Upload
others
View
6
Download
0
Embed Size (px)
Citation preview
Volume 18, Number 5 May 2015 ISSN:1521-1398 PRINT,1572-9206 ONLINE
Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC
Journal of Computational Analysis and Applications ISSNno.’s:1521-1398 PRINT,1572-9206 ONLINE SCOPE OF THE JOURNAL An international publication of Eudoxus Press, LLC (twelve times annually) Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152-3240, U.S.A [email protected] http://www.msci.memphis.edu/~ganastss/jocaaa The main purpose of "J.Computational Analysis and Applications" is to publish high quality research articles from all subareas of Computational Mathematical Analysis and its many potential applications and connections to other areas of Mathematical Sciences. Any paper whose approach and proofs are computational,using methods from Mathematical Analysis in the broadest sense is suitable and welcome for consideration in our journal, except from Applied Numerical Analysis articles. Also plain word articles without formulas and proofs are excluded. The list of possibly connected mathematical areas with this publication includes, but is not restricted to: Applied Analysis, Applied Functional Analysis, Approximation Theory, Asymptotic Analysis, Difference Equations, Differential Equations, Partial Differential Equations, Fourier Analysis, Fractals, Fuzzy Sets, Harmonic Analysis, Inequalities, Integral Equations, Measure Theory, Moment Theory, Neural Networks, Numerical Functional Analysis, Potential Theory, Probability Theory, Real and Complex Analysis, Signal Analysis, Special Functions, Splines, Stochastic Analysis, Stochastic Processes, Summability, Tomography, Wavelets, any combination of the above, e.t.c. "J.Computational Analysis and Applications" is a peer-reviewed Journal. See the instructions for preparation and submission of articles to JoCAAA. Assistant to the Editor: Dr.Razvan Mezei,Lenoir-Rhyne University,Hickory,NC 28601, USA. Journal of Computational Analysis and Applications(JoCAAA) is published by EUDOXUS PRESS,LLC,1424 Beaver Trail Drive,Cordova,TN38016,USA,[email protected] http//:www.eudoxuspress.com. Annual Subscription Prices:For USA and Canada,Institutional:Print $650, Electronic OPEN ACCESS. Individual:Print $300. For any other part of the world add $100 more(postages) to the above prices for Print. No credit card payments. Copyright©2015 by Eudoxus Press,LLC,all rights reserved.JoCAAA is printed in USA. JoCAAA is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH. It is strictly prohibited the reproduction and transmission of any part of JoCAAA and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes no responsibility for the content of published papers.
754
Editorial Board
Associate Editors of Journal of Computational Analysis and Applications
1) George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152,U.S.A Tel.901-678-3144 e-mail: [email protected] Approximation Theory,Real Analysis, Wavelets, Neural Networks,Probability, Inequalities. 2) J. Marshall Ash Department of Mathematics De Paul University 2219 North Kenmore Ave. Chicago,IL 60614-3504 773-325-4216 e-mail: [email protected] Real and Harmonic Analysis 3) Mark J.Balas Department Head and Professor Electrical and Computer Engineering Dept. College of Engineering University of Wyoming 1000 E. University Ave. Laramie, WY 82071 307-766-5599 e-mail: [email protected] Control Theory,Nonlinear Systems, Neural Networks,Ordinary and Partial Differential Equations, Functional Analysis and Operator Theory
4) Dumitru Baleanu Cankaya University, Faculty of Art and Sciences, Department of Mathematics and Computer Sciences, 06530 Balgat, Ankara, Turkey, [email protected] Fractional Differential Equations Nonlinear Analysis, Fractional Dynamics
5) Carlo Bardaro Dipartimento di Matematica e Informatica
20)Margareta Heilmann Faculty of Mathematics and Natural Sciences University of Wuppertal Gaußstraße 20 D-42119 Wuppertal, Germany, [email protected] wuppertal.de Approximation Theory (Positive Linear Operators) 21) Christian Houdre School of Mathematics Georgia Institute of Technology Atlanta,Georgia 30332 404-894-4398 e-mail: [email protected] Probability, Mathematical Statistics, Wavelets 22) Irena Lasiecka Department of Mathematical Sciences University of Memphis Memphis, TN 38152 P.D.E, Control Theory, Functional Analysis, [email protected]
23) Burkhard Lenze Fachbereich Informatik Fachhochschule Dortmund University of Applied Sciences Postfach 105018 D-44047 Dortmund, Germany e-mail: [email protected] Real Networks, Fourier Analysis,Approximation Theory 24) Hrushikesh N.Mhaskar Department Of Mathematics California State University Los Angeles,CA 90032 626-914-7002 e-mail: [email protected] Orthogonal Polynomials, Approximation Theory,Splines, Wavelets, Neural Networks
755
Universita di Perugia Via Vanvitelli 1 06123 Perugia, ITALY TEL+390755853822 +390755855034 FAX+390755855024 E-mail [email protected] Web site: http://www.unipg.it/~bardaro/ Functional Analysis and Approximation Theory, Signal Analysis, Measure Theory, Real Analysis. 6) Martin Bohner Department of Mathematics and Statistics Missouri S&T Rolla, MO 65409-0020, USA [email protected] web.mst.edu/~bohner Difference equations, differential equations, dynamic equations on time scale, applications in economics, finance, biology. 7) Jerry L.Bona Department of Mathematics The University of Illinois at Chicago 851 S. Morgan St. CS 249 Chicago, IL 60601 e-mail:[email protected] Partial Differential Equations, Fluid Dynamics 8) Luis A.Caffarelli Department of Mathematics The University of Texas at Austin Austin,Texas 78712-1082 512-471-3160 e-mail: [email protected] Partial Differential Equations 9) George Cybenko Thayer School of Engineering Dartmouth College 8000 Cummings Hall, Hanover,NH 03755-8000 603-646-3843 (X 3546 Secr.) e-mail: [email protected] Approximation Theory and Neural Networks 10) Ding-Xuan Zhou Department Of Mathematics City University of Hong Kong
25) M.Zuhair Nashed Department Of Mathematics University of Central Florida PO Box 161364 Orlando, FL 32816-1364 e-mail: [email protected] Inverse and Ill-Posed problems, Numerical Functional Analysis, Integral Equations,Optimization, Signal Analysis 26) Mubenga N.Nkashama Department OF Mathematics University of Alabama at Birmingham Birmingham, AL 35294-1170 205-934-2154 e-mail: [email protected] Ordinary Differential Equations, Partial Differential Equations 27)Svetlozar (Zari) Rachev, Professor of Finance, College of Business,and Director of Quantitative Finance Program, Department of Applied Mathematics & Statistics Stonybrook University 312 Harriman Hall, Stony Brook, NY 11794-3775 Phone: +1-631-632-1998, Email : [email protected] 28) Alexander G. Ramm Mathematics Department Kansas State University Manhattan, KS 66506-2602 e-mail: [email protected] Inverse and Ill-posed Problems, Scattering Theory, Operator Theory, Theoretical Numerical Analysis, Wave Propagation, Signal Processing and Tomography 29) Ervin Y.Rodin Department of Systems Science and Applied Mathematics Washington University,Campus Box 1040 One Brookings Dr.,St.Louis,MO 63130- 4899 314-935-6007 e-mail: [email protected] Systems Theory, Semantic Control, Partial Differential Equations, Calculus of Variations, Optimization
756
83 Tat Chee Avenue Kowloon,Hong Kong 852-2788 9708,Fax:852-2788 8561 e-mail: [email protected] Approximation Theory, Spline functions,Wavelets 11) Sever S.Dragomir School of Computer Science and Mathematics, Victoria University, PO Box 14428, Melbourne City, MC 8001,AUSTRALIA Tel. +61 3 9688 4437 Fax +61 3 9688 4050 [email protected] Inequalities,Functional Analysis, Numerical Analysis, Approximations, Information Theory, Stochastics. 12) Oktay Duman TOBB University of Economics and Technology, Department of Mathematics, TR-06530, Ankara, Turkey, [email protected] Classical Approximation Theory, Summability Theory, Statistical Convergence and its Applications 13) Saber N.Elaydi Department Of Mathematics Trinity University 715 Stadium Dr. San Antonio,TX 78212-7200 210-736-8246 e-mail: [email protected] Ordinary Differential Equations, Difference Equations 14) Augustine O.Esogbue School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta,GA 30332 404-894-2323 e-mail: [email protected] Control Theory,Fuzzy sets, Mathematical Programming, Dynamic Programming,Optimization 15) Christodoulos A.Floudas Department of Chemical Engineering Princeton University
and Artificial Intelligence, Operations Research, Math.Programming 30) T. E. Simos Department of Computer Science and Technology Faculty of Sciences and Technology University of Peloponnese GR-221 00 Tripolis, Greece Postal Address: 26 Menelaou St. Anfithea - Paleon Faliron GR-175 64 Athens, Greece [email protected] Numerical Analysis 31) I. P. Stavroulakis Department of Mathematics University of Ioannina 451-10 Ioannina, Greece [email protected] Differential Equations Phone +3 0651098283 32) Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock,Germany [email protected] rostock.de Numerical Fourier Analysis, Fourier Analysis,Harmonic Analysis, Signal Analysis, Spectral Methods, Wavelets, Splines, Approximation Theory 33) Roberto Triggiani Department of Mathematical Sciences University of Memphis Memphis, TN 38152 P.D.E, Control Theory, Functional Analysis, [email protected]
34) Gilbert G.Walter Department Of Mathematical Sciences University of Wisconsin-Milwaukee,Box 413, Milwaukee,WI 53201-0413 414-229-5077 e-mail: [email protected] Distribution Functions, Generalised Functions, Wavelets 35) Xin-long Zhou Fachbereich Mathematik, Fachgebiet Informatik Gerhard-Mercator-Universitat Duisburg
757
Princeton,NJ 08544-5263 609-258-4595(x4619 assistant) e-mail: [email protected] OptimizationTheory&Applications, Global Optimization 16) J.A.Goldstein Department of Mathematical Sciences The University of Memphis Memphis,TN 38152 901-678-3130 e-mail:[email protected] Partial Differential Equations, Semigroups of Operators 17) H.H.Gonska Department of Mathematics University of Duisburg Duisburg, D-47048 Germany 011-49-203-379-3542 e-mail:[email protected] duisburg.de Approximation Theory, Computer Aided Geometric Design 18) John R. Graef Department of Mathematics University of Tennessee at Chattanooga Chattanooga, TN 37304 USA [email protected] Ordinary and functional differential equations, difference equations, impulsive systems, differential inclusions, dynamic equations on time scales , control theory and their applications 19) Weimin Han Department of Mathematics University of Iowa Iowa City, IA 52242-1419 319-335-0770 e-mail: [email protected] Numerical analysis, Finite element method, Numerical PDE, Variational inequalities, Computational mechanics NEW MEMBERS 39)Xing-Biao Hu Institute of Computational Mathematics AMSS, Chinese Academy of Sciences Beijing, 100190, CHINA [email protected] Computational Mathematics
Lotharstr.65,D-47048 Duisburg,Germany e-mail:[email protected] duisburg.de Fourier Analysis,Computer-Aided Geometric Design, Computational Complexity, Multivariate Approximation Theory, Approximation and Interpolation Theory 36) Xiang Ming Yu Department of Mathematical Sciences Southwest Missouri State University Springfield,MO 65804-0094 417-836-5931 e-mail: [email protected] Classical Approximation Theory, Wavelets 37) Lotfi A. Zadeh Professor in the Graduate School and Director, Computer Initiative, Soft Computing (BISC) Computer Science Division University of California at Berkeley Berkeley, CA 94720 Office: 510-642-4959 Sec: 510-642-8271 Home: 510-526-2569 FAX: 510-642-1712 e-mail: [email protected] Fuzzyness, Artificial Intelligence, Natural language processing, Fuzzy logic 38) Ahmed I. Zayed Department Of Mathematical Sciences DePaul University 2320 N. Kenmore Ave. Chicago, IL 60614-3250 773-325-7808 e-mail: [email protected] Shannon sampling theory, Harmonic analysis and wavelets, Special functions and orthogonal polynomials, Integral transforms 40) Choonkil Park Department of Mathematics Hanyang University Seoul 133-791 S.Korea, [email protected] Functional Equations
758
Instructions to Contributors
Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC, of TN.
Editor in Chief: George Anastassiou
Department of Mathematical Sciences University of Memphis
Memphis, TN 38152-3240, U.S.A.
1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves. 2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.
759
4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corollaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,
760
name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990). Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986. Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495. 11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears. 15. This journal will consider for publication only papers that contain proofs for their listed results.
761
An umbral calculus approach to poly-Cauchypolynomials with a q parameter
Dae San KimDepartment of Mathematics, Sogang University
Seoul 121-741, Republic of [email protected]
Taekyun KimDepartment of Mathematics, Kwangwoon University
Seoul 139-701, Republic of [email protected]
Takao Komatsu ∗
Graduate School of Science and Technology, Hirosaki UniversityHirosaki 036-8561, Japan
Jong-Jin SeoDepartment of Applied Mathematics, Pukyong National University
Pusan 608-739, Republic of [email protected]
MR Subject Classifications: 05A15, 05A40, 11B68, 11B75, 65Q05
Abstract
In this paper, we investigate the properties of the poly-Cauchy polynomialswith a q parameter which were studied by the third named author, and give vari-ous identities with Bernoulli polynomials, Korobov polynomials, Stirling numbers,Frobenius-Euler polynomials, falling and rising factorials by an umbral calculus ap-proach.
∗The third author was supported in part by the Grant-in-Aid for Scientific research (C) (No.22540005),the Japan Society for the Promotion of Science.
1
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
762 Dae San Kim et al 762-792
1 Introduction
Let n, k be integers with n ≥ 0, and let q be a real number with q 6= 0. The poly-Cauchynumbers with a q parameter of the first kind c
(k)n,q and of the second kind c
(k)n,q are defined
by
c(k)n,q(z) =
∫ 1
0
. . .
∫ 1
0︸ ︷︷ ︸k
(x1x2 . . . xk − z)(x1x2 . . . xk − q − z)
. . . (x1x2 . . . xk − (n − 1)q − z)dx1dx2 . . . dxk
and
c(k)n,q(z) =
∫ 1
0
. . .
∫ 1
0︸ ︷︷ ︸k
(−x1x2 . . . xk + z)(−x1x2 . . . xk − q + z)
. . . (−x1x2 . . . xk − (n − 1)q + z)dx1dx2 . . . dxk ,
respectively ([9]). The generating function of the poly-Cauchy polynomials with a q
parameter of the first kind c(k)n,q(z) and of the second kind c
(k)n,q(z) are given by
(1 + qt)−z/qLifk
(ln(1 + qt)
q
)=
∞∑n=0
c(k)n,q(z)
tn
n!,
and
(1 + qt)z/qLifk
(− ln(1 + qt)
q
)=
∞∑n=0
c(k)n,q(z)
tn
n!,
respectively ([9, Theorem 6]), where
Lifk(z) :=∞∑
m=0
zm
m!(m + 1)k
is the polylogarithm factorial function (or simply polyfactorial function), which is intro-
duced in [8, 9]. If q = 1, then c(k)n,1(z) = c
(k)n (z) and c
(k)n,1(z) = c
(k)n (z) are the poly-Cauchy
polynomials of the first kind and of the second kind, respectively ([2]). Notice that z is
replaced by −z in [2]. If q = 1 and z = 0, then c(k)n,1(0) = c
(k)n and c
(k)n,1(0) = c
(k)n are
the poly-Cauchy numbers of the first kind and of the second kind, respectively ([8]). If
q = k = 1 and z = 0, then c(1)n,1(0) = cn and c
(1)n,1(0) = cn are the classical Cauchy numbers
of the first kind and of the second kind, respectively (see e.g. [1, 15]). The concept aboutthe poly-Cauchy numbers and polynomials have been introduced, and the characteristicand combinatorial properties have been investigated ([2, 8, 9, 10, 11, 12, 13]).
The falling factorial is defined by
(x)n = x(x − 1) · · · (x − n + 1) =n∑
l=0
s(n, l)xl ,
2
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
763 Dae San Kim et al 762-792
where s(n, l) is the signed Stirling number of the first kind. The rising factorial is definedby
(x)(n) = x(x + 1) · · · (x + n − 1) =n∑
l=0
(−1)n−ls(n, l)xl .
Recently, the method of umbral calculus has been introduced to yield various identitiesin the study of poly-Cauchy numbers ([6, ?]) as well as that of poly-Bernoulli polynomials([5]). In this paper, we investigate the properties of the poly-Cauchy polynomials with aq parameter of the first kind and of the second kind with umbral calculus viewpoint, givevarious identities with Bernoulli polynomials, Korobov polynomials, Stirling numbers,Frobenius-Euler polynomials, falling and rising factorials.
2 Umbral calculus
Let C be the complex number field and let F be the set of all formal power series in thevariable t:
F =
f(t) =
∞∑k=0
ak
k!tk
∣∣∣∣∣ak ∈ C
. (1)
Let P = C[x] and let P∗ be the vector space of all linear functionals on P. 〈L|p(x)〉 isthe action of the linear functional L on the polynomial p(x), and we recall that the vectorspace operations on P∗ are defined by 〈L + M |p(x)〉 = 〈L|p(x)〉 + 〈M |p(x)〉, 〈cL|p(x)〉 =c 〈L|p(x)〉, where c is a complex constant in C. For f(t) ∈ F , let us define the linearfunctional on P by setting
〈f(t)|xn〉 = an, (n ≥ 0). (2)
In particular, ⟨tk|xn
⟩= n!δn,k (n, k ≥ 0), (3)
where δn,k is the Kronecker’s symbol.
For fL(t) =∑∞
k=0
〈L|xk〉k!
tk, we have 〈fL(t)|xn〉 = 〈L|xn〉. That is, L = fL(t). The mapL 7→ fL(t) is a vector space isomorphism from P∗ onto F . Henceforth, F denotes boththe algebra of formal power series in t and the vector space of all linear functionals onP, and so an element f(t) of F will be thought of as both a formal power series and alinear functional. We call F the umbral algebra and the umbral calculus is the study ofumbral algebra. The order O
(f(t)
)of a power series f(t)(6= 0) is the smallest integer k
for which the coefficient of tk does not vanish. If O(f(t)
)= 1, then f(t) is called a delta
series; if O(f(t)
)= 0, then f(t) is called an invertible series. For f(t), g(t) ∈ F with
O(f(t)
)= 1 and O
(g(t)
)= 0, there exists a unique sequence sn(x) (deg sn(x) = n) such
that⟨g(t)f(t)k|sn(x)
⟩= n!δn,k for n, k ≥ 0. Such a sequence sn(x) is called the Sheffer
sequence for(g(t), f(t)
)which is denoted by sn(x) ∼
(g(t), f(t)
).
For f(t), g(t) ∈ F and p(x) ∈ P, we have
〈f(t)g(t)|p(x)〉 = 〈f(t)|g(t)p(x)〉 = 〈g(t)|f(t)p(x)〉 (4)
3
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
764 Dae San Kim et al 762-792
and
f(t) =∞∑
k=0
⟨f(t)|xk
⟩ tk
k!, p(x) =
∞∑k=0
⟨tk|p(x)
⟩ xk
k!(5)
([16, Theorem 2.2.5]). Thus, by (5), we get
tkp(x) = p(k)(x) =dkp(x)
dxkand eytp(x) = p(x + y). (6)
Sheffer sequences are characterized in the generating function ([16, Theorem 2.3.4]).
Lemma 1 The sequence sn(x) is Sheffer for(g(t), f(t)
)if and only if
1
g(f(t)
)eyf(t) =∞∑
k=0
sk(y)
k!tk (y ∈ C) ,
where f(t) is the compositional inverse of f(t).
For sn(x) ∼(g(t), f(t)
), we have the following equations ([16, Theorem 2.3.7, Theorem
2.3.5, Theorem 2.3.9]):
f(t)sn(x) = nsn−1(x) (n ≥ 0), (7)
sn(x) =n∑
j=0
1
j!
⟨g(f(t)
)−1f(t)j|xn
⟩xj, (8)
sn(x + y) =n∑
j=0
(n
j
)sj(x)pn−j(y) , (9)
where pn(x) = g(t)sn(x).Assume that pn(x) ∼
(1, f(t)
)and qn(x) ∼
(1, g(t)
). Then the transfer formula ([16,
Corollary 3.8.2]) is given by
qn(x) = x
(f(t)
g(t)
)n
x−1pn(x) (n ≥ 1).
For sn(x) ∼(g(t), f(t)
)and rn(x) ∼
(h(t), l(t)
), assume that
sn(x) =n∑
m=0
Cn,mrn(x) (n ≥ 0) ,
Then we have ([16, p.132])
Cn,m =1
m!
⟨h(f(t)
)g(f(t)
) l(f(t))m∣∣∣∣∣xn
⟩. (10)
4
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
765 Dae San Kim et al 762-792
3 Main results
It is immediate to see that c(k)n,q(z) is the Sheffer sequence for the pair(g(t) =
1
Lifk(−t), f(t) =
e−qt − 1
q
)or
c(k)n,q(z) ∼
(1
Lifk(−t),e−qt − 1
q
), (11)
and c(k)n,q(z) is that for the pair(
g(t) =1
Lifk(−t), f(t) =
eqt − 1
q
),
or
c(k)n,q(z) ∼
(1
Lifk(−t),eqt − 1
q
)(12)
because f(t) = − ln(1 + qt)/q and f(t) = ln(1 + qt)/q, respectively in Lemma 1.
When x = 0, c(k)n,q = c
(k)n,q(0) (respectively, c
(k)n,q = c
(k)n,q(0)) are called the poly-Cauchy
numbers of the first kind (respectively, the poly-Cauchy numbers of the second kind).
3.1 Explicit expressions
It is known that (x
q
)(n)
=x
q
(x
q+ 1
)· · ·(
x
q+ n − 1
)∼ (1, 1 − e−qt) .
So,
n!δn,k =
⟨(1 − e−qt)k
∣∣∣∣∣(
x
q
)(n)⟩
=
⟨(e−qt − 1
q
)k∣∣∣∣∣(−q)n
(x
q
)(n)⟩
,
yielding that
(−q)n
(x
q
)(n)
∼(
1,e−qt − 1
q
).
Similarly, by (x
q
)n
=x
q
(x
q− 1
)· · ·(
x
q− n + 1
)∼ (1, 1 − e−qt)
5
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
766 Dae San Kim et al 762-792
we get
n!δn,k =
⟨(eqt − 1)k
∣∣∣∣∣(
x
q
)n
⟩
=
⟨(eqt − 1
q
)k∣∣∣∣∣qn
(x
q
)n
⟩,
yielding that
qn
(x
q
)n
∼(
1,eqt − 1
q
).
First, we shall show the following results by the different methods derived from theumbral calculus, which have been already obtained in [9, Theorem 5].
Theorem 1 For integers n and k with n ≥ 0, we have
c(k)n,q(x) =
n∑m=0
s(n,m)qn−m
m∑j=0
(m
j
)(−x)j
(m − j + 1)k,
c(k)n,q(x) =
n∑m=0
(−1)ms(n,m)qn−m
m∑j=0
(m
j
)(−x)j
(m − j + 1)k
Proof. Since
1
Lifk(−t)c(k)n,q(x) = (−q)n
(x
q
)(n)
∼(
1,e−qt − 1
q
),
we have
c(k)n,q(x) = (−q)nLifk(−t)
(x
q
)(n)
= (−q)nLifk(−t)n∑
m=0
(−1)n−ms(n,m)
(x
q
)m
= qn
n∑m=0
(−q−1)ms(n,m)Lifk(−t)xm
= qn
n∑m=0
(−q−1)ms(n,m)m∑
i=0
(−1)i
i!(i + 1)ktixm
= qn
n∑m=0
(−q−1)ms(n,m)m∑
i=0
(−1)i(
mi
)(i + 1)k
xm−i
= qn
n∑m=0
m∑j=0
(−q−1)ms(n,m)(−1)m−j
(mj
)(m − j + 1)k
xj
=n∑
m=0
s(n,m)qn−m
m∑j=0
(m
j
)(−x)j
(m − j + 1)k.
6
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
767 Dae San Kim et al 762-792
Since1
Lifk(−t)c(k)n,q(x) = (−q)n
(x
q
)n
∼(
1,eqt − 1
q
),
we have
c(k)n,q(x) = qnLifk(−t)
(x
q
)n
= qnLifk(−t)n∑
m=0
s(n,m)
(x
q
)m
=n∑
m=0
s(n,m)qn−mLifk(−t)xm
=n∑
m=0
s(n,m)qn−m
m∑i=0
(−1)i(
mi
)(i + 1)k
xm−i
=n∑
m=0
s(n,m)qn−m
m∑j=0
(−1)m−j(
mj
)(m − j + 1)k
xj
=n∑
m=0
(−1)ms(n,m)qn−m
m∑j=0
(m
j
)(−x)j
(m − j + 1)k.
Proof of Theorem 1 (A different version). As the second different proof, we use theconjugation formula (8).
Since g(t) = 1/Lifk(−t) and f(t) = − ln(1 + qt)/q for sn = c(k)n,q(x), by (8) we get
c(k)n,q(x) =
n∑j=0
1
j!
⟨Lifk
(ln(1 + qt)
q
)(− ln(1 + qt)
q
)j∣∣∣∣∣xn
⟩xj .
Here,⟨Lifk
(ln(1 + qt)
q
)(− ln(1 + qt)
q
)j∣∣∣∣∣xn
⟩
=
n−j∑m=0
(−1)j
m!(m + 1)kqm+j
⟨(ln(1 + qt)
)m+j∣∣∣xn⟩
=
n−j∑m=0
(−1)j
m!(m + 1)kqm+j
n−m−j∑l=0
(m + j)!
(l + m + j)!s(l + m + j,m + j)
⟨(qt)l+m+j|xn
⟩=
n−j∑m=0
(−1)j
m!(m + 1)kqm+j
n−m−j∑l=0
(m + j)!
(l + m + j)!ql+m+js(l + m + j, m + j)(l + m + j)!δl+m+j,n
=
n−j∑m=0
(−1)j(m + j)!qn
m!(m + 1)kqm+js(n,m + j) .
7
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
768 Dae San Kim et al 762-792
Therefore,
c(k)n,q(x) =
n∑j=0
(n−j∑m=0
(−1)j(
m+jm
)qn
(m + 1)kqm+js(n,m + j)
)xj
=n∑
j=0
(n∑
m=j
(−1)j(
mj
)qn
(m − j + 1)kqms(n,m)
)xj
=n∑
m=0
s(n,m)qn−m
m∑j=0
(m
j
)(−x)j
(m − j + 1)k.
Since g(t) = 1/Lifk(−t) and f(t) = ln(1 + qt)/q for sn = c(k)n,q(x), by (8) we get
c(k)n,q(x) =
n∑j=0
1
j!
⟨Lifk
(− ln(1 + qt)
q
)(ln(1 + qt)
q
)j∣∣∣∣∣xn
⟩xj .
Here,⟨Lifk
(− ln(1 + qt)
q
)(ln(1 + qt)
q
)j∣∣∣∣∣xn
⟩
=
n−j∑m=0
(−1)m
m!(m + 1)kqm+j
⟨(ln(1 + qt)
)m+j∣∣∣xn⟩
=
n−j∑m=0
(−1)m
m!(m + 1)kqm+j
n−m−j∑l=0
(m + j)!
(l + m + j)!ql+m+js(l + m + j, m + j)(l + m + j)!δl+m+j,n
=
n−j∑m=0
(−1)m(m + j)!qn
m!(m + 1)kqm+js(n,m + j) .
Therefore,
c(k)n,q(x) =
n∑j=0
(n−j∑m=0
(−1)m(
m+jm
)qn
(m + 1)kqm+js(n,m + j)
)xj
=n∑
j=0
(n∑
m=j
(−1)m−j(
mj
)qn
(m − j + 1)kqms(n,m)
)xj
=n∑
m=0
(−1)ms(n,m)qn−m
m∑j=0
(m
j
)(−x)j
(m − j + 1)k.
We shall show the formulae for the poly-Cauchy polynomials with a q parameter interms of Bernoulli polynomials B
(r)n (x) of order r, defined by(t
et − 1
)r
ext =∞∑
n=0
B(r)n (x)
n!tn (13)
8
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
769 Dae San Kim et al 762-792
(see e.g. [16, Section 2.2]). Observe that for any formal power series g(t) =∑∞
m=0 bmtm/m!
p(x) = g(t)xn, g(at)xn = anp(x
a
)(n ≥ 0, a 6= 0)
because t as the differential operator,
p(x) =∞∑
m=0
bmtm
m!xn
=∞∑
m=0
bm
(n
m
)xn−m
and
g(at)xn =∞∑
m=0
bm(at)m
m!xn
=∞∑
m=0
bmam
(n
m
)xn−m
= an
∞∑m=0
bm
(n
m
)(x
a
)n−m
= anp(x
a
).
Theorem 2 For integers n and k with n ≥ 1, we have
c(k)n,q(x) =
n∑j=0
(−1)j
n−j∑l=0
(n−1
l
)(n−lj
)(n − l − j + 1)k
qlB(n)l xj ,
c(k)n,q(x) = (−1)n
n∑j=0
(−1)j
n−j∑l=0
(−1)l(
n−1l
)(n−lj
)(n − l − j + 1)k
qlB(n)l xj .
Proof. Since1
Lifk(−t)c(k)n,q(x) ∼
(1,
e−qt − 1
q
)and xn ∼ (1, t), for n ≥ 1 we have
1
Lifk(−t)c(k)n,q(x) = x
(t
(e−qt − 1)/q
)n
x−1xn
= (−1)nx
(−qt
e−qt − 1
)n
xn−1
= (−1)n
n−1∑l=0
(n − 1
l
)B
(n)l (−q)lxn−l
= (−1)n
n∑l=0
(n − 1
l
)B
(n)l (−q)lxn−l .
9
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
770 Dae San Kim et al 762-792
Thus,
c(k)n,q(x) = (−1)n
n∑l=0
(n − 1
l
)B
(n)l (−q)lLifk(−t)xn−l
= (−1)n
n∑l=0
n−l∑m=0
(−1)m(
n−1l
)(n−lm
)(m + 1)k
(−q)lB(n)l xn−l−m
= (−1)n
n∑l=0
n−l∑j=0
(−1)n−j(
n−1l
)(n−lj
)(n − l − j + 1)k
qlB(n)l xj
=n∑
j=0
(−1)j
n−j∑l=0
(n−1
l
)(n−lj
)(n − l − j + 1)k
qlB(n)l xj .
Since1
Lifk(−t)c(k)n,q(x) ∼
(1,
eqt − 1
q
)and xn ∼ (1, t), for n ≥ 1 we have
1
Lifk(−t)c(k)n,q(x) = x
(t
(eqt − 1)/q
)n
x−1xn
= x
(qt
eqt − 1
)n
xn−1
=n−1∑l=0
(n − 1
l
)B
(n)l qlxn−l
=n∑
l=0
(n − 1
l
)B
(n)l qlxn−l .
Thus,
c(k)n,q(x) =
n∑l=0
(n − 1
l
)B
(n)l qlLifk(−t)xn−l
= sumnl=0
n−l∑m=0
(−1)m(
n−1l
)(n−lm
)(m + 1)k
qlB(n)l xn−l−m
= sumnl=0
n−l∑j=0
(−1)n−l−j(
n−1l
)(n−lj
)(n − l − j + 1)k
qlB(n)l xj
= (−1)n
n∑j=0
(−1)j
n−j∑l=0
(−1)l(
n−1l
)(n−lj
)(n − l − j + 1)k
qlB(n)l xj .
10
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
771 Dae San Kim et al 762-792
3.2 Sheffer identities
Theorem 3
c(k)n,q(x + y) =
n∑j=0
(n
j
)(−q)n−jc
(k)j,q (x)
(y
q
)(n−j)
,
c(k)n,q(x + y) =
n∑j=0
(n
j
)qn−j c
(k)j,q (x)
(y
q
)n−j
.
Proof. Put sn = c(k)n,q with (11) in (9). Since
pn(x) =1
Lifk(−t)c(k)n,q(x)
= (−q)n
(x
q
)(n)
∼(1,
e−qt − 1
q
).
Thus,
c(k)n,q(x + y) =
n∑j=0
(n
j
)c(k)j,q (x)(−q)n−j
(y
q
)(n−j)
.
Put sn = c(k)n,q with (12) in (9). Since
pn(x) =1
Lifk(−t)c(k)n,q(x)
= qn
(x
q
)n
∼(1,
eqt − 1
q
).
Thus,
c(k)n,q(x + y) =
n∑j=0
(n
j
)c(k)j,q (x)qn−j
(y
q
)n−j
.
3.3 Recurrence relations
Theorem 4 For integers n and k with n ≥ 0, we have
c(k)n,q(x − q) − c(k)
n,q(x) = nqc(k)n−1,q(x) ,
c(k)n,q(x + q) − c(k)
n,q(x) = nqc(k)n−1,q(x) .
Proof. Put sn = c(k)n,q in (7). Then(
e−qt − 1
q
)c(k)n,q(x) = nc
(k)n−1,q(x) .
11
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
772 Dae San Kim et al 762-792
So, we get the first relation.Put sn = c
(k)n,q in (7). Then (
eqt − 1
q
)c(k)n,q(x) = nc
(k)n−1,q(x) .
So, we get the second relation.
3.4 Differentiations
The following results ([9, Proposition 2]) can be also obtained by using the umbral calcu-lus.
Theorem 5 For integers n and k with n ≥ 0, we have
d
dxc(k)n,q(x) = −n!
n−1∑l=0
(−q)n−l−1
(n − l)l!c(k)l,q (x) ,
d
dxc(k)n,q(x) = n!
n−1∑l=0
(−q)n−l−1
(n − l)l!c(k)l,q (x) .
We use a formula for sn(x) in terms of sl(x).
Lemma 2 For sn(x) ∼(g(t), f(t)
),
d
dxsn(x) =
n−1∑l=0
(n
l
)⟨f(t)|xn−l
⟩sl(x) .
Proof of Theorem 5. Since f(t) = − ln(1 + qt)/q for sn = c(k)n,q, by Lemma 2
d
dxc(k)n,q(x) =
n−1∑l=0
(n
l
)⟨− ln(1 + qt)
q
∣∣∣∣∣xn−l
⟩c(k)l,q (x)
= −1
q
n−1∑l=0
(n
l
)⟨ ∞∑j=1
(−1)j−1qjtj
j
∣∣∣∣∣xn−l
⟩c(k)l,q (x)
= −1
q
n−1∑l=0
(n
l
)(−1)n−l−1qn−l
n − l(n − l)!c
(k)l,q (x)
= −n!n−1∑l=0
(−q)n−l−1
(n − l)l!c(k)l,q (x) .
12
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
773 Dae San Kim et al 762-792
Since f(t) = ln(1 + qt)/q for sn = c(k)n,q, by Lemma 2
d
dxc(k)n,q(x) =
n−1∑l=0
(n
l
)⟨ln(1 + qt)
q
∣∣∣∣∣xn−l
⟩c(k)l,q (x)
=1
q
n−1∑l=0
(n
l
)⟨ ∞∑j=1
(−1)j−1qjtj
j
∣∣∣∣∣xn−l
⟩c(k)l,q (x)
=1
q
n−1∑l=0
(n
l
)(−1)n−l−1qn−l
n − l(n − l)!c
(k)l,q (x)
= n!n−1∑l=0
(−q)n−l−1
(n − l)l!c(k)l,q (x) .
3.5 Recurrence relations including Cauchy numbers
Theorem 6
c(k)n,q(x) = −xc
(k)n−1,q(x + q) +
1
n
n−1∑l=0
(n
l
)qlcl
(c(k−1)n−l (x + q) − c
(k)n−l(x + q)
),
c(k)n,q(x) = xc
(k)n−1,q(x − q) +
1
n
n−1∑l=0
(n
l
)qlcl
(c(k−1)n−l (x − q) − c
(k)n−l(x − q)
).
13
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
774 Dae San Kim et al 762-792
Proof. By (2),
c(k)n,q(y) =
⟨∞∑l=0
c(k)l,q (y)
tl
l!
∣∣∣∣∣xn
⟩
=
⟨(1 + qt)−y/qLifk
(ln(1 + qt)
q
)∣∣∣∣∣xn
⟩
=
⟨(1 + qt)−y/qLifk
(ln(1 + qt)
q
)∣∣∣∣∣x · xn−1
⟩
=
⟨∂t
((1 + qt)−y/qLifk
(ln(1 + qt)
q
)) ∣∣∣∣∣xn−1
⟩
=
⟨(∂t(1 + qt)−y/q
)Lifk
(ln(1 + qt)
q
)∣∣∣∣∣xn−1
⟩
+
⟨(1 + qt)−y/q
(∂tLifk
(ln(1 + qt)
q
)) ∣∣∣∣∣xn−1
⟩
= −y
⟨(1 + qt)−(y+q)/qLifk
(ln(1 + qt)
q
)∣∣∣∣∣xn−1
⟩
+ q
⟨(1 + qt)−(y+q)/q
Lifk−1
( ln(1+qt)q
)− Lifk
( ln(1+qt)q
)qt
∣∣∣∣∣ qt
ln(1 + qt)xn−1
⟩.
Since the generating function of the classical Cauchy numbers of the first kind cn is givenby
t
ln(1 + t)=
∞∑n=0
cntn
n!
14
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
775 Dae San Kim et al 762-792
(see e.g. [1, 8, 15]), we have
c(k)n,q(y) = −yc
(k)n−1,q(y + q)
+ q
⟨(1 + qt)−(y+q)/q
Lifk−1
( ln(1+qt)q
)− Lifk
( ln(1+qt)q
)qt
∣∣∣∣∣n−1∑l=0
(n − 1
l
)qlclx
n−l−1
⟩
= −yc(k)n−1,q(y + q) + q
n−1∑l=0
(n − 1
l
)qlcl
×
⟨(1 + qt)−(y+q)/q
Lifk−1
( ln(1+qt)q
)− Lifk
( ln(1+qt)q
)qt
∣∣∣∣∣t(
xn−l
n − l
)⟩
= −yc(k)n−1,q(y + q) +
n−1∑l=0
(n − 1
l
)1
n − lqlcl
×
⟨(1 + qt)−(y+q)/q
(Lifk−1
( ln(1 + qt)
q
)− Lifk
( ln(1 + qt)
q
)) ∣∣∣∣∣xn−l
⟩
= −yc(k)n−1,q(y + q) +
1
n
n−1∑l=0
(n
l
)qlcl
(c(k−1)n−l (y + q) − c
(k)n−l(y + q)
).
Thus, we get the first relation.
15
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
776 Dae San Kim et al 762-792
Similarly, by (2),
c(k)n,q(y) =
⟨∞∑l=0
c(k)l,q (y)
tl
l!
∣∣∣∣∣xn
⟩
=
⟨(1 + qt)y/qLifk
(− ln(1 + qt)
q
)∣∣∣∣∣xn
⟩
=
⟨(1 + qt)y/qLifk
(− ln(1 + qt)
q
)∣∣∣∣∣x · xn−1
⟩
=
⟨∂t
((1 + qt)y/qLifk
(− ln(1 + qt)
q
)) ∣∣∣∣∣xn−1
⟩
=
⟨(∂t(1 + qt)y/q
)Lifk
(− ln(1 + qt)
q
)∣∣∣∣∣xn−1
⟩
+
⟨(1 + qt)y/q
(∂tLifk
(− ln(1 + qt)
q
)) ∣∣∣∣∣xn−1
⟩
= y
⟨(1 + qt)(y−q)/qLifk
(− ln(1 + qt)
q
)∣∣∣∣∣xn−1
⟩
+ q
⟨(1 + qt)(y−q)/q
Lifk−1
(− ln(1+qt)q
)− Lifk
(− ln(1+qt)q
)qt
∣∣∣∣∣ qt
ln(1 + qt)xn−1
⟩.
Sinceqt
ln(1 + qt)xn−1 =
n−1∑l=0
(n − 1
l
)qlclx
n−l−1 ,
we have
c(k)n,q(y) = yc
(k)n−1,q(y − q) + q
n−1∑l=0
(n − 1
l
)qlcl
×
⟨(1 + qt)(y−q)/q
Lifk−1
(− ln(1+qt)q
)− Lifk
(− ln(1+qt)q
)qt
∣∣∣∣∣t(
xn−l
n − l
)⟩
= yc(k)n−1,q(y − q) +
n−1∑l=0
(n − 1
l
)1
n − lqlcl
×
⟨(1 + qt)(y−q)/q
(Lifk−1
(− ln(1 + qt)
q
)− Lifk
(− ln(1 + qt)
q
)) ∣∣∣∣∣xn−l
⟩
= yc(k)n−1,q(y − q) +
1
n
n−1∑l=0
(n
l
)qlcl
(c(k−1)n−l (y − q) − c
(k)n−l(y − q)
).
Thus, we get the second relation.
16
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
777 Dae San Kim et al 762-792
3.6 More recurrence relations
Theorem 7 For integers n and k with n ≥ 1, we have
n∑m=1
(−q)m−1(m − 1)!
(n
m
)c(k)n−m,q =
n∑m=1
(−q)m−1(m − 1)!
(n − 1
m − 1
)c(k−1)n−m,q ,
n∑m=1
(−q)m−1(m − 1)!
(n
m
)c(k)n−m,q =
n∑m=1
(−q)m−1(m − 1)!
(n − 1
m − 1
)c(k−1)n−m,q .
Proof. We shall compute ⟨ln(1 + qt)
qLifk
(ln(1 + qt)
q
)∣∣∣∣∣xn
⟩
in two different ways. On the one hand,⟨ln(1 + qt)
qLifk
(ln(1 + qt)
q
)∣∣∣∣∣xn
⟩
=1
q
⟨Lifk
(ln(1 + qt)
q
)∣∣∣∣∣ ln(1 + qt)xn
⟩
=1
q
⟨Lifk
(ln(1 + qt)
q
)∣∣∣∣∣∞∑
m=1
(−1)m−1(qt)m
mxn
⟩
=1
q
⟨Lifk
(ln(1 + qt)
q
)∣∣∣∣∣n∑
m=1
(−1)m−1(m − 1)!qm
(n
m
)xn−m
⟩
=n∑
m=1
(−1)m−1(m − 1)!qm−1
(n
m
)⟨Lifk
(ln(1 + qt)
q
)∣∣∣∣∣xn−m
⟩
=n∑
m=1
(−1)m−1(m − 1)!qm−1
(n
m
)⟨ ∞∑i=0
c(k)i,q
ti
i!
∣∣∣∣∣xn−m
⟩
=n∑
m=1
(−1)m−1(m − 1)!qm−1
(n
m
)c(k)n−m,q .
17
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
778 Dae San Kim et al 762-792
On the other hand, ⟨ln(1 + qt)
qLifk
(ln(1 + qt)
q
)∣∣∣∣∣xn
⟩
=
⟨∫ t
0
(ln(1 + qs)
qLifk
(ln(1 + qs)
q
))′
ds
∣∣∣∣∣xn
⟩
=
⟨∫ t
0
Lifk−1
( ln(1+qs)q
)1 + qs
ds
∣∣∣∣∣xn
⟩
=
⟨∫ t
0
(∞∑i=0
(−qs)i
)(∞∑
j=0
c(k−1)j,q
sj
j!
)ds
∣∣∣∣∣xn
⟩
=
⟨∫ t
0
(∞∑
r=0
r∑j=0
(−q)r−jc(k−1)j,q
sr
j!
)ds
∣∣∣∣∣xn
⟩
=
⟨∞∑
r=0
r∑j=0
(−q)r−jc(k−1)j,q
tr+1
j!(r + 1)
∣∣∣∣∣xn
⟩
=n−1∑j=0
(−q)n−j−1c(k−1)j,q
n!
j!n
= (n − 1)!n−1∑m=0
(−q)n−m−1
m!c(k−1)m,q .
Thus, for n ≥ 1, we obtain
n∑m=1
(−1)m−1(m − 1)!qm−1
(n
m
)c(k)n−m,q = (n − 1)!
n∑m=1
(−q)m−1
(n − m)!c(k−1)n−m,q .
Similarly, we shall compute⟨− ln(1 + qt)
qLifk
(− ln(1 + qt)
q
)∣∣∣∣∣xn
⟩
18
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
779 Dae San Kim et al 762-792
in two different ways. On the one hand, it is equal to
− 1
q
⟨Lifk
(− ln(1 + qt)
q
)∣∣∣∣∣ ln(1 + qt)xn
⟩
=n∑
m=1
(−1)m(m − 1)!qm−1
(n
m
)⟨Lifk
(− ln(1 + qt)
q
)∣∣∣∣∣xn−m
⟩
=n∑
m=1
(−1)m(m − 1)!qm−1
(n
m
)⟨ ∞∑i=0
c(k)i,q
ti
i!
∣∣∣∣∣xn−m
⟩
=n∑
m=1
(−1)m(m − 1)!qm−1
(n
m
)c(k)n−m,q .
On the other hand, it is equal to⟨∫ t
0
(− ln(1 + qs)
qLifk
(− ln(1 + qs)
q
))′
ds
∣∣∣∣∣xn
⟩
=
⟨∫ t
0
−Lifk−1
(− ln(1+qs)q
)1 + qs
ds
∣∣∣∣∣xn
⟩
=
⟨∫ t
0
(−1)
(∞∑i=0
(−qs)i
)(∞∑
j=0
c(k−1)j,q
sj
j!
)ds
∣∣∣∣∣xn
⟩
=
⟨−
∞∑r=0
r∑j=0
(−q)r−j c(k−1)j,q
tr+1
j!(r + 1)
∣∣∣∣∣xn
⟩
= −n−1∑j=0
(−q)n−j−1c(k−1)j,q
n!
j!n
= −(n − 1)!n∑
m=1
(−q)m−1
(n − m)!c(k−1)n−m,q .
Thus, for n ≥ 1, we obtain
n∑m=1
(−1)m−1(m − 1)!qm−1
(n
m
)c(k)n−m,q = (n − 1)!
n∑m=1
(−q)m−1
(n − m)!c(k−1)n−m,q .
3.7 Some relations with Korobov polynomials
The Korobov polynomials of the first kind Kn,q(x) (q 6= 0) ([14]) are given by
qt(1 + t)x
(1 + t)q − 1=
∞∑j=0
Kj,q(x)tj
j!. (14)
19
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
780 Dae San Kim et al 762-792
Theorem 8 For integers n and k with n ≥ 0, we have
c(k)n,q(x)
=n∑
i=0
n−i∑l=0
n−i−l∑m=0
(−1)n−i−l−m
(n
l
)(n − l
i
)qn−l−m (n − i − l)!
m!(n − i − l + 1)cl,qc
(k−1)m,q Ki, 1
q
(−x
q
),
c(k)n,q(x)
=n∑
i=0
n−i∑l=0
n−i−l∑m=0
(−1)n−i−l−m
(n
l
)(n − l
i
)qn−l−m (n − i − l)!
m!(n − i − l + 1)cl,q c
(k−1)m,q Ki,− 1
q
(x
q
).
Proof. By the definition of c(k)n,q(x),
c(k)n,q(y) =
⟨(1 + qt)−y/qLifk
(ln(1 + qt)
q
)∣∣∣∣∣xn
⟩
=
⟨(1 + qt)−y/q
(1 + qt)1/q − 1
ln(1 + qt)
qLifk
(ln(1 + qt)
q
)∣∣∣∣∣q((1 + qt)1/q − 1
)ln(1 + qt)
xn
⟩.
Sinceq((1 + qt)1/q − 1
)ln(1 + qt)
=∞∑l=0
cl,qtl
l!,
we get
c(k)n,q(y) =
⟨(1 + qt)−y/q
(1 + qt)1/q − 1
ln(1 + qt)
qLifk
(ln(1 + qt)
q
)∣∣∣∣∣∞∑l=0
(n
l
)cl,qx
n−l
⟩
=∞∑l=0
(n
l
)cl,q
⟨(1 + qt)−y/q
(1 + qt)1/q − 1
∫ t
0
(ln(1 + qs)
qLifk
(ln(1 + qs)
q
))′
ds
∣∣∣∣∣xn−l
⟩
=∞∑l=0
(n
l
)cl,q
⟨(1 + qt)−y/q
(1 + qt)1/q − 1
∞∑r=0
r∑m=0
(−q)r−mc(k−1)m,q
tr+1
m!(r + 1)
∣∣∣∣∣xn−l
⟩
=∞∑l=0
(n
l
)cl,q
⟨t(1 + qt)−y/q
(1 + qt)1/q − 1
∣∣∣∣∣∞∑
r=0
r∑m=0
(−q)r−mc(k−1)m,q
tr
m!(r + 1)xn−l
⟩
=∞∑l=0
(n
l
)cl,q
n−l∑r=0
r∑m=0
(−q)r−mc(k−1)m,q
(n−lr
)r!
m!(r + 1)
⟨t(1 + qt)−y/q
(1 + qt)1/q − 1
∣∣∣∣∣xn−l−r
⟩.
Replacing t by qt, q by 1/q and x by −y/q in (14), we have
t(1 + qt)−y/q
(1 + qt)1/q − 1=
∞∑j=0
Kj, 1q
(−y
q
)(qt)j
j!.
20
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
781 Dae San Kim et al 762-792
Hence,
c(k)n,q(y) =
∞∑l=0
(n
l
)cl,q
n−l∑r=0
r∑m=0
(−q)r−mc(k−1)m,q
(n−lr
)r!
m!(r + 1)
⟨∞∑
j=0
Kj, 1q
(−y
q
)(qt)j
j!
∣∣∣∣∣xn−l−r
⟩.
Since ⟨∞∑
j=0
Kj, 1q
(−y
q
)(qt)j
j!
∣∣∣∣∣xn−l−r
⟩= Kn−l−r, 1
q
(−y
q
)qn−l−r ,
we have
c(k)n,q(y) =
n∑l=0
n−l∑r=0
r∑m=0
(−1)r−m
(n
l
)(n − l
r
)qn−l−m r!
m!(r + 1)cl,qc
(k−1)m,q Kn−l−r, 1
q
(−y
q
)
=n∑
l=0
n−l∑m=0
n−l∑r=m
(−1)r−m
(n
l
)(n − l
r
)qn−l−m r!
m!(r + 1)cl,qc
(k−1)m,q Kn−l−r, 1
q
(−y
q
)
=n∑
l=0
n−l∑m=0
n−l−m∑i=0
(−1)n−l−m−i
(n
l
)(n − l
i
)qn−l−m (n − l − i)!
m!(n − l − i + 1)cl,qc
(k−1)m,q Ki, 1
q
(−y
q
)
=n∑
i=0
n−i∑l=0
n−i−l∑m=0
(−1)n−i−l−m
(n
l
)(n − l
i
)qn−l−m (n − i − l)!
m!(n − i − l + 1)cl,qc
(k−1)m,q Ki, 1
q
(−y
q
).
Thus, we obtain the first relation.Similarly, by the definition of c
(k)n,q(x),
c(k)n,q(y) =
⟨(1 + qt)y/qLifk
(− ln(1 + qt)
q
)∣∣∣∣∣xn
⟩
=
⟨(1 + qt)y/q
(1 + qt)−1/q − 1
− ln(1 + qt)
qLifk
(− ln(1 + qt)
q
)∣∣∣∣∣q(1 − (1 + qt)−1/q
)ln(1 + qt)
xn
⟩.
Sinceq(1 − (1 + qt)−1/q
)ln(1 + qt)
=∞∑l=0
cl,qtl
l!,
21
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
782 Dae San Kim et al 762-792
we get
c(k)n,q(y) =
∞∑l=0
(n
l
)cl,q
⟨(1 + qt)y/q
(1 + qt)−1/q − 1
− ln(1 + qt)
qLifk
(− ln(1 + qt)
q
)∣∣∣∣∣xn−l
⟩
=∞∑l=0
(n
l
)cl,q
⟨(1 + qt)y/q
(1 + qt)−1/q − 1
∫ t
0
(− ln(1 + qs)
qLifk
(− ln(1 + qs)
q
))′
ds
∣∣∣∣∣xn−l
⟩
=∞∑l=0
(n
l
)cl,q
⟨−t(1 + qt)y/q
(1 + qt)−1/q − 1
∣∣∣∣∣∞∑
r=0
r∑m=0
(−q)r−mc(k−1)m,q
tr
m!(r + 1)xn−l
⟩
=∞∑l=0
(n
l
)cl,q
n−l∑r=0
r∑m=0
(−q)r−mc(k−1)m,q
(n−lr
)r!
m!(r + 1)
⟨−t(1 + qt)y/q
(1 + qt)−1/q − 1
∣∣∣∣∣xn−l−r
⟩.
Replacing t by qt, q by −1/q and x by y/q in (14), we have
−t(1 + qt)y/q
(1 + qt)−1/q − 1=
∞∑j=0
Kj,− 1q
(y
q
)(qt)j
j!.
Hence,
c(k)n,q(y) =
∞∑l=0
(n
l
)cl,q
n−l∑r=0
r∑m=0
(−q)r−mc(k−1)m,q
(n−lr
)r!
m!(r + 1)Kn−l−r,− 1
q
(y
q
)qn−l−r
=n∑
l=0
n−l∑r=0
r∑m=0
(−1)r−m
(n
l
)(n − l
r
)qn−l−m r!
m!(r + 1)cl,q c
(k−1)m,q Kn−l−r,− 1
q
(y
q
)
=n∑
l=0
n−l∑m=0
n−l∑r=m
(−1)r−m
(n
l
)(n − l
r
)qn−l−m r!
m!(r + 1)cl,q c
(k−1)m,q Kn−l−r,− 1
q
(y
q
)
=n∑
l=0
n−l∑m=0
n−l−m∑i=0
(−1)n−l−m−i
(n
l
)(n − l
i
)qn−l−m (n − l − i)!
m!(n − l − i + 1)cl,q c
(k−1)m,q Ki,− 1
q
(y
q
)
=n∑
i=0
n−i∑l=0
n−i−l∑m=0
(−1)n−i−l−m
(n
l
)(n − l
i
)qn−l−m (n − i − l)!
m!(n − i − l + 1)cl,q c
(k−1)m,q Ki,− 1
q
(y
q
).
Thus, we obtain the second relation.
3.8 Some relations including Stiring numbers of the first kind
Theorem 9 For integers n and k with n ≥ 0, we have
c(k)n+1,q(x) = −xc(k)
n,q(x + q) + qn
n∑j=0
n∑m=j
(−1)jq−m(
mj
)(m − j + 1)k
s(n,m)(x + q)j ,
c(k)n+1,q(x) = xc(k)
n,q(x − q) − qn
n∑j=0
n∑m=j
(−1)m−jq−m(
mj
)(m − j + 1)k
s(n,m)(x − q)j .
22
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
783 Dae San Kim et al 762-792
We use the following recurrence formula for Sheffer sequences ([16, Corollary 3.7.2]).
Lemma 3 If sn(x) ∼(g(t), f(t)
), then
sn+1 =
(x − g′(t)
g(t)
)1
f ′(t)sn(x) .
Proof of Theorem 9. Consider the Sheffer sequence sn = c(k)n,q in Lemma 3. By f(t) =
(e−qt − 1)/q and g(t) = 1/Lifk(−t), we get 1/f ′(t) = −eqt and
g′(t)
g(t)=
Lif ′k(−t)
Lifk(−t).
Thus,
c(k)n+1,q(x) = eqt Lif ′k(−t)
Lifk(−t)c(k)n,q(x) − xc(k)
n,q(x + q) .
We obtain
Lif ′k(−t)
Lifk(−t)c(k)n,q(x) = Lif ′k(−t)(−q)n
(x
q
)(n)
= (−q)nLif ′k(−t)n∑
m=0
(−1)n−ms(n,m)
(x
q
)(n)
= qn
n∑m=0
(−q−1)ms(n,m)Lif ′k(−t)xm
= qn
n∑m=0
(−q−1)ms(n,m)m∑
r=0
(−1)r
r!(r + 1)ktrxm
= qn
n∑m=0
m∑r=0
(−1)m+rq−m(
mr
)(r + 1)k
s(n,m)xm−r
= qn
n∑m=0
m∑j=0
(−1)jq−m(
mj
)(m − j + 1)k
s(n,m)xj .
Therefore, we have
c(k)n+1,q(x) = −xc(k)
n,q(x + q) + qn
n∑j=0
n∑m=j
(−1)jq−m(
mj
)(m − j + 1)k
s(n,m)(x + q)j .
Similarly, consider the Sheffer sequence sn = c(k)n,q in Lemma 3. By f(t) = (eqt − 1)/q
and g(t) = 1/Lifk(−t), we get
c(k)n+1,q(x) = −e−qt Lif ′k(−t)
Lifk(−t)c(k)n,q(x) + xc(k)
n,q(x − q) .
23
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
784 Dae San Kim et al 762-792
We obtain
Lif ′k(−t)
Lifk(−t)c(k)n,q(x) = Lif ′k(−t)qn
(x
q
)n
= qnLif ′k(−t)n∑
m=0
s(n,m)
(x
q
)m
= qn
n∑m=0
q−ms(n,m)Lif ′k(−t)xm
= qn
n∑m=0
q−ms(n,m)m∑
r=0
(−1)r(
mr
)(r + 1)k
xm−r
= qn
n∑m=0
q−ms(n,m)m∑
j=0
(−1)m−j(
mj
)(m − j + 1)k
xj
= qn
n∑m=0
m∑j=0
(−1)m−jq−m(
mj
)(m − j + 1)k
s(n,m)xj .
Therefore, we have
c(k)n+1,q(x) = xc(k)
n,q(x − q) − qn
n∑j=0
n∑m=j
(−1)m−jq−m(
mj
)(m − j + 1)k
s(n,m)(x − q)j .
3.9 Some relations with Bernoulli polynomials
By applying Lemma 1 about (13), for nonnegative integer r, we have
B(r)n ∼
((et − 1
t
)r
, t
). (15)
Theorem 10 For integers n and k with n ≥ 0, we have
c(k)n,q(x) = (−1)m
n∑m=0
(n−m∑l=0
n−m−l∑i=0
(n
l
)(n − l
i + m
)qis(i + m,m)C(s)
l,q c(k)n−m−l−i,q
)B(s)
m (x) ,
c(k)n,q(x) =
n∑m=0
(n−m∑l=0
n−m−l∑i=0
(n
l
)(n − l
i + m
)qis(i + m,m)C(s)
l,q c(k)n−m−l−i,q
)B(s)
m (x) .
Proof. Put c(k)n,q(x) =
∑nm=0 Cn,mB
(s)m (x) for (11) and (15). Then by (10) we get
Cn,m =1
m!
⟨Lifk
(ln(1 + qt)
q
)(e− ln(1+qt)/q − 1
− ln(1 + qt)/q
)s(− ln(1 + qt)
q
)m∣∣∣∣∣xn
⟩
=(−q−1)m
m!
⟨Lifk
(ln(1 + qt)
q
)(q(1 − (1 + qt)−1/q
)ln(1 + qt)
)s(ln(1 + qt)
)m∣∣∣∣∣xn
⟩.
24
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
785 Dae San Kim et al 762-792
Define C(r)l,q (r > 0) by (
q(1 − (1 + qt)−1/q
)ln(1 + qt)
)r
=∞∑l=0
C(r)l,q
tl
l!,
so that C(1)l,q = cl,q = c
(1)l,q . Then,
Cn,m =(−q−1)m
m!
⟨Lifk
(ln(1 + qt)
q
)(ln(1 + qt)
)m∣∣∣∣∣n∑
l=0
C(s)l,q
tl
l!xn
⟩
=(−q−1)m
m!
n∑l=0
C(s)l,q
(n
l
)⟨Lifk
(ln(1 + qt)
q
)(ln(1 + qt)
)m∣∣∣∣∣xn−l
⟩
=(−q−1)m
m!
n−m∑l=0
C(s)l,q
(n
l
)
×
⟨Lifk
(ln(1 + qt)
q
)∣∣∣∣∣n−m−l∑
i=0
m!
(i + m)!s(i + m,m)(qt)i+mxn−l
⟩
=(−q−1)m
m!
n−m∑l=0
C(s)l,q
(n
l
) n−m−l∑i=0
m!
(i + m)!s(i + m,m)qi+m(n − l)i+m
×
⟨Lifk
(ln(1 + qt)
q
)∣∣∣∣∣xn−m−l−i
⟩.
Since ⟨Lifk
(ln(1 + qt)
q
)∣∣∣∣∣xn−m−l−i
⟩= c
(k)n−m−l−i,q ,
we have
Cn,m = (−1)m
n−m∑l=0
n−m−l∑i=0
(n
l
)(n − l
i + m
)qis(i + m,m)C(s)
l,q c(k)n−m−l−i,q .
Thus,
c(k)n,q(x) = (−1)m
n∑m=0
(n−m∑l=0
n−m−l∑i=0
(n
l
)(n − l
i + m
)qis(i + m,m)C(s)
l,q c(k)n−m−l−i,q
)B(s)
m (x) .
Similarly, put c(k)n,q(x) =
∑nm=0 Cn,mB
(s)m (x) for (12) and (15). Then by (10) we get
Cn,m =1
m!
⟨Lifk
(− ln(1 + qt)
q
)(eln(1+qt)/q − 1
ln(1 + qt)/q
)s(ln(1 + qt)
q
)m∣∣∣∣∣xn
⟩
=1
m!qm
⟨Lifk
(− ln(1 + qt)
q
)(q((1 + qt)1/q − 1
)ln(1 + qt)
)s(ln(1 + qt)
)m∣∣∣∣∣xn
⟩.
25
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
786 Dae San Kim et al 762-792
Define C(r)l,q (r > 0) by (
q((1 + qt)1/q − 1
)ln(1 + qt)
)r
=∞∑l=0
C(r)l,q
tl
l!,
so that C(1)l,q = cl,q = c
(1)l,q . Then,
Cn,m =1
m!qm
⟨Lifk
(− ln(1 + qt)
q
)(ln(1 + qt)
)m∣∣∣∣∣n∑
l=0
C(s)l,q
tl
l!xn
⟩
=1
m!qm
n∑l=0
C(s)l,q
(n
l
)⟨Lifk
(− ln(1 + qt)
q
)(ln(1 + qt)
)m∣∣∣∣∣xn−l
⟩
=1
m!qm
n−m∑l=0
C(s)l,q
(n
l
)
×
⟨Lifk
(− ln(1 + qt)
q
)∣∣∣∣∣n−m−l∑
i=0
m!
(i + m)!s(i + m,m)(qt)i+mxn−l
⟩
=1
m!qm
n−m∑l=0
C(s)l,q
(n
l
) n−m−l∑i=0
m!
(i + m)!s(i + m, m)qi+m(n − l)i+m
×
⟨Lifk
(− ln(1 + qt)
q
)∣∣∣∣∣xn−m−l−i
⟩.
Since ⟨Lifk
(− ln(1 + qt)
q
)∣∣∣∣∣xn−m−l−i
⟩= c
(k)n−m−l−i,q ,
we have
Cn,m =n−m∑l=0
n−m−l∑i=0
(n
l
)(n − l
i + m
)qis(i + m,m)C(s)
l,q c(k)n−m−l−i,q .
Thus,
c(k)n,q(x) =
n∑m=0
(n−m∑l=0
n−m−l∑i=0
(n
l
)(n − l
i + m
)qis(i + m,m)C(s)
l,q c(k)n−m−l−i,q
)B(s)
m (x) .
3.10 Some relations with Frobenius-Euler polynomials
For λ ∈ C with λ 6= 1, the Frobenius-Euler polynomials of order r, H(r)n (x|λ) are defined
by the generating function (1 − λ
et − λ
)r
ext =∞∑
n=0
H(r)n (x|λ)
tn
n!
26
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
787 Dae San Kim et al 762-792
(see e.g. [4]). Hence, by Lemma 1 we have
H(r)n (x|λ) ∼
((et − λ
1 − λ
)r
, t
). (16)
Theorem 11 For integers n and k with n ≥ 0, we have
c(k)n,q(x) =
(λ
λ − 1
)r n∑m=0
(−1)m
×(n−m∑
l=0
r∑i=0
ql(−λ−1)i
(r
i
)(n
l + m
)s(l + m,n)c
(k)n−l−m,q(i)
)H(r)
m (x|λ) ,
c(k)n,q(x) =
(λ
λ − 1
)r n∑m=0
×(n−m∑
l=0
r∑i=0
ql(−λ−1)i
(r
i
)(n
l + m
)s(l + m,n)c
(k)n−l−m,q(i)
)H(r)
m (x|λ) .
Proof. Put c(k)n,q(x) =
∑nm=0 Cn,mH
(r)m (x|λ) for (11) and (16). Then by (10) we get
Cn,m =1
m!
⟨Lifk
(ln(1 + qt)
q
)(e− ln(1+qt)/q − λ
1 − λ
)r(− ln(1 + qt)
q
)m∣∣∣∣∣xn
⟩
=(−q−1)m
m!(1 − λ)r
⟨Lifk
(ln(1 + qt)
q
)((1 + qt)−1/q − λ
)r∣∣∣∣∣(ln(1 + qt))m
xn
⟩.
Since (ln(1 + qt)
)m=
n−m∑l=0
m!
(l + m)!s(l + m,m)(qt)l+m , (17)
we have
Cn,m =(−q−1)m
m!(1 − λ)r
n−m∑l=0
m!
(l + m)!s(l + m,m)ql+m(n)l+m
×
⟨Lifk
(ln(1 + qt)
q
) r∑i=0
(r
i
)(−λ)r−i(1 + qt)−i/q
∣∣∣∣∣xn−l−m
⟩
=(−q−1)m
m!(1 − λ)r
n−m∑l=0
m!
(l + m)!s(l + m,m)ql+m(n)l+m
×r∑
i=0
(r
i
)(−λ)r−i
⟨Lifk
(ln(1 + qt)
q
)(1 + qt)−i/q
∣∣∣∣∣xn−l−m
⟩.
27
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
788 Dae San Kim et al 762-792
Since
Lifk
(ln(1 + qt)
q
)(1 + qt)−i/q =
∞∑j=0
c(k)j,q (i)
tj
j!,
we have
Cn,m =(−q−1)m
m!(1 − λ)r
n−m∑l=0
m!
(l + m)!s(l + m,m)ql+m(n)l+m
r∑i=0
(i = 0
r
)(r
i
)(−λ)r−ic
(k)n−l−m,q(i)
= (−1)m+r
(λ
1 − λ
)r n−m∑l=0
r∑i=0
ql(−λ−1)i
(r
i
)(n
l + m
)s(l + m,n)c
(k)n−l−m,q(i) .
Thus,
c(k)n,q(x) =
(λ
λ − 1
)r n∑m=0
(−1)m
×(n−m∑
l=0
r∑i=0
ql(−λ−1)i
(r
i
)(n
l + m
)s(l + m,n)c
(k)n−l−m,q(i)
)H(r)
m (x|λ) .
Similarly, put c(k)n,q(x) =
∑nm=0 Cn,mH
(r)m (x|λ) for (12) and (16). Then by (10) we get
Cn,m =1
m!
⟨Lifk
(− ln(1 + qt)
q
)(eln(1+qt)/q − λ
1 − λ
)r(ln(1 + qt)
q
)m∣∣∣∣∣xn
⟩
=q−m
m!(1 − λ)r
⟨Lifk
(− ln(1 + qt)
q
)((1 + qt)1/q − λ
)r∣∣∣∣∣(ln(1 + qt))m
xn
⟩.
By (17) we have
Cn,m =q−m
m!(1 − λ)r
n−m∑l=0
m!
(l + m)!s(l + m,m)ql+m(n)l+m
×
⟨Lifk
(− ln(1 + qt)
q
) r∑i=0
(r
i
)(−λ)r−i(1 + qt)i/q
∣∣∣∣∣xn−l−m
⟩
=q−m
m!(1 − λ)r
n−m∑l=0
m!
(l + m)!s(l + m,m)ql+m(n)l+m
×r∑
i=0
(r
i
)(−λ)r−i
⟨Lifk
(− ln(1 + qt)
q
)(1 + qt)i/q
∣∣∣∣∣xn−l−m
⟩.
Since
Lifk
(− ln(1 + qt)
q
)(1 + qt)i/q =
∞∑j=0
c(k)j,q (i)
tj
j!,
28
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
789 Dae San Kim et al 762-792
we have
Cn,m =
(λ
λ − 1
)r n−m∑l=0
r∑i=0
ql(−λ−1)i
(r
i
)(n
l + m
)s(l + m,n)c
(k)n−l−m,q(i) .
Thus,
c(k)n,q(x) =
(λ
λ − 1
)r n∑m=0
(−1)m
×(n−m∑
l=0
r∑i=0
ql(−λ−1)i
(r
i
)(n
l + m
)s(l + m,n)c
(k)n−l−m,q(i)
)H(r)
m (x|λ) .
3.11 Some relations with falling and rising factorials
Theorem 12 For integers n and k with n ≥ 0, we have
c(k)n,q(x) =
n∑m=0
1
m!
(m∑
i=0
(−1)i
(m
i
)c(k)n,i(−i)
)x(m) ,
c(k)n,q(x) =
n∑m=0
1
m!
(m∑
i=0
(−1)i
(m
i
)c(k)n,i(m − i)
)xm .
Proof. Put c(k)n,q(x) =
∑nm=0 Cn,mx(m) for (11) and x(n) ∼ (1, 1− e−t). Then by (10) we get
Cn,m =1
m!
⟨Lifk
(ln(1 + qt)
q
)(1 − eln(1+qt)/q)m
∣∣∣∣∣xn
⟩
=1
m!
⟨Lifk
(ln(1 + qt)
q
)(1 − (1 + qt)1/q
)m∣∣∣∣∣xn
⟩
=1
m!
m∑i=0
(m
i
)(−1)i
⟨Lifk
(ln(1 + qt)
q
)(1 + qt)i/q
∣∣∣∣∣xn
⟩
=1
m!
m∑i=0
(m
i
)(−1)ic(k)
n,q(−i) .
Thus,
c(k)n,q(x) =
n∑m=0
1
m!
(m∑
i=0
(−1)i
(m
i
)c(k)n,i(−i)
)x(m) .
29
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
790 Dae San Kim et al 762-792
Similarly, put c(k)n,q(x) =
∑nm=0 Cn,mxm for (12) and xn ∼ (1, et − 1). Then by (10) we get
Cn,m =1
m!
⟨Lifk
(− ln(1 + qt)
q
)(eln(1+qt)/q − 1)m
∣∣∣∣∣xn
⟩
=1
m!
⟨Lifk
(− ln(1 + qt)
q
)((1 + qt)1/q − 1
)m∣∣∣∣∣xn
⟩
=1
m!
m∑i=0
(m
i
)(−1)m−i
⟨Lifk
(− ln(1 + qt)
q
)(1 + qt)i/q
∣∣∣∣∣xn
⟩
=1
m!
m∑i=0
(m
i
)(−1)m−ic(k)
n,q(−i)
=1
m!
m∑i=0
(m
i
)(−1)ic(k)
n,q(m − i) .
Thus,
c(k)n,q(x) =
n∑m=0
1
m!
(m∑
i=0
(−1)i
(m
i
)c(k)n,i(m − i)
)xm .
References
[1] L. Comtet, Advanced Combinatorics, Reidel, Dordrecht, 1974.
[2] K. Kamano and T. Komatsu, Poly-Cauchy polynomials, Mosc. J. Comb. NumberTheory 3 (2013), 183–209.
[3] M. Kaneko, Poly-Bernoulli numbers, J. Th. Nombres Bordeaux 9 (1997), 221–228.
[4] D. S. Kim and T. Kim, Some identities of Frobenius-Euler polynomials arising fromumbral calculus, Adv. Difference Equ. 2012 (2012), #196.
[5] D. S. Kim, T. Kim, S. H. Lee, A note on poly-Bernoulli polynomials arising fromumbral calculus , Adv. Studies Theor. Phys., 7 (2013), no. 15, 731-744.
[6] D. S. Kim, T. Kim, S.-H. Lee, Poly-Cauchy numbers and polynomials with umbralcalculus viewpoint , Int. Journal of Math. Analysis, 7 (2013), 2235-2253.
[7] D. S. Kim, T. Kim, S.-H. Lee, Higher-order Cauchy of the first kind and Poly-Cauchyof the first kind mix-type polynomials, Adv. Stud. Contemp. Math. 23 (2013), 543–554.
[8] T. Komatsu, Poly-Cauchy numbers, Kyushu J. Math. 67 (2013), 143–153.
30
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
791 Dae San Kim et al 762-792
[9] T. Komatsu, Poly-Cauchy numbers with a q parameter, Ramanujan J. 31 (2013),353–371.
[10] T. Komatsu, Sums of products of Cauchy numbers, including poly-Cauchy numbers,J. Discrete Math. 2013 (2013), Article ID 373927, 10 pages.
[11] T. Komatsu, Hypergeometric Cauchy numbers, Int. J. Number Theory 9 (2013), 545–560.
[12] T. Komatsu, K. Liptai and L. Szalay, Some relationships between poly-Cauchy typenumbers and poly-Bernoulli type numbers, East-West J. Math. 14 (2012), 114-120.
[13] T. Komatsu and F. Luca, Some relationships between poly-Cauchy numbers and poly-Bernoulli numbers, Ann. Math. Inform. 41 (2013), 99-105.
[14] N. M. Korobov, On some properties of special polynomials, Chebyshevskii Sb. 1(2001), 40–49.
[15] D. Merlini, R. Sprugnoli and M. C. Verri, The Cauchy numbers, Discrete Math. 306(2006) 1906–1920.
[16] S. Roman, The umbral Calculus, Dover, New York, 2005.
31
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
792 Dae San Kim et al 762-792
TRIPLED FIXED POINT THEOREMS FOR MIXED MONOTONE
CHATTERJEA TYPE CONTRACTIVE OPERATORS
MARIN BORCUT, MADALINA PACURAR AND VASILE BERINDE
Abstract. Starting from the papers [Berinde, V., Borcut, M., Tripled fixed
point theorems for contractive type mappings in partially ordered metric spaces,Nonlinear Anal., 74 (2011), 4889-4897], [ Borcut, M., Berinde, V., Tripled co-
incidence theorems for contractive type mappings in partially ordered metricspaces , Appl. Math. Comput., 218 (10) (2012), 5929-5936] and [Borcut, M.,
Tripled coincidente point theorems for contractive type mappings in partially
ordered metric spaces, Appl. Math. Comput., 218 (2012), 7339-7346.], wepresent new results on the existence and uniqueness of tripled fixed points
for nonlinear mappings in partially ordered complete metric spaces satisfying
more general contractive conditions.
1. INTRODUCTION
In some very recent papers, Berinde and Borcut [6], Borcut and Berinde [7],Borcut [8] have introduced and studied the concept of tripled fixed point, respec-tively tripled coincidence point for nonlinear contractive mappings F : X3 → X, inpartially ordered complete metric spaces and obtained existence as well as existenceand uniqueness theorems of tripled fixed points, respectively of tripled coincidencepoints, for some classes of contractive type mappings.
The presented theorems in [6], [7], [8], extend several existing results in theliterature: [14], [18], [15]. For the sake of completeness, we recall the main conceptsand results from [6] which are needed for the present paper.
Let(X,≤) be a partially ordered set and d be a metric on X such that (X, d) isa complete metric space. Consider on the product space X3 the following partialorder: for (x, y, z) , (u, v, w) ∈ X3,
(u, v, w) ≤ (x, y, z)⇔ x ≥ u, y ≤ v, z ≥ w.
Definition 1. [6] Let (X,≤) be a partially ordered set and F : X3 → X a mapping.We say that F has the mixed monotone property if F (x, y, z) is nondecreasing inx and z, and is nonincreasing in y, that is, for any x, y, z ∈ X,
x1, x2 ∈ X,x1 ≤ x2 ⇒ F (x1, y, z) ≤ F (x2, y, z) ,
y1, y2 ∈ X, y1 ≤ y2 ⇒ F (x, y1, z) ≥ F (x, y2, z) ,
and
z1, z2 ∈ X, z1 ≤ z2 ⇒ F (x, y, z1) ≤ F (x, y, z2) .
Definition 2. [6] An element (x, y, z) ∈ X3 is called a tripled fixed point of F :X3 → X if
F (x, y, z) = x, F (y, x, y) = y, and F (z, y, x) = z.
1
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
793 MARIN BORCUT ET AL 793-802
2 M. Borcut, M. Pacurar and V. Berinde
Let (X, d) be a metric space. The mapping d : X ×X ×X → X, given by
d [(x, y, z) , (u, v, w)] = d (x, u) + d (y, v) + d (z, w) ,
defines a metric on X ×X ×X, which will be denoted for convenience by d, too.
Definition 3. Let X,Y, Z be nonempty sets and F : X ×X ×X → Y,G : Y × Y × Y → Z. We define the symmetric composition (or, the s-composition,for short) of F and G, G ∗ F : X ×X ×X → Z, by
(G ∗ F ) (x, y, z) = G (F (x, y, z) , F (y, x, y) , F (z, y, x)) (x, y, z ∈ X).
For each nonempty set X, denote by Px the projection mapping
PX : X ×X ×X → X,P (x, y, z) = x for x, y, z ∈ X.The symmetric composition has the following properties:
Proposition 1. (Associativity). If F : X ×X ×X → Y, G : Y × Y × Y → Z and
H : Z × Z × Z →W, then (H ∗G) ∗ F = H ∗ (G ∗ F ).
Proposition 2. (Identity Element). If F : X ×X ×X → Y, then
F ∗ PX = PY ∗ F = F.
Proposition 3. (Mixed Monotonicity). If (X,≤), (Y,≤), (Z,≤) are partially or-dered sets and the mappings F : X ×X ×X → Y,G : Y × Y × Y → Z are mixedmonotone, then G ∗ F is mixed monotone.
Proposition 4. If (X,≤) is a partially ordered set and F is mixed monotone, thenFn = F ∗ Fn−1 = Fn−1 ∗ F is mixed monotone, for every n ≥ 1.
The first main result in [6] is given by the following theorem.
Theorem 1. [6] Let (X,≤) be a partially ordered set and suppose there is a metricd on X such that (X, d) is a complete metric space. Let F : X ×X ×X → X be acontinuous mapping having the mixed monotone property on X. Assume that thereexist the constants j, k, l ∈ [0, 1) with j + k + l < 1 for which
(1.1) d (F (x, y, z) , F (u, v, w)) ≤ jd (x, u) + kd (y, v) + ld (z, w) ,
∀x ≥ u, y ≤ v, z ≥ w. If there exist x0, y0, z0 ∈ X such that
x0 ≤ F (x0, y0, z0) , y0 ≥ F (y0, x0, y0) and z0 ≤ F (z0, y0, x0) ,
then there exist x, y, z ∈ X such that
x = F (x, y, z) , y = F (y, x, y) and z = F (z, y, x) .
Remark 1. If we take j = k = l = α3 in Theorem 1, then the contraction condition
(1.1) can be written in a slightly simplified form
(1.2) d (F (x, y, z) , F (u, v, w)) ≤ α
3[d (x, u) + d (y, v) + d (z, w)].
Theorem 2. [6] By adding to the hypotheses of Theorem 1 the condition: forevery (x, y, z) , (x1, y1, z1) ∈ X3, there exists a (u, v, w) ∈ X3 that is comparable to(x, y, z) and (x1, y1, z1), then the tripled fixed point of F is unique.
Theorem 3. [6] In addition to the hypotheses of Theorem 1, suppose that x0, y0, z0 ∈X are comparable. Then x = y = z.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
794 MARIN BORCUT ET AL 793-802
Tripled fixed points 3
2. Main results
Based on the notions and results presented in the first section, we will provenew existence and uniqueness theorems for operators which verify a Chatterjeacontraction type condition, adapted to the case X3.
Theorem 4. Let (X,≤) be a partially ordered set and suppose there is a metric don X such that (X, d) is a complete metric space. Let F : X3 → X be a mappinghaving the mixed monotone property on X. Assume that there exists a k ∈ [0, 1)such that
(2.1) d (F (x, y, z) , F (u, v, w)) ≤ k
8[d (x, F (u, v, w)) + d (y, F (v, u, v)) +
+d (z, F (w, v, u)) + d (u, F (x, y, z)) + d (v, F (y, x, y)) + d (w,F (z, y, x))].
Also suppose either(a) F is continuous or(b) X has the following property:
(i) if a nondecreasing sequence xn → x, then xn ≤ x for all n,
(ii) if a nonincreasing sequence yn → y, then yn ≥ y for all n.
If there exist x0, y0, z0 ∈ X such that,
(2.2) x0 ≤ F (x0, y0, z0) , y0 ≥ F (y0, x0, y0) and z0 ≤ F (z0, y0, x0) ,
then there exist x, y, z ∈ X such that,
x = F (x, y, z) , y = F (y, x, y) and z = F (z, y, x) .
Proof. Let the sequences xn , yn , zn ⊂ X be defined by
xn+1 = F (xn, yn, zn) = Fn+1(x0, y0, z0), yn+1 = F (yn, xn, yn) = Fn+1(y0, x0, y0),
zn+1 = F (zn, yn, xn) = Fn+1(z0, y0, x0), (n = 0, 1, ...).
Since Fn is mixed monotone for every n (by Proposition 4), it follows by (2.2) thatxn and zn are nondecreasing and yn is nonincreasing. Indeed, due to themixed monotone property of F , it is easy to show that
x2 = F (x1, y1, z1) ≥ F (x0, y0, z0) = x1
y2 = F (y1, x1, y1) ≤ F (y0, x0, y0) = y1
z2 = F (z1, y1, x1) ≥ F (z0, y0, x0) = z1
and thus we obtain three sequences satisfying the following conditions
x0 ≤ x1 ≤ ... ≤ xn ≤ ...,
y0 ≥ y1 ≥ ... ≥ yn ≥ ...,z0 ≤ z1 ≤ ... ≤ zn ≤ ....
Now, for n ∈ N, denote
Dxn+1= d (xn+1, xn) , Dyn+1
= d (yn+1, yn) , Dzn+1= d (zn+1, zn)
and
Dn+1 = Dxn+1 +Dyn+1 +Dzn+1 .
Using (2.1), we get
Dxn+1= d (xn+1, xn) = d(F (xn, yn, zn), F (xn−1, yn−1, zn−1))
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
795 MARIN BORCUT ET AL 793-802
4 M. Borcut, M. Pacurar and V. Berinde
≤ k
8
[d(xn, Fxn−1
)+ d
(yn, Fyn−1
)+ d
(zn, Fzn−1
)+d (xn−1, Fxn
) + d (yn−1, Fyn) + d (zn−1, Fzn)]
=k
8[d (xn, xn) + d (yn, yn) + d (zn, zn)
+d (xn−1, xn+1) + d (yn−1, yn+1) + d (zn−1, zn+1)]
=k
8[d (xn−1, xn+1) + d (yn−1, yn+1) + d (zn−1, zn+1)]
≤ k
8[d (xn−1, xn) + d (yn−1, yn) + d (zn−1, zn)
+d (xn, xn+1) + d (yn, yn+1) + d (zn, zn+1)]
=k
8
[Dxn
+Dyn +Dzn +Dxn+1+Dyn+1
+Dzn+1
],
and therefore
(2.3) Dxn+1 ≤k
8
[Dxn +Dyn +Dzn +Dxn+1 +Dyn+1 +Dzn+1
].
Similarly, we obtain for the sequencesDyn+1
,Dzn+1
Dyn+1 = d (yn+1, yn) = d(F (yn, xn, yn), F (yn−1, xn−1, yn−1))
≤ k
8
[d(yn, Fyn−1
)+ d
(xn, Fxn−1
)+ d
(yn, Fyn−1
)+d (yn−1, Fyn) + d (xn−1, Fxn) + d (yn−1, Fyn)]
=k
8[d (yn, yn) + d (xn, xn) + d (yn, yn)
+d (yn−1, yn+1) + d (xn−1, xn+1) + d (yn−1, yn+1)]
=k
8[2d (yn−1, yn+1) + d (xn−1, xn+1)]
≤ k
8[2d (yn−1, yn) + d (xn−1, xn) + d (xn, xn+1) + 2d (yn, yn+1)]
=k
8
[Dxn
+ 2Dyn +Dxn+1+ 2Dyn+1
],
and so
(2.4) Dyn+1 ≤k
8
[Dxn + 2Dyn +Dxn+1 + 2Dyn+1
]and
Dzn+1 = d (zn+1, zn) = d(F (zn, yn, xn), F (zn−1, yn−1, xn−1))
≤ k
8
[d(zn, Fzn−1
)+ d
(yn, Fyn−1
)+ d
(xn, Fxn−1
)+d (zn−1, Fzn) + d (yn−1, Fyn) + d (xn−1, Fxn
)]
=k
8[d (xn, xn) + d (yn, yn) + d (zn, zn)
+d (xn−1, xn+1) + d (yn−1, yn+1) + d (zn−1, zn+1)]
=k
8[d (xn−1, xn+1) + d (yn−1, yn+1) + d (zn−1, zn+1)]
≤ k
8[d (xn−1, xn) + d (yn−1, yn) + d (zn−1, zn)
+d (xn, xn+1) + d (yn, yn+1) + d (zn, zn+1)]
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
796 MARIN BORCUT ET AL 793-802
Tripled fixed points 5
=k
8
[Dxn
+Dyn +Dzn +Dxn+1+Dyn+1
+Dzn+1
],
and therefore
(2.5) Dzn+1≤ k
8
[Dxn
+Dyn +Dzn +Dxn+1+Dyn+1
+Dzn+1
].
By using relations (2.3), (2.4) and (2.5), we get
Dn+1 ≤k
8
[3Dxn
+ 4Dyn + 2Dzn + 3Dxn+1+ 4Dyn+1
+ 2Dzn+1
]≤ k
8
[4Dxn
+ 4Dyn + 4Dzn + 4Dxn+1+ 4Dyn+1
+ 4Dzn+1
]≤ k
2[Dn +Dn+1] .
Therefore, for all n ≥ 1, we have
Dn+1 ≤ α ·Dn ≤ ... ≤ αn ·D1, where α =k
2− k∈ [0, 1), when k ∈ [0, 1).
Because Dxn+1 ≤ Dn+1, Dyn+1 ≤ Dn+1 and Dzn+1 ≤ Dn+1, then we have
(2.6) Dxn+1≤ αn ·D1, Dyn+1
≤ αn ·D1 and Dzn+1≤ αn ·D1
This implies that xn , yn , zn are Cauchy sequences in X. Indeed, let m ≥ n,then
d (xm, xn) ≤ Dxm+Dxm−1
+ ...+Dxn+1≤
≤ [αm−1 + αm−2 + ...+ αn] ·D1 =αn − αm
1− α·D1 <
αn
1− α·D1.
Similarly, we can verify that yn and zn are also Cauchy sequences. Since Xis a complete metric space, there exist x, y, z ∈ X such that,
limx→∞
xn = x, limx→∞
yn = y, limx→∞
zn = z.
Finally, we claim that
x = F (x, y, z) , y = F (y, x, y) and z = F (z, y, x) .
Assume the first assumption (a) holds. This means F is continuous at (x, y, z) ,and hence, for a given ε
2 > 0, there exists a δ > 0 such that,
d ((x, y, z), (u, v, w)) = d (x, u) + d (y, v) + d (z, w) < δ
⇒ d (F (x, y, z) , F (u, v, w)) <ε
2.
Sincelimx→∞
xn = x, limx→∞
yn = y, limx→∞
zn = z,
for η = min(ε2 ,
δ2
), there exist n0,m0, p0 such that, for n ≥ n0,m ≥ m0, p ≥ p0,
d (xn, x) < η, d (yn, y) < η, d (zn, z) < η.
Now, for n ∈ N, n ≥ max n0,m0, p0 , we have
d (F (x, y, z) , x) ≤ d (F (x, y, z) , xn+1) + d (xn+1, x)
= d (F (x, y, z) , F (xn, yn, zn)) + d (xn+1, x) <ε
2+ η ≤ ε,
and this implies that x = F (x, y, z) . Similarly, we can show that
y = F (y, x, y) and z = F (z, y, x) .
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
797 MARIN BORCUT ET AL 793-802
6 M. Borcut, M. Pacurar and V. Berinde
Suppose now that (b) holds. Since xn , zn are non-decreasing and xn → x,zn → z, and also yn is non-increasing and yn → y, from (b) we have xn ≤ x, yn ≥y and zn ≤ z, for all n. Then by triangle inequality and (2.1), we get
(2.7) d (x, F (x, y, z)) ≤ d (x, xn+1) + d (xn+1, F (x, y, z))
= d (x, xn+1) + d (F (xn, yn, zn), F (x, y, z))
≤ d (x, xn+1) +k
8[d(xn, xn+1) + d(yn, yn+1) + d(zn, zn+1)
+d(x, F (x, y, z)) + d(y, F (y, x, y)) + d(z, F (z, y, x))],
(2.8) d(y, F (y, x, y)) ≤ d (y, yn+1) +k
8[d(xn, xn+1) + 2d(yn, yn+1)
+d(x, F (x, y, z)) + 2d(y, F (y, x, y))],
and
(2.9) d(z, F (z, y, x)) ≤ d (z, zn+1) +k
8[d(xn, xn+1) + d(yn, yn+1) + d(zn, zn+1)
+d(x, F (x, y, z)) + d(y, F (y, x, y)) + d(z, F (z, y, x))].
By summing (2.7), (2.8), (2.9) we obtain
d(x, F (x, y, z)) + d(y, F (y, x, y)) + d(z, F (z, y, x))
≤ 2
2− k[d (x, xn+1) + d (y, yn+1) + d (z, zn+1)]
+k
4(2− k)[3d(xn, xn+1) + 4d(yn, yn+1) + 2d(zn, zn+1)],
and let n→∞ one obtains
d (x, F (x, y, z)) + d(y, F (y, x, y)) + d(z, F (z, y, x)) ≤ 0,
that is, x = F (x, y, z), y = F (y, x, y), z = F (z, y, x).
3. Uniqueness of tripled fixed points
In [6], [7] and [8] the authors also considered some additional conditions to ensurethe uniqueness of the tripled fixed point and also appropriate conditions to ensurethat for such a tripled fixed point (x, y, z) we have all components equal: x = y = z.
Similarly, one can prove that the tripled fixed point ensured by Theorem 4 is infact unique, provided that the product space X ×X ×X endowed with the partialorder mentioned earlier possesses an additional property.
Theorem 5. If, in addition to the hypotheses of Theorem 4, the condition: forevery (x, y, z) , (x1, y1, z1) ∈ X ×X ×X, there exists a (u, v, w) ∈ X ×X ×X thatis comparable to (x, y, z) and (x1, y1, z1), is satisfied, then the tripled fixed point ofF is unique.
Proof. If (x∗, y∗, z∗) ∈ X×X×X is another tripled fixed point of F, then we showthat
d ((x, y, z) , (x∗, y∗, z∗)) = 0,
where
limx→∞
xn = x, limx→∞
yn = y, limx→∞
zn = z.
We consider two cases.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
798 MARIN BORCUT ET AL 793-802
Tripled fixed points 7
Case 1. If (x, y, z) is comparable to (x∗, y∗, z∗) with respect to the ordering inX ×X ×X then, for every n = 0, 1, 2, . . . , the triple
(Fn (x, y, z) , Fn (y, x, y) , Fn (z, y, x)) = (x, y, z) is comparable to
(Fn (x∗, y∗, z∗) , Fn (y∗, x∗, y∗) , Fn (z∗, y∗, x∗)) = (x∗, y∗, z∗) .
Also, using the process for obtaining (2.6), we get
d ((x, y, z) , (x∗, y∗, z∗)) = d (x, x∗) + d (y, y∗) + d (z, z∗)
= d (Fn (x, y, z) , Fn (x∗, y∗, z∗)) + d (Fn (y, x, y) , Fn (y∗, x∗, y∗))
+d (Fn (z, y, x) , Fn (z∗, y∗, x∗))
≤ αn [d (x, x∗) + d (y, y∗) + d (z, z∗)] = αnd ((x, y, z) , (y∗, x∗, z∗)) , α ∈ [0, 1).
By letting n→∞, this implies that d ((x, y, z) , (y∗, x∗, z∗)) = 0.Case 2 : If (x, y, z) are not comparable to (x∗, y∗, z∗) , then there exists an upper
bound or a lower bound (u, v, w) ∈ X ×X ×X of (x, y, z) and (x∗, y∗, z∗) . Then,for all n = 1, 2, ...,
(Fn (u, v, w) , Fn (v, u, v) , Fn (w, v, u)) is comparable to
(Fn (x, y, z) , Fn (y, x, y) , Fn (z, y, x)) = (x, y, z) and to
(Fn (x∗, y∗, z∗) , Fn (y∗, x∗, y∗) , Fn (z∗, y∗, x∗)) = (x∗, y∗, z∗) .
We have,
d
xyz
,
x∗
y∗
z∗
= d
Fn (x, y, z)Fn (y, x, y)Fn (z, y, x)
,
Fn (x∗, y∗, z∗)Fn (y∗, x∗, y∗)Fn (z∗, y∗, x∗)
≤ d
Fn (x, y, z)Fn (y, x, y)Fn (z, y, x)
,
Fn (u, v, w)Fn (v, u, v)Fn (w, v, u)
+d
Fn (u, v, w)Fn (v, u, v)Fn (w, v, u)
,
Fn (x∗, y∗, z∗)Fn (y∗, x∗, y∗)Fn (z∗, y∗, x∗)
≤ αn [d (x, u) + d (y, v) + d (z, w)] + [d (u, x∗) + d (v, y∗) + d (w, z∗)] → 0
as n→∞, and so d
xyz
,
x∗
y∗
z∗
= 0.
Theorem 6. In addition to the hypotheses of Theorem 4, suppose that x0, y0, z0 ∈X are comparable. Then x = y = z.
Proof. Recall that x0, y0, z0,∈ X are such that
x0 ≤ F (x0, y0, z0), y0 ≥ F (y0, x0, y0), z0 ≤ F (z0, y0, x0).
Now, if x0 ≤ y0, and z0 ≤ y0 we claim that, for all n ∈ N, xn ≤ yn and zn ≤ yn.Indeed, by the mixed monotone property of F,
x1 = F (x0, y0, z0) ≤ F (y0, x0, y0) = y1
and
z1 = F (z0, y0, x0) ≤ F (y0, x0, y0) = y1.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
799 MARIN BORCUT ET AL 793-802
8 M. Borcut, M. Pacurar and V. Berinde
Assume that xn ≤ yn and zn ≤ yn for some n. Then
xn+1 = Fn+1(x0, y0, z0) = F (Fn(x0, y0, z0), Fn(y0, x0, y0), Fn(z0, y0, x0))
= F (xn, yn, zn) ≤ F (yn, xn, yn) = yn+1,
and similarly for zn. Now,
d(x, y) ≤ d(x, xn+1) + d(y, xn+1) ≤ d(x, xn+1) + d(xn+1, yn+1) + d(y, yn+1)
= d(x, Fn+1(x0, y0, z0)) + d [F (Fn(x0, y0, z0), Fn(y0, x0, y0), Fn(z0, y0, x0)),
, F (Fn(y0, x0, y0), Fn(x0, y0, x0), Fn(y0, x0, y0))] + d(y, yn+1)→ 0
as n→∞.This implies that d(x, y) = 0 and hence we have x = y.Similarly, we obtain that d(x, z) = 0 and d(y, z) = 0. The other cases for x0, y0, z0
are similar.
4. Example and final remarks
Let X = [0, 1] be endowed with the usual metric d (x, y) = |x − y| and let
F : X3 → X be given by F (x, y, z) =1
20, for (x, y, z) ∈
[0,
4
5
]× [0, 1]2 and
F (x, y, z) =11
80, for (x, y, z) ∈
[4
5, 1
]× [0, 1]2.
Then F satisfies Chatterjea’s contractive condition (2.1) with k =14
15< 1 but
does not satisfy the Banach type contractive condition (1.1).Let us first prove the first part of the assertion above. It suffices to completely
cover the following limit case.
Case 1. x ∈[
4
5, 1
], and u, y, z, v, w ∈
[0,
4
5
)In this case F (x, y, z) =
11
80, F (u, v, w) =
1
20and so condition (2.1) reduces to
(4.1)∣∣∣∣11
80− 1
20
∣∣∣∣ ≤ k
8
[∣∣∣∣x− 1
20
∣∣∣∣+
∣∣∣∣y − 1
20
∣∣∣∣+
∣∣∣∣z − 1
20
∣∣∣∣+
∣∣∣∣u− 11
80
∣∣∣∣+
∣∣∣∣v − 1
20
∣∣∣∣+
∣∣∣∣w − 1
20
∣∣∣∣] .For x ∈
[4
5, 1
], we have ∣∣∣∣x− 1
20
∣∣∣∣ ≥ ∣∣∣∣45 − 1
20
∣∣∣∣ =3
4
and hence the minimum value of the right hand side of (4.1) is greater or equal tok
8· 3
4.
Therefore, in order to have (4.1) satisfied for all x ∈[
4
5, 1
]and u, y, z, v, w ∈[
0,4
5
), with x ≥ u, y ≤ v, z ≥ w, i.e.,∣∣∣∣ 1
20− 11
80
∣∣∣∣ ≤ k
8· 3
4,
it suffices to take k such that14
15≤ k < 1.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
800 MARIN BORCUT ET AL 793-802
Tripled fixed points 9
Note that for the remaining cases to be discussed, the right hand side of (2.1)will be greater than the value obtained in Case 1.
For example, in the Case 2. x, v ∈[
4
5, 1
]and u, y, z, w ∈
[0,
4
5
), the minimum
value of the right hand side of (2.1) will be greater or equal tok
8· 6
4.
Note also that in the cases x, u ∈[
4
5, 1
]or x, u ∈
[0,
4
5
), the left hand side of
(2.1) is always zero and so (1.2) is satisfied for all values of y, z, v, w ∈ [0, 1].
This proves that, indeed, F satisfies (2.1) with k =14
15< 1.
F is not continuous but X satisfies property (b) in Theorem 4. Moreover, by
taking x0 = 0, y0 =1
5and z0 =
1
8, one can check that (2.2) is fulfilled. Thus,
all assumptions in Theorem 4 are satisfied and hence F does admit tripled fixedpoints. By Theorem 5 we actually conclude that F has a unique tripled fixed point,(
1
20,
1
20,
1
20
).
Now let us show that F does not satisfy (1.1).Assume the contrary, that is, that F does satisfy (1.1) and take ε > 0 such that
u =4
5− ε ∈
[0,
4
5
), x =
4
5and y = z, v = w ∈ [0, 1] arbitrary in (1.1) to obtain
(4.2)7
80≤ i · ε, ε > 0.
Now letting ε → 0 in (4.2) we reach to a contradiction. This proves that, indeed,F does not satisfy (1.1).
Acknowledgements
The research was supported by the Grant PN-II-RU-TE-2011-3-0239 of the Ro-manian Ministry of Education and Research.
References
[1] Abbas, M., Ali Khan, M., Radenovic, S., Common coupled fixed point theorems in cone
metric spaces for w-compatible mappings, Appl. Math. Comput. 217 (2010), no. 1, 195–202[2] Altun, I., Damjanovic, B. Djoric, D., Fixed point and common fixed point theorems on ordered
cone metric spaces, Appl. Math. Lett. 23 (2010), no. 3, 310-316[3] Altun, I., Rakocevic, V., Ordered cone metric spaces and fixed point results, Comput. Math.
Appl. 60 (2010), no. 5, 1145–1151[4] Beg, I., Abbas, M., Fixed points and invariant approximation in random normed spaces,
Carpathian J. Math. 26 (2010), no. 1, 36–40[5] Berinde, V., Iterative approximation of fixed points. Second edition, Lecture Notes in Math-
ematics, 1912, Springer, Berlin, 2007[6] Berinde, V.,Borcut, M., Tripled fixed point theorems for contractive type mappings in partially
ordered metric spaces, Nonlinear Anal. , 74 (2011) 4889-4897.[7] Borcut, M., Berinde, V., Tripled coincidence theorems for contractive type mappings in par-
tially ordered metric spaces , Aplied Mathematics and Computation, 218 (10) (2012) pp.5929-5936
[8] Borcut, M., Tripled coincidente point theorems for contractive type mappings in partiallyordered metric spaces, Aplied Mathematics and Computation, 218 (2012) pp. 7339-7346
[9] Borcut, M., Tripled fixed point theorems for monotone contractive type mappings in partially
ordered metric spaces, Carpathian J. MAath., 28 (2012), No. 2, 207-214.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
801 MARIN BORCUT ET AL 793-802
10 M. Borcut, M. Pacurar and V. Berinde
[10] Borcut, M., Tripled coincidente point theorems for monotone contractive type mappings in
partially ordered metric spaces, Creative Mathematics and Informatics, 21 (2012), No. 2,
135-142.[11] Borcut, M., Tripled fixed point theorems for operators which verify the contraction-type condi-
tion Kannan in partially ordered metric spaces, Applied Mathematical Sciences, (Submitted).
[12] Borcut, M., Tripled fixed point theorems in partially ordered metric spaces, Hacettepe Journalof Mathematics and Statistics (Submited).
[13] Borcut, M., Tripled coincidente point theorems for monotone φ-contractive type mappings in
partially ordered metric spaces, Filomat J. (submitted).[14] Gnana Bhaskar, T., Lakshmikantham, V., Fixed point theorems in partially ordered metric
spaces and applications, Nonlinear Anal. 65 (2006), no. 7, 1379–1393
[15] Harjani, J; Lopez, B; Sadarangani, K. Fixed point theorems for mixed monotone oper-ators and applications to integral equations , Nonlinear Anal. 74 (2011), 1749–1760.
[16] Kannan, R. Some results on fixed points,, Bull. Calcutta Math. Soc., 10 (1968), 71-76[17] Karapinar, E., Coupled fixed point theorems for nonlinear contractions in cone metric spaces,
Comput. Math. Appl., 59 (2010), no. 12, 3656–3668
[18] Lakshmikantham, V., Ciric, L., Coupled fixed point theorems for nonlinear contractions in
partially ordered metric spaces, Nonlinear Anal. 70 (2009), 4341-4349
[19] Nguyen V. L., Nguyen X. T., Coupled fixed points in partially ordered metric spaces andapplication, Nonlinear Anal., 74 (2011), 983–992
[20] Nieto,Juan J.; Rodriguez-Lopez, Rosana., Existence and uniqueness of fixed point in
partially ordered sets and applications to ordinary differential equations , Acta. Math. Sin.,(Engl. Ser.) 23(2007), no. 12, 2205–2212 .
[21] Ran, A. C. M., Reurings, M. C. B., A fixed point theorem in partially ordered sets and some
applications to matrix equations, Proc. Amer. Math. Soc. 132 (2004), no. 5, 1435–1443[22] Rus, I. A., Generalized Contractions and Applications, Cluj University Press, Cluj-Napoca,
2001[23] Rus, I. A., Petrusel, A., Petrusel, G., Fixed Point Theory, Cluj University Press, Cluj-Napoca,
2008
[24] Rus, M-D., Fixed point theorems for generalized contractions in partially ordered metricspaces with semi-monotone metric, Nonlinear Anal.
[25] Sabetghadam, F., Masiha, H.P., Sanatpour, A.H., Some coupled fixed point theorems in cone
metric spaces, Fixed Point Theory. Appl., 2009, Art. ID 125426, 8 pp[26] Samet, B., Coupled fixed point theorems for a generalized Meir-Keeler contraction in partially
ordered metric spaces, Nonlinear Anal., 72 (2010), no. 12, 4508–4517
[27] Sedghi, S., Altun, I., Shobe, N., Coupled fixed point theorems for contractions in fuzzy metricspaces, Nonlinear Anal., 72 (2010), no. 3-4, 1298–1304
Department of Mathematics and Computer ScienceNorth University of Baia MareVictoriei 76, 430122 Baia Mare ROMANIAE-mail: [email protected]
Department of Mathematics and Computer ScienceNorth University of Baia MareVictorie1 76, 430072 Baia Mare ROMANIAE-mail: [email protected]; vasile [email protected];
Department of Statistics, Analysis, Forecast and MathematicsFaculty of Economics and Bussiness AdministrationBabes-Bolyai University of Cluj-Napoca56-60 T. Mihali St., 400591 Cluj-Napoca ROMANIAE-mail: [email protected]
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
802 MARIN BORCUT ET AL 793-802
SOFT BOOLEAN ALGEBRA AND ITS PROPERTIES
RIDVAN SAHIN AND AHMET KUCUK
Abstract. Molodtsov [21] introduced the concept of soft theory which can be
used as a generic mathematical tool for dealing with uncertainty. In this paper,we apply the notion of the soft set theory of Molodtsov to the theory of Boolean
algebras which is a well-known algebraic structure. We introduce the concepts
of soft filter and soft ideal on the soft Boolean algebra as well as notions of asoft Boolean algebra and soft Boolean homomorphism, and investigate basic
properties as intersection, union and product of the soft Boolean algebras.
Also we give several illustrative examples.
1. Indroduction
In 1999, Molodtsov [21] initiated the theory of soft sets as a new mathematicaltool to deal with uncertainties while modelling the problems in engineering, physics,computer science, economics, social sciences, and medical science. Maji et al. [18]showed the applications of soft set theory in decision making problem by definingseveral operations on soft set. In theoretical aspects, Maji et al. [19] introducedseveral operators for soft set theory such as equality of two soft sets, subset andsuperset of a soft set, complement of a soft set, null soft set, and absolute soft set.Recently, some new operations in soft set theory has been given by Irfan Ali et al.in [2], also see [23]. Later, the properties and applications of soft set theory havebeen studied by many authors (e.g. [3, 5, 14, 15, 17, 20, 22, 25, 26] ).
At present, studies on the soft set theory is progressing rapidly on algebraicstructures. Aktas and Cagman [1] defined a basic version of soft group theory.Sezgin et al. [24] introduced the concepts of normalistic soft group and normalisticsoft group homomorphism. Feng et al. [4] studied soft semi rings. Jun et al.[9, 11] applied soft sets in the theories of BCK/BCI-algebras. Kazancı et al. [13]introduced soft BCH-algebras and studied their basic properties. Several otherstudies on soft BCH-algebras have been discussed in [7, 8, 10]. Jun et al. [12]applied the notion of the soft sets to the theory of Hilbert algebras.
In this paper, we apply the notion of the soft set theory of Molodtsov to thetheory of Boolean algebras. We introduce the concepts of soft filter and soft idealon the soft Boolean algebra as well as concept of a soft Boolean algebra. We alsoinvestigate basic properties as intersection, union and product of the soft Booleanalgebras, and define soft Boolean homomorphism and obtain some properties. Alsowe give several illustrative examples.
This paper is organized as follows. In the next two sections, we give someimportant concepts of Boolean algebra and basic definitions of soft set theory. In
1991 Mathematics Subject Classification. 2010 Primary 06D72; Secondary 54A40.Key words and phrases. Boolean algebra, soft set, soft Boolean algebra, atomic soft Boolean
algebra, complete soft Boolean algebra, soft Boolean homomorphism.
1
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
803 RIDVAN SAHIN ET AL 803-814
2 RIDVAN SAHIN AND AHMET KUCUK
Section 4, we present the definition of soft Boolean algebra and some properties ofsoft Boolean algebra. Finally, we summary the paper in Section 5.
2. Basic Results on Boolean Algebras
In the middle of the 19th century, George Boole introduced the concept ofBoolean algebras by attempting to formalize propositional logic. Boolean algebranow plays a central role in mathematical logic, probability theory and computerdesign. In this section, we give some basic notions in Boolean algebra. For moredetails on Boolean algebras, we refer the reader to [6, 16].
Definition 1. A Boolean algebra is a tuple (K,∧,∨,¬, 0, 1) (briefly K), where Kis a set with two distinguished elements 0, 1 ∈ K, ¬ : K → K is a unary operationand ∧,∨ : K × K → K are binary operations (called meet and join, respectively)such that
(1) ∧,∨ are associative,(2) ∧,∨ are commutative,(3) ∧ and ∨ are distributive, i.e. ∀x, y, z ∈ B : x ∧ (y ∨ z) = (x ∧ y) ∨ (x ∧ y)
and x ∨ (y ∧ z) = (x ∨ y) ∧ (x ∨ z),(4) ∀x ∈ K : x ∧ ¬x = 0 and x ∨ ¬x = 1.
Let K be a Boolean algebra and x, y ∈ K. Then K carries a natural partialorder. In other words, an relation ”≤ ” defined x ≤ y if x = x ∧ y or x ∨ y = y,is an ordering relation on K, where x ∨ y and x ∧ y are least upper bound andgreatest lower bound of x, y, respectively. The element 0 in Boolean algebra Kis called to be zero element if x ∨ 0 = 0 ∨ x = x and x ∧ 0 = 0 ∧ x = 0 for anyx ∈ K. Similarly, the element 1 in Boolean algebra K is called to be unit elementif x ∨ 1 = 1 ∨ x = 1 and x ∧ 1 = 1 ∧ x = x for any x ∈ K.
Remark 1. Let K be a Boolean algebra, X be any set and P (X) its power set.Then
(1) (P (X),∩,∪,−,∅, X), where ”−” is the complement operation of sets, is aBoolean algebra of sets.
(2) For x and y in the Boolean algebra K, x y if x ≤ y does not hold. x < y(x is strictly smaller than y) if x ≤ y but x 6= y.
Notation 1. Throughout this article, we assume that ”≤” is a natural partial orderdefined on natural integer N.
Definition 2. Let K be a Boolean algebra. Then
(1) a ∈ K is an atom of K, if 0 < a but there is no x in K satisfying 0 < x < a.K is atomless if it has no atoms and atomic if for each positive element x(i.e., x 6= 0) of K, there is some atom a such that a ≤ x.
(2) For any S ⊆ K with S 6= ∅, K is complete iff both inf(S) and sup(S) existfor every nonempty subset S of K.
Definition 3. Let K be a Boolean algebra.
(1) A nonempty subset M of K is said to be a subalgebra of K if x, y ∈ Mimplies x ∨ y, x ∧ y and ¬x ∈ M . Moreover, note that every Booleanalgebra is itself a subalgebra.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
804 RIDVAN SAHIN ET AL 803-814
SOFT BOOLEAN ALGEBRA 3
(2) A filter on K is a subset F of K such that:(i) 0 /∈ F, 1 ∈ F ; (ii) if x ∈ F and y ∈ F , then x ∧ y ∈ F ; (iii) if
x, y ∈ K, x ∈ F and x ≤ y, then y ∈ F .(3) An ideal on K is a subset I of K such that:
(i) 0 ∈ I, 1 /∈ I; (ii) if x ∈ I and y ∈ I, then x ∨ y ∈ I; (iii) if x, y ∈ K,x ∈ I and y ≤ x, then y ∈ I.
Definition 4. Let K and L be two Boolean algebras. A mapping φ : K → L iscalled a (Boolean) homomorphism if it preserves the operations: φ(a ∧ b) = φ(a) ∧ φ(b)
φ(a ∨ b) = φ(a) ∨ φ(b)φ(¬a) = ¬φ(a)
for all a, b ∈ K. If φ is bijective, then it is called a (Boolean) isomorphism. If thereis a Boolean isomorphism φ : K → L, then K and L are said to be isomorphic, anddenoted by K ' L.
3. Basic Results on Soft Sets
In this paper, U is an initial universe set, P (U) its power set and E is alwaysthe universe set of parameters with respect to U unless otherwise specified.
Now, we recall some basic notions in soft set theory.
Definition 5. [19, 20]. A pair (F,A) is called a soft set over U if A ⊆ E andF : A −→ P (U), such that F (x) 6= ∅, if x ∈ A ⊆ E and F (x) = ∅ if x /∈ A.
Definition 6. [3]. Let U be an initial universe set and E be a universe set ofparameters. Let (F,A) and (G,B) be soft sets over a common universe set U andA,B ⊆ E. Then
(1) (F,A) is a subset of (G,B), denoted by (F,A)⊆(G,B), if(i) A ⊆ B; (ii) F (x) ⊆ G(x) for all x ∈ A,
(2) (F,A) equals (G,B), denoted by (F,A) = (G,B), if (F,A)⊆(G,B) and(G,B)⊆(F,A).
Definition 7. [19]. Let (F,A) and (G,B) be two soft sets over a common universeU. The union of (F,A) and (G,B) is defined to be a soft set (H,C), where C = A∪Band H is defined as follows:
H(x) =
F (x)G(x)F (x) ∪G(x)
if x ∈ A−Bif x ∈ B −Aif x ∈ A ∩B
We write (H,C) = (F,A)∪(G,B).
Definition 8. [19]. Let (F,A) and (G,B) be two soft sets over a common universeU . The intersection of (F,A) and (G,B) is defined to be a soft set (H,C) satisfyingthe following conditions:
(1) C = A ∩B,(2) H(x) = F (x) or G(x) for each x ∈ C (as both are same set).
We write (H,C) = (F,A)∩(G,B).
Definition 9. [19]. Let (F , A) and (G, B) be soft sets over a common universeset U.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
805 RIDVAN SAHIN ET AL 803-814
4 RIDVAN SAHIN AND AHMET KUCUK
(1) (F,A)∧(G,B) is a soft set defined by (F,A)∧(G,B) = (H,A × B), whereH(x, y) = F (x)∩G(y) for any x ∈ A and y ∈ B, where ∩ is the intersectionoperation of sets.
(2) (F,A)∨(G,B) is a soft set defined by (F,A)∨(G,B) = (K,A × B), whereK(x, y) = F (x) ∪ G(y) for any x ∈ A and y ∈ B, where ∪ is the unionoperation of sets.
4. Soft Boolean Algebras
Let K be a Boolean algebra and A be a nonempty set. R will refer to an arbitrarybinary relation between an element of A and an element of K; that is, R is a subsetof A ×K unless otherwise specified. A set-valued function F : A → P (K) can bedefine as F (x) = y ∈ K : (x, y) ∈ R for all x ∈ A. Then the pair (F,A) is a softset over K, which is derived from the relation R.
Definition 10. Let (F,A) be a soft set over K. Then (F,A) is called a soft Booleanalgebra over K if F (x) is a subalgebra of K for all x ∈ A.
Example 1. Let K = 1, 2, 3, 6 be set of all divisors of 6. Consider x ∧ y =mcd(x, y) (2 ∧ 3 = 1, 2 ∧ 6 = 2), x ∨ y = mcm(x, y)(2 ∨ 3 = 6, 2 ∨ 6 = 6) and¬x = 6
x (¬2 = 3). Then the structure 〈K,∧,∨,¬, 1, 6〉 is a Boolean algebra underthe relation ” ” which is given by x y if x = x ∧ y or x ∨ y = y.
Let (F,A) be a soft set over K, where A = K and F : A −→ P (K) is a set-valuedfunction defined by
F (x) =
y ∈ K : xRy ⇐⇒
y ∈ 1, 6 if x /∈ 2, 3y if x ∈ 2, 3
Then F (1) = F (6) = 1, 6 , F (2) = F (3) = 1, 2, 3, 6 . Therefore, F (x) is asubalgebra of K for all x ∈ A. Hence (F,A) is a soft Boolean algebra over K.
Now, let (G,B) be a soft set over K, where B = K and G : B −→ P (K) is aset-valued function defined by
G (x) = y ∈ K : xR′y ⇐⇒ mcd(x, y) ≤ mcm(x, y) .
Then G(1) = G(2) = G(3) = G(6) = 1, 2, 3, 6 = K. Hence G(x) is a subalgebraof K for all x ∈ B. Then (G,B) is a soft Boolean algebra over K.
Example 2. Let M = a, b, c be a set and K = FUN(M, 0, 1) be the set of allfunctions from M and to 0, 1. Define the Boolean operations on K as follows forall f, g ∈ K:
(f ∨ g)(x) = max f(x), g(x) , (f ∧ g)(x) = min f(x), g(x) and ¬f(x) =0, 1 − f(x) for all x ∈ A. Then K together with these operations is a Booleanalgebra and consists of elements f1, f2, f3, f4, f5, f6, f7, f8 defined by
f1(a) = 0 f2(a) = 1 f3(a) = 1f1(b) = 0 f2(b) = 1 f3(b) = 0f1(c) = 0 f2(c) = 1 f3(c) = 0
f4(a) = 1f4(b) = 1f4(c) = 0
f5(a) = 1 f6(a) = 0 f7(a) = 0f5(b) = 0 f6(b) = 1 f7(b) = 0f5(c) = 1 f6(c) = 1 f7(c) = 1
f8(a) = 0f8(b) = 1f8(c) = 0
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
806 RIDVAN SAHIN ET AL 803-814
SOFT BOOLEAN ALGEBRA 5
Let (F,A) be a soft set over K, where A = M and F : A −→ P (K) is a set-valuedfunction defined by
F (x) =
f ∈ K : xRf ⇐⇒
f(a) = f(c) if x = af(b) = f(a) if x = bf(c) = f(b) if x = c
Then F (a) = f1, f2, f5, f8 , F (b) = f1, f2, f4, f7 and F (c) = f1, f2, f3, f6 .Therefore, F (x) is a subalgebra of K for all x ∈ A. Hence (F,A) is a soft Booleanalgebra over K.
Example 3. Every Boolean algebra can be considered as a soft Boolean algebra.
Theorem 1. Let (F,A) and (G,B) be two soft Boolean algebras over K. If A∩B 6=∅, then (F,A)∩(G,B) is a soft Boolean algebra over K.
Proof. By Definition 8, we can write (F,A)∩(G,B) = (H,C), where C = A ∩ Band H(x) = F (x) or G(x) for all x ∈ C. For a mapping H : C −→ P (K), (H,C) isa soft set over K. Since (F,A) and (G,B) are soft Boolean algebras over K, thereexists an equality such that H(x) = F (x) or H(x) = G(x) for all x ∈ C. But ineither case, H(x) is a subalgebra of K for all x ∈ C. Hence (H,C) = (FA)∪(G,B)is a soft Boolean algebra over K.
Theorem 2. Let (F,A) and (G,B) be two soft Boolean algebras over K. If A andB are disjoint, then (F,A)∪(G,B) is a soft Boolean algebra over K.
Proof. By Definition 7, we can write (F,A)∪(G,B) = (H,C), where C = A ∪ Band for all x ∈ C,
H(x) =
F (x)G(x)F (x) ∪G(x)
if x ∈ A−Bif x ∈ B −Aif x ∈ A ∩B
Since A ∩ B = ∅, either x ∈ A − B or x ∈ B − A. Since (F,A) is a soft Booleanalgebra over K, then H(x) = F (x) is a subalgebra of K for x ∈ A− B. Similarty,since (G,B) is a soft Boolean algebra over K, then H(x) = G(x) is a subalgebraof K for x ∈ B − A. Hence (H,C) is a soft Boolean algebra over K and so(H,C) = (F,A)∪(G,B) is a soft Boolean algebra over K.
Remark 2. Let K be a Boolean algebra and S be a non-empty family of subalgebrasof K. Note that intersection of members of S is again a subalgebra of K. But thisis not correct for union. So Theorem 2 does not hold in general if A ∩B 6= ∅.
Theorem 3. Let (F,A) and (G,B) be two soft Boolean algebras over K, then(F,A)∧(G,B) is a soft Boolean algebra over K.
Proof. By Definition 9, we have
(F,A)∧(G,B) = (H,A×B)
where H(x, y) = F (x)∩G(y) for all x ∈ A and y ∈ B. Since (F,A) and (G,B) aresoft Boolean algebras overK, then F (x) andG(y) are subalgebras ofK for all x ∈ A,y ∈ B and so the intersection F (x)∩G(y) is also a subalgebra of K. Hence H(x, y)is a subalgebra of K for all x ∈ A and y ∈ B. Then (F,A)∧(G,B) = (H,A×B) isa soft Boolean algebra over K.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
807 RIDVAN SAHIN ET AL 803-814
6 RIDVAN SAHIN AND AHMET KUCUK
Theorem 4. Let (F,A) be a soft Boolean algebra over K. If B is a subset of A,then (F |B , B) is a soft Boolean algebra over K.
Proof. Since (F,A) is a soft Boolean algebra over K, then F (x) is a subalgebra ofK for all x ∈ A. Therefore, F (x) is also a subalgebra of K for all x ∈ B ⊆ A.Hence (F |B , B) is a soft Boolean algebra over K.
Proposition 1. Let (G,B) be a soft set over K and (Fα, Aα) be a soft Booleanalgebra over K for α ∈ Λ, where Λ is an index set. Then
〈(G,B)〉 = ∩(Fα, Aα) : (G,B) ⊆ (Fα, Aα) ,where (Fα, Aα) is a soft Boolean algebra over K for α ∈ Λ, is a soft Boolean algebraover K. We say that 〈(G,B)〉 is a soft Boolean algebra over K, which is generatedby (G,B) .
Definition 11. Let (F,A) and (G,B) be two soft Boolean algebras over K. Then(G,B) is a soft subalgebra of (F,A), denoted by (G,B)<(F,A), if
(1) B ⊆ A,(2) G(x) is a subalgebra of F (x) for all x ∈ B.
Example 4. Let (F,A) be a soft set over K and A = K, where K is the Booleanalgebra given in Example 1 and F : A→ P (K) is a set-valued function defined by
F (x) = y ∈ K : xRy ⇔ mcd(x, y) ≤ x.Then F (1) = F (2) = F (3) = F (6) = 1, 2, 3, 6 = K for all x ∈ A and hence (F,A)is a soft Boolean algebra over K.
Let B = 1, 2, 3 and G : B → P (K) be the set-valued function defined by
G(x) = 1 ∪ y ∈ K : xR′y ⇔ x ≺ y,where ” ≺ ” is the operation (strictly) defined on K for all x ∈ B. Then G(1) =1, 2, 3, 6, G(2) = G(3) = 1, 6 and hence (G,B) is a soft Boolean algebra overK. Moreover, since G(x) is a subalgebra of F (x) for all x ∈ B, then (G,B) is asoft subalgebra of (F,A).
The class of all soft subalgebras of a soft Boolean algebra (F,A) is a completelattice under the relation of being a soft subalgebra (<).
Theorem 5. Let (F,A) and (G,A) be two soft Boolean algebras over K.
(1) If G(x) ⊆ F (x) for all x ∈ A, then (G,A)<(F,A).(2) If (F,A) is a soft Boolean algebra over K such that F (x) = 0, 1 for all
x ∈ A, then (F,A)<(G,B) where (G,B) is any soft Boolean algebra overK.
Proof. The proof is clear.
Theorem 6. (F,A) is a soft Boolean algebra over K and (Gα, Bα) : α ∈ Λ is anonempty family of soft subalgebras of (F,A), where Λ is an index set. Then
(1) ∩α∈Λ (Gα, Bα) is a soft subalgebra of (F,A),(2) ∧α∈Λ (Gα, Bα) is a soft subalgebra of (F,A),(3) ∨α∈Λ (Gα, Bα) is a soft subalgebra of (F,A) if Bα∩Bβ = ∅ for all α, β ∈ Λ.
Proof. The proof is clear.
Definition 12. Let (F,A) be a soft Boolean algabra over K. Then
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
808 RIDVAN SAHIN ET AL 803-814
SOFT BOOLEAN ALGEBRA 7
(1) (F,A) is said to be an identity soft Boolean algebra over K if F (x) = 0, 1for all x ∈ A, where 0 and 1 is two distinguished elements of K.
(2) (F,A) is said to be an absolute soft Boolean algebra over K if F (x) = Kfor all x ∈ A.
Example 5. Consider the Boolean algebra K = FUN (M, 0, 1) which is givenExample 2. Let (F,A) be a soft set over K, A = M and F : A → P (K) be aset-valued function defined by
F (x) = f ∈ K : xRf ⇔ f(x) ∈ 0, 1
for all x ∈ A. Then F (a) = F (b) = F (c) = K and so (F,A) is an absolute softBoolean algebra over K.
Next, let (G,B) be a soft set over K, where B = M and G : B → P (K) is aset-valued function defined by
G(x) = f ∈ K : xR′f ⇔ f(x) = f(y) for x 6= y.
Then G(a) = G(b) = G(c) = f1, f2 and hence (G,B) is an identity soft Booleanalgebra over K.
Definition 13. Let (F,A) be a soft Boolean algebra over K. A soft set (G,B)over K is called a soft filter on (F,A), denoted by (G,B)B(F,A), if it satisfies thefollowing conditions:
(1) B ⊆ A,(2) G(x) is a filter of F (x) for all x ∈ B.
Definition 14. Let (F,A) be a soft Boolean algebra over K. A soft set (G,B)over K is called a soft ideal on (F,A), denoted by (G,B)C(F,A), if it satisfies thefollowing conditions:
(1) B ⊆ A,(2) G(x) is an ideal of F (x) for all x ∈ B.
Example 6. Let (F,A) be soft Boolean algebra over K, which is given in Example5. That is, A = M and F : A→ P (K) is the set-valued function defined by
F (x) = f ∈ K : xRf ⇔ f(x) ∈ 0, 1
such that F (x) = K for all x ∈ A.Let (G,B) be a soft set over K, B = M and G : B → P (K) be a set-valued
function defined by
G(x) = f ∈ K : xRf ⇔ f(x) = 1for all x ∈ B. Then G(a) = f2, f3, f4, f5, G(b) = f2, f4, f6, f8 and G(c) =f2, f5, f6, f7. So G(x) is a filter of F (x) for all x ∈ B. Hence (G,B) is a softfilter on (F,A).
Let C = M and H : C → P (K) be the set-valued function defined by
H(x) = f ∈ K : xRf ⇔ f(x) = 0
for all x ∈ C. Then H(a) = f1, f6, f7, f8, H(b) = f1, f3, f5, f7 and H(c) =f1, f3, f4, f8. So H(x) is an ideal of F (x) for all x ∈ C. Hence (H,C) is a softideal on (F,A).
Remark 3. (F,A) be a soft Boolean algebra over K.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
809 RIDVAN SAHIN ET AL 803-814
8 RIDVAN SAHIN AND AHMET KUCUK
(1) If (G,B) is a soft filter on (F,A), then
(H,C) = F (x)−G(x) : G(x) is a filter of F (x) for all x ∈ Bis a soft ideal on (F,A).
(2) If (H,C) is a soft ideal on (F,A), then
(G,B) = F (x)−H(x) : H(x) is an ideal of F (x) for all x ∈ Cis a soft filter on (F,A). If this is the case we say that (G,B) and (H,C)are dual to each other.
Definition 15. Let (F,A) be a soft Boolean algebra over K and (G,B) a soft setover K such that B ⊆ A. Then
(1) (G,B) is said to be identity soft ideal on (F,A) if G(x) = 0 for everyx ∈ B,
(2) (G,B) is said to be identity soft filter on (F,A) if G(x) = 1 for everyx ∈ B.
Example 7. Let (F,A) be a soft Boolean algebra over K, which is given in Example2 and (G,B) be a soft set over K. Let B = M and G : B → P (K) be a set-valuedfunction defined by
G(x) = f ∈ K : xRf ⇔ f(x) = f(y) = 0 for x 6= yfor all x ∈ B. Then G(a) = G(b) = G(c) = f1 and so (G,B) is an identity softideal on (F,A).
Let C = M and H : C → P (K) be the set-valued function defined by
H(x) = f ∈ K : xRf ⇔ f(x) = f(y) = 1 for x 6= yfor all x ∈ C. Then H(a) = H(b) = H(c) = f2 and so (H,C) is an identity softfilter on (F,A).
Definition 16. Let (F,A) be a soft Boolean algebra over K. Then
(1) (F,A) is called to be an atomic soft Boolean algebra over K, if F (x) is anatomic subalgebra of K for all x ∈ A,
(2) (F,A) is called to be a complete soft Boolean algebra over K, if F (x) is acomplete subalgebra of K for all x ∈ A.
Theorem 7. Let (F,A) be a soft Boolean algebra over K. If K is a finite Booleanalgebra, then (F,A) is a complete and atomic soft Boolean algebra over K.
Proof. Let (F,A) be a soft Boolean algebra over K. Since K is a finite Booleanalgebra, it is both complete and atomic. Therefore, we have that F (x) is a completeand atomic subalgebra of K for all x ∈ A. Hence (F,A) is a complete and atomicsoft Boolean algebra over K.
Definition 17. Let K and L be two Boolean algebras and f : K −→ L be a mappingof Boolean algebras. If (F,A) and (G,B) are soft sets over K and L, respectivelythen
(1) (f(F ), A) is a soft set over L, where f(F ) : A −→ P (L) is defined byf(F )(x) = f(F (x)) for all x ∈ A,
(2) (f−1(G), B) is a soft set over K, where f−1(G) : B −→ P (K) is definedby f−1(G)(y) = f−1(G(y)) for all y ∈ B.
Proposition 2. Let f : K −→ L be an onto Boolean homomorphism. Then
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
810 RIDVAN SAHIN ET AL 803-814
SOFT BOOLEAN ALGEBRA 9
(1) if (F,A) is a soft Boolean algebra over K, then (f(F ), A) is a soft Booleanalgebra over L,
(2) if (G,B) is a soft Boolean algebra over L, then (f−1(G), B) is a soft Booleanalgebra over K if it is non-null.
Proof. Let f : K −→ L be an onto Boolean homomorphism.
(1) Since F (x) is a subalgebra of K and its homomorphic image is a subalgebraof L for all x ∈ A, it follows that f(F )(x) = f(F (x)) is a subalgebra of L.Hence (f(F ), A) is a soft Boolean algebra over L.
(2) Because of the fact that (G,B) is a soft Boolean algebra over L, we haveG(y) is a subalgebra of L for all y ∈ B. Since f is a Boolean homomorphism,its homomophic inverse image f−1(G(y)) is also a subalgebra of K for ally ∈ B. Then (f−1(G), B) is a soft Boolean algebra over K.
Proposition 3. Let (F,A) be a soft Boolean algebra over K and (G,B) be a softsubalgebra of (F,A). If f is a Boolean homomorphism from K to L, then (f(G), B)is a soft subalgebra of (f(F ), A).
Proof. If (G,B) is a soft subalgebra of (F,A), then B ⊆ A and G(x) is a subalgebraof F (x) for all x ∈ B. Since f is a Boolean homomorphism from K to L andhomomorphic image of a subalgebra in K is a subalgebra in L, we have that f(F (x))and f(G(y)) are subalgebras of L for all x ∈ A and y ∈ B. Also, f(G(y)) isa subalgebra of f(F (x)) for all y ∈ B. Hence (f(G), B) is a soft subalgebra of(f(F ), A).
Proposition 4. Let (F,A) be a soft Boolean algebra over L and (G,B) be a soft sub-algebra of (F,A). If f is a Boolean homomorphism from K to L, then (f−1(G), B)is a soft subalgebra of (f−1(F ), A).
Proof. The proof is made similar to Proposition 3.
Proposition 5. Let (F,A) be a soft Boolean algebra over K and (G,B) be a softset over K. Suppose that f is a Boolean homomorphism from K to L. Then
(1) if (G,B) is a soft filter on (F,A) then (f(G), B) is a soft filter on (f(F ), A)(2) if (G,B) is a soft ideal on (F,A) then (f(G), B) is a soft ideal on (f(F ), A).
Proof. The proof is made similar to Proposition 3.
Theorem 8. Let f : K −→ L be a Boolean homomorphism. Suppose that (F,A)and (G,B) are two soft Boolean algebras over K and L, respectively.
(1) If (F,A) is an identity soft Boolean algebra over K, then (f(F ), A) is anidentity soft Boolean algebra over L.
(2) If f is onto and (F,A) is an absolute soft Boolean algebra, then (f(F ), A)is an absolute soft Boolean algebra over L.
(3) If G(y) = f(K) for all y ∈ B, then (f−1(G), B) is an absolute soft Booleanalgebra over K.
(4) If f is injective and (G,B) is an identity soft Boolean algebra, then (f−1(G), B)is an identity soft Boolean algebra over K.
Proof. Suppose that f : K −→ L is a Boolean homomorphism.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
811 RIDVAN SAHIN ET AL 803-814
10 RIDVAN SAHIN AND AHMET KUCUK
(1) Let (F,A) be an identity soft Boolean algebras over K. Then for all x ∈A, we have F (x) = 0K , 1K, where 0K and 1K are two distinguishedelements of K. Since f is a Boolean homomorphism, f(F )(x) = f(F (x)) =f (0K , 1K) = 0L, 1L for all x ∈ A. Then (f(F ), A) is an identity softBoolean algebra over L.
(2) Let f be onto and (F,A) is absolute soft Boolean algebra. Then, F (x) = Kfor all x ∈ A, and so f(F )(x) = f(F (x)) = f(K) = L for all x ∈ A. Then(f(F ), A) is an absolute soft Boolean algebra over L.
(3) LetG(y) = f(K) for all y ∈ B. Then f−1(G)(y) = f−1(G(y)) = f−1(f(K)) =K for all y ∈ B. Hence (f−1(G), B) is an absolute soft Boolean algebraover K.
(4) Let f be injective and (G,B) is an identity soft Boolean algebra over L.Then G(y) = 0L, 1L for all y ∈ B and so f−1(G)(y) = f−1(G(y)) =f−1 (0L, 1L) = 0K , 1K . Then (f−1(G), B) is an identity soft Booleanalgebra over K.
Definition 18. Let (F,A) and (G,B) be two soft Boolean algebras over K and Lrespectively. Let f : K −→ L and g : A −→ B. Then (f, g) is said to be a softBoolean homomorphism if
(1) f is a Boolean homomorphism from K onto L,(2) g is a mapping from A onto B,(3) f(F (x)) = G(g(x)) for all x ∈ A.
Then (F,A) is said to be soft Boolean homomorphic to (G,B) and it is denotedby (F,A) ∼ (G,B). If f is a Boolean isomorphism from K onto L and g is abijection from A to B, then (f, g) is said to be a soft Boolean isomorphism. If thereexists a such isomorphism, we say that (F,A) is soft Boolean isomorphic to (G,B)and denote by (F,A) ' (G,B).
Example 8. Let (G,B) be the soft Boolean algebra given in Example 1. For C =a, b , consider a Boolean algebra L consisting of all subsets of C. Define theset-valued function H by
H(x) = X ∈ L : xRX ⇔ x ∪X ⊆ a, b .Then H(a) = H(b) = L. Therefore, H(x) is a subalgebra of L for all x ∈ C. Hence(H,C) is a soft Boolean algebra over L. Now, define f : K −→ L by f (1) = ∅,f (2) = a , f (3) = b and f (6) = a, b, and g : B −→ C by g (1) = a, g (6) = a,g (2) = b and g (3) = b. Then f is a Boolean homomorphism from K to L and g isa mapping from B to C. Moreover, we have f(G(x)) = H(g(x)) for all x ∈ B. So(G,B) is soft Boolean homomorphic to (H,C).
Theorem 9. Let K and L be Boolean algebras and (F,A), (G,B) soft sets over Kand L, respectively. If (F,A) is a soft Boolean algebra over K and (F,A) ' (G,B),then (G,B) is a soft Boolean algebra over L.
Proof. The proof is clear.
Definition 19. Let (F,A) and (G,B) be two soft Boolean algebras over K and L,respectively. The product of soft Boolean algebras (F,A) and (G,B) is defined as(F,A)× (G,B) = (H,A×B), where H(x, y) = F (x)×G(y) for all (x, y) ∈ A×B.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
812 RIDVAN SAHIN ET AL 803-814
SOFT BOOLEAN ALGEBRA 11
Theorem 10. Let (F,A) and (G,B) be two soft Boolean algebras over K and L,respectively. If it is non-null, then the product (F,A) × (G,B) is a soft Booleanalgebra over K × L.
Proof. Let (F,A) × (G,B) = (H,A × B), where H(x, y) = F (x) × G(y) for all(x, y) ∈ A×B. Then by hypothesis, (H,A×B) is a non-null soft set over K × L.Since F (x) is a subalgebra of K and G(y) is a subalgebra of L, it follows thatH(x, y) is a subalgebra of K × L for all x ∈ A and y ∈ B. Therefore (H,A×B) isa soft Boolean algebra over K × L.
5. Conclusion
In this paper, we have introduced the concept of soft Boolean algebra and havestudied some of their algebraic properties. Basic notions such as soft subalgebra,soft ideal, soft filter and soft Boolean homomorphism were introduced and theirproperties have been investigated. Many examples supporting the results obtainedwere also given . The aim of this article is to obtain next algebraic structure bycombining the notion of soft set theory with Boolean algebra which is a well knownalgebra. We hope that ideas and methods developed in this paper will be a sourceof inspiration for further study.
References
[1] H. Aktas, N. Cagman, Soft sets and soft groups. Inform. Sci. 177 (2007), 2726–2735.
[2] M.I. Ali, F. Feng, X.Y. Liu, W.K. Min, M. Shabir, On some new operations in soft set theory,
Comput. Math. Appl 57 (2009) 1547–1553.[3] N. Cagman and S. Enginoglu, Soft set theory and uni–int decision making, European J. Oper.
Res. 207 (2010) 848–855.[4] F. Feng, Y.B. Jun and X. Zhao, Soft semirings, Comput. Math. Appl. 56(10) (2008) 2621–
2628.
[5] Feng Feng , Changxing Li, B. Davvaz, M. Irfan Ali, Soft sets combined with fuzzy sets andrough sets: a tentative approach, Soft Comput. Springer, 14 (2010) 899-911
[6] S. Givant and P. Halmos, (2008). Introduction to Boolean Algebras. Published 2008, Springer.
[7] Y.S. Hwang and S.S. Ahn, Soft q-ideals of soft BCI-algebras, Journal of ComputationalAnalysis & Applications, 16 (2014) 571-582.
[8] J.S. Han and S.S. Ahn, Applications of soft sets to q-ideals and a-ideals in BCI-algebras.
Journal of Computational Analysis & Applications, 17 (2014) 10-21.[9] Y. B. Jun; Soft BCK/BCI-algebras, Comput. Math. Appl., 56 (5) (2008) 1408-1413.
[10] Y. B. Jun, N. O. Alshehri and J. L. Kyoung, Soft set theory and N-structures applied to
BCH-algebras. Journal of Computational Analysis & Applications. 16 (2014) 869-886.[11] Y. B. Jun, C. H. Park, Applications of soft sets in ideal theory of BCK/BCIalgebras, Inform.
Sci., 178(11) (2008), 2466-2475.[12] Y. B. Jun, C. H. Park; Applications of soft sets in Hilbert algebras, Iran. J. Fuzzy Syst., 6(2)
(2009), 55–86.
[13] O. Kazanci, S. Yılmaz and S. Yamak, Soft sets and soft BCH-algebras, Hacettepe Journal ofMathematics and Statistics, 39 (2) (2010), 205 – 217.
[14] A. Kharal, Distance and Similarity Measures for Soft sets. New Mathematics and NaturalComputation. 6(3) (2010) 321-334.
[15] A. Kharal and B. Ahmad, Mappings on soft classes, to appear in New Math. Nat. Comput.7 (3) (2011) 471- 481.
[16] S. Koppelberg, (1989) Handbook pf Boolean Algebras volume 1. North-Holland, Amsterdam.[17] P. K. Maji, R. Biswas and A. R. Roy, Fuzzy soft sets, J. Fuzzy Math. 9(3) (2001) 589-602.[18] P. K. Maji, A. R. Roy, and R. Biswas, An application of soft sets in a decision making
problem, Comput. Math. Appl. 44(8-9) (2002) 1077–1083.[19] P.K. Maji, R. Biswas and R. Roy, Soft set theory, Comput. Math. Appl. 45 (2003) 555–562.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
813 RIDVAN SAHIN ET AL 803-814
12 RIDVAN SAHIN AND AHMET KUCUK
[20] P. Majumdar and S. K. Samanta, Similarity measure of soft set, New Math. Nat. Comput.
4(1) (2008) 1-12.
[21] D.A. Molodtsov, Soft set theory—first results, Comput. Math. Appl. 37 (1999) 19–31.[22] R. Sahin, A. Kucuk, Soft filters and their convergence properties, Ann. Fuzzy Math. Inform.,
6 (3) (2013) 559-573.
[23] A. Sezgin and A. O. Atagun, On operations of soft sets, Comput. Math. Appl. 61(5), 1457–1467, 2011.
[24] A. Sezgin and A. O. Atagun, Soft groups and normalistic soft groups, Comput. Math. Appl.,
62(2),( 2011) 685-698.[25] Y. Zou and Z. Xiao, Data analysis approaches of soft sets under incomplete information,
Knowl.-Based Syst. 21(8) (2008) 941–945.
[26] X. Zhou and Q. Li, Generalized vague soft set and its lattice structures, Journal of Compu-tational Analysis & Applications, 17 (2014) 265-271.
Department of Mathematics, Faculty of Science, Ataturk University, Erzurum, 25240,
Turkey.E-mail address: [email protected]
E-mail address: [email protected]
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
814 RIDVAN SAHIN ET AL 803-814
GENERATING FUNCTIONS FOR THE GENERALIZEDBIVARIATE FIBONACCI AND LUCAS POLYNOMIALS
ESRA ERKUS-DUMAN* AND NA·IM TUGLU
Abstract. The main object of this study is to derive various families of mul-tilinear and multilateral generating functions for the generalized bivariate Fi-bonacci and Lucas polynomials. Furthermore, we discuss some critical con-nections between the generalized bivariate Fibonacci, Lucas polynomials andthe well-known polynomials and numbers, such as, bivariate and univariateFibonacci and Lucas polynomials, the classical Fibonacci and Lucas numbers,Pell, Pell-Lucas, Jacobsthal, Jacobsthal-Lucas and also the rst and secondkind Chebyshev polynomials.
1. Introduction
The bivariate polynomials of Fibonacci and Lucas, denoted respectively by (Un) =(Un (x; y)) and (Vn) = (Vn (x; y)), are dened by
U0 = 0; U1 = 1; Un = xUn1 + yUn2; (n 2)
and
V0 = 2; V1 = x; Vn = xVn1 + yVn2; (n 2) :It is established, see for example [7, 9], that
(1) Un (x; y) =
[n12 ]Xk=0
n k 1
k
xn2k1yk;
(2) Vn (x; y) =
[n2 ]Xk=0
n
n k
n kk
xn2kyk:
In [3], G.P. Djordjevic considered the partial derivative sequences of the gen-eralized bivariate Fibonacci polynomials Un;m (x; y) and the generalized bivariateLucas polynomials Vn;m (x; y). These polynomials are dened by
Un;m = xUn1;m + yUnm;m ; n m;
with U0;m = 0; Un;m = xn1; n = 1; 2; :::;m 1 and
Vn;m = xVn1;m + yVnm;m ; n m;
Key words and phrases. Multilinear and multilateral generating functions, generalized bivari-ate Fibonacci polynomials, generalized bivariate Lucas polynomials.
* Corresponding author.2000 Math. Subject Classication : Primary 11B39, 11B83, Secondary 33C45.
1
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
815 ESRA ERKUS-DUMAN ET AL 815-821
2 E. ERKUS-DUMAN AND N. TUGLU
with V0;m = 2; Vn;m = xn; n = 1; 2; :::;m 1 and generated by
(3) t (1 xt ytm)1 =1Xn=0
Un;m (x; y) tn
and
(4)2 xtm1
(1 xt ytm)1 =
1Xn=0
Vn;m (x; y) tn:
Clearly, (3) and (4) yield the following explicit representations, respectively:
(5) Un;m (x; y) =
[n1m ]Xk=0
n 1 (m 1) k
k
xn1mkyk
and
(6) Vn;m (x; y) =
[ nm ]Xk=0
n (m 2) kn (m 1) k
n (m 1) k
k
xnmkyk:
If m = 2, then polynomials Un;m (x; y) and Vn;m (x; y) would reduce at once to thepolynomials Un (x; y) and Vn (x; y) given by (1) and (2), respectively.The aim of this paper is to obtain various families of multilateral and multilinear
generating functions for the generalized Fibonacci and Lucas polynomials. We alsogive their special cases for these polynomials. For the theory and applications ofthe various methods and techniques for deriving generating functions of specialfunctions and polynomials, we may refer the interested reader to a recent treatiseon the subject of generating functions [1, 2].
2. Bilinear and Bilateral Generating Functions
In this section, rstly we derive several families of bilinear and bilateral generat-ing functions for the generalized bivariate Fibonacci Polynomials Un;m (x; y) whichare generated by (3) and given explicitly by (5).We begin by stating the following theorem.
Theorem 2.1. Corresponding to an identically non-vanishing function (y1; :::; ys )of s complex variables y1; :::; ys (s 2 N) and of complex order , let
(7) ;(y1; :::; ys; z) :=1Xk=0
ak+k(y1; :::; ys )zk
(ak 6= 0 ; ; 2 C)and
(8) n;m;p;;(x; y; y1; :::; ys; ) :=
[n=p]Xk=0
akUnpk;m (x; y) +k(y1; :::; ys )k
n; p 2 N:Then we have
(9)1Xn=0
n;m;p;;(x; y; y1; :::; ys;
tp)tn =
t
1 xt ytm;(y1; :::; ys; )
provided that each member of (9) exists.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
816 ESRA ERKUS-DUMAN ET AL 815-821
GENERALIZED BIVARIATE FIBONACCI AND LUCAS POLYNOMIALS 3
Proof. For convenience, let S denote the rst member of the assertion (9) of The-orem 2.1. Then, upon substituting for the polynomials
n;m;p;;(x; y; y1; :::; ys;
tp)
from the denition (8) into the left-hand side of (9), we obtain
(10) S =1Xn=0
[n=p]Xk=0
akUnpk;m (x; y) +k(y1; :::; ys )ktnpk :
Upon inverting the order of summation in (10), if we replace n by n + pk; we canwrite
S =1Xn=0
1Xk=0
ak Un;m (x; y) +k(y1; :::; ys )ktn
=1Xn=0
Un;m (x; y) tn1Xk=0
ak+k(y1; :::; ys )k
=t
1 xt ytm;(y1; :::; ys; );
which completes the proof of Theorem 2.1.
The partial derivatives of Un;m (x; y) are dened by [3]
U (k;j)n;m (x; y) =@k+j
@xk@yjUn;m (x; y) ; k 0; j 0:
Let k 0; j 0; r 0: Then, the generalized bivariate Fibonacci PolynomialsUn;m (x; y) have the following relation [3]:X
i1+i2+:::+ir=n
U(k;j)i1;m
(x; y)U(k;j)i2;m
(x; y) :::U(k;j)ir;m
(x; y)
=((k + j)!)
r
(rk + rj + r 1)!U(rk+r1;rj)n;m (x; y) :(11)
In precisely the same manner as described proof of Theorem 2.1 and using (11),we can prove the following result, immediately.
Theorem 2.2. For a non-vanishing function (y1; :::; ys ) of complex variablesy1; :::; ys (s 2 N) let
n;p;(x; y; y1; :::; ys; z)
: =
[n=p]Xh=0
ah((k + j)!)
r
(rk + rj + r 1)!U(rk+r1;rj)nrph;m (x; y) +h(y1; :::; ys )z
h;
(ah 6= 0 ; n; k; j; r 2 N0; N0 = N[f0g) :Then we have(12) Pi1+i2+:::+ir=n
[i1+i2+:::+ir=p]Pl=0
al U(k;j)i1pl;m (x; y) :::U
(k;j)irpl;m (x; y) +l(y1; :::; ys )z
l
= n;p;(x1; :::; xr; y1; :::; ys; z)
provided that each member of (12) exists.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
817 ESRA ERKUS-DUMAN ET AL 815-821
4 E. ERKUS-DUMAN AND N. TUGLU
Now we derive several families of bilinear and bilateral generating functions forthe generalized bivariate Lucas Polynomials Vn;m (x; y) which are generated by (4)and given explicitly by (6).
Theorem 2.3. Corresponding to an identically non-vanishing function (y1; :::; ys )of s complex variables y1; :::; ys (s 2 N) and of complex order , let
;(y1; :::; ys; z) :=1Xk=0
ak+k(y1; :::; ys )zk
(ak 6= 0 ; ; 2 C)and
n;m;p;;(x; y; y1; :::; ys; ) :=
[n=p]Xk=0
akVnpk;m (x; y) +k(y1; :::; ys )k
n; p 2 N:Then we have
(13)1Xn=0
n;m;p;;(x; y; y1; :::; ys;
tp)tn =
2 xtm11 xt ytm;(y1; :::; ys; )
provided that each member of (13) exists.
Proof. In precisely the same manner as described proof of Theorem 2.1 and usingthe generating function (4) we can prove Theorem 2.3.
By expressing the multivariable function +k(y1; :::; ys ) (k 2 N0 ; s 2 N) interms of simpler function of one and more variables, we can give further applicationsof Theorems 2.1, 2.2 and 2.3. For example, if we set
s = r and +k(y1; :::; yr ) = h(1;:::;r)+k (y1; :::; yr)
in Theorem 2.1, where a multivariable extension of the Lagrange-Hermite polyno-mials h(1;:::;r)n (x1; :::; xr) are dened by means of the generating function [1]
(14)rYj=1
(1 xjtj)j
=
1Xn=0
h(1;:::;r)n (x1; :::; xr)tn;
j 2 C (j = 1; :::; r) ; jtj < min
j2f1;:::;rg
njx1j1=j
o;
then we obtain the following result which provides a class of bilateral generatingfunctions for the multivariable Lagrange-Hermite polynomials and the generalizedbivariate Fibonacci polynomials.
Corollary 2.4. If ;(y1; :::; yr; z) :=1Pk=0
akh(1;:::;r)+k (y1; :::; yr)z
k where (ak 6=
0 ; ; 2 C); and
n;m;p;;(x; y; y1; :::; yr; ) :=
[n=p]Xk=0
akUnpk;m (x; y)h(1;:::;r)+k (y1; :::; yr)
k
n; p 2 N:
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
818 ESRA ERKUS-DUMAN ET AL 815-821
GENERALIZED BIVARIATE FIBONACCI AND LUCAS POLYNOMIALS 5
Then we have
(15)1Xn=0
n;m;p;;(x; y; y1; :::; ys;
tp)tn =
t
1 xt ytm;(y1; :::; ys; )
provided that each member of (15) exists.
Remark 2.1. Using the generating relation (14) for the multivariable Lagrange-Hermite polynomials and taking ak = 1; = 0; = 1; we have
1Xn=0
[n=p]Xk=0
Unpk;m (x; y)h(1;:::;r)k (y1; :::; yr)
ktnpk
=t
1 xt ytmrYj=1
(1 yjj)j
;
wherejj < min
njy1j1 ; :::; jyrj1=r
o:
Choosing s = 2 and +k(u1; u2 ) = U(k;j)+k;m (u1; u2) ; (; 2 N0); in Theorem
2.2 we obtain the following class of bilinear generating functions for the partialderivatives of the generalized bivariate Fibonacci polynomials Un;m (x; y).
Corollary 2.5. If
n;p;(x; y;u1; u2; z)
: =
[n=p]Xh=0
ah((k + j)!)
r
(rk + rj + r 1)!U(rk+r1;rj)nrph;m (x; y)U
(k;j)+k;m (u1; u2) z
h;
where ah 6= 0 ; ; 2 N0: Then we have(16) Pi1+i2+:::+ir=n
[i1+i2+:::+ir=p]Pl=0
al U(k;j)i1pl;m
(x; y) :::U(k;j)irpl;m (x; y)U
(k;j)+l;m (u1; u2) z
l
= n;p;(x; y;u1; u2; z)
provided that each member of (16) exists.
If we sets = 1 and +k(u ) = E+k(u)
in Theorem 2.3, where the Euler polynomials En (x) is dened by means of thegenerating function [4]
(17)2ext
et + 1=
1Xn=0
En (x)tn
n!;
then we obtain the following result which provides a class of bilateral generatingfunctions for the Euler polynomials and the generalized bivariate Lucas polynomi-als.
Corollary 2.6. If ;(u; z) :=1Pk=0
akE+k(u)zk where (ak 6= 0 ; ; 2 C); and
n;m;p;;(x; y;u; ) :=
[n=p]Xk=0
akVnpk;m (x; y)E+k(u)k
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
819 ESRA ERKUS-DUMAN ET AL 815-821
6 E. ERKUS-DUMAN AND N. TUGLU
n; p 2 N:Then we have
(18)1Xn=0
n;m;p;;(x; y;u;
tp)tn =
2 xtm11 xt ytm;(y1; :::; ys; )
provided that each member of (18) exists.
Remark 2.2. Using the generating relation (17) for the Euler polynomials and
taking ak =1
k!; = 0; = 1; we have
1Xn=0
[n=p]Xk=0
1
k!Vnpk;m (x; y)Ek(u)
ktnpk
=2eu
2 xtm1
(e + 1) (1 xt ytm) :
Furthermore, for every suitable choice of the coe¢ cients ak (k 2 N0); if themultivariable function +k(y1; :::; ys); (s 2 N); is expressed as an appropriateproduct of several simpler functions, the assertions of Theorems 2.1, 2.2 and 2.3can be applied in order to derive various families of multilinear and multilateralgenerating functions for the generalized bivariate Fibonacci and Lucas polynomials.
3. Further Consequences
In this section, we give some special cases of the results obtain in the previoussection. Here, we only discuss some critical connections between the generalizedbivariate Fibonacci, Lucas polynomials and the well-known polynomials and num-bers, but we avoid their statements and proofs.
(a) In the case of m = 2, our all results contain several families of multilat-eral and multilinear generating functions of the bivariate polynomials ofFibonacci and Lucas given in (1) and (2).
(b) If we choosem = 2 and y = 1, then we get miscellaneous results for the fam-ilies of multilinear and multilateral generating functions of the (univariate)Fibonacci and Lucas polynomials, respectively, by (see [8]):
fn (x) =
[n12 ]Xk=0
n 1 k
k
xn12k;
ln (x) =
[n2 ]Xk=0
n
n k
n kk
xn2k:
(c) If we take m = 2 and x = y = 1, then we now obtain some families of mul-tilinear and multilateral generating functions for the well-known Fibonacciand Lucas numbers dened by (see, for example, [8])
Fn =
[n12 ]Xk=0
n 1 k
k
;
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
820 ESRA ERKUS-DUMAN ET AL 815-821
GENERALIZED BIVARIATE FIBONACCI AND LUCAS POLYNOMIALS 7
Ln =
[n2 ]Xk=0
n
n k
n kk
:
(d) Of course, replacing x by 2x in (1) and (2) (and resp. replacing y by2y in (1) and (2)) from (a), we get various families of multilinear andmultilateral generating functions for the Pell and Pell-Lucas polynomials(and resp. Jacobsthal and Jacobsthal-Lucas polynomials) [5, 6].
(e) By using the following relation (see [8]) between Fibonacci and the rstkind Chebyshev polynomials Un (x)
fn (x) = nin1Un1
ix2
;n 1 and i =
p1;
all results in (b) can be modied according to the polynomials Un (x).
(f) Similarly, with the help of the fact that
ln (x) = 2inTn
ix2
; (n 0) ;
where Tn (x) denotes the second kind Chebyshev polynomials, the resultsin (b) are also valid for the polynomials Tn (x). We should recall that thewell-known properties of the rst and second kind Chebyshev polynomialsmay be found in the books [10].
References
[1] Alt¬n, A. and Erkus, E. On a multivariable extension of the Lagrange-Hermite polynomials,Integral Transform. Spec. Funct. 17 (2006), 239-244.
[2] Alt¬n, A., Aktas, R. and Erkus-Duman, E. On a multivariable extension for the extendedJacobi polynomials, J. Math. Anal. Appl. 353 (2009), 121-133.
[3] Djordjevic, G.B. Some properties of partial derivatives of generalized Fibonacci and Lucaspolynomials. Fibonacci Quart. 39 (2001), 138141.
[4] Erdélyi, A., Magnus, W., Oberhettinger F. and Tricomi, F.G. Higher Transcendental Func-tions, Vol. III, McGraw-Hill Book Company, New York, Toronto and London, 1955.
[5] Horadam, A.F. Jacobsthal representation polynomials, Fibonacci Quart., 35, 2 (1997), 137-148
[6] Horadam, A.F., Mahon, Br. J. M., Pell and Pell-Lucas polynomials, Fibonacci Quart., 23, 2(1985), 7-20.
[7] Lucas, E. Théorie des Nombres, Gauthier-Villars, Paris, 1891.[8] Lupas, A. A guide of Fibonacci and Lucas polynomials. Octogon Math. Mag., 7(1) (1999),
3-12.[9] Swamy, M.N.S. Generalized Fibonacci and Lucas polynomials and their associated diagonal
polynomials. Fibonacci Quart. 37 (1999), 213222.[10] Szegö, G. Orthogonal Polynomials, American Mathematical Society Colloquium Publications,
Vol. 23. New York, 1939.
Esra Erkus-Duman and Naim TugluGazi University, Faculty of Sciences and Arts,Department of Mathematics, Teknikokullar TR-06500, Ankara, Turkey.E-mail address (E. Erkus-Duman): [email protected] address (N. Tuglu): [email protected]
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
821 ESRA ERKUS-DUMAN ET AL 815-821
Integral norms of QK,ω(p, q; n) spaces and weighted
Bloch spaces
A. El-Sayed AhmedSohag University, Faculty of Science, Department of Mathematics,
Sohag 82524, Egypt andTaif University, Faculty of Science, Mathematics Department
Box 888 El-Hawiyah, El-Taif 5700, Saudi Arabiae-mail: [email protected]
Aydah AhmadiAl Jouf University, Mathematics Deartment, Al Jouf Saudi Arabia
AbstractIn this paper we characterize QK,ω(p, q; n) spaces of analytic functions on the unit disk in terms of
nondecreasing functions. The relations between integral norms of QK,ω(p, q; n) spaces and the normsof weighted Bloch spaces Bα
ω are given. Further, we obtain similar criteria for the little weightedBloch space of analytic functions.
1 Introduction
Let ∆ = z : |z| < 1 be the open unit disk in the complex plane C. Recall that the well known Blochspace (cf. [1, 2, 23, 26, 27, 28]) is defined as follows:
B = f : f analytic in ∆ and supz∈∆
(1− |z|2)|f ′(z)| < ∞.
Let 0 < q < ∞. The Besov-type spaces
Bq =
f : f analytic in ∆ and supa∈∆
∫
∆
∣∣f ′(z)∣∣q(1− |z|2)q−2(1− |ϕa(z)|2)2dσz < ∞
are introduced and studied intensively by Stroethoff (cf. [32]), where dσz is the Euclidean area elementdxdy. Here, ϕa(z) stands for the Mobius transformation of ∆ given by ϕa(z) = a−z
1−az , where a ∈ ∆. In1994, Aulaskari and Lappan [14] introduced a class of holomorphic functions, the so called Qp-spaces asfollows:
Qp =
f : f analytic in ∆ and supa∈∆
∫
∆
∣∣f ′(z)∣∣2gp(z, a)dσz < ∞
,
where 0 < p < ∞ and the weight function g(z, a) = log∣∣∣∣1−az
a−z
∣∣∣∣ is defined as the composition of the
Mobius transformation ϕa and the fundamental solution of the two-dimensional real Laplacian. Theweight function g(z, a) is actually Green’s function in ∆ with pole at a ∈ ∆.For 0 < p < ∞, −2 < q < ∞, we say that a function f analytic in ∆ belongs to the space QK(p, q) (cf.[9, 11, 33]), if
‖f‖K,p,q = supa∈∆
∫
∆
∣∣f ′(z)∣∣p(1− |z|2)q
K(g(z, a))dσz < ∞.
AMS: 32A18, 46E15Key words and phrases : weighted Bloch spaces, QK,ω(p, q; n) spaces
1
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
822 A. El-Sayed Ahmed et al 822-833
2
Recall that the analytic function
f(z) =∞∑
k
akznk (with nk ∈ N ; for all k ∈ N = 1, 2, 3, . . .)
is said to belong to the Hadamard gap class (also known as lacunary series) if there exists a constantc > 1 such that nk+1
nk≥ c for all k ∈ N (see e.g. [4, 5, 22, 24]).
Now, given a reasonable function ω : (0, 1] → [0,∞), the weighted Bloch space Bω (see [16]) is defined asthe set of all analytic functions f on ∆ satisfying
(1− |z|)|f ′(z)| ≤ Cω(1− |z|), z ∈ ∆,
for some fixed C = Cf > 0. In the special case where ω ≡ 1,Bω reduces to the classical Bloch space B.Here, the word “reasonable” is a non-mathematical term; it was just intended to mean that the “not toobad” and the function satisfy some natural conditions.Now, we introduce the following definitions:
Definition 1.1 For a given reasonable function ω : (0, 1] → [0,∞) and for 0 < α < ∞. An analyticfunction f on ∆ is said to belong to the α−weighted Bloch space Bα
ω;n if
‖f‖Bαω;n
= supz∈∆
(1− |z|)nα
ω(1− |z|) |f(n)(z)| < ∞; n ∈ N.
Definition 1.2 For a given reasonable function ω : (0, 1] → [0,∞) and for 0 < α < ∞. An analyticfunction f on ∆ is said to belong to the little weighted Bloch space Bα
ω,n;0 if
‖f‖Bαω;n,0
= lim|z|→1−
(1− |z|)nα
ω(1− |z|) |f(n)(z)| = 0; n ∈ N.
One should note that this class is different from the weighted Bloch space which studied in [36].Throughout this paper and for some techniques we consider the case of ω 6≡ 0. Now, we introduce thefollowing definition:
Definition 1.3 For a nondecreasing function K : [0,∞) → [0,∞), 0 < p < ∞, −2 < q < ∞ and for agiven reasonable function ω : (0, 1] → (0,∞), an analytic function f in ∆ is said to belong to the spaceQK,ω(p, q; n) if
‖f‖pK,ω,p,q;n = sup
a∈∆
∫
∆
∣∣f (n)(z)∣∣p(1− |z|)np−p+q K(g(z, a))
ωp(1− |z|) dσz < ∞; n ∈ N.
Remark 1.1 It should be remarked that QK,ω(p, q; n) classes are more general than many classes ofanalytic functions. If n = 1, we obtain the class QK,ω(p, q) as studied in [10, 29, 30]. If n = 1, andω ≡ 1, we obtain QK(p, q) type spaces (cf. [9, 11, 33]). If If n = 1, q = p = 2, and ω(t) = t, weobtain QK spaces as studied recently in [17, 18, 34] and others. If If n = 1, q = p = 2, ω(t) = t andK(t) = tp, we obtain Qp spaces as studied in [14, 15] and others. If If n = 1, ω ≡ 1 and K(t) = ts, thenQK,ω = F (p, q, s) classes (cf. [8, 37, 38]).
In this paper, we characterize the weighted Bloch space Bαω;n by QK,ω(p, q; n) spaces. One of the main
results is a general Besov-type characterization for Bαω;n functions that extends and generalizes the
Stroethoff’s theorem [32]. Also, we extend and improve some results due to Essen et. al [18] usingour new definitions.
2 Analytic QK,ω(p, q; n) classes
In this paper we show some relations betwen QK,ω(p, q;n) norms and Bαω;n norms for a nondecreasing
function K, also we give a general way to construct different spaces QK,ω1(p, q; n) and QK2,ω(p, q;n) by
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
823 A. El-Sayed Ahmed et al 822-833
3
using some functions K1 and K2.Before proving theorems we recall some few facts about the Mobius function ϕa. First, the function ϕa
is easily seen as:(ϕa ϕa)(z) = z for all z ∈ ∆
The following identity can be obtained by straight forward computation:
1− |ϕa(z)|2 =(1− |a|2)(1− |z|2)
|1− az|2 , a, z ∈ ∆.
A slightly different form in which we will apply the above identity is:
1− |ϕa(z)|21− |z|2 = |ϕ′a(z)| , a, z ∈ ∆. (1)
For a point a ∈ ∆ and 0 < r < 1, the pseudo-hyperbolic disc ∆(a, r) with pseudo-hyperbolic center aand pseudo-hyperbolic radius r is defined by ∆(a, r) = ϕa(r∆).For a ∈ ∆, the substitution z = ϕa(w) results in the Jacobian change in measure given by the equalitydσw = |ϕ′a(z)|2dσz. For a Lebesgue integrable or a non-negative Lebesgue measurable function h on ∆we thus have the following change-of-variable formula:
∫
∆(0,r)
h(ϕa(w))dσw =∫
∆(a,r)
h(z)(
1− |ϕa(z)|21− |z|2
)2
dσz . (2)
We assume throughout this paper that∫ 1
0
K
(log
1r
)r
(1− r)2dr < ∞ . (3)
We need the following lemmas in the sequel.
Lemma 2.1 Let α ∈ (0,∞) and suppose that f(z) =∞∑
j=1
ajznj belongs to Hadamard gap class. Then
f ∈ Bαω;n if and only if
supj∈N
|aj |n1−αj < ∞ , where N = 1, 2, 3, . . . .
Proof: The proof is very similar to the overspending result in [35] with simple modifications, so it willbe omitted.
Lemma 2.2 For a given reasonable function ω : (0, 1] → [0,∞). Let f1(z), f2(z) be analytic functions on∆. Then,
|f (n)1 (z)|+ |f (n)
2 (z)| ≈ ω(1− |z|)(1− |z|) , z ∈ ∆. (4)
Proof: If n = 1, the proof is known from [29]. Now, we consider the case 1 < n < ∞. For a large numberq ∈ N, choose a gap series:
f(n−1)1 (z) =
∞∑
j=0
zqj
, z ∈ ∆.
Then, apply lemma 2.1 to infer that (1−|z|)|f(n)1 (z)|
ω((1−|z|)) ≤ λ holds for all z ∈ ∆, where λ is a constant.Furthermore, let us verify
(1− |z|)|f (n)1 (z)|
ω((1− |z|)) ≥ λ , 1− q−k ≤ |z| ≤ 1− q−(k+ 12 ) , k ∈ N. (5)
Andq−(k+ 1
2 ) ≤ 1− |z| ≤ q−k ⇒ ω(q−(k+ 12 )) ≤ ω(1− |z|) ≤ ω(q−k).
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
824 A. El-Sayed Ahmed et al 822-833
4
Observe that for any z ∈ ∆,
|f (n)1 (z)| ≥ qk|z|qk −
k−1∑
j=0
qj |z|qj −∞∑
k+1
qj |z|qj
= T1 − T2 − T3.
Then, fix a z with |z| ∈ [1− q−k, 1− q−(k+ 12 )], k ∈ N, and put x = |z|qk
. Thus
(1− q−k)qk ≤ x ≤ [(1− q−(k+ 12 ))qk+ 1
2 ]q−12 .
If q is large enough, then for k ≥ 1 one has
13≤ x ≤ (
12)q−12 , (6)
and hence T1 ≥ qk
3 . Since it is easy to establish T2 ≤ 1n−1
∑k−1j=0 qj ≤ qk
q−1 , it remains to deal with the
third term T3. Noting that |z|qn(q−1) ≤ |z|qk+1(q−1), n ≥ k + 1, namely, in T3 the quotient of twosuccessive terms is not greater than the ratio of the first two terms, one finds that the series of T3 iscontrolled by the geometric series having the same first two terms. Accordingly (6) is applied to produce
T3 ≤ qk+1|z|qk+1∞∑
j=0
(q|z|qk+2−qk+1
)j
=qk+1|z|qk+1
1− q|z|(qk+2−qk+1)= qk qxq
1− qxq2−q≤ qk q( 1
2 )q12
1− q( 12 )q
32 − q
12
.
The preceding estimates for T1, T2 and T3 imply
|f (n)1 (z)| ≥ qk
4ω(1− |z|)ω(1− |z|) =
qk+ 12
4q12
ω(1− |z|)ω(1− |z|)
≥ ω(1− |z|)4q
12 (1− |z|)× ω(1− |z|) ≥
ω(1− |z|)4q
12 ω(q−k)× (1− |z|) ; ω(q−k) 6→ ∞.
Reaching (5). In a completely similar manner one can prove that if q is a large natural number, for example
q = m2 where m is a large natural number, and if f(n−1)2 (z) =
∞∑j=0
zqj
, z ∈ ∆, then (1−|z|2)|fn2 (z)| ≤ λ
for all z ∈ ∆ (owing to Lemma 2.1) and
(1− |z|)|f (n)1 (z)|
ω((1− |z|)) ≤ λ, 1− q−(k+ 12 ) ≤ |z| ≤ 1− q−(k+1), k ∈ N. (7)
Of course, (5) and (7) yield (4) unless it occurs that f(n)1 (z) and f
(n)2 (z) have common zero in z ∈ ∆ :
|z| < 1− q−1 in which case one can replace f2(z) with f2(ζz) for appropriate ζ ∈ ∂∆, where ∂∆ is theboundary of the unit disk (note that f (n)(0) = 1). Our lemma is therefore proved .
Using the same steps of Lemma 2.2, it is not hard to prove the following lemma.
Lemma 2.3 Let ω : (0, 1] → (0,∞) and let 1 ≤ α < ∞. Then there are two functions f1 , f2 ∈ Bαω;n
such that
|f (n)1 (z)|+ |f (n)
2 (z)| ≈ ω(1− |z|)(1− |z|)α
, z ∈ ∆. (8)
Proof: The proof is very similar to the proof of Lemma 2.2 and lemma 3.1 in [19], so it will be omitted.
Theorem 2.1 Let 0 < p < ∞, −2 < q < ∞. Then, for each non-decreasing function K : [0,∞) → [0,∞)and for a given reasonable non-decreasing function ω : (0, 1] → (0,∞) with ω(k t) ≈ ω(t), k > 0, wehave that(i) QK,ω(p, q; n) ⊂ B
np−p+q+2p
ω;n and
(ii) QK,ω(p, q; n) = Bnp−p+q+2
pω;n if and only if (3) holds.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
825 A. El-Sayed Ahmed et al 822-833
5
Proof: For a fixed r ∈ (0, 1) and a ∈ ∆, let
E(a, r) =
z ∈ ∆ , |z − a| < r(1− |a|)
.
We know that E(a, r) ⊂ ∆(a, r) and for any z ∈ E(a, r), we have
(1− r)(1− |a|) ≤ 1− |z| ≤ (1 + r)(1− |a|),which means that 1− |z| ' 1− |a| for any z ∈ E(a, r). Denote
Fω,p,q;n(f)(z) =∣∣f (n)(z)
∣∣p (1− |z|)np−p+q
ωp(1− |z|)Then, we obtain
∫
∆
Fω,p,q;n(f)(z)K(g(z, a)
)dσz ≥
∫
∆(a,r)
Fω,p,q;n(f)(z)K(g(z, a)
)dσz
≥ K
(log
1r
) ∫
∆(a,r)
Fω,p,q;n(f)(z) d σz
≥ K
(log
1r
) ∫
E(a,r)
Fω,p,q;n(f)(z) dσz.
For every z ∈ E(a, r), we have that
(1− r)(1− |a|) ≤ 1− |z| ≤ (1 + r)(1− |a|).Now, since we assume that ω is non-decreasing, then we obtain that
∫
E(a,r)
Fω,p,q;n(f)(z) dσz ≥ (1− r)np−p+q(1− |a|)np−p+q
ωp((1− r)(1− |a|))∫
E(a,r)
∣∣f (n)(z)∣∣p dσz.
Since |f (n)(z)|p is a subharmonic function, then∫
E(a,r)
∣∣f (n)(z)∣∣p dσz ≥ |E(a, r)| × |f (n)(a)
∣∣p = r2(1− |a|)2|f (n)(a)∣∣p.
Then we obtain∫
∆
Fω,p,q;n(f)(z)K(g(z, a)
)dσz ≥ K
(log
1r
)(1− r)p(1− |a|)q+2
ωp((1− r)(1− |a|)) |f(n)(a)
∣∣p
≥ πr2K
(log
1r
)(1− r)np−p+q(1− |a|)np−p+q+2
ωp(1− |a|) |f (n)(a)∣∣p
If f ∈ QK,ω(p, q; n), then by the above estimate we have that
supa∈∆
(1− |a|)np−p+q+2|f (n)(z)|pωp(1− |a|) < ∞.
The proof of (i) is therefore completed.
Now, we show that Bnp−p+q+2
pω;n ⊂ QK,ω(p, q;n) provided that K satisfies condition (3). For f ∈ B
np−p+q+2p
ω;n ,we have that,
∫
∆
Fω,p,q;n(f)(z)K(g(z, a)
)dσz ≤
∥∥f∥∥p
Bnp−p+q+2
pω;n
∫
∆
(1− |z|2)−2K(g(z, a)
)d σz
= 2π∥∥f
∥∥p
Bnp−p+q+2
pω;n
∫ 1
0
K
(log
1r
)r
(1− r2)2dr < ∞,
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
826 A. El-Sayed Ahmed et al 822-833
6
which shows thatB
np−p+q+2p
ω;n ⊂ QK,ω(p, q;n).
Now we assume that Bnp−p+q+2
pω;n = QK,ω(p, q;n) and we verify that (3) holds. From Lemma 2.3, for f1
and f2 in Bnp−p+q+2
pω;n , we have that
|f (n)1 (z)|+ |f (n)
2 (z)| ≥ ω(1− |z|)(1− |z|)np−p+q+2
p
. (9)
Then f1, f2 ∈ QK,ω(p, q;n) and
∞ > supa∈∆
∫
∆
(∣∣f (n)1 (z)
∣∣p +∣∣f (n)
2 (z)∣∣p
)(1− |z|)np−p+q+2 K
(g(z, a)
)
ωp(1− |z|) dσz
≥∫
∆
(∣∣f (n)1 (z)
∣∣ +∣∣f (n)
2 (z)∣∣)p
(1− |z|)np−p+q+2 K(g(z, 0)
)
ωp(1− |z|) dσz (10)
From (9) and (10), we obtain
∫
∆
(∣∣f (n)1 (z)
∣∣p +∣∣f (n)
2 (z)∣∣p) (1− |z|)np−p+q+2 K
(g(z, 0)
)
ωp(1− |z|) dσz ≈ 2π
∫ 1
0
K
(log
1r
)r
(1− r)2dr.
Thus (3) holds, and this completes the proof.
We say that f ∈ QK,ω,0(p, q; n) if
lim|a|→1−
∫
∆
∣∣f (n)(z)∣∣p (1− |z|)np−p+q+2 K(g(z, a))
ωp(1− |z|) dσz = 0. (11)
Now, we give the following result for QK,ω,0(p, q;n) and Bαω,n;0 classes.
Theorem 2.2 Let 0 < p < ∞, −2 < q < ∞. Then, for each non-decreasing function K : [0,∞) → [0,∞)and for a given reasonable non-decreasing function ω : (0, 1] → (0,∞) with ω(k t) ≈ ω(t), k > 0, wehave that(i) QK,ω,0(p, q;n) ⊂ B
np−p+q+2p
ω,n;0 and
(ii) QK,ω,0(p, q;n) = Bnp−p+q+2
p
ω,n;0 , if and only if (3) holds.
Proof: Without loss of generality, we assume that K(1) > 0. From the proof of Theorem 2.1, we havethat
π( 1e )2 K(1) (1−|a|)np−p+q+2
ωp(1−|a|) |f (n)(a)|p ≤ K(1)∫
E(a)
Fω,p,q;n(f)(z) dσz
≤ K(1)∫
∆(a, 1e )
Fω,p,q;n(f)(z) dσz
≤∫
∆
Fω,p,q;n(f)(z)K(g(z, a)
)dσz ,
where
E(a) =
z ∈ ∆ , |z − a| < 1e(1− |a|)
.
If f ∈ QK,ω,0(p, q;n), we obtain that
lim|a|→1−
(1− |a|)np−p+q+2|f (n)(a)|pωp(1− |a|) = 0.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
827 A. El-Sayed Ahmed et al 822-833
7
(ii) We only need to prove that Bnp−p+q+2
p
ω,n;0 ⊂ QK,w,0(p, q; n). Assume that
A =∫ 1
0
K
(log
1r
)r
(1− r)2dr < ∞.
For a given ε > 0 there exists an r1, 0 < r1 < 1, such that∫ 1
r1
K
(log
1r
)r
(1− r)2dr < ε. (12)
Then we have that,∫
∆\∆(a,r1)
∣∣f (n)(z)∣∣p (1− |z|)np−p+q K(g(z, a))
ωp(1− |z|) dσz
≤ ∥∥f∥∥p
Bnp−p+q+2
pω,n;0
∫
∆\∆(a,r1)
K(g(z, a))(1− |z|)2 dσz
=∥∥f
∥∥p
Bnp−p+q+2
pω,n;0
∫
r1<|w|<1
K
(log
1|w|
)1
(1− |w|)2 dσw
=∥∥f
∥∥p
Bnp−p+q+2
pω,n;0
∫ 1
r1
K
(log
1r
)r
(1− r)2dr ≤ 2π ε
∥∥f∥∥p
Bnp−p+q+2
pω,n;0
. (13)
Similarly, if f ∈ Bnp−p+q+2
p
ω,n;0 , we obtain that
|f (n)(ϕa(w))|p (1− |ϕa(w)|2)np−p+q+2p
ωp(1− |ϕa(w)|) −→ 0
converges uniformly for |w| ≤ r if |a| → 1−, where r is fixed and 0 < r < 1. Then, we obtain that
lim|a|→1−
∫
∆
∣∣f (n)(z)∣∣p (1− |z|)np−p+q K
(g(z, a)
)
ωp(1− |z|) dσz
= lim|a|→1−
∫
|w|<r
∣∣f (n)(ϕa(w))∣∣p (1− |ϕa(w)|)np−p+q K
(log 1
|w|)
ωp(1− |ϕa(w)|)(1− |w|)2 dσw
≤ A lim|a|→1−
sup|w|≤r1
∣∣f (n)(ϕa(w))∣∣p (1− |ϕa(w)|)np−p+q+2
ωp(1− |ϕa(w)|) = 0. (14)
By (13) and (14) it is easy to obtain that
lim|a|→1−
∫
∆
∣∣f (n)(z)∣∣p (1− |z|)np−p+q K
(g(z, a)
)
ωp(1− |z|) dσz = 0. (15)
Conversely, suppose that (3) does not hold; that is∫ 1
0
K
(log
1r
)r
(1− r)2dr = ∞.
Thus we find a continuous strictly decreasing function g : [0, 1) −→ [0,∞) tending to zero at 1 such that∫ 1
0
K
(log
1r
)g(r)
(1− r)2ωp(1− r)r dr = ∞. (16)
It is easy to see that
r2k+1−2 ≥ exp−2k+2(1 + r), r ∈ [0.5, 1). (17)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
828 A. El-Sayed Ahmed et al 822-833
8
We know that for β > 0 that, t2β exp−4tt= β2
=(
β2
)2β exp−2β. Then, there exists an integer k for34 ≤ r < 1 such that β
2 ≤ 2k(1− r) < β+12 and
2βk exp−2k+2(1− r) = (1− r)−2β
(2k(1− r)
)2β
exp−2k+2(1− r)
>
(1 + β
2
)2β
(1− r)−2β exp−2(β + 1). (18)
For 34 ≤ r < 1 we define
f0(z) =∞∑
k=0
ak 22kp z2k
,
where ak = g(1− (p+1)
p 2k), k = 0, 1, 2, . . . . By (17) and (18), we deduce that
M22 (r, f (n)
0 ) =∫ 2π
0
|f (n)0 (r eiθ)|2 dθ = 2π
∞∑
k=0
a2k (2k − 1)! 2
2k(p+2)p z2k−2
≥ 2π(g(r)
) 2p (2k − 1)! 2
2k(q+2)p exp−2k+2(1− r) ≥ λ
(g(r)
) 2p (1− r)
−2(q+2)p , (19)
where λ is a constant. Since f0 is defined by a gap series with Hadamard condition, we have
M2(r, f(n)0 ;ω) ≈ Mp(r, f
(n)0 ; ω), where Mp(r, f
(n)0 ; ω) =
(∫ 2π
0
|f (n)0 (r eiθ)|pωp(1− r)
dθ
) 1p
.
Therefore,
supa∈∆
∫
∆
∣∣f (n)0 (z)
∣∣p(1− |z|)np−p+q K(g(z, a))ωp(1− |z|) dσz
≥∫ 1
0
Mpp (r, f (n)
0 )(1− r)np−p+qK
(log
1r
)r dr
≈∫ 1
0
Mp2 (r, f (n)
0 )(1− r)np−p+qK
(log
1r
)r dr
≥∫ 1
34
K
(log
1r
)g(r)
(1− r)2ωp(1− r)r dr = ∞.
This means that f0 ∈ Bq+2
p
ω,,;0 \QK,w,0(p, q; n), which is a contraction. Hence (3) holds. This completes theproof of our theorem.
3 Weights on QK,ω(p, q; n)-spaces
The following result means that the kernel function K can be chosen as bounded.
Theorem 3.1 Assume that K(1) > 0 and K1(r) = infK(r), K(1), then for 0 < p < ∞, −2 < q < ∞,we have that
QK,w(p, q; n) = QK1,w(p, q; n).
Proof: Since K1 ≤ K and K1 is nondecreasing, it is clear that QK,ω(p, q; n) ⊂ QK1,w(p, q; n). It remainsto prove that
QK1,ω(p, q; n) ⊂ QK,ω(p, q; n).
We note thatg(z, a) > 1, z ∈ ∆(a,
1e) and
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
829 A. El-Sayed Ahmed et al 822-833
9
g(z, a) ≤ 1, z ∈ ∆ \∆(a,1e).
Thus K(g(z, a)) = K1(g(z, a)) in ∆\∆(a, 1e ). It suffices to deal with integrals over ∆(a, 1
e ).If f ∈ QK1,ω(p, q; n) and f is a weighted Bloch function i.e, f ∈ Bω;n, then by Theorem 2.1, it followsthat
∫
∆(a, 1e )
|f (n)(z)|p (1− |z|)np−p+q K(g(z, a)
)
ωp(1− |z|) dσz
≤∥∥f
∥∥p
Bnp−p+q+2
pω;n
∫
∆(a, 1e )
K(g(z, a)
) 1(1− |z|)2 dσz
=∥∥f
∥∥p
Bnp−p+q+2
pω;n
∫
∆(0, 1e )
K
(log
1|w|
)1
(1− |z|)2 dσw ≤ C∥∥f
∥∥p
Bnp−p+q+2
pω;n
Thus, f ∈ QK,ω(p, q; n) and Theorem 4.1 is proved.
Corollary 3.1 Suppose that 0 < p < ∞, −2 < q < ∞ and ω : (0, 1] → (0,∞). Then f ∈ QK,w(p, q; n) ifand only if
supa∈∆
∫
∆
|f (n)(z)|p (1− |z|)q K(1− |ϕa(z)|2)ωp(1− |z|) dσz < ∞.
For the application of the above results, we state the following lemma which is needed later.
Lemma 3.1 Suppose that K : [0,∞) → [0,∞), 0 < p < ∞, −2 < q < ∞ and ω : (0, 1] → (0,∞). Then
(i) f ∈ Bnp−p+q+2
pω;n if and only if there exists R ∈ (0, 1) such that
supa∈∆
∫
∆(a,R)
|f (n)(z)|p (1− |z|)np−p+q K(g(z, a))ωp(1− |z|) dσz < ∞, (20)
(ii) f ∈ Bnp−p+q+2
p
ω,n;0 if and only if there exists R ∈ (0, 1) such that
lim|a|→1−
∫
∆(a,R)
|f (n)(z)|p (1− |z|)np−p+q K(g(z, a))ωp(1− |z|) dσz = 0. (21)
Proof: (i) Assume f ∈ Bnp−p+q+2
pω;n . For any R ∈ (0, 1) and a ∈ ∆, we have
∫
∆(a,R)
|f (n)(z)|p (1− |z|)np−p+q K(g(z, a))ωp(1− |z|) dσz
=∫
∆(0,R)
|f (n)(ϕa(z))|p (1− |ϕa(z)|2)np−p+q+2
(1 + |ϕa(z)|)np−p+q+2
K(
1|z|
)
(1− |z|2)2ωp(1− |z|) dσz
≤ ‖f‖p
Bnp−p+q+2
pω;n
∫
∆(0,R)
K
(log
1|z|
)1
(1− |z|2)2 dσz
≤ λ1‖f‖p
Bnp−p+q+2
pω;n
,
where 1 < (1 + |ϕa(z)|)np−p+q+2 < 2np−p+q+2 and λ1 is a constant. Conversely, suppose that (20) holdsfor some R, 0 < R < 1, by the proof of Theorem 2.1 (i) with 1 − |a| ≈ 1 − |z| on E(a,R) ; a, z ∈ ∆, weobtain ∫
∆(a,R)
|f (n)(z)|p (1− |z|)np−p+q K(g(z, a))ωp(1− |z|) dσz
≥ K(log1R
)∫
∆(a,R)
|f (n)(z)|p (1− |z|)np−p+q
ωp(1− |z|) dσz
≥ λ2 K
(log
1R
)ω−p(1− |a|)
∫
E(a,R)
|f (n)(z)|p (1− |z|)np−p+qdσz
≥ πλ2R2K
(log
1R
)(1− |a|)np−p+q
ωp(1− |a|) |f (n)(a)|p , (22)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
830 A. El-Sayed Ahmed et al 822-833
10
where λ2 is a constant. The last inequality shows that f ∈ Bnp−p+q+2
pω;n The proof of (ii) is similar to proof
(i) by taking the limit when |a| −→ 1− in (i), hence it can be omitted.
Theorem 3.2 Let 0 < p < ∞, −2 < q < ∞ and ω : (0, 1] → (0,∞). Assume K1(r) ≤ K2(r) forr ∈ (0, 1) and K1(r)
K2(r)→ 0 as r → 0. If the integral in (3) is divergent for K2, then
QK2,ω(p, q; n) $ QK1,ω(p, q;n).
Proof: It is clear that QK2,ω(p, q;n) ⊂ QK1,ω(p, q; n). Suppose that
QK2,ω(p, q;n) = QK1,ω(p, q; n).
By the open mapping theorem (see [25]), we know that the identity map from one of these spaces intothe other one is continuous. Thus there exists a constant C such that
‖f‖K2,ω(p,q;n) ≤ C‖f‖K1,ω(p,q;n) .
Since K1(r)K2(r)
→ 0 as r → 0, then there exists r0 ∈ (0, 1) such that
K1(r) ≤ (2C)−1K2(r) for 0 < r ≤ r0.
Choose t0 = e−r0 and we deduce that if f ∈ QK2,ω(p, q;n), then
supa∈∆
∫
∆
|f (n)(z)|p (1− |z|)np−p+q K2
(g(z, a)
)
ωp(1− |z|) dσz
≤ C supa∈∆
∫
∆(a,t0)
|f (n)(z)|p (1− |z|)q K1
(g(z, a)
)
ωp(1− |z|) dσz
+12
supa∈∆
∫
∆
|f (n)(z)|p (1− |z|)np−p+q K2
(g(z, a)
)
ωp(1− |z|) dσz .
Therefore,
supa∈∆
∫
∆
|f (n)(z)|p (1− |z|)np−p+q K2
(g(z, a)
)
ωp(1− |z|) dσz
≤ 2C supa∈∆
∫
∆(a,t0)
|f (n)(z)|p (1− |z|)np−p+q K1
(g(z, a)
)
ωp(1− |z|) dσz.
By Lemma 4.1 and for f ∈ QK2,ω(p, q; n), there exists a constant C1 such that
supa∈∆
∫
∆
|f (n)(z)|p (1− |z|)np−p+q+2 K2
(g(z, a)
)
ωp(1− |z|) dσz ≤ C1‖f‖p
Bnp−p+q+2
pω;n
. (23)
If g ∈ Bnp−p+q+2
pω;n and gr(z) = g(rz) , 0 < r < 1, then
∥∥gr
∥∥B
np−p+q+2p
ω;n
≤ ∥∥g∥∥B
np−p+q+2p
ω;n
.
Since gr ∈ QK2,ω(p, q; n) , 0 < r < 1, we can choose f = gr in the inequality (23). Using Fatou’s lemma(see [31]), we deduce that
supa∈∆
∫
∆
|g(n)(z)|p(1− |z|)np−p+q K2(g(z, a))ωp(1− |z|) dσz < C1
∥∥g∥∥p
Bnp−p+q+2
pω;n
.
We have proved that g ∈ QK2,ω(p, q;n). It means that QK2,ω(p, q; n) = Bnp−p+q+2
pω;n . It follows from
Theorem 2.1 that the integral in (3) with K = K2 must be convergent, a contradiction. We obtain that
QK2,ω(p, q; n) $ QK1,ω(p, q;n).
Now, the proof of Theorem 4.2 is completed.
Remark 3.1 It is still an open problem to extend the results of this paper in Clifford analysis. For moredetails on some classes of quaternion function spaces, we refer to ([3, 4, 5, 6, 7, 12, 13, 20, 21, 22]) andothers.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
831 A. El-Sayed Ahmed et al 822-833
11
References
[1] A. B. Aleksandrov, J. M. Anderson and N. Nicolau, Inner functions, Bloch spaces and symmetricmeasures, Proc. Lond. Math. Soc., III. Ser. 79(2)(1999), 318-352.
[2] J. M. Anderson, J. L. Fernandez, A. L. Shields, Inner functions and cyclic vectors in the Bloch space,Trans. Am. Math. Soc. 323(1)(1991), 429-448.
[3] A. El-Sayed Ahmed, On weighted α-Besov spaces and α-Bloch spaces of quaternion-valued functions,Numer. Funct. Anal. Optim. 29(2008), 1064-1081.
[4] A. El-Sayed Ahmed, Lacunary series in quaternion Bp,q spaces, Complex Var. Elliptic Equ,54(7)(2009), 705-723.
[5] A. El-Sayed Ahmed, Lacunary series in weighted hyperholomorphic Bp,q(G) spaces, Numer. Funct.Anal. Optim, 32(1)(2011), 41-58
[6] A. El-Sayed Ahmed, Hyperholomorphic Q classes, Math. Comput. Modelling, 55(2012) 1428-1435.
[7] A. El-Sayed Ahmed and A. Ahmadi, On weighted Bloch spaces of quaternion-valued functions,International Conference on Numerical Analysis and Applied Mathematics: 19-25 September 2011Location: Halkidiki, (Greece): AIP Conference Proceedings, 1389(2011), 272-275.
[8] A. El-Sayed Ahmed and M. A. Bahkit, Composition operators on some holomorphic Banach functionspaces, Mathematica Scandinavica, 104(2)(2009), 275-295.
[9] A. El-Sayed Ahmed and M.A. Bakhit, Characterizations involving Schwarzian derivative in someanalytic function spaces, Math. Sci. (2013) DOI: 10.1186/10.1186/2251-7456-7-43.
[10] A. El-Sayed Ahmed and A. Kamal, Generalized composition operators on QK,ω(p, q) spaces, Math-ematical Sciences Springer, (2012), 6:14. DOI:10.1186/2251-7456-6-14.
[11] A. El-Sayed Ahmed and A. Kamal, Carleson measure characterization on analytic QK(p, q) spaces,International Mathematical Virtual Institute, Vol 3(2013), 1-21.
[12] A. El-Sayed Ahmed and S. Omran, Weighted classes of quaternion-valued functions, Banach J. Math.Anal. 6(2012), 180-191.
[13] A. El-Sayed Ahmed and S. Omran, On Bergman spaces in Clifford analysis, Applied MathematicalSciences, 7(85)(2013), 4203 - 4211.
[14] R. Aulaskari and P. Lappan, Criteria for an analytic function to be Bloch and a harmonic or mero-morphic function to be normal, Complex Analysis and its Applications (Eds Y. Chung-Chun et al.),Pitman Research Notes in Mathematics, Longman, 305(1994), 136-146.
[15] R. Aulaskari, P. Lappan and R. Zhao, On harmonic normal and Q#p functions, Illinois Journal of
Mathematics, 45(2)(2001), 423-440.
[16] K. M. Dyakonov, Weighted Bloch spaces, Hp, and BMOA, J. Lond. Math. Soc. II. Ser, 65(2)(2002),411-417.
[17] M. Essen and H. Wulan, On analytic and meromorphic functions and spaces of QK type, Illinois J.Math, 46(2002), 1233-1258.
[18] M. Essen H. Wulan and J. Xiao, Several function-theoretic characterizations of Mobius invariant QK
spaces, J. Funct. Anal. 230(1) (2006), 78-115.
[19] P. Galanopoulos, On Blog to Qplog pullbacks, J. Math. Anal. Appl. 337(2008), 712-725.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
832 A. El-Sayed Ahmed et al 822-833
12
[20] K. Gurlebeck and A. El-Sayed Ahmed, Integral norms for hyperholomorphic Bloch functions in theunit ball of R3, Proceedings of the 3rd International ISAAC Congress held in Freie Universtaet Berlin-Germany, August 20-25 (2001), Editors H.Begehr, R. Gilbert and M.W. Wong, Kluwer AcademicPublishers, World Scientific New Jersey, London, Singapore, Hong Kong, Vol I(2003), 253-262.
[21] K. Gurlebeck and A. El-Sayed Ahmed, On Bq spaces of hyperholomorphic functions and the Blochspace in R3, Le Hung Son ed. Et al. In the book Finite and infinite dimensional complex Analysis andApplications, Advanced complex Analysis and Applications, Kluwer Academic Publishers, (2004),269-286.
[22] K. Gurlebeck and A. El-Sayed Ahmed, On series expansions of hyperholomorphic Bq functions,Trends in Mathematics : Advances in Analysis and Geometry, Birkaeuser verlarg Switzerland, (2004),113-129.
[23] M. M. Jones, A note on the Konigs domain of compact composition operators on the Bloch space,Journal of Inequalities and Applications, (2011): 31.
[24] A. Kamal and A. El-Sayed Ahmed, A property of meromorphic functions with Hadamard gaps,Scientific Research and Essays, 8(15)(2013), 633-639.
[25] E. Kreyszig, Introductory Functional Analysis with Applications, John Wiley and Sons (1978).
[26] Y. Liang and Z. Zhou, New estimate of essential norm of composition followed by differentiationbetween Bloch-type spaces, Banach J. Math. Anal. 8(1)(2014), 118-137.
[27] H. Li and S. Li, Norm of an integral operator on some analytic function spaces on the unit disk,Journal of Inequalities and Applications (2013): 342.
[28] M. Pavlovic, Analytic functions with decreasing coefficients and Hardy and Bloch spaces, Proc.Edinb. Math. Soc., II. Ser. 56(2)(2013), 623-635.
[29] R. A. Rashwan, A. El-Sayed Ahmed and A. Kamal, Some characterizations of weighted Bloch space,Eur. J. Pure Appl. Math, 2(2009), 250-267.
[30] R. A. Rashwan, A. El-Sayed Ahmed and A. Kamal, Integral characterizations of weighted Blochspaces and QK,ω(p, q) spaces, Mathematica Cluj, 51(1)(74)(2009), 63-76.
[31] H. L. Royden, Real Analysis. 2nd ed. New York: Macmillan, (1968).
[32] K. Stroethoff, Besov-type characterisations for the Bloch space, Bull. Austral. Math. Soc. 39(1989),405-420.
[33] H. Wulan and K. Zhu, QK type spaces of analytic functions, J. Funct. spaces Appl. 4(2006), 73-84.
[34] H. Wulan and K. Zhu, Derivative-free characterizations of QK spaces, J. Aust. Math. Soc.82(2)(2007), 283-295.
[35] J. Xiao, Holomorphic Q Classes, Springer LNM 1767, Berlin, (2001).
[36] L. Zhang and H. Zeng, Weighted differentiation composition operators from weighted bergman spaceto nth weighted space on the unit disk, Journal of Inequalities and Applications (2011) :65.
[37] X. Zhang, C. He and F. Cao, The equivalent norms of F (p, q, s) space in Cn, J. Math. Anal. Appl.401(2)(2013), 601-610.
[38] R. Zhao, On a general family of function spaces, Ann. Acad. Sci. Fenn. Math. Diss. 105, 1996.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
833 A. El-Sayed Ahmed et al 822-833
On two Dimensional q-Bernoulli and q-Genocchi Polynomials:
Properties and location of zeros
N. I. Mahmudov, A. Akkeles and A. OnerenEastern Mediterranean University
Gazimagusa, TRNC, Mersiin 10, TurkeyEmail: [email protected]
Abstract
The main purpose of this paper is to investigate two dimensional generalized Genocchi polynomialsbased on the q-integers. The q-analogues of well-known formulas are derived. The q-analogue of theSrivastava–Pinter addition theorem is obtained. Furthermore we explore the shapes of the q-Genocchinumbers and the q-Genocchi polynomials. We describe the structure of the roots of the q-Genocchipolynomials for values of the index n using a computer.
1 Introduction
Throughout this paper, we always make use of the following notation: N denotes the set of natural numbers,N0 denotes the set of nonnegative integers, R denotes the set of real numbers, C denotes the set of complexnumbers.
The q-shifted factorial is defined by
(a; q)0 = 1, (a; q)n =n−1∏j=0
(1− qja
), n ∈ N, (a; q)∞ =
∞∏j=0
(1− qja
), |q| < 1, a ∈ C.
The q-numbers and q-numbers factorial is defined by
[a]q =1− qa
1− q(q = 1) ; [0]q! = 1; [n]q! = [1]q [2]q ... [n]q n ∈ N, a ∈ C
respectively. The q-polynomail coefficient is defined by[nk
]q
=(q; q)n
(q; q)n−k (q; q)k.
The q-analogue of the function (x⊕ y)nis defined by
(x⊕ y)nq :=
n∑k=0
[nk
]q
xkyn−k, n ∈ N0.
In the standard approach to the q-calculus two exponential function are used:
eq (z) =
∞∑n=0
zn
[n]q!=
∞∏k=0
1
(1− (1− q) qkz), 0 < |q| < 1, |z| < 1
|1− q|,
Eq (z) =∞∑
n=0
q12n(n−1)zn
[n]q!=
∞∏k=0
(1 + (1− q) qkz
), 0 < |q| < 1, z ∈ C.
1
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
834 N. I. Mahmudov et al 834-843
From this form we easily see that eq (z)Eq (−z) = 1. Moreover,
Dqeq (z) = eq (z) , DqEq (z) = Eq (qz) ,
The above q-standard notation can be found in [1].Carlitz has introduced the q-Bernoulli numbers and polynomials in [2]. Srivastava and Pinter proved
some relations and theorems between the Bernoulli polynomials and Euler polynomials in [20]. They alsogave some generalizations of these polynomials. In [10]-[22], Kim et al. investigated some properties of theq-Euler polynomials and Genocchi polynomials. They gave some recurrence relations. In [4], Cenkci et al.gave the q-extension of Genocchi numbers in a different manner. In [23], Kim gave a new concept for theq-Genocchi numbers and polynomials. In [25], Simsek et al. investigated the q-Genocchi zeta function andl-function by using generating functions and Mellin transformation. There are numerous recent studies onthis subject by among many other authors: Cenkci et al. [4], [5], Choi et al [7], Cheon [6], Luo and Srivastava[13], [14], [15], Srivastava et al.[20], [26], Gabouary and Kurt B., [8], Kim et al. [24].
We propose the following definitions. We define the q-Bernoulli and the q-Genocchi polynomials of higherorder in two variables x and y, using two q-exponential functions, which helps us easily prove some propertiesof these polynomials and q-analogue of the Srivastava and Pinter addition theorem.
Definition 1 The q-Bernoulli numbers Bn,q and polynomials Bn,q (x, y) in x, y are defined by means of thegenerating functions:
t
eq (t)− 1=
∞∑n=0
Bn,qtn
[n]q!, |t| < 2π,
t
eq (t)− 1eq (tx) eq (ty) =
∞∑n=0
Bn,q (x, y)tn
[n]q!, |t| < 2π.
Definition 2 The q-Genocchi numbers Gn,q and polynomials Gn,q (x, y) in x, y are defined by means of thegenerating functions:
2t
eq (t) + 1=
∞∑n=0
Gn,qtn
[n]q!, |t| < π,
2t
eq (t) + 1eq (tx) eq (ty) =
∞∑n=0
Gn,q (x, y)tn
[n]q!, |t| < π.
It is obvious that
Bn,q = Bn,q (0, 0) , limq→1−
Bn,q (x, y) = Bn (x+ y) , limq→1−
Bn,q = Bn,
Gn,q = Gn,q (0, 0) , limq→1−
Gn,q (x, y) = Gn (x+ y) , limq→1−
Gn,q = Gn.
Here Bn (x) and Gn (x) denote the classical Bernoulli and Genocchi polynomials are defined by
t
et − 1etx =
∞∑n=0
Bn (x)tn
n!and
2t
et + 1etx =
∞∑n=0
Gn (x)tn
n!.
The aim of the present paper is to obtain some results for the q-Genocchi polynomials (Propertiesof the q-Bernoulli polynomials is studied in [19]). The q-analogues of well-known results, for example,Srivastava and Pinter [20], can be derived from these q-identities. It should be mentioned that probabilisticproof the Srivastava-Pinter addition theorems were given recently in [26]. The formulas involving the q-Stirling numbers of the second kind, q-Bernoulli polynomials and q-Bernstein polynomials are also given.Furthermore some special cases are also considered.
2
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
835 N. I. Mahmudov et al 834-843
2 Properties
In this section we shall provide some basic formulas for the q-Genocchi polynomials Gn,q (x, y) in order toobtain the main results of this paper in the next section.
The following elementary properties of the q-Genocchi polynomials Gn,q (x, y) are readily derived fromDefinition 2.
Property 1. Summation formulas for the q-Genocchi polynomials:
Lemma 3 For all x, y ∈ C we have
Gn,q (x, y) =n∑
k=0
[nk
]q
Gk,q (x⊕ y)n−kq .
Proof. The proof is based on the following identity
(2t
eq (t) + 1
)eq (tx) eq (ty) =
∞∑k=0
Gk,qtk
[k]q!
∞∑n=0
tnxn
[n]q!
∞∑n=0
tnyn
[n]q!
=∞∑k=0
Gk,qtk
[k]q!
∞∑n=0
(n∑
k=0
tkxk
[k]q!.tn−kyn−k
[n− k]q!
)
=∞∑k=0
Gk,qtk
[k]q!
∞∑n=0
(n∑
k=0
[nk
]q
xkyn−k
)tn
[n]q!
=
∞∑k=0
Gk,qtk
[k]q!
∞∑n=0
(x⊕ y)n−kq
tn
[n]q!
=∞∑
n=0
n∑k=0
[nk
]q
Ek,q (x⊕ y)n−kq
tn
[n]q!.
Lemma 4 For all x, y ∈ C we have
Gn,q (x, y) =n∑
k=0
[nk
]q
Gk,q (x) yn−k.
Proof. The proof is based on the following identity(2t
eq (t) + 1
)eq (tx) eq (ty) =
∞∑n=0
Gn,q(x)tn
[n]q!
∞∑n=0
tnyn
[n]q!
=
∞∑n=0
∞∑k=0
Gk,q(x)tk
[k]q!
tn−kyn−k
[n− k]q!
=∞∑
n=0
n∑k=0
[nk
]q
Gk,q(x)yn−k tn
[n]q!.
Lemma 5 For all x, y ∈ C we have
Gn,q (x) =n∑
k=0
[nk
]q
Gk,qxn−k.
3
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
836 N. I. Mahmudov et al 834-843
Proof. The proof is readily derived from Definition 2.Property 2. Difference equation:
Lemma 6 For all x, y ∈ C we have
Gn,q (x, 1) +Gn,q (x, 0) = 2 [n]q xn−1.
Proof.
Gn,q (x, 1) +Gn,q (x, 0) =2t
eq (t) + 1eq (tx) eq (t) +
2t
eq (t) + 1eq (tx)
=2t
eq (t) + 1eq (tx) (eq (t) + 1)
= 2teq(tx) = 2t∞∑
n=0
tnxn
[n]q!= 2
∞∑n=1
tnxn−1
[n− 1]q!
= 2∞∑
n=1
tnxn−1
[n]q![n]q =
∞∑n=1
2xn−1 [n]qtn
[n]q!.
Property 3. Differential relation:
Lemma 7 For all x, y ∈ C we have
Dq,xGn,q (x) = [n]q Gn−1,q (x) .
Proof. It follows from the following relation
Dq,x
(2t
eq (t) + 1
)eq (tx) =
(2t
eq (t) + 1
)teq (tx)
= t∞∑
n=0
Gn,q (x)tn
[n]q!
=∞∑
n=0
[n]q Gn−1,q (x)tn
[n]q!.
3 Explicit relationship between the q-Genocchi and the q-Bernoullipolynomials
In this section we prove an interesting relationship between the q-Genocchi polynomials Gn,q (x, y) and theq-Bernoulli polynomials. Here some q-analogues of known results will be given. We also obtain new formulasand their some special cases below.
Theorem 8 For n ∈ N0, the following relationship
Gn,q (x, y) =
n∑k=0
[nk
]q
1
[k + 1]qmk−n+1
(Gk+1,q
(x,
1
m
)−Gk+1,q (x)
)Bn=k,q (my) .
holds true between the q-Genocchi and the q-Bernoulli polynomials..
4
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
837 N. I. Mahmudov et al 834-843
Proof. Using the following identity
2t
eq (t) + 1eq (tx) eq (ty) =
2t
eq (t) + 1eq (tx) ·
eq(
tm
)− 1
t· t
eq(
tm
)− 1
· eq(
t
mmy
)we have
∞∑n=0
Gn,q (x, y)tn
[n]q!=
m
t
∞∑n=0
Gn,q (x)tn
[n]q!
( ∞∑n=0
tn
mn [n]q!− 1
) ∞∑n=0
Bn,q (my)tn
mn [n]q!
= m∞∑
n=1
(n∑
k=0
[nk
]q
mk−nGk,q (x)−Gn,q (x)
)tn−1
[n]q!
∞∑n=0
Bn,q (my)tn
mn [n]q!
= m∞∑
n=0
(n∑
k=0
[n+ 1k
]q
mk−n−1Gk,q (x)−Gn+1,q (x)
)tn
[n+ 1]q!
∞∑n=0
Bn,q (my)tn
mn [n]q!
= m
∞∑n=0
(Gn+1,q
(x,
1
m
)−Gn+1,q (x)
)tn
[n+ 1]q!
∞∑n=0
Bn,q (my)tn
mn [n]q!
=∞∑
n=0
n∑k=0
[nk
]q
1
[k + 1]qmk−n+1
(Gk+1,q
(x,
1
m
)−Gk+1,q (x)
)Bn=k,q (my)
tn
[n]q!.
Corollary 9 For n ∈ N0, m ∈ N the following relationship holds true.
Gn (x+ y) =n∑
k=0
(nk
)2
k + 1
((k + 1) yk −Gk+1,q (y)
)Bn−k (x) , (1)
Gn (x+ y) =
n∑k=0
(nk
)1
mn−k−1 (k + 1)
[2 (k + 1)Gk
(y +
1
m− 1
)−Gk+1
(y +
1
m− 1
)−Gk+1 (y)
](2)
×Bn−k,q (mx)
between the classical Genocchi polynomials and the classical Bernoulli polynomials.
Note that the formula (2) is new for the classical polynomials.In terms of the q-Genocchi numbers Gk,q, by setting y = 0 in Theorem 8, we obtain the following explicit
relationship between the q-Genocchi polynomials Gk,q of order α and the q-Bernoulli polynomials.
Corollary 10 For n ∈ N0 the following relationship holds true.
Gn,q (x, y) =n∑
k=0
[nk
]q
2
[k + 1]q
[[k + 1]q q
12k(k−1)yk −Gk+1,q (y)
]Bn−k,q (x) .
Corollary 11 For n ∈ N0 the following relationship holds true.
Gn,q (x) = −n∑
k=0
[nk
]q
2
[k + 1]qGk+1,qBn−k,q (x) ,
Gn,q = −n∑
k=0
[nk
]q
2
[k + 1]qGk+1,qBn−k,q.
5
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
838 N. I. Mahmudov et al 834-843
Theorem 12 For n ∈ N0, the following relationship
Bn,q (x, y) =1
2
n∑k=0
[nk
]q
mk−n
1
[k + 1]qBk+1,q(x) +m−k
k∑j=0
[kj
]q
1
[j + 1]qmjBj+1,q(x)
Gn−k,q (my) .
holds true between the q-Bernoulli and the q-Genocchi polynomials.
Proof. Using the following identity
t
eq (t)− 1eq (tx) eq (ty) =
t
eq (t)− 1eq (tx) ·
2t
eq(
tm
)+ 1
· eq(
t
mmy
)eq(
tm
)+ 1
2t
we have
∞∑n=0
Bn,q (x, y)tn
[n]q!=
1
2t
∞∑n=0
Bn,q (x)tn
[n]q!
∞∑n=0
Gn,q (my)tn
mn [n]q!
∞∑n=0
tn
mn [n]q!
+1
2t
∞∑n=0
Bn,q (x)tn
[n]q!
∞∑n=0
Gn,q (my)tn
mn [n]q!
= I1 + I2.
It is clear that
I2 =1
2t
∞∑n=0
Bn,q (x)tn
[n]q!
∞∑n=0
Gn,q (my)tn
mn [n]q!
=1
2
∞∑n=0
Bn+1,q (x)tn
[n+ 1]q!
∞∑n=0
Gn,q (my)tn
mn [n]q!
=1
2
∞∑n=0
n∑k=0
[nk
]q
1
[k + 1]qBk+1,q (x)Gn−k,q (my)
tn
[n]q!.
On the other hand
I1 =1
2t
∞∑n=0
Bn,q (x)tn
[n]q!
∞∑n=0
Gn,q (my)tn
mn [n]q!
∞∑n=0
tn
mn [n]q!
=1
2
∞∑n=0
Bn+1,q (x)tn
[n+ 1]q!
∞∑n=0
n∑j=0
[nj
]q
m−nGj,q (my)tn
[n]q!
=1
2
∞∑n=0
n∑k=0
[nk
]q
1
[k + 1]qmk−nBk+1,q (x)
n−k∑j=0
[n− kj
]q
Gj,q (my)tn
[n]q!
Therefore
∞∑n=0
Bn,q (x, y)tn
[n]q!= I1 + I2
=1
2
∞∑n=0
n∑k=0
[nk
]q
mk−n
1
[k + 1]qBk+1,q (x) +m−k
k∑j=0
[kj
]q
1
[j + 1]qmjBj+1,q (x)
×Gn−k,q (my)
tn
[n]q!.
6
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
839 N. I. Mahmudov et al 834-843
Theorem 13 The polynomials Bn,q (x, y) and Gn,q (x, y) satisfy the following relationship:
Bn,q (x, y) =
n+1∑k=1k =n
[n+ 1k
]q
1
[n+ 1]qGk,q (x, y)Bn+1−k,q (x, y) .
Proof. Comparing coefficients of tn
[n]q !we get the desired identity:
∞∑n=0
Bn,q (x, y)tn
[n]q!=
t
eq (t)− 1eq (tx) eq (ty)
=1
2
2t
eq (t) + 1eq (tx) eq (ty) +
1
t
t
eq (t)− 1
2t
eq (t) + 1eq (tx) eq (ty)
=1
2
∞∑n=0
Gn,q (x, y)tn
[n]q!+
1
t
∞∑n=0
Bn,q (x, y)tn
[n]q!
∞∑n=0
Gn,q (x, y)tn
[n]q!
=1
2
∞∑n=0
Gn,q (x, y)tn
[n]q!+
∞∑n=0
n∑k=0
[nk
]q
Gk,q (x, y)Bn−k,q (x, y)tn−1
[n]q!
=1
2
∞∑n=0
Gn,q (x, y)tn
[n]q!+
∞∑n=0
n+1∑k=1
[n+ 1k
]q
1
[n+ 1]qGk,q (x, y)Bn+1−k,q (x, y)
tn
[n]q!.
Theorem 14 The polynomials Bn,q (x, y) and Gn,q (x, y) satisfy the following relationship:
Gn,q (x, y) = −2
(n∑
k=1
[nk
]q
1
[k + 1]qGk+1,qBn−k,q (x, y) +
1
[n+ 1]qGn+1,q
)Proof.
∞∑n=0
Gn,q (x, y)tn
[n]q!=
1
t
2t
eq (t) + 1(eq (t)− 1)
t
eq (t)− 1eq (tx) eq (ty)
=1
t
(2t− 2
2t
eq (t) + 1
)t
eq (t)− 1eq (tx) eq (ty)
=1
t
(2t− 0− 2t− 2
∞∑n=2
Gn,qtn
[n]q!
) ∞∑n=0
Bn,q (x, y)tn
[n]q!
= −2∞∑
n=1
Gn+1,qtn
[n+ 1]q!
(1 +
∞∑n=1
Bn,q (x, y)tn
[n]q!
)
= −2∞∑
n=1
(n∑
k=1
[nk
]q
1
[k + 1]qGk+1,qBn−k,q (x, y) +
1
[n+ 1]qGn+1,q
)tn
[n]q!
4 Location of zeros of the q-Genocchi polynomials
In this section, we display the shapes of the q-Genocchi numbers and polynomials. Next, we investigate thezeros of the q-Genocchi polynomials using a computer.
Our numerical results for the approximate solutions of the real zeros of Gn,q (x),q = 0.9, are shown intables 1. The results were obtained using the Mathematica R⃝software.
The shapes of the q-Genocchi numbers Gn,q for n = 1, ..., 20. q = 12 , 0.9, 0.9999 are shown in figure 1,
figure 2 and and figure 3.
7
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
840 N. I. Mahmudov et al 834-843
Table 1: Approximate solutions of Gn,q(x) = 0
n q # of Real Roots # of Complex Roots0.5 3 170.6 3 170.7 3 17
20 0.8 3 170.9 3 17
0.9999 7 13910 3 171 7 13
References
[1] G. E. Andrews, R. Askey and R. Roy Special functions, volume 71 of Encyclopedia of Mathematics andits Applications, Cambridge University Press, Cambridge, 1999.
[2] L. Carlitz, q-Bernoulli numbers and polynomials, Duke Math. J. 15 (1948), 987-1000.
[3] L. Carlitz, Expansions of q-Bernoulli numbers, Duke Math. J., 25 (1958), 355-364.
[4] M. Cenkci, M. Can. and V. Kurt, q-extensions of Genocchi numbers, J. Korean Math. Soc., 43 (2006),183-198.
[5] M. Cenkci, V. Kurt, S. Rim. and Y. Simsek., On (i; q) Bernoulli and Euler numbers, Appl. Math. Letter,21 (2008), 706-711.
[6] Cheon G. S., A note on the Bernoulli and Euler polynomials, Appl. Math. Letter, 16 (2003), 365-368.
[7] Choi J., Anderson P. J. and Srivastava H. M., Some q-extensions of the Apostol-Bernoulli and Apostol-Euler polynomials of order n and the multiple Hurwitz zeta function, App. Math. Compt., 199 (2008),723-737.
[8] Gabaury S. and Kurt B., Some relations involving Hermite-based Apostol-Genocchi polynomials, App.Math. Sci., 6 (2012), 4091-4102.
[9] Kim T., Some formulae for the q-Bernoulli and Euler polynomials of higher order, J. Math. Analy.Appl., 273 (2002), 236-242.
[10] Kim T., q-Generalized Euler numbers and polynomials, Russ. J. Math. Phys., 13 (2006), 293-298.
[11] Kim D. S., Kim T. and Lee S.-Hi, A note on q-Frobenius-Euler numbers and polynomials, Adv. StudiesTheo. Phys., vol. 17, 18(2013), 881-889.
[12] Kupershmidt B. O., Reflection symmetries of q-Bernoulli polynomials, J. Nonlinear Math. Phys., 12(2005), 412-422.
[13] Luo Q.-M., Some results for the q-Bernoulli and q-Euler polynomials, J. Math. Anal. Appl., 363 (2010),7-18.
[14] Luo Q.-M. and Srivastava H. M., Some relationships between the Apostol-Bernoulli and Apostol-Eulerpolynomials, Comp. Math. App., 51 (2006), 631-642.
[15] Luo Q.-M. and Srivastava H. M., q-Extensions of some relationships between the Bernoulli and Eulerpolynomials, Taiwanese J. Math., 15 (2011), 241-257.
8
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
841 N. I. Mahmudov et al 834-843
[16] Mahmudov N. I., q-analogues of the Bernoulli and Genocchi polynomials and the Srivastava-Pinter addition theorems, Discrete Dynamics in Nature and Soc. Article number 169348, 2012,doi:10.1155/2012/169348.
[17] Mahmudov N. I., On a class of q-Bernoulli and q-Euler polynomials, Adv. Differ. Equ., 2013:108,doi:10.1186/1687-1847-2013-108.
[18] Mahmudov N. I. and Keleshteri M. E., On a class of generalized q-Bernoulli and q-Euler polynomials,Adv. Difference Equ. 2013,2013:115.
[19] Mahmudov, N. I.; Akkeles, A.; Oneren, A., On a class of two dimensional (w, q)-Bernoulli and (w, q)-Euler polynomials: Properties and location of zeros, Journal of Computational Analysis and Applica-tions, 16 (2014), 282-292.
[20] H. M. Srivastava and A. Pinter, Remarks on some relationships between the Bernoulli and Euler poly-nomials, Appl. Math. Lett. 17 (2004), no. 4, 375-380.
[21] T. Kim , On the q-extension of Euler and Genocchi numbers, J. Math. Anal. Appl. 326 (2007), no. 2,1458-1465.
[22] T. Kim, Note on q-Genocchi numbers and polynomials, Adv. Stud. Contemp. Math. (Kyungshang) 17(2008), no. 1, 9-15.
[23] T. Kim, A note on the q-Genocchi numbers and polynomials, J. Inequal. Appl. 2007 (2007), Art. ID71452, 8 pp. doi:10.1155/2007/71452.
[24] Daeyeoul Kim, Burak Kurt, and Veli Kurt, “Some Identities on the Generalized q-Bernoulli, q-Euler,and q−Genocchi Polynomials,” Abstract and Applied Analysis, vol. 2013, Article ID 293532, 6 pages,2013. doi:10.1155/2013/293532
[25] Y. Simsek, I. N. Cangul, V. Kurt, and D. Kim, q-Genocchi numbers and polynomials associated withq-Genocchi-type l-functions, Adv. Difference Equ. 2008 (2008), Art. ID.
[26] H. M. Srivastava and C. Vignat, Probabilistic proofs of some relationships between the Bernoulli andEuler polynomials, European J. Pure Appl. Math. 5 (2012), 97–107.
9
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
842 N. I. Mahmudov et al 834-843
-1.0 -0.5 0.0 0.5 1.0-0.3
-0.2
-0.1
0.0
0.1
0.2
0.3
x
T
Figure 1: Shape of Gn,0.5(x) within x = [−1, 1]
-1.0 -0.5 0.0 0.5 1.0
-400
-200
0
200
400
600
x
T
Figure 2: Shape of Gn,0.9(x) within x = [−1, 1]
-3 -2 -1 0 1 2 3-150 000
-100 000
-50 000
0
50 000
100 000
150 000
x
T
Figure 3: Shape of Gn,0.9999 within x = [−3, 3]
-0.4 -0.2 0.0 0.2 0.4 0.6 0.8 1.0
-0.4
-0.2
0.0
0.2
0.4
0.6
ReHxL
ImHxL
Figure 4: Zeros of G20,0.5(x)
-1.5 -1.0 -0.5 0.0 0.5 1.0 1.5 2.0-2
-1
0
1
2
ReHxL
ImHxL
Figure 5: Zeros of G20,0.9(x)
-2 -1 0 1 2 3
-3
-2
-1
0
1
2
3
ReHxL
ImHxL
Figure 6: Zeros of G20,0.9999(x)
10
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
843 N. I. Mahmudov et al 834-843
Existence results of sequential derivatives of nonlinearquantum difference equations with a new class of three-point
boundary value problems conditions
Nichaphat Patanarapeelert and Thanin Sitthiwirattham 1
Department of Mathematics, Faculty of Applied Science,King Mongkut’s University of Technology,
North Bangkok, Bangkok, ThailandE-mail: [email protected], [email protected]
Abstract
In this paper, we study a new class of three-point boundary value problems
of Sequential Derivatives of nonlinear q-difference equations. Our problems
contain different numbers of q in derivatives and integrals. By using a variety of
fixed point theorems (such as Banach’s contraction principle and Krasnoselskii’s
fixed point theorem, some new existence and uniqueness results are obtained.
Illustrative example is also presented.
Keywords: existence; q-derivative; q-integral; q-difference equation
(2010) Mathematics Subject Classifications: 34B10; 39A13.
1 Introduction
In 20th century, the intensive works on q-difference equations by Jackson [1], Carmichael
[2], Mason [3] and Adams [4] became more interesting in many areas of mathematics
and applications, e.g. the applications to orthogonal polynomials and mathemat-
ical control theories, since years eighties. Although many researches related with
q-calculus are raised (see [5]-[14],[16]-[28]),there are lack of works of studying of
boundary value problem of q-difference equations. Recently, there are few researches
concerning with the boundary value problem of nonlinear q-difference equations as
follows.
In 2012, Ahmad et al. [24] proposed the boundary value problem of nonlinear
second order q-difference equations with nonlocal boundary conditions given by
D2qx(t) = f(t, x(t)), t ∈ [0, T ], (1.1)
1Corresponding author
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
844 Nichaphat Patanarapeelert et al 844-856
2 Nichaphat Patanarapeelert and Thanin Sitthiwirattham
α1x(0)− β1Dqx(0) = γ1x(η1),
α2x(1) + β2Dqx(1) = γ2x(η2),(1.2)
where f ∈ C([0, T ] × R,R), and q is a constant that q ∈ (0, 1). By employing Ba-
nach’s contraction principle, Krasnoselskii’s fixed point theorem and Leray-Schauder
nonlinear alternative, Ahmad et al derived the existence of solutions of the above
problem.
Later, Yu andWang [28] proposed the boundary value problem of nonlinear second
order q-difference equation given byD2
qu(t) + f(t, u(t), Dqu(t)) = 0, t ∈ [0, T ],
Dqu(0) = 0, Dqu(1) = αu(1),(1.3)
where f ∈ C([0, T ] × R,R), and α = 0 is a fixed constant. They discussed the
existence and uniqueness of solution of this problem by using Banach’s contraction
principle, the Leray-Schauder nonlinear alternative and Leray-Schauder continuation
theorem.
Lately, Pongarm et al. [29] studied the sequential derivative of nonlinear q-
difference equation with three-point boundary conditions. The problem is in the
form Dq (Dp + λ)u(t) = f(t, u(t)), t ∈ [0, T ],
u(0) = 0, u(T ) = α
∫ η
0
u(s)drs,(1.4)
where 0 < p, q, r < 1, f ∈ C([0, T ]×R,R), 0 < η < T and λ, β are given constants. For
this problem, the existence solution is discussed by employing Banach’s contraction
mapping principle, Krasnoselskii’s fixed point theorem and Leray-Schauder degree
theory. Since the number of papers about the problems with different values of the
q-numbers is sparse, there is a need for further study.
In this article, we consider the following nonlinear q-difference equation with three-
point integral boundary condition given byDq(Dp + λ)x(t) = f(t, x(t)), t ∈ [0, T ],
x(η) = 0,
∫ T
0
x(s)drs = 0, 0 < η < T,
(1.5)
where 0 < p, q, r < 1, f ∈ C([0, T ]× R,R), and ηT (1 + r) = T 2.
The given problem consists of three different values of the q numbers, in q-
derivatives and the q-integral. In addition, the value of function in an intermediate
point is used. Our overall goal is to prove an existence and uniqueness of solu-
tions of the problem (1.5) by employing Banach’s contraction mapping principle and
Krasnoselskii’s fixed point theorem. In Section 2, we briefly discuss about the basic
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
845 Nichaphat Patanarapeelert et al 844-856
Existence results of sequential derivatives of nonlinear quantum difference equations3
definitions, some properties of q-difference and present a lemma that will be used
throughout the paper. In Sections 3 and 4, we give the main results and example,
respectively.
2 Preliminaries
The basic definitions and some properties of q-calculus [15, 18] are as follows.
Definition 2.1. For 0 < q < 1, we define the q-derivative of a real valued function f
as
Dqf(t) =f(t)− f(qt)
(1− q)t, Dqf(0) = lim
t→0Dqf(t).
The higher order q-derivatives are given by
Dnq f(t) = DqD
n−1q f(t), n ∈ N.
where D0qf(t) = f(t)
The definite q-integral of a function f defined on the interval [0, T ] is given by
Iqf (t) =
∫ t
0
f (s) dqs =∞∑n=0
t(1− q)qnf (tqn)
where last term is convergent series.
If a ∈ [0, T ], then∫ b
a
f(s)dqs = Iqf(b)− Iqf(a) = (1− q)∞∑n=0
qn [bf (bqn)− af (aqn)] .
We note that
DqIqf(x) = f(x),
while if f is continuous at x = 0, then
IqDqf(x) = f(x)− f(0).
The property of product rule and integration by parts formula are
Dq(gh)(t) = (Dqg(t))h(t) + g(qt)Dqh(t),
∫ x
0
f(t)Dqg(t)dqt =[f(t)g(t)
]x0−∫ x
0
Dqf(t)g(qt)dqt.
For reversing the order of integration is given by∫ t
0
∫ s
0
f(r)dqrdqs =
∫ t
0
∫ t
qr
f(r)dqsdqr.
In the limit q → 1 the above results correspond to their counterparts in standard
calculus.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
846 Nichaphat Patanarapeelert et al 844-856
4 Nichaphat Patanarapeelert and Thanin Sitthiwirattham
Lemma 2.1. Let ηT (1 + r) = T 2, 0 < p, q r < 1 and λ be a constant. Then for any
h ∈ C[0, T ], the boundary value problem
Dq(Dp + λ)x(t) = f(t, x(t)), t ∈ [0, T ], (2.1)
x(η) = 0,
∫ T
0
x(s)drs = 0, 0 < η < T, (2.2)
is equivalent to the integral equation
x(t) =
∫ t
0
∫ s
0
h(u)dqudps− λ
∫ t
0
x(s)dps
+1
ηT (1 + r)− T 2
(λT (t+ rt− T )
∫ η
0
x(s)dps− T (t+ rt− T )
∫ η
0
∫ s
0
h(u)dqudps
− (1 + r)λ(t− η)
∫ T
0
∫ v
0
x(s)dpsdrv + (1 + r)(t− η)
∫ T
0
∫ v
0
∫ s
0
h(u)dqudpsdrv
)(2.3)
Proof. For t ∈ [0, T ], q-integrating (2.1) from 0 to t, we obtain
(Dp + λ)x(t) =
∫ t
0
h(s)dqs+ c1. (2.4)
Equation (2.4)) can be written as
Dpx(t) =
∫ t
0
h(s)dqs− λx(t) + c1. (2.5)
For t ∈ [0, T ], q-integrating (2.5) from 0 to t, we obtain
x(t) =
∫ t
0
∫ s
0
h(u)dqudps− λ
∫ t
0
x(s)dps+ c1t+ c2. (2.6)
In particular, for t = η, we get
x(η) =
∫ η
0
∫ s
0
h(u)dqudps− λ
∫ η
0
x(s)dps+ c1η + c2. (2.7)
Using the first condition of (2.2) with (2.7), we obtain
ηc1 + c2 = λ
∫ η
0
x(s)dps−∫ η
0
∫ s
0
h(u)dqudps. (2.8)
Form (2.6), we take the r-integral of x(t) from 0 to t, we obtain∫ t
0
x(s)drs =
∫ t
0
∫ v
0
∫ s
0
h(u)dqudpsdrv − λ
∫ t
0
∫ v
0
x(s)dpsdrv + c1t2
1 + r+ c2t. (2.9)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
847 Nichaphat Patanarapeelert et al 844-856
Existence results of sequential derivatives of nonlinear quantum difference equations5
By substituting t = T in (2.9) and employing the second condition of (2.2), we
find that
T 2
1 + rc1 + Tc2 = λ
∫ T
0
∫ v
0
x(s)dpsdrv −∫ T
0
∫ v
0
∫ s
0
h(u)dqudpsdrv. (2.10)
From (2.9) and (2.10), we obtain the system of linear equations. Solving this
system, we get
c1 =(1 + r)t
ηT (1 + r)− T 2
(λT
∫ η
0
x(s)dps− T
∫ η
0
∫ s
0
h(u)dqudps
− λ
∫ T
0
∫ v
0
x(s)dpsdrv +
∫ T
0
∫ v
0
∫ s
0
h(u)dqudpsdrv
)
and
c2 = − 1 + r
ηT (1 + r)− T 2
(λT 2
1 + r
∫ η
0
x(s)dps−T 2
1 + r
∫ η
0
∫ s
0
h(u)dqudps
− ηλ
∫ T
0
∫ v
0
x(s)dpsdrv +
∫ T
0
∫ v
0
∫ s
0
h(u)dqudpsdrv
)After substituting c1 and c2 in (2.6), we get (2.3) as desired. Therefore the proof is
completes.
3 Main results
To accomplish the main results, We transform the boundary value problem (1.5)
into a fixed point problem. From Lemma (2.1), We let C = C([0, T ],R) denote the
Banach space of all functions x. The norm id defined by ∥x∥ = sup|x(t)|, t ∈ [0, T ].The operator F : C → C is define by
(Fx)(t) =
∫ t
0
∫ s
0
f(u, x(u))dqudps− λ
∫ t
0
x(s)dps
+1
ηT (1 + r)− T 2
(λT (t+ rt− T )
∫ η
0
x(s)dps− T (t+ rt− T )×∫ η
0
∫ s
0
f(u, x(u))dqudps− (1 + r)λ(t− η)
∫ T
0
∫ v
0
x(s)dpsdrv
+(1 + r)(t− η)
∫ T
0
∫ v
0
∫ s
0
f(u, x(u))dqudpsdrv
)(3.1)
Based on Banach’s fixed point theorem, we find that the problem (1.5) has solu-
tions if and only if the operator F has fixed points.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
848 Nichaphat Patanarapeelert et al 844-856
6 Nichaphat Patanarapeelert and Thanin Sitthiwirattham
Theorem 3.1. Assume that f : [0, T ] × R → R is a jointly continuous function
satisfying the conditions
(H1) |f(t, x)− f(t, y)| ≤ L|x− y|, for all t ∈ [0, T ] and x, y ∈ R,
(H2) Φ + LΩ < 1,
where L is a Lipschitz constant, and
Φ = |λ|T +|λ|T (ηr + T − η)
|η(1 + r)− T |
Ω =T 2
1 + p+
η2rT
|η(1 + r)− T |(1 + p)+
(1 + r)(T − η)T 2
|η(1 + r)− T |(1 + q)(1 + r + r2)
(3.2)
Then the boundary value problem (1.5) has a unique solution.
Proof. We transform the boundary value problem (1.5) into a fixed point problem
x = Fx, where F : C → C is defined by (3.1). Assume that supt∈[0,T ]
|f(t, 0)| = M , and
choose a constant R satisfied
R ≥ MΛ
1− (Φ + LΩ).
Our goal is to show that FBR ⊂ BR, where BR = x ∈ C : ∥x∥ ≤ R. For any
x ∈ BR, we have
∥Fx∥
= supt∈[0,T ]
∣∣∣∣∣∫ t
0
∫ s
0
f(u, x(u))dqudps− λ
∫ t
0
x(s)dps
+1
ηT (1 + r)− T 2
(λT (t+ rt− T )
∫ η
0
x(s)dps− T (t+ rt− T )×∫ η
0
∫ s
0
f(u, x(u))dqudps− (1 + r)λ(t− η)
∫ T
0
∫ v
0
x(s)dpsdrv
+(1 + r)(t− η)
∫ T
0
∫ v
0
∫ s
0
f(u, x(u))dqudpsdrv
)∣∣∣∣∣
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
849 Nichaphat Patanarapeelert et al 844-856
Existence results of sequential derivatives of nonlinear quantum difference equations7
≤ supt∈[0,T ]
∫ t
0
∫ s
0
(|f(u, x(u)) + f(u, 0)|+ |f(u, 0)|)dqudps− |λ|∫ t
0
|x(s)|dps
+1
|ηT (1 + r)− T 2|
(|λT (t+ rt− T )|
∫ η
0
|x(s)|dps+ |T (t+ rt− T )|×∫ η
0
∫ s
0
(|f(u, x(u))− f(u, 0)|+ |f(u, 0)|)dqudps+ |(1 + r)λ(t− η)|∫ T
0
∫ v
0
|x(s)|dpsdrv
+|(1 + r)(t− η)|∫ T
0
∫ v
0
∫ s
0
(|f(u, x(u))− f(u, 0)|+ |f(u, 0)|)dqudpsdrv)
≤ supt∈[0,T ]
(L∥x∥+M)
∫ t
0
∫ s
0
dqudps+ |λ|∥x(s)∥∫ t
0
dps
+1
|ηT (1 + r)− T 2|
(∥x(s)∥|λT (t+ rt− T )|
∫ η
0
dps+ (L∥x∥+M)|T (t+ rt− T )|×∫ η
0
∫ s
0
dqudps+ ∥x(s)∥|(1 + r)λ(t− η)|∫ T
0
∫ v
0
dpsdrv
+(L∥x∥+M)|(1 + r)(t− η)|∫ T
0
∫ v
0
∫ s
0
dqudpsdrv
)
= supt∈[0,T ]
(L∥x∥+M)
t2
1 + p+ |λ|∥x(s)∥t+ 1
|ηT (1 + r)− T 2|
(∥x(s)∥|λT (t+ rt− T )|η
+(L∥x∥+M)|T (t+ rt− T )| η2
1 + p+ ∥x(s)∥|(1 + r)λ(t− η)| T 2
1 + r
+(L∥x∥+M)|(1 + r)(t− η)| T 3
(1 + q)(1 + r + r2)
)
= supt∈[0,T ]
∥x∥(|λ|t+ η|λT (t+ rt− T )|+ T (t− η)
|η(1 + r)− T |
)+(L∥x∥+M)
(t2
1 + p+
η2|t+ rt− T ||η(1 + r)− T |(1 + p)
+|(1 + r)(t− η)|T 2
|η(1 + r)− T |(1 + q)(1 + r + r2)
)≤ R
(|λ|T +
|λ|(ηr + T − η)
|η(1 + r)− T |
)+(LR|+M)
(T 2
1 + p+
η2rT
|η(1 + r)− T |(1 + p)+
|(1 + r)(T − η)|T 2
|η(1 + r)− T |(1 + q)(1 + r + r2)
)= RΦ + (LR +M)Ω≤ R
Therefore, ABR ⊂ BR.
We next show that F is a contraction. For any x, y ∈ C and for each t ∈ [0, T ],
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
850 Nichaphat Patanarapeelert et al 844-856
8 Nichaphat Patanarapeelert and Thanin Sitthiwirattham
we have
∥(Fx)(t)− (Fy)(t)∥
= supt∈[0,T ]
∣∣∣∣∣(Fx)(t)− (Fy)(t)
∣∣∣∣∣= sup
t∈[0,T ]
∣∣∣∣∣∫ t
0
∫ s
0
(f(u, x(u))− f(u, y(u)))dqudps− λ
∫ t
0
(x(s)− y(s))dps
+1
ηT (1 + r)− T 2
(λT (t+ rt− T )
∫ η
0
(x(s)− y(s))dps− T (t+ rt− T )×∫ η
0
∫ s
0
(f(u, x(u))− f(u, y(u)))dqudps− (1 + r)λ(t− η)
∫ T
0
∫ v
0
(x(s)− y(s))dpsdrv
+(1 + r)(t− η)
∫ T
0
∫ v
0
∫ s
0
(f(u, x(u))− f(u, y(u)))dqudpsdrv
)∣∣∣∣∣≤ sup
t∈[0,T ]
L∥x− y∥
∫ t
0
∫ s
0
dqudps+ |λ|∥x− y∥∫ t
0
dps
+1
|ηT (1 + r)− T 2|
(∥x− y∥|λT (t+ rt− T )|
∫ η
0
dps+ L∥x− y∥|T (t+ rt− T )|×∫ η
0
∫ s
0
dqudps+ ∥x− y∥|(1 + r)λ(t− η)|∫ T
0
∫ v
0
dpsdrv
+L∥x− y∥|(1 + r)(t− η)|∫ T
0
∫ v
0
∫ s
0
dqudpsdrv
)≤ ∥x− y∥
(|λ|T +
|λ|(ηr + T − η)
|η(1 + r)− T |
)+L∥x− y∥
(T 2
1 + p+
η2rT
|η(1 + r)− T |(1 + p)+
|(1 + r)(T − η)|T 2
|η(1 + r)− T |(1 + q)(1 + r + r2)
)= (Φ + LΩ)∥x− y∥.
Since Φ + LΩ < 1, A is a contraction. Note that we complete this proof by using
Banach’s contraction mapping principle.
Further, we consider the existence and uniqueness of a solution to the boundary
value problem (1.5). We shall use the Krasnoselskii’s fixed point theorem [31].
Theorem 3.2. Let K be a bounded closed convex and nonempty subset of a Banach
space X. Let A,B be operators such that:
(i) Ax+By ∈ K whenever x, y ∈ K,
(ii) A is compact and continuous,
(iii) B is a contraction mapping.
Then there exists z ∈ K such that z = Az +Bz.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
851 Nichaphat Patanarapeelert et al 844-856
Existence results of sequential derivatives of nonlinear quantum difference equations9
Theorem 3.3. Assume that (H1) and (H2) hold. In addition we suppose that:
(H3) |f(t, x)| ≤ µ(t), for all (t, x) ∈ [0, T ]× R, with µ ∈ L1([0, T ],R+).
If
Φ + LΩ < 1, (3.3)
where Φ and Ω is given by (3.2), then the boundary value problem (1.5) has at least
one solution on [0, T ].
Proof. Setting maxt∈[0,T ] |µ(t)| = ∥µ∥ and choosing a constant
R ≥ ∥µ∥Ω1− Φ
, (3.4)
we consider BR = x ∈ C : ∥x∥ ≤ R.In view of Lemma 2.1, we define the operators F1 and F2 on the ball BR as
(F1x)(t) =
∫ t
0
∫ s
0
f(u, x(u))dqudps− λ
∫ t
0
x(s)dps,
(F2x)(t) =1
ηT (1 + r)− T 2
(λT (t+ rt− T )
∫ η
0
x(s)dps− T (t+ rt− T )×∫ η
0
∫ s
0
f(u, x(u))dqudps− (1 + r)λ(t− η)
∫ T
0
∫ v
0
x(s)dpsdrv
+(1 + r)(t− η)
∫ T
0
∫ v
0
∫ s
0
f(u, x(u))dqudpsdrv
)For x, y ∈ BR, by computing directly, we have
∥F1x+ F2y∥
≤ ∥µ∥∫ t
0
∫ s
0
dqudps+ |λ|∥x∥∫ t
0
dps
+1
|ηT (1 + r)− T 2|
(∥y∥|λT (t+ rt− T )|
∫ η
0
dps+ ∥µ∥|T (t+ rt− T )| ×∫ η
0
∫ s
0
dqudps+ ∥y∥|(1 + r)λ(t− η)|∫ T
0
∫ v
0
dpsdrv
+∥µ∥|(1 + r)(t− η)|∫ T
0
∫ v
0
∫ s
0
dqudpsdrv
)≤ RΦ + ∥µ∥Ω≤ R.
Therefore F1x + F2y ∈ BR. The condition (3.3) implies that F2 is a contraction
mapping. Next, we will show that F1 is compact and continuous. Continuity of f
coupled with the assumption (H3) implies that the operator F1 is continuous and
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
852 Nichaphat Patanarapeelert et al 844-856
10 Nichaphat Patanarapeelert and Thanin Sitthiwirattham
uniformly bounded on BR. We define sup(t,x)∈[0,T ]×BR|f(t, x)| = fmax < ∞. For
t1, t2 ∈ [0, T ] with t1 ≤ t2 and x ∈ BR, we have that
∥F1x(t2)−F1x(t1)∥ = sup(t,x)∈[0,T ]×BR
∣∣∣∣∣∫ t1
0
∫ s
0
f(u, x(u))dqudps− λ
∫ t1
0
x(s)dps
−∫ t2
0
∫ s
0
f(u, x(u))dqudps+ λ
∫ t2
0
x(s)dps
∣∣∣∣∣= sup
(t,x)∈[0,T ]×BR
∣∣∣∣∣∫ t1
t2
∫ s
0
f(u, x(u))dqudps− λ
∫ t1
t2
x(s)dps
∣∣∣∣∣≤ fmax
|t21 − t22|1 + p
+ |λ|(t1 − t2)R.
In particular, if t1 − t2 → 0 the right-hand side of the above inequality tends to
zero. Thus, F1 is relatively compact on BR. Hence, we can conclude by the Arzela-
Ascoli Theorem that F1 is compact on BR. Therefore, all the assumptions of Theorem
3.3 are satisfied and the conclusion of Theorem 3.3 implies that the boundary value
problem (1.5) has at least one solution on [0, T ]. This completes the proof.
4 Examples
In this section, we give some examples to illustrate our main results with . Con-
sider the following boundary value problem of nonlinear second-order q-difference
equations with three-point boundary conditionsD 1
2(D 1
3+
1
100)x(t) =
e− sin2 t
100 + ecos2 t· |x(t)|1 + |x(t)|
, t ∈ [0, 3],
x (2) = 0,
∫ 3
0
x(s)d 34s = 0.
(4.1)
For this example, we have q = 1/2, p = 1/3, r = 3/4, λ = 10, T = 3, and η = 2.
Form Theorem 3.3, we find that
Φ =3
100+
3100
(9/4 + 1)
|3(7/4)− 3|≈ 0.06
Ω =9
4/3+
9
|3(7/4)− 3|(4/3)+
(7/4)9
|3(7/4)− 3|(3/2)(37/16)≈ 11.77
Since, |f(t, x)− f(t, y)| ≤ 1101
|x− y|, then (H1) is satisfied with L = 1101
. We can
find that
Φ + LΩ ≈ 0.177 < 1.
Hence, by Theorem 3.1, problem (4.1) with f(t, x) has a unique solution on [0, 3].
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
853 Nichaphat Patanarapeelert et al 844-856
Existence results of sequential derivatives of nonlinear quantum difference equations11
Acknowledgements. This research (KMUTNB-GEN-58-11) is supported by King
Mongkuts University of Technology North Bangkok, Thailand.
References
[1] F.H. Jackson, On q-difference equations, American J. Math. 32 (1910), 305-314.
[2] R.D. Carmichael, The general theory of linear q-difference equations, American
J. Math. 34 (1912), 147-168.
[3] T.E. Mason, On properties of the solutions of linear q-difference equations with
entire function coefficients, American J. Math. 37 (1915), 439-444.
[4] C.R. Adams, On the linear ordinary q-difference equation, American Math. Ser.
II 30 (1929), 195-205.
[5] W.J. Trjitzinsky, Analytic theory of linear q-differece equations, Acta Mathemat-
ica, (1933).
[6] T. Ernst, A new notation for q-calculus and a new q-Taylor formula, U.U.D.M.
Report 1999:25, ISSN 1101-3591, Department of Mathematics, Uppsala Univer-
sity, 1999.
[7] R.J. Finkelstein, q-Field theory, Lett. Math. Phys. 34 (1995), 169-176.
[8] R.J. Finkelstein, q-deformation of the Lorentz group, J. Math. Phys. 37 (1996),
953-964.
[9] R. Floreanini, L. Vinet, Automorphisms of the q-oscillator algebra and basic
orthogonal polynomials, Phys. Lett. A 180 (1993), 393-401.
[10] R. Floreanini, L. Vinet, Symmetries of the q-difference heat equation, Lett. Math.
Phys. 32 (1994), 37-44.
[11] R. Floreanini, L. Vinet, q-gamma and q-beta functions in quantum algebra rep-
resentation theory, J. Comput. Appl. Math. 68 (1996) 57-68.
[12] P.G.O. Freund, A.V. Zabrodin, The spectral problem for the q-Knizhnik-
Zamolodchikov equation and continuous q-Jacobi polynomials, Comm. Math.
Phys. 173 (1995), 17-42.
[13] G. Gasper, M. Rahman, Basic Hypergeometric Series, Cambridge University
Press, Cambridge, 1990.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
854 Nichaphat Patanarapeelert et al 844-856
12 Nichaphat Patanarapeelert and Thanin Sitthiwirattham
[14] G.N. Han, J. Zeng, On a q-sequence that generalizes the median Genocchi num-
bers, Ann. Sci. Math. Quebec 23 (1999), 63-72.
[15] V. Kac, P. Cheung, Quantum Calculus, Springer, New York, 2002.
[16] G. Bangerezako, Variational q-calculus, J. Math. Anal. Appl. 289 (2004), 650-
665.
[17] A. Dobrogowska, A. Odzijewicz, Second order q-difference equations solvable by
factorization method, J. Comput. Appl. Math. 193 (2006), 319-346.
[18] G. Gasper, M. Rahman, Some systems of multivariable orthogonal q-Racah poly-
nomials, Ramanujan J. 13 (2007), 389-405.
[19] M.E.H. Ismail, P. Simeonov, q-difference operators for orthogonal polynomials,
J. Comput. Appl. Math. 233 (2009), 749-761.
[20] M. Bohner, G.Sh. Guseinov, The h-Laplace and q-Laplace transforms, J. Math.
Anal. Appl. 365 (2010), 75-92.
[21] M. El-Shahed, H.A. Hassan, Positive solutions of q-difference equation, Proc.
Amer. Math. Soc. 138 (2010), 1733-1738.
[22] B. Ahmad, Boundary-value problems for nonlinear third-order q-difference equa-
tions, Electron. J. Diff. Equ. 94 (2011), 1-7.
[23] B. Ahmad, A. Alsaedi, S.K. Ntouyas, A study of second-order q-difference equa-
tions with boundary conditions, Adv. Diff. Equ. 2012, 2012:35.
[24] B. Ahmad, S.K. Ntouyas, I.K. Purnaras, Existence results for nonlinear q-
difference equations with nonlocal boundary conditions, Commun. Appl. Non-
linear Anal. 19 (2012), 59-72.
[25] B. Ahmad, J.J. Nieto, On nonlocal boundary value problems of nonlinear q-
difference equations, Adv. Diff. Equ. 2012, 2012:81.
[26] B. Ahmad, S.K. Ntouyas, Boundary value problems for q-difference inclusions,
Abst. Appl. Anal. 2011, ID 292860 (2011), 15 pages.
[27] W. Zhou H. Liu, Existence solutions for boundary value problem of nonlinear
fractional q−difference equations, Adv. Differ. Equ. 2013, 2013.
[28] C. Yu, J. Wang, Existence of solutions for nonlinear second-order q-difference
equations with first-order q-derivatives, Adv. Differ. Equ. 2013, 2013:124.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
855 Nichaphat Patanarapeelert et al 844-856
Existence results of sequential derivatives of nonlinear quantum difference equations13
[29] N. Pongarm, S. Asawasamrit, J. Tariboon, Sequential derivatives of nonlinear
q-difference equations with three-point q-integral boundary conditions, J. Appl.
Math. 2013, ID 605169 (2013), 9 pages.
[30] D. W. Boyd and J. S. W. Wong, On nonlinear contractions, Proc. Amer. Math.
Soc. 20 (1969), 458-464.
[31] M.A. Krasnoselskii, Two remarks on the method of successive approximations,
Uspekhi Mate. Nauk. 10 (1955), 123-127.
[32] A. Granas and J. Dugundji, Fixed Point Theory, Springer-Verlag, New York,
2003.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
856 Nichaphat Patanarapeelert et al 844-856
An iterative method for solving fourth-order boundary value problems of
mixed type integro-dierential equations
Omar Abu Arqub
Department of Mathematics, Al-Balqa Applied University, Salt 19117, Jordan
*Corresponding author: e-mail: [email protected]; P.O. Box: Al-Salt 19117, Jordan
||||||||||||||||||||||||||||||||||||||||||||
Abstract
In this paper, reproducing kernel Hilbert space method is introduced as an ecient solver for fourth-order bound-
ary value problems of mixed type integro-dierential equations where two reproducing kernel functions are used
throughout the evolution of the algorithm to obtain the required nodal values of the unknown variable. The solution
methodology is based on generating the orthogonal basis from the obtained kernel function in the space W 52 [0; 1].
After that, the orthonormal basis is constructing in order to formulate and utilize the solution in the same space. In
addition to that, an error estimation and bound based on the use of reproducing kernel theory has been carried out.
Four numerical test problems including linear and nonlinear equations were analyzed to illustrate the procedure
and conrm the performance of the proposed method. The numerical results show that the proposed algorithm is a
robust and accurate procedure for solving fourth-order boundary value problems of mixed type integro-dierential
equations.
Keywords: Integro-dierential equation; Reproducing kernel function; Iterative method
AMS Subject Classication: 34K28; 45J05; 47B32
||||||||||||||||||||||||||||||||||||||||||||||||
1 Introduction
Most engineering and physical problems are governed by functional equations, for example, ordinary dierential
equations, integral equations, integro-dierential equations (IDEs), and stochastic dierential equations. Many
mathematical formulation of physical phenomena contain IDEs with proper boundary conditions, these equations
arises in uid dynamics, biological models, and chemical kinetics, etc. [17]. In most cases, the equation is too
complex to allow one to nd an exact solution, where solution of such equations is always demand due to practical
interests. Therefore, an ecient, reliable computer stimulation is required; it is little wonder that with the develop-
ment of fast, ecient digital computers, the role of numerical methods in mathematical, physical, and engineering
problems solving has increased dramatically in recent years.
Today, computers and numerical methods provide an alternative for complicated calculations. Using computer
power to obtain solutions directly, we can approach these calculations without recourse to simplifying assumptions
or time-intensive techniques. Although analytical solutions are still extremely valuable both for problem solving
and for providing insight, numerical methods represent alternatives that greatly enlarge our capabilities to confront
and solve problems. As a result, more time is available for the use of creative skills. Thus, more emphasis can be
placed on problem formulation and solution interpretation and the incorporation of total system.
Investigation about solvability of fourth-order boundary value problems (BVPs) of mixed type IDEs is scarce.
Recently, many authors have discussed the numerical solvability for Volterra type by using some of the well-known
methods. It is to be noted that the Volterra type is just a special case of the problem that we propose in this paper.
However, the reader is asked to refer to [812] in order to know more details about these methods, including their
kinds and history, their modication for use, their applications on the other problems, and their characteristics.
In this paper, we introduce a novel method based on the use of reproducing kernel Hilbert space (RKHS) method
for numerically approximating a solution of fourth-order BVPs of mixed type IDEs in which the given boundary
conditions can be involved. The present method has the following characteristics:
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
857 Omar Abu Arqub 857-874
2
1. The method is of global nature in terms of the solution obtained as well as its ability to solve other mathe-
matical, physical, and engineering problems.
2. The present method is accurate, need less eort to achieve the results, and is developed especially for nonlinear
case. However, if the problem comes nonlinear, then the RKHS method does not require discretization or
perturbation and it does not make closure approximation.
3. In the proposed method, it is possible to pick any point in the interval of integration and as well the approx-
imate solution and all its derivatives up to order four will be applicable.
4. The RKHS method does not require discretization of the variables, that is, time and space; it is not eected
by computation round o errors and one is not faced with necessity of large computer memory and time.
In the strict sense of the word, before applying a numerical method to the solution of IDEs, we must be certain
that a solution exists. We are also interested in whether the solution is unique. It is worth stating that in many
cases, since IDEs are often derived from problems in physical world, existence and uniqueness are often obvious for
physical reasons. Notwithstanding this, a mathematical statement about existence and uniqueness is worthwhile.
On the other hand, uniqueness would be of importance if, for instance, we wished to approximate the solution.
If two solution passed through a point, then approximations could very well jump from one solution to the other
with misleading consequences. Therefore, we assume that the fourth-order BVPs of mixed type IDEs to be solved
numerically using RKHS method have unique solution on the given interval.
This paper is arranged in the following form: in the next section, a short introduction to reproducing kernel
theory is presented. In Section 3, we state the problem and an algorithm solver is introduced. In Section 4, several
reproducing kernel functions are constructed in order to apply the RKHS method. In Section 5, we formulate
the problem and a theoretic basis of the method is introduced in the space W 52 [0; 1]. In Section 6, we will give
the representation of exact and approximate solutions, also, an iterative method for solving the present problem
numerically using RKHS method is described. In Section 7, we derive an error bound for the present method in
order to capture the behavior of solution. Software libraries and numerical results are given in Section 8 in order to
verify the mathematical simulation of the proposed algorithm. Finally, concluding remarks are presented in Section
9.
2 Preface to reproducing kernel theory
After a brief introduction to reproducing kernel theory, we view the elements of RKHS and discuss its properties,
its applications, and its advantages. In particular, we focus on the spaces W 52 [0; 1] and W 1
2 [0; 1] among other
reproducing kernel, because of their use in this paper, especially in constructing the needed reproducing kernel
functions.
In functional analysis, a RKHS is a Hilbert space of functions in which pointwise evaluation is a continuous
linear functional. Equivalently, they are spaces that can be dened by reproducing kernels. An abstract set is
supposed to have elements, each of which has no structure, and is itself supposed to have no internal structure,
except that the elements can be distinguished as equal or unequal, and to have no external structure except for the
number of elements.
Denition .1 [13] Let E be a nonempty abstract set. A function K : E E ! C is a reproducing kernel of theHilbert space H if
1. For each x 2 E, K (; x) 2 H.
2. For each x 2 E and ' 2 H, h' () ;K (; x)i = ' (x).
Remark .1 The condition (2) in Denition .1 is called "the reproducing property" which means that the value
of the function ' at the point x is reproducing by the inner product of ' () with K (; x). A Hilbert space whichpossesses a reproducing kernel is called a RKHS [13].
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
858 Omar Abu Arqub 857-874
3
As a special case, the spaces W 52 [0; 1] and W
12 [0; 1] are complete Hilbert with some special properties. So, all
the properties of the Hilbert space will be hold. Further, theses spaces possesses some special and better properties
which could make some problems be solved easier. For instance, many problems studied in L2[0; 1] space, which
is a complete Hilbert space, requires large amount of integral computations, and such computations may be very
dicult in some cases. Thus, the numerical integrals have to be calculated in the cost of losing some accuracy.
However, the properties of W 52 [0; 1] and W
12 [0; 1] require no more integral computation for some functions, instead
of computing some values of a function at some nodes. In fact, this simplication of integral computation not only
improves the computational speed, but also improves the computational accuracy.
Reproducing kernel theory has important application in numerical analysis, dierential equations, integral
equations, probability and statistics, and so fourth [1416]. Recently, a lot of research work has been devoted to the
applications of RKHS method to a wide class of stochastic and deterministic problems involving operator equations,
dierential equations, and integral equations. The RKHS method was used by many authors to investigate several
scientic applications side by side with their theory. The reader is kindly requested to go through [1231] in order
to know more details about RKHS method, including its history, its modication for use, its applications on the
other problems, and its characteristics. On the other hand, the numerical solvability of other version of dierential
problems can be found in [3235] and references therein.
3 Problem statement and numerical algorithm
Numerical methods tend to emphasize the implementation of algorithms. The aim of numerical methods is therefore
to provide systematic methods for solving problems in a numerical form. The process of solving problems generally
involves starting from an initial data, using high precision digital computers, following the steps in the algorithms,
and nally obtaining the results. Often the numerical data and the methods used are approximate ones.
Let us consider the following fourth-order BVPs of mixed type IDEs described the ordinary functional equation:
u(4) (x) = F (x; u000 (x) ; u00 (x) ; u0 (x) ; u (x)) + [Tu] (x) ; (1)
in which the mixed Fredholm-Volterra operator, [Tu], is given as
[Tu] (x) =1R0
k1(x; t)G1(u000 (t) ; u00 (t) ; u0 (t) ; u (t))dt+
xR0
k2(x; t)G2(u000 (t) ; u00 (t) ; u0 (t) ; u (t))dt;
subject to the boundary conditions
u (0) = 0, u (1) = 0;
u00 (0) = 1, u00 (1) = 1;
(2)
where 0 t < x 1, i, i, i = 0; 1 are real nite constants, u 2W 52 [0; 1] is an unknown function to be determined,
k1 (x; t) ; k2 (x; t) are continuous functions on [0; 1]2, F (x;w1; w2; w3; w4) ; G1 (w1; w2; w3; w4) ; G2 (w1; w2; w3; w4)
are continuous terms in W 12 [0; 1] as wi = wi (x) 2 W 5
2 [0; 1], 0 x 1, 1 < wi < 1, i = 1; 2; 3; 4 and are
depending on the problem discussed, and W 12 [0; 1] ;W
52 [0; 1] are two reproducing kernel spaces.
The following is the main steps for formulating Eqs. (1) and (2) in order to apply the RKHS method. The
steps in the algorithm are explained in more detail in the next sections.
Algorithm 1 To nd a series representation of analytic and approximate solutions of Eqs. (1) and (2) using RKHS
method, we do the following steps:
Step 1: Introduce new unknown function v (x) as
v (x) = u (x) (x) ;
where (x) satises the requirements (0) = 0 and 1 (1) = 0. Similarly, 00 (x) satises the requirements
00 (0) = 1 and 00 (1) = 1. Hence, one can obtain
(x) = 16 (1 1)x
3 + 121x
2 +0 0 1
61 131
x+ 0:
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
859 Omar Abu Arqub 857-874
4
Step 2: The form of Eq. (1) with nonhomogeneous boundary conditions (2) can be equivalently reduced to the
problem of nding a function v (x) that satisfying the following equation:
v(4) (x) = Fx; (v + )
000(x) ; (v + )
00(x) ; (v + )
0(x) ; (v + ) (x)
+ [T (v + )] (x) ; (3)
subject to the homogeneous boundary conditions
v (0) = 0, v (1) = 0;
v00 (0) = 0, v00 (1) = 0:(4)
Step 3: Find the representation form of the two kernel functions Kx (y) and Rx (y) of the spaces W52 [0; 1] and
W 12 [0; 1], respectively.
Step 4: Construct the orthogonal function system i(x) of the space W52 [0; 1] as i(x) = Ly [Kx (y)]y=xi .
Step 5: Construct the orthonormal function system i (x)
1i=1
of the space W 52 [0; 1] as
i (x) =iP
k=1
ik k (x).
Step 6: The analytic solution v (x) and the approximate solution vn (x) of Eqs. (3) and (4) are obtained, respec-
tively, as
v (x) =1Pi=1
iPk=1
ik Fxk; (v + )
000(xk) ; (v + )
00(xk) ; (v + )
0(xk) ; (v + ) (xk)
+ [T (v + )] (xk)
i (x) ;
vn (x) =nPi=1
iPk=1
ik Fxk; (v + )
000(xk) ; (v + )
00(xk) ; (v + )
0(xk) ; (v + ) (xk)
+ [T (v + )] (xk)
i (x) ;
where ik; xk; i (x) are all given in the process of formulation.
Step 7: The analytic solution u (x) and the approximate solution un (x) of Eqs. (1) and (2) are obtained, respec-
tively, as
u (x) = (xk) +1Pi=1
iPk=1
ik fF (xk; u000 (xk) ; u00 (xk) ; u0 (xk) ; u (xk)) + [Tu] (xk)g i (x) ;
un (x) = (xk) +nPi=1
iPk=1
ik fF (xk; u000 (xk) ; u00 (xk) ; u0 (xk) ; u (xk)) + [Tu] (xk)g i (x) :
4 Several reproducing kernel functions
In this section, we formulate two reproducing kernels in order to generating the orthogonal basis in the space
W 52 [0; 1]. After that, an orthonormal basis is constructing in order to formulate and utilize the solution of Eqs. (3)
and (4) using RKHS method in the same space.
To apply the RKHS method, we rst dene and construct a reproducing kernel space W 52 [0; 1] in which every
function satises the boundary conditions z (0) = z00 (0) = z (1) = z00 (1) = 0.
Denition .2 The inner product space W 52 [0; 1] is dened as W
52 [0; 1] = fz (x) : z(i); i = 0; 1; 2; 3; 4 are absolutely
continuous real-valued functions on [0; 1], z(5) 2 L2 [0; 1], and z (0) = z00 (0) = z (1) = z00 (1) = 0g. The innerproduct and the norm in W 5
2 [0; 1] are given by
hz1 (x) ; z2 (x)iW 52=
2Pi=0
z(i)1 (0) z
(i)2 (0) +
1Pi=0
z(i)1 (1) z
(i)2 (1) +
1R0
z(5)1 (x)z
(5)2 (x)dx; (5)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
860 Omar Abu Arqub 857-874
5
and jjzjjW 52=qhz (x) ; z (x)iW 5
2, respectively, where z1; z2 2W 5
2 [0; 1] and L2 [0; 1] =
nz :R 10z2 (x) dx <1
o.
It is easy to see that hz1 (x) ; z2 (x)iW 52satises all the requirements of the inner product. First, hz1 (x) ; z1 (x)iW 5
2
0. Second, hz1 (x) ; z2 (x)iW 52= hz2 (x) ; z1 (x)iW 5
2. Third, h z1 (x) ; z2 (x)iW 5
2= hz1 (x) ; z2 (x)iW 5
2. Fourth,
hz1 (x) + z2 (x) ; z3 (x)iW 52= hz1 (x) ; z3 (x)iW 5
2+hz2 (x) ; z3 (x)iW 5
2. It remains only to prove that hz1 (x) ; z1 (x)iW 5
2=
0 if and only if z1 (x) = 0. In fact, it is obvious that when z1 (x) = 0, then hz1 (x) ; z1 (x)iW 52= 0. On the other
hand, if hz1 (x) ; z1 (x)iW 22= 0, then by Eq. (5), we have hz1 (x) ; z1 (x)iW 2
2=
2Pi=0
z(i)1 (0)
2+
1Pi=0
z(i)1 (1)
2+R 1
0
z(5)1 (x)
2dx = 0. Therefore, z1 (0) = z01 (0) = z001 (0) = 0, z1 (1) = z01 (1) = 0, and z
(5)1 (x) = 0. Then, we can
obtain z1 (x) = 0.
Denition .3 [13] The Hilbert space W 52 [0; 1] is called a reproducing kernel if for each xed x 2 [0; 1] and any
z (y) 2W 52 [0; 1], there exist K (x; y) 2W 5
2 [0; 1] (simply Kx (y)) and y 2 [0; 1] such that hz (y) ;Kx (y)iW 52= z (x).
It is very important to obtain the representation form of the reproducing kernel function Kx (y), because it
is the basis of our algorithm. In the following theorem, we will give the method for obtaining the reproducing
kernel function Kx (y) in the space W52 [0; 1]. After that, we construct the space W
12 [0; 1] in order to dene a linear
bounded operator L as shown later in the next section.
Theorem .1 The Hilbert spaceW 52 [0; 1] is a reproducing kernel and its reproducing kernel function Kx (y) is given
by
Kx (y) =
8>><>>:9Pi=0
pi(x)yi; y x;
9Pi=0
qi(x)yi; y > x:
(6)
where pi(x) and qi(x), i = 0; 2; :::; 9 are unknown coecients of Kx (y) and are given as
p0 (x) = 0, p1 (x) =1
725764
362884x 725782x3 + 362903x4 12x7 + 9x8 2x9
, p2 (x) = 0;
p3 (x) =1
43894206720(43895295360x
+87800025610x3 43910173465x4 + 10160696x5 5806148x7 + 1088673x8 6x9);
p4 (x) =1
87788413440x(43896746880
87820346930x2 + 43950816165x3 30482088x4 + 4354668x6 1088709x7 + 14x8);p5 (x) = p6 (x) = 0;
p7 (x) = 1
21947103360x362880 2177292x+ 2903074x2 1088667x3 + 12x6 9x7 + 2x8
;
p8 (x) =1
29262804480x362884 + 725782x2 362903x3 + 12x6 9x7 + 2x8
;
p9 (x) =1
131682620160
362882 362880x 18x3 + 21x4 12x7 + 9x8 2x9
;
q0 (x) =1
362880x9;
q1 (x) = 1
7315701120
x3657870720 + 7315882560x2 3658062240x3 + 120960x6 + 90721x7 + 20160x8
;
q2 (x) =1
10080x7;
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
861 Omar Abu Arqub 857-874
6
q3 (x) = 1
43894206720
x43895295360 87800025610x2 + 43910173465x3 + 5806148x6 1088673x7 + 6x8
;
q4 (x) =1
87788413440
x43896746880 87820346930x2 + 43950816165x3 + 4354668x6 1088709x7 + 14x8
;
q5 (x) = 1
2880x4, q6 (x) =
1
4320x3;
q7 (x) = 1
21947103360x362880 + 2903074x2 1088667x3 + 12x6 9x7 + 2x8
;
q8 (x) =1
29262804480x362880 + 725782x2 362903x3 + 12x6 9x7 + 2x8
;
q9 (x) = 1
131682620160x362880 + 18x2 21x3 + 12x6 9x7 + 2x8
:
Proof. The proof of the completeness and reproducing property of W 52 [0; 1] is similar to the proof in [17]. Let
us now nd out the expression form of the reproducing kernel function Kx (y) in the space W52 [0; 1]. Clearly,R 1
0z(5) (y)K
(5)x (y) dy =
4Pi=0
(1)4i z(i) (y)K(9i)x (y) jy=1y=0 +(1)
3 R 10z (y)K
(10)x (y) dy. Hence, hz (y) ;Kx (y)iW 5
2=
2Pi=0
z(i) (0)K(i)x (0) +
1Pi=0
z(i) (1)K(i)x (1) +
4Pi=0
(1)4i z(i) (y)K(9i)x (y) jy=1y=0
R 10z (y)K
(10)x (y) dy. Since Kx (y) 2
W 52 [0; 1], it follows that Kx (0) = K 00
x (0) = Kx (1) = K 00x (1) = 0. Further, since z (x) 2 W 5
2 [0; 1], one obtains
z (0) = z00 (0) = z (1) = z00 (1) = 0. Thus, if K(i)x (0) = K
(i)x (1) = 0, i = 5; 6, K 0
x (0) + K(8)x (0) = 0, and
K 0x (1) K
(8)x (1) = 0, then hz (y) ;Kx (y)iW 5
2=R 10z (y)
K(10)
x (y)dy. Now, for each x 2 [0; 1], if Kx (y) also
satises K(10)x (y) = (x y), where is the dirac-delta function, then hz (y) ;Kx (y)iW 5
2= z (x). Obviously,
Kx (y) is the reproducing kernel function of W52 [0; 1]. Let us now utilizing the expression form of the reproducing
kernel function Kx (y). The characteristic equation of K(10)x (y) = (y x) is 10 = 0, and their characteristic
values are = 0 with 10 multiple roots. So, let the expression form of the reproducing kernel function Kx (y) be
as dened in Eq. (6). On the other aspect as well, let Kx (y) satises K(m)x (x+ 0) = K
(m)x (x 0), m = 0; 1; :::; 8.
Integrating K(10)x (y) = (x y) from x " to x + " with respect to y and let " ! 0, we have the jump
degree of K(9)x (y) at y = x given by K
(9)x (x 0) K
(9)x (x+ 0) = 1. Through the last descriptions and by using
MATHEMATICA 7:0 software package, the unknown coecients pi(x) and qi(x), i = 0; 2; :::; 9 of Eq. (6) can be
obtained as given in the theorem. This completes the proof.
Denition .4 [18] The inner product space W 12 [0; 1] is dened as W
12 [0; 1] = fz (x) : z is absolutely continuous
real-valued function on [0; 1] and z0 2 L2 [0; 1]g. The inner product and the norm in W 12 [0; 1] are dened as
hz1 (x) ; z2 (x)iW 12=R 10(z01 (x) z
02 (x) + z1 (x) z2 (x)) dx and jjzjjW 1
2=qhz (x) ; z (x)iW 1
2respectively, where z1; z2 2
W 12 [0; 1] and L
2 [0; 1] =nz :R 10z2 (x) dx <1
o.
Theorem .2 [18] The Hilbert space W 12 [0; 1] is a complete reproducing kernel and its reproducing kernel function
Rx (y) can be written as
Rx (y) =
(p0(x)e
y + p1(x)ey; y x;
q0(x)ey + q1(x)e
y; y > x:
where pi(x) and qi(x), i = 0; 1 are unknown coecients of Rx (y) and are given as
p0 (x) =1
2 sinh (1)cosh (x 1) ;
p1 (x) =1
2 sinh (1)cosh (x 1) ;
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
862 Omar Abu Arqub 857-874
7
q0 (x) =1
4 sinh (1)
ex1 + e1x
;
q1 (x) =1
4 sinh (1)
e1x + e1+x
:
In fact, it easy to see that q0(x)ey + q1(x)e
y = p0 (y) ex + p1 (y) e
x. As a result, the reproducing kernel
function posses some important properties such as: it is symmetric, unique, and nonnegative. The reader is asked
to refer to [1231] in order to know more details about reproducing kernel function including its mathematical
properties, types and kinds, applications, method of calculations, and others.
5 Problem formulation in the space W52 [0; 1]
Problem formulation is normally the most important part of the process. It is the selection of linear operator,
orthogonal basis, and orthonormal basis. In this section, Eqs. (3) and (4) are rst formulated as a dierential linear
operator based on the spaces W 52 [0; 1] and W
12 [0; 1]. After that, the Gram-Schmidt orthogonalization process of
f i (x)g1i=1 is presented.
In order to apply the RKHS method, as in [12, 13, 1731], we rs dene a dierential linear operator L as
L :W 52 [0; 1]!W 1
2 [0; 1] such that Lv (x) = v(4) (x). Thus, discretized form of Eqs. (3) and (4) can be obtained as
follows:
Lv (x) = Fx; (v + )
000(x) ; (v + )
00(x) ; (v + )
0(x) ; (v + ) (x)
+ [T (v + )] (x) ; (7)
subject to the two-point boundary conditions
v (0) = 0, v (1) = 0;
v00 (0) = 0, v00 (1) = 0;(8)
where v and are as given in Algorithm 1.
Theorem .3 The operator L :W 52 [0; 1]!W 1
2 [0; 1] is bounded and linear.
Proof. For boundedness, we need to prove kLv(x)k2W 12 M kLv(x)k2W 5
2; where M is a positive constant. From
the denition of the inner product and the norm of W 12 [0; 1], we have k(Lv) (x)k
2W 1
2= h(Lv) (x) ; (Lv) (x)iW 1
2=
1R0
n(Lv)
0(x)2+ [(Lv) (x)]
2odx: By reproducing property of Kx(y), we have v(x) = hv (y) ;Kx (y)iW 5
2, (Lv) (x) =
hv (y) ; (LKx) (y)iW 52, and (Lv)0(x) = hv (y) ; (LKx)
0 (y)iW 52. Again, by Schwarz inequality, we get
j(Lv)(x)j =hv (x) ; (LKx) (x)iW 5
2
kLKx (x)kW 52kv (x)kW 5
2=M1 kv (x)kW 5
2; M1 > 0;
j(Lv)0(x)j =hv (x) ; (LKx)
0 (x)iW 52
k(LKx)0 (x)kW 5
2kv (x)kW 5
2=M2 kv (x)kW 5
2; M2 > 0:
Thus, k(Lv)(x)k2W 12=
1R0
n(Lv)
0(x)2+ [(Lv) (x)]
2odx (M2
1 +M22 ) kv (x)k
2W 5
2or k(Lv)(x)kW 1
2 M kv (x)kW 5
2;
where M =pM21 +M
22 . The linearity part is obvious. This complete the proof.
After that, we construct an orthogonal function system of W 52 [0; 1] as follows: put 'i (x) = Rxi (x) and
i (x) = Li' (x), where fxig1i=1 is dense on [0; 1] and L
is the adjoint operator of L. In terms of the properties of
reproducing kernel function Kx (y), one can obtains hv (x) ; i (x)iW 52= hv (x) ; L'i (x)iW 5
2= hLv (x) ; 'i (x)iW 1
2=
Lv(xi), i = 1; 2; :::. In fact, the orthonormal function system i (x)
1i=1
of the space W 52 [0; 1] can be derived from
the Gram-Schmidt orthogonalization process of f i (x)g1i=1 as
i (x) =iP
k=1
ik k (x) ; (9)
where ik are orthogonalization coecients and are given as follows: ij =1
k 1kfor i = j = 1, ij =
1difor
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
863 Omar Abu Arqub 857-874
8
i = j 6= 1, and ij = 1di
i1Pk=j
cikkj for i > j such that di =
sk ik
2 i1Pk=1
c2ik, cik = i; k
W 5
2, and f i (x)g
1i=1
is the orthonormal system in the space W 52 [0; 1].
Through the next theorem the subscript y by the operator L (Ly) indicates that the operator L applies to the
function of y.
Theorem .4 If fxig1i=1 is dense on [0; 1], then f i (x)g1i=1 is a complete function system of W 5
2 [0; 1] and i (x) =
LyKx (y)jy=xi .
Proof. Clearly, i (x) = Li' (x) = hLi' (y) ;Kx (y)iW 52= h'i (y) ; LyKx (y)iW 1
2= LyKx (y)jy=xi 2 W 5
2 [0; 1].
Now, for each xed v (x) 2 W 52 [0; 1], let hv (x) ; i (x)iW 5
2= 0, i = 1; 2; :::. In other word, hv (x) ; i (x)iW 5
2=
hv (x) ; L'i (x)iW 52= hLv (x) ; 'i (x)iW 1
2= Lv (xi) = 0. Note that fxig1i=1 is dense on [0; 1], therefore Lv (x) = 0.
It follows that v (x) = 0 from the existence of L1. So, the proof of the theorem is complete.
Lemma .1 If v (x) 2 W 52 [0; 1], then there exists M > 0 such that
v(i) (x)C M jjv(x)jjW 5
2, i = 0; 1; 2; 3; 4,
where jjv (x)jjC = maxaxb
jv(x)j.
Proof. For any x; y 2 [0; 1], we have v(i)(x) =Dv(y);K
(i)x (y)
EW 5
2
, i = 0; 1; 2; 3; 4: By the expression of Kx(y), it
follows that K(i)
x (y) W 5
2
Mi, i = 0; 1; 2; 3; 4. Thus,v(i)(x) = Dv (x) ;K(i)
x (x)EW 5
2
K(i)x (x)
W 5
2
kv(x)kW 52
Mi kv(x)kW 52, i = 0; 1; 2; 3; 4. Hence,
v(i) (x)CM jjv(x)jjW 5
2, i = 0; 1; 2; 3; 4, where M = max
i=0;1;2;3;4fMig.
6 Representation of exact and approximate solutions
In this section, we will give the representation form of exact and approximate solutions of Eqs. (3) and (4) in the
space W 52 [0; 1]. After that, an iterative formulas of obtaining approximate solution is represented for both linear
and nonlinear case.
Theorem .5 For each v (x) 2 W 52 [0; 1], the series
1Pi=1
v (x) ; i (x)
i (x) is convergent in the sense of the norm
of W 52 [0; 1]. On the other hand, if fxig
1i=1 is dense on [0; 1], then the following are hold:
(i) The exact solution of Eqs. (7) and (8) could be represented by
v (x) =1Pi=1
iPk=1
ikFxk; (v + )
000(xk) ; (v + )
00(xk) ; (v + )
0(xk) ; (v + ) (xk)
+ [T (v + )] (xk)
i (x) :
(10)
(ii) The approximate solution of Eqs. (7) and (8)
vn (x) =nPi=1
iPk=1
ikFxk; (v + )
000(xk) ; (v + )
00(xk) ; (v + )
0(xk) ; (v + ) (xk)
+ [T (v + )] (xk)
i (x) ;
(11)
and its derivative up to order four are converging uniformly to the exact solution v (x) and all its derivative
as n!1, respectively.
Proof. For the rst part, let v (x) be solution of Eqs. (7) and (8) in the space W 52 [0; 1]. Since v (x) 2 W 5
2 [0; 1],1Pi=1
v (x) ; i (x)
i (x) is the Fourier series about normal orthogonal system
i (x)
1i=1, and W 5
2 [0; 1] is the
Hilbert space, then the series1Pi=1
v (x) ; i (x)
i (x) is convergent in the sense of kkW 5
2. On the other aspect as
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
864 Omar Abu Arqub 857-874
9
well, using Eq. (9), we have
v (x) =1Pi=1
v (x) ; i (x)
W 5
2
i (x)
=1Pi=1
iPk=1
ik hv (x) ; k (x)iW 52
i (x)
=1Pi=1
iPk=1
ik hv (x) ; L'k (x)iW 52
i (x)
=1Pi=1
iPk=1
ik hLv (x) ; 'k (x)iW 12
i (x)
=1Pi=1
iPk=1
ik Fx; (v + )
000(x) ; (v + )
00(x) ; (v + )
0(x) ; (v + ) (x)
+ [T (v + )] (x) ; 'k (x)
W 1
2
i (x)
=1Pi=1
iPk=1
ik Fxk; (v + )
000(xk) ; (v + )
00(xk) ; (v + )
0(xk) ; (v + ) (xk)
+ [T (v + )] (xk)
i (x) :
Therefore, the form of Eq. (10) is the exact solution of Eqs. (7) and (8).
For the second part, it easy to see that by Lemma .1, for any x 2 [0; 1]v(i)n (x) v(i) (x) =
Dvn (x) v (x) ;K(i)x (x)
EW 5
2
K(i)x (x)
W 5
2
kvn (x) v (x)kW 52
Mi kvn (x) v (x)kW 52, i = 0; 1; 2; 3; 4;
where Mi, i = 0; 1; 2; 3; 4 are positive constants. Hence, if kvn (x) v (x)kW 52! 0 as n ! 1, the approximate
solution vn (x) and v(i)n (x), i = 0; 1; 2; 3; 4 are converge uniformly to the exact solution v (x) and all its derivative,
respectively. So, the proof of the theorem is complete.
Next, we will mention the following remark about the exact and approximate solutions of Eqs. (3) and (4).
Remark .2 [12, 13, 1731] In order to apply the RKHS technique for solve Eqs. (3) and (4), we dene an initial
guess approximation function as v0 (x1) = v (x1) = 0. On the other hand, we have the following two cases based on
the form of Eq. (11) and the structure of the functions F , G1, and G2 in Eq. (3).
Case 1: If Eq. (3) is linear, then the approximate solution can be obtained directly as follows:
vn (x) =nPi=1
iPk=1
ikfFxk; (vk1 + )
000(xk) ; (vk1 + )
00(xk) ; (vk1 + )
0(xk) ; (vk1 + ) (xk)
+ [T (vk1 + )] (xk)g i (x) :
Case 2: If Eq. (3) is nonlinear, then the approximate solution can be obtained immediately as follows:
vNn (x) =NPi=1
iPk=1
ikfFxk; (vn1 + )
000(xk) ; (vn1 + )
00(xk) ; (vn1 + )
0(xk) ; (vn1 + ) (xk)
+ [T (vn1 + )] (xk)g i (x) :
The reader is asked to refer to [12,13,1731] in order to know more details about these two case, including their
derivation, their importance, and their relationship to the exact solution.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
865 Omar Abu Arqub 857-874
10
7 Error estimation and error bound
When solving practical problems, it is necessary to take into account all the errors of the measurements. Moreover,
in accordance with the technical progress and the degree of complexity of the problem, it becomes necessary to
improve the technique of measurement of quantities. Considerable errors of measurement become inadmissible in
solving complicated mathematical, physical, and engineering problems. The reliability of the numerical result will
depend on an error estimate or bound, therefore the analysis of error and the sources of error in numerical methods
is also a critically important part of the study of numerical technique. In this section, we derive an error bounds
for the present method and problem in order to capture behavior of the solution.
In the next theorem, we show that the error of approximate solution is monotone decreasing, while the next
lemma is presented in order to prove the recent theorem.
Theorem .6 Let "2s;n = jjv (x) vn (x)jj2W 3
2, where v (x) and vn (x) are given by Eq. (10) and Eq. (11), respectively.
Then, the sequence of numbers f"ng are monotone decreasing in the sense of the norm of W 52 [0; 1] and "n ! 0 as
n!1.Proof. Since, v (x) =
1Pi=1
v (x) ; i (x)
W 5
2
i (x) it obvious that
"2n = jjv (x) vn (x)jj2W 5
2=
1Pi=n+1
v (x) ; i (x)
W 5
2
i (x)
2W 5
2
=1P
i=n+1
v (x) ; i (x)
W 5
2
2;
"2n1 = jjv (x) vn1 (x)jj2W 5
2=
1Pi=n
v (x) ; i (x)
W 5
2
i (x)
2W 5
2
=1Pi=n
v (x) ; i (x)
W 5
2
2:
Clearly, "n1 "n, and consequently f"ng is monotone decreasing in the sense of kkW 52. On the other aspect as
well, by Theorem .5, we know that1Pi=1
v (x) ; i (x)
W 5
2
i (x) is convergent in the sense of kkW 52. Thus, we have
"2n =1P
i=n+1
v (x) ; i (x)
W 5
2
2! 0 or "n ! 0. This complete the proof.
Lemma .2 Let v (x) is the exact solution of Eqs. (7) and (8), vn (x) is the approximate solution of v (x), and
T =xk+1 =
k2i : k = 0; 1; :::; 2
i. Then, Lv (xk) = Lvn (xk), for n = 2
i + 1 and xk 2 T .
Proof. Set the projective operator Pn : W 52 [0; 1] ! f
Pnm=1 cm m (x) ; cm 2 Rg, Then, we have Lvn (xk) =
hvn () ; LxkFxk ()iW 52= hvn () ; k ()iW 5
2= hPnv () ; k ()iW 5
2= hv () ; Pn k ()iW 5
2= hv () ; k ()iW 5
2=
hv () ; LxkFxk ()iW 52= Lxk hv () ; Fxk ()iW 5
2= Lxkv (xk) = Lv (xk).
Theorem .7 Let v (x) is the exact solution of Eqs. (7) and (8), vn (x) is the approximate solution of v (x), and
T =xk+1 =
k2i : k = 0; 1; :::; 2
i. Then, jv (x) vn (x)j < M
n , whereM is the product of the sup of convergent basis 1Pi=n+1
iPk=1
ikfFxk; (v + )
000(k) ; (v + )
00(k) ; (v + )
0(k) ; (v + ) (k)
+ [T (v + )] (k)g i ()
W 5
2
and the
maximum of determinate function @@K ()
W 5
2
about the variable in [0; 1].
Proof. Since jv (x) vn (x)j =L1 (Lv (x) Lvn (x)) and for every given x 2 [0; 1], there is always x0 2 T
satisfying x0 < x and xx0 = 1n . On the other hand, Lemma .2 and x0 2 T implying that Lv (x0) = Lvn (x0). So,
we obtain
jLv (x) Lvn (x)j = j(Lv (x) Lv (x0)) (Lvn (x) Lvn (x0))j : (12)
By applying the reproducing kernel properties v (x) = hv () ; Rx ()iW 52and Lv (x) = hv () ; LKx ()iW 5
2to Eq.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
866 Omar Abu Arqub 857-874
11
(12), we conclude
Lv (x) Lvn (x) = (Lv (x) Lv (x0)) (Lvn (x) Lvn (x0))= hv () ; LKx () LKx0 ()iW 5
2 hvn () ; LKx () LRx0 ()iW 5
2
= hv () vn () ; LKx () LKx0 ()iW 52:
But on the other aspect as well, we have
jv (x) vn (x)j =L1 (Lv (x) Lvn (x))
v () vn () ; L1LKx () L1LKx0 ()
W 5
2
=
hv () vn () ;Kx ()Kx0 ()iW 52
jjv () vn ()jjW 5
2jjKx ()Kx0 ()jjW 5
2:
Here, we take the norm of jjKx ()Kx0 ()jjW 52for the variable and the function Kx () is derived on x in [0; 1].
So, we have Kx ()Kx0 () =@@K () (x x0). Hence, we can write
jv (x) vn (x)j jjv () vn ()jjW 52
@@K () (x x0)W 5
2
= k1P
i=n+1
iPk=1
ikfFxk; (v + )
000(k) ; (v + )
00(k) ; (v + )
0(k) ; (v + ) (k)
+ [T (v + )] (k)g i () kW 5
2k @@K () kW 5
2(x x0)
= Mn :
So, the proof of the theorem is complete.
8 Software libraries and numerical outcomes
Software packages have great capabilities for solving mathematical, physical, and engineering problems. Sometimes,
it is very dicult to solve these problems analytically, so it is required to obtain an ecient approximate solution.
Thus, some software mathematical packages such as MATHEMATICA or MAPLE can be helpful in visualizing
the behavior of the solutions of such problems. Indeed, throughout the whole paper we used MATHEMATICA 7:0
software package for numerical experiment.
The object of the next algorithm is to implement a procedure to solve Eqs. (1) and (2) in numeric form in
terms of their grid nodes based on the use of RKHS method.
Algorithm 2 To approximate the solution of Eqs. (1) and (2), we do the following steps:
Input: The endpoints of [0; 1]; the integers n and N ; the kernel functions Kx (y) and Rx (y); the dierential
operator L; the function F ; the operator [Tu].
Output: Approximate solution un(x) or uNn (x) of Eqs. (1) and (2).
Step 1: Fixed x in [0; 1] and set y 2 [0; 1];
If y x then set Kx (y) =9Pi=0
pi(x)yi;
else set Kx (y) =9Pi=0
qi(x)yi;
For i = 1; 2; :::; n do the following:
Set xi =i1n1 ;
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
867 Omar Abu Arqub 857-874
12
Set i(x) = Ly [Kx (y)]y=xi ;
Output: the orthogonal function system i(x).
Step 2: For i = 2; 3:::; n and j = 1; 2:::; i do the following:
Set di =
sk ik
2 i1Pk=1
c2ik;
If j 6= i then set ij = 1di
i1Pk=j
cikkj ;
else set ij =1di;
else set 11 =1
k 1k;
Output: the orthogonalization coecients ij .
Step 3: For i = 2; 3:::; n and k = 1; 2:::; i 1 do the following:
Set i (x) =iP
k=1
ik k (x);
Set cik = i; k
W 5
2;
Output: the orthonormal function system i (x).
Step 4: Set v0 (x1) = v (x1) = 0;
For i = 1; 2; :::n do the following:
If F and [Tu] are linear then set Bi =iP
k=1
ikfF (xk; (vk1 + )000(xk) ; (vk1 + )
00(xk) ;
(vk1 + )0(xk) ; (vk1 + ) (xk)) + [T (vk1 + )] (xk)g;
set vi (x) =iPi=1
Bi i (x);
else for i = 1; 2; :::N do the following:
set xi =i1N1 ;
set Bi =iP
k=1
ikf(Fxk; (vn1 + )000(xk) ; (vn1 + )
00(xk) ;
(vn1 + )0(xk) ; (vn1 + ) (xk))
+ [T (vn1 + )] (xk)g i (x);
set vin (x) =iPi=1
Bi i (x);
Output: the approximate solution vn(x) or vNn (x) of Eqs. (3) and (4).
Step 5: Use the transformation un (x) = vn(x) + (x) or uNn (x) = vNn (x) + (x);
Output: the approximate solution un(x) or uNn (x) of Eqs. (1) and (2).
Step 6: Stop.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
868 Omar Abu Arqub 857-874
13
Next, we propose few numerical simulations for solving some specic examples of Eqs. (1) and (2). However,
we apply the techniques described in the previous sections to some linear and nonlinear test examples in order to
demonstrate the eciency, accuracy, and applicability of the proposed method. Results obtained by the method are
compared with the analytical solution of each example by computing the exact and relative errors and are found
to be in good agreement with each other.
Problem .1 Consider the following linear equation:
u(4)(x) = u00(x) + 4u(x) + f (x) + [Tu] (x) ;
in which the mixed operator is given as
[Tu] (x) = 1R0
x2tu0(t)dt+xR0
(x+ 1)tu(t)dt;
and subject to the boundary conditions
u (0) = 0; u (1) = 0;
u00(0) = 0; u00(1) = 0;
where 0 t < x 1 and f (x) is chosen such that the exact solution is u (x) = sin(x).
Using Algorithms 1 and 2, taking xi =i1n1 , i = 1; 2; :::; n. The numerical results of approximate solution un (x)
of u (x) are calculated at some selected grid points for n = 36 and are tabulated in Table 1.
Table 1. Numerical results for Problem 1: solutions and corresponding errors.
x Exact solution Approximate solution Absolute error Relative error
0:16 0:4817536741017153 0:4817521115692216 1:56253 106 3:24343 1060:32 0:8443279255020151 0:8443251824015761 2:74310 106 3:24886 1060:48 0:9980267284282716 0:9980234824190575 3:24601 106 3:25243 1060:64 0:9048270524660195 0:9048241075118995 2:94495 106 3:25471 1060:80 0:5877852522924732 0:5877833384377027 1:91385 106 3:25604 1060:96 0:1253332335643045 0:1253328254068720 4:08157 107 3:25658 106
Problem .2 Consider the following nonlinear equation:
u(4)(x) = x(u00(x))2 cos(x)u0(x) u(x) + 2 ln((u(x))3) + f (x) + [Tu] (x) ;
in which the mixed operator is given as
[Tu] (x) =1R0
xtu(x)u0(t) ln(u(t))dt 9xR0
(x t)u00(t)(u(t))3dt;
and subject to the boundary conditions
u (0) = 1; u (1) = e;
u00(0) = 1; u00(1) = e;
where 0 t < x 1 and f (x) is chosen such that the exact solution is u (x) = ex.
Using Algorithms 1 and 2, taking xi =i1N1 , i = 1; 2; :::; N . The numerical results of approximate solution
uNn (x) of u (x) are calculated at some selected grid points for N = 36, n = 2 and are tabulated in Table 2.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
869 Omar Abu Arqub 857-874
14
Table 2. Numerical results for Problem 2: solutions and corresponding errors.
x Exact solution Approximate solution Absolute error Relative error
0:16 1:1735108709918103 1:1735115633003046 6:92308 107 5:89946 1070:32 1:3771277643359572 1:3771289810084700 1:21667 106 8:83486 1070:48 1:6160744021928934 1:6160758551178427 1:45292 106 8:99046 1070:64 1:8964808793049515 1:8964822199979947 1:34069 106 7:06937 1070:80 2:2255409284924680 2:2255418182404440 8:89748 107 3:99790 1070:96 2:6116964734231180 2:6116966661583056 1:92735 107 7:37969 108
Problem .3 Consider the following nonlinear equation:
u(4)(x) = xu000(x) u0(x)eu(x) (u(x))2 + f (x) + [Tu] (x) ;
in which the mixed operator is given as
[Tu] (x) =1R0
ex(t 1) sinh(u(x))dt+xR0
cosh(x)t3eu(t)dt;
and subject to the boundary conditions
u (0) = 0; u (1) = ln(2);
u00(0) = 1; u00(1) = 14 ;
where 0 t < x 1 and f (x) is chosen such that the exact solution is u (x) = ln(x+ 1).
Using Algorithms 1 and 2, taking xi =i1N1 , i = 1; 2; :::; N . The numerical results of approximate solution
uNn (x) of u (x) are calculated at some selected grid points for N = 36, n = 2 and are tabulated in Table 3.
Table 3. Numerical results for Problem 3: solutions and corresponding errors.
x Exact solution Approximate solution Absolute error Relative error
0:16 0:1484200051182732 0:1484150657910304 4:93933 106 3:32794 1050:32 0:2776317365982796 0:2776238623910086 7:87421 106 2:83621 1050:48 0:3920420877760237 0:3920336245177083 8:46326 106 2:15876 1050:64 0:4946962418361071 0:4946891488543930 7:09298 106 1:43381 1050:80 0:5877866649021191 0:5877822986892660 4:36621 106 7:42823 1060:96 0:6729444732424258 0:6729435645496804 9:08693 107 1:35032 106
Problem .4 Consider the following nonlinear equation:
u(4)(x) = u000(x) + 3u00(x) sin(u0(x)) 13(u(x))3 + f (x) + [Tu] (x) ;
in which the mixed operator is given as
[Tu] (x) = 14
1R0
ln(u(t))u0(t)dt+1
2
xR0
ln(x)u00(t)(u(t))2dt;
and subject to the boundary conditions
u (0) = 1; u (1) = cosh(1);
u00(0) = 1; u00(1) = cosh(1);
where 0 t < x 1 and f (x) is chosen such that the exact solution is u (x) = cosh(x).
Using Algorithms 1 and 2, taking xi =i1N1 , i = 1; 2; :::; N . The numerical results of approximate solution
uNn (x) of u (x) are calculated at some selected grid points for N = 36, n = 2 and are tabulated in Table 4.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
870 Omar Abu Arqub 857-874
15
Table 4. Numerical results for Problem 4: solutions and corresponding errors.
x Exact solution Approximate solution Absolute error Relative error
0:16 1:0128273299790107 1:0128278915466450 5:61568 107 5:54455 1070:32 1:0516384007048240 1:0516393762289420 9:75524 107 9:27623 1070:48 1:1174288969995172 1:1174300474164940 1:15042 106 1:02952 1060:64 1:2118866516740000 1:2118877015831520 1:04991 106 8:66343 1070:80 1:3374349463048447 1:3374356375116260 6:91207 107 5:16815 1070:96 1:4972946796991150 1:4972948288491459 1:49150 107 9:96130 108
The in uence of the number of nodes, N , on the absolute error functionu (x) uNn (x) of RKHS method is
explored next. Figure 1 gives the relevant data for Problem 2, where the number of nodes covers the range from 9
to 72 in multiple of 2 in which n = 2. It is observed that the increase in the number of node results in a reduction
in the absolute error and correspondingly an improvement in the accuracy of the obtained solution. This goes in
agreement with the known fact, the error is monotone decreasing, where more accurate solutions are achieved using
an increase in the number of nodes. On the other hand, the cost to be paid while going in this direction is the rapid
increase in the number of iterations required for convergence. For instance, while increasing the number of nodes
from 9 to 18 to 36 to 72, the maximum absolute error jumps from almost 2:5 105 to 6 106 to 1:4 106 to3:5 107, i.e. 0:24 to 0:233 to 0:25 multiplication factor.
Figure 1: The in uence of the number of nodes on the absolute error function of Problem 2 for: (a)u (x) u92 (x);
(b)u (x) u182 (x); (c) u (x) u362 (x); (d) u (x) u722 (x).It is to be noted that the accuracy of certain node is inversely proportional to its distance (number of nodes)
from the boundaries. From the last mentioned sub gures, we see that we can achieve a very good approximation
with the exact solution in uniform multiplication factors.
Next, according to fact that it is possible to pick any point in [0; 1] and as well the approximate solutions and
all their derivatives up to order four will be applicable; some numerical values of u(m) (x), m = 0; 1; 2; 3; 4, where
xi =i1N1 , i = 1; 2; :::; N in which N = 36, n = 2 at some selected grid nodes in [0; 1] for Problem 4 are tabulated
in Table 5.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
871 Omar Abu Arqub 857-874
16
Table 5. Approximate numerical values of u(m) (x), m = 0; 1; 2; 3; 4 for Problem 4: selected nodes in [0; 1].
m x = 0:16 x = 0:48 x = 0:64 x = 0:96
0 1:0128273299790107 1:1174288969995172 1:2118866516740000 1:4972946796991150
1 0:1606834378652106 0:4986425689588153 0:6845916538580700 1:1144011777719312
2 1:0128256744654371 1:1174207910724487 1:2118775439320457 1:4972933355230342
3 0:1606750325962580 0:4985853351414680 0:6845395334998298 1:1143922879515298
4 1:0127516387810787 1:1171994146708600 1:2115152792084836 1:4972589410677763
9 Concluding remarks
In this paper, we introduce an algorithm for solving fourth-order BVPs of mixed type IDEs by using RKHS
method. The approximate solution obtained by the present method is uniformly convergent while the series solution
methodology can be applied to much more complicated nonlinear problems. In the proposed algorithm, the solution
u (x) and the approximate solution un (x) are represented in the form of rabidly convergent series in the space
W 52 [0; 1]. Moreover, the approximate solution and all its derivatives up to order four converge uniformly to the
exact solution and all its derivatives, respectively. Additionally, we note that not only a computational method is
presented but also we proved that the error of the approximate solution is monotone decreasing in the sense of the
norm of W 52 [0; 1]. The method is shown to be of good convergence, simple in principle, and easy to program.
References
[1] P.K. Kythe, P. Puri, Computational Methods for Linear Integral Equations, University of New Orlans, New
Orlans, 2002.
[2] A.J. Jerri, Introduction to Integral Equations with Applications, John Wiley and Sons, New York, 1999.
[3] R.P. Kanwal, Linear Integral Dierential Equations: Theory and Technique, Birkhauser Boston, Georgia, 1996.
[4] A.M. Wazwaz, A comparison study between the modied decomposition method and the traditional methods
for solving nonlinear integral equations, Applied Mathematics and Computation, 181 (2006) 1703-1712.
[5] F. Bloom, Asymptotic bounds for solutions to a system of damped integro-dierential equations of electromag-
netic theory, Journal of Mathematical Analysis and Applications 73 (1980) 524-542.
[6] K. Holmaker, Global asymptotic stability for a stationary solution of a system of integro-dierential equations
describing the formation of liver zones, SIAM Journal on Mathematical Analysis 24 (1993) 116-128.
[7] L.K. Forbes, S. Crozier, D.M. Doddrell, Calculating current densities and elds produced by shielded magnetic
resonance imaging probes, SIAM Journal on Applied Mathematics 57 (1997) 401-425.
[8] R.B. Agarwal, Boundary Value Problems for High Ordinary Dierential Equations, World Scientic, Singapore,
1986.
[9] A.M. Wazwaz, A reliable algorithm for solving boundary value problems for higher-order integro-dierential
equation, Applied Mathematics and Computation 118 (2001) 327-342.
[10] I. Hashim, Adomian decomposition method for solving BVPs for fourth-order integro-dierential equations,
Journal of Computational and Applied Mathematics 193 (2006) 658-664.
[11] N.H. Sweilam, Fourth order integro-dierential equations using variational iteration method, Computers and
Mathematics with Applications 54 (2007) 1086-1091.
[12] M. Al-Smadi, O. Abu Arqub, N. Shawagfeh, Approximate solution of BVPs for 4th-order IDEs by using RKHS
method, Applied Mathematical Sciences 6 (2012) 2453-2464.
[13] F. Geng, Solving singular second order three-point boundary value problems using reproducing kernel Hilbert
space method, Applied Mathematics and Computation 215 (2009) 2095-2102.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
872 Omar Abu Arqub 857-874
17
[14] A. Berlinet, C.T. Agnan, Reproducing Kernel Hilbert Space in Probability and Statistics, Kluwer Academic
Publishers, 2004.
[15] M. Cui, Y. Lin, Nonlinear Numercial Analysis in the Reproducing Kernel Space, Nova Science Publisher, New
York, 2008.
[16] A. Daniel, Reproducing Kernel Spaces and Applications, Springer, 2003.
[17] L.H. Yang, Y. Lin, Reproducing kernel methods for solving linear initial-boundary-value problems, Electronic
Journal of Dierential Equations (2008) 1-11.
[18] C. Li, M. Cui, The exact solution for solving a class nonlinear operator equations in the reproducing kernel
space, Applied Mathematics and Computation 143 (2003) 393-399.
[19] O. Abu Arqub, M. Al-Smadi, S. Momani, Application of reproducing kernel method for solving nonlinear
Fredholm-Volterra integro-dierential equations, Abstract and Applied Analysis, vol. 2012, Article ID 839836,
16 pages, 2012. doi:10.1155/2012/839836.
[20] O. Abu Arqub, M. Al-Smadi, N. Shawagfeh, Solving Fredholm integro-dierential equations using reproducing
kernel Hilbert space method, Applied Mathematics and Computation 219 (2013) 8938-8948.
[21] M. Al-Smadi, O. Abu Arqub, S. Momani, A computational method for two-point boundary value problems
of fourth-order mixed integro-dierential equations, Mathematical Problems in Engineering, Mathematical
Problems in Engineering, vol 2013, Article ID 832074, 10 pages, 2012, doi.org/10.1155/2013/832074.
[22] N. Shawagfeh, O. Abu Arqub, S. Momani, Analytical solution of nonlinear second-order periodic boundary
value problem using reproducing kernel method, Journal of Computational Analysis and Applications 16 (2014)
750-762.
[23] W. Wang, M. Cui, B. Han, A new method for solving a class of singular two-point boundary value problems,
Applied Mathematics and Computation 206 (2008) 721-727.
[24] Y. Lin, M. Cui, L. Yang, Representation of the exact solution for a kind of nonlinear partial dierential
equations, Applied Mathematics Letters 19 (2006) 808-813.
[25] M. Cui, H. Du, Representation of exact solution for the nonlinear Volterra-Fredholm integral equations, Applied
Mathematics and Computation 182 (2006) 1795-1802.
[26] F. Geng, M. Cui, B. Zhang, Method for solving nonlinear initial value problems by combining homotopy
perturbation and reproducing kernel Hilbert space methods, Nonlinear Analysis: Real World Applications 11
(2010) 637-644.
[27] F. Geng, A new reproducing kernel Hilbert space method for solving nonlinear fourth-order boundary value
problems, Applied Mathematics and Computation 213 (2009) 163-169.
[28] J. Dua, M. Cui, Constructive proof of existence for a class of fourth-order nonlinear BVPs, Computers and
Mathematics with Applications 59 (2010) 903-911.
[29] F. Geng, M. Cui, Solving a nonlinear system of second order boundary value problems, Journal of Mathematical
Analysis and Applications 327 (2007) 1167-1181.
[30] Y. Lin, M. Cui, L. Yang, Representation of the exact solution for a kind of nonlinear partial dierential
equations, Applied Mathematics Letters 19 (2006) 808-813.
[31] M. Cui, H. Du, Representation of exact solution for the nonlinear Volterra-Fredholm integral equations, Applied
Mathematics and Computation 182 (2006) 1795-1802.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
873 Omar Abu Arqub 857-874
18
[32] A. El-Ajou, O. Abu Arqub, S. Momani, Homotopy analysis method for second-order boundary value problems
of integro-dierential equations, Discrete Dynamics in Nature and Society, vol. 2012, Article ID 365792, 18
pages, 2012. doi:10.1155/2012/365792.
[33] O. Abu Arqub, Z. Abo-Hammour, S. Momani, Application of continuous genetic algorithm for nonlinear system
of second-order boundary value problems, Applied Mathematics and Information Sciences 8 (2014) 1-14.
[34] O. Abu Arqub, Z. Abo-Hammour, S. Momani, N. Shawagfeh, Solving singular two-point boundary value
problems using continuous genetic algorithm, Abstract and Applied Analysis, vol. 2012, Article ID 205391, 25
page, 2012, doi.10.1155/2012/205391.
[35] O. Abu Arqub, A. El-Ajou, S. Momani, N. Shawagfeh, Analytical solutions of fuzzy initial value problems by
HAM, Applied Mathematics and Information Sciences 7 (2013) 1903-1919.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
874 Omar Abu Arqub 857-874
AN AQCQ-FUNCTIONAL EQUATION IN NORMED 2-BANACHSPACES
CHOONKIL PARK, SUN YOUNG JANG, REZA SAADATI, AND DONG YUN SHIN∗
Abstract. In this paper, we prove the Hyers-Ulam stability of an additive-quadratic-cubic-quartic functional equation in normed 2-Banach spaces.
1. Introduction and preliminaries
In the 1960’s, Gahler [18, 19] introduced the concept of linear 2-normed spaces.
Definition 1.1. Let X be a real linear space with dimX > 1 and let ‖·, ·‖ : X ×X →R≥0 be a function satisfying the following properties:(a) ‖x, y‖ = 0 if and only if x and y are linearly dependent,(b) ‖x, y‖ = ‖y, x‖,(c) ‖αx, y‖ = |α| ‖x, y‖,(d) ‖x, y + z‖ ≤ ‖x, y‖+ ‖x, z‖for all x, y, z ∈ X and α ∈ R. Then the function ‖·, ·‖ is called a 2-norm on X and thepair (X, ‖·, ·‖) is called a linear 2-normed space. Sometimes the condition (d) called thetriangle inequality.
We introduce a basic property of linear 2-normed spaces.
Lemma 1.2. ([35]) Let (X, ‖·, ·‖) be a linear 2-normed space. If x ∈ X and ‖x, y‖ = 0for all y ∈ X, then x = 0.
In the 1960’s, Gahler and White [20, 47, 48] introduced the concept of 2-Banach spaces.In order to define completeness, the concepts of Cauchy sequences and convergence arerequired.
Definition 1.3. A sequence xn in a linear 2-normed spaceX is called a Cauchy sequenceif
limm,n→∞
‖xn − xm, y‖ = 0
for all y ∈ X.
Definition 1.4. A sequence xn in a linear 2-normed space X is called a convergentsequence if there is an x ∈ X such that
limn→∞
‖xn − x, y‖ = 0
for all y ∈ X. If xn converges to x, write xn → x as n → ∞ and call x the limit ofxn. In this case, we also write limn→∞ xn = x.
Triangle inequality implies the following lemma.
2010 Mathematics Subject Classification. Primary 39B82, 39B52, 46B99.Key words and phrases. Hyers-Ulam stability; normed 2-Banach space; additive-quadratic-cubic-
quartic functional equation.∗Corresponding author.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
875 CHOONKIL PARK ET AL 875-884
C. PARK, S.Y. JANG, R. SAADATI, AND D.Y. SHIN
Lemma 1.5. ([35]) For a convergent sequence xn in a linear 2-normed space X,
limn→∞
‖xn, y‖ =∥∥∥∥ limn→∞
xn, y
∥∥∥∥for all y ∈ X.
Definition 1.6. A linear 2-normed space in which every Cauchy sequence is a convergentsequence is called a 2-Banach space.
Definition 1.7. A 2-Banach space X is called a normed 2-Banach space if X is a normedspace with norm ‖ · ‖.
The stability problem of functional equations originated from a question of Ulam [46]concerning the stability of group homomorphisms.
The functional equationf(x+ y) = f(x) + f(y)
is called the Cauchy additive functional equation. In particular, every solution of theCauchy additive functional equation is said to be an additive mapping. Hyers [21] gavea first affirmative partial answer to the question of Ulam for Banach spaces. Hyers’Theorem was generalized by Aoki [4] for additive mappings and by Th.M. Rassias [37]for linear mappings by considering an unbounded Cauchy difference. A generalization ofthe Th.M. Rassias theorem was obtained by Gavruta [17] by replacing the unboundedCauchy difference by a general control function in the spirit of Th.M. Rassias’ approach.
In 1990, Th.M. Rassias [38] during the 27th International Symposium on FunctionalEquations asked the question whether such a theorem can also be proved for p ≥ 1. In1991, Gajda [16] following the same approach as in Th.M. Rassias [37], gave an affirmativesolution to this question for p > 1. It was shown by Gajda [16], as well as by Th.M. Rassiasand Semrl [39] that one cannot prove a Th.M. Rassias’ type theorem when p = 1 (cf. thebooks of Czerwik [8], and Hyers, Isac and Th.M. Rassias [22]).
In 1982, J.M. Rassias [36] followed the innovative approach of the Th.M. Rassias’theorem [37] in which he replaced the factor ‖x‖p + ‖y‖p by ‖x‖p · ‖y‖q for p, q ∈ R withp+ q 6= 1.
The functional equation
f(x+ y) + f(x− y) = 2f(x) + 2f(y)
is called a quadratic functional equation. In particular, every solution of the quadraticfunctional equation is said to be a quadratic mapping. A Hyers-Ulam stability problem forthe quadratic functional equation was proved by Skof [45] for mappings f : X → Y , whereX is a normed space and Y is a Banach space. Cholewa [6] noticed that the theorem ofSkof is still true if the relevant domain X is replaced by an Abelian group. Czerwik [7]proved the Hyers-Ulam stability of the quadratic functional equation.
In [24], Jun and Kim considered the following cubic functional equation
f(2x+ y) + f(2x− y) = 2f(x+ y) + 2f(x− y) + 12f(x). (1.1)
It is easy to show that the function f(x) = x3 satisfies the functional equation (1.1), whichis called a cubic functional equation and every solution of the cubic functional equationis said to be a cubic mapping.
In [27], Lee et al. considered the following quartic functional equation
f(2x+ y) + f(2x− y) = 4f(x+ y) + 4f(x− y) + 24f(x)− 6f(y). (1.2)
It is easy to show that the function f(x) = x4 satisfies the functional equation (1.2),which is called a quartic functional equation and every solution of the quartic functional
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
876 CHOONKIL PARK ET AL 875-884
AQCQ-FUNCTIONAL EQUATION IN NORMED 2-BANACH SPACES
equation is said to be a quartic mapping. The stability problems of several functionalequations have been extensively investigated by a number of authors and there are manyinteresting results concerning this problem (see [1, 2, 3, 5, 9, 11, 12, 14, 15, 23, 25, 26, 28,29, 30, 31, 32, 33, 34, 40, 41, 42, 43, 44]).
In this paper, we prove the Hyers-Ulam stability of the following additive-quadratic-cubic-quartic functional equation
f(x+ 2y) + f(x− 2y) = 4f(x+ y) + 4f(x− y) (1.3)
− 6f(x) + f(2y) + f(−2y)− 4f(y)− 4f(−y)
in 2-normed spaces.One can easily show that an odd mapping f : X → Y satisfies (1.3) if and only if the
odd mapping f : X → Y is an additive-cubic mapping, i.e.,
f(x+ 2y) + f(x− 2y) = 4f(x+ y) + 4f(x− y)− 6f(x).
It was shown in [13, Lemma 2.2] that g(x) := f(2x) − 2f(x) and h(x) := f(2x) − 8f(x)are cubic and additive, respectively, and that f(x) = 1
6g(x)− 1
6h(x).
One can easily show that an even mapping f : X → Y satisfies (1.3) if and only if theeven mapping f : X → Y is a quadratic-quartic mapping, i.e.,
f(x+ 2y) + f(x− 2y) = 4f(x+ y) + 4f(x− y)− 6f(x) + 2f(2y)− 8f(y).
It was shown in [10, Lemma 2.1] that g(x) := f(2x)− 4f(x) and h(x) := f(2x)− 16f(x)are quartic and quadratic, respectively, and that f(x) = 1
12g(x)− 1
12h(x).
Throughout this paper, let X be a normed space and Y a normed 2-Banach space.
2. Hyers-Ulam stability of the AQCQ-functional equation (1.3) innormed 2-Banach spaces: odd mapping case
In this section, we prove the Hyers-Ulam stability of the AQCQ-functional equation(1.3) in normed 2-Banach spaces for an odd mapping case.
For a mapping f : X → Y , define Df : X2 → Y by
Df(x, y) := f(x+ 2y) + f(x− 2y)− 4f(x+ y)− 4f(x− y) + 6f(x)
−f(2y)− f(−2y) + 4f(y) + 4f(−y)
for all x, y ∈ X.
Theorem 2.1. Let θ ∈ [0,∞), p, q ∈ (0,∞) with p+ q > 1 and let f : X → Y be an oddmapping satisfying
‖Df(x, y), w‖ ≤ θ‖x‖p‖y‖q‖w‖ (2.1)
for all x, y ∈ X and all w ∈ Y . Then there is a unique additive mapping A : X → Y suchthat
‖f(2x)− 8f(x)− A(x), w‖ ≤ 4 + 2p
2p+q − 2θ‖x‖p+q‖w‖ (2.2)
for all x ∈ X and all w ∈ Y .
Proof. Letting x = y in (2.1), we get
‖f(3y)− 4f(2y) + 5f(y), w‖ ≤ θ‖y‖p+q‖w‖ (2.3)
for all y ∈ X and all w ∈ Y .
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
877 CHOONKIL PARK ET AL 875-884
C. PARK, S.Y. JANG, R. SAADATI, AND D.Y. SHIN
Replacing x by 2y in (2.1), we get
‖f(4y)− 4f(3y) + 6f(2y)− 4f(y), w‖ ≤ 2pθ‖y‖p+q‖w‖ (2.4)
for all y ∈ X and all w ∈ Y .By (2.3) and (2.4),
‖f(4y)− 10f(2y) + 16f(y), w‖ (2.5)
≤ ‖4(f(3y)− 4f(2y) + 5f(y)), w‖+ ‖f(4y)− 4f(3y) + 6f(2y)− 4f(y), w‖= 4‖f(3y)− 4f(2y) + 5f(y), w‖+ ‖f(4y)− 4f(3y) + 6f(2y)− 4f(y), w‖≤ (4 + 2p)θ‖y‖p+q‖w‖
for all y ∈ X and all w ∈ Y . Replacing y by x2
and letting g(x) := f(2x)− 8f(x) in (2.5),we get ∥∥∥∥g(x)− 2g
(x
2
), w
∥∥∥∥ ≤ 4 + 2p
2p+qθ‖x‖p+q‖w‖
for all x ∈ X and all w ∈ Y . Hence∥∥∥∥2lg(x
2l
)− 2mg
(x
2m
), w∥∥∥∥ ≤ 2
m−1∑j=l
4 + 2p
2p+q
2j
2(p+q)jθ‖x‖p+q‖w‖ (2.6)
for all nonnegative integers m and l with m > l, all x ∈ X and all w ∈ Y . It follows from(2.6) that the sequence 2kg( a
2k) is Cauchy for each x ∈ X. Since Y is 2-Banach space,
the sequence 2kg( a2k
) converges. So one can define the mapping A : X → Y by
A(x) := limj→∞
2jg(x
2j
)for all x ∈ X. That is,
limj→∞
∥∥∥∥∥2jg(x
2j
)− A(x), w
∥∥∥∥∥ = 0
for all x ∈ X and all w ∈ Y .Moreover, letting 0 = 0 and passing the limit m→∞ in (2.6), we get (2.2).By (2.1),
‖DA(x, y), w‖ = limk→∞
∥∥∥∥2kDg(x
2k,y
2k
), w∥∥∥∥ ≤ lim
k→∞
(2p + 8)2k
2(p+q)kθ‖x‖p‖y‖q‖w‖ = 0
and so ‖DA(x, y), w‖ = 0 for all x, y ∈ X and all w ∈ Y . Hence DA(x, y) = 0 for allx, y ∈ X. Since g : X → Y is odd, A : X → Y is odd. So the mapping A : X → Y isadditive.
Now, let T : X → Y be another additive mapping satisfying (2.2). Then we have
‖A(x)− T (x), w‖ =∥∥∥∥2lA
(x
2l
)− 2lT
(x
2l
), w
∥∥∥∥≤
∥∥∥∥2l(A(x
2l
)− g
(x
2l
)), w
∥∥∥∥+∥∥∥∥2l
(T(x
2l
)− g
(x
2l
)), w
∥∥∥∥≤ 2
4 + 2p
2p+q − 2
2l
2(p+q)lθ‖x‖p+q‖w‖,
which tends to zero as l → ∞ for all x ∈ X and all w ∈ Y . So we can conclude thatA(a) = T (a) for all a ∈ X. This proves the uniqueness of A.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
878 CHOONKIL PARK ET AL 875-884
AQCQ-FUNCTIONAL EQUATION IN NORMED 2-BANACH SPACES
Therefore, A : X → Y is a unique additive mapping satisfying (2.2), as desired.
Theorem 2.2. Let θ ∈ [0,∞), p, q ∈ (0,∞) with p+ q < 1 and let f : X → Y be an oddmapping satisfying (2.1). Then there is a unique additive mapping A : X → Y such that
‖f(2x)− 8f(x)− A(x), w‖ ≤ 4 + 2p
2− 2p+qθ‖x‖p+q‖w‖
for all x ∈ X and all w ∈ Y .
Proof. Replacing y by x and letting g(x) := f(2x)− 8f(x) in (2.5), we get∥∥∥∥g(x)− 1
2g (2x) , w
∥∥∥∥ ≤ 4 + 2p
2θ‖x‖p+q‖w‖
for all x ∈ X and all w ∈ Y .The rest of the proof is similar to the proof of Theorem 2.1.
Theorem 2.3. Let θ ∈ [0,∞), p, q ∈ (0,∞) with p+ q > 3 and let f : X → Y be an oddmapping satisfying (2.1). Then there is a unique cubic mapping C : X → Y such that
‖f(2x)− 2f(x)− C(x), w‖ ≤ 4 + 2p
2p+q − 8θ‖x‖p+q‖w‖
for all x ∈ X and all w ∈ Y .
Proof. Replacing y by x2
and letting g(x) := f(2x)− 2f(x) in (2.5), we get∥∥∥∥g(x)− 8g(x
2
), w∥∥∥∥ ≤ 4 + 2p
2p+qθ‖x‖p+q‖w‖
for all x ∈ X and all w ∈ Y .The rest of the proof is similar to the proof of Theorem 2.1.
Theorem 2.4. Let θ ∈ [0,∞), p, q ∈ (0,∞) with p+ q < 3 and let f : X → Y be an oddmapping satisfying (2.1). Then there is a unique cubic mapping C : X → Y such that
‖f(2x)− 2f(x)− C(x), w‖ ≤ 4 + 2p
8− 2p+qθ‖x‖p+q‖w‖
for all x ∈ X and all w ∈ Y .
Proof. Replacing y by x and letting g(x) := f(2x)− 2f(x) in (2.5), we get∥∥∥∥g(x)− 1
8g (2x) , w
∥∥∥∥ ≤ 4 + 2p
8θ‖x‖p+q‖w‖
for all x ∈ X and all w ∈ Y .The rest of the proof is similar to the proof of Theorem 2.1.
Now we prove the superstability of the AQCQ-functional equation (1.3) in normed2-Banach spaces for an odd mapping case.
Theorem 2.5. Let θ ∈ [0,∞), p, q, r ∈ (0,∞) with r 6= 1 and let f : X → Y be an oddmapping such that
‖Df(x, y), w‖ ≤ θ‖x‖p‖y‖q‖w‖r (2.7)
for all x, y ∈ X and all w ∈ Y . Then f : X → Y is realized as the sum of an additivemapping and a cubic mapping.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
879 CHOONKIL PARK ET AL 875-884
C. PARK, S.Y. JANG, R. SAADATI, AND D.Y. SHIN
Proof. Replacing w by sw in (2.7) for s ∈ R\ 0, we get
‖Df(x, y), sw‖ ≤ θ‖x‖p‖y‖q‖sw‖r
and so
‖Df(x, y), w‖ ≤ θ‖x‖p‖y‖q‖w‖r |s|r
|s|(2.8)
for all x, y ∈ X, all w ∈ Y and all s ∈ R\ 0.If r > 1, then the right side of (2.8) tends to ‖f(x+ y + z), w‖ as s→ 0.If r < 1, then the right side of (2.8) tends to ‖f(x+ y + z), w‖ as s→ +∞.Thus
‖Df(x, y), w‖ = 0
for all x, y ∈ X and all w ∈ Y . By [13, Lemma 2.2], f : X → Y is realized as the sum ofan additive mapping and a cubic mapping.
3. Hyers-Ulam stability of the AQCQ-functional equation (1.3) innormed 2-Banach spaces: even mapping case
In this section, we prove the Hyers-Ulam stability of the AQCQ-functional equation(1.3) in normed 2-Banach spaces for an even mapping case.
Theorem 3.1. Let θ ∈ [0,∞), p, q ∈ (0,∞) with p + q > 2 and let f : X → Y be aneven mapping satisfying f(0) = 0 and (2.1). Then there is a unique quadratic mappingQ : X → Y such that
‖f(2x)− 16f(x)−Q(x), w‖ ≤ 4 + 2p
2p+q − 4θ‖x‖p+q‖w‖
for all x ∈ X and all w ∈ Y .
Proof. Letting x = y in (2.1), we get
‖f(3y)− 6f(2y) + 15f(y), w‖ ≤ θ‖y‖p+q‖w‖ (3.1)
for all y ∈ X and all w ∈ Y .Replacing x by 2y in (2.1), we get
‖f(4y)− 4f(3y) + 4f(2y) + 4f(y), w‖ ≤ 2pθ‖y‖p+q‖w‖ (3.2)
for all y ∈ X and all w ∈ Y .By (3.1) and (3.2),
‖f(4y)− 20f(2y) + 64f(y), w‖ (3.3)
≤ ‖4(f(3y)− 6f(2y) + 15f(y)), w‖+ ‖f(4y)− 4f(3y) + 4f(2y) + 4f(y), w‖= 4‖f(3y)− 6f(2y) + 15f(y), w‖+ ‖f(4y)− 4f(3y) + 4f(2y) + 4f(y), w‖≤ (4 + 2p)θ‖y‖p+q‖w‖
for all y ∈ X and all w ∈ Y . Replacing y by x2
and letting g(x) := f(2x) − 16f(x) in(3.3), we get ∥∥∥∥g(x)− 4g
(x
2
), w∥∥∥∥ ≤ 4 + 2p
2p+qθ‖x‖p+q‖w‖
for all x ∈ X and all w ∈ Y .The rest of the proof is similar to the proof of Theorem 2.1.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
880 CHOONKIL PARK ET AL 875-884
AQCQ-FUNCTIONAL EQUATION IN NORMED 2-BANACH SPACES
Theorem 3.2. Let θ ∈ [0,∞), p, q ∈ (0,∞) with p + q < 2 and let f : X → Y be aneven mapping satisfying f(0) = 0 and (2.1). Then there is a unique quadratic mappingQ : X → Y such that
‖f(2x)− 16f(x)−Q(x), w‖ ≤ 4 + 2p
4− 2p+qθ‖x‖p+q‖w‖
for all x ∈ X and all w ∈ Y .
Proof. Replacing y by x and letting g(x) := f(2x)− 16f(x) in (3.3), we get∥∥∥∥g(x)− 1
4g (2x) , w
∥∥∥∥ ≤ 4 + 2p
4θ‖x‖p+q‖w‖
for all x ∈ X and all w ∈ Y .The rest of the proof is similar to the proof of Theorem 2.1.
Theorem 3.3. Let θ ∈ [0,∞), p, q ∈ (0,∞) with p + q > 4 and let f : X → Y be aneven mapping satisfying f(0) = 0 and (2.1). Then there is a unique quartic mappingR : X → Y such that
‖f(2x)− 4f(x)−R(x), w‖ ≤ 4 + 2p
2p+q − 16θ‖x‖p+q‖w‖
for all x ∈ X and all w ∈ Y .
Proof. Replacing y by x2
and letting g(x) := f(2x)− 4f(x) in (3.3), we get∥∥∥∥g(x)− 16g(x
2
), w∥∥∥∥ ≤ 4 + 2p
2p+qθ‖x‖p+q‖w‖
for all x ∈ X and all w ∈ Y .The rest of the proof is similar to the proof of Theorem 2.1.
Theorem 3.4. Let θ ∈ [0,∞), p, q ∈ (0,∞) with p + q < 4 and let f : X → Y be aneven mapping satisfying f(0) = 0 and (2.1). Then there is a unique quartic mappingR : X → Y such that
‖f(2x)− 4f(x)−R(x), w‖ ≤ 4 + 2p
16− 2p+qθ‖x‖p+q‖w‖
for all x ∈ X and all w ∈ Y .
Proof. Replacing y by x and letting g(x) := f(2x)− 16f(x) in (3.3), we get∥∥∥∥g(x)− 1
16g (2x) , w
∥∥∥∥ ≤ 4 + 2p
16θ‖x‖p+q‖w‖
for all x ∈ X and all w ∈ Y .The rest of the proof is similar to the proof of Theorem 2.1.
Now we prove the superstability of the AQCQ-functional equation (1.3) in normed2-Banach spaces for an even mapping case.
Theorem 3.5. Let θ ∈ [0,∞), p, q, r ∈ (0,∞) with r 6= 1 and let f : X → Y be aneven mapping satisfying f(0) = 0 and (2.7). Then f : X → Y is realized as the sum of aquadratic mapping and a quartic mapping.
Proof. By the same reasoning as in the proof of Theorem 2.5, one can obtain
‖Df(x, y), w‖ = 0
for all x, y ∈ X and all w ∈ Y . By [10, Lemma 2.1], f : X → Y is realized as the sum ofa quadratic mapping and a quartic mapping.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
881 CHOONKIL PARK ET AL 875-884
C. PARK, S.Y. JANG, R. SAADATI, AND D.Y. SHIN
Let fo(x) := f(x)−f(−x)2
and fe(x) := f(x)+f(−x)2
. Then fo is odd and fe is even. fo, fesatisfy the functional equation (1.3). Let go(x) := fo(2x)− 2fo(x) and ho(x) := fo(2x)−8fo(x). Then fo(x) = 1
6go(x) − 1
6ho(x). Let ge(x) := fe(2x) − 4fe(x) and he(x) :=
fe(2x)− 16fe(x). Then fe(x) = 112ge(x)− 1
12he(x). Thus
f(x) =1
6go(x)− 1
6ho(x) +
1
12ge(x)− 1
12he(x).
We summarize the above results as follows.
Theorem 3.6. Let θ ∈ [0,∞) and p, q ∈ (0,∞) with p + q > 4. Let f : X → Y be amapping satisfying f(0) = 0 and (2.1). Then there exist an additive mapping A : X → Y ,a quadratic mapping Q : X → Y , a cubic mapping C : X → Y and a quartic mappingR : X → Y such that∥∥∥∥f(x)− 1
6A(x)− 1
12Q(x)− 1
6C(x)− 1
12R(x), w
∥∥∥∥≤(
4 + 2p
6(2p+q − 2)+
4 + 2p
12(2p+q − 4)+
4 + 2p
6(2p+q − 8)+
4 + 2p
12(2p+q − 16)
)θ‖x‖p+q‖w‖
for all x ∈ X and all w ∈ Y .
Theorem 3.7. Let θ ∈ [0,∞) and p, q ∈ (0,∞) with p + q < 1. Let f : X → Y be amapping satisfying f(0) = 0 and (2.1). Then there exist an additive mapping A : X → Y ,a quadratic mapping Q : X → Y , a cubic mapping C : X → Y and a quartic mappingR : X → Y such that∥∥∥∥f(x)− 1
6A(x)− 1
12Q(x)− 1
6C(x)− 1
12R(x), w
∥∥∥∥≤(
4 + 2p
6(2− 2p+q)+
4 + 2p
12(4− 2p+q)+
4 + 2p
6(8− 2p+q)+
4 + 2p
12(16− 2p+q)
)θ‖x‖p+q‖w‖
for all x ∈ X and all w ∈ Y .
Theorem 3.8. Let θ ∈ [0,∞), p, q, r ∈ (0,∞) with r 6= 1 and let f : X → Y be amapping satisfying f(0) = 0 and (2.7). Then f : X → Y is realized as the sum of anadditive mapping, a quadratic mapping, a cubic mapping and a quartic mapping.
Acknowledgments
C. Park, S. Y. Jang, D. Y. Shin were supported by Basic Science Research Programthrough the National Research Foundation of Korea funded by the Ministry of Ed-ucation, Science and Technology (NRF-2012R1A1A2004299), (NRF-2013-007226), and(NRF-2010-0021792), respectively.
References
[1] J. Aczel and J. Dhombres, Functional Equations in Several Variables, Cambridge Univ. Press, Cam-bridge, 1989.
[2] M. Alimohammady and A. Sadeghi, Some new results on the superstability of the Cauchy equationon semigroups, Results Math. 63 (2013), 705–712.
[3] J. M. Almira, A note on classical and p-adic Frechet functional equations with restrictions, ResultsMath. 63 (2013), 649–656.
[4] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan 2(1950), 64–66.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
882 CHOONKIL PARK ET AL 875-884
AQCQ-FUNCTIONAL EQUATION IN NORMED 2-BANACH SPACES
[5] I. Chang, M. Eshaghi Gordji, H. Khodaei and H. Kim, Nearly quartic mappings in β-homogeneousF -spaces, Results Math. 63 (2013), 529–541.
[6] P. W. Cholewa, Remarks on the stability of functional equations, Aequationes Math. 27 (1984),76–86.
[7] S. Czerwik, On the stability of the quadratic mapping in normed spaces, Abh. Math. Sem. Univ.Hamburg 62 (1992), 59–64.
[8] P. Czerwik, Functional Equations and Inequalities in Several Variables, World Scientific PublishingCompany, New Jersey, Hong Kong, Singapore and London, 2002.
[9] A. Ebadian and H. Ghobadipour, A fixed point approach to almost double derivations and Lie ∗-double drivations, Results Math. 63 (2013), 409–423.
[10] M. Eshaghi Gordji, S. Abbaszadeh and C. Park, On the stability of a generalized quadratic andquartic type functional equation in quasi-Banach spaces, J. Inequal. Appl. 2009, Article ID 153084,26 pages (2009).
[11] M. Eshaghi Gordji and A. Bodaghi, On the stability of quadratic double centralizers on Banachalgebras, J. Comput. Anal. Appl. 13 (2011), 724–729.
[12] M. Eshaghi Gordji, R. Farokhzad Rostami and S.A.R. Hosseinioun, Nearly higher derivations inunital C∗-algebras, J. Comput. Anal. Appl. 13 (2011), 734–742.
[13] M. Eshaghi Gordji, S. Kaboli-Gharetapeh, C. Park and S. Zolfaghari, Stability of an additive-cubic-quartic functional equation Adv. Difference Equat. 2009, Article ID 395693, 20 pages (2009).
[14] M. Eshaghi Gordji, G. Kim, J. Lee and C. Park, Generalized ternary bi-derivations on ternaryBanach algebras: a fixed point approach, J. Comput. Anal. Appl. 15 (2013), 45–54.
[15] M. Eshaghi Gordji and M. B. Savadkouhi, Stability of a mixed type cubic-quartic functional equationin non-Archimedean spaces, Appl. Math. Letters 23 (2010), 1198–1202.
[16] Z. Gajda, On stability of additive mappings, Internat. J. Math. Math. Sci. 14 (1991), 431–434.[17] P. Gavruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings,
J. Math. Anal. Appl. 184 (1994), 431–436.[18] S. Gahler, 2-metrische Raume und ihre topologische Struktur, Math. Nachr. 26 (1963), 115–148.[19] S. Gahler, Lineare 2-normierte Raumen, Math. Nachr. 28 (1964), 1–43.
[20] S. Gahler, Uber 2-Banach-Raume, Math. Nachr. 42 (1969), 335–347.[21] D. H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. U.S.A. 27
(1941), 222–224.[22] D. H. Hyers, G. Isac and Th. M. Rassias, Stability of Functional Equations in Several Variables,
Birkhauser, Basel, 1998.[23] G. Isac and Th. M. Rassias, On the Hyers-Ulam stability of ψ-additive mappings, J. Approx. Theory
72 (1993), 131–137.[24] K. Jun and H. Kim, The generalized Hyers-Ulam-Rassias stability of a cubic functional equation, J.
Math. Anal. Appl. 274 (2002), 867–878.[25] K. Jun and Y. Lee, A generalization of the Hyers-Ulam-Rassias stability of the Pexiderized quadratic
equations, J. Math. Anal. Appl. 297 (2004), 70–86.[26] S. Jung, Hyers-Ulam-Rassias Stability of Functional Equations in Mathematical Analysis, Hadronic
Press lnc., Palm Harbor, Florida, 2001.[27] S. Lee, S. Im and I. Hwang, Quartic functional equations, J. Math. Anal. Appl. 307 (2005), 387–394.[28] J. Lee, S. Lee and C. Park, Fixed points and stability of the Cauchy-Jensen functional equation in
fuzzy Banach algebras, J. Comput. Anal. Appl. 15 (2013), 692–698.[29] J. Lee, C. Park, Y. Cho and D. Shin, Orthogonal stability of a cubic-quartic functional equation in
non-Archimedean spaces, J. Comput. Anal. Appl. 15 (2013), 572–583.[30] L. Li, G. Lu, C. Park and D. Shin, Additive functional inequalities in generalized quasi-Banach
spaces, J. Comput. Anal. Appl. 15 (2013), 1165–1175.[31] G. Lu, Y. Jiang and C. Park, Additive functional equation in Frechet spaces, J. Comput. Anal. Appl.
15 (2013), 369–373.[32] C. Park, Homomorphisms between Poisson JC∗-algebras, Bull. Braz. Math. Soc. 36 (2005), 79–97.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
883 CHOONKIL PARK ET AL 875-884
C. PARK, S.Y. JANG, R. SAADATI, AND D.Y. SHIN
[33] C. Park, K. Ghasemi, S. G. Ghaleh, S. Jang, Approximate n-Jordan ∗-homomorphisms in C∗-algebras, J. Comput. Anal. Appl. 15 (2013), 365–368.
[34] C. Park, A. Najati and S. Jang, Fixed points and fuzzy stability of an additive-quadratic functionalequation, J. Comput. Anal. Appl. 15 (2013), 452–462.
[35] W. Park, Approximate additive mappings in 2-Banach spaces and related topics, J. Math. Anal.Appl. 376 (2011), 193–202.
[36] J. M. Rassias, On approximation of approximately linear mappings by linear mappings, J. Funct.Anal. 46 (1982) 126–130.
[37] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc.72 (1978), 297–300.
[38] Th. M. Rassias, Problem 16; 2, Report of the 27th International Symp. on Functional Equations,Aequationes Math. 39 (1990), 292–293; 309.
[39] Th. M. Rassias and P. Semrl, On the behaviour of mappings which do not satisfy Hyers-Ulam stability,Proc. Amer. Math. Soc. 114 (1992), 989–993.
[40] L. Reich and J. Tomaschek, Some remarks to the formal and local theory of the generalized Dhom-bresw functional equation, Results Math. 63 (2013), 377–395.
[41] S. Shagholi, M. Eshaghi Gordji and M. Bavand Savadkouhi, Stability of ternary quadratic derivationson ternary Banach algebras, J. Comput. Anal. Appl. 13 (2011), 1097–1105.
[42] S. Shagholi, M. Eshaghi Gordji and M. Bavand Savadkouhi, Nearly ternary cubic homomorphismsin ternary Frechet algebras, J. Comput. Anal. Appl. 13 (2011), 1106–1114.
[43] D. Shin, C. Park and Sh. Farhadabadi, On the superstability of ternary Jordan C∗-homomorphisms,J. Comput. Anal. Appl. 16 (2014), 964–973.
[44] D. Shin, C. Park and Sh. Farhadabadi, Stability and superstability of J∗-homomorphisms and J∗-derivations for a generalized Cauchy-Jensen equation, J. Comput. Anal. Appl. 17 (2014), 125–134.
[45] F. Skof, Proprieta locali e approssimazione di operatori, Rend. Sem. Mat. Fis. Milano 53 (1983),113–129.
[46] S. M. Ulam, A Collection of the Mathematical Problems, Interscience Publ. New York, 1960.[47] A. White, 2-Banach spaces, Doctorial Diss., St. Louis Univ., 1968.[48] A. White, 2-Banach spaces, Math. Nachr. 42 (1969) 43–60.
Choonkil ParkDepartment of Mathematics, Research Institute for Natural Sciences, Hanyang Univer-sity, Seoul 133-791, Korea
E-mail address: [email protected]
Sun Young JangDepartment of Mathematics, University of Ulsan, Ulsan 680-749, Korea
E-mail address: [email protected]
Reza SaadatiDepartment of Mathematics, Iran University of Science and Technology, Tehran, Iran
E-mail address: [email protected]
Dong Yun ShinDepartment of Mathematics, University of Seoul, Seoul 130-743, Korea
E-mail address: [email protected]
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
884 CHOONKIL PARK ET AL 875-884
REFINED GENERAL QUADRATIC EQUATION WITH FOURVARIABLES AND ITS STABILITY RESULTS
HARK-MAHN KIM AND SOON LEE
Abstract. In this article, we establish the general solution of a functional equation
rf(−x + y + z + w
s) + rf(
x− y + z + w
s) + rf(
x + y − z + w
s) + rf(
x + y + z − w
s)
= tf(x) + tf(y) + tf(z) + tf(w)
and present the generalized Hyers–Ulam stability of the equation.
1. Introduction
In 1940, S.M. Ulam [13] gave a wide ranging talk before the Mathematics Club of the
University of Wisconsin in which he discussed a number of unsolved problems. Among
these was the following question concerning the stability of homomorphisms: Let G1 be
a group and G2 a metric group with metric ϕ(·, ·). Given ε > 0, does there exist a
δ > 0 such that if f : G1 → G2 satisfies ϕ(f(xy), f(x)f(y)) < δ for all x, y ∈ G1, then a
homomorphism h : G1 → G2 exists with ϕ(f(x), h(x)) < ε for all x ∈ G1?
Let X and Y be Banach spaces with norms ‖ · ‖ and ‖ · ‖, respectively. D.H. Hyers [6]
showed that if ε > 0 and f : X → Y such that
‖f(x + y)− f(x)− f(y)‖ ≤ ε
for all x, y ∈ X, then there exists a unique additive mapping T : X → Y such that
‖f(x)− T (x)‖ ≤ ε
for all x ∈ X.
In 1950 T. Aoki [1] and in 1951 D.G. Bourgin [2] provided a generalized the Hyers the-
orem for additive mapping and in 1978 Th.M. Rassias [11] generalized the Hyers theorem
for liner mapping by allowing the Cauchy difference to be unbounded. Let f : X → Y
be a mapping such that f(tx) is continuous in t ∈ R for each fixed x ∈ X. Assume that
there exist constants ε ≥ 0 and p ∈ [0, 1) such that
‖f(x + y)− f(x)− f(y)‖ ≤ ε(‖x‖p + ‖y‖p)
2000 Mathematics Subject Classification: 39B82. 39B72Key words and phrases: Drygas functional equation, general quadratic equation, generalized Hyers–Ulamstability.
1
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
885 HARK-MAHN KIM ET AL 885-898
2 H. KIM AND S. LEE
for all x, y ∈ X. Then Th.M. Rassias proved that there exists a unique R-linear mapping
T : X → Y such that
‖f(x)− T (x)‖ ≤ 2ε
2− 2p‖x‖p
for all x ∈ X. And then, the result of Th.M. Rassias theorem has been generalized by P.
Gavruta [5] by allowing the Cauchy difference to be a generalized control function.
A square norm on an inner product space satisfies the important parallelogram equality
‖x + y‖2 + ‖x− y‖2 = 2‖x‖2 + 2‖y‖2.
The functional equation
f(x + y) + f(x− y) = 2f(x) + 2f(y),
which may be originated from this parallelogram equality, is called a quadratic functional
equation. In particular, every solution of the quadratic functional equation is said to
be a quadratic function. A Hyers–Ulam stability problem for the quadratic functional
equation was proved by F. Skof [12] for mappings f : X → Y , where X is a normed space
and Y is a Banach space. P.W. Cholewa [3] noticed that the theorem of Skof is still true
if the relevant domain X is replaced by an Abelian group. In S. Czerwik [4] proved the
Hyers–Ulam stability of the quadratic functional equation. In the last decade, S. Lee and
K. Jun [8] and S. Lee and C. Park [9] have proved the Hyers–Ulam stability of quadratic
type functional equation with three variables.
C. Park [10] has investigated the Hyers–Ulam stability of the following functional equa-
tion, which has exactly quadratic mappings as solutions up to f(0),
rf(x + y + z + w
s) + rf(
x + y − z − w
s) + rf(
x− y + z − w
s)
+rf(x− y − z + w
s) = tf(x) + tf(y) + tf(z) + tf(w)
for all x, y, z, w ∈ X under the assumption of an even mapping f : X → Y with f(0) = 0.
Recently, the authors [7] have established the general solution of the above functional
equation and then improved the Hyers–Ulam stability of the equation without the even
condition and f(0) = 0. In this paper, we are going to establish the general solution
of the following modified functional equation, which has exactly quadratic and additive
mappings as solutions up to f(0),
rf(−x + y + z + w
s) + rf(
x− y + z + w
s) + rf(
x + y − z + w
s) (1.1)
+rf(x + y + z − w
s) = tf(x) + tf(y) + tf(z) + tf(w)
for fixed nonzero real numbers r, s, t, and then investigate the Hyers–Ulam stability of the
functional equation for mappings f : X → Y between normed spaces.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
886 HARK-MAHN KIM ET AL 885-898
REFINED GENERAL QUADRATIC EQUATION 3
2. General solution of the functional equation.
First of all, we solve the general solution of the equation (1.1) in the class of mappings
between linear spaces.
Lemma 2.1. If a mapping f : X → Y satisfies the equation
rf(−x + y + z + w
s) + rf(
x− y + z + w
s) + rf(
x + y − z + w
s)
+rf(x + y + z − w
s) = tf(x) + tf(y) + tf(z) + tf(w)
for all x, y, z, w ∈ X, then f(x) = Q(x) + A(x) + f(0), where Q is quadratic and A is
additive, and f(0) = 0 if r 6= t.
Proof. Let f be a solution of the equation (1.1). Now, letting x = y = z = w := 0 in
(1.1), one has f(0) = 0 if r 6= t. First, we prove the case r 6= t. Let fe(x) :=f(x) + f(−x)
2
be an even part of f and fo(x) :=f(x)− f(−x)
2be an odd part of f . Then, we see that
fe, fo are also solutions of the equation (1.1). Putting y = z = w := 0 in (1.1) for the
even mapping fe, we have
4rfe(x
s) = tfe(x) (2.1)
for all x ∈ X, which yields
fe(−x + y + z + w) + fe(x− y + z + w) + fe(x + y − z + w) (2.2)
+fe(x + y + z − w) = 4fe(x) + 4fe(y) + 4fe(z) + 4fe(w)
for all x, y, z, w ∈ X. Putting z = w := 0 in (2.2), we deduce
fe(x + y) + fe(x− y) = 2fe(x) + 2fe(y)
for all x, y ∈ X. So fe := Q is quadratic.
Putting y = z = w := 0 in (1.1) for the odd mapping fo, we have the relation 2rfo(x
s) =
tfo(x) for all x ∈ X. Thus, it follows that
fo(−x + y + z + w) + fo(x− y + z + w) + fo(x + y − z + w) (2.3)
+fo(x + y + z − w) = 2fo(x) + 2fo(y) + 2fo(z) + 2fo(w)
for all x, y, z, w ∈ X. Putting z = w := 0 in (2.3), one conclude
fo(x + y) = fo(x) + fo(y),
and so, fo := A is additive. Therefore, f(x) = fe(x) + fo(x) = Q(x) + A(x), where Q is
quadratic and A is additive.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
887 HARK-MAHN KIM ET AL 885-898
4 H. KIM AND S. LEE
Next, we prove the case r = t. Let f(x)− f(0) = f(x), x ∈ X. In this case, f(0) = 0,
and we see the functional equation
f(−x + y + z + w
s) + f(
x− y + z + w
s) + f(
x + y − z + w
s) (2.4)
+f(x + y + z − w
s) = f(x) + f(y) + f(z) + f(w)
for all x, y, z, w ∈ X. It follows that fe(x) :=f(x) + f(−x)
2and fo(x) =
f(x)− f(−x)
2also satisfy the equation (2.4). Putting y = z = w := 0 in (2.4) for the even mapping fe,
we have 4fe(x
s) = fe(x), and so,
fe(−x + y + z + w) + fe(x− y + z + w) + fe(x + y − z + w) (2.5)
+fe(x + y + z − w) = 4[fe(x) + fe(y) + fe(z) + fe(w)]
for all x, y, z, w ∈ X. Thus, fe := Q is quadratic. Similarly, putting y = z = w := 0 in
(2.4) for the odd mapping fo, we have 2fo(x
s) = fo(x), and so, we get
fo(−x + y + z + w) + fo(x− y + z + w) + fo(x + y − z + w) (2.6)
+fo(x + y + z − w) = 2[fo(x) + fo(y) + fo(z) + fo(w)]
for all x, y, z, w ∈ X. Thus, we conclude that fo(x+y) = fo(x)+ fo(y), and hence, fo = A
is additive. Therefore, f(x) − f(0) = f(x) = fe(x) + fo(x) = Q(x) + A(x), where Q is
quadratic and A is additive. 2
Remark 2.2. If r = t and s 6= 2 is a rational number, and if f is a solution of the
equation (1.1), then we note that fo(x) := A(x) ≡ 0 identically, and fe(x) := Q(x) ≡ 0
identically. Hence, f(x) = f(0) must be a constant solution.
If r = t and s = 2, and if f is a solution of the equation (1.1) with f(0) = 0, then the
equation
f(−x + y + z + w
2) + f(
x− y + z + w
2) + f(
x + y − z + w
2)
+f(x + y + z − w
2) = f(x) + f(y) + f(z) + f(w), x, y, z, w ∈ X
yields
2f(x + y
2) + f(
x− y
2) + f(
−x + y
2) = f(x) + f(y),
⇔ 2f(u) + f(v) + f(−v) = f(u + v) + f(u− v),
which is well-known Drygas functional equation with general solution f(x) = Q(x) +
A(x), x ∈ X. Therefore, if r = t and s = 2, and if f is a solution of the equation (1.1),
then f(x) = Q(x) + A(x) + f(0) is a general solution of the equation.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
888 HARK-MAHN KIM ET AL 885-898
REFINED GENERAL QUADRATIC EQUATION 5
If r 6= t and s = 2, and if f is a solution of the equation (1.1), then we see that
fe(x) = 0, x ∈ X identically and fo(x) = 0, x ∈ X identically. Thus, f(x) = f(0) = 0
must be a constant solution.
We remark that if a mapping f : X → Y satisfies the equation
f(−x + y + z + w) + f(x− y + z + w) + f(x + y − z + w)
+f(x + y + z − w) = 4[f(x) + f(y) + f(z) + f(w)]
for all x, y, z, w ∈ X, then (i) f(0) = 0; (ii) f(−x) = f(x); (iii) f(x + y) + f(x − y) =
2[f(x) + f(y)] for all x, y ∈ X, and thus, f is quadratic.
3. Stability of the functional equation for even mappings.
We now prove the Hyers–Ulam stability of the functional equation for even mappings
f : X → Y with some regularity conditions. Given a mapping f : X → Y and a function
ϕ : X4 → R+ := [0,∞), we set for notational convenience
‖Df(x, y, z, w)‖ ≤ ϕ(x, y, z, w), (3.1)
Df(x, y, z, w) := rf(−x + y + z + w
s) + rf(
x− y + z + w
s) + rf(
x + y − z + w
s)
+rf(x + y + z − w
s)− [tf(x) + tf(y) + tf(z) + tf(w)]
for all x, y, z, w ∈ X. From now on, we assume that that X and Y are a normed linear
space with norm ‖ · ‖ and a Banach space with norm ‖ · ‖, respectively.
Theorem 3.1. Assume that an even mapping f : X → Y satisfies the functional inequal-
ity (3.1) and
Φ1(x, y, z, w) :=∞∑
i=0
ϕ(2ix, 2iy, 2iz, 2iw)
4i< ∞, (3.2)
(Φ2(x, y, z, w) :=
∞∑
i=1
4iϕ(x
2i,
y
2i,
z
2i,w
2i) < ∞, resp.
)
for all x, y, z, w ∈ X. Then, there exists a unique quadratic mapping Q1 : X → Y,
(Q2 : X → Y, resp.) , defined as Q1(x) = limn→∞f(2nx)
4n, x ∈ X,
(Q2(x) = lim
n→∞ 4n[f(x
2n)− f(0)], x ∈ X, resp.
)
such that
‖f(x)− f(0)−Q1(x)‖ ≤ 1
4|t| [Φ1(x, x, x, x) + Φ1(2x, 0, 0, 0)], (3.3)
(‖f(x)− f(0)−Q2(x)‖ ≤ 1
4|t| [Φ2(x, x, x, x) + Φ2(2x, 0, 0, 0)], resp.
)
for all x ∈ X.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
889 HARK-MAHN KIM ET AL 885-898
6 H. KIM AND S. LEE
Proof. First, we observe that
4 | r − t | ‖f(0)‖ ≤ ϕ(0, 0, 0, 0), (3.4)
‖4rf(2x
s)− 4tf(x)‖ ≤ ϕ(x, x, x, x), (3.5)
‖2rf(2x
s)− 2tf(x) + 2(r − t)f(0)‖ ≤ ϕ(x, x, 0, 0), (3.6)
‖4rf(x
s)− tf(x)− 3tf(0)‖ ≤ ϕ(x, 0, 0, 0) (3.7)
for all x ∈ X. By using (3.5) and (3.6), we have
‖4(r − t)f(0)‖ ≤ ϕ(x, x, x, x) + 2ϕ(x, x, 0, 0) (3.8)
for all x ∈ X. By using (3.5) and (3.7), one has
‖f(2x)− 4f(x) + 3f(0)‖ ≤ 1
|t| [ϕ(x, x, x, x) + ϕ(2x, 0, 0, 0)] (3.9)
for all x ∈ X. Let f(x)− f(0) := f(x), x ∈ X. Then one obtains from (3.9)
‖f(2x)− 4f(x)‖ ≤ 1
|t| [ϕ(x, x, x, x) + ϕ(2x, 0, 0, 0)] (3.10)
for all x ∈ X. Thus, we can prove by triangle inequality
‖ f(2nx)
4n− f(x)‖ ≤ 1
4|t|n−1∑
i=0
1
4i[ϕ(2ix, 2ix, 2ix, 2ix) + ϕ(2i+1x, 0, 0, 0)] (3.11)
for all x ∈ X. Now, it follows from the last inequality that for all nonnegative integers
n,m with n > m ≥ 0
‖ f(2nx)
4n− f(2mx)
4m‖ (3.12)
≤n−1∑
i=m
‖ f(2i+1x)
4i+1− f(2ix)
4i‖
≤ 1
4|t|n−1∑
i=m
1
4i[ϕ(2ix, 2ix, 2ix, 2ix) + ϕ(2i+1x, 0, 0, 0)]
for all x ∈ X, of which the right-hand side approaches 0 as m tends to infinity. This shows
that the sequence f(2nx)
4n is a Cauchy sequence for all x ∈ X. Since Y is complete, the
sequence f(2nx)
4n converges in Y for all x ∈ X, and so one can define a mapping
Q1 : X → Y by
Q1(x) = limn→∞
f(2nx)
4n= lim
n→∞f(2nx)
4n
for all x ∈ X.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
890 HARK-MAHN KIM ET AL 885-898
REFINED GENERAL QUADRATIC EQUATION 7
Now, it follows from (3.1) and the definition of Q1 that
‖DQ1(x, y, z, w)‖ = limn→∞
‖Df(2nx, 2ny, 2nz, 2nw)‖4n
≤ limn→∞
ϕ(2nx, 2ny, 2nz, 2nw)
4n= 0
for all x, y, z, w ∈ X. Thus, the mapping Q1 is quadratic by Lemma 2.1. Moreover, if we
let n →∞ in (3.11), we get the desired approximation (3.3).
To prove the uniqueness, let Q′
: X → Y be another quadratic mapping satisfying
(3.3). Then, we have
‖ Q1(x)−Q′(x) ‖ =
1
4n‖Q1(2
nx)−Q′(2nx)‖
≤ 1
4n
(‖Q1(2
nx)− f(2nx) + f(0)‖+ ‖f(2nx)− f(0)−Q′(2nx)‖
)
≤ 1
4n · 2|t|(Φ1(2
nx, 2nx, 2nx, 2nx) + Φ1(2n+1x, 0, 0, 0)
),
which tends to zero as n →∞ for all x ∈ X. So one can conclude that Q1(x) = Q′(x) for
all x ∈ X. This proves the uniqueness. 2
In the following, we consider another stability results of the functional equation (1.1)
by using the similar manner to the reference [7].
Theorem 3.2. Assume that an even mapping f : X → Y satisfies the functional in-
equality (3.1) and the condition (3.2). Then, there exists a unique quadratic mapping
Q1 : X → Y, (Q2 : X → Y, resp.) , defined as Q1(x) = limn→∞f(2nx)
4n, x ∈ X
(Q2(x) = lim
n→∞ 4n[f(x
2n)− (4r − t)
3tf(0)], x ∈ X, resp.)
)
such that
‖f(x)− (4r − t)
3tf(0)−Q1(x)‖ ≤ 1
4|t| [2Φ1(x, x, 0, 0) + Φ1(2x, 0, 0, 0)], (3.13)
(‖f(x)− (4r − t)
3tf(0)−Q2(x)‖ ≤ 1
4|t| [2Φ2(x, x, 0, 0) + Φ2(2x, 0, 0, 0)], resp.)
)
for all x ∈ X, where f(0) = 0 if r 6= t.
Proof. Associating (3.6) with (3.7), one has
‖f(2x)− 4f(x) +(4r − t)
tf(0)‖ ≤ 1
|t| [2ϕ(x, x, 0, 0) + ϕ(2x, 0, 0, 0)],
which yields
‖˜f(2x)
4− f(x)‖ ≤ 1
4|t| [2ϕ(x, x, 0, 0) + ϕ(2x, 0, 0, 0)], (3.14)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
891 HARK-MAHN KIM ET AL 885-898
8 H. KIM AND S. LEE
where f(x) := f(x)− (4r − t)
3tf(0), x ∈ X. It follows from (3.14) that
‖f(x)− f(2nx)
4n‖ ≤ 1
4|t|n−1∑
i=0
[2ϕ(2ix, 2ix, 0, 0) + ϕ(2i+1x, 0, 0, 0)
4i]
for all x ∈ X.
The rest of proof is similarly verified by the same argument as that of Theorem 3.1. 2
In Theorem 3.2, we remark that Q2(0) = 0 by definition if r = t, and also, Q2(0) = 0
if r 6= t because f(0) = 0 = ϕ(0, 0, 0, 0) by the convergence of Φ2(0, 0, 0, 0).
Corollary 3.3. Let δ, θ be nonnegative real numbers and p 6= 2 be a positive real number.
Assume that an even mapping f : X → Y satisfies the functional inequality
‖Df(x, y, z, w)‖ ≤ δ + θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p)
for all x, y, z, w ∈ X, where δ = 0 when p > 2. Then, there exists a unique quadratic
mapping Q : X → Y such that
‖f(x)− f(0)−Q(x)‖ ≤ 1
|t|[2δ
3+
4θ‖x‖p
|4− 2p| +2pθ‖x‖p
|4− 2p|]
for all x ∈ X, where f(0) = 0 if r 6= t and p > 2.
4. Stability of the functional equation for odd mappings.
We now prove the Hyers–Ulam stability of the functional equation for odd mappings
f : X → Y with some regularity conditions.
Theorem 4.1. Assume that an odd mapping f : X → Y satisfies the functional inequality
(3.1) and
Φ3(x, y, z, w) =∞∑
i=0
ϕ(2ix, 2iy, 2iz, 2iw)
2i< ∞ (4.1)
(Φ4(x, y, z, w) =
∞∑
i=1
2iϕ(x
2i,
y
2i,
z
2i,w
2i) < ∞, resp.
)
for all x, y, z, w ∈ X. Then, there exists a unique additive mapping A3 : X → Y,
(A4 : X → Y, resp.) , defined as A3(x) = limn→∞f(2nx)
2n, x ∈ X,
(A4(x) = lim
n→∞ 2nf(x
2n), x ∈ X, resp.
)
such that
‖f(x)− A3(x)‖ ≤ 1
4|t| [Φ3(x, x, x, x) + 2Φ3(2x, 0, 0, 0)], (4.2)
(‖f(x)− A4(x)‖ ≤ 1
4|t| [Φ4(x, x, x, x) + 2Φ4(2x, 0, 0, 0)], resp.
)
for all x ∈ X.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
892 HARK-MAHN KIM ET AL 885-898
REFINED GENERAL QUADRATIC EQUATION 9
Proof. First, we note that
‖4rf(2x
s)− 4tf(x)‖ ≤ ϕ(x, x, x, x), (4.3)
‖2rf(2x
s)− 2tf(x)‖ ≤ ϕ(x, x, 0, 0), (4.4)
‖2rf(2x
s)− tf(2x)‖ ≤ ϕ(2x, 0, 0, 0) (4.5)
for all x ∈ X. By using (4.3) and (4.5), one has
‖f(2x)− 2f(x)‖ ≤ 1
2|t| [ϕ(x, x, x, x) + 2ϕ(2x, 0, 0, 0)] (4.6)
for all x ∈ X. Thus, by using triangle inequality and (4.6), one can prove the useful
inequality
‖f(2nx)
2n− f(x)‖ ≤ 1
4|t|n−1∑
i=0
1
2i[ϕ(2ix, 2ix, 2ix, 2ix) + 2ϕ(2i+1x, 0, 0, 0)] (4.7)
for all x ∈ X.
Applying the same argument as in Theorem 3.1, one can obtain the desired results. 2
In the following, we consider another stability results of the functional equation (1.1)
by using the similar way to the reference [7].
Theorem 4.2. Assume that an odd mapping f : X → Y satisfies the functional inequality
(3.1) and the condition (4.1). Then, there exists a unique additive mapping A3 : X → Y,
(A4 : X → Y, resp.) , defined as A3(x) = limn→∞1
2nf(2nx), x ∈ X,
(A4(x) = lim
n→∞ 2nf(x
2n), x ∈ X, resp.
)
such that
‖f(x)− A3(x)‖ ≤ 1
2|t| [Φ3(x, x, 0, 0) + Φ3(2x, 0, 0, 0)], (4.8)
(‖f(x)− A4(x)‖ ≤ 1
2|t| [Φ4(x, x, 0, 0) + Φ4(2x, 0, 0, 0)], resp.
)
for all x ∈ X.
Proof. Associating (4.4) with (4.5), one has
‖f(2x)− 2f(x)‖ ≤ 1
|t| [ϕ(x, x, 0, 0) + ϕ(2x, 0, 0, 0)], (4.9)
which yields
‖f(x)− f(2nx)
2n‖ ≤ 1
2|t|n−1∑
i=0
[ϕ(2ix, 2ix, 0, 0) + ϕ(2i+1x, 0, 0, 0)
2i]
for all x ∈ X.
The rest of proof is similarly verified by the same argument as that of Theorem 4.1. 2
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
893 HARK-MAHN KIM ET AL 885-898
10 H. KIM AND S. LEE
Corollary 4.3. Let δ, θ be nonnegative real numbers and p 6= 1 be a positive real number.
Assume that an odd mapping f : X → Y satisfies the functional inequality
‖Df(x, y, z, w)‖ ≤ δ + θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p)
for all x, y, z, w ∈ X, where δ = 0 when p > 1. Then, there exists a unique additive
mapping A : X → Y such that
‖f(x)− A(x)‖ ≤ 1
|t|[3δ
2+
2θ‖x‖p
|2− 2p| +2pθ‖x‖p
|2− 2p|]
for all x ∈ X.
5. Stability of the functional equation for general mappings.
Finally, we now prove the Hyers–Ulam stability of the functional equation (1.1) for
general mappings f : X → Y with some regularity conditions.
Theorem 5.1. Assume that a mapping f : X → Y satisfies the functional inequality
(3.1) and
Φ3(x, y, z, w) :=∞∑
i=0
ϕ(2ix, 2iy, 2iz, 2iw)
2i< ∞ (5.1)
for all x, y, z, w ∈ X. Then, there exist a unique quadratic mapping Q1 : X → Y and a
unique additive mapping A3 : X → Y such that
‖f(x) + f(−x)
2− f(0)−Q1(x)‖
≤ 1
8|t| [Φ1(x, x, x, x) + Φ1(−x,−x,−x,−x) + Φ1(2x, 0, 0, 0) + Φ1(−2x, 0, 0, 0)],
‖f(x)− f(−x)
2− A3(x)‖
≤ 1
8|t| [Φ3(x, x, x, x) + Φ3(−x,−x,−x,−x) + 2Φ3(2x, 0, 0, 0) + 2Φ3(−2x, 0, 0, 0)],
‖f(x)− f(0)− A3(x)−Q1(x)‖ (5.2)
≤ 1
8|t| [Φ1(x, x, x, x) + Φ1(−x,−x,−x,−x) + Φ1(2x, 0, 0, 0) + Φ1(−2x, 0, 0, 0)
+Φ3(x, x, x, x) + Φ3(−x,−x,−x,−x) + 2Φ3(2x, 0, 0, 0) + 2Φ3(−2x, 0, 0, 0)]
for all x ∈ X.
Proof. Let fe(x) := f(x)+f(−x)2
, x ∈ X, be the even part of f and fo(x) := f(x)−f(−x)2
, x ∈X, the odd part of f . Then, it is easy to see that
‖Dfe(x, y, z, w)‖ ≤ 1
2[ϕ(x, y, z, w) + ϕ(−x,−y,−z,−w)], (5.3)
‖Dfo(x, y, z, w)‖ ≤ 1
2[ϕ(x, y, z, w) + ϕ(−x,−y,−z,−w)] (5.4)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
894 HARK-MAHN KIM ET AL 885-898
REFINED GENERAL QUADRATIC EQUATION 11
for all x, y, z, w ∈ X. Now, applying Theorem 3.1 to the functional inequality (5.3), we
see that there exists a unique quadratic mapping Q1 : X → Y, defined by Q1(x) =
limn→∞f(2nx) + f(−2nx)
4n · 2 , x ∈ X, such that
‖fe(x)− fe(0)−Q1(x)‖ (5.5)
≤ 1
8|t| [Φ1(x, x, x, x) + Φ1(−x,−x,−x,−x) + Φ1(2x, 0, 0, 0) + Φ1(−2x, 0, 0, 0)]
for all x ∈ X.
On the other hand, applying Theorem 3.1 to the functional inequality (5.4), one ob-
tains that there exists a unique additive mapping A3 : X → Y, defined by A3(x) =
limn→∞f(2nx)− f(−2nx)
2n+1, x ∈ X, such that
‖fo(x)− A3(x)‖ (5.6)
≤ 1
8|t| [Φ3(x, x, x, x) + Φ3(−x,−x,−x,−x) + 2Φ3(2x, 0, 0, 0) + 2Φ3(−2x, 0, 0, 0)]
for all x ∈ X. Hence, we lead to the desired approximation (5.2). 2
Theorem 5.2. Assume that a mapping f : X → Y satisfies the functional inequality
(3.1) and
Φ4(x, y, z, w) :=∞∑
i=1
2iϕ(x
2i,
y
2i,
z
2i,w
2i) < ∞, (5.7)
Φ1(x, y, z, w) :=∞∑
i=0
ϕ(2ix, 2iy, 2iz, 2iw)
4i< ∞
for all x, y, z, w ∈ X. Then, there exist a unique quadratic mapping Q1 : X → Y and a
unique additive mapping A4 : X → Y such that
‖f(x) + f(−x)
2− f(0)−Q1(x)‖
≤ 1
8|t| [Φ1(x, x, x, x) + Φ1(−x,−x,−x,−x) + Φ1(2x, 0, 0, 0) + Φ1(−2x, 0, 0, 0)],
‖f(x)− f(−x)
2− A4(x)‖
≤ 1
8|t| [Φ4(x, x, x, x) + Φ4(−x,−x,−x,−x) + 2Φ4(2x, 0, 0, 0) + 2Φ4(−2x, 0, 0, 0)],
‖f(x)− f(0)− A4(x)−Q1(x)‖ (5.8)
≤ 1
8|t| [Φ1(x, x, x, x) + Φ1(−x,−x,−x,−x) + Φ1(2x, 0, 0, 0) + Φ1(−2x, 0, 0, 0)
+Φ4(x, x, x, x) + Φ4(−x,−x,−x,−x) + 2Φ4(2x, 0, 0, 0) + 2Φ4(−2x, 0, 0, 0)]
for all x ∈ X, where f(0) = 0 if r 6= t.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
895 HARK-MAHN KIM ET AL 885-898
12 H. KIM AND S. LEE
Proof. Applying Theorem 3.1 to the functional inequality (5.3), we see that there exists
a unique quadratic mapping Q1 : X → Y, defined by Q1(x) = limn→∞f(2nx) + f(−2nx)
4n · 2 ,
x ∈ X, such that
‖fe(x)− fe(0)−Q1(x)‖ (5.9)
≤ 1
8|t| [Φ1(x, x, x, x) + Φ1(−x,−x,−x,−x) + Φ1(2x, 0, 0, 0) + Φ1(−2x, 0, 0, 0)]
for all x ∈ X. In particular, it follows from the convergence of the series Φ4(0, 0, 0, 0) that
0 = ϕ(0, 0, 0, 0), and so f(0) = fe(0) = 0 if r 6= t.
In turn, applying Theorem 4.1 to the inequality (5.4), one obtains that there exists a
unique additive mapping A4 : X → Y, defined by A4(x) = limn→∞ 2n
2[f(
x
2n) − f(
−x
2n)],
x ∈ X, such that
‖fo(x)− A4(x)‖ (5.10)
≤ 1
8|t| [Φ4(x, x, x, x) + Φ4(−x,−x,−x,−x) + 2Φ4(2x, 0, 0, 0) + 2Φ4(−2x, 0, 0, 0)]
for all x ∈ X. Hence, we lead to the desired approximation (5.8). 2
Theorem 5.3. Assume that a mapping f : X → Y satisfies the functional inequality
(3.1) and
Φ2(x, y, z, w) :=∞∑
i=1
4iϕ(x
2i,
y
2i,
z
2i,w
2i) < ∞ (5.11)
for all x, y, z, w ∈ X. Then, there exist a unique quadratic mapping Q2 : X → Y and a
unique additive mapping A4 : X → Y such that
‖f(x) + f(−x)
2− f(0)−Q2(x)‖
≤ 1
8|t| [Φ2(x, x, x, x) + Φ2(−x,−x,−x,−x) + Φ2(2x, 0, 0, 0) + Φ2(−2x, 0, 0, 0)],
‖f(x)− f(−x)
2− A4(x)‖
≤ 1
8|t| [Φ4(x, x, x, x) + Φ4(−x,−x,−x,−x) + 2Φ4(2x, 0, 0, 0) + 2Φ4(−2x, 0, 0, 0)],
‖f(x)− f(0)− A4(x)−Q2(x)‖ (5.12)
≤ 1
8|t| [Φ2(x, x, x, x) + Φ2(−x,−x,−x,−x) + Φ2(2x, 0, 0, 0) + Φ2(−2x, 0, 0, 0)
+Φ4(x, x, x, x) + Φ4(−x,−x,−x,−x) + 2Φ4(2x, 0, 0, 0) + 2Φ4(−2x, 0, 0, 0)]
for all x ∈ X, where f(0) = 0 if r 6= t.
Proof. Applying Theorem 3.1 to the functional inequality (5.3), we see that there exists
a unique quadratic mapping Q2 : X → Y, defined by Q2(x) = limn→∞ 4n
2[f(
x
2n)+f(
−x
2n)],
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
896 HARK-MAHN KIM ET AL 885-898
REFINED GENERAL QUADRATIC EQUATION 13
x ∈ X, such that
‖fe(x)− fe(0)−Q2(x)‖ (5.13)
≤ 1
8|t| [Φ2(x, x, x, x) + Φ2(−x,−x,−x,−x) + Φ2(2x, 0, 0, 0) + Φ2(−2x, 0, 0, 0)]
for all x ∈ X.
On the other hand, applying Theorem 4.1 to the functional inequality (5.4), one ob-
tains that there exists a unique additive mapping A4 : X → Y, defined by A4(x) =
limn→∞ 2n−1[f(x
2n)− f(
−x
2n)], x ∈ X, such that
‖fo(x)− A4(x)‖ (5.14)
≤ 1
8|t| [Φ4(x, x, x, x) + Φ4(−x,−x,−x,−x) + 2Φ4(2x, 0, 0, 0) + 2Φ4(−2x, 0, 0, 0)]
for all x ∈ X. Hence, we lead to the desired approximation (5.12). 2
Now, applying main Theorems 5.1, 5.2 and 5.3, we obtain the following corollary for
each three cases 0 < p < 1, 1 < p < 2 and p > 2 concerning the stability of equation (1.1).
Corollary 5.4. Let δ, θ be nonnegative real numbers and p 6= 1, 2 be a positive real number.
Assume that a mapping f : X → Y satisfies the functional inequality
‖Df(x, y, z, w)‖ ≤ δ + θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p)
for all x, y, z, w ∈ X, where δ = 0 when p > 1. Then, there exist a unique quadratic
mapping Q : X → Y and a unique additive mapping A : X → Y such that
‖f(x) + f(−x)
2− f(0)−Q(x)‖ ≤ 1
|t|[2δ
3+
4θ‖x‖p
|4− 2p| +2pθ‖x‖p
|4− 2p|],
‖f(x)− f(−x)
2− A(x)‖ ≤ 1
|t|[3δ
2+
2θ‖x‖p
|2− 2p| +2pθ‖x‖p
|2− 2p|],
‖f(x)− f(0)− A(x)−Q(x)‖ ≤ 1
|t|[13δ
6+
4θ‖x‖p
|4− 2p| +2pθ‖x‖p
|4− 2p| +2θ‖x‖p
|2− 2p| +2pθ‖x‖p
|2− 2p|]
for all x ∈ X, where f(0) = 0 if r 6= t and p > 2.
Acknowledgements
This research was supported by Basic Research Program through the National Research
Foundation of Korea(NRF) funded by the Ministry of Education(No. 2012R1A1A2008139).
References
[1] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan, 2(1950), 64–66.
[2] D.G. Bourgin, Classes of transformations and bordering transformations, Bull. Amer. Math. Soc.57 (1951), 223–237.
[3] P.W. Cholewa, Remarks on the shability of functional equations, Aequationes Math. 27(1984),76–86.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
897 HARK-MAHN KIM ET AL 885-898
14 H. KIM AND S. LEE
[4] S. Czerwik, On the stability of the quadratic mapping in normed spaces, Abh. Math. Sem. Univ.Hamburg, 62(1992), 59–64.
[5] P. Gavruta, A generalization of the Hyers–Ulam–Rassias stability of approximately additive map-pings, J. Math. Anal. Appl. 184 (1994), 431–436.
[6] D.H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. U.S.A. 27(1941), 222–224.
[7] H. Kim and S. Lee, Refined stability results of functional equation in four variables, to be appearedin Kyungpook Math. J.
[8] S. Lee and K. Jun, Hyers–Ulam–Rassias stability of a quadratic type functional equation, Bull.Korean Math. Soc. 40(2003), 183–193.
[9] S. Lee and C. Park, Hyers–Ulam–Rassias stability of a functional equation in three variables, J.Chungcheong Math. Soc. 16(2)(2003), 11–21.
[10] C. Park, Hyers–Ulam–Rassias stability of an even functional equation in four variables, KyungpookMath J. 44(2)(2004), 299–304.
[11] Th.M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc.72 (1978), 297–300.
[12] F. Skof, Proprieta locali e approssimazione di operatori, Rend. Sem. Mat. Fis. Milano, 53(1983),113–129.
[13] S.M. Ulam, A Collection of the Mathematical Problems, Interscience Publ. New York, 1960.
(Hark-Mahn Kim) Department of Mathematics, Chungnam National University, 79 Dae-hangno, Yuseong-gu, Daejeon 305-764, Korea
E-mail address: [email protected]
(Soon Lee) Department of Mathematics, Chungnam National University, 79 Daehangno,Yuseong-gu, Daejeon 305-764, Korea
E-mail address: [email protected]
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
898 HARK-MAHN KIM ET AL 885-898
HYERS-ULAM STABILITY OF A CLASS OF DIFFERENTIAL
EQUATIONS OF SECOND ORDER
MOHAMMAD REZA ABDOLLAHPOUR AND CHOONKIL PARK∗
Abstract. In this paper we prove the Hyers-Ulam stability of a class of differ-ential equations of second order which includes Euler differential equation andsecond order linear differential equations with constant coefficients.
1. Introduction
In 1940, Ulam [20] discussed the question concerning the stability of homomor-phisms as follows: let G1 be a group and G2 be a metric group with a metric d(·, ·).For a given ε > 0, is there a δ > 0 such that if a function h : G1 → G2 satisfies theinequality d(h(xy), h(x)h(y)) < δ for all x, y ∈ G1, then there exists a homomor-phism H : G1 → G2 with d(h(x), H(x)) < δ for all x ∈ G1? The question of Ulamwas answered by Hyers in [7] for the case both G1 and G2 are Banach spaces. See[3, 5, 6, 17, 18, 19] for the stability problems of functional equations.
Definition 1.1. Let I ⊂ R be an open interval. We say that the differential equation
an(t)y(n)(t) + an−1(t)y(n−1)(t) + · · ·+ a1(t)y′(t) + a0y(t) + h(t) = 0 (1.1)
has the Hyers-Ulam stability, if for any function f : I → R satisfying the differentialinequality
|an(t)y(n)(t) + an−1(t)y(n−1)(t) + · · ·+ a1(t)y′(t) + a0y(t) + h(t)| ≤ εfor all t ∈ I and for some ε > 0, there exists a solution g : I → R of (1.1) such that|f(t)− g(t)| ≤ K(ε) for any t ∈ I, where K(ε) is a constant depending only on ε.
The first result concerning the Hyers-Ulam stability of ordinary differential equa-tions was due to Alsina and Ger, see [2] (see also [15, 16]). In fact, their resultdealt with the Hyers-Ulam stability of linear differential equations of first order.The result of Alsina and Ger has been generalized by many mathematicians (Ref.[8, 9, 10, 12, 13]).
The Hyers-Ulam stability of second order linear differential equations has beeninvestigated in [4] and [14]. Furthermore, Abdollahpour and Najati [1] proved the
Hyers-Ulam stability of the third order differential equation y(3)(t)+αy′′(t)+βy′(t)+γy(t) = f(t).
The aim of this paper is to investigate the Hyers-Ulam stability of the differentialequation (
1
h′(x)
)2
y′′(x) +
(α
h′(x)− h′′(x)
(h′(x))3
)y′(x) + βy(x) = f(x). (1.2)
MSC(2010): 34K20, 26D10, 39B52, 39B82
Keywords: Hyers-Ulam stability, Differential equation.∗Corresponding author: [email protected] (C. Park).
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
899 CHOONKIL PARK ET AL 899-903
M. R. ABDOLLAHPOUR, C. PARK
More precisely, the problem, we will deal with the following. Let ε > 0 be fixed and[a, b] ⊂ R. h ∈ C2[a, b] be a function for which either h′(x) > 0 or h′(x) < 0 holds forall x ∈ [a, b] and let f ∈ C[a, b]. Assume that for the unknown function y ∈ C2[a, b]∣∣∣∣∣
(1
h′(x)
)2
y′′(x) +
(α
h′(x)− h′′(x)
(h′(x))3
)y′(x) + βy(x)− f(x)
∣∣∣∣∣ < ε
holds for all x ∈ [a, b]. Is it true there exist a constant K(ε) depending only on εand a solution g ∈ C2[a, b] of equation (1.2) such that for any x ∈ [a, b]
|y(x)− g(x)| ≤ ε
is satisfied?In the subsequent section we will answer affirmatively this problem.
2. Hyers-Ulam stability of the differential equation
( 1h′(x))2y′′(x) + ( α
h′(x) −h′′(x)
(h′(x))3)y′(x) + βy(x) = f(x)
Throughout this section, a and b are real numbers with −∞ < a < b < +∞.
Theorem 2.1. The differential equation(1
h′(x)
)2
y′′(x) +
(α
h′(x)− h′′(x)
(h′(x))3
)y′(x) + βy(x) = f(x)
has the Hyers-Ulam stability, where y, h ∈ C2[a, b], f ∈ C[a, b] and h′(x) > 0 (orh′(x) < 0) for all x ∈ [a, b].
Proof. Suppose that λ, µ are the (real or complex) roots of m2 + αm + β = 0 withp = <µ and q = <λ. Here < denotes the real part. Let ε > 0 and y, h ∈ C2[a, b]with ∣∣∣∣∣
(1
h′(x)
)2
y′′(x) +
(α
h′(x)− h′′(x)
(h′(x))3
)y′(x) + βy(x)− f(x)
∣∣∣∣∣ ≤ ε.Let g(x) = 1
h′(x)y′(x)− λy(x) for all x ∈ [a, b]. It is clear that∣∣∣∣ 1
h′(x)g′(x)− µg(x)− f(x)
∣∣∣∣=
∣∣∣∣∣(
1
h′(x)
)2
y′′(x) +
(α
h′(x)− h′′(x)
(h′(x))3
)y′(x) + βy(x)− f(x)
∣∣∣∣∣ ≤ ε.We define the function z : [a, b]→ R by
z(x) = eµ[h(x)−h(b)]g(b)− eµh(x)
∫ b
xh′(t)f(t)e−µh(t) dt, x ∈ [a, b].
Then
z′(x) = µh′(x)z(x) + f(x)h′(x), x ∈ [a, b]. (2.1)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
900 CHOONKIL PARK ET AL 899-903
HYERS-ULAM STABILITY OF A CLASS OF DIFFERENTIAL EQUATIONS
Also we have
|z(x)− g(x)| =∣∣∣eµ[h(x)−h(b)]g(b)− g(x)− eµh(x)
∫ b
xh′(t)f(t)e−µh(t) dt
∣∣∣=|eµh(x)|
∣∣∣e−µh(b)g(b)− e−µh(x)g(x)−∫ b
xh′(t)f(t)e−µh(t) dt
∣∣∣=eph(x)
∣∣∣∣∫ b
x[e−µh(t)g(t)]′ dt−
∫ b
xh′(t)f(t)e−µh(t) dt
∣∣∣∣=eph(x)
∣∣∣∣∫ b
xe−µh(t)[g′(t)− µh′(t)g(t)− h′(t)f(t)] dt
∣∣∣∣≤eph(x)
∫ b
x|h′(t)e−µh(t)|| 1
h′(t)g′(t)− µg(t)− f(t)| dt
≤εeph(x)
∫ b
x|h′(t)|e−ph(t) dt
for all x ∈ [a, b]. Therefore if h′(x) > 0 then
|z(x)− g(x)| ≤
1− e−p[h(b)−h(a)]
pε if p 6= 0;
(h(b)− h(a))ε if p = 0
(2.2)
for all x ∈ [a, b] and if h′(x) < 0 then
|z(x)− g(x)| ≤
e−p[h(b)−h(a)] − 1
pε if p 6= 0;
(h(a)− h(b))ε if p = 0
(2.3)
for all x ∈ [a, b].Now, we define
u(x) = y(b)eλ[h(x)−h(b)] − eλh(x)
∫ b
xh′(t)z(t)e−λh(t) dt, x ∈ [a, b].
Due to the definition of function u, we immediately obtain that u ∈ C2[a, b] and
u′(x) = λh′(x)u(x) + z(x)h′(x). (2.4)
Then
u′′(x)h′(x)− h′′(x)u′(x)
[h′(x)]2= λu′(x) + z′(x).
It follows from (2.1) and (2.4) that(1
h′(x)
)2
u′′(x) +
(α
h′(x)− h′′(x)
(h′(x))3
)u′(x) + βu(x) = f(x), x ∈ [a, b].
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
901 CHOONKIL PARK ET AL 899-903
M. R. ABDOLLAHPOUR, C. PARK
Furthermore, for the function u, the inequality
|y(x)− u(x)| =∣∣∣∣y(x)− y(b)eλ[h(x)−h(b)] + eλh(x)
∫ b
xh′(t)z(t)e−λh(t) dt
∣∣∣∣=|eλh(x)|
∣∣∣∣y(x)e−λh(x) − y(b)e−λh(b) +
∫ b
xh′(t)z(t)e−λh(t) dt
∣∣∣∣=eqh(x)
∣∣∣∣∫ b
xh′(t)z(t)e−λh(t) dt−
∫ b
x[e−λh(t)y(t)]′ dt
∣∣∣∣=eqh(x)
∣∣∣∣∫ b
xh′(t)e−λh(t)[z(t)− 1
h′(t)y′(t) + λy(t)] dt
∣∣∣∣≤eqh(x)
∫ b
x|h′(t)e−λh(t)||z(t)− g(t)| dt
=eqh(x)
∫ b
xe−qh(t)|h′(t)||z(t)− g(t)| dt
is also valid for all x ∈ [a, b]. It follows from (2.2) that
|y(x)− u(x)| ≤
[1− e−p[h(b)−h(a)]][1− e−q[h(b)−h(a)]]
pqε if p, q 6= 0;
[1− e−p[h(b)−h(a)]](h(b)− h(a))
pε if p 6= 0, q = 0;
[1− e−q[h(b)−h(a)]](h(b)− h(a))
qε if p = 0, q 6= 0;
(h(b)− h(a))2ε if p, q = 0
and (2.3) implies that
|y(x)− u(x)| ≤
[e−p[h(b)−h(a)] − 1][e−q[h(b)−h(a)] − 1]
pqε if p, q 6= 0;
[e−p[h(b)−h(a)] − 1](h(a)− h(b))
pε if p 6= 0, q = 0;
[e−q[h(b)−h(a)] − 1](h(a)− h(b))
qε if p = 0, q 6= 0;
(h(a)− h(b))2ε if p, q = 0
for all x ∈ [a, b]. This completes the proof.
In [11], Li and Shen proved that a second order differential equation with con-stant coefficients has the Hyers-Ulam stability, if its characteristic equation has twopositive roots. It is necessary to mention that our next result is more general thantheir result, because in our result, there is no restriction on roots of characteristicequation.
Corollary 2.2. The second order differential equation with constant coefficientsy′′(x) + αy′(x) + βy(x) = f(x) has the Hyers-Ulam stability.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
902 CHOONKIL PARK ET AL 899-903
HYERS-ULAM STABILITY OF A CLASS OF DIFFERENTIAL EQUATIONS
Proof. It is enough to take h(x) = x and replace α by α+ 1 in Theorem 2.1.
Corollary 2.3. If 0 < a < b or a < b < 0 then the second order Euler differentialequation x2y′′(x) + αxy′(x) + βy(x) = f(x) has the Hyers-Ulam stability.
Proof. It is enough to take h(x) = Ln(|x|) and replace α by α + 1 in Theorem2.1.
References
[1] M. R. Abdollahpour and A. Najati, Stability of linear differential equations of third order,Appl. Math. Lett. 24 (2011), 1827–1830.
[2] C. Alsina and R. Ger, On some inequalities and stability results related to the exponentialfunction, J. Inequal. Appl. 2 (1998), 373–380.
[3] M. Eshaghi Gordji and A. Bodaghi, On the stability of quadratic double centralizers on Banachalgebras, J. Comput. Anal. Appl. 13 (2011), 724–729.
[4] M. Eshaghi Gordji, Y. Cho, M. B. Ghaemi and B. Alizadeh, Stability of the exact second orderpartial differential equations, J. Inequal. Appl. 2011,Article ID 306275 (2011).
[5] M. Eshaghi Gordji, R. Farokhzad Rostami and S.A.R. Hosseinioun, Nearly higher derivationsin unital C∗-algebras, J. Comput. Anal. Appl. 13 (2011), 734–742.
[6] M. Eshaghi Gordji, G. Kim, J. Lee and C. Park, Generalized ternary bi-derivations on ternaryBanach algebras: a fixed point approach, J. Comput. Anal. Appl. 15 (2013), 45–54.
[7] D.H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. USA 27(1941), 222–224.
[8] S. Jung, Hyers-Ulam stability of linear differential equations of first order, Appl. Math. Lett.17 (2004), 1135–1140.
[9] S. Jung, Hyers-Ulam stability of linear differential equations of first order, III, J. Math. Anal.Appl. 311 (2005), 139–146.
[10] S. Jung, Hyers-Ulam stability of linear differential equations of first order, II, Appl. Math.Lett. 19 (2006), 854–858.
[11] Y. Li and Y. Shen, Hyers-Ulam stability of linear differential equations of second order, Appl.Math. Lett. 23 (2010), 306–309.
[12] T. Miura, On the Hyers-Ulam stability of a differentiable map, Sci. Math. Japon. 55 (2002),17–24.
[13] T. Miura, S. Jung and S.-E. Takahasi, Hyers-Ulam-Rassias stability of the Banach space valueddifferential equations y′ = λy, J. Korean Math. Soc. 41 (2004), 995–1005.
[14] A. Najati, M. R. Abdollahpour and Y. Cho, Superstability of linear differential equations ofsecond order, preprint.
[15] M. Ob loza, Hyers stability of the linear differential equation, Rocznik Nauk.-Dydakt. PraceMat. 13 (1993), 259–270.
[16] M. Ob loza, Connections between Hyers and Lyapunov stability of the ordinary differential equa-tions, Rocznik Nauk.-Dydakt. Prace Mat. 14 (1997), 141–146.
[17] S. Shagholi, M. Eshaghi Gordji and M. Bavand Savadkouhi, Stability of ternary quadraticderivations on ternary Banach algebras, J. Comput. Anal. Appl. 13 (2011), 1097–1105.
[18] S. Shagholi, M. Eshaghi Gordji and M. Bavand Savadkouhi, Nearly ternary cubic homomor-phisms in ternary Frechet algebras, J. Comput. Anal. Appl. 13 (2011), 1106–1114.
[19] D. Shin, C. Park and Sh. Farhadabadi, On the superstability of ternary Jordan C∗-homomorphisms, J. Comput. Anal. Appl. 16 (2014), 964–973.
[20] S.M. Ulam, A Collection of the Mathematical Problems, Interscience Publ. New York, 1960.
Mohammad Reza AbdollahpourDepartment of Mathematics and Applications, Faculty of Mathematical Sciences,
University of Mohaghegh Ardabili, Ardabil 56199-11367, IranE-mail address: [email protected], [email protected]
Choonkil ParkResearch Institute for Natural Sciences, Hanyang University, Seoul, 133-791, Ko-
reaE-mail address: [email protected]
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
903 CHOONKIL PARK ET AL 899-903
An iterative algorithm based on the hybrid
steepest descent method for strictly
pseudocontractive mappings
Jong Soo Jung
Department of Mathematics, Dong-A University, Busan 604-714, Korea
Abstract
In this paper, we consider a general iterative method based on the hybrid steepest descent method for findingfixed points of a strictly pseudocontractive mapping in a Hilbert space. Utilizing weaker control conditionsthan previous ones, we establish the strong convergence of the sequence generated by the proposed iterativemethod to a fixed point of the mapping, which is the unique solution of a certain variational inequality.
MSC: 47H09, 47H05, 47H10, 47J25, 49M05, 47J05..
Key words: Iterative algorithm; Strictly pseudocontractive mapping; Fixed points; Weakly
asymptotically regular; ρ-Lipschitzian and η-strongly monotone operator; Variational inequality
1 Introduction
Let H be a real Hilbert space with inner product 〈·, ·〉 and induced norm ‖ · ‖. Let C be anonempty closed convex subset of H and S : C → C be a self-mapping on C. We denoteby F (S) the set of fixed points of S.
The class of pseudocontractive mappings is one of the most important classes of mappingsamong nonlinear mappings. We recall that a mapping T : C → H is said to be k-strictlypseudocontractive if there exists a constant k ∈ [0, 1)such that
‖Tx− Ty‖2 ≤ ‖x− y‖2 + k‖(I − T )x− (I − T )y‖2, ∀x, y ∈ C.
Note that the class of k-strictly pseudocontractive mappings includes the class of nonex-pansive mappings as a subclass. That is, T is nonexpansive (i.e., ‖Tx − Ty‖ ≤ ‖x − y‖,∀x, y ∈ C) if and only if T is 0-strictly pseudocontractive. The mapping T is also said tobe pseudocontractive if k = 1 and T is said to be strongly pseudocontractive if there existsa constant ν ∈ (0, 1) such that T − νI is pseudocontractive. Clearly, the class of k-strictly
Email address: [email protected], [email protected] (Jong Soo Jung).
1
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
904 Jong Soo Jung 904-917
pseudocontractive mappings falls into the one between classes of nonexpansive mappingsand pseudocontractive mappings. Also we remark that the class of strongly pseudocon-tractive mappings is independent of the class of k-strictly pseudocontractive mappings (see[1]). Recently, many authors have been devoting the studies on the problems of findingfixed points for pseudocontractive mappings, see, for example, [2–7] and the referencestherein.
In 2010, by combining Yamada’s method [8] and Marino and Xu’s method [9], Tian [10]considered the following explicit iterative scheme for the nonexpansive mapping S:
xn+1 = αnγV xn + (I − αnµF )Sxn, ∀n ≥ 0, (1.1)
where F : H → H is a ρ-Lipschitzian and η-strongly monotone operator with constantsρ > 0 and η > 0 (i.e., ‖Fx−Fy‖ ≤ ρ‖x−y‖ and 〈Fx−Fy, x−y〉 ≥ η‖x−y‖2, x, y ∈ H,respectively), V : H → H is an l-Lipschitzian mapping with a constant l ≥ 0, 0 < µ < 2η
ρ2
and 0 ≤ γl < τ = µ(η − µρ2
2 ). In particular, by using control conditions (i) αn ⊂ (0, 1),limn→∞ αn = 0, (ii)
∑∞n=0 αn = ∞, (iii) either
∑∞n=0 |αn+1−αn| < ∞ or limn→∞
αn+1
αn= 1
on αn, he proved that the sequence xn generated by (1.1) converges strongly to a fixedpoint x of S, which is the unique solution of the following variational inequality related tothe operator F :
〈µF x− γV x, x− p〉 ≤ 0, ∀p ∈ F (S). (1.2)
His results improved the results of Tian [11] from the case of the contractive mapping f aconstant α ∈ (0, 1) to the case of a Lipschitzian mapping V with a constant l ≥ 0.
In 2011, Ceng et al. [12] also considered the following explicit iterative schemes for thenonexpansive mapping S:
xn+1 = PC [αnγV xn + (I − αnµF )Sxn], ∀n ≥ 0, (1.3)
where PC is the metric projection of H ont C; F : C → H is a ρ-Lipschitzian and η-stronglymonotone operator with constants ρ > 0 and η > 0; V : C → H is an l-Lipschitzianmapping with a constant l ≥ 0; 0 < µ < 2η
ρ2 and 0 ≤ γl < τ = 1 −√
1− µ(2η − µρ2). Inparticular, by using the same control conditions on αn as in Tian [11,10], they provedthat the sequence xn generated by (1.3) converges strongly to a fixed point x of S, whichis the unique solution of the variational inequality (1.2). Their results also improved theresults of Tian [11] from the case of the contractive mapping f with a constant α ∈ (0, 1)to the case of a Lipschitzian mapping V with a constant l ≥ 0, and extended the range0 < γα < τ = µ(η − µρ2
2 ) in [10, Theorem 3.1 and Theorem 3.2] to the case of range0 < γl < τ = 1−
√1− µ(2η − µρ2).
In this paper, motivated by the above-mentioned results, we consider the following explicititerative scheme for a k-strictly pseudocontractive mapping T for some 0 ≤ k < 1:
xn+1 = αnγV xn + (I − αnµF )Tnxn, ∀n ≥ 0, (1.4)
where Tn : H → H is a mapping defined by Tnx = λnx + (1 − λn)Tx, ∀x ∈ H, with0 ≤ k ≤ λn ≤ λ < 1 and limn→∞ λn = λ. By using weaker control conditions than previousones, we establish the strong convergence of the sequence generated by the proposedscheme (1.4) to a fixed point of T , which is a solution of the variational inequality (1.2),where the constraint set is F (T ). The results in this paper improve and develop thecorresponding results given in [3,4,6,9–14] and references therein.
2
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
905 Jong Soo Jung 904-917
2 Preliminaries and Lemmas
Throughout this paper, when xn is a sequence in E, xn → x (resp., xn x) will denotestrong (resp., weak) convergence of the sequence xn to x.
For every point x ∈ H, there exists a unique nearest point in C, denoted by PC(x), suchthat
‖x− PC(x)‖ ≤ ‖x− y‖, ∀y ∈ C.
PC is called the metric projection of H onto C. It is well known that PC is nonexpansiveand that for x ∈ H,
z = PCx ⇐⇒ 〈x− z, y − z〉 ≤ 0, ∀y ∈ C. (2.1)
It is also well known that H satisfies the Opial condition, that is, for any sequence xnwith xn x, the inequality
lim infn→∞ ‖xn − x‖ < lim inf
n→∞ ‖xn − y‖
holds for every y ∈ H with y 6= x.
Lemma 2.1. In a real Hilbert space H, the following inequality holds:
‖x + y‖2 ≤ ‖x‖2 + 2〈y, x + y〉, ∀x, y ∈ H.
Let LIM be a Banach limit. According to time and circumstances, we use LIMn(an)instead of LIM(a) for every a = an ∈ `∞. The following properties are well-known:
(i) for all n ≥ 1, an ≤ cn implies LIMn(an) ≤ LIMn(cn),
(ii) LIMn(an+N ) = LIMn(an) for any fixed positive integer N ,
(iii) lim infn→∞ an ≤ LIMn(an) ≤ lim supn→∞ an for all an ∈ l∞.
The following lemma was given in [15].
Lemma 2.2. Let a ∈ R be a real number and a sequence an ∈ l∞ satisfy the con-dition LIMn(an) ≤ a for all Banach limit LIM . If lim supn→∞(an+1 − an) ≤ 0, thenlim supn→∞ an ≤ a.
We also need the following lemmas for the proof of our main results.
Lemma 2.3 ([16]). Let sn be a sequence of non-negative real numbers satisfying
sn+1 ≤ (1− βn)sn + βnδn + rn, ∀n ≥ 0,
where βn, δn and rn satisfy the following conditions:
3
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
906 Jong Soo Jung 904-917
(i) βn ⊂ [0, 1] and∑∞
n=0 βn = ∞,
(ii) lim supn→∞ δn ≤ 0 or∑∞
n=0 βn|δn| < ∞,
(iii) rn ≥ 0 (n ≥ 0),∑∞
n=0 rn < ∞.
Then limn→∞ sn = 0.
Lemma 2.4 ([17]). Let H be a Hilbert space and let C be a closed convex subset of H.Let T : C → H be a k-strictly pseudocontractive mapping on C. Then the following hold:
(i) The fixed point set F (T ) is closed convex, so that the projection PF (T ) is well defined.
(ii) F (PCT ) = F (T ).
(iii) If we define a mapping S : C → H by Sx = λx + (1 − λ)Tx for all x ∈ C. then, asλ ∈ [k, 1), S is a nonexpansive mapping such that F (T ) = F (S).
The following lemmas can be easily proven, and therefore, we omit the proofs (see [5,8]).
Lemma 2.5. Let H be a real Hilbert space. Let V : H → H be an l-Lipschitzian mappingwith a constant l ≥ 0, and F : H → H be a ρ-Lipschitzian and η-strongly monotoneoperator with constants ρ > 0 and η > 0. Then for 0 ≤ γl < µη,
〈(µF − γV )x− (µF − γV )y, x− y〉 ≥ (µη − γl)‖x− y‖2, ∀x, y ∈ C.
That is, µF − γV is strongly monotone with a constant µη − γl.
Lemma 2.6. Let H be a real Hilbert space H. Let F : H → H be a ρ-Lipschitzian andη-strongly monotone operator with constants ρ > 0 and η > 0. Let 0 < µ < 2η
ρ2 and0 < t < ς ≤ 1. Then S := ςI − tµF : H → H is a contractive mapping with a constantς − tτ , where τ = 1−
√1− µ(2η − µρ2).
Finally, we recall that the sequence xn in H is said to be weakly asymptotically regularif
w − limn→∞(xn+1 − xn) = 0, that is, xn+1 − xn 0
and asymptotically regular iflim
n→∞ ‖xn+1 − xn‖ = 0,
respectively.
3 Main results
Throughout the rest of this paper, we always assume as follows: Let H be a real Hilbertspace. Let T : H → H be a k-strictly pseudocontractive mapping with F (T ) 6= ∅ forsome 0 ≤ k < 1, let F : H → H be a ρ-Lipschitzain and η-strongly monotone operator
4
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
907 Jong Soo Jung 904-917
with constants ρ > 0 and η > 0, and let V : H → H be an l-Lipschitzian mapping witha constant l ≥ 0. Let 0 < µ < 2η
ρ2 and 0 < γl < τ , where τ = 1 −√
1− µ(2η − µρ2).Let Tn : H → H be a mapping defined by Tnx = λnx + (1 − λn)Tx, ∀x ∈ H, where0 ≤ k ≤ λn ≤ λ < 1 and limn→∞ λn = λ. By Lemma 2.4, Tn is nonexpansive.
In this section, we consider the following explicit scheme which generates a sequence in anexplicit way:
xn+1 = αnγV xn + (I − αnµF )Tnxn, ∀n ≥ 0, (3.1)
where αn ⊂ (0, 1) and x0 ∈ H is an arbitrary initial guess, and establish strong con-vergence of this sequence to a fixed point x of T , which is the unique solution of thevariational inequality:
〈(µF − γV )x, x− p〉 ≤ 0, ∀p ∈ F (T ). (3.2)
First, we consider the following scheme that generates a net xtt∈(0,1) in an implicit way:
xt = tγV xt + (I − tµF )Ttxt, (3.3)
where Ttx = λtx + (1− λt)Tx, ∀x ∈ H, with 0 ≤ k ≤ λt ≤ λ < 1 and limt→0 λt = λ.
Indeed, for t ∈ (0, 1), consider a mapping Qt : H → H defined by
Qtx = tγV x + (I − tµF )Ttx, ∀x ∈ H.
It is easy to see that Qt is a contractive mapping with constant 1− t(τ − γl). Indeed, byLemma 2.6, we have
‖Qtx−Qty‖ ≤ tγ‖V x− V y‖+ ‖(I − tµF )Ttx− (I − tµF )Tty‖≤ tγl‖x− y‖+ (1− tτ)‖x− y‖= (1− t(τ − γl))‖x− y‖.
Hence Qt has a unique fixed point, denoted xt, which uniquely solves the fixed pointequation (3.3).
By utilizing the same method as in [10,12], we obtain the following theorem for strongconvergence of the net xt as t → 0, which guarantees the existence of solutions of thevariational inequality (3.2).
Theorem 3.1. The net xt defined via (3.3) converges strongly to a fixed point x of T ast → 0, which solves the variational inequality (3.2), equivalently, we have PF (T )(I − µF +γV )x) = x.
Proof. We first show the uniqueness of a solution of the variational inequality (3.2),which is indeed a consequence of the strong monotonicity of µF −γV . In fact, noting that0 ≤ γl < τ and µη ≥ τ ⇐⇒ ρ ≥ η, it follows from Lemma 2.5 that
〈(µF − γV )x− (µF − γV )y, x− y〉 ≥ (µη − γl)‖x− y‖2.
5
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
908 Jong Soo Jung 904-917
That is, µF − γV is strongly monotone for 0 ≤ γl < τ ≤ µη. Suppose that x ∈ F (T ) andx ∈ F (T ) both are solutions to (3.2). Then we have
〈(µF − γV )x, x− x〉 ≤ 0 (3.4)
and〈(µF − γV )x, x− x〉 ≤ 0. (3.5)
Adding up (3.4) and (3.5) yields
〈(µF − γV )x− (µF − γV )x, x− x〉 ≤ 0.
The strong monotonicity of µF − γV implies that x = x and the uniqueness is proved.
Next, we prove that xt → x as t → 0. Observing F (T ) = F (Tt) by Lemma 2.4, from (3.3),we write, for given p ∈ F (T ),
xt − p = t(γV xt − µFp) + (I − tµF )Ttxt − (I − tµF )p
to derive that
‖xt − p‖2 = t〈γV xt − µFp, xt − p〉+ 〈(I − tµF )Ttxt − (I − tµF )Ttp, xt − p〉≤ (1− tτ)‖xt − p‖2 + t〈γV xt − µFp, xt − p〉.
It follows that‖xt − p‖2 ≤ 1
τ〈γV xt − µFp, xt − p〉
≤ 1τ[γl‖xt − p‖2 + 〈γV p− µFp, xt − p〉].
Therefore‖xt − p‖2 ≤ 1
τ − γl〈γV p− µFp, xt − p〉. (3.6)
From (3.6), it follows that
‖xt − p‖ ≤ 1τ − γl
‖γV p− µFp‖,
and so xt, V xt, Txt, Ttxt, Fxt and FTtxt are bounded. As a consequence,it follows that
limt→0
‖(I − Tt)xt‖ = limt→0
t‖γV xt − µFTtxt‖ = 0. (3.7)
Since xt is bounded as t → 0, we show that if tn is a subsequence in (0,1) suchthat tn → 0 and xtn x∗, then x∗ ∈ F (T ). To this end, define S : H → H by Sx =λx + (1− λ)Tx, ∀x ∈ H. Then S is nonexpansive with F (S) = F (T ) by Lema 2.4. Noticethat
‖Sxtn − xtn‖ ≤ ‖Sxtn − Ttnxtn‖+ ‖Ttnxtn − xtn‖≤ |λ− λtn |‖xtn − Txtn‖+ ‖xtn − Ttnxtn‖.
By (3.7) and λtn → λ, we have
limn→∞ ‖Sxtn − xtn‖ = 0.
6
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
909 Jong Soo Jung 904-917
Hence, if x∗ 6= Sx∗, then, by Opial condition, we have
lim infn→∞ ‖xtn − x∗‖ < lim inf
n→∞ ‖xtn − Sx∗‖≤ lim inf
n→∞ (‖xtn − Sxtn‖+ ‖Sxtn − Sx∗‖)≤ lim inf
n→∞ ‖xtn − x∗‖,
which is a contradiction. So x∗ ∈ F (S) = F (T ). Thus, by replacing p with x∗ in (3.6), weget xtn → x∗.
Finally, we prove that x∗ is a solution of the variational inequality (3.2). Since
xt = tγV xt + (I − tµF )Ttxt,
we have(µF − γV )xt = −1
t(I − Tt)xt + µ(Fxt − FTtxt).
From Ttp = p for p ∈ F (T ), it follows that
〈(µF − γV )xt, xt − p〉 = − 1t〈(I − Tt)xt − (I − Tt)p, xt − p〉
+ µ〈Fxt − FTtxt, xt − p〉≤ µ〈Fxt − FTtxt, xt − p〉
(3.8)
since I − Tt is monotone (i.e., 〈x − y, (I − Tt)x − (I − Tt)y〉 ≥ 0, x, y ∈ H, which isdue to the nonexpansivity of Tt). Now replacing t in (3.8) with tn and noticing thatFxtn − FTtnxtn → Fx∗ − Fx∗ = 0 as n →∞ for x∗ ∈ F (T ), we obtain
〈(µF − γV )x∗, x∗ − p〉 ≤ 0.
That is, x∗ ∈ F (T ) is a solution of the variational inequality (3.2); hence x∗ = x byuniqueness. In a summary, we have shown that each cluster point of xt (at t → 0)equals x. Therefore, xt → x as t → 0.
The variational inequality (3.2) can be rewritten as
〈(I − µF + γV )x− x, x− p〉 ≥ 0, ∀p ∈ F (T ).
By reminding Lemma 2.4 and (2.1), this is equivalent to the fixed point equation
PF (T )(I − µF + γV )x) = x. ¤
Remark 3.1. 1) Theorem 3.1 improves the case of the nonexpansive mapping S in The-orem 3.1 of Tian [10] (and Ceng et al. [12]) to the case of the k-strictly pseudocontractivemapping T .
2) Theorem 3.1 includes the corresponding results of Tian [11], Marino and Xu [9], Moudafi[13] and Xu [14] as some special cases.
First of all, we give the following result in order to establish strong convergence of thesequence generated by the explicit scheme (3.1).
Theorem 3.2. Let xn be the sequence generated iteratively by the scheme (3.1) and letLIM be a Banach limit. If αn satisfies the following condition:
7
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
910 Jong Soo Jung 904-917
(C1) αn ⊂ (0, 1) and limn→∞ αn = 0,
thenLIMn(〈µF x− γV x, x− xn〉) ≤ 0,
where x = limt→0+ xt with xt being defined by
xt = tγV xt + (I − tµF )Sxt, (3.9)
and Sx = λx + (1− λ)Tx, ∀x ∈ H, with 0 ≤ k ≤ λ < 1.
Proof. First, note that from the condition (C1), without loss of generality, we assumethat αnτ < 1 for all n ≥ 0.
Let xt be the net generated by (3.9). By Theorem 3.1 with λt = λ for t ∈ (0, 1) andLemma 2.4, there exists limt→0 xt ∈ F (T ). Denote it by x. Moreover x is the uniquesolution of the variational inequality (3.2). By (3.9), we have
‖xt − xn+1‖ = ‖tγV xt + (I − tµF )Sxt − xn+1‖= ‖(I − tµF )Sxt − (I − tµF )xn+1 + t(γV xt − µFxn+1)‖.
Applying Lemma 2.1 and Lemma 2.6, we have
‖xt − xn+1‖2 ≤ (1− tτ)2‖Sxt − xn+1‖2 + 2t〈γV xt − µFxn+1, xt − xn+1〉. (3.10)
From the proof of Theorem 3.1, we know that xt, V xt, Txt, Sxt, FSxt andFxt are bounded.
Now we show that ‖xn − p‖ ≤ max‖x0 − p‖, ‖µFp−γV p‖τ−γl for all n ≥ 0 and all p ∈ F (T ).
Indeed, let p ∈ F (T ). Noticing p = Tnp, we have
‖xn+1 − p‖ = ‖αn(γV xn − µFp) + (I − αnµF )Tnxn − (I − αnµF )Tnp‖≤ (1− αnτ)‖xn − p‖+ αn‖γV xn − µFp‖≤ (1− αnτ)‖xn − p‖+ αn(‖γV xn − γV p‖+ ‖γV p− µFp‖)≤ [1− (τ − γl)αn]‖xn − p‖+ (τ − γl)αn
‖γV p− µFp‖τ − γl
≤ max‖xn − p‖, ‖γV p− µFp‖
τ − γl
.
Using an induction, we have ‖xn−p‖ ≤ max‖x0−p‖, ‖γV p−µFp‖τ−γl . Hence xn is bounded,
and so are V xn, Txn Tnxn, FTnxn, and Fxn. As a consequence of condition(C1), we get
‖xn+1 − Tnxn‖ = αn‖γV xn − µFTnxn‖ → 0 (n →∞).
From definitions of S and Tn with limn→∞ λn = λ, we deduce
‖Sxt − xn+1‖ ≤ ‖Sxt − Sxn‖+ ‖Sxn − Tnxn‖+ ‖Tnxn − xn+1‖≤ ‖xt − xn‖+ |λ− λn|‖xn − Txn‖+ ‖Tnxn − xn+1‖≤ ‖xt − xn‖+ |λ− λn|K1 + ‖Tnxn − xn+1‖= ‖xt − xn‖+ en,
,
8
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
911 Jong Soo Jung 904-917
where K1 = sup‖xn − Txn‖ : n ≥ 0 and en = |λ − λn|K1 + ‖xn+1 − Tnxn‖ → 0 asn →∞. Also observing that F is η-strongly monotone, we have
〈µFxt − µFxn, xt − xn〉 ≥ µη‖xt − xn‖2 ≥ τ‖xt − xn‖2. (3.11)
So, by combining (3.10) and (3.11), we obtain
‖xt − xn+1‖2 ≤ (1− tτ)2(‖xt − xn‖+ en)2
+ 2t〈γV xt − µFxt, xt − xn+1〉+ 2t〈µFxt − µFxn+1, xt − xn+1〉≤ (t2τ − 2t)τ‖xt − xn‖2 + ‖xt − xn‖2
+ (1− tτ)2en(2‖xt − xn‖+ en)+ 2t〈γV xt − µFxt, xt − xn+1〉+ 2t〈µFxt − µFxn+1, xt − xn+1〉
≤ (t2τ − 2t)〈µFxt − µFxn, xt − xn〉+ ‖xt − xn‖2
+ en(K2 + en) + 2t〈γV xt − µFxt, xt − xn+1〉+ 2t〈µFxt − µFxn+1, xt − xn+1〉
= t2τ〈µFxt − µFxn, xt − xn〉+ ‖xt − xn‖2
+ en(K2 + en) + 2t〈γV xt − µFxt, xt − xn+1〉+ 2t(〈µFxt − µFxn+1, xt − xn+1〉 − 〈µFxt − µFxn, xt − xn〉),
(3.12)
where K2 = sup2‖xt−xn‖ : t, n ≥ 0. Applying the Banach limit LIM to (3.12) togetherwith limn→∞ en = 0, we have
LIMn(‖xt − xn+1‖2) ≤ t2τLIMn(〈µFxt − µFxn, xt − xn〉) + LIMn(‖xt − xn‖2)+ 2tLIMn(〈γV xt − µFxt, xt − xn+1〉)+ 2t[LIMn(〈µFxt − µFxn+1, xt − xn+1〉)
− LIMn(〈µFxt − µFxn, xt − xn〉)].
(3.13)
Using the property LIMn(an) = LIMn(an+1) of Banach limit in (3.12), we obtain
LIMn(〈µFxt − γV xt, xt − xn〉) = LIMn(〈µFxt − γV xt, xt − xn+1〉)≤ tτ
2LIMn(〈µFxt − µFxn, xt − xn〉)
+12t
[LIMn(‖xt − xn‖2)− LIMn(‖xt − xn‖2)]
+ [LIMn(〈µFxt − µFxn, xt − xn〉)− LIMn(〈µFxt − µFxn, xt − xn〉)]=
tτ
2LIMn(〈µFxt − µFxn, xt − xn〉).
(3.14)
Since
t〈µFxt − µFxn, xt − xn〉 ≤ tµρ‖xt − xn‖2
≤ tµρ(‖xt − p‖+ ‖p− xn‖)2
≤ tµρ
(‖γV p− µFp‖τ − γl
+ ‖x0 − p‖)2
→ 0 (as t → 0),
(3.15)
we conclude from (3.14) and (3.15) that
LIMn(〈µF x− γV x, x− xn)〉) ≤ lim supt→0
LIMn(〈µFxt − γV xt, xt − xn〉)
≤ lim supt→0
tτ
2LIMn(〈µFxt − µFxn, xt − xn〉) ≤ 0.
9
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
912 Jong Soo Jung 904-917
This completes the proof. ¤
Now, using Theorem 3.2, we establish strong convergence of the sequence generated by theexplicit scheme (3.1) to a fixed point x of T , which is the unique solution of the variationalinequality (3.2).
Theorem 3.3. Let xn be the sequence generated iteratively by the scheme (3.1), whereαn satisfies the following conditions:
(C1) αn ⊂ (0, 1) and limn→∞ αn = 0.
(C2)∑∞
n=0 αn = ∞.
If xn is weakly asymptotically regular, then xn converges strongly to x ∈ F (T ), whereis the unique solution of the variational inequality (3.2).
Proof. First, note that from the condition (C1), without loss of generality, we assumethat αnτ < 1 and 2αn(τ−γl)
1−αnγl < 1 for all n ≥ 0.
Let xt be defined by (3.9), that is, xt = tγV xt + (I − tµF )Sxt for 0 < t < 1, whereSx = λx+(1−λ)Tx, ∀x ∈ H, with 0 ≤ k ≤ λ < 1, and let limt→0 xt := x ∈ F (S) = F (T )(by using Theorem 3.1 and Lemma 2.4). Then x is the unique solution of the variationalinequality (3.2).
We divides the proof several steps:
Step 1. We see that ‖xn−p‖ ≤ max‖x0−p‖, ‖γV p−µFp‖
τ−γl
for all n ≥ 0 and all p ∈ F (T )
as in the proof of Theorem 3.2. Hence xn is bounded and so are Tnxn, FTnxn andV xn.
Step 2. We show that lim supn→∞〈µF x− γV x, x− xn〉 ≤ 0. To this end, put
an := 〈µF x− γV x, x− xn)〉, ∀n ≥ 0.
Then Theorem 3.2 implies that LIMn(an) ≤ 0 for any Banach limit LIM . Since xn isbounded, there exists a subsequence xnj of xn such that
lim supn→∞
(an+1 − an) = limj→∞
(anj+1 − anj )
and xnj v ∈ H. This implies that xnj+1 v since xn is weakly asymptoticallyregular. Therefore, we have
w − limj→∞
(x− xnj+1) = w − limj→∞
(x− xnj ) = (x− v),
and so
lim supn→∞
(an+1 − an) = limj→∞
〈µF x− γV x, (x− xnj+1)− (x− xnj )〉 = 0.
10
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
913 Jong Soo Jung 904-917
Then Lemma 2.2 implies that lim supn→∞ an ≤ 0, that is,
lim supn→∞
〈µF x− γV x, x− xn)〉 ≤ 0.
Step 3. We show that limn→∞ ‖xn − x‖ = 0. By using (3.1), we have
xn+1 − x = αn(γV xn − µF x) + (I − αnµF )Tnxn − (I − αnµF )x.
Applying Lemma 2.1 and Lemma 2.6, we obtain
‖xn+1 − x‖2 = ‖(I − αnµF )Tnxn − (I − αnµF )x + αn(γV xn − µF x)‖2
≤ ‖(I − αnµF )Tnxn − (I − αnµF )Tnx‖2
+ 2αn〈γV xn − µF x, xn+1 − x〉≤ (1− αnτ)2‖xn − x‖2 + 2αn〈γV xn − γV x, xn+1 − x〉
+ 2αn〈γV x− µF x, xn+1 − x〉≤ (1− αnτ)2‖xn − x‖2 + αnγl(‖xn − x‖2 + ‖xn+1 − x‖2)
+ 2αn〈γV x− µF x, xn+1 − x〉.
(3.15)
It then follows from (3.15) that
‖xn+1 − x‖2 ≤ (1− αnτ)2 + αnγl
1− αnγl‖xn − x‖2 +
2αn
1− αnγl〈γV x− µF x, xn+1 − x〉
≤(
1− 2αn(τ − γl)1− αnγl
)‖xn − x‖2
+2αn(τ − γl)1− αnγl
(1
τ − γl〈γV x− µF x, xn+1 − x〉+
αnτ2
2(τ − γl)K3
),
(3.16)
where K3 = sup‖xn − x‖2 : n ≥ 0. Put
βn =2αn(τ − γl)1− αnγl
and δn =1
τ − γl〈µF x− γV x, x− xn+1〉+
αnτ2
2(τ − γl)K3.
From (C1), (C2) and Step 2, it follows that βn → 0,∑∞
n=0 βn = ∞ and lim supn→∞ δn ≤ 0.Since (3.16) reduces to
‖xn+1 − x‖2 ≤ (1− βn)‖xn − x‖2 + βnδn,
from Lemma 2.3 with rn = 0, we conclude that limn→∞ ‖xn − x‖ = 0. This completes theproof. ¤
Corollary 3.1. Let xn be the sequence generated iteratively by the scheme (3.1), whereαn satisfies the following conditions:
(C1) αn ⊂ (0, 1) and limn→∞ αn = 0.
(C2)∑∞
n=0 αn = ∞.
11
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
914 Jong Soo Jung 904-917
If xn is asymptotically regular, then xn converges strongly to x ∈ F (T ), where is theunique solution of the variational inequality (3.2).
Remark 3.2. If αn and λn in Corollary 3.1 satisfy conditions (C1), (C2),
(C3)∑∞
n=0 |αn+1 − αn| < ∞; or
(C4) limn→∞ αnαn+1
= 1 or, equivalently, limn→∞αn−αn+1
αn+1= 0; or,
(C5) |αn+1 − αn| ≤ o(αn+1) + σn,∑∞
n=0 σn < ∞ (the perturbed control condition); and
(C6)∑∞
n=0 |λn+1 − λn| < ∞,
then the sequence xn generated by (3.1) is asymptotically regular. Now we give only theproof in case when αn satisfies the conditions (C1), (C2), (C5) and (C6). By Step 1 inthe proof of Theorem 3.3, there exists a constant K4 > 0 such that for all n ≥ 0,
µ‖FTnxn‖+ γ‖V xn‖ ≤ K4.
Next, we notice that
‖Tnxn − Tn−1xn−1‖ ≤ ‖Tnxn − Tnxn−1‖+ ‖Tnxn−1 − Tn−1xn−1‖≤ ‖xn − xn−1‖+ |λn − λn−1|‖xn−1 − Txn−1‖≤ ‖xn − xn−1‖+ |λn − λn−1|K5,
where K5 = sup‖xn − Txn‖ : n ≥ 0. So, we obtain, for all n ≥ 0,
‖xn+1 − xn‖= ‖(I − αnµF )Tnxn − (I − αnµF )Tn−1xn−1 + µ(αn − αn−1)FTn−1xn−1
+ γ[αn(V xn − V xn−1) + V xn−1(αn − αn−1)]‖≤ (1− αnτ)‖Tnxn − Tn−1xn−1‖+ µ|αn − αn−1|‖FTn−1xn−1‖
+ γ[αn[l‖xn − xn−1‖+ ‖V xn−1‖|αn − αn−1]≤ (1− αn(τ − γl))‖xn − xn−1‖+ |λn − λn−1|K5 + |αn − αn−1|K4
≤ (1− αn(τ − γl))‖xn − xn−1‖+ |λn − λn−1|K5 + (o(αn) + σn−1)K4.
(3.17)
By taking sn+1 = ‖xn+1 − xn‖, βn = αn(τ − γl), βnδn = o(αn)K4 and rn = σn−1K4 +|λn − λn−1|K5, from (3.17) we have
sn+1 ≤ (1− βn)sn + βnδn + rn.
Hence, by (C1), (C2), (C5), (C6) and Lemma 2.3, we obtain
limn→∞ ‖xn+1 − xn‖ = 0.
In view of this observation, we have the following:
Corollary 3.2. Let xn be the sequence generated iteratively by the scheme (3.1), whereαn and λn satisfy the conditions (C1), (C2), (C5) and (C6) (or the conditions (C1),(C2), (C3) and (C6), or the conditions (C1), (C2), (C4) and (C6)). Then xn convergesstrongly to x ∈ F (T ), where is the unique solution of the variational inequality (3.2).
Remark 3.3. 1) Theorem 3.3 extends Theorem 3.2 of Tian [10] and Ceng et al. [12] inthe following ways:
12
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
915 Jong Soo Jung 904-917
(a) The nonexpansive mapping S in [10, 12, Theorem 3.2] is extended to the case of ak-strictly pseudocontractive mapping T .
(b) The condition∑∞
n=0 |αn+1−αn| < ∞ in [10, 12, Theorem 3.2] is relaxed to the weakasymptotic regularity on xn.
2) Theorem 3.3 also generalizes the corresponding results of Cho et al. [3], Jung [6] andMarino and Xu [9] in following aspects:
(a) A strongly positive bounded linear operator A in [3,6,9] is extended to the case ofa ρ-Lipschitzian and η-strongly monotone operator F . (In fact, from the definitions,it follows that a strongly positive bounded linear operator A (i.e., there exists aconstant γ > 0 with the property: 〈Ax, x〉 ≥ γ‖x‖2, x ∈ H) is a ‖A‖-Lipschitzianand γ-strongly monotone operator).
(b) The contractive mapping f with a constant α ∈ (0, 1) in [3,6,9] is extended to thecase of a Lipschizian mapping V with a constant l ≥ 0.
(c) The nonexpansive mapping S in [3,9] is extended to the case of a k-strictly pseudo-contractive mapping T .
(d) The condition∑∞
n=0 |αn+1 − αn| < ∞ in [3,9] is weakened to the weak asymptoticregularity on xn.
Acknowledgments
This research was supported by the Basic Science Research Program through the NationalResearch Foundation of Korea (NRF) funded by the Ministry of Education, Science andTechnology (2013021600).
References
[1] F. E. Browder and W. V. Petryshn, Construction of fixed points of nonlinear mappingsHilbert space, J. Math. Anal. Appl. 20 (1967) 197–228.
[2] G. L. Acedo and H. K. Xu, Iterative methods for strictly pseudo-contractions in Hilbertspace, Nonlinear Anal. 67 (2007) 2258–2271.
[3] Y. J. Cho, S. M. Kang and X. Qin, Some results on k-strictly pseudo-contractivemappings in Hilbert spaces, Nonlinear Anal. 70 (2009) 1956–1964.
[4] J. S. Jung, Strong convergence of iterative methods for k-strictly pseudo-contractivemappings in Hilbert spaces, Applied Math. Comput. 215 (2010) 3746-3753.
13
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
916 Jong Soo Jung 904-917
[5] J. S. Jung, Some results on a general iterative method for k-strictly pseudo-contractivemappings, Fixed Point Theory Appl. 2011 (2011) 24 doi:10.1186/1687-1812-2011-24.
[6] J. S. Jung, A general iterative method with some control conditions for k-strictlypseudo-contractive mappings, J. Computat. Anal. Appl. 14 (2012) no. 6, 1165–1177.
[7] C. H. Morales and J. S. Jung, Convergence of paths for pseudo-contractive mappingsin Banach spaces, Proc. Amer. math. Soc. 128 (2000) 3411–3419.
[8] I. Yamada, The hybrid steepest descent method for the variational inequality problemsover the intersection of fixed points sets of nonexpansive mappings, in: D. Butnariu, Y.Censor, S. Reich (Eds), Inherently Parallel Algorithms in Feasibility and Optimizationanf Their Applications, Elservier, New York, 2001, pp. 473–504.
[9] G. Marino and H. X. Xu, A general iterative method for nonexpansive mappings inHilbert spaces, J. Math. Anal. Appl. 318 (2006) 43–52.
[10] M. Tian, A general iterative method based on the hybrid steepest descent schemefor nonexpansive mappings in Hilbert spaces, in Proceedings of the InternationalConefrence on Computational Intelligence and Soft ware Engineering (CiSE 2010),art. no. 5677064, 2010.
[11] M. Tian, A general iterative algorithm for nonexpansive mappings in Hilbert spaces,Nonlinear Anal. 73 (2010) 689–694.
[12] L.-C, Ceng, Q. H. Ansari, J.-C. Yao, Some iterative methods for finding fixed pointsand for solving constrained convex minimization problems, Nonlinear Anal. 74 (2011)5286–5302.
[13] A. Moudafi, Viscosity approximation methods for fixed-points problems, J. Math.Anal. Appl. 241 (2000) 46–55.
[14] H. K. Xu, Viscosity approximation methods for nonexpansive mappings, J. Math.Anal. Appl. 298 (2004) 279–291.
[15] N. Shioji and W. Takahashi, Strong convergence of approximated sequences fornonexpansive mappings in Banach spaces, Proc. Amer. Math. Soc. 125 (1997), no. 12,3641–3645.
[16] H. K. Xu, Iterative algorithms for nonlinear operators, J. London Math. Soc. 66 (2002)240–256.
[17] H. Zhou, Convergence theorems of fixed points for k-strict pseudo-contractions inHilbert spaces, Nonlinear Anal. 69 (2008) 456–462.
14
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
917 Jong Soo Jung 904-917
BE-ALGEBRAS WITH ORDER REVERSING INVOLUTION
SUN SHIN AHN AND YOUNG HEE KIM∗ AND JUNG HEE PARK
Abstract. The notions of a filter’s radical and extended filter are introduced in BE-algebras.
Then some properties of filter’s radical and extended filter are obtained. Using a special set
x−1 ∗ F , we give an equivalent condition for a filter to be prime.
1. Introduction
In [6], H. S. Kim and Y. H. Kim introduced the notion of a BE-algebra. S. S. Ahn and K. S.
So [4, 5] introduced the notion of ideals in BE-algebras. S. S. Ahn et al. [2] fuzzified the concept
of BE-algebras and investigated some of their properties. Y. B. Jun and S. S. Ahn ([7]) provided
several degrees in defining a fuzzy filter and a fuzzy implicative filter. It was a generalization of
a fuzzy filter.
In this paper, we introduce the notions of a filter’s radical and an extended filter in BE-
algebras. Some properties of a filter’s radical and an extended filter are obtained. Using a special
set x−1 ∗ F , we obtain an equivalent condition for a filter to be a prime filter.
2. Preliminaries
An algebra (X; ∗, 1) of type (2, 0) is called a BE-algebra ([6]) if
(BE1) x ∗ x = 1 for all x ∈ X;
(BE2) x ∗ 1 = 1 for all x ∈ X;
(BE3) 1 ∗ x = x for all x ∈ X;
(BE4) x ∗ (y ∗ z) = y ∗ (x ∗ z) for all x, y, z ∈ X (exchange).
We introduce a relation “≤” on a BE-algebra X by x ≤ y if and only if x ∗ y = 1. A non-empty
subset S of a BE-algebra X is said to be a subalgebra of X if it is closed under the operation
“ ∗ ”. Note that x ∗ x = 1 for all x ∈ X. It is clear that 1 ∈ S. A BE-algebra (X; ∗, 1) is said to
be self distributive if x∗ (y ∗z) = (x∗y)∗ (x∗z) for all x, y, z ∈ X. A mapping f : X → Y of BE-
algebras is called a homomorphism if f(x ∗ y) = f(x) ∗ f(y) for any x, y ∈ X. A homomorphism
f of BE-algebras is called an epimorphism if f is onto. Note that if f is a homomorphism of
BE-algebras, then f(1) = 1.
∗ Corresponding author
2010 Mathematics Subject Classification. 06F35.
Key words and phrases. BE-algebra, filter’s radical, (prime, primary) filter.
Supported by Chungbuk National University Fund, 2013.1
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
918 SUN SHIN AHN ET AL 918-926
2 SUN SHIN AHN AND YOUNG HEE KIM∗ AND JUNG HEE PARK
Proposition 2.1([6]). Let (X; ∗, 1) be a self distributive BE-algebra. Then the following
hold: for any x, y, z ∈ X,
(i) if x ≤ y, then z ∗ x ≤ z ∗ y and y ∗ z ≤ x ∗ z,(ii) y ∗ z ≤ (z ∗ x) ∗ (y ∗ z),(iii) y ∗ z ≤ (x ∗ y) ∗ (x ∗ z).
A BE-algebra (X; ∗, 1) is said to be transitive if it satisfies Proposition 2.1(iii). If a BE-algebra
X is transitive, then Proposition 2.1(i) holds ([7]).
Definition 2.2. Let X be a BE-algebra and let ∅ = F ⊆ X of a BE-algebra X. F is called
a filter ([6]) of X if
(F1) 1 ∈ F ;
(F2) if x ∗ y, x ∈ F , then y ∈ F .
F is an implicative filter ([7]) of X if (F1) and
(F3) if x ∗ (y ∗ z) ∈ F and x ∗ y ∈ F , then x ∗ z ∈ F .
Note that every implicative filter is a filter in a BE-algebra.
Proposition 2.3. Let X be a BE-algebra and let F be a filter of X. If x ≤ y and x ∈ F for
any y ∈ F , then y ∈ F .
Definition 2.4. Let X be a BE-algebra X and ∅ = A ⊆ X. If B is the least filter containing
A in X, then B is called the filter generated by A and denoted by (A].
It is trivial to verify that
(A] = ∩B|A ⊆ B ⊆ X,B is a filter.
In what follows, (a] is denoted by (a] and [a1, a2, · · · , an, x] := a1 ∗ (a2 ∗ (· · · (an ∗ x) · · · )).Specially, [a, x]0 := x, [a, x]1 := a ∗ x, and [a, x]n := a ∗ (a ∗ (· · · ∗ (a︸ ︷︷ ︸
n
∗x) · · · )) (n ≥ 2).
Proposition 2.5([8]). Let X be a transitive BE-algebra and ∅ = A ⊆ X. Then
(A] = x ∈ X|∃a1, · · · an ∈ A, n ∈ N such that [a1, a2, · · · , an, x] = 1.
Definition 2.6([1]). Let X be a BE-algebra. X is said to be commutative if the following
identity holds
(C) (x ∗ y) ∗ y = (y ∗ x) ∗ x, i.e., x ∨ y = y ∨ x where x ∨ y = (y ∗ x) ∗ x,for all x, y ∈ X.
Theorem 2.7([1]). If (X; ∗, 1) is a commutative BE-algebra X, then it is a semilattice with
respect to ∨.
3. BE-algebra with order reversing involution
Definition 3.1. A BE-algebra (X; ∗, 1) is said to have an order reversing involution “ ′ ” if
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
919 SUN SHIN AHN ET AL 918-926
BE-ALGEBRAS WITH ORDER REVERSING INVOLUTION 3
(i) if x ≤ y, then y′ ≤ x′ and (x′)′ = x;
(ii) 0 is the smallest element of X;
(iii) x ∗ y = y′ ∗ x′
for all x, y ∈ X, where 0′ := 1.
In what follows, let X denote a BE-algebra with order reversing involution ′ unless otherwise
specified.
Proposition 3.2. Suppose that X is a transitive BE-algebra with order reversing involution′. Then the following hold:
(i) x ∗ 0 = x′;
(ii) 0 ∗ x = 1;
(iii) x ≤ y ⇔ y ∗ z ≤ x ∗ z.for any x, y, z ∈ X.
Proof. (i) By Definition 3.1(iii), we have x ∗ 0 = 0′ ∗ x′ = 1 ∗ x′ = x′.
(ii) Let x ∈ X. Using Definition 3.1(iii) and (BE2), we get 0 ∗ x = x′ ∗ 0′ = x′ ∗ 1 = 1.
(iii) By Proposition 2.1(i), x ≤ y imply y ∗ z ≤ x ∗ z. Conversely, suppose that y ∗ z ≤ x ∗ z for
all x, y, z ∈ X. By Definition 3.1(i), we have x ∗ y = y′ ∗ x′ = (y ∗ 0) ∗ (x ∗ 0) = 1, proving that
x ≤ y. Theorem 3.3. Let X be a transitive BE-algebra and let a, b, x ∈ X.
(i) If a ≥ b, then [a, x]n ≤ [b, x]n for any n ∈ N;
(ii) If n,m ∈ N with n ≥ m, then [a, x]n ≥ [a, x]m;
(iii) [a, x]n ≥ x for any n ∈ N.
Proof. These conditions are trivial when n = 0 or m = 0.
(i) We use induction on n to show [a, x]n ≤ [b, x]n. If n = 1, then a ≥ b imply [a, x]1 = a ∗ x ≤[b, x]1 = b ∗ x. For n > 1, assume that [a, x]m ≤ [b, x]m for any m < n. Then
[a, x]n = a ∗ [a, x]n−1 ≤ a ∗ [b, x]n−1 ≤ b ∗ [b, x]n−1 = [b, x]n.
(ii) Suppose that n = m+ p. Then p ≥ 0. We use induction on p to show [a, x]m+p ≥ [a, x]m. If
p = 0, then [a, x]m+p ≥ [a, x]m holds. For p > 1, assume that [a, x]m+q ≥ [a, x]m for any q < p. It
follows that
[a, x]m+p = a ∗ [a, x]m+(p−1) ≥ a ∗ [a, x]m ≥ [a, x]m.
(iii) The proof is similar to (i). Theorem 3.4. Let X be a transitive BE-algebra and let a, b ∈ X. Then
(i) (a ∨ b] ⊆ (a] ∪ (b];
(ii) if a ≤ b, then (b] ⊆ (a].
Proof. (i) For any x ∈ (a ∨ b], there exists n ∈ N+ such that [a ∨ b, x]n = 1. Since a ≤ a ∨ b
and b ≤ a ∨ b, by Theorem 3.3(i), [a ∨ b, x]n ≤ [a, x]n and [a ∨ b, x]n ≤ [b, x]n. Hence [a, x]n = 1
and [b, x]n = 1, i.e., x ∈ (a] ∩ (b]. Therefore x ∈ (a] ∩ (b]. Thus (a ∨ b] ⊆ (a] ∩ (b].
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
920 SUN SHIN AHN ET AL 918-926
4 SUN SHIN AHN AND YOUNG HEE KIM∗ AND JUNG HEE PARK
(ii) If x ∈ (b], then there exists n ∈ N+ such that [b, x]n = 1. Since a ≤ b imply [b, x]n ≤ [a, x]n,
we have [a, x]n = 1. Hence x ∈ (a].
Proposition 3.5. Let X1, X2 be BE-algebras with order reversing involution ′ and f : X1 →X2 be a homomorphism of BE-algebras. If f(0) = 0, then f(x′) = (f(x))′ for any x ∈ X.
Proof. For any x ∈ X1, we have f(x′) = f(x ∗ 0) = f(x) ∗ f(0) = f(x) ∗ 0 = (f(x))′.
Let X be a BE-algebra with an order reversing involution ′. For any x, y ∈ X, we define a
binary operation “⊕ ” as follows:
x⊕ y := x′ ∗ y.
For any a ∈ X and n ∈ N, we denote
(n+ 1)a := a⊕ (na).
Proposition 3.6. Let X be a BE-algebra with order reserving ′. Then for any a, b ∈ X and
m,n ∈ N+, we have
(i) a, b ≤ a⊕ b;
(ii) if m ≤ n, then ma ≤ na.
Proof. (i) By (BE4) and (BE2), we have b ∗ (a⊕ b) = b ∗ (a′ ∗ b) = a′ ∗ (b ∗ b) = a′ ∗ 1 = 1 and
so b ≤ a⊕ b. Since a ∗ (a⊕ b) = a ∗ (a′ ∗ b) = a ∗ (b′ ∗ (a′)′) = a ∗ (b′ ∗ a) = b′ ∗ (a ∗ a) = b′ ∗ 1 = 1,
we obtain a ≤ a⊕ b.
(ii) Using (i), we obtain na = ma⊕ (n−m)a ≥ ma. This completes the proof.
Proposition 3.7. Let X be a transitive BE-algebra with order reserving involution ′. Then,
for any a, b, c ∈ X, a ≤ b implies a⊕ c ≤ b⊕ c.
Proof. Let a ≤ b for any a, b ∈ X. By Definition 3.1(iii), we have b′ ≤ a′. Since X is transitive,
we obtain a′ ∗ c ≤ b′ ∗ c for any c ∈ X, proving that a⊕ c ≤ b⊕ c.
Let f : X1 → X2 be a homomorphism of BE-algebras with order reserving involution ′. We
define the dual kernel of f denoted by DKer f , as follows:
DKer f := x ∈ X1|f(x) = 12.
4. The filter’s radical in BE-algebras
Definition 4.1. Let J be a filter of X. A subset A := x ∈ X|∃n ∈ N such that nx ∈ J is
called a filter’s radical of J and we denote it by√J .
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
921 SUN SHIN AHN ET AL 918-926
BE-ALGEBRAS WITH ORDER REVERSING INVOLUTION 5
Example 4.2. LetX := 0, a, b, c, d, 1 be a set with 0′ = 1, a′ = c, b′ = d, c′ = a, d′ = b, 1′ = 0.
Define a binary operation ∗ as follows:
∗ 0 a b c d 1
0 1 1 1 1 1 1
a c 1 b c b 1
b d a 1 b a 1
c a a 1 1 a 1
d b 1 1 b 1 1
1 0 a b c d 1
Then (X; ∗,′ , 1, 0) is a BE-algebra with order reversing involution ′. Since 1 is a filter of X
and 2b = 1, na = a, nc = c, nd = a for all n ∈ N, we obtain√
1 = b, 1.
Theorem 4.3. Let J be a filter of a BE-algebra X. Then J ⊆√J .
Proof. Let x ∈ J . Then 1x = x ∈ J , i.e., ∃1 ∈ N such that 1x ∈ J . Hence x ∈√J . Thus
J ⊆√J .
Note that 1 ∈√J whenever J is a filter of a BE-algebra X.
Theorem 4.4. Let J1 and J2 be filters of a BE-algebra X with an order reversing involution′. Then the following hold:
(i) if J1 ⊆ J2, then√J1 ⊆
√J2;
(ii)√J1 ∩
√J2 =
√J1 ∩ J2;
(iii)√J1 ∪
√J2 ⊆
√(J1 ∪ J2];
(iv)√J1 ⊆
√(√J1].
Proof. (i) Let x ∈√J1. Then there exists n ∈ N such that nx ∈ J1 ⊆ J2. Hence x ∈
√J2.
Therefore√J1 ⊆
√J2.
(ii) Let x ∈√J1 ∩
√J2. Then there exist m,n ∈ N such that mx ∈ J1 and nx ∈ J2 and so
m,n ≤ m+n. By Proposition 3.6(ii), we have mx ≤ (m+n)x and n ≤ (m+n)x. Since mx ∈ J1and J1 is a filter of X, we get (m + n)x ∈ J1. Since nx ∈ J2 and J2 is a filter of X, we obtain
(m+ n)x ∈ J2. Hence x ∈√J1 ∩ J2. Therefore
√J1 ∩
√J2 ⊆
√J1 ∩ J2.
Since J1, J2 are filters of X, J1 ∩ J2 is a filter of X. Since J1 ∩ J2 ⊆ J1 and J1 ∩ J2 ⊆ J2, by
(i) we get√J1 ∩ J2 ⊆
√J1 and
√J1 ∩ J2 ⊆
√J2. Hence
√J1 ∩ J2 ⊆
√J1 ∩
√J2. Thus we have√
J1 ∩√J2 =
√J1 ∩ J2.
(iii) Let x ∈√J1 ∪
√J2. Then x ∈
√J1 or x ∈
√J2. Hence there exists n ∈ N such that
nx ∈ J1 or there exists m ∈ N such that mx ∈ J2. In any case, we have n ∈ N such that
nx ∈ J1 ∪ J2 ⊆ (J1 ∪ J2]. Thus x ∈√(J1 ∪ J2], i.e.,
√J1 ∪
√J2 ⊆
√(J1 ∪ J2].
(iv) It follows immediately from Theorem 4.3 and Theorem 4.4(i).
Corollary 4.5. Let J1, J2, · · · , Jn be an implicative filter of a BE-algebra X. If√J1 =
√J2 =
· · · =√Jn, then
√J1 =
√J1 ∩ · · · Jn.
Proof. Using Theorem 4.4(ii), we have√J1 =
√J1 ∩ · · · ∩
√Jn =
√J1 ∩ · · · ∩ Jn.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
922 SUN SHIN AHN ET AL 918-926
6 SUN SHIN AHN AND YOUNG HEE KIM∗ AND JUNG HEE PARK
The relations between the generated filters and their radicals are discussed as follows.
Proposition 4.6. Let X be a transitive BE-algebra and let a, b ∈ X. Then the following
hold:
(i) if a ≤ b, then√(b] ⊆
√(a];
(ii)√(a ∨ b] ⊆
√(a] ∩ (b].
Proof. (i) If a ≤ b, then using Theorem 3.4(ii) we have (b] ⊆ (a]. By Theorem 4.4(i), we have√(b] ⊆
√(a].
(ii) Since (a ∨ b] ⊆ (a] ∩ (b], by Theorem 4.4(i), we obtain√(a ∨ b] ⊆
√(a] ∩ (b].
Theorem 4.7. Let J be an implicative filter of a transitive BE-algebra X with order reversing
involution ′. Then, for any n ∈ N and for any a ∈ X, na ∈ J implies a ∈ J .
Proof. Use an induction on n. If n = 1, then it is trivial. Suppose the conclusion holds for
p < n+1 and (n+1)a ∈ J . Then a′ ∗ (a′ ∗ (n−1)a) = a′ ∗na = (n+1)a ∈ J . Since a′ ∗a′ = 1 ∈ J
and J is an implicative filter of X, we have na = a′ ∗ (n− 1)a ∈ J . By assumption, a ∈ J . Theorem 4.8. Let J be an implicative filter of a transitive BE-algebra X with order reversing
involution ′. Then J =√J .
Proof. By Theorem 4.3, J ⊆√J . Let x ∈
√J . Then there exists n ∈ N such that nx ∈ J .
Using Theorem 4.7, we have x ∈ J . Hence√J ⊆ J . Thus J =
√J .
Theorem 4.9. Let X1, X2 be BE-algebras with order reversing involution ′. Let f : X1 → X2
be a homomorphism of BE-algebras. If f(0) = 0, then for any n ∈ N, f(nx) = nf(x) for any
x ∈ X1.
Proof. We use the induction on n to prove the conclusion. If n = 1, the conclusion is trivial.
Now suppose that n > 1 and the conclusion holds for n. Then, by Proposition 3.5, we obtain
f((n+ 1)x) =f(x⊕ nx) = f(x′ ∗ nx)=f(x′) ∗ f(nx) = (f(x))′ ∗ nf(x)=f(x)⊕ nf(x) = (n+ 1)f(x),
i.e., the conclusion holds for n+ 1. Theorem 4.10. Let (X1, ∗1, ′
1, 01, 11) and (X2, ∗2, ′2, 02, 12) be BE-algebras with order revers-
ing involutions ′i. Let f : X1 → X2 be an epimorphism of BE-algebras. If J is a filter of X1 such
that DKer f ⊆ J , then f(J) is a filter of X2.
Proof. Suppose that J is a filter of X1 such that DKer f ⊆ J . Then 11 ∈ J and so 12 =
f(x) ∗2 f(x) = f(x ∗1 x) = f(11) ∈ f(J).
Assume that y∗2z ∈ f(J) and y ∈ f(J) for any y, z ∈ X2. Then there exist x,w ∈ J and v ∈ X1
such that f(x) = y ∗2 z, f(w) = y and f(v) = z. Hence f(x ∗1 (w ∗1 v)) = f(x) ∗2 (f(w ∗1 v)) =(y ∗2 z) ∗2 (f(w) ∗2 f(v)) = (y ∗2 z) ∗2 (y ∗2 z) = 12 and so x ∗1 (w ∗1 v) ∈ DKer f . Using
DKer f ⊆ J , we have x ∗1 (w ∗1 v) ∈ J . Since x ∈ J and J is a filter of X, we get w ∗1 v ∈ J .
Using w ∈ J , we obtain v ∈ J . Therefore z = f(v) ∈ f(J). Thus f(J) is a filter of X2.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
923 SUN SHIN AHN ET AL 918-926
BE-ALGEBRAS WITH ORDER REVERSING INVOLUTION 7
Proposition 4.11. Let (X1, ∗1, ′1, 01, 11) and (X2, ∗2, ′
2, 02, 12) be BE-algebras with order
reversing involutions ′i. Let f : X1 → X2 be an epimorphism of BE-algebras with f(0) = 0. If J
is a filter of X1 such that DKer f ⊆ J , then f(√J) =
√f(J).
Proof. Let J be a filter of X1 such that DKer f ⊆ J . By Theorem 4.10, f(J) is a filter of X2.
If y ∈ f(√J), then there exists x ∈
√J such that f(x) = y. Since x ∈
√J , there exists n ∈ N
such that nx ∈ J . Using Theorem 4.9, we have f(nx) = nf(x) = ny ∈ f(J). Hence y ∈√f(J).
Therefore f(√J) ⊆
√f(J).
Conversely, let y ∈√f(J). Then there exists n ∈ N such that ny ∈ f(J). Since f is an
epimorphism, there exists x ∈ X1 such that f(x) = y. Hence f(nx) = nf(x) = ny ∈ f(J) and so
there exists z ∈ J such that f(z) = f(nx). Therefore f(z∗1nx) = f(z)∗2f(nx) = f(z)∗2f(z) = 12and so z ∗ nx ∈ DKer f ⊆ J . Since z ∈ J and J is a filter of X1, we obtain nx ∈ J . Hence
x ∈√J and so y = f(x) ∈ f(
√J). Therefore
√f(J) ⊆ f(
√J). This completes the proof.
Theorem 4.12. Let (X1, ∗1, ′1, 01, 11) and (X2, ∗2, ′
2, 02, 12) be BE-algebras with order revers-
ing involutions ′i. Let f : X1 → X2 be a homomorphism of BE-algebras. If J is a filter of X2,
then f−1(J) is a filter of X1. Furthermore, if f(01) = 02, then f−1(√J) =
√f−1(J).
Proof. Let J be a filter of X2. Let x ∗1 y, x ∈ f−1(J). Then f(x ∗1 y) = f(x) ∗2 f(y) ∈ J and
f(x) ∈ J . Since J is a filter of X2, we have f(y) ∈ J and so y ∈ f−1(J). Since f(11) = 12 ∈ J ,
we obtain 11 ∈ f−1(J). Therefore f−1(J) is a filter of X1.
We assume that f(01) = 02. Let x ∈ f−1(√J). Then f(x) ∈
√J and so there exists n ∈ N
such that nf(x) = f(nx) ∈ J . Hence nx ∈ f−1(J). Therefore x ∈√
f−1(J). Thus f−1(√J) ⊆√
f−1(J).
Conversely, let x ∈√f−1(J). Then there exists n ∈ N such that nx ∈ f−1(J). Hence f(nx) =
nf(x) ∈ J and so f(x) ∈√J . Therefore x ∈ f−1(
√J). Thus
√f−1(
√J) ⊆ f−1(
√J).
5. The extended filter in BE-algebras
For any non-empty subset F of X and x ∈ X, we define
x−1 ∗ F := y ∈ X|x ∨ y ∈ F.
Note that if F is a filter of X, then 1 ∈ x−1 ∗ F .
Proposition 5.1. Let X be a transitive commutative BE-algebra. If F is a filter of X, then
x−1 ∗ F is a filter of X containing F .
Proof. Let y ∈ x−1 ∗ F and y ∗ z ∈ x−1 ∗ F . Then x ∨ y ∈ F and x ∨ (y ∗ z) ∈ F . Now
(x∨y)∗(x∨z) = ((y∗x)∗x))∗((z∗x)∗x) ≥ (z∗x)∗(y∗x) ≥ y∗z and (x∨y)∗(x∨z) ≥ x∨z ≥ x.
It follows form Theorem 2.6 that x∨ (y ∗ z) ≤ (x∨ y) ∗ (x∨ z) so that (x∨ y) ∗ (x∨ z) ∈ F . Using
the fact F is a filter of X and x ∨ y ∈ F , we get x ∨ z ∈ F , i.e., z ∈ x−1 ∗ F . Thus x−1 ∗ F is a
filter of X.
Let y ∈ F . Since y ≤ x ∨ y, it follows that x ∨ y ∈ F , i.e., y ∈ x−1 ∗ F . Hence F ⊆ x−1 ∗ F .
This completes the proof.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
924 SUN SHIN AHN ET AL 918-926
8 SUN SHIN AHN AND YOUNG HEE KIM∗ AND JUNG HEE PARK
Proposition 5.2. Let F and G be filters of a BE-algebra X. Then the following hold: for
any x, y ∈ X,
(i) x−1 ∗ F = X if and only if x ∈ F ;
(ii) F ⊆ G imply x−1 ∗ F ⊆ y−1 ∗ F ;
(iii) x−1 ∗ (F ∩G) = (x−1 ∗ F ) ∩ (x−1 ∗G) and x−1 ∗ (F ∪G) = (x−1 ∗ F ) ∪ (x−1 ∗G).
Proof. (i) Let x ∈ F . Since x ≤ (y ∗ x) ∗ x = x ∨ y, we have x ∨ y ∈ F for all y ∈ X, i.e.,
y ∈ x−1 ∗ F . Thus x−1 ∗ F = X. Conversely, assume that x−1 ∗ F = X. Then x ∨ y ∈ F for all
y ∈ X. In particular x = x ∨ x ∈ F .
(ii) Assume that F ⊆ G. If z ∈ x−1 ∗ F , then x ∨ z ∈ F ⊆ G, i.e., x ∨ z ∈ G. Hence z ∈ x−1 ∗G.
Thus x−1 ∗ F ⊆ x−1 ∗G.
(iii) For any x, z ∈ X we have
z ∈ x−1 ∗ (F ∩G) ⇔ x ∨ z ∈ F ∩G
⇔ x ∨ z ∈ F and x ∨ z ∈ G
⇔ z ∈ x−1 ∗ F and z ∈ x−1 ∗G⇔ z ∈ (x−1 ∗ F ) ∩ (x−1 ∗G)
and
z ∈ x−1 ∗ (F ∪G) ⇔ x ∨ z ∈ F ∪G
⇔ x ∨ z ∈ F or x ∨ z ∈ G
⇔ z ∈ x−1 ∗ F or z ∈ x−1 ∗G⇔ z ∈ (x−1 ∗ F ) ∪ (x−1 ∗G).
This completes the proof. Definition 5.3. A proper filter of a BE-algebra X is said to be prime if for any x, y ∈ X,
x ∨ y ∈ P implies x ∈ P or y ∈ P .
Proposition 5.4. Let P and F be filters ofX such that F ⊆ P . If P is prime, then x−1∗F ⊆ P
for all x ∈ X \ P .
Proof. Let z ∈ x−1 ∗ F for all x ∈ X \ P . Then x ∨ z ∈ F ⊆ P . Since P is prime and x /∈ P ,
we have z ∈ P , i.e., x−1 ∗ F ⊆ P . Proposition 5.5. If P is a prime filter of X, then X \ P is ∨-closed, i.e., x ∨ y ∈ X \ P
whenever x ∈ X \ P and y ∈ X \ P .
Proof. Straightforward. Theorem 5.6. Let X be a transitive commutative BE-algebra. A filter P of X is prime if
and only if x−1 ∗ P = P for all X \ P .
Proof. Suppose that P is a prime filter of X. Let x ∈ X \ P . The conclusion P ⊆ x−1 ∗ P
follows from Proposition 5.1. If y ∈ x−1 ∗ P , then x ∨ y ∈ P . Since P is a prime filter of X, we
have y ∈ P . Hence x−1 ∗ P ⊆ P . Thus x−1 ∗ P = P .
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
925 SUN SHIN AHN ET AL 918-926
BE-ALGEBRAS WITH ORDER REVERSING INVOLUTION 9
Conversely, assume that x−1 ∗ P = P for all x ∈ X \ P . Let y ∨ z ∈ P and z /∈ P . By the
hypothesis, z−1 ∗ P = P . Hence y ∈ z−1 ∗ P = P . Thus P is prime. Definition 5.7. Let P be a filter of a BE-algebra X. P is called a primary filter of X if
x ∨ y ∈ P and x /∈ P ⇒ ∃n ∈ N such that ny ∈ P, for any x, y ∈ X.
Theorem 5.8. Let X be a transitive commutative BE-algebra and let J be a filter of X. If
x−1 ∗ J = J, ∀x /∈ J , then J is a primary filter of X.
Proof. By Definition 5.7, a prime filter is a primary filter. Suppose that x−1 ∗ J = J , ∀x /∈ J .
Using Theorem 5.6, J is a prime filter of X. Hence J is a primary filter of X. Theorem 5.9. Let X be a transitive commutative BE-algebra. If J is a filter of X, then
J = ∩x∈Xx−1 ∗ J.
Proof. By Proposition 5.1, J ⊆ x−1 ∗ J for all x ∈ X. Hence J ⊆ ∩x∈Xx−1 ∗ J.
Assume that y ∈ ∩x∈Xx−1 ∗ J . Then y ∈ y−1 ∗ J and so y ∈ J . Hence ∩x∈Xx
−1 ∗ J ⊆ J . This
completes the proof.
References
[1] S. S. Ahn, Y. H. Kim and J. M. Ko, Filters in commutative BE-algebras, Commun. Korean Math. Soc. 27
(2012), 233-242.
[2] S. S. Ahn, Y. H. Kim and K. S. So, Fuzzy BE-algebras, J. Appl. Math. and Informatics 29 (2011), 1049-1057.
[3] S. S. Ahn and J. M. Ko, On vague filters in BE-algebras, Commun. Korean Math. Soc. 26 (2011), 417-425.
[4] S. S. Ahn and K. K. So, On ideals and upper sets in BE-algebras, Sci. Math. Japon. 68 (2008), 279-285.
[5] S. S. Ahn and K. K. So, On generalized upper sets in BE-algebras, Bull. Korean Math. Soc. 46 (2009),
281-287.
[6] H. S. Kim and Y. H. Kim, On BE-algebras, Sci. Math. Japon. 66 (2007), 113-116.
[7] Y. B. Jun and S. S. Ahn, Fuzzy implicative filters of BE-algebras with degrees in the interval (0, 1], J.
Computational Analsis and Applications 15(2013), 1456-1466.
[8] B. L. Meng, On filters in BE-algebras, Sci. Math. Jpn. Online (e-2010), 105-111.
Sun Shin Ahn, Department of Mathematics Education, Dongguk University, Seoul, 100-715,
Korea
E-mail address: [email protected]
Young Hee Kim, Department of Mathematics, Chungbuk National University, Chongju, 361-763,
Korea
E-mail address: [email protected]
Jung Hee Park, Department of Mathematics, Chungbuk National University, Chongju, 361-763,
Korea
E-mail address: [email protected]
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
926 SUN SHIN AHN ET AL 918-926
SYMMETRY p-ADIC INVARIANT INTEGRAL ON Zp FOR
q-EULER POLYNOMIALS
DAE SAN KIM, TAEKYUN KIM, SANG-HUN LEE AND JONG-JIN SEO
Abstract. In this paper, we investigate several further interesting propertiesof symmetry for the p-adic fermionic integral on Zp. By using this symmetry
of fermionic p-adic integral on Zp, we give some relations of symmetry betweenthe power sum q-polynomials and q-Euler polynomials.
1. Introduction
Let p be a fixed odd prime number. Throughout this paper, Zp, Qp and Cp will,respectively, denote the ring of p-adic rational integers, the field of p-adic rationalnumbers and the completion of algebraic closure of Qp.
Let vp be the normalized exponential valuation of Cp with |p|p = p−vp(p) = 1p .
When one talks of q-extension, q is variously considered as an indeterminate, acomplex number q ∈ C or p-adic number q ∈ Cp. If q ∈ C, one normally assumes|q| < 1; if q ∈ Cp, one normally assumes |1− q|p < 1. We use the notation for
q-number as [x]q = 1−qx
1−q . Note that limq→1
[x]q = x. As is well known, the Euler
polynomials are defined by the generating function to be
(1)2
et + 1ext = eE(x)t =
∞∑n=0
En (x)tn
n!,
with the usual convention about replacing En (x) by En (x) (see [1-13]).When x = 0, En = En (0) are called the Euler numbers.From (1), we note that
(E + 1)n+ En = 2δ0,n, (n ≥ 0) ,
and
En (x) =n∑
l=0
(n
l
)xn−lEl,
(see [1, 4, 7, 9]).Recently, Kim considered a q-extension of Euler polynomials (called q-Euler
polynomials) as follows :
(2) 2∞∑
m=0
(−1)me[m+x]qt =
∞∑n=0
En,q (x)tn
n!,
(see [6]).1
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
927 DAE SAN KIM ET AL 927-932
SYMMETRY p-ADIC INVARIANT INTEGRAL ON Zp FOR q-EULER POLYNOMIALS 2
From (2), we can derive
En,q (x) =2
(1− q)n
n∑l=0
(n
l
)(−1)
l
1 + qlqlx(3)
= 2∞∑
m=0
(−1)m[m+ x]
nq .
When x = 0, En,q = En,q (0) are called q-Euler numbers.By (2), we easily get
(qEq + 1)n+ En,q = 2δn,0,
with the usual convention about replacing Enq by En,q.
Let C (Zp) be the space of continuous functions on Zp.For f ∈ C (Zp), the fermionic p-adic integral on Zp is defined by Kim as follows
:
(4) I−1 (f) =
ˆZp
f (x) dµ−1 (x) = limN→∞
pN−1∑x=0
f (x) (−1)x,
(see [4, 5]).From (4), we note that
(5)
ˆZp
f (x+ n) dµ−1 (x) + (−1)n−1ˆZp
f (x) dµ−1 (x) = 2
n−1∑l=0
(−1)n−1−l
f (l) ,
whre n ∈ N (see [1, 3, 4, 5]).By (5), we get
(6)
ˆZp
e(x+y)tdµ−1 (y) =2
et + 1ext =
∞∑n=0
En (x)tn
n!.
From (6), we have
(7)
ˆZp
(x+ y)ndµ−1 (y) = En (x) , (n ≥ 0) .
In [4], some relations of symmetry between the power sum polynomials andEuler polynomials were given by (7) and finding a q-extension of symmetry p-adicinvariant integral on Zp for q-Euler polynomials was remained as an open question.
In this paper, we investigate several further interesting properties of symmetryfor the p-adic fermionic p-adic integral on Zp, and give some relations of symmetrybetween the power sum q-polynomials and q-Euler polynomials.
Recently, several authors have studied the identities of symmetry and q-extensionsof Euler polynomials (see [1-13]).
2. Identities of symmetry of the q-Euler polynomials
From (4) and (5), we can derive the following equation :
(8)
ˆZp
e[x+y]qtdµ−1 (y) = 2∞∑
m=0
(−1)me[m+x]qt.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
928 DAE SAN KIM ET AL 927-932
SYMMETRY p-ADIC INVARIANT INTEGRAL ON Zp FOR q-EULER POLYNOMIALS 3
By (2) and (8), we get
(9)∞∑
n=0
ˆZp
[x+ y]nq dµ−1 (y)
tn
n!=
∞∑n=0
En,q (x)tn
n!.
By comparing coefficients on the both sides of (9), we get
ˆZp
[x+ y]nq dµ−1 (y) = En,q (x)(10)
= 2∞∑
m=0
(−1)m[m+ x]
nq
=2
(1− q)n
n∑l=0
(n
l
)(−1)
lqlx
1
1 + ql.
Let w1, w2 ∈ N with w1 ≡ 1 (mod 2) and w2 ≡ 1 (mod 2).Then we observe that
ˆZp
e[w1]q
[w2x+
w2w1
j+y]qw1
tdµ−1 (y)(11)
=
ˆZp
e[w1w2x+w2j+w1y]qtdµ−1 (y)
= limN→∞
pN−1∑y=0
e[w1w2x+w2j+w1y]qt (−1)y
= limN→∞
w2−1∑i=0
pN−1∑y=0
e[w1w2x+w2j+w1(i+w2y)]qt (−1)i+w2y .
From (11), we note that
w1−1∑j=0
(−1)jˆZp
e[w1]q
[w2x+
w2w1
j+y]qw1
tdµ−1 (y)(12)
= limN→∞
w1−1∑j=0
w2−1∑i=0
pN−1∑y=0
(−1)i+j+y
e[w1w2(x+y)+w2j+w1i]qt.
By the same method as (12), we get
w2−1∑j=0
(−1)jˆZp
e[w2]q
[w1x+
w1w2
j+y]qw2
tdµ−1 (y)(13)
= limN→∞
w2−1∑j=0
w1−1∑i=0
pN−1∑y=0
(−1)i+j+y
e[w1w2(x+y)+w1j+w2i]qt.
Therefore, by (12) and (13), we obtain the following theorem.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
929 DAE SAN KIM ET AL 927-932
SYMMETRY p-ADIC INVARIANT INTEGRAL ON Zp FOR q-EULER POLYNOMIALS 4
Theorem 1. For w1, w2 ∈ N with w1 ≡ 1 (mod 2) and w2 ≡ 1 (mod 2), we have
w1−1∑j=0
(−1)jˆZp
e[w1]q
[w2x+
w2w1
j+y]qw1
tdµ−1 (y)
=
w2−1∑j=0
(−1)jˆZp
e[w2]q
[w1x+
w1w2
j+y]qw2
tdµ−1 (y) .
Corollary 2. For n ≥ 0, we have
[w1]nq
w1−1∑j=0
(−1)jˆZp
[w2x+
w2
w1j + y
]nqw1
dµ−1 (y)
= [w2]nq
w2−1∑j=0
(−1)jˆZp
[w1x+
w1
w2j + y
]nqw2
dµ−1 (y) .
By (9) and Corollary 2, we obtain the following theorem.
Theorem 3. For n ≥ 0 and w1, w2 ∈ N with w1 ≡ 1 (mod 2) and w2 ≡ 1 (mod 2),we have
[w1]nq
w1−1∑j=0
(−1)jEn,qw1
(w2x+
w2
w1j
)
= [w2]nq
w2−1∑j=0
(−1)jEn,qw2
(w1x+
w1
w2j
).
From (10), we note thatˆZp
[w2x+
w2
w1j + y
]nqw1
dµ−1 (y)(14)
=
n∑i=0
(n
i
)([w2]q[w1]q
)i
[j]iqw2 q
w2(n−i)j
ˆZp
[w2x+ y]n−iqw1 dµ−1 (y)
=n∑
i=0
(n
i
)([w2]q[w1]q
)i
[j]iqw2 q
w2(n−i)jEn−i,qw1 (w2x) .
Thus, by (14), we get
[w1]nq
w1−1∑j=0
(−1)jˆZp
[w2x+
w2
w1j + y
]nqw1
dµ−1 (y)(15)
=
n∑i=0
(n
i
)[w1]
n−iq [w2]
iq
w1−1∑j=0
(−1)j[j]
iqw2 q
w2(n−i)jEn−i,qw1 (w2x)
=n∑
i=0
(n
i
)[w1]
n−iq [w2]
iq Sn,i,qw2 (w1)En−i,qw1 (w2x) ,
where Sn,i,q (w1) =
w1−1∑j=0
(−1)jq(n−i)j [j]
iq .
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
930 DAE SAN KIM ET AL 927-932
SYMMETRY p-ADIC INVARIANT INTEGRAL ON Zp FOR q-EULER POLYNOMIALS 5
By the same method as (15), we get
[w2]nq
w2−1∑j=0
(−1)jˆZp
[w1x+
w1
w2j + y
]nqw2
dµ−1 (y)(16)
=n∑
i=0
(n
i
)[w1]
iq [w2]
n−iq Sn,i,qw1 (w2)En−i,qw2 (w1x) .
Therefore, by Corollary 2, (15) and (16), we obtain the following theorem.
Theorem 4. For n ≥ 0 and w1, w2 ∈ N with w1 ≡ 1 (mod 2) and w2 ≡ 1 (mod 2),we have
n∑i=0
(n
i
)[w1]
n−iq [w2]
iq En−i,qw1 (w2x)Sn,i,qw2 (w1)
=n∑
i=0
(n
i
)[w1]
iq [w2]
n−iq En−i,qw2 (w1x)Sn,i,qw1 (w2) ,
where Sn,i,q (w) =w−1∑j=0
(−1)jq(n−i)j [j]
iq.
ACKNOWLEDGEMENTS. The present Research has been conducted by theResearch Grant of Kwangwoon University in 2014 and the first author was sup-ported by the National Research Foundation of Korea(NRF) grant funded by theKorea government(MOE) (No.2012R1A1A2003786 ).
References
1. S. Araci, M. Acikgoz, and J. J. Seo, Explicit formulas involving q-Euler numbers and polyno-mials, Abstr. Appl. Anal. (2012), Art. ID 298531, 11.
2. I. N. Cangul, V. Kurt, H. Ozden, and Y. Simsek, On the higher-order w-q-Genocchi numbers,
Adv. Stud. Contemp. Math. (Kyungshang) 19 (2009), no. 1, 39–57.3. D.S. Kim, N. Lee, J. Na, and K. H. Park, Identities of symmetry for higher-order Euler
polynomials in three variables (I), Adv. Stud. Contemp. Math. (Kyungshang) 22 (2012),no. 1, 51–74.
4. T. Kim, Symmetry p-adic invariant integral on Zp for Bernoulli and Euler polynomials, J.Difference Equ. Appl. 14 (2008), no. 12, 1267–1277.
5. , Symmetry of power sum polynomials and multivariate fermionic p-adic invariantintegral on Zp, Russ. J. Math. Phys. 16 (2009), no. 1, 93–96.
6. , Barnes-type multiple q-zeta functions and q-Euler polynomials, J. Phys. A 43 (2010),no. 25, 255201, 11.
7. , An identity of the symmetry for the Frobenius-Euler polynomials associated with thefermionic p-adic invariant q-integrals on Zp, Rocky Mountain J. Math. 41 (2011), no. 1,
239–247.8. Y.-H. Kim and K.-W. Hwang, Symmetry of power sum and twisted Bernoulli polynomials,
Adv. Stud. Contemp. Math. (Kyungshang) 18 (2009), no. 2, 127–133.9. H. Ozden, Y. Simsek, S.-H. Rim, and I. N. Cangul, A note on p-adic q-Euler measure, Adv.
Stud. Contemp. Math. (Kyungshang) 14 (2007), no. 2, 233–239.10. S.-H. Rim and J. Jeong, On the modified q-Euler numbers of higher order with weight, Adv.
Stud. Contemp. Math. (Kyungshang) 22 (2012), no. 1, 93–98.
11. Y. Simsek, Identities associated with generalized Stirling type numbers and Eulerian typepolynomials, Math. Comput. Appl. 18 (2013), no. 3, 251–263.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
931 DAE SAN KIM ET AL 927-932
SYMMETRY p-ADIC INVARIANT INTEGRAL ON Zp FOR q-EULER POLYNOMIALS 6
12. , Interpolation functions of the Eulerian type polynomials and numbers, Adv. Stud.
Contemp. Math. (Kyungshang) 23 (2013), no. 2, 301–307.13. H. J. H. Tuenter, A symmetry of power sum polynomials and Bernoulli numbers, Amer. Math.
Monthly 108 (2001), no. 3, 258–261.
Department of Mathematics, Sogang University, Seoul 121-742, Re-public of Korea
E-mail address : [email protected]
Department of Mathematics, Kwangwoon University, Seoul 139-701,Republic of Korea
E-mail address : [email protected]
Division of General Education, Kwangwoon University, Seoul 139-701, Republic of Korea
E-mail address : [email protected]
Department of Applied Mathematics, Pukyong National University,Pusan, Republic of Korea
E-mail address : [email protected]
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
932 DAE SAN KIM ET AL 927-932
Barnes’ multiple Bernoulli and poly-Bernoullimixed-type polynomials
Dmitry V. DolgyInstitute of Mathematics and Computer Sciences, Far Eastern Federal University
Vladivostok, 27 Oktyabrskaya Str., Vladivostok, 690060, Russiad−[email protected]
Dae San Kim ∗
Department of Mathematics, Sogang UniversitySeoul 121-741, Republic of Korea
Taekyun Kim †
Department of Mathematics, Kwangwoon UniversitySeoul 139-701, Republic of Korea
Takao KomatsuGraduate School of Science and Technology, Hirosaki University
Hirosaki 036-8561, [email protected]
Sang-Hun LeeDivision of General Education, Kwangwoon University
Seoul 139-701, Republic of [email protected]
MR Subject Classifications: 05A15, 05A40, 11B68, 11B75, 65Q05
Abstract
∗The second author was supported by the National Research Foundation of Korea (NRF) grant fundedby the Korean government (MOE) (No.2012R1A1A2003786).
†The third author was supported by Kwangwoon University in 2014.
1
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
933 Dmitry V. Dolgy et al 933-951
In this paper, we consider Barnes’ multiple Bernoulli and poly-Bernoulli mixed-type polynomials. From the properties of Sheffer sequences of these polynomialsarising from umbral calculus, we derive new and interesting identities.
1 Introduction
In this paper, we consider the polynomials S(r,k)n (x|a1, . . . , ar) whose generating function
is given by
tr∏rj=1(e
ajt − 1)
Lik(1− e−t)
1− e−text =
∞∑n=0
S(r,k)n (x|a1, . . . , ar)
tn
n!, (1)
where r ∈ Z>0, k ∈ Z, a1, . . . , ar = 0, and
Lik(x) =∞∑
m=1
xm
mk
is the kth polylogarithm function. S(r,k)n (x|a1, . . . , ar) will be called Barnes’ multiple
Bernoulli and poly-Bernoulli mixed-type polynomials. When S(r,k)n (a1, . . . , ar)
= S(r,k)n (0|a1, . . . , ar) will be called Barnes’ multiple Bernoulli and poly-Bernoulli mixed-
type numbers.Recall that, for every integer k, the poly-Bernoulli polynomials B
(k)n (x) are defined by
the generating function as
Lik(1− e−t)
1− e−text =
∞∑n=0
B(k)n (x)
tn
n!(2)
([14], Cf.[4]). Also, recall that the Barnes’ multiple Bernoulli polynomials Bn(x|a1, . . . , ar)are defined by the generating function as
tr∏rj=1(e
ajt − 1)ext =
∞∑n=0
Bn(x|a1, . . . , ar)tn
n!, (3)
where a1, . . . , ar = 0 ( see [1-14])).In this paper, we consider Barnes’ multiple Bernoulli and poly-Bernoulli mixed-type
polynomials. From the properties of Sheffer sequences of these polynomials arising fromumbral calculus, we derive new and interesting identities.
2 Umbral calculus
Let C be the complex number field and let F be the set of all formal power series in thevariable t:
F =
f(t) =
∞∑k=0
akk!tk
∣∣∣∣∣ak ∈ C
. (4)
2
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
934 Dmitry V. Dolgy et al 933-951
Let P = C[x] and let P∗ be the vector space of all linear functionals on P. ⟨L|p(x)⟩ isthe action of the linear functional L on the polynomial p(x), and we recall that the vectorspace operations on P∗ are defined by ⟨L+M |p(x)⟩ = ⟨L|p(x)⟩ + ⟨M |p(x)⟩, ⟨cL|p(x)⟩ =c ⟨L|p(x)⟩, where c is a complex constant in C. For f(t) ∈ F , let us define the linearfunctional on P by setting
⟨f(t)|xn⟩ = an, (n ≥ 0). (5)
In particular, ⟨tk|xn
⟩= n!δn,k (n, k ≥ 0), (6)
where δn,k is the Kronecker’s symbol.
For fL(t) =∑∞
k=0
⟨L|xk⟩k!
tk, we have ⟨fL(t)|xn⟩ = ⟨L|xn⟩. That is, L = fL(t). The mapL 7→ fL(t) is a vector space isomorphism from P∗ onto F . Henceforth, F denotes boththe algebra of formal power series in t and the vector space of all linear functionals onP, and so an element f(t) of F will be thought of as both a formal power series and alinear functional. We call F the umbral algebra and the umbral calculus is the study ofumbral algebra. The order O
(f(t)
)of a power series f(t)(= 0) is the smallest integer k
for which the coefficient of tk does not vanish. If O(f(t)
)= 1, then f(t) is called a delta
series; if O(f(t)
)= 0, then f(t) is called an invertible series. For f(t), g(t) ∈ F with
O(f(t)
)= 1 and O
(g(t)
)= 0, there exists a unique sequence sn(x) (deg sn(x) = n) such
that⟨g(t)f(t)k|sn(x)
⟩= n!δn,k, for n, k ≥ 0. Such a sequence sn(x) is called the Sheffer
sequence for(g(t), f(t)
)which is denoted by sn(x) ∼
(g(t), f(t)
).
For f(t), g(t) ∈ F and p(x) ∈ P, we have
⟨f(t)g(t)|p(x)⟩ = ⟨f(t)|g(t)p(x)⟩ = ⟨g(t)|f(t)p(x)⟩ (7)
and
f(t) =∞∑k=0
⟨f(t)|xk
⟩ tkk!, p(x) =
∞∑k=0
⟨tk|p(x)
⟩ xk
k!(8)
([12, Theorem 2.2.5]). Thus, by (8), we get
tkp(x) = p(k)(x) =dkp(x)
dxkand eytp(x) = p(x+ y). (9)
Sheffer sequences are characterized in the generating function ([12, Theorem 2.3.4]).
Lemma 1 The sequence sn(x) is Sheffer for(g(t), f(t)
)if and only if
1
g(f(t)
)eyf(t) = ∞∑k=0
sk(y)
k!tk (y ∈ C) ,
where f(t) is the compositional inverse of f(t).
3
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
935 Dmitry V. Dolgy et al 933-951
For sn(x) ∼(g(t), f(t)
), we have the following equations ([12, Theorem 2.3.7, Theorem
2.3.5, Theorem 2.3.9]):
f(t)sn(x) = nsn−1(x) (n ≥ 0), (10)
sn(x) =n∑
j=0
1
j!
⟨g(f(t)
)−1f(t)j|xn
⟩xj, (11)
sn(x+ y) =n∑
j=0
(n
j
)sj(x)pn−j(y) , (12)
where pn(x) = g(t)sn(x).Assume that pn(x) ∼
(1, f(t)
)and qn(x) ∼
(1, g(t)
). Then the transfer formula ([12,
Corollary 3.8.2]) is given by
qn(x) = x
(f(t)
g(t)
)n
x−1pn(x) (n ≥ 1).
For sn(x) ∼(g(t), f(t)
)and rn(x) ∼
(h(t), l(t)
), assume that
sn(x) =n∑
m=0
Cn,mrm(x) (n ≥ 0) .
Then we have ([12, p.132])
Cn,m =1
m!
⟨h(f(t)
)g(f(t)
) l(f(t))m∣∣∣∣∣xn
⟩. (13)
3 Main results
We now note that B(k)n (x), Bn(x|a1, . . . , ar) and S
(r,k)n (x|a1, . . . , ar) are the Appell se-
quences for
gk(t) =1− e−t
Lik(1− e−t), gr(t) =
∏rj=1(e
ajt − 1)
tr, gr,k(t) =
∏rj=1(e
ajt − 1)
tr1− e−t
Lik(1− e−t).
So,
B(k)n (x) ∼
(1− e−t
Lik(1− e−t), t
), (14)
Bn(x|a1, . . . , ar) ∼
(∏rj=1(e
ajt − 1)
tr, t
), (15)
S(r,k)n (x|a1, . . . , ar) ∼
(∏rj=1(e
ajt − 1)
tr1− e−t
Lik(1− e−t), t
). (16)
4
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
936 Dmitry V. Dolgy et al 933-951
In particular, we have
tB(k)n (x) =
d
dxB(k)
n (x) = nB(k)n−1(x) , (17)
tBn(x|a1, . . . , ar) =d
dxBn(x|a1, . . . , ar)
= nBn−1(x|a1, . . . , ar) , (18)
tS(r,k)n (x|a1, . . . , ar) =
d
dxS(r,k)n (x|a1, . . . , ar)
= nS(r,k)n−1 (x|a1, . . . , ar) . (19)
Notice thatd
dxLik(x) =
1
xLik−1(x) .
3.1 Explicit expressions
Write Bn(a1, . . . , ar) := Bn(0|a1, . . . , ar) and S(r,k)n (a1, . . . , ar) := S
(r,k)n (0|a1, . . . , ar). Let
(n)j = n(n− 1) · · · (n− j + 1) (j ≥ 1) with (n)0 = 1.
Theorem 1
S(r,k)n (x|a1, . . . , ar) =
n∑l=0
(n
l
)Bn−l(a1, . . . , ar)B
(k)l (x) , (20)
=n∑
l=0
(n
l
)B
(k)n−lBl(x|a1, . . . , ar) , (21)
=n∑
l=0
n∑m=l
m∑j=0
(−1)j(m
j
)(n
l
)1
(m+ 1)kBn−l(a1, . . . , ar)(x− j)l , (22)
=n∑
l=0
(n∑j=l
n−j∑m=0
(−1)n−m−j
(n
j
)(j
l
)× m!
(m+ 1)kS2(n− j,m)Bj−l(a1, . . . , ar)
)xl , (23)
=n∑
j=0
(n
j
)S(r,k)n−j (a1, . . . , ar)x
j . (24)
5
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
937 Dmitry V. Dolgy et al 933-951
Proof. By (1), (2) and (3), we have
S(r,k)n (y|a1, . . . , ar) =
⟨∞∑i=0
S(r,k)i (y|a1, . . . , ar)
ti
i!
∣∣∣xn
⟩
=
⟨tr∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−teyt∣∣∣xn
⟩
=
⟨tr∏r
j=1(eajt − 1)
∣∣∣Lik(1− e−t)
1− e−teytxn
⟩
=
⟨tr∏r
j=1(eajt − 1)
∣∣∣ ∞∑l=0
B(k)l (y)
tl
l!xn
⟩
=
⟨tr∏r
j=1(eajt − 1)
∣∣∣ n∑l=0
(n
l
)B
(k)l (y)xn−l
⟩
=n∑
l=0
(n
l
)B
(k)l (y)
⟨tr∏r
j=1(eajt − 1)
∣∣∣xn−l
⟩
=n∑
l=0
(n
l
)B
(k)l (y)
⟨∞∑i=0
Bi(a1, . . . , ar)ti
i!
∣∣∣xn−l
⟩
=n∑
l=0
(n
l
)B
(k)l (y)Bn−l(a1, . . . , ar) .
So, we get (20).
6
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
938 Dmitry V. Dolgy et al 933-951
We also have
S(r,k)n (y|a1, . . . , ar) =
⟨∞∑i=0
S(r,k)i (y|a1, . . . , ar)
ti
i!
∣∣∣xn
⟩
=
⟨Lik(1− e−t)
1− e−t
∣∣∣ tr∏rj=1(e
ajt − 1)eytxn
⟩
=
⟨Lik(1− e−t)
1− e−t
∣∣∣ ∞∑l=0
Bl(y|a1, . . . , ar)tl
l!xn
⟩
=
⟨Lik(1− e−t)
1− e−t
∣∣∣ n∑l=0
Bl(y|a1, . . . , ar)(n
l
)xn−l
⟩
=n∑
l=0
(n
l
)Bl(y|a1, . . . , ar)
⟨Lik(1− e−t)
1− e−t
∣∣∣xn−l
⟩
=n∑
l=0
(n
l
)Bl(y|a1, . . . , ar)
⟨∞∑i=0
B(k)i
ti
i!
∣∣∣xn−l
⟩
=n∑
l=0
(n
l
)Bl(y|a1, . . . , ar)B(k)
n−l .
Thus, we get (21).In [7] we obtained that
Lik(1− e−t)
1− e−txn =
n∑m=0
1
(m+ 1)k
m∑j=0
(−1)j(m
j
)(x− j)n .
So,
S(r,k)n (x|a1, . . . , ar) =
tr∏rj=1(e
ajt − 1)
Lik(1− e−t)
1− e−txn
=n∑
m=0
1
(m+ 1)k
m∑j=0
(−1)j(m
j
)tr∏r
j=1(eajt − 1)
(x− j)n
=n∑
m=0
1
(m+ 1)k
m∑j=0
(−1)j(m
j
) n∑l=0
(n
l
)Bn−l(a1, . . . , ar)(x− j)l
=n∑
l=0
n∑m=l
m∑j=0
(−1)j(m
j
)(n
l
)1
(m+ 1)kBn−l(a1, . . . , ar)(x− j)l ,
which is the identity (22).In [7] we obtained that
Lik(1− e−t)
1− e−txn =
n∑j=0
(n−j∑m=0
(−1)n−m−j
(m+ 1)k
(n
j
)m!S2(n− j,m)
)xj ,
7
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
939 Dmitry V. Dolgy et al 933-951
where S2(l,m) are the Stirling numbers of the second kind, defined by
(et − 1)m = m!∞∑
l=m
S2(l,m)tl
l!.
Thus,
S(r,k)n (x|a1, . . . , ar) =
n∑j=0
(n−j∑m=0
(−1)n−m−j
(m+ 1)k
(n
j
)m!S2(n− j,m)
)tr∏r
i=1(eait − 1)
xj
=n∑
j=0
(n−j∑m=0
(−1)n−m−j
(m+ 1)k
(n
j
)m!S2(n− j,m)
)Bj(x|a1, . . . , ar)
=n∑
j=0
(n−j∑m=0
(−1)n−m−j
(m+ 1)k
(n
j
)m!S2(n− j,m)
)j∑
l=0
(j
l
)Bj−l(a1, . . . , ar)x
l
=n∑
l=0
(n∑j=l
n−j∑m=0
(−1)n−m−j
(n
j
)(j
l
)m!
(m+ 1)kS2(n− j,m)Bj−l(a1, . . . , ar)
)xl ,
which is the identity (23).By (11) with (16), we have
⟨g(f(t)
)−1f(t)j|xn
⟩=
⟨tr∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−ttj∣∣∣xn
⟩
= (n)j
⟨tr∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−t
∣∣∣xn−j
⟩
= (n)j
⟨∞∑i=0
S(r,k)i (a1, . . . , ar)
ti
i!
∣∣∣xn−j
⟩= (n)jS
(r,k)n−j (a1, . . . , ar) .
Thus, we get (24).
3.2 Sheffer identity
Theorem 2
S(r,k)n (x+ y|a1, . . . , ar) =
n∑j=0
(n
j
)S(r,k)j (x|a1, . . . , ar)yn−j . (25)
8
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
940 Dmitry V. Dolgy et al 933-951
Proof. By (16) with
pn(x) =
∏rj=1(e
ajt − 1)
tr1− e−t
Lik(1− e−t)S(r,k)n (x|a1, . . . , ar)
= xn ∼ (1, t) ,
using (12), we have (25).
3.3 Recurrence
Theorem 3
S(r,k)n+1 (x|a1, . . . , ar) = xS(r,k)
n (x|a1, . . . , ar)
− 1
n+ 1
r∑j=1
n∑l=0
(n+ 1
l
)(−aj)
n+1−lBn+1−lS(r,k)l (x|a1, . . . , ar)
− 1
n+ 1
(S(r+1,k)n+1 (x|a1, . . . , ar, 1)− S
(r+1,k−1)n+1 (x|a1, . . . , ar, 1)
), (26)
where Bn is the nth ordinary Bernoulli number.
Proof. By applying
sn+1(x) =
(x− g′(t)
g(t)
)1
f ′(t)sn(x)
([12, Corollary 3.7.2]) with (16), we get
S(r,k)n+1 (x|a1, . . . , ar) =
(x−
g′r,k(t)
gr,k(t)
)S(r,k)n (x|a1, . . . , ar) .
Now,
g′r,k(t)
gr,k(t)= (ln gr,k(t))
′
=
(r∑
j=1
ln(eajt − 1)− r ln t+ ln(1− e−t)− ln Lik(1− e−t)
)′
=r∑
j=1
ajeajt
eajt − 1− r
t+
e−t
1− e−t
(1− Lik−1(1− e−t)
Lik(1− e−t)
)
=
∑rj=1
∏i=j(e
ait − 1)(ajteajt − eajt + 1)
t∏r
j=1(eajt − 1)
+t
et − 1
Lik(1− e−t)− Lik−1(1− e−t)
tLik(1− e−t).
Since∑rj=1
∏i=j(e
ait − 1)(ajteajt − eajt + 1)∏r
j=1(eajt − 1)
=12
(∑rj=1 a1 · · · aj−1a
2jaj+1 · · · ar
)tr+1 + · · ·
(a1 · · · ar)tr + · · ·
=1
2
(r∑
j=1
aj
)t+ · · ·
9
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
941 Dmitry V. Dolgy et al 933-951
is a series with order≥ 1 and
Lik(1− e−t)− Lik−1(1− e−t)
1− e−t=
(1
2k− 1
2k−1
)t+ · · ·
is a delta series, we have
S(r,k)n+1 (x|a1, . . . , ar) = xS(r,k)
n (x|a1, . . . , ar)−g′r,k(t)
gr,k(t)S(r,k)n (x|a1, . . . , ar)
= xS(r,k)n (x|a1, . . . , ar)−
g′r,k(t)
gr,k(t)
tr∏rj=1(e
ajt − 1)
Lik(1− e−t)
1− e−txn
= xS(r,k)n (x|a1, . . . , ar)
− tr∏rj=1(e
ajt − 1)
Lik(1− e−t)
1− e−t
∑rj=1
∏i=j(e
ait − 1)(ajteajt − eajt + 1)
t∏r
j=1(eajt − 1)
xn
− tr∏rj=1(e
ajt − 1)
t
et − 1
Lik(1− e−t)− Lik−1(1− e−t)
t(1− e−t)xn .
Now, ∑rj=1
∏i=j(e
ait − 1)(ajteajt − eajt + 1)
t∏r
j=1(eajt − 1)
xn
=
∑rj=1
∏i=j(e
ait − 1)(ajteajt − eajt + 1)∏r
j=1(eajt − 1)
xn+1
n+ 1
=1
n+ 1
r∑j=1
ajteajt − eajt + 1
eajt − 1xn+1
=1
n+ 1
r∑j=1
(ajte
ajt
eajt − 1− 1
)xn+1
=1
n+ 1
r∑j=1
(∞∑l=0
(−1)lBlalj
l!tl − 1
)xn+1
=1
n+ 1
r∑j=1
(n+1∑l=0
(n+ 1
l
)(−aj)
lBlxn+1−l − xn+1
)
=1
n+ 1
r∑j=1
n+1∑l=1
(n+ 1
l
)(−aj)
lBlxn+1−l
=1
n+ 1
r∑j=1
n∑l=0
(n+ 1
l
)(−aj)
n+1−lBn+1−lxl .
Also,
Lik(1− e−t)− Lik−1(1− e−t)
t(1− e−t)xn =
1
n+ 1
Lik(1− e−t)− Lik−1(1− e−t)
1− e−txn+1 .
10
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
942 Dmitry V. Dolgy et al 933-951
Thus, we get the identity (26).
3.4 One more relation
Theorem 4
S(r,k)n (x|a1, . . . , ar) = xS
(r,k)n−1 (x|a1, . . . , ar)
+n∑
m=1
(−1)m−1(n−1m−1
)Bm
m
r∑j=1
amj S(r,k)n−m(x|a1, . . . , ar)
+1
nS(r+1,k−1)n (x|a1, . . . , ar, 1)−
1
nS(r+1,k)n (x|a1, . . . , ar, 1) . (27)
Proof. For n ≥ 1 we have
S(r,k)n (y|a1, . . . , ar) =
⟨∞∑l=0
S(r,k)l (y|a1, . . . , ar)
tl
l!
∣∣∣xn
⟩
=
⟨tr∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−teyt∣∣∣xn
⟩
=
⟨∂t
(tr∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−teyt
)∣∣∣xn−1
⟩
=
⟨(∂t
tr∏rj=1(e
ajt − 1)
)Lik(1− e−t)
1− e−teyt∣∣∣xn−1
⟩
+
⟨tr∏r
j=1(eajt − 1)
(∂tLik(1− e−t)
1− e−t
)eyt∣∣∣xn−1
⟩
+
⟨tr∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−t(∂te
yt)∣∣∣xn−1
⟩= yS
(r,k)n−1 (y|a1, . . . , ar)
+
⟨(∂t
tr∏rj=1(e
ajt − 1)
)Lik(1− e−t)
1− e−teyt∣∣∣xn−1
⟩
+
⟨tr∏r
j=1(eajt − 1)
(∂tLik(1− e−t)
1− e−t
)eyt∣∣∣xn−1
⟩.
11
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
943 Dmitry V. Dolgy et al 933-951
Observe that
∂t
(tr∏r
j=1(eajt − 1)
)=
rtr−1 − tr∑r
j=1aje
ajt
eajt−1∏rj=1(e
ajt − 1)
=tr−1∏r
j=1(eajt − 1)
(r −
r∑j=1
ajteajt
eajt − 1
)
=tr−1∏r
j=1(eajt − 1)
(r −
r∑j=1
−ajt
e−ajt − 1
)
=tr−1∏r
j=1(eajt − 1)
(r −
r∑j=1
∞∑m=0
(−aj)mBmt
m
m!
)
=tr−1∏r
j=1(eajt − 1)
(r −
∞∑m=0
(r∑
j=1
(−aj)m
)Bmt
m
m!
)
=tr∏r
j=1(eajt − 1)
∞∑m=1
(r∑
j=1
amj
)(−1)m−1Bm
m!tm−1 .
Thus, ⟨(∂t
tr∏rj=1(e
ajt − 1)
)Lik(1− e−t)
1− e−teyt∣∣∣xn−1
⟩
=
⟨tr∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−teyt∣∣∣ n∑m=1
(r∑
j=1
amj
)(−1)m−1Bm
m!tm−1xn−1
⟩
=n∑
m=1
(−1)m−1(n−1m−1
)Bm
m
r∑j=1
amj
⟨tr∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−teyt∣∣∣xn−m
⟩
=n∑
m=1
(−1)m−1(n−1m−1
)Bm
mS(r,k)n−m(y|a1, . . . , ar)
r∑j=1
amj .
SinceLik−1(1− e−t)− Lik(1− e−t)
1− e−t=
(1
2k−1− 1
2k
)t+ · · ·
12
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
944 Dmitry V. Dolgy et al 933-951
is a delta series, we have⟨tr∏r
j=1(eajt − 1)
(∂tLik(1− e−t)
1− e−t
)eyt∣∣∣xn−1
⟩
=
⟨tr∏r
j=1(eajt − 1)
e−t(Lik−1(1− e−t)− Lik(1− e−t)
)(1− e−t)2
eyt∣∣∣xn−1
⟩
=
⟨tr∏r
j=1(eajt − 1)
t
et − 1
Lik−1(1− e−t)− Lik(1− e−t)
t(1− e−t)eyt∣∣∣xn−1
⟩
=
⟨tr+1∏r
j=1(eajt − 1)(et − 1)
Lik−1(1− e−t)− Lik(1− e−t)
1− e−teyt∣∣∣xn
n
⟩
=1
n
⟨tr+1∏r
j=1(eajt − 1)(et − 1)
Lik−1(1− e−t)
1− e−teyt∣∣∣xn
⟩
− 1
n
⟨tr+1∏r
j=1(eajt − 1)(et − 1)
Lik(1− e−t)
1− e−teyt∣∣∣xn
⟩=
1
nS(r+1,k−1)n (y|a1, . . . , ar, 1)−
1
nS(r+1,k)n (y|a1, . . . , ar, 1) .
Therefore, we obtain the desired result.
Remark. After simple modification, Theorem 4 becomes
S(r,k)n+1 (x|a1, . . . , ar) = xS(r,k)
n (x|a1, . . . , ar)
+n+1∑l=1
(−1)l−1(
nl−1
)Bl
l
r∑j=1
aljS(r,k)n+1−l(x|a1, . . . , ar)
+1
n+ 1S(r+1,k−1)n+1 (x|a1, . . . , ar, 1)−
1
n+ 1S(r+1,k)n+1 (x|a1, . . . , ar, 1) .
which is the same as the above recurrence formula (26) upon replacing n by n− 1.
3.5 Relations with poly-Bernoulli numbers and Barnes’ multipleBernoulli numbers
Theorem 5
n∑m=0
(n+ 1
m
)(−1)n−mS(r,k)
m (a1, . . . , ar)
=n∑
l=0
l∑m=0
(−1)l−m
(l
m
)(n+ 1
l + 1
)B(k−1)
m Bn−l(a1, . . . , ar) . (28)
13
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
945 Dmitry V. Dolgy et al 933-951
Proof. We shall compute ⟨tr∏r
j=1(eajt − 1)
Lik(1− e−t)∣∣∣xn+1
⟩in two different ways. On the one hand,⟨
tr∏rj=1(e
ajt − 1)Lik(1− e−t)
∣∣∣xn+1
⟩=
⟨tr∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−t
∣∣∣(1− e−t)xn+1
⟩
=
⟨tr∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−t
∣∣∣xn+1 − (x− 1)n+1
⟩
=n∑
m=0
(n+ 1
m
)(−1)n−m
⟨tr∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−t
∣∣∣xm
⟩
=n∑
m=0
(n+ 1
m
)(−1)n−mS(r,k)
m (a1, . . . , ar) .
On the other hand,⟨tr∏r
j=1(eajt − 1)
Lik(1− e−t)∣∣∣xn+1
⟩=
⟨Lik(1− e−t)
∣∣∣ tr∏rj=1(e
ajt − 1)xn+1
⟩=⟨Lik(1− e−t)
∣∣∣Bn+1(x|a1, . . . , ar)⟩
=
⟨∫ t
0
(Lik(1− e−s)
)′ds∣∣∣Bn+1(x|a1, . . . , ar)
⟩=
⟨∫ t
0
e−sLik−1(1− e−s)
1− e−sds∣∣∣Bn+1(x|a1, . . . , ar)
⟩=
⟨∫ t
0
(∞∑j=0
(−s)j
j!
)(∞∑
m=0
B(k−1)m
m!sm
)ds∣∣∣Bn+1(x|a1, . . . , ar)
⟩
=
⟨∞∑l=0
(l∑
m=0
(−1)l−m
(l
m
)B(k−1)
m
)1
l!
∫ t
0
slds∣∣∣Bn+1(x|a1, . . . , ar)
⟩
=n∑
l=0
l∑m=0
(−1)l−m
(l
m
)B
(k−1)m
(l + 1)!
⟨tl+1∣∣∣Bn+1(x|a1, . . . , ar)
⟩=
n∑l=0
l∑m=0
(−1)l−m
(l
m
)B
(k−1)m
(l + 1)!(n+ 1)l+1Bn−l(a1, . . . , ar)
=n∑
l=0
l∑m=0
(−1)l−m
(l
m
)(n+ 1
l + 1
)B(k−1)
m Bn−l(a1, . . . , ar) .
Here, Bn−l(a1, . . . , ar) = Bn−l(0|a1, . . . , ar). Thus, we get (28).
14
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
946 Dmitry V. Dolgy et al 933-951
3.6 Relations with the Stirling numbers of the second kind andthe falling factorials
Theorem 6
S(r,k)n (x|a1, . . . , ar) =
n∑m=0
(n∑
l=m
S2(l,m)
(n
l
)S(r,k)n−l (a1, . . . , ar)
)(x)m . (29)
Proof. For (16) and (x)n ∼ (1, et− 1), assume that S(r,k)n (x|a1, . . . , ar) =
∑nm=0Cn,m(x)m.
By (13), we have
Cn,m =1
m!
⟨1∏r
j=1(eajt−1)
tr1−e−t
Lik(1−e−t)
(et − 1)m∣∣∣xn
⟩
=1
m!
⟨tr∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−t
∣∣∣(et − 1)mxn
⟩
=1
m!
⟨tr∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−t
∣∣∣m!n∑
l=m
S2(l,m)tl
l!xn
⟩
=n∑
l=m
S2(l,m)
(n
l
)⟨tr∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−t
∣∣∣xn−l
⟩
=n∑
l=m
S2(l,m)
(n
l
)S(r,k)n−l (a1, . . . , ar) .
Thus, we get the identity (29).
3.7 Relations with the Stirling numbers of the second kind andthe rising factorials
Theorem 7
S(r,k)n (x|a1, . . . , ar) =
n∑m=0
(n∑
l=m
S2(l,m)
(n
l
)S(r,k)n−l (−m|a1, . . . , ar)
)(x)(m) . (30)
Proof. For (16) and (x)(n) = x(x+1) · · · (x+n−1) ∼ (1, 1−e−t), assume that S(r,k)n (x|a1, . . . , ar) =
15
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
947 Dmitry V. Dolgy et al 933-951
∑nm=0Cn,m(x)
(m). By (13), we have
Cn,m =1
m!
⟨1∏r
j=1(eajt−1)
tr1−e−t
Lik(1−e−t)
(1− e−t)m∣∣∣xn)
⟩
=1
m!
⟨tr∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−te−mt
∣∣∣(et − 1)mxn)
⟩
=n∑
l=m
S2(l,m)
(n
l
)⟨e−mt
∣∣∣ tr∏rj=1(e
ajt − 1)
Lik(1− e−t)
1− e−txn−l
⟩
=n∑
l=m
S2(l,m)
(n
l
)⟨e−mt
∣∣∣S(r,k)n−l (x|a1, . . . , ar)
⟩=
n∑l=m
S2(l,m)
(n
l
)S(r,k)n−l (−m|a1, . . . , ar) .
Thus, we get the identity (30).
3.8 Relations with higher-order Frobenius-Euler polynomials
For λ ∈ C with λ = 1, the Frobenius-Euler polynomials of order r, H(r)n (x|λ) are defined
by the generating function (1− λ
et − λ
)r
ext =∞∑n=0
H(r)n (x|λ) t
n
n!
(see e.g. [6]).
Theorem 8
S(r,k)n (x|a1, . . . , ar) =
n∑m=0
( (nm
)(1− λ)s
s∑j=0
(s
j
)(−λ)s−jS
(r,k)n−m(j|a1, . . . , ar)
)H(s)
m (x|λ) .
(31)
Proof. For (16) and
H(s)n (x|λ) ∼
((et − λ
1− λ
)s
, t
),
16
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
948 Dmitry V. Dolgy et al 933-951
assume that S(r,k)n (x|a1, . . . , ar) =
∑nm=0Cn,mH
(s)m (x|λ). By (13), we have
Cn,m =1
m!
⟨(et − λ
1− λ
)str∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−ttm∣∣∣xn
⟩
=1
m!(1− λ)s
⟨(et − λ)s
tr∏rj=1(e
ajt − 1)
Lik(1− e−t)
1− e−t
∣∣∣tmxn
⟩
=
(nm
)(1− λ)s
s∑j=0
(s
j
)(−λ)s−j
⟨ejt∣∣∣ tr∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−txn−m
⟩
=
(nm
)(1− λ)s
s∑j=0
(s
j
)(−λ)s−jS
(r,k)n−m(j|a1, . . . , ar) .
Thus, we get the identity (31).
3.9 Relations with higher-order Bernoulli polynomials
Bernoulli polynomials B(r)n (x) of order r are defined by(
t
et − 1
)r
ext =∞∑n=0
B(r)n (x)
n!tn
(see e.g. [12, Section 2.2]).
Theorem 9
S(r,k)n (x|a1, . . . , ar) =
n∑m=0
((n
m
) n−m∑l=0
(n−m
l
)(l+sl
) S2(l + s, s)S(r,k)n−m−l(a1, . . . , ar)
)B(s)
m (x) .
(32)
Proof. For (16) and
B(s)n (x) ∼
((et − 1
t
)s
, t
),
17
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
949 Dmitry V. Dolgy et al 933-951
assume that S(r,k)n (x|a1, . . . , ar) =
∑nm=0Cn,mB
(s)m (x). By (13), we have
Cn,m =1
m!
⟨(et − 1
t
)str∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−ttm∣∣∣xn
⟩
=
(n
m
)⟨tr∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−t
∣∣∣ (et − 1
t
)s
xn−m
⟩
=
(n
m
)⟨tr∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−t
∣∣∣ n−m∑l=0
s!
(l + s)!S2(l + s, s)tlxn−m
⟩
=
(n
m
) n−m∑l=0
s!
(l + s)!S2(l + s, s)(n−m)l
⟨tr∏r
j=1(eajt − 1)
Lik(1− e−t)
1− e−t
∣∣∣xn−m−l
⟩
=
(n
m
) n−m∑l=0
s!
(l + s)!S2(l + s, s)(n−m)lS
(r,k)n−m−l(a1, . . . , ar)
=
(n
m
) n−m∑l=0
(n−m
l
)(l+sl
) S2(l + s, s)S(r,k)n−m−l(a1, . . . , ar) .
Thus, we get the identity (32).
References
[1] A. A. Aygunes, Y. Simsek, Unification of multiple Lerch-zeta type functions , Adv.Stud. Contemp. Math. 21 (2011), 367-373.
[2] A. Bayad, T. Kim, Results on Values of Barnes polynomials, Rocky Mountain J.Math. 43 (2013), no. 6, 1-10.
[3] A. Bayad, T. Kim, W. J. Kim and S. H. Lee, Arithmetic properties of q-Barnespolynomials, J. Comput. Anal. Appl. 15 (2013), 111–117.
[4] M. -A. Coppo and B. Candelpergher, The Arakawa-Kaneko zeta functions, Ramanu-jan J. 22 (2010), 153–162.
[5] L. Jang, T. Kim, Y. -H. Kim, K. -W. Hwang, Note on the q q-extension of Barnes’type multiple Euler polynomials, J. Inequal. Appl. 2009, Art. ID 136532, 8 pp.
[6] D. S. Kim and T. Kim, Some identities of Frobenius-Euler polynomials arising fromumbral calculus, Adv. Difference Equ. 2012 (2012), #196.
[7] D. S. Kim, T. Kim and S. -H. Lee, Poly-Bernoulli polynomials arising from umbralcalculus, available at http://arxiv.org/pdf/1306.6697.pdf
[8] T. Kim, On Euler-Barnes multiple zeta functions, Russ. J. Math. Phys. 10 (2003),261–267.
18
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
950 Dmitry V. Dolgy et al 933-951
[9] T. Kim, p-adic q-integrals associated with the Changhee-Barnes’ q-Bernoulli polyno-mials, Integral Transforms Spec. Funct. 15 (2004), 415–420.
[10] T. Kim, Barnes-type multiple q-zeta functions and q-Euler polynomials, J. Phys. A43 (2010), 255201, 11pp.
[11] T. Kim and S. -H. Rim, On Changhee-Barnes’ q-Euler numbers and polynomials,Adv. Stud. Contemp. Math. (Kyungshang) 9 (2004), 81–86.
[12] S. Roman, The umbral Calculus, Dover, New York, 2005.
[13] Y. Simsek, T. Kim and I. -S. Pyung, Barnes’ type multiple Changhee q-zeta functions,Adv. Stud. Contemp. Math. (Kyungshang) 10 (2005), 121–129.
[14] Y. Simsek, Generating functions of the twisted Bernoulli numbers and polynomialsassociated with their interpolation functions, Adv. Stud. Contemp. Math. 16 (2008),251-278.
19
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
951 Dmitry V. Dolgy et al 933-951
952
TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO. 5, 2015
An Umbral Calculus Approach to Poly-Cauchy Polynomials with a q Parameter, Dae San Kim, Taekyun Kim, Takao Komatsu, and Jong-Jin Seo,.....................................................................762
Tripled Fixed Point Theorems for Mixed Monotone Chatterjea Type Contractive Operators, Marin Borcut, Mădălina Păcurar, and Vasile Berinde,………………………………………..793
Soft Boolean Algebra and Its Properties, Rıdvan Şahin, and Ahmet Küçük,………………...803
Generating Functions for the Generalized Bivariate Fibonacci and Lucas Polynomials, Esra Erkuş-Duman, and Naim Tuglu,………………………………………………………………815
Integral norms of 𝑄𝐾,𝜔(𝑝, 𝑞;𝑛) Spaces and Weighted Bloch Spaces, A. El-Sayed Ahmed, and Aydah Ahmadi,………………………………………………………………………………...822
On two Dimensional q-Bernoulli and q-Genocchi Polynomials: Properties and location of zeros, N. I. Mahmudov, A. Akkeleș, and A. Öneren,…………………………………………………834
Existence Results of Sequential Derivatives of Nonlinear Quantum Difference Equations with a New Class of Three-Point Boundary Value Problems Conditions, Nichaphat Patanarapeelert, Thanin Sitthiwirattham,………………………………………………………………………...844
An Iterative Method for Solving Fourth-Order Boundary Value Problems of Mixed Type Integro-Differential Equations, Omar Abu Arqub,…………………………………………….857
An AQCQ-Functional Equation in Normed 2-Banach Spaces, Choonkil Park, Sun Young Jang, Reza Saadati, and Dong Yun Shin,……………………………………………………………875
Refined General Quadratic Equation with Four Variables and Its Stability Results, Hark-Mahn Kim, and Soon Lee,…………………………………………………………………………….885
Hyers-Ulam Stability of a Class of Differential Equations of Second Order, Mohammad Reza Abdollahpour, and Choonkil Park,…………………………………………………………….899
An Iterative Algorithm Based On the Hybrid Steepest Descent Method for Strictly Pseudocontractive Mappings, Jong Soo Jung,…………………………………………………904
BE-Algebras with Order Reversing Involution, Sun Shin Ahn, Young Hee Kim, and Jung Hee Park,……………………………………………………………………………………………918
TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO. 5, 2015
(continued)
Symmetry p-Adic Invariant Integral on ℤ𝑝 for q-Euler Polynomials, Dae San Kim, Taekyun Kim, Sang-Hun Lee, and Jong-Jin Seo,……………………………………………………….927
Barnes' Multiple Bernoulli and Poly-Bernoulli Mixed-Type Polynomials, Dmitry V. Dolgy, Dae San Kim, Taekyun Kim, Takao Komatsu, and Sang-Hun Lee,……………………………….933
Volume 18, Number 6 June 2015 ISSN:1521-1398 PRINT,1572-9206 ONLINE
Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC
Journal of Computational Analysis and Applications ISSNno.’s:1521-1398 PRINT,1572-9206 ONLINE SCOPE OF THE JOURNAL An international publication of Eudoxus Press, LLC (twelve times annually) Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152-3240, U.S.A [email protected] http://www.msci.memphis.edu/~ganastss/jocaaa The main purpose of "J.Computational Analysis and Applications" is to publish high quality research articles from all subareas of Computational Mathematical Analysis and its many potential applications and connections to other areas of Mathematical Sciences. Any paper whose approach and proofs are computational,using methods from Mathematical Analysis in the broadest sense is suitable and welcome for consideration in our journal, except from Applied Numerical Analysis articles. Also plain word articles without formulas and proofs are excluded. The list of possibly connected mathematical areas with this publication includes, but is not restricted to: Applied Analysis, Applied Functional Analysis, Approximation Theory, Asymptotic Analysis, Difference Equations, Differential Equations, Partial Differential Equations, Fourier Analysis, Fractals, Fuzzy Sets, Harmonic Analysis, Inequalities, Integral Equations, Measure Theory, Moment Theory, Neural Networks, Numerical Functional Analysis, Potential Theory, Probability Theory, Real and Complex Analysis, Signal Analysis, Special Functions, Splines, Stochastic Analysis, Stochastic Processes, Summability, Tomography, Wavelets, any combination of the above, e.t.c. "J.Computational Analysis and Applications" is a peer-reviewed Journal. See the instructions for preparation and submission of articles to JoCAAA. Assistant to the Editor: Dr.Razvan Mezei,Lenoir-Rhyne University,Hickory,NC 28601, USA. Journal of Computational Analysis and Applications(JoCAAA) is published by EUDOXUS PRESS,LLC,1424 Beaver Trail Drive,Cordova,TN38016,USA,[email protected] http//:www.eudoxuspress.com. Annual Subscription Prices:For USA and Canada,Institutional:Print $650, Electronic OPEN ACCESS. Individual:Print $300. For any other part of the world add $100 more(postages) to the above prices for Print. No credit card payments. Copyright©2015 by Eudoxus Press,LLC,all rights reserved.JoCAAA is printed in USA. JoCAAA is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH. It is strictly prohibited the reproduction and transmission of any part of JoCAAA and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes no responsibility for the content of published papers.
956
Editorial Board
Associate Editors of Journal of Computational Analysis and Applications
1) George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152,U.S.A Tel.901-678-3144 e-mail: [email protected] Approximation Theory,Real Analysis, Wavelets, Neural Networks,Probability, Inequalities. 2) J. Marshall Ash Department of Mathematics De Paul University 2219 North Kenmore Ave. Chicago,IL 60614-3504 773-325-4216 e-mail: [email protected] Real and Harmonic Analysis 3) Mark J.Balas Department Head and Professor Electrical and Computer Engineering Dept. College of Engineering University of Wyoming 1000 E. University Ave. Laramie, WY 82071 307-766-5599 e-mail: [email protected] Control Theory,Nonlinear Systems, Neural Networks,Ordinary and Partial Differential Equations, Functional Analysis and Operator Theory
4) Dumitru Baleanu Cankaya University, Faculty of Art and Sciences, Department of Mathematics and Computer Sciences, 06530 Balgat, Ankara, Turkey, [email protected] Fractional Differential Equations Nonlinear Analysis, Fractional Dynamics
5) Carlo Bardaro Dipartimento di Matematica e Informatica
20)Margareta Heilmann Faculty of Mathematics and Natural Sciences University of Wuppertal Gaußstraße 20 D-42119 Wuppertal, Germany, [email protected] wuppertal.de Approximation Theory (Positive Linear Operators) 21) Christian Houdre School of Mathematics Georgia Institute of Technology Atlanta,Georgia 30332 404-894-4398 e-mail: [email protected] Probability, Mathematical Statistics, Wavelets 22) Irena Lasiecka Department of Mathematical Sciences University of Memphis Memphis, TN 38152 P.D.E, Control Theory, Functional Analysis, [email protected]
23) Burkhard Lenze Fachbereich Informatik Fachhochschule Dortmund University of Applied Sciences Postfach 105018 D-44047 Dortmund, Germany e-mail: [email protected] Real Networks, Fourier Analysis,Approximation Theory 24) Hrushikesh N.Mhaskar Department Of Mathematics California State University Los Angeles,CA 90032 626-914-7002 e-mail: [email protected] Orthogonal Polynomials, Approximation Theory,Splines, Wavelets, Neural Networks
957
Universita di Perugia Via Vanvitelli 1 06123 Perugia, ITALY TEL+390755853822 +390755855034 FAX+390755855024 E-mail [email protected] Web site: http://www.unipg.it/~bardaro/ Functional Analysis and Approximation Theory, Signal Analysis, Measure Theory, Real Analysis. 6) Martin Bohner Department of Mathematics and Statistics Missouri S&T Rolla, MO 65409-0020, USA [email protected] web.mst.edu/~bohner Difference equations, differential equations, dynamic equations on time scale, applications in economics, finance, biology. 7) Jerry L.Bona Department of Mathematics The University of Illinois at Chicago 851 S. Morgan St. CS 249 Chicago, IL 60601 e-mail:[email protected] Partial Differential Equations, Fluid Dynamics 8) Luis A.Caffarelli Department of Mathematics The University of Texas at Austin Austin,Texas 78712-1082 512-471-3160 e-mail: [email protected] Partial Differential Equations 9) George Cybenko Thayer School of Engineering Dartmouth College 8000 Cummings Hall, Hanover,NH 03755-8000 603-646-3843 (X 3546 Secr.) e-mail: [email protected] Approximation Theory and Neural Networks 10) Ding-Xuan Zhou Department Of Mathematics City University of Hong Kong
25) M.Zuhair Nashed Department Of Mathematics University of Central Florida PO Box 161364 Orlando, FL 32816-1364 e-mail: [email protected] Inverse and Ill-Posed problems, Numerical Functional Analysis, Integral Equations,Optimization, Signal Analysis 26) Mubenga N.Nkashama Department OF Mathematics University of Alabama at Birmingham Birmingham, AL 35294-1170 205-934-2154 e-mail: [email protected] Ordinary Differential Equations, Partial Differential Equations 27)Svetlozar (Zari) Rachev, Professor of Finance, College of Business,and Director of Quantitative Finance Program, Department of Applied Mathematics & Statistics Stonybrook University 312 Harriman Hall, Stony Brook, NY 11794-3775 Phone: +1-631-632-1998, Email : [email protected] 28) Alexander G. Ramm Mathematics Department Kansas State University Manhattan, KS 66506-2602 e-mail: [email protected] Inverse and Ill-posed Problems, Scattering Theory, Operator Theory, Theoretical Numerical Analysis, Wave Propagation, Signal Processing and Tomography 29) Ervin Y.Rodin Department of Systems Science and Applied Mathematics Washington University,Campus Box 1040 One Brookings Dr.,St.Louis,MO 63130- 4899 314-935-6007 e-mail: [email protected] Systems Theory, Semantic Control, Partial Differential Equations, Calculus of Variations, Optimization
958
83 Tat Chee Avenue Kowloon,Hong Kong 852-2788 9708,Fax:852-2788 8561 e-mail: [email protected] Approximation Theory, Spline functions,Wavelets 11) Sever S.Dragomir School of Computer Science and Mathematics, Victoria University, PO Box 14428, Melbourne City, MC 8001,AUSTRALIA Tel. +61 3 9688 4437 Fax +61 3 9688 4050 [email protected] Inequalities,Functional Analysis, Numerical Analysis, Approximations, Information Theory, Stochastics. 12) Oktay Duman TOBB University of Economics and Technology, Department of Mathematics, TR-06530, Ankara, Turkey, [email protected] Classical Approximation Theory, Summability Theory, Statistical Convergence and its Applications 13) Saber N.Elaydi Department Of Mathematics Trinity University 715 Stadium Dr. San Antonio,TX 78212-7200 210-736-8246 e-mail: [email protected] Ordinary Differential Equations, Difference Equations 14) Augustine O.Esogbue School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta,GA 30332 404-894-2323 e-mail: [email protected] Control Theory,Fuzzy sets, Mathematical Programming, Dynamic Programming,Optimization 15) Christodoulos A.Floudas Department of Chemical Engineering Princeton University
and Artificial Intelligence, Operations Research, Math.Programming 30) T. E. Simos Department of Computer Science and Technology Faculty of Sciences and Technology University of Peloponnese GR-221 00 Tripolis, Greece Postal Address: 26 Menelaou St. Anfithea - Paleon Faliron GR-175 64 Athens, Greece [email protected] Numerical Analysis 31) I. P. Stavroulakis Department of Mathematics University of Ioannina 451-10 Ioannina, Greece [email protected] Differential Equations Phone +3 0651098283 32) Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock,Germany [email protected] rostock.de Numerical Fourier Analysis, Fourier Analysis,Harmonic Analysis, Signal Analysis, Spectral Methods, Wavelets, Splines, Approximation Theory 33) Roberto Triggiani Department of Mathematical Sciences University of Memphis Memphis, TN 38152 P.D.E, Control Theory, Functional Analysis, [email protected]
34) Gilbert G.Walter Department Of Mathematical Sciences University of Wisconsin-Milwaukee,Box 413, Milwaukee,WI 53201-0413 414-229-5077 e-mail: [email protected] Distribution Functions, Generalised Functions, Wavelets 35) Xin-long Zhou Fachbereich Mathematik, Fachgebiet Informatik Gerhard-Mercator-Universitat Duisburg
959
Princeton,NJ 08544-5263 609-258-4595(x4619 assistant) e-mail: [email protected] OptimizationTheory&Applications, Global Optimization 16) J.A.Goldstein Department of Mathematical Sciences The University of Memphis Memphis,TN 38152 901-678-3130 e-mail:[email protected] Partial Differential Equations, Semigroups of Operators 17) H.H.Gonska Department of Mathematics University of Duisburg Duisburg, D-47048 Germany 011-49-203-379-3542 e-mail:[email protected] duisburg.de Approximation Theory, Computer Aided Geometric Design 18) John R. Graef Department of Mathematics University of Tennessee at Chattanooga Chattanooga, TN 37304 USA [email protected] Ordinary and functional differential equations, difference equations, impulsive systems, differential inclusions, dynamic equations on time scales , control theory and their applications 19) Weimin Han Department of Mathematics University of Iowa Iowa City, IA 52242-1419 319-335-0770 e-mail: [email protected] Numerical analysis, Finite element method, Numerical PDE, Variational inequalities, Computational mechanics NEW MEMBERS 39)Xing-Biao Hu Institute of Computational Mathematics AMSS, Chinese Academy of Sciences Beijing, 100190, CHINA [email protected] Computational Mathematics
Lotharstr.65,D-47048 Duisburg,Germany e-mail:[email protected] duisburg.de Fourier Analysis,Computer-Aided Geometric Design, Computational Complexity, Multivariate Approximation Theory, Approximation and Interpolation Theory 36) Xiang Ming Yu Department of Mathematical Sciences Southwest Missouri State University Springfield,MO 65804-0094 417-836-5931 e-mail: [email protected] Classical Approximation Theory, Wavelets 37) Lotfi A. Zadeh Professor in the Graduate School and Director, Computer Initiative, Soft Computing (BISC) Computer Science Division University of California at Berkeley Berkeley, CA 94720 Office: 510-642-4959 Sec: 510-642-8271 Home: 510-526-2569 FAX: 510-642-1712 e-mail: [email protected] Fuzzyness, Artificial Intelligence, Natural language processing, Fuzzy logic 38) Ahmed I. Zayed Department Of Mathematical Sciences DePaul University 2320 N. Kenmore Ave. Chicago, IL 60614-3250 773-325-7808 e-mail: [email protected] Shannon sampling theory, Harmonic analysis and wavelets, Special functions and orthogonal polynomials, Integral transforms 40) Choonkil Park Department of Mathematics Hanyang University Seoul 133-791 S.Korea, [email protected] Functional Equations
960
Instructions to Contributors
Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC, of TN.
Editor in Chief: George Anastassiou
Department of Mathematical Sciences University of Memphis
Memphis, TN 38152-3240, U.S.A.
1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves. 2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.
961
4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corollaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,
962
name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990). Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986. Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495. 11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears. 15. This journal will consider for publication only papers that contain proofs for their listed results.
963
FUNCTIONAL INEQUALITIES ASSOCIATED WITH INNERPRODUCT PRESERVING MAPPINGS
GANG LU, GEORGE A. ANASTASSIOU, CHOONKIL PARK∗, AND YUANFENG JIN
Abstract. In this paper, we prove the Hyers-Ulam stability of inner product preservingmappings in Hilbert spaces for the following additive functional equation
f(ax + by) = af(x) + bf(y).
1. Introduction and preliminaries
The stability problem of functional equations originated from a question of Ulam [28]concerning the stability of group homomorphisms: Let (G1, ∗) be a group and let (G2, , d)be a metric group with the metric d(·, ·). Given ε > 0, does there exist a δ(ε) > 0 suchthat if a mapping h : G1 → G2 satisfies the inequality
d(h(x ∗ y), h(x) h(y)) < δ
for all x, y ∈ G1, then there is a homomorphism H : G1 → G2 with
d(h(x), H(x)) < ε
for all x ∈ G1? If the answer is affirmative, we would say that the question of homo-morphism H(x ∗ y) = H(x) H(y) is stable. The concept of stability for a functionalequation arises when we replace the functional equation by an inequality which acts as aperturbation of the equation. Thus the stability question of functional equation is thathow do the solutions of the inequality differ from those of the given functional equation?
Hyers [12] gave a first affirmative answer to the question of Ulam for Banach spaces.Let X and Y be Banach spaces. Assume that f : X → Y satisfies
‖f(x+ y)− f(x)− f(y)‖ ≤ ε
for all x, y ∈ X and some ε ≥ 0. Then there exists a unique additive mapping T : X → Ysuch that
‖f(x)− T (x)‖ ≤ ε
for all x ∈ X.Let X and Y be Banach spaces with norms ‖ · ‖ and ‖ · ‖, respectively. Consider
f : X → Y to be a mapping such that f(tx) is continuous in t ∈ R for each fixed x ∈ X.
2010 Mathematics Subject Classification. Primary 39B62, 39B52, 46B25.Key words and phrases. additive functional equation; inner product preserving mapping Hyers-Ulam
stability; Hilbert space.∗Corresponding author.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
964 GANG LU ET AL 964-972
G. LU, G. A. ANASTASSIOU, C. PARK, AND Y. JIN
Rassias [22] introduced the following inequality: Assume that there exist constants λ ≥ 0and p ∈ [0, 1) such that
‖f(x+ y)− f(x)− f(y)‖ ≤ λ(‖x‖p + ‖y‖p)
for all x, y ∈ X. Rassias [22] showed that there exists a unique R-linear mapping T :X → Y such that
‖f(x)− T (x)‖ ≤ 2λ
2− 2p‖x‖p
for all x ∈ X. Beginning around the year 1980 the topic of approximate homomor-phisms, or the stability of the equation of homomorphism, was studied by a number ofmathematicians. Gavruta [11] generalized the Rassias’ result.
A square norm on an inner product space satisfies the important parallelogram equality
‖x+ y‖2 + ‖x− y‖2 = 2‖x‖2 + 2‖y‖2
The functional equation
f(x+ y) + f(x− y) = 2f(x) + 2f(y)
is called a quadratic functional equation. In particular, every solution of the quadraticfunctional equation is said to be a quadratic mapping. A Hyers-Ulam stability problem forthe quadratic functional equation was proved by Skof [27] for mappings f : X → Y , whereX is a normed space and Y is a Banach space. Cholewa [4] noticed that the theorem ofSkof is still true if the relevant domain X is replace by an Abelian group. In [5], Czerwikproved the Hyers-Ulam stability of the quadratic functional equation. Borelli and Forti[10] generalized the stability result as follows: Let G be an abelian group, E a Banachspace. Assume that a mapping f : G→ E satisfies the functional inequality
‖f(x+ y) + f(x− y)− 2f(x)− 2f(y)‖ ≤ ϕ(x, y)
for all x, y ∈ G, where ϕ : G×G→ [0,∞) is a function such that
Φ(x, y) :=∞∑i=0
1
4i+1ϕ(2ix, 2iy) <∞
for all x ∈ G. The stability problems of several functional equations have been extensivelyinvestigated by a number of authors and there are many interesting results concerningthis problem. A large list of references can be found in ([6, 7, 8, 9, 13, 14, 15, 16, 17, 18,19, 20, 21, 23, 24, 25, 26]).
Let X and Y be complex Hilbert spaces. An additive mapping f : X → Y is called aninner product preserving mapping if f satisfies the orthogonality equation
〈f(x), f(y)〉 = 〈x, y〉
for all x, y ∈ X. The inner product preserving mapping problem has been investigated inseveral papers (see [1, 2, 3]).
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
965 GANG LU ET AL 964-972
INNER PRODUCT PRESERVING MAPPINGS
In this paper, we prove the Hyers-Ulam stability of inner product preserving mappingsin Hilbert spaces for the following additive function equation.
f(ax+ by) = af(x) + bf(y), a, b ∈ R \ 0. (1)
Throughout this paper, assume that X and Y are complex Hilbert spaces, and thata, b ∈ R \ 0 with |a| < 1 or |b| > 1 or a = b = 1.
2. Hyers-Ulam stability of (1) in Hilbert spaces
We prove the Hyers-Ulam stability of inner product preserving mappings in Hilbertspaces for the additive function equation (1) when |a| < 1 or |b| > 1.
Theorem 2.1. Let |a| < 1 and let f : X → Y be a mapping with f(0) = 0 for whichthere exists a function φ : X ×X → [0,∞) such that
φ(x, y) :=∞∑j=0
|aj|φ( xaj,y
aj
)<∞, (2.1)
‖f(ax+ by)− af(x)− bf(y)‖ ≤ φ(x, y), (2.2)
|〈f(x), f(y)〉 − 〈x, y〉| ≤ φ(x, y) (2.3)
for all x, y ∈ X. Then there exists a unique inner product preserving mapping I : X → Ysuch that
‖f(x)− I(x)‖ ≤ φ(xa, 0)
(2.4)
for all x ∈ X.
Proof. Letting y = 0 in (2.2), we obtain
‖f(ax)− af(x)‖ ≤ φ(x, 0).
Then ∥∥∥f(x)− af(xa
)∥∥∥ ≤ φ(xa, 0). (2.5)
It follows from (2.5) that∥∥∥alf ( xal
)− amf
( x
am
)∥∥∥ ≤ m−1∑j=l
∥∥∥ajf ( xaj
)− aj+1f
( x
aj+1
)∥∥∥≤
m−1∑j=l
|aj|φ( x
aj+1, 0)
for all nonnegative integers m and l with m > l and all x ∈ X. It means that thesequence anf
(xan
) is a Cauchy sequence for all x ∈ X. Since Y is complete, the sequence
anf( xan
) converges. We define the mapping I : X → Y by I(x) = limn→∞anf( xan
) forall x ∈ X. Moreover, letting l = 0 and passing the limit m→∞, we get (2.4).
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
966 GANG LU ET AL 964-972
G. LU, G. A. ANASTASSIOU, C. PARK, AND Y. JIN
We show that I(x) is an additive mapping.
‖I(x+ y)− I(x)− I(y)‖ = limn→∞
|an|∥∥∥∥f (x+ y
an
)− f
( xan
)− f
( yan
)∥∥∥∥≤ lim
n→∞|an|
∥∥∥∥f (x+ y
an
)− af
( x
aan
)− bf
( y
ban
)∥∥∥∥+∥∥∥af ( x
ana
)− f
( xan
)∥∥∥+∥∥∥bf ( y
ban
)− f
( yan
)∥∥∥≤ lim
n→∞|an|
φ( x
aan,y
ban
)+ φ
( xan, 0)
+ φ(
0,y
an
)= 0.
It follows from (2.1) and (2.3) that∣∣∣⟨anf ( xan
), anf
( yan
)⟩− 〈x, y〉
∣∣∣ =∣∣a2n∣∣ · ∣∣∣⟨f ( x
an
), f( yan
)⟩−⟨ xan,y
an
⟩∣∣∣≤ |a2n|φ
( xan,y
an
)≤ |an|φ
( xan,y
an
),
which tends to zero as n→∞ for all x, y ∈ X.
〈I(x), I(y)〉 = limn→∞
⟨anf
( xan
), anf
( yan
)⟩= 〈x, y〉
for all x, y ∈ X.It only remains to show that the mapping I : X → Y is unique. Let g be another
additive mapping satisfying (2.4). Then
‖g(x)− I(x)‖ = |an|∥∥∥g ( x
an
)− I
( yan
)∥∥∥≤ |an|
(∥∥∥g ( xan
)− f
( xan
)∥∥∥+∥∥∥f ( x
an
)− I
( yan
)∥∥∥)≤ 2
∞∑i=1
|ai+n|φ( x
ai+n, 0)
for all x ∈ X and n ∈ N. Thus from n→∞, one establishes
g(x)− I(x) = 0
for all x ∈ X. This completes the proof of uniqueness.
Corollary 2.2. Let |a| < 1 and let f : X → Y be a mapping for which there existconstants θ ≥ 0 and r ∈ [0, 1) such that
‖f(ax+ by)− af(x)− bf(y)‖ ≤ θ(‖x‖r + ‖y‖r), (2.6)
|〈f(x), f(y)〉 − 〈x, y〉| ≤ θ(‖x‖r + ‖y‖r) (2.7)
for all x, y ∈ X. Then there exists a unique inner product preserving mapping I : X → Y
such that
‖f(x)− I(x)‖ ≤ θ
|a|r − |a|‖x‖r
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
967 GANG LU ET AL 964-972
INNER PRODUCT PRESERVING MAPPINGS
for all x ∈ X.
Proof. Defining φ(x, y) = θ(‖x‖ + ‖y‖) and applying Theorem 2.1, we get the desiredresult.
Theorem 2.3. Let |b| > 1 and let f : X → Y be a mapping with f(0) = 0, (2.2) and(2.3) for which there exists a function φ : X ×X → [0,∞) such that
∞∑j=0
|b2j|φ( xbj,y
bj
)<∞ (2.8)
for all x, y ∈ X. Then there exists a unique inner product preserving mapping I : X → Y
such that
‖f(x)− I(x)‖ ≤ φ(
0,x
b
)(2.9)
for all x ∈ X, where
φ(x, y) :=∞∑j=0
|bj|φ( xbj,y
bj
)for all x, y ∈ X.
Proof. Letting x = 0 and replacing y by x in (2.2), we obtain
‖f(bx)− bf(x)‖ ≤ φ(0, x),
an so ∥∥∥blf (xbl
)− bmf
( xbm
)∥∥∥ ≤ m−1∑j=l
∥∥∥bjf ( xbj
)− bj+1f
( x
bj+1
)∥∥∥≤
m−1∑j=l
|bj|φ(
0,x
bj+1
)for all nonnegative integers m and l with m > l and all x ∈ X. It means that thesequence bnf
(xbn
) is a Cauchy sequence for all x ∈ X. Since Y is complete, the sequence
bnf( xbn
) converges. We define the mapping I : X → Y by I(x) = limn→∞bnf( xbn
) forall x ∈ X. Moreover, letting l = 0 and passing the limit m→∞, we get (2.9).
It follows from (2.3) and (2.8) that∣∣∣⟨bnf ( xbn
), bnf
( ybn
)⟩− 〈x, y〉
∣∣∣ = |b2n| ·∣∣∣⟨f ( x
bn
), f( ybn
)⟩−⟨ xbn,y
bn
⟩∣∣∣≤ |b2n|φ
( xbn,y
bn
),
which tends to zero as n→∞ for all x, y ∈ X.
〈I(x), I(y)〉 = limn→∞
⟨bnf
( xbn
), bnf
( ybn
)⟩= 〈x, y〉
for all x, y ∈ X.The rest of the proof is similar to the proof of Theorem 2.1.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
968 GANG LU ET AL 964-972
G. LU, G. A. ANASTASSIOU, C. PARK, AND Y. JIN
Corollary 2.4. Let |b| > 1 and let f : X → Y be a mapping for which there existconstants θ ≥ 0 and r > 2 satisfying (2.6) and (2.7). Then there exists a unique innerproduct preserving mapping I : X → Y such that
‖f(x)− I(x)‖ ≤ θ
|b|r − |b|‖x‖r
for any x ∈ X.
Proof. Defining φ(x, y) = θ(‖x‖ + ‖y‖) and applying Theorem 2.3, we get the desiredresult.
Now we prove the Hyers-Ulam stability of inner product preserving mappings in Hilbertspaces for the additive function equation (1) when a = b = 1.
Theorem 2.5. Let f : X → Y be a mapping for which there exists a function φ : X×X →[0,∞) satisfying (2.3) and
φ(x, y) :=∞∑j=1
4jφ( x
2j,y
2j
)<∞, (2.10)
‖f(x+ y)− f(x)− f(y)‖ ≤ φ(x, y) (2.11)
for all x, y ∈ X. Then there exists a unique inner product preserving mapping I : X → Ysuch that
‖f(x)− I(x)‖ ≤ 1
2φ (x, x) (2.12)
for all x ∈ X, where
φ(x, y) :=∞∑j=1
2jφ( x
2j,y
2j
)for all x, y ∈ X.
Proof. Letting y = x in (2.11), we obtain
‖f(2x)− 2f(x)‖ ≤ φ(x, x).
Then ∥∥∥f(x)− 2f(x
2
)∥∥∥ ≤ φ(x
2,x
2
). (2.13)
It follows from (2.13) that∥∥∥2lf( x
2l
)− 2mf
( x
2m
)∥∥∥ ≤ m−1∑j=l
∥∥∥2jf( x
2j
)− 2j+1f
( x
2j+1
)∥∥∥≤
m−1∑j=l
2jφ( x
2j+1,x
2j+1
)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
969 GANG LU ET AL 964-972
INNER PRODUCT PRESERVING MAPPINGS
for all nonnegative integers m and l with m > l and all x ∈ X. It means that thesequence 2nf
(x2n
) is a Cauchy sequence for all x ∈ X. Since Y is complete, the sequence
2nf( x2n
) converges. We define the mapping I : X → Y by I(x) = limn→∞2nf( x2n
) forall x ∈ X. Moreover, letting l = 0 and passing the limit m→∞, we get (2.12).
It follows from (2.3) and (2.10) that∣∣∣⟨2nf( x
2n
), 2nf
( y2n
)⟩− 〈x, y〉
∣∣∣ = |22n| ·∣∣∣⟨f ( x
2n
), f( y
2n
)⟩−⟨ x
2n,y
2n
⟩∣∣∣≤ |22n|φ
( x2n,y
2n
),
which tends to zero as n→∞ for all x, y ∈ X.
〈I(x), I(y)〉 = limn→∞
⟨2nf
( x2n
), 2nf
( y2n
)⟩= 〈x, y〉
for all x, y ∈ X.The rest of the proof is similar to the proof of Theorem 2.1.
Corollary 2.6. Let f : X → Y be a mapping for which there exist constants θ ≥ 0 andr > 2 satisfying (2.7) and
‖f(x+ y)− f(x)− f(y)‖ ≤ θ(‖x‖r + ‖y‖r) (2.14)
for all x, y ∈ X. Then there exists a unique inner product preserving mapping I : X → Ysuch that
‖f(x)− I(x)‖ ≤ 2θ
2r − 2‖x‖r
for all x ∈ X.
Proof. Defining φ(x, y) = θ(‖x‖ + ‖y‖) and applying Theorem 2.5, we get the desiredresult.
Theorem 2.7. Let f : X → Y be a mapping for which there exists a function φ : X×X →[0,∞) satisfying (2.3), (2.11) and
φ(x, y) :=∞∑j=0
1
2jφ(2jx, 2jy
)for all x, y ∈ X. Then there exists a unique inner product preserving mapping I : X → Ysuch that
‖f(x)− I(x)‖ ≤ 1
2φ (x, x)
for all x ∈ X.
Proof. It follows from (2.13) that∥∥∥∥f(x)− 1
2f (2x)
∥∥∥∥ ≤ 1
2φ (x, x) .
The rest of the proof is similar to the proofs of Theorems 2.1 and 2.5.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
970 GANG LU ET AL 964-972
G. LU, G. A. ANASTASSIOU, C. PARK, AND Y. JIN
Corollary 2.8. Let f : X → Y be a mapping for which there exist constants θ ≥ 0 andr ∈ (0, 1) satisfying (2.7) and (2.14). Then there exists a unique inner product preservingmapping I : X → Y such that
‖f(x)− I(x)‖ ≤ 2θ
2− 2r‖x‖r
for all x ∈ X.
Proof. Defining φ(x, y) = θ(‖x‖ + ‖y‖) and applying Theorem 2.7, we get the desiredresult.
Acknowledgments
G. Lu was supported by supported by Doctoral Science Foundation of Liaoning Province,China, by Hall of Liaoning Province Science and Technology (No. 2012-1055) and C.Park was supported by Basic Science Research Program through the National ResearchFoundation of Korea funded by the Ministry of Education, Science and Technology (NRF-2012R1A1A2004299).
References
[1] J. Chmielinski, On a singular case in the Hyers-Ulam-Rassias stability of the Wigner equation, J.Math. Anal. Appl. 289 (2004), 571–583.
[2] J. Chmielinski, Linear mappings approximately preserving orthogonality, J. Math. Anal. Appl. 304(2005), 158–169.
[3] J. Chmielinski and S. Jung, The stability of the Wigner equation on a restricted domain, J. Math.Anal. Appl. 254 (2001), 309–320.
[4] P. W. Cholewa, Remarks on the stability of functional equations, Aequationes Math. 27 (1984),76–86.
[5] S. Czerwik, On the stability of the quatradic mapping in normed spaces, Abh. Math. Sem. Univ.Hamburg 62 (1992), 59–64.
[6] S. Czerwik, The stability of the quadratic functional equation, in Stability of Mappings of Hyers-UlamType (edited by Th. M. Rassias and J. Tabor), Hadronic Press, Palm Harbor, Florida, 1994, pp.81–91.
[7] S. Czerwik, Stability of Functional equations of Ulam-Hyers-Rassias Type, Hardronic Press, PalmHarbor, Florida, 2003.
[8] M. Eshaghi Gordji, G. Kim, J. Lee and C. Park, Generalized ternary bi-derivations on ternaryBanach algebras: a fixed point approach, J. Comput. Anal. Appl. 15 (2013), 45–54.
[9] M. Eshaghi Gordji, G. Kim, J. Lee and C. Park, Nearly generalized derivations on non-ArchimdeanBanach algebras: a fixed point approach, J. Comput. Anal. Appl. 15 (2013), 308–315.
[10] G. L. Forti, Comments on the core of the direct method for provinh Hyers-Ulam stability of functionalequations, J. Math. Anal. Appl. 295 (2004), 127–133.
[11] P. Gavruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings,J. Math. Anal. Appl. 184 (1994), 431–436.
[12] D. H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. U.S.A. 27(1941), 222–224.
[13] D. H. Hyers, G.Isac and Th. M. Rassias, Stability of Functional Equations in Several Variables,Birkhauser, Basel, 1998.
[14] M. Kim, Y. Kim, G. A. Anastassiou and C. Park, An additive functional inequality in matrix normedmodules over a C∗-algebra, J. Comput. Anal. Appl. 17 (2014), 329–335.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
971 GANG LU ET AL 964-972
INNER PRODUCT PRESERVING MAPPINGS
[15] M. Kim, S. Lee, G. A. Anastassiou and C. Park, Functional equations in matrix normed modules, J.Comput. Anal. Appl. 17 (2014), 336–342.
[16] J. Lee, S. Lee and C. Park, Fixed points and stability of the Cauchy-Jensen functional equation infuzzy Banach algebras, J. Comput. Anal. Appl. 15 (2013), 692–698.
[17] J. Lee, C. Park, Y. Cho and D. Shin, Orthogonal stability of a cubic-quartic functional equation innon-Archimedean spaces, J. Comput. Anal. Appl. 15 (2013), 572–583.
[18] L. Li, G. Lu, C. Park and D. Shin, Additive functional inequalities in generalized quasi-Banachspaces, J. Comput. Anal. Appl. 15 (2013), 1165–1175.
[19] G. Lu, Y. Jiang and C. Park, Additive functional equation in Frechet spaces, J. Comput. Anal. Appl.15 (2013), 369–373.
[20] C. Park, K. Ghasemi, S. G. Ghaleh, S. Jang, Approximate n-Jordan ∗-homomorphisms in C∗-algebras, J. Comput. Anal. Appl. 15 (2013), 365–368.
[21] C. Park, A. Najati and S. Jang, Fixed points and fuzzy stability of an additive-quadratic functionalequation, J. Comput. Anal. Appl. 15 (2013), 452–462.
[22] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc.72 (1978), 297–300.
[23] S. Shagholi, M. Eshaghi Gordji and M. Bavand Savadkouhi, Stability of ternary quadratic derivationson ternary Banach algebras, J. Comput. Anal. Appl. 13 (2011), 1097–1105.
[24] S. Shagholi, M. Eshaghi Gordji and M. Bavand Savadkouhi, Nearly ternary cubic homomorphismsin ternary Frechet algebras, J. Comput. Anal. Appl. 13 (2011), 1106–1114.
[25] D. Shin, C. Park and Sh. Farhadabadi, On the superstability of ternary Jordan C∗-homomorphisms,J. Comput. Anal. Appl. 16 (2014), 964–973.
[26] D. Shin, C. Park and Sh. Farhadabadi, Stability and superstability of J∗-homomorphisms and J∗-derivations for a generalized Cauchy-Jensen equation, J. Comput. Anal. Appl. 17 (2014), 125–134.
[27] F. Skof, Proprita locali e approssimazion di operatori, Rend. Sem. Mat. Fis. Milano 53 (1983),113–129.
[28] S. M. Ulam, problems in Modern mathematics, Wiley, New York, 1960.
Gang LuDepartment of Mathematics, School of Science, ShenYang University of Technology,Shenyang 110178, P.R. China
E-mail address: [email protected]
George A. AnastassiouDepartment of Mathematical Sciences, University of Memphis, Memphis, TN 38152, USA
E-mail address: [email protected]
Choonkil ParkDepartment of Mathematics, Research Institute for Natural Sciences, Hanyang Univer-sity, Seoul 133-791, Korea
E-mail address: [email protected]
Yuanfeng JinDepartment of Mathematics, Yanbian University, Yanji 133001, P.R. China
E-mail address: [email protected]
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
972 GANG LU ET AL 964-972
.
STABILITY AND SUPERSTABILITY OF (fr, fs)-DOUBLEDERIVATIONS IN QUASI-BANACH ALGEBRAS
SUN YOUNG JANG, CHOONKIL PARK, PEGAH EFTEGHAR,
AND SHAHROKH FARHADABADI∗
Abstract. In this paper, the following functional equation
n∑k=2
[ k∑i1=2
k+1∑i2=i1+1
· · ·n∑
in−k+1=in−k+1
f( n∑
i=1,i6=i1,··· ,in−k+1
aixi −n−k+1∑r=1
airxir
)]
+f( n∑
i=1
aixi
)= a1 · 2n−1f(x1) (0.1)
is considered (n ≥ 2), and the Hyers-Ulam stability and superstability of (fr, fs)-double
derivations on quasi-Banach algebras associated with the functional equation (0.1) are
proved.
1. Introduction and preliminaries
The stability of functional equations theory discusses and studies about solutions offunctional equations and analyzes the relationships between approximate and exact so-lutions of the functional equations. Actually, we say a functional equation is stable, ifone can find an exact solution for any approximate solution of the functional equation.Subsequently, the concept of superstability has a near nature to the stability sense. Inother words, it happens when any approximate solution is also an exact solution that insuch situation the functional equation is called superstable.
In 1940, the most preliminary kind of stability problems was proposed by Ulam [37].He gave a talk and asked the following: “when and under what conditions does an exactsolution of a functional equation near an approximately solution of that exist?”
In 1941, Hyers [14] formulated and proved the Ulam’s problem for the Cauchy’s func-tional equation on Banach spaces. The result of Hyers was generalized by Aoki [3] foradditive mappings and by Rassias [32] for linear mappings by considering an unboundedCauchy difference. In 1994, Gavruta [13] provided a further generalization of Rassias’ the-orem in which he replaced the unbounded Cauchy difference by a general control functionfor the existence of a unique linear mapping.
It seems that considering stability problems concerning derivations returns to 1994by Semrl [34] who had worked on derivations between operator algebras and afterwardsJun and Park [16]. They had investigated approximate derivations on Banach algebras
02010 Mathematics Subject Classification: 47B48, 47B47, 39B52, 39B82, 32A65, 17A36, 46Hxx.
Key words and phrases. Functional equation; Hyers-Ulam stability; (fr, fs)-double derivation; Super-
stability; Quasi-Banach algebra.∗Corresponding author: Email address: shahrokh [email protected] (Sh. Farhadabadi).
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
973 SUN YOUNG JANG ET AL 973-983
S. JANG, C. PARK, P. EFTEGHAR, AND SH. FARHADABADI
Cn[0, 1]. More stability results in many kind of derivations can be found in (cf. [2, 4, 7,8, 10, 24, 25, 26, 28, 36]).
At present, the theory of stability is quickly being deployed by numerous mathemati-cians. They pose and investigate various stability problems including different functionalequations, derivations and homomorphisms in various spaces and structures. For moreepochal information and various aspects about the stability theory, the readers can referto monographs (cf. [5, 6, 9, 11, 12, 15, 18, 19, 20, 21, 22, 23, 27, 29, 30, 31, 33, 35, 38]).
Now we give briefly some useful definitions, preliminary and fundamental results ofquasi-Banach spaces.
Definition 1.1. ([17]) Let X be a real linear space. A function ‖ · ‖ : X → R is aquasi-norm (valuation) if it satisfies the following conditions:
(N1) ‖x‖ ≥ 0 for all x ∈ X and ‖x‖ = 0 if only if x = 0;(N2) ‖λ · x‖ = |λ| · ‖x‖ for all λ ∈ R and all x ∈ X ;(N3) There is a constant K ≥ 1 such that ‖x+ y‖ ≤ K(‖x‖+ ‖y‖) for all x, y ∈ X .
In this case, the pair (X , ‖ · ‖) is called a quasi-normed space and the smallest possible Kis called the modulus of concavity of ‖ · ‖.
A complete quasi-normed space is a quasi-Banach space.
Definition 1.2. ([17]) Let 0 < p ≤ 1 be a real number. A quasi-normed space (X , ‖ · ‖)is called a p-normed space if
‖x+ y‖p ≤ ‖x‖p + ‖y‖p
for all x, y ∈ X .
Definition 1.3. ([1]) Let X be an algebra and (X , ‖ · ‖) be a quasi-normed space. Thequasi-normed space (X , ‖ · ‖) is called a quasi-normed algebra if there exist a constantC > 0 such that
‖xy‖ ≤ C‖x‖‖y‖for all x, y ∈ X . In addition, if the quasi-norm ‖ · ‖ is a p-norm, then the quasi-normedalgebra (X , ‖ · ‖) is called a p-normed algebra.
Definition 1.4. ([24]) Let X be an algebra and f2, f3 : X → X be linear mappings. Alinear mapping f1 : X → X is called an (f2, f3)-double derivation if
f1(xy) = f1(x)y + xf1(y) + f2(x)f3(y) + f3(x)f2(y)
for all x, y ∈ X . By an f2-double derivation we mean an (f2, f2)-double derivation. It isclear that f1 is an (f2, f3)-double derivation if and only if f1 is an (f3, f2)-double derivation.
Now, consider the functional equation (0.1). This equation which is called the generaln-dimensional additive functional equation, was introduced by Khodaei and Rassias [17].In order to investigate (0.1), throughout this paper a1, · · · , an (with n ≥ 2, a1 > 1), arefixed positive integers and X will be also a p-Banach algebra with p-norm ‖ · ‖, as well asthe integers 1 ≤ j, r, s ≤ 3 are assumed with j 6= r 6= s.
2. Hyers-Ulam stability of (fr, fs)-double derivations on quasi-Banachalgebras
In this section, we prove the Hyers-Ulam stability of (fr, fs)-double derivations onquasi-Banach algebras associated with the functional equation (0.1).
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
974 SUN YOUNG JANG ET AL 973-983
SUPERSTABILITY OF (fr, fs)-DOUBLE DERIVATIONS IN QUASI-BANACH ALGEBRAS
First of all, for convenience, for given mappings fj : X → X , we define the differenceoperators:
Dλfj(x1, · · · , xn
):=
n∑k=2
[ k∑i1=2
k+1∑i2=i1+1
· · ·n∑
in−k+1=in−k+1
fj
( n∑i=1,
i6=i1,··· ,in−k+1
aiλxi −n−k+1∑r=1
airλxir
)]+ fj
( n∑i=1
aiλxi
)− a1 · 2n−1λfj(x1),
Dfj, fr, fs(x, y) := fj(xy)− fj(x)y − xfj(y)− fr(x)fs(y)− fs(x)fr(y)
for all x, y, x1, · · · , xn ∈ X and all λ ∈ R.
Lemma 2.1. ([17]) Let X and Y be real vector spaces. A mapping f : X → Y satisfiesthe functional equation (0.1) if and only if f : X → Y is additive.
From now on, 0 < p ≤ 1 is a real number.
Theorem 2.2. Let φ : X n → [0,∞) be a function such that
φ(x1, · · · , xn
):=
∞∑i=0
[1
a1iφ(ai1x1, · · · , ai1xn
)]p< +∞ (2.1)
for all x1, · · · , xn ∈ X . Suppose that fj : X → X , j = 1, 2, 3, are mappings satisfying theinequalities
maxj
∥∥Dλfj(x1, x2, · · · , xn
)∥∥ ≤ φ(x1, x2, · · · , xn
), (2.2)
maxj,r,s
∥∥Dfj ,fr,fs(x, y)∥∥ ≤ φ
(x+ y, · · · , x+ y
)(2.3)
for all x, y, x1, · · · , xn ∈ X and all λ ∈ R. Then unique (Fr,Fs)-double derivationsFj : X → X defined by the limits
Fj(x) = limm→∞
1
am1fj(a
m1 x)
exist and satisfy the inequalities∥∥∥Fj(x)− fj(x)∥∥∥ ≤ 1
a1 · 2n−1[φ(x, 0, · · · , 0
)] 1p
(2.4)
for all x ∈ X .
Proof. Letting x1 = x, x2 = · · · = xn = 0 and λ = 1 in (2.2), we get∥∥D1f1(x, 0, · · · , 0
)∥∥ ≤ φ(x, 0, · · · , 0
)for all x ∈ X . From this inequality and the fact that
2n−1 =n−1∑i=0
(n− 1
i
)= 1 +
n−1∑i=1
(n− 1
i
),
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
975 SUN YOUNG JANG ET AL 973-983
S. JANG, C. PARK, P. EFTEGHAR, AND SH. FARHADABADI
we have ∥∥∥∥f1(x)− 1
a1f1(a1x)
∥∥∥∥ ≤ 1
a1 · 2n−1φ(x, 0, · · · , 0
)for all x ∈ X . Replacing x by ai1x and then dividing both sides by ai1, we get∥∥∥∥ 1
ai1f1(a
i1x)− 1
ai+11
f1(ai+11 x)
∥∥∥∥ ≤ 1
a1i+1 · 2n−1φ(ai1x, 0, · · · , 0
)(2.5)
for all x ∈ X and all nonnegative integers i. Assume that m, t are positive integers withm > t. Since X is a p-Banach space, it follows from (2.5) that∥∥∥∥ 1
am1f1(a
m1 x)− 1
at1f1(a
t1x)
∥∥∥∥p ≤ m−1∑i=t
∥∥∥∥ 1
ai+11
f1(ai+11 x)− 1
ai1f1(a
i1x)
∥∥∥∥p
≤ 1
(a1 · 2n−1)pm−1∑i=t
[1
a1iφ(ai1x, 0, · · · , 0
)]p(2.6)
for all x ∈ X . Now by the condition (2.1), we deduce that the right-hand side tends to
zero as t,m → ∞, and this implies that the sequence
1am1f1(a
m1 x)
is Cauchy. Since X
is complete, the sequence
1am1f1(a
m1 x)
converges in X , and therefore we can define for
all x ∈ X the mapping F1 : X → X by
F1(x) = limm→∞
1
am1f1(a
m1 x).
Now we claim that F1 : X → X is R-linear. In order to verify that, we first show that F1
is additive. It follows from (2.2) and (2.1) that∥∥∥D1F1
(x1, x2, · · · , xn
)∥∥∥p =
∥∥∥∥ limm→∞
1
am1D1f1
(am1 x1, a
m1 x2, · · · , am1 xn
)∥∥∥∥p≤ lim
m→∞
[1
am1φ(am1 x1, a
m1 x2, · · · , am1 xn
)]p= 0
for all x1, · · · , xn ∈ X . So D1F1(x1, x2, · · · , xn) = 0 for all x1, x2, · · · , xn ∈ X , whichmeans F1 : X → X satisfies the functional equation (0.1). Therefore, Lemma 2.1 clarifiesthat the mapping F1 is additive. So
a1F1(x) = F1(a1x) = limm→∞
1
am1f1(a
m+11 x),
F1(x) = limm→∞
1
am+11
f1(am+11 x)
for all x ∈ X . For x1 = am1 x and x2 = · · · = xn = 0, it follows from (2.2) that∥∥∥a−(m+1)1 f1(a
m+11 λx)− a−m1 λf1(a
m1 x)
∥∥∥p ≤ 1
ap1 · 2(n−1)p
[1
am1φ(am1 x, 0, · · · , 0
)]p
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
976 SUN YOUNG JANG ET AL 973-983
SUPERSTABILITY OF (fr, fs)-DOUBLE DERIVATIONS IN QUASI-BANACH ALGEBRAS
for all x ∈ X and all λ ∈ R. By (2.1), the right-hand side tends to zero as m→∞. Hence∥∥∥F1(λx)− λF1(x)∥∥∥p = 0
for all x ∈ X and all λ ∈ R. So F1(λx) = λF1(x) for all x ∈ X and all λ ∈ R, and thusF1 is R-linear.
Putting t = 0 and passing the limit m→∞ in (2.6), we get the inequality (2.4) forj = 1.
Let F ′1 : X → X be another R-linear mapping satisfying (2.4). Then we have∥∥∥F1(x)−F ′1(x)∥∥∥p ≤ 1
amp1
(∥∥F1(am1 x)− f1(am1 x)
∥∥p +∥∥F ′1(am1 x)− f1(am1 x)
∥∥p)≤ 2
amp1
· 1
(a1.2n−1)pφ(am1 x, 0, · · · , 0
)=
2
(a1.2n−1)p·∞∑i=m
[1
ai1φ(ai1x, 0, · · · , 0
)]pfor all x ∈ X . By (2.1), the right-hand side tends to zero as m→∞, which signifies theuniqueness of F1.
By a similar method, one can easily show that the unique and R-linear mappingsF2 : X → X and F3 : X → X defined by
F2(x) = limm→∞
1
am1f2(a
m1 x), F3(x) = lim
m→∞
1
am1f3(a
m1 x)
exist and satisfy (2.4) for all x ∈ X .To end the proof, it is just necessary to show that F1 is an (F2,F3)-double derivation.
It follows from (2.3) that∥∥∥Df1,f2,f3(x, y)∥∥∥ =
∥∥∥Df1,f3,f2(x, y)∥∥∥ ≤ φ
(x+ y, · · · , x+ y
)for all x, y ∈ X . We know a1 > 1, so a1
mp > 1 and(a1mp)2> a1
mp. Therefore, the lastinequality and the condition (2.1) imply that∥∥∥F1(xy)−F1(x)y − xF1(y)−F2(x)F3(y)−F3(x)F2(y)
∥∥∥p= lim
m→∞
1
a12mp
∥∥∥f1 (a2m1 xy)− f1 (am1 x) am1 y − am1 xf1 (am1 y)
−f2 (am1 x) f3 (am1 y)− f3 (am1 x) f2 (am1 y)∥∥∥p
= limm→∞
1
a12mp
∥∥∥Df1,f3,f2 (am1 x, am1 y)
∥∥∥p< lim
m→∞
[1
a1mφ(am1 (x+ y), · · · , am1 (x+ y)
)]p= 0
for all x, y ∈ X . Hence
F1(xy) = F1(x)y + xF1(y) + F2(x)F3(y) + F3(x)F2(y)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
977 SUN YOUNG JANG ET AL 973-983
S. JANG, C. PARK, P. EFTEGHAR, AND SH. FARHADABADI
for all x, y ∈ X .Similarly we can show that F2 and F3 are respectively (F1,F3)-double derivation and
(F1,F2)-double derivation and so the proof is complete.
Theorem 2.3. Let φ : X n → [0,∞) be a function such that
φ(x1, · · · , xn) :=
∞∑i=0
[ai1φ(x1ai1, · · · , xn
ai1
)]p< +∞,
limm→∞
[a1
2mφ( x
am1, · · · , x
am1
)]p= 0 (2.7)
for all x, x1, · · · , xn ∈ X . Suppose that fj : X → X , j = 1, 2, 3, are mappings satisfying(2.2) and (2.3). Then unique (Fr,Fs)-double derivations Fj : X → X defined by the limits
Fj(x) = limm→∞
am1 fj
( x
am1
)exist and satisfy the inequalities∥∥∥Fj(x)− fj(x)
∥∥∥ ≤ 1
2n−1
[φ( xa1, 0, · · · , 0
)]1/p(2.8)
for all x ∈ X .
Proof. Replacing x by x
a2i+11
in (2.5) and then multiplying by a2i+11 , we obtain∥∥∥∥ai+1
1 f1
( x
ai+11
)− ai1f1
( xai1
)∥∥∥∥ ≤ ai12n−1
φ( x
ai+11
, 0, · · · , 0)
for all x ∈ X . Now by the same method which was done in the proof of Theorem 2.2, we
can assert that the sequenceam1 f1
(xam1
)is Cauchy and convergent in X and the unique
and R-linear mappings Fj(x) = limm→∞ am1 fj(xam1
)exist and satisfy (2.8).
The inequality (2.3) and the condition (2.7) imply that∥∥∥DF1,F3,F2(x, y)∥∥∥p = lim
m→∞a1
2mp
∥∥∥∥Df1,f3,f2
( x
am1,y
am1
)∥∥∥∥p≤ lim
m→∞
[a1
2mφ(x+ y
am1, · · · , x+ y
am1
)]p= 0
for all x, y ∈ X . This shows that F1 is an (F2,F3)-double derivation.The arguments for j = 2, 3 are also the same as for j = 1 and so we will omit them.
Corollary 2.4. Let δ be a nonnegative real number and q be a positive real number suchthat q < 1 or q > 2. Suppose that fj : X → X , j = 1, 2, 3, are mappings satisfying theinequalities
maxj
∥∥Dλfj(x1, x2, · · · , xn
)∥∥ ≤ δ (‖x1‖q + · · ·+ ‖xn‖q) ,
maxj,r,s
∥∥Dfj ,fr,fs(x, y)∥∥ ≤ nδ‖x+ y‖q
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
978 SUN YOUNG JANG ET AL 973-983
SUPERSTABILITY OF (fr, fs)-DOUBLE DERIVATIONS IN QUASI-BANACH ALGEBRAS
for all x, y, x1, · · · , xn ∈ X , and all λ ∈ R. Then unique (Fr,Fs)-double derivationsFj : X → X exist and satisfy the inequalities∥∥∥Fj(x)− fj(x)
∥∥∥ ≤ δ‖x‖q
2n−1 ·∣∣ap1 − apq1 ∣∣ 1p
for all x ∈ X .
Proof. Defining φ(x1, · · · , xn) := δ (‖x1‖q + · · ·+ ‖xn‖q) and applying Theorem 2.2 forthe case q < 1, and Theorem 2.3 for the case q > 2, we get the result.
3. Superstability of (fr, fs)-double derivations on quasi-Banach algebras
In this section, we prove the superstability of (fr, fs)-double derivations associated withthe functional equation (0.1).
Initially, we improve Lemma 2.1 to a stronger statement and afterwards we use it forthe proof of superstability theorem of this section.
Lemma 3.1. Let n ≥ 3 be a fixed integer and f : X → X be a mapping such that∥∥∥2n−1a1λf(x1)−n∑k=2
[ k∑i1=2
k+1∑i2=i1+1
· · ·n∑
in−k+1=in−k+1
f( n∑
i=1,i6=i1,··· ,in−k+1
aiλxi −n−k+1∑r=1
airλxir
)]∥∥∥ ≤ ∥∥∥f( n∑i=1
aiλxi
)∥∥∥ (3.1)
for all x1, · · · , xn ∈ X and all λ ∈ R. Then f is R-linear.
Proof. First, assume that n ≥ 4.Putting x4 = · · · = xn = 0 in (3.1), we get∥∥∥2n−1λa1f(x1)−
(2n−3 − 1
)f(λ[a1x1 + a2x2 + a3x3]
)− 2n−3
f(λ[a1x1 − a2x2 + a3x3
])− 2n−3f
(λ[a1x1 + a2x2 − a3x3]
)−2n−3f
(λ[a1x1 − a2x2 − a3x3]
)∥∥∥≤∥∥∥f(λ[a1x1 + a2x2 + a3x3]
)∥∥∥ (3.2)
for all x1, x2, x3 ∈ X and all λ ∈ R. Letting x1 = x2 = x3 = 0 and λ = 1 in (3.2), weobtain ∥∥∥((a1 − 1)2n−1 + 1
)f(0)
∥∥∥ ≤ ∥∥∥f(0)∥∥∥.
So f(0) = 0, (since (a1 − 1)2n−1 > 0). Putting λ = 1 and substituting x1, x2, x3 byx/a1,−x/a2, 0 and then by x/a1,−x/2a2,−x/2a3 in (3.2), respectively, we get
a1 · 2n−1f( xa1
)= 2n−2f(2x),
a1 · 2n−1f( xa1
)= 2n−2f(x) + 2n−3f(2x)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
979 SUN YOUNG JANG ET AL 973-983
S. JANG, C. PARK, P. EFTEGHAR, AND SH. FARHADABADI
for all x ∈ X . Thus f(2x) = 2f(x) and f(x) = a1f(xa1
)for all x ∈ X . Letting λ = 1,
x1 = x+ y/a1, x2 = −x/a2 and x3 = −y/a3 in (3.2), we have
a1 · 2n−1f(x+ y
a1
)− 2n−3f(2x)− 2n−3f(2y)− 2n−3f(2x+ 2y) = 0
for all x, y ∈ X , which implies that f(x+ y) = f(x) + f(y) for all x, y ∈ X .Finally, letting x1 = x/a1, x2 = −x/a2 and x3 = 0 in (3.2), we obtain
a1λ · 2n−1f( xa1
)− 2n−2f(2λx) = 0
for all x ∈ X and all λ ∈ R. So f(λx) = λf(x) for all x ∈ X and all λ ∈ R, and thereforef is R-linear.
Now assume that n = 3 in (3.1). Then∥∥∥4a1λf(x1)− f(λ[a1x1 − a2x2 − a3x3]
)−f(λ[a1x1 + a2x2 − a3x3]
)− f
(λ[a1x1 − a2x2 + a3x3]
)∥∥∥≤∥∥∥f(λ[a1x1 + a2x2 + a3x3]
)∥∥∥for all x1, x2, x3 ∈ X and all λ ∈ R. As it is obvious that we can get an inequality similarto the normed inequality (3.2) for the case n ≥ 4, one can easily get the desired result.
Theorem 3.2. Let φ : X n → [0,∞), n ≥ 3, be a function such that
liml→∞
t−2lφ(tlx, · · · , tlx) = 0
for all x ∈ X , where t 6= 1 is a real number. Suppose that fj : X → X , j = 1, 2, 3, aremappings satisfying (3.1) and (2.3). Then the mappings fj : X → X are (fr, fs)-doublederivations.
Proof. Since (3.1) holds for the mappings fj : X → X , Lemma 3.1 asserts that themappings fj are R-linear. So it follows from (2.3) and the assumption on φ that∥∥∥fj(xy)− fj(x)y − xfj(y)− fr(x)fs(y)− fs(x)fr(y)
∥∥∥p= lim
l→∞
1
t2lp
∥∥∥fj (t2lxy)− fj (tlx) tly − tlxfj (tly)−fr
(tlx)fs(tly)− fs
(tlx)fr(tly) ∥∥∥p
= liml→∞
1
t2lp
∥∥∥Dfj ,fk,fi
(tlx, tly
) ∥∥∥p≤[
liml→∞
1
t2lφ(tl(x+ y), · · · , tl(x+ y)
)]p= 0p
for all x, y ∈ X , which implies that the mappings fj : X → X are (fr, fs)-double deriva-tions, as desired.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
980 SUN YOUNG JANG ET AL 973-983
SUPERSTABILITY OF (fr, fs)-DOUBLE DERIVATIONS IN QUASI-BANACH ALGEBRAS
Corollary 3.3. Let δ be a nonnegative real number and q1, · · · , qn be positive real numberssuch that q1, · · · , qn > 2 or q1, · · · , qn < 2. Suppose that fj : X → X , j = 1, 2, 3, aremappings satisfying (3.1) and the inequalities
maxj,r,s
∥∥Dfj ,fr,fs(x, y)∥∥ ≤ δ
(‖x+ y‖q1 + · · ·+ ‖x+ y‖qn
)for all x, y ∈ X . Then the mappings fj : X → X are (fr, fs)-double derivations.
Proof. The proof follows from Theorem 3.2 by taking φ(x1, · · · , xn) := δ (‖x1‖q1 + · · ·+ ‖xn‖qn)with t > 1 for the case q1, · · · , qn < 2 and with t < 1 for the case q1, · · · , qn > 2.
Corollary 3.4. Let δ be a nonnegative real number and q1, · · · , qn be positive real numberssuch that q1 + · · ·+ qn 6= 2. Suppose that fj : X → X , j = 1, 2, 3, are mappings satisfying(3.1) and the inequality
maxj,r,s
∥∥Dfj ,fr,fs(x, y)∥∥ ≤ δ‖x+ y‖q1+···+qn
for all x, y ∈ X . Then the mappings fj : X → X are (fr, fs)-double derivations.
Proof. The proof follows from Theorem 3.2 by taking φ(x1, · · · , xn) := δ (‖x1‖q1 · · · ‖xp‖qn)with t > 1 for the case q1 + · · ·+ qn < 2 and with t < 1 for the case q1 + · · ·+ qn > 2.
The obtained results in this section can be simpler. Indeed, one can set q1 = · · · = qn =q in two last corollaries and get the better statements.
Acknowledgments
S. Y. Jang was supported by Basic Science Research Program through the National Re-search Foundation of Korea funded by the Ministry of Education, Science and Technology(NRF-2013007226) and has written during visiting the Research Institute of Mathemat-ics, Seoul Natinal Univerity. C. Park was supported by Basic Science Research Programthrough the National Research Foundation of Korea funded by the Ministry of Education,Science and Technology (NRF-2012R1A1A2004299).
References
[1] J. M. Almira and U. Luther, Inverse closedness of opproximation algebras, J. Math. Anal. Appl. 314
(2006), 30–44.
[2] M. Amyari, C. Park and M.S. Moslehian, Nearly ternary derivations, Taiwanese J. Math. 11 (2007),
1417–1424.
[3] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan 2
(1950), 64–66.
[4] H. Cao, J. Lv and J. M. Rassias, Superstability for generalized module left derivations and generalized
module derivations on Banach module (II), J. Inequal. Pure Appl. Math. 10 (2009), 17 pages.
[5] C.Y. Chou and J.-H. Tzeng, On approximate isomorphisms between Banach ∗-algebras or C∗-
algebras, Taiwanese J. Math. 10 (2006), 219–231.
[6] P. Czerwik, Functional Equations and Inequalities in Several Variables, Word Scientific Publishing
Company, New Jersey, Hong Kong, Singapore and London, 2002.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
981 SUN YOUNG JANG ET AL 973-983
S. JANG, C. PARK, P. EFTEGHAR, AND SH. FARHADABADI
[7] A. Ebadian, N. Ghobadipour and H. Baghban, Stability of bi-θ-derivations on JB∗-triples, Int. J.
Geom. Methods Mod. Phys. 9 (2012), No. 7, Art. ID 1250051, 12 pages.
[8] A. Ebadian, I. Nikoufar and M. Eshaghi Gordji, Nearly (θ1, θ2, θ3, φ)-derivations on C∗-modules, Int.
J. Geom. Methods Mod. Phys. 9 (2012), No. 3, Art. ID 1250019, 12 pages.
[9] M. Eshaghi Gordji, A. Fazeli and C. Park, 3-Lie multipliers on Banach 3-Lie algebras, Int. J. Geom.
Methods Mod. Phys. 9 (2012), No. 7, Art. ID 1250052, 15 pages.
[10] M. Eshaghi Gordji and N. Ghobadipour, Stability of (α, β, γ)-derivations on Lie C∗-algebras, Int. J.
Geom. Methods Mod. Phys. 7 (2010), 1097–1102.
[11] M. Eshaghi Gordji, G. Kim, J. Lee and C. Park, Generalized ternary bi-derivations on ternary
Banach algebras: a fixed point approach, J. Comput. Anal. Appl. 15 (2013), 45–54.
[12] M. Eshaghi Gordji, G. Kim, J. Lee and C. Park, Nearly generalized derivations on non-Archimdean
Banach algebras: a fixed point approach, J. Comput. Anal. Appl. 15 (2013), 308–315.
[13] P. Gavruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings,
J. Math. Anal. Appl. 184 (1994), 431–436.
[14] D. H. Hyers, On the stability of the linear functional equation, Proc. Natl Acad. Sci. U.S.A. 27
(1941), 222–224.
[15] D. H. Hyers, G. Isac and Th. M. Rassias, Stability of Functional Equations in Several Variables,
Birkhauser, Basel, 1998.
[16] K. Jun and D. Park, Almost derivations on the Banach algebra Cn[0, 1], Bull. Korean Math. Soc.
33 (1996), 359–366.
[17] H. Khodaei and Th. M. Rassias, Appriximately generalized additive functions in several variables,
Int. J. Nonlinear Anal. Appl. 1 (2010), 22–41.
[18] M. Kim, Y. Kim, G. A. Anastassiou and C. Park, An additive functional inequality in matrix normed
modules over a C∗-algebra, J. Comput. Anal. Appl. 17 (2014), 329–335.
[19] M. Kim, S. Lee, G. A. Anastassiou and C. Park, Functional equations in matrix normed modules, J.
Comput. Anal. Appl. 17 (2014), 336–342.
[20] J. Lee, S. Lee and C. Park, Fixed points and stability of the Cauchy-Jensen functional equation in
fuzzy Banach algebras, J. Comput. Anal. Appl. 15 (2013), 692–698.
[21] J. Lee, C. Park, Y. Cho and D. Shin, Orthogonal stability of a cubic-quartic functional equation in
non-Archimedean spaces, J. Comput. Anal. Appl. 15 (2013), 572–583.
[22] L. Li, G. Lu, C. Park and D. Shin, Additive functional inequalities in generalized quasi-Banach
spaces, J. Comput. Anal. Appl. 15 (2013), 1165–1175.
[23] G. Lu, Y. Jiang and C. Park, Additive functional equation in Frechet spaces, J. Comput. Anal. Appl.
15 (2013), 369–373.
[24] M. Mirzavaziri and E. Omidvar Tehrani, δ-double derivations on C∗-algebras, Bull. Iranian Math.
Soc. 35 (2009), 147–154.
[25] T. Miura, G. Hirasawa and S.-E. Takahasi, A perturbation of ring derivations on Banach algebras,
J. Math. Anal. Appl. 319 (2006), 522–530.
[26] M. S. Moslehian, Ternary derivations, stability and physical aspects, Acta Appl. Math. 100 (2008),
187–199.
[27] A. Najati and C. Park, On the stability of an n-dimensional functional equation originating from
quadratic forms, Taiwanese J. Math. 12 (2008), 1609–1624.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
982 SUN YOUNG JANG ET AL 973-983
SUPERSTABILITY OF (fr, fs)-DOUBLE DERIVATIONS IN QUASI-BANACH ALGEBRAS
[28] A. Najati, C. Park and J. Lee, Homomorphisms and derivations in C∗-ternary algebras, Abs. Appl.
Anal. 2009, Art. ID 612392, 16 pages (2009).
[29] C. Park, Sh. Ghaffary Ghaleh, K. Ghasemi, N -Jordan ∗-homomorphisms in C∗-algebras, Taiwanese
J. Math.16 (2012), 1803–1814.
[30] C. Park, K. Ghasemi, S. G. Ghaleh, S. Jang, Approximate n-Jordan ∗-homomorphisms in C∗-
algebras, J. Comput. Anal. Appl. 15 (2013), 365–368.
[31] C. Park, A. Najati and S. Jang, Fixed points and fuzzy stability of an additive-quadratic functional
equation, J. Comput. Anal. Appl. 15 (2013), 452–462.
[32] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc.
72 (1978), 297–300.
[33] Th. M. Rassias, On the stability of functional equations and a problem of Ulam, Acta Appl. Math.
62 (2000), 23–130.
[34] P. Semrl, The functional equation of multiplicative derivation is superstable on standard operator
algebras, Integral Equations and Operator Theory 18 (1994), 118–122.
[35] D. Shin, C. Park and Sh. Farhadabadi, On the superstability of ternary Jordan C∗-homomorphisms,
J. Comput. Anal. Appl. 16 (2014), 964–973.
[36] D. Shin, C. Park and Sh. Farhadabadi, Stability and superstability of J∗-homomorphisms and J∗-
derivations for a generalized Cauchy-Jensen equation, J. Comput. Anal. Appl. 17 (2014), 125–134.
[37] S. M. Ulam, Problems in Modern Mathematics, science ed, Wiley, New York, 1964, Chapter VI.
[38] T. Xu and Z. Yang, Direct and fixed point approaches to the stability of an AQ-functional equation
in non-Archimedean normed spaces, J. Comput. Anal. Appl. 17 (2014), 697–706.
Sun Young Jang
Department of Mathematics, University of Ulsan, Ulsan 680-749, Korea
E-mail address: [email protected]
Choonkil Park
Department of Mathematics, Research Institute for Natural Sciences, Hanyang Univer-
sity, Seoul 133-791, Korea
E-mail address: [email protected]
Pegah Efteghar
Department of Mathematics, Urmia University, Urmia, Iran
E-mail address: P [email protected]
Sharokh Farhadabadi
Department of Mathematics, Urmia University, Urmia, Iran
E-mail address: Shahrokh [email protected]
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
983 SUN YOUNG JANG ET AL 973-983
THE FIXED POINT METHOD FOR PERTURBATION OFBIHOMOMORPHISMS AND BIDERIVATIONS IN NORMED 3-LIE
SYSTEMS: REVISITED
CHOONKIL PARK, JUNG RYE LEE, EON WHA SHIM, AND DONG YUN SHIN∗
Abstract. Shokri et al. [11] proved the Hyers-Ulam stability of bihomomorphismsand biderivations on normed 3-Lie systems by using the fixed point method.
Under the conditions in the main theorems of [11, Section 2], we can show that therelated mappings must be zero.
In this paper, we correct the statements of the results in [11, Section 2], and provethe corrected theorems.
1. Introduction and preliminaries
The stability problems of functional equations and inequalities has been studied inmany mathmaticians (see [3, 4, 5, 6, 7, 9, 10, 12, 13, 14, 15]).
Shokri et al. [11] defined bihomomorphisms and biderivations.
Definition 1.1. ([11]) Let A and B be normed Lie triple systems. A C-bilinear mappingH : A× A→ B is called a bihomomorphism if it satisfies
H([x, y, z], w) = [H(x,w), H(y, w), H(z, w)],
H(x, [y, z, w]) = [H(x, y), H(x, z), H(x,w)]
for all x, y, z, w ∈ A.
Note that if we replace w by 2w in the first equality of the definition of bihomomor-phism then 2H([x, y, z], w) = 8[H(x,w), H(y, w), H(z, w)] and so H([x, y, z], w) = 0 forall x, y, z, w ∈ A. Similarly, one can show that H(x, [y, z, w]) = 0 for all x, y, z, w ∈ A.Thus we correct the definition of bihomomorphism as follows.
Definition 1.2. Let A and B be normed Lie triple systems. A C-bilinear mappingH : A× A→ B is called a bihomomorphism if it satisfies
H([x, y, z], w3) = [H(x,w), H(y, w∗), H(z, w)],
H(x3, [y, z, w]) = [H(x, y), H(x∗, z), H(x,w)]
for all x, y, z, w ∈ A.
Definition 1.3. ([11]) Let A and B be normed Lie triple systems. A C-bilinear mappingδ : A× A→ A is called a biderivation if it satisfies
δ([x, y, z], w) = [δ(x,w), y, z] + [x, δ(y, w), z] + [x, y, δ(z, w)],
δ(x, [y, z, w], w) = [δ(x, y), z, w] + [y, δ(x, z), w] + [y, z, δ(x,w)]
2010 Mathematics Subject Classification. Primary 17A40, 39B52, 47H10, 39B82, 16W25.Key words and phrases. Hyers-Ulam stability; bi-additive mapping; fixed point; Lie triple system;
bihomomorphism; biderivation.∗Corresponding author.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
984 CHOONKIL PARK ET AL 984-992
C. PARK, J. LEE, E.W. SHIM, AND D. SHIN
for all x, y, z, w ∈ A.
The w-variable of the left side in the first equality is C-linear and the x-variable ofthe left side in the second equality is C-linear. But the w-variable of the right sidein the first equality is not C-linear and the x-variable of the right side in the secondequality is not C-linear. Thus we correct the definition of biderivation as follows.
Definition 1.4. Let A and B be normed Lie triple systems. A C-bilinear mappingδ : A× A→ A is called a biderivation if it satisfies
δ([x, y, z], w) = [δ(x,w), y, z] + [x, δ(y, w∗), z] + [x, y, δ(z, w)],
δ(x, [y, z, w], w) = [δ(x, y), z, w] + [y, δ(x∗, z), w] + [y, z, δ(x,w)]
for all x, y, z, w ∈ A.
All the mappings T and δ, given in [11, Section 2], satisfy the bi-additive functionalequation (1.1) in [11]. Letting x = z = 0 in (1.1), we get f(y,−w) = f(y, w) for ally, w. Thus f is not bi-additive. So the results of [11, Section 2] are meaningless.
In this paper, we will replace the equation (1.1), given in [11], by
f(x+ y, z + w) + f(x+ y, z − w) = 2f(x, z) + 2f(y, z). (1)
Moreover, we correct the statements of the results in [11, Section 2], and prove thecorrected theorems.
Let X be a set. A function d : X ×X → [0,∞] is called a generalized metric on Xif d satisfies
(1) d(x, y) = 0 if and only if x = y;(2) d(x, y) = d(y, x) for all x, y ∈ X;(3) d(x, z) ≤ d(x, y) + d(y, z) for all x, y, z ∈ X.We recall a fundamental result in fixed point theory.
Theorem 1.5. [2] Let (X, d) be a complete generalized metric space and let J : X → Xbe a strictly contractive mapping with Lipschitz constant 0 < L < 1. Then for each givenelement x ∈ X, either
d(Jnx, Jn+1x) =∞for all nonnegative integers n or there exists a positive integer n0 such that
(1) d(Jnx, Jn+1x) <∞, ∀n ≥ n0;(2) the sequence Jnx converges to a fixed point y∗ of J ;(3) y∗ is the unique fixed point of J in the set Y = y ∈ X | d(Jn0x, y) <∞;(4) d(y, y∗) ≤ 1
1−Ld(y, Jy) for all y ∈ Y .
Throughout this paper, assume that A is a normed Lie triple system and B is aBanach Lie triple system.
2. Hyers-Ulam stability of bihomomorphisms in Banach Lie triple systems
For a given mapping f : A× A→ B, we define
Dλ,µf(x, y, z, w) = f(λx+ λy, µz + µw) + f(λx+ λy, µz − µw)
− 2λµf(x, z)− 2λµf(y, z)
for all x, y, z, w ∈ A and all λ, µ ∈ T1 := ν ∈ C : |ν| = 1.From now on, assume that f(0, z) = f(x, 0) = 0 for all x, z ∈ A.We need the following lemmas to obtain the main results.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
985 CHOONKIL PARK ET AL 984-992
BIHOMOMORPHISMS AND BIDERIVATIONS IN NORMED 3-LIE SYSTEMS
Lemma 2.1. ([1]) Let f : A× A→ B be a bi-additive mapping such that f(λx, µy) =λµf(x, y) for all x, y ∈ A and all λ, µ ∈T1. Then the mapping f : A × A → B isC-bilinear.
Lemma 2.2. Let f : A × A → B be a mapping satisfying Dλ,µf(x, y, z, w) = 0 for allx, y, z, w ∈ A and all λ, µ ∈T1. Then the mapping f : A× A→ B is C-bilinear.
Proof. Letting λ = µ = 1 in Dλ,µf(x, y, z, w) = 0, we get (1). Letting y = 0 in (1), weget f(x, z + w) + f(x, z − w) = 2f(x, z) for all x, z, w ∈ A. Letting w = 0 in (1), weget 2f(x+ y, z) = 2f(x, z) + 2f(y, z) for all x, y, z ∈ A. So f is bi-additive.
Letting y = w = 0 in Dλ,µf(x, y, z, w) = 0, we get 2f(λx, µz) = 2λµf(x, z) for allx, z ∈ A and all λ, µ ∈ T1. By Lemma 2.1, the mapping f : A×A→ B is C-bilinear.
Theorem 2.3. Let f : A × A → B be a mapping for which there exists a functionϕ : A4 → [0,∞) such that
‖Dλ,µf(x, y, z, w)‖ ≤ ϕ(x, y, z, w), (2)
‖f([x, y, z], w3)− [f(x,w), f(y, w∗), f(z, w)]‖ (3)
+‖f(x3, [y, z, w])− [f(x, y), f(x∗, z), f(x,w)]‖ ≤ ϕ(x, y, z, w)
for all λ, µ ∈ T1 and all x, y, z, w ∈ A. If there exists an L < 1 such that ϕ(x, y, z, w) ≤4Lϕ
(x2, y2, z2, w2
)for all x, y, z, w ∈ A, then there exists a unique bihomomorphism H :
A× A→ B such that
‖f(x, z)−H(x, z)‖ ≤ 1
4− 4Lϕ(x, x, z, z) (4)
for all x, z ∈ A.Proof. Letting λ = µ = 1, y = x and w = z in (2), we get
‖f(2x, 2z)− 4f(x, z)‖ ≤ ϕ(x, x, z, z) (5)
and so ∥∥∥∥f(x, z)− 1
4f(2x, 2z)
∥∥∥∥ ≤ 1
4ϕ(x, x, z, z) (6)
for all x, z ∈ A.Consider the set
S := h : A× A→ Band introduce the generalized metric on S:
d(g, h) = inf µ ∈ R+ : ‖g(x, z)− h(x, z)‖ ≤ µϕ (x, x, z, z) , ∀x, z ∈ A ,where, as usual, inf φ = +∞. It is easy to show that (S, d) is complete (see [8]).
Now we consider the linear mapping J : S → S such that
Jg(x, z) :=1
4g (2x, 2z)
for all x, z ∈ A.Let g, h ∈ S be given such that d(g, h) = ε. Then
‖g(x, z)− h(x, z)‖ ≤ εϕ (x, x, z, z)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
986 CHOONKIL PARK ET AL 984-992
C. PARK, J. LEE, E.W. SHIM, AND D. SHIN
for all x ∈ A. Hence
‖Jg(x, z)− Jh(x, z)‖ =
∥∥∥∥1
4g (2x, 2z)− 1
4h (2x, 2z)
∥∥∥∥ ≤ εLϕ (x, x, z, z)
for all x, z ∈ A. So d(g, h) = ε implies that d(Jg, Jh) ≤ εL. This means that
d(Jg, Jh) ≤ Ld(g, h)
for all g, h ∈ S.It follows from (6) that d(f, Jf) ≤ 1
4.
By Theorem 1.5, there exists a mapping H : A→ B satisfying the following:(1) H is a fixed point of J , i.e.,
H (2x, 2z) = 4H(x, z) (7)
for all x, z ∈ A. The mapping H is a unique fixed point of J in the set
M = g ∈ S : d(h, g) <∞.This implies that H is a unique mapping satisfying (7) such that there exists a µ ∈(0,∞) satisfying
‖f(x, z)−H(x, z)‖ ≤ µϕ (x, x, z, z)
for all x, z ∈ A;(2) d(Jnf,H)→ 0 as n→∞. This implies the equality
limn→∞
1
4nf (2nx, 2nz) = H(x, z) (8)
for all x, z ∈ A;(3) d(f,H) ≤ 1
1−αd(f, Jf), which implies the inequality
d(f,H) ≤ 1
4− 4L.
This implies that the inequality (4) holds true.It follows from (2) and (8) that
‖Dλ,µH(x, y, z, w)‖ =
∥∥∥∥ 1
4nDλ,µf(2nx, 2ny, 2nz, 2nw)
∥∥∥∥≤ 1
4nϕ(2nx, 2ny, 2nz, 2nw),
which tends to zero as n → ∞ for all λ, µ ∈ T1 and all x, y, z, w ∈ A. By Lemma 2.2,the mapping H : A× A→ B is C-bilinear.
Now let T : A× A→ B be another bi-additive mapping satisfying (4). Then
‖H(x, z)− T (x, z)‖ =1
4n‖H(2nx, 2nz)− T (2n, 2nz)‖
≤ 1
4n(‖H(2nx, 2nz)− f(2n, 2nz)‖+ ‖f(2nx, 2nz)− T (2n, 2nz)‖)
≤ 2
4nϕ(2nx, 2nx, 2nz, 2nz),
which tends to zero as n→∞. This proves the uniqueness of H.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
987 CHOONKIL PARK ET AL 984-992
BIHOMOMORPHISMS AND BIDERIVATIONS IN NORMED 3-LIE SYSTEMS
It follows from (3) that
‖H([x, y, z], w3)− [H(x,w), H(y, w∗), H(z, w)]‖+ ‖H(x3, [y, z, w])− [H(x, y), H(x∗, z), H(x,w)]‖
= limn→∞
1
64n(‖f([2nx, 2ny, 2nz], 8nw3)
− [f(2nx, 2nw), f(2ny, 2nw∗), f(2nz, 2nw)]‖+ ‖f(8nx3, [2ny, 2nz, 2nw])
− [f(2nx, 2ny), f(2nx∗, 2nz), f(2nx, 2nw)]‖)
≤ limn→∞
1
64nϕ(2n, 2ny, 2nz, 2nw) ≤ lim
n→∞
1
4nϕ(2n, 2ny, 2nz, 2nw) = 0
for all x, y, z, w ∈ A. So
H([x, y, z], w3) = [H(x,w), H(y, w∗), H(z, w)]
andH(x3, [y, z, w]) = [H(x, y), H(x∗, z), H(x,w)]
for all x, y, z, w ∈ A.Therefore, the mapping H is a unique bi-homomorphism satisfying (4).
Corollary 2.4. Let p and θ be positive real numbers with p < 2, and let f : A×A→ Bbe a mapping such that
‖Dλ,µf(x, y, z, w)‖ ≤ θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p), (9)
‖f([x, y, z], w3)− [f(x,w), f(y, w∗), f(z, w)]‖+‖f(x3, [y, z, w])− [f(x, y), f(x∗, z), f(x,w)]‖
≤ θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p) (10)
for all λ, µ ∈ T1 and all x, y, z, w ∈ A. Then there exists a unique bihomomorphismH : A× A→ B such that
‖f(x, y)−H(x, y)‖ ≤ 2θ
4− 2p(‖x‖p + ‖y‖p)
for all x, y ∈ A.
Proof. Defining ϕ(x, y, z, w) := θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p) and letting L = 2p−2 inTheorem 2.3, we obtain the desired result.
Similarly, one can obtain the following.
Theorem 2.5. Let f : A × A → B be a mapping for which there exists a functionϕ : A4 → [0,∞) satisfying (2) and (3). If there exists an L < 1 such that ϕ(x, y, z, w) ≤L64ϕ(2x, 2y, 2z, 2w) for all x, y, z, w ∈ A, then there exists a unique bihomomorphism
H : A× A→ B such that
‖f(x, z)−H(x, z)‖ ≤ L
64− 64Lϕ(x, x, z, z) (11)
for all x, z ∈ A.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
988 CHOONKIL PARK ET AL 984-992
C. PARK, J. LEE, E.W. SHIM, AND D. SHIN
Note that L64ϕ(2x, 2y, 2z, 2w) ≤ L
4ϕ(2x, 2y, 2z, 2w) for all x, y, zw ∈ A.
Proof. Let (S, d) be the generalized metric space defined in the proof of Theorem 2.3.Now we consider the linear mapping J : S → S such that
Jg(x, z) := 4g(x
2,z
2
)for all x, z ∈ A.
It follows from (5) that∥∥∥f(x, z)− 4f(x
2,z
2
)∥∥∥ ≤ ϕ(x
2,x
2,z
2,z
2
)≤ L
64ϕ (x, x, z, z) ≤ L
4ϕ (x, x, z, z)
for all x, z ∈ A. Thus d(f, Jf) ≤ L4. So
d(f,H) ≤ L
4− 4L.
The rest of the proof is similar to the proof of Theorem 2.3.
Corollary 2.6. Let p and θ be positive real numbers with p > 6, and let f : A×A→ Bbe a mapping satisfying (9) and (10). Then there exists a unique bihomomorphismH : A× A→ B such that
‖f(x, y)−H(x, y)‖ ≤ 2θ
2p − 4(‖x‖p + ‖y‖p)
for all x, y ∈ A.
Proof. Defining ϕ(x, y, z, w) := θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p) and letting L = 22−p inTheorem 2.5, we obtain the desired result.
3. Hyers-Ulam stability of biderivations on Banach Lie triple systems
In this section, we prove the Hyers-Ulam stability of biderivations on Banach Lietriple systems.
Theorem 3.1. Let f : A× A→ A be a mapping such that
‖Dλ,µf(x, y, z, w)‖ ≤ ϕ(x, y, z, w), (12)
‖f([x, y, z], w)− [f(x,w), y, z]− [x, f(y, w∗), z]− [x, y, f(z, w)]‖ (13)
+‖f(x, [y, z, w])− [f(x, y), z, w]− [y, f(x∗, z), w]− [y, z, f(x,w)]‖≤ ϕ(x, y, z, w)
for all λ, µ ∈ T1 and all x, y, z, w ∈ A. Assume that there exists an L < 1 such thatϕ(x, y, z, w) ≤ 4Lϕ
(x2, y2, z2, w2
)for all x, y, z, w ∈ A. If the mapping f : A × A → A
satisfies
limn→∞
1
4nf(2nx, 2nz) = lim
n→∞
1
16nf(8nx, 2nz) = lim
n→∞
1
16nf(2nx, 8nz) (14)
for all x, z ∈ A, then there exists a unique biderivation δ : A× A→ A such that
‖f(x, z)− δ(x, z)‖ ≤ 1
4− 4Lϕ(x, x, z, z) (15)
for all x, z ∈ A.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
989 CHOONKIL PARK ET AL 984-992
BIHOMOMORPHISMS AND BIDERIVATIONS IN NORMED 3-LIE SYSTEMS
Proof. By the same reasoning as in the proof of Theorem 2.3, we get a unique C-bilinearmapping δ : A× A→ A given by δ(x, z) := limn→∞
14nf(2nx, 2nz) satisfying (15).
It follows from (13) and (14) that
‖δ([x, y, z], w)− [δ(x,w), y, z]− [x, δ(y, w∗), z]− [x, y, δ(z, w)]‖+ ‖δ(x, [y, z, w])− [δ(x, y), z, w]− [y, δ(x∗, z), w]− [y, z, δ(x,w)]‖
= limn→∞
1
16n(‖f(8n[x, y, z], 2nw)− [f(2nx, 2nw), 2ny, 2nz]
− [2nx, f(2ny, 2nw∗), 2nz]− [2nx, 2ny, f(2nz, 2nw)]‖+ ‖f(2nx, 8n[y, z, w])− [f(2nx, 2ny), 2nz, 2nw]
− [2ny, f(2nx∗, 2nz), 2nw]− [2ny, 2nz, f(2nx, 2nw)]‖)
≤ limn→∞
1
16nϕ(2nx, 2ny, 2nz, 2nw) ≤ lim
n→∞
1
4nϕ(2nx, 2ny, 2nz, 2nw) = 0
for all x, y, z, w ∈ A. So
δ([x, y, z], w) = [δ(x,w), y, z] + [x, δ(y, w∗), z] + [x, y, δ(z, w)]
and
δ(x, [y, z, w]) = [δ(x, y), z, w] + [y, δ(x∗, z), w] + [y, z, δ(x,w)]
for all x, y, z, w ∈ A.Therefore, the mapping δ : A×A→ A is a biderivation satisfying (15), as desired.
Corollary 3.2. Let p and θ be positive real numbers with p < 2, and let f : A×A→ Abe a mapping satisfying (14) and
‖Dλ,µf(x, y, z, w)‖ ≤ θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p), (16)
‖f([x, y, z], w)− [f(x,w), y, z]− [x, f(y, w∗), z]− [x, y, f(z, w)]‖ (17)
+‖f(x, [y, z, w])− [f(x, y), z, w]− [y, f(x∗, z), w]− [y, z, f(x,w)]‖≤ θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p)
for all λ, µ ∈ T1 and all x, y, z, w ∈ A. Then there exists a unique biderivation δ :A× A→ A such that
‖f(x, y)− δ(x, y)‖ ≤ 2θ
4− 2p(‖x‖p + ‖y‖p)
for all x, y ∈ A.
Proof. Defining ϕ(x, y, z, w) := θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p) and letting L = 2p−2 inTheorem 3.1, we obtain the desired result.
Theorem 3.3. Let f : A×A→ A be a mapping satisfying (12) and (13). Assume thatthere exists an L < 1 such that ϕ(x, y, z, w) ≤ L
16ϕ(2x, 2y, 2z, 2w) for all x, y, z, w ∈ A.
If the mapping f : A× A→ A satisfies
limn→∞
4nf( x
2n,z
2n
)= lim
n→∞16nf
( x8n,z
2n
)= lim
n→∞16nf
( x2n,z
8n
)(18)
for all x, z ∈ A, then there exists a unique biderivation δ : A× A→ A such that
‖f(x, z)− δ(x, z)‖ ≤ L
4− 4Lϕ(x, x, z, z) (19)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
990 CHOONKIL PARK ET AL 984-992
C. PARK, J. LEE, E.W. SHIM, AND D. SHIN
for all x, z ∈ A.Proof. By the same reasoning as in the proof of Theorem 2.3, we get a unique C-bilinearmapping δ : A× A→ A given by δ(x, z) := limn→∞ 4nf
(x2n, z2n
)satisfying (19).
It follows from (13) and (18) that
‖δ([x, y, z], w)− [δ(x,w), y, z]− [x, δ(y, w∗), z]− [x, y, δ(z, w)]‖+ ‖δ(x, [y, z, w])− [δ(x, y), z, w]− [y, δ(x∗, z), w]− [y, z, δ(x,w)]‖
= limn→∞
16n(∥∥∥∥f ( [x, y, z]
8n,w
2n
)−[f( x
2n,w
2n
),y
2n,z
2n
]−[x
2n, f
(y
2n,w∗
2n
),z
2n
]−[ x
2n,y
2n, f( z
2n,w
2n
)]∥∥∥∥+
∥∥∥∥f ( x
2n,[y, z, w]
8n
)−[f( x
2n,y
2n
),z
2n,w
2n
]−[
y
2n, f
(x∗
2n,z
2n
),w
2n
]−[ y
2n,z
2n, f( x
2n,w
2n
)]∥∥∥∥)≤ lim
n→∞16nϕ
( x2n,y
2n,z
2n,w
2n
)= 0
for all x, y, z, w ∈ A. So
δ([x, y, z], w) = [δ(x,w), y, z] + [x, δ(y, w∗), z] + [x, y, δ(z, w)]
and
δ(x, [y, z, w]) = [δ(x, y), z, w] + [y, δ(x∗, z), w] + [y, z, δ(x,w)]
for all x, y, z, w ∈ A.Therefore, the mapping δ : A×A→ A is a biderivation satisfying (19), as desired.
Corollary 3.4. Let θ and p be positive real numbers with p > 4 and let f : A×A→ Abe a mapping satisfying (16), (17) and (18). Then there exists a unique biderivationδ : A× A→ A such that
‖f(x, z)− δ(x, z)‖ ≤ 2θ
2p − 4(‖x‖p + ‖z‖p) (20)
for all x, z ∈ A.
Proof. Defining ϕ(x, y, z, w) := θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p) and letting L = 22−p inTheorem 3.3, we obtain the desired result.
Acknowledgments
C. Park was supported by Basic Science Research Program through the NationalResearch Foundation of Korea funded by the Ministry of Education, Science and Tech-nology (NRF-2012R1A1A2004299), and D. Y. Shin was supported by Basic ScienceResearch Program through the National Research Foundation of Korea funded by theMinistry of Education, Science and Technology (NRF-2010-0021792)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
991 CHOONKIL PARK ET AL 984-992
BIHOMOMORPHISMS AND BIDERIVATIONS IN NORMED 3-LIE SYSTEMS
References
[1] J. Bae and W. Park, Approximate bi-homomorphisms and bi-derivations in C∗-ternary algebras,Bull. Korean Math. Soc. 47 (2010) 195–209.
[2] J. Diaz and B. Margolis, A fixed point theorem of the alternative for contractions on a generalizedcomplete metric space, Bull. Amer. Math. Soc. 74 (1968), 305–309.
[3] M. Eshaghi Gordji and A. Bodaghi, On the stability of quadratic double centralizers on Banachalgebras, J. Comput. Anal. Appl. 13 (2011), 724–729.
[4] M. Eshaghi Gordji, R. Farokhzad Rostami and S.A.R. Hosseinioun, Nearly higher derivations inunital C∗-algebras, J. Comput. Anal. Appl. 13 (2011), 734–742.
[5] M. Eshaghi Gordji, G. Kim, J. Lee and C. Park, Generalized ternary bi-derivations on ternaryBanach algebras: a fixed point approach, J. Comput. Anal. Appl. 15 (2013), 45–54.
[6] L. Li, G. Lu, C. Park and D. Shin, Additive functional inequalities in generalized quasi-Banachspaces, J. Comput. Anal. Appl. 15 (2013), 1165–1175.
[7] G. Lu, Y. Jiang and C. Park, Additive functional equation in Frechet spaces, J. Comput. Anal.Appl. 15 (2013), 369–373.
[8] D. Mihet and V. Radu, On the stability of the additive Cauchy functional equation in randomnormed spaces, J. Math. Anal. Appl. 343 (2008), 567–572.
[9] C. Park, K. Ghasemi, S. G. Ghaleh, S. Jang, Approximate n-Jordan ∗-homomorphisms in C∗-algebras, J. Comput. Anal. Appl. 15 (2013), 365–368.
[10] C. Park, A. Najati and S. Jang, Fixed points and fuzzy stability of an additive-quadratic functionalequation, J. Comput. Anal. Appl. 15 (2013), 452–462.
[11] J. Shokri, A. Ebadian and R. Aghalari, The fixed point method for perturbation of bihomomor-phisms and biderivations in normed 3-Lie algebras, Int. J. Geom. Methods Mod. Phys. 10 (2013),No. 6, Art. ID 1350020, 13 pages.
[12] S. Shagholi, M. Eshaghi Gordji and M. Bavand Savadkouhi, Stability of ternary quadratic deriva-tions on ternary Banach algebras, J. Comput. Anal. Appl. 13 (2011), 1097–1105.
[13] S. Shagholi, M. Eshaghi Gordji and M. Bavand Savadkouhi, Nearly ternary cubic homomorphismsin ternary Frechet algebras, J. Comput. Anal. Appl. 13 (2011), 1106–1114.
[14] D. Shin, C. Park and Sh. Farhadabadi, On the superstability of ternary Jordan C∗-homomorphisms, J. Comput. Anal. Appl. 16 (2014), 964–973.
[15] D. Shin, C. Park and Sh. Farhadabadi, Stability and superstability of J∗-homomorphisms andJ∗-derivations for a generalized Cauchy-Jensen equation, J. Comput. Anal. Appl. 17 (2014), 125–134.
Choonkil ParkDepartment of Mathematics, Research Institute for Natural Sciences, Hanyang Uni-versity, Seoul 133-791, Korea
E-mail address: [email protected]
Jung Rye LeeDepartment of Mathematics, Daejin University, Kyeonggi 487-711, Korea
E-mail address: [email protected]
Eon Wha ShimDepartment of Mathematics, Hanyang University, Seoul 133-791, Korea
E-mail address: [email protected]
Dong Yun ShinDepartment of Mathematics, University of Seoul, Seoul 130-743, Korea
E-mail address: [email protected]
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
992 CHOONKIL PARK ET AL 984-992
Dynamics of some Rational Difference Equations
H. El-Metwally1,3, E.M. Elsayed2,3 and H. El-Morshedy41Department of Mathematics, Rabigh College of Scienceand Art, King Abdulaziz University, P.O. Box 344,
Rabigh 21911, Saudi Arabia.2King Abdulaziz University, Faculty of Science,Mathematics Department, P. O. Box 80203,
Jeddah 21589, Saudi Arabia.3Department of Mathematics, Faculty of Science,Mansoura University, Mansoura 35516, Egypt.
4Department of Mathematics, Damietta Faculty of Science,Mansoura University, New damietta 34517, Egypt.
1E-mail: [email protected] & [email protected],[email protected].
AbstractThe main goal of this paper is to investigate the qualitative behavior ofthe solutions for the following rational difference equation:
xn+1 =
α+k
i=0
a2ixn−2i
β +k
i=0
b2i+1xn−2i−1
, n = 0, 1, 2, ...
where α, β, ai, bi ∈ (0,∞), i = 0, 1, ..., k; with the initial conditionsx0, x−1, ..., x−2k, x−2k−1 ∈ (0,∞). We determine the equilibrium pointsof the considered equation and then study their local stability. Also westudy the boundedness and the permanence of the solutions. Finally weinvestigate the global asymptotically stable of the equilibrium points.
Keywords: permanence, global stability, difference equations.Mathematics Subject Classification: 39A10––––––––––––––––––––––
1 IntroductionRational difference equations is an important class of difference equations wherethey have many applications, for example, the difference equation
xn+1 =a+bxnc+xn
, n ≥ 0,
1
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
993 H. El-Metwally et al 993-1003
has applications in Optics and Mathematical Biology and is known in the liter-ature as the Riccati difference equation. The equation
xn+1 =1+xnxn−1
, n ≥ 0,
was discovered by Lyness [12] while he was working on a problem in NumberTheory. Also this equation has many applications in geometry (see Leech [10])and in frieze patterns (see Conway and Coxeter [4]). Also, we believe thatthe results about rational difference equations are of paramount importance intheir on right and offer prototypes towards the development of the basic theoryof the global behavior of solutions of nonlinear difference equations of ordergreater than one, so, there has been a great interest in studying the qualitativeproperties of rational difference equations by several authors such as Kulenovicand Ladas [9] presented some known results and derived several new ones on theboundedness, the global stability, and the periodicity of solutions of all rationaldifference equations of the form
xn+1 =α+βxn+γxn−1A+Bxn+Cxn−1
.
Also, Camouzis and Ladas [2] presented the global character of solutions ofthe third-order rational difference equation. They presented a summary of therecent work and a large number of open problems and conjectures on the thirdorder rational recursive sequence of the form
xn+1 =α+βxn+γxn−1+δxn−2A+Bxn+Cxn−1+Dxn−2
.
Li and Sun [11] investigated the periodic character, invariant intervals and globalstability of all positive solutions of the recursive sequence
xn+1 =pxn+xn−kq+xn−k
.
Kocic et al. [8] examined the periodicity and oscillating properties of the positivesolutions as well as the global attractivity of the nonnegative equilibrium of thedifference equation
xn+1 =a+bxnd+xn−k
.
In [6], the author studied the boundedness, the existence of prime period tosolutions and the global attracitvity of solutions of the following recursive se-quences
xn+1 =ax
l0n−k0
xl1n−k1
...xlin−ki
+bxs0n−r0
xs1n−r1
...xsjn−rj
cxl0n−k0
xl1n−k1
...xlin−ki
+dxs0n−r0
xs1n−r1
...xsjn−rj
, n ≥ 0, (1)
yn+1 = α0yn+α1yn−1+...+αtyn−tβ0yn+β1yn−1+...+βtyn−t
, n ≥ 0. (2)
Some related results to rational difference equations can be found in [1,3,5,13]and the references therein.
2
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
994 H. El-Metwally et al 993-1003
Let I be an interval of real numbers and let F : Ik+1 → I be a continuouslydifferentiable function. Consider the difference equation
yn+1 = F (yn, yn−1, ..., yn−k) , n = 0, 1, ..., (3)
with y−k, ..., y0 ∈ I.Recall that the point y ∈ I is called an equilibrium point of Eq.(3) if
F (y, y, ..., y) = y.
That is, yn = y for n ≥ 0, is a solution of Eq.(3), or equivalently, y is a fixedpoint of F .Let y be an equilibrium point of Eq.(3). Then the linearized equation of Eq.(3)about y is given by
wn+1 =kPi=0
piwn−i, n = 0, 1, ..., (4)
where pi =∂f
∂yn−i(y, ..., y), i = 0, 1, 2..., k and the characteristic equation of
Eq.(4) isλ(k+1) − p1λ
k − p2λ(k−1) − ...− pkλ− p(k+1) = 0.
Theorem A [8]: Assume that p, q ∈ R and k ∈ 0, 1, 2, .... Then |p|+ |q| < 1is a sufficient condition for the asymptotic stability of the difference equation
un+1 + pun + qun−k = 0, n = 0, 1, ... .
Remark: Theorem A can be easily extended to a general linear equations ofthe form
un+k + p1un+k−1 + ...+ pkun = 0, n = 0, 1, ... (5)
where p1, p2, ..., pk and k ∈ 1, 2, .... Then Eq.(5) is asymptotically stable pro-vided that
Pki=1 |pi| < 1.
Theorem B [7]: Let yn∞n=−k be a solution of Eq.(3), and suppose that thereexist constants A ∈ I and B ∈ I such that A ≤ yn ≤ B for all n ≥ −k. Let0 be a limit point of the sequence yn∞n=−k. Then the following statements aretrue:(i) There exists a solution Ln∞n=−∞ of Eq.(3), called a full limiting sequenceof yn∞n=−k, such that L0 = 0, and such that for every N ∈ ...,−1,0,1,... LNis a limit point of yn∞n=−k.(ii) For every i0 ≤ −k, there exists a subsequence yri∞i=0 of yn∞n=−k suchthat LN = lim
i→∞yri+N for every N ≥ i0.
Theorem C [9]: Let [p, q] be an interval of real numbers and assume that
g : [p, q]3 → [p, q],
3
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
995 H. El-Metwally et al 993-1003
is a continuous function satisfying the following properties :(a) g(x, y, z) is non-decreasing in y and z in [p, q] for each x ∈ [p, q], and isnon-increasing in x ∈ [p, q] for each y and z in [p, q];(b) If (m,M) ∈ [p, q]× [p, q] is a solution of the system
M = g(m,M,M) and m = g(M,m,m),
then m =M. Then Eq.(5) has a unique equilibrium x ∈ [p, q] and every solutionof Eq.(5) converges to x.In this paper we study the boundedness character and investigate the globalstability for the solutions of the following difference equation:
xn+1 =
α+[ k+12 ]Pi=0
a2ixn−2i
β +[ k+12 ]Pi=0
b2i+1xn−2i−1
, n = 0, 1, 2, .., (6)
where α, β ∈ [0,∞), ai, bi ∈ (0,∞) for i = 0, 1, ..., k; and k ∈ 10, 1, 2, ... withthe initial conditions x0, x−1, ..., x−2k, x−2k−1 ∈ (0,∞).
2 Local Stability of Eq.(6)In this section we discuss the local stability of the equilibrium points of Eq.(6).
Let A =[ k+12 ]Pi=0
a2i and B =[ k+12 ]Pi=0
b2i+1, then the following statements are true:
(i) At α = 0 and β = 0, Eq.(6) has the equilibrium point x = 0 and the uniquepositive equilibrium point x = A
B .(ii) At α = 0 and β < A, Eq.(6) has the equilibrium point x = 0 and the positiveequilibrium point x = A−β
B .(iii) At α = 0 and β ≥ A, Eq.(6) has the unique equilibrium point x = 0.(iv) At α 6= 0 and β = 0, Eq.(6) has the unique positive equilibrium pointx = A+
√A2+4αB2B .
(v) At α 6= 0 and β 6= 0, Eq.(6) has the unique positive equilibrium point
x =A−B+
√(A−B)2+4αB2B .
The following theorem deals with the local stability of the positive equilibriumpoint of Eq.(6).
Theorem 1 The equilibrium point x =A−B+
√(A−B)2+4αB2B of Eq.(6) is locally
stable if A < β.
Proof. The linearized equation of Eq.(6) about the equilibrium point x =A−B+
√(A−B)2+4αB2B is given by
zn+1 =kPi=0
∂f(x,x,...,x)∂xn−i
zn−i =kPi=0
a2iβ+Bxzn−2i −
kPi=0
b2i+1(α+Ax)(β+Bx)2 zn−2i−1
4
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
996 H. El-Metwally et al 993-1003
for n = 0, 1, ... and the associated characteristic equation about x is
F (λ) = λ2k+2 −kPi=0
a2iβ+Bxλ
2(k−i)+1 +kPi=0
b2i+1(α+Ax)(β+Bx)2 λ2(k−i) = 0.
Then it follows by Theorem A that x is locally stable if
Aβ+Bx +
B(α+Ax)(β+Bx)2 < 1⇐⇒ A
β+Bx +Bx
β+Bx < 1⇐⇒ A < β.
This ends the proof of the theorem.
3 Boundedness of SolutionsHere we study the permanence of Eq.(6).
Theorem 2 Assume that A < β. Then every solution of Eq.(6) is bounded andpersists.
Proof. Let xn∞n=−2k−1 be a solution of Eq.(6). Then
xn+1 =
α+[ k+12 ]Pi=0
a2ixn−2i
β +[ k+12 ]Pi=0
b2i+1xn−2i−1
≤ αβ +
1β
[ k+12 ]Pi=0
a2ixn−2i.
Then lim supxnn−→∞
≤ αβ−A
def= M. Thus xn ≤M for all n ≥ 1.
Now we wish to find a constant m > 0 such that xn ≥ m for all n ≥ 1. Thechange of variables xn = 1
yn, gives Eq.(6) in the form
1
yn+1=
α+ a0yn+ a2
yn−2+ ...+ a2k
yn−2k
β + b1yn−1
+ b3yn−3
+ ...+ b2k+1yn−2k−1
,
or in the equivalent form
yn+1 =β + b1
yn−1+ b3
yn−3+ ...+ b2k+1
yn−2k−1
α+ a0yn+ a2
yn−2+ ...+ a2k
yn−2k
≤β + b1
yn−1+ b3
yn−3+ ...+ b2k+1
yn−2k−1
α
≤β +M
kPi=0
b2i+1
α≤ β +MB
αfor all n ≥ 1.
Thus we obtain
xn =1
yn≥ α
β +BM
def= m for all n ≥ 1.
Therefor we see that
m ≤ xn ≤M for all n ≥ 1.Then the proof is so complete.
5
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
997 H. El-Metwally et al 993-1003
Theorem 3 Assume that A < β. Then every solution of Eq.(6) is bounded andpersists.
Proof. Let xn∞n=−2k−1 be a solution of Eq.(6).Set H = maxx−2k−1, x−2k, ..., x0, α
β−A, then it follows from (6) that
x1 =
α+[ k+12 ]Pi=0
a2ix−2i
β +[ k+12 ]Pi=0
b2i+1x−2i−1
≤α+H
[ k+12 ]Pi=0
a2i
β≤ α+AH
β≤ H.
It follows by induction that xn ≤ H for all n ≥ 0. Now we wish to find aconstant h > 0 such that xn ≥ h for all n ≥ 1.Again it follows from Eq.(7) that
x1 =α+
[ k+12
]Pi=0
a2ix−2i
β+
[ k+12
]Pi=0
b2i+1x−2i−1
≥ α
β+H
[ k+12
]Pi=0
b2i+1
≥ αβ+BH
def= h.
Then it follows by induction that xn ≥ h for all n ≥ 1.
4 Global Stability of the Equilibrium PointsTheorem 4 Let α = 0 and assume that A < β. Then every nonnegative solu-tion of Eq.(6) converges to the unique equilibrium point of Eq.(6) x = 0.
Proof. It follows by Theorem B that there exist solutions In∞n=−∞ andSn∞n=−∞ of Eq.(6) with
I = I0 = limn→∞
inf xn ≤ limn→∞
sup xn = S0 = S,
whereIn, Sn ∈ [I,S] , n = 0,− 1,... .
Since x = 0 is the unique nonnegative equilibrium point of Eq.(6), then it sufficesto show that S = 0. Suppose for the sake of contradiction that S > 0.Then itfollows from Eq.(6) that
S =a0S−1 + a2S−3 + ...+ a2kS−2k−1
β + b1S−2 + b3S−4 + ...+ b2k+1S−2k−1≤ AS
β +BI,
and so0 ≤ BSI ≤ (A− β)S < 0,
which is a contradiction. Hence
limn→∞
xn = x = 0.
which is true by the hypothesis of the theorem and this completes the proof.
6
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
998 H. El-Metwally et al 993-1003
Theorem 5 Assume that A < β, then the equilibrium point
x =A−B +
p(A−B)2 + 4αB
2B
of Eq.(6) is global attractor of the solutions of Eq.(6).
Proof. It was shown in Theorem 2 that m ≤ xn ≤ M for all n ≥ 1.Then itfollows again by Theorem B that there exist solutions In∞n=−∞ and Sn∞n=−∞of Eq.(6) with
I = I0 = limn→∞
inf xn ≤ limn→∞
sup xn = S0 = S,
whereIn, Sn ∈ [I,S] , n = 0,− 1,... .
It suffices to show that I ≥ S.Now it follows from Eq.(6) that
I =α+ a0I−1 + a2I−3 + ...+ a2kI−2k−1
β + b1I−2 + b1I−2a2I−3 + ...+ a2kI−2k−1≥ α+AI
β +BS
and so(β −A)I +BSI ≥ α. (7)
Similarly, we see from Eq.(6) that
S = α+a0S−1+a2S−3+...+a2kS−2k−1β+b1S−2+b3S−4+...+b2k+1S−2k−1
≤ α+ASβ+BI ,
and so(β −A)S +BSI ≤ α. (8)
Then we obtain from relations (7) and (8) that
(β −A)S +BSI ≤ α ≤ (β −A)I +BSI,
thus(β −A)(I − S) ≥ 0
and since (β −A) > 0, then we should have I ≥ S.This completes the proof.We give the following two theorems which is a minor modification of TheoremA.0.2 in [9].
Theorem 6 Let [a, b] be an interval of real numbers and assume that f : [a, b]k+1 →[a, b], is a continuous function satisfying the following properties:
(i) f(x0, x1, ..., xk) is non-decreasing in its arguments x2t with t ∈©0, 1, 2, ..., [k+12 ]
ªfor each xr (r 6= 2t) in [a, b] and non-increasing in its arguments x2r+1 withr ∈
©0, 1, 2, ..., [k+12 ]
ªfor all xt (t 6= r) in [a, b].
7
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
999 H. El-Metwally et al 993-1003
(ii) If (M,m) ∈ [a, b]× [a, b] is a solution of the system
M = f(M,m,M,m, ...,M,m, ...,M,m), m = f(m,M,m,M, ...,m,M...,m,M ),
implies m =M. Then the difference equation xn+1 = f(xn, xn−1, ..., xn−k) hasa unique equilibrium x ∈ [a, b] and every solution of the equation converges tox.
Proof. Setm0 = a and M0 = b,
and for each i = 1, 2, ... set
mi = f(mi−1,Mi−1,mi−1,Mi−1, ...,mi−1,Mi−1,mi−1, ...,mi−1,Mi−1),
and
Mi = f(Mi−1,mi,Mi−1,mi, ...,Mi−1,mi−1,Mi−1, ...,Mi−1,mi−1).
Now observe that for each i ≥ 0,
a = m0 ≤ m1 ≤ ... ≤ mi ≤ ... ≤Mi ≤ ... ≤M1 ≤M0 = b,
andmi ≤ xp ≤Mi for p ≥ (k + 1)i+ 1.
Setm = lim
i→∞mi and M = lim
i→∞Mi.
ThenM ≥ lim
i→∞supxi ≥ lim inf
i→∞xi ≥ m
and by the continuity of f ,
M = f(M,m,M,m, ...,M,m, ..,M,m) and m = f(m,M,m,M, ...,m,M, ...,m,M ).
In view of (ii),m =M = x,
from which the result follows.
Theorem 7 Let [a, b] be an interval of real numbers and assume that f : [a, b]k+1 →[a, b], is a continuous function satisfying the following properties:
(i) f(x0, x1, ..., xk) is non-increasing in its arguments x2t with t ∈©0, 1, 2, ..., [k+12 ]
ªfor each xr (r 6= 2t) in [a, b] and non-decreasing in its arguments x2r+1 withr ∈
©0, 1, 2, ..., [k+12 ]
ªfor all xt (t 6= r) in [a, b].
(ii) If (M,m) ∈ [a, b]× [a, b] is a solution of the system
M = f(m,M,m,M, ...,m,M, ...,m,M ), m = f(M,m,M,m, ...,M,m...,M,m),
8
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1000 H. El-Metwally et al 993-1003
impliesm =M.
Then the difference equation xn+1 = f(xn, xn−1, ..., xn−k) has a unique equilib-rium x ∈ [a, b] and every solution of the equation converges to x.
Proof. As the proof of Theorem 6 and will be omitted.
Theorem 8 Assume that A 6= β. Then every nonnegative solution of Eq.(6)
converges to the unique equilibrium point of Eq.(6) x =A−B+
√(A−B)2+4αB2B .
Proof. Rewrite Eq. (6) in the following form
xn+1 = f(xn, xn−1, ..., xn−k) =
α+[ k+12 ]Pi=0
a2ixn−2i
β +[ k+12 ]Pi=0
b2i+1xn−2i−1
, n = 0, 1, 2, ... .
Then the function f satisfies the hypotheses (i) of Theorem 6. Now considerthe system
M = f(M,m,M,m, ...,M,m) = α+AMβ+Bm , m = f(m,M,m,M, ...,m,M ) = α+Am
β+BM .
Thus it is easy to see thatm =M. Therefore the function f satisfies the hypothe-ses (ii) of Theorem 6 too. Then it follows by Theorem 6 that the equilibrium
point x =A−B+
√(A−B)2+4αB2B of Eq.(6) is a global attractor of the solutions of
Eq.(6).
Theorem 9 Let α = 0 and A < β. Then every nonnegative solution of Eq.(6)converges to the unique equilibrium point of Eq.(6) x = 0.
Proof. The proof is similar to the proof of Theorem 8 and will be omitted.
Theorem 10 Let α = 0 and β = 0. Then every positive solution of Eq.(6)converges to the unique positive equilibrium point of Eq.(6) x = A
B .
Proof. The proof is similar to the proofs of Theorem 5 and Theorem 8 andwill be omitted.
Theorem 11 Let α = 0 and β < A. Then every nonnegative solution of Eq.(6)
converges to the unique positive equilibrium point of Eq.(6) x =A− β
B.
Proof. The proof is similar to the proofs of Theorem 5 and Theorem 8 andwill be omitted.
Theorem 12 Let α 6= 0 and β = 0. Then every positive solution of Eq.(6) con-
verges to the unique positive equilibrium point of Eq.(6) x =A+√A2 + 4αB
2B.
9
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1001 H. El-Metwally et al 993-1003
Proof. The proof is similar to the proofs of Theorem 5 and Theorem 8 andwill be omitted.Remark: It is easy to obtain -by using Theorem B and Theorem 7- similarresults for the following difference equation
yn+1 =
δ +[ k+12 ]Pi=0
p2i+1yn−2i−1
γ +[ k+12 ]Pi=0
q2iyn−2i
.
Acknowledgements
This article was funded by the Deanship of Scientific Research (DSR), KingAbdulaziz University, Jeddah. The authors, therefore, acknowledge with thanksDSR technical and financial support.
References[1] M. Aloqeili, Dynamics of a rational difference equation, Appl. Math.
Comp., 176 (2) (2006), 768-774.
[2] E. Camouzis and G. Ladas, Dynamics of Third-Order Rational DifferenceEquations with Open Problems and Conjectures, vol. 5 of Advances in Dis-crete Mathematics and Applications, Chapman & Hall/CRC, Boca Raton,Fla, USA, 2008.
[3] C. Cinar, R. Karatas and I. Yalcinkaya, On solutions of the difference
equation xn+1 =xn−3
−1 + xnxn−1xn−2xn−3, Mathematica Bohemica, 132 (3)
(2007), 257-261.
[4] J. H.Conway and H. S. M.Coxeter, Triangulated polygons and frieze pat-terns, math. Gaz. 57 (400) (1973), 87-94.
[5] E. M. Elabbasy and E. M. Elsayed, Dynamics of a Rational DifferenceEquation, Chinese Annals of Math., Series B, 30 B (2), ( March — 2009),187—198.
[6] H. El-Metwally, Qualitative Proprieties of some Higher Order DifferenceEquations, Comput. Math. Appl., 58(4) (2009), 686-692.
[7] H. El-Metwally, Qualitative Study of Nonlinear Difference Equations: Dif-ferential and Difference Equations, LAP Lambert Academic Publishing,2010.
10
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1002 H. El-Metwally et al 993-1003
[8] V. L. Kocic and G. Ladas, Global Behavior of Nonlinear Difference Equa-tions of Higher Order with Applications, Kluwer Academic Publishers, Dor-drecht, 1993.
[9] M. R. S. Kulenovic and G. Ladas, Dynamics of Second Order RationalDifference Equations with Open Problems and Conjectures, Chapman &Hall / CRC Press, 2001.
[10] J. Leech, The rational cuboid revisited, Amer. Math. Monthly, 84 (1977),518-533.
[11] W. Li and H. R. Sun, Dynamics of a rational difference equation, Appl.Math. Comp., 163 (2005), 577—591.
[12] R. C. Lyness, Note 1581, Math. Gaz., 26:62 (1942).
[13] I. Yalcinkaya, On the global attractivity of positive solutions of a rationaldifference equation, Selçuk J. Appl. Math., 9 (2) (2008), 3-8.
11
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1003 H. El-Metwally et al 993-1003
Yongmin Liu
Generalized integration operators from Hardy spaces to
Zygmund-type spaces ∗†
Huiying Qu, Yongmin Liu ‡ and Shulei ChengSchool of Mathematics and Statistics
Jiangsu Normal UniversityXuzhou 221116, P.R. China
Abstract Let H(D) denote the space of all holomorphic functions on the unit disk D ofC. Let ϕ be a holomorphic self-map of D, n be a positive integer and g ∈ H(D). In thispaper, we investigate the boundedness and compactness of a generalized integration operator
I(n)g,ϕ =
∫ z
0f (n)(ϕ(ζ))g(ζ)d(ζ)
from Hardy spaces to the Zygmund-type spaces Zµ.
1 Introduction
Let D denote the open unit disk of the complex plane C and H(D) the space of all analyticfunctions in D.
For 0 < r < 1, f ∈ H(D), we set
Mp(r, f) =
(
1
2π
∫ 2π
0
∣
∣
∣f(reiθ)∣
∣
∣
pdθ
)1/p
, 0 < p < ∞,
M∞(r, f) = max0≤θ≤2π
∣
∣
∣f(reiθ)∣
∣
∣ .
For 0 < p ≤ ∞, the Hardy space Hp consists of those functions f ∈ H(D), for which
‖f‖p = sup0≤r<1
Mp(r, f) < ∞.
It is well known that with norm ‖f‖p the Hp space is a Banach space if 1 ≤ p ≤ ∞, for0 < p < 1, Hp space is a nonlocally convex topological vector space, and d(f, g) = ‖f − g‖p
p
is a complete metric for it. For more information about the Hp space, one may see thesebooks, for example, [4, 5].
Let µ be a weight, that is, µ is a positive continuous function on D. The Zygmund-typeZµ consists of all f ∈ H(D) such that
supz∈D
µ(z)|f ′′(z)| < ∞.
∗2010 Mathematics Subject Classification: Primary 47B38; Secondary 47G10,47B33,30H10.†Key words and phrases: Hardy space, Zygmund-type space, generalized integration operator.‡Corresponding author. Email: [email protected]
1
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1004 Huiying Qu et al 1004-1016
Yongmin Liu
Products of generalized integration operators 2
With the norm ‖f‖Zµ = |f(0)| + |f ′(0)| + supz∈D
µ(z)|f ′′(z)|, it becomes a Banach space. The
little Zygmund-type space Zµ,0 is a subspace of Zµ consisting of those f ∈ Zµ such that
lim|z|→1
µ(z)|f ′′(z)| = 0.
When µ(z) = (1− |z|2), the Zygmund-type space becomes the Zygmund space Z ([7]), whilethe little Zygmund-type space Zµ,0 becomes the little Zygmund space Z0.
Let ϕ be an analytic self-map of D, then the composition operator on H(D) is given by
Cϕf = f ϕ.
Composition operators acting on various spaces of analytic functions have been the objectfor recent years, especially the problems of relating operator-theoretic properties of Cϕ tofunction the theoretic properties of ϕ. See the book of Cowen and MacCluer ([3]) and Shapiro([12]) for discussions of composition operators on classical spaces of analytic functions.
Assume that g : D → C is a holomorphic map of the unit disk D, for f ∈ H(D), define
Igf(z) =
∫ z
0f(ζ)g′(ζ)dζ, z ∈ D.
This operator is called Riemann-Stieltjes operator (or Extended-Cesaro operator). Ch. Pom-merenke ([11]) initiated the study of Riemann-Stieltjes operator Ig on H2 , where he showedthat Ig is bounded on H2 if and only if g is in BMOA. This was extended to other Hardyspaces Hp (1 ≤ p < ∞) in [1] and [2] where compactness of Ig on Hp and Schatten classmembership of Ig on H2 was also completely characterized in terms of the symbol g.
In this paper, we consider an integration operator I(n)g,ϕ which is defined as
I(n)g,ϕf(z) =
∫ z
0f (n)(ϕ(ζ))g(ζ)dζ, z ∈ D.
This operator is called the generalized integration operator, which was introduced in [13] and
studied in [6, 13, 14, 20]. Also, the operator I(n)g,ϕ is a generalization of the Riemann- Stieltjes
operator Ig induced by g. In fact, the operator I(n)g,ϕ can induce many known operators.
For example, when n = 1, I(n)g,ϕ reduces to an integration operator recently studied by S.
Stevic, S. Li, X. Zhu and W. Yang in [8, 15, 19]. When n = 1 and g(z) = ϕ′(z), weobtain the composition operator Cϕ defined as Cϕf = f ϕ + f(ϕ(0)), f ∈ H(D). LetD be the differentiation operator, n = m + 1 and g(z) = ϕ′(z), then we get the operatorCϕD
mf(z) = f (m)(ϕ(z)) − f (m)(ϕ(0)) which was studied in [10, 18].In [13], S. D. Sharma and A. Sharmat have characterized the boundedness and compact-
ness of generalized integration operators I(n)g,ϕ from Bloch type spaces to weighted BMOA
spaces by using logarithmic Carleson measure characterization of the weighted BMOA spaces.In [20], X. Zhu characterized the boundedness and compactness of generalized integration op-erators from H∞ to Zygmund-type spaces. In [6], Z. He and G. Cao have characterized theboundedness and compactness of generalized integration operators between Bloch-type spacesand F (p, q, s) spaces. Motivated by the results [6, 13, 14, 20], this paper is devoted to inves-tigating the boundedness and compactness of generalized integration operators from Hardyspaces Hp (0 < p < ∞) to Zygmund-type spaces.
Through out this paper, we will use the letter C to denote a generic positive constantthat can change its value at each occurrence.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1005 Huiying Qu et al 1004-1016
Yongmin Liu
Products of generalized integration operators 3
2 Auxiliary results
Here we quote some auxiliary results which will be used in the proofs of the main results inthis paper.
Lemma 2.1 ([4]) For p > 1, there exists a constant C(p) such that
∫ 2π
0
dθ
|1 − z|p≤
C(p)
(1 − |z|2)p−1 , for every z ∈ D.
Lemma 2.2 ([4, 5, 16]) Suppose that 0 < p < ∞, f ∈ Hp, then
∣
∣
∣f (n)(z)
∣
∣
∣≤ C
‖ f ‖p
(1 − |z|2)1/p+n,
for every z ∈ D and all nonnegative n = 0, 1, 2, · · · .
The following criterion for the compactness is a useful tool and it follows from standardarguments, for example, [3, Proposition 3.11].
Lemma 2.3 Assume that n be a nonnegative integer and ϕ be a holomorphic self-map of
D, 0 < p < ∞, µ be a weight. Then I(n)g,ϕ : Hp → Zµ is compact if and only if I
(n)g,ϕ : Hp → Zµ
is bounded and for any bounded sequence fk in Hp which converges to zero uniformly on
compact subsets of D as k → ∞, we have ‖I(n)g,ϕfk‖Zµ → 0 as k → ∞.
The following lemma was proved in [7] similar to the corresponding lemma in [9].
Lemma 2.4 A closed set K in Zµ,0 is compact if and only if K is bounded and satisfies
lim|z|→1
limf∈K
µ(z)|f ′′(z)| = 0.
Lemma 2.5 Assume that 0 < p < ∞, then for a, b > 0
(a + b)p ≤ C (ap + bp) .
3 Boundedness and compactness of I(n)g,ϕ from Hp (0 < p < ∞)
spaces to Zygmund-type spaces
In this section, we study the boundedness and compactness of I(n)g,ϕ : Hp → Zµ.
Theorem 3.1. Let g ∈ H(D), n be a nonnegative integer and ϕ be a holomorphic self-map
of D, 0 < p < ∞, µ be a weight. Then I(n)g,ϕ : Hp → Zµ is bounded if and only if the following
conditions are satisfied
supz∈D
µ(z)|g′(z)|(
1 − |ϕ(z)|2)1/p+n
< ∞, (3.1)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1006 Huiying Qu et al 1004-1016
Yongmin Liu
Products of generalized integration operators 4
supz∈D
µ(z)|g(z)ϕ′(z)|(
1 − |ϕ(z)|2)1/p+n+1
< ∞. (3.2)
Proof. Assume that (3.1) and (3.2) hold. Then for every z ∈ D and f ∈ Hp, by Lemma2.2 we have
µ(z)∣
∣
∣(I(n)
g,ϕf)′′(z)∣
∣
∣
= µ(z)∣
∣
∣f (n+1)(ϕ(z))ϕ′(z)g(z) + f (n)(ϕ(z))g′(z)
∣
∣
∣
≤ µ(z)|g(z)ϕ′(z)||f (n+1)(ϕ(z))| + µ(z)|g′(z)||f (n)(ϕ(z))|
≤ C‖f‖pµ(z)|g(z)ϕ′(z)|
(1 − |ϕ(z)|2)1/p+n+1+ C‖f‖p
µ(z)|g′(z)|
(1 − |ϕ(z)|2)1/p+n< ∞, (3.3)
On the other hand , we have|(I(n)
g,ϕf)(0)| = 0 (3.4)
and
|(I(n)g,ϕf)′(0)| = |f (n)(ϕ(0))g(0)| ≤ C
|g(0)|
(1 − |ϕ(0)|2)1/p+n‖f‖p. (3.5)
Applying conditions (3.3), (3.4) and (3.5), we deduce that the operator I(n)g,ϕ : Hp → Zµ is
bounded.Conversely we suppose that I
(n)g,ϕ : Hp → Zµ is bounded, that is there exists a constant C
such that‖I(n)
g,ϕf‖Zµ ≤ C‖f‖p
for all f ∈ Hp. For f(z) = zn
n! ∈ Hp, we have that
supz∈D
µ(z)|g′(z)| < ∞. (3.6)
Let f(z) = zn+1
(n+1)! ∈ Hp, we have that
supz∈D
µ(z)|ϕ′(z)g(z) + ϕ(z)g′(z)| < ∞. (3.7)
By (3.6), (3.7) and the boundedness of the function ϕ(z), we get
supz∈D
µ(z)|g(z)ϕ′(z)| < ∞. (3.8)
For a fixed ω ∈ D, set
fω(z) = (1/p + n + 2)1 − |ϕ(ω)|2
(1 − zϕ(ω))1/p+1− (1/p + 1)
(1 − |ϕ(ω)|2)2
(1 − zϕ(ω))1/p+2. (3.9)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1007 Huiying Qu et al 1004-1016
Yongmin Liu
Products of generalized integration operators 5
From Lemma 2.1 and Lemma 2.5 we have
‖fω‖p = sup0≤r<1
(
1
2π
∫ 2π
0|fω(reiθ)|p
)1/p
≤ C sup0≤r<1
(
1
2π
∫ 2π
0
∣
∣
∣
∣
∣
(1/p + n + 2)1 − |ϕ(ω)|2
(1 − ϕ(ω)reiθ)1/p+1
∣
∣
∣
∣
∣
p)1/p
+C sup0≤r<1
(
1
2π
∫ 2π
0
∣
∣
∣
∣
∣
(1/p + 1)(1 − |ϕ(ω)|2)2
(1 − ϕ(ω)reiθ)1/p+2
∣
∣
∣
∣
∣
p)1/p
≤ C sup0≤r<1
(
(1 − |ϕ(ω)|2)p1
2π
∫ 2π
0
1
|1 − ϕ(ω)reiθ|p+1
)1/p
+C sup0≤r<1
(
(1 − |ϕ(ω)|2)2p 1
2π
∫ 2π
0
1
|1 − ϕ(ω)reiθ|2p+1
)1/p
≤ C
(
(1 − |ϕ(ω)|2)pC(p)
(1 − |ϕ(ω)|2)p
)1/p
+ C
(
(1 − |ϕ(ω)|2)2p C(p)
(1 − |ϕ(ω)|2)2p
)1/p
≤ C,
hence fω ∈ Hp and supω∈D
‖fω‖p ≤ C < ∞.
On the other hand we get that
f(n)ω (z) =
(1/p + n + 2)
n∏
j=1
(1/p + j)
(1 − |ϕ(ω)|2)ϕ(ω)n
(1 − zϕ(ω))1/p+n+1
−
(1/p + 1)n+1∏
j=2
(1/p + j)
(1 − |ϕ(ω)|2)2ϕ(ω)n
(1 − zϕ(ω))1/p+n+2, (3.10)
f(n+1)ω (z) =
(1/p + n + 2)n+1∏
j=1
(1/p + j)
(1 − |ϕ(ω)|2)ϕ(ω)n+1
(1 − zϕ(ω))1/p+n+2
−
(1/p + 1)
n+2∏
j=2
(1/p + j)
(1 − |ϕ(ω)|2)2ϕ(ω)n+1
(1 − zϕ(ω))1/p+n+3. (3.11)
From (3.10) and (3.11), we have f(n+1)ω (ϕ(ω)) = 0 and
f (n)ω (ϕ(ω)) =
n∏
j=1
(1/p + j)
ϕ(ω)n
(1 − |ϕ(ω)|2)1/p+n.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1008 Huiying Qu et al 1004-1016
Yongmin Liu
Products of generalized integration operators 6
Hence
C ≥ ‖I(n)g,ϕfω‖Zµ
≥ supz∈D
µ(z)∣
∣
∣(I(n)g,ϕfω)′′(z)
∣
∣
∣
≥ supz∈D
µ(z)∣
∣
∣f (n+1)
ω (ϕ(z))ϕ′(z)g(z) + f (n)ω (ϕ(z))g′(z)
∣
∣
∣
≥ µ(|ω|)∣
∣
∣f (n+1)
ω (ϕ(ω))ϕ′(ω)g(ω) + f (n)ω (ϕ(ω))g′(ω)
∣
∣
∣
=
n∏
j=1
(1/p + j)
µ(|ω|)|g′(ω)||ϕ(ω)|n(
1 − |ϕ(ω)|2)1/p+n
. (3.12)
By (3.12), we have
sup1
2<|ϕ(ω)|<1
µ(|ω|)|g′(ω)|
(1−|ϕ(ω)|2)1/p+n ≤ 2n sup
1
2<|ϕ(ω)|<1
n∏
j=1
(1/p + j)
µ(|ω|)|g′(ω)||ϕ(ω)|n(
1 − |ϕ(ω)|2)1/p+n
≤ 2n supω∈D
n∏
j=1
(1/p + j)
µ(|ω|)|g′(ω)||ϕ(ω)|n(
1 − |ϕ(ω)|2)1/p+n
≤ C < ∞. (3.13)
And from (3.6), we obtain that
sup|ϕ(ω)|≤ 1
2
µ(|ω|)|g′(ω)|
(1−|ϕ(ω)|2)1/p+n ≤ (
4
3)1/p+n sup
|ϕ(ω)|≤ 1
2
µ(|ω|)|g′(ω)
≤ (4
3)1/p+n sup
ω∈D
µ(|ω|)|g′(ω)| ≤ C < ∞. (3.14)
Thus combing (3.13) with (3.14) we get the condition (3.1).For a fixed ω ∈ D, set
hω(z) = (1/p + n + 1)1 − |ϕ(ω)|2
(1 − zϕ(ω))1/p+1− (1/p + 1)
(1 − |ϕ(ω)|2)2
(1 − zϕ(ω))1/p+2, (3.15)
we get that
h(n)ω (z) =
(1/p + n + 1)
n∏
j=1
(1/p + j)
(1 − |ϕ(ω)|2)ϕ(ω)n
(1 − zϕ(ω))1/p+n+1
−
(1/p + 1)
n+1∏
j=2
(1/p + j)
(1 − |ϕ(ω)|2)2ϕ(ω)n
(1 − zϕ(ω))1/p+n+2, (3.16)
h(n+1)ω (z) =
(1/p + n + 1)
n+1∏
j=1
(1/p + j)
(1 − |ϕ(ω)|2)ϕ(ω)n+1
(1 − zϕ(ω))1/p+n+2
−
(1/p + 1)n+2∏
j=2
(1/p + j)
(1 − |ϕ(ω)|2)2ϕ(ω)n+1
(1 − zϕ(ω))1/p+n+3. (3.17)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1009 Huiying Qu et al 1004-1016
Yongmin Liu
Products of generalized integration operators 7
From Lemma 2.1 and Lemma 2.5 we obtain that hω ∈ Hp and supω∈D
‖hω‖p ≤ C < ∞ with a
direct calculation. From (3.16) and (3.17), we have h(n)ω (ϕ(ω)) = 0 and
h(n+1)ω (ϕ(ω)) = −
n+1∏
j=1
(1/p + j)
ϕ(ω)n+1
(1 − |ϕ(ω)|2)1/p+n+1.
Hence
C ≥ ‖I(n)g,ϕhω‖Zµ
≥ supz∈D
µ(z)∣
∣
∣(I(n)g,ϕhω)′′(z)
∣
∣
∣
≥ supz∈D
µ(z)∣
∣
∣h(n+1)
ω (ϕ(z))ϕ′(z)g(z) + h(n)ω (ϕ(z))g′(z)
∣
∣
∣
≥ µ(|ω|)∣
∣
∣h(n+1)ω (ϕ(ω))ϕ′(ω)g(ω) + h(n)
ω (ϕ(ω))g′(ω)∣
∣
∣
=
n+1∏
j=1
(1/p + j)
µ(|ω|)|g(ω)ϕ′(ω)||ϕ(ω)|n+1
(
1 − |ϕ(ω)|2)1/p+n+1
. (3.18)
By (3.18), we have
sup1
2<|ϕ(ω)|<1
µ(|ω|)|g(ω)ϕ′(ω)|(
1 − |ϕ(ω)|2)1/p+n+1
≤ 2n+1 sup1
2<|ϕ(ω)|<1
n+1∏
j=1
(1/p + j)
µ(|ω|)|g(ω)ϕ′(ω)||ϕ(ω)|n+1
(
1 − |ϕ(ω)|2)1/p+n+1
≤ 2n+1 supω∈D
n+1∏
j=1
(1/p + j)
µ(|ω|)|g(ω)ϕ′(ω)||ϕ(ω)|n+1
(
1 − |ϕ(ω)|2)1/p+n+1
≤ C < ∞. (3.19)
And from (3.8), we obtain that
sup|ϕ(ω)|≤ 1
2
µ(|ω|)|g(ω)ϕ′(ω)|(
1 − |ϕ(ω)|2)1/p+n+1
≤ (4
3)1/p+n+1 sup
|ϕ(ω)|≤ 1
2
µ(|ω|)|g(ω)ϕ′(ω)|
≤ (4
3)1/p+n+1 sup
ω∈D
µ(|ω|)|g(ω)ϕ′(ω)|
≤ C < ∞. (3.20)
Thus combing (3.19) with (3.20) we get the condition (3.2).
Theorem 3.2. Let g ∈ H(D), n be a nonnegative integer and ϕ be a holomorphic self-map
of D, 0 < p < ∞, µ be a weight. Then I(n)g,ϕ : Hp → Zµ is compact if and only if the following
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1010 Huiying Qu et al 1004-1016
Yongmin Liu
Products of generalized integration operators 8
conditions are satisfied,
M1 := supz∈D
µ(z)|g′(z)| < ∞, (3.21)
M2 := supz∈D
µ(z)|g(z)ϕ′(z)| < ∞, (3.22)
lim|ϕ(z)|→1
µ(z)|g′(z)|(
1 − |ϕ(z)|2)1/p+n
= 0 (3.23)
and
lim|ϕ(z)|→1
µ(z)|g(z)ϕ′(z)|(
1 − |ϕ(z)|2)1/p+n+1
= 0. (3.24)
Proof. Assume that (3.21), (3.22), (3.23), and (3.24) hold. From (3.21) and (3.23) it is
easy to see that (3.1) hold and from (3.22), (3.24) we get (3.2) hold. Hence I(n)g,ϕ : Hp → Zµ is
bounded, by Theorem 3.1. For any bounded sequence fk in Hp with fk → 0 uniformly oncompact subsets of D. To establish the assertion, it suffices, in view of Lemma 2.3, to showthat
‖I(n)g,ϕfk‖Zµ → 0, as k → ∞.
We assume that ‖fk‖p ≤ 1. From (3.23) and (3.24) we have for any ε > 0, there existsρ ∈ (0, 1), when ρ < |ϕ(z)| < 1, such that
µ(z)|g′(z)|(
1 − |ϕ(z)|2)1/p+n
< ε, (3.25)
andµ(z)|g(z)ϕ′(z)|
(
1 − |ϕ(z)|2)1/p+n+1
< ε. (3.26)
Since fk → 0 uniformly on compact subsets of D, Cauchy,s estimate gives that f(n)k , f
(n+1)k
converges to 0 uniformly on compact subsets of D. There exists a K0 ∈ N such that whenk > K0, from (3.21), (3.22) and Lemma 2.2, we have
|(I(n)g,ϕfk)(0)| + |(I(n)
g,ϕfk)′(0)| + sup
|ϕ(z)|≤ρµ(z)|(I(n)
g,ϕfk)′′(z)|
≤ |f(n)k (ϕ(0))||g(0)| + sup
|ϕ(z)|≤ρµ(z)|g(z)ϕ′(z)||f
(n+1)k (ϕ(z))|
+ sup|ϕ(z)|≤ρ
µ(z)|g′(z)||f(n)k (ϕ(z))|
≤ |f(n)k (ϕ(0))||g(0)| + M2 sup
|ϕ(z)|≤ρ|f
(n+1)k (ϕ(z))| + M1 sup
|ϕ(z)|≤ρ|f
(n)k (ϕ(z))|
< Cε. (3.27)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1011 Huiying Qu et al 1004-1016
Yongmin Liu
Products of generalized integration operators 9
From (3.25), (3.26), (3.27) and Lemma 2.2 we have
‖I(n)g,ϕfk‖Zµ =
∣
∣
∣(I(n)
g,ϕfk)(0)∣
∣
∣+∣
∣
∣(I(n)
g,ϕfk)′(0)∣
∣
∣+ sup
z∈D
µ(z)∣
∣
∣(I(n)
g,ϕfk)′′
(z)∣
∣
∣
≤
(
∣
∣
∣I(n)g,ϕfk)(0)
∣
∣
∣ +∣
∣
∣(I(n)g,ϕfk)
′(0)∣
∣
∣ + supz∈D: |ϕ(z)|≤ρ
µ(z)∣
∣
∣(I(n)g,ϕfk)
′′
(z)∣
∣
∣
)
+ supz∈D: ρ<|ϕ(z)|<1
µ(z)∣
∣
∣(I(n)
g,ϕfk)′′
(z)∣
∣
∣
< Cε + supz∈D: ρ<|ϕ(z)|<1
µ(z)|g′(z)|(
1 − |ϕ(z)|2)1/p+n
C‖f‖p
+ supz∈D: ρ<|ϕ(z)|<1
µ(z)|g(z)ϕ′(z)|(
1 − |ϕ(z)|2)1/p+n+1
C‖f‖p
< Cε + Cε + Cε
= 3Cε, (3.28)
when K > K0. It follows that the operator I(n)g,ϕ : Hp → Zµ is compact.
Conversely. Assume that I(n)g,ϕ : Hp → Zµ is compact. Then it is clear that I
(n)g,ϕ : Hp → Zµ
is bounded, and hence (3.21) and (3.22) hold from the proof of Theorem 3.1. Let zk be asequence in D such that |ϕ(zk)| → 1 as k → ∞.
We can use the test functions
fk(z) = fzk(z) = (1/p + n + 2)
1 − |ϕ(zk)|2
(1 − zϕ(zk))1/p+1− (1/p + 1)
(1 − |ϕ(zk)|2)2
(1 − zϕ(zk))1/p+2.
By a direct calculation, we may easily prove that fk converges to 0 uniformly on compactsubsets of D and sup
k∈N
‖fk‖p ≤ C < ∞. Then fk is a bounded sequence in Hp which converges
to 0 uniformly on compact subsets of D. By Lemma 2.3, we have
limk→∞
‖I(n)g,ϕfk‖Zµ = 0. (3.29)
Note that f(n+1)k (ϕ(zk)) = 0,
f(n)k (ϕ(zk)) =
n∏
j=1
(1/p + j)
ϕ(zk)n
(1 − |ϕ(zk)|2)1/p+n.
From (3.12) and using the compactness of I(n)g,ϕ : Hp → Zµ we obtain
n∏
j=1
(1/p + j)
µ(|zk|)|g′(zk)||ϕ(zk)|n
(
1 − |ϕ(zk)|2)1/p+n
≤ ‖I(n)g,ϕfk‖Zµ → 0 , as k → ∞. (3.30)
From (3.30) and |ϕ(zk)| → 1, it follows that
limk→∞
µ(|zk|)|g′(zk)|
(
1 − |ϕ(zk)|2)1/p+n
= 0,
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1012 Huiying Qu et al 1004-1016
Yongmin Liu
Products of generalized integration operators 10
and consequently (3.23) holds.Next, let
hk(z) = hzk(z) = (1/p + n + 1)
1 − |ϕ(zk)|2
(1 − zϕ(zk))1/p+1− (1/p + 1)
(1 − |ϕ(zk)|2)2
(1 − zϕ(zk))1/p+2.
By a direct calculation, we obtain that hk 0 on compact subsets of D and supk∈N
‖hk‖p ≤
C < ∞. Then hk is a bounded sequence in Hp which converges to 0 uniformly on compactsubsets of D. By Lemma 2.3, we have
limk→∞
‖I(n)g,ϕhk‖Zµ = 0. (3.31)
Note that
h(n+1)k (ϕ(zk)) = −
n+1∏
j=1
(1/p + j)
ϕ(zk)n+1
(1 − |ϕ(zk)|2)1/p+n+1, h
(n)k (ϕ(zk)) = 0.
From (3.18) and using the compactness of I(n)g,ϕ : Hp → Zµ we obtain
n+1∏
j=1
(1/p + j)
µ(|zk|) |g(zk)ϕ′(zk)| |ϕ(zk)|n+1
(
1 − |ϕ(zk)|2)1/p+n+1
≤ ‖I(n)g,ϕhk‖Zµ → 0 , as k → ∞. (3.32)
|ϕ(zk)| → 1 implies that
limk→∞
µ(|zk|) |g(zk)ϕ′(zk)|(
1 − |ϕ(zk)|2)1/p+n+1
= 0,
(3.24) holds.
Theorem 3.3. Let g ∈ H(D), n be a nonnegative integer and ϕ be a holomorphic self-
map of D, 0 < p < ∞, µ be a weight. Then I(n)g,ϕ : Hp → Zµ,0 is compact if and only if the
following conditions are satisfied,
lim|z|→1
µ(z)|g′(z)|(
1 − |ϕ(z)|2)1/p+n
= 0 (3.33)
and
lim|z|→1
µ(z)|g(z)ϕ′(z)|(
1 − |ϕ(z)|2)1/p+n+1
= 0. (3.34)
Proof. Suppose that (3.33) and (3.34) hold. It is clear that (3.1)and (3.2) hold. by
Theorem 3.1 we have I(n)g,ϕ : Hp → Zµ is bounded. On the other hand for any f ∈ Hp we have
µ(z)∣
∣
∣(I(n)g,ϕf)′′(z)
∣
∣
∣
= µ(z)∣
∣
∣f (n+1)(ϕ(z))ϕ′(z)g(z) + f (n)(ϕ(z))g′(z)
∣
∣
∣
≤ µ(z)|g(z)ϕ′(z)||f (n+1)(ϕ(z))| + µ(z)|g′(z)||f (n)(ϕ(z))|
≤ C‖f‖pµ(z)|g(z)ϕ′(z)|
(1 − |ϕ(z)|2)1/p+n+1+ C‖f‖p
µ(z)|g′(z)|
(1 − |ϕ(z)|2)1/p+n→ 0 , as |z| → 1. (3.35)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1013 Huiying Qu et al 1004-1016
Yongmin Liu
Products of generalized integration operators 11
it follows that I(n)g,ϕf ∈ Zµ,0. Hence I
(n)g,ϕ : Hp → Zµ,0 is bounded. Taking the supremum in
inequality (3.35) over all f ∈ Hp such that ‖f‖p ≤ 1 and letting |z| → 1, yields
lim|z|→1
sup‖f‖p≤1
µ(z)∣
∣
∣(I(n)g,ϕf)′′(z)
∣
∣
∣ = 0.
Hence, by Lemma 2.4 we see that the operator I(n)g,ϕ : Hp → Zµ,0 is compact.
Now Assume that I(n)g,ϕ : Hp → Zµ,0 is compact. Firstly, it is obvious I
(n)g,ϕ : Hp → Zµ,0 is
bounded. By Theorem 3.1 taking function f(z) = zn
n! ∈ Hp, we have that
lim|z|→1
µ(z)|g′(z)| = 0. (3.36)
Let f(z) = zn+1
(n+1)! ∈ Hp, we have that
lim|z|→1
µ(z)|ϕ′(z)g(z) + ϕ(z)g′(z)| = 0. (3.37)
By (3.36), (3.37) and the boundedness of the function ϕ(z), we get
lim|z|→1
µ(z)|g(z)ϕ′(z)| = 0. (3.38)
Since I(n)g,ϕ : Hp → Zµ is compact, by Theorem 3.2 we have (3.23) and (3.24) hold.
It from (3.23) follows that for every ε > 0, there exists δ ∈ (0, 1) such that
µ(z)|g′(z)|(
1 − |ϕ(z)|2)1/p+n
< ε, (3.39)
when δ < |ϕ(z)| < 1. Using (3.26) we see that there exists τ ∈ (0, 1) such that
µ(z)|g′(z)| ≤ ε inft∈[0,δ]
(1 − t2)1/p+n, (3.40)
when τ < |z| < 1. Therefore when τ < |z| < 1 and δ < |ϕ(z)| < 1, by (3.39), we have
µ(z)|g′(z)|(
1 − |ϕ(z)|2)1/p+n
< ε. (3.41)
On the other hand, when τ < |z| < 1 and |ϕ(z)| ≤ δ, by (3.40), we obtain
µ(z)|g′(z)|(
1 − |ϕ(z)|2)1/p+n
≤µ(z)|g′(z)|
inft∈[0,δ]
(1 − t)1/p+n< ε. (3.42)
From (3.41) and (3.42) we have
lim|z|→1
µ(z)|g(z)|(
1 − |ϕ(z)|2)1/p+n
= 0,
thus (3.33) holds.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1014 Huiying Qu et al 1004-1016
Yongmin Liu
Products of generalized integration operators 12
From (3.24), it follows that for every ε > 0, there exists γ ∈ (0, 1) such that
µ(z)|g(z)ϕ′(z)|(
1 − |ϕ(z)|2)1/p+n+1
< ε, (3.43)
when γ < |ϕ(z)| < 1. Using (3.38) we see that there exists η ∈ (0, 1) such that
µ(z)|g(z)ϕ′(z)| ≤ ε inft∈[0,γ]
(1 − t2)1/p+n+1, (3.44)
when η < |z| < 1. Therefore when η < |z| < 1 and γ < |ϕ(z)| < 1, by (3.43), we have
µ(z)|g(z)ϕ′(z)|(
1 − |ϕ(z)|2)1/p+n+1
< ε. (3.45)
On the other hand, when η < |z| < 1 and |ϕ(z)| ≤ γ, by (3.44), we obtain
µ(z)|g(z)ϕ′(z)|(
1 − |ϕ(z)|2)1/p+n+1
≤µ(z)|g(z)ϕ′(z)|
inft∈[0,γ]
(1 − t)1/p+n+1< ε. (3.46)
From (3.45), (3.46) we have
lim|z|→1
µ(z)|g(z)ϕ′(z)|(
1 − |ϕ(z)|2)1/p+n+1
= 0,
we obtain (3.34) holds, the proof is completed.
Acknowledgements
This research was supported by the Natural Science Foundation of China (11171285) and thePriority Academic Program Development of Jiangsu Higher Education Institutions.
References
[1] A. Aleman and A. G. Siskakis, An integral operator on Hp, Complex Variables Theory Appl, 28(2)(1995), 149-158.
[2] A. Aleman and J. A. Cima, An integral operator on Hp and Hardy,s inequality, J. Anal. Math., 85
(2001), 157-176.
[3] C. C. Cowen and B. D. MacCluer, Composition Operators on Spaces of Analytic Functions, Studies inAdvanced Mathematics. CRC Press, Boca Raton, FL, (1995). xii+388 pp. ISBN: 0-8493-8492-3.
[4] P. L. Duren, Theory of HP Spaces, vol. 38 of Pure and Applied Mathematics Academic Press, New York,NY, USA, (1970).
[5] J. B. Garnett, Bounded Analytic Functions, vol. 236 of Graduate Texts in Mathematics, Springer, NewYork, NY, USA, Revised 1st edition, (2007).
[6] Z. He and G. Cao, Generalized integration operators between Bloch-type spaces and F(p,q,s) spaces, Tai-wanese J. Math., 17(4) (2013), 1211–1225.
[7] S. Li and S. Stevic, Volterra-type operators on Zygmund spaces, J. Inequal. Appl., (2007), Article ID32124.
[8] S. Li and S. Stevic, Products of integral-type operators and composition operators between Bloch-typespaces, J. Math. Anal. Appl, 349(12) (2009), 596-610.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1015 Huiying Qu et al 1004-1016
Yongmin Liu
Products of generalized integration operators 13
[9] K. Madigan and A. Matheson, Compact composition operator on the Bloch space, Trans. Amer. Math.Soc., 347(7) (1995), 2679-2687.
[10] S. Ohno, Products of composition and differentiation between Hardy spaces, Bull. Aus tral. Math. Soc,73(2) (2006), 235-243.
[11] Ch. Pommerenke, Schlichte Funktionen und analytische Funktionen von beschrankter mittlerer Oszillation(German), Comment. Math. Helv., 52(4) (1977), 591-602.
[12] J. H. Shapiro, Composition Operators and Classical Function Theory, Universitext Tracts in Mathematics.Springer-Verlag, New York, (1993). xvi+223pp. ISBN: 0-387 94067-7.
[13] S. D. Sharma and A. Sharma, Generalized integration operators from Bloch type space to weighted BMOAspaces, Demonstratio Math, 44(2) (2011), 373-390.
[14] S. Stevic, A. K. Sharma and S. D. Sharma, Generalized integration operators from the space of integraltransforms into Bloch-types paces, J. Comput. Anal. Appl., 14(6) (2012), 1139-1147.
[15] W. Yang, Composition operators from F(p,q,s) spaces to the nth weighted-types paces on the unit disc,Appl. Math. Comput., 218(4) (2011), 1443-1448.
[16] S. Ye and Z. Zhou, Weighted composition operators from Hardy to Zygmund type spaces, Abstract andApplied Analysis, Volume 2013, Article ID 365286, 10 pages.
[17] K. Zhu, Bloch type spaces of analytic functions, Rochy Mountain J. Math., 23 (1993), 1143-1177.
[18] X. Zhu, Products of differentiation,composition and multiplication from Bergman type spaces to Bers typespaces, Integral Transforms Spec. Funct., 18(3-4) (2007), 223-231.
[19] X. Zhu, Generalized composition operators from generalized weighted Bergman spaces to Bloch type spaces,J. Korean Math. Soc., 46(6) (2009), 1219-1232.
[20] X. Zhu , An integral-type opreator from H∞ to Zygmund-type spaces, Bull. Malays. Math. Sci. Soc., 35(3)(2012), 679–686.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1016 Huiying Qu et al 1004-1016
Approximation Properties of the Modification of
Durrmeyer Type q-Baskakov Operators Which
Preserve x2
Qing-Bo Cai∗
School of Mathematics and Computer Science, Quanzhou Normal University,
Quanzhou 362000, China
E-mail: [email protected]
Abstract. In this paper, we introduce a new kind of modification of Durrmeyertype q-Baskakov operators which preserve x2 based on the concept of q-integer. Weinvestigate the moments and central moments of the operators by computation, obtaina local approximation theorem and also get the pointwise convergence rate theorem anda weighted approximation theorem.
2000 Mathematics Subject Classification: 41A10, 41A25, 41A36.Key words and phrases: q-integer, Durrmeyer type, q-Baskakov operators, moments,weighted approximation.
1 Introduction
In recent years, the applications of q-integers in the approximation theory is one ofthe main area of research. After q-Bernstein polynomials were introduced by Phillips [12]in 1997, many researchers have studied in this field, we mention some of them as [2]-[4],[11]-[16].
In 2010, Aral and Gupta [2] introduced the Durrmeyer type q-Baskakov operators as
D∗n,q(f ;x) = [n− 1]q
∞∑
k=0
p∗n,k(q;x)∫ ∞/A
0p∗n,k(q; t)f(t)dqt, (1)
where, p∗n,k(q;x) =
[n + k − 1
k
]
q
qk2
2xk
(1+x)n+kq
for every n ∈ N, q ∈ (0, 1), x ∈ [0,∞)
and for every real valued continuous and bounded function f on [0,∞). Apparently, theseoperators reproduce only constant functions. In 2012, Cai and Zeng [3] introduced a new
∗Corresponding author.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1017 Qing-Bo Cai 1017-1026
Q. -B. CAI
modification of Durrmeyer type q-Baskakov operators Dn,q as follows:
Dn,q(f ;x) = [n− 1]q∞∑
k=1
pn,k(q; t)f(t)dqt +[n]q + (1 + x)n
q − 1[n]q(1 + x)n
q
f(0), (2)
where, pn,k(q;x) =
[n + k − 1
k
]
q
q2k2+1
4xk
(1+x)n+kq
, which reproduce not only constant
functions but also linear functions. They establish direct and local approximation the-orems of operators Dn,q and obtain the estimates on the rate of convergence and weightedapproximation properties.
Since the types of operators which preserve linear functions and preserve x2 are impor-tant in approximation theory, in the present paper, we will introduce a new modificationof Durrmeyer type q-Baskakov operators which will be defined by equality (6). The ad-vantage of these new operators is that they reproduce not only constant functions but alsox2.
Firstly, we recall some concepts of q-calculus. All of the results can be found in [8, 10].For any fixed real number 0 < q ≤ 1 and each nonnegative integer k, we denote q-integersby [k]q, where
[k]q =
1−qk
1−q , q 6= 1;k, q = 1.
Also q-factorial and q-binomial coefficients are defined as follows:
[k]q! =
[k]q[k − 1]q...[1]q, k = 1, 2, ...;
1, k = 0,
and [n
k
]
q
=[n]q!
[k]q![n− k]q!, (n ≥ k ≥ 0).
The q-Jackson integrals and the q-improper integrals are defined as (see [9, 11])
∫ a
0f(x)dqx = (1− q)a
∞∑
n=0
f(aqn)qn, a > 0,
and ∫ ∞/A
0f(x)dqx = (1− q)
∞∑−∞
f
(qn
A
)qn
A, A > 0, (3)
provided the sums converge absolutely.The q-analog Eq(x) of the exponential function is given as
Eq(x) =∞∑
k=0
qk(k−1)/2 xk
[k]q!= (1 + (1− q)x)∞q , |q| < 1,
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1018 Qing-Bo Cai 1017-1026
DURRMEYER TYPE q-BASKAKOV OPERATORS WHICH PRESERVE x2
where
(1 + x)∞q =∞∏
j=0
(1 + qjx).
The q-Gamma integral is defined as (see [11])
Γq(t) =∫ 1
1−q
0xt−1Eq(−qx)dqx, t > 0,
which satisfies the following functional equations:
Γq(t + 1) = [t]qΓq(t), Γq(1) = 1.
The q-Beta integral is defined as
Bq(t; s) = K(A; t)∫ ∞/A
0
xt−1
(1 + x)t+sq
dqx, (4)
where K(x; t)= 1x+1xt
(1 + 1
x
)t
q(1 + x)1−t
q and (1 + x)τq = (1 + x)(1 + qx)...(1 + qτ−1x), τ >
0 (τ = t + s).In particular for any positive integer n
K(x;n) = qn(n−1)
2 , K(x; 0) = 1 and Bq(t; s) =Γq(t)Γq(s)Γq(t + s)
, (5)
(see [4]).For f ∈ C[0,∞), q ∈ (0, 1) and n ∈ N, we introduce the new modification of the Durrmeyertype q-Baskakov operators Dn,q(f, x) as
Dn,q(f ;x) = [n− 1]q∞∑
k=2
pn,k(q;x)∫ ∞/A
0pn+2,k−2(q; t)f(t)dqt
+q2[n− 1]q (1 + [n + 1]qx) + [2]q(1 + x)n+1
q
[n + 1]qq(1 + x)n+1q
f(0), (6)
where
pn,k(q;x) =
[n + k − 1
k
]
q
qk2+1
2xk
(1 + x)n+kq
. (7)
2 Some Preliminary Results
In this section we give the following lemmas, which are need to prove our theorems:
Lemma 2.1. The following equalities hold:
Dn,q(1;x) = 1, (8)
Dn,q(t;x) = x−[q2[n− 1]q + [2]q(1 + x)n+1
q
]x
[n + 1]q(1 + x)n+1q
− q2[n− 1]q[n + 1]q[n]q
[1− 1 + [n + 1]qx
(1 + x)n+1q
](9)
.= x−An,q(x)−Bn,q(x), (10)
Dn,q(t2;x) = x2. (11)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1019 Qing-Bo Cai 1017-1026
Q. -B. CAI
Proof. Since
[n− 1]q∞∑
k=2
pn,k(q;x)∫ ∞/A
0pn+2,k−2(q; t)dqt
= [n− 1]q∞∑
k=2
pn,k(q;x)
[n + k − 1
k − 2
]
q
q(k−2)2+1
2
∫ ∞/A
0
tk−2
(1 + t)n+kq
dqt
= [n− 1]q∞∑
k=2
pn,k(q;x)
[n + k − 1
k − 2
]
q
qk2−4k+5
2Bq(k − 1;n + 1)
K(A; k − 1)
= [n− 1]q∞∑
k=2
pn,k(q;x)[n + k − 1]q!
[k − 2]q![n + 1]q!q
k2−4k+52
[k − 2]q![n]q!
[n + k − 1]q!q(k−1)(k−2)
2
=q2[n− 1]q[n + 1]q
∞∑
k=2
[n + k − 1
k
]
q
qk(k−1)
2xk
(1 + x)n+kq
.
by Euler’s identity (see [1], Chap. 10, Coroll. 10.2.2), it is clear that
∞∑
k=0
[n + k − 1
k
]
q
qk(k−1)
2xk
(1 + x)n+kq
= 1,
and using q2[n−1]q[n+1]q
= 1− [2]q[n+1]q
, we obtain
Dn,q(1;x)
=(
1− [2]q[n + 1]q
)(1− 1
(1 + x)nq
− [n]qx(1 + x)n+1
q
)+
q2[n− 1]q (1 + [n + 1]qx) [2]q(1 + x)n+1q
[n + 1]q(1 + x)n+1q
= 1.
Similarly, we have
Dn,q(t;x) = [n− 1]q∞∑
k=2
pn,k(q, x)∫ ∞/A
0pn+2,k−2(q, t)tdqt
= [n− 1]q∞∑
k=2
pn,k(q, x)
[n + k − 1
k − 2
]
q
qk2−4k+5
2
∫ ∞/A
0
tk−1
(1 + t)n+kq
dqt
= [n− 1]q∞∑
k=2
pn,k(q, x)
[n + k − 1
k − 2
]
q
qk2−4k+5
2Bq(k, n)K(A, k)
= [n− 1]q∞∑
k=2
pn,k(q, x)[n + k − 1]q!
[k − 2]q![n + 1]q!q
k2−4k+52
[k − 1]q![n− 1]q!
[n + k − 1]q!qk(k−1)
2
=∞∑
k=2
[n + k − 1]q![k]q![n− 1]q!
qk2−3k+6
2[k − 1]q[n− 1]q
[n + 1]q[n]qxk
(1 + x)n+kq
,
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1020 Qing-Bo Cai 1017-1026
DURRMEYER TYPE q-BASKAKOV OPERATORS WHICH PRESERVE x2
since [k − 1]q = [k]q − qk−1, we get
Dn,q(t; x) =∞∑
k=2
[n + k − 1]q![k]q![n− 1]q!
qk2−3k+6
2[k]q[n− 1]q[n + 1]q[n]q
xk
(1 + x)n+kq
−∞∑
k=2
[n + k − 1]q![k]q![n− 1]q!
qk2−3k+6
2qk−1[n− 1]q[n + 1]q[n]q
xk
(1 + x)n+kq
=q2[n− 1]qx
[n + 1]q
∞∑
k=2
[n + k
k
]
q
qk(k−1)
2xk
(1 + x)n+k+1q
− q2[n− 1]q[n + 1]q[n]q
∞∑
k=2
[n + k − 1
k
]
q
qk(k−1)
2xk
(1 + x)n+kq
=q2[n− 1]qx
[n + 1]q
[1− 1
(1 + x)n+1q
]− q2[n− 1]q
[n + 1]q[n]q
[1− 1 + [n + 1]qx
(1 + x)n+1q
]
= x−[q2[n− 1]q + [2]q(1 + x)n+1
q
]x
[n + 1]q(1 + x)n+1q
− q2[n− 1]q[n + 1]q[n]q
[1− 1 + [n + 1]qx
(1 + x)n+1q
].
Finally,
Dn,q(t2;x) = [n− 1]q∞∑
k=2
pn,k(q, x)∫ ∞/A
0pn+2,k−2(q, t)t2dqt
= [n− 1]q∞∑
k=2
pn,k(q, x)
[n + k − 1
k − 2
]
q
qk2−4k+5
2
∫ ∞/A
0
tk
(1 + t)n+kq
dqt
= [n− 1]q∞∑
k=2
pn,k(q, x)
[n + k − 1
k − 2
]
q
qk2−4k+5
2Bq(k + 1, n− 1)
K(A, k + 1)
= [n− 1]q∞∑
k=2
pn,k(q, x)[n + k − 1]q!
[k − 2]q![n + 1]q!q
k2−4k+52
[k]q![n− 2]q!
[n + k − 1]q!qk(k+1)
2
=∞∑
k=2
pn,k(q;x)q5−5k
2[k]q[k − 1]q[n]q[n + 1]q
=∞∑
k=2
[n + k − 1]q![k − 2]q![n + 1]q!
q(k−2)(k−3)
2xk
(1 + x)n+kq
=∞∑
k=2
[n + k − 1
k
]
q
qk(k−1)
2xk+2
(1 + x)n+k+2q
= x2,
We obtain the desired result.
Remark 2.2. Let n ∈ N and x ∈ [0,∞), then for every q ∈ (0, 1), by Lemma 2.1, we have
Dn,q(1 + t2;x) = 1 + x2. (12)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1021 Qing-Bo Cai 1017-1026
Q. -B. CAI
Lemma 2.3. For every q ∈ (0, 1) and x ∈ [0,∞), we have
Dn,q
((t− x)2;x
) ≤ 2x2
[[2]q
[n + 1]q+
q2[n− 1]q[n + 1]q(1 + x)n+1
q
]+
2q2[n− 1]qx[n + 1]q[n]q
.= βn,q(x). (13)
Proof. Since Dn,q
((t− x)2;x
)= Dn,q
(t2;x
)− 2xDn,q(t;x) + x2 and Lemma 2.1, We have
Dn,q
((t− x)2;x
)
= 2x2 − 2x
x−
[q2[n− 1]q + [2]q(1 + x)n+1
q
]x
[n + 1]q(1 + x)n+1q
− q2[n− 1]q[n + 1]q[n]q
[1− 1 + [n + 1]qx
(1 + x)n+1q
]
= 2x2
[[2]q
[n + 1]q+
q2[n− 1]q[n + 1]q(1 + x)n+1
q
]+
2q2[n− 1]qx[n + 1]q[n]q
[1− 1 + [n + 1]qx
(1 + x)n+1q
]
≤ 2x2
[[2]q
[n + 1]q+
q2[n− 1]q[n + 1]q(1 + x)n+1
q
]+
2q2[n− 1]qx[n + 1]q[n]q
.
Thus the result holds.
Remark 2.4. Let sequence q = qn satisfies qn ∈ (0, 1) and qn → 1 as n →∞, then forany fixed x ∈ [0,∞), by Lemma 2.3, we have
limn→∞Dn,qn
((t− x)2;x
)= 0. (14)
3 Local approximation
In this section we establish direct and local approximation theorems in connection withthe operators Dn,q(f ;x).We denote the space of all real valued continuous bounded functions f defined on theinterval [0,∞) by CB[0,∞). The norm || · || on the space CB[0,∞) is given by ||f || =sup |f(x)| : x ∈ [0,∞).Further let us consider Peetre’s K−functional:
K2(f ; δ) = infg∈W 2
||f − g||+ δ||g′′|| ,
where δ > 0 and W 2 = g ∈ CB[0,∞) : g′, g′′ ∈ CB[0,∞).For f ∈ CB[0,∞), the modulus of continuity of second order is defined by
ω2 (f ; δ) = sup0<h≤δ
supx∈[0,∞)
|f(x + 2h)− 2f(x + h) + f(x)|,
by [5, p.177] there exists an absolute constant C > 0 such that
K2(f ; δ) ≤ Cω2
(f ;√
δ)
, δ > 0. (15)
For f ∈ CB[0,∞), the modulus of continuity is defined by
ω(f ; δ) = sup0<h≤δ
supx∈[0,∞)
|f(x + h)− f(x)|.
Our first result is a direct local approximation theorem for the operators Dn,q(f ;x).
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1022 Qing-Bo Cai 1017-1026
DURRMEYER TYPE q-BASKAKOV OPERATORS WHICH PRESERVE x2
Theorem 3.1. For q ∈ (0, 1), x ∈ [0,∞), n ∈ N and f ∈ CB[0,∞), we have
|Dn,q(f, x)−f(x)| ≤ Cω2
(f ;
√βn,q(x) + (An,q(x) + Bn,q(x))2
)+ω (f ;An,q(x) + Bn,q(x)) ,
(16)where C is a positive constant, βn,q(x), An,q(x) and Bn,q(x) are defined in (13), (9) and(10).
Proof. For x ∈ (0,∞], we define the auxiliary operators Dn,q(f ;x)
Dn,q(f ;x) = Dn,q(f ;x)− f (x−An,q(x)−Bn,q(x)) + f(x), (17)
where, An,q(x) and Bn,q(x) are defined in (9) and (10). Obviously, we have
Dn,q(t− x;x) = 0. (18)
Let g ∈ W 2, by Taylor’s expansion, we have
g(t) = g(x) + g′(x)(t− x) +∫ t
x(t− u)g′′(u)du, x, t ∈ [0,∞).
Using (18), we get
Dn,q(g;x) = g(x) + Dn,q
(∫ t
x(t− u)g′′(u)du;x
),
hence, we have
∣∣Dn,q(g;x)− g(x)∣∣
=∣∣∣∣Dn,q
(∫ t
x(t− u)g′′(u)du;x
)∣∣∣∣ +
∣∣∣∣∣∫ x
x−An,q(x)−Bn,q(x)u− [x−An,q(x)−Bn,q(x)] g′′(u)du
∣∣∣∣∣
≤ Dn,q
(∣∣∣∣∫ t
x(t− u)|g′′(u)|du
∣∣∣∣ ;x)
+∫ x
x−An,q(x)−Bn,q(x)|u− [x−An,q(x)−Bn,q(x)]| g′′(u)|du
≤[βn,q(x) + (An,q(x) + Bn,q(x))2
]||g′′||,
where, βn,q(x), An,q(x) and Bn,q(x) are defined in (13), (9) and (10).On the other hand, using (17), (15) and Lemma 2.1, we have
∣∣∣Dn,q(f ;x)∣∣∣ ≤ |Dn,q(f ;x)|+ 2||f || ≤ ||f ||Dn,q(1;x) + 2||f || ≤ 3||f ||. (19)
Thus,
|Dn,q(f ;x)− f(x)|≤ |Dn,q(f − g;x)− (f − g)(x)|+ |Dn,q(g;x)− g(x)|+ |f (x−An,q(x)−Bn,q(x))− f(x)|≤ 4||f − g||+
βn,q(x) + [An,q(x) + Bn,q(x)]2
||g′′||+ |f (x−An,q(x)−Bn,q(x))− f(x)| .
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1023 Qing-Bo Cai 1017-1026
Q. -B. CAI
Hence taking infimum on the right hand side over all g ∈ W 2, we get
|Dn,q(f ;x)− f(x)| ≤ 4K2
(f ;βn,q(x) + [An,q(x) + Bn,q(x)]2
)+ ω (f ;An,q(x) + Bn,q(x)) .
By (15), for every q ∈ (0, 1), we have
|Dn,q(f, x)−f(x)| ≤ Cω2
(f ;
√βn,q(x) + [An,q(x) + Bn,q(x)]2
)+ω (f ;An,q(x) + Bn,q(x)) ,
where, βn,q(x), An,q(x) and Bn,q(x) are defined in (13), (9) and (10). This completes theproof of Theorem 3.1.
4 Rate of convergence
Let Bx2 [0,∞) be the set of all functions f defined on [0,∞) satisfying the condition|f(x)| ≤ Mf (1+x2), where Mf is a constant depending only on f . We denote the subspaceof all continuous functions belonging to Bx2 [0,∞) by Cx2 [0,∞). Also, let C∗
x2 [0,∞) bethe subspace of all functions f ∈ Cx2 [0,∞), for which limx→∞
f(x)1+x2 is finite. The norm on
C∗x2 [0,∞) is ||f ||x2 = supx∈[0,∞)
|f(x)|1+x2 . We denote the usual modulus of continuity of f on
the closed interval [0, a], (a > 0) by
ωa(f, δ) = sup|t−x|≤δ
supx,t∈[0,a]
|f(t)− f(x)|.
Obviously, for function f ∈ Cx2 [0,∞), the modulus of continuity ωa(f, δ) tends to zero.
Theorem 4.1. Let f ∈ Cx2 [0,∞), q ∈ (0, 1) and ωa+1(f, δ) be the modulus of continuityon the finite interval [0, a + 1] ⊂ [0,∞), where a > 0. Then we have
||Dn,q(f)− f ||C[0,a] ≤ 6Mf (1 + a2)βn,q(a) + 2ωa+1
(f ;
√βn,q(a)
), (20)
where, βn,q(a) is defined in (13).
Proof. For x ∈ [0, a] and t > a + 1, we have
|f(t)− f(x)| ≤ Mf (2 + x2 + t2) ≤ Mf [2 + 3x2 + 2(t− x)2],
hence, we obtain|f(t)− f(x)| ≤ 6Mf (1 + a2)(t− x)2. (21)
For x ∈ [0, a] and t ≤ a + 1, we have
|f(t)− f(x)| ≤ ωa+1(f ; |t− x|) ≤(
1 +|t− x|
δ
)ωa+1(f ; δ), δ > 0. (22)
From (21) and (22), we get
|f(t)− f(x)| ≤ 6Mf (1 + a2)(t− x)2 +(
1 +|t− x|
δ
)ωa+1(f ; δ). (23)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1024 Qing-Bo Cai 1017-1026
DURRMEYER TYPE q-BASKAKOV OPERATORS WHICH PRESERVE x2
For x ∈ [0, a] and t ≥ 0, by Schwarz’s inequality and Lemma 2.3, we have
|Dn,q(f ;x)− f(x)|≤ Dn,q(|f(t)− f(x)|;x)
≤ 6Mf (1 + a2)Dn,q((t− x)2;x) + ωa+1(f ; δ)(
1 +1δ
√Dn,q((t− x)2;x)
)
≤ 6Mf
(1 + a2
)βn,q(a) + ωa+1(f, δ)
(1 +
1δ
√βn,q(a)
),
where, βn,q(a) is defined in (13). By taking δ =√
βn,q(a), we get the assertion of Theorem4.1.
5 Weighted approximation
Now we will discuss the weighted approximation theorems.
Theorem 5.1. Let the sequence q = qn satisfies 0 < qn < 1 and qn → 1 as n →∞, forf ∈ C∗
x2 [0,∞), we havelim
n→∞ ||Dn,qn(f)− f ||x2 = 0. (24)
Proof. By using the Korovkin theorem in [7], we see that it is sufficient to verify thefollowing three conditions
limn→∞ ||Dn,qn(tv;x)− xv||x2 , v = 0, 1, 2. (25)
Since Dn,qn(1;x) = 1 and Dn,qn(t2;x) = x2, (24) holds true for v = 0 and v = 2.Finally, for v = 1, we have
||Dn,qn(t;x)− x||x2
= supx∈[0,∞)
|Dn,qn(t;x)− x|1 + x2
=
1− q2[n− 1]q[n + 1]q
[1− 1
(1 + x)n+1q
]sup
x∈[0,∞)
x
1 + x2
+q2[n− 1]q[n + 1]q[n]q
[1− 1 + [n + 1]qx
(1 + x)n+1q
]sup
x∈[0,∞)
x
1 + x2
≤ 1− q2[n− 1]q[n + 1]q
[1− 1
(1 + x)n+1q
]+
q2[n− 1]q[n + 1]q[n]q
,
since limn→∞ qn = 1, we get lim
n→∞qn
2[n− 1]qn
[n + 1]qn
= 1, limn→∞
1(1 + x)n+1
q= 0 and lim
n→∞q2n[n− 1]qn
[n + 1]qn [n]qn
= 0,
so the second condition of (25) holds for v = 1 as n →∞, then the proof of Theorem 5.1is completed.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1025 Qing-Bo Cai 1017-1026
Q. -B. CAI
Acknowledgement
This work is supported by the Educational Office of Fujian Province of China (Grant No.JA13269) and the Startup Project of Doctor Scientific Research of Quanzhou Normal University.
References
[1] G. E. Andrews, R. Askey, R. Roy, Special functions, Cambridge University Press, Cambridge,1999.
[2] A. Aral, V. Gupta, On the Durrmeyer type modification of the q-Baskakov type operators,Nonlinear Anal., 72 (2010), 1171-1180.
[3] Q. -B. Cai, X. -M. Zeng, Convergence of modification of the Durrmeyer type q-Baskakovoperators, Georgian Math. J., 19(1) (2012), 49-61.
[4] A. De Sole, V. G. Kac, On integral representation of q-gamma and q-beta functions, Atti.Accad. Naz. Lincei Cl. Sci. Fis. Mat. Natur. Rend. Lincei, (9)Mat.Appl., 16(1)(2005), 11-29.
[5] R. A. DeVore, G. G. Lorentz, Constructive Approximation, Springer, Berlin, 1993.
[6] A. D. Gadjiev, R. O. Efendiyev, E. Ibikli, On Korovkin type theorem in the space of locallyintegrable functions, Czechoslovak Math. J., 53(128)(No.1) (2003), 45-53.
[7] A. D. Gadjiev, Theorems of the type of P. P. Korovkin type theorems, Math. Zametki,20(5)(1976), 781-786, (English Translation, Math. Notes 20(5-6)(1976), 996-998).
[8] G. Gasper, M. Rahman, Basic Hypergeometric Series, Encyclopedia of Mathematics and itsapplications, Cambridge University press, Cambridge, UK., 35 1990.
[9] F. H. Jackson, On a q-definite integrals, Quart. J. of Pure Appl. Math., 41 (1910), 193-203.
[10] V. G. Kac, P. Cheung, Quantum Calculus, Universitext, Springer-Verlag, New York, 2002.
[11] T. H. Koornwinder,. q-Special functions, a tutorial, in: M. Gerstenhaber, J. Stasheff(Eds.),Deformation Theory and Quantum Gruoups with Applications to Mathemati al Physics, in:Contemp. Math., Amer. Math. Soc., 134 (1992).
[12] G. M. Phillips, Bernstein polynomials based on the q-integers, Ann. Numer. Math., 4 (1997),511-518.
[13] A. Il’inskii, Convergence of Generaized Bernstein Polynomials, J. Approx. Theory, 116 (2002),100-112.
[14] V. Gupta, A. Aral, Convergence of the q analogue of Szasz-Beta operators, Appl. Math.Comput. Sci., 216 (2010), 374-380.
[15] S. Ostrovska, q-Bernstein polynomials and their iterates, J. Approx. Theory, 123 (2003),232-255.
[16] H. Wang, Korovkin-type theorem and application, J. Approx. Theory, 132(2) (2005), 258-264.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1026 Qing-Bo Cai 1017-1026
Qualitative behavior of two systems of second-order rational
difference equations ∗
A. Q. Khan† M. N. Qureshi‡ Q. Din§
Abstract
In this paper, we study the qualitative behavior of two systems of second-order rational differenceequations. More precisely, we study the local asymptotic stability and instability of equilibriumpoints, global character of equilibrium points and rate of convergence of these systems. Somenumerical examples are given to verify our theoretical results.
Keywords and phrases: Rational difference equations, stability, global character, rate of conver-gence.
2010 AMS Mathematics subject classifications: 39A10, 40A05.
1 Introduction
Difference equations appear as natural descriptions of observed evolution phenomena because mostmeasurements of time evolving variables are discrete and as such these equations are in their own rightimportant mathematical models. More importantly, difference equations also appear in the study ofdiscretization methods for differential equations. Several results in the theory of difference equationshave been obtained as more or less natural discrete analogues of corresponding results of differentialequations. For basic theory and applications of difference equations, we refer interested readers to[1, 2, 3, 4, 5]. Moreover, in [9, 7, 8, 10, 11, 12], dynamics of some difference equations is given. InRefs. [16, 17, 18, 19, 20], qualitative behavior of some biological models is discussed. Recently therehas been a lot of interest in studying the global attractivity, boundedness character, periodicity andthe solution form of nonlinear difference equations. For some results in this area, for example:
Gibbons et al. [10] investigated the global asymptotic stability of the difference equation:
xn+1 =α+ βxn−1
γ + xn,
where β > 0 and α, γ ≥ 0.Bajo and Liz [11] investigated the global behavior of difference equation:
xn+1 =xn−1
a+ bxn−1xn,
for all values of real parameters a, b.
∗This work was supported by HEC of Pakistan†Department of Mathematics, University of Azad Jammu and Kashmir, Muzaffarabad, Pakistan, e-mail: ab-
[email protected]‡Department of Mathematics, University of Azad Jammu and Kashmir, Muzaffarabad, Pakistan, e-mail:
[email protected]§Department of Mathematics, University of Azad Jammu and Kashmir, Muzaffarabad, Pakistan, e-mail: qa-
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1027 A. Q. Khan et al 1027-1041
To be motivated by the above studies, our aim in this paper is to investigate the qualitativebehavior of following two systems of second-order rational difference equations
xn+1 =αxn−1
β + γynyn−1, yn+1 =
α1yn−1
β1 + γ1xnxn−1, n = 0, 1, · · · , (1)
where the parameters α, β, γ, α1, β1, γ1 and initial conditions x0, x−1, y0, y−1 are positive realnumbers, and
xn+1 =ayn−1
b+ cxnxn−1, yn+1 =
a1xn−1
b1 + c1ynyn−1, n = 0, 1, · · · , (2)
where the parameters a, b, c, a1, b1, c1 and initial conditions x0, x−1, y0, y−1, are positive realnumbers.
Let us consider four-dimensional discrete dynamical system of the form
xn+1 = f(xn, xn−1, yn, yn−1), (3)
yn+1 = g(xn, xn−1, yn, yn−1), n = 0, 1, · · · ,
where f : I2 × J2 → I and g : I2 × J2 → J are continuously differentiable functions and I, J aresome intervals of real numbers. Furthermore, a solution (xn, yn)∞n=−1 of system (3) is uniquelydetermined by initial conditions (xi, yi) ∈ I × J for i ∈ −1, 0. Along with system (3) we considerthe corresponding vector map F = (f, xn, xn−1, g, yn, yn−1). An equilibrium point of (3) is a point(x, y) that satisfies
x = f(x, x, y, y, )
y = g(x, x, y, y)
The point (x, y) is also called a fixed point of the vector map F .
Definition 1. Let (x, y) be an equilibrium point of the system (3).(i) An equilibrium point (x, y) is said to be stable if for every ε > 0 there exists δ > 0 such that for
every initial condition (xi, yi), i ∈ −1, 0 ‖0∑
i=−1
(xi, yi) − (x, y)‖ < δ implies ‖(xn, yn) − (x, y)‖ < ε
for all n > 0, where ‖.‖ is the usual Euclidian norm in R2.(ii) An equilibrium point (x, y) is said to be unstable if it is not stable.(iii) An equilibrium point (x, y) is said to be asymptotically stable if there exists η > 0 such that
‖0∑
i=−1
(xi, yi)− (x, y)‖ < η and (xn, yn)→ (x, y) as n→∞.
(iv) An equilibrium point (x, y) is called global attractor if (xn, yn)→ (x, y) as n→∞.(v) An equilibrium point (x, y) is called asymptotic global attractor if it is a global attractor and
stable.
Definition 2. Let (x, y) be an equilibrium point of the map
F = (f, xn, xn−1, g, yn, yn−1) ,
where f and g are continuously differentiable functions at (x, y). The linearized system of (3) aboutthe equilibrium point (x, y) is
Xn+1 = F (Xn) = FJXn,
where Xn =
xnxn−1
ynyn−1
and FJ is the Jacobian matrix of the system (3) about the equilibrium point
(x, y).
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1028 A. Q. Khan et al 1027-1041
Lemma 1. [3] For the system Xn+1 = F (Xn), n = 0, 1, · · · of difference equations such let X be afixed point of F . If all eigenvalues of the Jacobian matrix JF about X lie inside an open unit disk|λ| < 1, then X is locally asymptotically stable. If one of them has norm greater than one, then X isunstable.
Lemma 2. [4] Assume that Xn+1 = F (Xn), n = 0, 1, · · · is a system of difference equations and X isthe equilibrium point of this system. The characteristic polynomial of this system about the equilibriumpoint X is P (λ) = a0λ
n + a1λn−1 + · · ·+ an−1λ+ an = 0, with real coefficients and a0 > 0. Then all
roots of the polynomial P (λ) lies inside the open unit disk |λ| if and only if ∆k > 0 for k = 0, 1, · · · ,where ∆k is the principal minor of order k of the n× n matrix
∆n =
a1 a3 a5 . . . 0a0 a2 a4 . . . 00 a1 a3 . . . 0...
.... . .
...0 0 0 . . . an
. (4)
The following result gives the rate of convergence of solution of a system of difference equations
Xn+1 = (A+B(n))Xn, (5)
where Xn is an m-dimensional vector, A ∈ Cm×m is a constant matrix, and B : Z+ → Cm×m is amatrix function satisfying
‖B(n)‖ → 0 (6)
as n→∞ ,where ‖ · ‖ denotes any matrix norm which is associated with the vector norm
‖(x, y)‖ =√x2 + y2
Proposition 1. (Perron’s Theorem)[13] Suppose that condition (6) holds. If Xn is a solution of (5), then either Xn = 0 for all large n or
ρ = limn→∞
(‖Xn‖)1/n (7)
exists and is equal to the modulus of one the eigenvalues of matrix A.
Proposition 2. [13] Suppose that condition (6) holds . If Xn is a solution of (5) , then either Xn = 0for all large n or
ρ = limn→∞
‖Xn+1‖‖Xn‖
(8)
exists and is equal to the modulus of one of the eigenvalues of matrix A.
2 On the system xn+1 =αxn−1
β+γynyn−1, yn+1 =
α1yn−1
β1+γ1xnxn−1
In this section, we shall investigate the qualitative behavior of the system (1). Let (x, y) be anequilibrium point of system (1), then for α > β and α1 > β1 system (1) has following two equilibrium
points P0 = (0, 0), P1 =(√
α1−β1γ1
,√
α−βγ
).
To construct corresponding linearized form of the system (1) we consider the following transfor-mation:
(xn, xn−1, yn, yn−1) 7→ (f, f1, g, g1), (9)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1029 A. Q. Khan et al 1027-1041
where f = αxn−1
β+γynyn−1, f1 = xn, g = α1yn−1
β1+γ1xnxn−1, g1 = yn. The Jacobian matrix about the fixed point
(x, y) under the transformation (12) is given by
FJ(x, y) =
0 αβ+γy2 − αγxy(
β+γy2)2 − αγxy(
β+γy2)2
1 0 0 0
− α1γ1xy(β1+γ1x
2)2 − α1γ1xy(
β1+γ1x2)2 0
α1β1+γ1x
2
0 0 1 0
Theorem 1. Let α < β and α1 < β1, then every solution (xn, yn) of the system (1) is bounded.
Proof. It is easy to verify that
0 ≤ xn ≤(α
β
)m+1
x−1, if n = 2m+ 1,
0 ≤ xn ≤(α
β
)m+1
x0, if n = 2m+ 2,
0 ≤ yn ≤(α1
β1
)m+1
y−1, if n = 2m+ 1,
0 ≤ yn ≤(α1
β1
)m+1
y0, if n = 2m+ 2,
Taking δ1 = maxx−1, x0 and δ2 = maxy−1, y0. Then, 0 ≤ xn < δ1 and 0 ≤ yn < δ2 for alln = 0, 1, 2, · · · .
Theorem 2. For the equilibrium point P0 of the system (1) following results hold(i) If α < β and α1 < β1, then equilibrium point P0 is locally asymptotically stable.(ii) If α > β or α1 > β1, then equilibrium point P0 is unstable.
Proof. (i) The linearized system of (1) about the equilibrium point (0, 0) is given by
Xn+1 = FJ(0, 0)Xn,
where Xn =
xnxn−1
ynyn−1
, and FJ(0, 0) =
0 α
β 0 0
1 0 0 00 0 0 α1
β10 0 1 0
.
The characteristic polynomial of FJ(0, 0) is given by
P (λ) = λ4 − (α
β+α1
β1)λ2 +
αα1
ββ1. (10)
The roots of P (λ) are λ = ±√
αβ , λ = ±
√α1β1
. Since all eigenvalues of Jacobian matrix FJ(0, 0) about
(0, 0) lie in open unit dick |λ| < 1. Hence, the equilibrium point (0, 0) is locally asymptotically stable.(ii) It is easy to see that if α > β or α1 > β1, then there exists at least one root λ of Equation
(??) such that |λ| > 1. Hence, by Lemma 1 if α > β or α1 > β1, then (0, 0) is unstable.
Theorem 3. If α > β and α1 > β1, then positive equilibrium point
(x, y) =
(√α1 − β1
γ1,
√α− βγ
)
of the system (1) is unstable.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1030 A. Q. Khan et al 1027-1041
Proof. The linearized system of (1) about the equilibrium point P1 is given by
Xn+1 = FJ(P1)Xn,
where Xn =
xnxn−1
ynyn−1
and FJ(P1) =
0 1 A A1 0 0 0B B 0 10 0 1 0
.
The characteristic polynomial of FJ(P1) is given by
P (λ) = λ4 − (2 +AB)λ2 − 2ABλ+ 1−AB, (11)
where A = − 1α
√γ(α−β)(α1−β1)
γ1and B = − 1
α1
√γ1(α−β)(α1−β1)
γ . It is clear that not all of ∆k > 0 for
k = 1, 2, 3, 4. Hence by Lemma 2, the positive equilibrium point
(x, y) =
(√α1 − β1
γ1,
√α− βγ
)
is locally unstable.
Theorem 4. Let α < β and α1 < β1, then the equilibrium point P0 = (0, 0) of Equation (1) is globallyasymptotically stable.
Proof. For α < β and α1 < β1, from Theorem 2 (0, 0) is locally asymptotically stable. From Theorem1, every positive solution (xn, yn) of the system (1) is bounded. Now, it is sufficient to prove that(xn, yn) is decreasing. From system (1) one has
xn+1 =αxn−1
β + γynyn−1
≤ αxn−1
β< xn−1.
This implies that x2n+1 < x2n−1 and x2n+3 < x2n+1. Hence, the subsequences x2n+1, x2n+2 aredecreasing, i.e., the sequence xn is decreasing. Similarly, one has
yn+1 =α1yn−1
β1 + γ1xnxn−1
≤ α1yn−1
β1< yn−1.
This implies that y2n+1 < y2n−1 and y2n+3 < y2n+1. Hence, the subsequences y2n+1, y2n+2 aredecreasing, i.e., the sequence yn is decreasing. Hence, lim
n→∞xn = lim
n→∞yn = 0.
2.1 Rate of Convergence
We investigate the rate of convergence of a solution that converges to the equilibrium point P0 of thesystem (1).
Let (xn, yn) be any solution of the system (1) such that limn→∞
xn = x, and limn→∞
yn = y. To find
the error terms, one has from the system (1)
xn+1 − x =1∑i=0
Ai (xn−i − x) +1∑i=0
Bi (yn−i − y) ,
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1031 A. Q. Khan et al 1027-1041
yn+1 − y =1∑i=0
Ci (xn−i − x) +1∑i=0
Di (yn−i − y) .
Set e1n = xn − x and e2
n = yn − y, one has
e1n+1 =
1∑i=0
Aie1n−i +
1∑i=0
Bie2n−i,
e2n+1 =
1∑i=0
Cie1n−i +
1∑i=0
Die2n−i.
where A0 = 0, A1 = αβ+γynyn−1
, B0 = − αγxyn−1
(β+γynyn−1)(β+γy2), B1 = − αγxy
(β+γynyn−1)(β+γy2),
C0 = − α1γ1yxn−1
(β1+γ1xnxn−1)(β1+γ1x2), C1 = − α1γ1xy
(β1+γ1xnxn−1)(β1+γ1x2), D0 = 0, D1 = α1
β1+γ1xnxn−1.
Taking the limits, we obtain limn→∞
A0 = 0, limn→∞
A1 =α
β + γy2, limn→∞
B0 = limn→∞
B1 = − αγxy
(β + γy2)2 ,
limn→∞
C0 = limn→∞
C1 = − α1γ1xy
(β1 + γ1x2)2 , limn→∞
D0 = 0, limn→∞
D1 =α1
β1 + γ1x2. So, the limiting system of
error terms can be written asEn+1 = KEn,
where En =
e1n
e1n−1
e2n
e2n−1
and
K =
0 α
β+γy2− αγxy
(β+γy2)2− αγxy
(β+γy2)2
1 0 0 0− α1γ1xy
(β1+γ1x2)2− α1γ1xy
(β1+γ1x2)20 α1
β1+γ1x2
0 0 1 0
,
which is similar to linearized system of (2) about the equilibrium point (x, y).Using proposition (1), one has following result.
Theorem 5. Assume that (xn, yn) be a positive solution of the system (1) such that limn→∞
xn = x,
and limn→∞
yn = y, where (x, y) = (0, 0). Then, the error vector En of every solution of (1) satisfies
both of the following asymptotic relations
limn→∞
(‖En‖)1n = |λFJ(x, y)|, lim
n→∞
‖En+1‖‖En‖
= |λFJ(x, y)|,
where λFJ(x, y) are the characteristic roots of the Jacobian matrix FJ(x, y) about (0, 0).
3 On the system xn+1 =ayn−1
b+cxnxn−1, yn+1 =
a1xn−1
b1+c1ynyn−1
In this section, we shall investigate the qualitative behavior of the system (2). Let (x, y) be anequilibrium point of the system (2), then system (2) has a unique equilibrium point (0, 0). To constructcorresponding linearized form of the system (2) we consider the following transformation:
(xn, xn−1, yn, yn−1) 7→ (f, f1, g, g1), (12)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1032 A. Q. Khan et al 1027-1041
where f = ayn−1
b+cxnxn−1, f1 = xn, g = a1xn−1
b1+ c1ynyn−1, g1 = yn. The Jacobian matrix about the fixed point
(x, y) under the transformation (12) is given by
FJ(x, y) =
( − acxy
(b+cx2)2− acxy
(b+cx2)20 a
b+cx2
1 0 0 0
0a1
b1+ c1y2 − a1 c1xy
( b1+ c1y2)2
− a1 c1xy
( b1+ c1y2)2
0 0 1 0
)
Theorem 6. Let (xn, yn) be positive solution of system (2), then for every m ≥ 1 the followingresults hold.
(i) 0 ≤ xn ≤
(ab
)m+1(
a1b1
)my−1, if n = 4m+ 1,
(ab
)m+1(
a1b1
)my0, if n = 4m+ 2,(
ab
)m+1(
a1b1
)mx−1, if n = 4m+ 3,(
ab
)m+1(
a1b1
)my0, if n = 4m+ 4.
(ii) 0 ≤ yn ≤
(ab
)m ( a1b1
)m+1x−1, if n = 4m+ 1,
(ab
)m ( a1b1
)m+1x0, if n = 4m+ 2,(
ab
)m ( a1b1
)m+1y−1, if n = 4m+ 3,(
ab
)m ( a1b1
)m+1y0, if n = 4m+ 4.
Theorem 7. For the equilibrium point P0 of the system (2) following results hold(i) If a < b and a1 < b1, then equilibrium point P0 is locally asymptotically stable.(ii) If a > b or a1 > b1, then equilibrium point P0 is unstable.
Proof. (i) The linearized system of (2) about the equilibrium point (0, 0) is given by
Xn+1 = FJ(0, 0)Xn,
where Xn =
xnxn−1
ynyn−1
, and FJ(0, 0) =
0 0 0 a
b1 0 0 00 a1
b10 0
0 0 1 0
.
The characteristic polynomial of FJ(0, 0) is given by
P (λ) = λ4 − aa1
bb1. (13)
The roots of P (λ) are λ = ±(aa1bb1)14 , λ = ±ι(aa1bb1
)14 . Since all eigenvalues of Jacobian matrix FJ(0, 0)
about (0, 0) lie in open unit dick |λ| < 1. Hence, the equilibrium point (0, 0) is locally asymptoticallystable.
(ii) It is easy to see that if a > b or a1 > b1, then there exists at least one root λ of Equation(??) such that |λ| > 1. Hence, by Lemma 1 if a > b or a1 > b1, then (0, 0) is unstable.
Theorem 8. Let a < b and a1 < b1, then the equilibrium point P0 = (0, 0) of Equation (2) isglobally asymptotically stable.
Proof. For a < b and a1 < b1, from Theorem 7 (0, 0) is locally asymptotically stable. From Theorem6, it is easy to show that every positive solution (xn, yn) of the system (2) is bounded. Now, it is
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1033 A. Q. Khan et al 1027-1041
sufficient to prove that (xn, yn) is decreasing. From system (2) one has
xn+1 =ayn−1
b+ cxnxn−1,
≤ ayn−1
b< yn−1.
This implies that x4n+1 < y4n−1 and x4n+5 < y4n+3. Also
yn+1 =a1xn−1
b1 + c1ynyn−1,
≤ axn−1
b< xn−1.
This implies that y4n+1 < x4n−1 and y4n+5 < x4n+3. so x4n+5 < y4n+3 < x4n+1 and y4n+5 < x4n+3 <y4n+1. Hence, the subsequences
x4n+1, x4n+2, x4n+3, x4n+4
andy4n+1, y4n+2, y4n+3, y4n+4
are decreasing. Therefore the sequences xn and yn are decreasing. Hence, limn→∞
xn = limn→∞
yn =
0.
3.1 Rate of Convergence
We investigate the rate of convergence of a solution that converges to the equilibrium point P0 of thesystem (2).
Let (xn, yn) be any solution of the system (2) such that limn→∞
xn = x, and limn→∞
yn = y. To find
the error terms, one has from the system (2)
xn+1 − x =
1∑i=0
Ai (xn−i − x) +
1∑i=0
Bi (yn−i − y) ,
yn+1 − y =
1∑i=0
Ci (xn−i − x) +
1∑i=0
Di (yn−i − y) .
Set e1n = xn − x and e2
n = yn − y, one has
e1n+1 =
1∑i=0
Aie1n−i +
1∑i=0
Bie2n−i,
e2n+1 =
1∑i=0
Cie1n−i +
1∑i=0
Die2n−i.
where A0 = − acxn−1y(b+cxnxn−1)(b+cx2)
, A1 = − acxy(b+cxnxn−1)(b+cx2)
, B0 = 0, B1 = ab+cxnxn−1
, C0 = 0, C1 =a1
b1+ c1ynyn−1, D0 = − a1 c1xyn−1
( b1+ c1ynyn−1)( b1+ c1y2), D1 = − a1 c1xy
( b1+ c1ynyn−1)( b1+ c1y2).
Taking the limits, we obtain limn→∞
A0 = limn→∞
A1 = − acxy
(b+ cx2)2, limn→∞
B0 = 0, limn→∞
B1 =a
b+ cx2,
limn→∞
C0 = 0, limn→∞
C1 =a1
b1 + c1y2, limn→∞
D0 = limn→∞
D1 = − a1 c1xy
( b1 + c1y2)2. So, the limiting system of
error terms can be written asGn+1 = MGn,
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1034 A. Q. Khan et al 1027-1041
where Gn =
e1n
e1n−1
e2n
e2n−1
and
M =
− acxy
(b+cx2)2− acxy
(b+cx2)20 a
b+cx2
1 0 0 00 a1
b1+ c1y2− a1 c1xy
( b1+ c1y2)2− a1 c1xy
( b1+ c1y2)2
0 0 1 0
,
which is similar to linearized system of (2) about the equilibrium point (x, y).Using proposition (1), one has following result.
Theorem 9. Assume that (xn, yn) be a positive solution of the system (1) such that limn→∞
xn = x,
and limn→∞
yn = y, where (x, y) = (0, 0). Then, the error vector En of every solution of (1) satisfies
both of the following asymptotic relations
limn→∞
(‖En‖)1n = |λFJ(x, y)|, lim
n→∞
‖En+1‖‖En‖
= |λFJ(x, y)|,
where λFJ(x, y) are the characteristic roots of the Jacobian matrix FJ(x, y) about (0, 0).
4 Examples
In order to verify our theoretical results and to support our theoretical discussions, we consider severalinteresting numerical examples in this section. These examples represent different types of qualitativebehavior of solutions to the systems of nonlinear difference equations (1) and (2). All plots in thissection are drawn with mathematica.
Example 1. Consider the system (1) with initial conditions x−1 = 1.2, x0 = 2.9, y−1 = 1.7, y0 = 1.8.Moreover, choosing the parameters α = 15.5, β = 16, γ = 0.008, α1 = 18, β1 = 19, γ1 = 0.002.Then, the system (1) can be written as:
xn+1 =15.5xn−1
16 + 0.008ynyn−1, yn+1 =
18yn−1
19 + 0.002xnxn−1, n = 0, 1, · · · , (14)
and with initial conditions x−1 = 1.2, x0 = 2.9, y−1 = 1.7, y0 = 1.8.Moreover, in Fig. 1 the plot of xn is shown in Fig. 1a, the plot of yn is shown in Fig. 1b and an
attractor of the system (14) is shown in Fig. 1c.
Example 2. Consider the system (1) with initial conditions x−1 = 1.2, x0 = 3.2, y−1 = 1.7, y0 = 0.8.Moreover, choosing the parameters α = 55, β = 60, γ = 1.4, α1 = 17, β1 = 19, γ1 = 0.3. Then, thesystem (1) can be written as:
xn+1 =55xn−1
60 + 1.4ynyn−1, yn+1 =
17yn−1
19 + 0.3xnxn−1, n = 0, 1, · · · , (15)
and with initial conditions x−1 = 1.2, x0 = 3.2, y−1 = 1.7, y0 = 0.8.Moreover, in Fig. 2 the plot of xn is shown in Fig. 2a, the plot of yn is shown in Fig. 2b and an
attractor of the system (15) is shown in Fig. 2c.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1035 A. Q. Khan et al 1027-1041
(a) Plot of xn for the system (14) (b) Plot of yn for the system (14)
(c) An attractor of the system (14)
Figure 1: Plots for the system (14)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1036 A. Q. Khan et al 1027-1041
(a) Plot of xn for the system (15) (b) Plot of yn for the system (15)
(c) An attractor of the system (15)
Figure 2: Plots for the system (15)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1037 A. Q. Khan et al 1027-1041
Example 3. Consider the system (2) with initial conditions x−1 = 1.1, x0 = 1.2, y−1 = 2.7, y0 = 1.8.Moreover, choosing the parameters a = 128, b = 129, c = 3, a1 = 115, b1 = 119, c1 = 2. Then,the system (2) can be written as:
xn+1 =128yn−1
129 + 3xnxn−1, yn+1 =
115xn−1
119 + 2ynyn−1, n = 0, 1, · · · , (16)
and with initial conditions x−1 = 1.1, x0 = 1.2, y−1 = 2.7, y0 = 1.8.Moreover, in Fig. 3 the plot of xn is shown in Fig. 3a, the plot of yn is shown in Fig. 3b and an
attractor of the system (16) is shown in Fig. 3c.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1038 A. Q. Khan et al 1027-1041
(a) Plot of xn for the system (16) (b) Plot of yn for the system (16)
(c) An attractor of the system (16)
Figure 3: Plots for the system (16)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1039 A. Q. Khan et al 1027-1041
ConclusionIn the paper, we have investigated the qualitative behavior of two four-dimensional discrete dy-
namical systems. Each system has only one equilibrium point which is stable under some restrictionto parameters. The most important finding here is that the unique equilibrium point (0, 0) can bea global asymptotic attractor for the systems (1) and (2). Moreover, we have determined the rateof convergence of a solution that converges to the equilibrium point (0, 0) of the systems (1) and(2). Some numerical examples are provided to support our theoretical results. These examples areexperimental verifications of theoretical discussions.
Acknowledgements
This work was supported by the Higher Education Commission of Pakistan.
References
[1] R. P. Agarwal, Difference Equations and Inequalities: Second Edition, Revised and Expended,Marcel Dekker, New York, (2000), pp. 980.
[2] E. A. Grove, G. Ladas, Periodicities in Nonlinear Difference Equations, Chapman and Hall/CRCPress, Boca Raton, (2004).
[3] H. Sedaghat, Nonlinear difference equations: Theory with applications to social science models,Kluwer Academic Publishers, Dordrecht, (2003).
[4] V. L. Kocic, G. Ladas, Global Behavior of Nonlinear Difference Equations of Higher Order withApplications, Kluwer Academic, Dordrecht, (1993).
[5] E. Camouzis, G. Ladas, Dynamics of third-order rational Difference Equations: With OpenProblems and Conjectures, Chapman and Hall/HRC, Boca Raton, (2007).
[6] M. Aloqeili, Dynamics of a rational difference equation, Appl. Math. Comput., 176(2)(2006),768–774.
[7] A. M. Amleh, V. Kirk, G. Ladas, On the dynamics of xn+1 = a+bxn−1
A+Bxn−2, Math. Sci. Res. Hot-Line,
5(2001), 1–15.
[8] V. L. Kocic, G. Ladas, Global attractivity in a second order nonlinear difference equations, J.Math. Anal. Appl., 180(1993), 144–150.
[9] M. R. S. Kulenovic, G. Ladas, N.P. Prokup, A rational difference equation, Comput. Math.Appl., 41(2001), 671–678.
[10] C. H. Gibbons, M. R. S. Kulenovic, G. Ladas, On the recurrance sequence xn+1 = α+βxn−1
γ+xn,
Math. Sci. Res. Hot-Line, 4(2)(2000), 1–11.
[11] I. Bajo, E. Liz, Global behaviour of a second-order nonlinear difference equation, J. Diff. Eq.Appl., 17(10)(2011), 1471–1486.
[12] Q. Din, Global behavior of a rational difference equation, Acta Universitatis Apulensis, 30(2012),35–49.
[13] M. Pituk, More on Poincare’s and Perron’s theorems for difference equations, J. Diff. Eq. Appl.,8(2002), 201–216.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1040 A. Q. Khan et al 1027-1041
[14] Q. Zhang, L. Yang, J. Liu, Dynamics of a system of rational third order difference equation, Ad.Diff. Eq., doi:10.1186/1687-1847-2012-136.
[15] M. Shojaei, R. Saadati, H. Adibi, Stability and periodic character of a rational third orderdifference equation, Chaos Soliton Fract., 39(2009), 1203–1209.
[16] Q. Din, Dynamics of a discrete Lotka-Volterra model, Ad. Diff. Eq., 1(2013), 1–13.
[17] Q. Din, T. Donchev, Global character of a host-parasite model, Chaos Soliton Fract., 54(2013),1–7.
[18] Q. Din, A. Q. Khan, M. N. Qureshi, Qualitative behavior of a host-pathogen model, Ad. Diff.Eq., 1(2013), 263.
[19] Q. Din, Global behavior of a population model, Chaos Soliton Fract., 59(2014), 119–128.
[20] M. N. Qureshi, A. Q. Khan, Q. Din, Asymptotic behavior of a Nicholson-Bailey model, Ad. Diff.Eq., in press.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1041 A. Q. Khan et al 1027-1041
Strong differential subordination results using a generalized Salageanoperator and Ruscheweyh operator
Andrei LorianaDepartment of Mathematics and Computer Science, University of Oradea
1 Universitatii street, 410087 Oradea, [email protected]
Abstract
In the present paper we study the operator using the extended generalized Salagean operator and ex-tended Ruscheweyh operator, denote by DRmλ f(z, ζ), the Hadamard product of the extended generalizedSalagean operator Dm
λ f(z, ζ) and extended Ruscheweyh operator Rmf(z, ζ), given by DRmλ f(z, ζ) : A∗ζ → A∗ζ ,
DRmλ f(z, ζ) = (Dmλ ∗Rm) f(z, ζ) and A∗nζ = f ∈ H(U×U) : f(z, ζ) = z+an+1(ζ)zn+1+ . . . , z ∈ U, ζ ∈ U is
the class of normalized analytic functions with A∗1ζ = A∗ζ . We obtain several strong differential subordinationsregarding the operator DRmλ f(z, ζ).
Keywords: strong differential subordination, univalent function, convex function, differential operator, bestdominant, extended generalized Salagean operator, extended Ruscheweyh operator, convolution product2000 Mathematical Subject Classification: 30C45, 30A20, 34A40.
1 IntroductionDenote by U the unit disc of the complex plane U = z ∈ C : |z| < 1, U = z ∈ C : |z| ≤ 1 the closed unit
disc of the complex plane and H(U × U) the class of analytic functions in U × U .Let A∗nζ = f ∈ H(U ×U), f(z, ζ) = z + an+1 (ζ) zn+1 + . . . , z ∈ U, ζ ∈ U, with A∗1ζ = A∗ζ , where ak (ζ) are
holomorphic functions in U for k ≥ 2, and H∗[a, n, ζ] = f ∈ H(U ×U), f(z, ζ) = a+ an (ζ) zn + an+1 (ζ) zn+1 +. . . , z ∈ U, ζ ∈ U, for a ∈ C and n ∈ N, ak (ζ) are holomorphic functions in U for k ≥ n.
Definition 1.1 ([2]) For f ∈ A∗ζ, λ ≥ 0 and m ∈ N, the extended generalized Salagean operator Dmλ is defined by
Dmλ : A∗ζ → A∗ζ,
D0λf (z, ζ) = f (z, ζ)
D1λf (z, ζ) = (1− λ) f (z, ζ) + λzf 0z(z, ζ) = Dλf (z, ζ) , ...
Dm+1λ f(z, ζ) = (1− λ)Dm
λ f (z, ζ) + λz (Dmλ f (z, ζ))
0z = Dλ (D
mλ f (z, ζ)) , z ∈ U, ζ ∈ U.
Remark 1.1 ([2]) If f ∈ A∗ζ and f(z, ζ) = z+P∞
j=2 aj (ζ) zj, then Dm
λ f (z, ζ) = z+P∞
j=2 [1 + (j − 1)λ]maj (ζ) z
j,for z ∈ U, ζ ∈ U .
Definition 1.2 ([1]) For f ∈ A∗ζ, m ∈ N, the extended Ruscheweyh derivative Rm is defined by Rm : A∗ζ → A∗ζ,
R0f (z, ζ) = f (z, ζ)
R1f (z, ζ) = zf 0z (z, ζ) , ...
(m+ 1)Rm+1f (z, ζ) = z (Rmf (z, ζ))0z +mR
mf (z, ζ) , z ∈ U, ζ ∈ U.
Remark 1.2 ([1]) If f ∈ A∗ζ , f(z, ζ) = z +P∞j=2 aj (ζ) z
j, then Rmf (z, ζ) = z +P∞j=2
(m+j−1)!m!(j−1)! aj (ζ) z
j, z ∈ U,ζ ∈ U.
Definition 1.3 ([3]) Let λ ≥ 0, m ∈ N. Denote by DRmλ the extended operator given by DRmλ : A∗ζ → A∗ζ ,DRmλ f(z, ζ) = (D
mλ ∗Rm) f(z, ζ), z ∈ U, ζ ∈ U.
1
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1042 Andrei Loriana 1042-1048
Remark 1.3 ([3]) If f ∈ A∗ζ , f(z, ζ) = z +P∞
j=2 a2j (ζ) z
j, then
DRmλ f(z, ζ) = z+P∞j=2
n[1 + (j − 1)λ]m (m+j−1)!
m!(j−1)!
oa2j (ζ) z
j , z ∈ U, ζ ∈ U.This operator was studied also in [4] and [9].
Remark 1.4 For λ = 1 we obtain the Hadamard product of the Salagean operator and Ruscheweyh operator,which was studied in [5], [6], [7], [8].
Generalizing the notion of differential subordinations, J.A. Antonino and S. Romaguera have introduced in [12]the notion of strong differential subordinations, which was developed by G.I. Oros and Gh. Oros in [13].
Definition 1.4 ([13]) Let f (z, ζ), H (z, ζ) analytic in U×U. The function f (z, ζ) is said to be strongly subordinateto H (z, ζ) if there exists a function w analytic in U , with w (0) = 0 and |w (z)| < 1 such that f (z, ζ) = H (w (z) , ζ)for all ζ ∈ U . In such a case we write f (z, ζ) ≺≺ H (z, ζ) , z ∈ U, ζ ∈ U.
Remark 1.5 ([13]) (i) Since f (z, ζ) is analytic in U × U , for all ζ ∈ U, and univalent in U, for all ζ ∈ U ,Definition 1.4 is equivalent to f (0, ζ) = H (0, ζ) , for all ζ ∈ U, and f
¡U × U
¢⊂ H
¡U × U
¢.
(ii) If H (z, ζ) ≡ H (z) and f (z, ζ) ≡ f (z) , the strong subordination becomes the usual notion of subordination.
We have need the following lemmas to study the strong differential subordinations.
Lemma 1.1 ([1]) Let g (z, ζ) be a convex function in U ×U , for all ζ ∈ U, and let h(z, ζ) = g(z, ζ)+nαzg0z(z, ζ),z ∈ U, ζ ∈ U, where α > 0 and n is a positive integer. If p(z, ζ) = g(0, ζ) + pn (ζ) zn + pn+1 (ζ) zn+1 + . . . , z ∈ U,ζ ∈ U, is holomorphic in U × U and p(z, ζ) + αzp0z(z, ζ) ≺≺ h(z, ζ), z ∈ U, ζ ∈ U, then p(z, ζ) ≺≺ g(z, ζ), z ∈ U,ζ ∈ U, and this result is sharp.
Lemma 1.2 ([1]) Let h (z, ζ) be a convex function with h (0, ζ) = a for every ζ ∈ U and let γ ∈ C∗ be acomplex number with Reγ ≥ 0. If p ∈ H∗[a, n, ζ] and p (z, ζ) + 1
γ zp0z (z, ζ) ≺≺ h (z, ζ) , z ∈ U, ζ ∈ U, then
p (z, ζ) ≺≺ g (z, ζ) ≺≺ h (z, ζ) , z ∈ U, ζ ∈ U, where g (z, ζ) = γ
nzγn
R z0h (t, ζ) t
γn−1dt is convex and it is the best
dominant.
2 Main resultsExtending the results obtained in [10] and [11] to the class A∗ζ , we obtain the following theorems:
Theorem 2.1 Let g (z, ζ) be a convex function, g(0, ζ) = 1 and let h be the function h(z, ζ) = g(z, ζ) + zδ g0z(z, ζ),
for z ∈ U, ζ ∈ U. If λ, δ ≥ 0, m ∈ N, f ∈ A∗ζ and satisfies the strong differential subordinationµDRmλ f(z, ζ)
z
¶δ−1(DRmλ f(z, ζ))
0z ≺≺ h(z, ζ), z ∈ U, ζ ∈ U, (2.1)
then³DRm
λ f(z,ζ)z
´δ≺≺ g(z, ζ), z ∈ U, ζ ∈ U, and this result is sharp.
Proof. Consider p(z, ζ) =³DRmλ f(z,ζ)
z
´δ=
µz+P∞
j=2[1+(j−1)λ]m (m+j−1)!m!(j−1)! a2j(ζ)zj
z
¶δ= 1+pδ (ζ) z
δ+pδ+1 (ζ) zδ+1
+..., z ∈ U, ζ ∈ U. We deduce that p ∈ H∗[1, δ, ζ].Differentiating with respect to z we obtain
³DRm
λ f(z,ζ)z
´δ−1(DRmλ f(z, ζ))
0z = p(z, ζ)+
1δ zp
0z(z, ζ), z ∈ U, ζ ∈ U.
Then (2.1) becomes p(z, ζ) + 1δ zp
0z(z, ζ) ≺≺ h(z, ζ) = g(z, ζ) + z
δ g0z(z, ζ), z ∈ U, ζ ∈ U.
By using Lemma 1.1, we have p(z, ζ) ≺≺ g(z, ζ), z ∈ U, ζ ∈ U, i.e.³DRmλ f(z,ζ)
z
´δ≺≺ g(z, ζ), z ∈ U, ζ ∈ U.
Theorem 2.2 Let h be a holomorphic function which satisfies the inequality Re³1 +
zh00z2(z,ζ)
h0z(z,ζ)
´> − 12 , z ∈ U,
ζ ∈ U, and h(0, ζ) = 1, ζ ∈ U. If λ, δ ≥ 0, m ∈ N, f ∈ A∗ζ and satisfies the strong differential subordinationµDRmλ f(z, ζ)
z
¶δ−1(DRmλ f(z, ζ))
0z ≺≺ h(z, ζ), z ∈ U, ζ ∈ U, (2.2)
then³DRm
λ f(z,ζ)z
´δ≺≺ q(z, ζ), z ∈ U, ζ ∈ U, where q(z, ζ) = δ
zδ
R z0h(t, ζ)tδ−1dt is convex and it is the best
dominant.
2
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1043 Andrei Loriana 1042-1048
Proof. Let p(z, ζ) =³DRmλ f(z,ζ)
z
´δ=
µz+P∞
j=2[1+(j−1)λ]m (m+j−1)!m!(j−1)! a2j(ζ)zj
z
¶δ=³
1 +P∞
j=2
n[1 + (j − 1)λ]m (m+j−1)!
m!(j−1)!
oa2j (ζ)z
j−1´δ= 1 +
P∞j=δ+1 pj(ζ)z
j−1, for z ∈ U, ζ ∈ U, p ∈ H∗[1, δ, ζ].
Differentiating with respect to z, we obtain³DRm
λ f(z,ζ)z
´δ−1(DRmλ f(z, ζ))
0z = p(z, ζ)+
1δ zp
0z(z, ζ), z ∈ U, ζ ∈ U
and (2.2) becomes p(z, ζ) + 1δ zp
0z(z, ζ) ≺≺ h(z, ζ), z ∈ U, ζ ∈ U.
Using Lemma 1.2, we have p(z, ζ) ≺≺ q(z, ζ), z ∈ U, ζ ∈ U i.e.³DRmλ f(z,ζ)
z
´δ≺≺ q(z, ζ) = δ
zδ
R z0h(t, ζ)tδ−1dt,
z ∈ U, ζ ∈ U and q is the best dominant.
Corollary 2.3 Let h(z, ζ) = ζ+(2β−ζ)z1+z be a convex function in U×U , where 0 ≤ β < 1, z ∈ U , ζ ∈ U . If δ,λ ≥ 0,
m ∈ N, f ∈ A∗ζ and satisfies the strong differential subordinationµDRmλ f(z, ζ)
z
¶δ−1(DRmλ f(z, ζ))
0z ≺≺ h(z, ζ), z ∈ U, ζ ∈ U, (2.3)
then³DRm
λ f(z,ζ)z
´δ≺≺ q(z, ζ), z ∈ U, ζ ∈ U, where q is given by q(z, ζ) = (2β − ζ) + 2(ζ−β)δ
zδ
R z0tδ−1
1+t dt, z ∈ U ,ζ ∈ U. The function q is convex and it is the best dominant.
Proof. Following the same steps as in the proof of Theorem 2.2 and considering p(z, ζ) =³DRm
λ f(z,ζ)z
´δ.the
strong differential subordination (2.3) becomes p(z, ζ) + zδ p0z(z, ζ) ≺≺ h(z, ζ) =
ζ+(2β−ζ)z1+z , z ∈ U, ζ ∈ U.
By using Lemma 1.2 for γ = δ, we have p(z, ζ) ≺≺ q(z, ζ), i.e.³DRm
λ f(z,ζ)z
´δ≺≺ q(z, ζ) = δ
zδ
R z0h(t, ζ)tδ−1dt =
δzδ
R z0tδ−1 ζ+(2β−ζ)t1+t dt = δ
zδ
R z0
h(2β − ζ) tδ−1 + 2 (ζ − β) t
δ−1
1+t
idt = (2β − ζ) + 2(ζ−β)δ
zδ
R z0tδ−1
1+t dt, z ∈ U, ζ ∈ U.
Theorem 2.4 Let g be a convex function such that g (0, ζ) = 1 and let h be the function h (z, ζ) = g (z, ζ) +zδ g0z (z, ζ), z ∈ U, ζ ∈ U . If λ, δ ≥ 0, m ∈ N, z ∈ U, ζ ∈ U, f ∈ A∗ζ and the strong differential subordination
zδ + 1
δ
DRmλ f (z, ζ)¡DRm+1λ f (z, ζ)
¢2 + z2δ DRmλ f(z, ζ)¡DRm+1λ f(z, ζ)
¢2"(DRmλ f(z, ζ))
0z
DRmλ f(z, ζ)− 2
¡DRm+1λ f(z, ζ)
¢0z
DRm+1λ f(z, ζ)
#≺≺ h (z, ζ) (2.4)
holds, where z ∈ U, ζ ∈ U, then z DRmλ f(z,ζ)
(DRm+1λ f(z,ζ))2
≺≺ g (z, ζ), z ∈ U, ζ ∈ U, and this result is sharp.
Proof. Consider p(z, ζ) = z DRmλ f(z,ζ)
(DRm+1λ f(z,ζ))
2 and we obtain p (z, ζ) + zδ p0z (z, ζ) = z
δ+1δ
DRmλ f(z,ζ)
(DRm+1λ f(z,ζ))
2+
z2
δDRm
λ f(z,ζ)
(DRm+1λ f(z,ζ))2
∙(DRm
λ f(z,ζ))0z
DRmλ f(z,ζ)
− 2(DRm+1λ f(z,ζ))0
z
DRm+1λ f(z,ζ)
¸.
Relation (2.4) becomes p(z, ζ) + zδ p0z(z, ζ) ≺≺ h(z, ζ) = g(z, ζ) + z
δ g0z(z, ζ), z ∈ U, ζ ∈ U.
By using Lemma 1.1, we have p(z, ζ) ≺≺ g(z, ζ), z ∈ U, ζ ∈ U i.e. z DRmλ f(z,ζ)
(DRm+1λ f(z,ζ))
2 ≺≺ g(z, ζ), z ∈ U, ζ ∈ U.
Theorem 2.5 Let h be a holomorphic function which satisfies the inequality Re³1 +
zh00z2(z,ζ)
h0z(z,ζ)
´> − 12 , z ∈ U,
ζ ∈ U, and h(0, ζ) = 1. If λ, δ ≥ 0, m ∈ N, z ∈ U, ζ ∈ U, f ∈ A∗ζ and satisfies the strong differential subordination
zδ + 1
δ
DRmλ f (z, ζ)¡DRm+1λ f (z, ζ)
¢2 + z2δ DRmλ f(z, ζ)¡DRm+1λ f(z, ζ)
¢2"(DRmλ f(z, ζ))
0z
DRmλ f(z, ζ)− 2
¡DRm+1λ f(z, ζ)
¢0z
DRm+1λ f(z, ζ)
#≺≺ h(z, ζ), (2.5)
z ∈ U, ζ ∈ U, then z DRmλ f(z,ζ)
(DRm+1λ f(z,ζ))2
≺≺ q(z, ζ), z ∈ U, ζ ∈ U, where q(z, ζ) = δzδ
R z0h(t, ζ)tδ−1dt is convex and it
is the best dominant.
Proof. Let p(z, ζ) = z DRmλ f(z,ζ)
(DRm+1λ f(z,ζ))
2 , z ∈ U, ζ ∈ U, p ∈ H∗[1, 1, ζ]. Differentiating with respect to z, we obtain
p (z, ζ)+ zδ p0z (z, ζ) = z
δ+1δ
DRmλ f(z,ζ)
(DRm+1λ f(z,ζ))
2+z2
δDRmλ f(z,ζ)
(DRm+1λ f(z,ζ))
2
∙(DRmλ f(z,ζ))
0z
DRmλ f(z,ζ)
− 2(DRm+1λ f(z,ζ))0
z
DRm+1λ f(z,ζ)
¸, z ∈ U, ζ ∈ U, and
(2.5) becomes p(z, ζ) + zδ p0z(z, ζ) ≺≺ h(z, ζ), z ∈ U, ζ ∈ U.
3
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1044 Andrei Loriana 1042-1048
Using Lemma 1.2, we have p(z, ζ) ≺≺ q(z, ζ), z ∈ U, ζ ∈ U, i.e. z DRmλ f(z,ζ)
(DRm+1λ f(z,ζ))2
≺≺ q(z, ζ) = δzδ
R z0h(t, ζ)tδ−1dt,
z ∈ U, ζ ∈ U, and q is the best dominant.
Theorem 2.6 Let g be a convex function such that g(0, ζ) = 1 and let h be the function h(z, ζ) = g(z, ζ)+ zδ g0z(z, ζ),
z ∈ U, ζ ∈ U. If λ, δ ≥ 0, m ∈ N, f ∈ A∗ζ and the strong differential subordination
z2δ + 2
δ
(DRmλ f (z, ζ))0z
DRmλ f (z, ζ)+z3
δ
⎡⎣(DRmλ f (z, ζ))00z2DRmλ f (z, ζ)
−Ã(DRmλ f (z, ζ))
0z
DRmλ f (z, ζ)
!2⎤⎦ ≺≺ h(z, ζ), (2.6)
z ∈ U, ζ ∈ U, holds, then z2 (DRmλ f(z,ζ))
0z
DRmλ f(z,ζ)
≺≺ g(z, ζ), z ∈ U, ζ ∈ U. This result is sharp.
Proof. Let p(z, ζ) = z2(DRm
λ f(z,ζ))0z
DRmλ f(z,ζ)
. We deduce that p ∈ H∗[0, 1, ζ]. Differentiating with respect to z, we
obtain p (z, ζ) + zδ p0z (z, ζ) = z
2 δ+2δ
(DRmλ f(z,ζ))
0z
DRmλ f(z,ζ)+z3
δ
∙(DRm
λ f(z,ζ))00z2
DRmλ f(z,ζ)
−³(DRmλ f(z,ζ))
0z
DRmλ f(z,ζ)
´2¸, z ∈ U, ζ ∈ U.
Using the notation in (2.6), the strong differential subordination becomes p(z, ζ) + 1δ zp
0z(z, ζ) ≺≺ h(z, ζ) =
g(z, ζ) + zδ g0z(z, ζ), z ∈ U, ζ ∈ U.
By using Lemma 1.1, we have p(z, ζ) ≺≺ g(z, ζ), z ∈ U, ζ ∈ U, i.e. z2 (DRmλ f(z,ζ))
0z
DRmλ f(z,ζ)
≺≺ g(z, ζ), z ∈ U, ζ ∈ U,and this result is sharp.
Theorem 2.7 Let h be a holomorphic function which satisfies the inequality Re³1 +
zh00z2(z,ζ)
h0z(z,ζ)
´> − 12 , z ∈ U,
ζ ∈ U and h(0, ζ) = 1. If λ, δ ≥ 0, m ∈ N, f ∈ A∗ζ and satisfies the strong differential subordination
z2δ + 2
δ
(DRmλ f (z, ζ))0z
DRmλ f (z, ζ)+z3
δ
⎡⎣(DRmλ f (z, ζ))00z2DRmλ f (z, ζ)
−Ã(DRmλ f (z, ζ))
0z
DRmλ f (z, ζ)
!2⎤⎦ ≺≺ h(z, ζ), (2.7)
z ∈ U, ζ ∈ U, then z2 (DRmλ f(z,ζ))
0z
DRmλ f(z,ζ)
≺≺ q(z, ζ), z ∈ U, ζ ∈ U, where q(z, ζ) = δzδ
R z0h(t, ζ)tδ−1dt is convex and it is
the best dominant.
Proof. Let p(z, ζ) = z2 (DRmλ f(z,ζ))
0z
DRmλ f(z,ζ)
, z ∈ U, ζ ∈ U, p ∈ H∗[0, 1, ζ]. Differentiating with respect to z, we obtain
p (z, ζ)+ zδ p0z (z, ζ) = z
2 δ+2δ
(DRmλ f(z,ζ))
0z
DRmλ f(z,ζ)
+ z3
δ
∙(DRm
λ f(z,ζ))00z2
DRmλ f(z,ζ)
−³(DRmλ f(z,ζ))
0z
DRmλ f(z,ζ)
´2¸, z ∈ U, ζ ∈ U, and (2.7) becomes
p(z) + 1δ zp
0z(z, ζ) ≺≺ h(z, ζ), z ∈ U, ζ ∈ U.
Using Lemma 1.2, we have p(z, ζ) ≺≺ q(z, ζ), z ∈ U, ζ ∈ U, i.e. z2 (DRmλ f(z,ζ))
0z
DRmλ f(z,ζ)
≺≺ q(z, ζ) = δzδ
R z0h(t, ζ)tδ−1dt,
z ∈ U, ζ ∈ U, and q is the best dominant.
Theorem 2.8 Let g be a convex function such that g(0, ζ) = 1 and let h be the function h(z, ζ) = g(z, ζ)+zg0z(z, ζ),z ∈ U, ζ ∈ U. If λ ≥ 0, m ∈ N, f ∈ A∗ζ and the strong differential subordination
1−DRmλ f (z, ζ) · (DRmλ f (z, ζ))
00z2£
(DRmλ f (z, ζ))0z
¤2 ≺≺ h(z, ζ), z ∈ U, ζ ∈ U (2.8)
holds, then DRmλ f(z,ζ)
z(DRmλ f(z,ζ))
0z
≺≺ g(z, ζ), z ∈ U, ζ ∈ U. This result is sharp.
Proof. Let p(z, ζ) = DRmλ f(z,ζ)
z(DRmλ f(z,ζ))
0z
. We deduce that p ∈ H∗[1, 1, ζ]. Differentiating with respect to z, we
obtain 1− DRmλ f(z,ζ)·(DRmλ f(z,ζ))
00z2
[(DRmλ f(z,ζ))
0z]2 = p (z, ζ) + zp0z (z, ζ) , z ∈ U, ζ ∈ U.
Using the notation in (2.8), the strong differential subordination becomes p(z, ζ) + zp0z(z, ζ) ≺≺ h(z, ζ) =g(z, ζ) + zg0z(z, ζ), z ∈ U , ζ ∈ U.By using Lemma 1.1, we have p(z, ζ) ≺≺ g(z, ζ), z ∈ U, ζ ∈ U i.e. DRm
λ f(z,ζ)
z(DRmλ f(z,ζ))
0z
≺≺ g(z, ζ), z ∈ U, ζ ∈ U,and this result is sharp.
4
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1045 Andrei Loriana 1042-1048
Theorem 2.9 Let h be a holomorphic function which satisfies the inequality Re³1 +
zh00z2(z,ζ)
h0z(z,ζ)
´> − 12 , z ∈ U,
ζ ∈ U, and h(0, ζ) = 1. If λ ≥ 0, m ∈ N, f ∈ A∗ζ and satisfies the strong differential subordination
1−DRmλ f (z, ζ) · (DRmλ f (z, ζ))
00z2£
(DRmλ f (z, ζ))0z
¤2 ≺≺ h(z, ζ), z ∈ U, ζ ∈ U, (2.9)
then DRmλ f(z,ζ)
z(DRmλ f(z,ζ))
0z
≺≺ q(z, ζ), z ∈ U, ζ ∈ U, where q(z, ζ) = 1z
R z0h(t, ζ)dt is convex and it is the best dominant.
Proof. Let p(z) = DRmλ f(z,ζ)
z(DRmλ f(z,ζ))
0z
, z ∈ U, ζ ∈ U, p ∈ H∗[0, 1, ζ]. Differentiating with respect to z, we obtain
1− DRmλ f(z,ζ)·(DRmλ f(z,ζ))
00z2
[(DRmλ f(z,ζ))
0z]2 = p (z, ζ) + zp0z (z, ζ) , z ∈ U, ζ ∈ U, and (2.9) becomes p(z, ζ) + zp0z(z, ζ) ≺≺ h(z, ζ),
z ∈ U, ζ ∈ U.Using Lemma 1.2, we have p(z, ζ) ≺≺ q(z, ζ), z ∈ U, ζ ∈ U i.e. DRmλ f(z,ζ)
z(DRmλ f(z,ζ))0z
≺≺ q(z, ζ) = 1z
R z0h(t, ζ)dt,
z ∈ U, ζ ∈ U, and q is the best dominant.
Corollary 2.10 Let h(z, ζ) = ζ+(2β−ζ)z1+z be a convex function in U × U , where 0 ≤ β < 1. If λ ≥ 0, m ∈ N,
f ∈ A∗ζ and satisfies the strong differential subordination
1−DRmλ f (z, ζ) · (DRmλ f (z, ζ))
00z2£
(DRmλ f (z, ζ))0z
¤2 ≺≺ h(z, ζ), z ∈ U, ζ ∈ U, (2.10)
then DRmλ f(z,ζ)
z(DRmλ f(z,ζ))0z
≺≺ q(z, ζ), z ∈ U, ζ ∈ U, where q is given by q(z, ζ) = (2β − ζ) + 2 (ζ − β) ln(1+z)z , z ∈ U,
ζ ∈ U. The function q is convex and it is the best dominant.
Proof. Following the same steps as in the proof of Theorem 2.9 and considering p(z, ζ) = DRmλ f(z,ζ)
z(DRmλ f(z,ζ))
0z
, the
strong differential subordination (2.10) becomes p(z, ζ) + zp0z(z, ζ) ≺≺ h(z, ζ) =ζ+(2β−ζ)z
1+z , z ∈ U, ζ ∈ U.By using Lemma 1.2 for γ = 1, we have p(z, ζ) ≺≺ q(z, ζ), i.e. DRm
λ f(z,ζ)
z(DRmλ f(z,ζ))
0z
≺≺ q(z, ζ) = 1z
R z0h(t, ζ)dt =
1z
R z0
ζ+(2β−ζ)t1+t dt = 1
z
R z0
h(2β − ζ) + 2(ζ−β)
1+t
idt = (2β − ζ) + 2 (ζ − β) ln(1+z)z , z ∈ U, ζ ∈ U.
Theorem 2.11 Let g be a convex function such that g(0, ζ) = 0 and let h be the function h(z, ζ) = g(z, ζ) +zg0z(z, ζ), z ∈ U, ζ ∈ U. If λ ≥ 0, m ∈ N, f ∈ A∗ζ and the strong differential subordination£
(DRmλ f (z, ζ))0z
¤2+DRmλ f (z, ζ) · (DRmλ f (z, ζ))
00z2 ≺≺ h(z, ζ), z ∈ U, ζ ∈ U (2.11)
holds, then DRmλ f(z,ζ)·(DRm
λ f(z,ζ))0z
z ≺≺ g(z, ζ), z ∈ U, ζ ∈ U. This result is sharp.
Proof. Let p(z, ζ) = DRmλ f(z,ζ)·(DRmλ f(z,ζ))
0z
z . We deduce that p ∈ H∗[0, 1, ζ]. Differentiating with respect to z,we obtain
£(DRmλ f (z, ζ))
0z
¤2+ DRmλ f (z, ζ) · (DRmλ f (z, ζ))
00z2 = p (z, ζ) + zp
0z (z, ζ) , z ∈ U, ζ ∈ U.
Using the notation in (2.11), the strong differential subordination becomes p(z, ζ) + zp0z(z, ζ) ≺≺ h(z, ζ) =g(z, ζ) + zg0z(z, ζ), z ∈ U, ζ ∈ U.By using Lemma 1.1, we have p(z, ζ) ≺≺ g(z, ζ), z ∈ U, ζ ∈ U i.e. DRmλ f(z,ζ)·(DRm
λ f(z,ζ))0z
z ≺≺ g(z, ζ), z ∈ U,ζ ∈ U, and this result is sharp.
Theorem 2.12 Let h be a holomorphic function which satisfies the inequality Re³1 +
zh00z2(z,ζ)
h0z(z,ζ)
´> −12 , z ∈ U,
ζ ∈ U and h(0, ζ) = 0. If λ ≥ 0, m ∈ N, f ∈ A∗ζ and satisfies the strong differential subordination£(DRmλ f (z, ζ))
0z
¤2+DRmλ f (z, ζ) · (DRmλ f (z, ζ))
00z2 ≺≺ h(z, ζ), z ∈ U, ζ ∈ U, (2.12)
then DRmλ f(z,ζ)·(DRmλ f(z,ζ))0z
z ≺≺ q(z, ζ), z ∈ U, ζ ∈ U, where q(z, ζ) = 1z
R z0h(t, ζ)dt is convex and it is the best
dominant.
5
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1046 Andrei Loriana 1042-1048
Proof. Let p(z, ζ) = DRmλ f(z,ζ)·(DRmλ f(z,ζ))
0z
z , z ∈ U, ζ ∈ U, p ∈ H∗[0, 1, ζ]. Differentiating with respect toz, we obtain
£(DRmλ f (z, ζ))
0z
¤2+ DRmλ f (z, ζ) · (DRmλ f (z, ζ))
00z2 = p (z, ζ) + zp
0z (z, ζ) , z ∈ U, ζ ∈ U, and (2.12)
becomes p(z, ζ) + zp0z(z, ζ) ≺≺ h(z, ζ), z ∈ U, ζ ∈ U.Using Lemma 1.2, we have p(z, ζ) ≺≺ q(z, ζ), z ∈ U, ζ ∈ U, i.e. DRm
λ f(z,ζ)·(DRmλ f(z,ζ))0zz ≺≺ q(z, ζ) =
1z
R z0h(t, ζ)dt, z ∈ U, ζ ∈ U, and q is the best dominant.
Corollary 2.13 Let h(z) = ζ+(2β−ζ)z1+z be a convex function in U ×U , where 0 ≤ β < 1. If λ ≥ 0, m ∈ N, f ∈ A∗ζ
and satisfies the strong differential subordination£(DRmλ f (z, ζ))
0z
¤2+DRmλ f (z, ζ) · (DRmλ f (z, ζ))
00z2 ≺≺ h(z, ζ), z ∈ U, ζ ∈ U, (2.13)
then DRmλ f(z,ζ)·(DRm
λ f(z,ζ))0z
z ≺≺ q(z, ζ), z ∈ U, ζ ∈ U, where q is given by q(z, ζ) = (2β − ζ) + 2 (ζ − β) ln(1+z)z ,
z ∈ U, ζ ∈ U. The function q is convex and it is the best dominant.
Proof. Following the same steps as in the proof of Theorem 2.12 and considering p(z, ζ) = DRmλ f(z,ζ)·(DRmλ f(z,ζ))
0z
z ,
the strong differential subordination (2.13) becomes p(z, ζ) + zp0z(z, ζ) ≺≺ h(z, ζ) =ζ+(2β−ζ)z
1+z , z ∈ U, ζ ∈ U.By using Lemma 1.2 for γ = 1, we have p(z, ζ) ≺≺ q(z, ζ), i.e. DRmλ f(z,ζ)·(DRm
λ f(z,ζ))0z
z ≺≺ q(z, ζ) =1z
R z0h(t, ζ)dt = 1
z
R z0
ζ+(2β−ζ)t1+t dt = 1
z
R z0
h(2β − ζ) + 2(ζ−β)
1+t
idt = (2β − ζ) + 2 (ζ − β) ln(1+z)z , z ∈ U, ζ ∈ U.
Theorem 2.14 Let g be a convex function such that g(0, ζ) = 0 and let h be the function h(z, ζ) = g(z, ζ) +z1−δ g
0z(z, ζ), z ∈ U, ζ ∈ U. If λ ≥ 0, δ ∈ (0, 1), m ∈ N, f ∈ A∗ζ and the strong differential subordinationµ
z
DRmλ f (z, ζ)
¶δDRm+1λ f (z, ζ)
1− δ
áDRm+1λ f (z, ζ)
¢0z
DRm+1λ f (z, ζ)− δ
(DRmλ f (z, ζ))0z
DRmλ f (z, ζ)
!≺≺ h(z, ζ), (2.14)
z ∈ U, ζ ∈ U, holds, then DRm+1λ f(z,ζ)
z ·³
zDRm
λ f(z,ζ)
´δ≺≺ g(z, ζ), z ∈ U, ζ ∈ U. This result is sharp.
Proof. Let p(z, ζ) = DRm+1λ f(z,ζ)
z ·³
zDRmλ f(z,ζ)
´δ. We deduce that p ∈ H∗[1, 1, ζ]. Differentiating with respect
to z, we obtain³
zDRm
λ f(z,ζ)
´δ DRm+1λ f(z,ζ)
1−δ
µ(DRm+1
λ f(z,ζ))0z
DRm+1λ f(z,ζ)
− δ(DRm
λ f(z,ζ))0z
DRmλ f(z,ζ)
¶= p (z, ζ)+ 1
1−δ zp0z (z, ζ) , z ∈ U,
ζ ∈ U.Using the notation in (2.14), the strong differential subordination becomes p(z, ζ)+ 1
1−δ zp0z(z, ζ) ≺≺ h(z, ζ) =
g(z, ζ) + z1−δ g
0z(z, ζ), z ∈ U , ζ ∈ U.
By using Lemma 1.1, we have p(z, ζ) ≺≺ g(z, ζ), z ∈ U, ζ ∈ U, i.e. DRm+1λ f(z,ζ)
z ·³
zDRm
λ f(z,ζ)
´δ≺≺ g(z, ζ),
z ∈ U, ζ ∈ U,and this result is sharp.
Theorem 2.15 Let h be a holomorphic function which satisfies the inequality Re³1 +
zh00z2(z,ζ)
h0z(z,ζ)
´> −12 , z ∈ U,
ζ ∈ U and h(0, ζ) = 1. If λ ≥ 0, δ ∈ (0, 1) , m ∈ N, f ∈ A∗ζ and satisfies the strong differential subordinationµz
DRmλ f (z, ζ)
¶δDRm+1λ f (z, ζ)
1− δ
áDRm+1λ f (z, ζ)
¢0z
DRm+1λ f (z, ζ)− δ
(DRmλ f (z, ζ))0z
DRmλ f (z, ζ)
!≺≺ h(z, ζ), (2.15)
z ∈ U, ζ ∈ U, then DRm+1λ f(z,ζ)
z ·³
zDRmλ f(z,ζ)
´δ≺≺ q(z, ζ), z ∈ U, ζ ∈ U, where q(z, ζ) = 1−δ
z1−δ
R z0h(t, ζ)t−δdt is
convex and it is the best dominant.
Proof. Let p(z, ζ) = DRm+1λ f(z,ζ)
z ·³
zDRm
λ f(z,ζ)
´δ, z ∈ U, ζ ∈ U, p ∈ H∗[0, 1, ζ]. Differentiating with respect to
z, we obtain³
zDRm
λ f(z,ζ)
´δ DRm+1λ f(z,ζ)
1−δ
µ(DRm+1
λ f(z,ζ))0z
DRm+1λ f(z,ζ)
− δ(DRm
λ f(z,ζ))0z
DRmλ f(z,ζ)
¶= p (z, ζ)+ 1
1−δ zp0z (z, ζ) , z ∈ U, ζ ∈ U,
and (2.15) becomes p(z, ζ) + 11−δzp
0z(z, ζ) ≺≺ h(z, ζ), z ∈ U, ζ ∈ U.
Using Lemma 1.2, we have p(z, ζ) ≺≺ q(z, ζ), z ∈ U, ζ ∈ U, i.e. DRm+1λ f(z,ζ)
z ·³
zDRm
λ f(z,ζ)
´δ≺≺ q(z, ζ) =
1−δz1−δ
R z0h(t, ζ)t−δdt, z ∈ U, ζ ∈ U, and q is the best dominant.
6
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1047 Andrei Loriana 1042-1048
References[1] A. Alb Lupas, G.I. Oros, Gh. Oros, On special strong differential subordinations using Salagean and
Ruscheweyh operators, Journal of Computational Analysis and Applications, Vol. 14, No. 2, 2012, 266-270.
[2] A. Alb Lupas, On special strong differential subordinations using a generalized Salagean operator andRuscheweyh derivative, Journal of Concrete and Applicable Mathematics, Vol. 10, No.’s 1-2, 2012, 17-23.
[3] A. Alb Lupas, A note on strong differential subordinations using a generalized Salagean operator andRuscheweyh operator, Acta Universitatis Apulensis No. 34/2013, 105-114.
[4] A. Alb Lupas, Certain strong differential superordinations using a generalized Salagean operator andRuscheweyh operator, Journal of Applied Functional Analysis, Vol. 7, No.’s 1-2, 2012, 62-68.
[5] A. Alb Lupas, Certain strong differential subordinations using Salagean and Ruscheweyh operators, Advancesin Applied Mathematical Analysis, Volume 6, Number 1 (2011), 27—34.
[6] A. Alb Lupas, A note on strong differential subordinations using Salagean and Ruscheweyh operators, LibertasMathematica, tomus XXXI (2011), 15-21.
[7] A. Alb Lupas, Certain strong differential superordinations using Salagean and Ruscheweyh operators, ActaUniversitatis Apulensis No. 30/2012, 325-336.
[8] A. Alb Lupas, A note on strong differential superordinations using Salagean and Ruscheweyh operators, Jour-nal of Applied Functional Analysis, Vol. 7, No.’s 1-2, 2012, 54-61.
[9] D.A. Alb Lupas, Subordinations and Superordinations, Lap Lambert Academic Publishing, 2011.
[10] L. Andrei, Differential subordination results using a generalized Salagean operator and Ruscheweyh operator,Acta Universitatis Apulensis, (to appear).
[11] L. Andrei, Some differential subordination results using a generalized Salagean operator and Ruscheweyhoperator, submitted.
[12] J.A. Antonino, S. Romaguera, Strong differential subordination to Briot-Bouquet differential equations, Jour-nal of Differential Equations, 114 (1994), 101-105.
[13] G.I. Oros, Gh. Oros, Strong differential subordination, Turkish Journal of Mathematics, 33 (2009), 249-257.
7
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1048 Andrei Loriana 1042-1048
On some differential sandwich theorems using a generalized Salageanoperator and Ruscheweyh operator
Andrei LorianaDepartment of Mathematics and Computer Science
University of Oradea1 Universitatii street, 410087 Oradea, Romania
Abstract
In this work we define a new operator using the generalized Salagean operator and Ruscheweyh operator.Denote by DRm,nλ the Hadamard product of the generalized Salagean operator Dm
λ and Ruscheweyh operatorRn, given by DRm,nλ : A→ A, DRm,nλ f (z) = (Dm
λ ∗Rn) f (z) and An = f ∈ H (U) : f (z) = z+an+1zn+1+...,z ∈ U is the class of normalized analytic functions with A1 = A. The purpose of this paper is to introducesufficient conditions for subordination and superordination involving the operator DRm,nλ and also to obtainsandwich-type results.
Keywords: analytic functions, differential operator, differential subordination, differential superordination.2010 Mathematical Subject Classification: 30C45.
1 IntroductionLet H (U) be the class of analytic function in the open unit disc of the complex plane U = z ∈ C : |z| < 1. Let
H (a, n) be the subclass of H (U) consisting of functions of the form f(z) = a+ anzn + an+1z
n+1 + . . . . Let An =f ∈ H(U) : f(z) = z+an+1zn+1+. . . , z ∈ U andA = A1. Denote byK =
nf ∈ A : Re zf 00(z)
f 0(z) + 1 > 0, z ∈ Uo,
the class of normalized convex functions in U .Let the functions f and g be analytic in U . We say that the function f is subordinate to g, written f ≺ g,
if there exists a Schwarz function w, analytic in U , with w(0) = 0 and |w(z)| < 1, for all z ∈ U, such thatf(z) = g(w(z)), for all z ∈ U . In particular, if the function g is univalent in U , the above subordination isequivalent to f(0) = g(0) and f(U) ⊂ g(U).Let ψ : C3 × U → C and h be an univalent function in U . If p is analytic in U and satisfies the second order
differential subordinationψ(p(z), zp0(z), z2p00(z); z) ≺ h(z), for z ∈ U, (1.1)
then p is called a solution of the differential subordination. The univalent function q is called a dominant ofthe solutions of the differential subordination, or more simply a dominant, if p ≺ q for all p satisfying (1.1). Adominant eq that satisfies eq ≺ q for all dominants q of (1.1) is said to be the best dominant of (1.1). The bestdominant is unique up to a rotation of U .Let ψ : C2 × U → C and h analytic in U . If p and ψ
¡p (z) , zp0 (z) , z2p00 (z) ; z
¢are univalent and if p satisfies
the second order differential superordination
h(z) ≺ ψ(p(z), zp0(z), z2p00 (z) ; z), z ∈ U, (1.2)
then p is a solution of the differential superordination (1.2) (if f is subordinate to F , then F is called to besuperordinate to f). An analytic function q is called a subordinant if q ≺ p for all p satisfying (1.2). An univalentsubordinant eq that satisfies q ≺ eq for all subordinants q of (1.2) is said to be the best subordinant.Miller and Mocanu [15] obtained conditions h, q and ψ for which the following implication holds h(z) ≺
ψ(p(z), zp0(z), z2p00 (z) ; z)⇒ q (z) ≺ p (z) .For two functions f(z) = z +
P∞j=2 ajz
j and g(z) = z +P∞
j=2 bjzj analytic in the open unit disc U , the
Hadamard product (or convolution product) of f (z) and g (z), written as (f ∗ g) (z), is defined by f (z) ∗ g (z) =(f ∗ g) (z) = z +
P∞j=2 ajbjz
j .
1
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1049 Andrei Loriana 1049-1056
Definition 1.1 (Al Oboudi [7]) For f ∈ A, λ ≥ 0 and n ∈ N, the operator Dmλ is defined by Dm
λ : A→ A,
D0λf (z) = f (z)
D1λf (z) = (1− λ) f (z) + λzf 0(z) = Dλf (z) , ...
Dmλ f(z) = (1− λ)Dm−1
λ f (z) + λz (Dmλ f (z))
0 = Dλ
¡Dm−1λ f (z)
¢, z ∈ U.
Remark 1.1 If f ∈ A and f(z) = z +P∞j=2 ajz
j, then Dmλ f (z) = z +
P∞j=2 [1 + (j − 1)λ]
majz
j, for z ∈ U .
Remark 1.2 For λ = 1 in the above definition we obtain the Salagean differential operator [18].
Definition 1.2 (Ruscheweyh [17]) For f ∈ A and n ∈ N, the operator Rn is defined by Rn : A→ A,
R0f (z) = f (z)
R1f (z) = zf 0 (z) , ...
(n+ 1)Rn+1f (z) = z (Rnf (z))0 + nRnf (z) , z ∈ U.
Remark 1.3 If f ∈ A, f(z) = z +P∞j=2 ajz
j, then Rnf (z) = z +P∞
j=2(n+j−1)!n!(j−1)! ajz
j for z ∈ U .
The purpose of this paper is to derive the several subordination and superordination results involving a differ-ential operator. Furthermore, we studied the results of M. Darus, K. Al-Shaqs [14], Shanmugam, Ramachandran,Darus and Sivasubramanian [19].In order to prove our subordination and superordination results, we make use of the following known results.
Definition 1.3 [16] Denote by Q the set of all functions f that are analytic and injective on U\E (f), whereE (f) = ζ ∈ ∂U : lim
z→ζf (z) =∞, and are such that f 0 (ζ) 6= 0 for ζ ∈ ∂U\E (f).
Lemma 1.1 [16] Let the function q be univalent in the unit disc U and θ and φ be analytic in a domain Dcontaining q (U) with φ (w) 6= 0 when w ∈ q (U). Set Q (z) = zq0 (z)φ (q (z)) and h (z) = θ (q (z))+Q (z). Suppose
that Q is starlike univalent in U and Re³zh0(z)Q(z)
´> 0 for z ∈ U . If p is analytic with p (0) = q (0), p (U) ⊆ D and
θ (p (z)) + zp0 (z)φ (p (z)) ≺ θ (q (z)) + zq0 (z)φ (q (z)) , then p (z) ≺ q (z) and q is the best dominant.
Lemma 1.2 [13] Let the function q be convex univalent in the open unit disc U and ν and φ be analytic in a
domain D containing q (U). Suppose that Re³ν0(q(z))φ(q(z))
´> 0 for z ∈ U and ψ (z) = zq0 (z)φ (q (z)) is starlike
univalent in U . If p (z) ∈ H [q (0) , 1] ∩ Q, with p (U) ⊆ D and ν (p (z)) + zp0 (z)φ (p (z)) is univalent in U andν (q (z)) + zq0 (z)φ (q (z)) ≺ ν (p (z)) + zp0 (z)φ (p (z)) , then q (z) ≺ p (z) and q is the best subordinant.
2 Main resultsDefinition 2.1 Let λ ≥ 0 and n,m ∈ N. Denote by DRm,nλ : A→ A the operator given by the Hadamard productof the generalized Salagean operator Dm
λ and the Ruscheweyh operator Rn, DRm,nλ f (z) = (Dmλ ∗Rn) f (z) , for
any z ∈ U and each nonnegative integers m,n.
Remark 2.1 If f ∈ A and f(z) = z+P∞
j=2 ajzj, then DRm,nλ f (z) = z+
P∞j=2 [1 + (j − 1)λ]
m (n+j−1)!n!(j−1)! a
2jzj, for
z ∈ U .This operator was studied in [12].
Remark 2.2 For λ = 1, m = n, we obtain the Hadamard product SRn [1] of the Salagean operator Sn andRuscheweyh derivative Rn, which was studied in [2], [3].
Remark 2.3 For m = n we obtain the Hadamard product DRnλ [4] of the generalized Salagean operator Dnλ and
Ruscheweyh derivative Rn, which was studied in [5], [6], [8], [9], [10], [11].
Using simple computation one obtains the next result.
Proposition 2.1 For m,n ∈ N and λ ≥ 0 we have
DRm+1,nλ f (z) = (1− λ)DRm,nλ f (z) + λz (DRm,nλ f (z))0 (2.1)
andz (DRm,nλ f (z))
0= (n+ 1)DRm,n+1λ f (z)− nDRm,nλ f (z) . (2.2)
2
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1050 Andrei Loriana 1049-1056
Proof. We have DRm+1,nλ f (z) = z +P∞j=2 [1 + (j − 1)λ]
m+1 (n+j−1)!n!(j−1)! a
2jzj =
z +P∞j=2 [(1− λ) + λj] [1 + (j − 1)λ]m (n+j−1)!
n!(j−1)! a2jzj =
z + (1− λ)P∞
j=2 [1 + (j − 1)λ]m (n+j−1)!
n!(j−1)! a2jzj+ λ
P∞j=2 [1 + (j − 1)λ]
m (n+j−1)!n!(j−1)! ja
2jzj =
(1− λ)DRm,nλ f (z) + λz (DRm,nλ f (z))0, and
(n+ 1)DRm,n+1λ f (z)− nDRm,nλ f (z) =
(n+ 1) z + (n+ 1)P∞j=2 [1 + (j − 1)λ]
m (n+j)!(n+1)!(j−1)!a
2jzj− nz − n
P∞j=2 [1 + (j − 1)λ]
m (n+j−1)!n!(j−1)! a
2jzj =
z + (n+ 1)P∞j=2 [1 + (j − 1)λ]
m n+jn+1
(n+j−1)!n!(j−1)! a
2jzj− n
P∞j=2 [1 + (j − 1)λ]
m (n+j−1)!n!(j−1)! a
2jzj =
z +P∞j=2 [1 + (j − 1)λ]
m (n+j−1)!n!(j−1)! ja
2jzj = z (DRm,nλ f (z))
0.
We begin with the following
Theorem 2.2 Let DRm+1,nλ f(z)
DRm,nλ f(z)
∈ H (U) , z ∈ U , f ∈ A, m,n ∈ N, λ ≥ 0 and let the function q (z) be convex andunivalent in U such that q (0) = 1. Assume that
Re
µ1 +
α
µ+2β
µq (z) +
zq00 (z)
q0 (z)
¶> 0, z ∈ U, (2.3)
for α,β, µ,∈ C,µ 6= 0, z ∈ U, and
ψm,nλ (α,β, µ; z) :=
µ1− λ(n+ 1)
λµ+ α
¶DRm+1,nλ f (z)
DRm,nλ f (z)+ (2.4)
+µ(n+ 1) [1− λ(n+ 2)]DRm,n+1λ f (z)
DRm,nλ f (z)+ λµ(n+ 1)(n+ 2)
DRm,n+2λ f (z)
DRm,nλ f (z)+ (β − µ
λ)
ÃDRm+1,nλ f (z)
DRm,nλ f (z)
!2.
If q satisfies the following subordination
ψm,nλ (α,β, µ; z) ≺ αq (z) + β (q (z))2 + µzq0 (z) , (2.5)
for,α,β, µ ∈ C, µ 6= 0 thenDRm+1,nλ f (z)
DRm,nλ f (z)≺ q (z) , z ∈ U, (2.6)
and q is the best dominant.
Proof. Let the function p be defined by p (z) := DRm+1,nλ f(z)
DRm,nλ f(z)
, z ∈ U , z 6= 0, f ∈ A. The function p is
analytic in U and p (0) = 1. Differentiating this function, with respect to z,we get zp0 (z) =z(DRm+1,n
λ f(z))0
DRm,nλ f(z)
−DRm+1,n
λ f(z)
DRm,nλ f(z)
z(DRm,nλ f(z))0
DRm,nλ f(z)
. By using the identity (2.1) and (2.2), we obtain
zp0 (z) =1− λ(n+ 1)
λ
DRm+1,nλ f (z)
DRm,nλ f (z)+ (n+ 1) [1− λ(n+ 2)]
DRm,n+1λ f (z)
DRm,nλ f (z)+
λ(n+1)(n+2)DRm,n+2λ f (z)
DRm,nλ f (z)− 1λ
ÃDRm+1,nλ f (z)
DRm,nλ f (z)
!2+λ(n+1)(n+2)
DRm,n+2λ f (z)
DRm,nλ f (z)− 1λ
ÃDRm+1,nλ f (z)
DRm,nλ f (z)
!2(2.7)
By setting θ (w) := αw+βw2 and φ (w) := µ, α,β, µ ∈ C, µ 6= 0 it can be easily verified that θ is analytic in C,φ is analytic in C\0 and that φ (w) 6= 0, w ∈ C\0. Also, by letting Q (z) = zq0 (z)φ (q (z)) = µzq0 (z) ,we findthat Q (z) is starlike univalent in U. Let h (z) = θ (q (z))+Q (z) = αq (z)+β (q (z))2+µzq0 (z), z ∈ U. If we derivethe function Q, with respect to z, perform calculations, we have Re
³zh0(z)Q(z)
´= Re
³1 + α
µ +2βµ q (z) +
zq00(z)q0(z)
´> 0.
By using (2.7), we obtain αp (z)+β (p (z))2+µzp0 (z) =³1−λ(n+1)
λ µ+ α´DRm+1,n
λ f(z)
DRm,nλ f(z)
+ µ(n+1) [1− λ(n+ 2)] ·DRm,n+1
λ f(z)
DRm,nλ f(z)
+ λµ(n+1)(n+2)DRm,n+2
λ f(z)
DRm,nλ f(z)
+ (β− µλ )³DRm+1,n
λ f(z)
DRm,nλ f(z)
´2. By using (2.5), we have αp (z)+β (p (z))
2+
µzp0 (z) ≺ αq (z) + β (q (z))2+µzq0 (z) . Therefore, the conditions of Lemma 1.1 are met, so we have p (z) ≺ q (z),
z ∈ U, i.e. DRm+1,nλ f(z)
DRm,nλ f(z)
≺ q (z), z ∈ U, and q is the best dominant.
3
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1051 Andrei Loriana 1049-1056
Corollary 2.3 Let q (z) = 1+Az1+Bz , −1 ≤ B < A ≤ 1, m, n ∈ N, λ ≥ 0, z ∈ U. Assume that (2.3) holds. If f ∈ A
and ψm,nλ (α,β, µ; z) ≺ α 1+Az1+Bz + β³1+Az1+Bz
´2+ µ (A−B)z
(1+Bz)2, for α,β, µ ∈ C, µ 6= 0, −1 ≤ B < A ≤ 1, where ψm,nλ is
defined in (2.4), then DRm+1,nλ f(z)
DRm,nλ f(z)
≺ 1+Az1+Bz and
1+Az1+Bz is the best dominant.
Proof. For q (z) = 1+Az1+Bz , −1 ≤ B < A ≤ 1, in Theorem 2.2 we get the corollary.
Corollary 2.4 Let q (z) =³1+z1−z
´γ,m, n ∈ N, λ ≥ 0, z ∈ U. Assume that (2.3) holds. If f ∈ A and ψm,nλ (α,β, µ; z)
≺ α³1+z1−z
´γ+ β
³1+z1−z
´2γ+ µ 2γz
1−z2³1+z1−z
´γ−1, for α, µ,β ∈ C, 0 < γ ≤ 1, µ 6= 0, where ψm,nλ is defined in (2.4),
then DRm+1,nλ f(z)
DRm,nλ f(z)
≺³1+z1−z
´γ, and
³1+z1−z
´γis the best dominant.
Proof. Corollary follows by using Theorem 2.2 for q (z) =³1+z1−z
´γ, 0 < γ ≤ 1.
Theorem 2.5 Let q be convex and univalent in U, such that q (0) = 1, m, n ∈ N, λ ≥ 0. Assume that
Re
µq0 (z)
µ(α+ 2βq (z))
¶> 0, for α, µ,β ∈ C, µ 6= 0, z ∈ U. (2.8)
If f ∈ A, DRm+1,nλ f(z)
DRm,nλ f(z)
∈ H [q (0) , 1]∩Q and ψm,nλ (α,β, µ; z) is univalent in U , where ψm,nλ (α,β, µ; z) is as defined
in (2.4), thenαq (z) + β (q (z))2 + µzq0 (z) ≺ ψm,nλ (α,β, µ; z) , z ∈ U, (2.9)
implies
q (z) ≺ DRm+1,nλ f (z)
DRm,nλ f (z), z ∈ U, (2.10)
and q is the best subordinant.
Proof. Let the function p be defined by p (z) := DRm+1,nλ f(z)
DRm,nλ f(z)
, z ∈ U , z 6= 0, f ∈ A. By setting ν (w) :=
αw+βw2 and φ (w) := µ it can be easily verified that ν is analytic in C, φ is analytic in C\0 and that φ (w) 6= 0,w ∈ C\0. Since ν0(q(z))
φ(q(z)) =q0(z)µ (α+ 2βq (z)), it follows that Re
³ν0(q(z))φ(q(z))
´= Re
³q0(z)µ (α+ 2βq (z))
´> 0, for
µ, ξ,β ∈ C, µ 6= 0.By using (2.9) we obtain αq (z) + β (q (z))
2+ µzq0 (z) ≺ αq (z) + β (q (z))
2+ µzq0 (z) . Using Lemma 1.2, we
have q (z) ≺ p (z) = DRm+1,nλ f(z)
DRm,nλ f(z)
, z ∈ U, and q is the best subordinant.
Corollary 2.6 Let q (z) = 1+Az1+Bz , −1 ≤ B < A ≤ 1, m, n ∈ N, λ ≥ 0. Assume that (2.8) holds. If f ∈
A,DRm+1,nλ f(z)
DRm,nλ f(z)
∈ H [q (0) , 1] ∩Q and α 1+Az1+Bz + β³1+Az1+Bz
´2+ µ (A−B)z
(1+Bz)2≺ ψm,nλ (α,β, µ; z) , for α, µ,β ∈ C, µ 6= 0,
−1 ≤ B < A ≤ 1, where ψm,nλ is defined in (2.4), then 1+Az1+Bz ≺
DRm+1,nλ f(z)
DRm,nλ f(z)
and 1+Az1+Bz is the best subordinant.
Proof. For q (z) = 1+Az1+Bz , −1 ≤ B < A ≤ 1 in Theorem 2.5 we get the corollary.
Corollary 2.7 Let q (z) =³1+z1−z
´γ,m, n ∈ N, λ ≥ 0. Assume that (2.8) holds. If f ∈ A,DR
m+1,nλ f(z)
DRm,nλ f(z)
∈
H [q (0) , 1] ∩ Q and α³1+z1−z
´γ+ β
³1+z1−z
´2γ+ µ 2γz
1−z2³1+z1−z
´γ−1≺ ψm,nλ (α,β, µ; z) , for α, µ,β ∈ C, 0 < γ ≤ 1, µ
6= 0, where ψm,nλ is defined in (2.4), then³1+z1−z
´γ≺ DRm+1,n
λ f(z)
DRm,nλ f(z)
and³1+z1−z
´γis the best subordinant.
Proof. Corollary follows by using Theorem 2.5 for q (z) =³1+z1−z
´γ, 0 < γ ≤ 1.
Combining Theorem 2.2 and Theorem 2.5, we state the following sandwich theorem.
4
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1052 Andrei Loriana 1049-1056
Theorem 2.8 Let q1 and q2 be analytic and univalent in U such that q1 (z) 6= 0 and q2 (z) 6= 0, for all z ∈U , with zq01 (z) and zq
02 (z) being starlike univalent. Suppose that q1 satisfies (2.3) and q2 satisfies (2.8). If
f ∈ A, DRm+1,nλ f(z)
DRm,nλ f(z)
∈ H [q (0) , 1] ∩ Q and ψm,nλ (α,β, µ; z) is as defined in (2.4) univalent in U , then αq1 (z)+
β (q1 (z))2+ µzq01 (z) ≺ ψm,nλ (α,β, µ; z) ≺ αq2 (z)+ β (q2 (z))
2+ µzq02 (z) , for α, µ,β ∈ C, µ 6= 0, implies q1 (z) ≺DRm+1,n
λ f(z)
DRm,nλ f(z)
≺ q2 (z), δ ∈ C, δ 6= 0, and q1 and q2 are respectively the best subordinant and the best dominant.
For q1 (z) = 1+A1z1+B1z
, q2 (z) = 1+A2z1+B2z
, where −1 ≤ B2 < B1 < A1 < A2 ≤ 1, we have the following corollary.
Corollary 2.9 Let m,n ∈ N, λ ≥ 0. Assume that (2.3) and (2.8) hold for q1 (z) = 1+A1z1+B1z
and q2 (z) = 1+A2z1+B2z
,
respectively. If f ∈ A, DRm+1,nλ f(z)
DRm,nλ f(z)
∈ H [q (0) , 1] ∩ Q and α 1+A1z1+B1z+ β
³1+A1z1+B1z
´2+ µ (A1−B1)z
(1+B1z)2 ≺ ψm,nλ (α,β, µ; z)
≺ α 1+A2z1+B2z+ β
³1+A2z1+B2z
´2+ µ (A2−B2)z
(1+B2z)2 , for α, µ,β ∈ C, µ 6= 0, −1 ≤ B2 ≤ B1 < A1 ≤ A2 ≤ 1, where ψm,nλ is
defined in (2.4), then 1+A1z1+B1z
≺ DRm+1,nλ f(z)
DRm,nλ f(z)
≺ 1+A2z1+B2z
, hence 1+A1z1+B1z
and 1+A2z1+B2z
are the best subordinant and the bestdominant, respectively.
Theorem 2.10 Let³DRm+1,n
λ f(z)
DRm,nλ f(z)
´δ∈ H (U) , f ∈ A, z ∈ U , δ ∈ C, δ 6= 0, m, n ∈ N, λ ≥ 0 and let the function
q (z) be convex and univalent in U such that q (0) = 1, z ∈ U . Assume that
Re
µα+ β
β+zq00 (z)
q0 (z)
¶> 0, (2.11)
for α,β ∈ C, β 6= 0, z ∈ U, and
ψm,nλ (α,β; z) :=
ÃDRm+1,nλ f (z)
DRm,nλ f (z)
!δ ∙α+ δβ
1− λ(n+ 1)
λ+
δβ(n+ 1) [1− λ(n+ 2)]DRm,n+1λ f (z)
DRm+1,nλ f (z)+ δβλ(n+ 1)(n+ 2)
DRm,n+2λ f (z)
DRm+1,nλ f (z)− δβ
λ
DRm+1,nλ f (z)
DRm,nλ f (z)
#(2.12)
If q satisfies the following subordination
ψm,nλ (α,β; z) ≺ αq (z) + βzq0 (z) , (2.13)
for α,β ∈ C, β 6= 0, z ∈ U, thenÃDRm+1,nλ f (z)
DRm,nλ f (z)
!δ
≺ q (z) , z ∈ U, δ ∈ C, δ 6= 0, (2.14)
and q is the best dominant.
Proof. Let the function p be defined by p (z) :=³DRm+1,n
λ f(z)
DRm,nλ f(z)
´δ, z ∈ U , z 6= 0, f ∈ A. The func-
tion p is analytic in U and p (0) = 1. We have zp0 (z) = δz³DRm+1,n
λ f(z)
DRm,nλ f(z)
´δDRm,n
λ f(z)
DRm+1,nλ f(z)
³DRm+1,n
λ f(z)
DRm,nλ f(z)
´0=
δ³DRm+1,n
λ f(z)
DRm,nλ f(z)
´δDRm,n
λ f(z)
DRm+1,nλ f(z)
µz(DRm+1,n
λ f(z))0
DRm,nλ f(z)
− DRm+1,nλ f(z)
DRm,nλ f(z)
z(DRm,nλ f(z))0
DRm,nλ f(z)
¶.
By using the identity (2.1) and (2.2), we obtain zp0 (z) = δ³DRm+1,n
λ f(z)
DRm,nλ f(z)
´δDRm,n
λ f(z)
DRm+1,nλ f(z)
h³1−λ(n+1)
λ
´DRm+1,n
λ f(z)
DRm,nλ f(z)
+(n+ 1) [1− λ(n+ 2)]DRm,n+1
λ f(z)
DRm,nλ f(z)
+ λ(n+ 1)(n+ 2)DRm,n+2
λ f(z)
DRm,nλ f(z)
− 1λ
³DRm+1,n
λ f(z)
DRm,nλ f(z)
´2¸so, we obtain
zp0 (z) = δ
ÃDRm+1,nλ f (z)
DRm,nλ f (z)
!δ ∙1− λ(n+ 1)
λ+
5
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1053 Andrei Loriana 1049-1056
(n+ 1) [1− λ(n+ 2)]DRm,n+1λ f (z)
DRm+1,nλ f (z)+ λ(n+ 1)(n+ 2)
DRm,n+2λ f (z)
DRm+1,nλ f (z)− 1
λ
DRm+1,nλ f (z)
DRm,nλ f (z)
#(2.15)
By setting θ (w) := αw and φ (w) := β, it can be easily verified that θ is analytic in C, φ is analytic in C\0and that φ (w) 6= 0, w ∈ C\0. Also, by letting Q (z) = zq0 (z)φ (q (z)) = βzq0 (z) , we find that Q (z) is starlike
univalent in U. Let h (z) = θ (q (z)) +Q (z) = αq (z) + βzq0 (z).We have Re³zh0(z)Q(z)
´= Re
³α+ββ + zq00(z)
q0(z)
´> 0.
By using (2.15), we obtain αp (z) + βzp0 (z) =³DRm+1,n
λ f(z)
DRm,nλ f(z)
´δ hα+ δβ 1−λ(n+1)λ + δβ(n+ 1) [1− λ(n+ 2)] ·
DRm,n+1λ f(z)
DRm+1,nλ f(z)
+ δβλ(n+ 1)(n+ 2)DRm,n+2
λ f(z)
DRm+1,nλ f(z)
− δβλ
DRm+1,nλ f(z)
DRm,nλ f(z)
i.
By using (2.13), we have αp (z) + βzp0 (z) ≺ αq (z) + βzq0 (z) . From Lemma 1.1, we have p (z) ≺ q (z), z ∈ U,
i.e.³DRm+1,n
λ f(z)
DRm,nλ f(z)
´δ≺ q (z), z ∈ U, δ ∈ C, δ 6= 0 and q is the best dominant.
Corollary 2.11 Let q (z) = 1+Az1+Bz , z ∈ U, −1 ≤ B < A ≤ 1, m, n ∈ N, λ ≥ 0. Assume that (2.11) holds. If f ∈ A
and ψm,nλ (α,β; z) ≺ α 1+Az1+Bz + β (A−B)z(1+Bz)2
, for α,β ∈ C, β 6= 0, −1 ≤ B < A ≤ 1, where ψm,nλ is defined in (2.12),
then³DRm+1,n
λ f(z)
DRm,nλ f(z)
´δ≺ 1+Az
1+Bz , δ ∈ C, δ 6= 0, and1+Az1+Bz is the best dominant.
Proof. For q (z) = 1+Az1+Bz , −1 ≤ B < A ≤ 1, in Theorem 2.10 we get the corollary.
Corollary 2.12 Let q (z) =³1+z1−z
´γ,m, n ∈ N, λ ≥ 0. Assume that (2.11) holds. If f ∈ A and ψm,nλ (α,β, µ; z) ≺
α³1+z1−z
´γ+ β 2γz
1−z2³1+z1−z
´γ−1, for α,β ∈ C, 0 < γ ≤ 1, β 6= 0, where ψm,nλ is defined in (2.12), then
³DRm+1,n
λ f(z)
DRm,nλ f(z)
´δ≺³1+z1−z
´γ, δ ∈ C, δ 6= 0, and
³1+z1−z
´γis the best dominant.
Proof. Corollary follows by using Theorem 2.10 for q (z) =³1+z1−z
´γ, 0 < γ ≤ 1.
Theorem 2.13 Let q be convex and univalent in U such that q (0) = 1. Assume that
Re
µα
βq0 (z)
¶> 0, for α,β ∈ C, β 6= 0. (2.16)
If f ∈ A,³DRm+1,n
λ f(z)
DRm,nλ f(z)
´δ∈ H [q (0) , 1] ∩Q and ψm,nλ (α,β; z) is univalent in U , where ψm,nλ (α,β; z) is as defined
in (2.12), thenαq (z) + βzq0 (z) ≺ ψm,nλ (α,β; z) (2.17)
implies
q (z) ≺ÃDRm+1,nλ f (z)
DRm,nλ f (z)
!δ
, δ ∈ C, δ 6= 0, z ∈ U, (2.18)
and q is the best subordinant.
Proof. Let the function p be defined by p (z) :=³DRm+1,n
λ f(z)
DRm,nλ f(z)
´δ, z ∈ U , z 6= 0, δ ∈ C, δ 6= 0, f ∈ A. The
function p is analytic in U and p (0) = 1. By setting ν (w) := αw and φ (w) := β it can be easily verified that νis analytic in C, φ is analytic in C\0 and that φ (w) 6= 0, w ∈ C\0. Since ν0(q(z))
φ(q(z)) =αβ q
0 (z), it follows that
Re³ν0(q(z))φ(q(z))
´= Re
³αβ q
0 (z)´> 0, for α,β ∈ C, β 6= 0.
Now, by using (2.17) we obtain αq (z) + βzq0 (z) ≺ αq (z) + βzq0 (z) , z ∈ U. From Lemma 1.2, we have
q (z) ≺ p (z) =³DRm+1,n
λ f(z)
DRm,nλ f(z)
´δ, z ∈ U, δ ∈ C, δ 6= 0, and q is the best subordinant.
Corollary 2.14 Let q (z) = 1+Az1+Bz , −1 ≤ B < A ≤ 1, z ∈ U, m, n ∈ N, λ ≥ 0. Assume that (2.16) holds. If f ∈ A,³
DRm+1,nλ f(z)
DRm,nλ f(z)
´δ∈ H [q (0) , 1] ∩ Q, δ ∈ C, δ 6= 0 and α 1+Az1+Bz + β (A−B)z
(1+Bz)2≺ ψm,nλ (α,β; z) , for α,β ∈ C, β 6= 0,
−1 ≤ B < A ≤ 1, where ψm,nλ is defined in (2.12), then 1+Az1+Bz ≺
³DRm+1,n
λ f(z)
DRm,nλ f(z)
´δ, δ ∈ C, δ 6= 0, and 1+Az
1+Bz is thebest subordinant.
6
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1054 Andrei Loriana 1049-1056
Proof. For q (z) = 1+Az1+Bz , −1 ≤ B < A ≤ 1, in Theorem 2.13 we get the corollary.
Corollary 2.15 Let q (z) =³1+z1−z
´γ,m, n ∈ N, λ ≥ 0. Assume that (2.16) holds. If f ∈ A,
³DRm+1,n
λ f(z)
DRm,nλ f(z)
´δ∈ H [q (0) , 1] ∩ Q and α
³1+z1−z
´γ+ β 2γz
1−z2³1+z1−z
´γ−1≺ ψm,nλ (α,β, µ; z) , for α,β ∈ C, 0 < γ ≤ 1, β 6= 0, where
ψm,nλ is defined in (2.12), then³1+z1−z
´γ≺³DRm+1,n
λ f(z)
DRm,nλ f(z)
´δ, δ ∈ C, δ 6= 0, and
³1+z1−z
´γis the best subordinant.
Proof. Corollary follows by using Theorem 2.13 for q (z) =³1+z1−z
´γ, 0 < γ ≤ 1.
Combining Theorem 2.10 and Theorem 2.13, we state the following sandwich theorem.
Theorem 2.16 Let q1 and q2 be convex and univalent in U such that q1 (z) 6= 0 and q2 (z) 6= 0, for all z ∈ U .
Suppose that q1 satisfies (2.11) and q2 satisfies (2.16). If f ∈ A,³DRm+1,n
λ f(z)
DRm,nλ f(z)
´δ∈ H [q (0) , 1] ∩ Q , δ ∈
C, δ 6= 0 and ψm,nλ (α,β; z) is as defined in (2.12) univalent in U , then αq1 (z) + βzq01 (z) ≺ ψm,nλ (α,β; z) ≺
αq2 (z) + βzq02 (z) , for α,β ∈ C, β 6= 0, implies q1 (z) ≺³DRm+1,n
λ f(z)
DRm,nλ f(z)
´δ≺ q2 (z), z ∈ U, δ ∈ C, δ 6= 0, and q1 and
q2 are respectively the best subordinant and the best dominant.
For q1 (z) = 1+A1z1+B1z
, q2 (z) = 1+A2z1+B2z
, where −1 ≤ B2 < B1 < A1 < A2 ≤ 1, we have the following corollary.
Corollary 2.17 Let m,n ∈ N, λ ≥ 0. Assume that (2.11) and (2.16) hold for q1 (z) = 1+A1z1+B1z
and q2 (z) =
1+A2z1+B2z
, respectively. If f ∈ A,³DRm+1,n
λ f(z)
DRm,nλ f(z)
´δ∈ H [q (0) , 1] ∩ Q and α 1+A1z1+B1z
+ β (A1−B1)z(1+B1z)
2 ≺ ψm,nλ (α,β, µ; z)
≺ α 1+A2z1+B2z+β (A2−B2)z
(1+B2z)2 , z ∈ U, for α,β ∈ C, β 6= 0, −1 ≤ B2 ≤ B1 < A1 ≤ A2 ≤ 1, where ψm,nλ is defined in (2.4),
then 1+A1z1+B1z
≺³DRm+1,n
λ f(z)
DRm,nλ f(z)
´δ≺ 1+A2z
1+B2z, z ∈ U, δ ∈ C, δ 6= 0, hence 1+A1z
1+B1zand 1+A2z
1+B2zare the best subordinant and
the best dominant, respectively.
References[1] A. Alb Lupas, Certain differential subordinations using Salagean and Ruscheweyh operators, Acta Universitatis
Apulensis, No. 29/2012, 125-129.
[2] A. Alb Lupas, A note on differential subordinations using Salagean and Ruscheweyh operators, Romai Journal,vol. 6, nr. 1(2010), 1—4.
[3] A. Alb Lupas, Certain differential superordinations using Salagean and Ruscheweyh operators, Analele Uni-versitatii din Oradea, Fascicola Matematica, Tom XVII, Issue no. 2, 2010, 209-216.
[4] A. Alb Lupas, Certain differential subordinations using a generalized Salagean operator and Ruscheweyhoperator I, Journal of Mathematics and Applications, No. 33 (2010), 67-72.
[5] A. Alb Lupas, Certain differential subordinations using a generalized Salagean operator and Ruscheweyhoperator II, Fractional Calculus and Applied Analysis, Vol 13, No. 4 (2010), 355-360.
[6] A. Alb Lupas, Certain differential superordinations using a generalized Salagean and Ruscheweyh operators,Acta Universitatis Apulensis nr. 25/2011, 31-40.
[7] F.M. Al-Oboudi, On univalent functions defined by a generalized Salagean operator, Ind. J. Math. Math. Sci.,27 (2004), 1429-1436.
[8] L. Andrei, Differential subordination results using a generalized Salagean operator and Ruscheweyh operator,Acta Universitatis Apulensis (to appear).
[9] L. Andrei, Some differential subordination results using a generalized Salagean operator and Ruscheweyhoperator, submitted.
[10] L. Andrei, Differential superordination results using a generalized Salagean operator and Ruscheweyh operator,submitted.
7
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1055 Andrei Loriana 1049-1056
[11] L. Andrei, Some differential superordination results using a generalized Salagean operator and Ruscheweyhoperator, submitted.
[12] L. Andrei, Differential Sandwich Theorems using a generalized Salagean operator and Ruscheweyh operator,submitted.
[13] T. Bulboaca, Classes of first order differential superordinations, Demonstratio Math., Vol. 35, No. 2, 287-292.
[14] M. Darus, K. Al-Shaqsi, Differential sandwich theorems with generalised derivative operator, Advanced Tech-nologies, October, Kankesu Jayanthakumaran (Ed), ISBN:978-953-307-009-4 2009
[15] S.S. Miller, P.T. Mocanu, Subordinants of Differential Superordinations, Complex Variables, vol. 48, no. 10,815-826, October, 2003.
[16] S.S. Miller, P.T. Mocanu, Differential Subordinations: Theory and Applications, Marcel Dekker Inc., NewYork, 2000.
[17] St. Ruscheweyh, New criteria for univalent functions, Proc. Amet. Math. Soc., 49(1975), 109-115.
[18] G. St. Salagean, Subclasses of univalent functions, Lecture Notes in Math., Springer Verlag, Berlin, 1013(1983),362-372.
[19] T.N. Shanmugan, C. Ramachandran, M. Darus, S. Sivasubramanian, Differential sandwich theorems for somesubclasses of analytic functions involving a linear operator, Acta Math. Univ. Comenianae, 16 (2007), no. 2,287-294.
8
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1056 Andrei Loriana 1049-1056
Journal of Computational Analysis and Applications 00(0000), 000-000
http://JoCAAA/91-2015-Muhiuddin-Alroqi-JoCAAA-6-02-2014
Subalgebras of BCK/BCI-algebras based on
(α, β)-type fuzzy sets
G. Muhiuddina,∗ and Abdullah M. Al-roqib
aDepartment of Mathematics, University of Tabuk, Tabuk 71491, Saudi Arabia
bDepartment of Mathematics, King Abdulaziz University, Jeddah 21589, Saudi Arabia
Abstract. The notion of (ε, δ)-characteristic fuzzy sets is introduced. Given a subalgebra F of a
BCK/BCI-algebra X, conditions for the (ε, δ)-characteristic fuzzy set in X to be an (∈,∈ ∨ q)-fuzzy
subalgebra, an (∈, q)-fuzzy subalgebra, an (∈,∈∧ q)-fuzzy subalgebra, a (q, q)-fuzzy subalgebra, a (q,∈)-
fuzzy subalgebra, a (q,∈∨ q)-fuzzy subalgebra and a (q,∈∧ q)-fuzzy subalgebra are provided. Using the
notions of (α, β)-fuzzy subalgebra µ(ε,δ)F , conditions for the F to be a subalgebra of X are investigated
where (α, β) is one of (∈,∈∨ q), (∈,∈∧ q), (∈, q), (q,∈∨ q), (q,∈∧ q), (q,∈) and (q, q).
1. Introduction
The idea of quasi-coincidence of a fuzzy point with a fuzzy set is given in [7] which played a vital
role to generate some different types of fuzzy subgroups, called (α, β)-fuzzy subgroups, introduced by
Bhakat and Das [1]. In particular, (∈,∈∨ q )-fuzzy subgroup is an important and useful generalization
of Rosenfeld’s fuzzy subgroup. Several authors [3, 4, 5, 8] have studied the concept of (α, β)-fuzzy
subalgebras in BCK/BCI-algebras, which is an important and useful generalization of the well-known
concepts, called fuzzy subalgebras.
In this paper, we introduce the notion of (ε, δ)-characteristic fuzzy sets in BCK/BCI-algebras. Given
a subalgebra F of a BCK/BCI-algebra X, we provide conditions for the (ε, δ)-characteristic fuzzy set
in X to be an (∈,∈ ∨ q)-fuzzy subalgebra, an (∈, q)-fuzzy subalgebra, an (∈,∈ ∧ q)-fuzzy subalgebra,
a (q, q)-fuzzy subalgebra, a (q,∈)-fuzzy subalgebra, a (q,∈ ∨ q)-fuzzy subalgebra and a (q,∈ ∧ q)-fuzzy
subalgebra. Using the notions of (α, β)-fuzzy subalgebra µ(ε,δ)F , we investigate conditions for the F to be
a subalgebra of X where (α, β) is one of (∈,∈∨ q), (∈,∈∧ q), (∈, q), (q,∈∨ q), (q,∈∧ q), (q,∈) and (q, q).
2010 Mathematics Subject Classification: 06F35; 03G25; 06D72.
Keywords: (ε, δ)-characteristic fuzzy set, (Fuzzy) subalgebra, (α, β)-fuzzy subalgebra.
*Corresponding author.
E-mail: [email protected] (G. Muhiuddin), [email protected] (Abdullah M. Al-roqi)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1057 G. Muhiuddin et al 1057-1064
2 G. Muhiuddin and Abdullah M. Al-roqi
2. Preliminaries
By a BCI-algebra we mean an algebra (X, ∗, 0) of type (2, 0) satisfying the axioms:
(a1) ((x ∗ y) ∗ (x ∗ z)) ∗ (z ∗ y) = 0,
(a2) (x ∗ (x ∗ y)) ∗ y = 0,
(a3) x ∗ x = 0,
(a4) x ∗ y = y ∗ x = 0 ⇒ x = y,
for all x, y, z ∈ X. We can define a partial ordering ≤ by x ≤ y if and only if x ∗ y = 0. If a BCI-algebra
X satisfies the axiom
(a5) 0 ∗ x = 0 for all x ∈ X,
then we say that X is a BCK-algebra. A nonempty subset S of a BCK/BCI-algebra X is called a
subalgebra of X if x ∗ y ∈ S for all x, y ∈ S. We refer the reader to the books [2] and [6] for further
information regarding BCK/BCI-algebras.
A fuzzy set µ in a set X of the form
µ(y) :=
t ∈ (0, 1] if y = x,
0 if y 6= x,
is said to be a fuzzy point with support x and value t and is denoted by xt.
For a fuzzy point xt and a fuzzy set µ in a set X, Pu and Liu [7] introduced the symbol xtαµ, where
α ∈ ∈, q ,∈∨ q ,∈∧ q . To say that xt ∈ µ (resp. xt q µ), we mean µ(x) ≥ t (resp. µ(x) + t > 1), and
in this case, xt is said to belong to (resp. be quasi-coincident with) a fuzzy set µ. To say that xt ∈∨ q µ(resp. xt ∈∧ q µ), we mean xt ∈ µ or xt q µ (resp. xt ∈ µ and xt q µ). To say that xt αµ, we mean xtαµ
does not hold, where α ∈ ∈, q,∈∨ q ,∈∧ q .A fuzzy set µ in a BCK/BCI-algebra X is called a fuzzy subalgebra of X if it satisfies:
(2.1) µ(x ∗ y) ≥ minµ(x), µ(y)
for all x, y ∈ X.
Proposition 2.1 ([4]). Let X be a BCK/BCI-algebra. A fuzzy set µ in X is a fuzzy subalgebra of X if
and only if the following assertion is valid.
(2.2) xt ∈ µ, ys ∈ µ =⇒ (x ∗ y)mint,s ∈ µ
for all x, y ∈ X and t, s ∈ (0, 1].
3. Subalgebras of BCK/BCI-algebras based on (α, β)-type fuzzy sets
In what follows, let X denote a BCK/BCI-algebra unless otherwise specified.
Let F be a non-empty subset of X and ε, δ ∈ [0, 1] such that ε > δ. Define a fuzzy set µ(ε,δ)F in X as
follows:
µ(ε,δ)F (x) :=
ε if x ∈ F,δ otherwise.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1058 G. Muhiuddin et al 1057-1064
Subalgebras of BCK/BCI-algebras based on (α, β)-type fuzzy sets 3
We say that µ(ε,δ)F is an (ε, δ)-characteristic fuzzy set in X over F. In particular, the (1, 0)-characteristic
fuzzy set µ(1,0)F in X over F is the characteristic function χF of F.
Theorem 3.1. For any non-empty subset F of X, the following are equivalent:
(1) F is a subalgebra of X.
(2) The fuzzy set µ(ε,δ)F is a fuzzy subalgebra of X for all ε, δ ∈ [0, 1] with ε > δ.
Proof. Assume that F is a subalgebra of X and let ε, δ ∈ [0, 1] be such that ε > δ. Let x, y ∈ X. If
x, y ∈ F , then x ∗ y ∈ F and so
µ(ε,δ)F (x ∗ y) = ε = min
µ(ε,δ)F (x), µ
(ε,δ)F (y)
.
If x /∈ F or y /∈ F, then µ(ε,δ)F (x) = δ or µ
(ε,δ)F (y) = δ. Hence
µ(ε,δ)F (x ∗ y) ≥ δ = min
µ(ε,δ)F (x), µ
(ε,δ)F (y)
.
Therefore µ(ε,δ)F is a fuzzy subalgebra of X for all ε, δ ∈ [0, 1] with ε > δ.
Conversely, suppose that (2) is valid. Let x, y ∈ F. Then µ(ε,δ)F (x) = ε and µ
(ε,δ)F (y) = ε. It follows that
µ(ε,δ)F (x ∗ y) ≥ min
µ(ε,δ)F (x), µ
(ε,δ)F (y)
= ε. Thus x ∗ y ∈ F, and therefore F is a subalgebra of X.
Definition 3.2 ([4]). A fuzzy set µ in X is said to be an (α, β)-fuzzy subalgebra of X, where α, β ∈ ∈, q ,∈∨ q ,∈∧ q and α 6= ∈∧ q , if it satisfies the following condition:
(3.1) xt1αµ, yt2αµ ⇒ (x ∗ y)mint1,t2 β µ.
for all x, y ∈ X and t1, t2 ∈ (0, 1].
Lemma 3.3 ([4]). A fuzzy set µ in X is an (∈,∈∨ q )-fuzzy subalgebra of X if and only if it satisfies:
(3.2) (∀x, y ∈ X) (µ(x ∗ y) ≥ minµ(x), µ(y), 0.5) .
Theorem 3.4. If F is a subalgebra of X, then the fuzzy set µ(ε,δ)F is an (∈,∈∨ q )-fuzzy subalgebra of X
for all ε, δ ∈ [0, 1] with ε > δ.
Proof. Assume that F is a subalgebra of X and let ε, δ ∈ [0, 1] such that ε > δ. For any x, y ∈ X, if
x, y ∈ F , then x ∗ y ∈ F and so
µ(ε,δ)F (x ∗ y) = ε ≥ min
µ(ε,δ)F (x), µ
(ε,δ)F (y), 0.5
.
If x /∈ F or y /∈ F, then µ(ε,δ)F (x) = δ or µ
(ε,δ)F (y) = δ. Hence
µ(ε,δ)F (x ∗ y) ≥ δ ≥ min
µ(ε,δ)F (x), µ
(ε,δ)F (y), 0.5
.
It follows from Lemma 3.3 that µ(ε,δ)F is an (∈,∈ ∨ q )-fuzzy subalgebra of X for all ε, δ ∈ [0, 1] with
ε > δ.
Corollary 3.5. A non-empty subset F of X is a subalgebra of X if and only if the characteristic function
χF of F is an (∈,∈∨ q )-fuzzy subalgebra of X.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1059 G. Muhiuddin et al 1057-1064
4 G. Muhiuddin and Abdullah M. Al-roqi
Proof. The necessity is by taking ε = 1 and δ = 0 in Theorem 3.4.
Conversely, suppose that the characteristic function χF of F is an (∈,∈∨ q )-fuzzy subalgebra of X.
Let x, y ∈ F. Then χF (x) = 1 = χF (y), which implies from (3.2) that
χF (x ∗ y) ≥ minχF (x), χF (y), 0.5 = min1, 0.5 = 0.5.
Hence x ∗ y ∈ F , and therefore F is a subalgebra of X.
We consider the converse of Theorem 3.4.
Theorem 3.6. For any ε, δ ∈ [0, 1] such that δ < ε ≤ 0.5, if the fuzzy set µ(ε,δ)F is an (∈,∈∨ q )-fuzzy
subalgebra of X then F is a subalgebra of X.
Proof. Let x, y ∈ F. Then µ(ε,δ)F (x) = ε = µ
(ε,δ)F (y). Using Lemma 3.3, we have
µ(ε,δ)F (x ∗ y) ≥ min
µ(ε,δ)F (x), µ
(ε,δ)F (y), 0.5
= minε, 0.5 = ε,
and so x ∗ y ∈ F. Therefore F is a subalgebra of X.
Theorem 3.7. Let ε, δ ∈ [0, 1] such that ε > δ. If F is a subalgebra of X, then the fuzzy set µ(ε,δ)F is an
(∈, q )-fuzzy subalgebra of X whenever if any element t in (0, 1] satisfies xt ∈ µ(ε,δ)F for x ∈ X then δ < t
and 1− t < ε.
Proof. Let x, y ∈ X and t1, t2 ∈ (0, 1] be such that xt1 ∈ µ(ε,δ)F and yt2 ∈ µ
(ε,δ)F . Then µ
(ε,δ)F (x) ≥ t1 > δ
and µ(ε,δ)F (y) ≥ t2 > δ. It follows that µ
(ε,δ)F (x) = ε = µ
(ε,δ)F (y), and so x, y ∈ F. Since F is a subalgebra
of X, we have x ∗ y ∈ F. Hence µ(ε,δ)F (x ∗ y) = ε, and thus µ
(ε,δ)F (x ∗ y) + mint1, t2 = ε+ mint1, t2 > 1
which shows that (x ∗ y)mint1,t2 q µ(ε,δ)F . Therefore µ
(ε,δ)F is an (∈, q )-fuzzy subalgebra of X.
Theorem 3.8. Let ε, δ ∈ [0, 1] such that ε > δ. If ε + δ ≤ 1 and the fuzzy set µ(ε,δ)F is an (∈, q)-fuzzy
subalgebra of X, then F is a subalgebra of X.
Proof. Assume that ε + δ ≤ 1 and the fuzzy set µ(ε,δ)F is an (∈, q)-fuzzy subalgebra of X. Let x, y ∈ F.
Then µ(ε,δ)F (x) = ε = µ
(ε,δ)F (y), and so xε ∈ µ(ε,δ)
F and yε ∈ µ(ε,δ)F . Hence (x ∗ y)ε = (x ∗ y)minε,ε q µ
(ε,δ)F ,
which implies that µ(ε,δ)F (x ∗ y) + ε > 1. Therefore µ
(ε,δ)F (x ∗ y) > 1 − ε ≥ δ, and thus µ
(ε,δ)F (x ∗ y) = ε,
that is, x ∗ y ∈ F. Consequently, F is a subalgebra of X.
If we take ε = 1 and δ = 0 in Theorems 3.7 and 3.8, then we have the following corollary.
Corollary 3.9. A non-empty subset F of X is a subalgebra of X if and only if the characteristic function
χF of F is an (∈, q)-fuzzy subalgebra of X.
Theorem 3.10. Let ε, δ ∈ [0, 1] such that ε > δ. If F is a subalgebra of X, then the fuzzy set µ(ε,δ)F
is a (q, q)-fuzzy subalgebra of X whenever if any element t in (0, 1] satisfies xt ∈ µ(ε,δ)F for x ∈ X then
δ ≤ 1− t < ε.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1060 G. Muhiuddin et al 1057-1064
Subalgebras of BCK/BCI-algebras based on (α, β)-type fuzzy sets 5
Proof. Let x, y ∈ X and t1, t2 ∈ (0, 1] be such that xt1 q µ(ε,δ)F and yt2 q µ
(ε,δ)F . Then µ
(ε,δ)F (x) + t1 > 1
and µ(ε,δ)F (y) + t2 > 1, which imply that µ
(ε,δ)F (x) > 1− t1 ≥ δ and µ
(ε,δ)F (y) > 1− t2 ≥ δ. It follows that
µ(ε,δ)F (x) = ε = µ
(ε,δ)F (y) and so that x, y ∈ F. Since F is a subalgebra of X, we have x ∗ y ∈ F and so
µ(ε,δ)F (x ∗ y) = ε. Thus
µ(ε,δ)F (x ∗ y) + mint1, t2 = ε+ mint1, t2 > 1,
that is, (x ∗ y)mint1,t2 q µ(ε,δ)F . This shows that µ
(ε,δ)F is a (q, q)-fuzzy subalgebra of X.
Theorem 3.11. Let ε, δ ∈ [0, 1] such that ε > maxδ, 0.5 and ε + δ ≤ 1. If the fuzzy set µ(ε,δ)F is a
(q, q)-fuzzy subalgebra of X, then F is a subalgebra of X.
Proof. Let x, y ∈ F. Then µ(ε,δ)F (x) = ε = µ
(ε,δ)F (y), which implies that
µ(ε,δ)F (x) + ε = ε+ ε > 1 and µ
(ε,δ)F (y) + ε = ε+ ε > 1,
that is, xε q µ(ε,δ)F and yε q µ
(ε,δ)F . Since µ
(ε,δ)F is a (q, q)-fuzzy subalgebra of X, it follows that (x ∗ y)ε =
(x ∗ y)minε,ε q µ(ε,δ)F . Hence µ
(ε,δ)F (x ∗ y) > 1 − ε ≥ δ, and therefore µ
(ε,δ)F (x ∗ y) = ε. This proves that
x ∗ y ∈ F , and F is a subalgebra of X.
If we take ε = 1 and δ = 0 in Theorems 3.10 and 3.11, then we have the following corollary.
Corollary 3.12. A non-empty subset F of X is a subalgebra of X if and only if the characteristic
function χF of F is a (q, q)-fuzzy subalgebra of X.
Theorem 3.13. Let ε, δ ∈ [0, 1] such that ε > δ. If F is a subalgebra of X, then the fuzzy set µ(ε,δ)F is
a (q,∈)-fuzzy subalgebra of X whenever if any element t in (0, 1] satisfies xt ∈ µ(ε,δ)F for x ∈ X then
δ ≤ 1− t and t < ε.
Proof. Let x, y ∈ X and t1, t2 ∈ (0, 1] be such that xt1 q µ(ε,δ)F and yt2 q µ
(ε,δ)F . Then µ
(ε,δ)F (x) + t1 > 1
and µ(ε,δ)F (y) + t2 > 1, which imply that µ
(ε,δ)F (x) > 1 − t1 ≥ δ and µ
(ε,δ)F (y) > 1 − t2 ≥ δ. Hence
µ(ε,δ)F (x) = ε = µ
(ε,δ)F (y), and so x, y ∈ F. Since F is a subalgebra of X, we have x ∗ y ∈ F and thus
µ(ε,δ)F (x ∗ y) = ε ≥ mint1, t2,
that is, (x ∗ y)mint1,t2 ∈ µ(ε,δ)F . This shows that µ
(ε,δ)F is a (q,∈)-fuzzy subalgebra of X.
Theorem 3.14. Let ε, δ ∈ [0, 1] such that ε > maxδ, 0.5. If the fuzzy set µ(ε,δ)F is a (q,∈)-fuzzy
subalgebra of X, then F is a subalgebra of X.
Proof. Let x, y ∈ F. Then µ(ε,δ)F (x) = ε = µ
(ε,δ)F (y), which implies that
µ(ε,δ)F (x) + ε = ε+ ε > 1 and µ
(ε,δ)F (y) + ε = ε+ ε > 1,
that is, xε q µ(ε,δ)F and yε q µ
(ε,δ)F . Since µ
(ε,δ)F is a (q,∈)-fuzzy subalgebra of X, it follows that (x ∗ y)ε =
(x ∗ y)minε,ε ∈ µ(ε,δ)F and so that µ
(ε,δ)F (x ∗ y) = ε, that is, x ∗ y ∈ F. Therefore F is a subalgebra of
X.
If we take ε = 1 and δ = 0 in Theorems 3.13 and 3.14, then we have the following corollary.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1061 G. Muhiuddin et al 1057-1064
6 G. Muhiuddin and Abdullah M. Al-roqi
Corollary 3.15. A non-empty subset F of X is a subalgebra of X if and only if the characteristic
function χF of F is a (q,∈)-fuzzy subalgebra of X.
Theorem 3.16. Let ε, δ ∈ [0, 1] such that ε > δ. If F is a subalgebra of X, then the fuzzy set µ(ε,δ)F is an
(∈,∈∧ q )-fuzzy subalgebra of X whenever if any element t in (0, 1] satisfies xt ∈ µ(ε,δ)F for x ∈ X then
δ < t and 1− t < ε.
Proof. Let x, y ∈ X and t1, t2 ∈ (0, 1] be such that xt1 ∈ µ(ε,δ)F and yt2 ∈ µ
(ε,δ)F . Then µ
(ε,δ)F (x) ≥ t1 > δ
and µ(ε,δ)F (y) ≥ t2 > δ, which imply that x, y ∈ F and ε ≥ mint1, t2. Since F is a subalgebra of X, we
have x ∗ y ∈ F. Hence µ(ε,δ)F (x ∗ y) = ε ≥ mint1, t2, i.e., (x ∗ y)mint1,t2 ∈ µ
(ε,δ)F . Now, µ
(ε,δ)F (x ∗ y) +
mint1, t2 = ε + mint1, t2 > 1 and so (x ∗ y)mint1,t2 q µ(ε,δ)F . Therefore (x ∗ y)mint1,t2 ∈ ∧ q µ
(ε,δ)F ,
and consequently µ(ε,δ)F is an (∈,∈∧ q )-fuzzy subalgebra of X.
Theorem 3.17. Let ε, δ ∈ [0, 1] such that ε > δ. If ε+δ ≤ 1 and the fuzzy set µ(ε,δ)F is an (∈,∈∧ q )-fuzzy
subalgebra of X, then F is a subalgebra of X.
Proof. Assume that ε+δ ≤ 1 and the fuzzy set µ(ε,δ)F is an (∈,∈∧ q )-fuzzy subalgebra of X. Let x, y ∈ F.
Then µ(ε,δ)F (x) = ε = µ
(ε,δ)F (y), and so xε ∈ µ(ε,δ)
F and yε ∈ µ(ε,δ)F . Hence (x∗y)ε = (x∗y)minε,ε ∈∧ q µ
(ε,δ)F ,
that is, (x ∗ y)ε = (x ∗ y)minε,ε ∈ µ(ε,δ)F and (x ∗ y)ε = (x ∗ y)minε,ε q µ
(ε,δ)F . Hence µ
(ε,δ)F (x ∗ y) ≥ ε and
µ(ε,δ)F (x ∗ y) + ε > 1. If µ
(ε,δ)F (x ∗ y) ≥ ε, then µ
(ε,δ)F (x ∗ y) = ε and thus x ∗ y ∈ F. If µ
(ε,δ)F (x ∗ y) + ε > 1,
then µ(ε,δ)F (x ∗ y) > 1 − ε ≥ δ and so µ
(ε,δ)F (x ∗ y) = ε, which shows that x ∗ y ∈ F. Therefore F is a
subalgebra of X.
If we take ε = 1 and δ = 0 in Theorems 3.16 and 3.17, then we have the following corollary.
Corollary 3.18. A non-empty subset F of X is a subalgebra of X if and only if the characteristic
function χF of F is an (∈,∈∧ q )-fuzzy subalgebra of X.
Theorem 3.19. Let ε, δ ∈ [0, 1] such that ε > δ. If F is a subalgebra of X, then the fuzzy set µ(ε,δ)F is a
(q,∈∧ q )-fuzzy subalgebra of X under the condition that if any element t in (0, 1] satisfies xt ∈ µ(ε,δ)F for
x ∈ X then δ ≤ 1− t and t < ε.
Proof. Let x, y ∈ X and t1, t2 ∈ (0, 1] be such that xt1 q µ(ε,δ)F and yt2 q µ
(ε,δ)F . Then µ
(ε,δ)F (x) + t1 > 1
and µ(ε,δ)F (y) + t2 > 1, which imply that µ
(ε,δ)F (x) > 1 − t1 ≥ δ and µ
(ε,δ)F (y) > 1 − t2 ≥ δ. Hence
µ(ε,δ)F (x) = ε = µ
(ε,δ)F (y) and ε > max1 − t1, 1 − t2, and so x, y ∈ F. Since F is a subalgebra of X, we
have x ∗ y ∈ F and thus
µ(ε,δ)F (x ∗ y) = ε ≥ mint1, t2,
that is, (x ∗ y)mint1,t2 ∈ µ(ε,δ)F . Now, µ
(ε,δ)F (x ∗ y) + mint1, t2 = ε + mint1, t2 > 1, and so (x ∗
y)mint1,t2 q µ(ε,δ)F . Hence (x ∗ y)mint1,t2 ∈∧ q µ
(ε,δ)F , and µ
(ε,δ)F is a (q,∈∧ q )-fuzzy subalgebra of X.
Theorem 3.20. Let ε, δ ∈ [0, 1] such that ε > maxδ, 0.5. If the fuzzy set µ(ε,δ)F is a (q,∈ ∧ q )-fuzzy
subalgebra of X, then F is a subalgebra of X.
Proof. Let x, y ∈ F. Then µ(ε,δ)F (x) = ε = µ
(ε,δ)F (y), which implies that
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1062 G. Muhiuddin et al 1057-1064
Subalgebras of BCK/BCI-algebras based on (α, β)-type fuzzy sets 7
µ(ε,δ)F (x) + ε = ε+ ε > 1 and µ
(ε,δ)F (y) + ε = ε+ ε > 1,
that is, xε q µ(ε,δ)F and yε q µ
(ε,δ)F . Since µ
(ε,δ)F is a (q,∈∧ q )-fuzzy subalgebra of X, it follows that (x∗y)ε =
(x ∗ y)minε,ε ∈∧ q µ(ε,δ)F and so that µ
(ε,δ)F (x ∗ y) ≥ ε. Hence x ∗ y ∈ F and F is a subalgebra of X.
If we take ε = 1 and δ = 0 in Theorems 3.19 and 3.20, then we have the following corollary.
Corollary 3.21. A non-empty subset F of X is a subalgebra of X if and only if the characteristic
function χF of F is a (q,∈∧ q )-fuzzy subalgebra of X.
Theorem 3.22. Let ε, δ ∈ [0, 1] such that ε > δ. Assume that if any element t in (0, 1] satisfies xt ∈ µ(ε,δ)F
for x ∈ X then δ ≤ 1−t. If F is a subalgebra of X, then the fuzzy set µ(ε,δ)F is a (q,∈∨ q )-fuzzy subalgebra
of X.
Proof. Let x, y ∈ X and t1, t2 ∈ (0, 1] be such that xt1 q µ(ε,δ)F and yt2 q µ
(ε,δ)F . Then µ
(ε,δ)F (x) + t1 > 1
and µ(ε,δ)F (y) + t2 > 1, which imply that µ
(ε,δ)F (x) > 1 − t1 ≥ δ and µ
(ε,δ)F (y) > 1 − t2 ≥ δ. Hence
µ(ε,δ)F (x) = ε = µ
(ε,δ)F (y), and so ε > max1 − t1, 1 − t2 and x, y ∈ F. Since F is a subalgebra of X, we
have x∗y ∈ F and thus µ(ε,δ)F (x∗y) = ε which implies that µ
(ε,δ)F (x∗y)+mint1, t2 = ε+mint1, t2 > 1,
i.e., (x∗y)mint1,t2 q µ(ε,δ)F . It follows that (x∗y)mint1,t2 ∈∨ q µ
(ε,δ)F . Therefore µ
(ε,δ)F is a (q,∈∨ q )-fuzzy
subalgebra of X.
Theorem 3.23. Let ε, δ ∈ [0, 1] such that ε > maxδ, 0.5 and ε + δ ≤ 1. If the fuzzy set µ(ε,δ)F is a
(q,∈∨ q )-fuzzy subalgebra of X, then F is a subalgebra of X.
Proof. Let x, y ∈ F. Then µ(ε,δ)F (x) = ε = µ
(ε,δ)F (y), which implies that
µ(ε,δ)F (x) + ε = ε+ ε > 1 and µ
(ε,δ)F (y) + ε = ε+ ε > 1,
that is, xε q µ(ε,δ)F and yε q µ
(ε,δ)F . Since µ
(ε,δ)F is a (q,∈∨ q )-fuzzy subalgebra of X, it follows that (x∗y)ε =
(x∗y)minε,ε ∈∨ q µ(ε,δ)F , that is, µ
(ε,δ)F (x∗y) ≥ ε or µ
(ε,δ)F (x∗y)+ε > 1. If µ
(ε,δ)F (x∗y) ≥ ε, then x∗y ∈ F.
If µ(ε,δ)F (x∗y) + ε > 1, then µ
(ε,δ)F (x∗y) > 1− ε ≥ δ and so µ
(ε,δ)F (x∗y) = ε. Thus x∗y ∈ F, and therefore
F is a subalgebra of X.
If we take ε = 1 and δ = 0 in Theorems 3.22 and 3.23, then we have the following corollary.
Corollary 3.24. A non-empty subset F of X is a subalgebra of X if and only if the characteristic
function χF of F is a (q,∈∨ q )-fuzzy subalgebra of X.
Conclusions
We have introduced the notion of (ε, δ)-characteristic fuzzy sets in BCK/BCI-algebras. Given a
subalgebra F of a BCK/BCI-algebra X, we have provided conditions for the (ε, δ)-characteristic fuzzy
set in X to be an (∈,∈∨ q)-fuzzy subalgebra, an (∈, q)-fuzzy subalgebra, an (∈,∈∧ q)-fuzzy subalgebra,
a (q, q)-fuzzy subalgebra, a (q,∈)-fuzzy subalgebra, a (q,∈ ∨ q)-fuzzy subalgebra and a (q,∈ ∧ q)-fuzzy
subalgebra. Using the notions of (α, β)-fuzzy subalgebra µ(ε,δ)F , we have investigated conditions for the
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1063 G. Muhiuddin et al 1057-1064
8 G. Muhiuddin and Abdullah M. Al-roqi
F to be a subalgebra of X where (α, β) is one of (∈,∈∨ q), (∈,∈∧ q), (∈, q), (q,∈∨ q), (q,∈∧ q), (q,∈)
and (q, q).
In the consecutive research, we will discuss the following items:
(1) Given a subalgebra F of a BCK/BCI-algebra X, we will provide conditions for the (ε, δ)-
characteristic fuzzy set in X to be an (∈∨ q,∈∨ q)-fuzzy subalgebra, an (∈∨ q,∈)-fuzzy subal-
gebra, an (∈∨ q,∈∧ q)-fuzzy subalgebra, and an (∈∨ q, q)-fuzzy subalgebra.
(2) Using the notions of (α, β)-fuzzy subalgebra µ(ε,δ)F where (α, β) is one of (∈∨ q,∈∨ q), (∈∨ q,∈),
(∈∨ q,∈∧ q) and (∈∨ q, q), we investigate conditions for the F to be a subalgebra of X.
4. Acknowledgements
This research was partially supported by the Deanship of Scientific Research (DSR), King Abdulaziz
University, Jeddah 21589, Ministry of Higher Education, Saudi Arabia.The authors would like to express
their sincere thanks to the anonymous referees.
References
[1] S. K. Bhakat and P. Das, (∈,∈∨ q)-fuzzy subgroup, Fuzzy Sets and Systems 80 (1996), 359–368.
[2] Y. S. Huang, BCI-algebra, Science Press, Beijing, 2006.
[3] Y. B. Jun, On (α, β)-fuzzy ideals of BCK/BCI-algebras, Sci. Math. Jpn. 60(3) (2004), 613–617.
[4] Y. B. Jun, On (α, β)-fuzzy subalgebras of BCK/BCI-algebras, Bull. Korean Math. Soc. 42(4)
(2005), 703–711.
[5] Y. B. Jun, Fuzzy subalgebras of type (α, β) in BCK/BCI-algebras, Kyungpook Math. J. 47 (2007),
403–410.
[6] J. Meng and Y. B. Jun, BCK-algebra, Kyungmoon Sa Co. Seoul, 1994.
[7] P. M. Pu and Y. M. Liu, Fuzzy topology I, Neighborhood structure of a fuzzy point and Moore-Smith
convergence, J. Math. Anal. Appl. 76 (1980), 571–599.
[8] J. Zhan, Y. B. Jun and B. Davvaz, On (∈, ∈∨ q )-fuzzy ideals of BCI-algebras, Iran. J. Fuzzy Syst.
6(1) (2009), 81–94.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1064 G. Muhiuddin et al 1057-1064
Existence results for nonlinear fractional
integrodifferential equations with antiperiodic type
integral boundary conditions
Xiaohong Zuo and Wengui Yang∗
Ministry of Public Education, Sanmenxia Polytechnic, Sanmenxia, Henan 472000, China
Abstract: This paper investigates the existence of solutions for a class of nonlinear boundary value problems
involving fractional integrodifferential equations of fractional order α ∈ (2, 3] with antiperiodic type integral
boundary conditions. Our results are based on contraction mapping principle and Krasnoselskii fixed point
theorem. As an application, an interesting example is presented to illustrate the main results.
Keywords: Fractional integrodifferential equations; antiperiodic boundary conditions; integral boundary
conditions; fixed point theorem
2010 Mathematics Subject Classification: 34A08, 34B18.
1 Introduction
In the last few decades, the topic of fractional differential equations has gained a considerable attention
and it has emerged as a popular field of research due to its extensive development and applications in
several disciplines such as physics, mechanics, chemistry, engineering, etc. Therefore, there have been many
papers and books dealing with the theoretical development of fractional calculus and the solutions or positive
solutions of boundary value problems for nonlinear fractional differential equations; for examples and details,
one can see [1, 2, 3, 4, 5, 6, 7] and references along these lines. For instance, Ahmad and Sivasundaram
[8] proved the existence and uniqueness of solutions for a four-point nonlocal boundary value problem of
nonlinear integro-differential equations of fractional order q ∈ (1, 2] by applying some standard fixed point
theorems. Ahmad and Ntouyas [9, 10] studied the existence and uniqueness results for a class of nonlocal
boundary value problems of nonlinear differential equations and inclusions of fractional order with strip
conditions by using a variety of fixed point theorems.
Recently, antiperiodic and/or integral boundary value problems of fractional differential equations occur
in the mathematic modeling of a variety of physical processes and have been studied by a number of authors.
For examples and details of antiperiodic and/or integral fractional boundary conditions, see [11, 12, 13,
14, 15, 16] and the references therein. For example, Ahmad and Nieto [17] obtained the existence and
uniqueness results for antiperiodic boundary value problem for nonlinear fractional differential equation of
order q ∈ (1, 2] by applying some standard fixed point principles. By using Schauder’s fixed point theorem
and the contraction mapping principle, Wang and Liu [18] considered the existence and uniqueness results for
antiperiodic fractional boundary value problem with fractional derivative. In [19], the authors investigated
the following boundary value problem for a nonlinear fractional integrodifferential equation with integral
boundary conditions
cDqx(t) = f(t, x(t), (χx)(t)), t ∈ [0, 1], q ∈ (1, 2],
αx(0) + β′(0) =
∫ 1
0
q1(x(s))ds, αx(1) + βx′(1) =
∫ 1
0
q2(x(s))ds,
where f : [0, 1] × X × X → X, (χx)(t) =∫ t
0γ(t, s)x(s)ds for γ : [0, T ] × [0, T ] → [0,+∞), q1, q2 : X → X
∗Corresponding author.
Email:[email protected] (X. Zuo) and [email protected] (W. Yang)
1
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1065 Xiaohong Zuo et al 1065-1076
and α > 0 and β ≥ 0 are real numbers. The authors established sufficient conditions for the existence of
solutions for the above boundary value problems.
In [20], Wang et al. studied the following fractional boundary value problem with antiperiodic boundary
conditions
cDαx(t) = f(t, x(t)), t ∈ [0, T ], α ∈ (2, 3],
x(0) = −x(T ), cDpx(0) = −cDpx(T ), cDqx(0) = −cDqx(T ),
where 0 < p < 1 < q < 2, and f : [0, T ] × R → R is a given continuous function. Some existence and
uniqueness results are obtained contraction mapping principle and Leray-Schauder’s fixed point theorem.
In [21], Chai concerned with the following antiperiodic boundary value problems of fractional differential
equations
cDαx(t) = f(t, x(t),cDα1(t),cDα2(t)), t ∈ (0, 1), α ∈ (2, 3],
x(0) = −x(T ), tβ1−1cDβ1x(t)|t→0 = −tβ1−1cDβ1x(t)|t=1, tβ2−1cDβ2x(t)|t→0 = −tβ2−1cDβ2x(t)|t=1,
where 2 < α ≤ 3, 0 < α1 ≤ 1 < α2 ≤ 2, 0 < β1 < 1 < β2 < 2, and f is a given continuous function.
The author obtained some existence results by applying the Banach contraction mapping principle and the
Leray-Schauder degree theory.
In [22], Alsaedi discussed existence of solutions for the following integrodifferential equations of fractional
order with antiperiodic boundary conditions
cDqx(t) = f(t, x(t), (χx)(t)), t ∈ [0, T ], q ∈ (1, 2],
x(0) = −x(T ), x′(0) = −x′(T ),
where f : [0, 1]×X ×X → X, (χx)(t) =∫ t
0γ(t, s)x(s)ds for γ : [0, 1]× [0, 1]→ [0,+∞).
In [23], Ahmad et al. considered the existence and uniqueness of the solutions for a new class of bound-
ary value problems of nonlinear fractional differential equations with non-separated type integral boundary
conditions
cDqx(t) = f(t, x(t)), t ∈ [0, T ], q ∈ (1, 2],
x(0)− λ1x(T ) = µ1
∫ T
0
g(s, x(s))ds, x′(0)− λ2x′(T ) = µ2
∫ T
0
h(s, x(s))ds,
where f, g, g : [0, T ]× R→ R are given continuous functions and λj , µj ∈ R (λj 6= 0), j = 1, 2.
Ahmad and Ntouyas [24] and Ahmad et al. [25] study a boundary value problem of fractional differential
eqations and inclusions with anti-periodic type integral boundary conditions given by
cDαx(t) = f(t, x(t)) (∈ F (t, x(t))), t ∈ [0, T ], α ∈ (2, 3],
x(j)(0)− λjx(j)(T ) = µj
∫ T
0
gj(s, x(s))ds, j = 0, 1, 2,
where x(j)(·) denotes jth derivative of x(·) with x(0) = x(·), gj : [0, T ]×R→ R are given continuous functions
and λj , µj ∈ R (λj 6= 0), respectively.
In this paper, motivated greatly by the above mentioned works, we consider the following boundary value
problem for a nonlinear fractional integrodifferential equation of fractional order α ∈ (2, 3] with antiperiodic
type integral boundrary conditions
cDαu(t) = f(t, u(t), (φu)(t), (ψu)(t)), t ∈J = [0, T ] (T > 0),
u(0) = µ0u(T ) + ν0
∫ T
0
g0(s, u(s))ds, wi(0) = µiwi(T ) + νi
∫ T
0
gi(s, u(s))ds, i = 1, 2,(1.1)
where cDα is the standard Caputo fractional derivative of fractional order α, 0 < α1 < 1 < α2 < 2,
wi(t) = tαi−icDαiu(t), wi(0) = limt→0+ wi(t), wi(T ) = [wi(t)]t=T , µ0, ν0, µi, νi ∈ R (µ0, µi 6= 1), i = 1, 2, the
2
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1066 Xiaohong Zuo et al 1065-1076
nonlinear function f : J × R × R × R → R is continuous, gi : J × R → R are given continuous functions
for i = 0, 1, 2, and for γ, δ : [0, T ]× [0, T ]→ [0,∞),
(φu)(t) =
∫ t
0
γ(t, s, u(s))ds, (ψu)(t) =
∫ T
0
δ(t, s, u(s))ds.
Let C = C(J ,R) be Banach space of all continuous functions from J → R endowed with a topology of
uniform convergence with the norm denoted by ‖ϕ‖ = sup|ϕ(t)| : s ∈J .
2 Preliminaries
For the convenience of the reader, we give some background materials from fractional calculus theory to
facilitate analysis of the problem (1.1). These materials can be found in the recent literature, see [27, 29, 30].
Definition 2.1. For at least n-times continuously differentiable function f : [0,∞)→ R, the Caputo deriva-
tive of fractional order α is defined as
cDαf(t) =1
Γ(n− α)
∫ t
0
(t− s)n−α−1f (n)(s)ds, n = [α] + 1,
where [α] denotes the integer part of the real number α.
Definition 2.2. The Riemann-Liouville fractional integral of order α for a function f is defined as
Iαf(t) =1
Γ(α)
∫ t
0
(t− s)α−1f(s)ds, α > 0,
provided that such integral exists.
Definition 2.3. The Riemann-Liouville fractional derivative of order α for a function f is defined by
Dαf(t) =1
Γ(n− α)
(d
dt
)n ∫ t
0
(t− s)n−α−1f(s)ds, n = [α] + 1,
provided that the right-hand side of the previous equation is pointwise defined on (0,∞).
Lemma 2.4 ([26, 28]). Let α > 0, then the fractional differential equation
cDαu(t) = 0
has a unique solution given by the expression
u(t) =
[α]∑j=0
u(j)(0)
j!tj .
Lemma 2.5 ([26, 29]). Let α > 0, then
IαcDαu(t) = u(t)−[α]∑j=0
u(j)(0)
j!tj .
In view of Lemma 2.5, it follows that
IαcDαu(t) = u(t) + c0 + c1t+ c2t2 + · · ·+ cn−1t
n−1, (2.1)
for some ci ∈ R, i = 0, 1, 2, . . . , n− 1 (n = [α] + 1).
3
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1067 Xiaohong Zuo et al 1065-1076
Lemma 2.6. For any y ∈ C[0, T ], the unique solution of the linear fractional boundary value problem
cDαu(t) = y(t), t ∈ [0, T ], α ∈ (2, 3],
u(0) = µ0u(T ) + ν0
∫ T
0
g0(s, u(s))ds, wi(0) = µiwi(T ) + νi
∫ T
0
gi(s, u(s))ds,(2.2)
is given by
u(t) =
∫ T
0
G(t, s)y(s)ds+ ν0ξ0
∫ T
0
g0(s, u(s))ds+ ν1η1(t)
∫ T
0
g1(s, u(s))ds+ ν2η2(t)
∫ T
0
g2(s, u(s))ds,
where G(t, s) is Green’s function given by
G(t, s) =
(t− s)α−1 + µ0ξ0(T − s)α−1
Γ(α)
+µ1η1(t)Tα1−1(T − s)α−α1−1
Γ(α− α1)+µ2η2(t)Tα2−2(T − s)α−α2−1
Γ(α− α2), s ≤ t,
µ0ξ0(T − s)α−1
Γ(α)+µ1η1(t)Tα1−1(T − s)α−α1−1
Γ(α− α1)+µ2η2(t)Tα2−2(T − s)α−α2−1
Γ(α− α2), t ≤ s,
(2.3)
η1(t) = ξ1[µ0T + (1− µ0)t],
η2(t) = ξ2[µ0[2µ1 + (1− µ1)(2− α1)]T 2 + 2µ1T (1− µ0)t+ (1− µ0)(1− µ1)(2− α1)t2],
ξ0 =1
1− µ0, ξ1 =
Γ(2− α1)
(1− µ0)(1− µ1), ξ2 =
Γ(3− α2)
2(1− µ0)(1− µ1)(1− µ2)(2− α1).
Proof. Using (2.1), for some constants b0, b1, b2 ∈ R, we have
u(t) = Iαy(t) + b0 + b1t+ b2t2. (2.4)
Using the facts that cDα1b = 0 (b is constant and 0 < α1 < 1), cDα1t = t1−α1
Γ(2−α1) , cDα1t2 = 2t2−α1
Γ(3−α1) , andcDα1Iαy(t) = Iα−α1y(t), we obtain
cDα1u(t) = Iα−α1y(t) +b1
Γ(2− α1)t1−α1 +
2b2Γ(3− α1)
t2−α1 . (2.5)
In view of cDα2t = 0 (1 < α2 < 2), cDα2t2 = 2t2−α2
Γ(3−α2) , and cDα2Iαy(t) = Iα−α2y(t), we get
cDα2u(t) = Iα−α2y(t) +2b2
Γ(3− α2)t2−α2 . (2.6)
From (2.5) and (2.6), we have
tα1−1cDα1u(t) = tα1−1Iα−α1y(t) +b1
Γ(2− α1)+
2b2Γ(3− α1)
t, (2.7)
tα2−2cDα2u(t) = tα2−2Iα−α2y(t) +2b2
Γ(3− α2). (2.8)
From [?], we can know that
limt→0+
tα1−1Iα−α1y(t) = 0, limt→0+
tα2−2Iα−α2y(t) = 0. (2.9)
4
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1068 Xiaohong Zuo et al 1065-1076
Applying the boundary conditions for problem (2.2) and (2.9) in (2.4), (2.7) and (2.8), we find that
b0 =µ0
1− µ0Iαy(T ) +
µ0µ1Γ(2− α1)Tα1
(1− µ0)(1− µ1)Iα−α1y(T )
+µ0µ2Γ(3− α2)[2µ1 + (1− µ1)(2− α1)]Tα2
2(1− µ0)(1− µ1)(1− µ2)(2− α1)Iα−α2y(T ) +
ν0
1− µ0
∫ T
0
g0(s, u(s))ds
+µ0ν1Γ(2− α1)T
(1− µ0)(1− µ1)
∫ T
0
g1(s, u(s))ds+µ0ν2Γ(3− α2)[2µ1 + (1− µ1)(2− α1)]T 2
2(1− µ0)(1− µ1)(1− µ2)(2− α1)
∫ T
0
g2(s, u(s))ds,
b1 =µ1Γ(2− α1)Tα1−1
1− µ1Iα−α1y(T ) +
µ1µ2Γ(3− α2)Tα2−1
(1− µ1)(1− µ2)(2− α1)Iα−α2y(T )
+ν1Γ(2− α1)
1− µ1
∫ T
0
g1(s, u(s))ds+µ1ν2Γ(3− α2)T
(1− µ1)(1− µ2)(2− α1)
∫ T
0
g2(s, u(s))ds,
b2 =µ2Γ(3− α2)Tα2−2
2(1− µ2)Iα−α2y(T ) +
ν2Γ(3− α2)
2(1− µ2)
∫ T
0
g2(s, u(s))ds.
Thus, the unique solution of (2.2) is
u(t) = Iαy(t) + µ0ξ0Iαy(T ) + µ1η1(t)Tα1−1Iα−α1y(T ) + µ2η2(t)Tα2−2Iα−α2y(T )
+ν0ξ0
∫ T
0
g0(s, u(s))ds+ ν1η1(t)
∫ T
0
g1(s, u(s))ds+ ν2η2(t)
∫ T
0
g2(s, u(s))ds
=
∫ T
0
G(t, s)y(s)ds+ ν0ξ0
∫ T
0
g0(s, u(s))ds+ ν1η1(t)
∫ T
0
g1(s, u(s))ds+ ν2η2(t)
∫ T
0
g2(s, u(s))ds,
where G(t, s) is given by (2.3). The proof is completed.
3 Main results
For the sake of simplicity, we always consider the boundary value problem (1.1) together with the following
assumptions.
(H1) There exist positive constants Li and Mi (i = 0, 1, 2) such that
‖gi(t, u)− gi(t, v)‖ ≤ Li‖x− y‖, ‖gi(t, u)‖ ≤Mi, ∀t ∈J , u, v ∈ R.
(H2) There exist continuous function Li : [0, T ]→ R+ = [0,∞) (i = 1, 2, 3) such that
‖f(t, u, φu, ψu)−f(t, v, φv, ψv)‖ ≤ L1(t)‖u−v‖+L2(t)‖φu−φv‖+L3(t)‖ψu−ψv‖, ∀t ∈J , u, v ∈ R.
(H3) There exist continuous functions p, q : [0, T ]→ R+ such that∥∥∥∥∫ t
0
(γ(t, s, u(s))− γ(t, s, v(s)))ds
∥∥∥∥ ≤ p(t)‖u− v‖, ∀t ∈J , u, v ∈ R,∥∥∥∥∥∫ T
0
(δ(t, s, u(s))− δ(t, s, v(s)))ds
∥∥∥∥∥ ≤ q(t)‖u− v‖, ∀t ∈J , u, v ∈ R.
(H4) ρ = (L0|ν0ξ0|+ L1λ1|ν1|+ L2λ2|ν2|)T + L3λ3 < 1, where
λ1 = sup|η1(t)| : t ∈J , λ2 = sup|η2(t)| : t ∈J ,
L3 = supM(t) = L1(t) + L2(t)p(t) + L3(t)q(t) : t ∈J .
λ3 =(1 + |µ0ξ0|)Tα
Γ(α+ 1)+
λ1|µ1|Tα−1
Γ(α− α1 + 1)+
λ2|µ2|Tα−2
Γ(α− α2 + 1),
5
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1069 Xiaohong Zuo et al 1065-1076
(H5) ‖f(t, u(t), (φu)(t), (ψu)(t))‖ ≤ ω(t), for all (t, u, φu, ψu) ∈ [0, T ]× R× R× R, where ω ∈ L1([, T ],R+).
Theorem 3.1. Assume that (H1)-(H4) hold. Then the boundary value problem (1.1) has a unique solution
on J .
Proof. Define F : C → C by
(Fu)(t) =
∫ t
0
(t− s)α−1
Γ(α)f(s, u(s), (φu)(s), (ψu)(s))ds
+µ0ξ0
∫ T
0
(T − s)α−1
Γ(α)f(s, u(s), (φu)(s), (ψu)(s))ds
+µ1η1(t)Tα1−1
∫ T
0
(T − s)α−α1−1
Γ(α− α1)f(s, u(s), (φu)(s), (ψu)(s))ds
+µ2η2(t)Tα2−2
∫ T
0
(T − s)α−α2−1
Γ(α− α2)f(s, u(s), (φu)(s), (ψu)(s))ds
+ν0ξ0
∫ T
0
g0(s, u(s))ds+ ν1η1(t)
∫ T
0
g1(s, u(s))ds+ ν2η2(t)
∫ T
0
g2(s, u(s))ds, t ∈J .
Let us set
supL2(t) : t ∈J = L2, supL3(t) : t ∈J = L3, sup
∥∥∥∥∫ t
0
γ(t, τ, 0)dτ
∥∥∥∥ : t ∈J
= M3,
sup
∥∥∥∥∫ t
0
δ(t, τ, 0)dτ
∥∥∥∥ : t ∈J
= M4, sup‖f(t, 0, 0, 0)‖ : t ∈J = M5.
According to the assumptions (H2) and (H3), we have
‖(φu)(s)‖ ≤∥∥∥∥∫ s
0
(γ(s, τ, u(τ))− γ(s, τ, 0))dτ
∥∥∥∥+
∥∥∥∥∫ s
0
γ(s, τ, 0)dτ
∥∥∥∥≤ p(s)‖u‖+
∥∥∥∥∫ s
0
γ(s, τ, 0)dτ
∥∥∥∥ ≤ p(s)‖u‖+M3,
‖(ψu)(s)‖ ≤
∥∥∥∥∥∫ T
0
(δ(s, τ, u(τ))− δ(s, τ, 0))dτ
∥∥∥∥∥+
∥∥∥∥∥∫ T
0
δ(s, τ, 0)dτ
∥∥∥∥∥≤ q(s)‖u‖+
∥∥∥∥∥∫ T
0
δ(s, τ, 0)dτ
∥∥∥∥∥ ≤ q(s)‖u‖+M4.
From the two above inequalities, we get
‖f(s, u(s), (φu)(s), (ψu)(s))‖ ≤ ‖f(s, u(s), (φu)(s), (ψu)(s))− f(s, 0, 0, 0)‖+ ‖f(s, 0, 0, 0)‖≤ L1(s)‖u(s)‖+ L2(s)‖(φu)(s)‖+ L3(s)‖(ψu)(s))‖+ ‖f(s, 0, 0, 0)‖≤ (L1(s) + L2(s)p(s) + L3(s)q(s))‖u‖+ (L2(s)M3 + L3(s)M4) +M5
≤ M(s)‖u‖+ (L2M3 + L3M4) +M5 = M(s)‖u‖+M∗,
where M∗ = (L2M3 + L3M4) +M5. And consider Br = u ∈ C : ‖u‖ ≤ r, where r ≥ ρ1/(1− ρ), with
ρ1 = (M0|ν0ξ0|+M1λ1|ν1|+M2λ2|ν2|)T + λ3M∗,
6
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1070 Xiaohong Zuo et al 1065-1076
and ρ is given by the assumption (H4). Now we show that FBr ⊂ Br. For u ∈ Br, we have
‖(Fu)(t)‖ ≤∫ t
0
(t− s)α−1
Γ(α)‖f(s, u(s), (φu)(s), (ψu)(s))‖ds
+|µ0ξ0|∫ T
0
(T − s)α−1
Γ(α)‖f(s, u(s), (φu)(s), (ψu)(s))‖ds
+|µ1η1(t)|Tα1−1
∫ T
0
(T − s)α−α1−1
Γ(α− α1)‖f(s, u(s), (φu)(s), (ψu)(s))‖ds
+|µ2η2(t)|Tα2−2
∫ T
0
(T − s)α−α2−1
Γ(α− α2)‖f(s, u(s), (φu)(s), (ψu)(s))‖ds
+|ν0ξ0|∫ T
0
‖g0(s, u(s))‖ds+ |ν1η1(t)|∫ T
0
‖g1(s, u(s))‖ds+ |ν2η2(t)|∫ T
0
‖g2(s, u(s))‖ds
≤∫ t
0
(t− s)α−1
Γ(α)(M(s)‖u‖+M∗)ds+ |µ0ξ0|
∫ T
0
(T − s)α−1
Γ(α)(M(s)‖u‖+M∗)ds
+|µ1η1(t)|Tα1−1
∫ T
0
(T − s)α−α1−1
Γ(α− α1)(M(s)‖u‖+M∗)ds
+|µ2η2(t)|Tα2−2
∫ T
0
(T − s)α−α2−1
Γ(α− α2)(M(s)‖u‖+M∗)ds
+|ν0ξ0|∫ T
0
[‖g0(s, u(s))− g0(s, 0)‖+ ‖g0(s, 0)‖]ds
+|ν1η1(t)|∫ T
0
[‖g1(s, u(s))− g1(s, 0)‖+ ‖g1(s, 0)‖]ds
+|ν2η2(t)|∫ T
0
[‖g2(s, u(s))− g2(s, 0)‖+ ‖g2(s, 0)‖]ds
≤ (L3r +M∗)
(∫ t
0
(t− s)α−1
Γ(α)ds+ |µ0ξ0|
∫ T
0
(T − s)α−1
Γ(α)ds
+|µ1η1(t)|Tα1−1
∫ T
0
(T − s)α−α1−1
Γ(α− α1)ds+ |µ2η2(t)|Tα2−2
∫ T
0
(T − s)α−α2−1
Γ(α− α2)ds
)+|ν0ξ0|(L0r +M0)T + |ν1η1(t)|(L1r +M1)T + |ν2η2(t)|(L2r +M2)T
≤ (L3r +M∗)
((1 + |µ0ξ0|)Tα
Γ(α+ 1)+
λ1|µ1|Tα−1
Γ(α− α1 + 1)+
λ2|µ2|Tα−2
Γ(α− α2 + 1)
)+|ν0ξ0|(L0r +M0)T + λ1|ν1|(L1r +M1)T + λ2|ν2|(L2r +M2)T
= [(L0|ν0ξ0|+ L1λ1|ν1|+ L2λ2|ν2|)T + L3λ3]r
+(M0|ν0ξ0|+M1λ1|ν1|+M2λ2|ν2|)T + λ3M∗ ≤ ρr + ρ1 ≤ r.
7
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1071 Xiaohong Zuo et al 1065-1076
Now, for u, v and for each t ∈ [0, T ], we obtain
‖(Fu)(t)− (Fv)(t)‖
≤∫ t
0
(t− s)α−1
Γ(α)‖f(s, u(s), (φu)(s), (ψu)(s))− f(s, v(s), (φv)(s), (ψv)(s))‖ds
+|µ0ξ0|∫ T
0
(T − s)α−1
Γ(α)‖f(s, u(s), (φu)(s), (ψu)(s))− f(s, v(s), (φv)(s), (ψv)(s))‖ds
+|µ1η1(t)|Tα1−1
∫ T
0
(T − s)α−α1−1
Γ(α− α1)‖f(s, u(s), (φu)(s), (ψu)(s))− f(s, v(s), (φv)(s), (ψv)(s))‖ds
+|µ2η2(t)|Tα2−2
∫ T
0
(T − s)α−α2−1
Γ(α− α2)‖f(s, u(s), (φu)(s), (ψu)(s))− f(s, v(s), (φv)(s), (ψv)(s))‖ds
+|ν0ξ0|∫ T
0
‖g0(s, u(s))− g0(s, v(s))‖ds+ |ν1η1(t)|∫ T
0
‖g1(s, u(s))− g1(s, v(s))‖ds
+|ν2η2(t)|∫ T
0
‖g2(s, u(s))− g2(s, v(s))‖ds
≤∫ t
0
(t− s)α−1
Γ(α)M(s)‖u− v‖ds+ |µ0ξ0|
∫ T
0
(T − s)α−1
Γ(α)M(s)‖u− v‖ds
+|µ1η1(t)|Tα1−1
∫ T
0
(T − s)α−α1−1
Γ(α− α1)M(s)‖u− v‖ds
+|µ2η2(t)|Tα2−2
∫ T
0
(T − s)α−α2−1
Γ(α− α2)M(s)‖u− v‖ds
+|ν0ξ0|∫ T
0
L0‖u− v‖ds+ |ν1η1(t)|∫ T
0
L1‖u− v‖ds+ |ν2η2(t)
∫ T
0
L2|‖u− v‖ds
≤ L3
((1 + |µ0ξ0|)Tα
Γ(α+ 1)+
λ1|µ1|Tα−1
Γ(α− α1 + 1)+
λ2|µ2|Tα−2
Γ(α− α2 + 1)
)‖u− v‖
+(M0|ν0ξ0|+M1λ1|ν1|+M2λ2|ν2|)T‖u− v‖= [(M0|ν0ξ0|+M1λ1|ν1|+M2λ2|ν2|)T + L3λ3]‖u− v‖ = ρ‖u− v‖.
Observe that ρ depends only on the parameters involved in the problem. As ρ < 1 (H4), therefore F is
a contraction. Thus, by the contraction mapping principle (Banach fixed point theorem), it follows that
problem (1.1) has a unique solution on [0, T ].
Our next existence results is based on Krasnoselskii fixed point theorem [31].
Theorem 3.2. (Krasnoselskii). Let M be a closed, bounded, convex, and nonempty subset of a Banach
space X. Let A, B be two operators such that (i) Ax + By ∈ M whenever x, y ∈ M ; (ii) A is compact and
continuous; (iii) B is a contraction mapping. Then there exisz ∈M such that z = Az +Bz.
Theorem 3.3. Assume that (H1)-(H3) and (H5) hold. Then the boundary value problem (1.1) has at least
one solution on J provided
L3
(|µ0ξ0|Tα
Γ(α+ 1)+
λ1|µ1|Tα−1
Γ(α− α1 + 1)+
λ2|µ2|Tα−2
Γ(α− α2 + 1)
)+ (L0|ν0ξ0|+ L1λ1|ν1|+ L2λ2|ν2|)T < 1.
Proof. Let us fix
r ≥ (M0|ν0ξ0|+M1λ1|ν1|+M2λ2|ν2|)T + λ3‖ω‖L1 .
8
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1072 Xiaohong Zuo et al 1065-1076
and consider Br = u ∈ S : ‖u‖ ≤ r. We define the operators Φ and Ψ on Br as
(Φu)(t) =
∫ t
0
(t− s)α−1
Γ(α)f(s, u(s), (φu)(s), (ψu)(s))ds,
(Ψu)(t) = µ0ξ0
∫ T
0
(T − s)α−1
Γ(α)f(s, u(s), (φu)(s), (ψu)(s))ds
+µ1η1(t)Tα1−1
∫ T
0
(T − s)α−α1−1
Γ(α− α1)f(s, u(s), (φu)(s), (ψu)(s))ds
+µ2η2(t)Tα2−2
∫ T
0
(T − s)α−α2−1
Γ(α− α2)f(s, u(s), (φu)(s), (ψu)(s))ds
+ν0ξ0
∫ T
0
g0(s, u(s))ds+ ν1η1(t)
∫ T
0
g1(s, u(s))ds+ ν2η2(t)
∫ T
0
g2(s, u(s))ds.
Let us observe that if u, v ∈ Br, we find that
‖(Φu)(t) + (Ψv)(t)‖ =
∥∥∥∥∫ t
0
(t− s)α−1
Γ(α)f(s, u(s), (φu)(s), (ψu)(s))ds
+µ0ξ0
∫ T
0
(T − s)α−1
Γ(α)f(s, v(s), (φv)(s), (ψv)(s))ds
+µ1η1(t)Tα1−1
∫ T
0
(T − s)α−α1−1
Γ(α− α1)f(s, v(s), (φv)(s), (ψv)(s))ds
+µ2η2(t)Tα2−2
∫ T
0
(T − s)α−α2−1
Γ(α− α2)f(s, v(s), (φv)(s), (ψv)(s))ds
+ν0ξ0
∫ T
0
g0(s, v(s))ds+ ν1η1(t)
∫ T
0
g1(s, v(s))ds+ ν2η2(t)
∫ T
0
g2(s, v(s))ds
∥∥∥∥∥≤ ‖ω‖L1
((1 + |µ0ξ0|)Tα
Γ(α+ 1)+
λ1|µ1|Tα−1
Γ(α− α1 + 1)+
λ2|µ2|Tα−2
Γ(α− α2 + 1)
)+(M0|ν0ξ0|+M1λ1|ν1|+M2λ2|ν2|)T
= (M0|ν0ξ0|+M1λ1|ν1|+M2λ2|ν2|)T + λ3‖ω‖L1 ≤ r.
Thus, Φu+ Ψv ∈ Br. It follows from the assumption (H1)-(H3) that Ψ is a contraction mapping for
L3
(|µ0ξ0|Tα
Γ(α+ 1)+
λ1|µ1|Tα−1
Γ(α− α1 + 1)+
λ2|µ2|Tα−2
Γ(α− α2 + 1)
)+ (L0|ν0ξ0|+ L1λ1|ν1|+ L2λ2|ν2|)T < 1.
Continuity of f implies that the operator Φ is continuous. Also, Φ is uniformly bounded on Br as ‖Φu‖ ≤‖ω‖L1/Γ(α+ 1). Now we prove the compactness of the operator Φ. In view of (H2), we define
sup(t,u,φu,ψu)∈Ω
‖f(t, u, φu, ψu)‖ = fmax, Ω = J ×Br ×Br ×Br,
and consequently, for t1, t2 ∈J with t1 < t2, we have
‖(Φu)(t2)− (Φu)(t1)‖ ≤∥∥∥∥∫ t1
0
(t2 − s)α−1 − (t1 − s)α−1
Γ(α)f(s, u(s), (φu)(s), (ψu)(s))ds
∥∥∥∥+
∥∥∥∥∫ t2
t1
(t2 − s)α−1
Γ(α)f(s, u(s), (φu)(s), (ψu)(s))ds
∥∥∥∥≤ fmax
Γ(α+ 1)|2(t2 − t1)α + tα1 − tα2 |,
which is independent of x. So Φ is relatively compact on Br. Hence, By Arzela Ascoli Theorem, Φ is compact
on Br. Thus all the assumptions of Theorem 3.2 are satisfied and the conclusion of Theorem 3.2 implies that
the boundary value problem (1.1) has at least one solution on J .
9
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1073 Xiaohong Zuo et al 1065-1076
4 An example
Consider the following nonlinear fractional integrodifferential equations boundary value problem
cD5/2u(t) =1
10+
1
(5 + t)2
|u(t)|1 + |u(t)|
+
∫ t
0
|u(s)|25et + s
ds+
∫ 1
0
|u(s)|e−t
25 + |u(s)|2 + sds, t ∈J = [0, 1],
u(0) =1
2u(1) +
∫ 1
0
|u(s)|10 + |u(s)|+ s
ds, limt→0+
[t−1/2cD1/2u(t)] =1
3D1/2u(1) +
∫ 1
0
1
4 + |u(s)|+ sds,
limt→0+
[t−1/2cD3/2u(t)] =1
4D3/2u(1) +
∫ 1
0
|u(s)|17 + |u(s)|+ s
ds.
(4.1)
Here T = 1, α = 5/2, α1 = 1/2, α2 = 3/2, µ0 = 1/2, µ1 = 1/3, µ2 = 1/4, ν0 = ν1 = ν2 = 1, and
f(t, x, y, z) =1
10+
1
(5 + t)2
x
10 + x+ y + z, γ(t, s, u) =
|u|25et + s
, δ(t, s, u) =|u|e−t
25 + |u|2 + s,
g0(s, u) =|u|
10 + |u|+ s, g1(s, u) =
1
4 + |u|+ s, g2(s, u) =
|u|17 + |u|+ s
.
As
‖f(t, x1, y1, z1)− f(t, x2, y2, z2)‖ ≤ 1
(5 + t)2‖x1 − x2‖+ ‖y1 − y2‖+ ‖z1 − z2‖,
‖g0(s, u)− g0(s, v)‖ ≤ 1
10‖u− v‖, ‖g0(s, u)‖ ≤ 1, ‖g1(s, u)− g1(s, v)‖ ≤ 1
16‖u− v‖, ‖g0(s, u)‖ ≤ 1
4,
‖g2(s, u)− g2(s, v)‖ ≤ 1
17‖u− v‖, ‖g0(s, u)‖ ≤ 1,
∥∥∥∥∫ t
0
(|u(s)|
25et + s− |v(s)|
25et + s
)ds
∥∥∥∥ ≤ 1
25et‖u− v‖,∥∥∥∥∫ 1
0
(|u(s)|e−t
25 + |u(s)|2 + s− |v(s)|e−t
25 + |v(s)|2 + s
)ds
∥∥∥∥ ≤ 1
25et‖u− v‖,
therefore, (H1)-(H3) are satisfied with L0 = 1/10, L1 = 1/16, L2 = 1/17, L1(t) = 1/(5+t)2, L2(t) = L3(t) =
1, p(t) = q(t) = 1/(25et). Further, ξ0 = 2, ξ1 = 3√π/2, ξ2 = 4
√π/3, λ1 = sup|η1(t)| = (3
√π/4)|1 + t| : t ∈
J = 3√π/2, λ2 = sup|η2(t)| = (2
√π/9)|3t2 + 2t + 5| : t ∈ J = 20
√π/9, λ3 = 16/(15
√π) + 29
√π/36,
L3 = supM(t) = L1(t) + L2(t)p(t) + L3(t)q(t) = 1/(5 + t)2 + 2/(25et) : t ∈J = 3/25, and
ρ = (L0|ν0ξ0|+ L1λ1|ν1|+ L2λ2|ν2|)T + L3λ3 =1
5+
16
125√π
+39307
√π
122400≈ 0.841414 < 1.
Thus, by Theorem 3.1, the boundary value problem (4.1) has a unique solution on [0, 1].
References
[1] V. Lakshmikantham, Theory of fractional functional differential equations, Nonlinear Anal., 69, 3337-
3343 (2008).
[2] R.P. Agarwal, D. O’Regan, Svatoslav Stanek, Positive solutions for Dirichlet problems of singular non-
linear fractional differential equations, J. Math. Anal. Appl., 371, 57-68 (2010).
[3] C. Li, X. Luo, Y. Zhou, Existence of positive solutions of the boundary value problem for nonlinear
fractional differential equations, Comput. Math. Appl., 59, 1363-1375 (2010).
[4] R.P. Agarwal, V. Lakshmikantham, J.J. Nieto, On the concept of solution for fractional differential
equations with uncertainty, Nonlinear Anal., 72, 2859-2862 (2010).
[5] B. Ahmad, J.J. Nieto, J. Pimentel, Some boundary value problems of fractional differential equations
and inclusions, Comput. Math. Appl., 62, 1238-1250 (2011).
10
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1074 Xiaohong Zuo et al 1065-1076
[6] B. Ahmad, S.K. Ntouyas, A. Alsaedi, New existence results for nonlinear fractional differential equations
with three-point integral boundary conditions, Adv. Differ. Equ., 2011, Art. ID 107384, 11 pages (2011).
[7] B. Ahmad A. Alsaedi, Nonlinear fractional differential equations with nonlocal fractional integro-
differential boundary conditions, Bound. Value Probl., 2012, 124, 10 pages (2012).
[8] B. Ahmad S. Sivasundaram On four-point nonlocal boundary value problems of nonlinear integro-
differential equations of fractional order, Appl. Math. Comput., 217, 480-487 (2010).
[9] B. Ahmad, S.K. Ntouyas, Existence results for nonlocal boundary value problems of fractional differential
equations and inclusions with strip conditions, Bound. Value Probl., 2012, 55, 21 pages (2012).
[10] B. Ahmad, S.K. Ntouyas, Nonlinear fractional differential equations and inclusions of arbitrary order
and multi-strip boundary conditions, Electron. J. Differ. Equ., 2012, No. 98, pp. 1-22, (2012).
[11] R.P. Agarwal, B. Ahmad, Existence theory for anti-periodic boundary value problems of fractional
differential equations and inclusions, Comput. Math. Appl., 62, 1200-1214 (2011).
[12] A. Alsaedi,B. Ahmad, A. Assolami, On antiperiodic boundary value problems for higher-order fractional
differential equations, Abstr. Appl. Anal., 2012, Art. ID 325984 (2012).
[13] H.A.H. Salem, Fractional order boundary value problem with integral boundary conditions involving
Pettis integral, Acta Math. Sci., 31B(2), 661-672 (2011).
[14] X. Liu, M. Jia, B. Wu, Existence and uniqueness of solution for fractional differential equations with
integral boundary conditions, Electron. J. Qual. Theory Differ. Equ., 2009, no. 69, pp. 1-10 (2009).
[15] S. Hamani, M. Benchohra, J.R. Graef, Existence results for boundary value problems with nonlinear
fractional inclusions and integral conditions, Electron. J. Differ. Equ., 2010, no. 20, pp. 1-16 (2010).
[16] A. Guezane-Lakoud, R. Khaldi, Solvability of a fractional boundary value problem with fractional inte-
gral condition,Nonlinear Anal. 75, 2692-2700 (2012).
[17] B. Ahmad, J.J. Nieto, Anti-periodic fractional boundary value problems. Comput. Math. Appl., 62,
1150-1156 (2011).
[18] F. Wang, Z. Liu, Anti-periodic fractional boundary value problems for nonlinear differential equations
of fractional order, Adv. Differ. Equ., 2012, 116 (2012).
[19] B. Ahmad, J.J. Nieto, Existence results for nonlinear boundary value problems of fractional integrod-
ifferential equations with integral boundary conditions, Bound. Value Probl., 2009, Art. ID 708576, 11
pages (2009).
[20] X. Wang, X. Guo, G. Tang, Anti-periodic fractional boundary value problems for nonlinear differential
equations of fractional order, J Appl. Math. Comput., 41(1-2), 367-375 (2013).
[21] G. Chai, Existence results for anti-periodic boundary value problems of fractional differential equations,
Adv. Differ. Equ, 2013, 53, 15 pages (2013).
[22] A. Alsaedi, Existence of solutions for integrodifferential equations of fractional order with antiperiodic
boundary conditions, Int. J. Differ. Equ., 2009, Art. ID 417606, 9 pages (2009).
[23] B. Ahmad, J.J. Nieto, A. Alsaedi, Existence and uniqueness of solutions for nonlinear fractional differen-
tial equations with non-separated type integral boundary conditions, Acta Math. Sci., 31B(6), 2122-2130
(2011).
11
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1075 Xiaohong Zuo et al 1065-1076
[24] B. Ahmad, S.K. Ntouyas, A boundary value problem of fractional differential equations with anti-periodic
type integral boundary conditions, J. Comput. Anal. Appl., 15(8), 1372-1380 (2013).
[25] B. Ahmad, S.K. Ntouyas, A. Alsaedi, On fractional differential inclusions with anti-periodic type integral
boundary conditions, Bound. Value Probl., 2013, 82 (2013).
[26] A. Cabada, G. Wang, Positive solutions of nonlinear fractional differential equations with integral bound-
ary value conditions, J. Math. Anal. Appl., 389, 403-411 (2012).
[27] G.A. Anastassiou, Fractional Differentiation Inequalities, Springer, Dordrecht (2009).
[28] M. Jia, X. Liu, Three nonnegative solutions for fractional differential equations with integral boundary
conditions, Comput. Math. Appl., 62, 1405-1412 (2011).
[29] A.A. Kilbas, H.M. Srivastava, J.J. Trujillo, Theory and Applications of Fractional Differential Equations,
North-Holland Math. Stud., vol. 204, Elsevier Science B.V., Amsterdam, 2006.
[30] I. Podlubny, Fractional Differential Equations, Math. Sci. Eng., Academic Press, New York, 1999.
[31] D.R. Smart, Fixed Point Theorems, Cambridge University Press, Cambridge, 1980.
12
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1076 Xiaohong Zuo et al 1065-1076
IDENTITIES OF SYMMETRY FOR HIGHER-ORDER
q-BERNOULLI POLYNOMIALS
DAE SAN KIM AND TAEKYUN KIM
Abstract. Recently, the higher-order Carlitz’s q-Bernoulli polynomials are
represented as q-Volkenborn integral on Zp by Kim. A question was asked in
[13] as to finding the extended formulae of symmetries for Bernoulli polyno-mials which are related to Carlitz q-Bernoulli polynomials. In this paper, we
give some new identities of symmetry for the higher-order Carlitz’s q-Bernoulli
polynomials which are derived from multivariate q-Volkenborn integrals on Zp.We note that they are a partial answer to that question.
1. Introduction
Let p be a fixed prime number. Throughout this paper, Zp, Qp and Cp will,respectively, denote the ring of p-adic rational integers, the field of p-adic rationalnumbers and the completion of algebraic closure of Qp. The p-adic absolute valuein Cp is normalized so that |p|p = p−1. Let q be an indeterminate in Cp with
|1− q|p < p−1
p−1 . We say that f is uniformly differentiable function at a pointa ∈ Zp, if the difference quotient,
Ff : Zp × Zp → Zp by Ff (x, y) =f (x)− f (y)
x− y,
have a limit l = f ′ (a) as (x, y)→ (a, a). If f is uniformly differentiable on Zp, wedenote this property by f ∈ UD (Zp).
For f ∈ UD (Zp) , the q-Volkenborn integral is defined by Kim to be
(1) Iq (f) =
∫Zp
f (x) dµq (x) = limN→∞
1
[pN ]q
pN−1∑x=0
f (x) qx,
where [x]q = 1−qx1−q , (see [12, 13, 14]).
From (1), we note that
(2) qIq (f1) = Iq (f) + (q − 1) f (0) +q − 1
log qf ′ (0)
where f1 (x) = f (x+ 1).As is well known, the Bernoulli polynomials are defined by the generating func-
tion to be
(3)t
et − 1ext = eB(x)t =
∞∑n=0
Bn (x)tn
n!.
2000 Mathematics Subject Classification. 11B68; 11S80.Key words and phrases. Identities of symmetry; Higher-order Carlitz’s q-Bernoulli polynomial;
Multivariate q-Volkenborn integral.1
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1077 DAE SAN KIM ET AL 1077-1088
2 DAE SAN KIM AND TAEKYUN KIM
When x = 0, Bn = Bn (0) are called the Bernoulli numbers.By (3), we get
(4) (B + 1)n −Bn =
1 if n = 1
0 if n > 1,and B0 = 1.
In [3], Carlitz defined q-Bernoulli numbers as follows :
(5) β0,q = 1, q (qβq + 1)n − βn,q =
1, if n = 1
0, if n > 1,
with the usual convention about replacing βiq by βi,q.
From (4) and (5), we note that limq→1
βn,q = Bn.
The q-Bernoulli polynomials are given by
βn,q (x) =n∑
l=0
(n
l
)qlxβl,q [x]
n−lq(6)
=(qxβq + [x]q
)n, (n ≥ 0) , (see [2, 3, 4, 14]).
In [12], Kim proved that Carlitz q-Bernoulli polynomials can be written by q-Volkenborn integral on Zp as follows :
βn,q (x) =
∫Zp
[x+ y]nq dµq (y)(7)
=
n∑l=0
(n
l
)[x]
n−lq qlx
∫Zp
[y]lq dµq (x) .
Thus, by (7), we get
(8) βn,q =
∫Zp
[x]nq dµq (x) , (n ≥ 0) .
From (2), we note that
(9) q
∫Zp
[x+ 1]nq dµq (x)−
∫Zp
[x]nq dµq (x) =
q − 1 if n = 0
1 if n = 1
0 if n > 1.
By (7), (8) and (9), we see that
(10) β0,q = 1, q (qβq + 1)n − βn,q =
1 if n = 1
0 if n > 1.
Let
I1 (f) = limq→1
Iq (f) =
∫Zp
f (x) dµ1 (x)(11)
= limN→∞
1
pN
pN−1∑x=0
f (x) , (see [12, 23, 24]) .
Then, by (2), we get
(12) I1 (f1)− I1 (f) = f ′ (0) .
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1078 DAE SAN KIM ET AL 1077-1088
IDENTITIES OF SYMMETRY FOR HIGHER-ORDER q-BERNOULLI POLYNOMIALS 3
Let us take f (x) = etx. Then we have
(13)
∫Zp
extdµ1 (x) =t
et − 1=∞∑
n=0
Bntn
n!,
and
(14)
∫Zp
e(x+y)tdµ1 (y) =
(t
et − 1
)ext =
∞∑n=0
Bn (x)tn
n!.
For r ∈ N, the higher-order Bernoulli polynomials are defined by the generatingfunction to be
(15)
(t
et − 1
)r
ext =
(t
et − 1
)× · · · ×
(t
et − 1
)︸ ︷︷ ︸
r−times
ext =∞∑
n=0
B(r)n (x)
tn
n!.
By (14), we get∫Zp
· · ·∫Zp
e(x+y1+···+yr)dµ1 (y1) · · · dµ1 (yr) =
(t
et − 1
)r
ext(16)
=∞∑
n=0
B(r)n (x)
tn
n!.
In [3, 4], Carlitz introduced the q-extension of higher-order Bernoulli polynomialsas follows :
(17) β(r)n,q (x) =
1
(1− q)nn∑
l=0
(n
l
)(−1)
lqlx
(l + 1
[l + 1]q
)r
,
where n ≥ 0 and r ∈ N.
Note that limq→1
β(r)n,q (x) = B
(r)n (x).
From (16), we note that
(18)
∫Zp
· · ·∫Zp
(x+ y1 + · · ·+ yr)ndµ1 (y1) · · · dµ1 (yr) = B(r)
n (x) ,
where n ≥ 0 and r ∈ N.In this paper, we consider q-extensions of (17) which are related to higher-order
Carlitz’s q-Bernoulli polynomials. The purpose of this paper is to give some newand interesting identities of symmetry for the higher-order Carlitz’s q-Bernoullipolynomials which are derived from multivariate q-Volkenborn integral on Zp.
2. Identities of symmetry for higher-order q-Bernoulli polynomials
In the sense of q-extension of (18), we observe the following equation (19)∫Zp
· · ·∫Zp
[x+ y1 + · · ·+ yr]nq dµq (y1) · · · dµq (yn)(19)
=1
(1− q)nn∑
l=0
(n
l
)(−1)
lqlx
(l + 1
[l + 1]q
)r
.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1079 DAE SAN KIM ET AL 1077-1088
4 DAE SAN KIM AND TAEKYUN KIM
Thus, by (17) and (19), we get
(20) β(r)n,q (x) =
∫Zp
· · ·∫Zp
[x+ y1 + · · ·+ yr]nq dµq (y1) · · · dµq (yr) ,
where n ≥ 0 and r ∈ N.
Let us consider the generating function of β(r)n,q (x) as follows :
(21)∞∑
n=0
β(r)n,q (x)
tn
n!=
∫Zp
· · ·∫Zp
e[x+y1+···+yr]qtdµq (y1) · · · dµq (yr) .
For w1, w2 ∈ N, we have
1
[w1]rq
∫Zp
· · ·∫Zp
e[w1w2x+w2
∑rl=1 jl+w1
∑rl=1 yl]
qtdµqw1 (y1) · · · dµqw1 (yr)
(22)
= limN→∞
(1
[w1]q [pN ]qw1
)r pN−1∑y1,··· , yr=0
e[w1w2x+w2
∑rl=1 jl+w1
∑rl=1 yl]
qtqw1(y1+···+yr)
= limN→∞
(1
[w1]q [w2pN ]qw1
)r
×w2p
N−1∑y1,··· ,yr=0
e[w1w2x+w2
∑rl=1 jl+w1
∑rl=1 yl]
qtqw1(y1+···+yr)
= limN→∞
(1
[w1w2pN ]q
)r
×w2−1∑
i1,··· , ir=0
pN−1∑y1,··· ,yr=0
e[w1w2x+
∑rl=1(w2jl+w1il+w1w2yl)]
qtqw1
∑rl=1(il+w2yl).
Thus, by (22), we get
1
[w1]rq
w1−1∑j1,··· ,jr=0
qw2
∑rl=1 jl(23)
×∫Zp
· · ·∫Zp
e[w1w2x+
∑rl=1(w2jl+w1yl)]
qtdµqw1 (y1) · · · dµqw1 (yr)
= limN→∞
(1
[w1w2pN ]q
)r w1−1∑j1,··· , jr=0
w2−1∑i1,··· , ir=0
×pN−1∑
y1,··· , yr=0
e[w1w2x+
∑rl=1(w2jl+w1il+w1w2yl)]
qtq∑r
l=1(w1il+w2jl+w1w2yl).
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1080 DAE SAN KIM ET AL 1077-1088
IDENTITIES OF SYMMETRY FOR HIGHER-ORDER q-BERNOULLI POLYNOMIALS 5
By the same method as (23), we get
1
[w2]rq
w2−1∑j1,··· ,jr=0
qw1
∑rl=1 jl(24)
×∫Zp
· · ·∫Zp
e[w1w2x+
∑rl=1(w1jl+w2yl)]
qtdµqw2 (y1) · · · dµqw2 (yl)
= limN→∞
(1
[w1w2pN ]q
)r w2−1∑j1,··· ,jr=0
w1−1∑i1,··· ,ir=0
×pN−1∑
y1,··· ,yr=0
e[w1w2x+
∑rl=1(w1jl+w2il+w1w2yl)]
qtq∑r
l=1(w2il+w1jl+w1w2yl).
Therefore, by (23), we obtain the following theorem.
Theorem 1. For w1, w2 ∈ N, we have
1
[w1]rq
w1−1∑j1,··· ,jr=0
qw2
∑rl=1 jl
×∫Zp
· · ·∫Zp
e[w1w2x+
∑rl=1(w2jl+w1yl)]
qtdµqw1 (y1) · · · dµqw1 (yr)
=1
[w2]rq
w2−1∑j1,··· ,jr=0
qw1
∑rl=1 jl
×∫Zp
· · ·∫Zp
e[w1w2x+
∑rl=1(w1jl+w2yl)]
qtdµqw2 (y1) · · · dµqw2 (yr) .
It is easy to show that
[w1w2x+ w2 (j1 + · · ·+ jr) + w1 (y1 + · · ·+ yr)]q(25)
= [w1]q
[w2x+
w2
w1(j1 + · · ·+ jr) + (y1 + · · ·+ yr)
]qw1
.
Therefore, by (20), Theorem 1 and (25), we obtain the following corollary, andtheorem.
Corollary 2. For n ≥ 0 and w1, w2 ∈ N, we have
[w1]n−rq
w1−1∑j1,··· ,jr=0
qw2
∑rl=1 jl
×∫Zp
· · ·∫Zp
[w2x+
w2
w1(j1 + · · ·+ jr) + y1 + · · ·+ yr
]nqw1
dµqw1 (y1) · · · dµqw1 (yr)
= [w2]n−rq
w2−1∑j1,··· ,jr=0
qw1
∑rl=1 jl
×∫Zp
· · ·∫Zp
[w1x+
w1
w2(j1 + · · ·+ jr) + y1 + · · ·+ yr
]nqw2
dµqw2 (y1) · · · dµqw2 (yr) .
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1081 DAE SAN KIM ET AL 1077-1088
6 DAE SAN KIM AND TAEKYUN KIM
Theorem 3. For n ≥ 0 and w1, w2 ∈ N, we have
[w1]n−rq
w1−1∑j1,··· ,jr=0
qw2(j1+···+jr)β(r)n,qw1
(w2x+
w2
w1(j1 + · · ·+ jr)
)
= [w2]n−rq
w2−1∑j1,··· ,jr=0
qw1(j1+···+jr)β(r)n,qw2
(w1x+
w1
w2(j1 + · · ·+ jr)
).
Remark. Let w2 = 1. Then we have
β(r)n,q (w1x) = [w1]
n−rq
w1−1∑j1,··· ,jr=0
qj1+···+jrβ(r)n,qw1
(x+
j1 + · · ·+ jrw1
).
By (20), we see that
∫Zp
· · ·∫Zp
[w2x+
w2
w1(j1 + · · ·+ jr) + y1 + · · ·+ yr
]nqw1
dµqw1 (y1) · · · dµqw1 (yr)
(26)
=n∑
i=0
(n
i
)([w2]q[w1]q
)i
[j1 + · · ·+ jr]iqw2 q
w2(n−i)∑r
l=1 jl
×∫Zp
· · ·∫Zp
[w2x+
r∑l=1
yl
]n−iqw1
dµqw1 (y1) · · · dµqw1 (yr)
=n∑
i=0
(n
i
)([w2]q[w1]q
)i
[j1 + · · ·+ jr]iqw2 q
w2(n−i)∑r
l=1 jlβ(r)n−i,qw1 (w2x) .
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1082 DAE SAN KIM ET AL 1077-1088
IDENTITIES OF SYMMETRY FOR HIGHER-ORDER q-BERNOULLI POLYNOMIALS 7
From Corollary 2 and (26), we have
[w1]n−rq
w1−1∑j1,··· ,jr=0
qw2
∑rl=1 jl(27)
×∫Zp
· · ·∫Zp
[w2x+
w2
w1
r∑l=1
jl +r∑
l=1
yl
]nqw1
dµqw1 (y1) · · · dµqw1 (yr)
=
w1−1∑j1,··· , jr=0
qw2
∑rl=1 jl
n∑i=0
(n
i
)[w2]
iq [w1]
n−i−rq
× [j1 + · · ·+ jr]iqw2 q
w2(n−i)∑r
l=1 jlβ(r)n−i,qw1 (w2x)
=n∑
i=0
(n
i
)[w2]
iq [w1]
n−i−rq β
(r)n−i,qw1 (w2x)
×w1−1∑
j1,··· ,jr=0
[j1 + · · ·+ jr]iqw2 q
w2(n−i+1)∑r
l=1 jl
=n∑
i=0
(n
i
)[w2]
n−iq [w1]
i−rq β
(r)i,qw1 (w2x)
×w1−1∑
j1,··· , jr=0
[j1 + · · ·+ jr]n−iqw2 q
w2(i+1)∑r
l=1 jl
=
n∑i=0
(n
i
)[w2]
n−iq [w1]
i−rq β
(r)i,qw1 (w2x)T
(r)n,i (w1|qw2) ,
where
(28) T(r)n,i (w|q) =
w−1∑j1,··· ,jr=0
[j1 + · · ·+ jr]n−iq q(i+1)
∑rl=1 jl .
By the same method as (28), we get
[w2]n−rq
w2−1∑j1,··· ,jr=0
qw1
∑rl=1 jl(29)
×∫Zp
· · ·∫Zp
[w1x+
w1
w2
r∑l=1
jl +r∑
l=1
yl
]nqw2
dµqw2 (y1) · · · dµqw2 (yl)
=
n∑i=0
(n
i
)[w1]
n−iq [w2]
i−rq β
(r)i,qw2 (w1x)T
(r)n,i (w2|qw1) .
Therefore, by Corollary 2, (27) and (29), we obtain the following theorem.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1083 DAE SAN KIM ET AL 1077-1088
8 DAE SAN KIM AND TAEKYUN KIM
Theorem 4. For n ≥ 0 and r, w1, w2 ∈ N, we have
n∑i=0
(n
i
)[w1]
n−iq [w2]
i−rq β
(r)i,qw2 (w1x)T
(r)n,i (w2|qw1)
=n∑
i=0
(n
i
)[w2]
n−iq [w1]
i−rq β
(r)i,qw1 (w2x)T
(r)n,i (w1|qw2) ,
where
T(r)n,i (w|q) =
w−1∑j1,··· ,jr=0
[j1 + · · ·+ jr]n−iq q(i+1)
∑rl=1 jl .
For h ∈ Z and r ∈ N, we have∫Zp
· · ·∫Zp
[x+ y1 + · · ·+ yr]nq q
∑rl=1(h−l)yldµq (y1) · · · dµq (yr)
=
n∑j=0
(n
j
)(−1)
j qxj
(1− q)nlim
N→∞
1
[pN ]rq
pN−1∑y1,··· ,yr=0
qj∑r
l=1 ylq∑r
l=1(h−l+1)yl
=n∑
j=0
(n
j
)(−1)
j qxj
(1− q)n(j + h) (j + h− 1) · · · (j + h− r + 1)
[j + h]q [j + h− 1]q · · · [j + h− r + 1]q
=1
(1− q)nn∑
j=0
(n
j
)(−1)
jqxj
(j+hr
)(j+hr
)q
r!
[r]q!,
where
(x
r
)q
=[x]q [x−1]q···[x−r+1]q
[r]q !=
[x]q [x−1]q···[x−r+1]q[r]q [r−1]q···[2]q [1]q
.
From (18), we can also define q-extensions of higher-order Bernoulli polynomialsas follows :
(30) β(h,r)n,q (x) =
∫Zp
· · ·∫Zp
[x+ y1 + · · ·+ yr]nq q
∑rl=1(h−l)yldµq (y1) · · · dµq (yr) ,
where n ≥ 0 and h ∈ Z, r ∈ N.Let w1, w2 ∈ N. Then we see that
1
[w1]rq
w1−1∑j1,··· ,jr=0
qw2
∑rl=1(h−l+1)jl
(31)
×∫Zp
· · ·∫Zp
qw1
∑rl=1(h−l)yle
[w1w2x+∑r
l=1(w2jl+w1yl)]qtdµqw1 (y1) · · · dµqw1 (yr)
=1
[w2]rq
w2−1∑j1,··· ,jr=0
qw1
∑rl=1(h−l+1)jl
×∫Zp
· · ·∫Zp
qw2
∑rl=1(h−l)yle
[w1w2x+∑r
l=1(w1jl+w2yl)]qtdµqw2 (y1) · · · dµqw2 (yr) .
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1084 DAE SAN KIM ET AL 1077-1088
IDENTITIES OF SYMMETRY FOR HIGHER-ORDER q-BERNOULLI POLYNOMIALS 9
From (31), we have
[w1]n−rq
w1−1∑j1,··· ,jr=0
qw2
∑rl=1(h−l+1)jl
(32)
×∫Zp
· · ·∫Zp
qw1
∑rl=1(h−l)yl
[w2x+
w2
w1
r∑l=1
jl +r∑
l=1
yl
]nqw1
dµqw1 (y1) · · · dµqw1 (yr)
= [w2]n−rq
w2−1∑j1,··· ,jr=0
qw1
∑rl=1(h−l+1)jl
×∫Zp
· · ·∫Zp
qw2
∑rl=1(h−l)yl
[w1x+
w1
w2
r∑l=1
jl +r∑
l=1
yl
]nqw2
dµqw2 (y1) · · · dµqw2 (yr) ,
where n ≥ 0 and r ∈ N, h ∈ Z.Therefore, by (30) and (32), we obtain the following theorem.
Theorem 5. For n ≥ 0, h ∈ Z and w1, w2 ∈ N, we have
[w1]n−rq
w1−1∑j1,··· ,jr=0
qw2
∑rl=1(h−l+1)jlβ
(h,r)n,qw1
(w2x+
w2
w1(j1 + · · ·+ jr)
)
= [w2]n−rq
w2−1∑j1,··· ,jr=0
qw1
∑rl=1(h−l+1)jlβ
(h,r)n,qw2
(w1x+
w1
w2(j1 + · · ·+ jr)
).
From (30), we can derive the following equation :
∫Zp
· · ·∫Zp
qw1
∑rl=1(h−l)yl
[w2x+
w2
w1
r∑l=1
jl +r∑
l=1
yl
]nqw1
dµqw1 (y1) · · · dµqw1 (yr)
(33)
=n∑
i=0
(n
i
)([w2]q[w1]q
)i
[j1 + · · ·+ jr]iqw2 q
w2(n−i)∑r
l=1 jl
×∫Zp
· · ·∫Zp
qw1
∑rl=1(h−r)yl
[w2x+
r∑l=1
yl
]n−iqw1
dµqw1 (y1) · · · dµqw1 (yr)
=n∑
i=0
(n
i
)([w2]q[w1]q
)i
[j1 + · · ·+ jr]iqw2 q
w2(n−i)∑r
l=1 jlβ(h,r)n−i,qw1 (w2x) .
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1085 DAE SAN KIM ET AL 1077-1088
10 DAE SAN KIM AND TAEKYUN KIM
By (33), we get
[w1]n−rq
w1−1∑j1,··· ,jr=0
qw2
∑rl=1(h−l+1)jl
(34)
×∫Zp
· · ·∫Zp
qw1
∑rl=1(h−l)yl
[w2x+
w2
w1
r∑l=1
jl +r∑
l=1
yl
]nqw1
dµqw1 (y1) · · · dµqw1 (yr)
=
w1−1∑j1,··· ,jr=0
qw2
∑rl=1(h−l+1)jl
n∑i=0
(n
i
)[w2]
iq [w1]
n−i−rq [j1 + · · ·+ jr]
iqw2
× qw2(n−i)∑r
l=1 jlβ(h,r)n−i,qw1 (w2x)
=n∑
i=0
(n
i
)[w2]
iq [w1]
n−i−rq β
(h,r)n−i,qw1 (w2x)
w1−1∑j1,··· ,jr=0
[j1 + · · ·+ jr]iqw2
× qw2
∑rl=1(n+h−l−i+1)jl
=
n∑i=0
(n
i
)[w2]
n−iq [w1]
i−rq β
(h,r)i,qw1 (w2x)T
(h,r)n,i (w1|qw2) ,
where
(35) T(h,r)n,i (w|q) =
w−1∑j1,··· ,jr=0
[j1 + · · ·+ jr]n−iq q
∑rl=1(i+h−l+1)jl .
By the same method as (34), we see that
[w2]n−rq
w2−1∑j1,··· ,jr=0
qw1
∑rl=1(h−l+1)jl
(36)
×∫Zp
· · ·∫Zp
qw2
∑rl=1(h−l)yl
[w1x+
w1
w2
r∑l=1
jl +r∑
l=1
yl
]nqw1
dµqw2 (y1) · · · dµqw2 (yr)
=n∑
i=0
(n
i
)[w1]
n−iq [w2]
i−rq β
(h,r)i,qw2 (w1x)T
(h,r)n,i (w2|qw1) .
Therefore, by (34) and (36), we obtain the following theorem.
Theorem 6. For n ≥ 0, h ∈ Z and r, w1, w2 ∈ N, we haven∑
i=0
(n
i
)[w2]
n−iq [w1]
i−rq β
(h,r)i,qw1 (w2x)T
(h,r)n,i (w1|qw2)
=n∑
i=0
(n
i
)[w1]
n−iq [w2]
i−rq β
(h,r)i,qw2 (w1x)T
(h,r)n,i (w2|qw1) ,
where
T(h,r)n,i (w|q) =
w−1∑j1,··· ,jr=0
[j1 + · · ·+ jr]n−iq q
∑rl=1(h+i−l+1)jl .
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1086 DAE SAN KIM ET AL 1077-1088
IDENTITIES OF SYMMETRY FOR HIGHER-ORDER q-BERNOULLI POLYNOMIALS 11
Remark. A p-adic approach to identities of symmetry for Carlitz’s q-Bernoulli poly-nomials has been studied in [10].
AcknowledgementThis work was supported by the National Research Foundation of Korea (NRF)
grant funded by the Korea government (MOE) (No.2012R1A1A2003786).
References
1. M. Acikgoz, D. Erdal, and S. Araci, A new approach to q-Bernoulli numbers and q-Bernoulli
polynomials related to q-Bernstein polynomials, Adv. Difference Equ. (2010), Art. ID 951764,9.
2. W. A. Al-Salam, q-Bernoulli numbers and polynomials, Math. Nachr. 17 (1959), 239–260
(1959).3. L. Carlitz, q-Bernoulli numbers and polynomials, Duke Math. J. 15 (1948), 987–1000.
4. , Expansions of q-Bernoulli numbers, Duke Math. J. 25 (1958), 355–364.
5. M. Cenkci and V. Kurt, Congruences for generalized q-Bernoulli polynomials, J. Inequal.Appl. (2008), Art. ID 270713, 19.
6. J. Choi, T. Kim, and Y. H. Kim, A note on the extended q-Bernoulli numbers and polynomials,
Adv. Stud. Contemp. Math. (Kyungshang) 21 (2011), no. 4, 351–354.7. D. Ding and J. Yang, Some identities related to the Apostol-Euler and Apostol-Bernoulli
polynomials, Adv. Stud. Contemp. Math. (Kyungshang) 20 (2010), no. 1, 7–21.
8. D. V. Dolgy and T. Kim, A note on the weighted q-Bernoulli numbers and the weightedq-Bernstein polynomials, Honam Math. J. 33 (2011), no. 4, 519–527.
9. K.-W. Hwang, D. V. Dolgy, D. S. Kim, T. Kim, and S. H. Lee, Some theorems on Bernoulliand Euler numbers, Ars Combin. 109 (2013), 285–297.
10. D. S. Kim, T. Kim, and S.-H. Lee, A p-adic approach to identities of symmetry for Carlitz’s
q-Bernoulli polynomials (communicated), 2014.11. D. S. Kim, N. Lee, J. Na, and K. H. Park, Abundant symmetry for higher-order Bernoulli
polynomials (I), Adv. Stud. Contemp. Math. (Kyungshang) 23 (2013), no. 3, 461–482.
12. T. Kim, q-Volkenborn integration, Russ. J. Math. Phys. 9 (2002), no. 3, 288–299.13. , On the symmetries of the q-Bernoulli polynomials, Abstr. Appl. Anal. (2008), Art.
ID 914367, 7.
14. , q-Bernoulli numbers and polynomials associated with Gaussian binomial coefficients,Russ. J. Math. Phys. 15 (2008), no. 1, 51–57.
15. T. Kim and S.-H. Rim, Generalized Carlitz’s q-Bernoulli numbers in the p-adic number field,Adv. Stud. Contemp. Math. (Pusan) 2 (2000), 9–19.
16. T. Mansour, M. Shattuck, and C. Song, A q-analog of a general rational sum identity, Afr.
Mat. 24 (2013), no. 3, 297–303.17. H. Ozden, p-adic distribution of the unification of the Bernoulli, Euler and Genocchi polyno-
mials, Appl. Math. Comput. 218 (2011), no. 3, 970–973.
18. H. Ozden, I. N. Cangul, and Y. Simsek, Remarks on q-Bernoulli numbers associated withDaehee numbers, Adv. Stud. Contemp. Math. (Kyungshang) 18 (2009), no. 1, 41–48.
19. H.-K. Pak and S.-H. Rim, q-Bernoulli numbers and polynomials via an invariant p-adic q-
integral on Zp, Notes Number Theory Discrete Math. 7 (2001), no. 4, 105–110.20. J.-W. Park, D. V. Dolgy, T. Kim, S.-H. Lee, and S.-H. Rim, A note on the modified Carlitz’s
q-Bernoulli numbers and polynomials, J. Comput. Anal. Appl. 15 (2013), no. 4, 647–654.
21. S.-H. Rim, T. Kim, and B.-J. Lee, Some identities on the extended Carlitz’s q-Bernoullinumbers and polynomials, J. Comput. Anal. Appl. 14 (2012), 536–543.
22. S.-H. Rim, E.-J. Moon, S.-J. Lee, and J.-H. Jin, Multivariate twisted p-adic q-integral on Zp
associated with twisted q-Bernoulli polynomials and numbers, J. Inequal. Appl. (2010), Art.
ID 579509, 6.23. Y Simsek, Twisted (h, q)-Bernoulli numbers and polynomials related to twisted (h, q)-zeta
function and L-function, J. Math. Anal. Appl. 324 (2006), no. 2, 790–804.24. H. M. Srivastava, T. Kim, and Y. Simsek, q-Bernoulli numbers and polynomials associated
with multiple q-zeta functions and basic L-series, Russ. J. Math. Phys. 12 (2005), no. 2,241–268.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1087 DAE SAN KIM ET AL 1077-1088
12 DAE SAN KIM AND TAEKYUN KIM
Department of Mathematics, Sogang University, Seoul 121-742, Re-public of KoreaE-mailaddress : [email protected]
Department of Mathematics, Kwangwoon University, Seoul 139-701,Republic of KoreaE-mailaddress : [email protected]
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1088 DAE SAN KIM ET AL 1077-1088
FUZZY STABILITY OF FUNCTIONAL EQUATIONS IN MATRIXFUZZY NORMED SPACES
CHOONKIL PARK, DONG YUN SHIN∗, AND JUNG RYE LEE
Abstract. Using the fixed point method, we prove the Hyers-Ulam stability of theCauchy additive functional equation and the quadratic functional equation in matrixfuzzy normed spaces.
1. Introduction and preliminaries
The abstract characterization given for linear spaces of bounded Hilbert space operatorsin terms of matricially normed spaces [65] implies that quotients, mapping spaces andvarious tensor products of operator spaces may again be regarded as operator spaces.Owing in part to this result, the theory of operator spaces is having an increasinglysignificant effect on operator algebra theory (see [19]).
The proof given in [65] appealed to the theory of ordered operator spaces [12]. Effrosand Ruan [20] showed that one can give a purely metric proof of this important theoremby using a technique of Pisier [55] and Haagerup [27] (as modified in [18]).
The stability problem of functional equations originated from a question of Ulam [71]concerning the stability of group homomorphisms.
The functional equationf(x+ y) = f(x) + f(y)
is called the Cauchy additive functional equation. In particular, every solution of theCauchy additive functional equation is said to be an additive mapping. Hyers [28] gavea first affirmative partial answer to the question of Ulam for Banach spaces. Hyers’Theorem was generalized by Aoki [2] for additive mappings and by Th.M. Rassias [59]for linear mappings by considering an unbounded Cauchy difference. A generalization ofthe Th.M. Rassias theorem was obtained by Gavruta [26] by replacing the unboundedCauchy difference by a general control function in the spirit of Th.M. Rassias’ approach.
In 1990, Th.M. Rassias [60] during the 27th International Symposium on FunctionalEquations asked the question whether such a theorem can also be proved for p ≥ 1. In1991, Gajda [25] following the same approach as in Th.M. Rassias [59], gave an affirmativesolution to this question for p > 1. It was shown by Gajda [25], as well as by Th.M. Rassiasand Semrl [64] that one cannot prove a Th.M. Rassias’ type theorem when p = 1 (cf. thebooks of Czerwik [16], Hyers, Isac and Th.M. Rassias [29]).
The functional equation
f(x+ y) + f(x− y) = 2f(x) + 2f(y)
2010 Mathematics Subject Classification. Primary 47L25, 47H10, 46S40, 39B82, 46L07, 39B52, 26E50.Key words and phrases. operator space; fixed point; Hyers-Ulam stability; matrix fuzzy normed space;
Cauchy additive functional equation; quadratic functional equation.∗Corresponding author.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1089 CHOONKIL PARK ET AL 1089-1101
C. PARK, D. SHIN, AND J. LEE
is called a quadratic functional equation. In particular, every solution of the quadraticfunctional equation is said to be a quadratic mapping. A Hyers-Ulam stability problemfor the quadratic functional equation was proved by Skof [70] for mappings f : X → Y ,where X is a normed space and Y is a Banach space. Cholewa [13] noticed that thetheorem of Skof is still true if the relevant domain X is replaced by an Abelian group.Czerwik [14] proved the Hyers-Ulam stability of the quadratic functional equation. Thestability problems of several functional equations have been extensively investigated bya number of authors and there are many interesting results concerning this problem (see[1, 21, 30, 32, 33, 38, 39, 40, 41, 42, 43, 49, 53, 58, 61, 62, 63, 68, 69]).
The theory of fuzzy space has much progressed as developing the theory of randomness.Some mathematicians have defined fuzzy norms on a vector space from various points ofview [3, 24, 35, 37, 46, 72]. Following Cheng and Mordeson [8], Bag and Samanta [3] gavean idea of fuzzy norm in such a manner that the corresponding fuzzy metric is of Kramosiland Michalek type [36] and investigated some properties of fuzzy normed spaces [4].
We use the definition of fuzzy normed spaces given in [3, 46, 47] to investigate a fuzzyversion of the Hyers-Ulam stability for the Cauchy-Jensen functional equation in the fuzzynormed algebra setting.
Definition 1.1. [3, 46, 47, 48] Let X be a real vector space. A function N : X × R →[0, 1] is called a fuzzy norm on X if for all x, y ∈ X and all s, t ∈ R,
(N1) N(x, t) = 0 for t ≤ 0;(N2) x = 0 if and only if N(x, t) = 1 for all t > 0;(N3) N(cx, t) = N(x, t
|c|) if c 6= 0;
(N4) N(x+ y, s+ t) ≥ minN(x, s), N(y, t);(N5) N(x, ·) is a non-decreasing function of R and limt→∞N(x, t) = 1;(N6) for x 6= 0, N(x, ·) is continuous on R.
The pair (X,N) is called a fuzzy normed space.
Definition 1.2. [3, 46, 47, 48] (1) Let (X,N) be a fuzzy normed space. A sequence xnin X is said to be convergent or converge if there exists an x ∈ X such that limn→∞N(xn−x, t) = 1 for all t > 0. In this case, x is called the limit of the sequence xn and wedenote it by N -limn→∞ xn = x.
(2) Let (X,N) be a fuzzy normed space. A sequence xn in X is called Cauchy if foreach ε > 0 and each t > 0 there exists an n0 ∈ N such that for all n ≥ n0 and all p > 0,we have N(xn+p − xn, t) > 1− ε.
It is well-known that every convergent sequence in a fuzzy normed space is Cauchy. Ifeach Cauchy sequence is convergent, then the fuzzy norm is said to be complete and thefuzzy normed space is called a fuzzy Banach space.
We say that a mapping f : X → Y between fuzzy normed spaces X and Y is continuousat a point x0 ∈ X if for each sequence xn converging to x0 in X, then the sequencef(xn) converges to f(x0). If f : X → Y is continuous at each x ∈ X, then f : X → Yis said to be continuous on X (see [4]).
We introduce the concept of matrix fuzzy normed space.
Definition 1.3. Let (X,N) be a fuzzy normed space. (1) (X, Nn) is called a matrixfuzzy normed space if for each positive integer n, (Mn(X), Nn) is a fuzzy normed space
and Nk(AxB, t) ≥ Nn
(x, t‖A‖·‖B‖
)for all t > 0, A ∈ Mk,n(R), x = [xij] ∈ Mn(X) and
B ∈Mn,k(R) with ‖A‖ · ‖B‖ 6= 0.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1090 CHOONKIL PARK ET AL 1089-1101
FUNCTIONAL EQUATIONS IN MATRIX FUZZY NORMED SPACES
(2) (X, Nn) is called a matrix fuzzy Banach space if (X,N) is a fuzzy Banach spaceand (X, Nn) is a matrix fuzzy normed space.
Example 1.4. Let (X, ‖ · ‖n) be a matrix normed space. Let Nn(x, t) := tt+‖x‖n for all
t > 0 and x = [xij] ∈Mn(X). Then
Nk(AxB, t) =t
t+ ‖AxB‖k≥ t
t+ ‖A‖ · ‖x‖n · ‖B‖=
t‖A‖·‖B‖t
‖A‖·‖B‖ + ‖x‖nfor all t > 0, A ∈Mk,n(R), x = [xij] ∈Mn(X) and B ∈Mn,k(R) with ‖A‖ · ‖B‖ 6= 0. So(X, Nn) is a matrix fuzzy normed space.
Let E,F be vector spaces. For a given mapping h : E → F and a given positive integern, define hn : Mn(E)→Mn(F ) by
hn([xij]) = [h(xij)]
for all [xij] ∈Mn(E).Let X be a set. A function d : X ×X → [0,∞] is called a generalized metric on X if
d satisfies(1) d(x, y) = 0 if and only if x = y;(2) d(x, y) = d(y, x) for all x, y ∈ X;(3) d(x, z) ≤ d(x, y) + d(y, z) for all x, y, z ∈ X.We recall a fundamental result in fixed point theory.
Theorem 1.5. [5, 17] Let (X, d) be a complete generalized metric space and let J : X → Xbe a strictly contractive mapping with Lipschitz constant α < 1. Then for each givenelement x ∈ X, either
d(Jnx, Jn+1x) =∞for all nonnegative integers n or there exists a positive integer n0 such that
(1) d(Jnx, Jn+1x) <∞, ∀n ≥ n0;(2) the sequence Jnx converges to a fixed point y∗ of J ;(3) y∗ is the unique fixed point of J in the set Y = y ∈ X | d(Jn0x, y) <∞;(4) d(y, y∗) ≤ 1
1−αd(y, Jy) for all y ∈ Y .
In 1996, G. Isac and Th.M. Rassias [31] were the first to provide applications of stabilitytheory of functional equations for the proof of new fixed point theorems with applications.By using fixed point methods, the stability problems of several functional equations havebeen extensively investigated by a number of authors (see [6, 7, 22, 23, 34, 45, 50, 51, 54,56]).
Throughout this paper, let (X, Nn) be a matrix fuzzy normed space and (Y, Nn) amatrix fuzzy Banach space.
In Section 2, we prove the Hyers-Ulam stability of the Cauchy additive functionalequation in matrix fuzzy normed spaces by using fixed point method.
In Section 3, we prove the Hyers-Ulam stability of the quadratic functional equation inmatrix fuzzy normed spaces by using fixed point method.
2. Hyers-Ulam stability of the Cauchy additive functional equation inmatrix fuzzy normed spaces
Using the fixed point method, we prove the Hyers-Ulam stability of the Cauchy additivefunctional equation in matrix fuzzy normed spaces.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1091 CHOONKIL PARK ET AL 1089-1101
C. PARK, D. SHIN, AND J. LEE
We will use the following notations:Mn(X) is the set of all n× n-matrices in X;ej ∈M1,n(R) is that j-th component is 1 and the other components are zero;Eij ∈Mn(R) is that (i, j)-component is 1 and the other components are zero;Eij ⊗ x ∈Mn(X) is that (i, j)-component is x and the other components are zero.
Lemma 2.1. Let (X, Nn) be a matrix fuzzy normed space.(1) Nn(Ekl ⊗ x, t) = N(x, t) for all t > 0 and x ∈ X.(2) For all [xij] ∈Mn(X) and t =
∑ni,j=1 tij,
N(xkl, t) ≥ Nn([xij], t) ≥ minN(xij, tij) : i, j = 1, 2, · · · , n,
N(xkl, t) ≥ Nn([xij], t) ≥ minN(xij,
t
n2
): i, j = 1, 2, · · · , n
.
(3) limn→∞ xn = x if and only if limn→∞ xijn = xij for xn = [xijn], x = [xij] ∈Mk(X).
Proof. (1) Since Ekl ⊗ x = e∗kxel and ‖e∗k‖ = ‖el‖ = 1, Nn(Ekl ⊗ x, t) ≥ N(x, t). Sinceek(Ekl ⊗ x)e∗l = x, Nn(Ekl ⊗ x, t) ≤ N(x, t). So N(Ekl ⊗ x, t) = N(x, t).
(2) N(xkl, t) = N(ek[xij]e∗l , t) ≥ Nn
([xij],
t‖ek‖·‖el‖
)= Nn([xij], t).
Nn([xij], t) = Nn
n∑i,j=1
Eij ⊗ xij, t
≥ minNn(Eij ⊗ xij, tij) : i, j = 1, 2, · · · , n
= minN(xij, tij) : i, j = 1, 2, · · · , n,
where t =∑ni,j=1 tij. So Nn([xij], t) ≥ min
N(xij,
tn2
): i, j = 1, 2, · · · , n
.
(3) By N(xkl, t) ≥ Nn([xij], t) ≥ minN(xij,
tn2
): i, j = 1, 2, · · · , n
, we obtain the
result.
For a mapping f : X → Y , define Df : X2 → Y and Dfn : Mn(X2)→Mn(Y ) by
Df(a, b) = f(a+ b)− f(a)− f(b),
Dfn([xij], [yij]) := fn([xij + yij])− fn([xij])− fn([yij])
for all a, b ∈ X and all x = [xij], y = [yij] ∈Mn(X).
Theorem 2.2. Let ϕ : X2 → [0,∞) be a function such that there exists an α < 1 with
ϕ(a, b) ≤ α
2ϕ (2a, 2b) (2.1)
for all a, b ∈ X. Let f : X → Y be a mapping satisfying
Nn(Dfn([xij], [yij]), t) ≥t
t+∑ni,j=1 ϕ (xij, yij)
(2.2)
for all t > 0 and x = [xij], y = [yij] ∈Mn(X). Then A(a) := N-liml→∞ 2lf(a2l
)exists for
each a ∈ X and defines an additive mapping A : X → Y such that
N (fn([xij])− An([xij]), t) ≥2(1− α)t
2(1− α)t+ n2α∑ni,j=1 ϕ(xij, xij)
(2.3)
for all t > 0 and x = [xij] ∈Mn(X).
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1092 CHOONKIL PARK ET AL 1089-1101
FUNCTIONAL EQUATIONS IN MATRIX FUZZY NORMED SPACES
Proof. Let n = 1. Then (2.2) is equivalent to
N(f(a+ b)− f(a)− f(b), t) ≥ t
t+ ϕ (a, b)(2.4)
for all t > 0 and a, b ∈ X.Letting b = a in (2.4), we get
N (f (2a)− 2f(a), t) ≥ t
t+ ϕ (a, a)(2.5)
and so
N(f (a)− 2f
(a
2
), t)≥ t
t+ ϕ(a2, a2
) ≥ t
t+ α2ϕ (a, a)
(2.6)
for all t > 0 and a ∈ X.Consider the set
S := g : X → Y and introduce the generalized metric on S:
d(g, h) = infµ ∈ R+ : N(g(a)− h(a), µt) ≥ t
t+ ϕ (a, a), ∀a ∈ X, ∀t > 0,
where, as usual, inf φ = +∞. It is easy to show that (S, d) is complete (see the proof of[44, Lemma 2.1]).
Now we consider the linear mapping J : S → S such that
Jg(a) := 2g(a
2
)for all a ∈ X.
Let g, h ∈ S be given such that d(g, h) = ε. Then
N (g(a)− h(a), εt) ≥ t
t+ ϕ (a, a)
for all a ∈ X and t > 0. Hence
N (Jg(a)− Jh(a), αεt) = N(
2g(a
2
)− 2h
(a
2
), αεt
)= N
(g(a
2
)− h
(a
2
),α
2εt)
≥αt2
αt2
+ ϕ(a2, a2
) ≥ αt2
αt2
+ α2ϕ (a, a)
=t
t+ ϕ (a, a)
for all a ∈ X and t > 0. So d(g, h) = ε implies that d(Jg, Jh) ≤ αε. This means that
d(Jg, Jh) ≤ αd(g, h)
for all g, h ∈ S.It follows from (2.4) that d(f, Jf) ≤ α
2.
By Theorem 1.5, there exists a mapping A : X → Y satisfying the following:(1) A is a fixed point of J , i.e.,
A(a
2
)=
1
2A(a)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1093 CHOONKIL PARK ET AL 1089-1101
C. PARK, D. SHIN, AND J. LEE
for all a ∈ X. The mapping A is a unique fixed point of J in the set
M = g ∈ S : d(f, g) <∞.(2) d(J lf, A)→ 0 as l→∞. This implies the equality
N - liml→∞
2lf(a
2l
)= A(a)
for all a ∈ X.(3) d(f, A) ≤ 1
1−αd(f, Jf), which implies the inequality
d(f, A) ≤ α
2− 2α. (2.7)
By (2.2),
N
(2lf
(a+ b
2l
)− 2lf
(a
2l
)− 2lf
(b
2l
), 2lt
)≥ t
t+ ϕ(a2l, b2l
)for all a, b ∈ X and t > 0. So
N
(2lf
(a+ b
2l
)− 2lf
(a
2l
)− 2lf
(b
2l
), t
)≥
t2l
t2l
+ αl
2lϕ (a, b)
for all a, b ∈ X and t > 0. Since liml→∞t
2l
t
2l+αl
2lϕ(a,b)
= 1 for all a, b ∈ X and t > 0,
N (A (a+ b)− A(a)− A(b), t) = 1
for all a, b ∈ X and t > 0. Thus A (a+ b)−A(a)−A(b) = 0. So the mapping A : X → Yis additive.
By Lemma 2.1 and (2.7),
Nn(fn([xij])− An([xij]), t) ≥ minN(f(xij)− A(xij),
t
n2
): i, j = 1, 2, · · · , n
≥ min
2(1− α)t
2(1− α)t+ n2αϕ(xij, xij): i, j = 1, 2, · · · , n
≥ 2(1− α)t
2(1− α)t+ n2α∑ni,j=1 ϕ(xij, xij)
for all x = [xij] ∈Mn(X). Thus A : X → Y is a unique additive mapping satisfying (2.3),as desired.
Corollary 2.3. Let r, θ be positive real numbers with r < 1. Let f : X → Y be a mappingsatisfying
Nn(Dfn([xij], [yij]), t) ≥t
t+∑ni,j=1 θ(‖xij‖r + ‖yij‖r)
(2.8)
for all t > 0 and x = [xij], y = [yij] ∈Mn(X). Then A(a) := N-liml→∞ 2lf(a2l
)exists for
each a ∈ X and defines an additive mapping A : X → Y such that
N (fn([xij])− An([xij]), t) ≥(2− 2r)t
(2− 2r)t+ n2 · 2r∑ni,j=1 θ‖xij‖r
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1094 CHOONKIL PARK ET AL 1089-1101
FUNCTIONAL EQUATIONS IN MATRIX FUZZY NORMED SPACES
for all t > 0 and x = [xij] ∈Mn(X).
Proof. The proof follows from Theorem 2.2 by taking ϕ(a, b) = θ(‖a‖r + ‖b‖r) for alla, b ∈ X. Then we can choose α = 2r−1 and we get the desired result.
Theorem 2.4. Let f : X → Y be a mapping satisfying (2.2) for which there exists afunction ϕ : X2 → [0,∞) such that there exists an α < 1 with
ϕ(a, b) ≤ 2αϕ
(a
2,b
2
)
for all a, b ∈ X. Then A(a) := N-liml→∞12lf(2la)
exists for each a ∈ X and defines an
additive mapping A : X → Y such that
N (fn([xij])− An([xij]), t) ≥2(1− α)t
2(1− α)t+ n2∑ni,j=1 ϕ(xij, xij)
for all t > 0 and x = [xij] ∈Mn(X).
Proof. Let (S, d) be the generalized metric space defined in the proof of Theorem 2.2.Now we consider the linear mapping J : S → S such that
Jg(a) := 2g(a
2
)for all a ∈ X.
It follows from (2.5) that d(f, Jf) ≤ 12. So
d(f, A) ≤ 1
2− 2α.
The rest of the proof is similar to the proof of Theorem 2.2.
Corollary 2.5. Let r, θ be positive real numbers with r > 1. Let f : X → Y be a mapping
satisfying (2.8). Then A(a) := N-liml→∞12lf(2la)
exists for each a ∈ X and defines an
additive mapping A : X → Y such that
N (fn([xij])− An([xij]), t) ≥(2r − 2)t
(2r − 2)t+ n2 · 2r∑ni,j=1 θ‖xij‖r
for all t > 0 and x = [xij] ∈Mn(X).
Proof. The proof follows from Theorem 2.4 by taking ϕ(a, b) = θ(‖a‖r + ‖b‖r) for alla, b ∈ X. Then we can choose α = 21−r and we get the desired result.
3. Hyers-Ulam stability of the quadratic functional equation in matrixfuzzy normed spaces
Using the fixed point method, we prove the Hyers-Ulam stability of the quadraticfunctional equation in matrix fuzzy normed spaces.
For a mapping f : X → Y , define Df : X2 → Y and Dfn : Mn(X2)→Mn(Y ) by
Df(a, b) = f(a+ b) + f(a− b)− 2f(a)− 2f(b),
Dfn([xij], [yij]) := fn([xij + yij]) + fn([xij − yij])− 2fn([xij])− 2fn([yij])
for all a, b ∈ X and all x = [xij], y = [yij] ∈Mn(X).
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1095 CHOONKIL PARK ET AL 1089-1101
C. PARK, D. SHIN, AND J. LEE
Theorem 3.1. Let ϕ : X2 → [0,∞) be a function such that there exists an α < 1 with
ϕ(a, b) ≤ α
4ϕ (2a, 2b) (3.1)
for all a, b ∈ X. Let f : X → Y be a mapping satisfying f(0) = 0 and
Nn(Dfn([xij], [yij]), t) ≥t
t+∑ni,j=1 ϕ (xij, yij)
(3.2)
for all t > 0 and x = [xij], y = [yij] ∈Mn(X). Then A(a) := N-liml→∞ 4lf(a2l
)exists for
each a ∈ X and defines a quadratic mapping Q : X → Y such that
N (fn([xij])−Qn([xij]), t) ≥4(1− α)t
4(1− α)t+ n2α∑ni,j=1 ϕ(xij, xij)
(3.3)
for all t > 0 and x = [xij] ∈Mn(X).
Proof. Let n = 1. Then (3.2) is equivalent to
N(f(a+ b) + f(a− b)− 2f(a)− 2f(b), t) ≥ t
t+ ϕ (a, b)(3.4)
for all t > 0 and a, b ∈ X.Letting b = a in (3.4), we get
N (f (2a)− 4f(a), t) ≥ t
t+ ϕ (a, a)(3.5)
and so
N(f (a)− 4f
(a
2
), t)≥ t
t+ ϕ(a2, a2
) ≥ t
t+ α4ϕ (a, a)
(3.6)
for all t > 0 and a ∈ X.Let (S, d) be the generalized metric space defined in the proof of Theorem 2.2.Now we consider the linear mapping J : S → S such that
Jg(a) := 4g(a
2
)for all a ∈ X.
Let g, h ∈ S be given such that d(g, h) = ε. Then
N (g(a)− h(a), εt) ≥ t
t+ ϕ (a, a)
for all a ∈ X and t > 0. Hence
N (Jg(a)− Jh(a), αεt) = N(
4g(a
2
)− 4h
(a
2
), αεt
)= N
(g(a
4
)− h
(a
4
),α
4εt)
≥αt4
αt4
+ ϕ(a2, a2
) ≥ αt4
αt4
+ α4ϕ (a, a)
=t
t+ ϕ (a, a)
for all a ∈ X and t > 0. So d(g, h) = ε implies that d(Jg, Jh) ≤ αε. This means that
d(Jg, Jh) ≤ αd(g, h)
for all g, h ∈ S.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1096 CHOONKIL PARK ET AL 1089-1101
FUNCTIONAL EQUATIONS IN MATRIX FUZZY NORMED SPACES
It follows from (3.4) that d(f, Jf) ≤ α4.
By Theorem 1.5, there exists a mapping Q : X → Y satisfying the following:(1) Q is a fixed point of J , i.e.,
Q(a
2
)=
1
4Q(a)
for all a ∈ X. The mapping Q is a unique fixed point of J in the set
M = g ∈ S : d(f, g) <∞.(2) d(J lf,Q)→ 0 as l→∞. This implies the equality
N - liml→∞
4lf(a
2l
)= Q(a)
for all a ∈ X.(3) d(f,Q) ≤ 1
1−αd(f, Jf), which implies the inequality
d(f, A) ≤ α
4− 4α. (3.7)
By (3.2),
N
(4lf
(a+ b
2l
)+ 4lf
(a− b
2l
)− 2 · 4lf
(a
2l
)− 2 · 4lf
(b
2l
), 4lt
)≥ t
t+ ϕ(a2l, b2l
)for all a, b ∈ X and t > 0. So
N
(4lf
(a+ b
2l
)+ 4lf
(a− b
2l
)− 2 · 4lf
(a
2l
)− 2 · 4lf
(b
2l
), t
)≥
t4l
t4l
+ αl
4lϕ (a, b)
for all a, b ∈ X and t > 0. Since liml→∞t
4l
t
4l+αl
4lϕ(a,b)
= 1 for all a, b ∈ X and t > 0,
N (Q (a+ b) +Q(a− b)− 2Q(a)− 2Q(b), t) = 1
for all a, b ∈ X and t > 0. Thus Q (a+ b)+Q(a−b)−2Q(a)−2Q(b) = 0. So the mappingQ : X → Y is quadratic.
By Lemma 2.1 and (3.7),
Nn(fn([xij])−Qn([xij]), t) ≥ minN(f(xij)−Q(xij),
t
n2
): i, j = 1, 2, · · · , n
≥ min
4(1− α)t
4(1− α)t+ n2αϕ(xij, xij): i, j = 1, 2, · · · , n
≥ 4(1− α)t
4(1− α)t+ n2α∑ni,j=1 ϕ(xij, xij)
for all x = [xij] ∈ Mn(X). Thus Q : X → Y is a unique quadratic mapping satisfying(3.3), as desired.
Corollary 3.2. Let r, θ be positive real numbers with r < 2. Let f : X → Y be a mappingsatisfying
Nn(Dfn([xij], [yij]), t) ≥t
t+∑ni,j=1 θ(‖xij‖r + ‖yij‖r)
(3.8)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1097 CHOONKIL PARK ET AL 1089-1101
C. PARK, D. SHIN, AND J. LEE
for all t > 0 and x = [xij], y = [yij] ∈Mn(X). Then A(a) := N-liml→∞ 4lf(a2l
)exists for
each a ∈ X and defines a quadratic mapping Q : X → Y such that
N (fn([xij])−Qn([xij]), t) ≥2(4− 2r)t
2(4− 2r)t+ n2 · 2r∑ni,j=1 θ‖xij‖r
for all t > 0 and x = [xij] ∈Mn(X).
Proof. The proof follows from Theorem 3.1 by taking ϕ(a, b) = θ(‖a‖r + ‖b‖r) for alla, b ∈ X. Then we can choose α = 2r−2 and we get the desired result.
Theorem 3.3. Let f : X → Y be a mapping satisfying f(0) = 0 and (3.2) for whichthere exists a function ϕ : X2 → [0,∞) such that there exists an α < 1 with
ϕ(a, b) ≤ 4αϕ
(a
2,b
2
)
for all a, b ∈ X. Then Q(a) := N-liml→∞14lf(2la)
exists for each a ∈ X and defines a
quadratic mapping Q : X → Y such that
N (fn([xij])−Qn([xij]), t) ≥4(1− α)t
4(1− α)t+ n2∑ni,j=1 ϕ(xij, xij)
for all t > 0 and x = [xij] ∈Mn(X).
Proof. Let (S, d) be the generalized metric space defined in the proof of Theorem 2.2.Now we consider the linear mapping J : S → S such that
Jg(a) := 4g(a
2
)for all a ∈ X.
It follows from (3.5) that d(f, Jf) ≤ 14. So
d(f,Q) ≤ 1
4− 4α.
The rest of the proof is similar to the proof of Theorem 3.1.
Corollary 3.4. Let r, θ be positive real numbers with r > 2. Let f : X → Y be a mapping
satisfying (3.8). Then Q(a) := N-liml→∞14lf(2la)
exists for each a ∈ X and defines a
quadratic mapping Q : X → Y such that
N (fn([xij])−Qn([xij]), t) ≥2(2r − 4)t
2(2r − 4)t+ n2 · 2r∑ni,j=1 θ‖xij‖r
for all t > 0 and x = [xij] ∈Mn(X).
Proof. The proof follows from Theorem 3.3 by taking ϕ(a, b) = θ(‖a‖r + ‖b‖r) for alla, b ∈ X. Then we can choose α = 22−r and we get the desired result.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1098 CHOONKIL PARK ET AL 1089-1101
FUNCTIONAL EQUATIONS IN MATRIX FUZZY NORMED SPACES
Acknowledgments
C. Park was supported by Basic Science Research Program through the National Re-search Foundation of Korea funded by the Ministry of Education, Science and Technology(NRF-2012R1A1A2004299), and D. Y. Shin was supported by Basic Science ResearchProgram through the National Research Foundation of Korea funded by the Ministry ofEducation, Science and Technology (NRF-2010-0021792).
References
[1] J. Aczel and J. Dhombres, Functional Equations in Several Variables, Cambridge Univ. Press, Cam-bridge, 1989.
[2] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan 2(1950), 64–66.
[3] T. Bag and S.K. Samanta, Finite dimensional fuzzy normed linear spaces, J. Fuzzy Math. 11 (2003),687–705.
[4] T. Bag and S.K. Samanta, Fuzzy bounded linear operators, Fuzzy Sets and Systems 151 (2005),513–547.
[5] L. Cadariu and V. Radu, Fixed points and the stability of Jensen’s functional equation, J. Inequal.Pure Appl. Math. 4, no. 1, Art. ID 4 (2003).
[6] L. Cadariu and V. Radu, On the stability of the Cauchy functional equation: a fixed point approach,Grazer Math. Ber. 346 (2004), 43–52.
[7] L. Cadariu and V. Radu, Fixed point methods for the generalized stability of functional equations ina single variable, Fixed Point Theory and Applications 2008, Art. ID 749392 (2008).
[8] S.C. Cheng and J.M. Mordeson, Fuzzy linear operators and fuzzy normed linear spaces, Bull. CalcuttaMath. Soc. 86 (1994), 429–436.
[9] Y. Cho, J. Kang and R. Saadati, Fixed points and stability of additive functional equations on theBanach algebras, J. Comput. Anal. Appl. 14(2012), 1103–1111.
[10] Y. Cho, C. Park, Th.M. Rassias and R. Saadati, Inner product spaces and functional equations, J.Comput. Anal. Appl. 13(2011), 296–304.
[11] Y. Cho, C. Park and R. Saadati, Functional inequalities in non-Archimedean Banach spaces, Appl.Math. Letters 23 (2010), 1238–1242.
[12] M.-D. Choi and E. Effros, Injectivity and operator spaces, J. Funct. Anal. 24 (1977), 156–209.[13] P.W. Cholewa, Remarks on the stability of functional equations, Aequationes Math. 27 (1984), 76–86.[14] S. Czerwik, On the stability of the quadratic mapping in normed spaces, Abh. Math. Sem. Univ.
Hamburg 62 (1992), 59–64.[15] S. Czerwik, The stability of the quadratic functional equation. in: Stability of mappings of Hyers-
Ulam type, (ed. Th.M. Rassias and J.Tabor), Hadronic Press, Palm Harbor, Florida, 1994, 81-91.[16] P. Czerwik, Functional Equations and Inequalities in Several Variables, World Scientific Publishing
Company, New Jersey, Hong Kong, Singapore and London, 2002.[17] J. Diaz and B. Margolis, A fixed point theorem of the alternative for contractions on a generalized
complete metric space, Bull. Amer. Math. Soc. 74 (1968), 305–309.[18] E. Effros, On multilinear completely bounded module maps, Contemp. Math. 62, Amer. Math. Soc..
Providence, RI, 1987, pp. 479–501.[19] E. Effros and Z.-J. Ruan, On approximation properties for operator spaces, Internat. J. Math. 1
(1990), 163–187.[20] E. Effros and Z.-J. Ruan, On the abstract characterization of operator spaces, Proc. Amer. Math.
Soc. 119 (1993), 579–584.[21] M. Eshaghi Gordji and M.B. Savadkouhi, Stability of a mixed type cubic-quartic functional equation
in non-Archimedean spaces, Appl. Math. Letters 23 (2010), 1198–1202.[22] M. Eshaghi Gordji, G. Kim, J. Lee and C. Park, Generalized ternary bi-derivations on ternary
Banach algebras: a fixed point approach, J. Comput. Anal. Appl. 15 (2013), 45–54.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1099 CHOONKIL PARK ET AL 1089-1101
C. PARK, D. SHIN, AND J. LEE
[23] M. Eshaghi Gordji, G. Kim, J. Lee and C. Park, Nearly generalized derivations on non-ArchimdeanBanach algebras: a fixed point approach, J. Comput. Anal. Appl. 15 (2013), 308–315.
[24] C. Felbin, Finite dimensional fuzzy normed linear spaces, Fuzzy Sets and Systems 48 (1992), 239–248.
[25] Z. Gajda, On stability of additive mappings, Internat. J. Math. Math. Sci. 14 (1991), 431–434.[26] P. Gavruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings,
J. Math. Anal. Appl. 184 (1994), 431–436.[27] U. Haagerup, Decomp. of completely bounded maps, unpublished manuscript.[28] D.H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. U.S.A. 27
(1941), 222–224.[29] D.H. Hyers, G. Isac and Th.M. Rassias, Stability of Functional Equations in Several Variables,
Birkhauser, Basel, 1998.[30] G. Isac and Th.M. Rassias, On the Hyers-Ulam stability of ψ-additive mappings, J. Approx. Theory
72 (1993), 131–137.[31] G. Isac and Th.M. Rassias, Stability of ψ-additive mappings: Appications to nonlinear analysis,
Internat. J. Math. Math. Sci. 19 (1996), 219–228.[32] K. Jun and Y. Lee, A generalization of the Hyers-Ulam-Rassias stability of the Pexiderized quadratic
equations, J. Math. Anal. Appl. 297 (2004), 70–86.[33] S. Jung, Hyers-Ulam-Rassias Stability of Functional Equations in Mathematical Analysis, Hadronic
Press lnc., Palm Harbor, Florida, 2001.[34] Y. Jung and I. Chang, The stability of a cubic type functional equation with the fixed point alternative,
J. Math. Anal. Appl. 306 (2005), 752–760.[35] A.K. Katsaras, Fuzzy topological vector spaces II, Fuzzy Sets and Systems 12 (1984), 143–154.[36] I. Kramosil and J. Michalek, Fuzzy metric and statistical metric spaces, Kybernetica 11 (1975),
326–334.[37] S.V. Krishna and K.K.M. Sarma, Separation of fuzzy normed linear spaces, Fuzzy Sets and Systems
63 (1994), 207–217.[38] M. Kim, Y. Kim, G. A. Anastassiou and C. Park, An additive functional inequality in matrix normed
modules over a C∗-algebra, J. Comput. Anal. Appl. 17 (2014), 329–335.[39] M. Kim, S. Lee, G. A. Anastassiou and C. Park, Functional equations in matrix normed modules, J.
Comput. Anal. Appl. 17 (2014), 336–342.[40] J. Lee, S. Lee and C. Park, Fixed points and stability of the Cauchy-Jensen functional equation in
fuzzy Banach algebras, J. Comput. Anal. Appl. 15 (2013), 692–698.[41] J. Lee, C. Park, Y. Cho and D. Shin, Orthogonal stability of a cubic-quartic functional equation in
non-Archimedean spaces, J. Comput. Anal. Appl. 15 (2013), 572–583.[42] L. Li, G. Lu, C. Park and D. Shin, Additive functional inequalities in generalized quasi-Banach
spaces, J. Comput. Anal. Appl. 15 (2013), 1165–1175.[43] G. Lu, Y. Jiang and C. Park, Additive functional equation in Frechet spaces, J. Comput. Anal. Appl.
15 (2013), 369–373.[44] D. Mihet and V. Radu, On the stability of the additive Cauchy functional equation in random normed
spaces, J. Math. Anal. Appl. 343 (2008), 567–572.[45] M. Mirzavaziri and M.S. Moslehian, A fixed point approach to stability of a quadratic equation, Bull.
Braz. Math. Soc. 37 (2006), 361–376.[46] A.K. Mirmostafaee, M. Mirzavaziri and M.S. Moslehian, Fuzzy stability of the Jensen functional
equation, Fuzzy Sets and Systems 159 (2008), 730–738.[47] A.K. Mirmostafaee and M.S. Moslehian, Fuzzy versions of Hyers-Ulam-Rassias theorem, Fuzzy Sets
and Systems 159 (2008), 720–729.[48] A.K. Mirmostafaee and M.S. Moslehian, Fuzzy approximately cubic mappings, Inform. Sci. 178
(2008), 3791–3798.[49] C. Park, Homomorphisms between Poisson JC∗-algebras, Bull. Braz. Math. Soc. 36 (2005), 79–97.[50] C. Park, Fixed points and Hyers-Ulam-Rassias stability of Cauchy-Jensen functional equations in
Banach algebras, Fixed Point Theory and Applications 2007, Art. ID 50175 (2007).
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1100 CHOONKIL PARK ET AL 1089-1101
FUNCTIONAL EQUATIONS IN MATRIX FUZZY NORMED SPACES
[51] C. Park, Generalized Hyers-Ulam-Rassias stability of quadratic functional equations: a fixed pointapproach, Fixed Point Theory and Applications 2008, Art. ID 493751 (2008).
[52] C. Park, Y. Cho and H.A. Kenary, Orthogonal stability of a generalized quadratic functional equationin non-Archimedean spaces, J. Comput. Anal. Appl. 14(2012), 526–535.
[53] C. Park, K. Ghasemi, S. G. Ghaleh, S. Jang, Approximate n-Jordan ∗-homomorphisms in C∗-algebras, J. Comput. Anal. Appl. 15 (2013), 365–368.
[54] C. Park, A. Najati and S. Jang, Fixed points and fuzzy stability of an additive-quadratic functionalequation, J. Comput. Anal. Appl. 15 (2013), 452–462.
[55] G. Pisier, Grothendieck’s Theorem for non-commutative C∗-algebras with an appendix onGrothendieck’s constants, J. Funct. Anal. 29 (1978), 397–415.
[56] V. Radu, The fixed point alternative and the stability of functional equations, Fixed Point Theory 4(2003), 91–96.
[57] J.M. Rassias, On approximation of approximately linear mappings by linear mappings, J. Funct.Anal. 46 (1982) 126–130.
[58] J.M. Rassias, Solution of a problem of Ulam, J. Approx. Theory 57 (1989), 268–273.[59] Th.M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72
(1978), 297–300.[60] Th.M. Rassias, Problem 16; 2, Report of the 27th International Symp. on Functional Equations,
Aequationes Math. 39 (1990), 292–293; 309.[61] Th.M. Rassias (ed.), Functional Equations and Inequalities, Kluwer Academic, Dordrecht, 2000.[62] Th.M. Rassias, On the stability of functional equations in Banach spaces, J. Math. Anal. Appl. 251
(2000), 264–284.[63] Th.M. Rassias, On the stability of functional equations and a problem of Ulam, Acta Math. Appl.
62 (2000), 23–130.[64] Th.M. Rassias and P. Semrl, On the behaviour of mappings which do not satisfy Hyers-Ulam stability,
Proc. Amer. Math. Soc. 114 (1992), 989–993.[65] Z.-J. Ruan, Subspaces of C∗-algebras, J. Funct. Anal. 76 (1988), 217–230.[66] R. Saadati and C. Park, Non-Archimedean L-fuzzy normed spaces and stability of functional equa-
tions, Computers Math. Appl. 60 (2010), 2488–2496.[67] D. Shin, S. Lee, C. Byun and S. Kim, On matrix normed spaces, Bull. Korean Math. Soc. 27 (1983),
103–112.[68] D. Shin, C. Park and Sh. Farhadabadi, On the superstability of ternary Jordan C∗-homomorphisms,
J. Comput. Anal. Appl. 16 (2014), 964–973.[69] D. Shin, C. Park and Sh. Farhadabadi, Stability and superstability of J∗-homomorphisms and J∗-
derivations for a generalized Cauchy-Jensen equation, J. Comput. Anal. Appl. 17 (2014), 125–134.[70] F. Skof, Proprieta locali e approssimazione di operatori, Rend. Sem. Mat. Fis. Milano 53 (1983),
113–129.[71] S. M. Ulam, A Collection of the Mathematical Problems, Interscience Publ. New York, 1960.[72] J.Z. Xiao and X.H. Zhu, Fuzzy normed spaces of operators and its completeness, Fuzzy Sets and
Systems 133 (2003), 389–399.
Choonkil ParkDepartment of Mathematics, Research Institute for Natural Sciences, Hanyang Univer-sity, Seoul 133-791, Korea
E-mail address: [email protected]
Dong Yun ShinDepartment of Mathematics, University of Seoul, Seoul 130-743, Korea
E-mail address: [email protected]
Jung Rye LeeDepartment of Mathematics, Daejin University, Kyeonggi 487-711, Korea
E-mail address: [email protected]
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1101 CHOONKIL PARK ET AL 1089-1101
On the stability of multi-additive mappings in non-Archimedean normed spaces
Tian Zhou Xu* Chun WangSchool of Mathematics and Statistics, Beijing Institute of Technology, Beijing 100081, P. R. China
E-mail: [email protected], [email protected]
Themistocles M. RassiasDepartment of Mathematics, National Technical University of Athens, Zografou Campus, Athens 15780, Greece
E-mail: [email protected]
Abstract. We establish some new stability results concerning multi-additive functional equation in non-Archimedean
normed spaces. The results improve some recent results. Some applications of our result will be illustrated. In particular,
we will see that some results about stability of multi-additive mappings in real normed spaces are not valid in non-
Archimedean normed spaces.
Keywords: Stability; Multi-additive mapping; Non-Archimedean normed space; Fixed point.
MR(2000) Subject Classification. 39B22, 39B82, 46S10, 47S10
1. Introduction
In 1897, Hensel discovered the p-adic numbers as a number theoretical analogue of power series in complex
analysis. The most important examples of non-Archimedean spaces are p-adic numbers. During the last three
decades, the theory of non-Archimedean spaces has gained the interest of physicists for their research, in particu-
lar, in problems deriving from quantum physics, p-adic strings and superstrings [10, 18]. Although many results
in the classical normed space theory have a non-Archimedean counterpart, their proofs are essentially different
and require an entirely new kind of approach. One may note that |n| ≤ 1 in each valuation field, every triangle
is isosceles and there may be a no unit vector in a non-Archimedean normed space [10]. These facts show that
the non-Archimedean framework is of special interest.
A basic question in the theory of functional equations is the following: when is it true that a function, which
approximately satisfies a functional equation must be close to an exact solution of the equation?
If the problem accepts a unique solution, we say the equation is stable (see [12]). The first stability problem
concerning group homomorphisms was raised by Ulam [17] in 1940 and affirmatively solved by Hyers [7]. The
result of Hyers was generalized by Th.M. Rassias [14] for approximate linear mappings by allowing the Cauchy
difference operator CDf(x, y) = f(x+y)−[f(x)+f(y)] to be controlled by ϵ(∥x∥p+∥y∥p). In 1994, a generalization
of Rassias’ theorem was obtained by Gavruta [6], who replaced ϵ(∥x∥p+∥y∥p) by a general control function φ(x, y)
by following Th.M. Rassias’ approach. Furthermore for an extensive account of methods and results concerning
Hyers-Ulam stability of additive, multi-additive, multi-Jensen mappings and functional equations in a single
variable as well as in several variables we refer the reader to ([1–4, 8, 9, 11, 15, 16, 19–24]) and references therein.
In this paper, we determine some results concerning the stability of the multi-additive mappings in the non-
Archimedean normed spaces. The presented results correspond to some outcomes from [1] and sometimes are
their slight generalizations.
2. Preliminaries
We recall some basic facts concerning non-Archimedean space and some basic results.
A valuation is a function |·| from a field K into [0,∞) such that 0 is the unique element having the 0 valuation,
|rs| = |r| · |s| and the triangle inequality holds, i.e.,
|r + s| ≤ |r|+ |s|, ∀r, s ∈ K.
A field K is called a valued field if K carries a valuation. The usual absolute values of R and C are examples of
valuations.
Let us consider a valuation which satisfies a stronger condition than the triangle inequality.
*Corresponding author.The first author was supported by the National Natural Science Foundation of China(Grant No. 11171022)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1102 Tian Zhou Xu et al 1102-1110
T. Z. Xu, C. Wang and Th. M. Rassias
Definition 2.1. Let K be a field. A non-Archimedean absolute value on K is a function | · | : K → R such that
for any r, s ∈ K we have
(i) |r| ≥ 0 and equality holds if and only if r = 0;
(ii) |rs| = |r||s|;(iii) |r + s| ≤ max|r|, |s|.
The condition (iii) is called the strong triangle inequality. Clearly, |1| = | − 1| = 1 and |n| ≤ 1 for all n ∈ N. We
always assume in addition that | · | is non trivial, i.e., that
(iv) there is an r0 ∈ K such that |r0| = 0, 1.
The most important examples of non-Archimedean spaces are p-adic numbers.
Example 2.2. Let p be a prime number. For any nonzero rational number x, there exists a unique integer nx
such that x = ab p
nx , where a and b are integers not divisible by p. Then |x|p := p−nx defines a non-Archimedean
norm on Q. The completion of Q with respect to the metric d(x, y) = |x− y|p is denoted by Qp which is called
the p-adic number field. In fact, Qp is the set of all formal series x =∑∞
k≥nxakp
k, where |ak| ≤ p − 1 are
integers. The addition and multiplication between any two elements of Qp are defined naturally. The norm
|∑∞
k≥nxakp
k|p = p−nx is a non-Archimedean norm on Qp and it makes Qp a locally compact field (see [18]).
Note that if p > 2, then |2n|p = 1 for each integer n but |2|2 < 1.
Throughout this paper, we assume that the base field is a non-Archimedean field and hence we can call it
simply a field. Moreover, N stands for the set of all positive integers.
Definition 2.3. Let X be a linear space over a field K with a non-Archimedean valuation | · |. A function
∥ · ∥ : X → [0,∞) is a non-Archimedean norm if it satisfies the following conditions:
(i) ∥x∥ = 0 if and only if x = 0;
(ii) ∥rx∥ = |r|∥x∥ for all r ∈ K and x ∈ X ;
(iii) the strong triangle inequality
∥x+ y∥ ≤ max∥x∥, ∥y∥, ∀x, y ∈ X .
Then (X , ∥ · ∥) is called a non-Archimedean normed space.
Definition 2.4. Let X be a non-Archimedean normed space. Let xn be a sequence in X . Then xn is
said to be convergent if there exists x ∈ X such that limn→∞
∥xn − x∥ = 0. In that case, x is called the limit of
the sequence xn and we denote it by limn→∞
xn = x. A sequence xn in X is said to be a Cauchy sequence if
limn→∞
∥xn+p − xn∥ = 0 for all p = 1, 2, . . .. Due to the fact that
∥xn − xm∥ ≤ max∥xj+1 − xj∥ : m ≤ j ≤ n− 1 (n > m)
a sequence xn is Cauchy if and only if xn+1 − xn converges to zero in a non-Archimedean normed space.
It is known that every convergent sequence in a non-Archimedean normed space is a Cauchy sequence. If
every Cauchy sequence in X converges, then the non-Archimedean normed space X is called a non-Archimedean
Banach space.
Definition 2.5. Let X denotes a linear space and Y represents a complete non-Archimedean normed space
and n ≥ 1 is an integer. A function f : X n → Y is called a multi-additive mapping, if f is additive in each
variable:
f(x1, . . . , xi−1, xi + x′i, xi+1, . . . , xn) = f(x1, . . . , xi−1, xi, xi+1, . . . , xn) + f(x1, . . . , xi−1, x
′i, xi+1, . . . , xn)
for all i = 1, 2, . . . , n and all x1, . . . , xi−1, xi, x′i, xi+1, . . . , xn ∈ X . Some basic facts on such mappings can be
found for instance in [1, 2, 13], where their application to the representation of polynomial functions is also
presented.
Let Ω be a set. A function d : Ω × Ω → [0,∞] is called a generalized metric on Ω if d satisfies the following
conditions:
(a) d(x, y) = 0 if and only if x = y;
(b) d(x, y) = d(y, x) for all x, y ∈ Ω;
(c) d(x, z) ≤ d(x, y) + d(y, z) for all x, y, z ∈ Ω.
It will later on the following fixed point alternative theorem (cf. [5]) will be useful.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1103 Tian Zhou Xu et al 1102-1110
On the stability of multi-additive mappings in non-Archimedean normed spaces
Theorem 2.6. Let (Ω, d) be a complete generalized metric space and J : Ω → Ω be a strictly contractive mapping
with Lipschitz constant 0 < L < 1, that is
d(Jx, Jy) ≤ Ld(x, y) ∀x, y ∈ Ω.
Then, for each given x ∈ Ω, either
d(Jnx, Jn+1x) = ∞ ∀n ≥ 0,
or
d(Jnx, Jn+1x) < ∞, ∀n ≥ n0,
for some natural number n0. Actually if the second alternative holds, then the sequence Jnx is convergent to
a fixed point x∗ of J and
(1) x∗ is the unique fixed point of J in the set Ω∗ = y ∈ Ω : d(Jn0x, y) < ∞;(2) d(y, x∗) ≤ 1
1−Ld(y, Jy) for all y ∈ Ω∗.
3. Non-Archimedean stability of the multi-additive mapping: a direct method
Let X be a linear space over a non-Archimedean field K with a valuation | · | and Y be a complete non-
Archimedean normed space over K. For the given mapping f : X n → Y and every i ∈ 1, 2, . . . , n, we define
the difference operator
Dif(x1, . . . , xi, x′i, xi+1, . . . , xn)
:= f(x1, . . . , xi−1, xi + x′i, xi+1, . . . , xn)− f(x1, . . . , xn)− f(x1, . . . , xi−1, x
′i, xi+1, . . . , xn)
for all x1, . . . , xi, x′i, xi+1, . . . , xn ∈ X .
Theorem 3.1. Let X be a linear space over a non-Archimedean field K with a valuation | · | and Y be a complete
non-Archimedean normed space over K. Let n ∈ N and for every i ∈ 1, 2, . . . , n, φi : X n+1 → [0,∞) be a
function. Let for some natural number k ∈ K,
limm→∞
|k|mφi(x1/km, . . . , xi, x
′i, xi+1, . . . , xn) = 0,
...
limm→∞
|k|mφi(x1, . . . , xi−2, xi−1/km, xi, x
′i, xi+1, . . . , xn) = 0,
limm→∞
|k|mφi(x1, . . . , xi−1, xi/km, x′
i/km, xi+1, . . . , xn) = 0,
limm→∞
|k|mφi(x1, . . . , xi, x′i, xi+1/k
m, xi+2, . . . , xn) = 0,
...
limm→∞
|k|mφi(x1, . . . , xi, x′i, xi+1, . . . , xn−1, xn/k
m) = 0
(3.1)
for all x1, . . . , xi, x′i, xi+1, . . . , xn ∈ X and let for each (x1, . . . , xn) ∈ X n the limit
limm→∞
max|k|s+1 maxφi(x1, . . . , xi−1, xi/ks+1, jxi/k
s+1, xi+1, . . . , xn) : 1 ≤ j ≤ k − 1 : 0 ≤ s < m,
denoted by φi(x1, . . . , xn), exists. Suppose that f : X n → Y be a mapping satisfying
∥Dif(x1, . . . , xi, x′i, xi+1, . . . , xn)∥ ≤ φi(x1, . . . , xi, x
′i, xi+1, . . . , xn) (3.2)
for all x1, . . . , xi, x′i, xi+1, . . . , xn ∈ X and i ∈ 1, . . . , n. Then for every i ∈ 1, . . . , n there exists a multi-
additive mapping Fi : X n → Y such that
∥f(x1, . . . , xn)− Fi(x1, . . . , xn)∥ ≤ 1
|k|φi(x1, . . . , xn) (3.3)
for all x1, . . . , xn ∈ X . For every i ∈ 1, . . . , n the function Fi is given by
Fi(x1, . . . , xn) := limj→∞
kjf(x1, . . . , xi−1, xi/kj , xi+1, . . . , xn) (3.4)
for all x1, . . . , xn ∈ X , and if, in addition,
limp→∞
|k|pφi(x1, . . . , xi−1, xi/kp, xi+1, . . . , xn) = 0,
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1104 Tian Zhou Xu et al 1102-1110
T. Z. Xu, C. Wang and Th. M. Rassias
then Fi is the unique multi-additive mapping satisfying (3.3).
Proof. Fix j ∈ N and i ∈ 1, . . . , n. Letting x′i = xi in (3.2), we get
∥f(x1, . . . , xi−1, 2xi, xi+1, . . . , xn)− 2f(x1, . . . , xn)∥ ≤ φi(x1, . . . , xi, xi, xi+1, . . . , xn) (3.5)
for all x1, . . . , xn ∈ X . Letting x′i = 2xi in (3.2), we get
∥f(x1, . . . , xi−1, 3xi, xi+1, . . . , xn)− f(x1, . . . , xn)− f(x1, . . . , xi−1, 2xi, xi+1, . . . , xn)∥≤ φi(x1, . . . , xi, 2xi, xi+1, . . . , xn)
(3.6)
for all x1, . . . , xn ∈ X . Similarly, putting x′i = jxi ( 3 ≤ j ≤ k − 1) in (3.2), we get
∥f(x1, . . . , xi−1, (j + 1)xi, xi+1, . . . , xn)− f(x1, . . . , xn)− f(x1, . . . , xi−1, jxi, xi+1, . . . , xn)∥≤ φi(x1, . . . , xi, jxi, xi+1, . . . , xn)
(3.7)
for all x1, . . . , xn ∈ X . By (3.5)–(3.7), we see that
∥f(x1, . . . , xi−1, kxi, xi+1, . . . , xn)− kf(x1, . . . , xn)∥≤ maxφi(x1, . . . , xi, jxi, xi+1, . . . , xn) : 1 ≤ j ≤ k − 1
(3.8)
for all x1, . . . , xn ∈ X , and so
∥km−1f(x1, . . . , xi−1, xi/km−1, xi+1, . . . , xn)− kmf(x1, . . . , xi−1, xi/k
m, xi+1, . . . , xn)∥≤ |k|m−1 maxφi(x1, . . . , xi−1, xi/k
m, jxi/km, xi+1, . . . , xn) : 1 ≤ j ≤ k − 1.
(3.9)
for all x1, . . . , xn ∈ X and m = 0, 1, . . .. By (3.1), it follows that kmf(x1, . . . , xi−1, xi/km, xi+1, . . . , xn)
is a Cauchy sequence in the complete non-Archimedean space Y . This sequence is convergent and we define
Fi : X n → Y by
Fi(x1, . . . , xn) := limm→∞
kmf(x1, . . . , xi−1, xi/km, xi+1, . . . , xn) (3.10)
for all x1, . . . , xn ∈ X . Using (3.9), one can show that
∥f(x1, . . . , xn)− kmf(x1, . . . , xi−1, xi/km, xi+1, . . . , xn)∥
=
∥
∥
∥
∥
m∑
s=1[ks−1f(x1, . . . , xi−1, xi/k
s−1, xi+1, . . . , xn)− ksf(x1, . . . , xi−1, xi/ks, xi+1, . . . , xn)]
∥
∥
∥
∥
≤ 1|k| max|k|s+1 maxφi(x1, . . . , xi−1, xi/k
s+1, jxi/ks+1, xi+1, . . . , xn) : 1 ≤ j ≤ k − 1 : 0 ≤ s < m,
(3.11)
by taking limit as m → ∞ of both sides of (3.11), one can obtain the inequality (3.3).
Now, we will show that for every i ∈ 1, . . . , n the mapping Fi is multi-additive. By (3.2), we have
∥kjDsf(x1, . . . , xs−1, xs, x′s, xs+1, . . . , xi−1, xi/k
j , xi+1, . . . , xn)∥≤ |k|jφs(x1, . . . , xs−1, xs, x
′s, xs+1, . . . , xi−1, xi/k
j , xi+1, . . . , xn), for s < i,
∥kjDif(x1, . . . , xi−1, xi/kj , x′
i/kj , xi+1, . . . , xn)∥
≤ |k|jφi(x1, . . . , xi−1, xi/kj , x′
i/kj , xi+1, . . . , xn), for s = i,
∥kjDsf(x1, . . . , xi−1, xi/kj , xi+1, . . . , xs−1, xs, x
′s, xs+1, . . . , xn)∥
≤ |k|jφs(x1, . . . , xi−1, xi/kj , xi+1, . . . , xs−1, xs, x
′s, xs+1, . . . , xn), for s > i
(3.12)
for all x1, . . . , xi, x′i, xi+1, . . . , xn ∈ X , x′
s ∈ X (s ∈ 1, 2, . . . , n\i) and all j ∈ N. Letting j → ∞ in the
above inequalities and using (3.1), we see that the mapping Fi is multi-additive. To prove the uniqueness of the
mapping Fi, assume that F ′i : X n → Y is another multi-additive mapping satisfying (3.3). Then we have
∥Fi(x1, . . . , xn)− F ′i (x1, . . . , xn)∥
= |k|p∥Fi(x1, . . . , xi−1, xi/kp, xi+1, . . . , xn)− F ′
i (x1, . . . , xi−1, xi/kp, xi+1, . . . , xn)∥
≤ max|k|p∥f(x1, . . . , xi−1, xi/kp, xi+1, . . . , xn)− Fi(x1, . . . , xi−1, xi/k
p, xi+1, . . . , xn)∥,|k|p∥f(x1, . . . , xi−1, xi/k
p, xi+1, . . . , xn)− F ′i (x1, . . . , xi−1, xi/k
p, xi+1, . . . , xn)∥≤ 2|k|p−1φi(x1, . . . , xi−1, xi/k
p, xi+1, . . . , xn)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1105 Tian Zhou Xu et al 1102-1110
On the stability of multi-additive mappings in non-Archimedean normed spaces
for all p ∈ N and x1, . . . , xn ∈ X . If
limp→∞
|k|pφi(x1, . . . , xi−1, xi/kp, xi+1, . . . , xn) = 0,
we may conclude that Fi(x1, . . . , xn) = F ′i (x1, . . . , xn) for all x1, . . . , xn ∈ X , and the proof is complete.
The proof of the following result is similar to that in Theorem 3.1, hence it is omitted.
Theorem 3.2. Let X be a linear space over a non-Archimedean field K with a valuation | · | and Y be a complete
non-Archimedean normed space over K. Let n ∈ N and for every i ∈ 1, 2, . . . , n, φi : X n+1 → [0,∞) be a
function. Assume for some natural number k ∈ K,
limm→∞
1|k|mφi(k
mx1, . . . , xi, x′i, xi+1, . . . , xn) = 0,
...
limm→∞
1|k|mφi(x1, . . . , xi−2, k
mxi−1, xi, x′i, xi+1, . . . , xn) = 0,
limm→∞
1|k|mφi(x1, . . . , xi−1, k
mxi, kmx′
i, xi+1, . . . , xn) = 0,
limm→∞
1|k|mφi(x1, . . . , xi, x
′i, k
mxi+1, xi+2, . . . , xn) = 0,
...
limm→∞
1|k|mφi(x1, . . . , xi, x
′i, xi+1, . . . , xn−1, k
mxn) = 0
for all x1, . . . , xi, x′i, xi+1, . . . , xn ∈ X and let for each (x1, . . . , xn) ∈ X n the limit
limm→∞
max
1
|k|smaxφi(x1, . . . , xi−1, k
sxi, jksxi, xi+1, . . . , xn) : 1 ≤ j ≤ k − 1 : 0 ≤ s < m
,
denoted by φi(x1, . . . , xn), exists. Suppose that f : X n → Y is a mapping satisfying
∥Dif(x1, . . . , xi, x′i, xi+1, . . . , xn)∥ ≤ φi(x1, . . . , xi, x
′i, xi+1, . . . , xn)
for all x1, . . . , xi, x′i, xi+1, . . . , xn ∈ X and i ∈ 1, . . . , n. Then for every i ∈ 1, . . . , n there exists a multi-
additive mapping Fi : X n → Y such that
∥f(x1, . . . , xn)− Fi(x1, . . . , xn)∥ ≤ 1
|k|φi(x1, . . . , xn)
for all x1, . . . , xn ∈ X . For every i ∈ 1, . . . , n the function Fi is given by
Fi(x1, . . . , xn) := limj→∞
1
kjf(x1, . . . , xi−1, k
jxi, xi+1, . . . , xn)
for all x1, . . . , xn ∈ X , and if, in addition,
limp→∞
1
|k|pφi(x1, . . . , xi−1, k
pxi, xi+1, . . . , xn) = 0,
then Fi is the unique multi-additive mapping satisfying (3.3).
Corollary 3.3. Let K be a non-Archimedean field, (X , ∥ · ∥X ) be a non-Archimedean normed space over K,
(Y , ∥ · ∥Y ) be a complete non-Archimedean normed space over K. Let k ∈ N with |k| < 1, ε, δ ≥ 0, 0 < ri <
1(1 ≤ i ≤ n), and f : X n → Y be a mapping such that
∥Dif(x1, . . . , xi, x′i, xi+1, . . . , xn)∥Y ≤ ε+ δ[∥x1∥r1X · · · ∥xi−1∥ri−1
X (∥xi∥riX + ∥x′i∥
riX )∥xi+1∥ri+1
X · · · · ∥xn∥rnX ]
for all x1, . . . , xi, x′i, xi+1, . . . , xn ∈ X and every i ∈ 1, 2, . . . , n. Then there exists a unique multi-additive
mapping Fi : X n → Y such that
∥f(x1, x2, . . . , xn)− Fi(x1, x2, . . . , xn)∥Y ≤ ε+2δ
|k|ri(∥x1∥r1X · ∥x2∥r2X · · · · · ∥xn∥rnX )
for all x1, x2, . . . , xn ∈ X .
Corollary 3.4. Let K be a non-Archimedean field, (X , ∥ · ∥X ) be a non-Archimedean normed space over K,
(Y , ∥ · ∥Y ) be a complete non-Archimedean normed space over K. Let k ∈ N with |k| < 1, ε, δ ≥ 0, ri, si > 0(1 ≤
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1106 Tian Zhou Xu et al 1102-1110
T. Z. Xu, C. Wang and Th. M. Rassias
i ≤ n) with λi := ri + si < 1, and f : X n → Y be a mapping such that
∥Dif(x1, . . . , xi, x′i, xi+1, . . . , xn)∥Y
≤ ε+ δ∥x1∥λ1
X · · · ∥xi−1∥λi−1
X [∥xi∥riX ∥x′i∥
siX + (∥xi∥ri+si
X + ∥x′i∥
ri+siX )]∥xi+1∥λi+1
X · · · · ∥xn∥λn
X
for all x1, . . . , xi, x′i, xi+1, . . . , xn ∈ X and every i ∈ 1, 2, . . . , n. Then there exists a unique multi-additive
mapping Fi : X n → Y such that
∥f(x1, x2, . . . , xn)− Fi(x1, x2, . . . , xn)∥Y ≤ ε+3δ
|k|λi(∥x1∥λ1
X · ∥x2∥λ2
X · · · · · ∥xn∥λn
X )
for all x1, x2, . . . , xn ∈ X .
Remark. Theorems 3.1 and 3.2 are generalized versions of Theorem 2.1 in [11].
In [2], Cieplinski proved the following:
Theorem 3.5. Let X be a commutative semigroup and Y be a Banach space. Assume also that n ∈ N and for
every i ∈ 1, 2, . . . , n, φi : X n+1 → [0,∞) is a mapping such that for any (x1, x2, . . . , xn) ∈ X n+1 we have
φi(x1, . . . , xn+1) :=∞∑
j=0
12j [φi(2
jx1, x2, . . . , xn+1) + · · ·+ φi(x1, . . . , xi−2, 2jxi−1, xi, . . . , xn+1)
+12φi(x1, . . . , xi−1, 2
jxi, 2jxi+1, xi+2, . . . , xn+1) + φi(x1, . . . , xi+1, 2
jxi+2, xi+3, . . . , xn+1)
+ · · ·+ φi(x1, . . . , xn, 2jxn+1) < ∞.
If f : X n → Y is a function satisfying
∥f(x1, . . . , xi−1, xi + x′i, xi+1, . . . , xn)− f(x1, . . . , xn)− f(x1, . . . , xi−1, x
′i, xi+1, . . . , xn)∥
≤ φi(x1, . . . , xi, x′i, xi+1, . . . , xn), (x1, . . . , xi, x
′i, xi+1, . . . , xn) ∈ X n+1, i ∈ 1, . . . , n,
then for every i ∈ 1, . . . , n there exists a multi-additive mapping Fi : X n → Y such that for any (x1, . . . , xn) ∈X n we have
∥f(x1, . . . , xn)− Fi(x1, . . . , xn)∥ ≤ φi(x1, . . . , xi, xi, xi+1, . . . , xn).
For every i ∈ 1, . . . , n the function Fi is given by
Fi(x1, . . . , xn) := limj→∞
1
2jf(x1, . . . , xi−1, 2
jxi, xi+1, . . . , xn), (x1, . . . , xn) ∈ X n.
The following example shows that the same result of Theorem 3.5 is not true in non-Archimedean normed
spaces and the assumption |k| < 1 cannot be omitted in Corollaries 3.3 and 3.4. This example is a modification
of the example of [22].
Example 3.6. Let p > 2 be a prime number and f : Q2p → Qp be defined by f(x1, x2) = 2. Since, |2j |p = 1 for
all j ∈ Z, then for φ1(x1, x2, x3) = φ2(x1, x2, x3) = 1 (the case when k = 2, ε = 1 and δ = 0 is considered),
|D1f(x1, x′1, x2)|p = |D2f(x1, x2, x
′2)|p = |2|p = 1 ≤ φ1(x1, x2, x3) = φ2(x1, x2, x3), x1, x
′1, x2, x
′2 ∈ Qp.
However
|2jf(x1/2j , x2)− 2j+1f(x1/2
j+1, x2)|p = |2j+1|p = 1
and
|2jf(x1, x2/2j)− 2j+1f(x1, x2/2
j+1)|p = |2j+1|p = 1
for all x1, x2 ∈ Qp and j ∈ N. Hence neither 2jf(x1/2j , x2) nor 2jf(x1, x2/2
j) is a Cauchy sequence. Hence
these sequences are not convergent in Qp.
4. A fixed point approach to the stability
In [2], Cieplinski reduce the system of n Cauchy equations to a single functional equation (see [2, Theorem
2]).
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1107 Tian Zhou Xu et al 1102-1110
On the stability of multi-additive mappings in non-Archimedean normed spaces
Theorem 4.1. Assume that n ∈ N and let X be a commutative semigroup with the identity element 0 and Y
be a linear space. A mapping f : X n → Y is multi-additive if and only if
f(x11 + x12, . . . , xn1 + xn2) =∑
i1,...,in∈1,2
f(x1i1 , . . . , xnin) (4.1)
for all x11, x12, . . . , xn1, xn2 ∈ X .
Next, we will show the Hyers-Ulam stability of Eq.(4.1) by using the fixed point method. For the given
mapping f : X n → Y , we define the difference operator
Df(x11, x12, . . . , xn1, xn2) := f(x11 + x12, . . . , xn1 + xn2)−∑
i1,...,in∈1,2
f(x1i1 , . . . , xnin)
for all x11, x12, . . . , xn1, xn2 ∈ X .
Theorem 4.2. Let X be a linear space over a non-Archimedean field K with a valuation | · | and Y be a complete
non-Archimedean normed space over K. Let 0 ≤ L < 1 and φ : X 2n → [0,∞) be a mapping such that
φ(x11, x12, . . . , xn1, xn2) ≤L
|2|nφ(2x11, 2x12, . . . , 2xn1, 2xn2) (4.2)
for all x11, x12, . . . , xn1, xn2 ∈ X . If f : X n → Y is a function satisfying
∥Df(x11, x12, . . . , xn1, xn2)∥ ≤ φ(x11, x12, . . . , xn1, xn2) (4.3)
for all x11, x12, . . . , xn1, xn2 ∈ X , then there exists a unique multi-additive mapping F : X n → Y such that
∥f(x11, x21, . . . , xn1)− F (x11, x21, . . . , xn1∥ ≤ L
|2|n(1− L)φ(x11, x11, . . . , xn1, xn1) (4.4)
for all x11, x21, . . . , xn1 ∈ X . The function F is given by
F (x11, x21, . . . , xn1) := limm→∞
2mnf(x11/2m, x21/2
m, . . . , xn1/2m) (4.5)
for all x11, x21, . . . , xn1 ∈ X .
Proof. It follows from (4.2) that
limj→∞
|2|njφ(x11/2j , x12/2
j , . . . , xn1/2j , xn2/2
j) = 0 (4.6)
for all x11, x12, . . . , xn1, xn2 ∈ X .
Consider the set
Ω := g | g : X n → Y
and introduce the generalized metric on Ω defined by
d(g, h) := infc > 0| ∥g(x11, x21, . . . , xn1)− h(x11, x21, . . . , xn1)∥≤ cφ(x11, x11, . . . , xn1, xn1), ∀x11, x21, . . . , xn1 ∈ X .
It is easy to show that (Ω, d) is a complete generalized metric space. Now we consider the mapping J : Ω → Ω
such that
Jg(x11, x21, . . . , xn1) = 2ng(x11/2, x21/2, . . . , xn1/2)
for all x11, x21, . . . , xn1 ∈ X n. Let g, h ∈ Ω be given such that d(g, h) < β, by the definition,
∥g(x11, x21, . . . , xn1)− h(x11, x21, . . . , xn1)∥ ≤ βφ(x11, x11, . . . , xn1, xn1)
for all x11, x21, . . . , xn1 ∈ X . Hence
∥Jg(x11, x21, . . . , xn1)− Jh(x11, x21, . . . , xn1)∥= ∥2ng(x11/2, x21/2, . . . , xn1/2)− 2nh(x11/2, x21/2, . . . , xn1/2)∥= |2|n∥g(x11/2, x21/2, . . . , xn1/2)− h(x11/2, x21/2, . . . , xn1/2)∥≤ |2|nβφ((x11/2, x11/2, . . . , xn1/2, xn1/2)
≤ βLφ(x11, x11, . . . , xn1, xn1)
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1108 Tian Zhou Xu et al 1102-1110
T. Z. Xu, C. Wang and Th. M. Rassias
for all x11, x21, . . . , xn1 ∈ X . By the definition it follows that d(Jg, Jh) ≤ βL. Therefore,
d(Jg, Jh) ≤ Ld(g, h), for all g, h ∈ Ω.
This means that J is a strictly contractive self-mapping of Ω with Lipschitz constant L.
Putting xi2 = xi1 for i ∈ 1, 2, . . . , n in (4.3), we get
∥f(2x11, 2x21, . . . , 2xn1)− 2nf(x11, x21, . . . , xn1)∥ ≤ φ(x11, x11, . . . , xn1, xn1)
for all x11, x21, . . . , xn1 ∈ X . Hence
∥2nf(x11/2, x21/2, . . . , xn1/2)− f(x11, x21, . . . , xn1)∥ ≤ φ(x11/2, x11/2, . . . , xn1/2, xn1/2)
≤ L|2|nφ(x11, x12, . . . , xn1, xn2)
for all x11, x21, . . . , xn1 ∈ X . Therefore d(Jf, f) ≤ L/|2|n.By Theorem 2.6, there exists a mapping F : X n → Y such that
(1) F is a fixed point of J , that is,
F (2x11, 2x21, . . . , 2xn1) = 2nF (x11, x21, . . . , xn1) (4.7)
for all x11, x21, . . . , xn1 ∈ X . The mapping F is a unique fixed point of J in the set ∆ = g ∈ Ω| d(f, g) < ∞.This implies that F is a unique mapping satisfying (4.7) such that there exists c ∈ (0,∞) satisfying
∥F (x11, x21, . . . , xn1)− f(x11, x21, . . . , xn1)∥ ≤ c · φ(x11, x11, . . . , xn1, xn1)
for all x11, x21, . . . , xn1 ∈ X .
(2) d(Jmf, F ) → 0 as m → ∞. This implies the equality
F (x11, x21, . . . , xn1) := limm→∞
2mnf(x11/2m, x21/2
m, . . . , xn1/2m) (4.8)
for all x11, x21, . . . , xn1 ∈ X .
(3) d(f, F ) ≤ d(f, Jf)/(1− L), which implies the inequality
d(f, F ) ≤ L/[|2|n(1− L)].
Thus inequality (4.4) holds.
It follows from (4.3), (4.6), and (4.8) that
∥F (x11 + x12, . . . , xn1 + xn2)−∑
i1,...,in∈1,2F (x1i1 , . . . , xnin)∥
= limj→∞
|2|nj∥f((x11 + x12)/2j , . . . , (xn1 + xn2)/2
j)−∑
i1,...,in∈1,2f(x1i1/2
j , . . . , xnin/2j)∥
≤ limj→∞
|2|njφ(x11/2j , x12/2
j , . . . , xn1/2j , xn2/2
j) = 0
for all x11, x12, . . . , xn1, xn2 ∈ X . Therefore Theorem 4.1 now shows that F is multi-additive. This completes
the proof.
Corollary 4.3. Let K be a non-Archimedean field, (X , ∥ · ∥X ) be a non-Archimedean normed space over
K, (Y , ∥ · ∥Y ) be a complete non-Archimedean normed space over K. Let ε, δ ≥ 0, 0 < r < 1, |2| < 1, and
f : X n → Y be a mapping such that
∥Df(x11, x12, . . . , xn1, xn2)∥Y ≤ ε+ δ(∥x11∥nrX + ∥x12∥nrX + · · ·+ ∥xn1∥nrX + ∥xn2∥nrX )
for all x11, x12, . . . , xn1, xn2 ∈ X . Then there exists a unique multi-additive mapping F : X n → Y such that
∥f(x11, x21, . . . , xn1)− F (x11, x21, . . . , xn1)∥Y ≤ 1
|2|nr − |2|n[ε+ 2δ(∥x11∥nrX + ∥x21∥nrX + · · ·+ ∥xn1∥nrX )]
for all x11, x21, . . . , xn1 ∈ X . The function F is given by
F (x11, x12, . . . , xn1) := limm→∞
2mnf(x11/2m, . . . , xn1/2
m)
for all x11, x21, . . . , xn1 ∈ X .
Corollary 4.4. Let K be a non-Archimedean field, (X , ∥ · ∥X ) be a non-Archimedean normed space over K,
(Y , ∥ · ∥Y ) be a complete non-Archimedean normed space over K, ε, δ ≥ 0 and r, s > 0 with λ := r + s < 1.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1109 Tian Zhou Xu et al 1102-1110
On the stability of multi-additive mappings in non-Archimedean normed spaces
Assume also that f : X n → Y be a mapping satisfying
∥Df(x11, x12, . . . , xn1, xn2)∥Y ≤ ε+ δ
n∑
k=1
[∥xk1∥nrX · ∥xk2∥nsX + (∥xk1∥nλX + ∥xk2∥nλX )]
for all x11, x12, . . . , xn1, xn2 ∈ X . Then there exists a unique multi-additive mapping F : X n → Y such that
∥f(x11, x21, . . . , xn1)− F (x11, x21, . . . , xn1)∥ ≤ 1
|2|nλ − |2|n[ε+ 3δ(∥x11∥nλX + ∥x21∥nλX + · · ·+ ∥xn1∥nλX )]
for all x11, x21, . . . , xn1 ∈ X n. The function F is given by
F (x11, x12, . . . , xn1) := limm→∞
2mnf(x11/2m, . . . , xn1/2
m)
for all x11, x21, . . . , xn1 ∈ X n.
The following example shows that the assumption |2| < 1 cannot be omitted in Corollaries 4.3 and 4.4.
Example 4.5. Let p > 2 be a prime number and f : Q2p → Qp be defined by f(x1, x2) = 2. Since, |2j |p = 1 for
all j ∈ Z, then for ε = 1 and δ = 0,
|Df(x11, x12, x21, x22)|p = |6|p = |3|p ≤ 1 = ε, x11, x12, x21, x22 ∈ Qp.
However,
|4jf(x1/2j , x2/2
j)− 4j+1f(x1/2j+1, x2)/2
j+1|p = |7 · 22j |p = |7|p
for all x1, x2 ∈ Qp and j ∈ N. Hence 4jf(x1/2j , x2/2
j) is not convergent in Qp.
References
[1] K. Cieplinski, Stability of multi-additive mappings in non-Archimedean normed spaces, J. Math. Anal. Appl., 373(2011),
376–383.
[2] K. Cieplinski, Generalized stability of multi-additive mappings, Applied Mathematics Letters, 23(2010), 1291–1294.
[3] K. Cieplinski, On the generalized Hyers-Ulam stability of multi-quadratic mappings, Comput. Math. Appl., 62(2011), 3418–3426.
[4] K. Cieplinski, T.Z. Xu, Approximate multi-Jensen and multi-quadratic mappings in 2-Banach spaces, Carpathian Journal of
Mathematics, 29(2)(2013), 159–166.
[5] J.B. Diaz, B. Margolis, A fixed point theorem of the alternative for the contractions on generalized complete metric space, Bull.
Amer. Math. Soc., 74(1968), 305–309.
[6] P. Gavruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings, Journal of Mathematical
Analysis and Applications, 184(1994), 431–436.
[7] D.H. Hyers, On the stability of the linear functional equation, Proc. Nat. Acad. Sci. USA, 27(1941), 222–224.
[8] D.H. Hyers, G. Isac and Th.M. Rassias, Stability of Functional Equations in Several Variables, Birkhauser, Boston, Basel, Berlin,
1998.
[9] S.-M. Jung, Hyers-Ulam-Rassias Stability of Functional Equations in Nonlinear Analysis, Springer, New York, 2011.
[10] A. Khrennikov, Non-Archimedean Analysis: Quantum Paradoxes, Dynamical Systems and Biological Models. Kluwer Academic
Publishers, Dordrecht, 1997.
[11] A.K. Mirmostafaee, M.S. Moslehian, Stability of additive mappings in non-Archimedean fuzzy normed spaces, Fuzzy Sets and
Systems 160(2009) 1643-1652.
[12] Z. Moszner, On the stability of functional equations, Aequationes Math., 77(2009), 33–88.
[13] W. Prager, J. Schwaiger, Stability of the multi-Jensen equation, Bull. Korean Math. Soc., 45(2008), 133–142.
[14] Th.M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc., 72(1978), 297–300.
[15] Th.M. Rassias, J. Brzdek, Functional Equations in Mathematical Analysis, Springer, New York, 2011.
[16] R. Saadati, Ch. Park, Non-Archimedian L -fuzzy normed spaces and stability of functional equations, Comput. Math. Appl.,
60(2010), 2488–2496.
[17] S.M. Ulam, A Collection of the Mathematical Problems, Interscience, New York, 1960.
[18] V.S. Vladimirov, I.V. Volovich, E.I. Zelenov, p-adic Analysis and Mathematical Physics. World Scientific, 1994.
[19] T.Z. Xu, On the stability of multi-Jensen mappings in β-normed spaces, Applied Mathematics Letters, 25(2012), 1866–1870.
[20] T.Z. Xu, Approximate multi-Jensen, multi-Euler-Lagrange additive and quadratic mappings in n-Banach spaces, Abstract and
Applied Analysis, 2013(2013), Article ID 648709, 1–12.
[21] T.Z. Xu, J.M. Rassias, Approximate septic and octic mappings in quasi-β-normed spaces, Journal of Computational Analysis
and Applications, 15(6)(2013), 1110–1119.
[22] T.Z. Xu, J.M. Rassias, W.X. Xu, Stability of a general mixed additive-cubic functional equation in non-Archimedean fuzzy
normed spaces, J. Math. Phys., 51(2010), Article ID 093508 1–19.
[23] T.Z. Xu, J.M. Rassias, W.X. Xu, Stability of a general mixed additive-cubic equation in F -spaces, Journal of Computational
Analysis and Applications, 14(6)(2012), 1026–1037.
[24] T.Z. Xu, Z. Yang, J.M. Rassias, Direct and fixed point approaches to the stability of an AQ-functional equation in non-
Archimedean normed spaces, Journal of Computational Analysis and Applications, 17(4)(2014), 697–706.
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1110 Tian Zhou Xu et al 1102-1110
Notes on Harmonic Functions for which thesecond Dilatation is α - spiral
Melike Aydogan
2014
Abstract
In this study, we consider, f = h + g harmonic functions in theunit disc D. By applying S. S. Miller and P. M. Mocanu result, weobtain a new subclass of harmonic functions , such as S∗HPST (α, β)We introduce this new class as defined in the following form,
S∗HPST (α, β) =f = h(z) + g(z)|f ∈ SH , h(z) ∈ S∗,
Re
(eiα
g′(z)
h′(z)
)> β, |α| < π
2, 0 ≤ β < Re(beiα)
(0.1)
We also use subordination principle , study on distortion theorems,some numerical examples and coefficient inequalities of this class.
1 Introduction
A planar harmonic mapping in the unit disc D = z ∈ C||z| < 1 is a complex-valued harmonic function f which maps D onto some planar domain f(D).Since D is simply connected, the mapping f has a canonical decompositionf = h + g, where h and g are analytic in D, as usual, we call h the analyticpart of f and g the co-analytic part of f . An elegant and complete accountof the theory of planar harmonic mapping is given in Duren’s monograph [3].
2000 Mathematics Subject Classification: 30C45, 30C55Key words and phrases: Harmonic functions, growth theorem, distortion theorem, coeffi-cient inequality
1
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1111 Melike Aydogan 1111-1121
Lewy [5] proved in 1936 that the harmonic function f is locally univalent ina simply connected domain D1 if and only if its Jacobien
Jf (z) = |h′(z)|2 − |g′(z)|2 > 0
is different from zero in D1. In view of this result, locally univalent harmonicmappings in the unit disc are either sense-reversing if
|g′(z)| > |h′(z)|
in D1 or sense-preserving if
|g′(z)| < |h′(z)|
in D1. Throughout this paper we will restrict ourselves to the study of sense-preserving harmonic mappings. However, since f is sense-preserving if andonly if f is sense-reserving, all the results obtained in this article regardingsense-preserving harmonic mappings can be adapted to sense-reversing ones.Note that f = h + g is sense-preserving in D if and only if h′(z) does not
vanish in the unit disc and the second-complex dilatation w(z) = g′(z)h′(z)
has
the property |w(z)| < 1 in D, therefore we can take h(z) = z + a2z2 + · · · ,
g(z) = b1z + b2z2 + · · · . Thus the class of all harmonic mappings being
sense-preserving in the unit disc can be defined by
SH =f = h(z) + g(z) |h(z) = z + a2z
2 + · · · , g(z) = b1z + b2z2 + · · · ,
f sense-preserving
Let Ω be the family of functions φ(z) which are regular in D and satisfyingthe conditions φ(0) = 0, |φ(z)| < 1 for all z ∈ D. Denote by P , the family offunctions p(z) = 1 + p1z + p2z
2 + · · · which are regular in D such that
p(z) =1 + φ(z)
1− φ(z)(1.1)
for some function φ(z) ∈ Ω for all z ∈ D.Next, let S∗ denote the family of functions s(z) = z+ c2z
2 + c3z3 + · · · which
are regular in D such that
zs′(z)
s(z)= p(z) (1.2)
2
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1112 Melike Aydogan 1111-1121
for some p(z) ∈ P for all z ∈ D.Let s1(z) = z + α2z
2 + α3z3 + · · · and s2(z) = z + β2z2 + β3z
3 + · · · beanalytic functions in D. If there exists φ(z) ∈ Ω such that s1(z) = s2(φ(z))for all z ∈ D. Then we say that s1(z) is subordinate to s2(z) and we writes1(z) ≺ s2(z), then s1(D) ⊂ s2(D).Now, we consider the following class of harmonic mappings in the plane
S∗HPST (α, β) =f = h(z) + g(z)|f ∈ SH , h(z) ∈ S∗,
Re
(eiα
g′(z)
h′(z)
)> β, |α| < π
2, 0 ≤ β < Re(beiα)
(1.3)
In the present paper we will investigate the class S∗HPST (α, β).We will need the following lemma and theorem in the sequel:
Theorem 1.1. ([4]) Let h(z) be an element of S∗, then
r
(1 + r)2≤ |h(z)| ≤ r
(1− r)2,
for all |z| = r < 1.
1− r(1 + r)3
≤ |h′(z)| ≤ 1 + r
(1− r)3These inequalities are sharp because the extremal function is
h(z) = z(1−z)2 .
Lemma 1.2. ([6]) Let M(z) and N(z) be regular in D with M(0) = N(0) =0, and let γ be real. If N(z) maps D onto a (possibly many-sheeted) domainwhich is starlike with respect to the origin, then
Re(M ′(z)
N ′(z)) > γ ⇒ Re(
M(z)
N(z)) > γ
2 Main Results
Theorem 2.1. Let g(z) and h(z) be analytic in D with g(0) = h(0) = 0, andlet 0 ≤ β < Re(eiαb1) and |α| < π
2. If h(z) maps D onto a (possibly many
sheeted) domain which is starlike with respect to the origin, then
Re(eiαg′(z)
h′(z)) > β(z ∈ D)⇒ Re(eiα
g(z)
h(z)) > β(z ∈ D)
3
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1113 Melike Aydogan 1111-1121
Proof. If we take M(z) = g(z) and N(z) = e−iαh(z), then M(z) and N(z)are analytic in D and M(0) = N(0) = 0.Also,
Re(zN ′(z)
N(Z)) = Re(
zh′(z)
h(z)) > 0, (z ∈ D)
Thus, appliying Lemma 1.2, we prove the theorem.
Example 2.2. Let us consider the function g(z) such that eiαb1 > 0, β = 0and h(z) = z
(1−z)2 .Now , we consider
eiαg′(z)
h′(z)= eiαb1
1 + z
1− zThen, we easily see that,
Re(eiαg′(z)
h′(z)) > 0, (z ∈ D).
For such g(z), we have that
g′(z) =b1(1 + z)2
(1− z)4.
Thus, we obtain that
g(z) = b1
∫ z
0
(1 + t)2
(1− t)4dt =
b1z(3 + z2)
3(1− z)3
Using the above g(z) and h(z) = z(1−z)2 , we see that
Re(eiαg(z)
h(z)) = Re(
eiαb1(3 + z2)
3(1− z)) > 0, (z ∈ D)
Theorem 2.3. If f(z) = h(z) + g(z) is in the class S∗HPST (α, β), then∣∣∣∣g(z)
h(z)− |b1| e
i(φ−α)(1 + r2e−i2φ)− 2r2β.eiα
1− r2
∣∣∣∣ ≤ 2r(|b1| cosφ− β)
1− r2
for |z| = r < 1, where φ = α + arg(b1).
4
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1114 Melike Aydogan 1111-1121
Proof. For f(z) ∈ S∗HPST (α, β), Theorem 1 gives us that
Re(eiαg(z)
h(z)) > β(z ∈ D)
Let us define
p(z) = eiαg(z)
h(z)
and
φ(z) =p(z)− β − Imp(0)
Rep(0)− βThen, we see that
p(0) = b1eiα = |b1| eiα(φ = α + arg(b1))
and that φ(z) is analytic inD, φ(0) = 1, and Reφ(z) > 0, (z ∈ D). Therefore,φ(z) is Caratheodory function. It follows from the above that,
φ(z) ≺ 1 + z
1− z,
that is,
φ(z) =1 + w(z)
1− w(z)
where w(z) is analytic in D, w(0) = 0 and |w(z)| < 1, (z ∈ D). Therefore,using Schwarz lemma, we have that
|w(z)| =∣∣∣∣φ(z)− 1
φ(z) + 1
∣∣∣∣ ≤ r(|z| = r < 1)
Note that ∣∣∣∣φ(z)− 1 + r2
1− r2
∣∣∣∣ ≤ 2r
1− r2
and
φ(z) =eiα g(z)
h(z)− β − i |b1|φ
|b1| cosφ− βTherefore, we have that∣∣∣∣eiα g(z)
h(z)− |b1| e
iφ(1 + r2e−i2φ)− 2r2β
1− r2
∣∣∣∣ ≤ 2r(|b1| cosφ− β)
1− r2
5
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1115 Melike Aydogan 1111-1121
Since φ = α + arg(b1), we obtain that∣∣∣∣g(z)
h(z)− |b1| e
i(φ−α)(1 + r2e−i2φ)− 2r2β.e−iα
1− r2
∣∣∣∣ ≤ 2r(|b1| cosφ− β)
1− r2.
Corollary 2.4. Let f(z) = h(z) + g(z) is in the class S∗HPST (α, β); ifarg(b1) = −α, then φ = 0. Therefore, we have that∣∣∣∣b1(1− r)− 2rβ
1 + r
∣∣∣∣ ≤ ∣∣∣∣g(z)
h(z)
∣∣∣∣ ≤ ∣∣∣∣b1(1 + r)− 2rβ
1− r
∣∣∣∣ (2.1)
Proof. This is a simple consequence of Theorem 2.3.
Corollary 2.5. Let f(z) = h(z) + g(z) is in the class S∗HPST (α, β); if β = 0,then we have
|b1| (1− r)1 + r
≤∣∣∣∣g(z)
h(z)
∣∣∣∣ ≤ |b1| (1 + r)
1− r(2.2)
Proof. This is a simple consequence of Theorem 2.3.
Corollary 2.6. Let f(z) = h(z) + g(z) is in the class S∗HPST (α, β), then
r[|b1| (1− r)− 2rβ]
(1 + r3)≤ |g(z)| ≤ r[|b1| (1 + r)− 2rβ]
(1− r3)(2.3)
(1− r)[|b1| (1− r)− 2rβ]
(1 + r)4≤ |g′(z)| ≤ (1 + r)[|b1| (1 + r)− 2rβ]
(1− r)4(2.4)
for all |z| = r < 1.
Proof. Let f(z) = h(z) + g(z) is in the class S∗HPST (α, β), then by usingTheorem 1.1, we can write
|h(z)| |b1| (1− r)2rβ(1 + r)
≤ |g(z)| ≤ |h(z)| |b1| (1 + r)2rβ
(1− r)
|h′(z)| |b1| (1− r)2rβ(1 + r)
≤ |g′(z)| ≤ |h′(z)| |b1| (1 + r)2rβ
(1− r)Therefore we can take the result easliy.
6
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1116 Melike Aydogan 1111-1121
Corollary 2.7. Let f(z) = h(z) + g(z) is in the class S∗HPST (α, β), if β = 0,then we have
r |b1| (1− r)(1 + r)3
≤ |g(z)| ≤ r |b1| (1 + r)
(1− r)3
|b1| (1− r)2
(1 + r)4≤ |g′(z)| ≤ |b1| (1 + r)2
(1− r)4
Proof. This is a simple consequence of Corollary 2.6.
Corollary 2.8. Let f(z) = h(z) + g(z) is in the class S∗HPST (α, β), then
F (|b1| ,−r, β) ≤ Jf(z) ≤ F (|b1| , r, β)
where
F (|b1| , r, β) =[1− |b1| − r(1 + |b1|+ 2β)][1 + |b1|+ r(−1− |b1|+ 2β)]
(1 + r)6
Proof. Since
Jf(z) = |h′(z)|2 − |g′(z)|2 = |h′(z)|2 (1− |w(z)|2)
Using Corollary 2.6 and Theorem 2.3 we get the result easily.
Theorem 2.9. If f(z) = h(z) + g(z) is in the class S∗HPST (α, β), then
|bn − b1an| ≤(n− 1)(2n− 1)
3(|b1| cos(α + arg(b1))− β) (2.5)
(n = 2, 3, 4, ...)
Proof. Since
Re(eiαg′(z)
h′(z)) > β, (z ∈ D)
for f(z) ∈ S∗HPST (α, β), we see that
φ(z) =p(z)− β − iImp(0)
Rep(0)− β
is the Caratheodory function, where
p(z) = eiαg′(z)
h′(z)
7
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1117 Melike Aydogan 1111-1121
and p(0) = b1eiα = |b1| ei(α+arg(b1)) If we write
φ(z) = 1 + c1z + c2z2 + ...,
we have that |cn|leq2, (1, 2, 3, ...). Note that
p(z) = (Rep(0)− β)φ(z) + β + iImp(0),
that is, that
eiαg′(z) = h′(z)[(Rep(0)− β)φ(z) + β + iImp(0)]
It follows that
eiαb1 +∞∑n=2
nbnzn−1
= (1 +∞∑n=2
nanzn−1)[(Rep(0)− β)(1 +
∞∑n=1
cnzn) + β + iImp(0)]
Considering the coefficient for zn−1, we have that
meiαbm = (Rep(b1eiα)−β)(cn−1+2a2cn−2+3a3cn−3+...+(n−1)an−1c1)+b1e
iαnan
This shows us that,
(bn−b1an)eiα =1
n(Rep(b1e
iα)−β)(cn−1+2a2cn−2+3a3cn−3+...+(n−1)an−1c1).
(2.6)Since |an| ≤ n, (n = 2, 3, 4, ...) for h(z) ∈ S∗ and |cn| ≤ 2, (n = 1, 2, 3, ...),we obtain that
|bn − b1an| ≤2
n(|b1| cos(α+arg(b1))−β)(1+2 |a2|+3 |a3|+ ...+(n−1) |an−1|)
≤ 2
n(|b1| cos(α + arg(b1))− β)(12 + 22 + 32 + ...+ (n− 1)2)
=(n− 1)(2n− 1)
3(|b1| cos(α + arg(b1))− β)
This completes the proof of the theorem.
Corollary 2.10. If f(z) = h(z) + g(z) is in the class S∗HPST (α, β) withh(z) ∈ K, then
|bn − b1an| ≤ (n− 1)(|b1| cos(α + arg(b1))− β), (n = 2, 3, 4, ...)
Proof. This is a simple consequence of Theorem 2.9.
8
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1118 Melike Aydogan 1111-1121
Theorem 2.11. Let h(z) = z +∑∞
n=2 anzn and g(z) = b1z +
∑∞n=2 bnz
n beanalytic in D. Also, let h(z) is starlike with respect to the origin in D, and
f(z) = h(z) + g(z).
If h(z) and g(z) satisfy,
∞∑n=2
n[∣∣(1− β)an + eiαbn
∣∣+∣∣(1 + β)an − eiαbn
∣∣]≤∣∣1− β + eiαb1
∣∣− ∣∣1 + β − eiαb1∣∣
for some real α (|α| < π2) and for some real β, (0 ≤ β ≤ Re(b1e
iα), thenf(z) ∈ S∗HPST (α, β).
Proof. Let p(z) = eiα g′(z)h′(z)
Then, if p(z) satisfies,∣∣∣∣1− (p(z)− β)
1 + (p(z)− β)
∣∣∣∣ < 1
then Rep(z) > β, so that, f(z) ∈ S∗HPST (α, β). It follows that
|1 + (p(z)− β)| − |1− (p(z)− β)|
=1
|h′(z)|[∣∣(1− β)h′(z) + eiαg′(z)
∣∣− ∣∣(1 + β)h′(z)− eiαg′(z)∣∣]
=1
|h′(z)|[
∣∣∣∣∣(1− β + eiαb1) +∞∑n=2
n((1− β)an + eiαbn)zn−1
∣∣∣∣∣− ∣∣(1 + β − eiαb1)
+∞∑n=2
n((1 + β)an − eiαbn)zn−1]
≥ 1
|h′(z)|[∣∣1− β + eiαb1
∣∣− ∞∑n=2
n∣∣(1− β)an + eiαbn |z|n−1
−∣∣1 + β − eiαb1
∣∣− ∞∑n=2
∣∣(1 + β)an − eiαbn |z|n−1∣∣]
>1
|h′(z)|[∣∣1− β + eiαb1
∣∣− ∣∣1 + β − eiαb1∣∣]
9
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1119 Melike Aydogan 1111-1121
−∞∑n=2
n[∣∣(1− β)an + eiαbn
∣∣+∣∣(1 + β)an − eiαbn
∣∣]for z ∈ D. Therefore, if f(z) satisfies,
∞∑n=2
n[∣∣(1− β)an + eiαbn
∣∣+∣∣(1 + β)an − eiαbn
∣∣]≤∣∣1− β + eiαb1
∣∣− ∣∣1 + β − eiαb1∣∣ ,
then f(z) ∈ S∗HPST (α, β).
References
[1] S. D. Bernardi, Convex and Starlike Univalent Functions, Trans. Amer.Math. Soc. 1969, (135), 429-446.
[2] J. Clunie, On Meromorphic Schlicht Functions, J.London. Math. Soc.34, (1959), 215-216.
[3] P. Duren, Harmonic Mapping in the Plane, Cambridge press 2004, Cam-brdige.
[4] A. W. Goodman, Univalent Functions, Volume I and Volume II, Marinerpublishing Company INC, 1983.
[5] H. Lewy, On the non-vanishing of the Jacobian in certain in one-to-onemappings, Bull. Amer. Math. Soc. 42 (1936), 689-692.
[6] S. S. Miller and P. Mocanu, Differential Subordinations, Theory andApplications, Marcel Dekker, 2000, pp. 63.
10
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1120 Melike Aydogan 1111-1121
Melike AydoganDepartment of Mathematics,Isık University, Mesrutiyet Koyu, Sile Istanbul, Turkeye-mail: [email protected]
11
J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC
1121 Melike Aydogan 1111-1121
1122
TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO. 6, 2015
Functional Inequalities Associated With Inner Product Preserving Mappings, Gang Lu, George A. Anastassiou, Choonkil Park, and Yuanfeng Jin,…………………………………………964
Stability and Superstability of (𝑓𝑟 ,𝑓𝑠)-Double Derivations in Quasi-Banach Algebras, Sun Young Jang, Choonkil Park, Pegah Efteghar, and Shahrokh Farhadabadi,…………………………973
The Fixed Point Method for Perturbation of Bihomomorphisms and Biderivations in Normed 3-Lie Systems: Revisited, Choonkil Park, Jung Rye Lee, Eon Wha Shim, and Dong Yun Shin,984
Dynamics of some Rational Difference Equations, H. El-Metwally, E.M. Elsayed, and H. El-Morshedy,………………………………………………………………………………993
Generalized Integration Operators from Hardy Spaces to Zygmund-Type Spaces, Huiying Qu, Yongmin Liu, and Shulei Cheng,……………………………………………………………1004
Approximation Properties of the Modification of Durrmeyer Type q-Baskakov Operators Which Preserve 𝑥2, Qing-Bo Cai,……………………………………………………………………1017
Qualitative Behavior of Two Systems of Second-Order Rational Difference Equations, A. Q. Khan, M. N. Qureshi, and Q. Din,……………………………………………………..1027
Strong Differential Subordination Results Using a Generalized Sălăgean Operator and Ruscheweyh Operator, Andrei Loriana, ……………………………………………………..1042
On Some Differential Sandwich Theorems Using a Generalized Sălăgean Operator and Ruscheweyh Operator, Andrei Loriana,………………………………………………………1049
Subalgebras of BCK/BCI-Algebras Based on (𝛼,𝛽)-type Fuzzy Sets, G. Muhiuddin, and Abdullah M. Al-roqi,………………………………………………………………………….1057
Existence Results for Nonlinear Fractional Integrodifferential Equations with Antiperiodic Type Integral Boundary Conditions, Xiaohong Zuo, and Wengui Yang,………………………….1065
Identities of Symmetry for Higher-Order q-Bernoulli Polynomials, Dae San Kim,Taekyun Kim,…………………………………………………………………………………………..1077
Fuzzy Stability of Functional Equations in Matrix Fuzzy Normed Spaces, Choonkil Park, Dong Yun Shin, and Jung Rye Lee,…………………………………………………………………1089
TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO. 6, 2015
(continued)
On the Stability of Multi-Additive Mappings in Non-Archimedean Normed Spaces, Tian Zhou Xu, Chun Wang, and Themistocles M. Rassias,……………………………………………1102
Notes on Harmonic Functions for Which the Second Dilatation is 𝛼-Spiral, Melike Aydogan,……………………………………………………………………………………1111