn. Nat. Soc., 2011, (2011), Article ID 932362, 12 pages.

1438

El-Dessoky ET AL 1428-1439

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

21. E. M. Elsayed, M. M. El-Dessoky, A. Alotaibi, On the solutions of a general system of difference equations, Discrete Dyn. Nat. Soc., 2012, (2012), Article ID 892571, 12 pages. 22. I. Yalcinkaya, C. Cinar, Global asymptotic stability of two nonlinear difference equations, Fasciculi Mathematici, 43, (2010), 171—180. 23. C. Wang, Wang Shu, W. Wang, Global asymptotic stability of equilibrium point for a family of rational difference equations. Appl. Math. Lett., 24(5), (2011), 714-718. 24. A. S. Kurbanli, On the behavior of solutions of the system of rational difference equations, Adv. Differ. Equ., 2011, (2011), 40 doi:10.1186/1687-1847-2011-40. 25. Y. Zhang, X. Yang, G. M. Megson, D. J. Evans, On the system of rational difference equations xn+1 = yn−1 1 , yn+1 = A + xn−r A + yn−p yn−s , Appl. Math. Comput., 176, (2006), 403—408. 26. T. F. Ibrahim, N. Touafek, On a third order rational difference equation with variable coefficients, Dyn. Cont, Dis. Imp. Sys., Series B: Appl. Alg., 20, (2013), 251-264. 27. A. S. Kurbanli, C. Cinar, M. Erdo˘ gan, On the behavior of solutions of the system of rational difference xn−1 yn−1 xn , y = equations xn+1 = xn−1 n+1 yn −1 yn−1 xn −1 , zn+1 = zn−1 yn , Appl. Math., 2, (2011). 1031-1038. 28. A. S. Kurbanli, C. Cinar, I. Yalcinkaya, On the behavior of positive solutions of the system of rational difference equations, Math. Comput. Mod., 53, (2011), 1261-1267. 29. A. Y. Ozban, On the system of rational difference equations xn+1 = a/yn−3 , yn+1 = byn−3 /xn−q yn−q , Appl. Math. Comp., 188(1), (2007), 833-837. 30. I. Yalcinkaya, C. Cinar, M. Atalay, On the solutions of systems of difference equations, Adv. Differ. Equ., 2008, (2008) Article ID 143943, 9 pages. 31. Stevo Stevi´c, Josef Diblík ,Bratislav Iriˇcanin ,Zden˘ek Šmarda, On the system of difference equations xn+1 = xn−1 yn−2 yn−1 xn−2 ayn−2 +byn−1 , yn+1 = cxn−2 +dxn−1 , Appl. Math. Comput., 270, (2015) 688—704. 32. Miron B. Bekker, Martin J. Bohner, Hristo D. Voulov, Asymptotic behavior of solutions of a rational system of difference equations, J. Nonlinear Sci. Appl., 7, (2014), 379—382. 33. D. T. Tollu, Y. Yazlik, N. Taskara, On fourteen solvable systems of difference equations, Appl. Math. Comput., 233, (2014), 310—319. 34. M. R. S. Kulenoviˇc, Senada Kalabuši´c and Esmir Pilav, Basins of Attraction of Certain Linear Fractional Systems of Difference Equations in the Plane, Int. J. Difference Equ., 9, (2014), 207—222. 35. B. Sroysang, Dynamics of a system of rational higher-order difference equation, Discrete Dyn. Nat. Soc., 2013, (2013), Article ID 179401, 5 pages. 36. A. Q. Khan, M. N. Qureshi, Global dynamics of some systems of rational difference equations, J. Egyptian Math. Soc., 24, (2016), 30-36. 37. M. M. El-Dessoky, E. M. Elsayed and M. Alghamdi, Solutions and periodicity for some systems of fourth order rational difference equations, J. Comput. Anal. Appl., 18(1), (2015), 179-194. 38. Asim Asiri, M. M. El-Dessoky and E. M. Elsayed, Solution of a third order fractional system of difference equations , J. Comput. Anal. Appl., 24(3), (2018), 444-453. 39. M. Mansour, M. M. El-Dessoky, E. M. Elsayed, The form of the solutions and periodicity of some systems of difference equations, Discrete Dyn. Nat. Soc., 2012, (2012), Article ID 406821, 17 pages. 40. M. M. El-Dessoky, M. Mansour, E. M. Elsayed, Solutions of some rational systems of difference equations, Utilitas Mathematica, 92, (2013), 329-336. 41. E. O. Alzahrani, M. M. El-Dessoky, E. M. Elsayed and Y. Kuang, Solutions and Properties of Some Degenerate Systems of Difference Equations, J. Comput. Anal. Appl., 18(2), (2015), 321-333. 42. Y. Yazlik, D. T. Tollu, N. Taskara, On the Behaviour of Solutions for Some Systems of Difference Equations, J. Comput. Anal. Appl., 18(1), (2015),166-178. 43. M. M. El-Dessoky, On a solvable for some systems of rational difference equations, J. Nonlinear Sci. Appl., 9(6), (2016), 3744-3759. 44. M. M. El-Dessoky, E. M. Elsayed and E. O. Alzahrani, The form of solutions and periodic nature for some rational difference equations systems, J. Nonlinear Sci. Appl., 9(10), (2016), 5629—5647. 45. M. M. El-Dessoky, Solution of a rational systems of difference equations of order three, Mathematics, 4(3), (2016), 1-12.

1439

El-Dessoky ET AL 1428-1439

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Applications of soft sets to BCC-ideals in BCC-algebras Sun Shin Ahn Department of Mathematics Education, Dongguk University, Seoul 04620, Korea Abstract. The notions of a union soft ideal and a union soft BCC-ideal of a BCC-algebra are introduced and some related properties of them are investigated. A quotient structure of BCC-algebra using a uni-soft BCC-ideal is constructed and some related properties are studied.

1. Introduction Y. Kormori [10] introduced a notion of a BCC-algebras, and W. A. Dudek [3] redefined the notion of BCC-algebras by using a dual from of the ordinary definition of Y. Kormori. In [6], J. Hao introduced the notion of ideals in a BCC-algebra and studied some related properties. W. A. Dudek and X. Zhang [4] introdued a BCC-ideals in a BCC-algebra and described connections between such BCC-ideals and congruences. S. S. Ahn and S. H. Kwon [1] defined a topological BCC-algebra and investigated some properties of it. Various problems in system identification involve characteristics which are essentially nonprobabilistic in nature [15]. In response to this situation Zadeh [16] introduced fuzzy set theory as an alternative to probability theory. Uncertainty is an attribute of information. In order to suggest a more general framework, the approach to uncertainty is outlined by Zadeh [17]. To solve complicated problem in economics, engineering, and environment, we can’t successfully use classical methods because of various uncertainties typical for those problems. There are three theories: theory of probability, theory of fuzzy sets, and the interval mathematics which we can consider as mathematical tools for dealing with uncertainties. But all these theories have their own difficulties. Uncertainties can’t be handled using traditional mathematical tools but may be dealt with using a wide range of existing theories such as probability theory, theory of (intuitionistic) fuzzy sets, theory of vague sets, theory of interval mathematics, and theory of rough sets. However, all of these theories have their own difficulties which are pointed out in [13]. Maji et al. [12] and Molodtsov [13] suggested that one reason for these difficulties may be due to the inadequacy of the parametrization tool of the theory. To overcome these difficulties, Molodtsov [13] introduced the concept of soft set as a new mathematical tool for dealing with uncertainties that is free from the difficulties that have troubled the usual theoretical approaches. Molodtsov pointed out several directions for the applications of soft sets. Maji et al. [12] described the application of soft set theory to a decision making problem. Maji et al. [11] also studied 0

2010 Mathematics Subject Classification: 06F35; 03G25; 06D72. Keywords: γ-exclusive set, Union soft ideal, Union soft BCC-ideal. 0 E-mail: [email protected] 0

1440

Sun Shin Ahn 1440-1450

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Sun Shin Ahn

several operations on the theory of soft sets. Jun [8] discussed the union soft sets with applications in BCK/BCI-algebras. We refer the reader to the papers [2, 5, 7, 9, 14] for further information regarding algebraic structures/properties of soft set theory. In this paper, we introduce the notions of a union soft ideal and a union soft BCC-ideal of a BCC-algebra and investigated some related properties of them. A quotient structure of BCC-algebra using a uni-soft BCC-ideal is constructed and some related properties are studied. 2. Preliminaries By a BCC-algebra [3] we mean an algebra (X, ∗, 0) of type (2,0) satisfying the following conditions: for all x, y, z ∈ X, (a1) (a2) (a3) (a4)

((x ∗ y) ∗ (z ∗ y)) ∗ (x ∗ z) = 0, 0 ∗ x = 0, x ∗ 0 = x, x ∗ y = 0 and y ∗ x = 0 imply x = y.

For brevity, we also call X a BCC-algebra. In X, we can define a partial order “≤” by putting x ≤ y if and only if x ∗ y = 0. Then ≤ is a partial order on X. A BCC-algebra X has the following properties: for any x, y ∈ X, (b1) x ∗ x = 0, (b2) (x ∗ y) ∗ x = 0, (b3) x ≤ y ⇒ x ∗ z ≤ y ∗ z and z ∗ y ≤ z ∗ x. Any BCK-algebra is a BCC-algebra, but there are BCC-algebras which are not BCK-algebra (see [3]). Note that a BCC-algebra is a BCK-algebra if and only if it satisfies: (b4) (x ∗ y) ∗ z = (x ∗ z) ∗ y, for all x, y, z ∈ X. Let (X, ∗, 0X ) and (Y, ∗, 0Y ) be BCC-algebras. A mapping φ : X → Y is called a homomorphism if φ(x ∗X y) = φ(x) ∗Y φ(y) for all x, y ∈ X. A non-empty subset S of a BCC-algebra X is called a subalgebra of X if x ∗ y ∈ S whenever x, y ∈ S. A non-empty subset I of a BCI-algebra X is called an ideal [6] of X if it satisfies: (c1) 0 ∈ I, (c2) x ∗ y, y ∈ I ⇒ x ∈ I for all x, y ∈ X. I is called an BCC-ideal [4] of X if it satisfies (c1) and (c3) (x ∗ y) ∗ z, y ∈ I ⇒ x ∗ z ∈ I, for all x, y, z ∈ X. Theorem 2.1. [6] In a BCC-algebra, an ideal is a subalgebra. Theorem 2.2. [4] In a BCC-algebra, a BCC-ideal is an ideal. Corollary 2.3. [4] Any BCC-ideal of a BCC-algebra is a subalgebra. 1441

Sun Shin Ahn 1440-1450

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Applications of soft sets to BCC-ideals in BCC-algebras

Let X be a BCC-algebra and let I be a BCC-ideal of X. Define a relation ∼I on X by x ∼ y if and only if x ∗ y, y ∗ x ∈ I for any x, y ∈ X. Then it is a congruence relation on X [4]. Denote by [x]I the equivalence class containing x, i.e., [x]I := {y ∈ X|x ∼I y} and let X/I := {[x]I |x ∈ X}. Theorem 2.4. If I is a BCC-algebra X, then the quotient algebra X/I is a BCC-algebra. A soft set theory is introduced by Molodtsov [13]. In what follows, let U be an initial universe set and E be a set of parameters. We say that the pair (U, E) is a soft universe. Let P(U ) denotes the power set of U and A, B, C, · · · ⊆ E. Definition 2.5. [13] A soft set (f, A) over U is defined to be the set of ordered pairs (f, A) := {(x, f (x)) : x ∈ E, f (x) ∈ P(U )} , where f : E → P(U ) such that f (x) = ∅ if x ∈ / A. For ϵ ∈ A, f (ϵ) may be considered as the set of ϵ-approximate elements of the soft set (f, A). Clearly, a soft set is not a set. For a soft set (f, A) of X and a subset γ of U , the γ-exclusive set of (f, A), defined to be the set eA (f ; γ) := {x ∈ A|f (x) ⊆ γ}. For any soft sets (f, X) and (g, X) of X, we call (f, X) a soft subset of (g, X) , denoted by ˜ (g, X) , if f (x) ⊆ g(x) for all x ∈ X. The soft union of (f, X) and (g, X), denoted by (f, X) ⊆ ˜ (g, X) , is defined to be the soft set (f ∪ ˜ g, X) of X over U in which f ∪ ˜ g is defined by (f, X) ∪ ˜ g) (x) := f (x) ∪ g(x) for all x ∈ X. The soft intersection of (f, X) and (g, X) , denoted by (f ∪ ˜ (g, X) , is defined to be the soft set (f ∩ ˜ g, M ) of X over U in which f ∩ ˜ g is defined by (f, X) ∩ ˜ g) (x) := f (x) ∩ g(x) for all x ∈ M. (f ∩ 3. Uni-soft BCC-ideals In what follows, let X be a BCC-algebra unless otherwise specified. Definition 3.1. A soft set (f, X) over U is called a union soft subalgebra (briefly, uni-soft subalgebra) of a BCC-algebra X over U if it satisfies: (3.0) f (x ∗ y) ⊆ f (x) ∪ f (y) for all x, y ∈ X. Proposition 3.2. Every uni-soft subalgebra (f, X) of a BCC-algebra X over U satisfies the following inclusion: (3.1) f (0) ⊆ f (x) for all x ∈ X. Proof. Using (3.0) and (b1), we have f (0) = f (x ∗ x) ⊆ f (x) ∪ f (x) = f (x) for all x ∈ X.



Example 3.3. Let (U := Z, X) where X = {0, 1, 2, 3} is a BCC-algebra [6] with the following table: ∗ 0 1 2 3 0 0 0 0 0 1 1 0 0 1 2 2 1 0 1 3 3 3 3 0 1442

Sun Shin Ahn 1440-1450

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Sun Shin Ahn

Let (f, X) be a soft set over U defined as follows:   4Z if x = 0, f : X → P(U ), x 7→ 2Z if x ∈ {1, 2},  Z if x = 3. It is easy to check that (f, X) is a uni-soft subalgebra of X over U . Theorem 3.4. A soft set (f, X) of a BCC-algebra X over U is a uni-soft subalgebra of X over U if and only if the γ-exclusive set eX (f ; γ) is a subalgebra of X for all γ ∈ P(U ) with eX (f ; γ) ̸= ∅. Proof. Assume that (f, X) is a uni-soft subalgebra of X over U . Let x, y ∈ X and let γ ∈ P(U ) be such that x, y ∈ eX (f ; γ). Then f (x) ⊆ γ and f (y) ⊆ γ. It follows from (3.0) that f (x ∗ y) ⊆ f (x) ∪ f (y) ⊆ γ Hence x ∗ y ∈ eX (f ; γ). Thus eX (f ; γ) is a subalgebra of X. Conversely, suppose that eX (f ; γ) is a subalgebra X for all γ ∈ P(U ) with eX (f ; γ) ̸= ∅. Let x, y ∈ X, be such that f (x) = γx and f (y) = γy . Take γ = γx ∪ γy . Then x, y ∈ eX (f ; γ) and so x ∗ y ∈ eX (f ; γ) by assumption. Hence f (x ∗ y) ⊆ γ = γx ∪ γy = f (x) ∪ f (y). Thus (f, X) is a uni-soft subalgebra of X over U . □ Theorem 3.5. Every subalgebra of a BCC-algebra X can be represented as a γ-exclusive set of a uni-soft subalgebra of X over U . Proof. Let A be a subalgebra of a BCC-algebra X. For a subset γ of U , define a soft set (f, X) over U by { γ if x ∈ A, f : X → P(U ), x 7→ U if x ∈ / A. Obviously, A = eX (f ; γ). We now prove that (f, X) is a uni-soft subalgebra of X over U . Let x, y ∈ X. If x, y ∈ A, then x ∗ y ∈ A because A is a subalgebra of X. Hence f (x) = f (y) = f (x ∗ y) = γ, and so f (x ∗ y) ⊆ f (x) ∪ f (y). If x ∈ A and y ∈ / A, then f (x) = γ and f (y) = U which imply that f (x ∗ y) ⊆ f (x) ∪ f (y) = γ ∪ U = U . Similarly, if x ∈ / A and y ∈ A, then f (x ∗ y) ⊆ f (x) ∪ f (y). Obviously, if x ∈ / A and y ∈ / A, then f (x ∗ y) ⊆ f (x) ∪ f (y). Therefore (f, X) is a uni-soft subalgebra of X over U . □ Any subalgebra of a BCC-algebra X may not be represented as a γ-exclusive set of a uni-soft subalgebra (f, X) of X over U in general (see Example 3.6). Example 3.6. Let E = X be the set of parameters, and let U = X be the initial universe set where X = {0, 1, 2, 3} is a BCC-algebra as in Example 3.3. Consider a soft set (f, X) which is given by 1443

Sun Shin Ahn 1440-1450

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Applications of soft sets to BCC-ideals in BCC-algebras

{ f : X → P(U ), x 7→ It is easy to check that (f, X) is a uni-soft are described as follows:    {0} eX (f ; γ) = X   ∅

{0} if x = 0, {0, 3} if x ∈ {1, 2, 3}.

subalgebra of X over U . The γ-exclusive set of (f, X) if γ = {0}, if γ ∈ {{0, 3}, {0, 2, 3}, X}, otherwise.

The subalgebra {0, 2} cannot be a γ-exclusive set eX (f ; γ) since there is no γ ⊆ U such that eX (f ; γ) = {0, 2}. Definition 3.7. A soft set (f, X) over U is called a union soft ideal (briefly, uni-soft ideal) of a BCC-algebra X over U if it satisfies (3.1) and (3.2) f (x) ⊆ f (x ∗ y) ∪ f (y) for all x, y ∈ X. Proposition 3.8. Every uni-soft ideal of a BCC-algebra X over U is a uni-soft subalgebra of X over U . Proof. Put x := x ∗ y and y := x in (3.2). Then we have f (x ∗ y) ⊆ f ((x ∗ y) ∗ x) ∪ f (x). Using (b2) and (3.1), we obtain f (x ∗ y) ⊆ f ((x ∗ y) ∗ x) ∪ f (x) = f (0) ∪ f (x) ⊆ f (y) ∪ f (x) = f (x) ∪ f (y) for all x, y ∈ X. Hence (f, X) is a uni-soft subalgebra of X over U . □ Theorem 3.9. A soft set (f, X) of a BCC-algebra X over U is a uni-soft ideal of X over U if and only if the γ-exclusive set eX (f ; γ) is a ideal of X for all γ ∈ P(U ) with eX (f ; γ) ̸= ∅. □

Proof. Similar to Theorem 3.4.

Proposition 3.10 Every uni-soft ideal (f, X) of a BCC-algebra over U satisfies the following properties: (i) (∀x ∈ X)(x ≤ y ⇒ f (x) ⊆ f (y)), (ii) (∀x, y, z ∈ X)(x ∗ y ≤ z ⇒ f (x) ⊆ f (y) ∪ f (z)). Proof. (i) Let x, y ∈ X be such that x ≤ y. Then x ∗ y = 0. It follows from (3.2) and (3.1) that f (x) ⊆ f (x ∗ y) ∪ f (y) = f (0) ∪ f (y) = f (y). (ii) Let x, y, z ∈ X be such that x ∗ y ≤ z. By (3.2) and (3.1), we have f (x ∗ y) ⊆ f ((x ∗ y) ∗ z) ∪ f (z) = f (0) ∪ f (z) = f (z). Hence f (x) ⊆ f (x ∗ y) ∪ f (y) ⊆ f (z) ∪ f (y) = f (y) ∪ f (z). □ The following corollary is easily proved by induction. Corollary 3.11. Every uni-soft ideal of a BCC-algebra X over U satisfies the following condition: ∪ (3.3) (· · · (x ∗ a1 ) ∗ · · · ) ∗ an = 0 ⇒ f (x) ⊆ nk=1 f (ak ) for all x, a1 , · · · , an ∈ X. 1444

Sun Shin Ahn 1440-1450

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Sun Shin Ahn

Theorem 3.12. If (f, X) and (g, X) are uni-soft ideals of a BCC-algebra X over U , then the ˜ (g, X) of (f, X) and (g, X) is a uni-soft ideal of X over U . union (f, X)∪ ˜ g)(0) = f (0) ∪ g(0) ⊆ f (x) ∪ g(x) = (f ∪ ˜ g)(x). Let Proof. For any x ∈ X, we have (f ∪ ˜ g)(x) = f (x) ∪ g(x) ⊆ (f (x ∗ y) ∪ f (y)) ∪ (g(x ∗ y) ∪ g(y)) = x, y ∈ X. Then we have (f ∪ ˜ g)(x ∗ y) ∪ (f ∪ ˜ g)(y). Hence (f, X)∪ ˜ (g, X) is a uni-soft (f (x ∗ y) ∪ g(x ∗ y)) ∪ (f (y) ∪ g(y)) = (f ∪ ideal of X over U . □ The soft intersection of uni-soft ideals of a BCC-algebra X may not be a uni-soft ideal of X over U (see Example 3.13). Example 3.13. Let E = X be the set of parameters, and let U := Z be the initial universe set where X = {0, 1, 2, 3} is a BCC-algebra with the following table: ∗ 0 1 2 3

0 0 1 2 3

1 0 0 1 3

2 0 0 0 3

3 0 1 2 0

Let (f, X) and (g, X) be soft sets over U = Z defined as follows: { f : X → P(U ), x 7→ and

9Z if x ∈ {0, 1, 2}, 3Z if x ∈ {2, 3},

  12Z if x = 0, g : X → P(U ), x 7→ 3Z if x = 3,  Z if x ∈ {1, 2}.

˜ (g, X) is not a uni-soft Then (f, X) and (g, X) are uni-soft ideals of X over U . But (f, X)∩ ˜ g)(2) = f (2) ∩ g(2) = 3Z ∩ Z = 3Z ⊈ (f ∩ ˜ g)(2 ∗ 1) ∪ (f ∩ ˜ g)(1) = ideal of X over U , since (f ∩ (f (1) ∩ g(1)) ∪ (f (1) ∩ g(1)) = f (1) ∩ g(1) = 9Z ∩ Z = 9Z. Definition 3.14. A soft set (f, X) over U is called a union soft BCC-ideal (briefly, uni-soft BCC-ideal) of a BCC-algebra X over U if it satisfies (3.1) and (3.4) f (x ∗ z) ⊆ f ((x ∗ y) ∗ z) ∪ f (y) for all x, y, z ∈ X. Lemma 3.15. Every uni-soft BCC-ideal of a BCC-algebra X over U is a uni-soft ideal of X over U . Proof. Put z := 0 in (3.4). Using (a3), we have f (x∗0) = f (x) ⊆ f ((x∗y)∗0)∪f (y) = f (x∗y)∪f (y) for all x, y ∈ X. Hence (f, X) is a uni-soft ideal of X over U . □ 1445

Sun Shin Ahn 1440-1450

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Applications of soft sets to BCC-ideals in BCC-algebras

Corollary 3.16. Every uni-soft BCC-ideal of a BCC-algebra X over U is a uni-soft subalgebra of X over U . The converse of Proposition 3.8 and Lemma 3.15 need not be a true, in general (see Example 3.17). Example 3.17. Let (U := Z, X) where X table: ∗ 0 1 2 3 4

= {0, 1, 2, 3, 4} is a BCC-algebra [4] with the following 0 0 1 2 3 4

1 0 0 2 3 3

2 0 1 0 1 4

3 0 0 0 0 3

4 0 0 0 0 0

Let (f, X) be a soft set over U defined as follows: { 3Z if x ∈ {0, 1, 2, 3}, f : X → P(U ), x 7→ Z if x = 4. It is easy to check that (f, X) is a uni-soft subalgebra of X over U , but not a uni-soft ideal of X over U , since f (4) = Z ⊈ f (4 ∗ 3) ∪ f (3) = f (3) ∪ f (3) = 3Z. Consider a uni-soft set (g, X) which is given by { 2Z if x ∈ {0, 1}, g : X → P(U ), x 7→ Z if x ∈ {2, 3, 4}. It is easy to show that (g, X) is a uni-soft ideal of X over U . But it is not a uni-soft BCC-ideal of X over U , since g(4 ∗ 3) = g(3) = Z ⊈ g((4 ∗ 1) ∗ 3) ∪ g(1) = g(0) ∪ g(1) = 2Z. Example 3.18. Let (U := Z, X) where following table: ∗ 0 0 0 1 1 2 2 3 3 4 4 5 5

X = {0, 1, 2, 3, 4, 5} is a BCC-algebra [4] with the 1 0 0 2 2 4 5

2 0 0 0 1 4 5

3 0 0 0 0 4 5

4 0 0 1 1 0 5

5 0 1 1 1 1 0

Let (f, X) be a soft set over U defined as follows: { 5Z if x ∈ {0, 1, 2, 3, 4}, f : X → P(U ), x 7→ Z if x = 5. It is easy to check that (f, X) is a uni-soft BCC-ideal of X over U . 1446

Sun Shin Ahn 1440-1450

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Sun Shin Ahn

Theorem 3.19. A soft set (f, X) of a BCC-algebra X over U is a uni-soft BCC-ideal of X over U if and only if the γ-exclusive set eX (f ; γ) is a BCC-ideal of X for all γ ∈ P(U ) with eX (f ; γ) ̸= ∅. Proof. Suppose that (f, X) is a uni-soft BCC-ideal of X over U . Let x, y, z ∈ X and γ ∈ P([0, 1]) be such that (x ∗ y) ∗ z ∈ eX (f ; γ) and y ∈ eX (f ; γ). Then f ((x ∗ y) ∗ z) ⊆ γ and f (y) ⊆ γ. It follows from (3.1) and (3.4) that f (0) ⊆ f (x ∗ z) ⊆ f ((x ∗ y) ∗ z) ∪ f (y) ⊆ γ. Hence 0 ∈ eX (f ; γ) and x ∗ z ∈ eX (f ; γ), and therefore eX (f ; γ) is a BCC-ideal of X. Conversely, assume that eX (f ; γ) is a BCC-ideal of X for all γ ∈ P([0, 1]) with eX (f ; γ) ̸= ∅. For any x ∈ X, let f (x) = γ. Then x ∈ eX (f ; γ). Since eX (f ; γ) is a BCC-ideal of X, we have 0 ∈ eX (f ; γ) and so f (0) ⊆ f (x) = γ. For any x, y, z ∈ X, let f ((x ∗ y) ∗ z) = γ(x∗y)∗z and f (y) = γy . Let γ := γ(x∗y)∗z ∪ γy . Then (x ∗ y) ∗ z ∈ eX (f ; γ) and y ∈ eX (f ; γ) which imply that x ∗ z ∈ eX (f ; γ). Hence f (x ∗ z) ⊆ γ = γ(x∗y)∗z) ∪ γy = f ((x ∗ y) ∗ z) ∪ f (y). Thus (f, X) is a uni-soft BCC-ideal of X over U . □ Proposition 3.20. Let (f, X) be a uni-soft BCC-ideal of a BCC-algebra X over U . Then Xf := {x ∈ X|f (x) = f (0)} is a BCC-ideal of X. Proof. Clearly, 0 ∈ Xf . Let (x ∗ y) ∗ z, y ∈ Xf . Then f ((x ∗ y) ∗ z) = f (0) and f (y) = f (0). It follows from (3.4) that f (x ∗ z) ⊆ f ((x ∗ y) ∗ z) ∪ f (y) = f (0). By (3.1), we get f (x ∗ z) = f (0). Hence x ∗ z ∈ Xf . Therefore Xf is a BCC-ideal of X. □ 4. Quotient BCC-ideals induced by uni-soft BCC-ideals Let (f, X) be a uni-soft BCC-ideal of a BCC-algebra X over U . For any x, y ∈ X, we define a binary operation “ ∼f ” on X as follows: x ∼f y ⇔ f (x ∗ y) = f (y ∗ x) = 0. Lemma 4.1. The operation “ ∼f ” is an equivalence relation on a BCC-algebra X. Proof. Obviously, ∼f is both reflexive and symmetric. Let x, y, z ∈ X be such that x ∼f y and y ∼f z. Then f (x∗y) = f (0) = f (y ∗x) and f (y ∗z) = f (0) = f (z ∗y). Since (x∗z)∗(y ∗z) ≤ x∗y and (z∗x)∗(y∗x) ≤ z∗y, it follows from Proposition 3.10(ii) that f (x∗z) ⊆ f (y∗z)∪f (x∗y) = f (0) and f (z ∗ x) ⊆ f (y ∗ x) ∪ f (z ∗ y) = f (0). By (3.1), we have f (x ∗ z) = f (0) = f (z ∗ x) and so x ∼f z. Therefore “ ∼f ” is an equivalence relation on X. □ Lemma 4.2. For any x, y in a BCC-algebra X, if x ∼f y, then x ∗ z ∼f y ∗ z and z ∗ x ∼f z ∗ y for all z ∈ X. Proof. Let x, y, z ∈ X be such that x ∼f y. Then f (x∗y) = f (0) = f (y∗x). Since (x∗z)∗(y∗z) ≤ x∗y and (y∗z)∗(x∗z) ≤ y∗x, it follows from Proposition 3.10(i) that f ((x∗z)∗(y∗z)) ⊆ f (x∗y) = f (0) and f ((y ∗ z) ∗ (x ∗ z)) ⊆ f (y ∗ x) = f (0). Thus f ((x ∗ z) ∗ (y ∗ z)) = f (0) = f ((y ∗ z) ∗ (x ∗ z)), and so x∗z ∼f y ∗z. Since ((z ∗x)∗(y ∗x))∗(z ∗y) = 0, we have f ((z ∗x)∗(z ∗y)) ⊆ f (((z ∗x)∗(y ∗ 1447

Sun Shin Ahn 1440-1450

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Applications of soft sets to BCC-ideals in BCC-algebras

x)) ∗ (z ∗ y)) ∪ f (y ∗ x) = f (0) ∪ f (y ∗ x) = f (y ∗ x) = f (0). Since ((z ∗ y) ∗ (x ∗ y)) ∗ (z ∗ x) = 0, we have f ((z ∗ y) ∗ (z ∗ x)) ⊆ f (((z ∗ y) ∗ (x ∗ y)) ∗ (z ∗ x)) ∪ f (x ∗ y) = f (0) ∪ f (x ∗ y) = f (x ∗ y) = f (0). By (3.1), we have f ((z ∗ x) ∗ (z ∗ y)) = f (0) and f ((z ∗ y) ∗ (z ∗ x)) = f (0). Therefore x ∗ z ∼f y ∗ z and z ∗ x ∼f z ∗ y. □ Using Lemma 4.2 and the transitivity of ∼f , we have the following Lemma. Lemma 4.3. For any x, y, u, v in a BCC-algebra X, if x ∼f y and u ∼f v, then x ∗ u ∼f y ∗ v. By Lemmas 4.1, 4.2 and 4.3, the operation “ ∼f ” is a congruence relation on a BCC-algebra X. Denote by fx the equivalence class containing x ∈ X, and by X/f the set of all equivalence classes of X, i.e., fx := {y ∈ X|y ∼f x} and X/f := {fx |x ∈ X}. Define a binary operation • on X/f as follows: for all fx , fy ∈ X/f, fx • fy := fx∗y . Then this operation is well-defined by Lemma 4.3. Theorem 4.4. If (f, X) is a uni-soft BCC-ideal of a BCC-algebra X over U , then the quotient X/f := (X/f, •, f0 ) is a BCC-algebra. □

Proof. Straightforward.

Proposition 4.5. Let µ : (X, ∗, 0X ) → (Y, ∗, 0Y ) be an epimorphism of BCC-algebras. If (g, Y ) is a uni-soft BCC-ideal of Y over U , then (g ◦ µ, X) is a uni-soft BCC-ideal of X over U . Proof. For any x ∈ X, we have (g ◦ µ)(0) = g(µ(0X )) = g(0Y ) ⊆ g(µ(x)) = (g ◦ µ)(x). For any x, y ∈ X, we have (g ◦ u)(x ∗ z) = g(µ(x ∗ z)) = g(µ(x) ∗ µ(z)) ⊆ g((µ(x) ∗Y a) ∗ µ(z)) ∪ g(a) for any a ∈ Y . Let y be any preimage of a under µ. Then (g ◦ µ)(x ∗ z) ⊆ g((µ(x) ∗Y a) ∗ µ(z)) ∪ g(a) = g((µ(x)∗Y µ(y))∗µ(z))∪g(µ(y)) = g(µ((x∗X y)∗X z))∪g(µ(y)) = (g ◦µ)((x∗X y)∗X z)∪(g ◦µ)(y). Hence g ◦ µ is a uni-soft BCC-ideal of X over U . □ Theorem 4.6. Let µ : (X, ∗, 0X ) → (Y, ∗, 0Y ) be an epimorphism of BCC-algebras. If (g, Y ) is a uni-soft BCC-ideal of Y over U , then the quotient algebra X/(g ◦ µ) := (X/(g ◦ µ), •X , (g ◦ µ)0X ) is isomorphic to the quotient algebra Y /g := (Y /g, •Y , g0Y ). Proof. By Theorem 4.4 and Proposition 4.5, X/(g ◦ µ) := (X/(g ◦ µ), •X , (g ◦ µ)0X ) and and Y /g := (Y /g, •Y , g0Y ) are BCC-algebras. Define a map η : X/(g ◦ µ) → Y /g, (g ◦ µ)x 7→ gµ(x) for all x ∈ X. Then the function η is well-defined. In fact, assume that (g ◦ µ)x = (g ◦ µ)y for all x, y ∈ X. Then we have g(µ(x)∗Y µ(y)) = g(µ(x∗X y)) = (g◦µ)(x∗X y) = (g◦µ)(0X ) = g(µ(0X )) = g(0Y ) and g(µ(y) ∗Y µ(x)) = g(µ(y ∗X x)) = (g ◦ µ)(y ∗X x) = (g ◦ µ)(0X ) = g(µ(0X )) = g(0Y ). Hence gµ(x) = gµ(y) . For any (g ◦ µ)x , (g ◦ µ)y ∈ X/(g ◦ µ), we have η((g ◦ µ)x •X (g ◦ µ)y ) = η((g ◦ µ)x∗y ) = gµ(x∗X y) = gµ(x)∗Y µ(y) = gµ(x) •Y gµ(y) = η((g ◦ µ)x ) •Y η((g ◦ µ)y )). Therefore η is a homomorphism. Let ga ∈ Y /g. Then there exists x0 ∈ X such that µ(x0 ) = a since µ is surjective. Hence η((g ◦ µ)x0 ) = gµ(x0 ) = ga and so η is surjective. 1448

Sun Shin Ahn 1440-1450

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Sun Shin Ahn

Let x, y ∈ X be such that gµ(x) = gµ(y) . Then we have (g ◦ µ)(x ∗X y) = g(µ(x ∗X y)) = g(µ(x) ∗Y µ(y)) = g(0Y ) = g(µ(0X )) = (g ◦ µ)(0X ) It follows that (g ◦ µ)x = (g ◦ µ)y . Thus η is injective. This completes the proof. □ The homomorphism π : X → X/g, x → gx , is called the natural homomorphism of X onto X/g. In Theorem 4.6, if we define natural homomorphisms πX : X → X/g ◦ µ and πY : Y → Y /g then it is easy to show that η ◦ πX = πY ◦ µ, i.e., the following diagram commutes. X   πX y

µ

−−−→

Y   πY y

η

X/(g ◦ µ) −−−→ Y /g. Proposition 4.7. Let (f, X) be a uni-soft BCC-ideal of a BCC-algebra X over U . The mapping γ : X → X/f , given by γ(x) := fx , is a surjective homomorphism, and Kerγ = {x ∈ X|γ(x) = f0 } = Xf . Proof. Let fx ∈ X/f . Then there exists an element x ∈ X such that γ(x) = fx . Hence γ is surjective. For any x, y ∈ X, we have γ(x ∗ y) = fx∗y = fx • fy = γ(x) • γ(y). Thus γ is a homomorphism. Moreover, Ker γ = {x ∈ X|γ(x) = f0 } = {x ∈ X|x ∼f 0} = {x ∈ X|f (x) = f (0)} = Xf . □ Proposition 4.8. Let (f, X) be a uni-soft BCC-ideal of a BCC-algebra X over U . If J is a BCC-ideal of X, then J/f is a BCC-ideal of X/f . Proof. Let (f, X) be a uni-soft BCC-ideal of X over U and let J be a BCC-ideal of X. Since 0 ∈ J, we have f0 ∈ J/f . For any x, y, z ∈ J, (x ∗ y) ∗ z ∈ J and y ∈ J, we get x ∗ z ∈ J. Let (fx • fy ) • fz , fy ∈ J/f . Then (fx • fy ) • fz = f(x∗y)∗z ∈ J/f and fy ∈ J/f imply fx • fz ∈ J/f . Thus J/f is a BCC-ideal of X/f . □ Theorem 4.9. Let (f, X) be a uni-soft BCC-ideal of a BCC-algebra X over U . If J ∗ is a BCC-ideal of a BCC-algebra X/f , then there exists a BCC-ideal J = {x ∈ X|fx ∈ J ∗ } in X such that J/f = J ∗ . Proof. Since J ∗ is a BCC-ideal of X/f , (fx • fy ) • fz = f(x∗y)∗z , fy ∈ J ∗ imply fx • fz = fx∗z ∈ J ∗ for any fx , fy , fz ∈ X/f . Thus (x ∗ y) ∗ z, y ∈ J imply x ∗ z ∈ J for any x, y, z ∈ X. Therefore J is a BCC-ideal of X. By Proposition 4.8, we have J/f = {fj |j ∈ J} = {fj |∃fx ∈ J ∗ such that j ∼f x} = {fj |∃fx ∈ J ∗ such that fx = fj } = {fj |fj ∈ J ∗ } = J ∗ . □ Theorem 4.10. Let (f, X) be a uni-soft BCC-ideal of a BCC-algebra X over U . If J is a X/f ∼ BCC-ideal of X, then = X/J. J/f 1449

Sun Shin Ahn 1440-1450

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Applications of soft sets to BCC-ideals in BCC-algebras

X/f X/f = {[fx ]J/f |f ∈ X/f }. If we define φ : → X/J by φ([fx ]J/f ) = J/f J/f [x]J = {y ∈ X|x ∼J y}, then it is well defined. In fact, suppose that [fx ]J/f = [fy ]J/f . Then fx ∼J/f fy and so fx∗y = fx • fy ∈ J/f and fy∗x = fy • fx ∈ J/f . Hence x ∗ y ∈ J and y ∗ x ∈ J. X/f Therefore x ∼J y, i.e., [x]J = [y]J . Given [fx ]J/f , [fy ]J/f ∈ , we have φ([fx ]J/f • [fy ]J/f ) = J/f φ([fx • fy ]J/f ) = [x ∗ y]J = [x]J ∗ [y]J = φ([fx ]J/f ) ∗ φ([fy ]J/f ). Hence φ is a homomorphism. Obviously, φ is onto. Finally, we show that φ is one-to-one. If φ([fx ]J/f ) = φ([fy ]J/f ), then [x]J = [y]J , i.e., x ∼J y. If fa ∈ [fx ]J/f , then fa ∼J/f fx and hence fa∗x , fx∗a ∈ J/f . It follows that a ∗ x, x ∗ a ∈ J, i.e., a ∼J x. Since ∼J is an equivalence relation, a ∼J y and so Ja = Jy . Hence a ∗ y, y ∗ a ∈ J and so fa∗y , fy∗a ∈ J/f . Therefore fa ∼J/f fy . Hence fa ∈ [fy ]J/f . Thus [fx ]J/f ⊆ [fy ]J/f . Similarly, we obtain [fy ]J/f ⊆ [fx ]J/f . Therefore [fx ]J/f = [fy ]J/f . This completes the proof. □ Proof. Note that

References [1] S. S. Ahn and S. H. Kwon, Toplogical properties in BCC-algerbras, Commun. Korean Math. Soc. 23(2) (2008), 169-178. [2] S. S. Ahn, J. M. Ko and K. S. So, Union soft p-ideals and union soft sub-implicative ideals in BCI-algebbras, J. Comput. Anal. Appl. 23(1) (2017), 152-165. [3] W. A. Dudek, On constructions of BCC-algebras, Selected Papers on BCK- and BCI-algebras 1 (1992), 93-96. [4] W. A. Dudek and X. Zhang, On ideals and congruences in BCC-algeras, Czecho Math. J. 48 (1998), 21-29. [5] J. S. Han and S. S. Ahn, Applicationa of soft sets to q-ideals and a-ideals in BCI-algebras, J. Computational Analysis and Applications 17(3) (2014), 10-21. [6] J. Hao, Ideal Theory of BCC-algebras, Sci. Math. Japo. 3 (1998), 373-381. [7] Y. S. Hwang and S. S. Ahn, Soft q-ideals of soft BCI-algebras, J. Comput. Anal. Appl. 16(3) (2014), 571-582. [8] Y. B. Jun, Union soft sets with applications in BCK/BCI-algebras, Bull. Korean Math. Soc. 50 (2013), 1937-1956. [9] Y. B. Jun, S. Z. Song and S. S. Ahn, Union soft sets applied to commutative BCI-algebras, J. Comput. Anal. Appl. 16(3) (2014), 468-477. [10] Y. Kormori, The class of BCC-algebras is not a varity, Math. Japo. 29 (1984), 391-394. [11] P. K. Maji, R. Biswas and A. R. Roy, Soft set theory, Comput. Math. Appl. 45 (2003), 555-562. [12] P. K. Maji, A. R. Roy and R. Biswas, An application of soft sets in a decision making problem, Comput. Math. Appl. 44 (2002), 1077-1083. [13] D. Molodtsov, Soft set theory - First results, Comput. Math. Appl. 37 (1999), 19-31. [14] K. S. Yang and S. S. Ahn, Union soft q-ideals in BCI-algebras, Applied Mathematical Sciences 8 (2014), 2859-2869. [15] L. A. Zadeh, From circuit theory to system theory, Proc. Inst. Radio Eng. 50 (1962), 856-865. [16] L. A. Zadeh, Fuzzy sets, Inform. Control 8 (1965), 338-353. [17] L. A. Zadeh, Toward a generalized theory of uncertainty (GTU) - an outline, Inform. Sci. 172 (2005), 1-40.

1450

Sun Shin Ahn 1440-1450

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

FIXED POINT THEOREMS FOR VARIOUS CONTRACTION CONDITIONS IN DIGITAL METRIC SPACES CHOONKIL PARK1 , OZGUR EGE2∗ , SANJAY KUMAR3 , DEEPAK JAIN4 , JUNG RYE LEE5∗ Abstract. In this paper, we prove the existence of fixed points for Kannan contraction, Chatterjea contraction and Reich contraction in setting of digital metric spaces. These digital contractions are the applications of metric fixed point theory contractions.

1. Introduction The basic tool of metric fixed point theory is the Banach contraction principle, which states that “Let T be a mapping from a complete metric space (X, d) into itself satisfying d(T x, T y) ≤ αd(x, y) for all x, y ∈ X, where 0 ≤ α < 1. Then T has a unique fixed point.” This principle gives existence and uniqueness of fixed points and methods for obtaining approximate fixed points. This principle was generalized by several authors by using different types of minimal commutative along with continuity one of the mappings. In finding common fixed point generally we include the following steps: (i) (ii) (iii) (iv) (v)

A commutative type condition, Completeness of the space or completeness of the range space of one or more mappings, A relation between the ranges of mappings, Continuity of one or more mappings, A contractive type condition.

This principle was further generalized by using different types of properties such as E.A. property, Common Limit Range property along with containment of range spaces instead of continuity of mappings. The topological fixed point theory involves the study of spaces with the fixed point property. Moreover, topology is the study of geometric problems that does not depend only on the exact shape of the objects, but rather it acts on a space. In topology, generally we consider infinitely many points in arbitrary small neighborhood of a point. To consider finite number of points in a neighborhood, the concept of digital topology was introduced by Rosenfeld [13]. In fact, digital topology is the study of geometric and topological properties of digital image using geometric and algebraic topology. The digital images have been used in computer sciences such as image processing, computer graphics. For detail one can refer to [1, 8, 11]. Digital topology also provides a mathematical basis for image processing operations. Further, digital topology is a developing area in 2D and 3D digital images. For a difference in general topology and digital topology, see Figure 1.

2010 Mathematics Subject Classification. Primary 47H10; Secondary 54E35, 68U10. Key words and phrases. digital image, fixed point, digital contraction, digital continuity. ∗ Corresponding authors.

1451

CHOONKIL PARK ET AL 1451-1458

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC C. PARK, O. EGE, S. KUMAR, D. JAIN, J. LEE

Figure 1. Neighboorhood in general and digital topology The elements of 2D image array are called pixels and the elements of 3D image array are called voxels. Each pixel or voxel is associated with lattice points (A point with integer coordinate) in the plane or in 3D-space. A lattice point associated with a pixel or voxel has values 0 and 1. The pixel or voxel that has value 0 is called a black point and the pixel or voxel that has value 1 is called a white point. 2. Topological structure of digital metric spaces Let Zn , n ∈ N, be the set of points in the Euclidean n-dimensional space with integer coordinates. Definition 2.1. [4]. Let l, n be positive integers with 1 ≤ l ≤ n. Consider two distinct points p = (p1 , p2 , ..., pn ), q = (q1 , q2 , ..., qn ) ∈ Zn . The points p and q are kl -adjacent if there are at most l indices i such that |pi − qi | = 1, and for all other indices j, |pj − qj | 6= 1, pj = qj . (i) Two points p and q in Z are 2-adjacent if |p − q| = 1 (see Figure 2).

Figure 2. 2-adjacency (ii) Two points p and q in Z2 are 8-adjacent if the points are distinct and differ by at most 1 in each coordinate. (iii) Two points p and q in Z2 are 4-adjacent if the points are 8-adjacent and differ in exactly one coordinate (see Figure 3). (iv) Two points p and q in Z3 are 26-adjacent if the points are distinct and differ by at most 1 in each coordinate. (v) Two points p and q in Z3 are 18-adjacent if the points are 26-adjacent and differ by at most 2 coordinates.

1452

CHOONKIL PARK ET AL 1451-1458

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC DIGITAL METRIC SPACES

Figure 3. 4-adjacency and 8-adjacency (vi) Two points p and q in Z3 are 26-adjacent if the points are 18-adjacent and differ in exactly one coordinate (see Figure 4).

Figure 4. Adjacencies in Z3 One can easily note that the coordination number of Na in the crystal structure of NaCl is 6 which is equal to adjacency relation in digital images of Figure 5.

Figure 5. Crystal structure of NaCI Definition 2.2. A digital image is a pair (X, κ), where ∅ 6= X ⊂ Zn for some positive integer n and κ is an adjacency relation on X. Technically, a digital image (X, κ) is an undirected graph whose vertex set is the set of members of X and whose edge set is the set of unordered pairs {x0 , x1 } ⊂ X such that x0 6= x1 and x0 and x1 are κ-adjacent.

1453

CHOONKIL PARK ET AL 1451-1458

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC C. PARK, O. EGE, S. KUMAR, D. JAIN, J. LEE

The notion of digital continuity in digital topology was developed by Rosenfeld [14] for studying 2D and 3D digital images. Boxer [2] gave the digital version of several notions of topology and Ege and Karaca [6] studied various digital continuous functions. Let N and R denote the sets of natural numbers and real numbers, respectively. Boxer [3] defined a κ-neighbor of p ∈ Zn which is a point of Zn that is κ-adjacent to p where κ ∈ {2, 4, 6, 8, 18, 26} and n ∈ {1, 2, 3}. The set Nκ (p) = {q | q is κ − adjacent to p} is called the κ-neighborhood of p. Boxer [2] defined a digital interval as [a, b]Z = {z ∈ Z | a ≤ z ≤ b}, where a, b ∈ Z and a < b. A digital image X ⊂ Zn is κ-connected [9] if and only if for every pair of different points x, y ∈ X, there is a set {x0 , x1 , . . . , xr } of points of a digital image X such that x = x0 , y = xr and xi and xi+1 are κ-neighbors where i = 0, 1, . . . , r − 1. Definition 2.3. Let (X, κ0 ) ⊂ Zn0 and (Y, κ1 ) ⊂ Zn1 be digital images and f : X → Y be a function. (i) If for every κ0 -connected subset U of X, f (U ) is a κ1 -connected subset of Y , then f is said to be (κ0 , κ1 )-continuous [3]. (ii) f is (κ0 , κ1 )-continuous if for every κ0 -adjacent points {x0 , x1 } of X, either f (x0 ) = f (x1 ) or f (x0 ) and f (x1 ) are κ1 -adjacent in Y [3]. (iii) If f is (κ0 , κ1 )-continuous, bijective and f −1 is (κ1 , κ0 )-continuous, then f is called (κ0 , κ1 )-isomorphism and denoted by X ∼ =(κ0 ,κ1 ) Y . Now we start with digital metric space (X, d, κ) with κ-adjacency where d is usual Euclidean metric for Zn as follows. Definition 2.4. [6] Let (X, κ) be a digital image set. Let d be a function from (X, κ)×(X, κ) → Zn satisfying all the properties of metric space. The triplet (X, d, κ) is called a digital metric space. Proposition 2.5. [8] A sequence {xn } of points of a digital metric space (X, d, κ) is a Cauchy sequence if and only if there is α ∈ N such that d(xn , xm ) 1 for all n, m α. Theorem 2.6. [8] For a digital metric space (X, d, κ), if a sequence {xn } ⊂ X ⊂ Zn is a Cauchy sequence then there is α ∈ N such that we have xn = xm for all n, m α. Proposition 2.7. [8] A sequence {xn } of points of a digital metric space (X, d, κ) converges to a limit l ∈ X if for all  0, there is α ∈ N such that d(xn , l)  for all n α. Proposition 2.8. [8] A sequence {xn } of points of a digital metric space (X, d, κ) converges to a limit l ∈ X if there is α ∈ N such that xn = l for all n α. Theorem 2.9. [8] A digital metric space (X, d, κ) is complete. Definition 2.10. [6] Let (X, d, κ) be any digital metric space. A self map f on a digital metric space is said to be a digital contraction if there exists a λ ∈ [0, 1) such that for all x, y ∈ X, d(f (x), f (y)) ≤ λd(x, y). Proposition 2.11. [6] Every digital contraction map f : (X, d, κ) → (X, d, κ) is digitally continuous. Proposition 2.12. [8] In a digital metric space (X, d, κ), consider two points xi , xj in a sequence {xn } ⊂ X such that they are κ-adjacent. Then they have the Euclidean distance d(xi , xj ) which √ is greater than or equal to 1 and at most t depending on the position of the two points.

1454

CHOONKIL PARK ET AL 1451-1458

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC DIGITAL METRIC SPACES

3. Main results In 2015, Ege and Karaca [6] proved Banach contraction principle in the setting of digital metric spaces. With the motivation of Banach contraction principle in digital metric spaces, we prove Kannan, Chatterjea and Reich contraction fixed point theorems in the setting of digital metric spaces. The following theorem is the digital version of Kannan contraction fixed point theorem [10]. Theorem 3.1. Let (X, κ) be a digital image where X ⊂ Zn and κ is an adjacency relation between the objects of X. Let (X, d, κ) be a digital metric space and S be a self map on X satisfying the following: d(Sx, Sy) ≤ α{d(x, Sx) + d(y, Sy)} (3.1) 1 for all x, y ∈ X and 0 < α < 2 . Then S has a unique fixed point in X. Proof. Let x0 ∈ X and consider the iterate of sequence xn+1 = Sxn . Now d(x1 , x2 ) = d(Sx0 , Sx1 ) ≤ α{d(x0 , Sx0 ) + d(x1 , Sx1 )}, i.e., d(x1 , x2 ) ≤ Similarly, we have

α d(x0 , x1 ). 1−α

α d(x1 , x2 ) 1−α α 2 ≤( ) d(x0 , x1 ) 1−α

d(x2 , x3 ) ≤

and so on

α n ) d(x0 , x1 ), 1−α α n+1 d(xn+1 , xn+2 ) ≤ ( ) d(x0 , x1 ). 1−α α Let β = 1−α . Then we can rewrite the above statement as follows: d(xn , xn+1 ) ≤ (

d(xn , xn+1 ) ≤ β n d(x0 , x1 ), d(xn+1 , xn+2 ) ≤ β n+1 d(x0 , x1 ). If we use the triangle inequality repeatedly, then we obtain the following: d(xn , xn+k ) ≤ d(xn , xn+1 ) + d(xn+1 , xn+2 ) + . . . + d(xn+k−1 , xn+k ) ≤ (β n + β n+1 + . . . + β n+k−1 )d(x0 , x1 ) βn ≤ d(x0 , x1 ). 1−β n

β Since 0 ≤ β < 1, 1−β d(x0 , x1 ) → 0 as n → ∞. This implies that the sequence {xn } is a Cauchy sequence in (X, d, κ). By Theorem 2.9, there exists a limit point v and due to (κ, κ)-continuity of S, we have S(v) = lim S(xn ) = lim xn+1 = v. n→∞

n→∞

Therefore, S has a fixed point. Now we show that S has a unique fixed point. If a and b are fixed points of S, then d(a, b) = d(Sa, Sb) ≤ α{d(a, Sa) + d(b, Sb)} = {d(a, a) + d(b, b)} = 0. As a result, d(a, b) = 0 and so a = b.



1455

CHOONKIL PARK ET AL 1451-1458

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC C. PARK, O. EGE, S. KUMAR, D. JAIN, J. LEE

Now we prove the digital version of Chatterjea fixed point theorem [5] as follows: Theorem 3.2. Let (X, κ) be a digital image where X ⊂ Zn and κ is an adjacency relation in X. Let (X, d, κ) be a digital metric space and S be a self map on X satisfying the following: d(Sx, Sy) ≤ α{d(x, Sy) + d(y, Sx)} for all x, y ∈ X and 0 < α
0 ⇒ τ + F (d(T (r1 ), T (r2 )) ≤ F (d(r1 , r2 )))

(2.1)

for all r1 , r2 ∈ M and some τ > 0. Here F : R+ → R is a function satisfying the following properties. (F1 ) : F is strictly increasing. (F2 ) : For each sequence {rn } of positive numbers limn→∞ rn = 0 if and only if limn→∞ F (rn ) = −∞. (F3 ) : There exists θ ∈ (0, 1) such that limα→0+ (α)θ F (α) = 0. Wardowski [18] established the following result using F -contraction. Theorem 1. [18] Let (M, d) be a complete metric space and T : M → M be an F -contraction. Then T has a unique fixed point υ ∈ M and for every r0 ∈ M the sequence {T n (r0 )} for all n ∈ N is convergent to υ. Recently, Durmaz et al. [11] presented an ordered version of Theorem 1. Theorem 2. Let (M, , d) be an ordered complete metric space and T : M → M be an ordered F -contraction. Let T be a nondecreasing mapping and there exists r0 ∈ M such that r0  T (r0 ). If T is continuous or M is regular, then T has a fixed point. We denote by ∆F the set of all functions satisfying the conditions (F1 ) − (F3 ). Example 1. [18] Let F : R+ → R be given by the formula F (α) = ln α. It is clear that F satisfies (F1 ) − (F3 ) for any κ ∈ (0, 1). Each mapping T : M → M satisfying (2.1) is an F -contraction such that d(T (r1 ), T (r2 )) ≤ e−τ d(r1 , r2 ), for all r1 , r2 ∈ M, T (r1 ) 6= T (r2 ). Obviously, for all r1 , r2 ∈ M such that T (r1 ) = T (r2 ), the inequality d(T (r1 ), T (r2 )) ≤ e−τ d(r1 , r2 ) holds, that is, T is a Banach contraction. Remark 1. From (F1 ) and (2.1) it is easy to conclude that every F -contraction is necessarily continuous. Definition 2. [12] Let M be a nonempty set and assume that the function p : M × M → R+ 0 satisfies the following properties: (p1 ) r1 = r2 ⇔ p (r1 , r1 ) = p (r1 , r2 ) = p (r2 , r2 ) , (p2 ) p (r1 , r1 ) ≤ p (r1 , r2 ) , (p3 ) p (r1 , r2 ) = p (r2 , r1 ) ,

1460

Muhammad Nazam ET AL 1459-1470

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

(p4 ) p (r1 , r3 ) ≤ p (r1 , r2 ) + p (r2 , r3 ) − p (r2 , r2 ) for all r1 , r2 , r3 ∈ M . Then p is called a partial metric on M and the pair (M, p) is known as partial metric space. In [12], Matthews proved that every partial metric p on M induces a metric dp : M ×M → R+ 0 defined by dp (r1 , r2 ) = 2p (r1 , r2 ) − p (r1 , r1 ) − p (r2 , r2 ) for all r1 , r2 ∈ M . Notice that a metric on a set M is a partial metric p such that p(r, r) = 0 for all r ∈ M and p(r1 , r2 ) = 0 implies r1 = r2 (using (p1 ) and (p2 )). Matthews [12] established that each partial metric p on M generates a T0 topology τ (p) on M . The base of topology τ (p) is the family of open p-balls {Bp (r, ) : r ∈ M,  > 0}, where Bp (r, ) = {r1 ∈ M : p (r, r1 ) < p (r, r) + } for all r ∈ M and  > 0. A sequence {rn }n∈N in (M, p) converges to a point r ∈ M if and only if p(r, r) = limn→∞ p(r, rn ). Definition 3. [12] Let (M, p) be a partial metric space. (1) A sequence {rn }n∈N in (M, p) is called a Cauchy sequence if limn,m→∞ p(rn , rm ) exists and is finite. (2) A partial metric space (M, p) is said to be complete if every Cauchy sequence {rn }n∈N in M converges, with respect to τ (p), to a point r ∈ X such that p(r, r) = limn,m→∞ p(rn , rm ). The following lemma will be helpful in the sequel. Lemma 1. [12] (1) A sequence rn is a Cauchy sequence in a partial metric space (M, p) if and only if it is a Cauchy sequence in metric space (M, dp ) (2) A partial metric space (M, p) is complete if and only if the metric space (M, dp ) is complete. (3) A sequence {rn }n∈N in M converges to a point r ∈ M , with respect to τ (dp ) if and only if limn→∞ p(r, rn ) = p(r, r) = limn,m→∞ p(rn , rm ). (4) If limn→∞ rn = υ such that p(υ, υ) = 0 then limn→∞ p(rn , r) = p(υ, r) for every r ∈ M . In the following example, we shall show that there are mappings which are not F -contractions in metric spaces, nevertheless, such mappings follow the conditions of F -contraction in partial metric spaces. Example 2. Let M = [0, 1] and define partial metric by p(r1 , r2 ) = max {r1 , r2 } for all r1 , r2 ∈ M . The metric d induced by partial metric p is given by d(r1 , r2 ) = |r1 − r2 | for all r1 , r2 ∈ M . Define F : R+ → R by F (r) = ln(r) and T by  r  if r ∈ [0, 1);  5 T (r) =   0 if r = 1.

1461

Muhammad Nazam ET AL 1459-1470

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Then T is not an F -contraction in a metric space (M, d). Indeed, for r1 = 1 and r2 = d(T (r1 ), T (r2 )) > 0 and we have τ + F (d(T (r1 ), T (r2 )))   5 τ + F d(T (1), T ( )) 6   1 τ + F d(0, ) 6 1 6 which is a contradiction for all possible values of (M, p), we get a positive answer, that is,

5 6,

≤ F (d(r1 , r2 )) ,   5 ≤ F d(1, ) , 6   1 , ≤ F 6 1 < , 6 τ . Now if we work in partial metric space

τ + F (p(T (r1 ), T (r2 ))) ≤ F (p(r1 , r2 )) implies   1 ≤ F (1) , τ +F 6 which is true. Similarly, for all other points in M our claim proves true. Definition 4. Let (M ) be a partially ordered set. Two mappings S, T : M → M are said to be weakly increasing mappings if S(m)  T S(m) and T (m)  ST (m) hold for all m ∈ M . Example 3. Let M = R+ be endowed with usual order and usual topology. Let S, T : M → M be given by   1 m if m ∈ [0, 1] m 2 if m ∈ [0, 1] and T (m) = S(m) = 2m if m ∈ (1, ∞). m2 if m ∈ (1, ∞) Then the pair (S, T ) is weakly increasing mappings, where T is a discontinuous mapping. 3. Main results We begin with the following definitions. Definition 5. Let (M, ) be an ordered set and p be a metric on M. Then the triplet (M, , p) is known as an ordered partial metric space. If (M, p) is complete, then (M, , p) is called an ordered complete partial metric space. Moreover, M is regular if the ordered partial metric space (M, , p) provides the following condition:  If {rn } ⊂ M is a nondecreasing (nonincreasing) sequence with rn → r, then rn  r (r  rn ) for all n. Definition 6. Let (M, , p) be an ordered partial metric space and S, T : M → M be two mappings. Let γ = {(h, k) ∈ M × M : h  k, p(S(h), T (k)) > 0} . We say the mappings S and T are a pair of C´ır´ıc type ordered F -contractions if there exist F ∈ ∆F and τ > 0 such that for all (h, k) ∈ γ, τ + F (p(S(h), T (k))) ≤ F (M(h, k)) ,

1462

(3.1)

Muhammad Nazam ET AL 1459-1470

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

where

  p(k, S(h)) + p(h, T (k)) M(h, k) = max p(h, k), p(h, S(h)), p(k, T (k)), . 2

The following lemma will be useful in the sequel. Lemma 2. Let (M, , p) be an ordered complete partial metric space and S, T be a pair of C´ır´ıc type ordered F -contractions. Then for each i = 0, 1, 2, 3, ... p(r2i , r2i+1 ) = 0 implies p(r2i+1 , r2i+2 ) = 0. Proof. Let r0 ∈ M be an initial point and take r1 = S(r0 ) and r2 = T (r1 ). Then by induction we can construct an iterative sequence rn of points in M such a way that r2i+1 = S(r2i ) and r2i+2 = T (r2i+1 ), where i = 0, 1, 2, . . .. We argue by contradiction that p(r2i+1 , r2i+2 ) > 0. We note that   p(r2i+1 , S(r2i )) + p(r2i , T (r2i+1 )) M(r2i , r2i+1 ) = max p(r2i , r2i+1 ), p(r2i , S(r2i )), p(r2i+1 , T (r2i+1 )), 2   p(r2i+1 , r2i+1 ) + p(r2i , r2i+2 ) = max p(r2i , r2i+1 ), p(r2i , r2i+1 ), p(r2i+1 , r2i+2 ), 2 = max {0, p(r2i+1 , r2i+2 )} = p(r2i+1 , r2i+2 ). Consider τ + F (p(r2i+1 , r2i+2 )) = τ + F (p(S(r2i ), T (r2i+1 ))). From (3.1), we have τ + F (p(r2i+1 , r2i+2 )) = τ + F (p(S(r2i ), T (r2i+1 ))) ≤ F (M(r2i , r2i+1 )) ≤ F (p(r2i+1 , r2i+2 )) for all i ∈ N ∪ {0}, which gives a contradiction. Hence p(r2i+1 , r2i+2 )) = 0.



The following theorem is one of the main results. Theorem 3. Let (M, , p) be an ordered complete partial metric space and S, T : M → M be a pair of C´ır´ıc type ordered F-contractions. If S, T are two weakly increasing mappings and there exists r0 ∈ M such that r0  S(r0 ), then there exists a point υ such that p(υ, υ) = 0. Assume that either one of S, T is continuous or M is regular. Then S, T have a common fixed point. Proof. We begin with the following observation: M(h, k) = 0 if and only if h = k is a common fixed point of (S, T ). Indeed, if h = k is a common fixed point of (S, T ), then T (k) = T (h) = h = k = S(k) = S(h) and   p(k, S(h)) + p(h, T (k)) M(h, k) = max p(h, k), p(h, S(h)), p(k, T (k)), 2 = p(h, h). If p(h, h) > 0, then from the contractive condition (3.1), we get τ + F (p(h, h)) = τ + F (p(S(h), T (k))) ≤ F (p(h, h)) , which is a contradiction. Thus p(h, h) = 0 entails M(h, h) = 0.

1463

Muhammad Nazam ET AL 1459-1470

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Conversely, if M(h, k) = 0, then it is easy to check that h = k is a common fixed point of S and T . If M(r1 , r2 ) > 0 for all r1 , r2 ∈ M , then by the given assumptions there exists r0 ∈ M such that r0  S(r0 ). Take r1 = S(r0 ) and r2 = T (r1 ). Then by induction we can construct an iterative sequence rn of points in M such a way that r2i+1 = S(r2i ) and r2i+2 = T (r2i+1 ), where i = 0, 1, 2, . . .. Since r0  S(r0 ) and S, T are weakly increasing mappings, we obtain r1 = S(r0 )  T S(r0 ) = T (r1 ) = r2 = T (r1 )  ST (r1 ) = S(r2 ) = r3 . Iteratively, we obtain r0  r1  r2  · · ·  rn−1  rn  rn+1  · · · . Now if p(S(r2i ), T (r2i+1 )) = 0, then using Lemma 2, we can conclude that r2i is a common fixed point of S, T . If p(S(r2i ), T (r2i+1 )) > 0, then (r2i , r2i+1 ) ∈ γ, since r2i  r2i+1 . From the contractive condition (3.1), we get τ + F (p(r2i+1 , r2i+2 )) = τ + F (p(S(r2i ), T (r2i+1 ))) ≤ F (M(r2i , r2i+1 ))

(3.2)

for all i ∈ N ∪ {0}, where   p(r2i+1 , S(r2i )) + p(r2i , T (r2i+1 )) M(r2i , r2i+1 ) = max p(r2i , r2i+1 ), p(r2i , S(r2i )), p(r2i+1 , T (r2i+1 )), 2   p(r2i+1 , r2i+1 ) + p(r2i , r2i+2 ) = max p(r2i , r2i+1 ), p(r2i , r2i+1 ), p(r2i+1 , r2i+2 ), 2 = max {p(r2i , r2i+1 ), p(r2i+1 , r2i+2 )} . If M(r2i , r2i+1 ) = p(r2i+1 , r2i+2 ), then due to (F1 ) and (3.2), we get a contradiction. Thus, for M(r2i , r2i+1 ) = p(r2i , r2i+1 ), we have F (p(r2i+1 , r2i+2 )) ≤ F (p(r2i , r2i+1 )) − τ

(3.3)

for all i ∈ N ∪ {0}. Also since r2i+1  r2i+2 , p(S(r2i+2 ), T (r2i+1 )) > 0. Otherwise, by Lemma 2, r2i+1 is a common fixed point of S, T . Thus (r2i+1 , r2i+2 ) ∈ γ and note that ) ( p(r2i+2 , r2i+1 ), p(r2i+2 , S(r2i+2 )), p(r2i+1 , T (r2i+1 )), M(r2i+2 , r2i+1 ) = max p(r2i+1 , S(r2i+2 )) + p(r2i+2 , T (r2i+1 )) 2 ( ) p(r2i+2 , r2i+1 ), p(r2i+2 , r2i+3 ), p(r2i+1 , r2i+2 ), = max p(r2i+1 , r2i+3 ) + p(r2i+2 , r2i+2 ) 2 = max {p(r2i+2 , r2i+1 ), p(r2i+2 , r2i+3 )} . Again the case M(r2i+2 , r2i+1 ) ≤ p(r2i+2 , r2i+3 ) is not possible. So, for the other case, the contractive condition (3.1) implies F (p(r2i+2 , r2i+3 )) ≤ F (p(r2i+1 , r2i+2 )) − τ

(3.4)

for all i ∈ N ∪ {0}. By (3.3) and (3.4), we have F (p(rn+1 , rn+2 )) ≤ F (p(rn , rn+1 )) − τ

1464

(3.5)

Muhammad Nazam ET AL 1459-1470

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

for all n ∈ N ∪ {0}. By (3.5), we obtain F (p(rn , rn+1 )) ≤ F (p(rn−2 , rn−1 )) − 2τ. Repeating these steps, we get F (p(rn , rn+1 )) ≤ F (p(r0 , r1 )) − nτ.

(3.6)

By (3.6), we obtain limn→∞ F (p(rn , rn+1 )) = −∞. Since F ∈ ∆F , lim p(rn , rn+1 ) = 0.

(3.7)

n→∞

From the property (F3 ) of F -contraction, there exists κ ∈ (0, 1) such that lim ((p(rn , rn+1 ))κ F (p(rn , rn+1 ))) = 0.

(3.8)

n→∞

By (3.6), for all n ∈ N, we obtain (p(rn , rn+1 ))κ (F (p(rn , rn+1 )) − F (p(r0 , x1 ))) ≤ − (p(rn , rn+1 ))κ nτ ≤ 0.

(3.9)

Considering (3.7), (3.8) and letting n → ∞ in (3.9), we have lim (n (p(rn , rn+1 ))κ ) = 0.

(3.10)

n→∞

Since (3.10) holds, there exists n1 ∈ N such that n (p(rn , rn+1 ))κ ≤ 1 for all n ≥ n1 or p(rn , rn+1 ) ≤

1 1



for all n ≥ n1 .

(3.11)

Using (3.11), we get, for m > n ≥ n1 , p(rn , rm ) ≤ p(rn , rn+1 ) + p(rn+1 , rn+2 ) + p(rn+2 , rn+3 ) + ... + p(rm−1 , rm ) −

m−1 X

p(rj , rj )

j=n+1

≤ p(rn , rn+1 ) + p(rn+1 , rn+2 ) + p(rn+2 , rn+3 ) + ... + p(rm−1 , rm ) = ≤

m−1 X i=n ∞ X

p(ri , ri+1 )

p(ri , ri+1 )

i=n



∞ X 1 1

i=n

.

ik P∞

1

1 entails limn,m→∞ p(rn , rm ) = 0. Hence {rn } is a Cauchy iκ sequence in (M, p). Due to Lemma 1, {rn } is a Cauchy sequence in (M, dp ). Since (M, p) is a complete partial metric space, (M, dp ) is a complete metric space and as a result there exists υ ∈ M such that limn→∞ dp (rn , υ) = 0. Moreover, by Lemma 1

The convergence of the series

i=n

lim p(υ, rn ) = p(υ, υ) =

n→∞

1465

lim p(rn , rm ).

n,m→∞

(3.12)

Muhammad Nazam ET AL 1459-1470

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Since limn,m→∞ p(rn , rm ) = 0, from (3.12), we deduce that p(υ, υ) = 0 = lim p(υ, rn ).

(3.13)

n→∞

Now from (3.13) it follows that r2n+1 → υ and r2n+2 → υ as n → ∞ with respect to τ (p). Suppose that T is continuous. Then υ = lim rn = lim r2n+1 = lim r2n+2 = lim T (r2n+1 ) = T ( lim r2n+1 ) = T (υ). n→∞

n→∞

n→∞

n→∞

n→∞

Now we show that υ = S(υ). Suppose on contrary that p(υ, S(υ)) > 0. Regarding υ  υ together with the contractive condition (3.1), we obtain τ + F (p(υ, S(υ))) = τ + F (p(S(υ), T (υ))) ≤ F (M(υ, υ)), F (p(υ, S(υ))) < F (p(υ, υ)), which is a contradiction. Thus p(υ, S(υ)) = 0 and due to (p1 ), (p2 ) we conclude that υ = S(υ). Consequently, we have S(υ) = T (υ) = υ, that is, (S, T ) have a common fixed point υ. In the other case, using the assumption that M is regular, we have that rn  υ for all n ∈ N. To show that υ is a common fixed point of S, T , we split the proof into two cases. (1) rn = υ for some n. Then there exists i0 ∈ N such that r2i0 = υ. Consider S(υ) = S(r2i0 ) = r2i0 +1  υ and also υ = r2i0  r2i0 +1 = S(υ). Thus υ = S(υ) and from (3.1), we have υ = T (υ). (2) rn 6= υ for all n. Suppose that p(υ, S(υ)) > 0. Since limn→∞ r2i = υ, there exists N ∈ N such that p(υ, S(υ)) p(r2i+1 , S(υ)) > 0 and p(r2i , υ) < for all i ≥ N . 2 Moreover,   p(υ, S(r2i )) + p(r2i , T (υ)) M(r2i , υ) = max p(r2i , υ), p(r2i , S(r2i )), p(υ, T (υ)), , 2 p(υ, S(υ)) M(r2i , υ) ≤ for all i ≥ N . 2 So (r2i , υ) ∈ γ and S and T satisfy the generalized rational type ordered F -contraction. Thus τ + F (p(r2i+1 , S(υ))) = τ + F (p(S(r2i ), T (υ))) ≤ F (M(r2i , υ)), p(υ, S(υ)) ) as i → ∞, F (p(υ, S(υ))) < F ( 2 which is a contradiction. Therefore, p(υ, S(υ)) = 0 and due to (p1 ), (p2 ) we conclude that υ = S(υ) and from (3.1) we have υ = T (υ). Thus (S, T ) have a common fixed point υ.  We denote the set of common fixed points of S, T by Fix(S, T ). Remark 2. If we assume that Fix(S, T ) in Theorem 3 is a chain along with existing conditions, then it is a singleton set (common fixed point is unique). Indeed, if ω is another common fixed

1466

Muhammad Nazam ET AL 1459-1470

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

point of S, T , then ω  υ. Also p(S(υ), T (ω)) > 0 (otherwise υ = ω) and so (υ, ω) ∈ γ. From the contractive condition (3.1), we have τ + F (p(υ, ω)) = τ + F (p(S(υ), T (ω))) ≤ F (M(υ, ω)) ,

(3.14)

where 

p(ω, S(υ)) + p(υ, T (ω)) M(υ, ω) = max p(υ, ω), p(υ, S(υ)), p(ω, T (ω)), 2 = p(υ, ω).



From (3.14), we have F (p(υ, ω)) < F (p(υ, ω)) , which leads to a contradiction. Hence υ = ω and υ is a unique common fixed point of a pair (S, T ). Remark 3. If Fix(S, T ) is not a chain and there exists z in M such that every element in the orbit OT (z) = {z, T (z), T 2 (z), . . .} is comparable to υ, ω, then υ = ω (υ is unique) provided that S and T are C´ır´ıc type ordered F -contractions. Proof. Assume that υ, ω are in Fix(S, T ) and there exists an element z ∈ M such that every element of OT (z) = {z, T (z), T 2 (z), . . .} is comparable to υ, ω and hence (T n−1 (z), S n−1 (υ)) and (T n−1 (z), S n−1 (ω)) are elements of γ for each n ≥ 1. Due to (3.1), we have τ + F (p(υ, T n (z))) = τ + F (p(S n (υ), T n (z))  ≤ F (M S n−1 (υ), T n−1 (z) ),

(3.15)

where      p S n−1 (υ), T n−1 (z) , p S n−1 (υ), S n (υ) , p T n−1 (z), T n (z) ,   M S n−1 (υ), T n−1 (z) = max p T n−1 (z), S n (υ) + p S n−1 (υ), T n (z)  2   n−1 n−1 = p S (υ), T (z) = p υ, T n−1 (z) . Thus, from (3.15), we deduce that {p(υ, T n (z))} is a nonnegative decreasing sequence which in turn converges to 0. Similarly, we can show that {p(ω, T n (z))} is a nonnegative decreasing sequence, which converges to 0. Consequently, υ = ω.  The following example illustrates Theorem 3 and shows that the condition (3.1) is more general than contractivity condition given by Durmaz et al. ([11]). Example 4. Let M = [0, 1] and define p(r1 , r2 ) = max {r1 , r2 }. Let ≺1 be defined by r1 ≺1 r2 if and only if r2 ≤ r1 for all r1 , r2 ∈ M . Then r1 ≺1 r2 is a partial order on M and (M, ≺1 , p) is a complete ordered partial metric space. Moreover, define d (r1 , r2 ) = |r1 − r2 |. Then (M, ≺1 , d) is a complete ordered metric space. Define the mappings S, T : M → M as follows:  r  if r ∈ [0, 1);  3r 5 T (r) = and S(r) = for all r ∈ M .  7  0 if r = 1

1467

Muhammad Nazam ET AL 1459-1470

  

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Clearly, S, T are weakly increasing self mappings with respect to ≺1 . Define the function F : R+ → R by F (r) = ln(r) for all r ∈ R+ > 0. Let r1 , r2 ∈ M such that p(S(r1 ), T (r2 )) > 0 and suppose that r2 ≺1 r1 . Then ( ) r1 r2 r1 r2  . M(r1 , r2 ) = max r2 , , 1 + r1 1 + max 3r71 , r52 Since

r1 1+r1

< 1 and

r1 n o 3r r 1+max 71 , 52

< 1, we have that M(r1 , r2 ) = r2 .

In a similar way, if r1 ≺1 r2 , then we obtain that M(r1 , r2 ) = r1 , i.e., M(r1 , r2 ) = p(r1 , r2 ). Let τ ≤ ln( 37 ). Since (r1 , r2 ) ∈ γ    3r1 r2 , τ + (p(S(r1 ), T (r2 ))) = τ + ln max 7 5    7 3p(r1 , r2 ) p(r1 , r2 ) ≤ ln( ) + ln max , 3 7 5   7 3p(r1 , r2 ) = ln( ) + ln = ln (p(r1 , r2 )) 3 7 = F (M(r1 , r2 )) . Thus the contractive condition (3.1) is satisfied for all r1 , r2 ∈ M with L = 0. Hence all the hypotheses of Theorem 3 are satisfied. Note that (S, T ) have a unique common fixed point r = 0. As we have seen in Example 2, T is not an F -contraction in (M, ≺1 , d). Thus we cannot apply Theorem 1 and hence Theorem 2. The following corollary generalizes Theorem 2. The following corollary generalizes the results in [13]. Corollary 1. Let (M, , p) be a complete ordered partial metric space and T : M → M be a mapping such that r0  T (r0 ). Assume that (1) either T is a continuous mapping or M is regular, (2) T is a C´ır´ıc type ordered F -contraction. Then T has a unique fixed point υ in M such that p(υ, υ) = 0. Proof. Setting S = T in Theorem 3, we obtain the required result.



4. Application of Theorem 3 This section contains an existence result which shows the usefulness of Theorem 3 in establishing existence of solution of implicit type integral equation: Z aZ a A(t, u(r, t)) = H(t, θ, φ, u(θ, φ)) dθdφ, (4.1) 0

0

where u ∈ U = L [C([0, a]) × [0, a]]=Lebesgue measurable space, t, θ, φ ∈ Ia = [0, a]. For u ∈ U, define norm as: kuk = max {|u(t)|}. Let U be endowed with the partial metric p : U × U → R+ 0 t∈[0,a]

defined by p(u, v) = d(u, v) + c = max |u(r, t) − v(r, t)| + c for all u, v ∈ U. t∈[0,a]

1468

Muhammad Nazam ET AL 1459-1470

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Also, U can be equipped with order ≺2 defined by u ≺2 v if and only if v(r, t) ≤ u(r, t). Obviously, (U, k · k) is a Banach space and (U, ≺2 , p) is a complete ordered partial metric space. Theorem 4. Assume that (a) for all u, v ∈ U and κ = |u(r1 , t) − v(r1 , t)| + c |A(t, u(r1 , t)) − A(t, v(r1 , t))| + c ≤ (κ)e−τ for each t ∈ Ia , (b) H(t, θ, φ, u(θ, φ)) ≤ a12 u(r1 , t) for all t ∈ Ia , (c) for all t, θ, φ ∈ Ia , Z Z aZ a H(t, θ, φ, u(θ, φ)) dθdφ) ≤ A(t, 0

0

0

aZ a

H(t, θ, φ, u(θ, φ)) dθdφ, 0

1 A(t, u(r1 , t)). a2 Then implicit integral equation (4.1) has a solution in U. (d) H(t, θ, φ, A(θ, u(θ, φ))) ≥

Proof. Firstly, define S(u(r1 , t)) = A(t, u(r1 , t)) and T (u(r1 , t)) = We show that S,T are weakly increasing mappings. Consider

RaRa 0

0

H(t, θ, φ, u(θ, φ)) dθdφ.

S(T (u(r1 , t))) = A(t, T (u(r1 , t)))  Z aZ a  = A t, H(t, θ, φ, u(θ, φ)) dθdφ 0 0 Z aZ a ≤ H(t, θ, φ, u(θ, φ)) dθdφ = T (u(r1 , t)) using (c) 0

0

and Z

aZ a

H(t, θ, φ, S(u(θ, φ))) dθdφ

T (S(u(r1 , t))) = 0

Z

0 aZ a

H(t, θ, φ, A(θ, u(θ, φ))) dθdφ

= 0

1 a2



Z

0 aZ a

A(t, u(r1 , t)) dθdφ = A(t, u(r1 , t)) due to (b). 0

0

Thus S(T (u(r1 , t))) ≤ T (u(r1 , t)) and T (S(u(r1 , t))) ≤ S(u(r1 , t)) for all t ∈ Ia imply that S,T are weakly increasing mappings with respect to ≺2 . Secondly, consider p (S(u), T (v)) = max |S(u(r1 , t)) − T (v(r2 , t))| + c t∈Ia Z aZ a = max A(t, u(r1 , t)) − H(t, θ, φ, v(θ, φ)) dθdφ + c t∈Ia 0 0 Z aZ a 1 ≤ max A(t, u(r1 , t)) − 2 A(t, v(r1 , t)) dθdφ + c using (d) t∈Ia a 0 0 = max |A(t, u(r1 , t)) − A(t, v(r1 , t))| + c t∈Ia

≤ max(κ)e−τ using (a) t∈Ia −τ

≤ e

p(u, v).

1469

Muhammad Nazam ET AL 1459-1470

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

So τ + ln(p (S(u), T (v))) ≤ ln(p(u, v)) ≤ ln(M(u, v)). Thus by taking F (r) = ln(r), we have τ + F (p (S(u), T (v))) ≤ F (M(u, v)). Hence by Theorem 3 the integral equation (4.1) has a solution in L [C ([0, a]) × [0, a]].



References [1] T. Abdeljawad, E. Karapinar, K. Tas, Existence and uniqueness of a common fixed point on partial metric spaces, Appl. Math. Lett. 24 (2011), 1900-1904. [2] O. Acar, I. Altun, Fixed point theorems for weak contractions in the sense of Berinde on partial metric spaces, Topology Appl. 159 (2012), 2642-2648. [3] O. Acar, I. Altun, Multivalued F -contractive mappings with a graph and some fixed point results, Publ. Math. Debrecen 88 (2016), 305-317. [4] O. Acar, G. Durmaz, G. Minak, Generalized multivalued F -contractions on complete metric spaces, Bull. Iranian Math. Soc. 40 (2014), 1469-1478. [5] I. Altun, F. Sola, H. Simsek, Generalized contractions on partial metric spaces, Topology Appl. 157 (2010), 2778-2785. [6] I. Altun, S. Romaguera. Characterizations of partial metric completeness in terms of weakly contractive mappings having fixed point, Appl. Anal. Discrete Math. 6 (2012), 247-256. [7] G.A. Anastassiou, I.K. Argyros, Approximating fixed points with applications in fractional calculus, J. Comput. Anal. Appl. 21 (2016), 1225–1242. [8] A. Batool, T. Kamran, S. Jang, C. Park, Generalized ϕ-weak contractive fuzzy mappings and related fixed point results on complete metric space, J. Comput. Anal. Appl. 21 (2016), 729–737. [9] S. Chandok, Some fixed point theorems for (α, β)-admissible Geraghty type contractive mappings and related results, Math. Sci. 9 (2015), 127-135. [10] S. Cho, S. Bae, E. Karapinar, Fixed point theorems for α-Geraghty contraction type maps in metric spaces, Fixed Point Theory Appl. 2013, 2013:329. [11] G. Durmaz, G. Minak, I. Altun, Fixed points of ordered F -contractions, Hacettepe J. Math. Stat. 45 (2016), 15-21. [12] S.G. Matthews, Partial metric topology, in Proceedings of the 11th Summer Conference on General Topology and Applications, Vol. 728, pp.183-197, The New York Academy of Sciences, 1995. ´ c type generalized F -contractions on complete metric spaces and fixed [13] G. Minak, A. Helvaci, I. Altun, Ciri´ point results, Filomat 28 (2014), 1143-1151. [14] M. Nazam, M. Arshad, C. Park, Fixed point theorems for improved α-Geraghty contractions in partial metric spaces, J. Nonlinear Sci. Appl. 9 (2016), 4436-4449. [15] H. Piri, P. Kumam, Some fixed point theorems concerning F -contraction in complete metric spaces, Fixed Point Theory Appl. 2014, 2014:210. [16] A.C.M. Ran, M.C.B. Reurings, A fixed point theorem in partially ordered sets and some application to matrix equations, Proc. Amer. Math. Soc. 132 (2004), 1435-1443. [17] S. Shukla, S. Radenovic, Some common fixed point theorems for F -contraction type mappings on 0-complete partial metric spaces, J. Math. 2013, Art. ID 878730. [18] D. Wardowski, Fixed point theory of a new type of contractive mappings in complete metric spaces. Fixed Point Theory Appl. 2012, 2012:94.

1470

Muhammad Nazam ET AL 1459-1470

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

The Theoretical Analysis of l1-TV Compressive Sensing Model for MRI Image Reconstruction Xiaoman Liu1 School of Mathematics, Southeast University Nanjing, 211189, P.R.China July 27, 2017

Abstract One of the main tasks in MRI image reconstruction is to catch the picture characteristics such as interfaces and textures from incomplete frequency data, and the iteration methods are the most useful methods to the minimization problem. A new viewpoint of choosing the iteration stopping rules in image reconstruction problem is proposed. The reconstruction model based on compressive sensing theory consists of a data matching term and two penalty terms, wavelet sparse and total variation regularization term. Then the Bregman iteration with lagged diffusivity fixed point iteration is used to solve the corresponding nonlinear Euler-Lagrange equation of image reconstruction model with incomplete frequency data. A real MRI image is used to test the proposed method in numerical experiments with different stopping rules. The theoretical analysis illustrate that although the norm of objective functional decreases with respect to the number of iteration, it cannot ensure the reconstructed image is the desired optimization image.

MSC(2010): 65M32, 65T50, 65T60, 65K10 Keywords: image reconstruction; MRI image; total variation; wavelet transform; regularization

1

Introduction

Image processing can be roughly divided into three kinds of problems, namely, image deblurring, image enhancement and image restoration, and the main purpose is to obtain the clear image with interfaces and textures from its noisy measurement. For a bounded connected domain Ω ⊂ R2 (a rectangle in general [1]), let u(x), x = (x1 , x2 ) be the grey function of an image defined in Ω. In general, we can get the degradation data bσ (x) with blurring noisy process, such as moving blurry, Gaussian blurry, white Gaussian noise, impulse noise (salt and pepper noise) as well as Poisson noise [2, 3]. The optimization scheme is one of the classical way to reconstruct u from bσ , i.e., minimizes the Tikhonov cost functional J(u) = 1 Corresponding

1 kK ◦ u − bσ k2L2 (Ω) + αL ◦ u 2

(1)

author: X.M. Liu, email: [email protected]

1

1471

Xiaoman Liu 1471-1478

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

The Theoretical Analysis of l1 -TV Compressive Sensing Model

2

with some penalty term L ◦ u and the regularization parameter α > 0, where the operator L represents the a-priori regularity image u. Obviously, all of terms in (1) are continuous version, i.e., u(x) is defined in Ω everywhere, to unify the basic idea of this scheme with our numerical implementations, we describe all these terms by the finite dimensional approximation of u(x) ∈ RN ×N with components ui,j (i, j = 1, · · · , N ). In many engineering configurations, instead of the spatial noisy data bσi,j for each pixel Ωi,j , the practical measurement data may be the incomplete frequency data, or the finite number of discrete frequencies at the band-limited interval. For example, in the application of magnetic resonance imaging (MRI) image reconstruction, data collected by an MR scanner are, roughly speaking, in the frequency domain (called k -space) rather than the spatial domain. One of the main stage for MRI is the k -space data acquisition. In this stage, energy from a radio frequency pulse is directed to a small section of the targeted anatomy at a time. As a result, the protons within that area are forced to spin in a certain frequency and get aligned to the direction of the magnet. Upon stopping the radio frequency, the physical system gets back to its normal state and releases energy that is then recorded for analysis. This process is repeated until enough data is collected for reconstructing a high quality image in the second stage. This process is based on the compressive sensing (CS), and this kind of MRI image reconstruction problem is called CS-MRI image reconstruction. For more details about these contents see [4, 5, 6] and references therein. In this case, the data-matching term in (1) should be replaced by kP ◦ F[u] − P ◦ ˆbδ k22 , where F is the two-dimensional discrete Fourier transform converting the spatial matrix u ∈ RN ×N into frequency matrix F[u] ∈ CN ×N , while P is a linear operator specifying the incomplete frequency data from CN ×N , ˆbδ ∈ CN ×N is the noisy frequency data, k · k2 denotes the Euclidean norm. In the case of CS-MRI, the recovery of u from ˆbδ is equivalent to solving the l0 problem: min{kΨ ◦ uk0 : kP ◦ F[u] − P ◦ ˆbδ k22 ≤ δ 2 },

(2)

u

where k · k0 is the number of nonzero components of the objective, and orthogonal wavelet operator 2 Ψ : RN ×N → RN ×1 is based on the orthogonal wavelet basis ψi,j (i, j = 1, · · · , N ) [7]. However, it is well-known that (2) is a NP-hard problem, and as usually, we replace it by the l1 -minimizing problem: min{kΨ ◦ uk1 , kP ◦ F[u] − P ◦ ˆbδ k22 ≤ δ 2 }, (3) u

which yields sparse solutions under some conditions [8], k · k1 denotes the l1 norm.

2

A theoretical analysis for l1 -TV optimization model

As usual, the image u has the obvious edges such as the interfaces in MRI images. So it is natural to also cooperate this a-priori information into the reconstruction model by considering the total variation (TV) penalty. So it is natural to consider the following unconstraint cost functional: J(u) :=

1 kP ◦ F[u] − P ◦ ˆbδ k22 + α1 kΨ ◦ uk1 + α2 |u|T V , 2

(4)

where α1 , α2 are positive regularization parameters that determine the penalty terms. Therefore, the image reconstruction problem is the following l1 -TV optimization model arg min J(u) = u∈RN ×N

1 kP ◦ F[u] − P ◦ ˆbδ k22 + α1 kΨ ◦ uk1 + α2 |u|T V . 2

1472

(5)

Xiaoman Liu 1471-1478

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

The Theoretical Analysis of l1 -TV Compressive Sensing Model

3

2

Suppose u ∈ RN ×1 is a vector formed by stacking the columns of a two-dimensional MRI image array u := (ui,j ), i, j = 1, · · · , N . Since (5) is not a differential, we added a small positive parameter β [9, 10] and presented the optimization model as the following minimizing convex perturbed form arg

min2

u∈RN

J(u) =

×1

1 ˆ δ k22 + α1 kΨuk1,β + α2 |u|T V,β , kPFu − Pb 2

(6)

in which two regularization terms are defined as 2

kΨuk1,β =

N q X

2

((Ψ ◦ u)i ) + β, |u|T V,β =

i=1

N q X

|∇i,j u|2 + β,

i,j=1

 where ∇i,j u = ∇xi,j u, ∇yi,j u is defined under periodic boundary condition   ui,j+1 − ui,j , if j < n, ui+1,j − ui,j , if i < m, ∇xi,j u = ∇yi,j u = ui,1 − ui,n , if j = n. u1,j − um,j , if i = m. q for i, j = 1, · · · , N, |∇i,j u| = (∇xi,j u)2 + (∇yi,j u)2 . P is an N 2 × N 2 matrix consisting of sampling matrix P (an N × N matrix generating from the identity matrix I by setting its some rows as null 2 2 vectors), and F ∈ CN ×N is the two-dimensional discrete Fourier matrix defined in Fourier matrix F ∈ CN ×N with the components Fm,n = e−i2πmn/N . The objective function in the problem (6) is strictly convex and differentiable with respect to variable u and its global minimizer is unique [11] when α1 = 0. The solution of (6) with small enough β can better approximate to the solution of the minimizing (4). Because the solution of the minimization problem for (4) can be regarded as the limit of the solution of (6) when β → 0. There are a number of numerical methods for solving the image reconstruction model (6), like fixed-point continuation method [12], split Bregman method [13], gradient project method [14], fast alternating minimization method [15], the variable splitting method [16], the operator-splitting algorithm [17] and fast iterative shrinkage-thresholding algorithm [18]. Meanwhile the conjugate gradient method (CGM) [19] is also very efficient approach to solve (6) in CS-MRI, and the former work [10] is better than CGM. In this paper, a fast scheme with different iteration stopping rules is proposed to solve the objective problem (6), which is based on Bregman method [20] and lagged diffusivity fixed point iteration [21]. The numerical experiments are shown to compare proposed method with the one in former work [10]. The fast iterative scheme for proposed model (6) is as follows Algorithm 1. Now we give the theoretical analysis based on regularization for the CS-MRI image reconstruction problem. The objective optimization problem (6) can be rewritten as arg min J(u) = u∈RN ×N

1 kP ◦ F[u] − P ◦ ˆbδ k22 + α1 kΨ ◦ uk1,β + α2 |u|T V,β . 2

(7)

Assume Lα ◦ u = α1 kΨ ◦ uk1,β + α2 |u|T V,β . In order to get the approximate solution u? to the above problem, we change the optimization problem (7) to the equation below ((PF)∗ PF + Lα ) ◦ u? = (PF)∗ P ◦ ˆbδ ,

(8)

u? = ((PF)∗ PF + Lα )−1 (PF)∗ P ◦ ˆbδ ,

(9)

or

1473

Xiaoman Liu 1471-1478

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

The Theoretical Analysis of l1 -TV Compressive Sensing Model

4

Algorithm 1 The fast iterative scheme based on Bregman iteration for minimizing J(u) 2 2 Input: frequency input {ˆbδi,j |i, j = 1, · · · , N }, sampling matrix P ∈ RN ×N , and parameters α1 , α2 , β. Do iteration from k = 0 with ˆb(0) = Θ, u(0) = Θ. While (the stopping rule is not satisfied) { Compute:   ˆ (k+1) = b ˆδ + b ˆ (k) − PFu , b o n ˆ (k+1) k22 , u(k+1) = arg min2 α1 kΨuk1,β + α2 |u|T V,β + 21 kPFu − Pb u∈RN

×1

k ← k + 1. } End do u? := u(k) . End where ∗ means the conjugate transpose. Let operator Rα = ((PF)∗ PF + Lα )−1 (PF)∗ P. When Rα is the regularization strategy [22], we have





ku? − uk2 ≤ Rα ◦ ˆbδ − Rα ◦ ˆb + Rα ◦ ˆb − u 2 2

ˆδ ˆ ≤ kRα k2 · b − b + kRα ◦ (KF ◦ u) − uk2 2

≤ δ kRα k2 + kRα KF ◦ u − uk2 ,

(10)

where KF is an operator with Fourier transform in the classical way to reconstruct u from frequency data ˆb based on (1), i.e., KF ◦ u = ˆb. The iteration scheme can be based on Bregman iteration method [20], so the regularization parameter is seen as discrete regularization parameter, like α1 , α2 , β and iteration number k. With the inequations above, the regularization error ku? − uk2 can be seen as two parts: the ill-posed of model, and the error when Rα tends to KF−1 . In [23], the error ku? − uk2 is of the optimal value at some iteration step. When iteration number k → ∞ which beyonds that iteration step, objective function J (u? ) → 0 but the error ku? − uk2 9 0. Now, we provide the similar conclusion in finite dimension. As we all know, the penalty terms in (7) are the important functions to the objective problem. However, the ill-posed problem (6) ˆ δ . Therefore, we should optimize the objective requires only the incomplete frequency data Pb δ 2 ˆ k2 . In the other words, there also exists a u† (i.e. the exact solution) such function kPFu − Pb that



ˆδ ˆδ (11)

PFu† − Pb

= inf2 PFu − Pb

= 0. 2

u∈RN

×1

2

Noticing that the minimizing sequence {uk,α : k = 1, 2, · · · } only has the convergence lim J(uk,α ) = J(u? ),

k→∞

(12)

there is no convergence for the norm kuk,α − u? k in general. So we need to identify the behavior of uk,α as k → ∞ and αi → 0(i = 1, 2).

1474

Xiaoman Liu 1471-1478

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

The Theoretical Analysis of l1 -TV Compressive Sensing Model  Theorem 2.1. There exists a subsequence ukj ,α : j = 1, 2, · · · ⊂ {uk,α : k = 1, 2, · · · } such that

lim ukj ,α − uα 2 = 0. j→∞

5

(13)

Proof. Since (12), we easily know that lim J(uk,α ) = J(u? ) =

k→∞

inf

u∈RN 2 ×1

J(u).

According to the finite dimension domain, there exists a subsequence of uk,α denoted by {ukj ,α : j = 1, 2, · · · } such that ukj ,α → uα as j → ∞. Hence the limit of the norm ukj ,α − uα 2 equals to 0. The proof is complete. From Theorem 2.1, we have some sequence αm → 0 as m → ∞, that means ¯, lim lim ukj ,αm = lim uαm := u m→∞  lim lim J ukj ,αm = 0.

m→∞ j→∞

m→∞ j→∞

(14) (15)

ˆ δ k2 . It reveals the exact meaning of the approximate Noticing (11) above, (15) is equal to kPFu† −Pb solution to our problem by {ukj ,α : j = 1, 2, · · · }, while {ukj ,α : j = 1, 2, · · · } can converge to some ¯ . But it is worth noting that u ¯ cannot be ensured theoretically to be the exact solution u† . u Therefore the iteration number could not be too big. Even though the approximate solution u? is the minimization for optimization model, it could not be the best solution for image reconstruction problem, i.e., u? 9 u† .

3

Numerical Experiments

In this section, the proposed fast algorithm with different iteration stopping rules is shown to solve the objective problem (6), which is compared with the method in [10]. All tests are performed in MATLAB 7.10 on a laptop with an Intel Core i5 CPU M460 processor and 2 GB of memory. The signal to noise ratio (SNR) and relative error (ReErr) are used to measure the quality of the reconstructed images. The definitions of SNR and relative error are given as follows ! kuk2

SNR = 20 lg , (16)

u − u(k) 2

(k)

u − u 2 2 , ReErr = kuk22

(17)

where u(k) and u are the reconstructed and original images, respectively. The CPU time is used to evaluate the speed of MRI image reconstruction. As usual, the iteration stopping rule is one of the following three conditions:

(k)

u − u(k−1) (k) 2

J(u ) ≤ δ, ≤ δ, k = K0 , (18)

u(k) 2

1475

Xiaoman Liu 1471-1478

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

The Theoretical Analysis of l1 -TV Compressive Sensing Model

6

which mean the norm of objective function in (6), the relative difference between successive iteration for the reconstructed image, and maximum number of iterations K0 . In order to illustrate the efficient of the theoretical analysis in Section 2, we use the maximum iterations as the stopping rule. Firstly, the performance of Algorithm 1 in solving model (6) for a real MRI brain image is shown in Figure 1, which is compared with the efficient method in [10]. Let additive Gaussian noise level in frequency domain is δ = 0.01, i.e., adding 1% additive noise on the frequency of original image. The parameters α1 = 0.01, α2 = β = 0.0001 which are the same as the comparison algorithm. To the sampling matrix P, we choose the radial sampling method with 22 × 8 views on frequency data. The tests results are shown in Figure 1(c)(d) which are based on stopping rule K0 = 60 in Algorithm 1 and K0 = 100 in the comparison algorithm, respectively. The SNR in (c) and (d) is 38.2321dB, 37.7443dB respectively, and the relative error is 4.0866 × 10−5 , 1.8770 × 10−4 respectively. From these data, the reconstruction is efficient with these parameters in the fast iteration scheme based on the iterations K0 as stopping rule. However, ever though the iterations number in (d) is bigger than the one in (c), the reconstructed image (d) is not clearer than (c). Next our numerical experiment is to illustrate the relationship between reconstruction error (Err) and objective function J u(k) . The reconstruction error between reconstructed image and original image is used to evaluate the exactitude of ill-posed problem, which defined as follows Err = ku(k) − uk2 .

(19)

We take different iteration step by step, i.e., 10, 20, 30, · · · . The sampling mask in the frequency space separately take 22 × 8, 22 × 10, 22 × 12 views in radial sampling method. We still assume  the above mentioned parameters in the tests. The fitting curve of error ku(k) − uk2 and J u(k) in different iteration numbers are shown in Figure 2. From Figure 2, we find that although the stopping criterion is satisfied, the reconstruction error ku(k) − uk2 is of the optimal value at some iteration step. It means that the more iteration is better for reconstruction is not true. Meanwhile, the convergence and error analysis are the same with theoretical analysis in the above section. Therefore, the choice of iteration stopping rule, especially the iteration number K0 , is one of the most important factor of MRI image reconstruction.

Figure 1: (a) Original image; (b) Sampling mask: 22 × 8 views; (c) Reconstructed image with K0 = 60; (d) Reconstructed image with K0 = 100.

1476

Xiaoman Liu 1471-1478

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

The Theoretical Analysis of l1 -TV Compressive Sensing Model

40

7

7000 22*8 22*10 22*12

35

22*8 22*10 22*12

6000

30

5000 J(uk)

||uk−u||

25 20

4000 3000

15 2000

10

1000

5 0 0

50

100 k

150

200

0 0

50

100 k

150

200

Figure 2: Fitting curve of error and J(u(k) ) in different iteration numbers.

4

Conclusion

The l1 -TV optimization model based on compressive sensing was established to reconstruct MRI images. Bregman method and lagged diffusivity fixed point iteration are used to solve the modified reconstruction model, and a fast iteration scheme with error estimate analysis is proposed. Based on Tikhonov regularization theory, a theoretical analysis on iteration stopping rules is proposed. A real MRI brain image is employed to test in the numerical experiments and the results demonstrate that proposed method and theoretical analysis is very efficient in CS-MRI image reconstruction.

Acknowledgements This work is supported by NSFC (No. 11671082), and Postgraduate Research & Practice Innovation Program of Jiangsu Province (No. KYCX17 0038).

References [1] A. Gills. and V. Luminita, A variational method in image recovery, SIAM J. Numer. Anal. 34(1997), pp. 1948-1979. [2] Y.G. Zhu, X.M. Liu, A fast method for l1-l2 modeling for MR image compressive sensing, J. Inverse Ill-posed Prob. 23(2015), pp. 211-218. [3] X.D. Wang, X. Feng, W. Wang, W. Zhang, Iterative reweighted total generalized variation based poisson noise removal model, Appl. Math. Comput. 223 (2013), pp. 264-277. [4] E.J. Candes, J. Romberg, T. Tao, Robust uncertainty principles: exact signal reconstruction from highly incomplete frequency information, IEEE Trans. Inf. Theory. 52(2006), pp. 489-509. [5] D.L. Donoho, Compressed sensing, IEEE Trans. Inf. Theory. 52(2006), pp. 1289-1306. [6] E.J. Candes, J. Romberg, Sparsity and incoherence in compressive sampling, Inverse Problems. 23(2007), pp. 969-985. [7] S. Mallat, A Wavelet Tour of Signal Processing (3rd), Academic Press, San Diego 2008.

1477

Xiaoman Liu 1471-1478

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

The Theoretical Analysis of l1 -TV Compressive Sensing Model

8

[8] J. Huang, S. Zhang and D. Metaxas, Efficient MR image reconstruction for compressed MR imaging, Medical Image Anal. 15(2011), pp. 670-679. [9] C.R. Vogel, Computational Methods for Inverse Problems, SIAM Frontiers In Applied Mathematics, Philadephia, 2002. [10] X. Liu, Y. Zhu, A fast method for TV-L1-MRI image reconstruction in compressive sensing, J. Comput. Inform. Syst. 2(2014), pp. 1-9. [11] R. Acar, C.R. Vogel, Analysis of total variation penalty methods for ill-posed problems, Inverse Probl. 10(1994), pp. 1217-1229. [12] E.T. Hale, W. Yin, Y. Zhang, A fixed-point continuation for l1-regularization with application to compressed sensing, Rice University CAAM Technical Report, TR07-07(2007)1-45. [13] T. Goldstein, O. Osher, The split Bregman method for L1 regularized problems, SIAM J. Imag. Sci., 2(2)(2009)323-343. [14] M. Figueiredo, R. Nowak, S. Wright, Gradient projection for sparse reconstruction: application to compressed sensing and other inverse problems, IEEE J-STSP, 1(2007), pp. 586-597. [15] Y. Zhu, I. Chern, Fast alternating minimization method for compressive sensing MRI under wavelet sparsity and TV sparsity, Proceedings of 2011 Sixth International Conference on Image and Graphics, (2011), pp. 356-361. [16] J. Yang, Y. Zhang, W. Yin, A fast alternating direction method for TV-L1-L2 signal reconstruction from partial Fourier data, IEEE J-STSP, 4(2010), pp. 288-297. [17] S. Ma, W. Yin, Y. Zhang, A. Chakraborty, An efficient algorithm for compressed MR imaging using total variation and wavelets, IEEE Conf. Comput. Vis. Pattern Recognition, CVPR, (2008), pp. 1-8. [18] A. Beck, M. Teboulle, A fast iterative shrinkage-thresholding algorithm for linear inverse problems, SIAM J. Imag. Sci. 2(2009), pp. 183-202. [19] M. Lustig, D. Donoho, D. Pauly, Sparse MRI: the application of compressed sensing for rapid MR imaging, Magn. Reson. Med. 58(2007), pp. 1182-1195. [20] W. Yin, S. Osher, D. Goldfarb, J. Darbon, Bregman iterative algorithms for l1-minimization with applications to compressed sensing, SIAM J. Imag. Sci. 1(2008), pp. 143-168. [21] C.R. Vogel, M.E. Oman, Iterative Methods for Total Variation Denoising, SIAM J. Sci. Comput. 17(1996), pp. 227-238. [22] J. Liu, The Regularization Methods and Application for Ill-posed Problems, Science Publishing, Beijing, 2005. (in Chinese) [23] B. Wang and J. Liu, Recovery of thermal conductivity in two-dimensional media with nonlinear source by optimizations, Appl. Math Letters, 60(2016), pp. 73-80.

1478

Xiaoman Liu 1471-1478

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On Fibonacci Z-sequences and their logarithm functions Hee Sik Kim1 , J. Neggers2 and Keum Sook So3,∗ 1

Department of Mathematics, Research Institute for Natural Sciences, Hanyang University, Seoul, 04763, Korea 2 Department of Mathematics, University of Alabama, Tuscaloosa, AL 35487-0350, U. S. A 3,∗ Department of Statistics and Financial Informatics, Hallym University, Chuncheon 24252, Korea

Abstract. In this paper we discuss the concept of a Z-sequence and use it to define the Fibonacci Z-sequence. Based on Z-sequences one may define analogs of logarithm functions. The special case of the logarithm function associated with the Fibonacci Z-sequence is of interest, since the recursive property of this sequence permits a more detailed study of these functions. They are similar to ordinary logarithm functions which may be based on Z-sequences {an }n∈Z , where a > 1.

1. Introduction and Preliminaries Fibonacci-numbers have been studied in many different forms for centuries and the literature on the subject is consequently incredibly vast. One of the amazing qualities of these numbers is the variety of mathematical models where they play some sort of role and where their properties are of importance in elucidating the ability of the model under discussion to explain whatever implications are inherent in it. The fact that the ratio of successive Fibonacci numbers approaches the Golden ratio (section) rather quickly as they go to infinity probably has a good deal to do with the observation made in the previous sentence. Surveys and connections of the type just mentioned are provided in [1] and [2] for a very minimal set of examples of such texts, while in [3] an application (observation) concerns itself with a theory of a particular class of means which has apparently not been studied in the fashion done there by two of the authors the present paper. Surprisingly novel perspectives are still available. Kim and Neggers [6] showed that there is a mapping D : M → DM on means such that if M is a Fibonacci mean so is DM , that if M is the harmonic mean, then DM is the arithmetic mean, and if M is a Fibonacci mean, then limn→∞ Dn M is the golden section mean. Surprisingly novel perspectives are still available and will presumably continue to be so for the future as long as mathematical investigations continue to be made. Han et al. [4] considered several properties of Fibonacci sequences in arbitrary groupoids. They discussed Fibonacci sequences in both several groupoids and groups. The present authors [7] introduced the notion of generalized Fibonacci sequences over a groupoid and discussed these in particular for the case where the groupoid contains idempotents and pre-idempotents. Using the notion of Smarandache-type P -algebras they obtained several relations on groupoids which are derived from generalized Fibonacci sequences. In [5] Han et al. discussed Fibonacci functions on the real numbers R, i.e., functions f : R → R such that for all x ∈ R, f (x+2) = f (x+1)+f (x), and developed the notion of Fibonacci functions using the concept of f -even and f -odd functions. Moreover, they showed that if f is a Fibonacci function then limx→∞

f (x+1) f (x)

=

√ 1+ 5 2 .

The present

authors [8] discussed Fibonacci functions using the (ultimately) periodicity and we also discuss the exponential 0∗

Correspondence: Tel.: +82 33 248 2011, Fax: +82 33 256 2011 (K. S. So). 1479

Hee Sik Kim ET AL 1479-1486

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Hee Sik Kim, J. Neggers and Keum Sook So∗ Fibonacci functions. Especially, given a non-negative real-valued function, we obtain several exponential Fibonacci functions. The present authors [9] introduced the notions of Fibonacci (co-)derivative of real-valued functions, and found general solutions of the equations 4(f (x)) = g(x) and (4 + I)(f (x)) = g(x). Moreover, they [10] defined and studied a function F : [0, ∞) → R and extensions F : R → C, Fe : C → C which are continuous and such that if n ∈ Z, the set of all integers, then F (n) = Fn , the nth Fibonacci number based on F0 = F1 = 1. If x is not an integer and x < 0, then F (x) may be a complex number, e.g., F (−1.5) = 21 + i. If z = a + bi, then Fe(z) = F (a) + iF (b − 1) defines complex Fibonacci numbers. In connection with this function (and in general) they defined a Fibonacci derivative of f : R → R as (4f )(x) = f (x + 2) − f (x + 1) − f (x) so that if e is given as (4f )(x) ≡ 0 for all x ∈ R, then f is a (real) Fibonacci function. A complex Fibonacci derivative 4 e (a + bi) = 4f (a) + i 4 f (b − 1) and its properties are discussed in same detail. 4f 2. Fibonacci logarithm Let F = {F0 = 1, F1 = 1, F2 = 2, F3 = 3, F4 = 5, · · · , } be the Fibonacci sequence where Fk denotes the k th Fibonacci number. Let F ∗ = {F0∗ = 1, F1∗ = 2, F2∗ = 3, F3∗ = 5, · · · } denote the short Fibonacci sequence and let ∗ ∗ = 13 , · · · } denote the extended short Fibonacci sequence or the E(F ∗ ) = {F0∗ = 1, F1∗ = 2, F−1 = 21 , F2∗ = 3, F−2

Fibonacci Z-sequence. In general, by a Z-sequence S = {a0 , a1 , a−1 , a2 , a−2 , · · · } we mean a sequence of positive real numbers satisfying ai < ai+1 for all i ∈ Z where limk→∞ ak = ∞ and limk→−∞ ak = 0. In general, for a Z-sequence S, we say that a positive real number x has S-characteristic k if k is the unique ∗ integer such that ak ≤ x < ak+1 . Thus, if S = E(F ∗ ), then Fk∗ ≤ x < Fk+1 means that x has E(F ∗ )-characteristic

k. Given the context, we shall refer to this number as the Fibonacci characteristic of x. For example, if x = 1.2, then F0∗ = 1 < 1.2 < 2 = F1∗ , and hence its Fibonacci characteristic is 0. Again, if x =

1 10 ,

then F4∗ = F5 = 8
0, then the Fibonacci characteristic of x is −(n + 1). Computing or estimating the

Fibonacci characteristics of numbers x ≥ 1 will be a topic of interest to be discussed below. ∗ Suppose now that Fk∗ ≤ x < Fk+1 . Then the Fibonacci mantissa of x is defined as the number α such that ∗ (Fk+1 )α =x ∗ α−1 (Fk ) ∗ ∗ ∗ We note that if x = Fk∗ , then (Fk+1 /Fk∗ )α = 1, and hence α = 0. Also, if x = Fk+1 , then (Fk+1 /Fk∗ )α−1 = 1, and ∗ hence α = 1. Hence, 0 ≤ α < 1 for numbers x such that Fk∗ ≤ x < Fk+1 .

Finally, we define the Fibonacci logarithm logF (x) = k + α, where k is the Fibonacci characteristic of x and where α is the Fibonacci mantissa of x. F is called the pseudo base of the logarithm. We simply denote logF (x) by logF (x). It is our purpose in this paper to discuss the Fibonacci logarithm function of the positive real variable x and to make several observations as a consequence. 1480

Hee Sik Kim ET AL 1479-1486

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On Fibonacci Z-sequences and their logarithm functions 3. Fibonacci logarithm logF (x) ∗ We begin by noting that logF (x) is continuous everywhere. If Fk∗ ≤ x < Fk+1 , then logF (x) = k + α = ∗ logF (Fk∗ ) + α. We will show that logF (x) is differentiable at x. As we have seen above, if α for Fk+1 is computed ∗ ∗ relative to Fk∗ , then it equals 1 and hence logF (Fk∗ ) + 1 = k + 1 = logF (Fk+1 ) as well. Hence limx− →Fk+1 logF (x) = ∗ logF (x) = k + 1, establishing continuity at that point. limx+ →Fk+1

Theorem 3.1. If logF (x) is the Fibonacci logarithm function, then its derivative is (logF (x))0 =

1 1 ∗ /F ∗ ) x ln(Fk+1 k

(3.1)

∗ when Fk∗ < x < Fk+1 (where ln means the natural logarithm function.) ∗ Proof. We compute logF (x) and logF (x + h), where x and x + h are both in the open interval (Fk∗ , Fk+1 ).

Accordingly both have the same Fibonacci characteristic k. Assume α and β are Fibonacci mantissas of x and x + h respectively. Then logF (x + h) − logF (x) = β − α, the difference of the Fibonacci mantissas. Consider the following. (F ∗ )β /(Fk∗ )β−1 x+h = k+1 ∗ )α /(F ∗ )α−1 x (Fk+1 k =

(3.2)

∗ (Fk+1 /Fk∗ )β−α

It follows that ln(1 +

h ∗ ) = (β − α)ln(Fk+1 /Fk∗ ) x

(3.3)

Hence, we obtain logF (x + h) − logF (x) = β − α =

ln(1 + hx ) ∗ /F ∗ ) ln(Fk+1 k

(3.4)

It follows that 1 ln(1 + hx ) logF (x + h) − logF (x) = lim h ∗ h→0 ln(FK+1 /Fk∗ ) h→0 h 1 1 = ∗ /F ∗ ) , x ln(Fk+1 k

lim

(3.5)

proving the theorem.



∗ If b := Fk+1 /Fk∗ , then the usual logarithm function logb (x) with the base b has the derivative (logb (x))0 =

1 1 x ln(b) ,

∗ and hence in Theorem 3.1, (logF (x))0 = (logb (x))0 on the open interval (Fk∗ , Fk+1 ), i.e., the functions logF (x)

and logb (x) differ by a constant. Let Ck := logF (Fk∗ ) − logb (Fk∗ ). We need to find an upper bound for Ck . Given any particular value of k, one can of course immediately determine Ck precisely. For example, if k = 5, 21 (13) = 5 − log 21 (13) = −0.34840144. then F5∗ = 13, F6∗ = 21 and b = 21/13, so that C5 = logF (13) − log 13 13

However, in order to obtain an improved sense of the behavior of Ck as a function of k, it may be better to determine a fairly simple bound for Ck which is a function of k itself. If we let logF (x) := logb (x) + Ck and ∗ ∗ tk := logb (Fk∗ ), then btk = Fk∗ and tk = ln(Fk∗ )/ln(b) = ln(Fk∗ )/ln(Fk+1 /Fk∗ ). Since 1 < Fk+1 /Fk∗ ≤ 2, it follows

that ln(

∗ Fk+1 Fk∗ )

≤ ln2 ≤ ln(e) = 1, so that tk > ln(Fk∗ ), and hence Ck = k − tk < k − ln(Fk∗ ) 1481

(3.6) Hee Sik Kim ET AL 1479-1486

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Hee Sik Kim, J. Neggers and Keum Sook So∗ ∗ ∗ ∗ ∗ ∗ ∗ If −k < 0, then F−k = 1/Fk ∗ and F−k+1 = 1/Fk−1 , so that if we let b∗ := F−k+1 /F−k = Fk∗ /Fk−1 , so that we

may determine (logF (x))0 =

∗ ∗ ∗ for F−k ≤ x < F−k+1 or 1/Fk∗ ≤ x < 1/F−k+1 . If we let logF (x) := logb (x) +

C−k for some C−k where

∗ ∗ < F−k+1 and if we let t−k := logb∗ (F−k ), then t−k =

1 1 x ln(b∗ ) ∗ F−k ≤ x

∗ ln(F−k ) ln(b∗ )

< −ln(Fk∗ ).

Hence we obtain: ∗ ∗ C−k = logF (F−k ) − logb∗ (F−k )

= −k − t−k < −k +

(3.7)

ln(Fk∗ )

From this we have k − ln(Fk∗ ) < −C−k . We summarize: Proposition 3.2. If Ck := logF (Fk∗ ) − logb (Fk∗ ) then it has a bound Ck < k − ln(Fk∗ ) < −C−k . Note that log F (x) is not differentiable at the Fk∗ ’s. There is both a left-derivative and right-derivative at that point. Indeed, for the left derivative we get lim

x− →Fk∗

1 1 1 1 = ∗ , x ln(b∗ ) Fk ln(b∗ )

(3.8)

1 1 1 1 = ∗ , x ln(b) Fk ln(b)

(3.9)

while for the right derivative it is: lim

x+ →Fk∗

Hence, we define the saltus (jump) at Fk∗ to be ∆(Fk∗ ) =

1 1 1 [ − ] Fk∗ ln(b) ln(b∗ ) ∗

=

ln( bb ) 1 [ ] Fk∗ ln(b)ln(b∗ )

∗ ∗ ∗ ∗ ∗ ∗ where b∗ /b = (Fk∗ /Fk−1 )/(Fk+1 /Fk∗ ) = (Fk∗ )2 /Fk−1 Fk+1 . We recall that (Fk∗ )2 = Fk−1 Fk+1 + (−1)k+1 , and thus

we have b∗ = b

( 1

(3.10)

otherwise

It follows that b∗ ln( ) = b

( 0

if k is even,

(3.11)

otherwise ∗

Since Fk∗ ln(b)ln(b∗ ) > 0, ∆(Fk∗ )’s sign is determined by the sign of ln( bb ). Hence we obtain: Proposition 3.3. If ∆(Fk∗ ) is the saltus at Fk∗ , then ( < 0 if k is even, ∆(Fk∗ ) = > 0 otherwise

When k = 0,

b∗ b

(3.12)

∗ = (F0∗ )2 /F−1 F1∗ = 1 and so ln(b∗ /b) = 0. Thus ∆(F0∗ ) = 0, i.e., logF (x) is differentiable at

F0∗ = 1. 1482

Hee Sik Kim ET AL 1479-1486

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

On Fibonacci Z-sequences and their logarithm functions ∗ For negative integers, replacing F−k by

1 Fk∗ ,

∗ the saltus formula ∆(F−k ) is transformed to

∗ ∆(F−k )=

1 ln(b∗ /b) ∗ ln(b)ln(b∗ ) F−k

= Fk∗

For example, for k = 3, we obtain

F4∗ F2∗ (F3∗ )2

=

8·3 25

=

(3.13)

∗ ∗ ln[Fk−1 Fk+1 /(Fk∗ )2 ]

ln(

24 25

∗ Fk+1 Fk∗

)ln(

Fk∗ ∗ Fk−1

< 1. Of course,

) (F−3 )2 F−4 F−2

1 1 = (1/5)2 /( 18 )( 13 ) = ( 25 )/( 24 ) when

computed directly. ∗ ∗ ∗ ∗ The Fibonacci number Fk∗ is said to be elliptical if (Fk∗ )2 /Fk+1 Fk−1 > 1; parabolic if (Fk∗ )2 /Fk+1 Fk−1 = 1; ∗ ∗ hyperbolic if (Fk∗ )2 /Fk+1 Fk−1 < 1.

For k ≥ 1, Fk∗ is elliptical if k is odd; hyperbolic if k is even. The only parabolic Fibonacci number is F0∗ = 1. ∗ ∗ If −k < 0, then F−k is elliptical if k is even and F−k is hyperbolic if k is odd.

Proposition 3.4. logF (x) + logF ( x1 ) = Ck + C−k . ∗ Proof. If x 6= Fk∗ for all k ∈ Z, then Fk∗ ≤ x < Fk+1 yields logF (x) = k + α = logb (x) + Ck . Now, ∗ F−(k+1)
0, we have Z mϕ(a)+η(ϕ(b),ϕ(a),m) (x − mϕ(a))p (mϕ(a) + η(ϕ(b), ϕ(a), m) − x)q f (x)dx mϕ(a)

= η(ϕ(b), ϕ(a), m)p+q+1 Z ×

1

g p (t)(1 − g(t))q f (mϕ(a) + g(t)η(ϕ(b), ϕ(a), m))d[g(t)].

0

Proof. It is easy to observe that Z mϕ(a)+η(ϕ(b),ϕ(a),m) (x − mϕ(a))p (mϕ(a) + η(ϕ(b), ϕ(a), m) − x)q f (x)dx mϕ(a)

Z = η(ϕ(b), ϕ(a), m)

1

(mϕ(a) + g(t)η(ϕ(b), ϕ(a), m) − mϕ(a))p

0

×(mϕ(a) + η(ϕ(b), ϕ(a), m) − mϕ(a) − g(t)η(ϕ(b), ϕ(a), m))q ×f (mϕ(a) + g(t)η(ϕ(b), ϕ(a), m))d[g(t)] = η(ϕ(b), ϕ(a), m)p+q+1 Z 1 × g p (t)(1 − g(t))q f (mϕ(a) + g(t)η(ϕ(b), ϕ(a), m))d[g(t)]. 0

 The following definition will be used in the sequel. Definition 2.7. The Euler beta function is defined for x, y > 0 as Z 1 Γ(x)Γ(y) . β(x, y) = tx−1 (1 − t)y−1 dt = Γ(x + y) 0 Theorem 2.8. Let ϕ : I −→ K be a continuous function and g : [0, 1] −→ (0, 1) is a differentiable function. Assume that f : K = [mϕ(a), mϕ(a)+η(ϕ(b), ϕ(a), m)] −→ (0, +∞) is a continuous function on K ◦ with respect to η : K × K × (0, 1] −→ R, k for mϕ(a) < mϕ(a) + η(ϕ(b), ϕ(a), m). Let k > 1 and 0 < r ≤ 1. If f k−1 is M T(r;g,m,ϕ) -preinvex function on an open m-invex set K for any fixed m ∈ (0, 1], then for any fixed p, q > 0, we have Z mϕ(a)+η(ϕ(b),ϕ(a),m) (x − mϕ(a))p (mϕ(a) + η(ϕ(b), ϕ(a), m) − x)q f (x)dx mϕ(a)

1490

KHAN ET AL 1487-1503

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

HERMITE-HADAMARD TYPE FRACTIONAL INTEGRAL INEQUALITIES. . .



 m  k−1 rk 2

5

1

|η(ϕ(b), ϕ(a), m)|p+q+1 B k (g(t); k, p, q)

h i k−1 rk rk rk × Ar2 (g(t); r)f k−1 (ϕ(a)) + Ar1 (g(t); r)f k−1 (ϕ(b)) , where 1

Z

g kp (t)(1 − g(t))kq d[g(t)];

B(g(t); k, p, q) = 0

Z

1−g(0)

r

A1 (g(t); r) = 1−g(1)

r

g(1)

Z A2 (g(t); r) =

g(0)

1−t t

1−t t

! r1 dt;

! r1 dt.

k

Proof. Let k > 1 and 0 < r ≤ 1. Since f k−1 is M T(r;g,m,ϕ) -preinvex function on K, combining with Lemma 2.6, H¨older inequality and Minkowski inequality for all t ∈ [0, 1] and for any fixed m ∈ (0, 1], we get Z mϕ(a)+η(ϕ(b),ϕ(a),m) (x − mϕ(a))p (mϕ(a) + η(ϕ(b), ϕ(a), m) − x)q f (x)dx mϕ(a)

≤ |η(ϕ(b), ϕ(a), m)|p+q+1

"Z

# k1

1

g kp (t)(1 − g(t))kq d[g(t)]

0

"Z ×

# k−1 k

1

f

k k−1

(mϕ(a) + g(t)η(ϕ(b), ϕ(a), m))d[g(t)]

0 1

≤ |η(ϕ(b), ϕ(a), m)|p+q+1 B k (g(t); k, p, q) "Z × 0

1

! r1 # k−1 p p k k k m g(t) r m 1 − g(t) r p p f (ϕ(b)) k−1 + f (ϕ(a)) k−1 d[g(t)] 2 1 − g(t) 2 g(t) ≤

 m  k−1 rk 2 ( Z

1

|η(ϕ(b), ϕ(a), m)|p+q+1 B k (g(t); k, p, q) r ! r1 p k g(t) p f k−1 (ϕ(b))d[g(t)] 1 − g(t)

1

×  0

 Z  +

1

p

0

=

 m  k−1 rk

1 − g(t) p g(t)

r ) k−1

! r1

rk

f

k k−1

(ϕ(a))d[g(t)] 1

|η(ϕ(b), ϕ(a), m)|p+q+1 B k (g(t); k, p, q)

2 h i k−1 rk rk rk . × Ar2 (g(t); r)f k−1 (ϕ(a)) + Ar1 (g(t); r)f k−1 (ϕ(b)) 

1491

KHAN ET AL 1487-1503

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

MUHAMMAD ADIL KHAN, YU-MING CHU∗ , ARTION KASHURI, ROZANA LIKO

Corollary 2.9. Under the same conditions as in Theorem 2.8 for r = 1 and g(t) = t, we get Z mϕ(a)+η(ϕ(b),ϕ(a),m) (x − mϕ(a))p (mϕ(a) + η(ϕ(b), ϕ(a), m) − x)q f (x)dx mϕ(a)



 mπ  k−1 k 4

1

|η(ϕ(b), ϕ(a), m)|p+q+1 β k (kp + 1, kq + 1) i k−1 h k k k × f k−1 (ϕ(a)) + f k−1 (ϕ(b)) .

Theorem 2.10. Let ϕ : I −→ K be a continuous function and g : [0, 1] −→ (0, 1) is a differentiable function. Assume that f : K = [mϕ(a), mϕ(a)+η(ϕ(b), ϕ(a), m)] −→ (0, +∞) is a continuous function on K ◦ with respect to η : K × K × (0, 1] −→ R, for mϕ(a) < mϕ(a) + η(ϕ(b), ϕ(a), m). Let l ≥ 1 and 0 < r ≤ 1. If f l is M T(r;g,m,ϕ) preinvex function on an open m-invex set K for any fixed m ∈ (0, 1], then for any fixed p, q > 0, we have Z mϕ(a)+η(ϕ(b),ϕ(a),m) (x − mϕ(a))p (mϕ(a) + η(ϕ(b), ϕ(a), m) − x)q f (x)dx mϕ(a)



 m  rl1

l−1

|η(ϕ(b), ϕ(a), m)|p+q+1 B l (g(t); 1, p, q) 2"   1 × B r g(t); , 2pr − 1, 2qr + 1 f rl (ϕ(a)) 2r # rl1   1 r rl +B g(t); , 2pr + 1, 2qr − 1 f (ϕ(b)) . 2r

Proof. Let l ≥ 1 and 0 < r ≤ 1. Since f l is M T(r;g,m,ϕ) -preinvex function on K, combining with Lemma 2.6, the well-known power mean inequality and Minkowski inequality for all t ∈ [0, 1] and for any fixed m ∈ (0, 1], we get Z mϕ(a)+η(ϕ(b),ϕ(a),m) (x − mϕ(a))p (mϕ(a) + η(ϕ(b), ϕ(a), m) − x)q f (x)dx mϕ(a)

= η(ϕ(b), ϕ(a), m)p+q+1

Z

1

h

g p (t)(1 − g(t))q

i l−1 h i 1l l g p (t)(1 − g(t))q

0

×f (mϕ(a) + g(t)η(ϕ(b), ϕ(a), m))d[g(t)] "Z # l−1 l 1 p+q+1 p q ≤ |η(ϕ(b), ϕ(a), m)| g (t)(1 − g(t)) d[g(t)] 0

"Z ×

# 1l

1 p

q l

g (t)(1 − g(t)) f (mϕ(a) + g(t)η(ϕ(b), ϕ(a), m))d[g(t)] 0 l−1

≤ |η(ϕ(b), ϕ(a), m)|p+q+1 B l (g(t); 1, p, q) ! r1 "Z # 1l p p 1 m g(t) m 1 − g(t) p p × g p (t)(1−g(t))q f r (ϕ(b))l + f r (ϕ(a))l d[g(t)] 2 1 − g(t) 2 g(t) 0  m  rl1 l−1 ≤ |η(ϕ(b), ϕ(a), m)|p+q+1 B l (g(t); 1, p, q) 2

1492

KHAN ET AL 1487-1503

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

HERMITE-HADAMARD TYPE FRACTIONAL INTEGRAL INEQUALITIES. . .

( Z

1

×

g

1 p+ 2r

1 q− 2r

(t)(1 − g(t))

7

r f (ϕ(b))d[g(t)] l

0 1

Z

g

+

1 p− 2r

1 q+ 2r

(t)(1 − g(t))

r ) rl1 f (ϕ(a))d[g(t)] l

0

=

 m  rl1

l−1

|η(ϕ(b), ϕ(a), m)|p+q+1 B l (g(t); 1, p, q) 2"   1 r × B g(t); , 2pr − 1, 2qr + 1 f rl (ϕ(a)) 2r # rl1   1 r rl +B g(t); , 2pr + 1, 2qr − 1 f (ϕ(b)) . 2r 

Corollary 2.11. Under the same conditions as in Theorem 2.10 for r = 1 and g(t) = t, we get Z mϕ(a)+η(ϕ(b),ϕ(a),m) (x − mϕ(a))p (mϕ(a) + η(ϕ(b), ϕ(a), m) − x)q f (x)dx mϕ(a)



 m  1l 2

|η(ϕ(b), ϕ(a), m)|p+q+1 β

l−1 l

(p + 1, q + 1)

"  # 1l    1 3 3 1 × β p + ,q + f l (ϕ(a)) + β p + , q + f l (ϕ(b)) . 2 2 2 2 3. Hermite-Hadamard type fractional integral inequalities for M T(r;g,m,ϕ) -preinvex functions In this section, in order to prove our main results regarding some generalizations of Hermite-Hadamard type inequalities for M T(r;g,m,ϕ) -preinvex functions via fractional integrals, we need the following new fractional integral identity: Lemma 3.1. Let ϕ : I −→ K be a continuous function and g : [0, 1] −→ [0, 1] is a differentiable function. Suppose K ⊆ R be an open m-invex subset with respect to η : K × K × (0, 1] −→ R for any fixed m ∈ (0, 1] and let mϕ(a) < mϕ(a) + η(ϕ(b), ϕ(a), m). Assume that f : K −→ R be a twice differentiable function on K ◦ and f 00 is integrable on [mϕ(a), mϕ(a) + η(ϕ(b), ϕ(a), m)]. Then for α > 0, we have η α+1 (ϕ(x), ϕ(a), m) (α + 1)η(ϕ(b), ϕ(a), m) h × (1 − g α+1 (1))f 0 (mϕ(a) + g(1)η(ϕ(x), ϕ(a), m)) i −(1 − g α+1 (0))f 0 (mϕ(a) + g(0)η(ϕ(x), ϕ(a), m)) +

η α+1 (ϕ(x), ϕ(b), m) (α + 1)η(ϕ(b), ϕ(a), m)

h × (1 − g α+1 (1))f 0 (mϕ(b) + g(1)η(ϕ(x), ϕ(b), m)) i −(1 − g α+1 (0))f 0 (mϕ(b) + g(0)η(ϕ(x), ϕ(b), m))

1493

KHAN ET AL 1487-1503

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

MUHAMMAD ADIL KHAN, YU-MING CHU∗ , ARTION KASHURI, ROZANA LIKO

+

η α (ϕ(x), ϕ(a), m) η(ϕ(b), ϕ(a), m)

h × g α (1)f (mϕ(a) + g(1)η(ϕ(x), ϕ(a), m)) i −g α (0)f (mϕ(a) + g(0)η(ϕ(x), ϕ(a), m)) +

η α (ϕ(x), ϕ(b), m) η(ϕ(b), ϕ(a), m)

h × g α (1)f (mϕ(b) + g(1)η(ϕ(x), ϕ(b), m)) i −g α (0)f (mϕ(b) + g(0)η(ϕ(x), ϕ(b), m)) − "Z

α η(ϕ(b), ϕ(a), m)

mϕ(a)+g(1)η(ϕ(x),ϕ(a),m)

(t − mϕ(a))α−1 f (t)dt

× mϕ(a)+g(0)η(ϕ(x),ϕ(a),m)

Z

#

mϕ(b)+g(1)η(ϕ(x),ϕ(b),m)

(t − mϕ(b))α−1 f (t)dt

+ mϕ(b)+g(0)η(ϕ(x),ϕ(b),m)

=

η α+2 (ϕ(x), ϕ(a), m) (α + 1)η(ϕ(b), ϕ(a), m)

1

Z

(1 − g α+1 (t))f 00 (mϕ(a) + g(t)η(ϕ(x), ϕ(a), m))d[g(t)]

× 0

+

η α+2 (ϕ(x), ϕ(b), m) (α + 1)η(ϕ(b), ϕ(a), m)

1

Z

(1 − g α+1 (t))f 00 (mϕ(b) + g(t)η(ϕ(x), ϕ(b), m))d[g(t)].

×

(3.1)

0

Proof. A simple proof of the equality can be done by performing two integration by parts in the integrals from the right side and changing the variable. The details are left to the interested reader.  Let denote If,g,η,ϕ (x; α, m, a, b) =

η α+2 (ϕ(x), ϕ(a), m) (α + 1)η(ϕ(b), ϕ(a), m)

1

Z

(1 − g α+1 (t))f 00 (mϕ(a) + g(t)η(ϕ(x), ϕ(a), m))d[g(t)]

× 0

+ Z ×

η α+2 (ϕ(x), ϕ(b), m) (α + 1)η(ϕ(b), ϕ(a), m)

1

(1 − g α+1 (t))f 00 (mϕ(b) + g(t)η(ϕ(x), ϕ(b), m))d[g(t)].

(3.2)

0

Using relation (3.2), the following results can be obtained for the corresponding version for power of the absolute value of the second derivative.

1494

KHAN ET AL 1487-1503

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

HERMITE-HADAMARD TYPE FRACTIONAL INTEGRAL INEQUALITIES. . .

9

Theorem 3.2. Let ϕ : I −→ A be a continuous function and g : [0, 1] −→ (0, 1) is a differentiable function. Suppose A ⊆ R be an open m-invex subset with respect to η : A × A × (0, 1] −→ R for any fixed m ∈ (0, 1] and let mϕ(a) < mϕ(a) + η(ϕ(b), ϕ(a), m). Assume that f : A −→ (0, +∞) be a twice differentiable function on A◦ . If f 00q is nonnegative M T(r;g,m,ϕ) -preinvex function, q > 1, p−1 + q −1 = 1, then for α > 0 and 0 < r ≤ 1, we have 1 1  m  rq C p (g(t); p, α) |If,g,η,ϕ (x; α, m, a, b)| ≤ 2 (α + 1)|η(ϕ(b), ϕ(a), m)| ( 1 i rq h × |η(ϕ(x), ϕ(a), m)|α+2 Ar2 (g(t); r)f 00 (ϕ(a))rq + Ar1 (g(t); r)f 00 (ϕ(x))rq α+2

+ |η(ϕ(x), ϕ(b), m)|

Z where C(g(t); p, α) =

h

Ar2 (g(t); r)f 00 (ϕ(b))rq

+

Ar1 (g(t); r)f 00 (ϕ(x))rq

1 i rq

) , (3.3)

1

(1 − g α+1 (t))p d[g(t)].

0

Proof. Suppose that q > 1 and 0 < r ≤ 1. Using relation (3.2), nonnegative M T(r;g,m,ϕ) -preinvexity of f 00q , H¨older inequality, Minkowski inequality and taking the modulus, we have |If,g,η,ϕ (x; α, m, a, b)| ≤

|η(ϕ(x), ϕ(a), m)|α+2 (α + 1)|η(ϕ(b), ϕ(a), m)|

1

Z

|1 − g α+1 (t)| f 00 (mϕ(a) + g(t)η(ϕ(x), ϕ(a), m)) d[g(t)]

× 0

|η(ϕ(x), ϕ(b), m)|α+2 (α + 1)|η(ϕ(b), ϕ(a), m)| Z 1 × |1 − g α+1 (t)| f 00 (mϕ(b) + g(t)η(ϕ(x), ϕ(b), m)) d[g(t)] +

0

Z 1  p1 |η(ϕ(x), ϕ(a), m)|α+2 α+1 p (1 − g (t)) d[g(t)] ≤ (α + 1)|η(ϕ(b), ϕ(a), m)| 0 Z 1  q1 00 q × f (mϕ(a) + g(t)η(ϕ(x), ϕ(a), m)) d[g(t)] 0

Z 1  p1 |η(ϕ(x), ϕ(b), m)|α+2 α+1 p (1 − g (t)) d[g(t)] + (α + 1)|η(ϕ(b), ϕ(a), m)| 0 Z 1  q1 00 q × f (mϕ(b) + g(t)η(ϕ(x), ϕ(b), m)) d[g(t)] 0

Z 1  p1 |η(ϕ(x), ϕ(a), m)|α+2 α+1 p ≤ (1 − g (t)) d[g(t)] (α + 1)|η(ϕ(b), ϕ(a), m)| 0 "Z ! r1 # q1 p p 1 m g(t) 00 m 1 − g(t) p p × f (ϕ(x))rq + f 00 (ϕ(a))rq d[g(t)] 2 1 − g(t) 2 g(t) 0 Z 1  p1 |η(ϕ(x), ϕ(b), m)|α+2 α+1 p + (1 − g (t)) d[g(t)] (α + 1)|η(ϕ(b), ϕ(a), m)| 0

1495

KHAN ET AL 1487-1503

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

MUHAMMAD ADIL KHAN, YU-MING CHU∗ , ARTION KASHURI, ROZANA LIKO

"Z × 0

1

! r1 # q1 p p m g(t) 00 1 − g(t) m p p f (ϕ(x))rq + f 00 (ϕ(b))rq d[g(t)] 2 1 − g(t) 2 g(t) 1  m  rq 1 |η(ϕ(x), ϕ(a), m)|α+2 ≤ C p (g(t); p, α) 2 (α + 1)|η(ϕ(b), ϕ(a), m)| r ! r1 ( Z p 1 g(t) p ×  f 00 (ϕ(x))q d[g(t)] 1 − g(t) 0  r ) 1 ! r1 Z 1 p rq 1 − g(t) p f 00 (ϕ(a))q d[g(t)] + g(t) 0 1 |η(ϕ(x), ϕ(b), m)|α+2 C p (g(t); p, α) 2 (α + 1)|η(ϕ(b), ϕ(a), m)| r ( Z ! r1 p 1 g(t) p ×  f 00 (ϕ(x))q d[g(t)] 1 − g(t) 0 r ) 1  ! r1 Z 1 p rq 1 − g(t) p f 00 (ϕ(b))q d[g(t)] + g(t) 0

+

1  m  rq

=

1  m  rq

2 h

(

1

C p (g(t); p, α) (α + 1)|η(ϕ(b), ϕ(a), m)|

× |η(ϕ(x), ϕ(a), m)|α+2 Ar2 (g(t); r)f 00 (ϕ(a))rq + Ar1 (g(t); r)f 00 (ϕ(x))rq α+2

+|η(ϕ(x), ϕ(b), m)|

h

Ar2 (g(t); r)f 00 (ϕ(b))rq

+

Ar1 (g(t); r)f 00 (ϕ(x))rq

1 i rq

1 i rq

) . 

Corollary 3.3. Under the same conditions as in Theorem 3.2 for r = 1, g(t) = t and f 00 ≤ K, we get −η(ϕ(x), ϕ(a), m)α+1 f 0 (mϕ(a)) − η(ϕ(x), ϕ(b), m)α+1 f 0 (mϕ(b)) (α + 1)η(ϕ(b), ϕ(a), m) +

η(ϕ(x), ϕ(a), m)α f (mϕ(a) + η(ϕ(x), ϕ(a), m)) + η(ϕ(x), ϕ(b), m)α f (mϕ(b) + η(ϕ(x), ϕ(b), m)) η(ϕ(b), ϕ(a), m) −

Γ(α + 1) η(ϕ(b), ϕ(a), m)

h i α α × J(mϕ(a)+η(ϕ(x),ϕ(a),m))− f (mϕ(a)) + J(mϕ(b)+η(ϕ(x),ϕ(b),m))− f (mϕ(b)) ≤

 mπ  q1

K 1

(1 + α)1+ p

2

   p1 1 Γ(p + 1)Γ α+1    1 Γ p + 1 + α+1 

1496

KHAN ET AL 1487-1503

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

HERMITE-HADAMARD TYPE FRACTIONAL INTEGRAL INEQUALITIES. . .

11

"

# |η(ϕ(x), ϕ(a), m)|α+2 + |η(ϕ(x), ϕ(b), m)|α+2 × . |η(ϕ(b), ϕ(a), m)| Theorem 3.4. Let ϕ : I −→ A be a continuous function and g : [0, 1] −→ (0, 1) is a differentiable function. Suppose A ⊆ R be an open m-invex subset with respect to η : A × A × (0, 1] −→ R for any fixed m ∈ (0, 1] and let mϕ(a) < mϕ(a) + η(ϕ(b), ϕ(a), m). Assume that f : A −→ (0, +∞) be a twice differentiable function on A◦ . If f 00q is nonnegative M T(r;g,m,ϕ) -preinvex function, q ≥ 1, then for α > 0 and 0 < r ≤ 1, we have |If,g,η,ϕ (x; α, m, a, b)|  1− q1 1  m  rq g α+2 (1) − g α+2 (0) |η(ϕ(x), ϕ(a), m)|α+2 g(1) − g(0) − ≤ 2 (α + 1)|η(ϕ(b), ϕ(a), m)| α+2 h × (Ar2 (g(t); r) − Ar4 (g(t); r, α)) f 00 (ϕ(a))rq + (Ar1 (g(t); r) − Ar3 (g(t); r, α)) f 00 (ϕ(x))rq +

1  m  rq

2

1 i rq

 1− q1 |η(ϕ(x), ϕ(b), m)|α+2 g α+2 (1) − g α+2 (0) g(1) − g(0) − (α + 1)|η(ϕ(b), ϕ(a), m)| α+2 h r r 00 rq × (A2 (g(t); r) − A4 (g(t); r, α)) f (ϕ(b)) + (Ar1 (g(t); r) − Ar3 (g(t); r, α)) f 00 (ϕ(x))rq

1 i rq

,

(3.4)

where Z

1−g(0)

1

1

t− 2r (1 − t) 2r +α+1 dt;

A3 (g(t); r, α) = 1−g(1)

Z

g(1)

1

1

t− 2r +α+1 (1 − t) 2r dt.

A4 (g(t); r, α) = g(0)

Proof. Suppose that q ≥ 1 and 0 < r ≤ 1. Using relation (3.2), nonnegative M T(r;g,m,ϕ) -preinvexity of f 00q , the well-known power mean inequality, Minkowski inequality and taking the modulus, we have |If,g,η,ϕ (x; α, m, a, b)| ≤

|η(ϕ(x), ϕ(a), m)|α+2 (α + 1)|η(ϕ(b), ϕ(a), m)|

1

Z

|1 − g α+1 (t)| f 00 (mϕ(a) + g(t)η(ϕ(x), ϕ(a), m)) d[g(t)]

× 0

|η(ϕ(x), ϕ(b), m)|α+2 (α + 1)|η(ϕ(b), ϕ(a), m)| Z 1 × |1 − g α+1 (t)| f 00 (mϕ(b) + g(t)η(ϕ(x), ϕ(b), m)) d[g(t)] +

0

Z 1 1− q1 |η(ϕ(x), ϕ(a), m)|α+2 α+1 (1 − g (t))d[g(t)] ≤ (α + 1)|η(ϕ(b), ϕ(a), m)| 0 Z 1  q1 α+1 00 q (1 − g (t))f (mϕ(a) + g(t)η(ϕ(x), ϕ(a), m)) d[g(t)] × 0

1497

KHAN ET AL 1487-1503

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12

MUHAMMAD ADIL KHAN, YU-MING CHU∗ , ARTION KASHURI, ROZANA LIKO

Z 1 1− q1 |η(ϕ(x), ϕ(b), m)|α+2 α+1 (1 − g + (t))d[g(t)] (α + 1)|η(ϕ(b), ϕ(a), m)| 0  q1 Z 1 α+1 00 q (1 − g (t))f (mϕ(b) + g(t)η(ϕ(x), ϕ(b), m)) d[g(t)] × 0

Z 1 1− q1 |η(ϕ(x), ϕ(a), m)|α+2 α+1 ≤ (1 − g (t))d[g(t)] (α + 1)|η(ϕ(b), ϕ(a), m)| 0 "Z # q1 ! r1 p p 1 m g(t) 00 m 1 − g(t) 00 α+1 rq rq p (1 − g (t)) p × d[g(t)] f (ϕ(x)) + f (ϕ(a)) 2 1 − g(t) 2 g(t) 0 1− q1 Z 1 |η(ϕ(x), ϕ(b), m)|α+2 α+1 + (1 − g (t))d[g(t)] (α + 1)|η(ϕ(b), ϕ(a), m)| 0 "Z ! r1 # q1 p p 1 m g(t) m 1 − g(t) p × (1 − g α+1 (t)) p |f 00 (ϕ(x))|q + f 00 (ϕ(b))rq d[g(t)] 2 1 − g(t) 2 g(t) 0  1− q1 1  m  rq g α+2 (1) − g α+2 (0) |η(ϕ(x), ϕ(a), m)|α+2 g(1) − g(0) − ≤ 2 (α + 1)|η(ϕ(b), ϕ(a), m)| α+2 r ( Z ! r1 p 1 g(t) p ×  (1 − g α+1 (t))f 00 (ϕ(x))q d[g(t)] 1 − g(t) 0 r ) 1  ! r1 Z 1 p rq 1 − g(t) α+1 00 q   p (1 − g (t))f (ϕ(a)) d[g(t)] + g(t) 0  1− q1 1  m  rq |η(ϕ(x), ϕ(b), m)|α+2 g α+2 (1) − g α+2 (0) + g(1) − g(0) − 2 (α + 1)|η(ϕ(b), ϕ(a), m)| α+2  r ( Z ! r1 p 1 g(t) p ×  (1 − g α+1 (t))f 00 (ϕ(x))q d[g(t)] 1 − g(t) 0  r ) 1 ! r1 Z 1 p rq 1 − g(t) p + (1 − g α+1 (t))f 00 (ϕ(b))q d[g(t)] g(t) 0  1− q1 1  m  rq |η(ϕ(x), ϕ(a), m)|α+2 g α+2 (1) − g α+2 (0) = g(1) − g(0) − 2 (α + 1)|η(ϕ(b), ϕ(a), m)| α+2 h × (Ar2 (g(t); r) − Ar4 (g(t); r, α)) f 00 (ϕ(a))rq 1 i rq + (Ar1 (g(t); r) − Ar3 (g(t); r, α)) f 00 (ϕ(x))rq  1− q1 1  m  rq g α+2 (1) − g α+2 (0) |η(ϕ(x), ϕ(b), m)|α+2 + g(1) − g(0) − 2 (α + 1)|η(ϕ(b), ϕ(a), m)| α+2 h × (Ar2 (g(t); r) − Ar4 (g(t); r, α)) f 00 (ϕ(b))rq 1 i rq + (Ar1 (g(t); r) − Ar3 (g(t); r, α)) f 00 (ϕ(x))rq . 

1498

KHAN ET AL 1487-1503

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

HERMITE-HADAMARD TYPE FRACTIONAL INTEGRAL INEQUALITIES. . .

13

Corollary 3.5. Under the same conditions as in Theorem 3.4 for r = 1, g(t) = t and f 00 ≤ K, we get −η(ϕ(x), ϕ(a), m)α+1 f 0 (mϕ(a)) − η(ϕ(x), ϕ(b), m)α+1 f 0 (mϕ(b)) (α + 1)η(ϕ(b), ϕ(a), m) +

η(ϕ(x), ϕ(a), m)α f (mϕ(a) + η(ϕ(x), ϕ(a), m)) + η(ϕ(x), ϕ(b), m)α f (mϕ(b) + η(ϕ(x), ϕ(b), m)) η(ϕ(b), ϕ(a), m) Γ(α + 1) − η(ϕ(b), ϕ(a), m) h i α α × J(mϕ(a)+η(ϕ(x),ϕ(a),m))− f (mϕ(a)) + J(mϕ(b)+η(ϕ(x),ϕ(b),m))− f (mϕ(b))  ! q1 √  1− q1   1 π(α + 1)Γ α + 32 K m q α+1 ≤ π− α+1 α+2 2 Γ(α + 3) # " |η(ϕ(x), ϕ(a), m)|α+2 + |η(ϕ(x), ϕ(b), m)|α+2 . × |η(ϕ(b), ϕ(a), m)|

Remark 3.6. For different choices of positive values 0 < r ≤ 1, for any fixed m ∈ (0, 1], for a particular choicesof a differentiable function g : [0, 1] −→ (0, 1), for   π(t+1) π(t+1) −(t+1) example: e , sin , cos , etc, and a particular choices of a 3 3 x continuous function ϕ(x) = e for all x ∈ R, xn for all x > 0 and for all n ∈ N, etc, by Theorem 3.2 and Theorem 3.4 we can get some special kinds of HermiteHadamard type fractional integral inequalities. 4. Applications to special means Definition 4.1. (see [23]) A function M : R2+ −→ R+ , is called a Mean function if it has the following internality property: min{x, y} ≤ M (x, y) ≤ max{x, y}. For a Mean function the following holds, M (x, x) = x, ∀x ∈ R+ . We consider some means for arbitrary positive real numbers α, β (α 6= β). (1) The arithmetic mean: α+β A := A(α, β) = 2 (2) The geometric mean: p G := G(α, β) = αβ (3) The harmonic mean: H := H(α, β) =

1 α

2 +

1 β

(4) The power mean:  Pr := Pr (α, β) =

αr + β r 2

1499

 r1 , r ≥ 1.

KHAN ET AL 1487-1503

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14

MUHAMMAD ADIL KHAN, YU-MING CHU∗ , ARTION KASHURI, ROZANA LIKO

(5) The identric mean: ( I := I(α, β) =

1 e



ββ αα



,

α,

α 6= β; α = β.

(6) The logarithmic mean: L := L(α, β) =

β−α . ln(β) − ln(α)

(7) The generalized log-mean: " # p1 β p+1 − αp+1 Lp := Lp (α, β) = ; p ∈ R \ {−1, 0}. (p + 1)(β − α) (8) The weighted p-power mean:  α1 , α2 , · · · Mp u1 , u2 , · · ·

, αn , un

 =

n X

! p1 αi upi

i=1

Pn where 0 ≤ αi ≤ 1, ui > 0 (i = 1, 2, . . . , n) with i=1 αi = 1. It is well known that Lp is monotonic nondecreasing over p ∈ R with L−1 := L and L0 := I. In particular, we have the following inequality H ≤ G ≤ L ≤ I ≤ A. Recently, the bivariate means have attracted the attention of many researchers, many remarkable inequalities can be found in the literature [36]-[46]. Now, let a and b be positive real numbers such that a < b. Consider the function M := M (ϕ(x), ϕ(y)) : [ϕ(x), ϕ(x) + η(ϕ(y), ϕ(x))] × [ϕ(x), ϕ(x) + η(ϕ(y), ϕ(x))] −→ R+ , which is one of the above mentioned means, ϕ : I −→ A be a continuous function and g : [0, 1] −→ (0, 1) is a differentiable function. Therefore one can obtain various inequalities using the results of Section 3 for these means as follows: Replace η(ϕ(x), ϕ(y), m) with η(ϕ(x), ϕ(y)) and setting η(ϕ(x), ϕ(y)) = M (ϕ(x), ϕ(y)), ∀x, y ∈ I, for value m = 1 in (3.3) and (3.4), one can obtain the following interesting inequalities involving means: 1   rq 1 1 C p (g(t); p, α) |If,g,M (·,·),ϕ (x; α, 1, a, b)| ≤ 2 (α + 1)M (ϕ(a), ϕ(b)) ( 1 h i rq × M α+2 (ϕ(a), ϕ(x)) Ar2 (g(t); r)f 00 (ϕ(a))rq + Ar1 (g(t); r)f 00 (ϕ(x))rq +M

α+2

) h i1 r 00 rq r 00 rq rq (ϕ(b), ϕ(x)) A2 (g(t); r)f (ϕ(b)) + A1 (g(t); r)f (ϕ(x)) ,

(4.1)

|If,g,M (·,·),ϕ (x; α, 1, a, b)| 1   rq  1− q1 1 g α+2 (1) − g α+2 (0) M α+2 (ϕ(a), ϕ(x)) ≤ g(1) − g(0) − 2 (α + 1)M (ϕ(a), ϕ(b)) α+2 h r r 00 × (A2 (g(t); r) − A4 (g(t); r, α)) f (ϕ(a))rq 1 i rq + (Ar1 (g(t); r) − Ar3 (g(t); r, α)) f 00 (ϕ(x))rq 1   rq  1− q1 1 M α+2 (ϕ(b), ϕ(x)) g α+2 (1) − g α+2 (0) + g(1) − g(0) − 2 (α + 1)M (ϕ(a), ϕ(b)) α+2

1500

KHAN ET AL 1487-1503

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

HERMITE-HADAMARD TYPE FRACTIONAL INTEGRAL INEQUALITIES. . .

15

h × (Ar2 (g(t); r) − Ar4 (g(t); r, α)) f 00 (ϕ(b))rq + (Ar1 (g(t); r) − Ar3 (g(t); r, α)) f 00 (ϕ(x))rq

1 i rq

.

(4.2)

Letting M (ϕ(x), ϕ(y)) = A, G, H, Pr , I, L, Lp , Mp , ∀x, y ∈ I in (4.1) and (4.2), we get the inequalities involving means for a particular choices of nonnegative twice differentiable M T(r;g,1,ϕ) -preinvex function f. The details are left to the interested reader. 5. Conclusions In this paper, we proved some new integral inequalities for the left-hand side of Gauss-Jacobi type quadrature formula involving M T(r;g,m,ϕ) -preinvex functions. Also, we established some new Hermite-Hadamard type integral inequalities for nonnegative M T(r;g,m,ϕ) -preinvex functions via Riemann-Liouville fractional integrals. These results provide new estimates on these types. Motivated by this new interesting class of M T(r;g,m,ϕ) -preinvex functions we can indeed see to be vital for fellow researchers and scientists working in the same domain. We conclude that our methods considered here may be a stimulant for further investigations concerning Hermite-Hadamard type integral inequalities for various kinds of preinvex functions involving classical integrals, Riemann-Liouville fractional integrals, k-fractional integrals, local fractional integrals, fractional integral operators, q-calculus, (p, q)-calculus, time scale calculus and conformable fractional integrals. References [1] T. S. Du, J. G. Liao and Y. J. Li, Properties and integral inequalities of Hadamard-Simpson type for the generalized (s, m)-preinvex functions, J. Nonlinear Sci. Appl., 9, (2016), 31123126. [2] S. S. Dragomir, J. Peˇ cari´ c and L. E. Persson, Some inequalities of Hadamard type Soochow J. Math., 21, (1995), 335-341. [3] B. G. Pachpatte, On some inequalities for convex functions, RGMIA Res. Rep. Coll., 6, (2003). [4] F. Chen, A note on Hermite-Hadamard inequalities for products of convex functions via Riemann-Liouville fractional integrals, Ital. J. Pure Appl. Math., 33, (2014), 299-306. [5] T. Antczak, Mean value in invexity analysis, Nonlinear Anal., 60, (2005), 1473-1484. [6] F. Qi and B. Y. Xi, Some integral inequalities of Simpson type for GA − -convex functions, Georgian Math. J., 20, (5) (2013), 775-788. [7] X. M. Yang, X. Q. Yang and K. L. Teo, Generalized invexity and generalized invariant monotonicity, J. Optim. Theory Appl., 117, (2003), 607-625. [8] R. Pini, Invexity and generalized convexity, Optimization, 22, (1991), 513-525. ¨ [9] H. Kavurmaci, M. Avci and M. E. Ozdemir, New inequalities of Hermite-Hadamard type for convex functions with applications, arXiv:1006.1593v1 [math. CA], (2010), 1-10. [10] Y. M. Chu, G. D. Wang and X. H. Zhang, Schur convexity and Hadamard’s inequality, Math. Inequal. Appl., 13, (4) (2010), 725-731. [11] X. M. Zhang, Y. M. Chu and X. H. Zhang, The Hermite-Hadamard type inequality of GAconvex functions and its applications, J. Inequal. Appl., (2010), Article ID 507560, 11 pages. [12] Y. M. Chu, M. Adil Khan, T. Ullah Khan and T. Ali, Generalizations of Hermite-Hadamard type inequalities for MT-convex functions, J. Nonlinear Sci. Appl., 9, (5) (2016), 4305-4316. [13] M. Adil Khan, Y. Khurshid, T. Ali and N. Rehman, Inequalities for three times differentiable functions, J. Math., Punjab Univ., 48, (2) (2016), 35-48.

1501

KHAN ET AL 1487-1503

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

16

MUHAMMAD ADIL KHAN, YU-MING CHU∗ , ARTION KASHURI, ROZANA LIKO

[14] M. Adil Khan, Y. Khurshid and T. Ali, Hermite-Hadamard inequality for fractional integrals via η-convex functions, Acta Math. Univ. Comenianae, 79, (1) (2017), 153-164. [15] M. Adil Khan, T. Ali, S. S. Dragomir and M. Z. Sarikaya, Hermite- Hadamard type inequalities for conformable fractional integrals, Revista de la Real Academia de Ciencias Exactas, Fsicas y Naturales. Serie A. Matematic´ as, (2017), doi:10.1007/s13398-017-0408-5. [16] H. N. Shi, Two Schur-convex functions related to Hadamard-type integral inequalities, Publ. Math. Debrecen, 78, (2) (2011), 393-403. [17] F. X. Chen and S. H. Wu, Several complementary inequalities to inequalities of HermiteHadamard type for s-convex functions, J. Nonlinear Sci. Appl., 9, (2) (2016), 705-716. [18] D. D. Stancu, G. Coman and P. Blaga, Analiz˘ a numeric˘ a ¸si teoria aproxim˘ arii, Cluj-Napoca: Presa Universitar˘ a Clujean˘ a., 2, (2002). [19] W. Liu, New integral inequalities involving beta function via P -convexity, Miskolc Math. Notes, 15, (2) (2014), 585-591. ¨ [20] M. E. Ozdemir, E. Set and M. Alomari, Integral inequalities via several kinds of convexity, Creat. Math. Inform., 20, (1) (2011), 62-73. [21] W. Liu, W. Wen and J. Park, Hermite-Hadamard type inequalities for MT-convex functions via classical integrals and fractional integrals, J. Nonlinear Sci. Appl., 9, (2016), 766-777. [22] W. Liu, W. Wen and J. Park, Ostrowski type fractional integral inequalities for MT-convex functions, Miskolc Math. Notes, 16, (1) (2015), 249-256. [23] P. S. Bullen, Handbook of Means and Their Inequalities, Kluwer Academic Publishers, Dordrecht, (2003). [24] Y. M. Chu,M. Adil Khan, T. Ali and S. S. Dragomir, Inequalities for α-fractional differentiable functions, J. Inequal. Appl., Article 93, (2017), 12 pages. [25] M. Adil Khan, Y. M. Chu, T. U. Khan and J. Khan, Some new inequalities of HermiteHadamard type for s-convex functions with applications, Open Math., 15, (2017),1414-1430. [26] Z. H. Yang, W. M. Qian, Y. M Chu and W. Zhang, On rational bounds for the gamma function, J. Inequal. Appl., Article 210, (2017), 17 pages. [27] Z. H. Yang, W. Zhang and Y. M. Chu, Monotonicity of the incomplete gamma function with applications, J. Inequal. Appl., Article 251, (2016), 10 pages. [28] Z. H. Yang, W. Zhang and Y. M. Chu, Monotonicity and inequalities involving the incomplete gamma function, J. Inequal. Appl., Article 221, (2016), 10 pages. [29] Z. H. Yang and Y. M. Chu, Asymptotic formulas for gamma function with applications, Appl. Math. Comput., 270, (2015), 665-680. [30] Z. H. Yang, W. Zhang and Y. M. Chu, Sharp Gautschi inequality for parameter 0 < p < 1 with applications, Math. Inequal. Appl., 20, (4) (2017), 1107-1120. [31] Z. H. Yang and Y. M. Chu, A monotonicity property involving the generalized elliptic integral of the first kind,, Math. Inequal. Appl., 20, (3) (2017), 729-735. [32] X. M. Zhang and Y. M. Chu, A double inequality for gamma function, J. Inequal. Appl., Article ID 503782, (2009), 7 pages. [33] T. H. Zhao, Y. M. Chu and Y. P. Jiang, Monotonic and logarithmically convex properties of a function involving gamma functions, J. Inequal. Appl., Article ID 728612, (2009), 13 pages. [34] T. H. Zhao and Y. M. Chu, A class of logarithmically completely monotonic functions associated with a gamma function, J. Inequal. Appl., Article ID 392431, (2010), 11 pages. [35] T. H. Zhao, Y. M. Chu and H. Wang, Logarithmically complete monotonicity properties relating to the gamma function, Abstr. Appl. Anal., Article ID 896483, (2010), 13 pages. [36] Y. M. Chu, X. M. Zhang and G. D. Wang, The Schur geometrical convexity of the extended mean values, J. Convex Anal., 15, (4) (2008), 707-718. [37] Y. M. Chu and W. F. Xia, Two sharp inequalities for power mean, geometric mean, and harmonic mean, J. Inequal. Appl., Article ID 741923, (2008), 6 pages. [38] Y. M. Chu, and W. F. Xia, Two optimal double inequalities between power mean and logarithmic mean, Comput. Math. Appl., 60, (1) (2010), 83-89. [39] Y. M. Chu and M. K. Wang, Optimal Lehmer mean bounds for the Toader mean, Results Math., 61, (3-4) (2012), 223-229. [40] Y. M. Chu, Y. F. Qiu and M. K. Wang, H¨ older mean inequalities for the complete elliptic integrals, Integtal Transforms Spec. Funct., 23, (7) (2012), 521-527. [41] Y. M. Chu, M. K. Wang, S. L. Qiu and Y. P. Jiang, Bounds for complete elliptic integrals of the second kind with applications, Comput. Math. Appl., 63, (7) (2012), 1177-1184.

1502

KHAN ET AL 1487-1503

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

HERMITE-HADAMARD TYPE FRACTIONAL INTEGRAL INEQUALITIES. . .

17

[42] M. Kun Wang, Y. F. Qiu and Y. M. Chu, Sharp bounds for Seiffert means in terms of Lehmer means, J. Math. Inequal., 4, (4) (2010), 581-586. [43] M. Kun Wang, Y. M. Chu, Y. F. Qiu and S. L. Qiu, An optimal power mean inequality for the complete elliptic integrals, Appl. Math. Lett., 24, (6) (2010), 887-890. [44] M. Kun Wang, Y. M. Chu, S. L. Qiu and Y. P. Jiang, Convexity of the complete elliptic integrals of the first kind with respect to H¨ older means, J. Math. Anal. Appl., 388, (2) (2012), 1141-1146. [45] M. Kun Wang and Y. M. Chu, Asymptotical bounds for complete elliptic integrals of the second kind, J. Math. Anal. Appl., 402, (1) (2013), 119-126. [46] G. D. Wang, X. H. Zhang and Y. M. Chu, A power mean inequality involving the complete elliptic integrals, Rocky Mountain J. Math., 44, (5) (2010), 1661-1667. Muhammad Adil Khan Department of Mathematics, University of Peshawer, Pakistan E-mail address: [email protected] Yu-Ming Chu∗ (Corresponding author) Department of Mathematics, Huzhou University, Huzhou 313000, P. R. China, E-mail address: [email protected] Artion Kashuri Department of Mathematics, Faculty of Technical Science, University ”Ismail Qemali”, Vlora, Albania E-mail address: [email protected] Rozana Liko Department of Mathematics, Faculty of Technical Science, University ”Ismail Qemali”, Vlora, Albania E-mail address: [email protected]

1503

KHAN ET AL 1487-1503

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

UMBRAL CALCULUS APPROACH TO DEGENERATE POLY-GENOCCHI POLYNOMIALS TAEKYUN KIM, DAE SAN KIM, LEE CHAE JANG, AND GWAN-WOO JANG

Abstract. In this paper, we apply umbral calculus techniques in order to derive explicit exprissions, some properties, recurrence relations and identities for degenerate poly-Genocchi polynomials. Furthermore, we derive several explicit expressions of degenerate poly-Genocchi polynomials as linear combinations of some of the well-known families of special polynomials.

1. Review on umbral calculus The purpose of this paper is to use umbral calculus in order to derive some new and interesting expressions, recurrence relations and identities for degenerate poly-Genocchi polynomials. To do that we first recall the umbral calculus very briefly. For a complete treatment, the reader may refer to [10]. Let F be the algebra of all formal power series in the single variable t with the coefficients in the field C of complex numbers: ( ) ∞ X tk F = f (t) = ak ak ∈ C . (1.1) k! k=0

Let P = C[x] denote the ring of polynomials in x with the coefficients in C, and let P∗ be the vector space of all linear functionals on P. For L ∈ P∗ , p(x) ∈ P, < L | p(x) > denotes the action of the linear P∞ k functional L on p(x). For f (t) = k=0 ak tk! ∈ F, the linear functional < f (t) | · > on P is defined by < f (t) | xn >= an , (n ≥ 0). (1.2) D D E E D E P∞ k For L ∈ P∗ , let fL (t) = k=0 L|xk tk! ∈ F. Then we evidently have fL (t)|xn = L|xn , and the map L → fL (t) is a vector space isomorphism from P∗ to F. Thus F may be viewed as the vector space of all linear functionals on P as well as the algebra of formal power series in t. So an element f (t) ∈ F will be thought of as both a formal power series and a linear functional on P. F is called the umbral algebra, the study of which is the umbral calculus. The order o(f (t)) of 0 6= f (t) ∈ F is the smallest integer k such that the coefficients of tk does not vanish. In particular, for 0 6= f (t) ∈ F, it is called an invertible series if o(f (t)) = 0 and a delta series if o(f (t)) = 1. Let f (t), g(t) ∈ F, with o(g(t))D= 0, o(f (t)) = 1. E Then there exists a unique sequence of polynomials k Sn (x) (deg Sn (x) = n) such that g(t)f (t) |Sn (x) = n!δn,k , for n, k ≥ 0. Such a sequence is called the Sheffer sequence for the Sheffer pair (g(t), f (t)), which is concisely denoted by Sn (x) ∼ (g(t), f (t)). 2010 Mathematics Subject Classification. 05A19, 05A40, 11B83. Key words and phrases. degenerate poly-Genocchi polynomials, umbral calculus. . 1

1504

T. KIM ET AL 1504-1520

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

2

Umbral calculus approach to degenerate poly-Genocchi polynomials

It is known that Sn (x) ∼ (g(t), f (t)) if and only if ∞ X 1 tn xf¯(t) e = Sn (x) , ¯ n! g(f (t)) n=0

where f¯(t) is the compositional inverse of f (t) satisfying f (f¯(t)) = f¯(f (t)) = t. Let pn (x) ∼ (1, f (t)), qn (x) ∼ (1, l(t)). Then the transfer formula says that n  f (t) x−1 pn (x), (n ≥ 1). qn (x) = x l(t) Let Sn (x) ∼ (g(t)), f (t)). Then we have the Sheffer identity: n   X n Sn (x + y) = Sk (x)pn−k (y), k

(1.3)

(1.4)

(1.5)

k=0

where pn (x) = g(t)Sn (x) ∼ (1, f (t)). For Sn (x) ∼ (g(t), f (t)), f (t)Sn (x) = nSn−1 (x).

(1.6)

g 0 (t) x− g(t)

(1.7)

Also, we have the recurrence formula:  Sn+1 (x) =



1 Sn (x). f 0 (t)

Assume that Sn (x) ∼ (g(t), f (t)), rn (x) ∼ (h(t), l(t)). Then Sn (x) =

n X

Cn,k rk (x),

(1.8)

k=0

where Cn,k =

1 D h(f¯(t)) ¯ k n E l(f (t)) |x . k! g(f¯(t))

Finally, we also need the following: for any h(t) ∈ F, p(x) ∈ P, D E D E h(t)|xp(x) = ∂t h(t)|p(x) .

(1.9)

(1.10)

For sn (x) ∼ (g(t), f (t)), n−1 X n d Sn (x) = < f¯(t)|xn−l > Sl (x). dx l

(1.11)

l=0

2. Introduction Let r be any integer, and let 0 6= λ ∈ C. The series Lir (x) defined by Lir (x) =

∞ X xn , (see [3–9]), nr n=1

(2.1)

is the r-th polylogarithmic function for r ≥ 1, and a rational function for r ≤ 0. One immediate property of this is d 1 (Lir+1 (x)) = Lir (x). (2.2) dx x

1505

T. KIM ET AL 1504-1520

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, G.-W. Jang

3

(r)

The degenerate poly-Genocchi polynomials γn (λ, x) of index r are given by 2Lir (1 − e−t ) 1 λ

(1 + λt) + 1 (r)

∞ X

x

(1 + λt) λ =

γn(r) (λ, x)

n=0

tn . n!

(2.3)

(r)

For x = 0, γn (λ) = γn (λ, 0) are called degenerate poly-Genocchi numbers of index r. In particular for (1) r = 1, γn (λ, x) = γn (λ, x) may be called degenerate Genocchi polynomials and are given by 2t

∞ X

x

1 λ

(1 + λt) + 1

(1 + λt) λ =

γn (λ, x)

n=0

tn . n!

(2.4)

(r)

They are a degenerate version of the poly-Genocchi polynomials Gn (x) of index r given by ∞ 2Lir (1 − e−t ) xt X (r) tn e = Gn (x) . t e +1 n! n=0

(2.5)

These poly-Genocchi polynomials were first introduced in [3] under the name of poly-Euler polynomials (r) and with the notation En (x). However, it seems more appropriate to call them poly-Genocchi polyno(1) mials, as Gn (x) = Gn (x) are the ’classical’ Genocchi polynomials defined by ∞ 2t xt X tn e = Gn (x) . t e +1 n! n=0

(2.6)

(r)

(r)

Clearly, limλ→0 γn (λ, x) = Gn (x). Also, we recall that the degenerate Euler polynomials En (λ, x) were introduced in [1] by Carlitz and are given by 2

∞ X

x

1 λ

(1 + λt) − 1

(1 + λt) λ =

En (λ, x)

n=0

tn . n!

(2.7)

(r)

The degenerate poly-Bernoulli polynomials βn (λ, x) of index r are defined in [6, 7] as Lir (1 − e−t ) 1

(1 + λt) λ − 1 (r)

∞ X

x

(1 + λt) λ =

βn(r) (λ, x)

n=0

tn . n!

(2.8)

(r)

When x = 0, βn (λ) = βn (λ, 0) are called degenerate poly-Bernoulli numbers of index r. For r = 1, (1) βn (λ, x) = βn (λ, x) are called degenerate Bernoulli polynomials and given by t

∞ X

x

1 λ

(1 + λt) − 1

(1 + λt) λ =

βn (λ, x)

n=0

tn , n!

(2.9)

which were introduced again by Carlitz in [1]. They are a degenerate version of the poly-Bernoulli (r) polynomials Bn (x) of index r given by ∞ Lir (1 − e−t ) xt X (r) tn e = B (x) , n et − 1 n! n=0

(2.10)

We note here that this definition of poly-Bernoulli polynomials is slightly different from its original (r) (r) definition(cf. [4, 5]). Obviously, limλ→0 βn (λ, x) = Bn (x), and Bn (x) = B (1) (x) are the ’classical’ Bernoulli polynomials defined by ∞ X t tn xt e = B (x) , n et − 1 n! n=0

1506

(2.11)

T. KIM ET AL 1504-1520

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

4

Umbral calculus approach to degenerate poly-Genocchi polynomials

Write Lir (1 − e−t ) =

P∞

n=1

n

an tn! = t +

∞ X

P∞

n=2

n

an tn! . Then from (2.3) and (2.7), we see that

∞ n−1 X X n  tn = . an−l El (λ, x) n! n=1 n! l

t γn(r) (λ, x)

n=0

n

(2.12)

l=0

In turn, (2.12) implies that (r)

(r)

γ0 (λ, x) = 0, γ1 (λ, x) = 1, degγn(r) (λ, x) = n − 1, (n ≥ 1).

(2.13)

In this paper, we would like to apply umbral calculus techniques( [2, 7, 9, 10]) in order to derive explicit exprissions, some properties, recurrence relations and identities for degenerate poly-Genocchi (r) polynomials. However, sometimes we can not apply the umbral calculus techniques directly to γn (λ, x), −t (r) ) is not invertible and hence γn (λ, x) is not a Sheffer sequence. Nevertheless, from (2.3) since 2Lir (1−e 1 (1+λt) λ +1

and (2.13), we note that (r) ∞ X γn+1 (λ, x) tn (1 + λt) = . 1 n + 1 n! t((1 + λt) λ + 1) n=0  (r) γn+1 (λ,x) Thus we see from (2.14) that n+1 is the Sheffer sequence for the pair

2Lir (1 − e−t )

x λ

(2.14) (eλt −1)(et +1)

, 1 (eλt 1 λt 2λLir (1−e− λ (e −1) ) λ

 − 1) ,

namely (r)

γn+1 (λ, x) ∼ n+1



(eλt − 1)(et + 1)

 1 λt (e − 1) . , 1 λt 2λLir (1 − e− λ (e −1) ) λ

(2.15)

Furthermore, we give some explicit expressions of degenerate poly-Genocchi polynomials as linear combinations of some of the well-known families of special polynomials.

3. Main results The following Theorems 2.1 and 2.2 are mentioned in [9] and obtained in [7, 9], and will be useful in deriving several explicit expressions of degenerate poly-Genocchi polynomials as linear combinations of degenerate Euler or degenerate Genocchi polynomials. Theorem 3.1. For all integers r ≥ 2, and n ≥ 0, we have the following identities. 

Lir (1 − e−t ) | xn t



n+1 1 X m! (−1)m+n−1 r S2 (n + 1, m) n + 1 m=1 m   n X n 1 (r) = Bm m n − m +1 m=0

=

=

1 B (r−1) n+1 n

= n!

r−1 Y

X

j1 ,··· ,jr−1 ≥0,j1 +···+jr−1 =n i=1

1507

Bji . ji !(j1 + · · · + ji + 1)

T. KIM ET AL 1504-1520

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, G.-W. Jang

5

Theorem 3.2. For all integers r ≥ 2, and n ≥ 0, we have the following identities.



X n+1 m! Lir (1 − e−t ) | xn+1 = (−1)m+n+1 r S2 (n + 1, m) m m=1   n X n+1 (r) = Bm m m=0 = Bn(r−1) r−1 Y

X

= (n + 1)!

j1 ,··· ,jr−1 ≥0,j1 +···+jr−1 =n i=1

Bji . ji !(j1 + · · · + ji + 1)

The following can be seen also from (2.3), but here we will deduce it by using umbral calculus.

*

∞ X



2Lir (1 − e−t )

tm (r) γm (λ, y) | xn m! m=0

γn(r) (λ, y) = =

1

(1 + λt) λ + 1

+

y λ

n



(1 + λt) | x

+ ∞ 2Lir (1 − e−t ) X  y l (log(1 + λt))l n | = x 1 l! (1 + λt) λ + 1 l=0 λ * + ∞ n  l X λm m n 2Lir (1 − e−t ) X y S1 (m, l) | t x = 1 λ m! (1 + λt) λ + 1 m=l l=0   n  l X n   X y n m 2Lir (1 − e−t ) n−m = λ S1 (m, l) |x 1 λ m (1 + λt) λ + 1 l=0 m=l n  l X n   X y n m (r) = λ S1 (m, l)γn−m (λ). λ m *

l=0

(3.1)

m=l

(x|λ)n = x(x − λ) · · · (x − (n − 1)λ), for n ≥ 1, and (x|λ)0 = 1. Recalling that (x|λ)n = PnHere n−m λ S1 (n, m)xm , we have the following result. m=0 Theorem 3.3. For all integers n ≥ 0, we have the following expressions.

γn(r) (λ, x)

! n   X m X n (r) m−l l = λ S1 (m, l)x γn−m (λ) m m=0 l=0 n   X n (r) = γ (λ)(x|λ)m . m n−m m=0

1508

T. KIM ET AL 1504-1520

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

6

Umbral calculus approach to degenerate poly-Genocchi polynomials

Now, we would like to express the degenerate poly-Genocchi polynomials in terms of degenerate Euler polynomials, for this we need to observe the following. γn(r) (λ, y) =



2Lir (1 − e−t ) 1

(1 + λt) λ + 1  = Lir (1 − e−t ) |

y

(1 + λt) λ | xn



2

y λ

(1 + λt) x 1 (1 + λt) λ + 1 + ∞ l X t = Lir (1 − e−t ) | El (λ, y) xn l! l=0 n   X

n = El (λ, y) Lir (1 − e−t ) | xn−l . l

n

 (3.2)

*

l=0

(r)

From (3.2) and Theorem 2.2, we obtain the following explicit expressions for γn (λ, x) , as linear combinations of the degenerate Euler polynomials. Theorem 3.4. For all integers n ≥ 0, we have the following identities. n X l   X n m! (−1)l+m r S2 (l, m)En−l (λ, x) m l l=1 m=1    l−1 n X X n l (r) Bm En−l (λ, x) = l m l=1 m=0 n   X n (r−1) = Bl−1 En−l (λ, x) l

γn(r) (λ, x) =

l=1

=

n X

X

(n)l

l=1 j1 ,··· ,jr−1 ≥0,j1 +···+jr−1 =l−1

r−1 Y i=1

Bj i En−l (λ, x). ji !(j1 + · · · + ji + 1)

Next, in order to express the degenerate poly-Genocchi polynomials in terms of degenerate Genocchi polynomials, we first observe the following.

γn(r) (λ, y) =



2Lir (1 − e−t ) 1

y

(1 + λt) λ | xn



(1 + λt) λ + 1  y Lir (1 − e−t ) 2t λ xn = | (1 + λt) 1 t (1 + λt) λ + 1 * + ∞ Lir (1 − e−t ) X tl n = | γl (λ, y) x t l! l=0     n X n Lir (1 − e−t ) n−l γl (λ, y) |x . = l t 

(3.3)

l=0

(r)

From (3.3) and Theorem 2.1, we obtain the following explicit expression for γn (λ, x) as linear combinations of degenerate Genocchi polynomials.

1509

T. KIM ET AL 1504-1520

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, G.-W. Jang

7

Theorem 3.5. For all integers n ≥ 0, we have the following identities.   n−1 l+1 XX n m! 1 (r) γn (λ, x) = (−1)l+m−1 r S2 (l + 1, m)γn−l (λ, x) l + 1 l m l=0 m=1    n−1 l XX 1 n l (r) = Bm γn−l (λ, x) l − m + 1 l m m=0 l=0 n−1 X 1 n (r−1) Bl = γn−l (λ, x) l+1 l l=0

=

n−1 X

X

l=0 j1 ,··· ,jr−1 ≥0,j1 +···+jr−1 =l

(n)l

r−1 Y i=1

Bji γn−l (λ, x). ji !(j1 + · · · + ji + 1)

Here we apply the transfer formula (1.4) to xn ∼ (1, t),    (r) eλt − 1 (et + 1) γn+1 (λ, x) 1 λt   ∼ 1, (e − 1) . 1 λt n+1 λ 2Lir 1 − e− λ (e −1) 1 λ

(3.4)

Then, for n ≥ 1 we have   n (r) eλt − 1 (et + 1) γn+1 (λ, x) λt   = x xn−1 λt − 1 1 λt −1) n + 1 e − (e 2Lir 1 − e λ 1 λ

=x

∞ X

l (n) λ l n−1

(3.5)

Bl

tx l! l=0 n−1 X n − 1 (n) = λl Bl xn−l . l l=0

Thus (r)

γn+1 (λ, x) n+1   λt 1 n−1 2Lir 1 − e− λ (e −1) X n − 1 (n) xn−l = λl Bl 1 λt − 1) (et + 1) l (e λ l=0 m (r) n−1 ∞ X n − 1 X γm+1 (λ) λ1 eλt − 1 l (n) = λ Bl xn−l l m + 1 m! m=0 l=0   (r) n−1 n−l ∞ X X n−1 X λj (n) γm+1 (λ) = λl−m Bl S2 (j, m) tj xn−l l m + 1 j=m j! m=0

(3.6)

l=0

=

  (r) n X n−l X n−l  X n − 1 n − l l−m+j (n) γm+1 (λ) n−l−j λ S2 (j, m)Bl x l j m+1 m=0 j=m l=0

! n−j (r) n X X n−j−l X n − 1n − l (n) γm+1 (λ) n−m−j = λ S2 (n − j − l, m)Bl xj , (n ≥ 1). l j m + 1 m=0 j=0 l=0

1510

T. KIM ET AL 1504-1520

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

8

Umbral calculus approach to degenerate poly-Genocchi polynomials

Observing that n X



  1 λt e −1 , λ l=0    (r) 1 λt t  1 λt λ e − 1 (e + 1)  γn+1 (λ, x) ∼ 1, e −1 , 1 λt n+1 λ 2Lir 1 − e− λ (e −1) S1 (n, l)λn−l xl = (x|λ)n ∼

1,

(3.7)

we have (r)

γn+1 (λ, x) n+1 =

=

n X l=0 n X

S1 (n, l)λn−l n−l

S1 (n, l)λ

l=0

=

n X l X

  λt 1 2Lir 1 − e− λ (e −1) 1 λ

(eλt − 1) (et + 1)

(r) ∞ X γm+1 (λ) m+1 m=0

S1 (n, l)λ

l=0 m=0

=

n X l X l X l=0 m=0 j=m

=

λn−l−m+j

m eλt − 1 xl m!

1 λ

(r) n−l−m γm+1 (λ)

xl

(3.8)

∞ X

λj S2 (j, m) tj xl m + 1 j=m j!

  (r) γ (λ) l−j l S1 (n, l)S2 (j, m) m+1 x j m+1

l−j   (r) n X n X X γ (λ) j l n−m−j λ S1 (n, l)S2 (l − j, m) m+1 x . j m+1 m=0 j=0 l=j

Hence, from (3.6) and (3.8), we get the following theorem. Theorem 3.6. We have the following expressions. (r)

γn+1 (λ, x) n+1 ! n−j (r) n X X n−j−l X n − 1n − l (n) γm+1 (λ) n−m−j = xj , (n ≥ 1) λ S2 (n − j − l, m)Bl m + 1 l j m=0 j=0 l=0

=

l−j n X n X X j=0 l=j

  (r) γ (λ) j l n−m−j λ S1 (n, l)S2 (l − j, m) m+1 x , (n ≥ 0). j m+1 m=0

The following Sheffer identity follows immediately from (1.5). n   X n (r) (r) γn (λ, x + y) = γ (λ, x)(y|λ)n−j . j j j=0

(3.9)

(r)

Applying (1.6) to γn (λ, x), here we get 1 λt (r) (e − 1)γn(r) (λ, x) = nγn−1 (λ, x). λ Thus (r)

γn(r) (λ, x + λ) − γn(r) (λ, x) = nλγn−1 (λ, x).

1511

(3.10)

(3.11)

T. KIM ET AL 1504-1520

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, G.-W. Jang

9

By using (1.7), we obtain (r)

  (r) g 0 (t) −λt γn (λ, x) x− e g(t) n 1 1 g 0 (t) (r) = xγn(r) (λ, x − λ) − e−λt γ (λ, x), n n g(t) n

γn+1 (λ) = n+1

where g(t) =

(eλt −1)(et +1)  . 1 λt 2λLir 1−e− λ (e −1)

(3.12)

Here,

g 0 (t) 0 = (logg(t)) g(t)    1 −λ (eλt −1)   Li 1 − e t λt λt r−1 te te 1 λte   + − = . 1 λt  t  eλt − 1 et + 1 Li 1 − e− λ1 (eλt −1) e λ (e −1) − 1 r (r)

Note that g(t)γn (λ, x) = (x|λ)n = has order ≥ 1.

Pn

m=0

(3.13)

λn−m S1 (n, m)xm , and that the expression in the curly bracket

g 0 (t) (r) γ (λ, x) g(t) n    1 (eλt −1) −λ λt 1  2λLi 1 − e r 1 λt te(1−λ)t 2λLir (1 − e− λ (e −1) ) = + t t  eλt − 1 (eλt − 1)(et + 1) e +1 (eλt − 1)(et + 1)   − 1 (eλt −1)  2 (eλt − 1)(et + 1) λt Lir−1 1 − e λ   γ (r) (λ, x) − t 1 λt  2λLi 1 − e− λ1 (eλt −1) n e + 1 eλt − 1 e λ (e −1) − 1 r    λt 1 − λ (e −1) λt 1 n  2λLi 1 − e X r 1 λt te(1−λ)t 2λLir (1 − e− λ (e −1) ) n−m = λ S1 (n, m) + t t  eλt − 1 (eλt − 1)(et + 1) e +1 (eλt − 1)(et + 1) m=0   − 1 (eλt −1)  2 λt Lir−1 1 − e λ − t xm 1 λt  e + 1 eλt − 1 e λ (e −1) − 1    1 −λ (eλt −1) λt 1 n  2λLi 1 − e n−m X r λ λt te(1−λ)t 2λLir (1 − e− λ (e −1) ) = S1 (n, m) +  eλt − 1 m+1 (eλt − 1)(et + 1) et + 1 (eλt − 1)(et + 1) m=0   1 −λ (eλt −1)  Li 1 − e r−1 2 λt − t xm+1 1 λt  e + 1 eλt − 1 e λ (e −1) − 1

e−λt

(3.14)

The next theorem follows from (3.12), (3.14), (3.15), (3.16), and (3.17).

1512

T. KIM ET AL 1504-1520

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

10

Umbral calculus approach to degenerate poly-Genocchi polynomials

Theorem 3.7. For all integers n ≥ 0, the following holds true. (r)

γn+1 (λ, x) x (r) − γn (λ, x − λ) n+1 n  n m+1 m+1 x X X X 1 m + 1  1 1 m+1−l (r) =− λn−m S1 (n, m)S2 (j, l) λ γl+1 (λ)Bm+1−j n m=0 m+1 j l+1 λ l=0 j=l

) m+1−j x X m + 1 − j  1 m + 1 − j j−l (r) (r−1) + λ γl+1 (λ)Em−j (x + 1 − λ) + . λj+k−l Bl Em+1−j−k Bk 2 l+1 λ k k=0

For the sake of completeness, we compute the three terms in (3.14) as follows:

λt eλt − 1

  λt 1 2λLir 1 − e− λ (e −1) (eλt − 1)(et + 1) ∞

=

(r)

λt X γl+1 (λ) λt e −1 l+1

l − 1) m+1 x l!

1 λt λ (e

l=0

=

=

λt eλt − 1

m+1 X l=0

xm+1

(r) ∞ γl+1 (λ)λ−l X λj S2 (j, l) tj xm+1 l+1 j!

(3.15)

j=l

  m+1 m+1 λt X X 1 m + 1 j−l (r) λ S2 (j, l)γl+1 (λ)xm+1−j eλt − 1 l+1 j l=0 j=l

=

m+1 X m+1 X l=0 j=l

(1−λ)t

te et + 1

  x m + 1 m+1−l 1 (r) , λ S2 (j, l)γl+1 (λ)Bm+1−j l+1 λ j

  λt 1 2λLir 1 − e− λ (e −1)

xm+1 (eλt − 1)(et + 1)   m+1 m+1 te(1−λ)t X X 1 m + 1 j−l (r) = t λ S2 (j, l)γl+1 (λ)xm+1−j e +1 l+1 j l=0 j=l

=

(1−λ)t m+1 X m+1 X

e et + 1

l=0 j=l

  m + 1 − j m + 1 j−l (r) λ S2 (j, l)γl+1 (λ)xm−j l+1 j

(3.16)

  m+1 m+1 1 (1−λ)t X X m + 1 − j m + 1 j−l 2 (r) = e λ S2 (j, l)γl+1 (λ) t xm−j 2 l+1 j e +1 l=0 j=l

1 = 2

m+1 X m+1 X j=0 j=l

  m + 1 − j m + 1 j−l (r) λ S2 (j, l)γl+1 (λ)Em−j (x + 1 − λ), l+1 j

and

1513

T. KIM ET AL 1504-1520

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, G.-W. Jang

2 λt et + 1 eλt − 1

11

  λt 1 Lir−1 1 − e− λ (e −1)

xm+1 1 λt e λ (e −1) − 1 ∞ 2 λt X (r−1) ( λ1 (eλt − 1))l m+1 Bl = t x e + 1 eλt − 1 l! l=0

=

=

2 λt et + 1 eλt − 1 m+1 X m+1 X l=0 j=l

=

m+1 X m+1 X l=0 j=l

=

m+1 X l=0

∞ X

S2 (j, l)

j=l

λj j m+1 t x j! (3.17)

  2 λt (r−1) j−l m + 1 xm+1−j λ S2 (j, l)Bl λt t e −1e +1 j λj−l

  m+1−j x X m + 1 − j  m+1 (r−1) S2 (j, l)Bl Em+1−j−k λk Bk j k λ k=0

m+1 X m+1 X m+1−j X  l=0 j=l

(r−1)

λ−l Bl

k=0

  x m + 1 m + 1 − j j+k−l (r−1) λ S2 (j, l)Bl Em+1−j−k Bk . j k λ

We note that  1 n−l log(1 + λt) | x λ * ∞ + X tm −1 m−1 m n−l =λ (−1) λ (m − 1)! |x m! m=1

< f¯(t)|xn−l > =



(3.18)

= (−λ)n−l−1 (n − l − 1)!. Thus, from (1.11), we get

d dx

(r)

γn+1 (λ, x) n+1

! = n!

n−1 X l=0

(r)

(−λ)n−l−1 γl+1 (λ, x) . l!(n − l) l+1

(3.19)

(r)

Here we use (1.10) in order to get an expression of γn (λ, x). For this, assume that n ≥ 1.

γn(r) (λ, y)



2Lir (1 − e−t )

y λ

n



(1 + λt) | x 1 (1 + λt) λ + 1    y 2Lir (1 − e−t ) n−1 λ = ∂t (1 + λt) | x 1 (1 + λt) λ + 1   y 2Lir (1 − e−t )  λ | xn−1 + ∂ (1 + λt) . t 1 (1 + λt) λ + 1 =

1514

(3.20)

T. KIM ET AL 1504-1520

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

12

Umbral calculus approach to degenerate poly-Genocchi polynomials (r)

The second term of (3.20) is easily seen to be equal to yγn−1 (λ, y − λ). For the first term of (3.20), we observe that   2Lir (1 − e−t ) ∂t 1 (1 + λt) λ + 1 (1−e 2 Lir−1 1−e−t

=

−t

) −t

1

1

e ((1 + λt) λ + 1) − 2Lir (1 − e−t )(1 + λt) λ −1  2 1 (1 + λt) λ + 1

(3.21)

Lir−1 (1 − e−t ) 1 2Lir (1 − e−t ) 1 2 2Lir (1 − e−t ) − + . 1 1 t e −1 1 + λt (1 + λt) λ + 1 2(1 + λt) (1 + λt) λ + 1 (1 + λt) λ1 + 1 (1 + λt) + 1 2

1 λ

So, the first term can be written as three sums:   y Lir−1 (1 − e−t ) 2 λ | xn−1 (1 + λt) 1 et − 1 (1 + λt) λ + 1   y 1 2Lir (1 − e−t ) λ | xn−1 (1 + λt) − 1 + λt (1 + λt) λ1 + 1   y 1 2 2Lir (1 − e−t ) n−1 λ + (1 + λt) | x . 2(1 + λt) (1 + λt) λ1 + 1 (1 + λt) λ1 + 1 Now, we compute the three terms in (3.22) as follows   y 2 Lir−1 (1 − e−t ) n−1 λ (1 + λt) | x 1 et − 1 (1 + λt) λ + 1   y Lir−1 (1 − e−t ) 2 λ xn−1 = | (1 + λt) 1 et − 1 (1 + λt) λ + 1 + * ∞ tl n−1 Lir−1 (1 − e−t ) X | El (λ, y) x = et − 1 l! l=0     n−1 X n−1 Lir−1 (1 − e−t ) n−1−l |x = El (λ, y) l et − 1 l=0 n−1 X n − 1  (r−1) El (λ, y)Bn−1−l , = l

(3.22)

(3.23)

l=0

 y 1 2Lir (1 − e−t ) n−1 λ (1 + λt) | x 1 + λt (1 + λt) λ1 + 1   y 1 2Lir (1 − e−t ) λ xn−1 = | (1 + λt) 1 + λt (1 + λt) λ1 + 1 * + ∞ X 1 tl n−1 (r) = | γl (λ, y) x 1 + λt l! l=0     n−1 X n − 1 (r) 1 n−1−l = γl (λ, y) |x l 1 + λt l=0 n−1 X n − 1 (r) = γl (λ, y)(−λ)n−1−l (n − 1 − l)!, l



(3.24)

l=0

1515

T. KIM ET AL 1504-1520

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, G.-W. Jang

13

and  y 1 2 2Lir (1 − e−t ) n−1 λ (1 + λt) | x 2(1 + λt) (1 + λt) λ1 + 1 (1 + λt) λ1 + 1   y 2 2Lir (1 − e−t ) 1 λ xn−1 | (1 + λt) = 2(1 + λt) (1 + λt) λ1 + 1 (1 + λt) λ1 + 1 * + ∞ X 1 2 tl n−1 (r) = | γl (λ, y) x 2(1 + λt) (1 + λt) λ1 + 1 l! l=0   n−1 X n − 1 (r) 1 2 n−1−l = γl (λ, y) | x l 2(1 + λt) (1 + λt) λ1 + 1 l=0



+ *  ∞ X tm n−1−l 1 n − 1 (r) | Em (λ) x = γl (λ, y) 2(1 + λt) m=0 m! l l=0       n−1 n−1−l X n − 1 (r) X n−1−l 1 1 n−1−l−m = γl (λ, y) |x Em (λ) l m 2 1 + λt m=0 l=0   n−1 n−1−l  1 X X n − 1 n − 1 − l (r) γl (λ, y) Em (λ)(−λ)n−1−l−m (n − 1 − l − m)! = l m 2 m=0 n−1 X

(3.25)

l=0

Putting (3.20), (3.22), (3.23), (3.24), (3.25) altogether, we obtain the following result. Theorem 3.8. For all integers n ≥ 0, the following holds true. (r)

γn(r) (λ, x) = xγn−1 (λ, x − λ) +

n−1 X l=0

(r)

−(−λ)n−1−l γl (λ, x) +

1 2

n−1−l X m=0

(n − 1)! l!



1 (r−1) B El (λ, x) (n − 1 − l)! n−1−l )

1 (r) Em (λ)(−λ)n−1−l−m γl (λ, x) . m!

From now on, we will exploit (1.9) in order to express degenerate poly-Genocchi polynomials as linear combinations of well known families of polynomials. For this, we remind the reader that

(r)

γn+1 (λ, x) ∼ n+1 (r)

We let

γn+1 (λ,x) n+1

=

Pn

k=0



(eλt − 1)(et + 1)

 1 λt , (e − 1) . 1 λt 2λLir (1 − e− λ (e −1) ) λ

(3.26)

Cn,k Ek (λ, x), with noting that  En (λ, x) ∼

 et + 1 1 λt , (e − 1) . 2 λ

1516

(3.27)

T. KIM ET AL 1504-1520

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

14

Umbral calculus approach to degenerate poly-Genocchi polynomials

Then Cn,k

*

1

(1 + λt) λ + 1 2λLir (1 − e−t ) k n t |x 1 2 λt((1 + λt) λ + 1)   1 Lir (1 − e−t ) k n = |t x k! t    n Lir (1 − e−t ) n−k = |x k t   n 1 (r−1) Bn−k . = n−k+1 k 1 = k!

+

(3.28)

Thus we have shown (r) γn+1 (λ, x)

 n  X n+1 (r−1) = Bn−k Ek (λ, x). k

(3.29)

k=0

To express degenerate poly-Genocchi polynomials as linear combinations of Euler polynomials, write Pn = k=0 Cn,k Ek (x), with noting that  t  e +1 En (λ, x) ∼ ,t . (3.30) 2

(r)

γn+1 (λ,x) n+1

Then Cn,k

+  k 1 (1 + λt) λ + 1 2λLir (1 − e−t ) 1 n log(1 + λt) |x 1 2 λt((1 + λt) λ + 1) λ   Lir (1 − e−t ) 1 | (log(1 + λt))k xn = λ−k t k! * + ∞ −t Lir (1 − e ) X λl l n −k =λ | S1 (l, k) t x t l! l=k     n X n Lir (1 − e−t ) = λ−k λl S1 (l, k) | xn−l l t l=k   n X n l 1 (r−1) λ S1 (l, k)Bn−l . = λ−k n−l+1 l 1 = k!

*

(3.31)

l=k

Thus we have derived the following theorem. Theorem 3.9. For all n ≥ 0, we have the following.  n X n  X n + 1 l−k (r) (r−1) γn+1 (λ, x) = λ S1 (l, k)Bn−l Ek (x). l k=0 l=k

(r)

Let

γn+1 (λ,x) n+1

=

Pn

k=0

(r)

Cn,k βk (λ, x), with   1 λt et − 1 βn(r) (λ, x) ∼ , (e − 1) . 1 λt Lir (1 − e− λ (e −1) λ

1517

(3.32)

T. KIM ET AL 1504-1520

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, G.-W. Jang

15

Then Cn,k

* + 1 1 (1 + λt) λ − 1 2λLir (1 − e−t ) = | t k xn k! Lir (1 − e−t ) λt((1 + λt) λ1 + 1) +  * 1 (1 + λt) λ − 1 n−k n 2 | = x 1 k t (1 + λt) λ + 1 +  * ∞ X n 2 (1|λ)l+1 tl n−k | x = 1 k (1 + λt) λ + 1 l=0 l + 1 l!   n−k     n X n − k (1|λ)l+1 2 n−k−l = | x 1 k l l+1 (1 + λt) λ + 1 l=0   n−k   n X n − k (1|λ)l+1 = En−k−l (λ). k l+1 l

(3.33)

l=0

Thus we have shown the following result. Theorem 3.10. For n ≥ 0, we have the following. n n−k X X n + 1n − l (r) (r) (1|λ)l+1 En−k−l (λ)βk (λ, x). γn+1 (λ, x) = l+1 k k=0 l=0

(r)

Write

γn+1 (λ,x) n+1

=

Pn

k=0

Cn,k βk (λ, x), with noting that   λ(et − 1) 1 λt , (e − 1) . βn (λ, x) ∼ eλt − 1 λ

(3.34)

Then Cn,k

* + 1 1 λ((1 + λt) λ − 1) 2λLir (1 − e−t ) k n = |t x 1 k! λt λt((1 + λt) λ + 1) +  * 1 n 2Lir (1 − e−t ) (1 + λt) λ − 1 n−k = | x 1 k t t((1 + λt) λ + 1)     n−k   n X n − k (1|λ)l+1 2Lir (1 − e−t ) n−k−l = | x 1 k l l+1 t((1 + λt) λ + 1) l=0   n−k   (r) n X n − k (1|λ)l+1 γn−k−l+1 (λ) = . k l l+1 n−k−l+1

(3.35)

l=0

Thus we obtain the following theorem. Theorem 3.11. For all n ≥ 0, the following holds true. n n−k X X 1 n + 1n − l + 1 (r) (r) (1|λ)l+1 γn−k−l+1 (λ)βk (λ, x). γn+1 (λ, x) = l+1 l k k=0 l=0

Lastly, we would like to express the degenerate poly-Genocchi polynomials in terms of Bernoulli polynomials, with noting that  t  e −1 (3.36) Bn (x) ∼ ,t , t

1518

T. KIM ET AL 1504-1520

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

16

Umbral calculus approach to degenerate poly-Genocchi polynomials (r)

we let Cn,k

γn+1 (λ,x) n+1

=

Pn

k=0

Cn,k Bk (x). Then

 k + 1 1 λ((1 + λt) λ − 1) 2λLir (1 − e−t ) | log(1 + λt) xn log(1 + λt) λt((1 + λt) λ1 + 1) λ * + 1 2Lir (1 − e−t ) λt (1 + λt) λ − 1 1 −k k n =λ | (log(1 + λt)) x 1 t k! t((1 + λt) λ + 1) log(1 + λt) * + 1 ∞ 2Lir (1 − e−t ) λt (1 + λt) λ − 1 X λl l n −k =λ | S1 (l, k) t x 1 t l! t((1 + λt) λ + 1) log(1 + λt) l=k * +   1 n X n 2Lir (1 − e−t ) (1 + λt) λ − 1 n−l λt −k l =λ λ S1 (l, k) | x 1 l t t((1 + λt) λ + 1) log(1 + λt) l=0 * + (3.37) n   ∞ X X n l 2Lir (1 − e−t ) (1|λ)m+1 tm n−l λt −k =λ λ S1 (l, k) | x 1 l t((1 + λt) λ + 1) log(1 + λt) m=0 m + 1 m! l=0    n   n−l  X X 2Lir (1 − e−t ) λt n l n − l (1|λ)m+1 n−l−m −k | x =λ λ S1 (l, k) 1 m+1 l m t((1 + λt) λ + 1) log(1 + λt) m=0 l=0 * +  n   n−l  ∞ −t j X X X n n − l (1|λ) 2Li (1 − e ) λ m+1 r = λ−k λl S1 (l, k) | bj tj xn−l−m 1 l m m + 1 j! λ + 1) t((1 + λt) m=0 j=0 l=k   (r) n−l−m  n   n−l  X X γn−l−m−j+1 n−l−m j n l n − l (1|λ)m+1 X −k . =λ λ S1 (l, k) λ bj m+1 j n−l−m−j+1 l m m=0 j=0 1 = k!

*

l=k

Here bj are the Bernoulli numbers of the second kind given by derived the following result.

t log(1+t)

=

tj j=0 bj j! .

P∞

Thus we have

Theorem 3.12. For all integers n ≥ 0, the following holds true. (r)

γn+1 (λ, x) =

n X n X n−l n−l−m X X k=0 l=k m=0

j=0

    1 n + 1 n − j + 1 n − j − m + 1 l+j−k λ S1 (l, k) m+1 j m l

(r)

× (1|λ)m+1 bj γn−l−m−j+1 Bk (x). References 1. L. Carlitz, Degenerate Stirling, Bernoulli and Eulerian numbers, Utilitas Math., 15(1979),51–88. 2, 2 2. R. Dere, Y. Simsek, Applications of umbral algebra to some special polynomials, Adv. Stud. Contemp. Math. (Kyungshang), 22 (2013), no.3, 433-438. 2 3. H. Jolany, M. Aliabadi, R.B. Corcino, M.R. Darafsheh, A note on multi poly-Euler numbers and Bernoulli polynomials, Gen. Math., 20(2012), no. 2-3, 122–134. 2.1, 2 4. D. S. Kim, T. Kim, Higher-order Bernoulli and poly-Bernoulli mixed type polynomials, Georgian Math. J., 22(2015), 265-272. 2.1, 2 5. D. S. Kim, T. Kim, A note on poly-Bernoulli and higher-order poly-Bernoulli polynomials, Russ. J. Math. Phys., 22 (2015), no. 1, 26–33. 2.1, 2 6. D. S. Kim, T. Kim, T. Mansour, J.-J. Seo, Fully degenerate poly-Bernoulli polynomials with a q parameter, Filomat, 30(2016), no. 4, 1029-1035. 2.1, 2 7. D.S. Kim, T. Kim, H.I. Kwon , T. Mansour, Degenerate poly-Bernoulli polynomials with umbral calculus viewpoint, J. Inequal. Appl., 215 (2015), 215–228. 2.1, 2, 2, 3

1519

T. KIM ET AL 1504-1520

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

T. Kim, D. S. Kim, L. C. Jang, G.-W. Jang

17

8. D. S. Kim, T. Kim, Higher-order Cauchy of the first kind and poly-Cauchy of the first kind mixed type polynomials, Adv. Stud. Contemp. Math. (Kyungshang), 23 (2013), no.4, 621-636. 2.1 9. T. Kim, D.S. Kim, Poly-Genocchi polynomials with umbral calculus viewpoint, Preprint. 2.1, 2, 3 10. S. Roman, The umbral calculus, Pure and Applied Mathematics, vol. 111, Academic Press, Inc.[Harcourt Brace Jovanovich, Dublishers], New York, 1984. 1, 2 Department of Mathematics, College of Science Tianjin Polytechnic University, Tianjin 300160, China, Department of Mathematics, Kwangwoon University, Seoul 139-701, Republic of Korea E-mail address: [email protected] Department of Mathematics, Sogang University, Seoul 121-742, Republic of Korea E-mail address: [email protected] Graduate School of Education, Konkuk University, Seoul 143-701, Republic of Korea E-mail address: [email protected] Department Mathematics, Kwangwoon University, Seoul 139-701, Republic of Korea E-mail address: [email protected]

1520

T. KIM ET AL 1504-1520

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

QUADRATIC (ρ1 , ρ2 )-FUNCTIONAL INEQUALITY IN FUZZY NORMED SPACES YOUNGHUN JO, JUNHA PARK, TAEKSEUNG KIM, JAEMIN KIM∗ AND CHOONKIL PARK∗ Abstract. In this paper, we introduce and solve the following quadratic (ρ1 , ρ2 )-functional inequality N (f (x + y) + f (x − y) − 2f (x) − 2f (y), t)     x − y   x + y + 2f − f (x) − f (y) , t , ≤ min N ρ1 2f 2 2   x + y   N ρ2 4f + f (x − y) − 2f (x) − 2f (y) , t 2

(0.1)

in fuzzy normed spaces, where ρ1 and ρ2 are fixed nonzero real numbers with |ρ11 | + 2|ρ12 | < 1, and f (0) = 0. Using the fixed point method, we prove the Hyers-Ulam stability of the quadratic (ρ1 , ρ2 )functional inequality (0.1) in fuzzy Banach spaces.

1. Introduction and preliminaries Katsaras [16] defined a fuzzy norm on a vector space to construct a fuzzy vector topological structure on the space. Some mathematicians have defined fuzzy norms on a vector space from various points of view [10, 20, 43]. In particular, Bag and Samanta [2], following Cheng and Mordeson [8], gave an idea of fuzzy norm in such a manner that the corresponding fuzzy metric is of Kramosil and Michalek type [19]. They established a decomposition theorem of a fuzzy norm into a family of crisp norms and investigated some properties of fuzzy normed spaces [3]. We use the definition of fuzzy normed spaces given in [2, 24, 25] to investigate the Hyers-Ulam stability of quadratic (ρ1 , ρ2 )-functional inequality in fuzzy Banach spaces. Definition 1.1. [2, 24, 25, 26] Let X be a real vector space. A function N : X × R → [0, 1] is called a fuzzy norm on X if for all x, y ∈ X and all s, t ∈ R, (N1 ) N (x, t) = 0 for t ≤ 0; (N2 ) x = 0 if and only if N (x, t) = 1 for all t > 0; t (N3 ) N (cx, t) = N (x, |c| ) if c 6= 0; (N4 ) N (x + y, s + t) ≥ min{N (x, s), N (y, t)}; (N5 ) N (x, ·) is a non-decreasing function of R and limt→∞ N (x, t) = 1. (N6 ) for x 6= 0, N (x, ·) is continuous on R. 2010 Mathematics Subject Classification. Primary 46S40, 39B52, 47H10, 39B62, 26E50, 47S40. Key words and phrases. fuzzy Banach space; quadratic (ρ1 , ρ2 )-functional inequality; fixed point method; Hyers-Ulam stability. ∗ Corresponding author.

1521

YOUNGHUN JO ET AL 1521-1529

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Y. JO, J. PARK, T. KIM, J. KIM AND C. PARK

The pair (X, N ) is called a fuzzy normed vector space. The properties of fuzzy normed vector spaces and examples of fuzzy norms are given in [23, 24]. Definition 1.2. [2, 24, 25, 26] Let (X, N ) be a fuzzy normed vector space. A sequence {xn } in X is said to be convergent or converge if there exists an x ∈ X such that limn→∞ N (xn − x, t) = 1 for all t > 0. In this case, x is called the limit of the sequence {xn } and we denote it by N -limn→∞ xn = x. Definition 1.3. [2, 24, 25, 26] Let (X, N ) be a fuzzy normed vector space. A sequence {xn } in X is called Cauchy if for each ε > 0 and each t > 0 there exists an n0 ∈ N such that for all n ≥ n0 and all p > 0, we have N (xn+p − xn , t) > 1 − ε. It is well-known that every convergent sequence in a fuzzy normed vector space is Cauchy. If each Cauchy sequence is convergent, then the fuzzy norm is said to be complete and the fuzzy normed vector space is called a fuzzy Banach space. We say that a mapping f : X → Y between fuzzy normed vector spaces X and Y is continuous at a point x0 ∈ X if for each sequence {xn } converging to x0 in X, then the sequence {f (xn )} converges to f (x0 ). If f : X → Y is continuous at each x ∈ X, then f : X → Y is said to be continuous on X (see [3]). The stability problem of functional equations originated from a question of Ulam [42] concerning the stability of group homomorphisms. Hyers [12] gave a first affirmative partial answer to the question of Ulam for Banach spaces. Hyers’ Theorem was generalized by Aoki [1] for additive mappings and by Th.M. Rassias [35] for linear mappings by considering an unbounded Cauchy difference. A generalization of the Th.M. Rassias theorem was obtained by G˘ avruta [11] by replacing the unbounded Cauchy difference by a general control function in the spirit of Th.M. Rassias’ approach. The stability problems of several functional equations have been extensively investigated by a number of authors and there are many interesting results concerning this problem (see [7, 13, 15, 17, 18, 21, 31, 32, 33, 36, 37, 38, 39, 40, 41]). Park [29, 30] defined additive ρ-functional inequalities and proved the Hyers-Ulam stability of the additive ρ-functional inequalities in Banach spaces and non-Archimedean Banach spaces. We recall a fundamental result in fixed point theory. Let X be a set. A function d : X × X → [0, ∞] is called a generalized metric on X if d satisfies (1) d(x, y) = 0 if and only if x = y; (2) d(x, y) = d(y, x) for all x, y ∈ X; (3) d(x, z) ≤ d(x, y) + d(y, z) for all x, y, z ∈ X. Theorem 1.4. [4, 9] Let (X, d) be a complete generalized metric space and let J : X → X be a strictly contractive mapping with Lipschitz constant L < 1. Then for each given element x ∈ X, either d(J n x, J n+1 x) = ∞

1522

YOUNGHUN JO ET AL 1521-1529

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

QUADRATIC (ρ1 , ρ2 )-FUNCTIONAL INEQUALITY IN FUZZY NORMED SPACES

for all nonnegative integers n or there exists a positive integer n0 such that (1) d(J n x, J n+1 x) < ∞, ∀n ≥ n0 ; n (2) the sequence {J x} converges to a fixed point y ∗ of J; (3) y ∗ is the unique fixed point of J in the set Y = {y ∈ X | d(J n0 x, y) < ∞}; 1 (4) d(y, y ∗ ) ≤ 1−L d(y, Jy) for all y ∈ Y . In 1996, G. Isac and Th.M. Rassias [14] were the first to provide applications of stability theory of functional equations for the proof of new fixed point theorems with applications. By using fixed point methods, the stability problems of several functional equations have been extensively investigated by a number of authors (see [5, 6, 23, 27, 28, 33, 34]). In Section 2, we solve the quadratic (ρ1 , ρ2 )-functional inequality (0.1) and prove the HyersUlam stability of the quadratic (ρ1 , ρ2 )-functional inequality (0.1) in fuzzy Banach spaces by using the fixed point method. Throughout this paper, assume that ρ1 and ρ2 are fixed nonzero real numbers with |ρ11 | + 2|ρ12 | < 1. 2. Quadratic (ρ1 , ρ2 )-functional inequality (0.1) In this section, we solve and investigate the quadratic (ρ1 , ρ2 )-functional inequality in fuzzy normed spaces. Lemma 2.1. Let X be a real vector space and (Y, N ) be a fuzzy normed vector space. If a mapping f : X → Y satisfies f (0) = 0 and N (f (x + y) + f (x − y) − 2f (x) − 2f (y), t)          x−y x+y + 2f − f (x) − f (y) , t , ≤ min N ρ1 2f 2 2       x+y + f (x − y) − 2f (x) − 2f (y) , t N ρ2 4f 2

(2.1)

for all x, y ∈ X and all t > 0. Then f is quadratic. Proof. Assume that f : X → Y satisfies (2.1). Letting y = 0 in (2.1), we get    x     x   1 ≤ min N ρ1 4f − f (x) , t , ρ2 4f − f (x) , t 2   2x    ≤ N (ρ1 + ρ2 ) 4f − f (x) , 2t 2 Thus x 1 f = f (x) 2 4 for all x ∈ X. Now we consider P : X → Y that

(2.2)

P (x, y) = f (x + y) + f (x − y) − 2f (x) − 2f (y)

1523

YOUNGHUN JO ET AL 1521-1529

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Y. JO, J. PARK, T. KIM, J. KIM AND C. PARK

and we consider α=

1 1 + . |ρ1 | 2|ρ2 |

It follows from (2.1) and (2.2) that  ρ   1 N (P (x, y), t) ≤ min N P (x, y), t , N (ρ2 P (x, y), t)  2    1 1 t t = min N ,N P (x, y), P (x, y), 2 |ρ1 | 2 2|ρ2 |     1 1 ≤ N P (x, y), t = N (P (x, y), αt) + |ρ1 | 2|ρ2 | for all t > 0. By (N5 ) and (N6 ), P (x, y) = f (x + y) + f (x − y) − 2f (x) − 2f (y) = 0 for all x, y ∈ X, since α < 1. So f : X → Y is quadratic.



We prove the Hyers-Ulam stability of the quadratic (ρ1 , ρ2 )-functional inequality (2.1) in fuzzy Banach spaces. Theorem 2.2. Let X be a real vector space and (Y, N ) be a fuzzy normed vector space. Let ϕ : X 2 → [0, ∞) be a function such that there exists an L < 1 with L ϕ(x, y) ≤ ϕ(2x, 2y) 4 for all x, y ∈ X. Let f : X → Y be a mapping satisfying f (0) = 0 and   t (2.3) min N (f (x + y) + f (x − y) − 2f (x) − 2f (y), t), t + ϕ(x, y)          x−y x+y + 2f − f (x) − f (y) , t , ≤ min N ρ1 2f 2 2       x+y N ρ2 4f + f (x − y) − 2f (x) − 2f (y) , t 2  for all x, y ∈ X and all t > 0. Then Q(x) := N − limn→∞ 4n f 2xn exists for each x ∈ X and defines a quadratic mapping C : X → Y such that N (f (x) − Q(x), t) ≥ for all x ∈ X and all t > 0 while β =

1 |ρ1 |

+

(2 − 2L)t (2 − 2L)t + βϕ(x, 0)

(2.4)

1 |ρ2 | .

Proof. Letting y = 0 in (2.3), we get    x     x   t ≤ min N ρ1 4f − f (x) , t , N ρ2 4f − f (x) , t t + ϕ(x, 0) 2 2       x 1 1 t ≤ N 4f + − f (x), 2 |ρ1 | |ρ2 | 2  x β  = N f (x) − 4f , t 2 2

1524

(2.5)

YOUNGHUN JO ET AL 1521-1529

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

QUADRATIC (ρ1 , ρ2 )-FUNCTIONAL INEQUALITY IN FUZZY NORMED SPACES

Consider the set S := {g : X → Y } and introduce the generalized metric on S:  d(g, h) = inf µ ∈ R+ : N (g(x) − h(x), µt) ≥

 t , ∀x ∈ X, ∀t > 0 , t + ϕ(x, 0)

where, as usual, inf φ = +∞. It is easy to show that (S, d) is complete (see [22, Lemma 2.1]). Now we consider the linear mapping J : S → S such that x Jg(x) := 4g 2 for all x ∈ X. Let g, h ∈ S be given such that d(g, h) = ε. Then t N (g(x) − h(x), εt) ≥ t + ϕ(x, 0) for all x ∈ X and all t > 0. Hence    x   x  Lt   x x − 4h , Lt = N g −h , N (Jg(x) − Jh(x), Lt) = N 4g 2 2 2 2 4 ≥

Lt 4 Lt 4



x 2,0

≥

Lt 4

+

Lt 4 L 4 ϕ(x, 0)

=

t t + ϕ(x, 0)

for all x ∈ X and all t > 0. So d(g, h) = ε implies that d(Jg, Jh) ≤ Lε. This means that d(Jg, Jh) ≤ Ld(g, h) for all g, h ∈ S. It follows from (2.5) that  x β  t , t ≥ N f (x) − 4f 2 2 t + ϕ(x, 0) for all x ∈ X and all t > 0. So d(f, Jf ) ≤ β2 . By Theorem 1.4, there exists a mapping Q : X → Y satisfying the following: (1) Q is a fixed point of J, i.e., x 1 Q = Q(x) 2 4 for all x ∈ X. The mapping Q is a unique fixed point of J in the set

(2.6)

M = {g ∈ S : d(f, g) < ∞}. This implies that Q is a unique mapping satisfying (2.6) such that there exists a µ ∈ (0, ∞) satisfying t N (f (x) − Q(x), µt) ≥ t + ϕ(x, 0) for all x ∈ X; (2) d(J n f, Q) → 0 as n → ∞. This implies the equality x N - lim 4n f n = Q(x) n→∞ 2

1525

YOUNGHUN JO ET AL 1521-1529

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Y. JO, J. PARK, T. KIM, J. KIM AND C. PARK

for all x ∈ X; (3) d(f, Q) ≤

1 1−L d(f, Jf ),

which implies the inequality d(f, Q) ≤

β . 2 − 2L

This implies that the inequality (2.4) holds. By (2.3), !        x  y  x − y t x + y  +f − f n − 2f n , 4n t , min N 4n f 2n 2n 2 2 t + ϕ 2xn , 2yn         x  y  x+y x−y n ≤ min N 4n ρ1 2f + 2f − f , 4 t , − f 2n+1 2n+1 2n 2n        x  y  x+y x−y n n +f − 2f n − 2f n ,4 t N 4 ρ2 4f 2n+1 2n 2 2 for all x, y ∈ X, all t > 0 and all n ∈ N. So !       t x  y   x + y x − y 4n min N 4n f +f − f n − 2f n ,t , t Ln 2n 2n 2 2 + 4n 4n ϕ (x, y)          x y x+y x−y n ≤ min N 4 ρ1 2f + 2f −f n −f n ,t , 2n+1 2n+1 2 2         x y x−y x+y n N 4 ρ2 4f ,t +f − 2f n − 2f n 2n+1 2n 2 2 Since limn→∞

t 4n t Ln + 4n ϕ(x,y) 4n

= 1 for all x, y ∈ X and all t > 0,

N (Q(x + y) + Q(x − y) − 2Q(x) − 2Q(y), t)          x+y x−y ≤ min N ρ1 2Q + 2Q − Q(x) − Q(y) , t , 2 2       x+y N ρ2 4Q + Q(x − y) − 2Q(x) − 2Q(y) , t 2 for all x, y ∈ X and all t > 0. By Lemma 2.1, the mapping Q : X → Y is quadratic, as desired.  Corollary 2.3. Let θ ≥ 0 and let p be a real number with p > 2. Let X be a normed vector space with norm k · k and (Y, N ) be a fuzzy normed vector space. Let f : X → Y be a mapping satisfying f (0) = 0 and   t min N (f (x + y) + f (x − y) − 2f (x) − 2f (y), t), (2.7) t + θ(kxkp + kykp )          x+y x−y ≤ min N ρ1 2f + 2f − f (x) − f (y) , t , 2 2       x+y N ρ2 4f + f (x − y) − 2f (x) − 2f (y) , t 2

1526

YOUNGHUN JO ET AL 1521-1529

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

QUADRATIC (ρ1 , ρ2 )-FUNCTIONAL INEQUALITY IN FUZZY NORMED SPACES

for all x, y ∈ X and all t > 0. Then Q(x) := N -limn→∞ 4n f ( 2xn ) exists for each x ∈ X and defines a quadratic mapping Q : X → Y such that 2(2p − 4)t N (f (x) − Q(x), t) ≥ 2(2p − 4)t + βθk2xkp for all x ∈ X and all t > 0 while β =

1 |ρ1 |

+

1 |ρ2 | .

Proof. The proof follows from Theorem 2.2 by taking ϕ(x, y) := θ(kxkp + kykp ) for all x, y ∈ X. Then we can choose L = 22−p , and we get the desired result.  Theorem 2.4. Let X be a real vector space and (Y, N ) be a fuzzy normed vector space. Let ϕ : X 2 → [0, ∞) be a function such that there exists an L < 1 with x y  ϕ(x, y) ≤ 4Lϕ , 2 2 for all x, y ∈ X. Let f : X → Y be a mapping satisfying (2.3). Then Q(x) := N -limn→∞ 41n f (2n x) exists for each x ∈ X and defines a quadratic mapping Q : X → Y such that (8 − 8L)t N (f (x) − Q(x), t) ≥ (2.8) (8 − 8L)t + βϕ(x, 0) for all x ∈ X and all t > 0. Proof. Let (S, d) be the generalized metric space defined in the proof of Theorem 2.2. It follows from (2.5) that   1 β t N f (x) − f (2x) , t ≥ 4 8 t + ϕ(x, 0) for all x ∈ X and all t > 0. Now we consider the linear mapping J : S → S such that 1 Jg(x) := g (2x) 4 β for all x ∈ X. Then d(f, Jf ) ≤ 8 . Hence d(f, Q) ≤

β , 8 − 8L

which implies that the inequality (2.8) holds. The rest of the proof is similar to the proof of Theorem 2.2.



Corollary 2.5. Let θ ≥ 0 and let p be a real number with 0 < p < 2. Let X be a normed vector space with norm k · k and (Y, N ) be a fuzzy normed vector space. Let f : X → Y be a mapping satisfying (2.7). Then Q(x) := N -limn→∞ 41n f (2n x) exists for each x ∈ X and defines a quadratic mapping Q : X → Y such that 2(4 − 2p )t N (f (x) − Q(x), t) ≥ 2(4 − 2p )t + βθkxkp for all x ∈ X and all t > 0 while β =

1 |ρ1 |

+

1 |ρ2 | .

Proof. The proof follows from Theorem 2.4 by taking ϕ(x, y) := θ(kxkp + kykp ) for all x, y ∈ X. Then we can choose L = 2p−2 , and we get the desired result. 

1527

YOUNGHUN JO ET AL 1521-1529

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

Y. JO, J. PARK, T. KIM, J. KIM AND C. PARK

Acknowledgments This work was supported by the Seoul Science High School R&E Program in 2017. C. Park was supported by Basic Science Research Program through the National Research Foundation of Korea funded by the Ministry of Education, Science and Technology (NRF-2017R1D1A1B04032937). References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27]

T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan 2 (1950), 64–66. T. Bag and S.K. Samanta, Finite dimensional fuzzy normed linear spaces, J. Fuzzy Math. 11 (2003), 687–705. T. Bag and S.K. Samanta, Fuzzy bounded linear operators, Fuzzy Sets Syst. 151 (2005), 513–547. L. C˘ adariu and V. Radu, Fixed points and the stability of Jensen’s functional equation, J. Inequal. Pure Appl. Math. 4, no. 1, Art. ID 4 (2003). L. C˘ adariu and V. Radu, On the stability of the Cauchy functional equation: a fixed point approach, Grazer Math. Ber. 346 (2004), 43–52. L. C˘ adariu and V. Radu, Fixed point methods for the generalized stability of functional equations in a single variable, Fixed Point Theory Appl. 2008, Art. ID 749392 (2008). I. Chang and Y. Lee, Additive and quadratic type functional equation and its fuzzy stability, Results Math. 63 (2013), 717–730. S.C. Cheng and J.M. Mordeson, Fuzzy linear operators and fuzzy normed linear spaces, Bull. Calcutta Math. Soc. 86 (1994), 429–436. J. Diaz and B. Margolis, A fixed point theorem of the alternative for contractions on a generalized complete metric space, Bull. Amer. Math. Soc. 74 (1968), 305–309. C. Felbin, Finite dimensional fuzzy normed linear spaces, Fuzzy Sets Syst. 48 (1992), 239–248. P. G˘ avruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings, J. Math. Anal. Appl. 184 (1994), 431–436. D.H. Hyers, On the stability of the linear functional equation, Proc. Nat. Acad. Sci. U.S.A. 27 (1941), 222–224. D.H. Hyers, G. Isac and Th.M. Rassias, Stability of Functional Equations in Several Variables, Birkh¨ auser, Basel, 1998. G. Isac and Th.M. Rassias, Stability of ψ-additive mappings: Appications to nonlinear analysis, Internat. J. Math. Math. Sci. 19 (1996), 219–228. S. Jung, Hyers-Ulam-Rassias Stability of Functional Equations in Mathematical Analysis, Hadronic Press lnc., Palm Harbor, Florida, 2001. A.K. Katsaras, Fuzzy topological vector spaces II, Fuzzy Sets Syst. 12 (1984), 143–154. H. Kim, M. Eshaghi Gordji, A. Javadian and I. Chang, Homomorphisms and derivations on unital C ∗ -algebras related to Cauchy-Jensen functional inequality, J. Math. Inequal. 6 (2012), 557–565. H. Kim, J. Lee and E. Son, Approximate functional inequalities by additive mappings, J. Math. Inequal. 6 (2012), 461–471. I. Kramosil and J. Michalek, Fuzzy metric and statistical metric spaces, Kybernetica 11 (1975), 326–334. S.V. Krishna and K.K.M. Sarma, Separation of fuzzy normed linear spaces, Fuzzy Sets Syst. 63 (1994), 207–217. J. Lee, C. Park and D. Shin, An AQCQ-functional equation in matrix normed spaces, Results Math. 27 (2013), 305–318. D. Mihet¸ and V. Radu, On the stability of the additive Cauchy functional equation in random normed spaces, J. Math. Anal. Appl. 343 (2008), 567–572. M. Mirzavaziri and M.S. Moslehian, A fixed point approach to stability of a quadratic equation, Bull. Braz. Math. Soc. 37 (2006), 361–376. A.K. Mirmostafaee, M. Mirzavaziri and M.S. Moslehian, Fuzzy stability of the Jensen functional equation, Fuzzy Sets Syst. 159 (2008), 730–738. A.K. Mirmostafaee and M.S. Moslehian, Fuzzy versions of Hyers-Ulam-Rassias theorem, Fuzzy Sets Syst. 159 (2008), 720–729. A.K. Mirmostafaee and M.S. Moslehian, Fuzzy approximately cubic mappings, Inform. Sci. 178 (2008), 3791– 3798. C. Park, Fixed points and Hyers-Ulam-Rassias stability of Cauchy-Jensen functional equations in Banach algebras, Fixed Point Theory Appl. 2007, Art. ID 50175 (2007).

1528

YOUNGHUN JO ET AL 1521-1529

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO.8, 2019, COPYRIGHT 2019 EUDOXUS PRESS, LLC

QUADRATIC (ρ1 , ρ2 )-FUNCTIONAL INEQUALITY IN FUZZY NORMED SPACES

[28] C. Park, Generalized Hyers-Ulam-Rassias stability of quadratic functional equations: a fixed point approach, Fixed Point Theory Appl. 2008, Art. ID 493751 (2008). [29] C. Park, Additive ρ-functional inequalities and equations, J. Math. Inequal. 9 (2015), 17–26. [30] C. Park, Additive ρ-functional inequalities in non-Archimedean normed spaces, J. Math. Inequal. 9 (2015), 397–407. [31] C. Park, K. Ghasemi, S. G. Ghaleh and S. Jang, Approximate n-Jordan ∗-homomorphisms in C ∗ -algebras, J. Comput. Anal. Appl. 15 (2013), 365-368. [32] C. Park, A. Najati and S. Jang, Fixed points and fuzzy stability of an additive-quadratic functional equation, J. Comput. Anal. Appl. 15 (2013), 452–462. [33] C. Park and Th.M. Rassias, Fixed points and generalized Hyers-Ulam stability of quadratic functional equations, J. Math. Inequal. 1 (2007), 515–528. [34] V. Radu, The fixed point alternative and the stability of functional equations, Fixed Point Theory 4 (2003), 91–96. [35] Th.M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 (1978), 297–300. ˇ ankov´ [36] L. Reich, J. Sm´ıtal and M. Stef´ a, Singular solutions of the generalized Dhombres functional equation, Results Math. 65 (2014), 251–261. [37] S. Schin, D. Ki, J. Chang and M. Kim, Random stability of quadratic functional equations: a fixed point approach, J. Nonlinear Sci. Appl. 4 (2011), 37–49. [38] S. Shagholi, M. Bavand Savadkouhi and M. Eshaghi Gordji, Nearly ternary cubic homomorphism in ternary Fr´echet algebras, J. Comput. Anal. Appl. 13 (2011), 1106–1114. [39] S. Shagholi, M. Eshaghi Gordji and M. Bavand Savadkouhi, Stability of ternary quadratic derivation on ternary Banach algebras, J. Comput. Anal. Appl. 13 (2011), 1097–1105. [40] D. Shin, C. Park and Sh. Farhadabadi, On the superstability of ternary Jordan C ∗ -homomorphisms, J. Comput. Anal. Appl. 16 (2014), 964–973. [41] D. Shin, C. Park and Sh. Farhadabadi, Stability and superstability of J ∗ -homomorphisms and J ∗ -derivations for a generalized Cauchy-Jensen equation, J. Comput. Anal. Appl. 17 (2014), 125–134. [42] S. M. Ulam, A Collection of the Mathematical Problems, Interscience Publ. New York, 1960. [43] J.Z. Xiao and X.H. Zhu, Fuzzy normed spaces of operators and its completeness, Fuzzy Sets Syst. 133 (2003), 389–399. Younghun Jo, Junha Park, Taekseung Kim, Jaemin Kim Mathematics Branch, Seoul Science High School, Seoul 03066, Korea E-mail address: [email protected]; [email protected]; [email protected]; [email protected] Choonkil Park Research Institute for Natural Sciences, Hanyang University, Seoul 04763, Korea E-mail address: [email protected]

1529

YOUNGHUN JO ET AL 1521-1529

1530

1531

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 26, NO. 8, 2019

Existence and global attractiveness of pseudo almost periodic solutions to impulsive partial stochastic neutral functional differential equations, Zuomao Yan and Fangxia Lu,…1343 Fourier series of functions associated with poly-Genocchi polynomials, Taekyun Kim, Dae San Kim, Dmitry V. Dolgy, and Jin-Woo Park,……………………………………………1387 Tracy-Singh Products and Classes of Operators, Arnon Ploymukda, Pattrawut Chansangiam, Wicharn Lewkeeratiyutkul,…………………………………………………………….1401 On unicity theorems of difference of entire or meromorphic functions, Yong Liu,….1414 On the existence and behavior of the solutions for some difference equations systems, M. M. ElDessoky and Aatef Hobiny,………………………………………………………….1428 Applications of soft sets to BCC-ideals in BCC-algebras, Sun Shin Ahn,………….1440 Fixed point theorems for various contraction conditions in digital metric spaces, Choonkil Park, Ozgur Ege, Sanjay Kumar, Deepak Jain, and Jung Rye Lee,……………………….1451 Fixed points of Ćirić type ordered F-contractions on partial metric spaces, Muhammad Nazam, Muhammad Arshad, Choonkil Park, and Sungsik Yun,…………………………….1459 The Theoretical Analysis of 𝑙𝑙1-TV Compressive Sensing Model for MRI Image Reconstruction, Xiaoman Liu,………………………………………………………………………..1471 On Fibonacci Z-sequences and their logarithm functions, Hee Sik Kim, J. Neggers, and Keum Sook So,………………………………………………………………………………1479 Hermite-Hadamard type fractional integral inequalities for 𝑀𝑀𝑇𝑇(𝑟𝑟;𝑔𝑔,𝑚𝑚,𝜑𝜑) -preinvex functions, Muhammad Adil Khan, Yu-Ming Chu, Artion Kashuri, and Rozana Liko,………….1487 Umbral calculus approach to degenerate poly-Genocchi polynomials, Taekyun Kim, Dae San Kim, Lee Chae Jang, and Gwan-Woo Jang,………………………………………….1504 Quadratic (𝜌𝜌1 , 𝜌𝜌2 )-functional inequality in fuzzy normed spaces, Younghun Jo, Junha Park, Taekseung Kim, Jaemin Kim, and Choonkil Park,……………………………………1521