Scientia Magna, 9, no. 3

Page 1


Vol. 9, No. 3, 2013

ISSN 1556-6706

SCIENTIA MAGNA An international journal

Edited by

Department of Mathematics Northwest University Xi’an, Shaanxi, P.R.China


Scientia Magna is published annually in 400-500 pages per volume and 1,000 copies. It is also available in microfilm format and can be ordered (online too) from: Books on Demand ProQuest Information & Learning 300 North Zeeb Road P.O. Box 1346 Ann Arbor, Michigan 48106-1346, USA Tel.: 1-800-521-0600 (Customer Service) URL: http://wwwlib.umi.com/bod/

Scientia Magna is a referred journal: reviewed, indexed, cited by the following journals: "Zentralblatt F端r Mathematik" (Germany), "Referativnyi Zhurnal" and "Matematika" (Academia Nauk, Russia), "Mathematical Reviews" (USA), "Computing Review" (USA), Institute for Scientific Information (PA, USA), "Library of Congress Subject Headings" (USA).

Printed in the United States of America Price: US$ 69.95

i


Information for Authors Papers in electronic form are accepted. They can be e-mailed in Microsoft Word XP (or lower), WordPerfect 7.0 (or lower), LaTeX and PDF 6.0 or lower. The submitted manuscripts may be in the format of remarks, conjectures, solved/unsolved or open new proposed problems, notes, articles, miscellaneous, etc. They must be original work and camera ready [typewritten/computerized, format: 8.5 x 11 inches (21,6 x 28 cm)]. They are not returned, hence we advise the authors to keep a copy. The title of the paper should be writing with capital letters. The author's name has to apply in the middle of the line, near the title. References should be mentioned in the text by a number in square brackets and should be listed alphabetically. Current address followed by e-mail address should apply at the end of the paper, after the references. The paper should have at the beginning an abstract, followed by the keywords. All manuscripts are subject to anonymous review by three independent reviewers. Every letter will be answered. Each author will receive a free copy of the journal.

ii


Contributing to Scientia Magna Authors of papers in science (mathematics, physics, philosophy, psychology, sociology, linguistics) should submit manuscripts, by email, to the Editor-in-Chief: Prof. Wenpeng Zhang Department of Mathematics Northwest University Xi’an, Shaanxi, P.R.China E-mail: wpzhang@nwu.edu.cn Or anyone of the members of Editorial Board: Dr. W. B. Vasantha Kandasamy, Department of Mathematics, Indian Institute of Technology, IIT Madras, Chennai - 600 036, Tamil Nadu, India. Dr. Larissa Borissova and Dmitri Rabounski, Sirenevi boulevard 69-1-65, Moscow 105484, Russia. Prof. Yuan Yi, Research Center for Basic Science, Xi’an Jiaotong University, Xi’an, Shaanxi, P.R.China. E-mail: yuanyi@mail.xjtu.edu.cn Dr. Zhefeng Xu, Department of Mathematic s, Northwest University, Xi’an, Shaanxi, P.R.China. E-mail: zfxu@nwu.edu.cn; zhefengxu@hotmail.com Said Broumi, Hassan II University Mohammedia, Hay El Baraka Ben M’sik Casablanca, B.P.7951 Morocco. Dr. Di Han, Department of Mathematics, Northwest University, Xi’an, Shaanxi, P.R.China. E-mail: handi515@163.com; david1739@126.com

iii


Contents Bin Li : Amenable partial orders on locally inverse semigroup

1

Dr. N. Kannappa and Mrs. P. Tamilvani : On some characterization of Smarandache boolean near-ring with sub-direct sum structure Salahuddin : Some indefinite integrals involving certain polynomial

8 13

Hongming Xia, etc. : Three Classes of Exact Solutions to Klein -Gordon-Schr篓 odinger Equation

20

Yang Suiyi, etc. : The adjacent vertex distinguishing I-total chromatic number of ladder graph

27

Li Yang : A short interval result for the extension of the exponential divisor function

31

K. P. Narayankar, etc. : Terminal hosoya polynomial of thorn graphs

37

S. O. Olatunji, etc. : Sigmoid function in the space of univalent function of Bazilevic type

43

S. Panayappan, etc. : k*-paranormal composition operators

52

R. Ponraj : Difference cordial labeling of subdivided graphs

57

A. C. F. Bueno : On right circulant matrices with trigonometric sequences

67

Hai-Long Li and Qian-Li Yang : On right circulant matrices with trigo -nometric sequences

73

I. Arockiarani and D. Sasikala : 位J -closed sets in generalized topological spaces

85

D. Vamshee Krishna and T. Ramreddy : Coefficient inequality for certain subclass of analytic functions

91

Yonghong Ding : Existence and uniqueness of positive solution for second order integral boundary value problem

99

iv


Aldous Cesar F. Bueno : Smarandache bisymmetric geometric determinat sequences

107

Salahuddin : Certain integral involving inverse hyperbolic function

110

U. Leerawat snd R. Sukklin : Cartesian product of fuzzy SU-ideals on SU-algebra

116

v


Scientia Magna Vol. 9 (2013), No. 3, 1-7

Amenable partial orders on locally inverse semigroup 1 Bin Li Department of Project Management, Shaanxi Business College, Xi’an, Shaanxi, P. R. China Email: libinsxdd@126.com Abstract Suppose that S is a locally inverse semigroup with an inverse transversal S ◦ . In this paper, we first introduce the CS ◦ -cone of S, which modify the definitions of cone in [3] and S ◦ -cone in [4]. By an CS ◦ -cone, we can construct an amenable partial order on S. Conversely, every amenable partial order on S can be constructed in this way. It is easily verified that the set E(S ◦ ) of all idempotent elements of S ◦ is the smallest CS ◦ -cone of S. Also, we show that the amenable partial order constructed by E(S ◦ ) is equal to the natural partial order on S and so the natural partial order on S is the smallest amenable partial order. Keywords Locally inverse semigroup, amenable partial order, inverse transversal, order -preserving bijection. 2000 Mathematics Subject Classification: 20M10, 06B10

§1. Introduction and preliminaries A semigroup S is said to be a partially ordered semigroup, or to be partially ordered, if it admits a compatible ordering ≤; that is, ≤ is a partial order on S such that (∀ a, b ∈ S, x ∈ S 1 ) a ≤ b =⇒ xa ≤ xb and ax ≤ bx. Let S be a regular semigroup with set E(S) of idempotent elements. As usual, ¹ denotes the natural partial order on S. That is, for any a, b ∈ S, a¹b

if and only if

a = eb = bf

for some e, f ∈ E(S).

By corollary 4.2 in [1], the natural partial order ¹ on S is compatible with the multiplication if and only if S is a locally inverse semigroup. Thus a locally inverse semigroup equipped with the natural partial order is a partially ordered semigroup. Particularly, an inverse semigroup is a partially ordered semigroup under the natural partial order. Blyth, McFadden, McAlister and Almeida Santos introduced and studied amenable partially ordered inverse semigroup in [3, 5, 6, 7]. Definition 1.1.[3] Let (S, ·, ≤) be a partially ordered inverse semigroup. The partial order ≤ is said to be a left(right) amenable partial order if it coincides with ¹ on idempotents and 1 This work is supported by a grant of the Science Foundation of Shaanxi Province( # 2011JQ1017) and a grant of the Science Foundation of the Department of Education of Shaanxi Province( # 12JK0872).


2

Bin Li

No. 3

for each a, b ∈ S, a ≤ b implies a−1 a ¹ b−1 b (aa−1 ¹ bb−1 ). If ≤ is both a left amenable partial order and a right amenable partial order on S, then ≤ is called an amenable partial order and S is called an amenable partially ordered inverse semigroup. It is easy to see that the natural partial order on inverse semigroup is an amenable partial order. Suppose that S is an inverse semigroup. Also, McAlister [3] introduced the notion of a cone as the full subsemigroup Q of the subsemigroup R(E(S)) = {x ∈ S| (∀e ∈ E(S)), exe = T xe} with the properties that Q Q−1 = E(S) and xQx−1 ⊆ Q for all x ∈ S. He showed that there exists an order-preserving bijection between the set of cones in S and the set of left amenable partial orders on S. Blyth and Almeida Santos generalized (left) amenable partial orders on inverse semigroup to regular semigroup with an inverse transversal in [4]. Let S be a regular semigroup, for any a ∈ S, V (a) denotes the all inverses of a. An inverse, transversal of a regular semigroup S is an T inverse subsemigroup S ◦ with the property that |S ◦ V (a)| = 1 for every a in S. The unique T inverse of a in S ◦ V (a) is written as a◦ and (a◦ )◦ as a◦◦ . The set of idempotents in S ◦ is denoted by E(S ◦ ) . We recall the following definition. Definition 1.2. [4] Let (S, ·, ≤) be a partially ordered regular semigroup with an inverse transversal S ◦ . If ≤ coincides with ¹ on idempotents and the partial order ≤ has the following property (∀a, b ∈ S) a ≤ b =⇒ a◦ a ¹ b◦ b, then ≤ is said to be a left amenable partial order on S. Dually, if a ≤ b implies aa◦ ¹ bb◦ , then ≤ is called a right amenable partial order on S. If ≤ is both a left amenable partial order and a right amenable partial order on S, then ≤ is called an amenable partial order and S is called an amenable partially ordered regular semigroup with inverse transversal S ◦ . A right normal orthodox semigroup is an orthodox semigroup in which the set E(S) of all idempotent elements of S forms a right normal band, that is to say (∀e, f, g ∈ E(S)) ef g = f eg. Suppose that S is a right normal orthodox semigroup with inverse transversal S ◦ . It is easy to see that the subset R(E(S)) = {a ∈ S|(∀e ∈ E(S)) eae = ae} of S is a subsemigroup of S. Blyth and Almeida Snatos introduced the concept of S ◦ -cone on S in [4], which extended the notion of cone in inverse semigroup. Assume that S is a right normal orthodox semigroup with an inverse transversal S ◦ . A non-empty subset Q of S is called a S ◦ -cone of S if Q satisfies the following three conditions: (C1) Q is a subsemigroup of R(E(S)); (C2) Q

T

Q◦ = E(S ◦ ) ;

(C3) (∀x ∈ S) xQx◦ ⊆ Q.


Vol. 9

Amenable partial orders on locally inverse semigroup

3

Particularly, if Q is a S ◦ -cone and E(S) ⊆ Q, then Q is said to be a locally maximal S -cone of S. Let S is a right normal orthodox semigroup with an inverse transversal S ◦ , Blyth and Almeida Snatos in [4] proved that there is an order-preserving bijection from the set of all locally maximal S ◦ -cones to the set of all left amenable orders definable on S and the natural partial order is the smallest left amenable partial order(see theorems 7 and 11 in [4]). Suppose that S is a locally inverse semigroup with an inverse transversal S ◦ . Blyth and Almeida Santos gave a complete description of all amenable partial orders on S and showed the natural partial order on S is the smallest amenable partial order in [5]. They also proved that every amenable partial orders on S ◦ extends to a unique amenable partial order on S. In this paper, we will give a new characterization of the amenable partial orders on S. We first introduce the CS ◦ -cone of S, which modify the definitions of cone in [3] and S ◦ -cone in [4]. Being similar to [5], by an CS ◦ -cone, we can construct an amenable partial order on S. Conversely, every amenable partial order on S can be constructed in this way. It is easily verified that the set E(S ◦ ) of all idempotent elements of S ◦ is the smallest CS ◦ -cone of S. Also, we show that the amenable partial order constructed by E(S ◦ ) is equal to the natural partial order on S and so the natural partial order on S is the smallest amenable partial order. Finally, it is established that for any (but fixed) the inverse transversal S ◦ of S, there is an order-preserving bijection from the set of all amenable partial orders on S to the set of all amenable partial orders on S ◦ and so every amenable partial order on S ◦ is uniquely extended to an amenable partial order on S. ◦

§2. Constructing amenable partial orders Suppose that (S, ·) is a regular semigroup with an inverse transversal S ◦ . The following two statements are needed. Blyth and Almeida Santos say in [5] that S satisfies the following formular (∀a, b ∈ S) (ab)◦ = (a◦ ab)a◦ = b◦ (ab◦ b)◦ = b◦ (a◦ abb◦ )◦ , (a◦ b)◦ = b◦ a◦◦ , (ab◦ )◦ = b◦◦ a◦ .

(1)

According to Blyth and Almeida Santos in [5], if S is locally inverse, then (∀a, b, c ∈ S) a◦ bc◦ = a◦ b◦◦ c◦ .

(2)

Suppose that S is a regular semigroup with an inverse transversal S ◦ . Blyth and Almeida Santos say in ([4] and [5]) that the two subsets of E(S) Λ = {x◦ x| x ∈ S}, I = {xx◦ | x ∈ S} are respectively right regular subband and left regular subband of E(S). Hence, we immediately have Lemma 2.1. Let S be a locally inverse semigroup with an inverse transversal S ◦ . Then Λ is a right normal subband of E(S) and I is a left normal subband of E(S). Proof. Suppose that S is a locally inverse semigroup with an inverse transversal S ◦ . Consider the set


4

Bin Li

No. 3

E(S ◦ )ζ = {x ∈ S ◦ |(∀e ∈ E(S ◦ )) ex = xe}, which is the centralizer of E(S ◦ ) in S ◦ (see section 5.3 in [2]). It is easy to see that E(S ◦ )ζ is a subsemigroup of S ◦ . Now, we have Definition 2.1. [5] Suppose that S is a locally inverse semigroup with an inverse transversal S ◦ . A subset Q of S ◦ will be called an CS ◦ -cone if (i) Q is a subsemigroup of E(S ◦ )ζ; (ii) Q

T

Q◦ = E(S ◦ );

(iii) (∀x ∈ S) x◦ Qx◦◦ ⊆ Q. It is easy to see that E(S ◦ ) is an CS ◦ -cone. The following result will show that an amenable partial order on S also can be constructed by an CS ◦ -cone. Theorem 2.1. Suppose that S is a locally inverse semigroup with an inverse transversal ◦ S . Let C be an CS ◦ -cone. Then the relation ≤C defined on S by x ≤C y ⇐⇒ xx◦ ¹ yy ◦ , x◦ x ¹ y ◦ y, x◦ y ◦◦ , y ◦◦ x◦ ∈ C is an amenable partial order on S. Proof. It is easily seen that ≤C is reflexive. Suppose that x ≤C y and y ≤C x. From the definition of ≤C we have xx◦ = yy ◦ , x◦ x = y ◦ y, x◦ y ◦◦ , y ◦ x◦◦ ∈ C. Thus y ◦ x◦◦ = (x◦ y ◦◦ )◦ ∈ T C C ◦ = E(S ◦ ), since C is an CS ◦ -cone. It follows from xx◦ = yy ◦ and (1) that x◦◦ x◦ = (xx◦ )◦ = (yy ◦ )◦ = y ◦◦ y ◦ and so y ◦ = y ◦ y ◦◦ y ◦ = y ◦ x◦◦ x◦ , which gives y ◦ ¹ x◦ . Likewise, x◦ ¹ y ◦ and so x◦ = y ◦ , furthermore, we have x◦◦ = y ◦◦ . Hence, x = xx◦ · x◦◦ · x◦ x = yy ◦ · y ◦◦ · y ◦ y = y, this shows that ≤C is anti-symmetric. If x ≤C y and y ≤C z, then x◦ x ¹ y ◦ y ¹ z ◦ z, xx◦ ¹ yy ◦ ¹ zz ◦ and x◦ y ◦◦ , y ◦ z ◦◦ ∈ C. We obtain from xx◦ ¹ yy ◦ that xx◦ yy ◦ = xx◦ . It follows from definition 2.1 that x◦ y ◦◦ y ◦ z ◦◦ ∈ C. Thus, we have x◦ y ◦◦ y ◦ z ◦◦

= x◦ xx◦ y ◦◦ y ◦ z ◦◦ = x◦ (xx◦ yy ◦ )z ◦◦ = x◦ z ◦◦ .

Consequently x◦ z ◦◦ ∈ C, similarly, we have z ◦◦ x◦ ∈ C and so x ≤C z. Hence, ≤C is transitive. Thus we show that ≤C is a partial order on S. Suppose that x ≤C y. For any z ∈ S, we have (zx)◦ (zy)◦◦

= x◦ (zxx◦ )◦ (zy)◦◦ = x◦ (zyy ◦ xx◦ )◦ (zy)◦◦ = x◦ x◦◦ x◦ y ◦◦ (zy)◦ (zy)◦◦ = x◦ y ◦◦ (zy)◦ (zy)◦◦ ∈ CE(S ◦ ) ⊆ C.

(E(S ◦ ) ⊆ C)


Vol. 9

Amenable partial orders on locally inverse semigroup

5

and (zy)◦◦ (zx)◦

= (zy)◦◦ x◦ (zxx◦ )◦

(by (1))

= (zyy ◦ y)◦◦ x◦ (zxx◦ yy ◦ )◦ = (zyy ◦ )◦◦ y ◦◦ x◦ (zyy ◦ xx◦ )◦ = (zyy ◦ )◦◦ y ◦◦ x◦ x◦◦ x◦ (zyy ◦ )◦ = (zyy ◦ )◦◦ y ◦◦ x◦ (zyy ◦ )◦ (y ◦◦ x◦ ∈ C)

∈ C.

Hence, we have (zx)◦ (zy)◦◦ , (zy)◦◦ (zx)◦ ∈ C. It follows from theorem 8 in [5] that zx(zx)◦ ¹ zy(zy)◦ and (zx)◦ zx ¹ (zy)◦ zy. Thus, we see zx ≤C zy, therefore ≤C is compatible on the left. Dually, we have that ≤C is also compatible on the right and so (S, ·, ≤C ) is a partially ordered semigroup. In the following, we will show that the partial order ≤C coincides with the natural partial order on E(S). Suppose that e, f ∈ E(S) and e ≤C f . Then e◦ e ¹ f ◦ f, ee◦ ¹ f f ◦ and so e◦ ef ◦ f = e◦ e, f f ◦ ee◦ = ee◦ . Pre-multiplying e◦ ef ◦ f = e◦ e by e, we obtain e = (ef ◦ )f , post-multiplying this by f , we have ef = (ef ◦ )f = e. Similarly, we have f (f ◦ e) = f e = e, consequently e ¹ f . If e, f ∈ E(S) and e ¹ f , then e = ef = f e, further, we have e◦ e(f ◦ f ) = e◦ ef (f ◦ f ) = e◦ ef = e◦ e, post-multiplying this by e◦ e, we have e◦ e(f ◦ f )e◦ e = e◦ e, by lemma 2.1, we have f ◦ f e◦ e = e◦ e, hence, e◦ e ¹ f ◦ f , similarly, we have ee◦ ¹ f f ◦ . It is clear that e◦ f ◦◦ , f ◦◦ e◦ ∈ C, hence, e ≤C f . Consequently, ≤C coincides with ¹ on idempotents. By definition 1.1, we have that ≤C is an amenable partial order. Assume that S is a locally inverse semigroup with an inverse transversal S ◦ and ≤ is a ◦ partial order on S. We denote by ≤S the restriction of ≤ on S ◦ . Then the following lemma is clear. Lemma 2.2. Suppose that S is a locally inverse semigroup with an inverse transversal ◦ S ◦ . If ≤ is an amenable partial order on S, then ≤S is an amenable partial order on S ◦ . Lemma 2.3. Suppose that S is a locally inverse semigroup with an inverse transversal ◦ S . If the partial order ≤ is an amenable partial order on S, then ◦

(∀a, b ∈ S) a ≤ b =⇒ a◦◦ ≤S b◦◦ . Proof. Suppose that a ≤ b, then aa◦ ¹ bb◦ and a◦ a ¹ b◦ b by definition 1.1. Hence, we have aa◦ bb◦ = aa◦ and a◦ ab◦ b = a◦ a, by (1) and (2), we have (aa◦ bb◦ )◦ = (aa◦ b◦◦ b◦ )◦ = b◦◦ b◦ a◦◦ a◦ = (aa◦ )◦ = a◦◦ a◦ . This shows that a◦◦ a◦ ¹ b◦◦ b◦ . Likewise, a◦ a◦◦ ¹ b◦ b◦◦ . Since ≤ is an amenable partial order, we have a◦◦ a◦ ≤ b◦◦ b◦ and a◦ a◦◦ ≤ b◦ b◦◦ , consequently ◦ a◦◦ = a◦◦ a◦ aa◦ a◦◦ ≤ b◦◦ b◦ bb◦ b◦◦ = b◦◦ . From a◦◦ , b◦◦ ∈ S ◦ we have a◦◦ ≤S b◦◦ , as required. Proposition 2.1. Suppose that S is a locally inverse semigroup with an inverse transversal S ◦ . If the partial order ≤ is an amenable partial order on S, then there exists an CS ◦ -cone C such that ≤C =≤. ◦ Proof. Assume that ≤ is an amenable partial order on S, we denote by ≤S the restriction ◦ of ≤ on S ◦ . By lemma 2.3, we have ≤S is an amenable partial order on S ◦ . Let ◦

C = {x|x ∈ S ◦ , x◦ x ≤S x, xx◦ ≤S x},


6

Bin Li

No. 3

it is easily to see that E(S ◦ ) ⊆ C. By lemma 2.1(iii) in [3] and its dual, we have C is the subset of E(S ◦ )ζ. Now let x, y ∈ C. Then (xy)◦ xy

=

y ◦ x◦ xy

=

y ◦ yy ◦ x◦ xy

≤S

yy ◦ x◦ xy

=

x◦ xyy ◦ y

=

x◦ xy

≤S

(x, y ∈ S ◦ )

(E(S ◦ ) is a semilattice)

xy.

Similarly, we have xy(xy)◦ ≤S xy. Hence, xy ∈ C. This shows that C is a subsemigroup of E(S ◦ )ζ. ◦ ◦ Suppose that x, x◦ ∈ C. Then x◦ x ≤S x, x◦◦ x◦ ≤S x◦ . From x ∈ S ◦ we obtain ◦ ◦ x◦◦ = x, thus we have xx◦ ≤S x◦ , post-multiplying this by x, we have x ≤S x◦ x whence T x = x◦ x ∈ E(S ◦ ), hence, we have C C ◦ ⊆ E(S ◦ ). On the other hand, it is clear that T T E(S ◦ ) ⊆ C C ◦ . Consequently E(S ◦ ) = C C ◦ . For any x ∈ S, a ∈ C, we have (x◦ ax◦◦ )◦ (x◦ ax◦◦ )

x◦ a◦ x◦◦ x◦ ax◦◦

=

◦ ◦ ◦◦ ◦

◦◦ ◦

(by (1)) ◦◦

=

x a x x ax x · x

=

x◦ a◦ ax◦◦ x◦ · x◦◦

=

x◦ a◦ ax◦◦

≤S

x◦ ax◦◦ .

(a ∈ C ⊆ E(S ◦ )ζ) ◦

(a◦ a ≤S a)

Dually, we have (x◦ ax◦◦ )(x◦ ax◦◦ )◦ ≤S x◦ ax◦◦ . Thus we have x◦ ax◦◦ ∈ C and so x◦ Cx◦◦ ⊆ C. It follows from definition 2.1 that C is an CS ◦ -cone. Consider the corresponding partial order ≤C given by x ≤C y ⇐⇒ xx◦ ¹ yy ◦ , x◦ x ¹ ◦ y y, x◦ y ◦◦ , y ◦◦ x◦ ∈ C. We can obtain from theorem 2.1 that ≤C is an amenable partial order on S. In the following, we will show that ≤C =≤. Suppose that x ≤C y. Then xx◦ ¹ yy ◦ and x◦ y ◦◦ ∈ C, hence, we have x◦◦ x◦

= (xx◦ yy ◦ )◦◦ = (xx◦ y ◦◦ y ◦ )◦◦ ◦◦ ◦ ◦◦ ◦

=x x y y

◦◦ ◦ ◦◦ ◦ ◦◦ ◦

=y y x x y y

= y ◦◦ (x◦ y ◦◦ )◦ (x◦ y ◦◦ )y ◦ ◦

≤S y ◦◦ (x◦ y ◦◦ )y ◦ = y ◦◦ x◦ y ◦◦ y ◦ = y ◦◦ x◦ x◦◦ x◦ y ◦◦ y ◦ = y ◦◦ x◦ (x◦◦ x◦ y ◦◦ y ◦ ) = y ◦◦ x◦ x◦◦ x◦ = y ◦◦ x◦ .

(by (2)) (by (1))


Vol. 9

Amenable partial orders on locally inverse semigroup

7

Since ≤ is an amenable partial order, we have x = xx◦ x◦◦ x◦ x ≤ xx◦ y ◦◦ x◦ x ≤ yy ◦ y ◦◦ y ◦ y = y. Consequently ≤C ⊆≤. Suppose that a, b ∈ S and a ≤ b. It follows from a ≤ b that aa◦ ¹ bb◦ and a◦ a ¹ b◦ b, ◦ furthermore, we have b◦ b◦◦ a◦ = a◦ . By lemma 2.3, we have a◦◦ ≤S b◦◦ . Hence, (a◦ b)◦ (a◦ b)◦◦ = ◦ ◦ b◦ a◦◦ a◦ b◦◦ ≤S b◦ b◦◦ a◦ b◦◦ = a◦ b◦◦ = (a◦ b)◦◦ , i.e., (a◦ b)◦ (a◦ b)◦◦ ≤S (a◦ b)◦◦ . Similarly, we ◦ have (a◦ b)◦◦ (a◦ b)◦ ≤S (a◦ b)◦◦ . Thus we obtain that a◦ b◦◦ = (a◦ b)◦◦ ∈ C. Similarly, we have b◦◦ a◦ ∈ C. From the definition of ≤C we have a ≤C b and so ≤⊆≤C . Therefore ≤C =≤. It is to see E(S ◦ ) is the smallest CS ◦ -cone, by proposition 2.1 and theorem 11 in [5], we have Theorem 2.2. Suppose that S is a locally inverse semigroup with an inverse transversal S ◦ . Then ≤E(S ◦ ) defined by (∗) is the smallest amenable partial order on S and ≤E(S ◦ ) =¹.

References [1] M. Petrich and N. R. Reilly, Completely regular semigroups, Wiley, New York, 1999. [2] J. M. Howie, Fundamentals of semigroup theory, Oxford: Oxford Science Publication, 1995. [3] D. B. McAlister, Amenable ordered inverse semigroup, Journal of Algebra, 65(1980), 118-146. [4] T. S. Blyth and M. H. Almeida. Santos, Amenable orders on orthodox semigroup, Journal of Algebra, 169(1994), 49-70. [5] T. S. Blyth and M. H. Almeida. Santos, Amenable orders associated with inverse transversals, Journal of Algebra, 240(2001), 143-169. [6] T. S. Blyth and Dubreil Jacotin inverse semigroup, Proc. Roy. Soc. Edinburgh Ssct A, 71(1973), 345-360. [7] T. S. Blyth and Dubreil Jacotin inverse semigroup, Proc. Roy. Soc. Edinburgh Ssct A, 71(1973), 345-360. [8] T. Saito, Construction of inverse semigroup with inverse transversals, Proc. Edinburgh. Math. Soc., 32(1989), 41-51. [9] F. L. Zhu, Normal orthodox semigroups with inverse transversals, Chin. Quart. J. of Math, 18(2003), No. 2, 198-204.


Scientia Magna Vol. 9 (2013), No. 3, 8-12

On some characterization of Smarandache -boolean near-ring with sub-direct sum structure Dr. N. Kannappa

and Mrs. P. Tamilvani

† TBML College, Porayar - 609307, Tamilnadu, India E-mails: sivaguru91@yahoo.com Abstract In this paper, we introduced Samarandache-2-algebraic structure of Boolean-nearring namely Smarandache-Boolean-near-ring. A Samarandache-2-algebraic structure on a set N means a weak algebraic structure S1 on N such that there exists a proper subset M of N , which is embedded with a stronger algebraic structure S2 , stronger algebraic structure means satisfying more axioms, that is S1 << S2 , by proper subset one understands a subset different from the empty set, from the unit element if any, from the whole set [3] . We define Smarandache-Boolean-near-ring and obtain the some of its characterization through Booleanring with sub-direct sum structure. For basic concept of near-ring we refer to G. Pilz [11] . Keywords Boolean-ring, Boolean-near-ring, Smarandache-Boolean-near-ring, compatibility, maximal set, idempotent and uni-element.

§1. Preliminaries Definition 1.1. A (Left) near ring A is a system with two Binary operations, addition and multiplication, such that (i) the elements of A form a group (A, +) under addition, (ii) the elements of A form a multiplicative semi-group, (iii) x(y + z) = xy + xz, for all x, y and z ∈ A. In particular, if A contains a multiplicative semi-group S whose elements generates (A, +) and satisfy, (iv) (x + y)s = xs + ys, for all x, y ∈ A and s ∈ S, then we say that A is a distributively generated near-ring. Definition 1.2. A near-ring (B, +, ·) is Boolean-near-ring if there exists a Boolean-ring (A, +, ∧, 1) with identity such that is defined in terms of +, ∧ and 1, and for any b ∈ B, b · b = b. Definition 1.3. A near-ring (B, +, ·) is said to be idempotent if x2 = x, for all x ∈ B. i.e. If (B, +, ·) is an idempotent ring, then for all a, b ∈ B, a + a = 0 and a · b = b · a. Definition 1.4. Compatibility a ∈ b i.e. ”a is compatibility to b” if ab2 =a2 b. Definition 1.5. Let A = (· · · , a, b, c, · · · ) be a set of pairwise compatible elements of an associate ring R. Let A be maximal in the sense that each element of A is compatible with


Vol. 9

On some characterization of Smarandache-boolean near-ring with sub-direct sum structure

9

every other element of A and no other such elements may be found in R. Then A is said to be a maximal compatible set or a maximal set. Definition 1.6. If a sub-direct sum R of domains has an identity, and if R has the property that with each element a, it contains also the associated idempotent a0 of a, then R is called an associate subdirect sum or an associate ring. Definition 1.7. If the maximal set A contains an element u which has the property that a < u, for all a ∈ A, then u is called the uni-element of A. Definition 1.8. Left zero divisors are right zero divisors, if ab = 0 implies ba = 0. Now we have introduced a new definition by [3]. Definition 1.9. A Boolean-near-ring B is said to be Samarandache-Boolean-near-ring whose proper subset A is a Boolean-ring with respect to same induced operation of B. Theorem 1.1. A Boolean-near-ring (B, ∨, ∧) is having the proper subset A , is a maximal set with uni-element in an associate ring R, with identity under suitable definitions for (B, +, )˙ with corresponding lattices (A, ≤) (A, <) and a ∨ b = a + b − 2a0 b = (a ∪ b) − (a ∩ b), a ∧ b = a ∩ b = a0 b = ab0 . Then B is a Smarandache-Boolean-near-ring. Proof. Given (B, ∨, ∧) is a Boolean-near-ring whose proper subset (A, ∨, ∧) is a maximal set with uni-element in an associate ring R, and if the maximal set A is also a subset of B. Now to prove that B is Smarandache-Boolean-near-ring. It is enough to prove that the proper subset A of B is a Boolean-ring. Let a and b be two constants of A, if a is compatible to b, we define a ∧ b as follows: If ai = bi in the i-component, let (a ∧ b)i = 0i ; if ai 6= bi , then since a∼b precisely one of these is zero; if ai = 0, let (a ∧ b)i = bi 6= 0; if bi = 0, let (a ∧ b)i = ai 6= 0. It is seen that if a ∧ b belongs to the associate ring R, then a ∧ b < u, where u is the uni-element of A, and therefore, a ∧ b ∈ A. Consider a ∧ b = a + b − 2a0 b : If in the i-component, 0 6= ai -bi , then since (a0 )i = 1i = (bo )i , we have (a + b − 2a0 b)i = 0i ; if 0i = ai = bi , then (a0 )i = 0 and (b0 )i = 1, whence, (a + b − 2a0 b)i = bi ; if ai 6= 0 and bi =0 then (a + b − 2a0 b) = 0i . Therefore a ∧ b ∈ A, the maximal set. Similarly, the element a∧b = a∩b = a0 b = ab0 = glb(a, b) has defined and shown to belongs to A as the glb(a, b). Now let us show that (A, ∨, ∧) is a Boolean-ring. Firstly, a ∨ a = 0, since ai = ai in every i-component, whence (a ∨ a)i vanishes, by our definition of ’∨’. Secondly a ∧ a = a ∩ a = a0 a = a, and so a is idempotent under ∧. We have shown that A is closed under ∧ is ∨, and associativity is a direct verification, and each element is itself inverse under ∧. To prove associativity under ∧ : For a ∧ (b ∧ c) = a0 (b ∧ c) = a0 (b0 c) = a0 (bc0 ) = (a0 b)c0 = (a ∧ b)0 c = (a ∧ b) ∧ c ⇒ a ∧ (b ∧ c) = (a ∧ b) ∧ c, for all a, b, c ∈ R. For distributivity of ∧ over ∧, let c be an arbitrary element in A.


10

Dr. N. Kannappa and Mrs. P. Tamilvani

No. 3

Now c ∧ (a ∨ b) = c0 (a ∨ b) = c0 (a ∪ b) − c0 (a ∩ b) = (c0 a ∪ c0 b) − c0 a0 b = c0 a + c0 b − c0 a0 b − c a b = c0 a + c0 b − 2c0 a0 b = (c ∧ a) ∨ (c ∧ b) ⇒ c ∧ (a ∨ b) = (c ∧ a) ∨ (c ∧ b). Hence (A, ∨, ∧) is a Boolean-ring. 0 0

It follows that the proper subset A, a maximal set of B forms a Boolean ring. B is a Boolean-near-ring, whose proper subset is a Boolean-ring, then by definition, B is a SmarandacheBoolean-near-ring. Theorem 1.2. A Boolean-near-ring (B, ∨, ∧) is having the proper subset (A, +, ∧, 1) is an associate ring in which the relation of compatibility is transitive for non-zero elements with identity under suitable definitions for (B, +, ·) with corresponding lattices (A, ≤) (A, <) and a ∨ b = a + b − 2a0 b = (a ∪ b) − (a ∩ b), a ∧ b = a ∩ b = a0 b = ab0 . Then B is a Smarandache-Boolean-near-ring. Proof. Assume that (B, +, ·) be Boolean- near-ring having a proper subset A is an associate ring in which the relation of compatibility is transitive for non-zero elements. Now to prove that B is a Smarandache-Boolean-near-ring, i.e., to prove that if the proper subset of B is a Boolean-ring, then by definition B is Smarandache-Boolean-near-ring. We have 0 is compatible with all elements, whence all elements are compatible with A and therefore, are idempotent. Then assume that transitivity holds for compatibility of non-zero elements. It follows that non-zero elements from two maximal sets cannot be compatible (much less equal), and hence, except for the element 0, the maximal sets are disjoint. Let a be a arbitrary, non-zero element of R. If a is a zero-divisor of R, then the idempotent element A − a0 6= 0. Further A − a0 belongs to the maximal set generated by the non-zero divisor a0 = a + A − a0 , since it is (A − a0 )a0 = (A − a0 )(a + A − a0 ) = (A − a0 ) = (A − a0 )2 i.e. A − a0 < a0 . Since also a < a0 and a ∼ A − a0 , therefore, a is idempotent. i.e. All the zero-divisors of R are idempotent which is a maximal set then by theorem 1 and by definition A is a Boolean-ring. Then by definition, B is Smarandache-Boolean-near-ring. Theorem 1.3. A Boolean-near-ring (B, ∨, ∧) is having the proper subset A, the set A of idempotent elements of a ring R, with suitable definitions for ∨ and ∧, a ∨ b = a + b − 2a0 b = (a ∪ b) − (a ∩ b), a ∧ b = a ∩ b = a0 b = ab0 . Then B is a Smarandache-Boolean-near-ring. Proof. Assume that the set A of idempotent elements of a ring R, which is also a subset of B. Now to prove that B is a Smarandache-Boolean-near-ring. It is sufficient to prove that the set A of idempotent elements of a ring R with identity forms a maximal set in R with uni-element. By the definition of compatible, then we have every element of R is compatible with every other idempotent element. If a ∈ R is not idempotent then, a2 · 1 6= a · 12 , since the definition of compatible. Hence no non-idempotent can belong to this maximal set. Thus the set A is idempotent element of R with identity forms a maximal set in R whose uni-element is the identity of R, by theorem 1 and by definition. A, a maximal set of B forms a Boolean ring Then by definition, it concludes that B is Smarandache-Boolean-near-ring.


Vol. 9

On some characterization of Smarandache-boolean near-ring with sub-direct sum structure

11

Theorem 1.4. A Boolean-near-ring (B, ∨, ∧) is having the proper subset, having a nonzero divisor of A, as an associate ring, with suitable definitions for ∨ and ∧, a ∨ b = a + b − 2a0 b = (a ∪ b) − (a ∩ b) a ∧ b = a ∩ b = a0 b = ab0 . Then B is a Smarandache-Boolean-near-ring. Proof. Let B is Boolean-near-ring whose proper subset having a non-zero divisor of associate ring A. Now to prove that B Smarandache-Boolean-near-ring. It is enough to prove that every non-divisor of A determines uniquely a maximal set of A with uni-element. Let a be the uni-element of a maximal set A then we have b < a, for b ∈ A. Consider all the elements of A in whose sub-direct display one or more component ai duplicate the corresponding component ui of u, the other components of a being zeros, i.e., all the element a such that a < u , becomes u is uni-element. Clearly, these elements are compatible with each other and together with u form a maximal set in A, for which u is the uni-element. Hence A is a maximal set with uni-element and by theorem 1 and definition A, a maximal set of B forms a Boolean ring. Then by definition, B is Smarandache-Boolean-near-ring. Theorem 1.5. A Boolean-near-ring (B, ∨, ∧) is having the proper subset A, associate ring is of the form A = uJ , where u is a non-zero of A and J is the set of idempotent elements of A, with suitable definitions for ∨ and ∧, a ∨ b = a + b − 2a0 b = (a ∪ b) − (a ∩ b), a ∧ b = a ∩ b = a0 b = ab0 . Then B is a Smarandache-Boolean-near-ring. Proof. Assume that the proper subset A of a Boolean-near-ring B is of the form A = uJ , where u is non-zero divisor of A and J is the set of idempotent elements of A. Now to prove B is Smarandache-Boolean-near-ring. It is enough to prove that A is a maximal set with uni-element. (i) It is sufficient to show that the set uJ is a maximal set having u as its uni-element. (ii) If b belongs to the maximal set determined by u, then b has the required form b = ue , for some e ∈ J. Proof of (i). It is seen that ue ∼ uf i.e. ue is compatible to uf with uni-element u, for all e, f ∈ J, since idempotent belongs to the center of A. Also, ue < u, since ue · u = u2e = (ue )2 . Proof of (ii). We know that A is an associate ring, the associated idempotent a0 of a has the property: if a ∼b then a0 b = ab0 = b0 a = ba0 ; if a ∈ Au , then since a < u and u0 = 1, we have A = u0 a = au0 = a0 u, for all a0 ∈ J. Hence A is a maximal set with uni-element of of B by suitable definition and by theorem 1 then we have A is a Boolean-ring. Then by definition, B is Smarandache-Boolean-near-ring.

References [1] G. Bermann and R. J. Silverman, Near Rings, Amer. Math., 66(1954).


12

Dr. N. Kannappa and Mrs. P. Tamilvani

No. 3

[2] Birkhoff, Garrett, Lattice Theory, American. Math. Soc., Colloquium Publication, 1939. [3] Florentin Smarandache, Special algebraic structures, University of Maxico, Craiova, 1973. [4] A. L. Foster, Generalized boolean theory of universal algebras, Math. Z., 1958. [5] A. L. Foster, The idempotent elements of a commutative ring form a Boolean Algebra, Duke math. J., 1946. [6] James R. Clay and Donald A. Lawver, Boolean-near-rings, Canad. Math. Bull., 1968. [7] N. H. McCoy and D. Montgomery, A representation of generalized Boolean rings, Duke Math. J., 1937. [8] N. H. McCoy , Subdirect sums of rings, Bull. Amer. Math. Soc., 1947. [9] Padilla Raul, Smarandache Algebraic Structures, Delhi, India, 1998. [10] Padilla Raul, Smarandache Algebraic Structures, USA, 9(1998). [11] G. Pilz, Near rings, North Holland Press, Amsterdam, 1977. [12] T. Ramaraj and N. Kannappa, On finite Smarandache-near-rings, Scientia Magna, 1(2005), No. 2, 49-51.


Scientia Magna Vol. 9 (2013), No. 3, 13-19

Some indefinite integrals involving certain polynomial Salahuddin Mewar University, Gangrar, Chittorgarh (Rajasthan), India E-mail: vsludn@gmail.com, sludn@yahoo.com Abstract In this paper we have established two indefinite integrals involving Lucas polynomials, Fibonacci polynomials, Gegenbauer polynomials and Hermite polynomials. The results represent here are assumed to be new. Keywords Gegenbauer polynomials, hermite polynomials; Fibbonacci polynomials, Lucas pol -ynomials, polylogarithm function, hypergeometric function. 2000 Mathematics Subject Classification: 33C05, 33C45, 33C15, 33D50, 33D60

§1. Introduction and preliminaries Definition 1.1. Gegenbauer polynomials or ultraspherical polynomials Cnα (x) are orthog1 onal polynomials on the interval [-1,1] with respect to the weight function (1 − x2 )α− 2 . They generalize Legendre polynomials and Chebyshev polynomials, and are special cases of Jacobi polynomials. They are named for Leopold Gegenbauer. Gegenbauer polynomials are particular solutions of the Gegenbauer differential equation (1 − x2 )y 00 − (2α + 1)xy 0 + n(n + 2α)y = 0. When α = 12 , the equation reduces to the Legendre equation, and the Gegenbauer polynomials reduce to the Legendre polynomials. They are given as Gaussian hypergeometric series in certain cases where the series is in fact finite µ ¶ (2α)n 1 1−z Cnα (z) = F − n, (2α + n); α + . ; 2 1 n! 2 2 They are special cases of the Jacobi polynomials Cnα (z) =

(2α)n (α− 1 ,α− 12 ) Pn 2 (x). 1 (α + 2 )n

One therefore also has the Rodrigues formula Cnα (z) =

i n h 1 1 d (−2)n Γ(n + α)Γ(n + 2α) (1 − x2 )−α+ 2 n (1 − x2 )n+α− 2 . n! Γ(α)Γ(2n + 2α) dx


14

Salahuddin

No. 3

Definition 1.2. The Pochhammer’s symbol is defined by    b(b + 1) · · · (b + k − 1), if k = 1, 2, 3, · · · ; Γ(b + k)  (b, k) = (b)k = = 1 , if k = 0;  Γ(b)   k! , if b = 1, k = 1, 2, 3, · · · where b is neither zero nor negative integer and the notation Γ stands for gamma function. Definition 1.3. In mathematics, the Bernoulli polynomials occur in the study of many special functions and in particular the Riemann zeta function and the Hurwitz zeta function. This is in large part because they are an Appell sequence, i.e., a Sheffer sequence for the ordinary derivative operator. Unlike orthogonal polynomials, the Bernoulli polynomials are remarkable in that the number of crossings of the x-axis in the unit interval does not go up as the degree of the polynomials goes up. In the limit of large degree, the Bernoulli polynomials, appropriately scaled, approach the sine and cosine functions. The Bernoulli polynomials Bn (x) admit a variety of different representations. Which among them should be taken to be the definition may depend on one’s purposes. Definition 1.4. Explicit formula is defined by   n X n   Bk xn−k , Bn (x) = n − k k=0 for n ≥ 0, where Bk are the Bernoulli numbers. Definition 1.5. In mathematics, the Hermite polynomials are a classical orthogonal polynomial sequence that arise in probability, such as the Edgeworth series; in combinatorics, as an example of an Appell sequence, obeying the umbral calculus; in numerical analysis as Gaussian quadrature; and in physics, where they give rise to the eigenstates of the quantum harmonic oscillator. They are also used in systems theory in connection with nonlinear operations on Gaussian noise. They are named after Charles Hermite (1864) although they were studied earlier by Laplace (1810) and Chebyshev (1859). There are two different standard ways of normalizing Hermite polynomials: Hen (x) = (−1)n e

x2 2

dn − x2 e 2, dxn

(the “probabilists’ Hermite polynomials”), and 2

Hn (x) = (−1)n ex

³ x2 dn −x2 d ´n − x2 2 e = e x − e 2, dxn dx

(the “physicists’ Hermite polynomials”). These two definitions are not exactly equivalent; either is a rescaling of the other, to wit ³ x ´ √ n n Hn (x) = 2 2 Hen ( 2x), Hen (x) = 2− 2 Hn √ . 2 The notation He and H is that used in the standard references Tom H. Koornwinder, Roderick S. C. Wong, and Roelof Koekoek et al(2010), and Abramowitz & Stegun. The polynomials x2 Hen are sometimes denoted by Hn , especially in probability theory, because √12π e− 2 is the


Vol. 9

Some indefinite integrals involving certain polynomial

15

probability density function for the normal distribution with expected value 0 and standard deviation 1. The first eleven probabilists’ Hermite polynomials are: He0 (x) = 1, He1 (x) = x, He2 (x) = x2 − 1, He3 (x) = x3 − 3x, He4 (x) = x4 − 6x2 + 3, He5 (x) = x5 − 10x3 + 15x, He6 (x) = x6 − 15x4 + 45x2 − 15, He7 (x) = x7 − 21x5 + 105x3 − 105x, He8 (x) = x8 − 28x6 + 210x4 − 420x2 + 105, He9 (x) = x9 − 36x7 + 378x5 − 1260x3 + 945x, He10 (x) = x10 − 45x8 + 630x6 − 3150x4 + 4725x2 − 945, and the first eleven physicists’ Hermite polynomials are: H0 (x) = 1, H1 (x) = 2x, H2 (x) = 4x2 − 2, H3 (x) = 8x3 − 12x, H4 (x) = 16x4 − 48x2 + 12, H5 (x) = 32x5 − 160x3 + 120x, H6 (x) = 64x6 − 480x4 + 720x2 − 120, H7 (x) = 128x7 − 1344x5 + 3360x3 − 1680x, H8 (x) = 256x8 − 3584x6 + 13440x4 − 13440x2 + 1680, H9 (x) = 512x9 − 9216x7 + 48384x5 − 80640x3 + 30240x, H10 (x) = 1024x10 − 23040x8 + 161280x6 − 403200x4 + 302400x2 − 30240. Definition 1.6. The sequence of Lucas polynomials is a sequence of polynomials defined by the recurrence relation  0    2x = 2 Ln (x) = 1x1 = x    1 x Ln−1 (x) + x0 Ln−2 (x)

,

if n = 0;

,

if n = 1;

,

if n ≥ 2.


16

Salahuddin

No. 3

The first few Lucas polynomials are: L0 (x) = 2, L1 (x) = x, L2 (x) = x2 + 2, L3 (x) = x3 + 3x, L4 (x) = x4 + 4x2 + 2. Definition 1.7. In mathematics, the Fibonacci polynomials are a polynomial sequence which can be considered as a generalization of the Fibonacci numbers. These Fibonacci polynomials are defined by a recurrence relation:   , if n = 0;   0 Fn (x) =

  

1

,

if n = 1;

xFn−1 (x) + Fn−2 (x) ,

if n ≥ 2.

The first few Fibonacci polynomials are: F0 (x) = 0, F1 (x) = 1, F2 (x) = x, F3 (x) = x2 + 1, F4 (x) = x3 + 2x. Definition 1.8. The polylogarithm (also known as Jonquie’s function) is a special function Lis (z) that is defined by the infinite sum, or power series Lis (z) =

∞ X zk k=1

ks

.

It is in general not an elementary function, unlike the related logarithm function. The above definition is valid for all complex values of the order s and the argument z where | z |< 1. Definition 1.9. Generalized ordinary hypergeometric function of one variable is defined by   a1 , a2 , · · · , aA ; ∞   X (a1 )k (a2 )k · · · (aA )k z k   F = , z  A B (b1 )k (b2 )k · · · (bB )k k! k=0 b1 , b 2 , · · · , b B ; or     (aA ) ; (aj )A ; j=1 ∞  X    ((aA ))k z k =   ≡ F , z  z A FB  A B    ((bB ))k k! k=0 ; (bB ) ; (bj )B j=1 where denominator parameters b1 , b2 , · · · , bB are neither zero nor negative integers and A, B are non-negative integers.


Vol. 9

Some indefinite integrals involving certain polynomial

17

§2. Main indefinite integrals Z

sin x H2 (x)L1 (x)F1 (x) √ dx 1 − sin x · ½ ³ ³ ´ ³ ´ 3 3 ιx 3 ιx 1 x x´ = √ (2 + 2ι) cos − sin × (−1) 4 96x2 Li3 − (−1) 4 e 2 − 96x2 Li3 (−1) 4 e 2 2 2 1 − sin x ³ ´ ³ ´ ³ ´ 3 ιx 3 ιx 3 ιx 2 −4ι(4x − 1)xLi2 − (−1) 4 e 2 + 4ι(4x2 − 1)xLi2 (−1) 4 e 2 + 384ιxLi4 − (−1) 4 e 2 ´ ³ ´ ³ ´ ³ ´ ³ ιx 3 ιx 3 ιx 3 ιx 3 −384ιxLi4 (−1) 4 e 2 − 8Li3 − (−1) 4 e 2 + 8Li3 (−1) 4 e 2 − 768Li5 − (−1) 4 e 2 ³ ´ ³ ´ ³ ´ ³ ´ 3 ιx 3 ιx 3 ιx 3 ιx +768Li5 (−1) 4 e 2 − 2x4 log 1 − (−1) 4 e 2 + 2x4 log 1 + (−1) 4 e 2 + x2 log 1 − (−1) 4 e 2 ³ ´¾ ιx 3 x 2 4 2 −x log 1 + (−1) e − (1 − ι)(2x4 − 16x3 − 97x2 + 388x + 776) sin 2 ¸ x +(−1 + ι)(2x4 + 16x3 − 97x2 − 388x + 776) cos + Constant. 2 · ´ ³ ιx ´ ³ ιx ´ ³ ιx cos x L4 (x) 1 x √ dx = √ sin 80 ιx3 Li2 e− 2 + 480x2 Li3 e− 2 − 480x2 Li3 − e 2 2 1 − cos x 5 1 − cos x ´ ³ ιx ´ ³ −ιx ´ ³ ´ ³ ιx ιx 2 +80ι(x + 2)xLi2 − e 2 − 160ιxLi2 e 2 − 1920ιxLi4 e 2 − 1920ιxLi4 − e 2 ³ ´ ³ ιx ´ ³ ιx ´ ³ ´ ιx ιx ιx −320Li3 − e 2 + 320Li3 e 2 − 3840Li5 e− 2 + 3840Li5 − e 2 + ιx5 + 10x4 log(1 − e− 2 ) ιx ιx ιx x x −10x4 log(1 + e 2 ) + 20x4 cos − 160x3 sin + 40x2 log(1 − e 2 ) − 40x2 log(1 + e 2 ) 2 2 ¸ ³ x x x´ x 2 − 16ιπ 5 + Constant. −880x cos + 3520x sin + 7080 cos + 20 log tan 2 2 2 4 Z

Z

cosh3 x L3 (x) C3 (x) p dx 1 − cosh2 x · ½ 1 p sinh x 67200x3 Li4 (e2x ) − 100800x2 Li5 (e2x ) + 3360(4x4 + 6x2 − 3)xLi2 (e2x ) = 1680 − sinh2 x −1680(20x4 + 18x2 − 3)Li3 (e2x ) + 30240xLi4 (e2x ) + 100800xLi6 (e2x ) − 15120Li5 (e2x ) −50400Li7 (e2x ) − 640x7 + 4480x6 log(1 − e2x ) + 1120x6 cosh 2x − 2016x5 − 3360x5 sinh 2x +10080x4 log(1 − e2x ) + 10920x4 cosh 2x + 3360x3 − 21840x3 sinh 2x − 10080x2 log(1 − e2x ) ¾¸ + Constant. +30240x2 cosh 2x − 30240x sinh 2x + 15120 cosh 2x + 5ιπ 7 − 63ιπ 5 − 420ιπ 3 Z

cos x L1 (x) H1 (x) F1 (x) √ dx 1 − cos x ιx ιx ιx 1 xh ιx √ = sin 48 ιx2 Li2 (e− ) + 48ιx2 Li2 (−e 2 ) + 192xLi3 (e− ) − 192xLi3 (−e 2 ) 2 2 2 2 1 − cos x ιx ιx ιx ιx −384ιLi4 (e− ) − 384ιLi4 (−e 2 ) + ιx4 + 8x3 log(1 − e− ) − 8x3 log(1 + e 2 ) 2 2 i x x x x +16x3 cos − 96x2 sin + 768 sin − 384x cos − 8ιπ 4 + Constant. 2 2 2 2


18

Salahuddin

No. 3

Z

=

cosh x H1 (x) B1 (x) √ dx 1 − cosh x · −x −x 2 x √ sinh (8x − 2)Li2 (−e 2 ) + (2 − 8x)Li2 (e 2 ) 2 1 − cosh x

x 2¸ −x −x x x x x −x log(1 − e 2 ) + x log(1 + e 2 ) − 16x sinh + 4 sinh − 2x cosh + 32 cosh 2 2 2 2 +Constant.

+16Li3 (−e

−x 2

) − 16Li3 (e

−x 2

) + 2x2 log(1 − e

−x 2

) − 2x2 log(1 + e

−x 2

) + 4x2 cosh

Z

cosh x F2 (x) √ dx 1 − cos x · ³ 1 ³8 1 6ι ´ (−1− ι )x x 1 1 2 = −√ − e sin 2e2x 3 F2 − − ι, − − ι, 1; − ι, 25 25 2 2 2 2 1 − cos x ´ ³ ´ ³ 1 ´ 1 3 3 1 1 1 − ι; eιx + 2eιx 3 F2 + ι, + ι, 1; + ι, + ι; eιx − (2 − ι)xe2x 2 F1 − − ι, , 1; − ι; eιx 2 2 2 2 2 2 2 ¸ ³1 ´ 3 +(2 − ι)xeιx 2 F1 + ι, , 1; + ι; eιx + (2 − ι)xe2x − 2e2x + Constant. 2 2 · ³ ´ ³ ιx ´ ιx 1 x cos x L3 (x) √ dx = √ sin 48 ιx2 Li2 e− 2 + 48ι(x2 + 1)Li2 − e 2 2 1 − cos x 4 1 − cos x ³ ιx ´ ´ ´ ³ ³ ιx ´ ³ ιx ´ ³ ιx ιx +192xLi3 e− 2 − 192xLi3 − e 2 − 48ιLi2 e 2 − 384ιLi4 e− 2 − 384ιLi4 − e 2 ³ ³ ´ ³ ´ ´ −ιx ιx ιx x x +ιx4 + 8x3 log 1 − e 2 − 8x3 log 1 + e 2 + 16x3 cos − 96x2 sin + 24x log 1 − e 2 2 2 ¸ ´ ³ ιx x x −24x log 1 + e 2 + 672 sin − 336x cos − 8ιπ 4 + Constant. 2 2

Z

Z

sin x F13 (x) √ dx 1 − cosh x · ³1 ´ 233 1 3 3 −ιx x √ = e (e − 1) − (8 + 6ι) 3 F2 − ι, − ι, 1; − ι, − ι; ex 2 2 2 2 25 1 − cosh x ´ ³1 1 3 3 −(8 − 6ι)e2ιx 3 F2 + ι, + ι, 1; + ι, + ι; cosh x + sinh x 2 2 2 2 n ´ ³1 3 x +5x (2 − ι) 2 F1 − ι, 1; − ι; e 2 2 ³1 ´o¸ 3 2ιx +(2 + ι)e F + ι, 1; + ι; cosh x + sinh x + Constant. 2 1 2 2 Z

sin x F19 (x) √ dx 1 − cosh x · ³1 ´ 4181 1 3 3 √ = e−ιx (ex − 1) − (8 + 6ι) 3 F2 − ι, − ι, 1; − ι, − ι; ex 2 2 2 2 25 1 − cosh x ³1 ´ 1 3 3 −(8 − 6ι)e2ιx 3 F2 + ι, + ι, 1; + ι, + ι; cosh x + sinh x + 2 2 2 2 ´ n ³1 3 x − ι, 1; − ι; e 5x (2 − ι) 2 F1 2 2 ³1 ´o¸ 3 2ιx F +(2 + ι)e + ι, 1; + ι; cosh x + sinh x + Constant. 2 1 2 2


Vol. 9

Some indefinite integrals involving certain polynomial

19

Z

=

cosh x L2 (x) C2 (x) √ dx 1 − cosh x h −x x x 2 x √ sinh 80x3 Li2 (e 2 ) + 480x2 Li3 (−e 2 ) − 480x2 Li3 (e 2 ) 2 5 1 − cosh x

+20(4x2 + 3)xLi2 (−e +1920xLi4 (−e −x 2

−x 2

−x 2

) − 60xLi2 (e

−x 2

)

x 2

) + 1920xLi4 (e ) + 120Li3 (−e −x 2

−x 2

)

x 2

) − 3840Li5 (e ) − x5 x x x −10x4 log(1 + e ) + 10x4 log(1 − e 2 ) + 20x4 cosh − 160x3 sinh 2 2 −x −x x 2 2 2 2 2 +15x log(1 − e ) − 15x log(1 + e ) + 990x cosh 2i ³ x x x´ −3960x sinh + 7900 cosh − 10 log tanh − 16ιπ 5 + Constant. 2 2 4

−120Li3 (e

) + 3840Li5 (−e −x 2

§3. Derivation of the integrals Involving the method of same type of [6] , one can derive the integrals.

§4. Conclusion In our work we have established certain indefinite integrals involving Fibonacci polynomials, Lucas polynomials, Bernoulli polynomials and Hermite polynomials. We hope that the development presented in this work will stimulate further interest and research in this important area of Mathematics.

References [1] Abramowitz, A. Milton and Irene Stegun, Handbook of Mathematical Functions with Formulas, Graphs and Mathematical Tables, National Bureau of Standards, 1970. [2] Frank Olver, W. J. Lozier, M. Daniel, Boisvert, F. Ronald and C. W. Clark. NIST, Handbook of Mathematical Functions, Cambridge University Press, 2010. [3] G. Arfken, Mathematical Methods for Physicists, Academic Press, 1985. [4] Nico Temme, Special Functions: An Introduction to the Classical Functions of Mathematical Physics, Wiley, New York, 1996. [5] Norbert Wiener, The Fourier Integral and Certain of its Applications, New York, Dover Publications, 1958. [6] Ricci and Paolo Emilio, Generalized Lucas polynomials and Fibonacci polynomials, Rivista di Matematica della Universit di Parma, 4(1995), 137-146. [7] Salahuddin, Hypergeometric Form of Certain Indefinite Integrals, Global Journal of Science Frontier Research(F), 6(2012), No. 12, 37-41. [8] Zhiwei Sun and Hao Pan, Identities concerning Bernoulli and Euler polynomials, Acta Arithmetica, 125(2006), 21-39.


Scientia Magna Vol. 9 (2013), No. 3, 20-26

Three Classes of Exact Solutions to Klein−Gordon−Schr¨ odinger Equation Hongming Xia † , Wansheng He ‡ , Linxia Hu

]

and Zhongshe Gao

1

\

College of Mathematics and Statistics, Tianshui Normal University, Tianshui-741 001, P. R. China E-mail: xia− hm@sina.com Abstract Basing on the priori assumption principle, the main goal of this paper is to propose the rational expansion method that can be used to handle the exact solution of the nonlinear partial differential equation. It is extension of tanh function method. As an application, three classes of exact solutions to Klein-Gordon-Schr¨ odinger equation are obtained. Keywords Klein-Gordon-Schr¨ odinger equation, exact solution, tanh function method, rational expansion method.

§1. Introduction The investigation of exploring the exact traveling wave solutions of nonlinear mathematical physics equations plays an important role in the study of the solitary wave solution. Up to now, a variety of methods, such as inverse scattering method, B¨acklund, transformation method, Hirota, bilinear method, homogeneous balance method and tanh method [1-5]. The tanh method is one of the most direct and effective algebraic for computing the exact traveling wave solution. In this paper, we extend the method by replacing tanh function with some other functions f (x), such as polynomial function, trigonometric and elliptical function, where the choice of the function f (x) is different according to equation. Similarly to the steps introduced in [6], we can get the exact solution for equation, namely, assume that after simplifying the solution of the simplified nonlinear PDE, equation has the following form. u(ξ) =

m

m−1

+ · · · + a0

m

m−1

+ · · · + b0

am f (ξ) + am−1 f (ξ) bm f (ξ) + bm−1 f (ξ)

.

(1)

Then the solution can be obtained by using the above method and this develops the tanh method. 1 This

research is supported by the SF of education department of Gansu province(0608-04)


Vol. 9

Three Classes of Exact Solutions to Klein-Gordon-Schr¨ odinger Equation

21

§2. The extended tanh method Consider the nonlinear P DE F (u, ut , ux , uxx , · · · ) = 0,

(2)

with two variables x, t. Let u(x, t) = U (ξ), ξ = x − V t be its travelling wave solutions, where the wave velocity V is a coefficient to be determined later, then equation (2) can be simplified to a nonlinear ODE 0

00

G(U, U , U , · · · ) = 0.

(3)

Assume that the solution of equation (3) has the form of (1). Substituting (1) into (3), then m can be determined by balancing the linear terms of the highest order in the resulting equation with the highest order nonlinear terms. This will give a system of algebra equations involving ai , bi (i = 0, 1, · · · , 2m) and α. Let the function f (x) be eαξ , then the main steps for achieving the above method is as following. Step 1 Suppose that equation (2) has the wave traveling solution u(x, t) = U (ξ) = U (x − V t). Then equation (2) can be simplified to a nonlinear ODE (3); Step 2 assume that the solution of (3) has the form of (1),then m can be determined by using the balance method; Step 3 substituting (1) into (3),we get a rational fractional equation P (eαξ ) = 0,

(4)

which is just a polynomials of exponential eαξ ; Step 4 collecting all the terms with the same power of eαξ yields a set of algebraic system for ai , bi (i = 0, 1, · · · , 2m), α, where ai , bi (i = 0, 1, · · · , 2m), α are coefficients to be determined later; Step 5 applying some mathematical package, for example, Mathematica, Maple, and etc., we can deal with the above tedious algebra equations and output directly the required solution. Further, substituting the solution into (1) and letting, ξ = x − V t, we can get the exact solution of equation (2).

§3. The exact solutions of Klein-Gordon-Schr¨ odinger equation KGS equations  iψ + 1 ∆φ = −φψ, t 2 φ − ∆φ + m2 φ = |ψ|2 .

(5)

tt

is a classical model which reflects the interaction of nucleon-field and meson-field, where ∆ is a n, dimensional Laplace operator, ψ is scalar complete nucleon-field and φ is meson-field [7] . In


22

Hongming Xia, Wansheng He, Linxia Hu and Zhongshe Gao

No. 3

[8] the author had proved that the steady-state solution of equations (5) has the form (ψ(x, t), φ(x, t)) = (eiωt u(x), v(x)),

(6)

where x ∈ R3 , ω ∈ R. We will take into account the exact solution of equation (5) by using the technique basing on the expansion of the rational function method. Here we only focus on the (1+1) dimensional equation, the discussion for (1+n) dimensional equation is similar and is omitted. Consider the following equation  iψ + 1 φ = −φψ, xx t 2 (7) φ − φ + m2 φ = |ψ|2 . tt

xx

where ψ is complex. Assume that ψ = eiη u(x, t),

(8)

where η = αx + βt and α, β are coefficients which will be determined later.Substituting (8) into equations (7) yields    ut + αux = 0, utt + 2uφ − (α2 + 2β)u = 0,    φtt − φxx + m2 φ − u2 = 0.

(9)

Let u(x, t) = U (ξ) = U (kx + ωt), V (ξ) = φ(kx + ωt), where k and ω are coefficients to be determined later. Then we obtain a simplified ODE.  1 α   ( + )Uξ = 0,   ω k  1 U + 2U V − (α2 + 2β)U = 0, (10) 2 ξξ  ω  2 2  k − ω   Vξξ + m2 V − U 2 = 0. ω2 k2 Suppose that the solution, U (ξ) and V (ξ), for equations (10) are expansion of a second order differential function, then we can get the exact solution of equations (9) basing on the homogeneous balance principle.

§4. Main result 1. Suppose that the solution for equations (10) has the following form  am ξ m + am−1 ξ m−1 + · · · + a0   , U (ξ) = bm ξ m + bm−1 ξ m−1 + · · · + b0 m m−1 cm ξ + cm−1 ξ + · · · + c0   , V (ξ) = m m−1 dm ξ + dm−1 ξ + · · · + d0

(11)

where ai , bi , ci , di (i = 0, 1, · · · , m) are coefficients to be determined later. By comparing the highest derivative term with the highest nonlinear term in homogeneous balance equations,


Vol. 9

Three Classes of Exact Solutions to Klein-Gordon-Schr¨ odinger Equation

23

we get m = 2. Thus equation (10) has the solution of the following form  aξ 2 + bξ + c   U (ξ) = 2 , f ξ + gξ + h oξ 2 + pξ + q   , V (ξ) = 2 rξ + sξ + w

(12)

where a, b, c, f, g, h, o, p, q, r, s, w are coefficients to be determined later. Substituting (12) into (10),we get a rational fractional equations which is just for ξ. Collecting all the terms with the same power ξ k and letting their coefficients be zero yields a set of algebraic system for, a, b, c, f, g, h, o, p, q, r, s, w, k, α, β, ω. Using Maple package, we can deal with the above algebra equations and output directly the required solution. Further, substituting the solution into (12) and (8), we obtain the following exact solution for equation (7). rh Case 1. o = a = b = p = f = 0, s = , r = r, m = m, k = k, g = g, h = h, w = 2g 2 h r ie(−x±t)i gkm 2 , β = ±1, c = igkm, ω = k, α = −1, q = −k r, ψ (x, t) = , φ1 (x, t) = 1 g2 g (kx + kt) + h −k 2 g 2 2. (g (kx + kt) + h) rg 2 Case 2. β = i, q = −k 2 r, b = if km, f = f, a = h = c = o = p = 0, w = 2 , s = f 2gr ieix−t f km , ω = −k, α = 1, m = m, r = r, k = k, g = g, ψ2 (x, t) = , φ2 (x, t) = f f (kx − kt) + g −k 2 f 2 2. (f (kx − kt) + g) Case 3. β = i, q = −k 2 r, b = if km, f = f, a = h = w = s = o = p = 0, c = ikmg, ω = −1 ieix−t m , φ3 (x, t) = . −k, α = 1, m = m, r = r, k = k, g = g, ψ3 (x, t) = x−t (x − t)2 ikmg rg 2 Case 4. q = −k 2 r, c = , b = if km, f = f, a = o = p = 0, β = ±1, w = , s= 2 4f 2 gr g2 ieix∓t m , h= , α = −1, ω = k, m = m, r = r, k = k, g = g, ψ4 (x, t) = , φ4 (x, t) = f 4f x−t 2 2 −4k f 2. (2 f (kx + kt) + g) − (cf − bg) c ib Case 5. f = f, c = c, b = b, h = , a = o = p = 0, k = , β = ±1, w = 2 b mf ¡ 2 2 ¢ r c f − 2 bgcf + b2 g 2 b2 r ib −2r (cf − bg) , q = , ω = , s = , α = −1, m = m, r = b2 f 2 m2 f 2 mf fb −i(x∓t) 2 e b m b4 r, g = g, ψ5 (x, t) = 2 , φ5 (x, t) = 2. ib (x + t) − cf m + bgm (ib2 (x + t) − cf m + bgm) ib − (cf − bg) c −ib , a = o = p = 0, k = Case 6. β = i, f = f, h = , ω = , w = 2 b mf mf ¡ 2 2 ¢ r c f − 2 bgcf + b2 g 2 b2 r −2r (cf − bg) , q = , c = c, b = b, s = , α = 1, m = m, r = b2 f 2 m2 f 2 fb (xi−t) 2 4 e b m b r, g = g, ψ6 (x, t) = 2 , φ6 (x, t) = 2. 2 ib (x − t) − cf m + bgm (ib (x − t) − cf m + bgm)


24

Hongming Xia, Wansheng He, Linxia Hu and Zhongshe Gao

2. Suppose that the solution of equations (10) has the following form  am (tanh ξ)m + am−1 (tanh ξ)m−1 + · · · + a0   , U (ξ) = bm (tanh ξ)m + bm−1 (tanh ξ)m−1 + · · · + b0 cm (tanh ξ)m + cm−1 (tanh ξ)m−1 + · · · + c0   , V (ξ) = dm (tanh ξ)m + dm−1 (tanh ξ)m−1 + · · · + d0

No. 3

(13)

where ai , bi , ci , di (i = 0, 1, · · · , m) are coefficients to be determined later. By comparing the highest derivative term with the highest nonlinear term in homogeneous balance equations of equations (10), we get m = 2. Thus equation (10) has the solution of the following form  a(tanh ξ)2 + b tanh ξ + c   , U (ξ) = f (tanh ξ)2 + g tanh ξ + h (14) 2  V (ξ) = o(tanh ξ) + p tanh ξ + q ,  r(tanh ξ)2 + s tanh ξ + w where a, b, c, f, g, h, o, p, q, r, s, w are coefficients to be determined later. Substituting (14) into equations (10), we get a rational fractional equations which is just for tanh ξ. Collecting all the terms with the same power of tanh ξ and letting their coefficients be zero yields a set of algebraic system for a, b, c, f, g, h, o, p, q, r, s, w, k, α, β, ω. Using Maple, package, we can deal with the above algebra equations and output directly the required solution. Further, substituting the solution and η = αx + βt, ξ = kx + ωt into (14) and (8), we obtain the following exact ¡ solution for equation ¢ (7). −w 24 k 2 f 2 − g 2 α − g 2 β 2 4f w Case 1. q = , ω = −α k, s = , a = b = m = 0, f = 2g 2 ¡ g ¡ ¢ ¢ 2f w α + 2β 2 2f 2 w α + β 2 g2 2 2 2 f, c = 6, k α f − 6, k f, p = , h= , o= , α = α, β = g 4f g¡2 ¢ 24ei(α x+β t) k 2 f 2 α2 − 1 4f 2 w β, w = w, r = , k = k, g = g, ψ7 (x, t) = 2 , φ7 (x, t) = 2 g (2 f tanh (−kx + α kt) − g) ¢ 2¡ (−2 f tanh (−kx + α kt) + g) α + β 2 − 24 k 2 f 2 . 2 (2 f tanh (−kx + α kt) − g) h2 r Case 2. h = h, w = 2 , β = i, q = −k 2 r, f = 0, a = b = o = p = 0, ω = −k, s = g ieix−t gkm 2hr , c = igkm, α = 1, m = m, r = r, k = k, g = g, ψ8 (x, t) = , φ8 (x, t) = g g tanh(kx − kt) + h 2 2 −k g 2. (g tanh(kx − kt) + h) ikmg Case 3. β = i, q = −k 2 r, c = , b = if km, f = f, a = o = p = 0, ω = 2 2 2 gr rg g , s = −k, w = , h = , α = 1, m = m, r = r, k = k, g = g, ψ9 (x, t) = 2 4f f 4f ix−t 2 ie f km −4k 2 f 2 , φ9 (x, t) = 2. 2 f tanh(kx − kt) + g (2 f tanh(kx − kt) + g) 3. Suppose that the solution of equations (10) has the following form  am emξ + am−1 e(m−1)ξ + · · · + a0   , U (ξ) = bm emξ + bm−1 e(m−1)ξ + · · · + b0 (15) c emξ + cm−1 e(m−1)ξ + · · · + c0   V (ξ) = m mξ , dm (e + dm−1 e(m−1)ξ + · · · + d0


Vol. 9

Three Classes of Exact Solutions to Klein-Gordon-Schr¨ odinger Equation

25

where ai , bi , ci , di (i = 0, 1, · · · , m) are coefficients to be determined later. By comparing the highest derivative term with the highest nonlinear term in homogeneous balance equations for (10), we get m = 2, namely, equation (10) has the solution of the following form  ae2ξ + beξ + c   U (ξ) = 2ξ , f e + geξ + h (16)  oe2ξ + peξ + q  V (ξ) = 2ξ , re + seξ + w where a, b, c, f, g, h, o, p, q, r, s, w are coefficients to be determined later. Substituting (16) into equations (10), we get a rational fractional equations which is just for eξ . Collecting all the terms with the same power of eξ and letting their coefficients be zero yields a set of algebraic system for a, b, c, f, g, h, o, p, q, r, s, w, k, α, β, ω. Using Maple, package, we can deal with the above algebra equations and output directly the required solution. Further, substituting the solution and η = αx+βt, ξ = kx+ωt into (15) and (8), we obtain the following exact solution for equation (7). rg 2 Case 1. q = −k 2 r, b = if km, f = f, a = h = c = o = p = 0, w = 2 , β = ±1, s = f iei(−x±t) f km 2gr , α = −1, ω = k, m = m, r = r, k = k, g = g, ψ10 (x, t) = , φ10 (x, t) = f f e(kx+kt) + g 2 2 −k g ¡ ¢2 . (kx−kt) ge +h Case 2. q = −k 2 r, b = if km, f = f, a = s = w = h = o = p = 0, β = ±1, c = iei(−x±t) km ikmg, α = −1, ω = k, m = m, r = r, k = k, g = g, ψ11 (x, t) = , φ11 (x, t) = f e(kx+kt) + g −k 2 . 2(kx+kt) e Remark 4.1. We claim that the tanh method can be extended by replacing tanh function with some generalized functions f (x), such as polynomial function, trigonometric function and Jacobi elliptical function. As an example, we obtain three classes exact solutions for KGS equation.

References [1] M. J. Ablowitz and Solitons, Nonlinear evolution equations and incerse scattering, Cambridge University Press, New York, 1(1991). [2] H. D. Wahlquist and F. B. Estabrook, B¨acklund transformations for solitons of the Korteweg-de Viru equation, Phys. Rev. Lett., 31(1971). [3] R. Hirota and Solitons, Berlin: Springer, 1980. [4] M. L. Wang, Exact solutions for a compound KdV -Burgers equation, Phys. Lett. A., (1996), 213. [5] E. J. Parkes and B. R. Duffy, An automated tanh-function method for finding solitary wave solutions to nonlinear evolution equations, Comp. Phys Commun, 98(1996). [6] H. M. Xia, An extension of tanh-function method and its application, J. of Gansu sciences, 4(2006).


26

Hongming Xia, Wansheng He, Linxia Hu and Zhongshe Gao

No. 3

[7] F. Tsutsumim, On coupled Klein-Gordon-Schr¨odinger equations, J. Math. Analysis Applic, 66(1978). [8] M. Ohta, Stability of stationary states for the coupled Klein-Gordon-Schr¨odinger equations, Nonlinear Analysis, 27(1996).


Scientia Magna Vol. 9 (2013), No. 3, 27-30

The adjacent vertex distinguishing I-total chromatic number of ladder graph Yang Suiyi † , He Wansheng

and Ren Shengzhang

]

Department of Mathematics, Tianshui Normal University, Gansu Tianshui−741 001, China E-mail: yangzhangyike@yahoo.com.cn Abstract The I-total coloring of a graph G is an assignment of some colors to its vertices and edges such that no two adjacent vertices receive the same color and no two adjacent edges receive the same color. Under an I-total coloring of G, the color set of a vertex x of G is the set of all colors which are assigned to vertex x or the edges incident to x. An I-total coloring is called adjacent vertex distinguishing if any two adjacent vertices have different color sets. The minimum number of colors required in an adjacent vertex-distinguishing Itotal coloring is called adjacent vertex-distinguishing I-total chromatic number. The adjacent vertex-distinguishing I-total chromatic number of Ladder graph is discussed in this paper. Keywords Ladder graph, adjacent vertex-distinguishing, I-total coloring, adjacent vertex-dist -inguishing, I-total chromatic number.

§1. Introduction and preliminaries Coloring is a important research area of graph theory. Some new colorings of graphs are produced from applied areas of computer science, information science and light transmission, such as vertex distinguishing proper edge coloring [1] , adjacent vertex distinguishing proper edge coloring [2] and adjacent vertex distinguishing total coloring [3,4] and so on, those problems are very difficult. Recently, Zhang et al. [5] propose the adjacent vertex-distinguishing I-total coloring of graphs. In this paper, we obtain the adjacent vertex-distinguishing I-total chromatic number of ladder graph by constructing method. Definition 1.1. [5] A proper total k-coloring of G is a mapping π : V (G) ∪ E(G) → {1, 2, · · · , k} such that two adjacent elements of V (G) ∪ E(G) are assigned distinct colors, and the incident elements are dyed different colors. Let C(u) = {π(u)} ∪ {π(uv)|uv ∈ E(G)} for any vertex u ∈ V (G). If C(u) 6= C(v) for uv ∈ E(G), we say that π is an adjacent-vertex distinguishing total k-coloring (a k-AV DT C) of G. The minimum number such that G admits a k-AV IT C, denoted by χat (G), is called the adjacent-vertex distinguishing I-total chromatic number of G. Conjecture 1.1. [5] For a simple graph G, then χat (G) ≤ ∆(G) + 3. Definition 1.2. [5] A total k-coloring of G is a mapping π : V (G) ∪ E(G) → {1, 2, · · · , k} such that two adjacent elements of V (G) ∪ E(G) are assigned distinct colors. Let C(u) =


28

Yang Suiyi, He Wansheng and Ren Shengzhang

No. 3

{π(u)} ∪ {π(uv)|uv ∈ E(G)} for any vertex u ∈ V (G). If C(u) 6= C(v) for uv ∈ E(G), we say that π is an adjacent-vertex distinguishing I-total k-coloring (a k-AV DIT C) of G. The minimum number such that G admits a k-AV DIT C, denoted by χiat (G), is called the adjacentvertex distinguishing I-total chromatic number of G. Definition 1.3.

[6]

Suppose G = (V, E) is a ladder graph such that: S S V (G) = {ui , vi |i = 1, 2, · · · , n}, E(G) = {u1 un } {v1 vn } {ui ui+1 |i = 1, 2, · · · , n − S S 1} {vi vi+1 |i = 1, 2, · · · , n − 1} {ui vi |i = 1, 2, · · · , n}(n ≥ 3). Conjecture 1.2.

[5]

For a simple graph G, then χiat (G) ≤ ∆(G) + 2.

Undefined terminologies and notations follow [6,7].

§2. Riesz idempotent Lemma 2.1.

[5]

For a simple graph G, there is χiat (G) ≥ ∆.

If ∃u, v ∈ E(G), and d(u) = d(v) = ∆, then χiat (G) ≥ ∆ + 1.

§3. Main results Theorem 2.1. Let G be a ladder graph, then χiat (G) = 4. Proof. According to the definition 1.2 of ladder graph, there is ∆(G) = 3. Furthermore, we have χiat (G) ≥ 4 through the lemma 2.1, in order to prove χiat (G) = 4, we only need to give a 4-AV DIT coloring. At this moment, we define the coloring function τ as following:     1, i ≡ 1 (mod 3); τ (ui ) = 2, i ≡ 2 (mod 3); i = 1, 2, · · · , n − 1.    3, i ≡ 0 (mod 3).     1, i ≡ 1 (mod 3); τ (ui ui+1 ) = 2, i ≡ 2 (mod 3); i = 1, 2, · · · , n − 1.    3, i ≡ 0 (mod 3).     2, i ≡ 1 (mod 3); τ (vi ) = 3, i ≡ 2 (mod 3); i = 1, 2, · · · , n − 1.    1, i ≡ 0 (mod 3).


Vol. 9

The adjacent vertex distinguishing I-total chromatic number of ladder graph

29

    2, i ≡ 1 (mod 3); τ (vi vi+1 ) = 3, i ≡ 2 (mod 3); i = 1, 2, · · · , n − 1.    1, i ≡ 0 (mod 3).   2, n 6≡ 0 (mod 3); τ (un ) =  3, n ≡ 0 (mod 3).   1, n 6≡ 1 (mod 3); τ (vn ) =  4, n ≡ 1 (mod 3).     3, n ≡ 0 (mod 3); τ (u1 un ) = 4, n ≡ 1 (mod 3);    2, n ≡ 2 (mod 3).     1, n ≡ 0 (mod 3); τ (v1 vn ) = 4, n ≡ 1 (mod 3);    3, n ≡ 2 (mod 3). The others are colored by 4. Especially: (1) When n ≡ 1 (mod 3), we need to adjust τ as following: τ (v2 ) = 1, τ (v3 ) = 3, τ (vn−2 ) = 1, τ (vn−1 ) = 3, τ (u3 ) = 4, τ (un−1 ) = 1(when n = 4, τ (u3 ) = τ (un−1 ) = 1), τ (u1 v1 ) = 3, τ (un vn ) = 2. (2) When n ≡ 2 (mod 3), we need to adjust τ as following: τ (u1 ) = 3, τ (u3 ) = 4, τ (v2 ) = 1, τ (v3 ) = 3. And   {1, 3, 4}, n 6≡ 2 (mod 3); C(u1 ) =  {1, 2, 3, 4}, n ≡ 2 (mod 3).     {1, 3, 4}, i ≡ 1 (mod 3); C(ui ) = {1, 2, 4}, i ≡ 2 (mod 3); i = 2, 3, · · · , n − 1.    {2, 3, 4}, i ≡ 0 (mod 3). Besides, when n ≡ 1 (mod 3), C(un−1 ) = {1, 2, 3, 4}.   {2, 3, 4}, n 6≡ 2 (mod 3); C(un ) =  {1, 2, 4}, n ≡ 2 (mod 3).   {1, 2, 4}, n ≡ 0 (mod 3); C(v1 ) =  {2, 3, 4}, n ≡ 6 0 (mod 3).


30

Yang Suiyi, He Wansheng and Ren Shengzhang

No. 3

  {1, 2, 3, 4}, n 6≡ 0 (mod 3); C(v2 ) =  {2, 3, 4}, n ≡ 0 (mod 3).     {1, 2, 4}, i ≡ 1 (mod 3); C(vi ) = {2, 3, 4}, i ≡ 2 (mod 3); i = 3, 4, · · · , n − 1.    {1, 3, 4}, i ≡ 0 (mod 3). Besides, when n ≡ 1 (mod 3), C(vn−2 ) = {1, 2, 3, 4}.    {1, 3, 4}, n ≡ 0 (mod 3);  C(vn ) = {1, 2, 4}, n ≡ 1 (mod 3);    {1, 2, 3, 4}, n ≡ 2 (mod 3). It is obvious that no two adjacent vertices of sets are same, so τ is a 4-AV DIT C of G.

References [1] O. Favaron, H. Li and R. H. Schelp, Strong edge colorings of graphs, Discrete Mathematica, 159(1996), No. 1-3, 103-109. [2] Zhang Zhongfu, Liu Linzhong and Wang Jianfang, Adjacent Strong Edge Coloring of Graphs, Applied Mathematica Letters, 15(2002), 623-626. [3] Chen Xiang’en, Adjacent vertex distinguishing Total Chromatic numbers on K2n+1 E(P3 ), International Journal of Pure and Applied Mathematics., 13(2004), No. 1, 21-29. [4] Chen Xiang’en, Zhang zhongfu and Yan Jingzhi, et al., Adjacent-vertex-distinguishing total chromatic numbers on M ycielski, s graphs of several kinds of pariticular graphs, Journal of lanzhou University(Natural Science). 41(2005), No. 2, 117-122. [5] Zhang Zhongfu, D. R. Woodall and Yao Bing, et al., Adjacent vertex-distinguishing Itotal coloring of graphs [EB/OL], (2008-06-12) (2008-07-24) http://202.201.18.40:8080/mas5/. [6] Chen Xiang’en and Zhang Zhongfu, AV DT C number of generalized Halin graphs with maximum degree at least 6, Acta Mathematicae Applicatae Sinica (English Series), 24(2008), No. 1, 55-58. [7] J. A. Bondy, U. S. R. Murty, Graph Theory[M], London, Springer, 2008.


Scientia Magna Vol. 9 (2013), No. 3, 31-36

A short interval result for the extension of the exponential divisor function Li Yang Department of Mathematics, Nanchang University Nanchang, Jiangxi 330031, P. R. China E-mail: yangli46@ncu.edu.cn Abstract Let τ (e) (n) denote the number of exponential divisor of n. Similar to the general(e) ization from d(n) to dk (n), we extended τ (e) (n) to (τk (n))k−1 . The aim of this paper is to (e) establish a short interval result for the function (τ3 (n))2 . This enriches the properties of the exponential divisor function. Keywords The exponential divisor function, the generalized divisor function, short interval. 2000 Mathematics Subject Classification: 11E45

§1. Introduction In 1972, M. V. Subbarao [3] established the definition of exponential divisor: Let n > 1 be an integer of canonical from n = Πsi=1 pai i . The integer d = Πsi=1 pbi i is called an exponential divisor of n if bi |ai for every i ∈ {1, 2, · · · , s}, notation: d|e n. By convention 1|e 1. Besides, P he also studied the mean value problem of exponential divisor function τ (e) (n) = d|e n 1 and obtained: X τ (e) (n) = Ax + E(x), n≤x 1 2

where E(x) = O(x ). J. Wu [5] improved the result of M. V. Subbarao and obtained X 1 2 τ (e) (n) = Ax + Bx 2 + O(x 9 log x), n≤x

where A=

B=

Y p

M. V. Subbarao

[3]

à 1+

Y

à 1+

p

∞ X d(a) − d(a − 1) a=2

pa

! ,

∞ X d(a) − d(a − 1) − d(a − 2) + d(a − 3)

pa/2

a=5

! .

also proved that for any integers r, we have the estimate X (τ (e) (n))r ∼ Ar x, n≤x


32

Li Yang

where Ar =

Ã

Y

1+

p

L. T´oth

[1,2]

No. 3

∞ X (d(a))r − (d(a − 1))r

!

pa

a=2

.

proved X

(τ (e) (n))r = Ar x + x1/2 P2r −2 (log x) + O(xur +² ),

n≤x

here P2r −2 (t) is a polynomial of degree 2r − 2 of t, ur =

2r+1 −1 2r+2 +1 .

Similar to the generalization from d(n) to dk (n), we extended τ (e) (n) and established a definition as follows:  k−1 Y (e) (τk (n))k−1 =  dk (ai ) , k ≥ 2. a

pi i kn (e)

Obviously τ2 (n) = τ (e) (n). In this paper we studied the case of k = 3 which means to study (e) (e) the properties of (τ3 (n))2 and obviously (τ3 (n))2 is a multiplicative function. The aim of (e) this paper is to study the short interval case of (τ3 (n))2 and prove the following theorem. 1

Theorem 1.1. If x 5 +2² < y ≤ x, then X

(e)

²

1

3

(τ3 (n))2 = c1 y + O(yx− 2 + x 5 + 2 ² ).

(1)

x<n≤x+y

where c1 = Ress=1 F (s) and F (s) :=

P∞ n=1

(e)

(τ3 (n))2 . ns

Notations. Throughout this paper, ² always denotes a fixed but sufficiently small positive constant. We assume that 1 ≤ a ≤ b are fixed integers, and we denote by d(a, b; k) the number of representations of k as k = na1 nb2 , where n1 , n2 are natural numbers, that is, d(a, b; k) =

X

1,

b k=na 1 n2

2

and d(a, b; k) ¿ n² will be used freely.

§2. Proof of the theorem In order to prove our theorem, we need the following lemmas. Lemma 2.1. Suppose s = σ + it is a complex number (<s > 1), then F (s) :=

where the Dirichlet series G(s) :=

∞ (e) X ζ(s)ζ 2 (2s) (τ3 (n))2 = G(s), s n ζ 3 (5s) n=1

P∞

g(n) n=1 ns

is absolutely convergent for <s = σ > 16 .


Vol. 9

A short interval result for the extension of the exponential divisor function

33

(e)

Proof. Here τ3 (n) is multiplicative and by Euler product formula we have for σ > 1 that

= = = = = = =

∞ (e) X (τ3 (n))2 ns n=1 Ã ! (e) (e) (e) (e) Y (τ3 (p))2 (τ3 (p2 ))2 (τ3 (p3 ))2 (τ3 (p4 ))2 1+ + + + + ··· ps p2s p3s p4s p ¶ Yµ (d3 (1))2 (d3 (2))2 (d3 (3))2 (d3 (4))2 (d3 (5))2 1+ + + + + + ··· ps p2s p3s p4s p5s p ¶ Yµ 9 9 36 9 81 1 1 + s + 2s + 3s + 4s + 5s + 6s + · · · p p p p p p p µ ¶ Y 8 27 27 72 ζ 1 + 2s + 4s − 5s + 6s + · · · p p p p p ¶ µ Y 27 24 9 8 ζ(s)ζ (2s) 1 − 4s − 5s + 6s + · · · p p p p µ ¶ ζ(s)ζ 8 (2s) Y 24 1 + + · · · ζ 9 (4s)ζ 27 (5s) p p6s

ζ(s)ζ 8 (2s) ζ 9 (4s)ζ 27 (5s)

G(s).

(2)

P∞ Now we write G(s) := n=1 g(n) ns . It is easily seen the Dirichlet series is absolutely convergent for <s = σ > 16 . Lemma 2.2. Let k ≥ 2 be a fixed integer, 1 < y ≤ x be large real numbers and X B(x, y; k, ²) := 1. x<nmk ≤x+y m>x²

Then we have 1

B(x, y; k, ²) ¿ yx−² + x 2k+1 log x.

(3)

Proof. This lemma is very important when studying the short interval distribution of 1-free number; see for example [4]. Let a1 (n), a2 (n), a3 (n) and a4 (n) be arithmetic functions defined by the following Dirichlet series (for <s > 1): ∞ X a1 (n) = ζ(s)G(s). ns n=1

(4)

∞ X a2 (n) = ζ 8 (2s). 2s n n=1

(5)

∞ X a3 (n) = ζ −9 (4s). 4s n n=1

(6)


34

Li Yang

No. 3

∞ X a4 (n) = ζ −27 (5s). 5s n n=1

(7)

Lemma 2.3. Let a1 (n) be an arithmetic function defined by (4), then we have X 1 a1 (n) = Cx + O(x 6 +² ),

(8)

n≤x

where C = Ress=1 ζ(s)G(s). Proof. Using lemma 1.1, it is easy to see that X 1 |g(n)| ¿ x 6 +² . n≤x

Therefore from the definition of g(n) and (4), it follows that X X a1 (n) = g(n) n≤x

mn≤x

X

=

X

1

(10)

x + O(1)) n

(11)

x m≤ n

n≤x

=

X

g(n)

(9)

g(n)(

n≤x

1

= Cx + O(x 6 +² ),

(12)

and C = Ress=1 ζ(s)G(s). Next we prove our Theorem. From lemma 2.3 and the definition of a1 (n), a2 (n), a3 (n) and a4 (n), we get X (e) (τ3 (n))2 = a1 (n1 )a2 (n2 )a3 (n3 )a4 (n4 ), n=n1 n22 n43 n54

and 2

2

2

2

a1 (n) ¿ n² , a2 (n) ¿ n² , a3 (n) ¿ n² , a4 (n) ¿ n² . So we have X

(e)

(τ3 (n))2 −

X

(e)

(τ3 (n))2

n<x

n≤x+y

X

= X

X X X +O( + + ),

1

X

=

n2 ≤x² n3 ≤x² n4 ≤x²

1

X

=

2

X

4

2

x 4 5 n2 2 n3 n4

(14)

4

X

a2 (n2 )a3 (n3 )a4 (n4 ) X

3

a1 (n1 ),

<n1 ≤ 2x+y 5 n2 n4 3 n4

|a1 (n1 )a2 (n2 )a3 (n3 )a4 (n4 )|,

4 5 x<n1 n2 2 n3 n4 ≤x+y n2 >x²

=

3

X

X

a1 (n1 )a2 (n2 )a3 (n3 )a4 (n4 )

x<n1 n22 n43 n54 ≤x+y

= where

(13)

X

|a1 (n1 )a2 (n2 )a3 (n3 )a4 (n4 )|,

4 5 x<n1 n2 2 n3 n4 ≤x+y n3 >x²

=

X

4 5 x<n1 n2 2 n3 n4 ≤x+y n4 >x²

|a1 (n1 )a2 (n2 )a3 (n3 )a4 (n4 )|.

(15)


Vol. 9

A short interval result for the extension of the exponential divisor function

35

In view of lemma 3, X

=

µ

X

a2 (n2 )a3 (n3 )a4 (n4 )

n2 ≤x² n3 ≤x² n4 ≤x²

1

1 x Cy + O( 2 4 5 ) 6 +² 5 4 2 n2 n3 n4 n2 n3 n4

Ã

! X a2 (n2 ) X a3 (n3 ) X a4 (n4 ) = c1 y + O y n22 n >x² n43 n >x² n54 n2 >x² 3 4   X X X 1 a3 (n3 ) a4 (n4 )  a2 (n2 ) + O x 6 +² 1/3+2² 2/3+4² 5/6+5² n3 ≤x² n3 n4 ≤x² n4 n2 ≤x² n2 ³ 1 ´ ¡ ² ² ²¢ ² ² ² = c1 y + O yx− 6 x− 6 x− 6 + O x 6 +² x 6 x 6 x 6 ²

1

3

= c1 y + O(yx− 2 + x 6 + 2 ² ),

(16)

where c1 = Ress=1 F (s). X

X

¿

2

(n1 n2 n3 n4 )²

2

4 5 x<n1 n2 2 n3 n4 ≤x+y n2 >x²

¿

X

2

1

4 5 x<n1 n2 2 n3 n4 ≤x+y n2 >x²

¿

X

2

d(1, 4; m1 )

5 x<m1 n2 2 n4 ≤x+y n2 >x²

¿

x2²

X

2

1

5 x<m1 n2 2 n4 ≤x+y n2 >x²

¿

x2²

X

2

d(1, 5; m)

x<mn2 2 ≤x+y n2 >x² 2

¿

x3² B(x, y; 2, ²)

¿

x3² (yx−² + x 5 +² log x)

¿

yx− 2 + x 5 + 2 ² .

2

1

²

1

3

(17)

Similarly we have X

²

1

3

¿ yx− 2 + x 5 + 2 ² ,

3

X

²

1

3

¿ yx− 2 + x 5 + 2 ² .

(18)

4

Now our theorem follows from (9)-(14). Acknowledgements. The author deeply thank the referee for this careful reading of the manuscript and many valuable suggestions. This work is supported by Natural Science Foundation of Jiangxi province of China (Grant Nos. 2012ZBAB211001) and Natural Science Foundation of Jiangxi province of China (Grant Nos. 20132BAB2010031).


36

Li Yang

No. 3

References [1] L´aszl´o T´oth, An order result for the exponential divisor function, Publ. Math. Debrean. 71 (2007), No. 1-2, 165-171. [2] L´aszl´ o T´oth, On certain arithmetic function involing exponential divisors, II. Annales Univ. Sci. Budapest. Sect. Comp., 27 (2007), 155-156. [3] M. V. Subbarao, The theory of arithmetic functions (Proc. Conf., Western Michigan Univ., Kalamazoo, Mich., 1971), Lecture Notes in Math., Springer, Berlin, (1972), 251. [4] W. G. Zhai, Square-free numbers as sum of two squares, Number Theory: Tradition and modernization, Spring, New York, (2006), 219-227. [5] J. Wu, Problem of exponential divisors and exponentially square-free integers, J. Théor. Nombres Bordeaux, 7(1995), No. 1, 133-141.


Scientia Magna Vol. 9 (2013), No. 3, 37-42

Terminal hosoya polynomial of thorn graphs K. P. Narayankar † , S. B. Lokesh ‡ , S. S. Shirkol

]

and H. S. Ramane

]

† Department of Mathematics, Mangalore University, Mangalore - 574199, Karnataka, India ‡ Department of Mathematics, Shri Dharmasthala Manjunatheshwara College of Engineering and Technology, Dharwad - 580002, Karnataka, India ] Department of Mathematics, Gogte Institute of Technology, Belgaum - 590008, Karnataka, India E-mail: kishori pn@yahoo.co.in, shaila shirkol@rediffmail.com, hsramane@yahoo.com, sbloki83@gmail.com Abstract The terminal Hosoya polynomial of thorn graphs is described. Also the terminal Hosoya polynomial for caterpillars, thorn stars, and thorn rings are obtained. Keywords Terminal Hosoya polynomial, thorn graphs, thorn trees, thorn stars, thorn rings. 2000 Mathematics Subject Classification: 05C12

§1. Introduction Let G be a connected graph with n vertices and m edges. Let the vertex set of G be V (G) = {v1 , v2 , . . . , vn }. The degree of a vertex v in G is the number of edges incident to it and is denoted by degG (v). If degG (v) = 1 then v is called a pendant vertex or a terminal vertex. The distance between the vertices vi and vj in G is equal to the length of a shortest path joining them and is denoted by d(vi , vj |G). The diameter of a graph G, denoted by diam(G) is the maximum distance between any pair of vertices of G [2] . The Wiener index W = W (G) of a graph G is defined as the sum of the distances between all pairs of vertices of G, that is W = W (G) =

X

d(vi , vj |G) .

1≤i<j≤n

This molecular structure descriptor was putforward by Harold Wiener [24] in 1947. Details on its chemical applications and mathematical properties can be found in [4, 10, 17, 23]. In 1988, Hosoya [13] introduced a graph polynomial H(G, λ), defined as, if G is a connected graph with n vertices and m edges, and if d(G, k) is the number of pairs of vertices of G that are at distance k, then X H(G, λ) = d(G, k)λk . (1) k≥1

Hosoya called it the Wiener polynomial because H 0 (G, 1) = W (G) where H 0 (G, λ) denotes


38

K. P. Narayankar, S. B. Lokesh, S. S. Shirkol and H. S. Ramane

No. 3

the first derivative of H(G, λ). But most contemporary authors call it the Hosoya polynomial in [6, 9, 14, 15, 18, 22]. Recently the terminal Wiener index T W (G) was putforward by Gutman et al. [8] . The terminal Wiener index T W (G) of a connected graph G is defined as the sum of the distances between all pairs of its pendant vertices. Thus if VT (G) = {v1 , v2 , . . . , vk } is the set of pendant vertices of G, then X T W (G) = d(vi , vj |G). 1≤i<j≤k

For recent work on the terminal Wiener index, see [3, 7, 12, 16, 19]. In analogy of (1), we define the terminal Hosoya polynomial T H(G, λ) of a graph G as X T H(G, λ) = dT (G, k)λk , k≥1

where dT (G, k) is the number of pairs of pendant vertices of the graph G that are at distnce k. It is easy to check that T H 0 (G, 1) = T W (G), where T H 0 (G, λ) is the first derivative of T H(G, λ). In this paper we obtain the terminal Hosoya polynomial of thorn graphs.

§2. Terminal Hosoya polynomial of thorn graphs Let G be a connected n-vertex graph with vertex set V (G) = {v1 , v2 , · · · , vn } and let P = (p1 , p2 , · · · , pn ) be an n-tuple of nonnegative integers. The thorn graph GP is the graph obtained by attaching pi pendant vertices to the vertex vi of a graph G for i = 1, 2, · · · , n. The pi pendant vertices attached to the vertex vi will be called the thorns of vi . The concept of thorny graph was introduced by Gutman[5] and eventually found a variety of applications in [1, 20, 21, 22]. Theorem 2.1. Let G be the connected graph with vertices v1 , v2 , · · · , vn . Let Gp be the thorn graph obtained by attaching pi pendant vertices to the vertex vi of G, i = 1, 2, · · · , n. If pi > 0 for all i = 1, 2, · · · , n, then T H(GP , λ) =

n µ ¶ X pi i=1

2

λ2 +

X

pi pj λ2+d(vi ,vj |G) .

(2)

1≤i<j≤n

Proof. Consider pi thorns attached to a vertex vi , i = i, 2, · · · , n. Each of these are at a ¡ ¢ distance two. Thus for each vi , there are p2i pairs of vertices which are at distance two. This leads to the first term of (2). For the second term of (2), consider pi thorns v1i , v2i , · · · , vpi i attached to the vertex vi and pj thorns v1j , v2j , · · · , vpj j attached to the vertex vj of G, i 6= j. In Gp , d(vki , vlj |Gp ) = 2 + d(vi , vj |G),

k = 1, 2, · · · , pi and l = 1, 2, · · · , pj .

Since there are pi ×pj pairs of thorns of such kind, their contribution to T H(Gp , λ) is equal to pi pj λ2+d(vi ,vj |G) , i 6= j. This leads to the second term of (2). (2) remains unchanged if some pi ’s are equal to zero, provided that the corresponding vertices of the graph G are not pendant vertices.


Vol. 9

39

Terminal hosoya polynomial of thorn graphs

Corollary 2.1. Let G be the connected graph with n vertices. If pi = p > 0, i = 1, 2, · · · , n, then T H(Gp , λ) =

np(p − 1) 2 λ + p2 λ 2 2

X

λd(vi ,vj |G) .

(3)

1≤i<j≤n

Corollary 2.2. Let G be the complete graph on n vertices. If pi = p > 0, i = 1, 2, · · · , n. Then np(p − 1) 2 p2 n(n − 1) 3 λ + λ . T H(GP , λ) = 2 2 Proof. If G is a complete graph then d(vi , vj |G) = 1 for all vi , vj ∈ V (G), i 6= j. Therfore from (3) T H(Gp , λ)

= =

np(p − 1) 2 λ + p2 λ 2 2

X

λ

1≤i<j≤n

np(p − 1) 2 p2 n(n − 1) 3 λ + λ . 2 2

Corollary 2.3. Let G be the connected graph with n vertices and m edges. If diam(G) ≤ 2 and pi = p > 0, i = 1, 2, · · · , n. Then np(p − 1) 2 T H(GP , λ) = λ + mp2 λ3 + 2

µ

¶ n(n − 1) − m p2 λ 4 . 2

Proof. Since diam(G) ≤ 2, there are m pairs of vertices at distance 1 and of vertices are at distance 2 in G. Therefore from (3)  T H(Gp , λ)

=

=

2

− m pairs

X X  np(p − 1) 2 λ + λ + p2 λ 2  λ2    2 ³n´ m 2 −m

¶ ¶ µµ ¶ np(p − 1) 2 n 2 2 − m λ2 λ + p λ mλ + 2 2 µ ¶ np(p − 1) 2 n(n − 1) 2 3 λ + mp λ + − m p2 λ 4 . 2 2 µ

=

¡ n¢

Bonchev and Klein [1] proposed the terminology of thorn trees, where the parent graph is a tree. In a thorn tree if the parent graph is a path then it is a caterpillar [11] . Let Pl+2 be the path on l + 2 vertices, l ≥ 1, labeled as u1 , u2 , · · · , ul , ul+1 , ul+2 , where ui is adjacent to ui+1 , i = 1, 2, · · · , l + 1. Let T = T (p1 , p2 , · · · , pl ) be the thorn tree obtained from Pl+2 by attaching pi ≥ 0 pendant vertices to ui+1 , i = 1, 2, · · · , l. Theorem 2.2. For a thorn tree T = T (p1 , p2 , · · · , pl ) of order n ≥ 3, the terminal Hosoya polynomial is T H(T, λ) = a1 λ + a2 λ2 + · · · + al+1 λl+1 ,


40

K. P. Narayankar, S. B. Lokesh, S. S. Shirkol and H. S. Ramane

No. 3

where a1 a2 ak

= 0, l µ ¶ X pi = + p1 + pl , 2 i=1 =

l−k+2 X

pi pi+k−2 + pk−1 + pl−k+2 ,

3 ≤ k ≤ l,

i=1

al+1

= (p1 + 1)(pl + 1).

Proof. Let A = {u1 , u2 , · · · , ul+1 , ul+2 }, Bi = {vi1 , vi2 , · · · , vipi }, i = 1, 2, · · · , l and Sl B = i=1 Bi . There is no pair of pendant vertices which is at distance 1 in T . Therefore a1 = 0. Every pair of pendant vertices of Bi , i = 1, 2, · · · , l is at distance two. Also there are p1 pairs of pendant vertices at distance two from the vertex u1 and pl pairs of pendant vertices at distance two from ul+2 . Therefore a2 =

l µ ¶ X pi i=1

2

+ p1 + pl .

For ak , 3 ≤ k ≤ l, d(u, v|T ) = k if u ∈ Bi and v ∈ Bi+k−2 , i = 1, 2, · · · , l. There are pi × pi+k−2 such pairs of pendant vertices which are at distance k. Also pk−1 pairs of pendant vertices are at distance k from u1 and pl−k+2 pairs of pendant vertices are at distance k from ul+1 . Therefore l−k+2 X pi pi+k−2 + pk−1 + pl−k+2 , 3 ≤ k ≤ l. ak = i=1

Now d(u, v) = l + 1 if u ∈ B1 ∪ {u1 } and v ∈ Bl ∪ {ul+2 }. Therefore al+1 = (p1 + 1)(pl + 1). Thorn star is a graph obtained by attaching pendant vertices to the vertices of star K1,n except to its central vertex. ∗ Theorem 2.3. Let the thorn star K1,n is the graph obtained by attaching pi > 0 pendant vertices to the i-th pendant vertex of a star K1,n , n ≥ 2, then ∗ T H(K1,n , λ) = a1 λ + a2 λ2 + a3 λ3 + a4 λ4 ,

where a1 = 0,

a2 =

n µ ¶ X pi i=1

2

,

a3 = 0

and

a4 =

X

p i pj .

1≤i<j≤n

Proof. Similar to the proof of theorem 2.2. If Cn is the n-vertex cycle labeled cosecutively as u1 , u2 , · · · , un , then the thorn ring Cn∗ is obtained from Cn by attaching pi pendant vertices to the vertex ui , i = 1, 2, · · · , n. Theorem 2.4. For a thorn ring Cn∗ , n ≥ 3, the terminal Hosoya polynomial is T H(Cn∗ , λ) = a1 λ + a2 λ2 + · · · + abn/2c+2 λbn/2c+2


Vol. 9

Terminal hosoya polynomial of thorn graphs

where, if n is odd, then a1 = 0;

a2 =

n µ ¶ X pi i=1

and ak =

n−k+2 X

pi pi+k−2 +

i=1

n X

a1 = 0;

pi pi−n+k−2 ,

a2 =

n µ ¶ X pi i=1

n−k+2 X i=1

;

3 ≤ k ≤ bn/2c + 2,

i=n−k+3

and if n is even, then

ak =

2

41

pi pi+k−2 +

n X

2

;

pi pi−n+k−2 ,

3 ≤ k ≤ (n/2) + 1,

i=n−k+3

and a(n/2)+2 =

n/2 X

pi pi+(n/2) .

i=1

Proof. The proof is analogous to that of theorem 2.2. Acknowledgement. K. P. Narayankar and S. B. Lokesh thanks University Grants Commission (UGC), Govt. of India, for support through No. 39-36/2010 (SR).

References [1] D. Bonchev, D. J. Klein, On the Wiener number of thorn trees, stars, rings, and rods, Croat. Chem. Acta., 75(2002), 613-620. [2] F. Buckley, F. Harary, Distance in Graphs, Addison-Wesley, Redwood, 1990. [3] X. Deng, J. Zhang, Equiseparability on terminal Wiener index, in: A. V. Goldberg, Y. Zhou (Eds.), Algorithmic Aspects in Information and Management, Springer, Berlin, (2009), 166-174. [4] A. A. Dobrynin, R. Entringer, I. Gutman, Wiener index of trees: theory and applications, Acta Appl. Math., 66(2001), 211-249. [5] I. Gutman, Distance in thorny graphs, Publ. Inst. Math. (Beograd), 63(1998), 31-36. [6] I. Gutman, Hosoya polynomial and the distance of the total graph of a tree, Publ. Elektrotehn. Fak. (Beograd) Ser. Mat., 10(1999), 53-58. [7] I. Gutman, B. Furtula, A survey on terminal Wiener index, in: I. Gutman, B. Furtula (Eds.), Novel Molecular Structure Descriptors - Theory and Applications I, Univ. Kragujevac, Kragujevac, (2010), 173-190. [8] I. Gutman, B. Furtula, M. Petrovi´c, Terminal Wiener index, J. Math. Chem., 46(2009), 522-531. ˇ [9] I. Gutman, S. Klavˇzar, M. Petkovˇsek, P. Zigert, On Hosoya polynomials of benzenoid graphs, MATCH Commun. Math. Comput. Chem., 43(2001), 49-66. [10] I. Gutman, Y. N. Yeh, S. L. Lee, Y. L. Luo, Some recent results in the theory of the Wiener number, Indian J. Chem., 32A(1993), 651-661. [11] F. Harary, A. J. Schwenk, The number of caterpillars, Discr. Math., 6(1973), 359-365.


42

K. P. Narayankar, S. B. Lokesh, S. S. Shirkol and H. S. Ramane

No. 3

[12] A. Heydari, I. Gutman, On the terminal Wiener index of thorn graphs, Kragujevac J. Sci., 32(2010), 57-64. [13] H. Hosoya, On some counting polynomials in chemistry, Discr. Appl. Math., 19(1988), 239-257. [14] M. Lepovi´c, I. Gutman, A collective property of trees and chemical trees, J. Chem. Inf. Comput. Sci., 38(1998), 823-826. [15] K. P. Narayankar, S. B. Lokesh, V. Mathad, I. Gutman, Hosoya polynomial of Hanoi graphs, Kragujevac J. Math., 36(2012), 51-57. [16] H. S. Ramane, K. P. Narayankar, S. S. Shirkol, A. B. Ganagi, Terminal Wiener index of line graphs, MATCH Commun. Math. Comput. Chem., 69(2013), 775-782. [17] D. H. Rouvray, The rich legacy of half century of the Wiener index, in: D. H. Rouvray, R. B. King (Eds.), Topology in Chemistry-Discrete Mathematics of Molecules, Horwood, Chichester, (2002), 16-37. [18] D. Stevanovi´c, Hosoya polynomial of composite graphs, Discr. Math., 235(2001), 237-244. [19] L. A. Sz´ekely, H. Wang, T. Wu, The sum of distances between the leaves of a tree and the semi-regular property, Discr. Math., 311(2011), 1197-1203. [20] D. Vukiˇcevi´c, A. Graovac, On modified Wiener indices of thorn graphs, MATCH Commun. Math. Comput. Chem., 50(2004), 93-108. [21] D. Vukiˇcevi´c, B. Zhou, N. Trinajsti´c, Altered Wiener indices of thorn trees, Croat. Chem. Acta, 80(2007), 283-285. [22] H. B. Walikar, H. S. Ramane, L. Sindagi, S. S. Shirkol, I. Gutman, Hosoya polynomial of thorn trees, rods, rings and stars, Kragujevac J. Sci., 28(2006), 47-56. [23] H. B. Walikar, V. S. Shigehali, H. S. Ramane, Bounds on the Wiener number of a graph, MATCH Commun. Math. Comput. Chem., 50(2004), 117-132. [24] H. Wiener, Structural determination of paraffin boiling points, J. Am. Chem. Soc., 69(1947), 17-20.


Scientia Magna Vol. 9 (2013), No. 3, 43-51

Sigmoid function in the space of univalent function of Bazilevic type. S. O. Olatunji † , A. M. Gbolagade ‡ , T. Anake

]

and O. A. Fadipe-Joseph

]

† Department of Pure and Applied Mathematics, Ladoke Akintola University of Technology, P. M. B. 4000, Ogbomoso, Nigeria ‡ Department of Mathematics, Emmanuel Alayande College of Education, P. M. B. 1010, Oyo State, Nigeria ] Department of Mathematics, Covenant University, Ota, P. M. B. 1023, Ogun State, Nigeria ] Department of Mathematics, University of Ilorin, P. M. B. 1515, Ilorin, Nigeria E-mail: olatfem− 80@yahoo.com, gboladeam@yahoo.com, timothy.anake@convenantuniversity.edu.ng, famelov@unilorin.edu.ng Abstract The authors investigated the coefficient bounds of the class Tnα (β) as related to the class of modified Sigmoid activation functions. Keywords analytic functions, coefficient bounds, Bazilevic and sigmoid functions. 2000 Mathematics Subject Classification: 30C45, Secondary 33E99

§1. Introduction The theory of a special function has been in existence since nineteenth century due to the contributions of some reputable authors like Gauss, Jacobi, Franklein see [21] and some others. This function does not have a specific definition but it is a branch of Mathematics which is of utmost important to scientist and engineers who are concerned with Mathematical calculations. Special functions have a wide application in physics, Computer, engineering etc to mention just a few. In twentieth century, the theory of special function has been overshadowed by other fields like real analysis, functional analysis, algebra, topology, differential equations. These functions also play a major role in geometric function theory. Activation function is an information process that is inspired by the way biological nervous system such as brain, process information. It composed of large number of highly interconnected processing element (neurons) working together to solve a specific task. This function works in similar way the brain does, it learns by examples and can not be programmed to solve a specific task. Activation function has a wide application in the real world bussiness problems. It can be used in industries to forecast sales and in identifying patterns trend. Also, it can be used


44

S. O. Olatunji, A. M. Gbolagade, T. Anake and O. A. Fadipe-Joseph

No. 3

in modelling especially in human cardiovascular system, it can also be used in modelling of population. More so, it has application in, instant physician, architecture, electronic noses and etc. Activation function can be categorized into three, namely, ramp function, threshold function and the sigmoid funtion. The most popular activation function is the sigmoid function because of its gradient descendent learning algorithm. Sigmoid function can be evaluated in different ways, it can be done by truncated series expansion, look-up tables or piecewise approximation. This function is of the form g(z) = 1+e1−z . It is useful because it is differentiable, which is important for weight learning algorithm. Neural networks can be used in complex learning task. Sigmoid functions has the following features: (i) It outputs real number between 0 and 1. (ii) It map a large domain to a small range. (iii) It never loses information because it is one-to-one function. (iv) It increases monotonically. The aforementioned features enable us to use sigmoid function in geometric function theory.

§2. Univalent functions Univalent function is a function which does not take the same value twice, f (z1 ) 6= f (z2 ) that is z1 6= z2 (z1 , z2 ∈ D) or otherwise. A function is said to be locally univalent at z0 ∈ D, if it is univalent at the neighbourhood of z0 . Also, a function is analytic univalent if it is a conformal mapping. Hence, our concern is the class S of analytic and univalent function in the U = {z : |z| < 1} normalized with f (0) = 0 and f 0 (0) − 1 = 0. The fuction g(z) has a Taylor series expansion of the form g(z) = b0 + b1 z + b2 z 2 + · · · , which gives ∞

X g(z) − b0 =z+ ak z k , b1 6= 0, b1 k=2

then f (z) = z +

∞ X

ak z k .

(1)

k=2

Now, let γ be an analytic and univalent of the form (2.1) in the U = {z : |z| < 1} normalized with f (0) = 0 and f 0 (0)−1 = 0. Let us recall some definitions and concepts of classes of analytic functions. Let f ∈ γ. Then, f ∈ S ∗ (β) if and only if ½ 0 ¾ zf (z) Re > β (0 ≤ β < 1) . f (z)


Vol. 9

Sigmoid function in the space of univalent function of Bazilevic type

45

This class is called starlike class of analytic function, let f ∈ γ. Then, f ∈ C(β) if and only if ¾ ½ zf 00 (z) > β (0 ≤ β < 1) . Re 1 + f (z) This class is called convex class of analytic function. Some well known authors like Bernardi , Darus and Ibrahim [5] , Frasin [6] , Goodman [7] etc to mention just but few have investigated the above two classes from different perspectives and they obtained many interesting results, the literatures on them littered everywhere. Geometric function theory has wide applications in many physical problems, problems in physics, engineering etc. Further more, Salagean [16] introduced the following differential operator: [3]

D0 f (z) = f (z), D1 f (z) = Df (z) = zf 0 (z), Dn f (z) = D(Dn−1 f (z)), and n

D f (z) = z +

∞ X

k n ak z k ,

(2)

k=2

where f (z) is of the form (1). Also, from (1), we can write that à α

f (z) =

z+

∞ X

!α ak z

k

.

(3)

k=2

Using binomial expansion on (3), we have µ ¶ α(α − 1) 2 α α α+1 f (z) = z + αa2 z + αa3 + a2 2! µ ¶ α(α − 1) α(α − 1)(α − 2) 3 + αa4 + 2a2 a3 + a2 + · · · . 2! 3! Thus f (z)α = z α +

∞ X

ak (α)z α+k−1 ,

(4)

k=2

where α > 0 (is real and it meant principal determinant only). Applying differential operator (2) on (4), we obtained Dn f (z)α = αn z α +

∞ X

(α + k − 1)n ak (α)z α+k−1 .

(5)

k=2

From (5), we have a subclass of γ to be Tnα (β) defined by Opoola in [10], ½ n ¾ D f (z)α Re > β, αn z α

(6)


46

S. O. Olatunji, A. M. Gbolagade, T. Anake and O. A. Fadipe-Joseph

No. 3

where (α > 0 is real , z ∈ U, 0 ≤ β < 1, n = 0, 1, 2 · · · ). The study of analytic class in (6) started with the study of Bazilevic function that was discovered in 1955 by a Russian Mathematician called Bazilevic [2] . He defined the function by ( f (z) =

α 1 + ²2

Z

z

0

α P (v) − i² g(v) 1+²2 dv ) V (1 + 1+α² 1+²2

2 ) 1+² α

,

(7)

where p ∈ P and g ∈ S ∗ . The number α > 0 and ² are real, and all powers meant principal determinant only. The family of function (7) is called Baziilevic function and it is denoted as B(α, ²). The family of function B(α, ²) breaks down to some well known subclasses of univalent functions. For instance, if we take ² = 0, we have ½ Z f (z) = α 0

z

P (v) g(v)α dv V

¾ α1 .

(8)

On differentiating (8), we have zf 0 f (z)α−1 = p(z). g(z)α

(9)

Or equivalently ½ Re

zf 0 f (z)α−1 g(z)α

¾ > 0, z ∈ U.

The subclasses of Bazilevic functions satisfying (9) are called Bazilevic function of type α and denoted by B(α) see Singh [17] . In 1993, Noonman [9] gave a plausable description of functions of the class B(α) as those © ¡ ¢α ª function in S for each r < 1, and the tangent to the curve Uα (r) = ²f reiθ , 0 ≤ θ < 2π never turns back on itself as much as π radian. If α = 1, the class B(α) reduces to the family of close-to-convex functions, that is Re

zf 0 (z) > 0 z ∈ U. g(z)

(10)

If we choose g(z) = f (z) in (10), we have Re

zf 0 (z) > 0, z ∈ U, f (z)

(11)

which implies that f (z) is starlike. Furthermore, if we replace f (z) by zf 0 in(11), we obtain ½ ¾ zf 00 (z) Re 1 + 0 > 0 z ∈ U, (12) f (z) which is the convexity condition. More over, if g(z) = z in (9), then we have the family of B1 (α) see Singh [17] of functions satisfying ¾ ½ 0 zf f (z)α−1 > 0, z ∈ U. Re (13) zα


Vol. 9

Sigmoid function in the space of univalent function of Bazilevic type

47

Many authors have studied this class of Bazilevic functions and they obtained many interesting results as contained in literatures (See Bernardi’s Bibliography of Schlich function [4] ). In 1992, Abdulhalim [1] introduced a generalization of function satisfying (13) as ½ n ¾ D f (z)α Re (14) > 0, zα where parameter α and Dn are as earlier defined. He denoted the class of function by Bn (α). It is easily seen that his generalization has extraneously included analytic function satisfying Re

f (z)α > 0, zα

(15)

which are largely non univalent in the unit disk. By proving the inclusion Bn+1 (α) ⊂ Bn (α). Abdulhalim in [1] showed that for all n ∈ N , each function of the class of Bn (α) is univalent in U . Notable contributors like MacGregor [8] , Noonman [9] , Thomas [18] , Tuan and Anh [19] , Yamaguchi [20] , Opoola [10] , Oladipo [11] , Oladipo and Breaz [12] , Oladipo and Fadipe [13] had earlier considered various special cases of parameter n and α of (14) and established many properties of function in those particular cases. Recently, Oladipo and Olatunji [14] used Cata’s operator on this class of Bazilevic functions and some interesting results were obtained for coefficient bounds and the coefficient inequalities. Let p ∈ P be analytic and of the form p(z) = 1 +

∞ X

ck z k ,

k=1

with p(0) = 1 and Rep(z) > 0. This class of function is denoted by P known as Caratheodory functions. The main aim of this work is to investigate how the sigmoid function is related to analytic and univalent functions of Bazilevic type in terms of coefficient bounds. For the purpose of our result the following lemma shall be necessary. Lemma 2.1. [15] Let g(z) be a sigmoid function and G(z) = 2g(z) then G(z) ∈ P, |z| < 1. Where G(z) is a modified Sigmoid function. Proof. G(z) =

2 , 1 + e−z

G(0) = 1, G(z) + G(z) =

4(1 + Re(e−z )) , (1 + e−z )2

e−z = e−x cos y − ie−x sin y, Re(e−z ) = e−x cos y,


48

S. O. Olatunji, A. M. Gbolagade, T. Anake and O. A. Fadipe-Joseph

No. 3

e−x > 0. This shows that Re(e−z ) depends only on the sign of cos y. Since z is in the unit disc x π and y vary from −1 and 1, since x2 + y 2 < 1. Since (−1, 1) ⊂ ( −π 2 , 2 ), cos y should be positive. Therefore, Reg(z) > 0. Hence, the function g under investigation maps the unit disk into the half plane with g(0) = 1 and is therefore in Caratheodory class. The series form of a modified sigmoid function G(z) =

2 , 1 + e−z

is given as ∞

g(z) =

1 X (−1)n n + z , 2 n=1 n!

" !m # Ã∞ ∞ X (−1)m X (−1)n n 1 1+ z , g(z) = 2 2m n! m=1 n=1 ∞ X (−1)m 2g(z) = 1 + 2m m=1

Ã

∞ X (−1)n n z n! n=1

!m ,

hence ∞ X (−1)m G(z) = 1 + 2m m=1

Ã

∞ X (−1)n n z n! n=1

!m .

(16)

Here, we want to obtain the coefficient bound for the class Tnα (β) as related to the modified activated sigmoid functions.

§3. Main result Theorem 3.1. Let f ∈ Tnα (β), then αn−1 (1 − β) , α > 0, 2(α + 1)n

(17)

α2n−2 (1 − α)(1 − β)2 , 0 < α < 1, 8(α + 1)2n

(18)

|a2 (α)| ≤

|a3 (α)| ≤ and

where

    F1 + F2 + F3 , |a4 (α)| ≤ F3 ,    F1 ,

0 < α < 1; 1 < α < 2; α ≤ 1,


Vol. 9

49

Sigmoid function in the space of univalent function of Bazilevic type

F1 = −

αn−1 (1 − β) α3n−3 (α − 1)2 (1 − β)3 α3n−3 (α − 1)(α − 2)(1 − β)3 , F = , F = − . 2 3 24(α + 3)n 16(α + 1)3n 48(α + 1)3n

Proof. Let f ∈ Tnα (β), define G(z) = Recall that f (z)α

−β . 1−β

(19)

µ ¶ α(α − 1) 2 = z α + αa2 z α+1 + αa3 + a2 2! ¶ µ α(α − 1)(α − 2) 3 α(α − 1) 2a2 a3 + a2 + · · · , + αa4 + 2! 3!

hence (1 − β)G(z) = 1 +

¶n ∞ µ X α+k−1 k=2

Equivalently as

D n f (z)α αn z α

α

ak (α)z k−1 − β.

(20)

Ã∞ !m # ∞ X (−1)m X (−1)n n z (1 − β) 2m n! n=1 m=1 ¶n µ ¶n µ α+2 α+1 = α1 a2 (α)z + (α1 a3 + α2 a22 ) z2 α α µ ¶n α+3 +(α1 a4 + 2α2 a2 a3 + α3 a32 ) z3 α ¶n µ α+4 z4 + · · · . +(α1 a5 + α2 (2a2 a4 + a23 ) + 3α3 a22 a3 + α4 a42 ) α "

Comparing the coefficient of (20), then we have a2 (α) =

a3 (α) = −

a4 (α) = −

αn (1 − β) , 2α(α + 1)n

α2n (α − 1)(1 − β)2 , 8α2 (α + 1)2n

αn (1 − β) α3n (α − 1)2 (1 − β)3 α3n (α − 1)(α − 2)(1 − β)3 + − , 24α(α + 3)n 16α3 (α + 1)3n 48α3 (α + 1)3n

and this completes the proof. Theorem 3.2. Let f ∈ Tnα (β), then µ 2n ¶¯ µ 2n ¶µ ¶¯ 2 ¯ ¯ ¯ αn α (α − 1)(1 − β)2 α + 1 ¯¯ ¯− ¯a2 a4 − a23 ¯ ≤ α (1 − β) + ¯. 16α2 (α + 1)n ¯ 3(α + 3)n 2α2 (α + 1)3n 6 Theorem 3.3. Let f ∈ Tnα (β), then ¯ ¶¯ µ 2n 2 ¯ −(α − 1) − 2λ ¯ ¯ ¯ ¯ ¯. ¯a3 − λa22 ¯ ≤ α (1 − β) ¯ 4α2 (α + 1)2n ¯ 2 Conclusively, with special choices of the principal determinations involved, many bounds could be obtained.


50

S. O. Olatunji, A. M. Gbolagade, T. Anake and O. A. Fadipe-Joseph

No. 3

References [1] S. Abdulhalim, On a class of analytic functions involving the Salagean differential operator, Tamkang Journal of Mathematics, 23(1992), No. 1, 51-58. [2] I. E. Bazilevic, On a case of integrability in quadratures of the Loewner-Kufarev equation, Matheticheskii Sbornik, 37(1955), No. 79, 471-476 (Russian). [3] S. D. Bernardi, Convex and Starlike univalent function, Transaction of the American Mathematical Society, 135(1969), 429-446. [4] S. D. Bernardi, Bibliography of Schlict Functions, Reprinted by Mariner Publishing, Tampa, Florida, USA, 1983, Courant Institute of Mathematical Sciences, New York University. [5] M. Darus and R. W. Ibrahim, Coefficient inequalities for a new class of univalent functions, Lobachevskii Journal of Mathematics, 29(2008), 221-229. [6] B. A Frasin, Subclasses of analytic functions defined by Carlson-Shaffer linear operator, Tamsui Oxford Journal of Mathematical Sciences, 23(2007), No. 2, 219-233. [7] A. W. Goodman, Univalent function, Mariner Publishing, Tampa, Florida, USA, 1(1983). [8] T. H. MacGregor, Functions whose derivative has a positive real part, Transactions of the American Mathematical Society, 104(1962), 532-537. [9] J. W. Noonman, On close-to-convex functions of order β, Pacific Journal of Mathematics, 44(1973), No. 1, 263-280. [10] T. O. Opoola, On a new subclass of univalent functions, Mathematica, 36(1994), No. 2, 195-200. [11] A. T. Oladipo and D. Breaz, On the family of Bazilevic function, Acta Universitatis Apulensis, (2010), No. 24, 319-330. [12] A. T. Oladipo and O. A. Fadipe, On a new subclass of univalent functions, Journal of the Nigerian Mathematical Society, 24(2004), 1-6. [13] A. T. Oladipo and S. O. Olatunji, On a certain subclass of Bazilevic function defined by Catas operator, International Journal of Mathematical Sciences and Application, 1(2011), No. 1, 395-413. [14] A. T. Oladipo, O. A Fadipe and U. A. Ezeafulukwe, Modified Sigmoid function in univalent function theory, International J. of Math.Sci. and Engg. Appls (IJMSEA) ISSN 0973-9424, 7(2013), No. 7, 313-317. [15] A. T. Oladipo, Sigmoid activation function in the space of univalent functions (Submitted). [16] G. S. Salagean, Subclasses of univalent functions in complex analysis, Fifth RomanianFinnish Seminar, Lecture Notes in Mathematics, Springer, New York, NY, USA, 1013(1983), 362-372. [17] Ram Singh, On Bazilevic functions, Proceedings of The America Mathematical Society, 38(1973), No. 2, 261-271. [18] D. K. Thomas, On Bazilevic functions, Transactions of the American Mathematical Society, 132(1968), No. 2, 353-361. [19] P. D. Tuan and V. V. Anh, Radii of starlikeness and convexity for certain classes of analytic functions, Journal of Mathematical Analysis and Applications, 64(1978), No. 1, 146-158.


Vol. 9

Sigmoid function in the space of univalent function of Bazilevic type

51

n o [20] K. Yamaguchi, On functions satisfying < f (z) > 0, Proceedings of the American z Mathematical Society, 17(1966), No. 3, 588-591. [21] A. Menon, K. Mehrotra, K. Chilukuri and M. S. Ranka, Characterizations of a class of sigmoid functions with applications to neural networks, Journal of Neural Networks, 9(1996), 819-835.


Scientia Magna Vol. 9 (2013), No. 3, 52-56

k*-paranormal composition operators S. Panayappan † , N. Jayanthi

and D. Sumathi

]

Post Graduate and Research Department of Mathematics, Government Arts College, Coimbatore-18, India E-mail: Jayanthipadmanaban@yahoo.in Abstract In this paper, we charaecterise k*-paranormal composition operators and k*paranormal weighted composition operators and their adjoints in L2 spaces. Keywords k*-paranormal operators, composition operators, weighted composition operators, aluthge transformation.

§1. Introduction and Preliminaries Let B(H) be the Banach Algebra of all bounded linear operators on a non-zero complex Hilbert space H. By an operator, we mean an element from B(H). If T lies in B(H), then T ∗ denotes the adjoint of T in B(H). For 0 ≤ p < 1, an operator T is said to be p-hyponormal if (T ∗ T )p ≥ (T T ∗ )p . If p = 1, T is called hyponormal. If p = 21 , T is called semi-hyponormal. ° ° 2 An operator T is called paranormal, if kT xk ≤ °T 2 x° kxk , for every x ∈ H. Composition operators on hyponormal operators are studied by Alan Lambert [1] . Paranormal composition operators are studied by T. Veluchamy and S. Panayappan [9] . Let (X, Σ, λ ) be a sigma-finite measure space. The relation of being almost everywhere, denoted by a.e, is an equivalence relation in L2 (X, Σ, λ) and this equivalence relation splits L2 (X, Σ, λ) into equivalence classes. Let T be a measurable transformation from X into itself. L2 (X, Σ, λ) is denoted as L2 (λ). The equation CT f = f ◦ T, f ∈ L2 (λ) defines a composition transformation on L2 (λ). T induces a composition operator CT on L2 (λ) if (i) the measure −1 ) λ◦T −1 is absolutely continuous with respect to λ and (ii) the Radon-Nikodym derivative d(λT dλ is essentially bounded(Nordgren). Harrington and Whitley have shown that if CT ∈ B(L2 (λ)), then CT∗ CT f = f0 f and CT CT∗ f = (f0 ◦ T )P f for all f ∈ L2 (λ) where P denotes the projection of L2 (λ) onto ran(CT ). Thus it follows that CT has dense range if and only if CT CT∗ is the −1 ) operator of multiplication by f0 ◦ T, where f0 denotes d(λT . dλ Every essentially bounded complex valued measurable function f0 induces a bounded operator Mf0 on L2 (λ), which is defined by Mf0 f = f0 f, for every f ∈ L2 (λ). Further CT∗ CT = Mf0 −1 −k ) ) and CT∗ 2 CT 2 = Mh0 . Let us denote d(λT by h i.e. f0 by h and d(λT by hk , where k is dλ dλ ∗ ∗2 a positive integer greater than or equal to one. Then CT CT = Mh and CT CT 2 = Mh2 . In general, CT∗ k CT k = Mhk , where Mhk is the multiplication operator on L2 (λ) induced by the complex valued measurable function hk . Definition 1.1. [10] An operator T is called k*- paranormal for a positive integer k, if for


Vol. 9

53

k*-paranormal operators

° ° k every unit vector x in H, °T k x° ≥ kT ∗ xk . Theorem 1.1. [10] For k ≥ 3, there exists a k*-paranormal operator which is not k*paranormal operator. Theorem 1.2. An operator T is k*-paranormal for a positive integer k if and only if for any µ > 0, T ∗k T k − kµk−1 T T ∗ + (k − 1)µk ≥ 0. Proof. Let µ > 0 and x ∈ H with kxk = 1. Using arithmetic and geometric mean inequality, we get 1 D −k+1 ¯¯ k ¯¯2 µ T x, k

E k−1 hµx, x + k

D xi =

¯ ¯2 µ−k+1 ¯T k ¯ x,

E k1 x hµx,

xi

k−1 k

° °2 = °T k x° k ≥ kT ∗ xk

2

= hT T ∗ x,

xi .

Hence E (k − 1)µ µ−k+1 D¯¯ k ¯¯2 hx, xi − hT T ∗ x, T x, x + k k ⇒ T ∗k T k − kµk−1 T T ∗ + (k − 1)µk ≥ 0.

xi ≥ 0.

Conversely assume that T ∗k T k − kµk−1 T T ∗ + (k − 1)µk ≥ 0. If kT ∗ xk = 0, then k*- paranormality condition is trivially satisfied. If x ∈ H with 2 kT ∗ xk 6= 0 and kxk = 1, taking µ = kT ∗ xk , we get ° k ° °T x° ≥ kT ∗ xkk . Hence T is k*-paranormal. In this paper we characterise k*-paranormal composition operators and k*-paranormal weighted composition operators.

§2. k*-paranormal composition operators Theorem 2.1. For each positive integer k, CT ∈ B(L2 (λ)) is k*-paranormal if and only if hk − kµk−1 (h ◦ T )P + (k − 1)µk ≥ 0 a.e, for every µ > 0. Proof. By theorem 1.2, CT is k*-paranormal if and only if CT∗ k CTk − kµk−1 CT CT∗ + (k − 1)µk I ≥ 0, for every µ > 0. This is true if and only if for every f ∈ L2 (λ) and µ > 0, ­ ® hMhk f, f i − kµk−1 M(h◦T )P f, f + (k − 1)µk hf, f i ≥ 0, if and only if hhk f, f i − kµk−1 h(h ◦ T )P f, f i + (k − 1)µk hf, f i ≥ 0,


54

S. Panayappan, N. Jayanthi and D. Sumathi

No. 3

if and only if hhk χE , χE i − kµk−1 h(h ◦ T )P χE , χE i + (k − 1)µk hχE , χE i ≥ 0, for every characteristic function χE of E in Σ, if and only if Z (hk − kµk−1 (h ◦ T )P + (k − 1)µk ) dλ ≥ 0 for every E in Σ, E

if and only if hk − kµk−1 (h ◦ T )P + (k − 1)µk ≥ 0 a.e, for every µ > 0. Corollary 2.1. For each positive integer k, CT ∈ B(L2 (λ)) is k*-paranormal if and only if hk ≥ (hk ◦ T )P a.e. Theorem 2.2. For each positive integer k, CT∗ is k*-paranormal if and only if (hk ◦T k )Pk ≥ hk a.e, where Pi0 s are the projections of L2 (λ) onto ran(CTi ). Proof. By theorem 1.2, CT∗ is k*-paranormal if and only if D E (CT k CT∗ k − kµk−1 CT∗ CT + (k − 1)µk )g, g ≥ 0, for all g ∈ L2 (λ), if and only if hk ◦T k Pk −kµk−1 h+(k −1)µk ≥ 0 a.e, for all µ ≥ 0, if and only if (hk ◦T k )Pk ≥ hk a.e. Corollary 2.2. If CT ∈ B(L2 (λ)) has dense range, then CT∗ is k*-paranormal if and only if hk ◦ T k ≥ hk a.e. Corollary 2.3. If CT ∈ B(L2 (λ)) has dense range, then both CT and CT∗ are k*paranormal if and only if hk ◦ T k ≥ max(hk , hk ◦ T k+1 ) a.e.

§3. Weighted composition operators and aluthge transformation of k*-paranormal operators A weighted composition operator induced by T is defined as W f = w(f ◦ T ) where w is a complex valued Σ measurable function. Let wk denote w(w ◦ T )(w ◦ T 2 ) · · · (w ◦ T k−1 ). Then W k f = wk (f ◦ T )k . To examine the weighted composition operators effectively Alan Lambert [1] associated conditional expectation operator E with T as E(·/T −1 Σ) = E(·). E(f ) is defined for each non-negative measurable function f ∈ Lp (p ≥ 1) and is uniquely determined by the conditions: 1. E(f ) is T −1 Σ measurable. 2. if B is any T −1 Σ measurable set for which

R B

f dλ converges, we have

R B

f dλ =

R B

E(f )dλ.

As an operator on Lp , E is the projection onto the closure of range of T and E is the identity operator on Lp if and only if T −1 Σ = Σ. Detailed discussion of E is found in [4], [5] and [7]. The following proposition due to Campbell and Jamison is well-known. Theorem 3.1. [4] For w ≥ 0,


Vol. 9

k*-paranormal operators

55

1. W ∗ W f = h[E(w2 )] ◦ T −1 f. 2. W W ∗ f = w(h ◦ T )E(wf ). Since W k f = wk (f ◦T k ) and W ∗ k f = hk E(wk f )◦T −k , we have W ∗ k W k = hk E(wk2 )◦T −k f, for f ∈ L2 (λ). Now we characterize k*-paranormal weighted composition operators. Theorem 3.2. Let W ∈ B(L2 (λ)). Then W is k*-paranormal if and only if hk E(wk2 ) ◦ T −k − kµk−1 w(h ◦ T )E(w) + (k − 1)µk ≥ 0 a.e, for every µ > 0. Proof. Since W is k*-paranormal, W ∗ k W k − kµk−1 W W ∗ + (k − 1)µk I ≥ 0, for every µ > 0. Hence

Z E

hk E(wk2 ) ◦ T −k − kµk−1 w(h ◦ T )E(w) + (k − 1)µk d λ ≥ 0,

for every E ∈ Σ and so hk E(wk2 ) ◦ T −k − kµk−1 w(h ◦ T )E(w) + (k − 1)µk ≥ 0 a.e. for every µ > 0. Corollary 3.1. Let T −1 Σ = Σ. Then W is k*-paranormal if and only if hk wk2 ◦ T −k − kµk−1 w2 (h ◦ T ) + (k − 1)µk ≥ 0 a.e, for every µ > 0. 1/2 1/2 The Alugth transformation of T is the operator Te given by Te = |T | U |T | was in[2] troduced by Alugth . More generally we may form the family of operators Tr : 0 < r ≤ 1 r 1−r where Tr = |T | U |T | [3] . For a composition operator C, the polar decomposition is given by √ 1 C = U |C| where |C| = hf and U f = √h◦T f ◦ T. Lambert [5] has given a more general Alugth ¡ h ¢r/2 r 1−r transformation for composition operators as Cr = |C| U |C| as Cr f = h◦T f ◦ T. i.e. ¡ h ¢r/2 . Cr is weighted composition with weight π = h◦T Corollary 3.2. Let Cr ∈ B(L2 (λ)). Then Cr is of k*-paranormal if and only if hk E(πk2 ) ◦ T −k − kµk−1 π(h ◦ T )E(π) + (k − 1)µk ≥ 0 a.e. for every µ > 0.

References [1] Alan Lambert, Hyponoraml Composition operators, Bulletin. London. Math. Soc., 18(1986), 395-400. [2] A. Alugthe, On p-hyponormal operators for 0 < p < 1, Integral Equations and Operator theory, 13(1990), 307-315. [3] A. Alugthe, Some generalized theorems on p-hyponormal operators for 0 < p < 1, Integral Equations and Operator theory, 24(1996), 497-502. [4] J. Campbell and J. Jamison, On some classes of weighted composition operators, Glasgow Math. J., 32(1990), 82-94. [5] Charles Burnap, K. Bong Jung and Alan Lambert, Separating partial normality classes with composition operators, J. Operator theory, 53(2005), 381-397. [6] M. Embry Wardrop and A. Lambert, Measurable transformations and centred composition operators, Proc. Royal Irish acad, 90A(1990), 165-172.


56

S. Panayappan, N. Jayanthi and D. Sumathi

No. 3

[7] S. R. Foguel, Selected topics in the study of markov operators, Carolina Lectures Series No. 9, Dept. Math., UNC-CH, Chapel Hill, NC., 27514, 1980. [8] S. Panayappan, Non-hyponoraml weighted composition operators, Indian J. of pure. App. Maths, 27(1996), 979-983. [9] T. Veluchamy and S. Panayappan, Paranormal composition operators, Indian J. of pure and applied math, 24, 257-262. [10] C. S. Ryoo and P. Y. Sik, k*-paranormal operators, Pusan Kyongnam Math. J, 11(1995), No. 2, 243-248.


Scientia Magna Vol. 9 (2013), No. 3, 57-66

Difference cordial labeling of subdivided graphs R. Ponraj † , S. Sathish Narayanan

and R. Kala

]

† Department of Mathematics, Sri Paramakalyani College, Alwarkurichi-627412, India ‡ Department of Mathematics, Thiruvalluvar College, Papanasam-627425, India ] Department of Mathematics, Manonmaniam Sundaranar University, Tirunelveli-627012, India E-mail: ponrajmaths@gmail.com, sathishrvss@gmail.com, karthipyi91@yahoo.co.in Abstract Let G be a (p, q) graph. Let f be a map from V (G) to {1, 2, · · · , p}. For each edge xy, assign the label |f (x) − f (y)|. f is called a difference cordial labeling if f is a one to one map and |ef (0) − ef (1)| ≤ 1 where ef (1) and ef (0) denote the number of edges labeled with 1 and not labeled with 1 respectively. A graph with a difference cordial labeling is called a difference cordial graph. In this paper we investigate the difference cordial labeling behavior of subdivision of some graphs. Keywords Subdivision, web, wheel, book, corona. 2000 Mathematics Subject Classification: 05C78

§1. Introduction and preliminaries Let G = (V, E) be (p, q) graph. In this paper we have considered only simple and undirected graphs. The number of vertices of G is called the order of G and the number of edges of G is called the size G. The subdivision graph S (G) of a graph G is obtained by replacing each edge uv by a path uwv. The corona of G with H, G ¯ H is the graph obtained by taking one copy of G and p copies of H and joining the ith vertex of G with an edge to every vertex in the ith copy of H. Graph labelling plays an important role of numerous fields of sciences and some of them are astronomy, coding theory, x-ray crystallography, radar, circuit design, communication network addressing, database management, secret sharing schemes etc. [3] . The graph labeling problem was introduced by Rosa. In 1967 Rosa introduced Graceful labeling of graphs [13] . In 1980, Cahit [1] introduced the concept of Cordial labeling of graphs. Riskin [12] , Seoud and Abdel Maqusoud [14] , Diab [2] , Lee and Liu [5] , Vaidya, Ghodasara, Srivastav, and Kaneria [15] were worked in cordial labeling. Ponraj et al. introduced k-Product cordial labeling [10] , k-Total Product cordial labeling [11] recently. Motivated by the above work, R. Ponraj, S. Sathish Narayanan and R. Kala introduced difference cordial labeling of grpahs [6] . In [6, 7, 8, 9] difference cordial labeling behavior of several graphs like path, cycle, complete graph, complete bipartite graph, bistar, wheel, web, Bm ¯K1 , Tn ¯K2 and some more standard


58

R. Ponraj, S. Sathish Narayanan and R. Kala

No. 3

graphs have been investigated. In this paper, we investigate the difference cordial behaviour of S (K1,n ), S (K2,n ), S (Wn ), S (Pn ¯ K1 ), S (W (t, n)), S (Bm ), S (Bm,n ). Let x be any real number. Then the symbol bxc stands for the largest integer less than or equal to x and dxe stands for the smallest integer greater than or equal to x. Terms not defined here are used in the sense of Harary [4] .

§2. Definition and properties Definition 2.1. Let G be a (p, q) graph. Let f : V (G) → {1, 2, · · · , p} be a bijection. For each edge uv, assign the label |f (u) − f (v)|. f is called a difference cordial labelling if f is 1 − 1 and |ef (0) − ef (1)| ≤ 1 where ef (1) and ef (0) denote the number of edges labelled with 1 and not labelled with 1 respectively. A graph with a difference cordial labelling is called a difference cordial graph. Let G be a (p, q) graph. Let f : V (G) → {1, 2, · · · , p} be a bijection. For each edge uv, assign the label |f (u) − f (v)|. f is called a difference cordial labelling if f is 1 − 1 and |ef (0) − ef (1)| ≤ 1 where ef (1) and ef (0) denote the number of edges labelled with 1 and not labelled with 1 respectively. A graph with a difference cordial labelling is called a difference cordial graph. Theorem 2.1. S (K1,n ) is difference cordial. Proof. Let V (S (K1,n )) = {u}∪{ui , vi : 1 ≤ i ≤ n} and E (S (K1,n )) = {uui , ui vi : 1 ≤ i ≤ n}. Define a function f : V (S (K1,n )) → {1, 2, · · · , 2n + 1} by f (ui ) =

2i − 1,

1 ≤ i ≤ n;

f (vi ) =

2i,

1 ≤ i ≤ n,

and f (u) = 2n + 1. Since ef (0) = ef (1) = n, f is a difference cordial labelling of S (K1,n ). A difference cordial labelling of S (K1,8 ) is given in figure 1. 14 12

16 13 15 2

11

17

9

1

10

7

3

5 8

4 6 Figure 1 Theorem 2.2. S (K2,n ) is difference cordial. Proof.

Let V (S (K2,n )) = {u, v} ∪ {ui , vi , wi : 1 ≤ i ≤ n} and E (S (K2,n )) =


Vol. 9

Difference cordial labeling of subdivided graphs

59

{uvi , vi ui , vwi , wi ui : 1 ≤ i ≤ n}. Define f : V (S (K2,n )) → {1, 2, · · · , 3n + 2} by f (ui )

=

3i − 1,

1 ≤ i ≤ n;

f (vi )

= 3i − 2,

1 ≤ i ≤ n;

f (wi )

=

1 ≤ i ≤ n.

3i,

f (u) = 3n + 1 and f (v) = 3n + 2. Since ef (0) = ef (1) = 2n, f is a difference cordial labelling of S (K2,n ). Theorem 2.3. S (Wn ) is difference cordial. Let V (S (Wn )) = {u oi , wi , vi : 1 ≤ i ≤ n} ∪ {u} and E (S (Wn )) = n Proof. uvi , vi ui , ui wi , wi ui+1(mod n) : 1 ≤ i ≤ n . Define f : V (S (Wn )) → {1, 2, · · · , 3n + 1} by f (ui )

=

2i − 1,

1 ≤ i ≤ n;

f (wi )

=

2i,

1 ≤ i ≤ n;

f (vi )

=

2n + 1 + i,

1 ≤ i ≤ n,

and f (u) = 2n + 1. Since ef (0) = ef (1) = 2n, S (Wn ) is difference cordial. Subdivision of a Wheel S (w8 ) with a difference cordial labelling is shown in figure 2. 13

14

12 11

15 24

16

25

1

23

17

22

18

2

9

21

19 3

10

8

20 7

4

5

6

Figure 2 Theorem 2.4. Let G be a (p, q) graph and if S (G) is difference cordial. Then S (G ¯ mK1 ) is difference cordial. Proof. Let f be an difference cordial labelling ofo S (G). Let V (S (G)) = {ui : 1 ≤ i ≤ n}, V (S (G ¯ mK1 )) = vij , wij : 1 ≤ i ≤ m, 1 ≤ j ≤ p ∪ V (S (G)) and E (S (G ¯ mK1 )) = n o ui vij , vij wij : 1 ≤ i ≤ m, 1 ≤ j ≤ p ∪ E (S (G)). Define a 1-1 map g : V (S (G ¯ mK1 )) → {1, 2, · · · , (m + 2) p} by g (ui ) = f (ui ) , ³ ´ f vij = 2p + (2j − 2) m + 2i, ³ ´ f wij = 2p + (2j − 2) m + 2i − 1,

1 ≤ i ≤ 2p; 1 ≤ i ≤ m, 1 ≤ j ≤ p; 1 ≤ i ≤ m, 1 ≤ j ≤ p.

Obviously the above labelling g is a difference cordial labelling of S (G ¯ mK1 ). Theorem 2.5. S (Pn ¯ K1 ) is difference cordial.


60

R. Ponraj, S. Sathish Narayanan and R. Kala

No. 3

∪ 1 )) = V (Pn ¯ K1 ) o n 0 Proof. Let V o(Pn n¯ 0K1 ) = {ui , voi : 1 ≤ i ≤ n} and let V (Sn(Pn 0¯ K 0 ui : 1 ≤ i ≤ n − 1 ∪ vi : 1 ≤ i ≤ n and E (S (Pn ¯ K1 )) = ui ui , ui ui+1 : 1 ≤ i ≤ n − 1 n 0 0 o ∪ ui vi , vi vi : 1 ≤ i ≤ n . Define f : V (S (Pn ¯ K1 )) → {1, 2, · · · , 4n − 1} by f (ui ) = 2i − 1, ³ 0´ f ui = 2i, ³ 0 ´ f vn−i+1 = 2n − 1 + i, ³ 0 ´ f wn−i+1 = 3n − 1 + i,

1 ≤ i ≤ n; 1 ≤ i ≤ n − 1; 1 ≤ i ≤ n; 1 ≤ i ≤ n.

Since ef (0) = ef (1) = 2n − 1, S (Pn ¯ K1 ) is difference cordial. Theorem 2.6. S (Pn ¯ 2K1 ) is difference cordial. Proof. Let V (S (Pn ¯ 2K1 )) = {ui , vi , wi , xi , yi : 1 ≤ i ≤ n} ∪ {zi : 1 ≤ i ≤ n − 1} and E (S (Pn ¯ 2K1 )) = {ui vi , vi wi , ui xi , xi yi : 1 ≤ i ≤ n} ∪ {ui zi , zi ui+1 : 1 ≤ i ≤ n − 1}. Define f : V (S (Pn ¯ 2K1 )) → {1, 2, · · · , 6n − 1} by f (ui )

=

2i − 1,

1 ≤ i ≤ n;

f (zi )

=

2i,

1 ≤ i ≤ n − 1;

f (vn−i+1 )

=

2n + 2i − 2,

1 ≤ i ≤ n;

f (wn−i+1 )

=

2n + 2i − 1,

1 ≤ i ≤ n;

f (xi ) =

4n + i − 1,

1 ≤ i ≤ n;

f (yi ) =

5n + i − 1,

1 ≤ i ≤ n.

Since ef (0) = ef (1) = 3n − 1, f is a difference cordial labelling of S (Pn ¯ 2K1 ). The Lotus inside a circle LCn is a graph obtained from the cycle Cn : u1 u2 · · · un u1 and a star K1,n with central vertex v0 and the end vertices v1 v2 · · · vn by joining each vi to ui and ui+1 (mod n) . Theorem 2.7. S (LCn ) is difference cordial. Proof. Let the edges ui ui+1(mod n) , v0 vi , vi ui and vi ui+1(mod n) be subdivided by wi , xi , yi and zi respectively. Define a map f : V (S (LCn )) → {1, 2, · · · , 6n + 1} as follows: f (ui ) =

4i − 3,

1 ≤ i ≤ n;

f (vi )

=

4i − 1,

1 ≤ i ≤ n;

f (wi )

=

5n + 1 + i,

1 ≤ i ≤ n;

f (xi )

=

4n + 1 + i,

1 ≤ i ≤ n;

f (yi )

=

4i − 2,

1 ≤ i ≤ n;

f (zi )

=

4i,

1 ≤ i ≤ n,

and f (v0 ) = 4n + 1. Obviously, the above vertex labelling is a difference cordial labelling of S (LCn ). The graph Pn2 is obtained from the path Pn by adding edges that joins all vertices u and v with d (u, v) = 2.


Vol. 9

Difference cordial labeling of subdivided graphs

61

¡ ¢ Theorem 2.8. S Pn2 is difference cordial. ¡ ¡ ¢¢ Proof. Let V S Pn2 = {ui : 1 ≤ i ≤ n} ∪ {vi : 1 ≤ i ≤ n − 1} ∪ {wi : 1 ≤ i ≤ n − 2} ¡ ¡ 2 ¢¢ and E S Pn = {ui vi , vi ui+1 : 1 ≤ i ≤ n − 1} ∪ {ui wi , wi ui+2 : 1 ≤ i ≤ n − 2}. Define f : ¡ ¡ ¢¢ V S Pn2 → {1, 2, · · · , 3n − 3} by f (ui )

=

2i − 1,

1 ≤ i ≤ n − 1;

f (vi )

=

2i,

1 ≤ i ≤ n − 1;

f (wi )

=

2n − 1 + i,

2 ≤ i ≤ n − 2,

f (un ) = 2n and f (w1 ) = 2n − 1. Since ef (0) = ef (1) = 2n − 3, f is a difference cordial ¡ ¢ labelling of S Pn2 . Theorem 2.9. S (K2 + mK1 ) is difference cordial. Proof. Let V (S (K2 + mK1 )) = {u, v, w, ui , vi , wi : 1 ≤ i ≤ m} and E (S (K2 + mK1 )) = {uui , ui wi , wi vi , vi v : 1 ≤ i ≤ m} ∪ {uw, vw}. Define an injective map f : V (S (K2 + mK1 )) → {1, 2, · · · , 3n + 3} as follows: f (ui )

=

3i + 1,

1 ≤ i ≤ m;

f (vi )

=

3i + 3,

1 ≤ i ≤ m;

f (wi )

=

3i + 2,

2 ≤ i ≤ m,

f (u) = 1, f (v) = 2 and f (w) = 3. Since ef (0) = ef (1) = 2m + 1, f is a difference cordial labelling of S (K2 + mK1 ). A difference cordial labelling of S (K2 + 4K1 ) is given in figure 3. 14 11

13

8

10 7

12 9

5 4

1

15

6 3

2

Figure 3 The sunflower graph Sn is obtained by taking a wheel with central vertex v0 and the cycle Cn : v1 v2 · · · vn v1 and new vertices w1 w2 · · · wn where wi is joined by vertices vi , vi+1 (mod n) . Theorem 2.10. Subdivision of a sunflower graph S (Sn ) is difference cordial. n o 0 0 Proof. Let V (S (Sn )) = ui , ui , vi , wi , wi , xi , u : 1 ≤ i ≤ n and E (S (Sn )) = n 0 0 o 0 0 ui ui , ui ui+1(mod n) , uxi , xi ui , ui wi , wi vi , vi wi , wi ui+1(mod n) : 1 ≤ i ≤ n . Define f :


62

R. Ponraj, S. Sathish Narayanan and R. Kala

No. 3

V (S (Sn )) → {1, 2, · · · , 6n + 1} by f (ui ) = 4i − 3, ³ 0´ = 5n + 1 + i, f ui

1 ≤ i ≤ n;

f (wi ) =

4i − 2,

1 ≤ i ≤ n;

f (vi ) = 4i − 1, ³ 0´ f wi = 4i,

1 ≤ i ≤ n;

f (xi ) =

4n + 1 + i,

1 ≤ i ≤ n;

1 ≤ i ≤ n; 1 ≤ i ≤ n,

and f (u) = 4n + 1. Since ef (0) = ef (1) = 4n, S (Sn ) is difference cordial. The helm Hn is the graph obtained from a wheel by attaching a pendant edge at each vertex of the n-cycle. A flower F ln is the graph obtained from a helm by joining each pendant vertex to the central vertex of the helm. Theorem 2.11. Subdivision of graph of a flower graph S (F ln ) is difference cordial. ≤ n} ∪ {u} and E (S (F ln )) = n Proof. Let V (S (F ln )) = {ui , vi , wi , xi , yi , zi : 1 ≤ i o ui vi , vi ui+1(mod n) , uxi , xi ui , ui yi , yi wi , wi zi , zi u : 1 ≤ i ≤ n . Define f : V (S (F ln )) → {1, 2, · · · , 6n + 1} by f (ui ) =

5i − 1,

1 ≤ i ≤ n;

f (vi ) =

5n + i,

1 ≤ i ≤ n;

f (wi ) =

5i − 3,

1 ≤ i ≤ n;

f (xi ) =

5i,

1 ≤ i ≤ n;

f (yi ) =

5i − 2,

1 ≤ i ≤ n;

f (zi )

5i − 4,

1 ≤ i ≤ n,

=

and f (u) = 6n + 1. Since ef (0) = ef (1) = 4n, S (F ln ) is difference cordial. The book Bm is the graph Sm × P2 where Sm is the star with m + 1 vertices. Theorem 2.12. S (Bm ) is difference cordial. Proof. Let V (S (Bm )) = {u, v, w} ∪ {ui , vi , wi , xi , yi : 1 ≤ i ≤ m} and E (S (Bm )) = {uw, vw} ∪ {uxi , xi ui , ui wi , wi vi , vi yi , yi v : 1 ≤ i ≤ m}. Define a map f : V (S (Bm )) → {1, 2, · · · , 5m + 3} by f (ui ) =

4i,

1 ≤ i ≤ m;

f (wi ) =

4i + 1,

1 ≤ i ≤ m;

f (vi ) =

4i + 2,

1 ≤ i ≤ m;

f (yi ) =

4i + 3,

1 ≤ i ≤ m − 1;

f (xi ) =

4m + 2 + i,

1 ≤ i ≤ m,

f (u) = 1, f (w) = 2, f (v) = 3 and f (ym ) = 5m + 3. Since ef (0) = ef (1) = 3m + 1, S (Bm ) is difference cordial. Prisms are graphs of the form Cn × Pn . Theorem 2.13. S (Cn × P2 ) is difference cordial.


Vol. 9

Difference cordial labeling of subdivided graphs

63

n Proof. Let V (S (Cn × P2 )) = {ui , vi , wi , xi , yi : 1 ≤ i o≤ n} and E (S (Cn × P2 )) = Define a function f : ui xi , xi ui+1(mod n) , ui wi , wi vi , vi yi , yi vi+1(mod n) : 1 ≤ i ≤ n . V (S (Cn × P2 )) → {1, 2, · · · , 5n} by

f (ui )

=

2i − 1,

1 ≤ i ≤ n;

f (xi )

=

2i,

1 ≤ i ≤ n;

f (wi )

=

2n + 2i − 1,

1 ≤ i ≤ n;

f (vi )

=

2n + 2i,

1 ≤ i ≤ n;

f (yi )

=

4n + 1 + i,

1 ≤ i ≤ n − 1,

and f (yn ) = 4n+1. Since ef (0) = ef (1) = 3n, f is a difference cordial labelling of S (Cn × P2 ). The graph obtained by joining the centers of two stars K1,m and K1,n with an edge is called Bistar Bm,n . Theorem 2.14. S (Bm,n ) is difference cordial. Proof. Let V (S (Bm,n )) = {u, v, w} ∪ {ui , xi : 1 ≤ i ≤ m} ∪ {vi , yi : 1 ≤ i ≤ n} and E (S (Bm,n )) = {uw, wv} ∪ {uxi , xi ui : 1 ≤ i ≤ m} ∪ {vyi , yi vi : 1 ≤ i ≤ n}. Define an injective map f : V (S (Bm,n )) → {1, 2, · · · , 2m + 2n + 3} by

f (ui ) =

2i,

1 ≤ i ≤ m;

f (vi ) =

2m + 2i,

1 ≤ i ≤ n;

f (xi ) =

2i − 1,

1 ≤ i ≤ m;

f (yi ) =

2m + 2i − 1,

1 ≤ i ≤ n.

f (u) = 2m + 2n + 3, f (v) = 2m + 2n + 2 and f (w) = 2m + 2n + 1. Clearly the above vertex labelling is a difference cordial labelling of S (Bm,n ). The graph K2 × K2 × · · · × K2 (n copies) is called a n-cube. Theorem 2.15. Subdivision of a n-cube is difference cordial. Proof. Let G = K2 × K2 × · · · × K2 (n copies). Let the edges ui ui+1 , vi vi+1 , xi xi+1 , 0 0 0 0 0 0 wi wi+1 , ui vi , vi xi , xi wi and wi ui be subdivided by ui , vi , xi , wi , yi , yi , zi and zi respectively.


64

R. Ponraj, S. Sathish Narayanan and R. Kala

No. 3

Define f : V (S (G)) → {1, 2, · · · , 12n − 16} by f (ui ) = 5n + 5i − 14, ³ 0´ f ui = 5n + 5i − 10,

3 ≤ i ≤ n − 1;

f (vi ) = 5n + 5i − 12, ³ 0´ = 5n + 5i − 6, f vi

3 ≤ i ≤ n − 1;

2 ≤ i ≤ n − 2; 2 ≤ i ≤ n − 2;

f (xi ) = 5i − 4, ³ 0´ f xi = 5i + 2,

3 ≤ i ≤ n − 1;

f (wi ) = 5i − 6, ³ 0´ f wi = 5i − 2,

3 ≤ i ≤ n − 1;

f (yi ) = 5n + 5i − 13, ³ 0´ f yi = 10n − 16 + i,

3 ≤ i ≤ n − 1;

f (zi ) = 5i − 5, ³ 0´ f zi = 11n − 17 + i,

3 ≤ i ≤ n − 1;

2 ≤ i ≤ n − 2; 2 ≤ i ≤ n − 2; 1 ≤ i ≤ n − 1; 1 ≤ i ≤ n − 1.

³ 0´ ³ 0´ f (u1 ) = 5n−7, f (u2 ) = 5n−5, f u1 = 5n−6, f (v1 ) = 5n−1, f (v2 ) = 5n−3, f v1 = 5n−2, ³ 0´ ³ 0´ f (x1 ) = 7, f (x2 ) = 5, f x1 = 6, f (w1 ) = 1, f (w2 ) = 3, f w1 = 2, f (y1 ) = 12n − 17, f (y2 ) = 5n − 4, f (z1 ) = 12n − 16 and f (z2 ) = 4. Since ef (0) = ef (1) = 8n − 12, f is a difference cordial labelling of S (G). Jelly fish graphs J (m, n) are obtained from a cycle C4 : v1 v2 v3 v4 v1 by joining v1 and v3 with an edge and appending m pendant edges to v2 and n pendant edges to v4 . Theorem 2.16. S (J (m, n)) is difference cordial. Proof. Let the edges v1 v2 , v2 v3 , v3 v4 , v4 v1 , v1 v3 be subdivided by u, v, w, x, y respectively 0 0 and the edges v2 ui (1 ≤ i ≤ m) and v4 wj (1 ≤ j ≤ n) be subdivided by ui and wj respectively. Define a one-to-one map f : V (S (J (m, n))) → {1, 2, · · · , 2m + 2n + 9} by f (v1 ) = 2, f (v2 ) = 7, f (v3 ) = 5, f (v4 ) = 8, f (u) = 3, f (v) = 6, f (w) = 4, f (x) = 1, f (y) = 9, f (ui ) = 2i + 8, ³ 0´ f ui = 2i + 9,

1 ≤ i ≤ m;

f (wi ) = 2m + 2i + 8, ³ 0´ f wi = 2m + 2i + 9,

1 ≤ i ≤ n;

1 ≤ i ≤ m; 1 ≤ i ≤ n.

Clearly ef (0) = ef (1) = m + n + 5. It follows that, f is a difference cordial labelling of S (J (m, n)). The helm Hn is obtained from a wheel Wn by attaching a pendent edge at each vertex of the cycle Cn. Koh et al. [3] Define a web graph. A web graph is obtained by joining the pendant points of the helm to form a cycle and then adding a single pendant edge to each vertex of this outer cycle. Yang [3] has extended the notion of a web by iterating the process of adding pendant points and joining them to form a cycle and then adding pendent point to the new cycle. W (t, n) is the generalized web with t cycles Cn . Theorem 2.17. S (W (t, n)) is difference cordial.


Vol. 9

65

Difference cordial labeling of subdivided graphs

³ ´ t S (i) (i) Proof. Let Cn be the cycle ui1 , ui2 . . . uin ui1 . Let V (W (t, n)) = V Cn ∪{zi : 1 ≤ i ≤ n} i=1 n o n o ∪ {u} and V (S (W (t, n))) = vij : 1 ≤ i ≤ n, 1 ≤ j ≤ t ∪ wij : 1 ≤ i ≤ n, 1 ≤ j ≤ t + 1 ∪ o n ∪ uji vij , vij uji+1 : 1 ≤ i ≤ n − 1, 1 ≤ j ≤ t V (W (t, n)) and E (S (W (t, n))) = o n o n © ª j : 1 ≤ j ≤ t, 1 ≤ i ≤ n ∪ ujn vnj , vnj uj1 : 1 ≤ j ≤ t ∪ uwi1 : 1 ≤ i ≤ n ∪ wij uji , uji wi+1 © t+1 ª wi zi : 1 ≤ i ≤ n . Define a map f : V (S (W (t, n))) → {1, 2, · · · , 3nt + 2n + 1} as follows: ³ ´ f w1j ³ ´ f wij ³ ´ f uji ³ ´ f zij ³ ´ f v1j ³ ´ f vij

=

2j − 1, ¡ t ¢ = f wi−1 + 2j, ³ ´ = f wij + 1, ¡ ¢ = f wit+1 + 1,

1 ≤ j ≤ t + 1;

= n (2t + 2) + j, ¡ t ¢ = f vi−1 + j,

1 ≤ j ≤ t + 1;

1 ≤ j ≤ t, 2 ≤ i ≤ n; 1 ≤ j ≤ t, 2 ≤ i ≤ n; 1 ≤ i ≤ n;

1 ≤ j ≤ t + 1, 2 ≤ i ≤ n,

and f (u) = 3nt + 2n + 1. Since ef (0) = ef (1) = n (2t + 1), f is a difference cordial labelling of S (W (t, n)). A Young tableau Ym,n is a sub graph of Pm × Pn obtained by retaining the first two rows of Pm × Pn and deleting the vertices from the right hand end of other rows in such a way that the lengths of the successive rows form a non increasing sequence. Let V (Pm × Pn ) = {ui,j : 1 ≤ i ≤ m, 1 ≤ j ≤ n} and E (Pm × Pn ) = {ui,j ui, j + 1 : 1 ≤ i ≤ m, 1 ≤ j ≤ n − 1} ∪ {ui,j ui+1,j : 1 ≤ i ≤ m − 1, 1 ≤ j ≤ n}. Theorem 2.18. S (Yn,n ) is difference cordial. Proof. Let Yn,n be a young tableau graph obtained from the grid Pn × Pn . Let the 2 edges ui,j ui+1,j be subdivided by wi,j . The order and size of nS (Yn,n ) are 3n +5n−6 and 2o 2 (n − 1) (n + 2) respectively. Define a map f : V (S (Yn,n )) → lows:

1, 2, · · · , 3n

f (u1,j )

=

2j − 1,

1 ≤ j ≤ n;

f (v1,j )

=

2j,

1 ≤ j ≤ n − 1;

f (w1,j )

2

= n − 2n − 2 + j,

2

+5n−6 2

as fol-

1 ≤ j ≤ n.

f (u2,j ) =

2n + 2j − 2,

1 ≤ j ≤ n;

f (v2,j ) =

2n + 2j − 1,

1 ≤ j ≤ n − 1;

f (ui,j ) =

f (ui−1,n−i+3 ) + 2j − 1,

3 ≤ i ≤ n, 1 ≤ j ≤ n − i + 2;

f (vi,j ) =

f (ui,j ) + 1,

3 ≤ i ≤ n, 1 ≤ j ≤ n − i + 2;

f (wi,j ) =

f (wi−1,n−i+2 ) + j,

2 ≤ i ≤ n − 1, 1 ≤ j ≤ n − i + 1.

Since ef (0) = ef (1) = (n − 1) (n + 2), f is a difference cordial labelling of S (Yn,n ).


66

R. Ponraj, S. Sathish Narayanan and R. Kala

No. 3

References [1] I. Cahit, Cordial graphs: a weaker version of graceful and harmonious graphs, Ars combin., 23(1987), 201-207. [2] A. Diab, Study of some problems of cordial graphs, Ars Combin., 92(2009), 255-261. [3] J. A. Gallian, A Dynamic survey of graph labelling, The Electronic Journal of Combinatorics, 18(2012), 6. [4] F. Harary, Graph theory, Addision wesley, New Delhi, (1969). [5] S. M. Lee and A. Liu, A construction of cordial graphs from smaller cordial graphs, Ars Combin., 32(1991), 209-214. [6] R. Ponraj, S. Sathish Narayanan and R. Kala, Difference cordial labeling of graphs, Global Journal of Mathematical Sciences: Theory and Practical, 5(2013), 185-196. [7] R. Ponraj and S. Sathish Narayanan, Further Results on Difference cordial labeling of corona graphs, The Journal of The Indian Academy of Mathematics, 35(2013). [8] R. Ponraj, S. Sathish Narayanan and R. Kala, Difference cordial labeling of graphs obtained from double snakes, International Journal of Mathematics Research, 5(2013), 317322. [9] R. Ponraj and S. Sathish Narayanan, Difference cordiality of some graphs obtained from double alternate snake graphs, Global Journal of Mathematical Research: Theory and Practical, 5(2013), 167-175. [10] R. Ponraj, M. Sivakuamr and M. Sundaram, k-Product cordial labeling of graphs, Int. J. Contemp. Math. Sciences, 7(2012), 733 -742. [11] R. Ronraj, M.Sivakumar, M.Sundaram, k-Total product cordial labelings of graphs, Applications and Applied Mathematics, 7(2012), 708-716. [12] A. Riskin, Cordial deficiency, Bull. Malays. Math. Sci. Soc., 30(2007), 201-204. [13] A. Rosa, On certain valuations of the vertices of a graph, Theory of Graphs (Internat. Symposium, Rome, July 1966), Gordon and Breach, N. Y. and Dunod Paris (1967), 349-355. [14] M. A. Seoud and A. E. I. Abdel Maqsoud, On cordial and balanced labellings of graphs, J. Egyptian Math. Soc., 7(1999), 127-135. [15] S. K. Vaidya, G. Ghodasara, S. Srivastav, and V. Kaneria, Cordial labelling for two cycle related graphs, Math. Student, 76(2007), 237-246.


Scientia Magna Vol. 9(2013), No. 3, 67-72

On right circulant matrices with trigonometric sequences A. C. F. Bueno Department of Mathematics and Physics, Central Luzon State University, Science City of Mu˜ noz 3120, Nueva Ecija, Philippines Email: aldouz− cezar@yahoo.com Abstract In this paper, the eigenvalues and the upper bounds for spectral norm and Euclidean norm of right circulant matrices with sine and cosine sequences were derived. Keywords Circulant matrix, sine and cosine sequences.

§1. Introduction and preliminaries In [1] and [2] the formulae for the determinant, eigenvalues, Euclidean norm, spectral norm and inverse of the right circulant matrices with arithmetic and geometric sequences were derived. The said right circulant matrices are as follows: 

RCIRCn (~g )

~ RCIRCn (d)

a

  arn−1    arn−2  =  ..  .    ar2  ar      =     

ar

ar2

···

arn−2

a

ar

···

arn−3

arn−1 .. .

a .. .

··· .. .

arn−4 .. .

ar3

ar4

···

a

ar2

ar3

···

arn−1

arn−1

 arn−2    n−3  ar  , ..  .   ar   a

a

a+d

a + 2d

···

a + (n − 2)d

a + (n − 1)d

a + (n − 1)d

ad

a+d

···

a + (n − 3)d

a + (n − 2)d

a + (n − 2)d .. .

a + (n − 1)d .. .

a .. .

··· .. .

a + (n − 4)d .. .

a + (n − 3)d .. .

a + 2d

a + 3d

a + 4d

···

a

a+d

a+d

a + 2d

a + 3d

···

a + (n − 1)d

a

with circulant vectors ~g = (a, ar, ar2 , · · · , arn−2 , arn−1 ), d~ = (a, a + d, a + 2d, · · · , a + (n − 2)d, a + (n − 1)d). The followings are basic identities on sine and cosine:

     ,    


68

A. C. F. Bueno

No. 3

1. sin2 x + cos2 x = 1, 2. sin2 2x =

1−cos2 2x , 2 2

2x 3. cos2 2x = 1+cos . 2 The following are identities regarding sin kx and cos kx that will be used later:

4. sin kx = 2 cos x sin (k − 1)x − sin (k − 2)x, 5. cos kx = 2 cos x cos (k − 1)x − cos (k − 2)x, 6. 7.

Pn k=0

Pn k=0

sin kx = cos kx =

sin( 12 nx) sin[ 12 (n+1)x] sin( 12 x)

,

cos( 12 nx) sin[ 12 (n+1)x] sin( 12 x)

.

Definition 1.1. Let the following be the circulant vectors of the right matrices RCIRCn (~s), RCIRCn (~c), RCIRCn (~t) and RCIRCn (~h): ~s = (0, sin θ, sin 2θ, · · · , sin (n − 1)θ),

(1)

~c = (1, cos θ, cos 2θ, · · · , cos (n − 1)θ),

(2)

~t = (0, sin θ, sin 2θ, · · · , sin (n − 1)θ), ~h = (1, cos2 θ, cos2 2θ, · · · , cos2 (n − 1)θ).

(3)

2

2

2

(4)

Definition 1.2. Let σm , γm , τm and δm be the eigenvalues of RCIRCn (~s), RCIRCn (~c), RCIRCn (~t) and RCIRCn (~h), respectively. Definition 1.3. Let A be an n × n matrix then the Euclidean norm and spectral norm of A is denoted by ||A||E and ||A||2 , respectivley. These two are given by kAkE

v uX u m,n 2 = t aij , i,j=0

kAk2

= max {|λm |} ; where λm is an eigenvalue of A.

Lemma 1.1. n−1 X

ω −mk = 0, where ω = e2πi/n .

k=0

Proof. n−1 X

ω −mk

=

1 − ω −mkn 1 − ω −mk

=

1 − e2πik 1 − ω −mk 0.

k=0

=


Vol. 9

On right circulant matrices with trigonometric sequences

§2. Main results Theorem 2.1. The eigenvalues of RCIRCn (~s) are σ0

=

σm

=

sin

¡1

2 nθ

n−1 X

¢

£ ¤ sin 12 (n + 1)θ ¡1 ¢ , sin 2 θ

[2 cos θ sin (k − 1)θ − sin (k − 2)θ] ω −mk ,

k=0

where m = 1, 2, · · · , n − 1 and ω = e2πi/n . Proof. For m = 0, σ0

n−1 X

=

k=0

sin

=

sin kθ

¡1

2 nθ

¢

£ ¤ sin 12 (n + 1)θ ¡ ¢ . sin 12 θ

For m 6= 0, σm

=

n−1 X

[sin kθ] ω −mk

k=0

=

n−1 X

[2 cos θ sin (k − 1)θ − sin (k − 2)θ] ω −mk .

k=0

Theorem 2.2. The eigenvalues of RCIRCn (~s) are the following: γ0

=

γm

=

cos n−1 X

¡1

£ ¤ sin 12 (n + 1)θ ¡1 ¢ , sin 2 θ

2 nθ

¢

[2 cos θ cos (k − 1)θ − cos (k − 2)θ] ω −mk .

k=0

Proof. For m = 0, γ0

=

n−1 X k=0

=

cos

cos kθ ¡1

£ ¤ sin 12 (n + 1)θ ¡ ¢ . sin 21 θ

2 nθ

¢

For m 6= 0, γm

=

n−1 X

[cos kθ] ω −mk

k=0

=

n−1 X k=0

[2 cos θ cos (k − 1)θ − cos (k − 2)θ] ω −mk .

69


70

A. C. F. Bueno

Theorem 2.3. The eigenvalues of RCIRCn (~t) are the following:

τ0 τm

n sin θ − 2 cos [(n − 1)θ] sin nθ , 2 sin θ n−1 X = {cos [2(k − 2)θ] − cos 2θ cos [2(k − 1)θ]} ω −mk .

=

k=0

Proof. For m = 0,

τ0

=

n−1 X

sin2 kθ

k=0

=

n−1 X k=0

1 − cos 2kθ 2 n−1

=

n X − cos 2kθ 2

=

n sin θ − 2 cos [(n − 1)θ] sin nθ . 2 sin θ

k=0

For m 6= 0,

τm

=

n−1 X

£ 2 ¤ −mk sin kθ ω

k=0

=

n−1 X k=0

=

1 − cos 2kθ −mk ω 2

n−1 n−1 1 X −mk X [cos 2kθ] ω −mk ω − 2 k=0

=

n−1 X

k=0

{cos [2(k − 2)θ] − cos 2θ cos [2(k − 1)θ]} ω −mk .

k=0

via lemma 1.4 and identity 5. Theorem 2.4. The eigenvalues of RCIRCn (~h) are the following:

δ0 δm

n sin θ + 2 cos [(n − 1)θ] sin nθ , 2 sin θ n−1 X = {cos 2θ cos [2(k − 1)θ] − cos [2(k − 2)θ]} ω −mk . =

k=0

No. 3


Vol. 9

On right circulant matrices with trigonometric sequences

For m = 0, τ0

=

n−1 X

cos2 kθ

k=0

=

n−1 X k=0

1 + cos 2kθ 2 n−1

=

n X + cos 2kθ 2

=

n sin θ + 2 cos [(n − 1)θ] sin nθ . 2 sin θ

k=0

For m 6= 0, τm

=

n−1 X

£ 2 ¤ −mk cos kθ ω

k=0

=

n−1 X k=0

=

1 + cos 2kθ −mk ω 2

n−1 n−1 1 X −mk X [cos 2kθ] ω −mk ω + 2 k=0

=

n−1 X

k=0

{cos 2θ cos [2(k − 1)θ] − cos [2(k − 2)θ]} ω −mk .

k=0

via lemma 1.4 and identity 5. ° ° Theorem 2.5. kRCIRCn (~s)k2 ≤ n − 1 and °RCIRCn (~t)°2 ≤ n − 1. Proof. Let RCIRCn (~ p) = RCIRCn (~s) or RCIRCn (~t) and µm = σm or τm . kRCIRCn (~ p)k2

= max {|µm |} ¯ ¯ ¯n−1 ¯ ¯X ¯ = ¯ pk ω −mk ¯ ¯ ¯ k=0

n−1 X

|pk |.

k=0

Note that | sin kθ|, | sin2 kθ| ∈ [0, 1], so the°theorem follows. ° ° ° Theorem 2.6. kRCIRCn (~c)k2 ≤ n and °RCIRCn (~h)° ≤ n. 2

Proof. Let RCIRCn (~q) = RCIRCn (~c) or RCIRCn (~h) and φm = γm or δm . kRCIRCn (~q)k2

= max {|φm |} ¯ ¯n−1 ¯ ¯X ¯ ¯ = ¯ qk ω −mk ¯ ¯ ¯ k=0

n−1 X k=0

|qk |.

71


72

A. C. F. Bueno

No. 3

Note that | cos kθ|, | cos2 kθ| ∈ [0, 1], so the theorem follows. p p ° ° Theorem 2.7. kRCIRCn (~s)kE ≤ n(n − 1) and °RCIRCn (~t)°E ≤ n(n − 1). Proof. Let RCIRCn (~ p) = RCIRCn (~s) or RCIRCn (~t), v u n−1 u X kRCIRCn (~ p)kE = tn p2k k=0

v u n−1 u X ≤ tn p2k k=1

p

n(n − 1). ≤ ° ° ° ° Theorem 2.8. kRCIRCn (~c)kE ≤ n and °RCIRCn (~h)° ≤ n. E Proof. Let RCIRCn (~q) = RCIRCn (~c) or RCIRCn (~h), v u n−1 u X kRCIRCn (~q)kE = tn qk2 k=0

v u n−1 u X 1 ≤ tn =

k=0

n2

= n.

References [1] M. Bahsi and S. Solak, On the circulant matrices with arithmetic sequence, Int. J. Contemp. Math. Sciences, 5(2010), No. 25, 1213-1222. [2] A. C. F. Bueno, ”Right circulant matrices with geometric progression”, International Journal of Applied Mathematical Research, Vol. 1, No. 4, 593-603. [3] www.wolfram.mathworld.com/Cosine.html. [4] www.wolfram.mathworld.com/Sine.html.


Scientia Magna Vol. 9 (2013), No. 3, 73-84

Some theta identities and their implications1 Hai-Long Li

and Qian-Li Yang

Department of Mathematics, Weinan Teachers University, Weinan City, Shaanxi Province. E-mails: lihailong@wntc.edu.cn, darren2004@126.com Abstract In this paper we establish an identity involving logarithmic derivative of theta function by the theory of elliptic functions. Using these identities we re-deduced some Ramanujan’s modular identities from elementary approach, and also found many other new interesting identities. Keywords Theta function, elliptic function, logarithmic derivative. 2000 Mathematics Subject Classification: Primary 26A48, 33B15; Secondary 26A51, 26D07, 26D10

§1. Introduction Assume throughout this paper that q = eπiτ , where =τ > 0. As usual, the classical Jacobi theta functions are defined as follows, ∞ X

1

θ1 (z|τ ) = −iq 4

(−1)n q n(n+1) e(2n+1)iz

n=−∞ 1

= 2q 4

n=0 ∞ X

1

θ2 (z|τ ) = q 4

= 2q

∞ X

(−1)n q n(n+1) sin(2n + 1)z,

(1)

(−1)n q n(n+1) e(2n+1)iz

n=−∞ ∞ X

1 4

(−1)n q n(n+1) cos(2n + 1)z,

(2)

n=0

θ3 (z|τ ) = θ4 (z|τ ) =

∞ X

2

q n e2nzi = 1 + 2

n=−∞ ∞ X

∞ X

2

q n cos 2nz,

(3)

n=1 2

(−1)n q n e2nzi = 1 + 2

n=−∞

∞ X

2

(−1)n q n cos 2nz.

n=1

The q− shifed factorial is defined by (a; q)∞ =

∞ Y

(1 − aq n ),

n=0 1 The

author was supported partially by the Science Foundation of Shaanxi province

(4)


74

Hai-Long Li and Qian-Li Yang

No. 3

and sometimes is written as (a1 , a2 , · · · , am ; q)∞ = (a1 ; q)∞ (a2 ; q)∞ · · · (am ; q) With above notation, the celebrated Jacobi triple product identity can be expressed as follow ∞ X

(−1)n q n(n−1)/2 z n = (q; q)∞ (z; q)∞ (q/z; q)∞ .

(5)

n=−∞

Employing the Jacobi triple product identity, we can derive the infinite product expressions for theta function. Proposition 1.1(Infinite product representations for theta functions) 1

θ1 (z|τ ) = 2q 4 sinz(q 2 ; q 2 )∞ (q 2 e2iz ; q 2 )∞ (q 2 e−2iz ; q 2 )∞ , 1 4

2

2

2 2iz

θ2 (z|τ ) = 2q (q ; q )∞ (−q e 2

2

2 −2iz

; q )∞ (−q e

2

; q )∞ ,

(6) (7) (8)

θ4 (z|τ ) = (q 2 ; q 2 )∞ (qe2iz ; q 2 )∞ (qe−2iz ; q 2 )∞ .

(9)

; q )∞ (−qe

−2iz

2

2

θ3 (z|τ ) = (q ; q )∞ (−qe

2iz

2

; q )∞ ,

When there is no confusion, we will use θi (z) for θi (z|τ ), θi0 for θi0 (z|τ ) to denote the partial derivative with respect to the variable z, and θi for θi (0|τ ), i = 1, 2, 3, 4. From the above equations, the following facts are obvious 1

θ10 = 2q 4 1

θ2 = q 4

∞ X

1

(−1)n (2n + 1)q n(n+1) = 2q 4 (q 2 ; q 2 )3∞ ,

n=0 ∞ X

1

q n(n+1) = 2q 4 (q 2 ; q 2 )∞ (−q 2 ; q 2 )2∞ ,

n=−∞

θ3 = θ4 =

∞ X

2

q n = (q 2 ; q 2 )∞ (q; q 2 )2∞ ,

n=−∞ ∞ X

(10)

2

(−1)n q n = (q 2 ; q 2 )∞ (−q; q 2 )2∞ .

n=−∞

With respect to the (quasi) period π and πτ , Jacobi theta functions θi , i = 1, 2, 3, 4, satisfy the following relations θ1 (z + π|τ ) = −θ1 (z|τ ),

θ1 (z + πτ |τ ) = −q −1 e−2iz θ1 (z|τ ),

θ2 (z + π|τ ) = −θ2 (z|τ ),

θ2 (z + πτ |τ ) = q −1 e−2iz θ2 (z|τ ),

θ3 (z + π|τ ) = θ3 (z|τ ), θ4 (z + π|τ ) = θ4 (z|τ ),

θ3 (z + πτ |τ ) = q −1 e−2iz θ3 (z|τ ), θ4 (z + πτ |τ ) = −q

−1 −2iz

e

θ4 (z|τ ).,

(11)


Vol. 9

Some theta identities and their implications

75

and π π |τ ) = θ2 (z|τ ), θ2 (z + |τ ) = −θ1 (z|τ ), 2 2 π π θ3 (z + |τ ) = θ4 (z|τ ), θ4 (z + |τ ) = θ3 (z|τ ), 2 2 πτ πτ θ1 (z + |τ ) = iM θ4 (z|τ ), θ2 (z + |τ ) = M θ3 (z|τ ), 2 2 πτ πτ |τ ) = M θ2 (z|τ ), θ4 (z + |τ ) = iM θ1 (z|τ ), θ3 (z + 2 2 πτ + π πτ + π θ1 (z + |τ ) = M θ3 (z|τ ), θ2 (z + |τ ) = −iM θ4 (z|τ ), 2 2 πτ + π πτ + π θ3 (z + |τ ) = iM θ1 (z|τ ), θ4 (z + |τ ) = M θ2 (z|τ ), 2 2 θ1 (z +

(12)

where M = q −1/4 e−iz . The following trigonometric series expressions for the logarithmic derivative with respect to z of Jacobi Theta functions will be very useful in this paper,

∞ X q 2n θ10 (z|τ ) = cot z + 4 sin 2nz, θ1 1 − q 2n n=1 ∞ X θ20 q2 n sin 2nz, (z|τ ) = − tan z + 4 (−1)n θ2 1 − q 2n n=1 ∞ X θ30 qn sin 2nz, (z|τ ) = 4 (−1)n θ3 1 − q 2n n=1

(13)

∞ X qn θ40 (z|τ ) = 4 sin 2nz. θ4 1 − q 2n n=1

One may prove the Jacobi imaginary transformation formulas of the the theta functions employing the Poisson summation formula [?, pp.7-11] √ Lemma 1.1. If z is complex, =z > 0, and −iτ = 1 for τ = i, then we have µ

z |− τ µ z θ2 |− τ µ z θ3 |− τ µ z θ4 |− τ

θ1

¶ √ 2 1 = −i −iτ eiz /(πτ ) θ1 (z|τ ), τ ¶ √ 2 1 = −iτ eiz /(πτ ) θ4 (z|τ ), τ ¶ √ 2 1 = −iτ eiz /(πτ ) θ3 (z|τ ), τ ¶ √ 2 1 = −iτ eiz /(πτ ) θ2 (z|τ ). τ

(14)


76

Hai-Long Li and Qian-Li Yang

No. 3

In particular, by setting z = 0 in above formulas we find that ¶ µ √ 1 θ10 − = −iτ −iτ θ10 (τ ) τ µ ¶ √ 1 = −iτ θ4 (τ ) θ2 − τ µ ¶ √ 1 = −iτ θ2 (τ ) θ3 − τ µ ¶ √ 1 θ4 − = −iτ θ3 (τ ) τ

(15)

Suppose that E2k (τ ) is the normalized Eisenstein series of weight 2k defined as E2k = 1 −

∞ 4k X n2k−1 q 2n B2k n=1 1 − q 2n

where B2k is Bernoulli numbers defined as the coefficients in the power series ∞

X z zk = B k ez − 1 k! k−0

And it is easy to show that B2k+1 = 0 for k ≥ 1, and the first few nonzero values of Bk are θ0 1 1 given by B0 = 1, B1 = − 21 , B2 = 16 , B4 = − 30 , B6 = 42 . Then near z = 0, θ11 (z|τ ) has the Laurent expansion formula ∞

X θ10 22k B2k E2k (τ )z 2k−1 . (z|τ ) = (−1)k θ1 (2k)! k=0

Let σk (n) denote the sum of the kth powers of divisors of n, namely, σk (n) = Then the first three Eisenstein series E2k are given by E2 = 1 − 24

P d|n

dk .

∞ X nq 2n 1 − q 2n n=1

E4 = 1 + 240

∞ X n3 q 2n 1 − q 2n n=1

E6 = 1 − 504

∞ X n5 q 2n 1 − q 2n n=1

(16)

Theorem 1.1. The sum of all the residues of an elliptic function in the period parallelogram is zero.

§2. Main theorem and proofs Theorem 2.1. For x, y, θ40 θ0 θ0 θ1 (x)θ1 (y)θ1 (x + y) (x) + 4 (y) − 4 (x + y) = θ2 θ3 . θ4 θ4 θ4 θ4 (x)θ4 (y)θ4 (x + y)

(17)


Vol. 9

77

Some theta identities and their implications

Proof. We consider the following function f (z) =

θ4 (z + x)θ4 (z + y)θ4 (z − x − y) , θ12 (z)θ4 (z)

by the definition of θi (z|τ ), we can readily verify that f (z) is an elliptic function with periods πτ π and πτ . The only poles of f (z) are 0 and πτ 2 . Furthermore, 2 is its simple pole and 0 is its pole with order two. By virtue of the residue theorem of elliptic functions, we have Res(f ;

πτ ) + Res(f ; 0) = 0. 2

(18)

And applying relation of θ1 and θ4 in (12) and L’Hopital’ rules, we can obtain Res(f ;

πτ πτ ) = lim (z − )f (z) πτ z→ 2 2 2 (z − πτ 2 )θ4 (z + x)θ4 (z + y)θ4 (z − x − y) = lim πτ z→ 2 θ12 (z)θ4 (z) (iB)3 θ1 (x)θ1 (y)θ1 (x + y) 2 πτ θ40 ( πτ 2 )θ1 ( 2 ) θ1 (x)θ1 (y)θ1 (x + y) =− . θ10 (0)θ42 (0) =

(19)

Next we compute Res(f ; 0), d 2 (z f (z)) dz · ¸ 2 f0 = lim z 2 f (z) + (z) z→0 z f · 2 θ0 θ0 θ0 = lim z 2 f (z) + 4 (z + x) + 4 (z + y) + 4 (z − x − y) z→0 z θ4 θ4 θ4 ¸ 0 0 θ θ − 2 1 (z) − 4 (z) θ1 θ4 ¸ · θ40 θ40 θ4 (x)θ4 (y)θ4 (x + y) θ40 (x) + (y) − (x + y) . = θ102 (0)θ4 (0) θ4 θ4 θ4

Res(f ; 0) = lim

z→0

(20)

From theorem 1.1, substituting (19) and (20) into (18), by performing a little reduction we can complete the proof of theorem. Corollary 2.1. µ 0 ¶0 µ 0 ¶0 θ4 θ4 θ1 (x + y)θ1 (x − y) (y) − (x) = (θ10 )2 . (21) θ4 θ4 θ42 (x)θ42 (y) Proof. We differentiate (17) with respect to y, and then set y = 0, then µ

θ40 θ4

µ

¶0 (0) −

θ40 θ4

µ

¶0 (x) = (θ2 θ3 )2

θ1 (x) θ4 (x)

¶2 .

(22)

Now we combine with another elementary identity [7, p.467], θ12 (x)θ42 (y) − θ12 (y)θ42 (x) = θ42 θ1 (x + y)θ1 (x − y).

(23)


78

Hai-Long Li and Qian-Li Yang

No. 3

From (22) and (23), we can obtain µ 0 ¶0 µ 0 ¶0 ·µ ¶2 µ ¶2 ¸ θ4 θ4 θ1 (x) θ1 (y) 2 (y) − (x) = (θ2 θ3 ) − θ4 θ4 θ4 (x) θ4 (y) 2 2 2 θ (x)θ4 (y) − θ1 (y)θ42 (x) = (θ2 θ3 )2 1 θ42 (x)θ42 (y) θ1 (x + y)θ1 (x − y) . = (θ10 )2 θ42 (x)θ42 (y) This completes the proof of corollary 2.1. Remark. The identity (21) is often written in terms of the Weierstrass elliptic and sigma functions as [7, p.451], σ(x + y)σ(x − y) ℘(y) − ℘(x) = . σ 2 (x)σ 2 (y) Theorem 2.2. (Ramanujan’s modular identity) ∞ X

∞ Y q 5n+1 q 5n+2 q 5n+3 q 5n+4 (1 − 55n )5 − − + = q . 5n+1 2 5n+2 2 5n+3 2 5n+4 2 (1 − q ) (1 − q ) (1 − q ) (1 − q ) 1 − qn n=0 n=1

Proof. We recall (13) for µ

θ40 θ4

(24)

θ40 θ4 (z|τ ),then

¶0 (z|τ ) = 8

∞ X

cos 2nz = 4

n=1

∞ X nq n (e2inz + e−2inz ) , 1 − q 2n n=1

(25)

πτ in (21), we replace τ by 52 τ , and choose y = 3πτ 4 and x = 4 , using the Jacobi triple product identities for the theta functions. We can see that ¶ µ ¶ ¶ µ ¶ µ µ 1 3πτ 5τ πτ 5τ 5τ πτ 5τ | θ4 | = −q 4 θ1 | θ1 πτ | θ4 4 2 4 2 2 2 2 µ ¶ µ ¶ ∞ Y 1 πτ 5τ 5τ θ1 | (1 − q 5n )(1 − q n ) (26) θ1 πτ | = −q − 4 2 2 2 n=1 ¶ µ ∞ Y 5 5τ = 2q 8 θ10 0| (1 − q 5n )3 . 2 n=1

Then from (21), (25) and (26), we have 4

∞ X

q 5n+1 q 5n+2 q 5n+3 q 5n+4 − − + (1 − q 5n+1 )2 (1 − q 5n+2 )2 (1 − q 5n+3 )2 (1 − q 5n+4 )2 n=0 ∞ X

nq 2n nq 3n nq 4n nq n − − + 1 − q 5n 1 − q 5n 1 − q 5n 1 − q 5n n=1 ¶ µ 0 ¶0 µ ¶ µ 0 ¶0 µ 3πτ 5τ θ4 πτ 5τ θ4 | − | = θ4 4 2 θ4 4 2 ¢ ¡ πτ 5τ ¢ µ µ ¶¶2 ¡ θ1 πτ | 5τ 5τ 2 ¢ θ1¡ 2 | 2 ¢ ¡ = − θ10 0| 5τ 2 3πτ | 5τ 2 θ42 πτ 4 | 2 θ4 4 2 ∞ 5n 5 Y (1 − 5 ) = 4q . 1 − qn n=1 =4


Vol. 9

Some theta identities and their implications

79

This completes the proof of the theorem. From above procedure, we can rewrite theorem as µ

θ40 θ4

¶0 µ

3πτ 5τ | 4 2

µ −

θ40 θ4

¶0 µ

πτ 5τ | 4 2

∞ Y (1 − q 5n )5 = 4q 1 − qn n=1

(27)

From Jacobi imaginary transformation lemma 1.1, we have µ

θ40 θ4

¶0 µ

z 1 |− τ τ

µ = τ2

θ20 θ2

¶0 (z|τ ) +

2iτ π

(28)

Then we have the following corollary: Corollary 2.2 1−5

∞ X (5n + 1)q 5n+1 (5n + 2)q 5n+2 (5n + 3)q 5n+3 (5n + 4)q 5n+4 − − + 5n+1 5n+2 5n+3 1−q 1−q 1−q 1 − q 5n+4 n=0

=

(29)

∞ Y (1 − q n )5 . 1 − q 5n n=1

Proof. We can replace τ by − τ1 in (27) and applying to (28), then (27) becomes # √ " µ 0 ¶0 ³ µ 0 ¶0 ³ 4n ∞ Y (1 − q 5 )5 5 θ2 θ2 π 2τ ´ 3π 2τ ´ | − | = , 4 θ2 10 5 θ2 10 5 1 − q 4n n=1 then replace τ by

5τ 4 ,

it becomes

# √ " µ 0 ¶0 ³ µ 0 ¶0 ³ ∞ Y 5 θ2 θ2 (1 − q n )5 π τ´ 3π τ ´ | − | = , 4 θ2 10 2 θ2 10 2 1 − q 5n n=1

(30)

From (13), we can obtain µ

θ20 θ2

¶0 (z|τ ) = − sec2 z +

∞ X (−1)n nq 2n cos 2nz . 1 − q 2n n=1

(31)

Next we can deduced (29) from (30) and (31) directly. Therefore, This complete the corollary 2.2. It should be remark that Bailey [1] also derived (24) and (29) in a similar fashion. However the key difference between our approach is that he derived corollary 2.1 from 6Ψ6 which is much less elementary than (17). Moreover by recasting these identities (27) and (30) in terms of theta function identity , we can easily discover and deduce other companion identities from the basic properties of the theta functions.


80

Hai-Long Li and Qian-Li Yang

No. 3

Corollary 2.3. ∞ X

q 5n+1 q 5n+2 q 5n+3 q 5n+4 − − + 5n+1 2 5n+2 2 5n+3 2 (1 − q ) (1 − q ) (1 − q ) (1 − q 5n+4 )2 n=0 =q

∞ Y

(1 − q n )(1 − q 2n−1 )2 (1 − q 5n )3 (1 + q 5n )2 ,

n=1 ∞ X (5n + 1)q 5n+1 n=0

1 − q 10n+2 =q

∞ Y

(5n + 2)q 5n+2 (5n + 3)q 5n+3 (5n + 4)q 5n+4 − + 1 − q 10n+4 1 − q 10n+6 1 − q 10n+8

(1 + q n )(1 − q n )3 (1 − q 5n )3 (1 + q 5n )3 .

n=1

Proof. We recall the identity (21), and replace x by x + π2 and y by y + π2 , then we obtain µ 0 ¶0 µ 0 ¶0 θ3 θ1 (x + y)θ1 (x − y) θ3 (y) − (x) = (θ10 )2 θ3 θ3 θ32 (x)θ32 (y) Now replacing τ by 25 τ , and choosing y =

3πτ 4

and x =

πτ 4 ,

we can deduce the corollary.

§3. Implications for modular identity of Ramanujan Clearly, the identity (21) can generate unlimited number of similar identities. Since the proofs are identical and straightforward, we only list a few without providing the details of proofs here. 4

∞ X

q 6n+1 q 6n+2 q 6n+4 q 6n+5 − − + (1 − q 6n+1 )2 (1 − q 6n+2 )2 (1 − q 6n+4 )2 (1 − q 6n+5 )2 n=0 µ 0 ¶0 ¶ µ 0 ¶0 µ θ4 θ4 πτ = |3τ (πτ |3τ ) − θ4 θ4 2 ¡ 3πτ ¢ ¡ πτ ¢ 0 2 θ1 ¡ 2 |3τ¢ θ1¡ 2 |3τ¢ = −(θ1 (0|3τ )) 2 πτ θ4 2 |3τ θ42 πτ |3τ ∞ Y (1 − q 6n )3 (1 − q 3n )3 = 4q , (1 − q 2n )(1 − q n ) n=1 4

∞ X

2q 6n+3 q 6n+4 q 6n+2 − + 6n+2 2 6n+3 2 (1 − q ) (1 − q ) (1 − q 6n+4 )2 n=0 µ 0 ¶0 µ 0 ¶0 ¢ πτ θ4 θ4 ¡ ( |3τ ) − = 0|3τ θ4 2 θ4 ¢¶ µ ¡ πτ θ1 2 |3τ 2 2 2 ¡ ¢ = −θ2 (0|3τ )θ3 (0|3τ ) θ4 πτ 2 |3τ ∞ Y (1 − q 6n )6 (1 + q 3n )6 2 = 4q (1 − q 2n )2 (1 + q n )2 n=1 ¡ ¢ 1 θ26 0| 3τ 2 ¡ ¢, = 4 θ22 0| τ2

(32)

(33)


Vol. 9

Some theta identities and their implications

4

∞ X

q 6n+1 2q 6n+3 q 6n+5 − + 6n+1 2 6n+3 2 (1 − q ) (1 − q ) (1 − q 6n+5 )2 n=0 µ 0 ¶0 µ 0 ¶0 ¢ θ4 θ4 ¡ = (3πτ |3τ ) − 0|3τ θ4 θ4 ¡ ¢ 2 θ1 πτ |3τ 2 2 ¡ ¢ = −θ2 (0|3τ )θ3 (0|3τ ) 2 θ4 πτ |3τ ∞ Y (1 − q 6n )2 (1 − q 2n )2 = 4q (1 − q 2n−3 )2 (1 + q 2n−1 )2 n=1 µ ¶ µ ¶ 1 3τ 2 τ = θ22 0| θ2 0| . 4 2 2

81 (34)

By acting the imaginary transformation on above three formulas (32), (33) and (34), we can obtain, respectively,

1−3

∞ X (6n + 1)q 6n+1

1 − q 6n+1

n=0

=q

1 − 12

2(6n + 3)q 6n+3 (6n + 5)q 6n+5 + 1 − q 6n+3 1 − q 6n+5

(35)

∞ Y (1 − q n )3 (1 − q 2n )3 , (1 − q 3n )(1 − q 6n ) n=1

∞ X (6n + 1)q 6n+1

1 − q 6n+1

n=0

3(6n + 2)q 6n+2 4(6n + 3)q 6n+3 + 1 − q 6n+2 1 − q 6n+3

(36)

3(6n + 4)q 6n+4 (6n + 5)q 6n+5 + 1 − q 6n+4 1 − q 6n+5 ∞ Y (1 − q n )6 (1 − q 2n−1 )6

− = q2 =

1−4

∞ X (6n + 1)q 6n+1

(1 − q 6n+1

n=0

(1 − q 3n )2 (1 − q 6n−3 )2

n=1 ¡ ¢ θ46 0|τ ¡ ¢, θ42 0|3τ

(6n + 2)q 6n+2 (6n + 4)q 6n+4 (6n + 5)q 6n+5 − + 1 − q 6n+2 1 − q 6n+4 1 − q 6n+5

(37)

∞ Y (1 − q 3n )2 (1 − q n )2 (1 + q 3n )2 (1 + q n )2 n=1 µ ¶ µ ¶ 2 2 = θ4 0|τ θ4 0|3τ .

=q

Theorem 3.1. product identiy

In [6], Ewell derived the following identity in virtue of the quintuple à ! ¡ ¢ ∞ X θ43 0|τ q 3n+2 q 3n+1 ¡ ¢ =1−6 − , 1 + q 3n+1 1 + q 3n+1 θ4 0|3τ n=0

(38)

to study the sums of three squares. The identity (36) is the Lambert series for the square of (38)


82

Hai-Long Li and Qian-Li Yang

No. 3

On the other hand, in [5], authors define b(q) =

∞ Y (1 − q n )3 (1 − q 3n n=1

1

and c(q) = 3q 3

∞ Y (1 − q 3n )3 , (1 − q n n=1

to study some cubic modular identities of Ramanujan. It is interesting to observe that the identities (32) and (35) are the Lambert series for 19 c(q)c(q 2 ) and b(q)b(q 2 ) respectively.

§4. Extension and generalization It is surprising that hidden with (32), (33) and (34) is the following beautiful modular identity of Ramanujan, µ ¶3 µ ¶4 θ2 (0| τ3 ) θ2 (0|τ ) −1 = − 1. (39) θ2 (0|3τ ) θ2 (0|3τ ) To see this, we note that the identity (32) is exactly the difference of (33) and (34), therefore, õ ! ¶ ∞ Y θ26 (0| 3τ θ2 (0| τ2 ) 4 (1 − q 3n )3 (1 − q 6n )3 2 ) . − 1 = 16q τ 3τ 2 θ2 (0| 2 ) (1 − q n )(1 − q 2n ) θ2 (0| 2 ) n=1 Hence µ

θ2 (0|τ ) θ2 (0| 3τ 2 )

¶4 −1=

∞ 1 Y (1 − q 3n )3 (1 − q 6n )3 (1 − q n )2 (1 + q n )4 q n=1 (1 − q 3n )6 (1 + q 3n )12 (1 − q n )(1 − q 2n )

(40)

=

∞ 1 Y (1 − q 3n )3 (1 − q 3n )3 (1 + q 3n )3 (1 − q n )2 (1 + q n )4 q n=1 (1 − q 3n )6 (1 + q 3n )12 (1 − q n )(1 − q n )(1 + q n )

=

∞ 1 Y (1 + q n )3 . q n=1 (1 + q 3n )9

On the other hand, θ2 (0|τ ) − θ2 (0|9τ ) = = =

∞ µ X n=−∞ ∞ µ X n=−∞ ∞ µ X

¶ 1 2

3 2

q (n+ 2 ) − q (3n+ 2 )

= 2q

1

= 2q 4

¶ 3 2

3 2

q (n+ 2 ) − q (3n+ 2 )

n=−∞

q

(3n+1+ 23 )2

+q

(3n−1+ 32 )2

¶ 1 2

1 2

q (3n− 2 ) + q (3n+ 2 )

n=−∞ 1 4

∞ µ X

=

∞ X n=−∞ ∞ Y

µ q

9n2 3n

q

1 4

= 2q θ3

∞ X

1

= q4

¢ 2¡ q 9n q 3n + q −3n

n=−∞

3πτ |9τ 2

(1 − q 18n )(1 + q 18n−6 )(1 + q 18n−12 ).

n=1

Therefore,

∞ Y θ2 (0| τ3 ) θ3 (0| τ3 ) − θ2 (0|3τ ) 1 + q 2n . −1= = q −2/3 θ2 (0|3τ ) θ2 (0|3τ ) (1 + q 6n )3 n=1

(41)


Vol. 9

83

Some theta identities and their implications

Clearly, the identity (39) now follows from (40) and (41). We note that if we apply the imaginary transformation to (39) , then we obtain µ

¶3 ¶4 µ θ4 (0|τ ) θ4 (0|3τ ) 3 −1 =9 3 − 1. (42) θ4 (0|τ ) θ4 (0|τ ) √ And using the familiar facts that θ4 (0|τ +1) = θ3 (0|τ ), θ3 (0|− τ1 ) = −iτ θ3 (0|τ ) and θ4 (0|− τ1 ) = √ −iτ θ2 (0|τ ), it is easy to derive the general formula µ

¶3 θi (0|τ ) θ4 (0|3τ ) − 1 = i4 − 1, θi (0|9τ ) θi (0|9τ ) µ ¶3 θi (0|9τ ) θ4 (0|3τ ) 3 − 1 = 9 i4 − 1. θi (0|τ ) θi (0|τ ) for i = 2, 3, 4. (see a different proof of reference to [4,p.143]. Finally we end this paper by extending this (17) and applying this generalization to derive a few well-known identities. The identity (17) together with the following identity [17,p.324] θ1 (y)θ4 (x)θ1 (x + y + z)θ4 (z) + θ1 (x)θ1 (z)θ4 (y)θ4 (x + y + z) = θ4 θ4 (x + z)θ1 (y + z)θ1 (x + y) can yields an identity which is an extension of (17), θ40 θ0 θ0 θ0 θ1 (x + y)θ1 (y + z)θ1 (x + y) . (x) + 4 (y) + 4 (z) − 4 (x + y + z) = (θ10 ) θ4 θ4 θ4 θ4 θ4 (x)θ4 (y)θ4 (z)θ4 (x + y + z) We can see that this identity can re-derive many identities of Ramanujan. For example, if πτ 3πτ 5πτ replacing τ by 11τ 2 and setting x = 4 , y = 4 , z = 4 , then we get ∞ µ X q 11n+1 q 11n+3 q 11n+4 q 11n+5 − − − 11n+1 11n+3 11n+4 1−q 1−q 1−q 1 − q 11n+5 n=0

q 11n+7 q 11n+8 q 11n+10 q 11n+6 + + − 1 − q 11n+6 1 − q 11n+7 1 − q 11n+8 1 − q 11n+10 ∞ Y (1 − q 11n−2 )(1 − q 11n−9 )(1 − q 11n )2 =q . (1 − q 11n−1 )(1 − q 11n−5 )(1 − q 11n−6 )(1 − q 11n−10 ) n=0

+

Again, we applied the imaginary transformation to (17), then we have θ20 θ0 θ0 θ1 (x)θ1 (y)θ1 (x + y) (x) + 2 (y) − 2 (x + y) = θ3 θ4 . θ2 θ2 θ2 θ2 (x)θ2 (y)θ2 (x + y)

(43)

In (17) and (43), replacing τ by 7τ and setting x = πτ, y = 2πτ , we can obtain, respectively, ∞ X 1 τ 7τ q n − q 3n − q 5n + q 9n + q 11n − q 13n , θ2 (0| )θ2 (0| ) = 4 2 2 1 − q 14n n=1

and θ4 (0|τ )θ4 (0|7τ ) = 1 − 2

∞ X n=1

µ (−1)n

¶ q n + q 2n − q 3n + q 4n − q 5n − q 6n . 1 − q 7n


84

Hai-Long Li and Qian-Li Yang

No. 3

Both identities are known to Ramanujan in [3,p.302]. Acknowledgements. The author express many thanks to the referees for valuable suggestions and comments.This paper was partially supported by The Educational sciences funding project of Shanxi Province(12JK0881) and the natural sciences funding of project Weinan city(2012KY-10).

References [1] W. N. Bailey, A further note on two of Ramanujan’s formulae, Q. J. Math.(Oxford) 3(1952), 158-160. [2] R. Bellman, A brief introduction to the theta functions, Holt Rinehart and Winston, New York(1961). [3] B. C. Berndt, Ramanujan’s Notebooks III, Springer-Verlag, New York (1991). [4] J. M. Borwein and P. B. Borwein, Pi and the AGM- A Study in Analytic Number Theory and Computational Complexity, Wiley, N. Y., (1987). [5] J. M. Borwein, P. B. Borwein and F. G. Garvan, Some cubic modular Indentities of Ramanujan, Trans. of the Amer. Math. Soci., 343(1994), No. 1, 35-47. [6] J. A. Ewell, On the enumerator for sums of three squares, Fibon. Quart., 24(1986), 151-153. [7] E. T. Whittaker and G. N. Watson, A Course of Modern Analysis, 4-th ed. Cambridge Univ. Press, (1966). [8] Li-Chien Shen, On the Additive Formulae of the Theta Functions and a Collection of Lambert Series Pertaining to the Modular Equations of Degree 5, Trans. of the Amer. Math. Soci., 345(1994), No. 1, 323-345.


Scientia Magna Vol. 9 (2013), No. 3, 85-90

λJ -closed sets in generalized topological spaces I. Arockiarani

and D. Sasikala

Nirmala college for women, Coimbatore, Tamil Nadu, India E-mail: d.sasikala@rocketmail.com Abstract The aim of this paper is to introduce the notions of λJ -Closed sets in generalized topological spaces and supplement their properties. We also investigate their characterizations. Keywords J-closed set, J-open set, gJλ-closed set, Jλg-closed set, λJ -closed set. 2000 Mathematics Subject Classification: 54A05,54A10

§1. Introduction and preliminaries A. Csaszar [1] has introduced and studied generalized open sets of a set X defined in terms of monotonic functions γ : P (X) → P (X). µ = {A ⊆ X/A ⊂ γ(A)} is called the family of γ-open sets which is closed under arbitrary union and φ ∈ µ, then µ is called a generalized topology. Let X be a non-empty set and µ be a collection of subsets of X. Then µ is called a generalized topology (briefly GT ) on X iff φ ∈ µ and Gi ∈ µ for i ∈ I 6= φ implies G = Ui∈I Gi ∈ µ. Generalized topological spaces are important generalizations of topological spaces and many results have been obtained by many topologist [3,4,5,11,12] . A generalized topology is said to be strong [2] if X ∈ µ. A space (X, µ) is said to be quasi-topological space [7] , if µ is closed under finite intersection. The generalized closure of a subset S of X, denoted by cµ (S), is the intersection of generalized closed sets including S and the interior of S, denoted by iµ (S), is the union of generalized open sets contained in S. If µ is a GT on X, A ⊆ X, x ∈ X, then x ∈ cµ (A) iff x in M ∈ µ ⇒ M ∩ A 6= φ and cµ (X/A) = X/iµ (A). In this paper, We define a new class of sets called λJ -closed sets in generalized topological spaces and some of their properties are established. Definition 1.1. [6] Let(X, µ) be a GT S and A ⊆ X, then A is said to be (1) µ-semi open if A⊆ cµ (iµ (A)), (2) µ-pre open if A⊆ iµ (cµ (A)), (3) µ-α open if A⊆ iµ (cµ iµ (A)), (4) µ-β open if A⊆ cµ (iµ cµ (A)). Let us denote σ(µX ) (briefly σX or σ) the class of all µ-semi open sets on X, by π(µX or π) the class of all µ-pre open sets, by α(µX or α) the class of all µ-α open sets, by β(µX or β) the class of all µ-β open sets. Definition 1.2. [9] Let (X, µ) be a GT S and A ⊆ X, then A is said to be µ-J-open if A⊆ iµ (cπ (A)).


86

I. Arockiarani and D. Sasikala

No. 3

The closure of a subset S of X, denoted by cJ (A) is the intersection of generalized J-closed sets including S and the interior of S, denoted by iJ (S), is the union of generalized J-open sets contained in S. The set of all J-open sets is denoted by JO(X). The set all J-closed sets is denoted by JC(X). Theorem 1.1. Let (X, µ) be a generalized topological space. Then (1) cµ (A) = X − iµ (X − A), (2) iµ (A) = X − cµ (X − A). Definition 1.3. [9] Let(X, λ) be a GT S and A ⊆ X, then A is said to be λα -J-closed if cα (A) ⊆ U whenever A ⊆ U and U ∈ JO(X). Lemma 1.1. [7] Let (X, µ) be a quasi-topological space. Then cµ (A ∪ B) = cµ (A) ∪ cµ (B) for every subsets A and B of X.

§2. J-Closed sets in generalized topological spaces Definition 2.1. A subset A of a space (X, λ) is said to be gJλ-closed if cλ (A) ⊆ U whenever A ⊆ U and U ∈ JO(X). The complement of gJλ-closed set is called an gJλ-open set. Definition 2.2. A subset A of a space (X, λ) is said to be Jλg-closed if cJ (A) ⊆ U whenever A ⊆ U and U ∈ JO(X). The complement of Jλg-closed set is called an Jλg-open set. Theorem 2.1. Let (X, λ) be a GT S and A ⊆ X, then (i) Every closed set is gJλ-closed, (ii) Every closed set is Jλg-closed, (iii) Every J-closed set is Jλg-closed, (iv) Every gJλ-closed set is a λα -J-closed set, (v) Every Jλg-closed set is a λα -J-closed set. Theorem 2.2. Let (X, λ) be a quasi topological space and A ⊆ X. If A and B are gJλ-closed subsets of X, then A ∪ B is also a gJλ-closed set. Proof. Suppose A and B are gJλ-closed. Let U be a J-open set such that A ∪ B ⊆ U . Since A and B are gJλ-closed set, cλ (A) ⊆ U and cλ (B) ⊆ U and so cλ (A) ∪ cλ (B) ⊆ U . Therefore cλ (A ∪ B) ⊆ U . Remark 2.1. The intersection of two gJλ-closed sets is not a gJλ-closed set. Example 2.1. Let X = {a, b, c} and λ = {φ, {b}, X}. If A = {a, b} and B = {b, c} are gJλ-closed sets. but A ∩ B = {b} is not a gJλ-closed set. Theorem 2.3. Let (X, λ) be a GT S and A ⊆ X. Then A is Jλg-closed if and only if F ⊆ cJ (A) − A and F is J-closed implies that F = φ. Proof. Let F be a subset of J-closed subset of cJ (A) − A. Since A ⊆ X-F and A is Jλg-closed set, cJ (A)-A ⊆ X-F and so F ⊆ X-cJ (A)-A. Therefore F = φ. Conversely, U is a J-open set such that A ⊆ U . If cJ (A) not a subset in U , then cJ (A) ∩ (X − U ) is a non-empty J-closed subset of cJ (A) − A, which is a contradiction. Therefore, cJ (A) ⊆ U , which implies that A is Jλg-closed set.


Vol. 9

λJ -closed sets in generalized topological spaces

87

Theorem 2.4. Let (X, λ) be a GT S. Let A and B be subsets of X. If A ⊂ B ⊂ cJ (A) and A is Jλg-closed, then B is Jλg-closed. Proof. If F is J-closed such that F ⊆ cJ (B) − B, therefore by hypothesis, F ⊆ cJ (A) − A. Since A is Jλg-closed, by theorem 2.3, F = φ and so B is Jλg-closed. Theorem 2.5. Let (X, λ) be a GT S. Let A ⊆ X be a gJλ-closed set of X, then cJ (A)/A does not contain any non-empty J-closed set. Proof. Let F be a J-closed set of X such that F ⊆ cJ (A)/A. Then F ⊆ X/A and hence A ⊆ X/F ∈ JO(X). Since A is gJλ-closed cJ (A) ⊆ X/F and hence F ⊆ X/cJ (A). So F ⊆ X/cJ (A) ∩ (X/cJ (A)) = φ. Theorem 2.6. Let (X, λ) be a GT S. Let A ⊆ X is gJλ-open iff F ⊆ iλ (A) whenever F is a J-closed set such that F ⊆ (A). Proof. Let A be a gJλ-open set of X and F be a J-closed set such that F ⊆ (A). Then X/A is a gJλ-closed set and X/A ⊆ X/F ∈ JO(X). So cλ (X/A) = X/iλ (A) ⊆ X/F , thus F ⊆ iλ (A). Conversely, let F ⊆ iλ (A), whenever F is J-closed such that F ⊆ A. Let X/A ⊆ U where U ∈ JO(X). Then X/U ⊆ A and X/U is J-closed. By the assumption, X/U ⊆ iλ (A) and hence cλ (X/A) = X/iλ (A) ⊆ U . Hence X/A is gJλ-closed and hence A is gJλ-open. Theorem 2.7. Let (X, λ) be a GT S. If A is a gJλ-closed subset of X, then cλ (A)/A is gJλ-closed. Proof. Let A be a gJλ-closed subset of (X, λ). Let F be a J-closed set such that F ⊆ cλ (A)/A, so by theorem 2.5, F = φ and thus F ⊆ iλ (cλ (A)/A). So by theorem 2.6, cλ (A)/A is gJλ-closed.

§3. λJ -Closed sets in generalized topological spaces Definition 3.1. A subset A of MJ = ∪{B/B ∈ J} of a space (X, λ) is said to be λJ -closed if cJ (A) ∩ MJ ⊆ U whenever A ⊆ U and U ∈ JO(X). The complement of λJ -closed set is called an λJ -open set. Theorem 3.1. Let X ba a non-empty set and λ be the generalized topology on X and A ⊆ X. Then the following properties hold: (i)(X − MJ ) is a J-closed set contained in every J-closed set, (ii) cJ (A ∩ MJ ) ∩ MJ = cJ (A) ∩ MJ , (iii) If A is J-closed, then cJ (A ∩ MJ ) ∩ MJ = A ∩ MJ , (iv) cJ (A) = (cJ (A) ∩ MJ ) ∪ (X − MJ ), (v) If A is J-closed, then A = (A ∩ MJ ) ∪ (X − MJ ). Proof. (i) If G is J-open, then G ⊆ MJ . (ii) We know that cJ (A ∩ MJ ) ∩ MJ ⊆ cJ (A) ∩ MJ . Let x ∈ cJ (A) ∩ MJ . Then x ∈ cJ (A) and x ∈ MJ . Now x ∈ cJ (A) implies that G ∩ A ∈ / φ for every J-open set G containing x and so G ∩ (A ∩ MJ ) ∈ / φ for every J-open set G containing x. Therefore, x ∈ cJ (A) ∩ MJ , and so x ∈ cJ (A) ∩ MJ ∩ MJ . Hence cJ (A) ∩ MJ ⊆ cJ (A ∩ MJ ) ∩ MJ .


88

I. Arockiarani and D. Sasikala

No. 3

(iii) A is J-closed i.e. cJ (A) = A. From (ii), we have cJ (A ∩ MJ ) ∩ MJ = cJ (A) ∩ MJ = A ∩ MJ . (iv) cJ (A) = cJ (A)∩X = cJ (A)∩(MJ ∪(X −MJ )) = cJ (A)∩(MJ )∪cJ (A)∩(X −MJ ) = cJ (A) ∩ (MJ ) ∪ (X − MJ ). (v) Since A is J-closed, from (ii) we have, cJ (A) = (cJ (A) ∩ MJ ) ∪(X − MJ ) i.e. A = (A ∩ MJ ) ∪(X − MJ ). Theorem 3.2. Let (X, λ) be a GT S and A ⊆ X, then the following properties hold: (i) If A is J-closed subset of X, then A ∩ MJ is λJ -closed set, (ii) cJ (A) ∩ MJ is a λJ -closed set for every subset A of X. Proof. (i) Let A ∩ MJ ⊆ U and U be J-open. Since cJ (A ∩ MJ ) ∩ MJ = cJ (A) ∩ MJ , we have cJ (A ∩ MJ ) ∩ MJ = A ∩ MJ ⊆ U and so A ∩ MJ is λJ -closed set. (ii) it follows from (i). Theorem 3.3. Let (X, λ) be a GT S. Then a subset A of MJ is λJ -closed if and only if F ⊂ cJ (A) − A and F is λ-J-closed implies that F = X − MJ . Proof. Let F be a J-closed subset of cJ (A) − A. Since A ⊂ X − F and A is λJ -closed set, cJ (A) ∩ MJ ⊆ X − F and so F ⊂ X − (cJ (A) ∩ MJ ) = (X − cJ (A)) ∪ (X − MJ ). Since F ⊂ cJ (A), we have F ⊂ (X − MJ ). Therefore F = X − MJ . Conversely, Let A ⊂ U and U ∈ J. Suppose (cJ (A) ∩ MJ ) ∩ (X − U ) is a non empty subset. Then (cJ (A) ∩ MJ ) ∩ (X − U ) ⊂ (cJ (A) ∩ (X − U ) ⊂ cJ (A) ∩ (X − A) ⊂ cJ (A) ∩ A. Thus (cJ (A) ∩ MJ ) ∩ (X − U ) is a non empty J-closed set contained in cJ (A) ∩ A. Therefore, (cJ (A) ∩ MJ ) ∩ (X − U ) = φ, which is a contradiction. Therefore, (cJ (A) ∩ MJ ) ⊂ U which implies A is a λJ -closed set. Theorem 3.4. Let (X, λ) be a GT S. Then a λJ -closed subset A of MJ is a J-closed set, if cJ (A) − A is a J-closed set. Proof. cJ (A) − A = X − M = φ. Then cJ (A) = A ∪ (X − M). Therefore A is a J-closed set. Theorem 3.5. Let (X, λ) be a quasi topological space and A ⊆ X. If A and B are λJ -closed subsets of X, then A ∪ B is also a λJ -closed set. Example 3.1. Let X = {a, b, c} and λ = {φ, {a}, {b}, {a, b}, {a, c}, {b, c}, X}. Then λ is a generalized topology but not a quasi topology. A = {a} and B = {b} are λJ -closed sets. but A ∪ B = {a, b} is not a λJ -closed set. Example 3.2. Consider the topological space (X, τ ) where X = {a, b, c} and λ = {φ, {b}, X}. If A = {a, b} and B = {b, c} are λJ -closed sets, but A ∩ B = {b} is not a λJ -closed set. Theorem 3.6. Let (X, λ) be a GT S. If A is λJ -closed subset of MJ and B is J-closed, then A ∩ B is a λJ -closed set. Proof. Suppose A ∩ B ⊆ U where U is J-open, then A ⊆ (U ∪ (X − B)). Since A is λJ -closed, cJ (A) ∩ MJ ⊆ (U ∪ (X − B)) and so cJ (A) ∩ B ∩ MJ ) = (cJ (A) ∪ cJ (B)) ∩ MJ ⊆ U , which implies that (cJ (A ∪ B)) ∩ M ⊆ U and so A ∩ B is a λJ -closed set. Definition 3.2. A subset A of M in a space (X, λ) is said to be λJ -open if MJ − A is λJ -closed.


Vol. 9

λJ -closed sets in generalized topological spaces

89

Theorem 3.7. Let (X, λ) be a GT S. Let A ⊆ MJ is λJ -open if and only if F ∩ MJ ⊆ iJ (A) whenever F is J-closed and F ∩ MJ ⊆ A. Proof. Let A be a λJ -open subset of MJ and F be a J-closed subset of X such that F ∩ MJ ⊆ A. Then MJ − A ⊆ MJ − (F ∩ MJ ) = MJ − F . Since MJ − F is J-open and MJ − A is λJ -closed, cJ (MJ − A) ∩ MJ ⊆ MJ − F and so F ⊆ MJ − (cJ (MJ − A) ∩ MJ ) = MJ ∩ (MJ − cJ (MJ − A)) = iJ (A) ∩ MJ = iJ (A), which implies F ∩ MJ ⊆ A. Conversely, Let A be a subset of MJ and F be a J-closed set such that F ∩ MJ ⊆ A. By hypothesis, F ∩ MJ ⊆ iJ (A) which implies that MJ − iJ (A) ⊆ MJ − (F ∩ MJ ) and so cJ (MJ − A) ⊆ MJ − F . Then cJ (MJ − A) ∩ MJ ⊆ (MJ − F ) ∩ MJ = MJ − F which implies that MJ − A is λJ -closed and so A is λJ -open. Theorem 3.8. Let (X, λ) be a GT S. Let A ⊆ MJ is λJ -open if and only if U = MJ whenever U is J-open and iJ (A) ∪ (MJ − A) ⊆ U . Proof. Suppose A is λJ -open and M is J-open such that iJ (A) ∪ (MJ − A) ⊆ U . Then MJ − U ⊆ (MJ − iJ (A) ∩ A) = cJ (MJ − A) ∩ A = cJ (MJ − A) − (MJ − A) and so (MJ − U ) ∪ (X − MJ ) ⊆ cJ (MJ − A) ∩ A, by theorem 3.3, (MJ − U ) ∪ (X − MJ ) and so (MJ − U ) = φ which implies MJ = U . Conversely, Let F be a J-closed set such that F ∩ MJ ⊆ A. Since iJ (A) ∪ (MJ − A) ⊆ iJ (A) ∪ (MJ − F ) ∪ (MJ − MJ ) = iJ (A) ∪ (MJ − F ) and iJ (A) ∪ (MJ − F ) is J-open, by hypothesis, MJ = iJ (A) ∪ (MJ − F ) and so F ∩ MJ ⊆ (iJ (A) ∪ (MJ − F ) ∩ F ) = (iJ (A) ∩ F ) ∪ (MJ − F ∩ F ) = iJ (A) ∩ F ⊆ iJ (A). By definition 3.2, A is λJ -open. Theorem 3.9. Let (X, λ) be a GT S. Let A and B be subsets of MJ . If iJ (A) ⊆ B ⊆ A and A is λJ -open, then B is λJ -open. Theorem 3.10. Let (X, λ) be a GT S. Let A ⊆ MJ is λJ -closed if and only (cJ (A) − A) ∩ MJ is λJ -open. Proof. Suppose (cJ (A) − A) ∩ MJ is λJ -open. Let A ⊆ U and U is J-open, since (cJ (A) ∩ (MJ − U ) ⊆ (cJ (A) ∩ (MJ − A) = (cJ (A) − A) ∩ MJ . (cJ (A) − A) ∩ MJ is λJ -open and (cJ (A)∩(MJ −A) is J-closed, by theorem 3.7, (cJ (A)∩(MJ −U ) ⊆ iJ ((cJ (A)−A)∩MJ ) ⊆ iJ (cJ (A) ∩ iJ (MJ − A)) ⊆ iJ (cJ (A) ∩ iJ (X − A)) = iJ (cJ (A)) ∩ (X − cJ (A)) = φ. Therefore cJ (A) ∩ MJ ⊆ U which implies that A is λJ -closed. Conversely, suppose A is λJ -closed and F ∩ MJ ⊆ (cJ (A) − A) ∩ MJ where F is J-closed. Then F ⊆ (cJ (A) − A) and by theorem 3.3, F = X − MJ and so φ = (X − MJ ) ∩ MJ = F ∩ MJ ⊆ (cJ (A) − A) ∩ MJ which implies that F ∩ MJ ⊆ iJ (cJ (A) − A) ∩ MJ ). Therefore, cJ (A) − A is λJ -open.

References [1] A. Cs´ asz´ ar, Generalized topology, generalized continuity, Acta. Math. Hungar., 96(2002), 351-357. [2] A. Cs´ asz´ ar, Extremely disconnected generalized topologies, Annales Univ Budapest, Sectio Math, 47(2004), 151-161. [3] A. Cs´ asz´ ar, Generalized open sets in generalized topologies, Acta. Math. Hungar., 106(2005), 53-66.


90

I. Arockiarani and D. Sasikala

No. 3

[4] A. Cs´ asz´ ar, δandθ modifications of generalized topologies, Acta. Math. Hungar., 120(2008), No. 3, 275-279. [5] A. Cs´ asz´ ar, Further remarks on γ interior, Acta. Math. Hungar., 113(2006), 325-332. [6] A. Cs´ asz´ ar, Remarks on quasi topologies, Acta. Math. Hungar., 119(2007), 197-200. [7] A. Cs´ asz´ ar, Modifications of generalized topologies via hereditary classes, Acta. Math. Hungar., 115(2007), 29-36. [8] N. Levine, Generalized closed sets in topology, Rend. Circ. Mat. Palermo, 2(1970), No. 19, 89-96. [9] D. Sasikala and I. Arockiarani, λα -J-sets in generalized topological spaces, IJAST, 1(2011), No. 2, 200-210. [10] P. Sivagami, Remarks on γ interior, Acta. Math. Hungar., 119(2007), 81-84. [11] W. K. Min, Some results on generalized topological spaces and generalized systems, Acta. Math. Hungar., 108(2005), 171-181. [12] W. K. Min, Almost continuity in generalized topological spaces, Acta. Math. Hungar., 125(2009), 121-125.


Scientia Magna Vol. 8 (2013), No. 4, 91-98

Coefficient inequality for certain subclass of analytic functions D. Vamshee Krishna

and T. Ramreddy

† Department of Mathematics, GITAM Institute of Technology, GITAM University , Visakhapatnam-530 045, Andhra Pradesh, India ‡ Department of Mathematics, Kakatiya University, Warangal- 506 009, Andhra Pradesh, India E-mail: vamsheekrishna1972@gmail.com, reddytr2@yahoo.com Abstract The objective of this paper is to introduce certain subclass of analytic functions and obtain an upper bound to the second Hankel functional |a2 a4 − a23 | for the functions belonging to this class, using Toeplitz determinants. The result presented here include two known results as their special cases. Keywords Analytic function, starlike and convex functions with respect to symmetric points, convolution, upper bound, second Hankel functional, positive real function, Toeplitz determinants. 2010 Mathematics Subject Classification: 30C45, 30C50

§1. Introduction and preliminaries Let A denote the class of functions f of the form f (z) = z +

∞ X

an z n

(1)

n=2

in the open unit disc E = {z : |z| < 1}. Let S be the subclass of A consisting of univalent functions. For any two analytic functions g and h respectively with their expansions as P∞ P∞ g(z) = k=0 ak z k and h(z) = k=0 bk z k , the Hadamard product or convolution of g(z) and h(z) is defined as the power series

(g ∗ h)(z) =

∞ X

ak bk z k .

(2)

k=0

The Hankel determinant of f for q ≥ 1 and n ≥ 1 was defined by Pommerenke

Hq (n) =

an

an+1

···

an+q−1

an+1 .. .

an+2 .. .

··· .. .

an+q .. .

an+q−1

an+q

···

an+2q−2

.

[19,20]

as

(3)


92

D. Vamshee Krishna and T. Ramreddy

No. 4

This determinant has been considered by many authors in the literature [15]. For example, Noor [16] determined the rate of growth of Hq (n) as n → ∞ for the functions in S with bounded boundary. Ehrenborg [5] studied the Hankel determinant of exponential polynomials. The Hankel transform of an integer sequence and some of its properties were discussed by Layman in [11]. One can easily observe that the Fekete-Szeg¨ o functional is H2 (1). Fekete-Szeg¨ o then further generalized the estimate |a3 − µa22 | with µ real and f ∈ S. Ali [2] found sharp bounds on the first four coefficients and sharp estimate for the Fekete-Szeg¨ o functional |γ3 − tγ22 |, where t P ∞ is real, for the inverse function of f defined as f −1 (w) = w + n=2 γn wn to the class of strongly f (α). For our discussion in this paper, starlike functions of order α (0 < α ≤ 1) denoted by ST we consider the Hankel determinant in the case of q = 2 and n = 2, known as second Hankel determinant a2

a3

a3

a4

= a2 a4 − a23 .

(4)

Janteng, Halim and Darus [10] have considered the functional |a2 a4 − a23 | and found a sharp bound for the function f in the subclass RT of S, consisting of functions whose derivative has a positive real part studied by Mac Gregor [12] . In their work, they have shown that if f ∈ RT then |a2 a4 − a23 | ≤ 94 . The same authors [9] also obtained the second Hankel determinant and sharp bounds for the familiar subclasses of S, namely, starlike and convex functions denoted by ST and CV , shown that |a2 a4 − a23 | ≤ 1 and |a2 a4 − a23 | ≤ 18 respectively. Mishra and Gochhayat [13] obtained the sharp bound to the non- linear functional |a2 a4 − a23 | for the class of analytic functions denoted by Rλ (α, ρ)(0 ≤ ρ ≤ 1, 0 ≤ λ < 1, |α| < π2 ), by making use of the [17] fractional differential operator and Srivastava . They have shown that, if f ∈ n due2 to Owa o 2 2 2 (1−ρ) (2−λ) (3−λ) cos α 2 Rλ (α, ρ) then |a2 a4 − a3 | ≤ . Similarly, the same coefficient inequality 9 was calculated for certain subclasses of analytic functions by many authors ([1], [3], [14]). Motivated by the above mentioned results obtained by different authors in this direction, in this paper, we consider certain subclass of analytic functions and obtain an upper bound to the functional |a2 a4 − a23 | for the function f belonging to this class, defined as follows.

§2. Definitions and lemmas Definition 2.1. A function f (z) ∈ A is said to be starlike function with respect to symmetric points, if it satisfies the condition ½ ¾ 2zf 0 (z) Re > 0, ∀z ∈ E. (5) f (z) − f (−z) The set of all such functions is denoted by STs , introduced and studied by Sakaguchi [25] . Further, he has shown that the functions in STs are close-to-convex and hence are univalent. The concept of starlike functions with respect to symmetric points have been extended to starlike functions with respect to N -symmetric points by Ratanchand [24] and Prithvipalsingh [21] . Ramreddy [22] studied the class of close-to-convex functions with respect to N -symmetric points


Vol. 8

Coefficient inequality for certain subclass of analytic functions

93

and proved that this class is closed under convolution with convex univalent functions. Definition 2.2. A function f (z) ∈ A is said to be convex function with respect to symmetric points, if it satisfies the condition, ½ ¾ 0 2 {zf 0 (z)} Re > 0, ∀z ∈ E. (6) {zf 0 (z) + zf 0 (−z)} Definition 2.3. A function f (z) ∈ A is said to be in the class ST CVs (β)(0 ≤ β ≤ 1), if it satisfy the condition " # © ª 2 zf 0 (z) + βz 2 f 00 (z) Re > 0, ∀z ∈ E. (7) (1 − β) {f (z) − f (−z)} + β {zf 0 (z) + zf 0 (−z)} It is observed that for β = 0 and β = 1 , we obtain ST CVs (0) = STs and ST CVs (1) = CVs respectively. We first state some preliminary lemmas required for proving our result. Let P denote the class of functions p analytic in E for which <{p(z)} > 0, " # ∞ X 2 3 n p(z) = (1 + c1 z + c2 z + c3 z + ...) = 1 + cn z , ∀z ∈ E. (8) n=1 [18, 26]

Lemma 2.1. If p ∈ P, then |ck | ≤ 2, for each k ≥ 1. [7] Lemma 2.2. The power series for p given in (8) converges in the unit disc E to a function in P if and only if the Toeplitz determinants

Dn =

2

c1

c2

···

c−1 .. .

2 .. .

c1 .. .

··· .. .

c−n

c−n+1

c−n+2

···

cn cn−1 , n = 1, 2, 3, · · · .. . 2

Pm and c−k = ck , are all non-negative. These are strictly positive except for p(z) = k=1 ρk p0 (exp(itk )z), . ρk > 0, tk real and tk 6= tj , for k 6= j; in this case Dn > 0 for n < (m − 1) and Dn = 0 for n ≥ m. This necessary and sufficient condition is due to Caratheodory and and Toeplitz, can be found in [7]. We may assume without restriction that c1 > 0. On using lemma 2.2, for n = 2 and n = 3 respectively, we get 2

c1

c2

D2 = c1

2

2 2 2 c1 = [8 + 2Re{c1 c2 } − 2 | c2 | − 4c1 ] ≥ 0,

c2

c1

2

is equivalent to 2c2 = {c21 + x(4 − c21 )}, for some x, |x| ≤ 1.

D3 =

2

c1

c2

c3

c1

2

c1

c2

c2

c1

2

c1

c3

c2

c1

2

.

(9)


94

D. Vamshee Krishna and T. Ramreddy

No. 4

|(4c3 − 4c1 c2 + c31 )(4 − c21 ) + c1 (2c2 − c21 )2 | ≤ 2(4 − c21 )2 − 2|(2c2 − c21 )|2 .

(10)

Then D3 ≥ 0 is equivalent to

From the relations (9) and (10), after simplifying, we get 4c3 = {c31 + 2c1 (4 − c21 )x − c1 (4 − c21 )x2 + 2(4 − c21 )(1 − |x|2 )z}, for some real value of z with |z| ≤ 1. P∞ Theorem 2.1. If f (z) = z + n=2 an z n ∈ ST CVs (β)(0 ≤ β ≤ 1) then · ¸ 1 2 |a2 a4 − a3 | ≤ . (1 + 2β)2 P∞ Proof. Let f (z) = z + n=2 an z n ∈ ST CVs (β), from the definition 1.3, there exists an analytic function p ∈ P in the unit disc E with p(0) = 1 and <{p(z)} > 0 such that "

# © ª 2 zf 0 (z) + βz 2 f 00 (z) = p(z) (1 − β) {f (z) − f (−z)} + β {zf 0 (z) + zf 0 (−z)} © ª ⇒ 2 zf 0 (z) + βz 2 f 00 (z) = [(1 − β) {f (z) − f (−z)} + β {zf 0 (z) + zf 0 (−z)}] p(z). (11)

Replacing f (z), f 0 (z), f 00 (z) and p(z) with their equivalent series expressions in (12), we have " ( 2 z

1+

∞ X

) nan z

n=2

n−1

( + βz

"

= (1 − β) z

∞ X

)# n(n − 1)an z

n=2 ∞ X

z+

! an z

n

n=2

( Ã β

2

1+

∞ X n=2

!

nan z

n−1

à −

à +z

n−2

1+

−z +

∞ X

!) n

an (−z)

n=2 ∞ X

+

!)# n−1

nan (−z)

à ×

1+

n=2

∞ X

! cn z

n

.

n=1

Upon simplification, we obtain [(1 + 2(1 + β)a2 z + 3(1 + 2β)a3 z 2 + 4(1 + 3β)a4 z 3 + · · · )] = [(1 + c1 z + {c2 + (1 + 2β)a3 } z 2 + {c3 + (1 + 2β)c1 a3 } z 3 + · · · ]. (12) Equating the coefficients of like powers of z, z 2 and z 3 respectively in (13), we have {2(1 + β)a2 = c1 ; 3(1 + 2β)a3 = {c2 + (1 + 2β)a3 } ; 4(1 + 3β)a4 = {c3 + (1 + 2β)c1 a3 .} After simplifying, we get {a2 =

c1 c2 1 ; a3 = ; a4 = (2c3 + c1 c2 ).} 2(1 + β) 2(1 + 2β) 8(1 + 3β)

(13)

Considering the second Hankel functional |a2 a4 − a23 | for the function f ∈ ST CVs (β) and substituting the values of a2 , a3 and a4 from the relation (14), we have ¯ ¯ ¯ ¯ c1 1 c22 ¯. (14) |a2 a4 − a23 | = ¯¯ × (2c3 + c1 c2 ) − 2 2(1 + β) 8(1 + 3β) 4(1 + 2β) ¯


Vol. 8

95

Coefficient inequality for certain subclass of analytic functions

Upon simplification, we obtain |a2 a4 − a23 | =

1 × |2(1 + 2β)2 c1 c3 + (1 + 2β)2 c21 c2 − 4(1 + β)(1 + 3β)c22 |. 16(1 + β)(1 + 2β)2 (1 + 3β)

The above expression is equivalent to |a2 a4 − a23 | =

¯ ¯ 1 × ¯d1 c1 c3 + d2 c21 c2 + d3 c22 ¯ . 2 16(1 + β)(1 + 2β) (1 + 3β)

(15)

Where {d1 = 2(1 + 2β)2 ; d2 = (1 + 2β)2 ; d3 = −4(1 + β)(1 + 3β).}

(16)

Substituting the values of c2 and c3 from (9) and (11) respectively from lemma 1.2 in the right hand side of (16), we have 1 |d1 c1 c3 + d2 c21 c2 + d3 c22 | = |d1 c1 × {c31 + 2c1 (4 − c21 )x − c1 (4 − c21 )x2 + 2(4 − c21 )(1 − |x|2 )z}+ 4 1 1 d2 c21 × {c21 + x(4 − c21 )} + d3 × {c21 + x(4 − c21 )}2 |. 2 4 Using the facts |z| < 1 and |xa + yb| ≤ |x||a| + |y||b|, where x, y, a and b are real numbers, after simplifying, we get 4|d1 c1 c3 + d2 c21 c2 + d3 c22 | ≤ |(d1 + 2d2 + d3 )c41 + 2d1 c1 (4 − c21 ) + 2(d1 + d2 + d3 )c21 (4 − c21 )|x| © ª − (d1 + d3 )c21 + 2d1 c1 − 4d3 (4 − c21 )|x|2 |. (17) Using the values of d1 , d2 , d3 and d4 from the relation (17), upon simplification, we obtain {(d1 + 2d2 + d3 ) = 4β 2 ; d1 = 2(1 + 2β)2 ; (d1 + d2 + d3 ) = −(1 + 4β).} ©

(d1 + d3 )c21 + 2d1 c1 − 4d3

ª

(18)

© ª = 2 −(2β 2 + 4β + 1)c21 + 2(1 + 2β)2 c1 + 8(1 + β)(1 + 3β). (19)

Consider ©

ª −(2β 2 + 4β + 1)c21 + 2(1 + 2β)2 c1 + 8(1 + β)(1 + 3β) · ¸ 2(1 + 2β)2 8(1 + β)(1 + 3β) = (2β 2 + 4β + 1) × −c21 + c + 1 (2β 2 + 4β + 1) (2β 2 + 4β + 1) "½ 2

= −(2β + 4β + 1) ×

(1 + 2β)2 c1 − (2β 2 + 4β + 1)

¾2

# (1 + 2β)4 8(1 + β)(1 + 3β) − − . (2β 2 + 4β + 1)2 (2β 2 + 4β + 1)

Upon simplification, the above expression reduces to  ½ 2  = −(2β +4β+1)× c1 −

(1 + 2β)2 (2β 2 + 4β + 1)

¾2

(p )2  64β 4 + 192β 3 + 192β 2 + 72β + 9  . − (2β 2 + 4β + 1)


96

D. Vamshee Krishna and T. Ramreddy

No. 4

© ª ⇒ −(2β 2 + 4β + 1)c21 + 2(1 + 2β)2 c1 + 8(1 + β)(1 + 3β) "

= (2β 2 + 4β + 1)× )# p (1 + 2β)2 64β 4 + 192β 3 + 192β 2 + 72β + 9 −c1 + + (2β 2 + 4β + 1) (2β 2 + 4β + 1) " ( )# p 4(1 + 2β)2 64β 4 + 192β 3 + 192β 2 + 72β + 9 × c1 + − . (20) (2β 2 + 4β + 1) (2β 2 + 4β + 1) (

Since c1 ∈ [0, 2], using the result (−c1 + a)(c1 + b) ≥ (−c1 − a)(−c1 − b), provided a ≥ b, where a, b ≥ 0 in the right hand side of the relation (21), upon simplification, we obtain ©

ª −(2β 2 + 4β + 1)c21 + 2(1 + 2β)2 c1 + 8(1 + β)(1 + 3β) © ª ≥ −(2β 2 + 4β + 1)c21 − 2(1 + 2β)2 c1 + 8(1 + β)(1 + 3β) . (21)

From the relations (20) and (22), we have © ª − (d1 + d3 )c21 + 2d1 c1 − 4d3 © ª ≤ −2 −(2β 2 + 4β + 1)c21 − 2(1 + 2β)2 c1 + 8(1 + β)(1 + 3β) . (22) Substituting the calculated values from (19) and (23) in the right hand side of (18), we obtain 4|d1 c1 c3 + d2 c21 c2 + d3 c22 | ≤ |4β 2 c41 + 4(1 + 2β)2 c1 (4 − c21 ) − 2(1 + 4β)c21 (4 − c21 )|x| © ª − 2 −(2β 2 + 4β + 1)c21 − 2(1 + 2β)2 c1 + 8(1 + β)(1 + 3β) (4 − c21 )|x|2 |. Choosing c1 =c ∈ [0, 2], applying triangle inequality and replacing | x | by µ in the right hand side of the above inequality, we get 4|d1 c1 c3 + d2 c21 c2 + d3 c22 | ≤ [4β 2 c4 + 4(1 + 2β)2 c(4 − c2 ) + 2(1 + 4β)c2 (4 − c2 )µ © ª + 2 −(2β 2 + 4β + 1)c2 − 2(1 + 2β)2 c + 8(1 + β)(1 + 3β) (4 − c2 )µ2 ] = F (c, µ),

for

0 ≤ µ = |x| ≤ 1. (23)

Where F (c, µ) = [4β 2 c4 + 4(1 + 2β)2 c(4 − c2 ) + 2(1 + 4β)c2 (4 − c2 )µ © ª + 2 −(2β 2 + 4β + 1)c2 − 2(1 + 2β)2 c + 8(1 + β)(1 + 3β) (4 − c2 )µ2 ]. (24) We next maximize the function F (c, µ) on the closed square [0, 2]×[0, 1]. Differentiating F (c, µ) in (25) partially with respect to µ, we get ∂F = [2(1 + 4β)c2 ∂µ © ª + 4 −(2β 2 + 4β + 1)c2 − 2(1 + 2β)2 c + 8(1 + β)(1 + 3β) µ] × (4 − c2 ). (25) For 0 < µ < 1, for fixed c with 0 < c < 2 and 0 ≤ β ≤ 1, from (26), we observe that ∂F ∂µ > 0. Therefore, F (c, µ) is an increasing function of µ so that it cannot have a maximum value in the interior of the closed square [0, 2] × [0, 1]. Moreover, for fixed c ∈ [0, 2], we have max F (c, µ) = F (c, 1) = G(c).

0≤µ≤1

(26)


Vol. 8

Coefficient inequality for certain subclass of analytic functions

97

Therefore, replacing µ by 1 in (25), upon simplification, we obtain © ª G(c) = 8β 2 c4 − 16(4β 2 + 4β + 1)c2 + 64(1 + β)(1 + 3β) .

(27)

© ª © ª G0 (c) = 32β 2 c3 − 32(4β 2 + 4β + 1)c = 32c (c2 − 4)β 2 − 4β − 1) .

(28)

From the expression (29), we observe that G0 (c) ≤ 0, for 0 ≤ β ≤ 1 and 0 ≤ c ≤ 2. Hence, G(c) is a monotonically decreasing function of c in the interval [0, 2], whose maximum value occurs at c = 0. From (28), we obtain Gmax = G(0) = 64(1 + β)(1 + 3β).

(29)

From the relations (18) and (30), after simplifying, we get |d1 c1 c3 + d2 c21 c2 + d3 c22 | ≤ 16(1 + β)(1 + 3β). From the expressions (16) and (31), upon simplification, we obtain · ¸ 1 |a2 a4 − a23 | ≤ . (1 + 2β)2

(30)

(31)

This completes the proof of our theorem. Proposition 2.1. Choosing β = 0, from (32), we obtain |a2 a4 − a23 | ≤ 1. Proposition 2.2. For the choice of β = 1, from (32), we get |a2 a4 − a23 | ≤ 19 . Both the results coincide with those of Ramreddy and Vamshee Krishna [23] . P∞ Proposition 2.3. For f (z) = z + n=2 an z n ∈ ST , we have |a2 a4 − a23 | ≤ 1. Therefore, we conclude that the upper bound to the second Hanel determinant of starlike function and a starlike function with respect to symmetric points is the same.

References [1] Afaf Abubaker and M. Darus, Hankel determinant for a class of analytic functions involving a generalized linear differential operator, Int. J. Pure Appl. Math., 69(2011), No. 4, 429-435. [2] R. M. Ali, Coefficients of the inverse of strongly starlike functions, Bull. Malays. Math. Sci. Soc., (second series), 26(2003), 63-71. [3] O. Al- Refai and M. Darus, Second Hankel determinant for a class of analytic functions defined by a fractional operator, European J. Sci. Res., 28(2009), No. 2, 234-241. [4] R. N. Das and Prithvipal Singh, On a subclass of schlicht mappings. Ind. J. Pure Appl. Math., 8(1977), 864-872. [5] R. Ehrenborg, The Hankel determinant of exponential polynomials, Amer. Math. Monthly., 107(2000), No. 6, 557-560. [6] A. W. Goodman, Univalent functions Vol. I and Vol. II, Mariner publishing Comp. Inc., Tampa, Florida, 1983. [7] U. Grenander and G. Szeg¨ o, Toeplitz forms and their applications, Second edition. Chelsea Publishing Co., New York, 1984.


98

D. Vamshee Krishna and T. Ramreddy

No. 4

[8] A. Janteng, S. A. Halim and M. Darus, Estimate on the Second Hankel Functional for Functions whose derivative has a positive real part, J. Qual. Meas. Anal.,(JQMA), 4(2008), No. 1, 189-195. [9] A. Janteng, S. A. Halim and M. Darus, Hankel determinant for starlike and convex functions, Int. J. Math. Anal., 1(2007), No. 13, 619-625. [10] A. Janteng, S. A. Halim and M. Darus, Coefficient inequality for a function whose derivative has a positive real part, J. Inequal. Pure Appl. Math., 7(2006), No. 2, 1-5. [11] J. W. Layman, The Hankel transform and some of its properties, J. Integer Seq., 4(2001), No. 1, 1-11. [12] T. H. Mac Gregor, Functions whose derivative have a positive real part, Trans. Amer. Math. Soc., 104(1962), No. 31, 532-537. [13] A. K. Mishra and P. Gochhayat, Second Hankel determinant for a class of Analytic Functions Defined by Fractional Derivative, Int. J. Math. Math. Sci., Article ID 153280, (2008), 1-10. [14] G. Murugusundaramoorthy and N. Magesh, Coefficient inequalities for certain classes of analytic functions associated with Hankel determinant, Bull Math Anal. Appl., 1(2009), No. 3, 85-89. [15] J. W. Noonan and D. K. Thomas, On the second Hankel determinant of a really mean p-Valent functions, Trans. Amer. Math. Soc., 223(1976), No. 2, 337-346. [16] K. I. Noor, Hankel determinant problem for the class of functions with bounded boundary rotation, Rev. Roum. Math. Pures Et Appl., 28(1983), No. 8, 731-739. [17] S. Owa and H. M. Srivastava, Univalent and starlike generalised hypergeometric functions, Canad. J. Math., 39(1987), No. 5, 1057-1077. [18] Ch. Pommerenke, Univalent functions, Vandenhoeck and Ruprecht, Gottingen, (1975). [19] Ch. Pommerenke, On the Hankel determinants of univalent functions, Mathematica, (1967), 108-112. [20] Ch. Pommerenke, On the coefficients and Hankel determinants of univalent functions, J. London Math. Soc., (1966), 111-122. [21] Prithvipalsingh, A study of some subclasses of analytic functions in the unit disc, Ph. D Thesis (1979). [22] T. Ramreddy, A study of certain subclasses of univalent analytic functions, Ph. D Thesis (1983). [23] T. Ramreddy and D. Vamshee krishna, Hankel determinant for starlike and convex functions with respect to symmetric points, J. Ind. Math. Soc., 79(2012), 161-171. [24] Ratanchand, Some aspects of functions analytic in the unit disc, Ph. D Thesis (1978). [25] K. Sakaguchi, On a certain univalent mapping, J. Math. Soc. Japan, 11(1959), 72-75. [26] B. Simon, Orthogonal polynomials on the unit circle, Part 1. Classical theory. American Mathematical Society Colloquium Publications, 54, Part 1. American Mathematical Society, Providence, RI, 2005.


Scientia Magna Vol. 9 (2013), No. 3, 99-106

Existence and uniqueness of positive solution for second order integral boundary value problem Yonghong Ding Department of Mathematics, Tianshui Normal University, Tianshui, PR China E-mail: dyh198510@126.com Abstract This paper deal with the existence and uniqueness of positive solution for the integral boundary value problem   −u00 (t) = f (t, u(t)), t ∈ [0, 1];  au(0) − bu0 (0) = R 1 g(s)u(s)ds, cu(1) + du0 (1) = R 1 h(s)u(s)ds. 0

0

The discussion is based on the method of lower and upper solutions and maximal principle. Keywords Lower and upper solution, fixed point, maximal principle, positive solutions. 2000 Mathematics Subject Classification: 34B15, 34B18

§1. Introduction We consider the integral boundary value problem   −u00 (t) = f (t, u(t)), t ∈ [0, 1];  au(0) − bu0 (0) = R 1 g(s)u(s)ds, cu(1) + du0 (1) = R 1 h(s)u(s)ds, 0

(1)

0

where f : [0, 1] × [0, + ∞) → [0, + ∞) is continuous. g, h ∈ L1 [0, 1] are nonnegative, a, b, c, d > 0 and ρ = ac + ad + bc > 0. The (1) arises in many different areas of applied mathematics and physics, and only its positive solution is significant in some practice. For the special cases of (1), the existence of positive solutions has been widely investigate by many authors. For details and reference see [1-7]. The main tools used in these papers are fixed point theorems. However, to the author’s knowledge, few papers can be found in the literature on existence of positive solutions for integral boundary value problem by using lower and upper solution method. In [8], the authors used the method of lower and upper solutions to research second order multi-point boundary value problem. Being directly motivated by [8], in this paper, by constructing a pair of lower and upper solution and combine with maximal principle, we will show that (1) has a uniqueness positive solution under that f (t, u) is decreasing on u.


100

Yonghong Ding

No. 3

§2. Preliminaries For convenience, we denote Z 1 Z 1 as + b c + d − cs 1 1 H= h(s)ds, G = g(s)ds, C = , D= , ρ ρ 1 − H 1 − G 0 0 Z 1 Z 1 Z 1 Z 1 c + d − cs as + b K= h(s)ds, F = g(s)ds, R = h(s)ds, S = g(s)ds, ρ ρ 0 0 0 0 N=

(a + b)(c + d) [C(a + b) + (d + c)CDF ]R [CKD(a + b) + (d + c)D]S , M =1+ + , ρ ρ(1 − CKDF ) ρ(1 − CKDF ) A(t) =

C(at + b) + (d + c − ct)CDF CKD(at + b) + (d + c − ct)D , B(t) = . ρ(1 − CKDF ) ρ(1 − CKDF )

We assume the following condition throughout: (H1)

H, G ∈ [0, 1), CKDF ∈ [0, 1).

Definition 2.1. A function α ∈ C 2 [0, 1] is called a lower solution of the (1) if it satisfies   −α00 (t) ≤ f (t, α(t)), t ∈ [0, 1];  aα(0) − bα0 (0) ≤ R 1 g(s)α(s)ds, cα(1) + dα0 (1) ≤ R 1 h(s)α(s)ds. 0 0 Analogously, a function β ∈ C 2 [0, 1] is called a upper solution of the (1) if it satisfies the reversed inequalities. In order to prove our main results, we need the following maximal principle. Lemma 2.1. Assume that (H1) holds. Let u ∈ C 2 [0, 1] and satisfies   −u00 (t) ≥ 0, t ∈ [0, 1]; (2)  au(0) − bu0 (0) ≥ R 1 g(s)u(s)ds, cα(1) + dα0 (1) ≥ R 1 h(s)u(s)ds, 0

0

then u(t) ≥ 0, t ∈ [0, 1]. Proof. Let   −u00 (t) = y(t), t ∈ [0, 1];  au(0) − bu0 (0) − R 1 g(s)u(s)ds = r1 , cu(1) + du0 (1) − R 1 h(s)u(s)ds = r2 , 0 0

(3)

then r1 ≥ 0, r2 ≥ 0, y(t) ≥ 0, t ∈ [0, 1]. By integrating (3) on [0, t], we have Z

t

y(s)ds + u0 (0).

(4)

(t − s)y(s)ds + u0 (0)t + u(0).

(5)

u0 (t) = − 0

Thus,

Z u(t) = −

t

0

Let t = 1 in (4) and (5), then Z u0 (1) = − 0

1

y(s)ds + u0 (0),

(6)


Vol. 9 Existence and uniqueness of positive solution for second order integral boundary value problem

Z

1

u(1) = −

(1 − s)y(s)ds + u0 (0) + u(0).

0

R1

According to the boundary condition cu(1) + du0 (1) − Z

Z

1

−c

(7)

h(s)u(s)ds = r2 , we have

0

Z

1

0

y(s)ds + du (0) −

0

h(s)u(s)ds = r2 .

0 1 a

By u(0) = Z

a u (0) = [c ρ

¡

bu0 (0) +

R1 0

0

¢ g(s)u(s)ds + r1 , Z

1

0

1

0

(1 − s)y(s)ds + cu (0) + cu(0) − d

101

1

0

c y(s)ds − a

Z

1

(1 − s)y(s)ds + d 0

Z

Z

1

1

g(s)u(s)ds + 0

0

c h(s)u(s)ds − r1 + r2 ], (8) a

therefore, u(0) =

b [c ρ

Z

1

(1 − s)y(s)ds + d

y(s)ds −

0

0

+

1 a

Z

1

0

c a

Z

Z

1

1

c h(s)u(s)ds − r1 + r2 ] a

g(s)u(s)ds + 0

0

1 g(s)u(s)ds + r1 . a

(9)

From (5), (8) and (9), we have Z

Z

1

u(t) =

1

G(t, s)y(s)ds + 0

0

+ where

at + b h(s)u(s)ds + ρ

Z

1

0

d + c − ct g(s)u(s)ds ρ

cr1 (1 − t) + ar2 t + br2 + dr1 , ρ

 1  (b + as)(d + c − ct), G(t, s) = ρ  (b + at)(d + c − cs),

(10)

0 ≤ s ≤ t ≤ 1; 0 ≤ t ≤ s ≤ 1.

Then, from (10), Z

Z

1

h(s)u(s)ds = 0

0

1

£ h(s)

Z

Z

1

G(s, τ )y(τ )dτ + 0

0

1

as + b h(τ )u(τ )dτ + ρ

Z

1

d + c − cs g(τ )u(τ )dτ ρ

0

cr1 (1 − s) + ar2 s + br2 + dr1 ¤ ds, (11) ρ Z 1 Z 1 Z Z 1 Z 1 £ 1 as + b d + c − cs g(s)u(s)ds = g(s) G(s, τ )y(τ )dτ + h(τ )u(τ )dτ + g(τ )u(τ )dτ ρ ρ 0 0 0 0 0 +

+

cr1 (1 − s) + ar2 s + br2 + dr1 ¤ ds. ρ

(12)

Hence, from (11) and (12), Z

1

h(s)u(s)ds = 0

Z

1

h(s)

+C 0

£ 1 C 1 − CKDF

Z

1

Z

Z

1

1

Z

0

0

cr1 (1 − s) + ar2 s + br2 + dr1 ds + CKD ρ

0

Z

1

g(s) 0

1

g(s)G(s, τ )y(τ )dτ ds

h(s)G(s, τ )y(τ )dτ ds+CKD 0

cr1 (1 − s) + ar2 s + br2 + dr1 ¤ ds . ρ (13)


102

Yonghong Ding

and Z 1 g(s)u(s)ds = 0

Z

1

+CDF

h(s) 0

£ 1 CDF 1 − CKDF

Z

1

Z

No. 3

Z

1

1

Z

1

h(s)G(s, τ )y(τ )dτ ds+D 0

g(s)G(s, τ )y(τ )dτ ds

0

0

cr1 (1 − s) + ar2 s + br2 + dr1 ds + D ρ

Z

1

g(s) 0

0

cr1 (1 − s) + ar2 s + br2 + dr1 ¤ ds . ρ (14)

From (10), (13) and (14), we get Z

Z

1

u(t) =

1

Z

G(t, s)y(s)ds + A(t) 1

+A(t) 0

1

Z

1

h(s)G(s, τ )y(τ )dτ ds + B(t)

0

Z

Z

1

0

0

cr1 (1 − s) + ar2 s + br2 + dr1 h(s) ds + B(t) ρ +

g(s)G(s, τ )y(τ )dτ ds

0

Z

1

g(s) 0

0

cr1 (1 − s) + ar2 s + br2 + dr1 ds ρ

cr1 (1 − t) + ar2 t + br2 + dr1 . ρ

Therefore u(t) ≥ 0, t ∈ [0, 1]. Lemma 2.2. Assume (H1) holds. Let ϕ ∈ C[0, 1], then boundary value problem   −u00 (t) = ϕ(t), t ∈ [0, 1]; R R1 1  au(0) − bu0 (0) = g(s)u(s)ds, cu(1) + du0 (1) = h(s)u(s)ds, 0

(15)

0

has a unique solution u(t) which is given by Z

1

u(t) =

γ(t, s)ϕ(s)ds, 0

where

Z

Z

1

γ(t, s) = G(t, s) + A(t)

1

G(s, τ )h(τ )dτ + B(t) 0

G(s, τ )g(τ )dτ. 0

Proof. First suppose that u ∈ C[0, 1] is a solution of BVP(15). Choose r1 = r2 = 0 in lemma 2.1, we can get Z 1 Z 1Z 1 Z 1Z 1 u(t) = G(t, s)ϕ(s)ds + A(t) h(s)G(s, τ )ϕ(τ )dτ ds + B(t) g(s)G(s, τ )ϕ(τ )dτ ds 0

Z =

0

0

0

0

1

γ(t, s)ϕ(s)ds. 0

R1

Conversely, suppose u(t) = u00 (t) =

0

γ(t, s)ϕ(s)ds, then

1 [−c(at + b)ϕ(t) − a(d + c − ct)ϕ(t)] = −ϕ(t). ρ

By computation, we have Z 0

au(0) − bu (0) =

Z

1

g(s)u(s)ds, 0

Thus u(t) is a solution of BVP(15).

0

cu(1) + du (1) =

1

h(s)u(s)ds. 0


Vol. 9 Existence and uniqueness of positive solution for second order integral boundary value problem

103

Lemma 2.3. Suppose (H1) holds. Then (i) δG(t, t)G(s, s) ≤ G(t, s) ≤ G(s, s) ≤ N, ∀s, t ∈ [0, 1]; (ii) σz(t)G(t, t) ≤ γ(t, s) ≤ M G(s, s), ∀s, t ∈ [0, 1], where Z 1 Z 1 ¢ ¡ ρ , σ =δ 1+ G(τ, τ )h(τ )dτ + G(τ, τ )g(τ )dτ , δ= (a + b)(c + d) 0 0 z(t) = min{G(t, t), A(t), B(t)}. Proof. (i) From the expression of G(t, s) we see that G(t, s) ≤ G(s, s) ≤ N, ∀s, t ∈ [0, 1]. Furthermore, we have ρ ρ G(t, s) = ≥ = δ. G(s, s)G(t, t) (a + bs)(c + d − cs) (a + b)(c + d) So δG(t, t)G(s, s) ≤ G(t, s). Therefore, (i) holds. (ii) On the one hand, Z

Z

1

γ(t, s) ≥ δG(t, t)G(s, s) + A(t)

δG(s, s)G(τ, τ )h(τ )dτ + B(t) 0

¡ = δG(s, s) G(t, t) + A(t) ¡ ≥ δz(t)G(s, s) 1 +

Z

Z

Z

1

0

Z

G(τ, τ )h(τ )dτ + 0

δG(s, s)G(τ, τ )g(τ )dτ 0

1

G(τ, τ )h(τ )dτ + B(t)

1

1

G(τ, τ )g(τ )dτ

¢

0 1

G(τ, τ )g(τ )dτ

¢

0

= σz(t)G(s, s). On the other hand, Z

Z

1

γ(t, s) ≤ G(s, s) + A(t)

G(s, s)h(τ )dτ + B(t) 0

¡ = G(s, s) 1 + A(t)

Z

Z

1

h(τ )dτ + B(t) 0

1

G(s, s)g(τ )dτ 0

1

g(τ )dτ

¢

0

= M G(s, s).

§3. Main results Theorem 3.1. Assume (H1) holds. If f satisfies the following condition: (H2) f : [0, 1] × [0, + ∞) → [0, + ∞) is continuous, f (t, u) 6≡ 0, and f (t, u) is decreasing on u. Then (1) has a unique positive solution. Proof. Based on the preceding preliminaries, we can divide our proof into three steps: Step 1. We first construct a pair of lower and upper solution of (1). Let Z a(t) =

Z

1

γ(t, s)f (s, N )ds, 0

b(t) =

1

γ(t, s)f (s, z(s))ds. 0


104

Yonghong Ding

No. 3

Since f (t, u) is decreasing on u, t ∈ [0, 1], and by lemma 2.3, we obtain Z 1 Z 1 σz(t) G(s, s)f (s, N )ds ≤ a(t) ≤ b(t) ≤ M G(s, s)f (s, z(s))ds. 0

0

Denote Z k1 = M

Z

1

G(s, s)f (s, z(s))ds,

k2 = σ

0

1

G(s, s)f (s, N )ds, 0

1 1 , }, k1 k2

l = min{1,

L = max{1,

1 1 , }. k1 k2

It is easy to see that l ≤ 1,

lk1 ≤ 1,

L ≥ 1,

Lk2 ≥ 1,

and la(t) ≤ lk1 ≤ 1 ≤ N,

z(t) ≤ Lk2 z(t) ≤ Lb(t).

Let α(t) = la(t), β(t) = Lb(t), then −α00 (t) − f (t, α(t)) =

lf (t, N ) − f (t, la(t))

≤ lf (t, la(t)) − f (t, la(t)) ≤ 0, −β 00 (t) − f (t, β(t)) = Lf (t, z(t)) − f (t, Lb(t)) ≥ Lf (t, Lb(t)) − f (t, Lb(t)) ≥ 0. By calculations we have Z

1

aα(0) − bα0 (0) =

Z

h(s)α(s)ds,

0

Z aβ(0) − bβ 0 (0) =

1

g(s)α(s)ds, cα(1) + dα0 (1) = 0

1

0

Z g(s)β(s)ds, cβ(1) + dβ 0 (1) =

1

h(s)β(s)ds. 0

Therefore, α(t) is a lower solution of (1), and β(t) is a upper solution of (1). Step 2. We prove (1) has a positive solution u e(t) satisfying α(t) ≤ u e(t) ≤ β(t). For any x(t) ∈ C[0, 1], define   x < α(t);   f (t, α(t)), F (t, x) = f (t, x(t)), α(t) ≤ x ≤ β(t);    f (t, β(t)), x > β(t). Then F : [0, 1] × [0, + ∞)× → [0, + ∞) is continuous and bounded. Consider the boundary value problem   −u00 (t) = F (t, u(t)), t ∈ [0, 1]; (16)  au(0) − bu0 (0) = R 1 g(s)u(s)ds, cu(1) + du0 (1) = R 1 h(s)u(s)ds. 0

0


Vol. 9 Existence and uniqueness of positive solution for second order integral boundary value problem

105

We prove (16) has at least one solution. Define the operator T : C[0, 1] → C[0, 1] as follows: Z

1

(T u)(t) =

γ(t, s)F (s, u(s))ds. 0

By lemma 2.2, each fixed point of T is a solution for (16). It is well known that T : C[0, 1] → C[0, 1] is completely continuous and F is bounded, by using Schauder fixed point theorem, we obtain that T has fixed point u e ∈ C[0, 1]. In the following we show that α(t) ≤ u e(t) ≤ β(t), this means that F (t, u e(t)) = f (t, u e(t)), hence, u e(t) is also a solution of (1). Assume α(t) u e(t), then there exists t0 ∈ [0, 1] such that α(t0 ) > u e(t0 ). Since α(t) and u e(t) are continuous, there exists a subset [t1 , t2 ] ⊂ [0, 1] with t0 ∈ (t1 , t2 ) such that α(t) > u e(t), t ∈ [t1 , t2 ]. Set w(t) = u e(t) − α(t), © ª a1 = inf t1 | ∃[t1 , t2 ] ∈ [0, 1], t0 ∈ (t1 , t2 ) such that w(t) < 0 for t ∈ [t1 , t2 ] , © ª b1 = sup t2 | ∃[t1 , t2 ] ∈ [0, 1], t0 ∈ (t1 , t2 ) such that w(t) < 0 for t ∈ [t1 , t2 ] . Then w(t) < 0,

t ∈ (a1 , b1 ),

(17)

and w(a1 ) = w(b1 ) = 0, w0 (a1 ) ≤ 0, w0 (b1 ) ≥ 0. On the other hand, for any t ∈ [a1 , b1 ], we have −w00 (t)

= −e u00 (t) + α00 (t) = F (t, u e(t)) + α00 (t) = f (t, α(t)) + α00 (t) ≥ 0.

and

Z aw(a1 ) − bw0 (a1 ) ≥

Z

1

g(s)w(s)ds, 0

cw(b1 ) + dw0 (b1 ) ≥

1

h(s)w(s)ds. 0

By lemma 2.1, we have w(t) ≥ 0, t ∈ [a1 , b1 ], which contradicts (17). Thus α(t) ≤ u e(t). Similarly, we assert that u e(t) ≤ β(t). From assumption (H2), it follows that α(t) > 0. Therefore, u e(t) is a positive solution of (1). Step 3. We prove uniqueness. Suppose u(t) is also a positive solution of (1.1) and u(t) 6≡ u e(t). Then there exists ξ ∈ [0, 1] such that u(ξ) 6= u e(ξ), without loss of generality, we assume that u(ξ) < u e(ξ). Set v(t) = u(t) − u e(t), it is similar to step 2, we can get a contradiction. So u e(t) is a unique positive solution.


106

Yonghong Ding

No. 3

References [1] Z. Yang, Positive solutions of a second order integral boundary value problem, J. Math. Anal. Appl., 321(2006), 751-765. [2] Z. Yang, Existence and uniqueness of positive solutions for an integral boundary value problem, Nonlinear Anal, 69(2008), 3910-3918. [3] Y. Li and F. Li, Sign-changing solution to second-order integral boundary value problem, Nonlinear Anal, 69(2008), 1179-1187. [4] Z. Yang, Existence and nonexistence results for positive solutions of an integral boundary value problem, Nonlinear Anal, 65(2006), 1489-1511. [5] M. Feng, D. Ji and W. Ge, Positive solution for a class of boundary value problem with integral boundary conditions in Banach space, J. Comput. Appl. Math., 222(2008), 351-363. [6] L. Kong, Second order singular boundary value problem with integral boundary conditions, Nonlinear Anal, 72(2010), 2628-2638. [7] A. Boucherif, Second-order boundary value problem with integral boundary conditions, Nonlinear Anal, 70(2009), 364-371. [8] X. Du, Z. Zhao, Existence and uniqueness of positive solutions to a class of singular m-point boundary value problems, Appl. Math. Comput., 198(2008), 487-493.


Scientia Magna Vol. 9 (2013), No. 3, 107-109

Smarandache bisymmetric geometric determinat sequences Aldous Cesar F. Bueno Department of Mathematics and Physics, Central Luzon State University, Science City of Mu˜ noz 3120, Nueva Ecija, Philippines Email: aldouz− cezar@yahoo.com Abstract In this paper, the Smarandache bisymmetric geometric determinant sequence was defined and the formula for its n-th term was obtained. Keywords Smarandache bisymmetric geometric determinant sequence.

§1. Introduction and preliminaries Majumdar [1] gave the formula for n-th term of the following sequences: Smarandache cyclic natural determinant sequence, Smarandache cyclic arithmetic determinant sequence, Smarandache bisymmetric natural determinant sequence and Smarandache bisymmetric arithmetic determinant sequence. Definition 1.1. The Smarandache bisymmetric geometric determinant sequence denoted by {SBGDS(n)} is given by           ¯   ¯  ¯ a {SBGDS(n)} = |a|, ¯¯   ¯ ar          

¯ ¯ a ¯ ¯ ¯ ar ¯ ¯ ¯ ¯ ¯ ar2 ¯ ar ¯ , · · · , ¯¯ .. ¯ ¯ a ¯ . ¯ ¯ ¯ arn−2 ¯ ¯ ¯ arn−1

ar

ar2

···

arn−2

ar2

ar3

···

arn−1

ar3 .. .

ar4 .. .

··· .. .

arn−2 .. .

arn−1

arn−2

···

ar2

arn−2

arn−3

···

ar

 ¯  arn−1 ¯¯    ¯  n−2 ¯   ar  ¯   ¯  n−3 ¯  ar ¯ ¯,··· . .. ¯   . ¯   ¯   ¯   ar ¯   ¯   ¯ a

For the rest of this paper, let |A| be the notation for the determinant of a matrix A.


108

Aldous Cesar F. Bueno

No. 3

§2. Preliminary result Lemma 2.1. ¯ ¯ 1 ¯ ¯ ¯ r ¯ ¯ ¯ r2 ¯ |K| = ¯ . ¯ .. ¯ ¯ ¯ rn−2 ¯ ¯ ¯ rn−1

r

r2

···

rn−2

r2

r3

···

rn−1

r3 .. .

r4 .. .

··· .. .

rn−2 .. .

rn−1

rn−2

···

r2

rn−2

rn−3

···

r

¯ rn−1 ¯¯ ¯ rn−2 ¯¯ ¯ rn−3 ¯¯ b n−1 c ¡rn − rn−2 ¢n−1 , .. ¯¯ = (−1) 2 . ¯ ¯ r ¯¯ ¯ 1 ¯

where bxc is the floor function. Proof. 

1

  r    r2  K= .  ..    rn−2  rn−1        ∼     

      ∼     

r2

···

rn−2

r2

r3

···

rn−1

r3 .. .

r4 .. .

··· .. .

rn−2 .. .

rn−1

rn−2

···

r2

rn−2

rn−3

···

r

rn−1

 rn−2    n−3  r  ..  .    r   1

1

r

r2

···

rn−2

rn−1

0

0

0

···

0

rn − rn−2

0 .. .

0 .. .

0 .. .

··· .. .

rn − rn−2 .. .

rn+1 − rn−3 .. .

0

0

rn − rn−2

···

r2n−4 − r2

r2n−3 − r

rn+1 − rn−1

···

r2n−3 − r

r2n−2 − 1

r2

···

rn−2

rn−1

rn+1 − rn−1

···

r2n−3 − r

r2n−2 − 1

0 rn − rn−2 

r

1

r

0 rn − rn−2 0 .. .

0 .. .

rn − rn−2 .. .

··· .. .

r2n−4 − r2 .. .

r2n−3 − r .. .

0

0

0

···

rn − rn−2

rn+1 − rn−3

0

0

0

···

0

rn − rn−2

                    .     

Via the operations rk R1 − Rk+1 → Rk+1 where k = 1, 2, · · · , n − 1 and followed by ¥ ¦ Rn ↔ R2 , Rn−1 ↔ R3 , and so on and there will be a total of n−1 inversions. Solving for 2 n−1 b c 2 gives the desired result. the determinant of the last matrix multiplied to (−1)


Vol. 9

Smarandache bisymmetric geometric determinat sequences

109

§3. Main result Theorem 3.1.   if n = 1;   a, ¡ ¢ SBGDS(n) = a2 1 − r2 , if n = 2;   ¡ ¢ n−1  n n n−2 n−1 b c 2 a r −r , if n > 2. (−1) Proof. The cases for n = 1 and n = 2 are trivial. For n > 2, ¡ ¢n−1 n−1 SBGDS(n) = |aK| = an |K| = (−1)b 2 c an rn − rn−2 , via the lemma 2.1.

References [1] A. A. K. Majumdar, On some Smarandache determinant sequence, Scientia Magna, 4(2008), No. 2, 89-95.


Scientia Magna Vol. 9 (2013), No. 3, 110-115

Certain integral involving inverse hyperbolic function Salahuddin Mewar University, Gangrar, Chittorgarh(Rajasthan), India E-mails: vsludn@gmail.com, sludn@yahoo.com Abstract In this paper we have developed some indefinite integrals involving inverse Hyperbolic function. The results represent here are assumed to be new. Keywords Hypergeometric function , elliptic integral. 2000 Mathematics Subject Classification: 33D50,33D60,33C75,33E05

§1. Introduction and preliminaries In integral calculus, elliptic integrals originally arose in connection with the problem of giving the arc length of an ellipse. They were first studied by Giulio Fagnano and Leonhard Euler. Modern mathematics defines an ”elliptic integral” as any function f which can be expressed in the form Z x ³ p ´ f (x) = R t, P (t) dt, (1.1) c

where R is a rational function of its two arguments, P is a polynomial of degree 3 or 4 with no repeated roots, and c is a constant. In general, elliptic integrals cannot be expressed in terms of elementary functions. Exceptions to this general rule are when P has repeated roots, or when R(x, y) contains no odd powers of y. However, with the appropriate reduction formula, every elliptic integral can be brought into a form that involves integrals over rational functions and the three Legendre canonical forms (i.e. the elliptic integrals of the first, second and third kind). Besides the Legendre form, the elliptic integrals may also be expressed in Carlson symmetric form. Additional insight into the theory of the elliptic integral may be gained through the study of the Schwarz-Christoffel mapping. Historically, elliptic functions were discovered as inverse functions of elliptic integrals. Incomplete elliptic integrals are functions of two arguments, complete elliptic integrals are functions of a single argument. Definition 1.1. The incomplete elliptic integral of the first kind F is defined as Z 2

F (ψ, k) = F (ψ | k ) = F (sin ψ; k) = 0

ψ

dθ p . 1 − k 2 sin2 θ

(1.2)


Vol. 9

111

Certain integral involving inverse hyperbolic function

This is the trigonometric form of the integral, substituting t = sin θ, x = sin ψ, one obtains Jacobi’s form: Z x dt p F (x; k) = . (1.3) 2 (1 − t )(1 − k 2 t2 ) 0 Equivalently, in terms of the amplitude and modular angle one has: Z

ψ

dθ p . 1 − (sin θ sin α)2

F (ψ\α) = F (ψ, sin α) = 0

(1.4)

In this notation, the use of a vertical bar as delimiter indicates that the argument following it is the ”parameter” (as defined above), while the backslash indicates that it is the modular angle. The use of a semicolon implies that the argument preceding it is the sine of the amplitude: F (ψ, sin α) = F (ψ | sin2 α) = F (ψ\α) = F (sin ψ; sin α). Definition 1.2. Incomplete elliptic integral of the second kind E is defined as p E(ψ, k) = E(ψ | k 2 ) = E(sin ψ; k) = 1 − k 2 sin2 θ dθ. Substituting t = sin θ and x = sin ψ , one obtains Jacobi’s form: Z x√ 1 − k 2 t2 √ E(x; k) = dt. 1 − t2 0

(1.5)

(1.6)

(1.7)

Equivalently, in terms of the amplitude and modular angle: Z

ψ

E(ψ\α) = E(ψ, sin α) =

p 1 − (sin θ sin α)2 dθ.

(1.8)

0

Definition 1.3. Incomplete elliptic integral of the third kind Π is defined as Z

ψ

Π(n; ψ\α) = 0

or

Z Π(n; ψ | m) = 0

dθ 1 , 2 1 − (sin θ sin α)2 1 − n sin θ

sin ψ

(1.9)

1 dt . 1 − nt2 (1 − mt2 )(1 − t2 )

(1.10)

The number n is called the characteristic and can take on any value, independently of the other arguments. Definition 1.4. Elliptic Integrals are said to be ’complete’ when the amplitude ψ = π2 and therefore x = 1. The complete elliptic integral of the first kind K may thus be defined as Z K(k) = 0

π 2

dθ p = 1 − k 2 sin2 θ

Z

1

dt

p 0

(1 − t2 )(1 − k 2 t2 )

or more compactly in terms of the incomplete integral of the first kind as ³π ´ K(k) = F , k = F (1; k). 2

,

(1.11)

(1.12)


112

Salahuddin

No. 3

It can be expressed as a power series ¸2 ∞ · ∞ i2 (2n)! π Xh πX 2n k = P (0) k 2n , K(k) = 2n 2 n=0 22n (n!)2 2 n=0 where Pn is the Legendre polynomial, which is equivalent to " # µ ¶2 µ ¶2 ½ ¾2 π 1 1.3 (2n − 1)!! 2 4 2n K(k) = 1+ k + k + ··· + k + ··· , 2 2 2.4 (2n)!!

(1.13)

(1.14)

where n!! denotes the double factorial. In terms of the Gauss hypergeometric function, the complete elliptic integral of the first kind can be expressed as ³1 1 ´ π K(k) = 2 F1 , ; 1; k 2 . (1.15) 2 2 2 The complete elliptic integral of the first kind is sometimes called the quarter period. It can most efficiently be computed in terms of the arithmetic-geometric mean: K(k) =

π 2

agm(1 − k, 1 + k)

.

(1.16)

The complete elliptic integral of the second kind E is proportional to the circumference of the ellipse C: C = 4aE(e), where a is the semi-major axis, e is the eccentricity, and E may be defined as Z π2 p Z 1√ 1 − k 2 t2 2 2 √ E(k) = 1 − k sin θ dθ = dt, 1 − t2 0 0 or more compactly in terms of the incomplete integral of the second kind as ³π ´ E(k) = E , k = E(1; k). 2

(1.17)

(1.18)

It can be expressed as a power series ¸2 2n ∞ · πX (2n)! k E(k) = , 2n 2 2 n=0 2 (n!) 1 − 2n which is equivalent to " # µ ¶2 2 µ ¶2 ½ ¾2 2n π 1 k 1 . 3 k4 (2n − 1)!! k E(k) = 1− − − ··· − − ··· . 2 2 1 2.4 3 (2n)!! 2n − 1

(1.19)

(1.20)

In terms of the Gauss hypergeometric function, the complete elliptic integral of the second kind can be expressed as ³1 1 ´ π E(k) = 2 F1 , − ; 1; k 2 . (1.21) 2 2 2 The complete elliptic integral of the third kind Π can be defined as Z π2 dθ p Π(n, k) = . (1.22) 2 0 (1 − n sin θ) 1 − k 2 sin2 θ


Vol. 9

113

Certain integral involving inverse hyperbolic function

Definition 1.5. A generalized hypergeometric function p Fq (a1 , · · · ap ; b1 , · · · bq ; z) is a function which can be defined in the form of a hypergeometric series, i.e., a series for which the ratio of successive terms can be written ck+1 P (k) (k + a1 )(k + a2 ) · · · (k + ap ) = = z, (1.23) ck Q(k) (k + b1 )(K + b2 ) · · · (k + bq )(k + 1) where k + 1 in the denominator is present for historical reasons of notation, and the resulting generalized hypergeometric function is written   a1 , a2 , · · · , ap ; ∞   X (a1 )k (a2 )k · · · (ap )k z k   , (1.24) z = p Fq  (b1 )k (b2 )k · · · (bq )k k! k=0 b1 , b 2 , · · · , b q ; or

   p Fq 

(ap ) ; (bq )

;

   ≡ F z  p q  

(aj )pj=1 (bj )qj=1

; ;

 ∞  X ((ap ))k z k  , z = ((bq ))k k!

(1.25)

k=0

where the parameters b1 , b2 , · · · , bq are neither zero nor negative integers and p, q are nonnegative integers. The p Fq series converges for all finite z if p ≤ q, converges for | z |< 1 if p 6= q + 1, diverges for all z, z 6= 0 if p > q + 1. The p Fq series absolutely converges for | z |= 1 if R(ζ) < 0, conditionally converges for p q P P | z |= 1, z 6= 0 if 0 ≤ R(ζ) < 1, diverges for | z |= 1, if 1 ≤ R(ζ), ζ = ai − bi . i=1

i=0

The function 2 F1 (a, b; c; z) corresponding to p = 2, q = 1, is the first hypergeometric function to be studied (and, in general, arises the most frequently in physical problems), and so is frequently known as ”the” hypergeometric equation or, more explicitly, Gauss’s hypergeometric function (Gauss 1812, Barnes 1908). To confuse matters even more, the term ”hypergeometric function” is less commonly used to mean closed form, and ”hypergeometric series” is sometimes used to mean hypergeometric function. The hypergeometric functions are solutions of Gaussian hypergeometric linear differential equation of second order z(1 − z)y 00 + [c − (a + b + 1)z]y 0 − aby = 0. The solution of this equation is h i ab a(a + 1)b(b + 1) 2 y = A0 1 + z+ z + ··· . 1! c 2! c(c + 1) This is the so-called regular solution, denoted ∞ h i X ab a(a + 1)b(b + 1) 2 (a)k (b)k z k z+ z + ··· = , 2 F1 (a, b; c; z) = 1 + 1! c 2! c(c + 1) (c)k k!

(1.26)

(1.27)

(1.28)

k=0

which converges if c is not a negative integer for all of | z |< 1 and on the unit circle | z |= 1 if R(c − a − b) > 0. It is known as Gauss hypergeometric function in terms of Pochhammer symbol (a)k or generalized factorial function.


114

Salahuddin

No. 3

§2. Main integrals · 1 p = (− sinh−1 φ)−m sinh−1 φm Γ(m + 1, − sinh−1 φ) 2 1 + x sinh−1 φ ¸ ³1 ´ −Γ(m + 1, sinh−1 φ) 1 F0 ; −; −x + Constant. 2 · Z dφ 1 p = (− cosh−1 φ)−m cosh−1 φm Γ(m + 1, − cosh−1 φ)+ −1 2 1 + x cosh φ ¸ ´ ³1 −1 Γ(m + 1, cosh φ) 1 F0 ; −; −x + Constant. 2 · Z dφ 1 −1 m −1 2 −m p = ι sin φ {sin φ } (−ι sin−1 φ)m Γ(m + 1, ι sin−1 φ)− 2 1 + x sin−1 φ ¸ ³1 ´ −(ι sin−1 φ)m Γ(m + 1, −ι sin−1 φ) 1 F0 ; −; −x + Constant. 2 · Z 1 dφ p = cos−1 φm {cos−1 φ2 }−m (−ι cos−1 φ)m Γ(m + 1, ι cos−1 φ)+ −1 2 1 + x cos φ ¸ ³1 ´ +(ι cos−1 φ)m Γ(m + 1, −ι cos−1 φ) 1 F0 ; −; −x + Constant. 2 Z

(2.1)

(2.2)

(2.3)

(2.4)

Derivation of (2.1): Z

Z

Z

p

−1

1 + x sinh

φ

=

1

(1 + x sinh−1 φ)− 2 dφ =

1

{1 − (−x sinh−1 φ)}− 2 dφ

Z X Z ∞ ∞ X ( 21 )m (−x sinh−1 φ)m ( 12 )m (−x)m dφ = (sinh−1 φ)m dφ m! m! m=0 m=0 ´ ³1 (− sinh−1 φ)−m sinh−1 φm Γ(m + 1, − sinh−1 φ) − Γ(m + 1, sinh−1 φ) F ; −; −x . 1 0 2 2 Proceeding the same way one can established the other integrals. =

References [1] Abramowitz Milton and Stegun A. Irene, Handbook of mathematical functions with formulas, graphs, and mathematical tables, New York, Dover, 1965. [2] Lars Ahlfors, Complex analysis: An introduction to the theory of analytic functions of one complex variable(3rd edition), New York, London, McGraw-Hill, 1979. [3] Alfred George Greenhill, The applications of elliptic functions, New York, Macmillan, 1892. [4] L. C. Andrews, Special function of mathematics for engineers, Second Edition, McGrawHill Co Inc., New York, 1992.


Vol. 9

Certain integral involving inverse hyperbolic function

115

[5] Bells Richard Wong Roderick, Special functions, A Graduate Text, Cambridge studies in advanced mathematics, 2010. [6] Borowski Ephraim and Borwein Jonathan, Mathematics, Collins dictionary(2nd edition), Glasgow: HarperCollins, 2002. [7] Crandall Richard and Pomeramce Carl, Prime Numbers: A computational perspective, New York, Springer, 2001. [8] J. Derbyshire, Prime Obsession: Bernhard Riemann and the greatest unsolved problem in Mathematics, New York, Penguin, 2004. [9] Graham L. Ronald, Knuth E. Donald, Patashnik and Oren, Concrete Mathematics, Reading Ma, Addison- Wesley, 1994. [10] Harris Hancock, Lectures on the theory of elliptic functions, New York, J. Wiley & sons, 1910. [11] S. G. Krantz, Handbook of complex variables, Boston, MA, Birkhser, 1999. [12] Lemmermeyer Franz, Reciprocity Laws: from Euler to Eisenstein, Berlin: Springer, 2000. [13] Louis V. King, On the direct numerical calculation Of elliptic functions and integrals, Cambridge University Press, 1924. [14] W. H. Press, S. A. Teukolsky, W. T. Vetterling, B. P. Flannery, Numerical Recipes: The art of scientific computing(3rd edition), New York, Cambridge University Press, 2007. [15] Ramanujan Srinivasa, Collected Papers, Providence RI: AMS / Chelsea, 2000. [16] Ribenboim, Paulo, The New Book of Prime Number Records, New York, Springer, 1996. [17] Salahuddin, Hypergeometric form of certain indefinite integrals, Global Journal of Science Frontier Research, 12(2012), 33-37. [18] R. A. Silverman, Introductory complex analysis, New York, Dover, 1984. [19] Titchmarsh Edward Charles and Heath-Brown David Rodney, The theory of the Riemann Zeta function(2nd edition), Oxford, 1986.


Scientia Magna Vol. 9 (2013), No. 3, 116-121

Cartesian product of fuzzy SU-ideals on SU-algebra Utsanee Leerawat

and Rattana Sukklin

Department of Mathematics Kasetsart University, Bangkok, Thailand E-mail: fsciutl@ku.ac.th, rattana.nueng@gmail.com Abstract In this paper, the notion of Cartesian product of fuzzy SU-ideals and Cartesian product of anti fuzzy SU-ideals on SU-algebra are introduced and some of their properties are investigated. Keywords Cartesian product of fuzzy SU-ideal, Cartesian product of anti fuzzy SU-ideal. 2000 Mathematics Subject Classification: 03E72, 08A72

§1. Introduction and preliminaries In 1965, Zadeh defined fuzzy subset of a non-empty set as a collection of objects with grade of membership in continum, with each object being assigned a value between 0 and 1 by a membership function [1] . In 1991, Xi applied the concept of fuzzy set in BCK-algebras and defined fuzzy subalgebra on BCK-algebras [2] . Recently, a new algebraic structure was presented as SU-algebra and a concept of ideal in SU-algebra [3] . Sukklin and Leerawat introduced the concept of fuzzy SU-ideal [4] and anti fuzzy SU-ideal [5] in SU-algebra. The cartesian product of two fuzzy sets [6] was introduce by Bhattacharya and Mukherjee in 1985. In 2011, Samy M. Moutafa, et al. introduced the notion of Cartesian product of fuzzy KU-ideals [6] and Cartesian product of anti fuzzy KU-ideals [7] on KU-algebras. In this paper, we introduce the concept of cartesian product of fuzzy SU-ideals and cartesian product of anti fuzzy SU-ideals on SU-algebra. Moreover, we investigate some of their properties. Definition 1.1. [3] A SU-algebra is a non-empty set X with a constant 0 and a binary operation “∗”satisfying the following axioms: (1) ((x ∗ y) ∗ (x ∗ z)) ∗ (y ∗ z) = 0, (2) x ∗ 0 = x, (3) if x ∗ y = 0 imply x = y, for all x, y, z ∈ X. From now on, a binary operation “∗”will be denoted by juxtaposition. Theorem 1.1.

[3]

Let X be a SU-algebra. Then the following results hold for all x, y ∈ X.

(1) xx = 0, (2) xy = yx, (3) 0x = x. Theorem 1.2. [3] Let X be a SU-algebra. A nonempty subset I of X is called a SUsubalgebra of X if xy ∈ I for all x, y ∈ I. 0 Corresponding

author is Utsanee Leerawat


Vol. 9

Cartesian product of fuzzy SU-ideals on SU-algebra

117

Definition 1.2. [3] Let X be a SU-algebra. A nonempty subset I of X is called a SU-ideal of X if it satisfies the following properties: (1) 0 ∈ I, (2) if (xy)z ∈ I and y ∈ I imply xz ∈ I, for all x, y, z ∈ X. Definition 1.3.

[1]

Let X be a set. A fuzzy set µ in X is a function µ : X → [0, 1].

[4]

Definition 1.4. Let X be a SU-algebra. A fuzzy set µ in X is called fuzzy SU-ideal of X if it satisfies the following conditions: (F1 ) µ(0) ≥ µ(x), (F2 ) µ(xz) ≥ min {µ((xy)z), µ(y)}, for all x, y, z ∈ X. Definition 1.5.[5] Let X be a SU-algebra. A fuzzy set µ∗ in X is called anti fuzzy SU-ideal of X if it satisfies the following conditions: (AF1 ) µ∗ (0) ≤ µ∗ (x), (AF2 ) µ∗ (xz) ≤ max {µ∗ ((xy)z), µ∗ (y)}, for all x, y, z ∈ X. Example 1.1. Let X = {0, 1, 2, 3} be a set in which operation ∗ is defined by the following:

Then X is a SU-algebra

[3]

0

1

2

3

0

0

1

2

3

1

1

0

3

2

2

2

3

0

1

3

3

2

1

0

.

Define a fuzzy set µ : X → [0, 1] by µ(0) = 1, µ(1) = 0.5 and µ(2) = µ(3) = 0. Then µ is a fuzzy SU-ideal in X [4] . Define a fuzzy set µ∗ : X → [0, 1] by µ∗ (0) = 0.3, µ∗ (1) = 0.6 and µ∗ (2) = µ∗ (3) = 0.7. Then µ∗ is an anti fuzzy SU-idealin X [5] .

§2. Definition and properties We first give the definition of cartesian product of fuzzy SU-ideals and cartesian product of anti fuzzy SU-ideals on SU-algebra and provide some its properties. Definition 2.1. Let X be a SU-algebra and µ, β be a fuzzy SU-ideals of X. The Cartesian product µ × β : X × X → [0, 1] is define by (µ × β)(x, y) = min {µ(x), β(y)} for all x, y ∈ X. Remark 2.1. If X be a SU-algebra, then X × X × · · · × X is a SU-algebra, where n is | {z } positive intergers.

n

Theorem 2.1. Let X be a SU-algebra and µ, β be a fuzzy sets of X. If µ and β are a fuzzy SU-ideals of X, then µ × β is a fuzzy SU-ideal of X × X. Proof. Let µ, β be a fuzzy SU-ideals of X.


118

U. Leerawat snd R. Sukklin

No. 3

(i) Let (x1 , x2 ) ∈ X × X, we have (µ × β)(0, 0)

= min {µ(0), β(0)} ≥ min {µ(x1 ), β(x2 )} = (µ × β)(x1 , x2 ).

Thus (µ × β)(0, 0) ≥ (µ × β)(x1 , x2 ) for all (x1 , x2 ) ∈ X × X. (ii) Let (x1 , x2 ), (y1 , y2 ), (z1 , z2 ) ∈ X × X, we have (µ × β)((x1 , x2 )(z1 , z2 )) = (µ × β)(x1 z1 , x2 z2 ) = min {µ(x1 z1 ), β(x2 z2 )} ≥ min {min {µ((x1 y1 )z1 ), µ(y1 )} , min {β((x2 y2 )z2 ), β(y2 )}} = min {min {µ((x1 y1 )z1 ), β((x2 y2 )z2 )} , min {µ(y1 ), β(y2 )}} = min {(µ × β)((x1 y1 )z1 , (x2 y2 )z2 ), (µ × β)(y1 , y2 )} . Thus (µ × β)((x1 , x2 )(z1 , z2 )) ≥ min {(µ × β)(((x1 , x2 )(y1 , y2 ))(z1 , z2 )), (µ × β)(y1 , y2 )}. Therefore µ × β is a fuzzy SU-ideal of X × X. Corollary 2.1 Let X be a SU-algebra and µ1 , µ2 , · · · , µn be a fuzzy sets of X. If µ1 , µ2 , · · · , µn are a fuzzy SU-ideals of X, then µ1 × µ2 × · · · × µn is a fuzzy SU-ideal of X × X × · · · × X , where n is positive intergers. | {z } n

Theorem 2.2. Let X be a SU-algebra and µ, β be a fuzzy sets of X such that µ × β is a fuzzy SU-ideal of X × X, then (i) Either µ(0) ≥ µ(x) or β(0) ≥ β(x) for all x ∈ X. (ii) If µ(0) ≥ µ(x) for all x ∈ X, then either β(0) ≥ µ(x) or β(0) ≥ β(x). (iii) If β(0) ≥ β(x) for all x ∈ X, then either µ(0) ≥ β(x) or µ(0) ≥ µ(x). (iv) Either µ or β is a fuzzy SU-ideal of X. Proof. Let µ × β is a fuzzy SU-ideal of X × X and x, y, z ∈ X. (i) Assume µ(0) ≥ µ(x) or β(0) ≥ β(x) is not true, there exists (a, b) ∈ X × X such that µ(0) < µ(a) and β(0) < β(b). We have (µ × β)(0, 0)

= min {µ(0), β(0)} < min {µ(a), β(b)} = (µ × β)(a, b).

Hence (µ × β)(0, 0) < (µ × β)(a, b), which is contradiction. Therefore either µ(0) ≥ µ(x) or β(0) ≥ β(x) for all x ∈ X. (ii) Let µ(0) ≥ µ(x) for all x ∈ X. Assume β(0) ≥ µ(x) or β(0) ≥ β(x) is not true, there exists (c, d) ∈ X × X such that β(0) < µ(c) and β(0) < β(d). We have (µ × β)(0, 0) = min {µ(0), β(0)} = β(0). So (µ × β)(c, d) = min {µ(c), β(d)} > β(0) = (µ × β)(0, 0). Hence (µ × β)(c, d) > (µ × β)(0, 0), which is contradiction. Therefore if µ(0) ≥ µ(x) for all x ∈ X, then either β(0) ≥ µ(x) or β(0) ≥ β(x). (iii) This proof is quite similar to (ii). (iv) (1) Let µ(0) ≥ µ(x) for all x ∈ X. By Theorem 3.4(ii), we have either β(0) ≥ µ(x) or β(0) ≥ β(x).


Vol. 9

Cartesian product of fuzzy SU-ideals on SU-algebra

119

If β(0) ≥ µ(x) for all x ∈ X, we have µ(x) = min {µ(x), β(0)}. Hence µ(x) = (µ × β)(x, 0). So µ(xz)

= min {µ(xz), β(0)} = (µ × β)(xz, 0) ≥ min {(µ × β)((xy)z), 0), (µ × β)(y, 0)} = min {µ((xy)z), µ(y)} .

Thus µ is a fuzzy SU-ideal of X. If β(0) ≥ β(x) for all x ∈ X, then β(0) < µ(x) for all x ∈ X. We have β(x) = min {µ(0), β(x)}. Hence β(x) = (µ × β)(0, x). So β(xz)

= min {µ(0), β(xz)} = (µ × β)(0, xz) ≥ min {(µ × β)(0, (xy)z)), (µ × β)(0, y)} = min {β((xy)z), β(y)} .

Thus β is a fuzzy SU-ideal of X. (2) In case β(0) ≥ β(x) for all x ∈ X, a proof is similar to (1). Definition 2.2. Let X be a SU-algebra and µ∗ , β ∗ be an anti fuzzy SU-ideals of X. The Cartesian product µ∗ × β ∗ : X × X → [0, 1] is define by (µ∗ × β ∗ )(x, y) = max {µ∗ (x), β ∗ (y)} for all x, y ∈ X. Theorem 2.3. Let X be a SU-algebra and µ∗ , β ∗ be a fuzzy sets of X. If µ∗ and β ∗ are an anti fuzzy SU-ideals of X, then µ∗ × β ∗ is an anti fuzzy SU-ideal of X × X. Proof. Let µ∗ , β ∗ be an anti fuzzy SU-ideals of X. (i) Let (x1 , x2 ) ∈ X × X, we have (µ∗ × β ∗ )(0, 0)

= max {µ∗ (0), β ∗ (0)} ≤ max {µ∗ (x1 ), β ∗ (x2 )} = (µ∗ × β ∗ )(x1 , x2 ).

Thus (µ∗ × β ∗ )(0, 0) ≤ (µ∗ × β ∗ )(x1 , x2 ) for all (x1 , x2 ) ∈ X × X. (ii) Let (x1 , x2 ), (y1 , y2 ), (z1 , z2 ) ∈ X × X, we have (µ∗ × β ∗ )((x1 , x2 )(z1 , z2 ))

= (µ∗ × β ∗ )(x1 z1 , x2 z2 ) = max {µ∗ (x1 z1 ), β ∗ (x2 z2 )} ≤ max {max {µ∗ ((x1 y1 )z1 ), µ∗ (y1 )} , max {β ∗ ((x2 y2 )z2 ), β ∗ (y2 )}} = max {max {µ∗ ((x1 y1 )z1 ), β ∗ ((x2 y2 )z2 )} , max {µ∗ (y1 ), β ∗ (y2 )}} = max {(µ∗ × β ∗ )((x1 y1 )z1 , (x2 y2 )z2 ), (µ∗ × β ∗ )(y1 , y2 )} .

Thus (µ∗ ×β ∗ )((x1 , x2 )(z1 , z2 )) ≤ max {(µ∗ × β ∗ )(((x1 , x2 )(y1 , y2 ))(z1 , z2 )), (µ∗ × β ∗ )(y1 , y2 )}. Therefore µ∗ × β ∗ is an anti fuzzy SU-ideal of X × X.


120

U. Leerawat snd R. Sukklin

No. 3

Corollary 2.2. Let X be a SU-algebra and µ∗1 , µ∗2 , · · · , µ∗n be a fuzzy sets of X. If µ∗2 , · · · , µ∗n are an anti fuzzy SU-ideals of X, then µ∗1 × µ∗2 × · · · × µ∗n is an anti fuzzy SU-ideal of X × X × · · · × X , where n is positive intergers. | {z } µ∗1 ,

n

Theorem 2.4. Let X be a SU-algebra and µ∗ , β ∗ be a fuzzy sets of X such that µ∗ × β ∗ is an anti fuzzy SU-ideal of X × X, then (i) Either µ∗ (0) ≤ µ∗ (x) or β ∗ (0) ≤ β ∗ (x) for all x ∈ X. (ii) If µ∗ (0) ≤ µ∗ (x) for all x ∈ X, then either β ∗ (0) ≤ µ∗ (x) or β ∗ (0) ≤ β ∗ (x). (iii) If β ∗ (0) ≤ β ∗ (x) for all x ∈ X, then either µ∗ (0) ≤ β ∗ (x) or µ∗ (0) ≤ µ∗ (x). (iv) Either µ∗ or β ∗ is an anti fuzzy SU-ideal of X. Proof. Let µ∗ × β ∗ is an anti fuzzy SU-ideal of X × X and x, y, z ∈ X. (i) Assume µ∗ (0) ≤ µ∗ (x) or β ∗ (0) ≤ β ∗ (x) is not true, there exists (a, b) ∈ X × X such that µ∗ (0) > µ∗ (a) and β ∗ (0) > β ∗ (b). We have (µ∗ × β ∗ )(0, 0) = max {µ∗ (0), β ∗ (0)} > max {µ∗ (a), β ∗ (b)} = (µ∗ × β ∗ )(a, b). Hence (µ∗ × β ∗ )(0, 0) > (µ∗ × β ∗ )(a, b), which is contradiction. Therefore either µ∗ (0) ≤ µ∗ (x) or β ∗ (0) ≤ β ∗ (x) for all x ∈ X. (ii) Let µ∗ (0) ≤ µ∗ (x) for all x ∈ X. Assume β ∗ (0) ≤ µ∗ (x) or β ∗ (0) ≤ β ∗ (x) is not true, there exists (c, d) ∈ X × X such that β ∗ (0) > µ∗ (c) and β ∗ (0) > β ∗ (d). We have (µ∗ × β ∗ )(0, 0)

= max {µ∗ (0), β ∗ (0)} = β ∗ (0).

So (µ∗ × β ∗ )(c, d)

= max {µ∗ (c), β ∗ (d)} < β ∗ (0) = (µ∗ × β ∗ )(0, 0).

Hence (µ∗ × β ∗ )(c, d) < (µ∗ × β ∗ )(0, 0), which is contradiction. Therefore if µ∗ (0) ≤ µ∗ (x) for all x ∈ X, then either β ∗ (0) ≤ µ∗ (x) or β ∗ (0) ≤ β ∗ (x). (iii) This proof is quite similar to (ii). (iv) (1) Let µ∗ (0) ≤ µ∗ (x) for all x ∈ X. By Theorem 4.4(ii), we have either β ∗ (0) ≤ µ∗ (x) or β ∗ (0) ≤ β ∗ (x). If β ∗ (0) ≤ µ∗ (x) for all x ∈ X, we have µ∗ (x) = max {µ∗ (x), β ∗ (0)}. Hence µ∗ (x) = (µ∗ × β ∗ )(x, 0). So µ∗ (xz)

= max {µ∗ (xz), β ∗ (0)} = (µ∗ × β ∗ )(xz, 0) ≤ max {(µ∗ × β ∗ )((xy)z), 0), (µ∗ × β ∗ )(y, 0)} = max {µ∗ ((xy)z), µ(y)∗ } .

Thus µ∗ is an anti fuzzy SU-ideal of X. If β ∗ (0) ≤ β ∗ (x) for all x ∈ X, then β ∗ (0) > µ∗ (x) for all x ∈ X. We have β ∗ (x) = max {µ∗ (0), β ∗ (x)}. Hence β ∗ (x) = (µ∗ × β ∗ )(0, x).


Vol. 9

Cartesian product of fuzzy SU-ideals on SU-algebra

121

So β ∗ (xz) = max {µ∗ (0), β ∗ (xz)}

= (µ∗ × β ∗ )(0, xz) ≤ max {(µ∗ × β ∗ )(0, (xy)z)), (µ∗ × β ∗ )(0, y)} = max {β ∗ ((xy)z), β ∗ (y)} .

Thus β ∗ is an anti fuzzy SU-ideal of X. (2) In case β ∗ (0) ≤ β ∗ (x) for all x ∈ X, a proof is similar to (1). Acknowledgements. The author are highly grateful to the referees for several useful suggestions and valuable comments. Moreover, this work was supported by a grant from Kasetsart University.

References [1] L. A. Zadeh, Fuzzy Sets, Inform and Control, 8(1965), 338-353. [2] P. Bhattacharya and N. P. Mukherjee, Fuzzy relations and Fuzzy groups, Inform. Sci, 36(1985), 267-282. [3] S. Keawrahun and U. Leerawat, On Classification of a Structure Algebra : SU-algebras, Scientia Magna Journal, 7(2011), 69-76. [4] R. Sukklin and U. Leerawat, Fuzzy SU-subalgebras and Fuzzy SU-ideals, Far East Journal of Mathematical Sciences, 74(2013), 191-200. [5] U. Leerawat and R. Sukklin, A study of anti fuzzy SU-algebras, Submitted (2013). [6] Samy M. Mostafa, Mokhtar A. Abd-Elnaby and Mouustafa M. M. Yousef, Fuzzy Ideals of KU-algebras, International Mathematical Forum, 6(2011), 3139-3149. [7] Samy M. Mostafa Mokhtar, A. Abd-Elnaby and Mouustafa M. M. Yousef, Anti fuzzy KU-ideals of KU-Algebras, International Journal of Algebra and Statistics, 1(2012), 92-99.



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.