journal of computational analysis and applications · 2020-03-02 · journal of computational...

372
Volume 18, Number 5 May 2015 ISSN:1521-1398 PRINT,1572-9206 ONLINE Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC

Upload: others

Post on 01-Jun-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Volume 18, Number 5 May 2015 ISSN:1521-1398 PRINT,1572-9206 ONLINE

Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC

Page 2: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Journal of Computational Analysis and Applications ISSNno.’s:1521-1398 PRINT,1572-9206 ONLINE SCOPE OF THE JOURNAL An international publication of Eudoxus Press, LLC (twelve times annually) Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152-3240, U.S.A [email protected] http://www.msci.memphis.edu/~ganastss/jocaaa The main purpose of "J.Computational Analysis and Applications" is to publish high quality research articles from all subareas of Computational Mathematical Analysis and its many potential applications and connections to other areas of Mathematical Sciences. Any paper whose approach and proofs are computational,using methods from Mathematical Analysis in the broadest sense is suitable and welcome for consideration in our journal, except from Applied Numerical Analysis articles. Also plain word articles without formulas and proofs are excluded. The list of possibly connected mathematical areas with this publication includes, but is not restricted to: Applied Analysis, Applied Functional Analysis, Approximation Theory, Asymptotic Analysis, Difference Equations, Differential Equations, Partial Differential Equations, Fourier Analysis, Fractals, Fuzzy Sets, Harmonic Analysis, Inequalities, Integral Equations, Measure Theory, Moment Theory, Neural Networks, Numerical Functional Analysis, Potential Theory, Probability Theory, Real and Complex Analysis, Signal Analysis, Special Functions, Splines, Stochastic Analysis, Stochastic Processes, Summability, Tomography, Wavelets, any combination of the above, e.t.c. "J.Computational Analysis and Applications" is a peer-reviewed Journal. See the instructions for preparation and submission of articles to JoCAAA. Assistant to the Editor: Dr.Razvan Mezei,Lenoir-Rhyne University,Hickory,NC 28601, USA. Journal of Computational Analysis and Applications(JoCAAA) is published by EUDOXUS PRESS,LLC,1424 Beaver Trail Drive,Cordova,TN38016,USA,[email protected] http//:www.eudoxuspress.com. Annual Subscription Prices:For USA and Canada,Institutional:Print $650, Electronic OPEN ACCESS. Individual:Print $300. For any other part of the world add $100 more(postages) to the above prices for Print. No credit card payments. Copyright©2015 by Eudoxus Press,LLC,all rights reserved.JoCAAA is printed in USA. JoCAAA is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH. It is strictly prohibited the reproduction and transmission of any part of JoCAAA and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes no responsibility for the content of published papers.

754

Page 3: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Editorial Board

Associate Editors of Journal of Computational Analysis and Applications

1) George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152,U.S.A Tel.901-678-3144 e-mail: [email protected] Approximation Theory,Real Analysis, Wavelets, Neural Networks,Probability, Inequalities. 2) J. Marshall Ash Department of Mathematics De Paul University 2219 North Kenmore Ave. Chicago,IL 60614-3504 773-325-4216 e-mail: [email protected] Real and Harmonic Analysis 3) Mark J.Balas Department Head and Professor Electrical and Computer Engineering Dept. College of Engineering University of Wyoming 1000 E. University Ave. Laramie, WY 82071 307-766-5599 e-mail: [email protected] Control Theory,Nonlinear Systems, Neural Networks,Ordinary and Partial Differential Equations, Functional Analysis and Operator Theory

4) Dumitru Baleanu Cankaya University, Faculty of Art and Sciences, Department of Mathematics and Computer Sciences, 06530 Balgat, Ankara, Turkey, [email protected] Fractional Differential Equations Nonlinear Analysis, Fractional Dynamics

5) Carlo Bardaro Dipartimento di Matematica e Informatica

20)Margareta Heilmann Faculty of Mathematics and Natural Sciences University of Wuppertal Gaußstraße 20 D-42119 Wuppertal, Germany, [email protected] wuppertal.de Approximation Theory (Positive Linear Operators) 21) Christian Houdre School of Mathematics Georgia Institute of Technology Atlanta,Georgia 30332 404-894-4398 e-mail: [email protected] Probability, Mathematical Statistics, Wavelets 22) Irena Lasiecka Department of Mathematical Sciences University of Memphis Memphis, TN 38152 P.D.E, Control Theory, Functional Analysis, [email protected]

23) Burkhard Lenze Fachbereich Informatik Fachhochschule Dortmund University of Applied Sciences Postfach 105018 D-44047 Dortmund, Germany e-mail: [email protected] Real Networks, Fourier Analysis,Approximation Theory 24) Hrushikesh N.Mhaskar Department Of Mathematics California State University Los Angeles,CA 90032 626-914-7002 e-mail: [email protected] Orthogonal Polynomials, Approximation Theory,Splines, Wavelets, Neural Networks

755

Page 4: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Universita di Perugia Via Vanvitelli 1 06123 Perugia, ITALY TEL+390755853822 +390755855034 FAX+390755855024 E-mail [email protected] Web site: http://www.unipg.it/~bardaro/ Functional Analysis and Approximation Theory, Signal Analysis, Measure Theory, Real Analysis. 6) Martin Bohner Department of Mathematics and Statistics Missouri S&T Rolla, MO 65409-0020, USA [email protected] web.mst.edu/~bohner Difference equations, differential equations, dynamic equations on time scale, applications in economics, finance, biology. 7) Jerry L.Bona Department of Mathematics The University of Illinois at Chicago 851 S. Morgan St. CS 249 Chicago, IL 60601 e-mail:[email protected] Partial Differential Equations, Fluid Dynamics 8) Luis A.Caffarelli Department of Mathematics The University of Texas at Austin Austin,Texas 78712-1082 512-471-3160 e-mail: [email protected] Partial Differential Equations 9) George Cybenko Thayer School of Engineering Dartmouth College 8000 Cummings Hall, Hanover,NH 03755-8000 603-646-3843 (X 3546 Secr.) e-mail: [email protected] Approximation Theory and Neural Networks 10) Ding-Xuan Zhou Department Of Mathematics City University of Hong Kong

25) M.Zuhair Nashed Department Of Mathematics University of Central Florida PO Box 161364 Orlando, FL 32816-1364 e-mail: [email protected] Inverse and Ill-Posed problems, Numerical Functional Analysis, Integral Equations,Optimization, Signal Analysis 26) Mubenga N.Nkashama Department OF Mathematics University of Alabama at Birmingham Birmingham, AL 35294-1170 205-934-2154 e-mail: [email protected] Ordinary Differential Equations, Partial Differential Equations 27)Svetlozar (Zari) Rachev, Professor of Finance, College of Business,and Director of Quantitative Finance Program, Department of Applied Mathematics & Statistics Stonybrook University 312 Harriman Hall, Stony Brook, NY 11794-3775 Phone: +1-631-632-1998, Email : [email protected] 28) Alexander G. Ramm Mathematics Department Kansas State University Manhattan, KS 66506-2602 e-mail: [email protected] Inverse and Ill-posed Problems, Scattering Theory, Operator Theory, Theoretical Numerical Analysis, Wave Propagation, Signal Processing and Tomography 29) Ervin Y.Rodin Department of Systems Science and Applied Mathematics Washington University,Campus Box 1040 One Brookings Dr.,St.Louis,MO 63130- 4899 314-935-6007 e-mail: [email protected] Systems Theory, Semantic Control, Partial Differential Equations, Calculus of Variations, Optimization

756

Page 5: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

83 Tat Chee Avenue Kowloon,Hong Kong 852-2788 9708,Fax:852-2788 8561 e-mail: [email protected] Approximation Theory, Spline functions,Wavelets 11) Sever S.Dragomir School of Computer Science and Mathematics, Victoria University, PO Box 14428, Melbourne City, MC 8001,AUSTRALIA Tel. +61 3 9688 4437 Fax +61 3 9688 4050 [email protected] Inequalities,Functional Analysis, Numerical Analysis, Approximations, Information Theory, Stochastics. 12) Oktay Duman TOBB University of Economics and Technology, Department of Mathematics, TR-06530, Ankara, Turkey, [email protected] Classical Approximation Theory, Summability Theory, Statistical Convergence and its Applications 13) Saber N.Elaydi Department Of Mathematics Trinity University 715 Stadium Dr. San Antonio,TX 78212-7200 210-736-8246 e-mail: [email protected] Ordinary Differential Equations, Difference Equations 14) Augustine O.Esogbue School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta,GA 30332 404-894-2323 e-mail: [email protected] Control Theory,Fuzzy sets, Mathematical Programming, Dynamic Programming,Optimization 15) Christodoulos A.Floudas Department of Chemical Engineering Princeton University

and Artificial Intelligence, Operations Research, Math.Programming 30) T. E. Simos Department of Computer Science and Technology Faculty of Sciences and Technology University of Peloponnese GR-221 00 Tripolis, Greece Postal Address: 26 Menelaou St. Anfithea - Paleon Faliron GR-175 64 Athens, Greece [email protected] Numerical Analysis 31) I. P. Stavroulakis Department of Mathematics University of Ioannina 451-10 Ioannina, Greece [email protected] Differential Equations Phone +3 0651098283 32) Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock,Germany [email protected] rostock.de Numerical Fourier Analysis, Fourier Analysis,Harmonic Analysis, Signal Analysis, Spectral Methods, Wavelets, Splines, Approximation Theory 33) Roberto Triggiani Department of Mathematical Sciences University of Memphis Memphis, TN 38152 P.D.E, Control Theory, Functional Analysis, [email protected]

34) Gilbert G.Walter Department Of Mathematical Sciences University of Wisconsin-Milwaukee,Box 413, Milwaukee,WI 53201-0413 414-229-5077 e-mail: [email protected] Distribution Functions, Generalised Functions, Wavelets 35) Xin-long Zhou Fachbereich Mathematik, Fachgebiet Informatik Gerhard-Mercator-Universitat Duisburg

757

Page 6: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Princeton,NJ 08544-5263 609-258-4595(x4619 assistant) e-mail: [email protected] OptimizationTheory&Applications, Global Optimization 16) J.A.Goldstein Department of Mathematical Sciences The University of Memphis Memphis,TN 38152 901-678-3130 e-mail:[email protected] Partial Differential Equations, Semigroups of Operators 17) H.H.Gonska Department of Mathematics University of Duisburg Duisburg, D-47048 Germany 011-49-203-379-3542 e-mail:[email protected] duisburg.de Approximation Theory, Computer Aided Geometric Design 18) John R. Graef Department of Mathematics University of Tennessee at Chattanooga Chattanooga, TN 37304 USA [email protected] Ordinary and functional differential equations, difference equations, impulsive systems, differential inclusions, dynamic equations on time scales , control theory and their applications 19) Weimin Han Department of Mathematics University of Iowa Iowa City, IA 52242-1419 319-335-0770 e-mail: [email protected] Numerical analysis, Finite element method, Numerical PDE, Variational inequalities, Computational mechanics NEW MEMBERS 39)Xing-Biao Hu Institute of Computational Mathematics AMSS, Chinese Academy of Sciences Beijing, 100190, CHINA [email protected] Computational Mathematics

Lotharstr.65,D-47048 Duisburg,Germany e-mail:[email protected] duisburg.de Fourier Analysis,Computer-Aided Geometric Design, Computational Complexity, Multivariate Approximation Theory, Approximation and Interpolation Theory 36) Xiang Ming Yu Department of Mathematical Sciences Southwest Missouri State University Springfield,MO 65804-0094 417-836-5931 e-mail: [email protected] Classical Approximation Theory, Wavelets 37) Lotfi A. Zadeh Professor in the Graduate School and Director, Computer Initiative, Soft Computing (BISC) Computer Science Division University of California at Berkeley Berkeley, CA 94720 Office: 510-642-4959 Sec: 510-642-8271 Home: 510-526-2569 FAX: 510-642-1712 e-mail: [email protected] Fuzzyness, Artificial Intelligence, Natural language processing, Fuzzy logic 38) Ahmed I. Zayed Department Of Mathematical Sciences DePaul University 2320 N. Kenmore Ave. Chicago, IL 60614-3250 773-325-7808 e-mail: [email protected] Shannon sampling theory, Harmonic analysis and wavelets, Special functions and orthogonal polynomials, Integral transforms 40) Choonkil Park Department of Mathematics Hanyang University Seoul 133-791 S.Korea, [email protected] Functional Equations

758

Page 7: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Instructions to Contributors

Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC, of TN.

Editor in Chief: George Anastassiou

Department of Mathematical Sciences University of Memphis

Memphis, TN 38152-3240, U.S.A.

1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves. 2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.

759

Page 8: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corollaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,

760

Page 9: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990). Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986. Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495. 11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears. 15. This journal will consider for publication only papers that contain proofs for their listed results.

761

Page 10: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

An umbral calculus approach to poly-Cauchypolynomials with a q parameter

Dae San KimDepartment of Mathematics, Sogang University

Seoul 121-741, Republic of [email protected]

Taekyun KimDepartment of Mathematics, Kwangwoon University

Seoul 139-701, Republic of [email protected]

Takao Komatsu ∗

Graduate School of Science and Technology, Hirosaki UniversityHirosaki 036-8561, Japan

[email protected]

Jong-Jin SeoDepartment of Applied Mathematics, Pukyong National University

Pusan 608-739, Republic of [email protected]

MR Subject Classifications: 05A15, 05A40, 11B68, 11B75, 65Q05

Abstract

In this paper, we investigate the properties of the poly-Cauchy polynomialswith a q parameter which were studied by the third named author, and give vari-ous identities with Bernoulli polynomials, Korobov polynomials, Stirling numbers,Frobenius-Euler polynomials, falling and rising factorials by an umbral calculus ap-proach.

∗The third author was supported in part by the Grant-in-Aid for Scientific research (C) (No.22540005),the Japan Society for the Promotion of Science.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

762 Dae San Kim et al 762-792

Page 11: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

1 Introduction

Let n, k be integers with n ≥ 0, and let q be a real number with q 6= 0. The poly-Cauchynumbers with a q parameter of the first kind c

(k)n,q and of the second kind c

(k)n,q are defined

by

c(k)n,q(z) =

∫ 1

0

. . .

∫ 1

0︸ ︷︷ ︸k

(x1x2 . . . xk − z)(x1x2 . . . xk − q − z)

. . . (x1x2 . . . xk − (n − 1)q − z)dx1dx2 . . . dxk

and

c(k)n,q(z) =

∫ 1

0

. . .

∫ 1

0︸ ︷︷ ︸k

(−x1x2 . . . xk + z)(−x1x2 . . . xk − q + z)

. . . (−x1x2 . . . xk − (n − 1)q + z)dx1dx2 . . . dxk ,

respectively ([9]). The generating function of the poly-Cauchy polynomials with a q

parameter of the first kind c(k)n,q(z) and of the second kind c

(k)n,q(z) are given by

(1 + qt)−z/qLifk

(ln(1 + qt)

q

)=

∞∑n=0

c(k)n,q(z)

tn

n!,

and

(1 + qt)z/qLifk

(− ln(1 + qt)

q

)=

∞∑n=0

c(k)n,q(z)

tn

n!,

respectively ([9, Theorem 6]), where

Lifk(z) :=∞∑

m=0

zm

m!(m + 1)k

is the polylogarithm factorial function (or simply polyfactorial function), which is intro-

duced in [8, 9]. If q = 1, then c(k)n,1(z) = c

(k)n (z) and c

(k)n,1(z) = c

(k)n (z) are the poly-Cauchy

polynomials of the first kind and of the second kind, respectively ([2]). Notice that z is

replaced by −z in [2]. If q = 1 and z = 0, then c(k)n,1(0) = c

(k)n and c

(k)n,1(0) = c

(k)n are

the poly-Cauchy numbers of the first kind and of the second kind, respectively ([8]). If

q = k = 1 and z = 0, then c(1)n,1(0) = cn and c

(1)n,1(0) = cn are the classical Cauchy numbers

of the first kind and of the second kind, respectively (see e.g. [1, 15]). The concept aboutthe poly-Cauchy numbers and polynomials have been introduced, and the characteristicand combinatorial properties have been investigated ([2, 8, 9, 10, 11, 12, 13]).

The falling factorial is defined by

(x)n = x(x − 1) · · · (x − n + 1) =n∑

l=0

s(n, l)xl ,

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

763 Dae San Kim et al 762-792

Page 12: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

where s(n, l) is the signed Stirling number of the first kind. The rising factorial is definedby

(x)(n) = x(x + 1) · · · (x + n − 1) =n∑

l=0

(−1)n−ls(n, l)xl .

Recently, the method of umbral calculus has been introduced to yield various identitiesin the study of poly-Cauchy numbers ([6, ?]) as well as that of poly-Bernoulli polynomials([5]). In this paper, we investigate the properties of the poly-Cauchy polynomials with aq parameter of the first kind and of the second kind with umbral calculus viewpoint, givevarious identities with Bernoulli polynomials, Korobov polynomials, Stirling numbers,Frobenius-Euler polynomials, falling and rising factorials.

2 Umbral calculus

Let C be the complex number field and let F be the set of all formal power series in thevariable t:

F =

f(t) =

∞∑k=0

ak

k!tk

∣∣∣∣∣ak ∈ C

. (1)

Let P = C[x] and let P∗ be the vector space of all linear functionals on P. 〈L|p(x)〉 isthe action of the linear functional L on the polynomial p(x), and we recall that the vectorspace operations on P∗ are defined by 〈L + M |p(x)〉 = 〈L|p(x)〉 + 〈M |p(x)〉, 〈cL|p(x)〉 =c 〈L|p(x)〉, where c is a complex constant in C. For f(t) ∈ F , let us define the linearfunctional on P by setting

〈f(t)|xn〉 = an, (n ≥ 0). (2)

In particular, ⟨tk|xn

⟩= n!δn,k (n, k ≥ 0), (3)

where δn,k is the Kronecker’s symbol.

For fL(t) =∑∞

k=0

〈L|xk〉k!

tk, we have 〈fL(t)|xn〉 = 〈L|xn〉. That is, L = fL(t). The mapL 7→ fL(t) is a vector space isomorphism from P∗ onto F . Henceforth, F denotes boththe algebra of formal power series in t and the vector space of all linear functionals onP, and so an element f(t) of F will be thought of as both a formal power series and alinear functional. We call F the umbral algebra and the umbral calculus is the study ofumbral algebra. The order O

(f(t)

)of a power series f(t)(6= 0) is the smallest integer k

for which the coefficient of tk does not vanish. If O(f(t)

)= 1, then f(t) is called a delta

series; if O(f(t)

)= 0, then f(t) is called an invertible series. For f(t), g(t) ∈ F with

O(f(t)

)= 1 and O

(g(t)

)= 0, there exists a unique sequence sn(x) (deg sn(x) = n) such

that⟨g(t)f(t)k|sn(x)

⟩= n!δn,k for n, k ≥ 0. Such a sequence sn(x) is called the Sheffer

sequence for(g(t), f(t)

)which is denoted by sn(x) ∼

(g(t), f(t)

).

For f(t), g(t) ∈ F and p(x) ∈ P, we have

〈f(t)g(t)|p(x)〉 = 〈f(t)|g(t)p(x)〉 = 〈g(t)|f(t)p(x)〉 (4)

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

764 Dae San Kim et al 762-792

Page 13: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

and

f(t) =∞∑

k=0

⟨f(t)|xk

⟩ tk

k!, p(x) =

∞∑k=0

⟨tk|p(x)

⟩ xk

k!(5)

([16, Theorem 2.2.5]). Thus, by (5), we get

tkp(x) = p(k)(x) =dkp(x)

dxkand eytp(x) = p(x + y). (6)

Sheffer sequences are characterized in the generating function ([16, Theorem 2.3.4]).

Lemma 1 The sequence sn(x) is Sheffer for(g(t), f(t)

)if and only if

1

g(f(t)

)eyf(t) =∞∑

k=0

sk(y)

k!tk (y ∈ C) ,

where f(t) is the compositional inverse of f(t).

For sn(x) ∼(g(t), f(t)

), we have the following equations ([16, Theorem 2.3.7, Theorem

2.3.5, Theorem 2.3.9]):

f(t)sn(x) = nsn−1(x) (n ≥ 0), (7)

sn(x) =n∑

j=0

1

j!

⟨g(f(t)

)−1f(t)j|xn

⟩xj, (8)

sn(x + y) =n∑

j=0

(n

j

)sj(x)pn−j(y) , (9)

where pn(x) = g(t)sn(x).Assume that pn(x) ∼

(1, f(t)

)and qn(x) ∼

(1, g(t)

). Then the transfer formula ([16,

Corollary 3.8.2]) is given by

qn(x) = x

(f(t)

g(t)

)n

x−1pn(x) (n ≥ 1).

For sn(x) ∼(g(t), f(t)

)and rn(x) ∼

(h(t), l(t)

), assume that

sn(x) =n∑

m=0

Cn,mrn(x) (n ≥ 0) ,

Then we have ([16, p.132])

Cn,m =1

m!

⟨h(f(t)

)g(f(t)

) l(f(t))m∣∣∣∣∣xn

⟩. (10)

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

765 Dae San Kim et al 762-792

Page 14: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

3 Main results

It is immediate to see that c(k)n,q(z) is the Sheffer sequence for the pair(g(t) =

1

Lifk(−t), f(t) =

e−qt − 1

q

)or

c(k)n,q(z) ∼

(1

Lifk(−t),e−qt − 1

q

), (11)

and c(k)n,q(z) is that for the pair(

g(t) =1

Lifk(−t), f(t) =

eqt − 1

q

),

or

c(k)n,q(z) ∼

(1

Lifk(−t),eqt − 1

q

)(12)

because f(t) = − ln(1 + qt)/q and f(t) = ln(1 + qt)/q, respectively in Lemma 1.

When x = 0, c(k)n,q = c

(k)n,q(0) (respectively, c

(k)n,q = c

(k)n,q(0)) are called the poly-Cauchy

numbers of the first kind (respectively, the poly-Cauchy numbers of the second kind).

3.1 Explicit expressions

It is known that (x

q

)(n)

=x

q

(x

q+ 1

)· · ·(

x

q+ n − 1

)∼ (1, 1 − e−qt) .

So,

n!δn,k =

⟨(1 − e−qt)k

∣∣∣∣∣(

x

q

)(n)⟩

=

⟨(e−qt − 1

q

)k∣∣∣∣∣(−q)n

(x

q

)(n)⟩

,

yielding that

(−q)n

(x

q

)(n)

∼(

1,e−qt − 1

q

).

Similarly, by (x

q

)n

=x

q

(x

q− 1

)· · ·(

x

q− n + 1

)∼ (1, 1 − e−qt)

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

766 Dae San Kim et al 762-792

Page 15: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

we get

n!δn,k =

⟨(eqt − 1)k

∣∣∣∣∣(

x

q

)n

=

⟨(eqt − 1

q

)k∣∣∣∣∣qn

(x

q

)n

⟩,

yielding that

qn

(x

q

)n

∼(

1,eqt − 1

q

).

First, we shall show the following results by the different methods derived from theumbral calculus, which have been already obtained in [9, Theorem 5].

Theorem 1 For integers n and k with n ≥ 0, we have

c(k)n,q(x) =

n∑m=0

s(n,m)qn−m

m∑j=0

(m

j

)(−x)j

(m − j + 1)k,

c(k)n,q(x) =

n∑m=0

(−1)ms(n,m)qn−m

m∑j=0

(m

j

)(−x)j

(m − j + 1)k

Proof. Since

1

Lifk(−t)c(k)n,q(x) = (−q)n

(x

q

)(n)

∼(

1,e−qt − 1

q

),

we have

c(k)n,q(x) = (−q)nLifk(−t)

(x

q

)(n)

= (−q)nLifk(−t)n∑

m=0

(−1)n−ms(n,m)

(x

q

)m

= qn

n∑m=0

(−q−1)ms(n,m)Lifk(−t)xm

= qn

n∑m=0

(−q−1)ms(n,m)m∑

i=0

(−1)i

i!(i + 1)ktixm

= qn

n∑m=0

(−q−1)ms(n,m)m∑

i=0

(−1)i(

mi

)(i + 1)k

xm−i

= qn

n∑m=0

m∑j=0

(−q−1)ms(n,m)(−1)m−j

(mj

)(m − j + 1)k

xj

=n∑

m=0

s(n,m)qn−m

m∑j=0

(m

j

)(−x)j

(m − j + 1)k.

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

767 Dae San Kim et al 762-792

Page 16: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Since1

Lifk(−t)c(k)n,q(x) = (−q)n

(x

q

)n

∼(

1,eqt − 1

q

),

we have

c(k)n,q(x) = qnLifk(−t)

(x

q

)n

= qnLifk(−t)n∑

m=0

s(n,m)

(x

q

)m

=n∑

m=0

s(n,m)qn−mLifk(−t)xm

=n∑

m=0

s(n,m)qn−m

m∑i=0

(−1)i(

mi

)(i + 1)k

xm−i

=n∑

m=0

s(n,m)qn−m

m∑j=0

(−1)m−j(

mj

)(m − j + 1)k

xj

=n∑

m=0

(−1)ms(n,m)qn−m

m∑j=0

(m

j

)(−x)j

(m − j + 1)k.

Proof of Theorem 1 (A different version). As the second different proof, we use theconjugation formula (8).

Since g(t) = 1/Lifk(−t) and f(t) = − ln(1 + qt)/q for sn = c(k)n,q(x), by (8) we get

c(k)n,q(x) =

n∑j=0

1

j!

⟨Lifk

(ln(1 + qt)

q

)(− ln(1 + qt)

q

)j∣∣∣∣∣xn

⟩xj .

Here,⟨Lifk

(ln(1 + qt)

q

)(− ln(1 + qt)

q

)j∣∣∣∣∣xn

=

n−j∑m=0

(−1)j

m!(m + 1)kqm+j

⟨(ln(1 + qt)

)m+j∣∣∣xn⟩

=

n−j∑m=0

(−1)j

m!(m + 1)kqm+j

n−m−j∑l=0

(m + j)!

(l + m + j)!s(l + m + j,m + j)

⟨(qt)l+m+j|xn

⟩=

n−j∑m=0

(−1)j

m!(m + 1)kqm+j

n−m−j∑l=0

(m + j)!

(l + m + j)!ql+m+js(l + m + j, m + j)(l + m + j)!δl+m+j,n

=

n−j∑m=0

(−1)j(m + j)!qn

m!(m + 1)kqm+js(n,m + j) .

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

768 Dae San Kim et al 762-792

Page 17: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Therefore,

c(k)n,q(x) =

n∑j=0

(n−j∑m=0

(−1)j(

m+jm

)qn

(m + 1)kqm+js(n,m + j)

)xj

=n∑

j=0

(n∑

m=j

(−1)j(

mj

)qn

(m − j + 1)kqms(n,m)

)xj

=n∑

m=0

s(n,m)qn−m

m∑j=0

(m

j

)(−x)j

(m − j + 1)k.

Since g(t) = 1/Lifk(−t) and f(t) = ln(1 + qt)/q for sn = c(k)n,q(x), by (8) we get

c(k)n,q(x) =

n∑j=0

1

j!

⟨Lifk

(− ln(1 + qt)

q

)(ln(1 + qt)

q

)j∣∣∣∣∣xn

⟩xj .

Here,⟨Lifk

(− ln(1 + qt)

q

)(ln(1 + qt)

q

)j∣∣∣∣∣xn

=

n−j∑m=0

(−1)m

m!(m + 1)kqm+j

⟨(ln(1 + qt)

)m+j∣∣∣xn⟩

=

n−j∑m=0

(−1)m

m!(m + 1)kqm+j

n−m−j∑l=0

(m + j)!

(l + m + j)!ql+m+js(l + m + j, m + j)(l + m + j)!δl+m+j,n

=

n−j∑m=0

(−1)m(m + j)!qn

m!(m + 1)kqm+js(n,m + j) .

Therefore,

c(k)n,q(x) =

n∑j=0

(n−j∑m=0

(−1)m(

m+jm

)qn

(m + 1)kqm+js(n,m + j)

)xj

=n∑

j=0

(n∑

m=j

(−1)m−j(

mj

)qn

(m − j + 1)kqms(n,m)

)xj

=n∑

m=0

(−1)ms(n,m)qn−m

m∑j=0

(m

j

)(−x)j

(m − j + 1)k.

We shall show the formulae for the poly-Cauchy polynomials with a q parameter interms of Bernoulli polynomials B

(r)n (x) of order r, defined by(t

et − 1

)r

ext =∞∑

n=0

B(r)n (x)

n!tn (13)

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

769 Dae San Kim et al 762-792

Page 18: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

(see e.g. [16, Section 2.2]). Observe that for any formal power series g(t) =∑∞

m=0 bmtm/m!

p(x) = g(t)xn, g(at)xn = anp(x

a

)(n ≥ 0, a 6= 0)

because t as the differential operator,

p(x) =∞∑

m=0

bmtm

m!xn

=∞∑

m=0

bm

(n

m

)xn−m

and

g(at)xn =∞∑

m=0

bm(at)m

m!xn

=∞∑

m=0

bmam

(n

m

)xn−m

= an

∞∑m=0

bm

(n

m

)(x

a

)n−m

= anp(x

a

).

Theorem 2 For integers n and k with n ≥ 1, we have

c(k)n,q(x) =

n∑j=0

(−1)j

n−j∑l=0

(n−1

l

)(n−lj

)(n − l − j + 1)k

qlB(n)l xj ,

c(k)n,q(x) = (−1)n

n∑j=0

(−1)j

n−j∑l=0

(−1)l(

n−1l

)(n−lj

)(n − l − j + 1)k

qlB(n)l xj .

Proof. Since1

Lifk(−t)c(k)n,q(x) ∼

(1,

e−qt − 1

q

)and xn ∼ (1, t), for n ≥ 1 we have

1

Lifk(−t)c(k)n,q(x) = x

(t

(e−qt − 1)/q

)n

x−1xn

= (−1)nx

(−qt

e−qt − 1

)n

xn−1

= (−1)n

n−1∑l=0

(n − 1

l

)B

(n)l (−q)lxn−l

= (−1)n

n∑l=0

(n − 1

l

)B

(n)l (−q)lxn−l .

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

770 Dae San Kim et al 762-792

Page 19: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Thus,

c(k)n,q(x) = (−1)n

n∑l=0

(n − 1

l

)B

(n)l (−q)lLifk(−t)xn−l

= (−1)n

n∑l=0

n−l∑m=0

(−1)m(

n−1l

)(n−lm

)(m + 1)k

(−q)lB(n)l xn−l−m

= (−1)n

n∑l=0

n−l∑j=0

(−1)n−j(

n−1l

)(n−lj

)(n − l − j + 1)k

qlB(n)l xj

=n∑

j=0

(−1)j

n−j∑l=0

(n−1

l

)(n−lj

)(n − l − j + 1)k

qlB(n)l xj .

Since1

Lifk(−t)c(k)n,q(x) ∼

(1,

eqt − 1

q

)and xn ∼ (1, t), for n ≥ 1 we have

1

Lifk(−t)c(k)n,q(x) = x

(t

(eqt − 1)/q

)n

x−1xn

= x

(qt

eqt − 1

)n

xn−1

=n−1∑l=0

(n − 1

l

)B

(n)l qlxn−l

=n∑

l=0

(n − 1

l

)B

(n)l qlxn−l .

Thus,

c(k)n,q(x) =

n∑l=0

(n − 1

l

)B

(n)l qlLifk(−t)xn−l

= sumnl=0

n−l∑m=0

(−1)m(

n−1l

)(n−lm

)(m + 1)k

qlB(n)l xn−l−m

= sumnl=0

n−l∑j=0

(−1)n−l−j(

n−1l

)(n−lj

)(n − l − j + 1)k

qlB(n)l xj

= (−1)n

n∑j=0

(−1)j

n−j∑l=0

(−1)l(

n−1l

)(n−lj

)(n − l − j + 1)k

qlB(n)l xj .

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

771 Dae San Kim et al 762-792

Page 20: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

3.2 Sheffer identities

Theorem 3

c(k)n,q(x + y) =

n∑j=0

(n

j

)(−q)n−jc

(k)j,q (x)

(y

q

)(n−j)

,

c(k)n,q(x + y) =

n∑j=0

(n

j

)qn−j c

(k)j,q (x)

(y

q

)n−j

.

Proof. Put sn = c(k)n,q with (11) in (9). Since

pn(x) =1

Lifk(−t)c(k)n,q(x)

= (−q)n

(x

q

)(n)

∼(1,

e−qt − 1

q

).

Thus,

c(k)n,q(x + y) =

n∑j=0

(n

j

)c(k)j,q (x)(−q)n−j

(y

q

)(n−j)

.

Put sn = c(k)n,q with (12) in (9). Since

pn(x) =1

Lifk(−t)c(k)n,q(x)

= qn

(x

q

)n

∼(1,

eqt − 1

q

).

Thus,

c(k)n,q(x + y) =

n∑j=0

(n

j

)c(k)j,q (x)qn−j

(y

q

)n−j

.

3.3 Recurrence relations

Theorem 4 For integers n and k with n ≥ 0, we have

c(k)n,q(x − q) − c(k)

n,q(x) = nqc(k)n−1,q(x) ,

c(k)n,q(x + q) − c(k)

n,q(x) = nqc(k)n−1,q(x) .

Proof. Put sn = c(k)n,q in (7). Then(

e−qt − 1

q

)c(k)n,q(x) = nc

(k)n−1,q(x) .

11

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

772 Dae San Kim et al 762-792

Page 21: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

So, we get the first relation.Put sn = c

(k)n,q in (7). Then (

eqt − 1

q

)c(k)n,q(x) = nc

(k)n−1,q(x) .

So, we get the second relation.

3.4 Differentiations

The following results ([9, Proposition 2]) can be also obtained by using the umbral calcu-lus.

Theorem 5 For integers n and k with n ≥ 0, we have

d

dxc(k)n,q(x) = −n!

n−1∑l=0

(−q)n−l−1

(n − l)l!c(k)l,q (x) ,

d

dxc(k)n,q(x) = n!

n−1∑l=0

(−q)n−l−1

(n − l)l!c(k)l,q (x) .

We use a formula for sn(x) in terms of sl(x).

Lemma 2 For sn(x) ∼(g(t), f(t)

),

d

dxsn(x) =

n−1∑l=0

(n

l

)⟨f(t)|xn−l

⟩sl(x) .

Proof of Theorem 5. Since f(t) = − ln(1 + qt)/q for sn = c(k)n,q, by Lemma 2

d

dxc(k)n,q(x) =

n−1∑l=0

(n

l

)⟨− ln(1 + qt)

q

∣∣∣∣∣xn−l

⟩c(k)l,q (x)

= −1

q

n−1∑l=0

(n

l

)⟨ ∞∑j=1

(−1)j−1qjtj

j

∣∣∣∣∣xn−l

⟩c(k)l,q (x)

= −1

q

n−1∑l=0

(n

l

)(−1)n−l−1qn−l

n − l(n − l)!c

(k)l,q (x)

= −n!n−1∑l=0

(−q)n−l−1

(n − l)l!c(k)l,q (x) .

12

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

773 Dae San Kim et al 762-792

Page 22: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Since f(t) = ln(1 + qt)/q for sn = c(k)n,q, by Lemma 2

d

dxc(k)n,q(x) =

n−1∑l=0

(n

l

)⟨ln(1 + qt)

q

∣∣∣∣∣xn−l

⟩c(k)l,q (x)

=1

q

n−1∑l=0

(n

l

)⟨ ∞∑j=1

(−1)j−1qjtj

j

∣∣∣∣∣xn−l

⟩c(k)l,q (x)

=1

q

n−1∑l=0

(n

l

)(−1)n−l−1qn−l

n − l(n − l)!c

(k)l,q (x)

= n!n−1∑l=0

(−q)n−l−1

(n − l)l!c(k)l,q (x) .

3.5 Recurrence relations including Cauchy numbers

Theorem 6

c(k)n,q(x) = −xc

(k)n−1,q(x + q) +

1

n

n−1∑l=0

(n

l

)qlcl

(c(k−1)n−l (x + q) − c

(k)n−l(x + q)

),

c(k)n,q(x) = xc

(k)n−1,q(x − q) +

1

n

n−1∑l=0

(n

l

)qlcl

(c(k−1)n−l (x − q) − c

(k)n−l(x − q)

).

13

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

774 Dae San Kim et al 762-792

Page 23: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Proof. By (2),

c(k)n,q(y) =

⟨∞∑l=0

c(k)l,q (y)

tl

l!

∣∣∣∣∣xn

=

⟨(1 + qt)−y/qLifk

(ln(1 + qt)

q

)∣∣∣∣∣xn

=

⟨(1 + qt)−y/qLifk

(ln(1 + qt)

q

)∣∣∣∣∣x · xn−1

=

⟨∂t

((1 + qt)−y/qLifk

(ln(1 + qt)

q

)) ∣∣∣∣∣xn−1

=

⟨(∂t(1 + qt)−y/q

)Lifk

(ln(1 + qt)

q

)∣∣∣∣∣xn−1

+

⟨(1 + qt)−y/q

(∂tLifk

(ln(1 + qt)

q

)) ∣∣∣∣∣xn−1

= −y

⟨(1 + qt)−(y+q)/qLifk

(ln(1 + qt)

q

)∣∣∣∣∣xn−1

+ q

⟨(1 + qt)−(y+q)/q

Lifk−1

( ln(1+qt)q

)− Lifk

( ln(1+qt)q

)qt

∣∣∣∣∣ qt

ln(1 + qt)xn−1

⟩.

Since the generating function of the classical Cauchy numbers of the first kind cn is givenby

t

ln(1 + t)=

∞∑n=0

cntn

n!

14

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

775 Dae San Kim et al 762-792

Page 24: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

(see e.g. [1, 8, 15]), we have

c(k)n,q(y) = −yc

(k)n−1,q(y + q)

+ q

⟨(1 + qt)−(y+q)/q

Lifk−1

( ln(1+qt)q

)− Lifk

( ln(1+qt)q

)qt

∣∣∣∣∣n−1∑l=0

(n − 1

l

)qlclx

n−l−1

= −yc(k)n−1,q(y + q) + q

n−1∑l=0

(n − 1

l

)qlcl

×

⟨(1 + qt)−(y+q)/q

Lifk−1

( ln(1+qt)q

)− Lifk

( ln(1+qt)q

)qt

∣∣∣∣∣t(

xn−l

n − l

)⟩

= −yc(k)n−1,q(y + q) +

n−1∑l=0

(n − 1

l

)1

n − lqlcl

×

⟨(1 + qt)−(y+q)/q

(Lifk−1

( ln(1 + qt)

q

)− Lifk

( ln(1 + qt)

q

)) ∣∣∣∣∣xn−l

= −yc(k)n−1,q(y + q) +

1

n

n−1∑l=0

(n

l

)qlcl

(c(k−1)n−l (y + q) − c

(k)n−l(y + q)

).

Thus, we get the first relation.

15

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

776 Dae San Kim et al 762-792

Page 25: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Similarly, by (2),

c(k)n,q(y) =

⟨∞∑l=0

c(k)l,q (y)

tl

l!

∣∣∣∣∣xn

=

⟨(1 + qt)y/qLifk

(− ln(1 + qt)

q

)∣∣∣∣∣xn

=

⟨(1 + qt)y/qLifk

(− ln(1 + qt)

q

)∣∣∣∣∣x · xn−1

=

⟨∂t

((1 + qt)y/qLifk

(− ln(1 + qt)

q

)) ∣∣∣∣∣xn−1

=

⟨(∂t(1 + qt)y/q

)Lifk

(− ln(1 + qt)

q

)∣∣∣∣∣xn−1

+

⟨(1 + qt)y/q

(∂tLifk

(− ln(1 + qt)

q

)) ∣∣∣∣∣xn−1

= y

⟨(1 + qt)(y−q)/qLifk

(− ln(1 + qt)

q

)∣∣∣∣∣xn−1

+ q

⟨(1 + qt)(y−q)/q

Lifk−1

(− ln(1+qt)q

)− Lifk

(− ln(1+qt)q

)qt

∣∣∣∣∣ qt

ln(1 + qt)xn−1

⟩.

Sinceqt

ln(1 + qt)xn−1 =

n−1∑l=0

(n − 1

l

)qlclx

n−l−1 ,

we have

c(k)n,q(y) = yc

(k)n−1,q(y − q) + q

n−1∑l=0

(n − 1

l

)qlcl

×

⟨(1 + qt)(y−q)/q

Lifk−1

(− ln(1+qt)q

)− Lifk

(− ln(1+qt)q

)qt

∣∣∣∣∣t(

xn−l

n − l

)⟩

= yc(k)n−1,q(y − q) +

n−1∑l=0

(n − 1

l

)1

n − lqlcl

×

⟨(1 + qt)(y−q)/q

(Lifk−1

(− ln(1 + qt)

q

)− Lifk

(− ln(1 + qt)

q

)) ∣∣∣∣∣xn−l

= yc(k)n−1,q(y − q) +

1

n

n−1∑l=0

(n

l

)qlcl

(c(k−1)n−l (y − q) − c

(k)n−l(y − q)

).

Thus, we get the second relation.

16

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

777 Dae San Kim et al 762-792

Page 26: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

3.6 More recurrence relations

Theorem 7 For integers n and k with n ≥ 1, we have

n∑m=1

(−q)m−1(m − 1)!

(n

m

)c(k)n−m,q =

n∑m=1

(−q)m−1(m − 1)!

(n − 1

m − 1

)c(k−1)n−m,q ,

n∑m=1

(−q)m−1(m − 1)!

(n

m

)c(k)n−m,q =

n∑m=1

(−q)m−1(m − 1)!

(n − 1

m − 1

)c(k−1)n−m,q .

Proof. We shall compute ⟨ln(1 + qt)

qLifk

(ln(1 + qt)

q

)∣∣∣∣∣xn

in two different ways. On the one hand,⟨ln(1 + qt)

qLifk

(ln(1 + qt)

q

)∣∣∣∣∣xn

=1

q

⟨Lifk

(ln(1 + qt)

q

)∣∣∣∣∣ ln(1 + qt)xn

=1

q

⟨Lifk

(ln(1 + qt)

q

)∣∣∣∣∣∞∑

m=1

(−1)m−1(qt)m

mxn

=1

q

⟨Lifk

(ln(1 + qt)

q

)∣∣∣∣∣n∑

m=1

(−1)m−1(m − 1)!qm

(n

m

)xn−m

=n∑

m=1

(−1)m−1(m − 1)!qm−1

(n

m

)⟨Lifk

(ln(1 + qt)

q

)∣∣∣∣∣xn−m

=n∑

m=1

(−1)m−1(m − 1)!qm−1

(n

m

)⟨ ∞∑i=0

c(k)i,q

ti

i!

∣∣∣∣∣xn−m

=n∑

m=1

(−1)m−1(m − 1)!qm−1

(n

m

)c(k)n−m,q .

17

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

778 Dae San Kim et al 762-792

Page 27: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

On the other hand, ⟨ln(1 + qt)

qLifk

(ln(1 + qt)

q

)∣∣∣∣∣xn

=

⟨∫ t

0

(ln(1 + qs)

qLifk

(ln(1 + qs)

q

))′

ds

∣∣∣∣∣xn

=

⟨∫ t

0

Lifk−1

( ln(1+qs)q

)1 + qs

ds

∣∣∣∣∣xn

=

⟨∫ t

0

(∞∑i=0

(−qs)i

)(∞∑

j=0

c(k−1)j,q

sj

j!

)ds

∣∣∣∣∣xn

=

⟨∫ t

0

(∞∑

r=0

r∑j=0

(−q)r−jc(k−1)j,q

sr

j!

)ds

∣∣∣∣∣xn

=

⟨∞∑

r=0

r∑j=0

(−q)r−jc(k−1)j,q

tr+1

j!(r + 1)

∣∣∣∣∣xn

=n−1∑j=0

(−q)n−j−1c(k−1)j,q

n!

j!n

= (n − 1)!n−1∑m=0

(−q)n−m−1

m!c(k−1)m,q .

Thus, for n ≥ 1, we obtain

n∑m=1

(−1)m−1(m − 1)!qm−1

(n

m

)c(k)n−m,q = (n − 1)!

n∑m=1

(−q)m−1

(n − m)!c(k−1)n−m,q .

Similarly, we shall compute⟨− ln(1 + qt)

qLifk

(− ln(1 + qt)

q

)∣∣∣∣∣xn

18

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

779 Dae San Kim et al 762-792

Page 28: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

in two different ways. On the one hand, it is equal to

− 1

q

⟨Lifk

(− ln(1 + qt)

q

)∣∣∣∣∣ ln(1 + qt)xn

=n∑

m=1

(−1)m(m − 1)!qm−1

(n

m

)⟨Lifk

(− ln(1 + qt)

q

)∣∣∣∣∣xn−m

=n∑

m=1

(−1)m(m − 1)!qm−1

(n

m

)⟨ ∞∑i=0

c(k)i,q

ti

i!

∣∣∣∣∣xn−m

=n∑

m=1

(−1)m(m − 1)!qm−1

(n

m

)c(k)n−m,q .

On the other hand, it is equal to⟨∫ t

0

(− ln(1 + qs)

qLifk

(− ln(1 + qs)

q

))′

ds

∣∣∣∣∣xn

=

⟨∫ t

0

−Lifk−1

(− ln(1+qs)q

)1 + qs

ds

∣∣∣∣∣xn

=

⟨∫ t

0

(−1)

(∞∑i=0

(−qs)i

)(∞∑

j=0

c(k−1)j,q

sj

j!

)ds

∣∣∣∣∣xn

=

⟨−

∞∑r=0

r∑j=0

(−q)r−j c(k−1)j,q

tr+1

j!(r + 1)

∣∣∣∣∣xn

= −n−1∑j=0

(−q)n−j−1c(k−1)j,q

n!

j!n

= −(n − 1)!n∑

m=1

(−q)m−1

(n − m)!c(k−1)n−m,q .

Thus, for n ≥ 1, we obtain

n∑m=1

(−1)m−1(m − 1)!qm−1

(n

m

)c(k)n−m,q = (n − 1)!

n∑m=1

(−q)m−1

(n − m)!c(k−1)n−m,q .

3.7 Some relations with Korobov polynomials

The Korobov polynomials of the first kind Kn,q(x) (q 6= 0) ([14]) are given by

qt(1 + t)x

(1 + t)q − 1=

∞∑j=0

Kj,q(x)tj

j!. (14)

19

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

780 Dae San Kim et al 762-792

Page 29: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Theorem 8 For integers n and k with n ≥ 0, we have

c(k)n,q(x)

=n∑

i=0

n−i∑l=0

n−i−l∑m=0

(−1)n−i−l−m

(n

l

)(n − l

i

)qn−l−m (n − i − l)!

m!(n − i − l + 1)cl,qc

(k−1)m,q Ki, 1

q

(−x

q

),

c(k)n,q(x)

=n∑

i=0

n−i∑l=0

n−i−l∑m=0

(−1)n−i−l−m

(n

l

)(n − l

i

)qn−l−m (n − i − l)!

m!(n − i − l + 1)cl,q c

(k−1)m,q Ki,− 1

q

(x

q

).

Proof. By the definition of c(k)n,q(x),

c(k)n,q(y) =

⟨(1 + qt)−y/qLifk

(ln(1 + qt)

q

)∣∣∣∣∣xn

=

⟨(1 + qt)−y/q

(1 + qt)1/q − 1

ln(1 + qt)

qLifk

(ln(1 + qt)

q

)∣∣∣∣∣q((1 + qt)1/q − 1

)ln(1 + qt)

xn

⟩.

Sinceq((1 + qt)1/q − 1

)ln(1 + qt)

=∞∑l=0

cl,qtl

l!,

we get

c(k)n,q(y) =

⟨(1 + qt)−y/q

(1 + qt)1/q − 1

ln(1 + qt)

qLifk

(ln(1 + qt)

q

)∣∣∣∣∣∞∑l=0

(n

l

)cl,qx

n−l

=∞∑l=0

(n

l

)cl,q

⟨(1 + qt)−y/q

(1 + qt)1/q − 1

∫ t

0

(ln(1 + qs)

qLifk

(ln(1 + qs)

q

))′

ds

∣∣∣∣∣xn−l

=∞∑l=0

(n

l

)cl,q

⟨(1 + qt)−y/q

(1 + qt)1/q − 1

∞∑r=0

r∑m=0

(−q)r−mc(k−1)m,q

tr+1

m!(r + 1)

∣∣∣∣∣xn−l

=∞∑l=0

(n

l

)cl,q

⟨t(1 + qt)−y/q

(1 + qt)1/q − 1

∣∣∣∣∣∞∑

r=0

r∑m=0

(−q)r−mc(k−1)m,q

tr

m!(r + 1)xn−l

=∞∑l=0

(n

l

)cl,q

n−l∑r=0

r∑m=0

(−q)r−mc(k−1)m,q

(n−lr

)r!

m!(r + 1)

⟨t(1 + qt)−y/q

(1 + qt)1/q − 1

∣∣∣∣∣xn−l−r

⟩.

Replacing t by qt, q by 1/q and x by −y/q in (14), we have

t(1 + qt)−y/q

(1 + qt)1/q − 1=

∞∑j=0

Kj, 1q

(−y

q

)(qt)j

j!.

20

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

781 Dae San Kim et al 762-792

Page 30: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Hence,

c(k)n,q(y) =

∞∑l=0

(n

l

)cl,q

n−l∑r=0

r∑m=0

(−q)r−mc(k−1)m,q

(n−lr

)r!

m!(r + 1)

⟨∞∑

j=0

Kj, 1q

(−y

q

)(qt)j

j!

∣∣∣∣∣xn−l−r

⟩.

Since ⟨∞∑

j=0

Kj, 1q

(−y

q

)(qt)j

j!

∣∣∣∣∣xn−l−r

⟩= Kn−l−r, 1

q

(−y

q

)qn−l−r ,

we have

c(k)n,q(y) =

n∑l=0

n−l∑r=0

r∑m=0

(−1)r−m

(n

l

)(n − l

r

)qn−l−m r!

m!(r + 1)cl,qc

(k−1)m,q Kn−l−r, 1

q

(−y

q

)

=n∑

l=0

n−l∑m=0

n−l∑r=m

(−1)r−m

(n

l

)(n − l

r

)qn−l−m r!

m!(r + 1)cl,qc

(k−1)m,q Kn−l−r, 1

q

(−y

q

)

=n∑

l=0

n−l∑m=0

n−l−m∑i=0

(−1)n−l−m−i

(n

l

)(n − l

i

)qn−l−m (n − l − i)!

m!(n − l − i + 1)cl,qc

(k−1)m,q Ki, 1

q

(−y

q

)

=n∑

i=0

n−i∑l=0

n−i−l∑m=0

(−1)n−i−l−m

(n

l

)(n − l

i

)qn−l−m (n − i − l)!

m!(n − i − l + 1)cl,qc

(k−1)m,q Ki, 1

q

(−y

q

).

Thus, we obtain the first relation.Similarly, by the definition of c

(k)n,q(x),

c(k)n,q(y) =

⟨(1 + qt)y/qLifk

(− ln(1 + qt)

q

)∣∣∣∣∣xn

=

⟨(1 + qt)y/q

(1 + qt)−1/q − 1

− ln(1 + qt)

qLifk

(− ln(1 + qt)

q

)∣∣∣∣∣q(1 − (1 + qt)−1/q

)ln(1 + qt)

xn

⟩.

Sinceq(1 − (1 + qt)−1/q

)ln(1 + qt)

=∞∑l=0

cl,qtl

l!,

21

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

782 Dae San Kim et al 762-792

Page 31: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

we get

c(k)n,q(y) =

∞∑l=0

(n

l

)cl,q

⟨(1 + qt)y/q

(1 + qt)−1/q − 1

− ln(1 + qt)

qLifk

(− ln(1 + qt)

q

)∣∣∣∣∣xn−l

=∞∑l=0

(n

l

)cl,q

⟨(1 + qt)y/q

(1 + qt)−1/q − 1

∫ t

0

(− ln(1 + qs)

qLifk

(− ln(1 + qs)

q

))′

ds

∣∣∣∣∣xn−l

=∞∑l=0

(n

l

)cl,q

⟨−t(1 + qt)y/q

(1 + qt)−1/q − 1

∣∣∣∣∣∞∑

r=0

r∑m=0

(−q)r−mc(k−1)m,q

tr

m!(r + 1)xn−l

=∞∑l=0

(n

l

)cl,q

n−l∑r=0

r∑m=0

(−q)r−mc(k−1)m,q

(n−lr

)r!

m!(r + 1)

⟨−t(1 + qt)y/q

(1 + qt)−1/q − 1

∣∣∣∣∣xn−l−r

⟩.

Replacing t by qt, q by −1/q and x by y/q in (14), we have

−t(1 + qt)y/q

(1 + qt)−1/q − 1=

∞∑j=0

Kj,− 1q

(y

q

)(qt)j

j!.

Hence,

c(k)n,q(y) =

∞∑l=0

(n

l

)cl,q

n−l∑r=0

r∑m=0

(−q)r−mc(k−1)m,q

(n−lr

)r!

m!(r + 1)Kn−l−r,− 1

q

(y

q

)qn−l−r

=n∑

l=0

n−l∑r=0

r∑m=0

(−1)r−m

(n

l

)(n − l

r

)qn−l−m r!

m!(r + 1)cl,q c

(k−1)m,q Kn−l−r,− 1

q

(y

q

)

=n∑

l=0

n−l∑m=0

n−l∑r=m

(−1)r−m

(n

l

)(n − l

r

)qn−l−m r!

m!(r + 1)cl,q c

(k−1)m,q Kn−l−r,− 1

q

(y

q

)

=n∑

l=0

n−l∑m=0

n−l−m∑i=0

(−1)n−l−m−i

(n

l

)(n − l

i

)qn−l−m (n − l − i)!

m!(n − l − i + 1)cl,q c

(k−1)m,q Ki,− 1

q

(y

q

)

=n∑

i=0

n−i∑l=0

n−i−l∑m=0

(−1)n−i−l−m

(n

l

)(n − l

i

)qn−l−m (n − i − l)!

m!(n − i − l + 1)cl,q c

(k−1)m,q Ki,− 1

q

(y

q

).

Thus, we obtain the second relation.

3.8 Some relations including Stiring numbers of the first kind

Theorem 9 For integers n and k with n ≥ 0, we have

c(k)n+1,q(x) = −xc(k)

n,q(x + q) + qn

n∑j=0

n∑m=j

(−1)jq−m(

mj

)(m − j + 1)k

s(n,m)(x + q)j ,

c(k)n+1,q(x) = xc(k)

n,q(x − q) − qn

n∑j=0

n∑m=j

(−1)m−jq−m(

mj

)(m − j + 1)k

s(n,m)(x − q)j .

22

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

783 Dae San Kim et al 762-792

Page 32: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

We use the following recurrence formula for Sheffer sequences ([16, Corollary 3.7.2]).

Lemma 3 If sn(x) ∼(g(t), f(t)

), then

sn+1 =

(x − g′(t)

g(t)

)1

f ′(t)sn(x) .

Proof of Theorem 9. Consider the Sheffer sequence sn = c(k)n,q in Lemma 3. By f(t) =

(e−qt − 1)/q and g(t) = 1/Lifk(−t), we get 1/f ′(t) = −eqt and

g′(t)

g(t)=

Lif ′k(−t)

Lifk(−t).

Thus,

c(k)n+1,q(x) = eqt Lif ′k(−t)

Lifk(−t)c(k)n,q(x) − xc(k)

n,q(x + q) .

We obtain

Lif ′k(−t)

Lifk(−t)c(k)n,q(x) = Lif ′k(−t)(−q)n

(x

q

)(n)

= (−q)nLif ′k(−t)n∑

m=0

(−1)n−ms(n,m)

(x

q

)(n)

= qn

n∑m=0

(−q−1)ms(n,m)Lif ′k(−t)xm

= qn

n∑m=0

(−q−1)ms(n,m)m∑

r=0

(−1)r

r!(r + 1)ktrxm

= qn

n∑m=0

m∑r=0

(−1)m+rq−m(

mr

)(r + 1)k

s(n,m)xm−r

= qn

n∑m=0

m∑j=0

(−1)jq−m(

mj

)(m − j + 1)k

s(n,m)xj .

Therefore, we have

c(k)n+1,q(x) = −xc(k)

n,q(x + q) + qn

n∑j=0

n∑m=j

(−1)jq−m(

mj

)(m − j + 1)k

s(n,m)(x + q)j .

Similarly, consider the Sheffer sequence sn = c(k)n,q in Lemma 3. By f(t) = (eqt − 1)/q

and g(t) = 1/Lifk(−t), we get

c(k)n+1,q(x) = −e−qt Lif ′k(−t)

Lifk(−t)c(k)n,q(x) + xc(k)

n,q(x − q) .

23

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

784 Dae San Kim et al 762-792

Page 33: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

We obtain

Lif ′k(−t)

Lifk(−t)c(k)n,q(x) = Lif ′k(−t)qn

(x

q

)n

= qnLif ′k(−t)n∑

m=0

s(n,m)

(x

q

)m

= qn

n∑m=0

q−ms(n,m)Lif ′k(−t)xm

= qn

n∑m=0

q−ms(n,m)m∑

r=0

(−1)r(

mr

)(r + 1)k

xm−r

= qn

n∑m=0

q−ms(n,m)m∑

j=0

(−1)m−j(

mj

)(m − j + 1)k

xj

= qn

n∑m=0

m∑j=0

(−1)m−jq−m(

mj

)(m − j + 1)k

s(n,m)xj .

Therefore, we have

c(k)n+1,q(x) = xc(k)

n,q(x − q) − qn

n∑j=0

n∑m=j

(−1)m−jq−m(

mj

)(m − j + 1)k

s(n,m)(x − q)j .

3.9 Some relations with Bernoulli polynomials

By applying Lemma 1 about (13), for nonnegative integer r, we have

B(r)n ∼

((et − 1

t

)r

, t

). (15)

Theorem 10 For integers n and k with n ≥ 0, we have

c(k)n,q(x) = (−1)m

n∑m=0

(n−m∑l=0

n−m−l∑i=0

(n

l

)(n − l

i + m

)qis(i + m,m)C(s)

l,q c(k)n−m−l−i,q

)B(s)

m (x) ,

c(k)n,q(x) =

n∑m=0

(n−m∑l=0

n−m−l∑i=0

(n

l

)(n − l

i + m

)qis(i + m,m)C(s)

l,q c(k)n−m−l−i,q

)B(s)

m (x) .

Proof. Put c(k)n,q(x) =

∑nm=0 Cn,mB

(s)m (x) for (11) and (15). Then by (10) we get

Cn,m =1

m!

⟨Lifk

(ln(1 + qt)

q

)(e− ln(1+qt)/q − 1

− ln(1 + qt)/q

)s(− ln(1 + qt)

q

)m∣∣∣∣∣xn

=(−q−1)m

m!

⟨Lifk

(ln(1 + qt)

q

)(q(1 − (1 + qt)−1/q

)ln(1 + qt)

)s(ln(1 + qt)

)m∣∣∣∣∣xn

⟩.

24

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

785 Dae San Kim et al 762-792

Page 34: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Define C(r)l,q (r > 0) by (

q(1 − (1 + qt)−1/q

)ln(1 + qt)

)r

=∞∑l=0

C(r)l,q

tl

l!,

so that C(1)l,q = cl,q = c

(1)l,q . Then,

Cn,m =(−q−1)m

m!

⟨Lifk

(ln(1 + qt)

q

)(ln(1 + qt)

)m∣∣∣∣∣n∑

l=0

C(s)l,q

tl

l!xn

=(−q−1)m

m!

n∑l=0

C(s)l,q

(n

l

)⟨Lifk

(ln(1 + qt)

q

)(ln(1 + qt)

)m∣∣∣∣∣xn−l

=(−q−1)m

m!

n−m∑l=0

C(s)l,q

(n

l

)

×

⟨Lifk

(ln(1 + qt)

q

)∣∣∣∣∣n−m−l∑

i=0

m!

(i + m)!s(i + m,m)(qt)i+mxn−l

=(−q−1)m

m!

n−m∑l=0

C(s)l,q

(n

l

) n−m−l∑i=0

m!

(i + m)!s(i + m,m)qi+m(n − l)i+m

×

⟨Lifk

(ln(1 + qt)

q

)∣∣∣∣∣xn−m−l−i

⟩.

Since ⟨Lifk

(ln(1 + qt)

q

)∣∣∣∣∣xn−m−l−i

⟩= c

(k)n−m−l−i,q ,

we have

Cn,m = (−1)m

n−m∑l=0

n−m−l∑i=0

(n

l

)(n − l

i + m

)qis(i + m,m)C(s)

l,q c(k)n−m−l−i,q .

Thus,

c(k)n,q(x) = (−1)m

n∑m=0

(n−m∑l=0

n−m−l∑i=0

(n

l

)(n − l

i + m

)qis(i + m,m)C(s)

l,q c(k)n−m−l−i,q

)B(s)

m (x) .

Similarly, put c(k)n,q(x) =

∑nm=0 Cn,mB

(s)m (x) for (12) and (15). Then by (10) we get

Cn,m =1

m!

⟨Lifk

(− ln(1 + qt)

q

)(eln(1+qt)/q − 1

ln(1 + qt)/q

)s(ln(1 + qt)

q

)m∣∣∣∣∣xn

=1

m!qm

⟨Lifk

(− ln(1 + qt)

q

)(q((1 + qt)1/q − 1

)ln(1 + qt)

)s(ln(1 + qt)

)m∣∣∣∣∣xn

⟩.

25

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

786 Dae San Kim et al 762-792

Page 35: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Define C(r)l,q (r > 0) by (

q((1 + qt)1/q − 1

)ln(1 + qt)

)r

=∞∑l=0

C(r)l,q

tl

l!,

so that C(1)l,q = cl,q = c

(1)l,q . Then,

Cn,m =1

m!qm

⟨Lifk

(− ln(1 + qt)

q

)(ln(1 + qt)

)m∣∣∣∣∣n∑

l=0

C(s)l,q

tl

l!xn

=1

m!qm

n∑l=0

C(s)l,q

(n

l

)⟨Lifk

(− ln(1 + qt)

q

)(ln(1 + qt)

)m∣∣∣∣∣xn−l

=1

m!qm

n−m∑l=0

C(s)l,q

(n

l

)

×

⟨Lifk

(− ln(1 + qt)

q

)∣∣∣∣∣n−m−l∑

i=0

m!

(i + m)!s(i + m,m)(qt)i+mxn−l

=1

m!qm

n−m∑l=0

C(s)l,q

(n

l

) n−m−l∑i=0

m!

(i + m)!s(i + m, m)qi+m(n − l)i+m

×

⟨Lifk

(− ln(1 + qt)

q

)∣∣∣∣∣xn−m−l−i

⟩.

Since ⟨Lifk

(− ln(1 + qt)

q

)∣∣∣∣∣xn−m−l−i

⟩= c

(k)n−m−l−i,q ,

we have

Cn,m =n−m∑l=0

n−m−l∑i=0

(n

l

)(n − l

i + m

)qis(i + m,m)C(s)

l,q c(k)n−m−l−i,q .

Thus,

c(k)n,q(x) =

n∑m=0

(n−m∑l=0

n−m−l∑i=0

(n

l

)(n − l

i + m

)qis(i + m,m)C(s)

l,q c(k)n−m−l−i,q

)B(s)

m (x) .

3.10 Some relations with Frobenius-Euler polynomials

For λ ∈ C with λ 6= 1, the Frobenius-Euler polynomials of order r, H(r)n (x|λ) are defined

by the generating function (1 − λ

et − λ

)r

ext =∞∑

n=0

H(r)n (x|λ)

tn

n!

26

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

787 Dae San Kim et al 762-792

Page 36: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

(see e.g. [4]). Hence, by Lemma 1 we have

H(r)n (x|λ) ∼

((et − λ

1 − λ

)r

, t

). (16)

Theorem 11 For integers n and k with n ≥ 0, we have

c(k)n,q(x) =

λ − 1

)r n∑m=0

(−1)m

×(n−m∑

l=0

r∑i=0

ql(−λ−1)i

(r

i

)(n

l + m

)s(l + m,n)c

(k)n−l−m,q(i)

)H(r)

m (x|λ) ,

c(k)n,q(x) =

λ − 1

)r n∑m=0

×(n−m∑

l=0

r∑i=0

ql(−λ−1)i

(r

i

)(n

l + m

)s(l + m,n)c

(k)n−l−m,q(i)

)H(r)

m (x|λ) .

Proof. Put c(k)n,q(x) =

∑nm=0 Cn,mH

(r)m (x|λ) for (11) and (16). Then by (10) we get

Cn,m =1

m!

⟨Lifk

(ln(1 + qt)

q

)(e− ln(1+qt)/q − λ

1 − λ

)r(− ln(1 + qt)

q

)m∣∣∣∣∣xn

=(−q−1)m

m!(1 − λ)r

⟨Lifk

(ln(1 + qt)

q

)((1 + qt)−1/q − λ

)r∣∣∣∣∣(ln(1 + qt))m

xn

⟩.

Since (ln(1 + qt)

)m=

n−m∑l=0

m!

(l + m)!s(l + m,m)(qt)l+m , (17)

we have

Cn,m =(−q−1)m

m!(1 − λ)r

n−m∑l=0

m!

(l + m)!s(l + m,m)ql+m(n)l+m

×

⟨Lifk

(ln(1 + qt)

q

) r∑i=0

(r

i

)(−λ)r−i(1 + qt)−i/q

∣∣∣∣∣xn−l−m

=(−q−1)m

m!(1 − λ)r

n−m∑l=0

m!

(l + m)!s(l + m,m)ql+m(n)l+m

×r∑

i=0

(r

i

)(−λ)r−i

⟨Lifk

(ln(1 + qt)

q

)(1 + qt)−i/q

∣∣∣∣∣xn−l−m

⟩.

27

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

788 Dae San Kim et al 762-792

Page 37: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Since

Lifk

(ln(1 + qt)

q

)(1 + qt)−i/q =

∞∑j=0

c(k)j,q (i)

tj

j!,

we have

Cn,m =(−q−1)m

m!(1 − λ)r

n−m∑l=0

m!

(l + m)!s(l + m,m)ql+m(n)l+m

r∑i=0

(i = 0

r

)(r

i

)(−λ)r−ic

(k)n−l−m,q(i)

= (−1)m+r

1 − λ

)r n−m∑l=0

r∑i=0

ql(−λ−1)i

(r

i

)(n

l + m

)s(l + m,n)c

(k)n−l−m,q(i) .

Thus,

c(k)n,q(x) =

λ − 1

)r n∑m=0

(−1)m

×(n−m∑

l=0

r∑i=0

ql(−λ−1)i

(r

i

)(n

l + m

)s(l + m,n)c

(k)n−l−m,q(i)

)H(r)

m (x|λ) .

Similarly, put c(k)n,q(x) =

∑nm=0 Cn,mH

(r)m (x|λ) for (12) and (16). Then by (10) we get

Cn,m =1

m!

⟨Lifk

(− ln(1 + qt)

q

)(eln(1+qt)/q − λ

1 − λ

)r(ln(1 + qt)

q

)m∣∣∣∣∣xn

=q−m

m!(1 − λ)r

⟨Lifk

(− ln(1 + qt)

q

)((1 + qt)1/q − λ

)r∣∣∣∣∣(ln(1 + qt))m

xn

⟩.

By (17) we have

Cn,m =q−m

m!(1 − λ)r

n−m∑l=0

m!

(l + m)!s(l + m,m)ql+m(n)l+m

×

⟨Lifk

(− ln(1 + qt)

q

) r∑i=0

(r

i

)(−λ)r−i(1 + qt)i/q

∣∣∣∣∣xn−l−m

=q−m

m!(1 − λ)r

n−m∑l=0

m!

(l + m)!s(l + m,m)ql+m(n)l+m

×r∑

i=0

(r

i

)(−λ)r−i

⟨Lifk

(− ln(1 + qt)

q

)(1 + qt)i/q

∣∣∣∣∣xn−l−m

⟩.

Since

Lifk

(− ln(1 + qt)

q

)(1 + qt)i/q =

∞∑j=0

c(k)j,q (i)

tj

j!,

28

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

789 Dae San Kim et al 762-792

Page 38: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

we have

Cn,m =

λ − 1

)r n−m∑l=0

r∑i=0

ql(−λ−1)i

(r

i

)(n

l + m

)s(l + m,n)c

(k)n−l−m,q(i) .

Thus,

c(k)n,q(x) =

λ − 1

)r n∑m=0

(−1)m

×(n−m∑

l=0

r∑i=0

ql(−λ−1)i

(r

i

)(n

l + m

)s(l + m,n)c

(k)n−l−m,q(i)

)H(r)

m (x|λ) .

3.11 Some relations with falling and rising factorials

Theorem 12 For integers n and k with n ≥ 0, we have

c(k)n,q(x) =

n∑m=0

1

m!

(m∑

i=0

(−1)i

(m

i

)c(k)n,i(−i)

)x(m) ,

c(k)n,q(x) =

n∑m=0

1

m!

(m∑

i=0

(−1)i

(m

i

)c(k)n,i(m − i)

)xm .

Proof. Put c(k)n,q(x) =

∑nm=0 Cn,mx(m) for (11) and x(n) ∼ (1, 1− e−t). Then by (10) we get

Cn,m =1

m!

⟨Lifk

(ln(1 + qt)

q

)(1 − eln(1+qt)/q)m

∣∣∣∣∣xn

=1

m!

⟨Lifk

(ln(1 + qt)

q

)(1 − (1 + qt)1/q

)m∣∣∣∣∣xn

=1

m!

m∑i=0

(m

i

)(−1)i

⟨Lifk

(ln(1 + qt)

q

)(1 + qt)i/q

∣∣∣∣∣xn

=1

m!

m∑i=0

(m

i

)(−1)ic(k)

n,q(−i) .

Thus,

c(k)n,q(x) =

n∑m=0

1

m!

(m∑

i=0

(−1)i

(m

i

)c(k)n,i(−i)

)x(m) .

29

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

790 Dae San Kim et al 762-792

Page 39: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Similarly, put c(k)n,q(x) =

∑nm=0 Cn,mxm for (12) and xn ∼ (1, et − 1). Then by (10) we get

Cn,m =1

m!

⟨Lifk

(− ln(1 + qt)

q

)(eln(1+qt)/q − 1)m

∣∣∣∣∣xn

=1

m!

⟨Lifk

(− ln(1 + qt)

q

)((1 + qt)1/q − 1

)m∣∣∣∣∣xn

=1

m!

m∑i=0

(m

i

)(−1)m−i

⟨Lifk

(− ln(1 + qt)

q

)(1 + qt)i/q

∣∣∣∣∣xn

=1

m!

m∑i=0

(m

i

)(−1)m−ic(k)

n,q(−i)

=1

m!

m∑i=0

(m

i

)(−1)ic(k)

n,q(m − i) .

Thus,

c(k)n,q(x) =

n∑m=0

1

m!

(m∑

i=0

(−1)i

(m

i

)c(k)n,i(m − i)

)xm .

References

[1] L. Comtet, Advanced Combinatorics, Reidel, Dordrecht, 1974.

[2] K. Kamano and T. Komatsu, Poly-Cauchy polynomials, Mosc. J. Comb. NumberTheory 3 (2013), 183–209.

[3] M. Kaneko, Poly-Bernoulli numbers, J. Th. Nombres Bordeaux 9 (1997), 221–228.

[4] D. S. Kim and T. Kim, Some identities of Frobenius-Euler polynomials arising fromumbral calculus, Adv. Difference Equ. 2012 (2012), #196.

[5] D. S. Kim, T. Kim, S. H. Lee, A note on poly-Bernoulli polynomials arising fromumbral calculus , Adv. Studies Theor. Phys., 7 (2013), no. 15, 731-744.

[6] D. S. Kim, T. Kim, S.-H. Lee, Poly-Cauchy numbers and polynomials with umbralcalculus viewpoint , Int. Journal of Math. Analysis, 7 (2013), 2235-2253.

[7] D. S. Kim, T. Kim, S.-H. Lee, Higher-order Cauchy of the first kind and Poly-Cauchyof the first kind mix-type polynomials, Adv. Stud. Contemp. Math. 23 (2013), 543–554.

[8] T. Komatsu, Poly-Cauchy numbers, Kyushu J. Math. 67 (2013), 143–153.

30

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

791 Dae San Kim et al 762-792

Page 40: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

[9] T. Komatsu, Poly-Cauchy numbers with a q parameter, Ramanujan J. 31 (2013),353–371.

[10] T. Komatsu, Sums of products of Cauchy numbers, including poly-Cauchy numbers,J. Discrete Math. 2013 (2013), Article ID 373927, 10 pages.

[11] T. Komatsu, Hypergeometric Cauchy numbers, Int. J. Number Theory 9 (2013), 545–560.

[12] T. Komatsu, K. Liptai and L. Szalay, Some relationships between poly-Cauchy typenumbers and poly-Bernoulli type numbers, East-West J. Math. 14 (2012), 114-120.

[13] T. Komatsu and F. Luca, Some relationships between poly-Cauchy numbers and poly-Bernoulli numbers, Ann. Math. Inform. 41 (2013), 99-105.

[14] N. M. Korobov, On some properties of special polynomials, Chebyshevskii Sb. 1(2001), 40–49.

[15] D. Merlini, R. Sprugnoli and M. C. Verri, The Cauchy numbers, Discrete Math. 306(2006) 1906–1920.

[16] S. Roman, The umbral Calculus, Dover, New York, 2005.

31

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

792 Dae San Kim et al 762-792

Page 41: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

TRIPLED FIXED POINT THEOREMS FOR MIXED MONOTONE

CHATTERJEA TYPE CONTRACTIVE OPERATORS

MARIN BORCUT, MADALINA PACURAR AND VASILE BERINDE

Abstract. Starting from the papers [Berinde, V., Borcut, M., Tripled fixed

point theorems for contractive type mappings in partially ordered metric spaces,Nonlinear Anal., 74 (2011), 4889-4897], [ Borcut, M., Berinde, V., Tripled co-

incidence theorems for contractive type mappings in partially ordered metricspaces , Appl. Math. Comput., 218 (10) (2012), 5929-5936] and [Borcut, M.,

Tripled coincidente point theorems for contractive type mappings in partially

ordered metric spaces, Appl. Math. Comput., 218 (2012), 7339-7346.], wepresent new results on the existence and uniqueness of tripled fixed points

for nonlinear mappings in partially ordered complete metric spaces satisfying

more general contractive conditions.

1. INTRODUCTION

In some very recent papers, Berinde and Borcut [6], Borcut and Berinde [7],Borcut [8] have introduced and studied the concept of tripled fixed point, respec-tively tripled coincidence point for nonlinear contractive mappings F : X3 → X, inpartially ordered complete metric spaces and obtained existence as well as existenceand uniqueness theorems of tripled fixed points, respectively of tripled coincidencepoints, for some classes of contractive type mappings.

The presented theorems in [6], [7], [8], extend several existing results in theliterature: [14], [18], [15]. For the sake of completeness, we recall the main conceptsand results from [6] which are needed for the present paper.

Let(X,≤) be a partially ordered set and d be a metric on X such that (X, d) isa complete metric space. Consider on the product space X3 the following partialorder: for (x, y, z) , (u, v, w) ∈ X3,

(u, v, w) ≤ (x, y, z)⇔ x ≥ u, y ≤ v, z ≥ w.

Definition 1. [6] Let (X,≤) be a partially ordered set and F : X3 → X a mapping.We say that F has the mixed monotone property if F (x, y, z) is nondecreasing inx and z, and is nonincreasing in y, that is, for any x, y, z ∈ X,

x1, x2 ∈ X,x1 ≤ x2 ⇒ F (x1, y, z) ≤ F (x2, y, z) ,

y1, y2 ∈ X, y1 ≤ y2 ⇒ F (x, y1, z) ≥ F (x, y2, z) ,

and

z1, z2 ∈ X, z1 ≤ z2 ⇒ F (x, y, z1) ≤ F (x, y, z2) .

Definition 2. [6] An element (x, y, z) ∈ X3 is called a tripled fixed point of F :X3 → X if

F (x, y, z) = x, F (y, x, y) = y, and F (z, y, x) = z.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

793 MARIN BORCUT ET AL 793-802

Page 42: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

2 M. Borcut, M. Pacurar and V. Berinde

Let (X, d) be a metric space. The mapping d : X ×X ×X → X, given by

d [(x, y, z) , (u, v, w)] = d (x, u) + d (y, v) + d (z, w) ,

defines a metric on X ×X ×X, which will be denoted for convenience by d, too.

Definition 3. Let X,Y, Z be nonempty sets and F : X ×X ×X → Y,G : Y × Y × Y → Z. We define the symmetric composition (or, the s-composition,for short) of F and G, G ∗ F : X ×X ×X → Z, by

(G ∗ F ) (x, y, z) = G (F (x, y, z) , F (y, x, y) , F (z, y, x)) (x, y, z ∈ X).

For each nonempty set X, denote by Px the projection mapping

PX : X ×X ×X → X,P (x, y, z) = x for x, y, z ∈ X.The symmetric composition has the following properties:

Proposition 1. (Associativity). If F : X ×X ×X → Y, G : Y × Y × Y → Z and

H : Z × Z × Z →W, then (H ∗G) ∗ F = H ∗ (G ∗ F ).

Proposition 2. (Identity Element). If F : X ×X ×X → Y, then

F ∗ PX = PY ∗ F = F.

Proposition 3. (Mixed Monotonicity). If (X,≤), (Y,≤), (Z,≤) are partially or-dered sets and the mappings F : X ×X ×X → Y,G : Y × Y × Y → Z are mixedmonotone, then G ∗ F is mixed monotone.

Proposition 4. If (X,≤) is a partially ordered set and F is mixed monotone, thenFn = F ∗ Fn−1 = Fn−1 ∗ F is mixed monotone, for every n ≥ 1.

The first main result in [6] is given by the following theorem.

Theorem 1. [6] Let (X,≤) be a partially ordered set and suppose there is a metricd on X such that (X, d) is a complete metric space. Let F : X ×X ×X → X be acontinuous mapping having the mixed monotone property on X. Assume that thereexist the constants j, k, l ∈ [0, 1) with j + k + l < 1 for which

(1.1) d (F (x, y, z) , F (u, v, w)) ≤ jd (x, u) + kd (y, v) + ld (z, w) ,

∀x ≥ u, y ≤ v, z ≥ w. If there exist x0, y0, z0 ∈ X such that

x0 ≤ F (x0, y0, z0) , y0 ≥ F (y0, x0, y0) and z0 ≤ F (z0, y0, x0) ,

then there exist x, y, z ∈ X such that

x = F (x, y, z) , y = F (y, x, y) and z = F (z, y, x) .

Remark 1. If we take j = k = l = α3 in Theorem 1, then the contraction condition

(1.1) can be written in a slightly simplified form

(1.2) d (F (x, y, z) , F (u, v, w)) ≤ α

3[d (x, u) + d (y, v) + d (z, w)].

Theorem 2. [6] By adding to the hypotheses of Theorem 1 the condition: forevery (x, y, z) , (x1, y1, z1) ∈ X3, there exists a (u, v, w) ∈ X3 that is comparable to(x, y, z) and (x1, y1, z1), then the tripled fixed point of F is unique.

Theorem 3. [6] In addition to the hypotheses of Theorem 1, suppose that x0, y0, z0 ∈X are comparable. Then x = y = z.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

794 MARIN BORCUT ET AL 793-802

Page 43: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Tripled fixed points 3

2. Main results

Based on the notions and results presented in the first section, we will provenew existence and uniqueness theorems for operators which verify a Chatterjeacontraction type condition, adapted to the case X3.

Theorem 4. Let (X,≤) be a partially ordered set and suppose there is a metric don X such that (X, d) is a complete metric space. Let F : X3 → X be a mappinghaving the mixed monotone property on X. Assume that there exists a k ∈ [0, 1)such that

(2.1) d (F (x, y, z) , F (u, v, w)) ≤ k

8[d (x, F (u, v, w)) + d (y, F (v, u, v)) +

+d (z, F (w, v, u)) + d (u, F (x, y, z)) + d (v, F (y, x, y)) + d (w,F (z, y, x))].

Also suppose either(a) F is continuous or(b) X has the following property:

(i) if a nondecreasing sequence xn → x, then xn ≤ x for all n,

(ii) if a nonincreasing sequence yn → y, then yn ≥ y for all n.

If there exist x0, y0, z0 ∈ X such that,

(2.2) x0 ≤ F (x0, y0, z0) , y0 ≥ F (y0, x0, y0) and z0 ≤ F (z0, y0, x0) ,

then there exist x, y, z ∈ X such that,

x = F (x, y, z) , y = F (y, x, y) and z = F (z, y, x) .

Proof. Let the sequences xn , yn , zn ⊂ X be defined by

xn+1 = F (xn, yn, zn) = Fn+1(x0, y0, z0), yn+1 = F (yn, xn, yn) = Fn+1(y0, x0, y0),

zn+1 = F (zn, yn, xn) = Fn+1(z0, y0, x0), (n = 0, 1, ...).

Since Fn is mixed monotone for every n (by Proposition 4), it follows by (2.2) thatxn and zn are nondecreasing and yn is nonincreasing. Indeed, due to themixed monotone property of F , it is easy to show that

x2 = F (x1, y1, z1) ≥ F (x0, y0, z0) = x1

y2 = F (y1, x1, y1) ≤ F (y0, x0, y0) = y1

z2 = F (z1, y1, x1) ≥ F (z0, y0, x0) = z1

and thus we obtain three sequences satisfying the following conditions

x0 ≤ x1 ≤ ... ≤ xn ≤ ...,

y0 ≥ y1 ≥ ... ≥ yn ≥ ...,z0 ≤ z1 ≤ ... ≤ zn ≤ ....

Now, for n ∈ N, denote

Dxn+1= d (xn+1, xn) , Dyn+1

= d (yn+1, yn) , Dzn+1= d (zn+1, zn)

and

Dn+1 = Dxn+1 +Dyn+1 +Dzn+1 .

Using (2.1), we get

Dxn+1= d (xn+1, xn) = d(F (xn, yn, zn), F (xn−1, yn−1, zn−1))

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

795 MARIN BORCUT ET AL 793-802

Page 44: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

4 M. Borcut, M. Pacurar and V. Berinde

≤ k

8

[d(xn, Fxn−1

)+ d

(yn, Fyn−1

)+ d

(zn, Fzn−1

)+d (xn−1, Fxn

) + d (yn−1, Fyn) + d (zn−1, Fzn)]

=k

8[d (xn, xn) + d (yn, yn) + d (zn, zn)

+d (xn−1, xn+1) + d (yn−1, yn+1) + d (zn−1, zn+1)]

=k

8[d (xn−1, xn+1) + d (yn−1, yn+1) + d (zn−1, zn+1)]

≤ k

8[d (xn−1, xn) + d (yn−1, yn) + d (zn−1, zn)

+d (xn, xn+1) + d (yn, yn+1) + d (zn, zn+1)]

=k

8

[Dxn

+Dyn +Dzn +Dxn+1+Dyn+1

+Dzn+1

],

and therefore

(2.3) Dxn+1 ≤k

8

[Dxn +Dyn +Dzn +Dxn+1 +Dyn+1 +Dzn+1

].

Similarly, we obtain for the sequencesDyn+1

,Dzn+1

Dyn+1 = d (yn+1, yn) = d(F (yn, xn, yn), F (yn−1, xn−1, yn−1))

≤ k

8

[d(yn, Fyn−1

)+ d

(xn, Fxn−1

)+ d

(yn, Fyn−1

)+d (yn−1, Fyn) + d (xn−1, Fxn) + d (yn−1, Fyn)]

=k

8[d (yn, yn) + d (xn, xn) + d (yn, yn)

+d (yn−1, yn+1) + d (xn−1, xn+1) + d (yn−1, yn+1)]

=k

8[2d (yn−1, yn+1) + d (xn−1, xn+1)]

≤ k

8[2d (yn−1, yn) + d (xn−1, xn) + d (xn, xn+1) + 2d (yn, yn+1)]

=k

8

[Dxn

+ 2Dyn +Dxn+1+ 2Dyn+1

],

and so

(2.4) Dyn+1 ≤k

8

[Dxn + 2Dyn +Dxn+1 + 2Dyn+1

]and

Dzn+1 = d (zn+1, zn) = d(F (zn, yn, xn), F (zn−1, yn−1, xn−1))

≤ k

8

[d(zn, Fzn−1

)+ d

(yn, Fyn−1

)+ d

(xn, Fxn−1

)+d (zn−1, Fzn) + d (yn−1, Fyn) + d (xn−1, Fxn

)]

=k

8[d (xn, xn) + d (yn, yn) + d (zn, zn)

+d (xn−1, xn+1) + d (yn−1, yn+1) + d (zn−1, zn+1)]

=k

8[d (xn−1, xn+1) + d (yn−1, yn+1) + d (zn−1, zn+1)]

≤ k

8[d (xn−1, xn) + d (yn−1, yn) + d (zn−1, zn)

+d (xn, xn+1) + d (yn, yn+1) + d (zn, zn+1)]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

796 MARIN BORCUT ET AL 793-802

Page 45: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Tripled fixed points 5

=k

8

[Dxn

+Dyn +Dzn +Dxn+1+Dyn+1

+Dzn+1

],

and therefore

(2.5) Dzn+1≤ k

8

[Dxn

+Dyn +Dzn +Dxn+1+Dyn+1

+Dzn+1

].

By using relations (2.3), (2.4) and (2.5), we get

Dn+1 ≤k

8

[3Dxn

+ 4Dyn + 2Dzn + 3Dxn+1+ 4Dyn+1

+ 2Dzn+1

]≤ k

8

[4Dxn

+ 4Dyn + 4Dzn + 4Dxn+1+ 4Dyn+1

+ 4Dzn+1

]≤ k

2[Dn +Dn+1] .

Therefore, for all n ≥ 1, we have

Dn+1 ≤ α ·Dn ≤ ... ≤ αn ·D1, where α =k

2− k∈ [0, 1), when k ∈ [0, 1).

Because Dxn+1 ≤ Dn+1, Dyn+1 ≤ Dn+1 and Dzn+1 ≤ Dn+1, then we have

(2.6) Dxn+1≤ αn ·D1, Dyn+1

≤ αn ·D1 and Dzn+1≤ αn ·D1

This implies that xn , yn , zn are Cauchy sequences in X. Indeed, let m ≥ n,then

d (xm, xn) ≤ Dxm+Dxm−1

+ ...+Dxn+1≤

≤ [αm−1 + αm−2 + ...+ αn] ·D1 =αn − αm

1− α·D1 <

αn

1− α·D1.

Similarly, we can verify that yn and zn are also Cauchy sequences. Since Xis a complete metric space, there exist x, y, z ∈ X such that,

limx→∞

xn = x, limx→∞

yn = y, limx→∞

zn = z.

Finally, we claim that

x = F (x, y, z) , y = F (y, x, y) and z = F (z, y, x) .

Assume the first assumption (a) holds. This means F is continuous at (x, y, z) ,and hence, for a given ε

2 > 0, there exists a δ > 0 such that,

d ((x, y, z), (u, v, w)) = d (x, u) + d (y, v) + d (z, w) < δ

⇒ d (F (x, y, z) , F (u, v, w)) <ε

2.

Sincelimx→∞

xn = x, limx→∞

yn = y, limx→∞

zn = z,

for η = min(ε2 ,

δ2

), there exist n0,m0, p0 such that, for n ≥ n0,m ≥ m0, p ≥ p0,

d (xn, x) < η, d (yn, y) < η, d (zn, z) < η.

Now, for n ∈ N, n ≥ max n0,m0, p0 , we have

d (F (x, y, z) , x) ≤ d (F (x, y, z) , xn+1) + d (xn+1, x)

= d (F (x, y, z) , F (xn, yn, zn)) + d (xn+1, x) <ε

2+ η ≤ ε,

and this implies that x = F (x, y, z) . Similarly, we can show that

y = F (y, x, y) and z = F (z, y, x) .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

797 MARIN BORCUT ET AL 793-802

Page 46: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

6 M. Borcut, M. Pacurar and V. Berinde

Suppose now that (b) holds. Since xn , zn are non-decreasing and xn → x,zn → z, and also yn is non-increasing and yn → y, from (b) we have xn ≤ x, yn ≥y and zn ≤ z, for all n. Then by triangle inequality and (2.1), we get

(2.7) d (x, F (x, y, z)) ≤ d (x, xn+1) + d (xn+1, F (x, y, z))

= d (x, xn+1) + d (F (xn, yn, zn), F (x, y, z))

≤ d (x, xn+1) +k

8[d(xn, xn+1) + d(yn, yn+1) + d(zn, zn+1)

+d(x, F (x, y, z)) + d(y, F (y, x, y)) + d(z, F (z, y, x))],

(2.8) d(y, F (y, x, y)) ≤ d (y, yn+1) +k

8[d(xn, xn+1) + 2d(yn, yn+1)

+d(x, F (x, y, z)) + 2d(y, F (y, x, y))],

and

(2.9) d(z, F (z, y, x)) ≤ d (z, zn+1) +k

8[d(xn, xn+1) + d(yn, yn+1) + d(zn, zn+1)

+d(x, F (x, y, z)) + d(y, F (y, x, y)) + d(z, F (z, y, x))].

By summing (2.7), (2.8), (2.9) we obtain

d(x, F (x, y, z)) + d(y, F (y, x, y)) + d(z, F (z, y, x))

≤ 2

2− k[d (x, xn+1) + d (y, yn+1) + d (z, zn+1)]

+k

4(2− k)[3d(xn, xn+1) + 4d(yn, yn+1) + 2d(zn, zn+1)],

and let n→∞ one obtains

d (x, F (x, y, z)) + d(y, F (y, x, y)) + d(z, F (z, y, x)) ≤ 0,

that is, x = F (x, y, z), y = F (y, x, y), z = F (z, y, x).

3. Uniqueness of tripled fixed points

In [6], [7] and [8] the authors also considered some additional conditions to ensurethe uniqueness of the tripled fixed point and also appropriate conditions to ensurethat for such a tripled fixed point (x, y, z) we have all components equal: x = y = z.

Similarly, one can prove that the tripled fixed point ensured by Theorem 4 is infact unique, provided that the product space X ×X ×X endowed with the partialorder mentioned earlier possesses an additional property.

Theorem 5. If, in addition to the hypotheses of Theorem 4, the condition: forevery (x, y, z) , (x1, y1, z1) ∈ X ×X ×X, there exists a (u, v, w) ∈ X ×X ×X thatis comparable to (x, y, z) and (x1, y1, z1), is satisfied, then the tripled fixed point ofF is unique.

Proof. If (x∗, y∗, z∗) ∈ X×X×X is another tripled fixed point of F, then we showthat

d ((x, y, z) , (x∗, y∗, z∗)) = 0,

where

limx→∞

xn = x, limx→∞

yn = y, limx→∞

zn = z.

We consider two cases.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

798 MARIN BORCUT ET AL 793-802

Page 47: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Tripled fixed points 7

Case 1. If (x, y, z) is comparable to (x∗, y∗, z∗) with respect to the ordering inX ×X ×X then, for every n = 0, 1, 2, . . . , the triple

(Fn (x, y, z) , Fn (y, x, y) , Fn (z, y, x)) = (x, y, z) is comparable to

(Fn (x∗, y∗, z∗) , Fn (y∗, x∗, y∗) , Fn (z∗, y∗, x∗)) = (x∗, y∗, z∗) .

Also, using the process for obtaining (2.6), we get

d ((x, y, z) , (x∗, y∗, z∗)) = d (x, x∗) + d (y, y∗) + d (z, z∗)

= d (Fn (x, y, z) , Fn (x∗, y∗, z∗)) + d (Fn (y, x, y) , Fn (y∗, x∗, y∗))

+d (Fn (z, y, x) , Fn (z∗, y∗, x∗))

≤ αn [d (x, x∗) + d (y, y∗) + d (z, z∗)] = αnd ((x, y, z) , (y∗, x∗, z∗)) , α ∈ [0, 1).

By letting n→∞, this implies that d ((x, y, z) , (y∗, x∗, z∗)) = 0.Case 2 : If (x, y, z) are not comparable to (x∗, y∗, z∗) , then there exists an upper

bound or a lower bound (u, v, w) ∈ X ×X ×X of (x, y, z) and (x∗, y∗, z∗) . Then,for all n = 1, 2, ...,

(Fn (u, v, w) , Fn (v, u, v) , Fn (w, v, u)) is comparable to

(Fn (x, y, z) , Fn (y, x, y) , Fn (z, y, x)) = (x, y, z) and to

(Fn (x∗, y∗, z∗) , Fn (y∗, x∗, y∗) , Fn (z∗, y∗, x∗)) = (x∗, y∗, z∗) .

We have,

d

xyz

,

x∗

y∗

z∗

= d

Fn (x, y, z)Fn (y, x, y)Fn (z, y, x)

,

Fn (x∗, y∗, z∗)Fn (y∗, x∗, y∗)Fn (z∗, y∗, x∗)

≤ d

Fn (x, y, z)Fn (y, x, y)Fn (z, y, x)

,

Fn (u, v, w)Fn (v, u, v)Fn (w, v, u)

+d

Fn (u, v, w)Fn (v, u, v)Fn (w, v, u)

,

Fn (x∗, y∗, z∗)Fn (y∗, x∗, y∗)Fn (z∗, y∗, x∗)

≤ αn [d (x, u) + d (y, v) + d (z, w)] + [d (u, x∗) + d (v, y∗) + d (w, z∗)] → 0

as n→∞, and so d

xyz

,

x∗

y∗

z∗

= 0.

Theorem 6. In addition to the hypotheses of Theorem 4, suppose that x0, y0, z0 ∈X are comparable. Then x = y = z.

Proof. Recall that x0, y0, z0,∈ X are such that

x0 ≤ F (x0, y0, z0), y0 ≥ F (y0, x0, y0), z0 ≤ F (z0, y0, x0).

Now, if x0 ≤ y0, and z0 ≤ y0 we claim that, for all n ∈ N, xn ≤ yn and zn ≤ yn.Indeed, by the mixed monotone property of F,

x1 = F (x0, y0, z0) ≤ F (y0, x0, y0) = y1

and

z1 = F (z0, y0, x0) ≤ F (y0, x0, y0) = y1.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

799 MARIN BORCUT ET AL 793-802

Page 48: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

8 M. Borcut, M. Pacurar and V. Berinde

Assume that xn ≤ yn and zn ≤ yn for some n. Then

xn+1 = Fn+1(x0, y0, z0) = F (Fn(x0, y0, z0), Fn(y0, x0, y0), Fn(z0, y0, x0))

= F (xn, yn, zn) ≤ F (yn, xn, yn) = yn+1,

and similarly for zn. Now,

d(x, y) ≤ d(x, xn+1) + d(y, xn+1) ≤ d(x, xn+1) + d(xn+1, yn+1) + d(y, yn+1)

= d(x, Fn+1(x0, y0, z0)) + d [F (Fn(x0, y0, z0), Fn(y0, x0, y0), Fn(z0, y0, x0)),

, F (Fn(y0, x0, y0), Fn(x0, y0, x0), Fn(y0, x0, y0))] + d(y, yn+1)→ 0

as n→∞.This implies that d(x, y) = 0 and hence we have x = y.Similarly, we obtain that d(x, z) = 0 and d(y, z) = 0. The other cases for x0, y0, z0

are similar.

4. Example and final remarks

Let X = [0, 1] be endowed with the usual metric d (x, y) = |x − y| and let

F : X3 → X be given by F (x, y, z) =1

20, for (x, y, z) ∈

[0,

4

5

]× [0, 1]2 and

F (x, y, z) =11

80, for (x, y, z) ∈

[4

5, 1

]× [0, 1]2.

Then F satisfies Chatterjea’s contractive condition (2.1) with k =14

15< 1 but

does not satisfy the Banach type contractive condition (1.1).Let us first prove the first part of the assertion above. It suffices to completely

cover the following limit case.

Case 1. x ∈[

4

5, 1

], and u, y, z, v, w ∈

[0,

4

5

)In this case F (x, y, z) =

11

80, F (u, v, w) =

1

20and so condition (2.1) reduces to

(4.1)∣∣∣∣11

80− 1

20

∣∣∣∣ ≤ k

8

[∣∣∣∣x− 1

20

∣∣∣∣+

∣∣∣∣y − 1

20

∣∣∣∣+

∣∣∣∣z − 1

20

∣∣∣∣+

∣∣∣∣u− 11

80

∣∣∣∣+

∣∣∣∣v − 1

20

∣∣∣∣+

∣∣∣∣w − 1

20

∣∣∣∣] .For x ∈

[4

5, 1

], we have ∣∣∣∣x− 1

20

∣∣∣∣ ≥ ∣∣∣∣45 − 1

20

∣∣∣∣ =3

4

and hence the minimum value of the right hand side of (4.1) is greater or equal tok

8· 3

4.

Therefore, in order to have (4.1) satisfied for all x ∈[

4

5, 1

]and u, y, z, v, w ∈[

0,4

5

), with x ≥ u, y ≤ v, z ≥ w, i.e.,∣∣∣∣ 1

20− 11

80

∣∣∣∣ ≤ k

8· 3

4,

it suffices to take k such that14

15≤ k < 1.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

800 MARIN BORCUT ET AL 793-802

Page 49: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Tripled fixed points 9

Note that for the remaining cases to be discussed, the right hand side of (2.1)will be greater than the value obtained in Case 1.

For example, in the Case 2. x, v ∈[

4

5, 1

]and u, y, z, w ∈

[0,

4

5

), the minimum

value of the right hand side of (2.1) will be greater or equal tok

8· 6

4.

Note also that in the cases x, u ∈[

4

5, 1

]or x, u ∈

[0,

4

5

), the left hand side of

(2.1) is always zero and so (1.2) is satisfied for all values of y, z, v, w ∈ [0, 1].

This proves that, indeed, F satisfies (2.1) with k =14

15< 1.

F is not continuous but X satisfies property (b) in Theorem 4. Moreover, by

taking x0 = 0, y0 =1

5and z0 =

1

8, one can check that (2.2) is fulfilled. Thus,

all assumptions in Theorem 4 are satisfied and hence F does admit tripled fixedpoints. By Theorem 5 we actually conclude that F has a unique tripled fixed point,(

1

20,

1

20,

1

20

).

Now let us show that F does not satisfy (1.1).Assume the contrary, that is, that F does satisfy (1.1) and take ε > 0 such that

u =4

5− ε ∈

[0,

4

5

), x =

4

5and y = z, v = w ∈ [0, 1] arbitrary in (1.1) to obtain

(4.2)7

80≤ i · ε, ε > 0.

Now letting ε → 0 in (4.2) we reach to a contradiction. This proves that, indeed,F does not satisfy (1.1).

Acknowledgements

The research was supported by the Grant PN-II-RU-TE-2011-3-0239 of the Ro-manian Ministry of Education and Research.

References

[1] Abbas, M., Ali Khan, M., Radenovic, S., Common coupled fixed point theorems in cone

metric spaces for w-compatible mappings, Appl. Math. Comput. 217 (2010), no. 1, 195–202[2] Altun, I., Damjanovic, B. Djoric, D., Fixed point and common fixed point theorems on ordered

cone metric spaces, Appl. Math. Lett. 23 (2010), no. 3, 310-316[3] Altun, I., Rakocevic, V., Ordered cone metric spaces and fixed point results, Comput. Math.

Appl. 60 (2010), no. 5, 1145–1151[4] Beg, I., Abbas, M., Fixed points and invariant approximation in random normed spaces,

Carpathian J. Math. 26 (2010), no. 1, 36–40[5] Berinde, V., Iterative approximation of fixed points. Second edition, Lecture Notes in Math-

ematics, 1912, Springer, Berlin, 2007[6] Berinde, V.,Borcut, M., Tripled fixed point theorems for contractive type mappings in partially

ordered metric spaces, Nonlinear Anal. , 74 (2011) 4889-4897.[7] Borcut, M., Berinde, V., Tripled coincidence theorems for contractive type mappings in par-

tially ordered metric spaces , Aplied Mathematics and Computation, 218 (10) (2012) pp.5929-5936

[8] Borcut, M., Tripled coincidente point theorems for contractive type mappings in partiallyordered metric spaces, Aplied Mathematics and Computation, 218 (2012) pp. 7339-7346

[9] Borcut, M., Tripled fixed point theorems for monotone contractive type mappings in partially

ordered metric spaces, Carpathian J. MAath., 28 (2012), No. 2, 207-214.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

801 MARIN BORCUT ET AL 793-802

Page 50: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

10 M. Borcut, M. Pacurar and V. Berinde

[10] Borcut, M., Tripled coincidente point theorems for monotone contractive type mappings in

partially ordered metric spaces, Creative Mathematics and Informatics, 21 (2012), No. 2,

135-142.[11] Borcut, M., Tripled fixed point theorems for operators which verify the contraction-type condi-

tion Kannan in partially ordered metric spaces, Applied Mathematical Sciences, (Submitted).

[12] Borcut, M., Tripled fixed point theorems in partially ordered metric spaces, Hacettepe Journalof Mathematics and Statistics (Submited).

[13] Borcut, M., Tripled coincidente point theorems for monotone φ-contractive type mappings in

partially ordered metric spaces, Filomat J. (submitted).[14] Gnana Bhaskar, T., Lakshmikantham, V., Fixed point theorems in partially ordered metric

spaces and applications, Nonlinear Anal. 65 (2006), no. 7, 1379–1393

[15] Harjani, J; Lopez, B; Sadarangani, K. Fixed point theorems for mixed monotone oper-ators and applications to integral equations , Nonlinear Anal. 74 (2011), 1749–1760.

[16] Kannan, R. Some results on fixed points,, Bull. Calcutta Math. Soc., 10 (1968), 71-76[17] Karapinar, E., Coupled fixed point theorems for nonlinear contractions in cone metric spaces,

Comput. Math. Appl., 59 (2010), no. 12, 3656–3668

[18] Lakshmikantham, V., Ciric, L., Coupled fixed point theorems for nonlinear contractions in

partially ordered metric spaces, Nonlinear Anal. 70 (2009), 4341-4349

[19] Nguyen V. L., Nguyen X. T., Coupled fixed points in partially ordered metric spaces andapplication, Nonlinear Anal., 74 (2011), 983–992

[20] Nieto,Juan J.; Rodriguez-Lopez, Rosana., Existence and uniqueness of fixed point in

partially ordered sets and applications to ordinary differential equations , Acta. Math. Sin.,(Engl. Ser.) 23(2007), no. 12, 2205–2212 .

[21] Ran, A. C. M., Reurings, M. C. B., A fixed point theorem in partially ordered sets and some

applications to matrix equations, Proc. Amer. Math. Soc. 132 (2004), no. 5, 1435–1443[22] Rus, I. A., Generalized Contractions and Applications, Cluj University Press, Cluj-Napoca,

2001[23] Rus, I. A., Petrusel, A., Petrusel, G., Fixed Point Theory, Cluj University Press, Cluj-Napoca,

2008

[24] Rus, M-D., Fixed point theorems for generalized contractions in partially ordered metricspaces with semi-monotone metric, Nonlinear Anal.

[25] Sabetghadam, F., Masiha, H.P., Sanatpour, A.H., Some coupled fixed point theorems in cone

metric spaces, Fixed Point Theory. Appl., 2009, Art. ID 125426, 8 pp[26] Samet, B., Coupled fixed point theorems for a generalized Meir-Keeler contraction in partially

ordered metric spaces, Nonlinear Anal., 72 (2010), no. 12, 4508–4517

[27] Sedghi, S., Altun, I., Shobe, N., Coupled fixed point theorems for contractions in fuzzy metricspaces, Nonlinear Anal., 72 (2010), no. 3-4, 1298–1304

Department of Mathematics and Computer ScienceNorth University of Baia MareVictoriei 76, 430122 Baia Mare ROMANIAE-mail: [email protected]

Department of Mathematics and Computer ScienceNorth University of Baia MareVictorie1 76, 430072 Baia Mare ROMANIAE-mail: [email protected]; vasile [email protected];

Department of Statistics, Analysis, Forecast and MathematicsFaculty of Economics and Bussiness AdministrationBabes-Bolyai University of Cluj-Napoca56-60 T. Mihali St., 400591 Cluj-Napoca ROMANIAE-mail: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

802 MARIN BORCUT ET AL 793-802

Page 51: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

SOFT BOOLEAN ALGEBRA AND ITS PROPERTIES

RIDVAN SAHIN AND AHMET KUCUK

Abstract. Molodtsov [21] introduced the concept of soft theory which can be

used as a generic mathematical tool for dealing with uncertainty. In this paper,we apply the notion of the soft set theory of Molodtsov to the theory of Boolean

algebras which is a well-known algebraic structure. We introduce the concepts

of soft filter and soft ideal on the soft Boolean algebra as well as notions of asoft Boolean algebra and soft Boolean homomorphism, and investigate basic

properties as intersection, union and product of the soft Boolean algebras.

Also we give several illustrative examples.

1. Indroduction

In 1999, Molodtsov [21] initiated the theory of soft sets as a new mathematicaltool to deal with uncertainties while modelling the problems in engineering, physics,computer science, economics, social sciences, and medical science. Maji et al. [18]showed the applications of soft set theory in decision making problem by definingseveral operations on soft set. In theoretical aspects, Maji et al. [19] introducedseveral operators for soft set theory such as equality of two soft sets, subset andsuperset of a soft set, complement of a soft set, null soft set, and absolute soft set.Recently, some new operations in soft set theory has been given by Irfan Ali et al.in [2], also see [23]. Later, the properties and applications of soft set theory havebeen studied by many authors (e.g. [3, 5, 14, 15, 17, 20, 22, 25, 26] ).

At present, studies on the soft set theory is progressing rapidly on algebraicstructures. Aktas and Cagman [1] defined a basic version of soft group theory.Sezgin et al. [24] introduced the concepts of normalistic soft group and normalisticsoft group homomorphism. Feng et al. [4] studied soft semi rings. Jun et al.[9, 11] applied soft sets in the theories of BCK/BCI-algebras. Kazancı et al. [13]introduced soft BCH-algebras and studied their basic properties. Several otherstudies on soft BCH-algebras have been discussed in [7, 8, 10]. Jun et al. [12]applied the notion of the soft sets to the theory of Hilbert algebras.

In this paper, we apply the notion of the soft set theory of Molodtsov to thetheory of Boolean algebras. We introduce the concepts of soft filter and soft idealon the soft Boolean algebra as well as concept of a soft Boolean algebra. We alsoinvestigate basic properties as intersection, union and product of the soft Booleanalgebras, and define soft Boolean homomorphism and obtain some properties. Alsowe give several illustrative examples.

This paper is organized as follows. In the next two sections, we give someimportant concepts of Boolean algebra and basic definitions of soft set theory. In

1991 Mathematics Subject Classification. 2010 Primary 06D72; Secondary 54A40.Key words and phrases. Boolean algebra, soft set, soft Boolean algebra, atomic soft Boolean

algebra, complete soft Boolean algebra, soft Boolean homomorphism.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

803 RIDVAN SAHIN ET AL 803-814

Page 52: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

2 RIDVAN SAHIN AND AHMET KUCUK

Section 4, we present the definition of soft Boolean algebra and some properties ofsoft Boolean algebra. Finally, we summary the paper in Section 5.

2. Basic Results on Boolean Algebras

In the middle of the 19th century, George Boole introduced the concept ofBoolean algebras by attempting to formalize propositional logic. Boolean algebranow plays a central role in mathematical logic, probability theory and computerdesign. In this section, we give some basic notions in Boolean algebra. For moredetails on Boolean algebras, we refer the reader to [6, 16].

Definition 1. A Boolean algebra is a tuple (K,∧,∨,¬, 0, 1) (briefly K), where Kis a set with two distinguished elements 0, 1 ∈ K, ¬ : K → K is a unary operationand ∧,∨ : K × K → K are binary operations (called meet and join, respectively)such that

(1) ∧,∨ are associative,(2) ∧,∨ are commutative,(3) ∧ and ∨ are distributive, i.e. ∀x, y, z ∈ B : x ∧ (y ∨ z) = (x ∧ y) ∨ (x ∧ y)

and x ∨ (y ∧ z) = (x ∨ y) ∧ (x ∨ z),(4) ∀x ∈ K : x ∧ ¬x = 0 and x ∨ ¬x = 1.

Let K be a Boolean algebra and x, y ∈ K. Then K carries a natural partialorder. In other words, an relation ”≤ ” defined x ≤ y if x = x ∧ y or x ∨ y = y,is an ordering relation on K, where x ∨ y and x ∧ y are least upper bound andgreatest lower bound of x, y, respectively. The element 0 in Boolean algebra Kis called to be zero element if x ∨ 0 = 0 ∨ x = x and x ∧ 0 = 0 ∧ x = 0 for anyx ∈ K. Similarly, the element 1 in Boolean algebra K is called to be unit elementif x ∨ 1 = 1 ∨ x = 1 and x ∧ 1 = 1 ∧ x = x for any x ∈ K.

Remark 1. Let K be a Boolean algebra, X be any set and P (X) its power set.Then

(1) (P (X),∩,∪,−,∅, X), where ”−” is the complement operation of sets, is aBoolean algebra of sets.

(2) For x and y in the Boolean algebra K, x y if x ≤ y does not hold. x < y(x is strictly smaller than y) if x ≤ y but x 6= y.

Notation 1. Throughout this article, we assume that ”≤” is a natural partial orderdefined on natural integer N.

Definition 2. Let K be a Boolean algebra. Then

(1) a ∈ K is an atom of K, if 0 < a but there is no x in K satisfying 0 < x < a.K is atomless if it has no atoms and atomic if for each positive element x(i.e., x 6= 0) of K, there is some atom a such that a ≤ x.

(2) For any S ⊆ K with S 6= ∅, K is complete iff both inf(S) and sup(S) existfor every nonempty subset S of K.

Definition 3. Let K be a Boolean algebra.

(1) A nonempty subset M of K is said to be a subalgebra of K if x, y ∈ Mimplies x ∨ y, x ∧ y and ¬x ∈ M . Moreover, note that every Booleanalgebra is itself a subalgebra.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

804 RIDVAN SAHIN ET AL 803-814

Page 53: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

SOFT BOOLEAN ALGEBRA 3

(2) A filter on K is a subset F of K such that:(i) 0 /∈ F, 1 ∈ F ; (ii) if x ∈ F and y ∈ F , then x ∧ y ∈ F ; (iii) if

x, y ∈ K, x ∈ F and x ≤ y, then y ∈ F .(3) An ideal on K is a subset I of K such that:

(i) 0 ∈ I, 1 /∈ I; (ii) if x ∈ I and y ∈ I, then x ∨ y ∈ I; (iii) if x, y ∈ K,x ∈ I and y ≤ x, then y ∈ I.

Definition 4. Let K and L be two Boolean algebras. A mapping φ : K → L iscalled a (Boolean) homomorphism if it preserves the operations: φ(a ∧ b) = φ(a) ∧ φ(b)

φ(a ∨ b) = φ(a) ∨ φ(b)φ(¬a) = ¬φ(a)

for all a, b ∈ K. If φ is bijective, then it is called a (Boolean) isomorphism. If thereis a Boolean isomorphism φ : K → L, then K and L are said to be isomorphic, anddenoted by K ' L.

3. Basic Results on Soft Sets

In this paper, U is an initial universe set, P (U) its power set and E is alwaysthe universe set of parameters with respect to U unless otherwise specified.

Now, we recall some basic notions in soft set theory.

Definition 5. [19, 20]. A pair (F,A) is called a soft set over U if A ⊆ E andF : A −→ P (U), such that F (x) 6= ∅, if x ∈ A ⊆ E and F (x) = ∅ if x /∈ A.

Definition 6. [3]. Let U be an initial universe set and E be a universe set ofparameters. Let (F,A) and (G,B) be soft sets over a common universe set U andA,B ⊆ E. Then

(1) (F,A) is a subset of (G,B), denoted by (F,A)⊆(G,B), if(i) A ⊆ B; (ii) F (x) ⊆ G(x) for all x ∈ A,

(2) (F,A) equals (G,B), denoted by (F,A) = (G,B), if (F,A)⊆(G,B) and(G,B)⊆(F,A).

Definition 7. [19]. Let (F,A) and (G,B) be two soft sets over a common universeU. The union of (F,A) and (G,B) is defined to be a soft set (H,C), where C = A∪Band H is defined as follows:

H(x) =

F (x)G(x)F (x) ∪G(x)

if x ∈ A−Bif x ∈ B −Aif x ∈ A ∩B

We write (H,C) = (F,A)∪(G,B).

Definition 8. [19]. Let (F,A) and (G,B) be two soft sets over a common universeU . The intersection of (F,A) and (G,B) is defined to be a soft set (H,C) satisfyingthe following conditions:

(1) C = A ∩B,(2) H(x) = F (x) or G(x) for each x ∈ C (as both are same set).

We write (H,C) = (F,A)∩(G,B).

Definition 9. [19]. Let (F , A) and (G, B) be soft sets over a common universeset U.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

805 RIDVAN SAHIN ET AL 803-814

Page 54: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

4 RIDVAN SAHIN AND AHMET KUCUK

(1) (F,A)∧(G,B) is a soft set defined by (F,A)∧(G,B) = (H,A × B), whereH(x, y) = F (x)∩G(y) for any x ∈ A and y ∈ B, where ∩ is the intersectionoperation of sets.

(2) (F,A)∨(G,B) is a soft set defined by (F,A)∨(G,B) = (K,A × B), whereK(x, y) = F (x) ∪ G(y) for any x ∈ A and y ∈ B, where ∪ is the unionoperation of sets.

4. Soft Boolean Algebras

Let K be a Boolean algebra and A be a nonempty set. R will refer to an arbitrarybinary relation between an element of A and an element of K; that is, R is a subsetof A ×K unless otherwise specified. A set-valued function F : A → P (K) can bedefine as F (x) = y ∈ K : (x, y) ∈ R for all x ∈ A. Then the pair (F,A) is a softset over K, which is derived from the relation R.

Definition 10. Let (F,A) be a soft set over K. Then (F,A) is called a soft Booleanalgebra over K if F (x) is a subalgebra of K for all x ∈ A.

Example 1. Let K = 1, 2, 3, 6 be set of all divisors of 6. Consider x ∧ y =mcd(x, y) (2 ∧ 3 = 1, 2 ∧ 6 = 2), x ∨ y = mcm(x, y)(2 ∨ 3 = 6, 2 ∨ 6 = 6) and¬x = 6

x (¬2 = 3). Then the structure 〈K,∧,∨,¬, 1, 6〉 is a Boolean algebra underthe relation ” ” which is given by x y if x = x ∧ y or x ∨ y = y.

Let (F,A) be a soft set over K, where A = K and F : A −→ P (K) is a set-valuedfunction defined by

F (x) =

y ∈ K : xRy ⇐⇒

y ∈ 1, 6 if x /∈ 2, 3y if x ∈ 2, 3

Then F (1) = F (6) = 1, 6 , F (2) = F (3) = 1, 2, 3, 6 . Therefore, F (x) is asubalgebra of K for all x ∈ A. Hence (F,A) is a soft Boolean algebra over K.

Now, let (G,B) be a soft set over K, where B = K and G : B −→ P (K) is aset-valued function defined by

G (x) = y ∈ K : xR′y ⇐⇒ mcd(x, y) ≤ mcm(x, y) .

Then G(1) = G(2) = G(3) = G(6) = 1, 2, 3, 6 = K. Hence G(x) is a subalgebraof K for all x ∈ B. Then (G,B) is a soft Boolean algebra over K.

Example 2. Let M = a, b, c be a set and K = FUN(M, 0, 1) be the set of allfunctions from M and to 0, 1. Define the Boolean operations on K as follows forall f, g ∈ K:

(f ∨ g)(x) = max f(x), g(x) , (f ∧ g)(x) = min f(x), g(x) and ¬f(x) =0, 1 − f(x) for all x ∈ A. Then K together with these operations is a Booleanalgebra and consists of elements f1, f2, f3, f4, f5, f6, f7, f8 defined by

f1(a) = 0 f2(a) = 1 f3(a) = 1f1(b) = 0 f2(b) = 1 f3(b) = 0f1(c) = 0 f2(c) = 1 f3(c) = 0

f4(a) = 1f4(b) = 1f4(c) = 0

f5(a) = 1 f6(a) = 0 f7(a) = 0f5(b) = 0 f6(b) = 1 f7(b) = 0f5(c) = 1 f6(c) = 1 f7(c) = 1

f8(a) = 0f8(b) = 1f8(c) = 0

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

806 RIDVAN SAHIN ET AL 803-814

Page 55: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

SOFT BOOLEAN ALGEBRA 5

Let (F,A) be a soft set over K, where A = M and F : A −→ P (K) is a set-valuedfunction defined by

F (x) =

f ∈ K : xRf ⇐⇒

f(a) = f(c) if x = af(b) = f(a) if x = bf(c) = f(b) if x = c

Then F (a) = f1, f2, f5, f8 , F (b) = f1, f2, f4, f7 and F (c) = f1, f2, f3, f6 .Therefore, F (x) is a subalgebra of K for all x ∈ A. Hence (F,A) is a soft Booleanalgebra over K.

Example 3. Every Boolean algebra can be considered as a soft Boolean algebra.

Theorem 1. Let (F,A) and (G,B) be two soft Boolean algebras over K. If A∩B 6=∅, then (F,A)∩(G,B) is a soft Boolean algebra over K.

Proof. By Definition 8, we can write (F,A)∩(G,B) = (H,C), where C = A ∩ Band H(x) = F (x) or G(x) for all x ∈ C. For a mapping H : C −→ P (K), (H,C) isa soft set over K. Since (F,A) and (G,B) are soft Boolean algebras over K, thereexists an equality such that H(x) = F (x) or H(x) = G(x) for all x ∈ C. But ineither case, H(x) is a subalgebra of K for all x ∈ C. Hence (H,C) = (FA)∪(G,B)is a soft Boolean algebra over K.

Theorem 2. Let (F,A) and (G,B) be two soft Boolean algebras over K. If A andB are disjoint, then (F,A)∪(G,B) is a soft Boolean algebra over K.

Proof. By Definition 7, we can write (F,A)∪(G,B) = (H,C), where C = A ∪ Band for all x ∈ C,

H(x) =

F (x)G(x)F (x) ∪G(x)

if x ∈ A−Bif x ∈ B −Aif x ∈ A ∩B

Since A ∩ B = ∅, either x ∈ A − B or x ∈ B − A. Since (F,A) is a soft Booleanalgebra over K, then H(x) = F (x) is a subalgebra of K for x ∈ A− B. Similarty,since (G,B) is a soft Boolean algebra over K, then H(x) = G(x) is a subalgebraof K for x ∈ B − A. Hence (H,C) is a soft Boolean algebra over K and so(H,C) = (F,A)∪(G,B) is a soft Boolean algebra over K.

Remark 2. Let K be a Boolean algebra and S be a non-empty family of subalgebrasof K. Note that intersection of members of S is again a subalgebra of K. But thisis not correct for union. So Theorem 2 does not hold in general if A ∩B 6= ∅.

Theorem 3. Let (F,A) and (G,B) be two soft Boolean algebras over K, then(F,A)∧(G,B) is a soft Boolean algebra over K.

Proof. By Definition 9, we have

(F,A)∧(G,B) = (H,A×B)

where H(x, y) = F (x)∩G(y) for all x ∈ A and y ∈ B. Since (F,A) and (G,B) aresoft Boolean algebras overK, then F (x) andG(y) are subalgebras ofK for all x ∈ A,y ∈ B and so the intersection F (x)∩G(y) is also a subalgebra of K. Hence H(x, y)is a subalgebra of K for all x ∈ A and y ∈ B. Then (F,A)∧(G,B) = (H,A×B) isa soft Boolean algebra over K.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

807 RIDVAN SAHIN ET AL 803-814

Page 56: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

6 RIDVAN SAHIN AND AHMET KUCUK

Theorem 4. Let (F,A) be a soft Boolean algebra over K. If B is a subset of A,then (F |B , B) is a soft Boolean algebra over K.

Proof. Since (F,A) is a soft Boolean algebra over K, then F (x) is a subalgebra ofK for all x ∈ A. Therefore, F (x) is also a subalgebra of K for all x ∈ B ⊆ A.Hence (F |B , B) is a soft Boolean algebra over K.

Proposition 1. Let (G,B) be a soft set over K and (Fα, Aα) be a soft Booleanalgebra over K for α ∈ Λ, where Λ is an index set. Then

〈(G,B)〉 = ∩(Fα, Aα) : (G,B) ⊆ (Fα, Aα) ,where (Fα, Aα) is a soft Boolean algebra over K for α ∈ Λ, is a soft Boolean algebraover K. We say that 〈(G,B)〉 is a soft Boolean algebra over K, which is generatedby (G,B) .

Definition 11. Let (F,A) and (G,B) be two soft Boolean algebras over K. Then(G,B) is a soft subalgebra of (F,A), denoted by (G,B)<(F,A), if

(1) B ⊆ A,(2) G(x) is a subalgebra of F (x) for all x ∈ B.

Example 4. Let (F,A) be a soft set over K and A = K, where K is the Booleanalgebra given in Example 1 and F : A→ P (K) is a set-valued function defined by

F (x) = y ∈ K : xRy ⇔ mcd(x, y) ≤ x.Then F (1) = F (2) = F (3) = F (6) = 1, 2, 3, 6 = K for all x ∈ A and hence (F,A)is a soft Boolean algebra over K.

Let B = 1, 2, 3 and G : B → P (K) be the set-valued function defined by

G(x) = 1 ∪ y ∈ K : xR′y ⇔ x ≺ y,where ” ≺ ” is the operation (strictly) defined on K for all x ∈ B. Then G(1) =1, 2, 3, 6, G(2) = G(3) = 1, 6 and hence (G,B) is a soft Boolean algebra overK. Moreover, since G(x) is a subalgebra of F (x) for all x ∈ B, then (G,B) is asoft subalgebra of (F,A).

The class of all soft subalgebras of a soft Boolean algebra (F,A) is a completelattice under the relation of being a soft subalgebra (<).

Theorem 5. Let (F,A) and (G,A) be two soft Boolean algebras over K.

(1) If G(x) ⊆ F (x) for all x ∈ A, then (G,A)<(F,A).(2) If (F,A) is a soft Boolean algebra over K such that F (x) = 0, 1 for all

x ∈ A, then (F,A)<(G,B) where (G,B) is any soft Boolean algebra overK.

Proof. The proof is clear.

Theorem 6. (F,A) is a soft Boolean algebra over K and (Gα, Bα) : α ∈ Λ is anonempty family of soft subalgebras of (F,A), where Λ is an index set. Then

(1) ∩α∈Λ (Gα, Bα) is a soft subalgebra of (F,A),(2) ∧α∈Λ (Gα, Bα) is a soft subalgebra of (F,A),(3) ∨α∈Λ (Gα, Bα) is a soft subalgebra of (F,A) if Bα∩Bβ = ∅ for all α, β ∈ Λ.

Proof. The proof is clear.

Definition 12. Let (F,A) be a soft Boolean algabra over K. Then

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

808 RIDVAN SAHIN ET AL 803-814

Page 57: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

SOFT BOOLEAN ALGEBRA 7

(1) (F,A) is said to be an identity soft Boolean algebra over K if F (x) = 0, 1for all x ∈ A, where 0 and 1 is two distinguished elements of K.

(2) (F,A) is said to be an absolute soft Boolean algebra over K if F (x) = Kfor all x ∈ A.

Example 5. Consider the Boolean algebra K = FUN (M, 0, 1) which is givenExample 2. Let (F,A) be a soft set over K, A = M and F : A → P (K) be aset-valued function defined by

F (x) = f ∈ K : xRf ⇔ f(x) ∈ 0, 1

for all x ∈ A. Then F (a) = F (b) = F (c) = K and so (F,A) is an absolute softBoolean algebra over K.

Next, let (G,B) be a soft set over K, where B = M and G : B → P (K) is aset-valued function defined by

G(x) = f ∈ K : xR′f ⇔ f(x) = f(y) for x 6= y.

Then G(a) = G(b) = G(c) = f1, f2 and hence (G,B) is an identity soft Booleanalgebra over K.

Definition 13. Let (F,A) be a soft Boolean algebra over K. A soft set (G,B)over K is called a soft filter on (F,A), denoted by (G,B)B(F,A), if it satisfies thefollowing conditions:

(1) B ⊆ A,(2) G(x) is a filter of F (x) for all x ∈ B.

Definition 14. Let (F,A) be a soft Boolean algebra over K. A soft set (G,B)over K is called a soft ideal on (F,A), denoted by (G,B)C(F,A), if it satisfies thefollowing conditions:

(1) B ⊆ A,(2) G(x) is an ideal of F (x) for all x ∈ B.

Example 6. Let (F,A) be soft Boolean algebra over K, which is given in Example5. That is, A = M and F : A→ P (K) is the set-valued function defined by

F (x) = f ∈ K : xRf ⇔ f(x) ∈ 0, 1

such that F (x) = K for all x ∈ A.Let (G,B) be a soft set over K, B = M and G : B → P (K) be a set-valued

function defined by

G(x) = f ∈ K : xRf ⇔ f(x) = 1for all x ∈ B. Then G(a) = f2, f3, f4, f5, G(b) = f2, f4, f6, f8 and G(c) =f2, f5, f6, f7. So G(x) is a filter of F (x) for all x ∈ B. Hence (G,B) is a softfilter on (F,A).

Let C = M and H : C → P (K) be the set-valued function defined by

H(x) = f ∈ K : xRf ⇔ f(x) = 0

for all x ∈ C. Then H(a) = f1, f6, f7, f8, H(b) = f1, f3, f5, f7 and H(c) =f1, f3, f4, f8. So H(x) is an ideal of F (x) for all x ∈ C. Hence (H,C) is a softideal on (F,A).

Remark 3. (F,A) be a soft Boolean algebra over K.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

809 RIDVAN SAHIN ET AL 803-814

Page 58: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

8 RIDVAN SAHIN AND AHMET KUCUK

(1) If (G,B) is a soft filter on (F,A), then

(H,C) = F (x)−G(x) : G(x) is a filter of F (x) for all x ∈ Bis a soft ideal on (F,A).

(2) If (H,C) is a soft ideal on (F,A), then

(G,B) = F (x)−H(x) : H(x) is an ideal of F (x) for all x ∈ Cis a soft filter on (F,A). If this is the case we say that (G,B) and (H,C)are dual to each other.

Definition 15. Let (F,A) be a soft Boolean algebra over K and (G,B) a soft setover K such that B ⊆ A. Then

(1) (G,B) is said to be identity soft ideal on (F,A) if G(x) = 0 for everyx ∈ B,

(2) (G,B) is said to be identity soft filter on (F,A) if G(x) = 1 for everyx ∈ B.

Example 7. Let (F,A) be a soft Boolean algebra over K, which is given in Example2 and (G,B) be a soft set over K. Let B = M and G : B → P (K) be a set-valuedfunction defined by

G(x) = f ∈ K : xRf ⇔ f(x) = f(y) = 0 for x 6= yfor all x ∈ B. Then G(a) = G(b) = G(c) = f1 and so (G,B) is an identity softideal on (F,A).

Let C = M and H : C → P (K) be the set-valued function defined by

H(x) = f ∈ K : xRf ⇔ f(x) = f(y) = 1 for x 6= yfor all x ∈ C. Then H(a) = H(b) = H(c) = f2 and so (H,C) is an identity softfilter on (F,A).

Definition 16. Let (F,A) be a soft Boolean algebra over K. Then

(1) (F,A) is called to be an atomic soft Boolean algebra over K, if F (x) is anatomic subalgebra of K for all x ∈ A,

(2) (F,A) is called to be a complete soft Boolean algebra over K, if F (x) is acomplete subalgebra of K for all x ∈ A.

Theorem 7. Let (F,A) be a soft Boolean algebra over K. If K is a finite Booleanalgebra, then (F,A) is a complete and atomic soft Boolean algebra over K.

Proof. Let (F,A) be a soft Boolean algebra over K. Since K is a finite Booleanalgebra, it is both complete and atomic. Therefore, we have that F (x) is a completeand atomic subalgebra of K for all x ∈ A. Hence (F,A) is a complete and atomicsoft Boolean algebra over K.

Definition 17. Let K and L be two Boolean algebras and f : K −→ L be a mappingof Boolean algebras. If (F,A) and (G,B) are soft sets over K and L, respectivelythen

(1) (f(F ), A) is a soft set over L, where f(F ) : A −→ P (L) is defined byf(F )(x) = f(F (x)) for all x ∈ A,

(2) (f−1(G), B) is a soft set over K, where f−1(G) : B −→ P (K) is definedby f−1(G)(y) = f−1(G(y)) for all y ∈ B.

Proposition 2. Let f : K −→ L be an onto Boolean homomorphism. Then

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

810 RIDVAN SAHIN ET AL 803-814

Page 59: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

SOFT BOOLEAN ALGEBRA 9

(1) if (F,A) is a soft Boolean algebra over K, then (f(F ), A) is a soft Booleanalgebra over L,

(2) if (G,B) is a soft Boolean algebra over L, then (f−1(G), B) is a soft Booleanalgebra over K if it is non-null.

Proof. Let f : K −→ L be an onto Boolean homomorphism.

(1) Since F (x) is a subalgebra of K and its homomorphic image is a subalgebraof L for all x ∈ A, it follows that f(F )(x) = f(F (x)) is a subalgebra of L.Hence (f(F ), A) is a soft Boolean algebra over L.

(2) Because of the fact that (G,B) is a soft Boolean algebra over L, we haveG(y) is a subalgebra of L for all y ∈ B. Since f is a Boolean homomorphism,its homomophic inverse image f−1(G(y)) is also a subalgebra of K for ally ∈ B. Then (f−1(G), B) is a soft Boolean algebra over K.

Proposition 3. Let (F,A) be a soft Boolean algebra over K and (G,B) be a softsubalgebra of (F,A). If f is a Boolean homomorphism from K to L, then (f(G), B)is a soft subalgebra of (f(F ), A).

Proof. If (G,B) is a soft subalgebra of (F,A), then B ⊆ A and G(x) is a subalgebraof F (x) for all x ∈ B. Since f is a Boolean homomorphism from K to L andhomomorphic image of a subalgebra in K is a subalgebra in L, we have that f(F (x))and f(G(y)) are subalgebras of L for all x ∈ A and y ∈ B. Also, f(G(y)) isa subalgebra of f(F (x)) for all y ∈ B. Hence (f(G), B) is a soft subalgebra of(f(F ), A).

Proposition 4. Let (F,A) be a soft Boolean algebra over L and (G,B) be a soft sub-algebra of (F,A). If f is a Boolean homomorphism from K to L, then (f−1(G), B)is a soft subalgebra of (f−1(F ), A).

Proof. The proof is made similar to Proposition 3.

Proposition 5. Let (F,A) be a soft Boolean algebra over K and (G,B) be a softset over K. Suppose that f is a Boolean homomorphism from K to L. Then

(1) if (G,B) is a soft filter on (F,A) then (f(G), B) is a soft filter on (f(F ), A)(2) if (G,B) is a soft ideal on (F,A) then (f(G), B) is a soft ideal on (f(F ), A).

Proof. The proof is made similar to Proposition 3.

Theorem 8. Let f : K −→ L be a Boolean homomorphism. Suppose that (F,A)and (G,B) are two soft Boolean algebras over K and L, respectively.

(1) If (F,A) is an identity soft Boolean algebra over K, then (f(F ), A) is anidentity soft Boolean algebra over L.

(2) If f is onto and (F,A) is an absolute soft Boolean algebra, then (f(F ), A)is an absolute soft Boolean algebra over L.

(3) If G(y) = f(K) for all y ∈ B, then (f−1(G), B) is an absolute soft Booleanalgebra over K.

(4) If f is injective and (G,B) is an identity soft Boolean algebra, then (f−1(G), B)is an identity soft Boolean algebra over K.

Proof. Suppose that f : K −→ L is a Boolean homomorphism.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

811 RIDVAN SAHIN ET AL 803-814

Page 60: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

10 RIDVAN SAHIN AND AHMET KUCUK

(1) Let (F,A) be an identity soft Boolean algebras over K. Then for all x ∈A, we have F (x) = 0K , 1K, where 0K and 1K are two distinguishedelements of K. Since f is a Boolean homomorphism, f(F )(x) = f(F (x)) =f (0K , 1K) = 0L, 1L for all x ∈ A. Then (f(F ), A) is an identity softBoolean algebra over L.

(2) Let f be onto and (F,A) is absolute soft Boolean algebra. Then, F (x) = Kfor all x ∈ A, and so f(F )(x) = f(F (x)) = f(K) = L for all x ∈ A. Then(f(F ), A) is an absolute soft Boolean algebra over L.

(3) LetG(y) = f(K) for all y ∈ B. Then f−1(G)(y) = f−1(G(y)) = f−1(f(K)) =K for all y ∈ B. Hence (f−1(G), B) is an absolute soft Boolean algebraover K.

(4) Let f be injective and (G,B) is an identity soft Boolean algebra over L.Then G(y) = 0L, 1L for all y ∈ B and so f−1(G)(y) = f−1(G(y)) =f−1 (0L, 1L) = 0K , 1K . Then (f−1(G), B) is an identity soft Booleanalgebra over K.

Definition 18. Let (F,A) and (G,B) be two soft Boolean algebras over K and Lrespectively. Let f : K −→ L and g : A −→ B. Then (f, g) is said to be a softBoolean homomorphism if

(1) f is a Boolean homomorphism from K onto L,(2) g is a mapping from A onto B,(3) f(F (x)) = G(g(x)) for all x ∈ A.

Then (F,A) is said to be soft Boolean homomorphic to (G,B) and it is denotedby (F,A) ∼ (G,B). If f is a Boolean isomorphism from K onto L and g is abijection from A to B, then (f, g) is said to be a soft Boolean isomorphism. If thereexists a such isomorphism, we say that (F,A) is soft Boolean isomorphic to (G,B)and denote by (F,A) ' (G,B).

Example 8. Let (G,B) be the soft Boolean algebra given in Example 1. For C =a, b , consider a Boolean algebra L consisting of all subsets of C. Define theset-valued function H by

H(x) = X ∈ L : xRX ⇔ x ∪X ⊆ a, b .Then H(a) = H(b) = L. Therefore, H(x) is a subalgebra of L for all x ∈ C. Hence(H,C) is a soft Boolean algebra over L. Now, define f : K −→ L by f (1) = ∅,f (2) = a , f (3) = b and f (6) = a, b, and g : B −→ C by g (1) = a, g (6) = a,g (2) = b and g (3) = b. Then f is a Boolean homomorphism from K to L and g isa mapping from B to C. Moreover, we have f(G(x)) = H(g(x)) for all x ∈ B. So(G,B) is soft Boolean homomorphic to (H,C).

Theorem 9. Let K and L be Boolean algebras and (F,A), (G,B) soft sets over Kand L, respectively. If (F,A) is a soft Boolean algebra over K and (F,A) ' (G,B),then (G,B) is a soft Boolean algebra over L.

Proof. The proof is clear.

Definition 19. Let (F,A) and (G,B) be two soft Boolean algebras over K and L,respectively. The product of soft Boolean algebras (F,A) and (G,B) is defined as(F,A)× (G,B) = (H,A×B), where H(x, y) = F (x)×G(y) for all (x, y) ∈ A×B.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

812 RIDVAN SAHIN ET AL 803-814

Page 61: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

SOFT BOOLEAN ALGEBRA 11

Theorem 10. Let (F,A) and (G,B) be two soft Boolean algebras over K and L,respectively. If it is non-null, then the product (F,A) × (G,B) is a soft Booleanalgebra over K × L.

Proof. Let (F,A) × (G,B) = (H,A × B), where H(x, y) = F (x) × G(y) for all(x, y) ∈ A×B. Then by hypothesis, (H,A×B) is a non-null soft set over K × L.Since F (x) is a subalgebra of K and G(y) is a subalgebra of L, it follows thatH(x, y) is a subalgebra of K × L for all x ∈ A and y ∈ B. Therefore (H,A×B) isa soft Boolean algebra over K × L.

5. Conclusion

In this paper, we have introduced the concept of soft Boolean algebra and havestudied some of their algebraic properties. Basic notions such as soft subalgebra,soft ideal, soft filter and soft Boolean homomorphism were introduced and theirproperties have been investigated. Many examples supporting the results obtainedwere also given . The aim of this article is to obtain next algebraic structure bycombining the notion of soft set theory with Boolean algebra which is a well knownalgebra. We hope that ideas and methods developed in this paper will be a sourceof inspiration for further study.

References

[1] H. Aktas, N. Cagman, Soft sets and soft groups. Inform. Sci. 177 (2007), 2726–2735.

[2] M.I. Ali, F. Feng, X.Y. Liu, W.K. Min, M. Shabir, On some new operations in soft set theory,

Comput. Math. Appl 57 (2009) 1547–1553.[3] N. Cagman and S. Enginoglu, Soft set theory and uni–int decision making, European J. Oper.

Res. 207 (2010) 848–855.[4] F. Feng, Y.B. Jun and X. Zhao, Soft semirings, Comput. Math. Appl. 56(10) (2008) 2621–

2628.

[5] Feng Feng , Changxing Li, B. Davvaz, M. Irfan Ali, Soft sets combined with fuzzy sets andrough sets: a tentative approach, Soft Comput. Springer, 14 (2010) 899-911

[6] S. Givant and P. Halmos, (2008). Introduction to Boolean Algebras. Published 2008, Springer.

[7] Y.S. Hwang and S.S. Ahn, Soft q-ideals of soft BCI-algebras, Journal of ComputationalAnalysis & Applications, 16 (2014) 571-582.

[8] J.S. Han and S.S. Ahn, Applications of soft sets to q-ideals and a-ideals in BCI-algebras.

Journal of Computational Analysis & Applications, 17 (2014) 10-21.[9] Y. B. Jun; Soft BCK/BCI-algebras, Comput. Math. Appl., 56 (5) (2008) 1408-1413.

[10] Y. B. Jun, N. O. Alshehri and J. L. Kyoung, Soft set theory and N-structures applied to

BCH-algebras. Journal of Computational Analysis & Applications. 16 (2014) 869-886.[11] Y. B. Jun, C. H. Park, Applications of soft sets in ideal theory of BCK/BCIalgebras, Inform.

Sci., 178(11) (2008), 2466-2475.[12] Y. B. Jun, C. H. Park; Applications of soft sets in Hilbert algebras, Iran. J. Fuzzy Syst., 6(2)

(2009), 55–86.

[13] O. Kazanci, S. Yılmaz and S. Yamak, Soft sets and soft BCH-algebras, Hacettepe Journal ofMathematics and Statistics, 39 (2) (2010), 205 – 217.

[14] A. Kharal, Distance and Similarity Measures for Soft sets. New Mathematics and NaturalComputation. 6(3) (2010) 321-334.

[15] A. Kharal and B. Ahmad, Mappings on soft classes, to appear in New Math. Nat. Comput.7 (3) (2011) 471- 481.

[16] S. Koppelberg, (1989) Handbook pf Boolean Algebras volume 1. North-Holland, Amsterdam.[17] P. K. Maji, R. Biswas and A. R. Roy, Fuzzy soft sets, J. Fuzzy Math. 9(3) (2001) 589-602.[18] P. K. Maji, A. R. Roy, and R. Biswas, An application of soft sets in a decision making

problem, Comput. Math. Appl. 44(8-9) (2002) 1077–1083.[19] P.K. Maji, R. Biswas and R. Roy, Soft set theory, Comput. Math. Appl. 45 (2003) 555–562.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

813 RIDVAN SAHIN ET AL 803-814

Page 62: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

12 RIDVAN SAHIN AND AHMET KUCUK

[20] P. Majumdar and S. K. Samanta, Similarity measure of soft set, New Math. Nat. Comput.

4(1) (2008) 1-12.

[21] D.A. Molodtsov, Soft set theory—first results, Comput. Math. Appl. 37 (1999) 19–31.[22] R. Sahin, A. Kucuk, Soft filters and their convergence properties, Ann. Fuzzy Math. Inform.,

6 (3) (2013) 559-573.

[23] A. Sezgin and A. O. Atagun, On operations of soft sets, Comput. Math. Appl. 61(5), 1457–1467, 2011.

[24] A. Sezgin and A. O. Atagun, Soft groups and normalistic soft groups, Comput. Math. Appl.,

62(2),( 2011) 685-698.[25] Y. Zou and Z. Xiao, Data analysis approaches of soft sets under incomplete information,

Knowl.-Based Syst. 21(8) (2008) 941–945.

[26] X. Zhou and Q. Li, Generalized vague soft set and its lattice structures, Journal of Compu-tational Analysis & Applications, 17 (2014) 265-271.

Department of Mathematics, Faculty of Science, Ataturk University, Erzurum, 25240,

Turkey.E-mail address: [email protected]

E-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

814 RIDVAN SAHIN ET AL 803-814

Page 63: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

GENERATING FUNCTIONS FOR THE GENERALIZEDBIVARIATE FIBONACCI AND LUCAS POLYNOMIALS

ESRA ERKUS-DUMAN* AND NA·IM TUGLU

Abstract. The main object of this study is to derive various families of mul-tilinear and multilateral generating functions for the generalized bivariate Fi-bonacci and Lucas polynomials. Furthermore, we discuss some critical con-nections between the generalized bivariate Fibonacci, Lucas polynomials andthe well-known polynomials and numbers, such as, bivariate and univariateFibonacci and Lucas polynomials, the classical Fibonacci and Lucas numbers,Pell, Pell-Lucas, Jacobsthal, Jacobsthal-Lucas and also the rst and secondkind Chebyshev polynomials.

1. Introduction

The bivariate polynomials of Fibonacci and Lucas, denoted respectively by (Un) =(Un (x; y)) and (Vn) = (Vn (x; y)), are dened by

U0 = 0; U1 = 1; Un = xUn1 + yUn2; (n 2)

and

V0 = 2; V1 = x; Vn = xVn1 + yVn2; (n 2) :It is established, see for example [7, 9], that

(1) Un (x; y) =

[n12 ]Xk=0

n k 1

k

xn2k1yk;

(2) Vn (x; y) =

[n2 ]Xk=0

n

n k

n kk

xn2kyk:

In [3], G.P. Djordjevic considered the partial derivative sequences of the gen-eralized bivariate Fibonacci polynomials Un;m (x; y) and the generalized bivariateLucas polynomials Vn;m (x; y). These polynomials are dened by

Un;m = xUn1;m + yUnm;m ; n m;

with U0;m = 0; Un;m = xn1; n = 1; 2; :::;m 1 and

Vn;m = xVn1;m + yVnm;m ; n m;

Key words and phrases. Multilinear and multilateral generating functions, generalized bivari-ate Fibonacci polynomials, generalized bivariate Lucas polynomials.

* Corresponding author.2000 Math. Subject Classication : Primary 11B39, 11B83, Secondary 33C45.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

815 ESRA ERKUS-DUMAN ET AL 815-821

Page 64: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

2 E. ERKUS-DUMAN AND N. TUGLU

with V0;m = 2; Vn;m = xn; n = 1; 2; :::;m 1 and generated by

(3) t (1 xt ytm)1 =1Xn=0

Un;m (x; y) tn

and

(4)2 xtm1

(1 xt ytm)1 =

1Xn=0

Vn;m (x; y) tn:

Clearly, (3) and (4) yield the following explicit representations, respectively:

(5) Un;m (x; y) =

[n1m ]Xk=0

n 1 (m 1) k

k

xn1mkyk

and

(6) Vn;m (x; y) =

[ nm ]Xk=0

n (m 2) kn (m 1) k

n (m 1) k

k

xnmkyk:

If m = 2, then polynomials Un;m (x; y) and Vn;m (x; y) would reduce at once to thepolynomials Un (x; y) and Vn (x; y) given by (1) and (2), respectively.The aim of this paper is to obtain various families of multilateral and multilinear

generating functions for the generalized Fibonacci and Lucas polynomials. We alsogive their special cases for these polynomials. For the theory and applications ofthe various methods and techniques for deriving generating functions of specialfunctions and polynomials, we may refer the interested reader to a recent treatiseon the subject of generating functions [1, 2].

2. Bilinear and Bilateral Generating Functions

In this section, rstly we derive several families of bilinear and bilateral generat-ing functions for the generalized bivariate Fibonacci Polynomials Un;m (x; y) whichare generated by (3) and given explicitly by (5).We begin by stating the following theorem.

Theorem 2.1. Corresponding to an identically non-vanishing function (y1; :::; ys )of s complex variables y1; :::; ys (s 2 N) and of complex order , let

(7) ;(y1; :::; ys; z) :=1Xk=0

ak+k(y1; :::; ys )zk

(ak 6= 0 ; ; 2 C)and

(8) n;m;p;;(x; y; y1; :::; ys; ) :=

[n=p]Xk=0

akUnpk;m (x; y) +k(y1; :::; ys )k

n; p 2 N:Then we have

(9)1Xn=0

n;m;p;;(x; y; y1; :::; ys;

tp)tn =

t

1 xt ytm;(y1; :::; ys; )

provided that each member of (9) exists.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

816 ESRA ERKUS-DUMAN ET AL 815-821

Page 65: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

GENERALIZED BIVARIATE FIBONACCI AND LUCAS POLYNOMIALS 3

Proof. For convenience, let S denote the rst member of the assertion (9) of The-orem 2.1. Then, upon substituting for the polynomials

n;m;p;;(x; y; y1; :::; ys;

tp)

from the denition (8) into the left-hand side of (9), we obtain

(10) S =1Xn=0

[n=p]Xk=0

akUnpk;m (x; y) +k(y1; :::; ys )ktnpk :

Upon inverting the order of summation in (10), if we replace n by n + pk; we canwrite

S =1Xn=0

1Xk=0

ak Un;m (x; y) +k(y1; :::; ys )ktn

=1Xn=0

Un;m (x; y) tn1Xk=0

ak+k(y1; :::; ys )k

=t

1 xt ytm;(y1; :::; ys; );

which completes the proof of Theorem 2.1.

The partial derivatives of Un;m (x; y) are dened by [3]

U (k;j)n;m (x; y) =@k+j

@xk@yjUn;m (x; y) ; k 0; j 0:

Let k 0; j 0; r 0: Then, the generalized bivariate Fibonacci PolynomialsUn;m (x; y) have the following relation [3]:X

i1+i2+:::+ir=n

U(k;j)i1;m

(x; y)U(k;j)i2;m

(x; y) :::U(k;j)ir;m

(x; y)

=((k + j)!)

r

(rk + rj + r 1)!U(rk+r1;rj)n;m (x; y) :(11)

In precisely the same manner as described proof of Theorem 2.1 and using (11),we can prove the following result, immediately.

Theorem 2.2. For a non-vanishing function (y1; :::; ys ) of complex variablesy1; :::; ys (s 2 N) let

n;p;(x; y; y1; :::; ys; z)

: =

[n=p]Xh=0

ah((k + j)!)

r

(rk + rj + r 1)!U(rk+r1;rj)nrph;m (x; y) +h(y1; :::; ys )z

h;

(ah 6= 0 ; n; k; j; r 2 N0; N0 = N[f0g) :Then we have(12) Pi1+i2+:::+ir=n

[i1+i2+:::+ir=p]Pl=0

al U(k;j)i1pl;m (x; y) :::U

(k;j)irpl;m (x; y) +l(y1; :::; ys )z

l

= n;p;(x1; :::; xr; y1; :::; ys; z)

provided that each member of (12) exists.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

817 ESRA ERKUS-DUMAN ET AL 815-821

Page 66: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

4 E. ERKUS-DUMAN AND N. TUGLU

Now we derive several families of bilinear and bilateral generating functions forthe generalized bivariate Lucas Polynomials Vn;m (x; y) which are generated by (4)and given explicitly by (6).

Theorem 2.3. Corresponding to an identically non-vanishing function (y1; :::; ys )of s complex variables y1; :::; ys (s 2 N) and of complex order , let

;(y1; :::; ys; z) :=1Xk=0

ak+k(y1; :::; ys )zk

(ak 6= 0 ; ; 2 C)and

n;m;p;;(x; y; y1; :::; ys; ) :=

[n=p]Xk=0

akVnpk;m (x; y) +k(y1; :::; ys )k

n; p 2 N:Then we have

(13)1Xn=0

n;m;p;;(x; y; y1; :::; ys;

tp)tn =

2 xtm11 xt ytm;(y1; :::; ys; )

provided that each member of (13) exists.

Proof. In precisely the same manner as described proof of Theorem 2.1 and usingthe generating function (4) we can prove Theorem 2.3.

By expressing the multivariable function +k(y1; :::; ys ) (k 2 N0 ; s 2 N) interms of simpler function of one and more variables, we can give further applicationsof Theorems 2.1, 2.2 and 2.3. For example, if we set

s = r and +k(y1; :::; yr ) = h(1;:::;r)+k (y1; :::; yr)

in Theorem 2.1, where a multivariable extension of the Lagrange-Hermite polyno-mials h(1;:::;r)n (x1; :::; xr) are dened by means of the generating function [1]

(14)rYj=1

(1 xjtj)j

=

1Xn=0

h(1;:::;r)n (x1; :::; xr)tn;

j 2 C (j = 1; :::; r) ; jtj < min

j2f1;:::;rg

njx1j1=j

o;

then we obtain the following result which provides a class of bilateral generatingfunctions for the multivariable Lagrange-Hermite polynomials and the generalizedbivariate Fibonacci polynomials.

Corollary 2.4. If ;(y1; :::; yr; z) :=1Pk=0

akh(1;:::;r)+k (y1; :::; yr)z

k where (ak 6=

0 ; ; 2 C); and

n;m;p;;(x; y; y1; :::; yr; ) :=

[n=p]Xk=0

akUnpk;m (x; y)h(1;:::;r)+k (y1; :::; yr)

k

n; p 2 N:

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

818 ESRA ERKUS-DUMAN ET AL 815-821

Page 67: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

GENERALIZED BIVARIATE FIBONACCI AND LUCAS POLYNOMIALS 5

Then we have

(15)1Xn=0

n;m;p;;(x; y; y1; :::; ys;

tp)tn =

t

1 xt ytm;(y1; :::; ys; )

provided that each member of (15) exists.

Remark 2.1. Using the generating relation (14) for the multivariable Lagrange-Hermite polynomials and taking ak = 1; = 0; = 1; we have

1Xn=0

[n=p]Xk=0

Unpk;m (x; y)h(1;:::;r)k (y1; :::; yr)

ktnpk

=t

1 xt ytmrYj=1

(1 yjj)j

;

wherejj < min

njy1j1 ; :::; jyrj1=r

o:

Choosing s = 2 and +k(u1; u2 ) = U(k;j)+k;m (u1; u2) ; (; 2 N0); in Theorem

2.2 we obtain the following class of bilinear generating functions for the partialderivatives of the generalized bivariate Fibonacci polynomials Un;m (x; y).

Corollary 2.5. If

n;p;(x; y;u1; u2; z)

: =

[n=p]Xh=0

ah((k + j)!)

r

(rk + rj + r 1)!U(rk+r1;rj)nrph;m (x; y)U

(k;j)+k;m (u1; u2) z

h;

where ah 6= 0 ; ; 2 N0: Then we have(16) Pi1+i2+:::+ir=n

[i1+i2+:::+ir=p]Pl=0

al U(k;j)i1pl;m

(x; y) :::U(k;j)irpl;m (x; y)U

(k;j)+l;m (u1; u2) z

l

= n;p;(x; y;u1; u2; z)

provided that each member of (16) exists.

If we sets = 1 and +k(u ) = E+k(u)

in Theorem 2.3, where the Euler polynomials En (x) is dened by means of thegenerating function [4]

(17)2ext

et + 1=

1Xn=0

En (x)tn

n!;

then we obtain the following result which provides a class of bilateral generatingfunctions for the Euler polynomials and the generalized bivariate Lucas polynomi-als.

Corollary 2.6. If ;(u; z) :=1Pk=0

akE+k(u)zk where (ak 6= 0 ; ; 2 C); and

n;m;p;;(x; y;u; ) :=

[n=p]Xk=0

akVnpk;m (x; y)E+k(u)k

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

819 ESRA ERKUS-DUMAN ET AL 815-821

Page 68: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

6 E. ERKUS-DUMAN AND N. TUGLU

n; p 2 N:Then we have

(18)1Xn=0

n;m;p;;(x; y;u;

tp)tn =

2 xtm11 xt ytm;(y1; :::; ys; )

provided that each member of (18) exists.

Remark 2.2. Using the generating relation (17) for the Euler polynomials and

taking ak =1

k!; = 0; = 1; we have

1Xn=0

[n=p]Xk=0

1

k!Vnpk;m (x; y)Ek(u)

ktnpk

=2eu

2 xtm1

(e + 1) (1 xt ytm) :

Furthermore, for every suitable choice of the coe¢ cients ak (k 2 N0); if themultivariable function +k(y1; :::; ys); (s 2 N); is expressed as an appropriateproduct of several simpler functions, the assertions of Theorems 2.1, 2.2 and 2.3can be applied in order to derive various families of multilinear and multilateralgenerating functions for the generalized bivariate Fibonacci and Lucas polynomials.

3. Further Consequences

In this section, we give some special cases of the results obtain in the previoussection. Here, we only discuss some critical connections between the generalizedbivariate Fibonacci, Lucas polynomials and the well-known polynomials and num-bers, but we avoid their statements and proofs.

(a) In the case of m = 2, our all results contain several families of multilat-eral and multilinear generating functions of the bivariate polynomials ofFibonacci and Lucas given in (1) and (2).

(b) If we choosem = 2 and y = 1, then we get miscellaneous results for the fam-ilies of multilinear and multilateral generating functions of the (univariate)Fibonacci and Lucas polynomials, respectively, by (see [8]):

fn (x) =

[n12 ]Xk=0

n 1 k

k

xn12k;

ln (x) =

[n2 ]Xk=0

n

n k

n kk

xn2k:

(c) If we take m = 2 and x = y = 1, then we now obtain some families of mul-tilinear and multilateral generating functions for the well-known Fibonacciand Lucas numbers dened by (see, for example, [8])

Fn =

[n12 ]Xk=0

n 1 k

k

;

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

820 ESRA ERKUS-DUMAN ET AL 815-821

Page 69: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

GENERALIZED BIVARIATE FIBONACCI AND LUCAS POLYNOMIALS 7

Ln =

[n2 ]Xk=0

n

n k

n kk

:

(d) Of course, replacing x by 2x in (1) and (2) (and resp. replacing y by2y in (1) and (2)) from (a), we get various families of multilinear andmultilateral generating functions for the Pell and Pell-Lucas polynomials(and resp. Jacobsthal and Jacobsthal-Lucas polynomials) [5, 6].

(e) By using the following relation (see [8]) between Fibonacci and the rstkind Chebyshev polynomials Un (x)

fn (x) = nin1Un1

ix2

;n 1 and i =

p1;

all results in (b) can be modied according to the polynomials Un (x).

(f) Similarly, with the help of the fact that

ln (x) = 2inTn

ix2

; (n 0) ;

where Tn (x) denotes the second kind Chebyshev polynomials, the resultsin (b) are also valid for the polynomials Tn (x). We should recall that thewell-known properties of the rst and second kind Chebyshev polynomialsmay be found in the books [10].

References

[1] Alt¬n, A. and Erkus, E. On a multivariable extension of the Lagrange-Hermite polynomials,Integral Transform. Spec. Funct. 17 (2006), 239-244.

[2] Alt¬n, A., Aktas, R. and Erkus-Duman, E. On a multivariable extension for the extendedJacobi polynomials, J. Math. Anal. Appl. 353 (2009), 121-133.

[3] Djordjevic, G.B. Some properties of partial derivatives of generalized Fibonacci and Lucaspolynomials. Fibonacci Quart. 39 (2001), 138141.

[4] Erdélyi, A., Magnus, W., Oberhettinger F. and Tricomi, F.G. Higher Transcendental Func-tions, Vol. III, McGraw-Hill Book Company, New York, Toronto and London, 1955.

[5] Horadam, A.F. Jacobsthal representation polynomials, Fibonacci Quart., 35, 2 (1997), 137-148

[6] Horadam, A.F., Mahon, Br. J. M., Pell and Pell-Lucas polynomials, Fibonacci Quart., 23, 2(1985), 7-20.

[7] Lucas, E. Théorie des Nombres, Gauthier-Villars, Paris, 1891.[8] Lupas, A. A guide of Fibonacci and Lucas polynomials. Octogon Math. Mag., 7(1) (1999),

3-12.[9] Swamy, M.N.S. Generalized Fibonacci and Lucas polynomials and their associated diagonal

polynomials. Fibonacci Quart. 37 (1999), 213222.[10] Szegö, G. Orthogonal Polynomials, American Mathematical Society Colloquium Publications,

Vol. 23. New York, 1939.

Esra Erkus-Duman and Naim TugluGazi University, Faculty of Sciences and Arts,Department of Mathematics, Teknikokullar TR-06500, Ankara, Turkey.E-mail address (E. Erkus-Duman): [email protected] address (N. Tuglu): [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

821 ESRA ERKUS-DUMAN ET AL 815-821

Page 70: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Integral norms of QK,ω(p, q; n) spaces and weighted

Bloch spaces

A. El-Sayed AhmedSohag University, Faculty of Science, Department of Mathematics,

Sohag 82524, Egypt andTaif University, Faculty of Science, Mathematics Department

Box 888 El-Hawiyah, El-Taif 5700, Saudi Arabiae-mail: [email protected]

Aydah AhmadiAl Jouf University, Mathematics Deartment, Al Jouf Saudi Arabia

AbstractIn this paper we characterize QK,ω(p, q; n) spaces of analytic functions on the unit disk in terms of

nondecreasing functions. The relations between integral norms of QK,ω(p, q; n) spaces and the normsof weighted Bloch spaces Bα

ω are given. Further, we obtain similar criteria for the little weightedBloch space of analytic functions.

1 Introduction

Let ∆ = z : |z| < 1 be the open unit disk in the complex plane C. Recall that the well known Blochspace (cf. [1, 2, 23, 26, 27, 28]) is defined as follows:

B = f : f analytic in ∆ and supz∈∆

(1− |z|2)|f ′(z)| < ∞.

Let 0 < q < ∞. The Besov-type spaces

Bq =

f : f analytic in ∆ and supa∈∆

∣∣f ′(z)∣∣q(1− |z|2)q−2(1− |ϕa(z)|2)2dσz < ∞

are introduced and studied intensively by Stroethoff (cf. [32]), where dσz is the Euclidean area elementdxdy. Here, ϕa(z) stands for the Mobius transformation of ∆ given by ϕa(z) = a−z

1−az , where a ∈ ∆. In1994, Aulaskari and Lappan [14] introduced a class of holomorphic functions, the so called Qp-spaces asfollows:

Qp =

f : f analytic in ∆ and supa∈∆

∣∣f ′(z)∣∣2gp(z, a)dσz < ∞

,

where 0 < p < ∞ and the weight function g(z, a) = log∣∣∣∣1−az

a−z

∣∣∣∣ is defined as the composition of the

Mobius transformation ϕa and the fundamental solution of the two-dimensional real Laplacian. Theweight function g(z, a) is actually Green’s function in ∆ with pole at a ∈ ∆.For 0 < p < ∞, −2 < q < ∞, we say that a function f analytic in ∆ belongs to the space QK(p, q) (cf.[9, 11, 33]), if

‖f‖K,p,q = supa∈∆

∣∣f ′(z)∣∣p(1− |z|2)q

K(g(z, a))dσz < ∞.

AMS: 32A18, 46E15Key words and phrases : weighted Bloch spaces, QK,ω(p, q; n) spaces

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

822 A. El-Sayed Ahmed et al 822-833

Page 71: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

2

Recall that the analytic function

f(z) =∞∑

k

akznk (with nk ∈ N ; for all k ∈ N = 1, 2, 3, . . .)

is said to belong to the Hadamard gap class (also known as lacunary series) if there exists a constantc > 1 such that nk+1

nk≥ c for all k ∈ N (see e.g. [4, 5, 22, 24]).

Now, given a reasonable function ω : (0, 1] → [0,∞), the weighted Bloch space Bω (see [16]) is defined asthe set of all analytic functions f on ∆ satisfying

(1− |z|)|f ′(z)| ≤ Cω(1− |z|), z ∈ ∆,

for some fixed C = Cf > 0. In the special case where ω ≡ 1,Bω reduces to the classical Bloch space B.Here, the word “reasonable” is a non-mathematical term; it was just intended to mean that the “not toobad” and the function satisfy some natural conditions.Now, we introduce the following definitions:

Definition 1.1 For a given reasonable function ω : (0, 1] → [0,∞) and for 0 < α < ∞. An analyticfunction f on ∆ is said to belong to the α−weighted Bloch space Bα

ω;n if

‖f‖Bαω;n

= supz∈∆

(1− |z|)nα

ω(1− |z|) |f(n)(z)| < ∞; n ∈ N.

Definition 1.2 For a given reasonable function ω : (0, 1] → [0,∞) and for 0 < α < ∞. An analyticfunction f on ∆ is said to belong to the little weighted Bloch space Bα

ω,n;0 if

‖f‖Bαω;n,0

= lim|z|→1−

(1− |z|)nα

ω(1− |z|) |f(n)(z)| = 0; n ∈ N.

One should note that this class is different from the weighted Bloch space which studied in [36].Throughout this paper and for some techniques we consider the case of ω 6≡ 0. Now, we introduce thefollowing definition:

Definition 1.3 For a nondecreasing function K : [0,∞) → [0,∞), 0 < p < ∞, −2 < q < ∞ and for agiven reasonable function ω : (0, 1] → (0,∞), an analytic function f in ∆ is said to belong to the spaceQK,ω(p, q; n) if

‖f‖pK,ω,p,q;n = sup

a∈∆

∣∣f (n)(z)∣∣p(1− |z|)np−p+q K(g(z, a))

ωp(1− |z|) dσz < ∞; n ∈ N.

Remark 1.1 It should be remarked that QK,ω(p, q; n) classes are more general than many classes ofanalytic functions. If n = 1, we obtain the class QK,ω(p, q) as studied in [10, 29, 30]. If n = 1, andω ≡ 1, we obtain QK(p, q) type spaces (cf. [9, 11, 33]). If If n = 1, q = p = 2, and ω(t) = t, weobtain QK spaces as studied recently in [17, 18, 34] and others. If If n = 1, q = p = 2, ω(t) = t andK(t) = tp, we obtain Qp spaces as studied in [14, 15] and others. If If n = 1, ω ≡ 1 and K(t) = ts, thenQK,ω = F (p, q, s) classes (cf. [8, 37, 38]).

In this paper, we characterize the weighted Bloch space Bαω;n by QK,ω(p, q; n) spaces. One of the main

results is a general Besov-type characterization for Bαω;n functions that extends and generalizes the

Stroethoff’s theorem [32]. Also, we extend and improve some results due to Essen et. al [18] usingour new definitions.

2 Analytic QK,ω(p, q; n) classes

In this paper we show some relations betwen QK,ω(p, q;n) norms and Bαω;n norms for a nondecreasing

function K, also we give a general way to construct different spaces QK,ω1(p, q; n) and QK2,ω(p, q;n) by

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

823 A. El-Sayed Ahmed et al 822-833

Page 72: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

3

using some functions K1 and K2.Before proving theorems we recall some few facts about the Mobius function ϕa. First, the function ϕa

is easily seen as:(ϕa ϕa)(z) = z for all z ∈ ∆

The following identity can be obtained by straight forward computation:

1− |ϕa(z)|2 =(1− |a|2)(1− |z|2)

|1− az|2 , a, z ∈ ∆.

A slightly different form in which we will apply the above identity is:

1− |ϕa(z)|21− |z|2 = |ϕ′a(z)| , a, z ∈ ∆. (1)

For a point a ∈ ∆ and 0 < r < 1, the pseudo-hyperbolic disc ∆(a, r) with pseudo-hyperbolic center aand pseudo-hyperbolic radius r is defined by ∆(a, r) = ϕa(r∆).For a ∈ ∆, the substitution z = ϕa(w) results in the Jacobian change in measure given by the equalitydσw = |ϕ′a(z)|2dσz. For a Lebesgue integrable or a non-negative Lebesgue measurable function h on ∆we thus have the following change-of-variable formula:

∆(0,r)

h(ϕa(w))dσw =∫

∆(a,r)

h(z)(

1− |ϕa(z)|21− |z|2

)2

dσz . (2)

We assume throughout this paper that∫ 1

0

K

(log

1r

)r

(1− r)2dr < ∞ . (3)

We need the following lemmas in the sequel.

Lemma 2.1 Let α ∈ (0,∞) and suppose that f(z) =∞∑

j=1

ajznj belongs to Hadamard gap class. Then

f ∈ Bαω;n if and only if

supj∈N

|aj |n1−αj < ∞ , where N = 1, 2, 3, . . . .

Proof: The proof is very similar to the overspending result in [35] with simple modifications, so it willbe omitted.

Lemma 2.2 For a given reasonable function ω : (0, 1] → [0,∞). Let f1(z), f2(z) be analytic functions on∆. Then,

|f (n)1 (z)|+ |f (n)

2 (z)| ≈ ω(1− |z|)(1− |z|) , z ∈ ∆. (4)

Proof: If n = 1, the proof is known from [29]. Now, we consider the case 1 < n < ∞. For a large numberq ∈ N, choose a gap series:

f(n−1)1 (z) =

∞∑

j=0

zqj

, z ∈ ∆.

Then, apply lemma 2.1 to infer that (1−|z|)|f(n)1 (z)|

ω((1−|z|)) ≤ λ holds for all z ∈ ∆, where λ is a constant.Furthermore, let us verify

(1− |z|)|f (n)1 (z)|

ω((1− |z|)) ≥ λ , 1− q−k ≤ |z| ≤ 1− q−(k+ 12 ) , k ∈ N. (5)

Andq−(k+ 1

2 ) ≤ 1− |z| ≤ q−k ⇒ ω(q−(k+ 12 )) ≤ ω(1− |z|) ≤ ω(q−k).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

824 A. El-Sayed Ahmed et al 822-833

Page 73: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

4

Observe that for any z ∈ ∆,

|f (n)1 (z)| ≥ qk|z|qk −

k−1∑

j=0

qj |z|qj −∞∑

k+1

qj |z|qj

= T1 − T2 − T3.

Then, fix a z with |z| ∈ [1− q−k, 1− q−(k+ 12 )], k ∈ N, and put x = |z|qk

. Thus

(1− q−k)qk ≤ x ≤ [(1− q−(k+ 12 ))qk+ 1

2 ]q−12 .

If q is large enough, then for k ≥ 1 one has

13≤ x ≤ (

12)q−12 , (6)

and hence T1 ≥ qk

3 . Since it is easy to establish T2 ≤ 1n−1

∑k−1j=0 qj ≤ qk

q−1 , it remains to deal with the

third term T3. Noting that |z|qn(q−1) ≤ |z|qk+1(q−1), n ≥ k + 1, namely, in T3 the quotient of twosuccessive terms is not greater than the ratio of the first two terms, one finds that the series of T3 iscontrolled by the geometric series having the same first two terms. Accordingly (6) is applied to produce

T3 ≤ qk+1|z|qk+1∞∑

j=0

(q|z|qk+2−qk+1

)j

=qk+1|z|qk+1

1− q|z|(qk+2−qk+1)= qk qxq

1− qxq2−q≤ qk q( 1

2 )q12

1− q( 12 )q

32 − q

12

.

The preceding estimates for T1, T2 and T3 imply

|f (n)1 (z)| ≥ qk

4ω(1− |z|)ω(1− |z|) =

qk+ 12

4q12

ω(1− |z|)ω(1− |z|)

≥ ω(1− |z|)4q

12 (1− |z|)× ω(1− |z|) ≥

ω(1− |z|)4q

12 ω(q−k)× (1− |z|) ; ω(q−k) 6→ ∞.

Reaching (5). In a completely similar manner one can prove that if q is a large natural number, for example

q = m2 where m is a large natural number, and if f(n−1)2 (z) =

∞∑j=0

zqj

, z ∈ ∆, then (1−|z|2)|fn2 (z)| ≤ λ

for all z ∈ ∆ (owing to Lemma 2.1) and

(1− |z|)|f (n)1 (z)|

ω((1− |z|)) ≤ λ, 1− q−(k+ 12 ) ≤ |z| ≤ 1− q−(k+1), k ∈ N. (7)

Of course, (5) and (7) yield (4) unless it occurs that f(n)1 (z) and f

(n)2 (z) have common zero in z ∈ ∆ :

|z| < 1− q−1 in which case one can replace f2(z) with f2(ζz) for appropriate ζ ∈ ∂∆, where ∂∆ is theboundary of the unit disk (note that f (n)(0) = 1). Our lemma is therefore proved .

Using the same steps of Lemma 2.2, it is not hard to prove the following lemma.

Lemma 2.3 Let ω : (0, 1] → (0,∞) and let 1 ≤ α < ∞. Then there are two functions f1 , f2 ∈ Bαω;n

such that

|f (n)1 (z)|+ |f (n)

2 (z)| ≈ ω(1− |z|)(1− |z|)α

, z ∈ ∆. (8)

Proof: The proof is very similar to the proof of Lemma 2.2 and lemma 3.1 in [19], so it will be omitted.

Theorem 2.1 Let 0 < p < ∞, −2 < q < ∞. Then, for each non-decreasing function K : [0,∞) → [0,∞)and for a given reasonable non-decreasing function ω : (0, 1] → (0,∞) with ω(k t) ≈ ω(t), k > 0, wehave that(i) QK,ω(p, q; n) ⊂ B

np−p+q+2p

ω;n and

(ii) QK,ω(p, q; n) = Bnp−p+q+2

pω;n if and only if (3) holds.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

825 A. El-Sayed Ahmed et al 822-833

Page 74: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

5

Proof: For a fixed r ∈ (0, 1) and a ∈ ∆, let

E(a, r) =

z ∈ ∆ , |z − a| < r(1− |a|)

.

We know that E(a, r) ⊂ ∆(a, r) and for any z ∈ E(a, r), we have

(1− r)(1− |a|) ≤ 1− |z| ≤ (1 + r)(1− |a|),which means that 1− |z| ' 1− |a| for any z ∈ E(a, r). Denote

Fω,p,q;n(f)(z) =∣∣f (n)(z)

∣∣p (1− |z|)np−p+q

ωp(1− |z|)Then, we obtain

Fω,p,q;n(f)(z)K(g(z, a)

)dσz ≥

∆(a,r)

Fω,p,q;n(f)(z)K(g(z, a)

)dσz

≥ K

(log

1r

) ∫

∆(a,r)

Fω,p,q;n(f)(z) d σz

≥ K

(log

1r

) ∫

E(a,r)

Fω,p,q;n(f)(z) dσz.

For every z ∈ E(a, r), we have that

(1− r)(1− |a|) ≤ 1− |z| ≤ (1 + r)(1− |a|).Now, since we assume that ω is non-decreasing, then we obtain that

E(a,r)

Fω,p,q;n(f)(z) dσz ≥ (1− r)np−p+q(1− |a|)np−p+q

ωp((1− r)(1− |a|))∫

E(a,r)

∣∣f (n)(z)∣∣p dσz.

Since |f (n)(z)|p is a subharmonic function, then∫

E(a,r)

∣∣f (n)(z)∣∣p dσz ≥ |E(a, r)| × |f (n)(a)

∣∣p = r2(1− |a|)2|f (n)(a)∣∣p.

Then we obtain∫

Fω,p,q;n(f)(z)K(g(z, a)

)dσz ≥ K

(log

1r

)(1− r)p(1− |a|)q+2

ωp((1− r)(1− |a|)) |f(n)(a)

∣∣p

≥ πr2K

(log

1r

)(1− r)np−p+q(1− |a|)np−p+q+2

ωp(1− |a|) |f (n)(a)∣∣p

If f ∈ QK,ω(p, q; n), then by the above estimate we have that

supa∈∆

(1− |a|)np−p+q+2|f (n)(z)|pωp(1− |a|) < ∞.

The proof of (i) is therefore completed.

Now, we show that Bnp−p+q+2

pω;n ⊂ QK,ω(p, q;n) provided that K satisfies condition (3). For f ∈ B

np−p+q+2p

ω;n ,we have that,

Fω,p,q;n(f)(z)K(g(z, a)

)dσz ≤

∥∥f∥∥p

Bnp−p+q+2

pω;n

(1− |z|2)−2K(g(z, a)

)d σz

= 2π∥∥f

∥∥p

Bnp−p+q+2

pω;n

∫ 1

0

K

(log

1r

)r

(1− r2)2dr < ∞,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

826 A. El-Sayed Ahmed et al 822-833

Page 75: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

6

which shows thatB

np−p+q+2p

ω;n ⊂ QK,ω(p, q;n).

Now we assume that Bnp−p+q+2

pω;n = QK,ω(p, q;n) and we verify that (3) holds. From Lemma 2.3, for f1

and f2 in Bnp−p+q+2

pω;n , we have that

|f (n)1 (z)|+ |f (n)

2 (z)| ≥ ω(1− |z|)(1− |z|)np−p+q+2

p

. (9)

Then f1, f2 ∈ QK,ω(p, q;n) and

∞ > supa∈∆

(∣∣f (n)1 (z)

∣∣p +∣∣f (n)

2 (z)∣∣p

)(1− |z|)np−p+q+2 K

(g(z, a)

)

ωp(1− |z|) dσz

≥∫

(∣∣f (n)1 (z)

∣∣ +∣∣f (n)

2 (z)∣∣)p

(1− |z|)np−p+q+2 K(g(z, 0)

)

ωp(1− |z|) dσz (10)

From (9) and (10), we obtain

(∣∣f (n)1 (z)

∣∣p +∣∣f (n)

2 (z)∣∣p) (1− |z|)np−p+q+2 K

(g(z, 0)

)

ωp(1− |z|) dσz ≈ 2π

∫ 1

0

K

(log

1r

)r

(1− r)2dr.

Thus (3) holds, and this completes the proof.

We say that f ∈ QK,ω,0(p, q; n) if

lim|a|→1−

∣∣f (n)(z)∣∣p (1− |z|)np−p+q+2 K(g(z, a))

ωp(1− |z|) dσz = 0. (11)

Now, we give the following result for QK,ω,0(p, q;n) and Bαω,n;0 classes.

Theorem 2.2 Let 0 < p < ∞, −2 < q < ∞. Then, for each non-decreasing function K : [0,∞) → [0,∞)and for a given reasonable non-decreasing function ω : (0, 1] → (0,∞) with ω(k t) ≈ ω(t), k > 0, wehave that(i) QK,ω,0(p, q;n) ⊂ B

np−p+q+2p

ω,n;0 and

(ii) QK,ω,0(p, q;n) = Bnp−p+q+2

p

ω,n;0 , if and only if (3) holds.

Proof: Without loss of generality, we assume that K(1) > 0. From the proof of Theorem 2.1, we havethat

π( 1e )2 K(1) (1−|a|)np−p+q+2

ωp(1−|a|) |f (n)(a)|p ≤ K(1)∫

E(a)

Fω,p,q;n(f)(z) dσz

≤ K(1)∫

∆(a, 1e )

Fω,p,q;n(f)(z) dσz

≤∫

Fω,p,q;n(f)(z)K(g(z, a)

)dσz ,

where

E(a) =

z ∈ ∆ , |z − a| < 1e(1− |a|)

.

If f ∈ QK,ω,0(p, q;n), we obtain that

lim|a|→1−

(1− |a|)np−p+q+2|f (n)(a)|pωp(1− |a|) = 0.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

827 A. El-Sayed Ahmed et al 822-833

Page 76: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

7

(ii) We only need to prove that Bnp−p+q+2

p

ω,n;0 ⊂ QK,w,0(p, q; n). Assume that

A =∫ 1

0

K

(log

1r

)r

(1− r)2dr < ∞.

For a given ε > 0 there exists an r1, 0 < r1 < 1, such that∫ 1

r1

K

(log

1r

)r

(1− r)2dr < ε. (12)

Then we have that,∫

∆\∆(a,r1)

∣∣f (n)(z)∣∣p (1− |z|)np−p+q K(g(z, a))

ωp(1− |z|) dσz

≤ ∥∥f∥∥p

Bnp−p+q+2

pω,n;0

∆\∆(a,r1)

K(g(z, a))(1− |z|)2 dσz

=∥∥f

∥∥p

Bnp−p+q+2

pω,n;0

r1<|w|<1

K

(log

1|w|

)1

(1− |w|)2 dσw

=∥∥f

∥∥p

Bnp−p+q+2

pω,n;0

∫ 1

r1

K

(log

1r

)r

(1− r)2dr ≤ 2π ε

∥∥f∥∥p

Bnp−p+q+2

pω,n;0

. (13)

Similarly, if f ∈ Bnp−p+q+2

p

ω,n;0 , we obtain that

|f (n)(ϕa(w))|p (1− |ϕa(w)|2)np−p+q+2p

ωp(1− |ϕa(w)|) −→ 0

converges uniformly for |w| ≤ r if |a| → 1−, where r is fixed and 0 < r < 1. Then, we obtain that

lim|a|→1−

∣∣f (n)(z)∣∣p (1− |z|)np−p+q K

(g(z, a)

)

ωp(1− |z|) dσz

= lim|a|→1−

|w|<r

∣∣f (n)(ϕa(w))∣∣p (1− |ϕa(w)|)np−p+q K

(log 1

|w|)

ωp(1− |ϕa(w)|)(1− |w|)2 dσw

≤ A lim|a|→1−

sup|w|≤r1

∣∣f (n)(ϕa(w))∣∣p (1− |ϕa(w)|)np−p+q+2

ωp(1− |ϕa(w)|) = 0. (14)

By (13) and (14) it is easy to obtain that

lim|a|→1−

∣∣f (n)(z)∣∣p (1− |z|)np−p+q K

(g(z, a)

)

ωp(1− |z|) dσz = 0. (15)

Conversely, suppose that (3) does not hold; that is∫ 1

0

K

(log

1r

)r

(1− r)2dr = ∞.

Thus we find a continuous strictly decreasing function g : [0, 1) −→ [0,∞) tending to zero at 1 such that∫ 1

0

K

(log

1r

)g(r)

(1− r)2ωp(1− r)r dr = ∞. (16)

It is easy to see that

r2k+1−2 ≥ exp−2k+2(1 + r), r ∈ [0.5, 1). (17)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

828 A. El-Sayed Ahmed et al 822-833

Page 77: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

8

We know that for β > 0 that, t2β exp−4tt= β2

=(

β2

)2β exp−2β. Then, there exists an integer k for34 ≤ r < 1 such that β

2 ≤ 2k(1− r) < β+12 and

2βk exp−2k+2(1− r) = (1− r)−2β

(2k(1− r)

)2β

exp−2k+2(1− r)

>

(1 + β

2

)2β

(1− r)−2β exp−2(β + 1). (18)

For 34 ≤ r < 1 we define

f0(z) =∞∑

k=0

ak 22kp z2k

,

where ak = g(1− (p+1)

p 2k), k = 0, 1, 2, . . . . By (17) and (18), we deduce that

M22 (r, f (n)

0 ) =∫ 2π

0

|f (n)0 (r eiθ)|2 dθ = 2π

∞∑

k=0

a2k (2k − 1)! 2

2k(p+2)p z2k−2

≥ 2π(g(r)

) 2p (2k − 1)! 2

2k(q+2)p exp−2k+2(1− r) ≥ λ

(g(r)

) 2p (1− r)

−2(q+2)p , (19)

where λ is a constant. Since f0 is defined by a gap series with Hadamard condition, we have

M2(r, f(n)0 ;ω) ≈ Mp(r, f

(n)0 ; ω), where Mp(r, f

(n)0 ; ω) =

(∫ 2π

0

|f (n)0 (r eiθ)|pωp(1− r)

) 1p

.

Therefore,

supa∈∆

∣∣f (n)0 (z)

∣∣p(1− |z|)np−p+q K(g(z, a))ωp(1− |z|) dσz

≥∫ 1

0

Mpp (r, f (n)

0 )(1− r)np−p+qK

(log

1r

)r dr

≈∫ 1

0

Mp2 (r, f (n)

0 )(1− r)np−p+qK

(log

1r

)r dr

≥∫ 1

34

K

(log

1r

)g(r)

(1− r)2ωp(1− r)r dr = ∞.

This means that f0 ∈ Bq+2

p

ω,,;0 \QK,w,0(p, q; n), which is a contraction. Hence (3) holds. This completes theproof of our theorem.

3 Weights on QK,ω(p, q; n)-spaces

The following result means that the kernel function K can be chosen as bounded.

Theorem 3.1 Assume that K(1) > 0 and K1(r) = infK(r), K(1), then for 0 < p < ∞, −2 < q < ∞,we have that

QK,w(p, q; n) = QK1,w(p, q; n).

Proof: Since K1 ≤ K and K1 is nondecreasing, it is clear that QK,ω(p, q; n) ⊂ QK1,w(p, q; n). It remainsto prove that

QK1,ω(p, q; n) ⊂ QK,ω(p, q; n).

We note thatg(z, a) > 1, z ∈ ∆(a,

1e) and

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

829 A. El-Sayed Ahmed et al 822-833

Page 78: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

9

g(z, a) ≤ 1, z ∈ ∆ \∆(a,1e).

Thus K(g(z, a)) = K1(g(z, a)) in ∆\∆(a, 1e ). It suffices to deal with integrals over ∆(a, 1

e ).If f ∈ QK1,ω(p, q; n) and f is a weighted Bloch function i.e, f ∈ Bω;n, then by Theorem 2.1, it followsthat

∆(a, 1e )

|f (n)(z)|p (1− |z|)np−p+q K(g(z, a)

)

ωp(1− |z|) dσz

≤∥∥f

∥∥p

Bnp−p+q+2

pω;n

∆(a, 1e )

K(g(z, a)

) 1(1− |z|)2 dσz

=∥∥f

∥∥p

Bnp−p+q+2

pω;n

∆(0, 1e )

K

(log

1|w|

)1

(1− |z|)2 dσw ≤ C∥∥f

∥∥p

Bnp−p+q+2

pω;n

Thus, f ∈ QK,ω(p, q; n) and Theorem 4.1 is proved.

Corollary 3.1 Suppose that 0 < p < ∞, −2 < q < ∞ and ω : (0, 1] → (0,∞). Then f ∈ QK,w(p, q; n) ifand only if

supa∈∆

|f (n)(z)|p (1− |z|)q K(1− |ϕa(z)|2)ωp(1− |z|) dσz < ∞.

For the application of the above results, we state the following lemma which is needed later.

Lemma 3.1 Suppose that K : [0,∞) → [0,∞), 0 < p < ∞, −2 < q < ∞ and ω : (0, 1] → (0,∞). Then

(i) f ∈ Bnp−p+q+2

pω;n if and only if there exists R ∈ (0, 1) such that

supa∈∆

∆(a,R)

|f (n)(z)|p (1− |z|)np−p+q K(g(z, a))ωp(1− |z|) dσz < ∞, (20)

(ii) f ∈ Bnp−p+q+2

p

ω,n;0 if and only if there exists R ∈ (0, 1) such that

lim|a|→1−

∆(a,R)

|f (n)(z)|p (1− |z|)np−p+q K(g(z, a))ωp(1− |z|) dσz = 0. (21)

Proof: (i) Assume f ∈ Bnp−p+q+2

pω;n . For any R ∈ (0, 1) and a ∈ ∆, we have

∆(a,R)

|f (n)(z)|p (1− |z|)np−p+q K(g(z, a))ωp(1− |z|) dσz

=∫

∆(0,R)

|f (n)(ϕa(z))|p (1− |ϕa(z)|2)np−p+q+2

(1 + |ϕa(z)|)np−p+q+2

K(

1|z|

)

(1− |z|2)2ωp(1− |z|) dσz

≤ ‖f‖p

Bnp−p+q+2

pω;n

∆(0,R)

K

(log

1|z|

)1

(1− |z|2)2 dσz

≤ λ1‖f‖p

Bnp−p+q+2

pω;n

,

where 1 < (1 + |ϕa(z)|)np−p+q+2 < 2np−p+q+2 and λ1 is a constant. Conversely, suppose that (20) holdsfor some R, 0 < R < 1, by the proof of Theorem 2.1 (i) with 1 − |a| ≈ 1 − |z| on E(a,R) ; a, z ∈ ∆, weobtain ∫

∆(a,R)

|f (n)(z)|p (1− |z|)np−p+q K(g(z, a))ωp(1− |z|) dσz

≥ K(log1R

)∫

∆(a,R)

|f (n)(z)|p (1− |z|)np−p+q

ωp(1− |z|) dσz

≥ λ2 K

(log

1R

)ω−p(1− |a|)

E(a,R)

|f (n)(z)|p (1− |z|)np−p+qdσz

≥ πλ2R2K

(log

1R

)(1− |a|)np−p+q

ωp(1− |a|) |f (n)(a)|p , (22)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

830 A. El-Sayed Ahmed et al 822-833

Page 79: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

10

where λ2 is a constant. The last inequality shows that f ∈ Bnp−p+q+2

pω;n The proof of (ii) is similar to proof

(i) by taking the limit when |a| −→ 1− in (i), hence it can be omitted.

Theorem 3.2 Let 0 < p < ∞, −2 < q < ∞ and ω : (0, 1] → (0,∞). Assume K1(r) ≤ K2(r) forr ∈ (0, 1) and K1(r)

K2(r)→ 0 as r → 0. If the integral in (3) is divergent for K2, then

QK2,ω(p, q; n) $ QK1,ω(p, q;n).

Proof: It is clear that QK2,ω(p, q;n) ⊂ QK1,ω(p, q; n). Suppose that

QK2,ω(p, q;n) = QK1,ω(p, q; n).

By the open mapping theorem (see [25]), we know that the identity map from one of these spaces intothe other one is continuous. Thus there exists a constant C such that

‖f‖K2,ω(p,q;n) ≤ C‖f‖K1,ω(p,q;n) .

Since K1(r)K2(r)

→ 0 as r → 0, then there exists r0 ∈ (0, 1) such that

K1(r) ≤ (2C)−1K2(r) for 0 < r ≤ r0.

Choose t0 = e−r0 and we deduce that if f ∈ QK2,ω(p, q;n), then

supa∈∆

|f (n)(z)|p (1− |z|)np−p+q K2

(g(z, a)

)

ωp(1− |z|) dσz

≤ C supa∈∆

∆(a,t0)

|f (n)(z)|p (1− |z|)q K1

(g(z, a)

)

ωp(1− |z|) dσz

+12

supa∈∆

|f (n)(z)|p (1− |z|)np−p+q K2

(g(z, a)

)

ωp(1− |z|) dσz .

Therefore,

supa∈∆

|f (n)(z)|p (1− |z|)np−p+q K2

(g(z, a)

)

ωp(1− |z|) dσz

≤ 2C supa∈∆

∆(a,t0)

|f (n)(z)|p (1− |z|)np−p+q K1

(g(z, a)

)

ωp(1− |z|) dσz.

By Lemma 4.1 and for f ∈ QK2,ω(p, q; n), there exists a constant C1 such that

supa∈∆

|f (n)(z)|p (1− |z|)np−p+q+2 K2

(g(z, a)

)

ωp(1− |z|) dσz ≤ C1‖f‖p

Bnp−p+q+2

pω;n

. (23)

If g ∈ Bnp−p+q+2

pω;n and gr(z) = g(rz) , 0 < r < 1, then

∥∥gr

∥∥B

np−p+q+2p

ω;n

≤ ∥∥g∥∥B

np−p+q+2p

ω;n

.

Since gr ∈ QK2,ω(p, q; n) , 0 < r < 1, we can choose f = gr in the inequality (23). Using Fatou’s lemma(see [31]), we deduce that

supa∈∆

|g(n)(z)|p(1− |z|)np−p+q K2(g(z, a))ωp(1− |z|) dσz < C1

∥∥g∥∥p

Bnp−p+q+2

pω;n

.

We have proved that g ∈ QK2,ω(p, q;n). It means that QK2,ω(p, q; n) = Bnp−p+q+2

pω;n . It follows from

Theorem 2.1 that the integral in (3) with K = K2 must be convergent, a contradiction. We obtain that

QK2,ω(p, q; n) $ QK1,ω(p, q;n).

Now, the proof of Theorem 4.2 is completed.

Remark 3.1 It is still an open problem to extend the results of this paper in Clifford analysis. For moredetails on some classes of quaternion function spaces, we refer to ([3, 4, 5, 6, 7, 12, 13, 20, 21, 22]) andothers.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

831 A. El-Sayed Ahmed et al 822-833

Page 80: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

11

References

[1] A. B. Aleksandrov, J. M. Anderson and N. Nicolau, Inner functions, Bloch spaces and symmetricmeasures, Proc. Lond. Math. Soc., III. Ser. 79(2)(1999), 318-352.

[2] J. M. Anderson, J. L. Fernandez, A. L. Shields, Inner functions and cyclic vectors in the Bloch space,Trans. Am. Math. Soc. 323(1)(1991), 429-448.

[3] A. El-Sayed Ahmed, On weighted α-Besov spaces and α-Bloch spaces of quaternion-valued functions,Numer. Funct. Anal. Optim. 29(2008), 1064-1081.

[4] A. El-Sayed Ahmed, Lacunary series in quaternion Bp,q spaces, Complex Var. Elliptic Equ,54(7)(2009), 705-723.

[5] A. El-Sayed Ahmed, Lacunary series in weighted hyperholomorphic Bp,q(G) spaces, Numer. Funct.Anal. Optim, 32(1)(2011), 41-58

[6] A. El-Sayed Ahmed, Hyperholomorphic Q classes, Math. Comput. Modelling, 55(2012) 1428-1435.

[7] A. El-Sayed Ahmed and A. Ahmadi, On weighted Bloch spaces of quaternion-valued functions,International Conference on Numerical Analysis and Applied Mathematics: 19-25 September 2011Location: Halkidiki, (Greece): AIP Conference Proceedings, 1389(2011), 272-275.

[8] A. El-Sayed Ahmed and M. A. Bahkit, Composition operators on some holomorphic Banach functionspaces, Mathematica Scandinavica, 104(2)(2009), 275-295.

[9] A. El-Sayed Ahmed and M.A. Bakhit, Characterizations involving Schwarzian derivative in someanalytic function spaces, Math. Sci. (2013) DOI: 10.1186/10.1186/2251-7456-7-43.

[10] A. El-Sayed Ahmed and A. Kamal, Generalized composition operators on QK,ω(p, q) spaces, Math-ematical Sciences Springer, (2012), 6:14. DOI:10.1186/2251-7456-6-14.

[11] A. El-Sayed Ahmed and A. Kamal, Carleson measure characterization on analytic QK(p, q) spaces,International Mathematical Virtual Institute, Vol 3(2013), 1-21.

[12] A. El-Sayed Ahmed and S. Omran, Weighted classes of quaternion-valued functions, Banach J. Math.Anal. 6(2012), 180-191.

[13] A. El-Sayed Ahmed and S. Omran, On Bergman spaces in Clifford analysis, Applied MathematicalSciences, 7(85)(2013), 4203 - 4211.

[14] R. Aulaskari and P. Lappan, Criteria for an analytic function to be Bloch and a harmonic or mero-morphic function to be normal, Complex Analysis and its Applications (Eds Y. Chung-Chun et al.),Pitman Research Notes in Mathematics, Longman, 305(1994), 136-146.

[15] R. Aulaskari, P. Lappan and R. Zhao, On harmonic normal and Q#p functions, Illinois Journal of

Mathematics, 45(2)(2001), 423-440.

[16] K. M. Dyakonov, Weighted Bloch spaces, Hp, and BMOA, J. Lond. Math. Soc. II. Ser, 65(2)(2002),411-417.

[17] M. Essen and H. Wulan, On analytic and meromorphic functions and spaces of QK type, Illinois J.Math, 46(2002), 1233-1258.

[18] M. Essen H. Wulan and J. Xiao, Several function-theoretic characterizations of Mobius invariant QK

spaces, J. Funct. Anal. 230(1) (2006), 78-115.

[19] P. Galanopoulos, On Blog to Qplog pullbacks, J. Math. Anal. Appl. 337(2008), 712-725.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

832 A. El-Sayed Ahmed et al 822-833

Page 81: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

12

[20] K. Gurlebeck and A. El-Sayed Ahmed, Integral norms for hyperholomorphic Bloch functions in theunit ball of R3, Proceedings of the 3rd International ISAAC Congress held in Freie Universtaet Berlin-Germany, August 20-25 (2001), Editors H.Begehr, R. Gilbert and M.W. Wong, Kluwer AcademicPublishers, World Scientific New Jersey, London, Singapore, Hong Kong, Vol I(2003), 253-262.

[21] K. Gurlebeck and A. El-Sayed Ahmed, On Bq spaces of hyperholomorphic functions and the Blochspace in R3, Le Hung Son ed. Et al. In the book Finite and infinite dimensional complex Analysis andApplications, Advanced complex Analysis and Applications, Kluwer Academic Publishers, (2004),269-286.

[22] K. Gurlebeck and A. El-Sayed Ahmed, On series expansions of hyperholomorphic Bq functions,Trends in Mathematics : Advances in Analysis and Geometry, Birkaeuser verlarg Switzerland, (2004),113-129.

[23] M. M. Jones, A note on the Konigs domain of compact composition operators on the Bloch space,Journal of Inequalities and Applications, (2011): 31.

[24] A. Kamal and A. El-Sayed Ahmed, A property of meromorphic functions with Hadamard gaps,Scientific Research and Essays, 8(15)(2013), 633-639.

[25] E. Kreyszig, Introductory Functional Analysis with Applications, John Wiley and Sons (1978).

[26] Y. Liang and Z. Zhou, New estimate of essential norm of composition followed by differentiationbetween Bloch-type spaces, Banach J. Math. Anal. 8(1)(2014), 118-137.

[27] H. Li and S. Li, Norm of an integral operator on some analytic function spaces on the unit disk,Journal of Inequalities and Applications (2013): 342.

[28] M. Pavlovic, Analytic functions with decreasing coefficients and Hardy and Bloch spaces, Proc.Edinb. Math. Soc., II. Ser. 56(2)(2013), 623-635.

[29] R. A. Rashwan, A. El-Sayed Ahmed and A. Kamal, Some characterizations of weighted Bloch space,Eur. J. Pure Appl. Math, 2(2009), 250-267.

[30] R. A. Rashwan, A. El-Sayed Ahmed and A. Kamal, Integral characterizations of weighted Blochspaces and QK,ω(p, q) spaces, Mathematica Cluj, 51(1)(74)(2009), 63-76.

[31] H. L. Royden, Real Analysis. 2nd ed. New York: Macmillan, (1968).

[32] K. Stroethoff, Besov-type characterisations for the Bloch space, Bull. Austral. Math. Soc. 39(1989),405-420.

[33] H. Wulan and K. Zhu, QK type spaces of analytic functions, J. Funct. spaces Appl. 4(2006), 73-84.

[34] H. Wulan and K. Zhu, Derivative-free characterizations of QK spaces, J. Aust. Math. Soc.82(2)(2007), 283-295.

[35] J. Xiao, Holomorphic Q Classes, Springer LNM 1767, Berlin, (2001).

[36] L. Zhang and H. Zeng, Weighted differentiation composition operators from weighted bergman spaceto nth weighted space on the unit disk, Journal of Inequalities and Applications (2011) :65.

[37] X. Zhang, C. He and F. Cao, The equivalent norms of F (p, q, s) space in Cn, J. Math. Anal. Appl.401(2)(2013), 601-610.

[38] R. Zhao, On a general family of function spaces, Ann. Acad. Sci. Fenn. Math. Diss. 105, 1996.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

833 A. El-Sayed Ahmed et al 822-833

Page 82: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

On two Dimensional q-Bernoulli and q-Genocchi Polynomials:

Properties and location of zeros

N. I. Mahmudov, A. Akkeles and A. OnerenEastern Mediterranean University

Gazimagusa, TRNC, Mersiin 10, TurkeyEmail: [email protected]

Abstract

The main purpose of this paper is to investigate two dimensional generalized Genocchi polynomialsbased on the q-integers. The q-analogues of well-known formulas are derived. The q-analogue of theSrivastava–Pinter addition theorem is obtained. Furthermore we explore the shapes of the q-Genocchinumbers and the q-Genocchi polynomials. We describe the structure of the roots of the q-Genocchipolynomials for values of the index n using a computer.

1 Introduction

Throughout this paper, we always make use of the following notation: N denotes the set of natural numbers,N0 denotes the set of nonnegative integers, R denotes the set of real numbers, C denotes the set of complexnumbers.

The q-shifted factorial is defined by

(a; q)0 = 1, (a; q)n =n−1∏j=0

(1− qja

), n ∈ N, (a; q)∞ =

∞∏j=0

(1− qja

), |q| < 1, a ∈ C.

The q-numbers and q-numbers factorial is defined by

[a]q =1− qa

1− q(q = 1) ; [0]q! = 1; [n]q! = [1]q [2]q ... [n]q n ∈ N, a ∈ C

respectively. The q-polynomail coefficient is defined by[nk

]q

=(q; q)n

(q; q)n−k (q; q)k.

The q-analogue of the function (x⊕ y)nis defined by

(x⊕ y)nq :=

n∑k=0

[nk

]q

xkyn−k, n ∈ N0.

In the standard approach to the q-calculus two exponential function are used:

eq (z) =

∞∑n=0

zn

[n]q!=

∞∏k=0

1

(1− (1− q) qkz), 0 < |q| < 1, |z| < 1

|1− q|,

Eq (z) =∞∑

n=0

q12n(n−1)zn

[n]q!=

∞∏k=0

(1 + (1− q) qkz

), 0 < |q| < 1, z ∈ C.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

834 N. I. Mahmudov et al 834-843

Page 83: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

From this form we easily see that eq (z)Eq (−z) = 1. Moreover,

Dqeq (z) = eq (z) , DqEq (z) = Eq (qz) ,

The above q-standard notation can be found in [1].Carlitz has introduced the q-Bernoulli numbers and polynomials in [2]. Srivastava and Pinter proved

some relations and theorems between the Bernoulli polynomials and Euler polynomials in [20]. They alsogave some generalizations of these polynomials. In [10]-[22], Kim et al. investigated some properties of theq-Euler polynomials and Genocchi polynomials. They gave some recurrence relations. In [4], Cenkci et al.gave the q-extension of Genocchi numbers in a different manner. In [23], Kim gave a new concept for theq-Genocchi numbers and polynomials. In [25], Simsek et al. investigated the q-Genocchi zeta function andl-function by using generating functions and Mellin transformation. There are numerous recent studies onthis subject by among many other authors: Cenkci et al. [4], [5], Choi et al [7], Cheon [6], Luo and Srivastava[13], [14], [15], Srivastava et al.[20], [26], Gabouary and Kurt B., [8], Kim et al. [24].

We propose the following definitions. We define the q-Bernoulli and the q-Genocchi polynomials of higherorder in two variables x and y, using two q-exponential functions, which helps us easily prove some propertiesof these polynomials and q-analogue of the Srivastava and Pinter addition theorem.

Definition 1 The q-Bernoulli numbers Bn,q and polynomials Bn,q (x, y) in x, y are defined by means of thegenerating functions:

t

eq (t)− 1=

∞∑n=0

Bn,qtn

[n]q!, |t| < 2π,

t

eq (t)− 1eq (tx) eq (ty) =

∞∑n=0

Bn,q (x, y)tn

[n]q!, |t| < 2π.

Definition 2 The q-Genocchi numbers Gn,q and polynomials Gn,q (x, y) in x, y are defined by means of thegenerating functions:

2t

eq (t) + 1=

∞∑n=0

Gn,qtn

[n]q!, |t| < π,

2t

eq (t) + 1eq (tx) eq (ty) =

∞∑n=0

Gn,q (x, y)tn

[n]q!, |t| < π.

It is obvious that

Bn,q = Bn,q (0, 0) , limq→1−

Bn,q (x, y) = Bn (x+ y) , limq→1−

Bn,q = Bn,

Gn,q = Gn,q (0, 0) , limq→1−

Gn,q (x, y) = Gn (x+ y) , limq→1−

Gn,q = Gn.

Here Bn (x) and Gn (x) denote the classical Bernoulli and Genocchi polynomials are defined by

t

et − 1etx =

∞∑n=0

Bn (x)tn

n!and

2t

et + 1etx =

∞∑n=0

Gn (x)tn

n!.

The aim of the present paper is to obtain some results for the q-Genocchi polynomials (Propertiesof the q-Bernoulli polynomials is studied in [19]). The q-analogues of well-known results, for example,Srivastava and Pinter [20], can be derived from these q-identities. It should be mentioned that probabilisticproof the Srivastava-Pinter addition theorems were given recently in [26]. The formulas involving the q-Stirling numbers of the second kind, q-Bernoulli polynomials and q-Bernstein polynomials are also given.Furthermore some special cases are also considered.

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

835 N. I. Mahmudov et al 834-843

Page 84: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

2 Properties

In this section we shall provide some basic formulas for the q-Genocchi polynomials Gn,q (x, y) in order toobtain the main results of this paper in the next section.

The following elementary properties of the q-Genocchi polynomials Gn,q (x, y) are readily derived fromDefinition 2.

Property 1. Summation formulas for the q-Genocchi polynomials:

Lemma 3 For all x, y ∈ C we have

Gn,q (x, y) =n∑

k=0

[nk

]q

Gk,q (x⊕ y)n−kq .

Proof. The proof is based on the following identity

(2t

eq (t) + 1

)eq (tx) eq (ty) =

∞∑k=0

Gk,qtk

[k]q!

∞∑n=0

tnxn

[n]q!

∞∑n=0

tnyn

[n]q!

=∞∑k=0

Gk,qtk

[k]q!

∞∑n=0

(n∑

k=0

tkxk

[k]q!.tn−kyn−k

[n− k]q!

)

=∞∑k=0

Gk,qtk

[k]q!

∞∑n=0

(n∑

k=0

[nk

]q

xkyn−k

)tn

[n]q!

=

∞∑k=0

Gk,qtk

[k]q!

∞∑n=0

(x⊕ y)n−kq

tn

[n]q!

=∞∑

n=0

n∑k=0

[nk

]q

Ek,q (x⊕ y)n−kq

tn

[n]q!.

Lemma 4 For all x, y ∈ C we have

Gn,q (x, y) =n∑

k=0

[nk

]q

Gk,q (x) yn−k.

Proof. The proof is based on the following identity(2t

eq (t) + 1

)eq (tx) eq (ty) =

∞∑n=0

Gn,q(x)tn

[n]q!

∞∑n=0

tnyn

[n]q!

=

∞∑n=0

∞∑k=0

Gk,q(x)tk

[k]q!

tn−kyn−k

[n− k]q!

=∞∑

n=0

n∑k=0

[nk

]q

Gk,q(x)yn−k tn

[n]q!.

Lemma 5 For all x, y ∈ C we have

Gn,q (x) =n∑

k=0

[nk

]q

Gk,qxn−k.

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

836 N. I. Mahmudov et al 834-843

Page 85: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Proof. The proof is readily derived from Definition 2.Property 2. Difference equation:

Lemma 6 For all x, y ∈ C we have

Gn,q (x, 1) +Gn,q (x, 0) = 2 [n]q xn−1.

Proof.

Gn,q (x, 1) +Gn,q (x, 0) =2t

eq (t) + 1eq (tx) eq (t) +

2t

eq (t) + 1eq (tx)

=2t

eq (t) + 1eq (tx) (eq (t) + 1)

= 2teq(tx) = 2t∞∑

n=0

tnxn

[n]q!= 2

∞∑n=1

tnxn−1

[n− 1]q!

= 2∞∑

n=1

tnxn−1

[n]q![n]q =

∞∑n=1

2xn−1 [n]qtn

[n]q!.

Property 3. Differential relation:

Lemma 7 For all x, y ∈ C we have

Dq,xGn,q (x) = [n]q Gn−1,q (x) .

Proof. It follows from the following relation

Dq,x

(2t

eq (t) + 1

)eq (tx) =

(2t

eq (t) + 1

)teq (tx)

= t∞∑

n=0

Gn,q (x)tn

[n]q!

=∞∑

n=0

[n]q Gn−1,q (x)tn

[n]q!.

3 Explicit relationship between the q-Genocchi and the q-Bernoullipolynomials

In this section we prove an interesting relationship between the q-Genocchi polynomials Gn,q (x, y) and theq-Bernoulli polynomials. Here some q-analogues of known results will be given. We also obtain new formulasand their some special cases below.

Theorem 8 For n ∈ N0, the following relationship

Gn,q (x, y) =

n∑k=0

[nk

]q

1

[k + 1]qmk−n+1

(Gk+1,q

(x,

1

m

)−Gk+1,q (x)

)Bn=k,q (my) .

holds true between the q-Genocchi and the q-Bernoulli polynomials..

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

837 N. I. Mahmudov et al 834-843

Page 86: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Proof. Using the following identity

2t

eq (t) + 1eq (tx) eq (ty) =

2t

eq (t) + 1eq (tx) ·

eq(

tm

)− 1

t· t

eq(

tm

)− 1

· eq(

t

mmy

)we have

∞∑n=0

Gn,q (x, y)tn

[n]q!=

m

t

∞∑n=0

Gn,q (x)tn

[n]q!

( ∞∑n=0

tn

mn [n]q!− 1

) ∞∑n=0

Bn,q (my)tn

mn [n]q!

= m∞∑

n=1

(n∑

k=0

[nk

]q

mk−nGk,q (x)−Gn,q (x)

)tn−1

[n]q!

∞∑n=0

Bn,q (my)tn

mn [n]q!

= m∞∑

n=0

(n∑

k=0

[n+ 1k

]q

mk−n−1Gk,q (x)−Gn+1,q (x)

)tn

[n+ 1]q!

∞∑n=0

Bn,q (my)tn

mn [n]q!

= m

∞∑n=0

(Gn+1,q

(x,

1

m

)−Gn+1,q (x)

)tn

[n+ 1]q!

∞∑n=0

Bn,q (my)tn

mn [n]q!

=∞∑

n=0

n∑k=0

[nk

]q

1

[k + 1]qmk−n+1

(Gk+1,q

(x,

1

m

)−Gk+1,q (x)

)Bn=k,q (my)

tn

[n]q!.

Corollary 9 For n ∈ N0, m ∈ N the following relationship holds true.

Gn (x+ y) =n∑

k=0

(nk

)2

k + 1

((k + 1) yk −Gk+1,q (y)

)Bn−k (x) , (1)

Gn (x+ y) =

n∑k=0

(nk

)1

mn−k−1 (k + 1)

[2 (k + 1)Gk

(y +

1

m− 1

)−Gk+1

(y +

1

m− 1

)−Gk+1 (y)

](2)

×Bn−k,q (mx)

between the classical Genocchi polynomials and the classical Bernoulli polynomials.

Note that the formula (2) is new for the classical polynomials.In terms of the q-Genocchi numbers Gk,q, by setting y = 0 in Theorem 8, we obtain the following explicit

relationship between the q-Genocchi polynomials Gk,q of order α and the q-Bernoulli polynomials.

Corollary 10 For n ∈ N0 the following relationship holds true.

Gn,q (x, y) =n∑

k=0

[nk

]q

2

[k + 1]q

[[k + 1]q q

12k(k−1)yk −Gk+1,q (y)

]Bn−k,q (x) .

Corollary 11 For n ∈ N0 the following relationship holds true.

Gn,q (x) = −n∑

k=0

[nk

]q

2

[k + 1]qGk+1,qBn−k,q (x) ,

Gn,q = −n∑

k=0

[nk

]q

2

[k + 1]qGk+1,qBn−k,q.

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

838 N. I. Mahmudov et al 834-843

Page 87: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Theorem 12 For n ∈ N0, the following relationship

Bn,q (x, y) =1

2

n∑k=0

[nk

]q

mk−n

1

[k + 1]qBk+1,q(x) +m−k

k∑j=0

[kj

]q

1

[j + 1]qmjBj+1,q(x)

Gn−k,q (my) .

holds true between the q-Bernoulli and the q-Genocchi polynomials.

Proof. Using the following identity

t

eq (t)− 1eq (tx) eq (ty) =

t

eq (t)− 1eq (tx) ·

2t

eq(

tm

)+ 1

· eq(

t

mmy

)eq(

tm

)+ 1

2t

we have

∞∑n=0

Bn,q (x, y)tn

[n]q!=

1

2t

∞∑n=0

Bn,q (x)tn

[n]q!

∞∑n=0

Gn,q (my)tn

mn [n]q!

∞∑n=0

tn

mn [n]q!

+1

2t

∞∑n=0

Bn,q (x)tn

[n]q!

∞∑n=0

Gn,q (my)tn

mn [n]q!

= I1 + I2.

It is clear that

I2 =1

2t

∞∑n=0

Bn,q (x)tn

[n]q!

∞∑n=0

Gn,q (my)tn

mn [n]q!

=1

2

∞∑n=0

Bn+1,q (x)tn

[n+ 1]q!

∞∑n=0

Gn,q (my)tn

mn [n]q!

=1

2

∞∑n=0

n∑k=0

[nk

]q

1

[k + 1]qBk+1,q (x)Gn−k,q (my)

tn

[n]q!.

On the other hand

I1 =1

2t

∞∑n=0

Bn,q (x)tn

[n]q!

∞∑n=0

Gn,q (my)tn

mn [n]q!

∞∑n=0

tn

mn [n]q!

=1

2

∞∑n=0

Bn+1,q (x)tn

[n+ 1]q!

∞∑n=0

n∑j=0

[nj

]q

m−nGj,q (my)tn

[n]q!

=1

2

∞∑n=0

n∑k=0

[nk

]q

1

[k + 1]qmk−nBk+1,q (x)

n−k∑j=0

[n− kj

]q

Gj,q (my)tn

[n]q!

Therefore

∞∑n=0

Bn,q (x, y)tn

[n]q!= I1 + I2

=1

2

∞∑n=0

n∑k=0

[nk

]q

mk−n

1

[k + 1]qBk+1,q (x) +m−k

k∑j=0

[kj

]q

1

[j + 1]qmjBj+1,q (x)

×Gn−k,q (my)

tn

[n]q!.

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

839 N. I. Mahmudov et al 834-843

Page 88: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Theorem 13 The polynomials Bn,q (x, y) and Gn,q (x, y) satisfy the following relationship:

Bn,q (x, y) =

n+1∑k=1k =n

[n+ 1k

]q

1

[n+ 1]qGk,q (x, y)Bn+1−k,q (x, y) .

Proof. Comparing coefficients of tn

[n]q !we get the desired identity:

∞∑n=0

Bn,q (x, y)tn

[n]q!=

t

eq (t)− 1eq (tx) eq (ty)

=1

2

2t

eq (t) + 1eq (tx) eq (ty) +

1

t

t

eq (t)− 1

2t

eq (t) + 1eq (tx) eq (ty)

=1

2

∞∑n=0

Gn,q (x, y)tn

[n]q!+

1

t

∞∑n=0

Bn,q (x, y)tn

[n]q!

∞∑n=0

Gn,q (x, y)tn

[n]q!

=1

2

∞∑n=0

Gn,q (x, y)tn

[n]q!+

∞∑n=0

n∑k=0

[nk

]q

Gk,q (x, y)Bn−k,q (x, y)tn−1

[n]q!

=1

2

∞∑n=0

Gn,q (x, y)tn

[n]q!+

∞∑n=0

n+1∑k=1

[n+ 1k

]q

1

[n+ 1]qGk,q (x, y)Bn+1−k,q (x, y)

tn

[n]q!.

Theorem 14 The polynomials Bn,q (x, y) and Gn,q (x, y) satisfy the following relationship:

Gn,q (x, y) = −2

(n∑

k=1

[nk

]q

1

[k + 1]qGk+1,qBn−k,q (x, y) +

1

[n+ 1]qGn+1,q

)Proof.

∞∑n=0

Gn,q (x, y)tn

[n]q!=

1

t

2t

eq (t) + 1(eq (t)− 1)

t

eq (t)− 1eq (tx) eq (ty)

=1

t

(2t− 2

2t

eq (t) + 1

)t

eq (t)− 1eq (tx) eq (ty)

=1

t

(2t− 0− 2t− 2

∞∑n=2

Gn,qtn

[n]q!

) ∞∑n=0

Bn,q (x, y)tn

[n]q!

= −2∞∑

n=1

Gn+1,qtn

[n+ 1]q!

(1 +

∞∑n=1

Bn,q (x, y)tn

[n]q!

)

= −2∞∑

n=1

(n∑

k=1

[nk

]q

1

[k + 1]qGk+1,qBn−k,q (x, y) +

1

[n+ 1]qGn+1,q

)tn

[n]q!

4 Location of zeros of the q-Genocchi polynomials

In this section, we display the shapes of the q-Genocchi numbers and polynomials. Next, we investigate thezeros of the q-Genocchi polynomials using a computer.

Our numerical results for the approximate solutions of the real zeros of Gn,q (x),q = 0.9, are shown intables 1. The results were obtained using the Mathematica R⃝software.

The shapes of the q-Genocchi numbers Gn,q for n = 1, ..., 20. q = 12 , 0.9, 0.9999 are shown in figure 1,

figure 2 and and figure 3.

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

840 N. I. Mahmudov et al 834-843

Page 89: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Table 1: Approximate solutions of Gn,q(x) = 0

n q # of Real Roots # of Complex Roots0.5 3 170.6 3 170.7 3 17

20 0.8 3 170.9 3 17

0.9999 7 13910 3 171 7 13

References

[1] G. E. Andrews, R. Askey and R. Roy Special functions, volume 71 of Encyclopedia of Mathematics andits Applications, Cambridge University Press, Cambridge, 1999.

[2] L. Carlitz, q-Bernoulli numbers and polynomials, Duke Math. J. 15 (1948), 987-1000.

[3] L. Carlitz, Expansions of q-Bernoulli numbers, Duke Math. J., 25 (1958), 355-364.

[4] M. Cenkci, M. Can. and V. Kurt, q-extensions of Genocchi numbers, J. Korean Math. Soc., 43 (2006),183-198.

[5] M. Cenkci, V. Kurt, S. Rim. and Y. Simsek., On (i; q) Bernoulli and Euler numbers, Appl. Math. Letter,21 (2008), 706-711.

[6] Cheon G. S., A note on the Bernoulli and Euler polynomials, Appl. Math. Letter, 16 (2003), 365-368.

[7] Choi J., Anderson P. J. and Srivastava H. M., Some q-extensions of the Apostol-Bernoulli and Apostol-Euler polynomials of order n and the multiple Hurwitz zeta function, App. Math. Compt., 199 (2008),723-737.

[8] Gabaury S. and Kurt B., Some relations involving Hermite-based Apostol-Genocchi polynomials, App.Math. Sci., 6 (2012), 4091-4102.

[9] Kim T., Some formulae for the q-Bernoulli and Euler polynomials of higher order, J. Math. Analy.Appl., 273 (2002), 236-242.

[10] Kim T., q-Generalized Euler numbers and polynomials, Russ. J. Math. Phys., 13 (2006), 293-298.

[11] Kim D. S., Kim T. and Lee S.-Hi, A note on q-Frobenius-Euler numbers and polynomials, Adv. StudiesTheo. Phys., vol. 17, 18(2013), 881-889.

[12] Kupershmidt B. O., Reflection symmetries of q-Bernoulli polynomials, J. Nonlinear Math. Phys., 12(2005), 412-422.

[13] Luo Q.-M., Some results for the q-Bernoulli and q-Euler polynomials, J. Math. Anal. Appl., 363 (2010),7-18.

[14] Luo Q.-M. and Srivastava H. M., Some relationships between the Apostol-Bernoulli and Apostol-Eulerpolynomials, Comp. Math. App., 51 (2006), 631-642.

[15] Luo Q.-M. and Srivastava H. M., q-Extensions of some relationships between the Bernoulli and Eulerpolynomials, Taiwanese J. Math., 15 (2011), 241-257.

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

841 N. I. Mahmudov et al 834-843

Page 90: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

[16] Mahmudov N. I., q-analogues of the Bernoulli and Genocchi polynomials and the Srivastava-Pinter addition theorems, Discrete Dynamics in Nature and Soc. Article number 169348, 2012,doi:10.1155/2012/169348.

[17] Mahmudov N. I., On a class of q-Bernoulli and q-Euler polynomials, Adv. Differ. Equ., 2013:108,doi:10.1186/1687-1847-2013-108.

[18] Mahmudov N. I. and Keleshteri M. E., On a class of generalized q-Bernoulli and q-Euler polynomials,Adv. Difference Equ. 2013,2013:115.

[19] Mahmudov, N. I.; Akkeles, A.; Oneren, A., On a class of two dimensional (w, q)-Bernoulli and (w, q)-Euler polynomials: Properties and location of zeros, Journal of Computational Analysis and Applica-tions, 16 (2014), 282-292.

[20] H. M. Srivastava and A. Pinter, Remarks on some relationships between the Bernoulli and Euler poly-nomials, Appl. Math. Lett. 17 (2004), no. 4, 375-380.

[21] T. Kim , On the q-extension of Euler and Genocchi numbers, J. Math. Anal. Appl. 326 (2007), no. 2,1458-1465.

[22] T. Kim, Note on q-Genocchi numbers and polynomials, Adv. Stud. Contemp. Math. (Kyungshang) 17(2008), no. 1, 9-15.

[23] T. Kim, A note on the q-Genocchi numbers and polynomials, J. Inequal. Appl. 2007 (2007), Art. ID71452, 8 pp. doi:10.1155/2007/71452.

[24] Daeyeoul Kim, Burak Kurt, and Veli Kurt, “Some Identities on the Generalized q-Bernoulli, q-Euler,and q−Genocchi Polynomials,” Abstract and Applied Analysis, vol. 2013, Article ID 293532, 6 pages,2013. doi:10.1155/2013/293532

[25] Y. Simsek, I. N. Cangul, V. Kurt, and D. Kim, q-Genocchi numbers and polynomials associated withq-Genocchi-type l-functions, Adv. Difference Equ. 2008 (2008), Art. ID.

[26] H. M. Srivastava and C. Vignat, Probabilistic proofs of some relationships between the Bernoulli andEuler polynomials, European J. Pure Appl. Math. 5 (2012), 97–107.

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

842 N. I. Mahmudov et al 834-843

Page 91: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

-1.0 -0.5 0.0 0.5 1.0-0.3

-0.2

-0.1

0.0

0.1

0.2

0.3

x

T

Figure 1: Shape of Gn,0.5(x) within x = [−1, 1]

-1.0 -0.5 0.0 0.5 1.0

-400

-200

0

200

400

600

x

T

Figure 2: Shape of Gn,0.9(x) within x = [−1, 1]

-3 -2 -1 0 1 2 3-150 000

-100 000

-50 000

0

50 000

100 000

150 000

x

T

Figure 3: Shape of Gn,0.9999 within x = [−3, 3]

-0.4 -0.2 0.0 0.2 0.4 0.6 0.8 1.0

-0.4

-0.2

0.0

0.2

0.4

0.6

ReHxL

ImHxL

Figure 4: Zeros of G20,0.5(x)

-1.5 -1.0 -0.5 0.0 0.5 1.0 1.5 2.0-2

-1

0

1

2

ReHxL

ImHxL

Figure 5: Zeros of G20,0.9(x)

-2 -1 0 1 2 3

-3

-2

-1

0

1

2

3

ReHxL

ImHxL

Figure 6: Zeros of G20,0.9999(x)

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

843 N. I. Mahmudov et al 834-843

Page 92: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Existence results of sequential derivatives of nonlinearquantum difference equations with a new class of three-point

boundary value problems conditions

Nichaphat Patanarapeelert and Thanin Sitthiwirattham 1

Department of Mathematics, Faculty of Applied Science,King Mongkut’s University of Technology,

North Bangkok, Bangkok, ThailandE-mail: [email protected], [email protected]

Abstract

In this paper, we study a new class of three-point boundary value problems

of Sequential Derivatives of nonlinear q-difference equations. Our problems

contain different numbers of q in derivatives and integrals. By using a variety of

fixed point theorems (such as Banach’s contraction principle and Krasnoselskii’s

fixed point theorem, some new existence and uniqueness results are obtained.

Illustrative example is also presented.

Keywords: existence; q-derivative; q-integral; q-difference equation

(2010) Mathematics Subject Classifications: 34B10; 39A13.

1 Introduction

In 20th century, the intensive works on q-difference equations by Jackson [1], Carmichael

[2], Mason [3] and Adams [4] became more interesting in many areas of mathematics

and applications, e.g. the applications to orthogonal polynomials and mathemat-

ical control theories, since years eighties. Although many researches related with

q-calculus are raised (see [5]-[14],[16]-[28]),there are lack of works of studying of

boundary value problem of q-difference equations. Recently, there are few researches

concerning with the boundary value problem of nonlinear q-difference equations as

follows.

In 2012, Ahmad et al. [24] proposed the boundary value problem of nonlinear

second order q-difference equations with nonlocal boundary conditions given by

D2qx(t) = f(t, x(t)), t ∈ [0, T ], (1.1)

1Corresponding author

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

844 Nichaphat Patanarapeelert et al 844-856

Page 93: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

2 Nichaphat Patanarapeelert and Thanin Sitthiwirattham

α1x(0)− β1Dqx(0) = γ1x(η1),

α2x(1) + β2Dqx(1) = γ2x(η2),(1.2)

where f ∈ C([0, T ] × R,R), and q is a constant that q ∈ (0, 1). By employing Ba-

nach’s contraction principle, Krasnoselskii’s fixed point theorem and Leray-Schauder

nonlinear alternative, Ahmad et al derived the existence of solutions of the above

problem.

Later, Yu andWang [28] proposed the boundary value problem of nonlinear second

order q-difference equation given byD2

qu(t) + f(t, u(t), Dqu(t)) = 0, t ∈ [0, T ],

Dqu(0) = 0, Dqu(1) = αu(1),(1.3)

where f ∈ C([0, T ] × R,R), and α = 0 is a fixed constant. They discussed the

existence and uniqueness of solution of this problem by using Banach’s contraction

principle, the Leray-Schauder nonlinear alternative and Leray-Schauder continuation

theorem.

Lately, Pongarm et al. [29] studied the sequential derivative of nonlinear q-

difference equation with three-point boundary conditions. The problem is in the

form Dq (Dp + λ)u(t) = f(t, u(t)), t ∈ [0, T ],

u(0) = 0, u(T ) = α

∫ η

0

u(s)drs,(1.4)

where 0 < p, q, r < 1, f ∈ C([0, T ]×R,R), 0 < η < T and λ, β are given constants. For

this problem, the existence solution is discussed by employing Banach’s contraction

mapping principle, Krasnoselskii’s fixed point theorem and Leray-Schauder degree

theory. Since the number of papers about the problems with different values of the

q-numbers is sparse, there is a need for further study.

In this article, we consider the following nonlinear q-difference equation with three-

point integral boundary condition given byDq(Dp + λ)x(t) = f(t, x(t)), t ∈ [0, T ],

x(η) = 0,

∫ T

0

x(s)drs = 0, 0 < η < T,

(1.5)

where 0 < p, q, r < 1, f ∈ C([0, T ]× R,R), and ηT (1 + r) = T 2.

The given problem consists of three different values of the q numbers, in q-

derivatives and the q-integral. In addition, the value of function in an intermediate

point is used. Our overall goal is to prove an existence and uniqueness of solu-

tions of the problem (1.5) by employing Banach’s contraction mapping principle and

Krasnoselskii’s fixed point theorem. In Section 2, we briefly discuss about the basic

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

845 Nichaphat Patanarapeelert et al 844-856

Page 94: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Existence results of sequential derivatives of nonlinear quantum difference equations3

definitions, some properties of q-difference and present a lemma that will be used

throughout the paper. In Sections 3 and 4, we give the main results and example,

respectively.

2 Preliminaries

The basic definitions and some properties of q-calculus [15, 18] are as follows.

Definition 2.1. For 0 < q < 1, we define the q-derivative of a real valued function f

as

Dqf(t) =f(t)− f(qt)

(1− q)t, Dqf(0) = lim

t→0Dqf(t).

The higher order q-derivatives are given by

Dnq f(t) = DqD

n−1q f(t), n ∈ N.

where D0qf(t) = f(t)

The definite q-integral of a function f defined on the interval [0, T ] is given by

Iqf (t) =

∫ t

0

f (s) dqs =∞∑n=0

t(1− q)qnf (tqn)

where last term is convergent series.

If a ∈ [0, T ], then∫ b

a

f(s)dqs = Iqf(b)− Iqf(a) = (1− q)∞∑n=0

qn [bf (bqn)− af (aqn)] .

We note that

DqIqf(x) = f(x),

while if f is continuous at x = 0, then

IqDqf(x) = f(x)− f(0).

The property of product rule and integration by parts formula are

Dq(gh)(t) = (Dqg(t))h(t) + g(qt)Dqh(t),

∫ x

0

f(t)Dqg(t)dqt =[f(t)g(t)

]x0−∫ x

0

Dqf(t)g(qt)dqt.

For reversing the order of integration is given by∫ t

0

∫ s

0

f(r)dqrdqs =

∫ t

0

∫ t

qr

f(r)dqsdqr.

In the limit q → 1 the above results correspond to their counterparts in standard

calculus.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

846 Nichaphat Patanarapeelert et al 844-856

Page 95: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

4 Nichaphat Patanarapeelert and Thanin Sitthiwirattham

Lemma 2.1. Let ηT (1 + r) = T 2, 0 < p, q r < 1 and λ be a constant. Then for any

h ∈ C[0, T ], the boundary value problem

Dq(Dp + λ)x(t) = f(t, x(t)), t ∈ [0, T ], (2.1)

x(η) = 0,

∫ T

0

x(s)drs = 0, 0 < η < T, (2.2)

is equivalent to the integral equation

x(t) =

∫ t

0

∫ s

0

h(u)dqudps− λ

∫ t

0

x(s)dps

+1

ηT (1 + r)− T 2

(λT (t+ rt− T )

∫ η

0

x(s)dps− T (t+ rt− T )

∫ η

0

∫ s

0

h(u)dqudps

− (1 + r)λ(t− η)

∫ T

0

∫ v

0

x(s)dpsdrv + (1 + r)(t− η)

∫ T

0

∫ v

0

∫ s

0

h(u)dqudpsdrv

)(2.3)

Proof. For t ∈ [0, T ], q-integrating (2.1) from 0 to t, we obtain

(Dp + λ)x(t) =

∫ t

0

h(s)dqs+ c1. (2.4)

Equation (2.4)) can be written as

Dpx(t) =

∫ t

0

h(s)dqs− λx(t) + c1. (2.5)

For t ∈ [0, T ], q-integrating (2.5) from 0 to t, we obtain

x(t) =

∫ t

0

∫ s

0

h(u)dqudps− λ

∫ t

0

x(s)dps+ c1t+ c2. (2.6)

In particular, for t = η, we get

x(η) =

∫ η

0

∫ s

0

h(u)dqudps− λ

∫ η

0

x(s)dps+ c1η + c2. (2.7)

Using the first condition of (2.2) with (2.7), we obtain

ηc1 + c2 = λ

∫ η

0

x(s)dps−∫ η

0

∫ s

0

h(u)dqudps. (2.8)

Form (2.6), we take the r-integral of x(t) from 0 to t, we obtain∫ t

0

x(s)drs =

∫ t

0

∫ v

0

∫ s

0

h(u)dqudpsdrv − λ

∫ t

0

∫ v

0

x(s)dpsdrv + c1t2

1 + r+ c2t. (2.9)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

847 Nichaphat Patanarapeelert et al 844-856

Page 96: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Existence results of sequential derivatives of nonlinear quantum difference equations5

By substituting t = T in (2.9) and employing the second condition of (2.2), we

find that

T 2

1 + rc1 + Tc2 = λ

∫ T

0

∫ v

0

x(s)dpsdrv −∫ T

0

∫ v

0

∫ s

0

h(u)dqudpsdrv. (2.10)

From (2.9) and (2.10), we obtain the system of linear equations. Solving this

system, we get

c1 =(1 + r)t

ηT (1 + r)− T 2

(λT

∫ η

0

x(s)dps− T

∫ η

0

∫ s

0

h(u)dqudps

− λ

∫ T

0

∫ v

0

x(s)dpsdrv +

∫ T

0

∫ v

0

∫ s

0

h(u)dqudpsdrv

)

and

c2 = − 1 + r

ηT (1 + r)− T 2

(λT 2

1 + r

∫ η

0

x(s)dps−T 2

1 + r

∫ η

0

∫ s

0

h(u)dqudps

− ηλ

∫ T

0

∫ v

0

x(s)dpsdrv +

∫ T

0

∫ v

0

∫ s

0

h(u)dqudpsdrv

)After substituting c1 and c2 in (2.6), we get (2.3) as desired. Therefore the proof is

completes.

3 Main results

To accomplish the main results, We transform the boundary value problem (1.5)

into a fixed point problem. From Lemma (2.1), We let C = C([0, T ],R) denote the

Banach space of all functions x. The norm id defined by ∥x∥ = sup|x(t)|, t ∈ [0, T ].The operator F : C → C is define by

(Fx)(t) =

∫ t

0

∫ s

0

f(u, x(u))dqudps− λ

∫ t

0

x(s)dps

+1

ηT (1 + r)− T 2

(λT (t+ rt− T )

∫ η

0

x(s)dps− T (t+ rt− T )×∫ η

0

∫ s

0

f(u, x(u))dqudps− (1 + r)λ(t− η)

∫ T

0

∫ v

0

x(s)dpsdrv

+(1 + r)(t− η)

∫ T

0

∫ v

0

∫ s

0

f(u, x(u))dqudpsdrv

)(3.1)

Based on Banach’s fixed point theorem, we find that the problem (1.5) has solu-

tions if and only if the operator F has fixed points.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

848 Nichaphat Patanarapeelert et al 844-856

Page 97: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

6 Nichaphat Patanarapeelert and Thanin Sitthiwirattham

Theorem 3.1. Assume that f : [0, T ] × R → R is a jointly continuous function

satisfying the conditions

(H1) |f(t, x)− f(t, y)| ≤ L|x− y|, for all t ∈ [0, T ] and x, y ∈ R,

(H2) Φ + LΩ < 1,

where L is a Lipschitz constant, and

Φ = |λ|T +|λ|T (ηr + T − η)

|η(1 + r)− T |

Ω =T 2

1 + p+

η2rT

|η(1 + r)− T |(1 + p)+

(1 + r)(T − η)T 2

|η(1 + r)− T |(1 + q)(1 + r + r2)

(3.2)

Then the boundary value problem (1.5) has a unique solution.

Proof. We transform the boundary value problem (1.5) into a fixed point problem

x = Fx, where F : C → C is defined by (3.1). Assume that supt∈[0,T ]

|f(t, 0)| = M , and

choose a constant R satisfied

R ≥ MΛ

1− (Φ + LΩ).

Our goal is to show that FBR ⊂ BR, where BR = x ∈ C : ∥x∥ ≤ R. For any

x ∈ BR, we have

∥Fx∥

= supt∈[0,T ]

∣∣∣∣∣∫ t

0

∫ s

0

f(u, x(u))dqudps− λ

∫ t

0

x(s)dps

+1

ηT (1 + r)− T 2

(λT (t+ rt− T )

∫ η

0

x(s)dps− T (t+ rt− T )×∫ η

0

∫ s

0

f(u, x(u))dqudps− (1 + r)λ(t− η)

∫ T

0

∫ v

0

x(s)dpsdrv

+(1 + r)(t− η)

∫ T

0

∫ v

0

∫ s

0

f(u, x(u))dqudpsdrv

)∣∣∣∣∣

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

849 Nichaphat Patanarapeelert et al 844-856

Page 98: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Existence results of sequential derivatives of nonlinear quantum difference equations7

≤ supt∈[0,T ]

∫ t

0

∫ s

0

(|f(u, x(u)) + f(u, 0)|+ |f(u, 0)|)dqudps− |λ|∫ t

0

|x(s)|dps

+1

|ηT (1 + r)− T 2|

(|λT (t+ rt− T )|

∫ η

0

|x(s)|dps+ |T (t+ rt− T )|×∫ η

0

∫ s

0

(|f(u, x(u))− f(u, 0)|+ |f(u, 0)|)dqudps+ |(1 + r)λ(t− η)|∫ T

0

∫ v

0

|x(s)|dpsdrv

+|(1 + r)(t− η)|∫ T

0

∫ v

0

∫ s

0

(|f(u, x(u))− f(u, 0)|+ |f(u, 0)|)dqudpsdrv)

≤ supt∈[0,T ]

(L∥x∥+M)

∫ t

0

∫ s

0

dqudps+ |λ|∥x(s)∥∫ t

0

dps

+1

|ηT (1 + r)− T 2|

(∥x(s)∥|λT (t+ rt− T )|

∫ η

0

dps+ (L∥x∥+M)|T (t+ rt− T )|×∫ η

0

∫ s

0

dqudps+ ∥x(s)∥|(1 + r)λ(t− η)|∫ T

0

∫ v

0

dpsdrv

+(L∥x∥+M)|(1 + r)(t− η)|∫ T

0

∫ v

0

∫ s

0

dqudpsdrv

)

= supt∈[0,T ]

(L∥x∥+M)

t2

1 + p+ |λ|∥x(s)∥t+ 1

|ηT (1 + r)− T 2|

(∥x(s)∥|λT (t+ rt− T )|η

+(L∥x∥+M)|T (t+ rt− T )| η2

1 + p+ ∥x(s)∥|(1 + r)λ(t− η)| T 2

1 + r

+(L∥x∥+M)|(1 + r)(t− η)| T 3

(1 + q)(1 + r + r2)

)

= supt∈[0,T ]

∥x∥(|λ|t+ η|λT (t+ rt− T )|+ T (t− η)

|η(1 + r)− T |

)+(L∥x∥+M)

(t2

1 + p+

η2|t+ rt− T ||η(1 + r)− T |(1 + p)

+|(1 + r)(t− η)|T 2

|η(1 + r)− T |(1 + q)(1 + r + r2)

)≤ R

(|λ|T +

|λ|(ηr + T − η)

|η(1 + r)− T |

)+(LR|+M)

(T 2

1 + p+

η2rT

|η(1 + r)− T |(1 + p)+

|(1 + r)(T − η)|T 2

|η(1 + r)− T |(1 + q)(1 + r + r2)

)= RΦ + (LR +M)Ω≤ R

Therefore, ABR ⊂ BR.

We next show that F is a contraction. For any x, y ∈ C and for each t ∈ [0, T ],

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

850 Nichaphat Patanarapeelert et al 844-856

Page 99: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

8 Nichaphat Patanarapeelert and Thanin Sitthiwirattham

we have

∥(Fx)(t)− (Fy)(t)∥

= supt∈[0,T ]

∣∣∣∣∣(Fx)(t)− (Fy)(t)

∣∣∣∣∣= sup

t∈[0,T ]

∣∣∣∣∣∫ t

0

∫ s

0

(f(u, x(u))− f(u, y(u)))dqudps− λ

∫ t

0

(x(s)− y(s))dps

+1

ηT (1 + r)− T 2

(λT (t+ rt− T )

∫ η

0

(x(s)− y(s))dps− T (t+ rt− T )×∫ η

0

∫ s

0

(f(u, x(u))− f(u, y(u)))dqudps− (1 + r)λ(t− η)

∫ T

0

∫ v

0

(x(s)− y(s))dpsdrv

+(1 + r)(t− η)

∫ T

0

∫ v

0

∫ s

0

(f(u, x(u))− f(u, y(u)))dqudpsdrv

)∣∣∣∣∣≤ sup

t∈[0,T ]

L∥x− y∥

∫ t

0

∫ s

0

dqudps+ |λ|∥x− y∥∫ t

0

dps

+1

|ηT (1 + r)− T 2|

(∥x− y∥|λT (t+ rt− T )|

∫ η

0

dps+ L∥x− y∥|T (t+ rt− T )|×∫ η

0

∫ s

0

dqudps+ ∥x− y∥|(1 + r)λ(t− η)|∫ T

0

∫ v

0

dpsdrv

+L∥x− y∥|(1 + r)(t− η)|∫ T

0

∫ v

0

∫ s

0

dqudpsdrv

)≤ ∥x− y∥

(|λ|T +

|λ|(ηr + T − η)

|η(1 + r)− T |

)+L∥x− y∥

(T 2

1 + p+

η2rT

|η(1 + r)− T |(1 + p)+

|(1 + r)(T − η)|T 2

|η(1 + r)− T |(1 + q)(1 + r + r2)

)= (Φ + LΩ)∥x− y∥.

Since Φ + LΩ < 1, A is a contraction. Note that we complete this proof by using

Banach’s contraction mapping principle.

Further, we consider the existence and uniqueness of a solution to the boundary

value problem (1.5). We shall use the Krasnoselskii’s fixed point theorem [31].

Theorem 3.2. Let K be a bounded closed convex and nonempty subset of a Banach

space X. Let A,B be operators such that:

(i) Ax+By ∈ K whenever x, y ∈ K,

(ii) A is compact and continuous,

(iii) B is a contraction mapping.

Then there exists z ∈ K such that z = Az +Bz.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

851 Nichaphat Patanarapeelert et al 844-856

Page 100: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Existence results of sequential derivatives of nonlinear quantum difference equations9

Theorem 3.3. Assume that (H1) and (H2) hold. In addition we suppose that:

(H3) |f(t, x)| ≤ µ(t), for all (t, x) ∈ [0, T ]× R, with µ ∈ L1([0, T ],R+).

If

Φ + LΩ < 1, (3.3)

where Φ and Ω is given by (3.2), then the boundary value problem (1.5) has at least

one solution on [0, T ].

Proof. Setting maxt∈[0,T ] |µ(t)| = ∥µ∥ and choosing a constant

R ≥ ∥µ∥Ω1− Φ

, (3.4)

we consider BR = x ∈ C : ∥x∥ ≤ R.In view of Lemma 2.1, we define the operators F1 and F2 on the ball BR as

(F1x)(t) =

∫ t

0

∫ s

0

f(u, x(u))dqudps− λ

∫ t

0

x(s)dps,

(F2x)(t) =1

ηT (1 + r)− T 2

(λT (t+ rt− T )

∫ η

0

x(s)dps− T (t+ rt− T )×∫ η

0

∫ s

0

f(u, x(u))dqudps− (1 + r)λ(t− η)

∫ T

0

∫ v

0

x(s)dpsdrv

+(1 + r)(t− η)

∫ T

0

∫ v

0

∫ s

0

f(u, x(u))dqudpsdrv

)For x, y ∈ BR, by computing directly, we have

∥F1x+ F2y∥

≤ ∥µ∥∫ t

0

∫ s

0

dqudps+ |λ|∥x∥∫ t

0

dps

+1

|ηT (1 + r)− T 2|

(∥y∥|λT (t+ rt− T )|

∫ η

0

dps+ ∥µ∥|T (t+ rt− T )| ×∫ η

0

∫ s

0

dqudps+ ∥y∥|(1 + r)λ(t− η)|∫ T

0

∫ v

0

dpsdrv

+∥µ∥|(1 + r)(t− η)|∫ T

0

∫ v

0

∫ s

0

dqudpsdrv

)≤ RΦ + ∥µ∥Ω≤ R.

Therefore F1x + F2y ∈ BR. The condition (3.3) implies that F2 is a contraction

mapping. Next, we will show that F1 is compact and continuous. Continuity of f

coupled with the assumption (H3) implies that the operator F1 is continuous and

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

852 Nichaphat Patanarapeelert et al 844-856

Page 101: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

10 Nichaphat Patanarapeelert and Thanin Sitthiwirattham

uniformly bounded on BR. We define sup(t,x)∈[0,T ]×BR|f(t, x)| = fmax < ∞. For

t1, t2 ∈ [0, T ] with t1 ≤ t2 and x ∈ BR, we have that

∥F1x(t2)−F1x(t1)∥ = sup(t,x)∈[0,T ]×BR

∣∣∣∣∣∫ t1

0

∫ s

0

f(u, x(u))dqudps− λ

∫ t1

0

x(s)dps

−∫ t2

0

∫ s

0

f(u, x(u))dqudps+ λ

∫ t2

0

x(s)dps

∣∣∣∣∣= sup

(t,x)∈[0,T ]×BR

∣∣∣∣∣∫ t1

t2

∫ s

0

f(u, x(u))dqudps− λ

∫ t1

t2

x(s)dps

∣∣∣∣∣≤ fmax

|t21 − t22|1 + p

+ |λ|(t1 − t2)R.

In particular, if t1 − t2 → 0 the right-hand side of the above inequality tends to

zero. Thus, F1 is relatively compact on BR. Hence, we can conclude by the Arzela-

Ascoli Theorem that F1 is compact on BR. Therefore, all the assumptions of Theorem

3.3 are satisfied and the conclusion of Theorem 3.3 implies that the boundary value

problem (1.5) has at least one solution on [0, T ]. This completes the proof.

4 Examples

In this section, we give some examples to illustrate our main results with . Con-

sider the following boundary value problem of nonlinear second-order q-difference

equations with three-point boundary conditionsD 1

2(D 1

3+

1

100)x(t) =

e− sin2 t

100 + ecos2 t· |x(t)|1 + |x(t)|

, t ∈ [0, 3],

x (2) = 0,

∫ 3

0

x(s)d 34s = 0.

(4.1)

For this example, we have q = 1/2, p = 1/3, r = 3/4, λ = 10, T = 3, and η = 2.

Form Theorem 3.3, we find that

Φ =3

100+

3100

(9/4 + 1)

|3(7/4)− 3|≈ 0.06

Ω =9

4/3+

9

|3(7/4)− 3|(4/3)+

(7/4)9

|3(7/4)− 3|(3/2)(37/16)≈ 11.77

Since, |f(t, x)− f(t, y)| ≤ 1101

|x− y|, then (H1) is satisfied with L = 1101

. We can

find that

Φ + LΩ ≈ 0.177 < 1.

Hence, by Theorem 3.1, problem (4.1) with f(t, x) has a unique solution on [0, 3].

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

853 Nichaphat Patanarapeelert et al 844-856

Page 102: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Existence results of sequential derivatives of nonlinear quantum difference equations11

Acknowledgements. This research (KMUTNB-GEN-58-11) is supported by King

Mongkuts University of Technology North Bangkok, Thailand.

References

[1] F.H. Jackson, On q-difference equations, American J. Math. 32 (1910), 305-314.

[2] R.D. Carmichael, The general theory of linear q-difference equations, American

J. Math. 34 (1912), 147-168.

[3] T.E. Mason, On properties of the solutions of linear q-difference equations with

entire function coefficients, American J. Math. 37 (1915), 439-444.

[4] C.R. Adams, On the linear ordinary q-difference equation, American Math. Ser.

II 30 (1929), 195-205.

[5] W.J. Trjitzinsky, Analytic theory of linear q-differece equations, Acta Mathemat-

ica, (1933).

[6] T. Ernst, A new notation for q-calculus and a new q-Taylor formula, U.U.D.M.

Report 1999:25, ISSN 1101-3591, Department of Mathematics, Uppsala Univer-

sity, 1999.

[7] R.J. Finkelstein, q-Field theory, Lett. Math. Phys. 34 (1995), 169-176.

[8] R.J. Finkelstein, q-deformation of the Lorentz group, J. Math. Phys. 37 (1996),

953-964.

[9] R. Floreanini, L. Vinet, Automorphisms of the q-oscillator algebra and basic

orthogonal polynomials, Phys. Lett. A 180 (1993), 393-401.

[10] R. Floreanini, L. Vinet, Symmetries of the q-difference heat equation, Lett. Math.

Phys. 32 (1994), 37-44.

[11] R. Floreanini, L. Vinet, q-gamma and q-beta functions in quantum algebra rep-

resentation theory, J. Comput. Appl. Math. 68 (1996) 57-68.

[12] P.G.O. Freund, A.V. Zabrodin, The spectral problem for the q-Knizhnik-

Zamolodchikov equation and continuous q-Jacobi polynomials, Comm. Math.

Phys. 173 (1995), 17-42.

[13] G. Gasper, M. Rahman, Basic Hypergeometric Series, Cambridge University

Press, Cambridge, 1990.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

854 Nichaphat Patanarapeelert et al 844-856

Page 103: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

12 Nichaphat Patanarapeelert and Thanin Sitthiwirattham

[14] G.N. Han, J. Zeng, On a q-sequence that generalizes the median Genocchi num-

bers, Ann. Sci. Math. Quebec 23 (1999), 63-72.

[15] V. Kac, P. Cheung, Quantum Calculus, Springer, New York, 2002.

[16] G. Bangerezako, Variational q-calculus, J. Math. Anal. Appl. 289 (2004), 650-

665.

[17] A. Dobrogowska, A. Odzijewicz, Second order q-difference equations solvable by

factorization method, J. Comput. Appl. Math. 193 (2006), 319-346.

[18] G. Gasper, M. Rahman, Some systems of multivariable orthogonal q-Racah poly-

nomials, Ramanujan J. 13 (2007), 389-405.

[19] M.E.H. Ismail, P. Simeonov, q-difference operators for orthogonal polynomials,

J. Comput. Appl. Math. 233 (2009), 749-761.

[20] M. Bohner, G.Sh. Guseinov, The h-Laplace and q-Laplace transforms, J. Math.

Anal. Appl. 365 (2010), 75-92.

[21] M. El-Shahed, H.A. Hassan, Positive solutions of q-difference equation, Proc.

Amer. Math. Soc. 138 (2010), 1733-1738.

[22] B. Ahmad, Boundary-value problems for nonlinear third-order q-difference equa-

tions, Electron. J. Diff. Equ. 94 (2011), 1-7.

[23] B. Ahmad, A. Alsaedi, S.K. Ntouyas, A study of second-order q-difference equa-

tions with boundary conditions, Adv. Diff. Equ. 2012, 2012:35.

[24] B. Ahmad, S.K. Ntouyas, I.K. Purnaras, Existence results for nonlinear q-

difference equations with nonlocal boundary conditions, Commun. Appl. Non-

linear Anal. 19 (2012), 59-72.

[25] B. Ahmad, J.J. Nieto, On nonlocal boundary value problems of nonlinear q-

difference equations, Adv. Diff. Equ. 2012, 2012:81.

[26] B. Ahmad, S.K. Ntouyas, Boundary value problems for q-difference inclusions,

Abst. Appl. Anal. 2011, ID 292860 (2011), 15 pages.

[27] W. Zhou H. Liu, Existence solutions for boundary value problem of nonlinear

fractional q−difference equations, Adv. Differ. Equ. 2013, 2013.

[28] C. Yu, J. Wang, Existence of solutions for nonlinear second-order q-difference

equations with first-order q-derivatives, Adv. Differ. Equ. 2013, 2013:124.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

855 Nichaphat Patanarapeelert et al 844-856

Page 104: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Existence results of sequential derivatives of nonlinear quantum difference equations13

[29] N. Pongarm, S. Asawasamrit, J. Tariboon, Sequential derivatives of nonlinear

q-difference equations with three-point q-integral boundary conditions, J. Appl.

Math. 2013, ID 605169 (2013), 9 pages.

[30] D. W. Boyd and J. S. W. Wong, On nonlinear contractions, Proc. Amer. Math.

Soc. 20 (1969), 458-464.

[31] M.A. Krasnoselskii, Two remarks on the method of successive approximations,

Uspekhi Mate. Nauk. 10 (1955), 123-127.

[32] A. Granas and J. Dugundji, Fixed Point Theory, Springer-Verlag, New York,

2003.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

856 Nichaphat Patanarapeelert et al 844-856

Page 105: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

An iterative method for solving fourth-order boundary value problems of

mixed type integro-dierential equations

Omar Abu Arqub

Department of Mathematics, Al-Balqa Applied University, Salt 19117, Jordan

*Corresponding author: e-mail: [email protected]; P.O. Box: Al-Salt 19117, Jordan

||||||||||||||||||||||||||||||||||||||||||||

Abstract

In this paper, reproducing kernel Hilbert space method is introduced as an ecient solver for fourth-order bound-

ary value problems of mixed type integro-dierential equations where two reproducing kernel functions are used

throughout the evolution of the algorithm to obtain the required nodal values of the unknown variable. The solution

methodology is based on generating the orthogonal basis from the obtained kernel function in the space W 52 [0; 1].

After that, the orthonormal basis is constructing in order to formulate and utilize the solution in the same space. In

addition to that, an error estimation and bound based on the use of reproducing kernel theory has been carried out.

Four numerical test problems including linear and nonlinear equations were analyzed to illustrate the procedure

and conrm the performance of the proposed method. The numerical results show that the proposed algorithm is a

robust and accurate procedure for solving fourth-order boundary value problems of mixed type integro-dierential

equations.

Keywords: Integro-dierential equation; Reproducing kernel function; Iterative method

AMS Subject Classication: 34K28; 45J05; 47B32

||||||||||||||||||||||||||||||||||||||||||||||||

1 Introduction

Most engineering and physical problems are governed by functional equations, for example, ordinary dierential

equations, integral equations, integro-dierential equations (IDEs), and stochastic dierential equations. Many

mathematical formulation of physical phenomena contain IDEs with proper boundary conditions, these equations

arises in uid dynamics, biological models, and chemical kinetics, etc. [17]. In most cases, the equation is too

complex to allow one to nd an exact solution, where solution of such equations is always demand due to practical

interests. Therefore, an ecient, reliable computer stimulation is required; it is little wonder that with the develop-

ment of fast, ecient digital computers, the role of numerical methods in mathematical, physical, and engineering

problems solving has increased dramatically in recent years.

Today, computers and numerical methods provide an alternative for complicated calculations. Using computer

power to obtain solutions directly, we can approach these calculations without recourse to simplifying assumptions

or time-intensive techniques. Although analytical solutions are still extremely valuable both for problem solving

and for providing insight, numerical methods represent alternatives that greatly enlarge our capabilities to confront

and solve problems. As a result, more time is available for the use of creative skills. Thus, more emphasis can be

placed on problem formulation and solution interpretation and the incorporation of total system.

Investigation about solvability of fourth-order boundary value problems (BVPs) of mixed type IDEs is scarce.

Recently, many authors have discussed the numerical solvability for Volterra type by using some of the well-known

methods. It is to be noted that the Volterra type is just a special case of the problem that we propose in this paper.

However, the reader is asked to refer to [812] in order to know more details about these methods, including their

kinds and history, their modication for use, their applications on the other problems, and their characteristics.

In this paper, we introduce a novel method based on the use of reproducing kernel Hilbert space (RKHS) method

for numerically approximating a solution of fourth-order BVPs of mixed type IDEs in which the given boundary

conditions can be involved. The present method has the following characteristics:

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

857 Omar Abu Arqub 857-874

Page 106: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

2

1. The method is of global nature in terms of the solution obtained as well as its ability to solve other mathe-

matical, physical, and engineering problems.

2. The present method is accurate, need less eort to achieve the results, and is developed especially for nonlinear

case. However, if the problem comes nonlinear, then the RKHS method does not require discretization or

perturbation and it does not make closure approximation.

3. In the proposed method, it is possible to pick any point in the interval of integration and as well the approx-

imate solution and all its derivatives up to order four will be applicable.

4. The RKHS method does not require discretization of the variables, that is, time and space; it is not eected

by computation round o errors and one is not faced with necessity of large computer memory and time.

In the strict sense of the word, before applying a numerical method to the solution of IDEs, we must be certain

that a solution exists. We are also interested in whether the solution is unique. It is worth stating that in many

cases, since IDEs are often derived from problems in physical world, existence and uniqueness are often obvious for

physical reasons. Notwithstanding this, a mathematical statement about existence and uniqueness is worthwhile.

On the other hand, uniqueness would be of importance if, for instance, we wished to approximate the solution.

If two solution passed through a point, then approximations could very well jump from one solution to the other

with misleading consequences. Therefore, we assume that the fourth-order BVPs of mixed type IDEs to be solved

numerically using RKHS method have unique solution on the given interval.

This paper is arranged in the following form: in the next section, a short introduction to reproducing kernel

theory is presented. In Section 3, we state the problem and an algorithm solver is introduced. In Section 4, several

reproducing kernel functions are constructed in order to apply the RKHS method. In Section 5, we formulate

the problem and a theoretic basis of the method is introduced in the space W 52 [0; 1]. In Section 6, we will give

the representation of exact and approximate solutions, also, an iterative method for solving the present problem

numerically using RKHS method is described. In Section 7, we derive an error bound for the present method in

order to capture the behavior of solution. Software libraries and numerical results are given in Section 8 in order to

verify the mathematical simulation of the proposed algorithm. Finally, concluding remarks are presented in Section

9.

2 Preface to reproducing kernel theory

After a brief introduction to reproducing kernel theory, we view the elements of RKHS and discuss its properties,

its applications, and its advantages. In particular, we focus on the spaces W 52 [0; 1] and W 1

2 [0; 1] among other

reproducing kernel, because of their use in this paper, especially in constructing the needed reproducing kernel

functions.

In functional analysis, a RKHS is a Hilbert space of functions in which pointwise evaluation is a continuous

linear functional. Equivalently, they are spaces that can be dened by reproducing kernels. An abstract set is

supposed to have elements, each of which has no structure, and is itself supposed to have no internal structure,

except that the elements can be distinguished as equal or unequal, and to have no external structure except for the

number of elements.

Denition .1 [13] Let E be a nonempty abstract set. A function K : E E ! C is a reproducing kernel of theHilbert space H if

1. For each x 2 E, K (; x) 2 H.

2. For each x 2 E and ' 2 H, h' () ;K (; x)i = ' (x).

Remark .1 The condition (2) in Denition .1 is called "the reproducing property" which means that the value

of the function ' at the point x is reproducing by the inner product of ' () with K (; x). A Hilbert space whichpossesses a reproducing kernel is called a RKHS [13].

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

858 Omar Abu Arqub 857-874

Page 107: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

3

As a special case, the spaces W 52 [0; 1] and W

12 [0; 1] are complete Hilbert with some special properties. So, all

the properties of the Hilbert space will be hold. Further, theses spaces possesses some special and better properties

which could make some problems be solved easier. For instance, many problems studied in L2[0; 1] space, which

is a complete Hilbert space, requires large amount of integral computations, and such computations may be very

dicult in some cases. Thus, the numerical integrals have to be calculated in the cost of losing some accuracy.

However, the properties of W 52 [0; 1] and W

12 [0; 1] require no more integral computation for some functions, instead

of computing some values of a function at some nodes. In fact, this simplication of integral computation not only

improves the computational speed, but also improves the computational accuracy.

Reproducing kernel theory has important application in numerical analysis, dierential equations, integral

equations, probability and statistics, and so fourth [1416]. Recently, a lot of research work has been devoted to the

applications of RKHS method to a wide class of stochastic and deterministic problems involving operator equations,

dierential equations, and integral equations. The RKHS method was used by many authors to investigate several

scientic applications side by side with their theory. The reader is kindly requested to go through [1231] in order

to know more details about RKHS method, including its history, its modication for use, its applications on the

other problems, and its characteristics. On the other hand, the numerical solvability of other version of dierential

problems can be found in [3235] and references therein.

3 Problem statement and numerical algorithm

Numerical methods tend to emphasize the implementation of algorithms. The aim of numerical methods is therefore

to provide systematic methods for solving problems in a numerical form. The process of solving problems generally

involves starting from an initial data, using high precision digital computers, following the steps in the algorithms,

and nally obtaining the results. Often the numerical data and the methods used are approximate ones.

Let us consider the following fourth-order BVPs of mixed type IDEs described the ordinary functional equation:

u(4) (x) = F (x; u000 (x) ; u00 (x) ; u0 (x) ; u (x)) + [Tu] (x) ; (1)

in which the mixed Fredholm-Volterra operator, [Tu], is given as

[Tu] (x) =1R0

k1(x; t)G1(u000 (t) ; u00 (t) ; u0 (t) ; u (t))dt+

xR0

k2(x; t)G2(u000 (t) ; u00 (t) ; u0 (t) ; u (t))dt;

subject to the boundary conditions

u (0) = 0, u (1) = 0;

u00 (0) = 1, u00 (1) = 1;

(2)

where 0 t < x 1, i, i, i = 0; 1 are real nite constants, u 2W 52 [0; 1] is an unknown function to be determined,

k1 (x; t) ; k2 (x; t) are continuous functions on [0; 1]2, F (x;w1; w2; w3; w4) ; G1 (w1; w2; w3; w4) ; G2 (w1; w2; w3; w4)

are continuous terms in W 12 [0; 1] as wi = wi (x) 2 W 5

2 [0; 1], 0 x 1, 1 < wi < 1, i = 1; 2; 3; 4 and are

depending on the problem discussed, and W 12 [0; 1] ;W

52 [0; 1] are two reproducing kernel spaces.

The following is the main steps for formulating Eqs. (1) and (2) in order to apply the RKHS method. The

steps in the algorithm are explained in more detail in the next sections.

Algorithm 1 To nd a series representation of analytic and approximate solutions of Eqs. (1) and (2) using RKHS

method, we do the following steps:

Step 1: Introduce new unknown function v (x) as

v (x) = u (x) (x) ;

where (x) satises the requirements (0) = 0 and 1 (1) = 0. Similarly, 00 (x) satises the requirements

00 (0) = 1 and 00 (1) = 1. Hence, one can obtain

(x) = 16 (1 1)x

3 + 121x

2 +0 0 1

61 131

x+ 0:

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

859 Omar Abu Arqub 857-874

Page 108: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

4

Step 2: The form of Eq. (1) with nonhomogeneous boundary conditions (2) can be equivalently reduced to the

problem of nding a function v (x) that satisfying the following equation:

v(4) (x) = Fx; (v + )

000(x) ; (v + )

00(x) ; (v + )

0(x) ; (v + ) (x)

+ [T (v + )] (x) ; (3)

subject to the homogeneous boundary conditions

v (0) = 0, v (1) = 0;

v00 (0) = 0, v00 (1) = 0:(4)

Step 3: Find the representation form of the two kernel functions Kx (y) and Rx (y) of the spaces W52 [0; 1] and

W 12 [0; 1], respectively.

Step 4: Construct the orthogonal function system i(x) of the space W52 [0; 1] as i(x) = Ly [Kx (y)]y=xi .

Step 5: Construct the orthonormal function system i (x)

1i=1

of the space W 52 [0; 1] as

i (x) =iP

k=1

ik k (x).

Step 6: The analytic solution v (x) and the approximate solution vn (x) of Eqs. (3) and (4) are obtained, respec-

tively, as

v (x) =1Pi=1

iPk=1

ik Fxk; (v + )

000(xk) ; (v + )

00(xk) ; (v + )

0(xk) ; (v + ) (xk)

+ [T (v + )] (xk)

i (x) ;

vn (x) =nPi=1

iPk=1

ik Fxk; (v + )

000(xk) ; (v + )

00(xk) ; (v + )

0(xk) ; (v + ) (xk)

+ [T (v + )] (xk)

i (x) ;

where ik; xk; i (x) are all given in the process of formulation.

Step 7: The analytic solution u (x) and the approximate solution un (x) of Eqs. (1) and (2) are obtained, respec-

tively, as

u (x) = (xk) +1Pi=1

iPk=1

ik fF (xk; u000 (xk) ; u00 (xk) ; u0 (xk) ; u (xk)) + [Tu] (xk)g i (x) ;

un (x) = (xk) +nPi=1

iPk=1

ik fF (xk; u000 (xk) ; u00 (xk) ; u0 (xk) ; u (xk)) + [Tu] (xk)g i (x) :

4 Several reproducing kernel functions

In this section, we formulate two reproducing kernels in order to generating the orthogonal basis in the space

W 52 [0; 1]. After that, an orthonormal basis is constructing in order to formulate and utilize the solution of Eqs. (3)

and (4) using RKHS method in the same space.

To apply the RKHS method, we rst dene and construct a reproducing kernel space W 52 [0; 1] in which every

function satises the boundary conditions z (0) = z00 (0) = z (1) = z00 (1) = 0.

Denition .2 The inner product space W 52 [0; 1] is dened as W

52 [0; 1] = fz (x) : z(i); i = 0; 1; 2; 3; 4 are absolutely

continuous real-valued functions on [0; 1], z(5) 2 L2 [0; 1], and z (0) = z00 (0) = z (1) = z00 (1) = 0g. The innerproduct and the norm in W 5

2 [0; 1] are given by

hz1 (x) ; z2 (x)iW 52=

2Pi=0

z(i)1 (0) z

(i)2 (0) +

1Pi=0

z(i)1 (1) z

(i)2 (1) +

1R0

z(5)1 (x)z

(5)2 (x)dx; (5)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

860 Omar Abu Arqub 857-874

Page 109: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

5

and jjzjjW 52=qhz (x) ; z (x)iW 5

2, respectively, where z1; z2 2W 5

2 [0; 1] and L2 [0; 1] =

nz :R 10z2 (x) dx <1

o.

It is easy to see that hz1 (x) ; z2 (x)iW 52satises all the requirements of the inner product. First, hz1 (x) ; z1 (x)iW 5

2

0. Second, hz1 (x) ; z2 (x)iW 52= hz2 (x) ; z1 (x)iW 5

2. Third, h z1 (x) ; z2 (x)iW 5

2= hz1 (x) ; z2 (x)iW 5

2. Fourth,

hz1 (x) + z2 (x) ; z3 (x)iW 52= hz1 (x) ; z3 (x)iW 5

2+hz2 (x) ; z3 (x)iW 5

2. It remains only to prove that hz1 (x) ; z1 (x)iW 5

2=

0 if and only if z1 (x) = 0. In fact, it is obvious that when z1 (x) = 0, then hz1 (x) ; z1 (x)iW 52= 0. On the other

hand, if hz1 (x) ; z1 (x)iW 22= 0, then by Eq. (5), we have hz1 (x) ; z1 (x)iW 2

2=

2Pi=0

z(i)1 (0)

2+

1Pi=0

z(i)1 (1)

2+R 1

0

z(5)1 (x)

2dx = 0. Therefore, z1 (0) = z01 (0) = z001 (0) = 0, z1 (1) = z01 (1) = 0, and z

(5)1 (x) = 0. Then, we can

obtain z1 (x) = 0.

Denition .3 [13] The Hilbert space W 52 [0; 1] is called a reproducing kernel if for each xed x 2 [0; 1] and any

z (y) 2W 52 [0; 1], there exist K (x; y) 2W 5

2 [0; 1] (simply Kx (y)) and y 2 [0; 1] such that hz (y) ;Kx (y)iW 52= z (x).

It is very important to obtain the representation form of the reproducing kernel function Kx (y), because it

is the basis of our algorithm. In the following theorem, we will give the method for obtaining the reproducing

kernel function Kx (y) in the space W52 [0; 1]. After that, we construct the space W

12 [0; 1] in order to dene a linear

bounded operator L as shown later in the next section.

Theorem .1 The Hilbert spaceW 52 [0; 1] is a reproducing kernel and its reproducing kernel function Kx (y) is given

by

Kx (y) =

8>><>>:9Pi=0

pi(x)yi; y x;

9Pi=0

qi(x)yi; y > x:

(6)

where pi(x) and qi(x), i = 0; 2; :::; 9 are unknown coecients of Kx (y) and are given as

p0 (x) = 0, p1 (x) =1

725764

362884x 725782x3 + 362903x4 12x7 + 9x8 2x9

, p2 (x) = 0;

p3 (x) =1

43894206720(43895295360x

+87800025610x3 43910173465x4 + 10160696x5 5806148x7 + 1088673x8 6x9);

p4 (x) =1

87788413440x(43896746880

87820346930x2 + 43950816165x3 30482088x4 + 4354668x6 1088709x7 + 14x8);p5 (x) = p6 (x) = 0;

p7 (x) = 1

21947103360x362880 2177292x+ 2903074x2 1088667x3 + 12x6 9x7 + 2x8

;

p8 (x) =1

29262804480x362884 + 725782x2 362903x3 + 12x6 9x7 + 2x8

;

p9 (x) =1

131682620160

362882 362880x 18x3 + 21x4 12x7 + 9x8 2x9

;

q0 (x) =1

362880x9;

q1 (x) = 1

7315701120

x3657870720 + 7315882560x2 3658062240x3 + 120960x6 + 90721x7 + 20160x8

;

q2 (x) =1

10080x7;

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

861 Omar Abu Arqub 857-874

Page 110: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

6

q3 (x) = 1

43894206720

x43895295360 87800025610x2 + 43910173465x3 + 5806148x6 1088673x7 + 6x8

;

q4 (x) =1

87788413440

x43896746880 87820346930x2 + 43950816165x3 + 4354668x6 1088709x7 + 14x8

;

q5 (x) = 1

2880x4, q6 (x) =

1

4320x3;

q7 (x) = 1

21947103360x362880 + 2903074x2 1088667x3 + 12x6 9x7 + 2x8

;

q8 (x) =1

29262804480x362880 + 725782x2 362903x3 + 12x6 9x7 + 2x8

;

q9 (x) = 1

131682620160x362880 + 18x2 21x3 + 12x6 9x7 + 2x8

:

Proof. The proof of the completeness and reproducing property of W 52 [0; 1] is similar to the proof in [17]. Let

us now nd out the expression form of the reproducing kernel function Kx (y) in the space W52 [0; 1]. Clearly,R 1

0z(5) (y)K

(5)x (y) dy =

4Pi=0

(1)4i z(i) (y)K(9i)x (y) jy=1y=0 +(1)

3 R 10z (y)K

(10)x (y) dy. Hence, hz (y) ;Kx (y)iW 5

2=

2Pi=0

z(i) (0)K(i)x (0) +

1Pi=0

z(i) (1)K(i)x (1) +

4Pi=0

(1)4i z(i) (y)K(9i)x (y) jy=1y=0

R 10z (y)K

(10)x (y) dy. Since Kx (y) 2

W 52 [0; 1], it follows that Kx (0) = K 00

x (0) = Kx (1) = K 00x (1) = 0. Further, since z (x) 2 W 5

2 [0; 1], one obtains

z (0) = z00 (0) = z (1) = z00 (1) = 0. Thus, if K(i)x (0) = K

(i)x (1) = 0, i = 5; 6, K 0

x (0) + K(8)x (0) = 0, and

K 0x (1) K

(8)x (1) = 0, then hz (y) ;Kx (y)iW 5

2=R 10z (y)

K(10)

x (y)dy. Now, for each x 2 [0; 1], if Kx (y) also

satises K(10)x (y) = (x y), where is the dirac-delta function, then hz (y) ;Kx (y)iW 5

2= z (x). Obviously,

Kx (y) is the reproducing kernel function of W52 [0; 1]. Let us now utilizing the expression form of the reproducing

kernel function Kx (y). The characteristic equation of K(10)x (y) = (y x) is 10 = 0, and their characteristic

values are = 0 with 10 multiple roots. So, let the expression form of the reproducing kernel function Kx (y) be

as dened in Eq. (6). On the other aspect as well, let Kx (y) satises K(m)x (x+ 0) = K

(m)x (x 0), m = 0; 1; :::; 8.

Integrating K(10)x (y) = (x y) from x " to x + " with respect to y and let " ! 0, we have the jump

degree of K(9)x (y) at y = x given by K

(9)x (x 0) K

(9)x (x+ 0) = 1. Through the last descriptions and by using

MATHEMATICA 7:0 software package, the unknown coecients pi(x) and qi(x), i = 0; 2; :::; 9 of Eq. (6) can be

obtained as given in the theorem. This completes the proof.

Denition .4 [18] The inner product space W 12 [0; 1] is dened as W

12 [0; 1] = fz (x) : z is absolutely continuous

real-valued function on [0; 1] and z0 2 L2 [0; 1]g. The inner product and the norm in W 12 [0; 1] are dened as

hz1 (x) ; z2 (x)iW 12=R 10(z01 (x) z

02 (x) + z1 (x) z2 (x)) dx and jjzjjW 1

2=qhz (x) ; z (x)iW 1

2respectively, where z1; z2 2

W 12 [0; 1] and L

2 [0; 1] =nz :R 10z2 (x) dx <1

o.

Theorem .2 [18] The Hilbert space W 12 [0; 1] is a complete reproducing kernel and its reproducing kernel function

Rx (y) can be written as

Rx (y) =

(p0(x)e

y + p1(x)ey; y x;

q0(x)ey + q1(x)e

y; y > x:

where pi(x) and qi(x), i = 0; 1 are unknown coecients of Rx (y) and are given as

p0 (x) =1

2 sinh (1)cosh (x 1) ;

p1 (x) =1

2 sinh (1)cosh (x 1) ;

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

862 Omar Abu Arqub 857-874

Page 111: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

7

q0 (x) =1

4 sinh (1)

ex1 + e1x

;

q1 (x) =1

4 sinh (1)

e1x + e1+x

:

In fact, it easy to see that q0(x)ey + q1(x)e

y = p0 (y) ex + p1 (y) e

x. As a result, the reproducing kernel

function posses some important properties such as: it is symmetric, unique, and nonnegative. The reader is asked

to refer to [1231] in order to know more details about reproducing kernel function including its mathematical

properties, types and kinds, applications, method of calculations, and others.

5 Problem formulation in the space W52 [0; 1]

Problem formulation is normally the most important part of the process. It is the selection of linear operator,

orthogonal basis, and orthonormal basis. In this section, Eqs. (3) and (4) are rst formulated as a dierential linear

operator based on the spaces W 52 [0; 1] and W

12 [0; 1]. After that, the Gram-Schmidt orthogonalization process of

f i (x)g1i=1 is presented.

In order to apply the RKHS method, as in [12, 13, 1731], we rs dene a dierential linear operator L as

L :W 52 [0; 1]!W 1

2 [0; 1] such that Lv (x) = v(4) (x). Thus, discretized form of Eqs. (3) and (4) can be obtained as

follows:

Lv (x) = Fx; (v + )

000(x) ; (v + )

00(x) ; (v + )

0(x) ; (v + ) (x)

+ [T (v + )] (x) ; (7)

subject to the two-point boundary conditions

v (0) = 0, v (1) = 0;

v00 (0) = 0, v00 (1) = 0;(8)

where v and are as given in Algorithm 1.

Theorem .3 The operator L :W 52 [0; 1]!W 1

2 [0; 1] is bounded and linear.

Proof. For boundedness, we need to prove kLv(x)k2W 12 M kLv(x)k2W 5

2; where M is a positive constant. From

the denition of the inner product and the norm of W 12 [0; 1], we have k(Lv) (x)k

2W 1

2= h(Lv) (x) ; (Lv) (x)iW 1

2=

1R0

n(Lv)

0(x)2+ [(Lv) (x)]

2odx: By reproducing property of Kx(y), we have v(x) = hv (y) ;Kx (y)iW 5

2, (Lv) (x) =

hv (y) ; (LKx) (y)iW 52, and (Lv)0(x) = hv (y) ; (LKx)

0 (y)iW 52. Again, by Schwarz inequality, we get

j(Lv)(x)j =hv (x) ; (LKx) (x)iW 5

2

kLKx (x)kW 52kv (x)kW 5

2=M1 kv (x)kW 5

2; M1 > 0;

j(Lv)0(x)j =hv (x) ; (LKx)

0 (x)iW 52

k(LKx)0 (x)kW 5

2kv (x)kW 5

2=M2 kv (x)kW 5

2; M2 > 0:

Thus, k(Lv)(x)k2W 12=

1R0

n(Lv)

0(x)2+ [(Lv) (x)]

2odx (M2

1 +M22 ) kv (x)k

2W 5

2or k(Lv)(x)kW 1

2 M kv (x)kW 5

2;

where M =pM21 +M

22 . The linearity part is obvious. This complete the proof.

After that, we construct an orthogonal function system of W 52 [0; 1] as follows: put 'i (x) = Rxi (x) and

i (x) = Li' (x), where fxig1i=1 is dense on [0; 1] and L

is the adjoint operator of L. In terms of the properties of

reproducing kernel function Kx (y), one can obtains hv (x) ; i (x)iW 52= hv (x) ; L'i (x)iW 5

2= hLv (x) ; 'i (x)iW 1

2=

Lv(xi), i = 1; 2; :::. In fact, the orthonormal function system i (x)

1i=1

of the space W 52 [0; 1] can be derived from

the Gram-Schmidt orthogonalization process of f i (x)g1i=1 as

i (x) =iP

k=1

ik k (x) ; (9)

where ik are orthogonalization coecients and are given as follows: ij =1

k 1kfor i = j = 1, ij =

1difor

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

863 Omar Abu Arqub 857-874

Page 112: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

8

i = j 6= 1, and ij = 1di

i1Pk=j

cikkj for i > j such that di =

sk ik

2 i1Pk=1

c2ik, cik = i; k

W 5

2, and f i (x)g

1i=1

is the orthonormal system in the space W 52 [0; 1].

Through the next theorem the subscript y by the operator L (Ly) indicates that the operator L applies to the

function of y.

Theorem .4 If fxig1i=1 is dense on [0; 1], then f i (x)g1i=1 is a complete function system of W 5

2 [0; 1] and i (x) =

LyKx (y)jy=xi .

Proof. Clearly, i (x) = Li' (x) = hLi' (y) ;Kx (y)iW 52= h'i (y) ; LyKx (y)iW 1

2= LyKx (y)jy=xi 2 W 5

2 [0; 1].

Now, for each xed v (x) 2 W 52 [0; 1], let hv (x) ; i (x)iW 5

2= 0, i = 1; 2; :::. In other word, hv (x) ; i (x)iW 5

2=

hv (x) ; L'i (x)iW 52= hLv (x) ; 'i (x)iW 1

2= Lv (xi) = 0. Note that fxig1i=1 is dense on [0; 1], therefore Lv (x) = 0.

It follows that v (x) = 0 from the existence of L1. So, the proof of the theorem is complete.

Lemma .1 If v (x) 2 W 52 [0; 1], then there exists M > 0 such that

v(i) (x)C M jjv(x)jjW 5

2, i = 0; 1; 2; 3; 4,

where jjv (x)jjC = maxaxb

jv(x)j.

Proof. For any x; y 2 [0; 1], we have v(i)(x) =Dv(y);K

(i)x (y)

EW 5

2

, i = 0; 1; 2; 3; 4: By the expression of Kx(y), it

follows that K(i)

x (y) W 5

2

Mi, i = 0; 1; 2; 3; 4. Thus,v(i)(x) = Dv (x) ;K(i)

x (x)EW 5

2

K(i)x (x)

W 5

2

kv(x)kW 52

Mi kv(x)kW 52, i = 0; 1; 2; 3; 4. Hence,

v(i) (x)CM jjv(x)jjW 5

2, i = 0; 1; 2; 3; 4, where M = max

i=0;1;2;3;4fMig.

6 Representation of exact and approximate solutions

In this section, we will give the representation form of exact and approximate solutions of Eqs. (3) and (4) in the

space W 52 [0; 1]. After that, an iterative formulas of obtaining approximate solution is represented for both linear

and nonlinear case.

Theorem .5 For each v (x) 2 W 52 [0; 1], the series

1Pi=1

v (x) ; i (x)

i (x) is convergent in the sense of the norm

of W 52 [0; 1]. On the other hand, if fxig

1i=1 is dense on [0; 1], then the following are hold:

(i) The exact solution of Eqs. (7) and (8) could be represented by

v (x) =1Pi=1

iPk=1

ikFxk; (v + )

000(xk) ; (v + )

00(xk) ; (v + )

0(xk) ; (v + ) (xk)

+ [T (v + )] (xk)

i (x) :

(10)

(ii) The approximate solution of Eqs. (7) and (8)

vn (x) =nPi=1

iPk=1

ikFxk; (v + )

000(xk) ; (v + )

00(xk) ; (v + )

0(xk) ; (v + ) (xk)

+ [T (v + )] (xk)

i (x) ;

(11)

and its derivative up to order four are converging uniformly to the exact solution v (x) and all its derivative

as n!1, respectively.

Proof. For the rst part, let v (x) be solution of Eqs. (7) and (8) in the space W 52 [0; 1]. Since v (x) 2 W 5

2 [0; 1],1Pi=1

v (x) ; i (x)

i (x) is the Fourier series about normal orthogonal system

i (x)

1i=1, and W 5

2 [0; 1] is the

Hilbert space, then the series1Pi=1

v (x) ; i (x)

i (x) is convergent in the sense of kkW 5

2. On the other aspect as

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

864 Omar Abu Arqub 857-874

Page 113: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

9

well, using Eq. (9), we have

v (x) =1Pi=1

v (x) ; i (x)

W 5

2

i (x)

=1Pi=1

iPk=1

ik hv (x) ; k (x)iW 52

i (x)

=1Pi=1

iPk=1

ik hv (x) ; L'k (x)iW 52

i (x)

=1Pi=1

iPk=1

ik hLv (x) ; 'k (x)iW 12

i (x)

=1Pi=1

iPk=1

ik Fx; (v + )

000(x) ; (v + )

00(x) ; (v + )

0(x) ; (v + ) (x)

+ [T (v + )] (x) ; 'k (x)

W 1

2

i (x)

=1Pi=1

iPk=1

ik Fxk; (v + )

000(xk) ; (v + )

00(xk) ; (v + )

0(xk) ; (v + ) (xk)

+ [T (v + )] (xk)

i (x) :

Therefore, the form of Eq. (10) is the exact solution of Eqs. (7) and (8).

For the second part, it easy to see that by Lemma .1, for any x 2 [0; 1]v(i)n (x) v(i) (x) =

Dvn (x) v (x) ;K(i)x (x)

EW 5

2

K(i)x (x)

W 5

2

kvn (x) v (x)kW 52

Mi kvn (x) v (x)kW 52, i = 0; 1; 2; 3; 4;

where Mi, i = 0; 1; 2; 3; 4 are positive constants. Hence, if kvn (x) v (x)kW 52! 0 as n ! 1, the approximate

solution vn (x) and v(i)n (x), i = 0; 1; 2; 3; 4 are converge uniformly to the exact solution v (x) and all its derivative,

respectively. So, the proof of the theorem is complete.

Next, we will mention the following remark about the exact and approximate solutions of Eqs. (3) and (4).

Remark .2 [12, 13, 1731] In order to apply the RKHS technique for solve Eqs. (3) and (4), we dene an initial

guess approximation function as v0 (x1) = v (x1) = 0. On the other hand, we have the following two cases based on

the form of Eq. (11) and the structure of the functions F , G1, and G2 in Eq. (3).

Case 1: If Eq. (3) is linear, then the approximate solution can be obtained directly as follows:

vn (x) =nPi=1

iPk=1

ikfFxk; (vk1 + )

000(xk) ; (vk1 + )

00(xk) ; (vk1 + )

0(xk) ; (vk1 + ) (xk)

+ [T (vk1 + )] (xk)g i (x) :

Case 2: If Eq. (3) is nonlinear, then the approximate solution can be obtained immediately as follows:

vNn (x) =NPi=1

iPk=1

ikfFxk; (vn1 + )

000(xk) ; (vn1 + )

00(xk) ; (vn1 + )

0(xk) ; (vn1 + ) (xk)

+ [T (vn1 + )] (xk)g i (x) :

The reader is asked to refer to [12,13,1731] in order to know more details about these two case, including their

derivation, their importance, and their relationship to the exact solution.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

865 Omar Abu Arqub 857-874

Page 114: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

10

7 Error estimation and error bound

When solving practical problems, it is necessary to take into account all the errors of the measurements. Moreover,

in accordance with the technical progress and the degree of complexity of the problem, it becomes necessary to

improve the technique of measurement of quantities. Considerable errors of measurement become inadmissible in

solving complicated mathematical, physical, and engineering problems. The reliability of the numerical result will

depend on an error estimate or bound, therefore the analysis of error and the sources of error in numerical methods

is also a critically important part of the study of numerical technique. In this section, we derive an error bounds

for the present method and problem in order to capture behavior of the solution.

In the next theorem, we show that the error of approximate solution is monotone decreasing, while the next

lemma is presented in order to prove the recent theorem.

Theorem .6 Let "2s;n = jjv (x) vn (x)jj2W 3

2, where v (x) and vn (x) are given by Eq. (10) and Eq. (11), respectively.

Then, the sequence of numbers f"ng are monotone decreasing in the sense of the norm of W 52 [0; 1] and "n ! 0 as

n!1.Proof. Since, v (x) =

1Pi=1

v (x) ; i (x)

W 5

2

i (x) it obvious that

"2n = jjv (x) vn (x)jj2W 5

2=

1Pi=n+1

v (x) ; i (x)

W 5

2

i (x)

2W 5

2

=1P

i=n+1

v (x) ; i (x)

W 5

2

2;

"2n1 = jjv (x) vn1 (x)jj2W 5

2=

1Pi=n

v (x) ; i (x)

W 5

2

i (x)

2W 5

2

=1Pi=n

v (x) ; i (x)

W 5

2

2:

Clearly, "n1 "n, and consequently f"ng is monotone decreasing in the sense of kkW 52. On the other aspect as

well, by Theorem .5, we know that1Pi=1

v (x) ; i (x)

W 5

2

i (x) is convergent in the sense of kkW 52. Thus, we have

"2n =1P

i=n+1

v (x) ; i (x)

W 5

2

2! 0 or "n ! 0. This complete the proof.

Lemma .2 Let v (x) is the exact solution of Eqs. (7) and (8), vn (x) is the approximate solution of v (x), and

T =xk+1 =

k2i : k = 0; 1; :::; 2

i. Then, Lv (xk) = Lvn (xk), for n = 2

i + 1 and xk 2 T .

Proof. Set the projective operator Pn : W 52 [0; 1] ! f

Pnm=1 cm m (x) ; cm 2 Rg, Then, we have Lvn (xk) =

hvn () ; LxkFxk ()iW 52= hvn () ; k ()iW 5

2= hPnv () ; k ()iW 5

2= hv () ; Pn k ()iW 5

2= hv () ; k ()iW 5

2=

hv () ; LxkFxk ()iW 52= Lxk hv () ; Fxk ()iW 5

2= Lxkv (xk) = Lv (xk).

Theorem .7 Let v (x) is the exact solution of Eqs. (7) and (8), vn (x) is the approximate solution of v (x), and

T =xk+1 =

k2i : k = 0; 1; :::; 2

i. Then, jv (x) vn (x)j < M

n , whereM is the product of the sup of convergent basis 1Pi=n+1

iPk=1

ikfFxk; (v + )

000(k) ; (v + )

00(k) ; (v + )

0(k) ; (v + ) (k)

+ [T (v + )] (k)g i ()

W 5

2

and the

maximum of determinate function @@K ()

W 5

2

about the variable in [0; 1].

Proof. Since jv (x) vn (x)j =L1 (Lv (x) Lvn (x)) and for every given x 2 [0; 1], there is always x0 2 T

satisfying x0 < x and xx0 = 1n . On the other hand, Lemma .2 and x0 2 T implying that Lv (x0) = Lvn (x0). So,

we obtain

jLv (x) Lvn (x)j = j(Lv (x) Lv (x0)) (Lvn (x) Lvn (x0))j : (12)

By applying the reproducing kernel properties v (x) = hv () ; Rx ()iW 52and Lv (x) = hv () ; LKx ()iW 5

2to Eq.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

866 Omar Abu Arqub 857-874

Page 115: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

11

(12), we conclude

Lv (x) Lvn (x) = (Lv (x) Lv (x0)) (Lvn (x) Lvn (x0))= hv () ; LKx () LKx0 ()iW 5

2 hvn () ; LKx () LRx0 ()iW 5

2

= hv () vn () ; LKx () LKx0 ()iW 52:

But on the other aspect as well, we have

jv (x) vn (x)j =L1 (Lv (x) Lvn (x))

v () vn () ; L1LKx () L1LKx0 ()

W 5

2

=

hv () vn () ;Kx ()Kx0 ()iW 52

jjv () vn ()jjW 5

2jjKx ()Kx0 ()jjW 5

2:

Here, we take the norm of jjKx ()Kx0 ()jjW 52for the variable and the function Kx () is derived on x in [0; 1].

So, we have Kx ()Kx0 () =@@K () (x x0). Hence, we can write

jv (x) vn (x)j jjv () vn ()jjW 52

@@K () (x x0)W 5

2

= k1P

i=n+1

iPk=1

ikfFxk; (v + )

000(k) ; (v + )

00(k) ; (v + )

0(k) ; (v + ) (k)

+ [T (v + )] (k)g i () kW 5

2k @@K () kW 5

2(x x0)

= Mn :

So, the proof of the theorem is complete.

8 Software libraries and numerical outcomes

Software packages have great capabilities for solving mathematical, physical, and engineering problems. Sometimes,

it is very dicult to solve these problems analytically, so it is required to obtain an ecient approximate solution.

Thus, some software mathematical packages such as MATHEMATICA or MAPLE can be helpful in visualizing

the behavior of the solutions of such problems. Indeed, throughout the whole paper we used MATHEMATICA 7:0

software package for numerical experiment.

The object of the next algorithm is to implement a procedure to solve Eqs. (1) and (2) in numeric form in

terms of their grid nodes based on the use of RKHS method.

Algorithm 2 To approximate the solution of Eqs. (1) and (2), we do the following steps:

Input: The endpoints of [0; 1]; the integers n and N ; the kernel functions Kx (y) and Rx (y); the dierential

operator L; the function F ; the operator [Tu].

Output: Approximate solution un(x) or uNn (x) of Eqs. (1) and (2).

Step 1: Fixed x in [0; 1] and set y 2 [0; 1];

If y x then set Kx (y) =9Pi=0

pi(x)yi;

else set Kx (y) =9Pi=0

qi(x)yi;

For i = 1; 2; :::; n do the following:

Set xi =i1n1 ;

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

867 Omar Abu Arqub 857-874

Page 116: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

12

Set i(x) = Ly [Kx (y)]y=xi ;

Output: the orthogonal function system i(x).

Step 2: For i = 2; 3:::; n and j = 1; 2:::; i do the following:

Set di =

sk ik

2 i1Pk=1

c2ik;

If j 6= i then set ij = 1di

i1Pk=j

cikkj ;

else set ij =1di;

else set 11 =1

k 1k;

Output: the orthogonalization coecients ij .

Step 3: For i = 2; 3:::; n and k = 1; 2:::; i 1 do the following:

Set i (x) =iP

k=1

ik k (x);

Set cik = i; k

W 5

2;

Output: the orthonormal function system i (x).

Step 4: Set v0 (x1) = v (x1) = 0;

For i = 1; 2; :::n do the following:

If F and [Tu] are linear then set Bi =iP

k=1

ikfF (xk; (vk1 + )000(xk) ; (vk1 + )

00(xk) ;

(vk1 + )0(xk) ; (vk1 + ) (xk)) + [T (vk1 + )] (xk)g;

set vi (x) =iPi=1

Bi i (x);

else for i = 1; 2; :::N do the following:

set xi =i1N1 ;

set Bi =iP

k=1

ikf(Fxk; (vn1 + )000(xk) ; (vn1 + )

00(xk) ;

(vn1 + )0(xk) ; (vn1 + ) (xk))

+ [T (vn1 + )] (xk)g i (x);

set vin (x) =iPi=1

Bi i (x);

Output: the approximate solution vn(x) or vNn (x) of Eqs. (3) and (4).

Step 5: Use the transformation un (x) = vn(x) + (x) or uNn (x) = vNn (x) + (x);

Output: the approximate solution un(x) or uNn (x) of Eqs. (1) and (2).

Step 6: Stop.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

868 Omar Abu Arqub 857-874

Page 117: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

13

Next, we propose few numerical simulations for solving some specic examples of Eqs. (1) and (2). However,

we apply the techniques described in the previous sections to some linear and nonlinear test examples in order to

demonstrate the eciency, accuracy, and applicability of the proposed method. Results obtained by the method are

compared with the analytical solution of each example by computing the exact and relative errors and are found

to be in good agreement with each other.

Problem .1 Consider the following linear equation:

u(4)(x) = u00(x) + 4u(x) + f (x) + [Tu] (x) ;

in which the mixed operator is given as

[Tu] (x) = 1R0

x2tu0(t)dt+xR0

(x+ 1)tu(t)dt;

and subject to the boundary conditions

u (0) = 0; u (1) = 0;

u00(0) = 0; u00(1) = 0;

where 0 t < x 1 and f (x) is chosen such that the exact solution is u (x) = sin(x).

Using Algorithms 1 and 2, taking xi =i1n1 , i = 1; 2; :::; n. The numerical results of approximate solution un (x)

of u (x) are calculated at some selected grid points for n = 36 and are tabulated in Table 1.

Table 1. Numerical results for Problem 1: solutions and corresponding errors.

x Exact solution Approximate solution Absolute error Relative error

0:16 0:4817536741017153 0:4817521115692216 1:56253 106 3:24343 1060:32 0:8443279255020151 0:8443251824015761 2:74310 106 3:24886 1060:48 0:9980267284282716 0:9980234824190575 3:24601 106 3:25243 1060:64 0:9048270524660195 0:9048241075118995 2:94495 106 3:25471 1060:80 0:5877852522924732 0:5877833384377027 1:91385 106 3:25604 1060:96 0:1253332335643045 0:1253328254068720 4:08157 107 3:25658 106

Problem .2 Consider the following nonlinear equation:

u(4)(x) = x(u00(x))2 cos(x)u0(x) u(x) + 2 ln((u(x))3) + f (x) + [Tu] (x) ;

in which the mixed operator is given as

[Tu] (x) =1R0

xtu(x)u0(t) ln(u(t))dt 9xR0

(x t)u00(t)(u(t))3dt;

and subject to the boundary conditions

u (0) = 1; u (1) = e;

u00(0) = 1; u00(1) = e;

where 0 t < x 1 and f (x) is chosen such that the exact solution is u (x) = ex.

Using Algorithms 1 and 2, taking xi =i1N1 , i = 1; 2; :::; N . The numerical results of approximate solution

uNn (x) of u (x) are calculated at some selected grid points for N = 36, n = 2 and are tabulated in Table 2.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

869 Omar Abu Arqub 857-874

Page 118: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

14

Table 2. Numerical results for Problem 2: solutions and corresponding errors.

x Exact solution Approximate solution Absolute error Relative error

0:16 1:1735108709918103 1:1735115633003046 6:92308 107 5:89946 1070:32 1:3771277643359572 1:3771289810084700 1:21667 106 8:83486 1070:48 1:6160744021928934 1:6160758551178427 1:45292 106 8:99046 1070:64 1:8964808793049515 1:8964822199979947 1:34069 106 7:06937 1070:80 2:2255409284924680 2:2255418182404440 8:89748 107 3:99790 1070:96 2:6116964734231180 2:6116966661583056 1:92735 107 7:37969 108

Problem .3 Consider the following nonlinear equation:

u(4)(x) = xu000(x) u0(x)eu(x) (u(x))2 + f (x) + [Tu] (x) ;

in which the mixed operator is given as

[Tu] (x) =1R0

ex(t 1) sinh(u(x))dt+xR0

cosh(x)t3eu(t)dt;

and subject to the boundary conditions

u (0) = 0; u (1) = ln(2);

u00(0) = 1; u00(1) = 14 ;

where 0 t < x 1 and f (x) is chosen such that the exact solution is u (x) = ln(x+ 1).

Using Algorithms 1 and 2, taking xi =i1N1 , i = 1; 2; :::; N . The numerical results of approximate solution

uNn (x) of u (x) are calculated at some selected grid points for N = 36, n = 2 and are tabulated in Table 3.

Table 3. Numerical results for Problem 3: solutions and corresponding errors.

x Exact solution Approximate solution Absolute error Relative error

0:16 0:1484200051182732 0:1484150657910304 4:93933 106 3:32794 1050:32 0:2776317365982796 0:2776238623910086 7:87421 106 2:83621 1050:48 0:3920420877760237 0:3920336245177083 8:46326 106 2:15876 1050:64 0:4946962418361071 0:4946891488543930 7:09298 106 1:43381 1050:80 0:5877866649021191 0:5877822986892660 4:36621 106 7:42823 1060:96 0:6729444732424258 0:6729435645496804 9:08693 107 1:35032 106

Problem .4 Consider the following nonlinear equation:

u(4)(x) = u000(x) + 3u00(x) sin(u0(x)) 13(u(x))3 + f (x) + [Tu] (x) ;

in which the mixed operator is given as

[Tu] (x) = 14

1R0

ln(u(t))u0(t)dt+1

2

xR0

ln(x)u00(t)(u(t))2dt;

and subject to the boundary conditions

u (0) = 1; u (1) = cosh(1);

u00(0) = 1; u00(1) = cosh(1);

where 0 t < x 1 and f (x) is chosen such that the exact solution is u (x) = cosh(x).

Using Algorithms 1 and 2, taking xi =i1N1 , i = 1; 2; :::; N . The numerical results of approximate solution

uNn (x) of u (x) are calculated at some selected grid points for N = 36, n = 2 and are tabulated in Table 4.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

870 Omar Abu Arqub 857-874

Page 119: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

15

Table 4. Numerical results for Problem 4: solutions and corresponding errors.

x Exact solution Approximate solution Absolute error Relative error

0:16 1:0128273299790107 1:0128278915466450 5:61568 107 5:54455 1070:32 1:0516384007048240 1:0516393762289420 9:75524 107 9:27623 1070:48 1:1174288969995172 1:1174300474164940 1:15042 106 1:02952 1060:64 1:2118866516740000 1:2118877015831520 1:04991 106 8:66343 1070:80 1:3374349463048447 1:3374356375116260 6:91207 107 5:16815 1070:96 1:4972946796991150 1:4972948288491459 1:49150 107 9:96130 108

The in uence of the number of nodes, N , on the absolute error functionu (x) uNn (x) of RKHS method is

explored next. Figure 1 gives the relevant data for Problem 2, where the number of nodes covers the range from 9

to 72 in multiple of 2 in which n = 2. It is observed that the increase in the number of node results in a reduction

in the absolute error and correspondingly an improvement in the accuracy of the obtained solution. This goes in

agreement with the known fact, the error is monotone decreasing, where more accurate solutions are achieved using

an increase in the number of nodes. On the other hand, the cost to be paid while going in this direction is the rapid

increase in the number of iterations required for convergence. For instance, while increasing the number of nodes

from 9 to 18 to 36 to 72, the maximum absolute error jumps from almost 2:5 105 to 6 106 to 1:4 106 to3:5 107, i.e. 0:24 to 0:233 to 0:25 multiplication factor.

Figure 1: The in uence of the number of nodes on the absolute error function of Problem 2 for: (a)u (x) u92 (x);

(b)u (x) u182 (x); (c) u (x) u362 (x); (d) u (x) u722 (x).It is to be noted that the accuracy of certain node is inversely proportional to its distance (number of nodes)

from the boundaries. From the last mentioned sub gures, we see that we can achieve a very good approximation

with the exact solution in uniform multiplication factors.

Next, according to fact that it is possible to pick any point in [0; 1] and as well the approximate solutions and

all their derivatives up to order four will be applicable; some numerical values of u(m) (x), m = 0; 1; 2; 3; 4, where

xi =i1N1 , i = 1; 2; :::; N in which N = 36, n = 2 at some selected grid nodes in [0; 1] for Problem 4 are tabulated

in Table 5.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

871 Omar Abu Arqub 857-874

Page 120: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

16

Table 5. Approximate numerical values of u(m) (x), m = 0; 1; 2; 3; 4 for Problem 4: selected nodes in [0; 1].

m x = 0:16 x = 0:48 x = 0:64 x = 0:96

0 1:0128273299790107 1:1174288969995172 1:2118866516740000 1:4972946796991150

1 0:1606834378652106 0:4986425689588153 0:6845916538580700 1:1144011777719312

2 1:0128256744654371 1:1174207910724487 1:2118775439320457 1:4972933355230342

3 0:1606750325962580 0:4985853351414680 0:6845395334998298 1:1143922879515298

4 1:0127516387810787 1:1171994146708600 1:2115152792084836 1:4972589410677763

9 Concluding remarks

In this paper, we introduce an algorithm for solving fourth-order BVPs of mixed type IDEs by using RKHS

method. The approximate solution obtained by the present method is uniformly convergent while the series solution

methodology can be applied to much more complicated nonlinear problems. In the proposed algorithm, the solution

u (x) and the approximate solution un (x) are represented in the form of rabidly convergent series in the space

W 52 [0; 1]. Moreover, the approximate solution and all its derivatives up to order four converge uniformly to the

exact solution and all its derivatives, respectively. Additionally, we note that not only a computational method is

presented but also we proved that the error of the approximate solution is monotone decreasing in the sense of the

norm of W 52 [0; 1]. The method is shown to be of good convergence, simple in principle, and easy to program.

References

[1] P.K. Kythe, P. Puri, Computational Methods for Linear Integral Equations, University of New Orlans, New

Orlans, 2002.

[2] A.J. Jerri, Introduction to Integral Equations with Applications, John Wiley and Sons, New York, 1999.

[3] R.P. Kanwal, Linear Integral Dierential Equations: Theory and Technique, Birkhauser Boston, Georgia, 1996.

[4] A.M. Wazwaz, A comparison study between the modied decomposition method and the traditional methods

for solving nonlinear integral equations, Applied Mathematics and Computation, 181 (2006) 1703-1712.

[5] F. Bloom, Asymptotic bounds for solutions to a system of damped integro-dierential equations of electromag-

netic theory, Journal of Mathematical Analysis and Applications 73 (1980) 524-542.

[6] K. Holmaker, Global asymptotic stability for a stationary solution of a system of integro-dierential equations

describing the formation of liver zones, SIAM Journal on Mathematical Analysis 24 (1993) 116-128.

[7] L.K. Forbes, S. Crozier, D.M. Doddrell, Calculating current densities and elds produced by shielded magnetic

resonance imaging probes, SIAM Journal on Applied Mathematics 57 (1997) 401-425.

[8] R.B. Agarwal, Boundary Value Problems for High Ordinary Dierential Equations, World Scientic, Singapore,

1986.

[9] A.M. Wazwaz, A reliable algorithm for solving boundary value problems for higher-order integro-dierential

equation, Applied Mathematics and Computation 118 (2001) 327-342.

[10] I. Hashim, Adomian decomposition method for solving BVPs for fourth-order integro-dierential equations,

Journal of Computational and Applied Mathematics 193 (2006) 658-664.

[11] N.H. Sweilam, Fourth order integro-dierential equations using variational iteration method, Computers and

Mathematics with Applications 54 (2007) 1086-1091.

[12] M. Al-Smadi, O. Abu Arqub, N. Shawagfeh, Approximate solution of BVPs for 4th-order IDEs by using RKHS

method, Applied Mathematical Sciences 6 (2012) 2453-2464.

[13] F. Geng, Solving singular second order three-point boundary value problems using reproducing kernel Hilbert

space method, Applied Mathematics and Computation 215 (2009) 2095-2102.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

872 Omar Abu Arqub 857-874

Page 121: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

17

[14] A. Berlinet, C.T. Agnan, Reproducing Kernel Hilbert Space in Probability and Statistics, Kluwer Academic

Publishers, 2004.

[15] M. Cui, Y. Lin, Nonlinear Numercial Analysis in the Reproducing Kernel Space, Nova Science Publisher, New

York, 2008.

[16] A. Daniel, Reproducing Kernel Spaces and Applications, Springer, 2003.

[17] L.H. Yang, Y. Lin, Reproducing kernel methods for solving linear initial-boundary-value problems, Electronic

Journal of Dierential Equations (2008) 1-11.

[18] C. Li, M. Cui, The exact solution for solving a class nonlinear operator equations in the reproducing kernel

space, Applied Mathematics and Computation 143 (2003) 393-399.

[19] O. Abu Arqub, M. Al-Smadi, S. Momani, Application of reproducing kernel method for solving nonlinear

Fredholm-Volterra integro-dierential equations, Abstract and Applied Analysis, vol. 2012, Article ID 839836,

16 pages, 2012. doi:10.1155/2012/839836.

[20] O. Abu Arqub, M. Al-Smadi, N. Shawagfeh, Solving Fredholm integro-dierential equations using reproducing

kernel Hilbert space method, Applied Mathematics and Computation 219 (2013) 8938-8948.

[21] M. Al-Smadi, O. Abu Arqub, S. Momani, A computational method for two-point boundary value problems

of fourth-order mixed integro-dierential equations, Mathematical Problems in Engineering, Mathematical

Problems in Engineering, vol 2013, Article ID 832074, 10 pages, 2012, doi.org/10.1155/2013/832074.

[22] N. Shawagfeh, O. Abu Arqub, S. Momani, Analytical solution of nonlinear second-order periodic boundary

value problem using reproducing kernel method, Journal of Computational Analysis and Applications 16 (2014)

750-762.

[23] W. Wang, M. Cui, B. Han, A new method for solving a class of singular two-point boundary value problems,

Applied Mathematics and Computation 206 (2008) 721-727.

[24] Y. Lin, M. Cui, L. Yang, Representation of the exact solution for a kind of nonlinear partial dierential

equations, Applied Mathematics Letters 19 (2006) 808-813.

[25] M. Cui, H. Du, Representation of exact solution for the nonlinear Volterra-Fredholm integral equations, Applied

Mathematics and Computation 182 (2006) 1795-1802.

[26] F. Geng, M. Cui, B. Zhang, Method for solving nonlinear initial value problems by combining homotopy

perturbation and reproducing kernel Hilbert space methods, Nonlinear Analysis: Real World Applications 11

(2010) 637-644.

[27] F. Geng, A new reproducing kernel Hilbert space method for solving nonlinear fourth-order boundary value

problems, Applied Mathematics and Computation 213 (2009) 163-169.

[28] J. Dua, M. Cui, Constructive proof of existence for a class of fourth-order nonlinear BVPs, Computers and

Mathematics with Applications 59 (2010) 903-911.

[29] F. Geng, M. Cui, Solving a nonlinear system of second order boundary value problems, Journal of Mathematical

Analysis and Applications 327 (2007) 1167-1181.

[30] Y. Lin, M. Cui, L. Yang, Representation of the exact solution for a kind of nonlinear partial dierential

equations, Applied Mathematics Letters 19 (2006) 808-813.

[31] M. Cui, H. Du, Representation of exact solution for the nonlinear Volterra-Fredholm integral equations, Applied

Mathematics and Computation 182 (2006) 1795-1802.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

873 Omar Abu Arqub 857-874

Page 122: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

18

[32] A. El-Ajou, O. Abu Arqub, S. Momani, Homotopy analysis method for second-order boundary value problems

of integro-dierential equations, Discrete Dynamics in Nature and Society, vol. 2012, Article ID 365792, 18

pages, 2012. doi:10.1155/2012/365792.

[33] O. Abu Arqub, Z. Abo-Hammour, S. Momani, Application of continuous genetic algorithm for nonlinear system

of second-order boundary value problems, Applied Mathematics and Information Sciences 8 (2014) 1-14.

[34] O. Abu Arqub, Z. Abo-Hammour, S. Momani, N. Shawagfeh, Solving singular two-point boundary value

problems using continuous genetic algorithm, Abstract and Applied Analysis, vol. 2012, Article ID 205391, 25

page, 2012, doi.10.1155/2012/205391.

[35] O. Abu Arqub, A. El-Ajou, S. Momani, N. Shawagfeh, Analytical solutions of fuzzy initial value problems by

HAM, Applied Mathematics and Information Sciences 7 (2013) 1903-1919.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

874 Omar Abu Arqub 857-874

Page 123: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

AN AQCQ-FUNCTIONAL EQUATION IN NORMED 2-BANACHSPACES

CHOONKIL PARK, SUN YOUNG JANG, REZA SAADATI, AND DONG YUN SHIN∗

Abstract. In this paper, we prove the Hyers-Ulam stability of an additive-quadratic-cubic-quartic functional equation in normed 2-Banach spaces.

1. Introduction and preliminaries

In the 1960’s, Gahler [18, 19] introduced the concept of linear 2-normed spaces.

Definition 1.1. Let X be a real linear space with dimX > 1 and let ‖·, ·‖ : X ×X →R≥0 be a function satisfying the following properties:(a) ‖x, y‖ = 0 if and only if x and y are linearly dependent,(b) ‖x, y‖ = ‖y, x‖,(c) ‖αx, y‖ = |α| ‖x, y‖,(d) ‖x, y + z‖ ≤ ‖x, y‖+ ‖x, z‖for all x, y, z ∈ X and α ∈ R. Then the function ‖·, ·‖ is called a 2-norm on X and thepair (X, ‖·, ·‖) is called a linear 2-normed space. Sometimes the condition (d) called thetriangle inequality.

We introduce a basic property of linear 2-normed spaces.

Lemma 1.2. ([35]) Let (X, ‖·, ·‖) be a linear 2-normed space. If x ∈ X and ‖x, y‖ = 0for all y ∈ X, then x = 0.

In the 1960’s, Gahler and White [20, 47, 48] introduced the concept of 2-Banach spaces.In order to define completeness, the concepts of Cauchy sequences and convergence arerequired.

Definition 1.3. A sequence xn in a linear 2-normed spaceX is called a Cauchy sequenceif

limm,n→∞

‖xn − xm, y‖ = 0

for all y ∈ X.

Definition 1.4. A sequence xn in a linear 2-normed space X is called a convergentsequence if there is an x ∈ X such that

limn→∞

‖xn − x, y‖ = 0

for all y ∈ X. If xn converges to x, write xn → x as n → ∞ and call x the limit ofxn. In this case, we also write limn→∞ xn = x.

Triangle inequality implies the following lemma.

2010 Mathematics Subject Classification. Primary 39B82, 39B52, 46B99.Key words and phrases. Hyers-Ulam stability; normed 2-Banach space; additive-quadratic-cubic-

quartic functional equation.∗Corresponding author.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

875 CHOONKIL PARK ET AL 875-884

Page 124: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

C. PARK, S.Y. JANG, R. SAADATI, AND D.Y. SHIN

Lemma 1.5. ([35]) For a convergent sequence xn in a linear 2-normed space X,

limn→∞

‖xn, y‖ =∥∥∥∥ limn→∞

xn, y

∥∥∥∥for all y ∈ X.

Definition 1.6. A linear 2-normed space in which every Cauchy sequence is a convergentsequence is called a 2-Banach space.

Definition 1.7. A 2-Banach space X is called a normed 2-Banach space if X is a normedspace with norm ‖ · ‖.

The stability problem of functional equations originated from a question of Ulam [46]concerning the stability of group homomorphisms.

The functional equationf(x+ y) = f(x) + f(y)

is called the Cauchy additive functional equation. In particular, every solution of theCauchy additive functional equation is said to be an additive mapping. Hyers [21] gavea first affirmative partial answer to the question of Ulam for Banach spaces. Hyers’Theorem was generalized by Aoki [4] for additive mappings and by Th.M. Rassias [37]for linear mappings by considering an unbounded Cauchy difference. A generalization ofthe Th.M. Rassias theorem was obtained by Gavruta [17] by replacing the unboundedCauchy difference by a general control function in the spirit of Th.M. Rassias’ approach.

In 1990, Th.M. Rassias [38] during the 27th International Symposium on FunctionalEquations asked the question whether such a theorem can also be proved for p ≥ 1. In1991, Gajda [16] following the same approach as in Th.M. Rassias [37], gave an affirmativesolution to this question for p > 1. It was shown by Gajda [16], as well as by Th.M. Rassiasand Semrl [39] that one cannot prove a Th.M. Rassias’ type theorem when p = 1 (cf. thebooks of Czerwik [8], and Hyers, Isac and Th.M. Rassias [22]).

In 1982, J.M. Rassias [36] followed the innovative approach of the Th.M. Rassias’theorem [37] in which he replaced the factor ‖x‖p + ‖y‖p by ‖x‖p · ‖y‖q for p, q ∈ R withp+ q 6= 1.

The functional equation

f(x+ y) + f(x− y) = 2f(x) + 2f(y)

is called a quadratic functional equation. In particular, every solution of the quadraticfunctional equation is said to be a quadratic mapping. A Hyers-Ulam stability problem forthe quadratic functional equation was proved by Skof [45] for mappings f : X → Y , whereX is a normed space and Y is a Banach space. Cholewa [6] noticed that the theorem ofSkof is still true if the relevant domain X is replaced by an Abelian group. Czerwik [7]proved the Hyers-Ulam stability of the quadratic functional equation.

In [24], Jun and Kim considered the following cubic functional equation

f(2x+ y) + f(2x− y) = 2f(x+ y) + 2f(x− y) + 12f(x). (1.1)

It is easy to show that the function f(x) = x3 satisfies the functional equation (1.1), whichis called a cubic functional equation and every solution of the cubic functional equationis said to be a cubic mapping.

In [27], Lee et al. considered the following quartic functional equation

f(2x+ y) + f(2x− y) = 4f(x+ y) + 4f(x− y) + 24f(x)− 6f(y). (1.2)

It is easy to show that the function f(x) = x4 satisfies the functional equation (1.2),which is called a quartic functional equation and every solution of the quartic functional

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

876 CHOONKIL PARK ET AL 875-884

Page 125: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

AQCQ-FUNCTIONAL EQUATION IN NORMED 2-BANACH SPACES

equation is said to be a quartic mapping. The stability problems of several functionalequations have been extensively investigated by a number of authors and there are manyinteresting results concerning this problem (see [1, 2, 3, 5, 9, 11, 12, 14, 15, 23, 25, 26, 28,29, 30, 31, 32, 33, 34, 40, 41, 42, 43, 44]).

In this paper, we prove the Hyers-Ulam stability of the following additive-quadratic-cubic-quartic functional equation

f(x+ 2y) + f(x− 2y) = 4f(x+ y) + 4f(x− y) (1.3)

− 6f(x) + f(2y) + f(−2y)− 4f(y)− 4f(−y)

in 2-normed spaces.One can easily show that an odd mapping f : X → Y satisfies (1.3) if and only if the

odd mapping f : X → Y is an additive-cubic mapping, i.e.,

f(x+ 2y) + f(x− 2y) = 4f(x+ y) + 4f(x− y)− 6f(x).

It was shown in [13, Lemma 2.2] that g(x) := f(2x) − 2f(x) and h(x) := f(2x) − 8f(x)are cubic and additive, respectively, and that f(x) = 1

6g(x)− 1

6h(x).

One can easily show that an even mapping f : X → Y satisfies (1.3) if and only if theeven mapping f : X → Y is a quadratic-quartic mapping, i.e.,

f(x+ 2y) + f(x− 2y) = 4f(x+ y) + 4f(x− y)− 6f(x) + 2f(2y)− 8f(y).

It was shown in [10, Lemma 2.1] that g(x) := f(2x)− 4f(x) and h(x) := f(2x)− 16f(x)are quartic and quadratic, respectively, and that f(x) = 1

12g(x)− 1

12h(x).

Throughout this paper, let X be a normed space and Y a normed 2-Banach space.

2. Hyers-Ulam stability of the AQCQ-functional equation (1.3) innormed 2-Banach spaces: odd mapping case

In this section, we prove the Hyers-Ulam stability of the AQCQ-functional equation(1.3) in normed 2-Banach spaces for an odd mapping case.

For a mapping f : X → Y , define Df : X2 → Y by

Df(x, y) := f(x+ 2y) + f(x− 2y)− 4f(x+ y)− 4f(x− y) + 6f(x)

−f(2y)− f(−2y) + 4f(y) + 4f(−y)

for all x, y ∈ X.

Theorem 2.1. Let θ ∈ [0,∞), p, q ∈ (0,∞) with p+ q > 1 and let f : X → Y be an oddmapping satisfying

‖Df(x, y), w‖ ≤ θ‖x‖p‖y‖q‖w‖ (2.1)

for all x, y ∈ X and all w ∈ Y . Then there is a unique additive mapping A : X → Y suchthat

‖f(2x)− 8f(x)− A(x), w‖ ≤ 4 + 2p

2p+q − 2θ‖x‖p+q‖w‖ (2.2)

for all x ∈ X and all w ∈ Y .

Proof. Letting x = y in (2.1), we get

‖f(3y)− 4f(2y) + 5f(y), w‖ ≤ θ‖y‖p+q‖w‖ (2.3)

for all y ∈ X and all w ∈ Y .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

877 CHOONKIL PARK ET AL 875-884

Page 126: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

C. PARK, S.Y. JANG, R. SAADATI, AND D.Y. SHIN

Replacing x by 2y in (2.1), we get

‖f(4y)− 4f(3y) + 6f(2y)− 4f(y), w‖ ≤ 2pθ‖y‖p+q‖w‖ (2.4)

for all y ∈ X and all w ∈ Y .By (2.3) and (2.4),

‖f(4y)− 10f(2y) + 16f(y), w‖ (2.5)

≤ ‖4(f(3y)− 4f(2y) + 5f(y)), w‖+ ‖f(4y)− 4f(3y) + 6f(2y)− 4f(y), w‖= 4‖f(3y)− 4f(2y) + 5f(y), w‖+ ‖f(4y)− 4f(3y) + 6f(2y)− 4f(y), w‖≤ (4 + 2p)θ‖y‖p+q‖w‖

for all y ∈ X and all w ∈ Y . Replacing y by x2

and letting g(x) := f(2x)− 8f(x) in (2.5),we get ∥∥∥∥g(x)− 2g

(x

2

), w

∥∥∥∥ ≤ 4 + 2p

2p+qθ‖x‖p+q‖w‖

for all x ∈ X and all w ∈ Y . Hence∥∥∥∥2lg(x

2l

)− 2mg

(x

2m

), w∥∥∥∥ ≤ 2

m−1∑j=l

4 + 2p

2p+q

2j

2(p+q)jθ‖x‖p+q‖w‖ (2.6)

for all nonnegative integers m and l with m > l, all x ∈ X and all w ∈ Y . It follows from(2.6) that the sequence 2kg( a

2k) is Cauchy for each x ∈ X. Since Y is 2-Banach space,

the sequence 2kg( a2k

) converges. So one can define the mapping A : X → Y by

A(x) := limj→∞

2jg(x

2j

)for all x ∈ X. That is,

limj→∞

∥∥∥∥∥2jg(x

2j

)− A(x), w

∥∥∥∥∥ = 0

for all x ∈ X and all w ∈ Y .Moreover, letting 0 = 0 and passing the limit m→∞ in (2.6), we get (2.2).By (2.1),

‖DA(x, y), w‖ = limk→∞

∥∥∥∥2kDg(x

2k,y

2k

), w∥∥∥∥ ≤ lim

k→∞

(2p + 8)2k

2(p+q)kθ‖x‖p‖y‖q‖w‖ = 0

and so ‖DA(x, y), w‖ = 0 for all x, y ∈ X and all w ∈ Y . Hence DA(x, y) = 0 for allx, y ∈ X. Since g : X → Y is odd, A : X → Y is odd. So the mapping A : X → Y isadditive.

Now, let T : X → Y be another additive mapping satisfying (2.2). Then we have

‖A(x)− T (x), w‖ =∥∥∥∥2lA

(x

2l

)− 2lT

(x

2l

), w

∥∥∥∥≤

∥∥∥∥2l(A(x

2l

)− g

(x

2l

)), w

∥∥∥∥+∥∥∥∥2l

(T(x

2l

)− g

(x

2l

)), w

∥∥∥∥≤ 2

4 + 2p

2p+q − 2

2l

2(p+q)lθ‖x‖p+q‖w‖,

which tends to zero as l → ∞ for all x ∈ X and all w ∈ Y . So we can conclude thatA(a) = T (a) for all a ∈ X. This proves the uniqueness of A.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

878 CHOONKIL PARK ET AL 875-884

Page 127: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

AQCQ-FUNCTIONAL EQUATION IN NORMED 2-BANACH SPACES

Therefore, A : X → Y is a unique additive mapping satisfying (2.2), as desired.

Theorem 2.2. Let θ ∈ [0,∞), p, q ∈ (0,∞) with p+ q < 1 and let f : X → Y be an oddmapping satisfying (2.1). Then there is a unique additive mapping A : X → Y such that

‖f(2x)− 8f(x)− A(x), w‖ ≤ 4 + 2p

2− 2p+qθ‖x‖p+q‖w‖

for all x ∈ X and all w ∈ Y .

Proof. Replacing y by x and letting g(x) := f(2x)− 8f(x) in (2.5), we get∥∥∥∥g(x)− 1

2g (2x) , w

∥∥∥∥ ≤ 4 + 2p

2θ‖x‖p+q‖w‖

for all x ∈ X and all w ∈ Y .The rest of the proof is similar to the proof of Theorem 2.1.

Theorem 2.3. Let θ ∈ [0,∞), p, q ∈ (0,∞) with p+ q > 3 and let f : X → Y be an oddmapping satisfying (2.1). Then there is a unique cubic mapping C : X → Y such that

‖f(2x)− 2f(x)− C(x), w‖ ≤ 4 + 2p

2p+q − 8θ‖x‖p+q‖w‖

for all x ∈ X and all w ∈ Y .

Proof. Replacing y by x2

and letting g(x) := f(2x)− 2f(x) in (2.5), we get∥∥∥∥g(x)− 8g(x

2

), w∥∥∥∥ ≤ 4 + 2p

2p+qθ‖x‖p+q‖w‖

for all x ∈ X and all w ∈ Y .The rest of the proof is similar to the proof of Theorem 2.1.

Theorem 2.4. Let θ ∈ [0,∞), p, q ∈ (0,∞) with p+ q < 3 and let f : X → Y be an oddmapping satisfying (2.1). Then there is a unique cubic mapping C : X → Y such that

‖f(2x)− 2f(x)− C(x), w‖ ≤ 4 + 2p

8− 2p+qθ‖x‖p+q‖w‖

for all x ∈ X and all w ∈ Y .

Proof. Replacing y by x and letting g(x) := f(2x)− 2f(x) in (2.5), we get∥∥∥∥g(x)− 1

8g (2x) , w

∥∥∥∥ ≤ 4 + 2p

8θ‖x‖p+q‖w‖

for all x ∈ X and all w ∈ Y .The rest of the proof is similar to the proof of Theorem 2.1.

Now we prove the superstability of the AQCQ-functional equation (1.3) in normed2-Banach spaces for an odd mapping case.

Theorem 2.5. Let θ ∈ [0,∞), p, q, r ∈ (0,∞) with r 6= 1 and let f : X → Y be an oddmapping such that

‖Df(x, y), w‖ ≤ θ‖x‖p‖y‖q‖w‖r (2.7)

for all x, y ∈ X and all w ∈ Y . Then f : X → Y is realized as the sum of an additivemapping and a cubic mapping.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

879 CHOONKIL PARK ET AL 875-884

Page 128: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

C. PARK, S.Y. JANG, R. SAADATI, AND D.Y. SHIN

Proof. Replacing w by sw in (2.7) for s ∈ R\ 0, we get

‖Df(x, y), sw‖ ≤ θ‖x‖p‖y‖q‖sw‖r

and so

‖Df(x, y), w‖ ≤ θ‖x‖p‖y‖q‖w‖r |s|r

|s|(2.8)

for all x, y ∈ X, all w ∈ Y and all s ∈ R\ 0.If r > 1, then the right side of (2.8) tends to ‖f(x+ y + z), w‖ as s→ 0.If r < 1, then the right side of (2.8) tends to ‖f(x+ y + z), w‖ as s→ +∞.Thus

‖Df(x, y), w‖ = 0

for all x, y ∈ X and all w ∈ Y . By [13, Lemma 2.2], f : X → Y is realized as the sum ofan additive mapping and a cubic mapping.

3. Hyers-Ulam stability of the AQCQ-functional equation (1.3) innormed 2-Banach spaces: even mapping case

In this section, we prove the Hyers-Ulam stability of the AQCQ-functional equation(1.3) in normed 2-Banach spaces for an even mapping case.

Theorem 3.1. Let θ ∈ [0,∞), p, q ∈ (0,∞) with p + q > 2 and let f : X → Y be aneven mapping satisfying f(0) = 0 and (2.1). Then there is a unique quadratic mappingQ : X → Y such that

‖f(2x)− 16f(x)−Q(x), w‖ ≤ 4 + 2p

2p+q − 4θ‖x‖p+q‖w‖

for all x ∈ X and all w ∈ Y .

Proof. Letting x = y in (2.1), we get

‖f(3y)− 6f(2y) + 15f(y), w‖ ≤ θ‖y‖p+q‖w‖ (3.1)

for all y ∈ X and all w ∈ Y .Replacing x by 2y in (2.1), we get

‖f(4y)− 4f(3y) + 4f(2y) + 4f(y), w‖ ≤ 2pθ‖y‖p+q‖w‖ (3.2)

for all y ∈ X and all w ∈ Y .By (3.1) and (3.2),

‖f(4y)− 20f(2y) + 64f(y), w‖ (3.3)

≤ ‖4(f(3y)− 6f(2y) + 15f(y)), w‖+ ‖f(4y)− 4f(3y) + 4f(2y) + 4f(y), w‖= 4‖f(3y)− 6f(2y) + 15f(y), w‖+ ‖f(4y)− 4f(3y) + 4f(2y) + 4f(y), w‖≤ (4 + 2p)θ‖y‖p+q‖w‖

for all y ∈ X and all w ∈ Y . Replacing y by x2

and letting g(x) := f(2x) − 16f(x) in(3.3), we get ∥∥∥∥g(x)− 4g

(x

2

), w∥∥∥∥ ≤ 4 + 2p

2p+qθ‖x‖p+q‖w‖

for all x ∈ X and all w ∈ Y .The rest of the proof is similar to the proof of Theorem 2.1.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

880 CHOONKIL PARK ET AL 875-884

Page 129: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

AQCQ-FUNCTIONAL EQUATION IN NORMED 2-BANACH SPACES

Theorem 3.2. Let θ ∈ [0,∞), p, q ∈ (0,∞) with p + q < 2 and let f : X → Y be aneven mapping satisfying f(0) = 0 and (2.1). Then there is a unique quadratic mappingQ : X → Y such that

‖f(2x)− 16f(x)−Q(x), w‖ ≤ 4 + 2p

4− 2p+qθ‖x‖p+q‖w‖

for all x ∈ X and all w ∈ Y .

Proof. Replacing y by x and letting g(x) := f(2x)− 16f(x) in (3.3), we get∥∥∥∥g(x)− 1

4g (2x) , w

∥∥∥∥ ≤ 4 + 2p

4θ‖x‖p+q‖w‖

for all x ∈ X and all w ∈ Y .The rest of the proof is similar to the proof of Theorem 2.1.

Theorem 3.3. Let θ ∈ [0,∞), p, q ∈ (0,∞) with p + q > 4 and let f : X → Y be aneven mapping satisfying f(0) = 0 and (2.1). Then there is a unique quartic mappingR : X → Y such that

‖f(2x)− 4f(x)−R(x), w‖ ≤ 4 + 2p

2p+q − 16θ‖x‖p+q‖w‖

for all x ∈ X and all w ∈ Y .

Proof. Replacing y by x2

and letting g(x) := f(2x)− 4f(x) in (3.3), we get∥∥∥∥g(x)− 16g(x

2

), w∥∥∥∥ ≤ 4 + 2p

2p+qθ‖x‖p+q‖w‖

for all x ∈ X and all w ∈ Y .The rest of the proof is similar to the proof of Theorem 2.1.

Theorem 3.4. Let θ ∈ [0,∞), p, q ∈ (0,∞) with p + q < 4 and let f : X → Y be aneven mapping satisfying f(0) = 0 and (2.1). Then there is a unique quartic mappingR : X → Y such that

‖f(2x)− 4f(x)−R(x), w‖ ≤ 4 + 2p

16− 2p+qθ‖x‖p+q‖w‖

for all x ∈ X and all w ∈ Y .

Proof. Replacing y by x and letting g(x) := f(2x)− 16f(x) in (3.3), we get∥∥∥∥g(x)− 1

16g (2x) , w

∥∥∥∥ ≤ 4 + 2p

16θ‖x‖p+q‖w‖

for all x ∈ X and all w ∈ Y .The rest of the proof is similar to the proof of Theorem 2.1.

Now we prove the superstability of the AQCQ-functional equation (1.3) in normed2-Banach spaces for an even mapping case.

Theorem 3.5. Let θ ∈ [0,∞), p, q, r ∈ (0,∞) with r 6= 1 and let f : X → Y be aneven mapping satisfying f(0) = 0 and (2.7). Then f : X → Y is realized as the sum of aquadratic mapping and a quartic mapping.

Proof. By the same reasoning as in the proof of Theorem 2.5, one can obtain

‖Df(x, y), w‖ = 0

for all x, y ∈ X and all w ∈ Y . By [10, Lemma 2.1], f : X → Y is realized as the sum ofa quadratic mapping and a quartic mapping.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

881 CHOONKIL PARK ET AL 875-884

Page 130: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

C. PARK, S.Y. JANG, R. SAADATI, AND D.Y. SHIN

Let fo(x) := f(x)−f(−x)2

and fe(x) := f(x)+f(−x)2

. Then fo is odd and fe is even. fo, fesatisfy the functional equation (1.3). Let go(x) := fo(2x)− 2fo(x) and ho(x) := fo(2x)−8fo(x). Then fo(x) = 1

6go(x) − 1

6ho(x). Let ge(x) := fe(2x) − 4fe(x) and he(x) :=

fe(2x)− 16fe(x). Then fe(x) = 112ge(x)− 1

12he(x). Thus

f(x) =1

6go(x)− 1

6ho(x) +

1

12ge(x)− 1

12he(x).

We summarize the above results as follows.

Theorem 3.6. Let θ ∈ [0,∞) and p, q ∈ (0,∞) with p + q > 4. Let f : X → Y be amapping satisfying f(0) = 0 and (2.1). Then there exist an additive mapping A : X → Y ,a quadratic mapping Q : X → Y , a cubic mapping C : X → Y and a quartic mappingR : X → Y such that∥∥∥∥f(x)− 1

6A(x)− 1

12Q(x)− 1

6C(x)− 1

12R(x), w

∥∥∥∥≤(

4 + 2p

6(2p+q − 2)+

4 + 2p

12(2p+q − 4)+

4 + 2p

6(2p+q − 8)+

4 + 2p

12(2p+q − 16)

)θ‖x‖p+q‖w‖

for all x ∈ X and all w ∈ Y .

Theorem 3.7. Let θ ∈ [0,∞) and p, q ∈ (0,∞) with p + q < 1. Let f : X → Y be amapping satisfying f(0) = 0 and (2.1). Then there exist an additive mapping A : X → Y ,a quadratic mapping Q : X → Y , a cubic mapping C : X → Y and a quartic mappingR : X → Y such that∥∥∥∥f(x)− 1

6A(x)− 1

12Q(x)− 1

6C(x)− 1

12R(x), w

∥∥∥∥≤(

4 + 2p

6(2− 2p+q)+

4 + 2p

12(4− 2p+q)+

4 + 2p

6(8− 2p+q)+

4 + 2p

12(16− 2p+q)

)θ‖x‖p+q‖w‖

for all x ∈ X and all w ∈ Y .

Theorem 3.8. Let θ ∈ [0,∞), p, q, r ∈ (0,∞) with r 6= 1 and let f : X → Y be amapping satisfying f(0) = 0 and (2.7). Then f : X → Y is realized as the sum of anadditive mapping, a quadratic mapping, a cubic mapping and a quartic mapping.

Acknowledgments

C. Park, S. Y. Jang, D. Y. Shin were supported by Basic Science Research Programthrough the National Research Foundation of Korea funded by the Ministry of Ed-ucation, Science and Technology (NRF-2012R1A1A2004299), (NRF-2013-007226), and(NRF-2010-0021792), respectively.

References

[1] J. Aczel and J. Dhombres, Functional Equations in Several Variables, Cambridge Univ. Press, Cam-bridge, 1989.

[2] M. Alimohammady and A. Sadeghi, Some new results on the superstability of the Cauchy equationon semigroups, Results Math. 63 (2013), 705–712.

[3] J. M. Almira, A note on classical and p-adic Frechet functional equations with restrictions, ResultsMath. 63 (2013), 649–656.

[4] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan 2(1950), 64–66.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

882 CHOONKIL PARK ET AL 875-884

Page 131: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

AQCQ-FUNCTIONAL EQUATION IN NORMED 2-BANACH SPACES

[5] I. Chang, M. Eshaghi Gordji, H. Khodaei and H. Kim, Nearly quartic mappings in β-homogeneousF -spaces, Results Math. 63 (2013), 529–541.

[6] P. W. Cholewa, Remarks on the stability of functional equations, Aequationes Math. 27 (1984),76–86.

[7] S. Czerwik, On the stability of the quadratic mapping in normed spaces, Abh. Math. Sem. Univ.Hamburg 62 (1992), 59–64.

[8] P. Czerwik, Functional Equations and Inequalities in Several Variables, World Scientific PublishingCompany, New Jersey, Hong Kong, Singapore and London, 2002.

[9] A. Ebadian and H. Ghobadipour, A fixed point approach to almost double derivations and Lie ∗-double drivations, Results Math. 63 (2013), 409–423.

[10] M. Eshaghi Gordji, S. Abbaszadeh and C. Park, On the stability of a generalized quadratic andquartic type functional equation in quasi-Banach spaces, J. Inequal. Appl. 2009, Article ID 153084,26 pages (2009).

[11] M. Eshaghi Gordji and A. Bodaghi, On the stability of quadratic double centralizers on Banachalgebras, J. Comput. Anal. Appl. 13 (2011), 724–729.

[12] M. Eshaghi Gordji, R. Farokhzad Rostami and S.A.R. Hosseinioun, Nearly higher derivations inunital C∗-algebras, J. Comput. Anal. Appl. 13 (2011), 734–742.

[13] M. Eshaghi Gordji, S. Kaboli-Gharetapeh, C. Park and S. Zolfaghari, Stability of an additive-cubic-quartic functional equation Adv. Difference Equat. 2009, Article ID 395693, 20 pages (2009).

[14] M. Eshaghi Gordji, G. Kim, J. Lee and C. Park, Generalized ternary bi-derivations on ternaryBanach algebras: a fixed point approach, J. Comput. Anal. Appl. 15 (2013), 45–54.

[15] M. Eshaghi Gordji and M. B. Savadkouhi, Stability of a mixed type cubic-quartic functional equationin non-Archimedean spaces, Appl. Math. Letters 23 (2010), 1198–1202.

[16] Z. Gajda, On stability of additive mappings, Internat. J. Math. Math. Sci. 14 (1991), 431–434.[17] P. Gavruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings,

J. Math. Anal. Appl. 184 (1994), 431–436.[18] S. Gahler, 2-metrische Raume und ihre topologische Struktur, Math. Nachr. 26 (1963), 115–148.[19] S. Gahler, Lineare 2-normierte Raumen, Math. Nachr. 28 (1964), 1–43.

[20] S. Gahler, Uber 2-Banach-Raume, Math. Nachr. 42 (1969), 335–347.[21] D. H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. U.S.A. 27

(1941), 222–224.[22] D. H. Hyers, G. Isac and Th. M. Rassias, Stability of Functional Equations in Several Variables,

Birkhauser, Basel, 1998.[23] G. Isac and Th. M. Rassias, On the Hyers-Ulam stability of ψ-additive mappings, J. Approx. Theory

72 (1993), 131–137.[24] K. Jun and H. Kim, The generalized Hyers-Ulam-Rassias stability of a cubic functional equation, J.

Math. Anal. Appl. 274 (2002), 867–878.[25] K. Jun and Y. Lee, A generalization of the Hyers-Ulam-Rassias stability of the Pexiderized quadratic

equations, J. Math. Anal. Appl. 297 (2004), 70–86.[26] S. Jung, Hyers-Ulam-Rassias Stability of Functional Equations in Mathematical Analysis, Hadronic

Press lnc., Palm Harbor, Florida, 2001.[27] S. Lee, S. Im and I. Hwang, Quartic functional equations, J. Math. Anal. Appl. 307 (2005), 387–394.[28] J. Lee, S. Lee and C. Park, Fixed points and stability of the Cauchy-Jensen functional equation in

fuzzy Banach algebras, J. Comput. Anal. Appl. 15 (2013), 692–698.[29] J. Lee, C. Park, Y. Cho and D. Shin, Orthogonal stability of a cubic-quartic functional equation in

non-Archimedean spaces, J. Comput. Anal. Appl. 15 (2013), 572–583.[30] L. Li, G. Lu, C. Park and D. Shin, Additive functional inequalities in generalized quasi-Banach

spaces, J. Comput. Anal. Appl. 15 (2013), 1165–1175.[31] G. Lu, Y. Jiang and C. Park, Additive functional equation in Frechet spaces, J. Comput. Anal. Appl.

15 (2013), 369–373.[32] C. Park, Homomorphisms between Poisson JC∗-algebras, Bull. Braz. Math. Soc. 36 (2005), 79–97.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

883 CHOONKIL PARK ET AL 875-884

Page 132: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

C. PARK, S.Y. JANG, R. SAADATI, AND D.Y. SHIN

[33] C. Park, K. Ghasemi, S. G. Ghaleh, S. Jang, Approximate n-Jordan ∗-homomorphisms in C∗-algebras, J. Comput. Anal. Appl. 15 (2013), 365–368.

[34] C. Park, A. Najati and S. Jang, Fixed points and fuzzy stability of an additive-quadratic functionalequation, J. Comput. Anal. Appl. 15 (2013), 452–462.

[35] W. Park, Approximate additive mappings in 2-Banach spaces and related topics, J. Math. Anal.Appl. 376 (2011), 193–202.

[36] J. M. Rassias, On approximation of approximately linear mappings by linear mappings, J. Funct.Anal. 46 (1982) 126–130.

[37] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc.72 (1978), 297–300.

[38] Th. M. Rassias, Problem 16; 2, Report of the 27th International Symp. on Functional Equations,Aequationes Math. 39 (1990), 292–293; 309.

[39] Th. M. Rassias and P. Semrl, On the behaviour of mappings which do not satisfy Hyers-Ulam stability,Proc. Amer. Math. Soc. 114 (1992), 989–993.

[40] L. Reich and J. Tomaschek, Some remarks to the formal and local theory of the generalized Dhom-bresw functional equation, Results Math. 63 (2013), 377–395.

[41] S. Shagholi, M. Eshaghi Gordji and M. Bavand Savadkouhi, Stability of ternary quadratic derivationson ternary Banach algebras, J. Comput. Anal. Appl. 13 (2011), 1097–1105.

[42] S. Shagholi, M. Eshaghi Gordji and M. Bavand Savadkouhi, Nearly ternary cubic homomorphismsin ternary Frechet algebras, J. Comput. Anal. Appl. 13 (2011), 1106–1114.

[43] D. Shin, C. Park and Sh. Farhadabadi, On the superstability of ternary Jordan C∗-homomorphisms,J. Comput. Anal. Appl. 16 (2014), 964–973.

[44] D. Shin, C. Park and Sh. Farhadabadi, Stability and superstability of J∗-homomorphisms and J∗-derivations for a generalized Cauchy-Jensen equation, J. Comput. Anal. Appl. 17 (2014), 125–134.

[45] F. Skof, Proprieta locali e approssimazione di operatori, Rend. Sem. Mat. Fis. Milano 53 (1983),113–129.

[46] S. M. Ulam, A Collection of the Mathematical Problems, Interscience Publ. New York, 1960.[47] A. White, 2-Banach spaces, Doctorial Diss., St. Louis Univ., 1968.[48] A. White, 2-Banach spaces, Math. Nachr. 42 (1969) 43–60.

Choonkil ParkDepartment of Mathematics, Research Institute for Natural Sciences, Hanyang Univer-sity, Seoul 133-791, Korea

E-mail address: [email protected]

Sun Young JangDepartment of Mathematics, University of Ulsan, Ulsan 680-749, Korea

E-mail address: [email protected]

Reza SaadatiDepartment of Mathematics, Iran University of Science and Technology, Tehran, Iran

E-mail address: [email protected]

Dong Yun ShinDepartment of Mathematics, University of Seoul, Seoul 130-743, Korea

E-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

884 CHOONKIL PARK ET AL 875-884

Page 133: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

REFINED GENERAL QUADRATIC EQUATION WITH FOURVARIABLES AND ITS STABILITY RESULTS

HARK-MAHN KIM AND SOON LEE

Abstract. In this article, we establish the general solution of a functional equation

rf(−x + y + z + w

s) + rf(

x− y + z + w

s) + rf(

x + y − z + w

s) + rf(

x + y + z − w

s)

= tf(x) + tf(y) + tf(z) + tf(w)

and present the generalized Hyers–Ulam stability of the equation.

1. Introduction

In 1940, S.M. Ulam [13] gave a wide ranging talk before the Mathematics Club of the

University of Wisconsin in which he discussed a number of unsolved problems. Among

these was the following question concerning the stability of homomorphisms: Let G1 be

a group and G2 a metric group with metric ϕ(·, ·). Given ε > 0, does there exist a

δ > 0 such that if f : G1 → G2 satisfies ϕ(f(xy), f(x)f(y)) < δ for all x, y ∈ G1, then a

homomorphism h : G1 → G2 exists with ϕ(f(x), h(x)) < ε for all x ∈ G1?

Let X and Y be Banach spaces with norms ‖ · ‖ and ‖ · ‖, respectively. D.H. Hyers [6]

showed that if ε > 0 and f : X → Y such that

‖f(x + y)− f(x)− f(y)‖ ≤ ε

for all x, y ∈ X, then there exists a unique additive mapping T : X → Y such that

‖f(x)− T (x)‖ ≤ ε

for all x ∈ X.

In 1950 T. Aoki [1] and in 1951 D.G. Bourgin [2] provided a generalized the Hyers the-

orem for additive mapping and in 1978 Th.M. Rassias [11] generalized the Hyers theorem

for liner mapping by allowing the Cauchy difference to be unbounded. Let f : X → Y

be a mapping such that f(tx) is continuous in t ∈ R for each fixed x ∈ X. Assume that

there exist constants ε ≥ 0 and p ∈ [0, 1) such that

‖f(x + y)− f(x)− f(y)‖ ≤ ε(‖x‖p + ‖y‖p)

2000 Mathematics Subject Classification: 39B82. 39B72Key words and phrases: Drygas functional equation, general quadratic equation, generalized Hyers–Ulamstability.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

885 HARK-MAHN KIM ET AL 885-898

Page 134: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

2 H. KIM AND S. LEE

for all x, y ∈ X. Then Th.M. Rassias proved that there exists a unique R-linear mapping

T : X → Y such that

‖f(x)− T (x)‖ ≤ 2ε

2− 2p‖x‖p

for all x ∈ X. And then, the result of Th.M. Rassias theorem has been generalized by P.

Gavruta [5] by allowing the Cauchy difference to be a generalized control function.

A square norm on an inner product space satisfies the important parallelogram equality

‖x + y‖2 + ‖x− y‖2 = 2‖x‖2 + 2‖y‖2.

The functional equation

f(x + y) + f(x− y) = 2f(x) + 2f(y),

which may be originated from this parallelogram equality, is called a quadratic functional

equation. In particular, every solution of the quadratic functional equation is said to

be a quadratic function. A Hyers–Ulam stability problem for the quadratic functional

equation was proved by F. Skof [12] for mappings f : X → Y , where X is a normed space

and Y is a Banach space. P.W. Cholewa [3] noticed that the theorem of Skof is still true

if the relevant domain X is replaced by an Abelian group. In S. Czerwik [4] proved the

Hyers–Ulam stability of the quadratic functional equation. In the last decade, S. Lee and

K. Jun [8] and S. Lee and C. Park [9] have proved the Hyers–Ulam stability of quadratic

type functional equation with three variables.

C. Park [10] has investigated the Hyers–Ulam stability of the following functional equa-

tion, which has exactly quadratic mappings as solutions up to f(0),

rf(x + y + z + w

s) + rf(

x + y − z − w

s) + rf(

x− y + z − w

s)

+rf(x− y − z + w

s) = tf(x) + tf(y) + tf(z) + tf(w)

for all x, y, z, w ∈ X under the assumption of an even mapping f : X → Y with f(0) = 0.

Recently, the authors [7] have established the general solution of the above functional

equation and then improved the Hyers–Ulam stability of the equation without the even

condition and f(0) = 0. In this paper, we are going to establish the general solution

of the following modified functional equation, which has exactly quadratic and additive

mappings as solutions up to f(0),

rf(−x + y + z + w

s) + rf(

x− y + z + w

s) + rf(

x + y − z + w

s) (1.1)

+rf(x + y + z − w

s) = tf(x) + tf(y) + tf(z) + tf(w)

for fixed nonzero real numbers r, s, t, and then investigate the Hyers–Ulam stability of the

functional equation for mappings f : X → Y between normed spaces.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

886 HARK-MAHN KIM ET AL 885-898

Page 135: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

REFINED GENERAL QUADRATIC EQUATION 3

2. General solution of the functional equation.

First of all, we solve the general solution of the equation (1.1) in the class of mappings

between linear spaces.

Lemma 2.1. If a mapping f : X → Y satisfies the equation

rf(−x + y + z + w

s) + rf(

x− y + z + w

s) + rf(

x + y − z + w

s)

+rf(x + y + z − w

s) = tf(x) + tf(y) + tf(z) + tf(w)

for all x, y, z, w ∈ X, then f(x) = Q(x) + A(x) + f(0), where Q is quadratic and A is

additive, and f(0) = 0 if r 6= t.

Proof. Let f be a solution of the equation (1.1). Now, letting x = y = z = w := 0 in

(1.1), one has f(0) = 0 if r 6= t. First, we prove the case r 6= t. Let fe(x) :=f(x) + f(−x)

2

be an even part of f and fo(x) :=f(x)− f(−x)

2be an odd part of f . Then, we see that

fe, fo are also solutions of the equation (1.1). Putting y = z = w := 0 in (1.1) for the

even mapping fe, we have

4rfe(x

s) = tfe(x) (2.1)

for all x ∈ X, which yields

fe(−x + y + z + w) + fe(x− y + z + w) + fe(x + y − z + w) (2.2)

+fe(x + y + z − w) = 4fe(x) + 4fe(y) + 4fe(z) + 4fe(w)

for all x, y, z, w ∈ X. Putting z = w := 0 in (2.2), we deduce

fe(x + y) + fe(x− y) = 2fe(x) + 2fe(y)

for all x, y ∈ X. So fe := Q is quadratic.

Putting y = z = w := 0 in (1.1) for the odd mapping fo, we have the relation 2rfo(x

s) =

tfo(x) for all x ∈ X. Thus, it follows that

fo(−x + y + z + w) + fo(x− y + z + w) + fo(x + y − z + w) (2.3)

+fo(x + y + z − w) = 2fo(x) + 2fo(y) + 2fo(z) + 2fo(w)

for all x, y, z, w ∈ X. Putting z = w := 0 in (2.3), one conclude

fo(x + y) = fo(x) + fo(y),

and so, fo := A is additive. Therefore, f(x) = fe(x) + fo(x) = Q(x) + A(x), where Q is

quadratic and A is additive.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

887 HARK-MAHN KIM ET AL 885-898

Page 136: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

4 H. KIM AND S. LEE

Next, we prove the case r = t. Let f(x)− f(0) = f(x), x ∈ X. In this case, f(0) = 0,

and we see the functional equation

f(−x + y + z + w

s) + f(

x− y + z + w

s) + f(

x + y − z + w

s) (2.4)

+f(x + y + z − w

s) = f(x) + f(y) + f(z) + f(w)

for all x, y, z, w ∈ X. It follows that fe(x) :=f(x) + f(−x)

2and fo(x) =

f(x)− f(−x)

2also satisfy the equation (2.4). Putting y = z = w := 0 in (2.4) for the even mapping fe,

we have 4fe(x

s) = fe(x), and so,

fe(−x + y + z + w) + fe(x− y + z + w) + fe(x + y − z + w) (2.5)

+fe(x + y + z − w) = 4[fe(x) + fe(y) + fe(z) + fe(w)]

for all x, y, z, w ∈ X. Thus, fe := Q is quadratic. Similarly, putting y = z = w := 0 in

(2.4) for the odd mapping fo, we have 2fo(x

s) = fo(x), and so, we get

fo(−x + y + z + w) + fo(x− y + z + w) + fo(x + y − z + w) (2.6)

+fo(x + y + z − w) = 2[fo(x) + fo(y) + fo(z) + fo(w)]

for all x, y, z, w ∈ X. Thus, we conclude that fo(x+y) = fo(x)+ fo(y), and hence, fo = A

is additive. Therefore, f(x) − f(0) = f(x) = fe(x) + fo(x) = Q(x) + A(x), where Q is

quadratic and A is additive. 2

Remark 2.2. If r = t and s 6= 2 is a rational number, and if f is a solution of the

equation (1.1), then we note that fo(x) := A(x) ≡ 0 identically, and fe(x) := Q(x) ≡ 0

identically. Hence, f(x) = f(0) must be a constant solution.

If r = t and s = 2, and if f is a solution of the equation (1.1) with f(0) = 0, then the

equation

f(−x + y + z + w

2) + f(

x− y + z + w

2) + f(

x + y − z + w

2)

+f(x + y + z − w

2) = f(x) + f(y) + f(z) + f(w), x, y, z, w ∈ X

yields

2f(x + y

2) + f(

x− y

2) + f(

−x + y

2) = f(x) + f(y),

⇔ 2f(u) + f(v) + f(−v) = f(u + v) + f(u− v),

which is well-known Drygas functional equation with general solution f(x) = Q(x) +

A(x), x ∈ X. Therefore, if r = t and s = 2, and if f is a solution of the equation (1.1),

then f(x) = Q(x) + A(x) + f(0) is a general solution of the equation.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

888 HARK-MAHN KIM ET AL 885-898

Page 137: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

REFINED GENERAL QUADRATIC EQUATION 5

If r 6= t and s = 2, and if f is a solution of the equation (1.1), then we see that

fe(x) = 0, x ∈ X identically and fo(x) = 0, x ∈ X identically. Thus, f(x) = f(0) = 0

must be a constant solution.

We remark that if a mapping f : X → Y satisfies the equation

f(−x + y + z + w) + f(x− y + z + w) + f(x + y − z + w)

+f(x + y + z − w) = 4[f(x) + f(y) + f(z) + f(w)]

for all x, y, z, w ∈ X, then (i) f(0) = 0; (ii) f(−x) = f(x); (iii) f(x + y) + f(x − y) =

2[f(x) + f(y)] for all x, y ∈ X, and thus, f is quadratic.

3. Stability of the functional equation for even mappings.

We now prove the Hyers–Ulam stability of the functional equation for even mappings

f : X → Y with some regularity conditions. Given a mapping f : X → Y and a function

ϕ : X4 → R+ := [0,∞), we set for notational convenience

‖Df(x, y, z, w)‖ ≤ ϕ(x, y, z, w), (3.1)

Df(x, y, z, w) := rf(−x + y + z + w

s) + rf(

x− y + z + w

s) + rf(

x + y − z + w

s)

+rf(x + y + z − w

s)− [tf(x) + tf(y) + tf(z) + tf(w)]

for all x, y, z, w ∈ X. From now on, we assume that that X and Y are a normed linear

space with norm ‖ · ‖ and a Banach space with norm ‖ · ‖, respectively.

Theorem 3.1. Assume that an even mapping f : X → Y satisfies the functional inequal-

ity (3.1) and

Φ1(x, y, z, w) :=∞∑

i=0

ϕ(2ix, 2iy, 2iz, 2iw)

4i< ∞, (3.2)

(Φ2(x, y, z, w) :=

∞∑

i=1

4iϕ(x

2i,

y

2i,

z

2i,w

2i) < ∞, resp.

)

for all x, y, z, w ∈ X. Then, there exists a unique quadratic mapping Q1 : X → Y,

(Q2 : X → Y, resp.) , defined as Q1(x) = limn→∞f(2nx)

4n, x ∈ X,

(Q2(x) = lim

n→∞ 4n[f(x

2n)− f(0)], x ∈ X, resp.

)

such that

‖f(x)− f(0)−Q1(x)‖ ≤ 1

4|t| [Φ1(x, x, x, x) + Φ1(2x, 0, 0, 0)], (3.3)

(‖f(x)− f(0)−Q2(x)‖ ≤ 1

4|t| [Φ2(x, x, x, x) + Φ2(2x, 0, 0, 0)], resp.

)

for all x ∈ X.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

889 HARK-MAHN KIM ET AL 885-898

Page 138: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

6 H. KIM AND S. LEE

Proof. First, we observe that

4 | r − t | ‖f(0)‖ ≤ ϕ(0, 0, 0, 0), (3.4)

‖4rf(2x

s)− 4tf(x)‖ ≤ ϕ(x, x, x, x), (3.5)

‖2rf(2x

s)− 2tf(x) + 2(r − t)f(0)‖ ≤ ϕ(x, x, 0, 0), (3.6)

‖4rf(x

s)− tf(x)− 3tf(0)‖ ≤ ϕ(x, 0, 0, 0) (3.7)

for all x ∈ X. By using (3.5) and (3.6), we have

‖4(r − t)f(0)‖ ≤ ϕ(x, x, x, x) + 2ϕ(x, x, 0, 0) (3.8)

for all x ∈ X. By using (3.5) and (3.7), one has

‖f(2x)− 4f(x) + 3f(0)‖ ≤ 1

|t| [ϕ(x, x, x, x) + ϕ(2x, 0, 0, 0)] (3.9)

for all x ∈ X. Let f(x)− f(0) := f(x), x ∈ X. Then one obtains from (3.9)

‖f(2x)− 4f(x)‖ ≤ 1

|t| [ϕ(x, x, x, x) + ϕ(2x, 0, 0, 0)] (3.10)

for all x ∈ X. Thus, we can prove by triangle inequality

‖ f(2nx)

4n− f(x)‖ ≤ 1

4|t|n−1∑

i=0

1

4i[ϕ(2ix, 2ix, 2ix, 2ix) + ϕ(2i+1x, 0, 0, 0)] (3.11)

for all x ∈ X. Now, it follows from the last inequality that for all nonnegative integers

n,m with n > m ≥ 0

‖ f(2nx)

4n− f(2mx)

4m‖ (3.12)

≤n−1∑

i=m

‖ f(2i+1x)

4i+1− f(2ix)

4i‖

≤ 1

4|t|n−1∑

i=m

1

4i[ϕ(2ix, 2ix, 2ix, 2ix) + ϕ(2i+1x, 0, 0, 0)]

for all x ∈ X, of which the right-hand side approaches 0 as m tends to infinity. This shows

that the sequence f(2nx)

4n is a Cauchy sequence for all x ∈ X. Since Y is complete, the

sequence f(2nx)

4n converges in Y for all x ∈ X, and so one can define a mapping

Q1 : X → Y by

Q1(x) = limn→∞

f(2nx)

4n= lim

n→∞f(2nx)

4n

for all x ∈ X.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

890 HARK-MAHN KIM ET AL 885-898

Page 139: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

REFINED GENERAL QUADRATIC EQUATION 7

Now, it follows from (3.1) and the definition of Q1 that

‖DQ1(x, y, z, w)‖ = limn→∞

‖Df(2nx, 2ny, 2nz, 2nw)‖4n

≤ limn→∞

ϕ(2nx, 2ny, 2nz, 2nw)

4n= 0

for all x, y, z, w ∈ X. Thus, the mapping Q1 is quadratic by Lemma 2.1. Moreover, if we

let n →∞ in (3.11), we get the desired approximation (3.3).

To prove the uniqueness, let Q′

: X → Y be another quadratic mapping satisfying

(3.3). Then, we have

‖ Q1(x)−Q′(x) ‖ =

1

4n‖Q1(2

nx)−Q′(2nx)‖

≤ 1

4n

(‖Q1(2

nx)− f(2nx) + f(0)‖+ ‖f(2nx)− f(0)−Q′(2nx)‖

)

≤ 1

4n · 2|t|(Φ1(2

nx, 2nx, 2nx, 2nx) + Φ1(2n+1x, 0, 0, 0)

),

which tends to zero as n →∞ for all x ∈ X. So one can conclude that Q1(x) = Q′(x) for

all x ∈ X. This proves the uniqueness. 2

In the following, we consider another stability results of the functional equation (1.1)

by using the similar manner to the reference [7].

Theorem 3.2. Assume that an even mapping f : X → Y satisfies the functional in-

equality (3.1) and the condition (3.2). Then, there exists a unique quadratic mapping

Q1 : X → Y, (Q2 : X → Y, resp.) , defined as Q1(x) = limn→∞f(2nx)

4n, x ∈ X

(Q2(x) = lim

n→∞ 4n[f(x

2n)− (4r − t)

3tf(0)], x ∈ X, resp.)

)

such that

‖f(x)− (4r − t)

3tf(0)−Q1(x)‖ ≤ 1

4|t| [2Φ1(x, x, 0, 0) + Φ1(2x, 0, 0, 0)], (3.13)

(‖f(x)− (4r − t)

3tf(0)−Q2(x)‖ ≤ 1

4|t| [2Φ2(x, x, 0, 0) + Φ2(2x, 0, 0, 0)], resp.)

)

for all x ∈ X, where f(0) = 0 if r 6= t.

Proof. Associating (3.6) with (3.7), one has

‖f(2x)− 4f(x) +(4r − t)

tf(0)‖ ≤ 1

|t| [2ϕ(x, x, 0, 0) + ϕ(2x, 0, 0, 0)],

which yields

‖˜f(2x)

4− f(x)‖ ≤ 1

4|t| [2ϕ(x, x, 0, 0) + ϕ(2x, 0, 0, 0)], (3.14)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

891 HARK-MAHN KIM ET AL 885-898

Page 140: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

8 H. KIM AND S. LEE

where f(x) := f(x)− (4r − t)

3tf(0), x ∈ X. It follows from (3.14) that

‖f(x)− f(2nx)

4n‖ ≤ 1

4|t|n−1∑

i=0

[2ϕ(2ix, 2ix, 0, 0) + ϕ(2i+1x, 0, 0, 0)

4i]

for all x ∈ X.

The rest of proof is similarly verified by the same argument as that of Theorem 3.1. 2

In Theorem 3.2, we remark that Q2(0) = 0 by definition if r = t, and also, Q2(0) = 0

if r 6= t because f(0) = 0 = ϕ(0, 0, 0, 0) by the convergence of Φ2(0, 0, 0, 0).

Corollary 3.3. Let δ, θ be nonnegative real numbers and p 6= 2 be a positive real number.

Assume that an even mapping f : X → Y satisfies the functional inequality

‖Df(x, y, z, w)‖ ≤ δ + θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p)

for all x, y, z, w ∈ X, where δ = 0 when p > 2. Then, there exists a unique quadratic

mapping Q : X → Y such that

‖f(x)− f(0)−Q(x)‖ ≤ 1

|t|[2δ

3+

4θ‖x‖p

|4− 2p| +2pθ‖x‖p

|4− 2p|]

for all x ∈ X, where f(0) = 0 if r 6= t and p > 2.

4. Stability of the functional equation for odd mappings.

We now prove the Hyers–Ulam stability of the functional equation for odd mappings

f : X → Y with some regularity conditions.

Theorem 4.1. Assume that an odd mapping f : X → Y satisfies the functional inequality

(3.1) and

Φ3(x, y, z, w) =∞∑

i=0

ϕ(2ix, 2iy, 2iz, 2iw)

2i< ∞ (4.1)

(Φ4(x, y, z, w) =

∞∑

i=1

2iϕ(x

2i,

y

2i,

z

2i,w

2i) < ∞, resp.

)

for all x, y, z, w ∈ X. Then, there exists a unique additive mapping A3 : X → Y,

(A4 : X → Y, resp.) , defined as A3(x) = limn→∞f(2nx)

2n, x ∈ X,

(A4(x) = lim

n→∞ 2nf(x

2n), x ∈ X, resp.

)

such that

‖f(x)− A3(x)‖ ≤ 1

4|t| [Φ3(x, x, x, x) + 2Φ3(2x, 0, 0, 0)], (4.2)

(‖f(x)− A4(x)‖ ≤ 1

4|t| [Φ4(x, x, x, x) + 2Φ4(2x, 0, 0, 0)], resp.

)

for all x ∈ X.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

892 HARK-MAHN KIM ET AL 885-898

Page 141: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

REFINED GENERAL QUADRATIC EQUATION 9

Proof. First, we note that

‖4rf(2x

s)− 4tf(x)‖ ≤ ϕ(x, x, x, x), (4.3)

‖2rf(2x

s)− 2tf(x)‖ ≤ ϕ(x, x, 0, 0), (4.4)

‖2rf(2x

s)− tf(2x)‖ ≤ ϕ(2x, 0, 0, 0) (4.5)

for all x ∈ X. By using (4.3) and (4.5), one has

‖f(2x)− 2f(x)‖ ≤ 1

2|t| [ϕ(x, x, x, x) + 2ϕ(2x, 0, 0, 0)] (4.6)

for all x ∈ X. Thus, by using triangle inequality and (4.6), one can prove the useful

inequality

‖f(2nx)

2n− f(x)‖ ≤ 1

4|t|n−1∑

i=0

1

2i[ϕ(2ix, 2ix, 2ix, 2ix) + 2ϕ(2i+1x, 0, 0, 0)] (4.7)

for all x ∈ X.

Applying the same argument as in Theorem 3.1, one can obtain the desired results. 2

In the following, we consider another stability results of the functional equation (1.1)

by using the similar way to the reference [7].

Theorem 4.2. Assume that an odd mapping f : X → Y satisfies the functional inequality

(3.1) and the condition (4.1). Then, there exists a unique additive mapping A3 : X → Y,

(A4 : X → Y, resp.) , defined as A3(x) = limn→∞1

2nf(2nx), x ∈ X,

(A4(x) = lim

n→∞ 2nf(x

2n), x ∈ X, resp.

)

such that

‖f(x)− A3(x)‖ ≤ 1

2|t| [Φ3(x, x, 0, 0) + Φ3(2x, 0, 0, 0)], (4.8)

(‖f(x)− A4(x)‖ ≤ 1

2|t| [Φ4(x, x, 0, 0) + Φ4(2x, 0, 0, 0)], resp.

)

for all x ∈ X.

Proof. Associating (4.4) with (4.5), one has

‖f(2x)− 2f(x)‖ ≤ 1

|t| [ϕ(x, x, 0, 0) + ϕ(2x, 0, 0, 0)], (4.9)

which yields

‖f(x)− f(2nx)

2n‖ ≤ 1

2|t|n−1∑

i=0

[ϕ(2ix, 2ix, 0, 0) + ϕ(2i+1x, 0, 0, 0)

2i]

for all x ∈ X.

The rest of proof is similarly verified by the same argument as that of Theorem 4.1. 2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

893 HARK-MAHN KIM ET AL 885-898

Page 142: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

10 H. KIM AND S. LEE

Corollary 4.3. Let δ, θ be nonnegative real numbers and p 6= 1 be a positive real number.

Assume that an odd mapping f : X → Y satisfies the functional inequality

‖Df(x, y, z, w)‖ ≤ δ + θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p)

for all x, y, z, w ∈ X, where δ = 0 when p > 1. Then, there exists a unique additive

mapping A : X → Y such that

‖f(x)− A(x)‖ ≤ 1

|t|[3δ

2+

2θ‖x‖p

|2− 2p| +2pθ‖x‖p

|2− 2p|]

for all x ∈ X.

5. Stability of the functional equation for general mappings.

Finally, we now prove the Hyers–Ulam stability of the functional equation (1.1) for

general mappings f : X → Y with some regularity conditions.

Theorem 5.1. Assume that a mapping f : X → Y satisfies the functional inequality

(3.1) and

Φ3(x, y, z, w) :=∞∑

i=0

ϕ(2ix, 2iy, 2iz, 2iw)

2i< ∞ (5.1)

for all x, y, z, w ∈ X. Then, there exist a unique quadratic mapping Q1 : X → Y and a

unique additive mapping A3 : X → Y such that

‖f(x) + f(−x)

2− f(0)−Q1(x)‖

≤ 1

8|t| [Φ1(x, x, x, x) + Φ1(−x,−x,−x,−x) + Φ1(2x, 0, 0, 0) + Φ1(−2x, 0, 0, 0)],

‖f(x)− f(−x)

2− A3(x)‖

≤ 1

8|t| [Φ3(x, x, x, x) + Φ3(−x,−x,−x,−x) + 2Φ3(2x, 0, 0, 0) + 2Φ3(−2x, 0, 0, 0)],

‖f(x)− f(0)− A3(x)−Q1(x)‖ (5.2)

≤ 1

8|t| [Φ1(x, x, x, x) + Φ1(−x,−x,−x,−x) + Φ1(2x, 0, 0, 0) + Φ1(−2x, 0, 0, 0)

+Φ3(x, x, x, x) + Φ3(−x,−x,−x,−x) + 2Φ3(2x, 0, 0, 0) + 2Φ3(−2x, 0, 0, 0)]

for all x ∈ X.

Proof. Let fe(x) := f(x)+f(−x)2

, x ∈ X, be the even part of f and fo(x) := f(x)−f(−x)2

, x ∈X, the odd part of f . Then, it is easy to see that

‖Dfe(x, y, z, w)‖ ≤ 1

2[ϕ(x, y, z, w) + ϕ(−x,−y,−z,−w)], (5.3)

‖Dfo(x, y, z, w)‖ ≤ 1

2[ϕ(x, y, z, w) + ϕ(−x,−y,−z,−w)] (5.4)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

894 HARK-MAHN KIM ET AL 885-898

Page 143: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

REFINED GENERAL QUADRATIC EQUATION 11

for all x, y, z, w ∈ X. Now, applying Theorem 3.1 to the functional inequality (5.3), we

see that there exists a unique quadratic mapping Q1 : X → Y, defined by Q1(x) =

limn→∞f(2nx) + f(−2nx)

4n · 2 , x ∈ X, such that

‖fe(x)− fe(0)−Q1(x)‖ (5.5)

≤ 1

8|t| [Φ1(x, x, x, x) + Φ1(−x,−x,−x,−x) + Φ1(2x, 0, 0, 0) + Φ1(−2x, 0, 0, 0)]

for all x ∈ X.

On the other hand, applying Theorem 3.1 to the functional inequality (5.4), one ob-

tains that there exists a unique additive mapping A3 : X → Y, defined by A3(x) =

limn→∞f(2nx)− f(−2nx)

2n+1, x ∈ X, such that

‖fo(x)− A3(x)‖ (5.6)

≤ 1

8|t| [Φ3(x, x, x, x) + Φ3(−x,−x,−x,−x) + 2Φ3(2x, 0, 0, 0) + 2Φ3(−2x, 0, 0, 0)]

for all x ∈ X. Hence, we lead to the desired approximation (5.2). 2

Theorem 5.2. Assume that a mapping f : X → Y satisfies the functional inequality

(3.1) and

Φ4(x, y, z, w) :=∞∑

i=1

2iϕ(x

2i,

y

2i,

z

2i,w

2i) < ∞, (5.7)

Φ1(x, y, z, w) :=∞∑

i=0

ϕ(2ix, 2iy, 2iz, 2iw)

4i< ∞

for all x, y, z, w ∈ X. Then, there exist a unique quadratic mapping Q1 : X → Y and a

unique additive mapping A4 : X → Y such that

‖f(x) + f(−x)

2− f(0)−Q1(x)‖

≤ 1

8|t| [Φ1(x, x, x, x) + Φ1(−x,−x,−x,−x) + Φ1(2x, 0, 0, 0) + Φ1(−2x, 0, 0, 0)],

‖f(x)− f(−x)

2− A4(x)‖

≤ 1

8|t| [Φ4(x, x, x, x) + Φ4(−x,−x,−x,−x) + 2Φ4(2x, 0, 0, 0) + 2Φ4(−2x, 0, 0, 0)],

‖f(x)− f(0)− A4(x)−Q1(x)‖ (5.8)

≤ 1

8|t| [Φ1(x, x, x, x) + Φ1(−x,−x,−x,−x) + Φ1(2x, 0, 0, 0) + Φ1(−2x, 0, 0, 0)

+Φ4(x, x, x, x) + Φ4(−x,−x,−x,−x) + 2Φ4(2x, 0, 0, 0) + 2Φ4(−2x, 0, 0, 0)]

for all x ∈ X, where f(0) = 0 if r 6= t.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

895 HARK-MAHN KIM ET AL 885-898

Page 144: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

12 H. KIM AND S. LEE

Proof. Applying Theorem 3.1 to the functional inequality (5.3), we see that there exists

a unique quadratic mapping Q1 : X → Y, defined by Q1(x) = limn→∞f(2nx) + f(−2nx)

4n · 2 ,

x ∈ X, such that

‖fe(x)− fe(0)−Q1(x)‖ (5.9)

≤ 1

8|t| [Φ1(x, x, x, x) + Φ1(−x,−x,−x,−x) + Φ1(2x, 0, 0, 0) + Φ1(−2x, 0, 0, 0)]

for all x ∈ X. In particular, it follows from the convergence of the series Φ4(0, 0, 0, 0) that

0 = ϕ(0, 0, 0, 0), and so f(0) = fe(0) = 0 if r 6= t.

In turn, applying Theorem 4.1 to the inequality (5.4), one obtains that there exists a

unique additive mapping A4 : X → Y, defined by A4(x) = limn→∞ 2n

2[f(

x

2n) − f(

−x

2n)],

x ∈ X, such that

‖fo(x)− A4(x)‖ (5.10)

≤ 1

8|t| [Φ4(x, x, x, x) + Φ4(−x,−x,−x,−x) + 2Φ4(2x, 0, 0, 0) + 2Φ4(−2x, 0, 0, 0)]

for all x ∈ X. Hence, we lead to the desired approximation (5.8). 2

Theorem 5.3. Assume that a mapping f : X → Y satisfies the functional inequality

(3.1) and

Φ2(x, y, z, w) :=∞∑

i=1

4iϕ(x

2i,

y

2i,

z

2i,w

2i) < ∞ (5.11)

for all x, y, z, w ∈ X. Then, there exist a unique quadratic mapping Q2 : X → Y and a

unique additive mapping A4 : X → Y such that

‖f(x) + f(−x)

2− f(0)−Q2(x)‖

≤ 1

8|t| [Φ2(x, x, x, x) + Φ2(−x,−x,−x,−x) + Φ2(2x, 0, 0, 0) + Φ2(−2x, 0, 0, 0)],

‖f(x)− f(−x)

2− A4(x)‖

≤ 1

8|t| [Φ4(x, x, x, x) + Φ4(−x,−x,−x,−x) + 2Φ4(2x, 0, 0, 0) + 2Φ4(−2x, 0, 0, 0)],

‖f(x)− f(0)− A4(x)−Q2(x)‖ (5.12)

≤ 1

8|t| [Φ2(x, x, x, x) + Φ2(−x,−x,−x,−x) + Φ2(2x, 0, 0, 0) + Φ2(−2x, 0, 0, 0)

+Φ4(x, x, x, x) + Φ4(−x,−x,−x,−x) + 2Φ4(2x, 0, 0, 0) + 2Φ4(−2x, 0, 0, 0)]

for all x ∈ X, where f(0) = 0 if r 6= t.

Proof. Applying Theorem 3.1 to the functional inequality (5.3), we see that there exists

a unique quadratic mapping Q2 : X → Y, defined by Q2(x) = limn→∞ 4n

2[f(

x

2n)+f(

−x

2n)],

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

896 HARK-MAHN KIM ET AL 885-898

Page 145: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

REFINED GENERAL QUADRATIC EQUATION 13

x ∈ X, such that

‖fe(x)− fe(0)−Q2(x)‖ (5.13)

≤ 1

8|t| [Φ2(x, x, x, x) + Φ2(−x,−x,−x,−x) + Φ2(2x, 0, 0, 0) + Φ2(−2x, 0, 0, 0)]

for all x ∈ X.

On the other hand, applying Theorem 4.1 to the functional inequality (5.4), one ob-

tains that there exists a unique additive mapping A4 : X → Y, defined by A4(x) =

limn→∞ 2n−1[f(x

2n)− f(

−x

2n)], x ∈ X, such that

‖fo(x)− A4(x)‖ (5.14)

≤ 1

8|t| [Φ4(x, x, x, x) + Φ4(−x,−x,−x,−x) + 2Φ4(2x, 0, 0, 0) + 2Φ4(−2x, 0, 0, 0)]

for all x ∈ X. Hence, we lead to the desired approximation (5.12). 2

Now, applying main Theorems 5.1, 5.2 and 5.3, we obtain the following corollary for

each three cases 0 < p < 1, 1 < p < 2 and p > 2 concerning the stability of equation (1.1).

Corollary 5.4. Let δ, θ be nonnegative real numbers and p 6= 1, 2 be a positive real number.

Assume that a mapping f : X → Y satisfies the functional inequality

‖Df(x, y, z, w)‖ ≤ δ + θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p)

for all x, y, z, w ∈ X, where δ = 0 when p > 1. Then, there exist a unique quadratic

mapping Q : X → Y and a unique additive mapping A : X → Y such that

‖f(x) + f(−x)

2− f(0)−Q(x)‖ ≤ 1

|t|[2δ

3+

4θ‖x‖p

|4− 2p| +2pθ‖x‖p

|4− 2p|],

‖f(x)− f(−x)

2− A(x)‖ ≤ 1

|t|[3δ

2+

2θ‖x‖p

|2− 2p| +2pθ‖x‖p

|2− 2p|],

‖f(x)− f(0)− A(x)−Q(x)‖ ≤ 1

|t|[13δ

6+

4θ‖x‖p

|4− 2p| +2pθ‖x‖p

|4− 2p| +2θ‖x‖p

|2− 2p| +2pθ‖x‖p

|2− 2p|]

for all x ∈ X, where f(0) = 0 if r 6= t and p > 2.

Acknowledgements

This research was supported by Basic Research Program through the National Research

Foundation of Korea(NRF) funded by the Ministry of Education(No. 2012R1A1A2008139).

References

[1] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan, 2(1950), 64–66.

[2] D.G. Bourgin, Classes of transformations and bordering transformations, Bull. Amer. Math. Soc.57 (1951), 223–237.

[3] P.W. Cholewa, Remarks on the shability of functional equations, Aequationes Math. 27(1984),76–86.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

897 HARK-MAHN KIM ET AL 885-898

Page 146: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

14 H. KIM AND S. LEE

[4] S. Czerwik, On the stability of the quadratic mapping in normed spaces, Abh. Math. Sem. Univ.Hamburg, 62(1992), 59–64.

[5] P. Gavruta, A generalization of the Hyers–Ulam–Rassias stability of approximately additive map-pings, J. Math. Anal. Appl. 184 (1994), 431–436.

[6] D.H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. U.S.A. 27(1941), 222–224.

[7] H. Kim and S. Lee, Refined stability results of functional equation in four variables, to be appearedin Kyungpook Math. J.

[8] S. Lee and K. Jun, Hyers–Ulam–Rassias stability of a quadratic type functional equation, Bull.Korean Math. Soc. 40(2003), 183–193.

[9] S. Lee and C. Park, Hyers–Ulam–Rassias stability of a functional equation in three variables, J.Chungcheong Math. Soc. 16(2)(2003), 11–21.

[10] C. Park, Hyers–Ulam–Rassias stability of an even functional equation in four variables, KyungpookMath J. 44(2)(2004), 299–304.

[11] Th.M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc.72 (1978), 297–300.

[12] F. Skof, Proprieta locali e approssimazione di operatori, Rend. Sem. Mat. Fis. Milano, 53(1983),113–129.

[13] S.M. Ulam, A Collection of the Mathematical Problems, Interscience Publ. New York, 1960.

(Hark-Mahn Kim) Department of Mathematics, Chungnam National University, 79 Dae-hangno, Yuseong-gu, Daejeon 305-764, Korea

E-mail address: [email protected]

(Soon Lee) Department of Mathematics, Chungnam National University, 79 Daehangno,Yuseong-gu, Daejeon 305-764, Korea

E-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

898 HARK-MAHN KIM ET AL 885-898

Page 147: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

HYERS-ULAM STABILITY OF A CLASS OF DIFFERENTIAL

EQUATIONS OF SECOND ORDER

MOHAMMAD REZA ABDOLLAHPOUR AND CHOONKIL PARK∗

Abstract. In this paper we prove the Hyers-Ulam stability of a class of differ-ential equations of second order which includes Euler differential equation andsecond order linear differential equations with constant coefficients.

1. Introduction

In 1940, Ulam [20] discussed the question concerning the stability of homomor-phisms as follows: let G1 be a group and G2 be a metric group with a metric d(·, ·).For a given ε > 0, is there a δ > 0 such that if a function h : G1 → G2 satisfies theinequality d(h(xy), h(x)h(y)) < δ for all x, y ∈ G1, then there exists a homomor-phism H : G1 → G2 with d(h(x), H(x)) < δ for all x ∈ G1? The question of Ulamwas answered by Hyers in [7] for the case both G1 and G2 are Banach spaces. See[3, 5, 6, 17, 18, 19] for the stability problems of functional equations.

Definition 1.1. Let I ⊂ R be an open interval. We say that the differential equation

an(t)y(n)(t) + an−1(t)y(n−1)(t) + · · ·+ a1(t)y′(t) + a0y(t) + h(t) = 0 (1.1)

has the Hyers-Ulam stability, if for any function f : I → R satisfying the differentialinequality

|an(t)y(n)(t) + an−1(t)y(n−1)(t) + · · ·+ a1(t)y′(t) + a0y(t) + h(t)| ≤ εfor all t ∈ I and for some ε > 0, there exists a solution g : I → R of (1.1) such that|f(t)− g(t)| ≤ K(ε) for any t ∈ I, where K(ε) is a constant depending only on ε.

The first result concerning the Hyers-Ulam stability of ordinary differential equa-tions was due to Alsina and Ger, see [2] (see also [15, 16]). In fact, their resultdealt with the Hyers-Ulam stability of linear differential equations of first order.The result of Alsina and Ger has been generalized by many mathematicians (Ref.[8, 9, 10, 12, 13]).

The Hyers-Ulam stability of second order linear differential equations has beeninvestigated in [4] and [14]. Furthermore, Abdollahpour and Najati [1] proved the

Hyers-Ulam stability of the third order differential equation y(3)(t)+αy′′(t)+βy′(t)+γy(t) = f(t).

The aim of this paper is to investigate the Hyers-Ulam stability of the differentialequation (

1

h′(x)

)2

y′′(x) +

h′(x)− h′′(x)

(h′(x))3

)y′(x) + βy(x) = f(x). (1.2)

MSC(2010): 34K20, 26D10, 39B52, 39B82

Keywords: Hyers-Ulam stability, Differential equation.∗Corresponding author: [email protected] (C. Park).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

899 CHOONKIL PARK ET AL 899-903

Page 148: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

M. R. ABDOLLAHPOUR, C. PARK

More precisely, the problem, we will deal with the following. Let ε > 0 be fixed and[a, b] ⊂ R. h ∈ C2[a, b] be a function for which either h′(x) > 0 or h′(x) < 0 holds forall x ∈ [a, b] and let f ∈ C[a, b]. Assume that for the unknown function y ∈ C2[a, b]∣∣∣∣∣

(1

h′(x)

)2

y′′(x) +

h′(x)− h′′(x)

(h′(x))3

)y′(x) + βy(x)− f(x)

∣∣∣∣∣ < ε

holds for all x ∈ [a, b]. Is it true there exist a constant K(ε) depending only on εand a solution g ∈ C2[a, b] of equation (1.2) such that for any x ∈ [a, b]

|y(x)− g(x)| ≤ ε

is satisfied?In the subsequent section we will answer affirmatively this problem.

2. Hyers-Ulam stability of the differential equation

( 1h′(x))2y′′(x) + ( α

h′(x) −h′′(x)

(h′(x))3)y′(x) + βy(x) = f(x)

Throughout this section, a and b are real numbers with −∞ < a < b < +∞.

Theorem 2.1. The differential equation(1

h′(x)

)2

y′′(x) +

h′(x)− h′′(x)

(h′(x))3

)y′(x) + βy(x) = f(x)

has the Hyers-Ulam stability, where y, h ∈ C2[a, b], f ∈ C[a, b] and h′(x) > 0 (orh′(x) < 0) for all x ∈ [a, b].

Proof. Suppose that λ, µ are the (real or complex) roots of m2 + αm + β = 0 withp = <µ and q = <λ. Here < denotes the real part. Let ε > 0 and y, h ∈ C2[a, b]with ∣∣∣∣∣

(1

h′(x)

)2

y′′(x) +

h′(x)− h′′(x)

(h′(x))3

)y′(x) + βy(x)− f(x)

∣∣∣∣∣ ≤ ε.Let g(x) = 1

h′(x)y′(x)− λy(x) for all x ∈ [a, b]. It is clear that∣∣∣∣ 1

h′(x)g′(x)− µg(x)− f(x)

∣∣∣∣=

∣∣∣∣∣(

1

h′(x)

)2

y′′(x) +

h′(x)− h′′(x)

(h′(x))3

)y′(x) + βy(x)− f(x)

∣∣∣∣∣ ≤ ε.We define the function z : [a, b]→ R by

z(x) = eµ[h(x)−h(b)]g(b)− eµh(x)

∫ b

xh′(t)f(t)e−µh(t) dt, x ∈ [a, b].

Then

z′(x) = µh′(x)z(x) + f(x)h′(x), x ∈ [a, b]. (2.1)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

900 CHOONKIL PARK ET AL 899-903

Page 149: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

HYERS-ULAM STABILITY OF A CLASS OF DIFFERENTIAL EQUATIONS

Also we have

|z(x)− g(x)| =∣∣∣eµ[h(x)−h(b)]g(b)− g(x)− eµh(x)

∫ b

xh′(t)f(t)e−µh(t) dt

∣∣∣=|eµh(x)|

∣∣∣e−µh(b)g(b)− e−µh(x)g(x)−∫ b

xh′(t)f(t)e−µh(t) dt

∣∣∣=eph(x)

∣∣∣∣∫ b

x[e−µh(t)g(t)]′ dt−

∫ b

xh′(t)f(t)e−µh(t) dt

∣∣∣∣=eph(x)

∣∣∣∣∫ b

xe−µh(t)[g′(t)− µh′(t)g(t)− h′(t)f(t)] dt

∣∣∣∣≤eph(x)

∫ b

x|h′(t)e−µh(t)|| 1

h′(t)g′(t)− µg(t)− f(t)| dt

≤εeph(x)

∫ b

x|h′(t)|e−ph(t) dt

for all x ∈ [a, b]. Therefore if h′(x) > 0 then

|z(x)− g(x)| ≤

1− e−p[h(b)−h(a)]

pε if p 6= 0;

(h(b)− h(a))ε if p = 0

(2.2)

for all x ∈ [a, b] and if h′(x) < 0 then

|z(x)− g(x)| ≤

e−p[h(b)−h(a)] − 1

pε if p 6= 0;

(h(a)− h(b))ε if p = 0

(2.3)

for all x ∈ [a, b].Now, we define

u(x) = y(b)eλ[h(x)−h(b)] − eλh(x)

∫ b

xh′(t)z(t)e−λh(t) dt, x ∈ [a, b].

Due to the definition of function u, we immediately obtain that u ∈ C2[a, b] and

u′(x) = λh′(x)u(x) + z(x)h′(x). (2.4)

Then

u′′(x)h′(x)− h′′(x)u′(x)

[h′(x)]2= λu′(x) + z′(x).

It follows from (2.1) and (2.4) that(1

h′(x)

)2

u′′(x) +

h′(x)− h′′(x)

(h′(x))3

)u′(x) + βu(x) = f(x), x ∈ [a, b].

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

901 CHOONKIL PARK ET AL 899-903

Page 150: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

M. R. ABDOLLAHPOUR, C. PARK

Furthermore, for the function u, the inequality

|y(x)− u(x)| =∣∣∣∣y(x)− y(b)eλ[h(x)−h(b)] + eλh(x)

∫ b

xh′(t)z(t)e−λh(t) dt

∣∣∣∣=|eλh(x)|

∣∣∣∣y(x)e−λh(x) − y(b)e−λh(b) +

∫ b

xh′(t)z(t)e−λh(t) dt

∣∣∣∣=eqh(x)

∣∣∣∣∫ b

xh′(t)z(t)e−λh(t) dt−

∫ b

x[e−λh(t)y(t)]′ dt

∣∣∣∣=eqh(x)

∣∣∣∣∫ b

xh′(t)e−λh(t)[z(t)− 1

h′(t)y′(t) + λy(t)] dt

∣∣∣∣≤eqh(x)

∫ b

x|h′(t)e−λh(t)||z(t)− g(t)| dt

=eqh(x)

∫ b

xe−qh(t)|h′(t)||z(t)− g(t)| dt

is also valid for all x ∈ [a, b]. It follows from (2.2) that

|y(x)− u(x)| ≤

[1− e−p[h(b)−h(a)]][1− e−q[h(b)−h(a)]]

pqε if p, q 6= 0;

[1− e−p[h(b)−h(a)]](h(b)− h(a))

pε if p 6= 0, q = 0;

[1− e−q[h(b)−h(a)]](h(b)− h(a))

qε if p = 0, q 6= 0;

(h(b)− h(a))2ε if p, q = 0

and (2.3) implies that

|y(x)− u(x)| ≤

[e−p[h(b)−h(a)] − 1][e−q[h(b)−h(a)] − 1]

pqε if p, q 6= 0;

[e−p[h(b)−h(a)] − 1](h(a)− h(b))

pε if p 6= 0, q = 0;

[e−q[h(b)−h(a)] − 1](h(a)− h(b))

qε if p = 0, q 6= 0;

(h(a)− h(b))2ε if p, q = 0

for all x ∈ [a, b]. This completes the proof.

In [11], Li and Shen proved that a second order differential equation with con-stant coefficients has the Hyers-Ulam stability, if its characteristic equation has twopositive roots. It is necessary to mention that our next result is more general thantheir result, because in our result, there is no restriction on roots of characteristicequation.

Corollary 2.2. The second order differential equation with constant coefficientsy′′(x) + αy′(x) + βy(x) = f(x) has the Hyers-Ulam stability.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

902 CHOONKIL PARK ET AL 899-903

Page 151: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

HYERS-ULAM STABILITY OF A CLASS OF DIFFERENTIAL EQUATIONS

Proof. It is enough to take h(x) = x and replace α by α+ 1 in Theorem 2.1.

Corollary 2.3. If 0 < a < b or a < b < 0 then the second order Euler differentialequation x2y′′(x) + αxy′(x) + βy(x) = f(x) has the Hyers-Ulam stability.

Proof. It is enough to take h(x) = Ln(|x|) and replace α by α + 1 in Theorem2.1.

References

[1] M. R. Abdollahpour and A. Najati, Stability of linear differential equations of third order,Appl. Math. Lett. 24 (2011), 1827–1830.

[2] C. Alsina and R. Ger, On some inequalities and stability results related to the exponentialfunction, J. Inequal. Appl. 2 (1998), 373–380.

[3] M. Eshaghi Gordji and A. Bodaghi, On the stability of quadratic double centralizers on Banachalgebras, J. Comput. Anal. Appl. 13 (2011), 724–729.

[4] M. Eshaghi Gordji, Y. Cho, M. B. Ghaemi and B. Alizadeh, Stability of the exact second orderpartial differential equations, J. Inequal. Appl. 2011,Article ID 306275 (2011).

[5] M. Eshaghi Gordji, R. Farokhzad Rostami and S.A.R. Hosseinioun, Nearly higher derivationsin unital C∗-algebras, J. Comput. Anal. Appl. 13 (2011), 734–742.

[6] M. Eshaghi Gordji, G. Kim, J. Lee and C. Park, Generalized ternary bi-derivations on ternaryBanach algebras: a fixed point approach, J. Comput. Anal. Appl. 15 (2013), 45–54.

[7] D.H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. USA 27(1941), 222–224.

[8] S. Jung, Hyers-Ulam stability of linear differential equations of first order, Appl. Math. Lett.17 (2004), 1135–1140.

[9] S. Jung, Hyers-Ulam stability of linear differential equations of first order, III, J. Math. Anal.Appl. 311 (2005), 139–146.

[10] S. Jung, Hyers-Ulam stability of linear differential equations of first order, II, Appl. Math.Lett. 19 (2006), 854–858.

[11] Y. Li and Y. Shen, Hyers-Ulam stability of linear differential equations of second order, Appl.Math. Lett. 23 (2010), 306–309.

[12] T. Miura, On the Hyers-Ulam stability of a differentiable map, Sci. Math. Japon. 55 (2002),17–24.

[13] T. Miura, S. Jung and S.-E. Takahasi, Hyers-Ulam-Rassias stability of the Banach space valueddifferential equations y′ = λy, J. Korean Math. Soc. 41 (2004), 995–1005.

[14] A. Najati, M. R. Abdollahpour and Y. Cho, Superstability of linear differential equations ofsecond order, preprint.

[15] M. Ob loza, Hyers stability of the linear differential equation, Rocznik Nauk.-Dydakt. PraceMat. 13 (1993), 259–270.

[16] M. Ob loza, Connections between Hyers and Lyapunov stability of the ordinary differential equa-tions, Rocznik Nauk.-Dydakt. Prace Mat. 14 (1997), 141–146.

[17] S. Shagholi, M. Eshaghi Gordji and M. Bavand Savadkouhi, Stability of ternary quadraticderivations on ternary Banach algebras, J. Comput. Anal. Appl. 13 (2011), 1097–1105.

[18] S. Shagholi, M. Eshaghi Gordji and M. Bavand Savadkouhi, Nearly ternary cubic homomor-phisms in ternary Frechet algebras, J. Comput. Anal. Appl. 13 (2011), 1106–1114.

[19] D. Shin, C. Park and Sh. Farhadabadi, On the superstability of ternary Jordan C∗-homomorphisms, J. Comput. Anal. Appl. 16 (2014), 964–973.

[20] S.M. Ulam, A Collection of the Mathematical Problems, Interscience Publ. New York, 1960.

Mohammad Reza AbdollahpourDepartment of Mathematics and Applications, Faculty of Mathematical Sciences,

University of Mohaghegh Ardabili, Ardabil 56199-11367, IranE-mail address: [email protected], [email protected]

Choonkil ParkResearch Institute for Natural Sciences, Hanyang University, Seoul, 133-791, Ko-

reaE-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

903 CHOONKIL PARK ET AL 899-903

Page 152: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

An iterative algorithm based on the hybrid

steepest descent method for strictly

pseudocontractive mappings

Jong Soo Jung

Department of Mathematics, Dong-A University, Busan 604-714, Korea

Abstract

In this paper, we consider a general iterative method based on the hybrid steepest descent method for findingfixed points of a strictly pseudocontractive mapping in a Hilbert space. Utilizing weaker control conditionsthan previous ones, we establish the strong convergence of the sequence generated by the proposed iterativemethod to a fixed point of the mapping, which is the unique solution of a certain variational inequality.

MSC: 47H09, 47H05, 47H10, 47J25, 49M05, 47J05..

Key words: Iterative algorithm; Strictly pseudocontractive mapping; Fixed points; Weakly

asymptotically regular; ρ-Lipschitzian and η-strongly monotone operator; Variational inequality

1 Introduction

Let H be a real Hilbert space with inner product 〈·, ·〉 and induced norm ‖ · ‖. Let C be anonempty closed convex subset of H and S : C → C be a self-mapping on C. We denoteby F (S) the set of fixed points of S.

The class of pseudocontractive mappings is one of the most important classes of mappingsamong nonlinear mappings. We recall that a mapping T : C → H is said to be k-strictlypseudocontractive if there exists a constant k ∈ [0, 1)such that

‖Tx− Ty‖2 ≤ ‖x− y‖2 + k‖(I − T )x− (I − T )y‖2, ∀x, y ∈ C.

Note that the class of k-strictly pseudocontractive mappings includes the class of nonex-pansive mappings as a subclass. That is, T is nonexpansive (i.e., ‖Tx − Ty‖ ≤ ‖x − y‖,∀x, y ∈ C) if and only if T is 0-strictly pseudocontractive. The mapping T is also said tobe pseudocontractive if k = 1 and T is said to be strongly pseudocontractive if there existsa constant ν ∈ (0, 1) such that T − νI is pseudocontractive. Clearly, the class of k-strictly

Email address: [email protected], [email protected] (Jong Soo Jung).

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

904 Jong Soo Jung 904-917

Page 153: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

pseudocontractive mappings falls into the one between classes of nonexpansive mappingsand pseudocontractive mappings. Also we remark that the class of strongly pseudocon-tractive mappings is independent of the class of k-strictly pseudocontractive mappings (see[1]). Recently, many authors have been devoting the studies on the problems of findingfixed points for pseudocontractive mappings, see, for example, [2–7] and the referencestherein.

In 2010, by combining Yamada’s method [8] and Marino and Xu’s method [9], Tian [10]considered the following explicit iterative scheme for the nonexpansive mapping S:

xn+1 = αnγV xn + (I − αnµF )Sxn, ∀n ≥ 0, (1.1)

where F : H → H is a ρ-Lipschitzian and η-strongly monotone operator with constantsρ > 0 and η > 0 (i.e., ‖Fx−Fy‖ ≤ ρ‖x−y‖ and 〈Fx−Fy, x−y〉 ≥ η‖x−y‖2, x, y ∈ H,respectively), V : H → H is an l-Lipschitzian mapping with a constant l ≥ 0, 0 < µ < 2η

ρ2

and 0 ≤ γl < τ = µ(η − µρ2

2 ). In particular, by using control conditions (i) αn ⊂ (0, 1),limn→∞ αn = 0, (ii)

∑∞n=0 αn = ∞, (iii) either

∑∞n=0 |αn+1−αn| < ∞ or limn→∞

αn+1

αn= 1

on αn, he proved that the sequence xn generated by (1.1) converges strongly to a fixedpoint x of S, which is the unique solution of the following variational inequality related tothe operator F :

〈µF x− γV x, x− p〉 ≤ 0, ∀p ∈ F (S). (1.2)

His results improved the results of Tian [11] from the case of the contractive mapping f aconstant α ∈ (0, 1) to the case of a Lipschitzian mapping V with a constant l ≥ 0.

In 2011, Ceng et al. [12] also considered the following explicit iterative schemes for thenonexpansive mapping S:

xn+1 = PC [αnγV xn + (I − αnµF )Sxn], ∀n ≥ 0, (1.3)

where PC is the metric projection of H ont C; F : C → H is a ρ-Lipschitzian and η-stronglymonotone operator with constants ρ > 0 and η > 0; V : C → H is an l-Lipschitzianmapping with a constant l ≥ 0; 0 < µ < 2η

ρ2 and 0 ≤ γl < τ = 1 −√

1− µ(2η − µρ2). Inparticular, by using the same control conditions on αn as in Tian [11,10], they provedthat the sequence xn generated by (1.3) converges strongly to a fixed point x of S, whichis the unique solution of the variational inequality (1.2). Their results also improved theresults of Tian [11] from the case of the contractive mapping f with a constant α ∈ (0, 1)to the case of a Lipschitzian mapping V with a constant l ≥ 0, and extended the range0 < γα < τ = µ(η − µρ2

2 ) in [10, Theorem 3.1 and Theorem 3.2] to the case of range0 < γl < τ = 1−

√1− µ(2η − µρ2).

In this paper, motivated by the above-mentioned results, we consider the following explicititerative scheme for a k-strictly pseudocontractive mapping T for some 0 ≤ k < 1:

xn+1 = αnγV xn + (I − αnµF )Tnxn, ∀n ≥ 0, (1.4)

where Tn : H → H is a mapping defined by Tnx = λnx + (1 − λn)Tx, ∀x ∈ H, with0 ≤ k ≤ λn ≤ λ < 1 and limn→∞ λn = λ. By using weaker control conditions than previousones, we establish the strong convergence of the sequence generated by the proposedscheme (1.4) to a fixed point of T , which is a solution of the variational inequality (1.2),where the constraint set is F (T ). The results in this paper improve and develop thecorresponding results given in [3,4,6,9–14] and references therein.

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

905 Jong Soo Jung 904-917

Page 154: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

2 Preliminaries and Lemmas

Throughout this paper, when xn is a sequence in E, xn → x (resp., xn x) will denotestrong (resp., weak) convergence of the sequence xn to x.

For every point x ∈ H, there exists a unique nearest point in C, denoted by PC(x), suchthat

‖x− PC(x)‖ ≤ ‖x− y‖, ∀y ∈ C.

PC is called the metric projection of H onto C. It is well known that PC is nonexpansiveand that for x ∈ H,

z = PCx ⇐⇒ 〈x− z, y − z〉 ≤ 0, ∀y ∈ C. (2.1)

It is also well known that H satisfies the Opial condition, that is, for any sequence xnwith xn x, the inequality

lim infn→∞ ‖xn − x‖ < lim inf

n→∞ ‖xn − y‖

holds for every y ∈ H with y 6= x.

Lemma 2.1. In a real Hilbert space H, the following inequality holds:

‖x + y‖2 ≤ ‖x‖2 + 2〈y, x + y〉, ∀x, y ∈ H.

Let LIM be a Banach limit. According to time and circumstances, we use LIMn(an)instead of LIM(a) for every a = an ∈ `∞. The following properties are well-known:

(i) for all n ≥ 1, an ≤ cn implies LIMn(an) ≤ LIMn(cn),

(ii) LIMn(an+N ) = LIMn(an) for any fixed positive integer N ,

(iii) lim infn→∞ an ≤ LIMn(an) ≤ lim supn→∞ an for all an ∈ l∞.

The following lemma was given in [15].

Lemma 2.2. Let a ∈ R be a real number and a sequence an ∈ l∞ satisfy the con-dition LIMn(an) ≤ a for all Banach limit LIM . If lim supn→∞(an+1 − an) ≤ 0, thenlim supn→∞ an ≤ a.

We also need the following lemmas for the proof of our main results.

Lemma 2.3 ([16]). Let sn be a sequence of non-negative real numbers satisfying

sn+1 ≤ (1− βn)sn + βnδn + rn, ∀n ≥ 0,

where βn, δn and rn satisfy the following conditions:

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

906 Jong Soo Jung 904-917

Page 155: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

(i) βn ⊂ [0, 1] and∑∞

n=0 βn = ∞,

(ii) lim supn→∞ δn ≤ 0 or∑∞

n=0 βn|δn| < ∞,

(iii) rn ≥ 0 (n ≥ 0),∑∞

n=0 rn < ∞.

Then limn→∞ sn = 0.

Lemma 2.4 ([17]). Let H be a Hilbert space and let C be a closed convex subset of H.Let T : C → H be a k-strictly pseudocontractive mapping on C. Then the following hold:

(i) The fixed point set F (T ) is closed convex, so that the projection PF (T ) is well defined.

(ii) F (PCT ) = F (T ).

(iii) If we define a mapping S : C → H by Sx = λx + (1 − λ)Tx for all x ∈ C. then, asλ ∈ [k, 1), S is a nonexpansive mapping such that F (T ) = F (S).

The following lemmas can be easily proven, and therefore, we omit the proofs (see [5,8]).

Lemma 2.5. Let H be a real Hilbert space. Let V : H → H be an l-Lipschitzian mappingwith a constant l ≥ 0, and F : H → H be a ρ-Lipschitzian and η-strongly monotoneoperator with constants ρ > 0 and η > 0. Then for 0 ≤ γl < µη,

〈(µF − γV )x− (µF − γV )y, x− y〉 ≥ (µη − γl)‖x− y‖2, ∀x, y ∈ C.

That is, µF − γV is strongly monotone with a constant µη − γl.

Lemma 2.6. Let H be a real Hilbert space H. Let F : H → H be a ρ-Lipschitzian andη-strongly monotone operator with constants ρ > 0 and η > 0. Let 0 < µ < 2η

ρ2 and0 < t < ς ≤ 1. Then S := ςI − tµF : H → H is a contractive mapping with a constantς − tτ , where τ = 1−

√1− µ(2η − µρ2).

Finally, we recall that the sequence xn in H is said to be weakly asymptotically regularif

w − limn→∞(xn+1 − xn) = 0, that is, xn+1 − xn 0

and asymptotically regular iflim

n→∞ ‖xn+1 − xn‖ = 0,

respectively.

3 Main results

Throughout the rest of this paper, we always assume as follows: Let H be a real Hilbertspace. Let T : H → H be a k-strictly pseudocontractive mapping with F (T ) 6= ∅ forsome 0 ≤ k < 1, let F : H → H be a ρ-Lipschitzain and η-strongly monotone operator

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

907 Jong Soo Jung 904-917

Page 156: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

with constants ρ > 0 and η > 0, and let V : H → H be an l-Lipschitzian mapping witha constant l ≥ 0. Let 0 < µ < 2η

ρ2 and 0 < γl < τ , where τ = 1 −√

1− µ(2η − µρ2).Let Tn : H → H be a mapping defined by Tnx = λnx + (1 − λn)Tx, ∀x ∈ H, where0 ≤ k ≤ λn ≤ λ < 1 and limn→∞ λn = λ. By Lemma 2.4, Tn is nonexpansive.

In this section, we consider the following explicit scheme which generates a sequence in anexplicit way:

xn+1 = αnγV xn + (I − αnµF )Tnxn, ∀n ≥ 0, (3.1)

where αn ⊂ (0, 1) and x0 ∈ H is an arbitrary initial guess, and establish strong con-vergence of this sequence to a fixed point x of T , which is the unique solution of thevariational inequality:

〈(µF − γV )x, x− p〉 ≤ 0, ∀p ∈ F (T ). (3.2)

First, we consider the following scheme that generates a net xtt∈(0,1) in an implicit way:

xt = tγV xt + (I − tµF )Ttxt, (3.3)

where Ttx = λtx + (1− λt)Tx, ∀x ∈ H, with 0 ≤ k ≤ λt ≤ λ < 1 and limt→0 λt = λ.

Indeed, for t ∈ (0, 1), consider a mapping Qt : H → H defined by

Qtx = tγV x + (I − tµF )Ttx, ∀x ∈ H.

It is easy to see that Qt is a contractive mapping with constant 1− t(τ − γl). Indeed, byLemma 2.6, we have

‖Qtx−Qty‖ ≤ tγ‖V x− V y‖+ ‖(I − tµF )Ttx− (I − tµF )Tty‖≤ tγl‖x− y‖+ (1− tτ)‖x− y‖= (1− t(τ − γl))‖x− y‖.

Hence Qt has a unique fixed point, denoted xt, which uniquely solves the fixed pointequation (3.3).

By utilizing the same method as in [10,12], we obtain the following theorem for strongconvergence of the net xt as t → 0, which guarantees the existence of solutions of thevariational inequality (3.2).

Theorem 3.1. The net xt defined via (3.3) converges strongly to a fixed point x of T ast → 0, which solves the variational inequality (3.2), equivalently, we have PF (T )(I − µF +γV )x) = x.

Proof. We first show the uniqueness of a solution of the variational inequality (3.2),which is indeed a consequence of the strong monotonicity of µF −γV . In fact, noting that0 ≤ γl < τ and µη ≥ τ ⇐⇒ ρ ≥ η, it follows from Lemma 2.5 that

〈(µF − γV )x− (µF − γV )y, x− y〉 ≥ (µη − γl)‖x− y‖2.

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

908 Jong Soo Jung 904-917

Page 157: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

That is, µF − γV is strongly monotone for 0 ≤ γl < τ ≤ µη. Suppose that x ∈ F (T ) andx ∈ F (T ) both are solutions to (3.2). Then we have

〈(µF − γV )x, x− x〉 ≤ 0 (3.4)

and〈(µF − γV )x, x− x〉 ≤ 0. (3.5)

Adding up (3.4) and (3.5) yields

〈(µF − γV )x− (µF − γV )x, x− x〉 ≤ 0.

The strong monotonicity of µF − γV implies that x = x and the uniqueness is proved.

Next, we prove that xt → x as t → 0. Observing F (T ) = F (Tt) by Lemma 2.4, from (3.3),we write, for given p ∈ F (T ),

xt − p = t(γV xt − µFp) + (I − tµF )Ttxt − (I − tµF )p

to derive that

‖xt − p‖2 = t〈γV xt − µFp, xt − p〉+ 〈(I − tµF )Ttxt − (I − tµF )Ttp, xt − p〉≤ (1− tτ)‖xt − p‖2 + t〈γV xt − µFp, xt − p〉.

It follows that‖xt − p‖2 ≤ 1

τ〈γV xt − µFp, xt − p〉

≤ 1τ[γl‖xt − p‖2 + 〈γV p− µFp, xt − p〉].

Therefore‖xt − p‖2 ≤ 1

τ − γl〈γV p− µFp, xt − p〉. (3.6)

From (3.6), it follows that

‖xt − p‖ ≤ 1τ − γl

‖γV p− µFp‖,

and so xt, V xt, Txt, Ttxt, Fxt and FTtxt are bounded. As a consequence,it follows that

limt→0

‖(I − Tt)xt‖ = limt→0

t‖γV xt − µFTtxt‖ = 0. (3.7)

Since xt is bounded as t → 0, we show that if tn is a subsequence in (0,1) suchthat tn → 0 and xtn x∗, then x∗ ∈ F (T ). To this end, define S : H → H by Sx =λx + (1− λ)Tx, ∀x ∈ H. Then S is nonexpansive with F (S) = F (T ) by Lema 2.4. Noticethat

‖Sxtn − xtn‖ ≤ ‖Sxtn − Ttnxtn‖+ ‖Ttnxtn − xtn‖≤ |λ− λtn |‖xtn − Txtn‖+ ‖xtn − Ttnxtn‖.

By (3.7) and λtn → λ, we have

limn→∞ ‖Sxtn − xtn‖ = 0.

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

909 Jong Soo Jung 904-917

Page 158: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Hence, if x∗ 6= Sx∗, then, by Opial condition, we have

lim infn→∞ ‖xtn − x∗‖ < lim inf

n→∞ ‖xtn − Sx∗‖≤ lim inf

n→∞ (‖xtn − Sxtn‖+ ‖Sxtn − Sx∗‖)≤ lim inf

n→∞ ‖xtn − x∗‖,

which is a contradiction. So x∗ ∈ F (S) = F (T ). Thus, by replacing p with x∗ in (3.6), weget xtn → x∗.

Finally, we prove that x∗ is a solution of the variational inequality (3.2). Since

xt = tγV xt + (I − tµF )Ttxt,

we have(µF − γV )xt = −1

t(I − Tt)xt + µ(Fxt − FTtxt).

From Ttp = p for p ∈ F (T ), it follows that

〈(µF − γV )xt, xt − p〉 = − 1t〈(I − Tt)xt − (I − Tt)p, xt − p〉

+ µ〈Fxt − FTtxt, xt − p〉≤ µ〈Fxt − FTtxt, xt − p〉

(3.8)

since I − Tt is monotone (i.e., 〈x − y, (I − Tt)x − (I − Tt)y〉 ≥ 0, x, y ∈ H, which isdue to the nonexpansivity of Tt). Now replacing t in (3.8) with tn and noticing thatFxtn − FTtnxtn → Fx∗ − Fx∗ = 0 as n →∞ for x∗ ∈ F (T ), we obtain

〈(µF − γV )x∗, x∗ − p〉 ≤ 0.

That is, x∗ ∈ F (T ) is a solution of the variational inequality (3.2); hence x∗ = x byuniqueness. In a summary, we have shown that each cluster point of xt (at t → 0)equals x. Therefore, xt → x as t → 0.

The variational inequality (3.2) can be rewritten as

〈(I − µF + γV )x− x, x− p〉 ≥ 0, ∀p ∈ F (T ).

By reminding Lemma 2.4 and (2.1), this is equivalent to the fixed point equation

PF (T )(I − µF + γV )x) = x. ¤

Remark 3.1. 1) Theorem 3.1 improves the case of the nonexpansive mapping S in The-orem 3.1 of Tian [10] (and Ceng et al. [12]) to the case of the k-strictly pseudocontractivemapping T .

2) Theorem 3.1 includes the corresponding results of Tian [11], Marino and Xu [9], Moudafi[13] and Xu [14] as some special cases.

First of all, we give the following result in order to establish strong convergence of thesequence generated by the explicit scheme (3.1).

Theorem 3.2. Let xn be the sequence generated iteratively by the scheme (3.1) and letLIM be a Banach limit. If αn satisfies the following condition:

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

910 Jong Soo Jung 904-917

Page 159: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

(C1) αn ⊂ (0, 1) and limn→∞ αn = 0,

thenLIMn(〈µF x− γV x, x− xn〉) ≤ 0,

where x = limt→0+ xt with xt being defined by

xt = tγV xt + (I − tµF )Sxt, (3.9)

and Sx = λx + (1− λ)Tx, ∀x ∈ H, with 0 ≤ k ≤ λ < 1.

Proof. First, note that from the condition (C1), without loss of generality, we assumethat αnτ < 1 for all n ≥ 0.

Let xt be the net generated by (3.9). By Theorem 3.1 with λt = λ for t ∈ (0, 1) andLemma 2.4, there exists limt→0 xt ∈ F (T ). Denote it by x. Moreover x is the uniquesolution of the variational inequality (3.2). By (3.9), we have

‖xt − xn+1‖ = ‖tγV xt + (I − tµF )Sxt − xn+1‖= ‖(I − tµF )Sxt − (I − tµF )xn+1 + t(γV xt − µFxn+1)‖.

Applying Lemma 2.1 and Lemma 2.6, we have

‖xt − xn+1‖2 ≤ (1− tτ)2‖Sxt − xn+1‖2 + 2t〈γV xt − µFxn+1, xt − xn+1〉. (3.10)

From the proof of Theorem 3.1, we know that xt, V xt, Txt, Sxt, FSxt andFxt are bounded.

Now we show that ‖xn − p‖ ≤ max‖x0 − p‖, ‖µFp−γV p‖τ−γl for all n ≥ 0 and all p ∈ F (T ).

Indeed, let p ∈ F (T ). Noticing p = Tnp, we have

‖xn+1 − p‖ = ‖αn(γV xn − µFp) + (I − αnµF )Tnxn − (I − αnµF )Tnp‖≤ (1− αnτ)‖xn − p‖+ αn‖γV xn − µFp‖≤ (1− αnτ)‖xn − p‖+ αn(‖γV xn − γV p‖+ ‖γV p− µFp‖)≤ [1− (τ − γl)αn]‖xn − p‖+ (τ − γl)αn

‖γV p− µFp‖τ − γl

≤ max‖xn − p‖, ‖γV p− µFp‖

τ − γl

.

Using an induction, we have ‖xn−p‖ ≤ max‖x0−p‖, ‖γV p−µFp‖τ−γl . Hence xn is bounded,

and so are V xn, Txn Tnxn, FTnxn, and Fxn. As a consequence of condition(C1), we get

‖xn+1 − Tnxn‖ = αn‖γV xn − µFTnxn‖ → 0 (n →∞).

From definitions of S and Tn with limn→∞ λn = λ, we deduce

‖Sxt − xn+1‖ ≤ ‖Sxt − Sxn‖+ ‖Sxn − Tnxn‖+ ‖Tnxn − xn+1‖≤ ‖xt − xn‖+ |λ− λn|‖xn − Txn‖+ ‖Tnxn − xn+1‖≤ ‖xt − xn‖+ |λ− λn|K1 + ‖Tnxn − xn+1‖= ‖xt − xn‖+ en,

,

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

911 Jong Soo Jung 904-917

Page 160: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

where K1 = sup‖xn − Txn‖ : n ≥ 0 and en = |λ − λn|K1 + ‖xn+1 − Tnxn‖ → 0 asn →∞. Also observing that F is η-strongly monotone, we have

〈µFxt − µFxn, xt − xn〉 ≥ µη‖xt − xn‖2 ≥ τ‖xt − xn‖2. (3.11)

So, by combining (3.10) and (3.11), we obtain

‖xt − xn+1‖2 ≤ (1− tτ)2(‖xt − xn‖+ en)2

+ 2t〈γV xt − µFxt, xt − xn+1〉+ 2t〈µFxt − µFxn+1, xt − xn+1〉≤ (t2τ − 2t)τ‖xt − xn‖2 + ‖xt − xn‖2

+ (1− tτ)2en(2‖xt − xn‖+ en)+ 2t〈γV xt − µFxt, xt − xn+1〉+ 2t〈µFxt − µFxn+1, xt − xn+1〉

≤ (t2τ − 2t)〈µFxt − µFxn, xt − xn〉+ ‖xt − xn‖2

+ en(K2 + en) + 2t〈γV xt − µFxt, xt − xn+1〉+ 2t〈µFxt − µFxn+1, xt − xn+1〉

= t2τ〈µFxt − µFxn, xt − xn〉+ ‖xt − xn‖2

+ en(K2 + en) + 2t〈γV xt − µFxt, xt − xn+1〉+ 2t(〈µFxt − µFxn+1, xt − xn+1〉 − 〈µFxt − µFxn, xt − xn〉),

(3.12)

where K2 = sup2‖xt−xn‖ : t, n ≥ 0. Applying the Banach limit LIM to (3.12) togetherwith limn→∞ en = 0, we have

LIMn(‖xt − xn+1‖2) ≤ t2τLIMn(〈µFxt − µFxn, xt − xn〉) + LIMn(‖xt − xn‖2)+ 2tLIMn(〈γV xt − µFxt, xt − xn+1〉)+ 2t[LIMn(〈µFxt − µFxn+1, xt − xn+1〉)

− LIMn(〈µFxt − µFxn, xt − xn〉)].

(3.13)

Using the property LIMn(an) = LIMn(an+1) of Banach limit in (3.12), we obtain

LIMn(〈µFxt − γV xt, xt − xn〉) = LIMn(〈µFxt − γV xt, xt − xn+1〉)≤ tτ

2LIMn(〈µFxt − µFxn, xt − xn〉)

+12t

[LIMn(‖xt − xn‖2)− LIMn(‖xt − xn‖2)]

+ [LIMn(〈µFxt − µFxn, xt − xn〉)− LIMn(〈µFxt − µFxn, xt − xn〉)]=

2LIMn(〈µFxt − µFxn, xt − xn〉).

(3.14)

Since

t〈µFxt − µFxn, xt − xn〉 ≤ tµρ‖xt − xn‖2

≤ tµρ(‖xt − p‖+ ‖p− xn‖)2

≤ tµρ

(‖γV p− µFp‖τ − γl

+ ‖x0 − p‖)2

→ 0 (as t → 0),

(3.15)

we conclude from (3.14) and (3.15) that

LIMn(〈µF x− γV x, x− xn)〉) ≤ lim supt→0

LIMn(〈µFxt − γV xt, xt − xn〉)

≤ lim supt→0

2LIMn(〈µFxt − µFxn, xt − xn〉) ≤ 0.

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

912 Jong Soo Jung 904-917

Page 161: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

This completes the proof. ¤

Now, using Theorem 3.2, we establish strong convergence of the sequence generated by theexplicit scheme (3.1) to a fixed point x of T , which is the unique solution of the variationalinequality (3.2).

Theorem 3.3. Let xn be the sequence generated iteratively by the scheme (3.1), whereαn satisfies the following conditions:

(C1) αn ⊂ (0, 1) and limn→∞ αn = 0.

(C2)∑∞

n=0 αn = ∞.

If xn is weakly asymptotically regular, then xn converges strongly to x ∈ F (T ), whereis the unique solution of the variational inequality (3.2).

Proof. First, note that from the condition (C1), without loss of generality, we assumethat αnτ < 1 and 2αn(τ−γl)

1−αnγl < 1 for all n ≥ 0.

Let xt be defined by (3.9), that is, xt = tγV xt + (I − tµF )Sxt for 0 < t < 1, whereSx = λx+(1−λ)Tx, ∀x ∈ H, with 0 ≤ k ≤ λ < 1, and let limt→0 xt := x ∈ F (S) = F (T )(by using Theorem 3.1 and Lemma 2.4). Then x is the unique solution of the variationalinequality (3.2).

We divides the proof several steps:

Step 1. We see that ‖xn−p‖ ≤ max‖x0−p‖, ‖γV p−µFp‖

τ−γl

for all n ≥ 0 and all p ∈ F (T )

as in the proof of Theorem 3.2. Hence xn is bounded and so are Tnxn, FTnxn andV xn.

Step 2. We show that lim supn→∞〈µF x− γV x, x− xn〉 ≤ 0. To this end, put

an := 〈µF x− γV x, x− xn)〉, ∀n ≥ 0.

Then Theorem 3.2 implies that LIMn(an) ≤ 0 for any Banach limit LIM . Since xn isbounded, there exists a subsequence xnj of xn such that

lim supn→∞

(an+1 − an) = limj→∞

(anj+1 − anj )

and xnj v ∈ H. This implies that xnj+1 v since xn is weakly asymptoticallyregular. Therefore, we have

w − limj→∞

(x− xnj+1) = w − limj→∞

(x− xnj ) = (x− v),

and so

lim supn→∞

(an+1 − an) = limj→∞

〈µF x− γV x, (x− xnj+1)− (x− xnj )〉 = 0.

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

913 Jong Soo Jung 904-917

Page 162: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Then Lemma 2.2 implies that lim supn→∞ an ≤ 0, that is,

lim supn→∞

〈µF x− γV x, x− xn)〉 ≤ 0.

Step 3. We show that limn→∞ ‖xn − x‖ = 0. By using (3.1), we have

xn+1 − x = αn(γV xn − µF x) + (I − αnµF )Tnxn − (I − αnµF )x.

Applying Lemma 2.1 and Lemma 2.6, we obtain

‖xn+1 − x‖2 = ‖(I − αnµF )Tnxn − (I − αnµF )x + αn(γV xn − µF x)‖2

≤ ‖(I − αnµF )Tnxn − (I − αnµF )Tnx‖2

+ 2αn〈γV xn − µF x, xn+1 − x〉≤ (1− αnτ)2‖xn − x‖2 + 2αn〈γV xn − γV x, xn+1 − x〉

+ 2αn〈γV x− µF x, xn+1 − x〉≤ (1− αnτ)2‖xn − x‖2 + αnγl(‖xn − x‖2 + ‖xn+1 − x‖2)

+ 2αn〈γV x− µF x, xn+1 − x〉.

(3.15)

It then follows from (3.15) that

‖xn+1 − x‖2 ≤ (1− αnτ)2 + αnγl

1− αnγl‖xn − x‖2 +

2αn

1− αnγl〈γV x− µF x, xn+1 − x〉

≤(

1− 2αn(τ − γl)1− αnγl

)‖xn − x‖2

+2αn(τ − γl)1− αnγl

(1

τ − γl〈γV x− µF x, xn+1 − x〉+

αnτ2

2(τ − γl)K3

),

(3.16)

where K3 = sup‖xn − x‖2 : n ≥ 0. Put

βn =2αn(τ − γl)1− αnγl

and δn =1

τ − γl〈µF x− γV x, x− xn+1〉+

αnτ2

2(τ − γl)K3.

From (C1), (C2) and Step 2, it follows that βn → 0,∑∞

n=0 βn = ∞ and lim supn→∞ δn ≤ 0.Since (3.16) reduces to

‖xn+1 − x‖2 ≤ (1− βn)‖xn − x‖2 + βnδn,

from Lemma 2.3 with rn = 0, we conclude that limn→∞ ‖xn − x‖ = 0. This completes theproof. ¤

Corollary 3.1. Let xn be the sequence generated iteratively by the scheme (3.1), whereαn satisfies the following conditions:

(C1) αn ⊂ (0, 1) and limn→∞ αn = 0.

(C2)∑∞

n=0 αn = ∞.

11

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

914 Jong Soo Jung 904-917

Page 163: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

If xn is asymptotically regular, then xn converges strongly to x ∈ F (T ), where is theunique solution of the variational inequality (3.2).

Remark 3.2. If αn and λn in Corollary 3.1 satisfy conditions (C1), (C2),

(C3)∑∞

n=0 |αn+1 − αn| < ∞; or

(C4) limn→∞ αnαn+1

= 1 or, equivalently, limn→∞αn−αn+1

αn+1= 0; or,

(C5) |αn+1 − αn| ≤ o(αn+1) + σn,∑∞

n=0 σn < ∞ (the perturbed control condition); and

(C6)∑∞

n=0 |λn+1 − λn| < ∞,

then the sequence xn generated by (3.1) is asymptotically regular. Now we give only theproof in case when αn satisfies the conditions (C1), (C2), (C5) and (C6). By Step 1 inthe proof of Theorem 3.3, there exists a constant K4 > 0 such that for all n ≥ 0,

µ‖FTnxn‖+ γ‖V xn‖ ≤ K4.

Next, we notice that

‖Tnxn − Tn−1xn−1‖ ≤ ‖Tnxn − Tnxn−1‖+ ‖Tnxn−1 − Tn−1xn−1‖≤ ‖xn − xn−1‖+ |λn − λn−1|‖xn−1 − Txn−1‖≤ ‖xn − xn−1‖+ |λn − λn−1|K5,

where K5 = sup‖xn − Txn‖ : n ≥ 0. So, we obtain, for all n ≥ 0,

‖xn+1 − xn‖= ‖(I − αnµF )Tnxn − (I − αnµF )Tn−1xn−1 + µ(αn − αn−1)FTn−1xn−1

+ γ[αn(V xn − V xn−1) + V xn−1(αn − αn−1)]‖≤ (1− αnτ)‖Tnxn − Tn−1xn−1‖+ µ|αn − αn−1|‖FTn−1xn−1‖

+ γ[αn[l‖xn − xn−1‖+ ‖V xn−1‖|αn − αn−1]≤ (1− αn(τ − γl))‖xn − xn−1‖+ |λn − λn−1|K5 + |αn − αn−1|K4

≤ (1− αn(τ − γl))‖xn − xn−1‖+ |λn − λn−1|K5 + (o(αn) + σn−1)K4.

(3.17)

By taking sn+1 = ‖xn+1 − xn‖, βn = αn(τ − γl), βnδn = o(αn)K4 and rn = σn−1K4 +|λn − λn−1|K5, from (3.17) we have

sn+1 ≤ (1− βn)sn + βnδn + rn.

Hence, by (C1), (C2), (C5), (C6) and Lemma 2.3, we obtain

limn→∞ ‖xn+1 − xn‖ = 0.

In view of this observation, we have the following:

Corollary 3.2. Let xn be the sequence generated iteratively by the scheme (3.1), whereαn and λn satisfy the conditions (C1), (C2), (C5) and (C6) (or the conditions (C1),(C2), (C3) and (C6), or the conditions (C1), (C2), (C4) and (C6)). Then xn convergesstrongly to x ∈ F (T ), where is the unique solution of the variational inequality (3.2).

Remark 3.3. 1) Theorem 3.3 extends Theorem 3.2 of Tian [10] and Ceng et al. [12] inthe following ways:

12

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

915 Jong Soo Jung 904-917

Page 164: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

(a) The nonexpansive mapping S in [10, 12, Theorem 3.2] is extended to the case of ak-strictly pseudocontractive mapping T .

(b) The condition∑∞

n=0 |αn+1−αn| < ∞ in [10, 12, Theorem 3.2] is relaxed to the weakasymptotic regularity on xn.

2) Theorem 3.3 also generalizes the corresponding results of Cho et al. [3], Jung [6] andMarino and Xu [9] in following aspects:

(a) A strongly positive bounded linear operator A in [3,6,9] is extended to the case ofa ρ-Lipschitzian and η-strongly monotone operator F . (In fact, from the definitions,it follows that a strongly positive bounded linear operator A (i.e., there exists aconstant γ > 0 with the property: 〈Ax, x〉 ≥ γ‖x‖2, x ∈ H) is a ‖A‖-Lipschitzianand γ-strongly monotone operator).

(b) The contractive mapping f with a constant α ∈ (0, 1) in [3,6,9] is extended to thecase of a Lipschizian mapping V with a constant l ≥ 0.

(c) The nonexpansive mapping S in [3,9] is extended to the case of a k-strictly pseudo-contractive mapping T .

(d) The condition∑∞

n=0 |αn+1 − αn| < ∞ in [3,9] is weakened to the weak asymptoticregularity on xn.

Acknowledgments

This research was supported by the Basic Science Research Program through the NationalResearch Foundation of Korea (NRF) funded by the Ministry of Education, Science andTechnology (2013021600).

References

[1] F. E. Browder and W. V. Petryshn, Construction of fixed points of nonlinear mappingsHilbert space, J. Math. Anal. Appl. 20 (1967) 197–228.

[2] G. L. Acedo and H. K. Xu, Iterative methods for strictly pseudo-contractions in Hilbertspace, Nonlinear Anal. 67 (2007) 2258–2271.

[3] Y. J. Cho, S. M. Kang and X. Qin, Some results on k-strictly pseudo-contractivemappings in Hilbert spaces, Nonlinear Anal. 70 (2009) 1956–1964.

[4] J. S. Jung, Strong convergence of iterative methods for k-strictly pseudo-contractivemappings in Hilbert spaces, Applied Math. Comput. 215 (2010) 3746-3753.

13

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

916 Jong Soo Jung 904-917

Page 165: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

[5] J. S. Jung, Some results on a general iterative method for k-strictly pseudo-contractivemappings, Fixed Point Theory Appl. 2011 (2011) 24 doi:10.1186/1687-1812-2011-24.

[6] J. S. Jung, A general iterative method with some control conditions for k-strictlypseudo-contractive mappings, J. Computat. Anal. Appl. 14 (2012) no. 6, 1165–1177.

[7] C. H. Morales and J. S. Jung, Convergence of paths for pseudo-contractive mappingsin Banach spaces, Proc. Amer. math. Soc. 128 (2000) 3411–3419.

[8] I. Yamada, The hybrid steepest descent method for the variational inequality problemsover the intersection of fixed points sets of nonexpansive mappings, in: D. Butnariu, Y.Censor, S. Reich (Eds), Inherently Parallel Algorithms in Feasibility and Optimizationanf Their Applications, Elservier, New York, 2001, pp. 473–504.

[9] G. Marino and H. X. Xu, A general iterative method for nonexpansive mappings inHilbert spaces, J. Math. Anal. Appl. 318 (2006) 43–52.

[10] M. Tian, A general iterative method based on the hybrid steepest descent schemefor nonexpansive mappings in Hilbert spaces, in Proceedings of the InternationalConefrence on Computational Intelligence and Soft ware Engineering (CiSE 2010),art. no. 5677064, 2010.

[11] M. Tian, A general iterative algorithm for nonexpansive mappings in Hilbert spaces,Nonlinear Anal. 73 (2010) 689–694.

[12] L.-C, Ceng, Q. H. Ansari, J.-C. Yao, Some iterative methods for finding fixed pointsand for solving constrained convex minimization problems, Nonlinear Anal. 74 (2011)5286–5302.

[13] A. Moudafi, Viscosity approximation methods for fixed-points problems, J. Math.Anal. Appl. 241 (2000) 46–55.

[14] H. K. Xu, Viscosity approximation methods for nonexpansive mappings, J. Math.Anal. Appl. 298 (2004) 279–291.

[15] N. Shioji and W. Takahashi, Strong convergence of approximated sequences fornonexpansive mappings in Banach spaces, Proc. Amer. Math. Soc. 125 (1997), no. 12,3641–3645.

[16] H. K. Xu, Iterative algorithms for nonlinear operators, J. London Math. Soc. 66 (2002)240–256.

[17] H. Zhou, Convergence theorems of fixed points for k-strict pseudo-contractions inHilbert spaces, Nonlinear Anal. 69 (2008) 456–462.

14

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

917 Jong Soo Jung 904-917

Page 166: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

BE-ALGEBRAS WITH ORDER REVERSING INVOLUTION

SUN SHIN AHN AND YOUNG HEE KIM∗ AND JUNG HEE PARK

Abstract. The notions of a filter’s radical and extended filter are introduced in BE-algebras.

Then some properties of filter’s radical and extended filter are obtained. Using a special set

x−1 ∗ F , we give an equivalent condition for a filter to be prime.

1. Introduction

In [6], H. S. Kim and Y. H. Kim introduced the notion of a BE-algebra. S. S. Ahn and K. S.

So [4, 5] introduced the notion of ideals in BE-algebras. S. S. Ahn et al. [2] fuzzified the concept

of BE-algebras and investigated some of their properties. Y. B. Jun and S. S. Ahn ([7]) provided

several degrees in defining a fuzzy filter and a fuzzy implicative filter. It was a generalization of

a fuzzy filter.

In this paper, we introduce the notions of a filter’s radical and an extended filter in BE-

algebras. Some properties of a filter’s radical and an extended filter are obtained. Using a special

set x−1 ∗ F , we obtain an equivalent condition for a filter to be a prime filter.

2. Preliminaries

An algebra (X; ∗, 1) of type (2, 0) is called a BE-algebra ([6]) if

(BE1) x ∗ x = 1 for all x ∈ X;

(BE2) x ∗ 1 = 1 for all x ∈ X;

(BE3) 1 ∗ x = x for all x ∈ X;

(BE4) x ∗ (y ∗ z) = y ∗ (x ∗ z) for all x, y, z ∈ X (exchange).

We introduce a relation “≤” on a BE-algebra X by x ≤ y if and only if x ∗ y = 1. A non-empty

subset S of a BE-algebra X is said to be a subalgebra of X if it is closed under the operation

“ ∗ ”. Note that x ∗ x = 1 for all x ∈ X. It is clear that 1 ∈ S. A BE-algebra (X; ∗, 1) is said to

be self distributive if x∗ (y ∗z) = (x∗y)∗ (x∗z) for all x, y, z ∈ X. A mapping f : X → Y of BE-

algebras is called a homomorphism if f(x ∗ y) = f(x) ∗ f(y) for any x, y ∈ X. A homomorphism

f of BE-algebras is called an epimorphism if f is onto. Note that if f is a homomorphism of

BE-algebras, then f(1) = 1.

∗ Corresponding author

2010 Mathematics Subject Classification. 06F35.

Key words and phrases. BE-algebra, filter’s radical, (prime, primary) filter.

Supported by Chungbuk National University Fund, 2013.1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

918 SUN SHIN AHN ET AL 918-926

Page 167: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

2 SUN SHIN AHN AND YOUNG HEE KIM∗ AND JUNG HEE PARK

Proposition 2.1([6]). Let (X; ∗, 1) be a self distributive BE-algebra. Then the following

hold: for any x, y, z ∈ X,

(i) if x ≤ y, then z ∗ x ≤ z ∗ y and y ∗ z ≤ x ∗ z,(ii) y ∗ z ≤ (z ∗ x) ∗ (y ∗ z),(iii) y ∗ z ≤ (x ∗ y) ∗ (x ∗ z).

A BE-algebra (X; ∗, 1) is said to be transitive if it satisfies Proposition 2.1(iii). If a BE-algebra

X is transitive, then Proposition 2.1(i) holds ([7]).

Definition 2.2. Let X be a BE-algebra and let ∅ = F ⊆ X of a BE-algebra X. F is called

a filter ([6]) of X if

(F1) 1 ∈ F ;

(F2) if x ∗ y, x ∈ F , then y ∈ F .

F is an implicative filter ([7]) of X if (F1) and

(F3) if x ∗ (y ∗ z) ∈ F and x ∗ y ∈ F , then x ∗ z ∈ F .

Note that every implicative filter is a filter in a BE-algebra.

Proposition 2.3. Let X be a BE-algebra and let F be a filter of X. If x ≤ y and x ∈ F for

any y ∈ F , then y ∈ F .

Definition 2.4. Let X be a BE-algebra X and ∅ = A ⊆ X. If B is the least filter containing

A in X, then B is called the filter generated by A and denoted by (A].

It is trivial to verify that

(A] = ∩B|A ⊆ B ⊆ X,B is a filter.

In what follows, (a] is denoted by (a] and [a1, a2, · · · , an, x] := a1 ∗ (a2 ∗ (· · · (an ∗ x) · · · )).Specially, [a, x]0 := x, [a, x]1 := a ∗ x, and [a, x]n := a ∗ (a ∗ (· · · ∗ (a︸ ︷︷ ︸

n

∗x) · · · )) (n ≥ 2).

Proposition 2.5([8]). Let X be a transitive BE-algebra and ∅ = A ⊆ X. Then

(A] = x ∈ X|∃a1, · · · an ∈ A, n ∈ N such that [a1, a2, · · · , an, x] = 1.

Definition 2.6([1]). Let X be a BE-algebra. X is said to be commutative if the following

identity holds

(C) (x ∗ y) ∗ y = (y ∗ x) ∗ x, i.e., x ∨ y = y ∨ x where x ∨ y = (y ∗ x) ∗ x,for all x, y ∈ X.

Theorem 2.7([1]). If (X; ∗, 1) is a commutative BE-algebra X, then it is a semilattice with

respect to ∨.

3. BE-algebra with order reversing involution

Definition 3.1. A BE-algebra (X; ∗, 1) is said to have an order reversing involution “ ′ ” if

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

919 SUN SHIN AHN ET AL 918-926

Page 168: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

BE-ALGEBRAS WITH ORDER REVERSING INVOLUTION 3

(i) if x ≤ y, then y′ ≤ x′ and (x′)′ = x;

(ii) 0 is the smallest element of X;

(iii) x ∗ y = y′ ∗ x′

for all x, y ∈ X, where 0′ := 1.

In what follows, let X denote a BE-algebra with order reversing involution ′ unless otherwise

specified.

Proposition 3.2. Suppose that X is a transitive BE-algebra with order reversing involution′. Then the following hold:

(i) x ∗ 0 = x′;

(ii) 0 ∗ x = 1;

(iii) x ≤ y ⇔ y ∗ z ≤ x ∗ z.for any x, y, z ∈ X.

Proof. (i) By Definition 3.1(iii), we have x ∗ 0 = 0′ ∗ x′ = 1 ∗ x′ = x′.

(ii) Let x ∈ X. Using Definition 3.1(iii) and (BE2), we get 0 ∗ x = x′ ∗ 0′ = x′ ∗ 1 = 1.

(iii) By Proposition 2.1(i), x ≤ y imply y ∗ z ≤ x ∗ z. Conversely, suppose that y ∗ z ≤ x ∗ z for

all x, y, z ∈ X. By Definition 3.1(i), we have x ∗ y = y′ ∗ x′ = (y ∗ 0) ∗ (x ∗ 0) = 1, proving that

x ≤ y. Theorem 3.3. Let X be a transitive BE-algebra and let a, b, x ∈ X.

(i) If a ≥ b, then [a, x]n ≤ [b, x]n for any n ∈ N;

(ii) If n,m ∈ N with n ≥ m, then [a, x]n ≥ [a, x]m;

(iii) [a, x]n ≥ x for any n ∈ N.

Proof. These conditions are trivial when n = 0 or m = 0.

(i) We use induction on n to show [a, x]n ≤ [b, x]n. If n = 1, then a ≥ b imply [a, x]1 = a ∗ x ≤[b, x]1 = b ∗ x. For n > 1, assume that [a, x]m ≤ [b, x]m for any m < n. Then

[a, x]n = a ∗ [a, x]n−1 ≤ a ∗ [b, x]n−1 ≤ b ∗ [b, x]n−1 = [b, x]n.

(ii) Suppose that n = m+ p. Then p ≥ 0. We use induction on p to show [a, x]m+p ≥ [a, x]m. If

p = 0, then [a, x]m+p ≥ [a, x]m holds. For p > 1, assume that [a, x]m+q ≥ [a, x]m for any q < p. It

follows that

[a, x]m+p = a ∗ [a, x]m+(p−1) ≥ a ∗ [a, x]m ≥ [a, x]m.

(iii) The proof is similar to (i). Theorem 3.4. Let X be a transitive BE-algebra and let a, b ∈ X. Then

(i) (a ∨ b] ⊆ (a] ∪ (b];

(ii) if a ≤ b, then (b] ⊆ (a].

Proof. (i) For any x ∈ (a ∨ b], there exists n ∈ N+ such that [a ∨ b, x]n = 1. Since a ≤ a ∨ b

and b ≤ a ∨ b, by Theorem 3.3(i), [a ∨ b, x]n ≤ [a, x]n and [a ∨ b, x]n ≤ [b, x]n. Hence [a, x]n = 1

and [b, x]n = 1, i.e., x ∈ (a] ∩ (b]. Therefore x ∈ (a] ∩ (b]. Thus (a ∨ b] ⊆ (a] ∩ (b].

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

920 SUN SHIN AHN ET AL 918-926

Page 169: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

4 SUN SHIN AHN AND YOUNG HEE KIM∗ AND JUNG HEE PARK

(ii) If x ∈ (b], then there exists n ∈ N+ such that [b, x]n = 1. Since a ≤ b imply [b, x]n ≤ [a, x]n,

we have [a, x]n = 1. Hence x ∈ (a].

Proposition 3.5. Let X1, X2 be BE-algebras with order reversing involution ′ and f : X1 →X2 be a homomorphism of BE-algebras. If f(0) = 0, then f(x′) = (f(x))′ for any x ∈ X.

Proof. For any x ∈ X1, we have f(x′) = f(x ∗ 0) = f(x) ∗ f(0) = f(x) ∗ 0 = (f(x))′.

Let X be a BE-algebra with an order reversing involution ′. For any x, y ∈ X, we define a

binary operation “⊕ ” as follows:

x⊕ y := x′ ∗ y.

For any a ∈ X and n ∈ N, we denote

(n+ 1)a := a⊕ (na).

Proposition 3.6. Let X be a BE-algebra with order reserving ′. Then for any a, b ∈ X and

m,n ∈ N+, we have

(i) a, b ≤ a⊕ b;

(ii) if m ≤ n, then ma ≤ na.

Proof. (i) By (BE4) and (BE2), we have b ∗ (a⊕ b) = b ∗ (a′ ∗ b) = a′ ∗ (b ∗ b) = a′ ∗ 1 = 1 and

so b ≤ a⊕ b. Since a ∗ (a⊕ b) = a ∗ (a′ ∗ b) = a ∗ (b′ ∗ (a′)′) = a ∗ (b′ ∗ a) = b′ ∗ (a ∗ a) = b′ ∗ 1 = 1,

we obtain a ≤ a⊕ b.

(ii) Using (i), we obtain na = ma⊕ (n−m)a ≥ ma. This completes the proof.

Proposition 3.7. Let X be a transitive BE-algebra with order reserving involution ′. Then,

for any a, b, c ∈ X, a ≤ b implies a⊕ c ≤ b⊕ c.

Proof. Let a ≤ b for any a, b ∈ X. By Definition 3.1(iii), we have b′ ≤ a′. Since X is transitive,

we obtain a′ ∗ c ≤ b′ ∗ c for any c ∈ X, proving that a⊕ c ≤ b⊕ c.

Let f : X1 → X2 be a homomorphism of BE-algebras with order reserving involution ′. We

define the dual kernel of f denoted by DKer f , as follows:

DKer f := x ∈ X1|f(x) = 12.

4. The filter’s radical in BE-algebras

Definition 4.1. Let J be a filter of X. A subset A := x ∈ X|∃n ∈ N such that nx ∈ J is

called a filter’s radical of J and we denote it by√J .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

921 SUN SHIN AHN ET AL 918-926

Page 170: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

BE-ALGEBRAS WITH ORDER REVERSING INVOLUTION 5

Example 4.2. LetX := 0, a, b, c, d, 1 be a set with 0′ = 1, a′ = c, b′ = d, c′ = a, d′ = b, 1′ = 0.

Define a binary operation ∗ as follows:

∗ 0 a b c d 1

0 1 1 1 1 1 1

a c 1 b c b 1

b d a 1 b a 1

c a a 1 1 a 1

d b 1 1 b 1 1

1 0 a b c d 1

Then (X; ∗,′ , 1, 0) is a BE-algebra with order reversing involution ′. Since 1 is a filter of X

and 2b = 1, na = a, nc = c, nd = a for all n ∈ N, we obtain√

1 = b, 1.

Theorem 4.3. Let J be a filter of a BE-algebra X. Then J ⊆√J .

Proof. Let x ∈ J . Then 1x = x ∈ J , i.e., ∃1 ∈ N such that 1x ∈ J . Hence x ∈√J . Thus

J ⊆√J .

Note that 1 ∈√J whenever J is a filter of a BE-algebra X.

Theorem 4.4. Let J1 and J2 be filters of a BE-algebra X with an order reversing involution′. Then the following hold:

(i) if J1 ⊆ J2, then√J1 ⊆

√J2;

(ii)√J1 ∩

√J2 =

√J1 ∩ J2;

(iii)√J1 ∪

√J2 ⊆

√(J1 ∪ J2];

(iv)√J1 ⊆

√(√J1].

Proof. (i) Let x ∈√J1. Then there exists n ∈ N such that nx ∈ J1 ⊆ J2. Hence x ∈

√J2.

Therefore√J1 ⊆

√J2.

(ii) Let x ∈√J1 ∩

√J2. Then there exist m,n ∈ N such that mx ∈ J1 and nx ∈ J2 and so

m,n ≤ m+n. By Proposition 3.6(ii), we have mx ≤ (m+n)x and n ≤ (m+n)x. Since mx ∈ J1and J1 is a filter of X, we get (m + n)x ∈ J1. Since nx ∈ J2 and J2 is a filter of X, we obtain

(m+ n)x ∈ J2. Hence x ∈√J1 ∩ J2. Therefore

√J1 ∩

√J2 ⊆

√J1 ∩ J2.

Since J1, J2 are filters of X, J1 ∩ J2 is a filter of X. Since J1 ∩ J2 ⊆ J1 and J1 ∩ J2 ⊆ J2, by

(i) we get√J1 ∩ J2 ⊆

√J1 and

√J1 ∩ J2 ⊆

√J2. Hence

√J1 ∩ J2 ⊆

√J1 ∩

√J2. Thus we have√

J1 ∩√J2 =

√J1 ∩ J2.

(iii) Let x ∈√J1 ∪

√J2. Then x ∈

√J1 or x ∈

√J2. Hence there exists n ∈ N such that

nx ∈ J1 or there exists m ∈ N such that mx ∈ J2. In any case, we have n ∈ N such that

nx ∈ J1 ∪ J2 ⊆ (J1 ∪ J2]. Thus x ∈√(J1 ∪ J2], i.e.,

√J1 ∪

√J2 ⊆

√(J1 ∪ J2].

(iv) It follows immediately from Theorem 4.3 and Theorem 4.4(i).

Corollary 4.5. Let J1, J2, · · · , Jn be an implicative filter of a BE-algebra X. If√J1 =

√J2 =

· · · =√Jn, then

√J1 =

√J1 ∩ · · · Jn.

Proof. Using Theorem 4.4(ii), we have√J1 =

√J1 ∩ · · · ∩

√Jn =

√J1 ∩ · · · ∩ Jn.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

922 SUN SHIN AHN ET AL 918-926

Page 171: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

6 SUN SHIN AHN AND YOUNG HEE KIM∗ AND JUNG HEE PARK

The relations between the generated filters and their radicals are discussed as follows.

Proposition 4.6. Let X be a transitive BE-algebra and let a, b ∈ X. Then the following

hold:

(i) if a ≤ b, then√(b] ⊆

√(a];

(ii)√(a ∨ b] ⊆

√(a] ∩ (b].

Proof. (i) If a ≤ b, then using Theorem 3.4(ii) we have (b] ⊆ (a]. By Theorem 4.4(i), we have√(b] ⊆

√(a].

(ii) Since (a ∨ b] ⊆ (a] ∩ (b], by Theorem 4.4(i), we obtain√(a ∨ b] ⊆

√(a] ∩ (b].

Theorem 4.7. Let J be an implicative filter of a transitive BE-algebra X with order reversing

involution ′. Then, for any n ∈ N and for any a ∈ X, na ∈ J implies a ∈ J .

Proof. Use an induction on n. If n = 1, then it is trivial. Suppose the conclusion holds for

p < n+1 and (n+1)a ∈ J . Then a′ ∗ (a′ ∗ (n−1)a) = a′ ∗na = (n+1)a ∈ J . Since a′ ∗a′ = 1 ∈ J

and J is an implicative filter of X, we have na = a′ ∗ (n− 1)a ∈ J . By assumption, a ∈ J . Theorem 4.8. Let J be an implicative filter of a transitive BE-algebra X with order reversing

involution ′. Then J =√J .

Proof. By Theorem 4.3, J ⊆√J . Let x ∈

√J . Then there exists n ∈ N such that nx ∈ J .

Using Theorem 4.7, we have x ∈ J . Hence√J ⊆ J . Thus J =

√J .

Theorem 4.9. Let X1, X2 be BE-algebras with order reversing involution ′. Let f : X1 → X2

be a homomorphism of BE-algebras. If f(0) = 0, then for any n ∈ N, f(nx) = nf(x) for any

x ∈ X1.

Proof. We use the induction on n to prove the conclusion. If n = 1, the conclusion is trivial.

Now suppose that n > 1 and the conclusion holds for n. Then, by Proposition 3.5, we obtain

f((n+ 1)x) =f(x⊕ nx) = f(x′ ∗ nx)=f(x′) ∗ f(nx) = (f(x))′ ∗ nf(x)=f(x)⊕ nf(x) = (n+ 1)f(x),

i.e., the conclusion holds for n+ 1. Theorem 4.10. Let (X1, ∗1, ′

1, 01, 11) and (X2, ∗2, ′2, 02, 12) be BE-algebras with order revers-

ing involutions ′i. Let f : X1 → X2 be an epimorphism of BE-algebras. If J is a filter of X1 such

that DKer f ⊆ J , then f(J) is a filter of X2.

Proof. Suppose that J is a filter of X1 such that DKer f ⊆ J . Then 11 ∈ J and so 12 =

f(x) ∗2 f(x) = f(x ∗1 x) = f(11) ∈ f(J).

Assume that y∗2z ∈ f(J) and y ∈ f(J) for any y, z ∈ X2. Then there exist x,w ∈ J and v ∈ X1

such that f(x) = y ∗2 z, f(w) = y and f(v) = z. Hence f(x ∗1 (w ∗1 v)) = f(x) ∗2 (f(w ∗1 v)) =(y ∗2 z) ∗2 (f(w) ∗2 f(v)) = (y ∗2 z) ∗2 (y ∗2 z) = 12 and so x ∗1 (w ∗1 v) ∈ DKer f . Using

DKer f ⊆ J , we have x ∗1 (w ∗1 v) ∈ J . Since x ∈ J and J is a filter of X, we get w ∗1 v ∈ J .

Using w ∈ J , we obtain v ∈ J . Therefore z = f(v) ∈ f(J). Thus f(J) is a filter of X2.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

923 SUN SHIN AHN ET AL 918-926

Page 172: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

BE-ALGEBRAS WITH ORDER REVERSING INVOLUTION 7

Proposition 4.11. Let (X1, ∗1, ′1, 01, 11) and (X2, ∗2, ′

2, 02, 12) be BE-algebras with order

reversing involutions ′i. Let f : X1 → X2 be an epimorphism of BE-algebras with f(0) = 0. If J

is a filter of X1 such that DKer f ⊆ J , then f(√J) =

√f(J).

Proof. Let J be a filter of X1 such that DKer f ⊆ J . By Theorem 4.10, f(J) is a filter of X2.

If y ∈ f(√J), then there exists x ∈

√J such that f(x) = y. Since x ∈

√J , there exists n ∈ N

such that nx ∈ J . Using Theorem 4.9, we have f(nx) = nf(x) = ny ∈ f(J). Hence y ∈√f(J).

Therefore f(√J) ⊆

√f(J).

Conversely, let y ∈√f(J). Then there exists n ∈ N such that ny ∈ f(J). Since f is an

epimorphism, there exists x ∈ X1 such that f(x) = y. Hence f(nx) = nf(x) = ny ∈ f(J) and so

there exists z ∈ J such that f(z) = f(nx). Therefore f(z∗1nx) = f(z)∗2f(nx) = f(z)∗2f(z) = 12and so z ∗ nx ∈ DKer f ⊆ J . Since z ∈ J and J is a filter of X1, we obtain nx ∈ J . Hence

x ∈√J and so y = f(x) ∈ f(

√J). Therefore

√f(J) ⊆ f(

√J). This completes the proof.

Theorem 4.12. Let (X1, ∗1, ′1, 01, 11) and (X2, ∗2, ′

2, 02, 12) be BE-algebras with order revers-

ing involutions ′i. Let f : X1 → X2 be a homomorphism of BE-algebras. If J is a filter of X2,

then f−1(J) is a filter of X1. Furthermore, if f(01) = 02, then f−1(√J) =

√f−1(J).

Proof. Let J be a filter of X2. Let x ∗1 y, x ∈ f−1(J). Then f(x ∗1 y) = f(x) ∗2 f(y) ∈ J and

f(x) ∈ J . Since J is a filter of X2, we have f(y) ∈ J and so y ∈ f−1(J). Since f(11) = 12 ∈ J ,

we obtain 11 ∈ f−1(J). Therefore f−1(J) is a filter of X1.

We assume that f(01) = 02. Let x ∈ f−1(√J). Then f(x) ∈

√J and so there exists n ∈ N

such that nf(x) = f(nx) ∈ J . Hence nx ∈ f−1(J). Therefore x ∈√

f−1(J). Thus f−1(√J) ⊆√

f−1(J).

Conversely, let x ∈√f−1(J). Then there exists n ∈ N such that nx ∈ f−1(J). Hence f(nx) =

nf(x) ∈ J and so f(x) ∈√J . Therefore x ∈ f−1(

√J). Thus

√f−1(

√J) ⊆ f−1(

√J).

5. The extended filter in BE-algebras

For any non-empty subset F of X and x ∈ X, we define

x−1 ∗ F := y ∈ X|x ∨ y ∈ F.

Note that if F is a filter of X, then 1 ∈ x−1 ∗ F .

Proposition 5.1. Let X be a transitive commutative BE-algebra. If F is a filter of X, then

x−1 ∗ F is a filter of X containing F .

Proof. Let y ∈ x−1 ∗ F and y ∗ z ∈ x−1 ∗ F . Then x ∨ y ∈ F and x ∨ (y ∗ z) ∈ F . Now

(x∨y)∗(x∨z) = ((y∗x)∗x))∗((z∗x)∗x) ≥ (z∗x)∗(y∗x) ≥ y∗z and (x∨y)∗(x∨z) ≥ x∨z ≥ x.

It follows form Theorem 2.6 that x∨ (y ∗ z) ≤ (x∨ y) ∗ (x∨ z) so that (x∨ y) ∗ (x∨ z) ∈ F . Using

the fact F is a filter of X and x ∨ y ∈ F , we get x ∨ z ∈ F , i.e., z ∈ x−1 ∗ F . Thus x−1 ∗ F is a

filter of X.

Let y ∈ F . Since y ≤ x ∨ y, it follows that x ∨ y ∈ F , i.e., y ∈ x−1 ∗ F . Hence F ⊆ x−1 ∗ F .

This completes the proof.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

924 SUN SHIN AHN ET AL 918-926

Page 173: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

8 SUN SHIN AHN AND YOUNG HEE KIM∗ AND JUNG HEE PARK

Proposition 5.2. Let F and G be filters of a BE-algebra X. Then the following hold: for

any x, y ∈ X,

(i) x−1 ∗ F = X if and only if x ∈ F ;

(ii) F ⊆ G imply x−1 ∗ F ⊆ y−1 ∗ F ;

(iii) x−1 ∗ (F ∩G) = (x−1 ∗ F ) ∩ (x−1 ∗G) and x−1 ∗ (F ∪G) = (x−1 ∗ F ) ∪ (x−1 ∗G).

Proof. (i) Let x ∈ F . Since x ≤ (y ∗ x) ∗ x = x ∨ y, we have x ∨ y ∈ F for all y ∈ X, i.e.,

y ∈ x−1 ∗ F . Thus x−1 ∗ F = X. Conversely, assume that x−1 ∗ F = X. Then x ∨ y ∈ F for all

y ∈ X. In particular x = x ∨ x ∈ F .

(ii) Assume that F ⊆ G. If z ∈ x−1 ∗ F , then x ∨ z ∈ F ⊆ G, i.e., x ∨ z ∈ G. Hence z ∈ x−1 ∗G.

Thus x−1 ∗ F ⊆ x−1 ∗G.

(iii) For any x, z ∈ X we have

z ∈ x−1 ∗ (F ∩G) ⇔ x ∨ z ∈ F ∩G

⇔ x ∨ z ∈ F and x ∨ z ∈ G

⇔ z ∈ x−1 ∗ F and z ∈ x−1 ∗G⇔ z ∈ (x−1 ∗ F ) ∩ (x−1 ∗G)

and

z ∈ x−1 ∗ (F ∪G) ⇔ x ∨ z ∈ F ∪G

⇔ x ∨ z ∈ F or x ∨ z ∈ G

⇔ z ∈ x−1 ∗ F or z ∈ x−1 ∗G⇔ z ∈ (x−1 ∗ F ) ∪ (x−1 ∗G).

This completes the proof. Definition 5.3. A proper filter of a BE-algebra X is said to be prime if for any x, y ∈ X,

x ∨ y ∈ P implies x ∈ P or y ∈ P .

Proposition 5.4. Let P and F be filters ofX such that F ⊆ P . If P is prime, then x−1∗F ⊆ P

for all x ∈ X \ P .

Proof. Let z ∈ x−1 ∗ F for all x ∈ X \ P . Then x ∨ z ∈ F ⊆ P . Since P is prime and x /∈ P ,

we have z ∈ P , i.e., x−1 ∗ F ⊆ P . Proposition 5.5. If P is a prime filter of X, then X \ P is ∨-closed, i.e., x ∨ y ∈ X \ P

whenever x ∈ X \ P and y ∈ X \ P .

Proof. Straightforward. Theorem 5.6. Let X be a transitive commutative BE-algebra. A filter P of X is prime if

and only if x−1 ∗ P = P for all X \ P .

Proof. Suppose that P is a prime filter of X. Let x ∈ X \ P . The conclusion P ⊆ x−1 ∗ P

follows from Proposition 5.1. If y ∈ x−1 ∗ P , then x ∨ y ∈ P . Since P is a prime filter of X, we

have y ∈ P . Hence x−1 ∗ P ⊆ P . Thus x−1 ∗ P = P .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

925 SUN SHIN AHN ET AL 918-926

Page 174: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

BE-ALGEBRAS WITH ORDER REVERSING INVOLUTION 9

Conversely, assume that x−1 ∗ P = P for all x ∈ X \ P . Let y ∨ z ∈ P and z /∈ P . By the

hypothesis, z−1 ∗ P = P . Hence y ∈ z−1 ∗ P = P . Thus P is prime. Definition 5.7. Let P be a filter of a BE-algebra X. P is called a primary filter of X if

x ∨ y ∈ P and x /∈ P ⇒ ∃n ∈ N such that ny ∈ P, for any x, y ∈ X.

Theorem 5.8. Let X be a transitive commutative BE-algebra and let J be a filter of X. If

x−1 ∗ J = J, ∀x /∈ J , then J is a primary filter of X.

Proof. By Definition 5.7, a prime filter is a primary filter. Suppose that x−1 ∗ J = J , ∀x /∈ J .

Using Theorem 5.6, J is a prime filter of X. Hence J is a primary filter of X. Theorem 5.9. Let X be a transitive commutative BE-algebra. If J is a filter of X, then

J = ∩x∈Xx−1 ∗ J.

Proof. By Proposition 5.1, J ⊆ x−1 ∗ J for all x ∈ X. Hence J ⊆ ∩x∈Xx−1 ∗ J.

Assume that y ∈ ∩x∈Xx−1 ∗ J . Then y ∈ y−1 ∗ J and so y ∈ J . Hence ∩x∈Xx

−1 ∗ J ⊆ J . This

completes the proof.

References

[1] S. S. Ahn, Y. H. Kim and J. M. Ko, Filters in commutative BE-algebras, Commun. Korean Math. Soc. 27

(2012), 233-242.

[2] S. S. Ahn, Y. H. Kim and K. S. So, Fuzzy BE-algebras, J. Appl. Math. and Informatics 29 (2011), 1049-1057.

[3] S. S. Ahn and J. M. Ko, On vague filters in BE-algebras, Commun. Korean Math. Soc. 26 (2011), 417-425.

[4] S. S. Ahn and K. K. So, On ideals and upper sets in BE-algebras, Sci. Math. Japon. 68 (2008), 279-285.

[5] S. S. Ahn and K. K. So, On generalized upper sets in BE-algebras, Bull. Korean Math. Soc. 46 (2009),

281-287.

[6] H. S. Kim and Y. H. Kim, On BE-algebras, Sci. Math. Japon. 66 (2007), 113-116.

[7] Y. B. Jun and S. S. Ahn, Fuzzy implicative filters of BE-algebras with degrees in the interval (0, 1], J.

Computational Analsis and Applications 15(2013), 1456-1466.

[8] B. L. Meng, On filters in BE-algebras, Sci. Math. Jpn. Online (e-2010), 105-111.

Sun Shin Ahn, Department of Mathematics Education, Dongguk University, Seoul, 100-715,

Korea

E-mail address: [email protected]

Young Hee Kim, Department of Mathematics, Chungbuk National University, Chongju, 361-763,

Korea

E-mail address: [email protected]

Jung Hee Park, Department of Mathematics, Chungbuk National University, Chongju, 361-763,

Korea

E-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

926 SUN SHIN AHN ET AL 918-926

Page 175: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

SYMMETRY p-ADIC INVARIANT INTEGRAL ON Zp FOR

q-EULER POLYNOMIALS

DAE SAN KIM, TAEKYUN KIM, SANG-HUN LEE AND JONG-JIN SEO

Abstract. In this paper, we investigate several further interesting propertiesof symmetry for the p-adic fermionic integral on Zp. By using this symmetry

of fermionic p-adic integral on Zp, we give some relations of symmetry betweenthe power sum q-polynomials and q-Euler polynomials.

1. Introduction

Let p be a fixed odd prime number. Throughout this paper, Zp, Qp and Cp will,respectively, denote the ring of p-adic rational integers, the field of p-adic rationalnumbers and the completion of algebraic closure of Qp.

Let vp be the normalized exponential valuation of Cp with |p|p = p−vp(p) = 1p .

When one talks of q-extension, q is variously considered as an indeterminate, acomplex number q ∈ C or p-adic number q ∈ Cp. If q ∈ C, one normally assumes|q| < 1; if q ∈ Cp, one normally assumes |1− q|p < 1. We use the notation for

q-number as [x]q = 1−qx

1−q . Note that limq→1

[x]q = x. As is well known, the Euler

polynomials are defined by the generating function to be

(1)2

et + 1ext = eE(x)t =

∞∑n=0

En (x)tn

n!,

with the usual convention about replacing En (x) by En (x) (see [1-13]).When x = 0, En = En (0) are called the Euler numbers.From (1), we note that

(E + 1)n+ En = 2δ0,n, (n ≥ 0) ,

and

En (x) =n∑

l=0

(n

l

)xn−lEl,

(see [1, 4, 7, 9]).Recently, Kim considered a q-extension of Euler polynomials (called q-Euler

polynomials) as follows :

(2) 2∞∑

m=0

(−1)me[m+x]qt =

∞∑n=0

En,q (x)tn

n!,

(see [6]).1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

927 DAE SAN KIM ET AL 927-932

Page 176: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

SYMMETRY p-ADIC INVARIANT INTEGRAL ON Zp FOR q-EULER POLYNOMIALS 2

From (2), we can derive

En,q (x) =2

(1− q)n

n∑l=0

(n

l

)(−1)

l

1 + qlqlx(3)

= 2∞∑

m=0

(−1)m[m+ x]

nq .

When x = 0, En,q = En,q (0) are called q-Euler numbers.By (2), we easily get

(qEq + 1)n+ En,q = 2δn,0,

with the usual convention about replacing Enq by En,q.

Let C (Zp) be the space of continuous functions on Zp.For f ∈ C (Zp), the fermionic p-adic integral on Zp is defined by Kim as follows

:

(4) I−1 (f) =

ˆZp

f (x) dµ−1 (x) = limN→∞

pN−1∑x=0

f (x) (−1)x,

(see [4, 5]).From (4), we note that

(5)

ˆZp

f (x+ n) dµ−1 (x) + (−1)n−1ˆZp

f (x) dµ−1 (x) = 2

n−1∑l=0

(−1)n−1−l

f (l) ,

whre n ∈ N (see [1, 3, 4, 5]).By (5), we get

(6)

ˆZp

e(x+y)tdµ−1 (y) =2

et + 1ext =

∞∑n=0

En (x)tn

n!.

From (6), we have

(7)

ˆZp

(x+ y)ndµ−1 (y) = En (x) , (n ≥ 0) .

In [4], some relations of symmetry between the power sum polynomials andEuler polynomials were given by (7) and finding a q-extension of symmetry p-adicinvariant integral on Zp for q-Euler polynomials was remained as an open question.

In this paper, we investigate several further interesting properties of symmetryfor the p-adic fermionic p-adic integral on Zp, and give some relations of symmetrybetween the power sum q-polynomials and q-Euler polynomials.

Recently, several authors have studied the identities of symmetry and q-extensionsof Euler polynomials (see [1-13]).

2. Identities of symmetry of the q-Euler polynomials

From (4) and (5), we can derive the following equation :

(8)

ˆZp

e[x+y]qtdµ−1 (y) = 2∞∑

m=0

(−1)me[m+x]qt.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

928 DAE SAN KIM ET AL 927-932

Page 177: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

SYMMETRY p-ADIC INVARIANT INTEGRAL ON Zp FOR q-EULER POLYNOMIALS 3

By (2) and (8), we get

(9)∞∑

n=0

ˆZp

[x+ y]nq dµ−1 (y)

tn

n!=

∞∑n=0

En,q (x)tn

n!.

By comparing coefficients on the both sides of (9), we get

ˆZp

[x+ y]nq dµ−1 (y) = En,q (x)(10)

= 2∞∑

m=0

(−1)m[m+ x]

nq

=2

(1− q)n

n∑l=0

(n

l

)(−1)

lqlx

1

1 + ql.

Let w1, w2 ∈ N with w1 ≡ 1 (mod 2) and w2 ≡ 1 (mod 2).Then we observe that

ˆZp

e[w1]q

[w2x+

w2w1

j+y]qw1

tdµ−1 (y)(11)

=

ˆZp

e[w1w2x+w2j+w1y]qtdµ−1 (y)

= limN→∞

pN−1∑y=0

e[w1w2x+w2j+w1y]qt (−1)y

= limN→∞

w2−1∑i=0

pN−1∑y=0

e[w1w2x+w2j+w1(i+w2y)]qt (−1)i+w2y .

From (11), we note that

w1−1∑j=0

(−1)jˆZp

e[w1]q

[w2x+

w2w1

j+y]qw1

tdµ−1 (y)(12)

= limN→∞

w1−1∑j=0

w2−1∑i=0

pN−1∑y=0

(−1)i+j+y

e[w1w2(x+y)+w2j+w1i]qt.

By the same method as (12), we get

w2−1∑j=0

(−1)jˆZp

e[w2]q

[w1x+

w1w2

j+y]qw2

tdµ−1 (y)(13)

= limN→∞

w2−1∑j=0

w1−1∑i=0

pN−1∑y=0

(−1)i+j+y

e[w1w2(x+y)+w1j+w2i]qt.

Therefore, by (12) and (13), we obtain the following theorem.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

929 DAE SAN KIM ET AL 927-932

Page 178: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

SYMMETRY p-ADIC INVARIANT INTEGRAL ON Zp FOR q-EULER POLYNOMIALS 4

Theorem 1. For w1, w2 ∈ N with w1 ≡ 1 (mod 2) and w2 ≡ 1 (mod 2), we have

w1−1∑j=0

(−1)jˆZp

e[w1]q

[w2x+

w2w1

j+y]qw1

tdµ−1 (y)

=

w2−1∑j=0

(−1)jˆZp

e[w2]q

[w1x+

w1w2

j+y]qw2

tdµ−1 (y) .

Corollary 2. For n ≥ 0, we have

[w1]nq

w1−1∑j=0

(−1)jˆZp

[w2x+

w2

w1j + y

]nqw1

dµ−1 (y)

= [w2]nq

w2−1∑j=0

(−1)jˆZp

[w1x+

w1

w2j + y

]nqw2

dµ−1 (y) .

By (9) and Corollary 2, we obtain the following theorem.

Theorem 3. For n ≥ 0 and w1, w2 ∈ N with w1 ≡ 1 (mod 2) and w2 ≡ 1 (mod 2),we have

[w1]nq

w1−1∑j=0

(−1)jEn,qw1

(w2x+

w2

w1j

)

= [w2]nq

w2−1∑j=0

(−1)jEn,qw2

(w1x+

w1

w2j

).

From (10), we note thatˆZp

[w2x+

w2

w1j + y

]nqw1

dµ−1 (y)(14)

=

n∑i=0

(n

i

)([w2]q[w1]q

)i

[j]iqw2 q

w2(n−i)j

ˆZp

[w2x+ y]n−iqw1 dµ−1 (y)

=n∑

i=0

(n

i

)([w2]q[w1]q

)i

[j]iqw2 q

w2(n−i)jEn−i,qw1 (w2x) .

Thus, by (14), we get

[w1]nq

w1−1∑j=0

(−1)jˆZp

[w2x+

w2

w1j + y

]nqw1

dµ−1 (y)(15)

=

n∑i=0

(n

i

)[w1]

n−iq [w2]

iq

w1−1∑j=0

(−1)j[j]

iqw2 q

w2(n−i)jEn−i,qw1 (w2x)

=n∑

i=0

(n

i

)[w1]

n−iq [w2]

iq Sn,i,qw2 (w1)En−i,qw1 (w2x) ,

where Sn,i,q (w1) =

w1−1∑j=0

(−1)jq(n−i)j [j]

iq .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

930 DAE SAN KIM ET AL 927-932

Page 179: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

SYMMETRY p-ADIC INVARIANT INTEGRAL ON Zp FOR q-EULER POLYNOMIALS 5

By the same method as (15), we get

[w2]nq

w2−1∑j=0

(−1)jˆZp

[w1x+

w1

w2j + y

]nqw2

dµ−1 (y)(16)

=n∑

i=0

(n

i

)[w1]

iq [w2]

n−iq Sn,i,qw1 (w2)En−i,qw2 (w1x) .

Therefore, by Corollary 2, (15) and (16), we obtain the following theorem.

Theorem 4. For n ≥ 0 and w1, w2 ∈ N with w1 ≡ 1 (mod 2) and w2 ≡ 1 (mod 2),we have

n∑i=0

(n

i

)[w1]

n−iq [w2]

iq En−i,qw1 (w2x)Sn,i,qw2 (w1)

=n∑

i=0

(n

i

)[w1]

iq [w2]

n−iq En−i,qw2 (w1x)Sn,i,qw1 (w2) ,

where Sn,i,q (w) =w−1∑j=0

(−1)jq(n−i)j [j]

iq.

ACKNOWLEDGEMENTS. The present Research has been conducted by theResearch Grant of Kwangwoon University in 2014 and the first author was sup-ported by the National Research Foundation of Korea(NRF) grant funded by theKorea government(MOE) (No.2012R1A1A2003786 ).

References

1. S. Araci, M. Acikgoz, and J. J. Seo, Explicit formulas involving q-Euler numbers and polyno-mials, Abstr. Appl. Anal. (2012), Art. ID 298531, 11.

2. I. N. Cangul, V. Kurt, H. Ozden, and Y. Simsek, On the higher-order w-q-Genocchi numbers,

Adv. Stud. Contemp. Math. (Kyungshang) 19 (2009), no. 1, 39–57.3. D.S. Kim, N. Lee, J. Na, and K. H. Park, Identities of symmetry for higher-order Euler

polynomials in three variables (I), Adv. Stud. Contemp. Math. (Kyungshang) 22 (2012),no. 1, 51–74.

4. T. Kim, Symmetry p-adic invariant integral on Zp for Bernoulli and Euler polynomials, J.Difference Equ. Appl. 14 (2008), no. 12, 1267–1277.

5. , Symmetry of power sum polynomials and multivariate fermionic p-adic invariantintegral on Zp, Russ. J. Math. Phys. 16 (2009), no. 1, 93–96.

6. , Barnes-type multiple q-zeta functions and q-Euler polynomials, J. Phys. A 43 (2010),no. 25, 255201, 11.

7. , An identity of the symmetry for the Frobenius-Euler polynomials associated with thefermionic p-adic invariant q-integrals on Zp, Rocky Mountain J. Math. 41 (2011), no. 1,

239–247.8. Y.-H. Kim and K.-W. Hwang, Symmetry of power sum and twisted Bernoulli polynomials,

Adv. Stud. Contemp. Math. (Kyungshang) 18 (2009), no. 2, 127–133.9. H. Ozden, Y. Simsek, S.-H. Rim, and I. N. Cangul, A note on p-adic q-Euler measure, Adv.

Stud. Contemp. Math. (Kyungshang) 14 (2007), no. 2, 233–239.10. S.-H. Rim and J. Jeong, On the modified q-Euler numbers of higher order with weight, Adv.

Stud. Contemp. Math. (Kyungshang) 22 (2012), no. 1, 93–98.

11. Y. Simsek, Identities associated with generalized Stirling type numbers and Eulerian typepolynomials, Math. Comput. Appl. 18 (2013), no. 3, 251–263.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

931 DAE SAN KIM ET AL 927-932

Page 180: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

SYMMETRY p-ADIC INVARIANT INTEGRAL ON Zp FOR q-EULER POLYNOMIALS 6

12. , Interpolation functions of the Eulerian type polynomials and numbers, Adv. Stud.

Contemp. Math. (Kyungshang) 23 (2013), no. 2, 301–307.13. H. J. H. Tuenter, A symmetry of power sum polynomials and Bernoulli numbers, Amer. Math.

Monthly 108 (2001), no. 3, 258–261.

Department of Mathematics, Sogang University, Seoul 121-742, Re-public of Korea

E-mail address : [email protected]

Department of Mathematics, Kwangwoon University, Seoul 139-701,Republic of Korea

E-mail address : [email protected]

Division of General Education, Kwangwoon University, Seoul 139-701, Republic of Korea

E-mail address : [email protected]

Department of Applied Mathematics, Pukyong National University,Pusan, Republic of Korea

E-mail address : [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

932 DAE SAN KIM ET AL 927-932

Page 181: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Barnes’ multiple Bernoulli and poly-Bernoullimixed-type polynomials

Dmitry V. DolgyInstitute of Mathematics and Computer Sciences, Far Eastern Federal University

Vladivostok, 27 Oktyabrskaya Str., Vladivostok, 690060, Russiad−[email protected]

Dae San Kim ∗

Department of Mathematics, Sogang UniversitySeoul 121-741, Republic of Korea

[email protected]

Taekyun Kim †

Department of Mathematics, Kwangwoon UniversitySeoul 139-701, Republic of Korea

[email protected]

Takao KomatsuGraduate School of Science and Technology, Hirosaki University

Hirosaki 036-8561, [email protected]

Sang-Hun LeeDivision of General Education, Kwangwoon University

Seoul 139-701, Republic of [email protected]

MR Subject Classifications: 05A15, 05A40, 11B68, 11B75, 65Q05

Abstract

∗The second author was supported by the National Research Foundation of Korea (NRF) grant fundedby the Korean government (MOE) (No.2012R1A1A2003786).

†The third author was supported by Kwangwoon University in 2014.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

933 Dmitry V. Dolgy et al 933-951

Page 182: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

In this paper, we consider Barnes’ multiple Bernoulli and poly-Bernoulli mixed-type polynomials. From the properties of Sheffer sequences of these polynomialsarising from umbral calculus, we derive new and interesting identities.

1 Introduction

In this paper, we consider the polynomials S(r,k)n (x|a1, . . . , ar) whose generating function

is given by

tr∏rj=1(e

ajt − 1)

Lik(1− e−t)

1− e−text =

∞∑n=0

S(r,k)n (x|a1, . . . , ar)

tn

n!, (1)

where r ∈ Z>0, k ∈ Z, a1, . . . , ar = 0, and

Lik(x) =∞∑

m=1

xm

mk

is the kth polylogarithm function. S(r,k)n (x|a1, . . . , ar) will be called Barnes’ multiple

Bernoulli and poly-Bernoulli mixed-type polynomials. When S(r,k)n (a1, . . . , ar)

= S(r,k)n (0|a1, . . . , ar) will be called Barnes’ multiple Bernoulli and poly-Bernoulli mixed-

type numbers.Recall that, for every integer k, the poly-Bernoulli polynomials B

(k)n (x) are defined by

the generating function as

Lik(1− e−t)

1− e−text =

∞∑n=0

B(k)n (x)

tn

n!(2)

([14], Cf.[4]). Also, recall that the Barnes’ multiple Bernoulli polynomials Bn(x|a1, . . . , ar)are defined by the generating function as

tr∏rj=1(e

ajt − 1)ext =

∞∑n=0

Bn(x|a1, . . . , ar)tn

n!, (3)

where a1, . . . , ar = 0 ( see [1-14])).In this paper, we consider Barnes’ multiple Bernoulli and poly-Bernoulli mixed-type

polynomials. From the properties of Sheffer sequences of these polynomials arising fromumbral calculus, we derive new and interesting identities.

2 Umbral calculus

Let C be the complex number field and let F be the set of all formal power series in thevariable t:

F =

f(t) =

∞∑k=0

akk!tk

∣∣∣∣∣ak ∈ C

. (4)

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

934 Dmitry V. Dolgy et al 933-951

Page 183: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Let P = C[x] and let P∗ be the vector space of all linear functionals on P. ⟨L|p(x)⟩ isthe action of the linear functional L on the polynomial p(x), and we recall that the vectorspace operations on P∗ are defined by ⟨L+M |p(x)⟩ = ⟨L|p(x)⟩ + ⟨M |p(x)⟩, ⟨cL|p(x)⟩ =c ⟨L|p(x)⟩, where c is a complex constant in C. For f(t) ∈ F , let us define the linearfunctional on P by setting

⟨f(t)|xn⟩ = an, (n ≥ 0). (5)

In particular, ⟨tk|xn

⟩= n!δn,k (n, k ≥ 0), (6)

where δn,k is the Kronecker’s symbol.

For fL(t) =∑∞

k=0

⟨L|xk⟩k!

tk, we have ⟨fL(t)|xn⟩ = ⟨L|xn⟩. That is, L = fL(t). The mapL 7→ fL(t) is a vector space isomorphism from P∗ onto F . Henceforth, F denotes boththe algebra of formal power series in t and the vector space of all linear functionals onP, and so an element f(t) of F will be thought of as both a formal power series and alinear functional. We call F the umbral algebra and the umbral calculus is the study ofumbral algebra. The order O

(f(t)

)of a power series f(t)(= 0) is the smallest integer k

for which the coefficient of tk does not vanish. If O(f(t)

)= 1, then f(t) is called a delta

series; if O(f(t)

)= 0, then f(t) is called an invertible series. For f(t), g(t) ∈ F with

O(f(t)

)= 1 and O

(g(t)

)= 0, there exists a unique sequence sn(x) (deg sn(x) = n) such

that⟨g(t)f(t)k|sn(x)

⟩= n!δn,k, for n, k ≥ 0. Such a sequence sn(x) is called the Sheffer

sequence for(g(t), f(t)

)which is denoted by sn(x) ∼

(g(t), f(t)

).

For f(t), g(t) ∈ F and p(x) ∈ P, we have

⟨f(t)g(t)|p(x)⟩ = ⟨f(t)|g(t)p(x)⟩ = ⟨g(t)|f(t)p(x)⟩ (7)

and

f(t) =∞∑k=0

⟨f(t)|xk

⟩ tkk!, p(x) =

∞∑k=0

⟨tk|p(x)

⟩ xk

k!(8)

([12, Theorem 2.2.5]). Thus, by (8), we get

tkp(x) = p(k)(x) =dkp(x)

dxkand eytp(x) = p(x+ y). (9)

Sheffer sequences are characterized in the generating function ([12, Theorem 2.3.4]).

Lemma 1 The sequence sn(x) is Sheffer for(g(t), f(t)

)if and only if

1

g(f(t)

)eyf(t) = ∞∑k=0

sk(y)

k!tk (y ∈ C) ,

where f(t) is the compositional inverse of f(t).

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

935 Dmitry V. Dolgy et al 933-951

Page 184: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

For sn(x) ∼(g(t), f(t)

), we have the following equations ([12, Theorem 2.3.7, Theorem

2.3.5, Theorem 2.3.9]):

f(t)sn(x) = nsn−1(x) (n ≥ 0), (10)

sn(x) =n∑

j=0

1

j!

⟨g(f(t)

)−1f(t)j|xn

⟩xj, (11)

sn(x+ y) =n∑

j=0

(n

j

)sj(x)pn−j(y) , (12)

where pn(x) = g(t)sn(x).Assume that pn(x) ∼

(1, f(t)

)and qn(x) ∼

(1, g(t)

). Then the transfer formula ([12,

Corollary 3.8.2]) is given by

qn(x) = x

(f(t)

g(t)

)n

x−1pn(x) (n ≥ 1).

For sn(x) ∼(g(t), f(t)

)and rn(x) ∼

(h(t), l(t)

), assume that

sn(x) =n∑

m=0

Cn,mrm(x) (n ≥ 0) .

Then we have ([12, p.132])

Cn,m =1

m!

⟨h(f(t)

)g(f(t)

) l(f(t))m∣∣∣∣∣xn

⟩. (13)

3 Main results

We now note that B(k)n (x), Bn(x|a1, . . . , ar) and S

(r,k)n (x|a1, . . . , ar) are the Appell se-

quences for

gk(t) =1− e−t

Lik(1− e−t), gr(t) =

∏rj=1(e

ajt − 1)

tr, gr,k(t) =

∏rj=1(e

ajt − 1)

tr1− e−t

Lik(1− e−t).

So,

B(k)n (x) ∼

(1− e−t

Lik(1− e−t), t

), (14)

Bn(x|a1, . . . , ar) ∼

(∏rj=1(e

ajt − 1)

tr, t

), (15)

S(r,k)n (x|a1, . . . , ar) ∼

(∏rj=1(e

ajt − 1)

tr1− e−t

Lik(1− e−t), t

). (16)

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

936 Dmitry V. Dolgy et al 933-951

Page 185: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

In particular, we have

tB(k)n (x) =

d

dxB(k)

n (x) = nB(k)n−1(x) , (17)

tBn(x|a1, . . . , ar) =d

dxBn(x|a1, . . . , ar)

= nBn−1(x|a1, . . . , ar) , (18)

tS(r,k)n (x|a1, . . . , ar) =

d

dxS(r,k)n (x|a1, . . . , ar)

= nS(r,k)n−1 (x|a1, . . . , ar) . (19)

Notice thatd

dxLik(x) =

1

xLik−1(x) .

3.1 Explicit expressions

Write Bn(a1, . . . , ar) := Bn(0|a1, . . . , ar) and S(r,k)n (a1, . . . , ar) := S

(r,k)n (0|a1, . . . , ar). Let

(n)j = n(n− 1) · · · (n− j + 1) (j ≥ 1) with (n)0 = 1.

Theorem 1

S(r,k)n (x|a1, . . . , ar) =

n∑l=0

(n

l

)Bn−l(a1, . . . , ar)B

(k)l (x) , (20)

=n∑

l=0

(n

l

)B

(k)n−lBl(x|a1, . . . , ar) , (21)

=n∑

l=0

n∑m=l

m∑j=0

(−1)j(m

j

)(n

l

)1

(m+ 1)kBn−l(a1, . . . , ar)(x− j)l , (22)

=n∑

l=0

(n∑j=l

n−j∑m=0

(−1)n−m−j

(n

j

)(j

l

)× m!

(m+ 1)kS2(n− j,m)Bj−l(a1, . . . , ar)

)xl , (23)

=n∑

j=0

(n

j

)S(r,k)n−j (a1, . . . , ar)x

j . (24)

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

937 Dmitry V. Dolgy et al 933-951

Page 186: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Proof. By (1), (2) and (3), we have

S(r,k)n (y|a1, . . . , ar) =

⟨∞∑i=0

S(r,k)i (y|a1, . . . , ar)

ti

i!

∣∣∣xn

=

⟨tr∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−teyt∣∣∣xn

=

⟨tr∏r

j=1(eajt − 1)

∣∣∣Lik(1− e−t)

1− e−teytxn

=

⟨tr∏r

j=1(eajt − 1)

∣∣∣ ∞∑l=0

B(k)l (y)

tl

l!xn

=

⟨tr∏r

j=1(eajt − 1)

∣∣∣ n∑l=0

(n

l

)B

(k)l (y)xn−l

=n∑

l=0

(n

l

)B

(k)l (y)

⟨tr∏r

j=1(eajt − 1)

∣∣∣xn−l

=n∑

l=0

(n

l

)B

(k)l (y)

⟨∞∑i=0

Bi(a1, . . . , ar)ti

i!

∣∣∣xn−l

=n∑

l=0

(n

l

)B

(k)l (y)Bn−l(a1, . . . , ar) .

So, we get (20).

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

938 Dmitry V. Dolgy et al 933-951

Page 187: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

We also have

S(r,k)n (y|a1, . . . , ar) =

⟨∞∑i=0

S(r,k)i (y|a1, . . . , ar)

ti

i!

∣∣∣xn

=

⟨Lik(1− e−t)

1− e−t

∣∣∣ tr∏rj=1(e

ajt − 1)eytxn

=

⟨Lik(1− e−t)

1− e−t

∣∣∣ ∞∑l=0

Bl(y|a1, . . . , ar)tl

l!xn

=

⟨Lik(1− e−t)

1− e−t

∣∣∣ n∑l=0

Bl(y|a1, . . . , ar)(n

l

)xn−l

=n∑

l=0

(n

l

)Bl(y|a1, . . . , ar)

⟨Lik(1− e−t)

1− e−t

∣∣∣xn−l

=n∑

l=0

(n

l

)Bl(y|a1, . . . , ar)

⟨∞∑i=0

B(k)i

ti

i!

∣∣∣xn−l

=n∑

l=0

(n

l

)Bl(y|a1, . . . , ar)B(k)

n−l .

Thus, we get (21).In [7] we obtained that

Lik(1− e−t)

1− e−txn =

n∑m=0

1

(m+ 1)k

m∑j=0

(−1)j(m

j

)(x− j)n .

So,

S(r,k)n (x|a1, . . . , ar) =

tr∏rj=1(e

ajt − 1)

Lik(1− e−t)

1− e−txn

=n∑

m=0

1

(m+ 1)k

m∑j=0

(−1)j(m

j

)tr∏r

j=1(eajt − 1)

(x− j)n

=n∑

m=0

1

(m+ 1)k

m∑j=0

(−1)j(m

j

) n∑l=0

(n

l

)Bn−l(a1, . . . , ar)(x− j)l

=n∑

l=0

n∑m=l

m∑j=0

(−1)j(m

j

)(n

l

)1

(m+ 1)kBn−l(a1, . . . , ar)(x− j)l ,

which is the identity (22).In [7] we obtained that

Lik(1− e−t)

1− e−txn =

n∑j=0

(n−j∑m=0

(−1)n−m−j

(m+ 1)k

(n

j

)m!S2(n− j,m)

)xj ,

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

939 Dmitry V. Dolgy et al 933-951

Page 188: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

where S2(l,m) are the Stirling numbers of the second kind, defined by

(et − 1)m = m!∞∑

l=m

S2(l,m)tl

l!.

Thus,

S(r,k)n (x|a1, . . . , ar) =

n∑j=0

(n−j∑m=0

(−1)n−m−j

(m+ 1)k

(n

j

)m!S2(n− j,m)

)tr∏r

i=1(eait − 1)

xj

=n∑

j=0

(n−j∑m=0

(−1)n−m−j

(m+ 1)k

(n

j

)m!S2(n− j,m)

)Bj(x|a1, . . . , ar)

=n∑

j=0

(n−j∑m=0

(−1)n−m−j

(m+ 1)k

(n

j

)m!S2(n− j,m)

)j∑

l=0

(j

l

)Bj−l(a1, . . . , ar)x

l

=n∑

l=0

(n∑j=l

n−j∑m=0

(−1)n−m−j

(n

j

)(j

l

)m!

(m+ 1)kS2(n− j,m)Bj−l(a1, . . . , ar)

)xl ,

which is the identity (23).By (11) with (16), we have

⟨g(f(t)

)−1f(t)j|xn

⟩=

⟨tr∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−ttj∣∣∣xn

= (n)j

⟨tr∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−t

∣∣∣xn−j

= (n)j

⟨∞∑i=0

S(r,k)i (a1, . . . , ar)

ti

i!

∣∣∣xn−j

⟩= (n)jS

(r,k)n−j (a1, . . . , ar) .

Thus, we get (24).

3.2 Sheffer identity

Theorem 2

S(r,k)n (x+ y|a1, . . . , ar) =

n∑j=0

(n

j

)S(r,k)j (x|a1, . . . , ar)yn−j . (25)

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

940 Dmitry V. Dolgy et al 933-951

Page 189: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Proof. By (16) with

pn(x) =

∏rj=1(e

ajt − 1)

tr1− e−t

Lik(1− e−t)S(r,k)n (x|a1, . . . , ar)

= xn ∼ (1, t) ,

using (12), we have (25).

3.3 Recurrence

Theorem 3

S(r,k)n+1 (x|a1, . . . , ar) = xS(r,k)

n (x|a1, . . . , ar)

− 1

n+ 1

r∑j=1

n∑l=0

(n+ 1

l

)(−aj)

n+1−lBn+1−lS(r,k)l (x|a1, . . . , ar)

− 1

n+ 1

(S(r+1,k)n+1 (x|a1, . . . , ar, 1)− S

(r+1,k−1)n+1 (x|a1, . . . , ar, 1)

), (26)

where Bn is the nth ordinary Bernoulli number.

Proof. By applying

sn+1(x) =

(x− g′(t)

g(t)

)1

f ′(t)sn(x)

([12, Corollary 3.7.2]) with (16), we get

S(r,k)n+1 (x|a1, . . . , ar) =

(x−

g′r,k(t)

gr,k(t)

)S(r,k)n (x|a1, . . . , ar) .

Now,

g′r,k(t)

gr,k(t)= (ln gr,k(t))

=

(r∑

j=1

ln(eajt − 1)− r ln t+ ln(1− e−t)− ln Lik(1− e−t)

)′

=r∑

j=1

ajeajt

eajt − 1− r

t+

e−t

1− e−t

(1− Lik−1(1− e−t)

Lik(1− e−t)

)

=

∑rj=1

∏i=j(e

ait − 1)(ajteajt − eajt + 1)

t∏r

j=1(eajt − 1)

+t

et − 1

Lik(1− e−t)− Lik−1(1− e−t)

tLik(1− e−t).

Since∑rj=1

∏i=j(e

ait − 1)(ajteajt − eajt + 1)∏r

j=1(eajt − 1)

=12

(∑rj=1 a1 · · · aj−1a

2jaj+1 · · · ar

)tr+1 + · · ·

(a1 · · · ar)tr + · · ·

=1

2

(r∑

j=1

aj

)t+ · · ·

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

941 Dmitry V. Dolgy et al 933-951

Page 190: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

is a series with order≥ 1 and

Lik(1− e−t)− Lik−1(1− e−t)

1− e−t=

(1

2k− 1

2k−1

)t+ · · ·

is a delta series, we have

S(r,k)n+1 (x|a1, . . . , ar) = xS(r,k)

n (x|a1, . . . , ar)−g′r,k(t)

gr,k(t)S(r,k)n (x|a1, . . . , ar)

= xS(r,k)n (x|a1, . . . , ar)−

g′r,k(t)

gr,k(t)

tr∏rj=1(e

ajt − 1)

Lik(1− e−t)

1− e−txn

= xS(r,k)n (x|a1, . . . , ar)

− tr∏rj=1(e

ajt − 1)

Lik(1− e−t)

1− e−t

∑rj=1

∏i=j(e

ait − 1)(ajteajt − eajt + 1)

t∏r

j=1(eajt − 1)

xn

− tr∏rj=1(e

ajt − 1)

t

et − 1

Lik(1− e−t)− Lik−1(1− e−t)

t(1− e−t)xn .

Now, ∑rj=1

∏i=j(e

ait − 1)(ajteajt − eajt + 1)

t∏r

j=1(eajt − 1)

xn

=

∑rj=1

∏i=j(e

ait − 1)(ajteajt − eajt + 1)∏r

j=1(eajt − 1)

xn+1

n+ 1

=1

n+ 1

r∑j=1

ajteajt − eajt + 1

eajt − 1xn+1

=1

n+ 1

r∑j=1

(ajte

ajt

eajt − 1− 1

)xn+1

=1

n+ 1

r∑j=1

(∞∑l=0

(−1)lBlalj

l!tl − 1

)xn+1

=1

n+ 1

r∑j=1

(n+1∑l=0

(n+ 1

l

)(−aj)

lBlxn+1−l − xn+1

)

=1

n+ 1

r∑j=1

n+1∑l=1

(n+ 1

l

)(−aj)

lBlxn+1−l

=1

n+ 1

r∑j=1

n∑l=0

(n+ 1

l

)(−aj)

n+1−lBn+1−lxl .

Also,

Lik(1− e−t)− Lik−1(1− e−t)

t(1− e−t)xn =

1

n+ 1

Lik(1− e−t)− Lik−1(1− e−t)

1− e−txn+1 .

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

942 Dmitry V. Dolgy et al 933-951

Page 191: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Thus, we get the identity (26).

3.4 One more relation

Theorem 4

S(r,k)n (x|a1, . . . , ar) = xS

(r,k)n−1 (x|a1, . . . , ar)

+n∑

m=1

(−1)m−1(n−1m−1

)Bm

m

r∑j=1

amj S(r,k)n−m(x|a1, . . . , ar)

+1

nS(r+1,k−1)n (x|a1, . . . , ar, 1)−

1

nS(r+1,k)n (x|a1, . . . , ar, 1) . (27)

Proof. For n ≥ 1 we have

S(r,k)n (y|a1, . . . , ar) =

⟨∞∑l=0

S(r,k)l (y|a1, . . . , ar)

tl

l!

∣∣∣xn

=

⟨tr∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−teyt∣∣∣xn

=

⟨∂t

(tr∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−teyt

)∣∣∣xn−1

=

⟨(∂t

tr∏rj=1(e

ajt − 1)

)Lik(1− e−t)

1− e−teyt∣∣∣xn−1

+

⟨tr∏r

j=1(eajt − 1)

(∂tLik(1− e−t)

1− e−t

)eyt∣∣∣xn−1

+

⟨tr∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−t(∂te

yt)∣∣∣xn−1

⟩= yS

(r,k)n−1 (y|a1, . . . , ar)

+

⟨(∂t

tr∏rj=1(e

ajt − 1)

)Lik(1− e−t)

1− e−teyt∣∣∣xn−1

+

⟨tr∏r

j=1(eajt − 1)

(∂tLik(1− e−t)

1− e−t

)eyt∣∣∣xn−1

⟩.

11

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

943 Dmitry V. Dolgy et al 933-951

Page 192: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Observe that

∂t

(tr∏r

j=1(eajt − 1)

)=

rtr−1 − tr∑r

j=1aje

ajt

eajt−1∏rj=1(e

ajt − 1)

=tr−1∏r

j=1(eajt − 1)

(r −

r∑j=1

ajteajt

eajt − 1

)

=tr−1∏r

j=1(eajt − 1)

(r −

r∑j=1

−ajt

e−ajt − 1

)

=tr−1∏r

j=1(eajt − 1)

(r −

r∑j=1

∞∑m=0

(−aj)mBmt

m

m!

)

=tr−1∏r

j=1(eajt − 1)

(r −

∞∑m=0

(r∑

j=1

(−aj)m

)Bmt

m

m!

)

=tr∏r

j=1(eajt − 1)

∞∑m=1

(r∑

j=1

amj

)(−1)m−1Bm

m!tm−1 .

Thus, ⟨(∂t

tr∏rj=1(e

ajt − 1)

)Lik(1− e−t)

1− e−teyt∣∣∣xn−1

=

⟨tr∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−teyt∣∣∣ n∑m=1

(r∑

j=1

amj

)(−1)m−1Bm

m!tm−1xn−1

=n∑

m=1

(−1)m−1(n−1m−1

)Bm

m

r∑j=1

amj

⟨tr∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−teyt∣∣∣xn−m

=n∑

m=1

(−1)m−1(n−1m−1

)Bm

mS(r,k)n−m(y|a1, . . . , ar)

r∑j=1

amj .

SinceLik−1(1− e−t)− Lik(1− e−t)

1− e−t=

(1

2k−1− 1

2k

)t+ · · ·

12

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

944 Dmitry V. Dolgy et al 933-951

Page 193: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

is a delta series, we have⟨tr∏r

j=1(eajt − 1)

(∂tLik(1− e−t)

1− e−t

)eyt∣∣∣xn−1

=

⟨tr∏r

j=1(eajt − 1)

e−t(Lik−1(1− e−t)− Lik(1− e−t)

)(1− e−t)2

eyt∣∣∣xn−1

=

⟨tr∏r

j=1(eajt − 1)

t

et − 1

Lik−1(1− e−t)− Lik(1− e−t)

t(1− e−t)eyt∣∣∣xn−1

=

⟨tr+1∏r

j=1(eajt − 1)(et − 1)

Lik−1(1− e−t)− Lik(1− e−t)

1− e−teyt∣∣∣xn

n

=1

n

⟨tr+1∏r

j=1(eajt − 1)(et − 1)

Lik−1(1− e−t)

1− e−teyt∣∣∣xn

− 1

n

⟨tr+1∏r

j=1(eajt − 1)(et − 1)

Lik(1− e−t)

1− e−teyt∣∣∣xn

⟩=

1

nS(r+1,k−1)n (y|a1, . . . , ar, 1)−

1

nS(r+1,k)n (y|a1, . . . , ar, 1) .

Therefore, we obtain the desired result.

Remark. After simple modification, Theorem 4 becomes

S(r,k)n+1 (x|a1, . . . , ar) = xS(r,k)

n (x|a1, . . . , ar)

+n+1∑l=1

(−1)l−1(

nl−1

)Bl

l

r∑j=1

aljS(r,k)n+1−l(x|a1, . . . , ar)

+1

n+ 1S(r+1,k−1)n+1 (x|a1, . . . , ar, 1)−

1

n+ 1S(r+1,k)n+1 (x|a1, . . . , ar, 1) .

which is the same as the above recurrence formula (26) upon replacing n by n− 1.

3.5 Relations with poly-Bernoulli numbers and Barnes’ multipleBernoulli numbers

Theorem 5

n∑m=0

(n+ 1

m

)(−1)n−mS(r,k)

m (a1, . . . , ar)

=n∑

l=0

l∑m=0

(−1)l−m

(l

m

)(n+ 1

l + 1

)B(k−1)

m Bn−l(a1, . . . , ar) . (28)

13

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

945 Dmitry V. Dolgy et al 933-951

Page 194: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Proof. We shall compute ⟨tr∏r

j=1(eajt − 1)

Lik(1− e−t)∣∣∣xn+1

⟩in two different ways. On the one hand,⟨

tr∏rj=1(e

ajt − 1)Lik(1− e−t)

∣∣∣xn+1

⟩=

⟨tr∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−t

∣∣∣(1− e−t)xn+1

=

⟨tr∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−t

∣∣∣xn+1 − (x− 1)n+1

=n∑

m=0

(n+ 1

m

)(−1)n−m

⟨tr∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−t

∣∣∣xm

=n∑

m=0

(n+ 1

m

)(−1)n−mS(r,k)

m (a1, . . . , ar) .

On the other hand,⟨tr∏r

j=1(eajt − 1)

Lik(1− e−t)∣∣∣xn+1

⟩=

⟨Lik(1− e−t)

∣∣∣ tr∏rj=1(e

ajt − 1)xn+1

⟩=⟨Lik(1− e−t)

∣∣∣Bn+1(x|a1, . . . , ar)⟩

=

⟨∫ t

0

(Lik(1− e−s)

)′ds∣∣∣Bn+1(x|a1, . . . , ar)

⟩=

⟨∫ t

0

e−sLik−1(1− e−s)

1− e−sds∣∣∣Bn+1(x|a1, . . . , ar)

⟩=

⟨∫ t

0

(∞∑j=0

(−s)j

j!

)(∞∑

m=0

B(k−1)m

m!sm

)ds∣∣∣Bn+1(x|a1, . . . , ar)

=

⟨∞∑l=0

(l∑

m=0

(−1)l−m

(l

m

)B(k−1)

m

)1

l!

∫ t

0

slds∣∣∣Bn+1(x|a1, . . . , ar)

=n∑

l=0

l∑m=0

(−1)l−m

(l

m

)B

(k−1)m

(l + 1)!

⟨tl+1∣∣∣Bn+1(x|a1, . . . , ar)

⟩=

n∑l=0

l∑m=0

(−1)l−m

(l

m

)B

(k−1)m

(l + 1)!(n+ 1)l+1Bn−l(a1, . . . , ar)

=n∑

l=0

l∑m=0

(−1)l−m

(l

m

)(n+ 1

l + 1

)B(k−1)

m Bn−l(a1, . . . , ar) .

Here, Bn−l(a1, . . . , ar) = Bn−l(0|a1, . . . , ar). Thus, we get (28).

14

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

946 Dmitry V. Dolgy et al 933-951

Page 195: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

3.6 Relations with the Stirling numbers of the second kind andthe falling factorials

Theorem 6

S(r,k)n (x|a1, . . . , ar) =

n∑m=0

(n∑

l=m

S2(l,m)

(n

l

)S(r,k)n−l (a1, . . . , ar)

)(x)m . (29)

Proof. For (16) and (x)n ∼ (1, et− 1), assume that S(r,k)n (x|a1, . . . , ar) =

∑nm=0Cn,m(x)m.

By (13), we have

Cn,m =1

m!

⟨1∏r

j=1(eajt−1)

tr1−e−t

Lik(1−e−t)

(et − 1)m∣∣∣xn

=1

m!

⟨tr∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−t

∣∣∣(et − 1)mxn

=1

m!

⟨tr∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−t

∣∣∣m!n∑

l=m

S2(l,m)tl

l!xn

=n∑

l=m

S2(l,m)

(n

l

)⟨tr∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−t

∣∣∣xn−l

=n∑

l=m

S2(l,m)

(n

l

)S(r,k)n−l (a1, . . . , ar) .

Thus, we get the identity (29).

3.7 Relations with the Stirling numbers of the second kind andthe rising factorials

Theorem 7

S(r,k)n (x|a1, . . . , ar) =

n∑m=0

(n∑

l=m

S2(l,m)

(n

l

)S(r,k)n−l (−m|a1, . . . , ar)

)(x)(m) . (30)

Proof. For (16) and (x)(n) = x(x+1) · · · (x+n−1) ∼ (1, 1−e−t), assume that S(r,k)n (x|a1, . . . , ar) =

15

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

947 Dmitry V. Dolgy et al 933-951

Page 196: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

∑nm=0Cn,m(x)

(m). By (13), we have

Cn,m =1

m!

⟨1∏r

j=1(eajt−1)

tr1−e−t

Lik(1−e−t)

(1− e−t)m∣∣∣xn)

=1

m!

⟨tr∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−te−mt

∣∣∣(et − 1)mxn)

=n∑

l=m

S2(l,m)

(n

l

)⟨e−mt

∣∣∣ tr∏rj=1(e

ajt − 1)

Lik(1− e−t)

1− e−txn−l

=n∑

l=m

S2(l,m)

(n

l

)⟨e−mt

∣∣∣S(r,k)n−l (x|a1, . . . , ar)

⟩=

n∑l=m

S2(l,m)

(n

l

)S(r,k)n−l (−m|a1, . . . , ar) .

Thus, we get the identity (30).

3.8 Relations with higher-order Frobenius-Euler polynomials

For λ ∈ C with λ = 1, the Frobenius-Euler polynomials of order r, H(r)n (x|λ) are defined

by the generating function (1− λ

et − λ

)r

ext =∞∑n=0

H(r)n (x|λ) t

n

n!

(see e.g. [6]).

Theorem 8

S(r,k)n (x|a1, . . . , ar) =

n∑m=0

( (nm

)(1− λ)s

s∑j=0

(s

j

)(−λ)s−jS

(r,k)n−m(j|a1, . . . , ar)

)H(s)

m (x|λ) .

(31)

Proof. For (16) and

H(s)n (x|λ) ∼

((et − λ

1− λ

)s

, t

),

16

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

948 Dmitry V. Dolgy et al 933-951

Page 197: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

assume that S(r,k)n (x|a1, . . . , ar) =

∑nm=0Cn,mH

(s)m (x|λ). By (13), we have

Cn,m =1

m!

⟨(et − λ

1− λ

)str∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−ttm∣∣∣xn

=1

m!(1− λ)s

⟨(et − λ)s

tr∏rj=1(e

ajt − 1)

Lik(1− e−t)

1− e−t

∣∣∣tmxn

=

(nm

)(1− λ)s

s∑j=0

(s

j

)(−λ)s−j

⟨ejt∣∣∣ tr∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−txn−m

=

(nm

)(1− λ)s

s∑j=0

(s

j

)(−λ)s−jS

(r,k)n−m(j|a1, . . . , ar) .

Thus, we get the identity (31).

3.9 Relations with higher-order Bernoulli polynomials

Bernoulli polynomials B(r)n (x) of order r are defined by(

t

et − 1

)r

ext =∞∑n=0

B(r)n (x)

n!tn

(see e.g. [12, Section 2.2]).

Theorem 9

S(r,k)n (x|a1, . . . , ar) =

n∑m=0

((n

m

) n−m∑l=0

(n−m

l

)(l+sl

) S2(l + s, s)S(r,k)n−m−l(a1, . . . , ar)

)B(s)

m (x) .

(32)

Proof. For (16) and

B(s)n (x) ∼

((et − 1

t

)s

, t

),

17

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

949 Dmitry V. Dolgy et al 933-951

Page 198: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

assume that S(r,k)n (x|a1, . . . , ar) =

∑nm=0Cn,mB

(s)m (x). By (13), we have

Cn,m =1

m!

⟨(et − 1

t

)str∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−ttm∣∣∣xn

=

(n

m

)⟨tr∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−t

∣∣∣ (et − 1

t

)s

xn−m

=

(n

m

)⟨tr∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−t

∣∣∣ n−m∑l=0

s!

(l + s)!S2(l + s, s)tlxn−m

=

(n

m

) n−m∑l=0

s!

(l + s)!S2(l + s, s)(n−m)l

⟨tr∏r

j=1(eajt − 1)

Lik(1− e−t)

1− e−t

∣∣∣xn−m−l

=

(n

m

) n−m∑l=0

s!

(l + s)!S2(l + s, s)(n−m)lS

(r,k)n−m−l(a1, . . . , ar)

=

(n

m

) n−m∑l=0

(n−m

l

)(l+sl

) S2(l + s, s)S(r,k)n−m−l(a1, . . . , ar) .

Thus, we get the identity (32).

References

[1] A. A. Aygunes, Y. Simsek, Unification of multiple Lerch-zeta type functions , Adv.Stud. Contemp. Math. 21 (2011), 367-373.

[2] A. Bayad, T. Kim, Results on Values of Barnes polynomials, Rocky Mountain J.Math. 43 (2013), no. 6, 1-10.

[3] A. Bayad, T. Kim, W. J. Kim and S. H. Lee, Arithmetic properties of q-Barnespolynomials, J. Comput. Anal. Appl. 15 (2013), 111–117.

[4] M. -A. Coppo and B. Candelpergher, The Arakawa-Kaneko zeta functions, Ramanu-jan J. 22 (2010), 153–162.

[5] L. Jang, T. Kim, Y. -H. Kim, K. -W. Hwang, Note on the q q-extension of Barnes’type multiple Euler polynomials, J. Inequal. Appl. 2009, Art. ID 136532, 8 pp.

[6] D. S. Kim and T. Kim, Some identities of Frobenius-Euler polynomials arising fromumbral calculus, Adv. Difference Equ. 2012 (2012), #196.

[7] D. S. Kim, T. Kim and S. -H. Lee, Poly-Bernoulli polynomials arising from umbralcalculus, available at http://arxiv.org/pdf/1306.6697.pdf

[8] T. Kim, On Euler-Barnes multiple zeta functions, Russ. J. Math. Phys. 10 (2003),261–267.

18

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

950 Dmitry V. Dolgy et al 933-951

Page 199: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

[9] T. Kim, p-adic q-integrals associated with the Changhee-Barnes’ q-Bernoulli polyno-mials, Integral Transforms Spec. Funct. 15 (2004), 415–420.

[10] T. Kim, Barnes-type multiple q-zeta functions and q-Euler polynomials, J. Phys. A43 (2010), 255201, 11pp.

[11] T. Kim and S. -H. Rim, On Changhee-Barnes’ q-Euler numbers and polynomials,Adv. Stud. Contemp. Math. (Kyungshang) 9 (2004), 81–86.

[12] S. Roman, The umbral Calculus, Dover, New York, 2005.

[13] Y. Simsek, T. Kim and I. -S. Pyung, Barnes’ type multiple Changhee q-zeta functions,Adv. Stud. Contemp. Math. (Kyungshang) 10 (2005), 121–129.

[14] Y. Simsek, Generating functions of the twisted Bernoulli numbers and polynomialsassociated with their interpolation functions, Adv. Stud. Contemp. Math. 16 (2008),251-278.

19

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.5, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

951 Dmitry V. Dolgy et al 933-951

Page 200: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

952

Page 201: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO. 5, 2015

An Umbral Calculus Approach to Poly-Cauchy Polynomials with a q Parameter, Dae San Kim, Taekyun Kim, Takao Komatsu, and Jong-Jin Seo,.....................................................................762

Tripled Fixed Point Theorems for Mixed Monotone Chatterjea Type Contractive Operators, Marin Borcut, Mădălina Păcurar, and Vasile Berinde,………………………………………..793

Soft Boolean Algebra and Its Properties, Rıdvan Şahin, and Ahmet Küçük,………………...803

Generating Functions for the Generalized Bivariate Fibonacci and Lucas Polynomials, Esra Erkuş-Duman, and Naim Tuglu,………………………………………………………………815

Integral norms of 𝑄𝐾,𝜔(𝑝, 𝑞;𝑛) Spaces and Weighted Bloch Spaces, A. El-Sayed Ahmed, and Aydah Ahmadi,………………………………………………………………………………...822

On two Dimensional q-Bernoulli and q-Genocchi Polynomials: Properties and location of zeros, N. I. Mahmudov, A. Akkeleș, and A. Öneren,…………………………………………………834

Existence Results of Sequential Derivatives of Nonlinear Quantum Difference Equations with a New Class of Three-Point Boundary Value Problems Conditions, Nichaphat Patanarapeelert, Thanin Sitthiwirattham,………………………………………………………………………...844

An Iterative Method for Solving Fourth-Order Boundary Value Problems of Mixed Type Integro-Differential Equations, Omar Abu Arqub,…………………………………………….857

An AQCQ-Functional Equation in Normed 2-Banach Spaces, Choonkil Park, Sun Young Jang, Reza Saadati, and Dong Yun Shin,……………………………………………………………875

Refined General Quadratic Equation with Four Variables and Its Stability Results, Hark-Mahn Kim, and Soon Lee,…………………………………………………………………………….885

Hyers-Ulam Stability of a Class of Differential Equations of Second Order, Mohammad Reza Abdollahpour, and Choonkil Park,…………………………………………………………….899

An Iterative Algorithm Based On the Hybrid Steepest Descent Method for Strictly Pseudocontractive Mappings, Jong Soo Jung,…………………………………………………904

BE-Algebras with Order Reversing Involution, Sun Shin Ahn, Young Hee Kim, and Jung Hee Park,……………………………………………………………………………………………918

Page 202: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO. 5, 2015

(continued)

Symmetry p-Adic Invariant Integral on ℤ𝑝 for q-Euler Polynomials, Dae San Kim, Taekyun Kim, Sang-Hun Lee, and Jong-Jin Seo,……………………………………………………….927

Barnes' Multiple Bernoulli and Poly-Bernoulli Mixed-Type Polynomials, Dmitry V. Dolgy, Dae San Kim, Taekyun Kim, Takao Komatsu, and Sang-Hun Lee,……………………………….933

Page 203: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Volume 18, Number 6 June 2015 ISSN:1521-1398 PRINT,1572-9206 ONLINE

Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC

Page 204: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Journal of Computational Analysis and Applications ISSNno.’s:1521-1398 PRINT,1572-9206 ONLINE SCOPE OF THE JOURNAL An international publication of Eudoxus Press, LLC (twelve times annually) Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152-3240, U.S.A [email protected] http://www.msci.memphis.edu/~ganastss/jocaaa The main purpose of "J.Computational Analysis and Applications" is to publish high quality research articles from all subareas of Computational Mathematical Analysis and its many potential applications and connections to other areas of Mathematical Sciences. Any paper whose approach and proofs are computational,using methods from Mathematical Analysis in the broadest sense is suitable and welcome for consideration in our journal, except from Applied Numerical Analysis articles. Also plain word articles without formulas and proofs are excluded. The list of possibly connected mathematical areas with this publication includes, but is not restricted to: Applied Analysis, Applied Functional Analysis, Approximation Theory, Asymptotic Analysis, Difference Equations, Differential Equations, Partial Differential Equations, Fourier Analysis, Fractals, Fuzzy Sets, Harmonic Analysis, Inequalities, Integral Equations, Measure Theory, Moment Theory, Neural Networks, Numerical Functional Analysis, Potential Theory, Probability Theory, Real and Complex Analysis, Signal Analysis, Special Functions, Splines, Stochastic Analysis, Stochastic Processes, Summability, Tomography, Wavelets, any combination of the above, e.t.c. "J.Computational Analysis and Applications" is a peer-reviewed Journal. See the instructions for preparation and submission of articles to JoCAAA. Assistant to the Editor: Dr.Razvan Mezei,Lenoir-Rhyne University,Hickory,NC 28601, USA. Journal of Computational Analysis and Applications(JoCAAA) is published by EUDOXUS PRESS,LLC,1424 Beaver Trail Drive,Cordova,TN38016,USA,[email protected] http//:www.eudoxuspress.com. Annual Subscription Prices:For USA and Canada,Institutional:Print $650, Electronic OPEN ACCESS. Individual:Print $300. For any other part of the world add $100 more(postages) to the above prices for Print. No credit card payments. Copyright©2015 by Eudoxus Press,LLC,all rights reserved.JoCAAA is printed in USA. JoCAAA is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH. It is strictly prohibited the reproduction and transmission of any part of JoCAAA and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes no responsibility for the content of published papers.

956

Page 205: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Editorial Board

Associate Editors of Journal of Computational Analysis and Applications

1) George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152,U.S.A Tel.901-678-3144 e-mail: [email protected] Approximation Theory,Real Analysis, Wavelets, Neural Networks,Probability, Inequalities. 2) J. Marshall Ash Department of Mathematics De Paul University 2219 North Kenmore Ave. Chicago,IL 60614-3504 773-325-4216 e-mail: [email protected] Real and Harmonic Analysis 3) Mark J.Balas Department Head and Professor Electrical and Computer Engineering Dept. College of Engineering University of Wyoming 1000 E. University Ave. Laramie, WY 82071 307-766-5599 e-mail: [email protected] Control Theory,Nonlinear Systems, Neural Networks,Ordinary and Partial Differential Equations, Functional Analysis and Operator Theory

4) Dumitru Baleanu Cankaya University, Faculty of Art and Sciences, Department of Mathematics and Computer Sciences, 06530 Balgat, Ankara, Turkey, [email protected] Fractional Differential Equations Nonlinear Analysis, Fractional Dynamics

5) Carlo Bardaro Dipartimento di Matematica e Informatica

20)Margareta Heilmann Faculty of Mathematics and Natural Sciences University of Wuppertal Gaußstraße 20 D-42119 Wuppertal, Germany, [email protected] wuppertal.de Approximation Theory (Positive Linear Operators) 21) Christian Houdre School of Mathematics Georgia Institute of Technology Atlanta,Georgia 30332 404-894-4398 e-mail: [email protected] Probability, Mathematical Statistics, Wavelets 22) Irena Lasiecka Department of Mathematical Sciences University of Memphis Memphis, TN 38152 P.D.E, Control Theory, Functional Analysis, [email protected]

23) Burkhard Lenze Fachbereich Informatik Fachhochschule Dortmund University of Applied Sciences Postfach 105018 D-44047 Dortmund, Germany e-mail: [email protected] Real Networks, Fourier Analysis,Approximation Theory 24) Hrushikesh N.Mhaskar Department Of Mathematics California State University Los Angeles,CA 90032 626-914-7002 e-mail: [email protected] Orthogonal Polynomials, Approximation Theory,Splines, Wavelets, Neural Networks

957

Page 206: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Universita di Perugia Via Vanvitelli 1 06123 Perugia, ITALY TEL+390755853822 +390755855034 FAX+390755855024 E-mail [email protected] Web site: http://www.unipg.it/~bardaro/ Functional Analysis and Approximation Theory, Signal Analysis, Measure Theory, Real Analysis. 6) Martin Bohner Department of Mathematics and Statistics Missouri S&T Rolla, MO 65409-0020, USA [email protected] web.mst.edu/~bohner Difference equations, differential equations, dynamic equations on time scale, applications in economics, finance, biology. 7) Jerry L.Bona Department of Mathematics The University of Illinois at Chicago 851 S. Morgan St. CS 249 Chicago, IL 60601 e-mail:[email protected] Partial Differential Equations, Fluid Dynamics 8) Luis A.Caffarelli Department of Mathematics The University of Texas at Austin Austin,Texas 78712-1082 512-471-3160 e-mail: [email protected] Partial Differential Equations 9) George Cybenko Thayer School of Engineering Dartmouth College 8000 Cummings Hall, Hanover,NH 03755-8000 603-646-3843 (X 3546 Secr.) e-mail: [email protected] Approximation Theory and Neural Networks 10) Ding-Xuan Zhou Department Of Mathematics City University of Hong Kong

25) M.Zuhair Nashed Department Of Mathematics University of Central Florida PO Box 161364 Orlando, FL 32816-1364 e-mail: [email protected] Inverse and Ill-Posed problems, Numerical Functional Analysis, Integral Equations,Optimization, Signal Analysis 26) Mubenga N.Nkashama Department OF Mathematics University of Alabama at Birmingham Birmingham, AL 35294-1170 205-934-2154 e-mail: [email protected] Ordinary Differential Equations, Partial Differential Equations 27)Svetlozar (Zari) Rachev, Professor of Finance, College of Business,and Director of Quantitative Finance Program, Department of Applied Mathematics & Statistics Stonybrook University 312 Harriman Hall, Stony Brook, NY 11794-3775 Phone: +1-631-632-1998, Email : [email protected] 28) Alexander G. Ramm Mathematics Department Kansas State University Manhattan, KS 66506-2602 e-mail: [email protected] Inverse and Ill-posed Problems, Scattering Theory, Operator Theory, Theoretical Numerical Analysis, Wave Propagation, Signal Processing and Tomography 29) Ervin Y.Rodin Department of Systems Science and Applied Mathematics Washington University,Campus Box 1040 One Brookings Dr.,St.Louis,MO 63130- 4899 314-935-6007 e-mail: [email protected] Systems Theory, Semantic Control, Partial Differential Equations, Calculus of Variations, Optimization

958

Page 207: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

83 Tat Chee Avenue Kowloon,Hong Kong 852-2788 9708,Fax:852-2788 8561 e-mail: [email protected] Approximation Theory, Spline functions,Wavelets 11) Sever S.Dragomir School of Computer Science and Mathematics, Victoria University, PO Box 14428, Melbourne City, MC 8001,AUSTRALIA Tel. +61 3 9688 4437 Fax +61 3 9688 4050 [email protected] Inequalities,Functional Analysis, Numerical Analysis, Approximations, Information Theory, Stochastics. 12) Oktay Duman TOBB University of Economics and Technology, Department of Mathematics, TR-06530, Ankara, Turkey, [email protected] Classical Approximation Theory, Summability Theory, Statistical Convergence and its Applications 13) Saber N.Elaydi Department Of Mathematics Trinity University 715 Stadium Dr. San Antonio,TX 78212-7200 210-736-8246 e-mail: [email protected] Ordinary Differential Equations, Difference Equations 14) Augustine O.Esogbue School of Industrial and Systems Engineering Georgia Institute of Technology Atlanta,GA 30332 404-894-2323 e-mail: [email protected] Control Theory,Fuzzy sets, Mathematical Programming, Dynamic Programming,Optimization 15) Christodoulos A.Floudas Department of Chemical Engineering Princeton University

and Artificial Intelligence, Operations Research, Math.Programming 30) T. E. Simos Department of Computer Science and Technology Faculty of Sciences and Technology University of Peloponnese GR-221 00 Tripolis, Greece Postal Address: 26 Menelaou St. Anfithea - Paleon Faliron GR-175 64 Athens, Greece [email protected] Numerical Analysis 31) I. P. Stavroulakis Department of Mathematics University of Ioannina 451-10 Ioannina, Greece [email protected] Differential Equations Phone +3 0651098283 32) Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock,Germany [email protected] rostock.de Numerical Fourier Analysis, Fourier Analysis,Harmonic Analysis, Signal Analysis, Spectral Methods, Wavelets, Splines, Approximation Theory 33) Roberto Triggiani Department of Mathematical Sciences University of Memphis Memphis, TN 38152 P.D.E, Control Theory, Functional Analysis, [email protected]

34) Gilbert G.Walter Department Of Mathematical Sciences University of Wisconsin-Milwaukee,Box 413, Milwaukee,WI 53201-0413 414-229-5077 e-mail: [email protected] Distribution Functions, Generalised Functions, Wavelets 35) Xin-long Zhou Fachbereich Mathematik, Fachgebiet Informatik Gerhard-Mercator-Universitat Duisburg

959

Page 208: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Princeton,NJ 08544-5263 609-258-4595(x4619 assistant) e-mail: [email protected] OptimizationTheory&Applications, Global Optimization 16) J.A.Goldstein Department of Mathematical Sciences The University of Memphis Memphis,TN 38152 901-678-3130 e-mail:[email protected] Partial Differential Equations, Semigroups of Operators 17) H.H.Gonska Department of Mathematics University of Duisburg Duisburg, D-47048 Germany 011-49-203-379-3542 e-mail:[email protected] duisburg.de Approximation Theory, Computer Aided Geometric Design 18) John R. Graef Department of Mathematics University of Tennessee at Chattanooga Chattanooga, TN 37304 USA [email protected] Ordinary and functional differential equations, difference equations, impulsive systems, differential inclusions, dynamic equations on time scales , control theory and their applications 19) Weimin Han Department of Mathematics University of Iowa Iowa City, IA 52242-1419 319-335-0770 e-mail: [email protected] Numerical analysis, Finite element method, Numerical PDE, Variational inequalities, Computational mechanics NEW MEMBERS 39)Xing-Biao Hu Institute of Computational Mathematics AMSS, Chinese Academy of Sciences Beijing, 100190, CHINA [email protected] Computational Mathematics

Lotharstr.65,D-47048 Duisburg,Germany e-mail:[email protected] duisburg.de Fourier Analysis,Computer-Aided Geometric Design, Computational Complexity, Multivariate Approximation Theory, Approximation and Interpolation Theory 36) Xiang Ming Yu Department of Mathematical Sciences Southwest Missouri State University Springfield,MO 65804-0094 417-836-5931 e-mail: [email protected] Classical Approximation Theory, Wavelets 37) Lotfi A. Zadeh Professor in the Graduate School and Director, Computer Initiative, Soft Computing (BISC) Computer Science Division University of California at Berkeley Berkeley, CA 94720 Office: 510-642-4959 Sec: 510-642-8271 Home: 510-526-2569 FAX: 510-642-1712 e-mail: [email protected] Fuzzyness, Artificial Intelligence, Natural language processing, Fuzzy logic 38) Ahmed I. Zayed Department Of Mathematical Sciences DePaul University 2320 N. Kenmore Ave. Chicago, IL 60614-3250 773-325-7808 e-mail: [email protected] Shannon sampling theory, Harmonic analysis and wavelets, Special functions and orthogonal polynomials, Integral transforms 40) Choonkil Park Department of Mathematics Hanyang University Seoul 133-791 S.Korea, [email protected] Functional Equations

960

Page 209: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Instructions to Contributors

Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC, of TN.

Editor in Chief: George Anastassiou

Department of Mathematical Sciences University of Memphis

Memphis, TN 38152-3240, U.S.A.

1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves. 2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.

961

Page 210: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corollaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,

962

Page 211: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990). Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986. Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495. 11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears. 15. This journal will consider for publication only papers that contain proofs for their listed results.

963

Page 212: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

FUNCTIONAL INEQUALITIES ASSOCIATED WITH INNERPRODUCT PRESERVING MAPPINGS

GANG LU, GEORGE A. ANASTASSIOU, CHOONKIL PARK∗, AND YUANFENG JIN

Abstract. In this paper, we prove the Hyers-Ulam stability of inner product preservingmappings in Hilbert spaces for the following additive functional equation

f(ax + by) = af(x) + bf(y).

1. Introduction and preliminaries

The stability problem of functional equations originated from a question of Ulam [28]concerning the stability of group homomorphisms: Let (G1, ∗) be a group and let (G2, , d)be a metric group with the metric d(·, ·). Given ε > 0, does there exist a δ(ε) > 0 suchthat if a mapping h : G1 → G2 satisfies the inequality

d(h(x ∗ y), h(x) h(y)) < δ

for all x, y ∈ G1, then there is a homomorphism H : G1 → G2 with

d(h(x), H(x)) < ε

for all x ∈ G1? If the answer is affirmative, we would say that the question of homo-morphism H(x ∗ y) = H(x) H(y) is stable. The concept of stability for a functionalequation arises when we replace the functional equation by an inequality which acts as aperturbation of the equation. Thus the stability question of functional equation is thathow do the solutions of the inequality differ from those of the given functional equation?

Hyers [12] gave a first affirmative answer to the question of Ulam for Banach spaces.Let X and Y be Banach spaces. Assume that f : X → Y satisfies

‖f(x+ y)− f(x)− f(y)‖ ≤ ε

for all x, y ∈ X and some ε ≥ 0. Then there exists a unique additive mapping T : X → Ysuch that

‖f(x)− T (x)‖ ≤ ε

for all x ∈ X.Let X and Y be Banach spaces with norms ‖ · ‖ and ‖ · ‖, respectively. Consider

f : X → Y to be a mapping such that f(tx) is continuous in t ∈ R for each fixed x ∈ X.

2010 Mathematics Subject Classification. Primary 39B62, 39B52, 46B25.Key words and phrases. additive functional equation; inner product preserving mapping Hyers-Ulam

stability; Hilbert space.∗Corresponding author.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

964 GANG LU ET AL 964-972

Page 213: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

G. LU, G. A. ANASTASSIOU, C. PARK, AND Y. JIN

Rassias [22] introduced the following inequality: Assume that there exist constants λ ≥ 0and p ∈ [0, 1) such that

‖f(x+ y)− f(x)− f(y)‖ ≤ λ(‖x‖p + ‖y‖p)

for all x, y ∈ X. Rassias [22] showed that there exists a unique R-linear mapping T :X → Y such that

‖f(x)− T (x)‖ ≤ 2λ

2− 2p‖x‖p

for all x ∈ X. Beginning around the year 1980 the topic of approximate homomor-phisms, or the stability of the equation of homomorphism, was studied by a number ofmathematicians. Gavruta [11] generalized the Rassias’ result.

A square norm on an inner product space satisfies the important parallelogram equality

‖x+ y‖2 + ‖x− y‖2 = 2‖x‖2 + 2‖y‖2

The functional equation

f(x+ y) + f(x− y) = 2f(x) + 2f(y)

is called a quadratic functional equation. In particular, every solution of the quadraticfunctional equation is said to be a quadratic mapping. A Hyers-Ulam stability problem forthe quadratic functional equation was proved by Skof [27] for mappings f : X → Y , whereX is a normed space and Y is a Banach space. Cholewa [4] noticed that the theorem ofSkof is still true if the relevant domain X is replace by an Abelian group. In [5], Czerwikproved the Hyers-Ulam stability of the quadratic functional equation. Borelli and Forti[10] generalized the stability result as follows: Let G be an abelian group, E a Banachspace. Assume that a mapping f : G→ E satisfies the functional inequality

‖f(x+ y) + f(x− y)− 2f(x)− 2f(y)‖ ≤ ϕ(x, y)

for all x, y ∈ G, where ϕ : G×G→ [0,∞) is a function such that

Φ(x, y) :=∞∑i=0

1

4i+1ϕ(2ix, 2iy) <∞

for all x ∈ G. The stability problems of several functional equations have been extensivelyinvestigated by a number of authors and there are many interesting results concerningthis problem. A large list of references can be found in ([6, 7, 8, 9, 13, 14, 15, 16, 17, 18,19, 20, 21, 23, 24, 25, 26]).

Let X and Y be complex Hilbert spaces. An additive mapping f : X → Y is called aninner product preserving mapping if f satisfies the orthogonality equation

〈f(x), f(y)〉 = 〈x, y〉

for all x, y ∈ X. The inner product preserving mapping problem has been investigated inseveral papers (see [1, 2, 3]).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

965 GANG LU ET AL 964-972

Page 214: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

INNER PRODUCT PRESERVING MAPPINGS

In this paper, we prove the Hyers-Ulam stability of inner product preserving mappingsin Hilbert spaces for the following additive function equation.

f(ax+ by) = af(x) + bf(y), a, b ∈ R \ 0. (1)

Throughout this paper, assume that X and Y are complex Hilbert spaces, and thata, b ∈ R \ 0 with |a| < 1 or |b| > 1 or a = b = 1.

2. Hyers-Ulam stability of (1) in Hilbert spaces

We prove the Hyers-Ulam stability of inner product preserving mappings in Hilbertspaces for the additive function equation (1) when |a| < 1 or |b| > 1.

Theorem 2.1. Let |a| < 1 and let f : X → Y be a mapping with f(0) = 0 for whichthere exists a function φ : X ×X → [0,∞) such that

φ(x, y) :=∞∑j=0

|aj|φ( xaj,y

aj

)<∞, (2.1)

‖f(ax+ by)− af(x)− bf(y)‖ ≤ φ(x, y), (2.2)

|〈f(x), f(y)〉 − 〈x, y〉| ≤ φ(x, y) (2.3)

for all x, y ∈ X. Then there exists a unique inner product preserving mapping I : X → Ysuch that

‖f(x)− I(x)‖ ≤ φ(xa, 0)

(2.4)

for all x ∈ X.

Proof. Letting y = 0 in (2.2), we obtain

‖f(ax)− af(x)‖ ≤ φ(x, 0).

Then ∥∥∥f(x)− af(xa

)∥∥∥ ≤ φ(xa, 0). (2.5)

It follows from (2.5) that∥∥∥alf ( xal

)− amf

( x

am

)∥∥∥ ≤ m−1∑j=l

∥∥∥ajf ( xaj

)− aj+1f

( x

aj+1

)∥∥∥≤

m−1∑j=l

|aj|φ( x

aj+1, 0)

for all nonnegative integers m and l with m > l and all x ∈ X. It means that thesequence anf

(xan

) is a Cauchy sequence for all x ∈ X. Since Y is complete, the sequence

anf( xan

) converges. We define the mapping I : X → Y by I(x) = limn→∞anf( xan

) forall x ∈ X. Moreover, letting l = 0 and passing the limit m→∞, we get (2.4).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

966 GANG LU ET AL 964-972

Page 215: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

G. LU, G. A. ANASTASSIOU, C. PARK, AND Y. JIN

We show that I(x) is an additive mapping.

‖I(x+ y)− I(x)− I(y)‖ = limn→∞

|an|∥∥∥∥f (x+ y

an

)− f

( xan

)− f

( yan

)∥∥∥∥≤ lim

n→∞|an|

∥∥∥∥f (x+ y

an

)− af

( x

aan

)− bf

( y

ban

)∥∥∥∥+∥∥∥af ( x

ana

)− f

( xan

)∥∥∥+∥∥∥bf ( y

ban

)− f

( yan

)∥∥∥≤ lim

n→∞|an|

φ( x

aan,y

ban

)+ φ

( xan, 0)

+ φ(

0,y

an

)= 0.

It follows from (2.1) and (2.3) that∣∣∣⟨anf ( xan

), anf

( yan

)⟩− 〈x, y〉

∣∣∣ =∣∣a2n∣∣ · ∣∣∣⟨f ( x

an

), f( yan

)⟩−⟨ xan,y

an

⟩∣∣∣≤ |a2n|φ

( xan,y

an

)≤ |an|φ

( xan,y

an

),

which tends to zero as n→∞ for all x, y ∈ X.

〈I(x), I(y)〉 = limn→∞

⟨anf

( xan

), anf

( yan

)⟩= 〈x, y〉

for all x, y ∈ X.It only remains to show that the mapping I : X → Y is unique. Let g be another

additive mapping satisfying (2.4). Then

‖g(x)− I(x)‖ = |an|∥∥∥g ( x

an

)− I

( yan

)∥∥∥≤ |an|

(∥∥∥g ( xan

)− f

( xan

)∥∥∥+∥∥∥f ( x

an

)− I

( yan

)∥∥∥)≤ 2

∞∑i=1

|ai+n|φ( x

ai+n, 0)

for all x ∈ X and n ∈ N. Thus from n→∞, one establishes

g(x)− I(x) = 0

for all x ∈ X. This completes the proof of uniqueness.

Corollary 2.2. Let |a| < 1 and let f : X → Y be a mapping for which there existconstants θ ≥ 0 and r ∈ [0, 1) such that

‖f(ax+ by)− af(x)− bf(y)‖ ≤ θ(‖x‖r + ‖y‖r), (2.6)

|〈f(x), f(y)〉 − 〈x, y〉| ≤ θ(‖x‖r + ‖y‖r) (2.7)

for all x, y ∈ X. Then there exists a unique inner product preserving mapping I : X → Y

such that

‖f(x)− I(x)‖ ≤ θ

|a|r − |a|‖x‖r

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

967 GANG LU ET AL 964-972

Page 216: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

INNER PRODUCT PRESERVING MAPPINGS

for all x ∈ X.

Proof. Defining φ(x, y) = θ(‖x‖ + ‖y‖) and applying Theorem 2.1, we get the desiredresult.

Theorem 2.3. Let |b| > 1 and let f : X → Y be a mapping with f(0) = 0, (2.2) and(2.3) for which there exists a function φ : X ×X → [0,∞) such that

∞∑j=0

|b2j|φ( xbj,y

bj

)<∞ (2.8)

for all x, y ∈ X. Then there exists a unique inner product preserving mapping I : X → Y

such that

‖f(x)− I(x)‖ ≤ φ(

0,x

b

)(2.9)

for all x ∈ X, where

φ(x, y) :=∞∑j=0

|bj|φ( xbj,y

bj

)for all x, y ∈ X.

Proof. Letting x = 0 and replacing y by x in (2.2), we obtain

‖f(bx)− bf(x)‖ ≤ φ(0, x),

an so ∥∥∥blf (xbl

)− bmf

( xbm

)∥∥∥ ≤ m−1∑j=l

∥∥∥bjf ( xbj

)− bj+1f

( x

bj+1

)∥∥∥≤

m−1∑j=l

|bj|φ(

0,x

bj+1

)for all nonnegative integers m and l with m > l and all x ∈ X. It means that thesequence bnf

(xbn

) is a Cauchy sequence for all x ∈ X. Since Y is complete, the sequence

bnf( xbn

) converges. We define the mapping I : X → Y by I(x) = limn→∞bnf( xbn

) forall x ∈ X. Moreover, letting l = 0 and passing the limit m→∞, we get (2.9).

It follows from (2.3) and (2.8) that∣∣∣⟨bnf ( xbn

), bnf

( ybn

)⟩− 〈x, y〉

∣∣∣ = |b2n| ·∣∣∣⟨f ( x

bn

), f( ybn

)⟩−⟨ xbn,y

bn

⟩∣∣∣≤ |b2n|φ

( xbn,y

bn

),

which tends to zero as n→∞ for all x, y ∈ X.

〈I(x), I(y)〉 = limn→∞

⟨bnf

( xbn

), bnf

( ybn

)⟩= 〈x, y〉

for all x, y ∈ X.The rest of the proof is similar to the proof of Theorem 2.1.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

968 GANG LU ET AL 964-972

Page 217: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

G. LU, G. A. ANASTASSIOU, C. PARK, AND Y. JIN

Corollary 2.4. Let |b| > 1 and let f : X → Y be a mapping for which there existconstants θ ≥ 0 and r > 2 satisfying (2.6) and (2.7). Then there exists a unique innerproduct preserving mapping I : X → Y such that

‖f(x)− I(x)‖ ≤ θ

|b|r − |b|‖x‖r

for any x ∈ X.

Proof. Defining φ(x, y) = θ(‖x‖ + ‖y‖) and applying Theorem 2.3, we get the desiredresult.

Now we prove the Hyers-Ulam stability of inner product preserving mappings in Hilbertspaces for the additive function equation (1) when a = b = 1.

Theorem 2.5. Let f : X → Y be a mapping for which there exists a function φ : X×X →[0,∞) satisfying (2.3) and

φ(x, y) :=∞∑j=1

4jφ( x

2j,y

2j

)<∞, (2.10)

‖f(x+ y)− f(x)− f(y)‖ ≤ φ(x, y) (2.11)

for all x, y ∈ X. Then there exists a unique inner product preserving mapping I : X → Ysuch that

‖f(x)− I(x)‖ ≤ 1

2φ (x, x) (2.12)

for all x ∈ X, where

φ(x, y) :=∞∑j=1

2jφ( x

2j,y

2j

)for all x, y ∈ X.

Proof. Letting y = x in (2.11), we obtain

‖f(2x)− 2f(x)‖ ≤ φ(x, x).

Then ∥∥∥f(x)− 2f(x

2

)∥∥∥ ≤ φ(x

2,x

2

). (2.13)

It follows from (2.13) that∥∥∥2lf( x

2l

)− 2mf

( x

2m

)∥∥∥ ≤ m−1∑j=l

∥∥∥2jf( x

2j

)− 2j+1f

( x

2j+1

)∥∥∥≤

m−1∑j=l

2jφ( x

2j+1,x

2j+1

)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

969 GANG LU ET AL 964-972

Page 218: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

INNER PRODUCT PRESERVING MAPPINGS

for all nonnegative integers m and l with m > l and all x ∈ X. It means that thesequence 2nf

(x2n

) is a Cauchy sequence for all x ∈ X. Since Y is complete, the sequence

2nf( x2n

) converges. We define the mapping I : X → Y by I(x) = limn→∞2nf( x2n

) forall x ∈ X. Moreover, letting l = 0 and passing the limit m→∞, we get (2.12).

It follows from (2.3) and (2.10) that∣∣∣⟨2nf( x

2n

), 2nf

( y2n

)⟩− 〈x, y〉

∣∣∣ = |22n| ·∣∣∣⟨f ( x

2n

), f( y

2n

)⟩−⟨ x

2n,y

2n

⟩∣∣∣≤ |22n|φ

( x2n,y

2n

),

which tends to zero as n→∞ for all x, y ∈ X.

〈I(x), I(y)〉 = limn→∞

⟨2nf

( x2n

), 2nf

( y2n

)⟩= 〈x, y〉

for all x, y ∈ X.The rest of the proof is similar to the proof of Theorem 2.1.

Corollary 2.6. Let f : X → Y be a mapping for which there exist constants θ ≥ 0 andr > 2 satisfying (2.7) and

‖f(x+ y)− f(x)− f(y)‖ ≤ θ(‖x‖r + ‖y‖r) (2.14)

for all x, y ∈ X. Then there exists a unique inner product preserving mapping I : X → Ysuch that

‖f(x)− I(x)‖ ≤ 2θ

2r − 2‖x‖r

for all x ∈ X.

Proof. Defining φ(x, y) = θ(‖x‖ + ‖y‖) and applying Theorem 2.5, we get the desiredresult.

Theorem 2.7. Let f : X → Y be a mapping for which there exists a function φ : X×X →[0,∞) satisfying (2.3), (2.11) and

φ(x, y) :=∞∑j=0

1

2jφ(2jx, 2jy

)for all x, y ∈ X. Then there exists a unique inner product preserving mapping I : X → Ysuch that

‖f(x)− I(x)‖ ≤ 1

2φ (x, x)

for all x ∈ X.

Proof. It follows from (2.13) that∥∥∥∥f(x)− 1

2f (2x)

∥∥∥∥ ≤ 1

2φ (x, x) .

The rest of the proof is similar to the proofs of Theorems 2.1 and 2.5.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

970 GANG LU ET AL 964-972

Page 219: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

G. LU, G. A. ANASTASSIOU, C. PARK, AND Y. JIN

Corollary 2.8. Let f : X → Y be a mapping for which there exist constants θ ≥ 0 andr ∈ (0, 1) satisfying (2.7) and (2.14). Then there exists a unique inner product preservingmapping I : X → Y such that

‖f(x)− I(x)‖ ≤ 2θ

2− 2r‖x‖r

for all x ∈ X.

Proof. Defining φ(x, y) = θ(‖x‖ + ‖y‖) and applying Theorem 2.7, we get the desiredresult.

Acknowledgments

G. Lu was supported by supported by Doctoral Science Foundation of Liaoning Province,China, by Hall of Liaoning Province Science and Technology (No. 2012-1055) and C.Park was supported by Basic Science Research Program through the National ResearchFoundation of Korea funded by the Ministry of Education, Science and Technology (NRF-2012R1A1A2004299).

References

[1] J. Chmielinski, On a singular case in the Hyers-Ulam-Rassias stability of the Wigner equation, J.Math. Anal. Appl. 289 (2004), 571–583.

[2] J. Chmielinski, Linear mappings approximately preserving orthogonality, J. Math. Anal. Appl. 304(2005), 158–169.

[3] J. Chmielinski and S. Jung, The stability of the Wigner equation on a restricted domain, J. Math.Anal. Appl. 254 (2001), 309–320.

[4] P. W. Cholewa, Remarks on the stability of functional equations, Aequationes Math. 27 (1984),76–86.

[5] S. Czerwik, On the stability of the quatradic mapping in normed spaces, Abh. Math. Sem. Univ.Hamburg 62 (1992), 59–64.

[6] S. Czerwik, The stability of the quadratic functional equation, in Stability of Mappings of Hyers-UlamType (edited by Th. M. Rassias and J. Tabor), Hadronic Press, Palm Harbor, Florida, 1994, pp.81–91.

[7] S. Czerwik, Stability of Functional equations of Ulam-Hyers-Rassias Type, Hardronic Press, PalmHarbor, Florida, 2003.

[8] M. Eshaghi Gordji, G. Kim, J. Lee and C. Park, Generalized ternary bi-derivations on ternaryBanach algebras: a fixed point approach, J. Comput. Anal. Appl. 15 (2013), 45–54.

[9] M. Eshaghi Gordji, G. Kim, J. Lee and C. Park, Nearly generalized derivations on non-ArchimdeanBanach algebras: a fixed point approach, J. Comput. Anal. Appl. 15 (2013), 308–315.

[10] G. L. Forti, Comments on the core of the direct method for provinh Hyers-Ulam stability of functionalequations, J. Math. Anal. Appl. 295 (2004), 127–133.

[11] P. Gavruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings,J. Math. Anal. Appl. 184 (1994), 431–436.

[12] D. H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. U.S.A. 27(1941), 222–224.

[13] D. H. Hyers, G.Isac and Th. M. Rassias, Stability of Functional Equations in Several Variables,Birkhauser, Basel, 1998.

[14] M. Kim, Y. Kim, G. A. Anastassiou and C. Park, An additive functional inequality in matrix normedmodules over a C∗-algebra, J. Comput. Anal. Appl. 17 (2014), 329–335.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

971 GANG LU ET AL 964-972

Page 220: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

INNER PRODUCT PRESERVING MAPPINGS

[15] M. Kim, S. Lee, G. A. Anastassiou and C. Park, Functional equations in matrix normed modules, J.Comput. Anal. Appl. 17 (2014), 336–342.

[16] J. Lee, S. Lee and C. Park, Fixed points and stability of the Cauchy-Jensen functional equation infuzzy Banach algebras, J. Comput. Anal. Appl. 15 (2013), 692–698.

[17] J. Lee, C. Park, Y. Cho and D. Shin, Orthogonal stability of a cubic-quartic functional equation innon-Archimedean spaces, J. Comput. Anal. Appl. 15 (2013), 572–583.

[18] L. Li, G. Lu, C. Park and D. Shin, Additive functional inequalities in generalized quasi-Banachspaces, J. Comput. Anal. Appl. 15 (2013), 1165–1175.

[19] G. Lu, Y. Jiang and C. Park, Additive functional equation in Frechet spaces, J. Comput. Anal. Appl.15 (2013), 369–373.

[20] C. Park, K. Ghasemi, S. G. Ghaleh, S. Jang, Approximate n-Jordan ∗-homomorphisms in C∗-algebras, J. Comput. Anal. Appl. 15 (2013), 365–368.

[21] C. Park, A. Najati and S. Jang, Fixed points and fuzzy stability of an additive-quadratic functionalequation, J. Comput. Anal. Appl. 15 (2013), 452–462.

[22] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc.72 (1978), 297–300.

[23] S. Shagholi, M. Eshaghi Gordji and M. Bavand Savadkouhi, Stability of ternary quadratic derivationson ternary Banach algebras, J. Comput. Anal. Appl. 13 (2011), 1097–1105.

[24] S. Shagholi, M. Eshaghi Gordji and M. Bavand Savadkouhi, Nearly ternary cubic homomorphismsin ternary Frechet algebras, J. Comput. Anal. Appl. 13 (2011), 1106–1114.

[25] D. Shin, C. Park and Sh. Farhadabadi, On the superstability of ternary Jordan C∗-homomorphisms,J. Comput. Anal. Appl. 16 (2014), 964–973.

[26] D. Shin, C. Park and Sh. Farhadabadi, Stability and superstability of J∗-homomorphisms and J∗-derivations for a generalized Cauchy-Jensen equation, J. Comput. Anal. Appl. 17 (2014), 125–134.

[27] F. Skof, Proprita locali e approssimazion di operatori, Rend. Sem. Mat. Fis. Milano 53 (1983),113–129.

[28] S. M. Ulam, problems in Modern mathematics, Wiley, New York, 1960.

Gang LuDepartment of Mathematics, School of Science, ShenYang University of Technology,Shenyang 110178, P.R. China

E-mail address: [email protected]

George A. AnastassiouDepartment of Mathematical Sciences, University of Memphis, Memphis, TN 38152, USA

E-mail address: [email protected]

Choonkil ParkDepartment of Mathematics, Research Institute for Natural Sciences, Hanyang Univer-sity, Seoul 133-791, Korea

E-mail address: [email protected]

Yuanfeng JinDepartment of Mathematics, Yanbian University, Yanji 133001, P.R. China

E-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

972 GANG LU ET AL 964-972

Page 221: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

.

STABILITY AND SUPERSTABILITY OF (fr, fs)-DOUBLEDERIVATIONS IN QUASI-BANACH ALGEBRAS

SUN YOUNG JANG, CHOONKIL PARK, PEGAH EFTEGHAR,

AND SHAHROKH FARHADABADI∗

Abstract. In this paper, the following functional equation

n∑k=2

[ k∑i1=2

k+1∑i2=i1+1

· · ·n∑

in−k+1=in−k+1

f( n∑

i=1,i6=i1,··· ,in−k+1

aixi −n−k+1∑r=1

airxir

)]

+f( n∑

i=1

aixi

)= a1 · 2n−1f(x1) (0.1)

is considered (n ≥ 2), and the Hyers-Ulam stability and superstability of (fr, fs)-double

derivations on quasi-Banach algebras associated with the functional equation (0.1) are

proved.

1. Introduction and preliminaries

The stability of functional equations theory discusses and studies about solutions offunctional equations and analyzes the relationships between approximate and exact so-lutions of the functional equations. Actually, we say a functional equation is stable, ifone can find an exact solution for any approximate solution of the functional equation.Subsequently, the concept of superstability has a near nature to the stability sense. Inother words, it happens when any approximate solution is also an exact solution that insuch situation the functional equation is called superstable.

In 1940, the most preliminary kind of stability problems was proposed by Ulam [37].He gave a talk and asked the following: “when and under what conditions does an exactsolution of a functional equation near an approximately solution of that exist?”

In 1941, Hyers [14] formulated and proved the Ulam’s problem for the Cauchy’s func-tional equation on Banach spaces. The result of Hyers was generalized by Aoki [3] foradditive mappings and by Rassias [32] for linear mappings by considering an unboundedCauchy difference. In 1994, Gavruta [13] provided a further generalization of Rassias’ the-orem in which he replaced the unbounded Cauchy difference by a general control functionfor the existence of a unique linear mapping.

It seems that considering stability problems concerning derivations returns to 1994by Semrl [34] who had worked on derivations between operator algebras and afterwardsJun and Park [16]. They had investigated approximate derivations on Banach algebras

02010 Mathematics Subject Classification: 47B48, 47B47, 39B52, 39B82, 32A65, 17A36, 46Hxx.

Key words and phrases. Functional equation; Hyers-Ulam stability; (fr, fs)-double derivation; Super-

stability; Quasi-Banach algebra.∗Corresponding author: Email address: shahrokh [email protected] (Sh. Farhadabadi).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

973 SUN YOUNG JANG ET AL 973-983

Page 222: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

S. JANG, C. PARK, P. EFTEGHAR, AND SH. FARHADABADI

Cn[0, 1]. More stability results in many kind of derivations can be found in (cf. [2, 4, 7,8, 10, 24, 25, 26, 28, 36]).

At present, the theory of stability is quickly being deployed by numerous mathemati-cians. They pose and investigate various stability problems including different functionalequations, derivations and homomorphisms in various spaces and structures. For moreepochal information and various aspects about the stability theory, the readers can referto monographs (cf. [5, 6, 9, 11, 12, 15, 18, 19, 20, 21, 22, 23, 27, 29, 30, 31, 33, 35, 38]).

Now we give briefly some useful definitions, preliminary and fundamental results ofquasi-Banach spaces.

Definition 1.1. ([17]) Let X be a real linear space. A function ‖ · ‖ : X → R is aquasi-norm (valuation) if it satisfies the following conditions:

(N1) ‖x‖ ≥ 0 for all x ∈ X and ‖x‖ = 0 if only if x = 0;(N2) ‖λ · x‖ = |λ| · ‖x‖ for all λ ∈ R and all x ∈ X ;(N3) There is a constant K ≥ 1 such that ‖x+ y‖ ≤ K(‖x‖+ ‖y‖) for all x, y ∈ X .

In this case, the pair (X , ‖ · ‖) is called a quasi-normed space and the smallest possible Kis called the modulus of concavity of ‖ · ‖.

A complete quasi-normed space is a quasi-Banach space.

Definition 1.2. ([17]) Let 0 < p ≤ 1 be a real number. A quasi-normed space (X , ‖ · ‖)is called a p-normed space if

‖x+ y‖p ≤ ‖x‖p + ‖y‖p

for all x, y ∈ X .

Definition 1.3. ([1]) Let X be an algebra and (X , ‖ · ‖) be a quasi-normed space. Thequasi-normed space (X , ‖ · ‖) is called a quasi-normed algebra if there exist a constantC > 0 such that

‖xy‖ ≤ C‖x‖‖y‖for all x, y ∈ X . In addition, if the quasi-norm ‖ · ‖ is a p-norm, then the quasi-normedalgebra (X , ‖ · ‖) is called a p-normed algebra.

Definition 1.4. ([24]) Let X be an algebra and f2, f3 : X → X be linear mappings. Alinear mapping f1 : X → X is called an (f2, f3)-double derivation if

f1(xy) = f1(x)y + xf1(y) + f2(x)f3(y) + f3(x)f2(y)

for all x, y ∈ X . By an f2-double derivation we mean an (f2, f2)-double derivation. It isclear that f1 is an (f2, f3)-double derivation if and only if f1 is an (f3, f2)-double derivation.

Now, consider the functional equation (0.1). This equation which is called the generaln-dimensional additive functional equation, was introduced by Khodaei and Rassias [17].In order to investigate (0.1), throughout this paper a1, · · · , an (with n ≥ 2, a1 > 1), arefixed positive integers and X will be also a p-Banach algebra with p-norm ‖ · ‖, as well asthe integers 1 ≤ j, r, s ≤ 3 are assumed with j 6= r 6= s.

2. Hyers-Ulam stability of (fr, fs)-double derivations on quasi-Banachalgebras

In this section, we prove the Hyers-Ulam stability of (fr, fs)-double derivations onquasi-Banach algebras associated with the functional equation (0.1).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

974 SUN YOUNG JANG ET AL 973-983

Page 223: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

SUPERSTABILITY OF (fr, fs)-DOUBLE DERIVATIONS IN QUASI-BANACH ALGEBRAS

First of all, for convenience, for given mappings fj : X → X , we define the differenceoperators:

Dλfj(x1, · · · , xn

):=

n∑k=2

[ k∑i1=2

k+1∑i2=i1+1

· · ·n∑

in−k+1=in−k+1

fj

( n∑i=1,

i6=i1,··· ,in−k+1

aiλxi −n−k+1∑r=1

airλxir

)]+ fj

( n∑i=1

aiλxi

)− a1 · 2n−1λfj(x1),

Dfj, fr, fs(x, y) := fj(xy)− fj(x)y − xfj(y)− fr(x)fs(y)− fs(x)fr(y)

for all x, y, x1, · · · , xn ∈ X and all λ ∈ R.

Lemma 2.1. ([17]) Let X and Y be real vector spaces. A mapping f : X → Y satisfiesthe functional equation (0.1) if and only if f : X → Y is additive.

From now on, 0 < p ≤ 1 is a real number.

Theorem 2.2. Let φ : X n → [0,∞) be a function such that

φ(x1, · · · , xn

):=

∞∑i=0

[1

a1iφ(ai1x1, · · · , ai1xn

)]p< +∞ (2.1)

for all x1, · · · , xn ∈ X . Suppose that fj : X → X , j = 1, 2, 3, are mappings satisfying theinequalities

maxj

∥∥Dλfj(x1, x2, · · · , xn

)∥∥ ≤ φ(x1, x2, · · · , xn

), (2.2)

maxj,r,s

∥∥Dfj ,fr,fs(x, y)∥∥ ≤ φ

(x+ y, · · · , x+ y

)(2.3)

for all x, y, x1, · · · , xn ∈ X and all λ ∈ R. Then unique (Fr,Fs)-double derivationsFj : X → X defined by the limits

Fj(x) = limm→∞

1

am1fj(a

m1 x)

exist and satisfy the inequalities∥∥∥Fj(x)− fj(x)∥∥∥ ≤ 1

a1 · 2n−1[φ(x, 0, · · · , 0

)] 1p

(2.4)

for all x ∈ X .

Proof. Letting x1 = x, x2 = · · · = xn = 0 and λ = 1 in (2.2), we get∥∥D1f1(x, 0, · · · , 0

)∥∥ ≤ φ(x, 0, · · · , 0

)for all x ∈ X . From this inequality and the fact that

2n−1 =n−1∑i=0

(n− 1

i

)= 1 +

n−1∑i=1

(n− 1

i

),

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

975 SUN YOUNG JANG ET AL 973-983

Page 224: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

S. JANG, C. PARK, P. EFTEGHAR, AND SH. FARHADABADI

we have ∥∥∥∥f1(x)− 1

a1f1(a1x)

∥∥∥∥ ≤ 1

a1 · 2n−1φ(x, 0, · · · , 0

)for all x ∈ X . Replacing x by ai1x and then dividing both sides by ai1, we get∥∥∥∥ 1

ai1f1(a

i1x)− 1

ai+11

f1(ai+11 x)

∥∥∥∥ ≤ 1

a1i+1 · 2n−1φ(ai1x, 0, · · · , 0

)(2.5)

for all x ∈ X and all nonnegative integers i. Assume that m, t are positive integers withm > t. Since X is a p-Banach space, it follows from (2.5) that∥∥∥∥ 1

am1f1(a

m1 x)− 1

at1f1(a

t1x)

∥∥∥∥p ≤ m−1∑i=t

∥∥∥∥ 1

ai+11

f1(ai+11 x)− 1

ai1f1(a

i1x)

∥∥∥∥p

≤ 1

(a1 · 2n−1)pm−1∑i=t

[1

a1iφ(ai1x, 0, · · · , 0

)]p(2.6)

for all x ∈ X . Now by the condition (2.1), we deduce that the right-hand side tends to

zero as t,m → ∞, and this implies that the sequence

1am1f1(a

m1 x)

is Cauchy. Since X

is complete, the sequence

1am1f1(a

m1 x)

converges in X , and therefore we can define for

all x ∈ X the mapping F1 : X → X by

F1(x) = limm→∞

1

am1f1(a

m1 x).

Now we claim that F1 : X → X is R-linear. In order to verify that, we first show that F1

is additive. It follows from (2.2) and (2.1) that∥∥∥D1F1

(x1, x2, · · · , xn

)∥∥∥p =

∥∥∥∥ limm→∞

1

am1D1f1

(am1 x1, a

m1 x2, · · · , am1 xn

)∥∥∥∥p≤ lim

m→∞

[1

am1φ(am1 x1, a

m1 x2, · · · , am1 xn

)]p= 0

for all x1, · · · , xn ∈ X . So D1F1(x1, x2, · · · , xn) = 0 for all x1, x2, · · · , xn ∈ X , whichmeans F1 : X → X satisfies the functional equation (0.1). Therefore, Lemma 2.1 clarifiesthat the mapping F1 is additive. So

a1F1(x) = F1(a1x) = limm→∞

1

am1f1(a

m+11 x),

F1(x) = limm→∞

1

am+11

f1(am+11 x)

for all x ∈ X . For x1 = am1 x and x2 = · · · = xn = 0, it follows from (2.2) that∥∥∥a−(m+1)1 f1(a

m+11 λx)− a−m1 λf1(a

m1 x)

∥∥∥p ≤ 1

ap1 · 2(n−1)p

[1

am1φ(am1 x, 0, · · · , 0

)]p

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

976 SUN YOUNG JANG ET AL 973-983

Page 225: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

SUPERSTABILITY OF (fr, fs)-DOUBLE DERIVATIONS IN QUASI-BANACH ALGEBRAS

for all x ∈ X and all λ ∈ R. By (2.1), the right-hand side tends to zero as m→∞. Hence∥∥∥F1(λx)− λF1(x)∥∥∥p = 0

for all x ∈ X and all λ ∈ R. So F1(λx) = λF1(x) for all x ∈ X and all λ ∈ R, and thusF1 is R-linear.

Putting t = 0 and passing the limit m→∞ in (2.6), we get the inequality (2.4) forj = 1.

Let F ′1 : X → X be another R-linear mapping satisfying (2.4). Then we have∥∥∥F1(x)−F ′1(x)∥∥∥p ≤ 1

amp1

(∥∥F1(am1 x)− f1(am1 x)

∥∥p +∥∥F ′1(am1 x)− f1(am1 x)

∥∥p)≤ 2

amp1

· 1

(a1.2n−1)pφ(am1 x, 0, · · · , 0

)=

2

(a1.2n−1)p·∞∑i=m

[1

ai1φ(ai1x, 0, · · · , 0

)]pfor all x ∈ X . By (2.1), the right-hand side tends to zero as m→∞, which signifies theuniqueness of F1.

By a similar method, one can easily show that the unique and R-linear mappingsF2 : X → X and F3 : X → X defined by

F2(x) = limm→∞

1

am1f2(a

m1 x), F3(x) = lim

m→∞

1

am1f3(a

m1 x)

exist and satisfy (2.4) for all x ∈ X .To end the proof, it is just necessary to show that F1 is an (F2,F3)-double derivation.

It follows from (2.3) that∥∥∥Df1,f2,f3(x, y)∥∥∥ =

∥∥∥Df1,f3,f2(x, y)∥∥∥ ≤ φ

(x+ y, · · · , x+ y

)for all x, y ∈ X . We know a1 > 1, so a1

mp > 1 and(a1mp)2> a1

mp. Therefore, the lastinequality and the condition (2.1) imply that∥∥∥F1(xy)−F1(x)y − xF1(y)−F2(x)F3(y)−F3(x)F2(y)

∥∥∥p= lim

m→∞

1

a12mp

∥∥∥f1 (a2m1 xy)− f1 (am1 x) am1 y − am1 xf1 (am1 y)

−f2 (am1 x) f3 (am1 y)− f3 (am1 x) f2 (am1 y)∥∥∥p

= limm→∞

1

a12mp

∥∥∥Df1,f3,f2 (am1 x, am1 y)

∥∥∥p< lim

m→∞

[1

a1mφ(am1 (x+ y), · · · , am1 (x+ y)

)]p= 0

for all x, y ∈ X . Hence

F1(xy) = F1(x)y + xF1(y) + F2(x)F3(y) + F3(x)F2(y)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

977 SUN YOUNG JANG ET AL 973-983

Page 226: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

S. JANG, C. PARK, P. EFTEGHAR, AND SH. FARHADABADI

for all x, y ∈ X .Similarly we can show that F2 and F3 are respectively (F1,F3)-double derivation and

(F1,F2)-double derivation and so the proof is complete.

Theorem 2.3. Let φ : X n → [0,∞) be a function such that

φ(x1, · · · , xn) :=

∞∑i=0

[ai1φ(x1ai1, · · · , xn

ai1

)]p< +∞,

limm→∞

[a1

2mφ( x

am1, · · · , x

am1

)]p= 0 (2.7)

for all x, x1, · · · , xn ∈ X . Suppose that fj : X → X , j = 1, 2, 3, are mappings satisfying(2.2) and (2.3). Then unique (Fr,Fs)-double derivations Fj : X → X defined by the limits

Fj(x) = limm→∞

am1 fj

( x

am1

)exist and satisfy the inequalities∥∥∥Fj(x)− fj(x)

∥∥∥ ≤ 1

2n−1

[φ( xa1, 0, · · · , 0

)]1/p(2.8)

for all x ∈ X .

Proof. Replacing x by x

a2i+11

in (2.5) and then multiplying by a2i+11 , we obtain∥∥∥∥ai+1

1 f1

( x

ai+11

)− ai1f1

( xai1

)∥∥∥∥ ≤ ai12n−1

φ( x

ai+11

, 0, · · · , 0)

for all x ∈ X . Now by the same method which was done in the proof of Theorem 2.2, we

can assert that the sequenceam1 f1

(xam1

)is Cauchy and convergent in X and the unique

and R-linear mappings Fj(x) = limm→∞ am1 fj(xam1

)exist and satisfy (2.8).

The inequality (2.3) and the condition (2.7) imply that∥∥∥DF1,F3,F2(x, y)∥∥∥p = lim

m→∞a1

2mp

∥∥∥∥Df1,f3,f2

( x

am1,y

am1

)∥∥∥∥p≤ lim

m→∞

[a1

2mφ(x+ y

am1, · · · , x+ y

am1

)]p= 0

for all x, y ∈ X . This shows that F1 is an (F2,F3)-double derivation.The arguments for j = 2, 3 are also the same as for j = 1 and so we will omit them.

Corollary 2.4. Let δ be a nonnegative real number and q be a positive real number suchthat q < 1 or q > 2. Suppose that fj : X → X , j = 1, 2, 3, are mappings satisfying theinequalities

maxj

∥∥Dλfj(x1, x2, · · · , xn

)∥∥ ≤ δ (‖x1‖q + · · ·+ ‖xn‖q) ,

maxj,r,s

∥∥Dfj ,fr,fs(x, y)∥∥ ≤ nδ‖x+ y‖q

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

978 SUN YOUNG JANG ET AL 973-983

Page 227: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

SUPERSTABILITY OF (fr, fs)-DOUBLE DERIVATIONS IN QUASI-BANACH ALGEBRAS

for all x, y, x1, · · · , xn ∈ X , and all λ ∈ R. Then unique (Fr,Fs)-double derivationsFj : X → X exist and satisfy the inequalities∥∥∥Fj(x)− fj(x)

∥∥∥ ≤ δ‖x‖q

2n−1 ·∣∣ap1 − apq1 ∣∣ 1p

for all x ∈ X .

Proof. Defining φ(x1, · · · , xn) := δ (‖x1‖q + · · ·+ ‖xn‖q) and applying Theorem 2.2 forthe case q < 1, and Theorem 2.3 for the case q > 2, we get the result.

3. Superstability of (fr, fs)-double derivations on quasi-Banach algebras

In this section, we prove the superstability of (fr, fs)-double derivations associated withthe functional equation (0.1).

Initially, we improve Lemma 2.1 to a stronger statement and afterwards we use it forthe proof of superstability theorem of this section.

Lemma 3.1. Let n ≥ 3 be a fixed integer and f : X → X be a mapping such that∥∥∥2n−1a1λf(x1)−n∑k=2

[ k∑i1=2

k+1∑i2=i1+1

· · ·n∑

in−k+1=in−k+1

f( n∑

i=1,i6=i1,··· ,in−k+1

aiλxi −n−k+1∑r=1

airλxir

)]∥∥∥ ≤ ∥∥∥f( n∑i=1

aiλxi

)∥∥∥ (3.1)

for all x1, · · · , xn ∈ X and all λ ∈ R. Then f is R-linear.

Proof. First, assume that n ≥ 4.Putting x4 = · · · = xn = 0 in (3.1), we get∥∥∥2n−1λa1f(x1)−

(2n−3 − 1

)f(λ[a1x1 + a2x2 + a3x3]

)− 2n−3

f(λ[a1x1 − a2x2 + a3x3

])− 2n−3f

(λ[a1x1 + a2x2 − a3x3]

)−2n−3f

(λ[a1x1 − a2x2 − a3x3]

)∥∥∥≤∥∥∥f(λ[a1x1 + a2x2 + a3x3]

)∥∥∥ (3.2)

for all x1, x2, x3 ∈ X and all λ ∈ R. Letting x1 = x2 = x3 = 0 and λ = 1 in (3.2), weobtain ∥∥∥((a1 − 1)2n−1 + 1

)f(0)

∥∥∥ ≤ ∥∥∥f(0)∥∥∥.

So f(0) = 0, (since (a1 − 1)2n−1 > 0). Putting λ = 1 and substituting x1, x2, x3 byx/a1,−x/a2, 0 and then by x/a1,−x/2a2,−x/2a3 in (3.2), respectively, we get

a1 · 2n−1f( xa1

)= 2n−2f(2x),

a1 · 2n−1f( xa1

)= 2n−2f(x) + 2n−3f(2x)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

979 SUN YOUNG JANG ET AL 973-983

Page 228: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

S. JANG, C. PARK, P. EFTEGHAR, AND SH. FARHADABADI

for all x ∈ X . Thus f(2x) = 2f(x) and f(x) = a1f(xa1

)for all x ∈ X . Letting λ = 1,

x1 = x+ y/a1, x2 = −x/a2 and x3 = −y/a3 in (3.2), we have

a1 · 2n−1f(x+ y

a1

)− 2n−3f(2x)− 2n−3f(2y)− 2n−3f(2x+ 2y) = 0

for all x, y ∈ X , which implies that f(x+ y) = f(x) + f(y) for all x, y ∈ X .Finally, letting x1 = x/a1, x2 = −x/a2 and x3 = 0 in (3.2), we obtain

a1λ · 2n−1f( xa1

)− 2n−2f(2λx) = 0

for all x ∈ X and all λ ∈ R. So f(λx) = λf(x) for all x ∈ X and all λ ∈ R, and thereforef is R-linear.

Now assume that n = 3 in (3.1). Then∥∥∥4a1λf(x1)− f(λ[a1x1 − a2x2 − a3x3]

)−f(λ[a1x1 + a2x2 − a3x3]

)− f

(λ[a1x1 − a2x2 + a3x3]

)∥∥∥≤∥∥∥f(λ[a1x1 + a2x2 + a3x3]

)∥∥∥for all x1, x2, x3 ∈ X and all λ ∈ R. As it is obvious that we can get an inequality similarto the normed inequality (3.2) for the case n ≥ 4, one can easily get the desired result.

Theorem 3.2. Let φ : X n → [0,∞), n ≥ 3, be a function such that

liml→∞

t−2lφ(tlx, · · · , tlx) = 0

for all x ∈ X , where t 6= 1 is a real number. Suppose that fj : X → X , j = 1, 2, 3, aremappings satisfying (3.1) and (2.3). Then the mappings fj : X → X are (fr, fs)-doublederivations.

Proof. Since (3.1) holds for the mappings fj : X → X , Lemma 3.1 asserts that themappings fj are R-linear. So it follows from (2.3) and the assumption on φ that∥∥∥fj(xy)− fj(x)y − xfj(y)− fr(x)fs(y)− fs(x)fr(y)

∥∥∥p= lim

l→∞

1

t2lp

∥∥∥fj (t2lxy)− fj (tlx) tly − tlxfj (tly)−fr

(tlx)fs(tly)− fs

(tlx)fr(tly) ∥∥∥p

= liml→∞

1

t2lp

∥∥∥Dfj ,fk,fi

(tlx, tly

) ∥∥∥p≤[

liml→∞

1

t2lφ(tl(x+ y), · · · , tl(x+ y)

)]p= 0p

for all x, y ∈ X , which implies that the mappings fj : X → X are (fr, fs)-double deriva-tions, as desired.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

980 SUN YOUNG JANG ET AL 973-983

Page 229: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

SUPERSTABILITY OF (fr, fs)-DOUBLE DERIVATIONS IN QUASI-BANACH ALGEBRAS

Corollary 3.3. Let δ be a nonnegative real number and q1, · · · , qn be positive real numberssuch that q1, · · · , qn > 2 or q1, · · · , qn < 2. Suppose that fj : X → X , j = 1, 2, 3, aremappings satisfying (3.1) and the inequalities

maxj,r,s

∥∥Dfj ,fr,fs(x, y)∥∥ ≤ δ

(‖x+ y‖q1 + · · ·+ ‖x+ y‖qn

)for all x, y ∈ X . Then the mappings fj : X → X are (fr, fs)-double derivations.

Proof. The proof follows from Theorem 3.2 by taking φ(x1, · · · , xn) := δ (‖x1‖q1 + · · ·+ ‖xn‖qn)with t > 1 for the case q1, · · · , qn < 2 and with t < 1 for the case q1, · · · , qn > 2.

Corollary 3.4. Let δ be a nonnegative real number and q1, · · · , qn be positive real numberssuch that q1 + · · ·+ qn 6= 2. Suppose that fj : X → X , j = 1, 2, 3, are mappings satisfying(3.1) and the inequality

maxj,r,s

∥∥Dfj ,fr,fs(x, y)∥∥ ≤ δ‖x+ y‖q1+···+qn

for all x, y ∈ X . Then the mappings fj : X → X are (fr, fs)-double derivations.

Proof. The proof follows from Theorem 3.2 by taking φ(x1, · · · , xn) := δ (‖x1‖q1 · · · ‖xp‖qn)with t > 1 for the case q1 + · · ·+ qn < 2 and with t < 1 for the case q1 + · · ·+ qn > 2.

The obtained results in this section can be simpler. Indeed, one can set q1 = · · · = qn =q in two last corollaries and get the better statements.

Acknowledgments

S. Y. Jang was supported by Basic Science Research Program through the National Re-search Foundation of Korea funded by the Ministry of Education, Science and Technology(NRF-2013007226) and has written during visiting the Research Institute of Mathemat-ics, Seoul Natinal Univerity. C. Park was supported by Basic Science Research Programthrough the National Research Foundation of Korea funded by the Ministry of Education,Science and Technology (NRF-2012R1A1A2004299).

References

[1] J. M. Almira and U. Luther, Inverse closedness of opproximation algebras, J. Math. Anal. Appl. 314

(2006), 30–44.

[2] M. Amyari, C. Park and M.S. Moslehian, Nearly ternary derivations, Taiwanese J. Math. 11 (2007),

1417–1424.

[3] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan 2

(1950), 64–66.

[4] H. Cao, J. Lv and J. M. Rassias, Superstability for generalized module left derivations and generalized

module derivations on Banach module (II), J. Inequal. Pure Appl. Math. 10 (2009), 17 pages.

[5] C.Y. Chou and J.-H. Tzeng, On approximate isomorphisms between Banach ∗-algebras or C∗-

algebras, Taiwanese J. Math. 10 (2006), 219–231.

[6] P. Czerwik, Functional Equations and Inequalities in Several Variables, Word Scientific Publishing

Company, New Jersey, Hong Kong, Singapore and London, 2002.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

981 SUN YOUNG JANG ET AL 973-983

Page 230: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

S. JANG, C. PARK, P. EFTEGHAR, AND SH. FARHADABADI

[7] A. Ebadian, N. Ghobadipour and H. Baghban, Stability of bi-θ-derivations on JB∗-triples, Int. J.

Geom. Methods Mod. Phys. 9 (2012), No. 7, Art. ID 1250051, 12 pages.

[8] A. Ebadian, I. Nikoufar and M. Eshaghi Gordji, Nearly (θ1, θ2, θ3, φ)-derivations on C∗-modules, Int.

J. Geom. Methods Mod. Phys. 9 (2012), No. 3, Art. ID 1250019, 12 pages.

[9] M. Eshaghi Gordji, A. Fazeli and C. Park, 3-Lie multipliers on Banach 3-Lie algebras, Int. J. Geom.

Methods Mod. Phys. 9 (2012), No. 7, Art. ID 1250052, 15 pages.

[10] M. Eshaghi Gordji and N. Ghobadipour, Stability of (α, β, γ)-derivations on Lie C∗-algebras, Int. J.

Geom. Methods Mod. Phys. 7 (2010), 1097–1102.

[11] M. Eshaghi Gordji, G. Kim, J. Lee and C. Park, Generalized ternary bi-derivations on ternary

Banach algebras: a fixed point approach, J. Comput. Anal. Appl. 15 (2013), 45–54.

[12] M. Eshaghi Gordji, G. Kim, J. Lee and C. Park, Nearly generalized derivations on non-Archimdean

Banach algebras: a fixed point approach, J. Comput. Anal. Appl. 15 (2013), 308–315.

[13] P. Gavruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings,

J. Math. Anal. Appl. 184 (1994), 431–436.

[14] D. H. Hyers, On the stability of the linear functional equation, Proc. Natl Acad. Sci. U.S.A. 27

(1941), 222–224.

[15] D. H. Hyers, G. Isac and Th. M. Rassias, Stability of Functional Equations in Several Variables,

Birkhauser, Basel, 1998.

[16] K. Jun and D. Park, Almost derivations on the Banach algebra Cn[0, 1], Bull. Korean Math. Soc.

33 (1996), 359–366.

[17] H. Khodaei and Th. M. Rassias, Appriximately generalized additive functions in several variables,

Int. J. Nonlinear Anal. Appl. 1 (2010), 22–41.

[18] M. Kim, Y. Kim, G. A. Anastassiou and C. Park, An additive functional inequality in matrix normed

modules over a C∗-algebra, J. Comput. Anal. Appl. 17 (2014), 329–335.

[19] M. Kim, S. Lee, G. A. Anastassiou and C. Park, Functional equations in matrix normed modules, J.

Comput. Anal. Appl. 17 (2014), 336–342.

[20] J. Lee, S. Lee and C. Park, Fixed points and stability of the Cauchy-Jensen functional equation in

fuzzy Banach algebras, J. Comput. Anal. Appl. 15 (2013), 692–698.

[21] J. Lee, C. Park, Y. Cho and D. Shin, Orthogonal stability of a cubic-quartic functional equation in

non-Archimedean spaces, J. Comput. Anal. Appl. 15 (2013), 572–583.

[22] L. Li, G. Lu, C. Park and D. Shin, Additive functional inequalities in generalized quasi-Banach

spaces, J. Comput. Anal. Appl. 15 (2013), 1165–1175.

[23] G. Lu, Y. Jiang and C. Park, Additive functional equation in Frechet spaces, J. Comput. Anal. Appl.

15 (2013), 369–373.

[24] M. Mirzavaziri and E. Omidvar Tehrani, δ-double derivations on C∗-algebras, Bull. Iranian Math.

Soc. 35 (2009), 147–154.

[25] T. Miura, G. Hirasawa and S.-E. Takahasi, A perturbation of ring derivations on Banach algebras,

J. Math. Anal. Appl. 319 (2006), 522–530.

[26] M. S. Moslehian, Ternary derivations, stability and physical aspects, Acta Appl. Math. 100 (2008),

187–199.

[27] A. Najati and C. Park, On the stability of an n-dimensional functional equation originating from

quadratic forms, Taiwanese J. Math. 12 (2008), 1609–1624.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

982 SUN YOUNG JANG ET AL 973-983

Page 231: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

SUPERSTABILITY OF (fr, fs)-DOUBLE DERIVATIONS IN QUASI-BANACH ALGEBRAS

[28] A. Najati, C. Park and J. Lee, Homomorphisms and derivations in C∗-ternary algebras, Abs. Appl.

Anal. 2009, Art. ID 612392, 16 pages (2009).

[29] C. Park, Sh. Ghaffary Ghaleh, K. Ghasemi, N -Jordan ∗-homomorphisms in C∗-algebras, Taiwanese

J. Math.16 (2012), 1803–1814.

[30] C. Park, K. Ghasemi, S. G. Ghaleh, S. Jang, Approximate n-Jordan ∗-homomorphisms in C∗-

algebras, J. Comput. Anal. Appl. 15 (2013), 365–368.

[31] C. Park, A. Najati and S. Jang, Fixed points and fuzzy stability of an additive-quadratic functional

equation, J. Comput. Anal. Appl. 15 (2013), 452–462.

[32] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc.

72 (1978), 297–300.

[33] Th. M. Rassias, On the stability of functional equations and a problem of Ulam, Acta Appl. Math.

62 (2000), 23–130.

[34] P. Semrl, The functional equation of multiplicative derivation is superstable on standard operator

algebras, Integral Equations and Operator Theory 18 (1994), 118–122.

[35] D. Shin, C. Park and Sh. Farhadabadi, On the superstability of ternary Jordan C∗-homomorphisms,

J. Comput. Anal. Appl. 16 (2014), 964–973.

[36] D. Shin, C. Park and Sh. Farhadabadi, Stability and superstability of J∗-homomorphisms and J∗-

derivations for a generalized Cauchy-Jensen equation, J. Comput. Anal. Appl. 17 (2014), 125–134.

[37] S. M. Ulam, Problems in Modern Mathematics, science ed, Wiley, New York, 1964, Chapter VI.

[38] T. Xu and Z. Yang, Direct and fixed point approaches to the stability of an AQ-functional equation

in non-Archimedean normed spaces, J. Comput. Anal. Appl. 17 (2014), 697–706.

Sun Young Jang

Department of Mathematics, University of Ulsan, Ulsan 680-749, Korea

E-mail address: [email protected]

Choonkil Park

Department of Mathematics, Research Institute for Natural Sciences, Hanyang Univer-

sity, Seoul 133-791, Korea

E-mail address: [email protected]

Pegah Efteghar

Department of Mathematics, Urmia University, Urmia, Iran

E-mail address: P [email protected]

Sharokh Farhadabadi

Department of Mathematics, Urmia University, Urmia, Iran

E-mail address: Shahrokh [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

983 SUN YOUNG JANG ET AL 973-983

Page 232: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

THE FIXED POINT METHOD FOR PERTURBATION OFBIHOMOMORPHISMS AND BIDERIVATIONS IN NORMED 3-LIE

SYSTEMS: REVISITED

CHOONKIL PARK, JUNG RYE LEE, EON WHA SHIM, AND DONG YUN SHIN∗

Abstract. Shokri et al. [11] proved the Hyers-Ulam stability of bihomomorphismsand biderivations on normed 3-Lie systems by using the fixed point method.

Under the conditions in the main theorems of [11, Section 2], we can show that therelated mappings must be zero.

In this paper, we correct the statements of the results in [11, Section 2], and provethe corrected theorems.

1. Introduction and preliminaries

The stability problems of functional equations and inequalities has been studied inmany mathmaticians (see [3, 4, 5, 6, 7, 9, 10, 12, 13, 14, 15]).

Shokri et al. [11] defined bihomomorphisms and biderivations.

Definition 1.1. ([11]) Let A and B be normed Lie triple systems. A C-bilinear mappingH : A× A→ B is called a bihomomorphism if it satisfies

H([x, y, z], w) = [H(x,w), H(y, w), H(z, w)],

H(x, [y, z, w]) = [H(x, y), H(x, z), H(x,w)]

for all x, y, z, w ∈ A.

Note that if we replace w by 2w in the first equality of the definition of bihomomor-phism then 2H([x, y, z], w) = 8[H(x,w), H(y, w), H(z, w)] and so H([x, y, z], w) = 0 forall x, y, z, w ∈ A. Similarly, one can show that H(x, [y, z, w]) = 0 for all x, y, z, w ∈ A.Thus we correct the definition of bihomomorphism as follows.

Definition 1.2. Let A and B be normed Lie triple systems. A C-bilinear mappingH : A× A→ B is called a bihomomorphism if it satisfies

H([x, y, z], w3) = [H(x,w), H(y, w∗), H(z, w)],

H(x3, [y, z, w]) = [H(x, y), H(x∗, z), H(x,w)]

for all x, y, z, w ∈ A.

Definition 1.3. ([11]) Let A and B be normed Lie triple systems. A C-bilinear mappingδ : A× A→ A is called a biderivation if it satisfies

δ([x, y, z], w) = [δ(x,w), y, z] + [x, δ(y, w), z] + [x, y, δ(z, w)],

δ(x, [y, z, w], w) = [δ(x, y), z, w] + [y, δ(x, z), w] + [y, z, δ(x,w)]

2010 Mathematics Subject Classification. Primary 17A40, 39B52, 47H10, 39B82, 16W25.Key words and phrases. Hyers-Ulam stability; bi-additive mapping; fixed point; Lie triple system;

bihomomorphism; biderivation.∗Corresponding author.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

984 CHOONKIL PARK ET AL 984-992

Page 233: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

C. PARK, J. LEE, E.W. SHIM, AND D. SHIN

for all x, y, z, w ∈ A.

The w-variable of the left side in the first equality is C-linear and the x-variable ofthe left side in the second equality is C-linear. But the w-variable of the right sidein the first equality is not C-linear and the x-variable of the right side in the secondequality is not C-linear. Thus we correct the definition of biderivation as follows.

Definition 1.4. Let A and B be normed Lie triple systems. A C-bilinear mappingδ : A× A→ A is called a biderivation if it satisfies

δ([x, y, z], w) = [δ(x,w), y, z] + [x, δ(y, w∗), z] + [x, y, δ(z, w)],

δ(x, [y, z, w], w) = [δ(x, y), z, w] + [y, δ(x∗, z), w] + [y, z, δ(x,w)]

for all x, y, z, w ∈ A.

All the mappings T and δ, given in [11, Section 2], satisfy the bi-additive functionalequation (1.1) in [11]. Letting x = z = 0 in (1.1), we get f(y,−w) = f(y, w) for ally, w. Thus f is not bi-additive. So the results of [11, Section 2] are meaningless.

In this paper, we will replace the equation (1.1), given in [11], by

f(x+ y, z + w) + f(x+ y, z − w) = 2f(x, z) + 2f(y, z). (1)

Moreover, we correct the statements of the results in [11, Section 2], and prove thecorrected theorems.

Let X be a set. A function d : X ×X → [0,∞] is called a generalized metric on Xif d satisfies

(1) d(x, y) = 0 if and only if x = y;(2) d(x, y) = d(y, x) for all x, y ∈ X;(3) d(x, z) ≤ d(x, y) + d(y, z) for all x, y, z ∈ X.We recall a fundamental result in fixed point theory.

Theorem 1.5. [2] Let (X, d) be a complete generalized metric space and let J : X → Xbe a strictly contractive mapping with Lipschitz constant 0 < L < 1. Then for each givenelement x ∈ X, either

d(Jnx, Jn+1x) =∞for all nonnegative integers n or there exists a positive integer n0 such that

(1) d(Jnx, Jn+1x) <∞, ∀n ≥ n0;(2) the sequence Jnx converges to a fixed point y∗ of J ;(3) y∗ is the unique fixed point of J in the set Y = y ∈ X | d(Jn0x, y) <∞;(4) d(y, y∗) ≤ 1

1−Ld(y, Jy) for all y ∈ Y .

Throughout this paper, assume that A is a normed Lie triple system and B is aBanach Lie triple system.

2. Hyers-Ulam stability of bihomomorphisms in Banach Lie triple systems

For a given mapping f : A× A→ B, we define

Dλ,µf(x, y, z, w) = f(λx+ λy, µz + µw) + f(λx+ λy, µz − µw)

− 2λµf(x, z)− 2λµf(y, z)

for all x, y, z, w ∈ A and all λ, µ ∈ T1 := ν ∈ C : |ν| = 1.From now on, assume that f(0, z) = f(x, 0) = 0 for all x, z ∈ A.We need the following lemmas to obtain the main results.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

985 CHOONKIL PARK ET AL 984-992

Page 234: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

BIHOMOMORPHISMS AND BIDERIVATIONS IN NORMED 3-LIE SYSTEMS

Lemma 2.1. ([1]) Let f : A× A→ B be a bi-additive mapping such that f(λx, µy) =λµf(x, y) for all x, y ∈ A and all λ, µ ∈T1. Then the mapping f : A × A → B isC-bilinear.

Lemma 2.2. Let f : A × A → B be a mapping satisfying Dλ,µf(x, y, z, w) = 0 for allx, y, z, w ∈ A and all λ, µ ∈T1. Then the mapping f : A× A→ B is C-bilinear.

Proof. Letting λ = µ = 1 in Dλ,µf(x, y, z, w) = 0, we get (1). Letting y = 0 in (1), weget f(x, z + w) + f(x, z − w) = 2f(x, z) for all x, z, w ∈ A. Letting w = 0 in (1), weget 2f(x+ y, z) = 2f(x, z) + 2f(y, z) for all x, y, z ∈ A. So f is bi-additive.

Letting y = w = 0 in Dλ,µf(x, y, z, w) = 0, we get 2f(λx, µz) = 2λµf(x, z) for allx, z ∈ A and all λ, µ ∈ T1. By Lemma 2.1, the mapping f : A×A→ B is C-bilinear.

Theorem 2.3. Let f : A × A → B be a mapping for which there exists a functionϕ : A4 → [0,∞) such that

‖Dλ,µf(x, y, z, w)‖ ≤ ϕ(x, y, z, w), (2)

‖f([x, y, z], w3)− [f(x,w), f(y, w∗), f(z, w)]‖ (3)

+‖f(x3, [y, z, w])− [f(x, y), f(x∗, z), f(x,w)]‖ ≤ ϕ(x, y, z, w)

for all λ, µ ∈ T1 and all x, y, z, w ∈ A. If there exists an L < 1 such that ϕ(x, y, z, w) ≤4Lϕ

(x2, y2, z2, w2

)for all x, y, z, w ∈ A, then there exists a unique bihomomorphism H :

A× A→ B such that

‖f(x, z)−H(x, z)‖ ≤ 1

4− 4Lϕ(x, x, z, z) (4)

for all x, z ∈ A.Proof. Letting λ = µ = 1, y = x and w = z in (2), we get

‖f(2x, 2z)− 4f(x, z)‖ ≤ ϕ(x, x, z, z) (5)

and so ∥∥∥∥f(x, z)− 1

4f(2x, 2z)

∥∥∥∥ ≤ 1

4ϕ(x, x, z, z) (6)

for all x, z ∈ A.Consider the set

S := h : A× A→ Band introduce the generalized metric on S:

d(g, h) = inf µ ∈ R+ : ‖g(x, z)− h(x, z)‖ ≤ µϕ (x, x, z, z) , ∀x, z ∈ A ,where, as usual, inf φ = +∞. It is easy to show that (S, d) is complete (see [8]).

Now we consider the linear mapping J : S → S such that

Jg(x, z) :=1

4g (2x, 2z)

for all x, z ∈ A.Let g, h ∈ S be given such that d(g, h) = ε. Then

‖g(x, z)− h(x, z)‖ ≤ εϕ (x, x, z, z)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

986 CHOONKIL PARK ET AL 984-992

Page 235: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

C. PARK, J. LEE, E.W. SHIM, AND D. SHIN

for all x ∈ A. Hence

‖Jg(x, z)− Jh(x, z)‖ =

∥∥∥∥1

4g (2x, 2z)− 1

4h (2x, 2z)

∥∥∥∥ ≤ εLϕ (x, x, z, z)

for all x, z ∈ A. So d(g, h) = ε implies that d(Jg, Jh) ≤ εL. This means that

d(Jg, Jh) ≤ Ld(g, h)

for all g, h ∈ S.It follows from (6) that d(f, Jf) ≤ 1

4.

By Theorem 1.5, there exists a mapping H : A→ B satisfying the following:(1) H is a fixed point of J , i.e.,

H (2x, 2z) = 4H(x, z) (7)

for all x, z ∈ A. The mapping H is a unique fixed point of J in the set

M = g ∈ S : d(h, g) <∞.This implies that H is a unique mapping satisfying (7) such that there exists a µ ∈(0,∞) satisfying

‖f(x, z)−H(x, z)‖ ≤ µϕ (x, x, z, z)

for all x, z ∈ A;(2) d(Jnf,H)→ 0 as n→∞. This implies the equality

limn→∞

1

4nf (2nx, 2nz) = H(x, z) (8)

for all x, z ∈ A;(3) d(f,H) ≤ 1

1−αd(f, Jf), which implies the inequality

d(f,H) ≤ 1

4− 4L.

This implies that the inequality (4) holds true.It follows from (2) and (8) that

‖Dλ,µH(x, y, z, w)‖ =

∥∥∥∥ 1

4nDλ,µf(2nx, 2ny, 2nz, 2nw)

∥∥∥∥≤ 1

4nϕ(2nx, 2ny, 2nz, 2nw),

which tends to zero as n → ∞ for all λ, µ ∈ T1 and all x, y, z, w ∈ A. By Lemma 2.2,the mapping H : A× A→ B is C-bilinear.

Now let T : A× A→ B be another bi-additive mapping satisfying (4). Then

‖H(x, z)− T (x, z)‖ =1

4n‖H(2nx, 2nz)− T (2n, 2nz)‖

≤ 1

4n(‖H(2nx, 2nz)− f(2n, 2nz)‖+ ‖f(2nx, 2nz)− T (2n, 2nz)‖)

≤ 2

4nϕ(2nx, 2nx, 2nz, 2nz),

which tends to zero as n→∞. This proves the uniqueness of H.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

987 CHOONKIL PARK ET AL 984-992

Page 236: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

BIHOMOMORPHISMS AND BIDERIVATIONS IN NORMED 3-LIE SYSTEMS

It follows from (3) that

‖H([x, y, z], w3)− [H(x,w), H(y, w∗), H(z, w)]‖+ ‖H(x3, [y, z, w])− [H(x, y), H(x∗, z), H(x,w)]‖

= limn→∞

1

64n(‖f([2nx, 2ny, 2nz], 8nw3)

− [f(2nx, 2nw), f(2ny, 2nw∗), f(2nz, 2nw)]‖+ ‖f(8nx3, [2ny, 2nz, 2nw])

− [f(2nx, 2ny), f(2nx∗, 2nz), f(2nx, 2nw)]‖)

≤ limn→∞

1

64nϕ(2n, 2ny, 2nz, 2nw) ≤ lim

n→∞

1

4nϕ(2n, 2ny, 2nz, 2nw) = 0

for all x, y, z, w ∈ A. So

H([x, y, z], w3) = [H(x,w), H(y, w∗), H(z, w)]

andH(x3, [y, z, w]) = [H(x, y), H(x∗, z), H(x,w)]

for all x, y, z, w ∈ A.Therefore, the mapping H is a unique bi-homomorphism satisfying (4).

Corollary 2.4. Let p and θ be positive real numbers with p < 2, and let f : A×A→ Bbe a mapping such that

‖Dλ,µf(x, y, z, w)‖ ≤ θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p), (9)

‖f([x, y, z], w3)− [f(x,w), f(y, w∗), f(z, w)]‖+‖f(x3, [y, z, w])− [f(x, y), f(x∗, z), f(x,w)]‖

≤ θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p) (10)

for all λ, µ ∈ T1 and all x, y, z, w ∈ A. Then there exists a unique bihomomorphismH : A× A→ B such that

‖f(x, y)−H(x, y)‖ ≤ 2θ

4− 2p(‖x‖p + ‖y‖p)

for all x, y ∈ A.

Proof. Defining ϕ(x, y, z, w) := θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p) and letting L = 2p−2 inTheorem 2.3, we obtain the desired result.

Similarly, one can obtain the following.

Theorem 2.5. Let f : A × A → B be a mapping for which there exists a functionϕ : A4 → [0,∞) satisfying (2) and (3). If there exists an L < 1 such that ϕ(x, y, z, w) ≤L64ϕ(2x, 2y, 2z, 2w) for all x, y, z, w ∈ A, then there exists a unique bihomomorphism

H : A× A→ B such that

‖f(x, z)−H(x, z)‖ ≤ L

64− 64Lϕ(x, x, z, z) (11)

for all x, z ∈ A.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

988 CHOONKIL PARK ET AL 984-992

Page 237: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

C. PARK, J. LEE, E.W. SHIM, AND D. SHIN

Note that L64ϕ(2x, 2y, 2z, 2w) ≤ L

4ϕ(2x, 2y, 2z, 2w) for all x, y, zw ∈ A.

Proof. Let (S, d) be the generalized metric space defined in the proof of Theorem 2.3.Now we consider the linear mapping J : S → S such that

Jg(x, z) := 4g(x

2,z

2

)for all x, z ∈ A.

It follows from (5) that∥∥∥f(x, z)− 4f(x

2,z

2

)∥∥∥ ≤ ϕ(x

2,x

2,z

2,z

2

)≤ L

64ϕ (x, x, z, z) ≤ L

4ϕ (x, x, z, z)

for all x, z ∈ A. Thus d(f, Jf) ≤ L4. So

d(f,H) ≤ L

4− 4L.

The rest of the proof is similar to the proof of Theorem 2.3.

Corollary 2.6. Let p and θ be positive real numbers with p > 6, and let f : A×A→ Bbe a mapping satisfying (9) and (10). Then there exists a unique bihomomorphismH : A× A→ B such that

‖f(x, y)−H(x, y)‖ ≤ 2θ

2p − 4(‖x‖p + ‖y‖p)

for all x, y ∈ A.

Proof. Defining ϕ(x, y, z, w) := θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p) and letting L = 22−p inTheorem 2.5, we obtain the desired result.

3. Hyers-Ulam stability of biderivations on Banach Lie triple systems

In this section, we prove the Hyers-Ulam stability of biderivations on Banach Lietriple systems.

Theorem 3.1. Let f : A× A→ A be a mapping such that

‖Dλ,µf(x, y, z, w)‖ ≤ ϕ(x, y, z, w), (12)

‖f([x, y, z], w)− [f(x,w), y, z]− [x, f(y, w∗), z]− [x, y, f(z, w)]‖ (13)

+‖f(x, [y, z, w])− [f(x, y), z, w]− [y, f(x∗, z), w]− [y, z, f(x,w)]‖≤ ϕ(x, y, z, w)

for all λ, µ ∈ T1 and all x, y, z, w ∈ A. Assume that there exists an L < 1 such thatϕ(x, y, z, w) ≤ 4Lϕ

(x2, y2, z2, w2

)for all x, y, z, w ∈ A. If the mapping f : A × A → A

satisfies

limn→∞

1

4nf(2nx, 2nz) = lim

n→∞

1

16nf(8nx, 2nz) = lim

n→∞

1

16nf(2nx, 8nz) (14)

for all x, z ∈ A, then there exists a unique biderivation δ : A× A→ A such that

‖f(x, z)− δ(x, z)‖ ≤ 1

4− 4Lϕ(x, x, z, z) (15)

for all x, z ∈ A.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

989 CHOONKIL PARK ET AL 984-992

Page 238: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

BIHOMOMORPHISMS AND BIDERIVATIONS IN NORMED 3-LIE SYSTEMS

Proof. By the same reasoning as in the proof of Theorem 2.3, we get a unique C-bilinearmapping δ : A× A→ A given by δ(x, z) := limn→∞

14nf(2nx, 2nz) satisfying (15).

It follows from (13) and (14) that

‖δ([x, y, z], w)− [δ(x,w), y, z]− [x, δ(y, w∗), z]− [x, y, δ(z, w)]‖+ ‖δ(x, [y, z, w])− [δ(x, y), z, w]− [y, δ(x∗, z), w]− [y, z, δ(x,w)]‖

= limn→∞

1

16n(‖f(8n[x, y, z], 2nw)− [f(2nx, 2nw), 2ny, 2nz]

− [2nx, f(2ny, 2nw∗), 2nz]− [2nx, 2ny, f(2nz, 2nw)]‖+ ‖f(2nx, 8n[y, z, w])− [f(2nx, 2ny), 2nz, 2nw]

− [2ny, f(2nx∗, 2nz), 2nw]− [2ny, 2nz, f(2nx, 2nw)]‖)

≤ limn→∞

1

16nϕ(2nx, 2ny, 2nz, 2nw) ≤ lim

n→∞

1

4nϕ(2nx, 2ny, 2nz, 2nw) = 0

for all x, y, z, w ∈ A. So

δ([x, y, z], w) = [δ(x,w), y, z] + [x, δ(y, w∗), z] + [x, y, δ(z, w)]

and

δ(x, [y, z, w]) = [δ(x, y), z, w] + [y, δ(x∗, z), w] + [y, z, δ(x,w)]

for all x, y, z, w ∈ A.Therefore, the mapping δ : A×A→ A is a biderivation satisfying (15), as desired.

Corollary 3.2. Let p and θ be positive real numbers with p < 2, and let f : A×A→ Abe a mapping satisfying (14) and

‖Dλ,µf(x, y, z, w)‖ ≤ θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p), (16)

‖f([x, y, z], w)− [f(x,w), y, z]− [x, f(y, w∗), z]− [x, y, f(z, w)]‖ (17)

+‖f(x, [y, z, w])− [f(x, y), z, w]− [y, f(x∗, z), w]− [y, z, f(x,w)]‖≤ θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p)

for all λ, µ ∈ T1 and all x, y, z, w ∈ A. Then there exists a unique biderivation δ :A× A→ A such that

‖f(x, y)− δ(x, y)‖ ≤ 2θ

4− 2p(‖x‖p + ‖y‖p)

for all x, y ∈ A.

Proof. Defining ϕ(x, y, z, w) := θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p) and letting L = 2p−2 inTheorem 3.1, we obtain the desired result.

Theorem 3.3. Let f : A×A→ A be a mapping satisfying (12) and (13). Assume thatthere exists an L < 1 such that ϕ(x, y, z, w) ≤ L

16ϕ(2x, 2y, 2z, 2w) for all x, y, z, w ∈ A.

If the mapping f : A× A→ A satisfies

limn→∞

4nf( x

2n,z

2n

)= lim

n→∞16nf

( x8n,z

2n

)= lim

n→∞16nf

( x2n,z

8n

)(18)

for all x, z ∈ A, then there exists a unique biderivation δ : A× A→ A such that

‖f(x, z)− δ(x, z)‖ ≤ L

4− 4Lϕ(x, x, z, z) (19)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

990 CHOONKIL PARK ET AL 984-992

Page 239: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

C. PARK, J. LEE, E.W. SHIM, AND D. SHIN

for all x, z ∈ A.Proof. By the same reasoning as in the proof of Theorem 2.3, we get a unique C-bilinearmapping δ : A× A→ A given by δ(x, z) := limn→∞ 4nf

(x2n, z2n

)satisfying (19).

It follows from (13) and (18) that

‖δ([x, y, z], w)− [δ(x,w), y, z]− [x, δ(y, w∗), z]− [x, y, δ(z, w)]‖+ ‖δ(x, [y, z, w])− [δ(x, y), z, w]− [y, δ(x∗, z), w]− [y, z, δ(x,w)]‖

= limn→∞

16n(∥∥∥∥f ( [x, y, z]

8n,w

2n

)−[f( x

2n,w

2n

),y

2n,z

2n

]−[x

2n, f

(y

2n,w∗

2n

),z

2n

]−[ x

2n,y

2n, f( z

2n,w

2n

)]∥∥∥∥+

∥∥∥∥f ( x

2n,[y, z, w]

8n

)−[f( x

2n,y

2n

),z

2n,w

2n

]−[

y

2n, f

(x∗

2n,z

2n

),w

2n

]−[ y

2n,z

2n, f( x

2n,w

2n

)]∥∥∥∥)≤ lim

n→∞16nϕ

( x2n,y

2n,z

2n,w

2n

)= 0

for all x, y, z, w ∈ A. So

δ([x, y, z], w) = [δ(x,w), y, z] + [x, δ(y, w∗), z] + [x, y, δ(z, w)]

and

δ(x, [y, z, w]) = [δ(x, y), z, w] + [y, δ(x∗, z), w] + [y, z, δ(x,w)]

for all x, y, z, w ∈ A.Therefore, the mapping δ : A×A→ A is a biderivation satisfying (19), as desired.

Corollary 3.4. Let θ and p be positive real numbers with p > 4 and let f : A×A→ Abe a mapping satisfying (16), (17) and (18). Then there exists a unique biderivationδ : A× A→ A such that

‖f(x, z)− δ(x, z)‖ ≤ 2θ

2p − 4(‖x‖p + ‖z‖p) (20)

for all x, z ∈ A.

Proof. Defining ϕ(x, y, z, w) := θ(‖x‖p + ‖y‖p + ‖z‖p + ‖w‖p) and letting L = 22−p inTheorem 3.3, we obtain the desired result.

Acknowledgments

C. Park was supported by Basic Science Research Program through the NationalResearch Foundation of Korea funded by the Ministry of Education, Science and Tech-nology (NRF-2012R1A1A2004299), and D. Y. Shin was supported by Basic ScienceResearch Program through the National Research Foundation of Korea funded by theMinistry of Education, Science and Technology (NRF-2010-0021792)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

991 CHOONKIL PARK ET AL 984-992

Page 240: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

BIHOMOMORPHISMS AND BIDERIVATIONS IN NORMED 3-LIE SYSTEMS

References

[1] J. Bae and W. Park, Approximate bi-homomorphisms and bi-derivations in C∗-ternary algebras,Bull. Korean Math. Soc. 47 (2010) 195–209.

[2] J. Diaz and B. Margolis, A fixed point theorem of the alternative for contractions on a generalizedcomplete metric space, Bull. Amer. Math. Soc. 74 (1968), 305–309.

[3] M. Eshaghi Gordji and A. Bodaghi, On the stability of quadratic double centralizers on Banachalgebras, J. Comput. Anal. Appl. 13 (2011), 724–729.

[4] M. Eshaghi Gordji, R. Farokhzad Rostami and S.A.R. Hosseinioun, Nearly higher derivations inunital C∗-algebras, J. Comput. Anal. Appl. 13 (2011), 734–742.

[5] M. Eshaghi Gordji, G. Kim, J. Lee and C. Park, Generalized ternary bi-derivations on ternaryBanach algebras: a fixed point approach, J. Comput. Anal. Appl. 15 (2013), 45–54.

[6] L. Li, G. Lu, C. Park and D. Shin, Additive functional inequalities in generalized quasi-Banachspaces, J. Comput. Anal. Appl. 15 (2013), 1165–1175.

[7] G. Lu, Y. Jiang and C. Park, Additive functional equation in Frechet spaces, J. Comput. Anal.Appl. 15 (2013), 369–373.

[8] D. Mihet and V. Radu, On the stability of the additive Cauchy functional equation in randomnormed spaces, J. Math. Anal. Appl. 343 (2008), 567–572.

[9] C. Park, K. Ghasemi, S. G. Ghaleh, S. Jang, Approximate n-Jordan ∗-homomorphisms in C∗-algebras, J. Comput. Anal. Appl. 15 (2013), 365–368.

[10] C. Park, A. Najati and S. Jang, Fixed points and fuzzy stability of an additive-quadratic functionalequation, J. Comput. Anal. Appl. 15 (2013), 452–462.

[11] J. Shokri, A. Ebadian and R. Aghalari, The fixed point method for perturbation of bihomomor-phisms and biderivations in normed 3-Lie algebras, Int. J. Geom. Methods Mod. Phys. 10 (2013),No. 6, Art. ID 1350020, 13 pages.

[12] S. Shagholi, M. Eshaghi Gordji and M. Bavand Savadkouhi, Stability of ternary quadratic deriva-tions on ternary Banach algebras, J. Comput. Anal. Appl. 13 (2011), 1097–1105.

[13] S. Shagholi, M. Eshaghi Gordji and M. Bavand Savadkouhi, Nearly ternary cubic homomorphismsin ternary Frechet algebras, J. Comput. Anal. Appl. 13 (2011), 1106–1114.

[14] D. Shin, C. Park and Sh. Farhadabadi, On the superstability of ternary Jordan C∗-homomorphisms, J. Comput. Anal. Appl. 16 (2014), 964–973.

[15] D. Shin, C. Park and Sh. Farhadabadi, Stability and superstability of J∗-homomorphisms andJ∗-derivations for a generalized Cauchy-Jensen equation, J. Comput. Anal. Appl. 17 (2014), 125–134.

Choonkil ParkDepartment of Mathematics, Research Institute for Natural Sciences, Hanyang Uni-versity, Seoul 133-791, Korea

E-mail address: [email protected]

Jung Rye LeeDepartment of Mathematics, Daejin University, Kyeonggi 487-711, Korea

E-mail address: [email protected]

Eon Wha ShimDepartment of Mathematics, Hanyang University, Seoul 133-791, Korea

E-mail address: [email protected]

Dong Yun ShinDepartment of Mathematics, University of Seoul, Seoul 130-743, Korea

E-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

992 CHOONKIL PARK ET AL 984-992

Page 241: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Dynamics of some Rational Difference Equations

H. El-Metwally1,3, E.M. Elsayed2,3 and H. El-Morshedy41Department of Mathematics, Rabigh College of Scienceand Art, King Abdulaziz University, P.O. Box 344,

Rabigh 21911, Saudi Arabia.2King Abdulaziz University, Faculty of Science,Mathematics Department, P. O. Box 80203,

Jeddah 21589, Saudi Arabia.3Department of Mathematics, Faculty of Science,Mansoura University, Mansoura 35516, Egypt.

4Department of Mathematics, Damietta Faculty of Science,Mansoura University, New damietta 34517, Egypt.

1E-mail: [email protected] & [email protected],[email protected].

AbstractThe main goal of this paper is to investigate the qualitative behavior ofthe solutions for the following rational difference equation:

xn+1 =

α+k

i=0

a2ixn−2i

β +k

i=0

b2i+1xn−2i−1

, n = 0, 1, 2, ...

where α, β, ai, bi ∈ (0,∞), i = 0, 1, ..., k; with the initial conditionsx0, x−1, ..., x−2k, x−2k−1 ∈ (0,∞). We determine the equilibrium pointsof the considered equation and then study their local stability. Also westudy the boundedness and the permanence of the solutions. Finally weinvestigate the global asymptotically stable of the equilibrium points.

Keywords: permanence, global stability, difference equations.Mathematics Subject Classification: 39A10––––––––––––––––––––––

1 IntroductionRational difference equations is an important class of difference equations wherethey have many applications, for example, the difference equation

xn+1 =a+bxnc+xn

, n ≥ 0,

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

993 H. El-Metwally et al 993-1003

Page 242: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

has applications in Optics and Mathematical Biology and is known in the liter-ature as the Riccati difference equation. The equation

xn+1 =1+xnxn−1

, n ≥ 0,

was discovered by Lyness [12] while he was working on a problem in NumberTheory. Also this equation has many applications in geometry (see Leech [10])and in frieze patterns (see Conway and Coxeter [4]). Also, we believe thatthe results about rational difference equations are of paramount importance intheir on right and offer prototypes towards the development of the basic theoryof the global behavior of solutions of nonlinear difference equations of ordergreater than one, so, there has been a great interest in studying the qualitativeproperties of rational difference equations by several authors such as Kulenovicand Ladas [9] presented some known results and derived several new ones on theboundedness, the global stability, and the periodicity of solutions of all rationaldifference equations of the form

xn+1 =α+βxn+γxn−1A+Bxn+Cxn−1

.

Also, Camouzis and Ladas [2] presented the global character of solutions ofthe third-order rational difference equation. They presented a summary of therecent work and a large number of open problems and conjectures on the thirdorder rational recursive sequence of the form

xn+1 =α+βxn+γxn−1+δxn−2A+Bxn+Cxn−1+Dxn−2

.

Li and Sun [11] investigated the periodic character, invariant intervals and globalstability of all positive solutions of the recursive sequence

xn+1 =pxn+xn−kq+xn−k

.

Kocic et al. [8] examined the periodicity and oscillating properties of the positivesolutions as well as the global attractivity of the nonnegative equilibrium of thedifference equation

xn+1 =a+bxnd+xn−k

.

In [6], the author studied the boundedness, the existence of prime period tosolutions and the global attracitvity of solutions of the following recursive se-quences

xn+1 =ax

l0n−k0

xl1n−k1

...xlin−ki

+bxs0n−r0

xs1n−r1

...xsjn−rj

cxl0n−k0

xl1n−k1

...xlin−ki

+dxs0n−r0

xs1n−r1

...xsjn−rj

, n ≥ 0, (1)

yn+1 = α0yn+α1yn−1+...+αtyn−tβ0yn+β1yn−1+...+βtyn−t

, n ≥ 0. (2)

Some related results to rational difference equations can be found in [1,3,5,13]and the references therein.

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

994 H. El-Metwally et al 993-1003

Page 243: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Let I be an interval of real numbers and let F : Ik+1 → I be a continuouslydifferentiable function. Consider the difference equation

yn+1 = F (yn, yn−1, ..., yn−k) , n = 0, 1, ..., (3)

with y−k, ..., y0 ∈ I.Recall that the point y ∈ I is called an equilibrium point of Eq.(3) if

F (y, y, ..., y) = y.

That is, yn = y for n ≥ 0, is a solution of Eq.(3), or equivalently, y is a fixedpoint of F .Let y be an equilibrium point of Eq.(3). Then the linearized equation of Eq.(3)about y is given by

wn+1 =kPi=0

piwn−i, n = 0, 1, ..., (4)

where pi =∂f

∂yn−i(y, ..., y), i = 0, 1, 2..., k and the characteristic equation of

Eq.(4) isλ(k+1) − p1λ

k − p2λ(k−1) − ...− pkλ− p(k+1) = 0.

Theorem A [8]: Assume that p, q ∈ R and k ∈ 0, 1, 2, .... Then |p|+ |q| < 1is a sufficient condition for the asymptotic stability of the difference equation

un+1 + pun + qun−k = 0, n = 0, 1, ... .

Remark: Theorem A can be easily extended to a general linear equations ofthe form

un+k + p1un+k−1 + ...+ pkun = 0, n = 0, 1, ... (5)

where p1, p2, ..., pk and k ∈ 1, 2, .... Then Eq.(5) is asymptotically stable pro-vided that

Pki=1 |pi| < 1.

Theorem B [7]: Let yn∞n=−k be a solution of Eq.(3), and suppose that thereexist constants A ∈ I and B ∈ I such that A ≤ yn ≤ B for all n ≥ −k. Let0 be a limit point of the sequence yn∞n=−k. Then the following statements aretrue:(i) There exists a solution Ln∞n=−∞ of Eq.(3), called a full limiting sequenceof yn∞n=−k, such that L0 = 0, and such that for every N ∈ ...,−1,0,1,... LNis a limit point of yn∞n=−k.(ii) For every i0 ≤ −k, there exists a subsequence yri∞i=0 of yn∞n=−k suchthat LN = lim

i→∞yri+N for every N ≥ i0.

Theorem C [9]: Let [p, q] be an interval of real numbers and assume that

g : [p, q]3 → [p, q],

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

995 H. El-Metwally et al 993-1003

Page 244: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

is a continuous function satisfying the following properties :(a) g(x, y, z) is non-decreasing in y and z in [p, q] for each x ∈ [p, q], and isnon-increasing in x ∈ [p, q] for each y and z in [p, q];(b) If (m,M) ∈ [p, q]× [p, q] is a solution of the system

M = g(m,M,M) and m = g(M,m,m),

then m =M. Then Eq.(5) has a unique equilibrium x ∈ [p, q] and every solutionof Eq.(5) converges to x.In this paper we study the boundedness character and investigate the globalstability for the solutions of the following difference equation:

xn+1 =

α+[ k+12 ]Pi=0

a2ixn−2i

β +[ k+12 ]Pi=0

b2i+1xn−2i−1

, n = 0, 1, 2, .., (6)

where α, β ∈ [0,∞), ai, bi ∈ (0,∞) for i = 0, 1, ..., k; and k ∈ 10, 1, 2, ... withthe initial conditions x0, x−1, ..., x−2k, x−2k−1 ∈ (0,∞).

2 Local Stability of Eq.(6)In this section we discuss the local stability of the equilibrium points of Eq.(6).

Let A =[ k+12 ]Pi=0

a2i and B =[ k+12 ]Pi=0

b2i+1, then the following statements are true:

(i) At α = 0 and β = 0, Eq.(6) has the equilibrium point x = 0 and the uniquepositive equilibrium point x = A

B .(ii) At α = 0 and β < A, Eq.(6) has the equilibrium point x = 0 and the positiveequilibrium point x = A−β

B .(iii) At α = 0 and β ≥ A, Eq.(6) has the unique equilibrium point x = 0.(iv) At α 6= 0 and β = 0, Eq.(6) has the unique positive equilibrium pointx = A+

√A2+4αB2B .

(v) At α 6= 0 and β 6= 0, Eq.(6) has the unique positive equilibrium point

x =A−B+

√(A−B)2+4αB2B .

The following theorem deals with the local stability of the positive equilibriumpoint of Eq.(6).

Theorem 1 The equilibrium point x =A−B+

√(A−B)2+4αB2B of Eq.(6) is locally

stable if A < β.

Proof. The linearized equation of Eq.(6) about the equilibrium point x =A−B+

√(A−B)2+4αB2B is given by

zn+1 =kPi=0

∂f(x,x,...,x)∂xn−i

zn−i =kPi=0

a2iβ+Bxzn−2i −

kPi=0

b2i+1(α+Ax)(β+Bx)2 zn−2i−1

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

996 H. El-Metwally et al 993-1003

Page 245: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

for n = 0, 1, ... and the associated characteristic equation about x is

F (λ) = λ2k+2 −kPi=0

a2iβ+Bxλ

2(k−i)+1 +kPi=0

b2i+1(α+Ax)(β+Bx)2 λ2(k−i) = 0.

Then it follows by Theorem A that x is locally stable if

Aβ+Bx +

B(α+Ax)(β+Bx)2 < 1⇐⇒ A

β+Bx +Bx

β+Bx < 1⇐⇒ A < β.

This ends the proof of the theorem.

3 Boundedness of SolutionsHere we study the permanence of Eq.(6).

Theorem 2 Assume that A < β. Then every solution of Eq.(6) is bounded andpersists.

Proof. Let xn∞n=−2k−1 be a solution of Eq.(6). Then

xn+1 =

α+[ k+12 ]Pi=0

a2ixn−2i

β +[ k+12 ]Pi=0

b2i+1xn−2i−1

≤ αβ +

[ k+12 ]Pi=0

a2ixn−2i.

Then lim supxnn−→∞

≤ αβ−A

def= M. Thus xn ≤M for all n ≥ 1.

Now we wish to find a constant m > 0 such that xn ≥ m for all n ≥ 1. Thechange of variables xn = 1

yn, gives Eq.(6) in the form

1

yn+1=

α+ a0yn+ a2

yn−2+ ...+ a2k

yn−2k

β + b1yn−1

+ b3yn−3

+ ...+ b2k+1yn−2k−1

,

or in the equivalent form

yn+1 =β + b1

yn−1+ b3

yn−3+ ...+ b2k+1

yn−2k−1

α+ a0yn+ a2

yn−2+ ...+ a2k

yn−2k

≤β + b1

yn−1+ b3

yn−3+ ...+ b2k+1

yn−2k−1

α

≤β +M

kPi=0

b2i+1

α≤ β +MB

αfor all n ≥ 1.

Thus we obtain

xn =1

yn≥ α

β +BM

def= m for all n ≥ 1.

Therefor we see that

m ≤ xn ≤M for all n ≥ 1.Then the proof is so complete.

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

997 H. El-Metwally et al 993-1003

Page 246: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Theorem 3 Assume that A < β. Then every solution of Eq.(6) is bounded andpersists.

Proof. Let xn∞n=−2k−1 be a solution of Eq.(6).Set H = maxx−2k−1, x−2k, ..., x0, α

β−A, then it follows from (6) that

x1 =

α+[ k+12 ]Pi=0

a2ix−2i

β +[ k+12 ]Pi=0

b2i+1x−2i−1

≤α+H

[ k+12 ]Pi=0

a2i

β≤ α+AH

β≤ H.

It follows by induction that xn ≤ H for all n ≥ 0. Now we wish to find aconstant h > 0 such that xn ≥ h for all n ≥ 1.Again it follows from Eq.(7) that

x1 =α+

[ k+12

]Pi=0

a2ix−2i

β+

[ k+12

]Pi=0

b2i+1x−2i−1

≥ α

β+H

[ k+12

]Pi=0

b2i+1

≥ αβ+BH

def= h.

Then it follows by induction that xn ≥ h for all n ≥ 1.

4 Global Stability of the Equilibrium PointsTheorem 4 Let α = 0 and assume that A < β. Then every nonnegative solu-tion of Eq.(6) converges to the unique equilibrium point of Eq.(6) x = 0.

Proof. It follows by Theorem B that there exist solutions In∞n=−∞ andSn∞n=−∞ of Eq.(6) with

I = I0 = limn→∞

inf xn ≤ limn→∞

sup xn = S0 = S,

whereIn, Sn ∈ [I,S] , n = 0,− 1,... .

Since x = 0 is the unique nonnegative equilibrium point of Eq.(6), then it sufficesto show that S = 0. Suppose for the sake of contradiction that S > 0.Then itfollows from Eq.(6) that

S =a0S−1 + a2S−3 + ...+ a2kS−2k−1

β + b1S−2 + b3S−4 + ...+ b2k+1S−2k−1≤ AS

β +BI,

and so0 ≤ BSI ≤ (A− β)S < 0,

which is a contradiction. Hence

limn→∞

xn = x = 0.

which is true by the hypothesis of the theorem and this completes the proof.

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

998 H. El-Metwally et al 993-1003

Page 247: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Theorem 5 Assume that A < β, then the equilibrium point

x =A−B +

p(A−B)2 + 4αB

2B

of Eq.(6) is global attractor of the solutions of Eq.(6).

Proof. It was shown in Theorem 2 that m ≤ xn ≤ M for all n ≥ 1.Then itfollows again by Theorem B that there exist solutions In∞n=−∞ and Sn∞n=−∞of Eq.(6) with

I = I0 = limn→∞

inf xn ≤ limn→∞

sup xn = S0 = S,

whereIn, Sn ∈ [I,S] , n = 0,− 1,... .

It suffices to show that I ≥ S.Now it follows from Eq.(6) that

I =α+ a0I−1 + a2I−3 + ...+ a2kI−2k−1

β + b1I−2 + b1I−2a2I−3 + ...+ a2kI−2k−1≥ α+AI

β +BS

and so(β −A)I +BSI ≥ α. (7)

Similarly, we see from Eq.(6) that

S = α+a0S−1+a2S−3+...+a2kS−2k−1β+b1S−2+b3S−4+...+b2k+1S−2k−1

≤ α+ASβ+BI ,

and so(β −A)S +BSI ≤ α. (8)

Then we obtain from relations (7) and (8) that

(β −A)S +BSI ≤ α ≤ (β −A)I +BSI,

thus(β −A)(I − S) ≥ 0

and since (β −A) > 0, then we should have I ≥ S.This completes the proof.We give the following two theorems which is a minor modification of TheoremA.0.2 in [9].

Theorem 6 Let [a, b] be an interval of real numbers and assume that f : [a, b]k+1 →[a, b], is a continuous function satisfying the following properties:

(i) f(x0, x1, ..., xk) is non-decreasing in its arguments x2t with t ∈©0, 1, 2, ..., [k+12 ]

ªfor each xr (r 6= 2t) in [a, b] and non-increasing in its arguments x2r+1 withr ∈

©0, 1, 2, ..., [k+12 ]

ªfor all xt (t 6= r) in [a, b].

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

999 H. El-Metwally et al 993-1003

Page 248: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

(ii) If (M,m) ∈ [a, b]× [a, b] is a solution of the system

M = f(M,m,M,m, ...,M,m, ...,M,m), m = f(m,M,m,M, ...,m,M...,m,M ),

implies m =M. Then the difference equation xn+1 = f(xn, xn−1, ..., xn−k) hasa unique equilibrium x ∈ [a, b] and every solution of the equation converges tox.

Proof. Setm0 = a and M0 = b,

and for each i = 1, 2, ... set

mi = f(mi−1,Mi−1,mi−1,Mi−1, ...,mi−1,Mi−1,mi−1, ...,mi−1,Mi−1),

and

Mi = f(Mi−1,mi,Mi−1,mi, ...,Mi−1,mi−1,Mi−1, ...,Mi−1,mi−1).

Now observe that for each i ≥ 0,

a = m0 ≤ m1 ≤ ... ≤ mi ≤ ... ≤Mi ≤ ... ≤M1 ≤M0 = b,

andmi ≤ xp ≤Mi for p ≥ (k + 1)i+ 1.

Setm = lim

i→∞mi and M = lim

i→∞Mi.

ThenM ≥ lim

i→∞supxi ≥ lim inf

i→∞xi ≥ m

and by the continuity of f ,

M = f(M,m,M,m, ...,M,m, ..,M,m) and m = f(m,M,m,M, ...,m,M, ...,m,M ).

In view of (ii),m =M = x,

from which the result follows.

Theorem 7 Let [a, b] be an interval of real numbers and assume that f : [a, b]k+1 →[a, b], is a continuous function satisfying the following properties:

(i) f(x0, x1, ..., xk) is non-increasing in its arguments x2t with t ∈©0, 1, 2, ..., [k+12 ]

ªfor each xr (r 6= 2t) in [a, b] and non-decreasing in its arguments x2r+1 withr ∈

©0, 1, 2, ..., [k+12 ]

ªfor all xt (t 6= r) in [a, b].

(ii) If (M,m) ∈ [a, b]× [a, b] is a solution of the system

M = f(m,M,m,M, ...,m,M, ...,m,M ), m = f(M,m,M,m, ...,M,m...,M,m),

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1000 H. El-Metwally et al 993-1003

Page 249: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

impliesm =M.

Then the difference equation xn+1 = f(xn, xn−1, ..., xn−k) has a unique equilib-rium x ∈ [a, b] and every solution of the equation converges to x.

Proof. As the proof of Theorem 6 and will be omitted.

Theorem 8 Assume that A 6= β. Then every nonnegative solution of Eq.(6)

converges to the unique equilibrium point of Eq.(6) x =A−B+

√(A−B)2+4αB2B .

Proof. Rewrite Eq. (6) in the following form

xn+1 = f(xn, xn−1, ..., xn−k) =

α+[ k+12 ]Pi=0

a2ixn−2i

β +[ k+12 ]Pi=0

b2i+1xn−2i−1

, n = 0, 1, 2, ... .

Then the function f satisfies the hypotheses (i) of Theorem 6. Now considerthe system

M = f(M,m,M,m, ...,M,m) = α+AMβ+Bm , m = f(m,M,m,M, ...,m,M ) = α+Am

β+BM .

Thus it is easy to see thatm =M. Therefore the function f satisfies the hypothe-ses (ii) of Theorem 6 too. Then it follows by Theorem 6 that the equilibrium

point x =A−B+

√(A−B)2+4αB2B of Eq.(6) is a global attractor of the solutions of

Eq.(6).

Theorem 9 Let α = 0 and A < β. Then every nonnegative solution of Eq.(6)converges to the unique equilibrium point of Eq.(6) x = 0.

Proof. The proof is similar to the proof of Theorem 8 and will be omitted.

Theorem 10 Let α = 0 and β = 0. Then every positive solution of Eq.(6)converges to the unique positive equilibrium point of Eq.(6) x = A

B .

Proof. The proof is similar to the proofs of Theorem 5 and Theorem 8 andwill be omitted.

Theorem 11 Let α = 0 and β < A. Then every nonnegative solution of Eq.(6)

converges to the unique positive equilibrium point of Eq.(6) x =A− β

B.

Proof. The proof is similar to the proofs of Theorem 5 and Theorem 8 andwill be omitted.

Theorem 12 Let α 6= 0 and β = 0. Then every positive solution of Eq.(6) con-

verges to the unique positive equilibrium point of Eq.(6) x =A+√A2 + 4αB

2B.

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1001 H. El-Metwally et al 993-1003

Page 250: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Proof. The proof is similar to the proofs of Theorem 5 and Theorem 8 andwill be omitted.Remark: It is easy to obtain -by using Theorem B and Theorem 7- similarresults for the following difference equation

yn+1 =

δ +[ k+12 ]Pi=0

p2i+1yn−2i−1

γ +[ k+12 ]Pi=0

q2iyn−2i

.

Acknowledgements

This article was funded by the Deanship of Scientific Research (DSR), KingAbdulaziz University, Jeddah. The authors, therefore, acknowledge with thanksDSR technical and financial support.

References[1] M. Aloqeili, Dynamics of a rational difference equation, Appl. Math.

Comp., 176 (2) (2006), 768-774.

[2] E. Camouzis and G. Ladas, Dynamics of Third-Order Rational DifferenceEquations with Open Problems and Conjectures, vol. 5 of Advances in Dis-crete Mathematics and Applications, Chapman & Hall/CRC, Boca Raton,Fla, USA, 2008.

[3] C. Cinar, R. Karatas and I. Yalcinkaya, On solutions of the difference

equation xn+1 =xn−3

−1 + xnxn−1xn−2xn−3, Mathematica Bohemica, 132 (3)

(2007), 257-261.

[4] J. H.Conway and H. S. M.Coxeter, Triangulated polygons and frieze pat-terns, math. Gaz. 57 (400) (1973), 87-94.

[5] E. M. Elabbasy and E. M. Elsayed, Dynamics of a Rational DifferenceEquation, Chinese Annals of Math., Series B, 30 B (2), ( March — 2009),187—198.

[6] H. El-Metwally, Qualitative Proprieties of some Higher Order DifferenceEquations, Comput. Math. Appl., 58(4) (2009), 686-692.

[7] H. El-Metwally, Qualitative Study of Nonlinear Difference Equations: Dif-ferential and Difference Equations, LAP Lambert Academic Publishing,2010.

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1002 H. El-Metwally et al 993-1003

Page 251: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

[8] V. L. Kocic and G. Ladas, Global Behavior of Nonlinear Difference Equa-tions of Higher Order with Applications, Kluwer Academic Publishers, Dor-drecht, 1993.

[9] M. R. S. Kulenovic and G. Ladas, Dynamics of Second Order RationalDifference Equations with Open Problems and Conjectures, Chapman &Hall / CRC Press, 2001.

[10] J. Leech, The rational cuboid revisited, Amer. Math. Monthly, 84 (1977),518-533.

[11] W. Li and H. R. Sun, Dynamics of a rational difference equation, Appl.Math. Comp., 163 (2005), 577—591.

[12] R. C. Lyness, Note 1581, Math. Gaz., 26:62 (1942).

[13] I. Yalcinkaya, On the global attractivity of positive solutions of a rationaldifference equation, Selçuk J. Appl. Math., 9 (2) (2008), 3-8.

11

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1003 H. El-Metwally et al 993-1003

Page 252: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Yongmin Liu

Generalized integration operators from Hardy spaces to

Zygmund-type spaces ∗†

Huiying Qu, Yongmin Liu ‡ and Shulei ChengSchool of Mathematics and Statistics

Jiangsu Normal UniversityXuzhou 221116, P.R. China

Abstract Let H(D) denote the space of all holomorphic functions on the unit disk D ofC. Let ϕ be a holomorphic self-map of D, n be a positive integer and g ∈ H(D). In thispaper, we investigate the boundedness and compactness of a generalized integration operator

I(n)g,ϕ =

∫ z

0f (n)(ϕ(ζ))g(ζ)d(ζ)

from Hardy spaces to the Zygmund-type spaces Zµ.

1 Introduction

Let D denote the open unit disk of the complex plane C and H(D) the space of all analyticfunctions in D.

For 0 < r < 1, f ∈ H(D), we set

Mp(r, f) =

(

1

∫ 2π

0

∣f(reiθ)∣

pdθ

)1/p

, 0 < p < ∞,

M∞(r, f) = max0≤θ≤2π

∣f(reiθ)∣

∣ .

For 0 < p ≤ ∞, the Hardy space Hp consists of those functions f ∈ H(D), for which

‖f‖p = sup0≤r<1

Mp(r, f) < ∞.

It is well known that with norm ‖f‖p the Hp space is a Banach space if 1 ≤ p ≤ ∞, for0 < p < 1, Hp space is a nonlocally convex topological vector space, and d(f, g) = ‖f − g‖p

p

is a complete metric for it. For more information about the Hp space, one may see thesebooks, for example, [4, 5].

Let µ be a weight, that is, µ is a positive continuous function on D. The Zygmund-typeZµ consists of all f ∈ H(D) such that

supz∈D

µ(z)|f ′′(z)| < ∞.

∗2010 Mathematics Subject Classification: Primary 47B38; Secondary 47G10,47B33,30H10.†Key words and phrases: Hardy space, Zygmund-type space, generalized integration operator.‡Corresponding author. Email: [email protected]

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1004 Huiying Qu et al 1004-1016

Page 253: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Yongmin Liu

Products of generalized integration operators 2

With the norm ‖f‖Zµ = |f(0)| + |f ′(0)| + supz∈D

µ(z)|f ′′(z)|, it becomes a Banach space. The

little Zygmund-type space Zµ,0 is a subspace of Zµ consisting of those f ∈ Zµ such that

lim|z|→1

µ(z)|f ′′(z)| = 0.

When µ(z) = (1− |z|2), the Zygmund-type space becomes the Zygmund space Z ([7]), whilethe little Zygmund-type space Zµ,0 becomes the little Zygmund space Z0.

Let ϕ be an analytic self-map of D, then the composition operator on H(D) is given by

Cϕf = f ϕ.

Composition operators acting on various spaces of analytic functions have been the objectfor recent years, especially the problems of relating operator-theoretic properties of Cϕ tofunction the theoretic properties of ϕ. See the book of Cowen and MacCluer ([3]) and Shapiro([12]) for discussions of composition operators on classical spaces of analytic functions.

Assume that g : D → C is a holomorphic map of the unit disk D, for f ∈ H(D), define

Igf(z) =

∫ z

0f(ζ)g′(ζ)dζ, z ∈ D.

This operator is called Riemann-Stieltjes operator (or Extended-Cesaro operator). Ch. Pom-merenke ([11]) initiated the study of Riemann-Stieltjes operator Ig on H2 , where he showedthat Ig is bounded on H2 if and only if g is in BMOA. This was extended to other Hardyspaces Hp (1 ≤ p < ∞) in [1] and [2] where compactness of Ig on Hp and Schatten classmembership of Ig on H2 was also completely characterized in terms of the symbol g.

In this paper, we consider an integration operator I(n)g,ϕ which is defined as

I(n)g,ϕf(z) =

∫ z

0f (n)(ϕ(ζ))g(ζ)dζ, z ∈ D.

This operator is called the generalized integration operator, which was introduced in [13] and

studied in [6, 13, 14, 20]. Also, the operator I(n)g,ϕ is a generalization of the Riemann- Stieltjes

operator Ig induced by g. In fact, the operator I(n)g,ϕ can induce many known operators.

For example, when n = 1, I(n)g,ϕ reduces to an integration operator recently studied by S.

Stevic, S. Li, X. Zhu and W. Yang in [8, 15, 19]. When n = 1 and g(z) = ϕ′(z), weobtain the composition operator Cϕ defined as Cϕf = f ϕ + f(ϕ(0)), f ∈ H(D). LetD be the differentiation operator, n = m + 1 and g(z) = ϕ′(z), then we get the operatorCϕD

mf(z) = f (m)(ϕ(z)) − f (m)(ϕ(0)) which was studied in [10, 18].In [13], S. D. Sharma and A. Sharmat have characterized the boundedness and compact-

ness of generalized integration operators I(n)g,ϕ from Bloch type spaces to weighted BMOA

spaces by using logarithmic Carleson measure characterization of the weighted BMOA spaces.In [20], X. Zhu characterized the boundedness and compactness of generalized integration op-erators from H∞ to Zygmund-type spaces. In [6], Z. He and G. Cao have characterized theboundedness and compactness of generalized integration operators between Bloch-type spacesand F (p, q, s) spaces. Motivated by the results [6, 13, 14, 20], this paper is devoted to inves-tigating the boundedness and compactness of generalized integration operators from Hardyspaces Hp (0 < p < ∞) to Zygmund-type spaces.

Through out this paper, we will use the letter C to denote a generic positive constantthat can change its value at each occurrence.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1005 Huiying Qu et al 1004-1016

Page 254: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Yongmin Liu

Products of generalized integration operators 3

2 Auxiliary results

Here we quote some auxiliary results which will be used in the proofs of the main results inthis paper.

Lemma 2.1 ([4]) For p > 1, there exists a constant C(p) such that

∫ 2π

0

|1 − z|p≤

C(p)

(1 − |z|2)p−1 , for every z ∈ D.

Lemma 2.2 ([4, 5, 16]) Suppose that 0 < p < ∞, f ∈ Hp, then

∣f (n)(z)

∣≤ C

‖ f ‖p

(1 − |z|2)1/p+n,

for every z ∈ D and all nonnegative n = 0, 1, 2, · · · .

The following criterion for the compactness is a useful tool and it follows from standardarguments, for example, [3, Proposition 3.11].

Lemma 2.3 Assume that n be a nonnegative integer and ϕ be a holomorphic self-map of

D, 0 < p < ∞, µ be a weight. Then I(n)g,ϕ : Hp → Zµ is compact if and only if I

(n)g,ϕ : Hp → Zµ

is bounded and for any bounded sequence fk in Hp which converges to zero uniformly on

compact subsets of D as k → ∞, we have ‖I(n)g,ϕfk‖Zµ → 0 as k → ∞.

The following lemma was proved in [7] similar to the corresponding lemma in [9].

Lemma 2.4 A closed set K in Zµ,0 is compact if and only if K is bounded and satisfies

lim|z|→1

limf∈K

µ(z)|f ′′(z)| = 0.

Lemma 2.5 Assume that 0 < p < ∞, then for a, b > 0

(a + b)p ≤ C (ap + bp) .

3 Boundedness and compactness of I(n)g,ϕ from Hp (0 < p < ∞)

spaces to Zygmund-type spaces

In this section, we study the boundedness and compactness of I(n)g,ϕ : Hp → Zµ.

Theorem 3.1. Let g ∈ H(D), n be a nonnegative integer and ϕ be a holomorphic self-map

of D, 0 < p < ∞, µ be a weight. Then I(n)g,ϕ : Hp → Zµ is bounded if and only if the following

conditions are satisfied

supz∈D

µ(z)|g′(z)|(

1 − |ϕ(z)|2)1/p+n

< ∞, (3.1)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1006 Huiying Qu et al 1004-1016

Page 255: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Yongmin Liu

Products of generalized integration operators 4

supz∈D

µ(z)|g(z)ϕ′(z)|(

1 − |ϕ(z)|2)1/p+n+1

< ∞. (3.2)

Proof. Assume that (3.1) and (3.2) hold. Then for every z ∈ D and f ∈ Hp, by Lemma2.2 we have

µ(z)∣

∣(I(n)

g,ϕf)′′(z)∣

= µ(z)∣

∣f (n+1)(ϕ(z))ϕ′(z)g(z) + f (n)(ϕ(z))g′(z)

≤ µ(z)|g(z)ϕ′(z)||f (n+1)(ϕ(z))| + µ(z)|g′(z)||f (n)(ϕ(z))|

≤ C‖f‖pµ(z)|g(z)ϕ′(z)|

(1 − |ϕ(z)|2)1/p+n+1+ C‖f‖p

µ(z)|g′(z)|

(1 − |ϕ(z)|2)1/p+n< ∞, (3.3)

On the other hand , we have|(I(n)

g,ϕf)(0)| = 0 (3.4)

and

|(I(n)g,ϕf)′(0)| = |f (n)(ϕ(0))g(0)| ≤ C

|g(0)|

(1 − |ϕ(0)|2)1/p+n‖f‖p. (3.5)

Applying conditions (3.3), (3.4) and (3.5), we deduce that the operator I(n)g,ϕ : Hp → Zµ is

bounded.Conversely we suppose that I

(n)g,ϕ : Hp → Zµ is bounded, that is there exists a constant C

such that‖I(n)

g,ϕf‖Zµ ≤ C‖f‖p

for all f ∈ Hp. For f(z) = zn

n! ∈ Hp, we have that

supz∈D

µ(z)|g′(z)| < ∞. (3.6)

Let f(z) = zn+1

(n+1)! ∈ Hp, we have that

supz∈D

µ(z)|ϕ′(z)g(z) + ϕ(z)g′(z)| < ∞. (3.7)

By (3.6), (3.7) and the boundedness of the function ϕ(z), we get

supz∈D

µ(z)|g(z)ϕ′(z)| < ∞. (3.8)

For a fixed ω ∈ D, set

fω(z) = (1/p + n + 2)1 − |ϕ(ω)|2

(1 − zϕ(ω))1/p+1− (1/p + 1)

(1 − |ϕ(ω)|2)2

(1 − zϕ(ω))1/p+2. (3.9)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1007 Huiying Qu et al 1004-1016

Page 256: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Yongmin Liu

Products of generalized integration operators 5

From Lemma 2.1 and Lemma 2.5 we have

‖fω‖p = sup0≤r<1

(

1

∫ 2π

0|fω(reiθ)|p

)1/p

≤ C sup0≤r<1

(

1

∫ 2π

0

(1/p + n + 2)1 − |ϕ(ω)|2

(1 − ϕ(ω)reiθ)1/p+1

p)1/p

+C sup0≤r<1

(

1

∫ 2π

0

(1/p + 1)(1 − |ϕ(ω)|2)2

(1 − ϕ(ω)reiθ)1/p+2

p)1/p

≤ C sup0≤r<1

(

(1 − |ϕ(ω)|2)p1

∫ 2π

0

1

|1 − ϕ(ω)reiθ|p+1

)1/p

+C sup0≤r<1

(

(1 − |ϕ(ω)|2)2p 1

∫ 2π

0

1

|1 − ϕ(ω)reiθ|2p+1

)1/p

≤ C

(

(1 − |ϕ(ω)|2)pC(p)

(1 − |ϕ(ω)|2)p

)1/p

+ C

(

(1 − |ϕ(ω)|2)2p C(p)

(1 − |ϕ(ω)|2)2p

)1/p

≤ C,

hence fω ∈ Hp and supω∈D

‖fω‖p ≤ C < ∞.

On the other hand we get that

f(n)ω (z) =

(1/p + n + 2)

n∏

j=1

(1/p + j)

(1 − |ϕ(ω)|2)ϕ(ω)n

(1 − zϕ(ω))1/p+n+1

(1/p + 1)n+1∏

j=2

(1/p + j)

(1 − |ϕ(ω)|2)2ϕ(ω)n

(1 − zϕ(ω))1/p+n+2, (3.10)

f(n+1)ω (z) =

(1/p + n + 2)n+1∏

j=1

(1/p + j)

(1 − |ϕ(ω)|2)ϕ(ω)n+1

(1 − zϕ(ω))1/p+n+2

(1/p + 1)

n+2∏

j=2

(1/p + j)

(1 − |ϕ(ω)|2)2ϕ(ω)n+1

(1 − zϕ(ω))1/p+n+3. (3.11)

From (3.10) and (3.11), we have f(n+1)ω (ϕ(ω)) = 0 and

f (n)ω (ϕ(ω)) =

n∏

j=1

(1/p + j)

ϕ(ω)n

(1 − |ϕ(ω)|2)1/p+n.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1008 Huiying Qu et al 1004-1016

Page 257: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Yongmin Liu

Products of generalized integration operators 6

Hence

C ≥ ‖I(n)g,ϕfω‖Zµ

≥ supz∈D

µ(z)∣

∣(I(n)g,ϕfω)′′(z)

≥ supz∈D

µ(z)∣

∣f (n+1)

ω (ϕ(z))ϕ′(z)g(z) + f (n)ω (ϕ(z))g′(z)

≥ µ(|ω|)∣

∣f (n+1)

ω (ϕ(ω))ϕ′(ω)g(ω) + f (n)ω (ϕ(ω))g′(ω)

=

n∏

j=1

(1/p + j)

µ(|ω|)|g′(ω)||ϕ(ω)|n(

1 − |ϕ(ω)|2)1/p+n

. (3.12)

By (3.12), we have

sup1

2<|ϕ(ω)|<1

µ(|ω|)|g′(ω)|

(1−|ϕ(ω)|2)1/p+n ≤ 2n sup

1

2<|ϕ(ω)|<1

n∏

j=1

(1/p + j)

µ(|ω|)|g′(ω)||ϕ(ω)|n(

1 − |ϕ(ω)|2)1/p+n

≤ 2n supω∈D

n∏

j=1

(1/p + j)

µ(|ω|)|g′(ω)||ϕ(ω)|n(

1 − |ϕ(ω)|2)1/p+n

≤ C < ∞. (3.13)

And from (3.6), we obtain that

sup|ϕ(ω)|≤ 1

2

µ(|ω|)|g′(ω)|

(1−|ϕ(ω)|2)1/p+n ≤ (

4

3)1/p+n sup

|ϕ(ω)|≤ 1

2

µ(|ω|)|g′(ω)

≤ (4

3)1/p+n sup

ω∈D

µ(|ω|)|g′(ω)| ≤ C < ∞. (3.14)

Thus combing (3.13) with (3.14) we get the condition (3.1).For a fixed ω ∈ D, set

hω(z) = (1/p + n + 1)1 − |ϕ(ω)|2

(1 − zϕ(ω))1/p+1− (1/p + 1)

(1 − |ϕ(ω)|2)2

(1 − zϕ(ω))1/p+2, (3.15)

we get that

h(n)ω (z) =

(1/p + n + 1)

n∏

j=1

(1/p + j)

(1 − |ϕ(ω)|2)ϕ(ω)n

(1 − zϕ(ω))1/p+n+1

(1/p + 1)

n+1∏

j=2

(1/p + j)

(1 − |ϕ(ω)|2)2ϕ(ω)n

(1 − zϕ(ω))1/p+n+2, (3.16)

h(n+1)ω (z) =

(1/p + n + 1)

n+1∏

j=1

(1/p + j)

(1 − |ϕ(ω)|2)ϕ(ω)n+1

(1 − zϕ(ω))1/p+n+2

(1/p + 1)n+2∏

j=2

(1/p + j)

(1 − |ϕ(ω)|2)2ϕ(ω)n+1

(1 − zϕ(ω))1/p+n+3. (3.17)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1009 Huiying Qu et al 1004-1016

Page 258: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Yongmin Liu

Products of generalized integration operators 7

From Lemma 2.1 and Lemma 2.5 we obtain that hω ∈ Hp and supω∈D

‖hω‖p ≤ C < ∞ with a

direct calculation. From (3.16) and (3.17), we have h(n)ω (ϕ(ω)) = 0 and

h(n+1)ω (ϕ(ω)) = −

n+1∏

j=1

(1/p + j)

ϕ(ω)n+1

(1 − |ϕ(ω)|2)1/p+n+1.

Hence

C ≥ ‖I(n)g,ϕhω‖Zµ

≥ supz∈D

µ(z)∣

∣(I(n)g,ϕhω)′′(z)

≥ supz∈D

µ(z)∣

∣h(n+1)

ω (ϕ(z))ϕ′(z)g(z) + h(n)ω (ϕ(z))g′(z)

≥ µ(|ω|)∣

∣h(n+1)ω (ϕ(ω))ϕ′(ω)g(ω) + h(n)

ω (ϕ(ω))g′(ω)∣

=

n+1∏

j=1

(1/p + j)

µ(|ω|)|g(ω)ϕ′(ω)||ϕ(ω)|n+1

(

1 − |ϕ(ω)|2)1/p+n+1

. (3.18)

By (3.18), we have

sup1

2<|ϕ(ω)|<1

µ(|ω|)|g(ω)ϕ′(ω)|(

1 − |ϕ(ω)|2)1/p+n+1

≤ 2n+1 sup1

2<|ϕ(ω)|<1

n+1∏

j=1

(1/p + j)

µ(|ω|)|g(ω)ϕ′(ω)||ϕ(ω)|n+1

(

1 − |ϕ(ω)|2)1/p+n+1

≤ 2n+1 supω∈D

n+1∏

j=1

(1/p + j)

µ(|ω|)|g(ω)ϕ′(ω)||ϕ(ω)|n+1

(

1 − |ϕ(ω)|2)1/p+n+1

≤ C < ∞. (3.19)

And from (3.8), we obtain that

sup|ϕ(ω)|≤ 1

2

µ(|ω|)|g(ω)ϕ′(ω)|(

1 − |ϕ(ω)|2)1/p+n+1

≤ (4

3)1/p+n+1 sup

|ϕ(ω)|≤ 1

2

µ(|ω|)|g(ω)ϕ′(ω)|

≤ (4

3)1/p+n+1 sup

ω∈D

µ(|ω|)|g(ω)ϕ′(ω)|

≤ C < ∞. (3.20)

Thus combing (3.19) with (3.20) we get the condition (3.2).

Theorem 3.2. Let g ∈ H(D), n be a nonnegative integer and ϕ be a holomorphic self-map

of D, 0 < p < ∞, µ be a weight. Then I(n)g,ϕ : Hp → Zµ is compact if and only if the following

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1010 Huiying Qu et al 1004-1016

Page 259: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Yongmin Liu

Products of generalized integration operators 8

conditions are satisfied,

M1 := supz∈D

µ(z)|g′(z)| < ∞, (3.21)

M2 := supz∈D

µ(z)|g(z)ϕ′(z)| < ∞, (3.22)

lim|ϕ(z)|→1

µ(z)|g′(z)|(

1 − |ϕ(z)|2)1/p+n

= 0 (3.23)

and

lim|ϕ(z)|→1

µ(z)|g(z)ϕ′(z)|(

1 − |ϕ(z)|2)1/p+n+1

= 0. (3.24)

Proof. Assume that (3.21), (3.22), (3.23), and (3.24) hold. From (3.21) and (3.23) it is

easy to see that (3.1) hold and from (3.22), (3.24) we get (3.2) hold. Hence I(n)g,ϕ : Hp → Zµ is

bounded, by Theorem 3.1. For any bounded sequence fk in Hp with fk → 0 uniformly oncompact subsets of D. To establish the assertion, it suffices, in view of Lemma 2.3, to showthat

‖I(n)g,ϕfk‖Zµ → 0, as k → ∞.

We assume that ‖fk‖p ≤ 1. From (3.23) and (3.24) we have for any ε > 0, there existsρ ∈ (0, 1), when ρ < |ϕ(z)| < 1, such that

µ(z)|g′(z)|(

1 − |ϕ(z)|2)1/p+n

< ε, (3.25)

andµ(z)|g(z)ϕ′(z)|

(

1 − |ϕ(z)|2)1/p+n+1

< ε. (3.26)

Since fk → 0 uniformly on compact subsets of D, Cauchy,s estimate gives that f(n)k , f

(n+1)k

converges to 0 uniformly on compact subsets of D. There exists a K0 ∈ N such that whenk > K0, from (3.21), (3.22) and Lemma 2.2, we have

|(I(n)g,ϕfk)(0)| + |(I(n)

g,ϕfk)′(0)| + sup

|ϕ(z)|≤ρµ(z)|(I(n)

g,ϕfk)′′(z)|

≤ |f(n)k (ϕ(0))||g(0)| + sup

|ϕ(z)|≤ρµ(z)|g(z)ϕ′(z)||f

(n+1)k (ϕ(z))|

+ sup|ϕ(z)|≤ρ

µ(z)|g′(z)||f(n)k (ϕ(z))|

≤ |f(n)k (ϕ(0))||g(0)| + M2 sup

|ϕ(z)|≤ρ|f

(n+1)k (ϕ(z))| + M1 sup

|ϕ(z)|≤ρ|f

(n)k (ϕ(z))|

< Cε. (3.27)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1011 Huiying Qu et al 1004-1016

Page 260: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Yongmin Liu

Products of generalized integration operators 9

From (3.25), (3.26), (3.27) and Lemma 2.2 we have

‖I(n)g,ϕfk‖Zµ =

∣(I(n)

g,ϕfk)(0)∣

∣+∣

∣(I(n)

g,ϕfk)′(0)∣

∣+ sup

z∈D

µ(z)∣

∣(I(n)

g,ϕfk)′′

(z)∣

(

∣I(n)g,ϕfk)(0)

∣ +∣

∣(I(n)g,ϕfk)

′(0)∣

∣ + supz∈D: |ϕ(z)|≤ρ

µ(z)∣

∣(I(n)g,ϕfk)

′′

(z)∣

)

+ supz∈D: ρ<|ϕ(z)|<1

µ(z)∣

∣(I(n)

g,ϕfk)′′

(z)∣

< Cε + supz∈D: ρ<|ϕ(z)|<1

µ(z)|g′(z)|(

1 − |ϕ(z)|2)1/p+n

C‖f‖p

+ supz∈D: ρ<|ϕ(z)|<1

µ(z)|g(z)ϕ′(z)|(

1 − |ϕ(z)|2)1/p+n+1

C‖f‖p

< Cε + Cε + Cε

= 3Cε, (3.28)

when K > K0. It follows that the operator I(n)g,ϕ : Hp → Zµ is compact.

Conversely. Assume that I(n)g,ϕ : Hp → Zµ is compact. Then it is clear that I

(n)g,ϕ : Hp → Zµ

is bounded, and hence (3.21) and (3.22) hold from the proof of Theorem 3.1. Let zk be asequence in D such that |ϕ(zk)| → 1 as k → ∞.

We can use the test functions

fk(z) = fzk(z) = (1/p + n + 2)

1 − |ϕ(zk)|2

(1 − zϕ(zk))1/p+1− (1/p + 1)

(1 − |ϕ(zk)|2)2

(1 − zϕ(zk))1/p+2.

By a direct calculation, we may easily prove that fk converges to 0 uniformly on compactsubsets of D and sup

k∈N

‖fk‖p ≤ C < ∞. Then fk is a bounded sequence in Hp which converges

to 0 uniformly on compact subsets of D. By Lemma 2.3, we have

limk→∞

‖I(n)g,ϕfk‖Zµ = 0. (3.29)

Note that f(n+1)k (ϕ(zk)) = 0,

f(n)k (ϕ(zk)) =

n∏

j=1

(1/p + j)

ϕ(zk)n

(1 − |ϕ(zk)|2)1/p+n.

From (3.12) and using the compactness of I(n)g,ϕ : Hp → Zµ we obtain

n∏

j=1

(1/p + j)

µ(|zk|)|g′(zk)||ϕ(zk)|n

(

1 − |ϕ(zk)|2)1/p+n

≤ ‖I(n)g,ϕfk‖Zµ → 0 , as k → ∞. (3.30)

From (3.30) and |ϕ(zk)| → 1, it follows that

limk→∞

µ(|zk|)|g′(zk)|

(

1 − |ϕ(zk)|2)1/p+n

= 0,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1012 Huiying Qu et al 1004-1016

Page 261: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Yongmin Liu

Products of generalized integration operators 10

and consequently (3.23) holds.Next, let

hk(z) = hzk(z) = (1/p + n + 1)

1 − |ϕ(zk)|2

(1 − zϕ(zk))1/p+1− (1/p + 1)

(1 − |ϕ(zk)|2)2

(1 − zϕ(zk))1/p+2.

By a direct calculation, we obtain that hk 0 on compact subsets of D and supk∈N

‖hk‖p ≤

C < ∞. Then hk is a bounded sequence in Hp which converges to 0 uniformly on compactsubsets of D. By Lemma 2.3, we have

limk→∞

‖I(n)g,ϕhk‖Zµ = 0. (3.31)

Note that

h(n+1)k (ϕ(zk)) = −

n+1∏

j=1

(1/p + j)

ϕ(zk)n+1

(1 − |ϕ(zk)|2)1/p+n+1, h

(n)k (ϕ(zk)) = 0.

From (3.18) and using the compactness of I(n)g,ϕ : Hp → Zµ we obtain

n+1∏

j=1

(1/p + j)

µ(|zk|) |g(zk)ϕ′(zk)| |ϕ(zk)|n+1

(

1 − |ϕ(zk)|2)1/p+n+1

≤ ‖I(n)g,ϕhk‖Zµ → 0 , as k → ∞. (3.32)

|ϕ(zk)| → 1 implies that

limk→∞

µ(|zk|) |g(zk)ϕ′(zk)|(

1 − |ϕ(zk)|2)1/p+n+1

= 0,

(3.24) holds.

Theorem 3.3. Let g ∈ H(D), n be a nonnegative integer and ϕ be a holomorphic self-

map of D, 0 < p < ∞, µ be a weight. Then I(n)g,ϕ : Hp → Zµ,0 is compact if and only if the

following conditions are satisfied,

lim|z|→1

µ(z)|g′(z)|(

1 − |ϕ(z)|2)1/p+n

= 0 (3.33)

and

lim|z|→1

µ(z)|g(z)ϕ′(z)|(

1 − |ϕ(z)|2)1/p+n+1

= 0. (3.34)

Proof. Suppose that (3.33) and (3.34) hold. It is clear that (3.1)and (3.2) hold. by

Theorem 3.1 we have I(n)g,ϕ : Hp → Zµ is bounded. On the other hand for any f ∈ Hp we have

µ(z)∣

∣(I(n)g,ϕf)′′(z)

= µ(z)∣

∣f (n+1)(ϕ(z))ϕ′(z)g(z) + f (n)(ϕ(z))g′(z)

≤ µ(z)|g(z)ϕ′(z)||f (n+1)(ϕ(z))| + µ(z)|g′(z)||f (n)(ϕ(z))|

≤ C‖f‖pµ(z)|g(z)ϕ′(z)|

(1 − |ϕ(z)|2)1/p+n+1+ C‖f‖p

µ(z)|g′(z)|

(1 − |ϕ(z)|2)1/p+n→ 0 , as |z| → 1. (3.35)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1013 Huiying Qu et al 1004-1016

Page 262: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Yongmin Liu

Products of generalized integration operators 11

it follows that I(n)g,ϕf ∈ Zµ,0. Hence I

(n)g,ϕ : Hp → Zµ,0 is bounded. Taking the supremum in

inequality (3.35) over all f ∈ Hp such that ‖f‖p ≤ 1 and letting |z| → 1, yields

lim|z|→1

sup‖f‖p≤1

µ(z)∣

∣(I(n)g,ϕf)′′(z)

∣ = 0.

Hence, by Lemma 2.4 we see that the operator I(n)g,ϕ : Hp → Zµ,0 is compact.

Now Assume that I(n)g,ϕ : Hp → Zµ,0 is compact. Firstly, it is obvious I

(n)g,ϕ : Hp → Zµ,0 is

bounded. By Theorem 3.1 taking function f(z) = zn

n! ∈ Hp, we have that

lim|z|→1

µ(z)|g′(z)| = 0. (3.36)

Let f(z) = zn+1

(n+1)! ∈ Hp, we have that

lim|z|→1

µ(z)|ϕ′(z)g(z) + ϕ(z)g′(z)| = 0. (3.37)

By (3.36), (3.37) and the boundedness of the function ϕ(z), we get

lim|z|→1

µ(z)|g(z)ϕ′(z)| = 0. (3.38)

Since I(n)g,ϕ : Hp → Zµ is compact, by Theorem 3.2 we have (3.23) and (3.24) hold.

It from (3.23) follows that for every ε > 0, there exists δ ∈ (0, 1) such that

µ(z)|g′(z)|(

1 − |ϕ(z)|2)1/p+n

< ε, (3.39)

when δ < |ϕ(z)| < 1. Using (3.26) we see that there exists τ ∈ (0, 1) such that

µ(z)|g′(z)| ≤ ε inft∈[0,δ]

(1 − t2)1/p+n, (3.40)

when τ < |z| < 1. Therefore when τ < |z| < 1 and δ < |ϕ(z)| < 1, by (3.39), we have

µ(z)|g′(z)|(

1 − |ϕ(z)|2)1/p+n

< ε. (3.41)

On the other hand, when τ < |z| < 1 and |ϕ(z)| ≤ δ, by (3.40), we obtain

µ(z)|g′(z)|(

1 − |ϕ(z)|2)1/p+n

≤µ(z)|g′(z)|

inft∈[0,δ]

(1 − t)1/p+n< ε. (3.42)

From (3.41) and (3.42) we have

lim|z|→1

µ(z)|g(z)|(

1 − |ϕ(z)|2)1/p+n

= 0,

thus (3.33) holds.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1014 Huiying Qu et al 1004-1016

Page 263: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Yongmin Liu

Products of generalized integration operators 12

From (3.24), it follows that for every ε > 0, there exists γ ∈ (0, 1) such that

µ(z)|g(z)ϕ′(z)|(

1 − |ϕ(z)|2)1/p+n+1

< ε, (3.43)

when γ < |ϕ(z)| < 1. Using (3.38) we see that there exists η ∈ (0, 1) such that

µ(z)|g(z)ϕ′(z)| ≤ ε inft∈[0,γ]

(1 − t2)1/p+n+1, (3.44)

when η < |z| < 1. Therefore when η < |z| < 1 and γ < |ϕ(z)| < 1, by (3.43), we have

µ(z)|g(z)ϕ′(z)|(

1 − |ϕ(z)|2)1/p+n+1

< ε. (3.45)

On the other hand, when η < |z| < 1 and |ϕ(z)| ≤ γ, by (3.44), we obtain

µ(z)|g(z)ϕ′(z)|(

1 − |ϕ(z)|2)1/p+n+1

≤µ(z)|g(z)ϕ′(z)|

inft∈[0,γ]

(1 − t)1/p+n+1< ε. (3.46)

From (3.45), (3.46) we have

lim|z|→1

µ(z)|g(z)ϕ′(z)|(

1 − |ϕ(z)|2)1/p+n+1

= 0,

we obtain (3.34) holds, the proof is completed.

Acknowledgements

This research was supported by the Natural Science Foundation of China (11171285) and thePriority Academic Program Development of Jiangsu Higher Education Institutions.

References

[1] A. Aleman and A. G. Siskakis, An integral operator on Hp, Complex Variables Theory Appl, 28(2)(1995), 149-158.

[2] A. Aleman and J. A. Cima, An integral operator on Hp and Hardy,s inequality, J. Anal. Math., 85

(2001), 157-176.

[3] C. C. Cowen and B. D. MacCluer, Composition Operators on Spaces of Analytic Functions, Studies inAdvanced Mathematics. CRC Press, Boca Raton, FL, (1995). xii+388 pp. ISBN: 0-8493-8492-3.

[4] P. L. Duren, Theory of HP Spaces, vol. 38 of Pure and Applied Mathematics Academic Press, New York,NY, USA, (1970).

[5] J. B. Garnett, Bounded Analytic Functions, vol. 236 of Graduate Texts in Mathematics, Springer, NewYork, NY, USA, Revised 1st edition, (2007).

[6] Z. He and G. Cao, Generalized integration operators between Bloch-type spaces and F(p,q,s) spaces, Tai-wanese J. Math., 17(4) (2013), 1211–1225.

[7] S. Li and S. Stevic, Volterra-type operators on Zygmund spaces, J. Inequal. Appl., (2007), Article ID32124.

[8] S. Li and S. Stevic, Products of integral-type operators and composition operators between Bloch-typespaces, J. Math. Anal. Appl, 349(12) (2009), 596-610.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1015 Huiying Qu et al 1004-1016

Page 264: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Yongmin Liu

Products of generalized integration operators 13

[9] K. Madigan and A. Matheson, Compact composition operator on the Bloch space, Trans. Amer. Math.Soc., 347(7) (1995), 2679-2687.

[10] S. Ohno, Products of composition and differentiation between Hardy spaces, Bull. Aus tral. Math. Soc,73(2) (2006), 235-243.

[11] Ch. Pommerenke, Schlichte Funktionen und analytische Funktionen von beschrankter mittlerer Oszillation(German), Comment. Math. Helv., 52(4) (1977), 591-602.

[12] J. H. Shapiro, Composition Operators and Classical Function Theory, Universitext Tracts in Mathematics.Springer-Verlag, New York, (1993). xvi+223pp. ISBN: 0-387 94067-7.

[13] S. D. Sharma and A. Sharma, Generalized integration operators from Bloch type space to weighted BMOAspaces, Demonstratio Math, 44(2) (2011), 373-390.

[14] S. Stevic, A. K. Sharma and S. D. Sharma, Generalized integration operators from the space of integraltransforms into Bloch-types paces, J. Comput. Anal. Appl., 14(6) (2012), 1139-1147.

[15] W. Yang, Composition operators from F(p,q,s) spaces to the nth weighted-types paces on the unit disc,Appl. Math. Comput., 218(4) (2011), 1443-1448.

[16] S. Ye and Z. Zhou, Weighted composition operators from Hardy to Zygmund type spaces, Abstract andApplied Analysis, Volume 2013, Article ID 365286, 10 pages.

[17] K. Zhu, Bloch type spaces of analytic functions, Rochy Mountain J. Math., 23 (1993), 1143-1177.

[18] X. Zhu, Products of differentiation,composition and multiplication from Bergman type spaces to Bers typespaces, Integral Transforms Spec. Funct., 18(3-4) (2007), 223-231.

[19] X. Zhu, Generalized composition operators from generalized weighted Bergman spaces to Bloch type spaces,J. Korean Math. Soc., 46(6) (2009), 1219-1232.

[20] X. Zhu , An integral-type opreator from H∞ to Zygmund-type spaces, Bull. Malays. Math. Sci. Soc., 35(3)(2012), 679–686.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1016 Huiying Qu et al 1004-1016

Page 265: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Approximation Properties of the Modification of

Durrmeyer Type q-Baskakov Operators Which

Preserve x2

Qing-Bo Cai∗

School of Mathematics and Computer Science, Quanzhou Normal University,

Quanzhou 362000, China

E-mail: [email protected]

Abstract. In this paper, we introduce a new kind of modification of Durrmeyertype q-Baskakov operators which preserve x2 based on the concept of q-integer. Weinvestigate the moments and central moments of the operators by computation, obtaina local approximation theorem and also get the pointwise convergence rate theorem anda weighted approximation theorem.

2000 Mathematics Subject Classification: 41A10, 41A25, 41A36.Key words and phrases: q-integer, Durrmeyer type, q-Baskakov operators, moments,weighted approximation.

1 Introduction

In recent years, the applications of q-integers in the approximation theory is one ofthe main area of research. After q-Bernstein polynomials were introduced by Phillips [12]in 1997, many researchers have studied in this field, we mention some of them as [2]-[4],[11]-[16].

In 2010, Aral and Gupta [2] introduced the Durrmeyer type q-Baskakov operators as

D∗n,q(f ;x) = [n− 1]q

∞∑

k=0

p∗n,k(q;x)∫ ∞/A

0p∗n,k(q; t)f(t)dqt, (1)

where, p∗n,k(q;x) =

[n + k − 1

k

]

q

qk2

2xk

(1+x)n+kq

for every n ∈ N, q ∈ (0, 1), x ∈ [0,∞)

and for every real valued continuous and bounded function f on [0,∞). Apparently, theseoperators reproduce only constant functions. In 2012, Cai and Zeng [3] introduced a new

∗Corresponding author.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1017 Qing-Bo Cai 1017-1026

Page 266: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Q. -B. CAI

modification of Durrmeyer type q-Baskakov operators Dn,q as follows:

Dn,q(f ;x) = [n− 1]q∞∑

k=1

pn,k(q; t)f(t)dqt +[n]q + (1 + x)n

q − 1[n]q(1 + x)n

q

f(0), (2)

where, pn,k(q;x) =

[n + k − 1

k

]

q

q2k2+1

4xk

(1+x)n+kq

, which reproduce not only constant

functions but also linear functions. They establish direct and local approximation the-orems of operators Dn,q and obtain the estimates on the rate of convergence and weightedapproximation properties.

Since the types of operators which preserve linear functions and preserve x2 are impor-tant in approximation theory, in the present paper, we will introduce a new modificationof Durrmeyer type q-Baskakov operators which will be defined by equality (6). The ad-vantage of these new operators is that they reproduce not only constant functions but alsox2.

Firstly, we recall some concepts of q-calculus. All of the results can be found in [8, 10].For any fixed real number 0 < q ≤ 1 and each nonnegative integer k, we denote q-integersby [k]q, where

[k]q =

1−qk

1−q , q 6= 1;k, q = 1.

Also q-factorial and q-binomial coefficients are defined as follows:

[k]q! =

[k]q[k − 1]q...[1]q, k = 1, 2, ...;

1, k = 0,

and [n

k

]

q

=[n]q!

[k]q![n− k]q!, (n ≥ k ≥ 0).

The q-Jackson integrals and the q-improper integrals are defined as (see [9, 11])

∫ a

0f(x)dqx = (1− q)a

∞∑

n=0

f(aqn)qn, a > 0,

and ∫ ∞/A

0f(x)dqx = (1− q)

∞∑−∞

f

(qn

A

)qn

A, A > 0, (3)

provided the sums converge absolutely.The q-analog Eq(x) of the exponential function is given as

Eq(x) =∞∑

k=0

qk(k−1)/2 xk

[k]q!= (1 + (1− q)x)∞q , |q| < 1,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1018 Qing-Bo Cai 1017-1026

Page 267: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

DURRMEYER TYPE q-BASKAKOV OPERATORS WHICH PRESERVE x2

where

(1 + x)∞q =∞∏

j=0

(1 + qjx).

The q-Gamma integral is defined as (see [11])

Γq(t) =∫ 1

1−q

0xt−1Eq(−qx)dqx, t > 0,

which satisfies the following functional equations:

Γq(t + 1) = [t]qΓq(t), Γq(1) = 1.

The q-Beta integral is defined as

Bq(t; s) = K(A; t)∫ ∞/A

0

xt−1

(1 + x)t+sq

dqx, (4)

where K(x; t)= 1x+1xt

(1 + 1

x

)t

q(1 + x)1−t

q and (1 + x)τq = (1 + x)(1 + qx)...(1 + qτ−1x), τ >

0 (τ = t + s).In particular for any positive integer n

K(x;n) = qn(n−1)

2 , K(x; 0) = 1 and Bq(t; s) =Γq(t)Γq(s)Γq(t + s)

, (5)

(see [4]).For f ∈ C[0,∞), q ∈ (0, 1) and n ∈ N, we introduce the new modification of the Durrmeyertype q-Baskakov operators Dn,q(f, x) as

Dn,q(f ;x) = [n− 1]q∞∑

k=2

pn,k(q;x)∫ ∞/A

0pn+2,k−2(q; t)f(t)dqt

+q2[n− 1]q (1 + [n + 1]qx) + [2]q(1 + x)n+1

q

[n + 1]qq(1 + x)n+1q

f(0), (6)

where

pn,k(q;x) =

[n + k − 1

k

]

q

qk2+1

2xk

(1 + x)n+kq

. (7)

2 Some Preliminary Results

In this section we give the following lemmas, which are need to prove our theorems:

Lemma 2.1. The following equalities hold:

Dn,q(1;x) = 1, (8)

Dn,q(t;x) = x−[q2[n− 1]q + [2]q(1 + x)n+1

q

]x

[n + 1]q(1 + x)n+1q

− q2[n− 1]q[n + 1]q[n]q

[1− 1 + [n + 1]qx

(1 + x)n+1q

](9)

.= x−An,q(x)−Bn,q(x), (10)

Dn,q(t2;x) = x2. (11)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1019 Qing-Bo Cai 1017-1026

Page 268: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Q. -B. CAI

Proof. Since

[n− 1]q∞∑

k=2

pn,k(q;x)∫ ∞/A

0pn+2,k−2(q; t)dqt

= [n− 1]q∞∑

k=2

pn,k(q;x)

[n + k − 1

k − 2

]

q

q(k−2)2+1

2

∫ ∞/A

0

tk−2

(1 + t)n+kq

dqt

= [n− 1]q∞∑

k=2

pn,k(q;x)

[n + k − 1

k − 2

]

q

qk2−4k+5

2Bq(k − 1;n + 1)

K(A; k − 1)

= [n− 1]q∞∑

k=2

pn,k(q;x)[n + k − 1]q!

[k − 2]q![n + 1]q!q

k2−4k+52

[k − 2]q![n]q!

[n + k − 1]q!q(k−1)(k−2)

2

=q2[n− 1]q[n + 1]q

∞∑

k=2

[n + k − 1

k

]

q

qk(k−1)

2xk

(1 + x)n+kq

.

by Euler’s identity (see [1], Chap. 10, Coroll. 10.2.2), it is clear that

∞∑

k=0

[n + k − 1

k

]

q

qk(k−1)

2xk

(1 + x)n+kq

= 1,

and using q2[n−1]q[n+1]q

= 1− [2]q[n+1]q

, we obtain

Dn,q(1;x)

=(

1− [2]q[n + 1]q

)(1− 1

(1 + x)nq

− [n]qx(1 + x)n+1

q

)+

q2[n− 1]q (1 + [n + 1]qx) [2]q(1 + x)n+1q

[n + 1]q(1 + x)n+1q

= 1.

Similarly, we have

Dn,q(t;x) = [n− 1]q∞∑

k=2

pn,k(q, x)∫ ∞/A

0pn+2,k−2(q, t)tdqt

= [n− 1]q∞∑

k=2

pn,k(q, x)

[n + k − 1

k − 2

]

q

qk2−4k+5

2

∫ ∞/A

0

tk−1

(1 + t)n+kq

dqt

= [n− 1]q∞∑

k=2

pn,k(q, x)

[n + k − 1

k − 2

]

q

qk2−4k+5

2Bq(k, n)K(A, k)

= [n− 1]q∞∑

k=2

pn,k(q, x)[n + k − 1]q!

[k − 2]q![n + 1]q!q

k2−4k+52

[k − 1]q![n− 1]q!

[n + k − 1]q!qk(k−1)

2

=∞∑

k=2

[n + k − 1]q![k]q![n− 1]q!

qk2−3k+6

2[k − 1]q[n− 1]q

[n + 1]q[n]qxk

(1 + x)n+kq

,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1020 Qing-Bo Cai 1017-1026

Page 269: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

DURRMEYER TYPE q-BASKAKOV OPERATORS WHICH PRESERVE x2

since [k − 1]q = [k]q − qk−1, we get

Dn,q(t; x) =∞∑

k=2

[n + k − 1]q![k]q![n− 1]q!

qk2−3k+6

2[k]q[n− 1]q[n + 1]q[n]q

xk

(1 + x)n+kq

−∞∑

k=2

[n + k − 1]q![k]q![n− 1]q!

qk2−3k+6

2qk−1[n− 1]q[n + 1]q[n]q

xk

(1 + x)n+kq

=q2[n− 1]qx

[n + 1]q

∞∑

k=2

[n + k

k

]

q

qk(k−1)

2xk

(1 + x)n+k+1q

− q2[n− 1]q[n + 1]q[n]q

∞∑

k=2

[n + k − 1

k

]

q

qk(k−1)

2xk

(1 + x)n+kq

=q2[n− 1]qx

[n + 1]q

[1− 1

(1 + x)n+1q

]− q2[n− 1]q

[n + 1]q[n]q

[1− 1 + [n + 1]qx

(1 + x)n+1q

]

= x−[q2[n− 1]q + [2]q(1 + x)n+1

q

]x

[n + 1]q(1 + x)n+1q

− q2[n− 1]q[n + 1]q[n]q

[1− 1 + [n + 1]qx

(1 + x)n+1q

].

Finally,

Dn,q(t2;x) = [n− 1]q∞∑

k=2

pn,k(q, x)∫ ∞/A

0pn+2,k−2(q, t)t2dqt

= [n− 1]q∞∑

k=2

pn,k(q, x)

[n + k − 1

k − 2

]

q

qk2−4k+5

2

∫ ∞/A

0

tk

(1 + t)n+kq

dqt

= [n− 1]q∞∑

k=2

pn,k(q, x)

[n + k − 1

k − 2

]

q

qk2−4k+5

2Bq(k + 1, n− 1)

K(A, k + 1)

= [n− 1]q∞∑

k=2

pn,k(q, x)[n + k − 1]q!

[k − 2]q![n + 1]q!q

k2−4k+52

[k]q![n− 2]q!

[n + k − 1]q!qk(k+1)

2

=∞∑

k=2

pn,k(q;x)q5−5k

2[k]q[k − 1]q[n]q[n + 1]q

=∞∑

k=2

[n + k − 1]q![k − 2]q![n + 1]q!

q(k−2)(k−3)

2xk

(1 + x)n+kq

=∞∑

k=2

[n + k − 1

k

]

q

qk(k−1)

2xk+2

(1 + x)n+k+2q

= x2,

We obtain the desired result.

Remark 2.2. Let n ∈ N and x ∈ [0,∞), then for every q ∈ (0, 1), by Lemma 2.1, we have

Dn,q(1 + t2;x) = 1 + x2. (12)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1021 Qing-Bo Cai 1017-1026

Page 270: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Q. -B. CAI

Lemma 2.3. For every q ∈ (0, 1) and x ∈ [0,∞), we have

Dn,q

((t− x)2;x

) ≤ 2x2

[[2]q

[n + 1]q+

q2[n− 1]q[n + 1]q(1 + x)n+1

q

]+

2q2[n− 1]qx[n + 1]q[n]q

.= βn,q(x). (13)

Proof. Since Dn,q

((t− x)2;x

)= Dn,q

(t2;x

)− 2xDn,q(t;x) + x2 and Lemma 2.1, We have

Dn,q

((t− x)2;x

)

= 2x2 − 2x

x−

[q2[n− 1]q + [2]q(1 + x)n+1

q

]x

[n + 1]q(1 + x)n+1q

− q2[n− 1]q[n + 1]q[n]q

[1− 1 + [n + 1]qx

(1 + x)n+1q

]

= 2x2

[[2]q

[n + 1]q+

q2[n− 1]q[n + 1]q(1 + x)n+1

q

]+

2q2[n− 1]qx[n + 1]q[n]q

[1− 1 + [n + 1]qx

(1 + x)n+1q

]

≤ 2x2

[[2]q

[n + 1]q+

q2[n− 1]q[n + 1]q(1 + x)n+1

q

]+

2q2[n− 1]qx[n + 1]q[n]q

.

Thus the result holds.

Remark 2.4. Let sequence q = qn satisfies qn ∈ (0, 1) and qn → 1 as n →∞, then forany fixed x ∈ [0,∞), by Lemma 2.3, we have

limn→∞Dn,qn

((t− x)2;x

)= 0. (14)

3 Local approximation

In this section we establish direct and local approximation theorems in connection withthe operators Dn,q(f ;x).We denote the space of all real valued continuous bounded functions f defined on theinterval [0,∞) by CB[0,∞). The norm || · || on the space CB[0,∞) is given by ||f || =sup |f(x)| : x ∈ [0,∞).Further let us consider Peetre’s K−functional:

K2(f ; δ) = infg∈W 2

||f − g||+ δ||g′′|| ,

where δ > 0 and W 2 = g ∈ CB[0,∞) : g′, g′′ ∈ CB[0,∞).For f ∈ CB[0,∞), the modulus of continuity of second order is defined by

ω2 (f ; δ) = sup0<h≤δ

supx∈[0,∞)

|f(x + 2h)− 2f(x + h) + f(x)|,

by [5, p.177] there exists an absolute constant C > 0 such that

K2(f ; δ) ≤ Cω2

(f ;√

δ)

, δ > 0. (15)

For f ∈ CB[0,∞), the modulus of continuity is defined by

ω(f ; δ) = sup0<h≤δ

supx∈[0,∞)

|f(x + h)− f(x)|.

Our first result is a direct local approximation theorem for the operators Dn,q(f ;x).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1022 Qing-Bo Cai 1017-1026

Page 271: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

DURRMEYER TYPE q-BASKAKOV OPERATORS WHICH PRESERVE x2

Theorem 3.1. For q ∈ (0, 1), x ∈ [0,∞), n ∈ N and f ∈ CB[0,∞), we have

|Dn,q(f, x)−f(x)| ≤ Cω2

(f ;

√βn,q(x) + (An,q(x) + Bn,q(x))2

)+ω (f ;An,q(x) + Bn,q(x)) ,

(16)where C is a positive constant, βn,q(x), An,q(x) and Bn,q(x) are defined in (13), (9) and(10).

Proof. For x ∈ (0,∞], we define the auxiliary operators Dn,q(f ;x)

Dn,q(f ;x) = Dn,q(f ;x)− f (x−An,q(x)−Bn,q(x)) + f(x), (17)

where, An,q(x) and Bn,q(x) are defined in (9) and (10). Obviously, we have

Dn,q(t− x;x) = 0. (18)

Let g ∈ W 2, by Taylor’s expansion, we have

g(t) = g(x) + g′(x)(t− x) +∫ t

x(t− u)g′′(u)du, x, t ∈ [0,∞).

Using (18), we get

Dn,q(g;x) = g(x) + Dn,q

(∫ t

x(t− u)g′′(u)du;x

),

hence, we have

∣∣Dn,q(g;x)− g(x)∣∣

=∣∣∣∣Dn,q

(∫ t

x(t− u)g′′(u)du;x

)∣∣∣∣ +

∣∣∣∣∣∫ x

x−An,q(x)−Bn,q(x)u− [x−An,q(x)−Bn,q(x)] g′′(u)du

∣∣∣∣∣

≤ Dn,q

(∣∣∣∣∫ t

x(t− u)|g′′(u)|du

∣∣∣∣ ;x)

+∫ x

x−An,q(x)−Bn,q(x)|u− [x−An,q(x)−Bn,q(x)]| g′′(u)|du

≤[βn,q(x) + (An,q(x) + Bn,q(x))2

]||g′′||,

where, βn,q(x), An,q(x) and Bn,q(x) are defined in (13), (9) and (10).On the other hand, using (17), (15) and Lemma 2.1, we have

∣∣∣Dn,q(f ;x)∣∣∣ ≤ |Dn,q(f ;x)|+ 2||f || ≤ ||f ||Dn,q(1;x) + 2||f || ≤ 3||f ||. (19)

Thus,

|Dn,q(f ;x)− f(x)|≤ |Dn,q(f − g;x)− (f − g)(x)|+ |Dn,q(g;x)− g(x)|+ |f (x−An,q(x)−Bn,q(x))− f(x)|≤ 4||f − g||+

βn,q(x) + [An,q(x) + Bn,q(x)]2

||g′′||+ |f (x−An,q(x)−Bn,q(x))− f(x)| .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1023 Qing-Bo Cai 1017-1026

Page 272: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Q. -B. CAI

Hence taking infimum on the right hand side over all g ∈ W 2, we get

|Dn,q(f ;x)− f(x)| ≤ 4K2

(f ;βn,q(x) + [An,q(x) + Bn,q(x)]2

)+ ω (f ;An,q(x) + Bn,q(x)) .

By (15), for every q ∈ (0, 1), we have

|Dn,q(f, x)−f(x)| ≤ Cω2

(f ;

√βn,q(x) + [An,q(x) + Bn,q(x)]2

)+ω (f ;An,q(x) + Bn,q(x)) ,

where, βn,q(x), An,q(x) and Bn,q(x) are defined in (13), (9) and (10). This completes theproof of Theorem 3.1.

4 Rate of convergence

Let Bx2 [0,∞) be the set of all functions f defined on [0,∞) satisfying the condition|f(x)| ≤ Mf (1+x2), where Mf is a constant depending only on f . We denote the subspaceof all continuous functions belonging to Bx2 [0,∞) by Cx2 [0,∞). Also, let C∗

x2 [0,∞) bethe subspace of all functions f ∈ Cx2 [0,∞), for which limx→∞

f(x)1+x2 is finite. The norm on

C∗x2 [0,∞) is ||f ||x2 = supx∈[0,∞)

|f(x)|1+x2 . We denote the usual modulus of continuity of f on

the closed interval [0, a], (a > 0) by

ωa(f, δ) = sup|t−x|≤δ

supx,t∈[0,a]

|f(t)− f(x)|.

Obviously, for function f ∈ Cx2 [0,∞), the modulus of continuity ωa(f, δ) tends to zero.

Theorem 4.1. Let f ∈ Cx2 [0,∞), q ∈ (0, 1) and ωa+1(f, δ) be the modulus of continuityon the finite interval [0, a + 1] ⊂ [0,∞), where a > 0. Then we have

||Dn,q(f)− f ||C[0,a] ≤ 6Mf (1 + a2)βn,q(a) + 2ωa+1

(f ;

√βn,q(a)

), (20)

where, βn,q(a) is defined in (13).

Proof. For x ∈ [0, a] and t > a + 1, we have

|f(t)− f(x)| ≤ Mf (2 + x2 + t2) ≤ Mf [2 + 3x2 + 2(t− x)2],

hence, we obtain|f(t)− f(x)| ≤ 6Mf (1 + a2)(t− x)2. (21)

For x ∈ [0, a] and t ≤ a + 1, we have

|f(t)− f(x)| ≤ ωa+1(f ; |t− x|) ≤(

1 +|t− x|

δ

)ωa+1(f ; δ), δ > 0. (22)

From (21) and (22), we get

|f(t)− f(x)| ≤ 6Mf (1 + a2)(t− x)2 +(

1 +|t− x|

δ

)ωa+1(f ; δ). (23)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1024 Qing-Bo Cai 1017-1026

Page 273: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

DURRMEYER TYPE q-BASKAKOV OPERATORS WHICH PRESERVE x2

For x ∈ [0, a] and t ≥ 0, by Schwarz’s inequality and Lemma 2.3, we have

|Dn,q(f ;x)− f(x)|≤ Dn,q(|f(t)− f(x)|;x)

≤ 6Mf (1 + a2)Dn,q((t− x)2;x) + ωa+1(f ; δ)(

1 +1δ

√Dn,q((t− x)2;x)

)

≤ 6Mf

(1 + a2

)βn,q(a) + ωa+1(f, δ)

(1 +

√βn,q(a)

),

where, βn,q(a) is defined in (13). By taking δ =√

βn,q(a), we get the assertion of Theorem4.1.

5 Weighted approximation

Now we will discuss the weighted approximation theorems.

Theorem 5.1. Let the sequence q = qn satisfies 0 < qn < 1 and qn → 1 as n →∞, forf ∈ C∗

x2 [0,∞), we havelim

n→∞ ||Dn,qn(f)− f ||x2 = 0. (24)

Proof. By using the Korovkin theorem in [7], we see that it is sufficient to verify thefollowing three conditions

limn→∞ ||Dn,qn(tv;x)− xv||x2 , v = 0, 1, 2. (25)

Since Dn,qn(1;x) = 1 and Dn,qn(t2;x) = x2, (24) holds true for v = 0 and v = 2.Finally, for v = 1, we have

||Dn,qn(t;x)− x||x2

= supx∈[0,∞)

|Dn,qn(t;x)− x|1 + x2

=

1− q2[n− 1]q[n + 1]q

[1− 1

(1 + x)n+1q

]sup

x∈[0,∞)

x

1 + x2

+q2[n− 1]q[n + 1]q[n]q

[1− 1 + [n + 1]qx

(1 + x)n+1q

]sup

x∈[0,∞)

x

1 + x2

≤ 1− q2[n− 1]q[n + 1]q

[1− 1

(1 + x)n+1q

]+

q2[n− 1]q[n + 1]q[n]q

,

since limn→∞ qn = 1, we get lim

n→∞qn

2[n− 1]qn

[n + 1]qn

= 1, limn→∞

1(1 + x)n+1

q= 0 and lim

n→∞q2n[n− 1]qn

[n + 1]qn [n]qn

= 0,

so the second condition of (25) holds for v = 1 as n →∞, then the proof of Theorem 5.1is completed.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1025 Qing-Bo Cai 1017-1026

Page 274: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Q. -B. CAI

Acknowledgement

This work is supported by the Educational Office of Fujian Province of China (Grant No.JA13269) and the Startup Project of Doctor Scientific Research of Quanzhou Normal University.

References

[1] G. E. Andrews, R. Askey, R. Roy, Special functions, Cambridge University Press, Cambridge,1999.

[2] A. Aral, V. Gupta, On the Durrmeyer type modification of the q-Baskakov type operators,Nonlinear Anal., 72 (2010), 1171-1180.

[3] Q. -B. Cai, X. -M. Zeng, Convergence of modification of the Durrmeyer type q-Baskakovoperators, Georgian Math. J., 19(1) (2012), 49-61.

[4] A. De Sole, V. G. Kac, On integral representation of q-gamma and q-beta functions, Atti.Accad. Naz. Lincei Cl. Sci. Fis. Mat. Natur. Rend. Lincei, (9)Mat.Appl., 16(1)(2005), 11-29.

[5] R. A. DeVore, G. G. Lorentz, Constructive Approximation, Springer, Berlin, 1993.

[6] A. D. Gadjiev, R. O. Efendiyev, E. Ibikli, On Korovkin type theorem in the space of locallyintegrable functions, Czechoslovak Math. J., 53(128)(No.1) (2003), 45-53.

[7] A. D. Gadjiev, Theorems of the type of P. P. Korovkin type theorems, Math. Zametki,20(5)(1976), 781-786, (English Translation, Math. Notes 20(5-6)(1976), 996-998).

[8] G. Gasper, M. Rahman, Basic Hypergeometric Series, Encyclopedia of Mathematics and itsapplications, Cambridge University press, Cambridge, UK., 35 1990.

[9] F. H. Jackson, On a q-definite integrals, Quart. J. of Pure Appl. Math., 41 (1910), 193-203.

[10] V. G. Kac, P. Cheung, Quantum Calculus, Universitext, Springer-Verlag, New York, 2002.

[11] T. H. Koornwinder,. q-Special functions, a tutorial, in: M. Gerstenhaber, J. Stasheff(Eds.),Deformation Theory and Quantum Gruoups with Applications to Mathemati al Physics, in:Contemp. Math., Amer. Math. Soc., 134 (1992).

[12] G. M. Phillips, Bernstein polynomials based on the q-integers, Ann. Numer. Math., 4 (1997),511-518.

[13] A. Il’inskii, Convergence of Generaized Bernstein Polynomials, J. Approx. Theory, 116 (2002),100-112.

[14] V. Gupta, A. Aral, Convergence of the q analogue of Szasz-Beta operators, Appl. Math.Comput. Sci., 216 (2010), 374-380.

[15] S. Ostrovska, q-Bernstein polynomials and their iterates, J. Approx. Theory, 123 (2003),232-255.

[16] H. Wang, Korovkin-type theorem and application, J. Approx. Theory, 132(2) (2005), 258-264.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1026 Qing-Bo Cai 1017-1026

Page 275: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Qualitative behavior of two systems of second-order rational

difference equations ∗

A. Q. Khan† M. N. Qureshi‡ Q. Din§

Abstract

In this paper, we study the qualitative behavior of two systems of second-order rational differenceequations. More precisely, we study the local asymptotic stability and instability of equilibriumpoints, global character of equilibrium points and rate of convergence of these systems. Somenumerical examples are given to verify our theoretical results.

Keywords and phrases: Rational difference equations, stability, global character, rate of conver-gence.

2010 AMS Mathematics subject classifications: 39A10, 40A05.

1 Introduction

Difference equations appear as natural descriptions of observed evolution phenomena because mostmeasurements of time evolving variables are discrete and as such these equations are in their own rightimportant mathematical models. More importantly, difference equations also appear in the study ofdiscretization methods for differential equations. Several results in the theory of difference equationshave been obtained as more or less natural discrete analogues of corresponding results of differentialequations. For basic theory and applications of difference equations, we refer interested readers to[1, 2, 3, 4, 5]. Moreover, in [9, 7, 8, 10, 11, 12], dynamics of some difference equations is given. InRefs. [16, 17, 18, 19, 20], qualitative behavior of some biological models is discussed. Recently therehas been a lot of interest in studying the global attractivity, boundedness character, periodicity andthe solution form of nonlinear difference equations. For some results in this area, for example:

Gibbons et al. [10] investigated the global asymptotic stability of the difference equation:

xn+1 =α+ βxn−1

γ + xn,

where β > 0 and α, γ ≥ 0.Bajo and Liz [11] investigated the global behavior of difference equation:

xn+1 =xn−1

a+ bxn−1xn,

for all values of real parameters a, b.

∗This work was supported by HEC of Pakistan†Department of Mathematics, University of Azad Jammu and Kashmir, Muzaffarabad, Pakistan, e-mail: ab-

[email protected]‡Department of Mathematics, University of Azad Jammu and Kashmir, Muzaffarabad, Pakistan, e-mail:

[email protected]§Department of Mathematics, University of Azad Jammu and Kashmir, Muzaffarabad, Pakistan, e-mail: qa-

[email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1027 A. Q. Khan et al 1027-1041

Page 276: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

To be motivated by the above studies, our aim in this paper is to investigate the qualitativebehavior of following two systems of second-order rational difference equations

xn+1 =αxn−1

β + γynyn−1, yn+1 =

α1yn−1

β1 + γ1xnxn−1, n = 0, 1, · · · , (1)

where the parameters α, β, γ, α1, β1, γ1 and initial conditions x0, x−1, y0, y−1 are positive realnumbers, and

xn+1 =ayn−1

b+ cxnxn−1, yn+1 =

a1xn−1

b1 + c1ynyn−1, n = 0, 1, · · · , (2)

where the parameters a, b, c, a1, b1, c1 and initial conditions x0, x−1, y0, y−1, are positive realnumbers.

Let us consider four-dimensional discrete dynamical system of the form

xn+1 = f(xn, xn−1, yn, yn−1), (3)

yn+1 = g(xn, xn−1, yn, yn−1), n = 0, 1, · · · ,

where f : I2 × J2 → I and g : I2 × J2 → J are continuously differentiable functions and I, J aresome intervals of real numbers. Furthermore, a solution (xn, yn)∞n=−1 of system (3) is uniquelydetermined by initial conditions (xi, yi) ∈ I × J for i ∈ −1, 0. Along with system (3) we considerthe corresponding vector map F = (f, xn, xn−1, g, yn, yn−1). An equilibrium point of (3) is a point(x, y) that satisfies

x = f(x, x, y, y, )

y = g(x, x, y, y)

The point (x, y) is also called a fixed point of the vector map F .

Definition 1. Let (x, y) be an equilibrium point of the system (3).(i) An equilibrium point (x, y) is said to be stable if for every ε > 0 there exists δ > 0 such that for

every initial condition (xi, yi), i ∈ −1, 0 ‖0∑

i=−1

(xi, yi) − (x, y)‖ < δ implies ‖(xn, yn) − (x, y)‖ < ε

for all n > 0, where ‖.‖ is the usual Euclidian norm in R2.(ii) An equilibrium point (x, y) is said to be unstable if it is not stable.(iii) An equilibrium point (x, y) is said to be asymptotically stable if there exists η > 0 such that

‖0∑

i=−1

(xi, yi)− (x, y)‖ < η and (xn, yn)→ (x, y) as n→∞.

(iv) An equilibrium point (x, y) is called global attractor if (xn, yn)→ (x, y) as n→∞.(v) An equilibrium point (x, y) is called asymptotic global attractor if it is a global attractor and

stable.

Definition 2. Let (x, y) be an equilibrium point of the map

F = (f, xn, xn−1, g, yn, yn−1) ,

where f and g are continuously differentiable functions at (x, y). The linearized system of (3) aboutthe equilibrium point (x, y) is

Xn+1 = F (Xn) = FJXn,

where Xn =

xnxn−1

ynyn−1

and FJ is the Jacobian matrix of the system (3) about the equilibrium point

(x, y).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1028 A. Q. Khan et al 1027-1041

Page 277: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Lemma 1. [3] For the system Xn+1 = F (Xn), n = 0, 1, · · · of difference equations such let X be afixed point of F . If all eigenvalues of the Jacobian matrix JF about X lie inside an open unit disk|λ| < 1, then X is locally asymptotically stable. If one of them has norm greater than one, then X isunstable.

Lemma 2. [4] Assume that Xn+1 = F (Xn), n = 0, 1, · · · is a system of difference equations and X isthe equilibrium point of this system. The characteristic polynomial of this system about the equilibriumpoint X is P (λ) = a0λ

n + a1λn−1 + · · ·+ an−1λ+ an = 0, with real coefficients and a0 > 0. Then all

roots of the polynomial P (λ) lies inside the open unit disk |λ| if and only if ∆k > 0 for k = 0, 1, · · · ,where ∆k is the principal minor of order k of the n× n matrix

∆n =

a1 a3 a5 . . . 0a0 a2 a4 . . . 00 a1 a3 . . . 0...

.... . .

...0 0 0 . . . an

. (4)

The following result gives the rate of convergence of solution of a system of difference equations

Xn+1 = (A+B(n))Xn, (5)

where Xn is an m-dimensional vector, A ∈ Cm×m is a constant matrix, and B : Z+ → Cm×m is amatrix function satisfying

‖B(n)‖ → 0 (6)

as n→∞ ,where ‖ · ‖ denotes any matrix norm which is associated with the vector norm

‖(x, y)‖ =√x2 + y2

Proposition 1. (Perron’s Theorem)[13] Suppose that condition (6) holds. If Xn is a solution of (5), then either Xn = 0 for all large n or

ρ = limn→∞

(‖Xn‖)1/n (7)

exists and is equal to the modulus of one the eigenvalues of matrix A.

Proposition 2. [13] Suppose that condition (6) holds . If Xn is a solution of (5) , then either Xn = 0for all large n or

ρ = limn→∞

‖Xn+1‖‖Xn‖

(8)

exists and is equal to the modulus of one of the eigenvalues of matrix A.

2 On the system xn+1 =αxn−1

β+γynyn−1, yn+1 =

α1yn−1

β1+γ1xnxn−1

In this section, we shall investigate the qualitative behavior of the system (1). Let (x, y) be anequilibrium point of system (1), then for α > β and α1 > β1 system (1) has following two equilibrium

points P0 = (0, 0), P1 =(√

α1−β1γ1

,√

α−βγ

).

To construct corresponding linearized form of the system (1) we consider the following transfor-mation:

(xn, xn−1, yn, yn−1) 7→ (f, f1, g, g1), (9)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1029 A. Q. Khan et al 1027-1041

Page 278: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

where f = αxn−1

β+γynyn−1, f1 = xn, g = α1yn−1

β1+γ1xnxn−1, g1 = yn. The Jacobian matrix about the fixed point

(x, y) under the transformation (12) is given by

FJ(x, y) =

0 αβ+γy2 − αγxy(

β+γy2)2 − αγxy(

β+γy2)2

1 0 0 0

− α1γ1xy(β1+γ1x

2)2 − α1γ1xy(

β1+γ1x2)2 0

α1β1+γ1x

2

0 0 1 0

Theorem 1. Let α < β and α1 < β1, then every solution (xn, yn) of the system (1) is bounded.

Proof. It is easy to verify that

0 ≤ xn ≤(α

β

)m+1

x−1, if n = 2m+ 1,

0 ≤ xn ≤(α

β

)m+1

x0, if n = 2m+ 2,

0 ≤ yn ≤(α1

β1

)m+1

y−1, if n = 2m+ 1,

0 ≤ yn ≤(α1

β1

)m+1

y0, if n = 2m+ 2,

Taking δ1 = maxx−1, x0 and δ2 = maxy−1, y0. Then, 0 ≤ xn < δ1 and 0 ≤ yn < δ2 for alln = 0, 1, 2, · · · .

Theorem 2. For the equilibrium point P0 of the system (1) following results hold(i) If α < β and α1 < β1, then equilibrium point P0 is locally asymptotically stable.(ii) If α > β or α1 > β1, then equilibrium point P0 is unstable.

Proof. (i) The linearized system of (1) about the equilibrium point (0, 0) is given by

Xn+1 = FJ(0, 0)Xn,

where Xn =

xnxn−1

ynyn−1

, and FJ(0, 0) =

0 α

β 0 0

1 0 0 00 0 0 α1

β10 0 1 0

.

The characteristic polynomial of FJ(0, 0) is given by

P (λ) = λ4 − (α

β+α1

β1)λ2 +

αα1

ββ1. (10)

The roots of P (λ) are λ = ±√

αβ , λ = ±

√α1β1

. Since all eigenvalues of Jacobian matrix FJ(0, 0) about

(0, 0) lie in open unit dick |λ| < 1. Hence, the equilibrium point (0, 0) is locally asymptotically stable.(ii) It is easy to see that if α > β or α1 > β1, then there exists at least one root λ of Equation

(??) such that |λ| > 1. Hence, by Lemma 1 if α > β or α1 > β1, then (0, 0) is unstable.

Theorem 3. If α > β and α1 > β1, then positive equilibrium point

(x, y) =

(√α1 − β1

γ1,

√α− βγ

)

of the system (1) is unstable.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1030 A. Q. Khan et al 1027-1041

Page 279: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Proof. The linearized system of (1) about the equilibrium point P1 is given by

Xn+1 = FJ(P1)Xn,

where Xn =

xnxn−1

ynyn−1

and FJ(P1) =

0 1 A A1 0 0 0B B 0 10 0 1 0

.

The characteristic polynomial of FJ(P1) is given by

P (λ) = λ4 − (2 +AB)λ2 − 2ABλ+ 1−AB, (11)

where A = − 1α

√γ(α−β)(α1−β1)

γ1and B = − 1

α1

√γ1(α−β)(α1−β1)

γ . It is clear that not all of ∆k > 0 for

k = 1, 2, 3, 4. Hence by Lemma 2, the positive equilibrium point

(x, y) =

(√α1 − β1

γ1,

√α− βγ

)

is locally unstable.

Theorem 4. Let α < β and α1 < β1, then the equilibrium point P0 = (0, 0) of Equation (1) is globallyasymptotically stable.

Proof. For α < β and α1 < β1, from Theorem 2 (0, 0) is locally asymptotically stable. From Theorem1, every positive solution (xn, yn) of the system (1) is bounded. Now, it is sufficient to prove that(xn, yn) is decreasing. From system (1) one has

xn+1 =αxn−1

β + γynyn−1

≤ αxn−1

β< xn−1.

This implies that x2n+1 < x2n−1 and x2n+3 < x2n+1. Hence, the subsequences x2n+1, x2n+2 aredecreasing, i.e., the sequence xn is decreasing. Similarly, one has

yn+1 =α1yn−1

β1 + γ1xnxn−1

≤ α1yn−1

β1< yn−1.

This implies that y2n+1 < y2n−1 and y2n+3 < y2n+1. Hence, the subsequences y2n+1, y2n+2 aredecreasing, i.e., the sequence yn is decreasing. Hence, lim

n→∞xn = lim

n→∞yn = 0.

2.1 Rate of Convergence

We investigate the rate of convergence of a solution that converges to the equilibrium point P0 of thesystem (1).

Let (xn, yn) be any solution of the system (1) such that limn→∞

xn = x, and limn→∞

yn = y. To find

the error terms, one has from the system (1)

xn+1 − x =1∑i=0

Ai (xn−i − x) +1∑i=0

Bi (yn−i − y) ,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1031 A. Q. Khan et al 1027-1041

Page 280: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

yn+1 − y =1∑i=0

Ci (xn−i − x) +1∑i=0

Di (yn−i − y) .

Set e1n = xn − x and e2

n = yn − y, one has

e1n+1 =

1∑i=0

Aie1n−i +

1∑i=0

Bie2n−i,

e2n+1 =

1∑i=0

Cie1n−i +

1∑i=0

Die2n−i.

where A0 = 0, A1 = αβ+γynyn−1

, B0 = − αγxyn−1

(β+γynyn−1)(β+γy2), B1 = − αγxy

(β+γynyn−1)(β+γy2),

C0 = − α1γ1yxn−1

(β1+γ1xnxn−1)(β1+γ1x2), C1 = − α1γ1xy

(β1+γ1xnxn−1)(β1+γ1x2), D0 = 0, D1 = α1

β1+γ1xnxn−1.

Taking the limits, we obtain limn→∞

A0 = 0, limn→∞

A1 =α

β + γy2, limn→∞

B0 = limn→∞

B1 = − αγxy

(β + γy2)2 ,

limn→∞

C0 = limn→∞

C1 = − α1γ1xy

(β1 + γ1x2)2 , limn→∞

D0 = 0, limn→∞

D1 =α1

β1 + γ1x2. So, the limiting system of

error terms can be written asEn+1 = KEn,

where En =

e1n

e1n−1

e2n

e2n−1

and

K =

0 α

β+γy2− αγxy

(β+γy2)2− αγxy

(β+γy2)2

1 0 0 0− α1γ1xy

(β1+γ1x2)2− α1γ1xy

(β1+γ1x2)20 α1

β1+γ1x2

0 0 1 0

,

which is similar to linearized system of (2) about the equilibrium point (x, y).Using proposition (1), one has following result.

Theorem 5. Assume that (xn, yn) be a positive solution of the system (1) such that limn→∞

xn = x,

and limn→∞

yn = y, where (x, y) = (0, 0). Then, the error vector En of every solution of (1) satisfies

both of the following asymptotic relations

limn→∞

(‖En‖)1n = |λFJ(x, y)|, lim

n→∞

‖En+1‖‖En‖

= |λFJ(x, y)|,

where λFJ(x, y) are the characteristic roots of the Jacobian matrix FJ(x, y) about (0, 0).

3 On the system xn+1 =ayn−1

b+cxnxn−1, yn+1 =

a1xn−1

b1+c1ynyn−1

In this section, we shall investigate the qualitative behavior of the system (2). Let (x, y) be anequilibrium point of the system (2), then system (2) has a unique equilibrium point (0, 0). To constructcorresponding linearized form of the system (2) we consider the following transformation:

(xn, xn−1, yn, yn−1) 7→ (f, f1, g, g1), (12)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1032 A. Q. Khan et al 1027-1041

Page 281: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

where f = ayn−1

b+cxnxn−1, f1 = xn, g = a1xn−1

b1+ c1ynyn−1, g1 = yn. The Jacobian matrix about the fixed point

(x, y) under the transformation (12) is given by

FJ(x, y) =

( − acxy

(b+cx2)2− acxy

(b+cx2)20 a

b+cx2

1 0 0 0

0a1

b1+ c1y2 − a1 c1xy

( b1+ c1y2)2

− a1 c1xy

( b1+ c1y2)2

0 0 1 0

)

Theorem 6. Let (xn, yn) be positive solution of system (2), then for every m ≥ 1 the followingresults hold.

(i) 0 ≤ xn ≤

(ab

)m+1(

a1b1

)my−1, if n = 4m+ 1,

(ab

)m+1(

a1b1

)my0, if n = 4m+ 2,(

ab

)m+1(

a1b1

)mx−1, if n = 4m+ 3,(

ab

)m+1(

a1b1

)my0, if n = 4m+ 4.

(ii) 0 ≤ yn ≤

(ab

)m ( a1b1

)m+1x−1, if n = 4m+ 1,

(ab

)m ( a1b1

)m+1x0, if n = 4m+ 2,(

ab

)m ( a1b1

)m+1y−1, if n = 4m+ 3,(

ab

)m ( a1b1

)m+1y0, if n = 4m+ 4.

Theorem 7. For the equilibrium point P0 of the system (2) following results hold(i) If a < b and a1 < b1, then equilibrium point P0 is locally asymptotically stable.(ii) If a > b or a1 > b1, then equilibrium point P0 is unstable.

Proof. (i) The linearized system of (2) about the equilibrium point (0, 0) is given by

Xn+1 = FJ(0, 0)Xn,

where Xn =

xnxn−1

ynyn−1

, and FJ(0, 0) =

0 0 0 a

b1 0 0 00 a1

b10 0

0 0 1 0

.

The characteristic polynomial of FJ(0, 0) is given by

P (λ) = λ4 − aa1

bb1. (13)

The roots of P (λ) are λ = ±(aa1bb1)14 , λ = ±ι(aa1bb1

)14 . Since all eigenvalues of Jacobian matrix FJ(0, 0)

about (0, 0) lie in open unit dick |λ| < 1. Hence, the equilibrium point (0, 0) is locally asymptoticallystable.

(ii) It is easy to see that if a > b or a1 > b1, then there exists at least one root λ of Equation(??) such that |λ| > 1. Hence, by Lemma 1 if a > b or a1 > b1, then (0, 0) is unstable.

Theorem 8. Let a < b and a1 < b1, then the equilibrium point P0 = (0, 0) of Equation (2) isglobally asymptotically stable.

Proof. For a < b and a1 < b1, from Theorem 7 (0, 0) is locally asymptotically stable. From Theorem6, it is easy to show that every positive solution (xn, yn) of the system (2) is bounded. Now, it is

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1033 A. Q. Khan et al 1027-1041

Page 282: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

sufficient to prove that (xn, yn) is decreasing. From system (2) one has

xn+1 =ayn−1

b+ cxnxn−1,

≤ ayn−1

b< yn−1.

This implies that x4n+1 < y4n−1 and x4n+5 < y4n+3. Also

yn+1 =a1xn−1

b1 + c1ynyn−1,

≤ axn−1

b< xn−1.

This implies that y4n+1 < x4n−1 and y4n+5 < x4n+3. so x4n+5 < y4n+3 < x4n+1 and y4n+5 < x4n+3 <y4n+1. Hence, the subsequences

x4n+1, x4n+2, x4n+3, x4n+4

andy4n+1, y4n+2, y4n+3, y4n+4

are decreasing. Therefore the sequences xn and yn are decreasing. Hence, limn→∞

xn = limn→∞

yn =

0.

3.1 Rate of Convergence

We investigate the rate of convergence of a solution that converges to the equilibrium point P0 of thesystem (2).

Let (xn, yn) be any solution of the system (2) such that limn→∞

xn = x, and limn→∞

yn = y. To find

the error terms, one has from the system (2)

xn+1 − x =

1∑i=0

Ai (xn−i − x) +

1∑i=0

Bi (yn−i − y) ,

yn+1 − y =

1∑i=0

Ci (xn−i − x) +

1∑i=0

Di (yn−i − y) .

Set e1n = xn − x and e2

n = yn − y, one has

e1n+1 =

1∑i=0

Aie1n−i +

1∑i=0

Bie2n−i,

e2n+1 =

1∑i=0

Cie1n−i +

1∑i=0

Die2n−i.

where A0 = − acxn−1y(b+cxnxn−1)(b+cx2)

, A1 = − acxy(b+cxnxn−1)(b+cx2)

, B0 = 0, B1 = ab+cxnxn−1

, C0 = 0, C1 =a1

b1+ c1ynyn−1, D0 = − a1 c1xyn−1

( b1+ c1ynyn−1)( b1+ c1y2), D1 = − a1 c1xy

( b1+ c1ynyn−1)( b1+ c1y2).

Taking the limits, we obtain limn→∞

A0 = limn→∞

A1 = − acxy

(b+ cx2)2, limn→∞

B0 = 0, limn→∞

B1 =a

b+ cx2,

limn→∞

C0 = 0, limn→∞

C1 =a1

b1 + c1y2, limn→∞

D0 = limn→∞

D1 = − a1 c1xy

( b1 + c1y2)2. So, the limiting system of

error terms can be written asGn+1 = MGn,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1034 A. Q. Khan et al 1027-1041

Page 283: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

where Gn =

e1n

e1n−1

e2n

e2n−1

and

M =

− acxy

(b+cx2)2− acxy

(b+cx2)20 a

b+cx2

1 0 0 00 a1

b1+ c1y2− a1 c1xy

( b1+ c1y2)2− a1 c1xy

( b1+ c1y2)2

0 0 1 0

,

which is similar to linearized system of (2) about the equilibrium point (x, y).Using proposition (1), one has following result.

Theorem 9. Assume that (xn, yn) be a positive solution of the system (1) such that limn→∞

xn = x,

and limn→∞

yn = y, where (x, y) = (0, 0). Then, the error vector En of every solution of (1) satisfies

both of the following asymptotic relations

limn→∞

(‖En‖)1n = |λFJ(x, y)|, lim

n→∞

‖En+1‖‖En‖

= |λFJ(x, y)|,

where λFJ(x, y) are the characteristic roots of the Jacobian matrix FJ(x, y) about (0, 0).

4 Examples

In order to verify our theoretical results and to support our theoretical discussions, we consider severalinteresting numerical examples in this section. These examples represent different types of qualitativebehavior of solutions to the systems of nonlinear difference equations (1) and (2). All plots in thissection are drawn with mathematica.

Example 1. Consider the system (1) with initial conditions x−1 = 1.2, x0 = 2.9, y−1 = 1.7, y0 = 1.8.Moreover, choosing the parameters α = 15.5, β = 16, γ = 0.008, α1 = 18, β1 = 19, γ1 = 0.002.Then, the system (1) can be written as:

xn+1 =15.5xn−1

16 + 0.008ynyn−1, yn+1 =

18yn−1

19 + 0.002xnxn−1, n = 0, 1, · · · , (14)

and with initial conditions x−1 = 1.2, x0 = 2.9, y−1 = 1.7, y0 = 1.8.Moreover, in Fig. 1 the plot of xn is shown in Fig. 1a, the plot of yn is shown in Fig. 1b and an

attractor of the system (14) is shown in Fig. 1c.

Example 2. Consider the system (1) with initial conditions x−1 = 1.2, x0 = 3.2, y−1 = 1.7, y0 = 0.8.Moreover, choosing the parameters α = 55, β = 60, γ = 1.4, α1 = 17, β1 = 19, γ1 = 0.3. Then, thesystem (1) can be written as:

xn+1 =55xn−1

60 + 1.4ynyn−1, yn+1 =

17yn−1

19 + 0.3xnxn−1, n = 0, 1, · · · , (15)

and with initial conditions x−1 = 1.2, x0 = 3.2, y−1 = 1.7, y0 = 0.8.Moreover, in Fig. 2 the plot of xn is shown in Fig. 2a, the plot of yn is shown in Fig. 2b and an

attractor of the system (15) is shown in Fig. 2c.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1035 A. Q. Khan et al 1027-1041

Page 284: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

(a) Plot of xn for the system (14) (b) Plot of yn for the system (14)

(c) An attractor of the system (14)

Figure 1: Plots for the system (14)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1036 A. Q. Khan et al 1027-1041

Page 285: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

(a) Plot of xn for the system (15) (b) Plot of yn for the system (15)

(c) An attractor of the system (15)

Figure 2: Plots for the system (15)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1037 A. Q. Khan et al 1027-1041

Page 286: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Example 3. Consider the system (2) with initial conditions x−1 = 1.1, x0 = 1.2, y−1 = 2.7, y0 = 1.8.Moreover, choosing the parameters a = 128, b = 129, c = 3, a1 = 115, b1 = 119, c1 = 2. Then,the system (2) can be written as:

xn+1 =128yn−1

129 + 3xnxn−1, yn+1 =

115xn−1

119 + 2ynyn−1, n = 0, 1, · · · , (16)

and with initial conditions x−1 = 1.1, x0 = 1.2, y−1 = 2.7, y0 = 1.8.Moreover, in Fig. 3 the plot of xn is shown in Fig. 3a, the plot of yn is shown in Fig. 3b and an

attractor of the system (16) is shown in Fig. 3c.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1038 A. Q. Khan et al 1027-1041

Page 287: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

(a) Plot of xn for the system (16) (b) Plot of yn for the system (16)

(c) An attractor of the system (16)

Figure 3: Plots for the system (16)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1039 A. Q. Khan et al 1027-1041

Page 288: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

ConclusionIn the paper, we have investigated the qualitative behavior of two four-dimensional discrete dy-

namical systems. Each system has only one equilibrium point which is stable under some restrictionto parameters. The most important finding here is that the unique equilibrium point (0, 0) can bea global asymptotic attractor for the systems (1) and (2). Moreover, we have determined the rateof convergence of a solution that converges to the equilibrium point (0, 0) of the systems (1) and(2). Some numerical examples are provided to support our theoretical results. These examples areexperimental verifications of theoretical discussions.

Acknowledgements

This work was supported by the Higher Education Commission of Pakistan.

References

[1] R. P. Agarwal, Difference Equations and Inequalities: Second Edition, Revised and Expended,Marcel Dekker, New York, (2000), pp. 980.

[2] E. A. Grove, G. Ladas, Periodicities in Nonlinear Difference Equations, Chapman and Hall/CRCPress, Boca Raton, (2004).

[3] H. Sedaghat, Nonlinear difference equations: Theory with applications to social science models,Kluwer Academic Publishers, Dordrecht, (2003).

[4] V. L. Kocic, G. Ladas, Global Behavior of Nonlinear Difference Equations of Higher Order withApplications, Kluwer Academic, Dordrecht, (1993).

[5] E. Camouzis, G. Ladas, Dynamics of third-order rational Difference Equations: With OpenProblems and Conjectures, Chapman and Hall/HRC, Boca Raton, (2007).

[6] M. Aloqeili, Dynamics of a rational difference equation, Appl. Math. Comput., 176(2)(2006),768–774.

[7] A. M. Amleh, V. Kirk, G. Ladas, On the dynamics of xn+1 = a+bxn−1

A+Bxn−2, Math. Sci. Res. Hot-Line,

5(2001), 1–15.

[8] V. L. Kocic, G. Ladas, Global attractivity in a second order nonlinear difference equations, J.Math. Anal. Appl., 180(1993), 144–150.

[9] M. R. S. Kulenovic, G. Ladas, N.P. Prokup, A rational difference equation, Comput. Math.Appl., 41(2001), 671–678.

[10] C. H. Gibbons, M. R. S. Kulenovic, G. Ladas, On the recurrance sequence xn+1 = α+βxn−1

γ+xn,

Math. Sci. Res. Hot-Line, 4(2)(2000), 1–11.

[11] I. Bajo, E. Liz, Global behaviour of a second-order nonlinear difference equation, J. Diff. Eq.Appl., 17(10)(2011), 1471–1486.

[12] Q. Din, Global behavior of a rational difference equation, Acta Universitatis Apulensis, 30(2012),35–49.

[13] M. Pituk, More on Poincare’s and Perron’s theorems for difference equations, J. Diff. Eq. Appl.,8(2002), 201–216.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1040 A. Q. Khan et al 1027-1041

Page 289: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

[14] Q. Zhang, L. Yang, J. Liu, Dynamics of a system of rational third order difference equation, Ad.Diff. Eq., doi:10.1186/1687-1847-2012-136.

[15] M. Shojaei, R. Saadati, H. Adibi, Stability and periodic character of a rational third orderdifference equation, Chaos Soliton Fract., 39(2009), 1203–1209.

[16] Q. Din, Dynamics of a discrete Lotka-Volterra model, Ad. Diff. Eq., 1(2013), 1–13.

[17] Q. Din, T. Donchev, Global character of a host-parasite model, Chaos Soliton Fract., 54(2013),1–7.

[18] Q. Din, A. Q. Khan, M. N. Qureshi, Qualitative behavior of a host-pathogen model, Ad. Diff.Eq., 1(2013), 263.

[19] Q. Din, Global behavior of a population model, Chaos Soliton Fract., 59(2014), 119–128.

[20] M. N. Qureshi, A. Q. Khan, Q. Din, Asymptotic behavior of a Nicholson-Bailey model, Ad. Diff.Eq., in press.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1041 A. Q. Khan et al 1027-1041

Page 290: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Strong differential subordination results using a generalized Salageanoperator and Ruscheweyh operator

Andrei LorianaDepartment of Mathematics and Computer Science, University of Oradea

1 Universitatii street, 410087 Oradea, [email protected]

Abstract

In the present paper we study the operator using the extended generalized Salagean operator and ex-tended Ruscheweyh operator, denote by DRmλ f(z, ζ), the Hadamard product of the extended generalizedSalagean operator Dm

λ f(z, ζ) and extended Ruscheweyh operator Rmf(z, ζ), given by DRmλ f(z, ζ) : A∗ζ → A∗ζ ,

DRmλ f(z, ζ) = (Dmλ ∗Rm) f(z, ζ) and A∗nζ = f ∈ H(U×U) : f(z, ζ) = z+an+1(ζ)zn+1+ . . . , z ∈ U, ζ ∈ U is

the class of normalized analytic functions with A∗1ζ = A∗ζ . We obtain several strong differential subordinationsregarding the operator DRmλ f(z, ζ).

Keywords: strong differential subordination, univalent function, convex function, differential operator, bestdominant, extended generalized Salagean operator, extended Ruscheweyh operator, convolution product2000 Mathematical Subject Classification: 30C45, 30A20, 34A40.

1 IntroductionDenote by U the unit disc of the complex plane U = z ∈ C : |z| < 1, U = z ∈ C : |z| ≤ 1 the closed unit

disc of the complex plane and H(U × U) the class of analytic functions in U × U .Let A∗nζ = f ∈ H(U ×U), f(z, ζ) = z + an+1 (ζ) zn+1 + . . . , z ∈ U, ζ ∈ U, with A∗1ζ = A∗ζ , where ak (ζ) are

holomorphic functions in U for k ≥ 2, and H∗[a, n, ζ] = f ∈ H(U ×U), f(z, ζ) = a+ an (ζ) zn + an+1 (ζ) zn+1 +. . . , z ∈ U, ζ ∈ U, for a ∈ C and n ∈ N, ak (ζ) are holomorphic functions in U for k ≥ n.

Definition 1.1 ([2]) For f ∈ A∗ζ, λ ≥ 0 and m ∈ N, the extended generalized Salagean operator Dmλ is defined by

Dmλ : A∗ζ → A∗ζ,

D0λf (z, ζ) = f (z, ζ)

D1λf (z, ζ) = (1− λ) f (z, ζ) + λzf 0z(z, ζ) = Dλf (z, ζ) , ...

Dm+1λ f(z, ζ) = (1− λ)Dm

λ f (z, ζ) + λz (Dmλ f (z, ζ))

0z = Dλ (D

mλ f (z, ζ)) , z ∈ U, ζ ∈ U.

Remark 1.1 ([2]) If f ∈ A∗ζ and f(z, ζ) = z+P∞

j=2 aj (ζ) zj, then Dm

λ f (z, ζ) = z+P∞

j=2 [1 + (j − 1)λ]maj (ζ) z

j,for z ∈ U, ζ ∈ U .

Definition 1.2 ([1]) For f ∈ A∗ζ, m ∈ N, the extended Ruscheweyh derivative Rm is defined by Rm : A∗ζ → A∗ζ,

R0f (z, ζ) = f (z, ζ)

R1f (z, ζ) = zf 0z (z, ζ) , ...

(m+ 1)Rm+1f (z, ζ) = z (Rmf (z, ζ))0z +mR

mf (z, ζ) , z ∈ U, ζ ∈ U.

Remark 1.2 ([1]) If f ∈ A∗ζ , f(z, ζ) = z +P∞j=2 aj (ζ) z

j, then Rmf (z, ζ) = z +P∞j=2

(m+j−1)!m!(j−1)! aj (ζ) z

j, z ∈ U,ζ ∈ U.

Definition 1.3 ([3]) Let λ ≥ 0, m ∈ N. Denote by DRmλ the extended operator given by DRmλ : A∗ζ → A∗ζ ,DRmλ f(z, ζ) = (D

mλ ∗Rm) f(z, ζ), z ∈ U, ζ ∈ U.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1042 Andrei Loriana 1042-1048

Page 291: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Remark 1.3 ([3]) If f ∈ A∗ζ , f(z, ζ) = z +P∞

j=2 a2j (ζ) z

j, then

DRmλ f(z, ζ) = z+P∞j=2

n[1 + (j − 1)λ]m (m+j−1)!

m!(j−1)!

oa2j (ζ) z

j , z ∈ U, ζ ∈ U.This operator was studied also in [4] and [9].

Remark 1.4 For λ = 1 we obtain the Hadamard product of the Salagean operator and Ruscheweyh operator,which was studied in [5], [6], [7], [8].

Generalizing the notion of differential subordinations, J.A. Antonino and S. Romaguera have introduced in [12]the notion of strong differential subordinations, which was developed by G.I. Oros and Gh. Oros in [13].

Definition 1.4 ([13]) Let f (z, ζ), H (z, ζ) analytic in U×U. The function f (z, ζ) is said to be strongly subordinateto H (z, ζ) if there exists a function w analytic in U , with w (0) = 0 and |w (z)| < 1 such that f (z, ζ) = H (w (z) , ζ)for all ζ ∈ U . In such a case we write f (z, ζ) ≺≺ H (z, ζ) , z ∈ U, ζ ∈ U.

Remark 1.5 ([13]) (i) Since f (z, ζ) is analytic in U × U , for all ζ ∈ U, and univalent in U, for all ζ ∈ U ,Definition 1.4 is equivalent to f (0, ζ) = H (0, ζ) , for all ζ ∈ U, and f

¡U × U

¢⊂ H

¡U × U

¢.

(ii) If H (z, ζ) ≡ H (z) and f (z, ζ) ≡ f (z) , the strong subordination becomes the usual notion of subordination.

We have need the following lemmas to study the strong differential subordinations.

Lemma 1.1 ([1]) Let g (z, ζ) be a convex function in U ×U , for all ζ ∈ U, and let h(z, ζ) = g(z, ζ)+nαzg0z(z, ζ),z ∈ U, ζ ∈ U, where α > 0 and n is a positive integer. If p(z, ζ) = g(0, ζ) + pn (ζ) zn + pn+1 (ζ) zn+1 + . . . , z ∈ U,ζ ∈ U, is holomorphic in U × U and p(z, ζ) + αzp0z(z, ζ) ≺≺ h(z, ζ), z ∈ U, ζ ∈ U, then p(z, ζ) ≺≺ g(z, ζ), z ∈ U,ζ ∈ U, and this result is sharp.

Lemma 1.2 ([1]) Let h (z, ζ) be a convex function with h (0, ζ) = a for every ζ ∈ U and let γ ∈ C∗ be acomplex number with Reγ ≥ 0. If p ∈ H∗[a, n, ζ] and p (z, ζ) + 1

γ zp0z (z, ζ) ≺≺ h (z, ζ) , z ∈ U, ζ ∈ U, then

p (z, ζ) ≺≺ g (z, ζ) ≺≺ h (z, ζ) , z ∈ U, ζ ∈ U, where g (z, ζ) = γ

nzγn

R z0h (t, ζ) t

γn−1dt is convex and it is the best

dominant.

2 Main resultsExtending the results obtained in [10] and [11] to the class A∗ζ , we obtain the following theorems:

Theorem 2.1 Let g (z, ζ) be a convex function, g(0, ζ) = 1 and let h be the function h(z, ζ) = g(z, ζ) + zδ g0z(z, ζ),

for z ∈ U, ζ ∈ U. If λ, δ ≥ 0, m ∈ N, f ∈ A∗ζ and satisfies the strong differential subordinationµDRmλ f(z, ζ)

z

¶δ−1(DRmλ f(z, ζ))

0z ≺≺ h(z, ζ), z ∈ U, ζ ∈ U, (2.1)

then³DRm

λ f(z,ζ)z

´δ≺≺ g(z, ζ), z ∈ U, ζ ∈ U, and this result is sharp.

Proof. Consider p(z, ζ) =³DRmλ f(z,ζ)

z

´δ=

µz+P∞

j=2[1+(j−1)λ]m (m+j−1)!m!(j−1)! a2j(ζ)zj

z

¶δ= 1+pδ (ζ) z

δ+pδ+1 (ζ) zδ+1

+..., z ∈ U, ζ ∈ U. We deduce that p ∈ H∗[1, δ, ζ].Differentiating with respect to z we obtain

³DRm

λ f(z,ζ)z

´δ−1(DRmλ f(z, ζ))

0z = p(z, ζ)+

1δ zp

0z(z, ζ), z ∈ U, ζ ∈ U.

Then (2.1) becomes p(z, ζ) + 1δ zp

0z(z, ζ) ≺≺ h(z, ζ) = g(z, ζ) + z

δ g0z(z, ζ), z ∈ U, ζ ∈ U.

By using Lemma 1.1, we have p(z, ζ) ≺≺ g(z, ζ), z ∈ U, ζ ∈ U, i.e.³DRmλ f(z,ζ)

z

´δ≺≺ g(z, ζ), z ∈ U, ζ ∈ U.

Theorem 2.2 Let h be a holomorphic function which satisfies the inequality Re³1 +

zh00z2(z,ζ)

h0z(z,ζ)

´> − 12 , z ∈ U,

ζ ∈ U, and h(0, ζ) = 1, ζ ∈ U. If λ, δ ≥ 0, m ∈ N, f ∈ A∗ζ and satisfies the strong differential subordinationµDRmλ f(z, ζ)

z

¶δ−1(DRmλ f(z, ζ))

0z ≺≺ h(z, ζ), z ∈ U, ζ ∈ U, (2.2)

then³DRm

λ f(z,ζ)z

´δ≺≺ q(z, ζ), z ∈ U, ζ ∈ U, where q(z, ζ) = δ

R z0h(t, ζ)tδ−1dt is convex and it is the best

dominant.

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1043 Andrei Loriana 1042-1048

Page 292: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Proof. Let p(z, ζ) =³DRmλ f(z,ζ)

z

´δ=

µz+P∞

j=2[1+(j−1)λ]m (m+j−1)!m!(j−1)! a2j(ζ)zj

z

¶δ=³

1 +P∞

j=2

n[1 + (j − 1)λ]m (m+j−1)!

m!(j−1)!

oa2j (ζ)z

j−1´δ= 1 +

P∞j=δ+1 pj(ζ)z

j−1, for z ∈ U, ζ ∈ U, p ∈ H∗[1, δ, ζ].

Differentiating with respect to z, we obtain³DRm

λ f(z,ζ)z

´δ−1(DRmλ f(z, ζ))

0z = p(z, ζ)+

1δ zp

0z(z, ζ), z ∈ U, ζ ∈ U

and (2.2) becomes p(z, ζ) + 1δ zp

0z(z, ζ) ≺≺ h(z, ζ), z ∈ U, ζ ∈ U.

Using Lemma 1.2, we have p(z, ζ) ≺≺ q(z, ζ), z ∈ U, ζ ∈ U i.e.³DRmλ f(z,ζ)

z

´δ≺≺ q(z, ζ) = δ

R z0h(t, ζ)tδ−1dt,

z ∈ U, ζ ∈ U and q is the best dominant.

Corollary 2.3 Let h(z, ζ) = ζ+(2β−ζ)z1+z be a convex function in U×U , where 0 ≤ β < 1, z ∈ U , ζ ∈ U . If δ,λ ≥ 0,

m ∈ N, f ∈ A∗ζ and satisfies the strong differential subordinationµDRmλ f(z, ζ)

z

¶δ−1(DRmλ f(z, ζ))

0z ≺≺ h(z, ζ), z ∈ U, ζ ∈ U, (2.3)

then³DRm

λ f(z,ζ)z

´δ≺≺ q(z, ζ), z ∈ U, ζ ∈ U, where q is given by q(z, ζ) = (2β − ζ) + 2(ζ−β)δ

R z0tδ−1

1+t dt, z ∈ U ,ζ ∈ U. The function q is convex and it is the best dominant.

Proof. Following the same steps as in the proof of Theorem 2.2 and considering p(z, ζ) =³DRm

λ f(z,ζ)z

´δ.the

strong differential subordination (2.3) becomes p(z, ζ) + zδ p0z(z, ζ) ≺≺ h(z, ζ) =

ζ+(2β−ζ)z1+z , z ∈ U, ζ ∈ U.

By using Lemma 1.2 for γ = δ, we have p(z, ζ) ≺≺ q(z, ζ), i.e.³DRm

λ f(z,ζ)z

´δ≺≺ q(z, ζ) = δ

R z0h(t, ζ)tδ−1dt =

δzδ

R z0tδ−1 ζ+(2β−ζ)t1+t dt = δ

R z0

h(2β − ζ) tδ−1 + 2 (ζ − β) t

δ−1

1+t

idt = (2β − ζ) + 2(ζ−β)δ

R z0tδ−1

1+t dt, z ∈ U, ζ ∈ U.

Theorem 2.4 Let g be a convex function such that g (0, ζ) = 1 and let h be the function h (z, ζ) = g (z, ζ) +zδ g0z (z, ζ), z ∈ U, ζ ∈ U . If λ, δ ≥ 0, m ∈ N, z ∈ U, ζ ∈ U, f ∈ A∗ζ and the strong differential subordination

zδ + 1

δ

DRmλ f (z, ζ)¡DRm+1λ f (z, ζ)

¢2 + z2δ DRmλ f(z, ζ)¡DRm+1λ f(z, ζ)

¢2"(DRmλ f(z, ζ))

0z

DRmλ f(z, ζ)− 2

¡DRm+1λ f(z, ζ)

¢0z

DRm+1λ f(z, ζ)

#≺≺ h (z, ζ) (2.4)

holds, where z ∈ U, ζ ∈ U, then z DRmλ f(z,ζ)

(DRm+1λ f(z,ζ))2

≺≺ g (z, ζ), z ∈ U, ζ ∈ U, and this result is sharp.

Proof. Consider p(z, ζ) = z DRmλ f(z,ζ)

(DRm+1λ f(z,ζ))

2 and we obtain p (z, ζ) + zδ p0z (z, ζ) = z

δ+1δ

DRmλ f(z,ζ)

(DRm+1λ f(z,ζ))

2+

z2

δDRm

λ f(z,ζ)

(DRm+1λ f(z,ζ))2

∙(DRm

λ f(z,ζ))0z

DRmλ f(z,ζ)

− 2(DRm+1λ f(z,ζ))0

z

DRm+1λ f(z,ζ)

¸.

Relation (2.4) becomes p(z, ζ) + zδ p0z(z, ζ) ≺≺ h(z, ζ) = g(z, ζ) + z

δ g0z(z, ζ), z ∈ U, ζ ∈ U.

By using Lemma 1.1, we have p(z, ζ) ≺≺ g(z, ζ), z ∈ U, ζ ∈ U i.e. z DRmλ f(z,ζ)

(DRm+1λ f(z,ζ))

2 ≺≺ g(z, ζ), z ∈ U, ζ ∈ U.

Theorem 2.5 Let h be a holomorphic function which satisfies the inequality Re³1 +

zh00z2(z,ζ)

h0z(z,ζ)

´> − 12 , z ∈ U,

ζ ∈ U, and h(0, ζ) = 1. If λ, δ ≥ 0, m ∈ N, z ∈ U, ζ ∈ U, f ∈ A∗ζ and satisfies the strong differential subordination

zδ + 1

δ

DRmλ f (z, ζ)¡DRm+1λ f (z, ζ)

¢2 + z2δ DRmλ f(z, ζ)¡DRm+1λ f(z, ζ)

¢2"(DRmλ f(z, ζ))

0z

DRmλ f(z, ζ)− 2

¡DRm+1λ f(z, ζ)

¢0z

DRm+1λ f(z, ζ)

#≺≺ h(z, ζ), (2.5)

z ∈ U, ζ ∈ U, then z DRmλ f(z,ζ)

(DRm+1λ f(z,ζ))2

≺≺ q(z, ζ), z ∈ U, ζ ∈ U, where q(z, ζ) = δzδ

R z0h(t, ζ)tδ−1dt is convex and it

is the best dominant.

Proof. Let p(z, ζ) = z DRmλ f(z,ζ)

(DRm+1λ f(z,ζ))

2 , z ∈ U, ζ ∈ U, p ∈ H∗[1, 1, ζ]. Differentiating with respect to z, we obtain

p (z, ζ)+ zδ p0z (z, ζ) = z

δ+1δ

DRmλ f(z,ζ)

(DRm+1λ f(z,ζ))

2+z2

δDRmλ f(z,ζ)

(DRm+1λ f(z,ζ))

2

∙(DRmλ f(z,ζ))

0z

DRmλ f(z,ζ)

− 2(DRm+1λ f(z,ζ))0

z

DRm+1λ f(z,ζ)

¸, z ∈ U, ζ ∈ U, and

(2.5) becomes p(z, ζ) + zδ p0z(z, ζ) ≺≺ h(z, ζ), z ∈ U, ζ ∈ U.

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1044 Andrei Loriana 1042-1048

Page 293: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Using Lemma 1.2, we have p(z, ζ) ≺≺ q(z, ζ), z ∈ U, ζ ∈ U, i.e. z DRmλ f(z,ζ)

(DRm+1λ f(z,ζ))2

≺≺ q(z, ζ) = δzδ

R z0h(t, ζ)tδ−1dt,

z ∈ U, ζ ∈ U, and q is the best dominant.

Theorem 2.6 Let g be a convex function such that g(0, ζ) = 1 and let h be the function h(z, ζ) = g(z, ζ)+ zδ g0z(z, ζ),

z ∈ U, ζ ∈ U. If λ, δ ≥ 0, m ∈ N, f ∈ A∗ζ and the strong differential subordination

z2δ + 2

δ

(DRmλ f (z, ζ))0z

DRmλ f (z, ζ)+z3

δ

⎡⎣(DRmλ f (z, ζ))00z2DRmλ f (z, ζ)

−Ã(DRmλ f (z, ζ))

0z

DRmλ f (z, ζ)

!2⎤⎦ ≺≺ h(z, ζ), (2.6)

z ∈ U, ζ ∈ U, holds, then z2 (DRmλ f(z,ζ))

0z

DRmλ f(z,ζ)

≺≺ g(z, ζ), z ∈ U, ζ ∈ U. This result is sharp.

Proof. Let p(z, ζ) = z2(DRm

λ f(z,ζ))0z

DRmλ f(z,ζ)

. We deduce that p ∈ H∗[0, 1, ζ]. Differentiating with respect to z, we

obtain p (z, ζ) + zδ p0z (z, ζ) = z

2 δ+2δ

(DRmλ f(z,ζ))

0z

DRmλ f(z,ζ)+z3

δ

∙(DRm

λ f(z,ζ))00z2

DRmλ f(z,ζ)

−³(DRmλ f(z,ζ))

0z

DRmλ f(z,ζ)

´2¸, z ∈ U, ζ ∈ U.

Using the notation in (2.6), the strong differential subordination becomes p(z, ζ) + 1δ zp

0z(z, ζ) ≺≺ h(z, ζ) =

g(z, ζ) + zδ g0z(z, ζ), z ∈ U, ζ ∈ U.

By using Lemma 1.1, we have p(z, ζ) ≺≺ g(z, ζ), z ∈ U, ζ ∈ U, i.e. z2 (DRmλ f(z,ζ))

0z

DRmλ f(z,ζ)

≺≺ g(z, ζ), z ∈ U, ζ ∈ U,and this result is sharp.

Theorem 2.7 Let h be a holomorphic function which satisfies the inequality Re³1 +

zh00z2(z,ζ)

h0z(z,ζ)

´> − 12 , z ∈ U,

ζ ∈ U and h(0, ζ) = 1. If λ, δ ≥ 0, m ∈ N, f ∈ A∗ζ and satisfies the strong differential subordination

z2δ + 2

δ

(DRmλ f (z, ζ))0z

DRmλ f (z, ζ)+z3

δ

⎡⎣(DRmλ f (z, ζ))00z2DRmλ f (z, ζ)

−Ã(DRmλ f (z, ζ))

0z

DRmλ f (z, ζ)

!2⎤⎦ ≺≺ h(z, ζ), (2.7)

z ∈ U, ζ ∈ U, then z2 (DRmλ f(z,ζ))

0z

DRmλ f(z,ζ)

≺≺ q(z, ζ), z ∈ U, ζ ∈ U, where q(z, ζ) = δzδ

R z0h(t, ζ)tδ−1dt is convex and it is

the best dominant.

Proof. Let p(z, ζ) = z2 (DRmλ f(z,ζ))

0z

DRmλ f(z,ζ)

, z ∈ U, ζ ∈ U, p ∈ H∗[0, 1, ζ]. Differentiating with respect to z, we obtain

p (z, ζ)+ zδ p0z (z, ζ) = z

2 δ+2δ

(DRmλ f(z,ζ))

0z

DRmλ f(z,ζ)

+ z3

δ

∙(DRm

λ f(z,ζ))00z2

DRmλ f(z,ζ)

−³(DRmλ f(z,ζ))

0z

DRmλ f(z,ζ)

´2¸, z ∈ U, ζ ∈ U, and (2.7) becomes

p(z) + 1δ zp

0z(z, ζ) ≺≺ h(z, ζ), z ∈ U, ζ ∈ U.

Using Lemma 1.2, we have p(z, ζ) ≺≺ q(z, ζ), z ∈ U, ζ ∈ U, i.e. z2 (DRmλ f(z,ζ))

0z

DRmλ f(z,ζ)

≺≺ q(z, ζ) = δzδ

R z0h(t, ζ)tδ−1dt,

z ∈ U, ζ ∈ U, and q is the best dominant.

Theorem 2.8 Let g be a convex function such that g(0, ζ) = 1 and let h be the function h(z, ζ) = g(z, ζ)+zg0z(z, ζ),z ∈ U, ζ ∈ U. If λ ≥ 0, m ∈ N, f ∈ A∗ζ and the strong differential subordination

1−DRmλ f (z, ζ) · (DRmλ f (z, ζ))

00z2£

(DRmλ f (z, ζ))0z

¤2 ≺≺ h(z, ζ), z ∈ U, ζ ∈ U (2.8)

holds, then DRmλ f(z,ζ)

z(DRmλ f(z,ζ))

0z

≺≺ g(z, ζ), z ∈ U, ζ ∈ U. This result is sharp.

Proof. Let p(z, ζ) = DRmλ f(z,ζ)

z(DRmλ f(z,ζ))

0z

. We deduce that p ∈ H∗[1, 1, ζ]. Differentiating with respect to z, we

obtain 1− DRmλ f(z,ζ)·(DRmλ f(z,ζ))

00z2

[(DRmλ f(z,ζ))

0z]2 = p (z, ζ) + zp0z (z, ζ) , z ∈ U, ζ ∈ U.

Using the notation in (2.8), the strong differential subordination becomes p(z, ζ) + zp0z(z, ζ) ≺≺ h(z, ζ) =g(z, ζ) + zg0z(z, ζ), z ∈ U , ζ ∈ U.By using Lemma 1.1, we have p(z, ζ) ≺≺ g(z, ζ), z ∈ U, ζ ∈ U i.e. DRm

λ f(z,ζ)

z(DRmλ f(z,ζ))

0z

≺≺ g(z, ζ), z ∈ U, ζ ∈ U,and this result is sharp.

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1045 Andrei Loriana 1042-1048

Page 294: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Theorem 2.9 Let h be a holomorphic function which satisfies the inequality Re³1 +

zh00z2(z,ζ)

h0z(z,ζ)

´> − 12 , z ∈ U,

ζ ∈ U, and h(0, ζ) = 1. If λ ≥ 0, m ∈ N, f ∈ A∗ζ and satisfies the strong differential subordination

1−DRmλ f (z, ζ) · (DRmλ f (z, ζ))

00z2£

(DRmλ f (z, ζ))0z

¤2 ≺≺ h(z, ζ), z ∈ U, ζ ∈ U, (2.9)

then DRmλ f(z,ζ)

z(DRmλ f(z,ζ))

0z

≺≺ q(z, ζ), z ∈ U, ζ ∈ U, where q(z, ζ) = 1z

R z0h(t, ζ)dt is convex and it is the best dominant.

Proof. Let p(z) = DRmλ f(z,ζ)

z(DRmλ f(z,ζ))

0z

, z ∈ U, ζ ∈ U, p ∈ H∗[0, 1, ζ]. Differentiating with respect to z, we obtain

1− DRmλ f(z,ζ)·(DRmλ f(z,ζ))

00z2

[(DRmλ f(z,ζ))

0z]2 = p (z, ζ) + zp0z (z, ζ) , z ∈ U, ζ ∈ U, and (2.9) becomes p(z, ζ) + zp0z(z, ζ) ≺≺ h(z, ζ),

z ∈ U, ζ ∈ U.Using Lemma 1.2, we have p(z, ζ) ≺≺ q(z, ζ), z ∈ U, ζ ∈ U i.e. DRmλ f(z,ζ)

z(DRmλ f(z,ζ))0z

≺≺ q(z, ζ) = 1z

R z0h(t, ζ)dt,

z ∈ U, ζ ∈ U, and q is the best dominant.

Corollary 2.10 Let h(z, ζ) = ζ+(2β−ζ)z1+z be a convex function in U × U , where 0 ≤ β < 1. If λ ≥ 0, m ∈ N,

f ∈ A∗ζ and satisfies the strong differential subordination

1−DRmλ f (z, ζ) · (DRmλ f (z, ζ))

00z2£

(DRmλ f (z, ζ))0z

¤2 ≺≺ h(z, ζ), z ∈ U, ζ ∈ U, (2.10)

then DRmλ f(z,ζ)

z(DRmλ f(z,ζ))0z

≺≺ q(z, ζ), z ∈ U, ζ ∈ U, where q is given by q(z, ζ) = (2β − ζ) + 2 (ζ − β) ln(1+z)z , z ∈ U,

ζ ∈ U. The function q is convex and it is the best dominant.

Proof. Following the same steps as in the proof of Theorem 2.9 and considering p(z, ζ) = DRmλ f(z,ζ)

z(DRmλ f(z,ζ))

0z

, the

strong differential subordination (2.10) becomes p(z, ζ) + zp0z(z, ζ) ≺≺ h(z, ζ) =ζ+(2β−ζ)z

1+z , z ∈ U, ζ ∈ U.By using Lemma 1.2 for γ = 1, we have p(z, ζ) ≺≺ q(z, ζ), i.e. DRm

λ f(z,ζ)

z(DRmλ f(z,ζ))

0z

≺≺ q(z, ζ) = 1z

R z0h(t, ζ)dt =

1z

R z0

ζ+(2β−ζ)t1+t dt = 1

z

R z0

h(2β − ζ) + 2(ζ−β)

1+t

idt = (2β − ζ) + 2 (ζ − β) ln(1+z)z , z ∈ U, ζ ∈ U.

Theorem 2.11 Let g be a convex function such that g(0, ζ) = 0 and let h be the function h(z, ζ) = g(z, ζ) +zg0z(z, ζ), z ∈ U, ζ ∈ U. If λ ≥ 0, m ∈ N, f ∈ A∗ζ and the strong differential subordination£

(DRmλ f (z, ζ))0z

¤2+DRmλ f (z, ζ) · (DRmλ f (z, ζ))

00z2 ≺≺ h(z, ζ), z ∈ U, ζ ∈ U (2.11)

holds, then DRmλ f(z,ζ)·(DRm

λ f(z,ζ))0z

z ≺≺ g(z, ζ), z ∈ U, ζ ∈ U. This result is sharp.

Proof. Let p(z, ζ) = DRmλ f(z,ζ)·(DRmλ f(z,ζ))

0z

z . We deduce that p ∈ H∗[0, 1, ζ]. Differentiating with respect to z,we obtain

£(DRmλ f (z, ζ))

0z

¤2+ DRmλ f (z, ζ) · (DRmλ f (z, ζ))

00z2 = p (z, ζ) + zp

0z (z, ζ) , z ∈ U, ζ ∈ U.

Using the notation in (2.11), the strong differential subordination becomes p(z, ζ) + zp0z(z, ζ) ≺≺ h(z, ζ) =g(z, ζ) + zg0z(z, ζ), z ∈ U, ζ ∈ U.By using Lemma 1.1, we have p(z, ζ) ≺≺ g(z, ζ), z ∈ U, ζ ∈ U i.e. DRmλ f(z,ζ)·(DRm

λ f(z,ζ))0z

z ≺≺ g(z, ζ), z ∈ U,ζ ∈ U, and this result is sharp.

Theorem 2.12 Let h be a holomorphic function which satisfies the inequality Re³1 +

zh00z2(z,ζ)

h0z(z,ζ)

´> −12 , z ∈ U,

ζ ∈ U and h(0, ζ) = 0. If λ ≥ 0, m ∈ N, f ∈ A∗ζ and satisfies the strong differential subordination£(DRmλ f (z, ζ))

0z

¤2+DRmλ f (z, ζ) · (DRmλ f (z, ζ))

00z2 ≺≺ h(z, ζ), z ∈ U, ζ ∈ U, (2.12)

then DRmλ f(z,ζ)·(DRmλ f(z,ζ))0z

z ≺≺ q(z, ζ), z ∈ U, ζ ∈ U, where q(z, ζ) = 1z

R z0h(t, ζ)dt is convex and it is the best

dominant.

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1046 Andrei Loriana 1042-1048

Page 295: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Proof. Let p(z, ζ) = DRmλ f(z,ζ)·(DRmλ f(z,ζ))

0z

z , z ∈ U, ζ ∈ U, p ∈ H∗[0, 1, ζ]. Differentiating with respect toz, we obtain

£(DRmλ f (z, ζ))

0z

¤2+ DRmλ f (z, ζ) · (DRmλ f (z, ζ))

00z2 = p (z, ζ) + zp

0z (z, ζ) , z ∈ U, ζ ∈ U, and (2.12)

becomes p(z, ζ) + zp0z(z, ζ) ≺≺ h(z, ζ), z ∈ U, ζ ∈ U.Using Lemma 1.2, we have p(z, ζ) ≺≺ q(z, ζ), z ∈ U, ζ ∈ U, i.e. DRm

λ f(z,ζ)·(DRmλ f(z,ζ))0zz ≺≺ q(z, ζ) =

1z

R z0h(t, ζ)dt, z ∈ U, ζ ∈ U, and q is the best dominant.

Corollary 2.13 Let h(z) = ζ+(2β−ζ)z1+z be a convex function in U ×U , where 0 ≤ β < 1. If λ ≥ 0, m ∈ N, f ∈ A∗ζ

and satisfies the strong differential subordination£(DRmλ f (z, ζ))

0z

¤2+DRmλ f (z, ζ) · (DRmλ f (z, ζ))

00z2 ≺≺ h(z, ζ), z ∈ U, ζ ∈ U, (2.13)

then DRmλ f(z,ζ)·(DRm

λ f(z,ζ))0z

z ≺≺ q(z, ζ), z ∈ U, ζ ∈ U, where q is given by q(z, ζ) = (2β − ζ) + 2 (ζ − β) ln(1+z)z ,

z ∈ U, ζ ∈ U. The function q is convex and it is the best dominant.

Proof. Following the same steps as in the proof of Theorem 2.12 and considering p(z, ζ) = DRmλ f(z,ζ)·(DRmλ f(z,ζ))

0z

z ,

the strong differential subordination (2.13) becomes p(z, ζ) + zp0z(z, ζ) ≺≺ h(z, ζ) =ζ+(2β−ζ)z

1+z , z ∈ U, ζ ∈ U.By using Lemma 1.2 for γ = 1, we have p(z, ζ) ≺≺ q(z, ζ), i.e. DRmλ f(z,ζ)·(DRm

λ f(z,ζ))0z

z ≺≺ q(z, ζ) =1z

R z0h(t, ζ)dt = 1

z

R z0

ζ+(2β−ζ)t1+t dt = 1

z

R z0

h(2β − ζ) + 2(ζ−β)

1+t

idt = (2β − ζ) + 2 (ζ − β) ln(1+z)z , z ∈ U, ζ ∈ U.

Theorem 2.14 Let g be a convex function such that g(0, ζ) = 0 and let h be the function h(z, ζ) = g(z, ζ) +z1−δ g

0z(z, ζ), z ∈ U, ζ ∈ U. If λ ≥ 0, δ ∈ (0, 1), m ∈ N, f ∈ A∗ζ and the strong differential subordinationµ

z

DRmλ f (z, ζ)

¶δDRm+1λ f (z, ζ)

1− δ

áDRm+1λ f (z, ζ)

¢0z

DRm+1λ f (z, ζ)− δ

(DRmλ f (z, ζ))0z

DRmλ f (z, ζ)

!≺≺ h(z, ζ), (2.14)

z ∈ U, ζ ∈ U, holds, then DRm+1λ f(z,ζ)

z ·³

zDRm

λ f(z,ζ)

´δ≺≺ g(z, ζ), z ∈ U, ζ ∈ U. This result is sharp.

Proof. Let p(z, ζ) = DRm+1λ f(z,ζ)

z ·³

zDRmλ f(z,ζ)

´δ. We deduce that p ∈ H∗[1, 1, ζ]. Differentiating with respect

to z, we obtain³

zDRm

λ f(z,ζ)

´δ DRm+1λ f(z,ζ)

1−δ

µ(DRm+1

λ f(z,ζ))0z

DRm+1λ f(z,ζ)

− δ(DRm

λ f(z,ζ))0z

DRmλ f(z,ζ)

¶= p (z, ζ)+ 1

1−δ zp0z (z, ζ) , z ∈ U,

ζ ∈ U.Using the notation in (2.14), the strong differential subordination becomes p(z, ζ)+ 1

1−δ zp0z(z, ζ) ≺≺ h(z, ζ) =

g(z, ζ) + z1−δ g

0z(z, ζ), z ∈ U , ζ ∈ U.

By using Lemma 1.1, we have p(z, ζ) ≺≺ g(z, ζ), z ∈ U, ζ ∈ U, i.e. DRm+1λ f(z,ζ)

z ·³

zDRm

λ f(z,ζ)

´δ≺≺ g(z, ζ),

z ∈ U, ζ ∈ U,and this result is sharp.

Theorem 2.15 Let h be a holomorphic function which satisfies the inequality Re³1 +

zh00z2(z,ζ)

h0z(z,ζ)

´> −12 , z ∈ U,

ζ ∈ U and h(0, ζ) = 1. If λ ≥ 0, δ ∈ (0, 1) , m ∈ N, f ∈ A∗ζ and satisfies the strong differential subordinationµz

DRmλ f (z, ζ)

¶δDRm+1λ f (z, ζ)

1− δ

áDRm+1λ f (z, ζ)

¢0z

DRm+1λ f (z, ζ)− δ

(DRmλ f (z, ζ))0z

DRmλ f (z, ζ)

!≺≺ h(z, ζ), (2.15)

z ∈ U, ζ ∈ U, then DRm+1λ f(z,ζ)

z ·³

zDRmλ f(z,ζ)

´δ≺≺ q(z, ζ), z ∈ U, ζ ∈ U, where q(z, ζ) = 1−δ

z1−δ

R z0h(t, ζ)t−δdt is

convex and it is the best dominant.

Proof. Let p(z, ζ) = DRm+1λ f(z,ζ)

z ·³

zDRm

λ f(z,ζ)

´δ, z ∈ U, ζ ∈ U, p ∈ H∗[0, 1, ζ]. Differentiating with respect to

z, we obtain³

zDRm

λ f(z,ζ)

´δ DRm+1λ f(z,ζ)

1−δ

µ(DRm+1

λ f(z,ζ))0z

DRm+1λ f(z,ζ)

− δ(DRm

λ f(z,ζ))0z

DRmλ f(z,ζ)

¶= p (z, ζ)+ 1

1−δ zp0z (z, ζ) , z ∈ U, ζ ∈ U,

and (2.15) becomes p(z, ζ) + 11−δzp

0z(z, ζ) ≺≺ h(z, ζ), z ∈ U, ζ ∈ U.

Using Lemma 1.2, we have p(z, ζ) ≺≺ q(z, ζ), z ∈ U, ζ ∈ U, i.e. DRm+1λ f(z,ζ)

z ·³

zDRm

λ f(z,ζ)

´δ≺≺ q(z, ζ) =

1−δz1−δ

R z0h(t, ζ)t−δdt, z ∈ U, ζ ∈ U, and q is the best dominant.

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1047 Andrei Loriana 1042-1048

Page 296: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

References[1] A. Alb Lupas, G.I. Oros, Gh. Oros, On special strong differential subordinations using Salagean and

Ruscheweyh operators, Journal of Computational Analysis and Applications, Vol. 14, No. 2, 2012, 266-270.

[2] A. Alb Lupas, On special strong differential subordinations using a generalized Salagean operator andRuscheweyh derivative, Journal of Concrete and Applicable Mathematics, Vol. 10, No.’s 1-2, 2012, 17-23.

[3] A. Alb Lupas, A note on strong differential subordinations using a generalized Salagean operator andRuscheweyh operator, Acta Universitatis Apulensis No. 34/2013, 105-114.

[4] A. Alb Lupas, Certain strong differential superordinations using a generalized Salagean operator andRuscheweyh operator, Journal of Applied Functional Analysis, Vol. 7, No.’s 1-2, 2012, 62-68.

[5] A. Alb Lupas, Certain strong differential subordinations using Salagean and Ruscheweyh operators, Advancesin Applied Mathematical Analysis, Volume 6, Number 1 (2011), 27—34.

[6] A. Alb Lupas, A note on strong differential subordinations using Salagean and Ruscheweyh operators, LibertasMathematica, tomus XXXI (2011), 15-21.

[7] A. Alb Lupas, Certain strong differential superordinations using Salagean and Ruscheweyh operators, ActaUniversitatis Apulensis No. 30/2012, 325-336.

[8] A. Alb Lupas, A note on strong differential superordinations using Salagean and Ruscheweyh operators, Jour-nal of Applied Functional Analysis, Vol. 7, No.’s 1-2, 2012, 54-61.

[9] D.A. Alb Lupas, Subordinations and Superordinations, Lap Lambert Academic Publishing, 2011.

[10] L. Andrei, Differential subordination results using a generalized Salagean operator and Ruscheweyh operator,Acta Universitatis Apulensis, (to appear).

[11] L. Andrei, Some differential subordination results using a generalized Salagean operator and Ruscheweyhoperator, submitted.

[12] J.A. Antonino, S. Romaguera, Strong differential subordination to Briot-Bouquet differential equations, Jour-nal of Differential Equations, 114 (1994), 101-105.

[13] G.I. Oros, Gh. Oros, Strong differential subordination, Turkish Journal of Mathematics, 33 (2009), 249-257.

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1048 Andrei Loriana 1042-1048

Page 297: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

On some differential sandwich theorems using a generalized Salageanoperator and Ruscheweyh operator

Andrei LorianaDepartment of Mathematics and Computer Science

University of Oradea1 Universitatii street, 410087 Oradea, Romania

[email protected]

Abstract

In this work we define a new operator using the generalized Salagean operator and Ruscheweyh operator.Denote by DRm,nλ the Hadamard product of the generalized Salagean operator Dm

λ and Ruscheweyh operatorRn, given by DRm,nλ : A→ A, DRm,nλ f (z) = (Dm

λ ∗Rn) f (z) and An = f ∈ H (U) : f (z) = z+an+1zn+1+...,z ∈ U is the class of normalized analytic functions with A1 = A. The purpose of this paper is to introducesufficient conditions for subordination and superordination involving the operator DRm,nλ and also to obtainsandwich-type results.

Keywords: analytic functions, differential operator, differential subordination, differential superordination.2010 Mathematical Subject Classification: 30C45.

1 IntroductionLet H (U) be the class of analytic function in the open unit disc of the complex plane U = z ∈ C : |z| < 1. Let

H (a, n) be the subclass of H (U) consisting of functions of the form f(z) = a+ anzn + an+1z

n+1 + . . . . Let An =f ∈ H(U) : f(z) = z+an+1zn+1+. . . , z ∈ U andA = A1. Denote byK =

nf ∈ A : Re zf 00(z)

f 0(z) + 1 > 0, z ∈ Uo,

the class of normalized convex functions in U .Let the functions f and g be analytic in U . We say that the function f is subordinate to g, written f ≺ g,

if there exists a Schwarz function w, analytic in U , with w(0) = 0 and |w(z)| < 1, for all z ∈ U, such thatf(z) = g(w(z)), for all z ∈ U . In particular, if the function g is univalent in U , the above subordination isequivalent to f(0) = g(0) and f(U) ⊂ g(U).Let ψ : C3 × U → C and h be an univalent function in U . If p is analytic in U and satisfies the second order

differential subordinationψ(p(z), zp0(z), z2p00(z); z) ≺ h(z), for z ∈ U, (1.1)

then p is called a solution of the differential subordination. The univalent function q is called a dominant ofthe solutions of the differential subordination, or more simply a dominant, if p ≺ q for all p satisfying (1.1). Adominant eq that satisfies eq ≺ q for all dominants q of (1.1) is said to be the best dominant of (1.1). The bestdominant is unique up to a rotation of U .Let ψ : C2 × U → C and h analytic in U . If p and ψ

¡p (z) , zp0 (z) , z2p00 (z) ; z

¢are univalent and if p satisfies

the second order differential superordination

h(z) ≺ ψ(p(z), zp0(z), z2p00 (z) ; z), z ∈ U, (1.2)

then p is a solution of the differential superordination (1.2) (if f is subordinate to F , then F is called to besuperordinate to f). An analytic function q is called a subordinant if q ≺ p for all p satisfying (1.2). An univalentsubordinant eq that satisfies q ≺ eq for all subordinants q of (1.2) is said to be the best subordinant.Miller and Mocanu [15] obtained conditions h, q and ψ for which the following implication holds h(z) ≺

ψ(p(z), zp0(z), z2p00 (z) ; z)⇒ q (z) ≺ p (z) .For two functions f(z) = z +

P∞j=2 ajz

j and g(z) = z +P∞

j=2 bjzj analytic in the open unit disc U , the

Hadamard product (or convolution product) of f (z) and g (z), written as (f ∗ g) (z), is defined by f (z) ∗ g (z) =(f ∗ g) (z) = z +

P∞j=2 ajbjz

j .

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1049 Andrei Loriana 1049-1056

Page 298: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Definition 1.1 (Al Oboudi [7]) For f ∈ A, λ ≥ 0 and n ∈ N, the operator Dmλ is defined by Dm

λ : A→ A,

D0λf (z) = f (z)

D1λf (z) = (1− λ) f (z) + λzf 0(z) = Dλf (z) , ...

Dmλ f(z) = (1− λ)Dm−1

λ f (z) + λz (Dmλ f (z))

0 = Dλ

¡Dm−1λ f (z)

¢, z ∈ U.

Remark 1.1 If f ∈ A and f(z) = z +P∞j=2 ajz

j, then Dmλ f (z) = z +

P∞j=2 [1 + (j − 1)λ]

majz

j, for z ∈ U .

Remark 1.2 For λ = 1 in the above definition we obtain the Salagean differential operator [18].

Definition 1.2 (Ruscheweyh [17]) For f ∈ A and n ∈ N, the operator Rn is defined by Rn : A→ A,

R0f (z) = f (z)

R1f (z) = zf 0 (z) , ...

(n+ 1)Rn+1f (z) = z (Rnf (z))0 + nRnf (z) , z ∈ U.

Remark 1.3 If f ∈ A, f(z) = z +P∞j=2 ajz

j, then Rnf (z) = z +P∞

j=2(n+j−1)!n!(j−1)! ajz

j for z ∈ U .

The purpose of this paper is to derive the several subordination and superordination results involving a differ-ential operator. Furthermore, we studied the results of M. Darus, K. Al-Shaqs [14], Shanmugam, Ramachandran,Darus and Sivasubramanian [19].In order to prove our subordination and superordination results, we make use of the following known results.

Definition 1.3 [16] Denote by Q the set of all functions f that are analytic and injective on U\E (f), whereE (f) = ζ ∈ ∂U : lim

z→ζf (z) =∞, and are such that f 0 (ζ) 6= 0 for ζ ∈ ∂U\E (f).

Lemma 1.1 [16] Let the function q be univalent in the unit disc U and θ and φ be analytic in a domain Dcontaining q (U) with φ (w) 6= 0 when w ∈ q (U). Set Q (z) = zq0 (z)φ (q (z)) and h (z) = θ (q (z))+Q (z). Suppose

that Q is starlike univalent in U and Re³zh0(z)Q(z)

´> 0 for z ∈ U . If p is analytic with p (0) = q (0), p (U) ⊆ D and

θ (p (z)) + zp0 (z)φ (p (z)) ≺ θ (q (z)) + zq0 (z)φ (q (z)) , then p (z) ≺ q (z) and q is the best dominant.

Lemma 1.2 [13] Let the function q be convex univalent in the open unit disc U and ν and φ be analytic in a

domain D containing q (U). Suppose that Re³ν0(q(z))φ(q(z))

´> 0 for z ∈ U and ψ (z) = zq0 (z)φ (q (z)) is starlike

univalent in U . If p (z) ∈ H [q (0) , 1] ∩ Q, with p (U) ⊆ D and ν (p (z)) + zp0 (z)φ (p (z)) is univalent in U andν (q (z)) + zq0 (z)φ (q (z)) ≺ ν (p (z)) + zp0 (z)φ (p (z)) , then q (z) ≺ p (z) and q is the best subordinant.

2 Main resultsDefinition 2.1 Let λ ≥ 0 and n,m ∈ N. Denote by DRm,nλ : A→ A the operator given by the Hadamard productof the generalized Salagean operator Dm

λ and the Ruscheweyh operator Rn, DRm,nλ f (z) = (Dmλ ∗Rn) f (z) , for

any z ∈ U and each nonnegative integers m,n.

Remark 2.1 If f ∈ A and f(z) = z+P∞

j=2 ajzj, then DRm,nλ f (z) = z+

P∞j=2 [1 + (j − 1)λ]

m (n+j−1)!n!(j−1)! a

2jzj, for

z ∈ U .This operator was studied in [12].

Remark 2.2 For λ = 1, m = n, we obtain the Hadamard product SRn [1] of the Salagean operator Sn andRuscheweyh derivative Rn, which was studied in [2], [3].

Remark 2.3 For m = n we obtain the Hadamard product DRnλ [4] of the generalized Salagean operator Dnλ and

Ruscheweyh derivative Rn, which was studied in [5], [6], [8], [9], [10], [11].

Using simple computation one obtains the next result.

Proposition 2.1 For m,n ∈ N and λ ≥ 0 we have

DRm+1,nλ f (z) = (1− λ)DRm,nλ f (z) + λz (DRm,nλ f (z))0 (2.1)

andz (DRm,nλ f (z))

0= (n+ 1)DRm,n+1λ f (z)− nDRm,nλ f (z) . (2.2)

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1050 Andrei Loriana 1049-1056

Page 299: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Proof. We have DRm+1,nλ f (z) = z +P∞j=2 [1 + (j − 1)λ]

m+1 (n+j−1)!n!(j−1)! a

2jzj =

z +P∞j=2 [(1− λ) + λj] [1 + (j − 1)λ]m (n+j−1)!

n!(j−1)! a2jzj =

z + (1− λ)P∞

j=2 [1 + (j − 1)λ]m (n+j−1)!

n!(j−1)! a2jzj+ λ

P∞j=2 [1 + (j − 1)λ]

m (n+j−1)!n!(j−1)! ja

2jzj =

(1− λ)DRm,nλ f (z) + λz (DRm,nλ f (z))0, and

(n+ 1)DRm,n+1λ f (z)− nDRm,nλ f (z) =

(n+ 1) z + (n+ 1)P∞j=2 [1 + (j − 1)λ]

m (n+j)!(n+1)!(j−1)!a

2jzj− nz − n

P∞j=2 [1 + (j − 1)λ]

m (n+j−1)!n!(j−1)! a

2jzj =

z + (n+ 1)P∞j=2 [1 + (j − 1)λ]

m n+jn+1

(n+j−1)!n!(j−1)! a

2jzj− n

P∞j=2 [1 + (j − 1)λ]

m (n+j−1)!n!(j−1)! a

2jzj =

z +P∞j=2 [1 + (j − 1)λ]

m (n+j−1)!n!(j−1)! ja

2jzj = z (DRm,nλ f (z))

0.

We begin with the following

Theorem 2.2 Let DRm+1,nλ f(z)

DRm,nλ f(z)

∈ H (U) , z ∈ U , f ∈ A, m,n ∈ N, λ ≥ 0 and let the function q (z) be convex andunivalent in U such that q (0) = 1. Assume that

Re

µ1 +

α

µ+2β

µq (z) +

zq00 (z)

q0 (z)

¶> 0, z ∈ U, (2.3)

for α,β, µ,∈ C,µ 6= 0, z ∈ U, and

ψm,nλ (α,β, µ; z) :=

µ1− λ(n+ 1)

λµ+ α

¶DRm+1,nλ f (z)

DRm,nλ f (z)+ (2.4)

+µ(n+ 1) [1− λ(n+ 2)]DRm,n+1λ f (z)

DRm,nλ f (z)+ λµ(n+ 1)(n+ 2)

DRm,n+2λ f (z)

DRm,nλ f (z)+ (β − µ

λ)

ÃDRm+1,nλ f (z)

DRm,nλ f (z)

!2.

If q satisfies the following subordination

ψm,nλ (α,β, µ; z) ≺ αq (z) + β (q (z))2 + µzq0 (z) , (2.5)

for,α,β, µ ∈ C, µ 6= 0 thenDRm+1,nλ f (z)

DRm,nλ f (z)≺ q (z) , z ∈ U, (2.6)

and q is the best dominant.

Proof. Let the function p be defined by p (z) := DRm+1,nλ f(z)

DRm,nλ f(z)

, z ∈ U , z 6= 0, f ∈ A. The function p is

analytic in U and p (0) = 1. Differentiating this function, with respect to z,we get zp0 (z) =z(DRm+1,n

λ f(z))0

DRm,nλ f(z)

−DRm+1,n

λ f(z)

DRm,nλ f(z)

z(DRm,nλ f(z))0

DRm,nλ f(z)

. By using the identity (2.1) and (2.2), we obtain

zp0 (z) =1− λ(n+ 1)

λ

DRm+1,nλ f (z)

DRm,nλ f (z)+ (n+ 1) [1− λ(n+ 2)]

DRm,n+1λ f (z)

DRm,nλ f (z)+

λ(n+1)(n+2)DRm,n+2λ f (z)

DRm,nλ f (z)− 1λ

ÃDRm+1,nλ f (z)

DRm,nλ f (z)

!2+λ(n+1)(n+2)

DRm,n+2λ f (z)

DRm,nλ f (z)− 1λ

ÃDRm+1,nλ f (z)

DRm,nλ f (z)

!2(2.7)

By setting θ (w) := αw+βw2 and φ (w) := µ, α,β, µ ∈ C, µ 6= 0 it can be easily verified that θ is analytic in C,φ is analytic in C\0 and that φ (w) 6= 0, w ∈ C\0. Also, by letting Q (z) = zq0 (z)φ (q (z)) = µzq0 (z) ,we findthat Q (z) is starlike univalent in U. Let h (z) = θ (q (z))+Q (z) = αq (z)+β (q (z))2+µzq0 (z), z ∈ U. If we derivethe function Q, with respect to z, perform calculations, we have Re

³zh0(z)Q(z)

´= Re

³1 + α

µ +2βµ q (z) +

zq00(z)q0(z)

´> 0.

By using (2.7), we obtain αp (z)+β (p (z))2+µzp0 (z) =³1−λ(n+1)

λ µ+ α´DRm+1,n

λ f(z)

DRm,nλ f(z)

+ µ(n+1) [1− λ(n+ 2)] ·DRm,n+1

λ f(z)

DRm,nλ f(z)

+ λµ(n+1)(n+2)DRm,n+2

λ f(z)

DRm,nλ f(z)

+ (β− µλ )³DRm+1,n

λ f(z)

DRm,nλ f(z)

´2. By using (2.5), we have αp (z)+β (p (z))

2+

µzp0 (z) ≺ αq (z) + β (q (z))2+µzq0 (z) . Therefore, the conditions of Lemma 1.1 are met, so we have p (z) ≺ q (z),

z ∈ U, i.e. DRm+1,nλ f(z)

DRm,nλ f(z)

≺ q (z), z ∈ U, and q is the best dominant.

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1051 Andrei Loriana 1049-1056

Page 300: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Corollary 2.3 Let q (z) = 1+Az1+Bz , −1 ≤ B < A ≤ 1, m, n ∈ N, λ ≥ 0, z ∈ U. Assume that (2.3) holds. If f ∈ A

and ψm,nλ (α,β, µ; z) ≺ α 1+Az1+Bz + β³1+Az1+Bz

´2+ µ (A−B)z

(1+Bz)2, for α,β, µ ∈ C, µ 6= 0, −1 ≤ B < A ≤ 1, where ψm,nλ is

defined in (2.4), then DRm+1,nλ f(z)

DRm,nλ f(z)

≺ 1+Az1+Bz and

1+Az1+Bz is the best dominant.

Proof. For q (z) = 1+Az1+Bz , −1 ≤ B < A ≤ 1, in Theorem 2.2 we get the corollary.

Corollary 2.4 Let q (z) =³1+z1−z

´γ,m, n ∈ N, λ ≥ 0, z ∈ U. Assume that (2.3) holds. If f ∈ A and ψm,nλ (α,β, µ; z)

≺ α³1+z1−z

´γ+ β

³1+z1−z

´2γ+ µ 2γz

1−z2³1+z1−z

´γ−1, for α, µ,β ∈ C, 0 < γ ≤ 1, µ 6= 0, where ψm,nλ is defined in (2.4),

then DRm+1,nλ f(z)

DRm,nλ f(z)

≺³1+z1−z

´γ, and

³1+z1−z

´γis the best dominant.

Proof. Corollary follows by using Theorem 2.2 for q (z) =³1+z1−z

´γ, 0 < γ ≤ 1.

Theorem 2.5 Let q be convex and univalent in U, such that q (0) = 1, m, n ∈ N, λ ≥ 0. Assume that

Re

µq0 (z)

µ(α+ 2βq (z))

¶> 0, for α, µ,β ∈ C, µ 6= 0, z ∈ U. (2.8)

If f ∈ A, DRm+1,nλ f(z)

DRm,nλ f(z)

∈ H [q (0) , 1]∩Q and ψm,nλ (α,β, µ; z) is univalent in U , where ψm,nλ (α,β, µ; z) is as defined

in (2.4), thenαq (z) + β (q (z))2 + µzq0 (z) ≺ ψm,nλ (α,β, µ; z) , z ∈ U, (2.9)

implies

q (z) ≺ DRm+1,nλ f (z)

DRm,nλ f (z), z ∈ U, (2.10)

and q is the best subordinant.

Proof. Let the function p be defined by p (z) := DRm+1,nλ f(z)

DRm,nλ f(z)

, z ∈ U , z 6= 0, f ∈ A. By setting ν (w) :=

αw+βw2 and φ (w) := µ it can be easily verified that ν is analytic in C, φ is analytic in C\0 and that φ (w) 6= 0,w ∈ C\0. Since ν0(q(z))

φ(q(z)) =q0(z)µ (α+ 2βq (z)), it follows that Re

³ν0(q(z))φ(q(z))

´= Re

³q0(z)µ (α+ 2βq (z))

´> 0, for

µ, ξ,β ∈ C, µ 6= 0.By using (2.9) we obtain αq (z) + β (q (z))

2+ µzq0 (z) ≺ αq (z) + β (q (z))

2+ µzq0 (z) . Using Lemma 1.2, we

have q (z) ≺ p (z) = DRm+1,nλ f(z)

DRm,nλ f(z)

, z ∈ U, and q is the best subordinant.

Corollary 2.6 Let q (z) = 1+Az1+Bz , −1 ≤ B < A ≤ 1, m, n ∈ N, λ ≥ 0. Assume that (2.8) holds. If f ∈

A,DRm+1,nλ f(z)

DRm,nλ f(z)

∈ H [q (0) , 1] ∩Q and α 1+Az1+Bz + β³1+Az1+Bz

´2+ µ (A−B)z

(1+Bz)2≺ ψm,nλ (α,β, µ; z) , for α, µ,β ∈ C, µ 6= 0,

−1 ≤ B < A ≤ 1, where ψm,nλ is defined in (2.4), then 1+Az1+Bz ≺

DRm+1,nλ f(z)

DRm,nλ f(z)

and 1+Az1+Bz is the best subordinant.

Proof. For q (z) = 1+Az1+Bz , −1 ≤ B < A ≤ 1 in Theorem 2.5 we get the corollary.

Corollary 2.7 Let q (z) =³1+z1−z

´γ,m, n ∈ N, λ ≥ 0. Assume that (2.8) holds. If f ∈ A,DR

m+1,nλ f(z)

DRm,nλ f(z)

H [q (0) , 1] ∩ Q and α³1+z1−z

´γ+ β

³1+z1−z

´2γ+ µ 2γz

1−z2³1+z1−z

´γ−1≺ ψm,nλ (α,β, µ; z) , for α, µ,β ∈ C, 0 < γ ≤ 1, µ

6= 0, where ψm,nλ is defined in (2.4), then³1+z1−z

´γ≺ DRm+1,n

λ f(z)

DRm,nλ f(z)

and³1+z1−z

´γis the best subordinant.

Proof. Corollary follows by using Theorem 2.5 for q (z) =³1+z1−z

´γ, 0 < γ ≤ 1.

Combining Theorem 2.2 and Theorem 2.5, we state the following sandwich theorem.

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1052 Andrei Loriana 1049-1056

Page 301: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Theorem 2.8 Let q1 and q2 be analytic and univalent in U such that q1 (z) 6= 0 and q2 (z) 6= 0, for all z ∈U , with zq01 (z) and zq

02 (z) being starlike univalent. Suppose that q1 satisfies (2.3) and q2 satisfies (2.8). If

f ∈ A, DRm+1,nλ f(z)

DRm,nλ f(z)

∈ H [q (0) , 1] ∩ Q and ψm,nλ (α,β, µ; z) is as defined in (2.4) univalent in U , then αq1 (z)+

β (q1 (z))2+ µzq01 (z) ≺ ψm,nλ (α,β, µ; z) ≺ αq2 (z)+ β (q2 (z))

2+ µzq02 (z) , for α, µ,β ∈ C, µ 6= 0, implies q1 (z) ≺DRm+1,n

λ f(z)

DRm,nλ f(z)

≺ q2 (z), δ ∈ C, δ 6= 0, and q1 and q2 are respectively the best subordinant and the best dominant.

For q1 (z) = 1+A1z1+B1z

, q2 (z) = 1+A2z1+B2z

, where −1 ≤ B2 < B1 < A1 < A2 ≤ 1, we have the following corollary.

Corollary 2.9 Let m,n ∈ N, λ ≥ 0. Assume that (2.3) and (2.8) hold for q1 (z) = 1+A1z1+B1z

and q2 (z) = 1+A2z1+B2z

,

respectively. If f ∈ A, DRm+1,nλ f(z)

DRm,nλ f(z)

∈ H [q (0) , 1] ∩ Q and α 1+A1z1+B1z+ β

³1+A1z1+B1z

´2+ µ (A1−B1)z

(1+B1z)2 ≺ ψm,nλ (α,β, µ; z)

≺ α 1+A2z1+B2z+ β

³1+A2z1+B2z

´2+ µ (A2−B2)z

(1+B2z)2 , for α, µ,β ∈ C, µ 6= 0, −1 ≤ B2 ≤ B1 < A1 ≤ A2 ≤ 1, where ψm,nλ is

defined in (2.4), then 1+A1z1+B1z

≺ DRm+1,nλ f(z)

DRm,nλ f(z)

≺ 1+A2z1+B2z

, hence 1+A1z1+B1z

and 1+A2z1+B2z

are the best subordinant and the bestdominant, respectively.

Theorem 2.10 Let³DRm+1,n

λ f(z)

DRm,nλ f(z)

´δ∈ H (U) , f ∈ A, z ∈ U , δ ∈ C, δ 6= 0, m, n ∈ N, λ ≥ 0 and let the function

q (z) be convex and univalent in U such that q (0) = 1, z ∈ U . Assume that

Re

µα+ β

β+zq00 (z)

q0 (z)

¶> 0, (2.11)

for α,β ∈ C, β 6= 0, z ∈ U, and

ψm,nλ (α,β; z) :=

ÃDRm+1,nλ f (z)

DRm,nλ f (z)

!δ ∙α+ δβ

1− λ(n+ 1)

λ+

δβ(n+ 1) [1− λ(n+ 2)]DRm,n+1λ f (z)

DRm+1,nλ f (z)+ δβλ(n+ 1)(n+ 2)

DRm,n+2λ f (z)

DRm+1,nλ f (z)− δβ

λ

DRm+1,nλ f (z)

DRm,nλ f (z)

#(2.12)

If q satisfies the following subordination

ψm,nλ (α,β; z) ≺ αq (z) + βzq0 (z) , (2.13)

for α,β ∈ C, β 6= 0, z ∈ U, thenÃDRm+1,nλ f (z)

DRm,nλ f (z)

≺ q (z) , z ∈ U, δ ∈ C, δ 6= 0, (2.14)

and q is the best dominant.

Proof. Let the function p be defined by p (z) :=³DRm+1,n

λ f(z)

DRm,nλ f(z)

´δ, z ∈ U , z 6= 0, f ∈ A. The func-

tion p is analytic in U and p (0) = 1. We have zp0 (z) = δz³DRm+1,n

λ f(z)

DRm,nλ f(z)

´δDRm,n

λ f(z)

DRm+1,nλ f(z)

³DRm+1,n

λ f(z)

DRm,nλ f(z)

´0=

δ³DRm+1,n

λ f(z)

DRm,nλ f(z)

´δDRm,n

λ f(z)

DRm+1,nλ f(z)

µz(DRm+1,n

λ f(z))0

DRm,nλ f(z)

− DRm+1,nλ f(z)

DRm,nλ f(z)

z(DRm,nλ f(z))0

DRm,nλ f(z)

¶.

By using the identity (2.1) and (2.2), we obtain zp0 (z) = δ³DRm+1,n

λ f(z)

DRm,nλ f(z)

´δDRm,n

λ f(z)

DRm+1,nλ f(z)

h³1−λ(n+1)

λ

´DRm+1,n

λ f(z)

DRm,nλ f(z)

+(n+ 1) [1− λ(n+ 2)]DRm,n+1

λ f(z)

DRm,nλ f(z)

+ λ(n+ 1)(n+ 2)DRm,n+2

λ f(z)

DRm,nλ f(z)

− 1λ

³DRm+1,n

λ f(z)

DRm,nλ f(z)

´2¸so, we obtain

zp0 (z) = δ

ÃDRm+1,nλ f (z)

DRm,nλ f (z)

!δ ∙1− λ(n+ 1)

λ+

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1053 Andrei Loriana 1049-1056

Page 302: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

(n+ 1) [1− λ(n+ 2)]DRm,n+1λ f (z)

DRm+1,nλ f (z)+ λ(n+ 1)(n+ 2)

DRm,n+2λ f (z)

DRm+1,nλ f (z)− 1

λ

DRm+1,nλ f (z)

DRm,nλ f (z)

#(2.15)

By setting θ (w) := αw and φ (w) := β, it can be easily verified that θ is analytic in C, φ is analytic in C\0and that φ (w) 6= 0, w ∈ C\0. Also, by letting Q (z) = zq0 (z)φ (q (z)) = βzq0 (z) , we find that Q (z) is starlike

univalent in U. Let h (z) = θ (q (z)) +Q (z) = αq (z) + βzq0 (z).We have Re³zh0(z)Q(z)

´= Re

³α+ββ + zq00(z)

q0(z)

´> 0.

By using (2.15), we obtain αp (z) + βzp0 (z) =³DRm+1,n

λ f(z)

DRm,nλ f(z)

´δ hα+ δβ 1−λ(n+1)λ + δβ(n+ 1) [1− λ(n+ 2)] ·

DRm,n+1λ f(z)

DRm+1,nλ f(z)

+ δβλ(n+ 1)(n+ 2)DRm,n+2

λ f(z)

DRm+1,nλ f(z)

− δβλ

DRm+1,nλ f(z)

DRm,nλ f(z)

i.

By using (2.13), we have αp (z) + βzp0 (z) ≺ αq (z) + βzq0 (z) . From Lemma 1.1, we have p (z) ≺ q (z), z ∈ U,

i.e.³DRm+1,n

λ f(z)

DRm,nλ f(z)

´δ≺ q (z), z ∈ U, δ ∈ C, δ 6= 0 and q is the best dominant.

Corollary 2.11 Let q (z) = 1+Az1+Bz , z ∈ U, −1 ≤ B < A ≤ 1, m, n ∈ N, λ ≥ 0. Assume that (2.11) holds. If f ∈ A

and ψm,nλ (α,β; z) ≺ α 1+Az1+Bz + β (A−B)z(1+Bz)2

, for α,β ∈ C, β 6= 0, −1 ≤ B < A ≤ 1, where ψm,nλ is defined in (2.12),

then³DRm+1,n

λ f(z)

DRm,nλ f(z)

´δ≺ 1+Az

1+Bz , δ ∈ C, δ 6= 0, and1+Az1+Bz is the best dominant.

Proof. For q (z) = 1+Az1+Bz , −1 ≤ B < A ≤ 1, in Theorem 2.10 we get the corollary.

Corollary 2.12 Let q (z) =³1+z1−z

´γ,m, n ∈ N, λ ≥ 0. Assume that (2.11) holds. If f ∈ A and ψm,nλ (α,β, µ; z) ≺

α³1+z1−z

´γ+ β 2γz

1−z2³1+z1−z

´γ−1, for α,β ∈ C, 0 < γ ≤ 1, β 6= 0, where ψm,nλ is defined in (2.12), then

³DRm+1,n

λ f(z)

DRm,nλ f(z)

´δ≺³1+z1−z

´γ, δ ∈ C, δ 6= 0, and

³1+z1−z

´γis the best dominant.

Proof. Corollary follows by using Theorem 2.10 for q (z) =³1+z1−z

´γ, 0 < γ ≤ 1.

Theorem 2.13 Let q be convex and univalent in U such that q (0) = 1. Assume that

Re

µα

βq0 (z)

¶> 0, for α,β ∈ C, β 6= 0. (2.16)

If f ∈ A,³DRm+1,n

λ f(z)

DRm,nλ f(z)

´δ∈ H [q (0) , 1] ∩Q and ψm,nλ (α,β; z) is univalent in U , where ψm,nλ (α,β; z) is as defined

in (2.12), thenαq (z) + βzq0 (z) ≺ ψm,nλ (α,β; z) (2.17)

implies

q (z) ≺ÃDRm+1,nλ f (z)

DRm,nλ f (z)

, δ ∈ C, δ 6= 0, z ∈ U, (2.18)

and q is the best subordinant.

Proof. Let the function p be defined by p (z) :=³DRm+1,n

λ f(z)

DRm,nλ f(z)

´δ, z ∈ U , z 6= 0, δ ∈ C, δ 6= 0, f ∈ A. The

function p is analytic in U and p (0) = 1. By setting ν (w) := αw and φ (w) := β it can be easily verified that νis analytic in C, φ is analytic in C\0 and that φ (w) 6= 0, w ∈ C\0. Since ν0(q(z))

φ(q(z)) =αβ q

0 (z), it follows that

Re³ν0(q(z))φ(q(z))

´= Re

³αβ q

0 (z)´> 0, for α,β ∈ C, β 6= 0.

Now, by using (2.17) we obtain αq (z) + βzq0 (z) ≺ αq (z) + βzq0 (z) , z ∈ U. From Lemma 1.2, we have

q (z) ≺ p (z) =³DRm+1,n

λ f(z)

DRm,nλ f(z)

´δ, z ∈ U, δ ∈ C, δ 6= 0, and q is the best subordinant.

Corollary 2.14 Let q (z) = 1+Az1+Bz , −1 ≤ B < A ≤ 1, z ∈ U, m, n ∈ N, λ ≥ 0. Assume that (2.16) holds. If f ∈ A,³

DRm+1,nλ f(z)

DRm,nλ f(z)

´δ∈ H [q (0) , 1] ∩ Q, δ ∈ C, δ 6= 0 and α 1+Az1+Bz + β (A−B)z

(1+Bz)2≺ ψm,nλ (α,β; z) , for α,β ∈ C, β 6= 0,

−1 ≤ B < A ≤ 1, where ψm,nλ is defined in (2.12), then 1+Az1+Bz ≺

³DRm+1,n

λ f(z)

DRm,nλ f(z)

´δ, δ ∈ C, δ 6= 0, and 1+Az

1+Bz is thebest subordinant.

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1054 Andrei Loriana 1049-1056

Page 303: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Proof. For q (z) = 1+Az1+Bz , −1 ≤ B < A ≤ 1, in Theorem 2.13 we get the corollary.

Corollary 2.15 Let q (z) =³1+z1−z

´γ,m, n ∈ N, λ ≥ 0. Assume that (2.16) holds. If f ∈ A,

³DRm+1,n

λ f(z)

DRm,nλ f(z)

´δ∈ H [q (0) , 1] ∩ Q and α

³1+z1−z

´γ+ β 2γz

1−z2³1+z1−z

´γ−1≺ ψm,nλ (α,β, µ; z) , for α,β ∈ C, 0 < γ ≤ 1, β 6= 0, where

ψm,nλ is defined in (2.12), then³1+z1−z

´γ≺³DRm+1,n

λ f(z)

DRm,nλ f(z)

´δ, δ ∈ C, δ 6= 0, and

³1+z1−z

´γis the best subordinant.

Proof. Corollary follows by using Theorem 2.13 for q (z) =³1+z1−z

´γ, 0 < γ ≤ 1.

Combining Theorem 2.10 and Theorem 2.13, we state the following sandwich theorem.

Theorem 2.16 Let q1 and q2 be convex and univalent in U such that q1 (z) 6= 0 and q2 (z) 6= 0, for all z ∈ U .

Suppose that q1 satisfies (2.11) and q2 satisfies (2.16). If f ∈ A,³DRm+1,n

λ f(z)

DRm,nλ f(z)

´δ∈ H [q (0) , 1] ∩ Q , δ ∈

C, δ 6= 0 and ψm,nλ (α,β; z) is as defined in (2.12) univalent in U , then αq1 (z) + βzq01 (z) ≺ ψm,nλ (α,β; z) ≺

αq2 (z) + βzq02 (z) , for α,β ∈ C, β 6= 0, implies q1 (z) ≺³DRm+1,n

λ f(z)

DRm,nλ f(z)

´δ≺ q2 (z), z ∈ U, δ ∈ C, δ 6= 0, and q1 and

q2 are respectively the best subordinant and the best dominant.

For q1 (z) = 1+A1z1+B1z

, q2 (z) = 1+A2z1+B2z

, where −1 ≤ B2 < B1 < A1 < A2 ≤ 1, we have the following corollary.

Corollary 2.17 Let m,n ∈ N, λ ≥ 0. Assume that (2.11) and (2.16) hold for q1 (z) = 1+A1z1+B1z

and q2 (z) =

1+A2z1+B2z

, respectively. If f ∈ A,³DRm+1,n

λ f(z)

DRm,nλ f(z)

´δ∈ H [q (0) , 1] ∩ Q and α 1+A1z1+B1z

+ β (A1−B1)z(1+B1z)

2 ≺ ψm,nλ (α,β, µ; z)

≺ α 1+A2z1+B2z+β (A2−B2)z

(1+B2z)2 , z ∈ U, for α,β ∈ C, β 6= 0, −1 ≤ B2 ≤ B1 < A1 ≤ A2 ≤ 1, where ψm,nλ is defined in (2.4),

then 1+A1z1+B1z

≺³DRm+1,n

λ f(z)

DRm,nλ f(z)

´δ≺ 1+A2z

1+B2z, z ∈ U, δ ∈ C, δ 6= 0, hence 1+A1z

1+B1zand 1+A2z

1+B2zare the best subordinant and

the best dominant, respectively.

References[1] A. Alb Lupas, Certain differential subordinations using Salagean and Ruscheweyh operators, Acta Universitatis

Apulensis, No. 29/2012, 125-129.

[2] A. Alb Lupas, A note on differential subordinations using Salagean and Ruscheweyh operators, Romai Journal,vol. 6, nr. 1(2010), 1—4.

[3] A. Alb Lupas, Certain differential superordinations using Salagean and Ruscheweyh operators, Analele Uni-versitatii din Oradea, Fascicola Matematica, Tom XVII, Issue no. 2, 2010, 209-216.

[4] A. Alb Lupas, Certain differential subordinations using a generalized Salagean operator and Ruscheweyhoperator I, Journal of Mathematics and Applications, No. 33 (2010), 67-72.

[5] A. Alb Lupas, Certain differential subordinations using a generalized Salagean operator and Ruscheweyhoperator II, Fractional Calculus and Applied Analysis, Vol 13, No. 4 (2010), 355-360.

[6] A. Alb Lupas, Certain differential superordinations using a generalized Salagean and Ruscheweyh operators,Acta Universitatis Apulensis nr. 25/2011, 31-40.

[7] F.M. Al-Oboudi, On univalent functions defined by a generalized Salagean operator, Ind. J. Math. Math. Sci.,27 (2004), 1429-1436.

[8] L. Andrei, Differential subordination results using a generalized Salagean operator and Ruscheweyh operator,Acta Universitatis Apulensis (to appear).

[9] L. Andrei, Some differential subordination results using a generalized Salagean operator and Ruscheweyhoperator, submitted.

[10] L. Andrei, Differential superordination results using a generalized Salagean operator and Ruscheweyh operator,submitted.

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1055 Andrei Loriana 1049-1056

Page 304: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

[11] L. Andrei, Some differential superordination results using a generalized Salagean operator and Ruscheweyhoperator, submitted.

[12] L. Andrei, Differential Sandwich Theorems using a generalized Salagean operator and Ruscheweyh operator,submitted.

[13] T. Bulboaca, Classes of first order differential superordinations, Demonstratio Math., Vol. 35, No. 2, 287-292.

[14] M. Darus, K. Al-Shaqsi, Differential sandwich theorems with generalised derivative operator, Advanced Tech-nologies, October, Kankesu Jayanthakumaran (Ed), ISBN:978-953-307-009-4 2009

[15] S.S. Miller, P.T. Mocanu, Subordinants of Differential Superordinations, Complex Variables, vol. 48, no. 10,815-826, October, 2003.

[16] S.S. Miller, P.T. Mocanu, Differential Subordinations: Theory and Applications, Marcel Dekker Inc., NewYork, 2000.

[17] St. Ruscheweyh, New criteria for univalent functions, Proc. Amet. Math. Soc., 49(1975), 109-115.

[18] G. St. Salagean, Subclasses of univalent functions, Lecture Notes in Math., Springer Verlag, Berlin, 1013(1983),362-372.

[19] T.N. Shanmugan, C. Ramachandran, M. Darus, S. Sivasubramanian, Differential sandwich theorems for somesubclasses of analytic functions involving a linear operator, Acta Math. Univ. Comenianae, 16 (2007), no. 2,287-294.

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1056 Andrei Loriana 1049-1056

Page 305: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Journal of Computational Analysis and Applications 00(0000), 000-000

http://JoCAAA/91-2015-Muhiuddin-Alroqi-JoCAAA-6-02-2014

Subalgebras of BCK/BCI-algebras based on

(α, β)-type fuzzy sets

G. Muhiuddina,∗ and Abdullah M. Al-roqib

aDepartment of Mathematics, University of Tabuk, Tabuk 71491, Saudi Arabia

bDepartment of Mathematics, King Abdulaziz University, Jeddah 21589, Saudi Arabia

Abstract. The notion of (ε, δ)-characteristic fuzzy sets is introduced. Given a subalgebra F of a

BCK/BCI-algebra X, conditions for the (ε, δ)-characteristic fuzzy set in X to be an (∈,∈ ∨ q)-fuzzy

subalgebra, an (∈, q)-fuzzy subalgebra, an (∈,∈∧ q)-fuzzy subalgebra, a (q, q)-fuzzy subalgebra, a (q,∈)-

fuzzy subalgebra, a (q,∈∨ q)-fuzzy subalgebra and a (q,∈∧ q)-fuzzy subalgebra are provided. Using the

notions of (α, β)-fuzzy subalgebra µ(ε,δ)F , conditions for the F to be a subalgebra of X are investigated

where (α, β) is one of (∈,∈∨ q), (∈,∈∧ q), (∈, q), (q,∈∨ q), (q,∈∧ q), (q,∈) and (q, q).

1. Introduction

The idea of quasi-coincidence of a fuzzy point with a fuzzy set is given in [7] which played a vital

role to generate some different types of fuzzy subgroups, called (α, β)-fuzzy subgroups, introduced by

Bhakat and Das [1]. In particular, (∈,∈∨ q )-fuzzy subgroup is an important and useful generalization

of Rosenfeld’s fuzzy subgroup. Several authors [3, 4, 5, 8] have studied the concept of (α, β)-fuzzy

subalgebras in BCK/BCI-algebras, which is an important and useful generalization of the well-known

concepts, called fuzzy subalgebras.

In this paper, we introduce the notion of (ε, δ)-characteristic fuzzy sets in BCK/BCI-algebras. Given

a subalgebra F of a BCK/BCI-algebra X, we provide conditions for the (ε, δ)-characteristic fuzzy set

in X to be an (∈,∈ ∨ q)-fuzzy subalgebra, an (∈, q)-fuzzy subalgebra, an (∈,∈ ∧ q)-fuzzy subalgebra,

a (q, q)-fuzzy subalgebra, a (q,∈)-fuzzy subalgebra, a (q,∈ ∨ q)-fuzzy subalgebra and a (q,∈ ∧ q)-fuzzy

subalgebra. Using the notions of (α, β)-fuzzy subalgebra µ(ε,δ)F , we investigate conditions for the F to be

a subalgebra of X where (α, β) is one of (∈,∈∨ q), (∈,∈∧ q), (∈, q), (q,∈∨ q), (q,∈∧ q), (q,∈) and (q, q).

2010 Mathematics Subject Classification: 06F35; 03G25; 06D72.

Keywords: (ε, δ)-characteristic fuzzy set, (Fuzzy) subalgebra, (α, β)-fuzzy subalgebra.

*Corresponding author.

E-mail: [email protected] (G. Muhiuddin), [email protected] (Abdullah M. Al-roqi)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1057 G. Muhiuddin et al 1057-1064

Page 306: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

2 G. Muhiuddin and Abdullah M. Al-roqi

2. Preliminaries

By a BCI-algebra we mean an algebra (X, ∗, 0) of type (2, 0) satisfying the axioms:

(a1) ((x ∗ y) ∗ (x ∗ z)) ∗ (z ∗ y) = 0,

(a2) (x ∗ (x ∗ y)) ∗ y = 0,

(a3) x ∗ x = 0,

(a4) x ∗ y = y ∗ x = 0 ⇒ x = y,

for all x, y, z ∈ X. We can define a partial ordering ≤ by x ≤ y if and only if x ∗ y = 0. If a BCI-algebra

X satisfies the axiom

(a5) 0 ∗ x = 0 for all x ∈ X,

then we say that X is a BCK-algebra. A nonempty subset S of a BCK/BCI-algebra X is called a

subalgebra of X if x ∗ y ∈ S for all x, y ∈ S. We refer the reader to the books [2] and [6] for further

information regarding BCK/BCI-algebras.

A fuzzy set µ in a set X of the form

µ(y) :=

t ∈ (0, 1] if y = x,

0 if y 6= x,

is said to be a fuzzy point with support x and value t and is denoted by xt.

For a fuzzy point xt and a fuzzy set µ in a set X, Pu and Liu [7] introduced the symbol xtαµ, where

α ∈ ∈, q ,∈∨ q ,∈∧ q . To say that xt ∈ µ (resp. xt q µ), we mean µ(x) ≥ t (resp. µ(x) + t > 1), and

in this case, xt is said to belong to (resp. be quasi-coincident with) a fuzzy set µ. To say that xt ∈∨ q µ(resp. xt ∈∧ q µ), we mean xt ∈ µ or xt q µ (resp. xt ∈ µ and xt q µ). To say that xt αµ, we mean xtαµ

does not hold, where α ∈ ∈, q,∈∨ q ,∈∧ q .A fuzzy set µ in a BCK/BCI-algebra X is called a fuzzy subalgebra of X if it satisfies:

(2.1) µ(x ∗ y) ≥ minµ(x), µ(y)

for all x, y ∈ X.

Proposition 2.1 ([4]). Let X be a BCK/BCI-algebra. A fuzzy set µ in X is a fuzzy subalgebra of X if

and only if the following assertion is valid.

(2.2) xt ∈ µ, ys ∈ µ =⇒ (x ∗ y)mint,s ∈ µ

for all x, y ∈ X and t, s ∈ (0, 1].

3. Subalgebras of BCK/BCI-algebras based on (α, β)-type fuzzy sets

In what follows, let X denote a BCK/BCI-algebra unless otherwise specified.

Let F be a non-empty subset of X and ε, δ ∈ [0, 1] such that ε > δ. Define a fuzzy set µ(ε,δ)F in X as

follows:

µ(ε,δ)F (x) :=

ε if x ∈ F,δ otherwise.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1058 G. Muhiuddin et al 1057-1064

Page 307: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Subalgebras of BCK/BCI-algebras based on (α, β)-type fuzzy sets 3

We say that µ(ε,δ)F is an (ε, δ)-characteristic fuzzy set in X over F. In particular, the (1, 0)-characteristic

fuzzy set µ(1,0)F in X over F is the characteristic function χF of F.

Theorem 3.1. For any non-empty subset F of X, the following are equivalent:

(1) F is a subalgebra of X.

(2) The fuzzy set µ(ε,δ)F is a fuzzy subalgebra of X for all ε, δ ∈ [0, 1] with ε > δ.

Proof. Assume that F is a subalgebra of X and let ε, δ ∈ [0, 1] be such that ε > δ. Let x, y ∈ X. If

x, y ∈ F , then x ∗ y ∈ F and so

µ(ε,δ)F (x ∗ y) = ε = min

µ(ε,δ)F (x), µ

(ε,δ)F (y)

.

If x /∈ F or y /∈ F, then µ(ε,δ)F (x) = δ or µ

(ε,δ)F (y) = δ. Hence

µ(ε,δ)F (x ∗ y) ≥ δ = min

µ(ε,δ)F (x), µ

(ε,δ)F (y)

.

Therefore µ(ε,δ)F is a fuzzy subalgebra of X for all ε, δ ∈ [0, 1] with ε > δ.

Conversely, suppose that (2) is valid. Let x, y ∈ F. Then µ(ε,δ)F (x) = ε and µ

(ε,δ)F (y) = ε. It follows that

µ(ε,δ)F (x ∗ y) ≥ min

µ(ε,δ)F (x), µ

(ε,δ)F (y)

= ε. Thus x ∗ y ∈ F, and therefore F is a subalgebra of X.

Definition 3.2 ([4]). A fuzzy set µ in X is said to be an (α, β)-fuzzy subalgebra of X, where α, β ∈ ∈, q ,∈∨ q ,∈∧ q and α 6= ∈∧ q , if it satisfies the following condition:

(3.1) xt1αµ, yt2αµ ⇒ (x ∗ y)mint1,t2 β µ.

for all x, y ∈ X and t1, t2 ∈ (0, 1].

Lemma 3.3 ([4]). A fuzzy set µ in X is an (∈,∈∨ q )-fuzzy subalgebra of X if and only if it satisfies:

(3.2) (∀x, y ∈ X) (µ(x ∗ y) ≥ minµ(x), µ(y), 0.5) .

Theorem 3.4. If F is a subalgebra of X, then the fuzzy set µ(ε,δ)F is an (∈,∈∨ q )-fuzzy subalgebra of X

for all ε, δ ∈ [0, 1] with ε > δ.

Proof. Assume that F is a subalgebra of X and let ε, δ ∈ [0, 1] such that ε > δ. For any x, y ∈ X, if

x, y ∈ F , then x ∗ y ∈ F and so

µ(ε,δ)F (x ∗ y) = ε ≥ min

µ(ε,δ)F (x), µ

(ε,δ)F (y), 0.5

.

If x /∈ F or y /∈ F, then µ(ε,δ)F (x) = δ or µ

(ε,δ)F (y) = δ. Hence

µ(ε,δ)F (x ∗ y) ≥ δ ≥ min

µ(ε,δ)F (x), µ

(ε,δ)F (y), 0.5

.

It follows from Lemma 3.3 that µ(ε,δ)F is an (∈,∈ ∨ q )-fuzzy subalgebra of X for all ε, δ ∈ [0, 1] with

ε > δ.

Corollary 3.5. A non-empty subset F of X is a subalgebra of X if and only if the characteristic function

χF of F is an (∈,∈∨ q )-fuzzy subalgebra of X.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1059 G. Muhiuddin et al 1057-1064

Page 308: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

4 G. Muhiuddin and Abdullah M. Al-roqi

Proof. The necessity is by taking ε = 1 and δ = 0 in Theorem 3.4.

Conversely, suppose that the characteristic function χF of F is an (∈,∈∨ q )-fuzzy subalgebra of X.

Let x, y ∈ F. Then χF (x) = 1 = χF (y), which implies from (3.2) that

χF (x ∗ y) ≥ minχF (x), χF (y), 0.5 = min1, 0.5 = 0.5.

Hence x ∗ y ∈ F , and therefore F is a subalgebra of X.

We consider the converse of Theorem 3.4.

Theorem 3.6. For any ε, δ ∈ [0, 1] such that δ < ε ≤ 0.5, if the fuzzy set µ(ε,δ)F is an (∈,∈∨ q )-fuzzy

subalgebra of X then F is a subalgebra of X.

Proof. Let x, y ∈ F. Then µ(ε,δ)F (x) = ε = µ

(ε,δ)F (y). Using Lemma 3.3, we have

µ(ε,δ)F (x ∗ y) ≥ min

µ(ε,δ)F (x), µ

(ε,δ)F (y), 0.5

= minε, 0.5 = ε,

and so x ∗ y ∈ F. Therefore F is a subalgebra of X.

Theorem 3.7. Let ε, δ ∈ [0, 1] such that ε > δ. If F is a subalgebra of X, then the fuzzy set µ(ε,δ)F is an

(∈, q )-fuzzy subalgebra of X whenever if any element t in (0, 1] satisfies xt ∈ µ(ε,δ)F for x ∈ X then δ < t

and 1− t < ε.

Proof. Let x, y ∈ X and t1, t2 ∈ (0, 1] be such that xt1 ∈ µ(ε,δ)F and yt2 ∈ µ

(ε,δ)F . Then µ

(ε,δ)F (x) ≥ t1 > δ

and µ(ε,δ)F (y) ≥ t2 > δ. It follows that µ

(ε,δ)F (x) = ε = µ

(ε,δ)F (y), and so x, y ∈ F. Since F is a subalgebra

of X, we have x ∗ y ∈ F. Hence µ(ε,δ)F (x ∗ y) = ε, and thus µ

(ε,δ)F (x ∗ y) + mint1, t2 = ε+ mint1, t2 > 1

which shows that (x ∗ y)mint1,t2 q µ(ε,δ)F . Therefore µ

(ε,δ)F is an (∈, q )-fuzzy subalgebra of X.

Theorem 3.8. Let ε, δ ∈ [0, 1] such that ε > δ. If ε + δ ≤ 1 and the fuzzy set µ(ε,δ)F is an (∈, q)-fuzzy

subalgebra of X, then F is a subalgebra of X.

Proof. Assume that ε + δ ≤ 1 and the fuzzy set µ(ε,δ)F is an (∈, q)-fuzzy subalgebra of X. Let x, y ∈ F.

Then µ(ε,δ)F (x) = ε = µ

(ε,δ)F (y), and so xε ∈ µ(ε,δ)

F and yε ∈ µ(ε,δ)F . Hence (x ∗ y)ε = (x ∗ y)minε,ε q µ

(ε,δ)F ,

which implies that µ(ε,δ)F (x ∗ y) + ε > 1. Therefore µ

(ε,δ)F (x ∗ y) > 1 − ε ≥ δ, and thus µ

(ε,δ)F (x ∗ y) = ε,

that is, x ∗ y ∈ F. Consequently, F is a subalgebra of X.

If we take ε = 1 and δ = 0 in Theorems 3.7 and 3.8, then we have the following corollary.

Corollary 3.9. A non-empty subset F of X is a subalgebra of X if and only if the characteristic function

χF of F is an (∈, q)-fuzzy subalgebra of X.

Theorem 3.10. Let ε, δ ∈ [0, 1] such that ε > δ. If F is a subalgebra of X, then the fuzzy set µ(ε,δ)F

is a (q, q)-fuzzy subalgebra of X whenever if any element t in (0, 1] satisfies xt ∈ µ(ε,δ)F for x ∈ X then

δ ≤ 1− t < ε.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1060 G. Muhiuddin et al 1057-1064

Page 309: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Subalgebras of BCK/BCI-algebras based on (α, β)-type fuzzy sets 5

Proof. Let x, y ∈ X and t1, t2 ∈ (0, 1] be such that xt1 q µ(ε,δ)F and yt2 q µ

(ε,δ)F . Then µ

(ε,δ)F (x) + t1 > 1

and µ(ε,δ)F (y) + t2 > 1, which imply that µ

(ε,δ)F (x) > 1− t1 ≥ δ and µ

(ε,δ)F (y) > 1− t2 ≥ δ. It follows that

µ(ε,δ)F (x) = ε = µ

(ε,δ)F (y) and so that x, y ∈ F. Since F is a subalgebra of X, we have x ∗ y ∈ F and so

µ(ε,δ)F (x ∗ y) = ε. Thus

µ(ε,δ)F (x ∗ y) + mint1, t2 = ε+ mint1, t2 > 1,

that is, (x ∗ y)mint1,t2 q µ(ε,δ)F . This shows that µ

(ε,δ)F is a (q, q)-fuzzy subalgebra of X.

Theorem 3.11. Let ε, δ ∈ [0, 1] such that ε > maxδ, 0.5 and ε + δ ≤ 1. If the fuzzy set µ(ε,δ)F is a

(q, q)-fuzzy subalgebra of X, then F is a subalgebra of X.

Proof. Let x, y ∈ F. Then µ(ε,δ)F (x) = ε = µ

(ε,δ)F (y), which implies that

µ(ε,δ)F (x) + ε = ε+ ε > 1 and µ

(ε,δ)F (y) + ε = ε+ ε > 1,

that is, xε q µ(ε,δ)F and yε q µ

(ε,δ)F . Since µ

(ε,δ)F is a (q, q)-fuzzy subalgebra of X, it follows that (x ∗ y)ε =

(x ∗ y)minε,ε q µ(ε,δ)F . Hence µ

(ε,δ)F (x ∗ y) > 1 − ε ≥ δ, and therefore µ

(ε,δ)F (x ∗ y) = ε. This proves that

x ∗ y ∈ F , and F is a subalgebra of X.

If we take ε = 1 and δ = 0 in Theorems 3.10 and 3.11, then we have the following corollary.

Corollary 3.12. A non-empty subset F of X is a subalgebra of X if and only if the characteristic

function χF of F is a (q, q)-fuzzy subalgebra of X.

Theorem 3.13. Let ε, δ ∈ [0, 1] such that ε > δ. If F is a subalgebra of X, then the fuzzy set µ(ε,δ)F is

a (q,∈)-fuzzy subalgebra of X whenever if any element t in (0, 1] satisfies xt ∈ µ(ε,δ)F for x ∈ X then

δ ≤ 1− t and t < ε.

Proof. Let x, y ∈ X and t1, t2 ∈ (0, 1] be such that xt1 q µ(ε,δ)F and yt2 q µ

(ε,δ)F . Then µ

(ε,δ)F (x) + t1 > 1

and µ(ε,δ)F (y) + t2 > 1, which imply that µ

(ε,δ)F (x) > 1 − t1 ≥ δ and µ

(ε,δ)F (y) > 1 − t2 ≥ δ. Hence

µ(ε,δ)F (x) = ε = µ

(ε,δ)F (y), and so x, y ∈ F. Since F is a subalgebra of X, we have x ∗ y ∈ F and thus

µ(ε,δ)F (x ∗ y) = ε ≥ mint1, t2,

that is, (x ∗ y)mint1,t2 ∈ µ(ε,δ)F . This shows that µ

(ε,δ)F is a (q,∈)-fuzzy subalgebra of X.

Theorem 3.14. Let ε, δ ∈ [0, 1] such that ε > maxδ, 0.5. If the fuzzy set µ(ε,δ)F is a (q,∈)-fuzzy

subalgebra of X, then F is a subalgebra of X.

Proof. Let x, y ∈ F. Then µ(ε,δ)F (x) = ε = µ

(ε,δ)F (y), which implies that

µ(ε,δ)F (x) + ε = ε+ ε > 1 and µ

(ε,δ)F (y) + ε = ε+ ε > 1,

that is, xε q µ(ε,δ)F and yε q µ

(ε,δ)F . Since µ

(ε,δ)F is a (q,∈)-fuzzy subalgebra of X, it follows that (x ∗ y)ε =

(x ∗ y)minε,ε ∈ µ(ε,δ)F and so that µ

(ε,δ)F (x ∗ y) = ε, that is, x ∗ y ∈ F. Therefore F is a subalgebra of

X.

If we take ε = 1 and δ = 0 in Theorems 3.13 and 3.14, then we have the following corollary.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1061 G. Muhiuddin et al 1057-1064

Page 310: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

6 G. Muhiuddin and Abdullah M. Al-roqi

Corollary 3.15. A non-empty subset F of X is a subalgebra of X if and only if the characteristic

function χF of F is a (q,∈)-fuzzy subalgebra of X.

Theorem 3.16. Let ε, δ ∈ [0, 1] such that ε > δ. If F is a subalgebra of X, then the fuzzy set µ(ε,δ)F is an

(∈,∈∧ q )-fuzzy subalgebra of X whenever if any element t in (0, 1] satisfies xt ∈ µ(ε,δ)F for x ∈ X then

δ < t and 1− t < ε.

Proof. Let x, y ∈ X and t1, t2 ∈ (0, 1] be such that xt1 ∈ µ(ε,δ)F and yt2 ∈ µ

(ε,δ)F . Then µ

(ε,δ)F (x) ≥ t1 > δ

and µ(ε,δ)F (y) ≥ t2 > δ, which imply that x, y ∈ F and ε ≥ mint1, t2. Since F is a subalgebra of X, we

have x ∗ y ∈ F. Hence µ(ε,δ)F (x ∗ y) = ε ≥ mint1, t2, i.e., (x ∗ y)mint1,t2 ∈ µ

(ε,δ)F . Now, µ

(ε,δ)F (x ∗ y) +

mint1, t2 = ε + mint1, t2 > 1 and so (x ∗ y)mint1,t2 q µ(ε,δ)F . Therefore (x ∗ y)mint1,t2 ∈ ∧ q µ

(ε,δ)F ,

and consequently µ(ε,δ)F is an (∈,∈∧ q )-fuzzy subalgebra of X.

Theorem 3.17. Let ε, δ ∈ [0, 1] such that ε > δ. If ε+δ ≤ 1 and the fuzzy set µ(ε,δ)F is an (∈,∈∧ q )-fuzzy

subalgebra of X, then F is a subalgebra of X.

Proof. Assume that ε+δ ≤ 1 and the fuzzy set µ(ε,δ)F is an (∈,∈∧ q )-fuzzy subalgebra of X. Let x, y ∈ F.

Then µ(ε,δ)F (x) = ε = µ

(ε,δ)F (y), and so xε ∈ µ(ε,δ)

F and yε ∈ µ(ε,δ)F . Hence (x∗y)ε = (x∗y)minε,ε ∈∧ q µ

(ε,δ)F ,

that is, (x ∗ y)ε = (x ∗ y)minε,ε ∈ µ(ε,δ)F and (x ∗ y)ε = (x ∗ y)minε,ε q µ

(ε,δ)F . Hence µ

(ε,δ)F (x ∗ y) ≥ ε and

µ(ε,δ)F (x ∗ y) + ε > 1. If µ

(ε,δ)F (x ∗ y) ≥ ε, then µ

(ε,δ)F (x ∗ y) = ε and thus x ∗ y ∈ F. If µ

(ε,δ)F (x ∗ y) + ε > 1,

then µ(ε,δ)F (x ∗ y) > 1 − ε ≥ δ and so µ

(ε,δ)F (x ∗ y) = ε, which shows that x ∗ y ∈ F. Therefore F is a

subalgebra of X.

If we take ε = 1 and δ = 0 in Theorems 3.16 and 3.17, then we have the following corollary.

Corollary 3.18. A non-empty subset F of X is a subalgebra of X if and only if the characteristic

function χF of F is an (∈,∈∧ q )-fuzzy subalgebra of X.

Theorem 3.19. Let ε, δ ∈ [0, 1] such that ε > δ. If F is a subalgebra of X, then the fuzzy set µ(ε,δ)F is a

(q,∈∧ q )-fuzzy subalgebra of X under the condition that if any element t in (0, 1] satisfies xt ∈ µ(ε,δ)F for

x ∈ X then δ ≤ 1− t and t < ε.

Proof. Let x, y ∈ X and t1, t2 ∈ (0, 1] be such that xt1 q µ(ε,δ)F and yt2 q µ

(ε,δ)F . Then µ

(ε,δ)F (x) + t1 > 1

and µ(ε,δ)F (y) + t2 > 1, which imply that µ

(ε,δ)F (x) > 1 − t1 ≥ δ and µ

(ε,δ)F (y) > 1 − t2 ≥ δ. Hence

µ(ε,δ)F (x) = ε = µ

(ε,δ)F (y) and ε > max1 − t1, 1 − t2, and so x, y ∈ F. Since F is a subalgebra of X, we

have x ∗ y ∈ F and thus

µ(ε,δ)F (x ∗ y) = ε ≥ mint1, t2,

that is, (x ∗ y)mint1,t2 ∈ µ(ε,δ)F . Now, µ

(ε,δ)F (x ∗ y) + mint1, t2 = ε + mint1, t2 > 1, and so (x ∗

y)mint1,t2 q µ(ε,δ)F . Hence (x ∗ y)mint1,t2 ∈∧ q µ

(ε,δ)F , and µ

(ε,δ)F is a (q,∈∧ q )-fuzzy subalgebra of X.

Theorem 3.20. Let ε, δ ∈ [0, 1] such that ε > maxδ, 0.5. If the fuzzy set µ(ε,δ)F is a (q,∈ ∧ q )-fuzzy

subalgebra of X, then F is a subalgebra of X.

Proof. Let x, y ∈ F. Then µ(ε,δ)F (x) = ε = µ

(ε,δ)F (y), which implies that

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1062 G. Muhiuddin et al 1057-1064

Page 311: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Subalgebras of BCK/BCI-algebras based on (α, β)-type fuzzy sets 7

µ(ε,δ)F (x) + ε = ε+ ε > 1 and µ

(ε,δ)F (y) + ε = ε+ ε > 1,

that is, xε q µ(ε,δ)F and yε q µ

(ε,δ)F . Since µ

(ε,δ)F is a (q,∈∧ q )-fuzzy subalgebra of X, it follows that (x∗y)ε =

(x ∗ y)minε,ε ∈∧ q µ(ε,δ)F and so that µ

(ε,δ)F (x ∗ y) ≥ ε. Hence x ∗ y ∈ F and F is a subalgebra of X.

If we take ε = 1 and δ = 0 in Theorems 3.19 and 3.20, then we have the following corollary.

Corollary 3.21. A non-empty subset F of X is a subalgebra of X if and only if the characteristic

function χF of F is a (q,∈∧ q )-fuzzy subalgebra of X.

Theorem 3.22. Let ε, δ ∈ [0, 1] such that ε > δ. Assume that if any element t in (0, 1] satisfies xt ∈ µ(ε,δ)F

for x ∈ X then δ ≤ 1−t. If F is a subalgebra of X, then the fuzzy set µ(ε,δ)F is a (q,∈∨ q )-fuzzy subalgebra

of X.

Proof. Let x, y ∈ X and t1, t2 ∈ (0, 1] be such that xt1 q µ(ε,δ)F and yt2 q µ

(ε,δ)F . Then µ

(ε,δ)F (x) + t1 > 1

and µ(ε,δ)F (y) + t2 > 1, which imply that µ

(ε,δ)F (x) > 1 − t1 ≥ δ and µ

(ε,δ)F (y) > 1 − t2 ≥ δ. Hence

µ(ε,δ)F (x) = ε = µ

(ε,δ)F (y), and so ε > max1 − t1, 1 − t2 and x, y ∈ F. Since F is a subalgebra of X, we

have x∗y ∈ F and thus µ(ε,δ)F (x∗y) = ε which implies that µ

(ε,δ)F (x∗y)+mint1, t2 = ε+mint1, t2 > 1,

i.e., (x∗y)mint1,t2 q µ(ε,δ)F . It follows that (x∗y)mint1,t2 ∈∨ q µ

(ε,δ)F . Therefore µ

(ε,δ)F is a (q,∈∨ q )-fuzzy

subalgebra of X.

Theorem 3.23. Let ε, δ ∈ [0, 1] such that ε > maxδ, 0.5 and ε + δ ≤ 1. If the fuzzy set µ(ε,δ)F is a

(q,∈∨ q )-fuzzy subalgebra of X, then F is a subalgebra of X.

Proof. Let x, y ∈ F. Then µ(ε,δ)F (x) = ε = µ

(ε,δ)F (y), which implies that

µ(ε,δ)F (x) + ε = ε+ ε > 1 and µ

(ε,δ)F (y) + ε = ε+ ε > 1,

that is, xε q µ(ε,δ)F and yε q µ

(ε,δ)F . Since µ

(ε,δ)F is a (q,∈∨ q )-fuzzy subalgebra of X, it follows that (x∗y)ε =

(x∗y)minε,ε ∈∨ q µ(ε,δ)F , that is, µ

(ε,δ)F (x∗y) ≥ ε or µ

(ε,δ)F (x∗y)+ε > 1. If µ

(ε,δ)F (x∗y) ≥ ε, then x∗y ∈ F.

If µ(ε,δ)F (x∗y) + ε > 1, then µ

(ε,δ)F (x∗y) > 1− ε ≥ δ and so µ

(ε,δ)F (x∗y) = ε. Thus x∗y ∈ F, and therefore

F is a subalgebra of X.

If we take ε = 1 and δ = 0 in Theorems 3.22 and 3.23, then we have the following corollary.

Corollary 3.24. A non-empty subset F of X is a subalgebra of X if and only if the characteristic

function χF of F is a (q,∈∨ q )-fuzzy subalgebra of X.

Conclusions

We have introduced the notion of (ε, δ)-characteristic fuzzy sets in BCK/BCI-algebras. Given a

subalgebra F of a BCK/BCI-algebra X, we have provided conditions for the (ε, δ)-characteristic fuzzy

set in X to be an (∈,∈∨ q)-fuzzy subalgebra, an (∈, q)-fuzzy subalgebra, an (∈,∈∧ q)-fuzzy subalgebra,

a (q, q)-fuzzy subalgebra, a (q,∈)-fuzzy subalgebra, a (q,∈ ∨ q)-fuzzy subalgebra and a (q,∈ ∧ q)-fuzzy

subalgebra. Using the notions of (α, β)-fuzzy subalgebra µ(ε,δ)F , we have investigated conditions for the

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1063 G. Muhiuddin et al 1057-1064

Page 312: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

8 G. Muhiuddin and Abdullah M. Al-roqi

F to be a subalgebra of X where (α, β) is one of (∈,∈∨ q), (∈,∈∧ q), (∈, q), (q,∈∨ q), (q,∈∧ q), (q,∈)

and (q, q).

In the consecutive research, we will discuss the following items:

(1) Given a subalgebra F of a BCK/BCI-algebra X, we will provide conditions for the (ε, δ)-

characteristic fuzzy set in X to be an (∈∨ q,∈∨ q)-fuzzy subalgebra, an (∈∨ q,∈)-fuzzy subal-

gebra, an (∈∨ q,∈∧ q)-fuzzy subalgebra, and an (∈∨ q, q)-fuzzy subalgebra.

(2) Using the notions of (α, β)-fuzzy subalgebra µ(ε,δ)F where (α, β) is one of (∈∨ q,∈∨ q), (∈∨ q,∈),

(∈∨ q,∈∧ q) and (∈∨ q, q), we investigate conditions for the F to be a subalgebra of X.

4. Acknowledgements

This research was partially supported by the Deanship of Scientific Research (DSR), King Abdulaziz

University, Jeddah 21589, Ministry of Higher Education, Saudi Arabia.The authors would like to express

their sincere thanks to the anonymous referees.

References

[1] S. K. Bhakat and P. Das, (∈,∈∨ q)-fuzzy subgroup, Fuzzy Sets and Systems 80 (1996), 359–368.

[2] Y. S. Huang, BCI-algebra, Science Press, Beijing, 2006.

[3] Y. B. Jun, On (α, β)-fuzzy ideals of BCK/BCI-algebras, Sci. Math. Jpn. 60(3) (2004), 613–617.

[4] Y. B. Jun, On (α, β)-fuzzy subalgebras of BCK/BCI-algebras, Bull. Korean Math. Soc. 42(4)

(2005), 703–711.

[5] Y. B. Jun, Fuzzy subalgebras of type (α, β) in BCK/BCI-algebras, Kyungpook Math. J. 47 (2007),

403–410.

[6] J. Meng and Y. B. Jun, BCK-algebra, Kyungmoon Sa Co. Seoul, 1994.

[7] P. M. Pu and Y. M. Liu, Fuzzy topology I, Neighborhood structure of a fuzzy point and Moore-Smith

convergence, J. Math. Anal. Appl. 76 (1980), 571–599.

[8] J. Zhan, Y. B. Jun and B. Davvaz, On (∈, ∈∨ q )-fuzzy ideals of BCI-algebras, Iran. J. Fuzzy Syst.

6(1) (2009), 81–94.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1064 G. Muhiuddin et al 1057-1064

Page 313: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Existence results for nonlinear fractional

integrodifferential equations with antiperiodic type

integral boundary conditions

Xiaohong Zuo and Wengui Yang∗

Ministry of Public Education, Sanmenxia Polytechnic, Sanmenxia, Henan 472000, China

Abstract: This paper investigates the existence of solutions for a class of nonlinear boundary value problems

involving fractional integrodifferential equations of fractional order α ∈ (2, 3] with antiperiodic type integral

boundary conditions. Our results are based on contraction mapping principle and Krasnoselskii fixed point

theorem. As an application, an interesting example is presented to illustrate the main results.

Keywords: Fractional integrodifferential equations; antiperiodic boundary conditions; integral boundary

conditions; fixed point theorem

2010 Mathematics Subject Classification: 34A08, 34B18.

1 Introduction

In the last few decades, the topic of fractional differential equations has gained a considerable attention

and it has emerged as a popular field of research due to its extensive development and applications in

several disciplines such as physics, mechanics, chemistry, engineering, etc. Therefore, there have been many

papers and books dealing with the theoretical development of fractional calculus and the solutions or positive

solutions of boundary value problems for nonlinear fractional differential equations; for examples and details,

one can see [1, 2, 3, 4, 5, 6, 7] and references along these lines. For instance, Ahmad and Sivasundaram

[8] proved the existence and uniqueness of solutions for a four-point nonlocal boundary value problem of

nonlinear integro-differential equations of fractional order q ∈ (1, 2] by applying some standard fixed point

theorems. Ahmad and Ntouyas [9, 10] studied the existence and uniqueness results for a class of nonlocal

boundary value problems of nonlinear differential equations and inclusions of fractional order with strip

conditions by using a variety of fixed point theorems.

Recently, antiperiodic and/or integral boundary value problems of fractional differential equations occur

in the mathematic modeling of a variety of physical processes and have been studied by a number of authors.

For examples and details of antiperiodic and/or integral fractional boundary conditions, see [11, 12, 13,

14, 15, 16] and the references therein. For example, Ahmad and Nieto [17] obtained the existence and

uniqueness results for antiperiodic boundary value problem for nonlinear fractional differential equation of

order q ∈ (1, 2] by applying some standard fixed point principles. By using Schauder’s fixed point theorem

and the contraction mapping principle, Wang and Liu [18] considered the existence and uniqueness results for

antiperiodic fractional boundary value problem with fractional derivative. In [19], the authors investigated

the following boundary value problem for a nonlinear fractional integrodifferential equation with integral

boundary conditions

cDqx(t) = f(t, x(t), (χx)(t)), t ∈ [0, 1], q ∈ (1, 2],

αx(0) + β′(0) =

∫ 1

0

q1(x(s))ds, αx(1) + βx′(1) =

∫ 1

0

q2(x(s))ds,

where f : [0, 1] × X × X → X, (χx)(t) =∫ t

0γ(t, s)x(s)ds for γ : [0, T ] × [0, T ] → [0,+∞), q1, q2 : X → X

∗Corresponding author.

Email:[email protected] (X. Zuo) and [email protected] (W. Yang)

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1065 Xiaohong Zuo et al 1065-1076

Page 314: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

and α > 0 and β ≥ 0 are real numbers. The authors established sufficient conditions for the existence of

solutions for the above boundary value problems.

In [20], Wang et al. studied the following fractional boundary value problem with antiperiodic boundary

conditions

cDαx(t) = f(t, x(t)), t ∈ [0, T ], α ∈ (2, 3],

x(0) = −x(T ), cDpx(0) = −cDpx(T ), cDqx(0) = −cDqx(T ),

where 0 < p < 1 < q < 2, and f : [0, T ] × R → R is a given continuous function. Some existence and

uniqueness results are obtained contraction mapping principle and Leray-Schauder’s fixed point theorem.

In [21], Chai concerned with the following antiperiodic boundary value problems of fractional differential

equations

cDαx(t) = f(t, x(t),cDα1(t),cDα2(t)), t ∈ (0, 1), α ∈ (2, 3],

x(0) = −x(T ), tβ1−1cDβ1x(t)|t→0 = −tβ1−1cDβ1x(t)|t=1, tβ2−1cDβ2x(t)|t→0 = −tβ2−1cDβ2x(t)|t=1,

where 2 < α ≤ 3, 0 < α1 ≤ 1 < α2 ≤ 2, 0 < β1 < 1 < β2 < 2, and f is a given continuous function.

The author obtained some existence results by applying the Banach contraction mapping principle and the

Leray-Schauder degree theory.

In [22], Alsaedi discussed existence of solutions for the following integrodifferential equations of fractional

order with antiperiodic boundary conditions

cDqx(t) = f(t, x(t), (χx)(t)), t ∈ [0, T ], q ∈ (1, 2],

x(0) = −x(T ), x′(0) = −x′(T ),

where f : [0, 1]×X ×X → X, (χx)(t) =∫ t

0γ(t, s)x(s)ds for γ : [0, 1]× [0, 1]→ [0,+∞).

In [23], Ahmad et al. considered the existence and uniqueness of the solutions for a new class of bound-

ary value problems of nonlinear fractional differential equations with non-separated type integral boundary

conditions

cDqx(t) = f(t, x(t)), t ∈ [0, T ], q ∈ (1, 2],

x(0)− λ1x(T ) = µ1

∫ T

0

g(s, x(s))ds, x′(0)− λ2x′(T ) = µ2

∫ T

0

h(s, x(s))ds,

where f, g, g : [0, T ]× R→ R are given continuous functions and λj , µj ∈ R (λj 6= 0), j = 1, 2.

Ahmad and Ntouyas [24] and Ahmad et al. [25] study a boundary value problem of fractional differential

eqations and inclusions with anti-periodic type integral boundary conditions given by

cDαx(t) = f(t, x(t)) (∈ F (t, x(t))), t ∈ [0, T ], α ∈ (2, 3],

x(j)(0)− λjx(j)(T ) = µj

∫ T

0

gj(s, x(s))ds, j = 0, 1, 2,

where x(j)(·) denotes jth derivative of x(·) with x(0) = x(·), gj : [0, T ]×R→ R are given continuous functions

and λj , µj ∈ R (λj 6= 0), respectively.

In this paper, motivated greatly by the above mentioned works, we consider the following boundary value

problem for a nonlinear fractional integrodifferential equation of fractional order α ∈ (2, 3] with antiperiodic

type integral boundrary conditions

cDαu(t) = f(t, u(t), (φu)(t), (ψu)(t)), t ∈J = [0, T ] (T > 0),

u(0) = µ0u(T ) + ν0

∫ T

0

g0(s, u(s))ds, wi(0) = µiwi(T ) + νi

∫ T

0

gi(s, u(s))ds, i = 1, 2,(1.1)

where cDα is the standard Caputo fractional derivative of fractional order α, 0 < α1 < 1 < α2 < 2,

wi(t) = tαi−icDαiu(t), wi(0) = limt→0+ wi(t), wi(T ) = [wi(t)]t=T , µ0, ν0, µi, νi ∈ R (µ0, µi 6= 1), i = 1, 2, the

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1066 Xiaohong Zuo et al 1065-1076

Page 315: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

nonlinear function f : J × R × R × R → R is continuous, gi : J × R → R are given continuous functions

for i = 0, 1, 2, and for γ, δ : [0, T ]× [0, T ]→ [0,∞),

(φu)(t) =

∫ t

0

γ(t, s, u(s))ds, (ψu)(t) =

∫ T

0

δ(t, s, u(s))ds.

Let C = C(J ,R) be Banach space of all continuous functions from J → R endowed with a topology of

uniform convergence with the norm denoted by ‖ϕ‖ = sup|ϕ(t)| : s ∈J .

2 Preliminaries

For the convenience of the reader, we give some background materials from fractional calculus theory to

facilitate analysis of the problem (1.1). These materials can be found in the recent literature, see [27, 29, 30].

Definition 2.1. For at least n-times continuously differentiable function f : [0,∞)→ R, the Caputo deriva-

tive of fractional order α is defined as

cDαf(t) =1

Γ(n− α)

∫ t

0

(t− s)n−α−1f (n)(s)ds, n = [α] + 1,

where [α] denotes the integer part of the real number α.

Definition 2.2. The Riemann-Liouville fractional integral of order α for a function f is defined as

Iαf(t) =1

Γ(α)

∫ t

0

(t− s)α−1f(s)ds, α > 0,

provided that such integral exists.

Definition 2.3. The Riemann-Liouville fractional derivative of order α for a function f is defined by

Dαf(t) =1

Γ(n− α)

(d

dt

)n ∫ t

0

(t− s)n−α−1f(s)ds, n = [α] + 1,

provided that the right-hand side of the previous equation is pointwise defined on (0,∞).

Lemma 2.4 ([26, 28]). Let α > 0, then the fractional differential equation

cDαu(t) = 0

has a unique solution given by the expression

u(t) =

[α]∑j=0

u(j)(0)

j!tj .

Lemma 2.5 ([26, 29]). Let α > 0, then

IαcDαu(t) = u(t)−[α]∑j=0

u(j)(0)

j!tj .

In view of Lemma 2.5, it follows that

IαcDαu(t) = u(t) + c0 + c1t+ c2t2 + · · ·+ cn−1t

n−1, (2.1)

for some ci ∈ R, i = 0, 1, 2, . . . , n− 1 (n = [α] + 1).

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1067 Xiaohong Zuo et al 1065-1076

Page 316: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Lemma 2.6. For any y ∈ C[0, T ], the unique solution of the linear fractional boundary value problem

cDαu(t) = y(t), t ∈ [0, T ], α ∈ (2, 3],

u(0) = µ0u(T ) + ν0

∫ T

0

g0(s, u(s))ds, wi(0) = µiwi(T ) + νi

∫ T

0

gi(s, u(s))ds,(2.2)

is given by

u(t) =

∫ T

0

G(t, s)y(s)ds+ ν0ξ0

∫ T

0

g0(s, u(s))ds+ ν1η1(t)

∫ T

0

g1(s, u(s))ds+ ν2η2(t)

∫ T

0

g2(s, u(s))ds,

where G(t, s) is Green’s function given by

G(t, s) =

(t− s)α−1 + µ0ξ0(T − s)α−1

Γ(α)

+µ1η1(t)Tα1−1(T − s)α−α1−1

Γ(α− α1)+µ2η2(t)Tα2−2(T − s)α−α2−1

Γ(α− α2), s ≤ t,

µ0ξ0(T − s)α−1

Γ(α)+µ1η1(t)Tα1−1(T − s)α−α1−1

Γ(α− α1)+µ2η2(t)Tα2−2(T − s)α−α2−1

Γ(α− α2), t ≤ s,

(2.3)

η1(t) = ξ1[µ0T + (1− µ0)t],

η2(t) = ξ2[µ0[2µ1 + (1− µ1)(2− α1)]T 2 + 2µ1T (1− µ0)t+ (1− µ0)(1− µ1)(2− α1)t2],

ξ0 =1

1− µ0, ξ1 =

Γ(2− α1)

(1− µ0)(1− µ1), ξ2 =

Γ(3− α2)

2(1− µ0)(1− µ1)(1− µ2)(2− α1).

Proof. Using (2.1), for some constants b0, b1, b2 ∈ R, we have

u(t) = Iαy(t) + b0 + b1t+ b2t2. (2.4)

Using the facts that cDα1b = 0 (b is constant and 0 < α1 < 1), cDα1t = t1−α1

Γ(2−α1) , cDα1t2 = 2t2−α1

Γ(3−α1) , andcDα1Iαy(t) = Iα−α1y(t), we obtain

cDα1u(t) = Iα−α1y(t) +b1

Γ(2− α1)t1−α1 +

2b2Γ(3− α1)

t2−α1 . (2.5)

In view of cDα2t = 0 (1 < α2 < 2), cDα2t2 = 2t2−α2

Γ(3−α2) , and cDα2Iαy(t) = Iα−α2y(t), we get

cDα2u(t) = Iα−α2y(t) +2b2

Γ(3− α2)t2−α2 . (2.6)

From (2.5) and (2.6), we have

tα1−1cDα1u(t) = tα1−1Iα−α1y(t) +b1

Γ(2− α1)+

2b2Γ(3− α1)

t, (2.7)

tα2−2cDα2u(t) = tα2−2Iα−α2y(t) +2b2

Γ(3− α2). (2.8)

From [?], we can know that

limt→0+

tα1−1Iα−α1y(t) = 0, limt→0+

tα2−2Iα−α2y(t) = 0. (2.9)

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1068 Xiaohong Zuo et al 1065-1076

Page 317: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Applying the boundary conditions for problem (2.2) and (2.9) in (2.4), (2.7) and (2.8), we find that

b0 =µ0

1− µ0Iαy(T ) +

µ0µ1Γ(2− α1)Tα1

(1− µ0)(1− µ1)Iα−α1y(T )

+µ0µ2Γ(3− α2)[2µ1 + (1− µ1)(2− α1)]Tα2

2(1− µ0)(1− µ1)(1− µ2)(2− α1)Iα−α2y(T ) +

ν0

1− µ0

∫ T

0

g0(s, u(s))ds

+µ0ν1Γ(2− α1)T

(1− µ0)(1− µ1)

∫ T

0

g1(s, u(s))ds+µ0ν2Γ(3− α2)[2µ1 + (1− µ1)(2− α1)]T 2

2(1− µ0)(1− µ1)(1− µ2)(2− α1)

∫ T

0

g2(s, u(s))ds,

b1 =µ1Γ(2− α1)Tα1−1

1− µ1Iα−α1y(T ) +

µ1µ2Γ(3− α2)Tα2−1

(1− µ1)(1− µ2)(2− α1)Iα−α2y(T )

+ν1Γ(2− α1)

1− µ1

∫ T

0

g1(s, u(s))ds+µ1ν2Γ(3− α2)T

(1− µ1)(1− µ2)(2− α1)

∫ T

0

g2(s, u(s))ds,

b2 =µ2Γ(3− α2)Tα2−2

2(1− µ2)Iα−α2y(T ) +

ν2Γ(3− α2)

2(1− µ2)

∫ T

0

g2(s, u(s))ds.

Thus, the unique solution of (2.2) is

u(t) = Iαy(t) + µ0ξ0Iαy(T ) + µ1η1(t)Tα1−1Iα−α1y(T ) + µ2η2(t)Tα2−2Iα−α2y(T )

+ν0ξ0

∫ T

0

g0(s, u(s))ds+ ν1η1(t)

∫ T

0

g1(s, u(s))ds+ ν2η2(t)

∫ T

0

g2(s, u(s))ds

=

∫ T

0

G(t, s)y(s)ds+ ν0ξ0

∫ T

0

g0(s, u(s))ds+ ν1η1(t)

∫ T

0

g1(s, u(s))ds+ ν2η2(t)

∫ T

0

g2(s, u(s))ds,

where G(t, s) is given by (2.3). The proof is completed.

3 Main results

For the sake of simplicity, we always consider the boundary value problem (1.1) together with the following

assumptions.

(H1) There exist positive constants Li and Mi (i = 0, 1, 2) such that

‖gi(t, u)− gi(t, v)‖ ≤ Li‖x− y‖, ‖gi(t, u)‖ ≤Mi, ∀t ∈J , u, v ∈ R.

(H2) There exist continuous function Li : [0, T ]→ R+ = [0,∞) (i = 1, 2, 3) such that

‖f(t, u, φu, ψu)−f(t, v, φv, ψv)‖ ≤ L1(t)‖u−v‖+L2(t)‖φu−φv‖+L3(t)‖ψu−ψv‖, ∀t ∈J , u, v ∈ R.

(H3) There exist continuous functions p, q : [0, T ]→ R+ such that∥∥∥∥∫ t

0

(γ(t, s, u(s))− γ(t, s, v(s)))ds

∥∥∥∥ ≤ p(t)‖u− v‖, ∀t ∈J , u, v ∈ R,∥∥∥∥∥∫ T

0

(δ(t, s, u(s))− δ(t, s, v(s)))ds

∥∥∥∥∥ ≤ q(t)‖u− v‖, ∀t ∈J , u, v ∈ R.

(H4) ρ = (L0|ν0ξ0|+ L1λ1|ν1|+ L2λ2|ν2|)T + L3λ3 < 1, where

λ1 = sup|η1(t)| : t ∈J , λ2 = sup|η2(t)| : t ∈J ,

L3 = supM(t) = L1(t) + L2(t)p(t) + L3(t)q(t) : t ∈J .

λ3 =(1 + |µ0ξ0|)Tα

Γ(α+ 1)+

λ1|µ1|Tα−1

Γ(α− α1 + 1)+

λ2|µ2|Tα−2

Γ(α− α2 + 1),

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1069 Xiaohong Zuo et al 1065-1076

Page 318: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

(H5) ‖f(t, u(t), (φu)(t), (ψu)(t))‖ ≤ ω(t), for all (t, u, φu, ψu) ∈ [0, T ]× R× R× R, where ω ∈ L1([, T ],R+).

Theorem 3.1. Assume that (H1)-(H4) hold. Then the boundary value problem (1.1) has a unique solution

on J .

Proof. Define F : C → C by

(Fu)(t) =

∫ t

0

(t− s)α−1

Γ(α)f(s, u(s), (φu)(s), (ψu)(s))ds

+µ0ξ0

∫ T

0

(T − s)α−1

Γ(α)f(s, u(s), (φu)(s), (ψu)(s))ds

+µ1η1(t)Tα1−1

∫ T

0

(T − s)α−α1−1

Γ(α− α1)f(s, u(s), (φu)(s), (ψu)(s))ds

+µ2η2(t)Tα2−2

∫ T

0

(T − s)α−α2−1

Γ(α− α2)f(s, u(s), (φu)(s), (ψu)(s))ds

+ν0ξ0

∫ T

0

g0(s, u(s))ds+ ν1η1(t)

∫ T

0

g1(s, u(s))ds+ ν2η2(t)

∫ T

0

g2(s, u(s))ds, t ∈J .

Let us set

supL2(t) : t ∈J = L2, supL3(t) : t ∈J = L3, sup

∥∥∥∥∫ t

0

γ(t, τ, 0)dτ

∥∥∥∥ : t ∈J

= M3,

sup

∥∥∥∥∫ t

0

δ(t, τ, 0)dτ

∥∥∥∥ : t ∈J

= M4, sup‖f(t, 0, 0, 0)‖ : t ∈J = M5.

According to the assumptions (H2) and (H3), we have

‖(φu)(s)‖ ≤∥∥∥∥∫ s

0

(γ(s, τ, u(τ))− γ(s, τ, 0))dτ

∥∥∥∥+

∥∥∥∥∫ s

0

γ(s, τ, 0)dτ

∥∥∥∥≤ p(s)‖u‖+

∥∥∥∥∫ s

0

γ(s, τ, 0)dτ

∥∥∥∥ ≤ p(s)‖u‖+M3,

‖(ψu)(s)‖ ≤

∥∥∥∥∥∫ T

0

(δ(s, τ, u(τ))− δ(s, τ, 0))dτ

∥∥∥∥∥+

∥∥∥∥∥∫ T

0

δ(s, τ, 0)dτ

∥∥∥∥∥≤ q(s)‖u‖+

∥∥∥∥∥∫ T

0

δ(s, τ, 0)dτ

∥∥∥∥∥ ≤ q(s)‖u‖+M4.

From the two above inequalities, we get

‖f(s, u(s), (φu)(s), (ψu)(s))‖ ≤ ‖f(s, u(s), (φu)(s), (ψu)(s))− f(s, 0, 0, 0)‖+ ‖f(s, 0, 0, 0)‖≤ L1(s)‖u(s)‖+ L2(s)‖(φu)(s)‖+ L3(s)‖(ψu)(s))‖+ ‖f(s, 0, 0, 0)‖≤ (L1(s) + L2(s)p(s) + L3(s)q(s))‖u‖+ (L2(s)M3 + L3(s)M4) +M5

≤ M(s)‖u‖+ (L2M3 + L3M4) +M5 = M(s)‖u‖+M∗,

where M∗ = (L2M3 + L3M4) +M5. And consider Br = u ∈ C : ‖u‖ ≤ r, where r ≥ ρ1/(1− ρ), with

ρ1 = (M0|ν0ξ0|+M1λ1|ν1|+M2λ2|ν2|)T + λ3M∗,

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1070 Xiaohong Zuo et al 1065-1076

Page 319: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

and ρ is given by the assumption (H4). Now we show that FBr ⊂ Br. For u ∈ Br, we have

‖(Fu)(t)‖ ≤∫ t

0

(t− s)α−1

Γ(α)‖f(s, u(s), (φu)(s), (ψu)(s))‖ds

+|µ0ξ0|∫ T

0

(T − s)α−1

Γ(α)‖f(s, u(s), (φu)(s), (ψu)(s))‖ds

+|µ1η1(t)|Tα1−1

∫ T

0

(T − s)α−α1−1

Γ(α− α1)‖f(s, u(s), (φu)(s), (ψu)(s))‖ds

+|µ2η2(t)|Tα2−2

∫ T

0

(T − s)α−α2−1

Γ(α− α2)‖f(s, u(s), (φu)(s), (ψu)(s))‖ds

+|ν0ξ0|∫ T

0

‖g0(s, u(s))‖ds+ |ν1η1(t)|∫ T

0

‖g1(s, u(s))‖ds+ |ν2η2(t)|∫ T

0

‖g2(s, u(s))‖ds

≤∫ t

0

(t− s)α−1

Γ(α)(M(s)‖u‖+M∗)ds+ |µ0ξ0|

∫ T

0

(T − s)α−1

Γ(α)(M(s)‖u‖+M∗)ds

+|µ1η1(t)|Tα1−1

∫ T

0

(T − s)α−α1−1

Γ(α− α1)(M(s)‖u‖+M∗)ds

+|µ2η2(t)|Tα2−2

∫ T

0

(T − s)α−α2−1

Γ(α− α2)(M(s)‖u‖+M∗)ds

+|ν0ξ0|∫ T

0

[‖g0(s, u(s))− g0(s, 0)‖+ ‖g0(s, 0)‖]ds

+|ν1η1(t)|∫ T

0

[‖g1(s, u(s))− g1(s, 0)‖+ ‖g1(s, 0)‖]ds

+|ν2η2(t)|∫ T

0

[‖g2(s, u(s))− g2(s, 0)‖+ ‖g2(s, 0)‖]ds

≤ (L3r +M∗)

(∫ t

0

(t− s)α−1

Γ(α)ds+ |µ0ξ0|

∫ T

0

(T − s)α−1

Γ(α)ds

+|µ1η1(t)|Tα1−1

∫ T

0

(T − s)α−α1−1

Γ(α− α1)ds+ |µ2η2(t)|Tα2−2

∫ T

0

(T − s)α−α2−1

Γ(α− α2)ds

)+|ν0ξ0|(L0r +M0)T + |ν1η1(t)|(L1r +M1)T + |ν2η2(t)|(L2r +M2)T

≤ (L3r +M∗)

((1 + |µ0ξ0|)Tα

Γ(α+ 1)+

λ1|µ1|Tα−1

Γ(α− α1 + 1)+

λ2|µ2|Tα−2

Γ(α− α2 + 1)

)+|ν0ξ0|(L0r +M0)T + λ1|ν1|(L1r +M1)T + λ2|ν2|(L2r +M2)T

= [(L0|ν0ξ0|+ L1λ1|ν1|+ L2λ2|ν2|)T + L3λ3]r

+(M0|ν0ξ0|+M1λ1|ν1|+M2λ2|ν2|)T + λ3M∗ ≤ ρr + ρ1 ≤ r.

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1071 Xiaohong Zuo et al 1065-1076

Page 320: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Now, for u, v and for each t ∈ [0, T ], we obtain

‖(Fu)(t)− (Fv)(t)‖

≤∫ t

0

(t− s)α−1

Γ(α)‖f(s, u(s), (φu)(s), (ψu)(s))− f(s, v(s), (φv)(s), (ψv)(s))‖ds

+|µ0ξ0|∫ T

0

(T − s)α−1

Γ(α)‖f(s, u(s), (φu)(s), (ψu)(s))− f(s, v(s), (φv)(s), (ψv)(s))‖ds

+|µ1η1(t)|Tα1−1

∫ T

0

(T − s)α−α1−1

Γ(α− α1)‖f(s, u(s), (φu)(s), (ψu)(s))− f(s, v(s), (φv)(s), (ψv)(s))‖ds

+|µ2η2(t)|Tα2−2

∫ T

0

(T − s)α−α2−1

Γ(α− α2)‖f(s, u(s), (φu)(s), (ψu)(s))− f(s, v(s), (φv)(s), (ψv)(s))‖ds

+|ν0ξ0|∫ T

0

‖g0(s, u(s))− g0(s, v(s))‖ds+ |ν1η1(t)|∫ T

0

‖g1(s, u(s))− g1(s, v(s))‖ds

+|ν2η2(t)|∫ T

0

‖g2(s, u(s))− g2(s, v(s))‖ds

≤∫ t

0

(t− s)α−1

Γ(α)M(s)‖u− v‖ds+ |µ0ξ0|

∫ T

0

(T − s)α−1

Γ(α)M(s)‖u− v‖ds

+|µ1η1(t)|Tα1−1

∫ T

0

(T − s)α−α1−1

Γ(α− α1)M(s)‖u− v‖ds

+|µ2η2(t)|Tα2−2

∫ T

0

(T − s)α−α2−1

Γ(α− α2)M(s)‖u− v‖ds

+|ν0ξ0|∫ T

0

L0‖u− v‖ds+ |ν1η1(t)|∫ T

0

L1‖u− v‖ds+ |ν2η2(t)

∫ T

0

L2|‖u− v‖ds

≤ L3

((1 + |µ0ξ0|)Tα

Γ(α+ 1)+

λ1|µ1|Tα−1

Γ(α− α1 + 1)+

λ2|µ2|Tα−2

Γ(α− α2 + 1)

)‖u− v‖

+(M0|ν0ξ0|+M1λ1|ν1|+M2λ2|ν2|)T‖u− v‖= [(M0|ν0ξ0|+M1λ1|ν1|+M2λ2|ν2|)T + L3λ3]‖u− v‖ = ρ‖u− v‖.

Observe that ρ depends only on the parameters involved in the problem. As ρ < 1 (H4), therefore F is

a contraction. Thus, by the contraction mapping principle (Banach fixed point theorem), it follows that

problem (1.1) has a unique solution on [0, T ].

Our next existence results is based on Krasnoselskii fixed point theorem [31].

Theorem 3.2. (Krasnoselskii). Let M be a closed, bounded, convex, and nonempty subset of a Banach

space X. Let A, B be two operators such that (i) Ax + By ∈ M whenever x, y ∈ M ; (ii) A is compact and

continuous; (iii) B is a contraction mapping. Then there exisz ∈M such that z = Az +Bz.

Theorem 3.3. Assume that (H1)-(H3) and (H5) hold. Then the boundary value problem (1.1) has at least

one solution on J provided

L3

(|µ0ξ0|Tα

Γ(α+ 1)+

λ1|µ1|Tα−1

Γ(α− α1 + 1)+

λ2|µ2|Tα−2

Γ(α− α2 + 1)

)+ (L0|ν0ξ0|+ L1λ1|ν1|+ L2λ2|ν2|)T < 1.

Proof. Let us fix

r ≥ (M0|ν0ξ0|+M1λ1|ν1|+M2λ2|ν2|)T + λ3‖ω‖L1 .

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1072 Xiaohong Zuo et al 1065-1076

Page 321: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

and consider Br = u ∈ S : ‖u‖ ≤ r. We define the operators Φ and Ψ on Br as

(Φu)(t) =

∫ t

0

(t− s)α−1

Γ(α)f(s, u(s), (φu)(s), (ψu)(s))ds,

(Ψu)(t) = µ0ξ0

∫ T

0

(T − s)α−1

Γ(α)f(s, u(s), (φu)(s), (ψu)(s))ds

+µ1η1(t)Tα1−1

∫ T

0

(T − s)α−α1−1

Γ(α− α1)f(s, u(s), (φu)(s), (ψu)(s))ds

+µ2η2(t)Tα2−2

∫ T

0

(T − s)α−α2−1

Γ(α− α2)f(s, u(s), (φu)(s), (ψu)(s))ds

+ν0ξ0

∫ T

0

g0(s, u(s))ds+ ν1η1(t)

∫ T

0

g1(s, u(s))ds+ ν2η2(t)

∫ T

0

g2(s, u(s))ds.

Let us observe that if u, v ∈ Br, we find that

‖(Φu)(t) + (Ψv)(t)‖ =

∥∥∥∥∫ t

0

(t− s)α−1

Γ(α)f(s, u(s), (φu)(s), (ψu)(s))ds

+µ0ξ0

∫ T

0

(T − s)α−1

Γ(α)f(s, v(s), (φv)(s), (ψv)(s))ds

+µ1η1(t)Tα1−1

∫ T

0

(T − s)α−α1−1

Γ(α− α1)f(s, v(s), (φv)(s), (ψv)(s))ds

+µ2η2(t)Tα2−2

∫ T

0

(T − s)α−α2−1

Γ(α− α2)f(s, v(s), (φv)(s), (ψv)(s))ds

+ν0ξ0

∫ T

0

g0(s, v(s))ds+ ν1η1(t)

∫ T

0

g1(s, v(s))ds+ ν2η2(t)

∫ T

0

g2(s, v(s))ds

∥∥∥∥∥≤ ‖ω‖L1

((1 + |µ0ξ0|)Tα

Γ(α+ 1)+

λ1|µ1|Tα−1

Γ(α− α1 + 1)+

λ2|µ2|Tα−2

Γ(α− α2 + 1)

)+(M0|ν0ξ0|+M1λ1|ν1|+M2λ2|ν2|)T

= (M0|ν0ξ0|+M1λ1|ν1|+M2λ2|ν2|)T + λ3‖ω‖L1 ≤ r.

Thus, Φu+ Ψv ∈ Br. It follows from the assumption (H1)-(H3) that Ψ is a contraction mapping for

L3

(|µ0ξ0|Tα

Γ(α+ 1)+

λ1|µ1|Tα−1

Γ(α− α1 + 1)+

λ2|µ2|Tα−2

Γ(α− α2 + 1)

)+ (L0|ν0ξ0|+ L1λ1|ν1|+ L2λ2|ν2|)T < 1.

Continuity of f implies that the operator Φ is continuous. Also, Φ is uniformly bounded on Br as ‖Φu‖ ≤‖ω‖L1/Γ(α+ 1). Now we prove the compactness of the operator Φ. In view of (H2), we define

sup(t,u,φu,ψu)∈Ω

‖f(t, u, φu, ψu)‖ = fmax, Ω = J ×Br ×Br ×Br,

and consequently, for t1, t2 ∈J with t1 < t2, we have

‖(Φu)(t2)− (Φu)(t1)‖ ≤∥∥∥∥∫ t1

0

(t2 − s)α−1 − (t1 − s)α−1

Γ(α)f(s, u(s), (φu)(s), (ψu)(s))ds

∥∥∥∥+

∥∥∥∥∫ t2

t1

(t2 − s)α−1

Γ(α)f(s, u(s), (φu)(s), (ψu)(s))ds

∥∥∥∥≤ fmax

Γ(α+ 1)|2(t2 − t1)α + tα1 − tα2 |,

which is independent of x. So Φ is relatively compact on Br. Hence, By Arzela Ascoli Theorem, Φ is compact

on Br. Thus all the assumptions of Theorem 3.2 are satisfied and the conclusion of Theorem 3.2 implies that

the boundary value problem (1.1) has at least one solution on J .

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1073 Xiaohong Zuo et al 1065-1076

Page 322: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

4 An example

Consider the following nonlinear fractional integrodifferential equations boundary value problem

cD5/2u(t) =1

10+

1

(5 + t)2

|u(t)|1 + |u(t)|

+

∫ t

0

|u(s)|25et + s

ds+

∫ 1

0

|u(s)|e−t

25 + |u(s)|2 + sds, t ∈J = [0, 1],

u(0) =1

2u(1) +

∫ 1

0

|u(s)|10 + |u(s)|+ s

ds, limt→0+

[t−1/2cD1/2u(t)] =1

3D1/2u(1) +

∫ 1

0

1

4 + |u(s)|+ sds,

limt→0+

[t−1/2cD3/2u(t)] =1

4D3/2u(1) +

∫ 1

0

|u(s)|17 + |u(s)|+ s

ds.

(4.1)

Here T = 1, α = 5/2, α1 = 1/2, α2 = 3/2, µ0 = 1/2, µ1 = 1/3, µ2 = 1/4, ν0 = ν1 = ν2 = 1, and

f(t, x, y, z) =1

10+

1

(5 + t)2

x

10 + x+ y + z, γ(t, s, u) =

|u|25et + s

, δ(t, s, u) =|u|e−t

25 + |u|2 + s,

g0(s, u) =|u|

10 + |u|+ s, g1(s, u) =

1

4 + |u|+ s, g2(s, u) =

|u|17 + |u|+ s

.

As

‖f(t, x1, y1, z1)− f(t, x2, y2, z2)‖ ≤ 1

(5 + t)2‖x1 − x2‖+ ‖y1 − y2‖+ ‖z1 − z2‖,

‖g0(s, u)− g0(s, v)‖ ≤ 1

10‖u− v‖, ‖g0(s, u)‖ ≤ 1, ‖g1(s, u)− g1(s, v)‖ ≤ 1

16‖u− v‖, ‖g0(s, u)‖ ≤ 1

4,

‖g2(s, u)− g2(s, v)‖ ≤ 1

17‖u− v‖, ‖g0(s, u)‖ ≤ 1,

∥∥∥∥∫ t

0

(|u(s)|

25et + s− |v(s)|

25et + s

)ds

∥∥∥∥ ≤ 1

25et‖u− v‖,∥∥∥∥∫ 1

0

(|u(s)|e−t

25 + |u(s)|2 + s− |v(s)|e−t

25 + |v(s)|2 + s

)ds

∥∥∥∥ ≤ 1

25et‖u− v‖,

therefore, (H1)-(H3) are satisfied with L0 = 1/10, L1 = 1/16, L2 = 1/17, L1(t) = 1/(5+t)2, L2(t) = L3(t) =

1, p(t) = q(t) = 1/(25et). Further, ξ0 = 2, ξ1 = 3√π/2, ξ2 = 4

√π/3, λ1 = sup|η1(t)| = (3

√π/4)|1 + t| : t ∈

J = 3√π/2, λ2 = sup|η2(t)| = (2

√π/9)|3t2 + 2t + 5| : t ∈ J = 20

√π/9, λ3 = 16/(15

√π) + 29

√π/36,

L3 = supM(t) = L1(t) + L2(t)p(t) + L3(t)q(t) = 1/(5 + t)2 + 2/(25et) : t ∈J = 3/25, and

ρ = (L0|ν0ξ0|+ L1λ1|ν1|+ L2λ2|ν2|)T + L3λ3 =1

5+

16

125√π

+39307

√π

122400≈ 0.841414 < 1.

Thus, by Theorem 3.1, the boundary value problem (4.1) has a unique solution on [0, 1].

References

[1] V. Lakshmikantham, Theory of fractional functional differential equations, Nonlinear Anal., 69, 3337-

3343 (2008).

[2] R.P. Agarwal, D. O’Regan, Svatoslav Stanek, Positive solutions for Dirichlet problems of singular non-

linear fractional differential equations, J. Math. Anal. Appl., 371, 57-68 (2010).

[3] C. Li, X. Luo, Y. Zhou, Existence of positive solutions of the boundary value problem for nonlinear

fractional differential equations, Comput. Math. Appl., 59, 1363-1375 (2010).

[4] R.P. Agarwal, V. Lakshmikantham, J.J. Nieto, On the concept of solution for fractional differential

equations with uncertainty, Nonlinear Anal., 72, 2859-2862 (2010).

[5] B. Ahmad, J.J. Nieto, J. Pimentel, Some boundary value problems of fractional differential equations

and inclusions, Comput. Math. Appl., 62, 1238-1250 (2011).

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1074 Xiaohong Zuo et al 1065-1076

Page 323: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

[6] B. Ahmad, S.K. Ntouyas, A. Alsaedi, New existence results for nonlinear fractional differential equations

with three-point integral boundary conditions, Adv. Differ. Equ., 2011, Art. ID 107384, 11 pages (2011).

[7] B. Ahmad A. Alsaedi, Nonlinear fractional differential equations with nonlocal fractional integro-

differential boundary conditions, Bound. Value Probl., 2012, 124, 10 pages (2012).

[8] B. Ahmad S. Sivasundaram On four-point nonlocal boundary value problems of nonlinear integro-

differential equations of fractional order, Appl. Math. Comput., 217, 480-487 (2010).

[9] B. Ahmad, S.K. Ntouyas, Existence results for nonlocal boundary value problems of fractional differential

equations and inclusions with strip conditions, Bound. Value Probl., 2012, 55, 21 pages (2012).

[10] B. Ahmad, S.K. Ntouyas, Nonlinear fractional differential equations and inclusions of arbitrary order

and multi-strip boundary conditions, Electron. J. Differ. Equ., 2012, No. 98, pp. 1-22, (2012).

[11] R.P. Agarwal, B. Ahmad, Existence theory for anti-periodic boundary value problems of fractional

differential equations and inclusions, Comput. Math. Appl., 62, 1200-1214 (2011).

[12] A. Alsaedi,B. Ahmad, A. Assolami, On antiperiodic boundary value problems for higher-order fractional

differential equations, Abstr. Appl. Anal., 2012, Art. ID 325984 (2012).

[13] H.A.H. Salem, Fractional order boundary value problem with integral boundary conditions involving

Pettis integral, Acta Math. Sci., 31B(2), 661-672 (2011).

[14] X. Liu, M. Jia, B. Wu, Existence and uniqueness of solution for fractional differential equations with

integral boundary conditions, Electron. J. Qual. Theory Differ. Equ., 2009, no. 69, pp. 1-10 (2009).

[15] S. Hamani, M. Benchohra, J.R. Graef, Existence results for boundary value problems with nonlinear

fractional inclusions and integral conditions, Electron. J. Differ. Equ., 2010, no. 20, pp. 1-16 (2010).

[16] A. Guezane-Lakoud, R. Khaldi, Solvability of a fractional boundary value problem with fractional inte-

gral condition,Nonlinear Anal. 75, 2692-2700 (2012).

[17] B. Ahmad, J.J. Nieto, Anti-periodic fractional boundary value problems. Comput. Math. Appl., 62,

1150-1156 (2011).

[18] F. Wang, Z. Liu, Anti-periodic fractional boundary value problems for nonlinear differential equations

of fractional order, Adv. Differ. Equ., 2012, 116 (2012).

[19] B. Ahmad, J.J. Nieto, Existence results for nonlinear boundary value problems of fractional integrod-

ifferential equations with integral boundary conditions, Bound. Value Probl., 2009, Art. ID 708576, 11

pages (2009).

[20] X. Wang, X. Guo, G. Tang, Anti-periodic fractional boundary value problems for nonlinear differential

equations of fractional order, J Appl. Math. Comput., 41(1-2), 367-375 (2013).

[21] G. Chai, Existence results for anti-periodic boundary value problems of fractional differential equations,

Adv. Differ. Equ, 2013, 53, 15 pages (2013).

[22] A. Alsaedi, Existence of solutions for integrodifferential equations of fractional order with antiperiodic

boundary conditions, Int. J. Differ. Equ., 2009, Art. ID 417606, 9 pages (2009).

[23] B. Ahmad, J.J. Nieto, A. Alsaedi, Existence and uniqueness of solutions for nonlinear fractional differen-

tial equations with non-separated type integral boundary conditions, Acta Math. Sci., 31B(6), 2122-2130

(2011).

11

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1075 Xiaohong Zuo et al 1065-1076

Page 324: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

[24] B. Ahmad, S.K. Ntouyas, A boundary value problem of fractional differential equations with anti-periodic

type integral boundary conditions, J. Comput. Anal. Appl., 15(8), 1372-1380 (2013).

[25] B. Ahmad, S.K. Ntouyas, A. Alsaedi, On fractional differential inclusions with anti-periodic type integral

boundary conditions, Bound. Value Probl., 2013, 82 (2013).

[26] A. Cabada, G. Wang, Positive solutions of nonlinear fractional differential equations with integral bound-

ary value conditions, J. Math. Anal. Appl., 389, 403-411 (2012).

[27] G.A. Anastassiou, Fractional Differentiation Inequalities, Springer, Dordrecht (2009).

[28] M. Jia, X. Liu, Three nonnegative solutions for fractional differential equations with integral boundary

conditions, Comput. Math. Appl., 62, 1405-1412 (2011).

[29] A.A. Kilbas, H.M. Srivastava, J.J. Trujillo, Theory and Applications of Fractional Differential Equations,

North-Holland Math. Stud., vol. 204, Elsevier Science B.V., Amsterdam, 2006.

[30] I. Podlubny, Fractional Differential Equations, Math. Sci. Eng., Academic Press, New York, 1999.

[31] D.R. Smart, Fixed Point Theorems, Cambridge University Press, Cambridge, 1980.

12

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1076 Xiaohong Zuo et al 1065-1076

Page 325: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

IDENTITIES OF SYMMETRY FOR HIGHER-ORDER

q-BERNOULLI POLYNOMIALS

DAE SAN KIM AND TAEKYUN KIM

Abstract. Recently, the higher-order Carlitz’s q-Bernoulli polynomials are

represented as q-Volkenborn integral on Zp by Kim. A question was asked in

[13] as to finding the extended formulae of symmetries for Bernoulli polyno-mials which are related to Carlitz q-Bernoulli polynomials. In this paper, we

give some new identities of symmetry for the higher-order Carlitz’s q-Bernoulli

polynomials which are derived from multivariate q-Volkenborn integrals on Zp.We note that they are a partial answer to that question.

1. Introduction

Let p be a fixed prime number. Throughout this paper, Zp, Qp and Cp will,respectively, denote the ring of p-adic rational integers, the field of p-adic rationalnumbers and the completion of algebraic closure of Qp. The p-adic absolute valuein Cp is normalized so that |p|p = p−1. Let q be an indeterminate in Cp with

|1− q|p < p−1

p−1 . We say that f is uniformly differentiable function at a pointa ∈ Zp, if the difference quotient,

Ff : Zp × Zp → Zp by Ff (x, y) =f (x)− f (y)

x− y,

have a limit l = f ′ (a) as (x, y)→ (a, a). If f is uniformly differentiable on Zp, wedenote this property by f ∈ UD (Zp).

For f ∈ UD (Zp) , the q-Volkenborn integral is defined by Kim to be

(1) Iq (f) =

∫Zp

f (x) dµq (x) = limN→∞

1

[pN ]q

pN−1∑x=0

f (x) qx,

where [x]q = 1−qx1−q , (see [12, 13, 14]).

From (1), we note that

(2) qIq (f1) = Iq (f) + (q − 1) f (0) +q − 1

log qf ′ (0)

where f1 (x) = f (x+ 1).As is well known, the Bernoulli polynomials are defined by the generating func-

tion to be

(3)t

et − 1ext = eB(x)t =

∞∑n=0

Bn (x)tn

n!.

2000 Mathematics Subject Classification. 11B68; 11S80.Key words and phrases. Identities of symmetry; Higher-order Carlitz’s q-Bernoulli polynomial;

Multivariate q-Volkenborn integral.1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1077 DAE SAN KIM ET AL 1077-1088

Page 326: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

2 DAE SAN KIM AND TAEKYUN KIM

When x = 0, Bn = Bn (0) are called the Bernoulli numbers.By (3), we get

(4) (B + 1)n −Bn =

1 if n = 1

0 if n > 1,and B0 = 1.

In [3], Carlitz defined q-Bernoulli numbers as follows :

(5) β0,q = 1, q (qβq + 1)n − βn,q =

1, if n = 1

0, if n > 1,

with the usual convention about replacing βiq by βi,q.

From (4) and (5), we note that limq→1

βn,q = Bn.

The q-Bernoulli polynomials are given by

βn,q (x) =n∑

l=0

(n

l

)qlxβl,q [x]

n−lq(6)

=(qxβq + [x]q

)n, (n ≥ 0) , (see [2, 3, 4, 14]).

In [12], Kim proved that Carlitz q-Bernoulli polynomials can be written by q-Volkenborn integral on Zp as follows :

βn,q (x) =

∫Zp

[x+ y]nq dµq (y)(7)

=

n∑l=0

(n

l

)[x]

n−lq qlx

∫Zp

[y]lq dµq (x) .

Thus, by (7), we get

(8) βn,q =

∫Zp

[x]nq dµq (x) , (n ≥ 0) .

From (2), we note that

(9) q

∫Zp

[x+ 1]nq dµq (x)−

∫Zp

[x]nq dµq (x) =

q − 1 if n = 0

1 if n = 1

0 if n > 1.

By (7), (8) and (9), we see that

(10) β0,q = 1, q (qβq + 1)n − βn,q =

1 if n = 1

0 if n > 1.

Let

I1 (f) = limq→1

Iq (f) =

∫Zp

f (x) dµ1 (x)(11)

= limN→∞

1

pN

pN−1∑x=0

f (x) , (see [12, 23, 24]) .

Then, by (2), we get

(12) I1 (f1)− I1 (f) = f ′ (0) .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1078 DAE SAN KIM ET AL 1077-1088

Page 327: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

IDENTITIES OF SYMMETRY FOR HIGHER-ORDER q-BERNOULLI POLYNOMIALS 3

Let us take f (x) = etx. Then we have

(13)

∫Zp

extdµ1 (x) =t

et − 1=∞∑

n=0

Bntn

n!,

and

(14)

∫Zp

e(x+y)tdµ1 (y) =

(t

et − 1

)ext =

∞∑n=0

Bn (x)tn

n!.

For r ∈ N, the higher-order Bernoulli polynomials are defined by the generatingfunction to be

(15)

(t

et − 1

)r

ext =

(t

et − 1

)× · · · ×

(t

et − 1

)︸ ︷︷ ︸

r−times

ext =∞∑

n=0

B(r)n (x)

tn

n!.

By (14), we get∫Zp

· · ·∫Zp

e(x+y1+···+yr)dµ1 (y1) · · · dµ1 (yr) =

(t

et − 1

)r

ext(16)

=∞∑

n=0

B(r)n (x)

tn

n!.

In [3, 4], Carlitz introduced the q-extension of higher-order Bernoulli polynomialsas follows :

(17) β(r)n,q (x) =

1

(1− q)nn∑

l=0

(n

l

)(−1)

lqlx

(l + 1

[l + 1]q

)r

,

where n ≥ 0 and r ∈ N.

Note that limq→1

β(r)n,q (x) = B

(r)n (x).

From (16), we note that

(18)

∫Zp

· · ·∫Zp

(x+ y1 + · · ·+ yr)ndµ1 (y1) · · · dµ1 (yr) = B(r)

n (x) ,

where n ≥ 0 and r ∈ N.In this paper, we consider q-extensions of (17) which are related to higher-order

Carlitz’s q-Bernoulli polynomials. The purpose of this paper is to give some newand interesting identities of symmetry for the higher-order Carlitz’s q-Bernoullipolynomials which are derived from multivariate q-Volkenborn integral on Zp.

2. Identities of symmetry for higher-order q-Bernoulli polynomials

In the sense of q-extension of (18), we observe the following equation (19)∫Zp

· · ·∫Zp

[x+ y1 + · · ·+ yr]nq dµq (y1) · · · dµq (yn)(19)

=1

(1− q)nn∑

l=0

(n

l

)(−1)

lqlx

(l + 1

[l + 1]q

)r

.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1079 DAE SAN KIM ET AL 1077-1088

Page 328: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

4 DAE SAN KIM AND TAEKYUN KIM

Thus, by (17) and (19), we get

(20) β(r)n,q (x) =

∫Zp

· · ·∫Zp

[x+ y1 + · · ·+ yr]nq dµq (y1) · · · dµq (yr) ,

where n ≥ 0 and r ∈ N.

Let us consider the generating function of β(r)n,q (x) as follows :

(21)∞∑

n=0

β(r)n,q (x)

tn

n!=

∫Zp

· · ·∫Zp

e[x+y1+···+yr]qtdµq (y1) · · · dµq (yr) .

For w1, w2 ∈ N, we have

1

[w1]rq

∫Zp

· · ·∫Zp

e[w1w2x+w2

∑rl=1 jl+w1

∑rl=1 yl]

qtdµqw1 (y1) · · · dµqw1 (yr)

(22)

= limN→∞

(1

[w1]q [pN ]qw1

)r pN−1∑y1,··· , yr=0

e[w1w2x+w2

∑rl=1 jl+w1

∑rl=1 yl]

qtqw1(y1+···+yr)

= limN→∞

(1

[w1]q [w2pN ]qw1

)r

×w2p

N−1∑y1,··· ,yr=0

e[w1w2x+w2

∑rl=1 jl+w1

∑rl=1 yl]

qtqw1(y1+···+yr)

= limN→∞

(1

[w1w2pN ]q

)r

×w2−1∑

i1,··· , ir=0

pN−1∑y1,··· ,yr=0

e[w1w2x+

∑rl=1(w2jl+w1il+w1w2yl)]

qtqw1

∑rl=1(il+w2yl).

Thus, by (22), we get

1

[w1]rq

w1−1∑j1,··· ,jr=0

qw2

∑rl=1 jl(23)

×∫Zp

· · ·∫Zp

e[w1w2x+

∑rl=1(w2jl+w1yl)]

qtdµqw1 (y1) · · · dµqw1 (yr)

= limN→∞

(1

[w1w2pN ]q

)r w1−1∑j1,··· , jr=0

w2−1∑i1,··· , ir=0

×pN−1∑

y1,··· , yr=0

e[w1w2x+

∑rl=1(w2jl+w1il+w1w2yl)]

qtq∑r

l=1(w1il+w2jl+w1w2yl).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1080 DAE SAN KIM ET AL 1077-1088

Page 329: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

IDENTITIES OF SYMMETRY FOR HIGHER-ORDER q-BERNOULLI POLYNOMIALS 5

By the same method as (23), we get

1

[w2]rq

w2−1∑j1,··· ,jr=0

qw1

∑rl=1 jl(24)

×∫Zp

· · ·∫Zp

e[w1w2x+

∑rl=1(w1jl+w2yl)]

qtdµqw2 (y1) · · · dµqw2 (yl)

= limN→∞

(1

[w1w2pN ]q

)r w2−1∑j1,··· ,jr=0

w1−1∑i1,··· ,ir=0

×pN−1∑

y1,··· ,yr=0

e[w1w2x+

∑rl=1(w1jl+w2il+w1w2yl)]

qtq∑r

l=1(w2il+w1jl+w1w2yl).

Therefore, by (23), we obtain the following theorem.

Theorem 1. For w1, w2 ∈ N, we have

1

[w1]rq

w1−1∑j1,··· ,jr=0

qw2

∑rl=1 jl

×∫Zp

· · ·∫Zp

e[w1w2x+

∑rl=1(w2jl+w1yl)]

qtdµqw1 (y1) · · · dµqw1 (yr)

=1

[w2]rq

w2−1∑j1,··· ,jr=0

qw1

∑rl=1 jl

×∫Zp

· · ·∫Zp

e[w1w2x+

∑rl=1(w1jl+w2yl)]

qtdµqw2 (y1) · · · dµqw2 (yr) .

It is easy to show that

[w1w2x+ w2 (j1 + · · ·+ jr) + w1 (y1 + · · ·+ yr)]q(25)

= [w1]q

[w2x+

w2

w1(j1 + · · ·+ jr) + (y1 + · · ·+ yr)

]qw1

.

Therefore, by (20), Theorem 1 and (25), we obtain the following corollary, andtheorem.

Corollary 2. For n ≥ 0 and w1, w2 ∈ N, we have

[w1]n−rq

w1−1∑j1,··· ,jr=0

qw2

∑rl=1 jl

×∫Zp

· · ·∫Zp

[w2x+

w2

w1(j1 + · · ·+ jr) + y1 + · · ·+ yr

]nqw1

dµqw1 (y1) · · · dµqw1 (yr)

= [w2]n−rq

w2−1∑j1,··· ,jr=0

qw1

∑rl=1 jl

×∫Zp

· · ·∫Zp

[w1x+

w1

w2(j1 + · · ·+ jr) + y1 + · · ·+ yr

]nqw2

dµqw2 (y1) · · · dµqw2 (yr) .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1081 DAE SAN KIM ET AL 1077-1088

Page 330: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

6 DAE SAN KIM AND TAEKYUN KIM

Theorem 3. For n ≥ 0 and w1, w2 ∈ N, we have

[w1]n−rq

w1−1∑j1,··· ,jr=0

qw2(j1+···+jr)β(r)n,qw1

(w2x+

w2

w1(j1 + · · ·+ jr)

)

= [w2]n−rq

w2−1∑j1,··· ,jr=0

qw1(j1+···+jr)β(r)n,qw2

(w1x+

w1

w2(j1 + · · ·+ jr)

).

Remark. Let w2 = 1. Then we have

β(r)n,q (w1x) = [w1]

n−rq

w1−1∑j1,··· ,jr=0

qj1+···+jrβ(r)n,qw1

(x+

j1 + · · ·+ jrw1

).

By (20), we see that

∫Zp

· · ·∫Zp

[w2x+

w2

w1(j1 + · · ·+ jr) + y1 + · · ·+ yr

]nqw1

dµqw1 (y1) · · · dµqw1 (yr)

(26)

=n∑

i=0

(n

i

)([w2]q[w1]q

)i

[j1 + · · ·+ jr]iqw2 q

w2(n−i)∑r

l=1 jl

×∫Zp

· · ·∫Zp

[w2x+

r∑l=1

yl

]n−iqw1

dµqw1 (y1) · · · dµqw1 (yr)

=n∑

i=0

(n

i

)([w2]q[w1]q

)i

[j1 + · · ·+ jr]iqw2 q

w2(n−i)∑r

l=1 jlβ(r)n−i,qw1 (w2x) .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1082 DAE SAN KIM ET AL 1077-1088

Page 331: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

IDENTITIES OF SYMMETRY FOR HIGHER-ORDER q-BERNOULLI POLYNOMIALS 7

From Corollary 2 and (26), we have

[w1]n−rq

w1−1∑j1,··· ,jr=0

qw2

∑rl=1 jl(27)

×∫Zp

· · ·∫Zp

[w2x+

w2

w1

r∑l=1

jl +r∑

l=1

yl

]nqw1

dµqw1 (y1) · · · dµqw1 (yr)

=

w1−1∑j1,··· , jr=0

qw2

∑rl=1 jl

n∑i=0

(n

i

)[w2]

iq [w1]

n−i−rq

× [j1 + · · ·+ jr]iqw2 q

w2(n−i)∑r

l=1 jlβ(r)n−i,qw1 (w2x)

=n∑

i=0

(n

i

)[w2]

iq [w1]

n−i−rq β

(r)n−i,qw1 (w2x)

×w1−1∑

j1,··· ,jr=0

[j1 + · · ·+ jr]iqw2 q

w2(n−i+1)∑r

l=1 jl

=n∑

i=0

(n

i

)[w2]

n−iq [w1]

i−rq β

(r)i,qw1 (w2x)

×w1−1∑

j1,··· , jr=0

[j1 + · · ·+ jr]n−iqw2 q

w2(i+1)∑r

l=1 jl

=

n∑i=0

(n

i

)[w2]

n−iq [w1]

i−rq β

(r)i,qw1 (w2x)T

(r)n,i (w1|qw2) ,

where

(28) T(r)n,i (w|q) =

w−1∑j1,··· ,jr=0

[j1 + · · ·+ jr]n−iq q(i+1)

∑rl=1 jl .

By the same method as (28), we get

[w2]n−rq

w2−1∑j1,··· ,jr=0

qw1

∑rl=1 jl(29)

×∫Zp

· · ·∫Zp

[w1x+

w1

w2

r∑l=1

jl +r∑

l=1

yl

]nqw2

dµqw2 (y1) · · · dµqw2 (yl)

=

n∑i=0

(n

i

)[w1]

n−iq [w2]

i−rq β

(r)i,qw2 (w1x)T

(r)n,i (w2|qw1) .

Therefore, by Corollary 2, (27) and (29), we obtain the following theorem.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1083 DAE SAN KIM ET AL 1077-1088

Page 332: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

8 DAE SAN KIM AND TAEKYUN KIM

Theorem 4. For n ≥ 0 and r, w1, w2 ∈ N, we have

n∑i=0

(n

i

)[w1]

n−iq [w2]

i−rq β

(r)i,qw2 (w1x)T

(r)n,i (w2|qw1)

=n∑

i=0

(n

i

)[w2]

n−iq [w1]

i−rq β

(r)i,qw1 (w2x)T

(r)n,i (w1|qw2) ,

where

T(r)n,i (w|q) =

w−1∑j1,··· ,jr=0

[j1 + · · ·+ jr]n−iq q(i+1)

∑rl=1 jl .

For h ∈ Z and r ∈ N, we have∫Zp

· · ·∫Zp

[x+ y1 + · · ·+ yr]nq q

∑rl=1(h−l)yldµq (y1) · · · dµq (yr)

=

n∑j=0

(n

j

)(−1)

j qxj

(1− q)nlim

N→∞

1

[pN ]rq

pN−1∑y1,··· ,yr=0

qj∑r

l=1 ylq∑r

l=1(h−l+1)yl

=n∑

j=0

(n

j

)(−1)

j qxj

(1− q)n(j + h) (j + h− 1) · · · (j + h− r + 1)

[j + h]q [j + h− 1]q · · · [j + h− r + 1]q

=1

(1− q)nn∑

j=0

(n

j

)(−1)

jqxj

(j+hr

)(j+hr

)q

r!

[r]q!,

where

(x

r

)q

=[x]q [x−1]q···[x−r+1]q

[r]q !=

[x]q [x−1]q···[x−r+1]q[r]q [r−1]q···[2]q [1]q

.

From (18), we can also define q-extensions of higher-order Bernoulli polynomialsas follows :

(30) β(h,r)n,q (x) =

∫Zp

· · ·∫Zp

[x+ y1 + · · ·+ yr]nq q

∑rl=1(h−l)yldµq (y1) · · · dµq (yr) ,

where n ≥ 0 and h ∈ Z, r ∈ N.Let w1, w2 ∈ N. Then we see that

1

[w1]rq

w1−1∑j1,··· ,jr=0

qw2

∑rl=1(h−l+1)jl

(31)

×∫Zp

· · ·∫Zp

qw1

∑rl=1(h−l)yle

[w1w2x+∑r

l=1(w2jl+w1yl)]qtdµqw1 (y1) · · · dµqw1 (yr)

=1

[w2]rq

w2−1∑j1,··· ,jr=0

qw1

∑rl=1(h−l+1)jl

×∫Zp

· · ·∫Zp

qw2

∑rl=1(h−l)yle

[w1w2x+∑r

l=1(w1jl+w2yl)]qtdµqw2 (y1) · · · dµqw2 (yr) .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1084 DAE SAN KIM ET AL 1077-1088

Page 333: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

IDENTITIES OF SYMMETRY FOR HIGHER-ORDER q-BERNOULLI POLYNOMIALS 9

From (31), we have

[w1]n−rq

w1−1∑j1,··· ,jr=0

qw2

∑rl=1(h−l+1)jl

(32)

×∫Zp

· · ·∫Zp

qw1

∑rl=1(h−l)yl

[w2x+

w2

w1

r∑l=1

jl +r∑

l=1

yl

]nqw1

dµqw1 (y1) · · · dµqw1 (yr)

= [w2]n−rq

w2−1∑j1,··· ,jr=0

qw1

∑rl=1(h−l+1)jl

×∫Zp

· · ·∫Zp

qw2

∑rl=1(h−l)yl

[w1x+

w1

w2

r∑l=1

jl +r∑

l=1

yl

]nqw2

dµqw2 (y1) · · · dµqw2 (yr) ,

where n ≥ 0 and r ∈ N, h ∈ Z.Therefore, by (30) and (32), we obtain the following theorem.

Theorem 5. For n ≥ 0, h ∈ Z and w1, w2 ∈ N, we have

[w1]n−rq

w1−1∑j1,··· ,jr=0

qw2

∑rl=1(h−l+1)jlβ

(h,r)n,qw1

(w2x+

w2

w1(j1 + · · ·+ jr)

)

= [w2]n−rq

w2−1∑j1,··· ,jr=0

qw1

∑rl=1(h−l+1)jlβ

(h,r)n,qw2

(w1x+

w1

w2(j1 + · · ·+ jr)

).

From (30), we can derive the following equation :

∫Zp

· · ·∫Zp

qw1

∑rl=1(h−l)yl

[w2x+

w2

w1

r∑l=1

jl +r∑

l=1

yl

]nqw1

dµqw1 (y1) · · · dµqw1 (yr)

(33)

=n∑

i=0

(n

i

)([w2]q[w1]q

)i

[j1 + · · ·+ jr]iqw2 q

w2(n−i)∑r

l=1 jl

×∫Zp

· · ·∫Zp

qw1

∑rl=1(h−r)yl

[w2x+

r∑l=1

yl

]n−iqw1

dµqw1 (y1) · · · dµqw1 (yr)

=n∑

i=0

(n

i

)([w2]q[w1]q

)i

[j1 + · · ·+ jr]iqw2 q

w2(n−i)∑r

l=1 jlβ(h,r)n−i,qw1 (w2x) .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1085 DAE SAN KIM ET AL 1077-1088

Page 334: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

10 DAE SAN KIM AND TAEKYUN KIM

By (33), we get

[w1]n−rq

w1−1∑j1,··· ,jr=0

qw2

∑rl=1(h−l+1)jl

(34)

×∫Zp

· · ·∫Zp

qw1

∑rl=1(h−l)yl

[w2x+

w2

w1

r∑l=1

jl +r∑

l=1

yl

]nqw1

dµqw1 (y1) · · · dµqw1 (yr)

=

w1−1∑j1,··· ,jr=0

qw2

∑rl=1(h−l+1)jl

n∑i=0

(n

i

)[w2]

iq [w1]

n−i−rq [j1 + · · ·+ jr]

iqw2

× qw2(n−i)∑r

l=1 jlβ(h,r)n−i,qw1 (w2x)

=n∑

i=0

(n

i

)[w2]

iq [w1]

n−i−rq β

(h,r)n−i,qw1 (w2x)

w1−1∑j1,··· ,jr=0

[j1 + · · ·+ jr]iqw2

× qw2

∑rl=1(n+h−l−i+1)jl

=

n∑i=0

(n

i

)[w2]

n−iq [w1]

i−rq β

(h,r)i,qw1 (w2x)T

(h,r)n,i (w1|qw2) ,

where

(35) T(h,r)n,i (w|q) =

w−1∑j1,··· ,jr=0

[j1 + · · ·+ jr]n−iq q

∑rl=1(i+h−l+1)jl .

By the same method as (34), we see that

[w2]n−rq

w2−1∑j1,··· ,jr=0

qw1

∑rl=1(h−l+1)jl

(36)

×∫Zp

· · ·∫Zp

qw2

∑rl=1(h−l)yl

[w1x+

w1

w2

r∑l=1

jl +r∑

l=1

yl

]nqw1

dµqw2 (y1) · · · dµqw2 (yr)

=n∑

i=0

(n

i

)[w1]

n−iq [w2]

i−rq β

(h,r)i,qw2 (w1x)T

(h,r)n,i (w2|qw1) .

Therefore, by (34) and (36), we obtain the following theorem.

Theorem 6. For n ≥ 0, h ∈ Z and r, w1, w2 ∈ N, we haven∑

i=0

(n

i

)[w2]

n−iq [w1]

i−rq β

(h,r)i,qw1 (w2x)T

(h,r)n,i (w1|qw2)

=n∑

i=0

(n

i

)[w1]

n−iq [w2]

i−rq β

(h,r)i,qw2 (w1x)T

(h,r)n,i (w2|qw1) ,

where

T(h,r)n,i (w|q) =

w−1∑j1,··· ,jr=0

[j1 + · · ·+ jr]n−iq q

∑rl=1(h+i−l+1)jl .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1086 DAE SAN KIM ET AL 1077-1088

Page 335: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

IDENTITIES OF SYMMETRY FOR HIGHER-ORDER q-BERNOULLI POLYNOMIALS 11

Remark. A p-adic approach to identities of symmetry for Carlitz’s q-Bernoulli poly-nomials has been studied in [10].

AcknowledgementThis work was supported by the National Research Foundation of Korea (NRF)

grant funded by the Korea government (MOE) (No.2012R1A1A2003786).

References

1. M. Acikgoz, D. Erdal, and S. Araci, A new approach to q-Bernoulli numbers and q-Bernoulli

polynomials related to q-Bernstein polynomials, Adv. Difference Equ. (2010), Art. ID 951764,9.

2. W. A. Al-Salam, q-Bernoulli numbers and polynomials, Math. Nachr. 17 (1959), 239–260

(1959).3. L. Carlitz, q-Bernoulli numbers and polynomials, Duke Math. J. 15 (1948), 987–1000.

4. , Expansions of q-Bernoulli numbers, Duke Math. J. 25 (1958), 355–364.

5. M. Cenkci and V. Kurt, Congruences for generalized q-Bernoulli polynomials, J. Inequal.Appl. (2008), Art. ID 270713, 19.

6. J. Choi, T. Kim, and Y. H. Kim, A note on the extended q-Bernoulli numbers and polynomials,

Adv. Stud. Contemp. Math. (Kyungshang) 21 (2011), no. 4, 351–354.7. D. Ding and J. Yang, Some identities related to the Apostol-Euler and Apostol-Bernoulli

polynomials, Adv. Stud. Contemp. Math. (Kyungshang) 20 (2010), no. 1, 7–21.

8. D. V. Dolgy and T. Kim, A note on the weighted q-Bernoulli numbers and the weightedq-Bernstein polynomials, Honam Math. J. 33 (2011), no. 4, 519–527.

9. K.-W. Hwang, D. V. Dolgy, D. S. Kim, T. Kim, and S. H. Lee, Some theorems on Bernoulliand Euler numbers, Ars Combin. 109 (2013), 285–297.

10. D. S. Kim, T. Kim, and S.-H. Lee, A p-adic approach to identities of symmetry for Carlitz’s

q-Bernoulli polynomials (communicated), 2014.11. D. S. Kim, N. Lee, J. Na, and K. H. Park, Abundant symmetry for higher-order Bernoulli

polynomials (I), Adv. Stud. Contemp. Math. (Kyungshang) 23 (2013), no. 3, 461–482.

12. T. Kim, q-Volkenborn integration, Russ. J. Math. Phys. 9 (2002), no. 3, 288–299.13. , On the symmetries of the q-Bernoulli polynomials, Abstr. Appl. Anal. (2008), Art.

ID 914367, 7.

14. , q-Bernoulli numbers and polynomials associated with Gaussian binomial coefficients,Russ. J. Math. Phys. 15 (2008), no. 1, 51–57.

15. T. Kim and S.-H. Rim, Generalized Carlitz’s q-Bernoulli numbers in the p-adic number field,Adv. Stud. Contemp. Math. (Pusan) 2 (2000), 9–19.

16. T. Mansour, M. Shattuck, and C. Song, A q-analog of a general rational sum identity, Afr.

Mat. 24 (2013), no. 3, 297–303.17. H. Ozden, p-adic distribution of the unification of the Bernoulli, Euler and Genocchi polyno-

mials, Appl. Math. Comput. 218 (2011), no. 3, 970–973.

18. H. Ozden, I. N. Cangul, and Y. Simsek, Remarks on q-Bernoulli numbers associated withDaehee numbers, Adv. Stud. Contemp. Math. (Kyungshang) 18 (2009), no. 1, 41–48.

19. H.-K. Pak and S.-H. Rim, q-Bernoulli numbers and polynomials via an invariant p-adic q-

integral on Zp, Notes Number Theory Discrete Math. 7 (2001), no. 4, 105–110.20. J.-W. Park, D. V. Dolgy, T. Kim, S.-H. Lee, and S.-H. Rim, A note on the modified Carlitz’s

q-Bernoulli numbers and polynomials, J. Comput. Anal. Appl. 15 (2013), no. 4, 647–654.

21. S.-H. Rim, T. Kim, and B.-J. Lee, Some identities on the extended Carlitz’s q-Bernoullinumbers and polynomials, J. Comput. Anal. Appl. 14 (2012), 536–543.

22. S.-H. Rim, E.-J. Moon, S.-J. Lee, and J.-H. Jin, Multivariate twisted p-adic q-integral on Zp

associated with twisted q-Bernoulli polynomials and numbers, J. Inequal. Appl. (2010), Art.

ID 579509, 6.23. Y Simsek, Twisted (h, q)-Bernoulli numbers and polynomials related to twisted (h, q)-zeta

function and L-function, J. Math. Anal. Appl. 324 (2006), no. 2, 790–804.24. H. M. Srivastava, T. Kim, and Y. Simsek, q-Bernoulli numbers and polynomials associated

with multiple q-zeta functions and basic L-series, Russ. J. Math. Phys. 12 (2005), no. 2,241–268.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1087 DAE SAN KIM ET AL 1077-1088

Page 336: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

12 DAE SAN KIM AND TAEKYUN KIM

Department of Mathematics, Sogang University, Seoul 121-742, Re-public of KoreaE-mailaddress : [email protected]

Department of Mathematics, Kwangwoon University, Seoul 139-701,Republic of KoreaE-mailaddress : [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1088 DAE SAN KIM ET AL 1077-1088

Page 337: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

FUZZY STABILITY OF FUNCTIONAL EQUATIONS IN MATRIXFUZZY NORMED SPACES

CHOONKIL PARK, DONG YUN SHIN∗, AND JUNG RYE LEE

Abstract. Using the fixed point method, we prove the Hyers-Ulam stability of theCauchy additive functional equation and the quadratic functional equation in matrixfuzzy normed spaces.

1. Introduction and preliminaries

The abstract characterization given for linear spaces of bounded Hilbert space operatorsin terms of matricially normed spaces [65] implies that quotients, mapping spaces andvarious tensor products of operator spaces may again be regarded as operator spaces.Owing in part to this result, the theory of operator spaces is having an increasinglysignificant effect on operator algebra theory (see [19]).

The proof given in [65] appealed to the theory of ordered operator spaces [12]. Effrosand Ruan [20] showed that one can give a purely metric proof of this important theoremby using a technique of Pisier [55] and Haagerup [27] (as modified in [18]).

The stability problem of functional equations originated from a question of Ulam [71]concerning the stability of group homomorphisms.

The functional equationf(x+ y) = f(x) + f(y)

is called the Cauchy additive functional equation. In particular, every solution of theCauchy additive functional equation is said to be an additive mapping. Hyers [28] gavea first affirmative partial answer to the question of Ulam for Banach spaces. Hyers’Theorem was generalized by Aoki [2] for additive mappings and by Th.M. Rassias [59]for linear mappings by considering an unbounded Cauchy difference. A generalization ofthe Th.M. Rassias theorem was obtained by Gavruta [26] by replacing the unboundedCauchy difference by a general control function in the spirit of Th.M. Rassias’ approach.

In 1990, Th.M. Rassias [60] during the 27th International Symposium on FunctionalEquations asked the question whether such a theorem can also be proved for p ≥ 1. In1991, Gajda [25] following the same approach as in Th.M. Rassias [59], gave an affirmativesolution to this question for p > 1. It was shown by Gajda [25], as well as by Th.M. Rassiasand Semrl [64] that one cannot prove a Th.M. Rassias’ type theorem when p = 1 (cf. thebooks of Czerwik [16], Hyers, Isac and Th.M. Rassias [29]).

The functional equation

f(x+ y) + f(x− y) = 2f(x) + 2f(y)

2010 Mathematics Subject Classification. Primary 47L25, 47H10, 46S40, 39B82, 46L07, 39B52, 26E50.Key words and phrases. operator space; fixed point; Hyers-Ulam stability; matrix fuzzy normed space;

Cauchy additive functional equation; quadratic functional equation.∗Corresponding author.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1089 CHOONKIL PARK ET AL 1089-1101

Page 338: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

C. PARK, D. SHIN, AND J. LEE

is called a quadratic functional equation. In particular, every solution of the quadraticfunctional equation is said to be a quadratic mapping. A Hyers-Ulam stability problemfor the quadratic functional equation was proved by Skof [70] for mappings f : X → Y ,where X is a normed space and Y is a Banach space. Cholewa [13] noticed that thetheorem of Skof is still true if the relevant domain X is replaced by an Abelian group.Czerwik [14] proved the Hyers-Ulam stability of the quadratic functional equation. Thestability problems of several functional equations have been extensively investigated bya number of authors and there are many interesting results concerning this problem (see[1, 21, 30, 32, 33, 38, 39, 40, 41, 42, 43, 49, 53, 58, 61, 62, 63, 68, 69]).

The theory of fuzzy space has much progressed as developing the theory of randomness.Some mathematicians have defined fuzzy norms on a vector space from various points ofview [3, 24, 35, 37, 46, 72]. Following Cheng and Mordeson [8], Bag and Samanta [3] gavean idea of fuzzy norm in such a manner that the corresponding fuzzy metric is of Kramosiland Michalek type [36] and investigated some properties of fuzzy normed spaces [4].

We use the definition of fuzzy normed spaces given in [3, 46, 47] to investigate a fuzzyversion of the Hyers-Ulam stability for the Cauchy-Jensen functional equation in the fuzzynormed algebra setting.

Definition 1.1. [3, 46, 47, 48] Let X be a real vector space. A function N : X × R →[0, 1] is called a fuzzy norm on X if for all x, y ∈ X and all s, t ∈ R,

(N1) N(x, t) = 0 for t ≤ 0;(N2) x = 0 if and only if N(x, t) = 1 for all t > 0;(N3) N(cx, t) = N(x, t

|c|) if c 6= 0;

(N4) N(x+ y, s+ t) ≥ minN(x, s), N(y, t);(N5) N(x, ·) is a non-decreasing function of R and limt→∞N(x, t) = 1;(N6) for x 6= 0, N(x, ·) is continuous on R.

The pair (X,N) is called a fuzzy normed space.

Definition 1.2. [3, 46, 47, 48] (1) Let (X,N) be a fuzzy normed space. A sequence xnin X is said to be convergent or converge if there exists an x ∈ X such that limn→∞N(xn−x, t) = 1 for all t > 0. In this case, x is called the limit of the sequence xn and wedenote it by N -limn→∞ xn = x.

(2) Let (X,N) be a fuzzy normed space. A sequence xn in X is called Cauchy if foreach ε > 0 and each t > 0 there exists an n0 ∈ N such that for all n ≥ n0 and all p > 0,we have N(xn+p − xn, t) > 1− ε.

It is well-known that every convergent sequence in a fuzzy normed space is Cauchy. Ifeach Cauchy sequence is convergent, then the fuzzy norm is said to be complete and thefuzzy normed space is called a fuzzy Banach space.

We say that a mapping f : X → Y between fuzzy normed spaces X and Y is continuousat a point x0 ∈ X if for each sequence xn converging to x0 in X, then the sequencef(xn) converges to f(x0). If f : X → Y is continuous at each x ∈ X, then f : X → Yis said to be continuous on X (see [4]).

We introduce the concept of matrix fuzzy normed space.

Definition 1.3. Let (X,N) be a fuzzy normed space. (1) (X, Nn) is called a matrixfuzzy normed space if for each positive integer n, (Mn(X), Nn) is a fuzzy normed space

and Nk(AxB, t) ≥ Nn

(x, t‖A‖·‖B‖

)for all t > 0, A ∈ Mk,n(R), x = [xij] ∈ Mn(X) and

B ∈Mn,k(R) with ‖A‖ · ‖B‖ 6= 0.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1090 CHOONKIL PARK ET AL 1089-1101

Page 339: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

FUNCTIONAL EQUATIONS IN MATRIX FUZZY NORMED SPACES

(2) (X, Nn) is called a matrix fuzzy Banach space if (X,N) is a fuzzy Banach spaceand (X, Nn) is a matrix fuzzy normed space.

Example 1.4. Let (X, ‖ · ‖n) be a matrix normed space. Let Nn(x, t) := tt+‖x‖n for all

t > 0 and x = [xij] ∈Mn(X). Then

Nk(AxB, t) =t

t+ ‖AxB‖k≥ t

t+ ‖A‖ · ‖x‖n · ‖B‖=

t‖A‖·‖B‖t

‖A‖·‖B‖ + ‖x‖nfor all t > 0, A ∈Mk,n(R), x = [xij] ∈Mn(X) and B ∈Mn,k(R) with ‖A‖ · ‖B‖ 6= 0. So(X, Nn) is a matrix fuzzy normed space.

Let E,F be vector spaces. For a given mapping h : E → F and a given positive integern, define hn : Mn(E)→Mn(F ) by

hn([xij]) = [h(xij)]

for all [xij] ∈Mn(E).Let X be a set. A function d : X ×X → [0,∞] is called a generalized metric on X if

d satisfies(1) d(x, y) = 0 if and only if x = y;(2) d(x, y) = d(y, x) for all x, y ∈ X;(3) d(x, z) ≤ d(x, y) + d(y, z) for all x, y, z ∈ X.We recall a fundamental result in fixed point theory.

Theorem 1.5. [5, 17] Let (X, d) be a complete generalized metric space and let J : X → Xbe a strictly contractive mapping with Lipschitz constant α < 1. Then for each givenelement x ∈ X, either

d(Jnx, Jn+1x) =∞for all nonnegative integers n or there exists a positive integer n0 such that

(1) d(Jnx, Jn+1x) <∞, ∀n ≥ n0;(2) the sequence Jnx converges to a fixed point y∗ of J ;(3) y∗ is the unique fixed point of J in the set Y = y ∈ X | d(Jn0x, y) <∞;(4) d(y, y∗) ≤ 1

1−αd(y, Jy) for all y ∈ Y .

In 1996, G. Isac and Th.M. Rassias [31] were the first to provide applications of stabilitytheory of functional equations for the proof of new fixed point theorems with applications.By using fixed point methods, the stability problems of several functional equations havebeen extensively investigated by a number of authors (see [6, 7, 22, 23, 34, 45, 50, 51, 54,56]).

Throughout this paper, let (X, Nn) be a matrix fuzzy normed space and (Y, Nn) amatrix fuzzy Banach space.

In Section 2, we prove the Hyers-Ulam stability of the Cauchy additive functionalequation in matrix fuzzy normed spaces by using fixed point method.

In Section 3, we prove the Hyers-Ulam stability of the quadratic functional equation inmatrix fuzzy normed spaces by using fixed point method.

2. Hyers-Ulam stability of the Cauchy additive functional equation inmatrix fuzzy normed spaces

Using the fixed point method, we prove the Hyers-Ulam stability of the Cauchy additivefunctional equation in matrix fuzzy normed spaces.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1091 CHOONKIL PARK ET AL 1089-1101

Page 340: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

C. PARK, D. SHIN, AND J. LEE

We will use the following notations:Mn(X) is the set of all n× n-matrices in X;ej ∈M1,n(R) is that j-th component is 1 and the other components are zero;Eij ∈Mn(R) is that (i, j)-component is 1 and the other components are zero;Eij ⊗ x ∈Mn(X) is that (i, j)-component is x and the other components are zero.

Lemma 2.1. Let (X, Nn) be a matrix fuzzy normed space.(1) Nn(Ekl ⊗ x, t) = N(x, t) for all t > 0 and x ∈ X.(2) For all [xij] ∈Mn(X) and t =

∑ni,j=1 tij,

N(xkl, t) ≥ Nn([xij], t) ≥ minN(xij, tij) : i, j = 1, 2, · · · , n,

N(xkl, t) ≥ Nn([xij], t) ≥ minN(xij,

t

n2

): i, j = 1, 2, · · · , n

.

(3) limn→∞ xn = x if and only if limn→∞ xijn = xij for xn = [xijn], x = [xij] ∈Mk(X).

Proof. (1) Since Ekl ⊗ x = e∗kxel and ‖e∗k‖ = ‖el‖ = 1, Nn(Ekl ⊗ x, t) ≥ N(x, t). Sinceek(Ekl ⊗ x)e∗l = x, Nn(Ekl ⊗ x, t) ≤ N(x, t). So N(Ekl ⊗ x, t) = N(x, t).

(2) N(xkl, t) = N(ek[xij]e∗l , t) ≥ Nn

([xij],

t‖ek‖·‖el‖

)= Nn([xij], t).

Nn([xij], t) = Nn

n∑i,j=1

Eij ⊗ xij, t

≥ minNn(Eij ⊗ xij, tij) : i, j = 1, 2, · · · , n

= minN(xij, tij) : i, j = 1, 2, · · · , n,

where t =∑ni,j=1 tij. So Nn([xij], t) ≥ min

N(xij,

tn2

): i, j = 1, 2, · · · , n

.

(3) By N(xkl, t) ≥ Nn([xij], t) ≥ minN(xij,

tn2

): i, j = 1, 2, · · · , n

, we obtain the

result.

For a mapping f : X → Y , define Df : X2 → Y and Dfn : Mn(X2)→Mn(Y ) by

Df(a, b) = f(a+ b)− f(a)− f(b),

Dfn([xij], [yij]) := fn([xij + yij])− fn([xij])− fn([yij])

for all a, b ∈ X and all x = [xij], y = [yij] ∈Mn(X).

Theorem 2.2. Let ϕ : X2 → [0,∞) be a function such that there exists an α < 1 with

ϕ(a, b) ≤ α

2ϕ (2a, 2b) (2.1)

for all a, b ∈ X. Let f : X → Y be a mapping satisfying

Nn(Dfn([xij], [yij]), t) ≥t

t+∑ni,j=1 ϕ (xij, yij)

(2.2)

for all t > 0 and x = [xij], y = [yij] ∈Mn(X). Then A(a) := N-liml→∞ 2lf(a2l

)exists for

each a ∈ X and defines an additive mapping A : X → Y such that

N (fn([xij])− An([xij]), t) ≥2(1− α)t

2(1− α)t+ n2α∑ni,j=1 ϕ(xij, xij)

(2.3)

for all t > 0 and x = [xij] ∈Mn(X).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1092 CHOONKIL PARK ET AL 1089-1101

Page 341: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

FUNCTIONAL EQUATIONS IN MATRIX FUZZY NORMED SPACES

Proof. Let n = 1. Then (2.2) is equivalent to

N(f(a+ b)− f(a)− f(b), t) ≥ t

t+ ϕ (a, b)(2.4)

for all t > 0 and a, b ∈ X.Letting b = a in (2.4), we get

N (f (2a)− 2f(a), t) ≥ t

t+ ϕ (a, a)(2.5)

and so

N(f (a)− 2f

(a

2

), t)≥ t

t+ ϕ(a2, a2

) ≥ t

t+ α2ϕ (a, a)

(2.6)

for all t > 0 and a ∈ X.Consider the set

S := g : X → Y and introduce the generalized metric on S:

d(g, h) = infµ ∈ R+ : N(g(a)− h(a), µt) ≥ t

t+ ϕ (a, a), ∀a ∈ X, ∀t > 0,

where, as usual, inf φ = +∞. It is easy to show that (S, d) is complete (see the proof of[44, Lemma 2.1]).

Now we consider the linear mapping J : S → S such that

Jg(a) := 2g(a

2

)for all a ∈ X.

Let g, h ∈ S be given such that d(g, h) = ε. Then

N (g(a)− h(a), εt) ≥ t

t+ ϕ (a, a)

for all a ∈ X and t > 0. Hence

N (Jg(a)− Jh(a), αεt) = N(

2g(a

2

)− 2h

(a

2

), αεt

)= N

(g(a

2

)− h

(a

2

),α

2εt)

≥αt2

αt2

+ ϕ(a2, a2

) ≥ αt2

αt2

+ α2ϕ (a, a)

=t

t+ ϕ (a, a)

for all a ∈ X and t > 0. So d(g, h) = ε implies that d(Jg, Jh) ≤ αε. This means that

d(Jg, Jh) ≤ αd(g, h)

for all g, h ∈ S.It follows from (2.4) that d(f, Jf) ≤ α

2.

By Theorem 1.5, there exists a mapping A : X → Y satisfying the following:(1) A is a fixed point of J , i.e.,

A(a

2

)=

1

2A(a)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1093 CHOONKIL PARK ET AL 1089-1101

Page 342: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

C. PARK, D. SHIN, AND J. LEE

for all a ∈ X. The mapping A is a unique fixed point of J in the set

M = g ∈ S : d(f, g) <∞.(2) d(J lf, A)→ 0 as l→∞. This implies the equality

N - liml→∞

2lf(a

2l

)= A(a)

for all a ∈ X.(3) d(f, A) ≤ 1

1−αd(f, Jf), which implies the inequality

d(f, A) ≤ α

2− 2α. (2.7)

By (2.2),

N

(2lf

(a+ b

2l

)− 2lf

(a

2l

)− 2lf

(b

2l

), 2lt

)≥ t

t+ ϕ(a2l, b2l

)for all a, b ∈ X and t > 0. So

N

(2lf

(a+ b

2l

)− 2lf

(a

2l

)− 2lf

(b

2l

), t

)≥

t2l

t2l

+ αl

2lϕ (a, b)

for all a, b ∈ X and t > 0. Since liml→∞t

2l

t

2l+αl

2lϕ(a,b)

= 1 for all a, b ∈ X and t > 0,

N (A (a+ b)− A(a)− A(b), t) = 1

for all a, b ∈ X and t > 0. Thus A (a+ b)−A(a)−A(b) = 0. So the mapping A : X → Yis additive.

By Lemma 2.1 and (2.7),

Nn(fn([xij])− An([xij]), t) ≥ minN(f(xij)− A(xij),

t

n2

): i, j = 1, 2, · · · , n

≥ min

2(1− α)t

2(1− α)t+ n2αϕ(xij, xij): i, j = 1, 2, · · · , n

≥ 2(1− α)t

2(1− α)t+ n2α∑ni,j=1 ϕ(xij, xij)

for all x = [xij] ∈Mn(X). Thus A : X → Y is a unique additive mapping satisfying (2.3),as desired.

Corollary 2.3. Let r, θ be positive real numbers with r < 1. Let f : X → Y be a mappingsatisfying

Nn(Dfn([xij], [yij]), t) ≥t

t+∑ni,j=1 θ(‖xij‖r + ‖yij‖r)

(2.8)

for all t > 0 and x = [xij], y = [yij] ∈Mn(X). Then A(a) := N-liml→∞ 2lf(a2l

)exists for

each a ∈ X and defines an additive mapping A : X → Y such that

N (fn([xij])− An([xij]), t) ≥(2− 2r)t

(2− 2r)t+ n2 · 2r∑ni,j=1 θ‖xij‖r

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1094 CHOONKIL PARK ET AL 1089-1101

Page 343: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

FUNCTIONAL EQUATIONS IN MATRIX FUZZY NORMED SPACES

for all t > 0 and x = [xij] ∈Mn(X).

Proof. The proof follows from Theorem 2.2 by taking ϕ(a, b) = θ(‖a‖r + ‖b‖r) for alla, b ∈ X. Then we can choose α = 2r−1 and we get the desired result.

Theorem 2.4. Let f : X → Y be a mapping satisfying (2.2) for which there exists afunction ϕ : X2 → [0,∞) such that there exists an α < 1 with

ϕ(a, b) ≤ 2αϕ

(a

2,b

2

)

for all a, b ∈ X. Then A(a) := N-liml→∞12lf(2la)

exists for each a ∈ X and defines an

additive mapping A : X → Y such that

N (fn([xij])− An([xij]), t) ≥2(1− α)t

2(1− α)t+ n2∑ni,j=1 ϕ(xij, xij)

for all t > 0 and x = [xij] ∈Mn(X).

Proof. Let (S, d) be the generalized metric space defined in the proof of Theorem 2.2.Now we consider the linear mapping J : S → S such that

Jg(a) := 2g(a

2

)for all a ∈ X.

It follows from (2.5) that d(f, Jf) ≤ 12. So

d(f, A) ≤ 1

2− 2α.

The rest of the proof is similar to the proof of Theorem 2.2.

Corollary 2.5. Let r, θ be positive real numbers with r > 1. Let f : X → Y be a mapping

satisfying (2.8). Then A(a) := N-liml→∞12lf(2la)

exists for each a ∈ X and defines an

additive mapping A : X → Y such that

N (fn([xij])− An([xij]), t) ≥(2r − 2)t

(2r − 2)t+ n2 · 2r∑ni,j=1 θ‖xij‖r

for all t > 0 and x = [xij] ∈Mn(X).

Proof. The proof follows from Theorem 2.4 by taking ϕ(a, b) = θ(‖a‖r + ‖b‖r) for alla, b ∈ X. Then we can choose α = 21−r and we get the desired result.

3. Hyers-Ulam stability of the quadratic functional equation in matrixfuzzy normed spaces

Using the fixed point method, we prove the Hyers-Ulam stability of the quadraticfunctional equation in matrix fuzzy normed spaces.

For a mapping f : X → Y , define Df : X2 → Y and Dfn : Mn(X2)→Mn(Y ) by

Df(a, b) = f(a+ b) + f(a− b)− 2f(a)− 2f(b),

Dfn([xij], [yij]) := fn([xij + yij]) + fn([xij − yij])− 2fn([xij])− 2fn([yij])

for all a, b ∈ X and all x = [xij], y = [yij] ∈Mn(X).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1095 CHOONKIL PARK ET AL 1089-1101

Page 344: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

C. PARK, D. SHIN, AND J. LEE

Theorem 3.1. Let ϕ : X2 → [0,∞) be a function such that there exists an α < 1 with

ϕ(a, b) ≤ α

4ϕ (2a, 2b) (3.1)

for all a, b ∈ X. Let f : X → Y be a mapping satisfying f(0) = 0 and

Nn(Dfn([xij], [yij]), t) ≥t

t+∑ni,j=1 ϕ (xij, yij)

(3.2)

for all t > 0 and x = [xij], y = [yij] ∈Mn(X). Then A(a) := N-liml→∞ 4lf(a2l

)exists for

each a ∈ X and defines a quadratic mapping Q : X → Y such that

N (fn([xij])−Qn([xij]), t) ≥4(1− α)t

4(1− α)t+ n2α∑ni,j=1 ϕ(xij, xij)

(3.3)

for all t > 0 and x = [xij] ∈Mn(X).

Proof. Let n = 1. Then (3.2) is equivalent to

N(f(a+ b) + f(a− b)− 2f(a)− 2f(b), t) ≥ t

t+ ϕ (a, b)(3.4)

for all t > 0 and a, b ∈ X.Letting b = a in (3.4), we get

N (f (2a)− 4f(a), t) ≥ t

t+ ϕ (a, a)(3.5)

and so

N(f (a)− 4f

(a

2

), t)≥ t

t+ ϕ(a2, a2

) ≥ t

t+ α4ϕ (a, a)

(3.6)

for all t > 0 and a ∈ X.Let (S, d) be the generalized metric space defined in the proof of Theorem 2.2.Now we consider the linear mapping J : S → S such that

Jg(a) := 4g(a

2

)for all a ∈ X.

Let g, h ∈ S be given such that d(g, h) = ε. Then

N (g(a)− h(a), εt) ≥ t

t+ ϕ (a, a)

for all a ∈ X and t > 0. Hence

N (Jg(a)− Jh(a), αεt) = N(

4g(a

2

)− 4h

(a

2

), αεt

)= N

(g(a

4

)− h

(a

4

),α

4εt)

≥αt4

αt4

+ ϕ(a2, a2

) ≥ αt4

αt4

+ α4ϕ (a, a)

=t

t+ ϕ (a, a)

for all a ∈ X and t > 0. So d(g, h) = ε implies that d(Jg, Jh) ≤ αε. This means that

d(Jg, Jh) ≤ αd(g, h)

for all g, h ∈ S.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1096 CHOONKIL PARK ET AL 1089-1101

Page 345: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

FUNCTIONAL EQUATIONS IN MATRIX FUZZY NORMED SPACES

It follows from (3.4) that d(f, Jf) ≤ α4.

By Theorem 1.5, there exists a mapping Q : X → Y satisfying the following:(1) Q is a fixed point of J , i.e.,

Q(a

2

)=

1

4Q(a)

for all a ∈ X. The mapping Q is a unique fixed point of J in the set

M = g ∈ S : d(f, g) <∞.(2) d(J lf,Q)→ 0 as l→∞. This implies the equality

N - liml→∞

4lf(a

2l

)= Q(a)

for all a ∈ X.(3) d(f,Q) ≤ 1

1−αd(f, Jf), which implies the inequality

d(f, A) ≤ α

4− 4α. (3.7)

By (3.2),

N

(4lf

(a+ b

2l

)+ 4lf

(a− b

2l

)− 2 · 4lf

(a

2l

)− 2 · 4lf

(b

2l

), 4lt

)≥ t

t+ ϕ(a2l, b2l

)for all a, b ∈ X and t > 0. So

N

(4lf

(a+ b

2l

)+ 4lf

(a− b

2l

)− 2 · 4lf

(a

2l

)− 2 · 4lf

(b

2l

), t

)≥

t4l

t4l

+ αl

4lϕ (a, b)

for all a, b ∈ X and t > 0. Since liml→∞t

4l

t

4l+αl

4lϕ(a,b)

= 1 for all a, b ∈ X and t > 0,

N (Q (a+ b) +Q(a− b)− 2Q(a)− 2Q(b), t) = 1

for all a, b ∈ X and t > 0. Thus Q (a+ b)+Q(a−b)−2Q(a)−2Q(b) = 0. So the mappingQ : X → Y is quadratic.

By Lemma 2.1 and (3.7),

Nn(fn([xij])−Qn([xij]), t) ≥ minN(f(xij)−Q(xij),

t

n2

): i, j = 1, 2, · · · , n

≥ min

4(1− α)t

4(1− α)t+ n2αϕ(xij, xij): i, j = 1, 2, · · · , n

≥ 4(1− α)t

4(1− α)t+ n2α∑ni,j=1 ϕ(xij, xij)

for all x = [xij] ∈ Mn(X). Thus Q : X → Y is a unique quadratic mapping satisfying(3.3), as desired.

Corollary 3.2. Let r, θ be positive real numbers with r < 2. Let f : X → Y be a mappingsatisfying

Nn(Dfn([xij], [yij]), t) ≥t

t+∑ni,j=1 θ(‖xij‖r + ‖yij‖r)

(3.8)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1097 CHOONKIL PARK ET AL 1089-1101

Page 346: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

C. PARK, D. SHIN, AND J. LEE

for all t > 0 and x = [xij], y = [yij] ∈Mn(X). Then A(a) := N-liml→∞ 4lf(a2l

)exists for

each a ∈ X and defines a quadratic mapping Q : X → Y such that

N (fn([xij])−Qn([xij]), t) ≥2(4− 2r)t

2(4− 2r)t+ n2 · 2r∑ni,j=1 θ‖xij‖r

for all t > 0 and x = [xij] ∈Mn(X).

Proof. The proof follows from Theorem 3.1 by taking ϕ(a, b) = θ(‖a‖r + ‖b‖r) for alla, b ∈ X. Then we can choose α = 2r−2 and we get the desired result.

Theorem 3.3. Let f : X → Y be a mapping satisfying f(0) = 0 and (3.2) for whichthere exists a function ϕ : X2 → [0,∞) such that there exists an α < 1 with

ϕ(a, b) ≤ 4αϕ

(a

2,b

2

)

for all a, b ∈ X. Then Q(a) := N-liml→∞14lf(2la)

exists for each a ∈ X and defines a

quadratic mapping Q : X → Y such that

N (fn([xij])−Qn([xij]), t) ≥4(1− α)t

4(1− α)t+ n2∑ni,j=1 ϕ(xij, xij)

for all t > 0 and x = [xij] ∈Mn(X).

Proof. Let (S, d) be the generalized metric space defined in the proof of Theorem 2.2.Now we consider the linear mapping J : S → S such that

Jg(a) := 4g(a

2

)for all a ∈ X.

It follows from (3.5) that d(f, Jf) ≤ 14. So

d(f,Q) ≤ 1

4− 4α.

The rest of the proof is similar to the proof of Theorem 3.1.

Corollary 3.4. Let r, θ be positive real numbers with r > 2. Let f : X → Y be a mapping

satisfying (3.8). Then Q(a) := N-liml→∞14lf(2la)

exists for each a ∈ X and defines a

quadratic mapping Q : X → Y such that

N (fn([xij])−Qn([xij]), t) ≥2(2r − 4)t

2(2r − 4)t+ n2 · 2r∑ni,j=1 θ‖xij‖r

for all t > 0 and x = [xij] ∈Mn(X).

Proof. The proof follows from Theorem 3.3 by taking ϕ(a, b) = θ(‖a‖r + ‖b‖r) for alla, b ∈ X. Then we can choose α = 22−r and we get the desired result.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1098 CHOONKIL PARK ET AL 1089-1101

Page 347: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

FUNCTIONAL EQUATIONS IN MATRIX FUZZY NORMED SPACES

Acknowledgments

C. Park was supported by Basic Science Research Program through the National Re-search Foundation of Korea funded by the Ministry of Education, Science and Technology(NRF-2012R1A1A2004299), and D. Y. Shin was supported by Basic Science ResearchProgram through the National Research Foundation of Korea funded by the Ministry ofEducation, Science and Technology (NRF-2010-0021792).

References

[1] J. Aczel and J. Dhombres, Functional Equations in Several Variables, Cambridge Univ. Press, Cam-bridge, 1989.

[2] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan 2(1950), 64–66.

[3] T. Bag and S.K. Samanta, Finite dimensional fuzzy normed linear spaces, J. Fuzzy Math. 11 (2003),687–705.

[4] T. Bag and S.K. Samanta, Fuzzy bounded linear operators, Fuzzy Sets and Systems 151 (2005),513–547.

[5] L. Cadariu and V. Radu, Fixed points and the stability of Jensen’s functional equation, J. Inequal.Pure Appl. Math. 4, no. 1, Art. ID 4 (2003).

[6] L. Cadariu and V. Radu, On the stability of the Cauchy functional equation: a fixed point approach,Grazer Math. Ber. 346 (2004), 43–52.

[7] L. Cadariu and V. Radu, Fixed point methods for the generalized stability of functional equations ina single variable, Fixed Point Theory and Applications 2008, Art. ID 749392 (2008).

[8] S.C. Cheng and J.M. Mordeson, Fuzzy linear operators and fuzzy normed linear spaces, Bull. CalcuttaMath. Soc. 86 (1994), 429–436.

[9] Y. Cho, J. Kang and R. Saadati, Fixed points and stability of additive functional equations on theBanach algebras, J. Comput. Anal. Appl. 14(2012), 1103–1111.

[10] Y. Cho, C. Park, Th.M. Rassias and R. Saadati, Inner product spaces and functional equations, J.Comput. Anal. Appl. 13(2011), 296–304.

[11] Y. Cho, C. Park and R. Saadati, Functional inequalities in non-Archimedean Banach spaces, Appl.Math. Letters 23 (2010), 1238–1242.

[12] M.-D. Choi and E. Effros, Injectivity and operator spaces, J. Funct. Anal. 24 (1977), 156–209.[13] P.W. Cholewa, Remarks on the stability of functional equations, Aequationes Math. 27 (1984), 76–86.[14] S. Czerwik, On the stability of the quadratic mapping in normed spaces, Abh. Math. Sem. Univ.

Hamburg 62 (1992), 59–64.[15] S. Czerwik, The stability of the quadratic functional equation. in: Stability of mappings of Hyers-

Ulam type, (ed. Th.M. Rassias and J.Tabor), Hadronic Press, Palm Harbor, Florida, 1994, 81-91.[16] P. Czerwik, Functional Equations and Inequalities in Several Variables, World Scientific Publishing

Company, New Jersey, Hong Kong, Singapore and London, 2002.[17] J. Diaz and B. Margolis, A fixed point theorem of the alternative for contractions on a generalized

complete metric space, Bull. Amer. Math. Soc. 74 (1968), 305–309.[18] E. Effros, On multilinear completely bounded module maps, Contemp. Math. 62, Amer. Math. Soc..

Providence, RI, 1987, pp. 479–501.[19] E. Effros and Z.-J. Ruan, On approximation properties for operator spaces, Internat. J. Math. 1

(1990), 163–187.[20] E. Effros and Z.-J. Ruan, On the abstract characterization of operator spaces, Proc. Amer. Math.

Soc. 119 (1993), 579–584.[21] M. Eshaghi Gordji and M.B. Savadkouhi, Stability of a mixed type cubic-quartic functional equation

in non-Archimedean spaces, Appl. Math. Letters 23 (2010), 1198–1202.[22] M. Eshaghi Gordji, G. Kim, J. Lee and C. Park, Generalized ternary bi-derivations on ternary

Banach algebras: a fixed point approach, J. Comput. Anal. Appl. 15 (2013), 45–54.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1099 CHOONKIL PARK ET AL 1089-1101

Page 348: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

C. PARK, D. SHIN, AND J. LEE

[23] M. Eshaghi Gordji, G. Kim, J. Lee and C. Park, Nearly generalized derivations on non-ArchimdeanBanach algebras: a fixed point approach, J. Comput. Anal. Appl. 15 (2013), 308–315.

[24] C. Felbin, Finite dimensional fuzzy normed linear spaces, Fuzzy Sets and Systems 48 (1992), 239–248.

[25] Z. Gajda, On stability of additive mappings, Internat. J. Math. Math. Sci. 14 (1991), 431–434.[26] P. Gavruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings,

J. Math. Anal. Appl. 184 (1994), 431–436.[27] U. Haagerup, Decomp. of completely bounded maps, unpublished manuscript.[28] D.H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. U.S.A. 27

(1941), 222–224.[29] D.H. Hyers, G. Isac and Th.M. Rassias, Stability of Functional Equations in Several Variables,

Birkhauser, Basel, 1998.[30] G. Isac and Th.M. Rassias, On the Hyers-Ulam stability of ψ-additive mappings, J. Approx. Theory

72 (1993), 131–137.[31] G. Isac and Th.M. Rassias, Stability of ψ-additive mappings: Appications to nonlinear analysis,

Internat. J. Math. Math. Sci. 19 (1996), 219–228.[32] K. Jun and Y. Lee, A generalization of the Hyers-Ulam-Rassias stability of the Pexiderized quadratic

equations, J. Math. Anal. Appl. 297 (2004), 70–86.[33] S. Jung, Hyers-Ulam-Rassias Stability of Functional Equations in Mathematical Analysis, Hadronic

Press lnc., Palm Harbor, Florida, 2001.[34] Y. Jung and I. Chang, The stability of a cubic type functional equation with the fixed point alternative,

J. Math. Anal. Appl. 306 (2005), 752–760.[35] A.K. Katsaras, Fuzzy topological vector spaces II, Fuzzy Sets and Systems 12 (1984), 143–154.[36] I. Kramosil and J. Michalek, Fuzzy metric and statistical metric spaces, Kybernetica 11 (1975),

326–334.[37] S.V. Krishna and K.K.M. Sarma, Separation of fuzzy normed linear spaces, Fuzzy Sets and Systems

63 (1994), 207–217.[38] M. Kim, Y. Kim, G. A. Anastassiou and C. Park, An additive functional inequality in matrix normed

modules over a C∗-algebra, J. Comput. Anal. Appl. 17 (2014), 329–335.[39] M. Kim, S. Lee, G. A. Anastassiou and C. Park, Functional equations in matrix normed modules, J.

Comput. Anal. Appl. 17 (2014), 336–342.[40] J. Lee, S. Lee and C. Park, Fixed points and stability of the Cauchy-Jensen functional equation in

fuzzy Banach algebras, J. Comput. Anal. Appl. 15 (2013), 692–698.[41] J. Lee, C. Park, Y. Cho and D. Shin, Orthogonal stability of a cubic-quartic functional equation in

non-Archimedean spaces, J. Comput. Anal. Appl. 15 (2013), 572–583.[42] L. Li, G. Lu, C. Park and D. Shin, Additive functional inequalities in generalized quasi-Banach

spaces, J. Comput. Anal. Appl. 15 (2013), 1165–1175.[43] G. Lu, Y. Jiang and C. Park, Additive functional equation in Frechet spaces, J. Comput. Anal. Appl.

15 (2013), 369–373.[44] D. Mihet and V. Radu, On the stability of the additive Cauchy functional equation in random normed

spaces, J. Math. Anal. Appl. 343 (2008), 567–572.[45] M. Mirzavaziri and M.S. Moslehian, A fixed point approach to stability of a quadratic equation, Bull.

Braz. Math. Soc. 37 (2006), 361–376.[46] A.K. Mirmostafaee, M. Mirzavaziri and M.S. Moslehian, Fuzzy stability of the Jensen functional

equation, Fuzzy Sets and Systems 159 (2008), 730–738.[47] A.K. Mirmostafaee and M.S. Moslehian, Fuzzy versions of Hyers-Ulam-Rassias theorem, Fuzzy Sets

and Systems 159 (2008), 720–729.[48] A.K. Mirmostafaee and M.S. Moslehian, Fuzzy approximately cubic mappings, Inform. Sci. 178

(2008), 3791–3798.[49] C. Park, Homomorphisms between Poisson JC∗-algebras, Bull. Braz. Math. Soc. 36 (2005), 79–97.[50] C. Park, Fixed points and Hyers-Ulam-Rassias stability of Cauchy-Jensen functional equations in

Banach algebras, Fixed Point Theory and Applications 2007, Art. ID 50175 (2007).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1100 CHOONKIL PARK ET AL 1089-1101

Page 349: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

FUNCTIONAL EQUATIONS IN MATRIX FUZZY NORMED SPACES

[51] C. Park, Generalized Hyers-Ulam-Rassias stability of quadratic functional equations: a fixed pointapproach, Fixed Point Theory and Applications 2008, Art. ID 493751 (2008).

[52] C. Park, Y. Cho and H.A. Kenary, Orthogonal stability of a generalized quadratic functional equationin non-Archimedean spaces, J. Comput. Anal. Appl. 14(2012), 526–535.

[53] C. Park, K. Ghasemi, S. G. Ghaleh, S. Jang, Approximate n-Jordan ∗-homomorphisms in C∗-algebras, J. Comput. Anal. Appl. 15 (2013), 365–368.

[54] C. Park, A. Najati and S. Jang, Fixed points and fuzzy stability of an additive-quadratic functionalequation, J. Comput. Anal. Appl. 15 (2013), 452–462.

[55] G. Pisier, Grothendieck’s Theorem for non-commutative C∗-algebras with an appendix onGrothendieck’s constants, J. Funct. Anal. 29 (1978), 397–415.

[56] V. Radu, The fixed point alternative and the stability of functional equations, Fixed Point Theory 4(2003), 91–96.

[57] J.M. Rassias, On approximation of approximately linear mappings by linear mappings, J. Funct.Anal. 46 (1982) 126–130.

[58] J.M. Rassias, Solution of a problem of Ulam, J. Approx. Theory 57 (1989), 268–273.[59] Th.M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72

(1978), 297–300.[60] Th.M. Rassias, Problem 16; 2, Report of the 27th International Symp. on Functional Equations,

Aequationes Math. 39 (1990), 292–293; 309.[61] Th.M. Rassias (ed.), Functional Equations and Inequalities, Kluwer Academic, Dordrecht, 2000.[62] Th.M. Rassias, On the stability of functional equations in Banach spaces, J. Math. Anal. Appl. 251

(2000), 264–284.[63] Th.M. Rassias, On the stability of functional equations and a problem of Ulam, Acta Math. Appl.

62 (2000), 23–130.[64] Th.M. Rassias and P. Semrl, On the behaviour of mappings which do not satisfy Hyers-Ulam stability,

Proc. Amer. Math. Soc. 114 (1992), 989–993.[65] Z.-J. Ruan, Subspaces of C∗-algebras, J. Funct. Anal. 76 (1988), 217–230.[66] R. Saadati and C. Park, Non-Archimedean L-fuzzy normed spaces and stability of functional equa-

tions, Computers Math. Appl. 60 (2010), 2488–2496.[67] D. Shin, S. Lee, C. Byun and S. Kim, On matrix normed spaces, Bull. Korean Math. Soc. 27 (1983),

103–112.[68] D. Shin, C. Park and Sh. Farhadabadi, On the superstability of ternary Jordan C∗-homomorphisms,

J. Comput. Anal. Appl. 16 (2014), 964–973.[69] D. Shin, C. Park and Sh. Farhadabadi, Stability and superstability of J∗-homomorphisms and J∗-

derivations for a generalized Cauchy-Jensen equation, J. Comput. Anal. Appl. 17 (2014), 125–134.[70] F. Skof, Proprieta locali e approssimazione di operatori, Rend. Sem. Mat. Fis. Milano 53 (1983),

113–129.[71] S. M. Ulam, A Collection of the Mathematical Problems, Interscience Publ. New York, 1960.[72] J.Z. Xiao and X.H. Zhu, Fuzzy normed spaces of operators and its completeness, Fuzzy Sets and

Systems 133 (2003), 389–399.

Choonkil ParkDepartment of Mathematics, Research Institute for Natural Sciences, Hanyang Univer-sity, Seoul 133-791, Korea

E-mail address: [email protected]

Dong Yun ShinDepartment of Mathematics, University of Seoul, Seoul 130-743, Korea

E-mail address: [email protected]

Jung Rye LeeDepartment of Mathematics, Daejin University, Kyeonggi 487-711, Korea

E-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1101 CHOONKIL PARK ET AL 1089-1101

Page 350: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

On the stability of multi-additive mappings in non-Archimedean normed spaces

Tian Zhou Xu* Chun WangSchool of Mathematics and Statistics, Beijing Institute of Technology, Beijing 100081, P. R. China

E-mail: [email protected], [email protected]

Themistocles M. RassiasDepartment of Mathematics, National Technical University of Athens, Zografou Campus, Athens 15780, Greece

E-mail: [email protected]

Abstract. We establish some new stability results concerning multi-additive functional equation in non-Archimedean

normed spaces. The results improve some recent results. Some applications of our result will be illustrated. In particular,

we will see that some results about stability of multi-additive mappings in real normed spaces are not valid in non-

Archimedean normed spaces.

Keywords: Stability; Multi-additive mapping; Non-Archimedean normed space; Fixed point.

MR(2000) Subject Classification. 39B22, 39B82, 46S10, 47S10

1. Introduction

In 1897, Hensel discovered the p-adic numbers as a number theoretical analogue of power series in complex

analysis. The most important examples of non-Archimedean spaces are p-adic numbers. During the last three

decades, the theory of non-Archimedean spaces has gained the interest of physicists for their research, in particu-

lar, in problems deriving from quantum physics, p-adic strings and superstrings [10, 18]. Although many results

in the classical normed space theory have a non-Archimedean counterpart, their proofs are essentially different

and require an entirely new kind of approach. One may note that |n| ≤ 1 in each valuation field, every triangle

is isosceles and there may be a no unit vector in a non-Archimedean normed space [10]. These facts show that

the non-Archimedean framework is of special interest.

A basic question in the theory of functional equations is the following: when is it true that a function, which

approximately satisfies a functional equation must be close to an exact solution of the equation?

If the problem accepts a unique solution, we say the equation is stable (see [12]). The first stability problem

concerning group homomorphisms was raised by Ulam [17] in 1940 and affirmatively solved by Hyers [7]. The

result of Hyers was generalized by Th.M. Rassias [14] for approximate linear mappings by allowing the Cauchy

difference operator CDf(x, y) = f(x+y)−[f(x)+f(y)] to be controlled by ϵ(∥x∥p+∥y∥p). In 1994, a generalization

of Rassias’ theorem was obtained by Gavruta [6], who replaced ϵ(∥x∥p+∥y∥p) by a general control function φ(x, y)

by following Th.M. Rassias’ approach. Furthermore for an extensive account of methods and results concerning

Hyers-Ulam stability of additive, multi-additive, multi-Jensen mappings and functional equations in a single

variable as well as in several variables we refer the reader to ([1–4, 8, 9, 11, 15, 16, 19–24]) and references therein.

In this paper, we determine some results concerning the stability of the multi-additive mappings in the non-

Archimedean normed spaces. The presented results correspond to some outcomes from [1] and sometimes are

their slight generalizations.

2. Preliminaries

We recall some basic facts concerning non-Archimedean space and some basic results.

A valuation is a function |·| from a field K into [0,∞) such that 0 is the unique element having the 0 valuation,

|rs| = |r| · |s| and the triangle inequality holds, i.e.,

|r + s| ≤ |r|+ |s|, ∀r, s ∈ K.

A field K is called a valued field if K carries a valuation. The usual absolute values of R and C are examples of

valuations.

Let us consider a valuation which satisfies a stronger condition than the triangle inequality.

*Corresponding author.The first author was supported by the National Natural Science Foundation of China(Grant No. 11171022)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1102 Tian Zhou Xu et al 1102-1110

Page 351: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

T. Z. Xu, C. Wang and Th. M. Rassias

Definition 2.1. Let K be a field. A non-Archimedean absolute value on K is a function | · | : K → R such that

for any r, s ∈ K we have

(i) |r| ≥ 0 and equality holds if and only if r = 0;

(ii) |rs| = |r||s|;(iii) |r + s| ≤ max|r|, |s|.

The condition (iii) is called the strong triangle inequality. Clearly, |1| = | − 1| = 1 and |n| ≤ 1 for all n ∈ N. We

always assume in addition that | · | is non trivial, i.e., that

(iv) there is an r0 ∈ K such that |r0| = 0, 1.

The most important examples of non-Archimedean spaces are p-adic numbers.

Example 2.2. Let p be a prime number. For any nonzero rational number x, there exists a unique integer nx

such that x = ab p

nx , where a and b are integers not divisible by p. Then |x|p := p−nx defines a non-Archimedean

norm on Q. The completion of Q with respect to the metric d(x, y) = |x− y|p is denoted by Qp which is called

the p-adic number field. In fact, Qp is the set of all formal series x =∑∞

k≥nxakp

k, where |ak| ≤ p − 1 are

integers. The addition and multiplication between any two elements of Qp are defined naturally. The norm

|∑∞

k≥nxakp

k|p = p−nx is a non-Archimedean norm on Qp and it makes Qp a locally compact field (see [18]).

Note that if p > 2, then |2n|p = 1 for each integer n but |2|2 < 1.

Throughout this paper, we assume that the base field is a non-Archimedean field and hence we can call it

simply a field. Moreover, N stands for the set of all positive integers.

Definition 2.3. Let X be a linear space over a field K with a non-Archimedean valuation | · |. A function

∥ · ∥ : X → [0,∞) is a non-Archimedean norm if it satisfies the following conditions:

(i) ∥x∥ = 0 if and only if x = 0;

(ii) ∥rx∥ = |r|∥x∥ for all r ∈ K and x ∈ X ;

(iii) the strong triangle inequality

∥x+ y∥ ≤ max∥x∥, ∥y∥, ∀x, y ∈ X .

Then (X , ∥ · ∥) is called a non-Archimedean normed space.

Definition 2.4. Let X be a non-Archimedean normed space. Let xn be a sequence in X . Then xn is

said to be convergent if there exists x ∈ X such that limn→∞

∥xn − x∥ = 0. In that case, x is called the limit of

the sequence xn and we denote it by limn→∞

xn = x. A sequence xn in X is said to be a Cauchy sequence if

limn→∞

∥xn+p − xn∥ = 0 for all p = 1, 2, . . .. Due to the fact that

∥xn − xm∥ ≤ max∥xj+1 − xj∥ : m ≤ j ≤ n− 1 (n > m)

a sequence xn is Cauchy if and only if xn+1 − xn converges to zero in a non-Archimedean normed space.

It is known that every convergent sequence in a non-Archimedean normed space is a Cauchy sequence. If

every Cauchy sequence in X converges, then the non-Archimedean normed space X is called a non-Archimedean

Banach space.

Definition 2.5. Let X denotes a linear space and Y represents a complete non-Archimedean normed space

and n ≥ 1 is an integer. A function f : X n → Y is called a multi-additive mapping, if f is additive in each

variable:

f(x1, . . . , xi−1, xi + x′i, xi+1, . . . , xn) = f(x1, . . . , xi−1, xi, xi+1, . . . , xn) + f(x1, . . . , xi−1, x

′i, xi+1, . . . , xn)

for all i = 1, 2, . . . , n and all x1, . . . , xi−1, xi, x′i, xi+1, . . . , xn ∈ X . Some basic facts on such mappings can be

found for instance in [1, 2, 13], where their application to the representation of polynomial functions is also

presented.

Let Ω be a set. A function d : Ω × Ω → [0,∞] is called a generalized metric on Ω if d satisfies the following

conditions:

(a) d(x, y) = 0 if and only if x = y;

(b) d(x, y) = d(y, x) for all x, y ∈ Ω;

(c) d(x, z) ≤ d(x, y) + d(y, z) for all x, y, z ∈ Ω.

It will later on the following fixed point alternative theorem (cf. [5]) will be useful.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1103 Tian Zhou Xu et al 1102-1110

Page 352: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

On the stability of multi-additive mappings in non-Archimedean normed spaces

Theorem 2.6. Let (Ω, d) be a complete generalized metric space and J : Ω → Ω be a strictly contractive mapping

with Lipschitz constant 0 < L < 1, that is

d(Jx, Jy) ≤ Ld(x, y) ∀x, y ∈ Ω.

Then, for each given x ∈ Ω, either

d(Jnx, Jn+1x) = ∞ ∀n ≥ 0,

or

d(Jnx, Jn+1x) < ∞, ∀n ≥ n0,

for some natural number n0. Actually if the second alternative holds, then the sequence Jnx is convergent to

a fixed point x∗ of J and

(1) x∗ is the unique fixed point of J in the set Ω∗ = y ∈ Ω : d(Jn0x, y) < ∞;(2) d(y, x∗) ≤ 1

1−Ld(y, Jy) for all y ∈ Ω∗.

3. Non-Archimedean stability of the multi-additive mapping: a direct method

Let X be a linear space over a non-Archimedean field K with a valuation | · | and Y be a complete non-

Archimedean normed space over K. For the given mapping f : X n → Y and every i ∈ 1, 2, . . . , n, we define

the difference operator

Dif(x1, . . . , xi, x′i, xi+1, . . . , xn)

:= f(x1, . . . , xi−1, xi + x′i, xi+1, . . . , xn)− f(x1, . . . , xn)− f(x1, . . . , xi−1, x

′i, xi+1, . . . , xn)

for all x1, . . . , xi, x′i, xi+1, . . . , xn ∈ X .

Theorem 3.1. Let X be a linear space over a non-Archimedean field K with a valuation | · | and Y be a complete

non-Archimedean normed space over K. Let n ∈ N and for every i ∈ 1, 2, . . . , n, φi : X n+1 → [0,∞) be a

function. Let for some natural number k ∈ K,

limm→∞

|k|mφi(x1/km, . . . , xi, x

′i, xi+1, . . . , xn) = 0,

...

limm→∞

|k|mφi(x1, . . . , xi−2, xi−1/km, xi, x

′i, xi+1, . . . , xn) = 0,

limm→∞

|k|mφi(x1, . . . , xi−1, xi/km, x′

i/km, xi+1, . . . , xn) = 0,

limm→∞

|k|mφi(x1, . . . , xi, x′i, xi+1/k

m, xi+2, . . . , xn) = 0,

...

limm→∞

|k|mφi(x1, . . . , xi, x′i, xi+1, . . . , xn−1, xn/k

m) = 0

(3.1)

for all x1, . . . , xi, x′i, xi+1, . . . , xn ∈ X and let for each (x1, . . . , xn) ∈ X n the limit

limm→∞

max|k|s+1 maxφi(x1, . . . , xi−1, xi/ks+1, jxi/k

s+1, xi+1, . . . , xn) : 1 ≤ j ≤ k − 1 : 0 ≤ s < m,

denoted by φi(x1, . . . , xn), exists. Suppose that f : X n → Y be a mapping satisfying

∥Dif(x1, . . . , xi, x′i, xi+1, . . . , xn)∥ ≤ φi(x1, . . . , xi, x

′i, xi+1, . . . , xn) (3.2)

for all x1, . . . , xi, x′i, xi+1, . . . , xn ∈ X and i ∈ 1, . . . , n. Then for every i ∈ 1, . . . , n there exists a multi-

additive mapping Fi : X n → Y such that

∥f(x1, . . . , xn)− Fi(x1, . . . , xn)∥ ≤ 1

|k|φi(x1, . . . , xn) (3.3)

for all x1, . . . , xn ∈ X . For every i ∈ 1, . . . , n the function Fi is given by

Fi(x1, . . . , xn) := limj→∞

kjf(x1, . . . , xi−1, xi/kj , xi+1, . . . , xn) (3.4)

for all x1, . . . , xn ∈ X , and if, in addition,

limp→∞

|k|pφi(x1, . . . , xi−1, xi/kp, xi+1, . . . , xn) = 0,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1104 Tian Zhou Xu et al 1102-1110

Page 353: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

T. Z. Xu, C. Wang and Th. M. Rassias

then Fi is the unique multi-additive mapping satisfying (3.3).

Proof. Fix j ∈ N and i ∈ 1, . . . , n. Letting x′i = xi in (3.2), we get

∥f(x1, . . . , xi−1, 2xi, xi+1, . . . , xn)− 2f(x1, . . . , xn)∥ ≤ φi(x1, . . . , xi, xi, xi+1, . . . , xn) (3.5)

for all x1, . . . , xn ∈ X . Letting x′i = 2xi in (3.2), we get

∥f(x1, . . . , xi−1, 3xi, xi+1, . . . , xn)− f(x1, . . . , xn)− f(x1, . . . , xi−1, 2xi, xi+1, . . . , xn)∥≤ φi(x1, . . . , xi, 2xi, xi+1, . . . , xn)

(3.6)

for all x1, . . . , xn ∈ X . Similarly, putting x′i = jxi ( 3 ≤ j ≤ k − 1) in (3.2), we get

∥f(x1, . . . , xi−1, (j + 1)xi, xi+1, . . . , xn)− f(x1, . . . , xn)− f(x1, . . . , xi−1, jxi, xi+1, . . . , xn)∥≤ φi(x1, . . . , xi, jxi, xi+1, . . . , xn)

(3.7)

for all x1, . . . , xn ∈ X . By (3.5)–(3.7), we see that

∥f(x1, . . . , xi−1, kxi, xi+1, . . . , xn)− kf(x1, . . . , xn)∥≤ maxφi(x1, . . . , xi, jxi, xi+1, . . . , xn) : 1 ≤ j ≤ k − 1

(3.8)

for all x1, . . . , xn ∈ X , and so

∥km−1f(x1, . . . , xi−1, xi/km−1, xi+1, . . . , xn)− kmf(x1, . . . , xi−1, xi/k

m, xi+1, . . . , xn)∥≤ |k|m−1 maxφi(x1, . . . , xi−1, xi/k

m, jxi/km, xi+1, . . . , xn) : 1 ≤ j ≤ k − 1.

(3.9)

for all x1, . . . , xn ∈ X and m = 0, 1, . . .. By (3.1), it follows that kmf(x1, . . . , xi−1, xi/km, xi+1, . . . , xn)

is a Cauchy sequence in the complete non-Archimedean space Y . This sequence is convergent and we define

Fi : X n → Y by

Fi(x1, . . . , xn) := limm→∞

kmf(x1, . . . , xi−1, xi/km, xi+1, . . . , xn) (3.10)

for all x1, . . . , xn ∈ X . Using (3.9), one can show that

∥f(x1, . . . , xn)− kmf(x1, . . . , xi−1, xi/km, xi+1, . . . , xn)∥

=

m∑

s=1[ks−1f(x1, . . . , xi−1, xi/k

s−1, xi+1, . . . , xn)− ksf(x1, . . . , xi−1, xi/ks, xi+1, . . . , xn)]

≤ 1|k| max|k|s+1 maxφi(x1, . . . , xi−1, xi/k

s+1, jxi/ks+1, xi+1, . . . , xn) : 1 ≤ j ≤ k − 1 : 0 ≤ s < m,

(3.11)

by taking limit as m → ∞ of both sides of (3.11), one can obtain the inequality (3.3).

Now, we will show that for every i ∈ 1, . . . , n the mapping Fi is multi-additive. By (3.2), we have

∥kjDsf(x1, . . . , xs−1, xs, x′s, xs+1, . . . , xi−1, xi/k

j , xi+1, . . . , xn)∥≤ |k|jφs(x1, . . . , xs−1, xs, x

′s, xs+1, . . . , xi−1, xi/k

j , xi+1, . . . , xn), for s < i,

∥kjDif(x1, . . . , xi−1, xi/kj , x′

i/kj , xi+1, . . . , xn)∥

≤ |k|jφi(x1, . . . , xi−1, xi/kj , x′

i/kj , xi+1, . . . , xn), for s = i,

∥kjDsf(x1, . . . , xi−1, xi/kj , xi+1, . . . , xs−1, xs, x

′s, xs+1, . . . , xn)∥

≤ |k|jφs(x1, . . . , xi−1, xi/kj , xi+1, . . . , xs−1, xs, x

′s, xs+1, . . . , xn), for s > i

(3.12)

for all x1, . . . , xi, x′i, xi+1, . . . , xn ∈ X , x′

s ∈ X (s ∈ 1, 2, . . . , n\i) and all j ∈ N. Letting j → ∞ in the

above inequalities and using (3.1), we see that the mapping Fi is multi-additive. To prove the uniqueness of the

mapping Fi, assume that F ′i : X n → Y is another multi-additive mapping satisfying (3.3). Then we have

∥Fi(x1, . . . , xn)− F ′i (x1, . . . , xn)∥

= |k|p∥Fi(x1, . . . , xi−1, xi/kp, xi+1, . . . , xn)− F ′

i (x1, . . . , xi−1, xi/kp, xi+1, . . . , xn)∥

≤ max|k|p∥f(x1, . . . , xi−1, xi/kp, xi+1, . . . , xn)− Fi(x1, . . . , xi−1, xi/k

p, xi+1, . . . , xn)∥,|k|p∥f(x1, . . . , xi−1, xi/k

p, xi+1, . . . , xn)− F ′i (x1, . . . , xi−1, xi/k

p, xi+1, . . . , xn)∥≤ 2|k|p−1φi(x1, . . . , xi−1, xi/k

p, xi+1, . . . , xn)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1105 Tian Zhou Xu et al 1102-1110

Page 354: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

On the stability of multi-additive mappings in non-Archimedean normed spaces

for all p ∈ N and x1, . . . , xn ∈ X . If

limp→∞

|k|pφi(x1, . . . , xi−1, xi/kp, xi+1, . . . , xn) = 0,

we may conclude that Fi(x1, . . . , xn) = F ′i (x1, . . . , xn) for all x1, . . . , xn ∈ X , and the proof is complete.

The proof of the following result is similar to that in Theorem 3.1, hence it is omitted.

Theorem 3.2. Let X be a linear space over a non-Archimedean field K with a valuation | · | and Y be a complete

non-Archimedean normed space over K. Let n ∈ N and for every i ∈ 1, 2, . . . , n, φi : X n+1 → [0,∞) be a

function. Assume for some natural number k ∈ K,

limm→∞

1|k|mφi(k

mx1, . . . , xi, x′i, xi+1, . . . , xn) = 0,

...

limm→∞

1|k|mφi(x1, . . . , xi−2, k

mxi−1, xi, x′i, xi+1, . . . , xn) = 0,

limm→∞

1|k|mφi(x1, . . . , xi−1, k

mxi, kmx′

i, xi+1, . . . , xn) = 0,

limm→∞

1|k|mφi(x1, . . . , xi, x

′i, k

mxi+1, xi+2, . . . , xn) = 0,

...

limm→∞

1|k|mφi(x1, . . . , xi, x

′i, xi+1, . . . , xn−1, k

mxn) = 0

for all x1, . . . , xi, x′i, xi+1, . . . , xn ∈ X and let for each (x1, . . . , xn) ∈ X n the limit

limm→∞

max

1

|k|smaxφi(x1, . . . , xi−1, k

sxi, jksxi, xi+1, . . . , xn) : 1 ≤ j ≤ k − 1 : 0 ≤ s < m

,

denoted by φi(x1, . . . , xn), exists. Suppose that f : X n → Y is a mapping satisfying

∥Dif(x1, . . . , xi, x′i, xi+1, . . . , xn)∥ ≤ φi(x1, . . . , xi, x

′i, xi+1, . . . , xn)

for all x1, . . . , xi, x′i, xi+1, . . . , xn ∈ X and i ∈ 1, . . . , n. Then for every i ∈ 1, . . . , n there exists a multi-

additive mapping Fi : X n → Y such that

∥f(x1, . . . , xn)− Fi(x1, . . . , xn)∥ ≤ 1

|k|φi(x1, . . . , xn)

for all x1, . . . , xn ∈ X . For every i ∈ 1, . . . , n the function Fi is given by

Fi(x1, . . . , xn) := limj→∞

1

kjf(x1, . . . , xi−1, k

jxi, xi+1, . . . , xn)

for all x1, . . . , xn ∈ X , and if, in addition,

limp→∞

1

|k|pφi(x1, . . . , xi−1, k

pxi, xi+1, . . . , xn) = 0,

then Fi is the unique multi-additive mapping satisfying (3.3).

Corollary 3.3. Let K be a non-Archimedean field, (X , ∥ · ∥X ) be a non-Archimedean normed space over K,

(Y , ∥ · ∥Y ) be a complete non-Archimedean normed space over K. Let k ∈ N with |k| < 1, ε, δ ≥ 0, 0 < ri <

1(1 ≤ i ≤ n), and f : X n → Y be a mapping such that

∥Dif(x1, . . . , xi, x′i, xi+1, . . . , xn)∥Y ≤ ε+ δ[∥x1∥r1X · · · ∥xi−1∥ri−1

X (∥xi∥riX + ∥x′i∥

riX )∥xi+1∥ri+1

X · · · · ∥xn∥rnX ]

for all x1, . . . , xi, x′i, xi+1, . . . , xn ∈ X and every i ∈ 1, 2, . . . , n. Then there exists a unique multi-additive

mapping Fi : X n → Y such that

∥f(x1, x2, . . . , xn)− Fi(x1, x2, . . . , xn)∥Y ≤ ε+2δ

|k|ri(∥x1∥r1X · ∥x2∥r2X · · · · · ∥xn∥rnX )

for all x1, x2, . . . , xn ∈ X .

Corollary 3.4. Let K be a non-Archimedean field, (X , ∥ · ∥X ) be a non-Archimedean normed space over K,

(Y , ∥ · ∥Y ) be a complete non-Archimedean normed space over K. Let k ∈ N with |k| < 1, ε, δ ≥ 0, ri, si > 0(1 ≤

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1106 Tian Zhou Xu et al 1102-1110

Page 355: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

T. Z. Xu, C. Wang and Th. M. Rassias

i ≤ n) with λi := ri + si < 1, and f : X n → Y be a mapping such that

∥Dif(x1, . . . , xi, x′i, xi+1, . . . , xn)∥Y

≤ ε+ δ∥x1∥λ1

X · · · ∥xi−1∥λi−1

X [∥xi∥riX ∥x′i∥

siX + (∥xi∥ri+si

X + ∥x′i∥

ri+siX )]∥xi+1∥λi+1

X · · · · ∥xn∥λn

X

for all x1, . . . , xi, x′i, xi+1, . . . , xn ∈ X and every i ∈ 1, 2, . . . , n. Then there exists a unique multi-additive

mapping Fi : X n → Y such that

∥f(x1, x2, . . . , xn)− Fi(x1, x2, . . . , xn)∥Y ≤ ε+3δ

|k|λi(∥x1∥λ1

X · ∥x2∥λ2

X · · · · · ∥xn∥λn

X )

for all x1, x2, . . . , xn ∈ X .

Remark. Theorems 3.1 and 3.2 are generalized versions of Theorem 2.1 in [11].

In [2], Cieplinski proved the following:

Theorem 3.5. Let X be a commutative semigroup and Y be a Banach space. Assume also that n ∈ N and for

every i ∈ 1, 2, . . . , n, φi : X n+1 → [0,∞) is a mapping such that for any (x1, x2, . . . , xn) ∈ X n+1 we have

φi(x1, . . . , xn+1) :=∞∑

j=0

12j [φi(2

jx1, x2, . . . , xn+1) + · · ·+ φi(x1, . . . , xi−2, 2jxi−1, xi, . . . , xn+1)

+12φi(x1, . . . , xi−1, 2

jxi, 2jxi+1, xi+2, . . . , xn+1) + φi(x1, . . . , xi+1, 2

jxi+2, xi+3, . . . , xn+1)

+ · · ·+ φi(x1, . . . , xn, 2jxn+1) < ∞.

If f : X n → Y is a function satisfying

∥f(x1, . . . , xi−1, xi + x′i, xi+1, . . . , xn)− f(x1, . . . , xn)− f(x1, . . . , xi−1, x

′i, xi+1, . . . , xn)∥

≤ φi(x1, . . . , xi, x′i, xi+1, . . . , xn), (x1, . . . , xi, x

′i, xi+1, . . . , xn) ∈ X n+1, i ∈ 1, . . . , n,

then for every i ∈ 1, . . . , n there exists a multi-additive mapping Fi : X n → Y such that for any (x1, . . . , xn) ∈X n we have

∥f(x1, . . . , xn)− Fi(x1, . . . , xn)∥ ≤ φi(x1, . . . , xi, xi, xi+1, . . . , xn).

For every i ∈ 1, . . . , n the function Fi is given by

Fi(x1, . . . , xn) := limj→∞

1

2jf(x1, . . . , xi−1, 2

jxi, xi+1, . . . , xn), (x1, . . . , xn) ∈ X n.

The following example shows that the same result of Theorem 3.5 is not true in non-Archimedean normed

spaces and the assumption |k| < 1 cannot be omitted in Corollaries 3.3 and 3.4. This example is a modification

of the example of [22].

Example 3.6. Let p > 2 be a prime number and f : Q2p → Qp be defined by f(x1, x2) = 2. Since, |2j |p = 1 for

all j ∈ Z, then for φ1(x1, x2, x3) = φ2(x1, x2, x3) = 1 (the case when k = 2, ε = 1 and δ = 0 is considered),

|D1f(x1, x′1, x2)|p = |D2f(x1, x2, x

′2)|p = |2|p = 1 ≤ φ1(x1, x2, x3) = φ2(x1, x2, x3), x1, x

′1, x2, x

′2 ∈ Qp.

However

|2jf(x1/2j , x2)− 2j+1f(x1/2

j+1, x2)|p = |2j+1|p = 1

and

|2jf(x1, x2/2j)− 2j+1f(x1, x2/2

j+1)|p = |2j+1|p = 1

for all x1, x2 ∈ Qp and j ∈ N. Hence neither 2jf(x1/2j , x2) nor 2jf(x1, x2/2

j) is a Cauchy sequence. Hence

these sequences are not convergent in Qp.

4. A fixed point approach to the stability

In [2], Cieplinski reduce the system of n Cauchy equations to a single functional equation (see [2, Theorem

2]).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1107 Tian Zhou Xu et al 1102-1110

Page 356: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

On the stability of multi-additive mappings in non-Archimedean normed spaces

Theorem 4.1. Assume that n ∈ N and let X be a commutative semigroup with the identity element 0 and Y

be a linear space. A mapping f : X n → Y is multi-additive if and only if

f(x11 + x12, . . . , xn1 + xn2) =∑

i1,...,in∈1,2

f(x1i1 , . . . , xnin) (4.1)

for all x11, x12, . . . , xn1, xn2 ∈ X .

Next, we will show the Hyers-Ulam stability of Eq.(4.1) by using the fixed point method. For the given

mapping f : X n → Y , we define the difference operator

Df(x11, x12, . . . , xn1, xn2) := f(x11 + x12, . . . , xn1 + xn2)−∑

i1,...,in∈1,2

f(x1i1 , . . . , xnin)

for all x11, x12, . . . , xn1, xn2 ∈ X .

Theorem 4.2. Let X be a linear space over a non-Archimedean field K with a valuation | · | and Y be a complete

non-Archimedean normed space over K. Let 0 ≤ L < 1 and φ : X 2n → [0,∞) be a mapping such that

φ(x11, x12, . . . , xn1, xn2) ≤L

|2|nφ(2x11, 2x12, . . . , 2xn1, 2xn2) (4.2)

for all x11, x12, . . . , xn1, xn2 ∈ X . If f : X n → Y is a function satisfying

∥Df(x11, x12, . . . , xn1, xn2)∥ ≤ φ(x11, x12, . . . , xn1, xn2) (4.3)

for all x11, x12, . . . , xn1, xn2 ∈ X , then there exists a unique multi-additive mapping F : X n → Y such that

∥f(x11, x21, . . . , xn1)− F (x11, x21, . . . , xn1∥ ≤ L

|2|n(1− L)φ(x11, x11, . . . , xn1, xn1) (4.4)

for all x11, x21, . . . , xn1 ∈ X . The function F is given by

F (x11, x21, . . . , xn1) := limm→∞

2mnf(x11/2m, x21/2

m, . . . , xn1/2m) (4.5)

for all x11, x21, . . . , xn1 ∈ X .

Proof. It follows from (4.2) that

limj→∞

|2|njφ(x11/2j , x12/2

j , . . . , xn1/2j , xn2/2

j) = 0 (4.6)

for all x11, x12, . . . , xn1, xn2 ∈ X .

Consider the set

Ω := g | g : X n → Y

and introduce the generalized metric on Ω defined by

d(g, h) := infc > 0| ∥g(x11, x21, . . . , xn1)− h(x11, x21, . . . , xn1)∥≤ cφ(x11, x11, . . . , xn1, xn1), ∀x11, x21, . . . , xn1 ∈ X .

It is easy to show that (Ω, d) is a complete generalized metric space. Now we consider the mapping J : Ω → Ω

such that

Jg(x11, x21, . . . , xn1) = 2ng(x11/2, x21/2, . . . , xn1/2)

for all x11, x21, . . . , xn1 ∈ X n. Let g, h ∈ Ω be given such that d(g, h) < β, by the definition,

∥g(x11, x21, . . . , xn1)− h(x11, x21, . . . , xn1)∥ ≤ βφ(x11, x11, . . . , xn1, xn1)

for all x11, x21, . . . , xn1 ∈ X . Hence

∥Jg(x11, x21, . . . , xn1)− Jh(x11, x21, . . . , xn1)∥= ∥2ng(x11/2, x21/2, . . . , xn1/2)− 2nh(x11/2, x21/2, . . . , xn1/2)∥= |2|n∥g(x11/2, x21/2, . . . , xn1/2)− h(x11/2, x21/2, . . . , xn1/2)∥≤ |2|nβφ((x11/2, x11/2, . . . , xn1/2, xn1/2)

≤ βLφ(x11, x11, . . . , xn1, xn1)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1108 Tian Zhou Xu et al 1102-1110

Page 357: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

T. Z. Xu, C. Wang and Th. M. Rassias

for all x11, x21, . . . , xn1 ∈ X . By the definition it follows that d(Jg, Jh) ≤ βL. Therefore,

d(Jg, Jh) ≤ Ld(g, h), for all g, h ∈ Ω.

This means that J is a strictly contractive self-mapping of Ω with Lipschitz constant L.

Putting xi2 = xi1 for i ∈ 1, 2, . . . , n in (4.3), we get

∥f(2x11, 2x21, . . . , 2xn1)− 2nf(x11, x21, . . . , xn1)∥ ≤ φ(x11, x11, . . . , xn1, xn1)

for all x11, x21, . . . , xn1 ∈ X . Hence

∥2nf(x11/2, x21/2, . . . , xn1/2)− f(x11, x21, . . . , xn1)∥ ≤ φ(x11/2, x11/2, . . . , xn1/2, xn1/2)

≤ L|2|nφ(x11, x12, . . . , xn1, xn2)

for all x11, x21, . . . , xn1 ∈ X . Therefore d(Jf, f) ≤ L/|2|n.By Theorem 2.6, there exists a mapping F : X n → Y such that

(1) F is a fixed point of J , that is,

F (2x11, 2x21, . . . , 2xn1) = 2nF (x11, x21, . . . , xn1) (4.7)

for all x11, x21, . . . , xn1 ∈ X . The mapping F is a unique fixed point of J in the set ∆ = g ∈ Ω| d(f, g) < ∞.This implies that F is a unique mapping satisfying (4.7) such that there exists c ∈ (0,∞) satisfying

∥F (x11, x21, . . . , xn1)− f(x11, x21, . . . , xn1)∥ ≤ c · φ(x11, x11, . . . , xn1, xn1)

for all x11, x21, . . . , xn1 ∈ X .

(2) d(Jmf, F ) → 0 as m → ∞. This implies the equality

F (x11, x21, . . . , xn1) := limm→∞

2mnf(x11/2m, x21/2

m, . . . , xn1/2m) (4.8)

for all x11, x21, . . . , xn1 ∈ X .

(3) d(f, F ) ≤ d(f, Jf)/(1− L), which implies the inequality

d(f, F ) ≤ L/[|2|n(1− L)].

Thus inequality (4.4) holds.

It follows from (4.3), (4.6), and (4.8) that

∥F (x11 + x12, . . . , xn1 + xn2)−∑

i1,...,in∈1,2F (x1i1 , . . . , xnin)∥

= limj→∞

|2|nj∥f((x11 + x12)/2j , . . . , (xn1 + xn2)/2

j)−∑

i1,...,in∈1,2f(x1i1/2

j , . . . , xnin/2j)∥

≤ limj→∞

|2|njφ(x11/2j , x12/2

j , . . . , xn1/2j , xn2/2

j) = 0

for all x11, x12, . . . , xn1, xn2 ∈ X . Therefore Theorem 4.1 now shows that F is multi-additive. This completes

the proof.

Corollary 4.3. Let K be a non-Archimedean field, (X , ∥ · ∥X ) be a non-Archimedean normed space over

K, (Y , ∥ · ∥Y ) be a complete non-Archimedean normed space over K. Let ε, δ ≥ 0, 0 < r < 1, |2| < 1, and

f : X n → Y be a mapping such that

∥Df(x11, x12, . . . , xn1, xn2)∥Y ≤ ε+ δ(∥x11∥nrX + ∥x12∥nrX + · · ·+ ∥xn1∥nrX + ∥xn2∥nrX )

for all x11, x12, . . . , xn1, xn2 ∈ X . Then there exists a unique multi-additive mapping F : X n → Y such that

∥f(x11, x21, . . . , xn1)− F (x11, x21, . . . , xn1)∥Y ≤ 1

|2|nr − |2|n[ε+ 2δ(∥x11∥nrX + ∥x21∥nrX + · · ·+ ∥xn1∥nrX )]

for all x11, x21, . . . , xn1 ∈ X . The function F is given by

F (x11, x12, . . . , xn1) := limm→∞

2mnf(x11/2m, . . . , xn1/2

m)

for all x11, x21, . . . , xn1 ∈ X .

Corollary 4.4. Let K be a non-Archimedean field, (X , ∥ · ∥X ) be a non-Archimedean normed space over K,

(Y , ∥ · ∥Y ) be a complete non-Archimedean normed space over K, ε, δ ≥ 0 and r, s > 0 with λ := r + s < 1.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1109 Tian Zhou Xu et al 1102-1110

Page 358: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

On the stability of multi-additive mappings in non-Archimedean normed spaces

Assume also that f : X n → Y be a mapping satisfying

∥Df(x11, x12, . . . , xn1, xn2)∥Y ≤ ε+ δ

n∑

k=1

[∥xk1∥nrX · ∥xk2∥nsX + (∥xk1∥nλX + ∥xk2∥nλX )]

for all x11, x12, . . . , xn1, xn2 ∈ X . Then there exists a unique multi-additive mapping F : X n → Y such that

∥f(x11, x21, . . . , xn1)− F (x11, x21, . . . , xn1)∥ ≤ 1

|2|nλ − |2|n[ε+ 3δ(∥x11∥nλX + ∥x21∥nλX + · · ·+ ∥xn1∥nλX )]

for all x11, x21, . . . , xn1 ∈ X n. The function F is given by

F (x11, x12, . . . , xn1) := limm→∞

2mnf(x11/2m, . . . , xn1/2

m)

for all x11, x21, . . . , xn1 ∈ X n.

The following example shows that the assumption |2| < 1 cannot be omitted in Corollaries 4.3 and 4.4.

Example 4.5. Let p > 2 be a prime number and f : Q2p → Qp be defined by f(x1, x2) = 2. Since, |2j |p = 1 for

all j ∈ Z, then for ε = 1 and δ = 0,

|Df(x11, x12, x21, x22)|p = |6|p = |3|p ≤ 1 = ε, x11, x12, x21, x22 ∈ Qp.

However,

|4jf(x1/2j , x2/2

j)− 4j+1f(x1/2j+1, x2)/2

j+1|p = |7 · 22j |p = |7|p

for all x1, x2 ∈ Qp and j ∈ N. Hence 4jf(x1/2j , x2/2

j) is not convergent in Qp.

References

[1] K. Cieplinski, Stability of multi-additive mappings in non-Archimedean normed spaces, J. Math. Anal. Appl., 373(2011),

376–383.

[2] K. Cieplinski, Generalized stability of multi-additive mappings, Applied Mathematics Letters, 23(2010), 1291–1294.

[3] K. Cieplinski, On the generalized Hyers-Ulam stability of multi-quadratic mappings, Comput. Math. Appl., 62(2011), 3418–3426.

[4] K. Cieplinski, T.Z. Xu, Approximate multi-Jensen and multi-quadratic mappings in 2-Banach spaces, Carpathian Journal of

Mathematics, 29(2)(2013), 159–166.

[5] J.B. Diaz, B. Margolis, A fixed point theorem of the alternative for the contractions on generalized complete metric space, Bull.

Amer. Math. Soc., 74(1968), 305–309.

[6] P. Gavruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings, Journal of Mathematical

Analysis and Applications, 184(1994), 431–436.

[7] D.H. Hyers, On the stability of the linear functional equation, Proc. Nat. Acad. Sci. USA, 27(1941), 222–224.

[8] D.H. Hyers, G. Isac and Th.M. Rassias, Stability of Functional Equations in Several Variables, Birkhauser, Boston, Basel, Berlin,

1998.

[9] S.-M. Jung, Hyers-Ulam-Rassias Stability of Functional Equations in Nonlinear Analysis, Springer, New York, 2011.

[10] A. Khrennikov, Non-Archimedean Analysis: Quantum Paradoxes, Dynamical Systems and Biological Models. Kluwer Academic

Publishers, Dordrecht, 1997.

[11] A.K. Mirmostafaee, M.S. Moslehian, Stability of additive mappings in non-Archimedean fuzzy normed spaces, Fuzzy Sets and

Systems 160(2009) 1643-1652.

[12] Z. Moszner, On the stability of functional equations, Aequationes Math., 77(2009), 33–88.

[13] W. Prager, J. Schwaiger, Stability of the multi-Jensen equation, Bull. Korean Math. Soc., 45(2008), 133–142.

[14] Th.M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc., 72(1978), 297–300.

[15] Th.M. Rassias, J. Brzdek, Functional Equations in Mathematical Analysis, Springer, New York, 2011.

[16] R. Saadati, Ch. Park, Non-Archimedian L -fuzzy normed spaces and stability of functional equations, Comput. Math. Appl.,

60(2010), 2488–2496.

[17] S.M. Ulam, A Collection of the Mathematical Problems, Interscience, New York, 1960.

[18] V.S. Vladimirov, I.V. Volovich, E.I. Zelenov, p-adic Analysis and Mathematical Physics. World Scientific, 1994.

[19] T.Z. Xu, On the stability of multi-Jensen mappings in β-normed spaces, Applied Mathematics Letters, 25(2012), 1866–1870.

[20] T.Z. Xu, Approximate multi-Jensen, multi-Euler-Lagrange additive and quadratic mappings in n-Banach spaces, Abstract and

Applied Analysis, 2013(2013), Article ID 648709, 1–12.

[21] T.Z. Xu, J.M. Rassias, Approximate septic and octic mappings in quasi-β-normed spaces, Journal of Computational Analysis

and Applications, 15(6)(2013), 1110–1119.

[22] T.Z. Xu, J.M. Rassias, W.X. Xu, Stability of a general mixed additive-cubic functional equation in non-Archimedean fuzzy

normed spaces, J. Math. Phys., 51(2010), Article ID 093508 1–19.

[23] T.Z. Xu, J.M. Rassias, W.X. Xu, Stability of a general mixed additive-cubic equation in F -spaces, Journal of Computational

Analysis and Applications, 14(6)(2012), 1026–1037.

[24] T.Z. Xu, Z. Yang, J.M. Rassias, Direct and fixed point approaches to the stability of an AQ-functional equation in non-

Archimedean normed spaces, Journal of Computational Analysis and Applications, 17(4)(2014), 697–706.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1110 Tian Zhou Xu et al 1102-1110

Page 359: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Notes on Harmonic Functions for which thesecond Dilatation is α - spiral

Melike Aydogan

2014

Abstract

In this study, we consider, f = h + g harmonic functions in theunit disc D. By applying S. S. Miller and P. M. Mocanu result, weobtain a new subclass of harmonic functions , such as S∗HPST (α, β)We introduce this new class as defined in the following form,

S∗HPST (α, β) =f = h(z) + g(z)|f ∈ SH , h(z) ∈ S∗,

Re

(eiα

g′(z)

h′(z)

)> β, |α| < π

2, 0 ≤ β < Re(beiα)

(0.1)

We also use subordination principle , study on distortion theorems,some numerical examples and coefficient inequalities of this class.

1 Introduction

A planar harmonic mapping in the unit disc D = z ∈ C||z| < 1 is a complex-valued harmonic function f which maps D onto some planar domain f(D).Since D is simply connected, the mapping f has a canonical decompositionf = h + g, where h and g are analytic in D, as usual, we call h the analyticpart of f and g the co-analytic part of f . An elegant and complete accountof the theory of planar harmonic mapping is given in Duren’s monograph [3].

2000 Mathematics Subject Classification: 30C45, 30C55Key words and phrases: Harmonic functions, growth theorem, distortion theorem, coeffi-cient inequality

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1111 Melike Aydogan 1111-1121

Page 360: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Lewy [5] proved in 1936 that the harmonic function f is locally univalent ina simply connected domain D1 if and only if its Jacobien

Jf (z) = |h′(z)|2 − |g′(z)|2 > 0

is different from zero in D1. In view of this result, locally univalent harmonicmappings in the unit disc are either sense-reversing if

|g′(z)| > |h′(z)|

in D1 or sense-preserving if

|g′(z)| < |h′(z)|

in D1. Throughout this paper we will restrict ourselves to the study of sense-preserving harmonic mappings. However, since f is sense-preserving if andonly if f is sense-reserving, all the results obtained in this article regardingsense-preserving harmonic mappings can be adapted to sense-reversing ones.Note that f = h + g is sense-preserving in D if and only if h′(z) does not

vanish in the unit disc and the second-complex dilatation w(z) = g′(z)h′(z)

has

the property |w(z)| < 1 in D, therefore we can take h(z) = z + a2z2 + · · · ,

g(z) = b1z + b2z2 + · · · . Thus the class of all harmonic mappings being

sense-preserving in the unit disc can be defined by

SH =f = h(z) + g(z) |h(z) = z + a2z

2 + · · · , g(z) = b1z + b2z2 + · · · ,

f sense-preserving

Let Ω be the family of functions φ(z) which are regular in D and satisfyingthe conditions φ(0) = 0, |φ(z)| < 1 for all z ∈ D. Denote by P , the family offunctions p(z) = 1 + p1z + p2z

2 + · · · which are regular in D such that

p(z) =1 + φ(z)

1− φ(z)(1.1)

for some function φ(z) ∈ Ω for all z ∈ D.Next, let S∗ denote the family of functions s(z) = z+ c2z

2 + c3z3 + · · · which

are regular in D such that

zs′(z)

s(z)= p(z) (1.2)

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1112 Melike Aydogan 1111-1121

Page 361: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

for some p(z) ∈ P for all z ∈ D.Let s1(z) = z + α2z

2 + α3z3 + · · · and s2(z) = z + β2z2 + β3z

3 + · · · beanalytic functions in D. If there exists φ(z) ∈ Ω such that s1(z) = s2(φ(z))for all z ∈ D. Then we say that s1(z) is subordinate to s2(z) and we writes1(z) ≺ s2(z), then s1(D) ⊂ s2(D).Now, we consider the following class of harmonic mappings in the plane

S∗HPST (α, β) =f = h(z) + g(z)|f ∈ SH , h(z) ∈ S∗,

Re

(eiα

g′(z)

h′(z)

)> β, |α| < π

2, 0 ≤ β < Re(beiα)

(1.3)

In the present paper we will investigate the class S∗HPST (α, β).We will need the following lemma and theorem in the sequel:

Theorem 1.1. ([4]) Let h(z) be an element of S∗, then

r

(1 + r)2≤ |h(z)| ≤ r

(1− r)2,

for all |z| = r < 1.

1− r(1 + r)3

≤ |h′(z)| ≤ 1 + r

(1− r)3These inequalities are sharp because the extremal function is

h(z) = z(1−z)2 .

Lemma 1.2. ([6]) Let M(z) and N(z) be regular in D with M(0) = N(0) =0, and let γ be real. If N(z) maps D onto a (possibly many-sheeted) domainwhich is starlike with respect to the origin, then

Re(M ′(z)

N ′(z)) > γ ⇒ Re(

M(z)

N(z)) > γ

2 Main Results

Theorem 2.1. Let g(z) and h(z) be analytic in D with g(0) = h(0) = 0, andlet 0 ≤ β < Re(eiαb1) and |α| < π

2. If h(z) maps D onto a (possibly many

sheeted) domain which is starlike with respect to the origin, then

Re(eiαg′(z)

h′(z)) > β(z ∈ D)⇒ Re(eiα

g(z)

h(z)) > β(z ∈ D)

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1113 Melike Aydogan 1111-1121

Page 362: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Proof. If we take M(z) = g(z) and N(z) = e−iαh(z), then M(z) and N(z)are analytic in D and M(0) = N(0) = 0.Also,

Re(zN ′(z)

N(Z)) = Re(

zh′(z)

h(z)) > 0, (z ∈ D)

Thus, appliying Lemma 1.2, we prove the theorem.

Example 2.2. Let us consider the function g(z) such that eiαb1 > 0, β = 0and h(z) = z

(1−z)2 .Now , we consider

eiαg′(z)

h′(z)= eiαb1

1 + z

1− zThen, we easily see that,

Re(eiαg′(z)

h′(z)) > 0, (z ∈ D).

For such g(z), we have that

g′(z) =b1(1 + z)2

(1− z)4.

Thus, we obtain that

g(z) = b1

∫ z

0

(1 + t)2

(1− t)4dt =

b1z(3 + z2)

3(1− z)3

Using the above g(z) and h(z) = z(1−z)2 , we see that

Re(eiαg(z)

h(z)) = Re(

eiαb1(3 + z2)

3(1− z)) > 0, (z ∈ D)

Theorem 2.3. If f(z) = h(z) + g(z) is in the class S∗HPST (α, β), then∣∣∣∣g(z)

h(z)− |b1| e

i(φ−α)(1 + r2e−i2φ)− 2r2β.eiα

1− r2

∣∣∣∣ ≤ 2r(|b1| cosφ− β)

1− r2

for |z| = r < 1, where φ = α + arg(b1).

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1114 Melike Aydogan 1111-1121

Page 363: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Proof. For f(z) ∈ S∗HPST (α, β), Theorem 1 gives us that

Re(eiαg(z)

h(z)) > β(z ∈ D)

Let us define

p(z) = eiαg(z)

h(z)

and

φ(z) =p(z)− β − Imp(0)

Rep(0)− βThen, we see that

p(0) = b1eiα = |b1| eiα(φ = α + arg(b1))

and that φ(z) is analytic inD, φ(0) = 1, and Reφ(z) > 0, (z ∈ D). Therefore,φ(z) is Caratheodory function. It follows from the above that,

φ(z) ≺ 1 + z

1− z,

that is,

φ(z) =1 + w(z)

1− w(z)

where w(z) is analytic in D, w(0) = 0 and |w(z)| < 1, (z ∈ D). Therefore,using Schwarz lemma, we have that

|w(z)| =∣∣∣∣φ(z)− 1

φ(z) + 1

∣∣∣∣ ≤ r(|z| = r < 1)

Note that ∣∣∣∣φ(z)− 1 + r2

1− r2

∣∣∣∣ ≤ 2r

1− r2

and

φ(z) =eiα g(z)

h(z)− β − i |b1|φ

|b1| cosφ− βTherefore, we have that∣∣∣∣eiα g(z)

h(z)− |b1| e

iφ(1 + r2e−i2φ)− 2r2β

1− r2

∣∣∣∣ ≤ 2r(|b1| cosφ− β)

1− r2

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1115 Melike Aydogan 1111-1121

Page 364: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Since φ = α + arg(b1), we obtain that∣∣∣∣g(z)

h(z)− |b1| e

i(φ−α)(1 + r2e−i2φ)− 2r2β.e−iα

1− r2

∣∣∣∣ ≤ 2r(|b1| cosφ− β)

1− r2.

Corollary 2.4. Let f(z) = h(z) + g(z) is in the class S∗HPST (α, β); ifarg(b1) = −α, then φ = 0. Therefore, we have that∣∣∣∣b1(1− r)− 2rβ

1 + r

∣∣∣∣ ≤ ∣∣∣∣g(z)

h(z)

∣∣∣∣ ≤ ∣∣∣∣b1(1 + r)− 2rβ

1− r

∣∣∣∣ (2.1)

Proof. This is a simple consequence of Theorem 2.3.

Corollary 2.5. Let f(z) = h(z) + g(z) is in the class S∗HPST (α, β); if β = 0,then we have

|b1| (1− r)1 + r

≤∣∣∣∣g(z)

h(z)

∣∣∣∣ ≤ |b1| (1 + r)

1− r(2.2)

Proof. This is a simple consequence of Theorem 2.3.

Corollary 2.6. Let f(z) = h(z) + g(z) is in the class S∗HPST (α, β), then

r[|b1| (1− r)− 2rβ]

(1 + r3)≤ |g(z)| ≤ r[|b1| (1 + r)− 2rβ]

(1− r3)(2.3)

(1− r)[|b1| (1− r)− 2rβ]

(1 + r)4≤ |g′(z)| ≤ (1 + r)[|b1| (1 + r)− 2rβ]

(1− r)4(2.4)

for all |z| = r < 1.

Proof. Let f(z) = h(z) + g(z) is in the class S∗HPST (α, β), then by usingTheorem 1.1, we can write

|h(z)| |b1| (1− r)2rβ(1 + r)

≤ |g(z)| ≤ |h(z)| |b1| (1 + r)2rβ

(1− r)

|h′(z)| |b1| (1− r)2rβ(1 + r)

≤ |g′(z)| ≤ |h′(z)| |b1| (1 + r)2rβ

(1− r)Therefore we can take the result easliy.

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1116 Melike Aydogan 1111-1121

Page 365: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Corollary 2.7. Let f(z) = h(z) + g(z) is in the class S∗HPST (α, β), if β = 0,then we have

r |b1| (1− r)(1 + r)3

≤ |g(z)| ≤ r |b1| (1 + r)

(1− r)3

|b1| (1− r)2

(1 + r)4≤ |g′(z)| ≤ |b1| (1 + r)2

(1− r)4

Proof. This is a simple consequence of Corollary 2.6.

Corollary 2.8. Let f(z) = h(z) + g(z) is in the class S∗HPST (α, β), then

F (|b1| ,−r, β) ≤ Jf(z) ≤ F (|b1| , r, β)

where

F (|b1| , r, β) =[1− |b1| − r(1 + |b1|+ 2β)][1 + |b1|+ r(−1− |b1|+ 2β)]

(1 + r)6

Proof. Since

Jf(z) = |h′(z)|2 − |g′(z)|2 = |h′(z)|2 (1− |w(z)|2)

Using Corollary 2.6 and Theorem 2.3 we get the result easily.

Theorem 2.9. If f(z) = h(z) + g(z) is in the class S∗HPST (α, β), then

|bn − b1an| ≤(n− 1)(2n− 1)

3(|b1| cos(α + arg(b1))− β) (2.5)

(n = 2, 3, 4, ...)

Proof. Since

Re(eiαg′(z)

h′(z)) > β, (z ∈ D)

for f(z) ∈ S∗HPST (α, β), we see that

φ(z) =p(z)− β − iImp(0)

Rep(0)− β

is the Caratheodory function, where

p(z) = eiαg′(z)

h′(z)

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1117 Melike Aydogan 1111-1121

Page 366: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

and p(0) = b1eiα = |b1| ei(α+arg(b1)) If we write

φ(z) = 1 + c1z + c2z2 + ...,

we have that |cn|leq2, (1, 2, 3, ...). Note that

p(z) = (Rep(0)− β)φ(z) + β + iImp(0),

that is, that

eiαg′(z) = h′(z)[(Rep(0)− β)φ(z) + β + iImp(0)]

It follows that

eiαb1 +∞∑n=2

nbnzn−1

= (1 +∞∑n=2

nanzn−1)[(Rep(0)− β)(1 +

∞∑n=1

cnzn) + β + iImp(0)]

Considering the coefficient for zn−1, we have that

meiαbm = (Rep(b1eiα)−β)(cn−1+2a2cn−2+3a3cn−3+...+(n−1)an−1c1)+b1e

iαnan

This shows us that,

(bn−b1an)eiα =1

n(Rep(b1e

iα)−β)(cn−1+2a2cn−2+3a3cn−3+...+(n−1)an−1c1).

(2.6)Since |an| ≤ n, (n = 2, 3, 4, ...) for h(z) ∈ S∗ and |cn| ≤ 2, (n = 1, 2, 3, ...),we obtain that

|bn − b1an| ≤2

n(|b1| cos(α+arg(b1))−β)(1+2 |a2|+3 |a3|+ ...+(n−1) |an−1|)

≤ 2

n(|b1| cos(α + arg(b1))− β)(12 + 22 + 32 + ...+ (n− 1)2)

=(n− 1)(2n− 1)

3(|b1| cos(α + arg(b1))− β)

This completes the proof of the theorem.

Corollary 2.10. If f(z) = h(z) + g(z) is in the class S∗HPST (α, β) withh(z) ∈ K, then

|bn − b1an| ≤ (n− 1)(|b1| cos(α + arg(b1))− β), (n = 2, 3, 4, ...)

Proof. This is a simple consequence of Theorem 2.9.

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1118 Melike Aydogan 1111-1121

Page 367: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Theorem 2.11. Let h(z) = z +∑∞

n=2 anzn and g(z) = b1z +

∑∞n=2 bnz

n beanalytic in D. Also, let h(z) is starlike with respect to the origin in D, and

f(z) = h(z) + g(z).

If h(z) and g(z) satisfy,

∞∑n=2

n[∣∣(1− β)an + eiαbn

∣∣+∣∣(1 + β)an − eiαbn

∣∣]≤∣∣1− β + eiαb1

∣∣− ∣∣1 + β − eiαb1∣∣

for some real α (|α| < π2) and for some real β, (0 ≤ β ≤ Re(b1e

iα), thenf(z) ∈ S∗HPST (α, β).

Proof. Let p(z) = eiα g′(z)h′(z)

Then, if p(z) satisfies,∣∣∣∣1− (p(z)− β)

1 + (p(z)− β)

∣∣∣∣ < 1

then Rep(z) > β, so that, f(z) ∈ S∗HPST (α, β). It follows that

|1 + (p(z)− β)| − |1− (p(z)− β)|

=1

|h′(z)|[∣∣(1− β)h′(z) + eiαg′(z)

∣∣− ∣∣(1 + β)h′(z)− eiαg′(z)∣∣]

=1

|h′(z)|[

∣∣∣∣∣(1− β + eiαb1) +∞∑n=2

n((1− β)an + eiαbn)zn−1

∣∣∣∣∣− ∣∣(1 + β − eiαb1)

+∞∑n=2

n((1 + β)an − eiαbn)zn−1]

≥ 1

|h′(z)|[∣∣1− β + eiαb1

∣∣− ∞∑n=2

n∣∣(1− β)an + eiαbn |z|n−1

−∣∣1 + β − eiαb1

∣∣− ∞∑n=2

∣∣(1 + β)an − eiαbn |z|n−1∣∣]

>1

|h′(z)|[∣∣1− β + eiαb1

∣∣− ∣∣1 + β − eiαb1∣∣]

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1119 Melike Aydogan 1111-1121

Page 368: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

−∞∑n=2

n[∣∣(1− β)an + eiαbn

∣∣+∣∣(1 + β)an − eiαbn

∣∣]for z ∈ D. Therefore, if f(z) satisfies,

∞∑n=2

n[∣∣(1− β)an + eiαbn

∣∣+∣∣(1 + β)an − eiαbn

∣∣]≤∣∣1− β + eiαb1

∣∣− ∣∣1 + β − eiαb1∣∣ ,

then f(z) ∈ S∗HPST (α, β).

References

[1] S. D. Bernardi, Convex and Starlike Univalent Functions, Trans. Amer.Math. Soc. 1969, (135), 429-446.

[2] J. Clunie, On Meromorphic Schlicht Functions, J.London. Math. Soc.34, (1959), 215-216.

[3] P. Duren, Harmonic Mapping in the Plane, Cambridge press 2004, Cam-brdige.

[4] A. W. Goodman, Univalent Functions, Volume I and Volume II, Marinerpublishing Company INC, 1983.

[5] H. Lewy, On the non-vanishing of the Jacobian in certain in one-to-onemappings, Bull. Amer. Math. Soc. 42 (1936), 689-692.

[6] S. S. Miller and P. Mocanu, Differential Subordinations, Theory andApplications, Marcel Dekker, 2000, pp. 63.

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1120 Melike Aydogan 1111-1121

Page 369: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

Melike AydoganDepartment of Mathematics,Isık University, Mesrutiyet Koyu, Sile Istanbul, Turkeye-mail: [email protected]

11

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO.6, 2015, COPYRIGHT 2015 EUDOXUS PRESS, LLC

1121 Melike Aydogan 1111-1121

Page 370: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

1122

Page 371: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO. 6, 2015

Functional Inequalities Associated With Inner Product Preserving Mappings, Gang Lu, George A. Anastassiou, Choonkil Park, and Yuanfeng Jin,…………………………………………964

Stability and Superstability of (𝑓𝑟 ,𝑓𝑠)-Double Derivations in Quasi-Banach Algebras, Sun Young Jang, Choonkil Park, Pegah Efteghar, and Shahrokh Farhadabadi,…………………………973

The Fixed Point Method for Perturbation of Bihomomorphisms and Biderivations in Normed 3-Lie Systems: Revisited, Choonkil Park, Jung Rye Lee, Eon Wha Shim, and Dong Yun Shin,984

Dynamics of some Rational Difference Equations, H. El-Metwally, E.M. Elsayed, and H. El-Morshedy,………………………………………………………………………………993

Generalized Integration Operators from Hardy Spaces to Zygmund-Type Spaces, Huiying Qu, Yongmin Liu, and Shulei Cheng,……………………………………………………………1004

Approximation Properties of the Modification of Durrmeyer Type q-Baskakov Operators Which Preserve 𝑥2, Qing-Bo Cai,……………………………………………………………………1017

Qualitative Behavior of Two Systems of Second-Order Rational Difference Equations, A. Q. Khan, M. N. Qureshi, and Q. Din,……………………………………………………..1027

Strong Differential Subordination Results Using a Generalized Sălăgean Operator and Ruscheweyh Operator, Andrei Loriana, ……………………………………………………..1042

On Some Differential Sandwich Theorems Using a Generalized Sălăgean Operator and Ruscheweyh Operator, Andrei Loriana,………………………………………………………1049

Subalgebras of BCK/BCI-Algebras Based on (𝛼,𝛽)-type Fuzzy Sets, G. Muhiuddin, and Abdullah M. Al-roqi,………………………………………………………………………….1057

Existence Results for Nonlinear Fractional Integrodifferential Equations with Antiperiodic Type Integral Boundary Conditions, Xiaohong Zuo, and Wengui Yang,………………………….1065

Identities of Symmetry for Higher-Order q-Bernoulli Polynomials, Dae San Kim,Taekyun Kim,…………………………………………………………………………………………..1077

Fuzzy Stability of Functional Equations in Matrix Fuzzy Normed Spaces, Choonkil Park, Dong Yun Shin, and Jung Rye Lee,…………………………………………………………………1089

Page 372: Journal of Computational Analysis and Applications · 2020-03-02 · Journal of Computational Analysis and Applications A quartely international publication of Eudoxus Press, LLC,

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 18, NO. 6, 2015

(continued)

On the Stability of Multi-Additive Mappings in Non-Archimedean Normed Spaces, Tian Zhou Xu, Chun Wang, and Themistocles M. Rassias,……………………………………………1102

Notes on Harmonic Functions for Which the Second Dilatation is 𝛼-Spiral, Melike Aydogan,……………………………………………………………………………………1111