journal of computational analysis and applicationscomputational mathematical analysis and its many...

200
Volume 22, Number 5 May 2017 ISSN:1521-1398 PRINT,1572-9206 ONLINE Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC

Upload: others

Post on 22-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Volume 22, Number 5 May 2017 ISSN:1521-1398 PRINT,1572-9206 ONLINE

Journal of Computational Analysis and Applications EUDOXUS PRESS,LLC

Page 2: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Journal of Computational Analysis and Applications ISSNno.’s:1521-1398 PRINT,1572-9206 ONLINE SCOPE OF THE JOURNAL An international publication of Eudoxus Press, LLC (fourteen times annually) Editor in Chief: George Anastassiou Department of Mathematical Sciences, University of Memphis, Memphis, TN 38152-3240, U.S.A [email protected] http://www.msci.memphis.edu/~ganastss/jocaaa The main purpose of "J.Computational Analysis and Applications" is to publish high quality research articles from all subareas of Computational Mathematical Analysis and its many potential applications and connections to other areas of Mathematical Sciences. Any paper whose approach and proofs are computational,using methods from Mathematical Analysis in the broadest sense is suitable and welcome for consideration in our journal, except from Applied Numerical Analysis articles. Also plain word articles without formulas and proofs are excluded. The list of possibly connected mathematical areas with this publication includes, but is not restricted to: Applied Analysis, Applied Functional Analysis, Approximation Theory, Asymptotic Analysis, Difference Equations, Differential Equations, Partial Differential Equations, Fourier Analysis, Fractals, Fuzzy Sets, Harmonic Analysis, Inequalities, Integral Equations, Measure Theory, Moment Theory, Neural Networks, Numerical Functional Analysis, Potential Theory, Probability Theory, Real and Complex Analysis, Signal Analysis, Special Functions, Splines, Stochastic Analysis, Stochastic Processes, Summability, Tomography, Wavelets, any combination of the above, e.t.c. "J.Computational Analysis and Applications" is a peer-reviewed Journal. See the instructions for preparation and submission of articles to JoCAAA. Assistant to the Editor: Dr.Razvan Mezei,Lenoir-Rhyne University,Hickory,NC 28601, USA. Journal of Computational Analysis and Applications(JoCAAA) is published by EUDOXUS PRESS,LLC,1424 Beaver Trail Drive,Cordova,TN38016,USA,[email protected] http://www.eudoxuspress.com. Annual Subscription Prices:For USA and Canada,Institutional:Print $700, Electronic OPEN ACCESS. Individual:Print $350. For any other part of the world add $130 more(handling and postages) to the above prices for Print. No credit card payments. Copyright©2017 by Eudoxus Press,LLC,all rights reserved.JoCAAA is printed in USA. JoCAAA is reviewed and abstracted by AMS Mathematical Reviews,MATHSCI,and Zentralblaat MATH. It is strictly prohibited the reproduction and transmission of any part of JoCAAA and in any form and by any means without the written permission of the publisher.It is only allowed to educators to Xerox articles for educational purposes.The publisher assumes no responsibility for the content of published papers.

780

Page 3: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Editorial Board

Associate Editors of Journal of Computational Analysis and Applications

Francesco Altomare Dipartimento di Matematica Universita' di Bari Via E.Orabona, 4 70125 Bari, ITALY Tel+39-080-5442690 office +39-080-3944046 home +39-080-5963612 Fax [email protected] Approximation Theory, Functional Analysis, Semigroups and Partial Differential Equations, Positive Operators. Ravi P. Agarwal Department of Mathematics Texas A&M University - Kingsville 700 University Blvd. Kingsville, TX 78363-8202 tel: 361-593-2600 [email protected] Differential Equations, Difference Equations, Inequalities George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis, TN 38152,U.S.A Tel.901-678-3144 e-mail: [email protected] Approximation Theory, Real Analysis, Wavelets, Neural Networks, Probability, Inequalities. J. Marshall Ash Department of Mathematics De Paul University 2219 North Kenmore Ave. Chicago, IL 60614-3504 773-325-4216 e-mail: [email protected] Real and Harmonic Analysis Dumitru Baleanu Department of Mathematics and Computer Sciences, Cankaya University, Faculty of Art and Sciences, 06530 Balgat, Ankara, Turkey, [email protected]

Fractional Differential Equations Nonlinear Analysis, Fractional Dynamics Carlo Bardaro Dipartimento di Matematica e Informatica Universita di Perugia Via Vanvitelli 1 06123 Perugia, ITALY TEL+390755853822 +390755855034 FAX+390755855024 E-mail [email protected] Web site: http://www.unipg.it/~bardaro/ Functional Analysis and Approximation Theory, Signal Analysis, Measure Theory, Real Analysis.

Martin Bohner Department of Mathematics and Statistics, Missouri S&T Rolla, MO 65409-0020, USA [email protected] web.mst.edu/~bohner Difference equations, differential equations, dynamic equations on time scale, applications in economics, finance, biology. Jerry L. Bona Department of Mathematics The University of Illinois at Chicago 851 S. Morgan St. CS 249 Chicago, IL 60601 e-mail:[email protected] Partial Differential Equations, Fluid Dynamics Luis A. Caffarelli Department of Mathematics The University of Texas at Austin Austin, Texas 78712-1082 512-471-3160 e-mail: [email protected] Partial Differential Equations George Cybenko Thayer School of Engineering

781

Page 4: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Dartmouth College 8000 Cummings Hall, Hanover, NH 03755-8000 603-646-3843 (X 3546 Secr.) e-mail:[email protected] Approximation Theory and Neural Networks Sever S. Dragomir School of Computer Science and Mathematics, Victoria University, PO Box 14428, Melbourne City, MC 8001, AUSTRALIA Tel. +61 3 9688 4437 Fax +61 3 9688 4050 [email protected] Inequalities, Functional Analysis, Numerical Analysis, Approximations, Information Theory, Stochastics. Oktay Duman TOBB University of Economics and Technology, Department of Mathematics, TR-06530, Ankara, Turkey, [email protected] Classical Approximation Theory, Summability Theory, Statistical Convergence and its Applications Saber N. Elaydi Department Of Mathematics Trinity University 715 Stadium Dr. San Antonio, TX 78212-7200 210-736-8246 e-mail: [email protected] Ordinary Differential Equations, Difference Equations Christodoulos A. Floudas Department of Chemical Engineering Princeton University Princeton,NJ 08544-5263 609-258-4595(x4619 assistant) e-mail: [email protected] Optimization Theory&Applications, Global Optimization J .A. Goldstein Department of Mathematical Sciences The University of Memphis Memphis, TN 38152 901-678-3130 [email protected]

Partial Differential Equations, Semigroups of Operators H. H. Gonska Department of Mathematics University of Duisburg Duisburg, D-47048 Germany 011-49-203-379-3542 e-mail: [email protected] Approximation Theory, Computer Aided Geometric Design John R. Graef Department of Mathematics University of Tennessee at Chattanooga Chattanooga, TN 37304 USA [email protected] Ordinary and functional differential equations, difference equations, impulsive systems, differential inclusions, dynamic equations on time scales, control theory and their applications Weimin Han Department of Mathematics University of Iowa Iowa City, IA 52242-1419 319-335-0770 e-mail: [email protected] Numerical analysis, Finite element method, Numerical PDE, Variational inequalities, Computational mechanics Tian-Xiao He Department of Mathematics and Computer Science P.O. Box 2900, Illinois Wesleyan University Bloomington, IL 61702-2900, USA Tel (309)556-3089 Fax (309)556-3864 [email protected] Approximations, Wavelet, Integration Theory, Numerical Analysis, Analytic Combinatorics Margareta Heilmann Faculty of Mathematics and Natural Sciences, University of Wuppertal Gaußstraße 20 D-42119 Wuppertal, Germany, [email protected]

782

Page 5: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Approximation Theory (Positive Linear Operators) Xing-Biao Hu Institute of Computational Mathematics AMSS, Chinese Academy of Sciences Beijing, 100190, CHINA [email protected] Computational Mathematics Jong Kyu Kim Department of Mathematics Kyungnam University Masan Kyungnam,631-701,Korea Tel 82-(55)-249-2211 Fax 82-(55)-243-8609 [email protected] Nonlinear Functional Analysis, Variational Inequalities, Nonlinear Ergodic Theory, ODE, PDE, Functional Equations. Robert Kozma Department of Mathematical Sciences The University of Memphis Memphis, TN 38152, USA [email protected] Neural Networks, Reproducing Kernel Hilbert Spaces, Neural Percolation Theory Mustafa Kulenovic Department of Mathematics University of Rhode Island Kingston, RI 02881,USA [email protected] Differential and Difference Equations Irena Lasiecka Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional Analysis, [email protected]

Burkhard Lenze Fachbereich Informatik Fachhochschule Dortmund University of Applied Sciences Postfach 105018 D-44047 Dortmund, Germany e-mail: [email protected] Real Networks, Fourier Analysis, Approximation Theory

Hrushikesh N. Mhaskar Department Of Mathematics California State University Los Angeles, CA 90032 626-914-7002 e-mail: [email protected] Orthogonal Polynomials, Approximation Theory, Splines, Wavelets, Neural Networks Ram N. Mohapatra Department of Mathematics University of Central Florida Orlando, FL 32816-1364 tel.407-823-5080 [email protected] Real and Complex Analysis, Approximation Th., Fourier Analysis, Fuzzy Sets and Systems Gaston M. N'Guerekata Department of Mathematics Morgan State University Baltimore, MD 21251, USA tel: 1-443-885-4373 Fax 1-443-885-8216 Gaston.N'[email protected] [email protected] Nonlinear Evolution Equations, Abstract Harmonic Analysis, Fractional Differential Equations, Almost Periodicity & Almost Automorphy M.Zuhair Nashed Department Of Mathematics University of Central Florida PO Box 161364 Orlando, FL 32816-1364 e-mail: [email protected] Inverse and Ill-Posed problems, Numerical Functional Analysis, Integral Equations, Optimization, Signal Analysis Mubenga N. Nkashama Department OF Mathematics University of Alabama at Birmingham Birmingham, AL 35294-1170 205-934-2154 e-mail: [email protected] Ordinary Differential Equations, Partial Differential Equations Vassilis Papanicolaou Department of Mathematics

783

Page 6: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

National Technical University of Athens Zografou campus, 157 80 Athens, Greece tel:: +30(210) 772 1722 Fax +30(210) 772 1775 [email protected] Partial Differential Equations, Probability Choonkil Park Department of Mathematics Hanyang University Seoul 133-791 S. Korea, [email protected] Functional Equations Svetlozar (Zari) Rachev, Professor of Finance, College of Business, and Director of Quantitative Finance Program, Department of Applied Mathematics & Statistics Stonybrook University 312 Harriman Hall, Stony Brook, NY 11794-3775 tel: +1-631-632-1998, [email protected] Alexander G. Ramm Mathematics Department Kansas State University Manhattan, KS 66506-2602 e-mail: [email protected] Inverse and Ill-posed Problems, Scattering Theory, Operator Theory, Theoretical Numerical Analysis, Wave Propagation, Signal Processing and Tomography Tomasz Rychlik Polish Academy of Sciences Instytut Matematyczny PAN 00-956 Warszawa, skr. poczt. 21 ul. Śniadeckich 8 Poland [email protected] Mathematical Statistics, Probabilistic Inequalities Boris Shekhtman Department of Mathematics University of South Florida Tampa, FL 33620, USA Tel 813-974-9710 [email protected]

Approximation Theory, Banach spaces, Classical Analysis T. E. Simos Department of Computer Science and Technology Faculty of Sciences and Technology University of Peloponnese GR-221 00 Tripolis, Greece Postal Address: 26 Menelaou St. Anfithea - Paleon Faliron GR-175 64 Athens, Greece [email protected] Numerical Analysis H. M. Srivastava Department of Mathematics and Statistics University of Victoria Victoria, British Columbia V8W 3R4 Canada tel.250-472-5313; office,250-477-6960 home, fax 250-721-8962 [email protected] Real and Complex Analysis, Fractional Calculus and Appl., Integral Equations and Transforms, Higher Transcendental Functions and Appl.,q-Series and q-Polynomials, Analytic Number Th. I. P. Stavroulakis Department of Mathematics University of Ioannina 451-10 Ioannina, Greece [email protected] Differential Equations Phone +3-065-109-8283 Manfred Tasche Department of Mathematics University of Rostock D-18051 Rostock, Germany [email protected] rostock.de Numerical Fourier Analysis, Fourier Analysis, Harmonic Analysis, Signal Analysis, Spectral Methods, Wavelets, Splines, Approximation Theory Roberto Triggiani Department of Mathematical Sciences University of Memphis Memphis, TN 38152 PDE, Control Theory, Functional

784

Page 7: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Analysis, [email protected]

Juan J. Trujillo University of La Laguna Departamento de Analisis Matematico C/Astr.Fco.Sanchez s/n 38271. LaLaguna. Tenerife. SPAIN Tel/Fax 34-922-318209 [email protected] Fractional: Differential Equations-Operators-Fourier Transforms, Special functions, Approximations, and Applications Ram Verma International Publications 1200 Dallas Drive #824 Denton, TX 76205, USA [email protected] Applied Nonlinear Analysis, Numerical Analysis, Variational Inequalities, Optimization Theory, Computational Mathematics, Operator Theory

Xiang Ming Yu Department of Mathematical Sciences Southwest Missouri State University Springfield, MO 65804-0094 417-836-5931 [email protected] Classical Approximation Theory, Wavelets Lotfi A. Zadeh Professor in the Graduate School and Director, Computer Initiative, Soft Computing (BISC) Computer Science Division University of California at Berkeley Berkeley, CA 94720 Office: 510-642-4959 Sec: 510-642-8271 Home: 510-526-2569 FAX: 510-642-1712 [email protected] Fuzzyness, Artificial Intelligence, Natural language processing, Fuzzy logic Richard A. Zalik Department of Mathematics Auburn University Auburn University, AL 36849-5310

USA. Tel 334-844-6557 office 678-642-8703 home Fax 334-844-6555 [email protected] Approximation Theory, Chebychev Systems, Wavelet Theory Ahmed I. Zayed Department of Mathematical Sciences DePaul University 2320 N. Kenmore Ave. Chicago, IL 60614-3250 773-325-7808 e-mail: [email protected] Shannon sampling theory, Harmonic analysis and wavelets, Special functions and orthogonal polynomials, Integral transforms Ding-Xuan Zhou Department Of Mathematics City University of Hong Kong 83 Tat Chee Avenue Kowloon, Hong Kong 852-2788 9708,Fax:852-2788 8561 e-mail: [email protected] Approximation Theory, Spline functions, Wavelets Xin-long Zhou Fachbereich Mathematik, Fachgebiet Informatik Gerhard-Mercator-Universitat Duisburg Lotharstr.65, D-47048 Duisburg, Germany e-mail:[email protected] duisburg.de Fourier Analysis, Computer-Aided Geometric Design, Computational Complexity, Multivariate Approximation Theory, Approximation and Interpolation Theory

785

Page 8: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Instructions to Contributors

Journal of Computational Analysis and Applications An international publication of Eudoxus Press, LLC, of TN.

Editor in Chief: George Anastassiou

Department of Mathematical Sciences University of Memphis

Memphis, TN 38152-3240, U.S.A.

1. Manuscripts files in Latex and PDF and in English, should be submitted via email to the Editor-in-Chief: Prof.George A. Anastassiou Department of Mathematical Sciences The University of Memphis Memphis,TN 38152, USA. Tel. 901.678.3144 e-mail: [email protected] Authors may want to recommend an associate editor the most related to the submission to possibly handle it. Also authors may want to submit a list of six possible referees, to be used in case we cannot find related referees by ourselves. 2. Manuscripts should be typed using any of TEX,LaTEX,AMS-TEX,or AMS-LaTEX and according to EUDOXUS PRESS, LLC. LATEX STYLE FILE. (Click HERE to save a copy of the style file.)They should be carefully prepared in all respects. Submitted articles should be brightly typed (not dot-matrix), double spaced, in ten point type size and in 8(1/2)x11 inch area per page. Manuscripts should have generous margins on all sides and should not exceed 24 pages. 3. Submission is a representation that the manuscript has not been published previously in this or any other similar form and is not currently under consideration for publication elsewhere. A statement transferring from the authors(or their employers,if they hold the copyright) to Eudoxus Press, LLC, will be required before the manuscript can be accepted for publication.The Editor-in-Chief will supply the necessary forms for this transfer.Such a written transfer of copyright,which previously was assumed to be implicit in the act of submitting a manuscript,is necessary under the U.S.Copyright Law in order for the publisher to carry through the dissemination of research results and reviews as widely and effective as possible.

786

Page 9: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

4. The paper starts with the title of the article, author's name(s) (no titles or degrees), author's affiliation(s) and e-mail addresses. The affiliation should comprise the department, institution (usually university or company), city, state (and/or nation) and mail code. The following items, 5 and 6, should be on page no. 1 of the paper. 5. An abstract is to be provided, preferably no longer than 150 words. 6. A list of 5 key words is to be provided directly below the abstract. Key words should express the precise content of the manuscript, as they are used for indexing purposes. The main body of the paper should begin on page no. 1, if possible. 7. All sections should be numbered with Arabic numerals (such as: 1. INTRODUCTION) . Subsections should be identified with section and subsection numbers (such as 6.1. Second-Value Subheading). If applicable, an independent single-number system (one for each category) should be used to label all theorems, lemmas, propositions, corollaries, definitions, remarks, examples, etc. The label (such as Lemma 7) should be typed with paragraph indentation, followed by a period and the lemma itself. 8. Mathematical notation must be typeset. Equations should be numbered consecutively with Arabic numerals in parentheses placed flush right, and should be thusly referred to in the text [such as Eqs.(2) and (5)]. The running title must be placed at the top of even numbered pages and the first author's name, et al., must be placed at the top of the odd numbed pages. 9. Illustrations (photographs, drawings, diagrams, and charts) are to be numbered in one consecutive series of Arabic numerals. The captions for illustrations should be typed double space. All illustrations, charts, tables, etc., must be embedded in the body of the manuscript in proper, final, print position. In particular, manuscript, source, and PDF file version must be at camera ready stage for publication or they cannot be considered. Tables are to be numbered (with Roman numerals) and referred to by number in the text. Center the title above the table, and type explanatory footnotes (indicated by superscript lowercase letters) below the table. 10. List references alphabetically at the end of the paper and number them consecutively. Each must be cited in the text by the appropriate Arabic numeral in square brackets on the baseline. References should include (in the following order): initials of first and middle name, last name of author(s) title of article,

787

Page 10: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

name of publication, volume number, inclusive pages, and year of publication. Authors should follow these examples: Journal Article 1. H.H.Gonska,Degree of simultaneous approximation of bivariate functions by Gordon operators, (journal name in italics) J. Approx. Theory, 62,170-191(1990). Book 2. G.G.Lorentz, (title of book in italics) Bernstein Polynomials (2nd ed.), Chelsea,New York,1986. Contribution to a Book 3. M.K.Khan, Approximation properties of beta operators,in(title of book in italics) Progress in Approximation Theory (P.Nevai and A.Pinkus,eds.), Academic Press, New York,1991,pp.483-495. 11. All acknowledgements (including those for a grant and financial support) should occur in one paragraph that directly precedes the References section. 12. Footnotes should be avoided. When their use is absolutely necessary, footnotes should be numbered consecutively using Arabic numerals and should be typed at the bottom of the page to which they refer. Place a line above the footnote, so that it is set off from the text. Use the appropriate superscript numeral for citation in the text. 13. After each revision is made please again submit via email Latex and PDF files of the revised manuscript, including the final one. 14. Effective 1 Nov. 2009 for current journal page charges, contact the Editor in Chief. Upon acceptance of the paper an invoice will be sent to the contact author. The fee payment will be due one month from the invoice date. The article will proceed to publication only after the fee is paid. The charges are to be sent, by money order or certified check, in US dollars, payable to Eudoxus Press, LLC, to the address shown on the Eudoxus homepage. No galleys will be sent and the contact author will receive one (1) electronic copy of the journal issue in which the article appears. 15. This journal will consider for publication only papers that contain proofs for their listed results.

788

Page 11: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

HIGHER-ORDER DEGENERATE BERNOULLI POLYNOMIALS

DAE SAN KIM AND TAEKYUN KIM

Abstract. Carlitz introduced the degenerate Bernoulli polynomials and de-

rived, among other things, the so-called degenerate Staudt-Clausen theoremfor the degenerate Bernoulli numbers as an analogue of the classical Staudt-Clausen theorem. In this paper, we consider the higher-order Carlitz’s degen-erate Bernoulli polynomials with umbral calculus viewpoint and derive new

identities and properties of those polynomials associated with special polyno-mials which are derived from umbral calculus.

1. Introduction

The degenerate Bernoulli polynomials βn (λ, x) (λ = 0) are defined by Carlitz tobe

(1.1)t

(1 + λt)1λ + 1

(1 + λt)xλ =

∞∑n=0

βn (λ, x)tn

n!, (λ = 0) , (see [3, 4]) .

Ustinov rediscovered these polynomials in [18], which are called Korobov poly-

nomials of the second kind and denoted by k(λ)n (x).

When x = 0, βn (λ) = βn (λ, 0) are called the degenerate Bernoulli numbers.Now, we observe that

(1.2) limλ→0

βn (λ, x) = βn (0, x) = Bn (x) , limλ→∞

λ−nβn (λ, λx) = bn (x) ,

where Bn (x) and bn (x) are the Bernoulli polynomials of the first kind and of thesecond kind.

The first few degenerate Bernoulli polynomials are given by β0 (λ, x) = 1, β1 (λ, x)= x − 1

2 + 12λ, β2 (λ, x) = x2 − x + 1

6 −16λ

2, β3 (λ, x) = x3 − 32x

2 + 12x −

32λx

2 +32λx + 1

4λ3 − 1

4λ, . . . . As an analogue of the classical Staudt-Clausen theorem forBernoulli numbers, Carlitz proved the so called degenerate Staudt-Clausen theoremfor βn (λ), (λ a rational number) (see [3, 19, 20]). The generalized falling factorials(x|λ)n for any λ ∈ C are defined as

(x|λ)0 = 1, (x|λ)n = x (x− λ) · · · (x− λ (n− 1)) , (for n > 0) .

Carlitz also found in [4] the following relation expressing sums of generalizedfalling factorals in terms of degenerate Bernoulli polynomials: for integers l,m withl ≥ 1,m ≥ 0,

(1.3)l−1∑i=0

(i|λ)m =1

m+ 1(βm+1 (λ, l)− βm+1 (λ)) ,

2000 Mathematics Subject Classification. 05A19, 05A40, 11B83.Key words and phrases. Higher-order degenerate Bernoulli polynomial, Umbral calculus.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

789 DAE SAN KIM et al 789-811

Page 12: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

2 DAE SAN KIM AND TAEKYUN KIM

which, by letting λ→ 0, becomes the familiar relation

(1.4)l−1∑i=0

im =1

m+ 1(Bm+1 (l)−Bm+1) .

For r ∈ N, the Bernoulli polynomials of the second kind of order r are definedby the generating function to be

(1.5)

(t

log (1 + t)

)r

(1 + t)x

=

∞∑n=0

b(r)n (x)tn

n!, (see [16]) ,

and the Bernoulli polynomials of order r are given by

(1.6)

(t

et − 1

)r

ext =

∞∑n=0

B(r)n (x)

tn

n!, (see [2, 5–7, 9]) .

When x = 0, B(r)n = B

(r)n (0), b

(r)n = b

(r)n (0) are called the Bernouli numbers of

the first kind of order r and of the second kind of order r. For µ ∈ C with µ = 1,the Frobenius-Euler polynomials with order s ∈ N are defined by the generatingfunction to be

(1.7)

(1− µet − µ

)s

ext =∞∑

n=0

H(s)n (x|µ)

tn

n!, (see [1, 10–12]) .

When x = 0, H(s)n (µ) = H

(s)n (0|µ) are called the Frobenius-Euler numbers of order

s. As is well known, the Stirling number of the second kind is defined by thegenerating function to be

(1.8)(et − 1

)n= n!

∞∑l=n

S2 (l,m)tl

l!, (n ∈ Z≥0) , (see [16, 17]) .

For n ≥ 0, the Stirling number of the first kind is given by

(x)n = x (x− 1) · · · (x− (n− 1)) =n∑

l=0

S1 (n, l)xl, (see [13, 15, 16, 21]) .

Let F be the set of all formal power series in the variable t:

(1.9) F =

f (t) =

∞∑k=0

aktk

k!

∣∣∣∣∣ ak ∈ C

.

Let P = C [x] and let P∗be the vector space of all linear functionals on P.⟨L| p (x)⟩denotes the action of the linear functional L on p (x) which satisfies ⟨L+M | p (x)⟩ =⟨L| p (x)⟩+⟨M | p (x)⟩, and ⟨cL| p (x)⟩ = c ⟨L| p (x)⟩, where c is a complex constant.The linear functional ⟨f (t)| ·⟩ on P is defined as

(1.10) ⟨f (t)|xn⟩ = an, (n ≥ 0) , where f (t) ∈ F .Thus, by (1.9) and (1.10), we get

(1.11)⟨tk∣∣xn⟩ = n!δn,k, (n, k ≥ 0) , (see [14, 16]) ,

where δn,k is the Kronecker symbol.

Let fL (t) =∑∞

k=0⟨L|xk⟩

k! tk. Then, by (1.11), we get ⟨fL (t)|xn⟩ = ⟨L|xn⟩. So,the map L 7→ fL (t) is a vector space isomorphism from P∗ onto F . Henceforth,F denotes both the algebra of formal power series in t and the vector space of all

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

790 DAE SAN KIM et al 789-811

Page 13: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

HIGHER-ORDER DEGENERATE BERNOULLI POLYNOMIALS 3

linear functionals on P, and so an element f (t) of F will be thought of as both aformal power series and a linear functional. We call F the umbral algebra and theumbral calculus is the study of umbral algebra. The order o (f (t)) of a power seriesf (t) = 0 is the smallest integer k for which the coefficient of tk does not vanish(see [14, 16]). If o (f (t)) = 0, then f (t) is called an invertible series; if o (f (t)) = 1,then f (t) is called a delta series. Let f (t) , g (t) be a delta series and an invertibleseries, respectively. Then there exists a unique sequence sn (x)(deg sn (x) = n)

such that⟨g (t) f (t)

k∣∣∣ sn (x)

⟩= n!δn,k, for k ≥ 0. Such a sequence sn (x) is called

the Sheffer sequence for (g (t) , f (t))which is denoted by sn (x) ∼ (g (t) , f (t)) (see[14, 16]). The sequence sn (x) is Sheffer for (g (t) , f (t)) if and only if

(1.12)1

g(f (t)

)eyf(t) =∞∑k=0

sk (y)

k!tk, (y ∈ C) , (see [11, 17]) ,

where f (t) is the compositional inverse of f (t) with f (f (t)) = f(f (t)

)= t.

Let f (t) , g (t) ∈ F and p (x) ∈ P. Then we see that

(1.13) f (t) =∞∑k=0

⟨f (t)|xk

⟩ tkk!, p (x) =

∞∑k=0

⟨tk∣∣ p (x)

⟩ xkk!.

From (1.13), we have

(1.14) tkp (x) = p(k) (x) =dkp (x)

dxk, eytp (x) = p (x+ y) .

By (1.14), we get ⟨eyt| p (x)⟩ = p (y) .For sn (x) ∼ (g (t) , f (t)), we have the following equations ([16]):

(1.15) f (t) sn (x) = nsn−1 (x) , (n ≥ 1) , sn (x+ y) =n∑

j=0

(n

j

)sj (x) pn−j (y) ,

where pn (x) = g (t) sn (x),(1.16)

sn+1 (x) =

(x− g′ (t)

g (t)

)1

f ′ (t)sn (x) , sn (x) =

n∑j=0

1

j!

⟨g(f (t)

)−1f (t)

j∣∣∣xn⟩xj ,

and

(1.17)

⟨f (t)|xp (x)⟩ = ⟨∂tf (t)| p (x)⟩ ,

d

dxsn (x) =

n−1∑l=0

(n

l

)⟨f (t)

∣∣xn−l⟩sl (x) , (n ≥ 1) .

In particular, for pn (x) ∼ (1, f (t)), qn (x) ∼ (1, g (t)), we note that

(1.18) qn (x) = x

(f (t)

g (t)

)n

x−1pn (x) , (n ≥ 1) .

Let us assume that sn (x) ∼ (g (t) , f (t)), rn (x) ∼ (h (t) , l (t)). Then we have

(1.19) sn (x) =n∑

m=0

Cn,mrm (x) , (n ≥ 0) ,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

791 DAE SAN KIM et al 789-811

Page 14: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

4 DAE SAN KIM AND TAEKYUN KIM

where

(1.20) Cn,m =1

m!

⟨h(f (t)

)g(f (t)

) (l (f (t)))m∣∣∣∣∣xn

⟩, (see [16]) .

In this paper, we consider, for any positive integer r, the degenerate Bernoulli

polynomials β(r)n (λ, x) of order r which are defined by the generating function to

be

(1.21)

(t

(1 + λt)1λ − 1

)r

(1 + λt)xλ =

∞∑n=0

β(r)n (λ, x)

tn

n!, (r ∈ Z≥0) .

From (1.20) and (1.21), we note that

(1.22) β(r)n (λ, x) ∼

((λ (et − 1)

eλt − 1

)r

,1

λ

(eλt − 1

)).

That is, β(r)n (λ, x) is the Sheffer polynomial for the pair(

g (t) =

(λ (et − 1)

eλt − 1

)r

, f (t) =1

λ

(eλt − 1

)).

The purpose of this paper is to give new identities and properties of the higher-order degenerate Bernoulli polynomials associated with special polynomials whichare derived from umbral calculus.

2. Higher-order degenerate Bernoulli polynomials

For n ≥ 0, we note that

xn ∼ (1, t) ,

(λ (et − 1)

eλt − 1

)r

β(r)n (λ, x) ∼

(1,

1

λ

(eλt − 1

)),

From (1.18), we can derive the following equation:(λ (et − 1)

eλt − 1

)r

β(r)n (λ, x) = x

(λt

eλt − 1

)n

x−1xn = x

(λt

eλt − 1

)n

xn−1(2.1)

=n−1∑l=0

(n− 1

l

)λlB

(n)l xn−l, (n ≥ 1) .

Thus, by (2.1), we get

β(r)n (λ, x)(2.2)

=n−1∑l=0

(n− 1

l

)λlB

(n)l

(eλt − 1

λ (et − 1)

)r

xn−l

=n−1∑l=0

(n− 1

l

)λlB

(n)l

(t

et − 1

)r (eλt − 1

λt

)r

xn−l

=

n−1∑l=0

(n− 1

l

)λlB

(n)l

(t

et − 1

)r(r!

∞∑k=0

S2 (k + r, r)λk

(k + r)!tk

)xn−l

=n−1∑l=0

(n− 1

l

)λlB

(n)l

(t

et − 1

)r n−l∑k=0

(n−lk

)(k+rr

)S2 (k + r, r)λkxn−l−k

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

792 DAE SAN KIM et al 789-811

Page 15: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

HIGHER-ORDER DEGENERATE BERNOULLI POLYNOMIALS 5

=n−1∑l=0

n−l∑k=0

(n−1l

)(n−lk

)(k+rr

) S2 (k + r, r)λk+lB(n)l

(t

et − 1

)r

xn−l−k

=n−1∑l=0

n−l∑k=0

(n−1l

)(n−lk

)(k+rr

) S2 (k + r, r)λk+lB(n)l B

(r)n−l−k (x) .

Therefore, by (2.2), we obtain the following theorem.

Theorem 2.1. For n ≥ 1, we have

β(r)n (λ, x) =

n−1∑l=0

n−l∑k=0

(n−1l

)(n−lk

)(k+rr

) S2 (k + r, r)λk+lB(n)l B

(r)n−k−l (x) .

Remark. When x = 0 and r = 1, we get

(2.3) βn (λ) =n−1∑l=0

n−l∑k=0

1

k + 1

(n− 1

l

)(n− lk

)λk+lB

(n)l Bn−k−l.

From (1.18), (1.22) and

(x|λ)n = λn(xλ

)n

=n∑

m=0

S1 (n,m)λn−mxm ∼(

1,1

λ

(eλt − 1

)).

We note that

β(r)n (λ, x) =

n∑m=0

S1 (n,m)λn−m

(eλt − 1

λ (et − 1)

)r

xm(2.4)

=

n∑m=0

S1 (n,m)λn−m

(t

et − 1

)r (eλt − 1

λt

)r

xm

=

n∑m=0

S1 (n,m)λn−m

(t

et − 1

)r m∑k=0

(mk

)(k+rr

)S2 (k + r, r)λkxm−k

= λnn∑

m=0

m∑k=0

(mk

)(k+rr

)S1 (n,m)S2 (k + r, r)λk−mB(r)m−k (x) .

Therefore, by (2.4), we obtain the following theorem.

Theorem 2.2. For n ≥ 0, we have

β(r)n (λ, x) = λn

n∑m=0

m∑k=0

(mk

)(k+rr

)S1 (n,m)S2 (k + r, r)λk−mB(r)m−k (x) .

Remark. For r = 1 and x = 0, we get an expression for the degenerate Bernoullinumbers:

(2.5) βn (λ) = λnn∑

m=0

m∑k=0

1

k + 1

(m

k

)S1 (n,m)λk−mBm−k.

Here we use the conjugation representation.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

793 DAE SAN KIM et al 789-811

Page 16: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

6 DAE SAN KIM AND TAEKYUN KIM

For β(r)n (λ, x) ∼

(g (t) =

(λ(et−1)eλt−1

)r

, f (t) = 1λ

(eλt − 1

)), we observe that⟨

g(f (t)

)−1f (t)

j∣∣∣xn⟩(2.6)

=

⟨(t

(1 + λt)1λ − 1

)r (1

λlog (1 + λt)

)j∣∣∣∣∣xn

=λ−j

⟨(t

(1 + λt)1λ − 1

)r∣∣∣∣∣ j!∞∑l=j

S1 (l, j)λl

l!tlxn

=j!λ−jn∑

l=j

(n

l

)S1 (l, j)λl

⟨ ∞∑m=0

β(r)m (λ)

tm

m!

∣∣∣∣∣xn−l

=j!λ−jn∑

l=j

(n

l

)S1 (l, j)λlβ

(r)n−l (λ) .

Therefore, by (1.16) and (2.6), we obtain the following theorem.

Theorem 2.3. For n ≥ 0, r ≥ 1, we have

β(r)n (λ, x) =

n∑j=0

λ−j

n∑l=j

(n

l

)S1 (l, j)λlβ

(r)n−l (λ)

xj .

Remark. Recall that

(2.7)

(λ (et − 1)

eλt − 1

)r

β(r)n (λ, x) ∼

(1,

1

λ

(eλt − 1

)), (x|λ)n ∼

(1,

1

λ

(eλt − 1

)).

Thus, by (2.7), we get

(2.8)

(λ (et − 1)

eλt − 1

)r

β(r)n (λ, x) = (x|λ)n , and

eλt − 1

λ(x|λ)n = n (x|λ)n−1 .

From (2.8), we have(et − 1

)rβ(r)n (λ, x) =

(eλt − 1

λ

)r

(x|λ)n(2.9)

=

(n)r (x|λ)n−r , if r ≤ n0 , if r > n.

By (2.9), we get

trβ(r)n (λ, x) =

(n)r λ

n−r(

tet−1

)r (xλ

)n−r

, if r ≤ n0 , if r > n

(2.10)

=

(n)r λ

n−r∑n−r

m=0 S1 (n− r,m)λ−mB(r)m (x) , if r ≤ n

0 , if r > n.

Therefore, from (1.14) and (2.10), we have(2.11)(

d

dx

)r

β(r)n (λ, x) =

(n)r λ

n−r∑n−r

m=0 S1 (n− r,m)λ−mB(r)m (x) , if r ≤ n

0 , if r > n.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

794 DAE SAN KIM et al 789-811

Page 17: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

HIGHER-ORDER DEGENERATE BERNOULLI POLYNOMIALS 7

In particular,

(2.12)d

dxβn (λ, x) =

nλn−1

∑n−1m=0 S1 (n− 1,m)λ−mBm (x) , if r ≤ n

0 , if r > n.

To proceed further, we recall that the λ-Daehee polynomials D(r)n,λ (x) of order r

are given by

(2.13)

(λ log (1 + t)

(1 + t)λ − 1

)r

(1 + t)x

=∞∑

n=0

D(r)n,λ (x)

tn

n!, (see [12, 16]) .

From (1.5), (1.11) and (2.13), we have

β(r)n (λ, y)(2.14)

=

⟨(t

(1 + λt)1λ − 1

)r

(1 + λt)yλ

∣∣∣∣∣xn⟩

=n∑

l=0

(n

l

)λlb

(r)l

( yλ

)⟨ log (1 + λt)

λ(

(1 + λt)1λ − 1

)r∣∣∣∣∣∣xn−l

=

n∑l=0

(n

l

)λlb

(r)l

( yλ

)⟨ ∞∑m=0

D(r)

m, 1λλm

tm

m!

∣∣∣∣∣xn−l

=n∑

l=0

(n

l

)λlb

(r)l

( yλ

)D

(r)

n−l, 1λλn−l

=λnn∑

l=0

(n

l

)D

(r)

n−l, 1λb(r)l

( yλ

),

and

β(r)n (λ, y)(2.15)

=

⟨ ∞∑l=0

β(r)l (λ, y)

tl

l!

∣∣∣∣∣xn⟩

=

⟨(t

(1 + λt)1λ − 1

)r

(1 + λt)yλ

∣∣∣∣∣xn⟩

=

⟨(λt

log (1 + λt)

)r∣∣∣∣ log (1 + λt)

λ(

(1 + λt)1λ − 1

)r

(1 + λt)yλ xn

=

⟨(λt

log (1 + λt)

)r∣∣∣∣ ∞∑l=0

D(r)l,λ−1

( yλ

)λltl

l!xn

=

n∑l=0

(n

l

)λlD

(r)l,λ−1

( yλ

)⟨ ∞∑m=0

b(r)m λmtm

m!

∣∣∣∣∣xn−l

=n∑

l=0

(n

l

)λlD

(r)l,λ−1

( yλ

)b(r)n−lλ

n−l

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

795 DAE SAN KIM et al 789-811

Page 18: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

8 DAE SAN KIM AND TAEKYUN KIM

=λnn∑

l=0

(n

l

)b(r)n−lD

,(r)l,λ−1

( yλ

).

Therefore, by (2.14) and (2.15), we obtain the following theorem.

Theorem 2.4. For n ≥ 0, we haven∑

l=0

(n

l

)D

(r)

n−l, 1λb(r)l

(xλ

)=

n∑l=0

(n

l

)b(r)n−lD

(r)l,λ−1

(xλ

)= λ−nβ(r)

n (λ, x) .

Recalling that

β(r)n (λ, x) ∼

(g (t) =

(λ (et − 1)

eλt − 1

)r

, f (t) =1

λ

(eλt − 1

)),

we observe that

⟨g(f (t)

)−1f (t)

j∣∣∣xn⟩

(2.16)

=j!λ−jn∑

l=j

S1 (l, j)

(n

l

)λl

⟨(t

(1 + λt)1λ − 1

)r∣∣∣∣∣xn−l

=j!λ−jn∑

l=j

S1 (l, j)

(n

l

)λl

⟨ log (1 + λt)

λ(

(1 + λt)1λ − 1

)r∣∣∣∣∣∣

(λt

log (1 + λt)

)r

xn−l

=j!λ−jn∑

l=j

S1 (l, j)

(n

l

)λl

⟨ log (1 + λt)

λ(

(1 + λt)1λ − 1

)r∣∣∣∣∣∣

∞∑m=0

b(r)m

λm

m!tmxn−l

=j!λ−jn∑

l=j

S1 (l, j)

(n

l

)λl

n−l∑m=0

(n− lm

)λmb(r)m

⟨ log (1 + λt)

λ(

(1 + λt)1λ − 1

)r∣∣∣∣∣∣xn−l−m

=j!λ−jn∑

l=j

S1 (l, j)

(n

l

)λl

n−l∑m=0

(n− lm

)λmb(r)m D

(r)n−l−m,λ−1λ

n−l−m

=j!λnn∑

l=j

n−l∑m=0

(n

l

)(n− lm

)S1 (l, j)λ−jb(r)m D

(r)n−l−m,λ−1 .

From (1.16) and (2.16), we have(2.17)

β(r)n (λ, x) = λn

n∑j=0

n∑

l=j

n−l∑m=0

(n

l

)(n− lm

)S1 (l, j)λ−jb(r)m D

(r)n−l−m,λ−1

xj .

Remark. We have

limλ→0

β(r)n (λ, x) = β(r)

n (0, x) = B(r)n (x) ,

limλ→0

D(r)n,λ (x) = (x)n ,

limλ→∞

λ−nβ(r)n (λ, λx) = b(r)n (x) ,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

796 DAE SAN KIM et al 789-811

Page 19: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

HIGHER-ORDER DEGENERATE BERNOULLI POLYNOMIALS 9

limλ→∞

λ−nD(r)n,λ (λx) = B(r)

n (x) .

where r > 0.

From (1.22), we note that

(2.18) pn (x) =

(λ (et − 1)

eλt − 1

)r

β(r)n (λ, x) = (x|λ)n ∼

(1,

1

λ

(eλt − 1

)).

By (2.18) and (1.15), we get

(2.19) β(r)n (λ, x+ y) =

n∑j=0

(n

j

)β(r)j (λ, x) (y|λ)n−j ,

and, by (1.14) and (1.15), we get

(2.20)1

λ

(eλt − 1

)β(r)n (λ, x) = nβ

(r)n−1 (λ, x) .

From (2.20), we have

(2.21) β(r)n (λ, x+ λ)− β(r)

n (λ, x) = nλβ(r)n−1 (λ, x) .

Therefore, by (2.17), (2.19) and (2.20), we obtain the following theorem.

Theorem 2.5. For n ≥ 0, we have

β(r)n (λ, x) = λn

n∑j=0

n∑

l=j

n−l∑m=0

(n

l

)(n− lm

)S1 (l, j)λ−jb(r)m D

(r)n−l−m,λ−1

xj ,

and

β(r)n (λ, x+ λ) =

n∑j=0

(n

j

)β(r)j (λ, x) (λ|λ)n−j

= nλβ(r)n−1 (λ, x) + β(r)

n (λ, x) .

For β(r)n (λ, x) ∼

(g (t) =

(λ(et−1)eλt−1

)r

, f (t) = 1λ

(eλt − 1

)), we note that

g′ (t)

g (t)(2.22)

= (log g (t))′

=r(log λ+ log

(et − 1

)− log

(eλt − 1

))′=r

t

( ∞∑l=0

Bl (1)tl

l!−

∞∑l=0

Bl (1)λltl

l!

)

=r

t

∞∑l=1

Bl (1)(1− λl

) tll!

=r

∞∑l=0

Bl+1 (1)(1− λl+1

) tl

(l + 1)!.

By (2.22), we get

g′ (t)

g (t)β(r)n (λ, x)(2.23)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

797 DAE SAN KIM et al 789-811

Page 20: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

10 DAE SAN KIM AND TAEKYUN KIM

=r∞∑l=0

Bl+1 (1)(1− λl+1

) tl

(l + 1)!λn

×n∑

m=0

m∑k=0

(mk

)(k+rr

)S1 (n,m)S2 (k + r, r)λk−mB(r)m−k (x)

=λnr

n∑m=0

m∑k=0

m−k∑l=0

S1 (n,m)S2 (k + r, r)λk−m

×m−k∑l=0

Bl+1 (1)(1− λl+1

) 1

(l + 1)!(m− k)lB

(r)m−k−l (x)

=λnrn∑

m=0

m∑k=0

m−k∑l=0

1

m− k − l + 1

(mk

)(m−k

l

)(k+rr

) (λk−m − λ1−l

)× S1 (n,m)S2 (k + r, r)Bm−k−l+1 (1)B

(r)l (x)

=rn∑

l=0

n∑m=l

m∑k=l

1

k − l + 1

(mk

)(kl

)(m−k+r

r

) (λn−k − λn−l+1)S1 (n,m)

× S2 (m− k + r, r)Bk−l+1 (1)B(r)l (x) .

From (1.16) and (2.23), we have

β(r)n+1 (λ, x)(2.24)

=xβ(r)n (λ, x− λ)− e−λt g

′ (t)

g (t)β(r)n (λ, x)

=xβ(r)n (λ, x− λ)− r

n∑l=0

(n∑

m=l

m∑k=l

1

k − l + 1

(mk

)(kl

)(m−k+r

r

) (λn−k − λn−l+1)

× S1 (n,m)S2 (m− k + r, r)Bk−l+1 (1))B(r)l (x− λ) .

Therefore, by (2.24), we obtain the following theorem.

Theorem 2.6. For n ≥ 0, we have

β(r)n+1 (λ, x)

=xβ(r)n (λ, x− λ)− r

n∑l=0

(n∑

m=l

m∑k=l

1

k − l + 1

(mk

)(kl

)(m−k+r

r

) (λn−k − λn−l+1)

×S1 (n,m)S2 (m− k + r, r)Bk−l+1 (1))B(r)l (x− λ) .

By β(r)n (λ, x) ∼

(g (t) =

(λ(et−1)eλt−1

)r

, f (t) = 1λ

(eλt − 1

)), we get⟨

f (t)∣∣xn−l

⟩(2.25)

=

⟨1

λlog (1 + λt)

∣∣∣∣xn−l

⟩=λ−1

⟨ ∞∑m=1

(−1)m−1

λm (m− 1)!tm

m!

∣∣∣∣∣xn−l

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

798 DAE SAN KIM et al 789-811

Page 21: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

HIGHER-ORDER DEGENERATE BERNOULLI POLYNOMIALS 11

=λ−1 (−1)n−l−1

λn−l (n− l − 1)!

= (−λ)n−l−1

(n− l − 1)!.

From (1.17) and (2.25), we have

(2.26)d

dxβ(r)n (λ, x) = n!

n−1∑l=0

(−λ)n−l−1

l! (n− l)β(r)l (λ, x) .

Let n ≥ 1. Then, by (1.11) and (1.17), we get

β(r)n (λ, y)(2.27)

=

⟨ ∞∑l=0

β(r)l (λ, y)

tl

l!

∣∣∣∣∣xn⟩

=

⟨(t

(1 + λt)1λ − 1

)r

(1 + λt)yλ

∣∣∣∣∣xn⟩

=

⟨∂t

((t

(1 + λt)1λ − 1

)r

(1 + λt)yλ

)∣∣∣∣∣xn−1

=

⟨(t

(1 + λt)1λ − 1

)r

∂t (1 + λt)yλ

∣∣∣∣∣xn−1

+

⟨(∂t

(t

(1 + λt)1λ − 1

)r)(1 + λt)

∣∣∣∣∣xn−1

⟩.

The first term of (2.27) is

(2.28) y

⟨(t

(1 + λt)1λ − 1

)r

(1 + λt)y−λλ

∣∣∣∣∣xn−1

⟩= yβ

(r)n−1 (λ, y − λ) .

For the second term of (2.27), we observe that

(2.29) ∂t

(t

(1 + λt)1λ − 1

)r

= r

(t

(1 + λt)1λ − 1

)r−1

∂t

(t

(1 + λt)1λ − 1

),

where

∂t

(t

(1 + λt)1λ − 1

)(2.30)

=(1 + λt)

1λ − 1− t (1 + λt)

1λ−1(

(1 + λt)1λ − 1

)2=

(1 + λt)1λ − 1− t

(1 + λt)

1λ−1 − (1 + λt)

−1− t (1 + λt)

−1((1 + λt)

1λ − 1

)2=− 1

1 + λt

t

(1 + λt)1λ − 1

+1

t(2.31)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

799 DAE SAN KIM et al 789-811

Page 22: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

12 DAE SAN KIM AND TAEKYUN KIM

×

t

(1 + λt)1λ − 1

− 1

(1 + λt)

(t

(1 + λt)1λ − 1

)2 .

Thus, by (2.29) and (2.30), we get

∂t

(t

(1 + λt)1λ − 1

)r

(2.32)

=− r

(1 + λt)

(t

(1 + λt)1λ − 1

)r

+r

t

(

t

(1 + λt)1λ − 1

)r

− 1

1 + λt

(t

(1 + λt)1λ − 1

)r+1 .

From (2.32), we note that the second term of (2.27) is

− r

⟨(t

(1 + λt)1λ − 1

)r

(1 + λt)y−λλ

∣∣∣∣∣xn−1

⟩(2.33)

+ r

⟨(1 + λt)

∣∣∣∣∣∣1t(

t

(1 + λt)1λ − 1

)r

− 1

1 + λt

(t

(1 + λt)1λ − 1

)r+1xn−1

=− rβ(r)n−1 (λ, y − λ)

+r

n

⟨(1 + λt)

∣∣∣∣∣∣(

t

(1 + λt)1λ − 1

)r

− 1

1 + λt

(t

(1 + λt)1λ − 1

)r+1xn

=− rβ(r)n−1 (λ, y − λ)

+r

n

⟨(t

(1 + t)1λ − 1

)r

(1 + λt)yλ

∣∣∣∣∣xn⟩

− r

n

⟨(t

(1 + λt)1λ − 1

)r+1

(1 + λt)y−λλ

∣∣∣∣∣∣xn⟩

=− rβ(r)n−1 (λ, y − λ) +

r

nβ(r)n (λ, y)− r

nβ(r+1)n (λ, y − λ) .

By (2.27), (2.28) and (2.33), we get

(2.34)(

1− r

n

)β(r)n (λ, x) = (x− r)β(r)

n−1 (λ, x− λ)− r

nβ(r+1)n (λ, x− λ) .

Therefore, by (2.34), we obtain the following theorem.

Theorem 2.7. For n ≥ 1, we have

β(r+1)n (λ, x− λ) =

(1− n

r

)β(r)n (λ, x) +

(nrx− n

)β(r)n−1 (λ, x− λ) .

Here we compute

(2.35)

⟨(t

(1 + λt)1λ − 1

)r (1

λlog (1 + λt)

)m∣∣∣∣∣xn

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

800 DAE SAN KIM et al 789-811

Page 23: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

HIGHER-ORDER DEGENERATE BERNOULLI POLYNOMIALS 13

in two different ways.On one hand, it is equal to

λ−m

⟨(t

(1 + λt)1λ − 1

)r

(log (1 + λt))m

∣∣∣∣∣xn⟩

(2.36)

=λ−m

⟨(t

(1 + λt)1λ − 1

)r∣∣∣∣∣m!∞∑

l=m

S1 (l,m)λl

l!tlxn

=m!λ−mn∑

l=m

(n

l

)S1 (l,m)λl

⟨(t

(1 + λt)1λ − 1

)r∣∣∣∣∣xn−l

=m!λ−mn∑

l=m

(n

l

)S1 (l,m)λl

⟨ ∞∑k=0

β(r)k (λ)

tk

k!

∣∣∣∣∣xn−l

=m!λ−mn∑

l=m

(n

l

)S1 (l,m)λlβ

(r)n−l (λ) .

On the other hand, it is equal to⟨∂t

((t

(1 + λt)1λ − 1

)r (1

λlog (1 + λt)

)m)∣∣∣∣∣xn−1

⟩(2.37)

=

⟨(t

(1 + λt)1λ − 1

)r

∂t

(1

λlog (1 + λt)

)m∣∣∣∣∣xn−1

+

⟨(∂t

(t

(1 + λt)1λ − 1

)r)(1

λlog (1 + λt)

)m∣∣∣∣∣xn−1

⟩.

The first term of (2.37) is

m

⟨(t

(1 + λt)1λ − 1

)r (1

λlog (1 + λt)

)m−1

(1 + λt)−1

∣∣∣∣∣xn−1

⟩(2.38)

=mλ−(m−1)

⟨(t

(1 + λt)1λ − 1

)r

(1 + λt)−1

∣∣∣∣∣ (log (1 + λt))m−1

xn−1

=mλ−(m−1)

⟨(t

(1 + λt)1λ − 1

)r

(1 + λt)−1

∣∣∣∣∣ (m− 1)!∞∑

l=m−1

S1 (l,m− 1)λltl

l!xn−1

=m!λ−(m−1)n−1∑

l=m−1

(n− 1

l

)S1 (l,m− 1)λl

⟨(t

(1 + λt)1λ − 1

)r

(1 + λt)−λ

λ

∣∣∣∣∣xn−1−l

=m!λ−(m−1)n−1∑

l=m−1

(n− 1

l

)S1 (l,m− 1)λlβ

(r)n−1−l (λ,−λ) .

For the second term of (2.37), we recall that

∂t

(t

(1 + λt)1λ − 1

)r

(2.39)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

801 DAE SAN KIM et al 789-811

Page 24: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

14 DAE SAN KIM AND TAEKYUN KIM

=− r

(1 + λt)

(t

(1 + λt)1λ − 1

)r

+r

t

(

t

(1 + λt)1λ − 1

)r

− 1

1 + λt

(t

(1 + λt)1λ − 1

)r+1 .

Now, the second term of (2.37) is

λ−m

⟨∂t

(t

(1 + λt)1λ − 1

)r∣∣∣∣∣ (log (1 + λt))mxn−1

⟩(2.40)

=m!λ−mn−1∑l=m

(n− 1

l

)S1 (l,m)λl

⟨∂t

(t

(1 + λt)1λ − 1

)r∣∣∣∣∣xn−1−l

=m!λ−mn−1∑l=m

(n− 1

l

)S1 (l,m)λl

−r

⟨(t

(1 + λt)1λ − 1

)r

(1 + λt)−λλ

∣∣∣∣∣xn−l−1

+r

n− l

⟨(t

(1 + λt)1λ − 1

)r∣∣∣∣∣xn−l

− r

n− l

⟨(t

(1 + λt)1λ − 1

)r+1

(1 + λt)−λ

λ

∣∣∣∣∣∣xn−l

⟩=m!λ−m

n−1∑l=m

(n− 1

l

)S1 (l,m)λl

×−rβ(r)

n−1−l (λ,−λ) +r

n− lβ(r)n−l (λ)− r

n− lβ(r+1)n−l (λ,−λ)

.

From (2.35), (2.36), (2.37), and (2.40), we have

m!λ−mn∑

l=m

(n

l

)S1 (l,m)λlβ

(r)n−l (λ)

=m!λ−(m−1)n−1∑

l=m−1

(n− 1

l

)S1 (l,m− 1)λlβ

(r)n−l−1 (λ,−λ)

+m!λ−mn−1∑l=m

(n− 1

l

)S1 (l,m)λl

(−rβ(r)

n−1−l (λ,−λ) +r

n− lβ(r)n−l (λ)

− r

n− lβ(r+1)n−l (λ,−λ)

),

where n− 1 ≥ m ≥ 1.After simplification and modification, we get: for n− 1 ≥ m ≥ 1,

n−m∑l=0

(n

l

)S1 (n− l,m)λn−lβ

(r)l (λ)(2.41)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

802 DAE SAN KIM et al 789-811

Page 25: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

HIGHER-ORDER DEGENERATE BERNOULLI POLYNOMIALS 15

n−m∑l=0

(n− 1

l

)S1 (n− l − 1,m− 1)λn−l−1β

(r)l (λ,−λ)

+n−m−1∑

l=0

(n− 1

l

)S1 (n− l − 1,m)λn−l−1

×(−rβ(r)

l (λ,−λ) +r

l + 1β(r)l+1 (λ)− r

l + 1β(r+1)l+1 (λ,−λ)

)=λ

n−m∑l=0

(n− 1

l

)S1 (n− l − 1,m− 1)λn−l−1β

(r)l (λ,−λ)

− rn−m−1∑

l=0

(n− 1

l

)S1 (n− l − 1,m)λn−l−1β

(r)l (λ,−λ)

+r

n

n−m−1∑l=0

(n

l + 1

)S1 (n− l − 1,m)λn−l−1β

(r)l+1 (λ)

− r

n

n−m−1∑l=0

(n

l + 1

)S1 (n− l − 1,m)λn−l−1β

(r+1)l+1 (λ,−λ)

n−m∑l=0

(n− 1

l

)S1 (n− l − 1,m− 1)λn−l−1β

(r)l (λ,−λ)

− rn−m−1∑

l=0

(n− 1

l

)S1 (n− l − 1,m)λn−l−1β

(r)l (λ,−λ)

+r

n

n−m∑l=0

(n

l

)S1 (n− l,m)λn−lβ

(r)l (λ)

− r

n

n−m∑l=0

(n

l

)S1 (n− l,m)λn−lβ

(r+1)l (λ,−λ) .

Therefore, by (2.41), we obtain the following theorem.

Theorem 2.8. For n− 1 ≥ m ≥ 1, we have

(1− r

n

) n−m∑l=0

(n

l

)S1 (n− l,m)λn−lβ

(r)l (λ)

=λn−m∑l=0

(n− 1

l

)S1 (n− l − 1,m− 1)λn−l−1β

(r)l (λ,−λ)

− rn−m−1∑

l=0

(n− 1

l

)S1 (n− l − 1,m)λn−l−1β

(r)l (λ,−λ)

− r

n

n−m∑l=0

(n

l

)S1 (n− l,m)λn−lβ

(r+1)l (λ,−λ) .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

803 DAE SAN KIM et al 789-811

Page 26: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

16 DAE SAN KIM AND TAEKYUN KIM

For r > s ≥ 1, by (1.19), (1.20) and (1.22), we get

(2.42) β(r)n (λ, x) =

n∑m=0

Cn,mβ(s)m (λ, x) ,

where

Cn,m =1

m!

⟨(t

(1 + λt)1λ − 1

)r−s

tm

∣∣∣∣∣∣xn⟩

(2.43)

=1

m!

⟨(t

(1 + λt)1λ − 1

)r−s∣∣∣∣∣∣ tmxn

=

(n

m

)⟨(t

(1 + λt)1λ − 1

)r−s∣∣∣∣∣∣xn−m

=

(n

m

)⟨ ∞∑l=0

β(r−s)l (λ)

tl

l!

∣∣∣∣∣xn−m

=

(n

m

)β(r−s)n−m (λ) .

Therefore, by (2.42)and (2.43), we obtain the following theorem.

Theorem 2.9. For r > s ≥ 1, we have

β(r)n (λ, x) =

n∑m=0

(n

m

)β(r−s)n−m (λ)β(s)

m (λ, x) .

Remark. Replacing x by x+ λ in Theorem 2.7, we have

(2.44) β(r+1)n (λ, x) =

(1− n

r

)β(r)n (λ, x+ λ) +

(nrx+

n

rλ− n

)β(r)n−1 (λ, x) .

From Theorem 2.5, we note that

β(r)n (λ, x+ λ) =

n∑j=0

(n

j

)β(r)j (λ, x) (λ|λ)n−j(2.45)

= nλβ(r)n−1 (λ, x) + β(r)

n (λ, x) .

Substituting (2.45) into (2.44), we get(2.46)

β(r+1)n (λ, x) =

(1− n

r

)β(r)n (λ, x) +

n

r(x+ (λ− 1) r − (n− 1)λ)β

(r)n−1 (λ, x) .

By using this and induction on r, it is shown in [[19]] that

(2.47) β(r)n (λ, x) = r

(n

r

) r−1∑k=0

(−1)r−1−k

σr−1,k (λ, x, n)βn−k (λ, x)

n− k,

where

σr,k (λ, x, n) =∑

1≤ik<ik−1<···<i1≤r

k∏j=1

(x+ (λ− 1) ij − (n− j)λ) .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

804 DAE SAN KIM et al 789-811

Page 27: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

HIGHER-ORDER DEGENERATE BERNOULLI POLYNOMIALS 17

For r > s ≥ 1, by (1.19), (1.20) and (1.22), we have

(2.48) β(s)n (λ, x) =

n∑m=0

Cn,mβ(r)m (λ, x) ,

where

Cn,m =1

m!

⟨((1 + λt)

1λ − 1

t

)r−s

tm

∣∣∣∣∣∣xn⟩

(2.49)

=

(n

m

)⟨((1 + λt)

1λ − 1

t

)r−s∣∣∣∣∣∣xn−m

⟩.

Observe here that((1 + λt)

1λ − 1

t

)r−s

(2.50)

=

(e

1λ log(1+λt) − 1

t

)r−s

=1

tr−s

(e

1λ log(1+λt) − 1

)r−s

=1

tr−s(r − s)!

∞∑l=r−s

S2 (l, r − s) (log (1 + λt))l

λll!

= (r − s)!∞∑

l=r−s

S2 (l, r − s)l!

(log (1 + λt)

λt

)l

tl−(r−s)

= (r − s)!∞∑l=0

S2 (l + r − s, r − s)(l + r − s)!

tl(

log (1 + λt)

λt

)l+r−s

= (r − s)!∞∑l=0

S2 (l + r − s, r − s)(l + r − s)!

tl (l + r − s)!

×∞∑k=0

S1 (k + l + r − s, l + r − s) (λt)k

(k + l + r − s)!

= (r − s)!∞∑k=0

∞∑l=0

S1 (k + l + r − s, l + r − s)

× S2 (l + r − s, r − s) λk

(k + l + r − s)!tk+l

= (r − s)!∞∑j=0

∑k+l=j

S1 (k + l + r − s, l + r − s)

× S2 (l + r − s, r − s) λk

(k + l + r − s)!tk+l

= (r − s)!∞∑j=0

j∑k=0

S1 (j + r − s, j − k + r − s)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

805 DAE SAN KIM et al 789-811

Page 28: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

18 DAE SAN KIM AND TAEKYUN KIM

× S2 (j − k + r − s, r − s) λk

(j + r − s)!tj .

From (2.49) and (2.50), we have

Cn,m

(2.51)

=

(n

m

)(r − s)!

×

⟨ ∞∑j=0

(j∑

k=0

S1 (j + r − s, j − k + r − s)S2 (j − k + r − s, r − s) λkj!

(j + r − s)!

)tj

j!

∣∣∣∣∣∣xn−m

=

(n

m

)(r − s)!

n−m∑k=0

S1 (n−m+ r − s, n−m− k + r − s)

× S2 (n−m− k + r − s, r − s) λk (n−m)!

(n−m+ r − s)!

=

(nm

)(n−m+r−s

r−s

) n−m∑k=0

S1 (n−m+ r − s, n−m− k + r − s)S2 (n−m− k + r − s, r − s)λk.

Therefore, by (2.48) and (2.51), we obtain the following theorem.

Theorem 2.10. For r > s ≥ 1, we have

β(s)n (λ, x)

=n∑

m=0

(nm

)(n−m+r−s

r−s

) n−m∑k=0

S1 (n−m+ r − s, n−m− k + r − s)

×S2 (n−m− k + r − s, r − s)λkβ(r)m (λ, x)

=n∑

m=0

(nm

)(n−m+r−s

r−s

) n−m∑k=0

S1 (n−m+ r − s, k + r − s)

×S2 (k + r − s, r − s)λn−m−kβ(r)m (λ, x) .

For (x|λ)n ∼(1, 1

λ

(eλt − 1

)), by (1.19), (1.20) and (1.22), we get

(2.52) β(r)n (λ, x) =

n∑m=0

Cn,m (x|λ)m ,

where

Cn,m =1

m!

⟨(t

(1 + λt)1λ − 1

)r

tm

∣∣∣∣∣xn⟩

(2.53)

=1

m!

⟨(t

(1 + λt)1λ − 1

)r∣∣∣∣∣ tmxn⟩

=

(n

m

)⟨(t

(1 + λt)1λ − 1

)r∣∣∣∣∣xn−m

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

806 DAE SAN KIM et al 789-811

Page 29: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

HIGHER-ORDER DEGENERATE BERNOULLI POLYNOMIALS 19

=

(n

m

)⟨ ∞∑k=0

β(r)k (λ)

tk

k!

∣∣∣∣∣xn−m

=

(n

m

)β(r)n−m (λ) .

Therefore, by (2.52) and (2.53), we obtain the following theorem.

Theorem 2.11. For n ≥ 0, we have

β(r)n (λ, x) =

n∑m=0

(n

m

)β(r)n−m (λ) (x|λ)m .

Remark. For n ≥ 0, we get(2.54)

(x|λ)n =

n∑m=0

(nm

)(n−m+r

r

) n−m∑k=0

S1 (n−m+ r, k + r)S2 (k + r, r)λn−m−k

β(r)m (λ, x) .

By (1.6) and (1.12), we easily get

(2.55) B(s)n (x) ∼

((et − 1

t

)s

, t

), (s ∈ N) .

From (1.19), (1.20), (1.22) and (2.55), we have

(2.56) B(s)n (x) =

n∑m=0

Cn,mβ(r)m (λ, x) ,

where

Cn,m =1

m!

⟨ (λ(et−1)eλt−1

)r

(et−1

t

)s (1

λ

(eλt − 1

))m

∣∣∣∣∣∣∣∣xn

⟩(2.57)

=1

m!λm

⟨(λt

eλt − 1

)r (et − 1

t

)r (t

et − 1

)s (eλt − 1

)m∣∣∣∣xn⟩=

1

m!λm

⟨(λt

eλt − 1

)r (et − 1

t

)r (t

et − 1

)s∣∣∣∣m!

∞∑l=m

S2 (l,m)λl

l!tlxn

= λ−mn∑

l=m

(n

l

)S2 (l,m)λl

⟨(λt

eλt − 1

)r (et − 1

t

)r (t

et − 1

)s∣∣∣∣xn−l

= λ−mn∑

l=m

(n

l

)S2 (l,m)λl

⟨(et − 1

t

)r (t

et − 1

)s∣∣∣∣ ∞∑k=0

B(r)k

λk

k!tkxn−l

= λ−mn∑

l=m

(n

l

)S2 (l,m)λl

n−l∑k=0

(n− lk

)B

(r)k λk

⟨(et − 1

t

)r (t

et − 1

)s∣∣∣∣xn−l−k

⟩.

Case 1. For r > s ≥ 1, we have⟨(et − 1

t

)r (t

et − 1

)s∣∣∣∣xn−l−k

⟩(2.58)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

807 DAE SAN KIM et al 789-811

Page 30: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

20 DAE SAN KIM AND TAEKYUN KIM

=

⟨(et − 1

t

)r−s∣∣∣∣∣xn−l−k

=

⟨(r − s)!

∞∑j=0

S2 (j + r − s, r − s) j!(j + r − s)!

tj

j!

∣∣∣∣∣∣xn−l−k

= (r − s)!S2 (n− l − k + r − s, r − s) (n− l − k)!

(n− l − k + r − s)!

=S2 (n− l − k + r − s, r − s)/(n− l − k + r − s

r − s

)Case 2. For r = s ≥ 1, we get

(2.59)

⟨(et − 1

t

)r (t

et − 1

)s∣∣∣∣xn−l−k

⟩=⟨

1|xn−l−k⟩

= δ0,n−l−k = δk,n−l.

Case 3. For s > r ≥ 1, we have

(2.60)

⟨(et − 1

t

)r (t

et − 1

)s∣∣∣∣xn−l−k

⟩=

⟨(t

et − 1

)s−r∣∣∣∣∣xn−l−k

⟩= B

(s−r)n−l−k.

Therefore, by (2.56), (2.57), (2.58), (2.59) and (2.60), we obtain the following the-orem.

Theorem 2.12. Let n ≥ 0. Then we have

B(s)n (x) =

n∑m=0

λ−m

n∑l=m

n−l∑k=0

(nl

)(n−lk

)(n−l−k+r−s

r−s

)S2 (l,m)

× S2 (n− l − k + r − s, r − s)λk+lB(r)k

β(r)m (λ, x) , if r > s ≥ 1,

λnn∑

m=0

λ−m

n∑l=m

(n

l

)S2 (l,m)B

(r)n−l

β(r)m (λ, x) , if r = s ≥ 1,

n∑m=0

λ−m

n∑

l=m

n−l∑k=0

(n

l

)(n− lk

)S2 (l,m)

×λk+lB(r)k B

(s−r)n−l−k

β(r)m (λ, x) , if s > r ≥ 1.

Remark. Let r > s ≥ 1. Then we get(2.61)

β(r)n (λ, x) =

n∑m=0

λ−m

n∑l=m

n−l∑k=0

(n

l

)(n− lk

)S1 (l,m)λk+lb

(s)k β

(r−s)n−l−k (λ)

B(s)

m (x) .

For r = s ≥ 1, we have

(2.62) β(r)n (λ, x) = λn

n∑m=0

λ−m

n∑

l=m

(n

l

)S1 (l,m) b

(s)n−l

B(s)

m (x) .

If s > r ≥ 1, then we note that

β(r)n (λ, x)(2.63)

=λnn∑

m=0

λ−m

n∑l=m

n−l∑k=0

n−l−k∑i=0

(nl

)(n−lk

)(n−l−k+s−r

s−r

)S1 (l,m)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

808 DAE SAN KIM et al 789-811

Page 31: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

HIGHER-ORDER DEGENERATE BERNOULLI POLYNOMIALS 21

× S1 (n− l − k + s− r, i+ s− r)S2 (i+ s− r, s− r)λ−ib(s)k

B(s)

m (x) .

From (1.7) and (1.12), we get

(2.64) H(s)n (x|µ) ∼

((et − µ1− µ

)s

, t

).

By (1.19), (1.20), (1.22) and (2.64), we have

(2.65) β(r)n (λ, x) =

n∑m=0

Cn,mH(s)m (x|µ) ,

where

Cn,m

(2.66)

=1

m!

⟨ (e

1λ log(1+λt) − µ

/1− µ

)s(λ(e

1λ log(1+λt) − 1

)/elog(1+λt) − 1

)r ( 1

λlog (1 + λt)

)m∣∣∣∣∣∣xn

=1

m!λm (1− µ)s

⟨((1 + λt)

1λ − µ

)s( t

(1 + λt)1λ − 1

)r

(log (1 + λt))m

∣∣∣∣∣xn⟩

=1

λm (1− µ)s

n∑l=m

(n

l

)S1 (l,m)λl

⟨((1 + λt)

1λ − µ

)s∣∣∣( t

(1 + λt)1λ − 1

)r

xn−l

=1

λm (1− µ)s

n∑l=m

(n

l

)S1 (l,m)λl

n−l∑k=0

(n− lk

)β(r)k (λ)

⟨((1 + λt)

1λ − µ

)s∣∣∣xn−l−k⟩.

It is easy to show that⟨((1 + λt)

1λ − µ

)s∣∣∣xn−l−k⟩

(2.67)

=s∑

i=0

(s

i

)(−µ)

s−i

⟨ ∞∑j=0

(i|λ)jtj

j!

∣∣∣∣∣∣xn−l−k

=s∑

i=0

(s

i

)(−µ)

s−i(i|λ)n−l−k .

From (2.66) and (2.67), we have

Cn,m

(2.68)

=1

λm (1− µ)s

n∑l=m

(n

l

)S1 (l,m)λl

n−l∑k=0

(n− lk

)β(r)k (λ)

s∑i=0

(s

i

)(−µ)

s−i(i|λ)n−l−k

=1

λm (1− µ)s

n∑l=m

n−l∑k=0

s∑i=0

(n

l

)(n− lk

)(s

i

)S1 (l,m)λl (−µ)

s−iβ(r)k (λ) (i|λ)n−l−k .

Therefore, by (2.65) and (2.68), we obtain the following theorem.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

809 DAE SAN KIM et al 789-811

Page 32: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

22 DAE SAN KIM AND TAEKYUN KIM

Theorem 2.13. For µ ∈ C with µ = 1, n ≥ 0, we have

β(r)n (λ, x)

=1

(1− µ)s

n∑m=0

λ−m

n∑l=m

n−l∑k=0

s∑i=0

(n

l

)(n− lk

)(s

i

)S1 (l,m)λl (−µ)

s−i

× β(r)k (λ) (i|λ)n−l−k

H(s)

m (x|µ) .

Remark. For n ≥ 0, we have

H(s)n (x|µ)

=

n∑m=0

1

λm

n−m∑l=0

n−l∑k=m

(n

l

)(n− lk

)S2 (k,m)λk+lB

(r)l H

(r)n−l−k−j (µ)

β(r)m (λ, x) .

ACKNOWLEDGEMENTS.The work reported in this paper was conducted dur-ing the sabbatical year of Kwangwoon University in 2014.

References

1. S. Araci and M. Acikgoz, A note on the Frobenius-Euler numbers and poly-nomials associated with Bernstein polynomials, Adv. Stud. Contemp. Math.(Kyungshang) 22 (2012), no. 3, 399–406. MR 2976598

2. A. Bayad and T. Kim, Identities for the Bernoulli, the Euler and the Genoc-chi numbers and polynomials, Adv. Stud. Contemp. Math. (Kyungshang) 20(2010), no. 2, 247–253. MR 2656975 (2011d:11274)

3. L. Carlitz, A degenerate Staudt-Clausen theorem, Arch. Math. (Basel) 7 (1956),28–33. MR 0074436 (17,586a)

4. , Degenerate Stirling, Bernoulli and Eulerian numbers, Utilitas Math.15 (1979), 51–88. MR 531621 (80i:05014)

5. D. Ding and J. Yang, Some identities related to the Apostol-Euler and Apostol-Bernoulli polynomials, Adv. Stud. Contemp. Math. (Kyungshang) 20 (2010),no. 1, 7–21. MR 2597988 (2011k:05030)

6. S. Gaboury, R. Tremblay, and B.-J. Fugere, Some explicit formulas for cer-tain new classes of Bernoulli, Euler and Genocchi polynomials, Proc. JangjeonMath. Soc. 17 (2014), no. 1, 115–123. MR 3184467

7. Y. He and W. Zhang, A convolution formula for Bernoulli polynomials, ArsCombin. 108 (2013), 97–104. MR 3060257

8. F. T. Howard, Explicit formulas for degenerate Bernoulli numbers, DiscreteMath. 162 (1996), no. 1-3, 175–185. MR 1425786 (97m:11024)

9. K.-W. Hwang, D. V. Dolgy, D. S. Kim, T. Kim, and S. H. Lee, Some the-orems on Bernoulli and Euler numbers, Ars Combin. 109 (2013), 285–297.MR 3087218

10. Hassan Jolany, R. Eizadi Alikelaye, and S. Sharif Mohamad, Some results onthe generalization of Bernoulli, Euler and Genocchi polynomials, Acta Univ.Apulensis Math. Inform. (2011), no. 27, 299–306. MR 2896405 (2012k:11026)

11. D. S. Kim and T. Kim, Some identities of Bernoulli and Euler polynomialsarising form umbral calculus, Adv. Stud. Contemp. Math. (Kyungshang) 23(2013), no. 1, 159–171. MR 3059325

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

810 DAE SAN KIM et al 789-811

Page 33: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

HIGHER-ORDER DEGENERATE BERNOULLI POLYNOMIALS 23

12. D. S. Kim, T. Kim, S.-H. Lee, and J.-J. Seo, A note on the lambda-Daeheepolynomials, Int. J. Math. Anal. (Ruse) 7 (2013), no. 61-64, 3069–3080.MR 3162167

13. T. Kim, Some identities for the Bernoulli, the Euler and the Genocchi numbersand polynomials, Adv. Stud. Contemp. Math. (Kyungshang) 20 (2010), no. 1,23–28. MR 2597989 (2011a:11211)

14. , Identities involving Laguerre polynomials derived from umbral calculus,Russ. J. Math. Phys. 21 (2014), no. 1, 36–45. MR 3182545

15. S.-H. Rim and J. Jeong, Identities on the modified q-Euler and q-Bernsteinpolynomials and numbers with weight, J. Comput. Anal. Appl. 15 (2013), no. 1,39–44. MR 3076716

16. S. Roman, The umbral calculus, Pure and Applied Mathematics, vol. 111, Aca-demic Press, Inc. [Harcourt Brace Jovanovich, Publishers], New York, 1984.MR 741185 (87c:05015)

17. E. Sen, Theorems on Apostol-Euler polynomials of higher order arising fromEuler basis, Adv. Stud. Contemp. Math. (Kyungshang) 23 (2013), no. 2, 337–345. MR 3088764

18. A. V. Ustinov, Korobov polynomials and umbral analysis, Chebyshevskiı Sb. 4(2003), no. 4(8), 137–152. MR 2097912 (2005m:33018)

19. M. Wu and H. Pan, Sums of products of the degenerate Euler numbers, Ad-vances in Difference Equations (2014), 2014:40.

20. P. T. Young, Degenerate Bernoulli polynomials, generalized factorial sums, andtheir applications, J. Number Theory 128 (2008), no. 4, 738–758. MR 2400037(2009b:11045)

21. Z. Zhang and H. Yang, Some closed formulas for generalized Bernoulli-Eulernumbers and polynomials, Proc. Jangjeon Math. Soc. 11 (2008), no. 2, 191–198.MR 2482602 (2010a:11036)

Department of Mathematics, Sogang University, Seoul 121-742, Republic of Korea

E-mail address: [email protected]

Department of Mathematics, Kwangwoon University, Seoul 139-701, Republic of Ko-

reaE-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

811 DAE SAN KIM et al 789-811

Page 34: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

KOROBOV POLYNOMIALS OF THE SEVENTH KIND AND OFTHE EIGHTH KIND

DAE SAN KIM, TAEKYUN KIM, TOUFIK MANSOUR, AND JONG-JIN SEO

Abstract. In this paper, we consider the Korobov polynomials of the seventh kindand of the eighth kind. We present several explicit formulas and recurrence relationsfor these polynomials. In addition, we establish connections between our polynomialsand several known families of polynomials.

1. Introduction

The degenerate Bernoulli polynomials are the degenerate version of Bernoulli polyno-mials introduced by Calitz [3, 4]. On the other hand, the Korobov polynomials of thefirst kind are the first degenerate version of the Bernoulli polynomials of the secondkind, see [13,14].

In recent years, many researchers studied various kinds of degenerate versions of fam-ilies polynomials like Bernoulli polynomials, Euler polynomials, falling factorial poly-nomials, Bell polynomials and their variants, see [6–10] and references therein. Alongthis line of research, we introduced in [8, 9] four kinds of new degenerate versions ofBernoulli polynomials of the second kind, called the Korobov polynomials of the third,fourth, fifth, and sixth kind.

Here, we will discuss two other degenerate versions of Bernoulli polynomials of thesecond kind, namely, the Korobov polynomials of the seventh and eighth kind. We willinvestigate some properties, explicit expressions, recurrence relations, and connectionswith other families polynomials with the help of umbral calculus (see [10, 15, 16]). Todo that, we recall some families polynomials. The Bernoulli polynomials of the secondkind bn(x) are given by the generating function

t

log(1 + t)(1 + t)x =

∑n≥0

bn(x)tn

n!.(1.1)

For x = 0, bn = bn(0) are called the Bernoulli numbers of the second kind. The Daeheepolynomials Dn(x) are defined by the generating function

log(1 + t)

t(1 + t)x =

∑n≥0

Dn(x)tn

n!.(1.2)

2010 Mathematics Subject Classification. 05A19, 05A40, 11B83.Key words and phrases. Korobov polynomials of the seventh kind and of the eighth kind, Umbral

calculus.1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

812 DAE SAN KIM et al 812-824

Page 35: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

2 DAE SAN KIM, TAEKYUN KIM, TOUFIK MANSOUR, AND JONG-JIN SEO

When x = 0, Dn = Dn(0) are called the Daehee numbers. The Krobov polynomialsKn(λ, x) of the first kind are given by

λt

(1 + t)λ − 1(1 + t)x =

∑n≥0

Kn(λ, x)tn

n!.(1.3)

When x = 0, Kn(λ) = Kn(λ, 0) are called the Korobov numbers of the first kind. Thedegenerate falling factorial polynomials (x)n,λ were defined in [7] by the generatingfunction

(1 + λ)xλ

(1+t)λ−1λ =

∑n≥0

(x)n,λtn

n!.(1.4)

Clearly, limλ→0(x)n,λ = (x)n, the nth falling factorial polynomial. These polynomialscan be defined as (x)n,λ ∼ (1, f(t)), where

f(t) =

(1 +

λ2t

log(1 + λ)

) 1λ

− 1 and f(t) =log(1 + λ)

λ

(1 + t)λ − 1

λ.(1.5)

Note that we write sn(x) ∼ (g(t), f(t)) if∑

n≥0 sn(x) tn

n!= 1

g(f(t))exf(t), where f(t) is the

compositional inverse of f(t), see [15, 16]. The degenerate Stirling numbers of the firstkind S1(n, k | λ), n ≥ k ≥ 0, were given in [7] by the generating function

1

k!

((1 + t)λ − 1

λ

)k

=∑n≥k

S1(n, k | λ)tn

n!,(1.6)

so that, in the notation of umbral calculus, S1(n, k | λ) = 1k!

⟨((1+t)λ−1

λ

)k|xn⟩

. Then,

it was shown in [7] that

(x)n,λ =n∑

k=0

(log(1 + λ)

λ

)k

S1(n, k | λ)xk

with

S1(n, k | λ) =n∑

m=k

S1(n,m)S2(m, k)λm−k,

where limλ→0 S1(n, k | λ) = S1(n, k) is the Stirling number of the first kind.

Here, we introduce Korobov polynomials of the seventh kindKn,7(λ, x) and of the eighthkind Kn,9(λ, x), respectively given by

log(1 + λt)

λ log(1 + t)(1 + λ)

(1+t)λ−1λ =

∑n≥0

Kn,7(λ, x)tn

n!,(1.7)

log(1 + λt)

(1 + t)λ − 1(1 + λ)

(1+t)λ−1λ =

∑n≥0

Kn,8(λ, x)tn

n!.(1.8)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

813 DAE SAN KIM et al 812-824

Page 36: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

KOROBOV POLYNOMIALS OF THE SEVENTH KIND AND OF THE EIGHTH KIND 3

When x = 0, Kn,7(λ) = Kn,7(λ, 0) and Kn,8(λ) = Kn,8(λ, 0) are called the Korobovnumbers of the seventh kind and of the eighth kind, respectively. We observe that

limλ→0

λt

(1 + t)λ − 1(1 + t)x = lim

λ→0

log(1 + λt)

λ log(1 + t)(1 + λ)

(1+t)λ−1λ

= limλ→0

log(1 + λt)

(1 + t)λ − 1(1 + λ)

(1+t)λ−1λ =

t

log(1 + t)(1 + t)x,

which implies that limλ→0Kn(λ, x) = limλ→0Kn,7(λ, x) = limλ→0Kn,8(λ, x) = bn(x).It is immediate to see that Kn,7(λ, x) and Kn,8(λ, x) are Sheffer sequences (see [15,16])

for the respective pairs(

λ log(1+f(t))log(1+λf(t))

, f(t))

and(

(1+f(t))λ−1log(1+λf(t))

, f(t))

, where f(t) is given

in (1.5). Thus, (1.7) and (1.8) can be presented as

Kn,7(λ, x) ∼(λ log(1 + f(t))

log(1 + λf(t)), f(t)

)=

log(

1 + λ2tlog(1+λ)

)log(1 + λf(t))

, f(t)

,(1.9)

Kn,8(λ, x) ∼(

(1 + f(t))λ − 1

log(1 + λf(t)), f(t)

)=

(λ2t

log(1+λ)

log(1 + λf(t)), f(t)

).(1.10)

In the next two sections, we will use umbral calculus in order to study some properties,explicit formulas, recurrence relations and identities about the Korobov polynomialsof the seventh kind and of the eighth kind. In last section, we present connectionsbetween our polynomials and several known families of polynomials.

2. Explicit expressions

In this section, we present several explicit formulas for the Korobov polynomials of theseventh kind and of the eighth kind, namely Kn,7(λ, x) and Kn,8(λ, x).

Theorem 2.1. For all n ≥ 0,

Kn,7(λ, x) =n∑

k=0

n∑ℓ=k

(n

)logk(1 + λ)

λkS1(ℓ, k|λ)Kn−ℓ,7(λ)xk

=n∑

k=0

n∑ℓ=k

n−ℓ∑m=0

(n

)(n− ℓm

)logk(1 + λ)

λkS1(ℓ, k|λ)bmDn−ℓ−mλ

n−ℓ−mxk,

Kn,8(λ, x) =n∑

k=0

n∑ℓ=k

(n

)logk(1 + λ)

λkS1(ℓ, k|λ)Kn−ℓ,8(λ)xk

=n∑

k=0

n∑ℓ=k

n−ℓ∑m=0

(n

)(n− ℓm

)logk(1 + λ)

λkS1(ℓ, k|λ)Km(λ)Dn−ℓ−mλ

n−ℓ−mxk.

Proof. We proceed the proof by using the conjugation representation for Sheffer se-quences (see [15,16]): sn(x) =

∑nk=0

1k!⟨g(f(t))−1f(t)k|xn⟩xk, for any sn(x) ∼ (g(t), f(t)).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

814 DAE SAN KIM et al 812-824

Page 37: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

4 DAE SAN KIM, TAEKYUN KIM, TOUFIK MANSOUR, AND JONG-JIN SEO

Thus, by (1.9), we have

Kn,7(λ, x) =n∑

k=0

1

k!

⟨log(1 + λt)

λ log(1 + t)

logk(1 + λ)((1 + t)λ − 1)k

λ2k|xn⟩xk

=n∑

k=0

logk(1 + λ)

λk

⟨log(1 + λt)

λ log(1 + t)|((1 + t)λ − 1)k

k!λkxn⟩xk,

which, by (1.6) and (1.7), implies

Kn,7(λ, x) =n∑

k=0

logk(1 + λ)

λk

⟨log(1 + λt)

λ log(1 + t)|∑ℓ≥k

S1(ℓ, k|λ)tℓ

ℓ!xn

⟩xk

=n∑

k=0

n∑ℓ=k

(n

)logk(1 + λ)

λkS1(ℓ, k|λ)

⟨log(1 + λt)

λ log(1 + t)|xn−ℓ

⟩xk(2.1)

=n∑

k=0

n∑ℓ=k

(n

)logk(1 + λ)

λkS1(ℓ, k|λ)Kn−ℓ,7(λ)xk.

On the other hand, by (2.1), we have

Kn,7(λ, x) =n∑

k=0

n∑ℓ=k

(n

)logk(1 + λ)

λkS1(ℓ, k|λ)

⟨log(1 + λt)

λt| t

log(1 + t)xn−ℓ

⟩xk,

which, by (1.1) and (1.2), we obtain

Kn,7(λ, x)

=n∑

k=0

n∑ℓ=k

(n

)logk(1 + λ)

λkS1(ℓ, k|λ)

⟨log(1 + λt)

λt|∑m≥0

bmtm

m!xn−ℓ

⟩xk

=n∑

k=0

n∑ℓ=k

n−ℓ∑m=0

(n

)(n− ℓm

)logk(1 + λ)

λkS1(ℓ, k|λ)bm

⟨log(1 + λt)

λt|xn−ℓ−m

⟩xk

=n∑

k=0

n∑ℓ=k

n−ℓ∑m=0

(n

)(n− ℓm

)logk(1 + λ)

λkS1(ℓ, k|λ)bm

⟨∑j≥0

Djλj t

j

j!|xn−ℓ−m

⟩xk

=n∑

k=0

n∑ℓ=k

n−ℓ∑m=0

(n

)(n− ℓm

)logk(1 + λ)

λkS1(ℓ, k|λ)bmDn−ℓ−mλ

n−ℓ−mxk,

which completes the proof of formulas for kn,7(λ, x).

Now let us deal with the case Kn,8(λ, x). Similarly, by using the conjugation represen-tation for Sheffer sequences, (1.10) and (1.6), we obtain

Kn,8(λ, x) =n∑

k=0

n∑ℓ=k

(n

)logk(1 + λ)

λkS1(ℓ, k|λ)

⟨log(1 + λt)

(1 + t)λ − 1|xn−ℓ

⟩xk(2.2)

=n∑

k=0

n∑ℓ=k

(n

)logk(1 + λ)

λkS1(ℓ, k|λ)Kn−ℓ,8(λ)xk.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

815 DAE SAN KIM et al 812-824

Page 38: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

KOROBOV POLYNOMIALS OF THE SEVENTH KIND AND OF THE EIGHTH KIND 5

On the other hand, by (2.2), we have

Kn,8(λ, x) =n∑

k=0

n∑ℓ=k

(n

)logk(1 + λ)

λkS1(ℓ, k|λ)

⟨log(1 + λt)

λt| λt

(1 + t)λ − 1xn−ℓ

⟩xk,

which, by (1.3) and (1.2), we obtain

Kn,8(λ, x)

=n∑

k=0

n∑ℓ=k

(n

)logk(1 + λ)

λkS1(ℓ, k|λ)

⟨log(1 + λt)

λt|∑m≥0

Km(λ)tm

m!xn−ℓ

⟩xk

=n∑

k=0

n∑ℓ=k

n−ℓ∑m=0

(n

)(n− ℓm

)logk(1 + λ)

λkS1(ℓ, k|λ)Km(λ)

⟨log(1 + λt)

λt|xn−ℓ−m

⟩xk

=n∑

k=0

n∑ℓ=k

n−ℓ∑m=0

(n

)(n− ℓm

)logk(1 + λ)

λkS1(ℓ, k|λ)Km(λ)Dn−ℓ−mλ

n−ℓ−mxk,

(2.3)

which completes the proof.

Now, we express our polynomials in terms of the degenerate falling factorial polyno-mials.

Theorem 2.2. For all n ≥ 0,

Kn,7(λ, x) =n∑

ℓ=0

(n

)( n−ℓ∑m=0

(n− ℓm

)λn−ℓ−mbmDn−ℓ−m

)(x)ℓ,λ,

Kn,8(λ, x) =n∑

ℓ=0

(n

)( n−ℓ∑m=0

(n− ℓm

)λn−ℓ−mKm(λ)Dn−ℓ−m

)(x)ℓ,λ.

Proof. By (1.9), we have

Kn,7(λ, y) =

⟨log(1 + λt)

λ log(1 + t)(1 + λ)

(1+t)λ−1λ |xn

⟩=

⟨log(1 + λt)

λ log(1 + t)|(1 + λ)

(1+t)λ−1λ xn

⟩,

which, by (1.4), implies

Kn,7(λ, y) =

⟨log(1 + λt)

λ log(1 + t)|∑ℓ≥0

(y)ℓ,λtℓ

ℓ!xn

⟩=

n∑ℓ=0

(n

)(y)ℓ,λ

⟨log(1 + λt)

λ log(1 + t)|xn−ℓ

⟩.

Therefore, by (2.1), we obtain

Kn,7(λ, y) =n∑

ℓ=0

(n

)( n−ℓ∑m=0

(n− ℓm

)λn−ℓ−mbmDn−ℓ−m

)(y)ℓ,λ,

which completes the proof for Kn,7(λ, y).

By using similar arguments as above together with (1.10) and (1.4), we obtain

Kn,8(λ, y) =n∑

ℓ=0

(n

)(y)ℓ,λ

⟨log(1 + λt)

(1 + t)λ − 1|xn−ℓ

⟩.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

816 DAE SAN KIM et al 812-824

Page 39: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

6 DAE SAN KIM, TAEKYUN KIM, TOUFIK MANSOUR, AND JONG-JIN SEO

Therefore, by (2.2) and (2.3), we have

Kn,8(λ, y) =n∑

ℓ=0

(n

)( n−ℓ∑m=0

(n− ℓm

)λn−ℓ−mKm(λ)Dn−ℓ−m

)(y)ℓ,λ,

which completes the proof.

In the next theorem, we find explicit formulas for the coefficient of xj in Kn,7(λ, x) andKn,8(λ, x).

Theorem 2.3. For all n ≥ 0 and s = 7, 8,

Kn,s(λ, x)

=n∑

j=0

(n∑

k=j

k∑ℓ=0

ℓ∑m=0

(−1)ℓ−m

ℓ!

(ℓ

m

)(k

j

)(m|λ)k−j

logj(1 + λ)

λjS1(n, k|λ)Kℓ,s(λ)

)xj.

Proof. By (1.4) and (1.9), we have

λ log(1 + f(t))

log(1 + λf(t))Kn,7(λ, x) = (x)n,λ =

n∑k=0

logk(1 + λ)

λkS1(n, k|λ)xk ∼ (1, f(t)).

Thus,

Kn,7(λ, x) =n∑

k=0

logk(1 + λ)

λkS1(n, k|λ)

log(1 + λf(t))

λ log(1 + f(t))xk

=n∑

k=0

k∑ℓ=0

logk(1 + λ)

λkS1(n, k|λ)

Kℓ,7(λ)

ℓ!(f(t))ℓxk.(2.4)

Note that

(f(t))ℓxk =ℓ∑

m=0

(ℓ

m

)(−1)ℓ−m

(1 + λ2t/ log(1 + λ)

)m/λxk

=ℓ∑

m=0

k∑j=0

(ℓ

m

)(−1)ℓ−m(m|λ)j (λ/ log(1 + λ))j

(k

j

)xk−j.

Therefore,

Kn,7(λ, x)

=n∑

k=0

k∑ℓ=0

ℓ∑m=0

k∑j=0

(−1)ℓ−m(m|λ)k−jlogj(1 + λ)

λjS1(n, k|λ)

Kℓ,7(λ)

ℓ!

(ℓ

m

)(k

j

)xj

=n∑

j=0

(n∑

k=j

k∑ℓ=0

ℓ∑m=0

(−1)ℓ−m

ℓ!

(ℓ

m

)(k

j

)(m|λ)k−j

logj(1 + λ)

λjS1(n, k|λ)Kℓ,7(λ)

)xj.

By (1.4) and (1.10), we have

(1 + f(t))λ − 1

log(1 + λf(t))Kn,8(λ, x) = (x)n,λ =

n∑k=0

logk(1 + λ)

λkS1(n, k|λ)xk ∼ (1, f(t)).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

817 DAE SAN KIM et al 812-824

Page 40: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

KOROBOV POLYNOMIALS OF THE SEVENTH KIND AND OF THE EIGHTH KIND 7

Thus, by using the above arguments, we obtain

Kn,8(λ, x)

=n∑

j=0

(n∑

k=j

k∑ℓ=0

ℓ∑m=0

(−1)ℓ−m

ℓ!

(ℓ

m

)(k

j

)(m|λ)k−j

logj(1 + λ)

λjS1(n, k|λ)Kℓ,8(λ)

)xj,

which completes the proof.

In the next theorem, we express Korobov polynomials of seventh and eighth kinds interms of Korobov polynomials of fifth and sixth kinds.

Theorem 2.4. For all n ≥ 0 and s = 7, 8,

Kn,s(λ, x) =n∑

ℓ=0

(n

)Dn−ℓλ

n−ℓKℓ,s−2(λ, x).

Proof. Recall that Korobov polynomials of the fifth kind (see [9]) is given by

t

log(1 + t)(1 + λ)

(1+t)λ−1λ =

∑n≥0

Kn,5(λ, x)tn

n!.

So, by (1.7), we have

Kn,7(λ, y) =

⟨log(1 + λt)

λt| t

log(1 + t)(1 + λ)

(1+t)λ−1λ xn

⟩=

n∑ℓ=0

(n

)Kℓ,5(λ, y)

⟨log(1 + λt)

λt|xn−ℓ

⟩,

which, by (1.2), implies Kn,7(λ, y) =∑n

ℓ=0

(nℓ

)Kℓ,5(λ, y)Dn−ℓλ

n−ℓ.

Recall that Korobov polynomials of the sixth kind (see [9]) is defined by

λt

(1 + t)λ − 1(1 + λ)

xλ,y

(1+t)λ−1λ =

∑n≥0

Kn,6(λ, x)tn

n!.

Similarly, by (1.2) and (1.8), we obtain Kn,8(λ, y) =∑n

ℓ=0

(nℓ

)Kℓ,6(λ, y)Dn−ℓλ

n−ℓ, asclaimed.

In the next theorem, we express our polynomials Kn,7(λ, x) and Kn,8(λ, x) in terms

of degenerate Bernoulli numbers β(n)ℓ (λ) of order n, which are given by the generating

function

tn

((1 + λt)1/λ − 1)n=∑ℓ≥0

β(n)ℓ (λ)

tℓ

ℓ!.(2.5)

Theorem 2.5. For all n ≥ 1 and s = 7, 8,

Kn,s(λ, x)

n∑j=0

(n∑

k=j

k∑ℓ=0

ℓ∑m=0

(−1)ℓ−m(n−1k−1

)(ℓm

)(kj

)ℓ!

(m|λ)k−j

(log(1 + λ)

λ

)j

β(n)n−k(λ)Kℓ,s(λ)

)xj.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

818 DAE SAN KIM et al 812-824

Page 41: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

8 DAE SAN KIM, TAEKYUN KIM, TOUFIK MANSOUR, AND JONG-JIN SEO

Proof. It is not hard to see that logn(1+λ)xn

λn ∼ (1, λt/ log(1 + λ)). Thus, by (1.9), wehave

λ log(1 + f(t))

log(1 + λf(t))Kn,7(λ, x) = x

(λt

log(1+λ)

(1 + λ2t/ log(1 + λ))1/λ − 1

)n

x−1 logn(1 + λ)xn

λn

=logn(1 + λ)

λnx

(r

(1 + λr)1/λ − 1

)n

|r=λt/ log(1+λ) xn−1,

which, by (2.5), implies

λ log(1 + f(t))

log(1 + λf(t))Kn,7(λ, x) =

logn(1 + λ)

λnx∑k≥0

β(n)k (λ)

1

k!

(λt

log(1 + λ)

)k

xn−1

=n−1∑k=0

(n− 1

k

)β(n)k (λ)

(log(1 + λ)

λ

)n−k

xn−k

=n∑

k=0

(n− 1

k − 1

)β(n)n−k(λ)

(log(1 + λ)

λ

)k

xk.

On the other hand, by (2.4), we have

log(1 + λf(t))

λ log(1 + f(t))xk

=k∑

ℓ=0

ℓ∑m=0

k∑j=0

Kℓ,7(λ)

ℓ!

(ℓ

m

)(k

j

)(−1)ℓ−m(m|λ)k−−j

λk−j

logk−j(1 + λ)xj.

Therefore, the polynomials Kn,7(λ, x) is given by

n∑j=0

(n∑

k=j

k∑ℓ=0

ℓ∑m=0

(−1)ℓ−m(n−1k−1

)(ℓm

)(kj

)ℓ!

(m|λ)k−j

(log(1 + λ)

λ

)j

β(n)n−k(λ)Kℓ,7(λ)

)xj.

By using similar argument as above with using (1.10), we obtain the formula for the nthKorobov polynomial kn,8(λ, x) of the eighth kind (we leave the details for the interestedreader).

3. Recurrences

In this section, we present several recurrences for the Korobov polynomials of theseventh kind and of the eighth kind. Note that, by (1.9), (1.10) and the fact that(x)n,λ ∼ (1, f(t)), we obtain Kn,d(λ, x+ y) =

∑nj=0

(nj

)Kj,d(λ, x)(y)n−j,λ, for d = 7, 8.

Proposition 3.1. For all n ≥ 1 and s = 7, 8,

Kn,s(λ, x) + nKn−1,s(λ, x)

=n∑

m=0

(n∑

k=m

n∑ℓ=k

(n

)(k

m

)(1|λ)k−m

logm(1 + λ)

λmS1(ℓ, k|λ)Kn−ℓ,s(λ)

)xm.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

819 DAE SAN KIM et al 812-824

Page 42: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

KOROBOV POLYNOMIALS OF THE SEVENTH KIND AND OF THE EIGHTH KIND 9

Proof. It is well-known that if sn(x) ∼ (g(t), f(t)), then we have f(t)sn(x) = nsn−1(x)

(see [15,16]). Thus, by (1.9) and (1.10), we obtain

((1 + λ2t

log(1+λ)

) 1λ − 1

)Kn,s(λ, x) =

nKn−1,s(λ, x), which implies Kn,s(λ, x) + nKn−1,s(λ, x) =(

1 + λ2tlog(1+λ)

) 1λKn,s(λ, x).

By Theorem 2.1 we have

Kn,s(λ, x) + nKn−1,s(λ, x)

=n∑

k=0

n∑ℓ=k

(n

)logk(1 + λ)

λkS1(ℓ, k|λ)Kn−ℓ,s(λ)

(1 +

λ2t

log(1 + λ)

) 1λ

xk

=n∑

k=0

n∑ℓ=k

k∑m=0

(n

)logk−m(1 + λ)

λk−mS1(ℓ, k|λ)Kn−ℓ,s(λ)(1|λ)m

tm

m!xk

=n∑

k=0

n∑ℓ=k

k∑m=0

(n

)(k

m

)logk−m(1 + λ)

λk−mS1(ℓ, k|λ)Kn−ℓ,s(λ)(1|λ)mx

k−m

=n∑

m=0

(n∑

k=m

n∑ℓ=k

(n

)(k

m

)(1|λ)k−m

logm(1 + λ)

λmS1(ℓ, k|λ)Kn−ℓ,s(λ)

)xm.

which completes the proof.

In the next result, we express ddxKn,7(λ, x) and d

dxKn,8(λ, x) in terms of Kn,7(λ, x) and

Kn,8(λ, x), respectively.

Proposition 3.2. For all n ≥ 0 and s = 7, 8,

d

dxKn,s(λ, x) =

log(1 + λ)

λ2

n−1∑ℓ=0

(n

)(λ)n−ℓKℓ,s(λ, x).

Proof. Note that ddxsn(x) =

∑n−1ℓ=0

(nℓ

)⟨f(t)|xn−ℓ⟩sℓ(x), for all sn(x) ∼ (g(t), f(t)), see

[15, 16]. So, for sn(x) = Kn,s(λ, x), it remains to compute A = ⟨f(t)|xn−ℓ⟩. By (1.9)

and (1.10), we have A = log(1+λ)λ2 ⟨

∑j≥1(λ)j

tj

j!|xn−ℓ⟩ = log(1+λ)

λ2 (λ)n−ℓ, which completes

the proof.

Theorem 3.3. For all n ≥ 1 and s = 7, 8,

Kn,s(λ, x) =x log(1 + λ)

λ

n−1∑ℓ=0

(n− 1

)(λ− 1)n−1−ℓKℓ,s(λ, x)

+1

n

n∑ℓ=0

n−ℓ∑m=0

(n

)(n− ℓ)n−ℓ−mus(ℓ,m),

where

u7(ℓ) = bℓ

(−λ)n−ℓ−m(x)m,λ − (−1)n−ℓ−mKm,7(λ, x),

u8(ℓ) = Kℓ(λ)

(−λ)n−ℓ−m(x)m,λ −

(λ− 1

n− ℓ−m

)Km,8(λ, x)

.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

820 DAE SAN KIM et al 812-824

Page 43: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

10 DAE SAN KIM, TAEKYUN KIM, TOUFIK MANSOUR, AND JONG-JIN SEO

Proof. Since the similarity between Kn,7(λ, x) and Kn,8(λ, x) (see (1.9) and (1.10)), weomit the proof of the case Kn,8(λ, x) and give only the details of the case Kn,7(λ, x).By (1.9), we have

Kn,7(λ, y) =

⟨d

dt

(log(1 + λt)

λ log(1 + t)(1 + λ)

(1+t)λ−1λ

)|xn−1

⟩= A+B,(3.1)

whereB =

⟨ddt

log(1+λt)λ log(1+t)

(1 + λ)yλ

(1+t)λ−1λ |xn−1

⟩andA =

⟨log(1+λt)λ log(1+t)

ddt

(1 + λ)yλ

(1+t)λ−1λ |xn−1

⟩.

First, we compute the term B.

B =

⟨log(1 + λt)

λ log(1 + t)(1 + λ)

(1+t)λ−1λ

log(1 + λ)

λy(1 + t)λ−1|xn−1

⟩=y log(1 + λ)

λ

⟨log(1 + λt)

λ log(1 + t)(1 + λ)

(1+t)λ−1λ |(1 + t)λ−1xn−1

⟩=y log(1 + λ)

λ

n−1∑ℓ=0

(n− 1

)(λ− 1)ℓ

⟨log(1 + λt)

λ log(1 + t)(1 + λ)

(1+t)λ−1λ |xn−1−ℓ

=y log(1 + λ)

λ

n−1∑ℓ=0

(n− 1

)(λ− 1)ℓKn−1−ℓ,7(λ, y)

=y log(1 + λ)

λ

n−1∑ℓ=0

(n− 1

)(λ− 1)n−1−ℓKℓ,7(λ, y).

Now, we compute the first term A,

A =

⟨t

log(1 + t)

1

t

1

1 + λt− log(1 + λt)

λ log(1 + t)(1 + t)−1

(1 + λ)

(1+t)λ−1λ |xn−1

⟩=

1

n

⟨1

1 + λt− log(1 + λt)

λ log(1 + t)(1 + t)−1

(1 + λ)

(1+t)λ−1λ | t

log(1 + t)xn⟩

=1

n

⟨1

1 + λt− log(1 + λt)

λ log(1 + t)(1 + t)−1

(1 + λ)

(1+t)λ−1λ |

∑ℓ≥0

bℓtℓ

ℓ!xn

⟩.

Note that 11+λt− log(1+λt)

λ log(1+t)(1 + t)−1 has order at least one. Thus,

A =1

n

n∑ℓ=0

(n

)bℓ

⟨(1 + λ)

(1+t)λ−1λ | 1

1 + λtxn−ℓ

⟩−⟨

log(1 + λt)

λ log(1 + t)(1 + λ)

(1+t)λ−1λ | 1

1 + txn−ℓ

⟩=

1

n

n∑ℓ=0

(n

)bℓ

n−ℓ∑m=0

(−λ)m(n− ℓ)m

⟨∑k≥0

(y)k,λtk

k!|xn−ℓ−m

−n−ℓ∑m=0

(−1)m(n− ℓ)m

⟨∑k≥0

Kk,7(λ, y)tk

k!|xn−ℓ−m

⟩,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

821 DAE SAN KIM et al 812-824

Page 44: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

KOROBOV POLYNOMIALS OF THE SEVENTH KIND AND OF THE EIGHTH KIND 11

which implies

A =1

n

n∑ℓ=0

n−ℓ∑m=0

(n

)bℓ

(−λ)m(n− ℓ)m(y)n−ℓ−m,λ − (−1)m(n− ℓ)mKn−ℓ−m,7(λ, y)

,

Hence, by substituting the expressions of A and B in (3.1), we complete the proof.

4. Connections with families of polynomials

In this section, we present some examples on the connections with families of poly-nomials. To do that, we recall for any two Sheffer sequences sn(x) ∼ (g(t), f(t)) andrn(x) ∼ (h(t), ℓ(t)), we have that sn(x) =

∑nm=0Cn,mrm(x), where (see [15,16])

Cn,m =1

m!

⟨h(f(t))

g(f(t))(ℓ(f(t)))m|xn

⟩.(4.1)

We start with the connection to Bernoulli polynomials B(s)n (x) of order s. Recall that

the Bernoulli polynomials B(s)n (x) of order s are defined by the generating function(

tet−1

)sext =

∑n≥0B

(s)n (x) t

n

n!, equivalently,

B(s)n (x) ∼

((et − 1

t

)s

, t

)(4.2)

(see [2, 5, 15]). In the next result, we express our polynomials in terms of Bernoullipolynomials of order s.

Theorem 4.1. Let d = 7, 8. For all n ≥ 0, Kn,d(λ, x) =∑n

k=0Cn,mB(s)m (x), where

Cn,m =n−m∑ℓ=0

n−ℓ−m∑k=0

(nℓ

)(k+mm

)(k+ss

) Kℓ,d(λ)S2(k + s, s)logk+m(1 + λ)

λk+mS1(n− ℓ, k +m|λ).

Proof. Since the similarity between Kn,7(λ, x) and Kn,8(λ, x) (see (1.9) and (1.10)), weomit the proof of the case Kn,8(λ, x) and give only the details of the case Kn,7(λ, x).

Let Kn,7(λ, x) =∑n

m=0Cn,mB(s)m (x). So, by (1.9) and (4.2), we have

Cn,m =1

m!

⟨(ef(t) − 1)s

f s(t)

log(1 + λt)

λ log(1 + t)fm(t)|xn

=1

m!

⟨(ef(t) − 1)s

f s(t)fm(t)| log(1 + λt)

λ log(1 + t)xn

=1

m!

⟨(ef(t) − 1)s

f s(t)fm(t)|

∑ℓ≥0

Kℓ,7(λ)tℓ

ℓ!xn

=1

m!

n∑ℓ=0

(n

)Kℓ,7(λ)

⟨s!∑k≥0

S2(k + s, s)fk+m(t)

(k + s)!|xn−ℓ

⟩.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

822 DAE SAN KIM et al 812-824

Page 45: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

12 DAE SAN KIM, TAEKYUN KIM, TOUFIK MANSOUR, AND JONG-JIN SEO

Thus,

Cn,m =s!

m!

n−m∑ℓ=0

n−ℓ−m∑k=0

(n

)Kℓ,7(λ)S2(k + s, s)

⟨fk+m(t)

(k + s)!|xn−ℓ

=s!

m!

n−m∑ℓ=0

n−ℓ−m∑k=0

(n

)Kℓ,7(λ)S2(k + s, s)

logk+m(1 + λ)

(k + s)!λk+m

⟨((1 + t)λ − 1)k+m

λk+m|xn−ℓ

=s!

m!

n−m∑ℓ=0

n−ℓ−m∑k=0

(n

)Kℓ,7(λ)S2(k + s, s)

logk+m(1 + λ)

(k + s)!λk+m(k +m)!S1(n− ℓ, k +m|λ).

Therefore,

Cn,m =n−m∑ℓ=0

n−ℓ−m∑k=0

(nℓ

)(k+mm

)(k+ss

) Kℓ,7(λ)S2(k + s, s)logk+m(1 + λ)

λk+mS1(n− ℓ, k +m|λ),

as required.

Similar techniques as in the proof of the previous theorem, we can express our poly-nomials Kn,7(λ, x), Kn,8(λ, x) in terms of other families. Below we present two ex-amples, where we leave the proofs to the interested reader. In the first example,we express our polynomials in terms of Frobenius-Euler polynomials. Note that the

Frobenius-Euler polynomials H(s)n (x|µ) of order s are defined by the generating function(

1−µet−µ

)sext =

∑n≥0H

(s)n (x|µ) t

n

n!, (µ = 1), or equivalently, H

(s)n (x|µ) ∼

((et−µ1−µ

)s, t)

(see [1, 11,12]).

Theorem 4.2. For all n ≥ 0 and d = 7, 8, Kn,d(λ, x) =∑n

m=0Cn,mH(s)m (x|µ), where

Cn,m =n−m∑ℓ=0

s∑k=0

n−ℓ−m∑j=k

k!(j+mm

)(nℓ

)(sk

)(1− µ)k

logj+m(1 + λ)

λj+mS1(n− ℓ, j +m|λ)S2(j, k)Kℓ,d(λ).

For what follows, we define the associated sequence for 1 − (1 + λ2t/ log(1 + λ))−1/λ,namely (x)(n,λ). Thus,

(x)(n,λ) ∼ (1, 1− (1 + λ2t/ log(1 + λ))−1/λ).

Recall here that (x)n ∼ (1, et − 1), (x)(n) ∼ (1, 1 − e−t), (x)n,λ ∼ (1, (1 + λ2t/ log(1 +λ))1/λ − 1) and (1 + λ2t/ log(1 + λ))1/λ − 1 → et − 1, as λ → 0. Now, we ready topresent our second example.

Theorem 4.3. For all n ≥ 0 and d = 7, 8, Kn,d(λ, x) =∑n

m=0Cn,m(x)(m,λ), where

Cn,m =n∑

ℓ=0

(−1)n−ℓ−m

(n

)(n− ℓm

)(n− 1− ℓ)n−ℓ−mKℓ,d(λ).

ACKNOWLEDGEMENTS.The work reported in this paper was conducted during thesabbatical year of Kwangwoon University in 2014.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

823 DAE SAN KIM et al 812-824

Page 46: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

KOROBOV POLYNOMIALS OF THE SEVENTH KIND AND OF THE EIGHTH KIND 13

References

[1] S. Araci and M. Acikgoz, A note on the Frobenius-Euler numbers and polynomials associatedwith Bernstein polynomials, Adv. Stud. Contemp. Math. 22(3) (2012) 399–406.

[2] A. Bayad and T. Kim, Identities involving values of Bernstein, q-Bernoulli, and q-Euler polyno-mials, Russ. J. Math. Phys. 18(2) (2011) 133–143.

[3] L. Carlitz, A degenerate Staudt-Clausen theorem, Arch. Math. 7 (1956) 28–33.[4] L. Carlitz, Degenerate Stirling, Bernoulii and Eulerian numbers, Utilitas Math. 15 (1979) 51-88.[5] D. Ding and J. Yang, Some identities related to the Apostol-Euler and Apostol-Bernoulli poly-

nomials, Adv. Stud. Contemp. Math. 20(1) (2010) 7–21.[6] D.S. Kim and T. Kim, On degenerate Bell numbers and polynomials, preprint.[7] D.S. Kim and T. Kim, Degenerate falling factorial polynomials, preprint.[8] D.S. Kim and T. Kim, Korobov polynomials of the third kind and of the fourth kind, preprint.[9] D.S. Kim, T. Kim, H.I. Kwon and T. Mansour, Korobov polynomials of the fifth kind and of the

sixth kind, preprint.[10] D. S. Kim and T. Kim, Some identities of Korobov-type polynomials associated with p-adic

integrals on Zp, Adv. Difference Equ. 2015 (2015), DOI: 10.1186/s13662-015-0602-8.[11] T. Kim, Identities involving Laguerre polynomials derived from umbral calculus, Russ. J. Math.

Phys. 21 (2014) 36–45.[12] T. Kim and T. Mansour, Umbral calculus associated with Frobenius-type Eulerian polynomials,

Russ. J. Math. Phys. 21 (2014) 484–493 .[13] N.M. Korobov, On some properties of special polynomials, Proceedings of the IV International

Conference ”Modern Problems of Number Theory and its Applications” (Russian)(Tula, 2001),Vol. 1, 2001, 40–49.

[14] N.M. Korobov, Speical polynomials and their applications, in ”Diophantine Approcimations”,Mathematical Notes (Russian), Vol. 2, Izd. Moskov. Univ., Moscow, 1996, 77–89.

[15] S. Roman, The umbral calculus, Pure and Applied Mathematics 111, Academic Press, New York,1984.

[16] S. Roman, More on the umbral calculus, with emphasis on the q-umbral calculus, J. Math. Anal.Appl. 107 (1985) 222–254.

[17] A.V. Ustinov, Korobov polynomials and umbral calculus, Chebyshevskiı Sb. 4:8 (2003) 137–152.

Department of Mathematics, Sogang University, Seoul 121-742, South Korea

E-mail address: [email protected]

Department of Mathematics, Kwangwoon University, Seoul 139-701, South Korea

E-mail address: [email protected]

University of Haifa, Department of Mathematics, 3498838 Haifa, Israel

E-mail address: [email protected]

Department of Applied Mathematics, Pukyong National University, Busan 48513, Re-public of Korea.

E-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

824 DAE SAN KIM et al 812-824

Page 47: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Some identities on the higher-order twisted q-Euler numbersand polynomials

C. S. Ryoo

Department of Mathematics, Hannam University, Daejeon 306-791, Korea

Abstract : In this paper we investigate some interesting symmetric identities for twisted q-Euler

polynomials of higher order in complex field.

Key words : Symmetric properties, power sums, Euler numbers and polynomials, twisted q-Euler

numbers and polynomials.

2000 Mathematics Subject Classification : 11B68, 11S40, 11S80.

1. Introduction

Euler numbers and polynomials possess many interesting properties and arising in many areas

of mathematics, mathematical physics and statistical physics. Many mathematicians have studied

in the area of the q- extension of Euler numbers and polynomials(see [1, 2, 3, 5, 6, 7, 8, 9, 11,

13]). Recently, Y. Hu studied several identities of symmetry for Carlitz’s q-Bernoulli numbers and

polynomials in complex field(see [3]). D. Kim et al.[4] derived some identities of symmetry for

(h, q)-extension of higher-order Euler numbers and polynomials. D. V. Dolgy et al.[2] derived some

identities of symmetry for higher-order generalized q-Euler polynomials. In this paper, we establish

some interesting symmetric identities for twisted q-Euler polynomials of higher order in complex

field. The purpose of this paper is to present a systemic study of the twisted q-Euler numbers and

polynomials of higher-order by using the multiple q-Euler zeta function. Throughout this paper, the

notations N,Z,R, and C denote the sets of positive integers, integers, real numbers, and complex

numbers, respectively, and Z+ := N ∪ 0. We assume that q ∈ C with |q| < 1. Throughout this

paper we use the notation:

[x]q =1− qx

1− q(cf. [1, 2, 3, 5]) .

Note that limq→1[x] = x. Let ε be the pN -th root of unity(see [10, 12, 13]).

In [5], T. Kim introduced the multiple q-Euler zeta function which interpolates higher-order

q-Euler polynomials at negative integers as follows:

ζq,r(s, x) = [2]rq

∞∑m1,··· ,mr=0

(−1)∑r

j=1 mjq∑r

j=1 mj

[m1 + · · ·+mr + x]sq, (1)

where s ∈ C and x ∈ R, with x = 0,−1,−2, . . ..

Recently, D. V. Dolgy et al.[2] considered some symmetric identities for higher-order generalized

q-Euler polynomials. The Euler polynomials of order r ∈ N attached to χ are also defined by the

generating function: (2d−1∑l=0

χ(l)(−1)le(x+l)t

edt + 1

)r

=∞∑

m=0

E(r)m,χ(x)

tm

m!. (2)

When x = 0, E(r)n,χ = E

(r)n,χ(0) are called the Euler numbers E

(r)n,χ attached to χ(see [2, 4]).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

825 C. S. Ryoo 825-830

Page 48: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

For h ∈ Z, α, k ∈ N, and n ∈ Z+, we introduced the higher order twisted q-Euler polynomials

with weight α as follows(see [7]):

E(α)n,q,ε(k|x) =

[2]kq(1− qα)n

n∑l=0

(n

l

)(−1)l

qαlx

(1 + εqαl+h) · · · (1 + εqαl+h−k+1).

In the special case, x = 0, E(α)n,q,w(k|0) = E

(α)n,q,w(k) are called the higher-order twisted q-Euler

numbers with weight α.

We consider the higher order q-Euler polynomials of order r attached to χ twisted by ramified

roots of unity as follows(see [10]):

∞∑n=0

E(r)n,χ,ε,q(x)

tn

n!= 2r

∞∑m1,...,mr=0

(−ε)∑r

j=0 mj

(r∏

i=1

χ(mi)

)e[x+

∑rj=1 mj ]qt.

In the special case x = 0, the sequence E(r)n,χ,ε,q(0) = E

(r)n,χ,ε,q are called the n-th q-Euler numbers of

order r attached to χ twisted by ramified roots of unity.

As is well known, the higher-order twisted q-Euler polynomials E(k)n,q,ε(x) are defined by the

following generating function to be

F (k)q,ε (t, x) = [2]kq

∞∑m1,··· ,mk=0

(−1)m1+···+mkεm1+···+mke[m1+···+mk+x]qt

=

∞∑n=0

E(k)n,q,ε(x)

tn

n!,

(3)

where k ∈ N. When x = 0, E(k)n,q,ε = E

(k)n,q,ε(0) are called the higher-order twisted q-Euler numbers

E(k)n,q,ε. Observe that if q → 1, ε→ 1, then E

(k)n,q,ε → E

(k)n and E

(k)n,q,ε(x)→ E

(k)n,χ(x).

By using (3) and Cauchy product, we have

E(k)n,q,ε(x) =

n∑l=0

(n

l

)qlxE

(k)l,q,ε[x]n−l

q

= (qxE(k)q,ε + [x]q)n,

(4)

with the usual convention about replacing (E(k)q,ε )n by E

(k)n,q,ε.

By using complex integral and (3), we can also obtain the multiple twisted q-l-function as

follows:

l(k)q,ε (s, x) =1

Γ(s)

∫ ∞

0

F (k)q,ε (−t, x)ts−1dt

= [2]kq

∞∑m1,··· ,mk=0

(−1)∑k

j=1 mjε∑k

j=1 mj

[m1 + · · ·+mk + x]sq,

(5)

where s ∈ C and x ∈ R, with x = 0,−1,−2, . . ..

By using Cauchy residue theorem, the value of multiple twisted q-l-function at negative integers

is given explicitly by the following theorem:

Theorem 1. Let k ∈ N and n ∈ Z+. We obtain

l(k)q,ε (−n, x) = E(k)n,q,ε(x).

The purpose of this paper is to obtain some interesting identities of the power sums and

the higher-order twisted q-Euler polynomials E(k)n,q,ε(x) using the symmetric properties for multiple

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

826 C. S. Ryoo 825-830

Page 49: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

twisted q-l-function. In this paper, if we take ε = 1 in all equations of this article, then [2] are the

special case of our results.

2. Symmetry identities for multiple twisted q-l-function

In this section, by using the similar method of [2, 3, 4], expect for obvious modifications, we

investigate some symmetric identities for higher-order twisted q-Euler polynomials E(k)n,q,ε(x). We

assume that ε be the pN -th root of unity. Let w1, w2 ∈ N with w1 ≡ 1 (mod 2), w2 ≡ 1 (mod 2). For

h ∈ Z, k ∈ N and n ∈ Z+, we obtain certain symmetry identities for multiple twisted q-l-function.

Observe that [xy]q = [x]qy [y]q for any x, y ∈ C. In (5), we derive next result by substitute

w2x+w2

w1(j1 + · · ·+ jk) for x in and replace q and ε by qw1 and εw1 , respectively.

1

[2]kqw1

l(k)qw1 ,εw1 (s, w2x+

w2

w1(j1 + · · ·+ jk))

=∞∑

m1,··· ,mk=0

(−1)∑k

j=1 mjεw1∑k

j=1 mj

[m1 + · · ·+mk + w2x+w2

w1(j1 + · · ·+ jk)]sqw1

=

∞∑m1,··· ,mk=0

(−1)∑k

j=1 mjεw1

∑kj=1 mj[

w1(m1 + · · ·+mk) + w1w2x+ w2(j1 + · · ·+ jk)

w1

]sqw1

=

∞∑m1,··· ,mk=0

(−1)∑k

j=1 mjεw1

∑kj=1 mj

[w1(m1 + · · ·+mk) + w1w2x+ w2(j1 + · · ·+ jk)]sq[w1]sq

= [w1]sq

∞∑m1,··· ,mk=0

(−1)∑k

j=1 mjεw1

∑kj=1 mj

[w1(m1 + · · ·+mk) + w1w2x+ w2(j1 + · · ·+ jk)]sq

= [w1]sq

∞∑m1,··· ,mk=0

w2−1∑i1,··· ,ik=0

(−1)∑k

j=1 mjεw1∑k

j=1 mj

[w1(m1 + · · ·+mk) + w1w2x+ w2(j1 + · · ·+ jk)]sq

= [w1]sq

∞∑m1,··· ,mk=0

w2−1∑i1,··· ,ik=0

(−1)∑k

j=1(dw2mj+ij)

× εw1

∑kj=1(dw2mj+ij)

×([w1(dw2m1 + i1) + · · ·+ w1(dw2mk + ik) + w1w2x+ w2(j1 + · · ·+ jk)]sq

)−1

= [w1]sq

∞∑m1,··· ,mk=0

w2−1∑i1,··· ,ik=0

(−1)∑k

j=1 mj (−1)∑k

j=1 ij

× εdw1w2

∑kj=1 mjεw1

∑kj=1 ij

×([w1w2(x+ dm1 + · · ·+ dmk) + w1(i1 + · · ·+ ik) + w2(j1 + · · ·+ jk)]sq

)−1

(6)

Thus, from (6), we can derive the following equation.

[w2]sq[2]kqw1

w1−1∑j1,··· ,jk=0

(−1)∑k

l=1 jlεw2∑k

l=1 jl

× l(k)qw1 ,εw1 (s, w2x+w2

w1(j1 + · · ·+ jk))

= [w1]sq[w2]sq

∞∑m1,··· ,mk=0

w2−1∑i1,··· ,ik=0

w1−1∑j1,··· ,jk=0

(−1)∑k

l=1(jl+il+ml)

× εdw1w2∑k

l=1 mlεw1∑k

l=1 ilεw2∑k

l=1 jl

×([w1w2(x+ dm1 + · · ·+ dmk) + w1(i1 + · · ·+ ik) + w2(j1 + · · ·+ jk)]sq

)−1

(7)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

827 C. S. Ryoo 825-830

Page 50: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

By using the same method as (7), we have

[w1]sq[2]kqw2

w2−1∑j1,··· ,jk=0

(−1)∑k

l=1 jlεw1

∑kl=1 jl

× l(k)qw2 ,εw2 (s, w1x+w1

w2(j1 + · · ·+ jk))

= [w1]sq[w2]sq

∞∑m1,··· ,mk=0

w2−1∑j1,··· ,jk=0

w1−1∑i1,··· ,ik=0

(−1)∑k

l=1(jl+il+ml)

× εdw1w2

∑kl=1 mlεw2

∑kl=1 ilεw1

∑kl=1 jl

×([w1w2(x+ dm1 + · · ·+ dmk) + w1(j1 + · · ·+ jk) + w2(i1 + · · ·+ ik)]sq

)−1

(8)

Therefore, by (7) and (8), we have the following theorem.

Theorem 2. Let w1, w2 ∈ N with w1 ≡ 1 (mod 2), w2 ≡ 1 (mod 2). For h ∈ Z , we obtain

[w2]sq[2]kqw2

w1−1∑j1,··· ,jk=0

(−1)∑k

l=1 jlεw2

∑kl=1 jl l

(k)qw1 ,εw1

(s, w2x+

w2

w1(j1 + · · ·+ jk)

)

= [w1]sq[2]kqw1

w2−1∑j1,··· ,jk=0

(−1)∑k

l=1 jlεw1∑k

l=1 jl l(k)qw2 ,εw2

(s, w1x+

w1

w2(j1 + · · ·+ jk)

) (9)

By (9) and Theorem 1, we obtain the following theorem.

Theorem 3. Let w1, w2 ∈ N with w1 ≡ 1 (mod 2), w2 ≡ 1 (mod 2). For h ∈ Z, k ∈ N and

n ∈ Z+, we obtain

[w2]sq[2]kqw2

w1−1∑j1,··· ,jk=0

(−1)∑k

l=1 jlεw2

∑kl=1 jlE

(k)n,qw1 ,εw1

(w2x+

w2

w1(j1 + · · ·+ jk)

)

= [w1]sq[2]kqw1

w2−1∑j1,··· ,jk=0

(−1)∑k

l=1 jlεw1∑k

l=1 jlE(k)n,qw2 ,εw2

(w1x+

w1

w2(j1 + · · ·+ jk)

).

(10)

From (4), we note that

E(k)n,q,ε(x+ y) = (qx+yE(k)

n,q,ε + [x+ y]q)n

=

n∑i=0

(n

i

)qxiE

(k)i,q,ε(y)[x]n−i

q .(11)

with the usual convention about replacing (E(k)q,ε )n by E

(k)n,q,ε.

By (11), we have

w1−1∑j1,··· ,jk=0

(−1)∑k

l=1 jlεw2

∑kl=1 jlE

(k)n,qw1 ,εw1

(w2x+

w2

w1(j1 + · · ·+ jk)

)

=

w1−1∑j1,··· ,jk=0

(−1)∑k

l=1 jlεw2∑k

l=1 jl

×n∑

i=0

(n

i

)qw2i(j1+···+jk)E

(k)i,qw1 ,εw1 (w2x)

[w2

w1(j1 + · · ·+ jk)

]n−i

qw1

=

w1−1∑j1,··· ,jk=0

(−1)∑k

l=1 jlεw2∑k

l=1 jl

×n∑

i=0

(n

i

)qw2(n−i)

∑kl=1 jlE

(k)n−i,qw1 ,εw1 (w2x)

[w2

w1(j1 + · · ·+ jk)

]iqw1

(12)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

828 C. S. Ryoo 825-830

Page 51: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Hence we have the following theorem.

Theorem 4. Let w1, w2 ∈ N with w1 ≡ 1 (mod 2), w2 ≡ 1 (mod 2). For k ∈ N and n ∈ Z+,

we obtain

w1−1∑j1,··· ,jk=0

(−1)∑k

l=1 jlεw2

∑kl=1 jlE

(k)n,qw1 ,εw1

(w2x+

w2

w1(j1 + · · ·+ jk)

)

=n∑

i=0

(n

i

)[w2]iq[w1]−i

q E(k)n−i,qw1 ,εw1 (w2x)

w1−1∑j1,··· ,jk=0

(−1)∑k

l=1 jlεw2∑k

l=1 jl [j1 · · ·+ jk]iqw2 .

For each integer n ≥ 0, let

S(k)n,i,q,ε(w) =

w−1∑j1,··· ,jk=0

(−1)∑k

l=1 jlε∑k

l=1 jl [j1 · · ·+ jk]iq.

The above sum S(k)n,i,q,ε(w) is called the alternating q-power sums.

By Theorem 4, we have

[2]kqw2 [w1]nq

w1−1∑j1,··· ,jk=0

(−1)∑k

l=1 jlεw2∑k

l=1 jlE(k)n,qw1 ,εw1

(w2x+

w2

w1(j1 + · · ·+ jk)

)

= [2]kqw2

n∑i=0

(n

i

)[w2]iq[w1]n−i

q E(k)n−i,qw1 ,εw1 (w2x)S(k)n,i,qw2 ,εw2 (w1)

(13)

By using the same method as in (13), we have

[2]kqw1 [w2]nq

w2−1∑j1,··· ,jk=0

(−1)∑k

l=1 jlεw1

∑kl=1 jlE

(k)n,qw2 ,εw2

(w1x+

w1

w2(j1 + · · ·+ jk)

)

= [2]kqw1

n∑i=0

(n

i

)[w1]iq[w2]n−i

q E(k)n−i,qw2 ,εw2 (w1x)S(k)n,i,qw1 ,εw1 (w2)

(14)

Therefore, by (13) and (14) and Theorem 3, we have the following theorem.

Theorem 5. Let w1, w2 ∈ N with w1 ≡ 1 (mod 2), w2 ≡ 1 (mod 2). For k ∈ N and n ∈ Z+,

we obtain

[2]kqw2

n∑i=0

(n

i

)[w2]iq[w1]n−i

q E(k)n−i,qw1 ,εw1 (w2x)S(k)n,i,qw2 ,εw2 (w1)

= [2]kqw1

n∑i=0

(n

i

)[w1]iq[w2]n−i

q E(k)n−i,qw2 ,εw2 (w1x)S(k)n,i,qw1 ,εw1 (w2).

By Theorem 5, we obtain the interesting symmetric identity for the higher-order twisted q-Euler

numbers E(k)n,q,ε in complex field.

Corollary 6. Let w1, w2 ∈ N with w1 ≡ 1 (mod 2), w2 ≡ 1 (mod 2). For k ∈ N and n ∈ Z+,

we obtain

[2]kqw2

n∑i=0

(n

i

)[w2]iq[w1]n−i

q S(k)n,i,qw2 ,εw2 (w1)E(k)n−i,qw1 ,εw1

= [2]kqw1

n∑i=0

(n

i

)[w1]iq[w2]n−i

q S(k)n,i,qw1 ,εw1 (w2)E(k)n−i,qw2 ,εw2 .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

829 C. S. Ryoo 825-830

Page 52: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

REFERENCES

1. M. Cenkci, The p-adic generalized twisted (h, q)-Euler-l-function and its applications, Adv.

Stud. Contemp. Math., 15(2007), 34-47.

2. D. V. Dolgy, D.S. Kim, T.G. Kim, J.J. Seo, Identities of Symmetry for Higher-Order Gener-

alized q-Euler Polynomials, Abstract and Applied Analysis, 2014(2014), Article ID 286239, 6

pages.

3. Yuan He, Symmetric identities for Carlitz’s q-Bernoulli numbers and polynomials, Adv.

Difference Equ., 246(2013), 10 pages.

4. D. Kim, T. Kim, J.-J. Seo, Identities of symmetric for (h, q)-extension of higher-order Euler

polynomials, Applied Mathemtical Sciences 8 (2014), 3799-3808.

5. T. Kim, New approach to q-Euler polynomials of higher order, Russ. J. Math. Phys.

17(2010), 218-225.

6. T. Kim, Barnes type multiple q-zeta function and q-Euler polynomials, J. phys. A : Math.

Theor. 43(2010) 255201(11pp).

7. H. Y. Lee, N. S. Jung, J. Y. Kang, C. S. Ryoo, Some identities on the higher-order-twisted

q-Euler numbers and polynomials with weight α, Adv. Difference Equ., 2012:21(2012), 10pp.

8. E.-J. Moon, S.-H. Rim, J.-H. Jin, S.-J. Lee, On the symmetric properties of higher-order

twisted q-Euler numbers and polynomials, Adv. Difference Equ., 2010, Art ID 765259, 8pp.

9. H. Ozden, Y. Simsek, I. N. Cangul, Euler polynomials associated with p-adic q-Euler measure,

Gen. Math., 15(2007), 24-37.

10. C. S. Ryoo, On the generalized Barnes type multiple q-Euler polynomials twisted by ramified

roots of unity, Proc. Jangjeon Math. Soc. 13(2010), 255-263.

11. C. S. Ryoo, A note on the weighted q-Euler numbers and polynomials, Adv. Stud. Contemp.

Math., 21(2011), 47-54.

12. Y. Simsek, q-analogue of twisted l-series and q-twisted Euler numbers, Journal of Number

Theory, 110(2005), 267-278.

13. Y. Simsek, Twisted (h, q)-Bernoulli numbers and polynomials related to twisted (h, q)-zeta

function and L-function, J. Math. Anal. Appl., 324(2006), 790-804.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

830 C. S. Ryoo 825-830

Page 53: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

UMBRAL CALCULUS ASSOCIATED WITH NEW DEGENERATE

BERNOULLI POLYNOMIALS

DAE SAN KIM, TAEKYUN KIM, AND JONG-JIN SEO

Abstract. In this paper, we introduce new degenerate Bernoulli polynomi-als which are derived from umbral calculus and investigate some interesting

properties of those polynomials.

1. Introduction

The Bernoulli polynomials are defined by the generating function

(1.1)t

et − 1ext =

∞∑n=0

Bn (x)tn

n!, (see [1–14]) .

When x = 0, Bn = Bn (0) are called the ordinary Bernoulli numbers. From (1.1),we note that

(1.2) Bn (x) =n∑

l=0

(n

l

)Blx

n−l, (n ≥ 0) , (see [13]) .

Thus, by (1.2), we get

(1.3)d

dxBn (x) = nBn−1 (x) , (n ∈ N) .

In [2], L. Carlitz introduced the degenerate Bernoulli polynomials which aregiven by the generating function

(1.4)t

(1 + λt)1λ − 1

(1 + λt)xλ =

∞∑n=0

βn (x | λ)tn

n!.

When x = 0, βn (0 | λ) = βn (λ) are called Carlitz’s degenerate Bernoulli num-bers (see [2]).

Thus, by (1.4), we get

(1.5) βn (x | λ) =n∑

l=0

(n

l

)βl (λ) (x | λ)n−l , (n ≥ 0) ,

where (x | λ)n = x (x− λ) · · · (x− λ (n− 1)).Let C be the field of complex numbers and let F be the set of all formal power

series in the variable t over C with

F =

f (t) =

∞∑k=0

aktk

k!

∣∣∣∣∣ ak ∈ C

.

2010 Mathematics Subject Classification. 11B83, 11B75, 05A19, 05A40.Key words and phrases. Degenerate Bernoulli polynomial, Higher-order degenerate Bernoulli

polynomial, Umbral calculus.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

831 DAE SAN KIM et al 831-840

Page 54: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

2 DAE SAN KIM, TAEKYUN KIM, AND JONG-JIN SEO

Let P = C [x] and P∗ denotes the vector space of all linear functionals on P. Theaction of the linear functional L ∈ P∗ on a polynomial p (x) is denoted by ⟨L| p (x)⟩,and linearly extended as ⟨cL+ c′L′| p (x)⟩ = c ⟨L| p (x)⟩+c′ ⟨L′| p (x)⟩, where c andc′ ∈ C.

For f (t) =∑∞

k=0 aktk

k! ∈ F , we define a linear functional on P by setting

(1.6) ⟨f (t)|xn⟩ = an

for all n ≥ 0, (see [1, 5, 13]).Thus, by (1.6), we get

(1.7)⟨tk∣∣xn⟩ = n!δn,k, (n, k ≥ 0) , (see [7, 13]) ,

where δn,k is the Kronecker’s symbol.

Let fL (t) =∑∞

k=0

⟨L|xk

⟩tk

k! . Then we have ⟨fL (t)|xn⟩ = ⟨L|xn⟩ (n ≥ 0). Themapping L 7→ fL (t) is a vector space isomorphism from P∗ onto F . Henceforth,F will denote both the algebra of formal power series in t and the vector space ofall linear functionals on P, and so an element f (t) of F will be thought of as botha formal power seires and a linear functional. We shall call F the umbral algebra.The umbral calculus is the study of umbral algebra and can be also desribed as asystematic study of the class of Sheffer sequences. The order o (f) of the non-zeropower series f (t) is the smallest integer k for which the coefficient of tk does notvanish (see [12, 13]).

For f (t) , g (t) ∈ F with o (f) = 1 and o (g) = 0, there exists a unique sequencesn (x) of polynomials such that⟨

g (t) f (t)k∣∣∣ sn (x)

⟩= n!δn,k, (n, k ≥ 0) .

The sequence sn (x) is called the Sheffer sequence for (g (t) , f (t)) which is de-noted by sn (x) ∼ (g (t) , f (t))(see [10, 13]).

Let f (t) ∈ F and p (x) ∈ P. Then by (1.7), we get

(1.8)⟨eyt∣∣ p (x)

⟩= p (y) , ⟨f (t) g (t)| p (x)⟩ = ⟨g (t)| f (t) p (x)⟩ ,

and

(1.9) f (t) =∞∑k=0

⟨f (t)|xk

⟩ tkk!, p (x) =

∞∑k=0

⟨tk∣∣ p (x)

⟩ xkk!, (see [13]) .

By (1.9), we easily get

(1.10) p(k) (0) =⟨tk∣∣ p (x)

⟩=⟨

1| p(k) (x)⟩, (k ≥ 0) ,

where p(k) (0) denotes the k-th derivative of p (x) with respect to x at x = 0.From (1.10), we have

(1.11) tkp (x) = p(k) (x) .

In [13], it is known that

(1.12) sn (x) ∼ (g (t) , f (t)) ⇐⇒ 1

g(f (t)

)exf(t) =

∞∑n=0

sn (x)tn

n!,

where f (t) is the compositional inverse of f (t) such that f(f (t)

)= f (f (t)) = t.

From (1.7), we can easily derive

(1.13) eytp (x) = p (x+ y) , where p (x) ∈ P = C [x] .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

832 DAE SAN KIM et al 831-840

Page 55: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

UMBRAL CALCULUS ASSOCIATED WITH NEW DEGENERATE BERNOULLI POLYNOMIALS3

For p (x) ∈ P, we have⟨eyt − 1

t

∣∣∣∣ p (x)

⟩=

ˆ y

0

p (u) du, ⟨f (t)|xp (x)⟩ = ⟨∂tf (t)| p (x)⟩ .

Let f1 (t) , f2 (t) , . . . , fm (t) ∈ F . Then we have

(1.14) ⟨f1 (t) f2 (t) · · · fm (t)|xn⟩ =∑(

n

i1, . . . , im

)⟨f1 (t)|xi1

⟩· · ·⟨fm (t)|xim

⟩where the sum is over all nonnegative integers i1, . . . , im such that i1+ · · ·+ im = n.

In this paper, we introduce new degenerate Bernoulli polynomials which aredifferent Carlitz’s degenerate Bernoulli polynomials and investigate some interestingproperties of those polynomials.

2. Umbral calculus and degenerate Bernoulli polynomials

From (1.1) and (1.13), we have

(2.1) Bn (x) ∼(et − 1

t, t

), (n ≥ 0) .

Now, we introduce the new degenerate Bernoulli polynomials which are derivedfrom Sheffer sequence as follows:

(2.2) βn,λ (x) ∼

((1 + λt)

1λ − 1

t, t

), (n ≥ 0) .

From (1.12) and (2.2), we have

(2.3)∞∑

n=0

βn,λ (x)tn

n!=

t

(1 + λt)1λ − 1

ext.

When x = 0, βn,λ = βn,λ (0) are called the degenerate Bernoulli numbers.Note that

∞∑n=0

limλ→0

βn,λ (x)tn

n!= lim

λ→0

t

(1 + λt)1λ − 1

ext(2.4)

=t

et − 1ext

=∞∑

n=0

Bn (x)tn

n!.

Thus, by (2.4), we get

(2.5) limλ→0

βn,λ (x) = Bn (x) , (n ≥ 0) .

From (2.3), we have

∞∑n=0

βn,λ (x)tn

n!=

( ∞∑l=0

βl,λtl

l!

)( ∞∑m=0

xm

m!tm

)(2.6)

=∞∑

n=0

(n∑

l=0

(n

l

)βl,λx

n−l

)tn

n!.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

833 DAE SAN KIM et al 831-840

Page 56: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

4 DAE SAN KIM, TAEKYUN KIM, AND JONG-JIN SEO

Thus, by (2.6), we get

βn,λ (x) =n∑

l=0

(n

l

)βl,λx

n−l, (n ≥ 0) ,

and

d

dxβn,λ (x) =

n∑l=1

(n

l

)βl,λ (n− l)xn−l−1(2.7)

= nn−1∑l=0

(n− 1

l

)βl,λx

n−1−l

= nβn−1,λ (x) .

From (1.11) and (2.3), we have

(2.8)t

(1 + λt)1λ − 1

xn = βn,λ (x) , (n ≥ 0) ,

and

(2.9) tβn,λ (x) =d

dxβn,λ (x) = nβn−1,λ (x) , (n ≥ 1) .

Thus, by (2.8) and (2.9), we get

ˆ x+y

x

βn,λ (u) du(2.10)

=1

n+ 1βn+1,λ (x+ y)− βn+1,λ (x)

=eyt − 1

tβn,λ (x)

=∞∑k=1

yk

k!tk−1βn,λ (x) .

From (2.9), we have

(2.11) βn (x) = t

1

n+ 1βn+1,λ (x)

.

Thus, by (2.11), we get⟨eyt − 1

t

∣∣∣∣βn,λ (x)

⟩=

⟨eyt − 1

∣∣ 1

n+ 1βn+1,λ (x)

⟩(2.12)

=

ˆ y

0

βn,λ (u) du.

Therefore, by (2.12), we obtain the following theorem.

Theorem 1. For n ≥ 0, we have⟨eyt − 1

t

∣∣∣∣βn,λ (x)

⟩=

ˆ y

0

βn,λ (u) du.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

834 DAE SAN KIM et al 831-840

Page 57: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

UMBRAL CALCULUS ASSOCIATED WITH NEW DEGENERATE BERNOULLI POLYNOMIALS5

For r ∈ N, the degenerate Bernoulli polynomials of order r are defined by thegenerating function

(2.13)

(t

(1 + λt)1λ − 1

)r

ext =∞∑

n=0

β(r)n,λ (x)

tn

n!.

When x = 0, β(r)n,λ = β

(r)n,λ (0) are called the higher order degenerate Bernoulli

numbers.Indeed, limλ→0 β

(r)n,λ (x) = B

(r)n (x), where B

(r)n (x) are the higher-order Bernoulli

polynomials which are defined by the generating function(t

et − 1

)r

ext =∞∑

n=0

B(r)n (x)

tn

n!.

From (2.13), we have

(2.14) β(r)n,λ (x) =

n∑l=0

(n

l

)β(r)l,λx

n−l, (n ≥ 0) ,

and

d

dxβ(r)n,λ (x) =

n∑l=0

(n

l

)β(r)l,λ (n− l)xn−l−1(2.15)

= nn−1∑l=0

(n− 1

l

)β(r)l,λx

n−l−1

= nβ(r)n−1,λ (x) , (n ≥ 1) .

By (2.8) and (2.13), we easily get

(2.16) β(r)n,λ =

∑l1+···+lr=n

(n

l1, . . . , lr

)βl1,λ · · ·βlr,λ.

Thus, by (2.14) and (2.16), we see that β(r)n,λ (x) is a monic polynomial of degree

n with coefficients in Q (λ).From (2.14) and (2.15), we can deriveˆ x+y

x

β(r)n,λ (u) du =

1

n+ 1

β(r)n+1,λ (x+ y)− β(r)

n+1,λ (x)

(2.17)

=eyt − 1

tβ(r)n,λ (x) .

If sn (x) ∼ (g (t) , t), then sn (x) is called an Appell sequence.From (1.12) and (2.13), we have

(2.18) β(r)n,λ (x) ∼

(((1 + λt)

1λ − 1

t

)r

, t

), (n ≥ 0) .

Thus, by (2.18), we note that β(r)n,λ (x) is the Appell sequence for

((1+λt)

1λ −1

t

)r

.

From (2.18), we have

(2.19)

((1 + λt)

1λ − 1

t

)r

β(r)n,λ (x) ∼ (1, t) , xn ∼ (1, t) , (n ≥ 0) .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

835 DAE SAN KIM et al 831-840

Page 58: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

6 DAE SAN KIM, TAEKYUN KIM, AND JONG-JIN SEO

Thus, by (2.19), we get

(2.20) xn =

((1 + λt)

1λ − 1

t

)r

β(r)n,λ (x) , (n ≥ 0) .

We observe that((1 + λt)

1λ − 1

t

)r

(2.21)

=1

tr

(e

1λ log(1+λt) − 1

)r=

1

trr!

∞∑l=r

S2 (l, r)λ−l (log (1 + λt))l

l!

=1

trr!

∞∑l=0

S2 (l + r, r)λ−(l+r) 1

(l + r)!(l + r)!

∞∑n=l+r

S1 (n, l + r)λntn

n!

=1

trr!

∞∑l=0

S2 (l + r, r)λ−(l+r)∞∑n=l

S1 (n+ r, l + r)λn+r

(n+ r)!tn+r

=

∞∑n=0

(n∑

l=0

S2 (l + r, r)S1 (n+ r, l + r)λn−l 1(n+rr

)) tn

n!

By (2.20) and (2.21), we get(2.22)

xm =m∑

n=0

n∑l=0

S2 (l + r, r)S1 (n+ r, l + r)λn−l

(mn

)(n+rr

)β(r)m−n,λ (x) , (m ≥ 0) .

Therefore, by (2.22), we obtain the following theorem.

Theorem 2. For m ≥ 0, we have

xm =

m∑n=0

n∑l=0

S2 (l + r, r)S1 (n+ r, l + r)λn−l

(mn

)(n+rr

)β(r)m−n,λ (x) ,

where S1 (m,n) and S2 (m,n) are the Stirling numbers of the first kind and of thesecond kind defined by

(x)n =n∑

l=0

S1 (n, l)xl,

xn =n∑

l=0

S2 (n, l) (x)l .

From (1.11) and (2.18), we have

(2.23) tβ(r)n,λ (x) = t

1

n+ 1β(r)n+1,λ (x)

, (n ≥ 0) ,

and ⟨eyt − 1

t

∣∣∣∣β(r)n,λ (x)

⟩=

⟨eyt − 1

∣∣ 1

n+ 1β(r)n+1,λ (x)

⟩(2.24)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

836 DAE SAN KIM et al 831-840

Page 59: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

UMBRAL CALCULUS ASSOCIATED WITH NEW DEGENERATE BERNOULLI POLYNOMIALS7

=

ˆ y

0

β(r)n,λ (u) du.

Moreover,

β(r)n,λ(2.25)

=

⟨(t

(1 + λt)1λ − 1

)r∣∣∣∣∣xn⟩

=∑

n=i1+···+ir

(n

i1, . . . , ir

)⟨t

(1 + λt)1λ − 1

∣∣∣∣∣xi1⟩· · ·

⟨t

(1 + λt)1λ − 1

∣∣∣∣∣xir⟩

and

(2.26) βn,λ =

⟨t

(1 + λt)1λ − 1

∣∣∣∣∣xn⟩, (n ≥ 0) .

Therefore, by (2.24), (2.25) and (2.26), we obtain the following theorem.

Theorem 3. For n ≥ 0, we have⟨eyt − 1

t

∣∣∣∣β(r)n,λ (x)

⟩=

ˆ y

0

β(r)n,λ (u) du,

and

β(r)n,λ =

∑n=i1+···+ir

(n

i1, . . . , ir

)βi1,λ · · ·βir,λ.

Let Pn = p (x) ∈ C [x]| deg p (x) ≤ n , (n ≥ 0). For p (x) ∈ Pn, we assumethat

(2.27) p (x) =n∑

k=0

bkβk,λ (x) .

From (2.2), we have

(2.28)

⟨(1 + λt)

1λ − 1

ttk

∣∣∣∣∣βn,λ (x)

⟩= n!δn,k, (n, k ≥ 0) .

Thus, by (2.27) and (2.28), we get⟨(1 + λt)

1λ − 1

ttk

∣∣∣∣∣ p (x)

⟩=

n∑l=0

bl

⟨(1 + λt)

1λ − 1

ttk

∣∣∣∣∣βl,λ (x)

⟩(2.29)

=n∑

l=0

bll!δl,k = k!bk.

Hence,

bk =1

k!

⟨(1 + λt)

1λ − 1

ttk

∣∣∣∣∣ p (x)

⟩(2.30)

=1

k!

⟨(1 + λt)

1λ − 1

t

∣∣∣∣∣ p(k) (x)

⟩,

where p(k) (x) = dk

dxk p (x).Therefore, by (2.27) and (2.30), we obtain the following theorem.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

837 DAE SAN KIM et al 831-840

Page 60: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

8 DAE SAN KIM, TAEKYUN KIM, AND JONG-JIN SEO

Theorem 4. Let p (x) ∈ Pn. Then we have

p (x) =n∑

k=0

bkβk,λ (x) ,

where

bk =1

k!

⟨(1 + λt)

1λ − 1

t

∣∣∣∣∣ p(k) (x)

⟩.

Let p (x) ∈ Pn with p (x) = β(r)n,λ (x). Then, we have

(2.31) p(k) (x) =

(d

dx

)k

β(r)n,λ (x) = k!

(n

k

)β(r)n−k,λ (x) .

Let us assume that

(2.32) p (x) = β(r)n,λ (x) =

n∑k=0

bkβk,λ (x) .

Then, by Theorem 5, we get

bk =1

k!

⟨(1 + λt)

1λ − 1

t

∣∣∣∣∣ p(k) (x)

⟩(2.33)

=

(n

k

)⟨(1 + λt)

1λ − 1

t

∣∣∣∣∣β(r)n−k,λ (x)

=

(n

k

)⟨(1 + λt)

1λ − 1

t

∣∣∣∣∣(

t

(1 + λt)1λ − 1

)r

xn−k

=

(n

k

)⟨1

∣∣∣∣∣∣(

t

(1 + λt)1λ − 1

)r−1

xn−k

=

(n

k

)β(r−1)n−k,λ.

Therefore, by (2.32) and (2.33), we obtain the following theorem.

Theorem 5. For r ∈ N and n ≥ 0, we have

β(r)n,λ (x) =

n∑k=0

(n

k

)β(r−1)n−k,λβk,λ (x) .

Let p (x) ∈ Pn with p (x) =∑n

k=0 b(r)k β

(r)k,λ (x). By (2.18), we get

⟨((1 + λt)

1λ − 1

t

)r

tk

∣∣∣∣∣ p (x)

⟩=

n∑l=0

b(r)l

⟨((1 + λt)

1λ − 1

t

)r

tk

∣∣∣∣∣β(r)l,λ (x)

⟩(2.34)

=n∑

l=0

b(r)l l!δl,k = k!b

(r)k .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

838 DAE SAN KIM et al 831-840

Page 61: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

UMBRAL CALCULUS ASSOCIATED WITH NEW DEGENERATE BERNOULLI POLYNOMIALS9

Thus, by (2.34), we get

(2.35) b(r)k =

1

k!

⟨((1 + λt)

1λ − 1

t

)r

tk

∣∣∣∣∣ p (x)

⟩.

Theorem 6. For p (x) ∈ Pn, we have

p (x) =n∑

k=0

b(r)k β

(r)k,λ (x) ,

where

b(r)k =

1

k!

⟨((1 + λt)

1λ − 1

t

)r

tk

∣∣∣∣∣ p (x)

=1

k!

⟨((1 + λt)

1λ − 1

t

)r∣∣∣∣∣ p(k) (x)

⟩,

where p(k) (x) =(

ddx

)kp (x).

References

1. S. Araci, M. Acikgoz, and A. Kilicman, Extended p-adic q-invariant integralson Zp associated with applications of umbral calculus, Adv. Difference Equ.(2013), 2013:96, 14. MR 3055847

2. L. Carlitz, Degenerate Stirling, Bernoulli and Eulerian numbers, Utilitas Math.15 (1979), 51–88. MR 531621 (80i:05014)

3. R. Dere and Y. Simsek, Applications of umbral algebra to some special polyno-mials, Adv. Stud. Contemp. Math. (Kyungshang) 22 (2012), no. 3, 433–438.MR 2976601

4. Q. Fang and T. Wang, Umbral calculus and invariant sequences, Ars Combin.101 (2011), 257–264. MR 2828068 (2012e:05045)

5. S. Gaboury, R. Tremblay, and B.-J. Fugere, Some explicit formulas for cer-tain new classes of Bernoulli, Euler and Genocchi polynomials, Proc. JangjeonMath. Soc. 17 (2014), no. 1, 115–123. MR 3184467

6. Y. He and W. Zhang, A convolution formula for Bernoulli polynomials, ArsCombin. 108 (2013), 97–104. MR 3060257

7. D. S. Kim and T. Kim, Some identities of Bell polynomials, Science ChinaMathematics (2015).

8. , Some identities of degenerate special polynomials, Open Math. 13(2015), Art. 37. MR 3353617

9. D. S. Kim, T. Kim, S.-H. Lee, and S.-H. Rim, Umbral calculus and Eulerpolynomials, Ars Combin. 112 (2013), 293–306. MR 3112583

10. T. Kim, Identities involving Laguerre polynomials derived from umbral calculus,Russ. J. Math. Phys. 21 (2014), no. 1, 36–45. MR 3182545

11. , Barnes’ type multiple degenerate Bernoulli and Euler polynomials,Appl. Math. Comput. 258 (2015), 556–564. MR 3323091

12. T. Kim and T. Mansour, Umbral calculus associated with Frobenius-type Euler-ian polynomials, Russ. J. Math. Phys. 21 (2014), no. 4, 484–493. MR 3284958

13. S. Roman, The umbral calculus, Pure and Applied Mathematics, vol. 111, Aca-demic Press, Inc. [Harcourt Brace Jovanovich, Publishers], New York, 1984.MR 741185 (87c:05015)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

839 DAE SAN KIM et al 831-840

Page 62: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

10 DAE SAN KIM, TAEKYUN KIM, AND JONG-JIN SEO

14. Y. Simsek, Generating functions of the twisted Bernoulli numbers and polyno-mials associated with their interpolation functions, Adv. Stud. Contemp. Math.(Kyungshang) 16 (2008), no. 2, 251–278. MR 2404639 (2009f:11021)

ACKNOWLEDGEMENTS.The work reported in this paper was conducted dur-ing the sabbatical year of Kwangwoon University in 2014.

Department of Mathematics, Sogang University, Seoul 121-742, Republic of KoreaE-mail address: [email protected]

Department of Mathematics, Kwangwoon University, Seoul 139-701, Republic of Ko-rea

E-mail address: [email protected]

Department of Applied Mathematics,Department of Applied Mathematics, PukyongNational University, Busan 48513, Re- public of Korea.

E-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

840 DAE SAN KIM et al 831-840

Page 63: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Regularization Smoothing Approximation of Fuzzy Parametric

Variational Inequality Constrained Stochastic Optimization

Heng-you Lan

Department of Mathematics, Sichuan University of Science & Engineering,

Zigong, Sichuan 643000, PR China

E-mail: [email protected]

Abstract. This work is motivated by the fact that very little is known about thefuzzy parametric variational inequalities constrained stochastic optimization prob-lems in finite dimension real numeral spaces, which are studied more difficult be-cause of the existence of random variable and fuzzified version. Based on the notionof quasi-Monte Carlo estimate and method of centres with entropic regularization,we develop a class of new regularization smoothing approximation approaches todiscretize the stochastic optimization problem with continuous random variable,and construct a centre iterative algorithm for approximating the optimal solution-s of the stochastic optimization problems. Further, we give some comprehensiveconvergence theorems of optimal solutions for the resulting optimization problem.Finally, a numerical illustration is analyzed.

Key Words and Phrases. Regularization smoothing approximation, fuzzy para-metric variational inequality, Stochastic optimization problem, centre iterative al-gorithm with quasi-Monte Carlo estimate, comprehensive convergence.

AMS Subject Classification. 49J40, 65K05, 90C30, 90C33

1 Introduction

As all we know, mathematical program with equilibrium constraints is a constrained optimizationproblem in which the essential constraints are defined by a parametric variational inequality. Thisclass of problems can be regarded as a generalization of a bilevel programming problem and ittherefore plays an important role in many fields such as transportation, communication networks,structural mechanics, economic equilibrium, multilevel game, and mathematical programming itself.See, for example, [1–7] and the reference therein. Moreover, in order to describe the uncertainties,Monica [5] considered the Bochner integrability setting, a measure space of indices and use randomfuzzy mappings, and presented random fixed point theorems with random fuzzy mappings, extensionsof the ones with random data.

In this paper, we study approximation of optimal solutions for the following fuzzy parametricvariational inequality constrained stochastic optimization problem in n-dimension real numeral setRn:

minx,y(·)

Eω[f(x, y(ω), ω)]

s.t. x ∈ U ⊂ Rn,y(ω) ∈ C(x, ω)⟨F (x, y(ω), ω), z(ω)− y(ω)⟩≥∼ 0, for all z(ω) ∈ C(x, ω) and a.e. ω ∈ Ω,

(1.1)

where Eω denotes the mathematical expectation with respect to the random variable ω ∈ Ω onprobability space (Ω,A,Γ), f : Rn+m ×Ω→ R and F : Rn+m ×Ω→ Rm are two nonlinear randomfunctions, C : Rn×Ω→ 2R

m

is a multi-valued random function, ⟨F (x, y(ω), ω), z(ω)− y(ω)⟩≥∼ 0 are

fuzzy inequalities (also called fuzzy stochastic variational inequality problems, in short, V Iω), “ ≥∼ ”

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

841 Heng-you Lan 841-857

Page 64: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

denotes the fuzzified version of “≥” with the linguistic interpretation “approximately greater thanor equal to”, and “a.e.” is the abbreviation for almost everywhere”.

Remark 1.1. Problem (1.1) is brand new in the literature including and can be thought asa generalized version of some problems, includes a number of stochastic mathematical programwith equilibrium constraints (SMPEC), mathematical programs with fuzzy equilibrium constraints(MPFEC) mathematical program with equilibrium constraints (MPEC) and mathematical programwith complementarity constraints (MPCC) have been studied by many authors as special cases. See,for example, [1–4, 6, 8–14] and the references therein, and the following examples.

Example 1.1 If Ω is a singleton, then problem (1.1) reduces to the following MPFEC:

min g(x, u)s.t. x ∈ U,

u solves V I (G(x, ·), D(x)),

(1.2)

where g : Rn+m → R and G : Rn+m → Rm is a continuously differentiable function, D : Rn → 2Rm

isa set valued function, and u solves V I(G(x, ·), D(x)) if and only if u ∈ D(x) and ⟨G(x, u), z− u⟩≥∼ 0for all z ∈ D(x). Problem (1.2) was introduced and studied by Hu and Liu [12] and Lan et al.[13]. Moreover, Hu and Liu [12] pointed out “although a powerful theory has been developed forvariational inequalities, the parameterized setting in MPEC makes these problems very difficult tosolve, and due to the vagueness involved in real world problems, the MPEC problem in a fuzzyenvironment becomes an important problem both in theory and in practice”, and “problem (1.2)is a constrained optimization problem whose constraints include some fuzzy parametric variationalinequalities.

In 2013, inspired by the works of Hu and Liu [12] and other researchers, Lan et al. [13] constructedan iterative algorithm for finding a solution of a class of mathematical program problems with fuzzyparametric variational inequality constraints by using a new smoothing approach based on a versionof the method of centres with entropic regularization techniques. In fact, the tolerance approach andentropic regularization technique have been successfully proposed in solving various problems, whichare important numerical methods for solving fuzzy variational inequalities in a fuzzy environmentand nonlinear semi-infinite programming problems. See, for example, [3, 8, 14–21] and the referencestherein.

Example 1.2. Since a solution satisfying a fuzzy inequality system to a membership degreeclose to 1 is a near optimal solution to the corresponding regular inequality problem [22], if y(ω) ≡ vfor all ω ∈ Ω and the degree for the fuzzy inequalities in (1.1) is close to 1, then problem (1.1) isequivalent to the following SMPEC:

min Eω[f(x, v, ω)]s.t. x ∈ U, ω ∈ Ω

v solves V I(F (x, ·, ω), C(x, ω)),(1.3)

where V I(F (x, ·, ω), C(x, ω)) denotes the variational inequality problem defined by the pair (F (x, ·,ω), C(x, ω)) for all x ∈ Rn and ω ∈ Ω. In 2003, Lin et al. [9] considered problem (1.3) and showedthat SMPEC can be thought as a generalization of MPEC, and proposed a smoothing implicitprogramming method to establish a comprehensive convergence theory for the lower-level wait-and-see model. Further, there are many stochastic formulations of MPEC proposed in the recentdiscussions. For related works, we refer readers to [1, 3, 6, 8, 10, 11]. However, there has been verylittle study on applications of these theories and approaches to (1.1).

Over years of development, optimization approaches have become one of the most promisingtechniques for engineering applications and an MPEC is a hard problem because its constraintsfail to satisfy a standard constraint qualification at any feasible point [23]. However, since theexistence of the random variable ω and the fuzzified version “ ≥

∼ ” mean that (1.1) involves multiplecomplementarity-type constraints, it is more difficult to solve problem (1.1) than to solve an ordinaryMPCC, MPEC, MPFEC or SMPEC generally. Therefore, our focus in this paper is to develop aclass of new regularization smoothing approximation approaches to define some parameters of theobjective function fuzzy yielded by fuzzy constraints, and consider the approximation-solvability foran equivalent stochastic parametric optimization problem of problem (1.1).

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

842 Heng-you Lan 841-857

Page 65: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Motivated and inspired by the above works, we shall give some preliminaries needed throughoutthe whole paper in Section 2. Specially, by using the notion of tolerance approach and the fuzzy settheory, we show that the fuzzy parametric variational inequality constrained stochastic optimizationproblem (1.1) and a fuzzy complementarity constrained optimization problem can be converted to aregular nonlinear parametric optimization problem. In Sections 3, we will construct a centre iterativealgorithm and develop a class of new regularization smoothing approximation approach for solvingthe stochastic fuzzy optimization based on quasi-Monte Carlo estimate, and establish comprehensiveconvergence theorems of the solution. We also report some numerical simulation analysis results inSection 4.

2 Preliminaries

Throughout in this paper, we assumption that (Ω,A,Γ) is a complete σ-finite measure space andthe probability measure Γ of our considered space (Ω,A,Γ) is non-atomic. Let B(Rm) be the classof Borel σ-fields in Rm and P (U) denote the power set of a vector space U .

Definition 2.1. (i) A function y : Ω → Rm is said to be measurable, if for any B ∈ B(Rm),ω ∈ Ω : y(ω) ∈ B ∈ A).

(ii) The multi-valued function Ψ : Ω→ P (U) is called said to be measurable, if for any B ∈ B(U),Ψ−1(B) = ω ∈ Ω : Ψ(ω) ∩B = ∅ ∈ A.

(iii) A multi-valued random function Φ : Rn × Ω → 2Rm

is said to be measurable, if for anyx ∈ Rn, Φ(x, ·) is measurable.

(iv) F : Rn+m × Ω → Rm is called a random and continuously differentiable function, whenF (x, z, ω) = ζ(ω) is measurable for any x ∈ Rn and z ∈ Rm, and F (·, ·, ω) is continuously differen-tiable for all ω ∈ Ω.

Definition 2.2. Let C,C∗ : Rn × Ω→ 2Rm

be two multi-valued random function. Then(i) C(x, ω) is said to be convex cone, if C(x, ·) is convex cone for every x ∈ Rn, that is,

αy(·) + βw(·) ∈ C(x, ·) for any positive scalarsα, β and all measurable function y(·), w(·) ∈ C(x, ·);

(ii) C∗(x, ω) is called polar (dual) cone of C(x, ω) ⊂ Rm for x ∈ Rn and ω ∈ Ω, if C∗(x, ·) ispolar (dual) cone for every x ∈ Rn, i.e.

⟨ξ, ν(·)⟩ ≥ 0 ∀ξ ∈ Rm and for each measurable function ν(·) ∈ C(x, ·).

In other words, the polar (dual) cone C∗(x, ω) can be expressed as follows:

C∗(x, ω) = ξ ∈ Rm∥ ⟨ξ, ν(ω)⟩ ≥ 0 ∀ν(ω) ∈ C(x, ω) .

Definition 2.3. Let σ > 0 and ς > 0 be constants. a function M : Rn → Rm is said to beHolder continuous on K ⊂ Rm with order σ and Holder constant ς if

∥M(u)−M(v)∥ ≤ ς∥u− v∥σ, ∀u, v ∈ K.

holds for all u and v in K.Remark 2.1. If σ = 1, then the definition of Holder continuity reduces to definition of Lipschitz

continuity. We note that for two different positive numbers σ and σ′, Holder continuous functionswith order σ and those with order σ′ constitute different subclasses. For example, the functionM(u) :=

√∥u∥ for all u ∈ K ⊂ Rm is Holder continuous with order σ = 1

2 , but not Lipschitzcontinuous.

In the sequel, we give some preparations needed later to approximating the optimal solutionsof problem (1.1). First, we propose discretization of the stochastic objective function in (1.1) withcontinuous random variable.

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

843 Heng-you Lan 841-857

Page 66: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Lemma 2.1. Let ζ : Ω → [0,+∞) be the continuous probability density function of ω. Thenthe objective function in (1.1) can be represented as

Eω(f(x, y(ω), ω) =1

L

∑ω∈ΩL

f(x, y(ω), ω)ζ(ω), (2.1)

where ΩL := ω1, ω2, · · · , ωL is a uniformly distributed sample set from Ω.Proof. Let Ω be a sample space, which is usually denoted using set notation, and the possible

outcomes are listed as elements in the set. If Ω is unbounded, under some mild conditions, we canapproximate the problem by a sequence of programs with bounded sampling spaces (see [11]) formore details. In the sequel, let Ω be a bounded rectangle. In particular, without loss of generality,we assume that Ω = [0, 1]κ. Let ζ : Ω → [0,+∞) be the continuous probability density function ofω. Then the objective function in (1.1) can be represented as

Eω(f(x, y(ω), ω) =

∫Ω

f(x, y(ω), ω)ζ(ω)dω.

Based on quasi-Monte Carlo method in [24], now we estimate numerical integration to the ob-jective function in problem (1.1). Roughly speaking, given a function ϕ : Ω → R, the quasi-Monte Carlo estimate for Eω[ϕ(ω)] is obtained by taking a uniformly distributed sample set ΩL :=ω1, ω2, · · · , ωL from Ω and letting Eω[ϕ(ω)] ≈ 1

L

∑ω∈ΩL

ϕ(ω). This implies that (2.1) holds. 2

Next, we consider the random membership functions of each fuzzy stochastic inequality andstochastic fuzzy objective yielded by the fuzzy constraints in (1.1).

Let the membership function for each fuzzy stochastic inequality ⟨F (x, y(ω), ω), z − y(ω)⟩≥∼ 0 asfollows: for all x ∈ Rn and any z ∈ C(x, ω),

µΩz(x, y(ω), ω) =

1, if ⟨F (x, y(ω), ω), z − y(ω)⟩ ≥ 0,µz(⟨F (x, y(ω), ω), z − y(ω)⟩), if ⟨F (x, y(ω), ω), z − y(ω)⟩ ∈ [−tz, 0),0, if ⟨F (x, y(ω), ω), z − y(ω)⟩ < −tz,

(2.2)

specify the degree to which the regular inequality ⟨F (x, y(ω), ω), z−y(ω)⟩ ≥ 0 is satisfied, where Ωz isa fuzzy set actually determined by the fuzzy stochastic inequality in Rn+m×Ω, tz ≥ 0 is the tolerancelevel which can be tolerated by decision makers in the accomplishment of the fuzzy stochasticinequality ⟨F (x, y(ω), ω), z− y(ω)⟩≥∼ 0. We usually assume that µz(⟨F (x, y(ω), ω), z− y(ω)⟩) ∈ [0, 1]and it is continuous and strictly increasing over [−tz, 0). Fig. 1 shows different shapes of suchmembership functions.

µz(〈F(x, y(ω), ω), z − y(ω)〉)

1

−tz0

α

µ−1

Ωz

(α) 〈F(x, y(ω), ω), z − y(ω)〉

µΩz

(x, y(ω), ω)

Figure 1: The membership function µΩz(x, y(ω), ω).

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

844 Heng-you Lan 841-857

Page 67: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Similarly, the random membership function of the objective, µS0(x, y(ω), ω), is defined as follows:

µS0(x, y(ω), ω) =

1, if Eω[f(x, y(ω), ω)] < f,

µ0(Eω[f(x, y(ω), ω)]), if Eω[f(x, y(ω), ω)] ∈ [f, f),

0, if Eω[f(x, y(ω), ω)] ≥ f ,(2.3)

where f and f are two parameters defined as follows:

f = min Eω[f(x, y(ω), ω)]s.t. x ∈ U, ω ∈ Ω,

⟨F (x, y(ω), ω), z − y(ω)⟩ ≥ 0, ∀z ∈ C(x, ω)(2.4)

andf = min Eω[f(x, y(ω), ω)]

s.t. x ∈ U, ω ∈ Ω,⟨F (x, y(ω), ω), z − y(ω)⟩ ≥ −tz, ∀z ∈ C(x, ω).

(2.5)

By [22, 25], one can know that studying such a problem (1.1) is related to finding “almostoptimal” solutions for a general convex minimization problem (see also [13, 14, 17]). Thus, weextend the idea and have the following result.

Lemma 2.2. Let C(x, ω) be a convex cone for all x ∈ Rn and ω ∈ Ω. Then the problem V Iω,i.e., finding y(ω) ∈ C(x, ω) such that

⟨F (x, y(ω), ω), z(ω)− y(ω)⟩≥∼ 0, ∀z(ω) ∈ C(x, ω), (2.6)

is equivalent to the fuzzy complementarity problem of finding y(ω) ∈ Rm such that

y(ω) ∈ C(x, ω), ⟨F (x, y(ω), ω), y(ω)⟩=∼ 0, F (x, y(ω), ω) ∈∼ C

∗(x, ω), (2.7)

where “=∼” denotes the fuzzified version of “=” with the linguistic interpretation “approximatelyequal to”, “∈∼” denotes the fuzzified version of “∈” with the linguistic interpretation “approximatelyin” and C∗(x, ω) is a polar (dual) cone of C(x, ω) ⊂ Rm for all x ∈ Rn and ω ∈ Ω.

Proof. We start by showing that problem (2.7)⊂ problem (2.6). For any x ∈ Rn and ω ∈ Ω,suppose that y∗(ω) is a solution of problem (2.7), then we have

⟨F (x, y∗(ω), ω), y∗(ω)⟩=∼ 0 (2.8)

and⟨F (x, y∗(ω), ω), υ(ω)⟩≥∼ 0, ∀υ(ω) ∈ C(x, ω). (2.9)

Combining (2.8) and (2.9), we have ⟨F (x, y∗(ω), ω), υ(ω)− y∗(ω)⟩≥∼ 0 for all υ(ω) ∈ C(x, ω). Thus,y∗(ω) is also a solution of problem (2.6) for all ω ∈ Ω.

Now we show that problem (2.6) ⊂ problem (2.7). Let y∗(ω) be the solution of problem (2.6)with the membership degree α ∈ [0, 1] for every ω ∈ Ω. According to the tolerance approach [15, 21],by (2.2), we have

⟨F (x, y∗(ω), ω), υ(ω)− y∗(ω)⟩ ≥ µ−1

Ωz(α) ≥ −tz, ∀υ(ω) ∈ C(x, ω), (2.10)

where for all υ(ω) ∈ C(x, ω) and any ω ∈ Ω, µ−1

Ωzis the inverse functions of µΩz

(x, ·, ω) and tz > 0 is

the tolerance level which a decision maker can tolerate in the accomplishment of the fuzzy inequality⟨F (x, y(ω), ω), υ(ω)− y(ω)⟩≥∼ 0. Suppose that for tz ≥ 0 and tz < 0, either

⟨F (x, y∗(ω), ω), y∗(ω)⟩ > tz or ⟨F (x, y∗(ω), ω), y∗(ω)⟩ < tz

is true. For any x ∈ Rn and each ω ∈ Ω, since C(x, ω) is a convex cone, we have ⟨F (x, y∗(ω), ω), y∗(ω)⟩ ≥−tzλ−1 , tz ≥ 0 when υ(ω) = λy∗(ω) with λ > 1, and ⟨F (x, y∗(ω), ω), y∗(ω)⟩ ≤ tz, when υ(ω) = 0. If

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

845 Heng-you Lan 841-857

Page 68: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

⟨F (x, y∗(ω), ω), y∗(ω)⟩ > tz for tz ≥ 0, This leads to a contradiction. If ⟨F (x, y∗(ω), ω), y∗(ω)⟩ < tzfor tz < 0, then tz ≤ tz. There lies a contradiction. Therefore,

tz ≤ ⟨F (x, y∗(ω), ω), y∗(ω)⟩ ≤ tz,

for tz ≥ 0 and tz < 0, that is, ⟨F (x, y∗(ω), ω), y∗(ω)⟩=∼ 0. Furthermore, from (2.10), we have for anyυ(ω) ∈ C(x, ω),

⟨F (x, y∗(ω), ω), υ(ω)⟩ ≥ ⟨F (x, y∗(ω), ω), y∗(ω)⟩ − tz ≥ tz − tz.

This implies that ⟨F (x, y∗(ω), ω), υ(ω)⟩≥∼ 0 for all υ(ω) ∈ C(x, ω). Hence, we have F (x, y∗(ω), ω) ∈∼

C∗(x, ω). Therefore, y∗(ω) for any ω ∈ Ω is also a solution of problem (2.7). This completes theproof. 2

Based on Lemma 2.2 and the work of [21], we have the following results.Lemma 2.3. Let C(x, ω) is a convex cone with polar (dual) cone C∗(x, ω) for all (x, ω) ∈ Rn×Ω

and α be a new variable. Then the stochastic optimization problem (1.1) can eventually be expressedas the following regular semi-infinite optimization problem with finitely many variables x, y(ω), ωand α:

max αs.t. µS0

(x, y(ω), ω) ≥ α,µΩz

(x, y(ω), ω) ≥ α,(x, y(ω), ω) ∈ S,0 ≤ α ≤ 1,

(2.11)

where S = (x, y(ω), ω) ∈ Rn+m × Ω|x ∈ U, ω ∈ Ω, F (x, y(ω), ω) ∈∼ C

∗(x, ω), and the randommembership functions µS0

and µΩzare the same as in (2.3) and (2.2), respectively.

Proof. It follows from Lemma 2.1 that, in order to find a solution to the stochastic optimizationproblem (1.1) with C(x, ω) being a convex cone for (x, ω) ∈ Rn×Ω, we should consider the followingstochastic fuzzy complementarity constrained optimization problem:

min Eω[f(x, y(ω), ω)]s.t. x ∈ U, ω ∈ Ω, y(ω) ∈ C(x, ω),

⟨F (x, y(ω), ω), y(ω)⟩=∼ 0,F (x, y(ω), ω) ∈

∼ C∗(x, ω).

(2.12)

Since a global minimum is often required for practical problems, by the work of [21] and the descrip-tion of the fuzzy stochastic inequalities (2.6), and a solution of problem (2.12) can be taken as thesolution with the highest membership in the fuzzy decision set and eventually obtained by solvingthe following regular nonlinear parametric optimization problem:

max(x,y(ω),ω)∈S

minµS0

(x, y(ω), ω), µΩz(x, y(ω), ω)

,

which implies that the result holds for the new variable α. 2

Remark 2.2. Moreover, if the membership functions µS0and µΩz

in Lemma 2.3 are invertible,then from (2.11), we get

max α

s.t. (x, y(ω), ω)0 ≥ µ−1

S0(α),

(x, y(ω), ω)C∗ ≥ µ−1

Ωz(α),

(x, y(ω), ω) ∈ S,0 ≤ α ≤ 1,

(2.13)

where (x, y(ω), ω)0 and (x, y(ω), ω)C∗ can be followed by (2.3) and (2.2), respectively.

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

846 Heng-you Lan 841-857

Page 69: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

3 Regularization smoothing approximation algorithms

In this section, based on the “method of centres” with entropic regularization, we develop a classof new smoothing approach and construct a centre iterative algorithm for solving the stochasticfuzzy optimization (1.1), and give the solution theorems.

In the sequel, we first give the following assumption (HC) for convenience: Define

C(x, ω) := υ(ω) ∈ Rm|D(x)υ(ω) ≥ 0, D(x) = [di(x)] is an l ×mmatrix, di(x) is the ith row ofD(x), ∀i = 1, 2, · · · , l. (3.1)

STEP I. The random membership function of the fuzzy stochastic inequalities in (1.1) can bespecified under condition (HC).

From (3.1), it is easy to see that the multi-valued operator C(x, ω) is a convex cone for any(x, ω) ∈ Rn × Ω, and can be shown that F (x, y(ω), ω) ∈ C∗(x, ω) if and only if there exists anonnegative random vector r(ω) = (r1(ω), r2(ω), · · · , rl(ω))T ∈ Rl such that

F (x, y(ω), ω) = r1(ω)dT1 (x) + r2(ω)dT2 (x) + · · ·+ rl(ω)dTl (x) = DT (x)r(ω), (3.2)

that is, for every i = 1, 2, · · · , l, d′i(x)F (x, y(ω), ω) ≥ 0, where d′i(x) is normal to di(x) (see [17, 26]).It follows that the fuzzy stochastic optimization problem (2.12) can be rewritten as the following

generalized stochastic optimization problem with fuzzy stochastic inequality constraints:

min Eω[f(x, y(ω), ω)]s.t. x ∈ U, ω ∈ Ω,

di(x)y(ω) ≥ 0, i = 1, 2, · · · , l,⟨F (x, y(ω), ω), y(ω)⟩≥∼ 0,⟨−F (x, y(ω), ω), y(ω)⟩≥∼ 0,d′i(x)F (x, y(ω), ω) ≥

∼ 0, i = 1, 2, · · · , l,

(3.3)

and each fuzzy stochastic inequality in (3.3) can be represented by a fuzzy set Sj (i.e., represent

of Ωz in (2.11) or (2.13)) with corresponding random membership function µSj(x, y(ω), ω) for j =

1, 2, · · · , l + 2. To specify the membership functions µSj, j = 1, 2, · · · , l + 2, similar treatment to

(2.2), we define the membership functions as follows:

µS1(x, y(ω), ω) =

1, if ⟨F (x, y(ω), ω), y(ω)⟩ ≥ 0,µ1(⟨F (x, y(ω), ω), y(ω)⟩), if ⟨F (x, y(ω), ω), y(ω)⟩ ∈ [−t1, 0),0, if ⟨F (x, y(ω), ω), y(ω)⟩ < −t1,

µS2(x, y(ω), ω) =

1, if ⟨−F (x, y(ω), ω), y(ω)⟩ ≥ 0,µ2(⟨−F (x, y(ω), ω), y(ω)⟩), if ⟨−F (x, y(ω), ω), y(ω)⟩ ∈ [−t2, 0),0, if ⟨−F (x, y(ω), ω), y(ω)⟩ < −t2,

µSi+2(x, y(ω), ω) =

1, if d′iF (x, y(ω), ω) ≥ 0,µi+2(d′iF (x, y(ω), ω)), if d′iF (x, y(ω), ω) ∈ [−ti+2, 0),0, if d′iF (x, y(ω), ω) < −ti+2,

(3.4)

where ti+2 ≥ 0 for i = 1, 2, · · · , l, is the tolerance level which one decision maker can tolerate in theaccomplishment of the fuzzy stochastic inequalities in (3.3).

STEP II. Discrete approximation of problem (1.1) with condition (HC) need to be given.By Lemma 2.1 and STEP I, we have the following problem as an appropriate discrete approxi-

mation of problem (3.3):

min 1L

∑ω∈ΩL

f(x, y(ω), ω)ζ(ω)

s.t. x ∈ U ⊂ Rn, ω ∈ ΩL,di(x)y(ω) ≥ 0, i = 1, 2, · · · , l,⟨F (x, y(ω), ω), y(ω)⟩≥∼ 0,⟨−F (x, y(ω), ω), y(ω)⟩≥∼ 0,d′i(x)F (x, y(ω), ω) ≥

∼ 0, i = 1, 2, · · · , l.

(3.5)

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

847 Heng-you Lan 841-857

Page 70: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

We note that the sample set ΩL is chosen to be asymptotically dense in Ω. Especially, it followsfrom (2.4), (2.5) and (3.5) that the appropriate discrete approximation of two parameter f and fcan be shown as follows, respectively:

f = min 1L

∑ω∈ΩL

f(x, y(ω), ω)ζ(ω)

s.t. x ∈ U ⊂ Rn, ω ∈ ΩL,di(x)y(ω) ≥ 0, i = 1, 2, · · · , l,⟨F (x, y(ω), ω), y(ω)⟩ ≥ 0,⟨−F (x, y(ω), ω), y(ω)⟩ ≥ 0,d′i(x)F (x, y(ω), ω) ≥ 0, i = 1, 2, · · · , l

(3.6)

andf = min 1

L

∑ω∈ΩL

f(x, y(ω), ω)ζ(ω)

s.t. x ∈ U ⊂ Rn, ω ∈ ΩL,di(x)y(ω) ≥ 0, i = 1, 2, · · · , l,⟨F (x, y(ω), ω), y(ω)⟩ ≥ −t1,⟨−F (x, y(ω), ω), y(ω)⟩ ≥ −t2,d′i(x)F (x, y(ω), ω) ≥ −ti+2, i = 1, 2, · · · , l.

(3.7)

STEP III. A new centre iterative method for solving problem (3.8) should be adopt.It follows from (2.13), (2.3) and (3.4)-(3.7) that an optimal solution of the stochastic optimization

problem (1.1) can be obtained by approximating for the following stochastic parametric optimizationproblem:

max α

s.t. µ−1

S0(α)− 1

L

∑ω∈ΩL

f(x, y(ω), ω)ζ(ω) ≥ 0,

µ−1

S1(α)− ⟨F (x, y(ω), ω), y(ω)⟩ ≥ 0,

µ−1

S2(α) + ⟨F (x, y(ω), ω), y(ω)⟩ ≥ 0,

−µ−1

Sj(α) + d′j−2F (x, y(ω), ω) ≥ 0, j = 3, 4, · · · , l + 2,

di(x)y(ω) ≥ 0, i = 1, 2, · · · , l,0 ≤ α ≤ 1, x ∈ U, ω ∈ ΩL.

(3.8)

It is interested in developing an efficient algorithm to solve (3.8) based on a framework of centreiterations. This iterative approach can be traced back to Huard’s work [28]. The basic concepts areeasy to understand and very adaptive to new developments. To describe the approach, we denotethe feasible domain of (3.8) by a set V and define some terminologies. A general assumption forthis approach is that V is bounded and convex, and the interior of V is nonempty.

Definition 3.1 For any given point (x, y(ω), ω, α) in the convex domain V , we define the “dis-tance L of (x, y(ω), ω, α) to the boundary of V ” by a continuous function

L((x, y(ω), ω, α), V ) = mini=1,2,··· ,l

j=3,4,··· ,l+2

α, 1− α, µ−1

S0(α)− 1

L

∑ω∈ΩL

f(x, y(ω), ω)ζ(ω),

µ−1

S1(α)− ⟨F (x, y(ω), ω), y(ω)⟩, µ−1

S2(α) + ⟨F (x, y(ω), ω), y(ω)⟩,

−µ−1

Sj(α) + d′j−2F (x, y(ω), ω), di(x)y(ω)

.

Definition 3.2 Let a distance function L((x, y(ω), ω, α), V ) be defined on a convex domain V .Then a point (x, y(ω), ω, α) ∈ V is called the “centre of V ”, if it maximizes the distance functionL((x, y(ω), ω, α), V ), i.e.,

(x, y(ω), ω, α) : L((x, y(ω), ω, α), V ) = max L((x, y(ω), ω, α), V )| (x, y(ω), ω, α) ∈ V .

Thus, a new centre iterative method for problem (3.8) could be described as follows.

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

848 Heng-you Lan 841-857

Page 71: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Algorithm 3.1. Step 1. Taking a point (xk, yk(ω), ω, αk) in V , then we consider the distanceL in convex domain Wk = V ∩ (x, y(ω), ω, α)|α ≥ αk.

Step 2. Solving the maximal problem maxL((x, y(ω), ω, α),Wk)| (x, y(ω), ω, α) ∈ Wk anddenoting the new iterative point (xk+1, yk+1(ω), ω, αk+1) as a centre of Wk, then we have

(xk+1, yk+1(ω), ω, αk+1) :

L((xk+1, yk+1(ω), ω, αk+1),Wk) = maxL((x, y(ω), ω, α),Wk)| (x, y(ω), ω, α) ∈Wk,

where

L((x, y(ω), ω, α),Wk) = mini=1,2,··· ,l

j=3,4,··· ,l+2

α− αk, α, 1− α, µ−1

S0(α)− 1

L

∑ω∈ΩL

f(x, y(ω), ω)ζ(ω),

µ−1

S1(α)− ⟨F (x, y(ω), ω), y(ω)⟩, µ−1

S2(α) + ⟨F (x, y(ω), ω), y(ω)⟩,

−µ−1

Sj(α) + d′j−2F (x, y(ω), ω), di(x)y(ω)

is the distance function defined on the convex domain Wk.

Step 3. Start working again with (xk+1, yk+1(ω), ω, αk+1) instead of (xk, yk(ω), ω, αk) and go toStep 1.

It follows from the properties introduced in [28, Lemma 2.2] and Algorithm 3.1 that the majorcomputational work lies in the determination of the centres required, i.e., at the kth iteration, thefollowing “min-max problem” should be solved:

− minx,y(ω),ω,α

L((x, y(ω), ω, α),Wk) = minx,y(ω),ω,α

max i=1,2,··· ,lj=3,4,··· ,l+2

αk − α, −α, α− 1,

1L

∑ω∈ΩL

f(x, y(ω), ω)ζ(ω)− µ−1

S0(α),

⟨F (x, y(ω), ω), y(ω)⟩ − µ−1

S1(α),

−⟨F (x, y(ω), ω), y(ω)⟩ − µ−1

S2(α),

−d′j−2F (x, y(ω), ω) + µ−1

Sj(α), −di(x)y(ω)

.

(3.9)

STEP IV A class of new regularization smoothing approximation algorithms is developed undercondition (HC).

Since the maximal membership function (see [12]) in the “min-max” problem (3.9) is non-differentiability, it is easy to see that one major difficulty encountered is to develop a class ofnew smoothing approximation methods, which are based on the notion of newly proposed “entropicregularization procedure” (see [18]).

Algorithm 3.2.Step 1. Set k = 0, give the initial iterate (x0, y0(ω), ω, α0) which is an interior point of V defined

by (3.8), a sufficiently small constant ϵ > 0, and an upper bound Q which is the maximum numberof unconstrained minimizations to be performed.

Step 2. Starting from (xk, yk(ω), ω, αk), apply a standard quasi-Newton line search of MAT-LAB software to solve the unconstrained smooth convex program (3.6), (3.7) and the followingunconstrained smooth convex program:

− minx,y(ω),ω,α

Lγ((x, y(ω), ω, α),Wk)

= 1γ ln

exp[γ(αk − α)] + exp[γ(−α)] + exp[γ(α− 1)]

+ exp[γ( 1L

∑ω∈ΩL

f(x, y(ω), ω)ζ(ω)− µ−1

S0(α))]

+ exp[γ(⟨F (x, y(ω), ω), y(ω)⟩ − µ−1

S1(α))]

+ exp[γ(−⟨F (x, y(ω), ω), y(ω)⟩ − µ−1

S2(α))]

+l+2∑j=3

exp[γ(−d′j−2F (x, y(ω), ω) + µ−1

Sj(α))]

+l∑

i=1

exp[γ(−di(x)y)]

(3.10)

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

849 Heng-you Lan 841-857

Page 72: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

with a sufficiently large γ. Denote its solution by (xk+1, yk+1(ω), ω, αk+1) in the light of Algorithm3.1.

Step 3. If k > 1 and ∥(xk+1, yk+1(ω), ω, αk+1) − (xk, yk(ω), ω, αk)∥2 ≤ ϵ, then the computationterminates with (xk+1, yk+1(ω), ω, αk+1) as the solution. If k > Q, then the computation terminateswith a failure.

Step 4. k ← k + 1 and go to Step 2.From Algorithm 3.2, it follows that minx,y(ω),ω,α Lγ((x, y(ω), ω, α),Wk) provides a centre of Wk,

as γ →∞. By using a moderately large γ, we can obtain an accurate approximation. Also because ofthe special “log-exponential” form of Lγ((x, y(ω), ω, α),Wk), we can avoid most overflow problems incomputation. Moreover, since problem (3.10) is an unconstrained, smooth, and convex optimizationprogram, the commonly used solution methods, such as the quasi-Newton line search of MATLABsoftware, can be readily applied.

Remark 3.1. We note that Algorithm 3.1 appears in Step 2 of Algorithm 3.2. It is the fuzzyconstraints in (1.1) that yields a fuzzy objective. Hence, a class of new and interesting regularizationsmoothing approximation approaches must be chosen to define two parameters in (3.6) and (3.7), andto employ for solving problem (3.10) which is equivalent to the stochastic parametric optimizationproblem (3.8).

STEP V Comprehensive convergence theorems based on Algorithm 3.2 should be proved.In the sequel, we first give the following lemmas and results.Lemma 3.1. Let the function φ : Ω→ R be continuous. Then we have

limL→∞

1

L

∑ω∈ΩL

φ(ω)ζ(ω) =

∫Ω

φ(ω)ζ(ω)dω.

Proof. Taking N = L, Is = Ω, J = ΩL, xi = ωi (i = 1, 2, · · · ) and f = φζ, then from the results(2.2) and (2.3) given in Chapter 2 of [24, pp. 13-14], the result holds. This completes the proof. 2

Remark 3.2. By Lemma 3.1, we know immediately that

limL→∞

1

L

∑ω∈ΩL

f(x, y(ω), ω)ζ(ω) =

∫Ω

f(x, y(ω), ω)ζ(ω)dω (3.11)

and particularly,

limL→∞

1

L

∑ω∈ΩL

ζ(ω) =

∫Ω

ζ(ω)dω = 1. (3.12)

Lemma 3.2. If ψ(x) is continuous, strictly increasing and linear over a convex set U in Rn,then its inverse ψ−1 is linear.

Theorem 3.1. Suppose that condition (HC) holds, the set U ⊂ Rn is nonempty and bounded,F : Rn+m × Ω→ Rm is continuously differentiable, and f : Rn+m × Ω→ R is Holder continuous in(x, y(·)) on U × Rm with order σ > 0 and Holder constant ς(ω) > 0 for all ω ∈ ΩL satisfying∫

Ω

ς(ω)dζ(ω) < +∞.

Then(i) problem (3.6) has at least one optimal solution when L is large enough;(ii) (x∗, y∗(·)) is an optimal solution of problem (2.4) when x∗ is an accumulation point of the

sequence xL and y∗(·) is defined by

y∗(ω) := maxi=1,2,··· ,l

−F (x∗, 0, ω),−d′i(x∗)F (x∗, 0, ω), 0, ω ∈ Ω. (3.13)

Proof. (i) Let FL be the feasible region of problem (3.6). It is not difficult to see that FL is anonempty and closed set and the objective function of problem (3.6) is bounded below on FL. Thus,

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

850 Heng-you Lan 841-857

Page 73: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

there exists a sequence (xk, yk(ω))ω∈ΩL ⊂ FL such that

limk→∞

1

L

∑ω∈ΩL

f(xk, yk(ω), ω)ζ(ω)

= inf(x,y(ω),ω)ω∈ΩL

1

L

∑ω∈ΩL

f(x, y(ω), ω)ζ(ω). (3.14)

It follows from the boundedness of U and the Holder continuity of f that the sequence xk and thefunction f are bounded.

On the other hand, noting that (xk, yk(ω))ω∈ΩL ∈ FL for every k, we have

0 ≤ yk(ω) ⊥ 1

L

∑ω∈ΩL

F (xk, yk(ω), ω)ζ(ω) ≥ 0, (3.15)

where the symbol ⊥ means the two vectors are perpendicular to each other. Assume that thesequence yk(ω)ω∈ΩL is unbounded. Taking a subsequence if necessary, let

limk→∞ω∈ΩL

∥yk(ω)∥ = +∞, limk→∞ω∈ΩL

yk(ω)

∥yk(ω)∥= y(ω), ∥y(ω)∥ = 1. (3.16)

Then, for all ω ∈ ΩL, dividing (3.15) by ∥yk(ω)∥ and letting k → +∞, we have for any x ∈ U ,

0 ≤ y(ω) ⊥ 1

L

∑ω∈ΩL

F (x, y(ω), ω)ζ(ω) ≥ 0.

This contradicts (3.16) by the continuous differentiability of F , and so yk(ω) is bounded for eachω ∈ ΩL with ζ(ω) > 0. For any ω ∈ ΩL with ζ(ω) = 0, we redefine yk(ω) by

yk(ω) := maxi=1,2,··· ,l

−F (xk, 0, ω),−d′i(xk)F (xk, 0, ω), 0.

Hence, the sequence (xk, yk(ω))ω∈ΩL is bounded and (3.14) remains valid. Therefore, the closenessof FL implies that any accumulation point of (xk, yk(ω))ω∈ΩL

must be an optimal solution ofproblem (3.6).

(ii) By the assumptions, the sequence xL contains a subsequence converging to x∗. Withoutloss of generality, we suppose limL→∞ xL = x∗.

Firstly, we prove that (x∗, y∗(·)) is feasible to problem (3.6). To this end, we define

yL(ω) := maxi=1,2,··· ,l

−F (xL, 0, ω),−d′i(xL)F (xL, 0, ω), 0

, ω ∈ Ω. (3.17)

It is obvious that (x∗, yL(ω))ω∈ΩLis feasible to problem (3.6) for every L. Since F (x∗, y∗(ω), ω) ≥ 0

by the definition (3.13), it is sufficient to show that

(y∗(ω))TF (x∗, y∗(ω), ω) = 0, ω ∈ Ω. (3.18)

Let ω ∈ Ω be fixed. Since the sample set ΩL is chosen to be asymptotically dense in Ω, there existsa sequence ωL of samples such that ωL ∈ ΩL for each L and limL→∞ ωL = ω. Thus, we obtain

(yL(ωL))TF (xL, yL(ωL), ωL) = 0, L = 1, 2, · · · .

Letting L→ +∞ and taking the continuity of the functions F (x, y(·), ·) on the compact set Ω intoaccount, we have

(y∗(ω))TF (x∗, y∗(ω), ω) = 0.

By the arbitrariness of ω ∈ Ω, now we know that (3.18) immediately holds. This completes theproof of the feasibility of (x∗, y∗(·)) in (3.6).

11

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

851 Heng-you Lan 841-857

Page 74: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Next, let (x, y(·)) be an arbitrary feasible solution of (3.6). It follows from the results of (i) andobvious that (x, y(ω), ω)ω∈ΩL

is feasible to problem (3.6) for any L. Moreover, from the Hocontinuityof f , we have

1

L

∑ω∈ΩL

[f(xL, yL(ω), ω)− f(xL, yL(ω), ω)

]ζ(ω)

=1

L

∑ω∈ΩL

[f(xL, yL(ω), ω)− f(xL, yL(ω), ω)

]ζ(ω)

≤ 1

L

∑ω∈ΩL

[∥yL(ω)− yL(ω)∥ς(ω)

]· ζ(ω)→ 0 as k →∞, w.p.1.

which along with Lemma 3.1 yields

limL→∞

1

L

∑ω∈ΩL

f(xk, yk(ω), ω) = limL→∞

1

L

∑ω∈ΩL

f(x∗, y∗(ω), ω) = Eω[f(x∗, y∗(ω), ω)] w.p.1,

which indicates that (x∗, y∗(·)) is an optimal solution of problem (1.1) with probability one andthe feasibility of (xL, yL(ω), ω)ω∈ΩL in (3.6) that (xL, yL(ω), ω)ω∈ΩL is also an optimal solution ofproblem (3.6). Thus, since f is Holder continuous in (x, y(·)) on U × Rm, we obtain

1

L

∑ω∈ΩL

[f(x∗, y∗(ω), ω)− f(x, y(ω), ω)

]ζ(ω)

≤ 1

L

∑ω∈ΩL

[f(x∗, y∗(ω), ω)− f(xL, yL(ω), ω)

]ζ(ω)

≤ 1

L

∑ω∈ΩL

∣∣f(x∗, y∗(ω), ω)− f(xL, yL(ω), ω)∣∣ ζ(ω)

≤ 1

L

∑ω∈ΩL

ζ(ω) ·[∥xL − x∗∥+ ∥yL(ω)− y∗(ω)∥

]ς(ω). (3.19)

It follows from (3.12) that the sequence

1L

∑ω∈ΩL

ζ(ω)

is bounded. This yields

limL→∞

1

L

∑ω∈ΩL

∣∣∣f(x∗, y∗(ω), ω)− f(xL, yL(ω), ω)∣∣∣ζ(ω) = 0. (3.20)

Thus, by letting L→ +∞ in (3.19) and taking (3.11) and (3.20) into account, we have∫Ω

f(x∗, y∗(ω), ω)ζ(ω)dω ≤∫Ω

f(x, y(ω), ω)ζ(ω)dω,

which implies that x∗ together with y∗(·) constitutes an optimal solution of problem (3.6). Thiscompletes the proof. 2

Similarly, by Lemma 3.1, (3.11), (3.12) and proof of Theorem 3.1, we have the following result.Theorem 3.2. Assume that condition (HC) holds, and f , F and U are the same as in Theorem

3.1. Then(i) problem (3.7) has at least one optimal solution when L is large enough;(ii) (x∗, y∗(·)) is an optimal solution of problem (2.5) when x∗ is an accumulation point of the

sequence xL and y∗(·) is defined by

y∗(ω) := maxi=1,2,··· ,l

−t1 − F (x∗, 0, ω),−t2 + F (x∗, 0, ω),−ti+2 − d′i(x∗)F (x∗, 0, ω), 0, ω ∈ Ω.

Now, consider the case that the membership function of each fuzzy stochastic inequality andthe objective function Eω[f(x, y(ω), ω)] in (3.3) is continuous, strictly increasing, and linear over the

12

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

852 Heng-you Lan 841-857

Page 75: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

corresponding tolerance interval. A commonly used example in fuzzy set theory is that ψ(x) = 1−bxβwith b > 0 and β > 1. In this case, from the theory of convex analysis [27], Lemma 3.2, and Theorems3.1 and 3.2, we have the following simple result.

Theorem 3.3. Suppose that condition (HC) holds. If F : Rn+m×Ω→ Rm is monotone in thesecond variable, and µΩz

(x, y(ω), ω) is continuous, strictly increasing and linear for all z ∈ C(x, ω)and any (x, y(ω), ω) ∈ Rn+m×Ω, then we can find an optimal solution (x∗, y∗(·)) of the stochastic op-timization problem (1.1) by solving the following stochastic parametric optimization problem: (3.8),which can be readily approximated by the iterative sequence (xk+1, yk+1(ω), ω, αk+1) generatedby Algorithm 3.2.

4 Simulation analysis

In this section, we shall give an example to illustrate the validity of our approaches.Taking n = 2,m = 3, l = 2, U = [1, 14]× [1, 14], d1(x) = (−1,−1, 3), d2(x) = (−n2, 1,−1),

f(x, y(ω), ω) = (x1 − y1)2 + x2y2 + 2ω, F (x, y(ω), ω) =

−2x1 + y1 − 3y2 + ωx1 + x2 + 3y1 − y3 − 2ω−2x2 + y2 + 2y3 − ω

,

C(x, ω) =

y(ω) = (y1, y2, y3)T ∈ R3

∣∣∣∣ ( d1(x)d2(x)

)y(ω) ≥ 0

,

and Letting d′1(x) = (0, 3, 1) and d′2(x) = (1, 2, 0) in (3.3), and ζ(ωℓ) = pℓ (ℓ = 1, 2, · · · , L) in (3.5),then we have

φ(x, y(ω), ω) := Eω[(x1 − y1)2 + x2y2 + 2ω] = 1L

∑Lℓ=1[(x1 − y1)2 + x2y2 + 2ωℓ]pℓ,

f1(x, y(ω), ω) = ⟨F (x, y(ω), ω), y(ω)⟩ = −2x1y1 + x1y2 + x2y2 − 2x2y3 + y21+ωy1 − 2ωy2 + 2y23 − ωy3,

f2(x, y(ω), ω) = ⟨−F (x, y(ω), ω), y(ω)⟩ = 2x1y1 − x1y2 − x2y2 + 2x2y3 − y21−ωy1 + 2ωy2 − 2y23 + ωy3,

f3(x, y(ω), ω) = d′1(x)F (x, y(ω), ω) = 3x1 + x2 + 9y1 + y2 − y3 − 7ω,f4(x, y(ω), ω) = d′2(x)F (x, y(ω), ω) = 2x2 + 7y1 − 3y2 − 2y3 − 3ω.

Thus, problem (3.5) is equivalent to the following generalized fuzzy stochastic inequality constrainedoptimization program:

min φ(x, y(ω), ω)s.t. 1 ≤ x1, x2 ≤ 14, y1, y2, y3 ≥ 0,

−y1 − y2 + y3 ≥ 0, −2y1 + y2 − y3 ≥ 0,fι(x, y(ω), ω) ≥

∼ 0, ι = 1, 2, 3, 4,

(4.1)

with the membership function µSτ(x, y(ω), ω) (τ = 1, 2, 3, 4), being specified as t1 = 9, t2 = 2, t3 =

6, t4 = 10,

µS1(x, y(ω), ω) =

1, if f1(x) ≥ 0,

1− f1(x,y(ω),ω)9 , if f1(x, y(ω), ω) ∈ [−9, 0),

0, if f1(x, y(ω), ω) < −9,

µS2(x, y(ω), ω) =

1, if f2(x, y(ω), ω) ≥ 0,

1− f2(x,y(ω),ω)2 , if f2(x, y(ω), ω) ∈ [−2, 0),

0, if f2(x) < −2,

µS3(x, y(ω), ω) =

1, if f3(x, y(ω), ω) ≥ 0,

1− f3(x,y(ω),ω)6 , if f3(x, y(ω), ω) ∈ [−6, 0),

0, if f3(x, y(ω), ω) < −6,

µS4(x, y(ω), ω) =

1, if f4(x) ≥ 0,

1− f4(x,y(ω),ω)10 , if f4(x, y(ω), ω) ∈ [−10, 0),

0, if f4(x) < −10,

13

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

853 Heng-you Lan 841-857

Page 76: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

and

µS0(x, y(ω), ω) =

1, if φ(x, y(ω), ω) < f,

f−φ(x,y(ω),ω)

f−f, if φ(x, y(ω), ω) ∈ [f, f),

0, if ⟨φ(x, y(ω), ω) ≥ f ,

where

f = min φ(x, y(ω), ω)s.t. 1 ≤ x1, x2 ≤ 14, y1, y2, y3 ≥ 0,

−y1 − y2 + 3y3 ≥ 0, −2y1 + y2 − y3 ≥ 0,fι(x, y(ω), ω) ≥ 0, ι = 1, 2, 3, 4,

(4.2)

and

f = min φ(x, y(ω), ω)s.t. 1 ≤ x1, x2 ≤ 14, y1, y2, y3 ≥ 0, ,

−y1 − y2 + 3y3 ≥ 0, −2y1 + y2 − y3 ≥ 0,f1(x, y(ω), ω) ≥ −9, f2(x, y(ω), ω) ≥ −2,f3(x, y(ω), ω) ≥ −6, f4(x, y(ω), ω) ≥ −10.

(4.3)

By Bellman and Zadeh’s method of fuzzy decision making [15] and Algorithm 3.2, now we knowthat the conditions of Theorem 3.3 hold, and so an optimal solution of the problem (4.1) canbe obtained by solving the following unconstrained and smooth nonlinear parametric optimizationproblem:

minx,y(ω),ω,α1γ ln

exp[γ(αk − α)] + exp[γ(−α)] + exp[γ(α− 1)]

+ exp[γ(φ(x, y(ω), ω)− (f − α(f − f)))]+ exp[γ(f1(x, y(ω), ω)− 9(1− α))]+ exp[γ(f2(x, y(ω), ω)− 2(1− α))]+ exp[γ(−f3(x, y(ω), ω) + 6(1− α))]+ exp[γ(−f4(x, y(ω), ω) + 10(1− α))]+ exp[γ(y1 + y2 − 3y3)] + exp[γ(2y1 − y2 + y3)]+ exp[γ(1− x1)] + exp[γ(1− x2)] + exp[γ(x1 − 14)]

+ exp[γ(x2 − 14)] + exp[γ(−y1)] + exp[γ(−y2)] + exp[γ(−y3)]

(4.4)

with γ being sufficiently large, where the optimal values of f and f are obtained by computing (4.2)and (4.3), respectively.

Choosing x0 = (4.0000, 2.0000), y0(ω) = (1.0547, 1.0564, 0.1574) and α0 = 0.2 and setting L = 3with the probability p1 = 0.1590, p2 = 0.6821, p3 = 0.1589, and ϵ = 10−5, Q = 106 and fixed γ = 12,then for each iteration of Algorithm 3.2, we first generate the random variable ω by using normrndfunction (that is, normal distribution function) of MATLAB 7.0 software. Secondly, we solve fromproblems (4.2) and (4.3) to problem (4.4) in turn by the commonly used quasi-Newton line searchof MATLAB software 7.0.

Here, the first layer iteration searching optimization is to solve problems (4.2) and (4.3), respec-tively. And the second optimizing process is to find the optimal solution of problem (4.1) via solvingthe unconstrained and smooth nonlinear parametric optimization problem (4.4). We only presentfour optimal solution (x∗, y∗(·)) with respect to the random variable ω and the corresponding mem-bership degree α∗ for whole stochastic optimization problem, which is listed in Table 1. Further,Table 2 show that each iteration calculation results including iterative solutions with the randomvariable ω = 0.128808 for the second optimizing process to this problem. The results for every stepin Table 2 (i.e., k = 0, 1, 2, · · · , 11) come from the first layer iteration process, which are too muchand so they are omitted.

14

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

854 Heng-you Lan 841-857

Page 77: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Table 1: The optimal solution with the random variable and membership degree

k (x∗, y∗(ω), ω) α∗

1 (0.984674, 1.158197, 0.036645, 0.228989, 0.128690, 0.128808) 0.9543632 (0.987781, 1.219403, 0.024577, 0.187961, 0.097964, 0.345629) 0.9496523 (0.984337, 1.156955, 0.036586, 0.232004, 0.127346, 0.191080) 0.9531854 (0.988056, 1.226168, 0.023580, 0.184104, 0.095786, 0.353731) 0.949391

Table 2: Data for Computational results with the random variable ω = 0.128808

k (xk, yk) αk Iterations No.0 (4.0000, 2.0000, 1.0547, 1.0564, 0.1574) 0.2 461 (0.989779,1.252773,0.027679,0.173089,0.106607) 0.871896 162 (0.985831,1.166544,0.034618,0.217474,0.125437) 0.924577 133 (0.984928,1.159731,0.036190,0.226463,0.128032) 0.945141 154 (0.984726,1.158504,0.036552,0.228473,0.128555) 0.951749 145 (0.984687,1.158268,0.036623,0.228867,0.128658) 0.953643 96 (0.984677,1.158241,0.036639,0.228955,0.128681) 0.954166 47 (0.984676,1.158237,0.036638,0.228959,0.128678) 0.954309 38 (0.984676,1.158233,0.036638,0.228962,0.128678) 0.954348 59 (0.984674,1.158198,0.036645,0.228989,0.128690) 0.954359 110 (0.984674,1.158197,0.036645,0.228989,0.128690) 0.954362 111 (0.984674,1.158197,0.036645,0.228989,0.128690) 0.954363

5 Concluding remarks

In this paper, by developing a class of new regularization smoothing approximation approaches,we investigated approximation solvability of the following fuzzy parametric variational inequalityconstrained stochastic optimization problems in n-dimension real numeral set Rn:

minx,y(·)

Eω[f(x, y(ω), ω)]

s.t. x ∈ U,y(ω) ∈ C(x, ω),⟨F (x, y(ω), ω), z(ω)− y(ω)⟩≥∼ 0, ∀z(ω) ∈ C(x, ω),

(5.1)

which has been very little studied by right of the known theories and approaches in the literature.It is because the existence of the random variable and the fuzzified version mean that (5.1) involvesmultiple complementarity-type constraints, and solving problem (5.1) is more difficult than solvingan ordinary mathematical program with (fuzzy) equilibrium constraints or stochastic mathematicalprogram with equilibrium constraints.

Based on the notion of tolerance approach with entropic regularization and fuzzy set theory,we first showed that solving the stochastic optimization problem with fuzzy parametric variationalinequality constraints is equivalent to solving a fuzzy complementarity constrained stochastic opti-mization problem, which can be converted to a regular nonlinear parametric optimization problemwith continuous random variables. Then, we constructed a centre iterative algorithm and developeda class of new regularization smoothing approximation approaches for solving a problem with contin-uous random variables based on quasi-Monte Carlo estimate and entropic regularization technique,and discussed a comprehensive convergence theory for approximating the resulting optimizationproblem. Finally, numerical example was provided to illustrate our main results applying quasi-Newton line search of MATLAB software.

We remark that in the paper, based on the concept that fuzzy constraints should yield a fuzzy

15

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

855 Heng-you Lan 841-857

Page 78: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

objective, we must choose a class of new regularization smoothing approximation approaches todefine the objective function value of two optimization problems as the parameters in an equivalentstochastic parametric optimization problem. Hence, the problem presented in this paper is brandnew and the method is also new and interesting.

Whether the corresponding results of Theorem 3.3 hold when the objective function is a fuzzystochastic function, the constraints are fuzzy implicit variational inequalities (such as in [14, 17]) orelliptic inequalities subject to physical phenomenon, and the numerical testing is some large-scaleapplications, which are still open questions to be solved in further research.

Acknowledgments

This work has been partially supported by Sichuan Province Cultivation Fund Project of Academ-ic and Technical Leaders, and the Scientific Research Project of Sichuan University of Science &Engineering (2015RC07).

References

[1] S.I. Birbil, G. Gurkan and O. Listes, Solving stochastic mathematical programs with complementarityconstraints using simulation, Math. Oper. Res. 31(4) (2006), 739–760.

[2] Y. Chen and Q.J. Hu, A SQP algorithm based on a smoothing lower order penalty function for inequalityconstrained optimization, J. Comput. Anal. Appl. 11(3) (2009), 481–491.

[3] X.J. Chen, H.L. Sun and Roger J.B. Wets, Regularized mathematical programs with stochastic equilib-rium constraints: estimating structural demand models, SIAM J. Optim. 25(1) (2015), 53–75.

[4] Q.J. Hu, W.Y. Chen and Y.H. Xiao, An improved active set feasible SQP algorithm for the solution ofinequality constrained optimization problems, J. Comput. Anal. Appl. 11(1) (2009), 54–63.

[5] M. Patriche, Bayesian abstract fuzzy economies, random quasi-variational inequalities with random fuzzymappings and random fixed point theorems, Fuzzy Sets and Systems 245 (2014), 125–136.

[6] M. Patriksson, On the applicability and solution of bilevel optimization models in transportation science:a study on the existence, stability and computation of optimal solutions to stochastic mathematicalprograms with equilibrium constraints, Transportation. Res. B 42 (2008), 843–860.

[7] F. Toyasaki, P. Daniele and T. Wakolbinger, A variational inequality formulation of equilibrium modelsfor end-of-life products with nonlinear constraints, European J. Oper. Res. 236(1) (2014), 340–350.

[8] J. Zhang, Y.Q. Zhang and L.W. Zhang, A sample average approximation regularization method for astochastic mathematical program with general vertical complementarity constraints, J. Comput. Appl.Math. 280 (2015), 202–216.

[9] G.H. Lin, X.J. Chen, M. Fukushima, Smoothing Implicit Programming Approaches for Stochastic Math-ematical Programs with Linear Complementarity Constraints, Technical Report 2003-006, Departmentof Applied Mathematics and Physics, Graduate School of Informatics, Kyoto University, Kyoto, Japan,2003.

[10] G.H. Lin, X.J. Chen and M. Fukushima, Solving stochastic mathematical programs with equilibriumconstraints via approximation and smoothing implicit programming with penalization, Math. Program.Ser. B 116 (2009), 343–368.

[11] H. Xu, An implicit programming approach for a class of stochastic mathematical programs with linearcomplementarity constraints, SIAM J. Optim. 16 (2006), 670–696.

[12] C.F. Hu and F.B. Liu, Solving mathematical programs with fuzzy equilibrium constraints, Comput.Math. Appl. 58 (2009), 1844–1851.

[13] H.Y. Lan, C.J. Liu and T.X. Lu, Method of centres for solving mathematical programs with fuzzyparametric variational inequality constraints, in: X.S. Zhang et al. (Eds.), 11th International Symposiumon Operations Research and its Applications in Engineering, Technology and Management, Vol. 2013,Issue 644CP, 2013, pp. 194–199.

[14] H.Y. Lan and J.J. Nieto, Solving implicit mathematical programs with fuzzy variational inequalityconstraints based on the method of centres with entropic regularization, Fuzzy Optim. Decis. Mak. (inpress, March 2015) http://dx.doi.org/10.1007/s10700-015-9207-7

16

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

856 Heng-you Lan 841-857

Page 79: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

[15] R. Bellman and L.A. Zadeh, Decision making in a fuzzy environment, Management Sci. 17B (1970),141–164.

[16] Z.T. Gong, X.X. Liu and X. Feng, Almost ideal statistical convergence and strongly almost ideallacunary convergence of sequences of fuzzy numbers with respect to the Orlicz functions, J. Comput.Anal. Appl. 19(3) (2015), 418–425.

[17] H.Y. Lan, An approach for solving fuzzy implicit variational inequalities with linear membership func-tions, Comput. Math. Appl. 55(3) (2008), 563–572.

[18] E.Y. Pee and J.O. Royset, On solving large-scale finite minimax problems using exponential smoothing,J. Optim. Theory Appl. 148(2) (2011), 390–421.

[19] D.M. Yuan and X.L. Cheng, Method of fundamental solutions with an optimal regularization techniquefor the Cauchy problem of the modified Helmholtz equation, J. Comput. Anal. Appl. 14(1) (2012), 54–66.

[20] Z.H. Zhang, Asymptotic representations in stochastic process approximations, J. Comput. Anal. Appl.18(4) (2015), 672–684.

[21] H.J. Zimmermann, Fuzzy Set Theory and Its Applications (2nd edition), Kluwer Academic, Dordrecht,1991.

[22] C.F. Hu, Solving Systems of Fuzzy Inequalities, Ph.D thesis, North Carolina State University, ProQuestLLC, Ann Arbor, MI, 1997.

[23] Y. Chen and M. Florian, The nonlinear bilevel programming problem, formulations, regularity andoptimality conditions, Optimization 32 (1995), 193–209.

[24] H. Niederreiter, Random number generation and quasi-Monte Carlo methods, in: CBMS-NSF RegionalConference Series in Applied Mathematics, vol. 63, Society for Industrial and Applied Mathematics,Philadelphia, PA, vi+241 pp, 1992.

[25] O.G. Mancino and G. Stampacchia, Convex programming and variational inequalities, J. Optim. TheoryAppl. 9 (1972), 3–23.

[26] H.F. Wang and H.L. Liao, Variational inequality with fuzzy convex cone, J. Global Optim. 14(4) (1999),395–414.

[27] R.T. Rockafellar, Convex Analysis, Princeton, NJ: Princeton Univ. Press, 1970.

[28] P. Huard, Resolution of mathematical programming with nonlinear constraints by the method of centresin nonlinear programming, in: Nonlinear Programming (eds. J. Abadie), North-Holland, Amsterdam,1967, pp. 207–219.

17

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

857 Heng-you Lan 841-857

Page 80: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

The Split Common Fixed Point Problem

for Demicontractive Mappings

in Banach Spaces

Li Yang1, Fuhai Zhao2 and Jong Kyu Kim3

1School of Science, South West University of Science and Technology,Mianyang, Sichuan 621010, P. R. China

e-mail: [email protected]

2School of Science, South West University of Science and Technology,Mianyang, Sichuan 621010, P. R. China

e-mail: [email protected]

3Department of Mathematics Education, Kyungnam University,Changwon, Gyeongnam 51767, Korea

e-mail: [email protected]

Abstract. In this paper, based on the work by Moudafi and inspired by Takahashi and Xu, we tryto investigate the split common fixed point problems for the class of demicontractive mappings inthe setting of two Banach spaces, and obtain the strong and weak convergence theorems. The resultspresented in the paper improve and extend some recent well-known corresponding results.

Keywords: split common fixed point problem; demicontractive mapping; Demiclosed principle,weak and strong convergence theorems.

2010 AMS Subject Classification: 47H09, 49J25.

1 Introduction and Preliminaries

The split common fixed point problem was introduced by Moudafi [1] in 2010. Moudafiproposed an iteration scheme and obtained a weak convergence theorem of the splitcommon fixed point problem for demicontractive mappings in the setting of twoHilbert spaces. Since then, many authors investigated the split common fixed pointproblems of other nonlinear mappings in the setting of two Hilbert spaces (see [2-7]).At the beginning of 2015, Takahashi [8] first attempted to introduce and consider thesplit feasibility problem and split common null point problem in the setting of oneHilbert space and one Banach space. By using hybrid methods and Halperns typemethods under suitable conditions, some strong and weak convergence theorems forsuch problems are obtained. The results presented in [8] seem to be the first outsideHilbert spaces. This naturally brings us to solve the split common fixed point problemfor demicontractive mappings in the setting of two Banach space.

Let E1 and E2 be two real Banach spaces, and A : E1 → E2 be a boundedlinear operator such that A 6= 0. The split common fixed point problem (SCFP) fornonlinear mappings S and T is to find a point x ∈ E1 such thst

x ∈ F (S) and Ax ∈ F (T ), (1.1)

0Corresponding author: Jong Kyu Kim([email protected])

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

858 Li Yang et al 858-863

Page 81: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

where F (S) and F (T ) denote the sets of fixed points of S and T , respectively. Weuse Γ to denote the set of solutions of SCFP for mappings S and T , that is,

Γ = x ∈ F (S)| Ax ∈ F (T ).

In this paper, we use the following algorithm to approximate a split common fixedpoint of demicontractive mappings in the setting of two Banach spaces.

Algorithm: Let E1 and E2 be two real Banach spaces, A : E1 → E2 be a boundedlinear operator, A∗ be the adjoint operator of A and Ji be the normalized dualitymapping from Ei to 2E

∗i , i = 1, 2. Now, we define the iterative scheme xn:

Let x1 ∈ E1 be arbitrary, for all n ≥ 1, set

yn = xn + γJ−11 A∗J2(T − I)Axn, (1.2)

xn+1 = (1− αn)yn + αnS(yn), (1.3)

where S : E1 → E1 and T : E2 → E2 are two demicontractive mappings.

Under some suitable conditions, the iterative scheme xn is shown to convergeweakly and strongly to a split common fixed point of demicontractive mappings Tand S. Our result extends the split common fixed point problem from Hilbert spacesto Banach spaces.

In order to solve this problem mentioned above, we recall the following conceptsand results.

Let E be a real Banach space with norm ‖ · ‖ and let E∗ be the dual space of E,We denote the value of y∗ ∈ E at x ∈ E by 〈x, y∗〉. When xn is a sequence in E, wedenote the strong convergence of xn to x ∈ E by xn → x and the weak convergenceby xn x.

We recall that T : E → E is demicontractive (see for example [9]) if there existsa constant η ∈ [0, 1) such that

‖Tx− q‖2 ≤ ‖x− q‖2 + η‖x− Tx‖2, ∀(x, q) ∈ E × F (T ). (1.4)

An operator satisfying (1.4) will be referred to as a η-demicontractive mapping.It is worth noting that the class of demicontractive maps contains important op-

erators such as the quasi-nonexpansive maps and the strictly pseudocontractive mapswith fixed points.

A mapping T : E → E is called quasi-nonexpansive, if

‖Tx− q‖ ≤ ‖x− q‖

for all (x, q) ∈ E × F (T ). A mapping T : E → E is strictly pseudocontractive, if

‖Tx− Ty‖2 ≤ ‖x− y‖2 + β‖x− y − (Tx− Ty)‖2

for all (x, y) ∈ E × E and for some β ∈ [0, 1).A mapping T : E → E is called demiclosed at zero, if for any sequence xn ⊂ E

and x ∈ E, we have

xn x, (I − T )(xn)→ 0⇒ x ∈ F (T ).

A mapping S : E → E is said to be semi-compact, if for any sequence xn in Esuch that ‖xn − Sxn‖ → 0, (n → ∞), there exists subsequence xnj

of xn suchthat xnj

converges strongly to x∗ ∈ E.

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

859 Li Yang et al 858-863

Page 82: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

The normalized duality mapping J from E to 2E∗

is defined by

Jx = x∗ ∈ E∗ : 〈x, x∗〉 = ‖x‖2 = ‖x∗‖2, ∀x ∈ E.

Let U = x ∈ E : ‖x‖ = 1. The norm of E is said to be Gateaux differentiable iffor each x, y ∈ U , the limit

limt→0

‖x+ ty‖ − ‖x‖t

exists.

In the case, E is called smooth. E is smooth if and only if J is single-valued. Wedenote the single-valued normalized duality mapping by J .

The modulus of convexity of E is defined by

δE(ε) = inf

1− ‖x+ y‖2

: ‖x‖ ≤ 1, ‖y‖ ≤ 1, ‖x− y‖ ≥ ε,

for every ε with 0 ≤ ε ≤ 2. A Banach space E is said to be uniformly convex ifδ(ε) > 0 for every ε > 0. E is said to be p-uniformly convex, if there exists a constanta > 0 such that δE(ε) ≥ aεp for all 0 < ε ≤ 2.

Let ρE : [0,∞)→ [0,∞) be the modulus of smoothness of E defined by

ρE(t) = sup1

2(‖x+ y‖+ ‖x− y‖)− 1 : x ∈ U, ‖y‖ ≤ t.

A Banach space E is said to be uniformly smooth if ρE(t)t → 0 as t → 0. Let q be

a fixed real number with q > 1. Then a Banach space E is said to be q-uniformlysmooth if there exists a constant b > 0 such that ρE(t) ≤ btq for all t > 0. It is wellknown that every q-uniformly smooth Banach space is uniformly smooth.

A Banach space E is said to satisfy the Opial’s condition [10] if for any sequencexn ⊂ E, xn x implies

lim supn→∞

‖xn − x‖ < lim supn→∞

‖xn − y‖,

for all y ∈ E with y 6= x.

Lemma 1.1. [11] Let E be a 2-uniformly convex Banach space. Then the followinginequality holds:

‖λx+ (1− λ)y‖2 ≤ λ‖x‖2 + (1− λ)‖y‖2 − λ(1− λ)c‖x− y‖2, ∀x, y ∈ E, (1.5)

where 0 ≤ λ ≤ 1, c = µ(1) > 0,

µ(t) : = infλ‖x‖2 + (1− λ)‖y‖2 − ‖λx+ (1− λ)y‖2

λ(1− λ):

0 < λ < 1, x, y ∈ E and ‖x− y‖ = t

> 0.

Lemma 1.2. [11] Let E be a 2-uniformly smooth Banach space with the best smooth-ness constants κ > 0. Then the following inequality holds:

‖x+ y‖2 ≤ ‖x‖2 + 2〈y, Jy〉+ 2‖κy‖2,

for all x, y ∈ E.

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

860 Li Yang et al 858-863

Page 83: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

2 Main Results

Lemma 2.1. Let E1 be a real 2-uniformly convex and 2-uniformly smooth Banachspaces with the best smoothness constant κ satisfying 0 < κ < 1√

2, E2 be a real

Banach space, and A : E1 → E2 be a bounded linear operator. Let S : E1 → E1 be β-demicontractive and T : E2 → E2 be η-demicontractive with F (S) 6= ∅ and F (T ) 6= ∅.Then the sequence xn generated by algorithm (1.2)-(1.3) is Fejer-monotone withrespect to Γ = x ∈ F (S)|Ax ∈ F (T ), that is, for every z ∈ Γ,

‖xn+1 − z‖ ≤ ‖xn − z‖, ∀n ∈ N,

where 0 < γ < min

1−η‖A‖2 ,

1−2κ‖A‖2

and αn ∈ (0, 1− β

c ], β < c = µ(1).

Proof. Let z ∈ Γ. Then z ∈ F (S) and Az ∈ F (T ). It follows from Lemma 1.1 and(1.3) that

‖xn+1 − z‖2 = ‖(1− αn)yn + αnS(yn)− z‖2

= ‖(1− αn)(yn − z) + αn(S(yn)− z)‖2

≤ (1− αn)‖yn − z‖2 + αn‖S(yn)− z‖2

−αn(1− αn)c‖S(yn)− yn‖2 (2.1)

≤ (1− αn)‖yn − z‖2 + αn‖yn − z‖2 + αnβ‖S(yn)− yn‖2

−αn(1− αn)c‖S(yn)− yn‖2

≤ ‖yn − z‖2 − αn(c− β − cαn)‖S(yn)− yn‖2,

where c = µ(1).On the other hand, It follows from (1.2) and Lemma 1.2 that

‖yn − z‖2 = ‖xn + γJ−11 A∗J2(T − I)Axn − z‖2

= ‖xn − z + γJ−11 A∗J2(T − I)Axn‖2

≤ ‖γJ−11 A∗J2(T − I)Axn‖2 + 2γ〈xn − z,A∗J2(T − I)Axn〉+2κ2‖xn − z‖2

≤ γ2‖A‖2‖(T − I)Axn‖2 + 2γ〈Axn −Az, J2(T − I)Axn〉+2κ2‖xn − z‖2

= γ2‖A‖2‖(T − I)Axn‖2 + 2κ2‖xn − z‖2

2γ〈Axn − TAxn + TAxn −Az, J2(T − I)Axn〉≤ γ2‖A‖2‖(T − I)Axn‖2 + 2κ2‖xn − z‖2

−2γ‖(T − I)Axn‖2 + 2γ〈TAxn −Az, J2(T − I)Axn〉≤ (γ2‖A‖2 − 2γ)‖(T − I)Axn‖2 + 2κ2‖xn − z‖2

+γ(‖TAxn −Az‖2 + ‖(T − I)Axn‖2)

≤ 7(γ2‖A‖2 − 2γ)‖(T − I)Axn‖2 + 2κ2‖xn − z‖2

+γ(‖Axn −Az‖2 + η|(Axn − TAxn‖2 + ‖(T − I)Axn‖2)

≤ (2κ2 + γ‖A‖2)‖xn − z‖2 − γ(1− η − γ‖A‖2)‖(T − I)Axn‖2,

where A∗ is the adjoint operator of A and Ji is the normalized duality mapping fromEi to 2E

∗i , i = 1, 2.

In addition, since 0 < κ < 1√2

and 0 < γ < 1−2κ2

‖A‖2 , 0 < γ‖A‖2 + 2κ2 < 1, so we

have‖yn − z‖2 ≤ ‖xn − z‖2 − γ(1− η − γ‖A‖2)‖(T − I)Axn‖2. (2.2)

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

861 Li Yang et al 858-863

Page 84: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

It follows from (2.1) and (2.2) that

‖xn+1 − z‖2 ≤ ‖xn − z‖2 − γ(1− η − γ‖A‖2)‖(T − I)Axn‖2 (2.3)

−αn(c− β − cαn)‖S(yn)− yn‖2.

Finally, by the assumptions on γ and αn, we obtain the desired result.

Theorem 2.2. Let E1 be a real 2-uniformly convex and 2-uniformly smooth Banachspace satisfying Opial’s condition with the best smoothness constant κ satisfying 0 <κ < 1√

2, and E2 be a real Banach space. Let A : E1 → E2 be a bounded linear

operator, S : E1 → E1 and T : E2 → E2 be two demicontractive mappings withconstants β and η with F (S) 6= ∅ and F (T ) 6= ∅, respectively. Assume that I − Sand I − T are demiclosed at zero. If Γ 6= ∅, then the sequence xn generated byalgorithm (1.2)-(1.3) converges weakly to a split common fixed point x ∈ Γ, for 0 <γ < min

1−η‖A‖2 ,

1−2κ‖A‖2

, αn ∈ (δ, 1− β

c −δ), β < c = µ(1), and for small enough δ > 0.

Proof. From (2.3) and the fact that 0 < γ < min

1−η‖A‖2 ,

1−2κ‖A‖2

and αn ∈ (δ, 1− β

c−δ),we obtain that the sequence ‖xn−z‖ is monotonically decreasing and thus convergesto some positive real limit l(z). From (2.3), we have

γ(1− η − γ‖A‖2)‖(I − T )Axn‖2 ≤ ‖xn − z‖2 − ‖xn+1 − z‖2.

Therefore,limn→∞

‖(I − T )Axn‖ = 0. (2.4)

From the Fejer-monotonicity of xn, it follows that the sequence is bounded. Denot-ing by x a weak-cluster point of xn. Let k = 0, 1, 2, ... be the sequence of indices,such that xnk

x, as k →∞. Then from (2.4) and demiclosedness of I − T at zero,we obtain T (Ax) = Ax, that is, Ax ∈ F (T ).

Now, by setting yn = xn + γJ−11 A∗J2(I − T )Axn, it follows that ynk x. Again

from (2.3), we obtain

αn(c− β − cαn)‖yn − S(yn)‖2 ≤ ‖xn − z‖2 − ‖xn+1 − z‖2.

Using the convergence of the sequence ‖xn − z‖, we get

limn→∞

‖yn − S(yn)‖ = 0, (2.5)

which combined with the demiclosedness of I − S at zero and the weak convergenceof ynk

to y yields S(x) = x. Hence, x ∈ F (S) and therefore x ∈ Γ. Since E1 satisesOpial’s condition, we know that xn converges weakly to x ∈ Γ.

Theorem 2.3. Let E1 be a real 2-uniformly convex and 2-uniformly smooth Banachspace satisfying Opial’s condition with the best smoothness constant κ satisfying 0 <κ < 1√

2, and E2 be a real Banach space. Let A : E1 → E2 be a bounded linear

operator, S : E1 → E1 and T : E2 → E2 be two demicontractive mappings withconstants β and η with F (S) 6= ∅ and F (T ) 6= ∅, respectively. Assume that I − Sand I − T are demiclosed at zero. If Γ 6= ∅ and S is semi-compact, then the sequencexn generated by algorithm (1.2)-(1.3) converges strongly to a split common fixedpoint x ∈ Γ, for 0 < γ < min 1−η

‖A‖2 ,1−2κ‖A‖2 , αn ∈ (δ, 1 − β

c − δ), β < c = µ(1), and

for a small enough δ > 0.

Proof. It follows from (1.2) that

‖xn − yn‖ = ‖J1(xn − yn)‖ = ‖γA∗J2(I − T )Axn‖,

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

862 Li Yang et al 858-863

Page 85: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

and so, from (2.4) we havelimn→∞

‖xn − yn‖ = 0. (2.6)

Since S is semi-compact, from (2.5), there exist subsequence ynj of yn such that

ynj converges strongly to x∗ ∈ E1. Using (2.6), we know that xnj

convergesstrongly to x∗. By Theorem 2.2, we know that xn converges weakly to x, so wehave x∗ = x. Since lim

n→∞‖xn − x‖ exists and lim

j→∞‖xnj − x‖ = 0, we know that xn

converges strongly to x ∈ Γ.

Acknowledgements: The first author was Supported by Scientific Reserch Fundof Sichuan Provincial Education Department (No.15ZA0112) and third author wassupported by the Basic Science Research Program through the National ResearchFoundation(NRF) Grant funded by Ministry of Education of the republic of Ko-rea(2014046293).

References

[1] A. Moudafi, The split common fixed point problem for demi-contractive map-pings, Inverse Problem, Vol. 26(2010), Article ID 055007, 2010.

[2] S.S. Chang, L. Wang, Y.K. Tang and L. Yang, The split common fixed fointproblem for total asymptotically strictly pseudocontractive mappings, Journalof Applied Mathematics, Vol. 2012, Article ID 385638, 2012.

[3] S.S. Chang, J.K. Kim, Y.J. Cho and J.Y. Sim,, Weak and strong convergencetheorems of solution to split feasibility problem for nonspreading type mappingin Hilbert spaces, Fixed Point Theory and Appl., Vol. 2014:11, 2014.

[4] X.F. Zhang, L. Wang, Z.L. Ma and W. Duan, The strong convergence theoremsfor split common fixed point problems of asymptotically nonexpansive mappingsin Hilbert spaces, Journal of Inequalities and Appl., Vol. 2015:1, 2015.

[5] J. Quan, S.S. Chang and X. Zhang, Multiple-set split feasibility problems fork-strictly pseudononspreading mapping in Hilbert spaces, Abstract and AppliedAnalysis, Vol. 2013, Article ID 342545, doi:10.1155/ 2013/342545.

[6] S.S. Chang, Y.J. Cho, J.K. Kim, W.B. Zhang and L. Yang, Multiple-set splitfeasibility problems for asymptotically strict pseudocontractions, Abstract andApplied Analysis, Vol. 2012, Article ID 491760, doi:10.1155/2012/491760.

[7] A. Moudafi, A note on the split common fixed point problem for quasi-nonexpansive operators, Nonlinear Anal.TMA, Vol. 74(2011), 4083-4087.

[8] W. Takahashi, The split feasibility problem in Banach spaces, Nonlinear ConvexAnal., Vol. 15(6)(2015), 1349-1355.

[9] S. Maruster and C. Popirlan On the Mann-type iteration and convex feasibilityproblem J. Comput. Appl. Math., Vol. 212(2008), 390396.

[10] Z. Opial, Weak convergence of the sequence of successive approximations fornonexpansive mappings, Bull. Amer. Math. Soc., Vol. 73(1967), 591-597.

[11] H.K. Xu, Inequalities in Banach spaces with applications, Nonlinear Anal. TMA,Vol. 16(1991), 1127-1138.

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

863 Li Yang et al 858-863

Page 86: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Iterated binomial transform of the k-Lucas sequence

Nazmiye Yilmaz and Necati Taskara

Department of Mathematics, Faculty of Science,Selcuk University, Campus, 42075, Konya - Turkey

[email protected] and [email protected]

Abstract

In this study, we apply ”r” times the binomial transform to k-Lucassequence. Also, the Binet formula, summation, generating function ofthis transform are found using recurrence relation. Finally, we give theproperties of iterated binomial transform with classical Lucas sequence.

Keywords: k-Lucas sequence, iterated binomial transform, Pell se-quence.

Ams Classification: 11B65, 11B83.

1 Introduction and Preliminaries

There are so many studies in the literature that concern about the specialnumber sequences such as Fibonacci, Lucas and generalized Fibonacci anadLucas numbers (see, for example [1]-[3], and the references cited therein). InFibonacci and Lucas numbers, there clearly exists the term Golden ratio whichis defined as the ratio of two consecutive of these numbers that converges to

α = 1+√5

2 . It is also clear that the ratio has so many applications in, specially,Physics, Engineering, Architecture, etc.[4]. Also, many generalizations of theFibonacci sequence have been introduced and studied matrix applications ofthis sequence in [13]-[16].

For n ≥ 1, k-Lucas sequence is defined by the recursive equation:

Lk,n+1 = kLk,n + Lk,n−1, Lk,0 = 2 and Lk,1 = k. (1.1)

In addition, some matrix-based transforms can be introduced for a givensequence. Binomial transform is one of these transforms and there are alsoother ones such as rising and falling binomial transforms(see [5]-[12]). Given

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

864 Nazmiye Yilmaz et al 864-873

Page 87: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

an integer sequence X = x0, x1, x2, . . ., the binomial transform B of thesequence X, B (X) = bn , is given by

bn =n∑

i=0

(n

i

)xi.

In [10], authors gave the application of the several class of transforms tothe k-Lucas sequence. For example, for n ≥ 1, authors obtained recurrencerelation of the binomial transform for k-Lucas sequence

bk,n+1 = (2 + k) bk,n − kbk,n−1, bk,0 = 2 and bk,1 = k + 2.

Falcon [11] studied the iterated application of some Binomial transforms tothe k-Fibonacci sequence. For example, author obtained recurrence relationof the iterated binomial transform for k-Fibonacci sequence

c(r)k,n+1 = (2r + k) c

(r)k,n −

(r2 + kr − 1

)c(r)k,n−1, c

(r)k,0 = 0 and c

(r)k,1 = 1.

Motivated by [11, 12], the goal of this paper is to apply iteratively the bino-mial transform to the k-Lucas sequence. Also, the properties of this transformare found by recurrence relation. Finally, the relation of between the trans-form and the iterated binomial transform of k-Fibonacci sequence by derivingnew formulas are illustrated.

2 Iterated Binomial Transform of k-Lucas Sequences

In this section, we will mainly focus on iterated binomial transforms of k -Lucas sequences to get some important results. In fact, we will also presentthe recurrence relation, Binet formula, summation, generating function of thetransform and relationships betweeen of the transform and iterated binomialtransform of k-Fibonacci sequence.

The iterated binomial transform of the k-Lucas sequences is demonstrated

by B(r)k =

b(r)k,n

, where b

(r)k,n is obtained by applying ”r” times the binomial

transform to k-Lucas sequence. It is obvious that b(r)k,0 = 2 and b

(r)k,1 = 2r + k.

The following lemma will be the key proof of the next theorems.

Lemma 2.1 For n ≥ 0 and r ≥ 1, the following equality hold:

b(r)k,n+1 = b

(r)k,n +

n∑j=0

(n

j

)b(r−1)k,j+1.

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

865 Nazmiye Yilmaz et al 864-873

Page 88: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Proof. By using definition of binomial transform and the well known binomialequality (

n+ 1

i

)=

(n

i

)+

(n

i− 1

),

we obtain

b(r)k,n+1 =

n+1∑j=0

(n+ 1

j

)b(r−1)k,j

=

n+1∑j=1

(n+ 1

j

)b(r−1)k,j + b

(r−1)k,0

b(r)k,n+1 =

n+1∑j=1

(n

j

)b(r−1)k,j +

n+1∑j=1

(n

j − 1

)b(r−1)k,j + b

(r−1)k,0

=

n+1∑j=0

(n

j

)b(r−1)k,j +

n+1∑j=0

(n

j − 1

)b(r−1)k,j

=n∑

j=0

(n

j

)b(r−1)k,j +

n∑j=−1

(n

j

)b(r−1)k,j+1

= b(r)k,n +

n∑j=0

(n

j

)b(r−1)k,j+1

which is desired result.In [10], the authors obtained the following equality for binomial transform

of k-Lucas sequences. However, in here, we obtain the equality in terms of iter-ated binomial transform of the k-Lucas sequences as a consequence of Lemma2.1. To do that we take r = 1 in Lemma 2.1:

bk,n+1 = bk,n +

n∑j=0

(n

j

)Lk,j+1.

Theorem 2.1 For n ≥ 0 and r ≥ 1, the recurrence relation of sequenceb(r)k,n

is

b(r)k,n+1 = (2r + k) b

(r)k,n −

(r2 + kr − 1

)b(r)k,n−1, (2.1)

with initial conditions b(r)k,0 = 2 and b

(r)k,1 = 2r + k.

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

866 Nazmiye Yilmaz et al 864-873

Page 89: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Proof. The proof will be done by induction steps on r and n.First of all, for r = 1, from the equality 2.2 in [10], it is true bk,n+1 =

(2 + k) bk,n − kbk,n−1.Let us consider definition of iterated binomial transform, then we have

b(r)k,2 = k2 + 2rk + 2r2 + 2.

The initial conditions are

b(r)k,0 = 2 and b

(r)k,1 = 2r + k.

Hence, for n = 1, the Eq. (2.1) is true, that is b(r)k,2 = (2r + k) b

(r)k,1−

(r2 + kr − 1

)b(r)k,0.

Actually, by assuming the Eq. (2.1) holds for all (r − 1, n) and (r, n− 1),that is,

b(r−1)k,n+1 = (2r − 2 + k) b

(r−1)k,n −

((r − 1)2 + k (r − 1)− 1

)b(r−1)k,n−1,

andb(r)k,n = (2r + k) b

(r)k,n−1 −

(r2 + kr − 1

)b(r)k,n−2.

Now, by taking into account Lemma 2.1, we obtain

b(r)k,n+1 = b

(r)k,n +

n∑j=0

(n

j

)b(r−1)k,j+1

=

n∑j=0

(n

j

)b(r−1)k,j +

n∑j=0

(n

j

)b(r−1)k,j+1

=n∑

j=1

(n

j

)(b(r−1)k,j + b

(r−1)k,j+1

)+ b

(r−1)k,0 + b

(r−1)k,1 .

By reconsidering our assumption, we write

b(r)k,n+1 =

n∑j=1

(n

j

)(b(r−1)k,j + (2r − 2 + k) b

(r−1)k,j −

(r2 − 2r + kr − k

)b(r−1)k,j−1

)+ b

(r−1)k,0 + b

(r−1)k,1

= (2r + k − 1)

n∑j=1

(n

j

)b(r−1)k,j −

(r2 − 2r + kr − k

) n∑j=1

(n

j

)b(r−1)k,j−1 + b

(r−1)k,0 + b

(r−1)k,1

= (2r + k − 1)

n∑j=0

(n

j

)b(r−1)k,j −

(r2 − 2r + kr − k

) n∑j=1

(n

j

)b(r−1)k,j−1 + b

(r−1)k,0 + b

(r−1)k,1

− (2r + k − 1) b(r−1)k,0

= (2r + k − 1) b(r)k,n −

(r2 − 2r + kr − k

) n∑j=1

(n

j

)b(r−1)k,j−1 + (2− 2r − k) b

(r−1)k,0 + b

(r−1)k,1 .

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

867 Nazmiye Yilmaz et al 864-873

Page 90: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Then we have

b(r)k,n+1 − (2r + k − 1) b

(r)k,n = −

(r2 − 2r + kr − k

) n∑j=1

(n

j

)b(r−1)k,j−1 + 4− 2r − k.

(2.2)By taking n→ n− 1, it is

b(r)k,n = (2r + k − 1) b

(r)k,n−1 −

(r2 − 2r + kr − k

) n−1∑j=1

(n− 1

j

)b(r−1)k,j−1 + 4− 2r − k

= (2r + k − 1) b(r)k,n−1 −

(r2 − 2r + kr − k

) n∑j=1

[(n

j

)−(n− 1

j − 1

)]b(r−1)k,j−1 + 4− 2r − k

= (2r + k − 1) b(r)k,n−1 −

(r2 − 2r + kr − k

) n∑j=1

(n

j

)b(r−1)k,j−1

+(r2 − 2r + kr − k

) n∑j=1

(n− 1

j − 1

)b(r−1)k,j−1 + 4− 2r − k

b(r)k,n = (2r + k − 1) b

(r)k,n−1 −

(r2 − 2r + kr − k

) n∑j=1

(n

j

)b(r−1)k,j−1

+(r2 − 2r + kr − k

) n−1∑j=0

(n− 1

j

)b(r−1)k,j + 4− 2r − k

= (2r + k − 1) b(r)k,n−1 −

(r2 − 2r + kr − k

) n∑j=1

(n

j

)b(r−1)k,j−1

+(r2 − 2r + kr − k

)b(r)k,n−1 + 4− 2r − k

=(r2 + kr − 1

)b(r)k,n−1 −

(r2 − 2r + kr − k

) n∑j=1

(n

j

)b(r−1)k,j−1 + 4− 2r − k.

Hence, we have

b(r)k,n −

(r2 + kr − 1

)b(r)k,n−1 = −

(r2 − 2r + kr − k

) n∑j=1

(n

j

)b(r−1)k,j−1 + 4− 2r− k.

If last expression put in place in the equation (2.2), then we get

b(r)k,n+1 = (2r + k − 1) b

(r)k,n + b

(r)k,n −

(r2 + kr − 1

)b(r)k,n−1

= (2r + k) b(r)k,n −

(r2 + kr − 1

)b(r)k,n−1

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

868 Nazmiye Yilmaz et al 864-873

Page 91: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

which completed the proof of this theorem.

The characteristic equation of sequenceb(r)k,n

in (2.1) is

λ2− (2r + k)λ+ r2 + kr− 1 = 0. Let λ1 and λ2 be the roots of this equation.

Then, Binet’s formulas of sequenceb(r)k,n

can be expressed as

b(r)k,n =

(k +√k2 + 4

2+ r

)n

+

(k −√k2 + 4

2+ r

)n

. (2.3)

In here, we obtain the equalities given in [10] in terms of iterated binomialtransform of the k-Lucas sequences as a consequence of Theorem 2.1. To dothat we take r = 1 in Theorem 2.1 and the Eq. (2.3):

bk,n+1 = (2 + k) bk,n − kbk,n−1,

and

bk,n =

(k + 2 +

√k2 + 4

2

)n

+

(k + 2−

√k2 + 4

2

)n

.

Now, we give the sum of iterated binomial transform for k-Lucas sequences.

Theorem 2.2 Sum of sequenceb(r)k,n

is

n−1∑i=0

b(r)k,i =

(r2 + kr − 1

)b(r)k,n−1 − b

(r)k,n − k − 2r + 2

r2 + kr − k − 2r.

Proof. By considering Eq. (2.3), we have

n−1∑i=0

b(r)k,i =

n−1∑i=0

(λi1 + λi2

).

Then we obtainn−1∑i=0

b(r)k,i =

(λn1 − 1

λ1 − 1

)+

(λn2 − 1

λ2 − 1

).

Afterward, by taking into account equations λ1.λ2 = r2 +kr−1 and λ1 +λ2 =k + 2r, we conclude

n−1∑i=0

b(r)k,i =

(r2 + kr − 1

)b(r)k,n−1 − b

(r)k,n − k − 2r + 2

r2 + kr − k − 2r.

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

869 Nazmiye Yilmaz et al 864-873

Page 92: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Note that, if we take r = 1 in Theorem 2.2, we obtain the summation ofbinomial transform for k-Lucas sequence:

n−1∑i=0

bk,i = bk,n − kbk,n−1 + k

Theorem 2.3 The generating function of the iterated binomial transform forLk,n is

∞∑i=0

b(r)k,ix

i =2− (2r + k)x

1− (2r + k)x+ (r2 + kr − 1)x2.

Proof. Assume that b (k, x, r) =∞∑i=0

b(r)k,ix

i is the generating function of the

iterated binomial transform for Lk,n. From Theorem 2.1, we obtain

b (k, x, r) = b(r)k,0 + b

(r)k,1x+

∞∑i=2

((2r + k) b

(r)k,i−1 −

(r2 + kr − 1

)b(r)k,i−2

)xi

= b(r)k,0 + b

(r)k,1x− (2r + k) b

(r)k,0x+ (2r + k)x

∞∑i=0

b(r)k,ix

i

−(r2 + kr − 1

)x2∞∑i=0

b(r)k,ix

i

= b(r)k,0 +

(b(r)k,1 − (2r + k) b

(r)k,0

)x+ (2r + k)xb (k, x, r)

−(r2 + kr − 1

)x2 b (k, x, r) .

Now rearrangement of the equation implies that

b (k, x, r) =b(r)k,0 +

(b(r)k,1 − (2r + k) b

(r)k,0

)x

1− (2r + k)x+ (r2 + kr − 1)x2,

which equals to the∞∑i=0

b(r)k,ix

i in theorem. Hence, the result.

In here, we obtain the generating function given in [10] in terms of iteratedbinomial transform of the k-Lucas sequences as a consequence of Theorem 2.3.To do that we take r = 1 in Theorem 2.3:

∞∑i=0

bk,ixi =

2− (2 + k)x

1− (2 + k)x+ kx2.

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

870 Nazmiye Yilmaz et al 864-873

Page 93: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

In the following theorem, we present the relationship between the iteratedbinomial transform of k-Lucas sequence and iterated binomial transform ofk-Fibonacci sequence.

Theorem 2.4 For n > 0, the relationship of between the transformsb(r)k,n

and

c(r)k,n

is illustrated by following way:

b(r)k,n = c

(r)k,n+1 −

(r2 + kr − 1

)c(r)k,n−1, (2.4)

where b(r)k,n is the iterated binomial transform of k-Lucas sequence and c

(r)k,n is

the iterated binomial transform of k-Fibonacci sequence.

Proof. By using the Eq.(2.4), let be

b(r)k,n = Xc

(r)k,n+1 + Y c

(r)k,n−1.

If we take n = 1 and 2, we have the systemb(r)k,1 = Xc

(r)k,2 + Y c

(r)k,0,

b(r)k,2 = Xc

(r)k,3 + Y c

(r)k,1.

By considering definition of the iterated binomial transforms for k-Lucas, k-Fibonacci sequence and Cramer rule for the system, we obtain

2r + k = (2r + k)X,k2 + 2rk + 2r2 + 2 =

(3r2 + 3rk + k2 + 1

)X + Y

andX = 1 and Y = −

(r2 + kr − 1

)which is completed the proof of this theorem.

Note that, if we take r = 1 in Theorem 2.4, we obtain the relationshipof between the binomial transform for k-Lucas sequence and the binomialtransform for k-Fibonacci sequence:

bk,n = ck,n+1 − kck,n−1.

Corollary 2.1 We should note that choosing k = 1 in the all results of section2, it is actually obtained some properties of the iterated binomial transform forclassical Lucas sequence such that the recurrence relation, Binet formula, sum-mation, generating function and relationship of between binomial transformsfor Fibonacci and Lucas sequences.

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

871 Nazmiye Yilmaz et al 864-873

Page 94: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Corollary 2.2 We should note that choosing k = 2 in the all results of section2, it is actually obtained some properties of the iterated binomial transform forclassical Pell-Lucas sequence such that the recurrence relation, Binet formula,summation, generating function and relationship of between binomial trans-forms for Pell and Pell-Lucas sequences.

Conclusion 2.1 In this paper, we define the iterated binomial transform fork-Lucas sequence and present some properties of this transform. By the resultsin Sections 2 of this paper, we have a great opportunity to compare and obtainsome new properties over this transform. This is the main aim of this paper.Thus, we extend some recent result in the literature.

In the future studies on the iterated binomial transform for number se-quences, we expect that the following topics will bring a new insight.

(1) It would be interesting to study the iterated binomial transform for Fi-bonacci and Lucas matrix sequences,

(2) Also, it would be interesting to study the iterated binomial transform forPell and Pell-Lucas matrix sequences.

Acknowledgement 2.1 A part of this study presented at Sharjah-BAE ”TheSecond International Conference on Mathematics and Statistics (AUS-ICMS’15)”.This research is supported by TUBITAK and Selcuk University Scientific Re-search Project Coordinatorship (BAP).

References

[1] T. KOSHY, Fibonacci and Lucas Numbers with Applications, John Wileyand Sons Inc, NY, 2001.

[2] S. FALCON and A. PLAZA, On k-Fibonacci numbers of arithmetic in-dexes, Applied Mathematics and Computation, 208, 2009, 180-185.

[3] S. FALCON, On the k-Lucas number, International Journal of Contem-porary Mathematical Sciences, Vol. 6, no. 21, 2011, 1039 - 1050.

[4] L. MAREK-CRNJAC, The mass spectrum of high energy elementaryparticles via El Naschie’s golden mean nested oscillators, the Dunkerly-Southwell eigenvalue theorems and KAM, Chaos, Solutions & Fractals,18(1), 2003, 125-133.

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

872 Nazmiye Yilmaz et al 864-873

Page 95: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

[5] H. PRODINGER, Some information about the binomial transform, TheFibonacci Quarterly, 32 (5), 1994, 412-415.

[6] K.W. CHEN, Identities from the binomial transform, Journal of NumberTheory, 124, 2007, 142-150.

[7] S. FALCON and A. PLAZA, Binomial Transforms of k-Fibonacci Se-quence, International Journal of Nonlinear Sciences and Numerical Sim-ulation, 10(11-12), 2009, 1527-1538.

[8] N. YILMAZ and N. TASKARA, Binomial Transforms of the Padovanand Perrin Matrix Sequences, Abstract and Applied Analysis, ArticleNumber: 497418 Published: 2013.

[9] Y. YAZLIK, N. YILMAZ, N. TASKARA, The Generalized (s, t)-matrixSequence’s Binomial Transforms, Gen. Math. Notes, Vol. 24, No. 1, 2014,pp.127-136.

[10] P. BHADOURIA, D. JHALA, B. SINGH, Binomial Transforms of the k-Lucas Sequences and its Properties, Journal of mathematics and computerscience, 8, 2014, 81-92.

[11] S. FALCON, Iterated Binomial Transforms of the k-Fibonacci Sequence,British Journal of Mathematics & Computer Science, 4(22), 2014, 3135-3145.

[12] N. YILMAZ, N. TASKARA, On the Properties of Iterated BinomialTransforms for the Padovan and Perrin Matrix Sequences, MediterraneanJournal of Mathematics, DOI 10.1007/s00009-015-0612-5, 2015.

[13] Y. YAZLIK and N. TASKARA, A note on generalized k-Horadam se-quence, Computers & Mathematics with Applications, 63, 2012, 36-41.

[14] Y. YAZLIK and N. TASKARA, On the Inverse of Circulant Matrix viaGeneralized k-Horadam Numbers, Applied Mathematics and Computa-tion, 223, 2013, 191-196.

[15] Y. YAZLIK and N. TASKARA, Spectral norm, Eigenvalues and Determi-nant of Circulant Matrix involving the Generalized k-Horadam numbers,Ars Combinatoria, 104, 2012, 505-512.

[16] Y. YAZLIK and N. TASKARA, On the norms of an r-circulant matrixwith the generalized k-Horadam numbers, Journal of Inequalities and Ap-plications, 2013.1, 2013, 1-8.

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

873 Nazmiye Yilmaz et al 864-873

Page 96: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Nielsen xed point theory for digital images

Ozgur EGE1, Ismet KARACA2

1 Celal Bayar University, Department of Mathematics, 45140 Manisa, Turkey

E-mail: [email protected] Ege University, Department of Mathematics, 35100 Izmir, Turkey

E-mail: [email protected]

September 1, 2015

Abstract

In this paper, we introduce the Nielsen xed point theory in digital images. We also deal with someimportant properties of the Nielsen number and calculate the Nielsen number of some digital images. We getsome new results using digital covering maps and Nielsen number.

Keywords: Fixed point, Nielsen number, digital homotopy.2010 Mathematics Subject Classication. 47H10, 54H25, 68U10.

1 Introduction

Digital topology is often used in computer graphics, pattern recognition and image processing. This topic has been studiedby important researchers such as Rosenfeld, Kong, Kopperman, Boxer, Karaca, Han, etc. Their goal is to determine notonly similarities but also dierences between digital images and topology.

Fixed point theory with applications is an important area in topology. This theory continues to develop with newcomputations and come out of new invariants. Nielsen xed point theorem is a notable theorem in this theory because itgives a way to count xed points. One of the main goals in digital topology is to classify digital images. For this reason,we use the Nielsen number which is a powerful invariant for digital images.

In 1920s, Jakop Nielsen introduced the Nielsen theory and the Nielsen number. He focused on both the existenceproblem of xed points and the problem of determining the minimal number of xed points in the homotopy classes. Hedid this by introducing the Nielsen number of a self map. This number is a homotopy invariant lower bound for the numberof xed points of the map. In this area, there are signicant works [10, 11, 12, 16, 17, 18, 19].

Boxer [6] introduces the digital covering space and showed that the existence of digital universal covering spaces. Boxerand Karaca [7] classify digital covering spaces using the conjugacy class corresponding to a digital covering space. Boxerand Karaca [8] study digital versions of some properties of covering spaces from algebraic topology. Karaca and Ege [20]get some results related to the simplicial homology groups of 2D digital images. Ege and Karaca [13] give characteristicproperties of the simplicial homology groups.

This paper is organized as follows. The second section provides the general notions of digital images, digital homotopy,digital covering spaces and digital homology groups. In Section 3 we present the Nielsen xed point theorem for digitalimages, give some examples and properties. In Section 4 we discuss about the relation between Nielsen theory and digitaluniversal covering space. We nally make some conclusions about this topic.

2 Preliminaries

A digital image consists of a pair (X,κ), where Z is the set of integers, X ⊂ Zn for some positive integer n, and κ indicatesan adjacency relation for the members of X.

Denition 2.1. [3]. For a positive integer l with 1 ≤ l ≤ n and two distinct points p = (p1, p2, . . . , pn), q = (q1, q2, . . . , qn) ∈Zn, p and q are cl-adjacent, if(1) there are at most l indices i such that |pi − qi| = 1, and

(2) for all other indices j such that |pj − qj | 6= 1, pj = qj .

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

874 Ozgur EGE et al 874-880

Page 97: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

2

The notation cl represents the number of points q ∈ Zn that are adjacent to a given point p ∈ Zn. Thus, in Z,we have c1 = 2-adjacency; in Z2, we have c1 = 4-adjacency and c2 = 8-adjacency; in Z3, we have c1 = 6-adjacency,c2 = 18-adjacency, and c3 = 26-adjacency [5]. A κ-neighbor of p ∈ Zn [3] is a point of Zn that is κ-adjacent to p.

A digital interval [2] is dened by [a, b]Z = z ∈ Z | a ≤ z ≤ b where a, b ∈ Z and a < b. A digital image X ⊂ Zn isκ-connected [15] if and only if for every pair of dierent points x, y ∈ X, there is a set x0, x1, . . . , xr of points of a digitalimage X such that x = x0, y = xr and xi and xi+1 are κ-neighbors where i = 0, 1, . . . , r − 1.

Denition 2.2. [3]. Let X ⊂ Zn0 and Y ⊂ Zn1 be digital images with κ0-adjacency and κ1-adjacency, respectively. Afunction f : X −→ Y is said to be (κ0, κ1)-continuous if for every κ0-connected subset U of X, f(U) is a κ1-connectedsubset of Y . We say that such a function is digitally continuous.

Proposition 2.3. [3]. Let X ⊂ Zn0 and Y ⊂ Zn1 be digital images with κ0-adjacency and κ1-adjacency, respectively. Thefunction f : X → Y is (κ0, κ1)-continuous if and only if for every κ0-adjacent points x0, x1 of X, either f(x0) = f(x1)or f(x0) and f(x1) are κ1-adjacent in Y .

In a digital image X, if there is a (2, κ)-continuous function f : [0,m]Z → X such that f(0) = x and f(m) = y, thenthere exists a digital κ-path [6] from x to y. If f(0) = f(m), then we say that f is digital κ-loop and the point f(0) is thebase point of the loop f . When a digital loop f is a constant function, it is said to be a trivial loop.

Denition 2.4. Let (X,κ0) ⊂ Zn0 and (Y, κ1) ⊂ Zn1 be digital images. A function f : X → Y is called a (κ0, κ1)-isomorphism [2] if f is (κ0, κ1)-continuous and bijective and f−1 : Y → X is (κ1, κ0)-continuous.

Denition 2.5. [3]. Let (X,κ0) ⊂ Zn0 and (Y, κ1) ⊂ Zn1 be digital images. We say that two (κ0, κ1)-continuous functionsf, g : X → Y are digitally (κ0, κ1)-homotopic in Y if there is a positive integer m and a function H : X × [0,m]Z → Y suchthat• for all x ∈ X, H(x, 0) = f(x) and H(x,m) = g(x);• for all x ∈ X, the induced function Hx : [0,m]Z → Y dened by

Hx(t) = H(x, t) for all t ∈ [0,m]Z,

is (2, κ1)-continuous; and• for all t ∈ [0,m]Z, the induced function Ht : X → Y dened by

Ht(x) = H(x, t) for all x ∈ X,

is (κ0, κ1)-continuous.The function H is called a digital (κ0, κ1)-homotopy between f and g. If these functions are digitally (κ0, κ1)-homotopic,

it is denoted f '(κ0,κ1) g. The digital (κ0, κ1)-homotopy relation [3] is equivalence among digitally continuous functionsf : (X,κ0)→ (Y, κ1).

If f : [0,m1]Z → X and g : [0,m2]Z → X are digital κ-paths with f(m1) = g(0), then dene the product (f ∗ g) :[0,m1 +m2]Z → X [3] by

(f ∗ g)(t) =f(t), t ∈ [0,m1]Zg(t−m1), t ∈ [m1,m1 +m2]Z.

Let f and f′be κ-loops in a digital image (X,x0). We say f

′is a trivial extension of f [3] if there are sets of κ-paths

f1, . . . , fr and F1, . . . , Fp in X such that:(1) r ≤ p,(2) f = f1 ∗ . . . ∗ fr,(3) f

′= F1 ∗ . . . ∗ Fp,

(4) There are indices 1 ≤ i1 < i2 < . . . < ir ≤ p such that Fij = fj , 1 ≤ j ≤ r and i 6= i1, . . . , ir implies Fi is a trivialloop.

If f, g : [0,m]Z → X are κ-paths such that f(0) = g(0) and f(m) = g(m), then a homotopy

H : [0,m]Z × [0,M ]Z → X

between f and g such that for all t ∈ [0,M ]Z, H(0, t) = f(0) and H(m, t) = f(m), holds the endpoints xed.Two loops f, f0 with the same base point x0 ∈ X belong to the same loop class [f ]X if they have trivial extensions that

can be joined by a homotopy that holds the endpoints xed (see [4]).Let (E, κ) be a digital image and let ε be a positive integer. The κ-neighborhood of e0 ∈ E with radius ε is the set

Nκ(e0, ε) = e ∈ E | lκ(e0, e) ≤ ε ∪ e0,

where lκ(e0, e) is the length of a shortest κ-path from e0 to e in E (see [14]).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

875 Ozgur EGE et al 874-880

Page 98: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

3

Denition 2.6. [6]. Let (E, κ0) and (B, κ1) be digital images. A map p : E → B is called a (κ0, κ1)-covering map if thefollowings are true:1. p is a (κ0, κ1)-continuous surjection.2. for each b ∈ B, there exists an indexing set M such that p−1(b) can be indexed as p−1(b) = ei|i ∈M and the followingconditions hold:• p−1(Nκ1(b, 1)) =

⋃i∈M Nκ0(ei, 1),

• if i, j ∈M , i 6= j, then Nκ0(ei, 1) ∩Nκ0(ej , 1) = ∅,• the restriction map p|Nκ0 (ei,1) : Nκ0(ei, 1)→ Nκ1(b, 1) is a (κ0, κ1)-isomorphism for all i ∈M .

Let (E, κ0), (B, κ1) and (X,κ2) be digital images, let p : E → B be a (κ0, κ1)-covering map, and f : X → B be(κ2, κ1)-continuous. A lifting of f with respect to p is a (κ2, κ0)-continuous function f : X → E such that p f = f (see[14]).

Denition 2.7. [6]. Let (E0, p0, B) be a (κ0, κB)-covering. Suppose C is a set of (κE , κB)-coverings of B such that forevery (E, p,B) ∈ C, there is a (κ0, κE)-covering (E0, pE , E). Then the pair (E0, p0) is a universal covering space of B forthe set C.

Denition 2.8. [21]. Let S be a set of nonempty subset of a digital image (X,κ). Then the members of S are calledsimplexes of (X,κ), if the followings hold:• If p and q are distinct points of s ∈ S, then p and q are κ-adjacent,• If s ∈ S and ∅ 6= t ⊂ s, then t ∈ S.

An m-simplex is a simplex S such that |S| = m + 1. For a digital m-simplex P , if P′is a nonempty proper subset of

P , then P′is called a face of P .

Denition 2.9. [1]. Let (X,κ) be a nite collection of digital m-simplices, 0 ≤ m ≤ d for some non-negative integer d. Ifthe followings hold, then (X,κ) is called a nite digital simplicial complex :• If P belongs to X, then every face of P also belongs to X.• If P,Q ∈ X, then P ∩Q is either empty or a common face of P and Q.

Denition 2.10. [1]. Let (X,κ) ⊂ Zn be a digital oriented simplicial complex with m-dimension. Cκq (X) is a free abeliangroup with basis all digital (κ, q)-simplices in X. A homomorphism ∂q : C

κq (X) −→ Cκq−1(X) called the boundary operator.

If σ = [v0, . . . , vq] is an oriented simplex with 0 < q ≤ m, ∂q is dened by

∂qσ = ∂q[v0, . . . , vq] =

q∑i=0

(−1)i[v0, . . . , vi, . . . , vq]

where vi means the vertex vi is to be deleted from the array.

We remark that for q < 0,m < q, since Cκq (X) is the trivial group, the operator ∂q is the trivial homomorphism forq ≤ 0, m < q. We notice that ∂q−1 ∂q = 0 [1] for q ≥ 0.

Denition 2.11. [1]. Let (X,κ) ⊂ Zn be a digital oriented simplicial complex with m-dimension.• Zκq (X) = Ker ∂q is called the group of digital simplicial q-cycles.• Bκq (X) = Im ∂q+1 is called the group of digital simplicial q-boundaries.• Hκ

q (X) = Zκq (X)/Bκq (X) is called the qth digital simplicial homology group.

3 Nielsen Theory for Digital Images

Let (X,κ) be a digital image and let f : X → X be a digital map. The xed point set of f is Fix(f) = x ∈ X : f(x) = x.The main object of study in topological xed point theory is the minimum number of xed points which is denoted byM [f ] among all digital maps (κ, κ)-homotopic to f . For example, M [f ] = 0 means that there is a digital map g which is(κ, κ)-homotopic to f such that g(x) 6= x for all x ∈ X.

To calculate M [f ] we have to examine the xed point sets of every map homotopic to f . In the xed point theory, it ismade use of a homotopy invariant, called the Nielsen number of f . Its computation requires only a knowledge of the mapf itself.

Denition 3.1. Let f : (X,κ1) −→ (Y, κ2) be a (κ1, κ2)-continuous map where (X,κ1) and (Y, κ2) are digital images.Then f induces homomorphisms f∗ : H

κ1∗ (X) −→ Hκ2

∗ (Y ) and f∗ can be thought of as a homomorphisms of the integers.The integer deg(f) to which the number 1 gets sent is called the degree of the map f .

Denition 3.2. Let (X,κ) be a digital image, A ⊂ X and f : A→ X a digital map. We dene the xed point index of fas ind(f) = deg(F ) where F (x) = x− f(x) and x ∈ X.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

876 Ozgur EGE et al 874-880

Page 99: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

4

Some properties of xed point index can be given as follows. We don't prove these because they are proved similarly inAlgebraic Topology.

1. (Homotopy invariance) Let A ⊂ X × [0,m]Z be digital image with κ-adjacency and F : A→ X be a digital map suchthat

Fix(F ) = (x, t) ∈ A : F (x, t) = x.Then ind(f0) = ind(fm), where ft = F (−, t) for 0 ≤ t < m and a positive integer m.

2. (Commutativity) Let (X,κ1) and (Y, κ2) be digital images and let f : A → Y and g : B → X be digital (κ1, κ2)-continuous maps, respectively, where A ⊂ X, B ⊂ Y . Then Fix(gf) = Fix(fg) and ind(fg) = ind(gf).

Now we dene Nielsen number for digital images.

Denition 3.3. Let (X,κ) be a digital image and f : (X,κ) → (X,κ) a self-map. Two xed points x, y ∈ Fix(f) areNielsen related if and only if there is a κ-path c : [0,m]Z → X satisfying c(0) = x, c(m) = y and the κ-paths c, f c arexed end point homotopic, i.e. there is a digital map H : [0, n]Z × [0,m]Z → X satisfying

H(t, 0) = c(t), H(t,m) = f c(t), H(0, s) = x, H(n, s) = y.

This is an equivalence relation, hence Fix(f) splits into disjoint Nielsen classes. A xed point class F is essential if itsindex is nonzero. The number of essential xed point classes is called the Nielsen number of f , denoted N(f).

We give some characteristic examples about the Nielsen number.

Example 3.4. Let (X,κ) be a digital image. If f : X → X is a constant digital map, then N(f) = 1.

Since the boundary Bd(In+1) of an (n+1)-cube In+1 is homeomorphic to n-sphere Sn, we can represent a digital sphereby using the boundary of a digital cube. Boxer [5] denes sphere-like digital image as Sn = [−1, 1]n+1

Z \ 0n+1 ⊂ Zn+1,where 0n denotes the origin of Zn.

Example 3.5. S1 = c0 = (1, 0), c1 = (1, 1), c2 = (0, 1), c3 = (−1, 1), c4 = (−1, 0), c5 = (−1,−1), c6 = (0,−1), c7 =(1,−1) is digital 1-sphere with 4-adjacency in Z2. Let f : (S1, 4) → (S1, 4) be a digital map of degree 1. Then f can beconsidered as identity map and is (4, 4)-homotopic to a xed point free map. Thus we have N(f) = 0.

Let's give some important properties of Nielsen number for digital images.

Theorem 3.6. Let (X,κ) be any digital image. If f '(κ,κ) g : X → X, then N(f) = N(g).

Proof. We must show that there is a bijection between sets of essential classes of f and g. Let H(t, s) be a digital (κ, κ)-

homotopy from f and g. For every Nielsen class A ⊂ Fix(f), there is one A′⊂ Fix(H) containing A. Let

B = x ∈ X | (x,m) ∈ A′.

So B is a Nielsen class of g or is empty. From homotopy invariance index property, we have ind(f,A) = ind(g,B). If A isessential, then B is essential. As a result, we nd a map from the set of essential classes of f to the set of essential classesof g.

On the other hand, H(x,m− t) gives the inverse map. Consequently, we get N(f) = N(g).

Theorem 3.7. Let (X,κ) be a digital image and f : X → X be a digital map. Any digital map g digital (κ, κ)-homotopicto f has at least N(f) xed points.

Proof. Using Theorem 3.6, we have N(f) = N(g). Since each essential Nielsen class of g is nonempty, we get M [g] ≥ N(g)where

M [g] = min#Fixg | g '(κ,κ) f : X → X.

Theorem 3.8. Let (X,κ) and (Y, κ′) be any digital images, f : X → Y and g : Y → X be digital maps. Then N(g f) =

N(f g).

Proof. For digital maps f and g, if we use commutativity property of xed point index, i.e. Fix(f g) = Fix(g f) andind(f g) = ind(g f), we have a bijection which preserves index between the sets of essential Nielsen classes. As a result,we have N(g f) = N(f g).

Lemma 3.9. Let A ⊂ X be digital image with κ-adjacency and f : X → X be digital map such that f(X) ⊂ A, where Xis any digital image with κ-adjacency. If fA : A→ A is the restriction of f , then N(fA) = N(f).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

877 Ozgur EGE et al 874-880

Page 100: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

5

Proof. Let i : A→ X be inclusion map. Assume that g : X → A is given by g(x) = f(x). Using Theorem 3.8, we conclude

N(f) = N(i g) = N(g i) = N(fA)

because i g = f and g i = fA.

Theorem 3.10. Let (X,κ) and (Y, κ′) be any two digital images. Suppose that h : X → Y is a digital (κ, κ

′)-homotopy

equivalence and let the diagram

Xf //

h

X

h

Y

g// Y

be digital (κ, κ′)-homotopy commutative, i.e. h f '(κ,κ

′) g h. Then N(f) = N(g).

Proof. Assume that the digital (κ′, κ)-homotopy inverse of h is m : Y → X. Then m h '(κ,κ) 1X and h m '(κ

′,κ

′) 1Y .

By Theorem 3.6 and Theorem 3.8, we have

N(f) = N(f(mh)) = N((fm)h) = N(h(fm))

= N((hf)m)

= N((gh)m)

= N(g(hm))

= N(g).

Theorem 3.11. Let (X,κ) be a digital image and f : (X,κ) → (X,κ) be a digital map. N(f) is a lower bound for thenumber of xed points in the homotopy class of f , i.e.

0 ≤ N(f) ≤M [f ] := min#Fixg | g '(κ,κ) f : X → X.

Proof. By the denition of Nielsen number, we have N(f) ≥ 0. On the other hand, since we know that each Nielsen classcontains at least one xed point of f , we conclude that 0 ≤ N(f) ≤M [f ].

4 Nielsen Theory and Digital Universal Covering Spaces

Since there is a connection between the digital fundamental group and the digital universal covering of a space, same resultscan be also obtained by the lifts of the considered maps to the digital universal coverings. Let (X,κ) be a digital image andp : X → X be the digital universal covering of X, with group π of covering transformations. Let f : X → X be a lifting off , i.e., have a commutative diagram

Xf //

p

X

p

X

f// X

If f′is another lifting of f , then f

′= α f for some α ∈ π. The set of all liftings of f is α f | α ∈ π.

For any α ∈ π, f α is a lifting of f and so we have α′ f = f α for some α

′∈ π. This denes a homomorphism

ϕ : π → π given by ϕ(α) = α′. Dene the Reidemeister action of π on π as follows:

π × π → π

(γ, α) 7→ γαϕ(γ)−1,

where γ, α ∈ π. This denes an equivalence relation. We say that the Reidemeister classes of its equivalence classes. Theset of the Reidemeister classes determined by ϕ is denoted by R[ϕ] = [α] | α ∈ π.

Theorem 4.1. Let (X,κ) be a digital image, f : X → X be a digital map and f : X → X be a lifting of f . Then [α] = [α′]

if and only if p(Fix(α f)) = p(Fix(α′ f)), where p : X → X is a digital covering map of f and α, α

′∈ π.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

878 Ozgur EGE et al 874-880

Page 101: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

6

Proof. For necessary condition, since the xed point sets of any two digital homotopic maps are same, we conclude that

[α] = [α′]⇒ α '(κ,κ) α

⇒ α f '(κ,κ) α′ f

⇒ Fix(α f) = Fix(α′ f)

⇒ p(Fix(α f)) = p(Fix(α′ f)).

For sucient condition, let a ∈ p(Fix(α f)) = p(Fix(α′ f)). Then we have p(a) = a and p(a′) = a. Moreover, we get

α f(a) = a = 1X(a) and α′ f(a) = a′ = 1X(a′)

Finally, we can say

α(f(a)) = α′(f(a)) ⇒ α = α

′⇒ α '(κ,κ) α

′,

where a is any point of X. As a result, we have [α] = [α′].

Corollary 4.2. If p(Fix(αf)) is any xed point class, then

Fix(f) =∐

[α]∈R[ϕ]

p(Fix(αf)),

where [α] is a Reidemeister class.

Lemma 4.3. Let (X,κ), (X, κ) be digital images, f : X → X be a digital map and f : X → X be any lifting of f . Thenany two points in p(Fix(f)) ⊂ Fix(f) are Nielsen related. We have also

Fix(f) =⋃˜f′

p(Fix(f ′))

where f ′ is a lifting of f .

Proof. Let a and b be any two points in p(Fix(f)). We say that

p(a) = a, p(b) = b, f(a) = a, f(b) = b,

for some a, b ∈ Fix(f). We denote a κ-path from a to b in X by θ. There is a digital homotopy H such that

H : X × [0,m]Z → X

H(x, 0) = θ and H(x,m) = f θbecause X is κ-connected digital image. Then we have p H = H : X × [0,m′]Z → X is a digital homotopy between twoκ-paths

θ = p θ and f θ = p (f θ)which join two points a, b ∈ Fix(f). As a result, a and b are Nielsen related points.

Now we prove the latter statement. Let u ∈ Fix(f) and u ∈ p−1(u). Then f(u) = u and p−1(u) = u. Moreover,

f ′(u) = u because f ′ is a lifting of f . We can say the following result.

f ′(u) = u ⇒ p f ′(u) = p(u) = u ⇒ u ∈ p(Fix(f ′)).

Consequently, we have Fix(f) =⋃˜f′

p(Fix(f ′)).

Let p : X → X be a digital universal covering map. Let

OX = α ∈ X → X : p α = p

denote the group of deck transformations of this digital covering map.

Lemma 4.4. Let C be the set of liftings of f and f , f ′ ∈ C. If p(Fix(f)) = p(Fix(f ′)) 6= ∅, then there is an α ∈ OX such

that α f = f ′ α.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

879 Ozgur EGE et al 874-880

Page 102: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

7

Proof. If p(Fix(f)) = p(Fix(f ′)) 6= ∅, then there are two points x, x′ such that p(x) = p(x′) where

x ∈ Fix(f) ⇒ f(x) = x and x′ ∈ Fix(f ′) ⇒ f ′(x′) = x′ .

Since α ∈ OX , i.e. p α = p, we have α(x) = x′ . We conclude that

f ′ α(x) = f ′(x′) = x′ = α(x) = α(f(x)) = α f(x).

As a result, we have αf = f ′α.

Lemma 4.5. Let f ′ = αfα−1 for an α ∈ OX . Then p(Fix(f)) = p(Fix(f ′)).

Proof. By assumption, we have p(α(x)) = p(x). If u ∈ p(Fix(f)), then p(x) = u and f(x) = x. Since

p f(x) = u ⇒ p α−1 f ′ α(x) = p f ′(x′) = u,

we have u ∈ p(Fix(f ′)). As a result, p(Fix(f)) = p(Fix(f ′)).

5 Conclusion

The essential aim of this paper is to determine xed point properties for a digital image. This work can play an importantrole in digital images because Nielsen theory gives an information about the number of xed points of a map. Since theNielsen number is a powerful invariant in digital images, we think that this work will be useful for xed point theory,especially Nielsen theory.

References

[1] H. Arslan, I. Karaca and A. Oztel, Homology groups of n-dimensional digital images, XXI. Turkish National Mathe-matics Symposium, B, 113 (2008).

[2] L. Boxer, Digitally continuous functions, Pattern Recognition Letters, 15, 833839 (1994).

[3] L. Boxer, A classical construction for the digital fundamental group, Journal of Mathematical Imaging and Vision, 10,5162 (1999).

[4] L. Boxer, Properties of digital homotopy, Journal of Mathematical Imaging and Vision, 22, 1926 (2005).

[5] L. Boxer, Homotopy properties of sphere-like digital images, Journal of Mathematical Imaging and Vision, 24, 167175(2006).

[6] L. Boxer, Digital products, wedges and covering spaces, Journal of Mathematical Imaging and Vision, 25, 159171(2006).

[7] L. Boxer and I. Karaca, The classication of digital covering spaces, Journal of Mathematical Imaging and Vision, 32,2329 (2008).

[8] L. Boxer and I. Karaca, Some properties of digital covering spaces, Journal of Mathematical Imaging and Vision, 37,1726 (2010).

[9] L. Boxer, I. Karaca, A. Oztel, Topological invariants in digital images, Journal of Mathematical Sciences: Advancesand Applications, 11(2), 109140 (2011).

[10] R.F. Brown, Retraction methods in Nielsen xed point theory, Pacic Journal of Mathematics, 115(2), 277297(1984).

[11] R.F. Brown, Nielsen xed point theory on manifolds, Banach Center Publications, 49(1), 1927 (1999).

[12] R.F. Brown, M. Furi, L. Gorniewicz and B. Jiang, Handbook of Topological Fixed Point Theory, Springer (2005).

[13] O. Ege and I. Karaca, Fundamental properties of simplicial homology groups for digital images, American Journal ofComputer Technology and Application, 1(2), 2542 (2013).

[14] S.E. Han, Non-product property of the digital fundamental group, Information Sciences, 171, 7391 (2005).

[15] G.T. Herman, Oriented surfaces in digital spaces, CVGIP:Graphical Models and Image Processing, 55, 381396 (1993).

[16] J. Jezierski, The Nielsen number product formula for coincidence, Fund. Math., 134, 183212 (1989).

[17] J. Jezierski and W. Marzantowicz, Homotopy Methods in Topological Fixed and Periodic Points Theory, Springer(2006).

[18] B. Jiang, Estimation of the Nielsen numbers, Chinese Math., 5, 330339 (1964).

[19] B. Jiang, Lectures on Nielsen xed point theory, Contemp. Math., 14 (1983).

[20] I. Karaca and O. Ege, Some results on simplicial homology groups of 2D digital images, International Journal ofInformation and Computer Science, 1(8), 198203 (2012).

[21] E. Spanier, Algebraic Topology, McGraw-Hill, New York (1966).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

880 Ozgur EGE et al 874-880

Page 103: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

A FIXED POINT THEOREM AND STABILITY OF

ADDITIVE-CUBIC FUNCTIONAL EQUATIONS IN MODULAR

SPACES

CHANG IL KIM, GILJUN HAN∗, AND SEONG-A SHIM

Abstract. In this paper, we investigate a fixed point theorem for a mapping

without the condition of bounded orbit in a modular space, whose inducedmodular is lower semi-continunous. Using this fixed point theorem, we prove

the generalized Hyers-Ulam stability for an additive-cubic functional equation

in modular spaces without 42-conditions and the convexity.

1. Introduction and preliminaries

The question of stability for a generic functional equation was originated in 1940by Ulam [14]. Concerning a group homomorphism, Ulam posted the question ask-ing how likely to an automorphism a function should behave in order to guaranteethe existence of an automorphism near such functions. Hyers [3] gave the first affir-mative partial answer to the question of Ulam for Banach spaces. Hyers’ theoremwas generalized by Aoki [1] for additive mappings and by Rassias [12] for linearmappings by considering an unbounded Cauchy difference, the latter of which hasinfluenced many developments in the stability theory. This area is then referred toas the generalized Hyers-Ulam stability. In 1994, P. Gavruta [2] generalized thesetheorems for approximate additive mappings controlled by the unbounded Cauchydifference with regular conditions.

A problem that mathematicians has dealt with is ”how to generalize the classicalfunction space Lp”. A first attempt was made by Birnhaum and Orlicz in 1931. Thisgeneralization found many applications in differential and intergral equations withkernls of nonpower types. The more abstract generalization was given by Nakano[10] in 1950 based on replacing the particular integral form of the functional byan abstract one that satisfies some good properties. This functional was calledmodular. This idea was refined, generalized by Musielak and Orlicz [8] in 1959 andstudied by many authors ([4], [7], [11], [19]).

Recently, Sadeghi [13] presented a fixed point method to prove the general-ized Hyers-Ulam stability of functional equations in modular spaces with the 42-condition and Wongkum, Chaipunya, and Kumam [15] proved the fixed point theo-rem and the generalized Hyers-Ulam stability for quadratic mappings in a modularspace whose modular is convex, lower semi-continuous but do not satisfy the 42-condition.

2010 Mathematics Subject Classification. 39B52, 39B72, 47H09.Key words and phrases. fixed point theorem, stability, additive-cubic functional equation,

modular space.* Corresponding author.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

881 CHANG IL KIM et al 881-893

Page 104: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

2 CHANG IL KIM, GILJUN HAN, AND SEONG-A SHIM

In this paper, we investigate a fixed point theorem in modular spaces, whoseinduced modular is lower semi-continuous, for a mapping with some conditionsin place of the condition of bounded orbit and using this fixed point theorem,we will prove the generalized Hyers-Ulam stability for the following additive-cubicfunctional equation

(1.1) f(2x+ y) + f(2x− y)− 2f(x+ y)− 2f(x− y)− 2f(2x) + 4f(x) = 0

in modular spaces without 42-conditions and the convexity.In fact, the equation (1.1) has been studied in various spaces. For example, in

quasi-Banach spaces ([9]), in F-spaces ([16]), in non-Archimedean fuzzy normedspaces ([17]), and in intuitionistic fuzzy normed spaces ([18]), etc. Unlike Banachspaces and F-spaces, due to the absence of the triangle inequality in modular spaces,we need subtle caculations in the proofs of Lemma 1.4 and Theorem 2.2.

Definition 1.1. Let X be a vector space over a field K(R or C).(1) A generalized functional ρ : X −→ [0,∞] is called a modular if

(M1) ρ(x) = 0 if and only if x = 0,(M2) ρ(αx) = ρ(x) for every scalar α with |α| = 1, and(M3) ρ(αx + βy) ≤ ρ(x) + ρ(y) for all x, y ∈ X and for all nonnegative real

numbers α, β with α+ β = 1.(2) If (M3) is replaced by

(M4) ρ(αx+ βy) ≤ αρ(x) + βρ(y)for all x, y ∈ X and for all nonnegative real numbers α, β with α+ β = 1, then wesay that ρ is a convex modular.

Remark 1.2. Let ρ be a modular on a vector space X. Then by (M1) and (M3),we can easily show that for any positive real number δ with δ < 1,

ρ(δx) ≤ ρ(x)

for all x ∈ X.

For any modular ρ on X, the modular space Xρ is defined by

Xρ := x ∈ X | ρ(λx)→ 0 as λ→ 0.

Let Xρ be a modular space and let xn be a sequence in Xρ. Then (i) xnis called ρ-convergent to a point x ∈ Xρ if ρ(xn − x) → 0 as n → ∞, (ii) xn iscalled ρ-Cauchy if for any ε > 0, there is a k ∈ N such that ρ(xn − xm) < ε forall m,n ∈ N with n,m ≥ k, and (iii) a subset K of Xρ is called ρ-complete if eachρ-Cauchy sequence is ρ-convergent to an element of K.

Another unnatural behavior one usually encounter is that the convergence of asequence xn to x does not imply that cxn converges to cx for some c ∈ K.Thus, many mathematicians imposed some additional conditions for a modular tomeet in order to make the multiples of xn converge naturally. Such preferencesare referred to mostly under the term related to the 42-conditions.

A modular space Xρ is said to satisfy the 42-condition if there exists k ≥ 2 suchthat ρ(2x) ≤ kρ(x) for all x ∈ Xρ. Some authors varied the notion so that onlyk > 0 is required and called it the 42-type condition. In fact, one may see thatthese two notions coincide. There are still a number of equivalent notions relatedto the 42-conditions.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

882 CHANG IL KIM et al 881-893

Page 105: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

A FIXED POINT THEOREM AND STABILITY OF ADDITIVE-CUBIC... 3

In [5], Khamsi proved a series of fixed point theorems in modular spaces where themodulars do not satisfy 42-conditions. His results exploit one unifying hypothesisin which the boundedness of an orbit is assumed.

Lemma 1.3. (see [5]) Let Xρ be a modular space whose induced modular is lowersemi-continuous and let C ⊆ Xρ be a ρ-complete subset. If T : C −→ C is aρ-contraction, that is, there is a constant L ∈ [0, 1) such that

ρ(Tx− Ty) ≤ Lρ(x− y), ∀x, y ∈ C

and T has a bounded orbit at a point x0 ∈ C, that is,

supρ(Tnx0 − Tmx0) | n,m ∈ N ∪ 0 <∞

then the sequence Tnx0 is ρ-convergent to a point w ∈ C.

Now, we will prove a fixed point theorem in modular spaces where the map Tdo not assume to be the boundedness of an orbit. Our results exploit one unifyinghypothesis in which some conditions are assumed.

Lemma 1.4. Let Xρ be a modular space whose induced modular is lower semi-continuous and let C ⊆ Xρ be a ρ-complete subset. Let T : C −→ C be a mappingsuch that

(1.2) 2Tx = T2x, ∀x ∈ C.

Suppose that there is a constant L ∈ [0, 1) with

(1.3) ρ(2Tx− 2Ty) ≤ Lρ(x− y), ∀x, y ∈ C

and ρ(Txo − xo) < ∞ at xo ∈ C. Then the sequence Tn x0

4 is ρ-convergent tosome point w ∈ C and

(1.4) ρ(x04− w) ≤ 2

1− Lρ(Tx0 − x0).

Proof. By (M1) and (M3), we have ρ(Tx− Ty) ≤ ρ(2Tx − 2Ty) and so, by (1.3),T is a ρ-contration. Hence we have

ρ(1

2T 2x0 −

1

2x0) ≤ ρ(T 2x0 − Tx0) + ρ(Tx0 − x0)

≤ (L+ 1)ρ(Tx0 − x0).

Let Gx = 2Tx for all x ∈ C. By (1.3), we have

ρ(1

2Tnx0 −

1

2x0) ≤ ρ(Tnx0 − Tx0) + ρ(Tx0 − x0)

= ρ(1

2G(Tn−1x0)− 1

2Gx0

)+ ρ(Tx0 − x0)

≤ Lρ(1

2Tn−1x0 −

1

2x0

)+ ρ(Tx0 − x0)

for all n ∈ N with n ≥ 2 and by induction, we have

ρ(1

2Tnx0 −

1

2x0) ≤ Σn−1k=0L

kρ(Tx0 − x0) ≤ 1

1− Lρ(Tx0 − x0)

for all n ∈ N. For any non-negative integers m,n with m > n,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

883 CHANG IL KIM et al 881-893

Page 106: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

4 CHANG IL KIM, GILJUN HAN, AND SEONG-A SHIM

ρ(1

4Tnx0 −

1

4Tmx0) ≤ ρ(

1

2Tnx0 −

1

2x0) + ρ(

1

2Tmx0 −

1

2x0)

≤ 2

1− Lρ(Tx0 − x0).

(1.5)

By (1.2), T has a bounded orbit at a point x0

4 ∈ C and thus by Lemma 1.3, Tn x0

4 is ρ-convergent to a point ω ∈ C. Since ρ is lower semi-continuous, by taking n = 0and m→∞ in (1.5), we have (1.4).

If ρ is convex, then Lemma 1.4 can be replaced by the following lemma.

Lemma 1.5. All conditions in Lemma 1.4 are assumed. Suppose that ρ is convexand 0 ≤ L < 2. Then the sequence Tn x0

4 is ρ-convergent to some point w ∈ Cand

(1.6) ρ(x04− w) ≤ 1

2− Lρ(Tx0 − x0).

Proof. By (M1) and (M4), we have ρ(Tx − Ty) ≤ 12ρ(2Tx − 2Ty) and since 0 ≤

L < 2, by (1.3), T is a ρ-contration. Hence by (M4), we have

ρ(1

2T 2x0 −

1

2x0) ≤ 1

2ρ(T 2x0 − Tx0) +

1

2ρ(Tx0 − x0)

≤ (1

4L+

1

2)ρ(Tx0 − x0).

Let Gx = 2Tx for all x ∈ C. By (1.3), we have

ρ(1

2Tnx0 −

1

2x0) ≤ 1

2ρ(Tnx0 − Tx0) +

1

2ρ(Tx0 − x0)

= ρ(1

2G(Tn−1x0)− 1

2Gx0

)+

1

2ρ(Tx0 − x0)

≤ 1

2Lρ(1

2Tn−1x0 −

1

2x0

)+

1

2ρ(Tx0 − x0)

for all n ∈ N with n ≥ 2 and by induction, we have

ρ(1

2Tnx0 −

1

2x0) ≤ Σn−1k=0

Lk

2k+1ρ(Tx0 − x0) ≤ 1

2− Lρ(Tx0 − x0)

for all n ∈ N. For any non-negative integers m,n with m > n,

ρ(1

4Tnx0 −

1

4Tmx0) ≤ 1

2ρ(

1

2Tnx0 −

1

2x0) +

1

2ρ(

1

2Tmx0 −

1

2x0)

≤ 1

2− Lρ(Tx0 − x0).

The rest of the proof is similar to Lemma 1.4.

Let ρ be a modular on X, V a linear space. Define a set M by

M := g : V −→ Xρ | g(0) = 0and a generalized function ρ on M by

ρ(g) := infc > 0 | ρ(g(x)) ≤ cψ(x, x), ∀x ∈ V ,for each g ∈M, where ψ : V 2 −→ [0,∞) a mapping. Then M is a linear space, ρ isa modular on M. Furthermore, if ρ is convex, then ρ is also convex([15]).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

884 CHANG IL KIM et al 881-893

Page 107: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

A FIXED POINT THEOREM AND STABILITY OF ADDITIVE-CUBIC... 5

Lemma 1.6. Let V be a linear space, Xρ a ρ-complete modular space, where ρ islower semi-continuous and f : V −→ Xρ a mapping with f(0) = 0. Let ψ : V 2 −→[0,∞) be a mapping. Then we have the following :

(1) Mρ = M and Mρ is ρ-complete.(2) ρ is lower semi-continuous.

Proof. (1) By the definition of Mρ, Mρ = M. Let ε > 0 be given. Take any ρ-Cauchy sequence gn in Mρ. Then there is an l ∈ N such that for n,m ∈ N withn,m ≥ l,

(1.7) ρ(gn(x)− gm(x)) ≤ εψ(x, x)

for all x ∈ V . Hence gn(x) is a ρ-Cauchy sequence in Xρ for all x ∈ X. Since Xρ

is ρ-complete, there is a mapping g : V −→ Xρ such that ρ(gn(x)− g(x)) −→ 0 asn −→∞ for all x ∈ X. Then there is an m ∈ N such that

ρ(gm(0)− g(0)) = ρ(g(0)) ≤ ε

and hence g ∈Mρ. Since ρ is a lower semi-continuous, by (1.7), we have

ρ(gn(x)− g(x)) ≤ lim infm−→∞

ρ(gn(x)− gm(x)) ≤ εψ(x, x)

for all x ∈ X. Hence Mρ is ρ-complete.(2) Suppose that gn is a sequence in Mρ which is ρ-convergent to g ∈Mρ. Let

ε > 0. Then for any n ∈ N, there is a positive real number cn such that

ρ(gn) ≤ cn ≤ ρ(gn) + ε

and so

ρ(g(x)) ≤ lim infn→∞

ρ(gn(x)) ≤ lim infn→∞

cnψ(x, x) ≤(

lim infn→∞

ρ(gn(x)) + ε)ψ(x, x)

for all x ∈ X. Hence ρ is lower semi-continuous.

2. The generalized Hyers-Ulam stability for (1.1) in modular spaces

Throughout this section, we assume that every modular is lower semi-continuous.In this section, we will prove the generalized Hyers-Ulam stability for (1.1) by usingour fixed point theorem. We can easily show the following lemma.

Lemma 2.1. Let X and Y be vector spaces. Let f : X −→ Y satisfies (1.1) andf(0) = 0. Then we have :

(1) f is additive if and only if f(2x) = 2f(x) for all x ∈ X.(2) f is cubic if and only if f(2x) = 8f(x) for all x ∈ X.

For any mapping g : X −→ Y , let

ga(x) =1

4(g(2x)− 8g(x)), gc(x) = g(2x)− 2g(x)

and

Dg(x, y) = g(2x+ y) + g(2x− y)− 2g(x+ y)− 2g(x− y)− 2g(2x) + 4g(x).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

885 CHANG IL KIM et al 881-893

Page 108: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

6 CHANG IL KIM, GILJUN HAN, AND SEONG-A SHIM

Theorem 2.2. Let V be a linear space, Xρ a ρ-complete modular space. Supposethat f : V −→ Xρ satisfies f(0) = 0 and

(2.1) ρ(Df(x, y)) ≤ φ(x, y)

for all x, y ∈ V , where φ : V 2 −→ [0,∞) is a mapping such that

(2.2) φ(2x, 2y) ≤ Lφ(x, y)

for some L with 0 ≤ L < 1 and for all x, y ∈ V . Then there exists a uniqueadditive-cubic mapping F : V −→ Xρ such that

(2.3) ρ(F (x)− 3

16f(x)) ≤ 4

1− Lψ(x, x)

for all x ∈ V , where ψ(x, y) = φ(x, 2y) + φ(x, y) + φ(0, y).

Proof. Let ψ(x, y) = φ(x, 2y) + φ(x, y) + φ(0, y). Then by Lemma 1.6, Mρ = M isρ-complete and ρ is lower semi-continuous.

Define Ta : Mρ −→ Mρ by Tag(x) = 12g(2x) for all g ∈ Mρ and all x ∈ V . Let

g, h ∈ Mρ. Suppose that ρ(g − h) ≤ c for some positive real number c. Then by(2.3) and Remark 1.2, we have

ρ(Tag(x)− Tah(x)) ≤ ρ(g(2x)− h(2x)) ≤ Lcψ(x, x)

for all x ∈ V and so ρ(Tag − Tah) ≤ Lρ(g − h). Hence Ta is a ρ-contraction. By(2.1), we get

(2.4) ρ(f(x) + f(−x)) ≤ φ(0, x),

(2.5) ρ(f(3x)− 4f(2x) + 5f(x)) ≤ φ(x, x),

and

(2.6) ρ(f(4x)− 2f(3x)− 2f(2x)− 2f(−x) + 4f(x)) ≤ φ(x, 2x),

for all x ∈ V . By (2.4), (2.5), and (2.6), we obtain

ρ(Tafa(x)− fa(x)) = ρ(1

2fa(2x)− fa(x)) ≤ φ(x, 2x) + φ(x, x) + φ(0, x) = ψ(x, x)

for all x ∈ V and hence we have

(2.7) ρ(Tafa − fa) ≤ 1.

Let Gg = 2Tag for all g ∈Mρ. Then

Gg(x) = g(2x)

for all g ∈ Mρ and for all x ∈ V . Suppose that ρ(g − h) ≤ c for some positive realnumber c, where g, h ∈ Mρ. Then ρ(g(x) − h(x)) ≤ cψ(x, x) for all x ∈ V and by(2.2), we have

ρ(Gg(x)−Gh(x)) = ρ(g(2x)− h(2x)) ≤ cψ(2x, 2x) ≤ cLψ(x, x)

for all x ∈ V . Hence ρ(Gg −Gh) ≤ cL and so

ρ(Gg −Gh) ≤ Lρ(g − h).

Since Ta is linear, by Lemma 1.4, there is an A ∈ Mρ such that Tnafa4 is ρ-

convergent to A. In fact, we get

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

886 CHANG IL KIM et al 881-893

Page 109: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

A FIXED POINT THEOREM AND STABILITY OF ADDITIVE-CUBIC... 7

(2.8) limn→∞

ρ(1

2n+2fa(2nx)−A(x)) = 0

for all x ∈ V . Since ρ is lower semi-continuous, we get

ρ(TaA−A) ≤ lim infn→∞

ρ(TaA− Tn+1a

fa4

) ≤ lim infn→∞

Lρ(A− Tnafa4

) = 0

and hence A is a fixed point of Ta in Mρ. Replacing x and y by 2nx and 2ny in(2.1), respectively, by (2.2), we have

ρ(1

2n+2Dfa(2nx, 2ny))

≤ ρ(1

2n+3Df(2n+1x, 2n+1y)) + ρ(

1

2nDf(2nx, 2ny))

≤ Ln+1φ(x, y) + Lnφ(x, y)

for all x, y ∈ V and for all n ∈ N. Hence we get

(2.9) limn→∞

ρ( 1

2n+2Dfa(2nx, 2ny)

)= 0

for all x, y ∈ V . Note that

ρ( 1

2n+10Dfa(2nx, 2ny)− 1

28DA(x, y)

)≤ ρ( 1

2n+9fa(2n(2x+ y))− 1

27A(2x+ y)

)+ ρ( 1

2n+8fa(2n(2x− y))− 1

26A(2x− y)

)+ ρ( 1

2n+72fa(2n(x+ y))− 1

252A(x+ y)

)+ ρ( 1

2n+62fa(2n(x− y))− 1

242A(x− y)

)+ ρ( 1

2n+52fa(2n2x)− 1

232A(2x)

)+ ρ( 1

2n+52fa(2n(x− y))− 1

234A(x− y)

)for all x, y ∈ V and for all n ∈ N. Hence we have

(2.10) limn→∞

ρ( 1

2n+10Dfa(2nx, 2ny)− 1

28DA(x, y)

)= 0

for all x, y ∈ V . Since

ρ( 1

29DA(x, y)

)≤ ρ( 1

2n+10Dfa(2nx, 2ny)− 1

28DA(x, y)

)+ρ( 1

2n+10Dfa(2nx, 2ny)

)for all x, y ∈ V and for all n ∈ N, by (2.9) and (2.10), we get

(2.11) DA(x, y) = 0

for all x, y ∈ V . By (1.4) in Lemma 1.4, we get

(2.12) ρ(A− 1

4fa) ≤ 2

1− L.

Define Tc : Mρ −→ Mρ by Tcg(x) = 18g(2x) for all g ∈ Mρ and all x ∈ V . By

(2.4), (2.5), and (2.6), we obtain

ρ(1

23fc(2x)− fc(x)) ≤ ψ(x, x)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

887 CHANG IL KIM et al 881-893

Page 110: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

8 CHANG IL KIM, GILJUN HAN, AND SEONG-A SHIM

for all x ∈ V and hence

(2.13) ρ(Tcfc − fc) ≤ 1.

Let Hg = 2Tcg for all g ∈Mρ. Then

Hg(x) =1

4g(2x).

for all g ∈ Mρ and for all x ∈ V . Let g, h ∈ Mρ. Suppose that ρ(g − h) ≤ c forsome positive real number c. Then ρ(g(x)− h(x)) ≤ cψ(x, x) for all x ∈ V and by(2.3), we get

ρ(Hg(x)−Hh(x)) = ρ(1

4g(2x)− 1

4h(2x)) ≤ cψ(2x, 2x) ≤ cLψ(x, x)

for all x ∈ V . Hence ρ(Hg −Hh) ≤ cL and so

ρ(Hg −Hh) ≤ Lρ(g − h).

Since Tc is linear, by Lemma 1.4, there is a C ∈ Mρ such that Tnc 14fc is ρ-

convergent to C. Since ρ is lower semi-continuous, we get

ρ(TcC − C) ≤ lim infn→∞

ρ(TcC − Tn+1c

1

4fc) ≤ lim inf

n→∞Lρ(C − Tnc

1

4fc) = 0

and hence C is a fixed point of Tc in Mρ. Replacing x and y by 2nx and 2ny in(2.1), respectively, by (2.2), we have

ρ(1

23n+2Dfc(2

nx, 2ny))

≤ ρ(1

23n+1Df(2n+1x, 2n+1y)) + ρ(

1

23nDf(2nx, 2ny))

≤ Ln+1φ(x, y) + Lnφ(x, y)

for all x, y ∈ V . Hence we get

limn→∞

ρ( 1

23n+2Dfc(2

nx, 2ny))

= 0

for all x, y ∈ V . Similar to A, we have

(2.14) DC(x, y) = 0

for all x, y ∈ V and by (1.4) in Lemma 1.4, we get

ρ(C(x)− 1

4fc(x)) ≤ 2

1− Lψ(x, x)

for all x ∈ X. Hence we have

(2.15) ρ(C − 1

4fc) ≤

2

1− L.

Let F = 18C −

12A. Since A is a fixed point of Ta, A(2x) = 2A(x) for all x ∈ X

and similarly, C(2x) = 8C(x) for all x ∈ X. By Lemma 2.1, A is additive and Cis cubic. Hence F is an additive-cubic mapping. Since f(x) = 1

6fc(x)− 23fa(x), we

have

ρ(F − 3

16f) ≤ ρ(A− 1

4fa) + ρ(

1

4C − 1

16fc) ≤ ρ(A− 1

4fa) + ρ(C − 1

4fc),

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

888 CHANG IL KIM et al 881-893

Page 111: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

A FIXED POINT THEOREM AND STABILITY OF ADDITIVE-CUBIC... 9

and hence by (2.12) and (2.15), we have (2.3).To prove the uniquness of F , let K : V −→ Xρ be another additive-cubic map-

ping with (2.3). By (2.3), we get

ρ(1

4K(x)− 1

4F (x)) ≤ ρ(K(x)− 3

16f(x)) + ρ(F (x)− 3

16f(x)))

≤ 8

1− Lψ(x, x)

for all x ∈ V and so

ρ(1

16Ka(x)− 1

16Fa(x)) ≤ ρ(

1

32K(2x)− 1

32F (2x)) + ρ(

1

4K(x)− 1

4F (x)))

≤ 8(1 + L)

1− Lψ(x, x)

for all x ∈ V . Since Fa and Ka are fixed points of Ta, we have

ρ(1

16Ka(x)− 1

16Fa(x)) = ρ(

1

16TnaKa(x)− 1

16Tna Fa(x))

≤ 8(1 + L)

1− LLnψ(x, x)

for all x ∈ V and for all n ∈ N. Letting n → ∞ in the last inequality, we haveFa = Ka and similarly, we have Fc = Kc. Thus F = K.

Comparing the results in a modular and a convex modular, we may see that thecoefficient in the case of convex modular is smaller.

Theorem 2.3. Suppose that every assumption of Theorem 2.2 holds, ρ is convexand 0 ≤ L < 2. Then there exists a unique additive-cubic mapping F : V −→ Xρ

such that

(2.16) ρ(F (x)− 3

16f(x)) ≤ 5

32(2− L)ψ(x, x)

for all x ∈ V , where ψ(x, y) = φ(x, 2y) + φ(x, y) + φ(0, y).

Proof. Define Ta : Mρ −→ Mρ by Tag(x) = 12g(2x) for all g ∈ Mρ and all x ∈ V .

Let g, h ∈ Mρ. Suppose that ρ(g − h) ≤ c for some positive real number c. Thenby (2.3) and (M4), we have

ρ(Tag(x)− Tah(x)) ≤ 1

2ρ(g(2x)− h(2x)) ≤ 1

2Lcψ(x, x)

for all x ∈ V and so ρ(Tag − Tah) ≤ 12Lρ(g − h). Hence Ta is a ρ-contraction. By

(2.1), we get

(2.17) ρ(f(x) + f(−x)) ≤ φ(0, x),

(2.18) ρ(f(3x)− 4f(2x) + 5f(x)) ≤ φ(x, x),

and

(2.19) ρ(f(4x)− 2f(3x)− 2f(2x)− 2f(−x) + 4f(x)) ≤ φ(x, 2x),

for all x ∈ V . By (2.17), (2.18), and (2.19), we obtain

ρ(1

2fa(2x)− fa(x)) ≤ 1

8φ(x, 2x) +

1

4φ(x, x) +

1

4φ(0, x) ≤ 1

4ψ(x, x)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

889 CHANG IL KIM et al 881-893

Page 112: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

10 CHANG IL KIM, GILJUN HAN, AND SEONG-A SHIM

for all x ∈ V and hence

ρ(Tafa(x)− fa(x)) ≤ 1

4ψ(x, x)

for all g ∈Mρ and all x ∈ V . Hence we have

(2.20) ρ(Tafa − fa) ≤ 1

4.

Let Gg = 2Tag for all g ∈Mρ. Then

Gg(x) = g(2x)

for all x ∈ V . Suppose that ρ(g − h) ≤ c for some positive real number c. Thenρ(g(x)− h(x)) ≤ cψ(x, x) for all x ∈ V and by (2.2), we have

ρ(Gg(x)−Gh(x)) = ρ(g(2x)− h(2x)) ≤ cψ(2x, 2x) ≤ cLψ(x, x)

for all x ∈ V . Hence ρ(Gg −Gh) ≤ cL and so

ρ(Gg −Gh) ≤ Lρ(g − h).

Since Ta is linear, by Lemma 1.5, there is an A ∈ Mρ such that Tnafa4 is ρ-

convergent to A. In fact, we get

limn→∞

ρ(1

2n+2fa(2nx)−A(x)) = 0

for all x ∈ V . Since ρ is lower semi-continuous, we get

ρ(TaA−A) ≤ lim infn→∞

ρ(TaA− Tn+1a

fa4

) ≤ lim infn→∞

Lρ(A− Tnafa4

) = 0

and hence A is a fixed point of Ta in Mρ. Similar to Theorem 2.2, we have

(2.21) DA(x, y) = 0

for all x, y ∈ V and by (1.6) in Lemma 1.5 and (2.20), we get

(2.22) ρ(A− 1

4fa) ≤ 1

4(2− L).

Define Tc : Mρ −→ Mρ by Tcg(x) = 18g(2x) for all g ∈ Mρ and all x ∈ V . By

(2.17), (2.18), and (2.19), we obtain

ρ(1

23fc(2x)− fc(x)) ≤ 1

4ψ(x, x)

for all x ∈ V and hence

(2.23) ρ(Tcfc − fc) ≤1

4.

Let Hg = 2Tcg for all g ∈Mρ. Then

Hg(x) =1

4g(2x).

for all g ∈ Mρ and for all x ∈ V . Let g, h ∈ Mρ. Suppose that ρ(g − h) ≤ c forsome positive real number c. Then ρ(g(x)− h(x)) ≤ cψ(x, x) for all x ∈ V and by(2.3), we get

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

890 CHANG IL KIM et al 881-893

Page 113: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

A FIXED POINT THEOREM AND STABILITY OF ADDITIVE-CUBIC... 11

ρ(Hg(x)−Hh(x)) = ρ(1

4g(2x)− 1

4h(2x)) ≤ cψ(2x, 2x) ≤ cLψ(x, x)

for all x ∈ V . Hence ρ(Gg −Gh) ≤ cL and so

ρ(Hg −Hh) ≤ Lρ(g − h).

Since Tc is linear, by Lemma 1.5, there is a C ∈ Mρ such that Tnc 14fc is ρ-

convergent to C. Since ρ is lower semi-continuous, we get

ρ(TcC − C) ≤ lim infn→∞

ρ(TcC − Tn+1c

1

4fc) ≤ lim inf

n→∞Lρ(C − Tnc

1

4fc) = 0

and hence C is a fixed point of Tc in Mρ. Similar to Theorem 2.2, we get

(2.24) DC(x, y) = 0

for all x, y ∈ V and by (1.6) in Lemma 1.5, we get

ρ(C(x)− 1

4fc(x)) ≤ 1

4(2− L)ψ(x, x)

for all x ∈ X. Hence we have

(2.25) ρ(C − 1

4fc) ≤

1

4(2− L).

Let F = 18C −

12A. Since A is a fixed point of Ta, A(2x) = 2A(x) for all x ∈ X

and similarly, C(2x) = 8C(x) for all x ∈ X. By Lemma 2.1, A is additive and Cis cubic. Hence F is an additive-cubic mapping. Since f(x) = 1

6fc(x)− 23fa(x), by

(2.22) and (2.25), we have

ρ(F − 3

16f) ≤ 1

2ρ(A− 1

4fa) +

1

2ρ(

1

4C − 1

16fc) ≤

1

2ρ(A− 1

4fa) +

1

8ρ(C − 1

4fc).

and hence we have (2.16). The rest of the proof is similar to Theorem 2.2.

Remark 2.4. Sadeghi [13] proved the generalized Hyers-Ulam stability of func-tional equations in modular spaces with the 42-condition and in [15], authorsproved the stability of mappings f : V −→ Xρ and φ : V 2 −→ [0,∞) satisfyingf(0) = 0,

(2.26) limn→∞

φ(2nx, 2ny)

4n= 0, φ(2x, 2x) ≤ 4Lφ(x, x), ∀x, y ∈ V,

andρ(4f(x+ y) + 4f(x− y)− 8f(x)− 8f(y)) ≤ φ(x, y), ∀x, y ∈ V

for some real number L with 0 ≤ L < 12 whose codomain is equipped with a convex

and lower semi-continuous modular without 42-conditions. Our results guaranteethe stability of an additive-cubic mapping, whose induced modular is lower semi-continuous without the convexity and 42-conditions if 0 ≤ L < 1

4 . Further, in [15],authors left whether the multiple of 4 on the left side of the inequality (6) can bedropped as a problem. We can solve the problem by using Lemma 1.4 and its proofis similar to the proof in Theorem 2.2.

In fact, suppose that φ : V 2 −→ [0,∞) is a mapping with (2.26) and that0 ≤ L < 1

4 . Let f : V −→ Xρ be a mapping such that f(0) = 0 and

(2.27) ρ(f(x+ y) + f(x− y)− 2f(x)− 2f(y)) ≤ φ(x, y)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

891 CHANG IL KIM et al 881-893

Page 114: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

12 CHANG IL KIM, GILJUN HAN, AND SEONG-A SHIM

for all x, y ∈ X. Let ψ(x, y) = φ(x, y) for all x, y ∈ V , f0(x) = 4f(x), andTg(x) = 1

4g(2x). Then by (2.27), we have

ρ(Tf0(x)− f0(x)) = ρ(1

4f0(2x)− f0(x)) ≤ φ(x, x)

for all x ∈ V and so

(2.28) ρ(Tf0 − f0) ≤ 1.

Moreover, by (2.26), we have

(2.29) ρ(2Tg − 2Th) ≤ 4Lρ(g − h).

Since 0 ≤ L < 14 , by Lemma 1.4, there is a fixed point Q ∈Mρ such that Tn f04 =

Tnf converges to Q in Xρ and

(2.30) ρ(Q(x)− f(x)) ≤ 2

1− 4Lφ(x, x)

for all x ∈ V . We can show that Q is a quadratic mapping ([15]).Further, suppose that ρ is convex and 0 ≤ L < 1. Then (2.28) and (2.29) can be

replaced by

ρ(Tf0 − f0) ≤ 1

4and

ρ(2Tg − 2Th) ≤ 2Lρ(g − h),

respectively. By Lemma 1.5 and (1.6),

ρ(Q(x)− f(x)) ≤ 1

4(2− 2L)φ(x, x) =

1

8(1− L)φ(x, x)

for all x ∈ V .

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publicationof this paper.

AcknowledgmentThe corresponding author was supported by the research fund of Dankook Uni-

versity in 2014.

References

[1] T. Aoki, On the stability of the linear transformation in Banach spaces, J. Math. Soc. Japan

2(1950), 64-66.[2] P. Gavruta, A generalization of the Hyer-Ulam-Rassias stability of approximately additive

mappings, J. Math. Anal. Appl. 184(1994), 431-436.

[3] D. H. Hyers, On the stability of the linear functional equation, Proc. Nat. Acad. Sci. 27(1941),222-224.

[4] M. A. Kamasi and W. M. Kozlowski, Fixed point thoery in modular function spaces,

Birkhauser, 2015.[5] M. A. Khamsi, Quasicontraction mappings in modular spaces without 42-condition., Fixed

Point Theory and Applications, 2008(2008), 1-6.

[6] M. A. Khamsi, W. M. Kozlowski, and S. Reich, Fixed point theory in Modular spaces,Nonlinear analysis, Theory, Method and Applications, 14(1990), 935-953.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

892 CHANG IL KIM et al 881-893

Page 115: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

A FIXED POINT THEOREM AND STABILITY OF ADDITIVE-CUBIC... 13

[7] W. A. Luxemburg, Banach function spaces, Ph. D. thesis, Delft Univrsity of technology, Delft,The Netherlands, 1959.

[8] J. Musielak and W. Orlicz, On modular spaces, Studia Mathematica, 18(1959), 591-597.

[9] A. Najati and G. Z. Eskandani, Stability of a mixed additive and cubic functional equationin quasi-Banach spaves, J. Math. Anal. Appl., 342(2008), 1318-1331.

[10] H. Nakano, Modular semi-ordered spaces, Tokyo, Japan, 1959.

[11] W. Orlicz, Collected Papers, Vols. I, II, PWN, Warszawa, 1988.[12] Th. M. Rassias, On the stability of the linear mapping in Banach sapces, Proc. Amer. Math.

Sco. 72(1978), 297-300.[13] G. Sadeghi, A fixed point approach to stability of functional equations in modular spaces,

Bulletin of the Malaysian Mathematical Sciences Society. Second Series, 37(2014), 333-344.

[14] S. M. Ulam, Problems in Modern Mathematics, Wiley, New York; 1964.[15] K. Wongkum, P. Chaipunya, and P. Kumam, On the generalized Ulam-Hyers-Rassias stability

of quadratic mappings in modular spaces without 42-conditions, 2015(2015), 1-6.

[16] T. Z. Xu, J. M. Rassias, and W. X. Xu, Stability of a general mixed additive-cubic equationin F-spaces, J. Comp. Anal. Appl., 14(2012), 1026-1037.

[17] T. Z. Xu, J. M. Rassias, and W. X. Xu, Stability of a general mixed additive-cubic functional

equation in non-Archimedean fuzzy normed spaces, J. Math. Phys. 51(2010).[18] T. Z. Xu, J. M. Rassias, and W. X. Xu, Intuitionistic fuzzy stability of a general mixed

additive-cubic equation, J. Math. Phys. 51(2010).

[19] S. Yamamuro, On conjugate spaces of Nakano spaces, Trans. Amer. Math. Soc. 90(1959)291-311.

Department of Mathematics Education, Dankook University, 152, Jukjeon-ro, Suji-

gu, Yongin-si, Gyeonggi-do, 448-701, KoreaE-mail address: [email protected]

Department of Mathematics Education, Dankook University, 152, Jukjeon-ro, Suji-

gu, Yongin-si, Gyeonggi-do, 448-701, KoreaE-mail address: [email protected]

Department of Mathematics, Sungshin Women’s University, 249-1, Dongseon-Dong3-Ga, SeongBuk-Gu, Seoul 136-742, Korea

E-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

893 CHANG IL KIM et al 881-893

Page 116: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Results on value-shared of admissible function and

non-admissible function in the unit disc ∗

Hong-Yan Xua

a Department of Informatics and Engineering, Jingdezhen Ceramic Institute,

Jingdezhen, Jiangxi, 333403, China

<e-mail: [email protected]>

Abstract

In this paper, we consider the uniqueness problem of admissible functions andnon-admissible functions sharing some values in the unit disc. We obtain: If f1 isadmissible and f2 is inadmissible satisfying lim

r→1−T (r, f2) = ∞, aj(j = 1, 2, . . . ; q)

be q distinct complex numbers. Then(i) f1(z), f2(z) can share at most three values a1, a2, a3 IM ;(ii) f1(z), f2(z) can share at most five values aj(j = 1, 2, . . . ; 5) with reduced

weight 1. Our results of this paper are improvement of the uniqueness theoremsof meromorphic functions sharing some values on the whole complex plane whichgiven by Yi and Cao.Key words: uniqueness; meromorphic function; admissible; non-admissible.Mathematical Subject Classification (2010): 30D 35.

1 Introduction and Main Results

In what follows, we shall assume that reader is familiar with the fundamental results andthe standard notations of the Nevanlinna value distribution theory of meromorphic func-tions such as the proximity function m(r, f), counting function N(r, f), characteristicfunction T (r, f), the first and second main theorems, lemma on the logarithmic deriva-tives etc. of Nevalinna theory, (see Hayman [7] , Yang [16] and Yi and Yang [19]). For ameromorphic function f , S(r, f) denotes any quantity satisfying S(r, f) = o(T (r, f)) forall r outside a possible exceptional set of finite logarithmic measure.

We use C to denote the open complex plane, C := C⋃∞ to denote the extended

complex plane, and D = z : |z| < 1 to denote the unit disc.

Let f, g be two non-constant meromorphic functions in D and a ∈ C. If E(a,D, f) =E(a,D, g), we say f and g share a CM(counting multiplicities) in D. If E(a,D, f) =

∗This work was supported by NSFC(11561033, 11301233, 61202313), the Natural Science Foun- dationof Jiangxi Province in China 20132BAB211001, 20151BAB201008), and the Foundation of EducationDepartment of Jiangxi (GJJ14644) of China.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

894 Hong-Yan Xu 894-906

Page 117: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

E(a,D, g), we say f and g share a IM(ignoring multiplicities) in D. If D is replaced byC, we give the simple notation as before, E(a, f), E(a, f) and so on(see [16]).

R.Nevanlinna [12] proved the following well-known theorems.

Theorem 1.1 (see [12]) If f and g are two non-constant meromorphic functions thatshare five distinct values a1, a2, a3, a4, a5 IM in C, then f(z) ≡ g(z).

Theorem 1.2 (see [12]) If f and g are two distinct non-constant meromorphic functionsthat share four distinct values a1, a2, a3, a4 CM in C, then f is a Mobius transformationof g , two of the shared values, say a1 and a2 are Picard values, and the cross ratio(a1, a2, a3, a4) = −1.

After their very work, the uniqueness of meromorphic functions with shared valuesin the whole complex plane attracted many investigations (see [16]). In 1987 and 1988,Yi [17, 18] dealt with the problems of multiple values and uniquness of meromorphicfunctions sharing some values in the whole complex plane by adopting L.Yang’s methodand obtained some results which improved the concerning theorems due to Gopalakrishnaand Bhoosnurmath’s [6], Ueda [14]. To state the theorems, we will explain some notationsas follows.

Let f(z) be a non-constant meromorphic function, an arbitrary complex number

a ∈ C, and k be a positive integer. We use Ek)(a, f) to denote the set of zeros of f − a,with multiplicities no greater than k, in which each zero counted only once. We say thatf(z) and g(z) share the value a with reduced weight k, if Ek)(a, f) = Ek)(a, g).

In 1987, Yi [17] obtained the uniqueness theorems concerning multiple values of mero-morphic functions as follows.

Theorem 1.3 (see [17, 19, Theorem 3.15]). Let f(z) and g(z) be two non-constantmeromorphic functions, aj(j = 1, 2, . . . , q) be q distinct complex numbers, and let kj(j =1, 2, . . . , q) be positive integers or ∞ satisfying

(1) k1 ≥ k2 ≥ · · · ≥ kq ≥ 1.

IfEkj)(aj , f) = Ekj)(aj , g) (j = 1, 2, . . . , q)

and

(2)

q∑j=3

kjkj + 1

> 2,

then f(z) ≡ g(z).

In recent, it is an interesting topic to investigate the uniqueness with shared valuesin the subregion of the complex plane such as the unit disc, an angular domain, see[1, 2, 9, 10, 11, 15, 20, 21, 22]. In 1999, Fang [5] studied the uniqueness problem ofadmissible meromorphic functions in the unit disc D sharing two sets and three sets.Later, there were some results of uniqueness of meromorphic function in the unit discconcerning admissible functions. To state some uniqueness theorems of meromorphicfunctions in the unit disc D, we need the following basic notations and definitions ofmeromorphic functions in D(see [3], [4], [8]).

2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

895 Hong-Yan Xu 894-906

Page 118: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Definition 1.1 Let f be a meromorphic function in D and limr→1− T (r, f) =∞. Then

α(f) := lim supr→1−

T (r, f)

− log(1− r)

is called the index of inadmissibility of f . If α(f) =∞, f is called admissible.

Definition 1.2 Let f be a meromorphic function in D and limr→1− T (r, f) =∞. Then

ρ(f) := lim supr→1−

log+ T (r, f)

− log(1− r)

is called the order (of growth) of f .

For admissible functions, the following theorem plays a very important role in studiesthe uniqueness problems of meromorphic functions in the unit disc.

Theorem 1.4 (see [13, Theorem 3]). Let f be an admissible meromorphic function inD, q be a positive integer and a1, a2, . . . , aq be pairwise distinct complex numbers. Then,for r → 1−, r 6∈ E,

(q − 2)T (r, f) ≤q∑j=1

N

(r,

1

f − aj

)+ S(r, f),

where E ⊂ (0, 1) is a possibly occurring exceptional set with∫E

dr1−r <∞. If the order of

f is finite, the remainder S(r, f) is a O(

log 11−r

)without any exceptional set.

In 2005, Titzhoff [13] investigated the uniqueness of two admissible functions in theunit disc D by using the Second Main Theorem for admissible functions (Theorem 1.4)and obtained the five values theorem in the unit disc D as follows.

Theorem 1.5 (see [13]). If two admissible function f, g share five distinct values, thenf ≡ g.

In 2009, Mao and Liu [11] gave a different method to investigate the uniquenessproblem of meromorphic functions in unit disc and obtained the following results.

Theorem 1.6 (see [11]). Let f, g be two meromorphic functions in D, aj ∈ C(j =1, 2, . . . , 5) be five distinct values, and ∆(θ0, δ)(0 < δ < π) be an angular domain such

that for some a ∈ C,

(3) lim supr→1−

log n(r,∆(θ0, δ/2), f(z) = a)

log 11−r

= τ > 1.

If f and g share aj(j = 1, 2, . . . , 5) IM in ∆(θ0, δ), then f(z) ≡ g(z).

Remark 1.1 In fact, the condition (3) implies that f is admissible in the unit disc.Therefore, Theorem 1.6 is one result of uniqueness of admissible functions in the unitdisc.

3

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

896 Hong-Yan Xu 894-906

Page 119: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

For admissible functions in the unit disc D, from Theorem 1.4, using the same argu-ment as in the proofs of Theorem 1.3, we can easily get the following results.

Theorem 1.7 Let f1(z) and f2(z) be two admissible meromorphic functions in D, aj(j =1, 2, . . . , q) be q distinct complex numbers, and let kj(j = 1, 2, . . . , q) be positive integersor ∞ satisfying (1). If f1(z) and f2(z) satisfy

(4) Ekj)(aj ,D, f1) = Ekj)(aj ,D, f2) (j = 1, 2, . . . , q)

and (2), then f1(z) ≡ f2(z), where Ek)(a,D, f) to denote the set of zeros of f − a in D,with multiplicities no greater than k, in which each zero counted only once.

Remark 1.2 For a ∈ C and a positive integer k, we can say that f1(z), f2(z) share thevalue a in D with reduced weight k, if Ek)(a,D, f1) = Ek)(a,D, f2).

Similar to the corollary of Theorem 1.3 (see [19, Corollary,pp.181.]), we can get thefollowing corollary.

Corollary 1.1 Let f1(z) and f2(z) be two admissible meromorphic functions in D, aj(j =1, 2, . . . , q) be q distinct complex numbers, and let kj(j = 1, 2, . . . , q) be positive integersor ∞ satisfying (1) and (4).

(i) if q = 7, then f1(z) ≡ f2(z);(ii) if q = 6 and k3 ≥ 2, then f1(z) ≡ f2(z);(iii) if q = 5, k3 ≥ 3 and k5 ≥ 2, then f1(z) ≡ f2(z);(iv) if q = 5 and k4 ≥ 4, then f1(z) ≡ f2(z);(v) if q = 5, k3 ≥ 5 and k4 ≥ 3, then f1(z) ≡ f2(z);(vi) if q = 5, k3 ≥ 6 and k4 ≥ 2, then f1(z) ≡ f2(z).

Remark 1.3 In Theorem 1.5, the conclusion f(z) ≡ g(z) holds when q = 5 and kj =∞ (j = 1, 2, . . . , 5). From Corollary 1.1, we can get that f1(z) ≡ f2(z) when q = 5 andkj (j = 1, 2, . . . , 5) satisfy any of the four conditions (i)-(iv). Hence, Corollary 1.1 is animprovement of Theorem 1.5.

For non-admissible functions, the following theorem also plays a very important rolein studies theirs uniqueness problems.

Theorem 1.8 (see [13, Theorem 2]). Let f be a meromorphic function in D and limr→1−

T (r, f) =∞, q be a positive integer and a1, a2, . . . , aq be pairwise distinct complex num-bers. Then, for r → 1−, r 6∈ E,

(q − 2)T (r, f) ≤q∑j=1

N

(r,

1

f − aj

)+ log

1

1− r+ S(r, f).

Remark 1.4 (i) In contrast to admissible functions, the term log 11−r in Theorem 1.8

does not necessarily enter the remainder S(r, f) because the non-admissible function f

may have T (r, f) = O(

log 11−r

).

(ii) If 0 < α(f) < ∞, we can see that S(r, f) = o(

log 11−r

)holds in Theorem 1.8

without a possible exception set.

4

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

897 Hong-Yan Xu 894-906

Page 120: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

From Theorem 1.8 and Remark 1.4, we can see that the uniqueness of non-admissiblefunctions is more intricate than the case of admissible functions.

In this paper, we will deal with the uniqueness problem of non-admissible functionsin D. We use Υα to denote the class of non-admissible functions satisfying the condition:α(f) = α(0 < α <∞) for f ∈ Υα. For the class Υα, we get the following results

Theorem 1.9 Let f(z) ∈ Υα, aj(j = 1, 2, . . . , q) are q distinct complex numbers. Ifq = 5 + [ 2

k + k+1kα ], then there does not exist g(z)(6≡ f(z)) ∈ Υα satisfying

(5) Ek)(aj ,D, f) = Ek)(aj ,D, g), (j = 1, 2, . . . , q),

where [x] denotes the largest integer less than or equal to x.

Corollary 1.2 Let f(z) ∈ Υα. Then f(z) is uniquely determined in Υα by one of thefollowing cases:

(i) if f have seven point-sets E1)(aj ,D, f)(j = 1, 2, . . . , 7) and α > 1;

(ii) if f have six point-sets E2)(aj ,D, f)(j = 1, 2, . . . , 6) and α > 32 ;

(iii) if f have five point-sets E3)(aj ,D, f)(j = 1, 2, . . . , 5) and α > 4.

Remark 1.5 For Corollary 1.1, we can see that the conclusion (iii) in Corollary 1.1 is animprovement of Theorem 1.6. In fact, the conclusion of Theorem 1.6 is that non-constantmeromorphic function f is uniquely determined in D by five point-sets E∞)(aj ,D, f)(j =1, 2, . . . , 5) and α(f) =∞.

Theorem 1.10 Let α > 12 and f(z) ∈ Υα, aj(j = 1, 2, . . . , 5) be five distinct complexnumbers. Then f(z) is uniquely determined in Υ by three point-sets E3)(aj ,D, f)(j =

1, 2, 3) and two point-sets E2)(aj ,D, f)(j = 4, 5).

Furthermore, for the uniqueness of regular inadmissibility functions we obtain thefollowing theorems

Theorem 1.11 Let aj(j = 1, 2, . . . , q) be q distinct complex numbers, and let kj(j =1, 2, . . . , q) be positive integers or∞ satisfying (1). If f1(z), f2(z) be non-constant regularinadmissibility functions satisfying 0 < α(f1), α(f2) <∞, (4) and

(6)

q∑j=3

kjkj + 1

− 2 >2

α(f1) + α(f2),

then f1(z) ≡ f2(z).

From Theorem 1.11, similar to Corollary 1.1, we can get the following results easily.

Corollary 1.3 Let aj(j = 1, 2, . . . , q) be q distinct complex numbers, and let kj(j =1, 2, . . . , q) be positive integers or ∞ satisfying (1), α := minα(f1), α(f2). And letf1(z), f2(z) be non-constant regular inadmissibility functions satisfying 0 < α(f1), α(f2) <∞ and (4),

(i) if α > 1, q = 7 and k7 ≥ 2, then f1(z) ≡ f2(z);(ii) if α > 1, q = 6 and k6 ≥ 4, then f1(z) ≡ f2(z);

5

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

898 Hong-Yan Xu 894-906

Page 121: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

(iii) if α > 2 and q = 7, then f1(z) ≡ f2(z);(iv) if α > 3, q = 6 and k3 ≥ 2, then f1(z) ≡ f2(z);(v) if α > 6, q = 5, k3 ≥ 3 and k5 ≥ 2, then f1(z) ≡ f2(z);(vi) if α > 10, q = 5 and k4 ≥ 4, then f1(z) ≡ f2(z);(vii) if α > 12, q = 5, k3 ≥ 5 and k4 ≥ 3, then f1(z) ≡ f2(z);(viii) if α > 42, q = 5, k3 ≥ 6 and k4 ≥ 2, then f1(z) ≡ f2(z).

Remark 1.6 In Corollary 1.1, f1(z), f2(z) are all admissible functions, that is, α(f1) =∞ and α(f2) =∞. From the conclusions of Corollary 1.3, we see that f1(z) ≡ f2(z) holdswhen f1(z), f2(z) are non-constant regular inadmissibility functions with minα(f1), α(f2)> ζ and ζ a positive constant. Hence, Corollary 1.3 is an improvement of Corollary 1.1.

The following theorem will show that an admissible function can share sufficientlymany values concerning multiple values with another inadmissible function.

Theorem 1.12 If f1 is admissible and f2 is inadmissible satisfying limr→1− T (r, f2) =∞, aj(j = 1, 2, . . . , q) be q distinct complex numbers, and let kj(j = 1, 2, . . . , q) be positiveintegers or ∞ satisfying (1). Then

(7)

q∑j=2

kjkj + 1

− 2 > 0

and (4) do not hold at same time.

Corollary 1.4 If f1 is admissible and f2 is inadmissible satisfying limr→1− T (r, f2) =∞, aj(j = 1, 2, . . . , q) be q distinct complex numbers. Then

(i) f1(z), f2(z) can share at most three values a1, a2, a3 IM ;(ii) f1(z), f2(z) can share at most five values aj(j = 1, 2, . . . , 5) with reduced weight

1;And any one of the following cases can not hold

(iii) q = 4 and Ek1)(a1,D, f1) = Ek1)(a1,D, f2) (k1 ≥ 6), E6)(a2,D, f1) = E6)(a2,D,f2), E2)(a3,D, f1) = E2)(a3,D, f2) and E1)(a4,D, f1) = E1)(a4,D, f2);

(iv) q = 4 and Ek1)(a1,D, f1) = Ek1)(a1,D, f2) (k1 ≥ 3), E3)(a2,D, f1) = E3)(a2,D,f2), E2)(a3,D, f1) = E2)(a3,D, f2) and E2)(a4,D, f1) = E2)(a4,D, f2);

(v) q = 5 and Ek)(ai,D, f1) = Ek)(a,D, f2) (k ≥ 2, i = 1, 2), E1)(aj ,D, f1) =

E1)(aj ,D, f2) (j = 3, 4, 5).

2 Some Lemmas

To prove our results, we will require the following lemmas.

Lemma 2.1 (see [13, Lemma 1]). Let f(z), g(z) satisfy limr→1− T (r, f) = ∞ andlimr→1− T (r, g) =∞. If there is a K ∈ (0,∞) with

T (r, f) ≤ KT (r, g) + S(r, f) + S(r, g),

then each S(r, f) is also an S(r, g).

6

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

899 Hong-Yan Xu 894-906

Page 122: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Lemma 2.2 (see [19, Lemma 3.4]). Let f(z) be a non-constant meromorphic function,a be an arbitrary complex number, and k be a positive integer. Then

N

(r,

1

f − a

)≤ k

k + 1Nk)

(r,

1

f − a

)+

1

k + 1N

(r,

1

f − a

),

and

N

(r,

1

f − a

)≤ k

k + 1Nk)

(r,

1

f − a

)+

1

k + 1T (r, f) +O(1),

where Nk)

(r, 1f−a

)are denoted by the zeros of f − a in |z| ≤ r, whose multiplicities are

not greater than k and are counted only once.

From Lemma 2.2 and Theorems 1.4 and 1.8, we can get the following Lemma

Lemma 2.3 Let f(z) be a meromorphic function in D and limr→1− T (r, f) =∞, aj(j =1, 2, . . . , q) be q distinct complex numbers, and kj(j = 1, 2, . . . , q) be positive integers or∞. If f is an admissible function, thenq − 2−

q∑j=1

1

kj + 1

T (r, f) ≤q∑j=1

kjkj + 1

Nkj)

(r,

1

f − aj

)+ S(r, f);

If f is a non-admissible function, thenq − 2−q∑j=1

1

kj + 1

T (r, f) ≤q∑j=1

kjkj + 1

Nkj)

(r,

1

f − aj

)+ log

1

1− r+ S(r, f),

where S(r, f) is stated as in Theorem 1.4.

3 Proofs of Theorems 1.9 and 1.10

3.1 The Proof of Theorem 1.9

Suppose that there exists g(z) ∈ Υα satisfying (5) and f(z) 6≡ g(z). Without loss ofgenerality, we can assume that aj(j = 1, 2, . . . , q) are all finite numbers, otherwise, asuitable linear transformation will be done. Since f(z), g(z) ∈ Υα, from Lemma 2.3, wehave

(8)

(q − 2− q

k + 1

)T (r, f) ≤ k

k + 1

q∑j=1

Nk)

(r,

1

f − aj

)+ log

1

1− r+ S(r, f).

If follows form (5) that

(9)

q∑j=1

Nk)

(r,

1

f − aj

)≤ N

(r,

1

f − g

)≤ T (r, f) + T (r, g) +O(1).

7

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

900 Hong-Yan Xu 894-906

Page 123: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

From (8) and (9), we have(qk

k + 1− 3k + 2

k + 1

)T (r, f) ≤ k

k + 1T (r, g) + log

1

1− r+ S(r, f).

Similarly, we have(qk

k + 1− 3k + 2

k + 1

)T (r, g) ≤ k

k + 1T (r, f) + log

1

1− r+ S(r, g).

Combining the above two inequalities, we get

(10)

(qk

k + 1− 4k + 2

k + 1

)T (r, f) + T (r, g) ≤ 2 log

1

1− r+ S(r, f) + S(r, g).

Since f(z), g(z) ∈ Υα and 0 < α <∞, from the definition of index and q = 5+[ 2k + k+1

kα ],

we have for 0 < ε < α− k+1qk−4k−2 , there exists a sequence rm → 1− such that

(11) T (rm, f) > (α− ε) log1

1− rm, T (rm, g) > (α− ε) log

1

1− rm,

for all m → ∞. From f(z), g(z) ∈ Υα and the assumptions of Theorem 1.9, we can see

that S(r, f) = o(

log 11−r

)and S(r, g) = o

(log 1

1−r

). From this fact and (10)-(11), we

have

(12)

2

(qk

k + 1− 4k + 2

k + 1

)(α− ε)− 2

log

1

1− rm< o

(log

1

1− rm

).

From (12) and 2(qkk+1 −

4k+2k+1

)(α − ε) − 2 > 0, we can get a contradiction. Hence, we

have f(z) ≡ g(z).Thus, this completes the proof of Theorem 1.9.

3.2 The Proof of Theorem 1.10

Suppose that there exists g(z) ∈ Υα satisfying f(z) 6≡ g(z) and

E3)(aj ,D, f) = E3)(aj ,D, g), (j = 1, 2, 3)(13)

E2)(aj ,D, f) = E2)(aj ,D, g), (j = 4, 5).

Without loss of generality, we can assume that aj(j = 1, 2, . . . , 5) are all finite num-bers, otherwise, a suitable linear transformation will be done. Since f(z), g(z) ∈ Υα,from Lemma 2.3, we have(

5− 2− 3

4− 2

3

)T (r, f)(14)

≤3

4

3∑j=1

N3)

(r,

1

f − aj

)+

2

3

5∑j=4

N2)

(r,

1

f − aj

)+ log

1

1− r+ S(r, f)

≤3

4

3∑j=1

N3)

(r,

1

f − aj

)+

5∑j=4

N2)

(r,

1

f − aj

)+ log1

1− r+ S(r, f).

8

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

901 Hong-Yan Xu 894-906

Page 124: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

From (13), we have

3∑j=1

N3)

(r,

1

f − aj

)+

5∑j=4

N2)

(r,

1

f − aj

)≤ N

(r,

1

f − g

)≤ T (r, f) + T (r, g) +O(1).

From this inequality and (14), we have

(15)5

6T (r, f) ≤ 3

4T (r, g) + log

1

1− r+ S(r, f).

Similarly, we have

(16)5

6T (r, g) ≤ 3

4T (r, f) + log

1

1− r+ S(r, g).

Since f(z), g(z) ∈ Υα and α > 12, from the definition of index, we have for any ε(0 <ε < α − 12), there exists a sequence rm → 1− satisfying (11) for all m → ∞. Fromthis fact and (15)-(16), we have

(17)

(1

6(α− ε)− 2

)log

1

1− rm< o

(log

1

1− rm

).

Since α > 12 and 0 < ε < α− 12, we have 16 (α− ε)− 2 1

6 (α− ε)− 2 > 0, a contradiction.Hence, we have f(z) ≡ g(z).

Thus, this completes the proof of Theorem 1.10.

4 Proof of Theorem 1.11

Without loss of generality, we may assume that all aj(j = 1, 2, . . . , q) are finite, otherwise,a suitable Mobius transformation will be done. From Lemma 2.3, we haveq − 2−

q∑j=1

1

kj + 1

T (r, f1) ≤q∑j=1

kjkj + 1

Nkj)

(r,

1

f1 − aj

)+ log

1

1− r(18)

+ S(r, f1).

From (1), we have

(19)1

2≤ kqkq + 1

≤ · · · ≤ k2

k2 + 1≤ k1

k1 + 1≤ 1.

9

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

902 Hong-Yan Xu 894-906

Page 125: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

From (18) and (19), we have q∑j=1

kjkj + 1

− 2

T (r, f1)(20)

≤ k3

k3 + 1

q∑j=1

Nkj)

(r,

1

f1 − aj

)+

2∑j=1

(kj

kj + 1− k3

k3 + 1

)Nkj)

(r,

1

f1 − aj

)+ log

1

1− r+ S(r, f1)

≤ k3

k3 + 1

q∑j=1

Nkj)

(r,

1

f1 − aj

)+

2∑j=1

(kj

kj + 1− k3

k3 + 1

)T (r, f1)

+ log1

1− r+ S(r, f1).

If f1(z) 6≡ f2(z), from the assumptions of Theorem 1.11, we have

(21)

q∑j=1

Nkj)

(r,

1

f1 − aj

)≤ N

(r,

1

f1 − f2

)≤ T (r, f1) + T (r, f2) +O(1).

From this inequality, we have

(22)

q∑j=3

kjkj + 1

+k3

k3 + 1− 2

T (r, f1) ≤ k3

k3 + 1T (r, f2) + log

1

1− r+ S(r, f1).

Similarly, we have

(23)

q∑j=3

kjkj + 1

+k3

k3 + 1− 2

T (r, f2) ≤ k3

k3 + 1T (r, f1) + log

1

1− r+ S(r, f2).

Since 0 < α(f1), α(f2) <∞, we have S(r, f1) = o(

log 11−r

), S(r, f2) = o

(log 1

1−r

). And

from the definition of index, for any ε satisfying

0 < 2ε < min

α(f1), α(f2), α(f1) + α(f2)− 2∑qj=3

kjkj+1

,

there exists a sequence rm → 1− such that

(24) T (rm, f1) > (α(f1)− ε) log1

1− rm, T (rm, f2) > (α(f2)− ε) log

1

1− rm,

for all m→∞. From (22)-(24), we have

(25)

(α(f1) + α(f2)− 2ε)

q∑j=3

kjkj + 1

− 2

log1

1− rm< o

(log

1

1− rm

).

10

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

903 Hong-Yan Xu 894-906

Page 126: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Since 0 < 2ε < α(f1)+α(f2)− 2

Σqj=3

kjkj+1

, we have (α(f1)+α(f2)−2ε)∑qj=3

kjkj+1−2 > 0,

a contradiction. Hence, we have f1(z) ≡ f2(z).Thus, this completes the proof of Theorem 1.11.

5 Proofs of Theorem 1.12 and Corollary 1.4

5.1 The Proof of Theorem 1.12

We will employ the proof by contradiction, that is, suppose that (4) and (7) hold at thesame time. Since f1(z) is admissible, from Lemma 2.3, and by using the same argumentas in Theorem 1.11, we can easily get q∑

j=3

kjkj + 1

+2k2

k2 + 1− 2

T (r, f1) ≤ k2

k2 + 1(T (r, f1) + T (r, f2)) + S(r, f1),

that is,

(26)

q∑j=2

kjkj + 1

− 2

T (r, f1) ≤ k2

k2 + 1T (r, f2) + S(r, f1).

Set K =∑qj=2

kjkj+1 − 2. If K > 0, from (26), we have

(27) T (r, f1) ≤ K ′T (r, f2) + S(r, f1),

where K ′ = 1K

k2k2+1 . Since kj > 0(j = 1, 2, . . . , q), we have K ′ > 0 as K > 0. From this

and Lemma 2.1, we can get that each S(r, f1) is also an S(r, f2). Since f1(z) is admissibleand f2(z) is non-admissible, we can get T (r, f2) = S(r, f1). Thus, we have

(28) T (r, f2) = S(r, f1) = S(r, f2) = o(T (r, f2)).

Since limr→1− T (r, f2) =∞ and (28), we can get a contradiction.Hence, we prove that (4) and (7) do not hold at the same time.

6 The Proof of Corollary 1.4

(i) Suppose that f1(z), f2(z) share four values aj(j = 1, 2, 3, 4) IM , that is, kj =∞(j =1, 2, 3, 4). Since f1(z) is admissible, from Theorem 1.4, we have

(29) 2T (r, f1) ≤4∑j=1

N

(r,

1

f1 − aj

)+ S(r, f1).

Since f1(z), f2(z) share four values aj(j = 1, 2, 3, 4) IM , we have

(30)4∑j=1

N

(r,

1

f1 − aj

)≤ N

(r,

1

f1 − f2

)≤ T (r, f1) + T (r, f2) +O(1).

11

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

904 Hong-Yan Xu 894-906

Page 127: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

From (29) and (30), we have

(31) T (r, f1) ≤ T (r, f2) + S(r, f1).

By Lemma 2.1, similar to the proof of Theorem 1.12, we have

T (r, f2) = S(r, f1) = S(r, f2) = o(T (r, f2)).

From this and limr→1− T (r, f2) =∞, we can get a contradiction.Thus, this completes (i) of Corollary 1.4.Similar to the proof of Corollary 1.4 (i), we can prove (iii),(iv) and (v) of Corollary

1.4 easily. Here we omit the detail.(ii) Suppose that f1, f2 share six values aj(j = 1, 2, . . . , 6) with reduced weight 1, that

is,

(32) E1)(aj ,D, f1) = E1)(aj ,D, f2), (j = 1, 2, . . . , 6),

and k1 = k2 = · · · = k6 = 1. Then, we can deduce that

6∑j=2

kjkj + 1

− 2 = 5× 1

2− 2 =

1

2> 0.

From this and the conclusion of Theorem 1.12, we get a contradiction.Thus, this completes the proof of Corollary 1.4.

Competing interests

The authors declare that they have no competing interests.

Author’s contributions

HYX, LZY and CFY completed the main part of this article, HYX corrected the maintheorems. All authors read and approved the final manuscript.

References

[1] T. B. Cao, H. X. Yi, Analytic functions sharing three values DM in one angular domain,J. Korean Math. Soc. 45(6)(2008), 1523-1534.

[2] T. B. Cao, H. X. Yi, On the uniqueness of meromorphic functions that share four valuesin one angular domain, J. Math. Anal. Appl. 358 (2009), 81-97.

[3] T. B. Cao, H. X. Yi, The growth of solutions of linear differential equations with coefficientsof iterated order in the unit disc, J. Math. Anal. Appl. 319 (2006), 278-294.

12

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

905 Hong-Yan Xu 894-906

Page 128: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

[4] Z. X. Chen, K. H. Shon, The growth of solutions of differential equations with coefficientsof small growth in the disc, J. Math. Anal. Appl. 297 (2004), 285-304.

[5] M. L. Fang, On the uniqueness of admissible meromorphic functions in the unit disc, Sci.China A 42 (1999), 367-381.

[6] H. S. Gopalakrishna, S. S. Bhoosnurmath, Uniqueness theorem for meromorphic functions,Math. Scand. 39 (1976), 125-130.

[7] W. K. Hayman, Meromorphic Functions, Oxford Univ. Press, London, 1964.

[8] J. Heittokangas, On complex differential equations in the unit disc, Ann. Acad. Sci. Fenn.Math. Diss. 122 (2000), 1-54.

[9] W. C. Lin, S. Mori, K. Tohge, Uniqueness theorems in an angular domain, Tohoku Math.J. 58 (2006), 509-527.

[10] W. C. Lin, S. Mori, H. X. Yi, Uniqueness theorems of entire functions with shared-set inan angular domain, Acta Mathematica Sinica 24 (2008), 1925-1934.

[11] Z. Q. Mao, H. F. Liu, Meromorphic functions in the unit disc that share values in anangular domain, J. Math. Anal. Appl. 359 (2009), 444-450.

[12] R. Nevanlinna, Le theoreme de Picard-Borel et la theorie des fonctions meromorphes,Reprinting of the 1929 original, Chelsea Publishing Co. New York, 1974(in Frech).

[13] F. Titzhoff, Slowly growing functions sharing values, Fiz. Mat. Fak. Moksl. Semin. Darb.8 (2005), 143-164.

[14] H. Ueda, Unicity theorems for meromorphic or entire functions, Kodai Math. J. 6 (1983),26-36.

[15] Z. J. Wu, A remark on uniqueness theorems in an angular domain, Proc. Japan Acad. Ser.A 64 (6) (2008), 73-77.

[16] L. Yang, Value Distribution Theory, Springer/Science Press, Berlin/Beijing, 1993/1982.

[17] H. X. Yi, A note on the questions of multiple values and uniquness of meromorphic func-tions, Chin. Quart. J. Math. 2 (1) (1987), 99-104.

[18] H. X. Yi, Notes on a theorem of H. Ueda, J. Shandong Univ. 23 (4) (1988), 71-77.

[19] H. X. Yi, C. C. Yang, Uniqueness Theory of Meromorphic Functions, Science Press/ K-luwer., Beijing, 2003.

[20] Q. C. Zhang, Meromorphic functions sharing values in an angular domain, J. Math. Anal.Appl. 349 (2009), 100-112.

[21] J. H. Zheng, On uniqueness of meromorphic functions with shared values in some angulardomains, Canad J. Math. 47 (2004), 152-160.

[22] J. H. Zheng, On uniqueness of meromorphic functions with shared values in one angulardomains, Complex Var. Elliptic Equ. 48 (2003), 777-785.

13

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

906 Hong-Yan Xu 894-906

Page 129: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

COMPOSITIONS INVOLVING SCHUR HARMONICALLY

CONVEX FUNCTIONS

HUAN-NAN SHI AND JING ZHANG†

Abstract. The decision theorem of the Schur harmonic convexity for the

compositions involving Schur harmonically convex functions is established and

used to determine the Schur harmonic convexity of some symmetric functions.

2010 Mathematics Subject Classification: Primary 26D15; 05E05; 26B25

Keywords: Schur harmonically convex function; harmonically convex func-

tion; composite function; symmetric function

1. Introduction

Throughout the article, R denotes the set of real numbers, x = (x1, x2, . . . , xn)

denotes n-tuple (n-dimensional real vectors), the set of vectors can be written as

Rn = x = (x1, x2, . . . , xn) : xi,∈ R, i = 1, 2, . . . , n ,

Rn++ = x = (x1, x2, . . . , xn) : xi > 0, i = 1, 2, . . . , n,

Rn+ = x = (x1, x2, . . . , xn) : xi ≥ 0, i = 1, 2, . . . , n.

In particular, the notations R, R++ and R+ denote R1, R1++ and R1

+, respec-

tively.

The following conclusion is proved in reference [1, p. 91], [2, p. 64-65].

Theorem A. Let the interval [a, b] ⊂ R, ϕ : Rn → R, f : [a, b] → R and

ψ(x1, x2, . . . , xn) = ϕ(f(x1), f(x2), . . . , f(xn)) : [a, b]n → R.

† J. Zhang: Correspondence author.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

907 HUAN-NAN SHI et al 907-922

Page 130: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

2 H.-N. SHI AND J. ZHANG

(i) If ϕ is increasing and Schur-convex and f is convex, then ψ is Schur-convex.

(ii) If ϕ is increasing and Schur-concave and f is concave, then ψ is Schur-

concave.

(iii) If ϕ is decreasing and Schur-convex and f is concave, then ψ is Schur-

convex.

(iv) If ϕ is increasing and Schur-convex and f is increasing and convex, then ψ

is increasing and Schur-convex.

(v) If ϕ is decreasing and Schur-convex and f is decreasing and concave, then

ψ is increasing and Schur-convex.

(vi) If ϕ is increasing and Schur-convex and f is decreasing and convex, then

ψ is decreasing and Schur-convex.

(vii) If ϕ is decreasing and Schur-convex and f is increasing and concave, then

ψ is decreasing and Schur-convex.

(viii) If ϕ is decreasing and Schur-concave and f is decreasing and convex, then

ψ is increasing and Schur-concave.

Theorem A is very effective for determine of the Schur-convexity of the composite

functions.

The Schur harmonically convex functions were proposed by Chu et al. [3, 4, 5]

in 2009. The theory of majorization was enriched and expanded by using this

concepts. Regarding the Schur harmonically convex functions, the aim of this

paper is to establish the following theorem which is similar to Theorem A.

Theorem 1. Let the interval [a, b] ⊂ R++, ϕ : Rn++ → R++, f : [a, b]→ R++ and

ψ(x1, x2, . . . , xn) = ϕ(f(x1), f(x2), . . . , f(xn)) : [a, b]n → R++.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

908 HUAN-NAN SHI et al 907-922

Page 131: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

COMPOSITIONS INVOLVING SCHUR HARMONICALLY CONVEX FUNCTIONS 3

(i) If ϕ is increasing and Schur harmonically convex and f is harmonically

convex, then ψ is Schur harmonically convex.

(ii) If ϕ is increasing and Schur harmonically concave and f is harmonically

concave, then ψ is Schur harmonically concave.

(iii) If ϕ is decreasing and Schur harmonically convex and f is harmonically

concave, then ψ is Schur harmonically convex.

(iv) If ϕ is increasing and Schur harmonically convex and f is increasing and

harmonically convex, then ψ is increasing and Schur harmonically convex.

(v) If ϕ is decreasing and Schur harmonically convex and f is decreasing and

harmonically concave, then ψ is increasing and Schur harmonically convex.

(vi) If ϕ is increasing and Schur harmonically convex and f is decreasing and

harmonically convex, then ψ is decreasing and Schur harmonically convex.

(vii) If ϕ is decreasing and Schur harmonically convex and f is increasing and

harmonically concave, then ψ is decreasing and Schur harmonically convex.

(viii) If ϕ is decreasing and Schur harmonically concave and f is decreasing and

harmonically convex, then ψ is increasing and Schur harmonically concave.

2. Definitions and lemmas

In order to prove our results, in this section we will recall useful definitions and

lemmas.

Definition 1. [1, 2] Let x = (x1, x2, . . . , xn) and y = (y1, y2, . . . , yn) ∈ Rn.

(i) x ≥ y means xi ≥ yi for all i = 1, 2, . . . , n.

(ii) Let Ω ⊂ Rn, ϕ: Ω → R is said to be increasing if x ≥ y implies ϕ(x) ≥

ϕ(y). ϕ is said to be decreasing if and only if −ϕ is increasing.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

909 HUAN-NAN SHI et al 907-922

Page 132: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

4 H.-N. SHI AND J. ZHANG

Definition 2. [1, 2] Let x = (x1, x2, . . . , xn) and y = (y1, y2, . . . , yn) ∈ Rn.

We say y majorizes x (x is said to be majorized by y), denoted by x ≺ y,

if∑ki=1 x[i] ≤

∑ki=1 y[i] for k = 1, 2, . . . , n − 1 and

∑ni=1 xi =

∑ni=1 yi, where

x[1] ≥ x[2] ≥ · · · ≥ x[n] and y[1] ≥ y[2] ≥ · · · ≥ y[n] are rearrangements of x and y

in a descending order.

Definition 3. [1, 2] Let x = (x1, x2, . . . , xn) and y = (y1, y2, . . . , yn) ∈ Rn.

(i) A set Ω ⊂ Rn is said to be a convex set if

αx + (1− α)y = (αx1 + (1− α)y1, αx2 + (1− α)y2, . . . , αxn + (1− α)yn) ∈ Ω

for all x,y ∈ Ω, and α ∈ [0, 1].

(ii) Let Ω ⊂ Rn be convex set. A function ϕ: Ω → R is said to be a convex

function on Ω if

ϕ (αx + (1− α)y) ≤ αϕ(x) + (1− α)ϕ(y)

holds for all x,y ∈ Ω, and α ∈ [0, 1]. ϕ is said to be a concave function on

Ω if and only if −ϕ is convex function on Ω.

(iii) Let Ω ⊂ Rn. A function ϕ: Ω → R is said to be a Schur-convex function

on Ω if x ≺ y on Ω implies ϕ (x) ≤ ϕ (y) . A function ϕ is said to be a

Schur-concave function on Ω if and only if −ϕ is Schur-convex function on

Ω.

Lemma 1. (Schur-convex function decision theorem)[1, 2] : Let Ω ⊂ Rn be sym-

metric and have a nonempty interior convex set. Ω0 is the interior of Ω. ϕ :

Ω → R is continuous on Ω and differentiable in Ω0. Then ϕ is the Schur −

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

910 HUAN-NAN SHI et al 907-922

Page 133: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

COMPOSITIONS INVOLVING SCHUR HARMONICALLY CONVEX FUNCTIONS 5

convex (or Schur− concave, respectively) function if and only if ϕ is symmetric

on Ω and

(x1 − x2)

(∂ϕ

∂x1− ∂ϕ

∂x2

)≥ 0(or ≤ 0, respectively) (1)

holds for any x ∈ Ω0.

Definition 4. [6] Let Ω ⊂ Rn++.

(i) A set Ω is said to be a harmonically convex set ifxy

λx + (1− λ)y∈ Ω

for every x,y ∈ Ω and λ ∈ [0, 1], where xy =∑ni=1 xiyi and

1

x=( 1

x1,

1

x2, . . . ,

1

xn

).

(ii) Let Ω ⊂ Rn++ be a harmonically convex set. A function ϕ : Ω → R++ be

a continuous function, then ϕ is called a harmonically convex (or concave,

respectively) function, if

ϕ

(1

αx + 1−α

y

)≤ (or ≥, respectively)

ϕ(x) + 1−αϕ(y)

holds for any x,y ∈ Ω, and α ∈ [0, 1].

(iii) A function ϕ : Ω → R++ is said to be a Schur harmonically convex (or

concave, respectively) function on Ω if1

x≺ 1

yimplies ϕ(x) ≤ (or ≥,

respectively) ϕ(y).

By Definition 4, it is not difficult to prove the following propositions.

Proposition 1. Let Ω ⊂ Rn++ be a set, and let1

Ω= ( 1

x1,

1

x2, . . . ,

1

xn

):

(x1, x2, . . . , xn) ∈ Ω. Then ϕ : Ω → R++ is a Schur harmonically convex (or

concave, respectively) function on Ω if and only if ϕ(1

x) is a Schur-convex (or

concave, respectively) function on1

Ω.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

911 HUAN-NAN SHI et al 907-922

Page 134: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

6 H.-N. SHI AND J. ZHANG

In fact, for any u,v ∈ 1

Ω, there exist x,y ∈ Ω such that u =

1

x,v =

1

y.

Let u ≺ v, that is1

x≺ 1

y, if ϕ : Ω → R++ is a Schur harmonically convex

(or concave, respectively) function on Ω, then ϕ(x) ≤ (or ≥, respectively)ϕ(y),

namely, ϕ(1

u) ≤ (or ≥, respectively)ϕ(

1

v), this means that ϕ(

1

x) is a Schur-convex

(or concave, respectively) function on1

Ω. The necessity is proved. The sufficiency

can be similar to proof.

Proposition 2. f : [a, b](⊂ R++) → R++ is harmonically convex (or concave,

respectively) if and only if g(x) =1

f( 1x )

is concave (or convex, respectively) on[1

b,

1

a

].

In fact, for any x, y ∈[

1

b,

1

a

], then

1

x,

1

y∈ [a, b]. If f : [a, b](⊂ R++) → R++ is

harmonically convex (or concave, respectively), then

f

(1

αx+ (1− α)y

)≤ (or ≥, respectively)

f( 1x )

+ 1−αf( 1

y )

,

this is

1

f( 1αx+(1−α)y )

≥ (or ≤, respectively)α

f( 1x )

+1− αf( 1

y ),

this means that g(x) =1

f( 1x )

is concave (or convex, respectively) on

[1

b,

1

a

]. The

necessity is proved. The sufficiency can be similar to proof.

Lemma 2. (Schur harmonically convex function decision theorem)[5] Let Ω ⊂ Rn++

be a symmetric and harmonically convex set with inner points, and let ϕ : Ω→ R++

be a continuously symmetric function which is differentiable on interior Ω0. Then

ϕ is Schur harmonically convex (or Schur harmonically concave, respectively) on Ω

if and only if

(x1 − x2)

(x21∂ϕ(x)

∂x1− x22

∂ϕ(x)

∂x2

)≥ 0 (or ≤ 0, respectively), x ∈ Ω0. (2)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

912 HUAN-NAN SHI et al 907-922

Page 135: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

COMPOSITIONS INVOLVING SCHUR HARMONICALLY CONVEX FUNCTIONS 7

3. Proof of main results

Proof of Theorem 1. We only give the proof of Theorem 1 (vi) in detail.

Similar argument leads to the proof of the rest part.

If ϕ is increasing and Schur harmonically convex and f is decreasing and harmon-

ically convex, then by Proposition 1, it follows that ϕ(1

x1,

1

x2, . . . ,

1

xn) is decreasing

and Schur convex, and by Proposition 2, it follows that g(x) =1

f( 1x )

is decreasing

and concave on

[1

b,

1

a

]. And then from Theorem A (iii), it follows that

ϕ

(1

g(x1),

1

g(x2), . . . ,

1

g(xn)

)= ϕ

(f(

1

x1), f(

1

x2), . . . , f(

1

xn)

)

is increasing and Schur-convex. Again by Proposition 1, it follows that

ψ(x1, x2, . . . , xn) = ϕ(f(x1), f(x2), . . . , f(xn))

is decreasing and Schur harmonically convex.

4. Applications

Let x = (x1, x2, . . . , xn) ∈ Rn. Its elementary symmetric functions are

Er(x) = Er(x1, x2, . . . , xn) =∑

1≤i1<i2<···<ir≤n

r∏j=1

xij , r = 1, 2, . . . , n,

and defined E0(x) = 1, and Er(x) = 0 for r < 0 or r > n. The dual forms of the

elementary symmetric functions are

E∗r (x) = E∗

r (x1, x2, . . . , xn) =∏

1≤i1<i2<···<ir≤n

r∑j=1

xij , r = 1, 2, . . . , n,

and defined E∗0 (x) = 1, and E∗

r (x) = 0 for r < 0 or r > n.

It is well-known that Er(x) is a increasing and Schur-concave function on Rn+[1].

In [7, 6], Shi proved that E∗r (x) is a increasing and Schur-concave function on

Rn+.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

913 HUAN-NAN SHI et al 907-922

Page 136: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

8 H.-N. SHI AND J. ZHANG

Theorem 2. For r = 1, 2, . . . , n, n ≥ 2, Er(x) and E∗r (x) are Schur harmonically

convex function on Rn++.

Proof. Noting that

Er(x) = x1x2Er−2(x3, x4, . . . , xn) + (x1 + x2)Er−1(x3, x4, . . . , xn)

+ Er(x3, x4, . . . , xn), r = 1, 2, . . . , n,

then

(x1 − x2)

(x21∂Er(x)

∂x1− x22

∂Er(x)

∂x2

)=(x1 − x2)[x21(x2Er−2(x3, x4, . . . , xn) + Er−1(x3, x4, . . . , xn))−

x22(x1Er−2(x3, x4, . . . , xn) + Er−1(x3, x4, . . . , xn))]

=(x1 − x2)2[x1x2Er−2(x3, x4, . . . , xn) + (x1 + x2)Er−1(x3, x4, . . . , xn)] ≥ 0,

by Lemma 2, it follows that Er(x) is Schur harmonically convex on Rn++.

By a direct, though tedious, calculation, and according to Lemma 2, E∗1 (x),

E∗2 (x) is Schur harmonically convex on Rn++. When r > 2, it is easy to see that

E∗r (x) = E∗

r (x1, x2, . . . , xn) = E∗r (x2, x3, . . . , xn)×

∏2≤i1<i2<···<ir−1≤n

(x1 +r−1∑j=1

xij ),

then

logE∗r (x) = logE∗

r (x2, x3, . . . , xn) +∑

2≤i1<i2<···<ir−1≤n

log(x1 +r−1∑j=1

xij ).

Now, it leads to

1

E∗r (x)

∂E∗r (x)

∂x1=

∑2≤i1<i2<···<ir−1≤n

1

x1 +∑r−1j=1 xij

,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

914 HUAN-NAN SHI et al 907-922

Page 137: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

COMPOSITIONS INVOLVING SCHUR HARMONICALLY CONVEX FUNCTIONS 9

and then

∂E∗r (x)

∂x1= E∗

r (x)× ∑3≤i1<i2<···<ir−1≤n

1

x1 +∑r−1j=1 xij

+∑

3≤i1<i2<···<ir−2≤n

1

x1 + x2 +∑r−2j=1 xij

.By the same arguments,

∂E∗r (x)

∂x2= E∗

r (x)× ∑3≤i1<i2<···<ir−1≤n

1

x2 +∑r−1j=1 xij

+∑

3≤i1<i2<···<ir−2≤n

1

x1 + x2 +∑r−2j=1 xij

.Thus,

(x1 − x2)

(x21∂E∗

r (x)

∂x1− x22

∂E∗r (x)

∂x2

)

=(x1 − x2)E∗r (x)×

[ ∑3≤i1<i2<···<ir−1≤n

(x21

x1 +∑r−1j=1 xij

− x22

x2 +∑r−1j=1 xij

)+

(x21 − x22) ·∑

3≤i1<i2<···<ir−2≤n

1

x1 + x2 +∑r−2j=1 xij

]

=(x1 − x2)2E∗r (x)×

[ ∑3≤i1<i2<···<ir−1≤n

x1x2 + (x1 + x2)∑r−1j=1 xij

(x1 +∑r−1j=1 xij )(x2 +

∑r−1j=1 xij )

+

(x1 + x2) ·∑

3≤i1<i2<···<ir−2≤n

1

x1 + x2 +∑r−2j=1 xij

]≥ 0,

by Lemma 2, it follows that E∗r (x) is Schur harmonically convex on Rn++.

For x = (x1, x2, . . . , xn) ∈ Rn, the complete symmetric functions cn(x, r) are

defined as

cn(x, r) =∑

i1+i2+···+in=r

n∏j=1

xijj , r = 1, 2, . . . , n,

where c0(x, r) = 1, r ∈ 1, 2, . . . , n, i1, i2, . . . , in are non-negative integers.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

915 HUAN-NAN SHI et al 907-922

Page 138: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

10 H.-N. SHI AND J. ZHANG

The dual forms of the complete symmetric functions c∗n(x, r) are

c∗n(x, r) =∏

i1+i2+···+in=r

n∑j=1

ijxj , r = 1, 2, . . . , n,

where ij(j = 1, 2, . . . , n) are non-negative integers.

Guan [8] discussed the Schur-convexity of cn(x, r) and proved that cn(x, r) is

increasing and Schur-convex on Rn++. Subsequently, Chu et al. [5] proved that

cn(x, r) is Schur harmonically convex on Rn++.

Zhang and Shi [9] proved that c∗n(x, r) is increasing, Schur-concave and Schur

harmonically convex on Rn++.

In the following, we prove that the Schur harmonic convexity of the composite

functions involving the above symmetric functions and their dual form by using

Theorem 1.

Theorem 3. The following symmetric functions are increasing and Schur harmon-

ically convex on (0, 1)n, r = 1, 2, . . . , n,

Er

(1 + x

1− x

)=

∑1≤i1<i2<···<ir≤n

r∏j=1

1 + xij1− xij

, (3)

E∗r

(1 + x

1− x

)=

∏1≤i1<i2<···<ir≤n

r∑j=1

1 + xij1− xij

, (4)

cn

(1 + x

1− x, r

)=

∑i1+i2+···+in=r

n∏j=1

(1 + xj1− xj

)ij(5)

and

c∗n

(1 + x

1− x, r

)=

∏i1+i2+···+in=r

n∑j=1

ij

(1 + xj1− xj

). (6)

Proof. Let f(x) =1 + x

1− x, x ∈ (0, 1). Then f(x) > 0, f

′(x) =

2

(1− x)2> 0, so f is

increasing on (0, 1).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

916 HUAN-NAN SHI et al 907-922

Page 139: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

COMPOSITIONS INVOLVING SCHUR HARMONICALLY CONVEX FUNCTIONS 11

And let g(x) =1

f( 1x )

=x− 1

x+ 1. Then g

′′(x) = − 4

(x+ 1)3< 0, this means that

1

f( 1x )

is concave on (1,∞), by Proposition 2, it follows that f is harmonically convex

on (0, 1). Since Er(x), E∗r (x), cn(x, r) and c∗n(x, r) are all increasing and Schur

harmonically convex function on Rn++, by Theorem 1 (iv), it follows that Theorem

3 holds.

Remark 1. By Lemma 2, Xia and Chu [10] proved that Er

(1 + x

1− x

)is Schur har-

monically convex on (0, 1)n. By the properties of Schur harmonically convex func-

tion, Shi and Zhang [11] proved that E∗r

(1 + x

1− x

)is Schur harmonically convex on

(0, 1)n. By Theorem 1, we give a new proof.

Theorem 4. The following symmetric functions are increasing and Schur harmon-

ically convex on Rn++, r = 1, 2, . . . , n,

Er

(x

1r

)=

∑1≤i1<i2<···<ir≤n

r∏j=1

x1rij, (7)

E∗r

(x

1r

)=

∏1≤i1<i2<···<ir≤n

r∑j=1

x1rij, (8)

cn

(x

1r , r)

=∑

i1+i2+···+in=r

n∏j=1

xijrj (9)

and

c∗n

(x

1r , r)

=∏

i1+i2+···+in=r

n∑j=1

ijx1rj . (10)

Proof. For r ≥ 1, let p(x) = x1r , x ∈ R++. Then p

′(x) = 1

rx1r−1 > 0, so p is

increasing on R++.

And let q(x) =1

p( 1x )

= x1r = p(x). Then q

′′(x) = 1

r ( 1r − 1)x

1r−2 ≤ 0, this means

that1

p( 1x )

is concave on R++, by Proposition 2, it follows that p is harmonically

convex on R++. Since Er(x), E∗r (x), cn(x, r) and c∗n(x, r) are all increasing and

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

917 HUAN-NAN SHI et al 907-922

Page 140: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

12 H.-N. SHI AND J. ZHANG

Schur harmonically convex function on Rn++, by Theorem 1 (iv), it follows that

Theorem 4 holds.

Remark 2. By Lemma 2, Chu and Lv [3] proved that the Hamy’s symmetric function

Er

(x

1r

)is Schur harmonically convex on Rn++. Later, K. Z. Guan and R. K. Guan

[12] further studied the harmonic convexity of the generalized Hamy symmetric

function.

By Lemma 2, Meng et al. [13] proved that the dual form of the Hamy’s symmetric

function E∗r

(x

1r

)is Schur harmonically convex on Rn++.

By Lemma 2, Chu and Sun [4] proved that cn

(x

1r , r)

is Schur harmonically

convex on Rn++ .

By Theorem 1, we give a new proof.

Since f(x) =1 + x

1− xis increasing and harmonically convex on (0, 1), from Theo-

rem 1 (iv) and Theorem 4, it follows

Theorem 5. The following symmetric functions are increasing and Schur harmon-

ically convex on (0, 1)n, r = 1, 2, . . . , n,

Er

((1 + x

1− x

) 1r

)=

∑1≤i1<i2<···<ir≤n

r∏j=1

(1 + xij1− xij

) 1r

, (11)

E∗r

((1 + x

1− x

) 1r

)=

∏1≤i1<i2<···<ir≤n

r∑j=1

(1 + xij1− xij

) 1r

, (12)

cn

((1 + x

1− x

) 1r

, r

)=

∑i1+i2+···+in=r

n∏j=1

(1 + xj1− xj

) ijr

(13)

and

c∗n

((1 + x

1− x

) 1r

, r

)=

∏i1+i2+···+in=r

n∑j=1

ij

(1 + xj1− xj

) 1r

. (14)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

918 HUAN-NAN SHI et al 907-922

Page 141: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

COMPOSITIONS INVOLVING SCHUR HARMONICALLY CONVEX FUNCTIONS 13

Remark 3. By Lemma 2, Long and Chu [14] proved that E∗r

((1+x1−x

) 1r

)is Schur

harmonically convex on (0, 1)n. By Theorem 1, we give a new proof.

Theorem 6. The following symmetric functions are increasing and Schur harmon-

ically convex on (0, 1)n, r = 1, 2, . . . , n,

Er

(x

1− x

)=

∑1≤i1<i2<···<ir≤n

r∏j=1

xij1− xij

, (15)

E∗r

(x

1− x

)=

∏1≤i1<i2<···<ir≤n

r∑j=1

xij1− xij

, (16)

cn

(x

1− x, r

)=

∑i1+i2+···+in=r

n∏j=1

(xj

1− xj

)ij(17)

and

c∗n

(x

1− x, r

)=

∏i1+i2+···+in=r

n∑j=1

ij

(xj

1− xj

). (18)

Proof. Let h(x) =x

1− x, x ∈ (0, 1). Then h

′(x) =

1

(1− x)2> 0, so h is increasing

on (0, 1).

And let k(x) =1

h( 1x )

= x− 1. Then k′′(x) = 0, this means that

1

h( 1x )

is concave

on (1,∞), by Proposition 2, it follows that h is harmonically convex on (0, 1).

Since Er(x), E∗r (x), cn(x, r) and c∗n(x, r) are all increasing and Schur harmonically

convex function on Rn++, by Theorem 1 (iv), it follows that Theorem 5 holds.

Remark 4. By the judgement theorem of Schur harmonic convexity for a class of

symmetric functions, Shi and Zhang [15] proved that Er

(x

1− x

)is Schur harmon-

ically convex on (0, 1)n. Here by Theorem 1, we give a new proof.

By the properties of Schur harmonically convex function, Shi and Zhang [11]

proved that E∗r

(x

1− x

)is Schur harmonically convex on

[1

2, 1

)n. By Theorem

1, this conclusion is extended to the collection (0, 1)n.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

919 HUAN-NAN SHI et al 907-922

Page 142: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

14 H.-N. SHI AND J. ZHANG

By Lemma 2, Sun et al. [16] proved that cn

(x

1− x, r

)is Schur harmonically

convex on [0, 1)n, here by Theorem 1, we give a new proof.

Since f(x) =x

1− xis increasing and harmonically convex on (0, 1), from Theo-

rem 1 (iv) and Theorem 4, it follows

Theorem 7. The following symmetric functions are increasing and Schur harmon-

ically convex on (0, 1)n, r = 1, 2, . . . , n,

Er

((x

1− x

) 1r

)=

∑1≤i1<i2<···<ir≤n

r∏j=1

(xij

1− xij

) 1r

, (19)

E∗r

((x

1− x

) 1r

)=

∏1≤i1<i2<···<ir≤n

r∑j=1

(xij

1− xij

) 1r

, (20)

cn

((x

1− x

) 1r

, r

)=

∑i1+i2+···+in=r

n∏j=1

(xj

1− xj

) ijr

(21)

and

c∗n

((x

1− x

) 1r

, r

)=

∏i1+i2+···+in=r

n∑j=1

ij

(xj

1− xj

) 1r

. (22)

Remark 5. By Lemma 2, Sun [17] proved that Er

((x

1− x

) 1r

)is Schur harmon-

ically convex on [0, 1)n. Here by Theorem 1, we give a new proof.

Conflict of Interests

The authors declare that there is no conflict of interests regarding the publication

of this article.

Acknowledgments

The work was supported by the Importation and Development of High-Caliber

Talents Project of Beijing Municipal Institutions (Grant No. IDHT201304089).

Thanks for the help.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

920 HUAN-NAN SHI et al 907-922

Page 143: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

COMPOSITIONS INVOLVING SCHUR HARMONICALLY CONVEX FUNCTIONS 15

References

[1] A. W. Marshall, I. Olkin, and B. C. Arnold, Inequalities: Theory of Majorization and Its

Application (Second Edition), Springer, New York, 2011.

[2] B. Y. Wang, Foundations of Majorization Inequalities, Beijing Normal University Press,

Beijing, 1990. (in Chinese)

[3] Y. M. Chu, and Y. P. Lv, The Schur harmonic convexity of the Hamy symmetric function

and its applications, Journal of Inequalities and Applications, 2009, Article ID 838529, 10

pages.

[4] Y. M. Chu, and T. C. Sun, The Schur harmonic convexity for a class of symmetric functions,

Acta Mathematica Scientia, 2010, 30B(5), 1501-1506.

[5] Y. M. Chu, G. D. Wang, and X. H. Zhang, The Schur multiplicative and harmonic convexities

of the complete symmetric function, Mathematische Nachrichten, 2011, 284(5-6), 653-663.

[6] H. N. Shi, Theory of Majorization and Analytic Inequalities, Harbin Institute of Technology

Press, Harbin, 2012. (in Chinese)

[7] H. N. Shi, Schur-concavity and Schur-geometrically convexity of dual form for elementary

symmetric function with applications, RGMIA Research Report Collection, 2007, 10(2),

http://rgmia.vu.edu.au/v10n2.html

[8] K. Z. Guan, Schur-convexity of the complete symmetric function, Mathematical Inequalities

& Applications, 2006, 9(4), 567-576.

[9] K. S. Zhang, and H. N. Shi, Schur convexity of dual form of the complete symmetric function,

Mathematical Inequalities & Applications, 2013, 16(4), 963-970.

[10] W. F. Xia, and Y. M. Chu, On Schur convexity of some symmetric functions, Journal of

Inequalities and Applications, 2010, Article ID 543250, 12 pages.

[11] H. N. Shi, and J. Zhang, Schur-convexity, Schur geometric and Schur harmonic convexities of

dual form of a class symmetric functions, Journal of Mathematical Inequalities, 2014, 8(2),

349-358.

[12] K. Z. Guan, and R. K. Guan, Some properties of a generalized Hamy symmetric function

and its applications, Journal of Mathematical Analysis and Applications, 2011, 376, 494-505.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

921 HUAN-NAN SHI et al 907-922

Page 144: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

16 H.-N. SHI AND J. ZHANG

[13] Junxia Meng, Yuming Chu, and Xiaomin Tang, The Schur-harmonic-convexity of dual form

of the Hamy symmetric function, Matematicki Vesnik, 2010, 62(1), 37-46.

[14] B. Y. Long, and Y. M. Chu, The Schur convexity and inequalities for a class of symmetric

functions, Acta Mathematica Scientia, 2012, 32A(1), 80-89. (in Chinese)

[15] H. N. Shi, and J. Zhang, Some new judgement theorems of Schur geometric and Schur har-

monic convexities for a class of symmetric functions, Journal of Inequalities and Applications

2013, 2013: 527, doi: 10.1186/1029-242X-2013-527.

[16] M. B. Sun, N. B. Chen, and S. H. Li, Some properties of a class of symmetric functions and

its applications, Mathematische Nachrichten, 2014, 287(13), 1530-1544, doi: 10.1002/man-

a.201300073.

[17] M. B. Sun, The Schur convexity for two classes of symmetric functions, Sci. Sin. Math., 2014,

44(6), 633-656, doi: 10.1360/N012013-00157. (in Chinese)

(H.-N. Shi) Department of Electronic Information, Teacher’s College, Beijing Union

University, Beijing 100011, P.R.China

E-mail address: [email protected], [email protected]

(J. Zhang) Basic Courses Department of Beijing Union University, Beijing 100101,

P.R.China

E-mail address: [email protected], [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

922 HUAN-NAN SHI et al 907-922

Page 145: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

A NOTE ON DEGENERATE GENERALIZED q-GENOCCHI

POLYNOMIALS

JONGKYUM KWON1, JIN-WOO PARK2, AND SANG JO YUN3,∗

Abstract. In this paper,we consider degenerate generalized q-Genocchi poly-

nomials arising from p-adic fermionic q-integral on Zp. We found some inter-esting identities of these polynomials.

1. Introduction

Let p be a fixed odd prime number. Throughout this paper, Zp, Qp and Cp willdenote the ring of p-adic rational integers, the field of p-adic rational numbers andthe completion of the algebraic closure of Qp, respectively. Let νp be the normalized

exponential valuation of Cp with |p|p = p−νp(p) = 1p . Let q be an indeterminate in

Cp such that |q − 1|p < p−1p−1 .

Let f(x) be a continuous function on Zp. Then the p-adic fermionic q-integralon Zp is defined by Kim to be∫

Zpf(x)dµ−q(x) = lim

N→∞

pN−1∑x=0

f(x)µ−q(x+ pNZp

)=

[2]q2

limN→∞

pN−1∑x=0

f(x)(−1)xqx, (see [9]).

(1.1)

Thus, by (1.1), we get

q

∫Zpf(x+ 1)dµ−q(x) +

∫Zpf(x)dµ−q(x) = [2]qf(0), (1.2)

and

qn∫Zpf(x+n)dµ−q(x)+(−1)n−1

∫Zpf(x)dµ−q(x) = [2]q

n−1∑l=0

f(l)ql(−1)n−1−l, (1.3)

where n ∈ N (see [5-10, 12]).It is known that the q-Euler polynomials are given by the generating function as

follows: ∫Zpe(x+y)tdµ−q(y) =

[2]qqet + 1

ext =∞∑n=0

En,q(x)tn

n!. (1.4)

When x = 0, En,q = En,q(0) are called q-Euler numbers (see [5, 9, 12]).

1991 Mathematics Subject Classification. 05A10, 05A19.∗ corresponding author.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

923 JONGKYUM KWON et al 923-928

Page 146: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

2 JONGKYUM KWON1, JIN-WOO PARK2, AND SANG JO YUN3,∗

Recently, degenerate q-Euler polynomials are introduced by he generating func-tion as follows:

[2]q

q(1 + λt)1λ + 1

(1 + λt)xλ =

∞∑n=0

En,q,λ(x)tn

n!, (see [9]). (1.5)

It is known that the q-Genocchi polynomials are given by the generating functionas follows: ∫

Zpte(x+y)tdµ−q(y) =

t[2]qqet + 1

ext =∞∑n=0

Gn,q(x)tn

n!. (1.6)

When x = 0, Gn,q = En,q(0) are called q-Genocchi numbers (see [1, 2, 4, 6-8]).Now, the degenerate q-Genocchi polynomials are introduced by the generating

function as follows:

t[2]q

q(1 + λt)1λ + 1

(1 + λt)xλ =

∞∑n=0

Gn,q,λ(x)tn

n!. (1.7)

Note that limλ→0 Gn,q,λ(x) = Gn,q(x), (n ≥ 0), (see [3]).For d ∈ N with d ≡ (mod 2) and (d, p) = 1, we set

X = lim←−N

ZdpNZ, X∗ =⋃

0<a<dp, a-p

(a+ dpZp) ,

and

a+ dpNZp =x ∈ X | x ≡ a ( mod dpN )

,

where a ∈ Z with 0 ≤ a < dpN − 1.For d ∈ N with d ≡ 1 (mod 2), let us assume that χ is a Dirichlet character with

conductor d. Now, we consider the generalized q-Genocchi polynomials attached toχ which are given by the generating function to be∫

X

χ(y)te(x+y)tdµ−q(y) =

(t[2]q

qdedt + 1

d−1∑a=0

qq(−1)aχ(a)eat

)ext

=∞∑n=0

Gn,q,χ(x)tn

n!, (see [4-6, 8]).

(1.8)

When x = 0, Gn,q,χ = Gn,q,χ(0) are called generalized q-Genocchi numbers attachedto χ.

One of the most recent papers on the theory of Genocchi polynomials and num-bers is the paper T. Kim(see [6-8]), which deals mainly with the theory of Genocchipolynomials and numbers. Facts on Bernoulli polynomials and Euler polynomials,to which Genocchi polynomials may be related, has been derived in Volkenbornintegral (see [3]). While a lot of the properties of Genocchi polynomials bear astriking resemblance to the properties of Beroulli and Euler polynomials, someproperties are rather different. Note that Genocchi polynomials occur naturally inthe areas of elementary number theory, complex analytic number theory, homo-topy theory, differential topology, theory of modular forms, p-adic analytic numbertheory, quantum physics (see [1-13]).

In the viewpoint of (1.8), we consider degenerate generalized q-Genocchi poly-nomials which are derived from the fermionic q-integral on Zp. The purpose ofthis paper is to investigate some properties and identities of degenerate generalizedq-Genocchi polynomials.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

924 JONGKYUM KWON et al 923-928

Page 147: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

DEGENERATE GENERALIZED q-GENOCCHI POLYNOMIALS 3

2. Degenerate generalized q-Genocchi polynomials

In this section, we assume that λ, t ∈ Cp with |λt|p < p−1p−1 . For d ∈ N with

d ≡ 1 (mod 2) , let χ be a Dirichlet’s character with conductor d.In the viewpoint of (1.8), we consider degenerate generalized q-Genocchi poly-

nomials which are given by the generating function to be∫X

χ(y)t(1 + λt)x+yλ dµ−q(y)

=

(t[2]q

qd(1 + λt)dλ + 1

d−1∑a=0

qa(−1)aχ(a)(1 + λt)aλ

)(1 + λt)

=∞∑n=0

Gn,χ,q,λ(x)tn

n!,

(2.1)

where d ∈ N with d ≡ 1 (mod 2).From (1.5) and (2.1), we have

∞∑n=0

Gn,χ,q,λ(x)tn

n!=

(t[2]q

qd(1 + λt)dλ + 1

d−1∑a=0

qa(−1)aχ(a)(1 + λt)a+xλ

)

=[2]q[2]qd

d−1∑a=0

qa(−1)aχ(a)

(t[2]qd

qd(1 + λt)dλ + 1

(1 + λt)dλa+xd

)

=∞∑n=0

([2]q[2]qd

d−1∑a=0

qa(−1)aχ(a)Gn,qd,λd

(a+ x

d

)dntn+1

n!

).

(2.2)

Thus, by (2.2), we get

Gn,χ,q,λ(x) =ndn−1[2]q

[2]qd

d−1∑a=0

qa(−1)aχ(a)Gn−1,qd,λd

(a+ x

d

), (n ≥ 0). (2.3)

Therefore, by (2.3), we obtain the following theorem.

Theorem 2.1. For d ∈ N with d ≡ 1 (mod 2), n ≥ 0, we have

Gn,χ,q,λ(x) =

∫X

χ(y)t(x+ y|λ)ndµ−q(y)

=n[2]q[2]qd

dn−1d−1∑a=0

χ(a)qa(−1)aGn−1,qd,λd

(a+ x

d

),

where

(x|λ)n =x(x− λ) · · · (x− λ(n− 1))

=λn(xλ

)n.

For n ≥ 0, we observe that

(x+ y|λ)n =λn(x+ y

λ

)n

= λnn∑l=0

S1(n, l)

(x+ y

λ

)l=

n∑l=0

S1(n, l)λn−l(x+ y)l.

(2.4)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

925 JONGKYUM KWON et al 923-928

Page 148: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

4 JONGKYUM KWON1, JIN-WOO PARK2, AND SANG JO YUN3,∗

By (2.4), we get∫X

χ(y)t(x+ y|λ)ndµ−q(y) =n∑l=0

S1(n, l)λn−l∫X

χ(y)t(x+ y)ldµ−q(y)

=n∑l=0

S1(n, l)λn−lGl,q,χ(x), (n ≥ 0),

(2.5)

where S1(n, l) is the Stirling number of the first kind. Therefore, by (2.5), we obtainthe following theorem.

Theorem 2.2. For n ≥ 0, we have

Gn,χ,q,λ(x) =n∑l=0

S1(n, l)λn−lGl,q,χ(x).

By replacing t by 1λ (eλt − 1) in (2.1), we get∫

X

χ(y)1

λ(eλt − 1)e(x+y)tdµ−q(y) =

∞∑m=0

Gm,χ,q,λ(x)1

m!

(1

λ(eλt − 1)

)m=∞∑m=0

Gm,χ,q,λ(x)λ−m∞∑n=m

S2(n,m)λn

n!tn

=∞∑n=0

(n∑

m=0

λn−mS2(n,m)Gm,χ,q,λ(x)

)tn

n!,

(2.6)

where S2(n,m) is the Stirling number of the second kind.From (1.8), we note that∫

X

χ(y)te(x+y)tdµ−q(y) =

(t[2]q

qdedt + 1

) d−1∑a=0

qa(−1)aχ(a)e(a+x)t

=∞∑n=0

Gn,q,χ(x)tn

n!.

(2.7)

By multiplying t on the both side (2.6), we get∫X

χ(y)te(x+y)tdµ−q(y) =∞∑n=0

(n∑

m=0

1

eλt − 1λn−m+1S2(n,m)Gm,χ,q,λ(x)

)tn+1

n!.

(2.8)

Therefore, by (2.6), (2.7) and (2.8), we obtain the following theorem.

Theorem 2.3. For n ≥ 0, we have

Gn,q,χ(x) =n−1∑m=0

n

eλt − 1λn−mS2(n− 1,m)Gm,χ,q,λ(x).

Let d ∈ N with d ≡ 1 (mod 2). From (1.3), we have

qd∫X

(x+ d|λ)nχ(x)dµ−q(x) +

∫X

(x|λ)nχ(x)dµ−q(x)

=[2]q

d−1∑a=0

χ(a)qq(−1)a(a|λ)n, (n ≥ 0).

(2.9)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

926 JONGKYUM KWON et al 923-928

Page 149: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

DEGENERATE GENERALIZED q-GENOCCHI POLYNOMIALS 5

Therefore, by Theorem 2.1 and (2.8), we obtain the following theorem.

Theorem 2.4. For d ∈ N with d ≡ 1 (mod 2), n ≥ 0, we have

qdGn,χ,q,λ(d) + Gn,χ,q,λ = t[2]q

d−1∑a=0

χ(a)qq(−1)a(a|λ)n,

where Gn,χ,q,λ = Gn,χ,q,λ(0) are called degenerate generalized q-Genocchi numbersattached to χ.

Now, we observe that

∞∑n=0

Gn,χ,q,λ(x)tn

n!=

(t[2]q

∑d−1a=0 q

a(−1)aχ(a)(1 + λt)aλ

qd(1 + λt)dλ + 1

)(1 + λt)

=

( ∞∑m=0

Gn,χ,q,λtm

m!

)( ∞∑l=0

(x|λ)ltl

l!

)

=∞∑n=0

(n∑

m=0

(n

m

)Gm,χ,q,λ(x|λ)n−m

)tn

n!.

(2.10)

Thus, by comparing the coefficients on the both sides, we obtain the followingtheorem.

Theorem 2.5. For n ≥ 0, we have

Gn,χ,q,λ(x) =n∑

m=0

(n

m

)Gm,χ,q,λ(x|λ)n−m.

Now, we observe that

(−1)n

n!Gn,χ,q,λ =

(−1)n

n!

∫X

χ(x)t(x|λ)ndµ−q(x)

=λn∫X

(−xλ + n− 1

n

)χ(x)tdµ−q(x)

=λnn∑l=0

(n− 1

l − 1

)(−1)l

λll!

∫X

χ(x)t(x| − λ)ldµ−q(x)

=n∑l=0

(n− 1

l − 1

)λn−l(−1)l

1

l!Gl,χ,q,−λ

=n∑l=1

(n− 1

l − 1

)λn−l(−1)l

Gl,χ,q,−λl!

.

(2.11)

Therefore, by (2.11), we obtain the following theorem.

Theorem 2.6. For n ≥ 0, we have

(−1)n

n!Gn,χ,q,λ =

n∑l=1

(n− 1

l − 1

)λn−l(−1)l

Gl,χ,q,−λl!

.

Note that

limλ→0Gn,χ,q,λ(x) = Gn,q,χ(x), (n ≥ 0).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

927 JONGKYUM KWON et al 923-928

Page 150: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

6 JONGKYUM KWON1, JIN-WOO PARK2, AND SANG JO YUN3,∗

References

[1] S. Araci, M. Acikgoz, H. Jolany, and Y. He, Identities involving q-Genocchi Numbers and

polynomials, Notes on Num. Theo. and Disc. Math., 20 (2014), no.5, 64-74.[2] S. Araci, M. Acikgoz, and F. Qi, On the q-Genocchi Numbers and polynomials with weight

zero and their applications, Nonlinear Func. Anal. and Appl., 18 (2013), 193-203.[3] L. Carlitz, Degenerate Stirling, Bernoulli and Eulerian numbers, Util. Math., 15 (1979),

51-88.

[4] M. Cenkci, M. Can, and V. Kurt, q-Extensions of Genocchi Numbers, J. Korean Math. Soc.,43 (2006), 183-198.

[5] T. Kim, Some identities on the q-Euler polynomials of higher-order and q-Stirling numbers

by the fermionic p-adic integral on Zp, Russ. J. Math. Phys., 16 (2009), 484-491.[6] T. Kim, On the Multiple q-Genocchi and Euler Numbers, Russ. J. Math. Phys., 15 (2008),

481-486.

[7] T. Kim, On the q-Extension of Euler and Genocchi Numbers, J. Math. Anal. Appl. 326(2007), 1458-1465.

[8] T. Kim, A note on the q-Genocchi Numbers and polynomials, J. Ineq. and Appl., 2007

Article ID 71452, 8pages,(2007).[9] T. Kim, D. S. Kim and D. V. Dolgy, Degenerate q-Euler polynomials, Adv. Difference Equ.,

2015 (2015), 13662.

[10] D. S. Kim, T. Kim, D. V. Dolgy and T. Komatsu, Barnes-type degenerate Bernoulli polyno-mials, Adv. Stud. Contemp. Math., 25 (2015), 121-146.

[11] Q. M. Luo and F. Qi, Relationship between generalized Bernoulli numbers and polynomialsand generalized Euler numbers and polynomials, Adv. Stud. Contemp. Math., 7 (2003), 11-18.

[12] S. H. Rim and J. Jeong, On the modified q-Euler numbers of higher-order with weight, Adv.

Stud. Contemp. Math., 22 (2012), 93-98.[13] E. Sen, Theorems on Apostol-Euler polynomials of higher-order arising from Euler basis,

Adv. Stud. Contemp. Math., 23 (2013), 337-345..

1 Department of Mathematics educations and RINS, Gyeongsang National Univer-

sity, JinJu, 52828, Republic of KoreaE-mail address: [email protected]

2 Department of Mathematics education, Daegu University, Gyeongsan, 712-714, Ko-rea.

E-mail address: [email protected]

3 Department of Mathematics education, Daegu University, Gyeongsan, 712-714, Ko-

rea

E-mail address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

928 JONGKYUM KWON et al 923-928

Page 151: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Cubic soft ideals in BCK/BCI-algebras

Young Bae Jun1, G. Muhiuddin2, Mehmet Ali Ozturk3 and

Eun Hwan Roh4,∗1Department of Mathematics Education, Gyeongsang National University, Jinju 660-701, Korea2Department of Mathematics, University of Tabuk, P. O. Box 741, Tabuk 71491, Saudi Arabia

3Department of Mathematics, Faculty of Arts and Sciences, Adıyaman University 02040

Adıyaman, Turkey4Department of Mathematics Education, Chinju National University of Education, Jinju

660-756, Korea

Abstract. The notions of cubic soft -subalgebras and (closed) cubic soft ideals in BCK/BCI-algebras are intro-

duced, and related properties are investigated. Relations between cubic soft subalgebras, cubic soft -subalgebras

and (closed) cubic soft ideals are discussed. Conditions for a cubic soft subalgebras to be a (closed) cubic soft

ideals are provided. Characterizations of cubic soft ideals are considered. R-union and R-intersection of cubic soft

ideals are discussed.

1. Introduction

To solve complicated problems in economics, engineering, and environment, we can’t success-

fully use classical methods because of various uncertainties typical for those problems. Uncer-

tainties can’t be handled using traditional mathematical tools but may be dealt with using a wide

range of existing theories such as probability theory, theory of (intuitionistic) fuzzy sets, theory

of vague sets, theory of interval mathematics, and theory of rough sets. However, all of these

theories have their own difficulties which are pointed out in [8]. Maji et al. [5] and Molodtsov [8]

suggested that one reason for these difficulties may be due to the inadequacy of the parametriza-

tion tool of the theory. To overcome these difficulties, Molodtsov [8] introduced the concept of

soft set as a new mathematical tool for dealing with uncertainties that is free from the difficulties

that have troubled the usual theoretical approaches. Molodtsov pointed out several directions

for the applications of soft sets. At present, works on the soft set theory are progressing rapidly.

Maji et al. [5] described the application of soft set theory to a decision making problem. Maji

et al. [6] also studied several operations on the theory of soft sets. Jun et al. [2, 4] applied the

notion of soft sets to BCK/BCI-algebras and d-algebras.

02010 Mathematics Subject Classification: 06F35, 03G25, 06D72..0Keywords: cubic soft subalgebra, cubic soft -subalgebra, (closed) cubic soft ideal, R-union, R-intersection.

∗ The corresponding author. Tel: +82 55 740 12320E-mail: [email protected] (Y. B. Jun); [email protected] (G. Muhiuddin);

[email protected] (M. A. Ozturk); [email protected] (E. H. Roh)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

929 Young Bae Jun et al 929-940

Page 152: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Young Bae Jun, Seok Zun Song and Sun Shin Ahn

Combining cubic sets and soft sets, Muhiuddin and Al-roqi [10] introduced the notions of

(internal, external) cubic soft sets, P-cubic (resp. R-cubic) soft subsets, R-union (resp. R-

intersection, P-union, P-intersection) of cubic soft sets, and the complement of a cubic soft

set. They investigated several related properties, and applied the notion of cubic soft sets to

BCK/BCI-algebras. In [9], Muhiuddin et al. considered several basic operations of cubic soft

sets, namely, “AND” operation and ”OR” operation based on the P-order and the R-order.

They provided an example to illustrate that the R-union of two internal cubic soft sets might

not be internal. They also discussed conditions for the R-union of two internal cubic soft sets

to be an internal cubic soft set, and investigated several properties of cubic soft subalgebras in

BCK/BCI-algebras based on a parameter.

In this paper, we introduce the notions of cubic soft -subalgebras and (closed) cubic soft ideals

in BCK/BCI-algebras, and investigate related properties. We consider relations between cubic

soft subalgebras, cubic soft -subalgebras and (closed) cubic soft ideals, and provide conditions

for a cubic soft subalgebras to be a (closed) cubic soft ideals. We discuss characterizations of

cubic soft ideals. We show that the R-intersection of cubic soft ideals is a cubic soft ideal. We

also show that if parameter sets are mutually disjoint then the R-union of cubic soft ideals is a

cubic soft ideal. We provide an example to show that the R-union of cubic soft ideals is not a

cubic soft ideal when parameter sets are not disjoint.

2. Preliminaries

An algebra (X; ∗, 0) of type (2, 0) is called a BCI-algebra if it satisfies the following axioms:

(I) (∀x, y, z ∈ X) (((x ∗ y) ∗ (x ∗ z)) ∗ (z ∗ y) = 0),

(II) (∀x, y ∈ X) ((x ∗ (x ∗ y)) ∗ y = 0),

(III) (∀x ∈ X) (x ∗ x = 0),

(IV) (∀x, y ∈ X) (x ∗ y = 0, y ∗ x = 0 ⇒ x = y).

If a BCI-algebra X satisfies the following identity:

(V) (∀x ∈ X) (0 ∗ x = 0),

then X is called a BCK-algebra. Any BCK/BCI-algebra X satisfies the following conditions:

(a1) (∀x ∈ X) (x ∗ 0 = x),

(a2) (∀x, y, z ∈ X) (x ∗ y = 0 ⇒ (x ∗ z) ∗ (y ∗ z) = 0, (z ∗ y) ∗ (z ∗ x) = 0),

(a3) (∀x, y, z ∈ X) ((x ∗ y) ∗ z = (x ∗ z) ∗ y),

(a4) (∀x, y, z ∈ X) (((x ∗ z) ∗ (y ∗ z)) ∗ (x ∗ y) = 0).

We can define a partial ordering ≤ by x ≤ y if and only if x ∗ y = 0. A BCK-algebra X is said

to be with condition (S) if, for all x, y ∈ X, the set z ∈ X | z ∗ x ≤ y has a greatest element,

written x y. A BCI-algebra X is said to be p-semisimple if its BCK-part is equal to 0. In a

p-semisimple BCI-algebra, the following conditions are valid:

(a5) (∀x, y ∈ X) (0 ∗ (x ∗ y) = y ∗ x).

(a6) (∀x, y ∈ X) (x ∗ (x ∗ y) = y).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

930 Young Bae Jun et al 929-940

Page 153: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Cubic soft ideals in BCK/BCI-algebras

A nonempty subset S of a BCK/BCI-algebra X is called a subalgebra of X if x ∗ y ∈ S for

all x, y ∈ S. A subset I of a BCK/BCI-algebra X is called an ideal of X if it satisfies, for all

x, y ∈ X, the following conditions:

(b1) 0 ∈ I,

(b2) x ∗ y ∈ I, y ∈ I ⇒ x ∈ I.

An ideal I of a BCI-algebra X is said to be closed if 0 ∗ x ∈ I for all x ∈ I. We refer the reader

to the books [1, 7] for further information regarding BCK/BCI-algebras.

By an interval number we mean a closed subinterval a = [a−, a+] of I, where 0 ≤ a− ≤ a+ ≤ 1.

Denote by [I] the set of all interval numbers. Let us define what is known as refined minimum

and refined maximun (briefly, rmin and rmax) of two elements in [I ]. We also define the symbols

“º”, “¹”, “=” in case of two elements in [I]. Consider two interval numbers a1 :=[a−1 , a+

1

]and

a2 :=[a−2 , a+

2

]. Then

rmin a1, a2 =[min

a−1 , a−2

, min

a+

1 , a+2

],

rmax a1, a2 =[max

a−1 , a−2

, max

a+

1 , a+2

],

a1 º a2 if and only if a−1 ≥ a−2 and a+1 ≥ a+

2 ,

and similarly we may have a1 ¹ a2 and a1 = a2. To say a1 Â a2 (resp. a1 ≺ a2) we mean a1 º a2

and a1 6= a2 (resp. a1 ¹ a2 and a1 6= a2).

Let X be a nonempty set. A function A : X → [I] is called an interval-valued fuzzy set

(briefly, an IVF set) in X. Let [I]X stand for the set of all IVF sets in X. For every A ∈ [I]X and

x ∈ X, A(x) = [A−(x), A+(x)] is called the degree of membership of an element x to A, where

A− : X → I and A+ : X → I are fuzzy sets in X which are called a lower fuzzy set and an upper

fuzzy set in X, respectively. For simplicity, we denote A = [A−, A+].

Molodtsov [8] defined the soft set in the following way: Let U be an initial universe set and E

be a set of parameters. Let P(U) denotes the power set of U and A ⊂ E.

Definition 2.1 ([8]). A pair (F,A) is called a soft set over U, where F is a mapping given by

F : A → P(U).

In other words, a soft set over U is a parameterized family of subsets of the universe U. For

ε ∈ A, F (ε) may be considered as the set of ε-approximate elements of the soft set (F,A). Clearly,

a soft set is not a set. For illustration, Molodtsov considered several examples in [8].

Definition 2.2 ([3]). Let U be a universe. By a cubic set in U we mean a structure

A = 〈x,A(x), λ(x)〉 | x ∈ Uin which A is an IVF set in U and λ is a fuzzy set in U.

In what follows, a cubic set A = 〈x, µA(x), λA(x)〉 | x ∈ U is simply denoted by A =

〈µA, λA〉, and denote by CU the collection of all cubic sets in U.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

931 Young Bae Jun et al 929-940

Page 154: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Young Bae Jun, Seok Zun Song and Sun Shin Ahn

Definition 2.3 ([10]). Let U be an initial universe set and let E be a set of parameters. A cubic

soft set over U is defined to be a pair (F , A) where F is a mapping from A to CU and A ⊂ E.

Note that the pair (F , A) can be represented as the following set:

(F , A) := F (ε) | ε ∈ A where F (ε) = 〈µF (ε), λF (ε)〉.

3. Cubic soft ideals

In what follows, let U be an initial universe set which is a BCK/BCI-algebra unless otherwise

specified.

Definition 3.1 ([10]). A cubic soft set (F , A) over U is said to be a cubic soft BCK/BCI-

algebra over U based on a parameter ε (briefly, ε-cubic soft subalgebra over U) if there exists a

parameter ε ∈ A such that

µF (ε)(x ∗ y) º rminµF (ε)(x), µF (ε)(y) (3.1)

λF (ε)(x ∗ y) ≤ maxλF (ε)(x), λF (ε)(y) (3.2)

for all x, y ∈ U. If (F , A) is an ε-cubic soft subalgebra over U for all ε ∈ A, we say that (F , A)

is a cubic soft subalgebra over U .

Definition 3.2. Let U be a BCK-algebra with the condition (S). Given a parameter ε ∈ A, a

cubic soft set (F , A) over U is said to be a cubic soft -subalgebra over U based on ε (briefly,

ε-cubic soft -subalgebra over U) if it satisfies the following conditions:

µF (ε)(x y) º rminµF (ε)(x), µF (ε)(y) (3.3)

λF (ε)(x y) ≤ maxλF (ε)(x), λF (ε)(y) (3.4)

for all x, y ∈ U. If (F , A) is an ε-cubic soft -subalgebra over U for all ε ∈ A, we say that (F , A)

is a cubic soft -subalgebra over U .

Definition 3.3. Given a parameter ε ∈ A, a cubic soft set (F , A) over U is said to be a cubic soft

ideal over U based on ε (briefly, ε-cubic soft ideal over U) if it satisfies the following conditions:

µF (ε)(0) º µF (ε)(x), λF (ε)(0) ≤ λF (ε)(x), (3.5)

µF (ε)(x) º rminµF (ε)(x ∗ y), µF (ε)(y) (3.6)

λF (ε)(x) ≤ maxλF (ε)(x ∗ y), λF (ε)(y) (3.7)

for all x, y ∈ U. If (F , A) is an ε-cubic soft ideal over U for all ε ∈ A, we say that (F , A) is a

cubic soft ideal over U .

Example 3.4. Let (Y, ∗, 0) be a BCI-algebra and consider the adjoint BCI-algebra (Z,−, 0) of

the additive group (Z, +, 0) of integers. Then the direct product U := Y × Z of Y and Z is a

BCI-algebra (see [1]). For any ε ∈ A, let (F , A) be a soft set over U defined by

µF (ε)(x) =

a = [a−, a+]( 6= [0, 0]) if x ∈ Y × N0,

[0,0] otherwise,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

932 Young Bae Jun et al 929-940

Page 155: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Cubic soft ideals in BCK/BCI-algebras

λF (ε)(x) =

s if x ∈ Y × N0,

t otherwise,

where N is the set of natural numbers, N0 = N ∪ 0 and s, t ∈ [0, 1] with s < t. Then (F , A) is

an ε-cubic soft ideal over U .

Example 3.5. Let U = 0, a, b, c be a BCI-algebra with the following Cayley table 1:

Table 1. Cayley table of the operation ∗

∗ 0 a b c

0 0 0 0 c

a a 0 0 c

b b b 0 c

c c c c 0

Let (F , A) be a cubic soft set over U , where A = ε1, ε2, ε3, with the tabular representation

in Table 2.

Table 2. Tabular representation of the cubic soft set (F , A)

ε1 ε2 ε3

0 〈[0.5, 0.8], 0.6〉 〈[0.8, 1.0], 0.1〉 〈[0.4, 0.6], 0.7〉a 〈[0.8, 0.9], 0.7〉 〈[0.3, 0.7], 0.8〉 〈[0.1, 0.2], 0.7〉b 〈[0.1, 0.7], 0.5〉 〈[0.3, 0.7], 0.8〉 〈[0.1, 0.7], 0.3〉c 〈[0.2, 0.6], 0.9〉 〈[0.3, 0.7], 0.8〉 〈[0.3, 0.6], 0.2〉

Then (F , A) is not an ε1-cubic soft ideal over U since

µF (ε1)(0) = [0.5, 0.8] [0.8, 0.9] = µF (ε1)(a).

We know that (F , A) is an ε2-cubic soft ideal over U . (F , A) is not an ε3-cubic soft ideal over

U since

µF (ε3)(a) = [0.1, 0.2] [0.3, 0.6] = rminµF (ε3)(a ∗ c), µF (ε3)(c).Proposition 3.6. If (F , A) is an ε-cubic soft ideal over U , then

(∀x, y ∈ U)(x ≤ y ⇒ µF (ε)(y) ¹ µF (ε)(x), λF (ε)(y) ≥ λF (ε)(x)

).

Proof. Let x, y ∈ U be such that x ≤ y. Then x ∗ y = 0, and so

µF (ε)(x) º rminµF (ε)(x ∗ y), µF (ε)(y)= rminµF (ε)(0), µF (ε)(y) = µF (ε)(y)

and

λF (ε)(x) ≤ maxλF (ε)(x ∗ y), λF (ε)(y)= maxλF (ε)(0), λF (ε)(y) = λF (ε)(y).

This completes the proof. ¤

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

933 Young Bae Jun et al 929-940

Page 156: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Young Bae Jun, Seok Zun Song and Sun Shin Ahn

Proposition 3.7. Let (F , A) be an ε-cubic soft ideal over U for a parameter ε ∈ A. If the

inequality x ∗ y ≤ z holds in U , then

µF (ε)(x) º rminµF (ε)(y), µF (ε)(z)and λF (ε)(x) ≤ maxλF (ε)(y), λF (ε)(z).Proof. Assume that x ∗ y ≤ z for all x, y, z ∈ U . Then

µF (ε)(x ∗ y) º rminµF (ε)((x ∗ y) ∗ z), µF (ε)(z)= rminµF (ε)(0), µF (ε)(z) = µF (ε)(z)

(3.8)

and

λF (ε)(x ∗ y) ≤ maxλF (ε)((x ∗ y) ∗ z), λF (ε)(z)= maxλF (ε)(0), λF (ε)(z) = λF (ε)(z),

(3.9)

which implies from (3.6) and (3.7) that

µF (ε)(x) º rminµF (ε)(x ∗ y), µF (ε)(y)º rminµF (ε)(y), µF (ε)(z)

and

λF (ε)(x) ≤ maxλF (ε)(x ∗ y), λF (ε)(y)≤ maxλF (ε)(y), λF (ε)(z).

This completes the proof. ¤

Theorem 3.8. In a BCK-algebra U with the condition (S), every ε-cubic soft ideal (F , A) over

U is an ε-cubic soft -subalgebra over U for all ε ∈ A.

Proof. Let ε ∈ A. Since U has the condition (S), we have (x y) ∗ x ≤ y for all x, y ∈ U. Hence

(3.6), (3.7) and Proposition 3.6 imply that

µF (ε)(x y) º rminµF (ε)((x y) ∗ x), µF (ε)(x) º rminµF (ε)(x), µF (ε)(y)and

λF (ε)(x y) ≤ maxλF (ε)((x y) ∗ x), λF (ε)(x) ≤ maxλF (ε)(x), λF (ε)(y)for all x, y ∈ U. Therefore (F , A) is an ε-cubic soft -subalgebra over U for all ε ∈ A. ¤

Theorem 3.9. In a BCK-algebra U, if (F , A) is an ε-cubic soft ideal over U , then it is an

ε-cubic soft subalgebra over U for all ε ∈ A.

Proof. Let (F , A) be an ε-cubic soft ideal over U where ε ∈ A. For any x, y ∈ U, we have

µF (ε)(x ∗ y) º rminµF (ε)((x ∗ y) ∗ x), µF (ε)(x)

= rminµF (ε)(0), µF (ε)(x)

= µF (ε)(x)

and λF (ε)(x ∗ y) ≤ maxλF (ε)((x ∗ y) ∗ x), λF (ε)(x) = maxλF (ε)(0), λF (ε)(x) = λF (ε)(x).

Therefore (F , A) is an ε-cubic soft subalgebra over U . ¤

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

934 Young Bae Jun et al 929-940

Page 157: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Cubic soft ideals in BCK/BCI-algebras

Theorem 3.9 is not true in a BCI-algebra. In fact, the ε-cubic soft ideal (F , A) in Example

3.4 is not an ε-cubic soft subalgebra over U since

µF (ε) ((0, 0) ∗ (0, 1)) = µF (ε)(0,−1) = [0, 0] a = [a−, a+]

= rminµF (ε)(0, 0), µF (ε)(0, 1)

and/or

λF (ε) ((0, 0) ∗ (0, 1)) = λF (ε)(0,−1) = t s = maxλF (ε)(0, 0), λF (ε)(0, 1)

.

Definition 3.10. Let U be a BCI-algebra and ε ∈ A. An ε-cubic soft ideal (F , A) over U is

said to be closed if µF (ε)(0 ∗ x) º µF (ε)(x) and λF (ε)(0 ∗ x) ≤ λF (ε)(x) for all x ∈ U.

Example 3.11. The ε2-cubic soft ideal (F , A) in Example 3.5 is closed.

Theorem 3.12. In a BCI-algebra, every closed cubic soft ideal is a cubic soft subalgebra.

Proof. Let (F , A) be a closed cubic soft ideal over U . Then µF (ε)(0 ∗x) º µF (ε)(x) and λF (ε)(0 ∗x) ≤ λF (ε)(x) for all x ∈ U. It follows from (a3), (3.6) and (3.7) that

µF (ε)(x ∗ y) º rminµF (ε)((x ∗ y) ∗ x), µF (ε)(x)= rminµF (ε)(0 ∗ y), µF (ε)(x)º rminµF (ε)(y), µF (ε)(x)

and

λF (ε)(x ∗ y) º rminλF (ε)((x ∗ y) ∗ x), λF (ε)(x)= maxλF (ε)(0 ∗ y), λF (ε)(x)≤ maxλF (ε)(y), λF (ε)(x)

for all x, y ∈ U . Therefore (F , A) is a cubic soft ideal over U . ¤

We provide a condition for a cubic soft subalgebra over U to be a (closed) cubic soft ideal over

U .

Theorem 3.13. In a p-semisimple BCI-algebra U , every cubic soft subalgebra over U is a closed

cubic soft ideal over U .

Proof. Let (F , A) be a cubic soft subalgebra over a p-semisimple BCI-algebra U and let ε ∈ A

be a parameter. For every x ∈ U , we have

µF (ε)(0) = µF (ε)(x ∗ x) º rminµF (ε)(x), µF (ε)(x) = µF (ε)(x),

λF (ε)(0) = λF (ε)(x ∗ x) ≤ maxλF (ε)(x), λF (ε)(x) = λF (ε)(x).(3.10)

Using (3.1), (3.2) and (3.10), we get

µF (ε)(0 ∗ x) º rminµF (ε)(0), µF (ε)(x) = µF (ε)(x),

λF (ε)(0 ∗ x) ≤ maxλF (ε)(0), λF (ε)(x) = λF (ε)(x).(3.11)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

935 Young Bae Jun et al 929-940

Page 158: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Young Bae Jun, Seok Zun Song and Sun Shin Ahn

For any x, y ∈ U , we have

µF (ε)(x) = µF (ε)(y ∗ (y ∗ x)) º rminµF (ε)(y), µF (ε)(y ∗ x)= rminµF (ε)(y), µF (ε)(0 ∗ (x ∗ y))º rminµF (ε)(x ∗ y), µF (ε)(y)

and

λF (ε)(x) = λF (ε)(y ∗ (y ∗ x)) ≤ maxλF (ε)(y), λF (ε)(y ∗ x)= maxλF (ε)(y), λF (ε)(0 ∗ (x ∗ y))≤ maxλF (ε)(x ∗ y), λF (ε)(y)

by using (a6), (3.1), (3.2), (a5) and (3.11). Therefore (F , A) is a closed cubic soft ideal over

U . ¤Corollary 3.14. If a BCI-algebra U satisfies any one of the following conditions:

• U = 0 ∗ x | x ∈ U,• every element of U is minimal,

• (∀x, y ∈ U) (x ∗ (0 ∗ y) = y ∗ (0 ∗ x)),

• (∀x ∈ U) (0 ∗ x = 0 ⇒ x = 0),

• (∀x, y ∈ U) ((x ∗ y) ∗ z = x ∗ (y ∗ z)),

• (∀x, y ∈ U) (x ∗ y = y ∗ x),

• (∀x ∈ U) (0 ∗ x = x),

• (∀x, y, z ∈ U) ((x ∗ y) ∗ (x ∗ z) = z ∗ y),

then every cubic soft subalgebra over U is a closed cubic soft ideal over U .

Theorem 3.15. For a cubic soft set (F , A) over a BCK-algebra U with condition (S) and a

parameter ε ∈ A, the following are equivalent.

(i) (F , A) is an ε-cubic soft ideal over U .

(ii) For every x, y, z ∈ U , if x ≤ yz, then µF (ε)(x) º rminµF (ε)(y), µF (ε)(z) and λF (ε)(x) ≤maxλF (ε)(y), λF (ε)(z).

Proof. Assume that (F , A) is an ε-cubic soft ideal over U and x ≤ y z for all x, y, z ∈ U . Then

µF (ε)(x) º rminµF (ε)(x ∗ (y z)), µF (ε)(y z)= rminµF (ε)(0), µF (ε)(y z)= µF (ε)(y z)

º rminµF (ε)(y), µF (ε)(z)and

λF (ε)(x) ≤ maxλF (ε)(x ∗ (y z)), λF (ε)(y z)= maxλF (ε)(0), λF (ε)(y z)= λF (ε)(y z)

≤ maxλF (ε)(y), λF (ε)(z).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

936 Young Bae Jun et al 929-940

Page 159: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Cubic soft ideals in BCK/BCI-algebras

Conversely suppose that (ii) is valid. Since 0 ≤ x x for all x ∈ U , it follows from (ii) that

µF (ε)(0) º rminµF (ε)(x), µF (ε)(x) = µF (ε)(x)

and

λF (ε)(0) ≤ maxλF (ε)(x), λF (ε)(x) = λF (ε)(x)

for all x ∈ U . Since x ≤ (x ∗ y) y for all x, y ∈ U , we have

µF (ε)(x) º rminµF (ε)(x ∗ y), µF (ε)(y)and

λF (ε)(x) ≤ maxλF (ε)(x ∗ y), λF (ε)(y)for all x, y ∈ U . Therefore (F , A) is an ε-cubic soft ideal over U . ¤

Theorem 3.16. Given a parameter ε ∈ A, a cubic soft set (F , A) over U is an ε-cubic soft ideal

over U if and only if the nonempty sets

µ⇐F (ε)[δ1, δ2] :=x ∈ U | µF (ε)(x) º [δ1, δ2]

and

λ→F (ε)(t) :=x ∈ U | λF (ε)(x) ≤ t

are ideals of U for all [δ1, δ2] ∈ [I] and t ∈ [0, 1].

Proof. Assume that a cubic soft set (F , A) over U is an ε-cubic soft ideal over U . Suppose that

µ⇐F (ε)[δ1, δ2]∩λ→F (ε)(t) 6= ∅ for all [δ1, δ2] ∈ [I] and t ∈ [0, 1]. Obviously, 0 ∈ µ⇐F (ε)[δ1, δ2]∩λ→F (ε)(t).

Let x and y be elements of U such that x∗y ∈ µ⇐F (ε)[δ1, δ2] and y ∈ µ⇐F (ε)[δ1, δ2]. Then µF (ε)(x∗y) º[δ1, δ2] and µF (ε)(y) º [δ1, δ2]. It follows from (3.6) that

µF (ε)(x) º rminµF (ε)(x ∗ y), µF (ε)(y) º rmin[δ1, δ2], [δ1, δ2] = [δ1, δ2].

Hence x ∈ µ⇐F (ε)[δ1, δ2]. Now if x ∗ y, y ∈ λ→F (ε)(t), then λF (ε)(x ∗ y) ≤ t and λF (ε)(y) ≤ t.

Using (3.7), we have λF (ε)(x) ≤ maxλF (ε)(x ∗ y), λF (ε)(y) ≤ t, and so x ∈ λ→F (ε)(t). Therefore

µ⇐F (ε)[δ1, δ2] and λ→F (ε)(t) are ideals of U.

Conversely, suppose that µ⇐F (ε)[δ1, δ2] and λ→F (ε)(t) are ideals of U for all [δ1, δ2] ∈ [I] and

t ∈ [0, 1]. Assume that there exists a ∈ U such that µF (ε)(0) µF (ε)(a) or λF (ε)(0) > λF (ε)(a).

Let µF (ε)(0) = [0−, 0+] and µF (ε)(a) = [a−, a+]. Then 0− < a− and 0+ < a+ which imply that

0− < δ1 < a− and 0+ < δ2 < a+, that is,

µF (ε)(0) = [0−, 0+] < [δ1, δ2] < [a−, a+]

by taking [δ1, δ2] :=[

12(0− + a−), 1

2(0+ + a+)

]. Hence 0 /∈ µ⇐F (ε)[δ1, δ2]. Also 0 /∈ λ→F (ε)(at) where

at = λF (ε)(a). This is a contradiction, and so (3.5) is valid. Assume that there exist a, b ∈ U

such that

µF (ε)(a) rminµF (ε)(a ∗ b), µF (ε)(b) (3.12)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

937 Young Bae Jun et al 929-940

Page 160: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Young Bae Jun, Seok Zun Song and Sun Shin Ahn

or

λF (ε)(a) > maxλF (ε)(a ∗ b), λF (ε)(b). (3.13)

For the case (3.12), let µF (ε)(a) = [δ1, δ2], µF (ε)(a ∗ b) = [γ1, γ2] and µF (ε)(b) = [γ3, γ4]. Then

[δ1, δ2] ≺ rmin[γ1, γ2], [γ3, γ4] = [minγ1, γ3, minγ2, γ4].

Hence δ1 < minγ1, γ3 and δ2 < minγ2, γ4. Taking

[τ1, τ2] = 12

(µF (ε)(a) + rminµF (ε)(a ∗ b), µF (ε)(b)

)

implies that

[τ1, τ2] = 12([δ1, δ2] + [minγ1, γ3, minγ2, γ4])

=[

12(δ1 + minγ1, γ3) , 1

2(δ2 + minγ2, γ4)

].

It follows that

minγ1, γ3 > τ1 = 12(δ1 + minγ1, γ3) > δ1,

minγ2, γ4 > τ2 = 12(δ2 + minγ2, γ4) > δ2,

and so that

[minγ1, γ3, minγ2, γ4] Â [τ1, τ2] Â [δ1, δ2] = µF (ε)(a).

Therefore a /∈ µ⇐F (ε)[τ1, τ2]. On the other hand, we know that

µF (ε)(a ∗ b) = [γ1, γ2] º [minγ1, γ3, minγ2, γ4] Â [τ1, τ2],

µF (ε)(b) = [γ3, γ4] º [minγ1, γ3, minγ2, γ4] Â [τ1, τ2],

which imply that a ∗ b, b ∈ µ⇐F (ε)[τ1, τ2]. This is a contradiction, and so

µF (ε)(x) º rminµF (ε)(x ∗ y), µF (ε)(y)for all x, y ∈ U. Now, (3.13) implies that there exists t0 ∈ (0, 1) such that

λF (ε)(a) ≥ t0 > maxλF (ε)(a ∗ b), λF (ε)(b).Hence a ∗ b, b ∈ λ→F (ε)(t0) but a /∈ λ→F (ε)(t0). This is a contradiction, and therefore

λF (ε)(x) ≤ maxλF (ε)(x ∗ y), λF (ε)(y)for all x, y ∈ U. Consequently, (F , A) is an ε-cubic soft ideal over U . ¤

Definition 3.17 ([10]). The R-union of cubic soft sets (F , A) and (G , B) over U is a cubic soft

set (H , C) where C = A ∪B and

H (ε) =

F (ε) if ε ∈ A \B,

G (ε) if ε ∈ B \ A,

F (ε) ∪R G (ε) if ε ∈ A ∩B

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

938 Young Bae Jun et al 929-940

Page 161: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Cubic soft ideals in BCK/BCI-algebras

for all ε ∈ C. This is denoted by (H , C) = (F , A) dR (G , B). Also the R-intersection of cubic

soft sets (F , A) and (G , B) over U is a cubic soft set (H , C) where C = A ∪B and

H (ε) =

F (ε) if ε ∈ A \B,

G (ε) if ε ∈ B \ A,

F (ε) ∩R G (ε) if ε ∈ A ∩B

for all ε ∈ C. This is denoted by (H , C) = (F , A) eR (G , B).

Theorem 3.18. If (F , A) and (G , B) are cubic soft ideals over U , then so is the R-intersection

(H , C) = (F , A) eR (G , B) of (F , A) and (G , B).

Proof. Straightforward. ¤

Theorem 3.19. Let (F , A) and (G , B) be cubic soft ideals over U . If A and B are disjoint,

then the R-union of (F , A) and (G , B) is a cubic soft ideal over U .

Proof. By means of Definition 3.17, we can write (F , A) dR (G , B) = (H , C), where C = A∪B

and for all ε ∈ C,

H (ε) =

F (ε) if ε ∈ A \B,

G (ε) if ε ∈ B \ A,

F (ε) ∪R G (ε) if ε ∈ A ∩B

Since A ∩ B = ∅, either ε ∈ A \ B or ε ∈ B \ A for all ε ∈ C. If ε ∈ A \ B, then H (ε) = F (ε)

is a cubic soft ideal over U . If ε ∈ B \ A, then H (ε) = G (ε) is a cubic soft ideal over U . Hence

(H , C) = (F , A) dR (G , B) is a cubic soft ideal over U . ¤

The following example shows that Theorem 3.19 is not valid if A and B are not disjoint.

Example 3.20. Let U = 0, a, b, c be a BCI-algebra with the Cayley table in Table 3.

Table 3. Cayley table of the operation ∗

∗ 0 a b c

0 0 a b c

a a 0 c b

b b c 0 a

c c b a 0

Consider sets of parameters A := ε1, ε2, ε3 and B := ε3, ε4. Then A and B are not disjoint.

Let (F , A) and (G , B) be cubic soft sets over U with the tabular representations in Table 4 and

Table 5, respectively.

Then (F , A) and (G , B) are cubic soft ideals over U , and the R-union (H , C) = (F , A)dR(G , B)

of (F , A) and (G , B) is represented by Table 6.

Note that

µH (ε3)(c) = [0.4, 0.7] [0.6, 0.8] = rminµH (ε3)(c ∗ a), µH (ε3)(a)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

939 Young Bae Jun et al 929-940

Page 162: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Young Bae Jun, Seok Zun Song and Sun Shin Ahn

Table 4. Tabular representation of the cubic soft set (F , A)

ε1 ε2 ε3

0 〈[0.6, 0.8], 0.3〉 〈[0.5, 0.9], 0.4〉 〈[0.7, 0.9], 0.3〉a 〈[0.3, 0.7], 0.5〉 〈[0.2, 0.5], 0.7〉 〈[0.6, 0.8], 0.8〉b 〈[0.3, 0.7], 0.5〉 〈[0.3, 0.6], 0.7〉 〈[0.4, 0.7], 0.8〉c 〈[0.3, 0.7], 0.5〉 〈[0.2, 0.5], 0.6〉 〈[0.4, 0.7], 0.5〉

Table 5. Tabular representation of the cubic soft set (G , B)

ε3 ε4

0 〈[0.7, 1.0], 0.2〉 〈[0.4, 0.8], 0.1〉a 〈[0.3, 0.7], 0.7〉 〈[0.2, 0.6], 0.3〉b 〈[0.6, 0.8], 0.4〉 〈[0.2, 0.6], 0.6〉c 〈[0.3, 0.7], 0.7〉 〈[0.4, 0.8], 0.6〉

Table 6. Tabular representation of the cubic soft set (H , C)

ε1 ε2 ε3 ε4

0 〈[0.6, 0.8], 0.3〉 〈[0.5, 0.9], 0.4〉 〈[0.7, 1.0], 0.2〉 〈[0.4, 0.8], 0.1〉a 〈[0.3, 0.7], 0.5〉 〈[0.2, 0.5], 0.7〉 〈[0.6, 0.8], 0.7〉 〈[0.2, 0.6], 0.3〉b 〈[0.3, 0.7], 0.5〉 〈[0.3, 0.6], 0.7〉 〈[0.6, 0.8], 0.4〉 〈[0.2, 0.6], 0.6〉c 〈[0.3, 0.7], 0.5〉 〈[0.2, 0.5], 0.6〉 〈[0.4, 0.7], 0.5〉 〈[0.4, 0.8], 0.6〉

and/or λH (ε3)(a) = 0.7 0.5 = maxλH (ε3)(a ∗ b), λH (ε3)(b). Hence the R-union (H , C) =

(F , A) dR (G , B) of (F , A) and (G , B) is not a cubic soft ideal over U .

References

[1] Y. Huang, BCI-algebra, Science Press, Beijing 2006.[2] Y. B. Jun, Soft BCK/BCI-algerbas, Comput. Math. Appl. 56 (2008) 1408–1413.[3] Y. B. Jun, C. S. Kim and K. O. Yang, Cubic sets, Ann. Fuzzy Math. Inform. 4(1) (2012) 83–98.[4] Y. B. Jun, K. J. Lee, C. H. Park, Soft set theory applied to ideals in d-algebras, Comput. Math. Appl. 57

(2009) 367–378.[5] P. K. Maji, A. R. Roy, R. Biswas, An application of soft sets in a decision making problem, Comput. Math.

Appl. 44 (2002) 1077–1083.[6] P. K. Maji, R. Biswas, A. R. Roy, Soft set theory, Comput. Math. Appl. 45 (2003) 555–562.[7] J. Meng and Y. B. Jun, BCK-algebras, Kyungmoon Sa Co., Seoul, 1994.[8] D. Molodtsov, Soft set theory - First results, Comput. Math. Appl. 37 (1999) 19–31.[9] G. Muhiuddin, F. Feng and Y. B. Jun, Subalgerbas of BCK/BCI-algebras based on cubic soft sets, The

Scientific World Journal, Volume 2014, Article ID 458638, 9 pages.[10] G. Muhiuddin and Abdullah M. Al-roqi, Cubic soft sets with applications in BCK/BCI-algebras, Ann.

Fuzzy Math. Inform. 8(2) (2014) 291–304.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

940 Young Bae Jun et al 929-940

Page 163: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Hyers-Ulam stability of the delayed homogeneous

matrix difference equation with constructive

method

Soon-Mo Jung1 and Young Woo Nam2

1,2Mathematics Section, College of Science and Technology, Hongik University,30016 Sejong, Republic of Korea

1E-mail: [email protected]: [email protected]

Abstract

We prove Hyers-Ulam stability of the first order delayed homogeneous matrix differ-ence equation xi+p = A(i)xi for all integers i.

1 Introduction

Throughout this paper, we denote by C, N, N0, and Z the set of all complex numbers, of allpositive integers, of all nonnegative integers, and the set of all integers, respectively. Given afixed positive integer n, let (Cn, ∥ · ∥n) be a complex normed space, each of whose elements isa column vector, and let Cn×n be a vector space consisting of all (n× n) complex matrices.We choose a norm ∥ · ∥n×n on Cn×n which is compatible with ∥ · ∥n, i.e., both norms obey

∥AB∥n×n ≤ ∥A∥n×n∥B∥n×n and ∥Ax∥n ≤ ∥A∥n×n∥x∥n (1.1)

for all A,B ∈ Cn×n and x ∈ Cn.A matrix difference equation is a difference equation with matrix coefficients in which the

value of vector at one point depends on the values of preceding points.In this paper, we prove Hyers-Ulam stability of the first order delayed homogeneous matrix

difference equation

xi+p = A(i)xi (1.2)

for all integers i ∈ Z, where each transition matrix A(i) is nonsingular and p is a fixed integerlarger than 1. More precisely, we prove that if a vector sequence yii∈Z of Cn satisfies theinequality

∥yi+p −A(i)yi∥n ≤ ε

for all i ∈ Z, then there exists a solution xii∈Z to the delayed matrix difference equation(1.2) such that the bound for ∥yi − xi∥n depends on ε and the transition matrices A(i) only.We refer the reader to [1, 2, 3, 4, 6] for the exact definition of Hyers-Ulam stability.

0Key words and phrases: difference equation; matrix difference equation; delayed matrix difference equa-tion; Hyers-Ulam stability; approximation.

02010 Mathematics Subject Classification: Primary 39A45, 39B82; Secondary 39A06, 39B42.

1

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

941 Soon-Mo Jung et al 941-948

Page 164: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

2 Hyers-Ulam stability of matrix difference equation

2 Preliminaries

Throughout this paper, the transition matrix A(i) of Cn×n is defined by

A(i) =

a11(i) a12(i) · · · a1n(i)a21(i) a22(i) · · · a2n(i)

......

. . ....

an1(i) an2(i) · · · ann(i)

for any integer i. We moreover assume that every A(i) is nonsingular. We will use thefollowing abbreviation.

Φ(j, k) :=

j−1∏i=k

A(i) = A(j − 1)A(j − 2) · · ·A(k) (for j > k),

In×n (for j = k),

(2.1)

where we set Φ(j, k) :=(Φ(k, j)

)−1= A(j)−1A(j + 1)−1 · · ·A(k − 1)−1 for j < k and In×n

denotes the (n×n) identity matrix. Sometimes, we use Φ(j) and Φ−1(k, j) instead of Φ(j, 0)

and(Φ(k, j)

)−1, respectively.

In the following lemma, we introduce some properties of Φ(j, k) without proof.

Lemma 2.1 Assume that n is a fixed positive integer. If the transition matrix A(i) of Cn×n

is nonsingular for any integer i, then it holds that

(i) Φ(j + 1, k) = A(j)Φ(j, k);

(ii) Φ−1(j, k + 1) = A(k)Φ−1(j, k);

(iii) A(k − 1)−1Φ−1(j, k) = Φ−1(j, k − 1)

for all integers j and k.

3 Hyers-Ulam stability of xi+p = A(i)xi

We now prove our main theorem concerning Hyers-Ulam stability of the delayed homoge-neous matrix difference equation (1.2). Obviously, our theorem is a generalization and animprovement of [5, Theorem 2.1].

Theorem 3.1 Assume that n > 0 and p > 1 are fixed integers and ε is a nonnegative realnumber. For all integers i, assume that A(i) is a nonsingular (n× n) complex-valued matrixfor which there exists a constant K > 0 such that

∞∑j=0

∥∥∥∥∥∥(

j∏k=0

A(i+ kp)

)−1∥∥∥∥∥∥n×n

≤ K (3.1)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

942 Soon-Mo Jung et al 941-948

Page 165: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Soon-Mo Jung and Young Woo Nam 3

for all integers i. If a sequence yii∈Z of Cn satisfies the inequality∥∥yi+p −A(i)yi∥∥n≤ ε (3.2)

for all integers i, then there exists a unique solution Tii∈Z to the first order delayed homo-geneous matrix difference equation (1.2) such that∥∥Ti − yi∥∥n ≤ Kε (3.3)

for each integer i.

Proof. In view of (3.2), there exists a sequence εii∈Z of Cn such that

yi+p −A(i)yi = εi (3.4)

for all integers i and

supi∈Z

∥∥εi∥∥n ≤ ε. (3.5)

First, we use the induction on m to prove

yi+mp =

(m−1∏k=0

A(i+ kp)

)yi +

m−1∑j=0

m−1∏k=j+1

A(i+ kp)

εi+jp (3.6)

for all i ∈ Z and m ∈ N0. Obviously, the equality (3.6) is true for m ∈ 0, 1. Assume thatthe equality (3.6) is true for some positive integer m. It then follows from (3.4) and (3.6)that

yi+(m+1)p = A(i+mp)yi+mp + εi+mp

=

(m∏k=0

A(i+ kp)

)yi +

m−1∑j=0

m∏k=j+1

A(i+ kp)

εi+jp + εi+mp

=

(m∏k=0

A(i+ kp)

)yi +

m∑j=0

m∏k=j+1

A(i+ kp)

εi+jp,

which follows from (3.6) by replacing m with m+ 1.

If we set

Ti(m) :=

(m∏k=0

A(i+ kp)

)−1

yi+(m+1)p

for all i ∈ Z and m ∈ N0, then it follows from (3.6) that

Ti(m) = yi +

m∑j=0

(j∏

k=0

A(i+ kp)

)−1

εi+jp. (3.7)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

943 Soon-Mo Jung et al 941-948

Page 166: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

4 Hyers-Ulam stability of matrix difference equation

Let m and n be nonnegative integers with n > m. Then, by (3.7), we have

Ti(n)− Ti(m) =

n∑j=m+1

(j∏

k=0

A(i+ kp)

)−1

εi+jp

for any fixed integer i. In view of (3.5) and (3.1), we further get

∥∥Ti(n)− Ti(m)∥∥n

=

∥∥∥∥∥∥n∑

j=m+1

(j∏

k=0

A(i+ kp)

)−1

εi+jp

∥∥∥∥∥∥n

≤n∑

j=m+1

∥∥∥∥∥∥(

j∏k=0

A(i+ kp)

)−1

εi+jp

∥∥∥∥∥∥n

≤n∑

j=m+1

∥∥∥∥∥∥(

j∏k=0

A(i+ kp)

)−1∥∥∥∥∥∥n×n

∥∥εi+jp

∥∥n

≤ εn∑

j=m+1

∥∥∥∥∥∥(

j∏k=0

A(i+ kp)

)−1∥∥∥∥∥∥n×n

→ 0, as m→∞,

for every i ∈ Z. Hence, Ti(m)m∈N0 is a Cauchy sequence for each fixed i ∈ Z, and we candefine

Ti := limm→∞

Ti(m) (3.8)

for each i ∈ Z.By (3.4), (3.7), and (3.8), we obtain

Ti+p −A(i)Ti = yi+p +

∞∑j=0

(j∏

k=0

A(i+ (k + 1)p

))−1

εi+(j+1)p

−A(i)yi −∞∑j=0

(j∏

k=1

A(i+ kp)

)−1

εi+jp

= yi+p +

∞∑j=0

(j+1∏k=1

A(i+ kp)

)−1

εi+(j+1)p

−A(i)yi −∞∑j=0

(j∏

k=1

A(i+ kp)

)−1

εi+jp

= yi+p +∞∑j=1

(j∏

k=1

A(i+ kp)

)−1

εi+jp

−A(i)yi −∞∑j=0

(j∏

k=1

A(i+ kp)

)−1

εi+jp

= 0

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

944 Soon-Mo Jung et al 941-948

Page 167: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Soon-Mo Jung and Young Woo Nam 5

for all i ∈ Z. Moreover, it follows from (3.5), (3.1), (3.7), and (3.8) that

∥∥Ti − yi∥∥n =

∥∥∥∥∥∥∞∑j=0

(j∏

k=0

A(i+ kp)

)−1

εi+jp

∥∥∥∥∥∥n

≤∞∑j=0

∥∥∥∥∥∥(

j∏k=0

A(i+ kp)

)−1

εi+jp

∥∥∥∥∥∥n

≤∞∑j=0

∥∥∥∥∥∥(

j∏k=0

A(i+ kp)

)−1∥∥∥∥∥∥n×n

∥∥εi+jp

∥∥n

≤ Kε

for all i ∈ Z.Finally, we prove the uniqueness of the sequence Tii∈Z. Assume that Uii∈Z is another

solution to the difference equation (1.2). By applying the induction on m, we prove that

Ui =

(m∏k=0

A(i+ kp)

)−1

Ui+(m+1)p (3.9)

for any m ∈ N0. Obviously, (3.9) is true for m = 0. Assume now that (3.9) is true for someinteger m ≥ 0. It then follows from (1.2) and (3.9) that

Ui =

(m∏k=0

A(i+ kp)

)−1

Ui+(m+1)p

=

(m+1∏k=0

A(i+ kp)

)−1

A(i+ (m+ 1)p

)Ui+(m+1)p

=

(m+1∏k=0

A(i+ kp)

)−1

Ui+(m+2)p,

which can be obtained from (3.9) by replacing m with m+1. Thus, by (3.1), (3.3), and (3.9),we have ∥∥Ti − Ui

∥∥n

=

∥∥∥∥∥∥(

m∏k=0

A(i+ kp)

)−1 (Ti+(m+1)p − Ui+(m+1)p

)∥∥∥∥∥∥n

∥∥∥∥∥∥(

m∏k=0

A(i+ kp)

)−1∥∥∥∥∥∥n×n

∥∥Ti+(m+1)p − yi+(m+1)p

∥∥n

+

∥∥∥∥∥∥(

m∏k=0

A(i+ kp)

)−1∥∥∥∥∥∥n×n

∥∥yi+(m+1)p − Ui+(m+1)p

∥∥n

≤ 2Kε

∥∥∥∥∥∥(

m∏k=0

A(i+ kp)

)−1∥∥∥∥∥∥n×n

→ 0, as m→∞,

for all i ∈ Z, which implies the uniqueness of Tii∈Z.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

945 Soon-Mo Jung et al 941-948

Page 168: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

6 Hyers-Ulam stability of matrix difference equation

4 Examples

At a glance, the condition (3.1) would seem too strong so that we could seldom find practicalexamples. But we get rid of such a misunderstanding through introducing a few examplesfor the sequence A(i)i∈Z of transition matrices which satisfy the condition (3.1).

Example 4.1 Let us set n = 1 and p = 3. If A(i) = 23 is a (1× 1) matrix for every integeri, then we have

∞∑j=0

∣∣∣∣∣∣(

j∏k=0

A(i+ 3k)

)−1∣∣∣∣∣∣ =

∞∑j=0

(23 · 23 · · · 23︸ ︷︷ ︸

j+1

)−1=

∞∑j=0

2−3(j+1) =1

7,

i.e., the condition (3.1) is satisfied with K = 17 .

Assume that a sequence yii∈Z of complex numbers satisfies the inequality∣∣yi+3 − 23yi∣∣ ≤ ε

for all integers i, where ε is an arbitrarily given nonnegative real number. Then, accordingto Theorem 3.1, there exists a unique sequence xii∈Z of complex numbers such that

xi+3 = 23xi (4.1)

and

|xi − yi| ≤1

for all integers i.Indeed, the delayed difference equation (4.1) is strongly related to the nonlinear difference

equation

xi+1 = 2i+1 − 22i+1

xi.

Example 4.2 We consider the difference equation with two variables given as

(ui+1

vi+1

)=

−22i+1

(i2 + 2i+ 2)(i2 + 1)vi − (i2 + 2i+ 2)2i+1

2i+2

i2 + 2i+ 2− 22i+1

(i2 + 2i+ 2)(i2 + 1)ui

for all integers i, where uii∈Z and vii∈Z are sequences of complex numbers. By a straight-forward calculation, we show that

(ui+2

vi+2

)=

4(i2 + 1)

i2 + 4i+ 50

04(i2 + 1)

i2 + 4i+ 5

(ui

vi

)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

946 Soon-Mo Jung et al 941-948

Page 169: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Soon-Mo Jung and Young Woo Nam 7

for all integers i. We now define the (2× 2) matrix A(i) by

A(i) :=

4(i2 + 1)

i2 + 4i+ 50

04(i2 + 1)

i2 + 4i+ 5

=4(i2 + 1)

(i+ 2)2 + 1I2×2

for every integer i, where I2×2 denotes the (2× 2) identity matrix. Then we have

(j∏

k=0

A(i+ 2k)

)−1

=(i+ 2j + 2)2 + 1

(i2 + 1)4j+1I2×2

for all nonnegative integers j. Hence, we see that

∞∑j=0

∥∥∥∥∥∥(

j∏k=0

A(i+ 2k)

)−1∥∥∥∥∥∥∞

=

∞∑j=0

(i+ 2j + 2)2 + 1

(i2 + 1)4j+1

≤∞∑j=0

(|i|+ 2j + 2)2 + 1

(i2 + 1)4j+1

≤∞∑j=0

1

4j+1+

∞∑j=0

1

2

j + 1

4j+

∞∑j=0

(j + 1)2

4j

≤ 1

3+

∞∑j=0

1

2

1

2j+

∞∑j=0

9

4

1

2j

=35

6,

i.e., the condition (3.1) is satisfied with K = 356 .

Let ε is an arbitrarily given nonnegative real number. Assume that a sequence yii∈Z ofC2 satisfies the inequality ∥∥yi+2 −A(i)yi

∥∥∞ ≤ ε

for all integers i. Then, due to Theorem 3.1 with n = 2, p = 2, and K = 356 , there exists

a unique solution xii∈Z to the delayed homogeneous matrix difference equation (1.2) suchthat ∥∥xi − yi∥∥∞ ≤ 35

for any integer i.

Acknowledgment. The first author was supported by Basic Science Research Programthrough the National Research Foundation of Korea (NRF) funded by the Ministry of Edu-cation (No. 2013R1A1A2005557).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

947 Soon-Mo Jung et al 941-948

Page 170: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

8 Hyers-Ulam stability of matrix difference equation

References

[1] S. Czerwik, Functional Equations and Inequalities in Several Variables, World Sci. Publ., Singapore, 2002.

[2] D. H. Hyers, On the stability of the linear functional equation, Proc. Natl. Acad. Sci. USA 27 (1941),222–224.

[3] D. H. Hyers, G. Isac and Th. M. Rassias, Stability of Functional Equations in Several Variables,Birkhauser, Boston, 1998.

[4] S.-M. Jung, Hyers-Ulam-Rassias Stability of Functional Equations in Nonlinear Analysis, Springer Opti-mization and Its Applications Vol. 48, Springer, New York, 2011.

[5] S.-M. Jung, Hyers-Ulam stability of the first-order matrix difference equations, Adv. Difference Equ. 2015(2015), no. 170, 13 pages.

[6] S. M. Ulam, A Collection of Mathematical Problems, Interscience Publishers, New York, 1960. Reprintedas: Problems in Modern Mathematics, John Wiley & Sons, Inc., New York, 1964.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

948 Soon-Mo Jung et al 941-948

Page 171: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Mathematical analysis of (n + 3)-dimensional virus dynamics model

A. M. Elaiw and N. H. AlShamrani

Department of Mathematics, Faculty of Science, King Abdulaziz University,

P.O. Box 80203, Jeddah 21589, Saudi Arabia.

Emails: a m [email protected] (A. Elaiw), [email protected]. (N. AlShamrani).

Abstract

An (n + 3)-dimensional nonlinear mathematical model for the virus dynamics with humoral immunity

and n-stages of infected cells is proposed and analyzed. Two threshold parameters, the basic reproduction

number, RM0 and the humoral immunity number, RM

1 are derived. Utilizing Lyapunov functions and LaSalle’s

invariance principle, the global asymptotic stability of all steady states of the model is obtained. An example

is presented and some numerical simulations are conducted in order to illustrate the dynamical behavior.

Keywords: Virus dynamics; global stability; humoral immunity; Lyapunov function.

1 Introduction

During the past decades many human viruses have been found such as HIV, HBV, HCV and HTLV-I. To un-

derstand the virus dynamics, several mathematical models for virus dynamics have been proposed and analyzed

(see e.g. [1]-[16]). One of the most important features of mathematical models is the global stability of steady

states which gives us a detailed information and enhances our understanding about the virus dynamics. There-

fore several researchers studied the global stability of virus dynamics models (see e.g. [5], [6], [7], [8], [9], [11],

[12], [13], [14], [19], [20]). Some of these papers consider a single-infected stage for infected cells (see e.g. [5],

[6], [7], [11], [12] and [14]). Other works consider double-infected stages for infected cells, the first stage is the

latently infected cells which contain viruses but do not produce it and the second stage is the actively infected

cells which produce new viruses (see e.g. [8] [9], [19] and [20]). As reported in [21], [22] and [23], due to ongoing

viral replication in the virus dynamics process such as HIV, the time from the contact of viruses and uninfected

target cells to the death of the cells modeled by dividing the process into n short stages y1 → y2 → .... → yn.

Georgescu and Hsieh [20] have proposed a virus dynamics model with multi-staged infected cells. However, the

model does not consider the immune response.

It should be pointed out that the immune response plays an important role in controlling the disease

progression. There are two main responses for immune system, Cytotoxic T Lymphocyte (CTL) immune

response and humoral immune response. The function of the CTL cells is to kill the infected cells. The humoral

immunity is based on the B cells which produce antibodies to attack the viruses [1]. It is mentioned in [24]

that, in malaria, the antibodies are more effective than CTL cells [24]. Several works incorporate the humoral

immune response into the virus dynamics models (see e.g. [25]-[31]). Elaiw and AlShamrani [29], [30] studied

the global stability of virus dynamics models with double-infected stages for infected cells.

The aim of this paper is to study a general virus dynamics model with multi-staged infected cells and

humoral immunity. Our model is an improvement of the model presented in [20] by taking into account the

humoral immune response, and by assuming a more general incidence rate which includes the form given in

[20]. We use Lyapunov functions and LaSalle’s invariance principle to prove the global stability of all the steady

states of the model. We show that there exist two bifurcation parameters, the basic reproduction number RM0

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

949 A. M. Elaiw et al 949-967

Page 172: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

and the humoral immunity number RM1 . We establish a set of sufficient conditions which guarantee the global

stability of all steady states of the model.

2 The model

In this section we propose the following model:

x = λ− dx− g(x, v), (1)

y1 = g(x, v)− a1φ1(y1), (2)

yi = ai−1φi−1(yi−1)− aiφi(yi), i = 2, 3, ..., n, (3)

v = anφn(yn)− pzv − uv, (4)

z = rzv − bz. (5)

All parameters and variables have the same identifications given in Section 1. The model is a generalization

of several existing model by considering general functions for: (i) the incidence rate of infection g(x, v); (ii)

the production rates of infected cells g(x, v) and ai−1φi−1(yi−1), i = 2, ..., n; (iii) the removal rate of infected

cells aiφi(yi), i = 1, ..., n; (iii) the production rate of viruses anφn(yn). Functions g and φi are continuously

differentiable and satisfy the following conditions:

Condition C1. (i) g(x, v) > 0, g(0, v) = g(x, 0) = 0 for all x, v > 0 and

(ii) ∂g(x,v)∂x > 0, ∂g(x,v)∂v > 0, ∂g(x,0)

∂v > 0 for all x, v > 0.

Condition C2. (i) g(x, v) ≤ v ∂g(x,0)∂v for all x, v > 0 and

(ii)

(∂g(x, 0)

∂v

)′> 0 for all x, v > 0.

Condition C3. (i) φi(yi) > 0 for all yi > 0, φi(0) = 0, i = 1, 2, ..., n,

(ii) φ′i(yi) > 0 for all yi > 0, i = 1, 2, ..., n, and

(iii) there is αi > 0, i = 1, ..., n such that φi(yi) ≥ αiyi for all yi > 0.

3 Properties of solutions

In this section, we study some properties of the solutions of the model such as the non-negativity and bound-

edness.

Proposition 1. Suppose that Conditions C1 and C3 are hold. Then there exist positive numbers Mj ,

j = 1, 2, ..., n+ 2, such that the compact set

Θ =

(x, y1, ..., yn, v, z) ∈ Rn+3≥0 : 0 ≤ x ≤M1, 0 ≤ yi ≤Mi, 0 ≤ v ≤Mn+1, 0 ≤ z ≤Mn+2, i = 1, ..., n

is positively invariant.

Proof. Since

x |x=0= λ > 0,

y1 |y1=0= g(x, v) ≥ 0 for all x, v ∈ [0,∞),

yi |yi=0= ai−1φi−1(yi−1) ≥ 0 for all yi−1 ∈ [0,∞), i = 2, 3, ..., n,

v |v=0= anφn(yn) ≥ 0 for all yn ∈ [0,∞),

z |z=0= 0,

Then, the orthant Rn+3≥0 is positively invariant for system (1)-(5).

To show the boundedness of the solutions we let G1(t) = x(t) + y1(t), then

G1 = λ− dx− a1φ1(y1) ≤ λ− dx− a1α1y1 ≤ λ− δ1 (x+ y1) ≤ λ− δ1G1,

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

950 A. M. Elaiw et al 949-967

Page 173: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

where δ1 = mind, a1α1. It follows that,

G1(t) ≤ e−δ1t(G1(0)− λ

δ1

)+λ

δ1.

Hence, 0 ≤ G1(t) ≤ M1 if G1(0) ≤ M1 for t ≥ 0 where M1 = λδ1. The non-negativity of x and y1 implies that,

0 ≤ x(t), y1(t) ≤M1 if x(0) + y1(0) ≤M1. From Eq. (3) and Condition C3, we have

y2 = a1φ1(y1)− a2φ2(y2) ≤ a1φ1(M1)− a2α2y2.

It follows that, 0 ≤ y2(t) ≤M2 if y2(0) ≤M2, where M2 =a1φ1(M1)

a2α2. Similarly, we can show 0 ≤ yi(t) ≤Mi if

yi(0) ≤Mi, where Mi =ai−1φi−1(Mi−1)

aiαii = 3, ..., n. Finally, we let G2(t) = v(t) + p

r z(t), then

G2 = anφn(yn)− uv − pb

rz

≤ anφn(Mn)− δ2(v +

p

rz)

= anφn(Mn)− δ2G2,

where δ2 = minu, b. It follows that, 0 ≤ G2(t) ≤ Mn+1 if G2(0) ≤ Mn+1, where Mn+1 =anφn(Mn)

δ2. Since

v(t) and z(t) are non-negative, then 0 ≤ v(t) ≤ Mn+1 and 0 ≤ z(t) ≤ Mn+2 if v(0) + pr z(0) ≤ Mn+1, where

Mn+2 = rpMn+1. Therefore, all the variables of the model are bounded and the region Θ is positively invariant

with respect to model (1)-(5).

4 The steady states and biological bifurcations

In this section, we prove the existence of the steady states of system (1)-(5) and derive two bifurcation param-

eters.

Lemma 1. Assume that Conditions C1-C3 are satisfied, then there exist two bifurcation parameters RM0 >

RM1 > 0 such that

(i) if RM0 ≤ 1, then the system has only one positive steady state Q0 ∈ Θ.

(ii) if RM1 ≤ 1 < RM0 , then then the system has only two positive steady states Q0 ∈ Θ and Q1 ∈ Θ, and

(iii) if RM1 > 1, then then the system has three positive steady states Q0 ∈ Θ, Q1 ∈ Θ and Q2 ∈Θ.

Proof. At any steady state E(x, y1, ..., yn, v, z), the following equations hold:

λ− dx− g(x, v) = 0, (6)

g(x, v)− a1φ1(y1) = 0, (7)

ai−1φi−1(yi−1)− aiφi(yi) = 0, i = 2, ..., n, (8)

anφn(yn)− uv − pzv = 0, (9)

(rv − b) z = 0. (10)

Eq. (10) has two possibilities, z = 0 and v =b

r. When z = 0, then from Eqs. (6)-(9) we get

λ− dx = g(x, v) =

i∏j=1

ajaj

aiφi(yi) =

n∏j=1

ajaj

uv, i = 1, ..., n, (11)

The continuity and strictly increasing properties of φi imply that φ−1i exists and it is also continuous and strictly

increasing [32]. Define fi(v) = φ−1i

((i∏

j=1

ajaj

)(n∏j=1

ajaj

)uvai

), i = 1, 2, ..., n, then fi(0) = 0 and fi(v) > 0 for all

v > 0. From Eq. (11), we get

yi = fi(v), x = x0 −1

d

n∏j=1

ajaj

uv, (12)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

951 A. M. Elaiw et al 949-967

Page 174: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

and

g

x0 − 1

d

n∏j=1

ajaj

uv, v

− n∏j=1

ajaj

uv = 0, (13)

where x0 = λ/d. Condition C1 implies that Eq. (13) has two possible solutions v = 0 and v 6= 0. If v = 0, then

from Eq. (12), we get the disease-free steady state Q0 = (x0,

n+2︷ ︸︸ ︷0, ..., 0, 0). Let us consider the case v 6= 0. Define

Ψ1 (v) = g

x0 − 1

d

n∏j=1

ajaj

uv, v

− n∏j=1

ajaj

uv = 0.

We have, Ψ1(0) = 0, and Ψ1(v) = −λ < 0.where v = λu

(n∏j=1

ajaj

). Moreover,

Ψ′1 (0) = −ud

n∏j=1

ajaj

∂g(x0, 0)

∂x+∂g(x0, 0)

∂v−

n∏j=1

ajaj

u.

From Condition C1 we have ∂g(x0,0)∂x = 0, then

Ψ′1 (0) = u

n∏j=1

ajaj

1

u

n∏j=1

ajaj

∂g(x0, 0)

∂v− 1

.

Therefore, if 1u

(n∏j=1

ajaj

)∂g(x0,0)∂v > 1, then Ψ′1 (0) > 0 and there exists a v1 ∈ (0, v) such that Ψ1(v1) = 0.

Substituting v = v1 in Eq. (6) and letting

Ψ2(x) = λ− dx− g(x, v1) = 0.

According to Condition C1, Ψ2 is a strictly decreasing, Ψ2(0) = λ > 0 and Ψ2(x0) = −g(x0, v1) < 0. Thus,

there exists a unique x1 ∈ (0, x0) such that Ψ2(x1) = 0. On the other hand, from Eq. (12) we have yi,1 =

fi(v1) > 0, i = 1, ..., n. It follows that, a endemic steady state without humoral immune response Q1 =

(x1, y1,1, ..., yn,1, v1, 0) exists when 1u

(n∏j=1

ajaj

)∂g(x0,0)∂v > 1. Let us define the basic reproduction number as:

RM0 =1

u

n∏j=1

ajaj

∂g(x0, 0)

∂v.

The other possibility of Eq. (10) is v = v2 =b

r. Let

Ψ3(x) = λ− dx− g(x, v2) = 0.

Clearly, Ψ3 is a strictly decreasing, Ψ3(0) = λ > 0 and Ψ3(x0) = −g(x0, v2) < 0. Thus, there exists a unique

x2 ∈ (0, x0) such that Ψ3(x2) = 0. It follows that,

yi,2 = φ−1i

i∏j=1

ajaj

g(x2, v2)

ai

> 0.

Further, z2 =u

p(RM1 − 1), where

RM1 =1

u

n∏j=1

ajaj

g(x2, v2)

v2

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

952 A. M. Elaiw et al 949-967

Page 175: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

represents the humoral immunity number. It follows that, if RM1 > 1, then there exists a endemic steady state

with humoral immune response Q2 = (x2, y1,2, ..., yn,2, v2, z2).

Now we show that Q0, Q1 ∈ Θ and Q2 ∈Θ. Clearly, Q0 ∈ Θ. We have x1 ∈ (0, x0), then

0 < x1 <λ

d≤ λ

δ1= M1.

From Eq. (11), we get

a1α1y1,1 ≤ a1φ1(y1,1) = λ− dx1 < λ⇒ 0 < y1,1 <λ

a1α1≤M1.

Also, from Eq. (8), we have

a2α2y2,1 ≤ a2φ2(y2,1) = a1φ1(y1,1) < a1φ1(M1)⇒ 0 < y2,1 <a1φ1(M1)

a2α2= M2.

Consequently, for i = 3, ..., n, we have

aiαiyi,1 ≤ aiφi(yi,1) = ai−1φi−1(yi−1,1) < ai−1φi−1(Mi−1)⇒ 0 < yi,1 <ai−1φi−1(Mi−1)

aiαi= Mi.

Eq. (9) implies that,

uv1 = anφn(yn,1) < anφn(Mn)⇒ 0 < v1 <anφn(Mn)

u≤ anφn(Mn)

δ2= Mn+1.

We have also z1 = 0, then Q1 ∈ Θ. Similarly, one can show that 0 < x2 < M1 and 0 < yi,2 < Mi, i = 1, ..., n.

Now we show that if RM1 > 1, then 0 < v2 < Mn+1 and 0 < z2 < Mn+2. From Eq. (9) we have

uv2 + pv2z2 = anφn(yn,2).

Then

uv2 < anφn(yn,2) < anφn(Mn)⇒ 0 < v2 <anφn(Mn)

u≤Mn+1,

pv2z2 < anφn(yn,2) < anφn(Mn)⇒ 0 < z2 <ranφn(Mn)

pb≤Mn+2.

Then, Q2 ∈Θ. Clearly from Condition C2, we have

RM1 =1

u

n∏j=1

ajaj

g(x2, v2)

v2≤ 1

u

n∏j=1

ajaj

∂g(x2, 0)

∂v<

1

u

n∏j=1

ajaj

∂g(x0, 0)

∂v= RM0 .

5 Global stability analysis

In this section, we study the global stability of system (1)-(5) by constructing suitable Lyapunov functionals.

The stability of the disease-free steady state Q0 will be given in the following result.

Theorem 1. Let Conditions C1-C3 hold true and RM0 ≤ 1, then Q0 is globally asymptotically stable (GAS)

in Θ.

Proof. Define

V0(x, y1, ..., yn, v, z) = x− x0 −∫ x

x0

limv→0+

g(x0, v)

g(η, v)dη +

n∑i=1

i−1∏j=1

ajaj

yi +

n∏j=1

ajaj

v +p

r

n∏j=1

ajaj

z, (14)

where0∏j=1

ajaj

= 1. It is seen that, V0(x, y1, ..., yn, v, z) > 0 for all x, y1, ..., yn, v, z > 0, while V0(x0,

n+2︷ ︸︸ ︷0, ..., 0, 0) = 0.

We calculate dV0

dt along the solutions of model (1)-(5) as:

dV0dt

=

(1− lim

v→0+

g(x0, v)

g(x, v)

)x+

n∑i=1

i−1∏j=1

ajaj

yi +

n∏j=1

ajaj

v +p

r

n∏j=1

ajaj

z. (15)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

953 A. M. Elaiw et al 949-967

Page 176: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

We have

n∑i=1

i−1∏j=1

ajaj

yi = g(x, v)− a1φ1(y1) +n∑i=2

i−1∏j=1

ajaj

(ai−1φi−1(yi−1)− aiφi(yi))

= g(x, v)−

n∏j=1

ajaj

anφn(yn).

Then

dV0dt

= dx0

(1− lim

v→0+

g(x0, v)

g(x, v)

)(1− x

x0

)+ g(x, v) lim

v→0+

g(x0, v)

g(x, v)− u

n∏j=1

ajaj

v − pb

r

n∏j=1

ajaj

z

= dx0

(1− ∂g(x0, 0)/∂v

∂g(x, 0)/∂v

)(1− x

x0

)+ u

n∏j=1

ajaj

1

u

n∏j=1

ajaj

g(x, v)

v

∂g(x0, 0)/∂v

∂g(x, 0)/∂v− 1

v

− pb

r

n∏j=1

ajaj

z. (16)

From (i) of Condition C2, we have

dV0dt≤ dx0

(1− ∂g(x0, 0)/∂v

∂g(x, 0)/∂v

)(1− x

x0

)+ u

n∏j=1

ajaj

(RM0 − 1)v − pb

r

n∏j=1

ajaj

z. (17)

From (ii) of Condition C1, we get (1− ∂g(x0, 0)/∂v

∂g(x, 0)/∂v

)(1− x

x0

)≤ 0,

where the equality occurs at x = x0. Therefore, if RM0 ≤ 1, then dV0

dt ≤ 0 for all x, v, z > 0. One can easily

show that dV0

dt = 0 occurs at Q0. Using LaSalle’s invariance principle, we derive that Q0 is GAS.

To prove the global stability of the two steady states Q1 and Q2, we need the following condition on the

incidence rate function.

Condition C4. (1− g(x, vi)

g(x, v)

)(g(x, v)

g(x, vi)− v

vi

)≤ 0, x, v > 0, i = 1, 2

Lemma 2. Suppose that Conditions C1-C4 are satisfied and RM0 > 1. Then x1, x2, v1, v2 exist satisfying

sgn(x2 − x1) = sgn(v1 − v2) = sgn(RM1 − 1).

Proof. From Condition C1, for x1, x2, v1, v2 > 0, we have

(g(x2, v2)− g(x1, v2))(x2 − x1) > 0, (18)

(g(x1, v2)− g(x1, v1)) (v2 − v1) > 0. (19)

Using Condition C4 with i = 1, x = x1 and v = v2 we get

(g(x1, v2)v1 − g(x1, v1)v2) (g(x1, v2)− g(x1, v1)) < 0. (20)

It follows from inequality (19) that

(g(x1, v2)v1 − g(x1, v1)v2)(v1 − v2) > 0. (21)

First, we claim sgn(x2 − x1) = sgn(v1 − v2). Suppose this is not true, i.e., sgn(x2 − x1) = sgn(v2 − v1). Using

the conditions of the steady states Q1 and Q2 we have

(λ− dx2)− (λ− dx1) = g(x2, v2)− g(x1, v1)

= (g(x2, v2)− g(x1, v2)) + (g(x1, v2)− g(x1, v1)).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

954 A. M. Elaiw et al 949-967

Page 177: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Therefore, from inequalities (18) and (19) we get:

sgn (x1 − x2) = sgn (x2 − x1) ,

which leads to a contradiction. Thus, sgn (x2 − x1) = sgn (v1 − v2) . Using the steady state conditions for Q1

we have 1u

(n∏j=1

ajaj

)g(x1, v1)

v1= 1, then

RM1 − 1 =1

u

n∏j=1

ajaj

g(x2, v2)

v2− 1

u

n∏j=1

ajaj

g(x1, v1)

v1

=1

u

n∏j=1

ajaj

[ 1

v2(g(x2, v2)− g(x1, v2)) +

1

v1v2(g(x1, v2)v1 − g(x1, v1)v2)

].

Thus, from inequalities (18) and (21) we get sgn(RM1 − 1) = sgn(v1 − v2).

Theorem 2. Assume that Conditions C1-C4 are satisfied. If RM1 ≤ 1 < RM0 , then Q1 is GAS in Θ.

Proof. Define:

V1(x, y1, ..., yn, v, z) = x− x1 −∫ x

x1

g(x1, v1)

g(η, v1)dη +

n∑i=1

i−1∏j=1

ajaj

yi − yi,1 − yi∫

yi,1

φi(yi,1)

φi(η)dη

+

n∏j=1

ajaj

v1H

(v

v1

)+p

r

n∏j=1

ajaj

z. (22)

We note that, V1 is positive and reaches its global minimum at Q1. Calculating the time derivative of V1 along

the trajectories of system (1)-(5), we obtain

dV1dt

=

(1− g(x1, v1)

g(x, v1)

)(λ− dx− g(x, v)) +

(1− φ1(y1,1)

φ1(y1)

)(g(x, v)− a1φ1(y1))

+

n∑i=2

i−1∏j=1

ajaj

(1− φi(yi,1)

φi(yi)

)(ai−1φi−1(yi−1)− aiφi(yi))

+

n∏j=1

ajaj

(1− v1v

)(anφn(yn)− uv − pzv) +

p

r

n∏j=1

ajaj

(rzv − bz) . (23)

We haven∑i=2

i−1∏j=1

ajaj

(ai−1φi−1(yi−1)− aiφi(yi)) = a1φ1(y1)−

n∏j=1

ajaj

anφn(yn). (24)

Then,

dV1dt

=

(1− g(x1, v1)

g(x, v1)

)(λ− dx) + g(x, v)

g(x1, v1)

g(x, v1)− φ1(y1,1)g(x, v)

φ1(y1)

+ a1φ1(y1,1)−n∑i=2

i−1∏j=1

ajaj

ai−1φi(yi,1)φi−1(yi−1)

φi(yi)

+n∑i=2

i−1∏j=1

ajaj

aiφi(yi,1)−

n∏j=1

ajaj

uv −

n∏j=1

ajaj

anv1φn(yn)

v

+

n∏j=1

ajaj

uv1 +

n∏j=1

ajaj

pv1z −pb

r

n∏j=1

ajaj

z. (25)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

955 A. M. Elaiw et al 949-967

Page 178: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Using the steady state conditions for Q1:

λ = dx1 + g(x1, v1),

g(x1, v1) =

i∏j=1

ajaj

aiφi(yi,1) =

n∏j=1

ajaj

uv1, i = 1, ..., n.

We obtain

dV1dt

=

(1− g(x1, v1)

g(x, v1)

)(dx1 − dx) + g(x1, v1)

(1− g(x1, v1)

g(x, v1)

)+ g(x1, v1)

g(x, v)

g(x, v1)

− g(x1, v1)φ1(y1,1)g(x, v)

φ1(y1)g(x1, v1)+ (n+ 1) g(x1, v1)− g(x1, v1)

n∑i=2

φi(yi,1)φi−1(yi−1)

φi(yi)φi−1(yi−1,1)

− g(x1, v1)v

v1− g(x1, v1)

v1φn(yn)

vφn(yn,1)+ p

n∏j=1

ajaj

(v1 − b

r

)z. (26)

We can rewrite Eq. (26) as follows

dV1dt

= dx1

(1− g(x1, v1)

g(x, v1)

)(1− x

x1

)+ g(x1, v1)

[g(x, v)

g(x, v1)− v

v1

]+ g(x1, v1)

[(n+ 2)− g(x1, v1)

g(x, v1)− φ1(y1,1)g(x, v)

φ1(y1)g(x1, v1)

−n∑i=2

φi(yi,1)φi−1(yi−1)

φi(yi)φi−1(yi−1,1)− v1φn(yn)

vφn(yn,1)

]+ p

n∏j=1

ajaj

(v1 − v2) z

= dx1

(1− g(x1, v1)

g(x, v1)

)(1− x

x1

)+ g(x1, v1)

(1− g(x, v1)

g(x, v)

)(g(x, v)

g(x, v1)− v

v1

)+ g(x1, v1)

[(n+ 3)− g(x1, v1)

g(x, v1)− φ1(y1,1)g(x, v)

φ1(y1)g(x1, v1)−

n∑i=2

φi(yi,1)φi−1(yi−1)

φi(yi)φi−1(yi−1,1)

− v1φn(yn)

vφn(yn,1)− vg(x, v1)

v1g(x, v)

]+ p

n∏j=1

ajaj

(v1 − v2) z. (27)

From Conditions C1 and C4, we get that, the first and second terms of Eq. (27) are less than or equal to

zero. Since the geometrical mean is less than or equal to the arithmetical mean, then (n + 3) ≤ g(x1,v1)g(x,v1)

+

φ1(y1,1)g(x,v)φ1(y1)g(x1,v1)

+n∑i=2

φi(yi,1)φi−1(yi−1)φi(yi)φi−1(yi−1,1)

+ v1φn(yn)vφn(yn,1)

+ vg(x,v1)v1g(x,v)

. Lemma 2 implies that, if RM1 ≤ 1, then v1 ≤ v2.

It follows that, dV1

dt ≤ 0 for all x, yi, v, z > 0, i = 1, ..., n. The solutions of system (1)-(5) are limited to Ω,

the largest invariant subset of

(x, y1, ..., yn, v, z) : dV1

dt = 0

. We have dV1

dt = 0 at the singleton Q1. Thus,

the global asymptotic stability of the endemic steady state without humoral immune response Q1 follows from

LaSalle’s invariance principle.

Theorem 3. Let Conditions C1-C4 are satisfied and RM1 > 1, then Q2 is GAS inΘ.

Proof. We construct a Lyapunov functional as follows:

V2(x, y1, ..., yn, v, z) = x− x2 −∫ x

x2

g(x2, v2)

g(η, v2)dη +

n∑i=1

i−1∏j=1

ajaj

yi − yi,2 − yi∫

yi,2

φi(yi,2)

φi(η)dη

+

n∏j=1

ajaj

v2H

(v

v2

)+p

r

n∏j=1

ajaj

z2H

(z

z2

). (28)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

956 A. M. Elaiw et al 949-967

Page 179: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Note that V2 > 0 for all x, y1, ..., yn, v, z > 0 and V2(x2, y1,2, ..., yn,2, v2, z2) = 0. Function V2 satisfies:

dV2dt

=

(1− g(x2, v2)

g(x, v2)

)(λ− dx− g(x, v)) +

(1− φ1(y1,2)

φ1(y1)

)(g(x, v)− a1φ1(y1))

+n∑i=2

i−1∏j=1

ajaj

(1− φi(yi,2)

φi(yi)

)(ai−1φi−1(yi−1)− aiφi(yi))

+

n∏j=1

ajaj

(1− v2v

)(anφn(yn)− uv − pzv) +

p

r

n∏j=1

ajaj

(1− z2z

)(rzv − bz) . (29)

Using Eq. (24), we get

dV2dt

=

(1− g(x2, v2)

g(x, v2)

)(λ− dx) + g(x, v)

g(x2, v2)

g(x, v2)− φ1(y1,2)g(x, v)

φ1(y1)+ a1φ1(y1,2)

−n∑i=2

i−1∏j=1

ajaj

ai−1φi(yi,2)φi−1(yi−1)

φi(yi)+

n∑i=2

i−1∏j=1

ajaj

aiφi(yi,2)

n∏j=1

ajaj

uv −

n∏j=1

ajaj

anv2φn(yn)

v+

n∏j=1

ajaj

uv2

+

n∏j=1

ajaj

pv2z −pb

r

n∏j=1

ajaj

z − p

n∏j=1

ajaj

vz2 +pb

r

n∏j=1

ajaj

z2. (30)

Using the steady state conditions for Q2:

λ = dx2 + g(x2, v2), v2 =b

r,

g(x2, v2) =

i∏j=1

ajaj

aiφi(yi,2) =

n∏j=1

ajaj

(uv2 + pv2z2) , i = 1, ..., n,

we get

dV2dt

=

(1− g(x2, v2)

g(x, v2)

)(dx2 − dx) + g(x2, v2)

(1− g(x2, v2)

g(x, v2)

)+ g(x2, v2)

g(x, v)

g(x, v2)

− g(x2, v2)φ1(y1,2)g(x, v)

φ1(y1)g(x2, v2)+ (n+ 1) g(x2, v2)− g(x2, v2)

n∑i=2

φi(yi,2)φi−1(yi−1)

φi(yi)φi−1(yi−1,2)

− g(x2, v2)v

v2− g(x2, v2)

v2φn(yn)

vφn(yn,2). (31)

We can rewrite Eq. (31) as follows:

dV2dt

= dx2

(1− g(x2, v2)

g(x, v2)

)(1− x

x2

)+ g(x2, v2)

(1− g(x, v2)

g(x, v)

)(g(x, v)

g(x, v2)− v

v2

)+ g(x2, v2)

[(n+ 3)− g(x2, v2)

g(x, v2)− φ1(y1,2)g(x, v)

φ1(y1)g(x2, v2)−

n∑i=2

φi(yi,2)φi−1(yi−1)

φi(yi)φi−1(yi−1,2)

− v2φn(yn)

vφn(yn,2)− vg(x, v2)

v2g(x, v)

]. (32)

We note from Conditions C1 and C4 and the relationship between the arithmetical and geometrical means that,

we obtain dV2

dt ≤ 0 for all x, y1, ..., yn, v, z > 0. The solutions of model (1)-(5) are limited to Λ, the largest

invariant subset of

(x, y1, ..., yn, v, z) : dV2

dt = 0

. It is easy to see that dV2

dt = 0 occurs at Q2. The global

asymptotic stability of Q2 follows from LaSalle’s invariance principle.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

957 A. M. Elaiw et al 949-967

Page 180: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

6 Example and numerical simulations

In this section, we introduce an example and perform some numerical simulations to confirm our theoretical

results. By using the Lyapunov direct method, we have established a set of conditions on the functions g(x, v)

and φi(yi) and on the parameters RM0 and RM1 ensuring the global asymptotic stability of the steady states of

model (1)-(5). We consider the following model with two stages (i.e. n = 2):

x = λ− dx− πxv

(1 + γx) (1 + δv), (33)

y1 =πxv

(1 + γx) (1 + δv)− a1y1, (34)

y2 = a1y1 − a2y2, (35)

v = a2y2 − pzv − uv, (36)

z = rzv − bz, (37)

where π ∈ (0,∞) and γ, δ ∈ [0,∞). In this example we have

φi(yi) = yi, i = 1, ..., n, g(x, v) =πxv

(1 + γx) (1 + δv),

which guarantee that Condition C3 holds true. Now, we verify Conditions C1, C2 and C4. Clearly, g(x, v) > 0,

g(0, v) = g(x, 0) = 0 for all x, v ∈ (0,∞), and

∂g(x, v)

∂x=

πv

(1 + γx)2 (1 + δv),

∂g(x, v)

∂v=

πx

(1 + γx) (1 + δv)2 ,

∂g(x, 0)

∂v=

πx

1 + γx.

Then, for all x, v ∈ (0,∞), we have ∂g(x,v)∂x > 0, ∂g(x,v)∂v > 0 and ∂g(x,0)

∂v > 0. Therefore Condition C1 is satisfied.

We have also

g(x, v) =πxv

(1 + γx) (1 + δv)≤ πxv

1 + γx= v

∂g(x, 0)

∂v,(

∂g(x, 0)

∂v

)′=

π

(1 + γx)2> 0 for all x > 0.

It follows that, C2 is satisfied. Moreover,(1− g(x, vi)

g(x, v)

)(g(x, v)

g(x, vi)− v

vi

)= − δ (v − vi)2

vi (1 + δv) (1 + δvi)< 0 for all v, vi ∈ (0,∞), i = 1, 2.

Thus, C4 is satisfied and the global stability results demonstrated in Theorems 1-3 are guaranteed. The

parameters RM0 and RM1 are given by:

RM0 =a1a2π

a1a2u

x01 + γx0

, RM1 =a1a2π

a1a2u

x2(1 + γx2) (1 + δv2)

. (38)

Now, we will perform some numerical simulations for the model (33)-(37). The values of some parameters of

the example are listed in Table 1. The other parameters π, r and γ will be varied. All computations are carried

out by MATLAB.

We are interested to study the following cases:

Case (A): Effect of π and r on the stability of steady states:

In this case, we have chosen three different initial conditions:

IC(1): x(0) = 400, y1(0) = y2(0) = 1, v(0) = 0.2 and z(0) = 0.5,

IC(2): x(0) = 600, y1(0) = y2(0) = 2, v(0) = 0.5 and z(0) = 1,

IC(3): x(0) = 800, y1(0) = 5, y2(0) = 3, v(0) = 0.9 and z(0) = 1.5.

The evolution of the dynamics of model (33)-(37) was observed over a time interval [0, 500]. We fix the value

of γ = 0.5 and change the values of parameters π and r to get three sets as follows:

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

958 A. M. Elaiw et al 949-967

Page 181: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

Table 1: The values of the parameters of model (33)-(37).

Parameter Value Parameter Value Parameter Value

λ 10 a1 1 p 0.5

d 0.01 a2 1.5 r Varied

β Varied a1 0.5 b 0.3

γ Varied a2 1

δ 0.1 u 3

Set (I): We choose, π = 4 and r = 0.3. Using the values of the parameters given in Table 1, we compute

RM0 = 0.89 < 1 and RM1 = 0.80 < 1, which means that the system has a disease-free steady state Q0 and it

is GAS based on Theorem 1. Evidently, Figures 1-5 show that, the states of the system eventually approach

Q0 = (1000, 0, 0, 0, 0) for the three initial conditions IC(1)-IC(3). This case corresponds to the healthy state

where the viruses are cleared.

Set (II): We take π = 5 and r = 0.3. With such choice we have, RM1 = 0.99 < 1 < RM0 = 1.11. Consequently,

Lemma 1 and Theorem 2 state that, Q1 exists and it is GAS. Figures 1-5 show that the numerical simulations

illustrate our theoretical results given in Theorem 2. We observe that, the trajectory of the system will converge

toQ1 = (140.43, 8.60, 2.87, 0.96, 0) for the three initial conditions IC(1)-IC(3). This case corresponds to a chronic

infection but with inactive immune response.

Set (III): We choose, π = 5 and r = 1. Then, we calculate RM0 = 1.11 > 1 and RM1 = 1.08 > 1, this means

that, the system has three steady states Q0, Q1 and Q2. Thus, from Theorem 3, Q2 is GAS. From Figures 1-5, we

observe a consistency between the numerical results and theoretical results of Theorem 3. We observe that, the

trajectory of the system show oscillating behavior for a period before reaching Q2 = (709.56, 2.90, 0.97, 0.3, 0.45),

in the same time frame for the three initial conditions IC(1)-IC(3).

Case (B): Effect of γ on the stability of the steady states

Let us consider π and r be fixed. In this case, we take the values of π = 5 and r = 1, and consider different

values of γ. Here we take the initial condition as given in IC(1), while the evolution of the dynamics of model

(33)-(37) was observed over a time interval [0, 600]. Table 2 contains the values of the bifurcation parameters

RM0 and RM1 with different values of γ of model (33)-(37).

Table 2: The values of the threshold parameters RM0 and RM1 with different values of γ of model (33)-(37).

Different values of γ RM0 RM1 The equilibria

0.30 1.85 1.79 Q2 = (517.67, 4.82, 1.61, 0.3, 4.72)

0.40 1.39 1.34 Q2 = (637.35, 3.63, 1.21, 0.3, 2.06)

0.54 1.03 0.996 Q1 = (763.16, 2.37, 0.79, 0.26, 0)

0.55 1.01 0.98 Q1 = (926.89, 0.73, 0.24, 0.08, 0)

0.60 0.92 0.90 Q0 = (1000, 0, 0, 0, 0)

0.70 0.79 0.77 Q0 = (1000, 0, 0, 0, 0)

Table 2 and Figures 6-10 show that, when γ is increased, the infection rate is decreased which leads to an

increase in the concentration of the uninfected cells and a decrease on the concentrations of the (first/second)

stage of infected cells, free viruses and B cells.

Case (C): Effect of the multiple stages of infected cells on the dynamics of virus dynamics:

To show the effect of multiple stages of infected cells on the dynamical behavior of the virus, we consider

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

959 A. M. Elaiw et al 949-967

Page 182: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

the following model with single stage of infected cells and compare it with model (33)-(37):

x = λ− dx− πxv

(1 + γx) (1 + δv), (39)

y1 =πxv

(1 + γx) (1 + δv)− a1y1, (40)

v = a1y1 − pzv − uv, (41)

z = rzv − bz. (42)

Consequently, the bifurcation parameters for this system are given by:

Rsingle0 =a1π

a1u

x01 + γx0

, Rsingle1 =a1π

a1u

x2(1 + γx2) (1 + δv2)

. (43)

Since ai < ai, then from Eqs. (38) and (43) we have

RM0 =a1a2π

a1a2u

x01 + γx0

<a1π

a1u

x01 + γx0

= Rsingle0 ,

RM1 =a1a2π

a1a2u

x2(1 + γx2) (1 + δv2)

<a1π

a1u

x2(1 + γx2) (1 + δv2)

= Rsingle1 .

Here we consider the following initial condition: x(0) = 400, y1(0) = 0.5, y2(0) = 1, v(0) = 0.2 and z(0) = 0.5.

The evolution of the dynamics of models (33)-(37) and (39)-(42) was observed over a time interval [0, 600]. Let

us consider the values of parameters listed in Table 1 and choose the values π = 3.5, r = 1.5 and γ = 0.5. By

calculating the bifurcation parameters for systems (33)-(37) and (39)-(42), we obtain

RM0 = 0.78 < 1.16 = Rsingle0 , RM1 = 0.76 < 1.14 = Rsingle1 .

Therefore, with the same values of the parameters, the steady state Q0 is stable for system (33)-(37) but unstable

for system (39)-(42). The presence of multiple stages of infected cells reduces the infection progress. Figures

11-14 show a comparison between the evolution of the uninfected cells, infected cells, free virus particles and B

cells of the two systems (33)-(37) and (39)-(42). We observe that, the concentration of uninfected cells of the

model with three stages of infected cells is larger than that of system with only one single stage of infected cells

(see Figures 11), while the concentrations of first stage of infected cells, viruses and B cells with three stages

are less than that of system with a single stage of infected cells (see Figures 12-14). From a biological point of

view, the multiple stages of infected cells plays a similar role as antiviral treatment in eliminating the virus. We

observe that, if the number of stages of infected cells is increased, then the viral replication is suppressed and

the viruses can be cleared from the body. This give us some suggestions on new drugs to increase the number

of stages of infected cells.

7 Conclusion

We have studied a general virus dynamics model with humoral immunity. We have assumed that the infected

cells passes through n-stages to produce mature viruses. We have obtained two bifurcation parameters, the basic

reproduction number and the humoral immunity number. We have established a set of sufficient conditions

which guarantee the global stability of the model. The global asymptotic stability of the three steady states, Q0,

Q1 and Q2 has been investigated by constructing Lyapunov functionals and using LaSalle’s invariance principle.

To support our theoretical results, we have presented an example and conducted some numerical simulations.

8 Acknowledgment

This article was funded by the Deanship of Scientific Research (DSR), King Abdulaziz University, Jeddah. The

authors, therefore, acknowledge with thanks DSR technical and financial support.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

960 A. M. Elaiw et al 949-967

Page 183: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

0 50 100 150 200 250 300 350 400 450 500100

200

300

400

500

600

700

800

900

1000

Un

infe

cted

tar

get

cell

s

Time

Set (I)

Set (II)

Set (III)

Figure 1: The uninfected cells for model (33)-(37).

0 50 100 150 200 250 300 350 400 450 5000

1

2

3

4

5

6

7

8

9

10

Fir

st s

tage

of

infe

cted

cel

ls

Time

Set (II)

Set (III)

Set (I)

Figure 2: The first stage infected cells for model (33)-(37).

0 50 100 150 200 250 300 350 400 450 5000

0.5

1

1.5

2

2.5

3

Sec

ond

sta

ge o

f in

fect

ed c

ells

Time

Set (III)

Set (II)

Set (I)

Figure 3: The second stage infected cells for model (33)-(37).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

961 A. M. Elaiw et al 949-967

Page 184: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

0 50 100 150 200 250 300 350 400 450 5000

0.2

0.4

0.6

0.8

1

Fre

e vi

rus

par

ticl

es

Time

Set (II)

Set (III)

Set (I)

Figure 4: The free virus particles for model (33)-(37).

0 50 100 150 200 250 300 350 400 450 5000

0.5

1

1.5

2

2.5

3

3.5

B c

ells

Time

Sets (I) & (II) Set (III)

Figure 5: The B cells for model (33)-(37).

0 100 200 300 400 500 600

400

500

600

700

800

900

1000

Time

Un

infe

cted

tar

get

cell

s

γ=0.30

γ=0.54

γ=0.60

Figure 6: The uninfected target cells for model (33)-(37) under different values of γ.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

962 A. M. Elaiw et al 949-967

Page 185: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

0 100 200 300 400 500 6000

2

4

6

8

10

12

14

Time

Fir

st s

tage

of

infe

cted

cel

ls

γ=0.30

γ=0.54

γ=0.60

Figure 7: The first stage infected cells for model (33)-(37) under different values of γ.

0 100 200 300 400 500 6000

0.5

1

1.5

2

2.5

3

3.5

4

4.5

Time

Sec

ond

sta

ge o

f in

fect

ed c

ells

γ=0.30

γ=0.54

γ=0.60

Figure 8: The second stage infected cells for model (33)-(37) under different values of γ.

0 100 200 300 400 500 6000

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Time

Fre

e vi

rus

par

ticl

es

γ=0.30

γ=0.54

γ=0.60

Figure 9: The free virus particles for model (33)-(37) under different values of γ.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

963 A. M. Elaiw et al 949-967

Page 186: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

0 100 200 300 400 500 6000

2

4

6

8

10

12

Time

B c

ell

s

γ=0.30

γ=0.54

γ=0.60

Figure 10: The B cells for model (33)-(37) under different values of γ.

0 100 200 300 400 500 600400

500

600

700

800

900

1000

Un

infe

cted

tar

get

cell

s

Time

For two stages of infected

For single stage of infected

Figure 11: Comparison on the concentration of the uninfected cells for systems (33)-(37) and (39)-(42).

0 100 200 300 400 500 6000

0.5

1

1.5

2

2.5

Time

Fir

st s

tage

of

infe

cted

cel

ls

For two stages of infected

For single stage of infected

Figure 12: Comparisons on the concentration of the first stage of infected cells for systems (33)-(37) and

(39)-(42).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

964 A. M. Elaiw et al 949-967

Page 187: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

0 100 200 300 400 500 6000

0.05

0.1

0.15

0.2

0.25

0.3

0.35

Fre

e vi

rus

par

ticl

es

Time

For two stages of infected

For single stage of infected

Figure 13: Comparisons on the concentration of the free virus particles for systems (33)-(37) and (39)-(42).

0 100 200 300 400 500 6000

0.2

0.4

0.6

0.8

1

1.2

1.4

1.6

1.8

B c

ells

Time

For two stages of infected

For single stage of infected

Figure 14: Comparisons on the concentration of the B cells for systems (33)-(37) and (39)-(42).

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

965 A. M. Elaiw et al 949-967

Page 188: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

References

[1] M. A. Nowak and R. M. May, Virus dynamics: Mathematical Principles of Immunology and Virology,

Oxford Uni., Oxford, (2000).

[2] C. Connell McCluskey, Yu Yang, Global stability of a diffusive virus dynamics model with general incidence

function and time delay, Nonlinear Anal. Real World Appl., 25 (2015), 64-78.

[3] P. K. Roy, A. N. Chatterjee, D. Greenhalgh, and Q. J.A. Khan, Long term dynamics in a mathematical

model of HIV-1 infection with delay in different variants of the basic drug therapy model, Nonlinear Anal.

Real World Appl., 14 (2013), 1621-1633.

[4] A. M. Elaiw, and N. H. AlShamrani, Stability analysis of general viral infection models with humoral

immunity, Journal of Nonlinear Science and Applications, 9 (2016), 684-704.

[5] M. Y. Li and L. Wang, Backward bifurcation in a mathematical model for HIV infection in vivo with

anti-retroviral treatment, Nonlinear Anal. Real World Appl., 17 (2014), 147-160.

[6] G. Huang, W. Ma, Y. Takeuchi, Global properties for virus dynamics model with Beddington–DeAngelis

functional response, Appl. Math. Lett., 22 (2009), 1690-1693.

[7] A.M. Elaiw and S.A. Azoz, Global properties of a class of HIV infection models with Beddington-DeAngelis

functional response, Math. Methods Appl. Sci., 36 (2013), 383-394.

[8] A.M. Elaiw, Global properties of a class of HIV models, Nonlinear Anal. Real World Appl., 11 (2010),

2253-2263.

[9] A. M. Elaiw, Global properties of a class of virus infection models with multitarget cells, Nonlinear Dynam.,

69 (2012), 423-435.

[10] A. M. Elaiw, Global stability analysis of humoral immunity virus dynamics model including latently infected

cells, Journal of Biological Dynamics, DOI:10.1080/17513758.2015.1056846.

[11] L. Wang and M. Y. Li, Mathematical analysis of the global dynamics of a model for HIV infection of CD4+

T cells, Math. Biosci., 200(1) (2006), 44-57.

[12] K. Hattaf, N. Yousfi and A. Tridane, Mathematical analysis of a virus dynamics model with general incidence

rate and cure rate, Nonlinear Anal. Real World Appl., 13(4) (2012), 1866-1872.

[13] K. Wang, A. Fan and A. Torres, Global properties of an improved hepatitis B virus model, Nonlinear Anal.

Real World Appl., 11 (2010), 3131-3138.

[14] X. Song and A. Neumann, Global stability and periodic solution of the viral dynamics, J. Math. Anal. Appl.,

329 (2007), 281-297.

[15] A. U. Neumann, N. P. Lam, H. Dahari, D. R. Gretch, T. E. Wiley, T. J, Layden and A. S. Perelson, Hepatitis

C viral dynamics in vivo and the antiviral efficacy of interferon-alpha therapy, Science, 282 (1998), 103-107.

[16] L. Wang, M. Y. Li, and D. Kirschner, Mathematical analysis of the global dynamics of a model for HTLV-I

infection and ATL progression, Math. Biosci., 179 (2002) 207-217.

[17] A. M. Elaiw, and N. A. Almuallem, Global properties of delayed-HIV dynamics models with differential

drug efficacy in co-circulating target cells, Applied Mathematics and Computation, 265 (2015), 1067-1089.

[18] A. M. Elaiw, and N. A. Almuallem, Global dynamics of delay-distributed HIV infection models with differ-

ential drug efficacy in cocirculating target cells, Mathematical Methods in the Applied Sciences, 39 (2016),

4-31.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

966 A. M. Elaiw et al 949-967

Page 189: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

[19] A. Korobeinikov, Global properties of basic virus dynamics models, Bull. Math. Biol., 66 (2004), 879-883.

[20] P. Georgescu and Y.H. Hsieh, Global stability for a virus dynamics model with nonlinear incidence of

infection and removal, SIAM J. Appl. Math., 67 (2) (2006), 337-353.

[21] G. Huang, Y. Takeuchi and W. Ma, Lyapunov functionals for delay differential equations model of viral

infections, SIAM J. Appl. Math., 70(7) (2010), 2693-2708.

[22] Z. Grossman, M. Polis, M. B. Feinberg, Z. Grossman, I. Levi, S. Jankelevich, R. Yarchoan, J. Boon, F. de

Wolf, J. M.A. Lange, J. Goudsmit, D. S. Dimitrov and W. E. Paul, Ongoing HIV dissemination during

HAART, Nat. Med., 5 (1999), 1099-1104.

[23] J. Wang and S. Liu, The stability analysis of a general viral infection model with distibuted delays and

multi-staged infected progression, Commun. Nonlinear Sci. Numer. Simul., 20(1) (2015), 263–272.

[24] J. A. Deans and S. Cohen, Immunology of malaria, Ann. Rev. Microbiol. 37 (1983), 25-49.

[25] A. Murase, T. Sasaki and T. Kajiwara, Stability analysis of pathogen-immune interaction dynamics, J.

Math. Biol., 51 (2005), 247-267.

[26] M. A . Obaid and A. M. Elaiw, Stability of virus infection models with antibodies and chronically infected

cells, Abstr. Appl. Anal, (2014) Article ID 650371.

[27] S. Wang and D. Zou, Global stability of in host viral models with humoral immunity and intracellular delays,

Appl. Math. Model., 36 (2012), 1313-1322.

[28] T. Wang, Z. Hu and F. Liao, Stability and Hopf bifurcation for a virus infection model with delayed humoral

immunity response, J. Math. Anal. Appl., 411 (2014) 63-74.

[29] A. M. Elaiw and N. H. AlShamrani, Global properties of nonlinear humoral immunity viral infection models,

Int. J. Biomath., 8(5) (2015), 1550058, 53 pages.

[30] A. M. Elaiw and N. H. AlShamrani, Global stability of humoral immunity virus dynamics models with

nonlinear infection rate and removal, Nonlinear Anal. Real World Appl., 26 (2015), 161-190.

[31] T. Wang, Z. Hu, F. Liao and W. Ma, Global stability analysis for delayed virus infection model with general

incidence rate and humoral immunity, Math. Comput. Simulation, 89 (2013), 13-22.

[32] R. Larson and B. H. Edwards, Calculus of a single variable, Cengage Learning, Inc., USA, (2010).

[33] J.K. Hale and S. Verduyn Lunel, Introduction to functional differential equations, Springer-Verlag, New

York, (1993).

[34] A.S. Perelson and P.W. Nelson, Mathematical analysis of HIV-1 dynamics in vivo, SIAM Rev., 41 (1999),

3–44.

[35] P. De. Leenheer and H. L. Smith, Virus dynamics: A global analysis, SIAM J. Appl. Math., 63 (2003),

1313-1327.

[36] G. Huang, W. Ma, Y. Takeuchi, Global properties for virus dynamics model with Beddington–DeAngelis

functional response, Appl. Math. Lett. 22 (2009), 1690–1693.

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

967 A. M. Elaiw et al 949-967

Page 190: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

On the dynamics of a certain four-order fractional difference equations

Chang-you Wang1,2, Xiao-jing Fang1,2, Rui Li1*

1. College of Automation, Chongqing University of Posts and Telecommunications, Chongqing 400065 P. R. China

2. Key Laboratory of Industrial Internet of Things & Networked Control of Ministry of Education, Chongqing University of Posts and Telecommunications,

Chongqing 400065 P.R. China Abstract: This paper is concerned with the following rational recursive sequences

1 2 1 21 1

3 3

, 0,1, ,n n n nn n

n n

x x y yx y nA By C Dx

− − − −+ +

− −

= = =+ +

where the parameters , , ,A B C D are positive constants. The initial condition 3 2, ,x x− −

1 0,x x− and 3 2 1 0, , ,y y y y− − − are arbitrary nonnegative real numbers. We give sufficient

conditions under which the equilibrium (0,0) of the system is globally asymptotically stable, which extends and includes corresponding results obtained in the cited references [12-17]. Moreover, the asymptotic behavior of others equilibrium points is also studied. Our approach to the problem is based on new variational iteration method for the more general nonlinear difference equations and inequality skills as well as the linearization techniques.

Keywords: recursive sequences; equilibrium point; asymptotical stability; positive solutions. 1. Introduction

Nonlinear Difference equations have been studied because they model numerous real life problems in biology, ecology, physics, economics and so forth [1-5]. Today, with the dramatically development of computer-based computational techniques, difference equations are found to be much appropriate mathematical representations for computer simulation, experiment and computation, which play an important role in realistic applications [6]. Therefore, recently there has been an increasing interest in the study of qualitative analysis of rational difference equations. And the present cardinal problem of

* Corresponding author at: College of Automation, Chongqing University of Posts and Telecommunications, Chongqing 400065 P. R. China, Chongqing 400065, PR China. Email address: [email protected]

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

968 Chang-you Wang et al 968-976

Page 191: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

2

asymptotic behavior of solutions for a rational difference equation has received extensive attention from researchers (see, e.g., [7-11] and the references therein).

Elabbasy [12] obtained the form of the solutions of the following rational difference system

1 11 1

-1 -11 1n n

n nn n n n

x yx yx y y x− −

+ += =± + +∓

, (1.1)

with nonzero real number initial conditions. In particular, Clark and Kulenovic [13, 14] discussed the global stability properties and

asymptotic behavior of solutions for the recursive sequence

1 1, , 0,1, ,n nn n

n n

x yx y na cy b dx+ += = =+ +

(1.2)

where , , , (0, )a b c d ∈ ∞ and the initial conditions 0x and 0y are arbitrary nonnegative

numbers. In 2012, Zhang et al. [15] investigated the stability character and asymptotic behavior of the solution for the system of difference equations

-2 -21 1

2 1 2 1

, , 0,1, ,n nn n

n n n n n n

x yx y nB y y y A x x x+ +

− − − −

= = =+ +

(1.3)

where , (0, )A B∈ ∞ , and the initial conditions 3 2 1 0 3 2 1 0, , , , , , , (0, ).x x x x y y y y− − − − − − ∈ ∞

Recently, the following nonlinear two-dimensional difference systems

1 1 2 21 1( , ), ( , )n n t n s n n s n tx x y y y xϕ ψ+ − − + − −= = , (1.4)

where 1 1 2 2, , ,t s s t are all positive integers, was studied by Liu et al. [16], in which they

gave some sufficient conditions such that every positive solution of this equation converges to the unique equilibrium point. More recently, in [17] the authors studied analogous results for the system of difference equations

1 1 1 1,n nx yn n n n n nx ax by e y cy dx e− −+ − + −= + = + , (1.5)

where , , ,a b c d are positive constants and the initial values 1 0 1 0, , ,x x y y are positive

numbers. For more related work, one can refer to [18-22] and references therein. Inspired by the above works, the essential problem we consider in this paper is the

asymptotic behavior of the solution for the difference equation

1 2 1 21 1

3 3

, 0,1, ,n n n nn n

n n

x x y yx y nA By C Dx

− − − −+ +

− −

= = =+ +

, (1.6)

where the initial conditions 3 2 1 0, , , (0, )x x x x− − − ∈ ∞ , 3 2 1 0, , , (0, )y y y y− − − ∈ ∞ and , , ,A B C D

are positive constants. This paper proceeds as follows. In Section 2, we introduce some definitions and

preliminary results. The main results and their proofs are given in Section 3.

2. Preliminaries

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

969 Chang-you Wang et al 968-976

Page 192: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

3

Let ,x yI I be some intervals of real numbers and 4 4: x y xf I I I× → , 4 4: x y yg I I I× → be

continuously differentiable functions. Then for every initial conditions ( , )i i x yx y I I∈ × ,

( 3, 2, 1,0)i = − − − , the system of difference equations

1 -1 -2 -3 -1 -2 -3

1 -1 -2 -3 -1 -2 -3

( , , , , , , , ),0,1, 2, ,

( , , , , , , , ),n n n n n n n n n

n n n n n n n n n

x f x x x x y y y yn

y g x x x x y y y y+

+

=⎧=⎨ =⎩

(2.1)

has a unique solution n 3( , )n nx y ∞=− . A point ( , ) x yx y I I∈ × is called an equilibrium point

of (2.1) if ( )( , , , , , , , ), . , , , , , ,x f x x x x y y y y y g x x x x y y y y= = , i. e., ( , ) ( , )n nx y x y=

for all 0n ≥ . Interval x yI I× is called invariant for system (2.1) if, for all 0n > , ,n x n yx I y I∈ ∈

when the initial conditions 3 2 1 0 3 2 1 0, , , , , ,x yx x x x I y y y y I− − − − − −∈ ∈ .

Definition 2.1 Assume that ( , )x y is a fixed point of (2.1). Then

(i) ( , )x y is said to be stable relative to x yI I× if for every 0ε > , there exits 0δ >

such that for any initial conditions ,( ) ( 3, 2, 1,0)i i x yx y I I i∈ × =− − − , with 0

3 iix x δ

=−− <∑ ,

0

3 iiy y δ

=−− <∑ , implies ,n nx x y yε ε− < − < .

(ii) ( , )x y is called an attractor relative to x yI I× if for all ,( )i i x yx y I I∈ ×

( 3, 2, 1,0)i = − − − , ,n n n nlim x x lim y y→∞ →∞= = .

(iii) ( , )x y is called asymptotically stable relative to x yI I× if it is stable and an

attractor. (iv) Unstable if it is not stable.

Theorem 2.1 Assume that ( 1) ( ( )) , 0,1,X n F X n n+ = = , is a system of difference

equations and X is the equilibrium point of this system i.e., ( )F X X= .

(i) If all eigenvalues of the Jacobian matrix FJ , evaluated at X lie inside the open

unit disk 1λ < , then X is locally asymptotically stable.

(ii) If all eigenvalues of the Jacobian matrix FJ , evaluated at X has modulus greater

than one then X is unstable. Definition 2.2 Let , , ,p q s t be four nonnegative integers such that p q s t n+ = + = .

Splitting 1 2 1 2( , ) ( , , , , , , , )n nx y x x x y y y= into ( , ) ( [ ] , [ ] , [ ] , [ ] )p q s tx y x x y y= ,

where [ ]x σ denotes a vector with σ -components of x , we say that the function

1 2 1 2( , , , , , , , )n nf x x x y y y possesses a mixed monotone property in subsets 2nI of 2nR if ([ ] ,[ ] ,[ ] ,[ ] )p q s tf x x y y is monotone nondecreasing in each component of

[ ] , [ ]p sx y and is monotone nonincreasing in each component of [ ] , [ ]q tx y for 2( , ) nx y I∈ . In particular, if 0q t= = , then it is said to be monotone nondecreasing

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

970 Chang-you Wang et al 968-976

Page 193: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

4

in 2nI .

3. The Main Results In this section, we investigate the asymptotic behavior of the equilibrium points of the

systems (1.6). It is easy to know that the systems (1.6) have four equilibrium points (0, 0) , (0, )C , ( , 0)A , and (( ) / (1 ), ( ) / (1 ))A BC BD C AD BD+ − + − . Theorem 3.1 The equilibrium point (0, 0) of (1.6) is locally asymptotically stable. Proof. We can easily obtain that the linearized system of (1.6) about the equilibrium point (0, 0) is

1n nDϕ ϕ+ = (3.1)

where

1

2

3

1

2

3

0 0 0 0 0 0 0 01 0 0 0 0 0 0 00 1 0 0 0 0 0 00 0 1 0 0 0 0 0

,0 0 0 0 0 0 0 00 0 0 0 1 0 0 00 0 0 0 0 1 0 00 0 0 0 0 0 1 0

n

n

n

nn

n

n

n

n

xxxx

Dyyyy

ϕ

⎡ ⎤ ⎡ ⎤⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥= =⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎣ ⎦⎣ ⎦

. (3.2)

Thus, the characteristic equation of (3.2) is

8( ) 0f λ λ= = . This shows that all the roots of characteristic equation lie inside unit disk. So the equilibrium 0,0( ) is locally asymptotically stable. Theorem 3.2 Let

1 1 1

1 1 1

( , , , , , , , ),0,1,

( , , , , , , , ),n n n n k n n n k

n n n n k n n n k

x f x x x y y yn

y g x x x y y y+ − − − −

+ − − − −

=⎧=⎨ =⎩

, (3.3)

[ , ]a b be an interval of real numbers and assume that 1 1:[ , ] [ , ] [ , ]k kf a b c d a b+ +× → and 1 1:[ , ] [ , ] [ , ]k kg a b c d c d+ +× → are two continuous functions satisfying the mixed monotone

property. If there exit

0 1 0 1 0 0min , , , max , , , k k k km x x x x x x M− − + − − +≤ ≤ ≤ ,

and

0 1 0 1 0 0min , , , max , , , k k k kn y y y y y y N− − + − − +≤ ≤ ≤

such that

0 0 0 0 0 0 0 0 0 0([ ] ,[ ] ,[ ] ,[ ] ) ([ ] ,[ ] ,[ ] ,[ ] ) ,p q s t p q s tm f m M n N f M m N n M≤ ≤ ≤ (3.4)

and

0 0 0 0 0 0 0 0 0 0([ ] ,[ ] ,[ ] ,[ ] ) ([ ] ,[ ] ,[ ] ,[ ] )p q s t p q s tn g m M n N g M m N n N≤ ≤ ≤ , (3.5)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

971 Chang-you Wang et al 968-976

Page 194: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

5

then there exit 20 0( , ) [ , ]m M m M∈ and 2

0 0( , ) [ , ]n N n N∈ satisfying

([ ] ,[ ] ,[ ] ,[ ] ), ([ ] ,[ ] ,[ ] ,[ ] )p q s t p q s tM f M m N n m f m M n N= = , (3.6)

and ([ ] ,[ ] ,[ ] ,[ ] ), ([ ] ,[ ] ,[ ] ,[ ] )p q s t p q s tN g M m N n n g m M n N= = . (3.7)

Moreover, if m M= and n N= , then the system (3.3) has a unique equilibrium point

0 0 0 0( , ) [ , ] [ , ]x y m M n N∈ × and every solution of (3.3) converges to ( , )x y .

Proof. Using 0 0,m M and 0 0,n N as two couples of initial iteration, we construct four

sequences , , i i im M n and ( 1, 2, )iN i = from the following equations

1 1 1 1 1 1 1 1([ ] ,[ ] ,[ ] ,[ ] ), ([ ] ,[ ] ,[ ] ,[ ] )i i p i q i s i t i i p i q i s i tm f m M n N M f M m N n− − − − − − − −= = ,

and

1 1 1 1 1 1 1 1([ ] ,[ ] ,[ ] ,[ ] ), ([ ] ,[ ] ,[ ] ,[ ] )i i p i q i s i t i i p i q i s i tn g m M n N N g M m N n− − − − − − − −= = .

It is obvious from the mixed monotone property of functions f and g that the

sequences , , i i im M n and ( 1, 2, )iN i = possess the following monotone property

0 1 1 0 ,i im m m M M M≤ ≤ ≤ ≤ ≤ ≤ ≤ ≤ (3.8)

and

0 1 1 0 ,i in n n N N N≤ ≤ ≤ ≤ ≤ ≤ ≤ ≤ (3.9)

where =0,1,2,i . Moreover, one has

i l im x M≤ ≤ for ( 1) 1, 0,1,2, .l k i i≥ + + = (3.10)

and

i l in y N≤ ≤ for ( 1) 1, 0,1,2, .l k i i≥ + + = (3.11)

Set lim , lim , lim , lim ,i i i ii i i i

m m M M n n N N→∞ →∞ →∞ →∞

= = = = (3.12)

then liminf limsup , liminf limsup .i i i ii i i i

m x x M n y y N→∞ →∞ →∞ →∞

≤ ≤ ≤ ≤ ≤ ≤ (3.13)

By the continuity of f and g , we have

([ ] ,[ ] ,[ ] ,[ ] ), ([ ] ,[ ] ,[ ] ,[ ] )p q s t p q s tM f M m N n m f m M n N= = , (3.14)

and ([ ] ,[ ] ,[ ] ,[ ] ), ([ ] ,[ ] ,[ ] ,[ ] )p q s t p q s tN g M m N n n g m M n N= = . (3.15)

Moreover, if ,m M n N= = , then lim , limi ii im M x x n N y y

→∞ →∞= = = = = = , and then the

proof is complete. Theorem 3.3 If ,A C B D= = , the equilibrium point 0,0( ) of the systems (1.6) is a global attractor for any initial conditions

83 2 1 0 3 2 1 0( , , , , , , , ) (0, )x x x x y y y y A− − − − − − ∈ .

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

972 Chang-you Wang et al 968-976

Page 195: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

6

Proof. Let 4 4( , ) : (0, ) (0, ) (0, ) (0, )f g ∞ × ∞ → ∞ × ∞ be a function defined by

1 23 2 1 0 3 2 1 0

3

( , , , , , , , ) n n

n

x xf x x x x y y y yA By

− −− − − − − −

=+

,

and

1 23 2 1 0 3 2 1 0

3

( , , , , , , , ) n n

n

y yg x x x x y y y yA Bx

− −− − − − − −

=+

.

We can easily see that the functions f and g possess a mixed monotone property in

subsets 8(0, )A of 8R . Let

00 0 3 2 1 0 3 2 1 0 0 0max , , , , , , , , 0M AM N x x x x y y y y n m

B− − − − − −

−= = < = < .

We have 2 20 0

0 00 0

,m Mm MA BN A Bn

≤ ≤ ≤+ +

(3.16)

2 20 0

0 00 0

,n Nn NA BM A Bm

≤ ≤ ≤+ +

(3.17)

Then from (1.6) and Theorem 3.2, there exit 0 0, [ , ]m M m M∈ , 0 0, [ , ]n N n N∈

satisfying 2 2

, ,m Mm MA BN A Bn

= =+ +

(3.18)

2 2

, .n Nn NA BM A Bm

= =+ +

(3.19)

In view of

0 0m M M A Bn A Bn A BN< < < + < + < + ,

and

0 0n N N A Bm A Bm A BM< < < + < + < + ,

thus, one has 0M m N n= = = = . (3.20)

It follows by Theorem 3.2 that the equilibrium point 0,0( ) of (1.6) is a global attractor. The proof is complete. Theorem 3.4 The equilibrium point 0,0( ) of the system (1.6) is global asymptotically stability for any initial conditions

83 2 1 0 3 2 1 0( , , , , , , , ) (0, )x x x x y y y y A− − − − − − ∈ .

Proof. The result follows from Theorems 3.1 and 3.3. Theorem 3.5 The equilibrium point (0, )C , ( , 0)A of the system (1.6) is unstable. Proof. We can easily obtain that the linearized system of the system (1.6) about the equilibrium (0, )C is

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

973 Chang-you Wang et al 968-976

Page 196: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

7

*1n nDϕ ϕ+ = , (3.21)

where

1

2

3 *

1

2

3

0 0 0 0 0 0 0 01 0 0 0 0 0 0 00 1 0 0 0 0 0 00 0 1 0 0 0 0 0

,0 0 0 - 0 1 1 00 0 0 0 1 0 0 00 0 0 0 0 1 0 00 0 0 0 0 0 1 0

n

n

n

nn

n

n

n

n

xxxx

Dy Dyyy

ϕ

⎡ ⎤ ⎡ ⎤⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥= =⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎣ ⎦⎣ ⎦

The characteristic equation of the systems (3.20) is 5 3( )= ( .P λ λ λ λ− −1) (3.22)

It is obvious that (1) 1, (2) 160P P= − = . It follows by the intermediate value theorem for continuous function that there exists 1λ > so that ( ) 0P λ = . Therefore, one of the roots of characteristic equation (3.22) lies outside unit disk. According to Theorem 2.1, the equilibrium (0, )C is unstable.

Similarly, we can obtain that the unique equilibrium ( , 0)A is unstable.

Theorem 3.6 If 1BD < , the equilibrium point ( , ) ( , )1 1A BC C ADx y

BD BD+ +

=− −

is locally

asymptotically stable. If 1BD > , the equilibrium point ( , )x y is unstable. Proof. We can easily obtain that the linearized system of (1.6) about the equilibrium ( , )x y is

*1n nDϕ ϕ+ = , (3.23)

where

1

2

3 *

1

2

3

0 0 0 0 0 0 0 -1 0 0 0 0 0 0 00 1 0 0 0 0 0 00 0 1 0 0 0 0 0

,0 0 0 - 0 1 1 00 0 0 0 1 0 0 00 0 0 0 0 1 0 00 0 0 0 0 0 1 0

n

n

n

nn

n

n

n

n

x Bxxx

Dy Dyyy

ϕ

⎡ ⎤ ⎡ ⎤⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥= =⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎢ ⎥ ⎢ ⎥⎣ ⎦⎣ ⎦

The characteristic equation of (3.23) is 8( ) 0.P BDλ λ= − = (3.24)

In view of 1BD < , this shows that all the roots of characteristic equation lie inside unit disk, so the unique equilibrium ( , )x y is locally asymptotically stable. If 1BD > , one of the roots of characteristic equation lie outside unit disk, so the unique equilibrium

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

974 Chang-you Wang et al 968-976

Page 197: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

8

( , )x y is unstable.

4. Conclusions This paper presents the use of a variational iteration method for systems of nonlinear difference equations. This technique is a powerful tool for solving various difference equations and can also be applied to other nonlinear differential equations in mathematical physics. The variational iteration method provides an efficient method to handle the nonlinear structure. We have dealt with the problem of global asymptotic stability analysis for a class of nonlinear difference equations. The general sufficient conditions have been obtained to ensure the existence, uniqueness and global asymptotic stability of the equilibrium point (0,0) for the nonlinear difference equation. These criteria generalize and improve some known results in [12-17]. Moreover, the asymptotic behavior of others equilibrium points is also studied. In addition, the sufficient conditions that we obtained are very simple, which provide flexibility for the application and analysis of nonlinear difference equation.

Remark: Our model and results are different from the existence ones such as those of References [12-17]. In particular, the new variational iteration method can be applied to the models of References [12-17] and the more general nonlinear difference equations. In some sense, we enrich the theoretical results of the difference equations.

Acknowledgements This work is supported by Science Fund for Distinguished Young Scholars (cstc2014jc yjjq40004) of China, the National Nature Science Fund (Project nos.11372366 and 61503053) of China, the Science and Technology Project of Chongqing Municipal Education Committee (Grants no. kj1400423) of China, and the excellent talents project of colleges and universities in Chongqing of China.

References 1. Elsayed EM, Iricanin BD: On a max-type and a min-type difference equation. Appl.

Math. Comput. 215, 608-614 (2009) 2. Li WT, Zhang YH, Su YH: Global attractivity in a higher-order nonlinear difference

equation. Acta Mathematica Scientia 25, 59-66 (2005)

3. Yang ZG, Xu, DY: Mean square exponential stability of impulsive stochastic difference equations. Appl. Math. Lett. 20, 938-945 (2007)

4. Jia XM, Hu LX, Li WT: Dynamics of a rational difference equation. Advances in Difference Equations. 2010, Article ID 970720 (2010)

5. Li WT, Sun HR: Global attractivity in a rational recursive sequence. Dynamic Systems and Applications 11, 339-345 (2002)

6. Elaydi S: An Introduction to Difference Equations, third ed., Springer, New York

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

975 Chang-you Wang et al 968-976

Page 198: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

9

(2005) 7. Muroya Y, Ishiwata E, Guglielmi N: Global stability for nonlinear difference equations

with variable coefficients. J. Math. Anal. Appl. 334, 232-247 (2007) 8. Stević S: Solutions of a max-type system of difference equations. Appl. Math. Comput.

218, 9825-9830 (2012) 9. Papaschinopoulos G, Radin M, Schinas CJ: Study of the asymptotic behavior of the

solutions of three systems of difference equations of exponential form. Appl. Math. Comput. 218, 5310-5318 (2012)

10. Migda J: Asymptotically polynomial solutions of difference equations, Advances in Difference Equations 2013, 92 (2013)

11. Hu LX, He WS, Xia HM: Global asymptotic behavior of a rational difference equation. Appl. Math. Comput. 218, 7818-7828 (2012)

12. Elsayed EM: Solutions of rational difference systems of order two. Mathematical and Computer Modelling 55, 378-384 (2012)

13. Clark D, Kulenovic MRS: A coupled system of rational difference equations. Computers and Mathematics with Applications 43, 849-867(2002)

14. Clark D, Kulenovic MRS, Selgrade JF: Global asymptotic behavior of a two- dimensional difference equation modelling competition. Nonlinear Anal. 52, 1765- 1776 (2003)

15. Zhang QH, Yang LH, Liu JZ: Dynamics of a system of rational third-order difference equation. Advances in Difference Equations 2012, 136 (2012)

16. Liu WP, Yang XF, Liu XZ: Dynamics of a family of two-dimensional difference systems. Appl. Math. Comput. 219, 5949-5955 (2013)

17. Papaschinopoulos G, Ellina G, Papadopoulos KB: Asymptotic behavior of the positive solutions of an exponential type system of difference equations. Appl. Math. Comput. 245, 181-190 (2014)

18. Elsayed EM: Behavior and Expression of the Solutions of Some Rational Difference Equations. Journal of Computational Analysis and Applications 15, 73-81 (2013)

19. Zhou LQ: Global asymptotic stability of cellular neural networks with proportional delays. Nonlinear Dyn. 77, 41-47(2014)

20. Elsayed EM, Cinar C: On the solutions of some systems of difference equations. Utilitas Mathematica 93, 279-289 (2014)

21. Hien LV: A novel approach to exponential stability of nonlinear non-autonomous difference equations with variable delays. Appl. Math. Lett. 38, 7-13 (2014)

22. Kulenovic MRS, Pilav E, Silic E: Local dynamics and global attractivity of a certain second-order quadratic fractional difference equation. Advances in Difference Equations 2014, 68 (2014)

J. COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO.5, 2017, COPYRIGHT 2017 EUDOXUS PRESS, LLC

976 Chang-you Wang et al 968-976

Page 199: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO. 5, 2017

Higher-Order Degenerate Bernoulli Polynomials, Dae San Kim, and Taekyun Kim,………789

Korobov Polynomials of the Seventh Kind and of the Eighth Kind, Dae San Kim, Taekyun Kim, Toufik Mansour, and Jong-Jin Seo,………………………………………………………….812

Some Identities on the Higher-Order Twisted q-Euler Numbers and Polynomials, C. S. Ryoo,825

Umbral Calculus Associated With New Degenerate Bernoulli Polynomials, Dae San Kim, Taekyun Kim, and Jong-Jin Seo,………………………………………………………………831

Regularization Smoothing Approximation of Fuzzy Parametric Variational Inequality Constrained Stochastic Optimization, Heng-you Lan,…………………………………………841

The Split Common Fixed Point Problem for Demicontractive Mappings in Banach Spaces, Li Yang, Fuhai Zhao, and Jong Kyu Kim,……………………………………………………….858

Iterated Binomial Transform of the k-Lucas Sequence, Nazmiye Yilmaz and Necati Taskara,864

Nielsen Fixed Point Theory for Digital Images, Ozgur Ege, and Ismet Karaca,……………..874

A Fixed Point Theorem and Stability of Additive-Cubic Functional Equations in Modular Spaces, Chang Il Kim, Giljun Han, and Seong-A Shim,………………………………………881

Results on Value-Shared of Admissible Function and Non-Admissible Function in the Unit Disc, Hong-Yan Xu,…………………………………………………………………………………894

Compositions Involving Schur Harmonically Convex Functions, Huan-Nan Shi, and Jing Zhang,…………………………………………………………………………………………907

A Note on Degenerate Generalized q-Genocchi Polynomials, Jongkyum Kwon, Jin-Woo Park, and Sang Jo Yun,……………………………………………………………………………..923

Cubic Soft Ideals in BCK/BCI-Algebras, Young Bae Jun, G. Muhiuddin, Mehmet Ali Ozturk, and Eun Hwan Roh,………………………………………………………………………….929

Hyers-Ulam Stability of the Delayed Homogeneous Matrix Difference Equation with Constructive Method, Soon-Mo Jung, and Young Woo Nam,………………………………941

Mathematical Analysis of (n + 3)-Dimensional Virus Dynamics Model, A. M. Elaiw, and N. H. AlShamrani,…………………………………………………………………………………..949

Page 200: Journal of Computational Analysis and ApplicationsComputational Mathematical Analysis and its many potential . applications and connections to other areas of Mathematical . Sciences

TABLE OF CONTENTS, JOURNAL OF COMPUTATIONAL ANALYSIS AND APPLICATIONS, VOL. 22, NO. 5, 2017

(continued)

On the Dynamics of a Certain Four-Order Fractional Difference Equations, Chang-you Wang, Xiao-jing Fang, and Rui Li,…………………………………………………………………968