journal of concrete and applicable mathematics6) angelo favini università di bologna dipartimento...

320
VOLUME 10, NUMBERS 1-2 JANUARY- APRIL 2012 ISSN:1548-5390 PRINT,1559-176X ONLINE JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS EUDOXUS PRESS,LLC 1

Upload: others

Post on 25-Oct-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

VOLUME 10, NUMBERS 1-2 JANUARY-APRIL 2012 ISSN:1548-5390 PRINT,1559-176X ONLINE

JOURNAL

OF CONCRETE AND APPLICABLE MATHEMATICS EUDOXUS PRESS,LLC

1

Page 2: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

SCOPE AND PRICES OF THE JOURNAL Journal of Concrete and Applicable Mathematics A quartely international publication of Eudoxus Press,LLC Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis Memphis, TN 38152, U.S.A. [email protected]

Assistant to the Editor:Dr.Razvan Mezei,Lander University,SC 29649, USA. The main purpose of the "Journal of Concrete and Applicable Mathematics" is to publish high quality original research articles from all subareas of Non-Pure and/or Applicable Mathematics and its many real life applications, as well connections to other areas of Mathematical Sciences, as long as they are presented in a Concrete way. It welcomes also related research survey articles and book reviews.A sample list of connected mathematical areas with this publication includes and is not restricted to: Applied Analysis, Applied Functional Analysis, Probability theory, Stochastic Processes, Approximation Theory, O.D.E, P.D.E, Wavelet, Neural Networks,Difference Equations, Summability, Fractals, Special Functions, Splines, Asymptotic Analysis, Fractional Analysis, Inequalities, Moment Theory, Numerical Functional Analysis,Tomography, Asymptotic Expansions, Fourier Analysis, Applied Harmonic Analysis, Integral Equations, Signal Analysis, Numerical Analysis, Optimization, Operations Research, Linear Programming, Fuzzyness, Mathematical Finance, Stochastic Analysis, Game Theory, Math.Physics aspects, Applied Real and Complex Analysis, Computational Number Theory, Graph Theory, Combinatorics, Computer Science Math.related topics,combinations of the above, etc. In general any kind of Concretely presented Mathematics which is Applicable fits to the scope of this journal. Working Concretely and in Applicable Mathematics has become a main trend in many recent years,so we can understand better and deeper and solve the important problems of our real and scientific world. "Journal of Concrete and Applicable Mathematics" is a peer- reviewed International Quarterly Journal. We are calling for papers for possible publication. The contributor should send via email the contribution to the editor in-Chief: TEX or LATEX (typed double spaced) and PDF files. [ See: Instructions to Contributors]

Journal of Concrete and Applicable Mathematics(JCAAM) ISSN:1548-5390 PRINT, 1559-176X ONLINE. is published in January,April,July and October of each year by EUDOXUS PRESS,LLC, 1424 Beaver Trail Drive,Cordova,TN38016,USA, Tel.001-901-751-3553 [email protected] http://www.EudoxusPress.com. Visit also www.msci.memphis.edu/~ganastss/jcaam. Webmaster:Ray Clapsadle

2

Page 3: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Annual Subscription Current Prices:For USA and Canada,Institutional:Print $400,Electronic $250,Print and Electronic $450.Individual:Print $150, Electronic $80,Print &Electronic $200.For any other part of the world add $50 more to the above prices for Print. Single article PDF file for individual $15.Single issue in PDF form for individual $60. No credit card payments.Only certified check,money order or international check in US dollars are acceptable. Combination orders of any two from JoCAAA,JCAAM,JAFA receive 25% discount,all three receive 30% discount. Copyright©2012 by Eudoxus Press,LLC all rights reserved.JCAAM is printed in USA. JCAAM is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH. It is strictly prohibited the reproduction and transmission of any part of JCAAM and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes no responsibility for the content of published papers. JCAAM IS A JOURNAL OF RAPID PUBLICATION PAGE CHARGES: Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage.

3

Page 4: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Editorial Board

Associate Editors

Editor in -Chief: George Anastassiou Department of Mathematical Sciences The University Of Memphis Memphis,TN 38152,USA tel.901-678-3144,fax 901-678-2480 e-mail [email protected] www.msci.memphis.edu/~ganastss Areas:Approximation Theory, Probability,Moments,Wavelet, Neural Networks,Inequalities,Fuzzyness. Associate Editors: 1) Ravi Agarwal Florida Institute of Technology Applied Mathematics Program 150 W.University Blvd. Melbourne,FL 32901,USA [email protected] Differential Equations,Difference Equations, Inequalities 2) Carlo Bardaro Dipartimento di Matematica & Informatica Universita' di Perugia Via Vanvitelli 1 06123 Perugia,ITALY tel.+390755855034, +390755853822, fax +390755855024 [email protected] , [email protected] Functional Analysis and Approximation Th., Summability,Signal Analysis,Integral Equations, Measure Th.,Real Analysis 3) Francoise Bastin Institute of Mathematics University of Liege 4000 Liege BELGIUM [email protected] Functional Analysis,Wavelets 4) Yeol Je Cho

21) Gustavo Alberto Perla Menzala National Laboratory of Scientific Computation LNCC/MCT Av. Getulio Vargas 333 25651-075 Petropolis, RJ Caixa Postal 95113, Brasil and Federal University of Rio de Janeiro Institute of Mathematics RJ, P.O. Box 68530 Rio de Janeiro, Brasil [email protected] and [email protected] Phone 55-24-22336068, 55-21-25627513 Ext 224 FAX 55-24-22315595 Hyperbolic and Parabolic Partial Differential Equations, Exact controllability, Nonlinear Lattices and Global Attractors, Smart Materials 22) Ram N.Mohapatra Department of Mathematics University of Central Florida Orlando,FL 32816-1364 tel.407-823-5080 [email protected] Real and Complex analysis,Approximation Th., Fourier Analysis, Fuzzy Sets and Systems 23) Rainer Nagel Arbeitsbereich Funktionalanalysis Mathematisches Institut Auf der Morgenstelle 10 D-72076 Tuebingen Germany tel.49-7071-2973242 fax 49-7071-294322 [email protected] evolution equations,semigroups,spectral th., positivity 24) Panos M.Pardalos Center for Appl. Optimization University of Florida 303 Weil Hall P.O.Box 116595 Gainesville,FL 32611-6595 tel.352-392-9011 [email protected] Optimization,Operations Research

4

Page 5: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Department of Mathematics Education College of Education Gyeongsang National University Chinju 660-701 KOREA tel.055-751-5673 Office, 055-755-3644 home, fax 055-751-6117 [email protected] Nonlinear operator Th.,Inequalities, Geometry of Banach Spaces 5) Sever S.Dragomir School of Communications and Informatics Victoria University of Technology PO Box 14428 Melbourne City M.C Victoria 8001,Australia tel 61 3 9688 4437,fax 61 3 9688 4050 [email protected], [email protected] Math.Analysis,Inequalities,Approximation Th., Numerical Analysis, Geometry of Banach Spaces, Information Th. and Coding 6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451 fax.++39 051 2094490 [email protected] Partial Differential Equations, Control Theory, Differential Equations in Banach Spaces 7) Claudio A. Fernandez Facultad de Matematicas Pontificia Unversidad Católica de Chile Vicuna Mackenna 4860 Santiago, Chile tel.++56 2 354 5922 fax.++56 2 552 5916 [email protected] Partial Differential Equations, Mathematical Physics, Scattering and Spectral Theory 8) A.M.Fink Department of Mathematics Iowa State University Ames,IA 50011-0001,USA tel.515-294-8150

25) Svetlozar T.Rachev Dept.of Statistics and Applied Probability Program University of California,Santa Barbara CA 93106-3110,USA tel.805-893-4869 [email protected] AND Chair of Econometrics and Statistics School of Economics and Business Engineering University of Karlsruhe Kollegium am Schloss,Bau II,20.12,R210 Postfach 6980,D-76128,Karlsruhe,Germany tel.011-49-721-608-7535 [email protected] Mathematical and Empirical Finance, Applied Probability, Statistics and Econometrics 26) John Michael Rassias University of Athens Pedagogical Department Section of Mathematics and Infomatics 20, Hippocratous Str., Athens, 106 80, Greece Address for Correspondence 4, Agamemnonos Str. Aghia Paraskevi, Athens, Attikis 15342 Greece [email protected] [email protected] Approximation Theory,Functional Equations, Inequalities, PDE 27) Paolo Emilio Ricci Universita' degli Studi di Roma "La Sapienza" Dipartimento di Matematica-Istituto "G.Castelnuovo" P.le A.Moro,2-00185 Roma,ITALY tel.++39 0649913201,fax ++39 0644701007 [email protected],[email protected] Orthogonal Polynomials and Special functions, Numerical Analysis, Transforms,Operational Calculus, Differential and Difference equations 28) Cecil C.Rousseau Department of Mathematical Sciences The University of Memphis Memphis,TN 38152,USA tel.901-678-2490,fax 901-678-2480 [email protected] Combinatorics,Graph Th., Asymptotic Approximations, Applications to Physics 29) Tomasz Rychlik

5

Page 6: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

[email protected] Inequalities,Ordinary Differential Equations 9) Sorin Gal Department of Mathematics University of Oradea Str.Armatei Romane 5 3700 Oradea,Romania [email protected] Approximation Th.,Fuzzyness,Complex Analysis 10) Jerome A.Goldstein Department of Mathematical Sciences The University of Memphis, Memphis,TN 38152,USA tel.901-678-2484 [email protected] Partial Differential Equations, Semigroups of Operators 11) Heiner H.Gonska Department of Mathematics University of Duisburg Duisburg,D-47048 Germany tel.0049-203-379-3542 office [email protected] Approximation Th.,Computer Aided Geometric Design 12) Dmitry Khavinson Department of Mathematical Sciences University of Arkansas Fayetteville,AR 72701,USA tel.(479)575-6331,fax(479)575-8630 [email protected] Potential Th.,Complex Analysis,Holomorphic PDE, Approximation Th.,Function Th. 13) Virginia S.Kiryakova Institute of Mathematics and Informatics Bulgarian Academy of Sciences Sofia 1090,Bulgaria [email protected] Special Functions,Integral Transforms, Fractional Calculus 14) Hans-Bernd Knoop Institute of Mathematics Gerhard Mercator University D-47048 Duisburg Germany tel.0049-203-379-2676

Institute of Mathematics Polish Academy of Sciences Chopina 12,87100 Torun, Poland [email protected] Mathematical Statistics,Probabilistic Inequalities 30) Bl. Sendov Institute of Mathematics and Informatics Bulgarian Academy of Sciences Sofia 1090,Bulgaria [email protected] Approximation Th.,Geometry of Polynomials, Image Compression 31) Igor Shevchuk Faculty of Mathematics and Mechanics National Taras Shevchenko University of Kyiv 252017 Kyiv UKRAINE [email protected] Approximation Theory 32) H.M.Srivastava Department of Mathematics and Statistics University of Victoria Victoria,British Columbia V8W 3P4 Canada tel.250-721-7455 office,250-477-6960 home, fax 250-721-8962 [email protected] Real and Complex Analysis,Fractional Calculus and Appl., Integral Equations and Transforms,Higher Transcendental Functions and Appl.,q-Series and q-Polynomials, Analytic Number Th. 33) Stevo Stevic Mathematical Institute of the Serbian Acad. of Science Knez Mihailova 35/I 11000 Beograd, Serbia [email protected]; [email protected] Complex Variables, Difference Equations, Approximation Th., Inequalities 34) Ferenc Szidarovszky Dept.Systems and Industrial Engineering The University of Arizona Engineering Building,111 PO.Box 210020 Tucson,AZ 85721-0020,USA [email protected] Numerical Methods,Game Th.,Dynamic Systems,

6

Page 7: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

[email protected] Approximation Theory,Interpolation 15) Jerry Koliha Dept. of Mathematics & Statistics University of Melbourne VIC 3010,Melbourne Australia [email protected] Inequalities,Operator Theory, Matrix Analysis,Generalized Inverses 16) Robert Kozma Dept. of Mathematical Sciences University of Memphis Memphis, TN 38152, USA [email protected]

Mathematical Learning Theory,

Dynamic Systems and Chaos,

Complex Dynamics.

17) Mustafa Kulenovic Departm ent of Mathematics University of Rhode Island Kingston,RI 02881,USA [email protected] Differential and Difference Equations 18) Gerassimos Ladas Department of Mathematics University of Rhode Island Kingston,RI 02881,USA [email protected] Differential and Difference Equations 19) V. Lakshmikantham Department of Mathematical Sciences Florida Institute of Technology Melbourne, FL 32901 e-mail: [email protected] Ordinary and Partial Differential Equations, Hybrid Systems, Nonlinear Analysis 20) Rupert Lasser Institut fur Biomathematik & Biomertie,GSF -National Research Center for environment and health Ingolstaedter landstr.1 D-85764 Neuherberg,Germany [email protected] Orthogonal Polynomials,Fourier Analysis, Mathematical Biology

Multicriteria Decision making, Conflict Resolution,Applications in Economics and Natural Resources Management 35) Gancho Tachev Dept.of Mathematics Univ.of Architecture,Civil Eng. and Geodesy 1 Hr.Smirnenski blvd BG-1421 Sofia,Bulgaria [email protected] Approximation Theory 36) Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock Germany [email protected] Approximation Th.,Wavelet,Fourier Analysis, Numerical Methods,Signal Processing, Image Processing,Harmonic Analysis 37) Chris P.Tsokos Department of Mathematics University of South Florida 4202 E.Fowler Ave.,PHY 114 Tampa,FL 33620-5700,USA [email protected],[email protected] Stochastic Systems,Biomathematics, Environmental Systems,Reliability Th. 38) Lutz Volkmann Lehrstuhl II fuer Mathematik RWTH-Aachen Templergraben 55 D-52062 Aachen Germany [email protected] Complex Analysis,Combinatorics,Graph Theory

7

Page 8: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Instructions to Contributors

Journal of Concrete and Applicable Mathematics A quartely international publication of Eudoxus Press, LLC, of TN.

Editor in Chief: George Anastassiou

Department of Mathematical Sciences University of Memphis

Memphis, TN 38152-3240, U.S.A.

1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves. 2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.

8

Page 9: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corrolaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,

9

Page 10: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990). Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986. Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495. 11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears. 15. This journal will consider for publication only papers that contain proofs for their listed results.

10

Page 11: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

THE METHOD OF LAPLACE AND WATSON’S LEMMA

RICHARD A. ZALIK

Abstract. in this paper we present a diferent proof of a well known asymp-totic estimate for Laplace integrals. The novelty of our approach is that it em-phasizes, and rigorously justifies, the appealing heuristic method of Laplace.

As a bonus, we also obtain a simple and short proof of Watson’s Lemma.

Let a be an element of the extended real number set [−∞,∞]. If

limx−→a

f(x)/g(x) = 1

we write

f(x) ∼ g(x), x −→ a

and say that f is asymptotic to g, or that g is an asymptotic approximation to f .If there is no risk of ambiguity, we may also write f ∼ g for the sake of brevity.

Note that f ∼ g if and only if lim(f(x) − g(x))/g(x) = 0. In other words, ifand only if the relative error made in approximating f by g tends to zero. In somecases, in particular when the values involved are either very small or very large, itmay be more appropriate to estimate the relative rather than the absolute error.

In this article we discuss the problem of obtaining asymptotic estimates forintegrals of the form

(1) I(x) :=

J

e−xp(t)q(t) dt,

where J is a bounded or unbounded interval, p(x) and q(x) are functions satisfyingcertain properties, and x −→ ∞. Most authors, such as Bender and Orszag [1]use an appealing heuristic method attributed to Laplace to obtain an asymptoticestimate for I(x). A rigorous proof may be found in, for example, Erdelyi [2, §2.4](see also Olver [3, pp.80–82]). We give another rigorous proof of this estimate inTheorem 1. The novelty of our approach consists in breaking down the proof bymeans of two preliminary lemmas that highlight and rigorously justify the methodof Laplace.

Under suitable conditions I(x) has an infinite asymptotic expansion (see forexample [3, pp.85–88]). In Theorem 2 we use Lemma 2 to give a simple proofof Watson’s lemma, which gives an infinite asymptotic expansion for I(x) whenp(t) = t. We define asymptotic series in the paragraph preceding the statement ofTheorem 2.

We begin with

Lemma 1. Let J be an interval of the form [a,∞) or [a, b], a < b, and assumethat the following conditions are satisfied:

Key words and phrases. Asymptotic methods; Laplace integrals; Watson’s Lemma.2010 Mathematics Classification: 34E05.

1

11

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS,VOL. 10, NO'S 1-2, 11-16, 2012, COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 12: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

2 RICHARD A. ZALIK

(a) The function p(t) is real–valued and measurable on J and for every pointc > a in J ,

(2) infp(t); t ∈ J ∩ [c,∞) > p(a).

(b) There is a number σ > 0 such that p(t) is continuous and strictly increasingon [a, a+ σ].

(c) The function q(t) is Lebesgue integrable on J .(d) There are numbers α > −1 and Q 6= 0 such that

q(t) ∼ Q(t− a)α, t → a+.

Let I(x) be given by (1) and, for δ > 0 such that a+ δ ∈ J ,

(3) I(x, δ) :=

∫ a+δ

a

e−xp(t)q(t) dt.

Then e−xp(t)q(t) is Lebesgue integrable on J for every positive x and there is anumber η > 0 such that p(t) is strictly increasing on [a, a + η], and 0 < δ ≤ ηimplies that

(4) I(x) ∼ I(x, δ), x → ∞.

Remark 1: Equation (2) is needed when J = [a,∞) to ensure that p(t) remainsbounded away from p(a) as t grows. If J = [a, b], (2) is equivalent to p(t) having aunique absolute minimum at a.

Proof. The integrability follows from

|e−xp(t)q(t)| = e−xp(a)e−x[p(t)−p(a)]|q(t)| ≤ e−xp(a)|q(t)|.

From (b) and (d) there is a number η > 0 such that p(t) is continuous and strictlyincreasing on [a, a+ η], and if t ∈ (a, a+ η] then

|Q−1(t− a)−αq(t)− 1| < 1/2.

Thus Q−1(t − a)−αq(t) > 1/2, and we conclude that q(t) has constant sign on(a, a+ η] and that

|q(t)| > (1/2)|Q|(t− a)α on (a, a+ η].

Let δ ∈ (0, η] be arbitrary but fixed, and let Jδ := J \ [a, a+ δ) and

Mδ := infp(t); t ∈ Jδ.

Assume x > 0. Since the hypotheses imply that p(a) < Mδ we have∣

e−xp(t)q(t) dt

e−xp(t)|q(t)| dt ≤ K1e−Mδx.

Let C ∈ (p(a),Mδ). By continuity, there is a δ1 ∈ (0, δ] such that p(a + δ1) < C.Since p(t) is strictly increasing on [a, a + δ1], we deduce that p(t) < C for t ∈[a, a+ δ1]. Since q(t) has constant sign on (a, a+ δ], we have

|I(x, δ)| =

∫ a+δ

a

e−xp(t)q(t) dt

=

∫ a+δ

a

e−xp(t)|q(t)| dt ≥

∫ a+δ1

a

e−xp(t)|q(t)| dt ≥ (1/2)|Q|

∫ a+δ1

a

e−xp(t)(t− a)α| dt ≥ K2e−Cx.

R. ZALIK, WATSON'S LEMMA

12

Page 13: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

THE METHOD OF LAPLACE AND WATSON’S LEMMA 3

Thus∣

e−xp(t)q(t) dt

I(x, δ)

≤ K3e(C−Mδ)x −→ 0, x −→ ∞.

Since

I(x) = I(x, δ) +

e−xp(t)q(t) dt,

the assertion follows.

As a consequence of Lemma 1 we obtain the following basic proposition, whichwill be used to prove both theorems in this paper.

Lemma 2. Let J be an interval of the form [a,∞) or [a, b] with a < b, and assumethat the function q(t) satisfies conditions (c) and (d) of Lemma 1. Then

J

e−xtq(t) dt ∼ Q

J

e−xt(t− a)α dt, x → ∞.

Proof. If J = [a,∞), Lemma 1 implies that there exists a number b > a such that∫

J

e−xtq(t) dt ∼

∫ b

a

e−xtq(t) dt, x → ∞.

Thus we may assume without loss of generality that J = [a, b].Let

A(x) :=

∫ b

a e−xtq(t) dt

Q∫ b

ae−xt(t− a)α dt

, A1(x, δ) :=

∫ b

a e−xtq(t) dt∫ a+δ

ae−xtq(t) dt

,

A2(x, δ) :=

∫ a+δ

ae−xtq(t) dt

Q∫ a+δ

a e−xt(t− a)α dt, A3(x, δ) :=

∫ a+δ

ae−xt(t− a)α dt

∫ b

a e−xt(t− a)α dt.

Applying Lemma 1 we see that there is a δ1 > 0 such that if 0 < δ ≤ δ1, then

(5) limx→∞

A1(x, δ) = limx→∞

A3(x, δ) = 1.

Let ε > 0 be given. Then there is a δ2 > 0 such that if 0 < t− a < δ2, then

(6) |Q−1(t− a)−αq(t)− 1| < ε.

Let δ := min(δ1, δ2). Since the Generalized Mean Value Theorem implies there is aξ ∈ (a, a+ δ) such that A2(x, δ) = Q−1(ξ − a)−αq(ξ), we conclude from (6) that

−ε ≤ A2(x, δ)− 1 ≤ ε.

SinceA(x) = A1(x, δ)A2(x, δ)A3(x, δ),

we deduce from (5) that

1− ε ≤ lim infx→∞

A(x) ≤ lim supx→∞

A(x) ≤ 1 + ε.

Since ε is arbitrary, the assertion follows.

Theorem 1. Let J be an interval of the form [a,∞) or [a, b], a < b, and assumethat the following conditions are satisfied:

(a) The function p(t) is real–valued and measurable on J and for every pointc > a in J , inequality (2) holds.

(b) There is a number σ > 0 such that p(t) is continuous and strictly increasingon [a, a+ σ], and p ∈ C1(a, a+ σ].

R. ZALIK, WATSON'S LEMMA

13

Page 14: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

4 RICHARD A. ZALIK

(c) There are numbers P, µ > 0 such that

(7) p(t)− p(a) ∼ P (t− a)µ, t → a+,

and

(8) p′(t) ∼ µP (t− a)µ−1, t → a+.

(d) The function q(t) is Lebesgue integrable on J .(e) There are numbers λ > 0 and Q 6= 0 such that

(9) q(t) ∼ Q(t− a)λ−1, t → a+.

Then e−xp(t)q(t) is Lebesgue integrable on J for every positive x, and if I(x) isgiven by (1) then

(10) I(x) ∼Q

µΓ

(

λ

µ

)

e−xp(a)

(Px)λ/µ, x → ∞.

Remark 2: Conditions (b), (c) and (d) are satisfied if, for instance, there is apositive integer µ and a positive number σ such that p ∈ Cµ[a, a+ σ],

p(ℓ)(a) = 0, 1 ≤ ℓ ≤ µ− 1, and p(µ)(a) < 0.

Proof. From Lemma 1 we deduce that there is a δ0 > 0 such that p(t) is continuousand strictly increasing on [a, a + δ0], p ∈ C1(a, a + δ0], and (4) is satisfied for anyδ ∈ (0, δ0]. Let δ be an arbitrary but fixed number in (0, δ0], and let I(x, δ) begiven by (3). Making the change of variable s = p(t) we see that

I(x, δ) =

∫ p(a+δ)

p(a)

e−xs q[p−1(s)]

p′[p−1(s)]ds.

Setting c = p(a) and applying (7) we have

lims→c+

(

p−1(s)− a)µ

s− c= lim

t→a+

(t− a)µ

p(t)− p(a)= 1/P.

Therefore

(11) p−1(s)− a ∼

(

s− c

P

)1/µ

, s → c+.

Moreover, (9) implies that

q[p−1(s)] ∼ Q[p−1(s)− a]λ−1, s → c+.

Thus, from (11),

(12) q[p−1(s)] ∼ Q

(

s− c

P

)(λ−1)/µ

, s → c+.

On the other hand, (8) and (11) yield

(13) p′[p−1(s)] ∼ µP (p−1(s)− a)µ−1 ∼ µ(P )1/µ(s− c)1−1/µ, s → c+.

Combining (12) and (13) we conclude that

q[p−1(s)]

p′[p−1(s)]∼ (Q/µ)(P )−(λ/µ)(s− c)λ/µ−1, s → c+,

R. ZALIK, WATSON'S LEMMA

14

Page 15: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

THE METHOD OF LAPLACE AND WATSON’S LEMMA 5

and Lemma 2 implies that

I(x, δ) ∼

∫ p(a+δ)

p(a)

e−xs(Q/µ)(P )−(λ/µ)(s− c)λ/µ−1 ds =

(Q/µ)(P )−(λ/µ)

∫ p(a+δ)

p(a)

e−xs(s− c)λ/µ−1 ds =

(Q/µ)(P )−λ/µep(a)x∫ p(a+δ)−p(a)

0

e−xttλ/µ−1 dt.

But Lemma 1 implies that there is a δ ∈ (0, δ0] such that∫ p(a+δ)−p(a)

0

e−xttλ/µ−1 dt ∼

0

e−xttλ/µ−1 dt = Γ

(

λ

µ

)

x−λ/µ, x → ∞,

and the assertion follows.

In the preceding theorem we have assumed that the minimum of p(t) is uniqueand occurs at a. In other cases the interval of integration may be subdivided atthe maxima and minima of p(t). We may then apply Theorem 1 to intervals wherethe minimum is at a left end–point, and Corollary 1 below to intervals where theminimum is at a right end–point.

Making the change of variable t −→ −t we obtain

Corollary 1. Let J be an interval of the form (−∞, b] or [a, b], a < b, and assumethat the following conditions are satisfied:

(a) The function p(t) is real–valued and measurable on J and for every pointc < b in J ,

infp(t); t ∈ J ∩ (−∞, c] > p(b).

(b) There is a number σ > 0 such that p(t) is continuous and strictly decreasingon [b− σ, b], and p ∈ C1[b− σ, b).

(c) There are numbers P, µ > 0 such that

p(t)− p(b) ∼ P (b− t)µ, t −→ b−.

andp′(t) ∼ −µP (b− t)µ−1, t → b−.

(d) The function q(t) is Lebesgue integrable on J .(e) There are numbers λ > 0 and Q 6= 0 such that

q(t) ∼ Q(b− t)λ−1, t → b−.

Then e−xp(t)q(t) is Lebesgue integrable on J for every positive x, and if I(x) isgiven by (1) then

I(x) ∼Q

µΓ

(

λ

µ

)

e−xp(b)

(Px)λ/µ, x → ∞.

Before proceeding further, let us recall the definition of asymptotic expansion inthe particular format that we require here. Let (fk)

k=0 be a sequence of functions,let (a(k))∞k=0 be a sequence of scalars such that the set of integers k for whicha(k) 6= 0 is infinite, and let m(k) := infr ≥ k : a(r) 6= 0. We say that

f(x) ∼

∞∑

k=0

a(k)fk, x −→ a,

R. ZALIK, WATSON'S LEMMA

15

Page 16: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

6 RICHARD A. ZALIK

if for every n > 0

f(x)−

n−1∑

k=0

a(k)fk ∼ a(m(n))fm(n)), x −→ a,

Fron Lemma 2 we obtain a simple proof of Watson’s Lemma ([2, §2.4], [3, p.71]):

Theorem 2. (Watson’s Lemma) Let J be an interval of the form [0,∞) or [0, b],b > 0, and assume that q(t) is Lebesgue integrable on J and that there are α > −1and β > 0 such that

q(t) ∼

∞∑

k=0

aktα+βk, t → 0+.

If

I(x) :=

J

e−xtq(t) dt,

then

I(x) ∼

∞∑

k=0

akΓ(α+ βk + 1)

xα+βk+1, x → ∞.

Proof. Defining if necessary q(t) to equal 0 on [b,∞) we may assume, withoutessential loss of generality, that J = [0,∞).

Let n ≥ 0 be an arbitrary integer, and let N denote the smallest integer k ≥ nsuch that ak+1 6= 0. By definition,

q(t)−n∑

k=0

aktα+βk ∼ aN+1t

α+β(N+1), t → 0+.

Applying Lemma 2 we conclude that∫

0

[

q(t)−

n∑

k=0

aktα+βk

]

e−xt dt ∼

0

tα+β(N+1)e−xt dt, x → ∞,

i.e.,

I(x) −

n∑

k=0

akΓ(α+ βk + 1)

xα+βk+1∼

Γ(α+ β(N + 1) + 1)

xα+β(N+1)+1, x → ∞,

and the assertion follows.

The interested reader will have no difficulty in applying Lemma 1 and Lemma 2to obtain a version of Watson’s lemma for an arbitrary p(t), as in [3, p.86].

References

[1] C. M. Bender and S. A. Orszag, Advanced Mathematical Methods for Scientists and Engi-

neers, McGraw–Hill, New York, 1978. Reprint, Springer–Verlag, New–York 1999.[2] A. Erdelyi, Asymptotic Expansions, Dover, New York, 1956.[3] F. W. J. Olver, Asymptotics and Special Functions, Academic Press, New York, 1974.

Department of Mathematics and Statistics, Auburn University, AL 36849–5310

E-mail address: [email protected]

R. ZALIK, WATSON'S LEMMA

16

Page 17: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

On special strong di¤erential subordinations using a generalizedS¼al¼agean operator and Ruscheweyh derivative

Alina Alb LupasDepartment of Mathematics and Computer Science

University of Oradeastr. Universitatii nr. 1, 410087 Oradea, Romania

[email protected]

Abstract

In the present paper we establish several strong di¤erential subordinations regardind the new operatorRDn

;, given by RDn; : A

! A , RD

n;f(z; ) = (1 )Rnf(z; ) + Dn

f(z; ); where Rnf(z; )

denote the Ruscheweyh derivative, Dnf(z; ) is the generalized S¼al¼agean operator and A

n = ff 2H(U U); f(z; ) = z + an+1 () zn+1 + : : : ; z 2 U; 2 Ug is the class of normalized analytic functionswith A

1 = A : A certain subclass, denoted by RDn (; ; ) ; of analytic functions is introduced by

means of the new operator.

Keywords: strong di¤erential subordination, univalent function, convex function, di¤erential operator, bestdominant, generalized S¼al¼agean operator, Ruscheweyh derivative.2000 Mathematical Subject Classication: 30C45, 30A20, 34A40.

1 Introduction

Denote by U the unit disc of the complex plane U = fz 2 C : jzj < 1g, U = fz 2 C : jzj 1g the closedunit disc of the complex plane and H(U U) the class of analytic functions in U U .Let An = ff 2 H(U U); f(z; ) = z + an+1 () z

n+1 + : : : ; z 2 U; 2 Ug; with A1 = A ;where ak () are holomorphic functions in U for k 2; and H[a; n; ] = ff 2 H(U U); f(z; ) =a+ an () z

n + an+1 () zn+1 + : : : ; z 2 U; 2 Ug; for a 2 C and n 2 N; ak () are holomorphic functions in

U for k n:

Denition 1.1 For f 2 A , 0 and n 2 N, the operator Dn is dened by D

n : A ! A ,

D0f (z; ) = f (z; ) ;

D1f (z; ) = (1 ) f (z; ) + zf 0(z; ) = Df (z; ) ; :::

Dn+1 f(z; ) = (1 )Dn

f (z; ) + z (Dnf (z; ))

0= D (D

nf (z; )) , z 2 U; 2 U:

Remark 1.1 If f 2 A and f(z) = z +P1

j=2 aj () zj, then Dn

f (z; ) = z +P1

j=2 [1 + (j 1)]naj () z

j,z 2 U; 2 U .

Denition 1.2 For f 2 A , n 2 N; the operator Rn is dened by Rn : A ! A ,

R0f (z; ) = f (z; ) ;

R1f (z; ) = zf 0 (z; ) ; :::

(n+ 1)Rn+1f (z; ) = z (Rnf (z; ))0+ nRnf (z; ) , z 2 U; 2 U:

Remark 1.2 If f 2 A , f(z; ) = z +P1

j=2 aj () zj, then Rnf (z; ) = z +

P1j=2 C

nn+j1aj () z

j, z 2 U; 2 U:

1

17

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.'S 1-2, 17-23, 2012, COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 18: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Generalizing the notion of di¤erential subordinations, J.A. Antonino and S. Romaguera have introducedin [4] the notion of strong di¤erential subordinations, which was developed by G.I. Oros and Gh. Oros in [6],[5].

Denition 1.3 [6] Let f (z; ), H (z; ) analytic in U U: The function f (z; ) is said to be strongly sub-ordinate to H (z; ) if there exists a function w analytic in U , with w (0) = 0 and jw (z)j < 1 such thatf (z; ) = H (w (z) ; ) for all 2 U . In such a case we write f (z; ) H (z; ) ; z 2 U; 2 U:

Remark 1.3 [6] (i) Since f (z; ) is analytic in U U , for all 2 U; and univalent in U; for all 2 U ,Denition 1.3 is equivalent to f (0; ) = H (0; ) ; for all 2 U; and f

U U

H

U U

:

(ii) If H (z; ) H (z) and f (z; ) f (z) ; the strong subordination becomes the usual notion of subor-dination.

We have need the following lemmas to study the strong di¤erential subordinations.

Lemma 1.1 [3] Let h (z; ) be a convex function with h (0; ) = a for every 2 U and let 2 C be acomplex number with Re 0. If p 2 H[a; n; ] and p (z; ) + 1

zp0z (z; ) h (z; ) ; then p (z; )

g (z; ) h (z; ) ; where g (z; ) =

nz n

R z0h (t; ) t

n1dt is convex and it is the best dominant.

Lemma 1.2 [3] Let g (z; ) be a convex function in UU , for all 2 U; and let h(z; ) = g(z; )+nzg0z(z; );z 2 U; 2 U; where > 0 and n is a positive integer. If p(z; ) = g(0; )+pn () zn+pn+1 () zn+1+: : : ; z 2 U; 2 U; is holomorphic in U U and p(z; ) + zp0z(z; ) h(z; ); z 2 U; 2 U; then p(z; ) g(z; )and this result is sharp.

2 Main results

Denition 2.1 Let 2 [0; 1), ; 0 and m 2 N. A function f 2 A is said to be in the classRDm (; ; ; ) if it satises the inequality

ReRDm

;f (z; )0z> ; z 2 U; 2 U: (2.1)

Theorem 2.1 The set RDm (; ; ; ) is convex.

Proof. Let the functions fj (z; ) = z +P1

j=2 ajk () zj , k = 1; 2; z 2 U; 2 U; be in the class

RDm (; ; ; ). It is su¢ cient to show that the function h (z; ) = 1f1 (z; ) + 2f2 (z; ) is in the classRDm (; ; ; ) ; with 1 and 2 nonnegative such that 1 + 2 = 1:Since h (z; ) = z +

P1j=2 (1aj1 () + 2aj2 ()) z

j ; z 2 U; 2 U; then

RDm;h (z; ) = z +

1Pj=2

[1 + (j 1)]m + (1 )Cmm+j1

(1aj1 () + 2aj2 ()) z

j , z 2 U; 2 U:

(2.2)Di¤erentiating (2.2) we obtainRDm

;h (z; )0z= 1+

P1j=2

[1 + (j 1)]m + (1 )Cmm+j1

(1aj1 (z) + 2aj2 ()) jz

j1; z 2 U; 2U:Hence

ReRDm

;h (z; )0z= 1 + Re

1

1Pj=2

j [1 + (j 1)]m + (1 )Cmm+j1

aj1 () z

j1

!(2.3)

+Re

2

1Pj=2

j [1 + (j 1)]m + (1 )Cmm+j1

aj2 () z

j1

!:

Taking into account that f1; f2 2 RDm (; ; ; ) we deduce

Re

k

1Pj=2

j [1 + (j 1)]m + (1 )Cmm+j1

ajk () z

j1

!> k ( 1) ; k = 1; 2: (2.4)

2

A.LUPAS,...SALAGEAN OPERATOR AND RUSCHEWEYH DERIVATIVE

18

Page 19: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Using (2.4) we get from (2.3)

ReRDm

;h (z; )0z> 1 + 1 ( 1) + 2 ( 1) = , z 2 U; 2 U;

which is equivalent that RDm (; ; ; ) is convex.

Theorem 2.2 Let g (z; ) be a convex function such that g (0; ) = 1 and let h be the function h (z; ) =g (z; ) + 1

c+2zg0z (z; ), z 2 U; 2 U; c > 0. If ; 0, m 2 N, f 2 RDm (; ; ; ) and F (z; ) =

Ic (f) (z; ) =c+2zc+1

R z0tcf (t; ) dt; z 2 U; 2 U; then

RDm;f(z; )

0z h (z; ) , z 2 U; 2 U; (2.5)

implies RDm

;F (z; )0z g (z; ) , z 2 U; 2 U;

and this result is sharp.

Proof. We obtain that

zc+1F (z; ) = (c+ 2)

Z z

0

tcf (t; ) dt: (2.6)

Di¤erentiating (2.6), with respect to z, we have (c+ 1)F (z; ) + zF 0z (z; ) = (c+ 2) f (z; ) and

(c+ 1)RDm;F (z; ) + z

RDm

;F (z; )0z= (c+ 2)RDm

;f (z; ) ; z 2 U; 2 U: (2.7)

Di¤erentiating (2.7) with respect to z we haveRDm

;F (z; )0z+

1

c+ 2zRDm

;F (z; )00z2=RDm

;f (z; )0z, z 2 U; 2 U: (2.8)

Using (2.8), the strong di¤erential subordination (2.5) becomesRDm

;F (z; )0z+

1

c+ 2zRDm

;F (z; )00z2 g (z; ) + 1

c+ 2zg0z (z; ) : (2.9)

Denotep (z; ) =

RDm

;F (z; )0z; z 2 U; 2 U: (2.10)

Replacing (2.10) in (2.9) we obtain

p (z; ) +1

c+ 2zp0z (z; ) g (z; ) +

1

c+ 2zg0z (z; ) , z 2 U; 2 U:

Using Lemma 1.2 we have

p (z; ) g (z; ) ; z 2 U; 2 U; i.e.RDm

;F (z; )0z g (z; ) , z 2 U; 2 U;

and this result is sharp.

Theorem 2.3 Let h (z; ) = +(2)z1+z ; z 2 U; 2 U; 2 [0; 1) and c > 0. If ; 0, m 2 N and Ic is

given by Theorem 2.2, thenIc [RDm (; ; ; )] RDm (; ; ; ) ; (2.11)

where = 2 + 2 (c+ 2) ( ) (c) and (x) =R 10

tx

t+1dt:

Proof. The function h is convex and using the same steps as in the proof of Theorem 2.2 we get fromthe hypothesis of Theorem 2.3 that p (z; ) + 1

c+2zp0z (z; ) h (z; ) ; where p (z; ) is dened in (2.10).

Using Lemma 1.1 we deduce that p (z; ) g (z; ) h (z; ) ; that isRDm

;F (z; )0z g (z; )

h (z; ) ; where g (z; ) = c+2zc+2

R z0tc+1 +(2)t1+t dt = (2 ) + 2(c+2)()

zc+2

R z0tc+1

1+t dt: Since g is convex andgU U

is symmetric with respect to the real axis, we deduce

ReRDm

;F (z; )0z min

jzj=1Re g (z; ) = Re g (1; ) = = 2 + 2 (c+ 2) ( ) (c) : (2.12)

From (2.12) we deduce inclusion (2.11).

3

A.LUPAS,...SALAGEAN OPERATOR AND RUSCHEWEYH DERIVATIVE

19

Page 20: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Theorem 2.4 Let g (z; ) be a convex function such that g (0; ) = 1 and let h be the function h (z; ) =g (z; ) + zg0z (z; ), z 2 U; 2 U . If ; 0, m 2 N, f 2 A and the strong di¤erential subordination

RDm;f(z; )

0z h (z; ) , z 2 U; 2 U; (2.13)

holds, thenRDm

;f(z; )

z g (z; ) , z 2 U; 2 U;

and this result is sharp.

Proof. By using the properties of operator RDm;, we have

RDm;f(z; ) = z +

P1j=2

[1 + (j 1)]m + (1 )Cmm+j1

aj () z

j ; z 2 U; 2 U:

Consider p(z; ) =RDm

;f(z;)

z =z+P1

j=2f[1+(j1)]m+(1)Cmm+j1gaj()zj

z = 1 + p1 () z + p2 () z2 +

:::; z 2 U; 2 U:Let RDm

;f(z; ) = zp(z; ); z 2 U; 2 U: Di¤erentiating with respect to z we obtainRDm

;f(z; )0z=

p(z; ) + zp0z(z; ); z 2 U; 2 U:Then (2.13) becomes

p(z; ) + zp0z(z; ) h(z; ) = g(z; ) + zg0z(z; ); z 2 U; 2 U:

By using Lemma 1.2, we have

p(z; ) g(z; ); z 2 U; 2 U; i.e.RDm

;f(z; )

z g(z; ); z 2 U; 2 U:

Theorem 2.5 Let h (z; ) be a convex function such that h (0; ) = 1. If ; 0; m 2 N, f 2 A and thestrong di¤erential subordination

RDm;f(z; )

0z h (z; ) , z 2 U; 2 U; (2.14)

holds, thenRDm

;f(z; )

z g (z; ) h (z; ) , z 2 U; 2 U;

where g (z; ) = 1z

R z0h(t)dt is convex and it is the best dominant.

Proof. With notation p (z; ) =RDm

;f(z;)

z = 1+P1

j=2

[1 + (j 1)]m + (1 )Cmm+j1

aj () z

j1

and p (0; ) = 1, we obtain for f(z; ) = z +P1

j=2 aj () zj ; p (z; ) + zp0z (z; ) =

RDm

;f(z; )0z:

We have p (z; ) + zp0z (z; ) h (z; ), z 2 U; 2 U . Since p (z; ) 2 H [1; 1; ] ; using Lemma 1.1, for

n = 1 and = 1; we obtain p (z; ) g (z; ) h (z; ), z 2 U , 2 U , i.e. RDm;f(z;)

z g (z; ) =1z

R z0h(t)dt h (z; ), z 2 U; 2 U , and g (z; ) is convex and it is the best dominant.

Corollary 2.6 Let h(z; ) = +(2)z1+z ; a convex function in U U , 0 < 1. If ; 0, m 2 N; f 2 A

and veries the strong di¤erential subordinationRDm

;f(z; )0z h(z; ); z 2 U; 2 U; (2.15)

thenRDm

;f(z; )

z g (z; ) h (z; ) , z 2 U; 2 U;

where g is given by g(z; ) = 2 + 2()z ln (1 + z) ; z 2 U; 2 U: The function q is convex and it is the

best dominant.

4

A.LUPAS,...SALAGEAN OPERATOR AND RUSCHEWEYH DERIVATIVE

20

Page 21: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Proof. Following the same steps as in the proof of Theorem 2.5 and considering p(z; ) =RDm

;f(z;)

z ,the strong di¤erential subordination (2.15) becomes

p(z; ) + zp0z(z; ) h(z; ) = + (2 )z

1 + z; z 2 U; 2 U:

By using Lemma 1.1 for n = 1 and = 1, we have p (z; ) g (z; ) h (z; ), z 2 U , 2 U , i.e.,

RDm;f(z; )

z g (z; ) = 1

z

Z z

0

h (t; ) dt =1

z

Z z

0

+ (2 ) t1 + t

dt = 2 + 2( )z

ln (1 + z) ;

z 2 U; 2 U:

Theorem 2.7 Let g (z; ) be a convex function such that g (0; ) = 1 and let h be the function h (z; ) =g (z; ) + zg0z (z; ), z 2 U; 2 U . If ; 0, m 2 N, f 2 A and the strong di¤erential subordination

zRDm+1; f (z; )

RDm;f (z; )

!0z

h (z; ) , z 2 U; 2 U; (2.16)

holds, thenRDm+1

; f (z; )

RDm;f (z; )

g (z; ) , z 2 U; 2 U;

and this result is sharp.

Proof. For f 2 An , f(z; ) = z +P1

j=2 aj () zj we have

RDm;f(z; ) = z +

P1j=2

[1 + (j 1)]m + (1 )Cmm+j1

aj () z

j , z 2 U; 2 U .

Consider p (z; ) =RDm+1

; f(z;)

RDm;f(z;)

=z+P1

j=2([1+(j1)]m+1+(1)Cm+1

m+j )aj()zj

z+P1

j=2([1+(j1)]m+(1)Cm

m+j1)aj()zj=

1+P1

j=2([1+(j1)]m+1+(1)Cm+1

m+j )aj()zj1

1+P1

j=2([1+(j1)]m+(1)Cm

m+j1)aj()zj1:

We have p0z (z; ) =(RDm+1

; f(z;))0z

RDm;f(z;)

p (z; ) (RDm;f(z;))

0z

RDm;f(z;)

:

Then p (z; ) + zp0z (z; ) =zRDm+1

; f(z;)

RDm;f(z;)

0z

:

Relation (2.16) becomes p (z; ) + zp0z (z; ) h (z; ) = g (z; ) + zg0z (z; ), z 2 U; 2 U; and by usingLemma 1.2 we obtain p (z; ) g (z; ), z 2 U; 2 U , i.e. RD

m+1; f(z;)

RDm;f(z;)

g (z; ), z 2 U; 2 U:

Theorem 2.8 Let g (z; ) be a convex function such that g (0; ) = 1 and let h be the function h (z; ) =g (z; ) + zg0z (z; ), z 2 U; 2 U . If ; 0, m 2 N, f 2 A and the strong di¤erential subordination

(m+ 1) (m+ 2)

zRDm+2

; f (z; ) (m+ 1) (2m+ 1)z

RDm+1; f (z; ) +

m2

zRDm

;f (z; )

(m+ 1) (m+ 2) 1

2

z

Dm+2 f (z; ) +

h(m+ 1) (2m+ 1) 2(1)

2

iz

Dm+1 f (z; )

hm2 (1)2

2

iz

Dm f (z; ) h(z; ); z 2 U; 2 U; (2.17)

holds, then RDm

;f(z; )0z g(z; ); z 2 U; 2 U:

This result is sharp.

5

A.LUPAS,...SALAGEAN OPERATOR AND RUSCHEWEYH DERIVATIVE

21

Page 22: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Proof. Letp(z; ) =

RDm

;f(z; )0z= (1 ) (Rmf(z; ))0z + (D

m f(z; ))

0z (2.18)

= 1 +1Xj=2

[1 + (j 1)]m + (1 )Cmm+j1

jaj () z

j1 = 1 + p1 () z + p2 () z2 + ::::

By using the properties of operators RDm;, R

m and Dm , after a short calculation, we obtain

p (z; ) + zp0z (z; ) =(m+1)(m+2)

z RDm+2; f (z; ) (m+1)(2m+1)

z RDm+1; f (z; )+ m2

z RDm;f (z; )

[(m+1)(m+2) 12]

z Dm+2 f (z; )+

[(m+1)(2m+1) 2(1)2

]z Dm+1

f (z; )

m2 (1)2

2

z Dm

f (z; ) :Using the notation in (2.18), the strong di¤erential subordination becomes

p(z; ) + zp0z(z; ) h(z; ) = g(z; ) + zg0z(z; ):

By using Lemma 1.2, we have

p(z; ) g(z; ); z 2 U; 2 U; i.e.RDm

;f(z; )0z g(z; ); z 2 U , 2 U;

and this result is sharp.

Theorem 2.9 Let h (z; ) be a convex function such that h (0; ) = 1. If ; 0; m 2 N, f 2 A and thestrong di¤erential subordination

(m+ 1) (m+ 2)

zRDm+2

; f (z; ) (m+ 1) (2m+ 1)z

RDm+1; f (z; ) +

m2

zRDm

;f (z; )

(m+ 1) (m+ 2) 1

2

z

Dm+2 f (z; ) +

h(m+ 1) (2m+ 1) 2(1)

2

iz

Dm+1 f (z; )

hm2 (1)2

2

iz

Dm f (z; ) h (z; ) , z 2 U; 2 U; (2.19)

holds, then RDm

;f(z; )0z g (z; ) h (z; ) , z 2 U; 2 U;

where g (z; ) = 1z

R z0h(t)dt is convex and it is the best dominant.

Proof. Using the properties of operator RDm; and considering p (z) =

RDm

;f (z; )0z2 H [1; 1; ],

we obtainp (z; ) + zp0z (z; ) =

(m+1)(m+2)z RDm+2

; f (z; ) (m+1)(2m+1)z RDm+1

; f (z; )+ m2

z RDm;f (z; )

[(m+1)(m+2) 12]

z Dm+2 f (z; )+

[(m+1)(2m+1) 2(1)2

]z Dm+1

f (z; )

m2 (1)2

2

z Dm

f (z; ), z 2 U , 2U:Then (m+1)(m+2)

z RDm+2; f (z; ) (m+1)(2m+1)

z RDm+1; f (z; )+ m2

z RDm;f (z; )

[(m+1)(m+2) 12]

z Dm+2 f (z; )+

[(m+1)(2m+1) 2(1)2

]z Dm+1

f (z; )

m2 (1)2

2

z Dm

f (z; ) h (z; ),z 2 U; 2 U; becomes p (z; ) + zp0z (z; ) h (z; ), z 2 U , 2 U: By using Lemma 1.1, for n = 1 and = 1; we obtain

p (z; ) g (z; ) h (z; ) ; z 2 U; 2 U; i.e.RDm

;f(z; )0z g (z; ) = 1

z

Z z

0

h(t)dt h (z; ) ; z 2 U; 2 U;

and g (z; ) is convex and it is the best dominant.

6

A.LUPAS,...SALAGEAN OPERATOR AND RUSCHEWEYH DERIVATIVE

22

Page 23: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Corollary 2.10 Let h(z; ) = +(2)z1+z a convex function in U U , 0 < 1. If ; 0, m 2 N; f 2 A

and veries the strong di¤erential subordination

(m+ 1) (m+ 2)

zRDm+2

; f (z; ) (m+ 1) (2m+ 1)z

RDm+1; f (z; ) +

m2

zRDm

;f (z; )

(m+ 1) (m+ 2) 1

2

z

Dm+2 f (z; ) +

h(m+ 1) (2m+ 1) 2(1)

2

iz

Dm+1 f (z; )

hm2 (1)2

2

iz

Dm f (z; ) h(z; ); z 2 U; 2 U; (2.20)

then RDm

;f(z; )0z g (z; ) h (z; ) , z 2 U; 2 U;

where g is given by g(z; ) = 2 + 2()z ln (1 + z) ; z 2 U; 2 U: The function q is convex and it is the

best dominant.

Proof. Following the same steps as in the proof of Theorem 2.9 and considering p(z; ) =RDm

;f(z; )0z,

the strong di¤erential subordination (2.20) becomes

p(z; ) + zp0z(z; ) h(z; ) = + (2 )z

1 + z; z 2 U; 2 U:

By using Lemma 1.1 for n = 1 and = 1, we have p (z; ) g (z; ) h (z; ), z 2 U , 2 U , i.e.

RDm

;f(z; )0z g (z; ) = 1

z

Z z

0

h (t; ) dt =1

z

Z z

0

+ (2 ) t1 + t

dt = 2 + 2( )z

ln (1 + z) ;

z 2 U; 2 U:

References

[1] A. Alb Lupas, On special di¤erential subordinations using S¼al¼agean and Ruscheweyh operators, Mathe-matical Inequalities and Applications, Volume 12, Issue 4 (2009), 781-790.

[2] A. Alb Lupas, On special di¤erential subordinations using a generalized S¼al¼agean operator and Ruscheweyhderivative, Journal of Computational Analysis and Applications, Vol. 13, No.1, 2011, 98-107.

[3] A. Alb Lupas, G.I. Oros, Gh. Oros, On special strong di¤erential subordinations using S¼al¼agean andRuscheweyh operators, Journal of Computational Analysis and Applications, submitted, 2011.

[4] J.A. Antonino, S. Romaguera, Strong di¤erential subordination to Briot-Bouquet di¤erential equations,Journal of Di¤erential Equations, 114 (1994), 101-105.

[5] G.I. Oros, On a new strong di¤erential subordination, (to appear).

[6] G.I. Oros, Gh. Oros, Strong di¤erential subordination, Turkish Journal of Mathematics, 33 (2009), 249-257.

7

A.LUPAS,...SALAGEAN OPERATOR AND RUSCHEWEYH DERIVATIVE

23

Page 24: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

A note on special strong di¤erential subordinations using amultiplier transformation and Ruscheweyh derivative

Alina Alb LupasDepartment of Mathematics and Computer Science

University of Oradeastr. Universitatii nr. 1, 410087 Oradea, Romania

[email protected]

Abstract

In the present paper we establish several strong di¤erential subordinations regardind the new operatorRIm;;l, given by RI

m;;l : A

n ! An , RI

m;;lf(z; ) = (1 )Rmf(z; ) + I (m;; l) f(z; ); where

Rmf(z; ) denote the Ruscheweyh derivative, I (m;; l) is the multiplier transformation and An = ff 2

H(U U); f(z; ) = z + an+1 () zn+1 + : : : ; z 2 U; 2 Ug is the class of normalized analytic functions.A certain subclass, denoted by RIm (; ; l; ; ) ; of analytic functions is introduced by means of the newoperator.

Keywords: strong di¤erential subordination, univalent function, convex function, best dominant, di¤erentialoperator, multiplier transformation, Ruscheweyh derivative.2000 Mathematical Subject Classication: 30C45, 30A20, 34A40.

1 Introduction

Denote by U the unit disc of the complex plane U = fz 2 C : jzj < 1g, U = fz 2 C : jzj 1g the closedunit disc of the complex plane and H(U U) the class of analytic functions in U U .Let An = ff 2 H(UU); f(z; ) = z+an+1 () zn+1+ : : : ; z 2 U; 2 Ug; where ak () are holomorphic

functions in U for k 2; and H[a; n; ] = ff 2 H(UU); f(z; ) = a+an () zn+an+1 () zn+1+: : : ; z 2 U; 2 Ug; for a 2 C, n 2 N; ak () are holomorphic functions in U for k n:We also extend the di¤erential operators presented above to the new class of analytic functions An

introduced in [8].

Denition 1.1 [1] For f 2 An , n;m 2 N; the operator Sm is dened by Sm : An ! An ,

S0f (z; ) = f (z; ) ;

S1f (z; ) = zf 0z(z; ); :::;

Sm+1f(z; ) = z (Smf (z; ))0z , z 2 U; 2 U:

Remark 1.1 [1] If f 2 An , f(z; ) = z +P1

j=n+1 aj () zj, then Smf (z; ) = z +

P1j=n+1 j

maj () zj,

z 2 U; 2 U .

Denition 1.2 [3] For n 2 N, m 2 N [ f0g, ; l 0; f 2 An , f(z; ) = z +P1

j=n+1 aj () zj, the operator

I (m;; l) f (z; ) is dened by the following innite series

I (m;; l) f (z; ) = z +1P

j=n+1

1 + (j 1) + l

l + 1

maj () z

j ; z 2 U; 2 U:

Remark 1.2 [3] It follows from the above denition that

(l + 1) I (m+ 1; ; l) f(z; ) = [l + 1 ] I (m;; l) f(z; ) + z (I (m;; l) f(z; ))0z , z 2 U; 2 U:

1

24

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2, 24-31, 2012, COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 25: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Generalizing the notion of di¤erential subordinations, J.A. Antonino and S. Romaguera have introducedin [7] the notion of strong di¤erential subordinations, which was developed by G.I. Oros and Gh. Oros in [9],[8].

Denition 1.3 [9] Let f (z; ), H (z; ) analytic in U U: The function f (z; ) is said to be strongly sub-ordinate to H (z; ) if there exists a function w analytic in U , with w (0) = 0 and jw (z)j < 1 such thatf (z; ) = H (w (z) ; ) for all 2 U . In such a case we write f (z; ) H (z; ) ; z 2 U; 2 U:

Remark 1.3 [9] (i) Since f (z; ) is analytic in U U , for all 2 U; and univalent in U; for all 2 U ,Denition 1.3 is equivalent to f (0; ) = H (0; ) ; for all 2 U; and f

U U

H

U U

:

(ii) If H (z; ) H (z) and f (z; ) f (z) ; the strong subordination becomes the usual notion of subor-dination.

We have need the following lemmas to study the strong di¤erential subordinations.

Lemma 1.1 [1] Let h (z; ) be a convex function with h (0; ) = a for every 2 U and let 2 C be acomplex number with Re 0. If p 2 H[a; n; ] and p (z; ) + 1

zp0z (z; ) h (z; ) ; then p (z; )

g (z; ) h (z; ) ; where g (z; ) =

nz n

R z0h (t; ) t

n1dt is convex and it is the best dominant.

Lemma 1.2 [1] Let g (z; ) be a convex function in U U , for all 2 U; and let h(z; ) = g(z; ) +nzg0z(z; ); z 2 U; 2 U; where > 0 and n is a positive integer. If p(z; ) = g(0; ) + pn () z

n +pn+1 () z

n+1+ : : : ; z 2 U; 2 U; is holomorphic in U U and p(z; )+zp0z(z; ) h(z; ); z 2 U; 2 U;then p(z; ) g(z; ) and this result is sharp.

2 Main results

Denition 2.1 Let ; ; l 0, n;m 2 N. Denote by RIm;;l the operator given by RIm;;l : An ! An ;

RIm;;lf(z; ) = (1 )Rmf(z; ) + I (m;; l) f(z; ); z 2 U; 2 U:

Remark 2.1 If f 2 An , f(z; ) = z +P1

j=n+1 aj () zj, then

RIm;;lf(z; ) = z +P1

j=n+1

n1+(j1)+l

l+1

m+ (1 )Cmm+j1

oaj () z

j ; z 2 U; 2 U:

Remark 2.2 For = 0, RI0m;;lf(z; ) = Rmf(z; ), where z 2 U; 2 U; and for = 1, RI1m;;lf (z; ) =

I (m;; l) f (z; ), where z 2 U , 2 U; which was studied in [3], [4]. For l = 0; we obtain RIm;;0f (z; ) =RDm

1;f (z; ) which was studied in [5], [6] and for l = 0 and = 1; we obtain RIm;1;0f (z; ) = L

m f (z; )

which was studied in [1], [2].Form = 0, RI0;;lf (z; ) = (1 )R0f (z; )+I (0; ; l) f (z; ) = f (z; ) = R0f (z; ) = I (0; ; l) f (z; ),

where z 2 U; 2 U:

Denition 2.2 Let 2 [0; 1), ; ; l 0 and n;m 2 N. A function f (z; ) 2 An is said to be in the classRIm (; ; l; ; ) if it satises the inequality

ReRIm;;lf (z; )

0z> ; z 2 U; 2 U: (2.1)

Theorem 2.1 The set RIm (; ; l; ; ) is convex.

Proof. Let the functions fj (z; ) = z +P1

j=n+1 ajk () zj , k = 1; 2; z 2 U; 2 U; be in the class

RIm (; ; l; ; ). It is su¢ cient to show that the function h (z; ) = 1f1 (z; ) + 2f2 (z; ) is in the classRIm (; ; l; ; ) ; with 1 and 2 nonnegative such that 1 + 2 = 1:Since h (z; ) = z +

P1j=n+1 (1aj1 () + 2aj2 ()) z

j ; z 2 U; 2 U; then

RIm;;lh (z; ) = z +1P

j=n+1

1 + (j 1) + l

l + 1

m+ (1 )Cmm+j1

(1aj1 () + 2aj2 ()) z

j , (2.2)

z 2 U; 2 U:

2

A.LUPAS,...MULTIPLIER TRANSFORMATION AND RUSCHEWEYH DERIVATIVE

25

Page 26: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Di¤erentiating (2.2) with respect to z we obtainRIm;;lh (z; )

0z= 1 +

P1j=n+1

n1+(j1)+l

l+1

m+ (1 )Cmm+j1

o(1aj1 () + 2aj2 ()) jz

j1; z 2 U; 2 U:Hence

ReRIm;;lh (z; )

0z= 1 + Re

1

1Pj=n+1

j

1 + (j 1) + l

l + 1

m+ (1 )Cmm+j1

aj1 () z

j1

!(2.3)

+Re

2

1Pj=n+1

j

1 + (j 1) + l

l + 1

m+ (1 )Cmm+j1

aj2 () z

j1

!:

Taking into account that f1; f2 2 RIm (; ; l; ; ) we deduce

Re

k

1Pj=n+1

j

1 + (j 1) + l

l + 1

m+ (1 )Cmm+j1

ajk () z

j1

!> k ( 1) ; k = 1; 2:

Using (2.1) we get from (2.3)

ReRIm;;lh (z; )

0z> 1 + 1 ( 1) + 2 ( 1) = , z 2 U; 2 U;

which is equivalent that RIm (; ; l; ; ) is convex.

Theorem 2.2 Let g (z; ) be a convex function such that g (0; ) = 1 and let h (z; ) = g (z; )+ 1c+2zg

0z (z; ) ;

where z 2 U; 2 U; c > 0:If ; ; l 0; n;m 2 N, f 2 RIm (; ; l; ; ) and F (z; ) = Ic (f) (z; ) =

c+2zc+1

R z0tcf (t; ) dt, z 2 U;

2 U; then RIm;;lf (z; )

0z h (z; ) , z 2 U; 2 U; (2.4)

implies RIm;;lF (z; )

0z g (z; ) , z 2 U; 2 U;

and this result is sharp.

Proof. We obtain that

zc+1F (z; ) = (c+ 2)

Z z

0

tcf (t; ) dt: (2.5)

Di¤erentiating (2.5), with respect to z, we have (c+ 1)F (z; ) + zF 0z (z; ) = (c+ 2) f (z; ) and

(c+ 1)RIm;;lF (z; ) + zRIm;;lF (z; )

0z= (c+ 2)RIm;;lf (z; ) ; z 2 U; 2 U: (2.6)

Di¤erentiating (2.6) with respect to z we haveRIm;;lF (z; )

0z+

1

c+ 2zRIm;;lF (z; )

00z2=RIm;;lf (z; )

0z, z 2 U; 2 U: (2.7)

Using (2.7), the strong di¤erential subordination (2.4) becomesRIm;;lF (z; )

0z+

1

c+ 2zRIm;;lF (z; )

00z2 g (z) + 1

c+ 2zg0z (z) : (2.8)

Denotep (z; ) =

RIm;;lF (z; )

0z; z 2 U; 2 U: (2.9)

Replacing (2.9) in (2.8) we obtain

p (z; ) +1

c+ 2zp0z (z; ) g (z; ) +

1

c+ 2zg0z (z; ) , z 2 U; 2 U:

Using Lemma 1.2 we have

p (z; ) g (z; ) ; z 2 U; 2 U; i.e.RIm;;lF (z; )

0z g (z; ) , z 2 U; 2 U;

and this result is sharp.

3

A.LUPAS,...MULTIPLIER TRANSFORMATION AND RUSCHEWEYH DERIVATIVE

26

Page 27: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Theorem 2.3 Let h (z; ) = +(2)z1+z ; z 2 U; 2 U; 2 [0; 1) and c > 0. If ; ; l 0, m 2 N and Ic is

given by Theorem 2.2, thenIc [RIm (; ; l; ; )] RIm (; ; l; ; ) ; (2.10)

where = 2 + 2(c+2)()n

c+2n 2

and (x) =

R 10tx1

t+1 dt:

Proof. The function h is convex and using the same steps as in the proof of Theorem 2.2 we get fromthe hypothesis of Theorem 2.3 that, p (z; ) + 1

c+2zp0z (z; ) h (z; ) ; where p (z; ) is dened in (2.9).

Using Lemma 1.1 we deduce that p (z; ) g (z; ) h (z; ) ; that isRIm;;lF (z; )

0z g (z; )

h (z; ) ; where g (z; ) = c+2

nzc+2n

R z0tc+2n 1 +(2)t

1+t dt = (2 ) + 2(c+2)()nz

c+2n

R z0tc+2n

1

1+t dt: Since g is convex

and gU U

is symmetric with respect to the real axis, we deduce

ReRIm;;lF (z; )

0z min

jzj=1Re g (z; ) = Re g (1; ) = = 2+ 2 (c+ 2) ( )

n

c+ 2

n 2: (2.11)

From (2.11) we deduce inclusion (2.10).

Theorem 2.4 Let g (z; ) be a convex function such that g(0; ) = 1 and let h be the function h(z; ) =g(z; ) + zg0z(z; ); z 2 U; 2 U:If ; ; l 0, n;m 2 N; f 2 An and satises the strong di¤erential subordination

RIm;;lf(z; )0z h(z; ); z 2 U; 2 U; (2.12)

thenRIm;;lf(z; )

z g(z; ); z 2 U; 2 U;

and this result is sharp.

Proof. By using the properties of operator RIm;;l, we have

RIm;;lf(z; ) = z +P1

j=n+1

n1+(j1)+l

l+1

m+ (1 )Cmm+j1

oaj () z

j ; z 2 U; 2 U:

Consider p(z; ) =RIm;;lf(z;)

z =z+P1

j=n+1f( 1+(j1)+ll+1 )m+(1)Cm

m+j1gaj()zjz = 1+pn () z

n+pn+1 () zn+1+

:::; z 2 U; 2 U:Let RIm;;lf(z; ) = zp(z; ); z 2 U; 2 U:Di¤erentiating with respect to z we obtain

RIm;;lf(z; )

0z=

p(z; ) + zp0z(z; ); z 2 U; 2 U:Then (2.12) becomes

p(z; ) + zp0z(z; ) h(z; ) = g(z; ) + zg0z(z; ); z 2 U; 2 U:

By using Lemma 1.2, we have

p(z; ) g(z; ); z 2 U; 2 U; i.e.RIm;;lf(z; )

z g(z; ); z 2 U , 2 U:

Theorem 2.5 Let h (z; ) be a convex function such that h(0; ) = 1:If ; ; l 0; n;m 2 N, f 2 An and satises the strong di¤erential subordination

RIm;;lf(z; )0z h(z; ); z 2 U; 2 U; (2.13)

thenRIm;;lf(z; )

z g(z; ) h (z; ) ; z 2 U; 2 U;

where g (z; ) = 1

nz1n

R z0h (t; ) t

1n1dt is convex and it is the best dominant.

4

A.LUPAS,...MULTIPLIER TRANSFORMATION AND RUSCHEWEYH DERIVATIVE

27

Page 28: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Proof. Let p(z; ) =RIm;;lf(z;)

z =z+P1

j=n+1f( 1+(j1)+ll+1 )m+(1)Cm

m+j1gaj()zjz =

1 +P1

j=n+1

n1+(j1)+l

l+1

m+ (1 )Cmm+j1

oaj () z

j1 = 1 +P1

j=n+1 pj () zj1; z 2 U; 2 U:

Di¤erentiating with respect to z, we obtainRIm;;lf(z; )

0z= p(z; ) + zp0z(z; ); z 2 U; 2 U; and

(2.13) becomesp(z; ) + zp0z(z; ) h(z; ); z 2 U; 2 U:

Since p (z; ) 2 H [1; n; ], using Lemma 1.1 for = 1, we have

p (z; ) g (z; ) h (z; ) ; z 2 U; 2 U; i.e:

RIm;;lf(z; )

z g (z; ) = 1

nz1n

Z z

0

h (t; ) t1n1dt h (z; ) ; z 2 U; 2 U;

and g (z; ) is convex and it is the best dominant.

Corollary 2.6 Let h(z; ) = +(2)z1+z a convex function in U U , 0 < 1. If 0, m 2 N; f 2 An

and veries the strong di¤erential subordinationRIm;;lf(z; )

0z h(z; ); z 2 U; 2 U; (2.14)

thenRIm;;lf(z; )

z g (z; ) h (z; ) , z 2 U; 2 U;

where g is given by g(z; ) = 2 + 2()nz

1n

R z0t1n1

1+t dt; z 2 U; 2 U: The function q is convex and it is thebest dominant.

Proof. Following the same steps as in the proof of Theorem 2.5 and considering p(z; ) =RIm;;lf(z;)

z ,the strong di¤erential subordination (2.14) becomes

p(z; ) + zp0z(z; ) h(z; ) = + (2 )z

1 + z; z 2 U; 2 U:

By using Lemma 1.1 for = 1, we have p (z; ) g (z; ) h (z; ), z 2 U , 2 U , i.e.

RIm;;lf(z; )

z g (z; ) = 1

nz1n

Z z

0

h (t; ) t1n1dt =

1

nz1n

Z z

0

t1n1

+ (2 ) t1 + t

dt

= 2 + 2( )nz

1n

Z z

0

t1n1

1 + tdt; z 2 U; 2 U:

Theorem 2.7 Let g (z; ) be a convex function such that g (0; ) = 1 and let h be the function h (z; ) =g (z; ) + zg0z (z; ), z 2 U; 2 U .If ; ; l 0, n;m 2 N; f 2 An and the strong di¤erential subordination

zRIm+1;;lf (z; )

RIm;;lf (z; )

!0z

h (z; ) , z 2 U; 2 U; (2.15)

holds, thenRIm+1;;lf (z; )

RIm;;lf (z; ) g (z; ) , z 2 U; 2 U;

and this result is sharp.

5

A.LUPAS,...MULTIPLIER TRANSFORMATION AND RUSCHEWEYH DERIVATIVE

28

Page 29: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Proof. For f 2 An , f(z; ) = z +P1

j=n+1 aj () zj we have

RIm;;lf(z; ) = z +P1

j=n+1

n1+(j1)+l

l+1

m+ (1 )Cmm+j1

oaj () z

j ; z 2 U; 2 U:Consider

p(z; ) =RIm+1;;lf(z; )

RIm;;lf (z; )=

z +P1

j=n+1

1+(j1)+l

l+1

m+1+ (1 )Cm+1m+j

aj () z

j

z +P1

j=n+1

n1+(j1)+l

l+1

m+ (1 )Cmm+j1

oaj () zj

:

We have p0z (z; ) =(RIm+1;;lf(z;))

0z

RIm;;lf(z;) p (z; ) (RI

m;;lf(z;))

0z

RIm;;lf(z;)and we obtain

p (z; ) + z p0z (z; ) =zRIm+1;;lf(z;)

RIm;;lf(z;)

0z.

Relation (2.15) becomes

p(z; ) + zp0z(z; ) h(z; ) = g(z; ) + zg0z(z; ); z 2 U; 2 U:

By using Lemma 1.2, we have

p(z; ) g(z; ); z 2 U; 2 U; i.e.RIm+1;;lf(z; )

RIm;;lf (z; ) g(z; ); z 2 U; 2 U:

Theorem 2.8 Let g (z; ) be a convex function such that g (0; ) = 1 and let h be the function h (z; ) =g (z; ) + zg0z (z; ), z 2 U; 2 U .If ; ; l 0, n;m 2 N, f 2 An and the strong di¤erential subordination

(m+ 1) (m+ 2)

zRIm+2;;lf (z; )

(m+ 1) (2m+ 1)

zRIm+1;;lf (z; )+

m2

zRIm;;lf (z; ) +

z

"(l + 1)

2

2 (m+ 1) (m+ 2)

#I (m+ 2; ; l) f (z; )

z

"2 (l + 1 )

l + 1

2

(m+ 1) (2m+ 1)#I (m+ 1; ; l) f (z; )+

z

"(l + 1 )2

2m2

#I (m;; l) f (z; ) h(z; ); z 2 U; 2 U; (2.16)

holds, then[RIm;;lf(z; )]

0z g(z; ); z 2 U; 2 U:

This result is sharp.

Proof. Let

p(z; ) =RIm;;lf (z; )

0z= (1 ) (Rmf(z; ))0z + (I (m;; l) f(z; ))

0z (2.17)

= 1 +1X

j=n+1

1 + (j 1) + l

l + 1

m+ (1 )Cmm+j1

jaj () z

j1 = 1 + pn () zn + pn+1 () z

n+1 + ::::

By using the properties of operators RIm;;l, Rm and I (m;; l), after a short calculation, we obtain

p (z; ) + zp0z (z; ) =(m+1)(m+2)

z RIm+2;;lf (z; )(m+1)(2m+1)

z RIm+1;;lf (z; )+m2

z RIm;;lf (z; )+

z

h(l+1)2

2 (m+ 1) (m+ 2)

iI (m+ 2; ; l) f (z; )

z

2(l+1)(l+1)

2 (m+ 1) (2m+ 1)

I (m+ 1; ; l) f (z; )+ z

h(l+1)2

2m2

iI (m;; l) f (z; ) :

6

A.LUPAS,...MULTIPLIER TRANSFORMATION AND RUSCHEWEYH DERIVATIVE

29

Page 30: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Using the notation in (2.17), the di¤erential subordination becomes

p(z; ) + zp0z(z; ) h(z; ) = g(z; ) + zg0z(z; ):

By using Lemma 1.2, we have

p(z; ) g(z; ); z 2 U; 2 U; i.e.RIm;;lf(z; )

0z g(z; ); z 2 U; 2 U;

and this result is sharp.

Theorem 2.9 Let h (z; ) be a convex function such that h (0; ) = 1:If ; ; l 0, n;m 2 N, f 2 An and satises the strong di¤erential subordination

(m+ 1) (m+ 2)

zRIm+2;;lf (z; )

(m+ 1) (2m+ 1)

zRIm+1;;lf (z; )+

m2

zRIm;;lf (z; ) +

z

"(l + 1)

2

2 (m+ 1) (m+ 2)

#I (m+ 2; ; l) f (z; )

z

"2 (l + 1 )

l + 1

2

(m+ 1) (2m+ 1)#I (m+ 1; ; l) f (z; )+

z

"(l + 1 )2

2m2

#I (m;; l) f (z; ) h(z; ); z 2 U; 2 U; (2.18)

then RIm;;lf(z; )

0z g (z; ) h (z; ) , z 2 U; 2 U;

where g (z; ) = 1

nz1n

R z0h (t; ) t

1n1dt is convex and it is the best dominant.

Proof. Using the properties of operator RIm;;l and considering p (z; ) =RIm;;lf (z; )

0z, we obtain

p(z; ) + zp0z(z; ) =(m+1)(m+2)

z RIm+2;;lf (z; )(m+1)(2m+1)

z RIm+1;;lf (z; ) +m2

z RIm;;lf (z; )+

z

h(l+1)2

2 (m+ 1) (m+ 2)

iI (m+ 2; ; l) f (z; )

z

2(l+1)(l+1)

2 (m+ 1) (2m+ 1)

I (m+ 1; ; l) f (z; )+ z

h(l+1)2

2m2

iI (m;; l) f (z; ) ; z 2 U; 2 U:

Then (2.18) becomesp(z; ) + zp0z(z; ) h(z; ); z 2 U; 2 U:

By using Lemma 1.1, for = 1; we obtain p (z; ) g (z; ) h (z; ), z 2 U , 2 U; i.e.RIm;;lf(z; )

0z g (z; ) = 1

nz1n

R z0h (t; ) t

1n1dt h (z; ), z 2 U; 2 U; and g (z; ) is convex

and it is the best dominant.

Corollary 2.10 Let h(z; ) = +(2)z1+z a convex function in U U , 0 < 1. If 0, m 2 N; f 2 An

and veries the strong di¤erential subordination

(m+ 1) (m+ 2)

zRIm+2;;lf (z; )

(m+ 1) (2m+ 1)

zRIm+1;;lf (z; )+

m2

zRIm;;lf (z; ) +

z

"(l + 1)

2

2 (m+ 1) (m+ 2)

#I (m+ 2; ; l) f (z; )

z

"2 (l + 1 )

l + 1

2

(m+ 1) (2m+ 1)#I (m+ 1; ; l) f (z; )+

z

"(l + 1 )2

2m2

#I (m;; l) f (z; ) h(z; ); z 2 U; 2 U; (2.19)

7

A.LUPAS,...MULTIPLIER TRANSFORMATION AND RUSCHEWEYH DERIVATIVE

30

Page 31: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

then RIm;;lf(z; )

0z g (z; ) h (z; ) , z 2 U; 2 U;

where g is given by g(z; ) = 2 + 2()nz

1n

R z0t1n1

1+t dt; z 2 U; 2 U: The function q is convex and it is thebest dominant.

Proof. Following the same steps as in the proof of Theorem 2.9 and considering p(z; ) =RIm;;lf(z; )

0z,

the strong di¤erential subordination (2.19) becomes

p(z; ) + zp0z(z; ) h(z; ) = + (2 )z

1 + z; z 2 U; 2 U:

By using Lemma 1.1 for = 1, we have p (z; ) g (z; ) h (z; ), z 2 U , 2 U , i.e.

RIm;;lf(z; )

0z g (z; ) = 1

nz1n

Z z

0

h (t; ) t1n1dt =

1

nz1n

Z z

0

t1n1

+ (2 ) t1 + t

dt = 2 + 2( )nz

1n

Z z

0

t1n1

1 + tdt; z 2 U; 2 U:

References

[1] A. Alb Lupas, G.I. Oros, Gh. Oros, On special strong di¤erential subordinations using S¼al¼agean andRuscheweyh operators, Journal of Computational Analysis and Applications, Vol. 14, 2012 (to appear).

[2] A. Alb Lupas, D. Breaz, A note on strong di¤erential subordinations using S¼al¼agean operator andRuscheweyh derivative, submitted 2011.

[3] A. Alb Lupas, On special strong di¤erential subordinations using multiplier transformation, submitted2011.

[4] A. Alb Lupas, G.I. Oros, Gh. Oros, A note on special strong di¤erential subordinations using multipliertransformation, Journal of Computational Analysis and Applications, Vol. 14, 2012, (to appear).

[5] A. Alb Lupas, On special strong di¤erential subordinations using a generalized S¼al¼agean operator andRuscheweyh derivative, submitted 2011.

[6] A. Alb Lupas, A note on special strong di¤erential subordinations using a generalized S¼al¼agean operatorand Ruscheweyh derivative, submitted 2011.

[7] J.A. Antonino, S. Romaguera, Strong di¤erential subordination to Briot-Bouquet di¤erential equations,Journal of Di¤erential Equations, 114 (1994), 101-105.

[8] G.I. Oros, On a new strong di¤erential subordination, (to appear).

[9] G.I. Oros, Gh. Oros, Strong di¤erential subordination, Turkish Journal of Mathematics, 33 (2009), 249-257.

8

A.LUPAS,...MULTIPLIER TRANSFORMATION AND RUSCHEWEYH DERIVATIVE

31

Page 32: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Global behavior of the max-type difference

equation xn+1 = max Axn−m

, 1xα

n−k

Taixiang Sun∗,1 Hongjian Xi2 Bin Qin 2

1College of Mathematics and Information Science, Guangxi University, Nanning 530004, P.R. China

2Department of Mathematics, Guangxi College of Finance and Economics, Nanning 530003, P.R. China

Abstract In this paper, we study global behavior of the following max-type differ-ence equation

xn+1 = max A

xn−m,

1xα

n−k

, n = 0, 1, . . . ,

where A ∈ (0,+∞), α ∈ (0, 1) and m, k ∈ 0, 1, 2, · · ·, and initial valuesx−l, x−l+1, · · · , x0 ∈ (0,+∞) with l = maxk, m. The special case when m = 0and k = 2 has been completely investigated by A.Gelisken and C.Cinar. Here weextend their results to the general case.

AMS Subject Classification: 39A10; 39A11.

Keywords: Max-type difference equation, Positive solution, Periodicity.

1 Introduction

In the recent years, there has been a lot of interest in studying the global behavior of, so called,

max-type difference equations, see e.g.[1-24] (see also references therein). In [9], the second order

max-type difference equation

xn+1 = max A

xn,

1xα

n−2

, n = 0, 1, . . . ,

has been studied. In this paper, we study the following max-type difference equation

xn+1 = max A

xn−m,

1xα

n−k

, n = 0, 1, . . . , (1.1)

The project is supported by NNSF of China(10861002) and NSF of Guangxi (2010GXNSFA013106) and SFof Education Department of Guangxi (200911MS212)∗ E-mail address: [email protected]

1

32

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2, 32-39, 2012, COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 33: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

where A ∈ R+ ≡ (0,+∞), α ∈ (0, 1) and m, k ∈ 0, 1, 2, · · ·, and initial values x−l, x−l+1, · · · , x0 ∈R+ with l = maxk, m.

2 The case A ≤ 1

In this section, we investigate the equation (1.1) with A ≤ 1. It is easy to see that if xn∞n=−l

is a positive solution of equation (1.1), then for all n ≥ 0,

xn+1xαn−k ≥ 1. (2.1)

Lemma 2.1. Let xn∞n=−l be a positive solution of equation (1.1) and Pn = maxxn, xn−1, · · · ,xn−2l−1, 1 for all n ≥ l + 1. Then

(1) xn+1 ≤ Pn for all n ≥ l + 1 and Pn∞n=l+1 is non-increasing.

(2) xn is bounded and moreover A/Pl+1 ≤ xn ≤ Pl+1 for any n ≥ m + l + 2.

Proof. By (2.1), we obtain that for any n ≥ l + 1,

xn+1 = max Axαn−m−k−1

xn−mxαn−m−k−1

,xα2

n−2k−1

xαn−kx

α2

n−2k−1

≤ maxAxαn−m−k−1, x

α2

n−2k−1≤ maxxn−m−k−1, xn−2k−1, 1≤ Pn.

Hence

Pn+1 = maxxn+1, xn, · · · , xn−2l, 1 ≤ Pn,

which implies that for all n ≥ l + 1,

xn ≤ Pl+1.

Furthermore, it follows that for all n ≥ m + l + 1,

xn+1 = max A

xn−m,

1xα

n−k

≥ A

Pl+1.

The proof is complete. 2

Remark 2.2. Note that from definition Pn we have that Pn ≥ 1 for all n ≥ l + 1.

Lemma 2.3. Let xn∞n=−l be a positive solution of equation (1.1) and Pn be as in Lemma

2.1. If limn−→∞ Pn = S, then lim supn−→∞ xn = S ≥ 1.

Proof. Since Pn is a subsequence of xn, it follows

S ≤ lim supn−→∞

xn.

2

T. SUN ET AL, MAX-TYPE DIFFERENCE EQUATION

33

Page 34: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

On the other hand, by xn+1 ≤ Pn for all n ≥ l + 1, we obtain

lim supn−→∞

xn ≤ lim supn−→∞

Pn = S.

The proof is complete. 2

Theorem 2.4. Suppose that xn∞n=−l is a positive solution of equation (1.1) with A ≤ 1,

then limn−→∞ xn = 1

Proof. By Lemma 2.1 we may assume that there exist 0 < m1 < m2 < · · · < mt < · · · and

0 < n1 < n2 < · · · < nt < · · · such that

xnt+1 −→ lim infn−→∞ xn = L > 0,

xnt−m −→ L1,

xnt−k −→ L2,

xmt+1 −→ lim supn−→∞

xn = S ≥ 1,

xmt−m −→ K1,

xmt−k −→ K2.

By taking the limit in the following relationship

xmt+1 = max A

xmt−m,

1xα

mt−k

as t −→∞, it follows

S = max A

K1,

1Kα

2

=

AK1

, if AK1

≥ 1Kα

21

Kα2, if A

K1≤ 1

Kα2

≤ 1

K1, if A

K1≥ 1

Kα2

1K2

, if AK1

≤ 1Kα

2

≤ 1L

,

which implies SL ≤ 1.

We claim S = 1. Indeed, if S > 1, then by taking the limit in the following relationship

xnt+1 = max A

xnt−m,

1xα

nt−k

(2.2)

as t −→∞, we obtain

1 >1S≥ L = max A

L1,

1Lα

2

≥ (1L2

)α >1L2

≥ 1S

.

3

T. SUN ET AL, MAX-TYPE DIFFERENCE EQUATION

34

Page 35: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

This is a contradiction. The claim is proven.

Furthermore by taking the limit in (2.2) as t −→∞, we obtain

1 =1S≥ L = max A

L1,

1Lα

2

≥ (1L2

)α ≥ 1L2

≥ 1S

= 1,

which implies limn−→∞ xn = 1. The proof is complete. 2

3 The case A > 1 and m = 0

In this section, we investigate the equation (1.1) with A > 1 and m = 0. Let xn =√

Ayn(n ≥−k), then the equation (1.1) implies the equation

yn+1 = max 1yn

,B

yαn−k

, (3.1)

where B = A−1+α

2 < 1 and initial values y−k, y−k+1, · · · , y0 ∈ R+. It is easy to see that if

yn∞n=−k is a positive solution of equation (3.1), then for all n ≥ 0,

yn+1yn ≥ 1. (3.2)

Lemma 3.1. Let yn∞n=−k be a positive solution of equation (3.1) and Qn = maxyn, yn−1, · · · ,yn−k−1, 1 for all n ≥ k + 1. Then

(1) yn+1 ≤ Qn for all n ≥ k + 1 and Qn∞n=k+1 is non-increasing.

(2) yn is bounded and moreover 1/Qk+1 ≤ yn ≤ Qk+1 for any n ≥ k + 2.

Proof. By (3.2), we obtain that for any n ≥ k + 1,

yn+1 = max yn−1

ynyn−1,

Byαn−k−1

yαn−ky

αn−k−1

≤ maxyn−1, Byαn−k−1

≤ maxyn−1, yn−k−1, 1≤ Qn.

Hence

Qn+1 = maxyn+1, yn, · · · , yn−k, 1 ≤ Qn,

which implies that for all n ≥ k + 1,

yn ≤ Qk+1.

Furthermore, it follows that for all n ≥ k + 1,

yn+1 = max 1yn

,B

yαn−k

≥ 1Qk+1

.

4

T. SUN ET AL, MAX-TYPE DIFFERENCE EQUATION

35

Page 36: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

The proof is complete. 2

Remark 3.2. Note that from definition Qn we have that Qn ≥ 1 for all n ≥ k + 1.

Lemma 3.3. Let yn∞n=−k be a positive solution of equation (3.1) and Qn be as in Lemma

3.1. If limn−→∞Qn = S, then lim supn−→∞ yn = S ≥ 1.

Proof. Since Qn is a subsequence of yn, it follows

S ≤ lim supn−→∞

yn.

On the other hand, by yn+1 ≤ Qn for all n ≥ k + 1, we obtain

lim supn−→∞

yn ≤ lim supn−→∞

Qn = S.

The proof is complete. 2

Theorem 3.4 Let yn∞n=−k be a positive solution of equation (3.1) and Qn be as in Lemma

3.1. If limn−→∞Qn = S, then there exists N1 > 0 such that yN1+2p ≥ yN1+2(p+1) ≥ S for all

p ≥ 0, and limp−→∞ yN1+2p = S and limp−→∞ yN1+2p+1 = 1/S.

Proof For ε = 1−B1+B S, by (3.2) and Lemma 3.3 there exists N such that for any n ≥ N ,

yαn−k−1 ≤ S + ε

and

yn+1 = max yn−1

ynyn−1,

Byαn−k−1

yαn−ky

αn−k−1

≤ maxyn−1, Byαn−k−1

≤ maxyn−1, B(S + ε)= maxyn−1, S − ε.

It follows from Lemma 3.1 and Lemma 3.3 that there exist N < n1 < n2 < · · · < nk < · · · such

that ynk≥ S. By taking a subsequence we may assume that nk = 2lk + t (0 ≤ t < 2). Hence

S ≤ ynk= y2lk+t ≤ maxy2(lk−1)+t, S − ε= y2(lk−1)+t ≤ maxy2(lk−2)+t, S − ε= y2(lk−2)+t ≤ maxy2(lk−3)+t, S − ε

· · · · · · · · · · · · · · · · · ·= yn1 .

Choose N1 = n1, then yN1+2p ≥ yN1+2(p+1) ≥ S for all p ≥ 0.

On the other hand, for sufficiently large p ≥ 0,

max 1yN1+2p+1

, S ≤ yN1+2p+2 = max 1yN1+2p+1

,Byα

N1+2p−k

yαN1+2p+1−ky

αN1+2p−k

5

T. SUN ET AL, MAX-TYPE DIFFERENCE EQUATION

36

Page 37: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

≤ max 1yN1+2p+1

, ByαN1+2p−k

≤ max 1yN1+2p+1

, B(S + ε)

= max 1yN1+2p+1

, S − ε

=1

yN1+2p+1.

Hence yN1+2p+2yN1+2p+1 = 1 and limn−→∞ yN1+2p+1 = 1/S. The proof is complete. 2

From Theorem 3.4, we get

Theorem 3.5 Suppose that xn∞n=−l is a positive solution of equation (1.1) with A > 1, then

limn−→∞ x2n and limn−→∞ x2n+1 are convergent.

Acknowledgments The project is supported by NNSF of China(10861002) and NSF of

Guangxi (0728002).

References

[1] A.M.Amleh, J.Hoag and G.Ladas, A difference equation with eventually periodic solutions,

Comput. Math. Appl., 36(1998), pp 401-404.

[2] K.Berenhaut, J.Foley and S.Stevic, Boundedness character of positive solution of a max

difference equation, J.Difference Equ. Appl. 12(2006), pp1193-1199.

[3] J.Bibby, Axiomatisations of the average and a further generalization of monotonic sequences,

Glasgow Math. J., 15(1974), pp63-65.

[4] W.J.Bride, E.A.Grove, G.Ladas and L.C.Mcgrath, On the nonautonomous equation xn+1 =

maxAn/xn, Bn/xn−1, in: Proceedings of the Third International Conference on Differ-

ence equations and Applications, September 1-5, 1997, Taipei, Taiwan(New York: Gordon

and Breach Science Publishers), 1999, pp49-73.

[5] W.J.Bride, E.A.Grove, C.M.Kent and G.Ladas, Eventually periodic solutions of xn+1 =

max1/xn, An/xn−1, Communication in Applied Nonlinear Analysis, 6(1999), pp31-34.

[6] Y.Chen, Eventually periodicity of xn+1 = max1/xn, An/xn−1 with periodic coefficients,

J. Difference Equ. Appl., 11(2005), pp1289-1294.

[7] C.Cinar, S.Stevic and I.Yalcinkaya, On positive solutions of a reciprocal difference equation

with minimum, J. Appl. Math & Computing, 17(2005), pp307-314.

[8 J.Feuer, On the eventual periodicity of xn+1 = max1/xn, An/xn−1 with a period-four

parameter, J. Difference Equ. Appl., 12(2006), pp467-486.

6

T. SUN ET AL, MAX-TYPE DIFFERENCE EQUATION

37

Page 38: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

[9] A.Gelisken and C.Cinar, On the global attractivity of a max-type difference equation, Dis-

crete Dyn. Nat. Soc., Vol.2009, Article ID 812674, (2009), 5 pages.

[10] E.A.Grove, C.Kent, G.Ladas and M.A.Radin, On xn+1 = max1/xn, An/xn−1 with a

period 3 parameter, Fields Institute Communication, 29(2001),pp161-180.

[11] E.A.Grove and G.Ladas, Periodicities in nonlinear difference equations, Chapman & Hall/CRC,

Press, 2005.

[12] Bratislav D. Iricanin1 and E. M. Elsayed, On the max-type difference equation xn+1 =

maxA/xn, xn−3, Discrete Dyn. Nat. Soc., Vol.2010, Article ID 675413, (2010), 13 pages.

[13] C.M.Kent and M.A.Radin, On the boundedness nature of positive solutions of the difference

equation xn+1 = maxAn/xn, Bn/xn−1 with periodic parameters, Dyn. Contin. Discrete

Impuls. Syst. Ser.B Appl. Algorithms, 2003, suppl., pp11-15.

[14] W.T.Patula and H.D.Voulov, On a max type recurrence relation with periodic coefficients,

J.Difference Equ. Appl., 10(2004), pp329-338.

[15] D. Simsek, B. Demir and C. Cinar, On the solutions of the system of difference equations

xn+1 = maxA/xn, yn/xn, yn+1 = maxA/yn, xn/yn, Discrete Dyn. Nat. Soc., Vol.2009,

Article ID 325296, (2009), 11 pages.

[16] S.Stevic, Global stability of a max-type difference equation, Applied Math. Comput.,

216(2010), pp354-356.

[17] S.Stevic, A global convergence result, Indian J. Math., 44(2002), pp361-368.

[18] S.Stevic, Asymptotic behaviour of a nonlinear difference equation, Indian J. Pure Appl.

Math., 34(2003), pp1681-1687.

[19] S.Stevic, On the recursive sequence xn+1 = A + (xpn/xr

n−1), Discrete Dyn. Nat. Soc.,

Vol.2007, Article ID40963,(2007), 9 pages.

[20] S.Stevic, On the recursive sequence xn+1 = maxc, xpn/xp

n−1, Appl. Math. Letter,

21(2008), pp791-796.

[21] F.Sun, On the asymptotic behavior of a difference equation with maximum, Discrete Dyn.

Nat. Soc., Vol.2008, Article ID243291,(2008), 4 pages.

[22] I.Szalkai, On the periodicity of the sequence xn+1 = maxA0/xn, · · · , Ak/xn−k, J. Differ-

ence Equations Appl., 5(1999), pp25-29.

[23] H.D.Voulov, Periodic solutions to a difference equation with maximum, Proc. Amer. Math.

Soc., 131(2003), pp2155-2160.

7

T. SUN ET AL, MAX-TYPE DIFFERENCE EQUATION

38

Page 39: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

[24] H.D.Voulov, On the periodic nature of the solutions of the reciprocal difference equation

with maximum, J. Math. Anal. Appl., 296(2004), pp32-43.

8

T. SUN ET AL, MAX-TYPE DIFFERENCE EQUATION

39

Page 40: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

A General System Of Quadratic Functional Equations In

Non-Archimedean Fuzzy Menger Normed Spaces

1M. B. Ghaemi and 2H. Majani

1,2Department of Mathematics, Iran University of Science and Technology,

Narmak, Tehran, Iran.

E-mails:[email protected], [email protected].

Abstract. In this paper, we prove the generalized Hyers–Ulam–Rassias stability for a general system of quadratic func-

tional equations in non–Archimedean fuzzy Menger normed spaces. Our results notably generalize previous papers in

this topic and by the method of our paper, one can prove many various general systems of n functional equations and n

variables (n ∈ N) in fuzzy normed spaces.

Keywords: Quadratic Functional Equations, Non-Archimedean Fuzzy Menger Normed spaces, Generalized Hyers–Ulam–

Rassias stability.

1. Introduction and preliminaries

A. K. Katsaras[21] introduced an idea of a fuzzy norm on a linear space in 1984, in the same year

Wu and Fang[34] introduced a notion of fuzzy normed space to give a generalization of the Kolmogoroff

normalized theorem for fuzzy topological linearspaces. In 1992, Felbin[10] introduced an alternative

definition of a fuzzy norm on a linear space with an associated metric of Kaleva and Seikkala type(see

[19]). Xiao and Zhu[35] studied the linear topological structures of fuzzy normed linear spaces. In 1994,

Cheng and Mordeson introduced a definition of a fuzzy norm on a linear space in such a way that the

corresponding induced fuzzy metric is of Kramosiland Michalek type[23]. In 2003, Bag and Samanta[5]

modified the definition of Cheng and Mordeson[6] by removing a regular condition. Following D.

Mihet[24] and modifying the definition of a fuzzy normed space in [4], A. K. Mirmostafaee and M.

02000 Mathematics Subject Classification: 39B22, 39B82, 46S10, 46S40.

40

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2, 40-52, 2012, COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 41: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

2 M. B. Ghaemi and H. Majani

Sal Moslehian[26] introduced non–Archimedean fuzzy normed spaces. Recently D. Mihet[25] restated

definition of them. Although many results in the classical normed space theory have a non–Archimedean

counterpart, their proofs are different and require a rather new kind of intuition [3, 8, 27, 28, 33].

In 1897, Hensel[15] has introduced a normed space which does not have the Archimedean property.

During the last three decades theory of non–Archimedean spaces has gained the interest of physicists for

their research in particular in problems coming from quantum physics, p–adic strings and superstrings

[22]. One may note that |n| ≤ 1 in each valuation field, every triangle is isosceles and there may be no

unit vector in a non–Archimedean normed space; cf. [27]. These facts show that the non–Archimedean

framework is of special interest.

Definition 1.1. Let K be a field. A valuation mapping on K is a function | · | : K → R such that for

any a, b ∈ K we have

(i) |a| ≥ 0 and equality holds if and only if a = 0,

(ii) |ab| = |a||b|,

(iii) |a + b| ≤ |a|+ |b|.

A field endowed with a valuation mapping will be called a valued field. If the condition (iii) in the

definition of a valuation mapping is replaced with

(iii)′ |a + b| ≤ max|a|, |b|

then the valuation | · | is said to be non–Archimedean. The condition (iii)′ is called the strict triangle

inequality. By (ii), we have |1| = | − 1| = 1. Thus, by induction, it follows from (iii)′ that |n| ≤ 1 for

each integer n. We always assume in addition that | · | is non trivial, i.e., that there is an a0 ∈ K such

that |a0| 6∈ 0, 1. The most important examples of non-Archimedean spaces are p–adic numbers.

Example 1.2. Let p be a prime number. For any non–zero rational number a = pr mn such that m

and n are coprime to the prime number p, define the p–adic absolute value |a|p = p−r. Then | · | is a

M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES

41

Page 42: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

A General System Of Quadratic ... 3

non–Archimedean norm on Q. The completion of Q with respect to | · | is denoted by Qp and is called

the p–adic number field.

Definition 1.3. A triangular norm (briefly t–norm, [30]) is a binary operation T : [0, 1]× [0, 1] → [0, 1]

which is commutative, associative, non–decreasing in each variable and has 1 as the unit element.

Basic examples are the Lukasiewicz t–norm TL, TL(a, b) = max(a + b − 1, 0), the product t–norm TP ,

TP (a, b) = ab and the strongest triangular norm TM , TM (a, b) = min(a, b).

Now we recall definition of a non–Archimedean fuzzy Menger normed space which is given in [25]

and [26].

Definition 1.4. Let X be a linear space over a non–Archimedean field K and T be a continuous t–

norm. A function N : X × R → [0, 1] is said to be a non–Archimedean fuzzy Menger norm on X if for

all x, y ∈ X and all s, t ∈ K,

(N1) N(x, c) = 0 for c ≤ 0;

(N2) x = 0 if and only if N(x, c) = 1 for all c > 0;

(N3) N(cx, t) = N(x, t|c| ) if c 6= 0;

(NA4) N(x + y, maxs, t) ≥ T (N(x, s), N(y, t));

(N5) limt→∞N(x, t) = 1.

If N is a non–Archimedean fuzzy Menger norm on X, then the triple (X, N, T ) is called a non–

Archimedean fuzzy Menger normed space.

It follows from (NA4) that N(x, .) is non–decreasing for every x ∈ X. Also one can show that the

condition (NA4) is equivalent to the following condition:

N(x + y, t) ≥ T (N(x, t), N(y, t)).

M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES

42

Page 43: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

4 M. B. Ghaemi and H. Majani

Definition 1.5. Let (X, N, T ) be a non–Archimedean fuzzy Menger normed space. Let xn be a

sequence in X. Then xn is said to be convergent if there exists x ∈ X such that

limn→∞N(xn − x, t) = 1, for all t > 0. In that case, x is called the limit of the sequence xn and we

denote it by N − lim xn = x. A sequence xn in X is called Cauchy if for each ε > 0 and each t > 0

there exists n0 such that for all n ≥ n0 and all p > 0 we have N(xn+p − xn, t) > 1− ε.

Let T be a given t–norm. Then (by associativity) a family of mappings Tn : [0, 1] → [0, 1], n ∈ N, is

defined as follows:

T 1(x) = T (x, x) , Tn(x) = T (Tn−1(x), x) , x ∈ [0, 1].

For three important t–norms TM , TP and TL we have

TnM (x) = x , Tn

P (x) = xn , TnL (x) = max(n + 1)x− n, 0 , n ∈ N.

Definition 1.6. (Hadzic[13]) A t–norm T is said to be of H–type if a family of functions Tn(t);

n ∈ N , is equicontinuous at t = 1, that is,

∀ε ∈ (0, 1) ∃δ ∈ (0, 1) : t > 1− δ ⇒ Tn(t) > 1− ε (n ≥ 1).

The t-norm TM is a trivial example of t–norm of H–type, but there are t-norms of H–type with

T 6= TM (see, e.g., Hadzic[12]).

Lemma 1.7. We consider the notations of the definition(1.5). Also assume that T is a t–norm of

H–type. Then the sequence xn is Cauchy if for each ε > 0 and each t > 0 there exists n0 such that

for all n ≥ n0 we have N(xn+1 − xn, t) > 1− ε.

M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES

43

Page 44: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

A General System Of Quadratic ... 5

Proof. Due to

N(xn+p − xn, t) ≥ T (N(xn+p − xn+p−1, t), N(xn+p−1 − xn, t)) ≥

T (N(xn+p − xn+p−1, t), T (N(xn+p−1 − xn+p−2, t), N(xn+p−2 − xn, t))) ≥

...

≥ T (N(xn+p − xn+p−1, t), T (N(xn+p−1 − xn+p−2, t), · · · ,

T (N(xn+2 − xn+1, t), N(xn+1 − xn, t))) · · · ),

and by the assumption, T is an H–type t–norm, the sequence xn is Cauchy if for each ε > 0 and each

t > 0 there exists n0 such that for all n ≥ n0 we have N(xn+1−xn, t) > 1−ε. We will use this criterion

in this paper.

It is easy to see that every convergent sequence in a non–Archimedean fuzzy Menger normed space is

Cauchy. If each Cauchy sequence is convergent, then the fuzzy Menger norm is said to be complete and

the non–Archimedean fuzzy Menger normed space is called a non–Archimedean fuzzy Menger Banach

space.

The first stability problem concerning group homomorphisms was raised by Ulam[32] in 1940 and

solved in the next year by Hyers[14]. Hyers’ theorem was generalized by Aoki[2] for additive mappings

and by Th. M. Rassias[29] for linear mappings by considering an unbounded Cauchy difference. In

1994, a generalization of the Rassias theorem was obtained by Gavruta[11] by replacing the unbounded

Cauchy difference by a general control function.

The functional equation

f(x + y) + f(x− y) = 2f(x) + 2f(y) (1.1)

is related to a symmetric bi–additive function [1, 20]. It is natural that this equation is called a quadratic

functional equation. In particular, every solution of the quadratic equation(1.1) is said to be a quadratic

function. It is well known that a function f : X → Y where X and Y are real vector spaces, is quadratic

if and only if there exists a unique symmetric bi–additive function B such that f(x) = B(x, x) for all

M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES

44

Page 45: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

6 M. B. Ghaemi and H. Majani

x. The bi–additive function B is given by

B(x, y) =14(f(x + y)− f(x− y)).

The Hyers-Ulam stability problem for the quadratic functional equation was solved by F. Skof[31]. S.

Czerwik[7] proved the Hyers–Ulam–Rassias stability of the equation(1.1). Later, S.-M. Jung[17] has

generalized the results obtained by Skof and Czerwik. Eshaghi Gordji and Khodaei [9] obtained the

general solution and the generalized Hyers–Ulam–Rassias stability of the following quadratic functional

equation for a, b ∈ Z\0 with a 6= ±1,±b,

f(ax + by) + f(ax− by) = 2a2f(x) + 2b2f(y) (1.2)

Throughout this paper, unless otherwise explicitly stated, we assume that u ∈ R, i,m, n ∈ N ∪ 0,

K is a non–Archimedean field, T is an H–type continuous t–norm, (Y, N, T ) be a non–Archimedean

fuzzy Menger Banach space over K, (Z,M, T ) be a non–Archimedean fuzzy Menger normed space over

K and X be a vector space over K. Also assume f : Xn → Y be a mapping. We consider following

general system of quadratic functional equations:

f(a1x1 + b1y1, x2, ..., xn) + f(x1, ..., xn−1, anxn − bnyn) =

2a21f(x1, x2, ..., xn) + 2b2

1f(x1, ..., xn);

...

f(x1, ..., xn−1, anxn + bnyn) + f(x1, ..., xn−1, anxn − bnyn) =

2a2nf(x1, ..., xn) + 2b2

nf(x1, ..., xn−1, yn);

(1.3)

for all xi, yi ∈ X and ai, bi ∈ K \ 0 with ai 6= ±1,±bi , i = 1, ..., n.

In this paper, we establish the generalized Hyers–Ulam–Rassias stability of system(1.3) in non–

Archimedean fuzzy Menger Banach space .

2. Main Results

In this section, we prove the fuzzy generalized Hyers–Ulam–Rassias stability of system(1.3).

M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES

45

Page 46: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

A General System Of Quadratic ... 7

Theorem 2.1. Let ϕi : Xn+1 → Z for i ∈ 1, ..., n be a mapping such that

ϕmi = ϕm

i (x1, ..., xi, yi, ..., xn, u) =

T

M(

12a2m+2

1 ...a2m+2i a2m

i+1...a2mn

ϕi(am+11 x1, ..., a

m+1i−1 xi−1, a

mi xi, 0, am

i+1xi+1, ..., amn xn), u

),

N(

b2ia2m+21 ...a2m+2

i a2mi+1...a2m

n

f(am+11 x1, ..., a

m+1i−1 xi−1, 0, am

i+1xi+1, ..., amn xn), u

);

Φm1 = Φm

1 (x1, y1, x2, ..., xn, u) = ϕm1 (x1, y1, x2, ..., xn, u);

Φmi = Φm

i (x1, ..., xi, yi, ..., xn, u) =

T(ϕm

i (x1, ..., xi, yi, ..., xn, u),Φmi−1(x1, ..., xi−1, yi−1, ..., xn, u)

);

limm→∞Φmn = 1;

(2.1)

and

Ψ1 = Ψ1(x1, ..., xn, yn, u) = Φ1n(x1, ..., xn, yn, u);

Ψm = Ψm(x1, ..., xn, yn, u) = T(Φm

n (x1, ..., xn, yn, u),Ψm−1(x1, ..., xn, yn, u));

Ψ = Ψ(x1, ..., xn, yn, u) = limm→∞Ψm(x1, ..., xn, yn, u) = 1.

(2.2)

and

limm→∞

M( 1

a2m1 ...a2m

n

ϕi(am1 x1, ..., a

mi xi, a

mi yi, ..., a

mn xn), u

)= 1; (2.3)

for all u > 0 and xi, yi ∈ X and ai ∈ K \ 0 with ai 6= ±1,±bi , i = 1, ..., n. Let f : Xn → Y be a

mapping satisfying

N(f(a1x1 + b1y1, x2, ..., xn) + f(a1x1 − b1y1, x2, ..., xn)−

2a21f(x1, ..., xn)− 2b2

1f(y1, x2, ..., xn), u)≥ M

(ϕ1(x1, y1, x2, ..., xn), u

);

...

N(f(x1, ..., xn−1, anxn + bnyn) + f(x1, ..., xn−1, anxn − bnyn)−

2a2nf(x1, ..., xn)− 2b2

nf(x1, ..., xn−1, yn), u)≥ M

(ϕn(x1, ..., xn, yn), u

);

M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES

46

Page 47: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

8 M. B. Ghaemi and H. Majani

for all u > 0 and xi, yi ∈ X and ai, bi ∈ K \ 0 with ai 6= ±1,±bi , i = 1, ..., n. Then there exists a

unique mapping F : Xn → Y satisfying (1.3) and

N(f(x1, ..., xn)− F (x1, ..., xn), u

)≥ Ψ (2.4)

for all u > 0 and xi ∈ X, i = 1, ..., n.

Proof. Fix i ∈ 1, 2, ..., n and consider the following inequality.

N(f(x1, x2, ..., aixi + biyi, ..., xn) + f(x1, x2, ..., aixi − biyi, ..., xn)−

2a2i f(x1, ..., xn)− 2b2

i f(x1, x2, ..., yi, ..., xn), u)≥ M

(ϕi(x1, ..., xi, yi, ..., xn), u

).

(2.5)

Let yi = 0 in (2.5). Then we get

N(f(x1, ..., xn)− 1

a2i

f(x1, x2, ..., aixi, ..., xn), u)≥

T

M( 1

2a2i

ϕi(x1, ..., xi, 0, xi+1, ..., xn), u), N

( b2i

a2i

f(x1, ..., xi−1, 0, xi+1, ..., xn), u)

Hence

N( 1

a21...a

2i−1

f(a1x1, ..., ai−1xi−1, xi, ..., xn)− 1a21...a

2i

f(a1x1, ..., aixi, xi+1, ..., xn), u)≥

T

M( 1

2a21...a

2i

ϕi(a1x1, ..., ai−1xi−1, xi, 0, xi+1, ..., xn), u),

N( b2

i

a21...a

2i

f(a1x1, ..., ai−1xi−1, 0, xi+1, ..., xn), u)

.

So we have

N( 1

a2m+21 ...a2m+2

i−1 a2mi ...a2m

n

f(am+11 x1, ..., a

m+1i−1 xi−1, a

mi xi, ..., a

mn xn)−

1a2m+21 ...a2m+2

i a2mi+1...a

2mn

f(am+11 x1, ..., a

m+1i xi, a

mi+1xi+1, ..., a

mn xn), u

)≥

T

M( 1

2a2m+21 ...a2m+2

i a2mi+1...a

2mn

ϕi(am+11 x1, ..., a

m+1i−1 xi−1, a

mi xi, 0, am

i+1xi+1, ..., amn xn), u

),

N( b2

i

a2m+21 ...a2m+2

i a2mi+1...a

2mn

f(am+11 x1, ..., a

m+1i−1 xi−1, 0, am

i+1xi+1, ..., amn xn), u

)= ϕm

i .

Therefore we obtain

N( 1

a2m+21 ...a2m+2

n

f(am+11 x1, ..., a

m+1n xn)− 1

a2m1 ...a2m

n

f(am1 x1, ..., a

mn xn), u

)≥ Φm

n . (2.6)

M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES

47

Page 48: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

A General System Of Quadratic ... 9

for all m ∈ N ∪ 0. Hence by (2.1) and (2.6) the sequence

1a2m1 ...a2m

n

f(am1 x1, ..., a

mn xn)

is Cauchy. By completeness of Y , we conclude that it is convergent. Therefore we can define F : Xn → Y

by

limm→∞

N(F (x1, ..., xn)− 1

a2m1 ...a2m

n

f(am1 x1, ..., a

mn xn), u

)= 1, (2.7)

for all u > 0 , xi ∈ X and ai ∈ K \ 0 with ai 6= ±1,±bi , i = 1, ..., n. Using induction with (2.6) and

(2.2), we obtain

N(f(x1, ..., xn)− 1

a2m1 ...a2m

n

f(am1 x1, ..., a

mn xn), u

)≥ Ψm. (2.8)

By taking m to approach infinity in (2.8) and using (2.2) one obtains (2.4).

For i ∈ 1, 2, ..., n and by (2.5) and (2.7), we get

N(F (x1, x2, ..., aixi + biyi, ..., xn) + F (x1, x2, ..., aixi − biyi, ..., xn)−

2a2i F (x1, ..., xn)− 2b2

i F (x1, ..., xi−1, yi, xi+1, ..., xn), u)

=

limm→∞

N( 1

a2m1 ...a2m

n

f(am1 x1, ..., a

mi (aixi + biyi), ..., am

n xn)+

1a2m1 ...a2m

n

f(am1 x1, ..., a

mi (aixi − biyi), ..., am

n xn)−

2a2i

a2m1 ...a2m

n

f(am1 x1, ..., a

mi xi, ..., a

mn xn)− 2b2

i

a2m1 ...a2m

n

f(am1 x1, ..., a

mi yi, ..., a

mn xn), u

)≥

limm→∞

M( 1

a2m1 ...a2m

n

ϕi(am1 x1, ..., a

mi xi, a

mi yi, ..., a

mn xn), u

).

(2.9)

By (2.3) and (2.9), we conclude that F satisfies (1.3).

M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES

48

Page 49: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

10 M. B. Ghaemi and H. Majani

Suppose that there exists another mapping F ′ : Xn → Y which satisfies (1.3) and (2.4). So we have

N(F (x1, ..., xn)− F ′(x1, ..., xn), u

)=

limm→∞

N( 1

a2m1 ...a2m

n

F (am1 x1, ..., a

mn xn)− 1

a2m1 ...a2m

n

f(am1 x1, ..., a

mn xn)+

1a2m1 ...a2m

n

f(am1 x1, ..., a

mn xn)− 1

a2m1 ...a2m

n

F ′(am1 x1, ..., a

mn xn), u

)≥

T

Ψ(am1 x1, ..., a

mn xn, yn, |a2m

1 ...a2mn |u

),Ψ

(am1 x1, ..., a

mn xn, yn, |a2m

1 ...a2mn |u

),

which tends to 1 as m →∞ by (2.2). Therefore F = F ′. This completes the proof.

In the manner of proof of Theorem(2.1), one can prove the following corollary.

Corollary 2.2. Let ϕi : Xn+1 → Z for i ∈ 1, ..., n be a mapping such that

ϕmi = ϕm

i (x1, ..., xi, yi, ..., xn, u) =

M(

12a2m+2

1 ...a2m+2i a2m

i+1...a2mn

ϕi(am+11 x1, ..., a

m+1i−1 xi−1, a

mi xi, 0, am

i+1xi+1, ..., amn xn), u

);

Φm1 = Φm

1 (x1, y1, x2, ..., xn, u) = ϕm1 (x1, y1, x2, ..., xn, u);

Φmi = Φm

i (x1, ..., xi, yi, ..., xn, u) =

T(ϕm

i (x1, ..., xi, yi, ..., xn, u),Φmi−1(x1, ..., xi−1, yi−1, ..., xn, u)

);

limm→∞Φmn = 1;

and

Ψ1 = Ψ1(x1, ..., xn, yn, u) = Φ1n(x1, ..., xn, yn, u);

Ψm = Ψm(x1, ..., xn, yn, u) = T(Φm

n (x1, ..., xn, yn, u),Ψm−1(x1, ..., xn, yn, u));

Ψ = Ψ(x1, ..., xn, yn, u) = limm→∞Ψm(x1, ..., xn, yn, u) = 1.

and

limm→∞

M( 1

a2m1 ...a2m

n

ϕi(am1 x1, ..., a

mi xi, a

mi yi, ..., a

mn xn), u

)= 1;

M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES

49

Page 50: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

A General System Of Quadratic ... 11

for all u > 0 and xi, yi ∈ X and ai ∈ K \ 0 with ai 6= ±1,±bi , i = 1, ..., n. Let f : Xn → Y be a

mapping satisfying

N(f(a1x1 + b1y1, x2, ..., xn) + f(a1x1 − b1y1, x2, ..., xn)−

2a21f(x1, ..., xn)− 2b2

1f(y1, x2, ..., xn), u)≥ M

(ϕ1(x1, y1, x2, ..., xn), u

);

...

N(f(x1, ..., xn−1, anxn + bnyn) + f(x1, ..., xn−1, anxn − bnyn)−

2a2nf(x1, ..., xn)− 2b2

nf(x1, ..., xn−1, yn), u)≥ M

(ϕn(x1, ..., xn, yn), u

);

for all xi, yi ∈ X and ai, bi ∈ K \ 0 with ai 6= ±1,±bi , i = 1, ..., n. Assume that f(x1, x2, ..., xn) = 0

if xi = 0 for some i = 1, ..., n. Then there exists a unique mapping F : Xn → Y satisfying (1.3) and

N(f(x1, ..., xn)− F (x1, ..., xn), u

)≥ Ψ

for all u > 0 and xi ∈ X, i = 1, ..., n.

References

[1] J. Aczel and J. Dhombres, Functional Equations in Several Variables, Cambridge Univ. Press, 1989.

[2] T. Aoki, On the stability of the linear transformation in Banach spaces. J. Math. Soc. Japan 2 (1950) 64–66.

[3] L. M. Arriola and W. A. Beyer, Stability of the Cauchy functional equation over p−adic fields, Real Anal. Exchange

31 (2005/2006), 125–132.

[4] T. Bag, S. K. Samanta, Fuzzy bounded linear operators, Fuzzy Sets Syst. 151 (2005) 513-547.

[5] T. Bag, S. K. Samanta, Finite dimensional fuzzy normed linear spaces, J. Fuzzy Math. 11 (3) (2003) 687705.

[6] S. C. Cheng, J. N. Mordeson, Fuzzy linear operator and fuzzy normed linear spaces, Bull. Calcutta Math. Soc. 86

(1994) 429-436.

[7] S. Czerwik, On the stability of the quadratic mapping in normed spaces, Abh. Math. Sem. Univ. Hamburg 62 (1992)

59–64.

[8] M. Eshaghi Gordji and H. Khodaei, Stability of Functional Equations, LAP LAMBERT Academic Publishing, 2010.

[9] M. Eshaghi Gordji and H. Khodaei, On the generalized Hyers–Ulam–Rassias stability of quadratic functional equa-

tions, Abs. App. Anal. Volume 2009, Article ID 923476, 11 pages.

[10] C. Felbin, Finite dimensional fuzzy normed linear space, Fuzzy Sets Syst. 48 (1992) 239-248.

M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES

50

Page 51: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

12 M. B. Ghaemi and H. Majani

[11] P. Gavruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings, J. Math. Anal.

Appl. 184 (1994) 431-436.

[12] O. Hadzic, Fixed point theorems for multivalued mappings in probabilistic metric spaces, Fuzzy Sets Syst. 88 (1997)

219–226.

[13] O. Hadzic, A fixed point theorem in Menger spaces, Publ. Inst. Math. (Beograd) T 20 (1979) 107–112.

[14] D.H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. 27 (1941) 222–224.

[15] K. Hensel, Uber eine neue Begrundung der Theorie der algebraischen Zahlen, Jahresber. Deutsch. Math. Verein 6

(1897) 83–88.

[16] K.W. Jun, H.M. Kim, The generalized Hyers–Ulam–Rassias stability of a cubic functional equation. J. Math. Anal.

Appl. 274 (2002) 867–878.

[17] S.-M. Jung, Stability of the quadratic equation of Pexider type, Abh. Math. Sem. Univ. Hamburg 70 (2000) 175–190.

[18] K.W. Jun, H.M. Kim, I.S. Chang, On the Hyers-Ulam stability of an Euler-Lagrange type cubic functional equation,

J. Comput. Anal. Appl. 7 (2005) 21–33.

[19] O. Kaleva, S. Seikkala, On fuzzy metric spaces, Fuzzy Sets Syst. 12 (3) (1984) 215-229.

[20] Pl. Kannappan, Quadratic functional equation and inner product spaces, Results Math. 27 (1995) 368–372.

[21] A. K. Katsaras, Fuzzy topological vector spaces II, Fuzzy Sets Syst. 12 (1984) 143-154.

[22] A. Khrennikov, non–Archimedean Analysis: Quantum Paradoxes, Dynamical Systems and Biological Models, Kluwer

Academic Publishers, Dordrecht, 1997.

[23] I. Kramosil, J. Michalek, Fuzzy metric and statistical metric spaces, Kybernetika 11 (1975) 326-334.

[24] D. Mihet, Fuzzy ψ-contractive mappings in non-Archimedean fuzzy metric spaces, Fuzzy Sets Syst. 159 (2008) 739-

744.

[25] D. Mihet, The stability of the additive Cauchy functional equationin non-Archimedean fuzzy normed spaces, Fuzzy

Sets Syst. 161 (2010) 2206-2212.

[26] A. K. Mirmostafaee, M. S. Moslehian, Stability of additive mappings in non–Archimedean fuzzy normed spaces,

Fuzzy Sets Syst. 160 (2009) 1643-1652.

[27] L. Narici, E. Beckenstein, Strange terrain—non–Archimedean spaces, Am. Math. Mon. 88 (9) (1981) 667-676.

[28] C. Park, D.H. Boo and Th.M. Rassias, Approximately addtive mappings over p-adic fields, J. Chungcheong Math.

Soc. 21 (2008) 1–14.

[29] Th.M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 (1978) 297–300.

[30] B.Schweizer, A.Sklar, Probabilistic Metric Spaces, North-Holland, NewYork, 1983.

[31] F. Skof, Proprieta locali e approssimazione di operatori, Rend. Sem. Mat. Fis. Milano (1983) 113–129.

[32] S.M. Ulam, Problems in Modern Mathematics, Chapter VI, Science Editions, Wiley, New York, 1964.

M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES

51

Page 52: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

A General System Of Quadratic ... 13

[33] V. S. Vladimirov, I. V. Volovich and E. I. Zelenov, p-adic Analysis and Mathematical Physics, World Scientific, 1994.

[34] C.Wu ,J. Fang, Fuzzy generalization of Kolmogoroff s theorem, J. Harbin Inst. Technol. (1) (1984) 1-7 (in Chinese,

English abstract).

[35] J. -Z. Xiao, X. -H. Zhu, Fuzzy normed spaces of operators and its completeness, Fuzzy Sets Syst. 133 (2003) 389-399.

M. GHAEMI, H. MAJANI, ...FUZZY MENGER NORMED SPACES

52

Page 53: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

A Note on Horner’s Method

Tian-Xiao He1 and Peter J.-S. Shiue 2

1Department of Mathematics and Computer Science

Illinois Wesleyan University

Bloomington, IL 61702-2900, USA2Department of Mathematical Sciences, University of Nevada, Las Vegas

Las Vegas, NV 89154-4020, USA

Abstract

Here we present an application of Horner’s method in evaluatingthe sequence of Stirling numbers of the second kind. Based onthe method, we also give an efficient way to calculate the differ-ence sequence and divided difference sequence of a polynomial,which can be applied in the Newton interpolation. Finally, wesurvey all of the results in Proposition 1.4.

AMS Subject Classification: 05A15, 65B10, 33C45, 39A70, 41A80.

Key Words and Phrases: Horner’s method, Stirling numbersof the second kind, divided difference, Newton interpolation.

1 Introduction

The number of ways of partition a set of n elements into k nonemptysubsets is called the Stirling number of the second kind, denoted byS(n, k). In other words, S(n, k) is the number of equivalence relationswith k classes on a finite set with n elements. From [3], S(n, k) equals

1

53

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2, 53-64, 2012, COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 54: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

2 T. X. He and P. J.-S. Shiue

S(n, k) =1

k!

k∑j=0

(−1)j

(k

j

)(k − j)n

=1

k!

k∑j=1

(−1)k−j

(k

j

)jn

=1

k!∆ktn

∣∣∣∣t=0

. (1)

As a division algorithm, Horner’s method is a nesting techniquerequiring only nmultiplications and n additions to evaluate an arbitrarynth-degree polynomial, which can be surveyed by Horner’s theorem(see, for example, [1]).

Theorem 1.1 Let

P (x) = adxd + ad−1x

d−1 + · · ·+ a1x+ a0.

If bd = ad and

bk = ak + bk+1x0, k = n− 1, n− 2, . . . , 1, 0,

then b0 = P (x0), and P (x) can be written as

P (x) = (x− x0)Q(x) + b0,

where

Q(x) = bdxd−1 + bd−1x

d−2 + · · ·+ b2x+ b1.

The theorem can be proved using a direct calculation. An additionaladvantage of Horner’s method is the differentiation of P (x):

P ′(x) = Q(x) + (x− x0)Q′(x).

Hence, P ′(x0) = Q(x0), which is very convenient when applying New-ton’s method to find roots of a polynomial.

Example 1 As an example, we use Horner’s method to evaluate P (x) =x4− 2x2 + 3x− 4 at x0 = −1. First we construct the synthetic divisionas follows.

T.X.HE, P.J. SHIUE, HORNER'S METHOD

54

Page 55: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Horner’s Method 3

x0 = −1 a4 = 1 a3 = 0 a2 = −2 a1 = 3 a0 = −4

b4x0 = −1 b3x0 = 1 b2x0 = 1 b1x0 = −4

b4 = 1 b3 = −1 b2 = −1 b1 = 4 b0 = −8

Hence,

x4 − 2x2 + 3x− 4 = (x+ 1)(x3 − x2 − x+ 4)− 8.

In [6], Pathan and Collyer present an excellent survey on Horner’smethod and its application in solving polynomial equations by deter-mining the location of roots. In this note, we shall give other appli-cations of Horner’s method in the calculation of Stirling numbers ofthe second kind, the difference sequences, and the divided differencesequences (or equivalently, the coefficients of Newton interpolation) ofpolynomials. There are numerous ways to evaluate a Stirling numbersequence or Stirling matrix. For example, in [4], El-Mikkawy gives analgorithm based on Newton’s divided difference interpolating polyno-mials. In [2], Cheon and Kim present a method based on the relation-ship between the Stirling matrix and other combinatorial sequencessuch as the Vandermonde matrix, the Bernoulli numbers, and Eule-rian numbers. However, our algorithm of calculating Stirling numbersequences based on Horner’s method is different and efficient, whichcontains an idea suitable for constructing algorithms in calculation ofmany sequences. This general idea will be presented in Proposition 1.4.

From Proposition 1.4.2 of [7], if the polynomial f(n) of degree ≤ dis expanded in terms of the basis

(nk

), 0 ≤ k ≤ d, then the coefficients

are ∆kf(0), namely,

f(n) =d∑

k=0

∆kf(0)

(n

k

)=

d∑k=0

∆kf(0)

k!(n)k, (2)

where (n)k = n(n−1) · · · (n−k+1) are the falling factorial polynomials.In particular, for f(n) = nd, we have ∆0f(0) = f(0) = 0 and

nd =d∑

k=1

∆k0d

(n

k

)=

d∑k=1

S(d, k)(n)k, (3)

T.X.HE, P.J. SHIUE, HORNER'S METHOD

55

Page 56: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

4 T. X. He and P. J.-S. Shiue

where the rightmost equation comes from (1). Therefore, we may givethe following algorithm to find out the kth order difference of f at 0and Stirling numbers of the second order from (2) and (3) respectively.

Algorithm 1.2 Write (2) as

f(n) = (n− 0)

(∆0f(0) + (n− 1)

(∆1f(0)

1!+ (n− 2)

(∆2f(0)

2!+ · · ·

+(n− d+ 1)∆df(0)

d!

))· · ·).

Use synthetic division to obtain f(n)/(n − 0), a polynomial of degreed− 1, with the constant term ∆0f(0). Then, evaluate (f(n)/(n− 0)−∆0f(0))/(n−1) to find the quotient polynomial of degree d−2 includingits constant term ∆1f(0). Continue this process until a single constantis left, which is ∆df(0)/d!. Or equivalently, Use Horner’s method tofind

f(n) = (n− 0)f1(n), deg f1(n) ≤ d− 1,

where the constant term of f1(n) is ∆0f(0). Then, use Horner’s methodagain to evaluate

f1(n) = (n− 1)f2(n), deg f2(n) ≤ d− 2,

which contain the constant term ∆1f(0)/1!. Continue the process andfinally obtain

fd−1 = (n− d+ 1)fd(n), fd(n) = ∆df(0)/d!.

When f(n) = nd, from (3) it can be seen that the above algo-rithm provides a way to evaluate the Stirling numbers of the secondkind S(d, 1), S(d, 2), . . ., S(d, d) defined by (1).

Example 2 Consider f(n) = n4 − 2n2 + 3n− 4. We use the followingsynthetic division to find out its difference sequence from order 0 to 4.

T.X.HE, P.J. SHIUE, HORNER'S METHOD

56

Page 57: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Horner’s Method 5

0 1 0 −2 3 −4

0 0 0 0

1 1 0 −2 3 −4

1 1 −1

2 1 1 −1 2

2 6

3 1 3 5

3

1 6

Hence, ∆0f(0) = f(0) = −4, ∆1f(0) = 2, ∆2f(0) = 5(2!) = 10, and∆3f(0) = 6(3!) = 36, and ∆4f(0) = 1(4!) = 24, which can be read onthe diagonal from the top right to the bottom line.

Example 3 From expansion (see, for examples, [3] and [7])

n4 =4∑

k=1

S(4, k)(n)k,

or equivalently,

n3 = S(4, 1) + (n− 1)(S(4, 2) + (n− 2)(S(4, 3) + (n− 3)S(4, 4))),

we may use the following division to evaluate S(4, k) (k = 1, 2, 3, 4).

1 1 0 0 0

1 1 1

2 1 1 1 1

2 6

3 1 3 7

3

1 6

T.X.HE, P.J. SHIUE, HORNER'S METHOD

57

Page 58: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

6 T. X. He and P. J.-S. Shiue

Hence, we can read S(4, 1) = 1, S(4, 2) = 7, S(4, 3) = 6, and S(4, 4) = 1diagonally from the top right to the bottom line. In addition, the firstcalculation gives 1, 0, 0, 0, 0, the second calculation 1, 1, 1, 1, , thethird calculation 1, 3, 7, and the fourth calculation 1, 6, which arerespectively the first, second, third, and fourth row of the table of theStirling numbers of the second kind. In other words, the division of xd

by x− j generates S(d, j), S(d− 1, j), · · · , S(j, j).From (3) we immediately know that S(d, d) = 1 because it is the

coefficient of nd. Using our method, one may calculate the matricesrelated to Stirling numbers easily, for example, matrices Tn and Wn

defined by (2) and (16) in [8].Algorithm 1.2 can also be used to evaluate non-centeral Stirling

numbers of the second kind (cf. [5]) defined by

(x− a)d =d∑

k=0

Sa(d, k)(x)k

with a parameter a. In fact, a similar argument can be used to calculateSa(d, k) by using the transformation x− a 7→ x in Algorithm 1.2.

From Theorem 1.1 we also know that Horner’s method providessimple algorithms to evaluate divided differences and derivatives of apolynomial, and the former can be used to find the coefficients of theNewton interpolation while the latter can be used to approximate thezeros of the polynomial with any required significant digits.

Let X = x0, x1, . . . , xd be a set of d + 1 distinct points, and letf(x) be a polynomial of degree d. Then we can write f(x) in terms ofits Newton interpolation form on the set X as

f(x) = f [x0] + f [x0, x1](x− x0) + f [x0, x1, x2](x− x0)(x− x1) + · · ·+f [x0, x1, . . . , xd](x− x0)(x− x1) · · · (x− xd−1), (4)

where f [x0] = f(x0) and f [x0, x1, . . . xk] is the kth order divided differ-ence of f at x0, x1, . . . , xk defined by

f [x0, x1, . . . xk] =1

xk − x0

(f [x1, x2, . . . , xk]− f [x0, x1, . . . , xk−1])

for k = 1, 2, . . . , d, and can be evaluated using the following algorithm.

T.X.HE, P.J. SHIUE, HORNER'S METHOD

58

Page 59: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Horner’s Method 7

Algorithm 1.3 Write (4) as

f(x) = f [x0] + (x− x0) (f [x0, x1] + (x− x1) (f [x0, x1, x2] + · · ·+(x− xd−1)f [x0, x1, . . . , xd])) ,

where f [x0] = f(x0). Use synthetic division to obtain (f(x)−f(x0))/(x−x0), a polynomial of degree d−1, with the constant term f [x0, x1]. Then,evaluate (f(x)−f(x0))/(x−x0)−f [x0, x1])/(x−x1) to find the quotientpolynomial of degree d−2 and its constant term f [x0, x1, x2]. Continuethis process until a single constant is left, which is f [x0, x1, . . . , xd]. Orequivalently, Use Horner’s method to find

f(x)− f(x0) = (x− x0)f1(x), deg f1(x) ≤ d− 1,

where the constant term of f1(x) is f [x0, x1]. Then, use Horner’smethod again to evaluate

f1(x) = (x− x1)f2(x), deg f2(x) ≤ d− 2,

which contains the constant term f [x0, x1, x2]. Continue the processand finally to obtain

fd−1 = (x− xd−1)fd(x), fd(n) = f [x0, x1, . . . , xd].

Example 4 To find the divided differences of f(x) = x4− 2x2 + 3x− 4on the set −1, 0, 1, 3, 4, we consider f(x)−f(−1) = x4−2x2 + 3x+ 4and use the following synthetic division to obtain its divided differenceat the given knot points.

−1 1 0 −2 3 4

−1 1 1 −4

0 1 −1 −1 4 0

0 0 0

1 1 −1 −1 4

1 0

3 1 0 −1

3

1 3

T.X.HE, P.J. SHIUE, HORNER'S METHOD

59

Page 60: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

8 T. X. He and P. J.-S. Shiue

Hence, f [−1] = f(−1) = −8, f [−1, 0] = 4, f [−1, 0, 1] = −1, f [−1, 0, 1, 3] =3, and f [−1, 0, 1, 3, 4] = 1. It can be seen that the new method is mucheasier than the traditional method.

Let r be a real number, and let f(x) be a polynomial of degree d.Then, using the Taylor expansion of f(x) yields

f(x) = f(r) + f ′(r)(x− r) +f ′′(r)

2!(x− r)2 + · · ·+ f (d)(r)

d!(x− r)d, (5)

which can written recursively as

f(x)−f(r) = (x−r)f1(x), fk(x) = (x−r)fk+1(x), k = 1, 2, . . . , d−1,

and the constant term of fk(x) is f (k)(r)/k! (k = 1, 2, . . . , d). Thus wemay apply Horner’s method to find all derivatives of f at r. Obviously,for polynomial

g(x) = f(r) + f ′(r)x+f ′′(r)

2!x2 + · · ·+ f (d)(r)

d!xd, (6)

the roots of g(x) = 0 are the roots of equation f(x) = 0, each dimin-ished by r. We can use the process to diminish a root of the proposedequation by its first digit. Then we apply it again to diminish the cor-responding root of the resulting equation by its first digit, which is thesecond digit of the required root of the original equation. Using thisprocess continuously, we finally approximate the root of the originalequation f(x) = 0 to the required significant digits. More details canbe found in [9]. Here is an example.

Example 5 Consider equation f(x) = x4 − 2x2 + 3x − 4 = 0, whichhas a root in the interval (1, 2). We may use (6) to find g(x), wherer = 1. The process can be shown in the following synthetic division.

T.X.HE, P.J. SHIUE, HORNER'S METHOD

60

Page 61: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Horner’s Method 9

1 1 0 −2 3 −4

1 1 −1 2

1 1 −1 2 −2

1 2 1

1 2 1 3

1 3

1 3 4

1

1 4

Hence, we obtain

f(1) = −2, f ′(1) = 3,f ′′(1)

2!= 4,

f ′′′(1)

3!= 4,

f (4)(1)

4!= 1,

and the corresponding

g(x) = −2 + 3x+ 4x2 + 4x3 + x4.

Therefore the new equation is g(x) = 0. Multiply the root by 10 andchange the equation to be

x4 + 40x3 + 400x2 + 3000x− 20000 = 0.

It is easy to see that g(x) has a root between 3 and 4. Thus we mayuse (6) again to generate a new polynomial and solve the correspondingequation.

T.X.HE, P.J. SHIUE, HORNER'S METHOD

61

Page 62: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

10 T. X. He and P. J.-S. Shiue

3 1 40 400 3000 −20000

3 129 1587 13761

1 43 529 4587 −6239

3 138 2001

1 46 667 6588

3 147

1 49 814

3

1 52

The above table shows that an approximation of the original polynomialequation to its second significant digit is 1.3, and the third significantdigit can be found using the polynomial equation

x4 + 52x3 + 814x2 + 6588x− 6239 = 0.

Multiply the root by 10 to change the equation to be

x4 + 520x3 + 81400x2 + 6588000x− 62390000 = 0,

which has a root in the interval (8, 9). Thus, the original polynomialequation f(x) = x4 − 2x2 + 3x − 4 = 0 has a root of approximately1.38, and its better approximation with more significant digits can befound from the equation

x4 + 552x3 + 94264x2 + 7992288x− 4206064 = 0

generated by using the following table. Since x4 + 552x3 + 94264x2 +7992288x − 4206064 = 0 has a root between 5 and 6, we obtain theroot of original equation with four significant digits as 1.385.

T.X.HE, P.J. SHIUE, HORNER'S METHOD

62

Page 63: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Horner’s Method 11

8 1 520 81400 6588000 −62390000

8 4224 684992 58183936

1 528 85624 7272992 −4206064

8 4288 719296

1 536 89912 7992288

8 4352

1 544 94264

8

1 552

From Example 5, one may find Horner’s method is not an efficientway to evaluate the roots of polynomial equations, but it is a faster wayto find out the coefficients of the expansions of polynomials in terms ofnested bases formed by products of linear polynomials.

Proposition 1.4 Let φk(x) = akx− bk, k = 1, 2, . . ., and let f(x) be apolynomial of degree d. Then

f(x) = c0 +d∑

k=1

ckΠkj=1φj(x), (7)

where ck (k = 0, 1, . . . , d) can be found using the synthetic divisionbased on Horner’s method.

One may see the examples of Proposition 1.4 from the algorithmsapplied to the expansions (2)-(5). Interested readers may also constructexamples for any polynomial expansion defined by (7). For instance,we may calculate the binomial sequence

(nk

)(k = 0, 1, . . . , n) for n ∈ N

by applying Horner’s method to the expansion

xn =n∑

k=0

(n

k

)(x− 1)k.

T.X.HE, P.J. SHIUE, HORNER'S METHOD

63

Page 64: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

12 T. X. He and P. J.-S. Shiue

References

[1] R. L. Burden and J. D. Faires, Numerical Analysis, 8th Edition,Thomson Brooks/Cole, Belmont, CA, USA, 2005.

[2] G.-S. Cheon and J.-S. Kim, Factorial Stirling matrix and relatedcombinatorial sequences, Linear Algebra and its Applications, 357(2002), 247-258.

[3] L. Comtet, Advanced Combinatorics, Reidel, Dordrecht, 1974.

[4] M. E. A. El-Mikkawy, A note on the Stirling matrix of the secondkind, Applied Mathematics and Computation, 151 (2004) 147-151.

[5] M. Koutras, Noncentral Stirling numbers and some applications.Discrete Math. 42 (1982), no. 1, 73–89.

[6] A. Pathan and T. Collyer, The wonder of Horner’s method, Math-ematical Gazette, 87 (2003), No. 509, 230-242.

[7] R. Stanley, Enumerative Combinatorics Vol. 1, Cambridge Uni-versity Press, New York, 1997.

[8] W. Wang and T. Wang, Remarks on two special matrices, ArsCombinatoria, 94 (2010), 521-535.

[9] T. E. Whittaker and G. Robinson, The Ruffini-Horner Method,53 in The Calculus of Observations: A Treatise on NumericalMathematics, 4th ed. New York: Dover, pp. 100-106, 1967.

T.X.HE, P.J. SHIUE, HORNER'S METHOD

64

Page 65: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

COMMON FIXED POINT RESULTS WITH APPLICATIONS

IN CONVEX METRIC SPACES

SAFEER HUSSAIN KHAN and MUJAHID ABBAS

Abstract The notion of metric convexity introduced by Takahashi [24] is em-

ployed to obtain sucient conditions for the existence of a common xed point

for a Banach operator pair of mappings satisfying generalized contractive con-

ditions. As an application, related results on best approximation are derived.

Our results generalize various known results in contemporary literature.

|||||||||||||||

Keywords and Phrases: Convex metric space, common xed point, best

approximation, Banach operator pair.

2000 Mathematics Subject Classication: 47H09, 47H10, 47H19, 54H25.

|||||||||||||||

1. INTRODUCTION and PRELIMINARIES

Metric xed point theory is a branch of xed point theory which nds

its primary applications in functional analysis. The interplay between the

geometry of Banach spaces and xed point theory has been very strong and

fruitful. In particular, geometric conditions on mappings and/or underlying

spaces play a crucial role in metric xed point problems. Although it has a

purely metric avor, it is also a major branch of nonlinear functional analysis

with close ties to Banach space geometry, see for example [10] and references

mentioned therein. Several results concerning the existence and approxima-

tion of a xed point of a mapping rely on convexity hypotheses and geometric

properties of the Banach spaces. Takahashi [24] introduced the notion of a

convexity on metric spaces. Afterwards, Ciric [6], Ding [7], Goebel and Kirk

[9], Guay et al [11], Shimizu and Takahashi[20, 21] and other authors have

studied xed point theorems in convex metric spaces (see also [4]). On the

other hand, Shahzad[19] introduced a class of noncommuting mappings called

R-subweakly commuting mappings, and thus obtained common xed points

of S-nonexpansive mappings in normed spaces. Recently, Chen and Li [5] in-

1

65

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2, 65-76, 2012, COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 66: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

troduced the class of Banach operator pairs as a new class of noncommuting

maps. In this paper, common xed points for Banach operator pair of map-

pings which are more general than Cq-commuting mappings, are obtained in

the setting of a convex metric space. As an application, invariant approxima-

tion results for these mappings are also derived.

For the sake of convenience, we gather some basic denitions and set out

the terminology needed in the sequel.

Denition 1.1. Let (X; d) be a metric space. A mapping W : X X

[0; 1] ! X is said to be a convex structure on X; if, for each (x; y; ) 2

X X [0; 1] and u 2 X;

d(u;W (x; y; )) d(u; x) + (1 )d(u; y):

A metric space X together with a convex structureW is called a convex metric

space. Obviously, W (x; x; ) = x:

LetX be a convex metric space. A nonempty subset E ofX is said to be convex

if W (x; y; ) 2 E whenever (x; y; ) 2 E E [0; 1]. A subset E of a convex

metric space is said to be q-starshaped or starshaped with respect to q if there

exists q in E such that W (x; q; ) 2 E whenever (x; ) 2 E [0; 1]. Obviously,

q- starshaped subsets ofX contain all convex subsets ofX as a proper subclass.

Takahashi [24] has shown that open spheres B(x; r) = fy 2 X : d(y; x) < rg

and closed spheres B[x; r] = fy 2 X : d(y; x) rg are convex in a convex

metric space X. A convex metric space X is said to have property (A) if:

d(W (y; x; );W (z; x; )) d(y; z), for all x; y; z 2 X and 2 (0; 1): Property

(A) is a convex metric space analogue of condition (I) for the starshaped metric

spaces of Guay et al, see Denition 3.2 [11]. Throughout this paper, a convex

metric space X is assumed to have property (A):

Note that every normed space is a convex metric space. Takahashi [24] has

also shown that there are convex metric spaces which cannot be embedded in

any normed space .

Example 1.2. Let X = f(x1; x2; x3) 2 R3 : x1; x2; x3 > 0g: For x =

2

S.H. KHAN, M.ABBAS: COMMON FIXED POINT...

66

Page 67: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

(x1; x2; x3); y = (y1; y2; y3) and z = (z1; z2; z3) in X; and ; ; 2 [0; 1] with

+ + = 1; dene a mapping W : X3 [0; 1]3 ! X by,

W (x; y; z; ; ; ) = (x1 + x2 + x3; y1 + y2 + y3; z1 + z2 + z3);

and a metric d : X X ! [0;1) by, d(x; y) = jx1y1 + x2y2 + x3y3j : Here X

is a convex metric space but it is not a normed space.

Example 1.3. Let X = f(x1; x2) 2 R2 : x1; x2 > 0g: For x = (x1; x2);

y = (y1; y2) in X; and 2 [0; 1]: Dene a mapping W : XX [0; 1]! X by

W (x; y; ) = (x1 + (1 )y1;x1x2 + (1 )y1y2x1 + (1 )y1

);

and a metric d : X X ! [0;1) by d(x; y) = jx1 y1j+ jx1x2 y1y2j : It can

be veried that X is a convex metric space but not a normed space.

Denition 1.4. Let T; S : X ! X: A point x 2 X is called:

(1) a xed point of T if Tx = x;

(2) a coincidence point of the pair fT; Sg if Tx = Sx;

(3) a common xed point of the pair fT; Sg if x = Tx = Sx:

F (T ); C(T; S) and F (T; S) denote the set of all xed points of T; the set of all

coincidence points of the pair fT; Sg; and the set of all common xed points

of the pair fT; Sg; respectively.

Denition 1.5. Let E be a q-starshaped subset of a convex metric space

X: Let T; S : X ! X ; q 2 F (S) and E be both T and S invariant. Put

Y Txq = fy : y = W (Tx; q; ) and 2 [0; 1]g;

and for each x in X; d(Sx; Y Txq ) = inffd(Sx; y) : 2 [0; 1]g. The map T is

said to be:

(1) an S-contraction if there exists k 2 (0; 1) such that

d(Tx; Ty) kd(Sx; Sy);

(2) asymptotically S-nonexpansive if there exists a sequence fkng; kn 1;

with limn!1

kn = 1 such that d(Tnx; T ny) kn d(Sx; Sy) for each x; y in E

3

S.H. KHAN, M.ABBAS: COMMON FIXED POINT...

67

Page 68: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

and n 2 N: If kn = 1 for all n 2 N, then T is called an S- nonexpansive

mapping. If S = I (the identity map), then T is an asymptotically

nonexpansive mapping;

(3) R-weakly commuting if there exists a real number R > 0 such that

d(STx; TSx) Rd(Tx; Sx)

for all x in E;

(4) R-subweakly commuting if there exists a real number R > 0 such that

d(TSx; STx) Rd(Sx; Y Txq )

for all x 2 E;

(5) Cq-commuting if STx = TSx for all x 2 Cq(S; T ); where Cq(S; T ) =

[fC(S; Tk) : 0 k 1g and Tkx = W (Tx; q; k):

Clearly Cq-commuting maps are weakly compatible but the converse is not

true in general ( see for example [2] ).

A self mapping T on a convex metric space X is said to be

(6) ane on E if

T (W (x; y; )) = W (Tx; Ty; )

for all x; y 2 E and 2 (0; 1);

(7) uniformly asymptotically regular on E if for each " > 0; there exists a

positive integer N such that d(T nx; T n+1x) < " for all n N and for all x in

E:

The ordered pair (T; I) of two self maps of a metric space (X; d) is called

a Banach operator pair if the set F (I) is T -invariant, namely T (F (I))

F (I). Obviously, any commuting pair (T; I) is a Banach operator pair but not

conversely in general, see [5]. If (T; I) is a Banach operator pair then (I; T )

need not be a Banach operator pair (cf. Example 1 [5]). If the self-maps T

and I of X satisfy

d(ITx; Tx) kd(Ix; x)

4

S.H. KHAN, M.ABBAS: COMMON FIXED POINT...

68

Page 69: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

for all x 2 X and k 0, then (T; I) is a Banach operator pair.

Example 1.6. Let X = R with usual metric and M = [1;1): Let T (x) = x2

and I(x) = 2x1; for all x 2M . Let q = 1: ThenM is convex with q 2 F (I),

F (I) = f1g and Cq(I; T ) = [1;1). Note that the pair (T; I) is Banach

operator but T and I are not Cq-commuting maps and hence not R-subweakly

commuting maps.

2. COMMON FIXED POINT RESULTS

In this section, the existence of common xed points of Banach operator

pair of mappings is established in a convex metric space. The following result

is a consequence of ([14], Theorem 2.1).

Theorem 2.1. Let M be a subset of a metric space (X; d), and I and T

be weakly compatible self-maps of M . Assume that clT (M) I(M), clT (M)

is complete, and T and I satisfy for all x; y 2M and 0 h < 1;

d(Tx; Ty) hmax fd(Ix; Iy); d(Ix; Tx); d(Iy; Ty); d(Ix; Ty); d(Iy; Tx)g :

Then M \ F (I) \ F (T ) is a singleton.

The following result extends and improves Lemma 3.1 of [5] and Theorem 1

in [16].

Lemma 2.2. LetM be a nonempty subset of a metric space (X; d), and (T; I)

be a Banach operator pair on M . Assume that clT (M) is complete, and T

and I satisfy for all x; y 2M and 0 h < 1;

d(Tx; Ty) hmax fd(Ix; Iy); d(Tx; Ix); d(Ty; Iy); d(Tx; Iy); d(Ty; Ix)g :

(2.1)

If I is continuous and F (I) is nonempty, then there exists a unique common

xed point of T and I.

Proof. By our assumptions, T (F (I)) F (I) and F (I) is nonempty and closed.

Moreover, cl(T (F (I))) being subset of cl(T (M)) is complete. Further, for all

x; y 2 F (I), we have by inequality (2.1),

d(Tx; Ty) hmaxfd(Ix; Iy); d(Ix; Tx); d(Iy; Ty); d(Iy; Tx); d(Ix; Ty)g

= hmaxfd(x; y); d(x; Tx); d(y; Ty); d(y; Tx); d(x; Ty)g:

5

S.H. KHAN, M.ABBAS: COMMON FIXED POINT...

69

Page 70: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Hence T is a generalized contraction on F (I) and cl(T (F (I))) cl(F (I)) =

F (I). By Theorem 2.1, T has a unique xed point z in F (I) and consequently

F (I) \ F (T ) is singleton.

The following result presents an analogue of Lemma 3.3 [3] for Banach operator

pair without linearity of I.

Lemma 2.3. Let I and T be self-maps on a nonempty q-starshaped subset

M of a convex metric space X. Assume that I is continuous and F (I) is q-

starshaped with q 2 F (I), (T; I) is a Banach operator pair on M and satisfy

for each n 1

d(T nx; T ny) knmax

8<: d(Ix; Iy); dist(Ix; Y Tnx

q ); dist(Iy; Y Tny

q );

dist(Ix; Y Tny

q ; dist(Iy; Y Tnx

q )

9=; (2.2)

for all x; y 2 M , where fkng is a sequence of real numbers with kn 1 and

limn!1

kn = 1. For each n 1, dene a mapping Tn on M by

Tnx = W (Tnx; q; n);

where n =nknand fng is a sequence of numbers in (0; 1) such that lim

n!1n =

1. Then for each n 1, Tn and I have exactly one common xed point xn in

M such that

Ixn = xn = W (Tnx; q; n);

provided cl(Tn(M)) is complete for each n.

Proof. By denition,

Tnx = W (Tnx; q; n):

As (T; I) is a Banach operator pair, for each n 1, T n(F (I)) F (I) and

F (I) is nonempty and closed. Since F (I) is q-starshaped and T nx 2 F (I), for

each x 2 F (I), Tnx = W (T nx; q; n) 2 F (I). Thus (Tn; I) is Banach operator

pair for each n. Also by (2.2),

d(Tnx; Tny) = d(W (T nx; q; n);W (Tny; q; n))

nd(Tnx; T ny)

6

S.H. KHAN, M.ABBAS: COMMON FIXED POINT...

70

Page 71: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

nmaxfd(Ix; Iy); dist(Ix; Y Tnx

q ); dist(Iy; Y Tny

q );

dist(Ix; Y Tny

q ; dist(Iy; Y Tnx

q )g

nmaxfd(Ix; Iy); d(Ix; Tnx); d(Iy; Tny);

d(Ix; Tny); d(Iy; Tnx)g

for each x; y 2M . By Lemma 2.2, for each n 1, there exists a unique xn 2M

such that xn = Ixn = Tnxn: Thus for each n 1, M \ F (Tn) \ F (I) 6= :

The following result extends the recent results due to Chen and Li ([5], The-

orems 3.2-3.3) to asymptotically I-nonexpansive maps.

Theorem 2.4. Let I and T be self-maps on a q-starshaped subset M of a

convex metric spaceX. Assume that (T; I) is Banach operator pair onM , F (I)

is q-starshaped with q 2 F (I), I is continuous, T is uniformly asymptotically

regular and asymptotically I-nonexpansive. Then F (T ) \ F (I) 6= ; provided

cl(T (M)) is compact and T is continuous.

Proof. Notice that compactness of cl(T (M)) implies that clTn(M) is compact

and thus complete. From Lemma 2.3, for each n 1, there exists xn 2 M

such that xn = Ixn = W (Tnx; q; n): As T (M) is bounded, so d(xn; T

nxn) =

d(W (T nx; q; n); Tnxn)) (1 n)d(T nxn; q) ! 0 as n ! 1. Since (T; I) is

Banach operator pair and Ixn = xn, so ITnxn = T

nIxn = Tnxn and thus we

get

d(xn; Txn) = d(xn; Tnxn) + d(T

nxn; Tn+1xn) + d(T

n+1xn; Txn)

d(xn; Tnxn) + d(T

nxn; Tn+1xn) + k1d(IT

nxn; Ixn)

= d(xn; Tnxn) + d(T

nxn; Tn+1xn) + k1d(T

nxn; xn):

Further, T is uniformly asymptotically regular, therefore we have

d(xn; Txn) d(xn; T nxn) + d(T nxn; T n+1xn) + k1d(T nxn; xn)! 0;

as n ! 1. Since cl(T (M)) is compact, there exists a subsequence fTxmg of

fTxng such that Txm ! y as m !1. By the continuity of I and T and the

fact d(xm; Txm)! 0, we have y 2 F (T ) \ F (I): Thus F (T ) \ F (I) 6= :

7

S.H. KHAN, M.ABBAS: COMMON FIXED POINT...

71

Page 72: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Corollary 2.5([5], Theorems 3.2-3.3). Let I and T be self-maps on a q-

starshaped subset M of a normed space X. Assume that (T; I) is Banach

operator pair on M , F (I) is q-starshaped with q 2 F (I), I is continuous and

T is I-nonexpansive. Then F (T ) \ F (I) 6= ; provided cl(T (M)) is compact.

Corollary 2.6 ([1], Theorem 2.2 and [13], Theorem 6). Let I and T be self-

maps on a q-starshaped subset M of a normed space X. Assume that (T; I) is

commuting pair onM , F (I) is q-starshaped with q 2 F (I), I is continuous and

T is I-nonexpansive. Then F (T ) \ F (I) 6= ; provided cl(T (M)) is compact.

Meinardus [17] was the rst to employ a xed point theorem to prove the ex-

istence of an invariant approximation in Banach spaces. Subsequently, several

interesting and valuable results have appeared in the literature of approxima-

tion theory ( [1], [19] and [22] ).

Denition 2.7. Let X be a metric space and M be a closed subset of X:

If there exists a y0 2M such that d(x; y0) = d(x;M) = inffd(x; y) : y 2Mg;

then y0 is called a best approximation to x out of M:We denote by PM(x); the

set of all best approximations to x out of M:

Remark 2.8. Let M be a closed convex subset of a convex metric space.

As W (u; v; ) 2 M for (u; v; ) 2 M M [0; 1]; the denition of convex

structure on X implies that W (u; v; ) 2 PM(x): Hence PM(x) is a convex

subset of X: Also, PM(x) is a closed subset of X. Moreover, it can be shown

that PM(x) @M; where @M stands for the boundary of M:

Now we obtain results on best approximation as a xed point of Banach op-

erator pair of mappings in a convex metric space.

Theorem 2.9. LetM be a subset of a convex metric spaceX and I; T : X !

X be mappings such that u 2 F (I)\F (T ) for some u 2 X and T (@M \M)

M: Suppose that PM(u) is nonempty and q-starshaped, I is continuous on

PM(u), d(Tx; Tu) d(Ix; Iu) for each x 2 PM(u) and I(PM(u)) PM(u): If

(T; I) is a Banach operator pair on PM(u), F (I) is nonempty and q-starshaped

for q 2 F (I), T is uniformly asymptotically regular and asymptotically I-

nonexpansive then PM(u) \ F (I) \ F (T ) 6= ; provided T is continuous and

8

S.H. KHAN, M.ABBAS: COMMON FIXED POINT...

72

Page 73: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

cl(T (PM(u))) is compact.

Proof. Let x 2 PM(u). Then for any h 2 (0; 1), d(W (u; x; h); u) (1

h)d(x; u) < dist(u;C). It follows that fW (u; x; h) : 0 < h < 1g and the set

M are disjoint. Thus x is not in the interior of M and so x 2 @M \M: Since

T (@M \M) M; Tx must be in M: Also Ix 2 PM(u); u 2 F (I) \ F (T ) and

I and T satisfy d(Tx; Tu) d(Ix; Iu), thus we have

d(Tx; u) = d(Tx; Tu) d(Ix; Iu)

= d(Ix; u) = dist(u;M):

It further implies that Tx 2 PM(u): Therefore T is a self map of PM(u). The

result now follows from Theorem 2.4.

The above result extends Theorem 3.2 of [1], Theorems 4.1-4.2 of [5], Theorem

7 of [13], Theorem 3 of [18], the corresponding results of [15], [16], [22], and[23].

Remarks 2.10.

(1) Theorem 2.4 extends and improves Theorems 1 and 2 of Dotson [8],

Theorem 2.2 of Al-Thaga [1], Theorem 4 of Habiniak [12] and Theorem

1 of Khan and Khan [16].

(2) As an application of Theorem 2.4, we can prove an analogue of recent

invariant approximation results in [2], namely, Theorem 3.1Theorem 4.4

for asymptotically I-nonexpansive map T for which (T; I) is a Banach

operator pair.

(3) Theorem 2.7 extends and improves Theorem 3.4 of Beg et al [3] to convex

metric spaces.

References

[1] M. A. Al-Thaga, Common xed points and best approximation, J. Ap-

prox. Theory, 85 (1996), 318-320.

9

S.H. KHAN, M.ABBAS: COMMON FIXED POINT...

73

Page 74: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

[2] M. A. Al-Thaga and N. Shahzad, Noncommuting self maps and invariant

approximations, Nonlinear Anal., 64 (12) (2006), 2778-2786.

[3] I. Beg, D. R. Sahu and S. D. Diwan, Approximation of xed points of

uniformly R- subweakly commuting mappings, J. Math. Anal. Appl.,

324(2006), 1105-1114.

[4] I. Beg, M. Abbas and J. K. Kim, Convergence theorems of the iterative

schemes in convex metric spaces, Nonlinear Funct. Anal. and Appl., 3

(2006), 421-436.

[5] J. Chen and Z. Li, Common xed points for Banach operator pairs in

best approximation, J. Math. Anal. Appl., (2007) (in press).

[6] L. Ciric, On some discontinuous xed point theorems in convex metric

spaces, Czech. Math. J., (43)188(1993), 319-326.

[7] X. P. Ding, Iteration process for nonlinear mappings in convex metric

spaces, J. Math. Anal. Appl., 132(1988), 114-122.

[8] W. J. Dotson Jr., Fixed point theorems for nonexpansive mappings on

star-shaped subsets of Banach spaces, J. London Math. Soc., 4(1972),

408-410.

[9] K. Goebel and W. A. Kirk, Iteration process for nonexpansive mappings,

Contemporary Math., 21(1983), 115-123.

[10] K. Goebel and W. A. Kirk, Topics in Metric Fixed Point Theory, Cam-

bridge University Press, Cambridge 1990.

[11] M. D. Guay, K. L. Singh and J. H. M. Whiteld, Fixed point theorems for

nonexpansive mappings in convex metric spaces, Proceedings, Conference

on Nonlinear Analysis, Marcel Dekker Inc., New York 80 (1982), 179-189.

[12] L. Habiniak, Fixed point theorems and invariant approximation, J. Ap-

prox. Theory 56(1989), 241-244.

10

S.H. KHAN, M.ABBAS: COMMON FIXED POINT...

74

Page 75: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

[13] G. Jungck and S. Sessa, Fixed point theorems in best approximation

theory, Math. Japon., 42(1995), 249-252.

[14] G. Jungck and N. Hussain, Compatible maps and invariant approxima-

tions, J. Math. Anal. Appl., 325(2007), 1003-1012.

[15] A. R. Khan, N. Hussain and A. B. Thaheem, Applications of xed

point theorems to invariant approximation, Approx. Theory and Appl.

16(2000), 48-55.

[16] L. A. Khan and A. R. Khan, An extension of Brosowski-Meinardus the-

orem on invariant approximations, Approx. Theory and Appl., 11(1995),

1-5.

[17] G. Meinardus, Invarianz bei linearn Approximation, Arch. Rat. Mech.

Anal., 14 (1963), 301-303.

[18] S. A. Sahab, M. S. Khan and S. Sessa, A result in best approximation

theory, J. Approx. Theory 55(1988), 349-351.

[19] N. Shahzad, Invariant approximations and R- subweakly commuting

maps, J. Math. Anal. Appl., 257 (2001), 39-45.

[20] T. Shimizu and W. Takahashi, Fixed point theorems in certain convex

metric spaces, Math. Japon., 37 (1992), 855-859.

[21] T. Shimizu and W. Takahashi, Fixed points of multivalued mappings in

certain convex metric spaces, Topol. Methods and Non Linear Analysis,

8(1996), 197-203.

[22] S. P. Singh, Application of a xed point theorem to approximation theory,

J. Approx. Theory, 25 (1979), 88-90.

[23] P. V. Subrahmanyam, An application of a xed point theorem to best

approximation, J. Approx. Theory 20(1977), 165-172.

11

S.H. KHAN, M.ABBAS: COMMON FIXED POINT...

75

Page 76: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

[24] W. Takahashi, A convexity in metric spaces and nonexpansive mappings

I, Kodai Math. Sem. Rep., 22 (1970), 142-149.

Safeer Hussain Khan

Department of Mathematics, Statistics and Physics, Qatar University, Doha

2713, Qatar.

[email protected]; [email protected]

Mujahid Abbas

Department of Mathematics,

Lahore University of Management Sciences, 54792-Lahore, Pakistan.

[email protected]

12

S.H. KHAN, M.ABBAS: COMMON FIXED POINT...

76

Page 77: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

BASIC HYPERGEOMETRIC SERIES ANDq-HARMONIC NUMBER IDENTITIES

Wenchang ChuDipartimento di Matematica

Universita del SalentoLecce–Arnesano P. O. Box 193

Lecce 73100 Italy

Nancy S. S. GuCenter for Combinatorics, LPMC

Nankai UniversityTianjin 300071, P.R. China

Abstract. The derivative operator method is systematically employed in examining fourtypical basic hypergeometric series theorems, named as the q-Chu-Vandermonde identity,the q-Pfaff-Saalschutz theorem, the q-Dougall-Dixon formula and Watson’s q-Whipple trans-formation, which establish numerous identities on q-harmonic numbers, including severalsurprising summation formulae.

1. Introduction and notations

Let N0 be the set of nonnegative integers. With the q-shifted factorial of order n ∈ N0 givenby

(x; q)0 = 1 and (x; q)n :=

n−1∏

k=0

(1 − xqk) for n = 1, 2, · · ·

we define the q-binomial coefficients[x

k

]=

(q1+x−k; q)k

(q; q)k

and

[n

k

]=

(q; q)n

(q; q)k(q; q)n−k

as well as the basic hypergeometric series

1+rφr

[a0, a1, · · · , ar

b1, · · · , br

∣∣∣ q; z

]=

∞∑

n=0

(a0; q)n(a1; q)n · · · (ar; q)n

(q; q)n (b1; q)n · · · (br; q)nzn

where for convenience, 0 < |q| < 1 will be assumed throughout the paper. See Gasper andRahman [6] for a comprehensive study of the theory of basic hypergeometric series.

2000 Mathematics Subject Classification. Primary 05A30, Secondary 33D15.Key words and phrases. Basic hypergeometric series; Derivative operator; q-harmonic number.Email addresses: [email protected] and [email protected].

77

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2, 77-98, 2012, COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 78: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

2 Wenchang Chu and Nancy S. S. Gu

For a differentiable function f(x), denote the two derivative operators by

Dxf(x) =d

dxf(x) and D0f(x) =

d

dxf(x)

∣∣∣x=0

.

Then it is easy to check the following derivatives of q-binomial coefficients at x = 0

D0

[x + m

n

]= (ln q)

[m

n

]Hm−n(q)−Hm(q),(1.1)

D0

[x + m

n

]−1

= (ln q)

[m

n

]−1

Hm(q)−Hm−n(q);(1.2)

where the q-analogue of harmonic number [1] reads as

(1.3) H0(q) = 0 and Hn(q) =

n∑

k=1

qk

1 − qkfor n = 1, 2, · · ·

which will frequently be written as Hn instead of Hn(q) for brevity.

Richard Askey has pointed out that Isaac Newton was the first to notice that the partialsums of the harmonic series arise from the differentiation of a product [10]. In the sequel,many harmonic number identities were discovered by using this differentiation method (see[1, 3, 5, 11] for example).

In this paper, we will apply further the derivative operator method to four typical ba-sic hypergeometric series formulae. Numerous identities on q-harmonic numbers will beestablished. Especially, we will examine, in detail, the q-Chu-Vandermonde identity, the q-Pfaff-Saalschutz summation theorem, the q-Dougall-Dixon formula and Watson’s q-Whippletransformation. They will present a complete coverage on the q-harmonic numbers identitiesrelated to these four fundamental q-series summation formulae.

The method can briefly be described as the following three steps:

• For a given q-series theorem, reformulating it in terms of q-binomial sum equation.• Applying the derivative operator D0 across the resulting q-binomial equation.• Writing down the q-harmonic number identities by specifying parameters.

In most cases, this procedure can be carried out through quite routine computations. How-ever there are several situations in which a limiting relation on finite q-harmonic numbersums will be required, that will be proved in the sixth section. As a documentary source forfurther references on q-harmonic number identities, ninty examples will carefully be selectedas consequences.

The rest of the paper will be organized as follows. From Section 2 to Section 5, we shallsystematically investigate the q-harmonic number identities by utilizing the aforementionedfour well-known basic hypergeometric series formulae. Then the sixth section will present aquite useful limiting relation concerning a class of finite q-sums. Finally, the paper will endup with Section 7 by comparing the classical harmonic number identities appeared in [5] andtheir q-analogues obtained in this paper.

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

78

Page 79: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Basic Hypergeometric Series and q-Harmonic Number Identities 3

2. The q-Chu-Vandermonde identity

Recall the q-Chu-Vandermonde convolution identity [6, Appendix II-6]

2φ1

[q−n, a

c

∣∣∣ q; q

]=

(c/a; q)n

(c; q)nan.

Performing the parameter replacements

a → q−n−µn

c → q1+λn+x

where λ, µ ∈ N0

we can equivalently restate it as the following q-binomial identity

(2.1)n∑

k=0

q(n−k)(n−k+µn)

[n + µn

k

][x + n + λn

n − k

]=

[x + 2n + λn + µn

n

].

Applying the derivative operator D0 across this equation and then appealing to (1.1), wefind the expression

n∑

k=0

q(n−k)(n−k+µn)

[n+µn

k

][n+λn

n − k

]Hλn+n−Hλn+k

=

[2n+λn+µn

n

]Hλn+µn+2n−Hλn+µn+n

.

According to the factor inside the braces · · · , splitting the left-hand side into two sumswith respect to k and then evaluating the first one by (2.1), we get immediately the followingq-harmonic number identity.

Theorem 1 (λ, µ ∈ N0).n∑

k=0

q(n−k)(n−k+µn)

[n + µn

k

][n + λn

n − k

]Hλn+k =

[2n+λn+µn

n

]Hλn+n +Hλn+µn+n −Hλn+µn+2n

.

One special case corresponding to µ = 0 reads as

(2.2)n∑

k=0

q(n−k)2

[n

k

][n + λn

n − k

]Hλn+k =

[2n + λn

n

]2Hλn+n −Hλn+2n

which can further be specialized by letting λ = 0 to the following identity

(2.3)

n∑

k=0

q(n−k)2[n

k

]2

Hk =

[2n

n

]2Hn −H2n

.

3. The q-Pfaff-Saalschutz theorem

Making the parameter replacements

a → q−n−µn−µ′x

b → q1+λn+λ′x

c → q1+νn+ν′x

where λ, µ, ν ∈ N0

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

79

Page 80: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

4 Wenchang Chu and Nancy S. S. Gu

in the q-Pfaff-Saalschutz theorem [6, Appendix II-12]

3φ2

[q−n, a, b

c, q1−nab/c

∣∣∣ q; q

]=

(c/a; q)n(c/b; q)n

(c; q)n(c/(ab); q)n

we can reformulate it as the q-binomial equation

n∑

k=0

[nk

][k+λn+λ′x

k

][n+µn+µ′x

k

][k+νn+ν′x

k

][k+(λ−µ−ν−2)n+(λ′−µ′−ν′)x

k

]q(n−k)(n−k+µn+µ′x) =

[(λ−ν)n+(λ′−ν′)x

n

][(µ+ν+2)n+(µ′+ν′)x

n

][n+νn+ν′x

n

][(λ−µ−ν−1)n+(λ′−µ′−ν′)x

n

] .

In view of (1.1) and (1.2), we establish the following three theorems on q-harmonic sums byapplying the derivative operator D0 respectively to the cases µ′ = ν′ = 0, λ′ = ν′ = 0 andλ′ = µ′ = 0 of the last identity.

Theorem 2 (λ, µ, ν ∈ N0: λ > 1 + µ + ν).

n∑

k=0

q(n−k)(n−k+µn)

[nk

][λn+k

k

][µn+n

k

][νn+k

k

][(λ−µ−ν−2)n+k

k

]Hλn+k −H(λ−µ−ν−2)n+k

=

[(λ−ν)n

n

][(µ+ν+2)n

n

][νn+n

n

][(λ−µ−ν−1)n

n

]H(λ−ν)n−H(λ−ν−1)n+ Hλn−H(λ−µ−ν−1)n.

Theorem 3 (λ, µ, ν ∈ N0: λ > 1 + µ + ν).

n∑

k=0

q(n−k)(n−k+µn)

[nk

][λn+k

k

][µn+n

k

][νn+k

k

][(λ−µ−ν−2)n+k

k

]k −Hµn+n−k+H(λ−µ−ν−2)n+k

=

[(λ−ν)n

n

][(µ+ν+2)n

n

][νn+n

n

][(λ−µ−ν−1)n

n

]n −Hµn+n−H(1+µ+ν)n+H(2+µ+ν)n+H(λ−µ−ν−1)n

.

Theorem 4 (λ, µ, ν ∈ N0: λ > 1 + µ + ν).

n∑

k=0

q(n−k)(n−k+µn)

[nk

][λn+k

k

][µn+n

k

][νn+k

k

][(λ−µ−ν−2)n+k

k

]Hνn+k −H(λ−µ−ν−2)n+k

=

[(λ−ν)n

n

][(µ+ν+2)n

n

][νn+n

n

][(λ−µ−ν−1)n

n

]

H(1+µ+ν)n −H(µ+ν+2)n + Hνn+n

−H(λ−ν−1)n + H(λ−ν)n −H(λ−µ−ν−1)n

.

These identities contain the following interesting special cases.

Example 1 (Theorem 2: λ = 2 and µ = ν = 0).

n∑

k=0

q(n−k)2[

nk

]2[2n + kk

]H2n+k −Hk

= 2

[2nn

]2H2n −Hn

.

Example 2 (Theorem 2: λ = 3, µ = 1 and ν = 0).

n∑

k=0

q(n−k)(2n−k)[

nk

][2nk

][3n + k

k

]H3n+k−Hk

=

[3nn

]22H3n−Hn−H2n

.

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

80

Page 81: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Basic Hypergeometric Series and q-Harmonic Number Identities 5

Example 3 (Theorem 2: λ = 3, µ = 0 and ν = 1).n∑

k=0

q(n−k)2[

nk

]2[3n + k2n

]H3n+k −Hk

=

[3nn

]2H2n + H3n − 2Hn

.

Example 4 (Theorem 3: λ = 2 and µ = ν = 0).n∑

k=0

q(n−k)2[

nk

]2[2n + kk

]k + Hk −Hn−k

=

[2nn

]2n + H2n −Hn

.

Example 5 (Theorem 3: λ = 3, µ = 1 and ν = 0).n∑

k=0

q(n−k)(2n−k)[nk

][2nk

][3n+k

k

]k + Hk−H2n−k

=

[3nn

]2n + Hn+H3n−2H2n

.

Example 6 (Theorem 3: λ = 3, µ = 0 and ν = 1).n∑

k=0

q(n−k)2[

nk

]2[3n + k2n

]k + Hk −Hn−k

=

[3nn

]2n + H3n −H2n

.

Example 7 (Theorem 4: λ = 3, µ = 0 and ν = 1).n∑

k=0

q(n−k)2[

nk

]2[3n + k2n

]Hn+k−Hk

=

[3nn

]23H2n − 2Hn −H3n

.

4. The terminating q-Dougall-Dixon theorem

In this section, we shall derive three summation theorems on q-harmonic numbers by exam-ining the following terminating version of the q-Dougall-Dixon formula [6, Appendix II-21]

6φ5

[a, qa

12 , −qa

12 , b, d, q−n

a12 , −a

12 , aq/b, aq/d, q1+na

∣∣∣ q;q1+na

bd

]=

(aq; q)n(aq/(bd); q)n

(aq/b; q)n(aq/d; q)n.

4.1. Firstly, making the parameter replacements

a → q−n−x

b → q1+bn

d → q1+dn

where b, d ∈ N0

we can rewrite the terminating q-Dougall-Dixon formula as the q-binomial equationn∑

k=0

qk

[nk

][x+n

k

][k+bn

k

][k+dn

k

][k−x

k

][x+bn+n

k

][x+dn+n

k

](1 − qx+n−2k) = (1 − qx)

[x+n

n

][1+x+bn+dn+n

n

][x+bn+n

n

][x+dn+n

n

]

which yields, under the derivative operator D0, the following summation theorem.

Theorem 5 (q-harmonic number identity: b, d ∈ N0).n∑

k=0

qk[

nk

]2[k+bn

k

][k+dn

k

][n+bn

k

][n+dn

k

]1 + (1−qn−2k)(2Hk−Hbn+k−Hdn+k)

=

[1+bn+dn+n

n

][n+bn

n

][n+dn

n

] .

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

81

Page 82: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

6 Wenchang Chu and Nancy S. S. Gu

As applications, we display the following q-harmonic number identities.

Example 8 (Theorem 5: b = 0 and d → ∞).n∑

k=0

qk[

nk

]1 + (1 − qn−2k)Hk

= 1.

Example 9 (Theorem 5: b, d → ∞).n∑

k=0

qk[

nk

]21 + 2(1 − qn−2k)Hk

= (q; q)n.

Example 10 (Theorem 5: b = 1 and d → ∞).n∑

k=0

qk[

nk

][n + k

k

][2n − k

n

]1 + (1−qn−2k)(2Hk−Hn+k)

= 1.

Example 11 (Theorem 5: b = 0 and d = 1).n∑

k=0

qk[n + k

k

][2n − k

n

]1 + (1−qn−2k)(Hk−Hn+k)

=

[1 + 2n

n

].

Example 12 (Theorem 5: b = d = 1).n∑

k=0

qk[n + k

k

]2[2n − kn

]21 + 2(1−qn−2k)(Hk−Hn+k)

=

[1 + 3n

n

].

4.2. Secondly, under the parameter replacements

a → q−n−x

b → q1+bn

d → q−n−dn

where b, d ∈ N0

the terminating q-Dixon formula becomes the following q-binomial equationn∑

k=0

(1−qx+n−2k)

[nk

][x+n

k

][k+bn

k

][n+dn

k

][k−x

k

][x+bn+n

k

][k+dn−x

k

]qk+(n−k)(x−k) = (−1)n(1−qx)

[x+n

n

][x+bn−dn

n

][n+bn+x

n

][n+dn−x

n

]qdn2+(1+n2 ).

Applying the derivative operator D0 to it gives rise to the summation theorem.

Theorem 6 (q-harmonic number identity: b, d ∈ N0).n∑

k=0

qk(1+k−n)

[nk

]2 [k+bnk ][n+dn

k ][n+bn

k ][k+dnk ]

1+(1−qn−2k)(k+2Hk−Hbn+k+Hdn+k)

= (−1)n

[bn−dn

n

][n+bn

n

][n+dn

n

]qdn2+(1+n2 ).

As applications, we display the following q-harmonic number identities.

Example 13 (Theorem 6: b = 0 and d → ∞).n∑

k=0

q(1+k)(k−n)[

nk

]1 + (1−qn−2k)(k+Hk)

= 1.

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

82

Page 83: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Basic Hypergeometric Series and q-Harmonic Number Identities 7

Example 14 (Theorem 6: b = d = 0).

n∑

k=0

qk(1+k−n)[

nk

]21 + (1−qn−2k)(k+2Hk)

=

1, n = 0;

0, n 6= 0.

Example 15 (Theorem 6: b → ∞ and d = 0).

n∑

k=0

qk(1+k−n)[

nk

]31 + (1−qn−2k)(k+3Hk)

= (−1)nq(

1+n2 ).

Example 16 (Theorem 6: b = 0 and d = 1).

n∑

k=0

qk(1+k−n)[2nk

][2n

n+k

]1 + (1−qn−2k)(k+Hk+Hn+k)

=

[2n−1

n

]qn.

Example 17 (Theorem 6: b = 1 and d → ∞).

n∑

k=0

qk(1+k−n)[nk

][n+k

k

][2n−k

n

]1 + (1−qn−2k)(k+2Hk−Hn+k)

= qn2+n.

Example 18 (Theorem 6: b → ∞ and d = 1).

n∑

k=0

qk(1+k−n)[nk

][2nk

][2n

n+k

]1 + (1−qn−2k)(k+2Hk+Hn+k)

= (−1)nq

n2 (1+3n).

Example 19 (Theorem 6: b = 1 and d = 0).

n∑

k=0

qk(1+k−n)[nk

]2[n+kk

][2n−k

n

]1 + (1−qn−2k)(k+3Hk−Hn+k)

= (−1)nq(

1+n2 ).

4.3. Finally, carrying out the parameter replacements

a → q−n−x

b → q−n−bn

d → q−n−dn

where b, d ∈ N0

in the terminating q-Dougall-Dixon formula, we can express it as the q-binomial equationn∑

k=0

(1 − qx+n−2k)

[nk

][x+n

k

][n+bn

k

][n+dn

k

][k−x

k

][k+bn−x

k

][k+dn−x

k

]q(n−2k

2 )+x(n−2k) = (−1)n(1 − qx)

[x+n

n

][2n+bn+dn−x

n

][n+bn−x

n

][n+dn−x

n

]

which results, under the derivative operator D0, in the following summation theorem.

Theorem 7 (q-harmonic number identity: b, d ∈ N0).

n∑

k=0

q(n−2k

2 )[nk

]2

[n+bn

k

][n+dn

k

][k+bn

k

][k+dn

k

]1 + (1−qn−2k)(2k+2Hk+Hbn+k+Hdn+k)

= (−1)n

[2n+bn+dn

n

][n+bn

n

][n+dn

n

] .

As applications, we display the following q-harmonic number identities.

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

83

Page 84: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

8 Wenchang Chu and Nancy S. S. Gu

Example 20 (Theorem 7: b, d → ∞).n∑

k=0

q(n−2k

2 )[

nk

]21 + 2(1−qn−2k)(k+Hk)

= (−1)n(q; q)n.

Example 21 (Theorem 7: b = 0 and d → ∞).n∑

k=0

q(n−2k

2 )[

nk

]31 + (1 − qn−2k)(2k + 3Hk)

= (−1)n.

Example 22 (Theorem 7: b = d = 0).n∑

k=0

q(n−2k

2 )[

nk

]41 + 2(1 − qn−2k)(k + 2Hk)

= (−1)n

[2nn

].

Example 23 (Theorem 7: b = 1 and d → ∞).n∑

k=0

q(n−2k

2 )[

nk

][2nk

][2n

n + k

]1 + (1−qn−2k)(2k+2Hk+Hn+k)

= (−1)n.

Example 24 (Theorem 7: b = 0 and d = 1).n∑

k=0

q(n−2k

2 )[nk

]2[2nk

][2n

n+k

]1 + (1−qn−2k)(2k+3Hk+Hn+k)

= (−1)n

[3nn

].

Example 25 (Theorem 7: b = d = 1).n∑

k=0

q(n−2k

2 )[2nk

]2[ 2nn+k

]21 + 2(1−qn−2k)(k+Hk+Hn+k)

= (−1)n

[4nn

].

5. Watson’s q-Whipple transformation

Watson’s q-Whipple transformation [6, Appendix III-18] is fundamental in the q-series theory

8φ7

[a, qa

12 , −qa

12 , b, c, d, e, q−n

a12 , −a

12 , aq/b, aq/c, aq/d, aq/e, q1+na

∣∣∣ q;q2+na2

bcde

]

=(aq; q)n(aq/(bd); q)n

(aq/b; q)n(aq/d; q)n× 4φ3

[q−n, b, d, aq/(ce)

aq/c, aq/e, q−nbd/a

∣∣∣ q; q

].

It will systematically be explored in five different manners to prove five transformationtheorems concerning q-binomial coefficients and q-harmonic numbers.

5.1. Making the parameter replacements

a → q−x−n

b → q1+bn

c → q1+cn

d → q1+dn

e → q1+en

where b, c, d, e ∈ N0

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

84

Page 85: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Basic Hypergeometric Series and q-Harmonic Number Identities 9

we can reformulate Watson’s q-Whipple transformation asn∑

k=0

(1 − qx+n−2k)

[nk

][x+n

k

][k+bn

k

][k+cn

k

][k+dn

k

][k+en

k

][k−x

k

][n+bn+x

k

][n+cn+x

k

][n+dn+x

k

][n+en+x

k

]qk(1+x+n−k)

= (1 − qx)

[x+n

n

][1+x+bn+dn+n

n

][x+bn+n

n

][x+dn+n

n

]n∑

`=0

qx`

[n`

][`+bn

`

][`+dn

`

][1+x+cn+en+n

`

][x+cn+n

`

][x+en+n

`

][1+x+bn+dn+`

`

] .

Under the derivative operator D0, this gives the following transformation theorem.

Theorem 8 (Transformation formula: b, c, d, e ∈ N0).n∑

k=0

qk(1+n−k)[

nk

]2[k+bn

k

][k+cn

k

][k+dn

k

][k+en

k

][n+bn

k

][n+cn

k

][n+dn

k

][n+en

k

]

×1 − (1−qn−2k)(k+Hbn+k+Hcn+k+Hdn+k+Hen+k−2Hk)

=

[1+bn+dn+n

n

][n+bn

n

][n+dn

n

]n∑

`=0

[n`

] [`+bn

`

][`+dn

`

][1+cn+en+n

`

][n+cn

`

][n+en

`

][1+bn+dn+`

`

].

We collect the following q-harmonic number identities as consequences.

Example 26 (Theorem 8: b = c = d = 0 and e → ∞).n∑

k=0

qk(1+n−k)[

nk

]−11 − (1 − qn−2k)(k + Hk)

= (1 − q1+n)

1 + n + Hn+1

.

Example 27 (Theorem 8: b = c = d = e = 0).n∑

k=0

qk(1+n−k)[

nk

]−21 − (1−qn−2k)(k+2Hk)

= (1−q1+n)2

1−q2+n

1 + n + 2Hn+1

.

Example 28 (Theorem 8: b = c = d = 0 and e = 1).n∑

k=0

qk(1+n−k)

[2nk

][2n

n+k

]1−(1 − qn−2k)(k + Hk + Hn+k)

=

1 − q1+2n

1 + q1+n

[2nn

]−11+n+ q1+n

1−q1+n +H2n+1

.

Example 29 (Theorem 8: b = d = 0, c = 1 and e → ∞).n∑

k=0

qk(1+n−k)

[n+k

k

][2nk

] 1 − (1 − qn−2k)(k + Hn+k)

= (1 − q1+2n)

1 + n + H2n+1 −Hn

.

Example 30 (Theorem 8: b = d = 0 and c = e = 1).

n∑

k=0

qk(1+n−k)

[n+k

k

]2

[2nk

]2

1 − (1−qn−2k)(k+2Hn+k)

= (1−q1+2n)2

1−q2+3n

1 + n + 2H2n+1 − 2Hn

.

Example 31 (Theorem 8: b, c, d → ∞ and e = 0).n∑

k=0

qk(1+n−k)[

nk

]1 − (1 − qn−2k)(k −Hk)

=

n∑

`=0

(q; q)n

(q; q)`.

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

85

Page 86: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

10 Wenchang Chu and Nancy S. S. Gu

Example 32 (Theorem 8: b, c, d, e → ∞).

n∑

k=0

qk(1+n−k)[

nk

]21 − (1 − qn−2k)(k − 2Hk)

= (q; q)n

n∑

`=0

[n`

].

Example 33 (Theorem 8: b = d = 1, c = 0 and e → ∞).

n∑

k=0

qk(1+n−k)

[nk

][n+k

k

]2

[2nk

]2

1 − (1−qn−2k)(k+2Hn+k−Hk)

=

[1+3n

n

][2nn

]2

n∑

`=0

[n+`

`

]2

[1+2n+`

`

] .

Example 34 (Theorem 8: b = c = d = 1 and e = 0).

n∑

k=0

qk(1+n−k)[

nk

][n+k

k

]3

[2nk

]3

1−(1−qn−2k)(k+3Hn+k−Hk)

=

[1+3n

n

][2nn

]2

n∑

`=0

(1 − q1+2n)[n+`

`

]2

(1 − q1+2n−`)[1+2n+`

`

] .

Example 35 (Theorem 8: b = c = d = 1 and e → ∞).

n∑

k=0

qk(1+n−k)[

nk

]2[n+k

k

]3

[2nk

]3

1 − (1 − qn−2k)(k + 3Hn+k − 2Hk)

=

[1+3n

n

][2nn

]2

n∑

`=0

[n`

][n+`

`

]2

[2n`

][1+2n+`

`

] .

Example 36 (Theorem 8: b = c = d = e = 1).

n∑

k=0

qk(1+n−k)[

nk

]2[n+k

k

]4

[2nk

]4

1− (1− qn−2k)(k +4Hn+k − 2Hk)

=

[1+3n

n

][2nn

]2

n∑

`=0

[n`

] [n+`

`

]2[1+3n`

][2n`

]2[1+2n+``

] .

Example 37 (Theorem 8: b = 0, d = 1 and c, e → ∞).

n∑

k=0

qk(1+n−k)[n + k

k

][2n − k

n

]1−(1−qn−2k)(k+Hn+k−Hk)

=

[1 + 2n

n

] n∑

`=0

[n`

] [n+`

`

][1+n+`

`

](q; q)`.

Example 38 (Theorem 8: b, c, d → ∞ and e = 1).

n∑

k=0

qk(1+n−k)[

nk

][n + k

k

][2n − k

n

]1 − (1−qn−2k)(k+Hn+k−2Hk)

=

n∑

`=0

[2n − `

n

](q; q)n

(q; q)`.

Example 39 (Theorem 8: b = d = 1 and c, e → ∞).

n∑

k=0

qk(1+n−k)[n + k

k

]2[2n − kn

]21−(1−qn−2k)(k+2Hn+k−2Hk)

=

[1 + 3n

n

] n∑

`=0

[n`

] [n+`

`

]2

[1+2n+`

`

](q; q)`.

5.2. With the parameter replacements

a → q−x−n

b → q1+bn

c → q1+cn

d → q1+dn

e → q−n−en

where b, c, d, e ∈ N0

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

86

Page 87: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Basic Hypergeometric Series and q-Harmonic Number Identities 11

Watson’s q-Whipple transformation can be rewritten asn∑

k=0

(1 − qx+n−2k)

[nk

][x+n

k

][k+bn

k

][k+cn

k

][k+dn

k

][n+en

k

][k−x

k

][n+bn+x

k

][n+cn+x

k

][n+dn+x

k

][k+en−x

k

]qk

= (1−qx)[x+n

n ][1+x+bn+dn+nn ]

[x+bn+nn ][x+dn+n

n ]

n∑

`=0

(−1)`[n`

][`+bn

`

][`+dn

`

][x+cn−en

`

][n+cn+x

`

][`+en−x

`

][1+x+bn+dn+`

`

] qne`+(1+`2 ).

Applying the derivative operator D0 to it, we get the following transformation theorem.

Theorem 9 (Transformation formula: b, c, d, e ∈ N0).n∑

k=0

qk[

nk

]2[k+bn

k

][k+cn

k

][k+dn

k

][n+en

k

][n+bn

k

][n+cn

k

][n+dn

k

][k+en

k

]

×1 + (1−qn−2k)(2Hk−Hbn+k−Hcn+k−Hdn+k+Hen+k)

=

[1+bn+dn+n

n

][n+bn

n

][n+dn

n

]n∑

`=0

(−1)`

[n`

][`+bn

`

][`+dn

`

][cn−en

`

][n+cn

`

][`+en

`

][1+bn+dn+`

`

]qne`+(1+`2 ).

We collect the following q-harmonic number identities as consequences.

Example 40 (Theorem 9: b = c = d = 0 and e → ∞).n∑

k=0

qk[

nk

]−11 − (1 − qn−2k)Hk

= (q−1 − qn)Hn+1.

Example 41 (Theorem 9: b = 1, c = d = 0 and e → ∞).n∑

k=0

qk

[n+k

k

][2nk

] 1 − (1 − qn−2k)Hn+k

= (q−1−n − qn)

H2n+1 −Hn

.

Example 42 (Theorem 9: b = d = 0, c → ∞ and e = 1 with n > 0).n∑

k=0

qk

[2nk

][n+k

k

]1 + (1 − qn−2k)Hn+k

= (1 − q−n)

Hn−1 −H2n

.

Example 43 (Theorem 9: b = c = d = 0 and e = 1 with n > 1).n∑

k=0

qk [2nk ]

[nk][n+k

k ]

1 − (1−qn−2k)(Hk−Hn+k)

= (1−qn)(1−qn+1)

q−qn

Hn+1+Hn−1−H2n

.

Example 44 (Theorem 9: b, c, d → ∞, e = 0).n∑

k=0

qk[

nk

]31 + 3(1 − qn−2k)Hk

=

n∑

`=0

(−1)`[n`

](q; q)n

(q; q)`q(

1+`2 ).

Example 45 (Theorem 9: b = d = 1, c = 0 and e → ∞).

n∑

k=0

qk[

nk

][n+k

k

]2

[2nk

]2

1 + (1−qn−2k)(Hk−2Hn+k)

=

[1+3n

n

][2nn

]2

n∑

`=0

q`

[n+`

`

]2

[1+2n+`

`

] .

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

87

Page 88: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

12 Wenchang Chu and Nancy S. S. Gu

Example 46 (Theorem 9: b = d = 1, c → ∞ and e = 0).

n∑

k=0

qk[

nk

]3[n+k

k

]2

[2nk

]2

1 + (1 − qn−2k)(3Hk − 2Hn+k)

=

[1+3n

n

][2nn

]2

n∑

`=0

(−1)`

[n`

][n+`

`

]2

[1+2n+`

`

] q(1+`2 ).

Example 47 (Theorem 9: b = c = d = 1 and e → ∞).

n∑

k=0

qk[

nk

]2[n+k

k

]3

[2nk

]3

1 + (1 − qn−2k)(2Hk − 3Hn+k)

=

[1+3n

n

][2nn

]2

n∑

`=0

q(1+n)`

[n`

][n+`

`

]2

[2n`

][1+2n+`

`

] .

Example 48 (Theorem 9: b = c = d = 1 and e = 0).

n∑

k=0

qk[

nk

]3[n+k

k

]3

[2nk

]3

1 + 3(1 − qn−2k)(Hk −Hn+k)

=

[1+3n

n

][2nn

]2

n∑

`=0

(−1)`

[n`

]2[n+``

]2

[2n`

][1+2n+`

`

]q(1+`2 ).

Example 49 (Theorem 9: b = 0, c, d → ∞ and e = 1).

n∑

k=0

qk[2nk

][2n

n + k

]1 + (1 − qn−2k)(Hk + Hn+k)

=

n∑

`=0

(−1)`[

2nn + `

]qn`+(1+`

2 ).

Example 50 (Theorem 9: b, c, d → ∞ and e = 1).

n∑

k=0

qk[

nk

][2nk

][2n

n + k

]1+ (1− qn−2k)(2Hk +Hn+k)

=

n∑

`=0

(−1)`[

2nn + `

](q; q)n

(q; q)`qn`+(1+`

2 ).

Example 51 (Theorem 9: b = 1, c, d → ∞ and e = 0).

n∑

k=0

qk[

nk

]2[n + kk

][2n − k

n

]1 + (1 − qn−2k)(3Hk −Hn+k)

=

n∑

`=0

(−1)`[n`

][n + `

`

]q(

1+`2 ).

5.3. Performing the parameter replacements

a → q−x−n

b → q1+bn

c → q−n−cn

d → q1+dn

e → q−n−en

where b, c, d, e ∈ N0

we can express Watson’s q-Whipple transformation as

n∑

k=0

(1 − qx+n−2k)

[nk

][x+n

k

][k+bn

k

][n+cn

k

][k+dn

k

][n+en

k

][k−x

k

][n+bn+x

k

][k+cn−x

k

][n+dn+x

k

][k+en−x

k

]qk(1+k−n−x)

= (1−qx)[x+n

n ][1+x+bn+dn+nn ]

[x+bn+nn ][x+dn+n

n ]

n∑

`=0

(−1)`

[n`

][`+bn

`

][`+dn

`

][`+n+cn+en−x

`

][`+cn−x

`

][`+en−x

`

][1+x+bn+dn+`

`

]q(1+`2 )−n`

which results, under the derivative operator D0, in the following transformation theorem.

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

88

Page 89: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Basic Hypergeometric Series and q-Harmonic Number Identities 13

Theorem 10 (Transformation formula: b, c, d, e ∈ N0).

n∑

k=0

qk(1+k−n)[

nk

]2[k+bn

k

][n+cn

k

][k+dn

k

][n+en

k

][n+bn

k

][k+cn

k

][n+dn

k

][k+en

k

]

×1 + (1−qn−2k)(k+2Hk−Hbn+k+Hcn+k−Hdn+k+Hen+k)

=

[1+bn+dn+n

n

][n+bn

n

][n+dn

n

]n∑

`=0

(−1)`[n`

][`+bn

`

][`+dn

`

][n+cn+en+`

`

][`+cn

`

][`+en

`

][1+bn+dn+`

`

]q(1+`2 )−n`.

We collect the following q-harmonic number identities as consequences.

Example 52 (Theorem 10: b = d = 0, c = 1 and e → ∞ with n > 0).

n∑

k=0

qk(1+k−n)

[2nk

][n+k

k

]1 + (1−qn−2k)(k+Hn+k)

= (qn − q2n)

1 + n + H2n −Hn−1

.

Example 53 (Theorem 10: b = d = 0 and c = e = 1 with n > 0).

n∑

k=0

qk(1+k−n)

[2nk

]2

[n+k

k

]2

1 + (1−qn−2k)(k+2Hn+k)

= qn (1−qn)2

1−q3n

1+n+2H2n−2Hn−1

.

Example 54 (Theorem 10: b = 0 and c, d, e → ∞).

n∑

k=0

qk(1+k−n)

[nk

]1 + (1−qn−2k)(k+Hk)

=

n∑

`=0

(−1)`(q; q)`

[n`

]q(

1+`2 )−n`.

Example 55 (Theorem 10: b, d → ∞ and c = e = 0).

n∑

k=0

qk(1+k−n)[

nk

]41 + (1 − qn−2k)(k + 4Hk)

=

n∑

`=0

(−1)`[n`

][n + `

`

](q; q)n

(q; q)`

q(1+`2 )−n`.

Example 56 (Theorem 10: b = 0, c = e = 1 and d → ∞).

n∑

k=0

qk(1+k−n)[

nk

] [2nk

]2

[n+k

k

]2

1 + (1 − qn−2k)(k + Hk + 2Hn+k)

=

n∑

`=0

(−1)`[n`

][3n+`

`

][n+`

`

]2 q(1+`2 )−n`.

Example 57 (Theorem 10: b = d = 1, c = 0 and e → ∞).

n∑

k=0

qk(1+k−n)[

nk

]3[n+k

k

]2

[2nk

]2

1+(1−qn−2k)(k+3Hk−2Hn+k)

=

[1+3n

n

][2nn

]2

n∑

`=0

(−1)`

[n`

][n+`

`

]2

[1+2n+`

`

] q(1+`2 )−n`.

Example 58 (Theorem 10: b = d = 1 and c = e = 0).

n∑

k=0

qk(1+k−n)[

nk

]4[n+k

k

]2

[2nk

]2

1+(1−qn−2k)(k+4Hk−2Hn+k)

=

[1+3n

n

][2nn

]2

n∑

`=0

(−1)`

[n`

][n+`

`

]3

[1+2n+`

`

] q(1+`2 )−n`.

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

89

Page 90: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

14 Wenchang Chu and Nancy S. S. Gu

Example 59 (Theorem 10: b = 0, d = 1 and c, e → ∞).

n∑

k=0

qk(1+k−n)[n + k

k

][2n − k

n

]1 + (1 − qn−2k)(k + Hk −Hn+k)

=[1 + 2n

n

] n∑

`=0

(−1)`(q; q)`

[n`

] [n+`

`

][1+n+`

`

]q(1+`2 )−n`.

Example 60 (Theorem 10: b, d → ∞ and c = e = 1).

n∑

k=0

qk(1+k−n)[2nk

]2[ 2nn + k

]21 + (1 − qn−2k)(k + 2Hk + 2Hn+k)

=

n∑

`=0

(−1)`[

2nn + `

]2[3n+`

`

][n`

] (q; q)n

(q; q)`q(

1+`2 )−n`.

Example 61 (Theorem 10: b = d = 1 and c, e → ∞).

n∑

k=0

qk(1+k−n)[n + k

k

]2[2n − kn

]21 + (1 − qn−2k)(k + 2Hk − 2Hn+k)

=[1 + 3n

n

] n∑

`=0

(−1)`(q; q)`

[n`

][n+`

`

]2

[1+2n+`

`

] q(1+`2 )−n`.

Example 62 (Theorem 10: b, d → ∞, c = 0 and e = 1).

n∑

k=0

qk(1+k−n)[

nk

]2[2nk

][2n

n + k

]1 + (1 − qn−2k)(k + 3Hk + Hn+k)

=n∑

`=0

(−1)`[2n + `

`

][2n

n + `

](q; q)n

(q; q)`q(

1+`2 )−n`.

Example 63 (Theorem 10: b = 1, c = e = 0 and d → ∞).

n∑

k=0

qk(1+k−n)[

nk

]3[n + kk

][2n − k

n

]1+(1−qn−2k)(k+4Hk−Hn+k)

= n

`=0(−1)`

[n`

][n + `

`

]2

q(1+`2 )−n`

.

5.4. Under the parameter replacements

a → q−x−n

b → q1+bn

c → q−n−cn

d → q−n−dn

e → q−n−en

where b, c, d, e ∈ N0

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

90

Page 91: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Basic Hypergeometric Series and q-Harmonic Number Identities 15

Watson’s q-Whipple transformation becomes the equationn∑

k=0

(1−qx+n−2k)[nk][

x+nk ][k+bn

k ][n+cnk ][n+dn

k ][n+enk ]

[k−xk ][n+bn+x

k ][k+cn−xk ][k+dn−x

k ][k+en−xk ]

q(n−2k

2 )+(n−2k)x

= (−1)n(1−qx)[x+n

n ][bn−dn+xn ]

[x+bn+nn ][n+dn−x

n ]

n∑

`=0

q(n−`)(n−`+dn) [n`][`+bn

` ][n+dn` ][`+n+cn+en−x

` ][`+cn−x

` ][`+en−x` ][`−n+bn−dn+x

` ].

Applying the derivative operator D0 to it, we obtain the following transformation theorem.

Theorem 11 (Transformation formula: b, c, d, e ∈ N0).

n∑

k=0

q(n−2k

2 )[

nk

]2[k+bn

k

][n+cn

k

][n+dn

k

][n+en

k

][n+bn

k

][k+cn

k

][k+dn

k

][k+en

k

]

×1 + (1−qn−2k)(2k+2Hk−Hbn+k+Hcn+k+Hdn+k+Hen+k)

=(−1)n[bn−dn

n ][n+bn

n ][n+dnn ]

n∑

`=0

q(n−`)(n−`+dn)[n`

][`+bn

`

][n+dn

`

][`+cn+en+n

`

][`+cn

`

][`+en

`

][`+bn−dn−n

`

] .

We collect the following q-harmonic number identities as consequences.

Example 64 (Theorem 11: b = 0 and c, d, e → ∞).

n∑

k=0

q(n−2k

2 )[

nk

]1 + (1−qn−2k)(2k+Hk)

=

n∑

`=0

(−1)`(q; q)`

[n`

]q(

1+n−`2 ).

Example 65 (Theorem 11: b → ∞ and c = d = e = 0).

n∑

k=0

q(n−2k

2 )[

nk

]51 + (1−qn−2k)(2k+5Hk)

= (−1)n

n∑

`=0

[n`

]2[n + ``

]q(n−`)2 .

Example 66 (Theorem 11: b = 0, c = d = 1 and e → ∞).

n∑

k=0

q(n−2k

2 )[

nk

] [2nk

]2

[n+k

k

]2

1+(1−qn−2k)(2k+Hk+2Hn+k)

=

[2n−1

n

][2nn

]n∑

`=0

(−1)`

[n`

][2n`

][n+`

`

][2n−1

`

]q(1+n−`

2 ).

Example 67 (Theorem 11: b = 0 and c = d = e = 1).

n∑

k=0

q(n−2k

2 )[

nk

] [2nk

]3

[n+k

k

]3

1 + (1 − qn−2k)(2k + Hk + 3Hn+k)

=

[2n−1

n

][2nn

]n∑

`=0

(−1)`[n`

] [2n`

][3n+`

`

][n+`

`

]2[2n−1`

]q(1+n−`

2 ).

Example 68 (Theorem 11: b → ∞ and c = d = e = 1).

n∑

k=0

q(n−2k

2 )[

nk

]2[2nk

]3

[n+k

k

]3

1 + (1−qn−2k)(2k+2Hk+3Hn+k)

=

(−1)n

[2nn

]n∑

`=0

q(n−`)(2n−`)[n`

][2n`

][3n+`

`

][n+`

`

]2 .

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

91

Page 92: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

16 Wenchang Chu and Nancy S. S. Gu

Example 69 (Theorem 11: b → ∞, c = e = 1 and d = 0).

n∑

k=0

q(n−2k

2 )[

nk

]3[2nk

]2

[n+k

k

]2

1 + (1−qn−2k)(2k+3Hk+2Hn+k)

= (−1)n

n∑

`=0

q(n−`)2[n`

]2[3n+`

`

][n+`

`

]2 .

Example 70 (Theorem 11: b → ∞, d = 1 and c = e = 0).

n∑

k=0

q(n−2k

2 )[

nk

]4[2nk

][n+k

k

]1 + (1−qn−2k)(2k+4Hk+Hn+k)

= (−1)n

n∑

`=0

q(n−`)(2n−`)[n`

]2[2n`

][

2nn+`

].

Example 71 (Theorem 11: b = 1 and c = d = e = 0).

n∑

k=0

q(n−2k

2 )[

nk

]5[n+k

k

][2nk

] 1 + (1 − qn−2k)(2k+5Hk−Hn+k)

=

(−1)n

[2nn

]n∑

`=0

q(n−`)2[n`

]2[n + ``

]2

.

Example 72 (Theorem 11: b = 0, c = 1 and d, e → ∞).

n∑

k=0

q(n−2k

2 )[2nk

][2n

n + k

]1 + (1 − qn−2k)(2k + Hk + Hn+k)

=

n∑

`=0

(−1)`[

2nn + `

]q(

1+n−`2 ).

Example 73 (Theorem 11: b = 1 and c, d, e → ∞).

n∑

k=0

q(n−2k

2 )[

nk

][n + k

k

][2n − k

n

]1 + (1−qn−2k)(2k+2Hk−Hn+k)

=n∑

`=0

(−1)`(q; q)`

[n`

][n + `

`

]qn(n−`)+(1+n−`

2 ).

Example 74 (Theorem 11: b = 1, c = 0 and d, e → ∞).

n∑

k=0

q(n−2k

2 )[

nk

]2[n + kk

][2n − k

n

]1 + (1−qn−2k)(2k+3Hk−Hn+k)

=n∑

`=0

(−1)`[n`

][n + `

`

]qn(n−`)+(1+n−`

2 ).

Example 75 (Theorem 11: b = 1, c = d = 0 and e → ∞).

n∑

k=0

q(n−2k

2 )[

nk

]3[n + kk

][2n − k

n

]1+(1−qn−2k)(2k+4Hk−Hn+k)

= (−1)n

n∑

`=0

[n`

]2[n + ``

]q(n−`)2.

5.5. Carrying out the parameter replacements

a → q−x−n

b → q−n−bn

c → q−n−cn

d → q−n−dn

e → q−n−en

where b, c, d, e ∈ N0

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

92

Page 93: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Basic Hypergeometric Series and q-Harmonic Number Identities 17

we can display Watson’s q-Whipple transformation as

n∑

k=0

(1 − qx+n−2k)[nk][

x+nk ][n+bn

k ][n+cnk ][n+dn

k ][n+enk ]

[k−xk ][k+bn−x

k ][k+cn−xk ][k+dn−x

k ][k+en−xk ]

qk(1+3k−3n)+x(n−3k)+(n2)

= (−1)n(1−qx)[x+n

n ][2n+bn+dn−xn ]

[n+bn−xn ][n+dn−x

n ]

n∑

`=0

q`(`−x−n)

[n`

][n+bn

`

][n+dn

`

][`+n+cn+en−x

`

][

`+cn−x

`

][`+en−x

`

][2n+bn+dn−x

`

]

which yields, under the derivative operator D0, the following transformation theorem.

Theorem 12 (Transformation formula: b, c, d, e ∈ N0).

n∑

k=0

qk(1+3k−3n)[

nk

]2[n+bn

k

][n+cn

k

][n+dn

k

][n+en

k

][k+bn

k

][k+cn

k

][k+dn

k

][k+en

k

]

×1 + (1−qn−2k)(3k+2Hk+Hbn+k+Hcn+k+Hdn+k+Hen+k)

=(−1)n

[2n+bn+dn

n

][n+bn

n

][n+dn

n

]n∑

`=0

q`(`−n)−(n2)

[n`

][n+bn

`

][n+dn

`

][n+cn+en+`

`

][`+cn

`

][`+en

`

][2n+bn+dn

`

] .

We collect the following q-harmonic number identities as consequences.

Example 76 (Theorem 12: b, c, d, e → ∞).

n∑

k=0

qk(1+3k−3n)[

nk

]21 + (1 − qn−2k)(3k + 2Hk)

= (−1)n(q; q)n

n∑

`=0

[n`

]q`(`−n)−(n

2).

Example 77 (Theorem 12: b, c, d → ∞ and e = 0).

n∑

k=0

qk(1+3k−3n)[

nk

]31 + 3(1 − qn−2k)(k + Hk)

= (−1)n

n∑

`=0

[n`

](q; q)n

(q; q)`q`(`−n)−(n

2).

Example 78 (Theorem 12: b, e → ∞ and c = d = 0).

n∑

k=0

qk(1+3k−3n)[

nk

]41 + (1 − qn−2k)(3k + 4Hk)

= (−1)n

n∑

`=0

[n`

]2

q`(`−n)−(n2).

Example 79 (Theorem 12: b = c = d = 0 and e → ∞).

n∑

k=0

qk(1+3k−3n)[

nk

]51 + (1 − qn−2k)(3k + 5Hk)

= (−1)n

n∑

`=0

q`(`−n)−(n2)

[n`

]2[2n − `n

].

Example 80 (Theorem 12: b = c = d = e = 0).

n∑

k=0

qk(1+3k−3n)[

nk

]61+3(1−qn−2k)(k+2Hk)

= (−1)n

n∑

`=0

q`(`−n)−(n2)

[n`

]2[n + ``

][2n − `

n

].

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

93

Page 94: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

18 Wenchang Chu and Nancy S. S. Gu

Example 81 (Theorem 12: b = c = d = 1 and e → ∞).

n∑

k=0

qk(1+3k−3n)[

nk

]2[2nk

]3

[n+k

k

]3

1 + (1 − qn−2k)(3k + 2Hk + 3Hn+k)

= (−1)n

[4nn

][2nn

]2

n∑

`=0

[n`

][2n`

]2

[n+`

`

][4n`

]q`(`−n)−(n2).

Example 82 (Theorem 12: b = c = d = e = 1).

n∑

k=0

qk(1+3k−3n)[

nk

]2[2nk

]4

[n+k

k

]4

1 + (1−qn−2k)(3k+2Hk+4Hn+k)

= (−1)n

[4nn

][2nn

]2

n∑

`=0

q`(`−n)−(n2)

[n`

][2n`

]2[3n+``

][4n`

][n+`

`

]2 .

Example 83 (Theorem 12: b = d = 1, c = 0 and e → ∞).

n∑

k=0

qk(1+3k−3n)[

nk

]3[2nk

]2

[n+k

k

]2

1+(1−qn−2k)(3k+3Hk+2Hn+k)

= (−1)n

[4nn

][2nn

]2

n∑

`=0

[n`

][2n`

]2

[4n`

] q`(`−n)−(n2).

Example 84 (Theorem 12: b = 0 and c = d = e = 1).

n∑

k=0

qk(1+3k−3n)[

nk

]3[2nk

]3

[n+k

k

]3

1+3(1−qn−2k)(k+Hk+Hn+k)

= (−1)n

[3nn

][2nn

]n∑

`=0

q`(`−n)−(n2)

[n`

]2[2n`

][3n+`

`

][n+`

`

]2[3n`

] .

Example 85 (Theorem 12: b = d = 0, c = 1 and e → ∞).

n∑

k=0

qk(1+3k−3n)[

nk

]4[2nk

][n+k

k

]1 + (1−qn−2k)(3k+4Hk+Hn+k)

= (−1)n

n∑

`=0

[n`

]2[

2nn+`

][2n`

] q`(`−n)−(n2).

Example 86 (Theorem 12: b = d = 0 and c = e = 1).

n∑

k=0

qk(1+3k−3n)[

nk

]4[2nk

]2

[n+k

k

]2

1+(1−qn−2k)(3k+4Hk+2Hn+k)

= (−1)n

[2nn

] n∑

`=0

q`(`−n)−(n2)

[n`

]3[3n+``

][n+`

`

]2[2n`

] .

Example 87 (Theorem 12: b = c = d = 0 and e = 1).

n∑

k=0

qk(1+3k−3n)[

nk

]5[2nk

][n+k

k

]1+(1−qn−2k)(3k+5Hk+Hn+k)

= (−1)n

[2nn

] n∑

`=0

q`(`−n)−(n2)

[n`

]3[2n+`

`

][n+`

`

][2n`

] .

Example 88 (Theorem 12: b, c, d → ∞ and e = 1).

n∑

k=0

qk(1+3k−3n)[

nk

][2nk

][2n

n + k

]1 + (1−qn−2k)(3k+2Hk+Hn+k)

= (−1)nn∑

`=0

[2n

n + `

](q; q)n

(q; q)`q`(`−n)−(n

2).

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

94

Page 95: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Basic Hypergeometric Series and q-Harmonic Number Identities 19

Example 89 (Theorem 12: b, e → ∞ and c = d = 1).

n∑

k=0

qk(1+3k−3n)[2nk

]2[ 2nn + k

]21+(1−qn−2k)(3k+2Hk+2Hn+k)

= (−1)n

n∑

`=0

[2n`

][2n

n + `

]q`(`−n)−(n

2).

Example 90 (Theorem 12: b, e → ∞, c = 0 and d = 1).

n∑

k=0

qk(1+3k−3n)[

nk

]2[2nk

][2n

n + k

]1+(1−qn−2k)(3k+3Hk+Hn+k)

= (−1)n

n∑

`=0

[n`

][2n`

]q`(`−n)−(n

2).

6. Limiting Relation on finite sums of q-harmonic numbers

Recall the assumption 0 < |q| < 1 in the introduction, that will be invoked in this sectionfor deriving limiting relations. Let Pk(w), Qk(w) be two sequences of polynomials withPk(w) and Qk(w) being of degree k in w and Pk(0) = Qk(0) = 1 (i.e. the constant termbeing equal to one). Suppose that λ, ν, n, k ∈ N0 with k ≤ n. Then there holds the limitingrelation

(6.1) limy→∞

Pλk+ν(q

y)

Qλk+ν(qy)Hny+k(q) −

Pλ(n−k)+ν (qy)

Qλ(n−k)+ν(qy)Hny+n−k(q)

= 0.

To see this, rewrite the left-hand side of (6.1) in two terms

Pλk+ν(qy)

Qλk+ν(qy)Hny+k(q)−

Pλ(n−k)+ν (qy)

Qλ(n−k)+ν(qy)Hny+n−k(q)

=Hny+k(q) −Hny+n−k(q)

Pλ(n−k)+ν (qy)

Qλ(n−k)+ν(qy)

+ Hny+k(q)

Pλk+ν (q

y)

Qλk+ν(qy)−

Pλ(n−k)+ν(qy)

Qλ(n−k)+ν(qy)

.

Observe that bothPλ(n−k)+ν (qy)

Qλ(n−k)+ν(qy)and Hny+k(q) are bounded. More precisely, we have

limy→∞

Pλk+ν (qy)

Qλk+ν(qy)=

Pλk+ν(0)

Qλk+ν(0)= 1 and

∣∣∣ limy→∞

Hny+k(q)∣∣∣ <

∞∑

`=1

|q|`1 − |q| =

|q|(1 − |q|)2

.

They imply further the following two limiting relations

limy→∞

Hny+k(q) −Hny+n−k (q)

= 0 and lim

y→∞

Pλk+ν(q

y)

Qλk+ν(qy)−

Pλ(n−k)+ν (qy)

Qλ(n−k)+ν(qy)

= 0.

From these four relations, the limiting relation displayed in (6.1) follows consequently.

Now we are ready to prove the limiting relation on finite sums of the q-binomial coeffi-cients and the q-harmonic numbers, similar to that in [5, Theorem 13] on classical harmonicnumbers.

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

95

Page 96: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

20 Wenchang Chu and Nancy S. S. Gu

Theorem 13. Let Pk(w), Qk(w) be two polynomial sequences with Pk(w) and Qk(w) beingof degree k in w and Pk(0) = Qk(0) = 1. If fn(k) is a function independent of y whichsatisfies the reflection property fn(k) = −fn(n − k), then there holds the limiting relation:

(6.2) limy→∞

n∑

k=0

fn(k)Pλk+ν(q

y)

Qλk+ν(qy)Hny+k(q) = 0.

Proof. Reversing the summation order and applying the reflection property, we can refor-mulate the finite sum stated in the theorem as

2n∑

k=0

fn(k)Pλk+ν(q

y)

Qλk+ν(qy)Hny+k(q) =

n∑

k=0

fn(k)

Pλk+ν (qy)

Qλk+ν(qy)Hny+k(q) −

Pλ(n−k)+ν (qy)

Qλ(n−k)+ν (qy)Hny+n−k (q)

.

According to (6.1), the last line tends to zero as y → ∞, which confirms (6.2).

There is a large class of functions satisfying the reflection property stated in Theorem 13.In particular for β ∈ Z and α, γ, λ, µ, ν ∈ N0, the following functions

fn(k) = 1 − qn−2k[

nk

]λ[n+αn

k

[k+αn

k

[k+γn

k

[n+γn

k

]ν qk+βk(n−k)

have frequently appeared in the transformations proved in Sections 4 and 5. According to thetheorems numbered from 2 to 12, we have found 90 summation and transformation formulaeon q-binomial coefficients and q-harmonic numbers, that are presented as 90 examples. Eventhough the computations to deduce them are almost routine, Theorem 13 becomes oftenindispensable for simplifying finite q-harmonic number sums, when there exist one or morefree parameters involved tending to infinity.

Now we take the summation formula displayed in Example 52 to illustrate how to deriveq-harmonic number identities from the theorems established in this paper.

First, specifying with b = d = 0 and c = 1, we may state Theorem 10 as the followingtransformation

n∑

k=0

qk(1+k−n)

[2nk

][n+ne

k

][n+k

k

][k+ne

k

]1+(1−qn−2k)(k+Hn+k+Hk+ne)

=

n∑

`=0

(−1)`

[1+n

n

][n`

][2n+ne+`

`

][1+``

][n+`

`

][ne+`

`

] q(1+`2 )−n`.

Then letting e → ∞ and applying Theorem 13, we derive

n∑

k=0

qk(1+k−n)

[2nk

][n+k

k

]

1+(1−qn−2k)(k+Hn+k)

=

n∑

`=0

(−1)`

[1+n

n

][n`

][1+`

`

][n+`

`

]q(1+`2 )−n`.

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

96

Page 97: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Basic Hypergeometric Series and q-Harmonic Number Identities 21

The right-hand side may be expressed in terms of basic hypergeometric series and thenfurther simplified by means of the q-Chu-Vandermonde formula as follows

1−qn+1

1 − q3φ2

[q, q, q−n

q2, qn+1

∣∣∣ q; q

]= lim

ε→1

q2n−qn

1 − ε

2φ1

[ε, q−n−1

qn

∣∣∣ q; q

]− 1

= limε→1

q2n−qn

1 − ε

εn+1 (qn/ε; q)n+1

(qn; q)n+1− 1

= (qn − q2n)1 + n + H2n −Hn−1

.

This confirms the q-harmonic number identity stated in Example 52.

7. Comparison with Classical Harmonic Number Identities

Generally, for a given classical binomial identity, there may exist more than one q-analogue.This phenomenon happens also for harmonic number identities. In order to facilitate refer-ence for the reader, we tabulate the comparison between classical harmonic number identitiesand their q-analogues established respectively in [5] and the present paper. Here the entrynumbers stand for that displayed in the two tables collected in [5] and the example numbersfor the corresponding q-analogues found in this paper. We point out, by the way, that forthe two formulae in Examples 42 and 52, their following common limiting case (the classicalharmonic number identity) has been missed from reference [5]

n∑

k=0

(2nk

)(

n+kk

)1 + (n − 2k)Hn+k

= n

H2n −Hn−1

.

Entry Examples Entry Examples Entry Examples

I-1 1 I-17 22,55,78 II-7 56,66

I-2 4 I-18 24,62,90 II-8 63,75

I-3 2 I-19 25,60,89 II-9 57

I-4 5 I-20 26,40 II-10 58

I-5 3 I-21 27 II-11 70,85

I-6 6 I-22 28 II-12 71

I-7 7 I-23 29,41 II-13 69,83

I-8 8,13,31,54,64 I-24 30 II-14 67

I-9 9,14,20,32,76 I-25 43 II-15 68,81

I-10 11,37,59 I-26 53 II-16 65,79

I-11 12,39,61 II-1 34 II-17 80

I-12 16,49,72 II-2 36 II-18 87

I-13 18,23,50,88 II-3 33,45 II-19 86

I-14 10,17,38,73 II-4 46 II-20 84

I-15 19,51,74 II-5 35,47 II-21 82

I-16 15,21,44,77 II-6 48 Missed 42,52

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

97

Page 98: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

22 Wenchang Chu and Nancy S. S. Gu

Concluding Comments. In the previous paper [5], four classical hypergeometric seriestheorems are examined through the derivative operator method. Following the same scheme,their q-analogues are explored in the present work. Altogether both papers provide a com-prehensive coverage to the identities on the classical and q-harmonic numbers. The authorshope that the summation and tranformation formulae shown in both papers may serve as adocumentary source for further references.

References

[1] G. E. Andrews – K. Uchimura, Identities in combinatorics IV: Differentiation and harmonic num-bers, Utilitas Mathematica 28 (1985), 265–269.

[2] A. T. Benjamin – G. O. Preston – J. J. Quinn, A Stirling encounter with harmonic numbers, Mathe-matics Magazine 75:2 (2002), 95–103.

[3] D. Bradley, Duality for finite multiple harmonic q-series, Discrete Math. 300 (2005), 44–56.[4] W. Chu, A Binomial coefficient identity associated with Beukers’ conjecture on Apery numbers, The

electronic journal of combinatorics 11 (2004), N15.[5] W. Chu – L. De Donno, Hypergeometric series and harmonic number identities, Advances in Applied

Math. 34 (2005), 123–137.[6] G. Gasper – M. Rahman, Basic Hypergeometric Series, Cambridge University Press, Cambridge, 1990.[7] H. W. Gould, Combinatorial Identities, Morgantown, 1972.[8] R. L. Graham – D. E. Knuth – O. Patashnik, Concrete Mathematics, Addison-Wesley Publ. Company,

Reading, Massachusetts, 1989.[9] P. J. Larcombe – E. J. Fennessey – W. A. Koepf, Integral proofs of two alternating sign binomial

coefficients identities, Utilitas mathematica 66 (2004), 93–103.[10] I. Newton, Mathematical Papers Vol. III, D. T. Whiteside ed., Cambridge Univ. Press, London, 1969.[11] P. Paule – C. Schneider, Computer proofs of a new family of harmonic number identities, Adv. in Appl.

Math. 31 (2003), 359–378.

W. CHU, N. GU: q-HARMONIC NUMBER IDENTITIES

98

Page 99: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

SOME RELATIONSHIP BETWEEN THE q-GENOCCHINUMBERS AND BERNSTEIN POLYNOMIALS

N. S. Jung, H. Y. Lee, C. S. Ryoo

Department of Mathematics, Hannam University, Daejeon 306-791, Korea

Abstract : Recently, we introduced some interesting relations between Genocchi number andBernstein polynomials(see [9]). In this paper, we give some interesting identities on the q-Genocchipolynomials and Bernstein polynomials.

Key words : Genocchi numbers and polynomials, q-Genocchi numbers and polynomials, Bernsteinpolynomials

1. Introduction

Throughout this paper, let p be a fixed odd prime number. The symbol, Zp, Qp and Cp denotethe ring of p-adic integers, the field of p-adic rational numbers and the completion of algebraicclosure of Qp. Let N be the set of natural numbers and Z+ = N∪0. As well known definition, the

p-adic absolute value is given by |x|p = p−r where x = pr t

swith (t, p) = (s, p) = (t, s) = 1. When

one talks of q-extension, q is variously considered as an indeterminate, a complex number q ∈ C, ora p-adic number q ∈ Cp. In this paper we assume that q ∈ Cp with |1 − q|p < 1.

We assume that UD(Zp) is the space of the uniformly differentiable function on Zp. Forf ∈ UD(Zp), the fermionic p-adic invariant integral on Zp is defined as follows:

I−1(f) =∫

Zp

f(x)dμ−1(x) = limN→∞

pN−1∑x=0

f(x)(−1)x, see [1, 2] . (1.1)

For n ∈ N, let fn(x) = f(x + n) be translation. As well known equation, by (1.1), we have

I−1(fn) =∫

Zp

f(x + n)dμ−1(x) = (−1)n

∫Zp

f(x)dμ−1(x) + 2n−1∑l=0

(−1)n−1−lf(l). (1.2)

The Genocchi polynomials are defined by the generating function as follows:

2t

et + 1ext =

∞∑n=0

Gn(x)tn

n!. (1.3)

In the special case, x = 0, Gn(0) = Gn are called the n-th Genocchi numbers(see [1-9]).We introduced the q-Genocchi polynomials as follows:

2t

qet + 1ext =

∞∑n=0

Gn,q(x)tn

n!. (1.4)

In the special case, x = 0, Gn,q(0) = Gn,q are called the n-th q-Genocchi numbers.From (1.4), we note that

Gn,q(x) =n∑

l=0

(n

l

)Gl,qx

n−l. (1.5)

99

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2, 99-105, 2012, COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 100: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

From (1.2) and (1.4), for n = 1, we have

t

∫Zp

qye(x+y)tdμ−1(y) =2t

qet + 1ext =

∞∑n=0

Gn,q(x)tn

n!. (1.6)

By (1.6), we obtain

G0,q(x) = 0,

∫Zp

qy(x + y)ndμ−1(y) =Gn+1,q(x)

n + 1, for n ∈ N. (1.7)

Bernstein polynomials of degree n are given by

Bk,n(x) =(

n

k

)xk(1 − x)n−k, where x ∈ [0, 1], n, k ∈ Z+, see [3, 4, 5, 7, 8, 9]. (1.8)

In [1], Kim introduced p-adic extension of Bernstein polynomials as follows:

Bk,n(x) =(

n

k

)xk(1 − x)n−k, where x ∈ Zp and n, k ∈ Z+. (1.9)

In this paper, we give some properties for the q-Genocchi numbers and polynomials. By usingthese properties, we investigate some interesting identities on the Bernstein polynomials and theq-Genocchi polynomials.

2. Some identities on the Bernstein and q-Genocchi polynomials

From (1.6), we can derive the following recurrence formula for the q-Genocchi numbers:

G0,q = 0, and q(Gq + 1)n + Gn,q =

2, if n = 1,

0, if n > 1,(2.1)

with usual convention about replacing (Gq)n by Gn,q,w.

By (1.4), we easily get

∞∑n=0

Gn,q−1(1 − x)(−1)n tn

n!= (−1)

2tq

qet + 1ext = (−1)q

∞∑n=0

Gn,q(x)tn

n!. (2.2)

By (2.2), we obtain the following theorem.

Theorem 1. Let n ∈ Z+. Then we have

Gn,q(x) = (−1)n−1q−1Gn,q−1(1 − x).

From (1.7), we note that

G0,q = 0,

∫Zp

qxxndμ−1(x) =Gn+1,q

n + 1, for n ∈ N. (2.3)

By (2.1), for n ∈ N with n > 1, we have

N. JUNG ET AL: q-GENOCCHI NUMBERS

100

Page 101: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Gn,q(2) = (Gq + 1 + 1)n =n∑

l=0

(n

l

)Gl,q(1)

=1q

n∑l=1

(n

l

)qGl,q(1)

=1q(nqG1,q(1)) +

1q

n∑l=2

(n

l

)Gl,q(1)

=2n

q− 1

q2qGn,q(1)

=2n

q+

1q2

Gn,q.

(2.4)

Therefore, by (2.4), we obtain the following theorem.

Theorem 2. For n ∈ N with n > 1, we have

qGn,q(2) = 2n +1qGn,q.

By (2.3) and Theorem 2, we obtain the following corollary.

Corollary 3. For n ∈ N with n > 1, we have

1q

∫Zp

q−x(x + 2)ndμ−1(x) = 2 + qGn+1,q−1

n + 1.

By (1.7), (2.3) and Corollary 3, we know that

∫Zp

qx(1 − x)ndμ−1(x) = (−1)n

∫Zp

qx(x − 1)ndμ−1(x)

= (−1)n Gn+1,q(−1)n + 1

=1q

Gn+1,q−1,w−1(2)n + 1

=1q

∫Zp

q−x(x + 2)ndμ−1(x)

= 2 + qGn+1,q−1

n + 1

= 2 + q

∫Zp

q−xxndμ−1(x).

Therefore, we obtain the following theorem.

Theorem 4. For n ∈ N with n > 1, we have∫Zp

qx(1 − x)ndμ−1(x) = 2 + q

∫Zp

q−xxndμ−1(x).

In (1.9), we take the fermionic p-adic invariant integral on Zp for one Bernstein polynomials asfollows:

N. JUNG ET AL: q-GENOCCHI NUMBERS

101

Page 102: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

∫Zp

qxBk,n(x)dμ−1(x) =(

n

k

) n−k∑l=0

(n − k

l

)(−1)n−k−l

∫Zp

qxxn−ldμ−1(x)

=(

n

k

) n−k∑l=0

(n − k

l

)(−1)n−k−l Gn−l+1,q

n − l + 1

=(

n

k

) n−k∑l=0

(n − k

l

)(−1)l Gk+l+1,q

k + l + 1, where n, k ∈ Z+.

(2.5)

From the reflection symmetric properties of Bernstein polynomials, we note that

Bk,n(x) = Bn−k,n(1 − x), where n, k ∈ Z+ and x ∈ Zp. (2.6)

For n, k ∈ Z+ with n > k + 1, we have∫Zp

qxBk,n(x)dμ−1(x) =∫

Zp

qxBn−k,n(1 − x)dμ−1(x)

=(

n

k

) k∑l=0

(k

l

)(−1)k−l

∫Zp

qx(1 − x)n−ldμ−1(x)

=(

n

k

) k∑l=0

(k

l

)(−1)k−l

(2 + q

∫Zp

q−xxn−ldμ−1(x)

).

Therefore, we have the following theorem.

Theorem 5. For n, k ∈ Z+ with n > k + 1, we have

∫Zp

qxBk,n(x)dμ−1(x) =(

n

k

) k∑l=0

(k

l

)(−1)k−l

(2 + q

Gn−l+1,q−1,w−1

n − l + 1

).

By (2.5) and Theorem 5, we obtain the following theorem.

Theorem 6. Let n, k ∈ Z+ with n > k + 1. Then we have

n−k∑l=0

(n − k

l

)(−1)l Gk+l+1,q

k + l + 1=

k∑l=0

(k

l

)(−1)k−l

(2 + q

Gn−l+1,q−1,w−1

n − l + 1

).

Let n1, n2, k ∈ Z+ with n1 + n2 > 2k + 1. Then we get∫Zp

qxBk,n1(x)Bk,n2(x)dμ−1(x)

=(

n1

k

)(n2

k

) 2k∑l=0

(2k

l

)(−1)l+2k

∫Zp

qx(1 − x)n1+n2−ldμ−1(x)

=(

n1

k

)(n2

k

) 2k∑l=0

(2k

l

)(−1)l+2k 1

q

∫Zp

q−x(x + 2)n1+n2−ldμ−1(x)

=(

n1

k

)(n2

k

) 2k∑l=0

(2k

l

)(−1)l+2k

(2 + q

∫Zp

q−xxn1+n2−l

dμ−1(x)

).

Therefore, we obtain the following theorem.

N. JUNG ET AL: q-GENOCCHI NUMBERS

102

Page 103: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Theorem 7. For n1, n2 k ∈ Z+ with n1 + n2 > 2k + 1, we have∫Zp

qxBk,n1(x)Bk,n2(x)dμ−1(x)

=(

n1

k

)(n2

k

) 2k∑l=0

(2k

l

)(−1)l+2k

(2 + q

Gn1+n2−l+1,q−1,w−1

n1 + n2 − l + 1

).

By simple calculation, we easily see that

∫Zp

qxBk,n1(x)Bk,n2(x)dμ−1(x)

=(

n1

k

)(n2

k

) n1+n2−2k∑l=0

(−1)l

(n1 + n2 − 2k

l

) ∫Zp

qxxl+2kdμ−1(x)

=(

n1

k

)(n2

k

) n1+n2−2k∑l=0

(−1)l

(n1 + n2 − 2k

l

)Gl+2k+1,q

l + 2k + 1, where n1, n2, k ∈ Z+.

(2.7)

Therefore, by (2.7) and Theorem 7, we obtain the following theorem.

Theorem 8. Let n1, n2, k ∈ Z+ with n1 + n2 > 2k + 1. Then we have

2k∑l=0

(2k

l

)(−1)l+2k

(2 + q

Gn1+n2−l+1,q−1,w−1

n1 + n2 − l + 1

)

=n1+n2−2k∑

l=0

(−1)l

(n1 + n2 − 2k

l

)Gl+2k+1,q

l + 2k + 1.

For n1, n2, n3, k ∈ Z+ with n1 + n2 + n3 > 3k + 1, by the symmetry of Bernstein polynomials,we see that∫

Zp

qxBk,n1(x)Bk,n2(x)Bk,n3(x)dμ−1(x)

=(

n1

k

)(n2

k

)(n3

k

) 3k∑l=0

(3k

l

)(−1)l+3k

∫Zp

qx(1 − x)n1+n2+n3−ldμ−1(x)

=(

n1

k

)(n2

k

)(n3

k

) 3k∑l=0

(3k

l

)(−1)l+3k 1

wqh

∫Zp

q−hxw−x(x + 2)n1+n2+n3−ldμ−1(x)

=(

n1

k

)(n2

k

)(n3

k

) 3k∑l=0

(3k

l

)(−1)l+3k

(2 + q

∫Zp

q−hxw−xxn1+n2+n3−ldμ−1(x)

).

Therefore, we have the following theorem.

Theorem 9. For n1, n2, n2, k ∈ Z+ with n1 + n2 + n3 > 3k + 1, we have∫Zp

qxBk,n1(x)Bk,n2(x)Bk,n3(x)dμ−1(x)

=(

n1

k

)(n2

k

)(n3

k

) 3k∑l=0

(3k

l

)(−1)l+3k

(2 + q

Gn1+n2+n3−l,q−1,w−1

n1 + n2 + n3 − l + 1

).

N. JUNG ET AL: q-GENOCCHI NUMBERS

103

Page 104: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

In the same manner, multiplication of three Bernstein polynomials can be given by the followingrelation: ∫

Zp

qxBk,n1(x)Bk,n2(x)Bk,n3(x)dμ−1(x)

=(

n1

k

)(n2

k

)(n3

k

) n1+n2+n3−3k∑l=0

(−1)l

(n1 + n2 + n3 − 3k

l

) ∫Zp

qxxl+3kdμ−1(x)

=(

n1

k

)(n2

k

)(n3

k

) n1+n2+n3−3k∑l=0

(−1)l

(n1 + n2 + n3 − 3k

l

)Gl+3k+1,q

l + 3k + 1,

where n1, n2, n3, k ∈ Z+ with n1 + n2 + n3 > 3k + 1.

Therefore, by Theorem 9, we obtain the following theorem.

Theorem 10. Let n1, n2, n3, k ∈ Z+ with n1 + n2 + n3 > 3k + 1. Then we have

3k∑l=0

(3k

l

)(−1)l+3k

(2 + q

Gn1+n2+n3−l+1,q−1,w−1

n1 + n2 + n3 − l + 1

)

=n1+n2+n3−3k∑

l=0

(−1)l

(n1 + n2 + n3 − 3k

l

)Gl+3k+1,q

l + 3k + 1.

Using the above theorem and mathematical induction, we have the following theorem.

Theorem 11. Let m ∈ N. For n1, n2, . . . , nm, k ∈ Z+ with n1 + · · · + nm > mk + 1, themultiplication of the sequence of Bernstein polynomials Bk,n1(x), . . . , Bk,nm

(x) with different degreesunder fermionic p-adic invariant integral on Zp can be given as

∫Zp

qx

(m∏

i=1

Bk,ni(x)

)dμ−1(x)

=

(m∏

i=1

(ni

k

))mk∑l=0

(−1)l+mk+1

(2 + q

Gn1+···+nm−l+1,q−1,w−1

n1 + · · · + nm − l + 1

).

We also easily see that

∫Zp

qx

(m∏

i=1

Bk,ni(x)

)dμ−1(x)

=

(m∏

i=1

(ni

k

))n1+···+nm−mk∑

l=0

(n1 + · · · + nm − mk

l

)(−1)l Gl+mk+1,q

l + mk + 1.

(2.8)

By Theorem 11 and (2.8), we have the following corollary.

Corollary 12. Let m ∈ N. For n1, n2, . . . , nm, k ∈ Z+ with n1 + · · · + nm > mk + 1, we have

mk∑l=0

(−1)l+mk

(2 + q

Gn1+···+nm−l+1,q−1,w−1

n1 + · · · + nm − l + 1

)

=n1+···+nm−mk∑

l=0

(n1 + · · · + nm − mk

l

)(−1)l Gl+mk+1,q

l + mk + 1.

N. JUNG ET AL: q-GENOCCHI NUMBERS

104

Page 105: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

References

[1] T. Kim, Some identities on the q-Euler polynomials of higher order and q-Stirling numbersby the fermionic p-adic integral on Zp, Russian Journal of Mathematical physics, 16 (2009),484-491.

[2] T. Kim, Note on the Euler numbers and polynomials, Adv. Stud. Contemp. Math, 17 (2008),131-136.

[3] T.Kim, L.C. Jang, H. Yi, A note on the modified q-Bernstein polynomials, Discrete Dynamicsin Nature and Society, 2010 (2010), Article ID 706483, 12pp.

[4] Y. Simsek, M. Acikgoz, A new generating function of q-Bernstein-type polynomials and theirinterpolation function, Abstract and Applied Analysis, 2010 (2010), Article ID 769095, 12pp.

[5] L. C. Jang, W.-J. Kim, Y. Simsek, A study on the p-adic integral representation on Zp as-sociated with Bernstein and Bernoulli polynomials, Advances in Difference Equations, 2010(2010), Article ID 163217, 6pp.

[6] T. Kim, J. Choi, Y. H. Kim, C. S. Ryoo, On the fermionic p-adic integral representation ofBernstein polynomials associated with Euler numbers and polynomials, J. Inequal. Appl., 2010(2010), Art ID 864247, 12pp.

[7] C. S. Ryoo, On the generalized Barnes type multiple q-Euler polynomials twisted by ramifiedroots of unity, Proc. Jangjeon Math. Soc., 13 (2010), 255-263.

[8] C. S. Ryoo, Some relations between twisted q-Euler numbers and Bernstein polynomials, Adv.Stud. Contemp. Math., 21 (2011), 217-233.

[9] H. Y. Lee, N. S. Jung, C. S. Ryoo, Some identities of the Genocchi numbers and polynomialsassociated with Bernstein polynomials, to appear in J. Appl. Math. & Informatics.

N. JUNG ET AL: q-GENOCCHI NUMBERS

105

Page 106: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

SOME THEOREMS IN CONE METRIC

SPACES

Duran Turkoglu, Muhib Abuloha, Thabet Abdeljawad

Department of Mathematics, Faculty of Science and Arts, Gazi University, 06500,Ankara-Turkey. [email protected].

Department of Mathematics, Institute of Science and Technology, Gazi University,06500, Ankara-Turkey. [email protected].

Department of Mathematics and Computer Science, ankaya University, 06530Ankara-Turkey. [email protected].

Abstract

In this paper, some topological concepts and definitions are generalized to conemetric spaces. The distance between two sets in cone metric spaces is defined,where some examples are given. Moreover, it is proved that every cone metric spaceis a T2−space and that Baire’s category theorem is still valid in cone metric spaces.Regarding, the theory of linear operators in cone normed spaces, we defined boundedlinear operators and scalar bounded linear operators. Examples are given to showthat not necessarily all linear operators are bounded on finite dimensional conenormed spaces and to show that not every continuous linear operator between conenormed spaces is bounded.

Key words: Cone metric, cone normed, cone Banach, strongly minihedral,absolute value function, Meager (the first category), Nonmeager ( the secondcategory), Baire’s category theorem, monotonic, semi-monotonic, linear operator,scalar bounded, continuous.

1 Introduction and Preliminaries

Cone metric spaces were first introduced in [4], where the authors describedconvergence in cone metric spaces and introduced completeness. Furthermore,in [1,5,7,13,14], they proved some common fixed point theorems in cone metricspaces. In [2], the authors introduced some generalized topological conceptsand definitions in cone metric spaces and proved that every cone metric spaceis topological space as well as they proved some fixed point theorems in di-ametrically contractive mappings in cone metric spaces. Furthermore, cone

Preprint submitted to Elsevier 28 April 2010

106

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2,106-116,2012, COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 107: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

metric spaces were studied by many authors (see [6,8–12] ). However, in thispaper, some topological concepts and definitions are generalized to cone met-ric spaces. We defined the distance between two sets in cone metric spacessupported by examples. Moreover, it is proved that every cone metric spaceis a T4 − space. Also to prove Baire’s category theorem in cone metric space,we defined the first category (Meager) and the second category (nonmeager).We also defined the cone normed space and proved that each cone normedspace is a cone metric space. Furthermore, we defined cone Banach space andwe gave an example about that and we defined the absolute value functionand scalar bounded linear operator in cone metric spaces as well. Finally, wegeneralized bounded linear operators between two cone normed spaces and byan example showed that not necessarily all linear operators are bounded onfinite dimensional cone normed spaces and to show that not every continuouslinear operator between cone normed spaces is bounded.

Let E be a real Banach space and P a subset of E. Then, P is called a coneif and only if

P1) P is closed, non empty and P 6= 0

P2) a, b ∈ R a, b ≥ 0; x, y ∈ P ⇒ ax+ by ∈ P

P3) x ∈ P and −x ∈ P ⇒ x = 0

Given a cone P ⊂ E, we define a partial ordering ≤ with respect to P byx ≤ y if and only if y − x ∈ P. We write x < y to indicate that x ≤ y butx 6= y, while x << y will stand for y − x ∈ IntP. (IntP ∼= interior of P ).

The cone P is called normal if there is a number K > 0, such that for allx, y ∈ E, 0 ≤ x ≤ y ⇒ ‖ x ‖≤ K ‖ y ‖, where K is called the normal constantof P.

The cone P is called regular if every increasing sequence which is boundedfrom above is convergent. That is if xn is sequence such that x1 ≤ x2 ≤... ≤ xn ≤ y for some y ∈ E, then there is x ∈ E such that ‖ xn − x ‖→ 0 asn→∞.

Equivalently the cone P is called regular if every decreasing sequence which isbounded from below is convergent[4]. Throughout this article we assume thatthe cone P is normal with constant K.

P is called minihedral cone if supx, y exists for all x, y ∈ E, and stronglyminihedral if every subset of E which is bounded from above has a supremumand hence any subset of E which is bounded from below has an infimum . Anorm ‖ . ‖ on E is called monotonic if 0 ≤ x ≤ y implies ‖ x ‖≤‖ y ‖, andsemi-monotonic if ‖ x ‖≤ K ‖ y ‖ for some K > 0 and all x and y such

2

D. TURKOGLU ET AL: CONE METRIC SPACES

107

Page 108: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

that 0 ≤ x ≤ y [3]. It is know by [3] that P is normal if and only if ‖ . ‖ issemi-monotonic.

Throughout this article we assume that P is a cone in E with IntP 6= ∅and ≤ is partial ordering with respect to P. We also appeal to the followingrelations:

IntP + IntP ⊂ IntP and λIntP ⊂ IntP, λ > 0

2 Cone Metric Spaces and Baire’s Category Theorem

Definition 1 [4] A cone metric space is an ordered pair (X, d), where Xany set and d : X × X → E is a mapping satisfying: d1) 0 < d(x, y) for allx, y ∈ X, and d(x, y) = 0 if and only if x = y. d2) d(x, y) = d(y, x) for allx, y ∈ X. d3) d(x, y) ≤ d(x, z) + d(z, y) for all x, y, z ∈ X.

Example 2 Let E = Rn and P = (x1, x2, ..., xn) ∈ Rn : xi ≥ 0, i = 1, 2, 3, ..., nwith x = (x1, x2, ..., xn) ≤ y = (y1, y2, ..., yn) if and only if (yi − xi) ≥ 0 forall i = 1, 2, 3, ..., n. Then any subset of P has an infimum.

Definition 3 Let A 6= ∅ and B 6= ∅ be two subset of a cone metric space(X, d) . Then the distance between A and B, denoted by d (A,B) , is definedby d (A,B) = inf d (x, y) : x ∈ A, y ∈ B . If A = a , we write d(a,B) ford(A,B).

Example 4 Let E = R2 and P = (x, y) : x ≥ 0, y ≥ 0 . Define d : R2 ×R2 → E by d((x1, x2), (y1, y2)) = (| x1 − y1 |, | x2 − y2 |) and let A =(x, y) ∈ R2 : 0 ≤ x ≤ 1, 0 ≤ y ≤ 1 , B = (x, y) ∈ R2 : 2 ≤ x ≤ 3, 0 ≤ y ≤ 1 ,C = (0, 0) , D =

(12, 1

2

). Then d(A,B) = (1, 0) , d(A,C) = (0, 0) ,

d(C,B) = (2, 0) .

Example 5 Let E = R2 and P = (x, y) : x ≥ 0, y ≥ 0 . Define d : R2 ×R2 → E by d((x1, x2), (y1, y2)) = (| x1 − y1 |, | x2 − y2 |) and let A =(x, y) ∈ R2 : 0 ≤ x ≤ 1, 2 ≤ y ≤ 3 , B = (x, y) ∈ R2 : 3 ≤ x ≤ 4, 0 ≤ y ≤ 3 .Then d(A,B) = (2, 1) .

Lemma 6 Let c1, c2 ∈ P such that c1 < c2 + s for all s >> 0. Then c1 ≤ c2.

Proposition 7 (see prop.(1) in [2]) Every cone metric space (X, d) is a firstcountable topological space, whose topology τc is given by

τc = U ⊂ X : ∀x ∈ U, ∃c >> 0 such that B(x, c) ⊂ U ∪ ∅ (1)

where

3

D. TURKOGLU ET AL: CONE METRIC SPACES

108

Page 109: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

B(x, c) = y ∈ X : d (x, y) << c (2)

Theorem 8 Let (X, d) be a cone metric space and A 6= ∅ a subset of X.Then x ∈ A if and only if d (x,A) = 0.

PROOF. Suppose x ∈ A. Then, for fixed c >> 0 and each n ∈ N, B(x,c

n

)∩

A 6= ∅. Therefore, for each n ∈ N there exists an ∈ A such that 0 ≤ d (x,A) ≤d (x, an) <

c

n. Hence,

c

n− d(x,A) ∈ P , for all n ∈ N. That P is closed implies

that −d(x,A) ∈ P and our conclusion then is that d (x,A) = 0. Conversely,

d(x,A) = 0 <c0n

for all n ∈ N and some c0 >> 0 implies the existence of a

sequence an ∈ A such that d(x, an) <c0n

for all n ∈ N. Since P is a closed

cone then we conclude that − limn→∞ d(x, an) ∈ P, limn→∞ d(x, an) ∈ Pand hence limn→∞ d(x, an) = 0. Now let c >> 0 be given and choose δ > 0such that ‖b‖ < δ implies that b << c. Since limn→∞ d(x, an) = 0 then forsome n0 ∈ N and all n > n0 we have ‖d(x, an)‖ < δ and so d(x, an) << cfor all n > n0. Thus, an → x in (X, d). Since every cone metric space is firstcountable topological space then x ∈ A.

As a consequence of the above Theorem, if a subset A of a cone metric space(X, d) is closed and x /∈ A, then d (x,A) > 0.

Theorem 9 Every cone metric space (X, d) is a T2 − space.

PROOF. Let x 6= y be two points in X. Suppose B(x,c

2) ∩ B(y,

c

2) = ∅ for

all c >> 0, then by the triangle inequality d(x, y) ≤ c for all c >> 0. Hence

d(x, y) ≤ c0n

for all n ∈ N and some c0 >> 0. Since P is a closed cone then

d(x, y) = 0 and so x = y which is a contradiction.

Definition 10 A subset M of a topological space (X, τc) is called: (I) Rare(nowhere dense) in X if Int(M) = ∅. (II) Meager (the first category) in Xif M is the union of countably many sets each of which is rare in X.(III)Nonmeager (second category) in X if M is not meager in X.

Lemma 11 [4]Let (X, d) be a cone metric space, P be a normal cone withnormal constant K. Let xn and yn be two sequences in X and yn → y,xn → x as (n→∞), then d(xn, yn)→ d(x, y) as n→∞.

Lemma 12 Let (X, d) be a cone metric space. If an ∈ E such that b ≤ an forall n and an → a then b ≤ a.

4

D. TURKOGLU ET AL: CONE METRIC SPACES

109

Page 110: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Theorem 13 (Baire’s Category Theorem in Cone Metric Space) Ev-ery complete nonempty cone metric space (X, d) is nonmeager in itself. HenceX = ∪∞k=1Mk, Mk closed, then at least one Mk contains a nonempty open sub-set.

PROOF. Suppose the complete cone metric space (X, d) were first category.Then X = ∪∞k=1Mk with each Mk rare in X, we can shall construct a Cauchysequence xk in X whose limit x (which exists by completeness) is no Mk

and get a contradiction. By assumption, M1 is rare in X, so that by defi-nition, M1 does not contain a nonempty open set. But X does have. Thisimplies that M1 6= X. Hence choose x1 ∈ M1

cand an open ball about it,

say B1 = B(x1, c1) = M1c

with c1 <c

2where c ∈ IntP is some fixed point.

By assumption, M2 is rare in X, so M2 does not contain a nonempty open

set. Hence, it does not contain the open ball B(x1,c12

). This implies that

M2c ∩ B(x1,

c12

) is not empty and open, so that we may choose an open ball

in this set say, B2 = B(x2, c2) ⊂ M2c ∩ B(x1,

c12

), c2 <c12. By induction

we thus construct a sequence of balls, Bk = B(xk,ck2

), ck <c

2ksuch that

Bk ∩Mk = ∅ and Bk+1 ⊂ B(xk,ck2

) ⊂ Bk, k = 1, 2, 3, ... . Since ck <c

2kthe

sequence xk of the centers is Cauchy and hence converges, say xk → x ∈ Xbecause X is complete by assumption. Also, for every m and n > m we have

Bn ⊂ B(xm,cm2

), so that d(xm, x) ≤ d(xm, xn) + d(xn, x) <cm2

+ d(xn, x).

Since xn → x, then we havec0n

+cm2− d(xm, x) ∈ P for all n ∈ N and some

c0 >> 0. Since P is a closed cone we conclude thatcm2− d(xm, x) ∈ P and so

x ∈ Bm for every m. Since Bm ⊂ Mmc, we now see that x /∈ Mm for every

m, so that x /∈ X = ∪∞m=1Mm. This contradicts that x ∈ X.

3 Cone Normed Spaces

Definition 14 (see also [15], [16]) A cone normed space is an ordered pair(X, ‖ . ‖c) where X is a vector space over R and ‖ . ‖c: X → E is a functionsatisfying:

C1) 0< ‖ x ‖c, for all x ∈ X.C2) ‖ x ‖c= 0 if and only if x = 0.

C3) ‖ α.x ‖c=| α |‖ x ‖c, for each x ∈ X and α ∈ R.C4) ‖ x+ y ‖c≤‖ x ‖c + ‖ y ‖c, x, y ∈ X.

5

D. TURKOGLU ET AL: CONE METRIC SPACES

110

Page 111: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Proposition 15 Each cone normed space is cone metric space. Namely, d :X ×X → E is defined by d(x, y) =‖ x− y ‖c .

PROOF. for all x, y, z ∈ X

d1) d(x, y) = 0 if and only if ‖ x−y ‖c= 0 if and only if x−y = 0⇔ x = y.

d2) d(x, y) = ‖ x− y ‖c= ‖ −(y − x) ‖c by (C3) ‖ y − x ‖c= d(y, x).

d3) d(x, y) =‖ x − y ‖c=‖ x − z + z − y ‖c by (C4) ‖ x − z + z − y ‖c≤‖x− z ‖c + ‖ z − y ‖c= d (x, z) + d (z, y).

Remark 16 Convergence in cone normed space is described by the cone met-ric induced by the norm. For example, a sequence xn ∈ X is said to con-verge to an element x ∈ X, if for all c >> 0 there exists n0 such thatd(xn, x) =‖ xn − x ‖c<< c for all n > n0. Hence, by [4], when the coneis normal, a sequence xn → x if and only if ‖ d(xn, x) ‖=‖‖ xn − x ‖c‖→ 0as n→∞.

Definition 17 A sequence xn ∈ X is called Cauchy sequence if for all c >> 0there exists n0 such that d(xn, xm) =‖ xn − xm ‖c<< c for all m,n > n0.Equivalently by [4] if lim

m,n→∞‖ d(xn, xm) ‖= lim

m,n→∞‖‖ xn − xm ‖c‖= 0.

Definition 18 A cone normed space (X, ‖ . ‖c) is called cone Banach spaceif every Cauchy sequence in X convergent in X.

Example 19 Let (E, ‖ . ‖c), E = R2, P = (x, y) : x ≥ 0, y ≥ 0 . Thefunction ‖ . ‖c defined by ‖ (x, y) ‖c= (α | x |, β | y |), α, β > 0 is a conenorm space and cone Banach space. Indeed,

C1) ‖ (x, y) ‖c> 0, ‖ (x, y) ‖c= 0 ⇔ (α | x |, β | y |) = (0, 0) ⇔ α | x |= 0and β | y |= 0⇔ x = 0, y = 0 ⇔ (x, y) = (0, 0).

C2) ‖ a(x, y) ‖c=‖ (ax, ay) ‖c= (α | ax |, β | ay |) =| a | (α|x|, β|y|) =| a | . ‖(x, y) ‖c .

C3) ‖ (x, y) + (z, w) ‖c=‖ x+ z, y + w ‖c= (α | x+ z |, β | y + w |) ≤ (α | x |+α | z |, β | y | +β | w |) = (α | x |, β | y |) + (α | z |, β | w |) = ‖ (x, y) ‖c +‖ (z, w) ‖c .

This space is complete and hence cone Banach. Let zn = (xn, yn) ∈ R2 be aCauchy sequence.

6

D. TURKOGLU ET AL: CONE METRIC SPACES

111

Page 112: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Hence by Lemma 4 in [4],

limm,n→∞

‖‖ zn − zm ‖c‖= limm,n→∞

‖‖ xn − xm, yn − ym ‖c‖=

limm,n→∞

‖ (α | xn−xm |, β | yn−ym |) ‖= limm,n→∞

√α2 | xn − xm |2 +β2 | yn − ym |2 = 0.

Therefore, | xn − xm |→ 0, | yn − ym |→ 0 as n,m→∞ and hence xn andyn are Cauchy sequence in the field R. Find x, y ∈ R such that | xn−x |→ 0, | yn − y |→ 0 as n→∞.

We shall show that zn = (xn, yn)→ z = (x, y) in cone norm space and hence(R2, ‖ . ‖c) is complete. lim

n→∞‖‖ zn − z ‖c‖= lim

n→∞‖‖ (xn − x, yn − y) ‖c‖=

limn→∞

‖ (α | xn − x |, β | yn − y |‖= limn→∞

√α2 | xn − x |2 +β2 | yn − y |2 = 0.

Proposition 20 Every cone normed space is topological space.

The result follows by [2] since each cone normed space is cone metric space.Actually, the topology is given by

τc = U ⊂ X : ∀x ∈ U, ∃c >> 0 such that B(x, c) ⊂ U ∪ Φ (3)

whereB(x, c) = y ∈ X :‖ x− y ‖c<< c (4)

Proposition 21 The cone metric d induced by a cone norm on a cone normedspace satisfies :

d (x+ a, y + a) = d (x, y) (5)

d (αx, αy) =| α | d (x, y) (6)

for all x, y, a ∈ X and every scalar α.

PROOF. We have d (x+ a, y + a) =‖ x+ a− (y+ a) ‖c=‖ x− y ‖c= d (x, y)and d (αx, αy) =‖ αx− αy ‖c=| α |‖ x− y ‖c=| α | d (x, y) .

Definition 22 The absolute value function abs : E → E is defined by:

abs(a) =

a a ≥ 0

−a a < 0

0 otherwise

(7)

Note that if a < 0 then −a > 0 and abs(a) ∈ P.

7

D. TURKOGLU ET AL: CONE METRIC SPACES

112

Page 113: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Definition 23 A cone norm ‖ . ‖n: E → P is said to satisfy the property (A)if : −c ≤ a ≤ c if and only if ‖ a ‖n≤ c, for all a ∈ E and c >> 0.

Example 24 Let E = R2 and P = (x, y) ∈ R2 : x ≥ 0, y ≥ 0 . Then thenorm ‖ . ‖n: E → P defined by ‖ (x, y) ‖n= (| x |, | y |) , satisfies the property(A). Indeed a = (x, y) , satisfies ‖ a ‖n≤ c = (c1, c2) , c1, c2 > 0 if and only if(| x |, | y |) ≤ (c1, c2) if and only if −c = (−c1,−c2) ≤ a = (x, y) ≤ (c1, c2) =c. Also it can be easily seen that ‖ . ‖n is monotonic on P (i.e. 0 ≤ a ≤ bimplies ‖ a ‖n≤ ‖ b ‖n).

Remark 25 Using (C4) and that E is normal cone with constant K, we canshow that

‖ abs(‖ y ‖c − ‖ x ‖c) ‖≤ K ‖‖ x− y ‖c‖ . ∀x, y ∈ X (8)

Indeed, ‖ x ‖c=‖ x−y+y ‖c≤‖ x−y ‖c + ‖ y ‖c and ‖ y ‖c=‖ y−x+x ‖c≤‖y − x ‖c + ‖ x ‖c, hence, ‖ x ‖c − ‖ y ‖c≤‖ x − y ‖c and ‖ y ‖c − ‖x ‖c≤‖ x− y ‖c . But then 0 ≤ abs(‖ y ‖c − ‖ x ‖c) ≤‖ x− y ‖c implies that‖ abs(‖ y ‖c − ‖ x ‖c) ‖≤ K ‖‖ x − y ‖c‖ . Furthermore, if ‖ . ‖n is a conenorm on E with the property (A) then ‖‖‖ x ‖c − ‖ y ‖c‖n‖≤ K ‖‖ x−y ‖c‖ .

For more examples of cone normed spaces and the completion of cone normedspaces see [15] and [16], respectively.

4 Bounded Linear Operators Between Cone Normed Spaces

Definition 26 A linear operator T : (X, ‖ . ‖c1) → (Y, ‖ . ‖c2) between conenormed spaces over the same cone P in E, is called : (a) Bounded if thereexists M > 0 such that for all x ∈ X,

‖ Tx ‖c2≤M ‖ x ‖c1 (9)

(b) Scalar bounded if there exists L > 0 such that for all x ∈ X,

‖‖ Tx ‖c2‖≤ L ‖‖ x ‖c1‖ (10)

When T is scalar bounded, we define its scalar norm by

‖ T ‖s= inf L > 0 :‖‖ Tx ‖c2‖≤ L ‖‖ x ‖c1‖, ∀x ∈ X (11)

8

D. TURKOGLU ET AL: CONE METRIC SPACES

113

Page 114: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

From the above definition it easy to see that every bounded linear operatorbetween cone normed spaces is scalar bounded with L = MK and K is thenormal constant of the cone P in E and

‖ T ‖s= sup06=x∈X

‖‖ Tx ‖c2‖‖‖ x ‖c1‖

(12)

Proposition 27 If the norm ‖ . ‖ on E is monotonic or the normal constantK = 1, then (X, ‖‖ . ‖c1‖) is a normed linear space.

PROOF. If ‖ x+ y ‖c1≤‖ x ‖c1 + ‖ y ‖c1 , then monotonicity of ‖ . ‖ impliesthat ‖ ‖ x+y ‖c1‖≤‖‖ x ‖c1 + ‖ y ‖c1‖≤‖‖ x ‖c1‖ + ‖‖ y ‖c1‖ and the triangleinequality follows. The other axioms for the norm are trivially satisfied.

Remark 28 If ‖ . ‖ is monotonic on E then we call the above normed space(X, ‖‖ . ‖c1‖), the normed space associated to the cone normed space ( X, ‖. ‖c1)

Definition 29 A map T : (X, ‖ . ‖c1) → (Y, ‖ . ‖c2) is called continuous atx0 ∈ X, if for all q ∈ E with q >> 0 there exists p ∈ E, p >> 0 such that forall x ∈ X, ‖ x− x0 ‖c1< p implies ‖ Tx− Tx0 ‖c2< q. T is called continuous,if it is continuous at each x ∈ X.

Theorem 30 If T : (X, ‖ . ‖c1) → (Y, ‖ . ‖c2) is a bounded linear operatorthen it is continuous.

PROOF. Assume T is bounded and let x0 ∈ X then there exists M > 0 such

that ‖ Tx ‖c2≤ M ‖ x ‖c1 for all x ∈ X. Now for q >> 0, choose p =1

Mq.

Then, x ∈ X, ‖ x− x0 ‖c1< p implies ‖ Tx− Tx0 ‖c2=‖ T (x− x0) ‖c2≤ M ‖x− x0 ‖c1< M

q

M= q.

Linear operators on finite dimensional normed linear spaces are necessarybounded. However, in general, it is not the case for cone normed spaces. Also,the converse of the above theorem may not be true.

Example 31 Let E = R2 and P = (x, y) ∈ R2 : x ≥ 0, y ≥ 0 and X = E.Define on E the cone norm ‖ (x, y) ‖c= (| x |, | y |) . Then ,

(a) the linear operator T : (E, ‖ . ‖c) → (E, ‖ . ‖c) define by T (x, y) =(x− y, y − x) is not bounded. Indeed, for any m > 0, m 6= 1, let xm =(

1

m,m), then for m > 1, we have ‖ Txm ‖c=‖

(m− 1

m,

1

m−m

)‖c=

9

D. TURKOGLU ET AL: CONE METRIC SPACES

114

Page 115: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

(m− 1

m,m− 1

m

)is not comparable to m. ‖ (

1

m,m) ‖c= (1,m2) , and

for 0 < m ≤ 1, let x=(1,−1) then ‖ Tx ‖c=‖ (2,−2) ‖c= (2, 2) ≥ m. ‖(1,−1) ‖c= (m,m) .

(b) The linear operator T in (a) is continuous. Since cone metric spaces arefirst countable [2], in order to prove continuity of T, it will be enough to showthat it is sequentially continuous. To this end assume that zn = (xn, yn) isa sequence in E such that zn → z = (x, y) . Then, by Lemma (1) in [4],lim

n→∞‖ d (zn, z) ‖= lim

n→∞‖‖ zn − z ‖c‖= lim

n→∞‖ (| xn − x |, | yn − y |) ‖= 0.

Equivalently, if | xn−x |→ 0 and | yn−y |→ 0. But then, 0 ≤‖ Tzn−Tz ‖c=‖(xn − yn, yn − xn)−(x− y, y − x) ‖c=‖ (xn − yn − x+ y, yn − xn − y + x) ‖c=(| (xn − yn − x+ y |, | yn − xn − y + x |) ≤

(| xn − x | + | y − yn |, | yn − y | + | x− xn |) implies,

0 ≤‖‖ Tzn−Tz ‖c‖≤√

(| xn − x | + | yn − y |)2 + (| yn − y | + | x− xn |)2 →0, hence ‖‖ Tzn − Tz ‖c‖→ 0, that is Tzn → Tz.

(c) It can be easily shown that any linear operator on E represented by a diag-onal matrix is bounded. For example, if T is defined by T (x, y) = (αx, βy) ,α, β ∈ R, then ‖ T (x, y) ‖c≤ max | α |, | β | . ‖ (x, y) ‖c .

Theorem 32 If the norm of E is monotonic. Then any linear operator on afinite dimensional cone normed space is scalar bounded.

PROOF. Let (X, ‖ . ‖c1) be a finite dimensional cone normed space over acone P in E with a monotonic norm ‖ . ‖, and (Y, ‖ . ‖c2) an arbitrarycone normed space over the same cone. Then any linear operator T from Xinto Y is bounded if treated as a linear operator between the normed linearspaces (X, ‖‖ . ‖c1‖) , (Y, ‖‖ . ‖c2‖) . But bounded linear operators betweenthese two normed spaces are exactly scalar bounded operators from (X, ‖ . ‖c1)into (Y, ‖ . ‖c2) .

Acknowledgements

The research has been supported by The Scientific and Technological Re-search Council of Turkey (TUBITAK-Turkey).

10

D. TURKOGLU ET AL: CONE METRIC SPACES

115

Page 116: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

References

[1] D. Ilic, V. Rakocevic. Common Fixed Points For Maps on Cone Metric Space.J. Math. Anal. Appl. 341, 2, 876-882 (2008).

[2] D. Turkoglu, M. Abuloha. Cone Metric Spaces and Fixed Point Theorems inDiametrically Contractive Mappings. Acta Mathematica Sinica, English Series.,26, 3 489-496 (2010).

[3] K.Deimling. Nonlinear Functional Analysis. Springer-Verlage , 1985.

[4] L.G. Huang, X. Zhang. Cone Metric Spaces and Fixed Point Theorems ofContractive Mappings. J. Math. Anal. Appl., 332, 1468-1476, 2007.

[5] M. Abbas, G. Jungck. Common Fixed Point Results For Non CommutingMappings Without Continuity In Cone Metric Spaces. J. Math. Anal. Appl.341, 1, 416-420 (2008).

[6] R. Raja, S. M. Vaezpour, Some Extensions of Banach‘s Contraction Principlein Complete Cone Metric Spaces. Fixed Point Theory and Applications, (2008),Art. ID 768294, 11pp..

[7] Pasquale Vetro, Common Fixed Points in Cone Metric Spaces. Rendi ContiDel Matematico Di Palermo. Serie II, Tomo LVI, 464-468,2007.

[8] Sh. Rezapour, R. Hamlbarani, Some Notes on the Paper ”Cone Metric Spacesand Fixed Point Theorems of Contractive Mappings”. J. Math. Anal. Appl.345, 2, 719-724 (2008).

[9] D. Ilic, V. Rakocevic, Quasi-Contraction on Cone Metric space. AppliedMathematics Letters 22, 5, 728-731(2009).

[10] M. Abbas, B.E.Rhoades, Fixed and Periodic Point Results in Cone metricSpaces. Applied Mathematics Letters 22, 4, 511-515 (2009).

[11] D. Wardowski, Endpoint and Fixed Points of set-valued Contractions in ConeMetric Spaces, Nonlinear Analysis 71, 1-2, 512-516 (2009).

[12] Sh. Rezapour, Best Approximations in Cone Metric Spaces, MathematicaMoravica, Vol.11 (2007), 85-88.

[13] Cristina Di Bari, Pasquale Vetro, ϕ−Pairs and Common Fixed Points in ConeMetric Spaces, Rendiconti del Circolo Matematico di Palermo(2), 295-303, 2008.

[14] Akbar Azam, Muhammad Arshad, Ismat Beg, Common Fixed Points of TwoMaps in Cone Metric Spaces, Rendiconti del Circolo Matematico di Palermo(2),3, 433-441 (2008).

[15] T. Abdeljawad, Turkoglu D. and Abuloha M. Some theorems and examples ofcone Banach spaces, Journal of Computational Analysis and Applications, 12(4), 739-753 (2010).

[16] Thabet Abdeljawad, Completion of Cone Metric Spaces, Hacettepe JournalMath. and Statistics, 39 (1), (2010).

11

D. TURKOGLU ET AL: CONE METRIC SPACES

116

Page 117: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Stability of a mixed type additive and quadraticfunctional equation in random normed spaces

M. Eshaghi Gordji1, M. Bavand Savadkouhi2 and J. M. Rassias3

1,2 Department of Mathematics, Semnan University, P. O. Box 35195-363,Semnan, Iran;

Center of Excellence in Nonlinear Analysis and Applications, SemnanUniversity, Semnan, Iran

3 Section of Mathematics and Informatics, Pedagogical Department, Nationaland Capodistrian University of Athens, 4, Agamemnonos St., Aghia Paraskevi,

Athens 15342, Greecee-mail: [email protected], [email protected], [email protected]

Abstract. In this paper, we obtain the general solution and the stability result for thefollowing functional equation

f(3x+ y) + f(3x− y) = f(x+ y) + f(x− y) + 2f(3x)− 2f(x)

in random normed spaces (in the sense of Sherstnev) under arbitrary t-norms.

1. Introduction

The stability problem of functional equations originated from the question of Ulam [59] in1940, concerning the stability of group homomorphisms. In 1941, D. H. Hyers [38] gave thefirst affirmative answer to the question of Ulam for Banach spaces. In 1978, Th. M. Rassias[53] provided a generalization of Hyers’ Theorem which allows the Cauchy difference to beunbounded. (see [8]–[33] and [49]–[52]).

This new concept is known as generalized Hyers-Ulam stability of functional equations(see [1]-[4],[28, 29, 37],[39]-[46] and [48, 54, 57]). The functional equation

f(x+ y) + f(x− y) = 2f(x) + 2f(y) (1.1)

is related to symmetric bi-additive function. It is natural that this equation is called aquadratic functional equation. In particular, every solution of the quadratic equation (1.1)is said to be a quadratic function. It is well known that a function f between real vectorspaces is quadratic if and only if there exits a unique symmetric bi-additive function B suchthat f(x) = B(x, x) for all x (see [1, 43]). The bi-additive function B is given by

B(x, y) =1

4(f(x+ y)− f(x− y)) (1.2)

Hyers-Ulam-Rassias stability problem for the quadratic functional equation (1.1) was provedby Skof for functions f : A → B, where A is normed space and B Banach space (see [58]).Cholewa [5] noticed that the Theorem of Skof is still true if relevant domain A is replacedby an abelian group. In the paper [7], Czerwik proved the Hyers-Ulam-Rassias stability ofthe equation (1.1). Grabiec [34] has generalized the above mentioned result.

02000 Mathematics Subject Classification: 46S40,54E40.0Keywords: Additive-quadratic functional equation; Random normed space.

117

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2,117-129,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 118: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

2 M. Eshaghi Gordji, M. Bavand Savadkouhi and J. M. Rassias

A. Najati and M. B. Moghimi in [47] introduced the following functional equation

f(2x+ y) + f(2x− y) = f(x+ y) + f(x− y) + 2f(2x)− 2f(x)

with f(0)=0. It is easy to see that the mapping f(x) = ax2 + bx + c is a solution of thefunctional equation. They established the general solution and the generalized Hyers-Ulam-Rassias stability for the functional equation whenever f is a mapping between two quasiBanach spaces.The aim of this paper is to investigate the stability of the additive–quadratic functionalequation in random normed spaces (in the sense of Sherstnev), under arbitrary continuoust-norms.In the sequel we adopt the usual terminology, notations and conventions of the theory ofrandom normed spaces, as in [6, 55, 56]. Throughout this paper, ∆+ is the space of dis-tribution maps; that is, the space of all mappings F : R ∪ −∞,∞ → [0, 1], such that Fis left-continuous and non-decreasing on R, F (0) = 0 and F (+∞) = 1. D+ is a subset of∆+ consisting of all functions F ∈ ∆+ for which l−F (+∞) = 1, where l−f(x) denotes theleft limit of the function f at the point x; that is, l−f(x) = limt→x− f(t). The space ∆+

is partially ordered by the usual point-wise ordering of functions, i.e., F ≤ G if and only ifF (t) ≤ G(t) for all t in R. The maximal element for ∆+ in this order is the distributionfunction ε0 given by

ε0(t) =

0, if t ≤ 0,

1, if t > 0.

Definition 1.1. ([55]). A mapping T : [0, 1]× [0, 1] → [0, 1] is a continuous triangular norm(briefly, a continuous t-norm) if T satisfies the following conditions:(a) T is commutative and associative;(b) T is continuous;(c) T (a, 1) = a for all a ∈ [0, 1];(d) T (a, b) ≤ T (c, d) whenever a ≤ c and b ≤ d for all a, b, c, d ∈ [0, 1].

Typical examples of continuous t-norms are TP (a, b) = ab, TM (a, b) = min(a, b) andTL(a, b) = max(a + b − 1, 0) (the Lukasiewicz t-norm). Recall (see [35], [36]) that if T is at-norm and xn is a given sequence of numbers in [0, 1], Tn

i=1xi is defined recurrently byT 1

i=1xi = x1 and Tni=1xi = T (Tn−1

i=1 xi, xn) for n ≥ 2. T∞i=nxi is defined as T∞i=1xn+i. It isknown ([36]) that for the Lukasiewicz t-norm the following implication holds:

limn→∞

(TL)∞i=1xn+i = 1 ⇐⇒∞∑

n=1

(1− xn) <∞. (1.3)

Definition 1.2. ([56]). A random normed space (briefly, RN-space) is a triple (X,µ, T ),where X is a vector space, T is a continuous t-norm, and µ is a mapping from X into D+

such that, the following conditions hold:(RN1) µx(t) = ε0(t) for all t > 0 if and only if x = 0;(RN2) µαx(t) = µx( t

|α| ) for all x ∈ X, α 6= 0;

(RN3) µx+y(t+ s) ≥ T (µx(t), µy(s)) for all x, y ∈ X and t, s ≥ 0.

Every normed space (X, ‖.‖) defines a random normed space (X,µ, TM ) where

µx(t) =t

t+ ‖x‖ ,

for all t > 0, and TM is the minimum t-norm. This space is called induced random normedspace.

M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES

118

Page 119: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Stability of a mixed type additive and quadratic functional ... 3

Definition 1.3. Let (X,µ, T ) be an RN-space.(1) A sequence xn in X is said to be convergent to x in X if, for every ε > 0 and λ > 0,there exists positive integer N such that µxn−x(ε) > 1− λ whenever n ≥ N .(2) A sequence xn in X is called Cauchy sequence if, for every ε > 0 and λ > 0, thereexists positive integer N such that µxn−xm(ε) > 1− λ whenever n ≥ m ≥ N .(3) An RN-space (X,µ, T ) is said to be complete if and only if every Cauchy sequence in Xis convergent to a point in X.

Theorem 1.4. ([55]). If (X,µ, T ) is an RN-space and xn is a sequence such that xn → x,then limn→∞ µxn(t) = µx(t) almost everywhere.

In this paper we deal with the following functional equation:

f(3x+ y) + f(3x− y) = f(x+ y) + f(x− y) + 2f(3x)− 2f(x) (1.4)

on random normed spaces. It is easy to see that the function f(x) = ax2 + bx is a solutionof the functional equation (1.4). In section 2 we investigate the general solution of functionalequation (1.4) when f is a mapping between vector spaces, and in section 3 we establish thestability of the functional equation (1.4) in RN-spaces.

2. General solution

We need the following two lemmas for the general solution of (1.4). Throughout thissection X and Y are vector space.

Lemma 2.1. If an even function f : X −→ Y with f(0) = 0 satisfies (1.4) for all x, y ∈ X,then f is quadratic.

Proof. Replacing y by x+ y in (1.4), by evenness of f , we obtain

f(4x+ y) + f(2x− y) = f(2x+ y) + f(y) + 2f(3x)− 2f(x) (2.1)

for all x, y ∈ X. If we Replace y by −y in (2.1), we get by evenness of f,

f(4x− y) + f(2x+ y) = f(2x− y) + f(y) + 2f(3x)− 2f(x) (2.2)

for all x, y ∈ X. If we add (2.1) to (2.2), we have

f(4x+ y) + f(4x− y)− 2f(y) = 4f(3x)− 4f(x) (2.3)

for all x, y ∈ X. Letting y = 0 in (2.3), we get

f(4x) = 2f(3x)− 2f(x) (2.4)

for all x ∈ X. Once again letting y = 2x in (2.3), we get

f(6x) = 4f(3x) + f(2x)− 4f(x) (2.5)

for all x ∈ X. It follows from (2.4) and (2.5) that

f(6x) = 2f(4x) + f(2x) (2.6)

for all x ∈ X. Once again letting y = 4x in (2.3), we get

f(8x) = 2f(4x) + 4f(3x)− 4f(x) (2.7)

for all x ∈ x. It follows from (2.4) and (2.7) that

f(8x) = 4f(4x). (2.8)

If we replace x by x4

in (2.8), we get that

f(2x) = 4f(x) (2.9)

M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES

119

Page 120: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

4 M. Eshaghi Gordji, M. Bavand Savadkouhi and J. M. Rassias

for all x ∈ X. Replacing x by x2

in (2.6), we obtain

f(3x) = 2f(2x) + f(x) (2.10)

for all x ∈ X. It follows from (2.9) and (2.10) that

f(3x) = 9f(x). (2.11)

Replacing y by 3y in (1.4), we get

f(3x+ 3y) + f(3x− 3y) = f(x+ 3y) + f(x− 3y) + 2f(3x)− 2f(x) (2.12)

for all x, y ∈ X. By (2.12) and using (1.4) and (2.11), we get

9f(x+ y) + 9f(x− y) = f(x+ y) + f(x− y) + 2f(3y)

− 2f(y) + 2f(3x)− 2f(x)

for all x, y ∈ X. Hence the function f : X → Y is quadratic.

Corollary 2.2. If an even function f : X → Y satisfies (1.4) for all x, y ∈ X, then mappingg : X → Y defined by g(x) := f(x)− f(0) is quadratic.

Lemma 2.3. If an odd function f : X → Y satisfies (1.4) for all x, y ∈ X, then f is additive.

Proof. By letting y = x in (1.4), we get

f(4x) = 2f(3x)− 2f(x) (2.13)

for all x ∈ X. If we let y = 3x in (1.4), we get by the oddness of f,

f(6x) = 2f(3x) + f(4x)− 2f(x)− f(2x) (2.14)

for all x ∈ X. It follows from (2.13) and (2.14) that

f(6x) = 2f(4x)− f(2x) (2.15)

for all x ∈ X. Once again, by letting y = 5x in (1.4), we get by the oddness of f,

f(8x)− f(2x) = f(6x)− f(4x) + 2f(3x)− 2f(x) (2.16)

for all x ∈ X. By (2.13) and using (2.15) and (2.16), we get

f(8x) = 2f(4x) (2.17)

for all x ∈ X. If we replace x by x4

in (2.17), we obtain

f(2x) = 2f(x) (2.18)

for all x ∈ X. Now, in (2.15), replacing x by x2, we have

f(3x) = 2f(2x)− f(x) (2.19)

for all x ∈ X. It follows from (2.18) and (2.19) that

f(3x) = 3f(x) (2.20)

for all x ∈ X. By (1.4) we conclude that

f(3x+ y) + f(3x− y) = f(x+ y) + f(x− y) + 4f(x) (2.21)

for all x, y ∈ X. Replacing x in (2.21) by x3

and multiplying both sides of (2.21) by 2 weobtain

f(x+ 3y) + f(x− 3y) = 3f(x+ y) + 3f(x− y)− 4f(x) (2.22)

for all x, y ∈ X. Replacing x and y by y and x in (2.21), respectively, we get

f(x+ 3y)− f(x− 3y) = f(x+ y)− f(x− y) + 4f(x) (2.23)

M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES

120

Page 121: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Stability of a mixed type additive and quadratic functional ... 5

for all x, y ∈ X. By adding (2.22) to (2.23), we obtain

f(x+ 3y) = 2f(x+ y) + f(x− y)− 2f(x) + 2f(y) (2.24)

for all x, y ∈ X. Replacing y by −y in (2.24)

f(x− 3y) = 2f(x− y) + f(x+ y)− 2f(x) + 2f(y) (2.25)

for all x, y ∈ X. Once again, if we replace x in (2.24) by x− 2y, we get that

f(x+ y) = 2f(x− y) + f(x− 3y)− 2f(x− 2y) + 2f(y) (2.26)

for all x, y ∈ X. It follows from (2.25) and (2.26),

f(x− 2y) = 2f(x− y)− f(x) (2.27)

for all x, y ∈ X. Replacing y by −y in (2.27), we lead to

f(x+ 2y) = 2f(x+ y)− f(x) (2.28)

for all x, y ∈ X. If we replace y by x+ y in (2.27), we get that

f(x+ 2y) = f(x) + 2f(y) (2.29)

for all x, y ∈ X. It follows from (2.28) and (2.29),

f(x+ y) = f(x) + f(y)

for all x, y ∈ X. Hence mapping f : X → Y is additive.

Theorem 2.4. A function f : X → Y satisfies (1.4) for all x, y ∈ X if and only if thereexists a symmetric bi-additive function B : X×X → Y and an additive function A : X → Y,such that f(x) = B(x, x) +A(x) for all x ∈ X.

Proof. If there exists a symmetric bi-additive function B : X × X → Y and an additivefunction A : X → Y, such that f(x) = B(x, x) +A(x) for all x ∈ X. It is clear that functionf : X → Y satisfies (1.4).Conversely, let f satisfies (1.4). We decompose f into the even part and odd part by setting

fe(x) =1

2(f(x) + f(−x)), fo(x) =

1

2(f(x)− f(−x)),

for all x ∈ X. By (1.4), we have

fe(3x+ y) + fe(3x− y) =1

2[f(3x+ y) + f(−3x− y) + f(3x− y) + f(−3x+ y)]

=1

2[f(3x+ y) + f(3x− y)] +

1

2[f(−3x+ (−y)) + f(−3x− (−y))]

=1

2[f(x+ y) + f(x− y) + 2f(3x)− 2f(x)]

+1

2[f(−x− y) + f(−x− (−y)) + 2f(−3x)− 2f(−x)]

=1

2(f(x+ y) + f(−x− y)) +

1

2(f(x− y) + f(x− (−y)))

+ 2[1

2(f(3x) + f(−3x))]− 2[

1

2(f(x) + f(−x))]

= fe(x+ y) + fe(x− y) + 2fe(3x)− 2fe(x),

for all x, y ∈ X. This means that fe satisfies (1.4). Similarly we can show that fo satisfies(1.4). By Corollary 2.2 and Lemma 2.3, we achive that the function fe − f(0) and fo arequadratic and additive respectively. Therefore there exists a symmetric bi-additive function

M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES

121

Page 122: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

6 M. Eshaghi Gordji, M. Bavand Savadkouhi and J. M. Rassias

B : X×X → Y such that fe(x) = B(x, x)+f(0) for all x ∈ X. So f(x) = B(x, x)+A(x)+f(0)for all x ∈ X, where A(x) = fo(x) for all x ∈ X.

3. Stability

Throughout this section X will be a real linear space and (Y, µ, T ) will be a completeRN-space.

Theorem 3.1. Let f : X → Y be an even function with f(0) = 0 for which there isρ : X ×X → D+ ( ρ(x, y) is denoted by ρx,y ) with the property:

µf(3x+y)+f(3x−y)−f(x+y)−f(x−y)−2f(3x)+2f(x)(t) ≥ ρx,y(t) (3.1)

for all x, y ∈ X and all t > 0. If

limn→∞

T∞i=1(2ρ 2n+i−14 x, 2n+i−1

4 x(22n+it) + ρ 2n+i−1

4 x, 5.2n+i−14 x

(22n+it)

+ ρ 2n+i−14 x,−3.2n+i−1

4 x(22n+it)) = 1 (3.2)

and

limn→∞

ρ2nx,2ny(22nt) = 1 (3.3)

for all x, y ∈ X and all t > 0, then there exists a unique quadratic mapping Q : X → Y suchthat

µQ(x)−f(x)(t) ≥ T∞i=1(2ρ 2i−14 x, 2i−1

4 x(2it)+ρ 2i−1

4 x, 5.2i−14 x

(2it)+ρ 2i−14 x,−3.2i−1

4 x(22it)), (3.4)

for all x ∈ X and all t > 0.

Proof. By replacing y by x+ y in (3.1), we get

µf(4x+y)+f(2x−y)−f(2x+y)−f(y)−2f(3x)+2f(x)(t) ≥ ρx,x+y(t) (3.5)

for all x, y ∈ X. If we Replace y by −y in (3.5), we get

µf(4x−y)+f(2x+y)−f(2x−y)−f(y)−2f(3x)+2f(x)(t) ≥ ρx,x−y(t) (3.6)

for all x, y ∈ X. If we add (3.5) to (3.6), we have

µf(4x+y)+f(4x−y)−2f(y)−4f(3x)+4f(x)(t) ≥ ρx,x+y(t) + ρx,x−y(t). (3.7)

Letting y = 0 in (3.7), we get the inequality

µ2f(4x)−4f(3x)+4f(x)(t) ≥ 2ρx,x(t) (3.8)

for all x ∈ X. Once again by letting y = 4x in (3.7), we get the inequality

µf(8x)−2f(4x)−4f(3x)+4f(x)(t) ≥ ρx,5x(t) + ρx,−3x(t) (3.9)

for all x ∈ X. It follows from (3.8) and (3.9) that

µf(8x)−4f(4x)(t) ≥ 2ρx,x(t) + ρx,5x(t) + ρx,−3x(t) (3.10)

for all x ∈ X. If we replace x by x4

in (3.10), we obtain

µf(2x)−4f(x)(t) ≥ 2ρ x4 , x

4(t) + ρ x

4 , 5x4

(t) + ρ x4 ,−3x

4(t) (3.11)

for all x ∈ X. Letting

ψx,x(t) = 2ρ x4 , x

4(t) + ρ x

4 , 5x4

(t) + ρ x4 ,−3x

4(t) (3.12)

for all x ∈ X, then we get

µf(2x)−4f(x)(t) ≥ ψx,x(t) (3.13)

M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES

122

Page 123: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Stability of a mixed type additive and quadratic functional ... 7

for all x ∈ X and all t > 0. Thus we have

µ f(2x)22

−f(x)(t) ≥ ψx,x(22t) (3.14)

for all x ∈ X and all t > 0. Hence,

µ f(2k+1x)

22(k+1) − f(2kx)22k

(t) ≥ ψ2kx,2kx(22(k+1)t) (3.15)

for all x ∈ X and all k ∈ N. This means that

µ f(2k+1x)

22(k+1) − f(2kx)22k

(t

2k+1) ≥ ψ2kx,2kx(2k+1t) (3.16)

for all x ∈ X, t > 0 and all k ∈ N. As 1 > 12

+ 122 + ... + 1

2n , by the triangle inequality itfollows

µ f(2nx)22n −f(x)

(t) ≥ Tn−1k=1 (µ f(2k+1x)

22(k+1) − f(2kx)22k

(t

2k+1)) ≥ Tn−1

k=1 (ψ2kx,2kx(2k+1t))

= Tni=1(ψ2i−1x,2i−1x(2it)) (3.17)

for all x ∈ X and t > 0. In order to prove the convergence of the sequence f(2nx)

22n , wereplace x with 2mx in (3.17) to find that

µ f(2n+mx)

22(n+m) − f(2mx)22m

(t) ≥ Tni=1(ψ2i+m−1x,2i+m−1x(2i+2mt)). (3.18)

Since the right hand side of the inequality (3.18) tends to 1 as m and n tend to infinity,

sequence f(2nx)

22n is a Cauchy sequence. Therefore, we may define Q(x) = limn→∞f(2nx)

22n

for all x ∈ X. Now, we show that Q is a quadratic map. Replacing x, y with 2nx and 2nyrespectively in (3.1), it follows that

µ f(3.2nx+2ny)22n +

f(3.2nx−2ny)22n − f(2nx+2ny)

22n − f(2nx−2ny)22n −2

f(3.2nx)22n +2

f(2nx)22n

(t) ≥ ρ2nx,2ny(22nt).

(3.19)Taking limit as n→∞, we find that Q satisfies (1.4) for all x, y ∈ X. Therefore by Lemma2.1 we get that mapping Q : X → Y is quadratic.To prove (3.4), take limit as n→∞ in (3.17) and by (3.12). Finally, to prove the uniquenessof the quadratic function Q subject to (3.4), let us assume that there exists a quadraticfunction Q′ which satisfies (3.4). Since Q(2nx) = 22nQ(x) and Q′(2nx) = 22nQ′(x) for allx ∈ X and n ∈ N, from (3.4) it follows that

µQ(x)−Q′(x)(2t) = µQ(2nx)−Q′(2nx)(22n+1t)

≥ T (µQ(2nx)−f(2nx)(22nt), µf(2nx)−Q′(2nx)(2

2nt))

≥ T (T∞i=1(2ρ 2i+n−14 x, 2i+n−1

4 x(22n+it) + ρ 2i+n−1

4 x, 5.2i+n−14 x

(22n+it)

+ ρ 2i+n−14 x,−3.2i+n−1

4 x(22n+it)), T∞i=1(2ρ 2i+n−1

4 x, 2i+n−14 x

(22n+it)

+ ρ 2i+n−14 x, 5.2i+n−1

4 x(22n+it) + ρ 2i+n−1

4 x,−3.2i+n−14 x

(22n+it))) (3.20)

for all x ∈ X and all t > 0. By letting n→∞ in (3.20), we find that Q = Q′.

Theorem 3.2. Let X be a real linear space, (Y, µ, T ) be a complete RN-space and f : X → Ybe an odd function which there is ρ : X × X → D+ ( ρ(x, y) is denoted by ρx,y ) with theproperty:

µf(3x+y)+f(3x−y)−f(x+y)−f(x−y)−2f(3x)+2f(x)(t) ≥ ρx,y(t) (3.21)

M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES

123

Page 124: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

8 M. Eshaghi Gordji, M. Bavand Savadkouhi and J. M. Rassias

for all x, y ∈ X and all t > 0. If

limn→∞

T∞i=1(2ρ 2n+i−14 x, 2n+i−1

4 x(2n+it) + ρ 2n+i−1

4 x, 3.2n+i−14 x

(2n+it)

+ ρ 2n+i−14 x, 5.2n+i−1

4 x(2n+it)) = 1 (3.22)

andlim

n→∞ρ2nx,2ny(2nt) = 1 (3.23)

for all x, y ∈ X and all t > 0, then there exists a unique additive mapping A : X → Y suchthat

µA(x)−f(x)(t) ≥ T∞i=1(2ρ 2i−14 x, 2i−1

4 x(2it)+ρ 2i−1

4 x, 3.2i−14 x

(2it)+ρ 2i−14 x, 5.2i−1

4 x(2it)), (3.24)

for all x ∈ X and all t > 0.

Proof. By letting y = x in (3.21), we get

µf(4x)−2f(3x)+2f(x)(t) ≥ ρx,x(t) (3.25)

for all x ∈ X. If we let y = 3x in (3.21), we get by the oddness of f,

µf(6x)−2f(3x)−f(4x)+2f(x)+f(2x)(t) ≥ ρx,3x(t) (3.26)

for all x ∈ X. It follows from (3.25) and (3.26) that

µf(6x)−2f(4x)+f(2x)(t) ≥ ρx,x(t) + ρx,3x(t) (3.27)

for all x ∈ X. Once again, by letting y = 5x in (3.21), we get by the oddness of f,

µf(8x)−f(2x)−f(6x)+f(4x)−2f(3x)+2f(x)(t) ≥ ρx,5x(t) (3.28)

for all x ∈ X. By (3.25) and using (3.27) and (3.28), we get

µf(8x)−2f(4x)(t) ≥ 2ρx,x(t) + ρx,3x(t) + ρx,5x(t) (3.29)

for all x ∈ X. If we replace x by x4

in (3.29), we get that

µf(2x)−2f(x)(t) ≥ 2ρ x4 , x

4(t) + ρ x

4 , 3x4

(t) + ρ x4 , 5x

4(t) (3.30)

for all x ∈ X. Letφx,x(t) = 2ρ x

4 , x4(t) + ρ x

4 , 3x4

(t) + ρ x4 , 5x

4(t) (3.31)

for all x ∈ X and all t > 0, then we get

µf(2x)−2f(x)(t) ≥ φx,x(t) (3.32)

for all x ∈ X and t > 0. Thus we have

µ f(2x)2 −f(x)

(t) ≥ φx,x(2t) (3.33)

for all x ∈ X. Therefore,

µ f(2k+1x)2k+1 − f(2kx)

2k

(t) ≥ φ2kx,2kx(2k+1t) (3.34)

for all x ∈ X and all k ∈ N. Hence

µ f(2nx)2n −f(x)

(t) ≥ Tn−1k=1 (µ f(2k+1x)

2k+1 − f(2kx)2k

(t)) ≥ Tn−1k=1 (φ2kx,2kx(2k+1t))

= Tni=1(φ2i−1x,2i−1x(2it)) (3.35)

for all x ∈ X and t > 0. In order to prove the convergence of the sequence f(2nx)2n , we

replace x with 2mx in (3.35) to find that

µ f(2n+mx)2n+m − f(2mx)

2m(t) ≥ Tn

i=1(φ2i+m−1x,2i+m−1x(2i+mt)). (3.36)

M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES

124

Page 125: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Stability of a mixed type additive and quadratic functional ... 9

Since the right hand side of (3.36) tends to 1 as m and n tend to infinity, sequence f(2nx)2n

is a Cauchy sequence. Therefore, we may define A(x) = limn→∞f(2nx)

2n for all x ∈ X. Now,we show that A is a additive map. Replacing x, y with 2nx and 2ny respectively in (3.21),it follows that

µ f(3.2nx+2ny)2n +

f(3.2nx−2ny)2n − f(2nx+2ny)

2n − f(2nx−2ny)2n −2

f(3.2nx)2n +2

f(2nx)2n

(t) ≥ ρ2nx,2ny(2nt).

(3.37)Taking limit as n→∞, we find that A satisfies (1.4) for all x, y ∈ X. Therefore by Lemma2.3 we get that mapping A : X → Y is additive.To prove (3.24), take limit as n→∞ in (3.35) and by (3.31). Finally, to prove the uniquenessof the additive function A subject to (3.24), let us assume that there exists an additivefunction A′ which satisfies (3.24). Since A(2nx) = 2nA(x) and A′(2nx) = 2nA′(x) for allx ∈ X and n ∈ N, from (3.24) it follows that

µA(x)−A′(x)(2t) = µA(2nx)−A′(2nx)(2n+1t)

≥ T (µA(2nx)−f(2nx)(2nt), µf(2nx)−A′(2nx)(2

nt))

≥ T (T∞i=1(2ρ 2i+n−14 x, 2i+n−1

4 x(2i+nt) + ρ 2i+n−1

4 x, 3.2i+n−14 x

(2i+nt)

+ ρ 2i+n−14 x, 5.2i+n−1

4 x(2i+nt)), T∞i=1(2ρ 2i+n−1

4 x, 2i+n−14 x

(2i+nt)

+ ρ 2i+n−14 x, 3.2i+n−1

4 x(2i+nt) + ρ 2i+n−1

4 x, 5.2i+n−14 x

(2i+nt))) (3.38)

for all x ∈ X and all t > 0. By letting n→∞ in (3.38), we find that A = A′.

Theorem 3.3. Let f : X → Y be a function with f(0) = 0 for which there is ρ : X×X → D+

( ρ(x, y) is denoted by ρx,y ) with the property:

µf(3x+y)+f(3x−y)−f(x+y)−f(x−y)−2f(3x)+2f(x)(t) ≥ ρx,y(t) (3.39)

for all x, y ∈ X and all t > 0. If

limn→∞

T∞i=1(2ρ 2n+i−14 x, 2n+i−1

4 x(2n+it) + ρ 2n+i−1

4 x, 3.2n+i−14 x

(2n+it)

+ ρ 2n+i−14 x, 5.2n+i−1

4 x(2n+it) + 2ρ−2n+i−1

4 x,−2n+i−14 x

(2n+it) + ρ−2n+i−14 x,−3.2n+i−1

4 x(2n+it)

+ ρ−2n+i−14 x,−5.2n+i−1

4 x(2n+it)) = 1 = lim

n→∞T∞i=1(2ρ 2n+i−1

4 x, 2n+i−14 x

(22n+it)

+ ρ 2n+i−14 x, 5.2n+i−1

4 x(22n+it) + ρ 2n+i−1

4 x,−3.2n+i−14 x

(22n+it) + 2ρ−2n+i−14 x,−2n+i−1

4 x(22n+it)

+ ρ−2n+i−14 x,−5.2n+i−1

4 x(22n+it) + ρ−2n+i−1

4 x, 3.2n+i−14 x

(22n+it)) (3.40)

andlim

n→∞ρ2nx,2ny(22nt) = 1 = lim

n→∞ρ2nx,2ny(2nt) (3.41)

for all x, y ∈ X and all t > 0, then there exists a unique additive mapping A : X → Y and aunique quadratic mapping Q : X → Y such that

µQ(x)−A(x)−f(x)(t) ≥ T∞i=1(2ρ 2i−14 x, 2i−1

4 x(2it) + ρ 2i−1

4 x, 3.2i−14 x

(2it) + ρ 2i−14 x, 5.2i−1

4 x(2it)

+ 2ρ−2i−14 x,−2i−1

4 x(2it) + ρ−2i−1

4 x,−3.2i−14 x

(2it) + ρ−2i−14 x,−5.2i−1

4 x(2it))

+ T∞i=1(2ρ 2i−14 x, 2i−1

4 x(2it) + ρ 2i−1

4 x, 5.2i−14 x

(2it) + ρ 2i−14 x,−3.2i−1

4 x(2it)

+ 2ρ−2i−14 x,−2i−1

4 x(2it) + ρ−2i−1

4 x,−5.2i−14 x

(2it) + ρ−2i−14 x, 3.2i−1

4 x(2it)),

(3.42)

M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES

125

Page 126: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

10 M. Eshaghi Gordji, M. Bavand Savadkouhi and J. M. Rassias

for all x ∈ X and all t > 0.

Proof. Let

fe(x) =1

2[f(x) + f(−x)]

for all x ∈ X. Then fe(0) = 0, fe(−x) = fe(x), and

µfe(3x+y)+fe(3x−y)−fe(x+y)−fe(x−y)−2fe(3x)+2fe(x)(t) ≥ ρx,y(2t) + ρ−x,−y(2t)

≥ ρx,y(t) + ρ−x,−y(t) (3.43)

for all x, y ∈ X. Hence, in view of Theorem 3.1, there exists a unique quadratic functionQ : X → Y satisfying (3.4). Let

fo(x) =1

2[f(x)− f(−x)]

for all x ∈ X. Then fo(0) = 0, fo(−x) = −fo(x), and

µfo(3x+y)+fo(3x−y)−fo(x+y)−fo(x−y)−2fo(3x)+2fo(x)(t) ≥ ρx,y(2t) + ρ−x,−y(2t)

≥ ρx,y(t) + ρ−x,−y(t) (3.44)

for all x, y ∈ X. From Theorem 3.2, it follows that there exist a unique additive mappingA : X → Y satisfying (3.24). Now it is obvious that (3.42) holds true for all x ∈ A, and theproof of Theorem is complete.

References

[1] J. Aczel and J. Dhombres, Functional equations in several variables, Cambridge Univ.Press, 1989.

[2] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc.Japan. 2 (1950), 64–66.

[3] B. Bouikhalene and E. Elquorachi: ”Ulam-Gavruta-Rassias stability of the Pexiderfunctional equation”, International Journal of Applied Mathematics and Statistics, 7(Fe07), 2007, 7–39.

[4] D. G. Bourgin, Classes of transformations and bordering transformations, Bull. Amer.Math. Soc. 57 (1951) 223-237.

[5] P. W. Cholewa, Remarks on the stability of functional equations, Aequationes Math. 27(1984), 76–86.

[6] S. S. Chang, Y. J. Cho and S. M. Kang, Nonlinear operator theory in probabilisticmetric spaces, Nova Science Publishers, Inc. New York, 2001.

[7] S. Czerwik, On the stability of the quadratic mapping in normed spaces, Abh. Math.Sem. Univ. Hamburg 62 (1992), 59–64.

[8] A. Ebadian, N. Ghobadipour, M. E. Gordji, A fixed point method for perturbation ofbimultipliers and Jordan bimultipliers in C∗−ternary algebras, J. Math. Phys. 51, 1,2010, 10 pages, doi:10.1063/1.3496391.

[9] A. Ebadian, A. Najati and M. Eshaghi Gordji, On approximate additive–quartic andquadratic–cubic functional equations in two variables on abelian groups, Results Math.,DOI 10.1007/s00025-010-0018-4 (2010).

[10] M. Eshaghi Gordji, Nearly ring homomorphisms and nearly ring derivations on non-Archimedean Banach algebras, Abs. Appl. Anal., Article ID:393247.

[11] M. Eshaghi Gordji and Z. Alizadeh, Stability and superstability of ring homomorphismson non–Archimedean Banach algebras, Abstract and Applied Analysis, Vol. 2011, Ar-ticle ID:123656, (2011), 10 pages.

M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES

126

Page 127: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Stability of a mixed type additive and quadratic functional ... 11

[12] M. Eshaghi Gordji and M. Bavand Savadkouhi, Stability of cubic and quartic functionalequations in non–Archimedean spaces, Acta Appl. Math. 110 (2010), 1321–1329.

[13] M. Eshaghi Gordji and M. Bavand Savadkouhi, Stability of a mixed type cubicquarticfunctional equation in non–Archimedean spaces, Appl. Math. Lett. 23, No.10, (2010),1198-1202.

[14] M. Eshaghi Gordji, M. Bavand Savadkouhi and M. Bidkham, Stability of a mixed typeadditive and quadratic functional equation in non–Archimedean spaces, J. Comput.Anal. Appl. 12(2010) 454–462.

[15] M. Eshaghi Gordji and M. Bavand Savadkouhi, Approximation of generalized homo-morphisms in quasi-Banach algebras, Analele Univ. Ovidius Constata, Math series, Vol.17(2), (2009), 203–214.

[16] M. Eshaghi Gordji and M. Bavand Savadkouhi, On approximate cubic homomor-phisms, Advances in difference equations, Volume (2009), Article ID 618463, 11 pages,doi:10.1155/2009/618463.

[17] M. Eshaghi Gordji, T. Karimi and S. Kaboli Gharetapeh, Approximately n–Jordanhomomorphisms on Banach algebras, J. Ineq. Appl. Volume 2009, Article ID 870843, 8pages.

[18] M. Eshaghi Gordji, R. Khodabakhsh, H. Khodaei and S. M. Jung, AQCQ-functionalequation in non–Archimedean normed spaces, Abs. Appl. Anal., Volume 2010, ArticleID741942.

[19] M. Eshaghi Gordji, H. Khodaei and R. Khodabakhsh, General quartic-cubic-quadraticfunctional equation in non–Archimedean normed spaces, U.P.B. Sci. Bull. (Series A) 72(2010), Issue 3, 69–84.

[20] M. Eshaghi Gordji and H. Khodaei, Solution and stability of generalized mixed typecubic, quadratic and additive functional equation in quasi–Banach spaces, NonlinearAnalysis–TMA 71 (2009), 5629–5643.

[21] M. Eshaghi Gordji, H. Khodaei and R. Khodabakhsh, General quartic–cubic–quadraticfunctional equation in non–Archimedean normed spaces, U.P.B. Sci. Bull., Series A,Vol. 72, Iss. 3, 2010, 69-84.

[22] M. Eshaghi Gordji and A. Najati, Approximately J∗-homomorphisms: A fixed pointapproach, Journal of Geometry and Physics, 60 (2010), 809–814.

[23] R. Farokhzad and S. A. R. Hosseinioun, Perturbations of Jordan higher derivations inBanach ternary algebras: An alternative fixed point approach, Int. J. Nonlinear Anal.Appl. 1 (2010),1, 42–53.

[24] M. Eshaghi Gordji, M. B. Ghaemi and H. Majani, Generalized Hyers–Ulam–RassiasTheorem in Menger Probabilistic Normed Spaces, Discrete Dynamics in Nature andSociety, Volume 2010, Article ID 162371, 11 pages.

[25] M. Eshaghi Gordji, M. B. Ghaemi, H. Majani and C. Park, Generalized Ulam–HyersStability of Jensen Functional Equation in Serstnev PN Spaces, Journal of Inequalitiesand Applications, Volume 2010, Article ID 868193, 14 pages.

[26] M. Eshaghi Gordji and H. Khodaei, Stability of Functional Equations, LAP LAMBERTAcademic Publishing, 2010.

[27] Z. Gajda, On stability of additive mappings, Internat. J. Math. Math. Sci. 14 (1991),431–434.

[28] P. Gavruta, An answer to a question of J. M. Rassias concerning the stability ofCauchy functional equation, Advances in Equations and Inequalities, Hadronic Math.Ser., (1999), 67–71.

[29] P. Gavruta, A generalization of the Hyers-Ulam-Rassias stability of approximately ad-ditive mappings, J. Math. Anal. Appl. 184 (1994), 431–436.

M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES

127

Page 128: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

12 M. Eshaghi Gordji, M. Bavand Savadkouhi and J. M. Rassias

[30] P. Gavruta and L. Gavruta, A new method for the generalized Hyers–Ulam–Rassiasstability, Int. J. Nonlinear Anal. Appl, 1 (2010), 2, 11–18.

[31] M. E. Gordji, H. Khodaei, On the generalized Hyers–Ulam–Rassias stability of quadraticfunctional equations, Abs. Appl. Anal., Volume 2009, Article ID 923476, 11 pages.

[32] M. E. Gordji, S. Kaboli Gharetapeh, T. Karimi , E. Rashidi and M. Aghaei, TernaryJordan derivations on C∗−ternary algebras, Journal of Computational Analysis andApplications, VOL.12, No.2, 2010, 463–470.

[33] M. E. Gordji, J.M. Rassias, N. Ghobadipour, Generalized Hyers–Ulam stability of thegeneralized (n, k)–derivations, Abs. Appl. Anal., Volume 2009, Article ID 437931, 8pages.

[34] A. Grabiec, The generalized Hyers-Ulam stability of a class of functional equations,Publ. Math. Debrecen 48 (1996), 217–235.

[35] O. Hadzic, E. Pap, Fixed Point Theory in PM Spaces, Kluwer Academic Publishers,Dordrecht, 2001.

[36] O. Hadzic, E. Pap and M. Budincevic, Countable extension of triangular norms andtheir applications to the fixed point theory in probabilistic metric spaces, Kybernetica,38 (3) (2002), 363–381.

[37] D. H. Hyers, G. Isac and Th. M. Rassias, Stability of functional equations in severalvariables, Birkhauser, Basel, 1998.

[38] D. H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci.27 (1941), 222–224.

[39] G. Isac and Th. M. Rassias, On the Hyers-Ulam stability of ψ-additive mappings, J.Approx. Theory 72 (1993), 131–137.

[40] K. W. Jun, H. M. Kim, J. M. Rassias, Extended Hyers-Ulam stability for Cauchy-Jensenmappings, J. Difference Equ. Appl., 13 (2007), no. 12, 1139–1153.

[41] S. M. Jung, J. M. Rassias, Stability of general Newton functional equations for loga-rithmic spirals, Adv. Difference Equ., (2008), Art. 143053, 5 pp.

[42] Yong-Soo Jung, ”The Ulam-Gavruta-Rassias stability of module left derivations”, J.Math. Anal. Appl., doi:10.1016/j.jmaa.2007.07.003, 1–9.

[43] Pl. Kannappan, Quadratic functional equation and inner product spaces, Results Math.27 (1995), 368–372.

[44] H. M. Kim, J. M. Rassias, Y. S. Cho, Stability problem of Ulam for Euler-Lagrangequadratic mappings. J. Inequal. Appl., (2007), Art. ID 10725, 15 pp.

[45] H. M. Kim, J. M. Rassias, Generalization of Ulam stability problem for Euler-Lagrangequadratic mappings, J. Math. Anal. Appl., 336 (2007), no. 1, 277–296.

[46] H. M. Kim, K. W. Jun, J. M. Rassias, Extended stability problem for alternativeCauchy-Jensen mappings, JIPAM. J. Inequal. Pure Appl. Math., 8 (2007), no. 4, Article120, 17 pp.

[47] A. Najati and M. B. Moghimi, Stability of a functional equation driving from quadraticand additive function in quasi-Banach spaces, J. Math. Anal. Appl. 342 (2008), 1318–1331.

[48] C. G. Park, J. M. Rassias, Hyers-Ulam stability of an Euler-Lagrange type additivemapping, Int. J. Appl. Math. Stat., 7 (2007), No. Fe07, 112–125.

[49] J. M. Rassias, On approximation of approximately linear mappings by linear mappings,J. Funct. Anal. 46 (1982), no. 1, 126–130.

[50] J. M. Rassias, On approximation of approximately linear mappings by linear mappings,Bull. Sci. Math. 2 108 (1984), no. 4, 445–446.

[51] J. M. Rassias, On a new approximation of approximately linear mappings by linearmappings, Discuss. Math. 7 (1985), 193–196.

M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES

128

Page 129: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Stability of a mixed type additive and quadratic functional ... 13

[52] J. M. Rassias, solution of a problem of Ulam, J. Approx. Theory 57 (1989), no. 3,268–273.

[53] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer.Math. Soc. 72 (1978), 297–300.

[54] K. Ravi and M. Arunkumar, ”On the Ulam-Gavruta-Rassias stability of the orthogo-nally Euler-Lagrange type functional equation”, International Journal of Applied Math-ematics and Statistics, 7 (Fe07), 2007, 143–156.

[55] B. Schweizer and A. Sklar, Probabilistic Metric Spaces, Elsevier, North Holand, NewYork, 1983.

[56] A. N. Sherstnev, On the notion of a random normed space, Dokl. Akad. Nauk SSSR149 (1963), 280-283 (in Russian).

[57] M. A. Sibaha, B. Bouikhalene and E. Elquorachi: ”Ulam-Gavruta-Rassias stability for alinear fuctional equation”, International Journal of Applied Mathematics and Statistics,7 (Fe07), 2007, 157–168.

[58] F. Skof, Propriet locali e approssimazione di operatori, Rend. Sem. Mat. Fis. Milano,53 (1983), 113-129.

[59] S. M. Ulam, Problems in modern mathematics, Chapter VI, science ed., Wiley, NewYork, 1940.

M.E. GORDJI ET AL: FUNCTIONAL EQUATION IN RANDOM NORMED SPACES

129

Page 130: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Monotonic Random Walk on a One-DimensionalLattice

Alexander P. BuslaevDept. of Higher Mathematics, State Technical University MADI

64, Leningradskiy prosp., Moscow, Russia, 125319E-mail: [email protected].

Alexander G. TatashevDept. of Higher Mathematics, State Technical University MADI

64, Leningradskiy prosp., Moscow, Russia, 125319E-mail: [email protected].

Abstract

Monotonic random walk of particles on a one-dimensional lattice is considered.This model is treated as the limit case of the model in which the particles moveon a ring. In this limit case the ring is great. The average velocity of the particleshas been found.

Key words: stochastic models, random walk, traffic, average velocity, Markovchains.

1. Introduction

Models of random walk on a lattice are used for the study of the road traffic.The appearance of cell automata models in the problem of traffic flows is

associated with works of Nagel and al. [11, 12], which were published in mid-nineties. In [11, 12] the dependence of the average velocity and intensity oftraffic flow on the model parameters was studied. The following factors, whichcontributed to the activation of this approach, can be noted

1) desire to explain the discrepancy between the solutions of traffic equationsand experimental observations, which exhibited chaotic behavior in the so-calledregime of instability;

2) desire to create models discrete in time and space (or only on one coor-dinate), which would be independent on continuum models and could take intoaccount the individual behavior of ”particles with motivated behavior”.

It has been noted that the scheme considered in [11, 12] is similar to monotonicrandom walks on a lattice. This theme has its own history. In particular, theworks of Soviet mathematician Yu.K. Belyaev and his students [1, 13] are devotedto traffic flows in the underground and contain exact results for one-dimensionalrandom walk (not only monotonic walk).

1

130

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2,130-139,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 131: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

As the Russian mathematician M. Blank noted, in subsequent developmentof the model of cellular automata, the Western science has been satisfied bynumerical results only, which is apparently due to the relative availability ofcomputational tools. M. Blank gave well-defined statements and found exactresults in a number of important cases, [2, 3].

Here we are talking about exact estimates, while simulation results such asthe statement of the decisive influence of the presence of heavy trucks on flowwork certainly exist.

In [8] a model of movement of particles (vehicles) on a multi-lane road locationwas considered. In this model the velocity of movement is the sum of determi-nate and stochastic components. In this model the determinate component ofmovement corresponds to the background movement on lane and the stochasticcomponent corresponds to individual manoeuvres of particles. Each lane is asequence of cells. The dimension of the cell is determined by the dynamic di-mension i.e the length of the road segment occupied by a particle. The dynamicdimension takes into account the safety requirement and depends on velocity ofmovement, [10]. Stochastic movement is described by monotonic random walkon cells of lane and the regular movement is described by uniform movement ofall the cells of lane, [7, 8].

In [9] a model of random walk on one-lane ring has been considered. Theformula has been found for the average velocity of particles. This formula is ageneralization of the formula, found in [3], for the model of random walk, whererandomness occurs only for the initial configuration of particles.

In [4–6] models of random walk on a discrete lattice, similar to models intro-duced in [7, 8], have been used to solve some traffic optimization problems.

The present work considers a stochastic model, which describes movement ofparticles (vehicles) on a one-dimensional lattice. The model is the limit case ofthe model considered in [9], in which the number of cells is great.

2. Formulation of problem

Let us describe the stochastic model of movement on the ring, which was con-sidered in [9]. The ring contains n cells and m < n particles. The (i + 1)th cellfollows the ith cell in the direction of movement, i = 1, 2, . . . , n− 1. The 1st cellfollows the nth cell. Transitions of particles occur at discrete times 1, 2, 3, . . .. Ifat a discrete time the cell, which follows the particle in the direction of movement,is empty then the particle passes to the following cell with a probability p whichdoes not depend on behavior of the other particles. The initial configuration ofparticles on the lattice is fixed.

States of the model are determined by configurations of particles on the lattice.The steady state probabilities and the average velocity of particles were foundin [9]. The initial configuration of particles on the lattice is fixed.

In [9] a Markov chain was considered, each state of which corresponds toa state of the model. The number of states is equal to number Cm

n of m-combinations from a set of n elements. It is proved that the probabilities of

2

BUSLAEV, TATASHEV: MONOTONIC RANDOM WALK

131

Page 132: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

states depend on the number of particle clusters only. ”Cluster” is a group ofoccupied cells isolated from other clusters by empty cells.

By u(n,m, p) denote the average individual velocity of movement of particles,i.e. the stable probability that some fixed particle passes at the current time tothe next cell.

In accordance with results of work [9]

u(n,m, p) =n

m

min(m,n−m)∑

k=1

Cp

(1− p)k−1Ck−1

m−1Ck−1n−m−1,

where

C =

min(m,n−m)∑

k=1

n

k· Ck−1

m−1Ck−1n−m−1

1

(1− p)k−1

−1

.

Let r be the density of flow defined as r = m/n. In present work the limit ofindividual velocity u(r, p) has been found for n → ∞, m → ∞ so that m/n → r.

3. The average velocity of particles

Theorem 1. The limit of individual velocity u(r, p) for n → ∞, m → ∞,m/n → r exists and is calculated as

limn→∞, m/n→r

u(n,m, p) = u(r, p) =1−

1− 4rp(1− r)

2r. (1)

Proof. Let Ai be the event that the ith cell is occupied and Bk be the eventthat there are only k clusters. Consider a pair of cells with numbers 1 and 2 as aMarkov chain with four states E0 = (0, 0), E1 = (0, 1), E2 = (1, 0), E3 = (1, 1),where 0 or 1 in the ith position means that cell i is empty or occupied, i = 1, 2(Fig. 1). Then E0 = A1 A2, E1 = A1A2, E2 = A1A2, E3 = A1A2.

Let p0, p1, p2 and p3 be the stable probabilities of states E0, E1, E2 and E3.The stable probabilities of both the original model and the considered pair ofcells exist and do not depend on the choice of the initial state, [9].

If k is the number of clusters for the current state of model, then k particleshave empty cells ahead in the direction of movement.

Then the ratio a = a(n,m) of average number of clusters to the number ofparticles is equal to the probability P (A2/A1) that the cell is free in front ofthe fixed particle. Let q(n,m) be intensity of particles, that is the number ofparticles passing the section per a time unit

q(n,m) = pra(n,m) = pma(n,m)/n. (2)

We haveP (A2/A1) =

p2p2 + p3

= a(n,m) = a. (3)

3

BUSLAEV, TATASHEV: MONOTONIC RANDOM WALK

132

Page 133: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

n 1 2 3n 1 2 3

n 1 2 3 n 1 2 3

)b

с) )d

Е0 Е1

Е2Е3

a)

Figure 1: States of the pair of neighboring cells

It follows from (3) that

p3 =1− a

ap2. (4)

We shall use the fact that for the considered model all states with the samenumber of clusters have the same probability. This fact is a consequence of for-mula found in [9]. In accordance with this formula

P (k) =C

(1− p)k−1, (5)

where P (k) is the probability of a state with k clusters; C is the normalizingconstant.

Let us use the notion of a dual model. A similar notion was introduced in[3]. In the dual model there are n−m particles, which correspond to the emptyplaces of the original model. Direction of movement in the dual model is oppositeto direction of movement in the original model.

Lemma 1. The following equality is true

a(n, n−m) =r

1− ra(n,m), r =

m

n. (6)

Proof of Lemma 1. Flow intensities in the original and dual models are equal

q(n,m) = q(n, n−m).

From this equality and (2) it follows that

pma(n,m)/n = p(n−m)a(n, n−m)/n

4

BUSLAEV, TATASHEV: MONOTONIC RANDOM WALK

133

Page 134: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

and hence (6) is true.

Let us derive the formula for a.Let p13 be probability of transition from state E1 to state E3 (Fig. 1b, 1d)

and p32 probability of transition from state E3 to state E2 (Fig. 1c, 1d). Fromstate E3 the chain can come only to state E2. The chain can come to state E3

only from E1. For a stable state the number of entrances to a state per time unitis equal to the number of exits from this state

p3p32 = p1p13. (7)

Next we derive formulas for transition probabilities

p32 = ap + o(1), n → ∞, m/n → r, (8)

p13 = ar

1− rp(1− ap) + o(1), n → ∞, m/n → r. (9)

Equations (7)–(9) allow to write the balance equation so that value of a couldbe found.

Lemma 2. Equality (8) is true for the probabilities of transition from stateE3 to state E2.

Proof of Lemma 2. Transition of chain from state E3 to state E2 occurs if aparticle passes from cell 2 to cell 3, Fig. 1c, 1d, and so

p32 = P (A3/A1A2)p. (10)

The equalityP (A3/A1A2) = a(n− 1, m− 1)

is true. This equality follows from the one-to-one correspondence between twosets, one of which is the set of states of the original models, for which cells 1 and2 are occupied, and the other set is the set of states of the model with n−1 cellsand m− 1 particles, for which cell 1 is occupied.

Indeed, a model state is described by vector (θ1, . . . , θn) where the value of

θi, i = 1, . . . , n, is 1 for Ai and 0 for Ai. State (1, 1, θ(n)3 , . . . , θ(n)n ) of the original

model corresponds to state (1, θ(n−1)2 , . . . , θ

(n−1)n−1 ) of the model with n − 1 cells

and θ(n−1)i = θ

(n)i+1, i = 2, . . . , n− 1. All the configurations of m − 2 particles on

the set of cells 3, . . . , n have the same probability under condition A1A2Bk. Theprobabilities of all particle configurations on the set of cells 2, . . . , n − 1 of themodel with n−1 cells and m−1 particles under condition A1Bk, k = 1, . . . , m−1are also equal. The states which are in one-to-one correspondence have the sameconditional probabilities. Indeed, let α(k) be the number of model states forwhich cells 1, 2 are occupied and there are k clusters, k = 1, . . . ,min(m − 1, n −m). Then the probability of a configuration of m − 2 particles

5

BUSLAEV, TATASHEV: MONOTONIC RANDOM WALK

134

Page 135: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

on the set of cells 3, . . . , n, under the condition A1A2, if there are k clusters inthe model, is calculated with formula (5) where

C =

min(m−1,n−m)∑

k=1

α(k)

(1− p)k−1

−1

.

The probability of a fixed configuration of m− 2 particles on the set of particles2, . . . , n−1 in the model with n−1 cells and m−1 particles under the conditionsA1, if there are k clusters in the model, is the same. If states of two models arein one-to-one correspondence, then these states are characterized by the samenumber of clusters. So the considered conditional probabilities of these statesare the same.

Value of a(m,n) is continuous on density r so that

limn→∞, m/n→r

(P (A3/A1A2)− a(n,m)) =

= limn→∞, m/n→r

(a(n− 1, m− 1)− a(n,m)) = 0.

Hence,P (A3/A1A2) = a(n,m) + o(1), n → ∞, m/n → r. (11)

Formula (8) follows from (10) and (11). Lemma 2 is proved.

Lemma 3. For the transition from state E1 to state E3, equation (9) is true.

Proof of Lemma 3. Transition of the chain from state E1 to state E3 (Fig. 1b,1d) occurs if the particle occupying the n-th cell passes to cell 1 and the particleoccupying cell 2 does not move. The transition occurs with probability p if cellsn and 3 are occupied, and with probability p(1− p) if cell n is occupied and cell3 is empty. We have (Fig. 2)

p13 = P (A3An/A1A2)p+ P (A3An/A1A2)p(1− p) =

.= P (A3/A1A2)P (An/A1A2A3)p+

+P (A3/A1A2)P (An/A1A2A3)p(1− p). (12)

We have

a(n,m) =1

p1 + p3· (p1P (A3/A1A2) + p3P (A3/A1A2)). (13)

From (11) and (13) we have

P (A3/A1A2) = a(n,m) + o(1), n → ∞, m/n → r. (14)

6

BUSLAEV, TATASHEV: MONOTONIC RANDOM WALK

135

Page 136: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

n 1 2 3n 1 2 3

А А А1 2 3

А А А1 2 3

a) b)

Figure 2: States of the four cells. Conditional probabilities of states of cell n arecalculated

Comparing the behavior of the original and dual system and taking into ac-count (6) and (14) we have

P (An/A1A2) = P ∗(A3/A1A2) = a(n, n−m) + o(1) =

=r

1− ra(n,m) + o(1), n → ∞, m/n → r, (15)

where the asterisk indicates that probability is calculated for the model for whichthe number of particles is n−m and the number of cells is n still.

We have (Fig. 2a)

P (An/A1A2A3) = a(n− 2, n−m− 1). (16)

Equality (16) follows from the one-to-one correspondence between configurationsof n−m− 2 empty places on the set of cells 4, . . . , n, for which cells 1 and 3 areempty, cell 2 is occupied and there are k clusters in the considered model, andthe set of configurations of n−m−2 empty places on the set of cells 2, . . . , n−2of the model with n−2 cells and n−m−1 empty places, for which cell 1 is empty

and there are k − 1 clusters. State (0, 1, 0, θ(n)4 , . . . , θ(n)n ) of the original model

corresponds to state (0, θ(n−2)2 , . . . , θ

(n−2)n−2 ) of the model with n − 2 cells, where

θ(n−2)i = θ

(n)i+2, i = 2, . . . , n−2. In addition, in accordance with (5) the conditional

probabilities of the states that are in correspondence are the same. Indeed, letβ(k) be the number of the original model states, for which cells 1,3 are free, cell2 is occupied and there are k clusters, k = 2, . . . , min(n−m,m− 2). Then theprobability of a fixed configuration of n−m− 2 empty places on cells 4, . . . , n ofthe original model under the condition A1A2A3 is calculated with formula (5),where k is the number of clusters for this configuration,

C =

min(m,n−m)∑

l=2

β(l)

(1− p)l−1

−1

.

This probability is equal to the probability of a fixed configuration of n−m−2empty places on set of cells 2, . . . , n−2 of the model with n−2 cells and n−m−1empty places under the condition A1 if there are k − 1 clusters in the model forthis configuration. For a state of this model the number of clusters is less by one

7

BUSLAEV, TATASHEV: MONOTONIC RANDOM WALK

136

Page 137: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

than for the corresponding state of the original model, therefore the consideredconditional probabilities are the same for corresponding states of the models.

Aslim

n→∞, m/n→r(a(n, n−m)− a(n− 2, n−m− 1)) = 0

we have

a(n− 2, n−m− 1) = a(n, n−m) + o(1), n → ∞, m/n → r. (17)

From (6), (16) and (17) we obtain (Fig. 2a)

P (An/A1A2A3) =r

1− ra(n,m) + o(1), n → ∞, m/n → r. (18)

Taking into account (15) and (18) we have (Fig. 2b)

P (An/A1A2A3) =r

1− ra(n,m) + o(1), n → ∞, m/n → r. (19)

From (12), (14), (18) and (19) we obtain (9). Lemma 3 has been proved.

Let us proceed to prove Theorem 1.From the fact that probabilities of all the states with the same number of

clusters are the same it follows that

p1 = p2. (20)

From (4), (7)–(9) and (20) we obtain

p1(1− a)p = p1ar

1− rp(1− ap) + o(1), n → ∞, m/n → r. (21)

Passing to the limit in (21) we obtain

p1(1− a)p = p1ar

1− rp(1− ap). (22)

From (22) we obtain the quadratic equation for a

a2rp− a + 1− r = 0. (23)

The solution of this equation, all values of which are not greater than 1, is

a = a(r, p) =1−

1− 4rp(1− r)

2rp. (24)

Some values of the second branch of the solution of equation (23) are greaterthan 1 and a pass from the first branch to the second one means that functionu(r, p) is discontinuous. In accordance with theory of Markov chain, steady stateprobabilities are unique and therefore solution (24) is unique.

8

BUSLAEV, TATASHEV: MONOTONIC RANDOM WALK

137

Page 138: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Recall u(r, p) = pa(r, p). Then (1) is true.Theorem 1 is proved.

Table 1 shows values of average velocity u(170, 170r) of particles for n = 170and different values of p, r, and the corresponding limit values of u(p, r).

Table 1. Average velocity u(170, 170r) (on the left) of particles for n = 170and different values of p, r, and the corresponding value of u(r, p) (on the right)

r = 0.1 r = 0.3 r = 0.5 r = 0.7 r = 0.9p = 0.1 0.091 0.091 0.072 0.072 0.052 0.051 0.031 0.031 0.010 0.010p = 0.3 0.279 0.278 0.226 0.225 0.164 0.163 0.097 0.097 0.031 0.031p = 0.5 0.474 0.472 0.399 0.397 0.294 0.293 0.171 0.170 0.053 0.052p = 0.7 0.677 0.676 0.599 0.597 0.454 0.452 0.257 0.256 0.075 0.075p = 0.9 0.890 0.889 0.845 0.843 0.686 0.684 0.362 0.361 0.099 0.099

4. Conclusion

In this paper the formula has been found for the average velocity of movementon a one-dimensional lattice as the limit case of random walk on a ring as thelength of the ring tends to infinity.

Acknowledgement

The work was supported by Dept. of Education and Science of Russia (Statecontract N 14.740.11.0397).

9

BUSLAEV, TATASHEV: MONOTONIC RANDOM WALK

138

Page 139: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

References

[1] Belyaev Yu.K., Zele U., A simplified model of movement without overtaking,Izv. AN SSSR, ser. Tekhn. kibernet., 1969, N 3, pp. 17–21.

[2] Blank M., Dynamics of traffic jams: order and chaos, Mosc. Math. J., 1:1,pp. 1-26 (2001).

[3] Blank M.L., Exact analysis of dynamical systems arising in models of trafficflow, Russian Mathematical Surveys, vol. 55, N 3 (333), pp. 167–168 (2000).

[4] Bugaev A.S., Buslaev A.P., Tatashev A.G., Monotone random walk of par-ticles on an integer number lane and LYuMen problem, Mat. modelirovanie,vol. 18, N 12, pp. 19–34 (2006).

[5] Bugaev A.S., Buslaev A.P., Tatashev A.G., Simulation of segregation of two-lane flow of particles, Mat. modelirovaniye, vol. 20, N 9, pp. 111–119 (2008).

[6] Bugaev A.S., Buslaev A.P., Tatashev A.G., Yashina M.V., Optimization ofpartially-connected flows for deterministic-stochastic model, Trudy MFTI,vol. 2, N 4, 2010. pp. 15–26 (8).

[7] Buslaev A.P., Novikov A.N., Prikhodko V.M., Tatashev A.G., Yashina M.V.,Stochastic and simulation approaches to optimization of road traffic, Moscow,Mir, 2003.

[8] Buslaev A.P., Prikhodko V.M., Tatashev A.G., Yashina M.V., Thedeterministic-stochastic flow model, arXiv: physics/ 0504139v1[physics/soc.-ph], vol. 20, Apr. 2005, pp. 1–21.

[9] Buslaev A.P., Tatashev A.G. Particles flow on the regular polygon, JCAAM,vol. 9, N 4, pp. 290–303 (2011).

[10] Inose H., Hamada T. Road Traffic Control. University of Tokyo Press, 1975.

[11] K. Nagel, M. Schreckenberg, A cellular automaton model for freeway traffic,J. Phys. I France, 2, pp. 1221–1229 (1992).

[12] Schreckenberg M., Schadschneider A., Nagel K., Ito N., Discrete stochasticmodels for traffic flow, Phys. Rev. E., vol. 51, pp. 2939–2949 (1995).

[13] Zele U. Generalizations of movement without overtaking, Izv. AN SSSR,ser. Tekhn. kibernet., 1972, N 5, pp. 100–103.

10

BUSLAEV, TATASHEV: MONOTONIC RANDOM WALK

139

Page 140: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

TABLE OF CONTENTS, JOURNAL OF CONCRETE AND

APPLICABLE MATHEMATICS, VOL. 10, NO.’S 1-2, 2012

The Method of Laplace and Watson’s Lemma, Richard A. Zalik,…….………………………11

On special strong differential subordinations using a generalized Salagean operator and Ruscheweyh derivative, Alina Alb Lupas,……….…………………………………………….17

A note on special strong differential subordinations using a multiplier transformation and Ruscheweyh derivative, Alina Alb Lupas,…………………………………………………….24

Global behavior of the max-type difference equation xn+1 = max ,

, Taixiang Sun,

Hongjian Xi, Bin Qin, ………………………………………………………………………...32

A General System of Quadratic Functional Equations in Non-Archimedean Fuzzy Menger Normed Spaces, M. B. Ghaemi and H. Majani,………………………………………………40

A Note on Horner's Method, Tian-Xiao He and Peter J.-S. Shiue,…………………………...53

Common Fixed Point Results with Applications in Convex Metric Spaces, Safeer Hussain Khan and Mujahid Abbas,………………………………………………………………………….. 65

Basic Hypergeometric Series and q-Harmonic Number Identities, Wenchang Chu,N.Gu,……………………………………………………………………………………..77

Some Relationship between the q-Genocchi Numbers and Bernstein Polynomials, N. S. Jung, H. Y. Lee, C. S. Ryoo,……………………………………………………………………………99

Some Theorems in Cone Metric Spaces, Duran Turkoglu, Muhib Abuloha, Thabet Abdeljawad,…………………………………………………………………………………..106

Stability of a mixed type additive and quadratic functional equation in random normed spaces, M. Eshaghi Gordji, M. Bavand Savadkouhi, J. M. Rassias,………………………………….117

Monotonic Random Walk on a One-Dimensional Lattice, Alexander P. Buslaev, A.G. Tatashev,………………………………………………………………………………………130

140

Page 141: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

VOLUME 10, NUMBERS 3-4 JULY-OCTOBER 2012 ISSN:1548-5390 PRINT,1559-176X ONLINE

JOURNAL

OF CONCRETE AND APPLICABLE MATHEMATICS EUDOXUS PRESS,LLC

141

Page 142: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

SCOPE AND PRICES OF THE JOURNAL Journal of Concrete and Applicable Mathematics A quartely international publication of Eudoxus Press,LLC Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis Memphis, TN 38152, U.S.A. [email protected]

Assistant to the Editor:Dr.Razvan Mezei,Lander University,SC 29649, USA. The main purpose of the "Journal of Concrete and Applicable Mathematics" is to publish high quality original research articles from all subareas of Non-Pure and/or Applicable Mathematics and its many real life applications, as well connections to other areas of Mathematical Sciences, as long as they are presented in a Concrete way. It welcomes also related research survey articles and book reviews.A sample list of connected mathematical areas with this publication includes and is not restricted to: Applied Analysis, Applied Functional Analysis, Probability theory, Stochastic Processes, Approximation Theory, O.D.E, P.D.E, Wavelet, Neural Networks,Difference Equations, Summability, Fractals, Special Functions, Splines, Asymptotic Analysis, Fractional Analysis, Inequalities, Moment Theory, Numerical Functional Analysis,Tomography, Asymptotic Expansions, Fourier Analysis, Applied Harmonic Analysis, Integral Equations, Signal Analysis, Numerical Analysis, Optimization, Operations Research, Linear Programming, Fuzzyness, Mathematical Finance, Stochastic Analysis, Game Theory, Math.Physics aspects, Applied Real and Complex Analysis, Computational Number Theory, Graph Theory, Combinatorics, Computer Science Math.related topics,combinations of the above, etc. In general any kind of Concretely presented Mathematics which is Applicable fits to the scope of this journal. Working Concretely and in Applicable Mathematics has become a main trend in many recent years,so we can understand better and deeper and solve the important problems of our real and scientific world. "Journal of Concrete and Applicable Mathematics" is a peer- reviewed International Quarterly Journal. We are calling for papers for possible publication. The contributor should send via email the contribution to the editor in-Chief: TEX or LATEX (typed double spaced) and PDF files. [ See: Instructions to Contributors]

Journal of Concrete and Applicable Mathematics(JCAAM) ISSN:1548-5390 PRINT, 1559-176X ONLINE. is published in January,April,July and October of each year by EUDOXUS PRESS,LLC, 1424 Beaver Trail Drive,Cordova,TN38016,USA, Tel.001-901-751-3553 [email protected] http://www.EudoxusPress.com. Visit also www.msci.memphis.edu/~ganastss/jcaam. Webmaster:Ray Clapsadle

142

Page 143: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Annual Subscription Current Prices:For USA and Canada,Institutional:Print $400,Electronic $250,Print and Electronic $450.Individual:Print $150, Electronic $80,Print &Electronic $200.For any other part of the world add $50 more to the above prices for Print. Single article PDF file for individual $15.Single issue in PDF form for individual $60. No credit card payments.Only certified check,money order or international check in US dollars are acceptable. Combination orders of any two from JoCAAA,JCAAM,JAFA receive 25% discount,all three receive 30% discount. Copyright©2012 by Eudoxus Press,LLC all rights reserved.JCAAM is printed in USA. JCAAM is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH. It is strictly prohibited the reproduction and transmission of any part of JCAAM and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes no responsibility for the content of published papers. JCAAM IS A JOURNAL OF RAPID PUBLICATION PAGE CHARGES: Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage.

143

Page 144: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Editorial Board

Associate Editors

Editor in -Chief: George Anastassiou Department of Mathematical Sciences The University Of Memphis Memphis,TN 38152,USA tel.901-678-3144,fax 901-678-2480 e-mail [email protected] www.msci.memphis.edu/~ganastss Areas:Approximation Theory, Probability,Moments,Wavelet, Neural Networks,Inequalities,Fuzzyness. Associate Editors: 1) Ravi Agarwal Florida Institute of Technology Applied Mathematics Program 150 W.University Blvd. Melbourne,FL 32901,USA [email protected] Differential Equations,Difference Equations, Inequalities 2) Carlo Bardaro Dipartimento di Matematica & Informatica Universita' di Perugia Via Vanvitelli 1 06123 Perugia,ITALY tel.+390755855034, +390755853822, fax +390755855024 [email protected] , [email protected] Functional Analysis and Approximation Th., Summability,Signal Analysis,Integral Equations, Measure Th.,Real Analysis 3) Francoise Bastin Institute of Mathematics University of Liege 4000 Liege BELGIUM [email protected] Functional Analysis,Wavelets 4) Yeol Je Cho

21) Gustavo Alberto Perla Menzala National Laboratory of Scientific Computation LNCC/MCT Av. Getulio Vargas 333 25651-075 Petropolis, RJ Caixa Postal 95113, Brasil and Federal University of Rio de Janeiro Institute of Mathematics RJ, P.O. Box 68530 Rio de Janeiro, Brasil [email protected] and [email protected] Phone 55-24-22336068, 55-21-25627513 Ext 224 FAX 55-24-22315595 Hyperbolic and Parabolic Partial Differential Equations, Exact controllability, Nonlinear Lattices and Global Attractors, Smart Materials 22) Ram N.Mohapatra Department of Mathematics University of Central Florida Orlando,FL 32816-1364 tel.407-823-5080 [email protected] Real and Complex analysis,Approximation Th., Fourier Analysis, Fuzzy Sets and Systems 23) Rainer Nagel Arbeitsbereich Funktionalanalysis Mathematisches Institut Auf der Morgenstelle 10 D-72076 Tuebingen Germany tel.49-7071-2973242 fax 49-7071-294322 [email protected] evolution equations,semigroups,spectral th., positivity 24) Panos M.Pardalos Center for Appl. Optimization University of Florida 303 Weil Hall P.O.Box 116595 Gainesville,FL 32611-6595 tel.352-392-9011 [email protected] Optimization,Operations Research

144

Page 145: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Department of Mathematics Education College of Education Gyeongsang National University Chinju 660-701 KOREA tel.055-751-5673 Office, 055-755-3644 home, fax 055-751-6117 [email protected] Nonlinear operator Th.,Inequalities, Geometry of Banach Spaces 5) Sever S.Dragomir School of Communications and Informatics Victoria University of Technology PO Box 14428 Melbourne City M.C Victoria 8001,Australia tel 61 3 9688 4437,fax 61 3 9688 4050 [email protected], [email protected] Math.Analysis,Inequalities,Approximation Th., Numerical Analysis, Geometry of Banach Spaces, Information Th. and Coding 6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451 fax.++39 051 2094490 [email protected] Partial Differential Equations, Control Theory, Differential Equations in Banach Spaces 7) Claudio A. Fernandez Facultad de Matematicas Pontificia Unversidad Católica de Chile Vicuna Mackenna 4860 Santiago, Chile tel.++56 2 354 5922 fax.++56 2 552 5916 [email protected] Partial Differential Equations, Mathematical Physics, Scattering and Spectral Theory 8) A.M.Fink Department of Mathematics Iowa State University Ames,IA 50011-0001,USA tel.515-294-8150

25) Svetlozar T.Rachev Dept.of Statistics and Applied Probability Program University of California,Santa Barbara CA 93106-3110,USA tel.805-893-4869 [email protected] AND Chair of Econometrics and Statistics School of Economics and Business Engineering University of Karlsruhe Kollegium am Schloss,Bau II,20.12,R210 Postfach 6980,D-76128,Karlsruhe,Germany tel.011-49-721-608-7535 [email protected] Mathematical and Empirical Finance, Applied Probability, Statistics and Econometrics 26) John Michael Rassias University of Athens Pedagogical Department Section of Mathematics and Infomatics 20, Hippocratous Str., Athens, 106 80, Greece Address for Correspondence 4, Agamemnonos Str. Aghia Paraskevi, Athens, Attikis 15342 Greece [email protected] [email protected] Approximation Theory,Functional Equations, Inequalities, PDE 27) Paolo Emilio Ricci Universita' degli Studi di Roma "La Sapienza" Dipartimento di Matematica-Istituto "G.Castelnuovo" P.le A.Moro,2-00185 Roma,ITALY tel.++39 0649913201,fax ++39 0644701007 [email protected],[email protected] Orthogonal Polynomials and Special functions, Numerical Analysis, Transforms,Operational Calculus, Differential and Difference equations 28) Cecil C.Rousseau Department of Mathematical Sciences The University of Memphis Memphis,TN 38152,USA tel.901-678-2490,fax 901-678-2480 [email protected] Combinatorics,Graph Th., Asymptotic Approximations, Applications to Physics 29) Tomasz Rychlik

145

Page 146: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

[email protected] Inequalities,Ordinary Differential Equations 9) Sorin Gal Department of Mathematics University of Oradea Str.Armatei Romane 5 3700 Oradea,Romania [email protected] Approximation Th.,Fuzzyness,Complex Analysis 10) Jerome A.Goldstein Department of Mathematical Sciences The University of Memphis, Memphis,TN 38152,USA tel.901-678-2484 [email protected] Partial Differential Equations, Semigroups of Operators 11) Heiner H.Gonska Department of Mathematics University of Duisburg Duisburg,D-47048 Germany tel.0049-203-379-3542 office [email protected] Approximation Th.,Computer Aided Geometric Design 12) Dmitry Khavinson Department of Mathematical Sciences University of Arkansas Fayetteville,AR 72701,USA tel.(479)575-6331,fax(479)575-8630 [email protected] Potential Th.,Complex Analysis,Holomorphic PDE, Approximation Th.,Function Th. 13) Virginia S.Kiryakova Institute of Mathematics and Informatics Bulgarian Academy of Sciences Sofia 1090,Bulgaria [email protected] Special Functions,Integral Transforms, Fractional Calculus 14) Hans-Bernd Knoop Institute of Mathematics Gerhard Mercator University D-47048 Duisburg Germany tel.0049-203-379-2676

Institute of Mathematics Polish Academy of Sciences Chopina 12,87100 Torun, Poland [email protected] Mathematical Statistics,Probabilistic Inequalities 30) Bl. Sendov Institute of Mathematics and Informatics Bulgarian Academy of Sciences Sofia 1090,Bulgaria [email protected] Approximation Th.,Geometry of Polynomials, Image Compression 31) Igor Shevchuk Faculty of Mathematics and Mechanics National Taras Shevchenko University of Kyiv 252017 Kyiv UKRAINE [email protected] Approximation Theory 32) H.M.Srivastava Department of Mathematics and Statistics University of Victoria Victoria,British Columbia V8W 3P4 Canada tel.250-721-7455 office,250-477-6960 home, fax 250-721-8962 [email protected] Real and Complex Analysis,Fractional Calculus and Appl., Integral Equations and Transforms,Higher Transcendental Functions and Appl.,q-Series and q-Polynomials, Analytic Number Th. 33) Stevo Stevic Mathematical Institute of the Serbian Acad. of Science Knez Mihailova 35/I 11000 Beograd, Serbia [email protected]; [email protected] Complex Variables, Difference Equations, Approximation Th., Inequalities 34) Ferenc Szidarovszky Dept.Systems and Industrial Engineering The University of Arizona Engineering Building,111 PO.Box 210020 Tucson,AZ 85721-0020,USA [email protected] Numerical Methods,Game Th.,Dynamic Systems,

146

Page 147: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

[email protected] Approximation Theory,Interpolation 15) Jerry Koliha Dept. of Mathematics & Statistics University of Melbourne VIC 3010,Melbourne Australia [email protected] Inequalities,Operator Theory, Matrix Analysis,Generalized Inverses 16) Robert Kozma Dept. of Mathematical Sciences University of Memphis Memphis, TN 38152, USA [email protected]

Mathematical Learning Theory,

Dynamic Systems and Chaos,

Complex Dynamics.

17) Mustafa Kulenovic Departm ent of Mathematics University of Rhode Island Kingston,RI 02881,USA [email protected] Differential and Difference Equations 18) Gerassimos Ladas Department of Mathematics University of Rhode Island Kingston,RI 02881,USA [email protected] Differential and Difference Equations 19) V. Lakshmikantham Department of Mathematical Sciences Florida Institute of Technology Melbourne, FL 32901 e-mail: [email protected] Ordinary and Partial Differential Equations, Hybrid Systems, Nonlinear Analysis 20) Rupert Lasser Institut fur Biomathematik & Biomertie,GSF -National Research Center for environment and health Ingolstaedter landstr.1 D-85764 Neuherberg,Germany [email protected] Orthogonal Polynomials,Fourier Analysis, Mathematical Biology

Multicriteria Decision making, Conflict Resolution,Applications in Economics and Natural Resources Management 35) Gancho Tachev Dept.of Mathematics Univ.of Architecture,Civil Eng. and Geodesy 1 Hr.Smirnenski blvd BG-1421 Sofia,Bulgaria [email protected] Approximation Theory 36) Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock Germany [email protected] Approximation Th.,Wavelet,Fourier Analysis, Numerical Methods,Signal Processing, Image Processing,Harmonic Analysis 37) Chris P.Tsokos Department of Mathematics University of South Florida 4202 E.Fowler Ave.,PHY 114 Tampa,FL 33620-5700,USA [email protected],[email protected] Stochastic Systems,Biomathematics, Environmental Systems,Reliability Th. 38) Lutz Volkmann Lehrstuhl II fuer Mathematik RWTH-Aachen Templergraben 55 D-52062 Aachen Germany [email protected] Complex Analysis,Combinatorics,Graph Theory

147

Page 148: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Instructions to Contributors

Journal of Concrete and Applicable Mathematics A quartely international publication of Eudoxus Press, LLC, of TN.

Editor in Chief: George Anastassiou

Department of Mathematical Sciences University of Memphis

Memphis, TN 38152-3240, U.S.A.

1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves. 2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.

148

Page 149: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corrolaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,

149

Page 150: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990). Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986. Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495. 11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears. 15. This journal will consider for publication only papers that contain proofs for their listed results.

150

Page 151: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

A New Approach of Statistical Hypothesis VerificationIuliana F IATAN

Abstract

A new approach of statistical hypothesis verification is proposed. We shallprove a theorem which allow us to express our likelihood ratio test. Sinceits distribution is difficult to calculate we shall use the simulation with ouralgorithm in order to determine the critical value of the generalized likelihoodratio.

Keywords: hypothesis verification, parameter space, critical value, gen-eralized likelihood ratio,

1 Introduction

The paper is organized as follows. The first section gives a brief review of thepaper. The second section presents the proposed approach of statistical hypothesisverification. The third section focuses on computing critical value of the generalizedlikelihood ratio. The sections 4 introduces an algorithm for two classes comparing.The section 5 presents some conclusions of this paper. The paper one finishes withits references.

Assume that we have:

• a selection X(1)1 , . . . , X

(1)N1

on a random vector X(1) ∼ N (µ(1),Σ(1)) and

• a selection X(2)1 , . . . , X

(2)N2

on a random vector X(2) ∼ N (µ(2),Σ(2)),

where µ(1), µ(2),Σ(1),Σ(2) unknown parameters, µ(1), µ(2) being d × 1 vectors andΣ(1),Σ(2) being a d× d definite positive matrix.

We propose to verify the hypothesis

H0 : µ(1) = µ(2), Σ(1) = Σ(2).

The critical value Vα of our likelihood ratio test V (which is used for testing ofthe hypothesis H0) has to be determined such that P (V ≤ Vα|H0) = α, α beingthe risk of first order which has to be small. We shall prove a theorem which allowus to express V . Since the distribution of this ratio V is difficult to calculate weshall use the simulation with our algorithm in order to determine the critical valueVα of the generalized likelihood ratio.

2 Hypothesis Verification Concerning the Identityof Two Normal Distribution

We denote by:

• Ω the parameter space where Σ(1),Σ(2) are d× d defined positive matrices,

• Ω1 is a subset of the parameter space for which Σ(1) = Σ(2),

• Ω2 is a subset of the parameter space for which Σ(1) = Σ(2) and µ(1) = µ(2).

1

151

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,151-158,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 152: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Proposition[4] We consider the hypotheses

H1 : Σ(1) = Σ(2), µ(1) 6= µ(2),

H2 : Σ(1) = Σ(2), µ(1) = µ(2),

H12 : µ(1) = µ(2), Σ(1) 6= Σ(2).

If l1, l2 and l12 are the likelihood ratios for verification of the hypotheses H1,H2

and respective H12, then

l12 = l1l2.

Proof:The likelihood function is

L =1

(2π)d2 (N1+N2) · |Σ(1)|

N12 · |Σ(2)|

N22

·exp

[−1

2

N1∑α=1

(X(1)α − µ(1)

)t(Σ(1))−1

(X(1)α − µ(1)

)]·

· exp

[−1

2

N2∑α=1

(X(2)α − µ(2)

)t(Σ(2))−1

(X(2)α − µ(2)

)]. (1)

The maximum likelihood estimates of parameter with respect to Ω are:

µ(j) = X(j)

=1

Nj

Nj∑i=1

Xi(j), j = 1, 2,

Σ(j) =1

Nj

Nj∑i=1

(Xi

(j) −X(j))(

Xi(j) −X(j)

)t, j = 1, 2,

or

Σ(j) =1

NjSj , j = 1, 2. (2)

where

Sj =

Nj∑i=1

(Xi

(j) −X(j))(

Xi(j) −X(j)

)t, j = 1, 2. (3)

The maximum value of the likelihood function from (1) with respect to Ω is

LΩ =1

(2π)d2 (N1+N2) · |Σ(1)|

N12 · |Σ(2)|

N22

·exp

[−1

2

N1∑α=1

(X(1)α −X

(1))t

(Σ(1))−1(X(1)α −X

(1))]·

· exp

[−1

2

N2∑α=1

(X(2)α −X

(2))t

(Σ(2))−1(X(2)α −X

(2))]

. (4)

Taking into account [4] that

2

IATAN: STATISTICAL HYPOTHESIS

152

Page 153: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

−1

2

N1∑α=1

(X(1)α −X

(1))t

(Σ(1))−1(X(1)α −X

(1))

= −N1

2d

and respectively

−1

2

N2∑α=1

(X(2)α −X

(2))t

(Σ(2))−1(X(2)α −X

(2))

= −N2

2d

the relation (4) may be written in the form

LΩ =1

(2π)d2 (N1+N2) · |Σ(1)|

N12 · |Σ(2)|

N22

· e−N1

2 d · e−N2

2 d;

therefore

LΩ =1

(2π)d2N · |Σ(1)|

N12 · |Σ(2)|

N22

· e−N2 d, (5)

where N = N1 +N2.With respect to Ω1, the maximum value of the likelihood function is

LΩ1=

1

(2π)d2N · |Σ|

N2

· exp

[−1

2

N1∑α=1

(X(1)α −X

(1))t

Σ−1(X(1)α −X

(1))]·

· exp

[−1

2

N2∑α=1

(X(2)α −X

(2))t

Σ−1(X(2)α −X

(2))]

, (6)

where

µ(j) = X(j), j = 1, 2,

Σ(1) = Σ(2) = Σ =1

NS;

we have used the notation

S = S1 + S2, (7)

with S1 and S2 from (3).With respect to Ω2, the maximum value of the likelihood function is

LΩ2=

1

(2π)d2N · |Σ∗|

N2

· exp

[−1

2

N1∑α=1

(X(1)α −X

)t(Σ∗)−1

(X(1)α −X

)]·

· exp

[−1

2

N2∑α=1

(X(2)α −X

)t(Σ∗)−1

(X(2)α −X

)], (8)

where

3

IATAN: STATISTICAL HYPOTHESIS

153

Page 154: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

µ(1) = µ(2) = X,

Σ∗ =1

NS∗, (9)

and

S∗ =

N1∑α=1

(X(1)α −X

)(X(1)α −X

)t+

N2∑α=1

(X(2)α −X

)(X(2)α −X

)t.

Since, keeping with [4] we have

N1∑α=1

(X(1)α −X

)t(Σ∗)−1

(X(1)α −X

)+

N2∑α=1

(X(2)α −X

)t(Σ∗)−1

(X(2)α −X

)= Nd,

we deduce

LΩ2=

1

(2π)d2N · |Σ∗|

N2

· e−N2 d. (10)

We can write

S∗ =

N1∑α=1

(X(1)α −X

(1)+X

(1) −X)(

X(1)α −X

(1)+X

(1) −X)t

+

+

N2∑α=1

(X(2)α −X

(2)+X

(2) −X)(

X(2)α −X

(2)+X

(2) −X)t

=

=

N1∑α=1

(X(1)α −X

(1))(

X(1)α −X

(1))t

+N1

(X

(1) −X)(

X(1) −X

)t+

+

N2∑α=1

(X(2)α −X

(2))(

X(2)α −X

(2))t

+N2

(X

(2) −X)(

X(2) −X

)t. (11)

Based on the relation (7), from (11) we deduce

S∗ = S +N1

(X

(1) −X)(

X(1) −X

)t+N2

(X

(2) −X)(

X(2) −X

)t. (12)

Since l1, l2 and l12 are the likelihood ratios for verification of the hypothesesH1,H2 respective H12 it results

l1 =LΩ1

LΩ,

l2 =LΩ2

LΩ1

,

l12 =LΩ2

LΩ.

4

IATAN: STATISTICAL HYPOTHESIS

154

Page 155: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

We obtain

l1l2 =LΩ1

LΩ· LΩ2

LΩ1

=LΩ2

LΩ= l12. (13)

Substituting (5) and (10) into (13) we shall obtain

l12 =

1

(2π)d2N ·|Σ∗|

N2· e−N

2 d

1

(2π)d2N ·|Σ(1)|

N12 ·|Σ(2)|

N22

· e−N2 d

=|Σ(1)|

N12 · |Σ(2)|

N22

|Σ∗|N2

. (14)

Using (9) and (2) in (14) we deduce

l12 =|S1|

N12 · |S2|

N22

NN1d

21 ·N

N2d

22

· |S∗|

N2

NNd2

.

3 Computing Critical Value of the Generalized Like-lihood Ratio

The critical value lα of the likelihood ratio test l (which is used for testing of thehypothesis H0) has to be determined such that P (l ≤ lα|H0) = α, α being the riskof first order which has to be small.

From [4] we know that

V2 =|S| 12n

|S∗|12n

= ln/N2 ,

where n = n1 + n2, and nj = Nj − 1, j = 1, 2 is the same with the likelihood ratiofor verification of the hypothesis H2.

It results that for verification of the hypothesis H0 we can use the statistic

V = V1V2 =|S1|

12n1 · |S2|

12n2

|S∗|12n

. (15)

instead of the statistic l.The distribution of this ratio V is difficult to calculate since:

• |S1|, |S2|, |S∗| are generalized dispersions (see [7]); their distributions don’thave a form which can permit us to calculate the critical values ;

• |S1|, |S2| and |S∗| are not independently.

Therefore, in order to determine the critical value Vα of the generalized likelihoodratio such that

P (V ≤ Vα|H0) = α,

(α being the risk of first order which has to be small) one use the simulation withthe following algorithm:

5

IATAN: STATISTICAL HYPOTHESIS

155

Page 156: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Algorithm 1Step 0. Inputs N1, N2, µ

(1), µ(2),Σ(1),Σ(2), d.

Step 1. Generate X(1)1 , . . . , X

(1)N1∼ N (µ(1),Σ(1)).

Step 2. Generate X(2)1 , . . . , X

(2)N2∼ N (µ(2),Σ(2)).

Step 3. Generate S1, S2 using (3).Step 4. Calculate S∗ using the relation (12).Step 5. Calculate |S1|, |S2|.Step 6. Calculate |S∗|.Step 7. Calculate V with (15).Step 8. We have to repeat for m times the steps 1-7 (for example m ≥ 2000) andwe shall obtain the selection l1, l2, . . . lm.Step 9. We construct a histogram with l1, l2, . . . lm (see [7]) such as:

Step 9.1. We choose a positive integer k which represents the number of thehistogram intervals I1, I2, . . . Ik.

Step 9.2. We determine the absolute frequencies f1, f2, . . . fk, namely the numberof the selection values which are in the interval Ij , 1 ≤ j ≤ k.

Step 9.3. We determine the relative frequencies r1, r2, . . . rk, ri = fim , 1 ≤ i ≤ k.

The graph from the Figure 1 represents the form of selection histogram l1, l2, . . . lmwhich one obtains by simulation.

Figure 1. Histogram

The critical value for our test Vα one chooses such that the sum of rectangle areafrom the left side of lα is α, where α = P (V ≤ Vα) is the risk of the first kind.

4 An Algorithm for Two Classes Comparing

In this section we shall describe an algorithm which can classify some new givend- dimensional objects, Y1, ..., YK drawn from N (µ,Σ), testing if they apart intoone of the two classes C1 or C2.

The class C1 contains N1 vectors: X(1)1 , . . . , X

(1)N1

while the class C2 contains N2

vectors: X(2)1 , . . . , X

(2)N2

.

Algorithm 2Step 0. Input K,N1, N2, µ, µ

(1), µ(2),Σ,Σ(1),Σ(2), d.Step 1. We generate Y1, ..., YK ∼ N (µ,Σ).Step 2. We verify the hypothesis:

6

IATAN: STATISTICAL HYPOTHESIS

156

Page 157: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

H0: µ1 = µ2, Σ(1) = Σ(2)

using the Algorithm 1.In the case when the hypothesis isn’t true we have to go to Step 4.Otherwise, go to Step 3.

Step 3. For i := 1 to Kdo beginWe test the null hypothesis

H : Yi, X(1)1 , . . . , X

(1)N1

are drawn from N (µ(1),Σ(1))against the alternative hypothesis

NH : X(1)1 , . . . , X

(1)N1

are drawn from N (µ(1),Σ(1)), µ 6= µ1

using [3] the Algorithm 3.1;end

Step 4. We verify the hypothesis:H0: Σ(1) = Σ(2), µ1 6= µ2, see [7], [4].In the case when the hypothesis is true we have to go to Step 5.Otherwise, go to Step 6.

Step 5. For i := 1 to Kdo beginWe test the null hypothesis

H : Yi, X(1)1 , . . . , X

(1)N1

are drawn from N (µ(1),Σ) and

X(2)1 , . . . , X

(2)N2

are drawn from N (µ(2),Σ),

against the alternative hypothesis

NH : X(1)1 , . . . , X

(1)N1

are drawn from N (µ(1),Σ) and

Yi, X(2)1 , . . . , X

(2)N2

are drawn from N (µ(2),Σ),

using [3] the Algorithm 3.2;end

Step 6. We verify the hypothesis:

• H0: µ = µ(1), Σ = Σ(1)

• H′0: µ = µ(2), Σ = Σ(2)

using the Algorithm 1.If one of the hypotheses is true, namely if the new objects belong to the same

class C1 or C2 then the algorithm one finishes.If either of the hypotheses is not true, namely if the new objects don’t belong to

the same class C1 or C2 then go to Step 7.Step 7. For i := 1 to K

do beginWe test the null hypothesis

H : Yi, X(1)1 , . . . , X

(1)N1

are drawn from N (µ(1),Σ(1)) and

X(2)1 , . . . , X

(2)N2

are drawn from N (µ(2),Σ(2)),

7

IATAN: STATISTICAL HYPOTHESIS

157

Page 158: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

against the alternative hypothesis

NH : X(1)1 , . . . , X

(1)N1

are drawn from N (µ(1),Σ(1)) and

Yi, X(2)1 , . . . , X

(2)N2

are drawn from N (µ(2),Σ(2)),

using [3] the Algorithm 3.3.end

5 Conclusions

The paper discusses a new approach of statistical hypothesis verification. We haveproved a theorem which allow us to express our likelihood ratio test. Since itsdistribution is difficult to calculate we have used the simulation with our algorithmin order to determine the critical value of the generalized likelihood ratio. Thisalgorithm is used in order to construct a complex algorithm for two classes compar-ing. In conclusion, the classification problem of the new given objects Y1, ..., YK ,drawn from N (µ,Σ) is a complex problem which one reduces to application of theAlgorithm 1 and Algorithms 3.1, 3.2 or 3.3 (see [3]).

6 Acknowledgment

This work was supported by the strategic grant POSDRU/89/1.5/S/58852, Project”Postdoctoral programme for training scientific researchers” cofinanced by the Eu-ropean Social Found within the Sectorial Operational Program Human ResourcesDevelopment 2007-2013.

References

[1] C. M. Bishop, Pattern Recognition and Machine Learning, Springer, Heidel-berg (2006).

[2] I. Iatan, On the Generalized Test Likelihood Ratio for Multivariate NormalDistribution Applied to Classification, Journal of Concrete and ApplicableMathematics, 6(2), 145–152 (2008).

[3] I. Iatan, Statistical Methods for Pattern Recognition, Lambert Academic Pub-lishing AG & Co. KG, Saarbrucken, Germany (2010).

[4] Gh. Mihoc and V. Craiu Treatise of Mathematical Statistics. Testing StatisticalHypotheses, vol. 2, Ed. Academy of Bucharest (1977).

[5] Y. S. Qin and B. Smith, The likelihood ratio test for homogeneity in bivariatenormal mixtures, Journal of Multivariate Analysis, 97(2), 474–491 (2006).

[6] S. Theodoridis and K. Koutroumbas, Pattern Recognition, Elsevier (2009).

[7] I. Vaduva, Simulation Models, Ed. University of Bucharest (2004).

8

IATAN: STATISTICAL HYPOTHESIS

158

Page 159: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Elements of right delta fractional Calculus onTime Scales

George A. AnastassiouDepartment of Mathematical Sciences

University of MemphisMemphis, TN 38152, [email protected]

Abstract

Here we develop the right delta fractional calculus on time scales.

2010 AMS Subject Classication : 26A33, 39A12, 93C70.Keywords and phrases: Fractional Calculus on Time Scales.

1 Background

For the basics of times scales please read [1], [2], [3], [5], [7], [8], [9], [10], [11],[12], [13].Let T be a time scale, and ([9], p. 38) gk; hk : T2 ! R, k 2 N0 = N [ f0g,

s; t 2 T : g0 (t; s) = h0 (t; s) = 1,

gk+1 (t; s) =

Z t

s

gk ( () ; s) ; (1)

hk+1 (t; s) =

Z t

s

hk ( ; s) , 8 s; t 2 T:

We havehk (t; s) = hk1 (t; s) , (2)

gk (t; s) = gk1 ( (t) ; s) , k 2 N, t 2 Tk:

Alsog1 (t; s) = h1 (t; s) = t s; 8 s; t 2 T: (3)

Here gk, hk are continuous in t.

1

159

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,159-167,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 160: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Example 1 (see [9], p. 39-40)i) When T = R,

gk (t; s) = hk (t; s) =(t s)k

k!; 8 s; t 2 R: (4)

ii) When T = Z, we get

hk (t; s) =(t s)(k)

k!;

and

gk (t; s) =(t s+ k 1)(k)

k!; (5)

furthermore it holds

hk (t; s) = (1)k gk (s; t) ; k 2 N0, 8 s; t 2 Z. (6)

We need

Theorem 2 ([9], p. 45) We have that

hn (t; s) = (1)n gn (s; t) ; (7)

for every t 2 T and every s 2 Tkn :If T = Tk, then (7) is true for every s; t 2 T.

We need delta Taylor formula on time scales.

Theorem 3 ([6], [11]) Assume T = Tk, f 2 Cmrd (T), m 2 N, s; t 2 T. Then

f (t) =

m1Xk=0

fk

(s)hk (t; s) +Rsm (f) (t) ; (8)

where

Rsm (f) (t) =

Z t

s

hm1 (t; ()) fm

() : (9)

We notice that

Rsm (f) (t) = Z s

t

hm1 (t; ()) fm

()

(7)= (1)m

Z s

t

gm1 ( () ; t) fm

() : (10)

In this article we assume T = Tk:We make

2

ANASTASSIOU: RIGHT DELTA FRACTIONAL CALCULUS

160

Page 161: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Denition 4 Let 0. We consider the continuous functions

g : T2 ! R :

g0 (t; s) = 1;

g+1 (t; s) =

Z t

s

g ( () ; s) ; 8 s; t 2 T: (11)

We are motivated a lot by the formulaZ x

t

(x s)1

()

(s t)1

()ds =

(x t)+1

(+ ); (12)

where ; > 0 and is the gamma function.

Assumption 5 Let ; > 1 and x t , x; t; 2 T: We assume thatZ ()

x

g1 ( (t) ; x) g1 ( () ; t)t = g+1 ( () ; x) : (13)

We call for ; > 1 and x t ,

(x; ) :=

Z ()

g1 ( (t) ; x) g1 ( () ; t)t: (14)

By Theorem 1.75, p. 28, [9] for f 2 Crd (T) and t 2 Tk, we haveZ (t)

t

f () = (t) f (t) ; (15)

where (t) := (t) t:So by (15) we get that

(x; ) = g1 ( () ; x) g1 ( () ; ) () : (16)

Denition 6 Let f 2 L1 ([a; b) \ T). We dene the right forward graininessdeviation functional of f as follows:

E (f; ; ; b;T; x) =Z b

x

f () (x; ) = (17)

Z b

x

f () g1 ( () ; x) g1 ( () ; ) () :

If T = R, then () = 0 and hence E (f; ; ; b;R; x) = 0:

3

ANASTASSIOU: RIGHT DELTA FRACTIONAL CALCULUS

161

Page 162: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

2 Results

We give

Denition 7 Let a; b 2 T, 1 and f : [a; b]\T! R. Here f 2 L1 ([a; b) \ T)(Lebesgue -integrable function on [a; b)\T). We dene the right -Riemann-Liouville type fractional integral

Ibf (t) :=

Z b

t

g1 ( () ; t) f () ; (18)

for t 2 [a; b] \ T. HereR bt =

R[t;b)

:

By [8] we get that I1bf (t) =R btf () is absolutely continuous in t 2

[a; b] \ T.

Lemma 8 Let > 1, f 2 L1 ([a; b) \ T), f : [a; b] \ T ! R. Assume thatg1 ( () ; t) is Lebesgue -measurable on ([a; b] \ T)2; a; b 2 T. Then Ibf 2L1 ([a; b] \ T), that is Ibf is nite a.e.

Proof. By Tietzes extension theorem of General Topology we easily derivethat the continuous function g1 on ([a; b] \ T)2 is bounded, since its contin-uous extension F1 on [a; b]

2 is bounded. Notice here ([a; b] \ T)2 is a closedsubset of [a; b]2.So there exists M > 0 such that jga1 (s; t)j M , 8 (s; t) 2 ([a; b] \ T)2 :Let here id denote the identity map. We see that

(; id) (([a; b) \ T) ([a; b] \ T)) ([a; b] \ T)2 :Therefore jg1 ( () ; t)j M , 8 ( ; t) 2 ([a; b) \ T) ([a; b] \ T) ; since

( () ; t) 2 ([a; b] \ T)2 :Dene K : := ([a; b] \ T)2 ! R, by

K ( ; t) :=

g1 ( () ; t) , if a t < b;0, if a < t b;

where t; 2 T.Clearly hereK is Lebesgue-measurable on , since the restriction of a mea-

surable function to a measurable subset of its domain is a measurable function,and the union of two measurable functions over disjoint domains is measurable.Notice here that jK ( ; t)j M , 8 ( ; t) 2 ([a; b] \ T)2.Next we consider the repeated double Lebesgue -integralZ b

a

Z b

a

jK ( ; t)j jf ()jt! =

Z b

a

jf ()j Z b

a

jK ( ; t)jt!

4

ANASTASSIOU: RIGHT DELTA FRACTIONAL CALCULUS

162

Page 163: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

M (b a)Z b

a

jf ()j =M (b a) kfkL1([a;b)\T) <1:

By Tonellis theorem we derive that ( ; t) ! K ( ; t) f () is Lebesgue -integrable over :Let now the characteristic function

[t;b) () =

1; if 2 [t; b)0, else,

where 2 [a; b] \ T.Then the function ( ; t) ! [t;b) ()K ( ; t) f () is Lebesgue -integrable

over .Hence by Fubinis theorem we get thatZ b

a

[t;b) ()K ( ; t) f () =

Z b

t

g1 ( () ; t) f () = Ibf (t)

is Lebesgue -integrable on [a; b] \ T, proving the claim.From now on we make

Assumption 9 We suppose that g1 ( () ; ) is continuous on ([a; b] \ T)2,for any > 1:

We give the following semigroup property of right -Riemann-Liouville typefractional integrals.

Theorem 10 Let a; b 2 T, f 2 L1 ([a; b) \ T) ; ; > 1: Then

IbIbf (x) = I

+b f (x) E (f; ; ; b;T; x) ; 8 x 2 [a; b] \ T: (19)

Proof. Here we have

Ibf (t) =

Z b

t

g1 ( () ; t) f () :

We observe that

IbIbf (x) =

Z b

x

g1 ( (t) ; x) Ibf (t)t =

Z b

x

g1 ( (t) ; x)

Z b

t

g1 ( () ; t) f ()

!t =

Z b

x

Z b

t

g1 ( (t) ; x) g1 ( () ; t) f ()

!t =: () :

5

ANASTASSIOU: RIGHT DELTA FRACTIONAL CALCULUS

163

Page 164: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Clearly here it holds

jg1 ( (t) ; x)j M1; 8 t; x 2 [a; b] \ T;

andjg1 ( () ; t)j M2; 8 ; t 2 [a; b] \ T;

where M1;M2 > 0.HenceIbIbf (x) Z b

x

Z b

t

jg1 ( (t) ; x)j jg1 ( () ; t)j jf ()j!t

M1M2

Z b

x

Z b

t

jf ()j!t

!M1M2

Z b

x

Z b

a

jf ()j!t

!

M1M2 (b a) kfkL1([a;b)\T) <1:

So that IbIbf (x) exists, 8 x 2 [a; b] \ T. Consequently by Fubinis theorem

we have

() =Z b

x

Z

x

g1 ( (t) ; x) g1 ( () ; t) f ()t

=

Z b

x

f ()

Z

x

g1 ( (t) ; x) g1 ( () ; t)t

(here x t < )

=

Z b

x

f ()

Z ()

x

g1 ( (t) ; x) g1 ( () ; t)t

Z ()

g1 ( (t) ; x) g1 ( () ; t)t

!

by ((13), (14))=

Z b

x

g+1 ( () ; x) f () Z b

x

f () (x; )

= I+b f (x)Z b

x

f () (x; )

(17)= I+b f (x) E (f; ; ; b;T; x) ;

proving the claim (19).We make

6

ANASTASSIOU: RIGHT DELTA FRACTIONAL CALCULUS

164

Page 165: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Remark 11 Let > 2 : m 1 < m, m 2 N, i.e. m = de (ceilingof the number), e = m (0 e < 1). Let f 2 Cmrd ([a; b] \ T). Clearlyhere ([10]) f

m

is Lebesgue -integrable function. We dene the right deltafractional derivative on T of order 1 as follows

1b f (t) = (1)mIe+1b f

m(t) = (1)m

Z b

t

ge ( () ; t) fm

() ; (20)

8 t 2 [a; b] \ T.Notice 1b f 2 C ([a; b] \ T), by a simple argument using the dominated

convergence theorem in Lebesgue -sense.If = m, then e = 0, thenm1b f (t) = (1)m

Z b

t

fm

() = (1)mf

m1(b) f

m1(t): (21)

More generally, by [8], given that fm1

is everywhere nite and absolutelycontinuous on [a; b] \ T, then fm

exists -a.e. and is Lebesgue -integrableon [t; b) \ T, 8 t 2 [a; b] \ T, and one can plug it into (20).

Remark 12 We observe thatI1b 1b f

(t) = (1)m

I1b Ie+1b f

m(t)

(19)= (1)m

I1+e+1b f

m(t) E

f

m

; 1; e + 1; b;T; t= (1)m

Imbf

m(t) E

f

m

; 1; e + 1; b;T; t : (22)

Therefore I1b 1b f

(t) + (1)mE

f

m

; 1; e + 1; b;T; t =(1)m

Imbf

m

(t)= (1)m

Z b

t

gm1 ( () ; t) fm

() (23)

(10)= Rbm (f) (t) :

Now we can use (8) with s = b:

We have established the following delta time scales right fractional Taylorformula.

Theorem 13 Assume T = Tk, f 2 Cmrd (T), m 2 N, a; b 2 T, and > 2 :

m 1 < m, e = m ; also suppose Assumption 5, Assumption 9. Thenf (t) =

m1Xk=0

fk

(b)hk (t; b) +I1b 1b f

(t)+

7

ANASTASSIOU: RIGHT DELTA FRACTIONAL CALCULUS

165

Page 166: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

(1)mEf

m

; 1; e + 1; b;T; t ; (24)

8 t 2 [a; b] \ T.

Remark 14 One can rewrite (24) as follows

f (t) =m1Xk=0

fk

(b)hk (t; b) +

Z b

t

g2 ( () ; t)1b f

()

+(1)mZ b

t

fm

() g2 ( () ; t) ge ( () ; ) () ; (25)

8 t 2 [a; b] \ T:

Corollary 15 In the assumptions of Theorem 13, additionally assume thatf

k

(b) = 0, k = 0; 1; :::;m 1. Then

B (t) := f (t) + (1)m+1Ef

m

; 1; e + 1; b;T; t=

Z b

t

g2 ( () ; t)1b f

() ; (26)

8 t 2 [a; b] \ T:

Remark 16 Notice (by [8]) thatI1b 1b f

(t) and E(f

m

; 1; e + 1; b;T; t) are absolutely continuous functions on [a; b] \ T.

One can use (25) and (26) to establish right fractional delta inequalities ontime scales of Poincaré type, Sobolev type, Opial type, Ostrowski type, Hilbert-Pachpatte type, etc, analogous to [4].To keep article short we avoid this similar task.Our theory is not void because it is fullled when T = R, etc, see also [4].

References

[1] R. Agarwal, M. Bohner, Basic Calculus on time scales and some of itsapplications, Results Math. 35(1999), no. 1-2, 3-22.

[2] R. Agarwal, M. Bohner, A. Peterson, Inequalities on time scales: a survey,Math. Inequalities & Applications, Vol. 4 no. 4, (2001), 535-557.

[3] G. Anastassiou, Time Scales Inequalities, Inter. J. of Di¤erence Equations,5, no. 1 (2010), 1-23.

[4] G. Anastassiou, Principles of Delta Fractional Calculus on Time Scalesand Inequalities, Mathematical and Computer Modelling, 52(3-4) (2010),556-566.

8

ANASTASSIOU: RIGHT DELTA FRACTIONAL CALCULUS

166

Page 167: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

[5] M. Bohner, G.S. Guseinov, Multiple Lebesgue integration on time scales,Advances in Di¤erence Equations, Vol. 2006, Article ID 26391, pp. 1-12,DOI 10.1155/ADE/2006/26391.

[6] M. Bohner, G. Guseinov, The Convolution on time scales, Abstract andApplied Analysis, Vol. 2007, Article ID 58373, 24 pages.

[7] M. Bohner, G. Guseinov, Double integral calculus of variations on timescales, Computers and Mathematics with Applications, 54 (2007), 45-57.

[8] M. Bohner, H. Luo, Singular second-order multipoint dynamic boundaryvalue problems with mixed derivatives, Advances in Di¤erence Equations,Vol. 2006, Article ID 54989, p. 1-15, DOI 10.1155/ADE/2006/54989.

[9] M. Bohner, A. Peterson, Dynamic equations on time scales: An Introduc-tion with Applications, Birkhaüser, Boston (2001).

[10] G. Guseinov, Integration on time scales, J. Math. Anal. Appl., 285 (2003),107-127.

[11] R. Higgins, A. Peterson, Cauchy functions and Taylors formula for Timescales T, (2004), in Proc. Sixth. Internat. Conf. on Di¤erence equations,edited by B. Aulbach, S. Elaydi, G. Ladas, pp. 299-308, New Progress inDi¤erence Equations, Augsburg, Germany, 2001, publisher: Chapman &Hall / CRC.

[12] S. Hilger, Ein Maßketten kalkül mit Anwendung auf Zentrumsmannig-faltigkeiten, PhD. thesis, Universität Würzburg, Germany (1988).

[13] Wenjun Liu, Quôc Anh Ngô, Wenbing Chen, Ostrowski type inequalities ontime scales for double integrals, Acta Appl. Math., 106(2009), 229-239.

9

ANASTASSIOU: RIGHT DELTA FRACTIONAL CALCULUS

167

Page 168: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Center manifolds for some partial functionaldifferential equations with infinite delay in fading

memory spaces1

Mostafa ADIMY?, Khalil EZZINBI† and Catherine MARQUET‡

?INRIA, Dracula team, Institut Camille JordanCNRS UMR 5208, Universite Claude Bernard Lyon 1

43 boulevard du 11 novembre 191869622 Villeurbanne cedex, France

†Universite Cadi AyyadFaculte des Sciences Semlalia

Departement de Mathematiques, B.P. 2390Marrakesh, Morocco

‡Universite de Pau et des Pays de l’AdourLaboratoire de Mathematiques Appliquees CNRS UMR 5142

Avenue de l’universite 64000Pau, France

Abstract. We study the existence of a center manifold for some semilinear partial func-tional differential equations with infinite delay in fading memory spaces. We assume thatthe unbounded linear part of the equation satisfies the Hille-Yosida condition. The exis-tence of this centre manifold is obtained, under sufficiently small nonlinearity, as the graphof a fixed point for an integral operator given by a variation-of-constants formula. Weuse a new reduction principle to prove that the flow on the center manifold is completelydetermined by an ordinary differential equation in a finite dimensional space. When thenonlinear perturbation is only locally Lipschitzian, we obtain the existence of a localcenter manifold.

Keys words: Partial differential equations, infinite delay, Hille-Yosida operator, integralsolution, semigroup, variation-of-constants formula, fading memory space, center mani-fold, reduction principle.

2000 Mathematical Subject Classification: 34K17, 34K19, 34K20, 34K30, 34G20,47D06.

1This research is supported by Grant from CNRST (Morocco) and CNRS (France) Ref. CNRS/CNRST(projet N 21575).

[email protected], †[email protected], ‡[email protected]

1

168

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,168-185,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 169: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

2

1. Introduction

In this paper we prove the existence of a center manifold for the following class ofpartial functional differential equations with infinite delay

(1.1)

d

dtu(t) = Au(t) + L(ut) + g(ut), t ≥ σ, σ ∈ lR,

uσ = ϕ ∈ B,

where A : D (A) → E is a linear operator defined on a Banach space (E, |.|). We supposethat A satisfies the following Hille-Yosida condition.

(H1) There exist ω ∈ R and M0 ≥ 1 such that (ω, +∞) ⊂ ρ(A) and

(1.2) |R(λ,A)n| ≤ M0

(λ− ω)nfor n ∈ N and λ > ω,

where ρ(A) denotes the resolvent set of A and R(λ, A) = (λI − A)−1 for λ > ω.

Without loss of generality, we assume that M0 = 1. Otherwise, one can renorm thespace (E, |.|) with an equivalent norm for which we get the estimation (1.2) with M0 = 1.Remark that with the condition (H1) the domain of the operator A is not necessarilydense in E.B is a normed linear space of functions mapping (−∞, 0] into E satisfying the funda-

mental axioms introduced by Hale and Kato in [20] (see also [22] and section 2). As usual,for every t ∈ R, the history function ut ∈ B is defined for θ ∈ (−∞, 0] by ut (θ) = u (t + θ) .L is a bounded linear operator from B to E and g is Lipschitzian from B into E withg(0) = 0.

The center manifold theory is a powerful tool in the analysis of the qualitative behaviorof solutions for infinite dimensional dynamical systems, because the interesting behaviortakes place on the center manifold. The existence and other proprieties (bifurcation,stability, etc.) of centre manifolds for partial functional differential equations have beenconsidered in many works. For further references on the development and applications ofthe center manifold theory, we refer the reader to [10, 12–14, 17–19, 21, 23–30] and thereferences therein.

Partial functional differential equations with infinite delay have been studied extensivelyin the literature, for the reader, we refer to [1–3, 8, 9, 11, 20, 22, 32] , and the referencestherein. In [3], the authors proved when A satisfies (H1) the existence, regularity ofsolutions and stability of equilibriums of equation (1.1). They obtained that the phase

space of (1.1) is given by Y :=

ϕ ∈ B : ϕ(0) ∈ D(A)

. If g is differentiable at 0 with

g′(0) = 0, then the linearized equation of (1.1) around zero is given by

(1.3)

d

dtv(t) = Av(t) + L(vt), t ≥ σ,

vσ = φ ∈ B.

If all characteristic values of equation (1.3) have negative real part and B is uniform fadingmemory space, then the zero equilibrium of (1.1) is uniformly asymptotically stable (moredetails can be found in [3]). However, if there exists at least one characteristic value witha positive real part, then the zero solution of (1.1) is unstable. In the critical case, whenexponential stability is not possible and there exists a characteristic value with zero realpart, the situation is more complicated since either stability or instability may hold. The

M. ADIMY ET AL: CENTER MANIFOLDS...

169

Page 170: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

3

existence of a center manifold brings up the question about the dynamics of the systemin this critical case.

In [17] and [29], the authors studied the existence of a center manifold for equation (1.1)

when D(A) = E and the delay is finite. In this paper, we consider equation (1.1) whenthe domain D(A) is not necessarily dense in E and the delay is infinite. The non-densityof the operator A in equation (1.1) occurs, in many situations, from restrictions made onthe space where the equations are considered (for example, periodic continuous solutions,Holder continuous functions) or from boundary conditions ( the space C1 with null valueon the boundary is not dense in the space of continuous functions). For more details, werefer to [4–7] .

As a simple example of equation (1.1), let us consider the following Lotka–Volterramodel with diffusion, which has been studied in [5] and [11] (see also [32, p.10])

∂tv(t, x) = D

∂2

∂x2v(t, x) +

∫ 0

−∞K(θ)v (t + θ, x) dθ +

∫ 0

−∞G (θ, v(t + θ, x) dθ,

for t ≥ 0 and 0 ≤ x ≤ π,

v(t, 0) = v(t, π) = 0, for t ≥ 0,

v(0, θ) = v0(θ), for −∞ < θ ≤ 0 and 0 ≤ x ≤ π.

The organization of this work is as follows. In section 2, we recall some results aboutintegral solutions and the semigroup generated by the linearized equation (1.3). Wedescribe the variation-of-constants formula for non-homogeneous problems. We also givesome results on the spectral analysis of (1.3). In section 3, we prove the existence of aglobal center manifold for equation (1.1) with sufficiently small nonlinearities. In section4, we study the existence of a local center manifold when the function g is only C1-functionin a neighborhood of zero. In section 5, we prove an important result namely that theflow on the center manifold is governed by an ordinary differential equation in a finitedimensional space.

2. Fading memory spaces, variation-of-constants formula and spectraldecomposition

We use the axiomatic approach introduced by Hale and Kato [20] for the phase spaceB. That is the best way to treat the infinite delay differential equations, since propertiesof solutions depend especially on the choice of the space B. We assume that (B, |·|) is alinear normed space of functions mapping (−∞, 0] into the Banach space E and satisfyingthe following fundamental axioms.

(A) There exist a positive constant N , a locally bounded function M (·) on [0, +∞) anda continuous function K (·) on [0, +∞), such that if x : (−∞, a] → E is continuous on[σ, a] with xσ ∈ B, for some σ < a, then for all t ∈ [σ, a],

(i) xt ∈ B,(ii) t → xt is continuous with respect to |·| on [σ, a],(iii) N |x (t)| ≤ |xt| ≤ K (t− σ) sup

σ≤s≤t|x (s)|+ M (t− σ) |xσ|.

(B) B is a Banach space.

As a consequence of axiom (A), we deduce the following result.

M. ADIMY ET AL: CENTER MANIFOLDS...

170

Page 171: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

4

Lemma 2.1. [20] Let C00 := C00((−∞, 0]; E) be the space of continuous functions map-ping (−∞, 0] into E with compact support. Then, C00 ⊂ B. More precisely, for a < 0, wehave

|ϕ| ≤ K(−a) supa≤θ≤0

|ϕ(θ)|,

for any ϕ ∈ C00 with supp(ϕ) ⊂ [a, 0].

Our next objective is to write equation (1.1) as an integral equation (variation-of-constants formula). We need the following lemma.

Lemma 2.2. [7] Assume that (H1) holds. Let A0 be the part of the operator A in D(A),which is defined by

D(A0) = x ∈ D(A) : Ax ∈ D(A),A0x = Ax.

Then A0 generates a C0-semigroup (T0(t))t≥0 on D(A).

Definition 2.3. [3] Let φ ∈ B. A function u : R → E is called an integral solution ofequation (1.1) on R if the following conditions hold.(i) u is continuous on [σ,∞),(ii) uσ = φ,

(iii)

∫ t

σ

u (s) ds ∈ D (A) for t ≥ σ,

(iv) u (t) = φ (0) + A

∫ t

σ

u (s) ds +

∫ t

σ

L(us)ds +

∫ t

σ

g (xs) ds for t ≥ σ.

For the next, we assume that B satisfies axioms (A) and (B).

Theorem 2.4. [3] Assume that (H1) holds and g is Lipschitzian. Then, for all φ ∈ Bsuch that φ (0) ∈ D (A), equation (1.1) has a unique integral solution which is given by

u(t) =

T0 (t− σ) φ (0) + limλ→+∞

∫ t

σ

T0 (t− s) λR (λ,A) [L (us) + g (xs)] ds for t ≥ σ,

φ(t) for t ≤ σ,

where R (λ,A) = (λI − A)−1 .

Let Y =

φ ∈ B : φ (0) ∈ D (A)

be the phase space corresponding to equation (1.1).

For t ≥ 0, we define the operator U (t) by

U (t) φ = ut (·, φ, L, 0) , φ ∈ Y,

where u (·, φ, L, 0) is the integral solution of equation (1.1) with g = 0 and σ = 0.

Theorem 2.5. [3] Assume that (H1) holds. Then (U (t))t≥0 is a C0-semigroup on Y .Moreover, (U(t))t≥0 satisfies, for t ≥ 0, φ ∈ Y, the following translation property.

(U(t)φ) (θ) =

(U(t + θ)φ) (0) for t + θ ≥ 0,φ(t + θ) for t + θ ≤ 0.

M. ADIMY ET AL: CENTER MANIFOLDS...

171

Page 172: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

5

In order to give a variation-of-constants formula for equation (1.1), we need to introduce

the following sequence of linear operators Bn : E → B defined, for n > ω and x ∈ E, by

(Bnx)(θ) =

n(nθ + 1)R(n,A)x, − 1

n≤ θ ≤ 0,

0, θ < − 1

n.

For x ∈ E, the functions Bnx belong to C00 with the support included in [−1, 0]. ByLemma 2.1, we deduce that∣∣∣Bnx

∣∣∣ ≤ K(1)|x| for x ∈ E and n > ω.

The following integral formula of equation (1.1) was obtained in [9].

Theorem 2.6. [9] Assume that (H1) holds. Then, for all φ ∈ Y , the integral solutionu of equation (1.1) satisfies the following variation-of-constants formula

(2.1) ut = U(t− σ)φ + limn→∞

∫ t

σ

U(t− s)Bng (xs) ds for t ≥ σ.

Moreover, for any T > σ, the limit in (2.1) exists uniformly for t ∈ [σ, T ].

To get some interesting properties of partial functional differential equations with infi-nite delay, we need to suppose the following axiom.

(C) If a uniformly bounded sequence (ϕn)n in C00 converges to a function ϕ compactlyin (−∞, 0], then ϕ is in B and |ϕn − ϕ| → 0 as n →∞.

Let (S0 (t))t≥0 be the strongly continuous semigroup defined on the subspace

B0 = φ ∈ B : φ (0) = 0by

(S0 (t) φ) (θ) =

φ (t + θ) , t + θ ≤ 0,0, t + θ ≥ 0.

Definition 2.7. Assume that B satisfies (C).(i) B is said to be a fading memory space if for all φ ∈ B0,

S0 (t) φ −→t→∞

0 in B.

(ii) Moreover, B is said to be a uniform fading memory space, if

|S0 (t)| −→t→∞

0.

The following results give some properties of fading memory spaces.

Lemma 2.8. [22] (i) If B is a fading memory space, then the functions K (·) and M (·)in (A) can be chosen to be constants.(ii) If B is a uniform fading memory space, then the functions K(·) and M(·) can bechosen such that K(·) is constant and M(t) → 0 as t →∞.

Proposition 2.9. [22] If B is a fading memory space, then the space BC ((−∞, 0]; E)of all bounded and continuous E-valued functions on (−∞, 0], endowed with the uniformnorm topology, is continuously embedding in B.

M. ADIMY ET AL: CENTER MANIFOLDS...

172

Page 173: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

6

In order to study the qualitative behavior of the semigroup (U (t))t≥0, we suppose thefollowing assumption.

(H2) T0 (t) is compact on D (A) for each t > 0.

Let V be a bounded subset of a Banach space Z. The Kuratowski measure of non-compactness α (V ) of V is defined by

α (V ) = inf

d > 0 such that there exists a finite number of sets V1, ..., Vn with

diam (Vi) ≤ d such that V ⊆ n∪i=1

Vi

.

Moreover, for a bounded linear operator P on Z, we define |P |α by

|P |α = inf k > 0 : α (P (V )) ≤ kα (V ) for any bounded set V in Z .

For the semigroup (U (t))t≥0, we define the essential growth bound ωess (U) by

ωess (U) := limt→∞

1

tlog |U (t)|α .

We have the following fundamental result.

Theorem 2.10. [11] Assume that (H1) and (H2) hold, and B is a uniform fading memoryspace. Then

ωess (U) < 0.

Definition 2.11. Let C be a densely defined operator on Z. The essential spectrum of Cdenoted by σess(C) is the set of λ ∈ σ(C) such that one of the following conditions holds.

(i) Im(λI − C) is not closed,

(ii) the generalized eigenspace Mλ(C) :=⋃

k≥1

Ker(λI − C)k is of infinite dimension,

(iii) λ is a limit point of σ(C) \ λ.The essential radius of any bounded operator P on Z is defined by

ress(P ) := sup|λ| : λ ∈ σess(P ).Let AU denote the infinitesimal generator of (U (t))t≥0 . Then

D(AU) = ϕ ∈ Y : ϕ′ ∈ Y, ϕ(0) ∈ D(A) and ϕ′(0) = Aϕ(0) + L(ϕ) ,AUϕ = ϕ′.

Letσ+ (AU) = λ ∈ σ (AU) : Re(λ) ≥ 0.

As an immediate consequence of Theorem 2.10, we have the following spectral propertyof AU .

Lemma 2.12. Assume that (H1) and (H2) hold, and B is a uniform fading memoryspace. Then, σ+(AU) is a finite set of eigenvalues of AU which are not in the essentialspectrum. More precisely, λ ∈ σ+(AU) if and only if there exists x ∈ D(A)\0 solvingthe following characteristic equation

∆(λ)x := λx− Ax− L(eλ·x) = 0,

where eλ·x is the element of B defined for all θ ≤ 0 by (eλ·x)(θ) := eλθx.

M. ADIMY ET AL: CENTER MANIFOLDS...

173

Page 174: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

7

Proof. Theorem 2.10 implies that ωess(U) < 0. By Corollary 2.11 of ([16], page 258), weknow that σ+(AU) is a finite subset of the point spectrum σp(AU). On the other hand,we have for t ≥ 0

ress(U(t)) = etωess(U) < 1 and etσess(AU ) ⊂ σess(U(t)).

It follows that

σess(AU) ⊂ λ ∈ C : Re(λ) < 0 .

Consequently, σ+(AU) is a finite subset of the point spectrum σp(AU). Let λ ∈ σ+(AU).Then, there exists ϕ ∈ D(AU), ϕ 6= 0 such that AUϕ = λϕ, which implies that

limt→0+

1

t(U(t)ϕ− ϕ) = λϕ.

By axiom (A) − (ii), we deduce that limt→0+

(1

t(U(t)ϕ− ϕ)

)(0) = λϕ(0). On the other

hand, (1

t(U(t)ϕ− ϕ)

)(0) = A

(1

t

∫ t

0

(U(s)ϕ)(0)ds

)+

1

t

∫ t

0

L(U(s)ϕ)ds.

Let t go to zero. From the closedness of the operator A, we obtain that

ϕ(0) ∈ D(A) and Aϕ(0) + L(ϕ) = λϕ(0).

By the spectral mapping theorem ([16], page 277), we have

eλt ∈ σp(U(t)) and U(t)ϕ = eλtϕ.

Using the translation property of the semigroup solution, we obtain that

ϕ(θ) = eλθϕ(0) for θ ≤ 0.

Since ϕ 6= 0, then ϕ(0) 6= 0 and

ker ∆(λ) 6= 0.Conversely, let λ ∈ C with Re(λ) ≥ 0. Then, for all x ∈ E we have eλ·x ∈ B. If thereexists a ∈ D(A)\0 such that ∆(λ)a = 0, then ϕ = eλ·a ∈ Y. Hence ϕ ∈ C1((−∞, 0]; E)and ϕ′(0) = λa = Aϕ(0) + L(ϕ) ∈ D(A). By Theorem 3 in [3], we conclude that

ϕ ∈ D(AU) and AUϕ = λϕ. ¤

As ωess (U) < 0, we have the following spectral decomposition of the phase space Y .

Theorem 2.13. Assume that (H1) and (H2) hold, and B is a uniform fading memoryspace. Then, there exist linear subspaces of Y denoted by Y−, Y0 and Y+ respectively with

Y = Y− ⊕ Y0 ⊕ Y+

such that(i) AU(Y−) ⊂ Y−, AU(Y0) ⊂ Y0 and AU(Y+) ⊂ Y+;(ii) Y0 and Y+ are finite dimensional;(iii) σ(AU |Y0) = λ ∈ σ(AU) : Re λ = 0 , σ(AU |Y+) = λ ∈ σ(AU) : Re λ > 0;(iv) U(t)Y− ⊂ Y− for t ≥ 0 and U(t)|Y0 ∪ Y+ can be extended to t < 0 such thatU(t)Y0 ⊂ Y0, U(t)Y+ ⊂ Y+ for t ∈ lR;

M. ADIMY ET AL: CENTER MANIFOLDS...

174

Page 175: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

8

(v) for any 0 < γ < inf |Re λ| : λ ∈ σ(AU) and Re λ 6= 0 , there exists K ≥ 1 such that,for ϕ ∈ Y ,

|U(t)P−ϕ| ≤ Ke−γt |P−ϕ| for t ≥ 0,|U(t)P0ϕ| ≤ Ke

γ3|t| |P0ϕ| for t ∈ lR,

|U(t)P+ϕ| ≤ Keγt |P+ϕ| for t ≤ 0,

where P−, P0 and P+ are the projections of Y into Y−, Y0 and Y+.Y−, Y0 and Y+ are called respectively the stable, center and unstable subspaces of thesemigroup (U(t))t≥0 .

3. Global existence of the center manifold

Theorem 3.1. Assume that (H1) and (H2) hold, and there exists ε > 0 such that

Lip(g) = supϕ1 6=ϕ2

|g(ϕ1)− g(ϕ2)||ϕ1 − ϕ2| < ε.

Then, there exists a bounded Lipschitz map hg : Y0 → Y− ⊕ Y+ such that hg(0) = 0 andthe Lipschitz manifold

Mg := ϕ + hg(ϕ) : ϕ ∈ Y0is globally invariant under the flow of equation (1.1) on Y .Mg is called the center manifold of equation (1.1).

Proof. Let M = BC(Y0, Y−⊕Y+) denote the Banach space of bounded continuous mapsh : Y0 → Y− ⊕ Y+ endowed with the uniform norm topology. We define

F := h ∈M : h is Lipschitz, h(0) = 0 and Lip(h) ≤ 1 .

Let h ∈ F and ϕ ∈ Y0. Using the strict contraction principle, one can prove the existenceof vϕ

t ∈ Y0 solution of the following equation

(3.1) vϕt = U(t)ϕ + lim

n→∞

∫ t

0

U(t− τ)(Bng(vϕ

τ + h(vϕτ ))

)0

dτ, t ∈ lR.

We now introduce the mapping Tg : F → M defined, for h ∈ F and ϕ ∈ Y0, by

Tg(h)ϕ = limn→∞

∫ 0

−∞U(−τ)

(Bng(vϕ

τ + h(vϕτ ))

)−dτ

− limn→∞

∫ +∞

0

U(−τ)(Bng(vϕ

τ + h(vϕτ ))

)+

dτ.

The first step is to prove that Tg maps F into itself. Let ϕ1, ϕ2 ∈ Y0, 0 < γ <inf |Re λ| : λ ∈ σ(AU) and Re λ 6= 0 and t ∈ lR. Suppose that Lip(g) < ε. Then,

|vϕ1t − vϕ2

t | ≤ Keγ3|t| |ϕ1 − ϕ2|+ 2K |P0| ε

∣∣∣∣∫ t

0

eγ3|t−τ | |vϕ1

τ − vϕ2τ | dτ

∣∣∣∣ ,

where K is the positive constant given by Theorem (2.13). By Gronwall’s lemma, we getthat

e−γ3|t| |vϕ1

t − vϕ2t | ≤ K |ϕ1 − ϕ2| e2K|P0|ε|t|.

Then

|vϕ1t − vϕ2

t | ≤ K |ϕ1 − ϕ2| e[γ3+2K|P0|ε]|t|, t ∈ lR.

M. ADIMY ET AL: CENTER MANIFOLDS...

175

Page 176: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

9

If we choose ε such that

(3.2) 2K |P0| ε <γ

6,

we obtain

(3.3) |vϕ1t − vϕ2

t | ≤ K |ϕ1 − ϕ2| eγ2|t|.

Moreover,

|Tg(h)ϕ1 − Tg(h)ϕ2| ≤∫ 0

−∞|U(−τ)P−| |g(vϕ1

τ + h(vϕ1τ ))− g(vϕ2

τ + h(vϕ2τ ))| dτ

+

∫ +∞

0

|U(−τ)P+| |g(vϕ1τ + h(vϕ1

τ ))− g(vϕ2τ + h(vϕ2

τ ))| dτ.

Consequently,

|Tg(h)ϕ1 − Tg(h)ϕ2| ≤ 2

∫ 0

−∞Keγτ |P−| ε |vϕ1

τ − vϕ2τ | dτ+2

∫ +∞

0

Ke−γτ |P+| ε |vϕ1τ − vϕ2

τ | dτ.

Using the inequality (3.3), we obtain

|Tg(h)ϕ1 − Tg(h)ϕ2| ≤ 2K2 |P−| ε |ϕ1 − ϕ2|∫ 0

−∞e

γ2τdτ+2K2 |P+| ε |ϕ1 − ϕ2|

∫ +∞

0

e−γ2τdτ.

It follows that

|Tg(h)ϕ1 − Tg(h)ϕ2| ≤ 4ε

γK2 (|P−|+ |P+|) |ϕ1 − ϕ2| .

We choose ε such that4ε

γK2 (|P−|+ |P+|) < 1.

Then Tg maps F into itself.The next step is to show that Tg is a strict contraction on F . Let h1, h2 ∈ F and ϕ ∈ Y0.Let vi

t, i = 1, 2, denote the solution of the following equation

vit = U(t)ϕ + lim

n→∞

∫ t

0

U(t− τ)(Bng(vi

τ + hi(viτ ))

)0

dτ for t ∈ lR.

Then,

∣∣v1t − v2

t

∣∣ ≤ εK |P0|∣∣∣∣∫ t

0

eγ3|t−τ | (∣∣v1

τ − v2τ

∣∣ +∣∣h1(v

1τ )− h1(v

2τ )

∣∣ +∣∣h1(v

2τ )− h2(v

2τ )

∣∣) dτ

∣∣∣∣ .

Consequently,

∣∣v1t − v2

t

∣∣ ≤ 2εK |P0|∣∣∣∣∫ t

0

eγ3|t−τ | ∣∣v1

τ − v2τ

∣∣ dτ

∣∣∣∣ + εK |P0| |h1 − h2|∣∣∣∣∫ t

0

eγ3|t−τ |dτ

∣∣∣∣ .

By Gronwall’s lemma, we obtain

∣∣v1t − v2

t

∣∣ ≤ 3εK

γ|P0| |h1 − h2| e[

γ3+2K|P0|ε]|t|.

Thanks to (3.2), we state

∣∣v1t − v2

t

∣∣ ≤ 3εK

γ|P0| |h1 − h2| e

γ2|t| for all t ∈ lR.

M. ADIMY ET AL: CENTER MANIFOLDS...

176

Page 177: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

10

For i = 1, 2, we have

Tg(hi)ϕ = limn→∞

∫ 0

−∞U(−τ)

(Bng(vi

τ + hi(viτ ))

)−dτ

− limn→∞

∫ +∞

0

U(−τ)(Bng(vi

τ + hi(viτ ))

)+

dτ.

It follows that

|Tg(h1)ϕ− Tg(h2)ϕ| ≤ 2K |P−| 6ε2K

γ2|P0| |h1 − h2|+ K |P−| ε

γ|h1 − h2|

+ 2K |P+| 6ε2K

γ2|P0| |h1 − h2|+ K |P+| ε

γ|h1 − h2| .

Consequently,

|Tg(h1)− Tg(h2)| ≤ (|P−|+ |P+|) Kε

γ

[|P0| 12εK

γ+ 1

]|h1 − h2| .

We choose ε such that

(|P−|+ |P+|) Kε

γ

[|P0| 12εK

γ+ 1

]< 1.

Then Tg is a strict contraction on F . Consequently, it has a unique fixed point hg in F(Tg(hg) = hg).Finally, we show that

Mg := ϕ + hg(ϕ) : ϕ ∈ Y0is globally invariant under the flow on Y . Let ϕ ∈ Y0 and v be the solution of equation(3.1). We claim that t → vϕ

t + hg(vϕt ) is an integral solution of equation (1.1) with initial

condition ϕ + hg(ϕ). In fact, we have Tg(hg)(vϕt ) = hg(v

ϕt ) for t ∈ lR. Moreover,

Tg(h)(vϕt ) = lim

n→∞

∫ 0

−∞U(−τ)

(Bng(vϕ

t+τ + hg(vϕt+τ ))

)−dτ

− limn→∞

∫ +∞

0

U(−τ)(Bng(vϕ

t+τ + hg(vϕt+τ ))

)+

dτ.

Therefore

hg(vϕt ) = lim

n→∞

∫ t

−∞U(t− τ)

(Bng(vϕ

τ + hg(vϕτ ))

)−dτ

− limn→∞

∫ +∞

t

U(t− τ)(Bng(vϕ

τ + hg(vϕτ ))

)+

dτ.

Then, for t ∈ lR, we obtain

vϕt + hg(v

ϕt ) = U(t)ϕ + lim

n→∞

∫ t

0

U(t− τ)(Bng(vϕ

τ + hg(vϕτ ))

)0

+ limn→∞

∫ t

−∞U(t− τ)

(Bng(vϕ

τ + hg(vϕτ ))

)−dτ

− limn→∞

∫ +∞

t

U(t− τ)(Bng(vϕ

τ + hg(vϕτ ))

)+

dτ.

M. ADIMY ET AL: CENTER MANIFOLDS...

177

Page 178: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

11

For any t ≥ a, we have

limn→∞

∫ t

−∞U(t− τ)

(Bng(vϕ

τ + hg(vϕτ ))

)−dτ

= limn→∞

∫ a

−∞U(t− τ)

(Bng(vϕ

τ + hg(vϕτ ))

)−dτ

+ limλ→∞

∫ t

a

U(t− τ)(Bng(vϕ

τ + hg(vϕτ ))

)−dτ,

and

limλ→∞

∫ a

−∞U(t− τ)

(Bng(vϕ

τ + hg(vϕτ ))

)−dτ

= U(t− a)

(lim

n→∞

∫ a

−∞U(a− τ)

(Bng(vϕ

τ + hg(vϕτ ))

)−dτ

).

By the same argument, we have

limn→∞

∫ t

a

U(t− τ)(Bng(vϕ

τ + hg(vϕτ ))

)+

= limn→∞

∫ +∞

a

U(t− τ)(Bng(vϕ

τ + hg(vϕτ ))

)+

− limn→∞

∫ +∞

t

U(t− τ)(Bng(vϕ

τ + hg(vϕτ ))

)+

dτ,

and

limn→∞

∫ +∞

a

U(t− τ)(Bng(vϕ

τ + hg(vϕτ ))

)+

= U(t− a)

(lim

n→∞

∫ +∞

a

U(a− τ)(Bng(vϕ

τ + hg(vϕτ ))

)+

).

Moreover, note that

hg(vϕa ) = lim

n→∞

∫ a

−∞U(a− τ)

(Bng(vϕ

τ + hg(vϕτ ))

)−dτ

− limn→∞

∫ +∞

a

U(a− τ)(Bng(vϕ

τ + hg(vϕτ ))

)+

dτ.

In particular

vϕt = U(t− a)vϕ

a + limn→∞

∫ t

a

U(t− τ)(Bng(vϕ

τ + hg(vϕτ ))

)0

dτ.

Consequently, for any t ≥ a, we obtain

vϕt + hg(v

ϕt ) = U(t− a) (vϕ

a + hg(vϕa )) + lim

n→∞

∫ t

a

U(t− τ)(Bng(vϕ

τ + hg(vϕτ ))

)0

+ limn→∞

∫ t

a

U(t− τ)(Bng(vϕ

τ + hg(vϕτ ))

)+

+ limn→∞

∫ t

a

U(t− τ)(Bng(vϕ

τ + hg(vϕτ ))

)−dτ.

M. ADIMY ET AL: CENTER MANIFOLDS...

178

Page 179: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

12

Therefore, for any t ≥ a,

vϕt + hg(v

ϕt ) = U(t− a) (vϕ

a + hg(vϕa )) + lim

n→∞

∫ t

a

U(t− τ)(Bng(vϕ

τ + hg(vϕτ ))

)dτ.

Finally, we conclude that vϕt + hg(v

ϕt ) is an integral solution of equation (1.1) on lR with

initial value ϕ + hg(ϕ). ¤

Theorem 3.2. Let h ∈ F and ϕ ∈ Y0. If vϕ is the solution of equation (3.1) on lR, then

|vϕt | ≤ K |ϕ| e γ

2|t| and |vϕ

t + hg(vϕt )| ≤ 2K |ϕ| e γ

2|t|.

Conversely, if we choose ε such that

2Kε

γ(|P−|+ |P+|+ 3 |P0|) < 1,

then for any integral solution u of equation (1.1) on lR with ut = O(eγ2|t|), we have

ut ∈ Mg for all t ∈ lR.

Proof. Let vϕ be the solution of equation (3.1). Then, using the estimate (3.3) we obtain

|vϕt | ≤ K |ϕ| e γ

2|t| for t ∈ lR.

Moreover, from the fact that Lip(h) ≤ 1 and hg(0) = 0, we obtain

|vϕt + hg(v

ϕt )| ≤ 2K |ϕ| e γ

2|t| for t ∈ lR.

Let u be an integral solution of equation (1.1) such that ut = O(eγ2|t|). Then there exists

a positive constant K0 such that |ut| ≤ K0eγ2|t| for all t ∈ lR. Note that

ut = U(t− s)us + limn→∞

∫ t

s

U(t− τ)Bng(uτ )dτ, t ≥ s.

On the other hand,

u+t = U(t− s)u+

s + limn→∞

∫ t

s

U(t− τ)(Bng(uτ )

)+

dτ, s ≥ t.

Moreover, for s ≥ t and s ≥ 0 we have∣∣U(t− s)u+

s

∣∣ ≤ Keγ(t−s) |P+us| ≤ K0K |P+| eγ(t−s)eγ2|s| = K0K |P+| eγte−

γ2s.

Therefore,

lims→∞

∣∣U(t− s)u+s

∣∣ = 0.

It follows that

u+t = − lim

n→∞

∫ +∞

t

U(t− τ)(Bng(uτ )

)+

dτ.

Similarly, we can prove that

u−t = limn→∞

∫ t

−∞U(t− τ)

(Bng(uτ )

)−dτ.

We conclude that

ut = u+t + u−t + U(t)u0

0 + limn→∞

∫ t

0

U(t− τ)(Bng(uτ )

)0

dτ for t ∈ lR.

M. ADIMY ET AL: CENTER MANIFOLDS...

179

Page 180: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

13

Let φ ∈ Y0 such that φ = u0. By Theorem 3.1, there exists an integral solution w ofequation (1.1) on lR with initial value φ + hg(φ) such that, for all t ∈ lR, wt ∈ Mg and

wt = U(t)φ + limn→∞

∫ t

0

U(t− τ)(Bng(wτ )

)0

+ limn→∞

∫ t

−∞U(t− τ)

(Bng(wτ )

)+

− limn→∞

∫ +∞

t

U(t− τ)(Bng(wτ )

)−dτ.

Then

|ut − wt| ≤∣∣∣∣ limn→∞

∫ t

0

U(t− τ)(Bn (g(uτ )− g(wτ ))

)0

∣∣∣∣

+

∣∣∣∣ limn→∞

∫ t

−∞U(t− τ)

(Bn (g(uτ )− g(wτ ))

)+

∣∣∣∣

+

∣∣∣∣ limn→∞

∫ +∞

t

U(t− τ)(Bn (g(uτ )− g(wτ ))

)−dτ

∣∣∣∣ .

This implies that

|ut − wt| ≤ Kε

(|P0|

∣∣∣∣∫ t

0

eγ3|t−τ | |uτ − wτ | dτ

∣∣∣∣

+ |P−|∫ t

−∞e−γ(t−τ) |uτ − wτ | dτ + |P+|

∫ +∞

t

eγ(t−τ) |uτ − wτ | dτ

).

Let N(t) = e−γ2|t| |ut − wt| for all t ∈ lR. Then, N = sup

t∈lR(N(t)) < ∞. On the other hand,

we have

N(t) ≤ KεN

(|P0|

∣∣∣∣∫ t

0

e−γ6|t−τ |dτ

∣∣∣∣ + |P−|∫ t

−∞e−

γ2(t−τ)dτ + |P+|

∫ +∞

t

eγ2(t−τ)dτ

).

Finally, we obtain

N ≤ 2Kε

γ(3 |P0|+ |P−|+ |P+|) N .

Consequently, N = 0 and ut = wt for t ∈ lR. In particular, Mg contains all boundedsolutions of equation (1.1). ¤

4. Local existence of the center manifold

In this section, we prove the existence of a local center manifold when g is defined in aneighborhood of zero. We suppose that

(H3) There exists ρ1 > 0 such that g : B(0, ρ1) → E is C1-function, g(0) = 0 andg′(0) = 0, where B(0, ρ1) = ϕ ∈ B : |ϕ| < ρ1 .

For ρ < ρ1, we define the cut-off function gρ : B → E by

gρ(ϕ) =

g(ϕ) if |ϕ| ≤ ρ,

g( ρ|ϕ|ϕ) if |ϕ| > ρ.

M. ADIMY ET AL: CENTER MANIFOLDS...

180

Page 181: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

14

We consider the following partial functional differential equation

(4.1)

d

dtu(t) = Au(t) + L(ut) + gρ(ut), t ≥ σ,

uσ = ϕ ∈ B.

Theorem 4.1. Assume that (H1), (H2) and (H3) hold. Then there exist 0 < ρ < ρ1 anda Lipschitz continuous a mapping hgρ : Y0 → Y− ⊕ Y+ such that hgρ(0) = 0 and the localLipschitz manifold

Mgρ =ϕ + hgρ(ϕ) : ϕ ∈ Y0

is globally invariant under the flow associated to equation (4.1).

Proof. Using the same arguments as in [31], Proposition 3.10, p.95, one can show thatgρ is Lipschitz continuous with

Lip(gρ) ≤ 2 sup|ϕ|<ρ

|g′(ϕ)| .

It follows that Lip(gρ) goes to zero when ρ goes to zero. According to Theorem 3.1, wededuce that there exist ρ ≥ 0 and mapping hgρ : Y0 → Y−⊕ Y+ with hgρ(0) = 0 such thatthe Lipschitz manifold

Mgρ =ϕ + hgρ(ϕ) : ϕ ∈ Y0

is globally invariant under the flow of equation (4.1). ¤

Remark 4.2. (i) The set

Mgρ :=ϕ + hgρ(ϕ) : ϕ ∈ Y0

∩B(0, ρ)

is called the local center manifold associated to equation (1.1).

(ii) Mgρ contains all bounded integral solutions by ρ of equation (1.1).

5. Reduction principle: flow on the center manifold

We establish that the flow on the center manifold is governed by an ordinary differentialequation in a finite dimensional space. We assume that the conditions of Theorem 3.1are satisfied. We also assume that the unstable space Y+ is reduced to zero. This meansthat σ(AU) ⊂ λ ∈ C : Re λ ≤ 0 and

Y = Y− ⊕ Y0.

Let d be the dimension of the center space Y0 and Φ = (φ1, ..., φd) be a basis of Y0. Then,there exist d elements φ∗1, ..., φ

∗d of Y ∗, the dual space of Y, such that

〈φ∗i , φj〉 := φ∗i (φj) = δij, 1 ≤ i, j ≤ d,φ∗i = 0 on Y−.

Denote by Ψ the transpose of (φ∗1, ...., φ∗d). Let φ ∈ Y. Define

〈Ψ, φ〉 := (φ∗1(φ), ..., φ∗d(φ))T .

Then, the projection operator P0 : Y → Y0 is given by

P0φ = Φ 〈Ψ, φ〉 .

M. ADIMY ET AL: CENTER MANIFOLDS...

181

Page 182: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

15

Put U0(t) := U(t)|Y0. As Y0 is a finite dimensional space, (U0(t))t∈R is a strongly con-tinuous group. Then, there exists a d × d matrix G ([15], Theorem 2.15, p.102) suchthat

U0(t)Φ = ΦetG, t ∈ R.

Let n ∈ N, n ≥ n0 > ω and i ∈ 1, ...., d . We define the function x∗n,i on E by

x∗n,i(y) =⟨φ∗i , Bny

⟩, y ∈ E.

Then, x∗n,i is a bounded linear operator on E. Let x∗n be the transpose of (x∗n,1, ..., x∗n,d).

We obtain

〈x∗n, y〉 =⟨Ψ, Bn (y)

⟩.

Consequently,

supn≥n0

|x∗n| < ∞.

This implies that (x∗n)n≥n0is a bounded sequence in L(E,Rd). Then, we get the following

important result.

Theorem 5.1. There exists x∗ ∈ L(E,Rd) such that (x∗n)n≥n0converges weakly to x∗ in

the sense that

〈x∗n, y〉 → 〈x∗, y〉 as n →∞ for y ∈ E.

To prove this result, we need the following fundamental theorem [33, p. 776]

Theorem 5.2. Let X be a separable Banach space and (z∗n)n≥p be a bounded sequence in

X∗. Then there exists a subsequence(z∗nk

)k≥0

of (z∗n)n≥p which converges weakly in X∗ in

the sense that there exists z∗ ∈ X∗ such that⟨z∗nk

, y⟩ → 〈z∗, y〉 as k →∞ for y ∈ X.

Proof of Theorem 5.1. Let Z0 be a closed separable subspace of E. Since (x∗n)n≥n0

is a bounded sequence, thanks to Theorem 5.2 there is a subsequence(x∗nk

)k∈N which

converges weakly to some x∗Z0in Z0. We claim that all the sequence (x∗n)n≥n0

convergesweakly to x∗Z0

in Z0. This can be done by contradiction. Suppose that there exists a

subsequence(x∗nq

)q∈N

of (x∗n)n≥n0which converges weakly to some x∗Z0

with x∗Z06= x∗Z0

.

Let ut(., σ, ϕ, f) be the integral solution of the following equation

d

dtu(t) = Au(t) + L(ut) + f(t), t ≥ σ,

uσ = ϕ ∈ B,

where f is a continuous function from R to E. By using the variation-of-constants formulaand the spectral decomposition, we obtain

P0ut(., σ, 0, f) = limn→+∞

∫ t

σ

U (t− ξ)(Bnf(ξ)

)0

and

P0

(Bnf(ξ)

)= Φ

⟨Ψ, Bnf(ξ)

⟩= Φ 〈x∗n, f(ξ)〉 .

M. ADIMY ET AL: CENTER MANIFOLDS...

182

Page 183: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

16

It follows that

P0ut(., σ, 0, f) = limn→+∞

Φ

∫ t

σ

e(t−ξ)G⟨Ψ, Bnf(ξ)

⟩dξ,

= limn→+∞

Φ

∫ t

σ

e(t−ξ)G 〈x∗n, f(ξ)〉 dξ.

Let f = c (for a fixed c ∈ Z0) be a constant function. Then

limk→+∞

∫ t

σ

e(t−ξ)G⟨x∗nk

, c⟩dξ = lim

p→+∞

∫ t

σ

e(t−ξ)G⟨x∗np

, c⟩

dξ.

Consequently, ∫ t

σ

e(t−ξ)G⟨x∗Z0

, c⟩dξ =

∫ t

σ

e(t−ξ)G⟨x∗Z0

, c⟩dξ.

Hence x∗Z0= x∗Z0

. This yields to a contradiction.We now conclude that the whole sequence (x∗n)n≥n0

converges weakly to x∗Z0in Z0. Let

Z1 be another closed separable subspace of E. By using the same argument as above, weobtain that (x∗n)n≥n0

converges weakly to x∗Z1in Z1. Since Z0 ∩ Z1 is a closed separable

subspace of E, we get that x∗Z1= x∗Z0

in Z0 ∩ Z1. For any y ∈ E, we define x∗ by

〈x∗, y〉 = 〈x∗Z , y〉 ,where Z is an arbitrary given closed separable subspace of E such that y ∈ Z. Then x∗

is a bounded linear operator from E to Rd such that

|x∗| ≤ supn≥n0

|x∗n| < ∞

and (x∗n)n≥n0converges weakly to x∗ in E. ¤

As an immediate consequence, we obtain the following result.

Corollary 5.3. For any continuous function f : R→ E, we have

limn→+∞

∫ t

σ

U (t− ξ)(Bnf(ξ)

)0

dξ = Φ

∫ t

σ

e(t−ξ)G 〈x∗, f(ξ)〉 dξ, t, σ ∈ R.

Let ϕ ∈ Y0. Then from the properties of the center manifold, we know that the integralsolution starting from ϕ + h(ϕ) is given by vϕ

t + hg(vϕt ), where vϕ

t is the solution of

vϕt = U(t)ϕ + lim

λ→∞

∫ t

0

U(t− τ)(Bλg(vϕ

τ + hg(vϕτ ))

)0

dτ, t ∈ R.

Let z(t) be the component of vϕt ∈ Y0. Then

Φz(t) = vϕt for t ∈ R.

By Theorem 5.1 and Corollary 5.3, we have for t ∈ R

Φz(t) = ΦeGtz(0) + Φ

∫ t

0

e(t−τ)G 〈x∗, g(vϕτ + hg(v

ϕτ ))〉 dτ.

We conclude that z satisfies

z(t) = eGtz(0) + limn→∞

∫ t

0

e(t−τ)G 〈x∗n, g(vϕτ + hg(v

ϕτ ))〉 dτ.

M. ADIMY ET AL: CENTER MANIFOLDS...

183

Page 184: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

17

Finally, we obtain at the following ordinary differential equation (the reduced system)

(5.1) z′(t) = Gz(t) + 〈x∗, g(Φz(t) + hg(Φz(t)))〉 for t ∈ R.

This determines the flow on the center manifold.

Remark: In this paper, the center manifold reduction technique has been proposed forsome partial functional differential equations with infinite delay in fading memory spaces.We expect many applications of this important result, especially to study the stability ofequilibriums in critical cases when the classical methods (like the linearization principle)do not work. We also expect to use it to develop new results on bifurcation theory forpartial functional differential equations with infinite delay.

References

[1] M. Adimy, M. Alia and K. Ezzinbi, Partial neutral functional differential equationswith infinite delay in extrapolation spaces, Differential and Integral Equations, (toappear 2011).

[2] M. Adimy, H. Bouzahir and K. Ezzinbi, Existence for a class of partial functionaldifferential equations with infinite delay, Nonlinear Analysis, Theory, Methods andApplications 46 (2001) 91-112.

[3] M. Adimy, H. Bouzahir and K. Ezzinbi, Local existence and stability for some par-tial functional differential equations with infinite delay, Nonlinear Analysis, Theory,Methods and Applications 48 (2002) 323-348.

[4] M. Adimy and K. Ezzinbi, A class of linear partial neutral functional differentialequations with non-dense domain, Journal of Differential Equations 147 (1998) 285-332.

[5] M. Adimy and K. Ezzinbi, Local existence and linearized stability for partial functionaldifferential equations, Dynamic Systems and Applications 7 (1998) 389-403.

[6] M. Adimy and K. Ezzinbi, Existence and stability of solutions for a class of partialneutral functional differential equations, Hiroshima Mathematical Journal 34 (2004)251-294.

[7] M. Adimy, K. Ezzinbi and M. Laklach, Spectral decomposition for some partial neutralfunctional differential equations, Canadian Applied Mathematics Quarterly 9 (2001)1-34.

[8] M. Adimy, K. Ezzinbi and A. Ouhinou, Variation of constants formula and almostperiodic solutions for some partial functional differential equations with infinite delay,Journal of Mathematical Analysis and Applications 317 (2006) 668-689.

[9] M. Adimy, K. Ezzinbi and A. Ouhinou, Behavior near hyperbolic stationary solutionsfor partial functional differential equations with infinite delay, Nonlinear Analysis,Theory, Methods and Applications 68 (2008) 2280-2302.

[10] M. Adimy, K. Ezzinbi and J. Wu, Center manifold and stability in critical casesfor some partial functional differential equations, International Journal of EvolutionEquations 2 (2007) 69-95.

[11] R. Benkhalti, H. Bouzahir and K. Ezzinbi, Existence of a periodic solution for somepartial functional differential equations with infinite delay, Journal of MathematicalAnalysis and Applications 256 (2001) 257-280.

[12] J. Carr, Applications of Center Manifold Theory, Applied Mathematical Sciences,Springer-Verlag, Vol. 35 (1981).

M. ADIMY ET AL: CENTER MANIFOLDS...

184

Page 185: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

18

[13] S.N. Chow and K. Lu, Invariant manifolds for flows in Banach spaces, Journal ofDifferential equations 74 (1988) 285-317.

[14] G. Da Prato and A. Lunardi, Stability, instability and center manifold theorem forfully nonlinear autonomous parabolic equations in Banach spaces, Archive for RationalMechanics and Analysis 101 (1988) 115-141.

[15] O. Diekmann, S.A. van Gils, S.M. Verduyn Lunel and H-O Walther, Delay Equa-tions, Functional Complex and Nonlinear Analysis, Applied Mathematical Sciences,Springer-Verlag, (1995).

[16] K.J. Engel and R. Nagel, One-parameter Semigroups of Linear Evolution Equations,Grad. Texts in Math., Vol. 194, Springer-Verlag, (2001).

[17] T. Faria, W. Huang and J. Wu, Smoothness of center manifolds for maps and formaladjoints for semilinear FDEs in general Banach spaces, SIAM, Journal of MathematicalAnalysis 34 (2002) 173-203.

[18] J.K. Hale, Critical cases for neutral functional differential equations, Journal of Dif-ferential Equations 10 (1971) 59-82.

[19] J.K. Hale, Theory of Functional Differential Equations, Springer-Verlag, (1977).[20] J.K. Hale and J. Kato, Phase space for retarded equations with infinite delay, Funkcial

Ekvac 21 (1978) 11-41.[21] D. Henry, Geometric Theory of Semilinear Parabolic Equations, Lecture Notes in

Mathematics, Springer-Verlag, Vol. 840, (1981).[22] Y. Hino, S. Murakami and T. Naito, Functional Differential Equations with Infinite

Delay, Lecture Notes in Mathematics, Springer-Verlag, Vol. 1473, (1991).[23] A. Keller, The stable, center-stable, center, center-unstable and unstable manifolds,

Journal of Differential Equations 3 (1967) 546-570.[24] A. Keller, Stability of the center-stable manifold, Journal of Mathematical Analysis

and Applications, 18 (1967) 336-344.[25] X. Lin, J.W.H. So and J. Wu, Centre manifolds for partial differential equations with

delays, Proceedings of the Royal Society of Edinburgh 122 (1992) 237-254.[26] N.V. Minh and J. Wu, Invariant manifolds of partial functional differential equations,

Journal of Differential Equations 198 (2004) 381-421.[27] K. Palmer, On the stability of the center manifold, Journal of Applied Mathematics

and Physics, (ZAMP) 38 (1987) 273-278.[28] S.N. Shimanov, On the stability in the critical case of a zero root for systems with

time lag, Prikl. Mat. Mekh. 24 (1960) 447-457.[29] J.W.H. So, Y. Yang and J. Wu, Center manifolds for functional partial differential

equations: Smoothness and attractivity, Mathematica Japonica 48 (1998) 67-81.[30] A. Vanderbauwhede and S.A. Van Gils, Center manifolds and contractions on a scale

of Banach spaces, Journal of Functional Analysis 72 (1987) 209-224.[31] G.F. Webb, Theory of Nonlinear Age-dependent Population Dynamics, Marcel

Dekker, (1985).[32] J. Wu, Theory and Applications of Partial Functional Differential Equations, Applied

Mathematical Sciences, Springer-Verlag, Vol. 119, (1996).[33] E. Zeidler, Nonlinear Functional Analysis and its Applications, Tome I, Fixed Point

Theorems, Springer-Verlag, (1993).

M. ADIMY ET AL: CENTER MANIFOLDS...

185

Page 186: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Fuzziffied Random Generalized Nonlinear Variational LikeInequalities

G. AnastassiouDepartment of Mathematical Sciences

University of Memphis, Memphis, TN 38152, USA

Salahuddin and M.K. AhmadDepartment of Mathematics

Aligarh Muslim University, Aligarh-202002, [email protected]; ahmad [email protected]

Abstract

In this paper, we introduced and studied a new class of generalized nonlinearvariational like inequality for fuzzy random mappings and have proved existencetheorem for auxiliary problem of the fuzziffied random generalized nonlinear vari-ational like inequalities. By exploiting the theorem, we construct and analyze anew random iterative algorithm for finding the selections of the fuzziffied ran-dom generalized nonlinear variational like inequality. Further more, we prove theexistence of unique solutions of the fuzzified random iterative algorithm for find-ing the selection of the fuzziffied generalized nonlinear variational like inequalityproblems. The convergence analysis of fuzziffied random iterative sequences gen-erated by the random iterative algorithm is also discussed.

Keywords: Fuzziffied random generalized nonlinear variational like inequali-ties, fuzziffied random iterative sequences, random iterative algorithm, Hausdorffspace, Hilbert spaces, measurable spaces, Borel set.Mathematics Subject Classification: 49J40

1 Introduction

Variational inequality theory has been a very effective and powerful tool for study-ing a wide range of problems arising in many diverse fields of pure and applied sci-ences. It is well known that one of the most important problems in variational in-equality theory is the development of efficient and implementable iterative algorithmsfor solving various class of variational inequalities and variational inclusions. In [8]and [20, 27, 28, 30, 31, 32] there are lot of iterative algorithms for finding the approx-imate solutions of various variational inequalities. Glowinski, Lions and Tremolieres[16] had developed the auxiliary principle techniques. By using the auxiliary principletechnique, Ding [13, 14, 15] suggested several iterative algorithms to compute approx-imate solutions for some class of general nonlinear mixed variational inequalities andvariational like inequalities in reflexive Banach spaces. Variational inequalities have

186

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,186-206,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 187: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

been widely used as a mathematical programming tool in modeling, optimization anddecision making problems. However, facing uncertainty is a constant challenge for op-timization and decision making problems. Treating uncertainty for fuzzy mathematicalresults in the study of fuzzy optimization and decision making, the variational inequal-ities have been generalized and extended in multi direction using novel techniques offuzzy environment.

It is well known that fuzzy set theory which was introduced by Zadeh [35] in1965 has gained importance in analysis, from both theoretical and practical point ofview. The fuzzy sets are distinguished from ordinary or crisp sets in that the degree ofmembership of an element in a fuzzy set can be any number in the unit interval [0,1] asopposed to a number from the binary pair 0,1 for crisp sets. This property of fuzzysets enable us to represent realistically imprecise concepts in which the transition frommembership to membership is gradual.

In 1989, Chang and Zhu [4] introduced the concepts of variational inequality forfuzzy mappings which were later developed by Chang and Huang [5], Noor [29], Lee etal. [24], Ding [10], Ding and Park [11] etc. in Hilbert spaces. Recently Huang and Lan[17] considered nonlinear equations with fuzzy mappings in fuzzy normed spaces andLan and Verma [22] considered fuzzy variational inclusion problems in Banach spaces.The concepts of random fuzzy mapping was first introduced by Huang [18]. Therandom variational inclusion problem for fuzzy random mappings is studied by Lee etal. [25], Dai [9] and Ahmad and Faraj [1]. The random variational inequality (inclusion)problems and random quasi-variational inclusion problems have been studied by Chang[3], Khan and Salahuddin [21], Cho et al. [7], Lan [23] and Huang and Cho [20] etc.

Inspired and motivated by recent works [1, 6, 9, 16, 25, 26, 31, 33, 36], in thispaper we introduced and studied a new class of fuzziffied random generalized nonlinearvariational like inequalities. An existence theorem for auxiliary problem of the fuzziffiedrandom generalized nonlinear variational like inequality is established. By exploitingthe theorem, we construct and analyze a new random iterative algorithm for findingthe solution of the fuzziffied random generalized nonlinear variational like inequality.Further, we prove the existence of unique solutions of the fuzziffied random generalizednonlinear variational like inequality problems and discuss the convergence analysis offuzziffied random iterative sequences generated by the random iterative algorithm.Our results improve and generalize many known corresponding results presented in[12, 14, 18, 20].

2 Preliminaries

Throughout this paper, let H be a real Hilbert space endowed with dual spaceH∗, pairing between norm denoted by ‖.‖, inner product 〈u, v〉 for u ∈ H, v ∈ H∗, Dbe a nonempty closed convex subset of H. We denote by 2H and CB(H) the familyof all nonempty subsets and the families of all the nonempty bounded closed subsets

2

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

187

Page 188: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

of H respectively, H(., .) represents the Hausdorff metric on CB(H). Let (Ω,Σ) be ameasurable space, where Ω is a set and Σ is σ-algebra of subsets of Ω. We denote byB(H) the class of Borel σ-fields in H.

Definition 2.1. A mapping f : Ω→ H is said to be measurable if for any C ∈ B(H),f−1(C) = t ∈ Ω : f(t) ∈ C ∈ Σ.

Definition 2.2. A multivalued mapping A : Ω → CB(H) is said to be measurable iffor any C ∈ B(H),

A−1(C) = t ∈ Ω : A(t) ∩ C 6= ∅ ∈ Σ.

Definition 2.3. A mapping f : Ω × H → H is called a random operator if for anyw ∈ H, f(t, w) = w(t) is measurable. A random operator f : Ω×H → H is said to becontinuous if for any t ∈ Ω, the mapping f(t, ·) : H → H is continuous.

Definition 2.4. A mapping u : Ω → H is called a measurable selection of themultivalued measurable mapping A : Ω → CB(H) if u is a measurable mapping andt ∈ Ω, u(t) ∈ A(t).

Definition 2.5. A mapping T : Ω × H → CB(H) is called a random multivaluedmapping if for any w ∈ H, T (·, w) is measurable. A random multivalued mappingT : Ω×H → CB(H) is said to be H-continuous if for any t ∈ Ω, T (t, ·) is continuousin the Hausdorff metric.

Let F(H) be a collection of fuzzy sets over H. A mapping F from H into F(H) iscalled a fuzzy mapping. If F is a fuzzy mapping on H, for any u ∈ H, F (u) (denotedby Fu in what follows) is a fuzzy set on H and Fu(z) is the membership function of zin Fu.

Let M ∈ F(H), q ∈ [0, 1], then the set

(M)q = u ∈ H : M(u) ≥ q

is called q-cut of M .

Definition 2.6. A fuzzy mapping F : Ω → F(H) is called measurable if for anyα ∈ (0, 1], (F (·))α : Ω→ 2H is measurable multivalued mapping.

Definition 2.7. A fuzzy mapping F : Ω × H → F(H) is called a random fuzzymapping if for any w ∈ H, F (·, w) : Ω→ F(H) is a measurable mapping.

Clearly, the random fuzzy mapping includes multivalued mapping, random multi-valued mappings and fuzzy mappings as the special cases:

Let A, T : Ω×H → F(H) be two fuzzy random mappings satisfying the followingcondition (S):

3

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

188

Page 189: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

(S): There exist two mappings a, c : H → (0, 1] such that for all (t, w) ∈ Ω × H,(At,w)a(w) ∈ CB(H), (Tt,w)c(w) ∈ CB(H). By using the fuzzy random mappings A, T ,

we can define two random multivalued mappings A and T as follows:

∀ (t, w) ∈ Ω×H, A : Ω×H → CB(H), (t, w)→ (At,w)a(w),

∀ (t, w) ∈ Ω×H, T : Ω×H → CB(H), (t, w)→ (Tt,w)c(w),

where A(t,w) = A(t, w(t)).

So, A and T are called the random multivalued mappings induced by the fuzzyrandom mappings A and T respectively.

Given mappings a, c : H → (0, 1] the fuzzy random mappings A, T : Ω × H →F(H) satisfying the condition (S). Let N : Ω×H×H → H and η : Ω×H×H → H∗ bethe mappings. Let b : H ×H → (−∞,∞) be a real valued function. For given f ∈ Hand any measurable mapping v : Ω → H, find measurable mappings u, x, y : Ω → Hsuch that At,u(t)(x(t)) ≥ a(u(t)), Tt,u(t)(y(t)) ≥ c(u(t)) and

〈Nt(x(t), y(t))−f, ηt(v(t), u(t))〉+a(u(t), v(t)−u(t)) ≥ b(u(t), u(t))−b(u(t), v(t)) (2.1)

for all v(t) ∈ H, t ∈ Ω and ηt(u(t), v(t)) = η(t, u(t), v(t)), where a : H × H →(−∞,+∞) is a coercive continuous bilinear form, that is there exists the measurablemappings e, d : Ω→ (0, 1) such that

(C1) a(v(t), v(t)) ≥ dt‖v(t)‖2 for all v(t) ∈ H(C2) |a(u(t), v(t))| ≤ et‖u(t)‖.‖v(t)‖ for all u(t), v(t) ∈ H.

It follows from (C1) and (C2) that d(t) ≤ e(t). Again function b(., .) is non differ-entiable and satisfies the following conditions:

(C3) for any measurable mapping v : Ω→ H, b(., v(t)) is linear;

(C4) for each measurable mapping w : Ω→ H, b(w(t), .) is a convex function;

(C5) for any measurable mappings w, v : Ω → H, b(w(t), v(t)) is bounded, that isthere exists a measurable function γ : Ω→ (0,+∞) such that

b(w(t), v(t)) ≤ γt‖w(t)‖.‖v(t)‖;

(C6) for any measurable mappings w, v, z : Ω→ H

b(w(t), v(t))− b(w(t), z(t) ≤ b(w(t), v(t)− z(t)).

The inequality (2.1) is called fuzziffied random generalized nonlinear variationallike inequalities.

Remark 2.1.

4

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

189

Page 190: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

1. For any measurable mapping w, v : Ω→ H

b(−w(t), v(t)) = −b(w(t), v(t)) and b(−w(t), v(t)) ≤ γt‖w(t)‖.‖v(t)‖,

hold from condition (C3) and (C5), respectively. So

|b(w(t), v(t))| ≤ γt‖w(t)‖ ‖v(t)‖.

2. For any measurable mappings w, v, z : Ω→ H

|b(w(t), v(t))− b(w(t), z(t))| ≤ γt‖w(t)‖ ‖v(t)− z(t)‖,

follows from conditions (C4) and (C6). So, b(w(t), v(t)) is continuous with respectto second variable.

Special Cases:

1. If a is zero operator f ≡ 0. Then problem (2.1) is equivalent to the problem(2.1) of Dai [9]. For any measurable mapping v : Ω → H, finding measurablemappings u, x, y : Ω→ H such that

At,u(t)(x(t)) ≥ a(u(t)), Tt,u(t)(y(t)) ≥ c(u(t))

and〈N(x(t), y(t)), η(v(t), u(t))〉+ b(u(t), v(t))− b(u(t), u(t)) ≥ 0 (2.2)

where N, η : H ×H → H.

2. If A, T : H → CB(H) are classical set valued mappings we can define the fuzzymappings A, T : H → F(H) by

u→ χA(u), u→ χT (u)

where χA(u) and χT (u) are characteristic functions of A(u) and T (u) respec-tively, taking a(u) = c(u) = 1 for all u ∈ H. For given f ∈ H and any measurablemapping v : Ω→ H, find measurable mappings u, x, y : Ω→ H such that

〈Nt(x(t), y(t))−f, ηt(v(t), u(t))〉+a(u(t), v(t)−u(t))−b(u(t), v(t)) ≥ b(u(t), u(t))(2.3)

for all v(t) ∈ H. It is called random generalized nonlinear variational like inequal-ities, which is the variant form of a problem studied by Liu et al. [26].

3. If a is zero operator, A, T : D → H and η : D × D → H∗ be the single valuedmappings, then (2.3) reduces to the following nonlinear mixed variational likeinequality:

For a given f ∈ H, find u ∈ D such that

〈N(A(u), T (u))− f, η(v, u)〉+ b(u, v)− b(u, u) ≤ 0, ∀ v ∈ H, (2.4)

considered by Ding [14].

5

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

190

Page 191: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

4. If N(Au, Tu) = Au− Tu, f ≡ 0 and b(u, u) = ϕ(u), where ϕ : H → (−∞,∞) isa functional. Then (2.4) is equivalent to a problem for finding u ∈ D such that

〈A(u)− T (u), η(v, u)〉 ≥ ϕ(u)− ϕ(v), ∀ v ∈ D. (2.5)

It is called mixed nonlinear variational like inequalities, considered and studiedby Ding [13].

5. Again, η(v, u) = gv − gu, for all u, v ∈ D where g : D → D is a mapping, then(2.5) is equivalent to finding u ∈ K such that

〈Au− Tu, gv − gu〉 ≥ ϕ(u)− ϕ(v), ∀ v ∈ D, (2.6)

which was studied by Yao [34].

Definition 2.8. A random multivalued mapping A : Ω ×H → CB(H) is said to beH-Lipschitz continuous, if there exists a measurable function λ : Ω → (0,+∞) suchthat

H(A(t, u1(t)), A(t, u2(t))) ≤ λ(t)‖u1(t)− u2(t)‖2 ∀ u1(t), u2(t) ∈ H.We give the following Lemmas.

Lemma 2.1[1]. Let A : Ω × H → CB(H) be a H-continuous random multival-ued mapping, then for measurable mapping u : Ω → H, the multivalued mappingA(., u(t)) : Ω→ CB(H) is measurable.

Lemma 2.2[2]. Let A1, A2 : Ω→ CB(H) be two measurable multivalued mappings,ε > 0 be a constant and x1 : Ω→ H be a measurable selection of A1, then there existsa measurable selection x2 : Ω→ H of A2 such that for all t ∈ Ω,

‖x1(t)− x2(t)‖ ≤ (1 + ε)H(A1(t), A2(t)).

Lemma 2.3[3]. Let D be a nonempty closed convex subset of a Hausdorff lineartopological space E and φ, ψ : D × D → R be the mappings satisfying the followingconditions:

(a) ψ(u, v) ≤ φ(u, v) for all u, v ∈ D and ψ(u, u) ≥ 0 for all u ∈ D;

(b) for each u ∈ D φ(u, .) is upper semicontinuous on D;

(c) for each v ∈ D, the set u ∈ D : ψ(u, v) < 0 is a convex set;

(d) there exists a nonempty compact set K ⊂ D and u0 ∈ K such that ψ(u0, y) < 0for all v ∈ D\K.

Then there exists v ∈ K such that φ(u, v) ≥ 0 for all u ∈ D.

Definition 2.9. Let N : Ω×H ×H → H and η : Ω×D×D → H∗ be the mappings.

6

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

191

Page 192: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

(i) N is said to be random η-strongly monotone with respect to the first variable ifthere exists a measurable function st,N : Ω→ (0, 1) such that

〈Nt(u(t), .)−Nt(v(t), .), ηt(u(t), v(t))〉 ≥ st,N‖u(t)− v(t)‖2

for all u, v ∈ D, t ∈ Ω;

(ii) N is said to be randomly η-monotone with respect to the second variable if

〈Nt(., u(t))−Nt(., v(t)), ηt(u(t), v(t))〉 ≥ 0

for all u, v ∈ D and t ∈ Ω;

(iii) N is said to be randomly Lipschitz continuous if there exists a measurable map-ping δ : Ω→ (0, 1) such that

‖Nt(u(t), .)−Nt(v(t), .)‖ ≤ δt,N‖u(t)− v(t)‖ ∀ u, v ∈ D, t ∈ Ω;

(iv) N is said to be η-hemicontinuous with respect to A and T of the first and secondvariables if for any u, v ∈ D, the mapping g : [0, 1]→ (−∞,∞) defined by

g(t) = 〈Nt(α(t)u(t) + (1− α(t))v(t), α(t)u(t) + (1− α(t))v(t)), ηt(u(t), v(t))〉

is continuous at 0+;

(v) η is said to be randomly Lipschitz continuous with measurable mapping σ : Ω→(0, 1) such that

‖ηt(u(t), v(t))‖ ≤ σt,η‖u(t)− v(t)‖ ∀ u, v ∈ D, t ∈ Ω;

(v) η is said to be randomly strongly monotone with a measurable mapping µ : Ω→(0, 1) such that

〈u(t)− v(t), ηt(u(t), v(t))〉 ≥ µt,η‖u(t)− v(t)‖2 ∀ u(t), v(t) ∈ D, t ∈ Ω.

Definition 2.10. Let N : Ω ×H ×H → H, η : Ω ×D ×D → H∗ be the mappings.A random multivalued mapping A : Ω×H → CB(H) is said to be

(i) randomly monotone if

〈Nt(x(t), .)−Nt(y(t), .), ηt(u(t), v(t))〉 ≥ 0

for all x(t) ∈ A(t, u(t)), y(t) ∈ A(t, v(t)), u(t), v(t) ∈ H, t ∈ Ω;

7

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

192

Page 193: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

(ii) A is said to be random τ -strong monotone with respect to the first variable of Nif there exists a measurable function τ : Ω→ (0,∞) such that

〈Nt(x(t), .)−Nt(y(t), .), ηt(u(t), v(t))〉 ≥ τt,N‖u(t)− v(t)‖2

for all x(t) ∈ A(t, u(t)), y(t) ∈ A(t, v(t)), u(t), v(t) ∈ H, t ∈ Ω.

Lemma 2.4. Let (Ω,Σ) be a measurable space and D be a nonempty convex subsetof a topological vector space. Let ϕ : Ω×D×D → (−∞,∞) be a real valued functionsuch that

(i) for each (v, u) ∈ D ×D, t→ ϕ(t, v, u) is measurable mapping;

(ii) for each (t, v) ∈ Ω×D, u→ ϕ(t, v, u) is continuous on each nonempty compactsubset of D;

(iii) for each (t, u) ∈ Ω×D, v → ϕ(t, v, u) is lower semicontinuous on each nonemptycompact subset of D;

(iv) for each t ∈ Ω, each nonempty finite set v1, v2, · · · , vn ⊂ D and for each

u =m∑i=1

αivi (αi ≥ 0,m∑i=1

αi = 1), min1≤i≤m

ϕ(t, vi, u) ≤ 0;

(v) for each t ∈ Ω, there exists a nonempty compact subset D0 of D and a nonemptycompact subset K of D such that for each u ∈ D\K there is a v ∈ co(D0 ∪ u)with ϕ(t, v, u) > 0.

Then there exists a measurable mapping u : Ω→ D such that ϕ(t, v, u(t)) ≤ 0 forall v ∈ D and t ∈ Ω.Definition 2.11. A random multivalued mapping T : Ω×H → CB(H) is said to berandomly H-Lipschitz continuous, if there exists a measurable function κ : Ω→ (0,∞)such that

H(T (t, u(t)), T (t, v(t))) ≤ κT‖u(t)− v(t)‖ ∀ u(t), v(t) ∈ H, t ∈ Ω.

3 Auxiliary Problem and Algorithm

Now we consider the following auxiliary problem with respect to the fuzziffied randomgeneralized nonlinear variational like inequality problem (2.1).

For any given measurable mapping u : Ω→ D, for measurable mapping v : Ω→ D,find measurable mapping w : Ω → D such that for all t ∈ Ω x(t) ∈ A(t, w(t)),y(t) ∈ T (t, w(t)) and

〈w(t), ηt(v(t), w(t))〉 ≥ 〈u(t), ηt(v(t), w(t))〉 − ρt〈Nt(x(t), y(t))− f, ηt(v(t), w(t))〉−ρta(w(t), v(t)− w(t))− ρtb(u(t), v(t)) + ρtb(u(t), w(t))(3.1)

8

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

193

Page 194: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

where ρ : Ω→ (0,∞) is a measurable mapping.

Theorem 3.1. Let (Ω,Σ) be a measurable space, D be a nonempty convex closedsubset of H and f ∈ H. Let random fuzzy mappings A, T : Ω × H → F(H) satisfythe condition (S) and A and T , the random multivalued mappings induced by thefuzzy random mappings A and T respectively. Let N : Ω × H × H → H be themapping such that N is random η-hemicontinuous with respect to A and T in firstand second variables. Let η : Ω × D × D → H∗ be the random Lipschitz continuouswith a measurable function σ : Ω → (0, 1) and random η strongly monotone withrespect to the measurable mappings µ : Ω → (0, 1). For each v ∈ D, ηt(., v(t)) becontinuous and semi continuous in second variables and ηt(v(t), u(t)) = −ηt(u(t), v(t))for all u, v ∈ D, t ∈ Ω. Suppose a : D ×D → (−∞,+∞) satisfies (C1) and (C2). Letb : D ×D → (−∞,+∞] be a real valued function satisfying (C3).

(1) For each t ∈ Ω, the mappings A(t, .), T (t, .) are randomly H-Lipschitz continuouswith the measurable functions λ, κ : Ω→ (0, 1) respectively;

(2) the measurable mappings Nt(., .) is randomly Lipschitz continuous and randomlyη-strongly monotone with respect to the random multivalued mappings A in thefirst variable with the measurable functions δ, s : Ω → (0,+∞) respectively andN(., .) is randomly Lipschitz continuous and randomly η-relaxed monotone withrespect to the random multivalued mapping T in the second variable with themeasurable functions ξ, r : Ω→ (0,+∞) respectively.

Then the auxiliary problem (3.1) has a unique random solutions.Proof. For any fixed measurable mapping u : Ω → D, for any measurable mappingsv, w : Ω→ D, we define the functional φ, ψ : Ω×D ×D → (−∞,+∞] by

φt(v(t), w(t)) = 〈v(t), ηt(v(t), w(t))〉 − 〈u(t), ηt(v(t), w(t))〉+ ρt〈Nt(x1(t), y1(t))− f, ηt(v(t), w(t))〉+ ρta(v(t), v(t)− w(t))− ρtb(u(t), w(t)) + ρtb(u(t), v(t))

for all x1(t) ∈ A(t, v(t)), y1(t) ∈ T (t, v(t)) and

ψt(v(t), w(t)) = 〈w(t), ηt(v(t), w(t))〉 − 〈u(t), ηt(v(t), w(t))〉+ ρt〈Nt(x2(t), y2(t))− f, ηt(v(t), w(t))〉+ ρta(w(t), v(t)− w(t))− ρtb(u(t), w(t)) + ρtb(u(t), v(t)),

for all x2(t) ∈ A(t, w(t)), y2(t) ∈ T (t, w(t)).

Since A and T are random multivalued mappings induced by the fuzzy randommappings A and T respectively i.e., for each t ∈ Ω, u(t) ∈ D, A(t, u(t)) and T (t, u(t))are measurable mappings. From Lemma 2.4, for any fixed (v(t), u(t)) ∈ D × D, t →

9

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

194

Page 195: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

ϕt(v(t), u(t)) is measurable. Now we verify the functional φ and ψ satisfy all conditionsof Lemma 2.3 in the weak topology. It is easy to see that for all v(t), w(t) ∈ D, t ∈ Ω,

φt(v(t), w(t))− ψt(v(t), w(t)) = 〈v(t)− w(t), ηt(v(t), w(t))〉+ ρt〈Nt(x1(t), y1(t))−Nt(x2(t), y1(t)), ηt(v(t), w(t))〉+ ρt〈Nt(x2(t), y1(t))−Nt(x2(t), y2(t)), ηt(v(t), w(t))〉+ ρta(v(t)− w(t), v(t)− w(t))

≥ [µt,η + ρt(st,NA,η− rt,NT ,η

+ dt)]‖v(t)− w(t)‖2 ≥ 0,

which implies that φt and ψt satisfy the condition (1) of Lemma 2.3. Given a is acoercive continuous bilinear from, therefore a(v(t), v(t) − w(t)) is weakly upper semicontinuous with respect to w(t). Since b is convex, lower semi continuous in the secondvariable. For any measurable mapping v : Ω→ D, the mapping u(t)→ ηt(u(t), v(t)) fort ∈ Ω is convex and upper semi continuous. Therefore φt(v(t), .) is weakly upper semicontinuous in the second variable and the set t ∈ Ω, v(t) ∈ D : ψt(v(t), w(t)) < 0is convex for each measurable mapping w : Ω → D. Therefore the Assumption (b)and (c) of Lemma 2.3, and (iv) of Lemma 2.4 hold. Let v : Ω → D be a measurablemapping. Assume

Lt = [µt,η + ρt(st,NA,η− rt,NT ,η

+ dt)]−1[σt,η‖u(t)− v(t)‖+ ρtet‖v(t)‖

+ ρtσt,η‖Nt(x1(t), y1(t))− f‖+ ρtγt‖u(t)‖]

andMt = t ∈ Ω, w(t) ∈ D : ‖w(t)− v(t)‖ ≤ Lt.

Since Mt is weakly compact subset of D and for any w(t) ⊆ D\M and x2(t) ∈A(t, w(t)), y2(t) ∈ T (t, w(t)), x1(t) ∈ A(t, v(t)), y1(t) ∈ T (t, v(t))

ψt(v(t), w(t)) = 〈w(t), ηt(v(t), w(t))〉 − 〈u(t), ηt(v(t), w(t))〉+ ρt〈Nt(x2(t), y2(t))− f, ηt(v(t), w(t))〉+ ρta(w(t), v(t)− w(t))− ρtb(u(t), w(t)) + ρtb(u(t), v(t))

≤ −〈w(t)− v(t), ηt(w(t), v(t))〉+ 〈u(t)− v(t), ηt(w(t), v(t))〉− ρt〈Nt(x2(t), y2(t))−Nt(x1(t), y2(t)), ηt(w(t), v(t))〉− ρt〈Nt(x1(t), y2(t))−Nt(x1(t), y1(t)), ηt(w(t), v(t))〉− ρt〈Nt(x1(t), y1(t))− f, ηt(w(t), v(t))〉 − ρta(w(t)− v(t), w(t)− v(t))

− ρta(v(t), w(t)− v(t)) + ρtb(u(t), v(t)− w(t))

≤ −‖w(t)− v(t)‖[µt,η + ρt(st,NA,η− rt,NT ,η

+ dt)]‖w(t)− v(t)‖− σt,η‖u(t)− v(t)‖ − ρtet‖v(t)‖ − ρtσt,η‖Nt(x1(t), y1(t))− f‖ − ρtγt‖u(t)‖< 0.

Hence condition (d) of Lemma 2.3 holds. By Lemma 2.3, for t ∈ Ω, there existsa measurable mapping w : Ω → D such that φt(u(t), w(t)) ≥ 0 for each measurablemapping u : Ω→ D.

10

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

195

Page 196: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

We know that mapping Nt(., .) is random Lipschitz continuous in first and secondvariable and the mapping A(t, .), T (t, .) are random H-Lipschitz continuous. Based onLemma 2.1, for any measurable mapping v : Ω→ D, we obtain w : Ω→ D, there existx1(t) ∈ A(t, v(t)), y1(t) ∈ T (t, v(t)) such that

〈v(t), ηt(v(t), w(t))〉 ≥ 〈u(t), ηt(v(t), w(t))〉 − ρt〈Nt(x1(t), y1(t))− f, ηt(v(t), w(t))〉−ρta(v(t), v(t)− w(t))− ρtb(u(t), v(t)) + ρtb(u(t), w(t)) (3.2)

for each given measurable mappings u : Ω→ D.

Let β be in (0, 1] and a measurable point v : Ω → D. Replacing v(t) by vβ(t) =βv(t) + (1− β)w(t) in (3.2), we have

〈vβ(t), ηt(vβ(t), w(t))〉 ≥ 〈u(t), ηt(vβ(t), w(t))〉 − ρt〈Nt(xβ(t), yβ(t))− f,ηt(vβ(t), w(t))〉 − ρta(vβ(t), vβ(t)− w(t))

−ρtb(u(t), vβ(t)) + ρtb(u(t), w(t)) (3.3)

for all v(t) ∈ D, t ∈ Ω, for xβ(t) ∈ A(t, vβ(t)) and yβ(t) ∈ T (t, vβ(t)).

Since b is convex in the second variable, 〈Nt(x(t), y(t)), ηt(v(t), .)〉 is concave andupper semicontinuous. From (C6) and (3.3), we have

[〈vβ(t), ηt(v(t), w(t))〉] ≥ β[〈u(t), ηt(v(t), w(t))〉 − ρt〈Nt(xβ(t), yβ(t))− f,ηt(v(t), w(t))〉 − ρta(vβ(t), v(t)− w(t))− ρtb(u(t), v(t))

+ ρtb(u(t), w(t))] ∀ v(t) ∈ D, t ∈ Ω,

implies that

[〈vβ(t), ηt(v(t), w(t))〉] ≥ 〈u(t), ηt(v(t), w(t))〉 − ρt〈Nt(xβ(t), yβ(t))− f,ηt(v(t), w(t))〉 − ρta(vβ(t), v(t)− w(t))− ρtb(u(t), v(t))

+ ρtb(u(t), w(t)) ∀ v(t) ∈ D, t ∈ Ω,

where ρ : Ω→ (0, 1) is a measurable mapping.

Letting β → 0+ in the above inequality, thus

〈w(t), ηt(v(t), w(t))〉 ≥ 〈u(t), ηt(v(t), w(t))〉 − ρt〈Nt(x(t), y(t))− f, ηt(v(t), w(t))〉− ρta(w(t), v(t)− w(t))− ρtb(u(t), v(t)) + ρtb(u(t), w(t))

for all v(t) ∈ D, t ∈ Ω, x(t) ∈ A(t, w(t)) and y(t) ∈ T (t, w(t)).

This shows that for any t ∈ Ω and given each measurable mapping u : Ω → D,for each v : Ω → D measurable mapping, the measurable mapping w : Ω → D,x(t) ∈ A(t, w(t)), y(t) ∈ T (t, w(t)) is the random solution of the auxiliary problem(3.1).

11

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

196

Page 197: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

We prove that for any t ∈ Ω, the measurable mapping t→ w(t), x(t) ∈ A(t, w(t)),y(t) ∈ T (t, w(t)) is unique random solutions of the auxiliary problem (3.1). Suppos-ing the measurable mapping w1(t), w2(t) ∈ D, x1(t) ∈ A(t, w1(t)), y1(t) ∈ T (t, w1(t)),x2(t) ∈ A(t, w2(t)), y2(t) ∈ T (t, w2(t)) are two random solutions of the auxiliary prob-lem (3.1), we have the conclusion that for all v : Ω→ D, t ∈ Ω

〈w1(t), ηt(v(t), w1(t))〉 ≥ 〈u(t), ηt(v(t), w1(t))〉 − ρt〈Nt(x1(t), y1(t))− f,ηt(v(t), w1(t))〉 − ρta(w1(t), v(t)− w1(t))

− ρtb(u(t), v(t)) + ρtb(u(t), w1(t)) (3.4)

and

〈w2(t), ηt(v(t), w2(t))〉 ≥ 〈u(t), ηt(v(t), w2(t))〉 − ρt〈Nt(x2(t), y2(t))− f,ηt(v(t), w2(t))〉 − ρta(w2(t), v(t)− w2(t))

− ρtb(u(t), v(t)) + ρtb(u(t), w2(t)). (3.5)

Putting v(t) = w2(t) in (3.4) and v(t) = w1(t) in (3.5), we have

〈w1(t), ηt(w2(t), w1(t))〉 ≥ 〈u(t), ηt(w2(t), w1(t))〉 − ρt〈Nt(x1(t), y1(t))− f,ηt(w2(t), w1(t))〉 − ρta(w1(t), w2(t)− w1(t))

− ρtb(u(t), w2(t)) + ρtb(u(t), w1(t))

and

〈w2(t), ηt(w1(t), w2(t))〉 ≥ 〈u(t), ηt(w1(t), w2(t))〉 − ρt〈Nt(x2(t), y2(t))− f,ηt(w1(t), w2(t))〉 − ρta(w2(t), w1(t)− w2(t))

− ρtb(u(t), w1(t)) + ρtb(u(t), w2(t)).

〈w1(t)− w2(t), ηt(w1(t), w2(t))〉 ≤ −ρt〈Nt(x1(t), y1(t))−Nt(x2(t), y1(t)),

ηt(w1(t), w2(t))〉 − ρt〈Nt(x2(t), y1(t))

−Nt(x2(t), y2(t)), ηt(w1(t), w2(t))〉− ρta(w1(t)− w2(t), w1(t)− w2(t)).

Noting that N(., .) is random η-strongly monotone with respect to random mul-tivalued mapping A in first variable with measurable function st : Ω → (0,+∞) andrandom η-relaxed monotone with respect to the random multivalued mapping T in thesecond argument with r : Ω→ (0,+∞), a(., .) a coercive we have

µt‖w1(t)− w2(t)‖2 ≤ −ρt(rt,NT ,η+ st,NA,η

+ dt)‖w1(t)− w2(t)‖2 ≤ 0

which yield that w1(t) = w2(t).

Further let x1(t) ∈ A(t, w1(t)), y1(t) ∈ T (t, w1(t)), x2(t) ∈ A(t, w2(t)), y2(t) ∈T (t, w2(t)) by Lemma 2.2, we get

‖x1(t)− x2(t)‖ ≤ (1 + ε)H(A(t, w1(t)), A(t, w2(t))) ≤ (1 + ε)λt,HA‖w1(t)− w2(t)‖

12

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

197

Page 198: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

‖y1(t)− y2(t)‖ ≤ (1 + ε)H(T (t, w1(t)), T (t, w2(t))) ≤ (1 + ε)κt,HT‖w1(t)− w2(t)‖.

So we get x1(t) = x2(t) and y1(t) = y2(t), which imply that for any t ∈ Ω and themeasurable mapping u : Ω → D, the measurable mapping w, x, y : Ω → D such thatt ∈ Ω, x(t) ∈ A(t, w(t)), y(t) ∈ T (t, w(t)) is a unique random solutions of the auxiliaryproblem (3.1).

4 Existence and Convergence Analysis

In this section, we first construct an algorithm for solving the fuzziffied random general-ized nonlinear variational like inequality (2.1). Then we prove the existence of solutionsfor the fuzziffied random generalized nonlinear variational like inequalities (2.1) andalso discuss the convergence of the sequence generated by the Algorithm 4.1. FromTheorem 3.1, we suggest the following algorithm for the fuzziffied random generalizednonlinear variational like inequalities (2.1).

Algorithm 4.1. Suppose that a : D × D → (−∞,∞) satisfies (C1) − (C2), b :D×D → (−∞,∞) satisfies (C3)− (C6), N : Ω×H×H → H, η : Ω×D×D → H∗ aremappings and f ∈ H. For any given measurable mapping u0 : Ω→ D by Lemma 2.1,the multivalued mappings A(., u0(.)), T (., u0(.)) : Ω × H → CB(H) are measurable,hence there exist measurable selection x0 : Ω → D of A(., u0(.)) and y0 : Ω → D ofT (., u0(.)). From Theorem 3.1 for given each measurable mapping v : Ω → D, thereexists measurable mapping u1 : Ω → D, the measurable selection x1 : Ω → D ofA(., u1(.)) and y1 : Ω→ D of T (., u1(.)) such that for all t ∈ Ω,

〈u1(t), ηt(v(t), u1(t))〉 ≥ 〈u0(t), ηt(v(t), u1(t))〉 − ρt〈Nt(x1(t), y1(t))− f,ηt(v(t), u1(t))〉 − ρta(u1(t), v(t)− u1(t))− ρtb(u0(t), v(t))

+ ρtb(u0(t), u1(t)) + 〈e0(t), ηt(v(t), u1(t))〉

and‖x1(t)− x0(t)‖ ≤ (1 + 1)H(A(t, u1(t)), A(t, u0(t)))

‖y1(t)− y0(t)‖ ≤ (1 + 1)H(T (t, u1(t)), T (t, u0(t))).

Continuing the above process inductively, we can define the following randomiterative sequences un(t) and xn(t) and yn(t) for solving problem (2.1) as follows:

〈un+1(t), ηt(v(t), un+1(t))〉 ≥ 〈un(t), ηt(v(t), un+1(t))〉 − ρt〈Nt(xn+1(t), yn+1(t))− f,ηt(v(t), un+1(t))〉 − ρta(un+1(t), v(t)− un+1(t))− ρtb(un(t), v(t))

+ ρtb(un(t), un+1(t)) + 〈en(t), ηt(v(t), un+1(t))〉,

xn+1(t) ∈ A(t, un+1(t)), yn+1(t) ∈ T (t, un+1(t)),

‖xn+1(t)− xn(t)‖ ≤ (1 + (1 + n)−1)H(A(t, un+1(t)), A(t, un(t))),

‖yn+1(t)− yn(t)‖ ≤ (1 + (1 + n)−1)H(T (t, un+1(t)), T (t, un(t))), (4.1)

13

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

198

Page 199: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

for n ≥ 0, where en(t)n≥0 ⊂ H and ρ : Ω→ (0,∞) is measurable mapping.

Theorem 4.1. Let (Ω,Σ) be a measurable space and D be a nonempty closed convexsubset of H and f ∈ H. Let the measurable mapping η : Ω×D ×D → D be randomstrongly η monotone and random Lipschitz continuous with the measurable functionsµ, σ : Ω→ (0,+∞) respectively. Let the measurable function b : D×D → (−∞,+∞]be a real valued function satisfy (C3) − (C6). Suppose a : D × D → (−∞,+∞)satisfy (C1) and (C2). Suppose A, T : Ω×H → F(H) be two random fuzzy mappingssatisfying the condition (S). Let A, T : Ω × H → CB(H) be random H-Lipschitzcontinuous multivalued mappings induced by A and T respectively. The measurablefunction N is randomly Lipschitz continuous and random strongly monotone in thefirst variable with respect to the random multivalued mapping A with the measurablefunctions δ, s : Ω → (0,+∞) respectively. Nt(., .) is randomly Lipschitz continuousand random relaxed monotone with respect to the random multivalued mappings Tin the second variable with measurable functions ξ, r : Ω → (0,+∞) respectivelytoo. Suppose that A and T are Lipschitz H-continuous with λHA

, κHT: Ω → (0, 1)

respectively and

(δtλt,HA+ ξtκt,HT

) > st,NA, qt =

γt − dtσt

, pt =µtσt, lim

n→∞‖en(t)‖ = 0. (4.2)

If there exists any measurable function ρ : Ω→ (0,+∞) satisfying

0 < ρt <µt

γt − dt(4.3)

and one of the following conditions:∣∣∣∣∣ρt − st,NA− rt,NT

− qtpt(δtλt,HA

+ ξtκt,HT)2 − q2t

∣∣∣∣∣<

√(st,NA

− rt,NT− qtpt)2 − ((λt,HA

δt + ξtκt,HT)2 − q2t )(1− p2t )

(δtλt,HA+ ξtκt,HT

)2 − q2t(4.4)

(δtλt,HA+ ξtκt,HT

) > qt,

|st,NA− rt,NT

− qtpt| >√

((δtλt,HA+ ξtκt,HT

)2 − q2t )(1− p2t ),

pt < 1, (4.5)∣∣∣∣∣ρt − rt,NT− qtpt − st,NA

q2t − (δtλt,HA+ ξtκt,HT

)2

∣∣∣∣∣<

√(st,NA

− rt,NT− qtpt)2 + (q2t − (δtλt,HA

+ ξtκt,HT)2)(1− p2t )

q2t − (δtλt,HA+ ξtκt,HT

)2

14

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

199

Page 200: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

(δtλt,HA+ ξtκt,HT

) < qt.

Then there exist measurable mappings u, x, y : Ω → D such that for all t ∈ Ω,x(t) ∈ A(t, u(t)), y(t) ∈ T (t, u(t)) has a unique solutions of (2.1). Moreover therandom iterative sequences un(t)n≥0, xn(t)n≥0 and yn(t)n≥0 obtained by randomAlgorithm 4.1 converges to u(t), x(t) and y(t), respectively.

Proof. From the proof of Theorem 3.1, for each t ∈ Ω and the measurable mappingu : Ω → D, there exists a unique solution w (i.e., u(t) ∈ D, x(t) ∈ A(t, u(t)), y(t) ∈T (t, u(t))) satisfying the auxiliary problem (3.1). Defining a random mapping G :Ω×D → D satisfying Gt(u(t)) = w(t) (i.e. u(t)→ w(u(t)) where w(t) (i.e. u(t) ∈ D,x(t) ∈ A(t, u(t)), y(t) ∈ T (t, u(t)))) is the unique solution of (3.1). Now we will provethat the random mapping G is a contraction mapping. Let any u1(t) and u2(t) in D,there exists unique w1(t) = Gt(u1(t)), w2(t) = Gt(u2(t)) for all v(t) ∈ D and t ∈ Ω,such that

〈Gt(u1(t)), ηt(v(t), Gt(u1(t)))〉 ≥ 〈u1(t), ηt(v(t), Gt(u1(t)))〉 − ρt〈Nt(x1(t), y1(t))

− f, ηt(v(t), Gt(u1(t)))〉 − ρta(Gt(u1(t)), v(t)

−Gt(u1(t)))− ρtb(u1(t), v(t))

+ ρtb(u1(t), Gt(u1(t))), (4.6)

for all x1(t) ∈ A(t, u1(t)) and y1(t) ∈ T (t, u1(t)) and

〈Gt(u2(t)), ηt(v(t), Gt(u2(t)))〉 ≥ 〈u2(t), ηt(v(t), Gt(u2(t)))〉 − ρt〈Nt(x2(t), y2(t))

− f, ηt(v(t), Gt(u2(t)))〉 − ρta(Gt(u2(t)), v(t)

−Gt(u2(t)))− ρtb(u2(t), v(t))

+ ρtb(u2(t), Gt(u2(t))), (4.7)

for all x2(t) ∈ A(t, u2(t)) and y2(t) ∈ T (t, u2(t)) for all t ∈ Ω. Taking v(t) = Gt(u2(t))in (4.6) and v(t) = Gt(u1(t)) in (4.7) and adding these inequalities with ηt(u(t), v(t)) =−ηt(v(t), v(t)) and the assumption of b(., .), we arrive at

µt,η‖Gt(u1(t))−Gt(u2(t))‖2

≤ 〈Gt(u1(t))−Gt(u2(t)), ηt(Gt(u1(t)), Gt(u2(t)))〉≤ 〈u1(t)− u2(t)− ρt(Nt(x1(t), y1(t))

−Nt(x2(t), y2(t))), ηt(Gt(u1(t)), Gt(u2(t))〉− ρta(Gt(u1(t))−Gt(u2(t)), Gt(u1(t))−Gt(u2(t)))

+ ρtb(u1(t)− u2(t), Gt(u2(t))−Gt(u1(t)))

≤ ‖u1(t)− u2(t)− ρt(Nt(x1(t), y1(t))

−Nt(x2(t), y2(t)))‖‖ηt(Gt(u1(t)), Gt(u2(t)))‖− ρtdt‖Gt(u1(t))−Gt(u2(t))‖2

+ ρtγt‖u1(t)− u2(t)‖‖Gt(u1(t))−Gt(u2(t))‖. (4.8)

15

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

200

Page 201: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Now from the random Lipschitz H-continuity of N both variables and strongrandom monotonicity of N with first variable and random relaxed monotonicity of Nwith second variables, we have

16

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

201

Page 202: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

‖u1(t)−u2(t)−ρt(Nt(x1(t), y1(t))−Nt(x2(t), y2(t)))‖2

= ‖u1(t)− u2(t)‖2 − 2ρt〈Nt(x1(t), y1(t))−Nt(x2(t), y2(t)), u1(t)− u2(t)〉+ ρ2t‖Nt(x1(t), y1(t))−Nt(x2(t), y2(t))‖2

≤ ‖u1(t)− u2(t)‖2 − 2ρt〈Nt(x1(t), y1(t))−Nt(x2(t), y1(t)), u1(t)− u2(t)〉− 2ρt〈Nt(x2(t), y1(t))−Nt(x2(t), y2(t)), u1(t)− u2(t)〉

+ ρ2t

[‖Nt(x1(t), y1(t))−Nt(x2(t), y1(t))‖+ ‖Nt(x2(t), y1(t))−Nt(x2(t), y2(t))‖

]2≤ ‖u1(t)− u2(t)‖2 − 2ρtst,NA

‖u1(t)− u2(t)‖2 + 2ρtrt,NT‖u1(t)− u2(t)‖2

+ ρ2t

[δt‖x1(t)− x2(t)‖+ ξt‖y1(t)− y2(t)‖

]2≤[1− 2ρt(st,NA

− rt,NT)]‖u1(t)− u2(t)‖2

+ ρ2t

[δtH(A(t, u1(t)), A(t, u2(t))) + ξtH(T (t, u1(t)), T (t, u2(t)))

]2≤[1− 2ρt(st,NA

− rt,NT)]‖u1(t)− u2(t)‖2

+ ρ2t

[δtλt,HA

‖u1(t)− u2(t)‖+ ξtκt,HT‖u1(t)− u2(t)‖

]2≤[1− 2ρt(st,NA

− rt,NT) + ρ2t (δtλt,HA

+ ξtκt,HT)2]‖u1(t)− u2(t)‖2. (4.9)

From (4.8) and (4.9), we get

µt‖Gt(u1(t))−Gt(u2(t))‖2

≤[σt√

1− 2ρt(st,NA− rt,NT

) + ρ2t (δtλt,HA+ ξtκt,HT

)2 + ρtγt

]‖u1(t)− u2(t)‖

‖Gt(u1(t))−Gt(u2(t))‖ − ρtdt‖Gt(u1(t))−Gt(u2(t))‖2,that is

‖Gt(u1(t))−Gt(u2(t))‖ ≤ θ(t)‖u1(t)− u2(t)‖,

where

θ(t) =σt√

1− 2ρt(st,NA− rt,NT

) + ρ2t (δtλt,HA+ ξtκt,HT

)2 + ρtγt

µt + ρtdt< 1. (4.10)

By (4.3), and one of (4.4) and (4.5), therefore G : Ω × D → D is a contractionmapping. Hence there exists a unique point u(t) ∈ D such that u(t) = Gt(u(t)) andfor each measurable mapping v : Ω→ D,

〈u(t), ηt(v(t), u(t))〉 ≥ 〈u(t), ηt(v(t), u(t))〉 − ρt〈Nt(x(t), y(t))

− f, ηt(v(t), u(t))〉 − ρta(u(t), v(t)− u(t))

− ρtb(u(t), v(t)) + ρtb(u(t), u(t)), (4.11)

17

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

202

Page 203: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

where ρ : Ω→ (0, 1) is a measurable mapping, which implies that

〈Nt(x(t), y(t))− f, ηt(v(t), u(t))〉+ a(u(t), v(t)− u(t)) ≥ b(u(t), u(t))− b(u(t), v(t)),

for all v(t) ∈ D, that is u(t) ∈ D, x(t) ∈ A(t, u(t)), y(t) ∈ T (t, u(t)) is the uniquerandom solutions of the problem (2.1).

Next we consider the convergence of random iterative sequence generated by Al-gorithm 4.1. Taking v(t) = un+1(t) in (4.11) and v(t) = un(t) in (4.1) and adding theseinequalities we have

µt‖un+1(t)− un(t)‖2 ≤ 〈un+1(t)− un(t), ηt(un+1(t), un(t))〉≤ 〈un+1(t)− un(t)− ρt(Nt(xn+1(t), yn+1(t))

−Nt(xn(t), yn(t))), ηt(un+1(t), un(t))〉− ρta(un+1(t)− un(t), un+1(t)− un(t))

+ ρtb(un+1(t)− un(t), un(t)− un+1(t))

+ 〈en(t), ηt(un+1(t), un(t))〉

≤[σt√

1− 2ρt(st,NA− rt,NT

) + ρ2t (δtλt,HA+ ξtκt,HT

)2 + ρtγt]‖un+1(t)− un(t)‖

‖un+1(t)− un(t)‖ − ρtdt‖un+1(t)− un(t)‖2 + ‖en(t)‖‖un+1(t)− un(t)‖, ∀ n ≥ 1.

That is‖un+1(t)− un(t)‖ ≤ θn(t)‖un−1(t)− un(t)‖+ ‖en(t)‖ (4.12)

where

θn(t) =σt√

1− 2ρt(st,NA− rt,NT

) + ρ2t (δtλt,HA+ ξtκt,HT

)2(1 + n−1)2 + ρtγt

µt + ρtdt.

Let

θ(t) =σt√

1− 2ρt(st,NA− rt,NT

) + ρ2t (δtλt,HA+ ξtκt,HT

)2 + ρtγt

µt + ρtdt, ∀ t ∈ Ω.

We know that for each t ∈ Ω, θn(t) → θ(t) and ‖en(t)‖ → 0 as n → ∞. ByCondition (4.2), it follows that θ(t) ∈ (0, 1) and hence (4.12) implies that un(t) isa Cauchy sequence in D. Since D is complete, there exists a measurable mappingu : Ω→ D such that un(t)→ u(t) as n→∞.

Further, from Algorithm 4.1, we have

‖xn+1(t)− xn(t)‖ ≤ λt,HA

(1 +

1

n

)‖un+1(t)− un(t)‖

‖yn+1(t)− yn(t)‖ ≤ κt,HT

(1 +

1

n

)‖un+1(t)− un(t)‖,

18

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

203

Page 204: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

which implies that xn(t), yn(t) are also Cauchy sequences in H. Let xn(t)→ x(t),yn(t)→ y(t), n→∞. Since un(t), xn(t) and yn(t) are sequences of measurablemappings, we know that u, x, y : Ω → H are measurable. Now we prove that x(t) ∈A(t, u(t)) and y(t) ∈ T (t, u(t)) for any t ∈ Ω, we have

d(x(t), A(t, u(t)) = inf‖x(t)− z‖ : z ∈ A(t, u(t))≤ ‖x(t)− xn(t)‖+ d(xn(t), A(t, u(t)))

≤ ‖x(t)− xn(t)‖+ H(A(t, un(t)), A(t, u(t)))

≤ ‖x(t)− xn(t)‖+ λt,HA‖un(t)− u(t)‖ → 0.

Hence, x(t) ∈ A(t, u(t)), for all t ∈ Ω. Similarly, we can prove that y(t) ∈T (t, u(t)). So we have

〈Nt(x(t), y(t))− f, η(v(t), u(t))〉+ a(u(t), v(t)− u(t)) ≤ b(u(t), u(t))− b(u(t), v(t)),

for all v(t) ∈ D, t ∈ Ω. This completes the proof.

References

[1] R. Ahmad and A.P. Farajzadeh, On random variational inclusions with randomfuzzy mappings and random relaxed cocoercive mappings, Fuzzy Sets and Systems160 (2009), 3166–3174.

[2] S.S. Chang, Fixed Point Theory with Applications, Chongging Publishing House,Chongging, 1984.

[3] S.S. Chang, Variational Inequality and Complementarity Problem Theory withApplication, Shanghai Scientific and Tech. Literature Publishing House, Shanghai,1991.

[4] S.S. Chang, and Y.G. Zhu, On variational inequalities for fuzzy mappings, FuzzySets and Systems 32 (1989), 359–367.

[5] S.S. Chang and N.J. Huang, On variational inequalities for fuzzy mappings, FuzzySets and Systems 32 (1989), 356–367.

[6] Cheng-Feng Hu, Solving variational inequalities in a fuzzy environment, J. Math.Anal. Appl. 249 (2000), 527–538.

[7] Y.J. Cho and H.Y. Lan, Generalized nonlinear random (A, η)-accretive equationswith random relaxed cocoercive mappings in Banach spaces, Comput. Math. Appl.55(9) (2008), 2173–2182.

19

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

204

Page 205: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

[8] P. Cubiotti, Existence of solutions for lower semicontinuous quasi equilibriumproblems, Comput. Math. Appl. 30 (1995), 11–22.

[9] H.X. Dai, Generalized mixed variational-like inequality for random fuzzy mappings,J. Computational and Applied Mathematics 224 (2009), 20–28.

[10] X.P. Ding, Algorithm of solutions for mixed implicit quasi-variational inequalitieswith fuzzy mappings, Comput. Math. Appl. 38(5-6) (1999), 231–249.

[11] X.P. Ding and Y.J. Park, A new class of generalized nonlinear implicit quasi-variational inclusions with fuzzy mappings, J. Comput. Appl. Math. 138 (2002),243–257.

[12] X.P. Ding, Algorithm of solutions for mixed nonlinear variational like inequalitiesin reflexive Banach spaces, Appl. Math. Mech. 19(6) (1998), 521–529.

[13] X.P. Ding, Existence and uniqueness of solutions for random mixed variational-like inequalities in Banach spaces, J. Sichuan Normal Univ. Nat. Sci. 20 (1997),1–5.

[14] X.P. Ding, Existence and algorithm of solutions for nonlinear mixed variational-like inequalities in Banach spaces, J. Comput. Appl. Math. 157 (2003), 419–434.

[15] X.P. Ding and K.K. Tan, A minimax inequality with applications to existence ofequilibrium point and fixed point theorems, Colloq. Math. 63 (1992), 233–247.

[16] R. Glowinski, J.L. Lions and R. Tremolieres, Numerical Analysis of VariationalInequalities, North-Holland, Amsterdam, 1981.

[17] N.J. Huang and H.Y. Lan, A couple of nonlinear equations with fuzzy normedspaces, Fuzzy Sets and Systems 152 (2005), 209–222.

[18] N.J. Huang, Random generalized nonlinear variational inclusions for random fuzzymappings, Fuzzy Sets and Systems 105(1999), 437–444.

[19] N.J. Huang and C.X. Ding, Auxiliary principle and iterative algorithms for gen-eralized set-valued strongly nonlinear mixed variational like inequalities, J. Math.Anal. Appl. 256 (2001), 345–359.

[20] N.J. Huang and Y.J. Cho, Random completely generalized set-valued implicitquasi-variational inequalities, Positivity 3 (1999), 201–213.

[21] M.F. Khan and Salahuddin, Completely generalized nonlinear random variationalinclusions, South East Asian Bulletin of Mathematics 30(5) (2006), 261–276.

[22] H.Y. Lan and R.U. Verma, Iterative algorithms for nonlinear fuzzy variational in-clusions systems with (A, η)-accretive mappings in Banach spaces, Adv. NonlinearVar. Inequal. 11(1) (2008), 15–30.

20

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

205

Page 206: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

[23] H.Y. Lan, Projection iterative approximations for a new class of general randomimplicit quasi-variational inequalities, J. Inequal. Appl. 17 (2006), (Art. 1081261).

[24] G.M. Lee, D.S. Kim and B.S. Lee, Strongly quasi-variational inequalities for fuzzymappings, Fuzzy Sets and Systems 78 (1996), 381–386.

[25] B.S. Lee, M.F. Khan and Salahuddin, Fuzzy generalized nonlinear mixed randomvariational like inclusions, Pacific J. Optim. (2010).

[26] Z. Liu, H. Gao, S.M. Kang and S.H. Kim, Auxiliary principle for generalizednonlinear variational like inequalities, (in Press).

[27] Z. Liu and S.M. Kang, Comments on the papers involving variational and quasi-variational inequalities for fuzzy mappings, Math. Sci. Res. J. 7(10) (2003), 394–399.

[28] Z. Liu and S.M. Kang, Convergence and stability of perturbed three step iterativealgorithm for completely generalized nonlinear quasi-variational inequalities, Appl.Math. Comput. 149 (2004), 245–258.

[29] M.A. Noor, Variational inequalities with fuzzy mappings (I), Fuzzy Sets and Sys-tems 55 (1989), 309–314.

[30] P.D. Panagiotopoulos and G.E. Stavroulakis, New type of variational principlesbased on the notion of quasi differentiability, Acta. Math. 94 (1992), 171–194.

[31] J. Parida and A. Sen, A variational-like inequalities for multi functions with ap-plications, J. Math. Anal. Appl. 124 (1987), 73–81.

[32] G. Tian, Generalized quasi-variational inequality problem, Math. Oper. Res. 18(1993), 752–764.

[33] H.F. Wang and H.L. Liao, Variational inequalities with fuzzy convex cone, J.Global Optim. 14(4) (1999), 395–414.

[34] J.C. Yao, Existence of generalized variational inequalities, Oper. Res. Lett. 15(1994), 35–40.

[35] L.A. Zadeh, Fuzzy sets, Inform. Control 8 (1965), 338–353.

[36] H.J. Zimmermann, Fuzzy Set Theory and its Applications, 2nd Edition KluwerAcademic, Dordrecht, 1991.

21

ANASTASSIOU ET AL: NONLINEAR VARIATIONAL INEQUALITIES

206

Page 207: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Spaces of DLp type and a convolution product

associated with a singular second order

differential operator

M.DziriDepartment of Mathematics, Faculty of Sciences of Tunis

2092 Elmanar 2, Tunis, [email protected]

M.JelassiDepartment of Mathematics, College of Sciences, Al Jouf University

Al Jouf 2014, Saudi [email protected]

L.T.RachdiDepartment of Mathematics, Faculty of Sciences of Tunis

2092 Elmanar 2, Tunis, [email protected]

May 11, 2011

Abstract We define and study the spaces Mρ,p, 1 ≤ p ≤ ∞, that are ofDLp-type. Using the harmonic analysis associated with a singular second orderdifferential operator, we give new characterization of the dual space M′

ρ,p andwe describe its bounded subsets. Next, we define the convolution product inM′

ρ,p ×Mρ,r, 1 ≤ r ≤ p <∞ and we prove some new results.

Keywords: DLp type, convolution product, differential operator.2000 MSC codes: 43-xx, 46-Exx.

1 Introduction

The spaces DLp ; 1 ≤ p ≤ ∞, have been studied by many authors ([1], [2], [3],[4], [9]). In this paper, we consider the second order differential operator definedon ]0,+∞[, by

∆u = u′′ +A′

Au′ + ρ2u,

1

207

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,207-232,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 208: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

where A is a non negative function satisfying some conditions and ρ is a nonnegative real number.

This operator plays an important role in Mathematical Analysis. For ex-ample, many special functions (orthogonal polynomials) are eigenfunctions ofoperator of ∆ type. The radial part of the Laplacian-Beltrami on symmetricspace is also of ∆ type.

The operator ∆ has been studied by many authors and from many pointsof view ( see [5],[8] [13], [14], [16], [17]). In particular, in [5] and [14] manyproperties of harmonic analysis related to the operator ∆ have been studied(translation operators, convolution product, Fourier transform...).

In this work, we introduce the function spaces Mρ,p, 1 ≤ p ≤ ∞, similar toDLp , but replacing the usual derivatives by the operator ∆.

The main result of this paper consists to give a new characterization of thedual space M′

ρ,p of the space Mρ,p and a description of its bounded subsets.More precisely, in the first section, we recall some harmonic analysis resultsrelated to the convolution product and the Fourier transform connected withthe differential operator ∆, that we use in the next sections.

In the second section, we define the space Mρ,p, 1 ≤ p ≤ ∞, to be the setof measurable functions f on [0,+∞[ such that for all k ∈ N;∆kf belongs tothe space Lp(dν) (the space of measurable functions on [0,+∞[ of pth powerintegrable on [0,+∞[ with respect to the measure dν(x) = A(x)dx). We givesome properties of this space, in particular we prove that it is a Frechet space.

The third section is consecrated to the study of the dual space M′ρ,p. We

give a nice description of the elements of this space and we characterize itsbounded subsets.

In the last section, we define and study the convolution product in M′ρ,p ×

Mρ,r, 1 ≤ r ≤ p <∞, where Mρ,r is the closure of the space D∗(R) ( the spaceof even infinitely differentiable functions on R, with compact support ) in Mρ,r.

2 The operator ∆

In this section, we define and recall some properties of the harmonic analysisrelated to the operator ∆, defined on ]0,+∞[, by

∆u = u′′ +A′

Au′ + ρ2u,

where

A(x) = x2α+1B(x); α >−12, (2.1)

and B is a positive even infinitely differentiable function on R, withB(0) = 1.We assume that the functions A and B satisfy the following conditions

i) A is increasing, and limx→+∞

A(x) = +∞.

2

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

208

Page 209: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

ii)A′

Ais decreasing, and lim

x→+∞

A′(x)A(x)

= 2ρ.

iii) there exists a constant δ > 0, satisfyingB

′(x)

B(x)= 2ρ− 2α+1

x + e−δxF (x), forρ > 0

B′(x)

B(x)= e−δxF (x) , forρ = 0

where F is C∞ on ]0,∞[, bounded together with its derivatives on all interval[x0,∞[, x0 > 0.

This operator has been studied by many authors ([6],[8],[14]). In particular,the following results have been established :For all λ ∈ C, the equation

∆u = −λ2uu(0) = 1, u′(0) = 0 (2.2)

admits a unique solution denoted by ϕλ.The function ϕλ satisfies the following properties :

• product formula

∀x, y > 0; ϕλ(x)ϕλ(y) =∫ ∞

0

ϕλ(z)w(x, y, z)A(z)dz (2.3)

where w(x, y, .) is a measurable positive function on [0,+∞[, with supportin [|x− y|, x+ y], satisfying

•∫ ∞

0

w(x, y, z)A(z)dz = 1

• ∀z > 0; w(x, y, z) = w(y, x, z)

• ∀z>0; w(x, y, z) = w(x, z, y)

• ∀x > 0, the function

λ 7−→ ϕλ(x)

is analytic on C.

• ∀λ ≥ 0 and x ∈ R |ϕλ(x)| ≤ 1.

• ∀λ ∈ C, the function

x 7−→ ϕλ(x)

3

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

209

Page 210: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

is even infinitely differentiable on R, and for all k ∈ N there exist mk ∈ Nand cA,k > 0 such that

∀x ∈ R;∣∣∣∣( ddx )k(ϕλ(x))

∣∣∣∣ 6 cA,k(1 + x2)λ2mkϕ0(x). (2.4)

• For ρ > 0, and from ([13], p.99) we have

∀x ≥ 0,∀λ ∈ R, |ϕλ(x)| ≤ ϕ0(x) ≤ m(1 + x)exp(−ρx), (2.5)

where m is a positive constant.

• We have the integral representation of Mehler type,

∀x > 0,∀λ ∈ CI , ϕλ(x) =∫ x

0

k(x, t) cos(λt)dt, (2.6)

where k(x, .) is an even positive C∞ function on ]− x, x[, with support in[−x, x]. Also, for all λ ∈ C, λ 6= 0, the equation

∆u = −λ2u

has a solution Φλ, satisfying

Φλ(x) = A−12 (x) exp (iλx)V (x, λ),

with

limx→+∞

V (x, λ) = 1.

Consequently there exists a function (spectral function)

λ 7−→ c(λ),

such that,

∀λ ∈ C, λ 6= 0; ϕλ = c(λ)Φλ + c(−λ)Φ−λ.

The function

λ −→ c(λ)

satisfies the following property

• For λ ∈ R ,we have c(−λ) = c(λ).

• The function |c(λ)|−2 is continuous on [0,+∞[ .

• there exist positive constants k1, k2, and k3, such that∀λ ∈ C, Imλ 6 0, |λ| > k3;

k1 |λ|α+1/2 6 |c(λ)|−1 6 k2 |λ|α+1/2. (2.7)

4

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

210

Page 211: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

We denote by

• dν(x) the measure defined on [0,+∞[, by

dν(x) = A(x)dx

• Lp(dν), 1 6 p 6 +∞; the space of measurable functions on [0,+∞[, satis-fying

‖f‖p,ν =(∫ +∞

0

|f(x)|p dν(x))1/p

< +∞; 1 6 p < +∞

‖f‖∞,ν = ess sup |f(x)| < +∞;x∈[0,+∞[

p = +∞

• dγ(λ) the measure defined on [0,+∞[, by

dγ(λ) =dλ

2π |c(λ)|2

• Lp(dγ), 1 6 p 6 +∞; the space of measurable functions on [0,+∞[, satis-fying

‖f‖p,γ =(∫ +∞

0

|f(λ)|p dγ(λ))1/p

< +∞; 1 6 p < +∞

‖f‖∞,γ = ess sup |f(λ)| < +∞;λ∈[0,+∞[

p = +∞

Definition 2.1 i) The translation operator associated with the operator ∆is defined on L1(dν), by

∀x, y > 0; Txf(y) =∫ +∞

0

f(z)w(x, y, z)dν(z)

where w is the function defined by the relation (2.3).

ii) The convolution product, associated with the operator ∆ of f, g ∈ L1(dν)is defined by

f ∗ g(x) =∫ +∞

0

Txf(y)g(y)dν(y).

We have the following properties

• Txϕλ(y) = ϕλ(x)ϕλ(y)

• If f ∈ Lp(dν), 1 6 p 6 +∞; then for all x ∈ [0,+∞[, the function Txfbelongs to Lp(dν), and we have

‖Txf‖p,ν 6 ‖f‖p,ν .

5

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

211

Page 212: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

• Let p, q, r ∈ [1,∞] such that 1/r = 1/p+ (1/q)− 1. If f ∈ Lp(dν) andg ∈ Lq(dν) then the function f ∗ g ∈ Lr(dν) and we have

‖f ∗ g‖r,ν 6 ‖f‖p,ν ‖g‖q,ν . (2.8)

Definition 2.2 The Fourier transform associated with the operator ∆ is definedon L1(dν), by

∀λ ∈ R; Ff(λ) =∫ +∞

0

f(x)ϕλ(x)dν(x).

We have the following properties• For f ∈ L1(dν), such that Ff ∈ L1(dγ), we have the inversion formula forF : for almost every x ∈ [0,+∞[,

f(x) = F−1(Ff)(x) (2.9)

where F−1 is the application defined on L1(dγ) by

F−1(g)(x) =∫ +∞

0

g(λ)ϕλ(x)dγ(λ). (2.10)

• Let f be in L1(dν). For all x ∈ [0,+∞[, we have

∀λ ∈ R; F(Txf)(λ) = ϕλ(x)Ff(λ).

• For f, g ∈ L1(dν), we have

∀λ ∈ R, F(f ∗ g)(λ) = Ff(λ)Fg(λ).

• The Fourier transform F , can be extended to an isometric isomorphism fromL2(dν) onto L2(dγ). This means that

∀f ∈ L2(dν); ‖Ff‖2,γ = ‖f‖2,ν . (2.11)

∀f ∈ L2(dγ);∥∥F−1f

∥∥2,ν

= ‖f‖2,γ . (2.12)

• For all f ∈ D∗(R) we have

F(f) = F0 t χ(f) (2.13)

where F0 is the usual Fourier transform on D∗(R) defined by

F0(f)(λ) =2π

∫ ∞

0

f(x) cos(λx)dx and tχ is the generalized Weyl transform as-

sociated with ∆, given by

tχ(f)(x) =∫ ∞

x

k(y, x)f(y)A(y)dy

( see [14]).

6

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

212

Page 213: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Proposition 2.1 Let p ∈ [1, 2], f ∈ Lp(dν) and g ∈ Lp(dγ). Then Ff ∈Lp

′(dγ), F−1(g) ∈ Lp′(dν) and we have

‖Ff‖p′,γ 6 ‖f‖p,ν ;∥∥F−1g

∥∥p′,ν

6 ‖g‖p,γ

with p′ = pp−1 .

This result is an immediate consequence of the Riesz-Thorin theorem ([10], [11]).

We denote by• E∗(R) the space of even infinitely differentiable functions on R.• S∗(R) the subspace of E∗(R) , consisting of functions f rapidly decreasingtogether with their derivatives.• S2

∗(R) = ϕ0S∗(R), where ϕ0 is the eigenfunction of the operator ∆ associatedwith the value λ = 0. For ρ = 0 the space S2

∗(R) is S∗(R).• D′∗(R), S′∗(R) and (S2

∗)′(R) are respectively the dual spaces of D∗(R), S∗(R)

and S2∗(R).

From [13], the Fourier transform F is a topological isomorphism from S2∗(R)

onto S∗(R). The inverse mapping is given by the relation (2.10).

Definition 2.3 The Fourier transform F is defined on (S2∗)′(R) by

< F(T ), ϕ >=< T,F−1(ϕ) >, ϕ ∈ S∗(R).

Then F is an isomorphism from (S2∗)′(R) onto S′∗(R).

3 The space Mρ,p

We denote by

• For f ∈ Lp(dν), p ∈ [1,∞], Tf is the element of D′∗(R) defined by

< Tf , ϕ >=∫ ∞

0

f(x)ϕ(x)dν(x), ϕ ∈ D∗(R).

• For g ∈ Lp(dγ), p ∈ [1,∞], Tg is the element of S′∗(R) defined by

< Tg, ψ >=∫ ∞

0

g(λ)ψ(λ)dγ(λ), ψ ∈ S∗(R).

Remark 3.1

i) Using the relation (2.5) and the fact that A(x) ∼ exp(2ρx) (x→ +∞) forρ > 0, we deduce that for all p ∈ [1, 2],Lp(dν) ⊂ (S2

∗)′(R).

7

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

213

Page 214: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

ii) From proposition 2.1, we deduce that for all f ∈ Lp(dν), 1 ≤ p ≤ 2;Ff belongs to the space Lp

′(dγ) and we have

F(Tf ) = TF(f) (3.1)

Definition 3.1 Let p ∈ [1,∞]. We define Mρ,p to be the set of even measurablefunctions f on R such that for all k ∈ N there exists gk ∈ Lp(dν) satisfying

∆kTf = Tgk (3.2)

in D′∗(R),

where, for all T ∈ D′∗(R) (resp.(S2∗)′(R)),

< ∆T, ϕ >=< T,∆ϕ >; ϕ ∈ D∗(R) (resp.S2∗(R)).

The space Mρ,p is equipped with the topology generated by the family ofnorms

γm,p(f) = max0≤k≤m

‖gk‖p,ν , m ∈ N,

where gk, k ∈ N, is the function given by the relation (3.2).Let

dp : Mρ,p ×Mρ,p → [0,∞[

(f, g) 7→ dp(f, g) =∞∑m=0

12m

γm,p(f − g)1 + γm,p(f − g)

.

Then dp is a distance on Mρ,p. Moreover the sequence (fk)k∈N converges to0 in (Mρ,p, dp) if and only if

∀ m ∈ N; γm,p (fk) → 0k→∞

In the following, we will give some properties of the space Mρ,p.

Proposition 3.1 (Mρ,p, dp) is a Frechet space.

Proof. Let (fn)n∈N be a Cauchy sequence in (Mρ,p, dp) and (gn,k)k∈N ⊂ Lp(dν)such that

∆kTfn = Tgn,k , k ∈ N. (3.3)

Then for all k ∈ N, (gn,k)n∈N is a Cauchy sequence in Lp(dν).We put

f = g0 = limn→∞

fn

andgk = lim

n→∞gn,k, k ∈ N∗,

8

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

214

Page 215: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

in Lp(dν). Thus

∀ k ∈ N ; Tgn,k → Tgkn→∞

(3.4)

in D′∗(R). Since ∆ is a continuous operator from D′∗(R) into itself, we deducethat

∆kTfn → ∆kTfn→∞

,

in D′∗(R).

From the relations (3.3) and (3.4), we deduce that

∀ k ∈ N ; ∆kTf = Tgk .

This proves that f ∈Mρ,p and

fn → fn→∞

,

in (Mρ,p, dp).

Proposition 3.2 Let p ∈ [1, 2] and f ∈Mρ,p. Then

i) For all k ∈ N, the function

λ→ (1 + λ2)kF(f)(λ)

belongs to the space Lp′(dγ), with p′ =

p

p− 1.

ii) Mρ,p ∩ C∗(R) ⊂ E∗(R), where C∗(R) is the space of even continuous func-tions on R .

Proof. i) Let f ∈Mρ,p, 1 ≤ p ≤ 2, and gk ∈ Lp(dν) such that

∆kTf = Tgk k ∈ NI .

From the relation (3.1), we have

F(Tgk) = TF(gk),

which givesF(∆kTf ) = TF(gk)

On the other hand

F(∆kTf ) = λ2kF(Tf ) (3.5)

= Tλ2kF(f)

9

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

215

Page 216: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

henceλ2kF(f) = F(gk)

this equality, together with the fact that the function F(gk) belongs to the spaceLp

′(dγ) implies i).ii) Let f ∈ Mρ,p ∩ C∗(R). From the assertion i), we deduce that F(f) ∈

L1(dγ) ∩ L2(dγ).On the other hand, the transform F is an isometric isomorphism from L2(dν)

onto L2(dγ), then from the inversion formula for F and using the continuity ofthe function f , we have

∀x ∈ R; f(x) =∫ +∞

0

Ff(λ)ϕλ(x)dγ(λ). (3.6)

Consequently, ii) follows from the relation (2.4) and the fact that for all k ∈ N,,the function

λ→ λkFf(λ)

belongs to the space L1(dγ).

Proposition 3.3 Let p ∈ [1, 2], then, for all r ∈ [2,∞],

Mρ,p ∩ C∗(R) ⊂Mρ,r.

Proof. Let f ∈Mρ,p ∩ C∗(R), p ∈ [1, 2], r ≥ 2 and r′ =r

r − 1.

From the proposition 3.2, we deduce that f ∈ E∗(R) and that for all k ∈ N, thefunction

λ→ λ2kF(f)(λ)

belongs to the space Lp′(dγ). By applying Holder’s inequality it follows that

this last function belongs to the space Lr′(dγ). On the other hand, from the

relation (3.6), we deduce that

∀ x ∈ R, ∆kf(x) =∫ ∞

0

(−λ2)kF(f)(λ)ϕλ(x)dγ(λ)

= F−1((−λ2)kF(f))(x),

Consequently, from proposition 2.1 it follows that for all k ∈ N, the function∆kf belongs to the space Lr(dν).

4 The Dual spaceM′ρ,p

In this section we will give a new characterization of the dual space M′ρ,p of

Mρ,p. It is clear that for every f ∈ Mρ,p, the family Vm,p,ε(f),m ∈ N, ε > 0is a basic of neighborhoods of f in (Mρ,p, dp), where

Vm,p,ε(f) = g ∈Mρ,p, γm,p(f − g) < ε.

10

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

216

Page 217: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

In addition, T ∈M′ρ,p if and only if there exist m ∈ NI and c > 0 such that

∀ f ∈Mρ,p; | < T, f > | ≤ cγm,p(f). (4.1)

For f ∈ Lp′(dν) and ψ ∈Mρ,p, we put

< ∆k(Tf ), ψ >=∫ ∞

0

f(x)ψk(x)dν(x) (4.2)

with Tψk = ∆kTψ. Then

| < ∆k(Tf ), ϕ > | ≤ ‖f‖p′,ν‖ψk‖p,ν≤ ‖f‖p′,νγk,p(ψ)

this proves that for all f ∈ Lp′(dν) and k ∈ N, the functional ∆kTf defined bythe relation (4.2) belongs to the space M′

ρ,p.

In the following, we shall prove that every element of M′ρ,p is also of this

type.

Theorem 4.1 Let T ∈ D′∗(R). Then T belongs to M′ρ,p, 1 ≤ p < ∞, if and

only if there exist m ∈ N and f0, ..., fm ⊂ Lp′(dν) such that

T =m∑k=0

∆kTfk (4.3)

where ∆kTfk is given by the relation (4.2).

Proof. It is clear that if

T =m∑k=0

∆kTfk ; f0, ..., fm ⊂ Lp′(dν)

then T belongs to the space M′ρ,p.

Conversely, suppose that T ∈ M′ρ,p. From the relation (4.1) there exist

m ∈ N and c > 0 such that

∀ ϕ ∈Mρ,p, | < T,ϕ > | ≤ cγm,p(ϕ)

Let(Lp(dν))m+1 = (f0, ..., fm), fk ∈ Lp(dν), 0 ≤ k ≤ m

equipped with the norm

‖(f0, ..., fm)‖(Lp(dν))m+1 = max0≤k≤m

‖fk‖p,ν

Now, we consider the mappings

A : Mρ,p → (Lp(dν))m+1

11

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

217

Page 218: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

ϕ 7→ (ϕ, g1, ..., gm)

where∆kTϕ = Tgk , k ≥ 1

andB : Im(A) → C

B(Aϕ) =< T,ϕ > .

From the relation (4.1) we deduce that

|BA(ϕ)| = | < T,ϕ > |≤ c ‖A(ϕ)‖(Lp(dν))m+1

this means that B is a continuous functional on the subspace Im(A) of the space(Lp(dν))m+1. From Hahn Banach theorem’s there exists a continuous extensionof B to (Lp(dν))m+1, denoted again by B.By Riez’s theorem there exist (f0, ..., fm) ∈ (Lp

′(dν))m+1 such that

∀ (ϕ0, ..., ϕm) ∈ (Lp(dν))m+1,

B(ϕ0, ..., ϕm) =m∑k=0

∫ ∞

0

fk(x)ϕk(x)dν(x).

By means of the relation (4.2), we deduce that for ϕ ∈Mρ,p, we have

< T,ϕ >=m∑k=0

∫ ∞

0

fk(x)ϕk(x)dν(x)

=m∑k=0

< ∆kTfk , ϕ > .

This completes the proof of the theorem 4.1.

Proposition 4.1 Let p ≥ 2. Then for all T ∈ M′ρ,p, T ∈ (S2

∗)′(R) and there

exist m ∈ N and F ∈ Lp(dγ) such that

F(T ) = T(1+λ2)mF

Proof. Let T ∈M′ρ,p. From the theorem 4.1 there existm ∈ N and (f0, ..., fm) ∈

(Lp′(dν))m+1, p′ =

p

p− 1, such that

T =m∑k=0

∆kTfk .

From the remark 3.1 i) and the fact that the operator ∆ is continuous from(S2∗)′(R) into itself, we deduce that T belongs to (S2

∗)′(R). Consequently, by

virtue of the relation (3.5), we have

F(T ) = T(1+λ2)mF ,

12

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

218

Page 219: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

where

F =m∑k=0

λ2k

(1 + λ2)mF(fk)

which proves the result.

Proposition 4.2 Let T ∈ D′∗(R), then T ∈M′ρ,2 if and and only if there exist

m ∈ NI and F ∈ L2(dγ) such that

F(T ) = T(1+λ2)mF

Proof. From the proposition 4.1, we deduce that if T ∈ M′ρ,2 then there exist

m ∈ N and F ∈ L2(dγ) verifying

F(T ) = T(1+λ2)mF .

Conversely, suppose thatF(T ) = T(1+λ2)mF ,

with F ∈ L2(dγ). Since F is an isometric isomorphism from L2(dν) onto L2(dγ),then there exists G ∈ L2(dν) such that F(G) = F and from the relation (3.1)we have

F(TG) = TF .

ConsequentlyF(T ) = F((I −∆)mTG)

thus

T =m∑k=0

(−1)kCkm∆kTG

and the theorem 4.1 implies that T belongs to M′ρ,2.

For a > 0, we denote by• D∗,a(R) the subspace of D∗(R) consisting of function f such that suppf ⊂[−a, a].• D′∗,a(R) the dual space of D∗,a(R).• Wm

a (R), m ∈ N the space of function f : R → C, of class C2m on R, even andwith support in [−a, a], normed by

Qm,a(f) = max0≤k≤m

‖∆k(f)‖∞,ν .

Lemma 4.1 For all m ∈ N, there exists s0 ∈ N such that for all s ≥ s0, thefunction gs defined by

∀ x ∈ R ; gs(x) = F−1(1

(1 + λ2)s)(x).

is even, of class C2m on R and infinitely differentiable on R\0.

13

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

219

Page 220: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Proof. Let m ∈ N. From the relations (2.4) and (2.10), we deduce that thereexists s0 ∈ N, sufficiently large such that for s ≥ s0, the functions gs and

fs = F0(1

(1 + λ2)s) are of class C2m on R.

In the following we shall prove that for s ≥ s0, the function gs is infinitelydifferentiable on R\0.

Let ψ ∈ S∗(R); ψ ≥ 0 and∫

Rψ(x)dx = 1.Then,

limn→+∞

fs ∗ ψn = fs

in L2(R,dx), where ψn(x) = nψ(nx) and ∗ is the usual convolution producton R.

Now, we take k = E(α) + 2. Since s is sufficiently large, then for every j ∈ N,0 ≤ j ≤ 2k, the function f (j)

s belongs to L2(R, dx) and

limn→+∞

f (j)s ∗ ψn = (fs ∗ ψn)(j) = f (j)

s (4.4)

in L2(R,dx).Consequently

∀j ∈ N, 0 ≤ j ≤ k; limn→+∞

λ2jF0(fs ∗ ψn) =2π

λ2j

(1 + λ2)s(4.5)

in L2(R,dx).Using the relations (2.7) and (4.5), we deduce that

limn→+∞

F0(fs ∗ ψn) =2π

1(1 + λ2)s

in L2(dγ), and the relations (2.12); (2.13) lead to

2πgs = lim

n→+∞(tχ)−1(fs ∗ ψn) in L2(dν). (4.6)

Let [a, b] ⊂]0,∞[ and θ ∈ D∗(R) such that θ(x) = 1 if x ∈ [−a4,a

4]

supp(θ) ⊂]−a2,a

2[.

and ϕ an infinitely differentiable function on R such thatϕ(x) = 1 if x ∈ [a,b]suppϕ ⊂ ]

a2,b + 1[

using the relation (4.4), we deduce that

limn→+∞

((1− θ)(fs ∗ ψn))(2k) = ((1− θ)fs)(2k)

14

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

220

Page 221: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

in L2(R,dx), and by the same way as before, we have

limn→+∞

(tχ)−1((1− θ)(fs ∗ ψn)) = F−1(F0((1− θ)fs) (4.7)

in L2(dν). However, using the expression of (tχ)−1 (see[14]) and the relation(4.6) we get

2πϕgs = lim

n→+∞ϕ(tχ)−1((1− θ)(fs ∗ ψn)) in L2(dν). (4.8)

On the other hand, by a standart calculus, for all s ≥ s0, we have

fs(x) = e−|x|Ps(|x|),

where, Ps is a real polynomial; which implies that the function (1−θ)fs belongsto S∗(R) .Since, F0 is an isomorphism from S∗(R) onto itself and F is an isomorphismfrom S2

∗(R) onto S∗(R), we deduce that the function F−1(F0(fs(1−θ))) belongsto S2

∗(R) .Hence, the relations (4.7) and (4.8) lead to

2πϕgs = ϕF−1(F0(fs(1− θ)))

this shows that the function gs is infinitely differentiable on all interval [a, b] ⊂]0,∞[ and by parity it is infinitely differentiable on R \ 0.

Proposition 4.3 Let a > 0 and m ∈ N. Then there exists so ∈ N such that forevery s ∈ N, s ≥ so, we can find ψs ∈ Wm

a (R) and Fs ∈ D∗,a(R) satisfying

δ = (I −∆)sTψs + TFs

in D′∗(R).

Proof. From lemma 4.1 there exists so ∈ N such that for every s ∈ N, s ≥ so,the function gs is of class C2m on R, and we have

(I −∆)sTgs = δ.

Let h ∈ D∗,a(R), satisfying

∀x ∈ [−a2,a

2]; h(x) = 1.

Then,h(I −∆)sTgs = δ.

On the other hand, the lemma 4.1 involves that for every s ≥ so, the function

Fs(x) = (h− 1)(I −∆)sgs + (I −∆)s((1− h)gs) (4.9)

15

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

221

Page 222: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

belongs to the space D∗,a(R).Moreover, we have

T(h−1)(I−∆)sgs = (h− 1)(I −∆)sTgs = 0

and this implies, by using the relation (4.9) that

TFs = T(I−∆)s((1−h)gs)

= (I −∆)sT((1−h)gs).

Hence,TFs + (I −∆)sThgs = (I −∆)sTgs = δ.

We complete the proof of the proposition by taking ψs = hgs .

For f ∈ D∗,a(R), a > 0, we denote by

• Pm(f) = max0≤k≤m

‖( ddx )kf‖∞,ν

• Np,m(f) = max0≤k≤m

‖∆k(f)‖p,ν , p ∈ [1,∞].

Lemma 4.2 Let p ∈ [1,∞]. For all m ∈ N, there exist c > 0 and m′ ∈ N suchthat

∀ϕ ∈ D∗,a(R), Pm(ϕ) ≤ cNp,m′(ϕ).

Proof. The case p = ∞ is proved in [6], then for all m ∈ N, there exist c > 0and m′ ∈ N such that for all 0 ≤ k ≤ m, we have

‖( ddx

)kϕ‖∞,ν ≤ c max0≤k≤m′

‖∆kϕ‖∞,ν (4.10)

On the other hand, from the inversion formula for F , we have

∆kϕ(x) =∫ ∞

0

F(∆kϕ)(λ)ϕλ(x)dγ(λ)

=∫ ∞

0

(−λ2)kF(ϕ)(λ)ϕλ(x)dγ(λ)

Now, from the relation (2.7), it follows that∫ ∞

0

dγ(λ)(1 + λ2)α+2

<∞.

This involves that

‖∆kϕ‖∞,ν ≤ c‖(1 + λ2)k+E(α)+3F(ϕ)‖∞,γ≤ c‖F((I −∆)k+E(α)+3ϕ)‖∞,γ

16

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

222

Page 223: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

≤ c‖(I −∆)k+E(α)+3ϕ‖1,ν (4.11)

According to the relation (4.10) and (4.11), we deduce that for every k; 0 ≤k ≤ m;

‖( ddx

)kϕ‖∞,ν ≤ cmN1,m′+E(α)+3(ϕ),

where cm = c 2m′+E(α)+3. Hence,

Pm(ϕ) ≤ cmN1,m′+E(α)+3(ϕ). (4.12)

For p ∈]1,∞[, the result follows by using Holder’s inequality and the relation(4.12).

Theorem 4.2 Let a > 0 and B′ a weakly* bounded set of D′∗,a(R). Then, thereexists m ∈ N such that the elements of B′ can be continuously extended toWma (R). Moreover, the family of these extensions is equicontinuous.

Proof. Let p ∈ [1,∞]. Since B′ is weakly* bounded in D′∗,a(R), then from [12]and lemma 4.2 there exist a positive constant c and m ∈ N such that∀ T ∈ B′, ∀ϕ ∈ D∗,a(R),

| < T,ϕ > | ≤ cNp,m(ϕ) (4.13)

Let’s consider the mappings

A : Wma (R) → (Lp(dν))m+1

ϕ 7→ (∆kϕ)0≤k≤m

and for all T ∈ B′,LT : A(D∗,a(R)) → C

< LT ,Aϕ >=< T,ϕ > .

From the relation (4.13), we deduce that∀ϕ ∈ D∗,a(R),

| < LT ,Aϕ > | ≤ c‖ϕ‖(Lp(dν))m+1

this means that LT is a continuous functional on the subspace A(D∗,a(R)) ofthe space (Lp(dν))m+1 and that for all T ∈ B′

‖LT ‖(D∗,a(R)) = sup‖Aϕ‖(Lp(dν))m+1≤1

| < LT ,Aϕ > | ≤ c

From the Hahn Banach theorem’s, LT can be continuously extended on (Lp(dν))m+1

denoted again by LT . Furthermore, for all T ∈ B′

‖LT ‖(Lp(dν))m+1 = sup‖ψ‖(Lp(dν))m+1≤1

| < LT , ψ > |

17

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

223

Page 224: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

= ‖LT ‖A(D∗,a(R)) ≤ c (4.14)

Now, from the Riez’s theorem, there exists (fT,k)0≤k≤m ⊂ Lp′(dν) such that

∀ψ = (ψ0, ..., ψm) ∈ (Lp(dν))m+1,

< LT , ψ >=m∑k=0

∫ ∞

0

fT,k(x)ψk(x)dν

with‖LT ‖(Lp(dν))m+1 = max

0≤k≤m‖fT,k‖p′,ν .

Thus, from (4.14) it follows that∀T ∈ B′, ∀ 0 ≤ k ≤ m

‖fT,k‖p′,ν ≤ c. (4.15)

In particular, for ϕ ∈ Wma (R) we have

< LT ,Aϕ >=m∑k=0

∫ ∞

0

fT,k(x)∆k(ϕ)(x)dν(x)

using Holder inequality and the relation (4.15), we get∀T ∈ B′, ∀ ϕ ∈ Wm

a (R);

| < LT ,Aϕ > | ≤ (m+ 1)c[ν(B(0, a))]1/p‖ϕ‖Wma (R)

this shows that the mapping LT oA is a continuous extension of T on Wma (R)

and that the family LT oAT∈B′ is equicontinuous, when applied to Wma (R).

This completes the proof of the theorem 4.2.

In the following, we will give a new characterization of the space M′ρ,p.

Theorem 4.3 Let T ∈ D′∗(R). Then for p ∈ [1,∞[ and p′ = pp−1 , T belongs to

M′ρ,p if and only if for every ϕ ∈ D∗(R), the function T ∗ϕ belongs to the space

Lp′(dν), where

T ∗ ϕ(x) =< T, Txϕ > .

Proof. Let T ∈M′ρ,p. From the theorem 4.1 there exist m ∈ N and f0, ..., fm ∈

Lp′(dν) such that

T =m∑k=0

∆k(Tfk),

in M′ρ,p. Thus, for every ϕ ∈ D∗(R)

T ∗ ϕ =m∑k=0

Tfk ∗∆kϕ

=m∑k=0

fk ∗∆kϕ

18

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

224

Page 225: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Since, for all k ∈ N, 0 ≤ k ≤ m, fk ∈ Lp′(dν) and ∆kϕ ∈ L1(dν), then we

deduce that fk ∗∆kϕ ∈ Lp′(dν). This implies that the function T ∗ ϕ belongs

to the space Lp′(dν).

Conversely, let T ∈ D′∗(R) such that for every ϕ ∈ D∗(R) the function T ∗ϕbelongs to the space Lp

′(dν). For ϕ, ψ in D∗(R), we have

< TT∗ϕ, ψ > = < T,ϕ ∗ ψ >= < T,ψ ∗ ϕ >= < TT∗ψ, ϕ >

From Holder inequality and using the hypothesis we obtain

| < TT∗ϕ, ψ > | ≤ ‖T ∗ ψ‖p′,ν‖ϕ‖p,ν ,

from which, we deduce that the set

B′ = TT∗ϕ, ϕ ∈ D∗(R); ‖ϕ‖p,ν ≤ 1

is bounded in D′∗(R).Now, using the theorem 4.2, it follows that for all a > 0 there exists m ∈ N

such that for all ϕ ∈ D∗(R); ‖ϕ‖p,ν ≤ 1, the mapping TT∗ϕ can be continuouslyextended on the space Wm

a (R) and the family of these extensions is equicontin-uous, which means that there exists c > 0 such that∀ϕ ∈ D∗(R); ‖ϕ‖p,ν ≤ 1, ∀ψ ∈ Wm

a (R)

| < TT∗ϕ, ψ > | ≤ c‖ψ‖Wma (R).

This involves that∀ϕ ∈ D∗(R); ∀ψ ∈ Wm

a (R)

| < TT∗ϕ, ψ > | ≤ c‖ψ‖Wma (R)‖ϕ‖p,ν . (4.16)

On the other hand, we have∀ϕ ∈ D∗(R), ∀ψ ∈ Wm

a (R)

< TT∗ϕ, ψ >=< T ∗ Tψ, ϕ > (4.17)

where, for all ϕ ∈ D∗(R)

< T ∗ Tψ, ϕ > = < T, Tψ ∗ ϕ >= < T,ψ ∗ ϕ > .

The relations (4.16) and (4.17) lead to∀ϕ ∈ D∗(R),

| < T ∗ Tψ, ϕ > | ≤ c‖ψ‖Wma (R)‖ϕ‖p,ν

this last inequality shows that the functional T ∗Tψ can be continuously extendedon the space Lp(dν) and from Riez’s theorem there existsg ∈ Lp′(dν) such that

T ∗ Tψ = Tg (4.18)

19

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

225

Page 226: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Furthermore, from the proposition 4.3 , there exist s ∈ N, ψs ∈ Wma (R) and

ϕs ∈ D?,a(R) satisfying

δ = (I −∆)sTψs + Tϕs

then

T = (I −∆)s(T ∗ Tψs) + T ∗ Tϕs

= (I −∆)s(T ∗ Tψs) + TT∗ϕs . (4.19)

We complete the proof by using the hypothesis, the relations (4.18), (4.19) andthe theorem 4.1.

In the following, we will give a characterization of the bounded sets in M′ρ,p.

Theorem 4.4 Let p ∈ [1,∞[ and B′ a subset of M′ρ,p. The following assertions

are equivalent.

i) B′ is weakly bounded in M′ρ,p.

ii) There exist c > 0 and m ∈ N such that for every T ∈ B′ we can findf0,T , ..., fm,T ⊂ Lp

′(dν) satisfying

T =m∑k=0

∆kTfk with max0≤k≤m

‖fk‖p′,ν ≤ c

iii) For every ϕ ∈ D∗(R), the set T ∗ ϕT∈B′ is bounded in Lp′(dν).

Proof. 1) Suppose that B′ is weakly* bounded in M′ρ,p, then from [12] B′ is

equicontinuous. There exist c > 0 and m ∈ N such that

∀ T ∈ B′, ∀ f ∈Mρ,p, | < T, f > | ≤ cγm,p(f). (4.20)

As in the proof of the theorem 4.2, we consider the mappings

A : Mρ,p → (Lp(dν))m+1

f 7→ (f, g1, ..., gm),

with∆kTf = Tgk ; 0 ≤ k ≤ m

and for all T ∈ B′,LT : A(Mρ,p) → C

< LT ,A(f) >=< T, f > .

Then, the relation (4.20) implies that∀ϕ ∈Mρ,p,

|LT (Aϕ)| ≤ c‖Aϕ‖(Lp(dν))m+1 .

20

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

226

Page 227: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Using Hahn Banach’s theorem and Riez’s theorem, we deduce that LT can becontinuously extended on (Lp(dν))m+1, denoted again by LT , and that thereexists (fT,k)0≤k≤m ⊂ Lp

′(dν) verifying

∀ψ = (ψ0, ..., ψm) ∈ (Lp(dν))m+1,

< LT , ψ >=m∑k=0

∫ ∞

0

fT,k(x)ψk(x)dν(x)

with‖LT ‖(Lp(dν))m+1 = max

0≤k≤m‖fT,k‖p′,ν ≤ c.

In particular, if ψ = A(f), f ∈Mρ,p,

< LT ,A(f) >=< T, f >=m∑k=0

< ∆kTfT,k , f >

this proves that i) implies ii).2) Suppose that there exist c > 0 and m ∈ N such that for every T ∈ B′ we

can find f0,T , ..., fm,T ⊂ Lp′(dν) satisfying

∀T ∈ B′, T =m∑k=0

∆kTfT,k and max0≤k≤m

‖fT,k‖p′,ν ≤ c

then∀ f ∈Mρ,p, ∀T ∈ B′

< T, f >=m∑k=0

∫ ∞

0

fT,k(x)gk(x)dν(x)

consequently,∀T ∈ B′, ∀ f ∈Mρ,p,

| < T, f > | ≤ (m+ 1)cγm,p(f)

which means that the set B′ is weakly* bounded in M′ρ,p and proves that ii)

implies i).3) Suppose that ii) holds. Let ϕ ∈ D∗(R), then from theorem 4.3 we know

that for all T ∈ B′ the function T ∗ ϕ belongs to the space Lp′(dν). But

T ∗ ϕ =m∑k=0

Tfk ∗∆kϕ

consequently,∀T ∈ B′,

‖T ∗ ϕ‖p′,ν ≤ (m+ 1)cγm,p(ϕ).

Which shows that the set T ∗ ϕT∈B′ is bounded in Lp′(dν) and therefore ii)

involves iii).

21

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

227

Page 228: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

4) Suppose that iii) holds. Let T ∈ B′, for all ϕ, ψ ∈ D∗(R), we have

| < TT∗ϕ, ψ > | = | < TT∗ψ, ϕ > |≤ ‖T ∗ ψ‖p′,ν‖ϕ‖p,ν

from which, we deduce that the set

B′ = TT∗ϕ, T ∈ B′, ϕ ∈ D∗(R); ‖ϕ‖p,ν ≤ 1

is bounded in D′∗(R).Now, using the theorem 4.2, it follows that for all a > 0 there exists m ∈ N

such that for all ϕ ∈ D∗(R); ‖ϕ‖p,ν ≤ 1, and T ∈ B′, the mapping TT∗ϕ can becontinuously extended on the space Wm

a (R) and the family of these extensionsis equicontinuous, which means that there exists c > 0 satisfying∀T ∈ B′, ∀ϕ ∈ D∗(R); ∀ψ ∈ Wm

a (R)

| < TT∗ϕ, ψ > | ≤ c‖ψ‖Wma (R)‖ϕ‖p,ν (4.21)

On the other hand, for every T ∈ B′, we have∀ϕ ∈ D∗(R), ∀ψ ∈ Wm

a (R)

< TT∗ϕ, ψ >=< T ∗ Tψ, ϕ > (4.22)

from the relations (4.21) and (4.22) we deduce that the functional T ∗ Tψ canbe continuously extended on the space Lp(dν) and from Riez’s theorem thereexist gT,ψ ∈ Lp

′(dν) such that

T ∗ Tψ = TgT,ψ (4.23)

However, the relations (4.21) and (4.23) involve that∀T ∈ B′,

‖gT,ψ‖p′,ν ≤ c‖ψ‖Wma (R) (4.24)

By using the proposition 4.3, it follows that there exist s ∈ N,ψs ∈ Wm

a (R) and ϕs ∈ D∗,a(R) verifying, for all T ∈ B′,

T = T ∗ δ = (I −∆)s(T ∗ Tψs) + TT∗ϕs

and by the relation (4.23) we get

T = (I −∆)sTgT,s + TT∗ϕs

thus, from the hypothesis, we obtain,

∀T ∈ B′, ‖T ∗ ϕs‖p′,ν ≤ cs,

and using the relation (4.24), we have

∀T ∈ B′, ‖gT,s‖p′,ν ≤ c‖ϕs‖Wma (R)

this completes the proof.

22

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

228

Page 229: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

5 Convolution product on the space M′ρ,p ×Mρ,r

In this section, we define and study the convolution product on the spaceM′ρ,p×

Mρ,r, 1 ≤ r ≤ p <∞, where Mρ,r is the closure of the space D∗(R) in Mρ,r.

Proposition 5.1 Let p ∈ [1,∞[. For every x ∈ [0,∞[, the operator Tx given bythe definition 2.1 i), is a continuous mapping from Mρ,p into itself.

Proof. Let f ∈Mρ,p and gk ∈ Lp(dν) such that

Tgk = ∆kTf , k ∈ N

then,∀ϕ ∈ D∗(R);

< ∆kTTxf , ϕ >=< TTxgk , ϕ > .

Since the operator Tx is continuous from Lp(dν) into itself, we deduce thatfor all f ∈Mρ,p and x ∈ [0,∞[, the function Txf belongs to the space Mρ,p.Moreover,

γm,p(Txf) = max0≤k≤m

‖Txgk‖p,ν

≤ max0≤k≤m

‖gk‖p,ν = γm,p(f)

which shows that the operator Tx is continuous from Mρ,p into itself.

Definition 5.1 The convolution product of T ∈M′ρ,p and f ∈Mρ,p is defined

by∀x ∈ [0,∞[

T ∗ f(x) =< T, Txf > .

Let T ∈ M′ρ,p; T =

m∑k=0

∆kTfk with fk0≤k≤m ⊂ Lp′(dν) and φ ∈ Mρ,r, 1 ≤

r ≤ p, then for all k ∈ N there exists φk ∈ Lr(dν) such that

Tφk = ∆kTφ.

It follows that for 0 ≤ k ≤ m the function fk ∗ φk belongs to the space Lq(dν)

with,1q

=1r

+1p′− 1 =

1r− 1p

and by using the density of D∗(R) in Mρ,r, we de-

duce that the expressionm∑k=0

fk ∗ φk is independent of the sequence fk0≤k≤m.

Then, we put

T ∗ φ =m∑k=0

fk ∗ φk. (5.1)

This allows us to say that

M′ρ,p ∗Mρ,r ⊂ Lq(dν). (5.2)

23

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

229

Page 230: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Lemma 5.1 Let 1 ≤ r ≤ p <∞, T ∈M′ρ,p and φ ∈ Mρ,r. Then, for all k ∈ N

∆kTT∗φ = TT∗φk

withTφk = ∆kTφ.

Proof. If φ ∈ D∗(R), then the function T ∗ φ is infinitely differentiable and wehave

∆k(TT∗φ) = T∆k(T∗φ) = TT∗∆kφ

therefore, the result follows from the density of D∗(R) in Mρ,r.

Proposition 5.2 Let 1 ≤ r ≤ p <∞ and q ∈ [1,∞] such that

1q

=1r− 1p

then for every T ∈M′ρ,p, the mapping

φ→ T ∗ φ

is continuous from Mρ,r into Mρ,q.

Proof. Let T ∈ M′ρ,p; T =

m∑k=0

∆kTfk with fk0≤k≤m ⊂ Lp′(dν) then for

φ ∈ Mρ,r, 1 ≤ r ≤ p,

T ∗ φ =m∑k=0

fk ∗ φk

where φk ∈ Lr(dν) andTφk = ∆kTφ.

From the lemma 5.1, we have∀ s ∈ N, ∀φ ∈ Mρ,r

∆sTT∗φ = TT∗φs

using the relation (5.2), we deduce that the function T ∗ φ belongs to the spaceMρ,q.

On the other hand, from the relation (5.1), we obtain

γl,q(T ∗ φ) = max0≤s≤l

‖T ∗ φs‖q,ν

But

T ∗ φs =m∑k=0

fk ∗ φk+s

24

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

230

Page 231: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

consequently,

‖T ∗ φs‖q,ν ≤m∑k=0

‖fk‖p′,ν‖φk+s‖r,ν

≤( m∑k=0

‖fk‖p′,ν)γm+l,r(φ).

Hence,

γl,q(T ∗ φ) ≤( m∑k=0

‖fk‖p′,ν)γm+l,r(φ)

which proves the result.

Definition 5.2 Let 1 ≤ p, q, r <∞ such that

1q

=1r− 1p.

The convolution product of T ∈M′ρ,p and S ∈M′

ρ,q is defined by∀φ ∈ Aρ,r

< S ∗ T, φ >=< S, T ∗ φ > .

From this definition and the proposition 5.2 we deduce the following result

Proposition 5.3 Let 1 ≤ p, q, r <∞ such that

1q

=1r− 1p.

Then, for all T ∈ M′ρ,p and S ∈ M′

ρ,q, the functional S ∗ T is continuous onMρ,r.

References

[1] S.Abdullah. On convolution operators and multipliers of distributionsof Lp-growth, J.Math.Anal.Appl.183 (1994), 196-207. MR 95c: 46060.

[2] S.Abdullah and S.Pillipovic. Bounded subsets in spaces of distributionsof Lp-growth,Hokkaido Math.J 23 (1994), 51-54. MR 94m:46065.

[3] J.Barros-Neto. An introduction to the theory of distributions. Pure andApplied Mathematics, 14. Marcel Dekker, Inc. New York, 1973. MR57:1113.

[4] J.J.Betancor and B.J.Gonzalez. Spaces of DLp type and the Hankelconvolution, Proceeding of the American Mathematical Society 129Number 1, 219-228.

25

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

231

Page 232: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

[5] H.Chebli. Theoreme de Paley-Wiener associe a un operateurdifferentiel singulier sur (0,+∞),J.Math.Pures et Appl. 58, (1979), p.1-19.

[6] H.Chebli. Positivite des operateurs de translation generalisee associesa un operateur de Sturm-Liouville et quelques applications a l’analyseharmonique. These d’etat. Universite Louis Pasteur-Strasbourg I,(1974).

[7] N.N.Lebedev. Special Functions and their applications. Dover publica-tions, Inc. New-York.

[8] M.M.Nessibi,L.T.Rachdi and K.Trimeche. The local central limit the-orem on the product of the Chebli-Trimeche Hypergroup and the Eu-clidean Hypergroup Rn, Jour of Math. Sciences, 9 No2 (1998), 109-123.

[9] L.Schwartz. Theory of distributions I/II, Hermann, Paris, (1957/1959).

[10] E.M.Stein. Interpolation of linear operators, Trans. Amer. Math. Soc.83, (1956), 482-492.

[11] E.M.Stein and Weiss. Introduction to Fourier Analysis on EuclideanSpaces , Princeton Univ. Press. Princeton, N.J, (1971).

[12] F.Treves. Topological vector spaces. Distributions and kernels, Aca-demic Press. New-York, (1967).

[13] K.Trimeche. Inversion of the Lions Translation operator using gener-alized Wavelets, App.and.Compu.Harm.Anal, 4(1997),97-112

[14] K.Trimeche.Transformation integrale de Weyl et theoreme de Paley-Wiener associes a un operateur differentiel singulier sur (0,+∞),J.Math.pure et appl,60,(1981), 51-98

[15] G.N.Watson. A treatise on the theory of Bessel functions, 2nd ed. Cam-bridge Univ. Press. London and New-York, (1966).

[16] Z.Xu. Harmonic Analysis on Chebli-Trimeche Hypergroups; PhD The-sis, Murdock Uni, Australia (1994).

[17] Hm.Zeuner. The central limit Thereom for Chebli-Trimeche Hyper-groups, J.Theoret.Probab, 2,no1 (1989); 51-63.

26

M. DZIRI ET AL: SINGULAR 2ND ORDER DIFFERENTIAL OPERATOR

232

Page 233: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Multivariate complex general singular integraloperators simultaneous approximation

George A. AnastassiouDepartment of Mathematical Sciences

University of MemphisMemphis, TN 38152, [email protected]

Abstract

Here we present complex multivariate simultaneous approximation forgeneral smooth singular integral operators converging with rates to theunit operator. The associated and presented inequalities are in kkp,1 p 1 norm and they involve multivariate related moduli of smooth-ness. At the end we list as our theorys applicators the special casesof multivariate complex Picard, Gauss-Weierstrass, Poisson-Cauchy andTrigonometric singular integral operators.

Mathematics Subject Classication 2010: 41A17, 41A25, 41A28, 41A35.Key Words and Phrases: Complex multivariate Approximation, multi-

variate singular integral, simultaneous approximation, multivariate modulus ofsmoothness, rate of convergence.

1 Introduction

Here we are motivated by [1]-[3] and expand these works to complex valuedfunctions. We present simultaneous approximation in kkp ; 1 p 1, of mul-tivariate general smooth singular integral operators to the unit operator withrates. At the end we list specic operators where our theory can be applied.From our approximation results one can derive interesting convergence proper-ties of these general operators. Our expansion to complex case is based on basicproperties of complex numbers and complex valued functions.

1

233

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,233-244,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 234: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

2 Main Results

Here r 2 N; m 2 Z+, we dene

[m]j;r :=

8>>><>>>:(1)rj

r

j

jm; if j = 1; 2; :::; r;

1rXj=1

(1)rjr

j

jm; if j = 0;

(1)

and

[m]k;r :=

rXj=1

[m]j;r j

k; k = 1; 2; :::;m 2 N. (2)

See thatrXj=0

[m]j;r = 1; (3)

and

rXj=1

(1)rjr

j

= (1)r

r

0

: (4)

Let n be a probability Borel measure on RN , N 1, n > 0, n 2 N.

We now dene the real multiple smooth singular integral operators

[m]r;n (f ;x1; :::; xN ) :=rXj=0

[m]j;r

ZRNf (x1 + s1j; x2 + s2j; :::; xN + sN j) dn (s) ;

(5)where s := (s1; :::; sN ), x := (x1; :::; xN ) 2 RN ; n; r 2 N, m 2 Z+, f : RN ! R isa Borel measurable function, and also (n)n2N is a bounded sequence of positivereal numbers.Above operators [m]r;n are not in general positive operators and they preserve

constants, see [1].

Denition 1 Let f 2 CRN, N 1; m 2 N, the mth modulus of smoothness

for 1 p 1, is given by

!m (f ;h)p := supktk2h

kmt f (x)kp;x ; (6)

h > 0, where

mt f (x) :=mXj=0

(1)mjm

j

f (x+ jt) : (7)

Denote!m (f ;h)1 = !m (f; h) : (8)

Above, x; t 2 RN :

2

ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS

234

Page 235: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

We make

Remark 2 We consider here complex valued Borel measurable functions f :RN ! C such that f = f1 + if2, i =

p1, where f1; f2 : RN ! R are implied

to be real valued Borel measurable functions.We dene the complex singular operators

[m]r;n (f ;x) := [m]r;n (f1;x) + i

[m]r;n (f2;x) ; x 2 RN : (9)

We assume that [m]r;n (fj ;x) 2 R, 8 x 2 RN , j = 1; 2:One notices easily that [m]r;n (f ;x) f (x)

(10)[m]r;n (f1;x) f1 (x)+ [m]r;n (f2;x) f2 (x)

also [m]r;n (f ;x) f (x)

1;x

(11) [m]r;n (f1;x) f1 (x) 1;x

+ [m]r;n (f2;x) f2 (x)

1;x

and [m]r;n (f) f p (12) [m]r;n (f1) f1

p+ [m]r;n (f2) f2

p; p 1:

Furthermore it holdsf (x) = f1; (x) + if2; (x) ; (13)

where denotes a partial derivative of any order and arrangement.

Here based on Theorem 9 of [1] we obtain

Theorem 3 Let f : RN ! C, N 1, such that f = f1 + if2, j = 1; 2. Herem 2 N, fj 2 Cm

RN, x 2 RN : Assume kfj;k1 < 1, for all k 2 Z+,

k = 1; :::; N : jj =NXk=1

k = m; j = 1; 2: Let n be a Borel probability

measure on RN , for n > 0, (n)n2N bounded sequence. Assume that for all

:= (1; :::; N ) ; k 2 Z+, k = 1; :::; N; jj :=NXk=1

k = m we have that

ZRN

NYk=1

jskjk!

1 +ksk2n

rdn (s) <1: (14)

3

ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS

235

Page 236: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

For ej = 1; :::;m, and := (1; :::; N ), k 2 Z+, k = 1; :::; N; jj := NXk=1

k = ej,call

c;n;ej :=ZRN

NYk=1

skk dn (s1; :::; sN ) : (15)

Then [m]r;n (f ;x) f (x)

mXej=1

[m]ej;r

0BBBBB@X

1;:::;N0:jj=ej

c;n;ejf (x)NYk=1

k!

1CCCCCA

1;x

X0@1;:::;N0jj=m

1A(!r (f1;; n) + !r (f2;; n))

NYk=1

k!

! (16)

ZRN

NYk=1

jskjk!

1 +ksk2n

rdn (s)

!; x 2 RN :

The m = 0 case follows

Corollary 4 Let f : RN ! C : f = f1 + if2, N 1. Here j = 1; 2. Letfj 2 CB

RN(continuous and bounded functions). Then [0]r;nf f 1

ZRN

1 +

ksk2n

rdn (s)

(17)

(!r (f1; n) + !r (f2; n)) ;

by assuming ZRN

1 +

ksk2n

rdn (s) <1: (18)

Proof. By Theorem 11 of [1].

Theorem 5 ([3]) Let f 2 ClRN, l; N 2 N. Here n is a Borel probability

measure on RN ; n > 0, (n)n2N a bounded sequence. Let := (1; :::; N ),

i 2 Z+, i = 1; :::; N ; jj :=NXi=1

i = l: Here f (x+ sj), x; s 2 RN , is

n-integrable wrt s, for j = 1; :::; r: There exist n-integrable functions hi1;j ;h1;i2;j ; h1;2;i3;j ; :::; h1;2;:::;N1;iN ;j 0 (j = 1; :::; r) on RN such that@i1f (x+ sj)@xi11

hi1;j (s) ; i1 = 1; :::; 1; (19)

4

ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS

236

Page 237: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

@1+i2f (x+ sj)@xi22 @x11

h1;i2;j (s) ; i2 = 1; :::; 2;

...@1+2+:::+N1+iN f (x+ sj)

@xiNN @xN1N1 :::@x

22 @x

11

h1;2;:::;N1;iN ;j (s) ; iN = 1; :::; N ;

8 x; s 2 RN .Then, both of the next exist and

[em]r;n (f ;x)= [em]r;n (f ;x) : (20)

We give

Theorem 6 Let f : RN ! C such that f = f1 + if2: Here j = 1; 2. Letfj 2 Cm+l

RN, m; l;N 2 N: For fj the assumptions of Theorem 5 are valid.

Call = 0; : Assume f( +) 1 <1 andZ

RN

NYk=1

jskjk!

1 +ksk2n

rdn (s) <1; (21)

where n is a Borel probability measure on RN , for n > 0, (n)n2N is bounded

sequence; for all k 2 Z+, k = 1; :::; N : jj =NXk=1

k = m:

For ej = 1; :::;m, and := (1; :::; N ), k 2 Z+, k = 1; :::; N; jj :=NXk=1

k = ej, callc;n;ej :=

ZRN

NYk=1

skk dn (s) :

Then [m]r;n (f ; )

f ()

mXej=1

[m]ej;r

0BBBBB@X

1;:::;N0:jj=ej

c;n;ejf + ()NYk=1

k!

1CCCCCA

1

X0@1;:::;N0jj=m

1A(!r (f1; +; n) + !r (f2; +; n))

NYk=1

k!

! (22)

ZRN

NYk=1

jskjk!

1 +ksk2n

rdn (s)

!:

5

ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS

237

Page 238: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Proof. By Theorem 10 of [3].Also we have

Theorem 7 Let f : RN ! C such that f = f1 + if2: Here j = 1; 2. Letfj 2 ClB

RN, l; N 2 N: The assumptions of Theorem 5 are valid for fj. Call

= 0; : Assume ZRN

1 +

ksk2n

rdn (s) <1:

Then [0]r;nf f 1Z

RN

1 +

ksk2n

rdn (s)

(23)

(!r (f1; ; n) + !r (f2; ; n)) :

Proof. By Theorem 11 of [3].By Theorem 4 of [2] we get

Theorem 8 Let f : RN ! C : f = f1 + if2: Here j = 1; 2. Let fj 2 CmRN,

m 2 N, N 1; with fj; 2 LpRN; jj = m, x 2 RN . Let p; q > 1 : 1p +

1q =

1: Here n is a Borel probability measure on RN for n > 0, (n)n2N is a

bounded sequence. Assume for all := (1; :::; N ), k 2 Z+, k = 1; :::; N;

jj :=NXk=1

k = m, we have that

ZRN

NYk=1

jskjk!

1 +ksk2n

r!pdn (s) <1: (24)

For ej = 1; :::;m, and := (1; :::; N ), k 2 Z+, k = 1; :::; N; jj := NXk=1

k = ej,call

c;n;ej :=ZRN

NYk=1

skk dn (s) : (25)

Then [m]r;n (f ;x) f (x)

mXej=1

[m]ej;r

0BBBBB@Xjj=ej

c;n;ejf (x)NYk=1

k!

1CCCCCA

p;x

m

(q (m 1) + 1)1q

!0BBBBB@Xjj=m

1 NYk=1

k!

!1CCCCCA

6

ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS

238

Page 239: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

"ZRN

" NYk=1

jskjk!

1 +ksk2n

r#pdn (s)

# 1p

!r (f1;; n)p + !r (f2;; n)p

: (26)

We further get

Theorem 9 Let f : RN ! C : f = f1+if2; j = 1; 2. Let fj 2CRN\ Lp

RN,

N 1; p; q > 1 : 1p +1q = 1: Assume n probability Borel measures on R

N ,(n)n2N > 0 and bounded. Also supposeZ

RN

1 +

ksk2n

rpdn (s) <1: (27)

Then [0]r;n (f) f pZ

RN

1 +

ksk2n

rpdn (s)

1p

(28)!r (f1; n)p + !r (f2; n)p

:

Proof. By Theorem 6 of [2].Based on Theorem 8 of [2] we get

Theorem 10 Let f : RN ! C; f = f1+if2; j = 1; 2. Let fj 2CRN\ L1

RN,

N 1: Assume n probability Borel measures on RN , (n)n2N > 0 andbounded. Also suppose Z

RN

1 +

ksk2n

rdn (s) <1: (29)

Then [0]r;n (f) f 1Z

RN

1 +

ksk2n

rdn (s)

(30)

(!r (f1; n)1 + !r (f2; n)1) :

Based on Theorem 10 of [2] we get

Theorem 11 Let f : RN ! C; f = f1 + if2; j = 1; 2. Let fj 2 CmRN,

m;N 2 N; with fj; 2 L1RN; jj = m, x 2 RN . Here n is a Borel

probability measure on RN for n > 0, (n)n2N is a bounded sequence. Assume

for all := (1; :::; N ), k 2 Z+, k = 1; :::; N; jj :=NXk=1

k = m that we have

ZRN

NYk=1

jskjk!

1 +ksk2n

r!dn (s) <1: (31)

7

ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS

239

Page 240: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

For ej = 1; :::;m, and := (1; :::; N ), k 2 Z+, k = 1; :::; N; jj := NXk=1

k = ej,call

c;n;ej :=ZRN

NYk=1

skk dn (s) : (32)

Then [m]r;n (f ;x) f (x)

mXej=1

[m]ej;r

0BBBBB@Xjj=ej

c;n;ejf (x)NYk=1

k!

1CCCCCA

1;x

Xjj=m

0BBBBB@1

NYk=1

k!

1CCCCCA!r (f1;; n)1 + !r (f2;; n)1

(33)

ZRN

NYk=1

jskjk!

1 +ksk2n

rdn (s) :

Based on Theorem 12 of [3] we get

Theorem 12 Let f : RN ! C; f = f1 + if2; j = 1; 2, with fj 2 Cm+lRN;

m; l;N 2 N: The assumptions of Theorem 5 are valid for fj. Call = 0; . Letfj;( +) 2 Lp

RN, jj = m, x 2 RN , p; q > 1 : 1p +

1q = 1: Here n is a Borel

probability measure on RN for n > 0, (n)n2N is a bounded sequence. Assume

for all := (1; :::; N ), k 2 Z+, k = 1; :::; N; jj :=NXk=1

k = m we have that

ZRN

NYk=1

jskjk!

1 +ksk2n

r!pdn (s) <1: (34)

For ej = 1; :::;m, and := (1; :::; N ), k 2 Z+, k = 1; :::; N; jj := NXk=1

k = ej,call

c;n;ej :=ZRN

NYk=1

skk dn (s) :

8

ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS

240

Page 241: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Then [m]r;n (f ;x)

f (x)

mXej=1

[m]ej;r

0BBBBB@Xjj=ej

c;n;ejf + (x)NYk=1

k!

1CCCCCA

p;x

(35)

m

(q (m 1) + 1)1q

!0BBBBB@Xjj=m

1 NYk=1

k!

!1CCCCCA

"ZRN

" NYk=1

jskjk!

1 +ksk2n

r#pdn (s)

# 1p

!r (f1; +; n)p + !r (f2; +; n)p

:

Based on Theorem 13 of [3] we get

Theorem 13 Let f : RN ! C; f = f1+ if2; j = 1; 2: Let fj 2 ClRN; l; N 2

N: The assumptions of Theorem 5 are valid. Call = 0; . Let fj; 2 LpRN,

x 2 RN , p; q > 1 : 1p +1q = 1: Assume n probability Borel measures on R

N ;

(n)n2N > 0 and bounded. Also supposeZRN

1 +

ksk2n

rpdn (s) <1:

Then [0]r;nf f p

Z

RN

1 +

ksk2n

rpdn (s)

1p

(36)

!r (f1; ; n)p + !r (f2; ; n)p

:

By Theorem 14 of [3] we get

Theorem 14 Let f : RN ! C; f = f1 + if2; j = 1; 2: Let fj 2 ClRN;

l; N 2 N: The assumptions of Theorem 5 are valid for fj. Call = 0; .Let fj; 2 L1

RN, x 2 RN : Assume n probability Borel measures on R

N ;

(n)n2N > 0 and bounded. Also supposeZRN

1 +

ksk2n

rdn (s) <1:

9

ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS

241

Page 242: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Then [0]r;nf f 1

Z

RN

1 +

ksk2n

rdn (s)

(37)

!r (f1; ; n)1 + !r (f2; ; n)1:

Finally we have

Theorem 15 Let f : RN ! C; f = f1 + if2; j = 1; 2, with fj 2 Cm+lRN,

m; l;N 2 N. The assumptions of Theorem 5 are valid for fj. Call = 0; . Letfj;( +) 2 L1

RN; jj = m, x 2 RN . Here n is a Borel probability measure

on RN for n > 0, (n)n2N is bounded. Assume for all := (1; :::; N ),

k 2 Z+, k = 1; :::; N; jj :=NXk=1

k = m; we have that

ZRN

NYk=1

jskjk!

1 +ksk2n

r!dn (s) <1: (38)

For ej = 1; :::;m, and := (1; :::; N ), k 2 Z+, k = 1; :::; N; jj := NXk=1

k = ej,call

c;n;ej :=ZRN

NYk=1

skk dn (s) : (39)

Then [m]r;n (f ;x)

f (x)

mXej=1

[m]ej;r

0BBBBB@Xjj=ej

c;n;ejf( +) (x)NYk=1

k!

1CCCCCA

1;x

(40)

Xjj=m

0BBBBB@1

NYk=1

k!

1CCCCCA!r (f1; +; n)1 + !r (f2; +; n)1

ZRN

NYk=1

jskjk!

1 +ksk2n

rdn (s) :

Proof. By Theorem 15 of [3].

10

ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS

242

Page 243: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

3 Applications

Let all entities as in section 2. We dene the following specic operators forf : RN ! C:i) The general multivariate Picard singular integral operators:

P [m]r;n (f ;x1; :::; xN ) :=1

(2n)N

rXj=0

[m]j;r (41)

ZRNf (x1 + s1j; x2 + s2j; :::; xN + sN j) e

0BBB@NXi=1

jsij

1CCCAn ds1:::dsN :

ii) The general multivariate Gauss-Weierstrass singular integral operators:

W [m]r;n (f ;x1; :::; xN ) :=

1pn

N rXj=0

[m]j;r (42)

ZRNf (x1 + s1j; x2 + s2j; :::; xN + sN j) e

0BBB@NXi=1

s2i

1CCCAn ds1:::dsN :

iii) The general multivariate Poisson-Cauchy singular integral operators:

U [m]r;n (f ;x1; :::; xN ) :=WNn

rXj=0

[m]j;r (43)

ZRNf (x1 + s1j; :::; xN + sN j)

NYi=1

1s2i + 2n

ds1:::dsN ;with 2 N, > 1

2 ; and

Wn := ()21n

12

1

2

: (44)

iv) The general multivariate trigonometric singular integral operators:

T [m]r;n (f ;x1; :::; xN ) := Nn

rXj=0

[m]j;r (45)

ZRNf (x1 + s1j; :::; xN + sN j)

NYi=1

0@ sinsin

si

1A2

ds1:::dsN ;

11

ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS

243

Page 244: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

where 2 N, and

n := 212n (1)

Xk=1

(1)k k21

( k)! ( + k)! : (46)

One can apply the results of this article to the operators P [m]r;n ; W[m]r;n ; U

[m]r;n , T

[m]r;n

(special cases of [m]r;n ) and derive interesting results. We intend to do that in afuture article.Conclusion: Our approximation results here imply important convergence

properties of operators [m]r;n to the unit operator.

References

[1] G. Anastassiou, General uniform Approximation theory by multivariate sin-gular integral operators, submitted, 2010.

[2] G. Anastassiou, Lp-general approximations by multivariate singular integraloperators, submitted, 2010.

[3] G. Anastassiou, Global smoothness preservation and simultaneous approxi-mation for multivariate general singular integral operators, submitted, 2010.

12

ANASTASSIOU: MULTIVARIATE COMPLEX SINGULAR INTEGRALS

244

Page 245: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Stability and superstability of ∗−bihomomorphisms on C∗-ternary

algebras

M. Eshaghi GordjiDepartment of Mathematics, Semnan University, P. O. Box 35195-363, Semnan, Iran

Center of Excellence in Nonlinear Analysis and Applications (CENAA), Semnan University, Iran

e-mail: [email protected]

A. FazeliIslamic AZAD University (IAU), Science and Research Branch, Tehran, Iran.

e-mail: [email protected]

Abstract. In this paper, we establish the stability and superstability of ∗−bihomomorphisms on C∗-ternaryalgebras associated with the following functional equation

f(x− y, t) + f(x, t− s) = 2f(x, t)− f(y, t)− f(x, s).

1. Introduction

Let f be a mapping such that in general case its domain is a semigroup and its range is a topological vector space.

Suppose that we are given a functional equation E(f) = 0 so that the boundedness of f gives the boundedness of

E(f). More precisely, in the category of normed spaces, the functional equation E(f) = 0 is stable if for every ε > 0

there exists a δ > 0 that whenever ‖E(g)‖ < δ then there exists a function f such that E(f) = 0 and ‖f − g‖ < ε.

The equation E(f) = 0 is superstable whenever every approximate solution of E(f) ≥ 0 or E(f) ≤ 0

is a true solution of E(f) = 0. In other words, the boundedness of E(f) shows that either f is bounded or E(f) = 0.

In question, stability was originated from Ulam conjecture by the following explanation.

Given a metric group (G, d), a number ε > 0 and a mapping f : G → G which satisfies the inequality

d(f(x.y), f(x).f(y)) < ε, for all x,y in G, does there exist an automorphism g of G and a constant k > 0, depending

only on G, such that d(g(x), f(x)) ≤ kε for all x in G?

Hyers proved the Ulam conjecture in the category of Banach spaces under the following theorem. Suppose that

E1, E2 are two Banach spaces and f : E1 → E2 is a function that for all x, y ∈ E1 satisfy the inequality

‖f(x+y)−f(x)−f(y)‖ < ε then there exists an additive function g : E1 → E2 that for all x ∈ E1, ‖g(x)−f(x)‖ ≤ ε.

So far we have the stability of Hyers–Ulam. Th. M. Rassias extended the Ulam’s theorem by setting ε(‖x‖p +‖y‖p)

instead of ε where 0 ≤ p < 1, that, at present, is called Hyers–Ulam–Rassias stability. Thence the stability theory

was extended day by day and several applications were obtained in a variety of branches of physics and mathemat-

ical sciences among others in Supersymmetric theories and Yang-Baxter equation and Cubic analog of Laplace and

d’Alembert equations. The primitive work of Ulam has come in [69] and partial solution of Hyers is shown in [49].

The generalization of Hyers theorem by Rssias appears in [66]. The expression Hyers-Ulam-Rassias stability was

propounded in [66]. For the history and various aspects of stability theory we refer the reader to [2, 34], [5]–[47],

0 2000 Mathematics Subject Classification: 39B82, 39B52.0 Keywords: stability; suprestability ; C∗-ternary algebra; bi-homomorphism

245

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,245-258,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 246: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

2 M. Eshaghi Gordji and A.Fazeli

[52, 53] and [62]–[65].

Ternary algebraic operations have propounded originally in 19th century in Cayley [4] and J.J.Silvester’s paper

[68]. The application of ternary algebra in supersymmetry is presented in [51] and in Yang-Baxter equation in

[55]. Cubic analogue of Laplace and d’alembert equations have been considered for first order by Himbert in

[48],[50]. The previous definition of C∗-ternary algebras has been propounded by H.Zettle in [70]. In relation to

homomorphisms and isomorphisms between various spaces we refer readers to [56]–[61], [67].

2. Preliminaries

Assume A is a linear space over a complex field equipped with a mapping [ ] : A3 = A × A × A → A with

(x, y, z) → [x, y, z] that is linear in variables x, y, z and satisfies the associative identity, i.e. [x, y, [z, u, v]] =

[x, [y, z, u], v] = [[x, y, z], u, v] for all x, y, z, u, v ∈ A. The pair (A, [ ]) is called a ternary algebra. The ternary

algebra (A, [ ]) is called unital if it has an identity element, i.e. an element e ∈ A such that [x, e, e] = [e, e, x] = x

for every x ∈ A. A ∗ − ternary algebra is a ternary algebra together with a mapping ∗ : A → A which satisfies

(x∗)∗ = x, (λx)∗ = λx∗, (x + y)∗ = x∗+ y∗, [x, y, z]∗ = [z∗, y∗, x∗] for all x, y, z ∈ A and all λ ∈ C. In the case that

A is unital and e is its unit, we assume that e∗ = e.

A is normed ternary algebra if A is a ternary algebra and there exists a norm ‖.‖ on A which satisfies ‖[x, y, z]‖ ≤‖x‖ ‖y‖ ‖z‖ for all x, y, z ∈ A. Whenever the ternary algebra A is unital with unit element e, we repute ‖e‖ = 1. A

normed ternary algebra A is called a Banach ternary algebra, if (A, ‖ ‖) is a Banach space. A C∗-ternary algebra

is a Banach ∗ − ternary algebra if ‖[x, x∗, x]‖ = ‖x‖3 for all x ∈ A.

We suggest [54] for definition of C∗-ternary algebra.

Theorem 2.1. Assume that A and B are two C∗-ternary algebras, then the cartesian product A×B is a C∗-ternary

algebra.

Proof. We define in A×B sum and scaler product and ternary product, pointwise ie

(a1, b1) + (a2, b2) = (a1 + a2, b1 + b2) and λ(a, b) = (λa, λb) and [(a1, b1), (a2, b2), (a3, b3)] = ([a1, a2, a3], [b1, b2, b3])

for all a, a1, a2, a3 ∈ A and b, b1, b2, b3 ∈ B and λ ∈ C. Also we define (a, b)∗ = (a∗, b∗) and ||(a, b)|| = max(||a||, ||b||)for all a ∈ A and b ∈ B. The only subject that is not clear is C∗-ternary algebra identity,

||[(a, b), (a, b)∗, (a, b)]|| = ||([a, a∗, a], [b, b∗, b])|| = max(||a||3, ||b||3) = max(||a||, ||b||)3 = ||(a, b)||3

Now we proceed to the resumption of definitions.

Let X, Y, Z be linear spaces. A mapping f : X × Y → Z is said to biadditive if for each fixed x in X, the map

y 7→ f(x, y) is additive and for each fixed y in Y the map x 7→ f(x, y) is additive. We say that f : X × Y → Z is

bilinear if f is biadditive and f(λx, µy) = λµf(x, y) for all λ, µ ∈ C and x ∈ X, y ∈ Y .

Definition 2.2. [1] Suppose A and B are ternary algebras. A bilinear mapping f : A × A → B is called ternary

algebra left[right] bihomomorphism if it satisfies

f([x, y, z], t) = [f(x, t), f(y, t), f(z, t)] [f(x, [y, z, t]) = [f(x, y), f(x, z), f(x, t)]]

GORDJI, FAZELI: C*-TERNARY ALGEBRAS

246

Page 247: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Stability and superstability of bihomomorphisms and ... 3

for all x, y, z, t ∈ A. f is called bihomomorphism if it is right and left bihomomorphism. In the case the function f

is bijective and bihomomorphism, it will be called ternary algebra biisomorphism.

Definition 2.3. Let A and B be C∗−ternary algebras and f : A × A → B be a bihomomorphism. f is called

∗−bihomomorphism if f(x∗) = f(x)∗ for every x ∈ A×A.

3. Biadditivity

We need the following theorem to prove the main results of the present paper.

Theorem 3.1. Let X and Y and Z be linear spaces and f : X × Y → Z be a mapping. Then f is biadditive if and

only if

f(x− y, t) + f(x, t− s) = 2f(x, t)− f(y, t)− f(x, s) (3.1)

for all x, y ∈ X and t, s ∈ Y .

Proof. If f is a biadditive mapping, it is obvious that it satisfies (3.1). Conversely suppose that f satisfies (3.1). In

(3.1) we set x = y = s = t = 0, we have f(0, 0) = 0. Letting x = y = s = 0 in (3.1), we obtain f(0, t) = 0. Putting

y = s = t = 0 we get f(x, 0) = 0. Setting s = 0 in (3.1) we arrive at

f(x− y, t) = f(x, t)− f(y, t). (3.2)

Letting x = 0 in (3.2), shows that f(−y, t) = −f(y, t). Thus (3.2) gets out in the following form

f(x− y, t) = f(x, t) + f(−y, t). (3.3)

By changing y to −y, (3.3) shows that f is additive with respect to first variable. Putting y = 0 in (3.1), we obtain

f(x, t− s) = f(x, t)− f(x, s). (3.4)

Setting t = 0 in (3.4), we arrive at f(x,−s) = −f(x, s). Interchanging s by −s in (3.4) and the last equality we

see that f is additive with respect to the second variable. So f is biadditive .

Theorem 3.2. Let X and Y and Z be linear spaces and f : X×Y → Z be a biadditive mapping. Then f is bilinear

if and only if

f(λx, µy) = λµf(x, y) (3.5)

for each x in X and y in Y and λ, µ ∈ T 114

= eiθ; 0 ≤ θ ≤ π

2.

Proof. At the beginning suppose that (3.5) is satisfied. Since f is biadditive, f(rx, sy) = rsf(x, y) for all r, s ∈ Qand x ∈ X and y ∈ Y . Now we consider some equalities:

Ifπ

2≤ θ ≤ π then 0 ≤ θ − π

2≤ π

2and eiθ = e

i(θ−π

2).e

2 = iei(θ−

π

2).

If π ≤ θ ≤ 3π

2then 0 ≤ θ − π ≤ π

2and eiθ = ei(θ−π).eiπ = (−1)ei(θ−π).

If−π

2≤ θ ≤ 0 then 0 ≤ θ +

π

2≤ π

2and eiθ = e

i(θ+π

2).e

−iπ

2 = (−i)ei(θ+

π

2).

So by using the above equalities and (3.5), we arrive at f(λx, µy) = λµf(x, y)

GORDJI, FAZELI: C*-TERNARY ALGEBRAS

247

Page 248: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

4 M. Eshaghi Gordji and A.Fazeli

for all λ, µ ∈ T 1 = z ∈ C; |z| = 1 and x ∈ X and y ∈ Y .

If 0 ≤ r, s ≤ 1 letting s1 = s +√

1− s2 i ∈ T 1 and r1 = r +√

1− r2 i ∈ T 1.

So r =r1 + r1

2, s =

s1 + s1

2. Therefore, by paying attention to what come in the above

f(rx, sy) = rsf(x, y). Now if λ, µ belong to C then

λ = |λ|eiλ1 , µ = |µ|eiµ1 , |λ| = [|λ|] + λ2, |µ| = [|µ|] + µ2 that in those 0 ≤ λ2, µ2 < 1. Thus

f(λx, µy) = f(([|λ|] + λ2)eiλ1x, ([|µ|] + µ2)eiµ1y) = eiλ1eiµ1f(([|λ|] + λ2)x, ([|µ|] + µ2)y) = λµf(x, y)

for all x ∈ X and y ∈ Y . Hence f is bilinear. The converse is clear.

Theorem 3.3. Let X,Y,Z be linear spaces and f : X × Y → Z be a mapping. Then f is bilinear if and only if

f(λx− λy, µt) + f(λx, µt− µs) = λµ(2f(x, t)− f(y, t)− f(x, s)) (3.6)

for all x, y ∈ X and t, s ∈ Y and λ, µ ∈ T 114.

Proof. If f is bilinear, then it is obvious that f satisfies (3.6).

On the other hand, suppose that f satisfies (3.6). Setting λ = µ = 1 in (3.6). By Theorem 3.1, f is biadditive.

Putting y = s = 0 in (3.6), we achieve f(λx, µt) = λµf(x, t) for all λ, µ ∈ T 114

and t ∈ Y . Therefore, according to

theorem 3.2 f is bilinear.

Notation: Let X, Y, Z be linear spaces. For a given mapping f : X × Y → Z, we set

Eλ,µf(x, y, t, s) = f(λx− λy, µt) + f(λx, µt− µs)− λµ(2f(x, t)− f(y, t)− f(x, s))

for all x, y ∈ X and s, t ∈ Y and λ, µ ∈ C.

4. Stability of ∗−bihomomorphisms of C∗-ternary algebras

In this section we investigate the Stability of ∗−bihomomorphisms between C∗-ternary algebras.

Theorem 4.1. Let A and B be two C∗−ternary algebras and ϕ : A4 → [0,∞) be a function such that

ϕ(0, 0, 0, 0) = 0 limn→∞

14nl

ϕ(2nlx, 2nly, 2nlt, 2nls) = 0, (4.1)

Ml(x, y) =∞∑

n= 1−l2

14nl

M(2nlx, 2nly) < ∞ (4.2)

where x, y, t, s ∈ A and l ∈ +1,−1 and

M(x, y) = ϕ(0, x, 2y, 0) + ϕ(x,−x, 2y, y) + ϕ(0, 0, 2y, 0) + 3(ϕ(x, 0, y,−y) + ϕ(x, 0, 0, y) + ϕ(x, 0, 0, 0) + ϕ(0, 0, y, 0))

and f : A×A → B be a mapping which satisfies

||f(x, y)− f(x∗, y∗)|| ≤ ϕ(x, y, 0, 0), (4.3)

‖Eλ,µf(x, y, t, s)‖ ≤ ϕ(x, y, t, s), (4.4)

GORDJI, FAZELI: C*-TERNARY ALGEBRAS

248

Page 249: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Stability and superstability of bihomomorphisms and ... 5

max(||f([x, y, t], s)− [f(x, s), f(y, s), f(t, s)]||, ||f(x, [y, t, s])− [f(x, y), f(x, t), f(x, s)]|| ≤ ϕ(x3, y3, t3, s3), (4.5)

limn→∞

14n

f(2nx, 2ny) = limn→∞

143n

f(2nx, 23ny) = limn→∞

143n

f(23nx, 2ny), (4.6)

[ limn→∞

4nf(x

2n,

y

2n) = lim

n→∞43nf(

x

2n,

y

23n) = lim

n→∞43nf(

x

23n,

y

2n) ] (4.7)

for all x, y, t, s ∈ A and λ, µ ∈ T 114. Then there exists a unique ∗−bihomomorphism of ternary algebras

H : A×A → B such that

||H(x, y)− f(x, y)|| ≤ 14Ml(x, y) (4.8)

and H(x, y) = limn→∞

14n

f(2nx, 2ny) [H(x, y) = limn→∞

4nf(x

2n,

y

2n)]

for all x, y ∈ A.

Proof. Setting λ = µ = 1 in (4.4) we have

||f(x− y, t) + f(x, t− s)− 2f(x, t) + f(y, t) + f(x, s)|| ≤ ϕ(x, y, t, s). (4.9)

Putting x = y = t = s = 0 in (4.9), we obtain f(0, 0) = 0 by (4.1).

Letting x = y = s = 0 in (4.9), shows that

||f(0, t)|| ≤ ϕ(0, 0, t, 0).

Assuming y = t = s = 0 in (4.9) we get

‖f(x, 0)‖ ≤ ϕ(x, 0, 0, 0).

Setting y = −x, t = 2s in (4.9) we arrive at

||f(2x, 2s) + 2f(x, s)− 2f(x, 2s) + f(−x, 2s)|| ≤ ϕ(x,−x, 2s, s). (4.10)

Putting x = s = 0 in (4.9) we conclude that

||f(−y, t) + f(y, t)|| ≤ ϕ(0, y, t, 0) + ϕ(0, 0, t, 0). (4.11)

Letting y = x, t = 2s in (4.11) we get

||f(−x, 2s) + f(x, 2s)|| ≤ ϕ(0, x, 2s, 0) + ϕ(0, 0, 2s, 0). (4.12)

By using (4.10) and (4.12) we come to

||f(2x, 2s) + 2f(x, s)− 3f(x, 2s)|| ≤ ϕ(0, x, 2s, 0) + ϕ(x,−x, 2s, s) + ϕ(0, 0, 2s, 0). (4.13)

In (4.9) setting y = 0 and s = −t, we achieve

||f(x, 2t)− f(x, t) + f(0, t) + f(x,−t)|| ≤ ϕ(x, 0, t,−t). (4.14)

Assuming y = t = 0 in (4.9) we have

‖f(x, s) + f(x,−s)‖ ≤ ϕ(x, 0, 0, s) + ϕ(x, 0, 0, 0). (4.15)

GORDJI, FAZELI: C*-TERNARY ALGEBRAS

249

Page 250: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

6 M. Eshaghi Gordji and A.Fazeli

Substituting s by t in (4.15) shows that

||f(x,−t) + f(x, t)|| ≤ ϕ(x, 0, 0, t) + ϕ(x, 0, 0, 0). (4.16)

(4.14) and (4.16) show that

||f(x, 2t)− 2f(x, t)|| ≤ ϕ(x, 0, t,−t) + ϕ(x, 0, 0, t) + ϕ(x, 0, 0, 0) + ϕ(0, 0, t, 0). (4.17)

Letting t = s in (4.17) and multiply both sides by 3, gives

||3f(x, 2s)− 6f(x, s)|| ≤ 3(ϕ(x, 0, s,−s) + ϕ(x, 0, 0, s) + ϕ(x, 0, 0, 0) + ϕ(0, 0, s, 0)). (4.18)

(4.18) and (4.13) give

||f(2x, 2s)− 4f(x, s)|| ≤ M(x, s). (4.19)

Now let l = 1. By replacing x by 2jx and s by 2js, and multiplying both sides of (4.19) by1

4j+1, we get

|| 14j+1

f(2j+1x, 2j+1s)− 14j

f(2jx, 2js)|| ≤ 14j+1

M(2jx, 2js).

Now for given m, p ∈ N, we have

|| 14m+p

f(2m+px, 2m+ps)− 14m

f(2mx, 2ms)|| ≤

m+p−1∑j=m

|| 14j+1

f(2j+1x, 2j+1s)− 14j

f(2jx, 2js)|| ≤

m+p−1∑j=m

14j+1

M(2jx, 2js). (4.20)

So by (4.20) and (4.2), the sequence14n

f(2nx, 2ny) is a Cauchy sequence in Banach space B for all x, y ∈ A, and

hence it is convergent. Define H : A × A → B by H(x, y) = limn→∞

14n

f(2nx, 2ny) for all x, y ∈ A. Letting m = 0

and p →∞ in (4.20), so we obtain (4.8) with l = 1. From (4.4) and (4.1), we get

||Eλ,µH(x, y, t, s)|| ≤ limn→∞

14n||Eλ,µf(2nx, 2ny, 2nt, 2ns)|| ≤

limn→∞

14n

ϕ(2nx, 2ny, 2nt, 2ns) = 0.

Thus Eλ,µH(x, y, t, s) = 0 for all x, y, t, s ∈ A and λ, µ ∈ T 114. So, according to Theorem 3.3 H is a bilinear mapping.

By (4.5), (4.6) and (4.1), we conclude that

max(||H([x, y, t], s)− [H(x, s),H(y, s),H(t, s)] ||, ||H(x, [y, t, s])− [H(x, y),H(x, t),H(x, s)] ||) =

max(|| limn→∞

14n

f(2n[x, y, t], 2ns)− limn→∞

143n

[f(2nx, 2ns), f(2ny, 2ns), f(2nt, 2ns)]||,

|| limn→∞

14n

f(2nx, 2n[y, t, s])− limn→∞

143n

[f(2nx, 2ny), f(2nx, 2nt), f(2nx, 2ns)]||) =

limn→∞

143n

max(||f([2nx, 2ny, 2nt], 2ns)− [f(2nx, 2ns), f(2ny, 2ns), f(2nt, 2ns)]||,

||f(2nx, [2ny, 2nt, 2ns])− [f(2nx, 2ny), f(2nx, 2nt), f(2nx, 2ns)]||) ≤

limn→∞

143n

ϕ(23nx3, 23ny3, 23nt3, 23ns3) = 0.

GORDJI, FAZELI: C*-TERNARY ALGEBRAS

250

Page 251: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Stability and superstability of bihomomorphisms and ... 7

So H([x, y, t], s) = [H(x, s),H(y, s),H(t, s)] and H(x, [y, t, s]) = [H(x, y),H(x, t),H(x, s)]. Therefore, H is a

bihomomorphism. On the other hand, by (4.3), we have

||H(x, y)−H(x∗, y∗)|| = limn→∞

14n||f(2nx, 2ny)− f((2nx)∗, (2ny)∗)|| ≤ 1

4nϕ(2nx, 2ny, 0, 0) = 0.

Hence H is ∗−bihomomorphism. Now let T : A×A → B be another ∗−bihomomorphism satisfying (4.8), then by

(4.2) we have

||H(x, y)− T (x, y)|| = limn→∞

|| 14n

f(2nx, 2ny)− T (x, y)|| = limn→∞

14n||f(2nx, 2ny)− T (2nx, 2ny)|| ≤

limn→∞

14n+1

M1(2nx, 2ny) = limn→∞

14

∞∑j=n

14n

M(2nx, 2ny) = 0.

So, we conclude that H(x, y) = T (x, y) for all x, y ∈ A.

Now assume that l = −1.

Interchanging x byx

2j+1and s by

s

2j+1in(4.19) and multiplying its both sides by 4j , we achieve

||4jf(x

2j,

s

2j)− 4j+1f(

x

2j+1,

s

2j+1)|| ≤ 4jM(

x

2j+1,

s

2j+1).

Now for given m, p ∈ N, we see that

||4m+pf(x

2m+p,

s

2m+p)− 4mf(

x

2m,

s

2m)|| ≤

m+p−1∑j=m

||4jf(x

2j,

s

2j)− 4j+1f(

x

2j+1,

s

2j+1)|| ≤

m+p−1∑j=m

4jM(x

2j+1,

s

2j+1). (4.21)

By (4.21) and (4.2) the sequence 4nf(x

2n,

y

2n) is Cauchy in Banach space B. Then it is convergent for all x, y ∈ A.

Define H1 : A × A → B by H1(x, y) = limn→∞

4nf(x

2n,

y

2n) for all x,y in A. The rest of the proof is similar to the

case that l = 1.

Theorem 4.2. Let θ, p1, p2, p3, p4 be real numbers such that θ ≥ 0 and all of p1, p2, p3, p4 be located in (0, 2) [or

all in (2,∞)] and A,B be C∗ternary algebras and f : A×A → B be a mapping that satisfies

||f(x, y)− f(x∗, y∗)|| ≤ θ(||x||p1 + ||y||p2),

‖Eλ,µf(x, y, t, s)‖ ≤ θ(||x||p1 + ||y||p2 + ||t||p3 + ||s||p4),

max(||f([x, y, t], s)− [f(x, s), f(y, s), f(t, s)]||, ||f(x, [y, t, s])− [f(x, y), f(x, t), f(x, s)]||,

≤ θ(||x3||p1 + ||y3||p2 + ||t3||p3 + ||s3||p4),

limn→∞

14n

f(2nx, 2ny) = limn→∞

143n

f(2nx, 23ny) = limn→∞

143n

f(23nx, 2ny),

[ limn→∞

4nf(x

2n,

y

2n) = lim

n→∞43nf(

x

2n,

y

23n) = lim

n→∞43nf(

x

23n,

y

2n)]

for all x, y, t, s ∈ A and λ, µ ∈ T 114. Then there exists a unique ∗−bihomomorphism H : A×A → B which satisfies

the following inequality

||H(x, y)− f(x, y)|| ≤

θ(10

|4− 2p1 |||x||p1 +

2|4− 2p2 |

||x||p2 +6 + 3× 2p3

|4− 2p3 |||y||p3 +

7 + 2p4

|4− 2p4 |||y||p4),

and

H(x, y) = limn→∞

14n

f(2nx, 2ny) [H(x, y) = limn→∞

4nf(x

2n,

y

2n)]

GORDJI, FAZELI: C*-TERNARY ALGEBRAS

251

Page 252: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

8 M. Eshaghi Gordji and A.Fazeli

for all x, y ∈ A.

Proof. We set in Theorem 4.1

ϕ(x, y, t, s) = θ(||x||p1 + ||y||p2 + ||t||p3 + ||s||p4).

Theorem 4.3. Let A and B be two C∗−ternary algebras and ϕ : A4 → [0,∞) be a function such that ϕ(0, 0, 0, 0) = 0

and

limn→∞

12n

ϕ(2nx, 2ny, 2nt, s) = 0 [ limn→∞

12n

ϕ(x, 2ny, 2nt, 2ns) = 0 ]

M1(x, t) =∞∑

j=0

12j

M(2jx, t) < ∞ [ M2(x, t) =∞∑

j=0

12j

M(x, 2jt) < ∞ ] (4.22)

where x, y, t, s ∈ A and

M(x, t) = ϕ(x,−x, t, t) + ϕ(x, 0, 0, 0) + ϕ(0, x, t, 0) + ϕ(0, 0, t, 0),

[ M(x, t) = ϕ(x, x, t,−t) + ϕ(x, 0, 0, 0) + ϕ(x, 0, 0, t) + ϕ(0, 0, t, 0) ]

and f : A×A → B be a mapping satisfying

||f(x, y)− f(x∗, y∗)|| ≤ ϕ(x, x, x, y) [ ||f(x, y)− f(x∗, y∗)|| ≤ ϕ(x, y, y, y) ]

||Eλ,µf(x, y, t, s)|| ≤ ϕ(x, y, t, s)

||f([x, y, t], s)− [f(x, s), f(y, s), f(t, s)]|| ≤ ϕ(x3, y3, t3, s3)

[ ||f(x, [y, t, s])− [f(x, y), f(x, t), f(x, s)]|| ≤ ϕ(x3, y3, t3, s3) ]

limn→∞

12n

f(2nx, y) = limn→∞

123n

f(23nx, y) [ limn→∞

12n

f(x, 2ny) = limn→∞

123n

f(x, 23ny)]

for all x, y, t, s ∈ A and λ, µ ∈ T 114. Then there exist a unique ∗−bihomomorphism H : A×A → B such that

||H(x, y)− f(x, y)|| ≤ 12M1(x, y) [ ||H(x, y)− f(x, y)|| ≤ 1

2M2(x, y) ] (4.23)

and

H(x, y) = limn→∞

12n

f(2nx, y) [ H(x, y) = limn→∞

12n

f(x, 2ny) ]

for all x, y ∈ A.

Proof. Putting y = t = s = 0 in (4.9) shows that

||f(x, 0)|| ≤ ϕ(x, 0, 0, 0). (4.24)

Setting y = −x and s = t in (4.9) we get

||f(2x, t) + f(x, 0)− f(x, t) + f(−x, t)|| ≤ ϕ(x,−x, t, t). (4.25)

Substituting y with x in (4.11) we obtain

||f(−x, t) + f(x, t)|| ≤ ϕ(0, x, t, 0) + ϕ(0, 0, t, 0). (4.26)

By using (4.24) and (4.25) and (4.26) we come to

||f(2x, t)− 2f(x, t)|| ≤ M(x, t). (4.27)

GORDJI, FAZELI: C*-TERNARY ALGEBRAS

252

Page 253: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Stability and superstability of bihomomorphisms and ... 9

Replacing x with 2jx and multiply its both sides by1

2j+1we get

|| 12j+1

f(2j+1x, t)− 12j

f(2jx, t)|| ≤ 12j+1

M(2jx, t).

Now let m,p be in N. We have

|| 12m+p

f(2m+px, t)− 12m

f(2mx, t)|| ≤m+p−1∑

j=m

|| 12j+1

f(2j+1x, t)− 12j

f(2jx, t)|| ≤m+p−1∑

j=m

12j+1

M(2jx, t). (4.28)

From (4.22) and (4.28) the sequence 12n

f(2nx, y) is Cauchy and hence is convergent. Define H : A×A → B by

H(x, y) = limn→∞

12n

f(2nx, y) for all x,y in A.

Letting m = 0 and p →∞ in (4.28), it follows that (4.23) is satisfied. The rest of the proof is similar to the proof

of Theorem 4.1 .

Theorem 4.4. Suppose that θ, p1, p2, p3, p4 be real numbers such that θ ≥ 0, p1, p2, p3 lie in (0, 1) [p2, p3 , p4 lie in (0, 1)].

Let A and B be two C∗-ternary algebras and f : A×A → B be a mapping satisfying

||f(x, y)−f(x∗, y∗)|| ≤ θ(||x||p1+||x||p2+||x||p3+||y||p4) [ ||f(x, y)−f(x∗, y∗)|| ≤ θ(||x||p1+||y||p2+||y||p3+||y||p4) ]

||Eλ,µf(x, y, t, s)|| ≤ θ(||x||p1 + ||y||p2 + ||t||p3 + ||s||p4)

||f([x, y, t], s)− [f(x, s), f(y, s), f(t, s)]|| ≤ θ(||x3||p1 + ||y3||p2 + ||t3||p3 + ||s3||p4)

[ ||f(x, [y, t, s])− [f(x, y), f(x, t), f(x, s)]|| ≤ θ(||x3||p1 + ||y3||p2 + ||t3||p3 + ||s3||p4) ]

limn→∞

12n

f(2nx, y) = limn→∞

123n

f(23nx, y) [ limn→∞

12n

f(x, 2ny) = limn→∞

123n

f(x, 23ny) ]

for all x, y, t, s ∈ A and λ, µ ∈ T 114. Then there exist a unique left [right] ∗−bihomomorphism H : A×A → B such

that

||H(x, y)− f(x, y)|| ≤ θ(2

2− 2p1||x||p1 +

22− 2p2

||x||p2 + 3||y||p3 + ||y||p4)

[ ||H(x, y)− f(x, y)|| ≤ θ(3||x||p1 + ||x||p2 +2

2− 2p3||y||p3 +

22− 2p4

||y||p4) ]

and

H(x, y) = limn→∞

12n

f(2nx, y) [H(x, y) = limn→∞

12n

f(x, 2ny)]

for all x, y ∈ A.

Proof. It follows by Theorem 4.3 by putting ϕ(x, y, t, s) = θ(||x||p1 + ||y||p2 + ||t||p3 + ||s||p4).

5. Superstability

In this section, we investigate the Superstability of ∗−bihomomorphisms of C∗-ternary algebras.

Theorem 5.1. Let A and B be two C∗−ternary algebras and ϕ : A4 → [0,∞) be a function such that

ϕ(0, y, t, s) = ϕ(x, 0, t, s) = ϕ(x, y, t, 0) = 0 (5.1)

limn→∞

14nl

ϕ(2nlx, 2nly, 2nlt, 2nls) = 0 (5.2)

for all x, y, t, s ∈ A and l ∈ 1,−1 and let f : A×A → B be a mapping satisfying

||f(x, y)− f(x∗, y∗)|| ≤ ϕ(x, y, x, y), (5.3)

GORDJI, FAZELI: C*-TERNARY ALGEBRAS

253

Page 254: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

10 M. Eshaghi Gordji and A.Fazeli

||Eλ,µf(x, y, t, s)|| ≤ ϕ(x, y, t, s), (5.4)

max(||f([x, y, t], s)− [f(x, s), f(y, s), f(t, s)]||, ||f(x, [y, t, s])− [f(x, y), f(x, t), f(x, s)]||) ≤ ϕ(x3, y3, t3, s3), (5.5)

limn→∞

14n

f(2nx, 2ny) = limn→∞

143n

f(23nx, 2ny) = limn→∞

143n

f(2nx, 23ny), (5.6)

[ limn→∞

4nf(x

2n,

y

2n) = lim

n→∞43nf(

x

23n,

y

2n) = lim

n→∞43nf(

x

2n,

y

23n)]

for all x, y, t, s ∈ A and λ, µ ∈ T 114. Then f is a ∗−bihomomorphism.

Proof. Letting λ = µ = 1 in (5.4) to get

||f(x− y, t) + f(x, t− s)− 2f(x, t) + f(y, t) + f(x, s)|| ≤ ϕ(x, y, t, s). (5.7)

Reputing x = y = t = s = 0 in (5.7) to obtain f(0, 0) = 0. Putting x = y = s = 0 in (5.7) to obtain f(0, t) = 0

for all t ∈ A. putting y = s = t = 0 in (5.7) to get f(x, 0) = 0 for all x ∈ A. In (5.7), put x = 0 and s = t, we

arrive at f(−y, t) = −f(y, t), for all y, t ∈ A. Letting t = y = 0 in (5.7), we conclude that f(x,−s) = −f(x, s)

for all x, s ∈ A. Put y = 0 and s = −t in (5.7) to obtain f(x, 2t) = 2f(x, t) for all x, t ∈ A. Suppose that s = 0

and y = −x in (5.7) we arrive at f(2x, t) = 2f(x, t) for all x, t ∈ A. Thus we receive f(2x, 2y) = 4f(x, y) for all

x, y ∈ A. By induction, we get f(2nx, 2ny) = 4nf(x, y) for all x, y ∈ A and n ∈ Z .Now let l = 1. From (5.4), we

get

||Eλ,µf(x, y, t, s)|| = limn→∞

14n||Eλ,µf(2nx, 2ny, 2nt, 2ns)|| ≤ lim

n→∞

14n

ϕ(2nx, 2ny, 2nt, 2ns) = 0.

Thus Eλ,µf(x, y, t, s) = 0 for all x, y, t, s ∈ A and λ, µ ∈ T 114. So, according to Theorem 3.3, f is a bilinear map. By

(5.2), (5.5) and (5.6) we conclude that

max(||f([x, y, t], s)− [f(x, s), f(y, s), f(t, s)] ||, ||f(x, [y, t, s])− [f(x, y), f(x, t), f(x, s)] ||) =

max(|| limn→∞

14n

f(2n[x, y, t], 2ns)− limn→∞

143n

[f(2nx, 2ns), f(2ny, 2ns), f(2nt, 2ns)]||,

|| limn→∞

14n

f(2nx, 2n[y, t, s])− limn→∞

143n

[f(2nx, 2ny), f(2nx, 2nt), f(2nx, 2ns)]||) =

limn→∞

143n

max(||f([2nx, 2ny, 2nt], 2ns)− [f(2nx, 2ns), f(2ny, 2ns), f(2nt, 2ns)]||,

||f(2nx, [2ny, 2nt, 2ns])− [f(2nx, 2ny), f(2nx, 2nt), f(2nx, 2ns)]||) ≤

limn→∞

143n

ϕ(23nx3, 23ny3, 23nt3, 23ns3) = 0.

So f([x, y, t], s) = [f(x, s), f(y, s), f(t, s)] and f(x, [y, t, s]) = [f(x, y), f(x, t), f(x, s)].

Therefore f is a bihomomorphism. On the other hand, by (5.3), we have

||f(x, y)− f(x∗, y∗)|| = limn→∞

14n||f(2nx, 2ny)− f((2nx)∗, (2ny)∗)|| ≤ 1

4nϕ(2nx, 2ny, 2nx, 2ny) = 0.

Hence f is ∗−bihomomorphism. The proof of other case is similar.

GORDJI, FAZELI: C*-TERNARY ALGEBRAS

254

Page 255: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Stability and superstability of bihomomorphisms and ... 11

Theorem 5.2. Let θ, p1, p2, p3, p4 be real numbers such that θ ≥ 0, p1 + p2 + p3 + p4 lie in (0, 2) [p1 + p2 + p3 +

p4 lie in (2,∞)]. Let A and B be two ternary C∗-algebras and f : A×A → B be a mapping satisfying

||f(x, y)− f(x∗, y∗)|| ≤ θ(||x||p1+p3 ||y||p2+p4),

||Eλ,µf(x, y, t, s)|| ≤ θ(||x||p1 ||y||p2 ||t||p3 ||s||p4),

max(||f([x, y, t], s)− [f(x, s), f(y, s), f(t, s)]||, ||f(x, [y, t, s])− [f(x, y), f(x, t), f(x, s)]||

≤ θ(||x3||p1 ||y3||p2 ||t3||p3 ||s3||p4),

limn→∞

14n

f(2nx, 2ny) = limn→∞

143n

f(23nx, 2ny) = limn→∞

143n

f(2nx, 23ny)

[ limn→∞

4nf(x

2n,

y

2n) = lim

n→∞43nf(

x

23n,

y

2n) = lim

n→∞43nf(

x

2n,

y

23n)]

for all x, y, t, s ∈ A and λ, µ ∈ T 114. Then f is a ∗−bihomomorphism.

Proof. It follows from Theorem 5.1 by putting ϕ(x, y, t, s) = θ(||x||p1 ||y||p2 ||t||p3 ||s||p4).

References

[1] J. H. Bae and W. G. Park, Approximate Bi-homomorphisms and Bi-derivations in C∗-ternary algebras, Bull.korean Math. Soc. 47(2010), No. 1, pp. 195-209.

[2] M. Bavand Savadkouhi, M. E. Gordji, J. M. Rassias and N. Ghobadipour, Approximate ternary Jordan deriva-tions on Banach ternary algebras, J. Math. Phys. 50, 042303 (2009), 9 pages.

[3] M. Bidkham, H. Soleyman Mazreji and M. E. Gordji, Hyers–Ulam stability of polynomial equations, Abstractand Applied Analysis, Art.ID: 754120, 7 pages.

[4] A. Cayley, On the 34 concomitants of the ternary cubic, Am. J. Math. 4 (1881).[5] Y.J. Cho, M. Eshaghi Gordji, S. Zolfaghari, Solutions and Stability of Generalized Mixed Type QC Functional

Equations in Random Normed Spaces, Journal of Inequalities and Applications Volume 2010, Article ID403101, 17 pages doi:10.1155/2010/403101.

[6] A. Ebadian, N. Ghobadipour, M. E. Gordji, A fixed point method for perturbation of bimultipliers and Jordanbimultipliers in C∗−ternary algebras, J. Math. Phys. 51, 1, 2010, 10 pages, doi:10.1063/1.3496391.

[7] A. Ebadian, A. Najati, M. E. Gordji, On approximate additive–quartic and quadratic–cubic functional equa-tions in two variables on abelian groups, Results Math. 58 (2010), no. 1-2, 39-53.

[8] M. Eshaghi Gordji, Nearly ring homomorphisms and nearly ring derivations on non-Archimedean Banachalgebras, Abs. Appl. Anal., Volume 2010, Article ID 393247, 12 pages, doi:10.1155/2010/393247.

[9] M. Eshaghi Gordji, Stability of a functional equation deriving from quartic and additive functions, Bull.Korean Math. Soc., Vol. 47, No.3, 2010, 491–502.

[10] M. Eshaghi Gordji, Stability of an additive-quadratic functional equation of two variables in F–spaces, Journalof Nonlinear Sciences and Applications, Vol 2, No 4,(2009) pp.251-259.

[11] M. Eshaghi Gordji, S. Abbaszadeh and C. Park, On the stability of generalized mixed type quadratic andquartic functional equation in quasi-Banach spaces, J. Ineq. Appl., Volume 2009 (2009), Article ID 153084, 26pages.

[12] M. Eshaghi Gordji and Z. Alizadeh, Stability and superstability of ring homomorphisms on non–ArchimedeanBanach algebras, Abstract and Applied Analysis, Vol. 2011, Article ID:123656, (2011), 10 pages.

[13] M. Eshaghi Gordji and M. Bavand Savadkouhi, On approximate cubic homomorphisms, Advances in differenceequations, Volume 2009, Article ID 618463, 11 pages, doi:10.1155/2009/618463.

[14] M. Eshaghi Gordji, M. Bavand Savadkouhi, M. Bidkham, C. Park and J.–R. Lee, Nearly Partial Derivationson Banach Ternary Algebras, Journal of Mathematics and Statistics 6 (4)(2010), 454–461.

[15] M. Eshaghi Gordji and A. Bodaghi, On the stability of quadratic double centralizers on Banach algebras, J.Comput. Anal. Appl. VOL. 13, NO.4, (2011) 724–729.

GORDJI, FAZELI: C*-TERNARY ALGEBRAS

255

Page 256: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

12 M. Eshaghi Gordji and A.Fazeli

[16] M. Eshaghi Gordji, A. Bodaghi and I.–A. Alias, On the stability of quadratic double centralizers and quadraticmultipliers: A fixed point approach, Journal of Inequalities and Applications, Vol. 2011, Article ID: 957541,(2011), 12 pages.

[17] M. Eshaghi Gordji, A. Ebadian and S. Zolfaghari, Stability of a functional equation deriving from cubic andquartic functions, Abs. Appl. Anal., Volume 2008, Article ID 801904, 17 pages.

[18] M. Eshaghi Gordji, M.B. Ghaemi, S. Kaboli Gharetapeh, S. Shams and A. Ebadian, On the stability ofJ∗−derivations, Journal of Geometry and Physics 60 (3) (2010) 454–459.

[19] M. Eshaghi Gordji, M. B. Ghaemi and H. Majani, Generalized Hyers-Ulam-Rassias Theorem in MengerProbabilistic Normed Spaces, Discrete Dynamics in Nature and Society, 2010, Article ID 162371, 11 pages.

[20] M. Eshaghi Gordji, M. B. Ghaemi, H. Majani and C. Park, Generalized Ulam-Hyers Stability of JensenFunctional Equation in erstnev PN Spaces, J. Ineq. Appl., 2010, Article ID 868193, 14 pages.

[21] M. Eshaghi Gordji and N. Ghobadipour, Generalized Ulam–Hyers stabilities of quartic derivations on Banachalgebras, Proyecciones Journal of Mathematics,Vol. 29, No 3, (2010), 209–224.

[22] M. Eshaghi Gordji and N. Ghobadipour, Stability of (α, β, γ)−derivations on Lie C∗−algebras, InternationalJournal of Geometric Methods in Modern Physics, Vol. 7, No. 7 (2010) 1-10, DOI: 10.1142/S0219887810004737.

[23] M. Eshaghi Gordji and F. Habibian, Hyers–Ulam–Rassias stability of quadratic derivations on Banach Alge-bras, Nonlinear Functional Analysis and Applications, Vol. 14, No. 5 (2009), 759–766.

[24] M. Eshaghi Gordji, S. Kaboli Gharetapeh, T. Karimi , E. Rashidi and M. Aghaei, Ternary Jordan derivationson C∗−ternary algebras, Journal of Computational Analysis and Applications, VOL.12, No.2, 2010, 463–470.

[25] M. Eshaghi Gordji, S. Kaboli-Gharetapeh, C. Park and S. Zolfaghri, Stability of an additive-cubic-quarticfunctional equation, Advances in Difference EquationsVolume 2009 (2009), Article ID 395693, 20 pages.

[26] M. Eshaghi Gordji, S Kaboli Gharetapeh, M. B. Savadkouhi, M. Aghaei and T. Karimi, On cubic derivations,Int. Journal of Math. Analysis, Vol. 4, 2010, no. 51, 2501–2514.

[27] M. Eshaghi Gordji, S. Kaboli Gharetapeh, J.M. Rassias and S. Zolfaghari, Solution and stability of a mixedtype additive, quadratic and cubic functional equation, Advances in difference equations, Volume 2009, ArticleID 826130, 17 pages,

[28] M. Eshaghi Gordji, T. Karimi, S. Kaboli Gharetapeh, Approximately n–Jordan homomorphisms on Banachalgebras, J. Ineq. Appl. Volume 2009, Article ID 870843, 8 pages.

[29] M. Eshaghi Gordji and H. Khodaei, Stability of Functional Equations, LAP LAMBERT Academic Publishing,2010.

[30] M. Eshaghi Gordji, H. Khodaei, On the Generalized Hyers–Ulam–Rassias Stability of Quadratic FunctionalEquations, Abs. Appl. Anal., Volume 2009, Article ID 923476, 11 pages.

[31] M. Eshaghi Gordji, H. Khodaei, Solution and stability of generalized mixed type cubic, quadratic and additivefunctional equation in quasi–Banach spaces, Nonlinear Analysis–TMA 71 (2009) 5629–5643.

[32] M. Eshaghi Gordji, H. Khodaei, The fixed point method for fuzzy approximation of a functional equationassociated with inner product spaces, Discrete Dynamics in Nature and Society Volume 2010, Article ID140767, 15 pages, doi:10.1155/2010/140767.

[33] M. Eshaghi Gordji, H. Khodaei and R. Khodabakhsh, General quartic–cubic–quadratic functional equation innon–Archimedean normed spaces, U.P.B. Sci. Bull., Series A, Vol. 72, Iss. 3, 2010, 69-84.

[34] M. Eshaghi Gordji, R. Khodabakhsh, S. M. Jung and H. Khodaei, AQCQ–functional equation innon–Archimedean normed spaces, Abs. Appl. Anal., Volume 2010, Article ID 741942, 22 pagesdoi:10.1155/2010/741942.

[35] M. Eshaghi Gordji and A. Najati, Approximately J∗-homomorphisms: A fixed point approach, Journal ofGeometry and Physics 60 (2010), 809–814.

[36] M. Eshaghi Gordji and M. S. Moslehian, A trick for investigation of approximate derivations, Math. Commun.15 (2010), no. 1, 99-105.

[37] M. Eshaghi Gordji, J.M. Rassias and N. Ghobadipour, Generalized Hyers–Ulam stability of the generalized(n, k)–derivations, Abs. Appl. Anal., Volume 2009, Article ID 437931, 8 pages.

GORDJI, FAZELI: C*-TERNARY ALGEBRAS

256

Page 257: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Stability and superstability of bihomomorphisms and ... 13

[38] M. Eshaghi Gordji and M. B. Savadkouhi, Approximation of generalized homomorphisms in quasi-Banachalgebras , Analele Univ. Ovidius Constata, Math series, Vol. 17(2), 2009, 203–214.

[39] M. Eshaghi Gordji and M. B. Savadkouhi, Stability of cubic and quartic functional equations in non-Archimedean spaces, Acta Appl. Math. 110 (2010) 1321-1329.

[40] M. Eshaghi Gordji and M. B. Savadkouhi, Stability of a mixed type cubic and quartic functional equations inrandom normed spaces , J. Ineq. Appl., Volume 2009 (2009), Article ID 527462, 9 pages.

[41] M. Eshaghi Gordji and M. B. Savadkouhi, Stability of a mixed type cubicquartic functional equation in non-Archimedean spaces, Appl. Math. Lett. 23, No.10, (2010), 1198-1202.

[42] M. Eshaghi Gordji, M. B. Savadkouhi and M. Bidkham, Stability of a mixed type additive and quadraticfunctional equation in non-Archimedean spaces, Journal of Computational Analysis and Applications, VOL.12,No.2, 2010, 454–462.

[43] M. Eshaghi Gordji, M. B. Savadkouhi and C. Park, Quadratic-quartic functional equations in RN-spaces , J.Ineq. Appl., Volume 2009 (2009), Article ID 868423, 14 pages.

[44] N. Ghobadipour, M. Eshaghi gordji, A. Ebadian and Th. M. Rassias, A perturbation of double derivations onBanach algebras, Commun. Math. Anal. 11, (2011) 1, pp. 51–60.

[45] M. E. Gordji, S. Zolfaghari , J. M. Rassias and M. B. Savadkouhi, Solution and Stability of a Mixed type Cubicand Quartic functional equation in Quasi-Banach spaces, Abs. Appl. Anal., Volume 2009, Art. ID 417473, 1-14.

[46] R. Farokhzad and S. A. R. Hosseinioun, Perturbations of Jordan higher derivations in Banach ternary algebras:An alternative fixed point approach, Int. J. Nonlinear Anal. Appl. 1 (2010),1, 42–53.

[47] P. Gavruta and L. Gavruta, A new method for the generalized Hyers-Ulam-Rassias stability, Int. J. NonlinearAnal. Appl. 1 (2010), 2, 11–18.

[48] A.Himbert, Comptes Rendus de l’Acad. Sci. Paris, (1985).[49] D. H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. 27 (1941) 222-224.[50] R. Kerner, The cubic chessboard: Geometry and physics, Class. Quantum Grav, 14, A203 (1997).[51] R. Kerner, Z3-graded algebras and the cubic root of the supersymmetry translations, J. Math. phys. 33(1),

403-411 (1992).[52] H. Khodaei and M. Kamyar, Fuzzy approximately additive mappings, Int. J. Nonlinear Anal. Appl. 1 (2010),2,

44–53.[53] H. Khodaei and Th. M. Rassias, Approximately generalized additive functions in several variables, Int. J.

Nonlinear Anal. Appl. 1 (2010),1, 22–41.[54] G. J. Murphy, C∗-Algebras and operator theory, Academic Press.Inc. 1990.[55] S. Okabo, Triple products and Yang-Baxter equation I& II. Octonionic and quaternionic triple systems, J.

Math. phys. 34(7), 3273-3291 (1993) and 34(7), 3292-3215.[56] C. Park, Approximate homomorphims on JB*-tribles , J. Math. Anal. Appl. 306 (2005) 375-381. MR2132907

(2005m:46113).[57] C. Park, Homomorphisms between Lie JC*-algebras and Cauchy-Rassias stability of Lie JC*-algebra deriva-

tions, J. Lie theory 15 (2005) 393-414. MR2147435 (2006b:17033).[58] C. Park, Homomorphisms between poisson JC∗-algebras, Bull. Braz. math. Soc. 36(2005).[59] C. Park, Isomorphisms between unital C*-algebras, J. Math. Anal. Appl. 307 (2005) 753-762. MR2142458

(2005k:46140).[60] C. Park, Lie *-homomorphisms between Lie C*-algebras and Lie *-derivations on Lie C*-algebras, J. Math.

Anal. Appl. 293 (2004) 419-434. MR2053888 (2005f:47092).[61] C. Park, A. Najati, Homomorphisms and derivations in C*-algebras, Abst. Appl. Anal. 2007(2007), Article

ID 80630. MR2302193 (2007m:46100).[62] C. Park and M. Eshaghi Gordji, Comment on Approximate ternary Jordan derivations on Banach ternary

algebras [Bavand Savadkouhi et al. J. Math. Phys. 50, 042303 (2009)], J. Math. Phys. 51, 044102 (2010);doi:10.1063/1.3299295 (7 pages).

GORDJI, FAZELI: C*-TERNARY ALGEBRAS

257

Page 258: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

14 M. Eshaghi Gordji and A.Fazeli

[63] Choonkil Park, M. Eshaghi Gordji and H. Khodaei, A fixed point approach to the Cauchy-Rassias stability ofgeneral Jensen type quadratic-quadratic mappings, Bull. Korean Math. Soc. 2010 47, 987–996.

[64] C. Park and A. Najati, Generalized additive functional inequalities in Banach algebras, Int. J. NonlinearAnal. Appl. 1 (2010),2, 54–62.

[65] C. Park and Th.M. Rassias, Isomorphisms in unital C∗-algebras, Int. J. Nonlinear Anal. Appl. 1 (2010),2,1–10.

[66] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 (1978)297-300.

[67] J. M. Rassias and H. M. Kim, Approximate homomorphisms and derivations between C∗-ternary algebras, J.Math. Phys. 49 (2008), no. 6, 063507, 10 pp. 46Lxx (39B82).

[68] J. J. Sylvester, Johns Hopkins Circ. Journ., 3 P.7(1883).[69] S. M. Ulam, Problems in Modern Mathematics, Chapter VI, science ed. Wiley, New York, 1940.[70] H. Zettl, A characterization of ternary rings of operators, Adv. Math. 48 (1983) 117-143. MR0700979

(84h:46093).

GORDJI, FAZELI: C*-TERNARY ALGEBRAS

258

Page 259: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Convergence of Complex General SingularIntegral Operators

George A. Anastassiou & Razvan A. Mezei

Department of Mathematical SciencesThe University of MemphisMemphis, TN 38152, [email protected]@memphis.edu

2010 Mathematics Subject Classication:Primary : 26A15, 26D15 , 41A17, 41A25, 41A35Secondary : 26A33, 41A28.

Key Words and Phrases: general singular integral, fractional singular in-tegral, trigonometric singular integral, modulus of smoothness, right and leftCaputo fractional derivatives, complex valued functions.

Abstract. In this article we study the general complex-valued sin-gular integral operators over the real line regarding their convergenceto the unit operator with rates in the Lp norm, 1 p 1: Therelated established inequalities involve the higher order Lp modulusof smoothness of the engaged function or its higher order deriva-tive. Also we study the complex-valued fractional general singularintegral operators on the real line, regarding their convergence tothe unit operator with rates in the uniform norm. The related es-tablished inequalities involve the higher order moduli of smoothnessof the associated right and left Caputo fractional derivatives of theengaged function.We nish with applications to trigonometric sin-gular integral operators. The related simultaneous approximationsare also studied extensively.

1 Convergence of Complex General Singular In-tegral Operators Background

We consider here complex valued Borel measurable functions f : R ! C suchthat f = f1 + if2; i :=

p1: Here f1; f2 : R! R are implied to be real valued

1

259

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,259-283,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 260: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Borel measurable functions.Let > 0 and be a Borel probability measure on R: For r 2 N and n 2 Z+

we put

j =

((1)rj

rj

jn; j = 1; : : : ; r;

1Pr

j=1 (1)rj r

j

jn; j = 0:

(1)

Here we study the convergence of smooth general singular integral operators

r;(f ;x) :=

Z 1

1

0@ rXj=0

jf(x+ jt)

1A d(t);8 > 0: (2)

Clearly by the denition of R.H.S.(2) we have

r;(f ;x) = r;(f1;x) + ir;(f2;x): (3)

We assume that r;(fj ;x) 2 R; 8x 2 R; j = 1; 2:

I) Let f1; f2 2 Cn(R); n 2 Z+ with the rth modulus of smoothness nite,i.e.

!r(f(n)ej ; h) := sup

jtjhkrtf

(n)ej (x)k1;x <1; (4)

h > 0; where

rtf(n)ej (x) :=

rXj=0

(1)rjr

j

f(n)ej (x+ jt); (5)

ej = 1; 2:We need to introduce

k :=rXj=1

jjk; k = 1; : : : ; n 2 N:

The integrals

ck; :=

Z 1

1tkd(t)

are assumed to be nite, k = 1; : : : ; n:

One notices easily that

jr;(f ;x) f(x)j jr;(f1;x) f1(x)j+ jr;(f2;x) f2(x)j (6)

also

kr;(f ;x) f(x)k1;x kr;(f1;x) f1(x)k1;x + kr;(f2;x) f2(x)k1;x ;

(7)

2

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

260

Page 261: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

and

kr;(f ;x) f(x)kp;x kr;(f1;x) f1(x)kp;x+kr;(f2;x) f2(x)kp;x ; p 1:(8)

Furthermore it holds

f (k)(x) = f(k)1 (x) + if

(k)2 (x); (9)

for all k = 1; : : : ; n:

2 Main Results

By using Theorem 9 of [1] we obtain

Theorem 1. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 Cn (R) ; n 2 Z+: Suppose thatZ 1

1jtjn

1 +

jtj

rd(t) <1:

Assume also that !r(f(n)j ; h) <1;8h > 0: Then r;(f ;x) f(x)

nXk=1

f (k)(x)

k!kck;

1;x

(10)

1

n!

Z 1

1jtjn

1 +

jtj

rd(t)

!r(f

(n)1 ; ) + !r(f

(n)2 ; )

:

When n = 0 the sum in L.H.S.(10) collapses.Proof. By Theorem 9 of [1] and (6), (7), (9) we get r;(f ;x) f(x)

nXk=1

f (k)(x)

k!kck;

1;x

=

"r;(f1;x) f1(x)

nXk=1

f(k)1 (x)

k!kck;

#

+i

"r;(f2;x) f2(x)

nXk=1

f(k)2 (x)

k!kck;

# 1;x

r;(f1;x) f1(x)

nXk=1

f(k)1 (x)

k!kck;

1;x

+

r;(f2;x) f2(x)nXk=1

f(k)2 (x)

k!kck;

1;x

3

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

261

Page 262: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

!r(f(n)1 ; )

n!

Z 1

1jtjn

1 +

jtj

rd(t)

+!r(f

(n)2 ; )

n!

Z 1

1jtjn

1 +

jtj

rd(t)

=1

n!

Z 1

1jtjn

1 +

jtj

rd(t)

!r(f

(n)1 ; ) + !r(f

(n)2 ; )

;

proving the claim.

The n = 0 case follows.

Corollary 2 (to Theorem 1). Let f : R ! C : f = f1 + if2: Here j = 1; 2:Let fj 2 C (R) : Suppose Z 1

1

1 +

jtj

rd(t) <1:

Assume also !r(fj ; h) <1;8h > 0: Then

kr;(f) fk1 Z 1

1

1 +

jtj

rd(t)

(!r(f1; ) + !r(f2; )) : (11)

In [4] we proved

Theorem 3([4]). Let g 2 Cn1(R), such that g(n) exists, n; r 2 N. Further-more suppose that for each x 2 R the function g(ej)(x + jt) 2 L1(R; ) as afunction of t ; for all ej = 0; 1; : : : ; n 1; j = 1; : : : ; r: Suppose that there existej;j 0, ej = 1; : : : ; n;j = 1; : : : ; r; with ej;j 2 L1(R; ) such that for eachx 2 R we have

jg(ej)(x+ jt)j ej;j(t); (12)

for almost all t 2 R, all ej = 1; : : : ; n; j = 1; 2; : : : ; r: Then g(ej)(x+jt) denesa integrable function with respect to t for each x 2 R, all ej = 1; : : : ; n;j = 1; : : : ; r, and

(r; (g;x))(ej)= r;

g(ej);x ; (13)

for all x 2 R, all ej = 1; : : : ; n:We present the following simultaneous approximation result.

Theorem 4. Let f : R ! C; such that f = f1 + if2: Here j = 1; 2: Let

fj 2 Cn+ (R) ; n; 2 Z+; and !r(f (n+ej)

j ; h) < 1;8h > 0; for ej = 0; 1; : : : ; :Suppose Z 1

1jtjn

1 +

jtj

rd(t) <1:

4

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

262

Page 263: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

We consider the assumptions of Theorem 3 valid regarding f1; f2 for n = :Then (r;(f ;x))(ej) f(ej)(x)

nXk=1

f(k+ej)(x)k!

kck;

1;x

1

n!

Z 1

1jtjn

1 +

jtj

rd(t)

!r(f

(n+ej)1 ; ) + !r(f

(n+ej)2 ; )

; (14)

for all ej = 0; 1; : : : ; : When n = 0 the sum in L.H.S.(14) collapses.Proof. Similar to Theorem 1 here, and based on Theorem 8 of [4].

II) Here let f1; f2 2 Cn(R) with f (n)1 ; f(n)2 2 Lp(R); 1 p < 1: We need

the rth Lp-modulus of smoothness

!r(f(n)ej ; h)p := sup

jtjhkrtf

(n)ej (x)kp;x; h > 0; with ej = 1; 2: (15)

Here we assume that !r(f(n)ej ; h)p <1; h > 0; ej = 1; 2:

We present

Theorem 5. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 Cn (R) with f (n)j 2 Lp (R) ; n 2 N; p; q > 1 : 1p +

1q = 1: Assume thatZ 1

1

"1 +

jtj

rp+1 1#jtjnp1 d(t) <1;

and ck; 2 R; k = 1; : : : ; n: Then r;(f ;x) f(x)nXk=1

f (k)(x)

k!kck;

p;x

1

((n 1)!)(q(n 1) + 1)1q (rp+ 1)

1p

"Z 1

1

1 +

jtj

rp+1 1!jtjnp1 d(t)

# 1p

1p

!r(f

(n)1 ; )p + !r(f

(n)2 ; )p

: (16)

Proof. By Theorem 1 of [2] and (6), (8), (9) we get r;(f ;x) f(x)nXk=1

f (k)(x)

k!kck;

p;x

=

"r;(f1;x) f1(x)

nXk=1

f(k)1 (x)

k!kck;

#

5

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

263

Page 264: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

+i

"r;(f2;x) f2(x)

nXk=1

f(k)2 (x)

k!kck;

# p;x

r;(f1;x) f1(x)

nXk=1

f(k)1 (x)

k!kck;

p;x

+

r;(f2;x) f2(x)nXk=1

f(k)2 (x)

k!kck;

p;x

R:H:S(16);

proving the claim.

Based on Proposition 3 of [2], similarly we give

Proposition 6. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ Lp (R)) ; p; q > 1 : 1p +

1q = 1: Assume thatZ 1

1

1 +

jtj

rpd(t) <1:

Then

kr;(f) fkp Z 1

1

1 +

jtj

rpd(t)

1p

(!r(f1; )p + !r(f2; )p) : (17)

Based on Theorem 2 of [2] we get similarly

Theorem 7. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 Cn (R) with f (n)j 2 L1 (R) ; n 2 N: Assume thatZ 1

1

"1 +

jtj

r+1 1#jtjn1 d(t) <1;

and ck; 2 R; k = 1; : : : ; n: Then r;(f ;x) f(x)nXk=1

f (k)(x)

k!kck;

1;x

1

(n 1)! (r + 1)

"Z 1

1

1 +

jtj

r+1 1!jtjn1 d(t)

#(18)

!r(f

(n)1 ; )1 + !r(f

(n)2 ; )1

:

Based on Proposition 4 of [2], we give similarly

6

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

264

Page 265: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Proposition 8. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ L1 (R)) : AssumeZ 1

1

1 +

jtj

rd(t) <1:

Then

kr;(f) fk1 Z 1

1

1 +

jtj

rd(t)

(!r(f1; )1 + !r(f2; )1) : (19)

Next we give simultaneous approximation results.

Theorem 9. Let f : R ! C; such that f = f1 + if2: Here j = 1; 2: Let

fj 2 Cn+ (R) ; n 2 N; 2 Z+; with f (n+ej)

j 2 Lp (R) ; ej = 0; 1; : : : ; : Let

p; q > 1 : 1p +1q = 1: Assume that

R11

1 + jtj

rp+1 1jtjnp1 d(t) <1;

and ck; 2 R; k = 1; : : : ; n: We consider the assumptions of Theorem 3 validregarding f1; f2 for n = : Then (r;(f ;x))(ej) f (ej)(x)

nXk=1

f (k+ej)(x)k!

kck;

p;x

1

((n 1)!)

1

(q(n 1) + 1)1q (rp+ 1)

1p

!r(f

(n+ej)1 ; )p + !r(f

(n+ej)2 ; )p

"Z 1

1

1 +

jtj

rp+1 1!jtjnp1 d(t)

# 1p

1p ; (20)

for all ej = 0; 1; : : : ; :Proof. By Theorem 11 of [4], and as in the proof of Theorem 5 here.

We give the related

Proposition 10. Let f : R ! C; such that f = f1 + if2: Let f(ej)1 ; f

(ej)2 2

(C (R) \ Lp (R)) ; ej = 0; 1; : : : ; 2 Z+; p; q > 1 : 1p + 1q = 1: Assume thatZ 1

1

1 +

jtj

rpd(t) <1:

We consider the assumptions of Theorem 3 valid regarding f1; f2 for n = :Then (r;(f))(ej) f(ej)

p

Z 1

1

1 +

jtj

rpd(t)

1p !r(f

(ej)1 ; )p + !r(f

(ej)2 ; )p

; (21)

7

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

265

Page 266: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

ej = 0; 1; : : : ; :Proof. By Proposition 12 of [4].

Next comes the related L1 result.

Theorem 11. Let f : R ! C; such that f = f1 + if2; and j = 1; 2: Let

f1; f2 2 Cn+ (R) ; with f (n+ej)

j 2 L1 (R) ; n 2 N; ej = 0; 1; : : : ; 2 Z+: Assumethat Z 1

1

1 +

jtj

r+1 1!jtjn1d(t) <1;

and ck; 2 R; k = 1; : : : ; n: We consider the assumptions of Theorem 3 validregarding f1; f2 for n = : Then (r;(f ;x))(ej) f(ej)(x)

nXk=1

f(k+ej)(x)k!

kck;

1;x

1

(n 1)! (r + 1)

"Z 1

1

1 +

jtj

r+1 1!jtjn1d(t)

# (22)

!r(f

(n+ej)1 ; )1 + !r(f

(n+ej)2 ; )1

;

for all ej = 0; 1; : : : ; :Proof. Based on Theorem 15 of [4].

The last simultaneous approximation result follows

Proposition 12. Let f : R ! C; such that f = f1 + if2: Here f(j)1 ; f

(j)2 2

(C (R) \ L1 (R)) ; j = 0; 1; : : : ; 2 Z+: AssumeZ 1

1

1 +

jtj

rd(t) <1:

We consider the assumptions of Theorem 3 valid regarding f1; f2 for n = :Then (r;(f))(j) f (j)

1Z 1

1

1 +

jtj

rd(t)

!r(f

(j)1 ; )1 + !r(f

(j)2 ; )1

;

(23)for all j = 0; 1; : : : ; :Proof. Based on Proposition 16 of [4].

III) We need

Denition 13. Let r 2 N; > 0: We dene

j =

((1)rj

rj

j ; j = 1; : : : ; r;

1Pr

j=1 (1)rj r

j

j ; j = 0:

(24)

8

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

266

Page 267: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Denote

k =rXj=1

jjk; k = 1; : : : ;m 1; (25)

where m = d e ; de is the ceiling of a number:

In the next let > 0; x; x0 2 R; f : R ! C Borel measurable, such that

f = f1 + if2: Suppose f1; f2 2 Cm (R) ; with f (m)1

1<1;

f (m)2

1<1:

Let probability Borel measure on R; 8 > 0: Consider the fractionalintegral

r;(f ;x) : =

Z 1

1

0@ rXj=0

jf(x+ jt)

1A d(t) (26)

=

Z 1

1

0@ rXj=0

jf1(x+ jt)

1A d(t) + iZ 1

1

0@ rXj=0

jf2(x+ jt)

1A d(t)= r;(f1;x) + ir;(f2;x):

We assume here that r; (f1; x) ;r; (f2; x) 2 R; 8x 2 R:Assume existence of ck; :=

R11 t

kd(t); k = 1; : : : ;m 1: Also supposethe existence of

R11 jtj

+kd(t); k = 0; 1; : : : ; r:

Using Theorem 18 of [3], we obtain similarly, as in Theorem 1 here, the nextresult.

Theorem 14. It holds r; (f; ) f ()m1Xk=1

f (k)()k!

kck;

1

"

rXk=0

r!

(r k)! ( + k + 1) kZ 1

1jtj +k d(t)

#

supx2R

max

!rD xf1;

; !r (D

xf1; )

(27)

+supx2R

max

!rD xf2;

; !r (D

xf2; )

:

If m = 1 the sum disappears in L.H.S.(27):

Denition 15 (for Theorem 14). Let j = 1; 2: Above D x0fj is the right

Caputo fractional derivative of order > 0 is given by

D x0fj(x) :=

(1)m

(m )

Z x0

x

( x)m 1 f (m)j ()d; (28)

9

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

267

Page 268: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

8x x0 2 R xed:We assume D

x0f(x) = 0;8x > x0:

Also D x0fj is the left Caputo fractional derivative of order > 0 is given

by

D x0fj(x) :=

1

(m )

Z x

x0

(x t)m 1 f (m)j (t)dt; (29)

8x x0 2 R xed, where () =R10ett1dt; > 0:

We assume D x0fj(x) = 0; for x < x0:

3 Convergence of Complex Trigonometric Sin-gular Integral Operators

In this section we apply the general theory of this article to the complex-valuedtrigonometric smooth general singular integral operator Tr;(f; x) dened below.We make

Remark 16. We need the following preliminary result.Let j;m 2 Z; m 1 such that 0 j < 2m 1: The integralZ 1

1xjsinx

x

2mdx =

2R10xjsin xx

2mdx; if j is even

0; if j is odd; (30)

is an (absolutely) convergent integral (See also Note 17).

According to [5], page 210, item 1033, we obtaincase 1: j is even, j < 2m 1Z 1

0

xjsinx

x

2mdx =

(1) 2mj2 (2m)!

2j+1(2m j 1)!

mXk=1

(1)k k2mj1

(m k)!(m+ k)! ; (31)

andcase 2: j is odd, j < 2m 1Z 1

0

xjsinx

x

2mdx =

(1)j12 (2m)!

2j (2m j 1)!

mXk=1

(1)mk k2mj1 [ln (2k)]

(m k)!(m+ k)! : (32)

In particular, for j = 0 the formula (31) becomesZ 1

0

sinx

x

2mdx = (1)mm

mXk=1

(1)k k2m1

(m k)!(m+ k)! : (33)

10

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

268

Page 269: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

We consider here complex valued Borel measurable functions f : R ! Csuch that f = f1 + if2; i :=

p1:

Let 2 N and > 0: Here we study the convergence of smooth trigonometricsingular integral operators

Tr;(f ;x) :=1

W

Z 1

1

0@ rXj=0

jf(x+ jt)

1A sin (t=)t

2dt; (34)

where

W =

Z 1

1

sin (t=)

t

2dt

= 212Z 1

0

sin t

t

2dt (35)

(33)= 212(1)

Xk=1

(1)k k21

( k)!( + k)! :

Clearly by the denition of R.H.S.(34) we have

Tr;(f ;x) = Tr;(f1;x) + iTr;(f2;x): (36)

We assume that Tr;(fj ;x) 2 R; 8x 2 R; j = 1; 2:

Let bc denote the integer part of a real number and let

ck; :=1

W

Z 1

1tksin (t=)

t

2dt; k = 1; : : : ; n: (37)

Note 17. As in the proof of Theorem 6 from [2], inequality (54) there, for

> k+12 we have Z 1

0

tksin t

t

2dt <1: (38)

Hence

ck; =1

Wk+12

Z 1

1tksin t

t

2dt

(35)=

8<:kR10tk( sin tt )

2dtR1

0 (sin tt )

2dt; k = even

0; k = odd

< 1; (39)

for any k such that > k+12 :

11

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

269

Page 270: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

I) Let f1; f2 2 Cn(R); n 2 Z+ with the rth modulus of smoothness nite,i.e. !r(f

(n)ej ; h) <1; h > 0 and let 2 N; > n+12 :

One notices easily that

jTr;(f ;x) f(x)j jTr;(f1;x) f1(x)j+ jTr;(f2;x) f2(x)j (40)

also

kTr;(f ;x) f(x)k1;x kTr;(f1;x) f1(x)k1;x + kTr;(f2;x) f2(x)k1;x ;

(41)and

kTr;(f ;x) f(x)kp;x kTr;(f1;x) f1(x)kp;x+kTr;(f2;x) f2(x)kp;x ; p 1:(42)

By using Theorem 14 of [1] we obtain

Theorem 18. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Let fj 2Cn (R) ; n 2 Z+ and 1 +

n+r+1

2

: Assume also !r(f

(n)j ; h) < 1;8h > 0:

Then Tr;(f ;x) f(x)bn=2cXk=1

f (2k)(x)

(2k)!2kc2k;

1;x

1

(1)hP

k=1(1)k k21

(k)!(+k)!

i"Z 1

0

tn (1 + t)r

sin t

t

2dt

#!r(f

(n)1 ; ) + !r(f

(n)2 ; )

nn!: (43)

When n = 0; 1 the sum in L.H.S.(43) collapses.Proof. By Theorem 14 of [1] and (40), (41), (9), similar to the proof of Theorem1.

The n = 0 case follows.

Corollary 19 (to Theorem 18). Let f : R! C : f = f1 + if2: Here j = 1; 2:Let fj 2 C (R) and 1 +

r+12

: Assume also !r(fj ; h) <1;8h > 0: Then

kTr;(f) fk1

hR10(1 + t)

r sin tt

2dti

(1)hP

k=1(1)k k21

(k)!(+k)!

i (!r(f1; ) + !r(f2; )) :(44)

In [4] we mentioned

Theorem 20 ([4, Theorem 22 there]). Let g 2 Cn1(R), such that g(n) exists,n; r 2 N. Furthermore suppose that for each x 2 R the function g(

ej)(x +12

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

270

Page 271: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

jt) 2 L1

R;sin(t=)

t

2dt

as a function of t ; for all ej = 0; 1; : : : ; n 1;

j = 1; : : : ; r: Suppose that there exist ej;j 0, ej = 1; : : : ; n; j = 1; : : : ; r; with

ej;j 2 L1R;sin(t=)

t

2dt

such that for each x 2 R we have

jg(ej)(x+ jt)j ej;j(t); (45)

for almost every t 2 R, all ej = 1;: : : ; n; j = 1; 2; : : : ; r: Then g(ej)(x+ jt) denesa Lebesgue integrable function with respect to t for each x 2 R, all ej = 1; : : : ; n;j = 1; : : : ; r, and

(Tr; (f ;x))(ej)= Tr;

f (ej);x ; (46)

for all x 2 R, all ej = 1; : : : ; n.We present the following simultaneous approximation result.

Theorem 21. Let f : R ! C; such that f = f1 + if2: Here j = 1; 2: Let fj 2Cn+ (R) ; n; 2 Z+; 2 N; 1 +

r+n+1

2

and !r(f

(n+ej)j ; h) < 1;8h > 0;

for ej = 0; 1; : : : ; : We consider the assumptions of Theorem 20 valid regardingf1; f2 for n = : Then (Tr;(f ;x))(ej) f(ej)(x)

bn=2cXk=1

f(2k+ej)(x)

(2k)!2kc2k;

1;x

n

n!

hR10tn (1 + t)

r sin tt

2dti

hR10

sin tt

2dti

!r(f(n+ej)1 ; ) + !r(f

(n+ej)2 ; )

; (47)

for all ej = 0; 1; : : : ; : When n = 0; 1 the sum in L.H.S.(47) collapses.Proof. Similar to Theorem 4 here, and based on Theorem 27 of [4].

II) Here let f1; f2 2 Cn(R) with f (n)1 ; f(n)2 2 Lp(R); 1 p <1: We assume

that !r(f(n)ej ; h)p <1; h > 0; ej = 1; 2:

We present

Theorem 22. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Let fj 2Cn (R) with f (n)j 2 Lp (R) ; n 2 N; p; q > 1 : 1p +

1q = 1; 2 N; >

drpe+np+12 :

Then Tr;(f ;x) f(x)bn=2cXk=1

f (2k)(x)

(2k)!2kc2k;

p;x

13

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

271

Page 272: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

24 1R10

sin tt

2dt drpe+1X

h=1

Z 1

0

tnp1+hsin t

t

2dt

35 1p

(48)

n

((n 1)!)(q(n 1) + 1)1q (rp+ 1)

1p

!r(f

(n)1 ; )p + !r(f

(n)2 ; )p

:

When n = 0; 1 the sum in L.H.S.(48) collapses.Proof. By Theorem 6 of [2] and (40), (42), (9), similar to Theorem 5 here.

Based on Proposition 8 of [2], similarly we give

Proposition 23. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ Lp (R)) ; p; q > 1 : 1p +

1q = 1; 2 N; >

drpe+12 :Then

kTr;(f) fkp

24 1R10

sin tt

2dt

drpeXh=0

Z 1

0

thsin t

t

2dt

35 1p

(!r(f1; )p + !r(f2; )p) :

(49)

Based on Theorem 7 of [2] we get similarly

Theorem 24. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 Cn (R) with f (n)j 2 L1 (R) ; n 2 N; 2 N; > r+1+n

2 : Then Tr;(f ;x) f(x)bn=2cXk=1

f (2k)(x)

(2k)!2kc2k;

1;x

(50)

n!r(f

(n)1 ; )1 + !r(f

(n)2 ; )1

(n 1)! (r + 1)

hR10

sin tt

2dti r+1Xh=1

"Z 1

0

tn1+hsin t

t

2dt

#:

When n = 0; 1 the sum in L.H.S.(50) collapses.

Based on Proposition 9 of [2], we give similarly

Proposition 25. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ L1 (R)) ; 2 N; > r+1

2 : Then

kTr;(f) fk1 (!r(f1; )1 + !r(f2; )1)hR1

0

sin tt

2dti rX

h=0

"Z 1

0

thsin t

t

2dt

#: (51)

Next we give simultaneous approximation results.

14

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

272

Page 273: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Theorem 26. Let f : R ! C; such that f = f1 + if2: Here j = 1; 2: Let

fj 2 Cn+ (R) ; n 2 N; 2 Z+; with f (n+ej)

j 2 Lp (R) ; ej = 0; 1; : : : ; : Let

p; q > 1 : 1p +1q = 1; 2 N; > drpe+np+1

2 : We consider the assumptions ofTheorem 20 valid regarding f1; f2 for n = : Then (Tr;(f ;x))(ej) f (ej)(x)

bn=2cXk=1

f (2k+ej)(x)

(2k)!2kc2k;

p;x

1

((n 1)!)

1

(q(n 1) + 1)1q (rp+ 1)

1p

!r(f

(n+ej)1 ; )p + !r(f

(n+ej)2 ; )p

24 1hR10

sin tt

2dti drpe+1X

h=1

Z 1

0

tnp1+hsin t

t

2dt

35 1p

n; (52)

for all ej = 0; 1; : : : ; : When n = 0; 1 the sum in L.H.S.(52) collapses.Proof. By Theorem 30 of [4], and as in the proof of Theorem 5 here.

We give the related

Proposition 27. Let f : R ! C; such that f = f1 + if2: Let f(ej)1 ; f

(ej)2 2

(C (R) \ Lp (R)) ; ej = 0; 1; : : : ; 2 Z+; p; q > 1 : 1p + 1q = 1; 2 N; >

drpe+12 :

We consider the assumptions of Theorem 20 valid regarding f1; f2 for n = :Then

(Tr;(f))(ej) f(ej) p

24Pdrpeh=0

R10thsin tt

2dthR1

0

sin tt

2dti

35 1p !r(f

(ej)1 ; )p + !r(f

(ej)2 ; )p

;

(53)ej = 0; 1; : : : ; :Proof. By Proposition 31 of [4].

Next comes the related L1 result.

Theorem 28. Let f : R ! C; such that f = f1 + if2; and j = 1; 2: Let

f1; f2 2 Cn+ (R) ; with f (n+ej)

j 2 L1 (R) ; n 2 N; ej = 0; 1; : : : ; 2 Z+; 2 N; > r+n+1

2 : We consider the assumptions of Theorem 20 valid regarding f1; f2for n = : Then (Tr;(f ;x))(ej) f(ej)(x)

bn=2cXk=1

f(2k+ej)(x)

(2k)!2kc2k;

1;x

1

(n 1)! (r + 1)hR10

sin tt

2dti "r+1X

h=1

Z 1

0

tn1+hsin t

t

2dt

#n (54)

!r(f

(n+ej)1 ; )1 + !r(f

(n+ej)2 ; )1

;

15

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

273

Page 274: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

for all ej = 0; 1; : : : ; : When n = 0; 1 the sum in L.H.S.(54) collapses.Proof. Based on Theorem 34 of [4].

The last simultaneous approximation result follows

Proposition 29. Let f : R ! C; such that f = f1 + if2: Here f(j)1 ; f

(j)2 2

(C (R) \ L1 (R)) ; j = 0; 1; : : : ; 2 Z+; 2 N; > r+12 : We consider the

assumptions of Theorem 20 valid regarding f1; f2 for n = : Then (Tr;(f))(j) f (j) 1 1hR1

0

sin tt

2dti " rX

h=0

Z 1

0

thsin t

t

2dt

#(55)

!r(f

(j)1 ; )1 + !r(f

(j)2 ; )1

;

for all j = 0; 1; : : : ; :Proof. Based on Proposition 35 of [4].

III) In the next let > 0; x; x0 2 R; f : R! C Borel measurable, such thatf = f1 + if2: Suppose f1; f2 2 Cm (R) ; with

f (m)1

1<1;

f (m)2

1<1:

Consider the fractional integral

T r;(f ;x) : =1

W

Z 1

1

0@ rXj=0

jf(x+ jt)

1A sin (t=)t

2dt (56)

=1

W

Z 1

1

0@ rXj=0

jf1(x+ jt)

1A sin (t=)t

2dt

+i

W

Z 1

1

0@ rXj=0

jf2(x+ jt)

1A sin (t=)t

2dt

= T r;(f1;x) + iT r;(f2;x):

We assume here that T r; (f1; x) ; T r; (f2; x) 2 R; 8x 2 R:Let 2 N; > +r+1

2 ; > 0; r 2 N:

Using Theorem 23 of [3], we obtain similarly, as in Theorem 1 here, the nextresult.

Theorem 30. It holds T r; (f; ) f ()bm1

2 cXk=1

f (2k)()(2k)!

2kc2k;

1

"

rXk=0

r!

(r k)! ( + k + 1)

R10t +k

sin tt

2dtR1

0

sin tt

2dt

#

16

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

274

Page 275: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

supx2R

max

!rD xf1;

; !r (D

xf1; )

(57)

+supx2R

max

!rD xf2;

; !r (D

xf2; )

:

If m = 1; 2 the sum disappears in L.H.S.(57):

4 Applications to Particular Complex Trigono-metric Singular Operators

In this section we work on the approximation results given in the previoussection, for some particular values of r; n; p and :

Case = 2: We have the following resultsTheorem 31. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 C1(R): Assume !r(f 0j ; h) <1;8h > 0: Then

kT1;(f) fk1 3

hln 2 +

4

i(!1(f

01; ) + !1(f

02; )) : (58)

Proof. By Theorem 18, with n = r = 1; = 2:

Corollary 32. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ L1 (R)) : Then

kT1;(f) fk1 (!1(f1; )1 + !1(f2; )1)3 ln 2

+ 1

: (59)

Proof. By Proposition 25, with r = 1; = 2.

Corollary 33. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 C1 (R) with f 0j 2 L1(R). Then

kT1;(f ;x) f(x)k1 3

2

ln 2 +

4

(!1(f

01; )1 + !1(f

02; )1) : (60)

Proof. By Theorem 24, with r = n = 1; = 2.

Corollary 34. Let f : R ! C; such that f = f1 + if2: Here j = 1; 2: Let

fj 2 C1+ (R) ; 2 Z+ and !1(f (1+ej)

j ; h) < 1;8h > 0; for ej = 0; 1; : : : ; : Weconsider the assumptions of Theorem 20 valid regarding f1; f2 for n = : Then (T1;(f ;x))(ej) f(ej)(x)

1;x 3

ln 2 +

4

!1(f

(1+ej)1 ; ) + !1(f

(1+ej)2 ; )

;

(61)for all ej = 0; 1; : : : ; :

17

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

275

Page 276: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Proof. We are applying Theorem 21 here for n = r = 1; = 2.

Corollary 35. Let f : R ! C; such that f = f1 + if2; and j = 1; 2: Letf1; f2 2 C1+(R) and f (ej+1) 2 L1(R); ej = 0; 1; : : : ; 2 Z+: We consider theassumptions of Theorem 20 valid regarding f1; f2 for n = : Then

k (T1;(f ;x))(ej) f(ej)(x)k1 3

2

ln 2 +

4

!1(f

(1+ej)1 ; )1 + !1(f

(1+ej)2 ; )1

;

(62)for all ej = 0; 1; : : : ; :Proof. We are applying Theorem 28 here for n = r = 1; = 2.

Corollary 36. Let f : R ! C; such that f = f1 + if2: Let f(ej)1 ; f

(ej)2 2

(C(R) \ L2 (R)) ; ej = 0; 1; : : : ; 2 Z+;We consider the assumptions of Theorem20 valid regarding f1; f2 for n = . Then

k (T1;(f))(ej) f(ej)k2 !1(f (ej)1 ; )2 + !1(f

(ej)2 ; )2

r74+3

ln 2: (63)

for all ej = 0; 1; : : : :Proof. By Proposition 27, with p = 2; r = 1; = 2.

Corollary 37. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ L2 (R)) : Then

kT1;(f) fk2 (!1(f1; )2 + !1(f2; )2)r7

4+3

ln 2: (64)

Proof. By Proposition 23, with p = 2; r = 1; = 2.

Corollary 38. Let f : R ! C; such that f = f1 + if2: Here f(j)1 ; f

(j)2 2

(C(R) \ L1 (R)) ; j = 0; 1; : : : ; 2 Z+;We consider the assumptions of Theorem20 valid regarding f1; f2 for n = : Then

k (T1;(f))(j) f (j)k1 !1(f

(j)1 ; )1 + !1(f

(j)2 ; )1

3 ln 2

+ 1

; (65)

for all j = 0; 1; : : : :Proof. By Proposition 29, with r = 1; = 2.

Corollary 39. Let f : R ! C; such that f = f1 + if2: Here f(j)1 ; f

(j)2 2

(C(R) \ L1 (R)) ; j = 0; 1; : : : ; 2 Z+;We consider the assumptions of Theorem20 valid regarding f1; f2 for n = : Then

k (T2;(f))(j) f (j)k1 !2(f

(j)1 ; )1 + !2(f

(j)2 ; )1

74+3

ln 2

; (66)

for all j = 0; 1; : : : :

18

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

276

Page 277: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Proof. By Proposition 29, with r = = 2.

Corollary 40. Consider the assumptions of Theorem 30 are fullled. Then

T 1; (f; ) f () 1 56p2 1615

!12

supx2R

nmax

h!1

D

12xf1;

; !1

D

12xf1;

io(67)

+supx2R

nmax

h!1

D

12xf2;

; !1

D

12xf2;

io:

Proof. By Theorem 30, with = 2; = 12 ; r = 1 :

Case = 3: We have the following resultsCorollary 41. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ L1 (R)) : Then

kT2;(f) fk1 (!2(f1; )1 + !2(f2; )1) 40

11ln

32716

4

!+16

11

!: (68)

Proof. By Proposition 25, with r = 2; = 3.

Corollary 42. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ L1 (R)) : Then

kT3;(f)fk1 (!3(f1; )1 + !3(f2; )1) 40

11ln

32716

4

!+16

11+15

22ln256

27

!:

(69)Proof. By Proposition 25, with r = 3; = 3.

Corollary 43. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 C1 (R) with f 0j 2 L2 (R) : Then

kT1;(f ;x) f(x)k2 r

5

22ln256

27+25

66

! (!1(f

01; )2 + !1(f

02; )2) : (70)

Proof. By Theorem 22, with p = 2; r = n = 1; = 3.

Corollary 44. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ L2 (R)) : Then

kT2;(f) fk2 (!2(f1; )2 + !2(f2; )2)

vuut 40

11ln

32716

4

!+15

22ln256

27+47

22:

(71)

19

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

277

Page 278: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Proof. By Proposition 23, with p = r = 2; = 3.

Corollary 45. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 C1 (R) with f 0j 2 L1(R): Then

kT1;(f ;x)f(x)k1 20

11ln

32716

4

!+5

22

! (!1(f

01; )1 + !1(f

02; )1) : (72)

Proof. By Theorem 24, with r = n = 1; = 3.

Corollary 46. f : R! C such that f = f1+if2: Here j = 1; 2: Let fj 2 C2 (R)with f 00j 2 L1(R): Then

kT2;(f ;x)f(x)f 00(x)

22c2;k1

25

66+

5

22ln256

27

2 (!2(f

001 ; )1 + !2(f

002 ; )1) :

(73)Proof. By Theorem 24, with r = n = 2; = 3.

Corollary 47. Let f : R! C; such that f = f1+ if2: Here j = 1; 2: Let fj 2C1+(R); 2 Z+: Assume also !1(f (1+

ej)j ; h) < 1;8h > 0; for ej = 0; 1; : : : ; :

We consider the assumptions of Theorem 20 valid regarding f1; f2 for n = :Then (T1;(f ;x))(ej) f(ej)(x)

1;x 5

22[2 32 ln 2 + 27 ln 3] (74)

!1(f

(1+ej)1 ; ) + !1(f

(1+ej)2 ; )

;

for all ej = 0; 1; : : : ; :Proof. We are applying Theorem 21 here for n = r = 1; = 3.

Corollary 48. Let f : R ! C; such that f = f1 + if2: Here j = 1; 2: Let

fj 2 C(R); 2 Z+: Assume also !3(f (ej)j ; h) < 1;8h > 0; for ej = 0; 1; : : : ; :

We consider the assumptions of Theorem 20 valid regarding f1; f2 for n = :Then (T1;(f ;x))(ej) f(ej)(x)

1;x 2

11[13 90 ln 2 + 90 ln 3] (75)

!3(f

(ej)1 ; ) + !3(f

(ej)2 ; )

;

for all ej = 0; 1; : : : ; :Proof. We are applying Theorem 21 here for n = 0; r = 3; = 3.

Corollary 49. Let f : R ! C; such that f = f1 + if2: Here j = 1; 2: Let

fj 2 C1+ (R) ; with f (1+ej)

j 2 L2(R); ej = 0; 1; : : : 2 Z+: We consider the

20

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

278

Page 279: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

assumptions of Theorem 20 valid regarding f1; f2 for n = : Then

k (T1;(f ;x))(ej) f(ej)(x)k2

r5

22ln256

27+25

66

!(76)

!1(f

(1+ej)1 ; )2 + !1(f

(1+ej)2 ; )2

;

for all ej = 0; 1; : : : ; :Proof. By Theorem 26, with p = 2; r = n = 1; = 3.

Corollary 50. Let f : R ! C; such that f = f1 + if2; and j = 1; 2: Let

f1; f2 2 C2+ (R) ; with f (2+ej)

j 2 L1(R); ej = 0; 1; : : : 2 Z+: We consider theassumptions of Theorem 20 valid regarding f1; f2 for n = : Then

k (T2;(f ;x))(ej) f(ej)(x) + 5

222f(

ej+2)(x)k1 25

66+

5

22ln256

27

2!2(f

(2+ej)1 ; )1 + !2(f

(2+ej)2 ; )1

; (77)

for all ej = 0; 1; : : : ; :Proof. By Theorem 28, with r = n = 2; = 3.

Corollary 51. Let f : R ! C; such that f = f1 + if2: Let f(ej)1 ; f

(ej)2 2

(C(R) \ L2 (R)) ; ej = 0; 1; : : : ; 2 Z+;We consider the assumptions of Theorem20 valid regarding f1; f2 for n = : Then

k (T2;(f))(ej) f(ej)k2 !2(f (ej)1 ; )2 + !2(f

(ej)2 ; )2

vuut 40

11ln

32716

4

!+15

22ln256

27+47

22: (78)

for all ej = 0; 1; : : : ; .Proof. By Proposition 27, with p = r = 2; = 3.

Corollary 52. Let f : R ! C; such that f = f1 + if2: Here f(j)1 ; f

(j)2 2

(C(R) \ L1 (R)) ; j = 0; 1; : : : ; 2 Z+;We consider the assumptions of Theorem20 valid regarding f1; f2 for n = : Then

k (T1;(f))(j) f (j)k1 !1(f

(j)1 ; )1 + !1(f

(j)2 ; )1

1 +

40

11ln

32716

4

!!;

(79)for all j = 0; 1; : : : ; :Proof. By Proposition 29, with r = 1; = 3.

Corollary 53. Consider the assumptions of Theorem 30 are fullled. Then

21

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

279

Page 280: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

T 2; (f; ) f () 1 64

1155

95 + 252

p2 127

p3

32

supx2R

nmax

h!2

D

32xf1;

; !2

D

32xf1;

io+supx2R

nmax

h!2

D

32xf2;

; !2

D

32xf2;

io:(80)

Proof. By Theorem 30, with = 3; = 32 ; r = 2:

Case = 4: We have the following resultsCorollary 54. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ L1 (R)) : Then

kT1;(f) fk1 (!1(f1; )1 + !1(f2; )1)1 +

630

151ln2104=15

381=20

: (81)

Proof. By Proposition 25, with r = 1; = 4.

Corollary 55. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 C1 (R) with f 0j 2 L2 (R) : Then

kT1;(f ;x) f(x)k2 s

35

151+210

151ln

327=8

32

! (!1(f

01; )2 + !1(f

02; )2) :

(82)Proof. By Theorem 22, with p = 2; r = n = 1; = 4.

Corollary 56. Let f : R ! C such that f = f1 + if2; where f1; f2 2(C (R) \ L2 (R)) : Then

kT2;(f) fk2 (!2(f1; )2 + !2(f2; )2)r630

151ln229=15

327=40+256

151: (83)

Proof. By Proposition 23, with p = r = 2; = 4.

Corollary 57. Let f : R ! C such that f = f1 + if2: Here j = 1; 2: Letfj 2 C1 (R) with f 0j 2 L1(R). Then

kT5;(f ;x) f(x)k1 105

151ln229=15

327=40+

945

1208ln4

3+1085

4832

(!5(f 01; )1 + !5(f 02; )1) : (84)

Proof. By Theorem 24, with r = 5; n = 1; = 4.

Corollary 58. Let f : R! C; such that f = f1 + if2: Here j = 1; 2: Let fj 2C2+(R); 2 Z+: Assume also !1(f (2+

ej)j ; h) < 1;8h > 0; for ej = 0; 1; : : : :

22

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

280

Page 281: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

We consider the assumptions of Theorem 20 valid regarding f1; f2 for n = :Then (T1;(f ;x))(ej) f(ej)(x) 1056042f (2+ej)(x)

1;x

[2 120 ln 2 + 81 ln 3]

1051208

!1(f

(2+ej)1 ; ) + !1(f

(2+ej)2 ; )

2; (85)

for all ej = 0; 1; : : : ; :Proof. We are applying Theorem 21 here for n = 2; r = 1; = 4.

Corollary 59. Let f : R ! C; such that f = f1 + if2: Here j = 1; 2: Let

fj 2 C1+ (R) ; with f (1+ej)

j 2 L2(R); ej = 0; 1; : : : 2 Z+: We consider theassumptions of Theorem 20 valid regarding f1; f2 for n = : Then

k (T1;(f ;x))(ej) f(ej)(x)k2

s35

151+210

151ln

327=8

32

!!1(f

(1+ej)1 ; )2 + !1(f

(1+ej)2 ; )2

; (86)

for all ej = 0; 1; : : : ; :Proof. By Theorem 26, with p = 2; r = n = 1; = 4.

Corollary 60. Let f : R ! C; such that f = f1 + if2; and j = 1; 2: Let

f1; f2 2 C3+ (R) ; with f (3+ej)

j 2 L1(R); ej = 0; 1; : : : 2 Z+: We consider theassumptions of Theorem 20 valid regarding f1; f2 for n = : Then (T3;(f ;x))(ej) f(ej)(x) 385

12082f(

ej+2)(x) 1

315

604ln39=4

211=4+2415

19328

3!3(f

(3+ej)1 ; )1 + !3(f

(3+ej)2 ; )1

; (87)

for all ej = 0; 1; : : : ; :Proof. By Theorem 28, with r = n = 3; = 4.

Corollary 61. Let f : R ! C; such that f = f1 + if2: Let f(ej)1 ; f

(ej)2 2

(C(R) \ L2 (R)) ; ej = 0; 1; : : : ; 2 Z+;We consider the assumptions of Theorem20 valid regarding f1; f2 for n = : Then

k (T2;(f))(ej) f(ej)k2 !2(f (ej)1 ; )2 + !2(f

(ej)2 ; )2

r 630

151ln229=15

327=40+256

151:

(88)for all ej = 0; 1; : : : ; :Proof. By Proposition 27, with p = r = 2; = 4.

23

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

281

Page 282: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Corollary 62. Let f : R ! C; such that f = f1 + if2: Let f(ej)1 ; f

(ej)2 2

(C(R) \ L2 (R)) ; ej = 0; 1; : : : ; 2 Z+;We consider the assumptions of Theorem20 valid regarding f1; f2 for n = : Then

k (T1;(f))(ej) f(ej)k2 !1(f (ej)1 ; )2 + !1(f

(ej)2 ; )2

r 630

151ln2104=15

381=20+407

302:

(89)for all ej = 0; 1; : : : ; :Proof. By Proposition 27, with p = 2; r = 1; = 4.

Corollary 63. Let f : R ! C; such that f = f1 + if2: Here f(j)1 ; f

(j)2 2

(C(R) \ L1 (R)) ; j = 0; 1; : : : ; 2 Z+;We consider the assumptions of Theorem20 valid regarding f1; f2 for n = : Then

k (T1;(f))(j) f (j)k1 !1(f

(j)1 ; )1 + !1(f

(j)2 ; )1

1 +

630

151ln2104=15

381=20

;

(90)for all j = 0; 1; : : : ; :Proof. By Proposition 29, with r = 1; = 4.

Corollary 64. Consider the assumptions of Theorem 30 are fullled. Then

T 2; (f; ) f () 1 1024

971685

10011 15848

p2 + 21303

p312

supx2R

nmax

h!2

D

12xf1;

; !2

D

12xf1;

io(91)

+supx2R

nmax

h!2

D

12xf2;

; !2

D

12xf2;

io:

Proof. By Theorem 30, with = 4; = 12 ; r = 2:

Note 65. All the approximation results of this article lead to interesting anduseful convergence conclusions regarding our general and trigonometric opera-tors as approximators to the unit operator.

References

[1] G.A. Anastassiou and R. A. Mezei, Uniform Convergence With Rates ofGeneral Singular Operators, submitted, 2010.

[2] G.A. Anastassiou and R. A. Mezei, Lp Convergence With Rates of GeneralSingular Integral Operators, submitted, 2010.

[3] G.A. Anastassiou and R. A. Mezei, Quantitative Approximation by Frac-tional Smooth General Singular Operators, submitted, 2010.

24

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

282

Page 283: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

[4] G.A. Anastassiou and R. A. Mezei, General Theory of Global Smoothnessand Approximation by Smooth Singular Operators, submitted, 2010.

[5] Joseph Edwards, A treatise on the integral calculus, Vol II, Chelsea, NewYork, 1954.

25

ANASTASSIOU, MEZEI: COMPLEX SINGULAR INTEGRALS

283

Page 284: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

On the MAC solution for a circular elastic plate

Igor NeygebauerUniversity of Dodoma, Tanzania

Department of Mathematics and StatisticsEmail:[email protected]

November 30, 2010

Abstract

The method of additional conditions or MAC is applied to the bound-ary value problems of mathematical physics, where the classical solutiondoes not exist or a nonphysical generalized solution is obtained. The cir-cular elastic plate under a transversal force at the center of the plate isconsidered. The MAC solution is obtained using MAC transformation forLaplace equation.KEYWORDS: Laplace and biharmonic equations, membrane, plate, MACsolution.

1 Introduction

Let us consider an isotropic elastic body. If one point of a body is given a smalldisplacement which could present a displacement of one atom then the reactionat that point should be a force in general case and it is not a stress. Thatfollows immediately from the balance of forces acting on the body. It seemsthat we have the small displacements and also small deformations in the wholebody and the classical linear elasticity theory should be applied. But it is wellknown that an elastic body under applied force has a infinite displacement ofthe point of application of the force (1). So we obtain an unsolvable problemin the theory of linear elasticity. It could be possible to create a MAC solutionof the given problem but it is not the goal of this paper. The method how tointroduce the MAC solution could be understandable from what follows.Some classical boundary value problems from elasticity could be considered.Sometimes it is easy to obtain the general solution of the differential equationsof the problems. But we could meet difficulties to satisfy the prescribed bound-ary conditions. We will see that the solutions of some problems do not exist. Inthis case it is possible to create a generalized solution, using a limit of existing so-lutions. These solutions can be easily verified in experiments. If the experimentshows, that the physical solution exists and differs from the obtained generalizedsolution then the MAC or the method of additional conditions can be applied.

1

284

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,284-290,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 285: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

This method allows to transform the obtained generalized solution to the phys-ically acceptable form. Examples of MAC solutions are solution in scheme ofDugdale-Barrenblat (5) in fracture mechanics. This scheme was applied to thelinear elastic crack problem. The linear elastic solution has singularity near thetip of a crack. To avoid this singularity Dugdale and Barrenblat introducedadditional yield stresses near the tip. The applied nonsingular condition gavethe size of the zone, there the stresses are applied. This scheme was developedin (4), where the second additional condition of zero J-integral was introduced.This new condition gave the value of the applied additional stresses, which are6 times more then the given stresses at infinity. This stress concentration factorcorresponds to the experiments of Griffith’s and Inglis (4). The usual strengthcriteria, which are used in the elastic stress fields without singularities, can beused here.Sen-Venan method in elasticity could be considered as another example of MAC.Let us apply the method of additional conditions (MAC) to consider the dis-placements of an elastic plate under a transversal force. The equations andboundary conditions of the plates with some solved problems can be found in(2), (6), (7). Our goal is to present the MAC in this problem.

2 Circular plate

2.1 Nonexistent solution

Consider the bending of a circular elastic plate. The differential equation of theproblem is

∆∆u = 0, (1)

where u is the transversal displacements of the points of a circular plate, ∆ isthe Laplace operator. We consider an axis symmetric case, then the equation(1) will take the form

1

r· ∂∂r

(r · ∂

∂r

(1

r· ∂∂r

(r · ∂

∂r

)))= 0, (2)

where the plate occupies the domain Ω : 0 ≤ r ≤ R. Suppose the followingboundary conditions

u(0) = u0, (3)

u(R) = 0. (4)

∂u

∂r(0) = 0 (5)

M(R) = −D · 1

r· ∂∂r

(r · ∂u

∂r

)(R) = 0 (6)

The condition (5) is natural and it is one of two values which are possiblein classical case. The second possible value is infinity. The MAC theory couldallow to consider any finite value of the condition (5). It will not be considered

2

NEYGEBAUER, CIRCULAR ELASTIC PLATE

285

Page 286: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

in this paper.The condition (6) is taken just for simplicity to use the result of the work (5)and to show the MAC approach in case of elastic plate.The general solution of the equation (2) is

u = C1 · ln r + C2 · r2 · ln r + C3 + C4 · r2, (7)

where the arbitrary constants C1, C2, C3, C4 could be found using the boundaryconditions (3)-(6). The derivative of the function (7) is

∂u

∂r=C1

r+ C2 · r · (2 · ln r + 1) + 2 · C4 · r. (8)

We obtain at r = 0 from (8):∂u

∂r(0) = 0. (9)

The constant C1 = 0 because of the finiteness of that derivative in the experi-ments with the plate. If the condition (5) is not zero then the solution of thegiven problem does not exist.If we put the function (7) into the condition (3) then

C3 = u(0) = u0. (10)

Then the condition (4) gives the following equation

C2 ·R2 · lnR+ u0 + C4 ·R2 = 0. (11)

If the force P is applied ar r = 0 then the equilibrium equation allows to find

Q(R) =P

2 · π ·R. (12)

The expression for Q in the theory of elastic plate is

Q(r) = D · ∂∂r

(1

r· ∂∂r

(r · ∂u

∂r

)), (13)

where D is the bending stiffness of the plate. The equations (12) and (13) create

C2 =r

4·Q(r) =

R

4·Q(R) =

P

8 · π ·D. (14)

Then the equation(11) gives the constant C4

C4 = −C2 · lnR−u0R2

= − P

8 · π ·D· lnR− u0

R2. (15)

The solution (7) and its derivative (8) will take the form

u(r) =P

8 · π ·D· r2 · ln r + u0 +

(P · lnR8 · π ·D

− u0R2

)· r2. (16)

3

NEYGEBAUER, CIRCULAR ELASTIC PLATE

286

Page 287: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

∂u

∂r(r) =

P

8 · π ·D· r · (2 · ln r + 1) + 2 ·

(P · lnR8 · π ·D

− u0R2

)· r. (17)

The bending moments are from (8):

Mr = −D ·(∂2u

∂r2+ν

r· ∂u∂r

), (18)

Mt = −D ·(

1

r· ∂u∂r

+ ν · ∂2u

∂r2

). (19)

Using (16), (18), and (19) we obtain

Mr = −2 ·D · (C2 · (1 + ν) · (2 · ln r + 1) + C2 + C4 · (1 + ν)), (20)

Mt = −2 ·D · (C2 · (1 + ν) · (2 · ln r + 1) + ν · C2 + C4 · (1 + ν)). (21)

We can see in the experiment with the circular plate under the force P inthe middle of a plate, that there are only the finite bending moments andcorresponding stresses. It means that the logarithmic terms in the expressions(20) and (21) must be avoided. Then it should be

C2 =P

8 · π ·D= 0. (22)

Therefore we obtain from (22) that

P = 0. (23)

The force P 6= 0 according to the stated problem. This contradicts to the value(23). We can conclude from the obtained contradiction that the solution of thestated problem does not exist.As we can see that the situation with the plate is similar to the situation withthe membrane (3): the classical solution of the problem does not exist but thephysical solution of the problem exists evidently.

2.2 Generalized solution

We can obtain the generalized solution of the problem using the similar way asin the membrane problem (3). It means that can suppose the distribution ofthe force P near the origin in the small circle. Then we can find the solution ofthe stated problem. And after that the radius of the small circle must tend tozero. This approach is presented in (6).Let us consider for instance consider the case of boundary condition

du

dr(R) = 0 (24)

instead of the condition (6). Then the generalized solution of the problemaccording to (8) is:

u(r) =P · r2

8 · π ·D· ln r

R+

P

16 · π ·D· (R2 − r2). (25)

4

NEYGEBAUER, CIRCULAR ELASTIC PLATE

287

Page 288: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

The bending moments are (8):

Mr =P

4 · π· ((1 + ν) · ln R

r− 1), (26)

Mt =P

4 · π· ((1 + ν) · ln R

r− ν). (27)

We can see that the expression for the displacement u according to (25) iswell enough. But the expressions (26), (27) for the bending moments havesingularities at the point of application of the force. They can not be used todetermine the stresses near the origin. Another models have to be consideredto determine the real stresses. We will use for that the MAC-solution of ourproblem.

2.3 MAC-solution

The method of Marcus (6) will help to obtain the MAC-solution for our plateproblem.Consider the differential equation of the plate (1) in the form

(∂2

∂x2+

∂2

∂y2)(∂2u

∂x2+∂2u

∂y2) = 0. (28)

The bending moments are

Mx = −D · (∂2u

∂x2+ ν · ∂

2u

∂y2), (29)

My = −D · (∂2u

∂y2+ ν · ∂

2u

∂x2), (30)

The sum of the expressions (29), (30) gives

Mx +My = −D · (1 + ν) · (∂2u

∂x2+∂2u

∂y2). (31)

If we introduce a new notation

M =Mx +My

1 + ν= −D · (∂

2u

∂x2+∂2u

∂y2), (32)

the equations (28) and (32) can be written in the form:

∂2M

∂x2+∂2M

∂y2= 0, (33)

∂2u

∂x2+∂2u

∂y2= −M

D. (34)

5

NEYGEBAUER, CIRCULAR ELASTIC PLATE

288

Page 289: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

We consider the symmetric case and therefore the equations (33), (34) in polarcoordinates will take the form

1

r· ∂∂r

(r · ∂M

∂r

)= 0, (35)

1

r· ∂∂r

(r · ∂u

∂r

)= −M

D. (36)

The equation (35) is the classical membrane equation and its general MAC-solution according to (3) can be written in the form:

M(r) = C1 + C2 · r, (37)

where C1 and C2 are arbitrary constants.Then the equation (36) yields

1

r· ∂∂r

(r · ∂u

∂r

)= − 1

D· (C1 + C2 · r). (38)

This equation could be considered in two ways: to find the classical solutionand to find the MAC solution. Let us consider the classical solution of (38).Consider the general solution of the equation (38)

u(r) = C3 · ln(r) + C4 −1

D·(C1 ·

r2

4+ C2 ·

r3

9

), (39)

where C3 and C4 are arbitrary constants.Using the boundary conditions (3)-(6) the solution (38) will be

u(r) = u0 ·(

1− 9

5·( rR

)2

+4

5·( rR

)3)

(40)

The bending moments Mr,Mt could be obtained from Eqs. (18), (19) and theforce Q - from the equilibrium equation (12). Using classical equation

Q(r) = −∂M∂r

(41)

at r = R we find the connection between applied force P and displacement u0:

u0 =5 · P ·R2

72 · π ·D. (42)

3 Conclusion

The nonexistent, generalized and MAC solutions of the circular elastic platewere considered. Some problems of mathematical physics with nonexistent so-lutions can have the MAC-solutions. These MAC-solutions are correspondingand explaining the real physical situation of applied force.

6

NEYGEBAUER, CIRCULAR ELASTIC PLATE

289

Page 290: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

4 References

1. V.I.Astafjev,J.N.Radaev,L.V.Stepanova, Nonlinear fracture mechanics, Samara,Publisher Samara University, (2004).

2. A.W.Leissa, Vibration of plates, NASA, Washington D.C., (1969).

3. I.Neygebauer, MAC-solution for a rectangular membrane, Journal of Con-crete and Applicable Mathematics, Vol.8, No.2,344-352, (2010).

4. I.Neygebauer, The method to obtain the finite solutions in the continuummechanics, Fundamental research at the Saint Petersburg State Polytech-nic University,(2005).

5. E.I.Shifrin, 3D problems of linear fracture mechanics, Fizmatlit, Moscow,(2002).

6. S.Timoshenko,S.Woinowsky-Krieger, Theory of plates and shells, McGraw-Hill Book Company, Inc, New York, Toronto, London, (1959).

7. H.Yuce,C.Y.Wang, Fundamental frequency of clamped plates with circu-larly periodic boundaries, Journal of sound and vibration, Vol.299,355-362,(2007).

7

NEYGEBAUER, CIRCULAR ELASTIC PLATE

290

Page 291: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Approximate bi-homomorphisms and bi-derivationsin normed Lie triple systems

1Javad Shokri, 2Ali Ebadian, 3Rasoul Aghalari and Madjid Eshaghi Gordji1,2,3Department of Mathematics, Urmia University,

P.O.Box 165, Urmia, Iran. 4 Department of Mathematics, Semnan University, P. O. Box 35195-363, Semnan, Iran

Center of Excellence in Nonlinear Analysis and Applications (CENAA), Semnan University, Iran

Abstract. We prove the generalized Hyers–Ulam stability of the following 2-dimensional quadratic functional equation:

f(x+ y, z − w) + f(x− y, z + w) = 2f(x, z) + 2f(y, w).

Moreover, we investigate the stability of bi-homomorphisms and bi-derivations on normed Lie triple systems.

1. Introduction

In 1940 S.Ulam [36] proposed the general Ulam stability problem:

Let G1 be a group and let G2 be a matric group with the matric d(., .). Given ε > 0, does there

exists a δ > 0 such that if a function h : G1 → G2 satisfies inequality d(h(xy)− h(x)h(y)

)< δ for all

x, y ∈ G1 then there is a homomorphism H : G1 → G2 with d(h(x),H(x)) < ε for all x ∈ G1?

D. H. Hyers [24] gave a partial affirmative answer to the question of Ulam in the context of Banach

spaces. In 1950, a generalized version of Hyers’ theorem for approximate additive mappings was given by

T. Aoki [2]. In 1978, Th. M. Rassias [30] extended the theorem of Hyers by considering the unbounded

cauchy difference inequality

‖f(x+ y)− f(x)− f(y)‖ 6 ε(‖x‖p + ‖y‖p) (ε ≥ 0, p ∈ [0, 1))

In 1990, Th. M. Rassias during the 27th International Symposium on Functional Equations asked the

question whether such a theorem can also be proved for p ≥ 1. In 1991, Z. Gajda [22] following the

same approach as in Th. M. Rassias [30] gave an affirmative solution to this question for p > 1. It

was proved by Z. Gajda [22], as well as by Th. M. Rassias’ and P. Semrl [34] that one can prove Th.

M. Rassias’ type theorem when p = 1. Th. M. Rassias Theorem for the stability for stability of the

linear mappings between Banach spaces provided some influence for the development of the concept of

generalized Hyers–Ulam stability, a fact which rekindled interest in the subject of stability of functional

equations. This concept is known today as generalized Hyers–Ulam stability or Hyers-Ulam-Rassias

stability of functional equations; cf. [4, 33]. Several mathematicians following the spirit of the approach

in the paper of Th. M. Rassias [30] for the unbounded Cauchy difference obtained various results. For

example in 1982, J. M. Rassias [29] obtained an analogous stability theorem in which he replace the

factor ‖x‖p +‖y‖p by ‖x‖p.‖y‖q for p, q ∈ R with p+ q 6= 1. In 1994, P. Gavruta [23] provided a further

generalization of Th. M. Rassias’ theorem in which he replaced the bound ε(‖x‖p + ‖y‖p) in (1.1) by

02000 Mathematics Subject Classification: 39B82, 16W25, 17A40,39B52.0Keywords: Normed Lie systems; bi-homomorphism; bi-derivation; Generalized Hyers–Ulam stability.0E-mail: [email protected], [email protected], [email protected],[email protected] corresponding author: [email protected] (Madjid Eshaghi Gordji)

291

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,291-300,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 292: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

2 J. Shokri, A. Ebadian, R. Aghalary and M. Eshaghi Gordji

a general control function ϕ(x, y). In 1996, G. Isac and Th. M. Rassias [25] applied the generalized

Hyers-Ulam stability theory to prove fixed point theorems and obtained some new applications in

nonlinear Analysis. During the last decades several stability problems of functional equations have

been investigated by a number of mathematicians; cf. [4]– [32] and references therein.

Ternary algebraic operations were considered in 19th century by several mathematicians such as

Cayley [3] how introduced the notion of cubic matrix which in turn was generalized by Kapranov [?]et.

al. in 1990. there are some applications, although still hypothetical, in the fractional quantum Hall

effect, the nonstandard statistics, supersymmetric theory, and Yang-Baxter equation. the comments on

physical applications of ternary structures can be found in Refs. [1, 26, 35, 37].

A normed (Banach) Lie triple system is a normed (Banach) space (A; ‖.‖) with a trilinear mapping

(x, y, z) 7−→ [xyz] from A×A×A to A satisfying the following axioms

[xyz] = −[yxz],[xyz] + [yzx] + [zxy] = 0[uv[xyz]] = [[uvx]yz] + [x[uvy]z] + [xy[uvz]],‖[xyz]‖ 6 ‖x‖‖y‖‖z‖,

for all u, v, x, y, z ∈ A.

Let A and B be normed Lie triple systems. A C-linear mapping H : A → B is said to be a

homomorphism if

H([xyz]) = [H(x)H(y)H(z)]

for all x, y, z ∈ A. A C-linear mapping δ : A → B is called a derivation if

δ([xyz]) = [δ(x)yz] + [xδ(y)z] + [xyδ(z)]

for all x, y, z ∈ A.

Let A and B be normed Lie triple systems. A C-bilinear H : A×A → B is said to be a bihomomor-

phism if it satisfies

H([xyz], w) = [H(x,w)H(y, w)H(z, w)],

H(x, [yzw]) = [H(x, y)H(x, z)H(x,w)]

for all x, y, z, w ∈ A. A C-bilinear δ : A×A → B is said to be a biderivation if it satisfies

δ([xyz], w) = [δ(x,w)yz] + [xδ(y, w)z] + [xyδ(z, w)],

δ(x, [yzw]) = [δ(x, y)zw] + [yδ(x, z)w] + [yzδ(x,w)]

for all x, y, z, w ∈ A.

In this paper, we have analyzed the Hyers-Ulam-Rassias stability of bi-homomorphism and bi-

derivation associated with the following quadratic functional equation

f(x+ y, z − w) + f(x− y, z + w) = 2f(x, z) + 2f(y, w), (1.1)

in Lie triple systems, which can be regarded as ternary structures. The reader is referred to [27, 28] for

some other related results.

SHOKRI ET AL: NORMED LIE TRIPLE SYSTEMS

292

Page 293: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

approximate bi-homomorphisms and bi-derivations in... 3

Throughout this paper, suppose that A is normed Lie triple system with norm ‖.‖A and that B is a

Banach Lie triple system with norm ‖.‖B. For given mapping f : A×A :→ B and given subset E of C,

we define Dλ,µ : A4 → B by

Dλ,µf(x, y, z, w) := f(λx+ λy, µz − µw) + f(λx− λy, µz + µw)− 2λµf(x, z)− 2λµf(y, w)

for all λ, µ ∈ T1 = z ∈ C : |z| = 1 and all x, y, z, w ∈ A.

2. Stability of bi–linear mappings

Throughout this section X denotes a normed space and Y is a Banach space. We aim to prove the

generalized Hyers–Ulam stability of 2-dimensional linear mappings.

Lemma 2.1. Let V and W be C-linear spaces and f : V × V → W be a bi-additive mapping, such that

f(λx, µy) = λµf(x, y) for all λ, µ ∈ T1 = z ∈ C : |z| = 1 and all x, y, z, w ∈ V, then f is C-bilinear.

Proof. Since f is a bi-additive, we get f( 12x,

12y) = 1

4f(x, y) for all x, y ∈ X . Obviously, f(0x, 0y) =

0f(x, y), now let µ1, µ2 ∈ C(µ1 6= 0, µ2 6= 0), and let M1 and M2 are two natural numbers, respectively,

greater than |µ1| and |µ2|. By an easily geometric argument, one can conclude that there exist numbers

λ11, λ12, λ21, λ22 ∈ T1 such that 2 µ1M1

= λ11 + λ12 and 2 µ2M2

= λ21 + λ22. Therefore

f(µ1x, µ2y) = f(M1

2.2.

µ1

M1x,M2

2.2.

µ2

M2y) =

M1

2.M2

2f(2.

µ1

M1x, 2.

µ2

M2y)

=M1

2.M2

2f((λ11 + λ12)x, (λ21 + λ22)y)

=M1

2(λ11 + λ12).

M2

2(λ21 + λ22)f(x, y) = µ1µ2f(x, y)

for all x, y ∈ V. Thus the mapping f : V × V → W is a C-bilinear.

Lemma 2.2. Let V andW be C-linear spaces and f : V×V → W be a mapping satisfies Dλ,µf(x, y, z, w) =

0 for all λ, µ ∈ T1 = z ∈ C : |z| = 1 and all x, y, z, w ∈ V, then f is C-bilinear.

Proof. Letting λ = µ = 1, Theorem 2.1 in [?], f is bi-additive. Putting y = w = 0 inDλ,µ(x, y, z, w) = 0,

we get f(λx, µz) = λµf(x, y) for all λ, µ ∈ T1 and all x, y, z, w ∈ X . So by Lemma 2.1, the mapping f

is C-bilinear.

Theorem 2.3. Let f : X × X → Y with f(0, 0) = 0 be a mapping for which there exist a function

ϕ : X 4 → [0,∞), such that

‖Dλ,µf(x, y, z, w)‖Y 6 ϕ(x, y, z, w), (2.1)

ϕ(x, y, z, w) :=14

∞∑n=0

4−nϕ(2nx, 2ny, 2nz, 2nw) <∞ (2.2)

for all λ, µ ∈ T1 and x, y, z, w ∈ X . then there exist a unique bi-linear mapping T : X → Y such that

‖f(x, y)− T (x, y)‖Y 632ϕ(x.x, y,−y) +

12ϕ(x,−x, y, y) + ϕ(0, x, 0, y) (2.3)

for all x, y ∈ X .

SHOKRI ET AL: NORMED LIE TRIPLE SYSTEMS

293

Page 294: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

4 J. Shokri, A. Ebadian, R. Aghalary and M. Eshaghi Gordji

Proof. Assume that λ = µ = 1. Put w = z and y = −x in (2.1) to obtain

‖f(2x, 2z)− 2f(x, z)− 2f(−x, z)‖Y 6 ϕ(x,−x, z, z) (2.4)

for all x, z ∈ X . Letting x = z = 0 in (2.1), we get

‖f(y,−w) + f(−y, w)− 2f(y, w)‖Y 6 ϕ(0, y, 0, w) (2.5)

for all y, w ∈ X . Replacing y by x and w by z in (2.5)

‖f(x,−z) + f(−x, z)− 2f(x, z)‖Y 6 ϕ(0, x, 0, z) (2.6)

for all x, z ∈ X . Putting x = y and w = −z in (2.1), we get

‖f(2x, 2z)− 2f(x, z)− 2f(x,−z)‖Y 6 ϕ(x, x, z,−z) (2.7)

for all x, z ∈ X . By inequalities (2.4) and (2.7), we get

‖2f(x,−z)− 2f(−x, z)‖Y 6 ϕ(x, x, z,−z) + ϕ(x,−x, z, z) (2.8)

for all x, z ∈ X . By (2.6) and (2.7), we have

‖f(2x, 2z)− 4f(x, z)− f(x,−z) + f(−x, z)‖Y 6 ϕ(x, x, z,−z) + ϕ(0, x, 0, z) (2.9)

for all x, z ∈ X . By two inequalities (2.8) and (2.9), we get

‖f(2x, 2y)− 4f(x, z) 632ϕ(x, x, z,−z) +

12ϕ(x,−x, z, z) + ϕ(0, x, 0, z)

for all x, z ∈ X . Setting z = y in the above inequality and put ψ(x, y) := 32ϕ(x, x, y,−y)+ 1

2ϕ(x,−x, y, y)+ϕ(0, x, 0, y) to get

‖f(2x, 2y)− 4f(x, y)‖Y 6 ψ(x, y), (2.10)

or ∥∥∥14f(2x, 2y)− f(x, y)

∥∥∥Y

614ψ(x, y),

for all x, y ∈ X . Replacing x by2jx and y by 2jy and dividing 4j in the above inequality, we obtain

that ∥∥∥ 14j+1

f(2j+1x, 2j+1y)− 14jf(2jx, 2jy)

∥∥∥Y

61

4j+1ψ(2jx, 2jy)

for all x, y ∈ X and all j = 0, 1, . . .. One can use induction to show that∥∥∥ 14nf(2nx, 2ny)− 1

4mf(2mx, 2my)

∥∥∥Y

614

n−1∑j=m

4−jψ(2jx, 2jy) (2.11)

for all nonnegative integers n > m and all x, y ∈ X . It follows from the convergence of the series

(2.2) and (2.11) that the sequence

14n f(2nx, 2ny)

is a Cauchy sequence for all x, y ∈ X . Due to the

completeness of Y, this sequence is convergent. Define T : X × X → Y by

T (x, y) := limn→∞

14nf(2nx, 2ny)

SHOKRI ET AL: NORMED LIE TRIPLE SYSTEMS

294

Page 295: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

approximate bi-homomorphisms and bi-derivations in... 5

for all x, y ∈ X . By (2.1) and (2.2), we have

‖T (x+ y, z − w) + T (x− y, z + w)− 2T (x, z)− 2T (y, w)‖Y

= limn→∞

∥∥∥ 14nf(2n(x+ y), 2n(z − w)) +

14nf(2n(x− y), 2n(z + w))

− 24nf(2nx, 2nz)− 2

4nf(2ny, 2nw)

∥∥∥Y

6 limn→∞

14nϕ(2nx, 2ny, 2nz, 2nw) = 0

for all x, y, z, w ∈ X . Then T satisfies (1.1), so by Lemma 2.2, the mapping T : X ×X → Y is C-bilinear.

Setting m = 0 and taking n→∞ in (2.11), one can obtain the inequality (2.3).

Now, let T ′ : X × X → Y be another bi-linear mapping satisfy (2.3). Then we have

‖T (x, y)− T ′(x, y)‖ =14n‖T (2nx, 2ny)− T ′(2nx, 2ny)‖Y

614n‖T (2nx, 2ny)− f(2nx, 2ny)‖Y +

14n‖f(2nx, 2ny)− T ′(2nx, 2ny)‖Y

624n

(32ϕ(2nx, 2nx, 2ny,−2ny) +

12ϕ(2nx,−2nx, 2ny, 2ny) + ϕ(0, 2nx, 0, 2ny)

)6

14n

(12

∞∑k=0

4−kψ(2k2nx, 2k2ny))

=12

∞∑k=n

4−kψ(2kx, 2ky) → 0

as n→∞. Hence T = T ′.

The next result is a dual to the previous theorem in some sense.

Theorem 2.4. Let f : X × X → Y with f(0, 0) = 0 be a mapping for which there exist a function

ϕ : X 4 → [0,∞), such that

‖Dλ,µf(x, y, z, w)‖ 6 ϕ(x, y, z, w),

ϕ(x, y, z, w) :=14

∞∑n=0

4nϕ(2−nx, 2−ny, 2−nz, 2−nw) <∞ (2.12)

for all λ, µ ∈ T1 and x, y, z, w ∈ X . Then there exists a unique bi-linear mapping T : X → Y such that

‖f(x, y)− T (x, y)‖ 632ϕ(x.x, y,−y) +

12ϕ(x,−x, y, y) + ϕ(0, x, 0, y)

for all x, y ∈ X .

Proof. It follows from(2.10) that∥∥∥f(x, y)− 4f(12x,

12y)

∥∥∥Y

6 ψ(12x,

12y)

for all x, y ∈ X . So ∥∥∥4mf(x

2m,y

2m)− 4nf(

x

2n,y

2n)∥∥∥Y

6n−1∑j=m

∥∥∥4jf(x

2j,y

2j)− 4j+1f(

x

2j+1,y

2j+1)∥∥∥Y

614

n−1∑j=m

4jψ(x

2j,y

2j) (2.13)

for all nonnegative integers m and n with n > m and all x, y ∈ X . It follows from convergency of two

series (2.12) and (2.13) that the sequence 4nf( x2n ,

y2n ) is a Cauchy sequence for all x, y ∈ X . Since Y

SHOKRI ET AL: NORMED LIE TRIPLE SYSTEMS

295

Page 296: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

6 J. Shokri, A. Ebadian, R. Aghalary and M. Eshaghi Gordji

is complete, the sequence 4nf( x2n ,

y2n ) is convergence for all x, y ∈ X . So we can define the mapping

T : X × X → Y by

T (x, y) := limn→∞

4nf(x

2n,y

2n)

for all x, y ∈ X . Moreover, letting m = 0 and passing the limit n → ∞ in (2.13), we get desired

inequality. The rest of the proof is similar to the proof of Theorem 2.3.

3. Stability of bi-homomorphisms in normed Lie triple systems

In this section, we prove the stability of bi-homomorphisms in normed Lie triple systems associated

with the bi–linear functional equation.

Theorem 3.1. Let θ and p < 2 be positive real numbers, and let f : A×A → B with f(0, 0) = 0 be a

mapping such that

‖Dλ,µf(x, y, z, w)‖B 6 θ(‖x‖pA + ‖y‖p

A + ‖z‖pA + ‖w‖p

A), (3.1)

‖f([x, y, z], w)− [f(x,w)f(y, w)f(z, w)]‖B+‖f(x, [y, z, w])− [f(x, y)f(x, z)f(x,w)]‖B6 θ(‖x‖p

A + ‖y‖pA + ‖z‖p

A + ‖w‖pA)

(3.2)

for all λ, µ ∈ T1 and x, y, z, w ∈ A. Then there exist a unique bi-homomorphism H : A×A → B such

that

‖f(x, y)−H(x, y)‖B 65θ

4− 2p(‖x‖p

A + ‖y‖pA) (3.3)

for all x, y ∈ A.

Proof. First let us assume ‖0‖p = 0 for p < 0. Put ϕ(x, y, z, w) = θ(‖x‖pA + ‖y‖p

A + ‖z‖pA + ‖w‖p

A)

in Theorem 2.3, to get a unique C-bilinear mapping H given by H(x, y) := limn→∞14n f(2nx, 2ny)

satisfying (3.3). It follows from (3.1) that

‖H([x, y, z], w)− [H(x,w)H(y, w)H(z, w)]‖B

+ ‖H(x, [y, z, w])− [H(x, y)H(x, z)H(x,w)]‖B

= limn→∞

14n

(‖f([2nx, 2ny, 2nz], 2nw)− [f(2nx, 2nw), f(2ny, 2nw), f(2nz, 2nw)]‖B

+ ‖f(2nx, [2ny, 2nz, 2nw])− [f(2nx, 2ny)f(2nx, 2nz)f(2nx, 2nw)]‖B)

6 limn→∞

2np

4nθ(‖x‖p

A + ‖y‖pA + ‖z‖p

A + ‖w‖pA) = 0

for all x, y, z, w ∈ A. So

H([x, y, z], w) = [H(x,w),H(y, w),H(z, w)]

and

H(x, [y, z, w]) = [H(x, y),H(x, z),H(x,w)]

for all x, y, z, w ∈ A.

SHOKRI ET AL: NORMED LIE TRIPLE SYSTEMS

296

Page 297: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

approximate bi-homomorphisms and bi-derivations in... 7

Theorem 3.2. Let θ and p > 2 a positive real number, and let f : A×A → B be a mapping satisfying

(3.1) and (3.2). Then there exists a unique bi-homomorphism H : A×A → B such that

‖f(x, y)−H(x, y)‖B 65θ

2p − 4(‖x‖p

A + ‖y‖pA).

Proof. Put ϕ(x, y, z, w) = θ(‖x‖pA + ‖y‖p

A + ‖z‖pA + ‖w‖p

A) in Theorem 2.4 and note that inequality

(3.2) implies that f(0, 0) = 0. One can define H : A×A → B

H(x, y) := limn→∞

4nf(x

2n,y

2n)

for all x, y ∈ A. Then desired inequality for H and f is obtained. The rest of the proof is similar to the

proof of Theorem 2.4.

Theorem 3.3. Let θ and p 6= 12 be positive real numbers, and f : A × A → B, with f(0, 0) = 0, be a

mapping such that

‖Dλ,µf(x, y, z, w)‖B 6 θ(‖x‖pA.‖y‖

pA.‖z‖

pA.‖w‖

pA),

‖f([x, y, z], w)− [f(x,w), f(y, w), f(z, w)]‖B+‖f(x, [y, z, w])− [f(x, y), f(x, z), f(x,w)]‖B

6 θ(‖x‖pA.‖y‖

pA.‖z‖

pA.‖w‖

pA)

(3.4)

for all λ, µ ∈ T1 and all x, y, z, w ∈ A. Then there exists a bi-homomorphism H : A×A → B such that

‖f(x, y)−H(x, y)‖B =

4−24p ‖x‖2pB .‖y‖

2pB ; p < 1

22θ

24p−4‖x‖2pB .‖y‖

2pB ; p > 1

2

, (3.5)

Proof. In case p < 12 , we first assume ‖0‖p = 0 for p < 0. Put ϕ(x, y, z, w) = θ(‖x‖p

A.‖y‖pA.‖z‖

pA.‖w‖

pA)

in Theorem 2.3, to get a unique C-bilinear mapping H given by H(x, y) := limn→∞14n f(2nx, 2ny)

satisfying (3.5). Eq. (3.4) implies that

‖H([x, y, z], w)− [H(x,w)H(y, w)H(z, w)]‖B

+ ‖H(x, [y, z, w])− [H(x, y)H(x, z)H(x,w)]‖B

= limn→∞

14n

(‖f([2nx, 2ny, 2nz], 2nw)− [f(2nx, 2nw), f(2ny, 2nw), f(2nz, 2nw)]‖B

+ ‖f(2nx, [2ny, 2nz, 2nw])− [f(2nx, 2ny)f(2nx, 2nz)f(2nx, 2nw)]‖B)

6 limn→∞

24np

4nθ(‖x‖p

A.‖y‖pA.‖z‖

pA.‖w‖

pA) = 0

for all x, y, z, w ∈ A. So

H([x, y, z], w) = [H(x,w),H(y, w),H(z, w)]

and

H(x, [y, z, w]) = [H(x, y),H(x, z),H(x,w)]

for all x, y, z, w ∈ A.

The rest of proof is similar to the proof of Theorems 3.1 and 2.3.

In the case p > 12 , put ϕ(x, y, z, w) = θ(‖x‖p

A.‖y‖pA.‖z‖

pA.‖w‖

pA) in Theorem 2.4, to get unique C-

bilinear mapping H given by H(x, y) := limn→∞ 4nf( x2n ,

y2n ) satisfies inequality in (3.5). The rest of

proof is similar to the proof of Theorems 3.2 and 2.4

SHOKRI ET AL: NORMED LIE TRIPLE SYSTEMS

297

Page 298: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

8 J. Shokri, A. Ebadian, R. Aghalary and M. Eshaghi Gordji

4. Stability of bi-derivations in normed Lie triple systems

In this section we prove the Hyers-Ulam-Rassias stability of bi-derivation of (1.1).

Theorem 4.1. Let θ and p 6= 12 be positive real numbers, and let f : A×A → B with f(0, 0) = 0 be a

mapping such that

‖Dλ,µf(x, y, z, w)‖B 6 θ(‖x‖pA.‖y‖

pA.‖z‖

pA.‖w‖

pA),

‖f([x, y, z], w)− [f(x,w), y, z]− [x, f(y, w), z]− [x, y, f(z, w)]‖B+‖f(x, [y, z, w])− [f(x, y), z, w]− [y, f(x, z), w][y, z, f(x,w)]‖B6 θ(‖x‖p

A.‖y‖pA.‖z‖

pA.‖w‖

pA)

(4.1)

for all x, y, z, w ∈ A. If f satisfies

limn→∞

14nf(2nx, 2ny) = lim

n→∞

14nf(2nx, 23ny) = lim

n→∞

14nf(23nx, 2ny)

for all x, y,∈ A. Then there exists a unique bi-derivation δ : A×A → B such that

‖f(x, y)− δ(x, y)‖B 6

4−24p (‖x‖2pA .‖y‖

2pA ) ; p < 1

22θ

24p−4 (‖x‖2pA .‖y‖

2pA ) ; p > 1

2

, (4.2)

for all x, y ∈ A.

Proof. For the case p < 12 by putting ϕ(x, y, z, w) = θ(‖x‖p

A.‖y‖pA.‖z‖

pA.‖w‖

pA) in Theorem 2.3, it

follows that there exists C-bilinear mapping δ given by δ(x, y) := limn→∞14n f(2nx, 2ny) which satisfies

inequality (4.2).

It follows from (4.1) that

‖δ([x, y, z], w)− [δ(x,w), y, z]− [x, δ(y, w), z]− [x, y, δ(z, w)]‖B

+ ‖δ(x, [y, z, w])− [δ(x, y), z, w]− [y, δ(x, z), w][y, z, δ(x,w)]‖B

= limn→∞

(∥∥∥ 143n

f(23n[x, y, z], 23nw)−[ 14nf(2nx, 2nw), y, z

]−

[x,

14nf(2nx, 2nw), z

]−

[x, y,

14nf(2nz, 2nw)

]∥∥∥B

+∥∥∥ 1

43nf(23nx, 23n[y, z, w])−

[ 14nf(2nx, 2ny), z, w

]−

[y,

14nf(2nx, 2nz), w

]−

[y, z,

14nf(2nx, 2nw)

]∥∥∥B

)= lim

n→∞

(∥∥∥ 143n

f([2nx, 2ny, 2nz], 23nw)− 143n

[f(2nx, 23nw), 2ny, 2nz]

− 143n

[2nx, f(2ny, 23nw), 2nz]− 143n

[2nx, 2ny, f(2nz, 23nw)]∥∥∥B

+∥∥∥ 1

43nf(23nx, [2ny, 2nz, 2nw])− 1

43n[f(23nx, 2ny), 2nz, 2nw]

− 143n

[2ny, f(23nx, 2nz), 2nw]− 143n

[2ny, 2nz, f(23nx, 2nw)]∥∥∥B

)6 lim

n→∞

( θ

43n(2np‖x‖p

A.2np‖y‖p

A.2np‖z‖p

A.23np‖w‖p

A)

43n(23np‖x‖p

A.2np‖y‖p

A.2np‖z‖p

A.2np‖w‖p

A))

= limn→∞

2θ26np

43n(‖x‖p

A.‖y‖pA.‖z‖

pA.‖w‖

pA) = 0

SHOKRI ET AL: NORMED LIE TRIPLE SYSTEMS

298

Page 299: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

approximate bi-homomorphisms and bi-derivations in... 9

for all x, y, z, w ∈ A. Therefore

δ([xyz], w) = [δ(x,w)yz] + [xδ(y, w)z] + [xyδ(z, w)],

δ(x, [yzw]) = [δ(x, y)zw] + [yδ(x, z)w] + [yzδ(x,w)]

for all x, y, z, w ∈ A.

For the case p > 12 , similar to the first case by putting ϕ(x, y, z, w) = θ(‖x‖p

A.‖y‖pA.‖z‖

pA.‖w‖

pA) in

Theorem 2.4 and by the same argument in Theorem 3.2 one can get a unique C-bilinear mapping δ

given by δ(x, y) := limn→∞ 4nf( x2n ,

y2n ) which satisfies inequality (4.2).

Theorem 4.2. Let θ and p 6= 2 be positive real numbers, and let f : A×A → B with f(0, 0) = 0 be a

mapping such that

‖Dλ,µf(x, y, z, w)‖B 6 θ(‖x‖pA + ‖y‖p

A + ‖z‖pA + ‖w‖p

A),

‖f([x, y, z], w)− [f(x,w), y, z]− [x, f(y, w), z]− [x, y, f(z, w)]‖B+‖f(x, [y, z, w])− [f(x, y), z, w]− [y, f(x, z), w][y, z, f(x,w)]‖B6 θ(‖x‖p

A + ‖y‖pA + ‖z‖p

A + ‖w‖pA)

(4.3)

for all x, y, z, w ∈ A. If f satisfies

limn→∞

14nf(2nx, 2ny) = lim

n→∞

14nf(2nx, 23ny) = lim

n→∞

14nf(23nx, 2ny)

for all x, y,∈ A. Then there exists a unique bi-derivation δ : A×A → B such that

‖f(x, y)− δ(x, y)‖B 6

4−2p (‖x‖pA + ‖y‖p

A) ; p < 25θ

2p−4 (‖x‖pA + ‖y‖p

A) ; p > 2,

for all x, y ∈ A.

Proof. If p < 2, we first assume that ‖0‖p = 0 for p < 0. Put ϕ(x, y, z, w) = θ(‖x‖pA + ‖y‖p

A + ‖z‖pA +

‖w‖pA) in Theorem 2.3, to get a unique C-bilinear mapping δ given by δ(x, y) := limn→∞

14n f(2nx, 2ny)

satisfies desired inequality. The rest of the proof is similar to the proof of Theorem 4.1.

If p > 2, putting ϕ(x, y, z, w) = θ(‖x‖pA + ‖y‖p

A + ‖z‖pA + ‖w‖p

A) in Theorem 2.4, to get a unique

C-bilinear mapping δ given by δ(x, y) := limn→∞ 4nf( x2n ,

y2n ) satisfies desired inequality. The rest of

the proof is similar to the proof of Theorem 4.1.

References

[1] V. Abramov, R. Kerner and B. Le Roy, Hypersymmetry a Z3 graded generalization of supersymmetry, J. Math.

Phys. 38, Art. ID 1650 (1997).

[2] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan. 2 (1950), 64–66.

[3] A. Cayley, On the 34 concomitants of the ternary cubic, Am. J. Math. 4 (1881).

[4] A. Ebadian, N. Ghobadipour, M. E. Gordji, A fixed point method for perturbation of bimultipliers and Jordan

bimultipliers in C∗−ternary algebras, J. Math. Phys. 51, 1, 2010, 10 pages, doi:10.1063/1.3496391.

[5] A. Ebadian, A. Najati and M. Eshaghi Gordji, On approximate additive–quartic and quadratic–cubic functional

equations in two variables on abelian groups, Results Math., DOI 10.1007/s00025-010-0018-4 (2010).

[6] M. Eshaghi Gordji and H. Khodaei, Stability of Functional Equations, LAP LAMBERT Academic Publishing, 2010.

[7] M. Eshaghi Gordji, Nearly ring homomorphisms and nearly ring derivations on non-Archimedean Banach algebras,

Abs. Appl. Anal., Article ID:393247.

[8] M. Eshaghi Gordji and Z. Alizadeh, Stability and superstability of ring homomorphisms on non–Archimedean Banach

algebras, Abstract and Applied Analysis, Vol. 2011, Article ID:123656, (2011), 10 pages.

SHOKRI ET AL: NORMED LIE TRIPLE SYSTEMS

299

Page 300: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

10 J. Shokri, A. Ebadian, R. Aghalary and M. Eshaghi Gordji

[9] M. Eshaghi Gordji and M. Bavand Savadkouhi, Stability of cubic and quartic functional equations in non–

Archimedean spaces, Acta Appl. Math. 110 (2010), 1321–1329.

[10] M. Eshaghi Gordji and M. Bavand Savadkouhi, Stability of a mixed type cubicquartic functional equation in non–

Archimedean spaces, Appl. Math. Lett. 23, No.10, (2010), 1198-1202.

[11] M. Eshaghi Gordji, M. Bavand Savadkouhi and M. Bidkham, Stability of a mixed type additive and quadratic

functional equation in non–Archimedean spaces, J. Comput. Anal. Appl. 12(2010) 454–462.

[12] M. Eshaghi Gordji and M. Bavand Savadkouhi, Approximation of generalized homomorphisms in quasi-Banach

algebras, Analele Univ. Ovidius Constata, Math series, Vol. 17(2), (2009), 203–214.

[13] M. Eshaghi Gordji and M. Bavand Savadkouhi, On approximate cubic homomorphisms, Advances in difference

equations, Volume (2009), Article ID 618463, 11 pages ,doi:10.1155/2009/618463.

[14] M. Eshaghi Gordji, T. Karimi and S. Kaboli Gharetapeh, Approximately n–Jordan homomorphisms on Banach

algebras, J. Ineq. Appl. Volume 2009, Article ID 870843, 8 pages.

[15] M. Eshaghi Gordji, R. Khodabakhsh, H. Khodaei and S. M. Jung, AQCQ-functional equation in non–Archimedean

normed spaces, Abs. Appl. Anal., Volume 2010, Article ID741942.

[16] M. Eshaghi Gordji, H. Khodaei and R. Khodabakhsh, General quartic-cubic-quadratic functional equation in non–

Archimedean normed spaces, U.P.B. Sci. Bull. (Series A) 72 (2010), Issue 3, 69–84.

[17] M. Eshaghi Gordji and H. Khodaei, Solution and stability of generalized mixed type cubic, quadratic and additive

functional equation in quasi–Banach spaces, Nonlinear Analysis–TMA 71 (2009), 5629–5643.

[18] M. Eshaghi Gordji, H. Khodaei and R. Khodabakhsh, General quartic–cubic–quadratic functional equation in non–

Archimedean normed spaces, U.P.B. Sci. Bull., Series A, Vol. 72, Iss. 3, 2010, 69-84.

[19] M. Eshaghi Gordji and A. Najati, Approximately J∗-homomorphisms: A fixed point approach, Journal of Geometry

and Physics, 60 (2010), 809–814.

[20] R. Farokhzad and S. A. R. Hosseinioun, Perturbations of Jordan higher derivations in Banach ternary algebras: An

alternative fixed point approach, Int. J. Nonlinear Anal. Appl. 1 (2010),1, 42–53.

[21] V. Falziev, Th. M. Rassias and P. K. Sahoo, The space of (ψ, γ)–additive mappings on semigroups, Trans. Amer.

Math. Sci. 345 (2002), no. 11, 4455-4472.

[22] Z. Gajda, On the stability of additive mappings, Internat. J. Math. Math. Sci. 14(1991), 431-434.

[23] P. Gavruta, A generalization of the Hyers-Ulam-Rassias stability of approximately additive mappings, J. Math. Anal.

Appl. 184(1994), 431-436.

[24] D.H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. 27, 222–224 (1941).

[25] G. Isac and Th. M. Rassias, Stability of ψ-additive mappings, Applications to Nonlinear analysis Internat. J. Math.

Math. Sci. 19 (1996), 219-228.

[26] R. Kerner, The cubic chessboard: Geometry and physics, Class. Quantum Grav. 14 A203 (1997).

[27] C. Park, Lie ∗−homomorphisms between Lie C∗−algebras and Lie ∗−derivations on Lie C∗−algebras, J. Math. Anal.

Appl. 293 (2004) 419–434.

[28] C. Park, Homomorphisms between Lie JC∗−algebras and Cauchy–Rassias stability of Lie JC∗−algebra derivations,

Journal of Lie Theory. 15 (2005) 393–414.

[29] J.M. Rassias, On approximation of approximately linear mappings by linear mappings, J. Funct. Anal. 46 (1982),

126–130.

[30] Th. M. Rassias, On the stability of the linear mapping in Banach spaces, Proc. Amer. Math. Soc. 72 297–300 (1978).

[31] Th. M. Rassias, On the stability of functional equations and a problem of Ulam,Acta Math. Appl. 62 (2000), 23–130.

[32] Th. M. Rassias, On the stability of functional equations in Banach spaces,J. Math. Anal. Appl. 251 (2000), 264–284.

[33] Th. M. Rassias, The problem of S.M.Ulam for approximately multiplicative mappings, J. Math. Anal. Appl. 246

(2000), 352–378.

[34] Th. M. Rassias and P. Semrl, On the behaviour of mappings which do not satisfy Hyers-Ulam stability, Proc. Amer.

Math. Soc. 114 989–993 (1992).

[35] G.L. Sewell, Quantum Mechanics and its Emergent Macrophysics, Princeton Univ. Press, Princeton, NJ, 2002.

MR1919619 (2004b:82001).

[36] S. M. Ulam, Problems in Modern Mathematics, Chapter VI, science ed. Wiley, New York, 1940.

[37] H. Zettl, A characterization of ternary rings of operators, Adv. Math. 48 (1983), 117–143.

SHOKRI ET AL: NORMED LIE TRIPLE SYSTEMS

300

Page 301: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

SOME INEQUALITIES FOR THE q-DIGAMMA FUNCTIONS

W. T. Sulaiman

Department of Computer Engineering College of Engineering

University of Mosul, Iraq.

Abstract. In [7] the authors proved many inequalities concerning the q-digamma function of the form )()()()(2 yfxfxyf ≥≤ and ).()()()( yfxfyxf +≥≤+ In the present paper we reproof some of the above results by simpler method using different technique as well as we present many other new results. 2000 Mathematics Subject Classification : 33D05. Key words : q-digamma function, integral inequality. 1. Introduction Let c be a complex number, the q-shifted factorial are defined by

(1.1) ( ) ( ) ( ) ,.....2,1,1,,1;1

00 =−== ∏

=

ncqqcqcn

k

kn

(1.2) ( ) ( ) ( ).1;lim; ∏∞

=∞→∞ −==

ok

knn

cqqcqc

For x complex we denote

(1.3) [ ] .1

1q

qxx

q −−

=

The q-Jakson integrals from 0 to c are defined by [5,6]

(1.4) ( ) ,)1()(00

n

n

nc

q qcqfcqxdxf ∑∫∞

=

−=

and

(1.5) ( ) n

n

nq qqfqxdxf ∑∫

−∞=

−= )1()(0

,

provided the sum converges absolutely . The q-analogue of the Gamma function is defined by Jakson [6] as follows

(1.6) ( )( ) ,,......2,1,0,)1(

;;

)( 1 −−≠−=Γ −

∞ xqqq

qqx x

xq

and it is satisfying the following (1.7) [ ] ,1)1(),()1( =ΓΓ=+Γ qqq xxx and tends to )(xΓ as .1→q

301

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,301-308,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 302: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

The q-integral representation of the Gamma function is (see [2,4]) as follows

(1.8) ,)()(0

1 tdetxKx qt

qx

qq−

∞−∫=Γ

where

( ) ,;)1(

1

∞−=

qtqet

q

and

( ) ( )

( ) ( )∞−−∞

∞−

∞−

−−−−−−−−

×−+

−=

qqqqqqqqqq

qqtK tt

x

q ;)1(;)1(;)1();1(

)1(1)1()( 11

1

1 .

The q-analogue of the psi function )()()(

xxx

ΓΓ′

=ψ is defined as the logarithmic

derivative of the q-gamma function, that is .)()(

)(xx

xq

qq Γ

Γ′=ψ

From (1.6), we obtain for 0>x

∑∞

=+

+

−+−−=

0 1log)1log()(

nxn

xn

q qqqqxψ

(1.9) ,1

log)1log(1∑∞

= −+−−=

nn

nx

qqqq

(1.10) .11

log)1log(0

1

tdt

tqqq q

q x

∫ −−+−−=

For ,0>x we put

⎟⎟⎠

⎞⎜⎜⎝

⎛−=

)log()log(

)log()log()(

qxE

qxxα

and

[ ][ ]( ) ,

qxxq

qq

xx α+=

where ⎟⎟⎠

⎞⎜⎜⎝

⎛)log()log(

qxE is the integer part of .

)log()log(

qx

From (1.9) one can deduce that

(1.11) ∑∞

=

+

−=

1

1)(

1log)(

nn

nxkkk

q qqnqxψ .

2. results We start with the following Lemma Lemma 2.1. Let ,10,0, <≤> ayx then (2.1) yxyx aaa +≥+ ,

SULAIMAN: q-DIGAMMA FUNCTIONS

302

Page 303: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

and the function yxyx aaaxf +−+=)( is non-increasing. Proof. On keeping y fixed, we have .0)(log)( ≤−=′ + yxx aaaxf Therefore f is non-increasing. Since ,0)(lim >=

∞→

y

xaxf then .0)( ≥xf

A short proof is giving for the following Lemma Lemma 2.2[7]. For 2

10 << q and ,10 << x we have .0)( <xqψ Proof. From (1.9),

∑∞

= −+−−=

1 1log)1log()(

nn

nx

qqqqxψ

∑∞

=

+−−≤1

log)1log(n

nxqqq

x

x

qqqq−

+−−=1

log)1log(

q

qqq−

+−−≤1

log)1log( = ,0)1(

log 1 <− −q

q

qq

as qq qq −−< 1)1( for .0 21<< q

The following results extend the scope of Lemma 2.2 to .10 << q Lemma 2.3. For ,10.10 <<<< xq we have .0)( <xqψ Proof. We have

∑∞

= −+−−=

1 1log)1log()(

nn

nx

qqqqxψ

∑∞

= −+−−<

1 1log)1log(

nn

n

qqqq

dxq

qqq x

x

∫∞

−+−−=

1 1log)1log(

∫ −−

+−−=q

uduq

0 1)1log(

.0)1log()1log( =−+−−= qq The following result is proved in three different methods Theorem 2.4[7]. For all 10 << q and ,1,0 << yx (2.2) )()()( yxyx ψψψ +<+ . Proof. Method 1. By Lemma 2.1, yxyxn qqq −−+ )( is non-decreasing in both x and y .

SULAIMAN: q-DIGAMMA FUNCTIONS

303

Page 304: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

∑∞

=

+

−−−

+−=−−+1

)(

1log)1log()()()(

nn

nynxyxn

qqq qqqqqqyxyx ψψψ

∑∞

= −−

+−≥1

2

12log)1log(

nn

nn

qqqqq

∑∑∞

=

= −−−−=

11 1loglog)1log(

nn

n

n

n

qqqqqq

dzq

qqqq

qq z

z

∫∞

−−

−−−=

1 1loglog

1)1log(

∫ −+

−−−=

q

uduq

qqq

0 1log

1)1log(

.0log1

>−

−= qq

q

Method 2. This method is restricted to .0,0 ∞<<> yx Write .)()()()( yxyxxf ψψψ −−+= On keeping y fixed, we have )()()( xyxxf ψψ ′−+′=′

( ) .01

log )(

1

2 ≤−−

= +∞

=∑ xyxn

nn qq

qnq

Therefore f is non-increasing . As ,0)()(lim >−=

∞→yxf

xψ then .0)( ≥xf

Method 3. We have )()()( )1()1()1( yxyx qqq ψψψ +≤+ , Let a,c be chosen such that ,0 xa << aycy +<< and

)()()()( )1( acayxa qqq ψψψ −′≥− , then we have

dxydxxdxyx q

a

xq

a

xq

a

x

)()()( )1()1()1( ψψψ ∫∫∫ +≤+

that is )()()()()()( )1( yxaxayxya qqqqq ψψψψψ −+−≤+−+ or )()()()()()()()( )1( yaxayyayxyx qqqqqq ψψψψψψψ −+−−+++≥+ . Since, by the mean value theorem ,)()()( cayya qqq ψψψ ′=−+ for some ,yacy +<< then ( ) )()()()()()( yaxacayxyx qqqqq ψψψψψψ ′−+−′++≥+ .)()( yxq ψψ +≥

SULAIMAN: q-DIGAMMA FUNCTIONS

304

Page 305: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

)()()()()( )1( yaxaxy qqqq ψψψψ −+−+≥ ).()( xy qq ψψ +≥ An easy proof is given for the following theorem Theorem 2.5[7]. Let ).1,0(∈q Let 1≥k be an integer. (1) If k is even, then (2.3) )()()( )()()( yxyx kkk ψψψ +≥+ . (2) If k is odd, then (2.4) )()()( )()()( yxyx kkk ψψψ +≤+ . Proof. Making use of (1.11) , we have via Lemma 2.1, when k is even )()()( )()()( yxyx kkk ψψψ −−+

( ) .01

log )(

1

1 ≥−−−

= +∞

=

+ ∑ nynxyxn

nn

kk qqq

qnq

If k is odd, the above inequality reverses . The following results are all new : Theorem 2.6. Let 1≥k be an integer, ,1,1 11 =+> tss then

(i) If k odd, (2.5) ( ) ( ) ( ) .)()( /1)(/1)()( tk

qsk

qty

sxk

q yx ψψψ ≤+ (ii) If k even (2.5) reverses. In particular, for odd k ( )( ) ,)()( )()(2

2)( yx k

qk

qyxk

q ψψψ ≤+ the above inequality reverses if k is even. If k is odd, then ( )( ) )()( )()(2)( yxyx k

qk

qk

q ψψψ ≤+ . Proof.

( ) ∑∞

=

⎟⎠⎞

⎜⎝⎛ +

+

−=+

1

1)(

1log

nn

ty

sxn

kk

ty

sxk

q qqnqψ

( ) ( )tn

tny

tk

n sn

snx

sk

k

q

qn

q

qnq 11

11

11log

−−= ∑

=

+

t

nn

nyks

nn

nxkk

qqn

qqnq

/1

1

/1

1

1

11log ⎟⎟

⎞⎜⎜⎝

⎛−⎟⎟

⎞⎜⎜⎝

⎛−

≤ ∑∑∞

=

=

+

SULAIMAN: q-DIGAMMA FUNCTIONS

305

Page 306: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

t

nn

nykk

s

nn

nxkk

qqnq

qqnq

/1

1

1/1

1

1

1log

1log ⎟⎟

⎞⎜⎜⎝

⎛−⎟⎟

⎞⎜⎜⎝

⎛−

= ∑∑∞

=

+∞

=

+

( ) ( ) .)()( /1)(/1)( tkq

skq yx ψψ=

On putting ,21== ts we obtain

( )( ) .)()( )()(2

2)( yx k

qk

qyxk

q ψψψ ≤+

If k is odd, )()( xkqψ is decreasing and hence

( ) ( )( ) )()()( )()(2

2)(2 yxyx k

qk

qyxk

qψψψψ ≤≤+ + .

Theorem 2.7. Let 1≥k be an odd integer. Then (2.6) ( ) ( ) .(()( /1)(/1)()( ttk

qssk

qk

q yxxy ψψψ ≤ In particular for ,1, ≥yx

(2.7) ( ) )()()( )()(2)( yxxy kq

kq

kq ψψψ ≤ .

Proof.

∑∞

=

+

−=

1

1)(

1log)(

nn

nxykkk

q qqnqxyψ

∑∞

=

⎟⎟⎠

⎞⎜⎜⎝

⎛+

+

−≤

1

1

1log

nn

ty

sxn

kk

qqnq

ts

t

nn

nykk

s

nn

nxkk

qqnq

qqnq

ts /1

1

1

/1

1

1

1log

1log ⎟

⎟⎠

⎞⎜⎜⎝

−⎟⎟⎠

⎞⎜⎜⎝

−≤ ∑∑

=

+∞

=

+

( ) ( ) .(( /1)(/1)( ttkq

sskq yx ψψ=

In particular, If ,1, ≥yx then )()( )()( xx k

qsk

q ψψ < , and the same for y and hence we have ( ) ( ) .()()( /1)(/1)()( tk

qsk

qk

q yxxy ψψψ ≤ On putting ,2== ts we obtain

( ) .)()()( )()(2)( yxxy kq

kq

kq ψψψ ≤

Theorem 2.8. Let .0, >ba Define

( ))2(

)1()1(1,1

byaxbyax

byaxBq

qqq ++Γ

+Γ+Γ=++ .

Then the function qB is non-increasing Proof. Define

( ) .)2(

)1()1(1,1)(

byaxbyax

byaxBxfq

qqq ++Γ

+Γ+Γ=++=

)2(log)1(log)1(log)(log byaxbyaxxf qqq ++Γ−+Γ++Γ=

SULAIMAN: q-DIGAMMA FUNCTIONS

306

Page 307: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

On keeping y fixed and differentiating with respect to x, we have

)2()2(

)1()1(

)()(

byaxbyaxa

axaxa

xfxf

+++Γ++Γ′

−+Γ+Γ′

=′

)2()1( byaxaaxa qq ++Ψ−+= ψ

( )( ) .01

log 1

1

≤−−

= ++∞

=∑ byaxnnax

nn

n

qqq

qqa

Theorem2.9. Let .1,1 11 =+> tss Then

(2.8) ( ) ( ) ttssq qyqxqxy /1/1 )1log()()1log()()1log()( −+Ψ−+Ψ≥−+Ψ .

Proof. We have

∑∞

=

⎟⎟⎠

⎞⎜⎜⎝

⎛+

−+−−=Ψ

1 1log)1log()(

nn

ty

sxn

q qqqqxy

ts

( ) ( ) tn

tny

nsn

snx

qq

qqqq

ts

/11

/1 11log)1log(

−−+−−= ∑

=

t

nn

nys

nn

nx

qq

qqqq

ts /1

1

/1

1 11log)1log( ⎟

⎟⎠

⎞⎜⎜⎝

−⎟⎟⎠

⎞⎜⎜⎝

−+−−≥ ∑∑

=

=

,1

log1

log)1log(/1

1

/1

1

t

nn

nys

nn

nx

qqq

qqqq

ts

⎟⎟⎠

⎞⎜⎜⎝

−⎟⎟⎠

⎞⎜⎜⎝

−+−−= ∑∑

=

=

which implies ( ) ( ) ttss

q qyqxqxy /1/1 )1log()()1log()()1log()( −+Ψ−+Ψ≥−+Ψ

References [1] K. Brahim, Turan type inequalities for some q-special functions, J. Inequal. Pure Appl. Math.,10 (2) (2009), Art.50. [2] A. De. Sole and V. G. Kac, On integral representation ofq-gamma and q-beta Function, Atti. Accad. Naz. Lincei Cl.. Fis. Sci. Mat. Natur. Rend. Lincei Mat. Appl., 16(9) (2005), 11-29. [3] A. Fitouhi, N. Bettaibi and K. Brahim, The Mellin transform in quantum calculus Constructive Approximation, 23 (3) (2006), 305-323. [4] A. Fitouhi and K. Brahim, Tauberian theorems in quantum calculus, J. Nonlinear Mathematical Physics, 14(3) (2007), 316-332. [5] G. Gasper and M. Rahman, Basic hypergeometric series, Encyclopedia of Math- ematics and its Applications, Vol.35, Cambridge Univ. Press, Cambridge, UK, 1990. [6] F. H. Kackson, On a q-definite integral, Quarterly J. Pure and Appl. Math., 41 (1910), 193-203.

SULAIMAN: q-DIGAMMA FUNCTIONS

307

Page 308: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

[7] T. Mansour and A. S. Shabani, Some inequalities for the q-digamma function, J, Inequal. Pure Appl. Math.,10(1) (2009), Art. 12.

SULAIMAN: q-DIGAMMA FUNCTIONS

308

Page 309: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Some Product Summability Of An Infinite Series

W. T. Sulaiman

Abstract. New results concerning product summability of an infinite series are given. Some special cases are

also deduced.

1. Introduction Let ∑ na be a given infinite series with partial sums ns . Let α

nu denote the nth

Cesaro mean of order 1−>α of the sequence ( )ns . The series ∑ na is summable

,1,, ≥kCk

α if

(1) ( ).]1[11

1 Flettuunk

nnn

k ∞<− −

=

−∑ αα

For k

C αα ,,1= reduces to k

C 1, summability. Let ( )np be a sequence of positive real constants such that ∞→++= nn ppP ...0 As ∞→n ( ).011 == −− pP The ( )pN , transform nφ of ( )ns generated by ( )np is defined by

(2) .10∑=

−=n

vvvn

nn sp

The sequence - to – sequence transformation

∑=

=Φn

vvv

nn sp

P 0

1

defines the sequence ( )nΦ of ( )npN , transform of ( )ns generated by ( ).np The series ∑ na is summable ,1,, ≥kpR

kn if

(3) .11

1 ∞<Φ−Φ −

=

−∑ knn

n

kn

In the special case when 1=np for all n (resp. k=1) , knpR, summability reduces

to k

C 1, (resp. npR, ) summability .

309

JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS, VOL.10, NO.’S 3-4,309-318,2012,COPYRIGHT 2012 EUDOXUS PRESS LLC

Page 310: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

The series ∑ na is said to be summable ( )( )qNpN ,, , when the ( )pN , transform

of the ( )qN , transform of ( )ns is a sequence of bounded variation (see Das [2]) . We give the following new definition : Let ( )nT defines the sequence of the ( )nqN , transform of the ( )npN , transform of ( )ns generated by the sequences ( )nq and ( )np respectively. The series ∑ na is

said to be summable ( )( ) ifkpRqRknn ,1,,, ≥

(4) .1

11 ∞<−∑

=−

−k

nnn

k TTn

We may assume through the paper that ,,...0 ∞→∞→++= nasqqQ nn

2. New Results We state and prove the following Theorem 1. Let ( )nk λ,1≥ be a sequence of constants. Define

∑∑==

==n

vrrrv

n

vr r

rv fpF

Pq

f , .

Let ( ),)5( vvv PQp Ο=

( )

.)6(1

1 1

1

⎟⎟⎠

⎞⎜⎜⎝

⎛Ο=

−∞

+= −

∑ kv

kv

vn nkn

kn

k

Qvq

QQqn

Then sufficient conditions for the implication

(7) ( )( )knnnnknn pRqRsummableisapRsummableisa ,,, ∑∑ ⇒ λ

are ( ) ,)8( vvn QF Ο=λ

( ),1)9( Ο=vvv fP λ

( ),)10( vvv Qp Ο=λ

(11) ( ),nnn pP Ο=λ

( ),)12( vvvvv QpFP Ο=∆λ and ( ).)13( vvvv QpP Ο=∆λ Proof. Let ( )nS be the sequence of partial sums of ∑ nna λ . Let nn Vv , be the

( ) ( )( )nnn pNqNpN ,,,, transforms of the sequences ( ) ( )nn Ss , respectively. We

SULAIMAN: PRODUCT SUMMABILITY

310

Page 311: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

write ., 11 −− −=−= nnnnnn VVTvvt Therefore

(14) ∑=

−−

=n

vvv

nn

nn aP

PPp

t1

11

,

and

∑∑==

=r

vvv

r

n

rr

nn Sp

Pq

QV

00

11

∑∑==

=n

vr r

rn

vvv

n Pq

SpQ 0

1

.10∑=

=n

vvvv

n

fSpQ

1−−= nnn VVT

101 −=−

+= ∑n

nnnn

rrrr

nn

n

QfSp

fSpQQq

∑∑ ∑=−= =−

+=n

vvv

nn

nnv

r

r

vvvrr

nn

n aQPqp

afpQQq

010 01

λλ

∑ ∑∑= =−=−

+=n

vr

n

vvv

nn

nnrr

n

vvv

nn

n aQPqp

fpaQQq

0101

)15( λλ

11

1111

11 −=

−−=−=

−−

∑∑∑ +=v

vn

vvv

nn

nnn

vrrr

v

vn

vvv

nn

n

PaP

QPqp

fpP

aPQQq λλ

⎟⎟⎠

⎞⎜⎜⎝

⎛⎟⎠

⎞⎜⎝

⎛+⎟⎟⎠

⎞⎜⎜⎝

⎛∆⎟⎠

⎞⎜⎝

⎛= ∑ ∑∑∑

= −=−

=−=−

1

1 111

111

1

n

v n

nnnn

vvv

n

vrrr

v

vv

v

rrr

nn

n

Qfp

aQfpQ

aQQQq λλ

⎟⎟⎠

⎞⎜⎜⎝

⎛⎟⎠

⎞⎜⎝

⎛+⎟⎟⎠

⎞⎜⎜⎝

⎛∆⎟⎠

⎞⎜⎝

⎛+ ∑ ∑∑

= −=−

−=−

1

1 111

111

1

n

v n

nn

vvv

v

vv

rrr

nn

nn

PaP

PaP

QPqp λλ

nnnn

n

vvvv

v

vvvvvvvv

nn

n ftPFtp

PftPFt

QQq

λλλλ +⎟⎟⎠

⎞⎜⎜⎝

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛∆++= ∑

=+

−−

1

11

11

1

,1

1

1

1nn

n

nn

vvv

v

vvvv

nn

nn tpP

tp

Ptp

QPqp

λλλ +⎟⎟⎠

⎞⎜⎜⎝

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛∆++ ∑

=

.7

1∑=

=j

njT

In order to complete the proof, it sufficient to show that

.7,6,5,4,3,2,1,

1

1 =∞<∑∞

=

− jTnk

njn

k

Applying Holder's inequality,

SULAIMAN: PRODUCT SUMMABILITY

311

Page 312: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

kn

vvvv

nn

nm

n

kkn

m

n

k FtQQq

nTn ∑∑∑−

=−

+

=

−+

=

− =1

11

1

2

11

1

2

1 λ

11

1 1

1

11

1

2 1

1 1−

= −

=−

+

= −

⎟⎟⎠

⎞⎜⎜⎝

⎛≤ ∑∑∑

kn

v n

vv

kv

kv

n

vkv

m

n nkn

kn

k

Qq

FtqQQ

qn k

λ

( ) ∑∑+

+= −

=−

Ο=1

1 1

1

11

11m

vn nkn

kn

kk

vk

vk

v

m

vkv QQ

qnFt

( ) ( ).111

1 Ο=Ο= ∑=

−kv

kv

kvk

v

m

v

k

QF

tvλ

kn

vvvvv

nn

nm

n

kkn

m

n

k ftPQQq

nTn ∑∑∑−

=−

+

=

−+

=

− =1

11

1

1

2

12

1

2

1 λ

11

1 1

1

11

1

2 1

1 −−

= −

=−

+

= −

⎟⎟⎠

⎞⎜⎜⎝

⎛≤ ∑∑∑

kn

v n

vkv

kv

kv

n

vkv

kv

m

n nkn

kn

k

Qq

ftqP

QQqn

λ

( ) ∑∑+

+= −

=−

Ο=1

1 1

1

111

m

vn nkn

kn

kk

vk

vk

v

m

vkv

kv

QQqn

ftqP

λ

( ) kv

kvk

v

kvk

v

m

v

k fQP

tv λ∑=

−Ο=1

11

( ) ( ).111

1 Ο=Ο= ∑=

− kv

m

v

k tv

kn

vvvv

v

v

nn

nm

n

kkn

m

n

k Ftp

PQQq

nTn ∑∑∑−

=+

+

=

−+

=

− ∆=1

11

1

1

1

2

13

1

2

1 λ

kn

v n

vkv

kv

kv

n

vkv

kv

kv

nkn

kn

m

n

k

QqFt

qpP

QQqn ⎟⎟

⎞⎜⎜⎝

⎛∆≤ ∑∑∑

= −

=−

+

=

−1

1 1

1

11

1

1

1

1 λ

( ) ∑∑+

+= −

=−

∆Ο=1

1 1

1

111

m

vn nkn

kn

kk

vk

vk

v

m

vkv

kv

kv

QQqn

Ftqp

( ) ( ).111

1 Ο=∆Ο= ∑=

−kv

kv

kvk

vk

vk

v

m

v

k

QpP

Ftv λ

knnnn

m

n

kkn

m

n

k ftPnTn λ∑∑=

=

− =1

14

1

1

( ) ( ).111

1 Ο=Ο= ∑=

− kn

kn

kn

kn

m

n

k fPtn λ ,

kn

vvvv

nn

nnm

n

kkn

m

n

k tpQPqp

nTn ∑∑∑−

=−

+

=

−+

=

− =1

11

1

2

15

1

2

1 λ

SULAIMAN: PRODUCT SUMMABILITY

312

Page 313: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

( ) ∑∑+

+= −

−=

Ο=1

1 1

1

11

11m

vn nkn

kn

k

kv

kv

km

vv

kv QQ

qnq

tp λ

( ) ( ).111

1 Ο=Ο= ∑=

−kv

kvk

vk

v

m

v

k

Qp

tv λ

kn

vvv

v

v

nn

nnm

n

kkn

m

n

k tp

PQPqp

nTn ∑∑∑−

=

+

=

−+

=

− ∆=1

1

1

1

1

2

16

1

2

1 λ

11

1 1

1

11

1

1

2

1−

= −

=−

+

=

−⎟⎟⎠

⎞⎜⎜⎝

⎛∆≤ ∑∑∑

kn

v n

vkv

kv

n

vkk

v

kv

nk

n

kn

kn

m

n

k

Qq

tqp

PQPqp

n λ

( )1

1

1

1

11

11−

+

+=

=− ∑∑ ∆Ο=

nk

n

kn

kn

m

vn

kkv

kv

m

vkv

kv

k

QPqp

ntqp

( ) ( ).111

1 Ο=∆Ο= ∑=

−kv

kv

kvk

vk

v

m

v

k

QpP

tv λ

Finally

k

nnn

nm

n

kkn

m

n

k tpP

nTn λ∑∑=

=

− =1

17

1

1

( ) ( ).111

1 Ο=Ο= ∑=

−kn

knk

nk

n

m

n

k

pP

tn λ

This completes the proof of the theorem .

Theorem 2 . Let

(16) ( )

,1

1 1

1

⎟⎟⎠

⎞⎜⎜⎝

⎛Ο=

−∞

+= −

∑ kv

kv

vn nk

v

kn

k

Pvp

PPpn

(17) ( ),vvv QpP Ο= (18) ( ).nn nqQ Ο= Then necessary conditions for the implication (8) to be satisfied are

( ) ( ) .1

,,1 1

/11/111

⎟⎟⎠

⎞⎜⎜⎝

⎛+

Ο=∆⎟⎟⎠

⎞⎜⎜⎝

⎛Ο=⎟⎟

⎞⎜⎜⎝

⎛+

Ο=+

−−−

v

v

v

vk

vvv

vk

vv

v

vv

vvv P

pF

QvfPQv

Pp

qFQQ

λλλ

Proof . For 1≥k define ( ) ∑=

knjj pRsummableisaaA ,:* ,

( ) ( )( ) .,,:*knnjjj pRqRsummableisbbB ∑= λ

SULAIMAN: PRODUCT SUMMABILITY

313

Page 314: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

From (15), we have

(19) vv

n

v nn

nn

nn

vnn a

QPqp

QQFq

T λ∑= −−

⎟⎟⎠

⎞⎜⎜⎝

⎛+=

1 11

With nn Tandt as defined by (14) and (19), the spaces ** BandA are BK-spaces with norms defined by

(20) k

kn

n

kk tntc/1

1

101 ⎭

⎬⎫

⎩⎨⎧

+= ∑∞

=

− ,

(21) ./1

1

102

kk

nn

kk TnTc⎭⎬⎫

⎩⎨⎧

+= ∑∞

=

respectively. By the hypothesis of the theorem, (22) ∞<⇒∞<

21cc .

The inclusion map **: BAi → defined by i(a) = a is continuous since *A and *B are BK-spaces. By the closed graph theorem, there exist a constant K>0 such

that (23) .

12cKc ≤

Let ne denote the nth coordinate vector. From (14) and (19), with ( )na defined by

0,,1 ==−= + nnnn avneea otherwise, we have

⎪⎪⎪⎪

⎪⎪⎪⎪

>−

=

<

=

.,

,

,0

1

vnPPpp

vnPp

vn

t

nn

vn

v

vn

and

⎪⎪⎪⎪

⎪⎪⎪⎪

>⎟⎟⎠

⎞⎜⎜⎝

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛+∆

=⎟⎟⎠

⎞⎜⎜⎝

⎛+

<

=

−−

−−

.,

,0

11

11

vnQPqp

QQFq

vnQPqp

QQFq

vn

T

vnn

nn

nn

vnv

vvv

vv

vv

vvn

λ

λ

SULAIMAN: PRODUCT SUMMABILITY

314

Page 315: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

From (20) and (21), we have

(24) ,

/1

11

111

kk

nn

vn

vn

kk

v

vk

PPpp

nPp

vc⎪⎭

⎪⎬⎫

⎪⎩

⎪⎨⎧

⎟⎟⎠

⎞⎜⎜⎝

⎛+⎟⎟

⎞⎜⎜⎝

⎛=

+=

−− ∑

kk

vnn

nn

nn

vnv

vn

k

k

vvv

vv

vv

vvk

QPqp

QQFq

nQPqp

QQFq

vc

/1

111

1

11

12

)25(⎪⎭

⎪⎬⎫

⎪⎩

⎪⎨⎧

⎟⎟⎠

⎞⎜⎜⎝

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛+∆+⎟⎟

⎞⎜⎜⎝

⎛+=

−−

+=

−−

− ∑ λλ

Applying (23), we obtain

(26) k

vnn

nn

nn

vnv

vn

k

k

vvv

vv

vv

vvk

QPqp

QQFq

nQPqp

QQFq

v ⎟⎟⎠

⎞⎜⎜⎝

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛+∆+⎟⎟

⎞⎜⎜⎝

⎛+

−−

+=

−−

− ∑ λλ111

1

11

1

( ) .111

11

⎟⎟

⎜⎜

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛+⎟⎟

⎞⎜⎜⎝

⎛Ο=

+=

−− ∑k

nn

vn

vn

kk

v

vk

PPpp

nPp

v

As the R.H.S of (26), by (16), is

( )⎟⎟

⎜⎜

⎛+⎟⎟

⎞⎜⎜⎝

⎛Ο= ∑

+= −

−−

1 1

1

111

vn nk

n

kn

k

kv

kv

k

v

vk

PPpn

Pp

Pp

v

( ) ⎟⎟

⎜⎜

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛+⎟⎟

⎞⎜⎜⎝

⎛Ο= −

k

v

vkk

v

vk

v

vk

Pp

vPp

Pp

v 11

11

,1

⎟⎟

⎜⎜

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛Ο= −

k

v

vk

Pp

v

and the fact that each term of the L.H.S of (26) is ⎟⎟

⎜⎜

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛Ο −

k

v

vk

Pp

v 1 , we obtain

⎟⎟

⎜⎜

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛Ο=⎟⎟

⎞⎜⎜⎝

⎛+ −

−−

k

v

vkkv

k

vv

vv

vv

vvk

Pp

vQPqp

QQFq

v 1

11

1 λ ,

which implies by (17)

( )k

v

vkv

kv

k

vv

v

Pp

FQQq

⎟⎟⎠

⎞⎜⎜⎝

⎛Ο=+⎟⎟

⎞⎜⎜⎝

λ11

,

that is

( ) ⎟⎟⎠

⎞⎜⎜⎝

⎛+

Ο= −

v

v

vv

vvv P

pqF

QQ1

1λ .

Also, we have, by (26),

(27) ⎟⎟

⎜⎜

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛Ο=∆⎟⎟

⎞⎜⎜⎝

⎛++⎟⎟

⎞⎜⎜⎝

⎛ −

−−

+

+=

−∑k

v

vk

k

vnn

nn

nn

vnv

nn

vvn

vn

k

Qq

vQPqp

QQFq

QQfpq

n 1

11

1

11

1 λλ .

SULAIMAN: PRODUCT SUMMABILITY

315

Page 316: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

The above , via the linear independence of vv and λλ ∆ , implies

⎟⎟

⎜⎜

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛Ο=∆⎟⎟

⎞⎜⎜⎝

⎛+ −

+= −−

+−∑k

v

vkkv

k

vn nn

nn

nn

vnk

Pp

vQPqp

QQFq

n 1

1 11

11 λ

( ) ⎟⎟

⎜⎜

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛Ο=⎟⎟

⎞⎜⎜⎝

⎛+∆ −

+=

−+ ∑

k

v

vkk

nn

n

vn

kkv

kv P

pvQQqnF 1

11

111λ (by (17))

As, by (18), via the mean value theorem,

( ) ( ) ( ) ,11111

11

1

1 1

11

1 1

1

1 1

k

nn

n

vn

k

vnkn

kn

nkn

vnkn

kn

kn

vnkn

kv QQ

qn

QQqQ

QQ

Q

QQ ⎟⎟⎠

⎞⎜⎜⎝

⎛Ο=Ο=

∆Ο=⎟⎟

⎞⎜⎜⎝

⎛∆=

+=

−∞

+= −

−−

+= −

−∞

+= −∑∑∑∑

we get

( ) ,11 11 ⎟

⎜⎜

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛Ο=+∆ −

+

k

v

vk

v

kv

kv P

pv

QFλ

which implies

.1 1

/11

⎟⎟⎠

⎞⎜⎜⎝

⎛+

Ο=∆+

v

v

v

vk

v Pp

FQv

λ

Also, by (26),

,1

11

1

⎟⎟

⎜⎜

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛Ο= −

−+=

−∑k

v

vkk

vnn

vvn

vn

k

Pp

vQQ

fpqn λ

,1

11

1

⎟⎟

⎜⎜

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛Ο=⎟⎟

⎞⎜⎜⎝

⎛ −

+=

−∑k

v

vkk

nn

n

vn

kkv

kv

kv P

pv

QQq

nfp λ

⎟⎟

⎜⎜

⎛⎟⎟⎠

⎞⎜⎜⎝

⎛Ο= −

k

v

vkkv

kv

kv

kv P

pv

Qfp 11λ ,

which implies

./11

⎟⎟⎠

⎞⎜⎜⎝

⎛Ο=

vv

vk

v fPQv

λ

3. Applications Corollary 3. Let .1≥k Define

(28) ., ∑∑==

==n

vrrv

n

vr

rv fF

rq

f

Let (29) ( ),vQv Ο= (30) ( )vv qf Ο= . Then sufficient conditions for the implication

SULAIMAN: PRODUCT SUMMABILITY

316

Page 317: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

(31) ∑ na is summable knqR, ∑⇒ nna λ is summable ( )( )

kn CqR 1,, are (32) ,nn Q<λ

(33) ( ),1Ο=vv fλ

(34) ( )vvv QF Ο=λ ,

(35) ( ),vvv qF Ο=∆λ

(36) ( ).vv qΟ=∆λ Proof. Follows from theorem 1 by putting 1=np for all n. Corollary 4. Let .1≥k Define

(37) .,1 ∑∑==

==n

vrrrv

n

vr rv fpF

Pf

Let (38) ( ),vv Pvp Ο= (39) ( ).vfP vv Ο= Then sufficient conditions for the implication (40) ∑ na is summable ∑⇒ nnk

aC λ1, is summable ( )( ) knpRC ,1, are (41) ,nn <λ

(42) ( ),vvv Pvp Ο=λ

(43) ( ),vFvv Ο=λ

(44) ( ),1Ο=∆ vv Fλ

(45) ( ).1Ο=∆ vλ Proof. This follows from theorem 1, by putting 1=nq for all n, noticing that (3) is obviously satisfied as

(46) ( ) .111

11

111 vnnnn vnvn

=⎟⎠⎞

⎜⎝⎛ −

−=

− ∑∑∞

+=

+=

Corollary 5. Let vv Ff , be as defined in (28) . Let (18) be satisfied and (47) ( ).nQn Ο= Then necessary conditions for the implication (31) are

( ) ( ).

1,,

1 /11

/111

⎟⎟⎠

⎞⎜⎜⎝

+Ο=∆⎟⎟

⎞⎜⎜⎝

⎛Ο=⎟⎟

⎞⎜⎜⎝

⎛+

Ο=+

−−

kv

vv

v

vk

vvv

vvv vF

Qvf

QvvqF

QQλλλ

Proof. Follows from theorem 4 by putting 1=np for all n, noticing that (16) is satisfied, the same as (46) .

SULAIMAN: PRODUCT SUMMABILITY

317

Page 318: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

Corollary 6. Let vv Ff , be as defined in (36) . Let (16) be satisfied and (48) ( ).vv vpP Ο= Then necessary conditions for the implication (40) are

.1

,,1 1

/12/122

⎟⎟⎠

⎞⎜⎜⎝

⎛+

Ο=∆⎟⎟⎠

⎞⎜⎜⎝

⎛Ο=⎟⎟

⎞⎜⎜⎝

⎛+

Ο=+

−−

v

v

v

k

vvv

k

vv

v

vv P

pF

vfP

vPp

Fv λλλ

Proof. Follows from theorem 4 by putting 1=nq for all n .

References [1] T.M.Flett, On an extension of absolute summability and some theorems of Littlewood and Paley, Proc. London. Math. Soc.7 (1957) 113-141. [2] G. Das, Tauberian theorems for absolute Norlund summability, Proc. London Math. Soc. 19 (1969) 357-384.

SULAIMAN: PRODUCT SUMMABILITY

318

Page 319: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

319

Page 320: JOURNAL OF CONCRETE AND APPLICABLE MATHEMATICS6) Angelo Favini Università di Bologna Dipartimento di Matematica Piazza di Porta San Donato 5 40126 Bologna, ITALY tel.++39 051 2094451

TABLE OF CONTENTS, JOURNAL OF CONCRETE AND

APPLICABLE MATHEMATICS, VOL. 10, NO.’S 3-4, 2012

A New Approach of Statistical Hypothesis Verification, Iuliana F. Iatan, …….…………….151

Elements of right delta fractional Calculus on Time Scales, George A. Anastassiou,……….…………………………………………………………………………..159

Center Manifolds For Some Partial Functional Differential Equations with Infinite Delay in Fading Memory Spaces, Mostafa Adimy, Khalil Ezzinbi and Catherine Marquet,……………………………………………………………………………………… 168

Fuzziffied Random Generalized Nonlinear Variational Like Inequalities, George A. Anastassiou, Salahuddin and M.K. Ahmad, ………………………………………………………………. 186

Spaces of type and a convolution product associated with a singular second order

differential operator, M.Dziri, M.Jelassi, L.T.Rachdi,………………………………………. 207

Multivariate complex general singular integral operators simultaneous approximation, George A. Anastassiou,…………………………………………………………………………………...233

Stability and superstability of *−bihomomorphisms on C*-ternary algebras, M. Eshaghi Gordji and A. Fazeli,………………………………………………………………………………… 245

Convergence of Complex General Singular Integral Operators, George A. Anastassiou and

Razvan A. Mezei,……………………………………………………………………………..259

On the MAC solution for a circular elastic plate, Igor Neygebauer,…………………………284

Approximate bi-homomorphisms and bi-derivations in normed Lie triple systems, Javad Shokri, Ali Ebadian, Rasoul Aghalari and Madjid Eshaghi Gordji,………………………………….291

Some Inequalities for the q-Digamma Functions, W. T. Sulaiman,………………………….301

Some Product Summability of an Infinite Series, W. T. Sulaiman,……………………….....309

320